<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2024-06-04T05:50:46</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:147789" version="1" class="patch">
	<metadata>
		<title>DirectFB-1.7.1-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-2977" ref_url="https://www.suse.com/security/cve/CVE-2014-2977/" source="CVE"/>
		<reference ref_id="CVE-2014-2978" ref_url="https://www.suse.com/security/cve/CVE-2014-2978/" source="CVE"/>
		<description>
These are all security issues fixed in the DirectFB-1.7.1-6.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2977/">CVE-2014-2977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2977">CVE-2014-2977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2978/">CVE-2014-2978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2978">CVE-2014-2978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140428" comment="DirectFB-1.7.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140429" comment="lib++dfb-1_7-1-1.7.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140430" comment="libdirectfb-1_7-1-1.7.1-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147790" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-52.2.0esr-108.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377/" source="CVE"/>
		<reference ref_id="CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381/" source="CVE"/>
		<reference ref_id="CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980/" source="CVE"/>
		<reference ref_id="CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2010-0164" ref_url="https://www.suse.com/security/cve/CVE-2010-0164/" source="CVE"/>
		<reference ref_id="CVE-2010-0165" ref_url="https://www.suse.com/security/cve/CVE-2010-0165/" source="CVE"/>
		<reference ref_id="CVE-2010-0166" ref_url="https://www.suse.com/security/cve/CVE-2010-0166/" source="CVE"/>
		<reference ref_id="CVE-2010-0167" ref_url="https://www.suse.com/security/cve/CVE-2010-0167/" source="CVE"/>
		<reference ref_id="CVE-2010-0168" ref_url="https://www.suse.com/security/cve/CVE-2010-0168/" source="CVE"/>
		<reference ref_id="CVE-2010-0169" ref_url="https://www.suse.com/security/cve/CVE-2010-0169/" source="CVE"/>
		<reference ref_id="CVE-2010-0170" ref_url="https://www.suse.com/security/cve/CVE-2010-0170/" source="CVE"/>
		<reference ref_id="CVE-2010-0171" ref_url="https://www.suse.com/security/cve/CVE-2010-0171/" source="CVE"/>
		<reference ref_id="CVE-2010-0172" ref_url="https://www.suse.com/security/cve/CVE-2010-0172/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1028" ref_url="https://www.suse.com/security/cve/CVE-2010-1028/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1207" ref_url="https://www.suse.com/security/cve/CVE-2010-1207/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1210" ref_url="https://www.suse.com/security/cve/CVE-2010-1210/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1215" ref_url="https://www.suse.com/security/cve/CVE-2010-1215/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2011-0068" ref_url="https://www.suse.com/security/cve/CVE-2011-0068/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0079" ref_url="https://www.suse.com/security/cve/CVE-2011-0079/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-1187" ref_url="https://www.suse.com/security/cve/CVE-2011-1187/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2366" ref_url="https://www.suse.com/security/cve/CVE-2011-2366/" source="CVE"/>
		<reference ref_id="CVE-2011-2367" ref_url="https://www.suse.com/security/cve/CVE-2011-2367/" source="CVE"/>
		<reference ref_id="CVE-2011-2368" ref_url="https://www.suse.com/security/cve/CVE-2011-2368/" source="CVE"/>
		<reference ref_id="CVE-2011-2369" ref_url="https://www.suse.com/security/cve/CVE-2011-2369/" source="CVE"/>
		<reference ref_id="CVE-2011-2370" ref_url="https://www.suse.com/security/cve/CVE-2011-2370/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2375" ref_url="https://www.suse.com/security/cve/CVE-2011-2375/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2985" ref_url="https://www.suse.com/security/cve/CVE-2011-2985/" source="CVE"/>
		<reference ref_id="CVE-2011-2986" ref_url="https://www.suse.com/security/cve/CVE-2011-2986/" source="CVE"/>
		<reference ref_id="CVE-2011-2988" ref_url="https://www.suse.com/security/cve/CVE-2011-2988/" source="CVE"/>
		<reference ref_id="CVE-2011-2989" ref_url="https://www.suse.com/security/cve/CVE-2011-2989/" source="CVE"/>
		<reference ref_id="CVE-2011-2990" ref_url="https://www.suse.com/security/cve/CVE-2011-2990/" source="CVE"/>
		<reference ref_id="CVE-2011-2991" ref_url="https://www.suse.com/security/cve/CVE-2011-2991/" source="CVE"/>
		<reference ref_id="CVE-2011-2992" ref_url="https://www.suse.com/security/cve/CVE-2011-2992/" source="CVE"/>
		<reference ref_id="CVE-2011-2993" ref_url="https://www.suse.com/security/cve/CVE-2011-2993/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2997" ref_url="https://www.suse.com/security/cve/CVE-2011-2997/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3002" ref_url="https://www.suse.com/security/cve/CVE-2011-3002/" source="CVE"/>
		<reference ref_id="CVE-2011-3003" ref_url="https://www.suse.com/security/cve/CVE-2011-3003/" source="CVE"/>
		<reference ref_id="CVE-2011-3004" ref_url="https://www.suse.com/security/cve/CVE-2011-3004/" source="CVE"/>
		<reference ref_id="CVE-2011-3005" ref_url="https://www.suse.com/security/cve/CVE-2011-3005/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062/" source="CVE"/>
		<reference ref_id="CVE-2011-3101" ref_url="https://www.suse.com/security/cve/CVE-2011-3101/" source="CVE"/>
		<reference ref_id="CVE-2011-3232" ref_url="https://www.suse.com/security/cve/CVE-2011-3232/" source="CVE"/>
		<reference ref_id="CVE-2011-3648" ref_url="https://www.suse.com/security/cve/CVE-2011-3648/" source="CVE"/>
		<reference ref_id="CVE-2011-3650" ref_url="https://www.suse.com/security/cve/CVE-2011-3650/" source="CVE"/>
		<reference ref_id="CVE-2011-3651" ref_url="https://www.suse.com/security/cve/CVE-2011-3651/" source="CVE"/>
		<reference ref_id="CVE-2011-3652" ref_url="https://www.suse.com/security/cve/CVE-2011-3652/" source="CVE"/>
		<reference ref_id="CVE-2011-3654" ref_url="https://www.suse.com/security/cve/CVE-2011-3654/" source="CVE"/>
		<reference ref_id="CVE-2011-3655" ref_url="https://www.suse.com/security/cve/CVE-2011-3655/" source="CVE"/>
		<reference ref_id="CVE-2011-3658" ref_url="https://www.suse.com/security/cve/CVE-2011-3658/" source="CVE"/>
		<reference ref_id="CVE-2011-3659" ref_url="https://www.suse.com/security/cve/CVE-2011-3659/" source="CVE"/>
		<reference ref_id="CVE-2011-3660" ref_url="https://www.suse.com/security/cve/CVE-2011-3660/" source="CVE"/>
		<reference ref_id="CVE-2011-3661" ref_url="https://www.suse.com/security/cve/CVE-2011-3661/" source="CVE"/>
		<reference ref_id="CVE-2011-3663" ref_url="https://www.suse.com/security/cve/CVE-2011-3663/" source="CVE"/>
		<reference ref_id="CVE-2012-0441" ref_url="https://www.suse.com/security/cve/CVE-2012-0441/" source="CVE"/>
		<reference ref_id="CVE-2012-0442" ref_url="https://www.suse.com/security/cve/CVE-2012-0442/" source="CVE"/>
		<reference ref_id="CVE-2012-0443" ref_url="https://www.suse.com/security/cve/CVE-2012-0443/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2012-0445" ref_url="https://www.suse.com/security/cve/CVE-2012-0445/" source="CVE"/>
		<reference ref_id="CVE-2012-0446" ref_url="https://www.suse.com/security/cve/CVE-2012-0446/" source="CVE"/>
		<reference ref_id="CVE-2012-0447" ref_url="https://www.suse.com/security/cve/CVE-2012-0447/" source="CVE"/>
		<reference ref_id="CVE-2012-0449" ref_url="https://www.suse.com/security/cve/CVE-2012-0449/" source="CVE"/>
		<reference ref_id="CVE-2012-0451" ref_url="https://www.suse.com/security/cve/CVE-2012-0451/" source="CVE"/>
		<reference ref_id="CVE-2012-0452" ref_url="https://www.suse.com/security/cve/CVE-2012-0452/" source="CVE"/>
		<reference ref_id="CVE-2012-0455" ref_url="https://www.suse.com/security/cve/CVE-2012-0455/" source="CVE"/>
		<reference ref_id="CVE-2012-0456" ref_url="https://www.suse.com/security/cve/CVE-2012-0456/" source="CVE"/>
		<reference ref_id="CVE-2012-0457" ref_url="https://www.suse.com/security/cve/CVE-2012-0457/" source="CVE"/>
		<reference ref_id="CVE-2012-0458" ref_url="https://www.suse.com/security/cve/CVE-2012-0458/" source="CVE"/>
		<reference ref_id="CVE-2012-0459" ref_url="https://www.suse.com/security/cve/CVE-2012-0459/" source="CVE"/>
		<reference ref_id="CVE-2012-0460" ref_url="https://www.suse.com/security/cve/CVE-2012-0460/" source="CVE"/>
		<reference ref_id="CVE-2012-0461" ref_url="https://www.suse.com/security/cve/CVE-2012-0461/" source="CVE"/>
		<reference ref_id="CVE-2012-0462" ref_url="https://www.suse.com/security/cve/CVE-2012-0462/" source="CVE"/>
		<reference ref_id="CVE-2012-0463" ref_url="https://www.suse.com/security/cve/CVE-2012-0463/" source="CVE"/>
		<reference ref_id="CVE-2012-0464" ref_url="https://www.suse.com/security/cve/CVE-2012-0464/" source="CVE"/>
		<reference ref_id="CVE-2012-0467" ref_url="https://www.suse.com/security/cve/CVE-2012-0467/" source="CVE"/>
		<reference ref_id="CVE-2012-0468" ref_url="https://www.suse.com/security/cve/CVE-2012-0468/" source="CVE"/>
		<reference ref_id="CVE-2012-0469" ref_url="https://www.suse.com/security/cve/CVE-2012-0469/" source="CVE"/>
		<reference ref_id="CVE-2012-0470" ref_url="https://www.suse.com/security/cve/CVE-2012-0470/" source="CVE"/>
		<reference ref_id="CVE-2012-0471" ref_url="https://www.suse.com/security/cve/CVE-2012-0471/" source="CVE"/>
		<reference ref_id="CVE-2012-0472" ref_url="https://www.suse.com/security/cve/CVE-2012-0472/" source="CVE"/>
		<reference ref_id="CVE-2012-0473" ref_url="https://www.suse.com/security/cve/CVE-2012-0473/" source="CVE"/>
		<reference ref_id="CVE-2012-0474" ref_url="https://www.suse.com/security/cve/CVE-2012-0474/" source="CVE"/>
		<reference ref_id="CVE-2012-0475" ref_url="https://www.suse.com/security/cve/CVE-2012-0475/" source="CVE"/>
		<reference ref_id="CVE-2012-0477" ref_url="https://www.suse.com/security/cve/CVE-2012-0477/" source="CVE"/>
		<reference ref_id="CVE-2012-0478" ref_url="https://www.suse.com/security/cve/CVE-2012-0478/" source="CVE"/>
		<reference ref_id="CVE-2012-0479" ref_url="https://www.suse.com/security/cve/CVE-2012-0479/" source="CVE"/>
		<reference ref_id="CVE-2012-0759" ref_url="https://www.suse.com/security/cve/CVE-2012-0759/" source="CVE"/>
		<reference ref_id="CVE-2012-1937" ref_url="https://www.suse.com/security/cve/CVE-2012-1937/" source="CVE"/>
		<reference ref_id="CVE-2012-1938" ref_url="https://www.suse.com/security/cve/CVE-2012-1938/" source="CVE"/>
		<reference ref_id="CVE-2012-1940" ref_url="https://www.suse.com/security/cve/CVE-2012-1940/" source="CVE"/>
		<reference ref_id="CVE-2012-1941" ref_url="https://www.suse.com/security/cve/CVE-2012-1941/" source="CVE"/>
		<reference ref_id="CVE-2012-1944" ref_url="https://www.suse.com/security/cve/CVE-2012-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-1945" ref_url="https://www.suse.com/security/cve/CVE-2012-1945/" source="CVE"/>
		<reference ref_id="CVE-2012-1946" ref_url="https://www.suse.com/security/cve/CVE-2012-1946/" source="CVE"/>
		<reference ref_id="CVE-2012-1947" ref_url="https://www.suse.com/security/cve/CVE-2012-1947/" source="CVE"/>
		<reference ref_id="CVE-2012-1948" ref_url="https://www.suse.com/security/cve/CVE-2012-1948/" source="CVE"/>
		<reference ref_id="CVE-2012-1949" ref_url="https://www.suse.com/security/cve/CVE-2012-1949/" source="CVE"/>
		<reference ref_id="CVE-2012-1950" ref_url="https://www.suse.com/security/cve/CVE-2012-1950/" source="CVE"/>
		<reference ref_id="CVE-2012-1951" ref_url="https://www.suse.com/security/cve/CVE-2012-1951/" source="CVE"/>
		<reference ref_id="CVE-2012-1952" ref_url="https://www.suse.com/security/cve/CVE-2012-1952/" source="CVE"/>
		<reference ref_id="CVE-2012-1953" ref_url="https://www.suse.com/security/cve/CVE-2012-1953/" source="CVE"/>
		<reference ref_id="CVE-2012-1954" ref_url="https://www.suse.com/security/cve/CVE-2012-1954/" source="CVE"/>
		<reference ref_id="CVE-2012-1955" ref_url="https://www.suse.com/security/cve/CVE-2012-1955/" source="CVE"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1957" ref_url="https://www.suse.com/security/cve/CVE-2012-1957/" source="CVE"/>
		<reference ref_id="CVE-2012-1958" ref_url="https://www.suse.com/security/cve/CVE-2012-1958/" source="CVE"/>
		<reference ref_id="CVE-2012-1959" ref_url="https://www.suse.com/security/cve/CVE-2012-1959/" source="CVE"/>
		<reference ref_id="CVE-2012-1960" ref_url="https://www.suse.com/security/cve/CVE-2012-1960/" source="CVE"/>
		<reference ref_id="CVE-2012-1961" ref_url="https://www.suse.com/security/cve/CVE-2012-1961/" source="CVE"/>
		<reference ref_id="CVE-2012-1962" ref_url="https://www.suse.com/security/cve/CVE-2012-1962/" source="CVE"/>
		<reference ref_id="CVE-2012-1963" ref_url="https://www.suse.com/security/cve/CVE-2012-1963/" source="CVE"/>
		<reference ref_id="CVE-2012-1965" ref_url="https://www.suse.com/security/cve/CVE-2012-1965/" source="CVE"/>
		<reference ref_id="CVE-2012-1966" ref_url="https://www.suse.com/security/cve/CVE-2012-1966/" source="CVE"/>
		<reference ref_id="CVE-2012-1967" ref_url="https://www.suse.com/security/cve/CVE-2012-1967/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3965" ref_url="https://www.suse.com/security/cve/CVE-2012-3965/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3971" ref_url="https://www.suse.com/security/cve/CVE-2012-3971/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3973" ref_url="https://www.suse.com/security/cve/CVE-2012-3973/" source="CVE"/>
		<reference ref_id="CVE-2012-3975" ref_url="https://www.suse.com/security/cve/CVE-2012-3975/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3983" ref_url="https://www.suse.com/security/cve/CVE-2012-3983/" source="CVE"/>
		<reference ref_id="CVE-2012-3984" ref_url="https://www.suse.com/security/cve/CVE-2012-3984/" source="CVE"/>
		<reference ref_id="CVE-2012-3985" ref_url="https://www.suse.com/security/cve/CVE-2012-3985/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3989" ref_url="https://www.suse.com/security/cve/CVE-2012-3989/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179/" source="CVE"/>
		<reference ref_id="CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182/" source="CVE"/>
		<reference ref_id="CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183/" source="CVE"/>
		<reference ref_id="CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186/" source="CVE"/>
		<reference ref_id="CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4191" ref_url="https://www.suse.com/security/cve/CVE-2012-4191/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193/" source="CVE"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4203" ref_url="https://www.suse.com/security/cve/CVE-2012-4203/" source="CVE"/>
		<reference ref_id="CVE-2012-4204" ref_url="https://www.suse.com/security/cve/CVE-2012-4204/" source="CVE"/>
		<reference ref_id="CVE-2012-4205" ref_url="https://www.suse.com/security/cve/CVE-2012-4205/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4208" ref_url="https://www.suse.com/security/cve/CVE-2012-4208/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5836" ref_url="https://www.suse.com/security/cve/CVE-2012-5836/" source="CVE"/>
		<reference ref_id="CVE-2012-5837" ref_url="https://www.suse.com/security/cve/CVE-2012-5837/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0751" ref_url="https://www.suse.com/security/cve/CVE-2013-0751/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0765" ref_url="https://www.suse.com/security/cve/CVE-2013-0765/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<reference ref_id="CVE-2013-0772" ref_url="https://www.suse.com/security/cve/CVE-2013-0772/" source="CVE"/>
		<reference ref_id="CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773/" source="CVE"/>
		<reference ref_id="CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774/" source="CVE"/>
		<reference ref_id="CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775/" source="CVE"/>
		<reference ref_id="CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776/" source="CVE"/>
		<reference ref_id="CVE-2013-0777" ref_url="https://www.suse.com/security/cve/CVE-2013-0777/" source="CVE"/>
		<reference ref_id="CVE-2013-0778" ref_url="https://www.suse.com/security/cve/CVE-2013-0778/" source="CVE"/>
		<reference ref_id="CVE-2013-0779" ref_url="https://www.suse.com/security/cve/CVE-2013-0779/" source="CVE"/>
		<reference ref_id="CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780/" source="CVE"/>
		<reference ref_id="CVE-2013-0781" ref_url="https://www.suse.com/security/cve/CVE-2013-0781/" source="CVE"/>
		<reference ref_id="CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782/" source="CVE"/>
		<reference ref_id="CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783/" source="CVE"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0789" ref_url="https://www.suse.com/security/cve/CVE-2013-0789/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<reference ref_id="CVE-2013-0801" ref_url="https://www.suse.com/security/cve/CVE-2013-0801/" source="CVE"/>
		<reference ref_id="CVE-2013-1669" ref_url="https://www.suse.com/security/cve/CVE-2013-1669/" source="CVE"/>
		<reference ref_id="CVE-2013-1670" ref_url="https://www.suse.com/security/cve/CVE-2013-1670/" source="CVE"/>
		<reference ref_id="CVE-2013-1671" ref_url="https://www.suse.com/security/cve/CVE-2013-1671/" source="CVE"/>
		<reference ref_id="CVE-2013-1674" ref_url="https://www.suse.com/security/cve/CVE-2013-1674/" source="CVE"/>
		<reference ref_id="CVE-2013-1675" ref_url="https://www.suse.com/security/cve/CVE-2013-1675/" source="CVE"/>
		<reference ref_id="CVE-2013-1676" ref_url="https://www.suse.com/security/cve/CVE-2013-1676/" source="CVE"/>
		<reference ref_id="CVE-2013-1677" ref_url="https://www.suse.com/security/cve/CVE-2013-1677/" source="CVE"/>
		<reference ref_id="CVE-2013-1678" ref_url="https://www.suse.com/security/cve/CVE-2013-1678/" source="CVE"/>
		<reference ref_id="CVE-2013-1679" ref_url="https://www.suse.com/security/cve/CVE-2013-1679/" source="CVE"/>
		<reference ref_id="CVE-2013-1680" ref_url="https://www.suse.com/security/cve/CVE-2013-1680/" source="CVE"/>
		<reference ref_id="CVE-2013-1681" ref_url="https://www.suse.com/security/cve/CVE-2013-1681/" source="CVE"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1683" ref_url="https://www.suse.com/security/cve/CVE-2013-1683/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1688" ref_url="https://www.suse.com/security/cve/CVE-2013-1688/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1694" ref_url="https://www.suse.com/security/cve/CVE-2013-1694/" source="CVE"/>
		<reference ref_id="CVE-2013-1695" ref_url="https://www.suse.com/security/cve/CVE-2013-1695/" source="CVE"/>
		<reference ref_id="CVE-2013-1696" ref_url="https://www.suse.com/security/cve/CVE-2013-1696/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<reference ref_id="CVE-2013-1698" ref_url="https://www.suse.com/security/cve/CVE-2013-1698/" source="CVE"/>
		<reference ref_id="CVE-2013-1699" ref_url="https://www.suse.com/security/cve/CVE-2013-1699/" source="CVE"/>
		<reference ref_id="CVE-2013-1701" ref_url="https://www.suse.com/security/cve/CVE-2013-1701/" source="CVE"/>
		<reference ref_id="CVE-2013-1702" ref_url="https://www.suse.com/security/cve/CVE-2013-1702/" source="CVE"/>
		<reference ref_id="CVE-2013-1704" ref_url="https://www.suse.com/security/cve/CVE-2013-1704/" source="CVE"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1708" ref_url="https://www.suse.com/security/cve/CVE-2013-1708/" source="CVE"/>
		<reference ref_id="CVE-2013-1709" ref_url="https://www.suse.com/security/cve/CVE-2013-1709/" source="CVE"/>
		<reference ref_id="CVE-2013-1710" ref_url="https://www.suse.com/security/cve/CVE-2013-1710/" source="CVE"/>
		<reference ref_id="CVE-2013-1711" ref_url="https://www.suse.com/security/cve/CVE-2013-1711/" source="CVE"/>
		<reference ref_id="CVE-2013-1713" ref_url="https://www.suse.com/security/cve/CVE-2013-1713/" source="CVE"/>
		<reference ref_id="CVE-2013-1714" ref_url="https://www.suse.com/security/cve/CVE-2013-1714/" source="CVE"/>
		<reference ref_id="CVE-2013-1717" ref_url="https://www.suse.com/security/cve/CVE-2013-1717/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1719" ref_url="https://www.suse.com/security/cve/CVE-2013-1719/" source="CVE"/>
		<reference ref_id="CVE-2013-1720" ref_url="https://www.suse.com/security/cve/CVE-2013-1720/" source="CVE"/>
		<reference ref_id="CVE-2013-1721" ref_url="https://www.suse.com/security/cve/CVE-2013-1721/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1723" ref_url="https://www.suse.com/security/cve/CVE-2013-1723/" source="CVE"/>
		<reference ref_id="CVE-2013-1724" ref_url="https://www.suse.com/security/cve/CVE-2013-1724/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1728" ref_url="https://www.suse.com/security/cve/CVE-2013-1728/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="CVE-2013-1738" ref_url="https://www.suse.com/security/cve/CVE-2013-1738/" source="CVE"/>
		<reference ref_id="CVE-2013-5590" ref_url="https://www.suse.com/security/cve/CVE-2013-5590/" source="CVE"/>
		<reference ref_id="CVE-2013-5591" ref_url="https://www.suse.com/security/cve/CVE-2013-5591/" source="CVE"/>
		<reference ref_id="CVE-2013-5592" ref_url="https://www.suse.com/security/cve/CVE-2013-5592/" source="CVE"/>
		<reference ref_id="CVE-2013-5593" ref_url="https://www.suse.com/security/cve/CVE-2013-5593/" source="CVE"/>
		<reference ref_id="CVE-2013-5595" ref_url="https://www.suse.com/security/cve/CVE-2013-5595/" source="CVE"/>
		<reference ref_id="CVE-2013-5596" ref_url="https://www.suse.com/security/cve/CVE-2013-5596/" source="CVE"/>
		<reference ref_id="CVE-2013-5597" ref_url="https://www.suse.com/security/cve/CVE-2013-5597/" source="CVE"/>
		<reference ref_id="CVE-2013-5598" ref_url="https://www.suse.com/security/cve/CVE-2013-5598/" source="CVE"/>
		<reference ref_id="CVE-2013-5599" ref_url="https://www.suse.com/security/cve/CVE-2013-5599/" source="CVE"/>
		<reference ref_id="CVE-2013-5600" ref_url="https://www.suse.com/security/cve/CVE-2013-5600/" source="CVE"/>
		<reference ref_id="CVE-2013-5601" ref_url="https://www.suse.com/security/cve/CVE-2013-5601/" source="CVE"/>
		<reference ref_id="CVE-2013-5602" ref_url="https://www.suse.com/security/cve/CVE-2013-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-5603" ref_url="https://www.suse.com/security/cve/CVE-2013-5603/" source="CVE"/>
		<reference ref_id="CVE-2013-5604" ref_url="https://www.suse.com/security/cve/CVE-2013-5604/" source="CVE"/>
		<reference ref_id="CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609/" source="CVE"/>
		<reference ref_id="CVE-2013-5610" ref_url="https://www.suse.com/security/cve/CVE-2013-5610/" source="CVE"/>
		<reference ref_id="CVE-2013-5611" ref_url="https://www.suse.com/security/cve/CVE-2013-5611/" source="CVE"/>
		<reference ref_id="CVE-2013-5612" ref_url="https://www.suse.com/security/cve/CVE-2013-5612/" source="CVE"/>
		<reference ref_id="CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613/" source="CVE"/>
		<reference ref_id="CVE-2013-5614" ref_url="https://www.suse.com/security/cve/CVE-2013-5614/" source="CVE"/>
		<reference ref_id="CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616/" source="CVE"/>
		<reference ref_id="CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618/" source="CVE"/>
		<reference ref_id="CVE-2013-5619" ref_url="https://www.suse.com/security/cve/CVE-2013-5619/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6630" ref_url="https://www.suse.com/security/cve/CVE-2013-6630/" source="CVE"/>
		<reference ref_id="CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671/" source="CVE"/>
		<reference ref_id="CVE-2013-6672" ref_url="https://www.suse.com/security/cve/CVE-2013-6672/" source="CVE"/>
		<reference ref_id="CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673/" source="CVE"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1478" ref_url="https://www.suse.com/security/cve/CVE-2014-1478/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483/" source="CVE"/>
		<reference ref_id="CVE-2014-1484" ref_url="https://www.suse.com/security/cve/CVE-2014-1484/" source="CVE"/>
		<reference ref_id="CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488/" source="CVE"/>
		<reference ref_id="CVE-2014-1489" ref_url="https://www.suse.com/security/cve/CVE-2014-1489/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548/" source="CVE"/>
		<reference ref_id="CVE-2014-1553" ref_url="https://www.suse.com/security/cve/CVE-2014-1553/" source="CVE"/>
		<reference ref_id="CVE-2014-1554" ref_url="https://www.suse.com/security/cve/CVE-2014-1554/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<reference ref_id="CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562/" source="CVE"/>
		<reference ref_id="CVE-2014-1563" ref_url="https://www.suse.com/security/cve/CVE-2014-1563/" source="CVE"/>
		<reference ref_id="CVE-2014-1564" ref_url="https://www.suse.com/security/cve/CVE-2014-1564/" source="CVE"/>
		<reference ref_id="CVE-2014-1565" ref_url="https://www.suse.com/security/cve/CVE-2014-1565/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8635" ref_url="https://www.suse.com/security/cve/CVE-2014-8635/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814/" source="CVE"/>
		<reference ref_id="CVE-2015-0815" ref_url="https://www.suse.com/security/cve/CVE-2015-0815/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0835" ref_url="https://www.suse.com/security/cve/CVE-2015-0835/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="CVE-2015-4497" ref_url="https://www.suse.com/security/cve/CVE-2015-4497/" source="CVE"/>
		<reference ref_id="CVE-2015-4498" ref_url="https://www.suse.com/security/cve/CVE-2015-4498/" source="CVE"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1931" ref_url="https://www.suse.com/security/cve/CVE-2016-1931/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="CVE-2016-2805" ref_url="https://www.suse.com/security/cve/CVE-2016-2805/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808/" source="CVE"/>
		<reference ref_id="CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814/" source="CVE"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<reference ref_id="CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270/" source="CVE"/>
		<reference ref_id="CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272/" source="CVE"/>
		<reference ref_id="CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274/" source="CVE"/>
		<reference ref_id="CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277/" source="CVE"/>
		<reference ref_id="CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278/" source="CVE"/>
		<reference ref_id="CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280/" source="CVE"/>
		<reference ref_id="CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281/" source="CVE"/>
		<reference ref_id="CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905/" source="CVE"/>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5409" ref_url="https://www.suse.com/security/cve/CVE-2017-5409/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449/" source="CVE"/>
		<reference ref_id="CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451/" source="CVE"/>
		<reference ref_id="CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454/" source="CVE"/>
		<reference ref_id="CVE-2017-5455" ref_url="https://www.suse.com/security/cve/CVE-2017-5455/" source="CVE"/>
		<reference ref_id="CVE-2017-5456" ref_url="https://www.suse.com/security/cve/CVE-2017-5456/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466/" source="CVE"/>
		<reference ref_id="CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="CVE-2017-5470" ref_url="https://www.suse.com/security/cve/CVE-2017-5470/" source="CVE"/>
		<reference ref_id="CVE-2017-5472" ref_url="https://www.suse.com/security/cve/CVE-2017-5472/" source="CVE"/>
		<reference ref_id="CVE-2017-7749" ref_url="https://www.suse.com/security/cve/CVE-2017-7749/" source="CVE"/>
		<reference ref_id="CVE-2017-7750" ref_url="https://www.suse.com/security/cve/CVE-2017-7750/" source="CVE"/>
		<reference ref_id="CVE-2017-7751" ref_url="https://www.suse.com/security/cve/CVE-2017-7751/" source="CVE"/>
		<reference ref_id="CVE-2017-7752" ref_url="https://www.suse.com/security/cve/CVE-2017-7752/" source="CVE"/>
		<reference ref_id="CVE-2017-7754" ref_url="https://www.suse.com/security/cve/CVE-2017-7754/" source="CVE"/>
		<reference ref_id="CVE-2017-7755" ref_url="https://www.suse.com/security/cve/CVE-2017-7755/" source="CVE"/>
		<reference ref_id="CVE-2017-7756" ref_url="https://www.suse.com/security/cve/CVE-2017-7756/" source="CVE"/>
		<reference ref_id="CVE-2017-7757" ref_url="https://www.suse.com/security/cve/CVE-2017-7757/" source="CVE"/>
		<reference ref_id="CVE-2017-7758" ref_url="https://www.suse.com/security/cve/CVE-2017-7758/" source="CVE"/>
		<reference ref_id="CVE-2017-7761" ref_url="https://www.suse.com/security/cve/CVE-2017-7761/" source="CVE"/>
		<reference ref_id="CVE-2017-7763" ref_url="https://www.suse.com/security/cve/CVE-2017-7763/" source="CVE"/>
		<reference ref_id="CVE-2017-7764" ref_url="https://www.suse.com/security/cve/CVE-2017-7764/" source="CVE"/>
		<reference ref_id="CVE-2017-7765" ref_url="https://www.suse.com/security/cve/CVE-2017-7765/" source="CVE"/>
		<reference ref_id="CVE-2017-7768" ref_url="https://www.suse.com/security/cve/CVE-2017-7768/" source="CVE"/>
		<reference ref_id="CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-52.2.0esr-108.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5913">CVE-2008-5913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0040">CVE-2009-0040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0652">CVE-2009-0652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0771">CVE-2009-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0772">CVE-2009-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0773">CVE-2009-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0774">CVE-2009-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0775">CVE-2009-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0776">CVE-2009-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0777">CVE-2009-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1044">CVE-2009-1044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1169">CVE-2009-1169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1302">CVE-2009-1302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1303">CVE-2009-1303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1304">CVE-2009-1304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1305">CVE-2009-1305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1306">CVE-2009-1306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1307">CVE-2009-1307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1308">CVE-2009-1308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1309">CVE-2009-1309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1310">CVE-2009-1310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1311">CVE-2009-1311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1312">CVE-2009-1312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1313">CVE-2009-1313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1563">CVE-2009-1563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2470">CVE-2009-2470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2654">CVE-2009-2654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3069">CVE-2009-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3070">CVE-2009-3070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3071">CVE-2009-3071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3072">CVE-2009-3072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3073">CVE-2009-3073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3074">CVE-2009-3074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3075">CVE-2009-3075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3077">CVE-2009-3077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3078">CVE-2009-3078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3079">CVE-2009-3079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3274">CVE-2009-3274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3370">CVE-2009-3370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3371">CVE-2009-3371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3372">CVE-2009-3372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3373">CVE-2009-3373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3374">CVE-2009-3374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3375">CVE-2009-3375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3376">CVE-2009-3376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3377">CVE-2009-3377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3378">CVE-2009-3378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3379">CVE-2009-3379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3380">CVE-2009-3380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3381">CVE-2009-3381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3383">CVE-2009-3383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3388">CVE-2009-3388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3389">CVE-2009-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3979">CVE-2009-3979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3980">CVE-2009-3980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3982">CVE-2009-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3983">CVE-2009-3983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3984">CVE-2009-3984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3985">CVE-2009-3985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0164/">CVE-2010-0164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0164">CVE-2010-0164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0165/">CVE-2010-0165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0165">CVE-2010-0165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0166/">CVE-2010-0166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0166">CVE-2010-0166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0167/">CVE-2010-0167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0167">CVE-2010-0167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0168/">CVE-2010-0168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0168">CVE-2010-0168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0169/">CVE-2010-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0169">CVE-2010-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0170/">CVE-2010-0170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0170">CVE-2010-0170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0171/">CVE-2010-0171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0171">CVE-2010-0171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0172/">CVE-2010-0172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0172">CVE-2010-0172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0173">CVE-2010-0173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0174">CVE-2010-0174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0176">CVE-2010-0176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0177">CVE-2010-0177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0178">CVE-2010-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0181">CVE-2010-0181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0182">CVE-2010-0182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0654">CVE-2010-0654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1028/">CVE-2010-1028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1028">CVE-2010-1028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1121">CVE-2010-1121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1125">CVE-2010-1125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1196">CVE-2010-1196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1197">CVE-2010-1197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1198">CVE-2010-1198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1199">CVE-2010-1199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1200">CVE-2010-1200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1201">CVE-2010-1201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1202">CVE-2010-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1203">CVE-2010-1203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1206">CVE-2010-1206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1207/">CVE-2010-1207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1207">CVE-2010-1207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1208">CVE-2010-1208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1209">CVE-2010-1209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1210/">CVE-2010-1210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1210">CVE-2010-1210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1211">CVE-2010-1211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1212">CVE-2010-1212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1213">CVE-2010-1213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1214">CVE-2010-1214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1215/">CVE-2010-1215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1215">CVE-2010-1215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2751">CVE-2010-2751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2752">CVE-2010-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2753">CVE-2010-2753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2754">CVE-2010-2754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2755">CVE-2010-2755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2760">CVE-2010-2760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2762">CVE-2010-2762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2764">CVE-2010-2764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2765">CVE-2010-2765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2766">CVE-2010-2766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2767">CVE-2010-2767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2768">CVE-2010-2768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2769">CVE-2010-2769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3166">CVE-2010-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3167">CVE-2010-3167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3168">CVE-2010-3168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3169">CVE-2010-3169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3173">CVE-2010-3173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3174">CVE-2010-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3175">CVE-2010-3175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3176">CVE-2010-3176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3177">CVE-2010-3177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3178">CVE-2010-3178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3179">CVE-2010-3179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3180">CVE-2010-3180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3182">CVE-2010-3182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3183">CVE-2010-3183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3765">CVE-2010-3765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0068/">CVE-2011-0068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0068">CVE-2011-0068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0069">CVE-2011-0069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0070">CVE-2011-0070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0079/">CVE-2011-0079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0079">CVE-2011-0079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0080">CVE-2011-0080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0081">CVE-2011-0081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0084">CVE-2011-0084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1187/">CVE-2011-1187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1187">CVE-2011-1187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1202">CVE-2011-1202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2366/">CVE-2011-2366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2366">CVE-2011-2366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2367/">CVE-2011-2367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2367">CVE-2011-2367 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2368/">CVE-2011-2368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2368">CVE-2011-2368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2369/">CVE-2011-2369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2369">CVE-2011-2369 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2370/">CVE-2011-2370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2370">CVE-2011-2370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2371">CVE-2011-2371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2372">CVE-2011-2372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2373">CVE-2011-2373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2374">CVE-2011-2374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2375/">CVE-2011-2375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2375">CVE-2011-2375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2377">CVE-2011-2377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2985/">CVE-2011-2985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2985">CVE-2011-2985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2986/">CVE-2011-2986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2986">CVE-2011-2986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2988/">CVE-2011-2988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2988">CVE-2011-2988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2989/">CVE-2011-2989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2989">CVE-2011-2989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2990/">CVE-2011-2990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2990">CVE-2011-2990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2991/">CVE-2011-2991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2991">CVE-2011-2991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2992/">CVE-2011-2992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2992">CVE-2011-2992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2993/">CVE-2011-2993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2993">CVE-2011-2993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2995">CVE-2011-2995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2996">CVE-2011-2996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2997/">CVE-2011-2997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2997">CVE-2011-2997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3000">CVE-2011-3000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3001">CVE-2011-3001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3002/">CVE-2011-3002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3002">CVE-2011-3002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3003/">CVE-2011-3003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3003">CVE-2011-3003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3004/">CVE-2011-3004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3004">CVE-2011-3004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3005/">CVE-2011-3005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3005">CVE-2011-3005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3026">CVE-2011-3026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3062">CVE-2011-3062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3101/">CVE-2011-3101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3101">CVE-2011-3101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3232/">CVE-2011-3232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3232">CVE-2011-3232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3648/">CVE-2011-3648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3648">CVE-2011-3648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3650/">CVE-2011-3650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3650">CVE-2011-3650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3651/">CVE-2011-3651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3651">CVE-2011-3651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3652/">CVE-2011-3652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3652">CVE-2011-3652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3654/">CVE-2011-3654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3654">CVE-2011-3654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3655/">CVE-2011-3655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3655">CVE-2011-3655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3658/">CVE-2011-3658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3658">CVE-2011-3658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3659/">CVE-2011-3659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3659">CVE-2011-3659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3660/">CVE-2011-3660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3660">CVE-2011-3660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3661/">CVE-2011-3661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3661">CVE-2011-3661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3663/">CVE-2011-3663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3663">CVE-2011-3663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0441/">CVE-2012-0441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0441">CVE-2012-0441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0442/">CVE-2012-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0442">CVE-2012-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0443/">CVE-2012-0443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0443">CVE-2012-0443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0444">CVE-2012-0444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0445/">CVE-2012-0445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0445">CVE-2012-0445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0446/">CVE-2012-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0446">CVE-2012-0446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0447/">CVE-2012-0447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0447">CVE-2012-0447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0449/">CVE-2012-0449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0449">CVE-2012-0449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0451/">CVE-2012-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0451">CVE-2012-0451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0452/">CVE-2012-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0452">CVE-2012-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0455/">CVE-2012-0455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0455">CVE-2012-0455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0456/">CVE-2012-0456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0456">CVE-2012-0456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0457/">CVE-2012-0457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0457">CVE-2012-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0458/">CVE-2012-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0458">CVE-2012-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0459/">CVE-2012-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0459">CVE-2012-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0460/">CVE-2012-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0460">CVE-2012-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0461/">CVE-2012-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0461">CVE-2012-0461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0462/">CVE-2012-0462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0462">CVE-2012-0462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0463/">CVE-2012-0463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0463">CVE-2012-0463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0464/">CVE-2012-0464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0464">CVE-2012-0464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0467/">CVE-2012-0467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0467">CVE-2012-0467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0468/">CVE-2012-0468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0468">CVE-2012-0468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0469/">CVE-2012-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0469">CVE-2012-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0470/">CVE-2012-0470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0470">CVE-2012-0470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0471/">CVE-2012-0471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0471">CVE-2012-0471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0472/">CVE-2012-0472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0472">CVE-2012-0472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0473/">CVE-2012-0473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0473">CVE-2012-0473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0474/">CVE-2012-0474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0474">CVE-2012-0474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0475/">CVE-2012-0475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0475">CVE-2012-0475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0477/">CVE-2012-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0477">CVE-2012-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0478/">CVE-2012-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0478">CVE-2012-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0479/">CVE-2012-0479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0479">CVE-2012-0479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0759/">CVE-2012-0759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0759">CVE-2012-0759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1937/">CVE-2012-1937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1937">CVE-2012-1937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1938/">CVE-2012-1938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1938">CVE-2012-1938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1940/">CVE-2012-1940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1940">CVE-2012-1940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1941/">CVE-2012-1941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1941">CVE-2012-1941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1944/">CVE-2012-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1944">CVE-2012-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1945/">CVE-2012-1945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1945">CVE-2012-1945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1946/">CVE-2012-1946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1946">CVE-2012-1946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1947/">CVE-2012-1947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1947">CVE-2012-1947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1948/">CVE-2012-1948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1948">CVE-2012-1948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1949/">CVE-2012-1949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1949">CVE-2012-1949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1950/">CVE-2012-1950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1950">CVE-2012-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1951/">CVE-2012-1951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1951">CVE-2012-1951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1952/">CVE-2012-1952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1952">CVE-2012-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1953/">CVE-2012-1953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1953">CVE-2012-1953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1954/">CVE-2012-1954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1954">CVE-2012-1954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1955/">CVE-2012-1955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1955">CVE-2012-1955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1956">CVE-2012-1956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1957/">CVE-2012-1957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1957">CVE-2012-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1958/">CVE-2012-1958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1958">CVE-2012-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1959/">CVE-2012-1959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1959">CVE-2012-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1960/">CVE-2012-1960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1960">CVE-2012-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1961/">CVE-2012-1961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1961">CVE-2012-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1962/">CVE-2012-1962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1962">CVE-2012-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1963/">CVE-2012-1963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1963">CVE-2012-1963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1965/">CVE-2012-1965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1965">CVE-2012-1965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1966/">CVE-2012-1966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1966">CVE-2012-1966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1967/">CVE-2012-1967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1967">CVE-2012-1967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1970">CVE-2012-1970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1972">CVE-2012-1972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1973">CVE-2012-1973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1974">CVE-2012-1974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1975">CVE-2012-1975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1976">CVE-2012-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3956">CVE-2012-3956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3957">CVE-2012-3957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3958">CVE-2012-3958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3959">CVE-2012-3959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3960">CVE-2012-3960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3961">CVE-2012-3961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3962">CVE-2012-3962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3963">CVE-2012-3963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3964">CVE-2012-3964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3965/">CVE-2012-3965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3965">CVE-2012-3965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3966">CVE-2012-3966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3967">CVE-2012-3967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3968">CVE-2012-3968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3969">CVE-2012-3969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3970">CVE-2012-3970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3971/">CVE-2012-3971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3971">CVE-2012-3971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3972">CVE-2012-3972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3973/">CVE-2012-3973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3973">CVE-2012-3973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3975/">CVE-2012-3975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3975">CVE-2012-3975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3976">CVE-2012-3976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3978">CVE-2012-3978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3980">CVE-2012-3980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3982">CVE-2012-3982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3983/">CVE-2012-3983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3983">CVE-2012-3983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3984/">CVE-2012-3984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3984">CVE-2012-3984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3985/">CVE-2012-3985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3985">CVE-2012-3985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3986">CVE-2012-3986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3988">CVE-2012-3988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3989/">CVE-2012-3989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3989">CVE-2012-3989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3990">CVE-2012-3990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3991">CVE-2012-3991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3992">CVE-2012-3992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3993">CVE-2012-3993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3994">CVE-2012-3994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3995">CVE-2012-3995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4179">CVE-2012-4179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4180">CVE-2012-4180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4181">CVE-2012-4181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4182">CVE-2012-4182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4183">CVE-2012-4183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4184">CVE-2012-4184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4185">CVE-2012-4185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4186">CVE-2012-4186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4187">CVE-2012-4187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4188">CVE-2012-4188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4191/">CVE-2012-4191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4191">CVE-2012-4191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4192">CVE-2012-4192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4193">CVE-2012-4193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4194">CVE-2012-4194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4195">CVE-2012-4195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4196">CVE-2012-4196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4201">CVE-2012-4201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4202">CVE-2012-4202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4203/">CVE-2012-4203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4203">CVE-2012-4203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4204/">CVE-2012-4204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4204">CVE-2012-4204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4205/">CVE-2012-4205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4205">CVE-2012-4205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4207">CVE-2012-4207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4208/">CVE-2012-4208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4208">CVE-2012-4208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4209">CVE-2012-4209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4210">CVE-2012-4210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4212">CVE-2012-4212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4213">CVE-2012-4213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4214">CVE-2012-4214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4215">CVE-2012-4215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4216">CVE-2012-4216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4217">CVE-2012-4217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4218">CVE-2012-4218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5829">CVE-2012-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-5830">CVE-2012-5830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5833">CVE-2012-5833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5835">CVE-2012-5835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5836/">CVE-2012-5836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5836">CVE-2012-5836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5837/">CVE-2012-5837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5837">CVE-2012-5837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5838">CVE-2012-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5839">CVE-2012-5839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5840">CVE-2012-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5841">CVE-2012-5841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5842">CVE-2012-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5843">CVE-2012-5843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0743">CVE-2013-0743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0744">CVE-2013-0744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0745">CVE-2013-0745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0746">CVE-2013-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0747">CVE-2013-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0748">CVE-2013-0748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0749">CVE-2013-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0750">CVE-2013-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0751/">CVE-2013-0751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0751">CVE-2013-0751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0752">CVE-2013-0752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0753">CVE-2013-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0754">CVE-2013-0754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0755">CVE-2013-0755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0756">CVE-2013-0756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0757">CVE-2013-0757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0758">CVE-2013-0758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0760">CVE-2013-0760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0761">CVE-2013-0761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0762">CVE-2013-0762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0763">CVE-2013-0763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0764">CVE-2013-0764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0765/">CVE-2013-0765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0765">CVE-2013-0765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0766">CVE-2013-0766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0767">CVE-2013-0767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0768">CVE-2013-0768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0769">CVE-2013-0769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0770">CVE-2013-0770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0771">CVE-2013-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0772/">CVE-2013-0772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0772">CVE-2013-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0773">CVE-2013-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0774">CVE-2013-0774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0775">CVE-2013-0775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0776">CVE-2013-0776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0777/">CVE-2013-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0777">CVE-2013-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0778/">CVE-2013-0778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0778">CVE-2013-0778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0779/">CVE-2013-0779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0779">CVE-2013-0779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0780">CVE-2013-0780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0781/">CVE-2013-0781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0781">CVE-2013-0781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0782">CVE-2013-0782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0783">CVE-2013-0783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0787">CVE-2013-0787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0788">CVE-2013-0788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0789/">CVE-2013-0789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0789">CVE-2013-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0792">CVE-2013-0792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0793">CVE-2013-0793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0794">CVE-2013-0794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0795">CVE-2013-0795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0796">CVE-2013-0796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0800">CVE-2013-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0801/">CVE-2013-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0801">CVE-2013-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1669/">CVE-2013-1669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1669">CVE-2013-1669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1670/">CVE-2013-1670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1670">CVE-2013-1670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1671/">CVE-2013-1671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1671">CVE-2013-1671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1674/">CVE-2013-1674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1674">CVE-2013-1674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1675/">CVE-2013-1675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1675">CVE-2013-1675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1676/">CVE-2013-1676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1676">CVE-2013-1676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1677/">CVE-2013-1677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1677">CVE-2013-1677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1678/">CVE-2013-1678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1678">CVE-2013-1678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1679/">CVE-2013-1679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1679">CVE-2013-1679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1680/">CVE-2013-1680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1680">CVE-2013-1680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1681/">CVE-2013-1681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1681">CVE-2013-1681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1682">CVE-2013-1682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1683/">CVE-2013-1683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1683">CVE-2013-1683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1684">CVE-2013-1684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1685">CVE-2013-1685 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1686">CVE-2013-1686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1687">CVE-2013-1687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1688/">CVE-2013-1688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1688">CVE-2013-1688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1690">CVE-2013-1690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1692">CVE-2013-1692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1693">CVE-2013-1693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1694/">CVE-2013-1694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1694">CVE-2013-1694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1695/">CVE-2013-1695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1695">CVE-2013-1695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1696/">CVE-2013-1696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1696">CVE-2013-1696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1697">CVE-2013-1697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1698/">CVE-2013-1698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1698">CVE-2013-1698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1699/">CVE-2013-1699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1699">CVE-2013-1699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1701/">CVE-2013-1701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1701">CVE-2013-1701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1702/">CVE-2013-1702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1702">CVE-2013-1702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1704/">CVE-2013-1704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1704">CVE-2013-1704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1705">CVE-2013-1705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1708/">CVE-2013-1708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1708">CVE-2013-1708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1709/">CVE-2013-1709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1709">CVE-2013-1709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1710/">CVE-2013-1710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1710">CVE-2013-1710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1711/">CVE-2013-1711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1711">CVE-2013-1711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1713/">CVE-2013-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1713">CVE-2013-1713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1714/">CVE-2013-1714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1714">CVE-2013-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1717/">CVE-2013-1717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1717">CVE-2013-1717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1718">CVE-2013-1718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1719/">CVE-2013-1719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1719">CVE-2013-1719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1720/">CVE-2013-1720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1720">CVE-2013-1720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1721/">CVE-2013-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1721">CVE-2013-1721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1722">CVE-2013-1722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1723/">CVE-2013-1723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1723">CVE-2013-1723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1724/">CVE-2013-1724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1724">CVE-2013-1724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1725">CVE-2013-1725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1728/">CVE-2013-1728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1728">CVE-2013-1728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1730">CVE-2013-1730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1732">CVE-2013-1732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1735">CVE-2013-1735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1736">CVE-2013-1736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1737">CVE-2013-1737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1738/">CVE-2013-1738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1738">CVE-2013-1738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5590/">CVE-2013-5590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5590">CVE-2013-5590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5591/">CVE-2013-5591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5591">CVE-2013-5591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5592/">CVE-2013-5592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5592">CVE-2013-5592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5593/">CVE-2013-5593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5593">CVE-2013-5593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5595/">CVE-2013-5595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5595">CVE-2013-5595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5596/">CVE-2013-5596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5596">CVE-2013-5596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5597/">CVE-2013-5597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5597">CVE-2013-5597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5598/">CVE-2013-5598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5598">CVE-2013-5598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5599/">CVE-2013-5599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5599">CVE-2013-5599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5600/">CVE-2013-5600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5600">CVE-2013-5600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5601/">CVE-2013-5601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5601">CVE-2013-5601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5602/">CVE-2013-5602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5602">CVE-2013-5602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5603/">CVE-2013-5603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5603">CVE-2013-5603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5604/">CVE-2013-5604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5604">CVE-2013-5604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5609">CVE-2013-5609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5610/">CVE-2013-5610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5610">CVE-2013-5610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5611/">CVE-2013-5611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5611">CVE-2013-5611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5612/">CVE-2013-5612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5612">CVE-2013-5612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5613">CVE-2013-5613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5614/">CVE-2013-5614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5614">CVE-2013-5614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5615">CVE-2013-5615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5616">CVE-2013-5616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5618">CVE-2013-5618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5619/">CVE-2013-5619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5619">CVE-2013-5619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6629">CVE-2013-6629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6630/">CVE-2013-6630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6630">CVE-2013-6630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-6671">CVE-2013-6671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6672/">CVE-2013-6672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6672">CVE-2013-6672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-6673">CVE-2013-6673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1477">CVE-2014-1477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1478/">CVE-2014-1478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1478">CVE-2014-1478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1479">CVE-2014-1479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1480">CVE-2014-1480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1481">CVE-2014-1481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1482">CVE-2014-1482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1483">CVE-2014-1483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1484/">CVE-2014-1484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1484">CVE-2014-1484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1485">CVE-2014-1485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1486">CVE-2014-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-1487">CVE-2014-1487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1488">CVE-2014-1488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1489/">CVE-2014-1489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1489">CVE-2014-1489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1490">CVE-2014-1490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1491">CVE-2014-1491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1544">CVE-2014-1544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1547">CVE-2014-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1548">CVE-2014-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1553/">CVE-2014-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1553">CVE-2014-1553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1554/">CVE-2014-1554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1554">CVE-2014-1554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1555">CVE-2014-1555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1556">CVE-2014-1556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1557">CVE-2014-1557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1562">CVE-2014-1562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1563/">CVE-2014-1563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1563">CVE-2014-1563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1564/">CVE-2014-1564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1564">CVE-2014-1564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1565/">CVE-2014-1565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1565">CVE-2014-1565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1567">CVE-2014-1567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1574">CVE-2014-1574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1575">CVE-2014-1575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1576">CVE-2014-1576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1577">CVE-2014-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1578">CVE-2014-1578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1581">CVE-2014-1581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1583">CVE-2014-1583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1585">CVE-2014-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1586">CVE-2014-1586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1587">CVE-2014-1587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1588">CVE-2014-1588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1590">CVE-2014-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1592">CVE-2014-1592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1593">CVE-2014-1593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1594">CVE-2014-1594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8634">CVE-2014-8634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8635/">CVE-2014-8635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8635">CVE-2014-8635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8638">CVE-2014-8638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8639">CVE-2014-8639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8641">CVE-2014-8641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0797">CVE-2015-0797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0801">CVE-2015-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0807">CVE-2015-0807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0813">CVE-2015-0813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0814">CVE-2015-0814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0815/">CVE-2015-0815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0815">CVE-2015-0815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0816">CVE-2015-0816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0817">CVE-2015-0817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0818">CVE-2015-0818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0822">CVE-2015-0822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0827">CVE-2015-0827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0831">CVE-2015-0831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0835/">CVE-2015-0835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0835">CVE-2015-0835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0836">CVE-2015-0836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2708">CVE-2015-2708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2709">CVE-2015-2709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2710">CVE-2015-2710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2713">CVE-2015-2713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2716">CVE-2015-2716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2721">CVE-2015-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2722">CVE-2015-2722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2724">CVE-2015-2724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2725">CVE-2015-2725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2726">CVE-2015-2726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2728">CVE-2015-2728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2730">CVE-2015-2730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2733">CVE-2015-2733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2734">CVE-2015-2734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2735">CVE-2015-2735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2736">CVE-2015-2736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2737">CVE-2015-2737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2738">CVE-2015-2738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2739">CVE-2015-2739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2740">CVE-2015-2740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2743">CVE-2015-2743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4473">CVE-2015-4473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4474">CVE-2015-4474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4475">CVE-2015-4475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4478">CVE-2015-4478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4479">CVE-2015-4479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4484">CVE-2015-4484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4485">CVE-2015-4485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4486">CVE-2015-4486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4487">CVE-2015-4487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4488">CVE-2015-4488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4489">CVE-2015-4489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4491">CVE-2015-4491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4492">CVE-2015-4492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4495">CVE-2015-4495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4497/">CVE-2015-4497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4497">CVE-2015-4497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4498/">CVE-2015-4498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4498">CVE-2015-4498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4500">CVE-2015-4500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4501">CVE-2015-4501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4506">CVE-2015-4506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4509">CVE-2015-4509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4511">CVE-2015-4511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4513">CVE-2015-4513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4517">CVE-2015-4517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4519">CVE-2015-4519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4520">CVE-2015-4520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4521">CVE-2015-4521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4522">CVE-2015-4522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7174">CVE-2015-7174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7175">CVE-2015-7175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7176">CVE-2015-7176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7177">CVE-2015-7177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7180">CVE-2015-7180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7181">CVE-2015-7181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7182">CVE-2015-7182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7183">CVE-2015-7183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7188">CVE-2015-7188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7189">CVE-2015-7189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7193">CVE-2015-7193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7194">CVE-2015-7194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7196">CVE-2015-7196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7197">CVE-2015-7197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7198">CVE-2015-7198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7199">CVE-2015-7199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7200">CVE-2015-7200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7201">CVE-2015-7201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7202">CVE-2015-7202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7205">CVE-2015-7205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7210">CVE-2015-7210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7212">CVE-2015-7212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7213">CVE-2015-7213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7214">CVE-2015-7214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7222">CVE-2015-7222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10196">CVE-2016-10196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1523">CVE-2016-1523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1930">CVE-2016-1930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1931/">CVE-2016-1931 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1931">CVE-2016-1931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1935">CVE-2016-1935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1950">CVE-2016-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1952">CVE-2016-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1953">CVE-2016-1953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1954">CVE-2016-1954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1957">CVE-2016-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1958">CVE-2016-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1960">CVE-2016-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1961">CVE-2016-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1962">CVE-2016-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1964">CVE-2016-1964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1965">CVE-2016-1965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1966">CVE-2016-1966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1974">CVE-2016-1974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1977">CVE-2016-1977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2790">CVE-2016-2790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2791">CVE-2016-2791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2792">CVE-2016-2792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2793">CVE-2016-2793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2794">CVE-2016-2794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2795">CVE-2016-2795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2796">CVE-2016-2796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2797">CVE-2016-2797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2798">CVE-2016-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2799">CVE-2016-2799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2800">CVE-2016-2800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2801">CVE-2016-2801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2802">CVE-2016-2802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2805/">CVE-2016-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2805">CVE-2016-2805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2807">CVE-2016-2807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2808">CVE-2016-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2814">CVE-2016-2814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2815">CVE-2016-2815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2818">CVE-2016-2818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2819">CVE-2016-2819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2821">CVE-2016-2821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2822">CVE-2016-2822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2824">CVE-2016-2824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2828">CVE-2016-2828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2830">CVE-2016-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2831">CVE-2016-2831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2835">CVE-2016-2835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2836">CVE-2016-2836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2837">CVE-2016-2837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2838">CVE-2016-2838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2839">CVE-2016-2839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5250">CVE-2016-5250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5252">CVE-2016-5252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5254">CVE-2016-5254 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5257">CVE-2016-5257 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5258">CVE-2016-5258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5259">CVE-2016-5259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5261">CVE-2016-5261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5262">CVE-2016-5262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5263">CVE-2016-5263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5264">CVE-2016-5264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5265">CVE-2016-5265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5270">CVE-2016-5270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5272">CVE-2016-5272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5274">CVE-2016-5274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5276">CVE-2016-5276 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5277">CVE-2016-5277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5278">CVE-2016-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5280">CVE-2016-5280 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5281">CVE-2016-5281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5284">CVE-2016-5284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5290">CVE-2016-5290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5291">CVE-2016-5291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5296">CVE-2016-5296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5297">CVE-2016-5297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6354">CVE-2016-6354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9064">CVE-2016-9064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9066">CVE-2016-9066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9079">CVE-2016-9079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9893">CVE-2016-9893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9895">CVE-2016-9895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9897">CVE-2016-9897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9898">CVE-2016-9898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9899">CVE-2016-9899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9900">CVE-2016-9900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9901">CVE-2016-9901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9902">CVE-2016-9902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9904">CVE-2016-9904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9905">CVE-2016-9905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5373">CVE-2017-5373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5375">CVE-2017-5375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5376">CVE-2017-5376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5378">CVE-2017-5378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5380">CVE-2017-5380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5383">CVE-2017-5383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5386">CVE-2017-5386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5390">CVE-2017-5390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5396">CVE-2017-5396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5398">CVE-2017-5398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5400">CVE-2017-5400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5401">CVE-2017-5401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5402">CVE-2017-5402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5404">CVE-2017-5404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5405">CVE-2017-5405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5407">CVE-2017-5407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5408">CVE-2017-5408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5409/">CVE-2017-5409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5409">CVE-2017-5409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5410">CVE-2017-5410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5429">CVE-2017-5429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5430">CVE-2017-5430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5432">CVE-2017-5432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5433">CVE-2017-5433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5434">CVE-2017-5434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5435">CVE-2017-5435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5436">CVE-2017-5436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5437">CVE-2017-5437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5438">CVE-2017-5438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5439">CVE-2017-5439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5440">CVE-2017-5440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5441">CVE-2017-5441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5442">CVE-2017-5442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5443">CVE-2017-5443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5444">CVE-2017-5444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5445">CVE-2017-5445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5446">CVE-2017-5446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5447">CVE-2017-5447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5448">CVE-2017-5448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5449">CVE-2017-5449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5451">CVE-2017-5451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5454">CVE-2017-5454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5455/">CVE-2017-5455 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5455">CVE-2017-5455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5456/">CVE-2017-5456 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5456">CVE-2017-5456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5459">CVE-2017-5459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5460">CVE-2017-5460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5461">CVE-2017-5461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5462">CVE-2017-5462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5464">CVE-2017-5464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5465">CVE-2017-5465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5466">CVE-2017-5466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5467">CVE-2017-5467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5469">CVE-2017-5469 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5470/">CVE-2017-5470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5470">CVE-2017-5470 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5472/">CVE-2017-5472 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5472">CVE-2017-5472 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7749/">CVE-2017-7749 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7749">CVE-2017-7749 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7750/">CVE-2017-7750 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7750">CVE-2017-7750 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7751/">CVE-2017-7751 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7751">CVE-2017-7751 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7752/">CVE-2017-7752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7752">CVE-2017-7752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7754/">CVE-2017-7754 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7754">CVE-2017-7754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7755/">CVE-2017-7755 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7755">CVE-2017-7755 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7756/">CVE-2017-7756 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7756">CVE-2017-7756 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7757/">CVE-2017-7757 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7757">CVE-2017-7757 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7758/">CVE-2017-7758 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7758">CVE-2017-7758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7761/">CVE-2017-7761 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7761">CVE-2017-7761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7763/">CVE-2017-7763 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7763">CVE-2017-7763 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7764/">CVE-2017-7764 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7764">CVE-2017-7764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7765/">CVE-2017-7765 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7765">CVE-2017-7765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7768/">CVE-2017-7768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7768">CVE-2017-7768 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7778">CVE-2017-7778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009157344" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157346" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147791" version="1" class="patch">
	<metadata>
		<title>aaa_base-13.2+git20140911.61c1681-36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0461" ref_url="https://www.suse.com/security/cve/CVE-2011-0461/" source="CVE"/>
		<description>
These are all security issues fixed in the aaa_base-13.2+git20140911.61c1681-36.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0461/">CVE-2011-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0461">CVE-2011-0461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158923" comment="aaa_base-13.2+git20140911.61c1681-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158924" comment="aaa_base-extras-13.2+git20140911.61c1681-36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147792" version="1" class="patch">
	<metadata>
		<title>accountsservice-0.6.42-14.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2737" ref_url="https://www.suse.com/security/cve/CVE-2012-2737/" source="CVE"/>
		<description>
These are all security issues fixed in the accountsservice-0.6.42-14.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2737/">CVE-2012-2737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2737">CVE-2012-2737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140439" comment="accountsservice-0.6.42-14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140440" comment="accountsservice-lang-0.6.42-14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140441" comment="libaccountsservice0-0.6.42-14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140442" comment="typelib-1_0-AccountsService-1_0-0.6.42-14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147793" version="1" class="patch">
	<metadata>
		<title>alsa-1.0.27.2-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0035" ref_url="https://www.suse.com/security/cve/CVE-2009-0035/" source="CVE"/>
		<description>
These are all security issues fixed in the alsa-1.0.27.2-15.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0035/">CVE-2009-0035 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2009-0035">CVE-2009-0035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158925" comment="alsa-1.0.27.2-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158926" comment="alsa-docs-1.0.27.2-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158927" comment="libasound2-1.0.27.2-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158928" comment="libasound2-32bit-1.0.27.2-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147794" version="1" class="patch">
	<metadata>
		<title>ant-1.9.4-1.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1571" ref_url="https://www.suse.com/security/cve/CVE-2013-1571/" source="CVE"/>
		<description>
These are all security issues fixed in the ant-1.9.4-1.31 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1571/">CVE-2013-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1571">CVE-2013-1571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140447" comment="ant-1.9.4-1.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147795" version="1" class="patch">
	<metadata>
		<title>apache-commons-beanutils-1.9.2-1.149 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3540" ref_url="https://www.suse.com/security/cve/CVE-2014-3540/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-beanutils-1.9.2-1.149 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3540/">CVE-2014-3540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3540">CVE-2014-3540 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140448" comment="apache-commons-beanutils-1.9.2-1.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140449" comment="apache-commons-beanutils-javadoc-1.9.2-1.27 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147796" version="1" class="patch">
	<metadata>
		<title>apache-commons-daemon-1.0.15-6.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2729" ref_url="https://www.suse.com/security/cve/CVE-2011-2729/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-daemon-1.0.15-6.10 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2729/">CVE-2011-2729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2729">CVE-2011-2729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158929" comment="apache-commons-daemon-1.0.15-6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158930" comment="apache-commons-daemon-javadoc-1.0.15-6.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147797" version="1" class="patch">
	<metadata>
		<title>apache-commons-httpclient-3.1-4.364 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-5783" ref_url="https://www.suse.com/security/cve/CVE-2012-5783/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-httpclient-3.1-4.364 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2012-5783/">CVE-2012-5783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5783">CVE-2012-5783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140452" comment="apache-commons-httpclient-3.1-4.498 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147798" version="1" class="patch">
	<metadata>
		<title>apache2-2.4.23-28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0023" ref_url="https://www.suse.com/security/cve/CVE-2009-0023/" source="CVE"/>
		<reference ref_id="CVE-2009-1191" ref_url="https://www.suse.com/security/cve/CVE-2009-1191/" source="CVE"/>
		<reference ref_id="CVE-2009-1195" ref_url="https://www.suse.com/security/cve/CVE-2009-1195/" source="CVE"/>
		<reference ref_id="CVE-2009-1890" ref_url="https://www.suse.com/security/cve/CVE-2009-1890/" source="CVE"/>
		<reference ref_id="CVE-2009-1891" ref_url="https://www.suse.com/security/cve/CVE-2009-1891/" source="CVE"/>
		<reference ref_id="CVE-2009-1955" ref_url="https://www.suse.com/security/cve/CVE-2009-1955/" source="CVE"/>
		<reference ref_id="CVE-2009-1956" ref_url="https://www.suse.com/security/cve/CVE-2009-1956/" source="CVE"/>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2009-2699" ref_url="https://www.suse.com/security/cve/CVE-2009-2699/" source="CVE"/>
		<reference ref_id="CVE-2009-3094" ref_url="https://www.suse.com/security/cve/CVE-2009-3094/" source="CVE"/>
		<reference ref_id="CVE-2009-3095" ref_url="https://www.suse.com/security/cve/CVE-2009-3095/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2010-0408" ref_url="https://www.suse.com/security/cve/CVE-2010-0408/" source="CVE"/>
		<reference ref_id="CVE-2010-0425" ref_url="https://www.suse.com/security/cve/CVE-2010-0425/" source="CVE"/>
		<reference ref_id="CVE-2010-0434" ref_url="https://www.suse.com/security/cve/CVE-2010-0434/" source="CVE"/>
		<reference ref_id="CVE-2010-1452" ref_url="https://www.suse.com/security/cve/CVE-2010-1452/" source="CVE"/>
		<reference ref_id="CVE-2010-1623" ref_url="https://www.suse.com/security/cve/CVE-2010-1623/" source="CVE"/>
		<reference ref_id="CVE-2010-2068" ref_url="https://www.suse.com/security/cve/CVE-2010-2068/" source="CVE"/>
		<reference ref_id="CVE-2011-1176" ref_url="https://www.suse.com/security/cve/CVE-2011-1176/" source="CVE"/>
		<reference ref_id="CVE-2011-3192" ref_url="https://www.suse.com/security/cve/CVE-2011-3192/" source="CVE"/>
		<reference ref_id="CVE-2011-3368" ref_url="https://www.suse.com/security/cve/CVE-2011-3368/" source="CVE"/>
		<reference ref_id="CVE-2011-3607" ref_url="https://www.suse.com/security/cve/CVE-2011-3607/" source="CVE"/>
		<reference ref_id="CVE-2011-4317" ref_url="https://www.suse.com/security/cve/CVE-2011-4317/" source="CVE"/>
		<reference ref_id="CVE-2012-0021" ref_url="https://www.suse.com/security/cve/CVE-2012-0021/" source="CVE"/>
		<reference ref_id="CVE-2012-0031" ref_url="https://www.suse.com/security/cve/CVE-2012-0031/" source="CVE"/>
		<reference ref_id="CVE-2012-0053" ref_url="https://www.suse.com/security/cve/CVE-2012-0053/" source="CVE"/>
		<reference ref_id="CVE-2012-2687" ref_url="https://www.suse.com/security/cve/CVE-2012-2687/" source="CVE"/>
		<reference ref_id="CVE-2012-3499" ref_url="https://www.suse.com/security/cve/CVE-2012-3499/" source="CVE"/>
		<reference ref_id="CVE-2012-3502" ref_url="https://www.suse.com/security/cve/CVE-2012-3502/" source="CVE"/>
		<reference ref_id="CVE-2013-1896" ref_url="https://www.suse.com/security/cve/CVE-2013-1896/" source="CVE"/>
		<reference ref_id="CVE-2013-2249" ref_url="https://www.suse.com/security/cve/CVE-2013-2249/" source="CVE"/>
		<reference ref_id="CVE-2013-5704" ref_url="https://www.suse.com/security/cve/CVE-2013-5704/" source="CVE"/>
		<reference ref_id="CVE-2013-6438" ref_url="https://www.suse.com/security/cve/CVE-2013-6438/" source="CVE"/>
		<reference ref_id="CVE-2014-0098" ref_url="https://www.suse.com/security/cve/CVE-2014-0098/" source="CVE"/>
		<reference ref_id="CVE-2014-0117" ref_url="https://www.suse.com/security/cve/CVE-2014-0117/" source="CVE"/>
		<reference ref_id="CVE-2014-0118" ref_url="https://www.suse.com/security/cve/CVE-2014-0118/" source="CVE"/>
		<reference ref_id="CVE-2014-0226" ref_url="https://www.suse.com/security/cve/CVE-2014-0226/" source="CVE"/>
		<reference ref_id="CVE-2014-0231" ref_url="https://www.suse.com/security/cve/CVE-2014-0231/" source="CVE"/>
		<reference ref_id="CVE-2014-3523" ref_url="https://www.suse.com/security/cve/CVE-2014-3523/" source="CVE"/>
		<reference ref_id="CVE-2014-3581" ref_url="https://www.suse.com/security/cve/CVE-2014-3581/" source="CVE"/>
		<reference ref_id="CVE-2014-3583" ref_url="https://www.suse.com/security/cve/CVE-2014-3583/" source="CVE"/>
		<reference ref_id="CVE-2014-8109" ref_url="https://www.suse.com/security/cve/CVE-2014-8109/" source="CVE"/>
		<reference ref_id="CVE-2015-0228" ref_url="https://www.suse.com/security/cve/CVE-2015-0228/" source="CVE"/>
		<reference ref_id="CVE-2015-0253" ref_url="https://www.suse.com/security/cve/CVE-2015-0253/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2016-0736" ref_url="https://www.suse.com/security/cve/CVE-2016-0736/" source="CVE"/>
		<reference ref_id="CVE-2016-1546" ref_url="https://www.suse.com/security/cve/CVE-2016-1546/" source="CVE"/>
		<reference ref_id="CVE-2016-2161" ref_url="https://www.suse.com/security/cve/CVE-2016-2161/" source="CVE"/>
		<reference ref_id="CVE-2016-4979" ref_url="https://www.suse.com/security/cve/CVE-2016-4979/" source="CVE"/>
		<reference ref_id="CVE-2016-5387" ref_url="https://www.suse.com/security/cve/CVE-2016-5387/" source="CVE"/>
		<reference ref_id="CVE-2016-8740" ref_url="https://www.suse.com/security/cve/CVE-2016-8740/" source="CVE"/>
		<reference ref_id="CVE-2016-8743" ref_url="https://www.suse.com/security/cve/CVE-2016-8743/" source="CVE"/>
		<reference ref_id="CVE-2017-3167" ref_url="https://www.suse.com/security/cve/CVE-2017-3167/" source="CVE"/>
		<reference ref_id="CVE-2017-3169" ref_url="https://www.suse.com/security/cve/CVE-2017-3169/" source="CVE"/>
		<reference ref_id="CVE-2017-7679" ref_url="https://www.suse.com/security/cve/CVE-2017-7679/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.4.23-28.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0023/">CVE-2009-0023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0023">CVE-2009-0023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1191/">CVE-2009-1191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1191">CVE-2009-1191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1195/">CVE-2009-1195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1195">CVE-2009-1195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1890/">CVE-2009-1890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1890">CVE-2009-1890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1891/">CVE-2009-1891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1891">CVE-2009-1891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1955/">CVE-2009-1955 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-1955">CVE-2009-1955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1956/">CVE-2009-1956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1956">CVE-2009-1956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2412">CVE-2009-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2699/">CVE-2009-2699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-2699">CVE-2009-2699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3094/">CVE-2009-3094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3094">CVE-2009-3094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3095/">CVE-2009-3095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3095">CVE-2009-3095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3555">CVE-2009-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3720">CVE-2009-3720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0408/">CVE-2010-0408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0408">CVE-2010-0408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0425/">CVE-2010-0425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0425">CVE-2010-0425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0434/">CVE-2010-0434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0434">CVE-2010-0434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1452/">CVE-2010-1452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1452">CVE-2010-1452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1623/">CVE-2010-1623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1623">CVE-2010-1623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2068/">CVE-2010-2068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2068">CVE-2010-2068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1176/">CVE-2011-1176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1176">CVE-2011-1176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3192/">CVE-2011-3192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3192">CVE-2011-3192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3368/">CVE-2011-3368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3368">CVE-2011-3368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3607/">CVE-2011-3607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3607">CVE-2011-3607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4317/">CVE-2011-4317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4317">CVE-2011-4317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0021/">CVE-2012-0021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0021">CVE-2012-0021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0031/">CVE-2012-0031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0031">CVE-2012-0031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0053/">CVE-2012-0053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0053">CVE-2012-0053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2687/">CVE-2012-2687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2687">CVE-2012-2687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3499/">CVE-2012-3499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3499">CVE-2012-3499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3502/">CVE-2012-3502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3502">CVE-2012-3502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1896/">CVE-2013-1896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1896">CVE-2013-1896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2249/">CVE-2013-2249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2249">CVE-2013-2249 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5704/">CVE-2013-5704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5704">CVE-2013-5704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6438/">CVE-2013-6438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6438">CVE-2013-6438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0098/">CVE-2014-0098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0098">CVE-2014-0098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0117/">CVE-2014-0117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0117">CVE-2014-0117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0118/">CVE-2014-0118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0118">CVE-2014-0118 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0226/">CVE-2014-0226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0226">CVE-2014-0226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0231/">CVE-2014-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0231">CVE-2014-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3523/">CVE-2014-3523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3523">CVE-2014-3523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3581/">CVE-2014-3581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3581">CVE-2014-3581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3583/">CVE-2014-3583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3583">CVE-2014-3583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8109/">CVE-2014-8109 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8109">CVE-2014-8109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0228/">CVE-2015-0228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0228">CVE-2015-0228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0253/">CVE-2015-0253 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0253">CVE-2015-0253 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0736/">CVE-2016-0736 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0736">CVE-2016-0736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1546/">CVE-2016-1546 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1546">CVE-2016-1546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2161/">CVE-2016-2161 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2161">CVE-2016-2161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4979/">CVE-2016-4979 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4979">CVE-2016-4979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5387/">CVE-2016-5387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5387">CVE-2016-5387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8740/">CVE-2016-8740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8740">CVE-2016-8740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8743/">CVE-2016-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8743">CVE-2016-8743 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3167/">CVE-2017-3167 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3167">CVE-2017-3167 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3169/">CVE-2017-3169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3169">CVE-2017-3169 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7679/">CVE-2017-7679 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7679">CVE-2017-7679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009157598" comment="apache2-2.4.23-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157599" comment="apache2-doc-2.4.23-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157600" comment="apache2-example-pages-2.4.23-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157601" comment="apache2-prefork-2.4.23-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157602" comment="apache2-utils-2.4.23-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157603" comment="apache2-worker-2.4.23-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147799" version="1" class="patch">
	<metadata>
		<title>apache2-mod_apparmor-2.8.2-49.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2017-6507" ref_url="https://www.suse.com/security/cve/CVE-2017-6507/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_apparmor-2.8.2-49.21 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6507/">CVE-2017-6507 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6507">CVE-2017-6507 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158931" comment="apache2-mod_apparmor-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158932" comment="apparmor-docs-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158933" comment="apparmor-parser-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158934" comment="apparmor-profiles-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158935" comment="apparmor-utils-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158936" comment="libapparmor1-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158937" comment="libapparmor1-32bit-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158938" comment="pam_apparmor-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158939" comment="pam_apparmor-32bit-2.8.2-49.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158940" comment="perl-apparmor-2.8.2-49.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147800" version="1" class="patch">
	<metadata>
		<title>apache2-mod_jk-1.2.40-5.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-5519" ref_url="https://www.suse.com/security/cve/CVE-2008-5519/" source="CVE"/>
		<reference ref_id="CVE-2014-8111" ref_url="https://www.suse.com/security/cve/CVE-2014-8111/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_jk-1.2.40-5.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5519/">CVE-2008-5519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5519">CVE-2008-5519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8111/">CVE-2014-8111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8111">CVE-2014-8111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140459" comment="apache2-mod_jk-1.2.40-5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147801" version="1" class="patch">
	<metadata>
		<title>apache2-mod_nss-1.0.14-18.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-4566" ref_url="https://www.suse.com/security/cve/CVE-2013-4566/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2015-5244" ref_url="https://www.suse.com/security/cve/CVE-2015-5244/" source="CVE"/>
		<reference ref_id="CVE-2016-3099" ref_url="https://www.suse.com/security/cve/CVE-2016-3099/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_nss-1.0.14-18.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4566/">CVE-2013-4566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4566">CVE-2013-4566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5244/">CVE-2015-5244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5244">CVE-2015-5244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3099/">CVE-2016-3099 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3099">CVE-2016-3099 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131934" comment="apache2-mod_nss-1.0.14-18.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147802" version="1" class="patch">
	<metadata>
		<title>apache2-mod_perl-2.0.8-11.43 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1667" ref_url="https://www.suse.com/security/cve/CVE-2013-1667/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_perl-2.0.8-11.43 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1667/">CVE-2013-1667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1667">CVE-2013-1667 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140460" comment="apache2-mod_perl-2.0.8-11.43 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147803" version="1" class="patch">
	<metadata>
		<title>at-3.1.14-7.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<description>
These are all security issues fixed in the at-3.1.14-7.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6354">CVE-2016-6354 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131107" comment="at-3.1.14-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131796" comment="flex-2.5.37-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131938" comment="flex-32bit-2.5.37-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131109" comment="libQtWebKit4-4.8.6+2.3.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131110" comment="libQtWebKit4-32bit-4.8.6+2.3.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131111" comment="libbonobo-2.32.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131112" comment="libbonobo-32bit-2.32.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131939" comment="libbonobo-doc-2.32.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131113" comment="libbonobo-lang-2.32.1-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147804" version="1" class="patch">
	<metadata>
		<title>audiofile-0.3.6-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-7747" ref_url="https://www.suse.com/security/cve/CVE-2015-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-6827" ref_url="https://www.suse.com/security/cve/CVE-2017-6827/" source="CVE"/>
		<reference ref_id="CVE-2017-6828" ref_url="https://www.suse.com/security/cve/CVE-2017-6828/" source="CVE"/>
		<reference ref_id="CVE-2017-6829" ref_url="https://www.suse.com/security/cve/CVE-2017-6829/" source="CVE"/>
		<reference ref_id="CVE-2017-6830" ref_url="https://www.suse.com/security/cve/CVE-2017-6830/" source="CVE"/>
		<reference ref_id="CVE-2017-6831" ref_url="https://www.suse.com/security/cve/CVE-2017-6831/" source="CVE"/>
		<reference ref_id="CVE-2017-6832" ref_url="https://www.suse.com/security/cve/CVE-2017-6832/" source="CVE"/>
		<reference ref_id="CVE-2017-6833" ref_url="https://www.suse.com/security/cve/CVE-2017-6833/" source="CVE"/>
		<reference ref_id="CVE-2017-6834" ref_url="https://www.suse.com/security/cve/CVE-2017-6834/" source="CVE"/>
		<reference ref_id="CVE-2017-6835" ref_url="https://www.suse.com/security/cve/CVE-2017-6835/" source="CVE"/>
		<reference ref_id="CVE-2017-6836" ref_url="https://www.suse.com/security/cve/CVE-2017-6836/" source="CVE"/>
		<reference ref_id="CVE-2017-6837" ref_url="https://www.suse.com/security/cve/CVE-2017-6837/" source="CVE"/>
		<reference ref_id="CVE-2017-6838" ref_url="https://www.suse.com/security/cve/CVE-2017-6838/" source="CVE"/>
		<reference ref_id="CVE-2017-6839" ref_url="https://www.suse.com/security/cve/CVE-2017-6839/" source="CVE"/>
		<description>
These are all security issues fixed in the audiofile-0.3.6-10.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7747/">CVE-2015-7747 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7747">CVE-2015-7747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6827/">CVE-2017-6827 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6827">CVE-2017-6827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6828/">CVE-2017-6828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6828">CVE-2017-6828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6829/">CVE-2017-6829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6829">CVE-2017-6829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6830/">CVE-2017-6830 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6830">CVE-2017-6830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6831/">CVE-2017-6831 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6831">CVE-2017-6831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6832/">CVE-2017-6832 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6832">CVE-2017-6832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6833/">CVE-2017-6833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6833">CVE-2017-6833 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6834/">CVE-2017-6834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6834">CVE-2017-6834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6835/">CVE-2017-6835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6835">CVE-2017-6835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6836/">CVE-2017-6836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6836">CVE-2017-6836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6837/">CVE-2017-6837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6837">CVE-2017-6837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6838/">CVE-2017-6838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6838">CVE-2017-6838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6839/">CVE-2017-6839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6839">CVE-2017-6839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009150578" comment="audiofile-0.3.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150579" comment="libaudiofile1-0.3.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150580" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147805" version="1" class="patch">
	<metadata>
		<title>augeas-1.2.0-15.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786/" source="CVE"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<description>
These are all security issues fixed in the augeas-1.2.0-15.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0786">CVE-2012-0786 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8119">CVE-2014-8119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158941" comment="augeas-1.2.0-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158942" comment="augeas-lenses-1.2.0-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158943" comment="libaugeas0-1.2.0-15.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147806" version="1" class="patch">
	<metadata>
		<title>autofs-5.0.9-27.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-8169" ref_url="https://www.suse.com/security/cve/CVE-2014-8169/" source="CVE"/>
		<description>
These are all security issues fixed in the autofs-5.0.9-27.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8169/">CVE-2014-8169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8169">CVE-2014-8169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158944" comment="autofs-5.0.9-27.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147807" version="1" class="patch">
	<metadata>
		<title>automake-1.13.4-6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-4029" ref_url="https://www.suse.com/security/cve/CVE-2009-4029/" source="CVE"/>
		<description>
These are all security issues fixed in the automake-1.13.4-6.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4029/">CVE-2009-4029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4029">CVE-2009-4029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140465" comment="automake-1.13.4-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140466" comment="m4-1.4.16-15.74 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147808" version="1" class="patch">
	<metadata>
		<title>avahi-0.6.32-30.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0758" ref_url="https://www.suse.com/security/cve/CVE-2009-0758/" source="CVE"/>
		<reference ref_id="CVE-2010-2244" ref_url="https://www.suse.com/security/cve/CVE-2010-2244/" source="CVE"/>
		<reference ref_id="CVE-2011-1002" ref_url="https://www.suse.com/security/cve/CVE-2011-1002/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.6.32-30.36 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0758/">CVE-2009-0758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0758">CVE-2009-0758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2244/">CVE-2010-2244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2244">CVE-2010-2244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1002/">CVE-2011-1002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1002">CVE-2011-1002 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140467" comment="avahi-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140468" comment="avahi-lang-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140469" comment="avahi-utils-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140470" comment="libavahi-client3-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140471" comment="libavahi-client3-32bit-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140472" comment="libavahi-common3-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140473" comment="libavahi-common3-32bit-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140474" comment="libavahi-core7-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140475" comment="libdns_sd-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140476" comment="libdns_sd-32bit-0.6.32-30.36 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147809" version="1" class="patch">
	<metadata>
		<title>bash-4.3-82.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-2524" ref_url="https://www.suse.com/security/cve/CVE-2014-2524/" source="CVE"/>
		<reference ref_id="CVE-2014-6271" ref_url="https://www.suse.com/security/cve/CVE-2014-6271/" source="CVE"/>
		<reference ref_id="CVE-2014-6277" ref_url="https://www.suse.com/security/cve/CVE-2014-6277/" source="CVE"/>
		<reference ref_id="CVE-2014-6278" ref_url="https://www.suse.com/security/cve/CVE-2014-6278/" source="CVE"/>
		<reference ref_id="CVE-2014-7169" ref_url="https://www.suse.com/security/cve/CVE-2014-7169/" source="CVE"/>
		<reference ref_id="CVE-2014-7186" ref_url="https://www.suse.com/security/cve/CVE-2014-7186/" source="CVE"/>
		<reference ref_id="CVE-2014-7187" ref_url="https://www.suse.com/security/cve/CVE-2014-7187/" source="CVE"/>
		<description>
These are all security issues fixed in the bash-4.3-82.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2524/">CVE-2014-2524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2524">CVE-2014-2524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6271/">CVE-2014-6271 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-6271">CVE-2014-6271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6277/">CVE-2014-6277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6277">CVE-2014-6277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6278/">CVE-2014-6278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6278">CVE-2014-6278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7169/">CVE-2014-7169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7169">CVE-2014-7169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7186/">CVE-2014-7186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7186">CVE-2014-7186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7187/">CVE-2014-7187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7187">CVE-2014-7187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155546" comment="bash-4.3-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155547" comment="bash-doc-4.3-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155549" comment="libreadline6-6.3-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155550" comment="libreadline6-32bit-6.3-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155551" comment="readline-doc-6.3-82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147810" version="1" class="patch">
	<metadata>
		<title>bind-9.9.9P1-62.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0696" ref_url="https://www.suse.com/security/cve/CVE-2009-0696/" source="CVE"/>
		<reference ref_id="CVE-2009-4022" ref_url="https://www.suse.com/security/cve/CVE-2009-4022/" source="CVE"/>
		<reference ref_id="CVE-2010-3613" ref_url="https://www.suse.com/security/cve/CVE-2010-3613/" source="CVE"/>
		<reference ref_id="CVE-2010-3614" ref_url="https://www.suse.com/security/cve/CVE-2010-3614/" source="CVE"/>
		<reference ref_id="CVE-2010-3615" ref_url="https://www.suse.com/security/cve/CVE-2010-3615/" source="CVE"/>
		<reference ref_id="CVE-2011-0414" ref_url="https://www.suse.com/security/cve/CVE-2011-0414/" source="CVE"/>
		<reference ref_id="CVE-2011-1907" ref_url="https://www.suse.com/security/cve/CVE-2011-1907/" source="CVE"/>
		<reference ref_id="CVE-2011-1910" ref_url="https://www.suse.com/security/cve/CVE-2011-1910/" source="CVE"/>
		<reference ref_id="CVE-2011-2464" ref_url="https://www.suse.com/security/cve/CVE-2011-2464/" source="CVE"/>
		<reference ref_id="CVE-2011-4313" ref_url="https://www.suse.com/security/cve/CVE-2011-4313/" source="CVE"/>
		<reference ref_id="CVE-2012-1667" ref_url="https://www.suse.com/security/cve/CVE-2012-1667/" source="CVE"/>
		<reference ref_id="CVE-2012-3817" ref_url="https://www.suse.com/security/cve/CVE-2012-3817/" source="CVE"/>
		<reference ref_id="CVE-2012-3868" ref_url="https://www.suse.com/security/cve/CVE-2012-3868/" source="CVE"/>
		<reference ref_id="CVE-2012-4244" ref_url="https://www.suse.com/security/cve/CVE-2012-4244/" source="CVE"/>
		<reference ref_id="CVE-2012-5166" ref_url="https://www.suse.com/security/cve/CVE-2012-5166/" source="CVE"/>
		<reference ref_id="CVE-2012-5688" ref_url="https://www.suse.com/security/cve/CVE-2012-5688/" source="CVE"/>
		<reference ref_id="CVE-2012-5689" ref_url="https://www.suse.com/security/cve/CVE-2012-5689/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<reference ref_id="CVE-2013-4854" ref_url="https://www.suse.com/security/cve/CVE-2013-4854/" source="CVE"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<reference ref_id="CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500/" source="CVE"/>
		<reference ref_id="CVE-2015-1349" ref_url="https://www.suse.com/security/cve/CVE-2015-1349/" source="CVE"/>
		<reference ref_id="CVE-2015-4620" ref_url="https://www.suse.com/security/cve/CVE-2015-4620/" source="CVE"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<reference ref_id="CVE-2016-2775" ref_url="https://www.suse.com/security/cve/CVE-2016-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776/" source="CVE"/>
		<reference ref_id="CVE-2016-6170" ref_url="https://www.suse.com/security/cve/CVE-2016-6170/" source="CVE"/>
		<reference ref_id="CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864/" source="CVE"/>
		<reference ref_id="CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131/" source="CVE"/>
		<reference ref_id="CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147/" source="CVE"/>
		<reference ref_id="CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444/" source="CVE"/>
		<reference ref_id="CVE-2017-3135" ref_url="https://www.suse.com/security/cve/CVE-2017-3135/" source="CVE"/>
		<reference ref_id="CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136/" source="CVE"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<reference ref_id="CVE-2017-3138" ref_url="https://www.suse.com/security/cve/CVE-2017-3138/" source="CVE"/>
		<reference ref_id="CVE-2017-3142" ref_url="https://www.suse.com/security/cve/CVE-2017-3142/" source="CVE"/>
		<reference ref_id="CVE-2017-3143" ref_url="https://www.suse.com/security/cve/CVE-2017-3143/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.9.9P1-62.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0696/">CVE-2009-0696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0696">CVE-2009-0696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4022/">CVE-2009-4022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4022">CVE-2009-4022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3613/">CVE-2010-3613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3613">CVE-2010-3613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3614/">CVE-2010-3614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3614">CVE-2010-3614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3615/">CVE-2010-3615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3615">CVE-2010-3615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0414/">CVE-2011-0414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0414">CVE-2011-0414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1907/">CVE-2011-1907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1907">CVE-2011-1907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1910/">CVE-2011-1910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1910">CVE-2011-1910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2464/">CVE-2011-2464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2464">CVE-2011-2464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4313/">CVE-2011-4313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4313">CVE-2011-4313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1667/">CVE-2012-1667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1667">CVE-2012-1667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3817/">CVE-2012-3817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3817">CVE-2012-3817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3868/">CVE-2012-3868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3868">CVE-2012-3868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4244/">CVE-2012-4244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4244">CVE-2012-4244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5166/">CVE-2012-5166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5166">CVE-2012-5166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5688/">CVE-2012-5688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5688">CVE-2012-5688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5689/">CVE-2012-5689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5689">CVE-2012-5689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2266">CVE-2013-2266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4854/">CVE-2013-4854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4854">CVE-2013-4854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0591">CVE-2014-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8500">CVE-2014-8500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1349/">CVE-2015-1349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1349">CVE-2015-1349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4620/">CVE-2015-4620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4620">CVE-2015-4620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5477">CVE-2015-5477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5722">CVE-2015-5722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8000">CVE-2015-8000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8704">CVE-2015-8704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1285">CVE-2016-1285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1286">CVE-2016-1286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2775/">CVE-2016-2775 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2775">CVE-2016-2775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2776">CVE-2016-2776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6170/">CVE-2016-6170 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6170">CVE-2016-6170 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8864">CVE-2016-8864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9131">CVE-2016-9131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9147">CVE-2016-9147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9444">CVE-2016-9444 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3135/">CVE-2017-3135 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3135">CVE-2017-3135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3136">CVE-2017-3136 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3137">CVE-2017-3137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3138/">CVE-2017-3138 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3138">CVE-2017-3138 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3142/">CVE-2017-3142 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3142">CVE-2017-3142 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3143/">CVE-2017-3143 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3143">CVE-2017-3143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009157661" comment="bind-9.9.9P1-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157721" comment="bind-chrootenv-9.9.9P1-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157722" comment="bind-doc-9.9.9P1-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157662" comment="bind-libs-9.9.9P1-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157663" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157664" comment="bind-utils-9.9.9P1-62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147811" version="1" class="patch">
	<metadata>
		<title>binutils-2.26.1-9.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-8484" ref_url="https://www.suse.com/security/cve/CVE-2014-8484/" source="CVE"/>
		<reference ref_id="CVE-2014-8485" ref_url="https://www.suse.com/security/cve/CVE-2014-8485/" source="CVE"/>
		<reference ref_id="CVE-2014-8501" ref_url="https://www.suse.com/security/cve/CVE-2014-8501/" source="CVE"/>
		<reference ref_id="CVE-2014-8502" ref_url="https://www.suse.com/security/cve/CVE-2014-8502/" source="CVE"/>
		<reference ref_id="CVE-2014-8503" ref_url="https://www.suse.com/security/cve/CVE-2014-8503/" source="CVE"/>
		<reference ref_id="CVE-2014-8504" ref_url="https://www.suse.com/security/cve/CVE-2014-8504/" source="CVE"/>
		<reference ref_id="CVE-2014-8737" ref_url="https://www.suse.com/security/cve/CVE-2014-8737/" source="CVE"/>
		<reference ref_id="CVE-2014-8738" ref_url="https://www.suse.com/security/cve/CVE-2014-8738/" source="CVE"/>
		<description>
These are all security issues fixed in the binutils-2.26.1-9.12.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8484/">CVE-2014-8484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8484">CVE-2014-8484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8485/">CVE-2014-8485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8485">CVE-2014-8485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8501/">CVE-2014-8501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8501">CVE-2014-8501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8502/">CVE-2014-8502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8502">CVE-2014-8502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8503/">CVE-2014-8503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8503">CVE-2014-8503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8504/">CVE-2014-8504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8504">CVE-2014-8504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8737/">CVE-2014-8737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8737">CVE-2014-8737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8738/">CVE-2014-8738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8738">CVE-2014-8738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140482" comment="binutils-2.26.1-9.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147812" version="1" class="patch">
	<metadata>
		<title>busybox-1.21.1-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-9645" ref_url="https://www.suse.com/security/cve/CVE-2014-9645/" source="CVE"/>
		<description>
These are all security issues fixed in the busybox-1.21.1-3.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9645/">CVE-2014-9645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9645">CVE-2014-9645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113975" comment="busybox-1.21.1-3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147813" version="1" class="patch">
	<metadata>
		<title>bzip2-1.0.6-29.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<description>
These are all security issues fixed in the bzip2-1.0.6-29.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0405">CVE-2010-0405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140483" comment="bzip2-1.0.6-29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140484" comment="bzip2-doc-1.0.6-29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140485" comment="libbz2-1-1.0.6-29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140486" comment="libbz2-1-32bit-1.0.6-29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147814" version="1" class="patch">
	<metadata>
		<title>chrony-2.3-3.110 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-4502" ref_url="https://www.suse.com/security/cve/CVE-2012-4502/" source="CVE"/>
		<reference ref_id="CVE-2012-4503" ref_url="https://www.suse.com/security/cve/CVE-2012-4503/" source="CVE"/>
		<reference ref_id="CVE-2014-0021" ref_url="https://www.suse.com/security/cve/CVE-2014-0021/" source="CVE"/>
		<reference ref_id="CVE-2016-1567" ref_url="https://www.suse.com/security/cve/CVE-2016-1567/" source="CVE"/>
		<description>
These are all security issues fixed in the chrony-2.3-3.110 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4502/">CVE-2012-4502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4502">CVE-2012-4502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4503/">CVE-2012-4503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4503">CVE-2012-4503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0021/">CVE-2014-0021 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0021">CVE-2014-0021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1567/">CVE-2016-1567 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1567">CVE-2016-1567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140487" comment="chrony-2.3-3.110 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147815" version="1" class="patch">
	<metadata>
		<title>cifs-utils-6.5-8.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2012-1586" ref_url="https://www.suse.com/security/cve/CVE-2012-1586/" source="CVE"/>
		<description>
These are all security issues fixed in the cifs-utils-6.5-8.9 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1886">CVE-2009-1886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1888">CVE-2009-1888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2813">CVE-2009-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2906">CVE-2009-2906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2948">CVE-2009-2948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0547">CVE-2010-0547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0728">CVE-2010-0728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0787">CVE-2010-0787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1586/">CVE-2012-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1586">CVE-2012-1586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147816" version="1" class="patch">
	<metadata>
		<title>clamav-0.99.2-32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<reference ref_id="CVE-2011-2721" ref_url="https://www.suse.com/security/cve/CVE-2011-2721/" source="CVE"/>
		<reference ref_id="CVE-2011-3627" ref_url="https://www.suse.com/security/cve/CVE-2011-3627/" source="CVE"/>
		<reference ref_id="CVE-2012-1457" ref_url="https://www.suse.com/security/cve/CVE-2012-1457/" source="CVE"/>
		<reference ref_id="CVE-2012-1458" ref_url="https://www.suse.com/security/cve/CVE-2012-1458/" source="CVE"/>
		<reference ref_id="CVE-2012-1459" ref_url="https://www.suse.com/security/cve/CVE-2012-1459/" source="CVE"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2013-6497" ref_url="https://www.suse.com/security/cve/CVE-2013-6497/" source="CVE"/>
		<reference ref_id="CVE-2014-9050" ref_url="https://www.suse.com/security/cve/CVE-2014-9050/" source="CVE"/>
		<reference ref_id="CVE-2014-9328" ref_url="https://www.suse.com/security/cve/CVE-2014-9328/" source="CVE"/>
		<reference ref_id="CVE-2015-1461" ref_url="https://www.suse.com/security/cve/CVE-2015-1461/" source="CVE"/>
		<reference ref_id="CVE-2015-1462" ref_url="https://www.suse.com/security/cve/CVE-2015-1462/" source="CVE"/>
		<reference ref_id="CVE-2015-1463" ref_url="https://www.suse.com/security/cve/CVE-2015-1463/" source="CVE"/>
		<reference ref_id="CVE-2015-2170" ref_url="https://www.suse.com/security/cve/CVE-2015-2170/" source="CVE"/>
		<reference ref_id="CVE-2015-2221" ref_url="https://www.suse.com/security/cve/CVE-2015-2221/" source="CVE"/>
		<reference ref_id="CVE-2015-2222" ref_url="https://www.suse.com/security/cve/CVE-2015-2222/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2668" ref_url="https://www.suse.com/security/cve/CVE-2015-2668/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.99.2-32.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0405">CVE-2010-0405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2721/">CVE-2011-2721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2721">CVE-2011-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3627/">CVE-2011-3627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3627">CVE-2011-3627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1457/">CVE-2012-1457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1457">CVE-2012-1457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1458/">CVE-2012-1458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1458">CVE-2012-1458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1459/">CVE-2012-1459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1459">CVE-2012-1459 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6706">CVE-2012-6706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6497/">CVE-2013-6497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6497">CVE-2013-6497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9050/">CVE-2014-9050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9050">CVE-2014-9050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9328/">CVE-2014-9328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9328">CVE-2014-9328 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1461/">CVE-2015-1461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1461">CVE-2015-1461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1462/">CVE-2015-1462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1462">CVE-2015-1462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1463/">CVE-2015-1463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1463">CVE-2015-1463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2170/">CVE-2015-2170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2170">CVE-2015-2170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2221/">CVE-2015-2221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2221">CVE-2015-2221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2222/">CVE-2015-2222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2222">CVE-2015-2222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2305">CVE-2015-2305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2668/">CVE-2015-2668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2668">CVE-2015-2668 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157660" comment="clamav-0.99.2-32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147817" version="1" class="patch">
	<metadata>
		<title>colord-gtk-lang-0.1.26-6.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-4349" ref_url="https://www.suse.com/security/cve/CVE-2011-4349/" source="CVE"/>
		<description>
These are all security issues fixed in the colord-gtk-lang-0.1.26-6.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4349/">CVE-2011-4349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4349">CVE-2011-4349 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140490" comment="colord-gtk-lang-0.1.26-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140491" comment="libcolord-gtk1-0.1.26-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158945" comment="libcolord2-1.3.3-12.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158946" comment="libcolord2-32bit-1.3.3-12.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158947" comment="libcolorhug2-1.3.3-12.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147818" version="1" class="patch">
	<metadata>
		<title>coolkey-1.1.0-147.67 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-4129" ref_url="https://www.suse.com/security/cve/CVE-2007-4129/" source="CVE"/>
		<description>
These are all security issues fixed in the coolkey-1.1.0-147.67 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4129/">CVE-2007-4129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4129">CVE-2007-4129 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140495" comment="coolkey-1.1.0-147.71 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147819" version="1" class="patch">
	<metadata>
		<title>coreutils-8.25-12.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-0221" ref_url="https://www.suse.com/security/cve/CVE-2013-0221/" source="CVE"/>
		<reference ref_id="CVE-2013-0222" ref_url="https://www.suse.com/security/cve/CVE-2013-0222/" source="CVE"/>
		<reference ref_id="CVE-2013-0223" ref_url="https://www.suse.com/security/cve/CVE-2013-0223/" source="CVE"/>
		<reference ref_id="CVE-2015-4041" ref_url="https://www.suse.com/security/cve/CVE-2015-4041/" source="CVE"/>
		<reference ref_id="CVE-2015-4042" ref_url="https://www.suse.com/security/cve/CVE-2015-4042/" source="CVE"/>
		<description>
These are all security issues fixed in the coreutils-8.25-12.8 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0221/">CVE-2013-0221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0221">CVE-2013-0221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0222/">CVE-2013-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0222">CVE-2013-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0223/">CVE-2013-0223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0223">CVE-2013-0223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4041/">CVE-2015-4041 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4041">CVE-2015-4041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4042/">CVE-2015-4042 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4042">CVE-2015-4042 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140496" comment="coreutils-8.25-12.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140497" comment="coreutils-lang-8.25-12.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147820" version="1" class="patch">
	<metadata>
		<title>cpio-2.11-35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<reference ref_id="CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112/" source="CVE"/>
		<reference ref_id="CVE-2016-2037" ref_url="https://www.suse.com/security/cve/CVE-2016-2037/" source="CVE"/>
		<description>
These are all security issues fixed in the cpio-2.11-35.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0624">CVE-2010-0624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9112">CVE-2014-9112 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2037/">CVE-2016-2037 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2037">CVE-2016-2037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158948" comment="cpio-2.11-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158949" comment="cpio-lang-2.11-35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147821" version="1" class="patch">
	<metadata>
		<title>cpp48-4.8.5-30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-5044" ref_url="https://www.suse.com/security/cve/CVE-2014-5044/" source="CVE"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<description>
These are all security issues fixed in the cpp48-4.8.5-30.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5044/">CVE-2014-5044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5044">CVE-2014-5044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5276">CVE-2015-5276 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140498" comment="cpp48-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140499" comment="gcc48-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140500" comment="gcc48-32bit-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140501" comment="gcc48-c++-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140502" comment="gcc48-info-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140503" comment="gcc48-locale-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140504" comment="libasan0-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140505" comment="libasan0-32bit-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140506" comment="libstdc++48-devel-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140507" comment="libstdc++48-devel-32bit-4.8.5-30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147822" version="1" class="patch">
	<metadata>
		<title>cracklib-2.9.0-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-6318" ref_url="https://www.suse.com/security/cve/CVE-2016-6318/" source="CVE"/>
		<description>
These are all security issues fixed in the cracklib-2.9.0-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6318/">CVE-2016-6318 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6318">CVE-2016-6318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130930" comment="cracklib-2.9.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131013" comment="libcrack2-2.9.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131014" comment="libcrack2-32bit-2.9.0-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147823" version="1" class="patch">
	<metadata>
		<title>crash-7.1.8-3.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-2524" ref_url="https://www.suse.com/security/cve/CVE-2014-2524/" source="CVE"/>
		<description>
These are all security issues fixed in the crash-7.1.8-3.9 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2524/">CVE-2014-2524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2524">CVE-2014-2524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158950" comment="crash-7.1.8-3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158951" comment="crash-kmp-default-7.1.8_k4.4.73_5-3.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147824" version="1" class="patch">
	<metadata>
		<title>cron-4.2-58.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-2607" ref_url="https://www.suse.com/security/cve/CVE-2006-2607/" source="CVE"/>
		<reference ref_id="CVE-2010-0424" ref_url="https://www.suse.com/security/cve/CVE-2010-0424/" source="CVE"/>
		<description>
These are all security issues fixed in the cron-4.2-58.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-2607/">CVE-2006-2607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-2607">CVE-2006-2607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0424/">CVE-2010-0424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0424">CVE-2010-0424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140508" comment="cron-4.2-58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140509" comment="cronie-1.4.11-58.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147825" version="1" class="patch">
	<metadata>
		<title>ctags-5.8-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-7204" ref_url="https://www.suse.com/security/cve/CVE-2014-7204/" source="CVE"/>
		<description>
These are all security issues fixed in the ctags-5.8-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7204/">CVE-2014-7204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7204">CVE-2014-7204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130995" comment="ctags-5.8-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147826" version="1" class="patch">
	<metadata>
		<title>cups-1.7.5-19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0163" ref_url="https://www.suse.com/security/cve/CVE-2009-0163/" source="CVE"/>
		<reference ref_id="CVE-2009-2820" ref_url="https://www.suse.com/security/cve/CVE-2009-2820/" source="CVE"/>
		<reference ref_id="CVE-2009-3553" ref_url="https://www.suse.com/security/cve/CVE-2009-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-0393" ref_url="https://www.suse.com/security/cve/CVE-2010-0393/" source="CVE"/>
		<reference ref_id="CVE-2010-0540" ref_url="https://www.suse.com/security/cve/CVE-2010-0540/" source="CVE"/>
		<reference ref_id="CVE-2010-0542" ref_url="https://www.suse.com/security/cve/CVE-2010-0542/" source="CVE"/>
		<reference ref_id="CVE-2010-1748" ref_url="https://www.suse.com/security/cve/CVE-2010-1748/" source="CVE"/>
		<reference ref_id="CVE-2010-2941" ref_url="https://www.suse.com/security/cve/CVE-2010-2941/" source="CVE"/>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<reference ref_id="CVE-2012-6094" ref_url="https://www.suse.com/security/cve/CVE-2012-6094/" source="CVE"/>
		<reference ref_id="CVE-2014-2856" ref_url="https://www.suse.com/security/cve/CVE-2014-2856/" source="CVE"/>
		<reference ref_id="CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537/" source="CVE"/>
		<reference ref_id="CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030/" source="CVE"/>
		<reference ref_id="CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031/" source="CVE"/>
		<reference ref_id="CVE-2014-9679" ref_url="https://www.suse.com/security/cve/CVE-2014-9679/" source="CVE"/>
		<reference ref_id="CVE-2015-1158" ref_url="https://www.suse.com/security/cve/CVE-2015-1158/" source="CVE"/>
		<reference ref_id="CVE-2015-1159" ref_url="https://www.suse.com/security/cve/CVE-2015-1159/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-1.7.5-19.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0163/">CVE-2009-0163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0163">CVE-2009-0163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2820/">CVE-2009-2820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2820">CVE-2009-2820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3553/">CVE-2009-3553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3553">CVE-2009-3553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0393/">CVE-2010-0393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0393">CVE-2010-0393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0540/">CVE-2010-0540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0540">CVE-2010-0540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0542/">CVE-2010-0542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0542">CVE-2010-0542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1748/">CVE-2010-1748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1748">CVE-2010-1748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2941/">CVE-2010-2941 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2941">CVE-2010-2941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5519">CVE-2012-5519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6094/">CVE-2012-6094 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6094">CVE-2012-6094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2856/">CVE-2014-2856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2856">CVE-2014-2856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3537">CVE-2014-3537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5029">CVE-2014-5029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5030">CVE-2014-5030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5031">CVE-2014-5031 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9679/">CVE-2014-9679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9679">CVE-2014-9679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1158/">CVE-2015-1158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1158">CVE-2015-1158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1159/">CVE-2015-1159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1159">CVE-2015-1159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158952" comment="cups-1.7.5-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158953" comment="cups-client-1.7.5-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158954" comment="cups-libs-1.7.5-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158955" comment="cups-libs-32bit-1.7.5-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147827" version="1" class="patch">
	<metadata>
		<title>cups-filters-1.0.58-17.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-6473" ref_url="https://www.suse.com/security/cve/CVE-2013-6473/" source="CVE"/>
		<reference ref_id="CVE-2013-6474" ref_url="https://www.suse.com/security/cve/CVE-2013-6474/" source="CVE"/>
		<reference ref_id="CVE-2013-6475" ref_url="https://www.suse.com/security/cve/CVE-2013-6475/" source="CVE"/>
		<reference ref_id="CVE-2013-6476" ref_url="https://www.suse.com/security/cve/CVE-2013-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-2707" ref_url="https://www.suse.com/security/cve/CVE-2014-2707/" source="CVE"/>
		<reference ref_id="CVE-2014-4336" ref_url="https://www.suse.com/security/cve/CVE-2014-4336/" source="CVE"/>
		<reference ref_id="CVE-2014-4337" ref_url="https://www.suse.com/security/cve/CVE-2014-4337/" source="CVE"/>
		<reference ref_id="CVE-2014-4338" ref_url="https://www.suse.com/security/cve/CVE-2014-4338/" source="CVE"/>
		<reference ref_id="CVE-2015-2265" ref_url="https://www.suse.com/security/cve/CVE-2015-2265/" source="CVE"/>
		<reference ref_id="CVE-2015-3258" ref_url="https://www.suse.com/security/cve/CVE-2015-3258/" source="CVE"/>
		<reference ref_id="CVE-2015-3279" ref_url="https://www.suse.com/security/cve/CVE-2015-3279/" source="CVE"/>
		<reference ref_id="CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327/" source="CVE"/>
		<reference ref_id="CVE-2015-8560" ref_url="https://www.suse.com/security/cve/CVE-2015-8560/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-filters-1.0.58-17.11 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6473/">CVE-2013-6473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6473">CVE-2013-6473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6474/">CVE-2013-6474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6474">CVE-2013-6474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6475/">CVE-2013-6475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6475">CVE-2013-6475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6476/">CVE-2013-6476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6476">CVE-2013-6476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2707/">CVE-2014-2707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2707">CVE-2014-2707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4336/">CVE-2014-4336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4336">CVE-2014-4336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4337/">CVE-2014-4337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4337">CVE-2014-4337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4338/">CVE-2014-4338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4338">CVE-2014-4338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2265/">CVE-2015-2265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2265">CVE-2015-2265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3258/">CVE-2015-3258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3258">CVE-2015-3258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3279/">CVE-2015-3279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3279">CVE-2015-3279 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8327">CVE-2015-8327 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8560/">CVE-2015-8560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8560">CVE-2015-8560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158956" comment="cups-filters-1.0.58-17.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158957" comment="cups-filters-cups-browsed-1.0.58-17.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158958" comment="cups-filters-foomatic-rip-1.0.58-17.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158959" comment="cups-filters-ghostscript-1.0.58-17.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147828" version="1" class="patch">
	<metadata>
		<title>cups-pk-helper-0.2.5-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-4510" ref_url="https://www.suse.com/security/cve/CVE-2012-4510/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-pk-helper-0.2.5-5.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4510/">CVE-2012-4510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4510">CVE-2012-4510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009138209" comment="cups-pk-helper-0.2.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009138210" comment="cups-pk-helper-lang-0.2.5-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147829" version="1" class="patch">
	<metadata>
		<title>curl-7.37.0-36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-0249" ref_url="https://www.suse.com/security/cve/CVE-2013-0249/" source="CVE"/>
		<reference ref_id="CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944/" source="CVE"/>
		<reference ref_id="CVE-2013-2174" ref_url="https://www.suse.com/security/cve/CVE-2013-2174/" source="CVE"/>
		<reference ref_id="CVE-2013-4545" ref_url="https://www.suse.com/security/cve/CVE-2013-4545/" source="CVE"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-3620" ref_url="https://www.suse.com/security/cve/CVE-2014-3620/" source="CVE"/>
		<reference ref_id="CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<reference ref_id="CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143/" source="CVE"/>
		<reference ref_id="CVE-2015-3144" ref_url="https://www.suse.com/security/cve/CVE-2015-3144/" source="CVE"/>
		<reference ref_id="CVE-2015-3145" ref_url="https://www.suse.com/security/cve/CVE-2015-3145/" source="CVE"/>
		<reference ref_id="CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148/" source="CVE"/>
		<reference ref_id="CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153/" source="CVE"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<reference ref_id="CVE-2016-5419" ref_url="https://www.suse.com/security/cve/CVE-2016-5419/" source="CVE"/>
		<reference ref_id="CVE-2016-5420" ref_url="https://www.suse.com/security/cve/CVE-2016-5420/" source="CVE"/>
		<reference ref_id="CVE-2016-5421" ref_url="https://www.suse.com/security/cve/CVE-2016-5421/" source="CVE"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<reference ref_id="CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167/" source="CVE"/>
		<reference ref_id="CVE-2016-8615" ref_url="https://www.suse.com/security/cve/CVE-2016-8615/" source="CVE"/>
		<reference ref_id="CVE-2016-8616" ref_url="https://www.suse.com/security/cve/CVE-2016-8616/" source="CVE"/>
		<reference ref_id="CVE-2016-8617" ref_url="https://www.suse.com/security/cve/CVE-2016-8617/" source="CVE"/>
		<reference ref_id="CVE-2016-8618" ref_url="https://www.suse.com/security/cve/CVE-2016-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-8619" ref_url="https://www.suse.com/security/cve/CVE-2016-8619/" source="CVE"/>
		<reference ref_id="CVE-2016-8620" ref_url="https://www.suse.com/security/cve/CVE-2016-8620/" source="CVE"/>
		<reference ref_id="CVE-2016-8621" ref_url="https://www.suse.com/security/cve/CVE-2016-8621/" source="CVE"/>
		<reference ref_id="CVE-2016-8622" ref_url="https://www.suse.com/security/cve/CVE-2016-8622/" source="CVE"/>
		<reference ref_id="CVE-2016-8623" ref_url="https://www.suse.com/security/cve/CVE-2016-8623/" source="CVE"/>
		<reference ref_id="CVE-2016-8624" ref_url="https://www.suse.com/security/cve/CVE-2016-8624/" source="CVE"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.37.0-36.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0037">CVE-2009-0037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2417">CVE-2009-2417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0249/">CVE-2013-0249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0249">CVE-2013-0249 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1944">CVE-2013-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2174/">CVE-2013-2174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2174">CVE-2013-2174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4545/">CVE-2013-4545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4545">CVE-2013-4545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0015">CVE-2014-0015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0138">CVE-2014-0138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0139">CVE-2014-0139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3613">CVE-2014-3613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3620/">CVE-2014-3620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3620">CVE-2014-3620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3707">CVE-2014-3707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8150">CVE-2014-8150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3143">CVE-2015-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3144/">CVE-2015-3144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3144">CVE-2015-3144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3145/">CVE-2015-3145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3145">CVE-2015-3145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3148">CVE-2015-3148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3153">CVE-2015-3153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0755">CVE-2016-0755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5419/">CVE-2016-5419 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5419">CVE-2016-5419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5420/">CVE-2016-5420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5420">CVE-2016-5420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5421/">CVE-2016-5421 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5421">CVE-2016-5421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7141">CVE-2016-7141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7167">CVE-2016-7167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8615/">CVE-2016-8615 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8615">CVE-2016-8615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8616/">CVE-2016-8616 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8616">CVE-2016-8616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8617/">CVE-2016-8617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8617">CVE-2016-8617 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-8618/">CVE-2016-8618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8618">CVE-2016-8618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8619/">CVE-2016-8619 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8619">CVE-2016-8619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8620/">CVE-2016-8620 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8620">CVE-2016-8620 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8621/">CVE-2016-8621 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8621">CVE-2016-8621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8622/">CVE-2016-8622 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8622">CVE-2016-8622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8623/">CVE-2016-8623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8623">CVE-2016-8623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8624/">CVE-2016-8624 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8624">CVE-2016-8624 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9586">CVE-2016-9586 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7407">CVE-2017-7407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154400" comment="curl-7.37.0-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154401" comment="libcurl4-7.37.0-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154402" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147830" version="1" class="patch">
	<metadata>
		<title>cvs-1.12.12-181.54 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-0804" ref_url="https://www.suse.com/security/cve/CVE-2012-0804/" source="CVE"/>
		<description>
These are all security issues fixed in the cvs-1.12.12-181.54 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0804/">CVE-2012-0804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0804">CVE-2012-0804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140516" comment="cvs-1.12.12-181.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140517" comment="cvs-doc-1.12.12-181.63 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147831" version="1" class="patch">
	<metadata>
		<title>cyrus-sasl-2.1.26-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0688" ref_url="https://www.suse.com/security/cve/CVE-2009-0688/" source="CVE"/>
		<description>
These are all security issues fixed in the cyrus-sasl-2.1.26-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0688/">CVE-2009-0688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0688">CVE-2009-0688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140518" comment="cyrus-sasl-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140519" comment="cyrus-sasl-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140520" comment="cyrus-sasl-crammd5-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140521" comment="cyrus-sasl-crammd5-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140522" comment="cyrus-sasl-digestmd5-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140523" comment="cyrus-sasl-gssapi-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140524" comment="cyrus-sasl-gssapi-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140525" comment="cyrus-sasl-otp-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140526" comment="cyrus-sasl-otp-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140527" comment="cyrus-sasl-plain-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140528" comment="cyrus-sasl-plain-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140529" comment="cyrus-sasl-saslauthd-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140530" comment="cyrus-sasl-sqlauxprop-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140531" comment="cyrus-sasl-sqlauxprop-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140532" comment="libsasl2-3-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140533" comment="libsasl2-3-32bit-2.1.26-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147832" version="1" class="patch">
	<metadata>
		<title>davfs2-1.5.2-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-4362" ref_url="https://www.suse.com/security/cve/CVE-2014-4362/" source="CVE"/>
		<description>
These are all security issues fixed in the davfs2-1.5.2-2.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4362/">CVE-2014-4362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4362">CVE-2014-4362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140534" comment="davfs2-1.5.2-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147833" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.8.22-28.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-4352" ref_url="https://www.suse.com/security/cve/CVE-2010-4352/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<reference ref_id="CVE-2013-2168" ref_url="https://www.suse.com/security/cve/CVE-2013-2168/" source="CVE"/>
		<reference ref_id="CVE-2014-3477" ref_url="https://www.suse.com/security/cve/CVE-2014-3477/" source="CVE"/>
		<reference ref_id="CVE-2014-3532" ref_url="https://www.suse.com/security/cve/CVE-2014-3532/" source="CVE"/>
		<reference ref_id="CVE-2014-3533" ref_url="https://www.suse.com/security/cve/CVE-2014-3533/" source="CVE"/>
		<reference ref_id="CVE-2014-3635" ref_url="https://www.suse.com/security/cve/CVE-2014-3635/" source="CVE"/>
		<reference ref_id="CVE-2014-3636" ref_url="https://www.suse.com/security/cve/CVE-2014-3636/" source="CVE"/>
		<reference ref_id="CVE-2014-3637" ref_url="https://www.suse.com/security/cve/CVE-2014-3637/" source="CVE"/>
		<reference ref_id="CVE-2014-3638" ref_url="https://www.suse.com/security/cve/CVE-2014-3638/" source="CVE"/>
		<reference ref_id="CVE-2014-3639" ref_url="https://www.suse.com/security/cve/CVE-2014-3639/" source="CVE"/>
		<reference ref_id="CVE-2014-7824" ref_url="https://www.suse.com/security/cve/CVE-2014-7824/" source="CVE"/>
		<reference ref_id="CVE-2014-8148" ref_url="https://www.suse.com/security/cve/CVE-2014-8148/" source="CVE"/>
		<reference ref_id="CVE-2015-0245" ref_url="https://www.suse.com/security/cve/CVE-2015-0245/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.8.22-28.19 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4352/">CVE-2010-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4352">CVE-2010-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3524">CVE-2012-3524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2168/">CVE-2013-2168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2168">CVE-2013-2168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3477/">CVE-2014-3477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3477">CVE-2014-3477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3532/">CVE-2014-3532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3532">CVE-2014-3532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3533/">CVE-2014-3533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3533">CVE-2014-3533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3635/">CVE-2014-3635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3635">CVE-2014-3635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3636/">CVE-2014-3636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3636">CVE-2014-3636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3637/">CVE-2014-3637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3637">CVE-2014-3637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3638/">CVE-2014-3638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3638">CVE-2014-3638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3639/">CVE-2014-3639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3639">CVE-2014-3639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7824/">CVE-2014-7824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7824">CVE-2014-7824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8148/">CVE-2014-8148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8148">CVE-2014-8148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0245/">CVE-2015-0245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0245">CVE-2015-0245 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158960" comment="dbus-1-1.8.22-28.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158961" comment="dbus-1-x11-1.8.22-28.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158962" comment="libdbus-1-3-1.8.22-28.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158963" comment="libdbus-1-3-32bit-1.8.22-28.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147834" version="1" class="patch">
	<metadata>
		<title>dbus-1-glib-0.100.2-3.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<reference ref_id="CVE-2013-0292" ref_url="https://www.suse.com/security/cve/CVE-2013-0292/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-glib-0.100.2-3.58 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1172">CVE-2010-1172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0292/">CVE-2013-0292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0292">CVE-2013-0292 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140539" comment="dbus-1-glib-0.100.2-3.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140540" comment="dbus-1-glib-32bit-0.100.2-3.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147835" version="1" class="patch">
	<metadata>
		<title>dhcp-4.3.3-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-1892" ref_url="https://www.suse.com/security/cve/CVE-2009-1892/" source="CVE"/>
		<reference ref_id="CVE-2010-2156" ref_url="https://www.suse.com/security/cve/CVE-2010-2156/" source="CVE"/>
		<reference ref_id="CVE-2010-3611" ref_url="https://www.suse.com/security/cve/CVE-2010-3611/" source="CVE"/>
		<reference ref_id="CVE-2010-3616" ref_url="https://www.suse.com/security/cve/CVE-2010-3616/" source="CVE"/>
		<reference ref_id="CVE-2011-0413" ref_url="https://www.suse.com/security/cve/CVE-2011-0413/" source="CVE"/>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<reference ref_id="CVE-2011-2748" ref_url="https://www.suse.com/security/cve/CVE-2011-2748/" source="CVE"/>
		<reference ref_id="CVE-2011-2749" ref_url="https://www.suse.com/security/cve/CVE-2011-2749/" source="CVE"/>
		<reference ref_id="CVE-2011-4539" ref_url="https://www.suse.com/security/cve/CVE-2011-4539/" source="CVE"/>
		<reference ref_id="CVE-2011-4868" ref_url="https://www.suse.com/security/cve/CVE-2011-4868/" source="CVE"/>
		<reference ref_id="CVE-2012-3570" ref_url="https://www.suse.com/security/cve/CVE-2012-3570/" source="CVE"/>
		<reference ref_id="CVE-2012-3571" ref_url="https://www.suse.com/security/cve/CVE-2012-3571/" source="CVE"/>
		<reference ref_id="CVE-2012-3954" ref_url="https://www.suse.com/security/cve/CVE-2012-3954/" source="CVE"/>
		<reference ref_id="CVE-2012-3955" ref_url="https://www.suse.com/security/cve/CVE-2012-3955/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<reference ref_id="CVE-2016-2774" ref_url="https://www.suse.com/security/cve/CVE-2016-2774/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-4.3.3-9.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1892/">CVE-2009-1892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1892">CVE-2009-1892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2156/">CVE-2010-2156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2156">CVE-2010-2156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3611/">CVE-2010-3611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3611">CVE-2010-3611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3616/">CVE-2010-3616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3616">CVE-2010-3616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0413/">CVE-2011-0413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0413">CVE-2011-0413 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0997">CVE-2011-0997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2748/">CVE-2011-2748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2748">CVE-2011-2748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2749/">CVE-2011-2749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2749">CVE-2011-2749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4539/">CVE-2011-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4539">CVE-2011-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4868/">CVE-2011-4868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4868">CVE-2011-4868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3570/">CVE-2012-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3570">CVE-2012-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3571/">CVE-2012-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3571">CVE-2012-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3954/">CVE-2012-3954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3954">CVE-2012-3954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3955/">CVE-2012-3955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3955">CVE-2012-3955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2266">CVE-2013-2266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8605">CVE-2015-8605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2774/">CVE-2016-2774 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2774">CVE-2016-2774 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130042" comment="dhcp-relay-4.3.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130043" comment="dhcp-server-4.3.3-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147836" version="1" class="patch">
	<metadata>
		<title>dnsmasq-2.76-17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294/" source="CVE"/>
		<reference ref_id="CVE-2015-8899" ref_url="https://www.suse.com/security/cve/CVE-2015-8899/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsmasq-2.76-17.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3294">CVE-2015-3294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8899/">CVE-2015-8899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8899">CVE-2015-8899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158964" comment="dnsmasq-2.76-17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147837" version="1" class="patch">
	<metadata>
		<title>dosfstools-3.0.26-6.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-8872" ref_url="https://www.suse.com/security/cve/CVE-2015-8872/" source="CVE"/>
		<reference ref_id="CVE-2016-4804" ref_url="https://www.suse.com/security/cve/CVE-2016-4804/" source="CVE"/>
		<description>
These are all security issues fixed in the dosfstools-3.0.26-6.5 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8872/">CVE-2015-8872 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8872">CVE-2015-8872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4804/">CVE-2016-4804 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4804">CVE-2016-4804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131020" comment="dosfstools-3.0.26-6.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147838" version="1" class="patch">
	<metadata>
		<title>dovecot22-2.2.30.2-14.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3430" ref_url="https://www.suse.com/security/cve/CVE-2014-3430/" source="CVE"/>
		<reference ref_id="CVE-2016-4983" ref_url="https://www.suse.com/security/cve/CVE-2016-4983/" source="CVE"/>
		<reference ref_id="CVE-2017-2669" ref_url="https://www.suse.com/security/cve/CVE-2017-2669/" source="CVE"/>
		<description>
These are all security issues fixed in the dovecot22-2.2.30.2-14.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3430/">CVE-2014-3430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3430">CVE-2014-3430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4983/">CVE-2016-4983 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4983">CVE-2016-4983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2669/">CVE-2017-2669 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2669">CVE-2017-2669 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158965" comment="dovecot22-2.2.30.2-14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158966" comment="dovecot22-backend-mysql-2.2.30.2-14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158967" comment="dovecot22-backend-pgsql-2.2.30.2-14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158968" comment="dovecot22-backend-sqlite-2.2.30.2-14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147839" version="1" class="patch">
	<metadata>
		<title>dracut-044-113.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-4453" ref_url="https://www.suse.com/security/cve/CVE-2012-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-8637" ref_url="https://www.suse.com/security/cve/CVE-2016-8637/" source="CVE"/>
		<description>
These are all security issues fixed in the dracut-044-113.10 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4453/">CVE-2012-4453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4453">CVE-2012-4453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8637/">CVE-2016-8637 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8637">CVE-2016-8637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158969" comment="dracut-044-113.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158970" comment="dracut-fips-044-113.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147840" version="1" class="patch">
	<metadata>
		<title>dstat-0.7.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3894" ref_url="https://www.suse.com/security/cve/CVE-2009-3894/" source="CVE"/>
		<description>
These are all security issues fixed in the dstat-0.7.2-1.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3894/">CVE-2009-3894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3894">CVE-2009-3894 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140548" comment="dstat-0.7.2-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147841" version="1" class="patch">
	<metadata>
		<title>e2fsprogs-1.42.11-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247/" source="CVE"/>
		<reference ref_id="CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572/" source="CVE"/>
		<description>
These are all security issues fixed in the e2fsprogs-1.42.11-15.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0247">CVE-2015-0247 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1572">CVE-2015-1572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158971" comment="e2fsprogs-1.42.11-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158972" comment="libcom_err2-1.42.11-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158973" comment="libcom_err2-32bit-1.42.11-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158974" comment="libext2fs2-1.42.11-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147842" version="1" class="patch">
	<metadata>
		<title>ecryptfs-utils-103-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1831" ref_url="https://www.suse.com/security/cve/CVE-2011-1831/" source="CVE"/>
		<reference ref_id="CVE-2011-1832" ref_url="https://www.suse.com/security/cve/CVE-2011-1832/" source="CVE"/>
		<reference ref_id="CVE-2011-1833" ref_url="https://www.suse.com/security/cve/CVE-2011-1833/" source="CVE"/>
		<reference ref_id="CVE-2011-1834" ref_url="https://www.suse.com/security/cve/CVE-2011-1834/" source="CVE"/>
		<reference ref_id="CVE-2011-1835" ref_url="https://www.suse.com/security/cve/CVE-2011-1835/" source="CVE"/>
		<reference ref_id="CVE-2011-1836" ref_url="https://www.suse.com/security/cve/CVE-2011-1836/" source="CVE"/>
		<reference ref_id="CVE-2011-1837" ref_url="https://www.suse.com/security/cve/CVE-2011-1837/" source="CVE"/>
		<reference ref_id="CVE-2014-9687" ref_url="https://www.suse.com/security/cve/CVE-2014-9687/" source="CVE"/>
		<reference ref_id="CVE-2016-1572" ref_url="https://www.suse.com/security/cve/CVE-2016-1572/" source="CVE"/>
		<description>
These are all security issues fixed in the ecryptfs-utils-103-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1831/">CVE-2011-1831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1831">CVE-2011-1831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1832/">CVE-2011-1832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1832">CVE-2011-1832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1833/">CVE-2011-1833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1833">CVE-2011-1833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1834/">CVE-2011-1834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1834">CVE-2011-1834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1835/">CVE-2011-1835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1835">CVE-2011-1835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1836/">CVE-2011-1836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1836">CVE-2011-1836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1837/">CVE-2011-1837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1837">CVE-2011-1837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9687/">CVE-2014-9687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9687">CVE-2014-9687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1572/">CVE-2016-1572 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1572">CVE-2016-1572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009121566" comment="ecryptfs-utils-103-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121567" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147843" version="1" class="patch">
	<metadata>
		<title>elfutils-0.158-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-0172" ref_url="https://www.suse.com/security/cve/CVE-2014-0172/" source="CVE"/>
		<reference ref_id="CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447/" source="CVE"/>
		<description>
These are all security issues fixed in the elfutils-0.158-6.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0172/">CVE-2014-0172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0172">CVE-2014-0172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9447">CVE-2014-9447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106094" comment="elfutils-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106096" comment="libasm1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106097" comment="libasm1-32bit-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106099" comment="libdw1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106100" comment="libdw1-32bit-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106102" comment="libebl1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106103" comment="libebl1-32bit-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106106" comment="libelf1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106107" comment="libelf1-32bit-0.158-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147844" version="1" class="patch">
	<metadata>
		<title>emacs-24.3-19.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-0035" ref_url="https://www.suse.com/security/cve/CVE-2012-0035/" source="CVE"/>
		<reference ref_id="CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421/" source="CVE"/>
		<reference ref_id="CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422/" source="CVE"/>
		<reference ref_id="CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423/" source="CVE"/>
		<reference ref_id="CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-24.3-19.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0035/">CVE-2012-0035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0035">CVE-2012-0035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3421">CVE-2014-3421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3422">CVE-2014-3422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3423">CVE-2014-3423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3424">CVE-2014-3424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158975" comment="emacs-24.3-19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158976" comment="emacs-el-24.3-19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158977" comment="emacs-info-24.3-19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158978" comment="emacs-nox-24.3-19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158979" comment="emacs-x11-24.3-19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158980" comment="etags-24.3-19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147845" version="1" class="patch">
	<metadata>
		<title>eog-3.20.4-7.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<reference ref_id="CVE-2016-6855" ref_url="https://www.suse.com/security/cve/CVE-2016-6855/" source="CVE"/>
		<description>
These are all security issues fixed in the eog-3.20.4-7.7 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7447">CVE-2013-7447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6855/">CVE-2016-6855 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6855">CVE-2016-6855 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140555" comment="eog-3.20.4-7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140556" comment="eog-lang-3.20.4-7.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147846" version="1" class="patch">
	<metadata>
		<title>evince-3.20.1-5.66 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2640" ref_url="https://www.suse.com/security/cve/CVE-2010-2640/" source="CVE"/>
		<reference ref_id="CVE-2010-2641" ref_url="https://www.suse.com/security/cve/CVE-2010-2641/" source="CVE"/>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<reference ref_id="CVE-2010-2643" ref_url="https://www.suse.com/security/cve/CVE-2010-2643/" source="CVE"/>
		<description>
These are all security issues fixed in the evince-3.20.1-5.66 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2640/">CVE-2010-2640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2640">CVE-2010-2640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2641/">CVE-2010-2641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2641">CVE-2010-2641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2642">CVE-2010-2642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2643/">CVE-2010-2643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2643">CVE-2010-2643 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140557" comment="evince-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140558" comment="evince-browser-plugin-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140559" comment="evince-lang-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140560" comment="evince-plugin-djvudocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140561" comment="evince-plugin-dvidocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140562" comment="evince-plugin-pdfdocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140563" comment="evince-plugin-psdocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140564" comment="evince-plugin-tiffdocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140565" comment="evince-plugin-xpsdocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140566" comment="libevdocument3-4-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140567" comment="libevview3-3-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140568" comment="nautilus-evince-3.20.1-5.66 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147847" version="1" class="patch">
	<metadata>
		<title>expat-2.1.0-20.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2012-1147" ref_url="https://www.suse.com/security/cve/CVE-2012-1147/" source="CVE"/>
		<reference ref_id="CVE-2012-1148" ref_url="https://www.suse.com/security/cve/CVE-2012-1148/" source="CVE"/>
		<reference ref_id="CVE-2012-6702" ref_url="https://www.suse.com/security/cve/CVE-2012-6702/" source="CVE"/>
		<reference ref_id="CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-5300" ref_url="https://www.suse.com/security/cve/CVE-2016-5300/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.1.0-20.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2625">CVE-2009-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3720">CVE-2009-3720 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0876">CVE-2012-0876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1147/">CVE-2012-1147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1147">CVE-2012-1147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1148/">CVE-2012-1148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1148">CVE-2012-1148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6702/">CVE-2012-6702 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6702">CVE-2012-6702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1283">CVE-2015-1283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0718">CVE-2016-0718 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5300/">CVE-2016-5300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5300">CVE-2016-5300 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009148243" comment="expat-2.1.0-20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148244" comment="libexpat1-2.1.0-20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148245" comment="libexpat1-32bit-2.1.0-20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147848" version="1" class="patch">
	<metadata>
		<title>fetchmail-6.3.26-12.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666/" source="CVE"/>
		<reference ref_id="CVE-2010-1167" ref_url="https://www.suse.com/security/cve/CVE-2010-1167/" source="CVE"/>
		<reference ref_id="CVE-2011-1947" ref_url="https://www.suse.com/security/cve/CVE-2011-1947/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2012-3482" ref_url="https://www.suse.com/security/cve/CVE-2012-3482/" source="CVE"/>
		<description>
These are all security issues fixed in the fetchmail-6.3.26-12.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2666">CVE-2009-2666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1167/">CVE-2010-1167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1167">CVE-2010-1167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1947/">CVE-2011-1947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1947">CVE-2011-1947 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3482/">CVE-2012-3482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3482">CVE-2012-3482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140569" comment="fetchmail-6.3.26-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140570" comment="fetchmailconf-6.3.26-12.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147849" version="1" class="patch">
	<metadata>
		<title>file-5.19-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-1571" ref_url="https://www.suse.com/security/cve/CVE-2012-1571/" source="CVE"/>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<reference ref_id="CVE-2014-8116" ref_url="https://www.suse.com/security/cve/CVE-2014-8116/" source="CVE"/>
		<reference ref_id="CVE-2014-8117" ref_url="https://www.suse.com/security/cve/CVE-2014-8117/" source="CVE"/>
		<description>
These are all security issues fixed in the file-5.19-9.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1571/">CVE-2012-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1571">CVE-2012-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3710">CVE-2014-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8116/">CVE-2014-8116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8116">CVE-2014-8116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8117/">CVE-2014-8117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8117">CVE-2014-8117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009103557" comment="file-5.19-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103559" comment="file-magic-5.19-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103561" comment="libmagic1-5.19-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103560" comment="libmagic1-32bit-5.19-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147850" version="1" class="patch">
	<metadata>
		<title>fontconfig-2.11.1-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-5384" ref_url="https://www.suse.com/security/cve/CVE-2016-5384/" source="CVE"/>
		<description>
These are all security issues fixed in the fontconfig-2.11.1-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5384/">CVE-2016-5384 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5384">CVE-2016-5384 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140574" comment="fontconfig-2.11.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140575" comment="fontconfig-32bit-2.11.1-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147851" version="1" class="patch">
	<metadata>
		<title>freeradius-server-3.0.14-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-3547" ref_url="https://www.suse.com/security/cve/CVE-2012-3547/" source="CVE"/>
		<reference ref_id="CVE-2014-2015" ref_url="https://www.suse.com/security/cve/CVE-2014-2015/" source="CVE"/>
		<reference ref_id="CVE-2015-4680" ref_url="https://www.suse.com/security/cve/CVE-2015-4680/" source="CVE"/>
		<reference ref_id="CVE-2015-8763" ref_url="https://www.suse.com/security/cve/CVE-2015-8763/" source="CVE"/>
		<reference ref_id="CVE-2017-9148" ref_url="https://www.suse.com/security/cve/CVE-2017-9148/" source="CVE"/>
		<description>
These are all security issues fixed in the freeradius-server-3.0.14-1.8 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3547/">CVE-2012-3547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3547">CVE-2012-3547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2015/">CVE-2014-2015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2015">CVE-2014-2015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4680/">CVE-2015-4680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4680">CVE-2015-4680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8763/">CVE-2015-8763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8763">CVE-2015-8763 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-9148/">CVE-2017-9148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9148">CVE-2017-9148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158981" comment="freeradius-server-3.0.14-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158982" comment="freeradius-server-doc-3.0.14-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158983" comment="freeradius-server-krb5-3.0.14-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158984" comment="freeradius-server-ldap-3.0.14-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158985" comment="freeradius-server-libs-3.0.14-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158986" comment="freeradius-server-mysql-3.0.14-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158987" comment="freeradius-server-perl-3.0.14-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158988" comment="freeradius-server-postgresql-3.0.14-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158989" comment="freeradius-server-python-3.0.14-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158990" comment="freeradius-server-sqlite-3.0.14-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158991" comment="freeradius-server-utils-3.0.14-1.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147852" version="1" class="patch">
	<metadata>
		<title>ft2demos-2.6.3-7.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<reference ref_id="CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240/" source="CVE"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<description>
These are all security issues fixed in the ft2demos-2.6.3-7.10.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0946">CVE-2009-0946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2497">CVE-2010-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2805">CVE-2010-2805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3053">CVE-2010-3053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3054">CVE-2010-3054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3311">CVE-2010-3311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3814">CVE-2010-3814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0226">CVE-2011-0226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5668">CVE-2012-5668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5669">CVE-2012-5669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5670">CVE-2012-5670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2240">CVE-2014-2240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9656">CVE-2014-9656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9657">CVE-2014-9657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9658">CVE-2014-9658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9659">CVE-2014-9659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9660">CVE-2014-9660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9661">CVE-2014-9661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9662">CVE-2014-9662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9663">CVE-2014-9663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9664">CVE-2014-9664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9665">CVE-2014-9665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9666">CVE-2014-9666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9667">CVE-2014-9667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9668">CVE-2014-9668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9669">CVE-2014-9669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9670">CVE-2014-9670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9671">CVE-2014-9671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9672">CVE-2014-9672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9673">CVE-2014-9673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9674">CVE-2014-9674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9675">CVE-2014-9675 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158992" comment="ft2demos-2.6.3-7.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147853" version="1" class="patch">
	<metadata>
		<title>fuse-2.9.3-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297/" source="CVE"/>
		<reference ref_id="CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541/" source="CVE"/>
		<reference ref_id="CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202/" source="CVE"/>
		<description>
These are all security issues fixed in the fuse-2.9.3-5.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3297">CVE-2009-3297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0541">CVE-2011-0541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3202">CVE-2015-3202 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110488" comment="fuse-2.9.3-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110491" comment="libfuse2-2.9.3-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147854" version="1" class="patch">
	<metadata>
		<title>gd-2.1.0-23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<reference ref_id="CVE-2016-10166" ref_url="https://www.suse.com/security/cve/CVE-2016-10166/" source="CVE"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-5116" ref_url="https://www.suse.com/security/cve/CVE-2016-5116/" source="CVE"/>
		<reference ref_id="CVE-2016-6128" ref_url="https://www.suse.com/security/cve/CVE-2016-6128/" source="CVE"/>
		<reference ref_id="CVE-2016-6132" ref_url="https://www.suse.com/security/cve/CVE-2016-6132/" source="CVE"/>
		<reference ref_id="CVE-2016-6161" ref_url="https://www.suse.com/security/cve/CVE-2016-6161/" source="CVE"/>
		<reference ref_id="CVE-2016-6207" ref_url="https://www.suse.com/security/cve/CVE-2016-6207/" source="CVE"/>
		<reference ref_id="CVE-2016-6214" ref_url="https://www.suse.com/security/cve/CVE-2016-6214/" source="CVE"/>
		<reference ref_id="CVE-2016-6905" ref_url="https://www.suse.com/security/cve/CVE-2016-6905/" source="CVE"/>
		<reference ref_id="CVE-2016-6906" ref_url="https://www.suse.com/security/cve/CVE-2016-6906/" source="CVE"/>
		<reference ref_id="CVE-2016-6911" ref_url="https://www.suse.com/security/cve/CVE-2016-6911/" source="CVE"/>
		<reference ref_id="CVE-2016-6912" ref_url="https://www.suse.com/security/cve/CVE-2016-6912/" source="CVE"/>
		<reference ref_id="CVE-2016-7568" ref_url="https://www.suse.com/security/cve/CVE-2016-7568/" source="CVE"/>
		<reference ref_id="CVE-2016-8670" ref_url="https://www.suse.com/security/cve/CVE-2016-8670/" source="CVE"/>
		<reference ref_id="CVE-2016-9317" ref_url="https://www.suse.com/security/cve/CVE-2016-9317/" source="CVE"/>
		<reference ref_id="CVE-2016-9933" ref_url="https://www.suse.com/security/cve/CVE-2016-9933/" source="CVE"/>
		<description>
These are all security issues fixed in the gd-2.1.0-23.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2497">CVE-2014-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9709">CVE-2014-9709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10166/">CVE-2016-10166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10166">CVE-2016-10166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10167">CVE-2016-10167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10168">CVE-2016-10168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5116/">CVE-2016-5116 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5116">CVE-2016-5116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6128/">CVE-2016-6128 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6128">CVE-2016-6128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6132/">CVE-2016-6132 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6132">CVE-2016-6132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6161/">CVE-2016-6161 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6161">CVE-2016-6161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6207/">CVE-2016-6207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6207">CVE-2016-6207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6214/">CVE-2016-6214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6214">CVE-2016-6214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6905/">CVE-2016-6905 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6905">CVE-2016-6905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6906/">CVE-2016-6906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6906">CVE-2016-6906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6911/">CVE-2016-6911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6911">CVE-2016-6911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6912/">CVE-2016-6912 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6912">CVE-2016-6912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7568/">CVE-2016-7568 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7568">CVE-2016-7568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8670/">CVE-2016-8670 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8670">CVE-2016-8670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9317/">CVE-2016-9317 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9317">CVE-2016-9317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9933/">CVE-2016-9933 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9933">CVE-2016-9933 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148438" comment="gd-2.1.0-23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147855" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-lang-2.34.0-18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="CVE-2015-7673" ref_url="https://www.suse.com/security/cve/CVE-2015-7673/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="CVE-2016-6352" ref_url="https://www.suse.com/security/cve/CVE-2016-6352/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-lang-2.34.0-18.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2485">CVE-2011-2485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4491">CVE-2015-4491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7552">CVE-2015-7552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7673/">CVE-2015-7673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7673">CVE-2015-7673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7674">CVE-2015-7674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6352/">CVE-2016-6352 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6352">CVE-2016-6352 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158993" comment="gdk-pixbuf-lang-2.34.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158994" comment="gdk-pixbuf-query-loaders-2.34.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158995" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158996" comment="libgdk_pixbuf-2_0-0-2.34.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158997" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009158998" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147856" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-loader-rsvg-2.40.15-4.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3146" ref_url="https://www.suse.com/security/cve/CVE-2011-3146/" source="CVE"/>
		<reference ref_id="CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-loader-rsvg-2.40.15-4.5 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3146/">CVE-2011-3146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3146">CVE-2011-3146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1881">CVE-2013-1881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140597" comment="gdk-pixbuf-loader-rsvg-2.40.15-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140598" comment="librsvg-2-2-2.40.15-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140599" comment="librsvg-2-2-32bit-2.40.15-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140600" comment="rsvg-view-2.40.15-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147857" version="1" class="patch">
	<metadata>
		<title>gdm-3.10.0.1-52.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1709" ref_url="https://www.suse.com/security/cve/CVE-2011-1709/" source="CVE"/>
		<description>
These are all security issues fixed in the gdm-3.10.0.1-52.5 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1709/">CVE-2011-1709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1709">CVE-2011-1709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140601" comment="gdm-3.10.0.1-52.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140602" comment="gdm-lang-3.10.0.1-52.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140603" comment="gdmflexiserver-3.10.0.1-52.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140604" comment="libgdm1-3.10.0.1-52.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140605" comment="typelib-1_0-Gdm-1_0-3.10.0.1-52.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147858" version="1" class="patch">
	<metadata>
		<title>ghostscript-9.15-22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653/" source="CVE"/>
		<reference ref_id="CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228/" source="CVE"/>
		<reference ref_id="CVE-2016-10220" ref_url="https://www.suse.com/security/cve/CVE-2016-10220/" source="CVE"/>
		<reference ref_id="CVE-2016-7978" ref_url="https://www.suse.com/security/cve/CVE-2016-7978/" source="CVE"/>
		<reference ref_id="CVE-2016-7979" ref_url="https://www.suse.com/security/cve/CVE-2016-7979/" source="CVE"/>
		<reference ref_id="CVE-2016-8602" ref_url="https://www.suse.com/security/cve/CVE-2016-8602/" source="CVE"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2017-5951" ref_url="https://www.suse.com/security/cve/CVE-2017-5951/" source="CVE"/>
		<reference ref_id="CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207/" source="CVE"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-9.15-22.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5653">CVE-2013-5653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3228">CVE-2015-3228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10220/">CVE-2016-10220 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10220">CVE-2016-10220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7978/">CVE-2016-7978 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7978">CVE-2016-7978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7979/">CVE-2016-7979 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7979">CVE-2016-7979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8602/">CVE-2016-8602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8602">CVE-2016-8602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9601">CVE-2016-9601 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5951/">CVE-2017-5951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5951">CVE-2017-5951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7207">CVE-2017-7207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8291">CVE-2017-8291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155975" comment="ghostscript-9.15-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155976" comment="ghostscript-x11-9.15-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147859" version="1" class="patch">
	<metadata>
		<title>giflib-progs-5.0.5-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<reference ref_id="CVE-2016-3977" ref_url="https://www.suse.com/security/cve/CVE-2016-3977/" source="CVE"/>
		<description>
These are all security issues fixed in the giflib-progs-5.0.5-12.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7555">CVE-2015-7555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3977/">CVE-2016-3977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3977">CVE-2016-3977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009126715" comment="giflib-progs-5.0.5-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009126709" comment="libgif6-5.0.5-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009126710" comment="libgif6-32bit-5.0.5-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147860" version="1" class="patch">
	<metadata>
		<title>git-core-2.12.3-26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2186" ref_url="https://www.suse.com/security/cve/CVE-2011-2186/" source="CVE"/>
		<reference ref_id="CVE-2014-9390" ref_url="https://www.suse.com/security/cve/CVE-2014-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-2315" ref_url="https://www.suse.com/security/cve/CVE-2016-2315/" source="CVE"/>
		<reference ref_id="CVE-2016-2324" ref_url="https://www.suse.com/security/cve/CVE-2016-2324/" source="CVE"/>
		<reference ref_id="CVE-2017-8386" ref_url="https://www.suse.com/security/cve/CVE-2017-8386/" source="CVE"/>
		<description>
These are all security issues fixed in the git-core-2.12.3-26.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2186/">CVE-2011-2186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2186">CVE-2011-2186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9390/">CVE-2014-9390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9390">CVE-2014-9390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2315/">CVE-2016-2315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2315">CVE-2016-2315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2324/">CVE-2016-2324 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2324">CVE-2016-2324 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8386/">CVE-2017-8386 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8386">CVE-2017-8386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155663" comment="git-core-2.12.3-26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147861" version="1" class="patch">
	<metadata>
		<title>glib2-lang-2.48.2-10.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-4316" ref_url="https://www.suse.com/security/cve/CVE-2008-4316/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<description>
These are all security issues fixed in the glib2-lang-2.48.2-10.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4316/">CVE-2008-4316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4316">CVE-2008-4316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3524">CVE-2012-3524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140606" comment="glib2-lang-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140607" comment="glib2-tools-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140608" comment="libgio-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140609" comment="libgio-2_0-0-32bit-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140610" comment="libglib-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140611" comment="libglib-2_0-0-32bit-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140612" comment="libgmodule-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140613" comment="libgmodule-2_0-0-32bit-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140614" comment="libgobject-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140615" comment="libgobject-2_0-0-32bit-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140616" comment="libgthread-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140617" comment="libgthread-2_0-0-32bit-2.48.2-10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147862" version="1" class="patch">
	<metadata>
		<title>glibc-2.22-61.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029/" source="CVE"/>
		<reference ref_id="CVE-2012-3406" ref_url="https://www.suse.com/security/cve/CVE-2012-3406/" source="CVE"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423/" source="CVE"/>
		<reference ref_id="CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475/" source="CVE"/>
		<reference ref_id="CVE-2014-4043" ref_url="https://www.suse.com/security/cve/CVE-2014-4043/" source="CVE"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<reference ref_id="CVE-2015-1473" ref_url="https://www.suse.com/security/cve/CVE-2015-1473/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.22-61.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5029">CVE-2009-5029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3406/">CVE-2012-3406 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3406">CVE-2012-3406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4412">CVE-2012-4412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0242">CVE-2013-0242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1914">CVE-2013-1914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2207">CVE-2013-2207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4237">CVE-2013-4237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4332">CVE-2013-4332 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4458">CVE-2013-4458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7423">CVE-2013-7423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0475">CVE-2014-0475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4043/">CVE-2014-4043 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4043">CVE-2014-4043 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5119">CVE-2014-5119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6040">CVE-2014-6040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7817">CVE-2014-7817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8121">CVE-2014-8121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9402">CVE-2014-9402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9761">CVE-2014-9761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1472">CVE-2015-1472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1473/">CVE-2015-1473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1473">CVE-2015-1473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1781">CVE-2015-1781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7547">CVE-2015-7547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8776">CVE-2015-8776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8777">CVE-2015-8777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8778">CVE-2015-8778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8779">CVE-2015-8779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1234">CVE-2016-1234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3075">CVE-2016-3075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3706">CVE-2016-3706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4429">CVE-2016-4429 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000366">CVE-2017-1000366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156957" comment="glibc-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156958" comment="glibc-32bit-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156959" comment="glibc-devel-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156960" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156986" comment="glibc-html-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156961" comment="glibc-i18ndata-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156987" comment="glibc-info-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156962" comment="glibc-locale-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156963" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156988" comment="glibc-profile-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157048" comment="glibc-profile-32bit-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156964" comment="nscd-2.22-61.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147863" version="1" class="patch">
	<metadata>
		<title>gnome-keyring-3.20.0-27.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-3466" ref_url="https://www.suse.com/security/cve/CVE-2012-3466/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-keyring-3.20.0-27.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3466/">CVE-2012-3466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3466">CVE-2012-3466 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140630" comment="gnome-keyring-3.20.0-27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140631" comment="gnome-keyring-32bit-3.20.0-27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140632" comment="gnome-keyring-lang-3.20.0-27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140633" comment="gnome-keyring-pam-3.20.0-27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140634" comment="gnome-keyring-pam-32bit-3.20.0-27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140635" comment="libgck-modules-gnome-keyring-3.20.0-27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147864" version="1" class="patch">
	<metadata>
		<title>gnome-settings-daemon-3.20.1-49.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-7300" ref_url="https://www.suse.com/security/cve/CVE-2014-7300/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-settings-daemon-3.20.1-49.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7300/">CVE-2014-7300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7300">CVE-2014-7300 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009158999" comment="gnome-settings-daemon-3.20.1-49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159000" comment="gnome-settings-daemon-lang-3.20.1-49.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147865" version="1" class="patch">
	<metadata>
		<title>gnome-shell-3.20.4-76.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-4000" ref_url="https://www.suse.com/security/cve/CVE-2010-4000/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-shell-3.20.4-76.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4000/">CVE-2010-4000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4000">CVE-2010-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159001" comment="gnome-shell-3.20.4-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159002" comment="gnome-shell-browser-plugin-3.20.4-76.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159003" comment="gnome-shell-lang-3.20.4-76.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147866" version="1" class="patch">
	<metadata>
		<title>gnutls-3.3.27-1.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-4989" ref_url="https://www.suse.com/security/cve/CVE-2008-4989/" source="CVE"/>
		<reference ref_id="CVE-2011-4128" ref_url="https://www.suse.com/security/cve/CVE-2011-4128/" source="CVE"/>
		<reference ref_id="CVE-2012-0390" ref_url="https://www.suse.com/security/cve/CVE-2012-0390/" source="CVE"/>
		<reference ref_id="CVE-2012-1569" ref_url="https://www.suse.com/security/cve/CVE-2012-1569/" source="CVE"/>
		<reference ref_id="CVE-2012-1573" ref_url="https://www.suse.com/security/cve/CVE-2012-1573/" source="CVE"/>
		<reference ref_id="CVE-2014-0092" ref_url="https://www.suse.com/security/cve/CVE-2014-0092/" source="CVE"/>
		<reference ref_id="CVE-2014-1959" ref_url="https://www.suse.com/security/cve/CVE-2014-1959/" source="CVE"/>
		<reference ref_id="CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466/" source="CVE"/>
		<reference ref_id="CVE-2014-8564" ref_url="https://www.suse.com/security/cve/CVE-2014-8564/" source="CVE"/>
		<reference ref_id="CVE-2015-0294" ref_url="https://www.suse.com/security/cve/CVE-2015-0294/" source="CVE"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2015-6251" ref_url="https://www.suse.com/security/cve/CVE-2015-6251/" source="CVE"/>
		<reference ref_id="CVE-2016-7444" ref_url="https://www.suse.com/security/cve/CVE-2016-7444/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-5335" ref_url="https://www.suse.com/security/cve/CVE-2017-5335/" source="CVE"/>
		<reference ref_id="CVE-2017-5336" ref_url="https://www.suse.com/security/cve/CVE-2017-5336/" source="CVE"/>
		<reference ref_id="CVE-2017-5337" ref_url="https://www.suse.com/security/cve/CVE-2017-5337/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-3.3.27-1.10 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4989/">CVE-2008-4989 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2008-4989">CVE-2008-4989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4128/">CVE-2011-4128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4128">CVE-2011-4128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0390/">CVE-2012-0390 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0390">CVE-2012-0390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1569/">CVE-2012-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1569">CVE-2012-1569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1573/">CVE-2012-1573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1573">CVE-2012-1573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0092/">CVE-2014-0092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0092">CVE-2014-0092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1959/">CVE-2014-1959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1959">CVE-2014-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3466">CVE-2014-3466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8564/">CVE-2014-8564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8564">CVE-2014-8564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0294/">CVE-2015-0294 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0294">CVE-2015-0294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3622">CVE-2015-3622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6251/">CVE-2015-6251 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6251">CVE-2015-6251 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7444/">CVE-2016-7444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7444">CVE-2016-7444 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5335/">CVE-2017-5335 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5335">CVE-2017-5335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5336/">CVE-2017-5336 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5336">CVE-2017-5336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5337/">CVE-2017-5337 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5337">CVE-2017-5337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159004" comment="gnutls-3.3.27-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159005" comment="libgnutls-openssl27-3.3.27-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159006" comment="libgnutls28-3.3.27-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159007" comment="libgnutls28-32bit-3.3.27-1.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147867" version="1" class="patch">
	<metadata>
		<title>gpg2-2.0.24-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2547" ref_url="https://www.suse.com/security/cve/CVE-2010-2547/" source="CVE"/>
		<reference ref_id="CVE-2013-4351" ref_url="https://www.suse.com/security/cve/CVE-2013-4351/" source="CVE"/>
		<reference ref_id="CVE-2013-4402" ref_url="https://www.suse.com/security/cve/CVE-2013-4402/" source="CVE"/>
		<reference ref_id="CVE-2014-4617" ref_url="https://www.suse.com/security/cve/CVE-2014-4617/" source="CVE"/>
		<reference ref_id="CVE-2015-1606" ref_url="https://www.suse.com/security/cve/CVE-2015-1606/" source="CVE"/>
		<reference ref_id="CVE-2015-1607" ref_url="https://www.suse.com/security/cve/CVE-2015-1607/" source="CVE"/>
		<description>
These are all security issues fixed in the gpg2-2.0.24-8.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2547/">CVE-2010-2547 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2547">CVE-2010-2547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4351/">CVE-2013-4351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4351">CVE-2013-4351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4402/">CVE-2013-4402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4402">CVE-2013-4402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4617/">CVE-2014-4617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4617">CVE-2014-4617 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1606/">CVE-2015-1606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1606">CVE-2015-1606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1607/">CVE-2015-1607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1607">CVE-2015-1607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159008" comment="gpg2-2.0.24-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159009" comment="gpg2-lang-2.0.24-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147868" version="1" class="patch">
	<metadata>
		<title>gpgme-1.5.1-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3564" ref_url="https://www.suse.com/security/cve/CVE-2014-3564/" source="CVE"/>
		<description>
These are all security issues fixed in the gpgme-1.5.1-1.11 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3564/">CVE-2014-3564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3564">CVE-2014-3564 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140643" comment="gpgme-1.5.1-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140644" comment="libgpgme11-1.5.1-1.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147869" version="1" class="patch">
	<metadata>
		<title>groff-1.22.2-5.287 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-5044" ref_url="https://www.suse.com/security/cve/CVE-2009-5044/" source="CVE"/>
		<reference ref_id="CVE-2009-5080" ref_url="https://www.suse.com/security/cve/CVE-2009-5080/" source="CVE"/>
		<reference ref_id="CVE-2009-5081" ref_url="https://www.suse.com/security/cve/CVE-2009-5081/" source="CVE"/>
		<description>
These are all security issues fixed in the groff-1.22.2-5.287 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5044/">CVE-2009-5044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5044">CVE-2009-5044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5080/">CVE-2009-5080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5080">CVE-2009-5080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5081/">CVE-2009-5081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5081">CVE-2009-5081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140645" comment="groff-1.22.2-5.429 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140646" comment="groff-full-1.22.2-5.429 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140647" comment="gxditview-1.22.2-5.429 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147870" version="1" class="patch">
	<metadata>
		<title>grub2-2.02-2.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370/" source="CVE"/>
		<description>
These are all security issues fixed in the grub2-2.02-2.12 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8370">CVE-2015-8370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159010" comment="grub2-2.02-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159011" comment="grub2-arm64-efi-2.02-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159012" comment="grub2-i386-pc-2.02-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159013" comment="grub2-powerpc-ieee1275-2.02-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159014" comment="grub2-s390x-emu-2.02-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159015" comment="grub2-snapper-plugin-2.02-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159016" comment="grub2-systemd-sleep-plugin-2.02-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159017" comment="grub2-x86_64-efi-2.02-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159018" comment="grub2-x86_64-xen-2.02-2.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147871" version="1" class="patch">
	<metadata>
		<title>gstreamer-1.8.3-9.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-1.8.3-9.5 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5838">CVE-2017-5838 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009150843" comment="gstreamer-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150844" comment="gstreamer-lang-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150845" comment="gstreamer-utils-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150846" comment="libgstreamer-1_0-0-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150847" comment="libgstreamer-1_0-0-32bit-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150848" comment="typelib-1_0-Gst-1_0-1.8.3-9.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147872" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-bad-1.8.3-17.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-9445" ref_url="https://www.suse.com/security/cve/CVE-2016-9445/" source="CVE"/>
		<reference ref_id="CVE-2016-9446" ref_url="https://www.suse.com/security/cve/CVE-2016-9446/" source="CVE"/>
		<reference ref_id="CVE-2016-9809" ref_url="https://www.suse.com/security/cve/CVE-2016-9809/" source="CVE"/>
		<reference ref_id="CVE-2016-9812" ref_url="https://www.suse.com/security/cve/CVE-2016-9812/" source="CVE"/>
		<reference ref_id="CVE-2016-9813" ref_url="https://www.suse.com/security/cve/CVE-2016-9813/" source="CVE"/>
		<reference ref_id="CVE-2017-5843" ref_url="https://www.suse.com/security/cve/CVE-2017-5843/" source="CVE"/>
		<reference ref_id="CVE-2017-5848" ref_url="https://www.suse.com/security/cve/CVE-2017-5848/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-bad-1.8.3-17.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9445/">CVE-2016-9445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9445">CVE-2016-9445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9446/">CVE-2016-9446 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9446">CVE-2016-9446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9809/">CVE-2016-9809 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9809">CVE-2016-9809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9812/">CVE-2016-9812 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9812">CVE-2016-9812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9813/">CVE-2016-9813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9813">CVE-2016-9813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5843/">CVE-2017-5843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5843">CVE-2017-5843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5848/">CVE-2017-5848 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5848">CVE-2017-5848 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009150831" comment="gstreamer-plugins-bad-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150832" comment="gstreamer-plugins-bad-lang-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150833" comment="libgstadaptivedemux-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150834" comment="libgstbadaudio-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150835" comment="libgstbadbase-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150836" comment="libgstbadvideo-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150837" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150838" comment="libgstcodecparsers-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150839" comment="libgstgl-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150840" comment="libgstmpegts-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150841" comment="libgstphotography-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150842" comment="libgsturidownloader-1_0-0-1.8.3-17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147873" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-base-1.8.3-12.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-9811" ref_url="https://www.suse.com/security/cve/CVE-2016-9811/" source="CVE"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5839" ref_url="https://www.suse.com/security/cve/CVE-2017-5839/" source="CVE"/>
		<reference ref_id="CVE-2017-5842" ref_url="https://www.suse.com/security/cve/CVE-2017-5842/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-base-1.8.3-12.11 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9811/">CVE-2016-9811 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9811">CVE-2016-9811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5837">CVE-2017-5837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5839/">CVE-2017-5839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5839">CVE-2017-5839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5842/">CVE-2017-5842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5842">CVE-2017-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5844">CVE-2017-5844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154408" comment="gstreamer-plugins-base-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154409" comment="gstreamer-plugins-base-lang-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154410" comment="libgstallocators-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154411" comment="libgstapp-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154412" comment="libgstapp-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154413" comment="libgstaudio-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154414" comment="libgstaudio-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154415" comment="libgstfft-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154417" comment="libgstpbutils-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154418" comment="libgstpbutils-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154419" comment="libgstriff-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154420" comment="libgstrtp-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154421" comment="libgstrtsp-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154422" comment="libgstsdp-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154423" comment="libgsttag-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154424" comment="libgsttag-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154425" comment="libgstvideo-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154426" comment="libgstvideo-1_0-0-32bit-1.8.3-12.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147874" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-good-1.8.3-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-10198" ref_url="https://www.suse.com/security/cve/CVE-2016-10198/" source="CVE"/>
		<reference ref_id="CVE-2016-10199" ref_url="https://www.suse.com/security/cve/CVE-2016-10199/" source="CVE"/>
		<reference ref_id="CVE-2016-9634" ref_url="https://www.suse.com/security/cve/CVE-2016-9634/" source="CVE"/>
		<reference ref_id="CVE-2016-9635" ref_url="https://www.suse.com/security/cve/CVE-2016-9635/" source="CVE"/>
		<reference ref_id="CVE-2016-9636" ref_url="https://www.suse.com/security/cve/CVE-2016-9636/" source="CVE"/>
		<reference ref_id="CVE-2016-9807" ref_url="https://www.suse.com/security/cve/CVE-2016-9807/" source="CVE"/>
		<reference ref_id="CVE-2016-9808" ref_url="https://www.suse.com/security/cve/CVE-2016-9808/" source="CVE"/>
		<reference ref_id="CVE-2016-9810" ref_url="https://www.suse.com/security/cve/CVE-2016-9810/" source="CVE"/>
		<reference ref_id="CVE-2017-5840" ref_url="https://www.suse.com/security/cve/CVE-2017-5840/" source="CVE"/>
		<reference ref_id="CVE-2017-5841" ref_url="https://www.suse.com/security/cve/CVE-2017-5841/" source="CVE"/>
		<reference ref_id="CVE-2017-5845" ref_url="https://www.suse.com/security/cve/CVE-2017-5845/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-good-1.8.3-15.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10198/">CVE-2016-10198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10198">CVE-2016-10198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10199/">CVE-2016-10199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10199">CVE-2016-10199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9634/">CVE-2016-9634 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9634">CVE-2016-9634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9635/">CVE-2016-9635 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9635">CVE-2016-9635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9636/">CVE-2016-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9636">CVE-2016-9636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9807/">CVE-2016-9807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9807">CVE-2016-9807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9808/">CVE-2016-9808 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9808">CVE-2016-9808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9810/">CVE-2016-9810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9810">CVE-2016-9810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5840/">CVE-2017-5840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5840">CVE-2017-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5841/">CVE-2017-5841 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5841">CVE-2017-5841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5845/">CVE-2017-5845 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5845">CVE-2017-5845 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159019" comment="gstreamer-plugins-good-1.8.3-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159020" comment="gstreamer-plugins-good-lang-1.8.3-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147875" version="1" class="patch">
	<metadata>
		<title>gtk2-data-2.24.31-7.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<description>
These are all security issues fixed in the gtk2-data-2.24.31-7.11 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7447">CVE-2013-7447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140657" comment="gtk2-data-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140658" comment="gtk2-lang-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140659" comment="gtk2-tools-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140660" comment="gtk2-tools-32bit-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140661" comment="libgtk-2_0-0-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140662" comment="libgtk-2_0-0-32bit-2.24.31-7.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147876" version="1" class="patch">
	<metadata>
		<title>guestfs-data-1.32.4-19.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2124" ref_url="https://www.suse.com/security/cve/CVE-2013-2124/" source="CVE"/>
		<reference ref_id="CVE-2013-4419" ref_url="https://www.suse.com/security/cve/CVE-2013-4419/" source="CVE"/>
		<description>
These are all security issues fixed in the guestfs-data-1.32.4-19.24 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2124/">CVE-2013-2124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2124">CVE-2013-2124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4419/">CVE-2013-4419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4419">CVE-2013-4419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159021" comment="guestfs-data-1.32.4-19.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159022" comment="guestfs-tools-1.32.4-19.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159023" comment="guestfsd-1.32.4-19.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159024" comment="libguestfs0-1.32.4-19.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159025" comment="perl-Sys-Guestfs-1.32.4-19.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159026" comment="python-libguestfs-1.32.4-19.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159027" comment="virt-p2v-1.32.4-19.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159028" comment="virt-v2v-1.32.4-19.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147877" version="1" class="patch">
	<metadata>
		<title>guile-2.0.9-8.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-8605" ref_url="https://www.suse.com/security/cve/CVE-2016-8605/" source="CVE"/>
		<description>
These are all security issues fixed in the guile-2.0.9-8.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8605/">CVE-2016-8605 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8605">CVE-2016-8605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009148134" comment="guile-2.0.9-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148135" comment="guile-modules-2_0-2.0.9-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148136" comment="libguile-2_0-22-2.0.9-8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147878" version="1" class="patch">
	<metadata>
		<title>gv-3.7.4-1.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>
These are all security issues fixed in the gv-3.7.4-1.36 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3386">CVE-2012-3386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140671" comment="gv-3.7.4-1.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140672" comment="wdiff-1.2.1-3.64 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147879" version="1" class="patch">
	<metadata>
		<title>gvim-7.4.326-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0316" ref_url="https://www.suse.com/security/cve/CVE-2009-0316/" source="CVE"/>
		<reference ref_id="CVE-2016-1248" ref_url="https://www.suse.com/security/cve/CVE-2016-1248/" source="CVE"/>
		<reference ref_id="CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953/" source="CVE"/>
		<reference ref_id="CVE-2017-6349" ref_url="https://www.suse.com/security/cve/CVE-2017-6349/" source="CVE"/>
		<reference ref_id="CVE-2017-6350" ref_url="https://www.suse.com/security/cve/CVE-2017-6350/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-7.4.326-16.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0316/">CVE-2009-0316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0316">CVE-2009-0316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1248/">CVE-2016-1248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1248">CVE-2016-1248 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5953">CVE-2017-5953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6349/">CVE-2017-6349 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6349">CVE-2017-6349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6350/">CVE-2017-6350 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6350">CVE-2017-6350 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009157587" comment="gvim-7.4.326-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157588" comment="vim-7.4.326-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157589" comment="vim-data-7.4.326-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147880" version="1" class="patch">
	<metadata>
		<title>gzip-1.6-7.209 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2624" ref_url="https://www.suse.com/security/cve/CVE-2009-2624/" source="CVE"/>
		<reference ref_id="CVE-2010-0001" ref_url="https://www.suse.com/security/cve/CVE-2010-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the gzip-1.6-7.209 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2624/">CVE-2009-2624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2624">CVE-2009-2624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0001/">CVE-2010-0001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0001">CVE-2010-0001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140677" comment="gzip-1.6-7.392 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147881" version="1" class="patch">
	<metadata>
		<title>hardlink-1.0-6.38 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3630" ref_url="https://www.suse.com/security/cve/CVE-2011-3630/" source="CVE"/>
		<reference ref_id="CVE-2011-3631" ref_url="https://www.suse.com/security/cve/CVE-2011-3631/" source="CVE"/>
		<reference ref_id="CVE-2011-3632" ref_url="https://www.suse.com/security/cve/CVE-2011-3632/" source="CVE"/>
		<description>
These are all security issues fixed in the hardlink-1.0-6.38 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3630/">CVE-2011-3630 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3630">CVE-2011-3630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3631/">CVE-2011-3631 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3631">CVE-2011-3631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3632/">CVE-2011-3632 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3632">CVE-2011-3632 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140678" comment="hardlink-1.0-6.45 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147882" version="1" class="patch">
	<metadata>
		<title>hplip-3.16.11-1.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2004-0801" ref_url="https://www.suse.com/security/cve/CVE-2004-0801/" source="CVE"/>
		<reference ref_id="CVE-2010-4267" ref_url="https://www.suse.com/security/cve/CVE-2010-4267/" source="CVE"/>
		<reference ref_id="CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697/" source="CVE"/>
		<reference ref_id="CVE-2011-2722" ref_url="https://www.suse.com/security/cve/CVE-2011-2722/" source="CVE"/>
		<reference ref_id="CVE-2013-4325" ref_url="https://www.suse.com/security/cve/CVE-2013-4325/" source="CVE"/>
		<reference ref_id="CVE-2013-6402" ref_url="https://www.suse.com/security/cve/CVE-2013-6402/" source="CVE"/>
		<reference ref_id="CVE-2013-6427" ref_url="https://www.suse.com/security/cve/CVE-2013-6427/" source="CVE"/>
		<reference ref_id="CVE-2015-0839" ref_url="https://www.suse.com/security/cve/CVE-2015-0839/" source="CVE"/>
		<description>
These are all security issues fixed in the hplip-3.16.11-1.33 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2004-0801/">CVE-2004-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-0801">CVE-2004-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4267/">CVE-2010-4267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4267">CVE-2010-4267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2697">CVE-2011-2697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2722/">CVE-2011-2722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2722">CVE-2011-2722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4325/">CVE-2013-4325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4325">CVE-2013-4325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6402/">CVE-2013-6402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6402">CVE-2013-6402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6427/">CVE-2013-6427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6427">CVE-2013-6427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0839/">CVE-2015-0839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0839">CVE-2015-0839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159029" comment="hplip-3.16.11-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159030" comment="hplip-hpijs-3.16.11-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159031" comment="hplip-sane-3.16.11-1.33 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147883" version="1" class="patch">
	<metadata>
		<title>hyper-v-7-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2669" ref_url="https://www.suse.com/security/cve/CVE-2012-2669/" source="CVE"/>
		<reference ref_id="CVE-2012-5532" ref_url="https://www.suse.com/security/cve/CVE-2012-5532/" source="CVE"/>
		<description>
These are all security issues fixed in the hyper-v-7-13.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2669/">CVE-2012-2669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2669">CVE-2012-2669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5532/">CVE-2012-5532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5532">CVE-2012-5532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140682" comment="hyper-v-7-13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147884" version="1" class="patch">
	<metadata>
		<title>ibus-chewing-1.4.14-4.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-4509" ref_url="https://www.suse.com/security/cve/CVE-2013-4509/" source="CVE"/>
		<description>
These are all security issues fixed in the ibus-chewing-1.4.14-4.11 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4509/">CVE-2013-4509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4509">CVE-2013-4509 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140683" comment="ibus-chewing-1.4.14-4.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159032" comment="ibus-pinyin-1.5.0-11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147885" version="1" class="patch">
	<metadata>
		<title>ipsec-tools-0.8.0-18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-4047" ref_url="https://www.suse.com/security/cve/CVE-2015-4047/" source="CVE"/>
		<description>
These are all security issues fixed in the ipsec-tools-0.8.0-18.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4047/">CVE-2015-4047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4047">CVE-2015-4047 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159033" comment="ipsec-tools-0.8.0-18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147886" version="1" class="patch">
	<metadata>
		<title>iputils-s20121221-2.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2529" ref_url="https://www.suse.com/security/cve/CVE-2010-2529/" source="CVE"/>
		<description>
These are all security issues fixed in the iputils-s20121221-2.17 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2529/">CVE-2010-2529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2529">CVE-2010-2529 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140686" comment="iputils-s20121221-2.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147887" version="1" class="patch">
	<metadata>
		<title>jakarta-commons-fileupload-1.1.1-120.113 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2186" ref_url="https://www.suse.com/security/cve/CVE-2013-2186/" source="CVE"/>
		<reference ref_id="CVE-2014-0050" ref_url="https://www.suse.com/security/cve/CVE-2014-0050/" source="CVE"/>
		<description>
These are all security issues fixed in the jakarta-commons-fileupload-1.1.1-120.113 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2186/">CVE-2013-2186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2186">CVE-2013-2186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0050/">CVE-2014-0050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0050">CVE-2014-0050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140687" comment="jakarta-commons-fileupload-1.1.1-120.238 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140688" comment="jakarta-commons-fileupload-javadoc-1.1.1-120.238 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147888" version="1" class="patch">
	<metadata>
		<title>jakarta-taglibs-standard-1.1.1-255.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-0254" ref_url="https://www.suse.com/security/cve/CVE-2015-0254/" source="CVE"/>
		<description>
These are all security issues fixed in the jakarta-taglibs-standard-1.1.1-255.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0254/">CVE-2015-0254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0254">CVE-2015-0254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156771" comment="jakarta-taglibs-standard-1.1.1-255.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156772" comment="jakarta-taglibs-standard-javadoc-1.1.1-255.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147889" version="1" class="patch">
	<metadata>
		<title>java-1_7_0-openjdk-1.7.0.141-42.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3563" ref_url="https://www.suse.com/security/cve/CVE-2011-3563/" source="CVE"/>
		<reference ref_id="CVE-2011-3571" ref_url="https://www.suse.com/security/cve/CVE-2011-3571/" source="CVE"/>
		<reference ref_id="CVE-2011-5035" ref_url="https://www.suse.com/security/cve/CVE-2011-5035/" source="CVE"/>
		<reference ref_id="CVE-2012-0497" ref_url="https://www.suse.com/security/cve/CVE-2012-0497/" source="CVE"/>
		<reference ref_id="CVE-2012-0501" ref_url="https://www.suse.com/security/cve/CVE-2012-0501/" source="CVE"/>
		<reference ref_id="CVE-2012-0502" ref_url="https://www.suse.com/security/cve/CVE-2012-0502/" source="CVE"/>
		<reference ref_id="CVE-2012-0503" ref_url="https://www.suse.com/security/cve/CVE-2012-0503/" source="CVE"/>
		<reference ref_id="CVE-2012-0505" ref_url="https://www.suse.com/security/cve/CVE-2012-0505/" source="CVE"/>
		<reference ref_id="CVE-2012-0506" ref_url="https://www.suse.com/security/cve/CVE-2012-0506/" source="CVE"/>
		<reference ref_id="CVE-2012-0547" ref_url="https://www.suse.com/security/cve/CVE-2012-0547/" source="CVE"/>
		<reference ref_id="CVE-2012-1682" ref_url="https://www.suse.com/security/cve/CVE-2012-1682/" source="CVE"/>
		<reference ref_id="CVE-2012-1711" ref_url="https://www.suse.com/security/cve/CVE-2012-1711/" source="CVE"/>
		<reference ref_id="CVE-2012-1713" ref_url="https://www.suse.com/security/cve/CVE-2012-1713/" source="CVE"/>
		<reference ref_id="CVE-2012-1716" ref_url="https://www.suse.com/security/cve/CVE-2012-1716/" source="CVE"/>
		<reference ref_id="CVE-2012-1717" ref_url="https://www.suse.com/security/cve/CVE-2012-1717/" source="CVE"/>
		<reference ref_id="CVE-2012-1718" ref_url="https://www.suse.com/security/cve/CVE-2012-1718/" source="CVE"/>
		<reference ref_id="CVE-2012-1719" ref_url="https://www.suse.com/security/cve/CVE-2012-1719/" source="CVE"/>
		<reference ref_id="CVE-2012-1723" ref_url="https://www.suse.com/security/cve/CVE-2012-1723/" source="CVE"/>
		<reference ref_id="CVE-2012-1724" ref_url="https://www.suse.com/security/cve/CVE-2012-1724/" source="CVE"/>
		<reference ref_id="CVE-2012-1725" ref_url="https://www.suse.com/security/cve/CVE-2012-1725/" source="CVE"/>
		<reference ref_id="CVE-2012-1726" ref_url="https://www.suse.com/security/cve/CVE-2012-1726/" source="CVE"/>
		<reference ref_id="CVE-2012-3136" ref_url="https://www.suse.com/security/cve/CVE-2012-3136/" source="CVE"/>
		<reference ref_id="CVE-2012-3174" ref_url="https://www.suse.com/security/cve/CVE-2012-3174/" source="CVE"/>
		<reference ref_id="CVE-2012-3216" ref_url="https://www.suse.com/security/cve/CVE-2012-3216/" source="CVE"/>
		<reference ref_id="CVE-2012-4416" ref_url="https://www.suse.com/security/cve/CVE-2012-4416/" source="CVE"/>
		<reference ref_id="CVE-2012-4681" ref_url="https://www.suse.com/security/cve/CVE-2012-4681/" source="CVE"/>
		<reference ref_id="CVE-2012-5068" ref_url="https://www.suse.com/security/cve/CVE-2012-5068/" source="CVE"/>
		<reference ref_id="CVE-2012-5069" ref_url="https://www.suse.com/security/cve/CVE-2012-5069/" source="CVE"/>
		<reference ref_id="CVE-2012-5070" ref_url="https://www.suse.com/security/cve/CVE-2012-5070/" source="CVE"/>
		<reference ref_id="CVE-2012-5071" ref_url="https://www.suse.com/security/cve/CVE-2012-5071/" source="CVE"/>
		<reference ref_id="CVE-2012-5072" ref_url="https://www.suse.com/security/cve/CVE-2012-5072/" source="CVE"/>
		<reference ref_id="CVE-2012-5073" ref_url="https://www.suse.com/security/cve/CVE-2012-5073/" source="CVE"/>
		<reference ref_id="CVE-2012-5074" ref_url="https://www.suse.com/security/cve/CVE-2012-5074/" source="CVE"/>
		<reference ref_id="CVE-2012-5075" ref_url="https://www.suse.com/security/cve/CVE-2012-5075/" source="CVE"/>
		<reference ref_id="CVE-2012-5076" ref_url="https://www.suse.com/security/cve/CVE-2012-5076/" source="CVE"/>
		<reference ref_id="CVE-2012-5077" ref_url="https://www.suse.com/security/cve/CVE-2012-5077/" source="CVE"/>
		<reference ref_id="CVE-2012-5079" ref_url="https://www.suse.com/security/cve/CVE-2012-5079/" source="CVE"/>
		<reference ref_id="CVE-2012-5081" ref_url="https://www.suse.com/security/cve/CVE-2012-5081/" source="CVE"/>
		<reference ref_id="CVE-2012-5084" ref_url="https://www.suse.com/security/cve/CVE-2012-5084/" source="CVE"/>
		<reference ref_id="CVE-2012-5085" ref_url="https://www.suse.com/security/cve/CVE-2012-5085/" source="CVE"/>
		<reference ref_id="CVE-2012-5086" ref_url="https://www.suse.com/security/cve/CVE-2012-5086/" source="CVE"/>
		<reference ref_id="CVE-2012-5087" ref_url="https://www.suse.com/security/cve/CVE-2012-5087/" source="CVE"/>
		<reference ref_id="CVE-2012-5088" ref_url="https://www.suse.com/security/cve/CVE-2012-5088/" source="CVE"/>
		<reference ref_id="CVE-2012-5089" ref_url="https://www.suse.com/security/cve/CVE-2012-5089/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-0401" ref_url="https://www.suse.com/security/cve/CVE-2013-0401/" source="CVE"/>
		<reference ref_id="CVE-2013-0422" ref_url="https://www.suse.com/security/cve/CVE-2013-0422/" source="CVE"/>
		<reference ref_id="CVE-2013-0424" ref_url="https://www.suse.com/security/cve/CVE-2013-0424/" source="CVE"/>
		<reference ref_id="CVE-2013-0425" ref_url="https://www.suse.com/security/cve/CVE-2013-0425/" source="CVE"/>
		<reference ref_id="CVE-2013-0426" ref_url="https://www.suse.com/security/cve/CVE-2013-0426/" source="CVE"/>
		<reference ref_id="CVE-2013-0427" ref_url="https://www.suse.com/security/cve/CVE-2013-0427/" source="CVE"/>
		<reference ref_id="CVE-2013-0428" ref_url="https://www.suse.com/security/cve/CVE-2013-0428/" source="CVE"/>
		<reference ref_id="CVE-2013-0429" ref_url="https://www.suse.com/security/cve/CVE-2013-0429/" source="CVE"/>
		<reference ref_id="CVE-2013-0431" ref_url="https://www.suse.com/security/cve/CVE-2013-0431/" source="CVE"/>
		<reference ref_id="CVE-2013-0432" ref_url="https://www.suse.com/security/cve/CVE-2013-0432/" source="CVE"/>
		<reference ref_id="CVE-2013-0433" ref_url="https://www.suse.com/security/cve/CVE-2013-0433/" source="CVE"/>
		<reference ref_id="CVE-2013-0434" ref_url="https://www.suse.com/security/cve/CVE-2013-0434/" source="CVE"/>
		<reference ref_id="CVE-2013-0435" ref_url="https://www.suse.com/security/cve/CVE-2013-0435/" source="CVE"/>
		<reference ref_id="CVE-2013-0440" ref_url="https://www.suse.com/security/cve/CVE-2013-0440/" source="CVE"/>
		<reference ref_id="CVE-2013-0441" ref_url="https://www.suse.com/security/cve/CVE-2013-0441/" source="CVE"/>
		<reference ref_id="CVE-2013-0442" ref_url="https://www.suse.com/security/cve/CVE-2013-0442/" source="CVE"/>
		<reference ref_id="CVE-2013-0443" ref_url="https://www.suse.com/security/cve/CVE-2013-0443/" source="CVE"/>
		<reference ref_id="CVE-2013-0444" ref_url="https://www.suse.com/security/cve/CVE-2013-0444/" source="CVE"/>
		<reference ref_id="CVE-2013-0450" ref_url="https://www.suse.com/security/cve/CVE-2013-0450/" source="CVE"/>
		<reference ref_id="CVE-2013-0809" ref_url="https://www.suse.com/security/cve/CVE-2013-0809/" source="CVE"/>
		<reference ref_id="CVE-2013-1475" ref_url="https://www.suse.com/security/cve/CVE-2013-1475/" source="CVE"/>
		<reference ref_id="CVE-2013-1476" ref_url="https://www.suse.com/security/cve/CVE-2013-1476/" source="CVE"/>
		<reference ref_id="CVE-2013-1478" ref_url="https://www.suse.com/security/cve/CVE-2013-1478/" source="CVE"/>
		<reference ref_id="CVE-2013-1480" ref_url="https://www.suse.com/security/cve/CVE-2013-1480/" source="CVE"/>
		<reference ref_id="CVE-2013-1484" ref_url="https://www.suse.com/security/cve/CVE-2013-1484/" source="CVE"/>
		<reference ref_id="CVE-2013-1485" ref_url="https://www.suse.com/security/cve/CVE-2013-1485/" source="CVE"/>
		<reference ref_id="CVE-2013-1486" ref_url="https://www.suse.com/security/cve/CVE-2013-1486/" source="CVE"/>
		<reference ref_id="CVE-2013-1488" ref_url="https://www.suse.com/security/cve/CVE-2013-1488/" source="CVE"/>
		<reference ref_id="CVE-2013-1493" ref_url="https://www.suse.com/security/cve/CVE-2013-1493/" source="CVE"/>
		<reference ref_id="CVE-2013-1500" ref_url="https://www.suse.com/security/cve/CVE-2013-1500/" source="CVE"/>
		<reference ref_id="CVE-2013-1518" ref_url="https://www.suse.com/security/cve/CVE-2013-1518/" source="CVE"/>
		<reference ref_id="CVE-2013-1537" ref_url="https://www.suse.com/security/cve/CVE-2013-1537/" source="CVE"/>
		<reference ref_id="CVE-2013-1557" ref_url="https://www.suse.com/security/cve/CVE-2013-1557/" source="CVE"/>
		<reference ref_id="CVE-2013-1569" ref_url="https://www.suse.com/security/cve/CVE-2013-1569/" source="CVE"/>
		<reference ref_id="CVE-2013-1571" ref_url="https://www.suse.com/security/cve/CVE-2013-1571/" source="CVE"/>
		<reference ref_id="CVE-2013-2383" ref_url="https://www.suse.com/security/cve/CVE-2013-2383/" source="CVE"/>
		<reference ref_id="CVE-2013-2384" ref_url="https://www.suse.com/security/cve/CVE-2013-2384/" source="CVE"/>
		<reference ref_id="CVE-2013-2407" ref_url="https://www.suse.com/security/cve/CVE-2013-2407/" source="CVE"/>
		<reference ref_id="CVE-2013-2412" ref_url="https://www.suse.com/security/cve/CVE-2013-2412/" source="CVE"/>
		<reference ref_id="CVE-2013-2415" ref_url="https://www.suse.com/security/cve/CVE-2013-2415/" source="CVE"/>
		<reference ref_id="CVE-2013-2417" ref_url="https://www.suse.com/security/cve/CVE-2013-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-2419" ref_url="https://www.suse.com/security/cve/CVE-2013-2419/" source="CVE"/>
		<reference ref_id="CVE-2013-2420" ref_url="https://www.suse.com/security/cve/CVE-2013-2420/" source="CVE"/>
		<reference ref_id="CVE-2013-2421" ref_url="https://www.suse.com/security/cve/CVE-2013-2421/" source="CVE"/>
		<reference ref_id="CVE-2013-2422" ref_url="https://www.suse.com/security/cve/CVE-2013-2422/" source="CVE"/>
		<reference ref_id="CVE-2013-2423" ref_url="https://www.suse.com/security/cve/CVE-2013-2423/" source="CVE"/>
		<reference ref_id="CVE-2013-2424" ref_url="https://www.suse.com/security/cve/CVE-2013-2424/" source="CVE"/>
		<reference ref_id="CVE-2013-2426" ref_url="https://www.suse.com/security/cve/CVE-2013-2426/" source="CVE"/>
		<reference ref_id="CVE-2013-2429" ref_url="https://www.suse.com/security/cve/CVE-2013-2429/" source="CVE"/>
		<reference ref_id="CVE-2013-2430" ref_url="https://www.suse.com/security/cve/CVE-2013-2430/" source="CVE"/>
		<reference ref_id="CVE-2013-2431" ref_url="https://www.suse.com/security/cve/CVE-2013-2431/" source="CVE"/>
		<reference ref_id="CVE-2013-2436" ref_url="https://www.suse.com/security/cve/CVE-2013-2436/" source="CVE"/>
		<reference ref_id="CVE-2013-2443" ref_url="https://www.suse.com/security/cve/CVE-2013-2443/" source="CVE"/>
		<reference ref_id="CVE-2013-2444" ref_url="https://www.suse.com/security/cve/CVE-2013-2444/" source="CVE"/>
		<reference ref_id="CVE-2013-2445" ref_url="https://www.suse.com/security/cve/CVE-2013-2445/" source="CVE"/>
		<reference ref_id="CVE-2013-2446" ref_url="https://www.suse.com/security/cve/CVE-2013-2446/" source="CVE"/>
		<reference ref_id="CVE-2013-2447" ref_url="https://www.suse.com/security/cve/CVE-2013-2447/" source="CVE"/>
		<reference ref_id="CVE-2013-2448" ref_url="https://www.suse.com/security/cve/CVE-2013-2448/" source="CVE"/>
		<reference ref_id="CVE-2013-2449" ref_url="https://www.suse.com/security/cve/CVE-2013-2449/" source="CVE"/>
		<reference ref_id="CVE-2013-2450" ref_url="https://www.suse.com/security/cve/CVE-2013-2450/" source="CVE"/>
		<reference ref_id="CVE-2013-2451" ref_url="https://www.suse.com/security/cve/CVE-2013-2451/" source="CVE"/>
		<reference ref_id="CVE-2013-2452" ref_url="https://www.suse.com/security/cve/CVE-2013-2452/" source="CVE"/>
		<reference ref_id="CVE-2013-2453" ref_url="https://www.suse.com/security/cve/CVE-2013-2453/" source="CVE"/>
		<reference ref_id="CVE-2013-2454" ref_url="https://www.suse.com/security/cve/CVE-2013-2454/" source="CVE"/>
		<reference ref_id="CVE-2013-2455" ref_url="https://www.suse.com/security/cve/CVE-2013-2455/" source="CVE"/>
		<reference ref_id="CVE-2013-2456" ref_url="https://www.suse.com/security/cve/CVE-2013-2456/" source="CVE"/>
		<reference ref_id="CVE-2013-2457" ref_url="https://www.suse.com/security/cve/CVE-2013-2457/" source="CVE"/>
		<reference ref_id="CVE-2013-2458" ref_url="https://www.suse.com/security/cve/CVE-2013-2458/" source="CVE"/>
		<reference ref_id="CVE-2013-2459" ref_url="https://www.suse.com/security/cve/CVE-2013-2459/" source="CVE"/>
		<reference ref_id="CVE-2013-2460" ref_url="https://www.suse.com/security/cve/CVE-2013-2460/" source="CVE"/>
		<reference ref_id="CVE-2013-2461" ref_url="https://www.suse.com/security/cve/CVE-2013-2461/" source="CVE"/>
		<reference ref_id="CVE-2013-2463" ref_url="https://www.suse.com/security/cve/CVE-2013-2463/" source="CVE"/>
		<reference ref_id="CVE-2013-2465" ref_url="https://www.suse.com/security/cve/CVE-2013-2465/" source="CVE"/>
		<reference ref_id="CVE-2013-2469" ref_url="https://www.suse.com/security/cve/CVE-2013-2469/" source="CVE"/>
		<reference ref_id="CVE-2013-2470" ref_url="https://www.suse.com/security/cve/CVE-2013-2470/" source="CVE"/>
		<reference ref_id="CVE-2013-2471" ref_url="https://www.suse.com/security/cve/CVE-2013-2471/" source="CVE"/>
		<reference ref_id="CVE-2013-2472" ref_url="https://www.suse.com/security/cve/CVE-2013-2472/" source="CVE"/>
		<reference ref_id="CVE-2013-2473" ref_url="https://www.suse.com/security/cve/CVE-2013-2473/" source="CVE"/>
		<reference ref_id="CVE-2013-3829" ref_url="https://www.suse.com/security/cve/CVE-2013-3829/" source="CVE"/>
		<reference ref_id="CVE-2013-4002" ref_url="https://www.suse.com/security/cve/CVE-2013-4002/" source="CVE"/>
		<reference ref_id="CVE-2013-5772" ref_url="https://www.suse.com/security/cve/CVE-2013-5772/" source="CVE"/>
		<reference ref_id="CVE-2013-5774" ref_url="https://www.suse.com/security/cve/CVE-2013-5774/" source="CVE"/>
		<reference ref_id="CVE-2013-5778" ref_url="https://www.suse.com/security/cve/CVE-2013-5778/" source="CVE"/>
		<reference ref_id="CVE-2013-5780" ref_url="https://www.suse.com/security/cve/CVE-2013-5780/" source="CVE"/>
		<reference ref_id="CVE-2013-5782" ref_url="https://www.suse.com/security/cve/CVE-2013-5782/" source="CVE"/>
		<reference ref_id="CVE-2013-5783" ref_url="https://www.suse.com/security/cve/CVE-2013-5783/" source="CVE"/>
		<reference ref_id="CVE-2013-5784" ref_url="https://www.suse.com/security/cve/CVE-2013-5784/" source="CVE"/>
		<reference ref_id="CVE-2013-5790" ref_url="https://www.suse.com/security/cve/CVE-2013-5790/" source="CVE"/>
		<reference ref_id="CVE-2013-5797" ref_url="https://www.suse.com/security/cve/CVE-2013-5797/" source="CVE"/>
		<reference ref_id="CVE-2013-5800" ref_url="https://www.suse.com/security/cve/CVE-2013-5800/" source="CVE"/>
		<reference ref_id="CVE-2013-5802" ref_url="https://www.suse.com/security/cve/CVE-2013-5802/" source="CVE"/>
		<reference ref_id="CVE-2013-5803" ref_url="https://www.suse.com/security/cve/CVE-2013-5803/" source="CVE"/>
		<reference ref_id="CVE-2013-5804" ref_url="https://www.suse.com/security/cve/CVE-2013-5804/" source="CVE"/>
		<reference ref_id="CVE-2013-5805" ref_url="https://www.suse.com/security/cve/CVE-2013-5805/" source="CVE"/>
		<reference ref_id="CVE-2013-5806" ref_url="https://www.suse.com/security/cve/CVE-2013-5806/" source="CVE"/>
		<reference ref_id="CVE-2013-5809" ref_url="https://www.suse.com/security/cve/CVE-2013-5809/" source="CVE"/>
		<reference ref_id="CVE-2013-5814" ref_url="https://www.suse.com/security/cve/CVE-2013-5814/" source="CVE"/>
		<reference ref_id="CVE-2013-5817" ref_url="https://www.suse.com/security/cve/CVE-2013-5817/" source="CVE"/>
		<reference ref_id="CVE-2013-5820" ref_url="https://www.suse.com/security/cve/CVE-2013-5820/" source="CVE"/>
		<reference ref_id="CVE-2013-5823" ref_url="https://www.suse.com/security/cve/CVE-2013-5823/" source="CVE"/>
		<reference ref_id="CVE-2013-5825" ref_url="https://www.suse.com/security/cve/CVE-2013-5825/" source="CVE"/>
		<reference ref_id="CVE-2013-5829" ref_url="https://www.suse.com/security/cve/CVE-2013-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-5830" ref_url="https://www.suse.com/security/cve/CVE-2013-5830/" source="CVE"/>
		<reference ref_id="CVE-2013-5840" ref_url="https://www.suse.com/security/cve/CVE-2013-5840/" source="CVE"/>
		<reference ref_id="CVE-2013-5842" ref_url="https://www.suse.com/security/cve/CVE-2013-5842/" source="CVE"/>
		<reference ref_id="CVE-2013-5849" ref_url="https://www.suse.com/security/cve/CVE-2013-5849/" source="CVE"/>
		<reference ref_id="CVE-2013-5850" ref_url="https://www.suse.com/security/cve/CVE-2013-5850/" source="CVE"/>
		<reference ref_id="CVE-2013-5851" ref_url="https://www.suse.com/security/cve/CVE-2013-5851/" source="CVE"/>
		<reference ref_id="CVE-2013-5878" ref_url="https://www.suse.com/security/cve/CVE-2013-5878/" source="CVE"/>
		<reference ref_id="CVE-2013-5884" ref_url="https://www.suse.com/security/cve/CVE-2013-5884/" source="CVE"/>
		<reference ref_id="CVE-2013-5893" ref_url="https://www.suse.com/security/cve/CVE-2013-5893/" source="CVE"/>
		<reference ref_id="CVE-2013-5896" ref_url="https://www.suse.com/security/cve/CVE-2013-5896/" source="CVE"/>
		<reference ref_id="CVE-2013-5907" ref_url="https://www.suse.com/security/cve/CVE-2013-5907/" source="CVE"/>
		<reference ref_id="CVE-2013-5910" ref_url="https://www.suse.com/security/cve/CVE-2013-5910/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954/" source="CVE"/>
		<reference ref_id="CVE-2014-0368" ref_url="https://www.suse.com/security/cve/CVE-2014-0368/" source="CVE"/>
		<reference ref_id="CVE-2014-0373" ref_url="https://www.suse.com/security/cve/CVE-2014-0373/" source="CVE"/>
		<reference ref_id="CVE-2014-0376" ref_url="https://www.suse.com/security/cve/CVE-2014-0376/" source="CVE"/>
		<reference ref_id="CVE-2014-0408" ref_url="https://www.suse.com/security/cve/CVE-2014-0408/" source="CVE"/>
		<reference ref_id="CVE-2014-0411" ref_url="https://www.suse.com/security/cve/CVE-2014-0411/" source="CVE"/>
		<reference ref_id="CVE-2014-0416" ref_url="https://www.suse.com/security/cve/CVE-2014-0416/" source="CVE"/>
		<reference ref_id="CVE-2014-0422" ref_url="https://www.suse.com/security/cve/CVE-2014-0422/" source="CVE"/>
		<reference ref_id="CVE-2014-0423" ref_url="https://www.suse.com/security/cve/CVE-2014-0423/" source="CVE"/>
		<reference ref_id="CVE-2014-0428" ref_url="https://www.suse.com/security/cve/CVE-2014-0428/" source="CVE"/>
		<reference ref_id="CVE-2014-0429" ref_url="https://www.suse.com/security/cve/CVE-2014-0429/" source="CVE"/>
		<reference ref_id="CVE-2014-0446" ref_url="https://www.suse.com/security/cve/CVE-2014-0446/" source="CVE"/>
		<reference ref_id="CVE-2014-0451" ref_url="https://www.suse.com/security/cve/CVE-2014-0451/" source="CVE"/>
		<reference ref_id="CVE-2014-0452" ref_url="https://www.suse.com/security/cve/CVE-2014-0452/" source="CVE"/>
		<reference ref_id="CVE-2014-0453" ref_url="https://www.suse.com/security/cve/CVE-2014-0453/" source="CVE"/>
		<reference ref_id="CVE-2014-0454" ref_url="https://www.suse.com/security/cve/CVE-2014-0454/" source="CVE"/>
		<reference ref_id="CVE-2014-0455" ref_url="https://www.suse.com/security/cve/CVE-2014-0455/" source="CVE"/>
		<reference ref_id="CVE-2014-0456" ref_url="https://www.suse.com/security/cve/CVE-2014-0456/" source="CVE"/>
		<reference ref_id="CVE-2014-0457" ref_url="https://www.suse.com/security/cve/CVE-2014-0457/" source="CVE"/>
		<reference ref_id="CVE-2014-0458" ref_url="https://www.suse.com/security/cve/CVE-2014-0458/" source="CVE"/>
		<reference ref_id="CVE-2014-0459" ref_url="https://www.suse.com/security/cve/CVE-2014-0459/" source="CVE"/>
		<reference ref_id="CVE-2014-0460" ref_url="https://www.suse.com/security/cve/CVE-2014-0460/" source="CVE"/>
		<reference ref_id="CVE-2014-0461" ref_url="https://www.suse.com/security/cve/CVE-2014-0461/" source="CVE"/>
		<reference ref_id="CVE-2014-1876" ref_url="https://www.suse.com/security/cve/CVE-2014-1876/" source="CVE"/>
		<reference ref_id="CVE-2014-2397" ref_url="https://www.suse.com/security/cve/CVE-2014-2397/" source="CVE"/>
		<reference ref_id="CVE-2014-2398" ref_url="https://www.suse.com/security/cve/CVE-2014-2398/" source="CVE"/>
		<reference ref_id="CVE-2014-2402" ref_url="https://www.suse.com/security/cve/CVE-2014-2402/" source="CVE"/>
		<reference ref_id="CVE-2014-2403" ref_url="https://www.suse.com/security/cve/CVE-2014-2403/" source="CVE"/>
		<reference ref_id="CVE-2014-2412" ref_url="https://www.suse.com/security/cve/CVE-2014-2412/" source="CVE"/>
		<reference ref_id="CVE-2014-2413" ref_url="https://www.suse.com/security/cve/CVE-2014-2413/" source="CVE"/>
		<reference ref_id="CVE-2014-2414" ref_url="https://www.suse.com/security/cve/CVE-2014-2414/" source="CVE"/>
		<reference ref_id="CVE-2014-2421" ref_url="https://www.suse.com/security/cve/CVE-2014-2421/" source="CVE"/>
		<reference ref_id="CVE-2014-2423" ref_url="https://www.suse.com/security/cve/CVE-2014-2423/" source="CVE"/>
		<reference ref_id="CVE-2014-2427" ref_url="https://www.suse.com/security/cve/CVE-2014-2427/" source="CVE"/>
		<reference ref_id="CVE-2014-2483" ref_url="https://www.suse.com/security/cve/CVE-2014-2483/" source="CVE"/>
		<reference ref_id="CVE-2014-2490" ref_url="https://www.suse.com/security/cve/CVE-2014-2490/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4209" ref_url="https://www.suse.com/security/cve/CVE-2014-4209/" source="CVE"/>
		<reference ref_id="CVE-2014-4216" ref_url="https://www.suse.com/security/cve/CVE-2014-4216/" source="CVE"/>
		<reference ref_id="CVE-2014-4218" ref_url="https://www.suse.com/security/cve/CVE-2014-4218/" source="CVE"/>
		<reference ref_id="CVE-2014-4219" ref_url="https://www.suse.com/security/cve/CVE-2014-4219/" source="CVE"/>
		<reference ref_id="CVE-2014-4221" ref_url="https://www.suse.com/security/cve/CVE-2014-4221/" source="CVE"/>
		<reference ref_id="CVE-2014-4223" ref_url="https://www.suse.com/security/cve/CVE-2014-4223/" source="CVE"/>
		<reference ref_id="CVE-2014-4244" ref_url="https://www.suse.com/security/cve/CVE-2014-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-4252" ref_url="https://www.suse.com/security/cve/CVE-2014-4252/" source="CVE"/>
		<reference ref_id="CVE-2014-4262" ref_url="https://www.suse.com/security/cve/CVE-2014-4262/" source="CVE"/>
		<reference ref_id="CVE-2014-4263" ref_url="https://www.suse.com/security/cve/CVE-2014-4263/" source="CVE"/>
		<reference ref_id="CVE-2014-4264" ref_url="https://www.suse.com/security/cve/CVE-2014-4264/" source="CVE"/>
		<reference ref_id="CVE-2014-4266" ref_url="https://www.suse.com/security/cve/CVE-2014-4266/" source="CVE"/>
		<reference ref_id="CVE-2014-4268" ref_url="https://www.suse.com/security/cve/CVE-2014-4268/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6504" ref_url="https://www.suse.com/security/cve/CVE-2014-6504/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6517" ref_url="https://www.suse.com/security/cve/CVE-2014-6517/" source="CVE"/>
		<reference ref_id="CVE-2014-6519" ref_url="https://www.suse.com/security/cve/CVE-2014-6519/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="CVE-2014-6585" ref_url="https://www.suse.com/security/cve/CVE-2014-6585/" source="CVE"/>
		<reference ref_id="CVE-2014-6587" ref_url="https://www.suse.com/security/cve/CVE-2014-6587/" source="CVE"/>
		<reference ref_id="CVE-2014-6591" ref_url="https://www.suse.com/security/cve/CVE-2014-6591/" source="CVE"/>
		<reference ref_id="CVE-2014-6593" ref_url="https://www.suse.com/security/cve/CVE-2014-6593/" source="CVE"/>
		<reference ref_id="CVE-2014-6601" ref_url="https://www.suse.com/security/cve/CVE-2014-6601/" source="CVE"/>
		<reference ref_id="CVE-2015-0383" ref_url="https://www.suse.com/security/cve/CVE-2015-0383/" source="CVE"/>
		<reference ref_id="CVE-2015-0395" ref_url="https://www.suse.com/security/cve/CVE-2015-0395/" source="CVE"/>
		<reference ref_id="CVE-2015-0400" ref_url="https://www.suse.com/security/cve/CVE-2015-0400/" source="CVE"/>
		<reference ref_id="CVE-2015-0407" ref_url="https://www.suse.com/security/cve/CVE-2015-0407/" source="CVE"/>
		<reference ref_id="CVE-2015-0408" ref_url="https://www.suse.com/security/cve/CVE-2015-0408/" source="CVE"/>
		<reference ref_id="CVE-2015-0410" ref_url="https://www.suse.com/security/cve/CVE-2015-0410/" source="CVE"/>
		<reference ref_id="CVE-2015-0412" ref_url="https://www.suse.com/security/cve/CVE-2015-0412/" source="CVE"/>
		<reference ref_id="CVE-2015-0460" ref_url="https://www.suse.com/security/cve/CVE-2015-0460/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-0695" ref_url="https://www.suse.com/security/cve/CVE-2016-0695/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-3425" ref_url="https://www.suse.com/security/cve/CVE-2016-3425/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3458" ref_url="https://www.suse.com/security/cve/CVE-2016-3458/" source="CVE"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3498" ref_url="https://www.suse.com/security/cve/CVE-2016-3498/" source="CVE"/>
		<reference ref_id="CVE-2016-3500" ref_url="https://www.suse.com/security/cve/CVE-2016-3500/" source="CVE"/>
		<reference ref_id="CVE-2016-3503" ref_url="https://www.suse.com/security/cve/CVE-2016-3503/" source="CVE"/>
		<reference ref_id="CVE-2016-3508" ref_url="https://www.suse.com/security/cve/CVE-2016-3508/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3550" ref_url="https://www.suse.com/security/cve/CVE-2016-3550/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-3606" ref_url="https://www.suse.com/security/cve/CVE-2016-3606/" source="CVE"/>
		<reference ref_id="CVE-2016-3610" ref_url="https://www.suse.com/security/cve/CVE-2016-3610/" source="CVE"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5546" ref_url="https://www.suse.com/security/cve/CVE-2016-5546/" source="CVE"/>
		<reference ref_id="CVE-2016-5547" ref_url="https://www.suse.com/security/cve/CVE-2016-5547/" source="CVE"/>
		<reference ref_id="CVE-2016-5548" ref_url="https://www.suse.com/security/cve/CVE-2016-5548/" source="CVE"/>
		<reference ref_id="CVE-2016-5549" ref_url="https://www.suse.com/security/cve/CVE-2016-5549/" source="CVE"/>
		<reference ref_id="CVE-2016-5552" ref_url="https://www.suse.com/security/cve/CVE-2016-5552/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5582" ref_url="https://www.suse.com/security/cve/CVE-2016-5582/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="CVE-2017-3231" ref_url="https://www.suse.com/security/cve/CVE-2017-3231/" source="CVE"/>
		<reference ref_id="CVE-2017-3241" ref_url="https://www.suse.com/security/cve/CVE-2017-3241/" source="CVE"/>
		<reference ref_id="CVE-2017-3252" ref_url="https://www.suse.com/security/cve/CVE-2017-3252/" source="CVE"/>
		<reference ref_id="CVE-2017-3253" ref_url="https://www.suse.com/security/cve/CVE-2017-3253/" source="CVE"/>
		<reference ref_id="CVE-2017-3260" ref_url="https://www.suse.com/security/cve/CVE-2017-3260/" source="CVE"/>
		<reference ref_id="CVE-2017-3261" ref_url="https://www.suse.com/security/cve/CVE-2017-3261/" source="CVE"/>
		<reference ref_id="CVE-2017-3272" ref_url="https://www.suse.com/security/cve/CVE-2017-3272/" source="CVE"/>
		<reference ref_id="CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3512" ref_url="https://www.suse.com/security/cve/CVE-2017-3512/" source="CVE"/>
		<reference ref_id="CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514/" source="CVE"/>
		<reference ref_id="CVE-2017-3526" ref_url="https://www.suse.com/security/cve/CVE-2017-3526/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_7_0-openjdk-1.7.0.141-42.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3563/">CVE-2011-3563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3563">CVE-2011-3563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3571/">CVE-2011-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3571">CVE-2011-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5035/">CVE-2011-5035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5035">CVE-2011-5035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0497/">CVE-2012-0497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0497">CVE-2012-0497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0501/">CVE-2012-0501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0501">CVE-2012-0501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0502/">CVE-2012-0502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0502">CVE-2012-0502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0503/">CVE-2012-0503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0503">CVE-2012-0503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0505/">CVE-2012-0505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0505">CVE-2012-0505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0506/">CVE-2012-0506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0506">CVE-2012-0506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0547/">CVE-2012-0547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0547">CVE-2012-0547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1682/">CVE-2012-1682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1682">CVE-2012-1682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1711/">CVE-2012-1711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1711">CVE-2012-1711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1713/">CVE-2012-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1713">CVE-2012-1713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1716/">CVE-2012-1716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1716">CVE-2012-1716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1717/">CVE-2012-1717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1717">CVE-2012-1717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1718/">CVE-2012-1718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1718">CVE-2012-1718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1719/">CVE-2012-1719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1719">CVE-2012-1719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1723/">CVE-2012-1723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1723">CVE-2012-1723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1724/">CVE-2012-1724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1724">CVE-2012-1724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1725/">CVE-2012-1725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1725">CVE-2012-1725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1726/">CVE-2012-1726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1726">CVE-2012-1726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3136/">CVE-2012-3136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3136">CVE-2012-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3174/">CVE-2012-3174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3174">CVE-2012-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3216/">CVE-2012-3216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3216">CVE-2012-3216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4416/">CVE-2012-4416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4416">CVE-2012-4416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4681/">CVE-2012-4681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4681">CVE-2012-4681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5068/">CVE-2012-5068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5068">CVE-2012-5068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5069/">CVE-2012-5069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5069">CVE-2012-5069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5070/">CVE-2012-5070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5070">CVE-2012-5070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5071/">CVE-2012-5071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5071">CVE-2012-5071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5072/">CVE-2012-5072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5072">CVE-2012-5072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5073/">CVE-2012-5073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5073">CVE-2012-5073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5074/">CVE-2012-5074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5074">CVE-2012-5074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5075/">CVE-2012-5075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5075">CVE-2012-5075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5076/">CVE-2012-5076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5076">CVE-2012-5076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5077/">CVE-2012-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5077">CVE-2012-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5079/">CVE-2012-5079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5079">CVE-2012-5079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5081/">CVE-2012-5081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5081">CVE-2012-5081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5084/">CVE-2012-5084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5084">CVE-2012-5084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5085/">CVE-2012-5085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5085">CVE-2012-5085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5086/">CVE-2012-5086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5086">CVE-2012-5086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5087/">CVE-2012-5087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5087">CVE-2012-5087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5088/">CVE-2012-5088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5088">CVE-2012-5088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5089/">CVE-2012-5089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5089">CVE-2012-5089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0169">CVE-2013-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0401/">CVE-2013-0401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0401">CVE-2013-0401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0422/">CVE-2013-0422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0422">CVE-2013-0422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0424/">CVE-2013-0424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0424">CVE-2013-0424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0425/">CVE-2013-0425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0425">CVE-2013-0425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0426/">CVE-2013-0426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0426">CVE-2013-0426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0427/">CVE-2013-0427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0427">CVE-2013-0427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0428/">CVE-2013-0428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0428">CVE-2013-0428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0429/">CVE-2013-0429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0429">CVE-2013-0429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0431/">CVE-2013-0431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0431">CVE-2013-0431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0432/">CVE-2013-0432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0432">CVE-2013-0432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0433/">CVE-2013-0433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0433">CVE-2013-0433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0434/">CVE-2013-0434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0434">CVE-2013-0434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0435/">CVE-2013-0435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0435">CVE-2013-0435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0440/">CVE-2013-0440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0440">CVE-2013-0440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0441/">CVE-2013-0441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0441">CVE-2013-0441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0442/">CVE-2013-0442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0442">CVE-2013-0442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0443/">CVE-2013-0443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0443">CVE-2013-0443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0444/">CVE-2013-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0444">CVE-2013-0444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0450/">CVE-2013-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0450">CVE-2013-0450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0809/">CVE-2013-0809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0809">CVE-2013-0809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1475/">CVE-2013-1475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1475">CVE-2013-1475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1476/">CVE-2013-1476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1476">CVE-2013-1476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1478/">CVE-2013-1478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1478">CVE-2013-1478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1480/">CVE-2013-1480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1480">CVE-2013-1480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1484/">CVE-2013-1484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1484">CVE-2013-1484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1485/">CVE-2013-1485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1485">CVE-2013-1485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1486/">CVE-2013-1486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1486">CVE-2013-1486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1488/">CVE-2013-1488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1488">CVE-2013-1488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1493/">CVE-2013-1493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1493">CVE-2013-1493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1500/">CVE-2013-1500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1500">CVE-2013-1500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1518/">CVE-2013-1518 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1518">CVE-2013-1518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1537/">CVE-2013-1537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1537">CVE-2013-1537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1557/">CVE-2013-1557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1557">CVE-2013-1557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1569/">CVE-2013-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1569">CVE-2013-1569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1571/">CVE-2013-1571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1571">CVE-2013-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2383/">CVE-2013-2383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2383">CVE-2013-2383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2384/">CVE-2013-2384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2384">CVE-2013-2384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2407/">CVE-2013-2407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2407">CVE-2013-2407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2412/">CVE-2013-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2412">CVE-2013-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2415/">CVE-2013-2415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2415">CVE-2013-2415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2417/">CVE-2013-2417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2417">CVE-2013-2417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2419/">CVE-2013-2419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2419">CVE-2013-2419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2420/">CVE-2013-2420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2420">CVE-2013-2420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2421/">CVE-2013-2421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2421">CVE-2013-2421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2422/">CVE-2013-2422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2422">CVE-2013-2422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2423/">CVE-2013-2423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2423">CVE-2013-2423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2424/">CVE-2013-2424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2424">CVE-2013-2424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2426/">CVE-2013-2426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2426">CVE-2013-2426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2429/">CVE-2013-2429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2429">CVE-2013-2429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2430/">CVE-2013-2430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2430">CVE-2013-2430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2431/">CVE-2013-2431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2431">CVE-2013-2431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2436/">CVE-2013-2436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2436">CVE-2013-2436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2443/">CVE-2013-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2443">CVE-2013-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2444/">CVE-2013-2444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2444">CVE-2013-2444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2445/">CVE-2013-2445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2445">CVE-2013-2445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2446/">CVE-2013-2446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2446">CVE-2013-2446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2447/">CVE-2013-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2447">CVE-2013-2447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2448/">CVE-2013-2448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2448">CVE-2013-2448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2449/">CVE-2013-2449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2449">CVE-2013-2449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2450/">CVE-2013-2450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2450">CVE-2013-2450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2451/">CVE-2013-2451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2451">CVE-2013-2451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2452/">CVE-2013-2452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2452">CVE-2013-2452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2453/">CVE-2013-2453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2453">CVE-2013-2453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2454/">CVE-2013-2454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2454">CVE-2013-2454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2455/">CVE-2013-2455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2455">CVE-2013-2455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2456/">CVE-2013-2456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2456">CVE-2013-2456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2457/">CVE-2013-2457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2457">CVE-2013-2457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2458/">CVE-2013-2458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2458">CVE-2013-2458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2459/">CVE-2013-2459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2459">CVE-2013-2459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2460/">CVE-2013-2460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2460">CVE-2013-2460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2461/">CVE-2013-2461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2461">CVE-2013-2461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2463/">CVE-2013-2463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2463">CVE-2013-2463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2465/">CVE-2013-2465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2465">CVE-2013-2465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2469/">CVE-2013-2469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2469">CVE-2013-2469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2470/">CVE-2013-2470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2470">CVE-2013-2470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2471/">CVE-2013-2471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2471">CVE-2013-2471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2472/">CVE-2013-2472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2472">CVE-2013-2472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2473/">CVE-2013-2473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2473">CVE-2013-2473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3829/">CVE-2013-3829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3829">CVE-2013-3829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4002/">CVE-2013-4002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4002">CVE-2013-4002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5772/">CVE-2013-5772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5772">CVE-2013-5772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5774/">CVE-2013-5774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5774">CVE-2013-5774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5778/">CVE-2013-5778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5778">CVE-2013-5778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5780/">CVE-2013-5780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5780">CVE-2013-5780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5782/">CVE-2013-5782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5782">CVE-2013-5782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5783/">CVE-2013-5783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5783">CVE-2013-5783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5784/">CVE-2013-5784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5784">CVE-2013-5784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5790/">CVE-2013-5790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5790">CVE-2013-5790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5797/">CVE-2013-5797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5797">CVE-2013-5797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5800/">CVE-2013-5800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5800">CVE-2013-5800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5802/">CVE-2013-5802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5802">CVE-2013-5802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5803/">CVE-2013-5803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5803">CVE-2013-5803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5804/">CVE-2013-5804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5804">CVE-2013-5804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5805/">CVE-2013-5805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5805">CVE-2013-5805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5806/">CVE-2013-5806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5806">CVE-2013-5806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5809/">CVE-2013-5809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5809">CVE-2013-5809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5814/">CVE-2013-5814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5814">CVE-2013-5814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5817/">CVE-2013-5817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5817">CVE-2013-5817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5820/">CVE-2013-5820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5820">CVE-2013-5820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5823/">CVE-2013-5823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5823">CVE-2013-5823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5825/">CVE-2013-5825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5825">CVE-2013-5825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5829/">CVE-2013-5829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5829">CVE-2013-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5830/">CVE-2013-5830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5830">CVE-2013-5830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5840/">CVE-2013-5840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5840">CVE-2013-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5842/">CVE-2013-5842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5842">CVE-2013-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5849/">CVE-2013-5849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5849">CVE-2013-5849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5850/">CVE-2013-5850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5850">CVE-2013-5850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5851/">CVE-2013-5851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5851">CVE-2013-5851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5878/">CVE-2013-5878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5878">CVE-2013-5878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5884/">CVE-2013-5884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5884">CVE-2013-5884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5893/">CVE-2013-5893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5893">CVE-2013-5893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5896/">CVE-2013-5896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5896">CVE-2013-5896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5907/">CVE-2013-5907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5907">CVE-2013-5907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5910/">CVE-2013-5910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5910">CVE-2013-5910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6629">CVE-2013-6629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6954">CVE-2013-6954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0368/">CVE-2014-0368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0368">CVE-2014-0368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0373/">CVE-2014-0373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0373">CVE-2014-0373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0376/">CVE-2014-0376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0376">CVE-2014-0376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0408/">CVE-2014-0408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0408">CVE-2014-0408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0411/">CVE-2014-0411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0411">CVE-2014-0411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0416/">CVE-2014-0416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0416">CVE-2014-0416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0422/">CVE-2014-0422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0422">CVE-2014-0422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0423/">CVE-2014-0423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0423">CVE-2014-0423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0428/">CVE-2014-0428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0428">CVE-2014-0428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0429/">CVE-2014-0429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0429">CVE-2014-0429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0446/">CVE-2014-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0446">CVE-2014-0446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0451/">CVE-2014-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0451">CVE-2014-0451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0452/">CVE-2014-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0452">CVE-2014-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0453/">CVE-2014-0453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0453">CVE-2014-0453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0454/">CVE-2014-0454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0454">CVE-2014-0454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0455/">CVE-2014-0455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0455">CVE-2014-0455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0456/">CVE-2014-0456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0456">CVE-2014-0456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0457/">CVE-2014-0457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0457">CVE-2014-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0458/">CVE-2014-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0458">CVE-2014-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0459/">CVE-2014-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0459">CVE-2014-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0460/">CVE-2014-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0460">CVE-2014-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0461/">CVE-2014-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0461">CVE-2014-0461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1876/">CVE-2014-1876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1876">CVE-2014-1876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2397/">CVE-2014-2397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2397">CVE-2014-2397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2398/">CVE-2014-2398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2398">CVE-2014-2398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2402/">CVE-2014-2402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2402">CVE-2014-2402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2403/">CVE-2014-2403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2403">CVE-2014-2403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2412/">CVE-2014-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2412">CVE-2014-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2413/">CVE-2014-2413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2413">CVE-2014-2413 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2414/">CVE-2014-2414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2414">CVE-2014-2414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2421/">CVE-2014-2421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2421">CVE-2014-2421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2423/">CVE-2014-2423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2423">CVE-2014-2423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2427/">CVE-2014-2427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2427">CVE-2014-2427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2483/">CVE-2014-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2483">CVE-2014-2483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2490/">CVE-2014-2490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2490">CVE-2014-2490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4209/">CVE-2014-4209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4209">CVE-2014-4209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4216/">CVE-2014-4216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4216">CVE-2014-4216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4218/">CVE-2014-4218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4218">CVE-2014-4218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4219/">CVE-2014-4219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4219">CVE-2014-4219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4221/">CVE-2014-4221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4221">CVE-2014-4221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4223/">CVE-2014-4223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4223">CVE-2014-4223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4244/">CVE-2014-4244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4244">CVE-2014-4244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4252/">CVE-2014-4252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4252">CVE-2014-4252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4262/">CVE-2014-4262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4262">CVE-2014-4262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4263/">CVE-2014-4263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4263">CVE-2014-4263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4264/">CVE-2014-4264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4264">CVE-2014-4264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4266/">CVE-2014-4266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4266">CVE-2014-4266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4268/">CVE-2014-4268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4268">CVE-2014-4268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6457">CVE-2014-6457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6502">CVE-2014-6502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6504/">CVE-2014-6504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6504">CVE-2014-6504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6506">CVE-2014-6506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6511">CVE-2014-6511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6512">CVE-2014-6512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6513">CVE-2014-6513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6517/">CVE-2014-6517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6517">CVE-2014-6517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6519/">CVE-2014-6519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6519">CVE-2014-6519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6531">CVE-2014-6531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6558">CVE-2014-6558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6585/">CVE-2014-6585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6585">CVE-2014-6585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6587/">CVE-2014-6587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6587">CVE-2014-6587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6591/">CVE-2014-6591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6591">CVE-2014-6591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6593/">CVE-2014-6593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6593">CVE-2014-6593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6601/">CVE-2014-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6601">CVE-2014-6601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0383/">CVE-2015-0383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0383">CVE-2015-0383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0395/">CVE-2015-0395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0395">CVE-2015-0395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0400/">CVE-2015-0400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0400">CVE-2015-0400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0407/">CVE-2015-0407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0407">CVE-2015-0407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0408/">CVE-2015-0408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0408">CVE-2015-0408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0410/">CVE-2015-0410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0410">CVE-2015-0410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0412/">CVE-2015-0412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0412">CVE-2015-0412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0460/">CVE-2015-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0460">CVE-2015-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0469">CVE-2015-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0477">CVE-2015-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0478">CVE-2015-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0480">CVE-2015-0480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0488">CVE-2015-0488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2590">CVE-2015-2590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2601">CVE-2015-2601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2613">CVE-2015-2613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2621">CVE-2015-2621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2625">CVE-2015-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2628">CVE-2015-2628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2632">CVE-2015-2632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4731">CVE-2015-4731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4732">CVE-2015-4732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4733">CVE-2015-4733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4734">CVE-2015-4734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4748">CVE-2015-4748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4749">CVE-2015-4749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4760">CVE-2015-4760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4803">CVE-2015-4803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4805">CVE-2015-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4806">CVE-2015-4806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4835">CVE-2015-4835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4840">CVE-2015-4840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4842">CVE-2015-4842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4843">CVE-2015-4843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4844">CVE-2015-4844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4860">CVE-2015-4860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4871">CVE-2015-4871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4872">CVE-2015-4872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4881">CVE-2015-4881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4882">CVE-2015-4882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4883">CVE-2015-4883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4893">CVE-2015-4893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4903">CVE-2015-4903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4911">CVE-2015-4911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8472">CVE-2015-8472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0402">CVE-2016-0402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0448">CVE-2016-0448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0466">CVE-2016-0466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0483">CVE-2016-0483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0494">CVE-2016-0494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0636">CVE-2016-0636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0686">CVE-2016-0686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0687">CVE-2016-0687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0695/">CVE-2016-0695 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0695">CVE-2016-0695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3425/">CVE-2016-3425 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3425">CVE-2016-3425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3427">CVE-2016-3427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3458/">CVE-2016-3458 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3458">CVE-2016-3458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485 at SUSE</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3485">CVE-2016-3485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3498/">CVE-2016-3498 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3498">CVE-2016-3498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3500/">CVE-2016-3500 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3500">CVE-2016-3500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3503/">CVE-2016-3503 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3503">CVE-2016-3503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3508/">CVE-2016-3508 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3508">CVE-2016-3508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3511">CVE-2016-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3550/">CVE-2016-3550 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3550">CVE-2016-3550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3598">CVE-2016-3598 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3606/">CVE-2016-3606 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3606">CVE-2016-3606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3610/">CVE-2016-3610 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3610">CVE-2016-3610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5542">CVE-2016-5542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5546/">CVE-2016-5546 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5546">CVE-2016-5546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5547/">CVE-2016-5547 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5547">CVE-2016-5547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5548/">CVE-2016-5548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5548">CVE-2016-5548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5549/">CVE-2016-5549 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5549">CVE-2016-5549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5552/">CVE-2016-5552 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5552">CVE-2016-5552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5554">CVE-2016-5554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5556">CVE-2016-5556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5568">CVE-2016-5568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5573">CVE-2016-5573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5582/">CVE-2016-5582 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5582">CVE-2016-5582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5597">CVE-2016-5597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3231/">CVE-2017-3231 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3231">CVE-2017-3231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3241/">CVE-2017-3241 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3241">CVE-2017-3241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3252/">CVE-2017-3252 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3252">CVE-2017-3252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3253/">CVE-2017-3253 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3253">CVE-2017-3253 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3260/">CVE-2017-3260 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3260">CVE-2017-3260 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3261/">CVE-2017-3261 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3261">CVE-2017-3261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3272/">CVE-2017-3272 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3272">CVE-2017-3272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3289">CVE-2017-3289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3509">CVE-2017-3509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3511">CVE-2017-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3512/">CVE-2017-3512 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3512">CVE-2017-3512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3514">CVE-2017-3514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3526/">CVE-2017-3526 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3526">CVE-2017-3526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3533">CVE-2017-3533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3539">CVE-2017-3539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3544">CVE-2017-3544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155970" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155977" comment="java-1_7_0-openjdk-demo-1.7.0.141-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155978" comment="java-1_7_0-openjdk-devel-1.7.0.141-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155971" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147890" version="1" class="patch">
	<metadata>
		<title>java-1_7_1-ibm-1.7.1_sr4.5-37.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3065" ref_url="https://www.suse.com/security/cve/CVE-2014-3065/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4288" ref_url="https://www.suse.com/security/cve/CVE-2014-4288/" source="CVE"/>
		<reference ref_id="CVE-2014-6456" ref_url="https://www.suse.com/security/cve/CVE-2014-6456/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6458" ref_url="https://www.suse.com/security/cve/CVE-2014-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-6466" ref_url="https://www.suse.com/security/cve/CVE-2014-6466/" source="CVE"/>
		<reference ref_id="CVE-2014-6476" ref_url="https://www.suse.com/security/cve/CVE-2014-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-6492" ref_url="https://www.suse.com/security/cve/CVE-2014-6492/" source="CVE"/>
		<reference ref_id="CVE-2014-6493" ref_url="https://www.suse.com/security/cve/CVE-2014-6493/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6503" ref_url="https://www.suse.com/security/cve/CVE-2014-6503/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6515" ref_url="https://www.suse.com/security/cve/CVE-2014-6515/" source="CVE"/>
		<reference ref_id="CVE-2014-6527" ref_url="https://www.suse.com/security/cve/CVE-2014-6527/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6532" ref_url="https://www.suse.com/security/cve/CVE-2014-6532/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="CVE-2014-8891" ref_url="https://www.suse.com/security/cve/CVE-2014-8891/" source="CVE"/>
		<reference ref_id="CVE-2014-8892" ref_url="https://www.suse.com/security/cve/CVE-2014-8892/" source="CVE"/>
		<reference ref_id="CVE-2015-0138" ref_url="https://www.suse.com/security/cve/CVE-2015-0138/" source="CVE"/>
		<reference ref_id="CVE-2015-0192" ref_url="https://www.suse.com/security/cve/CVE-2015-0192/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-1914" ref_url="https://www.suse.com/security/cve/CVE-2015-1914/" source="CVE"/>
		<reference ref_id="CVE-2015-1931" ref_url="https://www.suse.com/security/cve/CVE-2015-1931/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-5006" ref_url="https://www.suse.com/security/cve/CVE-2015-5006/" source="CVE"/>
		<reference ref_id="CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-0264" ref_url="https://www.suse.com/security/cve/CVE-2016-0264/" source="CVE"/>
		<reference ref_id="CVE-2016-0363" ref_url="https://www.suse.com/security/cve/CVE-2016-0363/" source="CVE"/>
		<reference ref_id="CVE-2016-0376" ref_url="https://www.suse.com/security/cve/CVE-2016-0376/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-3422" ref_url="https://www.suse.com/security/cve/CVE-2016-3422/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3443" ref_url="https://www.suse.com/security/cve/CVE-2016-3443/" source="CVE"/>
		<reference ref_id="CVE-2016-3449" ref_url="https://www.suse.com/security/cve/CVE-2016-3449/" source="CVE"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-1289" ref_url="https://www.suse.com/security/cve/CVE-2017-1289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3512" ref_url="https://www.suse.com/security/cve/CVE-2017-3512/" source="CVE"/>
		<reference ref_id="CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_7_1-ibm-1.7.1_sr4.5-37.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3065/">CVE-2014-3065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3065">CVE-2014-3065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4288/">CVE-2014-4288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4288">CVE-2014-4288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6456/">CVE-2014-6456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6456">CVE-2014-6456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6457">CVE-2014-6457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6458/">CVE-2014-6458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6458">CVE-2014-6458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6466/">CVE-2014-6466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6466">CVE-2014-6466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6476/">CVE-2014-6476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6476">CVE-2014-6476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6492/">CVE-2014-6492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6492">CVE-2014-6492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6493/">CVE-2014-6493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6493">CVE-2014-6493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6502">CVE-2014-6502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6503/">CVE-2014-6503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6503">CVE-2014-6503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6506">CVE-2014-6506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6511">CVE-2014-6511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6512">CVE-2014-6512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6513">CVE-2014-6513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6515/">CVE-2014-6515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6515">CVE-2014-6515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6527/">CVE-2014-6527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6527">CVE-2014-6527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6531">CVE-2014-6531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6532/">CVE-2014-6532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6532">CVE-2014-6532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6558">CVE-2014-6558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8891/">CVE-2014-8891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8891">CVE-2014-8891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8892/">CVE-2014-8892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8892">CVE-2014-8892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0138/">CVE-2015-0138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0138">CVE-2015-0138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0192/">CVE-2015-0192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0192">CVE-2015-0192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0458">CVE-2015-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0459">CVE-2015-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0469">CVE-2015-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0477">CVE-2015-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0478">CVE-2015-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0480">CVE-2015-0480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0488">CVE-2015-0488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0491">CVE-2015-0491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1914/">CVE-2015-1914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1914">CVE-2015-1914 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1931/">CVE-2015-1931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1931">CVE-2015-1931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2590">CVE-2015-2590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2601">CVE-2015-2601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2613">CVE-2015-2613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2619">CVE-2015-2619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2621">CVE-2015-2621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2625">CVE-2015-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2632">CVE-2015-2632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2637">CVE-2015-2637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2638">CVE-2015-2638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2664">CVE-2015-2664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4729">CVE-2015-4729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4731">CVE-2015-4731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4732">CVE-2015-4732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4733">CVE-2015-4733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4734">CVE-2015-4734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4748">CVE-2015-4748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4749">CVE-2015-4749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4760">CVE-2015-4760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4803">CVE-2015-4803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4805">CVE-2015-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4806">CVE-2015-4806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4810">CVE-2015-4810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4835">CVE-2015-4835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4840">CVE-2015-4840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4842">CVE-2015-4842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4843">CVE-2015-4843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4844">CVE-2015-4844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4860">CVE-2015-4860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4871">CVE-2015-4871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4872">CVE-2015-4872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4882">CVE-2015-4882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4883">CVE-2015-4883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4893">CVE-2015-4893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4902">CVE-2015-4902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4903">CVE-2015-4903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4911">CVE-2015-4911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5006/">CVE-2015-5006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5006">CVE-2015-5006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5041">CVE-2015-5041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7981">CVE-2015-7981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8472">CVE-2015-8472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8540">CVE-2015-8540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0264/">CVE-2016-0264 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0264">CVE-2016-0264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0363/">CVE-2016-0363 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0363">CVE-2016-0363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0376/">CVE-2016-0376 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0376">CVE-2016-0376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0402">CVE-2016-0402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0448">CVE-2016-0448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0466">CVE-2016-0466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0483">CVE-2016-0483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0494">CVE-2016-0494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0686">CVE-2016-0686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0687">CVE-2016-0687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3422/">CVE-2016-3422 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3422">CVE-2016-3422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3426">CVE-2016-3426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3427">CVE-2016-3427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3443/">CVE-2016-3443 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3443">CVE-2016-3443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3449/">CVE-2016-3449 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3449">CVE-2016-3449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485 at SUSE</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3485">CVE-2016-3485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3511">CVE-2016-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3598">CVE-2016-3598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5542">CVE-2016-5542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5554">CVE-2016-5554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5556">CVE-2016-5556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5568">CVE-2016-5568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5573">CVE-2016-5573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5597">CVE-2016-5597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9840">CVE-2016-9840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9841">CVE-2016-9841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9842">CVE-2016-9842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1289/">CVE-2017-1289 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1289">CVE-2017-1289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3509">CVE-2017-3509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3511">CVE-2017-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3512/">CVE-2017-3512 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3512">CVE-2017-3512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3514">CVE-2017-3514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3533">CVE-2017-3533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3539">CVE-2017-3539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3544">CVE-2017-3544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155701" comment="java-1_7_1-ibm-1.7.1_sr4.5-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155702" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.5-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155704" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.5-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155705" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.5-37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147891" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-ibm-1.8.0_sr4.5-29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3065" ref_url="https://www.suse.com/security/cve/CVE-2014-3065/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4288" ref_url="https://www.suse.com/security/cve/CVE-2014-4288/" source="CVE"/>
		<reference ref_id="CVE-2014-6456" ref_url="https://www.suse.com/security/cve/CVE-2014-6456/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6458" ref_url="https://www.suse.com/security/cve/CVE-2014-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-6466" ref_url="https://www.suse.com/security/cve/CVE-2014-6466/" source="CVE"/>
		<reference ref_id="CVE-2014-6476" ref_url="https://www.suse.com/security/cve/CVE-2014-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-6492" ref_url="https://www.suse.com/security/cve/CVE-2014-6492/" source="CVE"/>
		<reference ref_id="CVE-2014-6493" ref_url="https://www.suse.com/security/cve/CVE-2014-6493/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6503" ref_url="https://www.suse.com/security/cve/CVE-2014-6503/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6515" ref_url="https://www.suse.com/security/cve/CVE-2014-6515/" source="CVE"/>
		<reference ref_id="CVE-2014-6527" ref_url="https://www.suse.com/security/cve/CVE-2014-6527/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6532" ref_url="https://www.suse.com/security/cve/CVE-2014-6532/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="CVE-2014-8891" ref_url="https://www.suse.com/security/cve/CVE-2014-8891/" source="CVE"/>
		<reference ref_id="CVE-2014-8892" ref_url="https://www.suse.com/security/cve/CVE-2014-8892/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0486" ref_url="https://www.suse.com/security/cve/CVE-2015-0486/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-1931" ref_url="https://www.suse.com/security/cve/CVE-2015-1931/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-5006" ref_url="https://www.suse.com/security/cve/CVE-2015-5006/" source="CVE"/>
		<reference ref_id="CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2016-0264" ref_url="https://www.suse.com/security/cve/CVE-2016-0264/" source="CVE"/>
		<reference ref_id="CVE-2016-0363" ref_url="https://www.suse.com/security/cve/CVE-2016-0363/" source="CVE"/>
		<reference ref_id="CVE-2016-0376" ref_url="https://www.suse.com/security/cve/CVE-2016-0376/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0475" ref_url="https://www.suse.com/security/cve/CVE-2016-0475/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-3422" ref_url="https://www.suse.com/security/cve/CVE-2016-3422/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3443" ref_url="https://www.suse.com/security/cve/CVE-2016-3443/" source="CVE"/>
		<reference ref_id="CVE-2016-3449" ref_url="https://www.suse.com/security/cve/CVE-2016-3449/" source="CVE"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5547" ref_url="https://www.suse.com/security/cve/CVE-2016-5547/" source="CVE"/>
		<reference ref_id="CVE-2016-5548" ref_url="https://www.suse.com/security/cve/CVE-2016-5548/" source="CVE"/>
		<reference ref_id="CVE-2016-5549" ref_url="https://www.suse.com/security/cve/CVE-2016-5549/" source="CVE"/>
		<reference ref_id="CVE-2016-5552" ref_url="https://www.suse.com/security/cve/CVE-2016-5552/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-1289" ref_url="https://www.suse.com/security/cve/CVE-2017-1289/" source="CVE"/>
		<reference ref_id="CVE-2017-3231" ref_url="https://www.suse.com/security/cve/CVE-2017-3231/" source="CVE"/>
		<reference ref_id="CVE-2017-3241" ref_url="https://www.suse.com/security/cve/CVE-2017-3241/" source="CVE"/>
		<reference ref_id="CVE-2017-3252" ref_url="https://www.suse.com/security/cve/CVE-2017-3252/" source="CVE"/>
		<reference ref_id="CVE-2017-3253" ref_url="https://www.suse.com/security/cve/CVE-2017-3253/" source="CVE"/>
		<reference ref_id="CVE-2017-3259" ref_url="https://www.suse.com/security/cve/CVE-2017-3259/" source="CVE"/>
		<reference ref_id="CVE-2017-3261" ref_url="https://www.suse.com/security/cve/CVE-2017-3261/" source="CVE"/>
		<reference ref_id="CVE-2017-3272" ref_url="https://www.suse.com/security/cve/CVE-2017-3272/" source="CVE"/>
		<reference ref_id="CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3512" ref_url="https://www.suse.com/security/cve/CVE-2017-3512/" source="CVE"/>
		<reference ref_id="CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-ibm-1.8.0_sr4.5-29.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3065/">CVE-2014-3065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3065">CVE-2014-3065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4288/">CVE-2014-4288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4288">CVE-2014-4288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6456/">CVE-2014-6456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6456">CVE-2014-6456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6457">CVE-2014-6457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6458/">CVE-2014-6458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6458">CVE-2014-6458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6466/">CVE-2014-6466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6466">CVE-2014-6466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6476/">CVE-2014-6476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6476">CVE-2014-6476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6492/">CVE-2014-6492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6492">CVE-2014-6492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6493/">CVE-2014-6493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6493">CVE-2014-6493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6502">CVE-2014-6502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6503/">CVE-2014-6503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6503">CVE-2014-6503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6506">CVE-2014-6506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6511">CVE-2014-6511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6512">CVE-2014-6512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6513">CVE-2014-6513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6515/">CVE-2014-6515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6515">CVE-2014-6515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6527/">CVE-2014-6527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6527">CVE-2014-6527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6531">CVE-2014-6531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6532/">CVE-2014-6532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6532">CVE-2014-6532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6558">CVE-2014-6558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8891/">CVE-2014-8891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8891">CVE-2014-8891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8892/">CVE-2014-8892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8892">CVE-2014-8892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0458">CVE-2015-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0459">CVE-2015-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0469">CVE-2015-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0477">CVE-2015-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0478">CVE-2015-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0480">CVE-2015-0480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0486/">CVE-2015-0486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0486">CVE-2015-0486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0488">CVE-2015-0488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0491">CVE-2015-0491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1931/">CVE-2015-1931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1931">CVE-2015-1931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2590">CVE-2015-2590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2601">CVE-2015-2601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2613">CVE-2015-2613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2619">CVE-2015-2619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2621">CVE-2015-2621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2625">CVE-2015-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2632">CVE-2015-2632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2637">CVE-2015-2637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2638">CVE-2015-2638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2664">CVE-2015-2664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4729">CVE-2015-4729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4731">CVE-2015-4731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4732">CVE-2015-4732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4733">CVE-2015-4733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4734">CVE-2015-4734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4748">CVE-2015-4748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4749">CVE-2015-4749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4760">CVE-2015-4760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4803">CVE-2015-4803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4805">CVE-2015-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4806">CVE-2015-4806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4810">CVE-2015-4810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4835">CVE-2015-4835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4840">CVE-2015-4840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4842">CVE-2015-4842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4843">CVE-2015-4843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4844">CVE-2015-4844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4860">CVE-2015-4860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4871">CVE-2015-4871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4872">CVE-2015-4872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4882">CVE-2015-4882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4883">CVE-2015-4883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4893">CVE-2015-4893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4902">CVE-2015-4902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4903">CVE-2015-4903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4911">CVE-2015-4911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5006/">CVE-2015-5006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5006">CVE-2015-5006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5041">CVE-2015-5041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8472">CVE-2015-8472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0264/">CVE-2016-0264 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0264">CVE-2016-0264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0363/">CVE-2016-0363 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0363">CVE-2016-0363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0376/">CVE-2016-0376 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0376">CVE-2016-0376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0402">CVE-2016-0402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0448">CVE-2016-0448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0466">CVE-2016-0466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0475/">CVE-2016-0475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0475">CVE-2016-0475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0483">CVE-2016-0483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0494">CVE-2016-0494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0686">CVE-2016-0686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0687">CVE-2016-0687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3422/">CVE-2016-3422 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3422">CVE-2016-3422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3426">CVE-2016-3426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3427">CVE-2016-3427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3443/">CVE-2016-3443 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3443">CVE-2016-3443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3449/">CVE-2016-3449 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3449">CVE-2016-3449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485 at SUSE</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3485">CVE-2016-3485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3511">CVE-2016-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3598">CVE-2016-3598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5542">CVE-2016-5542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5547/">CVE-2016-5547 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5547">CVE-2016-5547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5548/">CVE-2016-5548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5548">CVE-2016-5548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5549/">CVE-2016-5549 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5549">CVE-2016-5549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5552/">CVE-2016-5552 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5552">CVE-2016-5552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5554">CVE-2016-5554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5556">CVE-2016-5556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5568">CVE-2016-5568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5573">CVE-2016-5573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5597">CVE-2016-5597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9840">CVE-2016-9840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9841">CVE-2016-9841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9842">CVE-2016-9842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1289/">CVE-2017-1289 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1289">CVE-2017-1289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3231/">CVE-2017-3231 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3231">CVE-2017-3231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3241/">CVE-2017-3241 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3241">CVE-2017-3241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3252/">CVE-2017-3252 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3252">CVE-2017-3252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3253/">CVE-2017-3253 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3253">CVE-2017-3253 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3259/">CVE-2017-3259 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3259">CVE-2017-3259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3261/">CVE-2017-3261 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3261">CVE-2017-3261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3272/">CVE-2017-3272 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3272">CVE-2017-3272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3289">CVE-2017-3289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3509">CVE-2017-3509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3511">CVE-2017-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3512/">CVE-2017-3512 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3512">CVE-2017-3512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3514">CVE-2017-3514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3533">CVE-2017-3533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3539">CVE-2017-3539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3544">CVE-2017-3544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155706" comment="java-1_8_0-ibm-1.8.0_sr4.5-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155710" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.5-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155711" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.5-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147892" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.131-26.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2597" ref_url="https://www.suse.com/security/cve/CVE-2015-2597/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2627" ref_url="https://www.suse.com/security/cve/CVE-2015-2627/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2659" ref_url="https://www.suse.com/security/cve/CVE-2015-2659/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4736" ref_url="https://www.suse.com/security/cve/CVE-2015-4736/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4868" ref_url="https://www.suse.com/security/cve/CVE-2015-4868/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4901" ref_url="https://www.suse.com/security/cve/CVE-2015-4901/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4906" ref_url="https://www.suse.com/security/cve/CVE-2015-4906/" source="CVE"/>
		<reference ref_id="CVE-2015-4908" ref_url="https://www.suse.com/security/cve/CVE-2015-4908/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-4916" ref_url="https://www.suse.com/security/cve/CVE-2015-4916/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0475" ref_url="https://www.suse.com/security/cve/CVE-2016-0475/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-0695" ref_url="https://www.suse.com/security/cve/CVE-2016-0695/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-3425" ref_url="https://www.suse.com/security/cve/CVE-2016-3425/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3458" ref_url="https://www.suse.com/security/cve/CVE-2016-3458/" source="CVE"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3498" ref_url="https://www.suse.com/security/cve/CVE-2016-3498/" source="CVE"/>
		<reference ref_id="CVE-2016-3500" ref_url="https://www.suse.com/security/cve/CVE-2016-3500/" source="CVE"/>
		<reference ref_id="CVE-2016-3503" ref_url="https://www.suse.com/security/cve/CVE-2016-3503/" source="CVE"/>
		<reference ref_id="CVE-2016-3508" ref_url="https://www.suse.com/security/cve/CVE-2016-3508/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3550" ref_url="https://www.suse.com/security/cve/CVE-2016-3550/" source="CVE"/>
		<reference ref_id="CVE-2016-3552" ref_url="https://www.suse.com/security/cve/CVE-2016-3552/" source="CVE"/>
		<reference ref_id="CVE-2016-3587" ref_url="https://www.suse.com/security/cve/CVE-2016-3587/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-3606" ref_url="https://www.suse.com/security/cve/CVE-2016-3606/" source="CVE"/>
		<reference ref_id="CVE-2016-3610" ref_url="https://www.suse.com/security/cve/CVE-2016-3610/" source="CVE"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5546" ref_url="https://www.suse.com/security/cve/CVE-2016-5546/" source="CVE"/>
		<reference ref_id="CVE-2016-5547" ref_url="https://www.suse.com/security/cve/CVE-2016-5547/" source="CVE"/>
		<reference ref_id="CVE-2016-5548" ref_url="https://www.suse.com/security/cve/CVE-2016-5548/" source="CVE"/>
		<reference ref_id="CVE-2016-5549" ref_url="https://www.suse.com/security/cve/CVE-2016-5549/" source="CVE"/>
		<reference ref_id="CVE-2016-5552" ref_url="https://www.suse.com/security/cve/CVE-2016-5552/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5582" ref_url="https://www.suse.com/security/cve/CVE-2016-5582/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="CVE-2017-3231" ref_url="https://www.suse.com/security/cve/CVE-2017-3231/" source="CVE"/>
		<reference ref_id="CVE-2017-3241" ref_url="https://www.suse.com/security/cve/CVE-2017-3241/" source="CVE"/>
		<reference ref_id="CVE-2017-3252" ref_url="https://www.suse.com/security/cve/CVE-2017-3252/" source="CVE"/>
		<reference ref_id="CVE-2017-3253" ref_url="https://www.suse.com/security/cve/CVE-2017-3253/" source="CVE"/>
		<reference ref_id="CVE-2017-3260" ref_url="https://www.suse.com/security/cve/CVE-2017-3260/" source="CVE"/>
		<reference ref_id="CVE-2017-3261" ref_url="https://www.suse.com/security/cve/CVE-2017-3261/" source="CVE"/>
		<reference ref_id="CVE-2017-3272" ref_url="https://www.suse.com/security/cve/CVE-2017-3272/" source="CVE"/>
		<reference ref_id="CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3512" ref_url="https://www.suse.com/security/cve/CVE-2017-3512/" source="CVE"/>
		<reference ref_id="CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514/" source="CVE"/>
		<reference ref_id="CVE-2017-3526" ref_url="https://www.suse.com/security/cve/CVE-2017-3526/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.131-26.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2590">CVE-2015-2590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2597/">CVE-2015-2597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2597">CVE-2015-2597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2601">CVE-2015-2601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2613">CVE-2015-2613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2619">CVE-2015-2619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2621">CVE-2015-2621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2625">CVE-2015-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2627/">CVE-2015-2627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2627">CVE-2015-2627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2628">CVE-2015-2628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2632">CVE-2015-2632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2637">CVE-2015-2637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2638">CVE-2015-2638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2659/">CVE-2015-2659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2659">CVE-2015-2659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2664">CVE-2015-2664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4729">CVE-2015-4729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4731">CVE-2015-4731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4732">CVE-2015-4732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4733">CVE-2015-4733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4734">CVE-2015-4734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4736/">CVE-2015-4736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4736">CVE-2015-4736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4748">CVE-2015-4748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4749">CVE-2015-4749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4760">CVE-2015-4760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4803">CVE-2015-4803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4805">CVE-2015-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4806">CVE-2015-4806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4810">CVE-2015-4810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4835">CVE-2015-4835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4840">CVE-2015-4840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4842">CVE-2015-4842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4843">CVE-2015-4843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4844">CVE-2015-4844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4860">CVE-2015-4860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4868/">CVE-2015-4868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4868">CVE-2015-4868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4872">CVE-2015-4872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4881">CVE-2015-4881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4882">CVE-2015-4882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4883">CVE-2015-4883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4893">CVE-2015-4893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4901/">CVE-2015-4901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4901">CVE-2015-4901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4902">CVE-2015-4902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4903">CVE-2015-4903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4906/">CVE-2015-4906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4906">CVE-2015-4906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4908/">CVE-2015-4908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4908">CVE-2015-4908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4911">CVE-2015-4911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4916/">CVE-2015-4916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4916">CVE-2015-4916 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0402">CVE-2016-0402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0448">CVE-2016-0448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0466">CVE-2016-0466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0475/">CVE-2016-0475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0475">CVE-2016-0475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0483">CVE-2016-0483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0494">CVE-2016-0494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0636">CVE-2016-0636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0686">CVE-2016-0686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0687">CVE-2016-0687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0695/">CVE-2016-0695 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0695">CVE-2016-0695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3425/">CVE-2016-3425 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3425">CVE-2016-3425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3426">CVE-2016-3426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3427">CVE-2016-3427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3458/">CVE-2016-3458 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3458">CVE-2016-3458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485 at SUSE</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3485">CVE-2016-3485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3498/">CVE-2016-3498 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3498">CVE-2016-3498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3500/">CVE-2016-3500 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3500">CVE-2016-3500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3503/">CVE-2016-3503 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3503">CVE-2016-3503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3508/">CVE-2016-3508 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3508">CVE-2016-3508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3511">CVE-2016-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3550/">CVE-2016-3550 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3550">CVE-2016-3550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3552/">CVE-2016-3552 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3552">CVE-2016-3552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3587/">CVE-2016-3587 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3587">CVE-2016-3587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3598">CVE-2016-3598 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3606/">CVE-2016-3606 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3606">CVE-2016-3606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3610/">CVE-2016-3610 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3610">CVE-2016-3610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5542">CVE-2016-5542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5546/">CVE-2016-5546 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5546">CVE-2016-5546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5547/">CVE-2016-5547 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5547">CVE-2016-5547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5548/">CVE-2016-5548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5548">CVE-2016-5548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5549/">CVE-2016-5549 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5549">CVE-2016-5549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5552/">CVE-2016-5552 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5552">CVE-2016-5552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5554">CVE-2016-5554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5556">CVE-2016-5556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5568">CVE-2016-5568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5573">CVE-2016-5573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5582/">CVE-2016-5582 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5582">CVE-2016-5582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5597">CVE-2016-5597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3231/">CVE-2017-3231 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3231">CVE-2017-3231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3241/">CVE-2017-3241 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3241">CVE-2017-3241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3252/">CVE-2017-3252 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3252">CVE-2017-3252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3253/">CVE-2017-3253 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3253">CVE-2017-3253 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3260/">CVE-2017-3260 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3260">CVE-2017-3260 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3261/">CVE-2017-3261 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3261">CVE-2017-3261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3272/">CVE-2017-3272 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3272">CVE-2017-3272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3289">CVE-2017-3289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3509">CVE-2017-3509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3511">CVE-2017-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3512/">CVE-2017-3512 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3512">CVE-2017-3512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3514">CVE-2017-3514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3526/">CVE-2017-3526 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3526">CVE-2017-3526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3533">CVE-2017-3533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3539">CVE-2017-3539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3544">CVE-2017-3544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156235" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156243" comment="java-1_8_0-openjdk-demo-1.8.0.131-26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156244" comment="java-1_8_0-openjdk-devel-1.8.0.131-26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156236" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147893" version="1" class="patch">
	<metadata>
		<title>kbd-1.15.5-8.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0460" ref_url="https://www.suse.com/security/cve/CVE-2011-0460/" source="CVE"/>
		<description>
These are all security issues fixed in the kbd-1.15.5-8.7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0460/">CVE-2011-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0460">CVE-2011-0460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140693" comment="kbd-1.15.5-8.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147894" version="1" class="patch">
	<metadata>
		<title>kdump-0.8.16-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-5759" ref_url="https://www.suse.com/security/cve/CVE-2016-5759/" source="CVE"/>
		<description>
These are all security issues fixed in the kdump-0.8.16-5.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5759/">CVE-2016-5759 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5759">CVE-2016-5759 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159034" comment="kdump-0.8.16-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147895" version="1" class="patch">
	<metadata>
		<title>kernel-default-4.4.73-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3939" ref_url="https://www.suse.com/security/cve/CVE-2009-3939/" source="CVE"/>
		<reference ref_id="CVE-2009-4026" ref_url="https://www.suse.com/security/cve/CVE-2009-4026/" source="CVE"/>
		<reference ref_id="CVE-2009-4027" ref_url="https://www.suse.com/security/cve/CVE-2009-4027/" source="CVE"/>
		<reference ref_id="CVE-2009-4131" ref_url="https://www.suse.com/security/cve/CVE-2009-4131/" source="CVE"/>
		<reference ref_id="CVE-2009-4138" ref_url="https://www.suse.com/security/cve/CVE-2009-4138/" source="CVE"/>
		<reference ref_id="CVE-2009-4536" ref_url="https://www.suse.com/security/cve/CVE-2009-4536/" source="CVE"/>
		<reference ref_id="CVE-2009-4538" ref_url="https://www.suse.com/security/cve/CVE-2009-4538/" source="CVE"/>
		<reference ref_id="CVE-2010-1146" ref_url="https://www.suse.com/security/cve/CVE-2010-1146/" source="CVE"/>
		<reference ref_id="CVE-2010-1436" ref_url="https://www.suse.com/security/cve/CVE-2010-1436/" source="CVE"/>
		<reference ref_id="CVE-2010-1641" ref_url="https://www.suse.com/security/cve/CVE-2010-1641/" source="CVE"/>
		<reference ref_id="CVE-2010-2066" ref_url="https://www.suse.com/security/cve/CVE-2010-2066/" source="CVE"/>
		<reference ref_id="CVE-2010-2942" ref_url="https://www.suse.com/security/cve/CVE-2010-2942/" source="CVE"/>
		<reference ref_id="CVE-2010-2954" ref_url="https://www.suse.com/security/cve/CVE-2010-2954/" source="CVE"/>
		<reference ref_id="CVE-2010-2955" ref_url="https://www.suse.com/security/cve/CVE-2010-2955/" source="CVE"/>
		<reference ref_id="CVE-2010-3081" ref_url="https://www.suse.com/security/cve/CVE-2010-3081/" source="CVE"/>
		<reference ref_id="CVE-2010-3296" ref_url="https://www.suse.com/security/cve/CVE-2010-3296/" source="CVE"/>
		<reference ref_id="CVE-2010-3297" ref_url="https://www.suse.com/security/cve/CVE-2010-3297/" source="CVE"/>
		<reference ref_id="CVE-2010-3298" ref_url="https://www.suse.com/security/cve/CVE-2010-3298/" source="CVE"/>
		<reference ref_id="CVE-2010-3301" ref_url="https://www.suse.com/security/cve/CVE-2010-3301/" source="CVE"/>
		<reference ref_id="CVE-2010-3310" ref_url="https://www.suse.com/security/cve/CVE-2010-3310/" source="CVE"/>
		<reference ref_id="CVE-2011-0712" ref_url="https://www.suse.com/security/cve/CVE-2011-0712/" source="CVE"/>
		<reference ref_id="CVE-2011-1020" ref_url="https://www.suse.com/security/cve/CVE-2011-1020/" source="CVE"/>
		<reference ref_id="CVE-2011-1577" ref_url="https://www.suse.com/security/cve/CVE-2011-1577/" source="CVE"/>
		<reference ref_id="CVE-2011-2203" ref_url="https://www.suse.com/security/cve/CVE-2011-2203/" source="CVE"/>
		<reference ref_id="CVE-2012-0056" ref_url="https://www.suse.com/security/cve/CVE-2012-0056/" source="CVE"/>
		<reference ref_id="CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160/" source="CVE"/>
		<reference ref_id="CVE-2013-0231" ref_url="https://www.suse.com/security/cve/CVE-2013-0231/" source="CVE"/>
		<reference ref_id="CVE-2013-0913" ref_url="https://www.suse.com/security/cve/CVE-2013-0913/" source="CVE"/>
		<reference ref_id="CVE-2013-2850" ref_url="https://www.suse.com/security/cve/CVE-2013-2850/" source="CVE"/>
		<reference ref_id="CVE-2013-4312" ref_url="https://www.suse.com/security/cve/CVE-2013-4312/" source="CVE"/>
		<reference ref_id="CVE-2014-0038" ref_url="https://www.suse.com/security/cve/CVE-2014-0038/" source="CVE"/>
		<reference ref_id="CVE-2014-0196" ref_url="https://www.suse.com/security/cve/CVE-2014-0196/" source="CVE"/>
		<reference ref_id="CVE-2014-0691" ref_url="https://www.suse.com/security/cve/CVE-2014-0691/" source="CVE"/>
		<reference ref_id="CVE-2015-1350" ref_url="https://www.suse.com/security/cve/CVE-2015-1350/" source="CVE"/>
		<reference ref_id="CVE-2015-7833" ref_url="https://www.suse.com/security/cve/CVE-2015-7833/" source="CVE"/>
		<reference ref_id="CVE-2015-7884" ref_url="https://www.suse.com/security/cve/CVE-2015-7884/" source="CVE"/>
		<reference ref_id="CVE-2015-7885" ref_url="https://www.suse.com/security/cve/CVE-2015-7885/" source="CVE"/>
		<reference ref_id="CVE-2015-8709" ref_url="https://www.suse.com/security/cve/CVE-2015-8709/" source="CVE"/>
		<reference ref_id="CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812/" source="CVE"/>
		<reference ref_id="CVE-2015-8964" ref_url="https://www.suse.com/security/cve/CVE-2015-8964/" source="CVE"/>
		<reference ref_id="CVE-2016-0617" ref_url="https://www.suse.com/security/cve/CVE-2016-0617/" source="CVE"/>
		<reference ref_id="CVE-2016-0723" ref_url="https://www.suse.com/security/cve/CVE-2016-0723/" source="CVE"/>
		<reference ref_id="CVE-2016-0728" ref_url="https://www.suse.com/security/cve/CVE-2016-0728/" source="CVE"/>
		<reference ref_id="CVE-2016-0758" ref_url="https://www.suse.com/security/cve/CVE-2016-0758/" source="CVE"/>
		<reference ref_id="CVE-2016-10200" ref_url="https://www.suse.com/security/cve/CVE-2016-10200/" source="CVE"/>
		<reference ref_id="CVE-2016-1237" ref_url="https://www.suse.com/security/cve/CVE-2016-1237/" source="CVE"/>
		<reference ref_id="CVE-2016-1583" ref_url="https://www.suse.com/security/cve/CVE-2016-1583/" source="CVE"/>
		<reference ref_id="CVE-2016-2117" ref_url="https://www.suse.com/security/cve/CVE-2016-2117/" source="CVE"/>
		<reference ref_id="CVE-2016-2143" ref_url="https://www.suse.com/security/cve/CVE-2016-2143/" source="CVE"/>
		<reference ref_id="CVE-2016-2184" ref_url="https://www.suse.com/security/cve/CVE-2016-2184/" source="CVE"/>
		<reference ref_id="CVE-2016-2185" ref_url="https://www.suse.com/security/cve/CVE-2016-2185/" source="CVE"/>
		<reference ref_id="CVE-2016-2186" ref_url="https://www.suse.com/security/cve/CVE-2016-2186/" source="CVE"/>
		<reference ref_id="CVE-2016-2188" ref_url="https://www.suse.com/security/cve/CVE-2016-2188/" source="CVE"/>
		<reference ref_id="CVE-2016-2383" ref_url="https://www.suse.com/security/cve/CVE-2016-2383/" source="CVE"/>
		<reference ref_id="CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384/" source="CVE"/>
		<reference ref_id="CVE-2016-2847" ref_url="https://www.suse.com/security/cve/CVE-2016-2847/" source="CVE"/>
		<reference ref_id="CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134/" source="CVE"/>
		<reference ref_id="CVE-2016-3135" ref_url="https://www.suse.com/security/cve/CVE-2016-3135/" source="CVE"/>
		<reference ref_id="CVE-2016-3136" ref_url="https://www.suse.com/security/cve/CVE-2016-3136/" source="CVE"/>
		<reference ref_id="CVE-2016-3137" ref_url="https://www.suse.com/security/cve/CVE-2016-3137/" source="CVE"/>
		<reference ref_id="CVE-2016-3138" ref_url="https://www.suse.com/security/cve/CVE-2016-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-3140" ref_url="https://www.suse.com/security/cve/CVE-2016-3140/" source="CVE"/>
		<reference ref_id="CVE-2016-3156" ref_url="https://www.suse.com/security/cve/CVE-2016-3156/" source="CVE"/>
		<reference ref_id="CVE-2016-3672" ref_url="https://www.suse.com/security/cve/CVE-2016-3672/" source="CVE"/>
		<reference ref_id="CVE-2016-3689" ref_url="https://www.suse.com/security/cve/CVE-2016-3689/" source="CVE"/>
		<reference ref_id="CVE-2016-3713" ref_url="https://www.suse.com/security/cve/CVE-2016-3713/" source="CVE"/>
		<reference ref_id="CVE-2016-3951" ref_url="https://www.suse.com/security/cve/CVE-2016-3951/" source="CVE"/>
		<reference ref_id="CVE-2016-4470" ref_url="https://www.suse.com/security/cve/CVE-2016-4470/" source="CVE"/>
		<reference ref_id="CVE-2016-4482" ref_url="https://www.suse.com/security/cve/CVE-2016-4482/" source="CVE"/>
		<reference ref_id="CVE-2016-4486" ref_url="https://www.suse.com/security/cve/CVE-2016-4486/" source="CVE"/>
		<reference ref_id="CVE-2016-4557" ref_url="https://www.suse.com/security/cve/CVE-2016-4557/" source="CVE"/>
		<reference ref_id="CVE-2016-4558" ref_url="https://www.suse.com/security/cve/CVE-2016-4558/" source="CVE"/>
		<reference ref_id="CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569/" source="CVE"/>
		<reference ref_id="CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578/" source="CVE"/>
		<reference ref_id="CVE-2016-4794" ref_url="https://www.suse.com/security/cve/CVE-2016-4794/" source="CVE"/>
		<reference ref_id="CVE-2016-4805" ref_url="https://www.suse.com/security/cve/CVE-2016-4805/" source="CVE"/>
		<reference ref_id="CVE-2016-4951" ref_url="https://www.suse.com/security/cve/CVE-2016-4951/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-4998" ref_url="https://www.suse.com/security/cve/CVE-2016-4998/" source="CVE"/>
		<reference ref_id="CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195/" source="CVE"/>
		<reference ref_id="CVE-2016-5244" ref_url="https://www.suse.com/security/cve/CVE-2016-5244/" source="CVE"/>
		<reference ref_id="CVE-2016-5412" ref_url="https://www.suse.com/security/cve/CVE-2016-5412/" source="CVE"/>
		<reference ref_id="CVE-2016-5696" ref_url="https://www.suse.com/security/cve/CVE-2016-5696/" source="CVE"/>
		<reference ref_id="CVE-2016-5828" ref_url="https://www.suse.com/security/cve/CVE-2016-5828/" source="CVE"/>
		<reference ref_id="CVE-2016-5829" ref_url="https://www.suse.com/security/cve/CVE-2016-5829/" source="CVE"/>
		<reference ref_id="CVE-2016-6197" ref_url="https://www.suse.com/security/cve/CVE-2016-6197/" source="CVE"/>
		<reference ref_id="CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480/" source="CVE"/>
		<reference ref_id="CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828/" source="CVE"/>
		<reference ref_id="CVE-2016-7039" ref_url="https://www.suse.com/security/cve/CVE-2016-7039/" source="CVE"/>
		<reference ref_id="CVE-2016-7042" ref_url="https://www.suse.com/security/cve/CVE-2016-7042/" source="CVE"/>
		<reference ref_id="CVE-2016-7097" ref_url="https://www.suse.com/security/cve/CVE-2016-7097/" source="CVE"/>
		<reference ref_id="CVE-2016-7117" ref_url="https://www.suse.com/security/cve/CVE-2016-7117/" source="CVE"/>
		<reference ref_id="CVE-2016-7425" ref_url="https://www.suse.com/security/cve/CVE-2016-7425/" source="CVE"/>
		<reference ref_id="CVE-2016-7913" ref_url="https://www.suse.com/security/cve/CVE-2016-7913/" source="CVE"/>
		<reference ref_id="CVE-2016-7917" ref_url="https://www.suse.com/security/cve/CVE-2016-7917/" source="CVE"/>
		<reference ref_id="CVE-2016-8632" ref_url="https://www.suse.com/security/cve/CVE-2016-8632/" source="CVE"/>
		<reference ref_id="CVE-2016-8636" ref_url="https://www.suse.com/security/cve/CVE-2016-8636/" source="CVE"/>
		<reference ref_id="CVE-2016-8645" ref_url="https://www.suse.com/security/cve/CVE-2016-8645/" source="CVE"/>
		<reference ref_id="CVE-2016-8655" ref_url="https://www.suse.com/security/cve/CVE-2016-8655/" source="CVE"/>
		<reference ref_id="CVE-2016-8658" ref_url="https://www.suse.com/security/cve/CVE-2016-8658/" source="CVE"/>
		<reference ref_id="CVE-2016-8666" ref_url="https://www.suse.com/security/cve/CVE-2016-8666/" source="CVE"/>
		<reference ref_id="CVE-2016-9083" ref_url="https://www.suse.com/security/cve/CVE-2016-9083/" source="CVE"/>
		<reference ref_id="CVE-2016-9084" ref_url="https://www.suse.com/security/cve/CVE-2016-9084/" source="CVE"/>
		<reference ref_id="CVE-2016-9191" ref_url="https://www.suse.com/security/cve/CVE-2016-9191/" source="CVE"/>
		<reference ref_id="CVE-2016-9555" ref_url="https://www.suse.com/security/cve/CVE-2016-9555/" source="CVE"/>
		<reference ref_id="CVE-2016-9576" ref_url="https://www.suse.com/security/cve/CVE-2016-9576/" source="CVE"/>
		<reference ref_id="CVE-2016-9793" ref_url="https://www.suse.com/security/cve/CVE-2016-9793/" source="CVE"/>
		<reference ref_id="CVE-2016-9794" ref_url="https://www.suse.com/security/cve/CVE-2016-9794/" source="CVE"/>
		<reference ref_id="CVE-2016-9806" ref_url="https://www.suse.com/security/cve/CVE-2016-9806/" source="CVE"/>
		<reference ref_id="CVE-2016-9919" ref_url="https://www.suse.com/security/cve/CVE-2016-9919/" source="CVE"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="CVE-2017-1000365" ref_url="https://www.suse.com/security/cve/CVE-2017-1000365/" source="CVE"/>
		<reference ref_id="CVE-2017-1000380" ref_url="https://www.suse.com/security/cve/CVE-2017-1000380/" source="CVE"/>
		<reference ref_id="CVE-2017-2583" ref_url="https://www.suse.com/security/cve/CVE-2017-2583/" source="CVE"/>
		<reference ref_id="CVE-2017-2584" ref_url="https://www.suse.com/security/cve/CVE-2017-2584/" source="CVE"/>
		<reference ref_id="CVE-2017-2596" ref_url="https://www.suse.com/security/cve/CVE-2017-2596/" source="CVE"/>
		<reference ref_id="CVE-2017-2636" ref_url="https://www.suse.com/security/cve/CVE-2017-2636/" source="CVE"/>
		<reference ref_id="CVE-2017-2671" ref_url="https://www.suse.com/security/cve/CVE-2017-2671/" source="CVE"/>
		<reference ref_id="CVE-2017-5551" ref_url="https://www.suse.com/security/cve/CVE-2017-5551/" source="CVE"/>
		<reference ref_id="CVE-2017-5576" ref_url="https://www.suse.com/security/cve/CVE-2017-5576/" source="CVE"/>
		<reference ref_id="CVE-2017-5577" ref_url="https://www.suse.com/security/cve/CVE-2017-5577/" source="CVE"/>
		<reference ref_id="CVE-2017-5897" ref_url="https://www.suse.com/security/cve/CVE-2017-5897/" source="CVE"/>
		<reference ref_id="CVE-2017-5970" ref_url="https://www.suse.com/security/cve/CVE-2017-5970/" source="CVE"/>
		<reference ref_id="CVE-2017-5986" ref_url="https://www.suse.com/security/cve/CVE-2017-5986/" source="CVE"/>
		<reference ref_id="CVE-2017-6074" ref_url="https://www.suse.com/security/cve/CVE-2017-6074/" source="CVE"/>
		<reference ref_id="CVE-2017-6214" ref_url="https://www.suse.com/security/cve/CVE-2017-6214/" source="CVE"/>
		<reference ref_id="CVE-2017-6345" ref_url="https://www.suse.com/security/cve/CVE-2017-6345/" source="CVE"/>
		<reference ref_id="CVE-2017-6346" ref_url="https://www.suse.com/security/cve/CVE-2017-6346/" source="CVE"/>
		<reference ref_id="CVE-2017-6347" ref_url="https://www.suse.com/security/cve/CVE-2017-6347/" source="CVE"/>
		<reference ref_id="CVE-2017-6353" ref_url="https://www.suse.com/security/cve/CVE-2017-6353/" source="CVE"/>
		<reference ref_id="CVE-2017-7184" ref_url="https://www.suse.com/security/cve/CVE-2017-7184/" source="CVE"/>
		<reference ref_id="CVE-2017-7187" ref_url="https://www.suse.com/security/cve/CVE-2017-7187/" source="CVE"/>
		<reference ref_id="CVE-2017-7261" ref_url="https://www.suse.com/security/cve/CVE-2017-7261/" source="CVE"/>
		<reference ref_id="CVE-2017-7294" ref_url="https://www.suse.com/security/cve/CVE-2017-7294/" source="CVE"/>
		<reference ref_id="CVE-2017-7308" ref_url="https://www.suse.com/security/cve/CVE-2017-7308/" source="CVE"/>
		<reference ref_id="CVE-2017-7346" ref_url="https://www.suse.com/security/cve/CVE-2017-7346/" source="CVE"/>
		<reference ref_id="CVE-2017-7374" ref_url="https://www.suse.com/security/cve/CVE-2017-7374/" source="CVE"/>
		<reference ref_id="CVE-2017-7487" ref_url="https://www.suse.com/security/cve/CVE-2017-7487/" source="CVE"/>
		<reference ref_id="CVE-2017-7518" ref_url="https://www.suse.com/security/cve/CVE-2017-7518/" source="CVE"/>
		<reference ref_id="CVE-2017-7616" ref_url="https://www.suse.com/security/cve/CVE-2017-7616/" source="CVE"/>
		<reference ref_id="CVE-2017-7618" ref_url="https://www.suse.com/security/cve/CVE-2017-7618/" source="CVE"/>
		<reference ref_id="CVE-2017-8890" ref_url="https://www.suse.com/security/cve/CVE-2017-8890/" source="CVE"/>
		<reference ref_id="CVE-2017-9074" ref_url="https://www.suse.com/security/cve/CVE-2017-9074/" source="CVE"/>
		<reference ref_id="CVE-2017-9075" ref_url="https://www.suse.com/security/cve/CVE-2017-9075/" source="CVE"/>
		<reference ref_id="CVE-2017-9076" ref_url="https://www.suse.com/security/cve/CVE-2017-9076/" source="CVE"/>
		<reference ref_id="CVE-2017-9077" ref_url="https://www.suse.com/security/cve/CVE-2017-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-9150" ref_url="https://www.suse.com/security/cve/CVE-2017-9150/" source="CVE"/>
		<reference ref_id="CVE-2017-9242" ref_url="https://www.suse.com/security/cve/CVE-2017-9242/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-default-4.4.73-5.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3939/">CVE-2009-3939 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3939">CVE-2009-3939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4026/">CVE-2009-4026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4026">CVE-2009-4026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4027/">CVE-2009-4027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4027">CVE-2009-4027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4131/">CVE-2009-4131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4131">CVE-2009-4131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4138/">CVE-2009-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4138">CVE-2009-4138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4536/">CVE-2009-4536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4536">CVE-2009-4536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4538/">CVE-2009-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4538">CVE-2009-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1146/">CVE-2010-1146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1146">CVE-2010-1146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1436/">CVE-2010-1436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1436">CVE-2010-1436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1641/">CVE-2010-1641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1641">CVE-2010-1641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2066/">CVE-2010-2066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2066">CVE-2010-2066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2942/">CVE-2010-2942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2942">CVE-2010-2942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2954/">CVE-2010-2954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2954">CVE-2010-2954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2955/">CVE-2010-2955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2955">CVE-2010-2955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3081/">CVE-2010-3081 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3081">CVE-2010-3081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3296/">CVE-2010-3296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3296">CVE-2010-3296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3297/">CVE-2010-3297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3297">CVE-2010-3297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3298/">CVE-2010-3298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3298">CVE-2010-3298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3301/">CVE-2010-3301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3301">CVE-2010-3301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3310/">CVE-2010-3310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3310">CVE-2010-3310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0712/">CVE-2011-0712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0712">CVE-2011-0712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1020/">CVE-2011-1020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1020">CVE-2011-1020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1577/">CVE-2011-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1577">CVE-2011-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2203/">CVE-2011-2203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2203">CVE-2011-2203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0056/">CVE-2012-0056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0056">CVE-2012-0056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0160">CVE-2013-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0231/">CVE-2013-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0231">CVE-2013-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0913/">CVE-2013-0913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0913">CVE-2013-0913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2850/">CVE-2013-2850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2850">CVE-2013-2850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4312/">CVE-2013-4312 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4312">CVE-2013-4312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0038/">CVE-2014-0038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0038">CVE-2014-0038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0196/">CVE-2014-0196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0196">CVE-2014-0196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0691/">CVE-2014-0691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0691">CVE-2014-0691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1350/">CVE-2015-1350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1350">CVE-2015-1350 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-7833/">CVE-2015-7833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7833">CVE-2015-7833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7884/">CVE-2015-7884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7884">CVE-2015-7884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7885/">CVE-2015-7885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7885">CVE-2015-7885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8709/">CVE-2015-8709 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8709">CVE-2015-8709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8812">CVE-2015-8812 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-8964/">CVE-2015-8964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8964">CVE-2015-8964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0617/">CVE-2016-0617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0617">CVE-2016-0617 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0723/">CVE-2016-0723 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0723">CVE-2016-0723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0728/">CVE-2016-0728 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0728">CVE-2016-0728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0758/">CVE-2016-0758 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0758">CVE-2016-0758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10200/">CVE-2016-10200 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10200">CVE-2016-10200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1237/">CVE-2016-1237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1237">CVE-2016-1237 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1583/">CVE-2016-1583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1583">CVE-2016-1583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2117/">CVE-2016-2117 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2117">CVE-2016-2117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2143/">CVE-2016-2143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2143">CVE-2016-2143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2184/">CVE-2016-2184 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2184">CVE-2016-2184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2185/">CVE-2016-2185 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2185">CVE-2016-2185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2186/">CVE-2016-2186 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2186">CVE-2016-2186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2188/">CVE-2016-2188 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2188">CVE-2016-2188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2383/">CVE-2016-2383 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2383">CVE-2016-2383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2384">CVE-2016-2384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2847/">CVE-2016-2847 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2847">CVE-2016-2847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3134">CVE-2016-3134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3135/">CVE-2016-3135 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3135">CVE-2016-3135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3136/">CVE-2016-3136 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3136">CVE-2016-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3137/">CVE-2016-3137 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3137">CVE-2016-3137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3138/">CVE-2016-3138 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3138">CVE-2016-3138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3140/">CVE-2016-3140 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3140">CVE-2016-3140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3156/">CVE-2016-3156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3156">CVE-2016-3156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3672/">CVE-2016-3672 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3672">CVE-2016-3672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3689/">CVE-2016-3689 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3689">CVE-2016-3689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3713/">CVE-2016-3713 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3713">CVE-2016-3713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3951/">CVE-2016-3951 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3951">CVE-2016-3951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4470/">CVE-2016-4470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4470">CVE-2016-4470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4482/">CVE-2016-4482 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4482">CVE-2016-4482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4486/">CVE-2016-4486 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4486">CVE-2016-4486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4557/">CVE-2016-4557 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4557">CVE-2016-4557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4558/">CVE-2016-4558 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4558">CVE-2016-4558 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4569">CVE-2016-4569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4578">CVE-2016-4578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4794/">CVE-2016-4794 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4794">CVE-2016-4794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4805/">CVE-2016-4805 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4805">CVE-2016-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4951/">CVE-2016-4951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4951">CVE-2016-4951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4997">CVE-2016-4997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4998/">CVE-2016-4998 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4998">CVE-2016-4998 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5195">CVE-2016-5195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5244/">CVE-2016-5244 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5244">CVE-2016-5244 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5412/">CVE-2016-5412 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5412">CVE-2016-5412 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5696/">CVE-2016-5696 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5696">CVE-2016-5696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5828/">CVE-2016-5828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5828">CVE-2016-5828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5829/">CVE-2016-5829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5829">CVE-2016-5829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6197/">CVE-2016-6197 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6197">CVE-2016-6197 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6480">CVE-2016-6480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6828">CVE-2016-6828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7039/">CVE-2016-7039 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7039">CVE-2016-7039 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7042/">CVE-2016-7042 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7042">CVE-2016-7042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7097/">CVE-2016-7097 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7097">CVE-2016-7097 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7117/">CVE-2016-7117 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7117">CVE-2016-7117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7425/">CVE-2016-7425 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7425">CVE-2016-7425 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7913/">CVE-2016-7913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7913">CVE-2016-7913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7917/">CVE-2016-7917 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7917">CVE-2016-7917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8632/">CVE-2016-8632 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8632">CVE-2016-8632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8636/">CVE-2016-8636 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8636">CVE-2016-8636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8645/">CVE-2016-8645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8645">CVE-2016-8645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8655/">CVE-2016-8655 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8655">CVE-2016-8655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8658/">CVE-2016-8658 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8658">CVE-2016-8658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8666/">CVE-2016-8666 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8666">CVE-2016-8666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9083/">CVE-2016-9083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9083">CVE-2016-9083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9084/">CVE-2016-9084 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9084">CVE-2016-9084 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9191/">CVE-2016-9191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9191">CVE-2016-9191 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9555/">CVE-2016-9555 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9555">CVE-2016-9555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9576/">CVE-2016-9576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9576">CVE-2016-9576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9793/">CVE-2016-9793 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9793">CVE-2016-9793 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9794/">CVE-2016-9794 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9794">CVE-2016-9794 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9806/">CVE-2016-9806 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9806">CVE-2016-9806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9919/">CVE-2016-9919 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9919">CVE-2016-9919 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000364">CVE-2017-1000364 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000365/">CVE-2017-1000365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000365">CVE-2017-1000365 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000380/">CVE-2017-1000380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000380">CVE-2017-1000380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2583/">CVE-2017-2583 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2583">CVE-2017-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2584/">CVE-2017-2584 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2584">CVE-2017-2584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2596/">CVE-2017-2596 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2596">CVE-2017-2596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2636/">CVE-2017-2636 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2636">CVE-2017-2636 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2671/">CVE-2017-2671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2671">CVE-2017-2671 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5551/">CVE-2017-5551 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5551">CVE-2017-5551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5576/">CVE-2017-5576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5576">CVE-2017-5576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5577/">CVE-2017-5577 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5577">CVE-2017-5577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5897/">CVE-2017-5897 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5897">CVE-2017-5897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5970/">CVE-2017-5970 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5970">CVE-2017-5970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5986/">CVE-2017-5986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5986">CVE-2017-5986 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6074/">CVE-2017-6074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6074">CVE-2017-6074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6214/">CVE-2017-6214 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6214">CVE-2017-6214 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6345/">CVE-2017-6345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6345">CVE-2017-6345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6346/">CVE-2017-6346 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6346">CVE-2017-6346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6347/">CVE-2017-6347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6347">CVE-2017-6347 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6353/">CVE-2017-6353 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6353">CVE-2017-6353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7184/">CVE-2017-7184 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7184">CVE-2017-7184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7187/">CVE-2017-7187 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7187">CVE-2017-7187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7261/">CVE-2017-7261 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7261">CVE-2017-7261 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7294/">CVE-2017-7294 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7294">CVE-2017-7294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7308/">CVE-2017-7308 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7308">CVE-2017-7308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7346/">CVE-2017-7346 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7346">CVE-2017-7346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7374/">CVE-2017-7374 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7374">CVE-2017-7374 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7487/">CVE-2017-7487 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7487">CVE-2017-7487 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7518/">CVE-2017-7518 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7518">CVE-2017-7518 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7616/">CVE-2017-7616 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7616">CVE-2017-7616 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7618/">CVE-2017-7618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7618">CVE-2017-7618 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8890/">CVE-2017-8890 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8890">CVE-2017-8890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9074/">CVE-2017-9074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9074">CVE-2017-9074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9075/">CVE-2017-9075 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9075">CVE-2017-9075 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9076/">CVE-2017-9076 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9076">CVE-2017-9076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9077/">CVE-2017-9077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9077">CVE-2017-9077 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9150/">CVE-2017-9150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9150">CVE-2017-9150 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9242/">CVE-2017-9242 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9242">CVE-2017-9242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159035" comment="kernel-default-4.4.73-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159036" comment="kernel-default-base-4.4.73-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159037" comment="kernel-default-devel-4.4.73-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159038" comment="kernel-default-man-4.4.73-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159039" comment="kernel-devel-4.4.73-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159040" comment="kernel-macros-4.4.73-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159041" comment="kernel-source-4.4.73-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159042" comment="kernel-syms-4.4.73-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147896" version="1" class="patch">
	<metadata>
		<title>krb5-1.12.5-39.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2002-2443" ref_url="https://www.suse.com/security/cve/CVE-2002-2443/" source="CVE"/>
		<reference ref_id="CVE-2009-0844" ref_url="https://www.suse.com/security/cve/CVE-2009-0844/" source="CVE"/>
		<reference ref_id="CVE-2009-0845" ref_url="https://www.suse.com/security/cve/CVE-2009-0845/" source="CVE"/>
		<reference ref_id="CVE-2009-0846" ref_url="https://www.suse.com/security/cve/CVE-2009-0846/" source="CVE"/>
		<reference ref_id="CVE-2009-0847" ref_url="https://www.suse.com/security/cve/CVE-2009-0847/" source="CVE"/>
		<reference ref_id="CVE-2009-3295" ref_url="https://www.suse.com/security/cve/CVE-2009-3295/" source="CVE"/>
		<reference ref_id="CVE-2009-4212" ref_url="https://www.suse.com/security/cve/CVE-2009-4212/" source="CVE"/>
		<reference ref_id="CVE-2010-0283" ref_url="https://www.suse.com/security/cve/CVE-2010-0283/" source="CVE"/>
		<reference ref_id="CVE-2010-0628" ref_url="https://www.suse.com/security/cve/CVE-2010-0628/" source="CVE"/>
		<reference ref_id="CVE-2010-1320" ref_url="https://www.suse.com/security/cve/CVE-2010-1320/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-1322" ref_url="https://www.suse.com/security/cve/CVE-2010-1322/" source="CVE"/>
		<reference ref_id="CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323/" source="CVE"/>
		<reference ref_id="CVE-2010-1324" ref_url="https://www.suse.com/security/cve/CVE-2010-1324/" source="CVE"/>
		<reference ref_id="CVE-2010-4020" ref_url="https://www.suse.com/security/cve/CVE-2010-4020/" source="CVE"/>
		<reference ref_id="CVE-2010-4021" ref_url="https://www.suse.com/security/cve/CVE-2010-4021/" source="CVE"/>
		<reference ref_id="CVE-2010-4022" ref_url="https://www.suse.com/security/cve/CVE-2010-4022/" source="CVE"/>
		<reference ref_id="CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281/" source="CVE"/>
		<reference ref_id="CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282/" source="CVE"/>
		<reference ref_id="CVE-2011-0284" ref_url="https://www.suse.com/security/cve/CVE-2011-0284/" source="CVE"/>
		<reference ref_id="CVE-2011-0285" ref_url="https://www.suse.com/security/cve/CVE-2011-0285/" source="CVE"/>
		<reference ref_id="CVE-2011-1527" ref_url="https://www.suse.com/security/cve/CVE-2011-1527/" source="CVE"/>
		<reference ref_id="CVE-2011-1528" ref_url="https://www.suse.com/security/cve/CVE-2011-1528/" source="CVE"/>
		<reference ref_id="CVE-2011-1529" ref_url="https://www.suse.com/security/cve/CVE-2011-1529/" source="CVE"/>
		<reference ref_id="CVE-2011-1530" ref_url="https://www.suse.com/security/cve/CVE-2011-1530/" source="CVE"/>
		<reference ref_id="CVE-2012-1012" ref_url="https://www.suse.com/security/cve/CVE-2012-1012/" source="CVE"/>
		<reference ref_id="CVE-2012-1013" ref_url="https://www.suse.com/security/cve/CVE-2012-1013/" source="CVE"/>
		<reference ref_id="CVE-2012-1016" ref_url="https://www.suse.com/security/cve/CVE-2012-1016/" source="CVE"/>
		<reference ref_id="CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415/" source="CVE"/>
		<reference ref_id="CVE-2013-1417" ref_url="https://www.suse.com/security/cve/CVE-2013-1417/" source="CVE"/>
		<reference ref_id="CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418/" source="CVE"/>
		<reference ref_id="CVE-2014-4341" ref_url="https://www.suse.com/security/cve/CVE-2014-4341/" source="CVE"/>
		<reference ref_id="CVE-2014-4342" ref_url="https://www.suse.com/security/cve/CVE-2014-4342/" source="CVE"/>
		<reference ref_id="CVE-2014-4343" ref_url="https://www.suse.com/security/cve/CVE-2014-4343/" source="CVE"/>
		<reference ref_id="CVE-2014-4344" ref_url="https://www.suse.com/security/cve/CVE-2014-4344/" source="CVE"/>
		<reference ref_id="CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345/" source="CVE"/>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<reference ref_id="CVE-2015-2694" ref_url="https://www.suse.com/security/cve/CVE-2015-2694/" source="CVE"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="CVE-2015-2696" ref_url="https://www.suse.com/security/cve/CVE-2015-2696/" source="CVE"/>
		<reference ref_id="CVE-2015-2697" ref_url="https://www.suse.com/security/cve/CVE-2015-2697/" source="CVE"/>
		<reference ref_id="CVE-2015-2698" ref_url="https://www.suse.com/security/cve/CVE-2015-2698/" source="CVE"/>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8630" ref_url="https://www.suse.com/security/cve/CVE-2015-8630/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<reference ref_id="CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119/" source="CVE"/>
		<reference ref_id="CVE-2016-3120" ref_url="https://www.suse.com/security/cve/CVE-2016-3120/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.12.5-39.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2002-2443/">CVE-2002-2443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2002-2443">CVE-2002-2443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0844/">CVE-2009-0844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0844">CVE-2009-0844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0845/">CVE-2009-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0845">CVE-2009-0845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0846/">CVE-2009-0846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0846">CVE-2009-0846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0847/">CVE-2009-0847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0847">CVE-2009-0847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3295/">CVE-2009-3295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3295">CVE-2009-3295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4212/">CVE-2009-4212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4212">CVE-2009-4212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0283/">CVE-2010-0283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0283">CVE-2010-0283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0628/">CVE-2010-0628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0628">CVE-2010-0628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1320/">CVE-2010-1320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1320">CVE-2010-1320 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1321">CVE-2010-1321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1322/">CVE-2010-1322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1322">CVE-2010-1322 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1323">CVE-2010-1323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1324/">CVE-2010-1324 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1324">CVE-2010-1324 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4020/">CVE-2010-4020 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2010-4020">CVE-2010-4020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4021/">CVE-2010-4021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4021">CVE-2010-4021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4022/">CVE-2010-4022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4022">CVE-2010-4022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0281">CVE-2011-0281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0282">CVE-2011-0282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0284/">CVE-2011-0284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0284">CVE-2011-0284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0285/">CVE-2011-0285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0285">CVE-2011-0285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1527/">CVE-2011-1527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1527">CVE-2011-1527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1528/">CVE-2011-1528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1528">CVE-2011-1528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1529/">CVE-2011-1529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1529">CVE-2011-1529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1530/">CVE-2011-1530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1530">CVE-2011-1530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1012/">CVE-2012-1012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1012">CVE-2012-1012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1013/">CVE-2012-1013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1013">CVE-2012-1013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1016/">CVE-2012-1016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1016">CVE-2012-1016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1415">CVE-2013-1415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1417/">CVE-2013-1417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1417">CVE-2013-1417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1418">CVE-2013-1418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4341/">CVE-2014-4341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4341">CVE-2014-4341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4342/">CVE-2014-4342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4342">CVE-2014-4342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4343/">CVE-2014-4343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4343">CVE-2014-4343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4344/">CVE-2014-4344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4344">CVE-2014-4344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4345">CVE-2014-4345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5351">CVE-2014-5351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5352">CVE-2014-5352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5353">CVE-2014-5353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5354">CVE-2014-5354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5355">CVE-2014-5355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9421">CVE-2014-9421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9422">CVE-2014-9422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9423">CVE-2014-9423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2694/">CVE-2015-2694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2694">CVE-2015-2694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2695">CVE-2015-2695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2696/">CVE-2015-2696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2696">CVE-2015-2696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2697/">CVE-2015-2697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2697">CVE-2015-2697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2698/">CVE-2015-2698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2698">CVE-2015-2698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8629">CVE-2015-8629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8630/">CVE-2015-8630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8630">CVE-2015-8630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8631">CVE-2015-8631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3119">CVE-2016-3119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3120/">CVE-2016-3120 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3120">CVE-2016-3120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147897" version="1" class="patch">
	<metadata>
		<title>krb5-appl-clients-1.0.3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1526" ref_url="https://www.suse.com/security/cve/CVE-2011-1526/" source="CVE"/>
		<reference ref_id="CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-appl-clients-1.0.3-1.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1526/">CVE-2011-1526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1526">CVE-2011-1526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4862">CVE-2011-4862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140711" comment="krb5-appl-clients-1.0.3-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140712" comment="krb5-appl-servers-1.0.3-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147898" version="1" class="patch">
	<metadata>
		<title>lftp-4.7.4-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<description>
These are all security issues fixed in the lftp-4.7.4-1.13 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0139">CVE-2014-0139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159043" comment="lftp-4.7.4-1.13 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147899" version="1" class="patch">
	<metadata>
		<title>libFLAC++6-1.3.0-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962/" source="CVE"/>
		<reference ref_id="CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028/" source="CVE"/>
		<description>
These are all security issues fixed in the libFLAC++6-1.3.0-11.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8962">CVE-2014-8962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9028">CVE-2014-9028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140571" comment="libFLAC++6-1.3.0-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140572" comment="libFLAC8-1.3.0-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140573" comment="libFLAC8-32bit-1.3.0-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147900" version="1" class="patch">
	<metadata>
		<title>libHX28-3.18-1.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2947" ref_url="https://www.suse.com/security/cve/CVE-2010-2947/" source="CVE"/>
		<description>
These are all security issues fixed in the libHX28-3.18-1.18 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2947/">CVE-2010-2947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2947">CVE-2010-2947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140717" comment="libHX28-3.18-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140718" comment="libHX28-32bit-3.18-1.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147901" version="1" class="patch">
	<metadata>
		<title>libIlmImf-Imf_2_1-21-2.1.0-4.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-1720" ref_url="https://www.suse.com/security/cve/CVE-2009-1720/" source="CVE"/>
		<reference ref_id="CVE-2009-1721" ref_url="https://www.suse.com/security/cve/CVE-2009-1721/" source="CVE"/>
		<description>
These are all security issues fixed in the libIlmImf-Imf_2_1-21-2.1.0-4.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1720/">CVE-2009-1720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1720">CVE-2009-1720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1721/">CVE-2009-1721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1721">CVE-2009-1721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140719" comment="libIlmImf-Imf_2_1-21-2.1.0-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140720" comment="openexr-2.1.0-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147902" version="1" class="patch">
	<metadata>
		<title>libMagickCore-6_Q16-1-6.8.8.1-70.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-0247" ref_url="https://www.suse.com/security/cve/CVE-2012-0247/" source="CVE"/>
		<reference ref_id="CVE-2012-0248" ref_url="https://www.suse.com/security/cve/CVE-2012-0248/" source="CVE"/>
		<reference ref_id="CVE-2012-1185" ref_url="https://www.suse.com/security/cve/CVE-2012-1185/" source="CVE"/>
		<reference ref_id="CVE-2012-1186" ref_url="https://www.suse.com/security/cve/CVE-2012-1186/" source="CVE"/>
		<reference ref_id="CVE-2014-8354" ref_url="https://www.suse.com/security/cve/CVE-2014-8354/" source="CVE"/>
		<reference ref_id="CVE-2014-8355" ref_url="https://www.suse.com/security/cve/CVE-2014-8355/" source="CVE"/>
		<reference ref_id="CVE-2014-8562" ref_url="https://www.suse.com/security/cve/CVE-2014-8562/" source="CVE"/>
		<reference ref_id="CVE-2014-8716" ref_url="https://www.suse.com/security/cve/CVE-2014-8716/" source="CVE"/>
		<reference ref_id="CVE-2014-9805" ref_url="https://www.suse.com/security/cve/CVE-2014-9805/" source="CVE"/>
		<reference ref_id="CVE-2014-9806" ref_url="https://www.suse.com/security/cve/CVE-2014-9806/" source="CVE"/>
		<reference ref_id="CVE-2014-9807" ref_url="https://www.suse.com/security/cve/CVE-2014-9807/" source="CVE"/>
		<reference ref_id="CVE-2014-9808" ref_url="https://www.suse.com/security/cve/CVE-2014-9808/" source="CVE"/>
		<reference ref_id="CVE-2014-9809" ref_url="https://www.suse.com/security/cve/CVE-2014-9809/" source="CVE"/>
		<reference ref_id="CVE-2014-9810" ref_url="https://www.suse.com/security/cve/CVE-2014-9810/" source="CVE"/>
		<reference ref_id="CVE-2014-9811" ref_url="https://www.suse.com/security/cve/CVE-2014-9811/" source="CVE"/>
		<reference ref_id="CVE-2014-9812" ref_url="https://www.suse.com/security/cve/CVE-2014-9812/" source="CVE"/>
		<reference ref_id="CVE-2014-9813" ref_url="https://www.suse.com/security/cve/CVE-2014-9813/" source="CVE"/>
		<reference ref_id="CVE-2014-9814" ref_url="https://www.suse.com/security/cve/CVE-2014-9814/" source="CVE"/>
		<reference ref_id="CVE-2014-9815" ref_url="https://www.suse.com/security/cve/CVE-2014-9815/" source="CVE"/>
		<reference ref_id="CVE-2014-9816" ref_url="https://www.suse.com/security/cve/CVE-2014-9816/" source="CVE"/>
		<reference ref_id="CVE-2014-9817" ref_url="https://www.suse.com/security/cve/CVE-2014-9817/" source="CVE"/>
		<reference ref_id="CVE-2014-9818" ref_url="https://www.suse.com/security/cve/CVE-2014-9818/" source="CVE"/>
		<reference ref_id="CVE-2014-9819" ref_url="https://www.suse.com/security/cve/CVE-2014-9819/" source="CVE"/>
		<reference ref_id="CVE-2014-9820" ref_url="https://www.suse.com/security/cve/CVE-2014-9820/" source="CVE"/>
		<reference ref_id="CVE-2014-9821" ref_url="https://www.suse.com/security/cve/CVE-2014-9821/" source="CVE"/>
		<reference ref_id="CVE-2014-9822" ref_url="https://www.suse.com/security/cve/CVE-2014-9822/" source="CVE"/>
		<reference ref_id="CVE-2014-9823" ref_url="https://www.suse.com/security/cve/CVE-2014-9823/" source="CVE"/>
		<reference ref_id="CVE-2014-9824" ref_url="https://www.suse.com/security/cve/CVE-2014-9824/" source="CVE"/>
		<reference ref_id="CVE-2014-9825" ref_url="https://www.suse.com/security/cve/CVE-2014-9825/" source="CVE"/>
		<reference ref_id="CVE-2014-9826" ref_url="https://www.suse.com/security/cve/CVE-2014-9826/" source="CVE"/>
		<reference ref_id="CVE-2014-9828" ref_url="https://www.suse.com/security/cve/CVE-2014-9828/" source="CVE"/>
		<reference ref_id="CVE-2014-9829" ref_url="https://www.suse.com/security/cve/CVE-2014-9829/" source="CVE"/>
		<reference ref_id="CVE-2014-9830" ref_url="https://www.suse.com/security/cve/CVE-2014-9830/" source="CVE"/>
		<reference ref_id="CVE-2014-9831" ref_url="https://www.suse.com/security/cve/CVE-2014-9831/" source="CVE"/>
		<reference ref_id="CVE-2014-9832" ref_url="https://www.suse.com/security/cve/CVE-2014-9832/" source="CVE"/>
		<reference ref_id="CVE-2014-9833" ref_url="https://www.suse.com/security/cve/CVE-2014-9833/" source="CVE"/>
		<reference ref_id="CVE-2014-9834" ref_url="https://www.suse.com/security/cve/CVE-2014-9834/" source="CVE"/>
		<reference ref_id="CVE-2014-9835" ref_url="https://www.suse.com/security/cve/CVE-2014-9835/" source="CVE"/>
		<reference ref_id="CVE-2014-9836" ref_url="https://www.suse.com/security/cve/CVE-2014-9836/" source="CVE"/>
		<reference ref_id="CVE-2014-9837" ref_url="https://www.suse.com/security/cve/CVE-2014-9837/" source="CVE"/>
		<reference ref_id="CVE-2014-9838" ref_url="https://www.suse.com/security/cve/CVE-2014-9838/" source="CVE"/>
		<reference ref_id="CVE-2014-9839" ref_url="https://www.suse.com/security/cve/CVE-2014-9839/" source="CVE"/>
		<reference ref_id="CVE-2014-9840" ref_url="https://www.suse.com/security/cve/CVE-2014-9840/" source="CVE"/>
		<reference ref_id="CVE-2014-9841" ref_url="https://www.suse.com/security/cve/CVE-2014-9841/" source="CVE"/>
		<reference ref_id="CVE-2014-9842" ref_url="https://www.suse.com/security/cve/CVE-2014-9842/" source="CVE"/>
		<reference ref_id="CVE-2014-9843" ref_url="https://www.suse.com/security/cve/CVE-2014-9843/" source="CVE"/>
		<reference ref_id="CVE-2014-9844" ref_url="https://www.suse.com/security/cve/CVE-2014-9844/" source="CVE"/>
		<reference ref_id="CVE-2014-9845" ref_url="https://www.suse.com/security/cve/CVE-2014-9845/" source="CVE"/>
		<reference ref_id="CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846/" source="CVE"/>
		<reference ref_id="CVE-2014-9847" ref_url="https://www.suse.com/security/cve/CVE-2014-9847/" source="CVE"/>
		<reference ref_id="CVE-2014-9848" ref_url="https://www.suse.com/security/cve/CVE-2014-9848/" source="CVE"/>
		<reference ref_id="CVE-2014-9849" ref_url="https://www.suse.com/security/cve/CVE-2014-9849/" source="CVE"/>
		<reference ref_id="CVE-2014-9850" ref_url="https://www.suse.com/security/cve/CVE-2014-9850/" source="CVE"/>
		<reference ref_id="CVE-2014-9851" ref_url="https://www.suse.com/security/cve/CVE-2014-9851/" source="CVE"/>
		<reference ref_id="CVE-2014-9852" ref_url="https://www.suse.com/security/cve/CVE-2014-9852/" source="CVE"/>
		<reference ref_id="CVE-2014-9853" ref_url="https://www.suse.com/security/cve/CVE-2014-9853/" source="CVE"/>
		<reference ref_id="CVE-2014-9854" ref_url="https://www.suse.com/security/cve/CVE-2014-9854/" source="CVE"/>
		<reference ref_id="CVE-2014-9907" ref_url="https://www.suse.com/security/cve/CVE-2014-9907/" source="CVE"/>
		<reference ref_id="CVE-2015-8894" ref_url="https://www.suse.com/security/cve/CVE-2015-8894/" source="CVE"/>
		<reference ref_id="CVE-2015-8895" ref_url="https://www.suse.com/security/cve/CVE-2015-8895/" source="CVE"/>
		<reference ref_id="CVE-2015-8896" ref_url="https://www.suse.com/security/cve/CVE-2015-8896/" source="CVE"/>
		<reference ref_id="CVE-2015-8897" ref_url="https://www.suse.com/security/cve/CVE-2015-8897/" source="CVE"/>
		<reference ref_id="CVE-2015-8898" ref_url="https://www.suse.com/security/cve/CVE-2015-8898/" source="CVE"/>
		<reference ref_id="CVE-2015-8900" ref_url="https://www.suse.com/security/cve/CVE-2015-8900/" source="CVE"/>
		<reference ref_id="CVE-2015-8901" ref_url="https://www.suse.com/security/cve/CVE-2015-8901/" source="CVE"/>
		<reference ref_id="CVE-2015-8902" ref_url="https://www.suse.com/security/cve/CVE-2015-8902/" source="CVE"/>
		<reference ref_id="CVE-2015-8903" ref_url="https://www.suse.com/security/cve/CVE-2015-8903/" source="CVE"/>
		<reference ref_id="CVE-2015-8957" ref_url="https://www.suse.com/security/cve/CVE-2015-8957/" source="CVE"/>
		<reference ref_id="CVE-2015-8958" ref_url="https://www.suse.com/security/cve/CVE-2015-8958/" source="CVE"/>
		<reference ref_id="CVE-2015-8959" ref_url="https://www.suse.com/security/cve/CVE-2015-8959/" source="CVE"/>
		<reference ref_id="CVE-2016-10046" ref_url="https://www.suse.com/security/cve/CVE-2016-10046/" source="CVE"/>
		<reference ref_id="CVE-2016-10048" ref_url="https://www.suse.com/security/cve/CVE-2016-10048/" source="CVE"/>
		<reference ref_id="CVE-2016-10049" ref_url="https://www.suse.com/security/cve/CVE-2016-10049/" source="CVE"/>
		<reference ref_id="CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050/" source="CVE"/>
		<reference ref_id="CVE-2016-10051" ref_url="https://www.suse.com/security/cve/CVE-2016-10051/" source="CVE"/>
		<reference ref_id="CVE-2016-10052" ref_url="https://www.suse.com/security/cve/CVE-2016-10052/" source="CVE"/>
		<reference ref_id="CVE-2016-10059" ref_url="https://www.suse.com/security/cve/CVE-2016-10059/" source="CVE"/>
		<reference ref_id="CVE-2016-10060" ref_url="https://www.suse.com/security/cve/CVE-2016-10060/" source="CVE"/>
		<reference ref_id="CVE-2016-10061" ref_url="https://www.suse.com/security/cve/CVE-2016-10061/" source="CVE"/>
		<reference ref_id="CVE-2016-10062" ref_url="https://www.suse.com/security/cve/CVE-2016-10062/" source="CVE"/>
		<reference ref_id="CVE-2016-10063" ref_url="https://www.suse.com/security/cve/CVE-2016-10063/" source="CVE"/>
		<reference ref_id="CVE-2016-10064" ref_url="https://www.suse.com/security/cve/CVE-2016-10064/" source="CVE"/>
		<reference ref_id="CVE-2016-10065" ref_url="https://www.suse.com/security/cve/CVE-2016-10065/" source="CVE"/>
		<reference ref_id="CVE-2016-10068" ref_url="https://www.suse.com/security/cve/CVE-2016-10068/" source="CVE"/>
		<reference ref_id="CVE-2016-10069" ref_url="https://www.suse.com/security/cve/CVE-2016-10069/" source="CVE"/>
		<reference ref_id="CVE-2016-10070" ref_url="https://www.suse.com/security/cve/CVE-2016-10070/" source="CVE"/>
		<reference ref_id="CVE-2016-10071" ref_url="https://www.suse.com/security/cve/CVE-2016-10071/" source="CVE"/>
		<reference ref_id="CVE-2016-10144" ref_url="https://www.suse.com/security/cve/CVE-2016-10144/" source="CVE"/>
		<reference ref_id="CVE-2016-10145" ref_url="https://www.suse.com/security/cve/CVE-2016-10145/" source="CVE"/>
		<reference ref_id="CVE-2016-10146" ref_url="https://www.suse.com/security/cve/CVE-2016-10146/" source="CVE"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<reference ref_id="CVE-2016-4562" ref_url="https://www.suse.com/security/cve/CVE-2016-4562/" source="CVE"/>
		<reference ref_id="CVE-2016-4563" ref_url="https://www.suse.com/security/cve/CVE-2016-4563/" source="CVE"/>
		<reference ref_id="CVE-2016-4564" ref_url="https://www.suse.com/security/cve/CVE-2016-4564/" source="CVE"/>
		<reference ref_id="CVE-2016-5010" ref_url="https://www.suse.com/security/cve/CVE-2016-5010/" source="CVE"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<reference ref_id="CVE-2016-5687" ref_url="https://www.suse.com/security/cve/CVE-2016-5687/" source="CVE"/>
		<reference ref_id="CVE-2016-5688" ref_url="https://www.suse.com/security/cve/CVE-2016-5688/" source="CVE"/>
		<reference ref_id="CVE-2016-5689" ref_url="https://www.suse.com/security/cve/CVE-2016-5689/" source="CVE"/>
		<reference ref_id="CVE-2016-5690" ref_url="https://www.suse.com/security/cve/CVE-2016-5690/" source="CVE"/>
		<reference ref_id="CVE-2016-5691" ref_url="https://www.suse.com/security/cve/CVE-2016-5691/" source="CVE"/>
		<reference ref_id="CVE-2016-5841" ref_url="https://www.suse.com/security/cve/CVE-2016-5841/" source="CVE"/>
		<reference ref_id="CVE-2016-5842" ref_url="https://www.suse.com/security/cve/CVE-2016-5842/" source="CVE"/>
		<reference ref_id="CVE-2016-6491" ref_url="https://www.suse.com/security/cve/CVE-2016-6491/" source="CVE"/>
		<reference ref_id="CVE-2016-6520" ref_url="https://www.suse.com/security/cve/CVE-2016-6520/" source="CVE"/>
		<reference ref_id="CVE-2016-6823" ref_url="https://www.suse.com/security/cve/CVE-2016-6823/" source="CVE"/>
		<reference ref_id="CVE-2016-7101" ref_url="https://www.suse.com/security/cve/CVE-2016-7101/" source="CVE"/>
		<reference ref_id="CVE-2016-7513" ref_url="https://www.suse.com/security/cve/CVE-2016-7513/" source="CVE"/>
		<reference ref_id="CVE-2016-7514" ref_url="https://www.suse.com/security/cve/CVE-2016-7514/" source="CVE"/>
		<reference ref_id="CVE-2016-7515" ref_url="https://www.suse.com/security/cve/CVE-2016-7515/" source="CVE"/>
		<reference ref_id="CVE-2016-7516" ref_url="https://www.suse.com/security/cve/CVE-2016-7516/" source="CVE"/>
		<reference ref_id="CVE-2016-7517" ref_url="https://www.suse.com/security/cve/CVE-2016-7517/" source="CVE"/>
		<reference ref_id="CVE-2016-7518" ref_url="https://www.suse.com/security/cve/CVE-2016-7518/" source="CVE"/>
		<reference ref_id="CVE-2016-7519" ref_url="https://www.suse.com/security/cve/CVE-2016-7519/" source="CVE"/>
		<reference ref_id="CVE-2016-7520" ref_url="https://www.suse.com/security/cve/CVE-2016-7520/" source="CVE"/>
		<reference ref_id="CVE-2016-7521" ref_url="https://www.suse.com/security/cve/CVE-2016-7521/" source="CVE"/>
		<reference ref_id="CVE-2016-7522" ref_url="https://www.suse.com/security/cve/CVE-2016-7522/" source="CVE"/>
		<reference ref_id="CVE-2016-7523" ref_url="https://www.suse.com/security/cve/CVE-2016-7523/" source="CVE"/>
		<reference ref_id="CVE-2016-7524" ref_url="https://www.suse.com/security/cve/CVE-2016-7524/" source="CVE"/>
		<reference ref_id="CVE-2016-7525" ref_url="https://www.suse.com/security/cve/CVE-2016-7525/" source="CVE"/>
		<reference ref_id="CVE-2016-7526" ref_url="https://www.suse.com/security/cve/CVE-2016-7526/" source="CVE"/>
		<reference ref_id="CVE-2016-7527" ref_url="https://www.suse.com/security/cve/CVE-2016-7527/" source="CVE"/>
		<reference ref_id="CVE-2016-7528" ref_url="https://www.suse.com/security/cve/CVE-2016-7528/" source="CVE"/>
		<reference ref_id="CVE-2016-7529" ref_url="https://www.suse.com/security/cve/CVE-2016-7529/" source="CVE"/>
		<reference ref_id="CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530/" source="CVE"/>
		<reference ref_id="CVE-2016-7531" ref_url="https://www.suse.com/security/cve/CVE-2016-7531/" source="CVE"/>
		<reference ref_id="CVE-2016-7532" ref_url="https://www.suse.com/security/cve/CVE-2016-7532/" source="CVE"/>
		<reference ref_id="CVE-2016-7533" ref_url="https://www.suse.com/security/cve/CVE-2016-7533/" source="CVE"/>
		<reference ref_id="CVE-2016-7534" ref_url="https://www.suse.com/security/cve/CVE-2016-7534/" source="CVE"/>
		<reference ref_id="CVE-2016-7535" ref_url="https://www.suse.com/security/cve/CVE-2016-7535/" source="CVE"/>
		<reference ref_id="CVE-2016-7537" ref_url="https://www.suse.com/security/cve/CVE-2016-7537/" source="CVE"/>
		<reference ref_id="CVE-2016-7538" ref_url="https://www.suse.com/security/cve/CVE-2016-7538/" source="CVE"/>
		<reference ref_id="CVE-2016-7539" ref_url="https://www.suse.com/security/cve/CVE-2016-7539/" source="CVE"/>
		<reference ref_id="CVE-2016-7540" ref_url="https://www.suse.com/security/cve/CVE-2016-7540/" source="CVE"/>
		<reference ref_id="CVE-2016-7799" ref_url="https://www.suse.com/security/cve/CVE-2016-7799/" source="CVE"/>
		<reference ref_id="CVE-2016-7800" ref_url="https://www.suse.com/security/cve/CVE-2016-7800/" source="CVE"/>
		<reference ref_id="CVE-2016-7996" ref_url="https://www.suse.com/security/cve/CVE-2016-7996/" source="CVE"/>
		<reference ref_id="CVE-2016-7997" ref_url="https://www.suse.com/security/cve/CVE-2016-7997/" source="CVE"/>
		<reference ref_id="CVE-2016-8677" ref_url="https://www.suse.com/security/cve/CVE-2016-8677/" source="CVE"/>
		<reference ref_id="CVE-2016-8682" ref_url="https://www.suse.com/security/cve/CVE-2016-8682/" source="CVE"/>
		<reference ref_id="CVE-2016-8683" ref_url="https://www.suse.com/security/cve/CVE-2016-8683/" source="CVE"/>
		<reference ref_id="CVE-2016-8684" ref_url="https://www.suse.com/security/cve/CVE-2016-8684/" source="CVE"/>
		<reference ref_id="CVE-2016-8707" ref_url="https://www.suse.com/security/cve/CVE-2016-8707/" source="CVE"/>
		<reference ref_id="CVE-2016-8862" ref_url="https://www.suse.com/security/cve/CVE-2016-8862/" source="CVE"/>
		<reference ref_id="CVE-2016-8866" ref_url="https://www.suse.com/security/cve/CVE-2016-8866/" source="CVE"/>
		<reference ref_id="CVE-2016-9556" ref_url="https://www.suse.com/security/cve/CVE-2016-9556/" source="CVE"/>
		<reference ref_id="CVE-2016-9559" ref_url="https://www.suse.com/security/cve/CVE-2016-9559/" source="CVE"/>
		<reference ref_id="CVE-2016-9773" ref_url="https://www.suse.com/security/cve/CVE-2016-9773/" source="CVE"/>
		<reference ref_id="CVE-2017-5506" ref_url="https://www.suse.com/security/cve/CVE-2017-5506/" source="CVE"/>
		<reference ref_id="CVE-2017-5507" ref_url="https://www.suse.com/security/cve/CVE-2017-5507/" source="CVE"/>
		<reference ref_id="CVE-2017-5508" ref_url="https://www.suse.com/security/cve/CVE-2017-5508/" source="CVE"/>
		<reference ref_id="CVE-2017-5510" ref_url="https://www.suse.com/security/cve/CVE-2017-5510/" source="CVE"/>
		<reference ref_id="CVE-2017-5511" ref_url="https://www.suse.com/security/cve/CVE-2017-5511/" source="CVE"/>
		<reference ref_id="CVE-2017-6502" ref_url="https://www.suse.com/security/cve/CVE-2017-6502/" source="CVE"/>
		<reference ref_id="CVE-2017-7606" ref_url="https://www.suse.com/security/cve/CVE-2017-7606/" source="CVE"/>
		<reference ref_id="CVE-2017-7941" ref_url="https://www.suse.com/security/cve/CVE-2017-7941/" source="CVE"/>
		<reference ref_id="CVE-2017-7942" ref_url="https://www.suse.com/security/cve/CVE-2017-7942/" source="CVE"/>
		<reference ref_id="CVE-2017-7943" ref_url="https://www.suse.com/security/cve/CVE-2017-7943/" source="CVE"/>
		<reference ref_id="CVE-2017-8343" ref_url="https://www.suse.com/security/cve/CVE-2017-8343/" source="CVE"/>
		<reference ref_id="CVE-2017-8344" ref_url="https://www.suse.com/security/cve/CVE-2017-8344/" source="CVE"/>
		<reference ref_id="CVE-2017-8345" ref_url="https://www.suse.com/security/cve/CVE-2017-8345/" source="CVE"/>
		<reference ref_id="CVE-2017-8346" ref_url="https://www.suse.com/security/cve/CVE-2017-8346/" source="CVE"/>
		<reference ref_id="CVE-2017-8347" ref_url="https://www.suse.com/security/cve/CVE-2017-8347/" source="CVE"/>
		<reference ref_id="CVE-2017-8348" ref_url="https://www.suse.com/security/cve/CVE-2017-8348/" source="CVE"/>
		<reference ref_id="CVE-2017-8349" ref_url="https://www.suse.com/security/cve/CVE-2017-8349/" source="CVE"/>
		<reference ref_id="CVE-2017-8350" ref_url="https://www.suse.com/security/cve/CVE-2017-8350/" source="CVE"/>
		<reference ref_id="CVE-2017-8351" ref_url="https://www.suse.com/security/cve/CVE-2017-8351/" source="CVE"/>
		<reference ref_id="CVE-2017-8352" ref_url="https://www.suse.com/security/cve/CVE-2017-8352/" source="CVE"/>
		<reference ref_id="CVE-2017-8353" ref_url="https://www.suse.com/security/cve/CVE-2017-8353/" source="CVE"/>
		<reference ref_id="CVE-2017-8354" ref_url="https://www.suse.com/security/cve/CVE-2017-8354/" source="CVE"/>
		<reference ref_id="CVE-2017-8355" ref_url="https://www.suse.com/security/cve/CVE-2017-8355/" source="CVE"/>
		<reference ref_id="CVE-2017-8356" ref_url="https://www.suse.com/security/cve/CVE-2017-8356/" source="CVE"/>
		<reference ref_id="CVE-2017-8357" ref_url="https://www.suse.com/security/cve/CVE-2017-8357/" source="CVE"/>
		<reference ref_id="CVE-2017-8765" ref_url="https://www.suse.com/security/cve/CVE-2017-8765/" source="CVE"/>
		<reference ref_id="CVE-2017-8830" ref_url="https://www.suse.com/security/cve/CVE-2017-8830/" source="CVE"/>
		<reference ref_id="CVE-2017-9098" ref_url="https://www.suse.com/security/cve/CVE-2017-9098/" source="CVE"/>
		<reference ref_id="CVE-2017-9141" ref_url="https://www.suse.com/security/cve/CVE-2017-9141/" source="CVE"/>
		<reference ref_id="CVE-2017-9142" ref_url="https://www.suse.com/security/cve/CVE-2017-9142/" source="CVE"/>
		<reference ref_id="CVE-2017-9143" ref_url="https://www.suse.com/security/cve/CVE-2017-9143/" source="CVE"/>
		<reference ref_id="CVE-2017-9144" ref_url="https://www.suse.com/security/cve/CVE-2017-9144/" source="CVE"/>
		<description>
These are all security issues fixed in the libMagickCore-6_Q16-1-6.8.8.1-70.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0247/">CVE-2012-0247 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0247">CVE-2012-0247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0248/">CVE-2012-0248 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0248">CVE-2012-0248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1185/">CVE-2012-1185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1185">CVE-2012-1185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1186/">CVE-2012-1186 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1186">CVE-2012-1186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8354/">CVE-2014-8354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8354">CVE-2014-8354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8355/">CVE-2014-8355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8355">CVE-2014-8355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8562/">CVE-2014-8562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8562">CVE-2014-8562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8716/">CVE-2014-8716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8716">CVE-2014-8716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9805/">CVE-2014-9805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9805">CVE-2014-9805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9806/">CVE-2014-9806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9806">CVE-2014-9806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9807/">CVE-2014-9807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9807">CVE-2014-9807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9808/">CVE-2014-9808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9808">CVE-2014-9808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9809/">CVE-2014-9809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9809">CVE-2014-9809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9810/">CVE-2014-9810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9810">CVE-2014-9810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9811/">CVE-2014-9811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9811">CVE-2014-9811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9812/">CVE-2014-9812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9812">CVE-2014-9812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9813/">CVE-2014-9813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9813">CVE-2014-9813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9814/">CVE-2014-9814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9814">CVE-2014-9814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9815/">CVE-2014-9815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9815">CVE-2014-9815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9816/">CVE-2014-9816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9816">CVE-2014-9816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9817/">CVE-2014-9817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9817">CVE-2014-9817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9818/">CVE-2014-9818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9818">CVE-2014-9818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9819/">CVE-2014-9819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9819">CVE-2014-9819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9820/">CVE-2014-9820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9820">CVE-2014-9820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9821/">CVE-2014-9821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9821">CVE-2014-9821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9822/">CVE-2014-9822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9822">CVE-2014-9822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9823/">CVE-2014-9823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9823">CVE-2014-9823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9824/">CVE-2014-9824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9824">CVE-2014-9824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9825/">CVE-2014-9825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9825">CVE-2014-9825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9826/">CVE-2014-9826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9826">CVE-2014-9826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9828/">CVE-2014-9828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9828">CVE-2014-9828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9829/">CVE-2014-9829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9829">CVE-2014-9829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9830/">CVE-2014-9830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9830">CVE-2014-9830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9831/">CVE-2014-9831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9831">CVE-2014-9831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9832/">CVE-2014-9832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9832">CVE-2014-9832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9833/">CVE-2014-9833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9833">CVE-2014-9833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9834/">CVE-2014-9834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9834">CVE-2014-9834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9835/">CVE-2014-9835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9835">CVE-2014-9835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9836/">CVE-2014-9836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9836">CVE-2014-9836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9837/">CVE-2014-9837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9837">CVE-2014-9837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9838/">CVE-2014-9838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9838">CVE-2014-9838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9839/">CVE-2014-9839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9839">CVE-2014-9839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9840/">CVE-2014-9840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9840">CVE-2014-9840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9841/">CVE-2014-9841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9841">CVE-2014-9841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9842/">CVE-2014-9842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9842">CVE-2014-9842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9843/">CVE-2014-9843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9843">CVE-2014-9843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9844/">CVE-2014-9844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9844">CVE-2014-9844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9845/">CVE-2014-9845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9845">CVE-2014-9845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9846">CVE-2014-9846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9847/">CVE-2014-9847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9847">CVE-2014-9847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9848/">CVE-2014-9848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9848">CVE-2014-9848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9849/">CVE-2014-9849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9849">CVE-2014-9849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9850/">CVE-2014-9850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9850">CVE-2014-9850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9851/">CVE-2014-9851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9851">CVE-2014-9851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9852/">CVE-2014-9852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9852">CVE-2014-9852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9853/">CVE-2014-9853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9853">CVE-2014-9853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9854/">CVE-2014-9854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9854">CVE-2014-9854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9907/">CVE-2014-9907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9907">CVE-2014-9907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8894/">CVE-2015-8894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8894">CVE-2015-8894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8895/">CVE-2015-8895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8895">CVE-2015-8895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8896/">CVE-2015-8896 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8896">CVE-2015-8896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8897/">CVE-2015-8897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8897">CVE-2015-8897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8898/">CVE-2015-8898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8898">CVE-2015-8898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8900/">CVE-2015-8900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8900">CVE-2015-8900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8901/">CVE-2015-8901 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8901">CVE-2015-8901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8902/">CVE-2015-8902 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8902">CVE-2015-8902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8903/">CVE-2015-8903 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8903">CVE-2015-8903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8957/">CVE-2015-8957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8957">CVE-2015-8957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8958/">CVE-2015-8958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8958">CVE-2015-8958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8959/">CVE-2015-8959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8959">CVE-2015-8959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10046/">CVE-2016-10046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10046">CVE-2016-10046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10048/">CVE-2016-10048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10048">CVE-2016-10048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10049/">CVE-2016-10049 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10049">CVE-2016-10049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10050">CVE-2016-10050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10051/">CVE-2016-10051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10051">CVE-2016-10051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10052/">CVE-2016-10052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10052">CVE-2016-10052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10059/">CVE-2016-10059 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10059">CVE-2016-10059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10060/">CVE-2016-10060 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10060">CVE-2016-10060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10061/">CVE-2016-10061 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10061">CVE-2016-10061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10062/">CVE-2016-10062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10062">CVE-2016-10062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10063/">CVE-2016-10063 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10063">CVE-2016-10063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10064/">CVE-2016-10064 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10064">CVE-2016-10064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10065/">CVE-2016-10065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10065">CVE-2016-10065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10068/">CVE-2016-10068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10068">CVE-2016-10068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10069/">CVE-2016-10069 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10069">CVE-2016-10069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10070/">CVE-2016-10070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10070">CVE-2016-10070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10071/">CVE-2016-10071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10071">CVE-2016-10071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10144/">CVE-2016-10144 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10144">CVE-2016-10144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10145/">CVE-2016-10145 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10145">CVE-2016-10145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10146/">CVE-2016-10146 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10146">CVE-2016-10146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3714">CVE-2016-3714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3715">CVE-2016-3715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3716">CVE-2016-3716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3717">CVE-2016-3717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3718">CVE-2016-3718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4562/">CVE-2016-4562 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4562">CVE-2016-4562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4563/">CVE-2016-4563 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4563">CVE-2016-4563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4564/">CVE-2016-4564 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4564">CVE-2016-4564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5010/">CVE-2016-5010 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5010">CVE-2016-5010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5118">CVE-2016-5118 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5687/">CVE-2016-5687 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5687">CVE-2016-5687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5688/">CVE-2016-5688 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5688">CVE-2016-5688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5689/">CVE-2016-5689 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5689">CVE-2016-5689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5690/">CVE-2016-5690 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5690">CVE-2016-5690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5691/">CVE-2016-5691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5691">CVE-2016-5691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5841/">CVE-2016-5841 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5841">CVE-2016-5841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5842/">CVE-2016-5842 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5842">CVE-2016-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6491/">CVE-2016-6491 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6491">CVE-2016-6491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6520/">CVE-2016-6520 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6520">CVE-2016-6520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6823/">CVE-2016-6823 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6823">CVE-2016-6823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7101/">CVE-2016-7101 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7101">CVE-2016-7101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7513/">CVE-2016-7513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7513">CVE-2016-7513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7514/">CVE-2016-7514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7514">CVE-2016-7514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7515/">CVE-2016-7515 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7515">CVE-2016-7515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7516/">CVE-2016-7516 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7516">CVE-2016-7516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7517/">CVE-2016-7517 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7517">CVE-2016-7517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7518/">CVE-2016-7518 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7518">CVE-2016-7518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7519/">CVE-2016-7519 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7519">CVE-2016-7519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7520/">CVE-2016-7520 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7520">CVE-2016-7520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7521/">CVE-2016-7521 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7521">CVE-2016-7521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7522/">CVE-2016-7522 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7522">CVE-2016-7522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7523/">CVE-2016-7523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7523">CVE-2016-7523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7524/">CVE-2016-7524 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7524">CVE-2016-7524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7525/">CVE-2016-7525 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7525">CVE-2016-7525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7526/">CVE-2016-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7526">CVE-2016-7526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7527/">CVE-2016-7527 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7527">CVE-2016-7527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7528/">CVE-2016-7528 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7528">CVE-2016-7528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7529/">CVE-2016-7529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7529">CVE-2016-7529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7530">CVE-2016-7530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7531/">CVE-2016-7531 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7531">CVE-2016-7531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7532/">CVE-2016-7532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7532">CVE-2016-7532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7533/">CVE-2016-7533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7533">CVE-2016-7533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7534/">CVE-2016-7534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7534">CVE-2016-7534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7535/">CVE-2016-7535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7535">CVE-2016-7535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7537/">CVE-2016-7537 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7537">CVE-2016-7537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7538/">CVE-2016-7538 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7538">CVE-2016-7538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7539/">CVE-2016-7539 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7539">CVE-2016-7539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7540/">CVE-2016-7540 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7540">CVE-2016-7540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7799/">CVE-2016-7799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7799">CVE-2016-7799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7800/">CVE-2016-7800 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7800">CVE-2016-7800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7996/">CVE-2016-7996 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7996">CVE-2016-7996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7997/">CVE-2016-7997 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7997">CVE-2016-7997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8677/">CVE-2016-8677 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8677">CVE-2016-8677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8682/">CVE-2016-8682 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8682">CVE-2016-8682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8683/">CVE-2016-8683 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8683">CVE-2016-8683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8684/">CVE-2016-8684 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8684">CVE-2016-8684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8707/">CVE-2016-8707 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8707">CVE-2016-8707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8862/">CVE-2016-8862 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8862">CVE-2016-8862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8866/">CVE-2016-8866 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8866">CVE-2016-8866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9556/">CVE-2016-9556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9556">CVE-2016-9556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9559/">CVE-2016-9559 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9559">CVE-2016-9559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9773/">CVE-2016-9773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9773">CVE-2016-9773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5506/">CVE-2017-5506 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5506">CVE-2017-5506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5507/">CVE-2017-5507 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5507">CVE-2017-5507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5508/">CVE-2017-5508 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5508">CVE-2017-5508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5510/">CVE-2017-5510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5510">CVE-2017-5510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5511/">CVE-2017-5511 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5511">CVE-2017-5511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6502/">CVE-2017-6502 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6502">CVE-2017-6502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7606/">CVE-2017-7606 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7606">CVE-2017-7606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7941/">CVE-2017-7941 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7941">CVE-2017-7941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7942/">CVE-2017-7942 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7942">CVE-2017-7942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7943/">CVE-2017-7943 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7943">CVE-2017-7943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8343/">CVE-2017-8343 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8343">CVE-2017-8343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8344/">CVE-2017-8344 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8344">CVE-2017-8344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8345/">CVE-2017-8345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8345">CVE-2017-8345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8346/">CVE-2017-8346 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8346">CVE-2017-8346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8347/">CVE-2017-8347 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8347">CVE-2017-8347 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8348/">CVE-2017-8348 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8348">CVE-2017-8348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8349/">CVE-2017-8349 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8349">CVE-2017-8349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8350/">CVE-2017-8350 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8350">CVE-2017-8350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8351/">CVE-2017-8351 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8351">CVE-2017-8351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8352/">CVE-2017-8352 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8352">CVE-2017-8352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8353/">CVE-2017-8353 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8353">CVE-2017-8353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8354/">CVE-2017-8354 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8354">CVE-2017-8354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8355/">CVE-2017-8355 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8355">CVE-2017-8355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8356/">CVE-2017-8356 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8356">CVE-2017-8356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8357/">CVE-2017-8357 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8357">CVE-2017-8357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8765/">CVE-2017-8765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8765">CVE-2017-8765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8830/">CVE-2017-8830 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8830">CVE-2017-8830 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9098/">CVE-2017-9098 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9098">CVE-2017-9098 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9141/">CVE-2017-9141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9141">CVE-2017-9141 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9142/">CVE-2017-9142 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9142">CVE-2017-9142 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9143/">CVE-2017-9143 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9143">CVE-2017-9143 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9144/">CVE-2017-9144 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9144">CVE-2017-9144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156376" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156378" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147903" version="1" class="patch">
	<metadata>
		<title>libQt5Concurrent5-5.6.2-5.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Concurrent5-5.6.2-5.9 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0295">CVE-2015-0295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1858">CVE-2015-1858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1859">CVE-2015-1859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1860">CVE-2015-1860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159044" comment="libQt5Concurrent5-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159045" comment="libQt5Core5-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159046" comment="libQt5DBus5-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159047" comment="libQt5Gui5-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159048" comment="libQt5Network5-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159049" comment="libQt5OpenGL5-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159050" comment="libQt5PrintSupport5-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159051" comment="libQt5Sql5-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159052" comment="libQt5Sql5-mysql-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159053" comment="libQt5Sql5-postgresql-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159054" comment="libQt5Sql5-sqlite-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159055" comment="libQt5Sql5-unixODBC-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159056" comment="libQt5Test5-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159057" comment="libQt5Widgets5-5.6.2-5.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159058" comment="libQt5Xml5-5.6.2-5.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147904" version="1" class="patch">
	<metadata>
		<title>libQt5WebKit5-5.6.2-1.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-8079" ref_url="https://www.suse.com/security/cve/CVE-2015-8079/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5WebKit5-5.6.2-1.31 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8079/">CVE-2015-8079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8079">CVE-2015-8079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159059" comment="libQt5WebKit5-5.6.2-1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159060" comment="libQt5WebKit5-imports-5.6.2-1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159061" comment="libQt5WebKitWidgets5-5.6.2-1.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147905" version="1" class="patch">
	<metadata>
		<title>libX11-6-1.6.2-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<reference ref_id="CVE-2016-7942" ref_url="https://www.suse.com/security/cve/CVE-2016-7942/" source="CVE"/>
		<description>
These are all security issues fixed in the libX11-6-1.6.2-11.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1981">CVE-2013-1981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1997">CVE-2013-1997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2004">CVE-2013-2004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7942/">CVE-2016-7942 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7942">CVE-2016-7942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009136381" comment="libX11-6-1.6.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009136382" comment="libX11-6-32bit-1.6.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009136383" comment="libX11-data-1.6.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009136384" comment="libX11-xcb1-1.6.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009136385" comment="libX11-xcb1-32bit-1.6.2-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147906" version="1" class="patch">
	<metadata>
		<title>libXRes1-1.0.7-3.53 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1988" ref_url="https://www.suse.com/security/cve/CVE-2013-1988/" source="CVE"/>
		<description>
These are all security issues fixed in the libXRes1-1.0.7-3.53 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1988/">CVE-2013-1988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1988">CVE-2013-1988 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140744" comment="libXRes1-1.0.7-3.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140745" comment="libXRes1-32bit-1.0.7-3.54 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147907" version="1" class="patch">
	<metadata>
		<title>libXcursor1-1.1.14-3.59 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2003" ref_url="https://www.suse.com/security/cve/CVE-2013-2003/" source="CVE"/>
		<description>
These are all security issues fixed in the libXcursor1-1.1.14-3.59 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2003/">CVE-2013-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2003">CVE-2013-2003 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140746" comment="libXcursor1-1.1.14-3.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140747" comment="libXcursor1-32bit-1.1.14-3.60 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147908" version="1" class="patch">
	<metadata>
		<title>libXext6-1.3.2-3.60 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>
These are all security issues fixed in the libXext6-1.3.2-3.60 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1982">CVE-2013-1982 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140748" comment="libXext6-1.3.2-3.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140749" comment="libXext6-32bit-1.3.2-3.61 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147909" version="1" class="patch">
	<metadata>
		<title>libXfixes3-32bit-5.0.1-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<reference ref_id="CVE-2016-7944" ref_url="https://www.suse.com/security/cve/CVE-2016-7944/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfixes3-32bit-5.0.1-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1983">CVE-2013-1983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7944/">CVE-2016-7944 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7944">CVE-2016-7944 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009135061" comment="libXfixes3-5.0.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009135062" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147910" version="1" class="patch">
	<metadata>
		<title>libXfont1-1.5.1-10.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<reference ref_id="CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462/" source="CVE"/>
		<reference ref_id="CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209/" source="CVE"/>
		<reference ref_id="CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210/" source="CVE"/>
		<reference ref_id="CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-1802" ref_url="https://www.suse.com/security/cve/CVE-2015-1802/" source="CVE"/>
		<reference ref_id="CVE-2015-1803" ref_url="https://www.suse.com/security/cve/CVE-2015-1803/" source="CVE"/>
		<reference ref_id="CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfont1-1.5.1-10.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2895">CVE-2011-2895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6462">CVE-2013-6462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0209">CVE-2014-0209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0210">CVE-2014-0210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0211">CVE-2014-0211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1802/">CVE-2015-1802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1802">CVE-2015-1802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1803/">CVE-2015-1803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1803">CVE-2015-1803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1804">CVE-2015-1804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140752" comment="libXfont1-1.5.1-10.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147911" version="1" class="patch">
	<metadata>
		<title>libXi6-1.7.4-17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1984" ref_url="https://www.suse.com/security/cve/CVE-2013-1984/" source="CVE"/>
		<reference ref_id="CVE-2013-1995" ref_url="https://www.suse.com/security/cve/CVE-2013-1995/" source="CVE"/>
		<reference ref_id="CVE-2013-1998" ref_url="https://www.suse.com/security/cve/CVE-2013-1998/" source="CVE"/>
		<reference ref_id="CVE-2016-7945" ref_url="https://www.suse.com/security/cve/CVE-2016-7945/" source="CVE"/>
		<reference ref_id="CVE-2016-7946" ref_url="https://www.suse.com/security/cve/CVE-2016-7946/" source="CVE"/>
		<description>
These are all security issues fixed in the libXi6-1.7.4-17.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1984/">CVE-2013-1984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1984">CVE-2013-1984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1995/">CVE-2013-1995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1995">CVE-2013-1995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1998/">CVE-2013-1998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1998">CVE-2013-1998 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7945/">CVE-2016-7945 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7945">CVE-2016-7945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7946/">CVE-2016-7946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7946">CVE-2016-7946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009136640" comment="libXi6-1.7.4-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009136641" comment="libXi6-32bit-1.7.4-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147912" version="1" class="patch">
	<metadata>
		<title>libXinerama1-1.1.3-3.54 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1985" ref_url="https://www.suse.com/security/cve/CVE-2013-1985/" source="CVE"/>
		<description>
These are all security issues fixed in the libXinerama1-1.1.3-3.54 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1985/">CVE-2013-1985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1985">CVE-2013-1985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140755" comment="libXinerama1-1.1.3-3.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140756" comment="libXinerama1-32bit-1.1.3-3.55 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147913" version="1" class="patch">
	<metadata>
		<title>libXp6-1.0.2-3.57 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>
These are all security issues fixed in the libXp6-1.0.2-3.57 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2062">CVE-2013-2062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140757" comment="libXp6-1.0.2-3.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140758" comment="libXp6-32bit-1.0.2-3.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147914" version="1" class="patch">
	<metadata>
		<title>libXpm4-3.5.11-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-10164" ref_url="https://www.suse.com/security/cve/CVE-2016-10164/" source="CVE"/>
		<description>
These are all security issues fixed in the libXpm4-3.5.11-5.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10164/">CVE-2016-10164 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10164">CVE-2016-10164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009148436" comment="libXpm4-3.5.11-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148437" comment="libXpm4-32bit-3.5.11-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147915" version="1" class="patch">
	<metadata>
		<title>libXrandr2-1.5.0-6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1986" ref_url="https://www.suse.com/security/cve/CVE-2013-1986/" source="CVE"/>
		<reference ref_id="CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947/" source="CVE"/>
		<reference ref_id="CVE-2016-7948" ref_url="https://www.suse.com/security/cve/CVE-2016-7948/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrandr2-1.5.0-6.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1986/">CVE-2013-1986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1986">CVE-2013-1986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7947">CVE-2016-7947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7948/">CVE-2016-7948 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7948">CVE-2016-7948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140759" comment="libXrandr2-1.5.0-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140760" comment="libXrandr2-32bit-1.5.0-6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147916" version="1" class="patch">
	<metadata>
		<title>libXrender1-0.9.8-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<reference ref_id="CVE-2016-7949" ref_url="https://www.suse.com/security/cve/CVE-2016-7949/" source="CVE"/>
		<reference ref_id="CVE-2016-7950" ref_url="https://www.suse.com/security/cve/CVE-2016-7950/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrender1-0.9.8-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1987">CVE-2013-1987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7949/">CVE-2016-7949 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7949">CVE-2016-7949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7950/">CVE-2016-7950 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7950">CVE-2016-7950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009135553" comment="libXrender1-0.9.8-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009135554" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147917" version="1" class="patch">
	<metadata>
		<title>libXt6-1.1.4-3.57 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>
These are all security issues fixed in the libXt6-1.1.4-3.57 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2002">CVE-2013-2002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2005">CVE-2013-2005 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140763" comment="libXt6-1.1.4-3.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140764" comment="libXt6-32bit-1.1.4-3.59 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147918" version="1" class="patch">
	<metadata>
		<title>libXtst6-1.2.2-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2063" ref_url="https://www.suse.com/security/cve/CVE-2013-2063/" source="CVE"/>
		<reference ref_id="CVE-2016-7951" ref_url="https://www.suse.com/security/cve/CVE-2016-7951/" source="CVE"/>
		<reference ref_id="CVE-2016-7952" ref_url="https://www.suse.com/security/cve/CVE-2016-7952/" source="CVE"/>
		<description>
These are all security issues fixed in the libXtst6-1.2.2-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2063/">CVE-2013-2063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2063">CVE-2013-2063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7951/">CVE-2016-7951 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7951">CVE-2016-7951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7952/">CVE-2016-7952 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7952">CVE-2016-7952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009135081" comment="libXtst6-1.2.2-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009135082" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147919" version="1" class="patch">
	<metadata>
		<title>libXv1-1.0.10-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<reference ref_id="CVE-2016-5407" ref_url="https://www.suse.com/security/cve/CVE-2016-5407/" source="CVE"/>
		<description>
These are all security issues fixed in the libXv1-1.0.10-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1989">CVE-2013-1989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2066">CVE-2013-2066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5407/">CVE-2016-5407 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5407">CVE-2016-5407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009135086" comment="libXv1-1.0.10-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009135087" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147920" version="1" class="patch">
	<metadata>
		<title>libXvMC1-1.0.8-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1990" ref_url="https://www.suse.com/security/cve/CVE-2013-1990/" source="CVE"/>
		<reference ref_id="CVE-2013-1999" ref_url="https://www.suse.com/security/cve/CVE-2013-1999/" source="CVE"/>
		<reference ref_id="CVE-2016-7953" ref_url="https://www.suse.com/security/cve/CVE-2016-7953/" source="CVE"/>
		<description>
These are all security issues fixed in the libXvMC1-1.0.8-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1990/">CVE-2013-1990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1990">CVE-2013-1990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1999/">CVE-2013-1999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1999">CVE-2013-1999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7953/">CVE-2016-7953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7953">CVE-2016-7953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009135556" comment="libXvMC1-1.0.8-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147921" version="1" class="patch">
	<metadata>
		<title>libXvnc1-1.6.0-18.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-0011" ref_url="https://www.suse.com/security/cve/CVE-2014-0011/" source="CVE"/>
		<reference ref_id="CVE-2014-8240" ref_url="https://www.suse.com/security/cve/CVE-2014-8240/" source="CVE"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<description>
These are all security issues fixed in the libXvnc1-1.6.0-18.11.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0011/">CVE-2014-0011 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0011">CVE-2014-0011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8240/">CVE-2014-8240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8240">CVE-2014-8240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0255">CVE-2015-0255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154696" comment="libXvnc1-1.6.0-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154697" comment="tigervnc-1.6.0-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154698" comment="xorg-x11-Xvnc-1.6.0-18.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147922" version="1" class="patch">
	<metadata>
		<title>libXxf86dga1-1.1.4-3.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1991" ref_url="https://www.suse.com/security/cve/CVE-2013-1991/" source="CVE"/>
		<reference ref_id="CVE-2013-2000" ref_url="https://www.suse.com/security/cve/CVE-2013-2000/" source="CVE"/>
		<description>
These are all security issues fixed in the libXxf86dga1-1.1.4-3.58 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1991/">CVE-2013-1991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1991">CVE-2013-1991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2000/">CVE-2013-2000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2000">CVE-2013-2000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140773" comment="libXxf86dga1-1.1.4-3.59 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147923" version="1" class="patch">
	<metadata>
		<title>libXxf86vm1-1.1.3-3.53 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2001" ref_url="https://www.suse.com/security/cve/CVE-2013-2001/" source="CVE"/>
		<description>
These are all security issues fixed in the libXxf86vm1-1.1.3-3.53 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2001/">CVE-2013-2001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2001">CVE-2013-2001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140774" comment="libXxf86vm1-1.1.3-3.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140775" comment="libXxf86vm1-32bit-1.1.3-3.54 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147924" version="1" class="patch">
	<metadata>
		<title>libapr-util1-1.5.3-1.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0023" ref_url="https://www.suse.com/security/cve/CVE-2009-0023/" source="CVE"/>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2010-1623" ref_url="https://www.suse.com/security/cve/CVE-2010-1623/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr-util1-1.5.3-1.46 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0023/">CVE-2009-0023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0023">CVE-2009-0023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2412">CVE-2009-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3560">CVE-2009-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3720">CVE-2009-3720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1623/">CVE-2010-1623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1623">CVE-2010-1623 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140776" comment="libapr-util1-1.5.3-1.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140777" comment="libapr-util1-dbd-sqlite3-1.5.3-1.77 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147925" version="1" class="patch">
	<metadata>
		<title>libapr1-1.5.1-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2011-0419" ref_url="https://www.suse.com/security/cve/CVE-2011-0419/" source="CVE"/>
		<reference ref_id="CVE-2011-1928" ref_url="https://www.suse.com/security/cve/CVE-2011-1928/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr1-1.5.1-2.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2412">CVE-2009-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0419/">CVE-2011-0419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0419">CVE-2011-0419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1928/">CVE-2011-1928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1928">CVE-2011-1928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140778" comment="libapr1-1.5.1-2.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147926" version="1" class="patch">
	<metadata>
		<title>libarchive13-3.1.2-25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-0211" ref_url="https://www.suse.com/security/cve/CVE-2013-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2015-8915" ref_url="https://www.suse.com/security/cve/CVE-2015-8915/" source="CVE"/>
		<reference ref_id="CVE-2015-8916" ref_url="https://www.suse.com/security/cve/CVE-2015-8916/" source="CVE"/>
		<reference ref_id="CVE-2015-8918" ref_url="https://www.suse.com/security/cve/CVE-2015-8918/" source="CVE"/>
		<reference ref_id="CVE-2015-8919" ref_url="https://www.suse.com/security/cve/CVE-2015-8919/" source="CVE"/>
		<reference ref_id="CVE-2015-8920" ref_url="https://www.suse.com/security/cve/CVE-2015-8920/" source="CVE"/>
		<reference ref_id="CVE-2015-8921" ref_url="https://www.suse.com/security/cve/CVE-2015-8921/" source="CVE"/>
		<reference ref_id="CVE-2015-8922" ref_url="https://www.suse.com/security/cve/CVE-2015-8922/" source="CVE"/>
		<reference ref_id="CVE-2015-8923" ref_url="https://www.suse.com/security/cve/CVE-2015-8923/" source="CVE"/>
		<reference ref_id="CVE-2015-8924" ref_url="https://www.suse.com/security/cve/CVE-2015-8924/" source="CVE"/>
		<reference ref_id="CVE-2015-8925" ref_url="https://www.suse.com/security/cve/CVE-2015-8925/" source="CVE"/>
		<reference ref_id="CVE-2015-8926" ref_url="https://www.suse.com/security/cve/CVE-2015-8926/" source="CVE"/>
		<reference ref_id="CVE-2015-8928" ref_url="https://www.suse.com/security/cve/CVE-2015-8928/" source="CVE"/>
		<reference ref_id="CVE-2015-8929" ref_url="https://www.suse.com/security/cve/CVE-2015-8929/" source="CVE"/>
		<reference ref_id="CVE-2015-8930" ref_url="https://www.suse.com/security/cve/CVE-2015-8930/" source="CVE"/>
		<reference ref_id="CVE-2015-8931" ref_url="https://www.suse.com/security/cve/CVE-2015-8931/" source="CVE"/>
		<reference ref_id="CVE-2015-8932" ref_url="https://www.suse.com/security/cve/CVE-2015-8932/" source="CVE"/>
		<reference ref_id="CVE-2015-8933" ref_url="https://www.suse.com/security/cve/CVE-2015-8933/" source="CVE"/>
		<reference ref_id="CVE-2015-8934" ref_url="https://www.suse.com/security/cve/CVE-2015-8934/" source="CVE"/>
		<reference ref_id="CVE-2016-1541" ref_url="https://www.suse.com/security/cve/CVE-2016-1541/" source="CVE"/>
		<reference ref_id="CVE-2016-4300" ref_url="https://www.suse.com/security/cve/CVE-2016-4300/" source="CVE"/>
		<reference ref_id="CVE-2016-4301" ref_url="https://www.suse.com/security/cve/CVE-2016-4301/" source="CVE"/>
		<reference ref_id="CVE-2016-4302" ref_url="https://www.suse.com/security/cve/CVE-2016-4302/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<reference ref_id="CVE-2016-5418" ref_url="https://www.suse.com/security/cve/CVE-2016-5418/" source="CVE"/>
		<reference ref_id="CVE-2016-5844" ref_url="https://www.suse.com/security/cve/CVE-2016-5844/" source="CVE"/>
		<reference ref_id="CVE-2016-6250" ref_url="https://www.suse.com/security/cve/CVE-2016-6250/" source="CVE"/>
		<reference ref_id="CVE-2016-8687" ref_url="https://www.suse.com/security/cve/CVE-2016-8687/" source="CVE"/>
		<reference ref_id="CVE-2016-8688" ref_url="https://www.suse.com/security/cve/CVE-2016-8688/" source="CVE"/>
		<reference ref_id="CVE-2016-8689" ref_url="https://www.suse.com/security/cve/CVE-2016-8689/" source="CVE"/>
		<description>
These are all security issues fixed in the libarchive13-3.1.2-25.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0211/">CVE-2013-0211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0211">CVE-2013-0211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2304">CVE-2015-2304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8915/">CVE-2015-8915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8915">CVE-2015-8915 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8916/">CVE-2015-8916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8916">CVE-2015-8916 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8918/">CVE-2015-8918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8918">CVE-2015-8918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8919/">CVE-2015-8919 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8919">CVE-2015-8919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8920/">CVE-2015-8920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8920">CVE-2015-8920 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8921/">CVE-2015-8921 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8921">CVE-2015-8921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8922/">CVE-2015-8922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8922">CVE-2015-8922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8923/">CVE-2015-8923 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8923">CVE-2015-8923 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8924/">CVE-2015-8924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8924">CVE-2015-8924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8925/">CVE-2015-8925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8925">CVE-2015-8925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8926/">CVE-2015-8926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8926">CVE-2015-8926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8928/">CVE-2015-8928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8928">CVE-2015-8928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8929/">CVE-2015-8929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8929">CVE-2015-8929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8930/">CVE-2015-8930 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8930">CVE-2015-8930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8931/">CVE-2015-8931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8931">CVE-2015-8931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8932/">CVE-2015-8932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8932">CVE-2015-8932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8933/">CVE-2015-8933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8933">CVE-2015-8933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8934/">CVE-2015-8934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8934">CVE-2015-8934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1541/">CVE-2016-1541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1541">CVE-2016-1541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4300/">CVE-2016-4300 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4300">CVE-2016-4300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4301/">CVE-2016-4301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4301">CVE-2016-4301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4302/">CVE-2016-4302 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4302">CVE-2016-4302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4809">CVE-2016-4809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5418/">CVE-2016-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5418">CVE-2016-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5844/">CVE-2016-5844 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5844">CVE-2016-5844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6250/">CVE-2016-6250 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6250">CVE-2016-6250 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8687/">CVE-2016-8687 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8687">CVE-2016-8687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8688/">CVE-2016-8688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8688">CVE-2016-8688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8689/">CVE-2016-8689 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8689">CVE-2016-8689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009135964" comment="libarchive13-3.1.2-25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147927" version="1" class="patch">
	<metadata>
		<title>libasan2-32bit-5.3.1+r233831-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<description>
These are all security issues fixed in the libasan2-32bit-5.3.1+r233831-12.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5276">CVE-2015-5276 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159062" comment="libasan2-5.3.1+r233831-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159063" comment="libasan2-32bit-5.3.1+r233831-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159064" comment="libffi4-5.3.1+r233831-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159065" comment="libffi4-32bit-5.3.1+r233831-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159066" comment="libmpx0-5.3.1+r233831-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159067" comment="libmpx0-32bit-5.3.1+r233831-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159068" comment="libmpxwrappers0-5.3.1+r233831-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159069" comment="libmpxwrappers0-32bit-5.3.1+r233831-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147928" version="1" class="patch">
	<metadata>
		<title>libass5-0.10.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-7969" ref_url="https://www.suse.com/security/cve/CVE-2016-7969/" source="CVE"/>
		<reference ref_id="CVE-2016-7972" ref_url="https://www.suse.com/security/cve/CVE-2016-7972/" source="CVE"/>
		<description>
These are all security issues fixed in the libass5-0.10.2-3.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7969/">CVE-2016-7969 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7969">CVE-2016-7969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7972/">CVE-2016-7972 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7972">CVE-2016-7972 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009142721" comment="libass5-0.10.2-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147929" version="1" class="patch">
	<metadata>
		<title>libblkid1-2.29.2-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-0157" ref_url="https://www.suse.com/security/cve/CVE-2013-0157/" source="CVE"/>
		<reference ref_id="CVE-2014-9114" ref_url="https://www.suse.com/security/cve/CVE-2014-9114/" source="CVE"/>
		<reference ref_id="CVE-2015-5218" ref_url="https://www.suse.com/security/cve/CVE-2015-5218/" source="CVE"/>
		<reference ref_id="CVE-2016-5011" ref_url="https://www.suse.com/security/cve/CVE-2016-5011/" source="CVE"/>
		<reference ref_id="CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616/" source="CVE"/>
		<description>
These are all security issues fixed in the libblkid1-2.29.2-2.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0157/">CVE-2013-0157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0157">CVE-2013-0157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9114/">CVE-2014-9114 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9114">CVE-2014-9114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5218/">CVE-2015-5218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5218">CVE-2015-5218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5011/">CVE-2016-5011 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5011">CVE-2016-5011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2616">CVE-2017-2616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159070" comment="libblkid1-2.29.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159071" comment="libblkid1-32bit-2.29.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159072" comment="libfdisk1-2.29.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159073" comment="libmount1-2.29.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159074" comment="libmount1-32bit-2.29.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159075" comment="libsmartcols1-2.29.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159076" comment="libuuid1-2.29.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159077" comment="libuuid1-32bit-2.29.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159078" comment="python-libmount-2.29.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159079" comment="util-linux-2.29.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159080" comment="util-linux-lang-2.29.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159081" comment="util-linux-systemd-2.29.2-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159082" comment="uuidd-2.29.2-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147930" version="1" class="patch">
	<metadata>
		<title>libcairo-gobject2-1.15.2-24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-9082" ref_url="https://www.suse.com/security/cve/CVE-2016-9082/" source="CVE"/>
		<reference ref_id="CVE-2017-7475" ref_url="https://www.suse.com/security/cve/CVE-2017-7475/" source="CVE"/>
		<description>
These are all security issues fixed in the libcairo-gobject2-1.15.2-24.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9082/">CVE-2016-9082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9082">CVE-2016-9082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7475/">CVE-2017-7475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7475">CVE-2017-7475 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009157339" comment="libcairo-gobject2-1.15.2-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157340" comment="libcairo-gobject2-32bit-1.15.2-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157341" comment="libcairo-script-interpreter2-1.15.2-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157342" comment="libcairo2-1.15.2-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157343" comment="libcairo2-32bit-1.15.2-24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147931" version="1" class="patch">
	<metadata>
		<title>libcares2-1.9.1-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-5180" ref_url="https://www.suse.com/security/cve/CVE-2016-5180/" source="CVE"/>
		<description>
These are all security issues fixed in the libcares2-1.9.1-5.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5180/">CVE-2016-5180 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5180">CVE-2016-5180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009146003" comment="libcares2-1.9.1-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147932" version="1" class="patch">
	<metadata>
		<title>libcgroup-tools-0.41.rc1-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1006" ref_url="https://www.suse.com/security/cve/CVE-2011-1006/" source="CVE"/>
		<reference ref_id="CVE-2011-1022" ref_url="https://www.suse.com/security/cve/CVE-2011-1022/" source="CVE"/>
		<description>
These are all security issues fixed in the libcgroup-tools-0.41.rc1-9.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1006/">CVE-2011-1006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1006">CVE-2011-1006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1022/">CVE-2011-1022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1022">CVE-2011-1022 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159083" comment="libcgroup-tools-0.41.rc1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159084" comment="libcgroup1-0.41.rc1-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147933" version="1" class="patch">
	<metadata>
		<title>libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<reference ref_id="CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635/" source="CVE"/>
		<reference ref_id="CVE-2010-1642" ref_url="https://www.suse.com/security/cve/CVE-2010-1642/" source="CVE"/>
		<reference ref_id="CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063/" source="CVE"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719/" source="CVE"/>
		<reference ref_id="CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522/" source="CVE"/>
		<reference ref_id="CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817/" source="CVE"/>
		<reference ref_id="CVE-2012-0870" ref_url="https://www.suse.com/security/cve/CVE-2012-0870/" source="CVE"/>
		<reference ref_id="CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182/" source="CVE"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<reference ref_id="CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150/" source="CVE"/>
		<reference ref_id="CVE-2013-0172" ref_url="https://www.suse.com/security/cve/CVE-2013-0172/" source="CVE"/>
		<reference ref_id="CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213/" source="CVE"/>
		<reference ref_id="CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214/" source="CVE"/>
		<reference ref_id="CVE-2013-0454" ref_url="https://www.suse.com/security/cve/CVE-2013-0454/" source="CVE"/>
		<reference ref_id="CVE-2013-1863" ref_url="https://www.suse.com/security/cve/CVE-2013-1863/" source="CVE"/>
		<reference ref_id="CVE-2013-4124" ref_url="https://www.suse.com/security/cve/CVE-2013-4124/" source="CVE"/>
		<reference ref_id="CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408/" source="CVE"/>
		<reference ref_id="CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475/" source="CVE"/>
		<reference ref_id="CVE-2013-4476" ref_url="https://www.suse.com/security/cve/CVE-2013-4476/" source="CVE"/>
		<reference ref_id="CVE-2013-4496" ref_url="https://www.suse.com/security/cve/CVE-2013-4496/" source="CVE"/>
		<reference ref_id="CVE-2013-6442" ref_url="https://www.suse.com/security/cve/CVE-2013-6442/" source="CVE"/>
		<reference ref_id="CVE-2014-0178" ref_url="https://www.suse.com/security/cve/CVE-2014-0178/" source="CVE"/>
		<reference ref_id="CVE-2014-0239" ref_url="https://www.suse.com/security/cve/CVE-2014-0239/" source="CVE"/>
		<reference ref_id="CVE-2014-0244" ref_url="https://www.suse.com/security/cve/CVE-2014-0244/" source="CVE"/>
		<reference ref_id="CVE-2014-3493" ref_url="https://www.suse.com/security/cve/CVE-2014-3493/" source="CVE"/>
		<reference ref_id="CVE-2014-3560" ref_url="https://www.suse.com/security/cve/CVE-2014-3560/" source="CVE"/>
		<reference ref_id="CVE-2014-8143" ref_url="https://www.suse.com/security/cve/CVE-2014-8143/" source="CVE"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<reference ref_id="CVE-2015-8467" ref_url="https://www.suse.com/security/cve/CVE-2015-8467/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2016-0771" ref_url="https://www.suse.com/security/cve/CVE-2016-0771/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<reference ref_id="CVE-2016-2119" ref_url="https://www.suse.com/security/cve/CVE-2016-2119/" source="CVE"/>
		<reference ref_id="CVE-2016-2123" ref_url="https://www.suse.com/security/cve/CVE-2016-2123/" source="CVE"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<reference ref_id="CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494/" source="CVE"/>
		<description>
These are all security issues fixed in the libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1886">CVE-2009-1886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1888">CVE-2009-1888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2813">CVE-2009-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2906">CVE-2009-2906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2948">CVE-2009-2948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0547">CVE-2010-0547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0728">CVE-2010-0728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0787">CVE-2010-0787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0926">CVE-2010-0926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1635">CVE-2010-1635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1642/">CVE-2010-1642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1642">CVE-2010-1642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2063">CVE-2010-2063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3069">CVE-2010-3069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0719">CVE-2011-0719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2522">CVE-2011-2522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2694">CVE-2011-2694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0817">CVE-2012-0817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0870/">CVE-2012-0870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0870">CVE-2012-0870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1182">CVE-2012-1182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2111">CVE-2012-2111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6150">CVE-2012-6150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0172/">CVE-2013-0172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0172">CVE-2013-0172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0213">CVE-2013-0213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0214">CVE-2013-0214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0454/">CVE-2013-0454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0454">CVE-2013-0454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1863/">CVE-2013-1863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1863">CVE-2013-1863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4124/">CVE-2013-4124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4124">CVE-2013-4124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4408">CVE-2013-4408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4475">CVE-2013-4475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4476/">CVE-2013-4476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4476">CVE-2013-4476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4496/">CVE-2013-4496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4496">CVE-2013-4496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6442/">CVE-2013-6442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6442">CVE-2013-6442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0178/">CVE-2014-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0178">CVE-2014-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0239/">CVE-2014-0239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0239">CVE-2014-0239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0244/">CVE-2014-0244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0244">CVE-2014-0244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3493/">CVE-2014-3493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3493">CVE-2014-3493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3560/">CVE-2014-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3560">CVE-2014-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8143/">CVE-2014-8143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8143">CVE-2014-8143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0240">CVE-2015-0240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3223">CVE-2015-3223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5252">CVE-2015-5252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5296">CVE-2015-5296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5299">CVE-2015-5299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5330">CVE-2015-5330 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5370">CVE-2015-5370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7560">CVE-2015-7560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8467/">CVE-2015-8467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8467">CVE-2015-8467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8543">CVE-2015-8543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0771/">CVE-2016-0771 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0771">CVE-2016-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2110">CVE-2016-2110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2111">CVE-2016-2111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2112">CVE-2016-2112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2113">CVE-2016-2113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2115">CVE-2016-2115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2118">CVE-2016-2118 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2119/">CVE-2016-2119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2119">CVE-2016-2119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2123/">CVE-2016-2123 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2123">CVE-2016-2123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2125">CVE-2016-2125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2126">CVE-2016-2126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2619">CVE-2017-2619 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7494">CVE-2017-7494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159085" comment="libdcerpc-binding0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159086" comment="libdcerpc-binding0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159087" comment="libdcerpc0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159088" comment="libdcerpc0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159089" comment="libndr-krb5pac0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159090" comment="libndr-krb5pac0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159091" comment="libndr-nbt0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159092" comment="libndr-nbt0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159093" comment="libndr-standard0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159094" comment="libndr-standard0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159095" comment="libndr0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159096" comment="libndr0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159097" comment="libnetapi0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159098" comment="libnetapi0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159099" comment="libsamba-credentials0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159100" comment="libsamba-credentials0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159101" comment="libsamba-errors0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159102" comment="libsamba-errors0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159103" comment="libsamba-hostconfig0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159104" comment="libsamba-hostconfig0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159105" comment="libsamba-passdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159106" comment="libsamba-passdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159107" comment="libsamba-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159108" comment="libsamba-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159109" comment="libsamdb0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159110" comment="libsamdb0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159111" comment="libsmbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159112" comment="libsmbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159113" comment="libsmbconf0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159114" comment="libsmbconf0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159115" comment="libsmbldap0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159116" comment="libsmbldap0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159117" comment="libtevent-util0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159118" comment="libtevent-util0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159119" comment="libwbclient0-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159120" comment="libwbclient0-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159121" comment="samba-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159122" comment="samba-client-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159123" comment="samba-client-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159124" comment="samba-doc-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159125" comment="samba-libs-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159126" comment="samba-libs-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159127" comment="samba-winbind-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159128" comment="samba-winbind-32bit-4.6.5+git.27.6afd48b1083-2.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147934" version="1" class="patch">
	<metadata>
		<title>libdmx1-1.1.3-3.51 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1992" ref_url="https://www.suse.com/security/cve/CVE-2013-1992/" source="CVE"/>
		<description>
These are all security issues fixed in the libdmx1-1.1.3-3.51 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1992/">CVE-2013-1992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1992">CVE-2013-1992 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140838" comment="libdmx1-1.1.3-3.52 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147935" version="1" class="patch">
	<metadata>
		<title>libecpg6-9.6.3-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-0866" ref_url="https://www.suse.com/security/cve/CVE-2012-0866/" source="CVE"/>
		<reference ref_id="CVE-2012-0867" ref_url="https://www.suse.com/security/cve/CVE-2012-0867/" source="CVE"/>
		<reference ref_id="CVE-2012-0868" ref_url="https://www.suse.com/security/cve/CVE-2012-0868/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2655" ref_url="https://www.suse.com/security/cve/CVE-2012-2655/" source="CVE"/>
		<reference ref_id="CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488/" source="CVE"/>
		<reference ref_id="CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489/" source="CVE"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<reference ref_id="CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899/" source="CVE"/>
		<reference ref_id="CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900/" source="CVE"/>
		<reference ref_id="CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901/" source="CVE"/>
		<reference ref_id="CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060/" source="CVE"/>
		<reference ref_id="CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061/" source="CVE"/>
		<reference ref_id="CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062/" source="CVE"/>
		<reference ref_id="CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063/" source="CVE"/>
		<reference ref_id="CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064/" source="CVE"/>
		<reference ref_id="CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065/" source="CVE"/>
		<reference ref_id="CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066/" source="CVE"/>
		<reference ref_id="CVE-2014-0067" ref_url="https://www.suse.com/security/cve/CVE-2014-0067/" source="CVE"/>
		<reference ref_id="CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165/" source="CVE"/>
		<reference ref_id="CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166/" source="CVE"/>
		<reference ref_id="CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167/" source="CVE"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766/" source="CVE"/>
		<reference ref_id="CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773/" source="CVE"/>
		<reference ref_id="CVE-2016-2193" ref_url="https://www.suse.com/security/cve/CVE-2016-2193/" source="CVE"/>
		<reference ref_id="CVE-2016-3065" ref_url="https://www.suse.com/security/cve/CVE-2016-3065/" source="CVE"/>
		<reference ref_id="CVE-2017-7484" ref_url="https://www.suse.com/security/cve/CVE-2017-7484/" source="CVE"/>
		<reference ref_id="CVE-2017-7485" ref_url="https://www.suse.com/security/cve/CVE-2017-7485/" source="CVE"/>
		<reference ref_id="CVE-2017-7486" ref_url="https://www.suse.com/security/cve/CVE-2017-7486/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-9.6.3-2.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4772">CVE-2007-4772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6600">CVE-2007-6600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4034">CVE-2009-4034 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4136">CVE-2009-4136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1169">CVE-2010-1169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1170">CVE-2010-1170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3433">CVE-2010-3433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0866/">CVE-2012-0866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0866">CVE-2012-0866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0867/">CVE-2012-0867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0867">CVE-2012-0867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0868/">CVE-2012-0868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0868">CVE-2012-0868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2143">CVE-2012-2143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2655/">CVE-2012-2655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2655">CVE-2012-2655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3488">CVE-2012-3488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-3489">CVE-2012-3489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0255">CVE-2013-0255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1899">CVE-2013-1899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1900">CVE-2013-1900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1901">CVE-2013-1901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0060">CVE-2014-0060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0061">CVE-2014-0061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0062">CVE-2014-0062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0063">CVE-2014-0063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0064">CVE-2014-0064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0065">CVE-2014-0065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0066">CVE-2014-0066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0067/">CVE-2014-0067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0067">CVE-2014-0067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3165">CVE-2015-3165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3166">CVE-2015-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3167">CVE-2015-3167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5288">CVE-2015-5288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5289">CVE-2015-5289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0766">CVE-2016-0766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0773">CVE-2016-0773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2193/">CVE-2016-2193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2193">CVE-2016-2193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3065/">CVE-2016-3065 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3065">CVE-2016-3065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7484/">CVE-2017-7484 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7484">CVE-2017-7484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7485/">CVE-2017-7485 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7485">CVE-2017-7485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7486/">CVE-2017-7486 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7486">CVE-2017-7486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159129" comment="libecpg6-9.6.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159130" comment="libpq5-9.6.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159131" comment="libpq5-32bit-9.6.3-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159132" comment="postgresql96-9.6.3-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159133" comment="postgresql96-contrib-9.6.3-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159134" comment="postgresql96-docs-9.6.3-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159135" comment="postgresql96-server-9.6.3-2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147936" version="1" class="patch">
	<metadata>
		<title>libevent-2_0-5-2.0.21-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<description>
These are all security issues fixed in the libevent-2_0-5-2.0.21-4.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6272">CVE-2014-6272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140839" comment="libevent-2_0-5-2.0.21-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147937" version="1" class="patch">
	<metadata>
		<title>libexif12-0.6.21-6.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2812" ref_url="https://www.suse.com/security/cve/CVE-2012-2812/" source="CVE"/>
		<reference ref_id="CVE-2012-2813" ref_url="https://www.suse.com/security/cve/CVE-2012-2813/" source="CVE"/>
		<reference ref_id="CVE-2012-2814" ref_url="https://www.suse.com/security/cve/CVE-2012-2814/" source="CVE"/>
		<reference ref_id="CVE-2012-2836" ref_url="https://www.suse.com/security/cve/CVE-2012-2836/" source="CVE"/>
		<reference ref_id="CVE-2012-2837" ref_url="https://www.suse.com/security/cve/CVE-2012-2837/" source="CVE"/>
		<reference ref_id="CVE-2012-2840" ref_url="https://www.suse.com/security/cve/CVE-2012-2840/" source="CVE"/>
		<reference ref_id="CVE-2012-2841" ref_url="https://www.suse.com/security/cve/CVE-2012-2841/" source="CVE"/>
		<description>
These are all security issues fixed in the libexif12-0.6.21-6.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2812/">CVE-2012-2812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2812">CVE-2012-2812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2813/">CVE-2012-2813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2813">CVE-2012-2813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2814/">CVE-2012-2814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2814">CVE-2012-2814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2836/">CVE-2012-2836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2836">CVE-2012-2836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2837/">CVE-2012-2837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2837">CVE-2012-2837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2840/">CVE-2012-2840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2840">CVE-2012-2840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2841/">CVE-2012-2841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2841">CVE-2012-2841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140840" comment="libexif12-0.6.21-6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140841" comment="libexif12-32bit-0.6.21-6.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147938" version="1" class="patch">
	<metadata>
		<title>libfreebl3-3.29.5-57.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-3640" ref_url="https://www.suse.com/security/cve/CVE-2011-3640/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791/" source="CVE"/>
		<reference ref_id="CVE-2013-1620" ref_url="https://www.suse.com/security/cve/CVE-2013-1620/" source="CVE"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<reference ref_id="CVE-2013-1740" ref_url="https://www.suse.com/security/cve/CVE-2013-1740/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2014-1492" ref_url="https://www.suse.com/security/cve/CVE-2014-1492/" source="CVE"/>
		<reference ref_id="CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568/" source="CVE"/>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-5285" ref_url="https://www.suse.com/security/cve/CVE-2016-5285/" source="CVE"/>
		<reference ref_id="CVE-2016-8635" ref_url="https://www.suse.com/security/cve/CVE-2016-8635/" source="CVE"/>
		<reference ref_id="CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074/" source="CVE"/>
		<reference ref_id="CVE-2016-9574" ref_url="https://www.suse.com/security/cve/CVE-2016-9574/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreebl3-3.29.5-57.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3170">CVE-2010-3170 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3640/">CVE-2011-3640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3640">CVE-2011-3640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0743">CVE-2013-0743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0791">CVE-2013-0791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1620/">CVE-2013-1620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1620">CVE-2013-1620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1739">CVE-2013-1739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1740/">CVE-2013-1740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1740">CVE-2013-1740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5605">CVE-2013-5605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1492/">CVE-2014-1492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1492">CVE-2014-1492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1568">CVE-2014-1568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1569">CVE-2014-1569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7181">CVE-2015-7181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7182">CVE-2015-7182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1938">CVE-2016-1938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1950">CVE-2016-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1978">CVE-2016-1978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1979">CVE-2016-1979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2834">CVE-2016-2834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5285/">CVE-2016-5285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5285">CVE-2016-5285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8635/">CVE-2016-8635 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8635">CVE-2016-8635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9074">CVE-2016-9074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9574/">CVE-2016-9574 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9574">CVE-2016-9574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155316" comment="libfreebl3-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155317" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155339" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155342" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155318" comment="libsoftokn3-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155319" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155340" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155343" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155322" comment="mozilla-nss-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155323" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155324" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155325" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155326" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155327" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155328" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147939" version="1" class="patch">
	<metadata>
		<title>libfreetype6-2.6.3-7.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2010-3855" ref_url="https://www.suse.com/security/cve/CVE-2010-3855/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2011-3256" ref_url="https://www.suse.com/security/cve/CVE-2011-3256/" source="CVE"/>
		<reference ref_id="CVE-2011-3439" ref_url="https://www.suse.com/security/cve/CVE-2011-3439/" source="CVE"/>
		<reference ref_id="CVE-2012-1126" ref_url="https://www.suse.com/security/cve/CVE-2012-1126/" source="CVE"/>
		<reference ref_id="CVE-2012-1127" ref_url="https://www.suse.com/security/cve/CVE-2012-1127/" source="CVE"/>
		<reference ref_id="CVE-2012-1128" ref_url="https://www.suse.com/security/cve/CVE-2012-1128/" source="CVE"/>
		<reference ref_id="CVE-2012-1129" ref_url="https://www.suse.com/security/cve/CVE-2012-1129/" source="CVE"/>
		<reference ref_id="CVE-2012-1130" ref_url="https://www.suse.com/security/cve/CVE-2012-1130/" source="CVE"/>
		<reference ref_id="CVE-2012-1131" ref_url="https://www.suse.com/security/cve/CVE-2012-1131/" source="CVE"/>
		<reference ref_id="CVE-2012-1132" ref_url="https://www.suse.com/security/cve/CVE-2012-1132/" source="CVE"/>
		<reference ref_id="CVE-2012-1133" ref_url="https://www.suse.com/security/cve/CVE-2012-1133/" source="CVE"/>
		<reference ref_id="CVE-2012-1134" ref_url="https://www.suse.com/security/cve/CVE-2012-1134/" source="CVE"/>
		<reference ref_id="CVE-2012-1135" ref_url="https://www.suse.com/security/cve/CVE-2012-1135/" source="CVE"/>
		<reference ref_id="CVE-2012-1136" ref_url="https://www.suse.com/security/cve/CVE-2012-1136/" source="CVE"/>
		<reference ref_id="CVE-2012-1137" ref_url="https://www.suse.com/security/cve/CVE-2012-1137/" source="CVE"/>
		<reference ref_id="CVE-2012-1138" ref_url="https://www.suse.com/security/cve/CVE-2012-1138/" source="CVE"/>
		<reference ref_id="CVE-2012-1139" ref_url="https://www.suse.com/security/cve/CVE-2012-1139/" source="CVE"/>
		<reference ref_id="CVE-2012-1140" ref_url="https://www.suse.com/security/cve/CVE-2012-1140/" source="CVE"/>
		<reference ref_id="CVE-2012-1141" ref_url="https://www.suse.com/security/cve/CVE-2012-1141/" source="CVE"/>
		<reference ref_id="CVE-2012-1142" ref_url="https://www.suse.com/security/cve/CVE-2012-1142/" source="CVE"/>
		<reference ref_id="CVE-2012-1143" ref_url="https://www.suse.com/security/cve/CVE-2012-1143/" source="CVE"/>
		<reference ref_id="CVE-2012-1144" ref_url="https://www.suse.com/security/cve/CVE-2012-1144/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<reference ref_id="CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240/" source="CVE"/>
		<reference ref_id="CVE-2014-2241" ref_url="https://www.suse.com/security/cve/CVE-2014-2241/" source="CVE"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreetype6-2.6.3-7.10.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0946">CVE-2009-0946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2497">CVE-2010-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2805">CVE-2010-2805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3053">CVE-2010-3053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3054">CVE-2010-3054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3311">CVE-2010-3311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3814">CVE-2010-3814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3855/">CVE-2010-3855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3855">CVE-2010-3855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0226">CVE-2011-0226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3256/">CVE-2011-3256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3256">CVE-2011-3256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3439/">CVE-2011-3439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3439">CVE-2011-3439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1126/">CVE-2012-1126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1126">CVE-2012-1126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1127/">CVE-2012-1127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1127">CVE-2012-1127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1128/">CVE-2012-1128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1128">CVE-2012-1128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1129/">CVE-2012-1129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1129">CVE-2012-1129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1130/">CVE-2012-1130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1130">CVE-2012-1130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1131/">CVE-2012-1131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1131">CVE-2012-1131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1132/">CVE-2012-1132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1132">CVE-2012-1132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1133/">CVE-2012-1133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1133">CVE-2012-1133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1134/">CVE-2012-1134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1134">CVE-2012-1134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1135/">CVE-2012-1135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1135">CVE-2012-1135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1136/">CVE-2012-1136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1136">CVE-2012-1136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1137/">CVE-2012-1137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1137">CVE-2012-1137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1138/">CVE-2012-1138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1138">CVE-2012-1138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1139/">CVE-2012-1139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1139">CVE-2012-1139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1140/">CVE-2012-1140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1140">CVE-2012-1140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1141/">CVE-2012-1141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1141">CVE-2012-1141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1142/">CVE-2012-1142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1142">CVE-2012-1142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1143/">CVE-2012-1143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1143">CVE-2012-1143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1144/">CVE-2012-1144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1144">CVE-2012-1144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5668">CVE-2012-5668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5669">CVE-2012-5669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5670">CVE-2012-5670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2240">CVE-2014-2240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2241/">CVE-2014-2241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2241">CVE-2014-2241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9656">CVE-2014-9656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9657">CVE-2014-9657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9658">CVE-2014-9658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9659">CVE-2014-9659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9660">CVE-2014-9660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9661">CVE-2014-9661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9662">CVE-2014-9662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9663">CVE-2014-9663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9664">CVE-2014-9664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9665">CVE-2014-9665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9666">CVE-2014-9666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9667">CVE-2014-9667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9668">CVE-2014-9668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9669">CVE-2014-9669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9670">CVE-2014-9670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9671">CVE-2014-9671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9672">CVE-2014-9672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9673">CVE-2014-9673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9674">CVE-2014-9674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9675">CVE-2014-9675 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159136" comment="libfreetype6-2.6.3-7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159137" comment="libfreetype6-32bit-2.6.3-7.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147940" version="1" class="patch">
	<metadata>
		<title>libgc1-7.2d-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2673" ref_url="https://www.suse.com/security/cve/CVE-2012-2673/" source="CVE"/>
		<reference ref_id="CVE-2016-9427" ref_url="https://www.suse.com/security/cve/CVE-2016-9427/" source="CVE"/>
		<description>
These are all security issues fixed in the libgc1-7.2d-5.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2673/">CVE-2012-2673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2673">CVE-2012-2673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9427/">CVE-2016-9427 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9427">CVE-2016-9427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009136646" comment="libgc1-7.2d-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147941" version="1" class="patch">
	<metadata>
		<title>libgcrypt20-1.6.1-16.39.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<reference ref_id="CVE-2015-7511" ref_url="https://www.suse.com/security/cve/CVE-2015-7511/" source="CVE"/>
		<reference ref_id="CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313/" source="CVE"/>
		<description>
These are all security issues fixed in the libgcrypt20-1.6.1-16.39.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4242">CVE-2013-4242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3591">CVE-2014-3591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0837">CVE-2015-0837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7511/">CVE-2015-7511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7511">CVE-2015-7511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6313">CVE-2016-6313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156955" comment="libgcrypt20-1.6.1-16.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156956" comment="libgcrypt20-32bit-1.6.1-16.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156985" comment="libgcrypt20-hmac-1.6.1-16.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157047" comment="libgcrypt20-hmac-32bit-1.6.1-16.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147942" version="1" class="patch">
	<metadata>
		<title>libgme0-0.6.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-9957" ref_url="https://www.suse.com/security/cve/CVE-2016-9957/" source="CVE"/>
		<reference ref_id="CVE-2016-9958" ref_url="https://www.suse.com/security/cve/CVE-2016-9958/" source="CVE"/>
		<reference ref_id="CVE-2016-9959" ref_url="https://www.suse.com/security/cve/CVE-2016-9959/" source="CVE"/>
		<reference ref_id="CVE-2016-9960" ref_url="https://www.suse.com/security/cve/CVE-2016-9960/" source="CVE"/>
		<reference ref_id="CVE-2016-9961" ref_url="https://www.suse.com/security/cve/CVE-2016-9961/" source="CVE"/>
		<description>
These are all security issues fixed in the libgme0-0.6.0-5.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9957/">CVE-2016-9957 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9957">CVE-2016-9957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9958/">CVE-2016-9958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9958">CVE-2016-9958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9959/">CVE-2016-9959 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9959">CVE-2016-9959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9960/">CVE-2016-9960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9960">CVE-2016-9960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9961/">CVE-2016-9961 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9961">CVE-2016-9961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145377" comment="libgme0-0.6.0-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147943" version="1" class="patch">
	<metadata>
		<title>libgnomesu-2.0.0-353.6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1946" ref_url="https://www.suse.com/security/cve/CVE-2011-1946/" source="CVE"/>
		<description>
These are all security issues fixed in the libgnomesu-2.0.0-353.6.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1946/">CVE-2011-1946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1946">CVE-2011-1946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140842" comment="libgnomesu-2.0.0-353.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140843" comment="libgnomesu-lang-2.0.0-353.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140844" comment="libgnomesu0-2.0.0-353.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147944" version="1" class="patch">
	<metadata>
		<title>libgoa-1_0-0-3.20.5-9.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-0240" ref_url="https://www.suse.com/security/cve/CVE-2013-0240/" source="CVE"/>
		<reference ref_id="CVE-2013-1799" ref_url="https://www.suse.com/security/cve/CVE-2013-1799/" source="CVE"/>
		<description>
These are all security issues fixed in the libgoa-1_0-0-3.20.5-9.6 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0240/">CVE-2013-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0240">CVE-2013-0240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1799/">CVE-2013-1799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1799">CVE-2013-1799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159138" comment="libgoa-1_0-0-3.20.5-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159139" comment="libgoa-backend-1_0-1-3.20.5-9.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147945" version="1" class="patch">
	<metadata>
		<title>libgraphite2-3-1.3.1-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-1521" ref_url="https://www.suse.com/security/cve/CVE-2016-1521/" source="CVE"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="CVE-2016-1526" ref_url="https://www.suse.com/security/cve/CVE-2016-1526/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<description>
These are all security issues fixed in the libgraphite2-3-1.3.1-9.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1521/">CVE-2016-1521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1521">CVE-2016-1521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1523">CVE-2016-1523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1526/">CVE-2016-1526 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1526">CVE-2016-1526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5436">CVE-2017-5436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154911" comment="libgraphite2-3-1.3.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154912" comment="libgraphite2-3-32bit-1.3.1-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147946" version="1" class="patch">
	<metadata>
		<title>libgssglue1-0.4-3.76 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2709" ref_url="https://www.suse.com/security/cve/CVE-2011-2709/" source="CVE"/>
		<description>
These are all security issues fixed in the libgssglue1-0.4-3.76 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2709/">CVE-2011-2709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2709">CVE-2011-2709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140845" comment="libgssglue1-0.4-3.83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140846" comment="libgssglue1-32bit-0.4-3.83 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147947" version="1" class="patch">
	<metadata>
		<title>libgypsy0-0.9-6.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0523" ref_url="https://www.suse.com/security/cve/CVE-2011-0523/" source="CVE"/>
		<reference ref_id="CVE-2011-0524" ref_url="https://www.suse.com/security/cve/CVE-2011-0524/" source="CVE"/>
		<description>
These are all security issues fixed in the libgypsy0-0.9-6.22 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0523/">CVE-2011-0523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0523">CVE-2011-0523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0524/">CVE-2011-0524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0524">CVE-2011-0524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140676" comment="libgypsy0-0.9-6.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147948" version="1" class="patch">
	<metadata>
		<title>libhivex0-1.3.10-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-9273" ref_url="https://www.suse.com/security/cve/CVE-2014-9273/" source="CVE"/>
		<description>
These are all security issues fixed in the libhivex0-1.3.10-4.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9273/">CVE-2014-9273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9273">CVE-2014-9273 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106170" comment="libhivex0-1.3.10-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106171" comment="perl-Win-Hivex-1.3.10-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147949" version="1" class="patch">
	<metadata>
		<title>libhogweed2-2.7.1-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-8803" ref_url="https://www.suse.com/security/cve/CVE-2015-8803/" source="CVE"/>
		<reference ref_id="CVE-2015-8804" ref_url="https://www.suse.com/security/cve/CVE-2015-8804/" source="CVE"/>
		<reference ref_id="CVE-2015-8805" ref_url="https://www.suse.com/security/cve/CVE-2015-8805/" source="CVE"/>
		<reference ref_id="CVE-2016-6489" ref_url="https://www.suse.com/security/cve/CVE-2016-6489/" source="CVE"/>
		<description>
These are all security issues fixed in the libhogweed2-2.7.1-12.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8803/">CVE-2015-8803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8803">CVE-2015-8803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8804/">CVE-2015-8804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8804">CVE-2015-8804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8805/">CVE-2015-8805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8805">CVE-2015-8805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6489/">CVE-2016-6489 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6489">CVE-2016-6489 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156348" comment="libhogweed2-2.7.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156349" comment="libhogweed2-32bit-2.7.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156351" comment="libnettle4-2.7.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156352" comment="libnettle4-32bit-2.7.1-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147950" version="1" class="patch">
	<metadata>
		<title>libicu-doc-52.1-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<description>
These are all security issues fixed in the libicu-doc-52.1-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9654">CVE-2014-9654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107570" comment="libicu-doc-52.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107572" comment="libicu52_1-52.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107571" comment="libicu52_1-32bit-52.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107573" comment="libicu52_1-data-52.1-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147951" version="1" class="patch">
	<metadata>
		<title>libidn-tools-1.28-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262/" source="CVE"/>
		<reference ref_id="CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263/" source="CVE"/>
		<description>
These are all security issues fixed in the libidn-tools-1.28-4.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2059">CVE-2015-2059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8948">CVE-2015-8948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6261">CVE-2016-6261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6262">CVE-2016-6262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6263">CVE-2016-6263 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131905" comment="libidn-tools-1.28-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130989" comment="libidn11-1.28-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130990" comment="libidn11-32bit-1.28-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147952" version="1" class="patch">
	<metadata>
		<title>libimobiledevice6-1.2.0-7.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2142" ref_url="https://www.suse.com/security/cve/CVE-2013-2142/" source="CVE"/>
		<reference ref_id="CVE-2016-5104" ref_url="https://www.suse.com/security/cve/CVE-2016-5104/" source="CVE"/>
		<description>
These are all security issues fixed in the libimobiledevice6-1.2.0-7.31 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2142/">CVE-2013-2142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2142">CVE-2013-2142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5104/">CVE-2016-5104 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5104">CVE-2016-5104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140847" comment="libimobiledevice6-1.2.0-7.31 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147953" version="1" class="patch">
	<metadata>
		<title>libipa_hbac0-1.13.4-33.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-4341" ref_url="https://www.suse.com/security/cve/CVE-2010-4341/" source="CVE"/>
		<reference ref_id="CVE-2011-1758" ref_url="https://www.suse.com/security/cve/CVE-2011-1758/" source="CVE"/>
		<reference ref_id="CVE-2013-0219" ref_url="https://www.suse.com/security/cve/CVE-2013-0219/" source="CVE"/>
		<reference ref_id="CVE-2013-0220" ref_url="https://www.suse.com/security/cve/CVE-2013-0220/" source="CVE"/>
		<reference ref_id="CVE-2013-0287" ref_url="https://www.suse.com/security/cve/CVE-2013-0287/" source="CVE"/>
		<description>
These are all security issues fixed in the libipa_hbac0-1.13.4-33.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4341/">CVE-2010-4341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4341">CVE-2010-4341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1758/">CVE-2011-1758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1758">CVE-2011-1758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0219/">CVE-2013-0219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0219">CVE-2013-0219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0220/">CVE-2013-0220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0220">CVE-2013-0220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0287/">CVE-2013-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0287">CVE-2013-0287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159140" comment="libipa_hbac0-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159141" comment="libsss_idmap0-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159142" comment="libsss_nss_idmap0-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159143" comment="libsss_sudo-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159144" comment="python-sssd-config-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159145" comment="sssd-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159146" comment="sssd-32bit-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159147" comment="sssd-ad-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159148" comment="sssd-ipa-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159149" comment="sssd-krb5-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159150" comment="sssd-krb5-common-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159151" comment="sssd-ldap-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159152" comment="sssd-proxy-1.13.4-33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159153" comment="sssd-tools-1.13.4-33.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147954" version="1" class="patch">
	<metadata>
		<title>libjansson4-2.7-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-6401" ref_url="https://www.suse.com/security/cve/CVE-2013-6401/" source="CVE"/>
		<description>
These are all security issues fixed in the libjansson4-2.7-1.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6401/">CVE-2013-6401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6401">CVE-2013-6401 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140861" comment="libjansson4-2.7-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147955" version="1" class="patch">
	<metadata>
		<title>libjasper1-1.900.14-194.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-3522" ref_url="https://www.suse.com/security/cve/CVE-2008-3522/" source="CVE"/>
		<reference ref_id="CVE-2011-4516" ref_url="https://www.suse.com/security/cve/CVE-2011-4516/" source="CVE"/>
		<reference ref_id="CVE-2011-4517" ref_url="https://www.suse.com/security/cve/CVE-2011-4517/" source="CVE"/>
		<reference ref_id="CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137/" source="CVE"/>
		<reference ref_id="CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138/" source="CVE"/>
		<reference ref_id="CVE-2014-8157" ref_url="https://www.suse.com/security/cve/CVE-2014-8157/" source="CVE"/>
		<reference ref_id="CVE-2014-8158" ref_url="https://www.suse.com/security/cve/CVE-2014-8158/" source="CVE"/>
		<reference ref_id="CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029/" source="CVE"/>
		<reference ref_id="CVE-2015-5203" ref_url="https://www.suse.com/security/cve/CVE-2015-5203/" source="CVE"/>
		<reference ref_id="CVE-2015-5221" ref_url="https://www.suse.com/security/cve/CVE-2015-5221/" source="CVE"/>
		<reference ref_id="CVE-2016-10251" ref_url="https://www.suse.com/security/cve/CVE-2016-10251/" source="CVE"/>
		<reference ref_id="CVE-2016-1577" ref_url="https://www.suse.com/security/cve/CVE-2016-1577/" source="CVE"/>
		<reference ref_id="CVE-2016-1867" ref_url="https://www.suse.com/security/cve/CVE-2016-1867/" source="CVE"/>
		<reference ref_id="CVE-2016-2089" ref_url="https://www.suse.com/security/cve/CVE-2016-2089/" source="CVE"/>
		<reference ref_id="CVE-2016-2116" ref_url="https://www.suse.com/security/cve/CVE-2016-2116/" source="CVE"/>
		<reference ref_id="CVE-2016-8654" ref_url="https://www.suse.com/security/cve/CVE-2016-8654/" source="CVE"/>
		<reference ref_id="CVE-2016-8690" ref_url="https://www.suse.com/security/cve/CVE-2016-8690/" source="CVE"/>
		<reference ref_id="CVE-2016-8691" ref_url="https://www.suse.com/security/cve/CVE-2016-8691/" source="CVE"/>
		<reference ref_id="CVE-2016-8692" ref_url="https://www.suse.com/security/cve/CVE-2016-8692/" source="CVE"/>
		<reference ref_id="CVE-2016-8693" ref_url="https://www.suse.com/security/cve/CVE-2016-8693/" source="CVE"/>
		<reference ref_id="CVE-2016-8880" ref_url="https://www.suse.com/security/cve/CVE-2016-8880/" source="CVE"/>
		<reference ref_id="CVE-2016-8881" ref_url="https://www.suse.com/security/cve/CVE-2016-8881/" source="CVE"/>
		<reference ref_id="CVE-2016-8882" ref_url="https://www.suse.com/security/cve/CVE-2016-8882/" source="CVE"/>
		<reference ref_id="CVE-2016-8883" ref_url="https://www.suse.com/security/cve/CVE-2016-8883/" source="CVE"/>
		<reference ref_id="CVE-2016-8884" ref_url="https://www.suse.com/security/cve/CVE-2016-8884/" source="CVE"/>
		<reference ref_id="CVE-2016-8885" ref_url="https://www.suse.com/security/cve/CVE-2016-8885/" source="CVE"/>
		<reference ref_id="CVE-2016-8886" ref_url="https://www.suse.com/security/cve/CVE-2016-8886/" source="CVE"/>
		<reference ref_id="CVE-2016-8887" ref_url="https://www.suse.com/security/cve/CVE-2016-8887/" source="CVE"/>
		<reference ref_id="CVE-2016-9395" ref_url="https://www.suse.com/security/cve/CVE-2016-9395/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9560" ref_url="https://www.suse.com/security/cve/CVE-2016-9560/" source="CVE"/>
		<reference ref_id="CVE-2016-9583" ref_url="https://www.suse.com/security/cve/CVE-2016-9583/" source="CVE"/>
		<reference ref_id="CVE-2016-9591" ref_url="https://www.suse.com/security/cve/CVE-2016-9591/" source="CVE"/>
		<reference ref_id="CVE-2016-9600" ref_url="https://www.suse.com/security/cve/CVE-2016-9600/" source="CVE"/>
		<reference ref_id="CVE-2017-5498" ref_url="https://www.suse.com/security/cve/CVE-2017-5498/" source="CVE"/>
		<reference ref_id="CVE-2017-6850" ref_url="https://www.suse.com/security/cve/CVE-2017-6850/" source="CVE"/>
		<description>
These are all security issues fixed in the libjasper1-1.900.14-194.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3522/">CVE-2008-3522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3522">CVE-2008-3522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4516/">CVE-2011-4516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4516">CVE-2011-4516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4517/">CVE-2011-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4517">CVE-2011-4517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8137">CVE-2014-8137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8138">CVE-2014-8138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8157/">CVE-2014-8157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8157">CVE-2014-8157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8158/">CVE-2014-8158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8158">CVE-2014-8158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9029">CVE-2014-9029 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5203/">CVE-2015-5203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5203">CVE-2015-5203 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5221/">CVE-2015-5221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5221">CVE-2015-5221 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10251/">CVE-2016-10251 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10251">CVE-2016-10251 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1577/">CVE-2016-1577 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1577">CVE-2016-1577 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1867/">CVE-2016-1867 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1867">CVE-2016-1867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2089/">CVE-2016-2089 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2089">CVE-2016-2089 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2116/">CVE-2016-2116 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2116">CVE-2016-2116 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8654/">CVE-2016-8654 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8654">CVE-2016-8654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8690/">CVE-2016-8690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8690">CVE-2016-8690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8691/">CVE-2016-8691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8691">CVE-2016-8691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8692/">CVE-2016-8692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8692">CVE-2016-8692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8693/">CVE-2016-8693 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8693">CVE-2016-8693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8880/">CVE-2016-8880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-8880">CVE-2016-8880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8881/">CVE-2016-8881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-8881">CVE-2016-8881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8882/">CVE-2016-8882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8882">CVE-2016-8882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8883/">CVE-2016-8883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8883">CVE-2016-8883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8884/">CVE-2016-8884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8884">CVE-2016-8884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8885/">CVE-2016-8885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8885">CVE-2016-8885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8886/">CVE-2016-8886 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8886">CVE-2016-8886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8887/">CVE-2016-8887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8887">CVE-2016-8887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9395/">CVE-2016-9395 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9395">CVE-2016-9395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9398">CVE-2016-9398 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9560/">CVE-2016-9560 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9560">CVE-2016-9560 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9583/">CVE-2016-9583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9583">CVE-2016-9583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9591/">CVE-2016-9591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9591">CVE-2016-9591 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9600/">CVE-2016-9600 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9600">CVE-2016-9600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5498/">CVE-2017-5498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5498">CVE-2017-5498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6850/">CVE-2017-6850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6850">CVE-2017-6850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009150812" comment="libjasper1-1.900.14-194.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150813" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147956" version="1" class="patch">
	<metadata>
		<title>libjavascriptcoregtk-3_0-0-2.4.11-23.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-5112" ref_url="https://www.suse.com/security/cve/CVE-2012-5112/" source="CVE"/>
		<reference ref_id="CVE-2012-5133" ref_url="https://www.suse.com/security/cve/CVE-2012-5133/" source="CVE"/>
		<reference ref_id="CVE-2014-1344" ref_url="https://www.suse.com/security/cve/CVE-2014-1344/" source="CVE"/>
		<reference ref_id="CVE-2014-1384" ref_url="https://www.suse.com/security/cve/CVE-2014-1384/" source="CVE"/>
		<reference ref_id="CVE-2014-1385" ref_url="https://www.suse.com/security/cve/CVE-2014-1385/" source="CVE"/>
		<reference ref_id="CVE-2014-1386" ref_url="https://www.suse.com/security/cve/CVE-2014-1386/" source="CVE"/>
		<reference ref_id="CVE-2014-1387" ref_url="https://www.suse.com/security/cve/CVE-2014-1387/" source="CVE"/>
		<reference ref_id="CVE-2014-1388" ref_url="https://www.suse.com/security/cve/CVE-2014-1388/" source="CVE"/>
		<reference ref_id="CVE-2014-1389" ref_url="https://www.suse.com/security/cve/CVE-2014-1389/" source="CVE"/>
		<reference ref_id="CVE-2014-1390" ref_url="https://www.suse.com/security/cve/CVE-2014-1390/" source="CVE"/>
		<reference ref_id="CVE-2014-1748" ref_url="https://www.suse.com/security/cve/CVE-2014-1748/" source="CVE"/>
		<reference ref_id="CVE-2015-1071" ref_url="https://www.suse.com/security/cve/CVE-2015-1071/" source="CVE"/>
		<reference ref_id="CVE-2015-1076" ref_url="https://www.suse.com/security/cve/CVE-2015-1076/" source="CVE"/>
		<reference ref_id="CVE-2015-1081" ref_url="https://www.suse.com/security/cve/CVE-2015-1081/" source="CVE"/>
		<reference ref_id="CVE-2015-1083" ref_url="https://www.suse.com/security/cve/CVE-2015-1083/" source="CVE"/>
		<reference ref_id="CVE-2015-1120" ref_url="https://www.suse.com/security/cve/CVE-2015-1120/" source="CVE"/>
		<reference ref_id="CVE-2015-1122" ref_url="https://www.suse.com/security/cve/CVE-2015-1122/" source="CVE"/>
		<reference ref_id="CVE-2015-1127" ref_url="https://www.suse.com/security/cve/CVE-2015-1127/" source="CVE"/>
		<reference ref_id="CVE-2015-1153" ref_url="https://www.suse.com/security/cve/CVE-2015-1153/" source="CVE"/>
		<reference ref_id="CVE-2015-1155" ref_url="https://www.suse.com/security/cve/CVE-2015-1155/" source="CVE"/>
		<reference ref_id="CVE-2015-2330" ref_url="https://www.suse.com/security/cve/CVE-2015-2330/" source="CVE"/>
		<reference ref_id="CVE-2015-3658" ref_url="https://www.suse.com/security/cve/CVE-2015-3658/" source="CVE"/>
		<reference ref_id="CVE-2015-3659" ref_url="https://www.suse.com/security/cve/CVE-2015-3659/" source="CVE"/>
		<reference ref_id="CVE-2015-3727" ref_url="https://www.suse.com/security/cve/CVE-2015-3727/" source="CVE"/>
		<reference ref_id="CVE-2015-3731" ref_url="https://www.suse.com/security/cve/CVE-2015-3731/" source="CVE"/>
		<reference ref_id="CVE-2015-3741" ref_url="https://www.suse.com/security/cve/CVE-2015-3741/" source="CVE"/>
		<reference ref_id="CVE-2015-3743" ref_url="https://www.suse.com/security/cve/CVE-2015-3743/" source="CVE"/>
		<reference ref_id="CVE-2015-3745" ref_url="https://www.suse.com/security/cve/CVE-2015-3745/" source="CVE"/>
		<reference ref_id="CVE-2015-3747" ref_url="https://www.suse.com/security/cve/CVE-2015-3747/" source="CVE"/>
		<reference ref_id="CVE-2015-3748" ref_url="https://www.suse.com/security/cve/CVE-2015-3748/" source="CVE"/>
		<reference ref_id="CVE-2015-3749" ref_url="https://www.suse.com/security/cve/CVE-2015-3749/" source="CVE"/>
		<reference ref_id="CVE-2015-3752" ref_url="https://www.suse.com/security/cve/CVE-2015-3752/" source="CVE"/>
		<reference ref_id="CVE-2015-5788" ref_url="https://www.suse.com/security/cve/CVE-2015-5788/" source="CVE"/>
		<reference ref_id="CVE-2015-5794" ref_url="https://www.suse.com/security/cve/CVE-2015-5794/" source="CVE"/>
		<reference ref_id="CVE-2015-5801" ref_url="https://www.suse.com/security/cve/CVE-2015-5801/" source="CVE"/>
		<reference ref_id="CVE-2015-5809" ref_url="https://www.suse.com/security/cve/CVE-2015-5809/" source="CVE"/>
		<reference ref_id="CVE-2015-5822" ref_url="https://www.suse.com/security/cve/CVE-2015-5822/" source="CVE"/>
		<reference ref_id="CVE-2015-5928" ref_url="https://www.suse.com/security/cve/CVE-2015-5928/" source="CVE"/>
		<description>
These are all security issues fixed in the libjavascriptcoregtk-3_0-0-2.4.11-23.20 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5112/">CVE-2012-5112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5112">CVE-2012-5112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5133/">CVE-2012-5133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5133">CVE-2012-5133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1344/">CVE-2014-1344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1344">CVE-2014-1344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1384/">CVE-2014-1384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1384">CVE-2014-1384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1385/">CVE-2014-1385 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1385">CVE-2014-1385 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1386/">CVE-2014-1386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1386">CVE-2014-1386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1387/">CVE-2014-1387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1387">CVE-2014-1387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1388/">CVE-2014-1388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1388">CVE-2014-1388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1389/">CVE-2014-1389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1389">CVE-2014-1389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1390/">CVE-2014-1390 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1390">CVE-2014-1390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1748/">CVE-2014-1748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1748">CVE-2014-1748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1071/">CVE-2015-1071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1071">CVE-2015-1071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1076/">CVE-2015-1076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1076">CVE-2015-1076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1081/">CVE-2015-1081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1081">CVE-2015-1081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1083/">CVE-2015-1083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1083">CVE-2015-1083 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-1120/">CVE-2015-1120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1120">CVE-2015-1120 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-1122/">CVE-2015-1122 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1122">CVE-2015-1122 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-1127/">CVE-2015-1127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1127">CVE-2015-1127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1153/">CVE-2015-1153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1153">CVE-2015-1153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1155/">CVE-2015-1155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1155">CVE-2015-1155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2330/">CVE-2015-2330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2330">CVE-2015-2330 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3658/">CVE-2015-3658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3658">CVE-2015-3658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3659/">CVE-2015-3659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3659">CVE-2015-3659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3727/">CVE-2015-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3727">CVE-2015-3727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3731/">CVE-2015-3731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3731">CVE-2015-3731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3741/">CVE-2015-3741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3741">CVE-2015-3741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3743/">CVE-2015-3743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3743">CVE-2015-3743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3745/">CVE-2015-3745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3745">CVE-2015-3745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3747/">CVE-2015-3747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3747">CVE-2015-3747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3748/">CVE-2015-3748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3748">CVE-2015-3748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3749/">CVE-2015-3749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3749">CVE-2015-3749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3752/">CVE-2015-3752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3752">CVE-2015-3752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5788/">CVE-2015-5788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5788">CVE-2015-5788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5794/">CVE-2015-5794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5794">CVE-2015-5794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5801/">CVE-2015-5801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5801">CVE-2015-5801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5809/">CVE-2015-5809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5809">CVE-2015-5809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5822/">CVE-2015-5822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5822">CVE-2015-5822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5928/">CVE-2015-5928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5928">CVE-2015-5928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147957" version="1" class="patch">
	<metadata>
		<title>libjavascriptcoregtk-4_0-18-2.12.5-1.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-1856" ref_url="https://www.suse.com/security/cve/CVE-2016-1856/" source="CVE"/>
		<reference ref_id="CVE-2016-1857" ref_url="https://www.suse.com/security/cve/CVE-2016-1857/" source="CVE"/>
		<reference ref_id="CVE-2016-4590" ref_url="https://www.suse.com/security/cve/CVE-2016-4590/" source="CVE"/>
		<reference ref_id="CVE-2016-4591" ref_url="https://www.suse.com/security/cve/CVE-2016-4591/" source="CVE"/>
		<reference ref_id="CVE-2016-4622" ref_url="https://www.suse.com/security/cve/CVE-2016-4622/" source="CVE"/>
		<reference ref_id="CVE-2016-4624" ref_url="https://www.suse.com/security/cve/CVE-2016-4624/" source="CVE"/>
		<description>
These are all security issues fixed in the libjavascriptcoregtk-4_0-18-2.12.5-1.12 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1856/">CVE-2016-1856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1856">CVE-2016-1856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1857/">CVE-2016-1857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1857">CVE-2016-1857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4590/">CVE-2016-4590 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4590">CVE-2016-4590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4591/">CVE-2016-4591 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4591">CVE-2016-4591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4622/">CVE-2016-4622 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4622">CVE-2016-4622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4624/">CVE-2016-4624 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4624">CVE-2016-4624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140865" comment="libjavascriptcoregtk-4_0-18-2.12.5-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140866" comment="libwebkit2gtk-4_0-37-2.12.5-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140867" comment="typelib-1_0-JavaScriptCore-4_0-2.12.5-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140868" comment="typelib-1_0-WebKit2-4_0-2.12.5-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140869" comment="webkit2gtk-4_0-injected-bundles-2.12.5-1.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147958" version="1" class="patch">
	<metadata>
		<title>libjbig2-2.0-12.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-6369" ref_url="https://www.suse.com/security/cve/CVE-2013-6369/" source="CVE"/>
		<description>
These are all security issues fixed in the libjbig2-2.0-12.13 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6369/">CVE-2013-6369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6369">CVE-2013-6369 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140689" comment="libjbig2-2.0-12.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140690" comment="libjbig2-32bit-2.0-12.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147959" version="1" class="patch">
	<metadata>
		<title>libjpeg-turbo-1.3.1-30.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-9092" ref_url="https://www.suse.com/security/cve/CVE-2014-9092/" source="CVE"/>
		<description>
These are all security issues fixed in the libjpeg-turbo-1.3.1-30.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9092/">CVE-2014-9092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9092">CVE-2014-9092 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105080" comment="libjpeg-turbo-1.3.1-30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105088" comment="libjpeg62-62.1.0-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105087" comment="libjpeg62-32bit-62.1.0-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105091" comment="libjpeg62-turbo-1.3.1-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105082" comment="libjpeg8-8.0.2-30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105081" comment="libjpeg8-32bit-8.0.2-30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105086" comment="libturbojpeg0-8.0.2-30.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147960" version="1" class="patch">
	<metadata>
		<title>libjson-c2-0.11-2.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370/" source="CVE"/>
		<reference ref_id="CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371/" source="CVE"/>
		<description>
These are all security issues fixed in the libjson-c2-0.11-2.15 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6370">CVE-2013-6370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6371">CVE-2013-6371 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140691" comment="libjson-c2-0.11-2.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140692" comment="libjson-c2-32bit-0.11-2.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147961" version="1" class="patch">
	<metadata>
		<title>libkde4-32bit-4.12.0-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2017-8422" ref_url="https://www.suse.com/security/cve/CVE-2017-8422/" source="CVE"/>
		<description>
These are all security issues fixed in the libkde4-32bit-4.12.0-10.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6354">CVE-2016-6354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8422/">CVE-2017-8422 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8422">CVE-2017-8422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155614" comment="libkde4-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155615" comment="libkde4-32bit-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155616" comment="libkdecore4-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155617" comment="libkdecore4-32bit-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155618" comment="libksuseinstall1-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155619" comment="libksuseinstall1-32bit-4.12.0-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147962" version="1" class="patch">
	<metadata>
		<title>libksba8-1.3.0-23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087/" source="CVE"/>
		<reference ref_id="CVE-2016-4574" ref_url="https://www.suse.com/security/cve/CVE-2016-4574/" source="CVE"/>
		<reference ref_id="CVE-2016-4579" ref_url="https://www.suse.com/security/cve/CVE-2016-4579/" source="CVE"/>
		<description>
These are all security issues fixed in the libksba8-1.3.0-23.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9087">CVE-2014-9087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4574/">CVE-2016-4574 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4574">CVE-2016-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4579/">CVE-2016-4579 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4579">CVE-2016-4579 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128468" comment="libksba8-1.3.0-23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147963" version="1" class="patch">
	<metadata>
		<title>liblcms1-1.19-17.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0793" ref_url="https://www.suse.com/security/cve/CVE-2009-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>
These are all security issues fixed in the liblcms1-1.19-17.28 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0793/">CVE-2009-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0793">CVE-2009-0793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4276">CVE-2013-4276 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140713" comment="liblcms1-1.19-17.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140714" comment="liblcms1-32bit-1.19-17.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147964" version="1" class="patch">
	<metadata>
		<title>libldap-2_4-2-2.4.41-18.29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<reference ref_id="CVE-2017-9287" ref_url="https://www.suse.com/security/cve/CVE-2017-9287/" source="CVE"/>
		<description>
These are all security issues fixed in the libldap-2_4-2-2.4.41-18.29.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1545">CVE-2015-1545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1546">CVE-2015-1546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6908">CVE-2015-6908 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9287/">CVE-2017-9287 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9287">CVE-2017-9287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156765" comment="libldap-2_4-2-2.4.41-18.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156766" comment="libldap-2_4-2-32bit-2.4.41-18.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156767" comment="openldap2-2.4.41-18.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156770" comment="openldap2-back-meta-2.4.41-18.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156768" comment="openldap2-client-2.4.41-18.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147965" version="1" class="patch">
	<metadata>
		<title>libldb1-1.1.29-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<description>
These are all security issues fixed in the libldb1-1.1.29-1.13 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3223">CVE-2015-3223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5330">CVE-2015-5330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159154" comment="libldb1-1.1.29-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159155" comment="libldb1-32bit-1.1.29-1.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147966" version="1" class="patch">
	<metadata>
		<title>libltdl7-2.4.2-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<description>
These are all security issues fixed in the libltdl7-2.4.2-16.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3736">CVE-2009-3736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159156" comment="libltdl7-2.4.2-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159157" comment="libltdl7-32bit-2.4.2-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159158" comment="libtool-2.4.2-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159159" comment="libtool-32bit-2.4.2-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147967" version="1" class="patch">
	<metadata>
		<title>liblua5_2-32bit-5.2.4-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-5461" ref_url="https://www.suse.com/security/cve/CVE-2014-5461/" source="CVE"/>
		<description>
These are all security issues fixed in the liblua5_2-32bit-5.2.4-6.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5461/">CVE-2014-5461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5461">CVE-2014-5461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159160" comment="liblua5_2-5.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159161" comment="liblua5_2-32bit-5.2.4-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159162" comment="lua-5.2.4-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147968" version="1" class="patch">
	<metadata>
		<title>liblzo2-2-2.08-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>
These are all security issues fixed in the liblzo2-2-2.08-1.13 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4607">CVE-2014-4607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140882" comment="liblzo2-2-2.08-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140883" comment="liblzo2-2-32bit-2.08-1.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147969" version="1" class="patch">
	<metadata>
		<title>libmicrohttpd10-0.9.30-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-7038" ref_url="https://www.suse.com/security/cve/CVE-2013-7038/" source="CVE"/>
		<reference ref_id="CVE-2013-7039" ref_url="https://www.suse.com/security/cve/CVE-2013-7039/" source="CVE"/>
		<description>
These are all security issues fixed in the libmicrohttpd10-0.9.30-5.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-7038/">CVE-2013-7038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7038">CVE-2013-7038 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2013-7039/">CVE-2013-7039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7039">CVE-2013-7039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156854" comment="libmicrohttpd10-0.9.30-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147970" version="1" class="patch">
	<metadata>
		<title>libmms0-0.6.2-15.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-2892" ref_url="https://www.suse.com/security/cve/CVE-2014-2892/" source="CVE"/>
		<description>
These are all security issues fixed in the libmms0-0.6.2-15.8 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2892/">CVE-2014-2892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2892">CVE-2014-2892 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140884" comment="libmms0-0.6.2-15.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147971" version="1" class="patch">
	<metadata>
		<title>libmodplug1-0.8.8.4-13.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1761" ref_url="https://www.suse.com/security/cve/CVE-2011-1761/" source="CVE"/>
		<reference ref_id="CVE-2013-4233" ref_url="https://www.suse.com/security/cve/CVE-2013-4233/" source="CVE"/>
		<reference ref_id="CVE-2013-4234" ref_url="https://www.suse.com/security/cve/CVE-2013-4234/" source="CVE"/>
		<description>
These are all security issues fixed in the libmodplug1-0.8.8.4-13.63 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1761/">CVE-2011-1761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1761">CVE-2011-1761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4233/">CVE-2013-4233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4233">CVE-2013-4233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4234/">CVE-2013-4234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4234">CVE-2013-4234 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140885" comment="libmodplug1-0.8.8.4-13.69 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147972" version="1" class="patch">
	<metadata>
		<title>libmpfr4-3.1.2-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>
These are all security issues fixed in the libmpfr4-3.1.2-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9474">CVE-2014-9474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105814" comment="libmpfr4-3.1.2-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105815" comment="libmpfr4-32bit-3.1.2-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147973" version="1" class="patch">
	<metadata>
		<title>libmspack0-0.4-14.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2800" ref_url="https://www.suse.com/security/cve/CVE-2010-2800/" source="CVE"/>
		<reference ref_id="CVE-2010-2801" ref_url="https://www.suse.com/security/cve/CVE-2010-2801/" source="CVE"/>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4467" ref_url="https://www.suse.com/security/cve/CVE-2015-4467/" source="CVE"/>
		<reference ref_id="CVE-2015-4468" ref_url="https://www.suse.com/security/cve/CVE-2015-4468/" source="CVE"/>
		<reference ref_id="CVE-2015-4469" ref_url="https://www.suse.com/security/cve/CVE-2015-4469/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="CVE-2015-4472" ref_url="https://www.suse.com/security/cve/CVE-2015-4472/" source="CVE"/>
		<description>
These are all security issues fixed in the libmspack0-0.4-14.4 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2800/">CVE-2010-2800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2800">CVE-2010-2800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2801/">CVE-2010-2801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2801">CVE-2010-2801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9556">CVE-2014-9556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9732">CVE-2014-9732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4467/">CVE-2015-4467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4467">CVE-2015-4467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4468/">CVE-2015-4468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4468">CVE-2015-4468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4469/">CVE-2015-4469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4469">CVE-2015-4469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4470">CVE-2015-4470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4471">CVE-2015-4471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4472/">CVE-2015-4472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4472">CVE-2015-4472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147974" version="1" class="patch">
	<metadata>
		<title>libmusicbrainz4-2.1.5-27.79 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-4197" ref_url="https://www.suse.com/security/cve/CVE-2006-4197/" source="CVE"/>
		<description>
These are all security issues fixed in the libmusicbrainz4-2.1.5-27.79 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4197/">CVE-2006-4197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4197">CVE-2006-4197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140886" comment="libmusicbrainz4-2.1.5-27.86 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147975" version="1" class="patch">
	<metadata>
		<title>libmysqlclient18-10.0.30-28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-5970" ref_url="https://www.suse.com/security/cve/CVE-2007-5970/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-2494" ref_url="https://www.suse.com/security/cve/CVE-2014-2494/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-4207" ref_url="https://www.suse.com/security/cve/CVE-2014-4207/" source="CVE"/>
		<reference ref_id="CVE-2014-4258" ref_url="https://www.suse.com/security/cve/CVE-2014-4258/" source="CVE"/>
		<reference ref_id="CVE-2014-4260" ref_url="https://www.suse.com/security/cve/CVE-2014-4260/" source="CVE"/>
		<reference ref_id="CVE-2014-4274" ref_url="https://www.suse.com/security/cve/CVE-2014-4274/" source="CVE"/>
		<reference ref_id="CVE-2014-4287" ref_url="https://www.suse.com/security/cve/CVE-2014-4287/" source="CVE"/>
		<reference ref_id="CVE-2014-6463" ref_url="https://www.suse.com/security/cve/CVE-2014-6463/" source="CVE"/>
		<reference ref_id="CVE-2014-6464" ref_url="https://www.suse.com/security/cve/CVE-2014-6464/" source="CVE"/>
		<reference ref_id="CVE-2014-6469" ref_url="https://www.suse.com/security/cve/CVE-2014-6469/" source="CVE"/>
		<reference ref_id="CVE-2014-6474" ref_url="https://www.suse.com/security/cve/CVE-2014-6474/" source="CVE"/>
		<reference ref_id="CVE-2014-6478" ref_url="https://www.suse.com/security/cve/CVE-2014-6478/" source="CVE"/>
		<reference ref_id="CVE-2014-6484" ref_url="https://www.suse.com/security/cve/CVE-2014-6484/" source="CVE"/>
		<reference ref_id="CVE-2014-6489" ref_url="https://www.suse.com/security/cve/CVE-2014-6489/" source="CVE"/>
		<reference ref_id="CVE-2014-6491" ref_url="https://www.suse.com/security/cve/CVE-2014-6491/" source="CVE"/>
		<reference ref_id="CVE-2014-6494" ref_url="https://www.suse.com/security/cve/CVE-2014-6494/" source="CVE"/>
		<reference ref_id="CVE-2014-6495" ref_url="https://www.suse.com/security/cve/CVE-2014-6495/" source="CVE"/>
		<reference ref_id="CVE-2014-6496" ref_url="https://www.suse.com/security/cve/CVE-2014-6496/" source="CVE"/>
		<reference ref_id="CVE-2014-6500" ref_url="https://www.suse.com/security/cve/CVE-2014-6500/" source="CVE"/>
		<reference ref_id="CVE-2014-6505" ref_url="https://www.suse.com/security/cve/CVE-2014-6505/" source="CVE"/>
		<reference ref_id="CVE-2014-6507" ref_url="https://www.suse.com/security/cve/CVE-2014-6507/" source="CVE"/>
		<reference ref_id="CVE-2014-6520" ref_url="https://www.suse.com/security/cve/CVE-2014-6520/" source="CVE"/>
		<reference ref_id="CVE-2014-6530" ref_url="https://www.suse.com/security/cve/CVE-2014-6530/" source="CVE"/>
		<reference ref_id="CVE-2014-6551" ref_url="https://www.suse.com/security/cve/CVE-2014-6551/" source="CVE"/>
		<reference ref_id="CVE-2014-6555" ref_url="https://www.suse.com/security/cve/CVE-2014-6555/" source="CVE"/>
		<reference ref_id="CVE-2014-6559" ref_url="https://www.suse.com/security/cve/CVE-2014-6559/" source="CVE"/>
		<reference ref_id="CVE-2014-6564" ref_url="https://www.suse.com/security/cve/CVE-2014-6564/" source="CVE"/>
		<reference ref_id="CVE-2014-6568" ref_url="https://www.suse.com/security/cve/CVE-2014-6568/" source="CVE"/>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-0374" ref_url="https://www.suse.com/security/cve/CVE-2015-0374/" source="CVE"/>
		<reference ref_id="CVE-2015-0381" ref_url="https://www.suse.com/security/cve/CVE-2015-0381/" source="CVE"/>
		<reference ref_id="CVE-2015-0382" ref_url="https://www.suse.com/security/cve/CVE-2015-0382/" source="CVE"/>
		<reference ref_id="CVE-2015-0391" ref_url="https://www.suse.com/security/cve/CVE-2015-0391/" source="CVE"/>
		<reference ref_id="CVE-2015-0411" ref_url="https://www.suse.com/security/cve/CVE-2015-0411/" source="CVE"/>
		<reference ref_id="CVE-2015-0432" ref_url="https://www.suse.com/security/cve/CVE-2015-0432/" source="CVE"/>
		<reference ref_id="CVE-2015-0433" ref_url="https://www.suse.com/security/cve/CVE-2015-0433/" source="CVE"/>
		<reference ref_id="CVE-2015-0441" ref_url="https://www.suse.com/security/cve/CVE-2015-0441/" source="CVE"/>
		<reference ref_id="CVE-2015-0499" ref_url="https://www.suse.com/security/cve/CVE-2015-0499/" source="CVE"/>
		<reference ref_id="CVE-2015-0501" ref_url="https://www.suse.com/security/cve/CVE-2015-0501/" source="CVE"/>
		<reference ref_id="CVE-2015-0505" ref_url="https://www.suse.com/security/cve/CVE-2015-0505/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2015-2568" ref_url="https://www.suse.com/security/cve/CVE-2015-2568/" source="CVE"/>
		<reference ref_id="CVE-2015-2571" ref_url="https://www.suse.com/security/cve/CVE-2015-2571/" source="CVE"/>
		<reference ref_id="CVE-2015-2573" ref_url="https://www.suse.com/security/cve/CVE-2015-2573/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4807" ref_url="https://www.suse.com/security/cve/CVE-2015-4807/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="CVE-2015-5969" ref_url="https://www.suse.com/security/cve/CVE-2015-5969/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="CVE-2016-0640" ref_url="https://www.suse.com/security/cve/CVE-2016-0640/" source="CVE"/>
		<reference ref_id="CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641/" source="CVE"/>
		<reference ref_id="CVE-2016-0642" ref_url="https://www.suse.com/security/cve/CVE-2016-0642/" source="CVE"/>
		<reference ref_id="CVE-2016-0643" ref_url="https://www.suse.com/security/cve/CVE-2016-0643/" source="CVE"/>
		<reference ref_id="CVE-2016-0644" ref_url="https://www.suse.com/security/cve/CVE-2016-0644/" source="CVE"/>
		<reference ref_id="CVE-2016-0646" ref_url="https://www.suse.com/security/cve/CVE-2016-0646/" source="CVE"/>
		<reference ref_id="CVE-2016-0647" ref_url="https://www.suse.com/security/cve/CVE-2016-0647/" source="CVE"/>
		<reference ref_id="CVE-2016-0648" ref_url="https://www.suse.com/security/cve/CVE-2016-0648/" source="CVE"/>
		<reference ref_id="CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649/" source="CVE"/>
		<reference ref_id="CVE-2016-0650" ref_url="https://www.suse.com/security/cve/CVE-2016-0650/" source="CVE"/>
		<reference ref_id="CVE-2016-0651" ref_url="https://www.suse.com/security/cve/CVE-2016-0651/" source="CVE"/>
		<reference ref_id="CVE-2016-0655" ref_url="https://www.suse.com/security/cve/CVE-2016-0655/" source="CVE"/>
		<reference ref_id="CVE-2016-0666" ref_url="https://www.suse.com/security/cve/CVE-2016-0666/" source="CVE"/>
		<reference ref_id="CVE-2016-0668" ref_url="https://www.suse.com/security/cve/CVE-2016-0668/" source="CVE"/>
		<reference ref_id="CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047/" source="CVE"/>
		<reference ref_id="CVE-2016-3477" ref_url="https://www.suse.com/security/cve/CVE-2016-3477/" source="CVE"/>
		<reference ref_id="CVE-2016-3492" ref_url="https://www.suse.com/security/cve/CVE-2016-3492/" source="CVE"/>
		<reference ref_id="CVE-2016-3521" ref_url="https://www.suse.com/security/cve/CVE-2016-3521/" source="CVE"/>
		<reference ref_id="CVE-2016-3615" ref_url="https://www.suse.com/security/cve/CVE-2016-3615/" source="CVE"/>
		<reference ref_id="CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440/" source="CVE"/>
		<reference ref_id="CVE-2016-5584" ref_url="https://www.suse.com/security/cve/CVE-2016-5584/" source="CVE"/>
		<reference ref_id="CVE-2016-5624" ref_url="https://www.suse.com/security/cve/CVE-2016-5624/" source="CVE"/>
		<reference ref_id="CVE-2016-5626" ref_url="https://www.suse.com/security/cve/CVE-2016-5626/" source="CVE"/>
		<reference ref_id="CVE-2016-5629" ref_url="https://www.suse.com/security/cve/CVE-2016-5629/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<reference ref_id="CVE-2016-6663" ref_url="https://www.suse.com/security/cve/CVE-2016-6663/" source="CVE"/>
		<reference ref_id="CVE-2016-6664" ref_url="https://www.suse.com/security/cve/CVE-2016-6664/" source="CVE"/>
		<reference ref_id="CVE-2016-7440" ref_url="https://www.suse.com/security/cve/CVE-2016-7440/" source="CVE"/>
		<reference ref_id="CVE-2016-8283" ref_url="https://www.suse.com/security/cve/CVE-2016-8283/" source="CVE"/>
		<reference ref_id="CVE-2017-3238" ref_url="https://www.suse.com/security/cve/CVE-2017-3238/" source="CVE"/>
		<reference ref_id="CVE-2017-3243" ref_url="https://www.suse.com/security/cve/CVE-2017-3243/" source="CVE"/>
		<reference ref_id="CVE-2017-3244" ref_url="https://www.suse.com/security/cve/CVE-2017-3244/" source="CVE"/>
		<reference ref_id="CVE-2017-3257" ref_url="https://www.suse.com/security/cve/CVE-2017-3257/" source="CVE"/>
		<reference ref_id="CVE-2017-3258" ref_url="https://www.suse.com/security/cve/CVE-2017-3258/" source="CVE"/>
		<reference ref_id="CVE-2017-3265" ref_url="https://www.suse.com/security/cve/CVE-2017-3265/" source="CVE"/>
		<reference ref_id="CVE-2017-3291" ref_url="https://www.suse.com/security/cve/CVE-2017-3291/" source="CVE"/>
		<reference ref_id="CVE-2017-3302" ref_url="https://www.suse.com/security/cve/CVE-2017-3302/" source="CVE"/>
		<reference ref_id="CVE-2017-3312" ref_url="https://www.suse.com/security/cve/CVE-2017-3312/" source="CVE"/>
		<reference ref_id="CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313/" source="CVE"/>
		<reference ref_id="CVE-2017-3317" ref_url="https://www.suse.com/security/cve/CVE-2017-3317/" source="CVE"/>
		<reference ref_id="CVE-2017-3318" ref_url="https://www.suse.com/security/cve/CVE-2017-3318/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysqlclient18-10.0.30-28.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5970/">CVE-2007-5970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5970">CVE-2007-5970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-7247">CVE-2008-7247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4019">CVE-2009-4019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4028">CVE-2009-4028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4030">CVE-2009-4030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5298">CVE-2010-5298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5615">CVE-2012-5615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1976">CVE-2013-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0195">CVE-2014-0195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0198">CVE-2014-0198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0221">CVE-2014-0221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0224">CVE-2014-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2494/">CVE-2014-2494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2494">CVE-2014-2494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3470">CVE-2014-3470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4207/">CVE-2014-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4207">CVE-2014-4207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4258/">CVE-2014-4258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4258">CVE-2014-4258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4260/">CVE-2014-4260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4260">CVE-2014-4260 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4274/">CVE-2014-4274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4274">CVE-2014-4274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4287/">CVE-2014-4287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4287">CVE-2014-4287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6463/">CVE-2014-6463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6463">CVE-2014-6463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6464/">CVE-2014-6464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6464">CVE-2014-6464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6469/">CVE-2014-6469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6469">CVE-2014-6469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6474/">CVE-2014-6474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6474">CVE-2014-6474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6478/">CVE-2014-6478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6478">CVE-2014-6478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6484/">CVE-2014-6484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6484">CVE-2014-6484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6489/">CVE-2014-6489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6489">CVE-2014-6489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6491/">CVE-2014-6491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6491">CVE-2014-6491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6494/">CVE-2014-6494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6494">CVE-2014-6494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6495/">CVE-2014-6495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6495">CVE-2014-6495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6496/">CVE-2014-6496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6496">CVE-2014-6496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6500/">CVE-2014-6500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6500">CVE-2014-6500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6505/">CVE-2014-6505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6505">CVE-2014-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6507/">CVE-2014-6507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6507">CVE-2014-6507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6520/">CVE-2014-6520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6520">CVE-2014-6520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6530/">CVE-2014-6530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6530">CVE-2014-6530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6551/">CVE-2014-6551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6551">CVE-2014-6551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6555/">CVE-2014-6555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6555">CVE-2014-6555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6559/">CVE-2014-6559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6559">CVE-2014-6559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6564/">CVE-2014-6564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6564">CVE-2014-6564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6568/">CVE-2014-6568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6568">CVE-2014-6568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8964">CVE-2014-8964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0374/">CVE-2015-0374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0374">CVE-2015-0374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0381/">CVE-2015-0381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0381">CVE-2015-0381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0382/">CVE-2015-0382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0382">CVE-2015-0382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0391/">CVE-2015-0391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0391">CVE-2015-0391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0411/">CVE-2015-0411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0411">CVE-2015-0411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0432/">CVE-2015-0432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0432">CVE-2015-0432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0433/">CVE-2015-0433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0433">CVE-2015-0433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0441/">CVE-2015-0441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0441">CVE-2015-0441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0499/">CVE-2015-0499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0499">CVE-2015-0499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0501/">CVE-2015-0501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0501">CVE-2015-0501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0505/">CVE-2015-0505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0505">CVE-2015-0505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2325">CVE-2015-2325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2326">CVE-2015-2326 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2568/">CVE-2015-2568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2568">CVE-2015-2568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2571/">CVE-2015-2571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2571">CVE-2015-2571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2573/">CVE-2015-2573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2573">CVE-2015-2573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3152">CVE-2015-3152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4792">CVE-2015-4792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4802">CVE-2015-4802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4807/">CVE-2015-4807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4807">CVE-2015-4807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4815">CVE-2015-4815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4826">CVE-2015-4826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4830">CVE-2015-4830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4836">CVE-2015-4836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4858">CVE-2015-4858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4861">CVE-2015-4861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4870">CVE-2015-4870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4913">CVE-2015-4913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5969/">CVE-2015-5969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5969">CVE-2015-5969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0505">CVE-2016-0505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0546">CVE-2016-0546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0596">CVE-2016-0596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0597">CVE-2016-0597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0598">CVE-2016-0598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0600">CVE-2016-0600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0606">CVE-2016-0606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0608">CVE-2016-0608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0609">CVE-2016-0609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0616">CVE-2016-0616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0640/">CVE-2016-0640 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0640">CVE-2016-0640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0641">CVE-2016-0641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0642/">CVE-2016-0642 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0642">CVE-2016-0642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0643/">CVE-2016-0643 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0643">CVE-2016-0643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0644/">CVE-2016-0644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0644">CVE-2016-0644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0646/">CVE-2016-0646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0646">CVE-2016-0646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0647/">CVE-2016-0647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0647">CVE-2016-0647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0648/">CVE-2016-0648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0648">CVE-2016-0648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0649">CVE-2016-0649 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0650/">CVE-2016-0650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0650">CVE-2016-0650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0651/">CVE-2016-0651 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0651">CVE-2016-0651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0655/">CVE-2016-0655 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0655">CVE-2016-0655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0666/">CVE-2016-0666 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0666">CVE-2016-0666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0668/">CVE-2016-0668 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0668">CVE-2016-0668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2047">CVE-2016-2047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3477/">CVE-2016-3477 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3477">CVE-2016-3477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3492/">CVE-2016-3492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3492">CVE-2016-3492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3521/">CVE-2016-3521 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3521">CVE-2016-3521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3615/">CVE-2016-3615 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3615">CVE-2016-3615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5440">CVE-2016-5440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5584/">CVE-2016-5584 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5584">CVE-2016-5584 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5624/">CVE-2016-5624 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5624">CVE-2016-5624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5626/">CVE-2016-5626 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5626">CVE-2016-5626 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5629/">CVE-2016-5629 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5629">CVE-2016-5629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6662">CVE-2016-6662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6663/">CVE-2016-6663 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6663">CVE-2016-6663 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6664/">CVE-2016-6664 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6664">CVE-2016-6664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7440/">CVE-2016-7440 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7440">CVE-2016-7440 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8283/">CVE-2016-8283 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8283">CVE-2016-8283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3238/">CVE-2017-3238 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3238">CVE-2017-3238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3243/">CVE-2017-3243 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3243">CVE-2017-3243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3244/">CVE-2017-3244 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3244">CVE-2017-3244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3257/">CVE-2017-3257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3257">CVE-2017-3257 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3258/">CVE-2017-3258 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3258">CVE-2017-3258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3265/">CVE-2017-3265 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3265">CVE-2017-3265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3291/">CVE-2017-3291 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3291">CVE-2017-3291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3302/">CVE-2017-3302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3302">CVE-2017-3302 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-3312/">CVE-2017-3312 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3312">CVE-2017-3312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3313">CVE-2017-3313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3317/">CVE-2017-3317 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3317">CVE-2017-3317 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3318/">CVE-2017-3318 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3318">CVE-2017-3318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159163" comment="libmysqlclient18-10.0.30-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159164" comment="libmysqlclient18-32bit-10.0.30-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159165" comment="mariadb-10.0.30-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159166" comment="mariadb-client-10.0.30-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159167" comment="mariadb-errormessages-10.0.30-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159168" comment="mariadb-tools-10.0.30-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147976" version="1" class="patch">
	<metadata>
		<title>libneon27-0.30.0-3.64 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2473" ref_url="https://www.suse.com/security/cve/CVE-2009-2473/" source="CVE"/>
		<reference ref_id="CVE-2009-2474" ref_url="https://www.suse.com/security/cve/CVE-2009-2474/" source="CVE"/>
		<description>
These are all security issues fixed in the libneon27-0.30.0-3.64 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2473/">CVE-2009-2473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2473">CVE-2009-2473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2474/">CVE-2009-2474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2474">CVE-2009-2474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140887" comment="libneon27-0.30.0-3.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140888" comment="libneon27-32bit-0.30.0-3.65 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147977" version="1" class="patch">
	<metadata>
		<title>libnetpbm11-10.66.3-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2017-2581" ref_url="https://www.suse.com/security/cve/CVE-2017-2581/" source="CVE"/>
		<reference ref_id="CVE-2017-2586" ref_url="https://www.suse.com/security/cve/CVE-2017-2586/" source="CVE"/>
		<reference ref_id="CVE-2017-2587" ref_url="https://www.suse.com/security/cve/CVE-2017-2587/" source="CVE"/>
		<description>
These are all security issues fixed in the libnetpbm11-10.66.3-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6354">CVE-2016-6354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2581/">CVE-2017-2581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2581">CVE-2017-2581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2586/">CVE-2017-2586 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2586">CVE-2017-2586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2587/">CVE-2017-2587 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2587">CVE-2017-2587 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009139268" comment="libnetpbm11-10.66.3-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156953" comment="libnetpbm11-32bit-10.66.3-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009139269" comment="netpbm-10.66.3-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147978" version="1" class="patch">
	<metadata>
		<title>libnghttp2-14-1.7.1-1.84 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-1544" ref_url="https://www.suse.com/security/cve/CVE-2016-1544/" source="CVE"/>
		<description>
These are all security issues fixed in the libnghttp2-14-1.7.1-1.84 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1544/">CVE-2016-1544 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1544">CVE-2016-1544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140889" comment="libnghttp2-14-1.7.1-1.84 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147979" version="1" class="patch">
	<metadata>
		<title>libnm-glib-vpn1-1.0.12-12.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-2924" ref_url="https://www.suse.com/security/cve/CVE-2015-2924/" source="CVE"/>
		<reference ref_id="CVE-2016-0764" ref_url="https://www.suse.com/security/cve/CVE-2016-0764/" source="CVE"/>
		<description>
These are all security issues fixed in the libnm-glib-vpn1-1.0.12-12.4 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2924/">CVE-2015-2924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2924">CVE-2015-2924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0764/">CVE-2016-0764 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0764">CVE-2016-0764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159169" comment="libnm-glib-vpn1-1.0.12-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159170" comment="libnm-glib4-1.0.12-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159171" comment="libnm-util2-1.0.12-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159172" comment="libnm0-1.0.12-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159173" comment="typelib-1_0-NMClient-1_0-1.0.12-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159174" comment="typelib-1_0-NetworkManager-1_0-1.0.12-12.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147980" version="1" class="patch">
	<metadata>
		<title>libopenjp2-7-2.1.0-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-7445" ref_url="https://www.suse.com/security/cve/CVE-2016-7445/" source="CVE"/>
		<reference ref_id="CVE-2016-8332" ref_url="https://www.suse.com/security/cve/CVE-2016-8332/" source="CVE"/>
		<reference ref_id="CVE-2016-9112" ref_url="https://www.suse.com/security/cve/CVE-2016-9112/" source="CVE"/>
		<reference ref_id="CVE-2016-9113" ref_url="https://www.suse.com/security/cve/CVE-2016-9113/" source="CVE"/>
		<reference ref_id="CVE-2016-9114" ref_url="https://www.suse.com/security/cve/CVE-2016-9114/" source="CVE"/>
		<reference ref_id="CVE-2016-9115" ref_url="https://www.suse.com/security/cve/CVE-2016-9115/" source="CVE"/>
		<reference ref_id="CVE-2016-9116" ref_url="https://www.suse.com/security/cve/CVE-2016-9116/" source="CVE"/>
		<reference ref_id="CVE-2016-9117" ref_url="https://www.suse.com/security/cve/CVE-2016-9117/" source="CVE"/>
		<reference ref_id="CVE-2016-9118" ref_url="https://www.suse.com/security/cve/CVE-2016-9118/" source="CVE"/>
		<reference ref_id="CVE-2016-9572" ref_url="https://www.suse.com/security/cve/CVE-2016-9572/" source="CVE"/>
		<reference ref_id="CVE-2016-9573" ref_url="https://www.suse.com/security/cve/CVE-2016-9573/" source="CVE"/>
		<reference ref_id="CVE-2016-9580" ref_url="https://www.suse.com/security/cve/CVE-2016-9580/" source="CVE"/>
		<reference ref_id="CVE-2016-9581" ref_url="https://www.suse.com/security/cve/CVE-2016-9581/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenjp2-7-2.1.0-3.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7445/">CVE-2016-7445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7445">CVE-2016-7445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8332/">CVE-2016-8332 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8332">CVE-2016-8332 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9112/">CVE-2016-9112 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9112">CVE-2016-9112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9113/">CVE-2016-9113 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9113">CVE-2016-9113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9114/">CVE-2016-9114 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9114">CVE-2016-9114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9115/">CVE-2016-9115 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9115">CVE-2016-9115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9116/">CVE-2016-9116 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9116">CVE-2016-9116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9117/">CVE-2016-9117 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9117">CVE-2016-9117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9118/">CVE-2016-9118 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9118">CVE-2016-9118 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9572/">CVE-2016-9572 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9572">CVE-2016-9572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9573/">CVE-2016-9573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9573">CVE-2016-9573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9580/">CVE-2016-9580 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9580">CVE-2016-9580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9581/">CVE-2016-9581 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9581">CVE-2016-9581 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145907" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147981" version="1" class="patch">
	<metadata>
		<title>libopenssl-devel-1.0.2j-59.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-0742" ref_url="https://www.suse.com/security/cve/CVE-2010-0742/" source="CVE"/>
		<reference ref_id="CVE-2010-1633" ref_url="https://www.suse.com/security/cve/CVE-2010-1633/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3207" ref_url="https://www.suse.com/security/cve/CVE-2011-3207/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2012-0027" ref_url="https://www.suse.com/security/cve/CVE-2012-0027/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2686" ref_url="https://www.suse.com/security/cve/CVE-2012-2686/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-4353" ref_url="https://www.suse.com/security/cve/CVE-2013-4353/" source="CVE"/>
		<reference ref_id="CVE-2013-6449" ref_url="https://www.suse.com/security/cve/CVE-2013-6449/" source="CVE"/>
		<reference ref_id="CVE-2013-6450" ref_url="https://www.suse.com/security/cve/CVE-2013-6450/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3509" ref_url="https://www.suse.com/security/cve/CVE-2014-3509/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3511" ref_url="https://www.suse.com/security/cve/CVE-2014-3511/" source="CVE"/>
		<reference ref_id="CVE-2014-3512" ref_url="https://www.suse.com/security/cve/CVE-2014-3512/" source="CVE"/>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-5139" ref_url="https://www.suse.com/security/cve/CVE-2014-5139/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2015-3216" ref_url="https://www.suse.com/security/cve/CVE-2015-3216/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="CVE-2016-2176" ref_url="https://www.suse.com/security/cve/CVE-2016-2176/" source="CVE"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<reference ref_id="CVE-2016-7055" ref_url="https://www.suse.com/security/cve/CVE-2016-7055/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-devel-1.0.2j-59.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-7250">CVE-2006-7250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5077">CVE-2008-5077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0590">CVE-2009-0590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0591">CVE-2009-0591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0789">CVE-2009-0789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1377">CVE-2009-1377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1378">CVE-2009-1378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1379">CVE-2009-1379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1386">CVE-2009-1386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1387">CVE-2009-1387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0740">CVE-2010-0740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0742/">CVE-2010-0742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0742">CVE-2010-0742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1633/">CVE-2010-1633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1633">CVE-2010-1633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2939">CVE-2010-2939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3864">CVE-2010-3864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5298">CVE-2010-5298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0014">CVE-2011-0014 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3207/">CVE-2011-3207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3207">CVE-2011-3207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3210">CVE-2011-3210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4108">CVE-2011-4108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4576">CVE-2011-4576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4577">CVE-2011-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4619">CVE-2011-4619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0027/">CVE-2012-0027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0027">CVE-2012-0027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0050">CVE-2012-0050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0884">CVE-2012-0884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1165">CVE-2012-1165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2110">CVE-2012-2110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2686/">CVE-2012-2686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2686">CVE-2012-2686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4929">CVE-2012-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0166">CVE-2013-0166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0169">CVE-2013-0169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4353/">CVE-2013-4353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4353">CVE-2013-4353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6449/">CVE-2013-6449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6449">CVE-2013-6449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6450/">CVE-2013-6450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6450">CVE-2013-6450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0076">CVE-2014-0076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0160">CVE-2014-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0195">CVE-2014-0195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0198">CVE-2014-0198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0221">CVE-2014-0221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0224">CVE-2014-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3470">CVE-2014-3470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3505">CVE-2014-3505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3506">CVE-2014-3506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3507">CVE-2014-3507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3508">CVE-2014-3508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3509/">CVE-2014-3509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3509">CVE-2014-3509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3510">CVE-2014-3510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3511/">CVE-2014-3511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3511">CVE-2014-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3512/">CVE-2014-3512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3512">CVE-2014-3512 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3513">CVE-2014-3513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3567">CVE-2014-3567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3568">CVE-2014-3568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3570">CVE-2014-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3571">CVE-2014-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3572">CVE-2014-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5139/">CVE-2014-5139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5139">CVE-2014-5139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8275">CVE-2014-8275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0205">CVE-2015-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0206">CVE-2015-0206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0209">CVE-2015-0209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0286">CVE-2015-0286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0288">CVE-2015-0288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0289">CVE-2015-0289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0293">CVE-2015-0293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1788">CVE-2015-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1789">CVE-2015-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1790">CVE-2015-1790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1791">CVE-2015-1791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1792">CVE-2015-1792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3194">CVE-2015-3194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3195">CVE-2015-3195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3196">CVE-2015-3196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3197">CVE-2015-3197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3216/">CVE-2015-3216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3216">CVE-2015-3216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0702">CVE-2016-0702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0705">CVE-2016-0705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0797">CVE-2016-0797 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0798">CVE-2016-0798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0799">CVE-2016-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0800">CVE-2016-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2105">CVE-2016-2105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2106">CVE-2016-2106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2107">CVE-2016-2107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2109">CVE-2016-2109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2176/">CVE-2016-2176 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2176">CVE-2016-2176 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2177">CVE-2016-2177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2178">CVE-2016-2178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2179">CVE-2016-2179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2180">CVE-2016-2180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2181">CVE-2016-2181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2182">CVE-2016-2182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6302">CVE-2016-6302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6303">CVE-2016-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6304">CVE-2016-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6306">CVE-2016-6306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7052">CVE-2016-7052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7055/">CVE-2016-7055 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7055">CVE-2016-7055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3731">CVE-2017-3731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3732">CVE-2017-3732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009148318" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148319" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148320" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148322" comment="libopenssl1_0_0-hmac-1.0.2j-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148324" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148321" comment="openssl-1.0.2j-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148323" comment="openssl-doc-1.0.2j-59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147982" version="1" class="patch">
	<metadata>
		<title>libopus0-1.1-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2017-0381" ref_url="https://www.suse.com/security/cve/CVE-2017-0381/" source="CVE"/>
		<description>
These are all security issues fixed in the libopus0-1.1-3.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-0381/">CVE-2017-0381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0381">CVE-2017-0381 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148261" comment="libopus0-1.1-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147983" version="1" class="patch">
	<metadata>
		<title>libotr5-4.0.0-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-2851" ref_url="https://www.suse.com/security/cve/CVE-2016-2851/" source="CVE"/>
		<description>
These are all security issues fixed in the libotr5-4.0.0-9.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2851/">CVE-2016-2851 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2851">CVE-2016-2851 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124478" comment="libotr5-4.0.0-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147984" version="1" class="patch">
	<metadata>
		<title>libpango-1_0-0-1.40.1-9.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0020" ref_url="https://www.suse.com/security/cve/CVE-2011-0020/" source="CVE"/>
		<reference ref_id="CVE-2011-0064" ref_url="https://www.suse.com/security/cve/CVE-2011-0064/" source="CVE"/>
		<description>
These are all security issues fixed in the libpango-1_0-0-1.40.1-9.5 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0020/">CVE-2011-0020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0020">CVE-2011-0020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0064/">CVE-2011-0064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0064">CVE-2011-0064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140897" comment="libpango-1_0-0-1.40.1-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140898" comment="libpango-1_0-0-32bit-1.40.1-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140899" comment="typelib-1_0-Pango-1_0-1.40.1-9.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147985" version="1" class="patch">
	<metadata>
		<title>libpcre1-32bit-8.39-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2327" ref_url="https://www.suse.com/security/cve/CVE-2015-2327/" source="CVE"/>
		<reference ref_id="CVE-2015-2328" ref_url="https://www.suse.com/security/cve/CVE-2015-2328/" source="CVE"/>
		<reference ref_id="CVE-2015-3210" ref_url="https://www.suse.com/security/cve/CVE-2015-3210/" source="CVE"/>
		<reference ref_id="CVE-2015-3217" ref_url="https://www.suse.com/security/cve/CVE-2015-3217/" source="CVE"/>
		<reference ref_id="CVE-2015-5073" ref_url="https://www.suse.com/security/cve/CVE-2015-5073/" source="CVE"/>
		<reference ref_id="CVE-2015-8380" ref_url="https://www.suse.com/security/cve/CVE-2015-8380/" source="CVE"/>
		<reference ref_id="CVE-2016-1283" ref_url="https://www.suse.com/security/cve/CVE-2016-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcre1-32bit-8.39-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8964">CVE-2014-8964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2325">CVE-2015-2325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2327/">CVE-2015-2327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2327">CVE-2015-2327 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2328/">CVE-2015-2328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2328">CVE-2015-2328 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3210/">CVE-2015-3210 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3210">CVE-2015-3210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3217/">CVE-2015-3217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3217">CVE-2015-3217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5073/">CVE-2015-5073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5073">CVE-2015-5073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8380/">CVE-2015-8380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8380">CVE-2015-8380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1283/">CVE-2016-1283 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1283">CVE-2016-1283 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3191">CVE-2016-3191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143034" comment="libpcre1-8.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143035" comment="libpcre1-32bit-8.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143036" comment="libpcre16-0-8.39-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147986" version="1" class="patch">
	<metadata>
		<title>libpcsclite1-1.8.10-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-0407" ref_url="https://www.suse.com/security/cve/CVE-2010-0407/" source="CVE"/>
		<reference ref_id="CVE-2010-4531" ref_url="https://www.suse.com/security/cve/CVE-2010-4531/" source="CVE"/>
		<reference ref_id="CVE-2016-10109" ref_url="https://www.suse.com/security/cve/CVE-2016-10109/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcsclite1-1.8.10-6.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0407/">CVE-2010-0407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0407">CVE-2010-0407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4531/">CVE-2010-4531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4531">CVE-2010-4531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10109/">CVE-2016-10109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10109">CVE-2016-10109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009147770" comment="libpcsclite1-1.8.10-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009147772" comment="pcsc-lite-1.8.10-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147987" version="1" class="patch">
	<metadata>
		<title>libplist3-1.12-19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2017-5209" ref_url="https://www.suse.com/security/cve/CVE-2017-5209/" source="CVE"/>
		<reference ref_id="CVE-2017-5545" ref_url="https://www.suse.com/security/cve/CVE-2017-5545/" source="CVE"/>
		<reference ref_id="CVE-2017-5834" ref_url="https://www.suse.com/security/cve/CVE-2017-5834/" source="CVE"/>
		<reference ref_id="CVE-2017-5835" ref_url="https://www.suse.com/security/cve/CVE-2017-5835/" source="CVE"/>
		<reference ref_id="CVE-2017-5836" ref_url="https://www.suse.com/security/cve/CVE-2017-5836/" source="CVE"/>
		<reference ref_id="CVE-2017-6440" ref_url="https://www.suse.com/security/cve/CVE-2017-6440/" source="CVE"/>
		<reference ref_id="CVE-2017-7982" ref_url="https://www.suse.com/security/cve/CVE-2017-7982/" source="CVE"/>
		<description>
These are all security issues fixed in the libplist3-1.12-19.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5209/">CVE-2017-5209 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5209">CVE-2017-5209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5545/">CVE-2017-5545 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5545">CVE-2017-5545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5834/">CVE-2017-5834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5834">CVE-2017-5834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5835/">CVE-2017-5835 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5835">CVE-2017-5835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5836/">CVE-2017-5836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5836">CVE-2017-5836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6440/">CVE-2017-6440 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6440">CVE-2017-6440 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7982/">CVE-2017-7982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7982">CVE-2017-7982 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155696" comment="libplist3-1.12-19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147988" version="1" class="patch">
	<metadata>
		<title>libpng12-0-1.2.50-19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3045" ref_url="https://www.suse.com/security/cve/CVE-2011-3045/" source="CVE"/>
		<reference ref_id="CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048/" source="CVE"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<reference ref_id="CVE-2013-7353" ref_url="https://www.suse.com/security/cve/CVE-2013-7353/" source="CVE"/>
		<reference ref_id="CVE-2013-7354" ref_url="https://www.suse.com/security/cve/CVE-2013-7354/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng12-0-1.2.50-19.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2501">CVE-2011-2501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3026">CVE-2011-3026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3045/">CVE-2011-3045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3045">CVE-2011-3045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3048">CVE-2011-3048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3386">CVE-2012-3386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7353/">CVE-2013-7353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7353">CVE-2013-7353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7354/">CVE-2013-7354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7354">CVE-2013-7354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7981">CVE-2015-7981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8540">CVE-2015-8540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10087">CVE-2016-10087 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009149999" comment="libpng12-0-1.2.50-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150000" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147989" version="1" class="patch">
	<metadata>
		<title>libpng15-15-1.5.22-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048/" source="CVE"/>
		<reference ref_id="CVE-2011-3328" ref_url="https://www.suse.com/security/cve/CVE-2011-3328/" source="CVE"/>
		<reference ref_id="CVE-2011-3464" ref_url="https://www.suse.com/security/cve/CVE-2011-3464/" source="CVE"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng15-15-1.5.22-9.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2501">CVE-2011-2501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2690">CVE-2011-2690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2691">CVE-2011-2691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2692">CVE-2011-2692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3026">CVE-2011-3026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3048">CVE-2011-3048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3328/">CVE-2011-3328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3328">CVE-2011-3328 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3464/">CVE-2011-3464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3464">CVE-2011-3464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3386">CVE-2012-3386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8540">CVE-2015-8540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10087">CVE-2016-10087 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009150810" comment="libpng15-15-1.5.22-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147990" version="1" class="patch">
	<metadata>
		<title>libpng16-16-1.6.8-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<reference ref_id="CVE-2011-3328" ref_url="https://www.suse.com/security/cve/CVE-2011-3328/" source="CVE"/>
		<reference ref_id="CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954/" source="CVE"/>
		<reference ref_id="CVE-2014-0333" ref_url="https://www.suse.com/security/cve/CVE-2014-0333/" source="CVE"/>
		<reference ref_id="CVE-2014-9495" ref_url="https://www.suse.com/security/cve/CVE-2014-9495/" source="CVE"/>
		<reference ref_id="CVE-2015-0973" ref_url="https://www.suse.com/security/cve/CVE-2015-0973/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng16-16-1.6.8-14.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1205">CVE-2010-1205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2501">CVE-2011-2501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2690">CVE-2011-2690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2691">CVE-2011-2691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2692">CVE-2011-2692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3328/">CVE-2011-3328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3328">CVE-2011-3328 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6954">CVE-2013-6954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0333/">CVE-2014-0333 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0333">CVE-2014-0333 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9495/">CVE-2014-9495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9495">CVE-2014-9495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0973/">CVE-2015-0973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0973">CVE-2015-0973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10087">CVE-2016-10087 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009149948" comment="libpng16-16-1.6.8-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009149949" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147991" version="1" class="patch">
	<metadata>
		<title>libpolkit0-0.113-5.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-0750" ref_url="https://www.suse.com/security/cve/CVE-2010-0750/" source="CVE"/>
		<reference ref_id="CVE-2011-1485" ref_url="https://www.suse.com/security/cve/CVE-2011-1485/" source="CVE"/>
		<reference ref_id="CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288/" source="CVE"/>
		<reference ref_id="CVE-2015-3218" ref_url="https://www.suse.com/security/cve/CVE-2015-3218/" source="CVE"/>
		<reference ref_id="CVE-2015-3255" ref_url="https://www.suse.com/security/cve/CVE-2015-3255/" source="CVE"/>
		<reference ref_id="CVE-2015-3256" ref_url="https://www.suse.com/security/cve/CVE-2015-3256/" source="CVE"/>
		<reference ref_id="CVE-2015-4625" ref_url="https://www.suse.com/security/cve/CVE-2015-4625/" source="CVE"/>
		<description>
These are all security issues fixed in the libpolkit0-0.113-5.6.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0750/">CVE-2010-0750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0750">CVE-2010-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1485/">CVE-2011-1485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1485">CVE-2011-1485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4288">CVE-2013-4288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3218/">CVE-2015-3218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3218">CVE-2015-3218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3255/">CVE-2015-3255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3255">CVE-2015-3255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3256/">CVE-2015-3256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3256">CVE-2015-3256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4625/">CVE-2015-4625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4625">CVE-2015-4625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140902" comment="libpolkit0-0.113-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140903" comment="polkit-0.113-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140904" comment="typelib-1_0-Polkit-1_0-0.113-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147992" version="1" class="patch">
	<metadata>
		<title>libpoppler-glib8-0.43.0-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<reference ref_id="CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187/" source="CVE"/>
		<reference ref_id="CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188/" source="CVE"/>
		<reference ref_id="CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607/" source="CVE"/>
		<reference ref_id="CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608/" source="CVE"/>
		<reference ref_id="CVE-2013-1788" ref_url="https://www.suse.com/security/cve/CVE-2013-1788/" source="CVE"/>
		<reference ref_id="CVE-2013-1789" ref_url="https://www.suse.com/security/cve/CVE-2013-1789/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<reference ref_id="CVE-2013-4473" ref_url="https://www.suse.com/security/cve/CVE-2013-4473/" source="CVE"/>
		<reference ref_id="CVE-2013-4474" ref_url="https://www.suse.com/security/cve/CVE-2013-4474/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-glib8-0.43.0-15.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0799">CVE-2009-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0800">CVE-2009-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1179">CVE-2009-1179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1180">CVE-2009-1180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1181">CVE-2009-1181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1182">CVE-2009-1182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1183">CVE-2009-1183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1187">CVE-2009-1187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1188">CVE-2009-1188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3607">CVE-2009-3607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3608">CVE-2009-3608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1788/">CVE-2013-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1788">CVE-2013-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1789/">CVE-2013-1789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1789">CVE-2013-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1790">CVE-2013-1790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4473/">CVE-2013-4473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4473">CVE-2013-4473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4474/">CVE-2013-4474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4474">CVE-2013-4474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147993" version="1" class="patch">
	<metadata>
		<title>libproxy1-0.4.13-16.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-4504" ref_url="https://www.suse.com/security/cve/CVE-2012-4504/" source="CVE"/>
		<description>
These are all security issues fixed in the libproxy1-0.4.13-16.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4504/">CVE-2012-4504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4504">CVE-2012-4504 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140909" comment="libproxy1-0.4.13-16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140910" comment="libproxy1-32bit-0.4.13-16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140911" comment="libproxy1-config-gnome3-0.4.13-16.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140912" comment="libproxy1-config-gnome3-32bit-0.4.13-16.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140913" comment="libproxy1-networkmanager-0.4.13-16.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140914" comment="libproxy1-pacrunner-webkit-0.4.13-16.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147994" version="1" class="patch">
	<metadata>
		<title>libpulse-mainloop-glib0-32bit-5.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3970" ref_url="https://www.suse.com/security/cve/CVE-2014-3970/" source="CVE"/>
		<description>
These are all security issues fixed in the libpulse-mainloop-glib0-32bit-5.0-4.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3970/">CVE-2014-3970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3970">CVE-2014-3970 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159175" comment="libpulse-mainloop-glib0-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159176" comment="libpulse-mainloop-glib0-32bit-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159177" comment="libpulse0-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159178" comment="libpulse0-32bit-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159179" comment="pulseaudio-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159180" comment="pulseaudio-esound-compat-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159181" comment="pulseaudio-gdm-hooks-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159182" comment="pulseaudio-lang-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159183" comment="pulseaudio-module-x11-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159184" comment="pulseaudio-module-zeroconf-5.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159185" comment="pulseaudio-utils-5.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147995" version="1" class="patch">
	<metadata>
		<title>libpython2_7-1_0-2.7.13-27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1521" ref_url="https://www.suse.com/security/cve/CVE-2011-1521/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-1753" ref_url="https://www.suse.com/security/cve/CVE-2013-1753/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython2_7-1_0-2.7.13-27.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1521/">CVE-2011-1521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1521">CVE-2011-1521 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4944">CVE-2011-4944 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0845">CVE-2012-0845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1150">CVE-2012-1150 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1752">CVE-2013-1752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1753/">CVE-2013-1753 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1753">CVE-2013-1753 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1912">CVE-2014-1912 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7185">CVE-2014-7185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0772">CVE-2016-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000110">CVE-2016-1000110 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5636">CVE-2016-5636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5699">CVE-2016-5699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159186" comment="libpython2_7-1_0-2.7.13-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159187" comment="libpython2_7-1_0-32bit-2.7.13-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159188" comment="python-base-2.7.13-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159189" comment="python-base-32bit-2.7.13-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159190" comment="python-xml-2.7.13-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147996" version="1" class="patch">
	<metadata>
		<title>libpython3_4m1_0-3.4.6-24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-2667" ref_url="https://www.suse.com/security/cve/CVE-2014-2667/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython3_4m1_0-3.4.6-24.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4944">CVE-2011-4944 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0845">CVE-2012-0845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1150">CVE-2012-1150 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1752">CVE-2013-1752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-2667/">CVE-2014-2667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2667">CVE-2014-2667 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0772">CVE-2016-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000110">CVE-2016-1000110 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5636">CVE-2016-5636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5699">CVE-2016-5699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159191" comment="libpython3_4m1_0-3.4.6-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159192" comment="python3-base-3.4.6-24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147997" version="1" class="patch">
	<metadata>
		<title>libqt4-32bit-4.8.6-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0945" ref_url="https://www.suse.com/security/cve/CVE-2009-0945/" source="CVE"/>
		<reference ref_id="CVE-2011-3193" ref_url="https://www.suse.com/security/cve/CVE-2011-3193/" source="CVE"/>
		<reference ref_id="CVE-2011-3922" ref_url="https://www.suse.com/security/cve/CVE-2011-3922/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2012-6093" ref_url="https://www.suse.com/security/cve/CVE-2012-6093/" source="CVE"/>
		<reference ref_id="CVE-2013-0254" ref_url="https://www.suse.com/security/cve/CVE-2013-0254/" source="CVE"/>
		<reference ref_id="CVE-2013-4549" ref_url="https://www.suse.com/security/cve/CVE-2013-4549/" source="CVE"/>
		<reference ref_id="CVE-2014-0190" ref_url="https://www.suse.com/security/cve/CVE-2014-0190/" source="CVE"/>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<description>
These are all security issues fixed in the libqt4-32bit-4.8.6-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0945/">CVE-2009-0945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0945">CVE-2009-0945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3193/">CVE-2011-3193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3193">CVE-2011-3193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3922/">CVE-2011-3922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3922">CVE-2011-3922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4929">CVE-2012-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6093/">CVE-2012-6093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6093">CVE-2012-6093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0254/">CVE-2013-0254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0254">CVE-2013-0254 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4549/">CVE-2013-4549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4549">CVE-2013-4549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0190/">CVE-2014-0190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0190">CVE-2014-0190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0295">CVE-2015-0295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1858">CVE-2015-1858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1859">CVE-2015-1859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1860">CVE-2015-1860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125290" comment="qt4-x11-tools-4.8.6-7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147998" version="1" class="patch">
	<metadata>
		<title>libquicktime0-1.2.4-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-2399" ref_url="https://www.suse.com/security/cve/CVE-2016-2399/" source="CVE"/>
		<description>
These are all security issues fixed in the libquicktime0-1.2.4-10.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2399/">CVE-2016-2399 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2399">CVE-2016-2399 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009149137" comment="libquicktime0-1.2.4-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147999" version="1" class="patch">
	<metadata>
		<title>libraptor2-0-2.0.10-3.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-0037" ref_url="https://www.suse.com/security/cve/CVE-2012-0037/" source="CVE"/>
		<description>
These are all security issues fixed in the libraptor2-0-2.0.10-3.63 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0037/">CVE-2012-0037 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0037">CVE-2012-0037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140928" comment="libraptor2-0-2.0.10-3.67 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148000" version="1" class="patch">
	<metadata>
		<title>libruby2_1-2_1-2.1.9-18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4975" ref_url="https://www.suse.com/security/cve/CVE-2014-4975/" source="CVE"/>
		<reference ref_id="CVE-2014-8080" ref_url="https://www.suse.com/security/cve/CVE-2014-8080/" source="CVE"/>
		<reference ref_id="CVE-2014-8090" ref_url="https://www.suse.com/security/cve/CVE-2014-8090/" source="CVE"/>
		<reference ref_id="CVE-2015-1855" ref_url="https://www.suse.com/security/cve/CVE-2015-1855/" source="CVE"/>
		<reference ref_id="CVE-2015-3900" ref_url="https://www.suse.com/security/cve/CVE-2015-3900/" source="CVE"/>
		<reference ref_id="CVE-2015-7551" ref_url="https://www.suse.com/security/cve/CVE-2015-7551/" source="CVE"/>
		<reference ref_id="CVE-2016-2339" ref_url="https://www.suse.com/security/cve/CVE-2016-2339/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby2_1-2_1-2.1.9-18.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4975/">CVE-2014-4975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4975">CVE-2014-4975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8080/">CVE-2014-8080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8080">CVE-2014-8080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8090/">CVE-2014-8090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8090">CVE-2014-8090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1855/">CVE-2015-1855 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1855">CVE-2015-1855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3900/">CVE-2015-3900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3900">CVE-2015-3900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7551/">CVE-2015-7551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7551">CVE-2015-7551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2339/">CVE-2016-2339 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2339">CVE-2016-2339 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159193" comment="libruby2_1-2_1-2.1.9-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159194" comment="ruby2.1-2.1.9-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159195" comment="ruby2.1-stdlib-2.1.9-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148001" version="1" class="patch">
	<metadata>
		<title>libsmi-0.4.8-18.55 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2891" ref_url="https://www.suse.com/security/cve/CVE-2010-2891/" source="CVE"/>
		<description>
These are all security issues fixed in the libsmi-0.4.8-18.55 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2891/">CVE-2010-2891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2891">CVE-2010-2891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140932" comment="libsmi-0.4.8-18.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140933" comment="libsmi2-0.4.8-18.63 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148002" version="1" class="patch">
	<metadata>
		<title>libsndfile1-1.0.25-35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186/" source="CVE"/>
		<reference ref_id="CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696/" source="CVE"/>
		<reference ref_id="CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496/" source="CVE"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<reference ref_id="CVE-2015-8075" ref_url="https://www.suse.com/security/cve/CVE-2015-8075/" source="CVE"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7586" ref_url="https://www.suse.com/security/cve/CVE-2017-7586/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<reference ref_id="CVE-2017-8361" ref_url="https://www.suse.com/security/cve/CVE-2017-8361/" source="CVE"/>
		<reference ref_id="CVE-2017-8362" ref_url="https://www.suse.com/security/cve/CVE-2017-8362/" source="CVE"/>
		<reference ref_id="CVE-2017-8363" ref_url="https://www.suse.com/security/cve/CVE-2017-8363/" source="CVE"/>
		<reference ref_id="CVE-2017-8365" ref_url="https://www.suse.com/security/cve/CVE-2017-8365/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile1-1.0.25-35.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0186">CVE-2009-0186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2696">CVE-2011-2696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9496">CVE-2014-9496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9756">CVE-2014-9756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7805">CVE-2015-7805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8075/">CVE-2015-8075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8075">CVE-2015-8075 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7585">CVE-2017-7585 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7586/">CVE-2017-7586 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7586">CVE-2017-7586 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7741">CVE-2017-7741 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7742">CVE-2017-7742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8361/">CVE-2017-8361 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8361">CVE-2017-8361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8362/">CVE-2017-8362 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8362">CVE-2017-8362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8363/">CVE-2017-8363 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8363">CVE-2017-8363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8365/">CVE-2017-8365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8365">CVE-2017-8365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155684" comment="libsndfile1-1.0.25-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155685" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148003" version="1" class="patch">
	<metadata>
		<title>libsnmp30-32bit-5.7.3-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2141" ref_url="https://www.suse.com/security/cve/CVE-2012-2141/" source="CVE"/>
		<reference ref_id="CVE-2014-2284" ref_url="https://www.suse.com/security/cve/CVE-2014-2284/" source="CVE"/>
		<reference ref_id="CVE-2014-2285" ref_url="https://www.suse.com/security/cve/CVE-2014-2285/" source="CVE"/>
		<reference ref_id="CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565/" source="CVE"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp30-32bit-5.7.3-4.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2141/">CVE-2012-2141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2141">CVE-2012-2141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2284/">CVE-2014-2284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2284">CVE-2014-2284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2285/">CVE-2014-2285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2285">CVE-2014-2285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3565">CVE-2014-3565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5621">CVE-2015-5621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140934" comment="libsnmp30-5.7.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140935" comment="libsnmp30-32bit-5.7.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140936" comment="net-snmp-5.7.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140937" comment="perl-SNMP-5.7.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140938" comment="snmp-mibs-5.7.3-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148004" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.54.1-4.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2054" ref_url="https://www.suse.com/security/cve/CVE-2011-2054/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.54.1-4.5 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2054/">CVE-2011-2054 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2054">CVE-2011-2054 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140939" comment="libsoup-2_4-1-2.54.1-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140940" comment="libsoup-2_4-1-32bit-2.54.1-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140941" comment="libsoup-lang-2.54.1-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140942" comment="typelib-1_0-Soup-2_4-2.54.1-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148005" version="1" class="patch">
	<metadata>
		<title>libspice-client-glib-2_0-8-0.33-1.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-4425" ref_url="https://www.suse.com/security/cve/CVE-2012-4425/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-client-glib-2_0-8-0.33-1.33 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4425/">CVE-2012-4425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4425">CVE-2012-4425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159196" comment="libspice-client-glib-2_0-8-0.33-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159197" comment="libspice-client-glib-helper-0.33-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159198" comment="libspice-client-gtk-3_0-5-0.33-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159199" comment="libspice-controller0-0.33-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159200" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159201" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-1.33 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148006" version="1" class="patch">
	<metadata>
		<title>libspice-server1-0.12.8-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-4282" ref_url="https://www.suse.com/security/cve/CVE-2013-4282/" source="CVE"/>
		<reference ref_id="CVE-2015-3247" ref_url="https://www.suse.com/security/cve/CVE-2015-3247/" source="CVE"/>
		<reference ref_id="CVE-2015-5260" ref_url="https://www.suse.com/security/cve/CVE-2015-5260/" source="CVE"/>
		<reference ref_id="CVE-2015-5261" ref_url="https://www.suse.com/security/cve/CVE-2015-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-0749" ref_url="https://www.suse.com/security/cve/CVE-2016-0749/" source="CVE"/>
		<reference ref_id="CVE-2016-2150" ref_url="https://www.suse.com/security/cve/CVE-2016-2150/" source="CVE"/>
		<reference ref_id="CVE-2016-9577" ref_url="https://www.suse.com/security/cve/CVE-2016-9577/" source="CVE"/>
		<reference ref_id="CVE-2016-9578" ref_url="https://www.suse.com/security/cve/CVE-2016-9578/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-server1-0.12.8-1.17 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2013-4282/">CVE-2013-4282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4282">CVE-2013-4282 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3247/">CVE-2015-3247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3247">CVE-2015-3247 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5260/">CVE-2015-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5260">CVE-2015-5260 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-5261/">CVE-2015-5261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5261">CVE-2015-5261 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0749/">CVE-2016-0749 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0749">CVE-2016-0749 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2150/">CVE-2016-2150 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2150">CVE-2016-2150 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9577/">CVE-2016-9577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9577">CVE-2016-9577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9578/">CVE-2016-9578 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9578">CVE-2016-9578 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159202" comment="libspice-server1-0.12.8-1.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148007" version="1" class="patch">
	<metadata>
		<title>libsqlite3-0-3.8.10.2-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-6153" ref_url="https://www.suse.com/security/cve/CVE-2016-6153/" source="CVE"/>
		<description>
These are all security issues fixed in the libsqlite3-0-3.8.10.2-8.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6153/">CVE-2016-6153 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6153">CVE-2016-6153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159203" comment="libsqlite3-0-3.8.10.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159204" comment="libsqlite3-0-32bit-3.8.10.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159205" comment="sqlite3-3.8.10.2-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148008" version="1" class="patch">
	<metadata>
		<title>libsrtp1-1.5.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2139" ref_url="https://www.suse.com/security/cve/CVE-2013-2139/" source="CVE"/>
		<description>
These are all security issues fixed in the libsrtp1-1.5.2-2.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2139/">CVE-2013-2139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2139">CVE-2013-2139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140951" comment="libsrtp1-1.5.2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148009" version="1" class="patch">
	<metadata>
		<title>libssh2-1-1.4.3-19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782/" source="CVE"/>
		<reference ref_id="CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh2-1-1.4.3-19.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1782">CVE-2015-1782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0787">CVE-2016-0787 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140952" comment="libssh2-1-1.4.3-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140953" comment="libssh2-1-32bit-1.4.3-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148010" version="1" class="patch">
	<metadata>
		<title>libsystemd0-228-142.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-1174" ref_url="https://www.suse.com/security/cve/CVE-2012-1174/" source="CVE"/>
		<reference ref_id="CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288/" source="CVE"/>
		<reference ref_id="CVE-2016-10156" ref_url="https://www.suse.com/security/cve/CVE-2016-10156/" source="CVE"/>
		<reference ref_id="CVE-2016-7795" ref_url="https://www.suse.com/security/cve/CVE-2016-7795/" source="CVE"/>
		<description>
These are all security issues fixed in the libsystemd0-228-142.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1174/">CVE-2012-1174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1174">CVE-2012-1174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4288">CVE-2013-4288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10156/">CVE-2016-10156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10156">CVE-2016-10156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7795/">CVE-2016-7795 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7795">CVE-2016-7795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159206" comment="libsystemd0-228-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159207" comment="libsystemd0-32bit-228-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159208" comment="libudev1-228-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159209" comment="libudev1-32bit-228-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159210" comment="systemd-228-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159211" comment="systemd-32bit-228-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159212" comment="systemd-bash-completion-228-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159213" comment="systemd-sysvinit-228-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159214" comment="udev-228-142.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148011" version="1" class="patch">
	<metadata>
		<title>libtag1-1.9.1-1.218 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2396" ref_url="https://www.suse.com/security/cve/CVE-2012-2396/" source="CVE"/>
		<description>
These are all security issues fixed in the libtag1-1.9.1-1.218 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2396/">CVE-2012-2396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2396">CVE-2012-2396 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140963" comment="libtag1-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140964" comment="libtag_c0-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140965" comment="taglib-1.9.1-1.265 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148012" version="1" class="patch">
	<metadata>
		<title>libtasn1-4.9-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467/" source="CVE"/>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-4008" ref_url="https://www.suse.com/security/cve/CVE-2016-4008/" source="CVE"/>
		<description>
These are all security issues fixed in the libtasn1-4.9-1.7 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3467">CVE-2014-3467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3468">CVE-2014-3468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3469">CVE-2014-3469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2806">CVE-2015-2806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3622">CVE-2015-3622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4008/">CVE-2016-4008 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4008">CVE-2016-4008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159215" comment="libtasn1-4.9-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159216" comment="libtasn1-6-4.9-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159217" comment="libtasn1-6-32bit-4.9-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148013" version="1" class="patch">
	<metadata>
		<title>libtcnative-1-0-1.1.34-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>
These are all security issues fixed in the libtcnative-1-0-1.1.34-12.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009135881" comment="libtcnative-1-0-1.1.34-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148014" version="1" class="patch">
	<metadata>
		<title>libthai-data-0.1.25-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-4012" ref_url="https://www.suse.com/security/cve/CVE-2009-4012/" source="CVE"/>
		<description>
These are all security issues fixed in the libthai-data-0.1.25-4.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4012/">CVE-2009-4012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4012">CVE-2009-4012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140966" comment="libthai-data-0.1.25-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140967" comment="libthai0-0.1.25-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140968" comment="libthai0-32bit-0.1.25-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148015" version="1" class="patch">
	<metadata>
		<title>libtiff5-32bit-4.0.7-43.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285/" source="CVE"/>
		<reference ref_id="CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347/" source="CVE"/>
		<reference ref_id="CVE-2010-2065" ref_url="https://www.suse.com/security/cve/CVE-2010-2065/" source="CVE"/>
		<reference ref_id="CVE-2010-2067" ref_url="https://www.suse.com/security/cve/CVE-2010-2067/" source="CVE"/>
		<reference ref_id="CVE-2010-2233" ref_url="https://www.suse.com/security/cve/CVE-2010-2233/" source="CVE"/>
		<reference ref_id="CVE-2010-4665" ref_url="https://www.suse.com/security/cve/CVE-2010-4665/" source="CVE"/>
		<reference ref_id="CVE-2011-0192" ref_url="https://www.suse.com/security/cve/CVE-2011-0192/" source="CVE"/>
		<reference ref_id="CVE-2011-1167" ref_url="https://www.suse.com/security/cve/CVE-2011-1167/" source="CVE"/>
		<reference ref_id="CVE-2012-1173" ref_url="https://www.suse.com/security/cve/CVE-2012-1173/" source="CVE"/>
		<reference ref_id="CVE-2012-2113" ref_url="https://www.suse.com/security/cve/CVE-2012-2113/" source="CVE"/>
		<reference ref_id="CVE-2012-3401" ref_url="https://www.suse.com/security/cve/CVE-2012-3401/" source="CVE"/>
		<reference ref_id="CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564/" source="CVE"/>
		<reference ref_id="CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960/" source="CVE"/>
		<reference ref_id="CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961/" source="CVE"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="CVE-2015-1547" ref_url="https://www.suse.com/security/cve/CVE-2015-1547/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2015-8665" ref_url="https://www.suse.com/security/cve/CVE-2015-8665/" source="CVE"/>
		<reference ref_id="CVE-2015-8683" ref_url="https://www.suse.com/security/cve/CVE-2015-8683/" source="CVE"/>
		<reference ref_id="CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781/" source="CVE"/>
		<reference ref_id="CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782/" source="CVE"/>
		<reference ref_id="CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783/" source="CVE"/>
		<reference ref_id="CVE-2016-10266" ref_url="https://www.suse.com/security/cve/CVE-2016-10266/" source="CVE"/>
		<reference ref_id="CVE-2016-10267" ref_url="https://www.suse.com/security/cve/CVE-2016-10267/" source="CVE"/>
		<reference ref_id="CVE-2016-10268" ref_url="https://www.suse.com/security/cve/CVE-2016-10268/" source="CVE"/>
		<reference ref_id="CVE-2016-10269" ref_url="https://www.suse.com/security/cve/CVE-2016-10269/" source="CVE"/>
		<reference ref_id="CVE-2016-10270" ref_url="https://www.suse.com/security/cve/CVE-2016-10270/" source="CVE"/>
		<reference ref_id="CVE-2016-10271" ref_url="https://www.suse.com/security/cve/CVE-2016-10271/" source="CVE"/>
		<reference ref_id="CVE-2016-10272" ref_url="https://www.suse.com/security/cve/CVE-2016-10272/" source="CVE"/>
		<reference ref_id="CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186/" source="CVE"/>
		<reference ref_id="CVE-2016-3622" ref_url="https://www.suse.com/security/cve/CVE-2016-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-3623" ref_url="https://www.suse.com/security/cve/CVE-2016-3623/" source="CVE"/>
		<reference ref_id="CVE-2016-3658" ref_url="https://www.suse.com/security/cve/CVE-2016-3658/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-3990" ref_url="https://www.suse.com/security/cve/CVE-2016-3990/" source="CVE"/>
		<reference ref_id="CVE-2016-3991" ref_url="https://www.suse.com/security/cve/CVE-2016-3991/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5316" ref_url="https://www.suse.com/security/cve/CVE-2016-5316/" source="CVE"/>
		<reference ref_id="CVE-2016-5317" ref_url="https://www.suse.com/security/cve/CVE-2016-5317/" source="CVE"/>
		<reference ref_id="CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320/" source="CVE"/>
		<reference ref_id="CVE-2016-5321" ref_url="https://www.suse.com/security/cve/CVE-2016-5321/" source="CVE"/>
		<reference ref_id="CVE-2016-5323" ref_url="https://www.suse.com/security/cve/CVE-2016-5323/" source="CVE"/>
		<reference ref_id="CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652/" source="CVE"/>
		<reference ref_id="CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875/" source="CVE"/>
		<reference ref_id="CVE-2016-9273" ref_url="https://www.suse.com/security/cve/CVE-2016-9273/" source="CVE"/>
		<reference ref_id="CVE-2016-9297" ref_url="https://www.suse.com/security/cve/CVE-2016-9297/" source="CVE"/>
		<reference ref_id="CVE-2016-9448" ref_url="https://www.suse.com/security/cve/CVE-2016-9448/" source="CVE"/>
		<reference ref_id="CVE-2016-9453" ref_url="https://www.suse.com/security/cve/CVE-2016-9453/" source="CVE"/>
		<reference ref_id="CVE-2017-5225" ref_url="https://www.suse.com/security/cve/CVE-2017-5225/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff5-32bit-4.0.7-43.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2285">CVE-2009-2285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2347">CVE-2009-2347 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2065/">CVE-2010-2065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2065">CVE-2010-2065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2067/">CVE-2010-2067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2067">CVE-2010-2067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2233/">CVE-2010-2233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2233">CVE-2010-2233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4665/">CVE-2010-4665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4665">CVE-2010-4665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0192/">CVE-2011-0192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0192">CVE-2011-0192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1167/">CVE-2011-1167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1167">CVE-2011-1167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1173/">CVE-2012-1173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1173">CVE-2012-1173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2113/">CVE-2012-2113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2113">CVE-2012-2113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3401/">CVE-2012-3401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3401">CVE-2012-3401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4564">CVE-2012-4564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1960">CVE-2013-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1961">CVE-2013-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4231">CVE-2013-4231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4232">CVE-2013-4232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4243">CVE-2013-4243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4244">CVE-2013-4244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8127">CVE-2014-8127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8128">CVE-2014-8128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8129">CVE-2014-8129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8130">CVE-2014-8130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9655">CVE-2014-9655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1547/">CVE-2015-1547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1547">CVE-2015-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7554">CVE-2015-7554 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8665/">CVE-2015-8665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8665">CVE-2015-8665 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8683/">CVE-2015-8683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8683">CVE-2015-8683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8781">CVE-2015-8781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8782">CVE-2015-8782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8783">CVE-2015-8783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10266/">CVE-2016-10266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10266">CVE-2016-10266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10267/">CVE-2016-10267 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10267">CVE-2016-10267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10268/">CVE-2016-10268 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10268">CVE-2016-10268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10269/">CVE-2016-10269 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10269">CVE-2016-10269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10270/">CVE-2016-10270 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10270">CVE-2016-10270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10271/">CVE-2016-10271 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10271">CVE-2016-10271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10272/">CVE-2016-10272 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10272">CVE-2016-10272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3186">CVE-2016-3186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3622/">CVE-2016-3622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3622">CVE-2016-3622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3623/">CVE-2016-3623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3623">CVE-2016-3623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3658/">CVE-2016-3658 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3658">CVE-2016-3658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3945">CVE-2016-3945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3990/">CVE-2016-3990 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3990">CVE-2016-3990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3991/">CVE-2016-3991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3991">CVE-2016-3991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5314">CVE-2016-5314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5316/">CVE-2016-5316 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5316">CVE-2016-5316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5317/">CVE-2016-5317 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5317">CVE-2016-5317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-5320">CVE-2016-5320 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5321/">CVE-2016-5321 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5321">CVE-2016-5321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5323/">CVE-2016-5323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5323">CVE-2016-5323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5652">CVE-2016-5652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-5875">CVE-2016-5875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9273/">CVE-2016-9273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9273">CVE-2016-9273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9297/">CVE-2016-9297 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9297">CVE-2016-9297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9448/">CVE-2016-9448 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9448">CVE-2016-9448 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9453/">CVE-2016-9453 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9453">CVE-2016-9453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5225/">CVE-2017-5225 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5225">CVE-2017-5225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154403" comment="libtiff5-4.0.7-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154404" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154405" comment="tiff-4.0.7-43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148016" version="1" class="patch">
	<metadata>
		<title>libtirpc-netconfig-1.0.1-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<description>
These are all security issues fixed in the libtirpc-netconfig-1.0.1-16.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8779">CVE-2017-8779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155553" comment="libtirpc-netconfig-1.0.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155554" comment="libtirpc3-1.0.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155555" comment="libtirpc3-32bit-1.0.1-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148017" version="1" class="patch">
	<metadata>
		<title>libudisks2-0-2.1.3-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-0004" ref_url="https://www.suse.com/security/cve/CVE-2014-0004/" source="CVE"/>
		<description>
These are all security issues fixed in the libudisks2-0-2.1.3-1.13 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0004/">CVE-2014-0004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0004">CVE-2014-0004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140969" comment="libudisks2-0-2.1.3-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140970" comment="udisks2-2.1.3-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140971" comment="udisks2-lang-2.1.3-1.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148018" version="1" class="patch">
	<metadata>
		<title>libupsclient1-2.7.1-4.55 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2944" ref_url="https://www.suse.com/security/cve/CVE-2012-2944/" source="CVE"/>
		<description>
These are all security issues fixed in the libupsclient1-2.7.1-4.55 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2944/">CVE-2012-2944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2944">CVE-2012-2944 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140972" comment="libupsclient1-2.7.1-4.84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140973" comment="nut-2.7.1-4.84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140974" comment="nut-drivers-net-2.7.1-4.84 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148019" version="1" class="patch">
	<metadata>
		<title>libusbmuxd4-1.0.10-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-5104" ref_url="https://www.suse.com/security/cve/CVE-2016-5104/" source="CVE"/>
		<description>
These are all security issues fixed in the libusbmuxd4-1.0.10-2.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5104/">CVE-2016-5104 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5104">CVE-2016-5104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140975" comment="libusbmuxd4-1.0.10-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148020" version="1" class="patch">
	<metadata>
		<title>libvdpau1-1.1.1-6.73 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-5198" ref_url="https://www.suse.com/security/cve/CVE-2015-5198/" source="CVE"/>
		<reference ref_id="CVE-2015-5199" ref_url="https://www.suse.com/security/cve/CVE-2015-5199/" source="CVE"/>
		<reference ref_id="CVE-2015-5200" ref_url="https://www.suse.com/security/cve/CVE-2015-5200/" source="CVE"/>
		<description>
These are all security issues fixed in the libvdpau1-1.1.1-6.73 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5198/">CVE-2015-5198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5198">CVE-2015-5198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5199/">CVE-2015-5199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5199">CVE-2015-5199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5200/">CVE-2015-5200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5200">CVE-2015-5200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140976" comment="libvdpau1-1.1.1-6.73 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148021" version="1" class="patch">
	<metadata>
		<title>libvirglrenderer0-0.5.0-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-10163" ref_url="https://www.suse.com/security/cve/CVE-2016-10163/" source="CVE"/>
		<reference ref_id="CVE-2016-10214" ref_url="https://www.suse.com/security/cve/CVE-2016-10214/" source="CVE"/>
		<reference ref_id="CVE-2017-5580" ref_url="https://www.suse.com/security/cve/CVE-2017-5580/" source="CVE"/>
		<reference ref_id="CVE-2017-5937" ref_url="https://www.suse.com/security/cve/CVE-2017-5937/" source="CVE"/>
		<reference ref_id="CVE-2017-5956" ref_url="https://www.suse.com/security/cve/CVE-2017-5956/" source="CVE"/>
		<reference ref_id="CVE-2017-5957" ref_url="https://www.suse.com/security/cve/CVE-2017-5957/" source="CVE"/>
		<reference ref_id="CVE-2017-5993" ref_url="https://www.suse.com/security/cve/CVE-2017-5993/" source="CVE"/>
		<reference ref_id="CVE-2017-5994" ref_url="https://www.suse.com/security/cve/CVE-2017-5994/" source="CVE"/>
		<reference ref_id="CVE-2017-6209" ref_url="https://www.suse.com/security/cve/CVE-2017-6209/" source="CVE"/>
		<reference ref_id="CVE-2017-6210" ref_url="https://www.suse.com/security/cve/CVE-2017-6210/" source="CVE"/>
		<reference ref_id="CVE-2017-6317" ref_url="https://www.suse.com/security/cve/CVE-2017-6317/" source="CVE"/>
		<reference ref_id="CVE-2017-6355" ref_url="https://www.suse.com/security/cve/CVE-2017-6355/" source="CVE"/>
		<reference ref_id="CVE-2017-6386" ref_url="https://www.suse.com/security/cve/CVE-2017-6386/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirglrenderer0-0.5.0-11.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10163/">CVE-2016-10163 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10163">CVE-2016-10163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10214/">CVE-2016-10214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10214">CVE-2016-10214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5580/">CVE-2017-5580 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5580">CVE-2017-5580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5937/">CVE-2017-5937 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5937">CVE-2017-5937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5956/">CVE-2017-5956 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5956">CVE-2017-5956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5957/">CVE-2017-5957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5957">CVE-2017-5957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5993/">CVE-2017-5993 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5993">CVE-2017-5993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5994/">CVE-2017-5994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5994">CVE-2017-5994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6209/">CVE-2017-6209 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6209">CVE-2017-6209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6210/">CVE-2017-6210 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6210">CVE-2017-6210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6317/">CVE-2017-6317 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6317">CVE-2017-6317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6355/">CVE-2017-6355 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6355">CVE-2017-6355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6386/">CVE-2017-6386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6386">CVE-2017-6386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009149816" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148022" version="1" class="patch">
	<metadata>
		<title>libvirt-3.3.0-4.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2242" ref_url="https://www.suse.com/security/cve/CVE-2010-2242/" source="CVE"/>
		<reference ref_id="CVE-2011-1146" ref_url="https://www.suse.com/security/cve/CVE-2011-1146/" source="CVE"/>
		<reference ref_id="CVE-2011-2511" ref_url="https://www.suse.com/security/cve/CVE-2011-2511/" source="CVE"/>
		<reference ref_id="CVE-2011-4600" ref_url="https://www.suse.com/security/cve/CVE-2011-4600/" source="CVE"/>
		<reference ref_id="CVE-2012-3445" ref_url="https://www.suse.com/security/cve/CVE-2012-3445/" source="CVE"/>
		<reference ref_id="CVE-2013-0170" ref_url="https://www.suse.com/security/cve/CVE-2013-0170/" source="CVE"/>
		<reference ref_id="CVE-2013-1962" ref_url="https://www.suse.com/security/cve/CVE-2013-1962/" source="CVE"/>
		<reference ref_id="CVE-2013-2218" ref_url="https://www.suse.com/security/cve/CVE-2013-2218/" source="CVE"/>
		<reference ref_id="CVE-2013-2230" ref_url="https://www.suse.com/security/cve/CVE-2013-2230/" source="CVE"/>
		<reference ref_id="CVE-2013-4153" ref_url="https://www.suse.com/security/cve/CVE-2013-4153/" source="CVE"/>
		<reference ref_id="CVE-2013-4154" ref_url="https://www.suse.com/security/cve/CVE-2013-4154/" source="CVE"/>
		<reference ref_id="CVE-2013-4239" ref_url="https://www.suse.com/security/cve/CVE-2013-4239/" source="CVE"/>
		<reference ref_id="CVE-2013-4296" ref_url="https://www.suse.com/security/cve/CVE-2013-4296/" source="CVE"/>
		<reference ref_id="CVE-2013-4297" ref_url="https://www.suse.com/security/cve/CVE-2013-4297/" source="CVE"/>
		<reference ref_id="CVE-2013-4311" ref_url="https://www.suse.com/security/cve/CVE-2013-4311/" source="CVE"/>
		<reference ref_id="CVE-2013-4399" ref_url="https://www.suse.com/security/cve/CVE-2013-4399/" source="CVE"/>
		<reference ref_id="CVE-2013-4400" ref_url="https://www.suse.com/security/cve/CVE-2013-4400/" source="CVE"/>
		<reference ref_id="CVE-2013-4401" ref_url="https://www.suse.com/security/cve/CVE-2013-4401/" source="CVE"/>
		<reference ref_id="CVE-2013-6436" ref_url="https://www.suse.com/security/cve/CVE-2013-6436/" source="CVE"/>
		<reference ref_id="CVE-2013-6456" ref_url="https://www.suse.com/security/cve/CVE-2013-6456/" source="CVE"/>
		<reference ref_id="CVE-2013-6457" ref_url="https://www.suse.com/security/cve/CVE-2013-6457/" source="CVE"/>
		<reference ref_id="CVE-2013-6458" ref_url="https://www.suse.com/security/cve/CVE-2013-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-0028" ref_url="https://www.suse.com/security/cve/CVE-2014-0028/" source="CVE"/>
		<reference ref_id="CVE-2014-0179" ref_url="https://www.suse.com/security/cve/CVE-2014-0179/" source="CVE"/>
		<reference ref_id="CVE-2014-1447" ref_url="https://www.suse.com/security/cve/CVE-2014-1447/" source="CVE"/>
		<reference ref_id="CVE-2014-3633" ref_url="https://www.suse.com/security/cve/CVE-2014-3633/" source="CVE"/>
		<reference ref_id="CVE-2014-3657" ref_url="https://www.suse.com/security/cve/CVE-2014-3657/" source="CVE"/>
		<reference ref_id="CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823/" source="CVE"/>
		<reference ref_id="CVE-2014-8131" ref_url="https://www.suse.com/security/cve/CVE-2014-8131/" source="CVE"/>
		<reference ref_id="CVE-2015-0236" ref_url="https://www.suse.com/security/cve/CVE-2015-0236/" source="CVE"/>
		<reference ref_id="CVE-2015-5247" ref_url="https://www.suse.com/security/cve/CVE-2015-5247/" source="CVE"/>
		<reference ref_id="CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313/" source="CVE"/>
		<reference ref_id="CVE-2017-2635" ref_url="https://www.suse.com/security/cve/CVE-2017-2635/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-3.3.0-4.28 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2242/">CVE-2010-2242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2242">CVE-2010-2242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1146/">CVE-2011-1146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1146">CVE-2011-1146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2511/">CVE-2011-2511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2511">CVE-2011-2511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4600/">CVE-2011-4600 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2011-4600">CVE-2011-4600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3445/">CVE-2012-3445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3445">CVE-2012-3445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0170/">CVE-2013-0170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0170">CVE-2013-0170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1962/">CVE-2013-1962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1962">CVE-2013-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2218/">CVE-2013-2218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2218">CVE-2013-2218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2230/">CVE-2013-2230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2230">CVE-2013-2230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4153/">CVE-2013-4153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4153">CVE-2013-4153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4154/">CVE-2013-4154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4154">CVE-2013-4154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4239/">CVE-2013-4239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4239">CVE-2013-4239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4296/">CVE-2013-4296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4296">CVE-2013-4296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4297/">CVE-2013-4297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4297">CVE-2013-4297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4311/">CVE-2013-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4311">CVE-2013-4311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4399/">CVE-2013-4399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4399">CVE-2013-4399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4400/">CVE-2013-4400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4400">CVE-2013-4400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4401/">CVE-2013-4401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4401">CVE-2013-4401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6436/">CVE-2013-6436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6436">CVE-2013-6436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6456/">CVE-2013-6456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6456">CVE-2013-6456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6457/">CVE-2013-6457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6457">CVE-2013-6457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6458/">CVE-2013-6458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6458">CVE-2013-6458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0028/">CVE-2014-0028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0028">CVE-2014-0028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0179/">CVE-2014-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0179">CVE-2014-0179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1447/">CVE-2014-1447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1447">CVE-2014-1447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3633/">CVE-2014-3633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3633">CVE-2014-3633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3657/">CVE-2014-3657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3657">CVE-2014-3657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7823">CVE-2014-7823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8131/">CVE-2014-8131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8131">CVE-2014-8131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0236/">CVE-2015-0236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0236">CVE-2015-0236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5247/">CVE-2015-5247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5247">CVE-2015-5247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5313">CVE-2015-5313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2635/">CVE-2017-2635 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2635">CVE-2017-2635 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159218" comment="libvirt-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159219" comment="libvirt-admin-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159220" comment="libvirt-client-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159221" comment="libvirt-daemon-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159222" comment="libvirt-daemon-config-network-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159223" comment="libvirt-daemon-config-nwfilter-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159224" comment="libvirt-daemon-driver-interface-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159225" comment="libvirt-daemon-driver-libxl-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159226" comment="libvirt-daemon-driver-lxc-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159227" comment="libvirt-daemon-driver-network-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159228" comment="libvirt-daemon-driver-nodedev-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159229" comment="libvirt-daemon-driver-nwfilter-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159230" comment="libvirt-daemon-driver-qemu-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159231" comment="libvirt-daemon-driver-secret-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159232" comment="libvirt-daemon-driver-storage-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159233" comment="libvirt-daemon-driver-storage-core-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159234" comment="libvirt-daemon-driver-storage-disk-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159235" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159236" comment="libvirt-daemon-driver-storage-logical-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159237" comment="libvirt-daemon-driver-storage-mpath-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159238" comment="libvirt-daemon-driver-storage-rbd-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159239" comment="libvirt-daemon-driver-storage-scsi-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159240" comment="libvirt-daemon-lxc-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159241" comment="libvirt-daemon-qemu-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159242" comment="libvirt-daemon-xen-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159243" comment="libvirt-doc-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159244" comment="libvirt-libs-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159245" comment="libvirt-lock-sanlock-3.3.0-4.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159246" comment="libvirt-nss-3.3.0-4.28 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148023" version="1" class="patch">
	<metadata>
		<title>libvmtools0-10.1.5-2.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-5191" ref_url="https://www.suse.com/security/cve/CVE-2015-5191/" source="CVE"/>
		<description>
These are all security issues fixed in the libvmtools0-10.1.5-2.17 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5191/">CVE-2015-5191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5191">CVE-2015-5191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159247" comment="libvmtools0-10.1.5-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159248" comment="open-vm-tools-10.1.5-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159249" comment="open-vm-tools-desktop-10.1.5-2.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148024" version="1" class="patch">
	<metadata>
		<title>libvncclient0-0.9.9-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-6051" ref_url="https://www.suse.com/security/cve/CVE-2014-6051/" source="CVE"/>
		<reference ref_id="CVE-2014-6052" ref_url="https://www.suse.com/security/cve/CVE-2014-6052/" source="CVE"/>
		<reference ref_id="CVE-2014-6053" ref_url="https://www.suse.com/security/cve/CVE-2014-6053/" source="CVE"/>
		<reference ref_id="CVE-2014-6054" ref_url="https://www.suse.com/security/cve/CVE-2014-6054/" source="CVE"/>
		<reference ref_id="CVE-2014-6055" ref_url="https://www.suse.com/security/cve/CVE-2014-6055/" source="CVE"/>
		<description>
These are all security issues fixed in the libvncclient0-0.9.9-16.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6051/">CVE-2014-6051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6051">CVE-2014-6051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6052/">CVE-2014-6052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6052">CVE-2014-6052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6053/">CVE-2014-6053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6053">CVE-2014-6053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6054/">CVE-2014-6054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6054">CVE-2014-6054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6055/">CVE-2014-6055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6055">CVE-2014-6055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009119309" comment="libvncclient0-0.9.9-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119310" comment="libvncserver0-0.9.9-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148025" version="1" class="patch">
	<metadata>
		<title>libvorbis-doc-1.3.3-8.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<description>
These are all security issues fixed in the libvorbis-doc-1.3.3-8.23 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1420">CVE-2008-1420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3379">CVE-2009-3379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0444">CVE-2012-0444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140997" comment="libvorbis-doc-1.3.3-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140998" comment="libvorbis0-1.3.3-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140999" comment="libvorbis0-32bit-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141000" comment="libvorbisenc2-1.3.3-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141001" comment="libvorbisenc2-32bit-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141002" comment="libvorbisfile3-1.3.3-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141003" comment="libvorbisfile3-32bit-1.3.3-8.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148026" version="1" class="patch">
	<metadata>
		<title>libvte9-0.28.2-19.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2738" ref_url="https://www.suse.com/security/cve/CVE-2012-2738/" source="CVE"/>
		<description>
These are all security issues fixed in the libvte9-0.28.2-19.7 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2738/">CVE-2012-2738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2738">CVE-2012-2738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141004" comment="libvte9-0.28.2-19.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141005" comment="python-vte-0.28.2-19.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141006" comment="vte2-lang-0.28.2-19.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148027" version="1" class="patch">
	<metadata>
		<title>libwireshark8-2.2.7-47.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-1210" ref_url="https://www.suse.com/security/cve/CVE-2009-1210/" source="CVE"/>
		<reference ref_id="CVE-2009-1267" ref_url="https://www.suse.com/security/cve/CVE-2009-1267/" source="CVE"/>
		<reference ref_id="CVE-2009-1268" ref_url="https://www.suse.com/security/cve/CVE-2009-1268/" source="CVE"/>
		<reference ref_id="CVE-2009-1269" ref_url="https://www.suse.com/security/cve/CVE-2009-1269/" source="CVE"/>
		<reference ref_id="CVE-2009-3241" ref_url="https://www.suse.com/security/cve/CVE-2009-3241/" source="CVE"/>
		<reference ref_id="CVE-2009-3242" ref_url="https://www.suse.com/security/cve/CVE-2009-3242/" source="CVE"/>
		<reference ref_id="CVE-2009-3243" ref_url="https://www.suse.com/security/cve/CVE-2009-3243/" source="CVE"/>
		<reference ref_id="CVE-2010-1455" ref_url="https://www.suse.com/security/cve/CVE-2010-1455/" source="CVE"/>
		<reference ref_id="CVE-2010-2993" ref_url="https://www.suse.com/security/cve/CVE-2010-2993/" source="CVE"/>
		<reference ref_id="CVE-2010-3445" ref_url="https://www.suse.com/security/cve/CVE-2010-3445/" source="CVE"/>
		<reference ref_id="CVE-2010-4300" ref_url="https://www.suse.com/security/cve/CVE-2010-4300/" source="CVE"/>
		<reference ref_id="CVE-2010-4301" ref_url="https://www.suse.com/security/cve/CVE-2010-4301/" source="CVE"/>
		<reference ref_id="CVE-2010-4538" ref_url="https://www.suse.com/security/cve/CVE-2010-4538/" source="CVE"/>
		<reference ref_id="CVE-2011-0024" ref_url="https://www.suse.com/security/cve/CVE-2011-0024/" source="CVE"/>
		<reference ref_id="CVE-2011-0538" ref_url="https://www.suse.com/security/cve/CVE-2011-0538/" source="CVE"/>
		<reference ref_id="CVE-2011-0713" ref_url="https://www.suse.com/security/cve/CVE-2011-0713/" source="CVE"/>
		<reference ref_id="CVE-2011-1138" ref_url="https://www.suse.com/security/cve/CVE-2011-1138/" source="CVE"/>
		<reference ref_id="CVE-2011-1139" ref_url="https://www.suse.com/security/cve/CVE-2011-1139/" source="CVE"/>
		<reference ref_id="CVE-2011-1140" ref_url="https://www.suse.com/security/cve/CVE-2011-1140/" source="CVE"/>
		<reference ref_id="CVE-2011-1143" ref_url="https://www.suse.com/security/cve/CVE-2011-1143/" source="CVE"/>
		<reference ref_id="CVE-2011-1590" ref_url="https://www.suse.com/security/cve/CVE-2011-1590/" source="CVE"/>
		<reference ref_id="CVE-2011-1591" ref_url="https://www.suse.com/security/cve/CVE-2011-1591/" source="CVE"/>
		<reference ref_id="CVE-2011-1592" ref_url="https://www.suse.com/security/cve/CVE-2011-1592/" source="CVE"/>
		<reference ref_id="CVE-2011-1957" ref_url="https://www.suse.com/security/cve/CVE-2011-1957/" source="CVE"/>
		<reference ref_id="CVE-2011-1958" ref_url="https://www.suse.com/security/cve/CVE-2011-1958/" source="CVE"/>
		<reference ref_id="CVE-2011-1959" ref_url="https://www.suse.com/security/cve/CVE-2011-1959/" source="CVE"/>
		<reference ref_id="CVE-2011-2174" ref_url="https://www.suse.com/security/cve/CVE-2011-2174/" source="CVE"/>
		<reference ref_id="CVE-2011-2175" ref_url="https://www.suse.com/security/cve/CVE-2011-2175/" source="CVE"/>
		<reference ref_id="CVE-2011-2597" ref_url="https://www.suse.com/security/cve/CVE-2011-2597/" source="CVE"/>
		<reference ref_id="CVE-2011-2698" ref_url="https://www.suse.com/security/cve/CVE-2011-2698/" source="CVE"/>
		<reference ref_id="CVE-2011-3266" ref_url="https://www.suse.com/security/cve/CVE-2011-3266/" source="CVE"/>
		<reference ref_id="CVE-2011-3360" ref_url="https://www.suse.com/security/cve/CVE-2011-3360/" source="CVE"/>
		<reference ref_id="CVE-2011-3483" ref_url="https://www.suse.com/security/cve/CVE-2011-3483/" source="CVE"/>
		<reference ref_id="CVE-2012-2392" ref_url="https://www.suse.com/security/cve/CVE-2012-2392/" source="CVE"/>
		<reference ref_id="CVE-2012-2393" ref_url="https://www.suse.com/security/cve/CVE-2012-2393/" source="CVE"/>
		<reference ref_id="CVE-2012-2394" ref_url="https://www.suse.com/security/cve/CVE-2012-2394/" source="CVE"/>
		<reference ref_id="CVE-2012-3548" ref_url="https://www.suse.com/security/cve/CVE-2012-3548/" source="CVE"/>
		<reference ref_id="CVE-2012-4048" ref_url="https://www.suse.com/security/cve/CVE-2012-4048/" source="CVE"/>
		<reference ref_id="CVE-2012-4049" ref_url="https://www.suse.com/security/cve/CVE-2012-4049/" source="CVE"/>
		<reference ref_id="CVE-2012-4285" ref_url="https://www.suse.com/security/cve/CVE-2012-4285/" source="CVE"/>
		<reference ref_id="CVE-2012-4286" ref_url="https://www.suse.com/security/cve/CVE-2012-4286/" source="CVE"/>
		<reference ref_id="CVE-2012-4287" ref_url="https://www.suse.com/security/cve/CVE-2012-4287/" source="CVE"/>
		<reference ref_id="CVE-2012-4288" ref_url="https://www.suse.com/security/cve/CVE-2012-4288/" source="CVE"/>
		<reference ref_id="CVE-2012-4289" ref_url="https://www.suse.com/security/cve/CVE-2012-4289/" source="CVE"/>
		<reference ref_id="CVE-2012-4290" ref_url="https://www.suse.com/security/cve/CVE-2012-4290/" source="CVE"/>
		<reference ref_id="CVE-2012-4291" ref_url="https://www.suse.com/security/cve/CVE-2012-4291/" source="CVE"/>
		<reference ref_id="CVE-2012-4292" ref_url="https://www.suse.com/security/cve/CVE-2012-4292/" source="CVE"/>
		<reference ref_id="CVE-2012-4293" ref_url="https://www.suse.com/security/cve/CVE-2012-4293/" source="CVE"/>
		<reference ref_id="CVE-2012-4294" ref_url="https://www.suse.com/security/cve/CVE-2012-4294/" source="CVE"/>
		<reference ref_id="CVE-2012-4295" ref_url="https://www.suse.com/security/cve/CVE-2012-4295/" source="CVE"/>
		<reference ref_id="CVE-2012-4296" ref_url="https://www.suse.com/security/cve/CVE-2012-4296/" source="CVE"/>
		<reference ref_id="CVE-2012-4297" ref_url="https://www.suse.com/security/cve/CVE-2012-4297/" source="CVE"/>
		<reference ref_id="CVE-2012-4298" ref_url="https://www.suse.com/security/cve/CVE-2012-4298/" source="CVE"/>
		<reference ref_id="CVE-2012-5237" ref_url="https://www.suse.com/security/cve/CVE-2012-5237/" source="CVE"/>
		<reference ref_id="CVE-2012-5238" ref_url="https://www.suse.com/security/cve/CVE-2012-5238/" source="CVE"/>
		<reference ref_id="CVE-2012-5239" ref_url="https://www.suse.com/security/cve/CVE-2012-5239/" source="CVE"/>
		<reference ref_id="CVE-2012-5240" ref_url="https://www.suse.com/security/cve/CVE-2012-5240/" source="CVE"/>
		<reference ref_id="CVE-2012-5592" ref_url="https://www.suse.com/security/cve/CVE-2012-5592/" source="CVE"/>
		<reference ref_id="CVE-2012-5593" ref_url="https://www.suse.com/security/cve/CVE-2012-5593/" source="CVE"/>
		<reference ref_id="CVE-2012-5594" ref_url="https://www.suse.com/security/cve/CVE-2012-5594/" source="CVE"/>
		<reference ref_id="CVE-2012-5595" ref_url="https://www.suse.com/security/cve/CVE-2012-5595/" source="CVE"/>
		<reference ref_id="CVE-2012-5596" ref_url="https://www.suse.com/security/cve/CVE-2012-5596/" source="CVE"/>
		<reference ref_id="CVE-2012-5597" ref_url="https://www.suse.com/security/cve/CVE-2012-5597/" source="CVE"/>
		<reference ref_id="CVE-2012-5598" ref_url="https://www.suse.com/security/cve/CVE-2012-5598/" source="CVE"/>
		<reference ref_id="CVE-2012-5599" ref_url="https://www.suse.com/security/cve/CVE-2012-5599/" source="CVE"/>
		<reference ref_id="CVE-2012-5600" ref_url="https://www.suse.com/security/cve/CVE-2012-5600/" source="CVE"/>
		<reference ref_id="CVE-2012-5601" ref_url="https://www.suse.com/security/cve/CVE-2012-5601/" source="CVE"/>
		<reference ref_id="CVE-2012-5602" ref_url="https://www.suse.com/security/cve/CVE-2012-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-1572" ref_url="https://www.suse.com/security/cve/CVE-2013-1572/" source="CVE"/>
		<reference ref_id="CVE-2013-1573" ref_url="https://www.suse.com/security/cve/CVE-2013-1573/" source="CVE"/>
		<reference ref_id="CVE-2013-1574" ref_url="https://www.suse.com/security/cve/CVE-2013-1574/" source="CVE"/>
		<reference ref_id="CVE-2013-1575" ref_url="https://www.suse.com/security/cve/CVE-2013-1575/" source="CVE"/>
		<reference ref_id="CVE-2013-1576" ref_url="https://www.suse.com/security/cve/CVE-2013-1576/" source="CVE"/>
		<reference ref_id="CVE-2013-1577" ref_url="https://www.suse.com/security/cve/CVE-2013-1577/" source="CVE"/>
		<reference ref_id="CVE-2013-1578" ref_url="https://www.suse.com/security/cve/CVE-2013-1578/" source="CVE"/>
		<reference ref_id="CVE-2013-1579" ref_url="https://www.suse.com/security/cve/CVE-2013-1579/" source="CVE"/>
		<reference ref_id="CVE-2013-1580" ref_url="https://www.suse.com/security/cve/CVE-2013-1580/" source="CVE"/>
		<reference ref_id="CVE-2013-1581" ref_url="https://www.suse.com/security/cve/CVE-2013-1581/" source="CVE"/>
		<reference ref_id="CVE-2013-1582" ref_url="https://www.suse.com/security/cve/CVE-2013-1582/" source="CVE"/>
		<reference ref_id="CVE-2013-1583" ref_url="https://www.suse.com/security/cve/CVE-2013-1583/" source="CVE"/>
		<reference ref_id="CVE-2013-1584" ref_url="https://www.suse.com/security/cve/CVE-2013-1584/" source="CVE"/>
		<reference ref_id="CVE-2013-1585" ref_url="https://www.suse.com/security/cve/CVE-2013-1585/" source="CVE"/>
		<reference ref_id="CVE-2013-1586" ref_url="https://www.suse.com/security/cve/CVE-2013-1586/" source="CVE"/>
		<reference ref_id="CVE-2013-1587" ref_url="https://www.suse.com/security/cve/CVE-2013-1587/" source="CVE"/>
		<reference ref_id="CVE-2013-1588" ref_url="https://www.suse.com/security/cve/CVE-2013-1588/" source="CVE"/>
		<reference ref_id="CVE-2013-1589" ref_url="https://www.suse.com/security/cve/CVE-2013-1589/" source="CVE"/>
		<reference ref_id="CVE-2013-1590" ref_url="https://www.suse.com/security/cve/CVE-2013-1590/" source="CVE"/>
		<reference ref_id="CVE-2013-2475" ref_url="https://www.suse.com/security/cve/CVE-2013-2475/" source="CVE"/>
		<reference ref_id="CVE-2013-2476" ref_url="https://www.suse.com/security/cve/CVE-2013-2476/" source="CVE"/>
		<reference ref_id="CVE-2013-2477" ref_url="https://www.suse.com/security/cve/CVE-2013-2477/" source="CVE"/>
		<reference ref_id="CVE-2013-2478" ref_url="https://www.suse.com/security/cve/CVE-2013-2478/" source="CVE"/>
		<reference ref_id="CVE-2013-2479" ref_url="https://www.suse.com/security/cve/CVE-2013-2479/" source="CVE"/>
		<reference ref_id="CVE-2013-2480" ref_url="https://www.suse.com/security/cve/CVE-2013-2480/" source="CVE"/>
		<reference ref_id="CVE-2013-2481" ref_url="https://www.suse.com/security/cve/CVE-2013-2481/" source="CVE"/>
		<reference ref_id="CVE-2013-2482" ref_url="https://www.suse.com/security/cve/CVE-2013-2482/" source="CVE"/>
		<reference ref_id="CVE-2013-2483" ref_url="https://www.suse.com/security/cve/CVE-2013-2483/" source="CVE"/>
		<reference ref_id="CVE-2013-2484" ref_url="https://www.suse.com/security/cve/CVE-2013-2484/" source="CVE"/>
		<reference ref_id="CVE-2013-2485" ref_url="https://www.suse.com/security/cve/CVE-2013-2485/" source="CVE"/>
		<reference ref_id="CVE-2013-2486" ref_url="https://www.suse.com/security/cve/CVE-2013-2486/" source="CVE"/>
		<reference ref_id="CVE-2013-2487" ref_url="https://www.suse.com/security/cve/CVE-2013-2487/" source="CVE"/>
		<reference ref_id="CVE-2013-2488" ref_url="https://www.suse.com/security/cve/CVE-2013-2488/" source="CVE"/>
		<reference ref_id="CVE-2013-3555" ref_url="https://www.suse.com/security/cve/CVE-2013-3555/" source="CVE"/>
		<reference ref_id="CVE-2013-3556" ref_url="https://www.suse.com/security/cve/CVE-2013-3556/" source="CVE"/>
		<reference ref_id="CVE-2013-3557" ref_url="https://www.suse.com/security/cve/CVE-2013-3557/" source="CVE"/>
		<reference ref_id="CVE-2013-3558" ref_url="https://www.suse.com/security/cve/CVE-2013-3558/" source="CVE"/>
		<reference ref_id="CVE-2013-3559" ref_url="https://www.suse.com/security/cve/CVE-2013-3559/" source="CVE"/>
		<reference ref_id="CVE-2013-3560" ref_url="https://www.suse.com/security/cve/CVE-2013-3560/" source="CVE"/>
		<reference ref_id="CVE-2013-3561" ref_url="https://www.suse.com/security/cve/CVE-2013-3561/" source="CVE"/>
		<reference ref_id="CVE-2013-3562" ref_url="https://www.suse.com/security/cve/CVE-2013-3562/" source="CVE"/>
		<reference ref_id="CVE-2013-4083" ref_url="https://www.suse.com/security/cve/CVE-2013-4083/" source="CVE"/>
		<reference ref_id="CVE-2013-4920" ref_url="https://www.suse.com/security/cve/CVE-2013-4920/" source="CVE"/>
		<reference ref_id="CVE-2013-4921" ref_url="https://www.suse.com/security/cve/CVE-2013-4921/" source="CVE"/>
		<reference ref_id="CVE-2013-4922" ref_url="https://www.suse.com/security/cve/CVE-2013-4922/" source="CVE"/>
		<reference ref_id="CVE-2013-4923" ref_url="https://www.suse.com/security/cve/CVE-2013-4923/" source="CVE"/>
		<reference ref_id="CVE-2013-4924" ref_url="https://www.suse.com/security/cve/CVE-2013-4924/" source="CVE"/>
		<reference ref_id="CVE-2013-4925" ref_url="https://www.suse.com/security/cve/CVE-2013-4925/" source="CVE"/>
		<reference ref_id="CVE-2013-4926" ref_url="https://www.suse.com/security/cve/CVE-2013-4926/" source="CVE"/>
		<reference ref_id="CVE-2013-4927" ref_url="https://www.suse.com/security/cve/CVE-2013-4927/" source="CVE"/>
		<reference ref_id="CVE-2013-4928" ref_url="https://www.suse.com/security/cve/CVE-2013-4928/" source="CVE"/>
		<reference ref_id="CVE-2013-4929" ref_url="https://www.suse.com/security/cve/CVE-2013-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-4930" ref_url="https://www.suse.com/security/cve/CVE-2013-4930/" source="CVE"/>
		<reference ref_id="CVE-2013-4931" ref_url="https://www.suse.com/security/cve/CVE-2013-4931/" source="CVE"/>
		<reference ref_id="CVE-2013-4932" ref_url="https://www.suse.com/security/cve/CVE-2013-4932/" source="CVE"/>
		<reference ref_id="CVE-2013-4933" ref_url="https://www.suse.com/security/cve/CVE-2013-4933/" source="CVE"/>
		<reference ref_id="CVE-2013-4934" ref_url="https://www.suse.com/security/cve/CVE-2013-4934/" source="CVE"/>
		<reference ref_id="CVE-2013-4935" ref_url="https://www.suse.com/security/cve/CVE-2013-4935/" source="CVE"/>
		<reference ref_id="CVE-2013-4936" ref_url="https://www.suse.com/security/cve/CVE-2013-4936/" source="CVE"/>
		<reference ref_id="CVE-2013-5717" ref_url="https://www.suse.com/security/cve/CVE-2013-5717/" source="CVE"/>
		<reference ref_id="CVE-2013-5718" ref_url="https://www.suse.com/security/cve/CVE-2013-5718/" source="CVE"/>
		<reference ref_id="CVE-2013-5719" ref_url="https://www.suse.com/security/cve/CVE-2013-5719/" source="CVE"/>
		<reference ref_id="CVE-2013-5720" ref_url="https://www.suse.com/security/cve/CVE-2013-5720/" source="CVE"/>
		<reference ref_id="CVE-2013-5721" ref_url="https://www.suse.com/security/cve/CVE-2013-5721/" source="CVE"/>
		<reference ref_id="CVE-2013-5722" ref_url="https://www.suse.com/security/cve/CVE-2013-5722/" source="CVE"/>
		<reference ref_id="CVE-2013-6336" ref_url="https://www.suse.com/security/cve/CVE-2013-6336/" source="CVE"/>
		<reference ref_id="CVE-2013-6337" ref_url="https://www.suse.com/security/cve/CVE-2013-6337/" source="CVE"/>
		<reference ref_id="CVE-2013-6338" ref_url="https://www.suse.com/security/cve/CVE-2013-6338/" source="CVE"/>
		<reference ref_id="CVE-2013-6339" ref_url="https://www.suse.com/security/cve/CVE-2013-6339/" source="CVE"/>
		<reference ref_id="CVE-2013-6340" ref_url="https://www.suse.com/security/cve/CVE-2013-6340/" source="CVE"/>
		<reference ref_id="CVE-2013-7112" ref_url="https://www.suse.com/security/cve/CVE-2013-7112/" source="CVE"/>
		<reference ref_id="CVE-2013-7113" ref_url="https://www.suse.com/security/cve/CVE-2013-7113/" source="CVE"/>
		<reference ref_id="CVE-2013-7114" ref_url="https://www.suse.com/security/cve/CVE-2013-7114/" source="CVE"/>
		<reference ref_id="CVE-2014-2281" ref_url="https://www.suse.com/security/cve/CVE-2014-2281/" source="CVE"/>
		<reference ref_id="CVE-2014-2282" ref_url="https://www.suse.com/security/cve/CVE-2014-2282/" source="CVE"/>
		<reference ref_id="CVE-2014-2283" ref_url="https://www.suse.com/security/cve/CVE-2014-2283/" source="CVE"/>
		<reference ref_id="CVE-2014-2299" ref_url="https://www.suse.com/security/cve/CVE-2014-2299/" source="CVE"/>
		<reference ref_id="CVE-2014-2907" ref_url="https://www.suse.com/security/cve/CVE-2014-2907/" source="CVE"/>
		<reference ref_id="CVE-2014-4020" ref_url="https://www.suse.com/security/cve/CVE-2014-4020/" source="CVE"/>
		<reference ref_id="CVE-2014-5161" ref_url="https://www.suse.com/security/cve/CVE-2014-5161/" source="CVE"/>
		<reference ref_id="CVE-2014-5162" ref_url="https://www.suse.com/security/cve/CVE-2014-5162/" source="CVE"/>
		<reference ref_id="CVE-2014-5163" ref_url="https://www.suse.com/security/cve/CVE-2014-5163/" source="CVE"/>
		<reference ref_id="CVE-2014-5164" ref_url="https://www.suse.com/security/cve/CVE-2014-5164/" source="CVE"/>
		<reference ref_id="CVE-2014-5165" ref_url="https://www.suse.com/security/cve/CVE-2014-5165/" source="CVE"/>
		<reference ref_id="CVE-2015-0559" ref_url="https://www.suse.com/security/cve/CVE-2015-0559/" source="CVE"/>
		<reference ref_id="CVE-2015-0560" ref_url="https://www.suse.com/security/cve/CVE-2015-0560/" source="CVE"/>
		<reference ref_id="CVE-2015-0561" ref_url="https://www.suse.com/security/cve/CVE-2015-0561/" source="CVE"/>
		<reference ref_id="CVE-2015-0562" ref_url="https://www.suse.com/security/cve/CVE-2015-0562/" source="CVE"/>
		<reference ref_id="CVE-2015-0563" ref_url="https://www.suse.com/security/cve/CVE-2015-0563/" source="CVE"/>
		<reference ref_id="CVE-2015-0564" ref_url="https://www.suse.com/security/cve/CVE-2015-0564/" source="CVE"/>
		<reference ref_id="CVE-2015-2188" ref_url="https://www.suse.com/security/cve/CVE-2015-2188/" source="CVE"/>
		<reference ref_id="CVE-2015-2189" ref_url="https://www.suse.com/security/cve/CVE-2015-2189/" source="CVE"/>
		<reference ref_id="CVE-2015-2191" ref_url="https://www.suse.com/security/cve/CVE-2015-2191/" source="CVE"/>
		<reference ref_id="CVE-2015-3811" ref_url="https://www.suse.com/security/cve/CVE-2015-3811/" source="CVE"/>
		<reference ref_id="CVE-2015-3812" ref_url="https://www.suse.com/security/cve/CVE-2015-3812/" source="CVE"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-3814" ref_url="https://www.suse.com/security/cve/CVE-2015-3814/" source="CVE"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8712" ref_url="https://www.suse.com/security/cve/CVE-2015-8712/" source="CVE"/>
		<reference ref_id="CVE-2015-8713" ref_url="https://www.suse.com/security/cve/CVE-2015-8713/" source="CVE"/>
		<reference ref_id="CVE-2015-8714" ref_url="https://www.suse.com/security/cve/CVE-2015-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-8715" ref_url="https://www.suse.com/security/cve/CVE-2015-8715/" source="CVE"/>
		<reference ref_id="CVE-2015-8716" ref_url="https://www.suse.com/security/cve/CVE-2015-8716/" source="CVE"/>
		<reference ref_id="CVE-2015-8717" ref_url="https://www.suse.com/security/cve/CVE-2015-8717/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8719" ref_url="https://www.suse.com/security/cve/CVE-2015-8719/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<reference ref_id="CVE-2016-2523" ref_url="https://www.suse.com/security/cve/CVE-2016-2523/" source="CVE"/>
		<reference ref_id="CVE-2016-2530" ref_url="https://www.suse.com/security/cve/CVE-2016-2530/" source="CVE"/>
		<reference ref_id="CVE-2016-2531" ref_url="https://www.suse.com/security/cve/CVE-2016-2531/" source="CVE"/>
		<reference ref_id="CVE-2016-2532" ref_url="https://www.suse.com/security/cve/CVE-2016-2532/" source="CVE"/>
		<reference ref_id="CVE-2016-5350" ref_url="https://www.suse.com/security/cve/CVE-2016-5350/" source="CVE"/>
		<reference ref_id="CVE-2016-5351" ref_url="https://www.suse.com/security/cve/CVE-2016-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-5352" ref_url="https://www.suse.com/security/cve/CVE-2016-5352/" source="CVE"/>
		<reference ref_id="CVE-2016-5353" ref_url="https://www.suse.com/security/cve/CVE-2016-5353/" source="CVE"/>
		<reference ref_id="CVE-2016-5354" ref_url="https://www.suse.com/security/cve/CVE-2016-5354/" source="CVE"/>
		<reference ref_id="CVE-2016-5355" ref_url="https://www.suse.com/security/cve/CVE-2016-5355/" source="CVE"/>
		<reference ref_id="CVE-2016-5356" ref_url="https://www.suse.com/security/cve/CVE-2016-5356/" source="CVE"/>
		<reference ref_id="CVE-2016-5357" ref_url="https://www.suse.com/security/cve/CVE-2016-5357/" source="CVE"/>
		<reference ref_id="CVE-2016-5358" ref_url="https://www.suse.com/security/cve/CVE-2016-5358/" source="CVE"/>
		<reference ref_id="CVE-2016-5359" ref_url="https://www.suse.com/security/cve/CVE-2016-5359/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2016-6504" ref_url="https://www.suse.com/security/cve/CVE-2016-6504/" source="CVE"/>
		<reference ref_id="CVE-2016-6505" ref_url="https://www.suse.com/security/cve/CVE-2016-6505/" source="CVE"/>
		<reference ref_id="CVE-2016-6506" ref_url="https://www.suse.com/security/cve/CVE-2016-6506/" source="CVE"/>
		<reference ref_id="CVE-2016-6507" ref_url="https://www.suse.com/security/cve/CVE-2016-6507/" source="CVE"/>
		<reference ref_id="CVE-2016-6508" ref_url="https://www.suse.com/security/cve/CVE-2016-6508/" source="CVE"/>
		<reference ref_id="CVE-2016-6509" ref_url="https://www.suse.com/security/cve/CVE-2016-6509/" source="CVE"/>
		<reference ref_id="CVE-2016-6510" ref_url="https://www.suse.com/security/cve/CVE-2016-6510/" source="CVE"/>
		<reference ref_id="CVE-2016-6511" ref_url="https://www.suse.com/security/cve/CVE-2016-6511/" source="CVE"/>
		<reference ref_id="CVE-2016-7175" ref_url="https://www.suse.com/security/cve/CVE-2016-7175/" source="CVE"/>
		<reference ref_id="CVE-2016-7176" ref_url="https://www.suse.com/security/cve/CVE-2016-7176/" source="CVE"/>
		<reference ref_id="CVE-2016-7177" ref_url="https://www.suse.com/security/cve/CVE-2016-7177/" source="CVE"/>
		<reference ref_id="CVE-2016-7178" ref_url="https://www.suse.com/security/cve/CVE-2016-7178/" source="CVE"/>
		<reference ref_id="CVE-2016-7179" ref_url="https://www.suse.com/security/cve/CVE-2016-7179/" source="CVE"/>
		<reference ref_id="CVE-2016-7180" ref_url="https://www.suse.com/security/cve/CVE-2016-7180/" source="CVE"/>
		<reference ref_id="CVE-2016-9373" ref_url="https://www.suse.com/security/cve/CVE-2016-9373/" source="CVE"/>
		<reference ref_id="CVE-2016-9374" ref_url="https://www.suse.com/security/cve/CVE-2016-9374/" source="CVE"/>
		<reference ref_id="CVE-2016-9375" ref_url="https://www.suse.com/security/cve/CVE-2016-9375/" source="CVE"/>
		<reference ref_id="CVE-2016-9376" ref_url="https://www.suse.com/security/cve/CVE-2016-9376/" source="CVE"/>
		<reference ref_id="CVE-2017-5596" ref_url="https://www.suse.com/security/cve/CVE-2017-5596/" source="CVE"/>
		<reference ref_id="CVE-2017-5597" ref_url="https://www.suse.com/security/cve/CVE-2017-5597/" source="CVE"/>
		<reference ref_id="CVE-2017-6014" ref_url="https://www.suse.com/security/cve/CVE-2017-6014/" source="CVE"/>
		<reference ref_id="CVE-2017-7700" ref_url="https://www.suse.com/security/cve/CVE-2017-7700/" source="CVE"/>
		<reference ref_id="CVE-2017-7701" ref_url="https://www.suse.com/security/cve/CVE-2017-7701/" source="CVE"/>
		<reference ref_id="CVE-2017-7702" ref_url="https://www.suse.com/security/cve/CVE-2017-7702/" source="CVE"/>
		<reference ref_id="CVE-2017-7703" ref_url="https://www.suse.com/security/cve/CVE-2017-7703/" source="CVE"/>
		<reference ref_id="CVE-2017-7704" ref_url="https://www.suse.com/security/cve/CVE-2017-7704/" source="CVE"/>
		<reference ref_id="CVE-2017-7705" ref_url="https://www.suse.com/security/cve/CVE-2017-7705/" source="CVE"/>
		<reference ref_id="CVE-2017-7745" ref_url="https://www.suse.com/security/cve/CVE-2017-7745/" source="CVE"/>
		<reference ref_id="CVE-2017-7746" ref_url="https://www.suse.com/security/cve/CVE-2017-7746/" source="CVE"/>
		<reference ref_id="CVE-2017-7747" ref_url="https://www.suse.com/security/cve/CVE-2017-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-7748" ref_url="https://www.suse.com/security/cve/CVE-2017-7748/" source="CVE"/>
		<reference ref_id="CVE-2017-9343" ref_url="https://www.suse.com/security/cve/CVE-2017-9343/" source="CVE"/>
		<reference ref_id="CVE-2017-9344" ref_url="https://www.suse.com/security/cve/CVE-2017-9344/" source="CVE"/>
		<reference ref_id="CVE-2017-9345" ref_url="https://www.suse.com/security/cve/CVE-2017-9345/" source="CVE"/>
		<reference ref_id="CVE-2017-9346" ref_url="https://www.suse.com/security/cve/CVE-2017-9346/" source="CVE"/>
		<reference ref_id="CVE-2017-9347" ref_url="https://www.suse.com/security/cve/CVE-2017-9347/" source="CVE"/>
		<reference ref_id="CVE-2017-9348" ref_url="https://www.suse.com/security/cve/CVE-2017-9348/" source="CVE"/>
		<reference ref_id="CVE-2017-9349" ref_url="https://www.suse.com/security/cve/CVE-2017-9349/" source="CVE"/>
		<reference ref_id="CVE-2017-9350" ref_url="https://www.suse.com/security/cve/CVE-2017-9350/" source="CVE"/>
		<reference ref_id="CVE-2017-9351" ref_url="https://www.suse.com/security/cve/CVE-2017-9351/" source="CVE"/>
		<reference ref_id="CVE-2017-9352" ref_url="https://www.suse.com/security/cve/CVE-2017-9352/" source="CVE"/>
		<reference ref_id="CVE-2017-9353" ref_url="https://www.suse.com/security/cve/CVE-2017-9353/" source="CVE"/>
		<reference ref_id="CVE-2017-9354" ref_url="https://www.suse.com/security/cve/CVE-2017-9354/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark8-2.2.7-47.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1210/">CVE-2009-1210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1210">CVE-2009-1210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1267/">CVE-2009-1267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1267">CVE-2009-1267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1268/">CVE-2009-1268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1268">CVE-2009-1268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1269/">CVE-2009-1269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1269">CVE-2009-1269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3241/">CVE-2009-3241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3241">CVE-2009-3241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3242/">CVE-2009-3242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3242">CVE-2009-3242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3243/">CVE-2009-3243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3243">CVE-2009-3243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1455/">CVE-2010-1455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1455">CVE-2010-1455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2993/">CVE-2010-2993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2993">CVE-2010-2993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3445/">CVE-2010-3445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3445">CVE-2010-3445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4300/">CVE-2010-4300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4300">CVE-2010-4300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4301/">CVE-2010-4301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4301">CVE-2010-4301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4538/">CVE-2010-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4538">CVE-2010-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0024/">CVE-2011-0024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0024">CVE-2011-0024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0538/">CVE-2011-0538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0538">CVE-2011-0538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0713/">CVE-2011-0713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0713">CVE-2011-0713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1138/">CVE-2011-1138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1138">CVE-2011-1138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1139/">CVE-2011-1139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1139">CVE-2011-1139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1140/">CVE-2011-1140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1140">CVE-2011-1140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1143/">CVE-2011-1143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1143">CVE-2011-1143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1590/">CVE-2011-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1590">CVE-2011-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1591/">CVE-2011-1591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1591">CVE-2011-1591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1592/">CVE-2011-1592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1592">CVE-2011-1592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1957/">CVE-2011-1957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1957">CVE-2011-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1958/">CVE-2011-1958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1958">CVE-2011-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1959/">CVE-2011-1959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1959">CVE-2011-1959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2174/">CVE-2011-2174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2174">CVE-2011-2174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2175/">CVE-2011-2175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2175">CVE-2011-2175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2597/">CVE-2011-2597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2597">CVE-2011-2597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2698/">CVE-2011-2698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2698">CVE-2011-2698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3266/">CVE-2011-3266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3266">CVE-2011-3266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3360/">CVE-2011-3360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3360">CVE-2011-3360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3483/">CVE-2011-3483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3483">CVE-2011-3483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2392/">CVE-2012-2392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2392">CVE-2012-2392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2393/">CVE-2012-2393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2393">CVE-2012-2393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2394/">CVE-2012-2394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2394">CVE-2012-2394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3548/">CVE-2012-3548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3548">CVE-2012-3548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4048/">CVE-2012-4048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4048">CVE-2012-4048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4049/">CVE-2012-4049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4049">CVE-2012-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4285/">CVE-2012-4285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4285">CVE-2012-4285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4286/">CVE-2012-4286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4286">CVE-2012-4286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4287/">CVE-2012-4287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4287">CVE-2012-4287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4288/">CVE-2012-4288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4288">CVE-2012-4288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4289/">CVE-2012-4289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4289">CVE-2012-4289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4290/">CVE-2012-4290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4290">CVE-2012-4290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4291/">CVE-2012-4291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4291">CVE-2012-4291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4292/">CVE-2012-4292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4292">CVE-2012-4292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4293/">CVE-2012-4293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4293">CVE-2012-4293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4294/">CVE-2012-4294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4294">CVE-2012-4294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4295/">CVE-2012-4295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4295">CVE-2012-4295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4296/">CVE-2012-4296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4296">CVE-2012-4296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4297/">CVE-2012-4297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4297">CVE-2012-4297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4298/">CVE-2012-4298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4298">CVE-2012-4298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5237/">CVE-2012-5237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5237">CVE-2012-5237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5238/">CVE-2012-5238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5238">CVE-2012-5238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5239/">CVE-2012-5239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5239">CVE-2012-5239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5240/">CVE-2012-5240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5240">CVE-2012-5240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5592/">CVE-2012-5592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5592">CVE-2012-5592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5593/">CVE-2012-5593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5593">CVE-2012-5593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5594/">CVE-2012-5594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5594">CVE-2012-5594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5595/">CVE-2012-5595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5595">CVE-2012-5595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5596/">CVE-2012-5596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5596">CVE-2012-5596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5597/">CVE-2012-5597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5597">CVE-2012-5597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5598/">CVE-2012-5598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5598">CVE-2012-5598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5599/">CVE-2012-5599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5599">CVE-2012-5599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5600/">CVE-2012-5600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5600">CVE-2012-5600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5601/">CVE-2012-5601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5601">CVE-2012-5601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5602/">CVE-2012-5602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5602">CVE-2012-5602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1572/">CVE-2013-1572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1572">CVE-2013-1572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1573/">CVE-2013-1573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1573">CVE-2013-1573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1574/">CVE-2013-1574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1574">CVE-2013-1574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1575/">CVE-2013-1575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1575">CVE-2013-1575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1576/">CVE-2013-1576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1576">CVE-2013-1576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1577/">CVE-2013-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1577">CVE-2013-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1578/">CVE-2013-1578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1578">CVE-2013-1578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1579/">CVE-2013-1579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1579">CVE-2013-1579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1580/">CVE-2013-1580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1580">CVE-2013-1580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1581/">CVE-2013-1581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1581">CVE-2013-1581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1582/">CVE-2013-1582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1582">CVE-2013-1582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1583/">CVE-2013-1583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1583">CVE-2013-1583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1584/">CVE-2013-1584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1584">CVE-2013-1584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1585/">CVE-2013-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1585">CVE-2013-1585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1586/">CVE-2013-1586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1586">CVE-2013-1586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1587/">CVE-2013-1587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1587">CVE-2013-1587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1588/">CVE-2013-1588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1588">CVE-2013-1588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1589/">CVE-2013-1589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1589">CVE-2013-1589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1590/">CVE-2013-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1590">CVE-2013-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2475/">CVE-2013-2475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2475">CVE-2013-2475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2476/">CVE-2013-2476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2476">CVE-2013-2476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2477/">CVE-2013-2477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2477">CVE-2013-2477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2478/">CVE-2013-2478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2478">CVE-2013-2478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2479/">CVE-2013-2479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2479">CVE-2013-2479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2480/">CVE-2013-2480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2480">CVE-2013-2480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2481/">CVE-2013-2481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2481">CVE-2013-2481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2482/">CVE-2013-2482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2482">CVE-2013-2482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2483/">CVE-2013-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2483">CVE-2013-2483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2484/">CVE-2013-2484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2484">CVE-2013-2484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2485/">CVE-2013-2485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2485">CVE-2013-2485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2486/">CVE-2013-2486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2486">CVE-2013-2486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2487/">CVE-2013-2487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2487">CVE-2013-2487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2488/">CVE-2013-2488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2488">CVE-2013-2488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3555/">CVE-2013-3555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3555">CVE-2013-3555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3556/">CVE-2013-3556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3556">CVE-2013-3556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3557/">CVE-2013-3557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3557">CVE-2013-3557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3558/">CVE-2013-3558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3558">CVE-2013-3558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3559/">CVE-2013-3559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3559">CVE-2013-3559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3560/">CVE-2013-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3560">CVE-2013-3560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3561/">CVE-2013-3561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3561">CVE-2013-3561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3562/">CVE-2013-3562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3562">CVE-2013-3562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4083/">CVE-2013-4083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4083">CVE-2013-4083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4920/">CVE-2013-4920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4920">CVE-2013-4920 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4921/">CVE-2013-4921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4921">CVE-2013-4921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4922/">CVE-2013-4922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4922">CVE-2013-4922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4923/">CVE-2013-4923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4923">CVE-2013-4923 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4924/">CVE-2013-4924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4924">CVE-2013-4924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4925/">CVE-2013-4925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4925">CVE-2013-4925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4926/">CVE-2013-4926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4926">CVE-2013-4926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4927/">CVE-2013-4927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4927">CVE-2013-4927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4928/">CVE-2013-4928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4928">CVE-2013-4928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4929/">CVE-2013-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4929">CVE-2013-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4930/">CVE-2013-4930 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4930">CVE-2013-4930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4931/">CVE-2013-4931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4931">CVE-2013-4931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4932/">CVE-2013-4932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4932">CVE-2013-4932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4933/">CVE-2013-4933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4933">CVE-2013-4933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4934/">CVE-2013-4934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4934">CVE-2013-4934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4935/">CVE-2013-4935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4935">CVE-2013-4935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4936/">CVE-2013-4936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4936">CVE-2013-4936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5717/">CVE-2013-5717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5717">CVE-2013-5717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5718/">CVE-2013-5718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5718">CVE-2013-5718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5719/">CVE-2013-5719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5719">CVE-2013-5719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5720/">CVE-2013-5720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5720">CVE-2013-5720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5721/">CVE-2013-5721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5721">CVE-2013-5721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5722/">CVE-2013-5722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5722">CVE-2013-5722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6336/">CVE-2013-6336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6336">CVE-2013-6336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6337/">CVE-2013-6337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6337">CVE-2013-6337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6338/">CVE-2013-6338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6338">CVE-2013-6338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6339/">CVE-2013-6339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6339">CVE-2013-6339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6340/">CVE-2013-6340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6340">CVE-2013-6340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7112/">CVE-2013-7112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7112">CVE-2013-7112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7113/">CVE-2013-7113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7113">CVE-2013-7113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7114/">CVE-2013-7114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7114">CVE-2013-7114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2281/">CVE-2014-2281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2281">CVE-2014-2281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2282/">CVE-2014-2282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2282">CVE-2014-2282 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2283/">CVE-2014-2283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2283">CVE-2014-2283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2299/">CVE-2014-2299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2299">CVE-2014-2299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2907/">CVE-2014-2907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2907">CVE-2014-2907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4020/">CVE-2014-4020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4020">CVE-2014-4020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5161/">CVE-2014-5161 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5161">CVE-2014-5161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5162/">CVE-2014-5162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5162">CVE-2014-5162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5163/">CVE-2014-5163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5163">CVE-2014-5163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5164/">CVE-2014-5164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5164">CVE-2014-5164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5165/">CVE-2014-5165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5165">CVE-2014-5165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0559/">CVE-2015-0559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0559">CVE-2015-0559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0560/">CVE-2015-0560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0560">CVE-2015-0560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0561/">CVE-2015-0561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0561">CVE-2015-0561 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0562/">CVE-2015-0562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0562">CVE-2015-0562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0563/">CVE-2015-0563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0563">CVE-2015-0563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0564/">CVE-2015-0564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0564">CVE-2015-0564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2188/">CVE-2015-2188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2188">CVE-2015-2188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2189/">CVE-2015-2189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2189">CVE-2015-2189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2191/">CVE-2015-2191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2191">CVE-2015-2191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3811/">CVE-2015-3811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3811">CVE-2015-3811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3812/">CVE-2015-3812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3812">CVE-2015-3812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3813">CVE-2015-3813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3814/">CVE-2015-3814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3814">CVE-2015-3814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7830">CVE-2015-7830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8711">CVE-2015-8711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8712/">CVE-2015-8712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8712">CVE-2015-8712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8713/">CVE-2015-8713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8713">CVE-2015-8713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8714/">CVE-2015-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8714">CVE-2015-8714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8715/">CVE-2015-8715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8715">CVE-2015-8715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8716/">CVE-2015-8716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8716">CVE-2015-8716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8717/">CVE-2015-8717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8717">CVE-2015-8717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8718">CVE-2015-8718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8719/">CVE-2015-8719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8719">CVE-2015-8719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8720">CVE-2015-8720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8721">CVE-2015-8721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8722">CVE-2015-8722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8723">CVE-2015-8723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8724">CVE-2015-8724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8725">CVE-2015-8725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8726">CVE-2015-8726 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8727">CVE-2015-8727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8728">CVE-2015-8728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8729">CVE-2015-8729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8730">CVE-2015-8730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8731">CVE-2015-8731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8732">CVE-2015-8732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8733">CVE-2015-8733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2523/">CVE-2016-2523 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2523">CVE-2016-2523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2530/">CVE-2016-2530 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2530">CVE-2016-2530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2531/">CVE-2016-2531 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2531">CVE-2016-2531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2532/">CVE-2016-2532 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2532">CVE-2016-2532 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5350/">CVE-2016-5350 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5350">CVE-2016-5350 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5351/">CVE-2016-5351 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5351">CVE-2016-5351 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5352/">CVE-2016-5352 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5352">CVE-2016-5352 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5353/">CVE-2016-5353 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5353">CVE-2016-5353 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5354/">CVE-2016-5354 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5354">CVE-2016-5354 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5355/">CVE-2016-5355 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5355">CVE-2016-5355 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5356/">CVE-2016-5356 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5356">CVE-2016-5356 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5357/">CVE-2016-5357 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5357">CVE-2016-5357 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5358/">CVE-2016-5358 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5358">CVE-2016-5358 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5359/">CVE-2016-5359 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5359">CVE-2016-5359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6354">CVE-2016-6354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6504/">CVE-2016-6504 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6504">CVE-2016-6504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6505/">CVE-2016-6505 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6505">CVE-2016-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6506/">CVE-2016-6506 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6506">CVE-2016-6506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6507/">CVE-2016-6507 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6507">CVE-2016-6507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6508/">CVE-2016-6508 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6508">CVE-2016-6508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6509/">CVE-2016-6509 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6509">CVE-2016-6509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6510/">CVE-2016-6510 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6510">CVE-2016-6510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6511/">CVE-2016-6511 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6511">CVE-2016-6511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7175/">CVE-2016-7175 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7175">CVE-2016-7175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7176/">CVE-2016-7176 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7176">CVE-2016-7176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7177/">CVE-2016-7177 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7177">CVE-2016-7177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7178/">CVE-2016-7178 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7178">CVE-2016-7178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7179/">CVE-2016-7179 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7179">CVE-2016-7179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7180/">CVE-2016-7180 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7180">CVE-2016-7180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9373/">CVE-2016-9373 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9373">CVE-2016-9373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9374/">CVE-2016-9374 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9374">CVE-2016-9374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9375/">CVE-2016-9375 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9375">CVE-2016-9375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9376/">CVE-2016-9376 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9376">CVE-2016-9376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5596/">CVE-2017-5596 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5596">CVE-2017-5596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5597/">CVE-2017-5597 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5597">CVE-2017-5597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6014/">CVE-2017-6014 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6014">CVE-2017-6014 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7700/">CVE-2017-7700 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7700">CVE-2017-7700 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7701/">CVE-2017-7701 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7701">CVE-2017-7701 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7702/">CVE-2017-7702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7702">CVE-2017-7702 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7703/">CVE-2017-7703 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7703">CVE-2017-7703 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7704/">CVE-2017-7704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7704">CVE-2017-7704 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7705/">CVE-2017-7705 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7705">CVE-2017-7705 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7745/">CVE-2017-7745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7745">CVE-2017-7745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7746/">CVE-2017-7746 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7746">CVE-2017-7746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7747/">CVE-2017-7747 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7747">CVE-2017-7747 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7748/">CVE-2017-7748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7748">CVE-2017-7748 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9343/">CVE-2017-9343 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9343">CVE-2017-9343 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9344/">CVE-2017-9344 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9344">CVE-2017-9344 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9345/">CVE-2017-9345 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9345">CVE-2017-9345 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9346/">CVE-2017-9346 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9346">CVE-2017-9346 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9347/">CVE-2017-9347 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9347">CVE-2017-9347 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9348/">CVE-2017-9348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9348">CVE-2017-9348 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9349/">CVE-2017-9349 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9349">CVE-2017-9349 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9350/">CVE-2017-9350 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9350">CVE-2017-9350 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9351/">CVE-2017-9351 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9351">CVE-2017-9351 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9352/">CVE-2017-9352 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9352">CVE-2017-9352 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9353/">CVE-2017-9353 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9353">CVE-2017-9353 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9354/">CVE-2017-9354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9354">CVE-2017-9354 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009157263" comment="libwireshark8-2.2.7-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157264" comment="libwiretap6-2.2.7-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157265" comment="libwscodecs1-2.2.7-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157266" comment="libwsutil7-2.2.7-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157267" comment="wireshark-2.2.7-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157268" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148028" version="1" class="patch">
	<metadata>
		<title>libxcb-dri2-0-1.10-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>
These are all security issues fixed in the libxcb-dri2-0-1.10-3.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2064">CVE-2013-2064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141007" comment="libxcb-dri2-0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141008" comment="libxcb-dri2-0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141009" comment="libxcb-dri3-0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141010" comment="libxcb-dri3-0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141011" comment="libxcb-glx0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141012" comment="libxcb-glx0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141013" comment="libxcb-present0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141014" comment="libxcb-present0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141015" comment="libxcb-randr0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141016" comment="libxcb-render0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141017" comment="libxcb-render0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141018" comment="libxcb-shape0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141019" comment="libxcb-shm0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141020" comment="libxcb-shm0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141021" comment="libxcb-sync1-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141022" comment="libxcb-sync1-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141023" comment="libxcb-xf86dri0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141024" comment="libxcb-xfixes0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141025" comment="libxcb-xfixes0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141026" comment="libxcb-xinerama0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141027" comment="libxcb-xkb1-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141028" comment="libxcb-xkb1-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141029" comment="libxcb-xv0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141030" comment="libxcb1-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141031" comment="libxcb1-32bit-1.10-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148029" version="1" class="patch">
	<metadata>
		<title>libxerces-c-3_1-3.1.1-12.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-1885" ref_url="https://www.suse.com/security/cve/CVE-2009-1885/" source="CVE"/>
		<reference ref_id="CVE-2015-0252" ref_url="https://www.suse.com/security/cve/CVE-2015-0252/" source="CVE"/>
		<reference ref_id="CVE-2016-0729" ref_url="https://www.suse.com/security/cve/CVE-2016-0729/" source="CVE"/>
		<reference ref_id="CVE-2016-2099" ref_url="https://www.suse.com/security/cve/CVE-2016-2099/" source="CVE"/>
		<reference ref_id="CVE-2016-4463" ref_url="https://www.suse.com/security/cve/CVE-2016-4463/" source="CVE"/>
		<description>
These are all security issues fixed in the libxerces-c-3_1-3.1.1-12.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1885/">CVE-2009-1885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1885">CVE-2009-1885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0252/">CVE-2015-0252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0252">CVE-2015-0252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0729/">CVE-2016-0729 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0729">CVE-2016-0729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2099/">CVE-2016-2099 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2099">CVE-2016-2099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4463/">CVE-2016-4463 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4463">CVE-2016-4463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131022" comment="libxerces-c-3_1-3.1.1-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131023" comment="libxerces-c-3_1-32bit-3.1.1-12.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148030" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.9.4-45.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2010-4494" ref_url="https://www.suse.com/security/cve/CVE-2010-4494/" source="CVE"/>
		<reference ref_id="CVE-2011-1944" ref_url="https://www.suse.com/security/cve/CVE-2011-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2013-0338" ref_url="https://www.suse.com/security/cve/CVE-2013-0338/" source="CVE"/>
		<reference ref_id="CVE-2013-1969" ref_url="https://www.suse.com/security/cve/CVE-2013-1969/" source="CVE"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660/" source="CVE"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="CVE-2015-8710" ref_url="https://www.suse.com/security/cve/CVE-2015-8710/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1836" ref_url="https://www.suse.com/security/cve/CVE-2016-1836/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="CVE-2016-9597" ref_url="https://www.suse.com/security/cve/CVE-2016-9597/" source="CVE"/>
		<reference ref_id="CVE-2017-0663" ref_url="https://www.suse.com/security/cve/CVE-2017-0663/" source="CVE"/>
		<reference ref_id="CVE-2017-5969" ref_url="https://www.suse.com/security/cve/CVE-2017-5969/" source="CVE"/>
		<reference ref_id="CVE-2017-7375" ref_url="https://www.suse.com/security/cve/CVE-2017-7375/" source="CVE"/>
		<reference ref_id="CVE-2017-7376" ref_url="https://www.suse.com/security/cve/CVE-2017-7376/" source="CVE"/>
		<reference ref_id="CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047/" source="CVE"/>
		<reference ref_id="CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048/" source="CVE"/>
		<reference ref_id="CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049/" source="CVE"/>
		<reference ref_id="CVE-2017-9050" ref_url="https://www.suse.com/security/cve/CVE-2017-9050/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.9.4-45.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4225">CVE-2008-4225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4226">CVE-2008-4226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4409">CVE-2008-4409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4494/">CVE-2010-4494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4494">CVE-2010-4494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1944/">CVE-2011-1944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1944">CVE-2011-1944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5134">CVE-2012-5134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0338/">CVE-2013-0338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0338">CVE-2013-0338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1969/">CVE-2013-1969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1969">CVE-2013-1969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3660">CVE-2014-3660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1819">CVE-2015-1819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5312">CVE-2015-5312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7497">CVE-2015-7497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7498">CVE-2015-7498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7499">CVE-2015-7499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7500">CVE-2015-7500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7941">CVE-2015-7941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7942">CVE-2015-7942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8035">CVE-2015-8035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8241">CVE-2015-8241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8242">CVE-2015-8242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8317">CVE-2015-8317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8710/">CVE-2015-8710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8710">CVE-2015-8710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1762">CVE-2016-1762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1833">CVE-2016-1833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1834">CVE-2016-1834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1835">CVE-2016-1835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1836/">CVE-2016-1836 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1836">CVE-2016-1836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1837">CVE-2016-1837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1838">CVE-2016-1838 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1839">CVE-2016-1839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1840">CVE-2016-1840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3627">CVE-2016-3627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3705">CVE-2016-3705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4483">CVE-2016-4483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4658">CVE-2016-4658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9318">CVE-2016-9318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9597/">CVE-2016-9597 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9597">CVE-2016-9597 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0663/">CVE-2017-0663 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0663">CVE-2017-0663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5969/">CVE-2017-5969 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5969">CVE-2017-5969 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7375/">CVE-2017-7375 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7375">CVE-2017-7375 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7376/">CVE-2017-7376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7376">CVE-2017-7376 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9047">CVE-2017-9047 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9048">CVE-2017-9048 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9049">CVE-2017-9049 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9050/">CVE-2017-9050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9050">CVE-2017-9050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009157768" comment="libxml2-2-2.9.4-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157769" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157775" comment="libxml2-doc-2.9.4-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157770" comment="libxml2-tools-2.9.4-45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148031" version="1" class="patch">
	<metadata>
		<title>libxslt-tools-1.1.28-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-9019" ref_url="https://www.suse.com/security/cve/CVE-2015-9019/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<description>
These are all security issues fixed in the libxslt-tools-1.1.28-16.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7995">CVE-2015-7995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-9019/">CVE-2015-9019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-9019">CVE-2015-9019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4738">CVE-2016-4738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5029">CVE-2017-5029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155536" comment="libxslt-tools-1.1.28-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155537" comment="libxslt1-1.1.28-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155538" comment="libxslt1-32bit-1.1.28-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148032" version="1" class="patch">
	<metadata>
		<title>libyaml-0-2-0.1.6-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393/" source="CVE"/>
		<reference ref_id="CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525/" source="CVE"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>
These are all security issues fixed in the libyaml-0-2-0.1.6-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6393">CVE-2013-6393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2525">CVE-2014-2525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9130">CVE-2014-9130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141036" comment="libyaml-0-2-0.1.6-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148033" version="1" class="patch">
	<metadata>
		<title>libz1-1.2.8-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<description>
These are all security issues fixed in the libz1-1.2.8-11.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9840">CVE-2016-9840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9841">CVE-2016-9841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9842">CVE-2016-9842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009146180" comment="libz1-1.2.8-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009146181" comment="libz1-32bit-1.2.8-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512005" comment="zlib-devel-1.2.8-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148034" version="1" class="patch">
	<metadata>
		<title>libzip2-0.11.1-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2012-1162" ref_url="https://www.suse.com/security/cve/CVE-2012-1162/" source="CVE"/>
		<reference ref_id="CVE-2012-1163" ref_url="https://www.suse.com/security/cve/CVE-2012-1163/" source="CVE"/>
		<reference ref_id="CVE-2015-2331" ref_url="https://www.suse.com/security/cve/CVE-2015-2331/" source="CVE"/>
		<description>
These are all security issues fixed in the libzip2-0.11.1-12.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0421">CVE-2011-0421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1162/">CVE-2012-1162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1162">CVE-2012-1162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1163/">CVE-2012-1163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1163">CVE-2012-1163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2331/">CVE-2015-2331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2331">CVE-2015-2331 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141037" comment="libzip2-0.11.1-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148035" version="1" class="patch">
	<metadata>
		<title>logrotate-3.11.0-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1098" ref_url="https://www.suse.com/security/cve/CVE-2011-1098/" source="CVE"/>
		<reference ref_id="CVE-2011-1154" ref_url="https://www.suse.com/security/cve/CVE-2011-1154/" source="CVE"/>
		<reference ref_id="CVE-2011-1155" ref_url="https://www.suse.com/security/cve/CVE-2011-1155/" source="CVE"/>
		<description>
These are all security issues fixed in the logrotate-3.11.0-1.15 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1098/">CVE-2011-1098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1098">CVE-2011-1098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1154/">CVE-2011-1154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1154">CVE-2011-1154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1155/">CVE-2011-1155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1155">CVE-2011-1155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159250" comment="logrotate-3.11.0-1.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148036" version="1" class="patch">
	<metadata>
		<title>logwatch-7.4.3-15.65 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1018" ref_url="https://www.suse.com/security/cve/CVE-2011-1018/" source="CVE"/>
		<description>
These are all security issues fixed in the logwatch-7.4.3-15.65 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1018/">CVE-2011-1018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1018">CVE-2011-1018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141039" comment="logwatch-7.4.3-15.65 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148037" version="1" class="patch">
	<metadata>
		<title>mailman-2.1.17-1.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0707" ref_url="https://www.suse.com/security/cve/CVE-2011-0707/" source="CVE"/>
		<description>
These are all security issues fixed in the mailman-2.1.17-1.18 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0707/">CVE-2011-0707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0707">CVE-2011-0707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141040" comment="mailman-2.1.17-1.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148038" version="1" class="patch">
	<metadata>
		<title>mailx-12.5-28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2004-2771" ref_url="https://www.suse.com/security/cve/CVE-2004-2771/" source="CVE"/>
		<reference ref_id="CVE-2014-7844" ref_url="https://www.suse.com/security/cve/CVE-2014-7844/" source="CVE"/>
		<description>
These are all security issues fixed in the mailx-12.5-28.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2004-2771/">CVE-2004-2771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-2771">CVE-2004-2771 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-7844/">CVE-2014-7844 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7844">CVE-2014-7844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141041" comment="mailx-12.5-28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148039" version="1" class="patch">
	<metadata>
		<title>memcached-1.4.33-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-1494" ref_url="https://www.suse.com/security/cve/CVE-2009-1494/" source="CVE"/>
		<reference ref_id="CVE-2011-4971" ref_url="https://www.suse.com/security/cve/CVE-2011-4971/" source="CVE"/>
		<reference ref_id="CVE-2013-0179" ref_url="https://www.suse.com/security/cve/CVE-2013-0179/" source="CVE"/>
		<reference ref_id="CVE-2013-7239" ref_url="https://www.suse.com/security/cve/CVE-2013-7239/" source="CVE"/>
		<reference ref_id="CVE-2013-7290" ref_url="https://www.suse.com/security/cve/CVE-2013-7290/" source="CVE"/>
		<reference ref_id="CVE-2013-7291" ref_url="https://www.suse.com/security/cve/CVE-2013-7291/" source="CVE"/>
		<reference ref_id="CVE-2016-8704" ref_url="https://www.suse.com/security/cve/CVE-2016-8704/" source="CVE"/>
		<reference ref_id="CVE-2016-8705" ref_url="https://www.suse.com/security/cve/CVE-2016-8705/" source="CVE"/>
		<reference ref_id="CVE-2016-8706" ref_url="https://www.suse.com/security/cve/CVE-2016-8706/" source="CVE"/>
		<description>
These are all security issues fixed in the memcached-1.4.33-3.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1494/">CVE-2009-1494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1494">CVE-2009-1494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4971/">CVE-2011-4971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4971">CVE-2011-4971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0179/">CVE-2013-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0179">CVE-2013-0179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7239/">CVE-2013-7239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7239">CVE-2013-7239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7290/">CVE-2013-7290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7290">CVE-2013-7290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7291/">CVE-2013-7291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7291">CVE-2013-7291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8704/">CVE-2016-8704 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8704">CVE-2016-8704 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8705/">CVE-2016-8705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8705">CVE-2016-8705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8706/">CVE-2016-8706 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8706">CVE-2016-8706 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159251" comment="memcached-1.4.33-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148040" version="1" class="patch">
	<metadata>
		<title>minicom-2.7-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2017-7467" ref_url="https://www.suse.com/security/cve/CVE-2017-7467/" source="CVE"/>
		<description>
These are all security issues fixed in the minicom-2.7-3.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7467/">CVE-2017-7467 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7467">CVE-2017-7467 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154609" comment="minicom-2.7-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148041" version="1" class="patch">
	<metadata>
		<title>mipv6d-2.0.2.umip.0.4-19.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2522" ref_url="https://www.suse.com/security/cve/CVE-2010-2522/" source="CVE"/>
		<reference ref_id="CVE-2010-2523" ref_url="https://www.suse.com/security/cve/CVE-2010-2523/" source="CVE"/>
		<description>
These are all security issues fixed in the mipv6d-2.0.2.umip.0.4-19.63 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2522/">CVE-2010-2522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2522">CVE-2010-2522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2523/">CVE-2010-2523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2523">CVE-2010-2523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141042" comment="mipv6d-2.0.2.umip.0.4-19.77 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148042" version="1" class="patch">
	<metadata>
		<title>mozilla-nspr-32bit-4.13.1-18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-nspr-32bit-4.13.1-18.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1545">CVE-2014-1545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7183">CVE-2015-7183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155320" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155321" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148043" version="1" class="patch">
	<metadata>
		<title>mutt-1.6.0-54.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-0467" ref_url="https://www.suse.com/security/cve/CVE-2014-0467/" source="CVE"/>
		<reference ref_id="CVE-2014-9116" ref_url="https://www.suse.com/security/cve/CVE-2014-9116/" source="CVE"/>
		<description>
These are all security issues fixed in the mutt-1.6.0-54.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0467/">CVE-2014-0467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0467">CVE-2014-0467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9116/">CVE-2014-9116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9116">CVE-2014-9116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141043" comment="mutt-1.6.0-54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148044" version="1" class="patch">
	<metadata>
		<title>ntp-4.2.8p10-63.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0159" ref_url="https://www.suse.com/security/cve/CVE-2009-0159/" source="CVE"/>
		<reference ref_id="CVE-2009-1252" ref_url="https://www.suse.com/security/cve/CVE-2009-1252/" source="CVE"/>
		<reference ref_id="CVE-2013-5211" ref_url="https://www.suse.com/security/cve/CVE-2013-5211/" source="CVE"/>
		<reference ref_id="CVE-2014-9293" ref_url="https://www.suse.com/security/cve/CVE-2014-9293/" source="CVE"/>
		<reference ref_id="CVE-2014-9294" ref_url="https://www.suse.com/security/cve/CVE-2014-9294/" source="CVE"/>
		<reference ref_id="CVE-2014-9295" ref_url="https://www.suse.com/security/cve/CVE-2014-9295/" source="CVE"/>
		<reference ref_id="CVE-2014-9296" ref_url="https://www.suse.com/security/cve/CVE-2014-9296/" source="CVE"/>
		<reference ref_id="CVE-2014-9297" ref_url="https://www.suse.com/security/cve/CVE-2014-9297/" source="CVE"/>
		<reference ref_id="CVE-2014-9298" ref_url="https://www.suse.com/security/cve/CVE-2014-9298/" source="CVE"/>
		<reference ref_id="CVE-2015-1798" ref_url="https://www.suse.com/security/cve/CVE-2015-1798/" source="CVE"/>
		<reference ref_id="CVE-2015-1799" ref_url="https://www.suse.com/security/cve/CVE-2015-1799/" source="CVE"/>
		<reference ref_id="CVE-2015-3405" ref_url="https://www.suse.com/security/cve/CVE-2015-3405/" source="CVE"/>
		<reference ref_id="CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219/" source="CVE"/>
		<reference ref_id="CVE-2015-5300" ref_url="https://www.suse.com/security/cve/CVE-2015-5300/" source="CVE"/>
		<reference ref_id="CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691/" source="CVE"/>
		<reference ref_id="CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692/" source="CVE"/>
		<reference ref_id="CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701/" source="CVE"/>
		<reference ref_id="CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702/" source="CVE"/>
		<reference ref_id="CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703/" source="CVE"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7848" ref_url="https://www.suse.com/security/cve/CVE-2015-7848/" source="CVE"/>
		<reference ref_id="CVE-2015-7849" ref_url="https://www.suse.com/security/cve/CVE-2015-7849/" source="CVE"/>
		<reference ref_id="CVE-2015-7850" ref_url="https://www.suse.com/security/cve/CVE-2015-7850/" source="CVE"/>
		<reference ref_id="CVE-2015-7851" ref_url="https://www.suse.com/security/cve/CVE-2015-7851/" source="CVE"/>
		<reference ref_id="CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852/" source="CVE"/>
		<reference ref_id="CVE-2015-7853" ref_url="https://www.suse.com/security/cve/CVE-2015-7853/" source="CVE"/>
		<reference ref_id="CVE-2015-7854" ref_url="https://www.suse.com/security/cve/CVE-2015-7854/" source="CVE"/>
		<reference ref_id="CVE-2015-7855" ref_url="https://www.suse.com/security/cve/CVE-2015-7855/" source="CVE"/>
		<reference ref_id="CVE-2015-7871" ref_url="https://www.suse.com/security/cve/CVE-2015-7871/" source="CVE"/>
		<reference ref_id="CVE-2015-7973" ref_url="https://www.suse.com/security/cve/CVE-2015-7973/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2015-7975" ref_url="https://www.suse.com/security/cve/CVE-2015-7975/" source="CVE"/>
		<reference ref_id="CVE-2015-7976" ref_url="https://www.suse.com/security/cve/CVE-2015-7976/" source="CVE"/>
		<reference ref_id="CVE-2015-7977" ref_url="https://www.suse.com/security/cve/CVE-2015-7977/" source="CVE"/>
		<reference ref_id="CVE-2015-7978" ref_url="https://www.suse.com/security/cve/CVE-2015-7978/" source="CVE"/>
		<reference ref_id="CVE-2015-7979" ref_url="https://www.suse.com/security/cve/CVE-2015-7979/" source="CVE"/>
		<reference ref_id="CVE-2015-8138" ref_url="https://www.suse.com/security/cve/CVE-2015-8138/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2015-8158" ref_url="https://www.suse.com/security/cve/CVE-2015-8158/" source="CVE"/>
		<reference ref_id="CVE-2016-1547" ref_url="https://www.suse.com/security/cve/CVE-2016-1547/" source="CVE"/>
		<reference ref_id="CVE-2016-1548" ref_url="https://www.suse.com/security/cve/CVE-2016-1548/" source="CVE"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2016-1550" ref_url="https://www.suse.com/security/cve/CVE-2016-1550/" source="CVE"/>
		<reference ref_id="CVE-2016-1551" ref_url="https://www.suse.com/security/cve/CVE-2016-1551/" source="CVE"/>
		<reference ref_id="CVE-2016-2516" ref_url="https://www.suse.com/security/cve/CVE-2016-2516/" source="CVE"/>
		<reference ref_id="CVE-2016-2517" ref_url="https://www.suse.com/security/cve/CVE-2016-2517/" source="CVE"/>
		<reference ref_id="CVE-2016-2518" ref_url="https://www.suse.com/security/cve/CVE-2016-2518/" source="CVE"/>
		<reference ref_id="CVE-2016-2519" ref_url="https://www.suse.com/security/cve/CVE-2016-2519/" source="CVE"/>
		<reference ref_id="CVE-2016-4953" ref_url="https://www.suse.com/security/cve/CVE-2016-4953/" source="CVE"/>
		<reference ref_id="CVE-2016-4954" ref_url="https://www.suse.com/security/cve/CVE-2016-4954/" source="CVE"/>
		<reference ref_id="CVE-2016-4955" ref_url="https://www.suse.com/security/cve/CVE-2016-4955/" source="CVE"/>
		<reference ref_id="CVE-2016-4956" ref_url="https://www.suse.com/security/cve/CVE-2016-4956/" source="CVE"/>
		<reference ref_id="CVE-2016-4957" ref_url="https://www.suse.com/security/cve/CVE-2016-4957/" source="CVE"/>
		<reference ref_id="CVE-2016-7426" ref_url="https://www.suse.com/security/cve/CVE-2016-7426/" source="CVE"/>
		<reference ref_id="CVE-2016-7427" ref_url="https://www.suse.com/security/cve/CVE-2016-7427/" source="CVE"/>
		<reference ref_id="CVE-2016-7428" ref_url="https://www.suse.com/security/cve/CVE-2016-7428/" source="CVE"/>
		<reference ref_id="CVE-2016-7429" ref_url="https://www.suse.com/security/cve/CVE-2016-7429/" source="CVE"/>
		<reference ref_id="CVE-2016-7431" ref_url="https://www.suse.com/security/cve/CVE-2016-7431/" source="CVE"/>
		<reference ref_id="CVE-2016-7433" ref_url="https://www.suse.com/security/cve/CVE-2016-7433/" source="CVE"/>
		<reference ref_id="CVE-2016-7434" ref_url="https://www.suse.com/security/cve/CVE-2016-7434/" source="CVE"/>
		<reference ref_id="CVE-2016-9042" ref_url="https://www.suse.com/security/cve/CVE-2016-9042/" source="CVE"/>
		<reference ref_id="CVE-2016-9310" ref_url="https://www.suse.com/security/cve/CVE-2016-9310/" source="CVE"/>
		<reference ref_id="CVE-2016-9311" ref_url="https://www.suse.com/security/cve/CVE-2016-9311/" source="CVE"/>
		<reference ref_id="CVE-2017-6451" ref_url="https://www.suse.com/security/cve/CVE-2017-6451/" source="CVE"/>
		<reference ref_id="CVE-2017-6458" ref_url="https://www.suse.com/security/cve/CVE-2017-6458/" source="CVE"/>
		<reference ref_id="CVE-2017-6460" ref_url="https://www.suse.com/security/cve/CVE-2017-6460/" source="CVE"/>
		<reference ref_id="CVE-2017-6462" ref_url="https://www.suse.com/security/cve/CVE-2017-6462/" source="CVE"/>
		<reference ref_id="CVE-2017-6463" ref_url="https://www.suse.com/security/cve/CVE-2017-6463/" source="CVE"/>
		<reference ref_id="CVE-2017-6464" ref_url="https://www.suse.com/security/cve/CVE-2017-6464/" source="CVE"/>
		<description>
These are all security issues fixed in the ntp-4.2.8p10-63.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0159/">CVE-2009-0159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0159">CVE-2009-0159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1252/">CVE-2009-1252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1252">CVE-2009-1252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5211/">CVE-2013-5211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5211">CVE-2013-5211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9293/">CVE-2014-9293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9293">CVE-2014-9293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9294/">CVE-2014-9294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9294">CVE-2014-9294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9295/">CVE-2014-9295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9295">CVE-2014-9295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9296/">CVE-2014-9296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9296">CVE-2014-9296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9297/">CVE-2014-9297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9297">CVE-2014-9297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9298/">CVE-2014-9298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9298">CVE-2014-9298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1798/">CVE-2015-1798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1798">CVE-2015-1798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1799/">CVE-2015-1799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1799">CVE-2015-1799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3405/">CVE-2015-3405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3405">CVE-2015-3405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5219">CVE-2015-5219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5300/">CVE-2015-5300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5300">CVE-2015-5300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7691">CVE-2015-7691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7692">CVE-2015-7692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7701">CVE-2015-7701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7702">CVE-2015-7702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7703">CVE-2015-7703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7704">CVE-2015-7704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7705">CVE-2015-7705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7848/">CVE-2015-7848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7848">CVE-2015-7848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7849/">CVE-2015-7849 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7849">CVE-2015-7849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7850/">CVE-2015-7850 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7850">CVE-2015-7850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7851/">CVE-2015-7851 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7851">CVE-2015-7851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7852">CVE-2015-7852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7853/">CVE-2015-7853 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7853">CVE-2015-7853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7854/">CVE-2015-7854 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7854">CVE-2015-7854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7855/">CVE-2015-7855 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7855">CVE-2015-7855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7871/">CVE-2015-7871 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7871">CVE-2015-7871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7973/">CVE-2015-7973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7973">CVE-2015-7973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7974">CVE-2015-7974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7975/">CVE-2015-7975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7975">CVE-2015-7975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7976/">CVE-2015-7976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7976">CVE-2015-7976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7977/">CVE-2015-7977 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7977">CVE-2015-7977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7978/">CVE-2015-7978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7978">CVE-2015-7978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7979/">CVE-2015-7979 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7979">CVE-2015-7979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8138/">CVE-2015-8138 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8138">CVE-2015-8138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8139">CVE-2015-8139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8140">CVE-2015-8140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8158/">CVE-2015-8158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8158">CVE-2015-8158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1547/">CVE-2016-1547 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1547">CVE-2016-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1548/">CVE-2016-1548 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1548">CVE-2016-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1549">CVE-2016-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1550/">CVE-2016-1550 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1550">CVE-2016-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1551/">CVE-2016-1551 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1551">CVE-2016-1551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2516/">CVE-2016-2516 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2516">CVE-2016-2516 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2517/">CVE-2016-2517 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2517">CVE-2016-2517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2518/">CVE-2016-2518 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2518">CVE-2016-2518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2519/">CVE-2016-2519 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2519">CVE-2016-2519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4953/">CVE-2016-4953 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4953">CVE-2016-4953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4954/">CVE-2016-4954 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4954">CVE-2016-4954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4955/">CVE-2016-4955 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4955">CVE-2016-4955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4956/">CVE-2016-4956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4956">CVE-2016-4956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4957/">CVE-2016-4957 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4957">CVE-2016-4957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7426/">CVE-2016-7426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7426">CVE-2016-7426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7427/">CVE-2016-7427 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7427">CVE-2016-7427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7428/">CVE-2016-7428 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7428">CVE-2016-7428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7429/">CVE-2016-7429 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7429">CVE-2016-7429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7431/">CVE-2016-7431 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7431">CVE-2016-7431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7433/">CVE-2016-7433 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7433">CVE-2016-7433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7434/">CVE-2016-7434 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7434">CVE-2016-7434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9042/">CVE-2016-9042 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9042">CVE-2016-9042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9310/">CVE-2016-9310 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9310">CVE-2016-9310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9311/">CVE-2016-9311 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9311">CVE-2016-9311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6451/">CVE-2017-6451 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6451">CVE-2017-6451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6458/">CVE-2017-6458 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6458">CVE-2017-6458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6460/">CVE-2017-6460 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6460">CVE-2017-6460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6462/">CVE-2017-6462 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6462">CVE-2017-6462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6463/">CVE-2017-6463 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6463">CVE-2017-6463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6464/">CVE-2017-6464 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6464">CVE-2017-6464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159252" comment="ntp-4.2.8p10-63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159253" comment="ntp-doc-4.2.8p10-63.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148045" version="1" class="patch">
	<metadata>
		<title>opensc-0.13.0-1.107 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0368" ref_url="https://www.suse.com/security/cve/CVE-2009-0368/" source="CVE"/>
		<reference ref_id="CVE-2010-4523" ref_url="https://www.suse.com/security/cve/CVE-2010-4523/" source="CVE"/>
		<description>
These are all security issues fixed in the opensc-0.13.0-1.107 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0368/">CVE-2009-0368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0368">CVE-2009-0368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4523/">CVE-2010-4523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4523">CVE-2010-4523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141044" comment="opensc-0.13.0-1.122 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148046" version="1" class="patch">
	<metadata>
		<title>openslp-2.0.0-17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609/" source="CVE"/>
		<reference ref_id="CVE-2016-4912" ref_url="https://www.suse.com/security/cve/CVE-2016-4912/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2016-7567" ref_url="https://www.suse.com/security/cve/CVE-2016-7567/" source="CVE"/>
		<description>
These are all security issues fixed in the openslp-2.0.0-17.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3609">CVE-2010-3609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4912/">CVE-2016-4912 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4912">CVE-2016-4912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6354">CVE-2016-6354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7567/">CVE-2016-7567 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7567">CVE-2016-7567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131298" comment="openslp-2.0.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131299" comment="openslp-32bit-2.0.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131966" comment="openslp-server-2.0.0-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148047" version="1" class="patch">
	<metadata>
		<title>openssh-7.2p2-69.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-2653" ref_url="https://www.suse.com/security/cve/CVE-2014-2653/" source="CVE"/>
		<reference ref_id="CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352/" source="CVE"/>
		<reference ref_id="CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600/" source="CVE"/>
		<reference ref_id="CVE-2015-6563" ref_url="https://www.suse.com/security/cve/CVE-2015-6563/" source="CVE"/>
		<reference ref_id="CVE-2015-6564" ref_url="https://www.suse.com/security/cve/CVE-2015-6564/" source="CVE"/>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009/" source="CVE"/>
		<reference ref_id="CVE-2016-10010" ref_url="https://www.suse.com/security/cve/CVE-2016-10010/" source="CVE"/>
		<reference ref_id="CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011/" source="CVE"/>
		<reference ref_id="CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012/" source="CVE"/>
		<reference ref_id="CVE-2016-1908" ref_url="https://www.suse.com/security/cve/CVE-2016-1908/" source="CVE"/>
		<reference ref_id="CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115/" source="CVE"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-7.2p2-69.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2653/">CVE-2014-2653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2653">CVE-2014-2653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5352">CVE-2015-5352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5600">CVE-2015-5600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6563/">CVE-2015-6563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6563">CVE-2015-6563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6564/">CVE-2015-6564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6564">CVE-2015-6564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8325">CVE-2015-8325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0777">CVE-2016-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0778">CVE-2016-0778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10009">CVE-2016-10009 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10010/">CVE-2016-10010 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10010">CVE-2016-10010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10011">CVE-2016-10011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10012">CVE-2016-10012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1908/">CVE-2016-1908 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1908">CVE-2016-1908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3115">CVE-2016-3115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6210">CVE-2016-6210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6515">CVE-2016-6515 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8858">CVE-2016-8858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159254" comment="openssh-7.2p2-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159255" comment="openssh-fips-7.2p2-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159256" comment="openssh-helpers-7.2p2-69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148048" version="1" class="patch">
	<metadata>
		<title>openvpn-2.3.8-16.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-8104" ref_url="https://www.suse.com/security/cve/CVE-2014-8104/" source="CVE"/>
		<reference ref_id="CVE-2016-6329" ref_url="https://www.suse.com/security/cve/CVE-2016-6329/" source="CVE"/>
		<reference ref_id="CVE-2017-7478" ref_url="https://www.suse.com/security/cve/CVE-2017-7478/" source="CVE"/>
		<reference ref_id="CVE-2017-7479" ref_url="https://www.suse.com/security/cve/CVE-2017-7479/" source="CVE"/>
		<reference ref_id="CVE-2017-7508" ref_url="https://www.suse.com/security/cve/CVE-2017-7508/" source="CVE"/>
		<reference ref_id="CVE-2017-7520" ref_url="https://www.suse.com/security/cve/CVE-2017-7520/" source="CVE"/>
		<reference ref_id="CVE-2017-7521" ref_url="https://www.suse.com/security/cve/CVE-2017-7521/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.3.8-16.17.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8104/">CVE-2014-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8104">CVE-2014-8104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6329/">CVE-2016-6329 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6329">CVE-2016-6329 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7478/">CVE-2017-7478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7478">CVE-2017-7478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7479/">CVE-2017-7479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7479">CVE-2017-7479 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7508/">CVE-2017-7508 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7508">CVE-2017-7508 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7520/">CVE-2017-7520 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7520">CVE-2017-7520 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7521/">CVE-2017-7521 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7521">CVE-2017-7521 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009157217" comment="openvpn-2.3.8-16.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157218" comment="openvpn-auth-pam-plugin-2.3.8-16.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148049" version="1" class="patch">
	<metadata>
		<title>openvswitch-2.7.0-2.29 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-3449" ref_url="https://www.suse.com/security/cve/CVE-2012-3449/" source="CVE"/>
		<description>
These are all security issues fixed in the openvswitch-2.7.0-2.29 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3449/">CVE-2012-3449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3449">CVE-2012-3449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159257" comment="openvswitch-2.7.0-2.29 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148050" version="1" class="patch">
	<metadata>
		<title>opie-2.4-724.56 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2489" ref_url="https://www.suse.com/security/cve/CVE-2011-2489/" source="CVE"/>
		<reference ref_id="CVE-2011-2490" ref_url="https://www.suse.com/security/cve/CVE-2011-2490/" source="CVE"/>
		<description>
These are all security issues fixed in the opie-2.4-724.56 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2489/">CVE-2011-2489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2489">CVE-2011-2489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2490/">CVE-2011-2490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2490">CVE-2011-2490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141054" comment="opie-2.4-724.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141055" comment="opie-32bit-2.4-724.65 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148051" version="1" class="patch">
	<metadata>
		<title>p7zip-9.20.1-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-1038" ref_url="https://www.suse.com/security/cve/CVE-2015-1038/" source="CVE"/>
		<reference ref_id="CVE-2016-2335" ref_url="https://www.suse.com/security/cve/CVE-2016-2335/" source="CVE"/>
		<description>
These are all security issues fixed in the p7zip-9.20.1-6.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1038/">CVE-2015-1038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1038">CVE-2015-1038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2335/">CVE-2016-2335 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2335">CVE-2016-2335 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128891" comment="p7zip-9.20.1-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148052" version="1" class="patch">
	<metadata>
		<title>pam-1.1.8-23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-3430" ref_url="https://www.suse.com/security/cve/CVE-2010-3430/" source="CVE"/>
		<reference ref_id="CVE-2010-3431" ref_url="https://www.suse.com/security/cve/CVE-2010-3431/" source="CVE"/>
		<reference ref_id="CVE-2010-3853" ref_url="https://www.suse.com/security/cve/CVE-2010-3853/" source="CVE"/>
		<reference ref_id="CVE-2011-3148" ref_url="https://www.suse.com/security/cve/CVE-2011-3148/" source="CVE"/>
		<reference ref_id="CVE-2011-3149" ref_url="https://www.suse.com/security/cve/CVE-2011-3149/" source="CVE"/>
		<reference ref_id="CVE-2014-2583" ref_url="https://www.suse.com/security/cve/CVE-2014-2583/" source="CVE"/>
		<reference ref_id="CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.1.8-23.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3430/">CVE-2010-3430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3430">CVE-2010-3430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3431/">CVE-2010-3431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3431">CVE-2010-3431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3853/">CVE-2010-3853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3853">CVE-2010-3853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3148/">CVE-2011-3148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3148">CVE-2011-3148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3149/">CVE-2011-3149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3149">CVE-2011-3149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2583/">CVE-2014-2583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2583">CVE-2014-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3238">CVE-2015-3238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155972" comment="pam-1.1.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155973" comment="pam-32bit-1.1.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155974" comment="pam-doc-1.1.8-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148053" version="1" class="patch">
	<metadata>
		<title>pam-modules-12.1-23.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3172" ref_url="https://www.suse.com/security/cve/CVE-2011-3172/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-modules-12.1-23.12 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3172/">CVE-2011-3172 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3172">CVE-2011-3172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141059" comment="pam-modules-12.1-23.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141060" comment="pam-modules-32bit-12.1-23.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148054" version="1" class="patch">
	<metadata>
		<title>pam_krb5-2.4.4-4.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-3825" ref_url="https://www.suse.com/security/cve/CVE-2008-3825/" source="CVE"/>
		<reference ref_id="CVE-2009-1384" ref_url="https://www.suse.com/security/cve/CVE-2009-1384/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_krb5-2.4.4-4.4 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3825/">CVE-2008-3825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3825">CVE-2008-3825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1384/">CVE-2009-1384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1384">CVE-2009-1384 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141061" comment="pam_krb5-2.4.4-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141062" comment="pam_krb5-32bit-2.4.4-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148055" version="1" class="patch">
	<metadata>
		<title>pam_ssh-2.0-1.39 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-1273" ref_url="https://www.suse.com/security/cve/CVE-2009-1273/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_ssh-2.0-1.39 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1273/">CVE-2009-1273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1273">CVE-2009-1273 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141063" comment="pam_ssh-2.0-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141064" comment="pam_ssh-32bit-2.0-1.40 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148056" version="1" class="patch">
	<metadata>
		<title>patch-2.7.5-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-4651" ref_url="https://www.suse.com/security/cve/CVE-2010-4651/" source="CVE"/>
		<reference ref_id="CVE-2015-1196" ref_url="https://www.suse.com/security/cve/CVE-2015-1196/" source="CVE"/>
		<reference ref_id="CVE-2015-1395" ref_url="https://www.suse.com/security/cve/CVE-2015-1395/" source="CVE"/>
		<reference ref_id="CVE-2015-1396" ref_url="https://www.suse.com/security/cve/CVE-2015-1396/" source="CVE"/>
		<description>
These are all security issues fixed in the patch-2.7.5-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4651/">CVE-2010-4651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4651">CVE-2010-4651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1196/">CVE-2015-1196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1196">CVE-2015-1196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1395/">CVE-2015-1395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1395">CVE-2015-1395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1396/">CVE-2015-1396 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1396">CVE-2015-1396 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110205" comment="patch-2.7.5-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148057" version="1" class="patch">
	<metadata>
		<title>pcsc-ccid-1.4.25-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-4530" ref_url="https://www.suse.com/security/cve/CVE-2010-4530/" source="CVE"/>
		<description>
These are all security issues fixed in the pcsc-ccid-1.4.25-4.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4530/">CVE-2010-4530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4530">CVE-2010-4530 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159258" comment="pcsc-ccid-1.4.25-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148058" version="1" class="patch">
	<metadata>
		<title>perl-32bit-5.18.2-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2761" ref_url="https://www.suse.com/security/cve/CVE-2010-2761/" source="CVE"/>
		<reference ref_id="CVE-2010-4410" ref_url="https://www.suse.com/security/cve/CVE-2010-4410/" source="CVE"/>
		<reference ref_id="CVE-2010-4411" ref_url="https://www.suse.com/security/cve/CVE-2010-4411/" source="CVE"/>
		<reference ref_id="CVE-2010-4777" ref_url="https://www.suse.com/security/cve/CVE-2010-4777/" source="CVE"/>
		<reference ref_id="CVE-2015-8853" ref_url="https://www.suse.com/security/cve/CVE-2015-8853/" source="CVE"/>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<reference ref_id="CVE-2016-2381" ref_url="https://www.suse.com/security/cve/CVE-2016-2381/" source="CVE"/>
		<reference ref_id="CVE-2016-6185" ref_url="https://www.suse.com/security/cve/CVE-2016-6185/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-32bit-5.18.2-11.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2761/">CVE-2010-2761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2761">CVE-2010-2761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4410/">CVE-2010-4410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4410">CVE-2010-4410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4411/">CVE-2010-4411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4411">CVE-2010-4411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4777/">CVE-2010-4777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4777">CVE-2010-4777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8853/">CVE-2015-8853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8853">CVE-2015-8853 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1238">CVE-2016-1238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2381/">CVE-2016-2381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2381">CVE-2016-2381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6185/">CVE-2016-6185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6185">CVE-2016-6185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131038" comment="perl-5.18.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131039" comment="perl-32bit-5.18.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131040" comment="perl-base-5.18.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131041" comment="perl-doc-5.18.2-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148059" version="1" class="patch">
	<metadata>
		<title>perl-Config-IniFiles-2.82-3.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2451" ref_url="https://www.suse.com/security/cve/CVE-2012-2451/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Config-IniFiles-2.82-3.12 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2451/">CVE-2012-2451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2451">CVE-2012-2451 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141066" comment="perl-Config-IniFiles-2.82-3.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148060" version="1" class="patch">
	<metadata>
		<title>perl-DBD-mysql-4.021-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-1246" ref_url="https://www.suse.com/security/cve/CVE-2016-1246/" source="CVE"/>
		<reference ref_id="CVE-2016-1249" ref_url="https://www.suse.com/security/cve/CVE-2016-1249/" source="CVE"/>
		<reference ref_id="CVE-2016-1251" ref_url="https://www.suse.com/security/cve/CVE-2016-1251/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-DBD-mysql-4.021-11.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1246/">CVE-2016-1246 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1246">CVE-2016-1246 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1249/">CVE-2016-1249 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1249">CVE-2016-1249 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1251/">CVE-2016-1251 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1251">CVE-2016-1251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009146969" comment="perl-DBD-mysql-4.021-11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148061" version="1" class="patch">
	<metadata>
		<title>perl-HTML-Parser-3.71-1.145 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTML-Parser-3.71-1.145 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3627">CVE-2009-3627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141067" comment="perl-HTML-Parser-3.71-1.178 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148062" version="1" class="patch">
	<metadata>
		<title>perl-LWP-Protocol-https-6.04-5.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3230" ref_url="https://www.suse.com/security/cve/CVE-2014-3230/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-LWP-Protocol-https-6.04-5.4 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3230/">CVE-2014-3230 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3230">CVE-2014-3230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141068" comment="perl-LWP-Protocol-https-6.04-5.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148063" version="1" class="patch">
	<metadata>
		<title>perl-Tk-804.031-3.76 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-4484" ref_url="https://www.suse.com/security/cve/CVE-2006-4484/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Tk-804.031-3.76 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4484/">CVE-2006-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4484">CVE-2006-4484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141069" comment="perl-Tk-804.031-3.82 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148064" version="1" class="patch">
	<metadata>
		<title>perl-XML-LibXML-2.0019-5.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-3451" ref_url="https://www.suse.com/security/cve/CVE-2015-3451/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-XML-LibXML-2.0019-5.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3451/">CVE-2015-3451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3451">CVE-2015-3451 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113959" comment="perl-XML-LibXML-2.0019-5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148065" version="1" class="patch">
	<metadata>
		<title>perl-YAML-LibYAML-0.38-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-1152" ref_url="https://www.suse.com/security/cve/CVE-2012-1152/" source="CVE"/>
		<reference ref_id="CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393/" source="CVE"/>
		<reference ref_id="CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525/" source="CVE"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-YAML-LibYAML-0.38-10.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1152/">CVE-2012-1152 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1152">CVE-2012-1152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6393">CVE-2013-6393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2525">CVE-2014-2525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9130">CVE-2014-9130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109959" comment="perl-YAML-LibYAML-0.38-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148066" version="1" class="patch">
	<metadata>
		<title>pigz-2.3-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-1191" ref_url="https://www.suse.com/security/cve/CVE-2015-1191/" source="CVE"/>
		<description>
These are all security issues fixed in the pigz-2.3-5.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1191/">CVE-2015-1191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1191">CVE-2015-1191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108432" comment="pigz-2.3-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148067" version="1" class="patch">
	<metadata>
		<title>policycoreutils-2.5-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-7545" ref_url="https://www.suse.com/security/cve/CVE-2016-7545/" source="CVE"/>
		<description>
These are all security issues fixed in the policycoreutils-2.5-9.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7545/">CVE-2016-7545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7545">CVE-2016-7545 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159259" comment="policycoreutils-2.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159260" comment="policycoreutils-python-2.5-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148068" version="1" class="patch">
	<metadata>
		<title>powerpc-utils-1.3.3-5.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-4040" ref_url="https://www.suse.com/security/cve/CVE-2014-4040/" source="CVE"/>
		<description>
These are all security issues fixed in the powerpc-utils-1.3.3-5.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4040/">CVE-2014-4040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4040">CVE-2014-4040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159261" comment="powerpc-utils-1.3.3-5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148069" version="1" class="patch">
	<metadata>
		<title>ppc64-diag-2.7.3-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-4038" ref_url="https://www.suse.com/security/cve/CVE-2014-4038/" source="CVE"/>
		<reference ref_id="CVE-2014-4039" ref_url="https://www.suse.com/security/cve/CVE-2014-4039/" source="CVE"/>
		<description>
These are all security issues fixed in the ppc64-diag-2.7.3-1.17 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4038/">CVE-2014-4038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4038">CVE-2014-4038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4039/">CVE-2014-4039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4039">CVE-2014-4039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159262" comment="ppc64-diag-2.7.3-1.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148070" version="1" class="patch">
	<metadata>
		<title>ppp-2.4.7-3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158/" source="CVE"/>
		<reference ref_id="CVE-2015-3310" ref_url="https://www.suse.com/security/cve/CVE-2015-3310/" source="CVE"/>
		<description>
These are all security issues fixed in the ppp-2.4.7-3.4 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3158">CVE-2014-3158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3310/">CVE-2015-3310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3310">CVE-2015-3310 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009148440" comment="ppp-2.4.7-3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148071" version="1" class="patch">
	<metadata>
		<title>procmail-3.22-267.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618/" source="CVE"/>
		<description>
These are all security issues fixed in the procmail-3.22-267.12 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3618">CVE-2014-3618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141073" comment="procmail-3.22-267.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148072" version="1" class="patch">
	<metadata>
		<title>python-2.7.13-27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.13-27.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0772">CVE-2016-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000110">CVE-2016-1000110 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5636">CVE-2016-5636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5699">CVE-2016-5699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159263" comment="python-2.7.13-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159264" comment="python-32bit-2.7.13-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159265" comment="python-curses-2.7.13-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159266" comment="python-demo-2.7.13-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159267" comment="python-gdbm-2.7.13-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159268" comment="python-idle-2.7.13-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159269" comment="python-tk-2.7.13-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148073" version="1" class="patch">
	<metadata>
		<title>python-PyYAML-3.12-25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>
These are all security issues fixed in the python-PyYAML-3.12-25.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9130">CVE-2014-9130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159270" comment="python-PyYAML-3.12-25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148074" version="1" class="patch">
	<metadata>
		<title>python-cupshelpers-1.5.7-7.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-4405" ref_url="https://www.suse.com/security/cve/CVE-2011-4405/" source="CVE"/>
		<description>
These are all security issues fixed in the python-cupshelpers-1.5.7-7.5 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4405/">CVE-2011-4405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4405">CVE-2011-4405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141076" comment="python-cupshelpers-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141077" comment="system-config-printer-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141078" comment="system-config-printer-common-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141079" comment="system-config-printer-common-lang-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141080" comment="system-config-printer-dbus-service-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141081" comment="udev-configure-printer-1.5.7-7.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148075" version="1" class="patch">
	<metadata>
		<title>python-doc-2.7.13-27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<description>
These are all security issues fixed in the python-doc-2.7.13-27.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0772">CVE-2016-0772 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5636">CVE-2016-5636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5699">CVE-2016-5699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159271" comment="python-doc-2.7.13-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159272" comment="python-doc-pdf-2.7.13-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148076" version="1" class="patch">
	<metadata>
		<title>python-imaging-1.1.7-21.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-1932" ref_url="https://www.suse.com/security/cve/CVE-2014-1932/" source="CVE"/>
		<description>
These are all security issues fixed in the python-imaging-1.1.7-21.15 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1932/">CVE-2014-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1932">CVE-2014-1932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141082" comment="python-imaging-1.1.7-21.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148077" version="1" class="patch">
	<metadata>
		<title>python-libxml2-2.9.4-45.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1836" ref_url="https://www.suse.com/security/cve/CVE-2016-1836/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<description>
These are all security issues fixed in the python-libxml2-2.9.4-45.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4225">CVE-2008-4225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4226">CVE-2008-4226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4409">CVE-2008-4409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5134">CVE-2012-5134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1762">CVE-2016-1762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1833">CVE-2016-1833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1834">CVE-2016-1834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1835">CVE-2016-1835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1836/">CVE-2016-1836 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1836">CVE-2016-1836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1837">CVE-2016-1837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1838">CVE-2016-1838 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1839">CVE-2016-1839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1840">CVE-2016-1840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3627">CVE-2016-3627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3705">CVE-2016-3705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4483">CVE-2016-4483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157771" comment="python-libxml2-2.9.4-45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148078" version="1" class="patch">
	<metadata>
		<title>python-pyOpenSSL-16.0.0-2.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-4314" ref_url="https://www.suse.com/security/cve/CVE-2013-4314/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pyOpenSSL-16.0.0-2.3.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4314/">CVE-2013-4314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4314">CVE-2013-4314 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141084" comment="python-pyOpenSSL-16.0.0-2.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148079" version="1" class="patch">
	<metadata>
		<title>python-pywbem-0.7.0-4.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-6418" ref_url="https://www.suse.com/security/cve/CVE-2013-6418/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pywbem-0.7.0-4.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6418/">CVE-2013-6418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6418">CVE-2013-6418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141085" comment="python-pywbem-0.7.0-4.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148080" version="1" class="patch">
	<metadata>
		<title>python-requests-2.8.1-6.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-1829" ref_url="https://www.suse.com/security/cve/CVE-2014-1829/" source="CVE"/>
		<reference ref_id="CVE-2014-1830" ref_url="https://www.suse.com/security/cve/CVE-2014-1830/" source="CVE"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<description>
These are all security issues fixed in the python-requests-2.8.1-6.16.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1829/">CVE-2014-1829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1829">CVE-2014-1829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1830/">CVE-2014-1830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1830">CVE-2014-1830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2296">CVE-2015-2296 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159273" comment="python-requests-2.8.1-6.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148081" version="1" class="patch">
	<metadata>
		<title>python3-3.4.6-24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-3.4.6-24.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0772">CVE-2016-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000110">CVE-2016-1000110 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5636">CVE-2016-5636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5699">CVE-2016-5699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159274" comment="python3-3.4.6-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159275" comment="python3-curses-3.4.6-24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148082" version="1" class="patch">
	<metadata>
		<title>qemu-2.9.0-5.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-0928" ref_url="https://www.suse.com/security/cve/CVE-2008-0928/" source="CVE"/>
		<reference ref_id="CVE-2008-1945" ref_url="https://www.suse.com/security/cve/CVE-2008-1945/" source="CVE"/>
		<reference ref_id="CVE-2008-2382" ref_url="https://www.suse.com/security/cve/CVE-2008-2382/" source="CVE"/>
		<reference ref_id="CVE-2008-4539" ref_url="https://www.suse.com/security/cve/CVE-2008-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2013-4148" ref_url="https://www.suse.com/security/cve/CVE-2013-4148/" source="CVE"/>
		<reference ref_id="CVE-2013-4149" ref_url="https://www.suse.com/security/cve/CVE-2013-4149/" source="CVE"/>
		<reference ref_id="CVE-2013-4150" ref_url="https://www.suse.com/security/cve/CVE-2013-4150/" source="CVE"/>
		<reference ref_id="CVE-2013-4151" ref_url="https://www.suse.com/security/cve/CVE-2013-4151/" source="CVE"/>
		<reference ref_id="CVE-2013-4526" ref_url="https://www.suse.com/security/cve/CVE-2013-4526/" source="CVE"/>
		<reference ref_id="CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527/" source="CVE"/>
		<reference ref_id="CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529/" source="CVE"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2013-4531" ref_url="https://www.suse.com/security/cve/CVE-2013-4531/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4535" ref_url="https://www.suse.com/security/cve/CVE-2013-4535/" source="CVE"/>
		<reference ref_id="CVE-2013-4536" ref_url="https://www.suse.com/security/cve/CVE-2013-4536/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4541" ref_url="https://www.suse.com/security/cve/CVE-2013-4541/" source="CVE"/>
		<reference ref_id="CVE-2013-4542" ref_url="https://www.suse.com/security/cve/CVE-2013-4542/" source="CVE"/>
		<reference ref_id="CVE-2013-4544" ref_url="https://www.suse.com/security/cve/CVE-2013-4544/" source="CVE"/>
		<reference ref_id="CVE-2013-6399" ref_url="https://www.suse.com/security/cve/CVE-2013-6399/" source="CVE"/>
		<reference ref_id="CVE-2014-0142" ref_url="https://www.suse.com/security/cve/CVE-2014-0142/" source="CVE"/>
		<reference ref_id="CVE-2014-0143" ref_url="https://www.suse.com/security/cve/CVE-2014-0143/" source="CVE"/>
		<reference ref_id="CVE-2014-0144" ref_url="https://www.suse.com/security/cve/CVE-2014-0144/" source="CVE"/>
		<reference ref_id="CVE-2014-0145" ref_url="https://www.suse.com/security/cve/CVE-2014-0145/" source="CVE"/>
		<reference ref_id="CVE-2014-0146" ref_url="https://www.suse.com/security/cve/CVE-2014-0146/" source="CVE"/>
		<reference ref_id="CVE-2014-0147" ref_url="https://www.suse.com/security/cve/CVE-2014-0147/" source="CVE"/>
		<reference ref_id="CVE-2014-0150" ref_url="https://www.suse.com/security/cve/CVE-2014-0150/" source="CVE"/>
		<reference ref_id="CVE-2014-0182" ref_url="https://www.suse.com/security/cve/CVE-2014-0182/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223/" source="CVE"/>
		<reference ref_id="CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840/" source="CVE"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5225" ref_url="https://www.suse.com/security/cve/CVE-2015-5225/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5279" ref_url="https://www.suse.com/security/cve/CVE-2015-5279/" source="CVE"/>
		<reference ref_id="CVE-2015-5745" ref_url="https://www.suse.com/security/cve/CVE-2015-5745/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7295" ref_url="https://www.suse.com/security/cve/CVE-2015-7295/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-10028" ref_url="https://www.suse.com/security/cve/CVE-2016-10028/" source="CVE"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952/" source="CVE"/>
		<reference ref_id="CVE-2016-4964" ref_url="https://www.suse.com/security/cve/CVE-2016-4964/" source="CVE"/>
		<reference ref_id="CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105/" source="CVE"/>
		<reference ref_id="CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106/" source="CVE"/>
		<reference ref_id="CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107/" source="CVE"/>
		<reference ref_id="CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-6490" ref_url="https://www.suse.com/security/cve/CVE-2016-6490/" source="CVE"/>
		<reference ref_id="CVE-2016-6833" ref_url="https://www.suse.com/security/cve/CVE-2016-6833/" source="CVE"/>
		<reference ref_id="CVE-2016-6836" ref_url="https://www.suse.com/security/cve/CVE-2016-6836/" source="CVE"/>
		<reference ref_id="CVE-2016-6888" ref_url="https://www.suse.com/security/cve/CVE-2016-6888/" source="CVE"/>
		<reference ref_id="CVE-2016-7116" ref_url="https://www.suse.com/security/cve/CVE-2016-7116/" source="CVE"/>
		<reference ref_id="CVE-2016-7155" ref_url="https://www.suse.com/security/cve/CVE-2016-7155/" source="CVE"/>
		<reference ref_id="CVE-2016-7156" ref_url="https://www.suse.com/security/cve/CVE-2016-7156/" source="CVE"/>
		<reference ref_id="CVE-2016-7157" ref_url="https://www.suse.com/security/cve/CVE-2016-7157/" source="CVE"/>
		<reference ref_id="CVE-2016-7161" ref_url="https://www.suse.com/security/cve/CVE-2016-7161/" source="CVE"/>
		<reference ref_id="CVE-2016-7170" ref_url="https://www.suse.com/security/cve/CVE-2016-7170/" source="CVE"/>
		<reference ref_id="CVE-2016-7421" ref_url="https://www.suse.com/security/cve/CVE-2016-7421/" source="CVE"/>
		<reference ref_id="CVE-2016-7422" ref_url="https://www.suse.com/security/cve/CVE-2016-7422/" source="CVE"/>
		<reference ref_id="CVE-2016-7423" ref_url="https://www.suse.com/security/cve/CVE-2016-7423/" source="CVE"/>
		<reference ref_id="CVE-2016-7466" ref_url="https://www.suse.com/security/cve/CVE-2016-7466/" source="CVE"/>
		<reference ref_id="CVE-2016-7907" ref_url="https://www.suse.com/security/cve/CVE-2016-7907/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-7994" ref_url="https://www.suse.com/security/cve/CVE-2016-7994/" source="CVE"/>
		<reference ref_id="CVE-2016-7995" ref_url="https://www.suse.com/security/cve/CVE-2016-7995/" source="CVE"/>
		<reference ref_id="CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576/" source="CVE"/>
		<reference ref_id="CVE-2016-8577" ref_url="https://www.suse.com/security/cve/CVE-2016-8577/" source="CVE"/>
		<reference ref_id="CVE-2016-8578" ref_url="https://www.suse.com/security/cve/CVE-2016-8578/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8668" ref_url="https://www.suse.com/security/cve/CVE-2016-8668/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9102" ref_url="https://www.suse.com/security/cve/CVE-2016-9102/" source="CVE"/>
		<reference ref_id="CVE-2016-9103" ref_url="https://www.suse.com/security/cve/CVE-2016-9103/" source="CVE"/>
		<reference ref_id="CVE-2016-9104" ref_url="https://www.suse.com/security/cve/CVE-2016-9104/" source="CVE"/>
		<reference ref_id="CVE-2016-9105" ref_url="https://www.suse.com/security/cve/CVE-2016-9105/" source="CVE"/>
		<reference ref_id="CVE-2016-9106" ref_url="https://www.suse.com/security/cve/CVE-2016-9106/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9602" ref_url="https://www.suse.com/security/cve/CVE-2016-9602/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9845" ref_url="https://www.suse.com/security/cve/CVE-2016-9845/" source="CVE"/>
		<reference ref_id="CVE-2016-9846" ref_url="https://www.suse.com/security/cve/CVE-2016-9846/" source="CVE"/>
		<reference ref_id="CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907/" source="CVE"/>
		<reference ref_id="CVE-2016-9908" ref_url="https://www.suse.com/security/cve/CVE-2016-9908/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9912" ref_url="https://www.suse.com/security/cve/CVE-2016-9912/" source="CVE"/>
		<reference ref_id="CVE-2016-9913" ref_url="https://www.suse.com/security/cve/CVE-2016-9913/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-9923" ref_url="https://www.suse.com/security/cve/CVE-2016-9923/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-2630" ref_url="https://www.suse.com/security/cve/CVE-2017-2630/" source="CVE"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<reference ref_id="CVE-2017-5525" ref_url="https://www.suse.com/security/cve/CVE-2017-5525/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="CVE-2017-5552" ref_url="https://www.suse.com/security/cve/CVE-2017-5552/" source="CVE"/>
		<reference ref_id="CVE-2017-5578" ref_url="https://www.suse.com/security/cve/CVE-2017-5578/" source="CVE"/>
		<reference ref_id="CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579/" source="CVE"/>
		<reference ref_id="CVE-2017-5667" ref_url="https://www.suse.com/security/cve/CVE-2017-5667/" source="CVE"/>
		<reference ref_id="CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856/" source="CVE"/>
		<reference ref_id="CVE-2017-5857" ref_url="https://www.suse.com/security/cve/CVE-2017-5857/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="CVE-2017-5931" ref_url="https://www.suse.com/security/cve/CVE-2017-5931/" source="CVE"/>
		<reference ref_id="CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973/" source="CVE"/>
		<reference ref_id="CVE-2017-5987" ref_url="https://www.suse.com/security/cve/CVE-2017-5987/" source="CVE"/>
		<reference ref_id="CVE-2017-6058" ref_url="https://www.suse.com/security/cve/CVE-2017-6058/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7471" ref_url="https://www.suse.com/security/cve/CVE-2017-7471/" source="CVE"/>
		<reference ref_id="CVE-2017-7493" ref_url="https://www.suse.com/security/cve/CVE-2017-7493/" source="CVE"/>
		<reference ref_id="CVE-2017-8112" ref_url="https://www.suse.com/security/cve/CVE-2017-8112/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-8379" ref_url="https://www.suse.com/security/cve/CVE-2017-8379/" source="CVE"/>
		<reference ref_id="CVE-2017-8380" ref_url="https://www.suse.com/security/cve/CVE-2017-8380/" source="CVE"/>
		<reference ref_id="CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503/" source="CVE"/>
		<reference ref_id="CVE-2017-9524" ref_url="https://www.suse.com/security/cve/CVE-2017-9524/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-2.9.0-5.10 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0928/">CVE-2008-0928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0928">CVE-2008-0928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1945/">CVE-2008-1945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1945">CVE-2008-1945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2382/">CVE-2008-2382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2382">CVE-2008-2382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4539/">CVE-2008-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4539">CVE-2008-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3515">CVE-2012-3515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4148/">CVE-2013-4148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4148">CVE-2013-4148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4149/">CVE-2013-4149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4149">CVE-2013-4149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4150/">CVE-2013-4150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4150">CVE-2013-4150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4151/">CVE-2013-4151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4151">CVE-2013-4151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4526/">CVE-2013-4526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4526">CVE-2013-4526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4527">CVE-2013-4527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4529">CVE-2013-4529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4530">CVE-2013-4530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4531/">CVE-2013-4531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4531">CVE-2013-4531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4533">CVE-2013-4533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4534">CVE-2013-4534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4535/">CVE-2013-4535 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4535">CVE-2013-4535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4536/">CVE-2013-4536 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4536">CVE-2013-4536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4537">CVE-2013-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4538">CVE-2013-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4539">CVE-2013-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4540">CVE-2013-4540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4541/">CVE-2013-4541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4541">CVE-2013-4541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4542/">CVE-2013-4542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4542">CVE-2013-4542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4544/">CVE-2013-4544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4544">CVE-2013-4544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6399/">CVE-2013-6399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6399">CVE-2013-6399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0142/">CVE-2014-0142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0142">CVE-2014-0142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0143/">CVE-2014-0143 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0143">CVE-2014-0143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0144/">CVE-2014-0144 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0144">CVE-2014-0144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0145/">CVE-2014-0145 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0145">CVE-2014-0145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0146/">CVE-2014-0146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0146">CVE-2014-0146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0147/">CVE-2014-0147 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0147">CVE-2014-0147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0150/">CVE-2014-0150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0150">CVE-2014-0150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0182/">CVE-2014-0182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0182">CVE-2014-0182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0223">CVE-2014-0223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3461">CVE-2014-3461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3640">CVE-2014-3640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7840">CVE-2014-7840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8106">CVE-2014-8106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1779">CVE-2015-1779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3209">CVE-2015-3209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3456">CVE-2015-3456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4037">CVE-2015-4037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5154">CVE-2015-5154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5225/">CVE-2015-5225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5225">CVE-2015-5225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5278">CVE-2015-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5279/">CVE-2015-5279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5279">CVE-2015-5279 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5745/">CVE-2015-5745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5745">CVE-2015-5745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6815">CVE-2015-6815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6855">CVE-2015-6855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7295/">CVE-2015-7295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7295">CVE-2015-7295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7512">CVE-2015-7512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7549">CVE-2015-7549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8345">CVE-2015-8345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8504">CVE-2015-8504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8558">CVE-2015-8558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8567">CVE-2015-8567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8568">CVE-2015-8568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8613">CVE-2015-8613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8619">CVE-2015-8619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8743">CVE-2015-8743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8744">CVE-2015-8744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8745">CVE-2015-8745 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10028/">CVE-2016-10028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10028">CVE-2016-10028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10155">CVE-2016-10155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1568">CVE-2016-1568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1714">CVE-2016-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1922">CVE-2016-1922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1981">CVE-2016-1981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2198">CVE-2016-2198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3710">CVE-2016-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3712">CVE-2016-3712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4002">CVE-2016-4002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4020">CVE-2016-4020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4439">CVE-2016-4439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4441">CVE-2016-4441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4453">CVE-2016-4453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4454">CVE-2016-4454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4952">CVE-2016-4952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4964/">CVE-2016-4964 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4964">CVE-2016-4964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5105">CVE-2016-5105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5106">CVE-2016-5106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5107">CVE-2016-5107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5126">CVE-2016-5126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5238">CVE-2016-5238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5337">CVE-2016-5337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5338">CVE-2016-5338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5403">CVE-2016-5403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6351">CVE-2016-6351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6490/">CVE-2016-6490 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6490">CVE-2016-6490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6833/">CVE-2016-6833 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6833">CVE-2016-6833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6836/">CVE-2016-6836 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6836">CVE-2016-6836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6888/">CVE-2016-6888 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6888">CVE-2016-6888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7116/">CVE-2016-7116 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7116">CVE-2016-7116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7155/">CVE-2016-7155 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7155">CVE-2016-7155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7156/">CVE-2016-7156 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7156">CVE-2016-7156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7157/">CVE-2016-7157 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7157">CVE-2016-7157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7161/">CVE-2016-7161 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7161">CVE-2016-7161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7170/">CVE-2016-7170 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7170">CVE-2016-7170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7421/">CVE-2016-7421 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7421">CVE-2016-7421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7422/">CVE-2016-7422 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7422">CVE-2016-7422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7423/">CVE-2016-7423 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7423">CVE-2016-7423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7466/">CVE-2016-7466 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7466">CVE-2016-7466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7907/">CVE-2016-7907 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7907">CVE-2016-7907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7908">CVE-2016-7908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7909">CVE-2016-7909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7994/">CVE-2016-7994 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7994">CVE-2016-7994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7995/">CVE-2016-7995 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7995">CVE-2016-7995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8576">CVE-2016-8576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8577/">CVE-2016-8577 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8577">CVE-2016-8577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8578/">CVE-2016-8578 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8578">CVE-2016-8578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8667">CVE-2016-8667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8668/">CVE-2016-8668 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8668">CVE-2016-8668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8669">CVE-2016-8669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8909">CVE-2016-8909 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8910">CVE-2016-8910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9101">CVE-2016-9101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9102/">CVE-2016-9102 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9102">CVE-2016-9102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9103/">CVE-2016-9103 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9103">CVE-2016-9103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9104/">CVE-2016-9104 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9104">CVE-2016-9104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9105/">CVE-2016-9105 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9105">CVE-2016-9105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9106/">CVE-2016-9106 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9106">CVE-2016-9106 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9381">CVE-2016-9381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9602/">CVE-2016-9602 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9602">CVE-2016-9602 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9776">CVE-2016-9776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9845/">CVE-2016-9845 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9845">CVE-2016-9845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9846/">CVE-2016-9846 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9846">CVE-2016-9846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9907">CVE-2016-9907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9908/">CVE-2016-9908 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9908">CVE-2016-9908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9911">CVE-2016-9911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9912/">CVE-2016-9912 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9912">CVE-2016-9912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9913/">CVE-2016-9913 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9913">CVE-2016-9913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9921">CVE-2016-9921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9922">CVE-2016-9922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9923/">CVE-2016-9923 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9923">CVE-2016-9923 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2615">CVE-2017-2615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2620">CVE-2017-2620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2630/">CVE-2017-2630 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2630">CVE-2017-2630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2633">CVE-2017-2633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5525/">CVE-2017-5525 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5525">CVE-2017-5525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5526">CVE-2017-5526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5552/">CVE-2017-5552 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5552">CVE-2017-5552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5578/">CVE-2017-5578 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5578">CVE-2017-5578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5579">CVE-2017-5579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5667/">CVE-2017-5667 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5667">CVE-2017-5667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5856">CVE-2017-5856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5857/">CVE-2017-5857 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5857">CVE-2017-5857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5898">CVE-2017-5898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5931/">CVE-2017-5931 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5931">CVE-2017-5931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5973">CVE-2017-5973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5987/">CVE-2017-5987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5987">CVE-2017-5987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6058/">CVE-2017-6058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6058">CVE-2017-6058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6505">CVE-2017-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7471/">CVE-2017-7471 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7471">CVE-2017-7471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7493/">CVE-2017-7493 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7493">CVE-2017-7493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8112/">CVE-2017-8112 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8112">CVE-2017-8112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8309">CVE-2017-8309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8379/">CVE-2017-8379 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8379">CVE-2017-8379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8380/">CVE-2017-8380 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8380">CVE-2017-8380 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9503">CVE-2017-9503 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9524/">CVE-2017-9524 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9524">CVE-2017-9524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159276" comment="qemu-2.9.0-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159277" comment="qemu-arm-2.9.0-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159278" comment="qemu-block-curl-2.9.0-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159279" comment="qemu-block-rbd-2.9.0-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159280" comment="qemu-block-ssh-2.9.0-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159281" comment="qemu-guest-agent-2.9.0-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159282" comment="qemu-ipxe-1.0.0-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159283" comment="qemu-kvm-2.9.0-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159284" comment="qemu-lang-2.9.0-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159285" comment="qemu-ppc-2.9.0-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159286" comment="qemu-s390-2.9.0-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159287" comment="qemu-seabios-1.10.2-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159288" comment="qemu-sgabios-8-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159289" comment="qemu-tools-2.9.0-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159290" comment="qemu-vgabios-1.10.2-5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159291" comment="qemu-x86-2.9.0-5.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148083" version="1" class="patch">
	<metadata>
		<title>quagga-0.99.22.1-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-1674" ref_url="https://www.suse.com/security/cve/CVE-2010-1674/" source="CVE"/>
		<reference ref_id="CVE-2010-1675" ref_url="https://www.suse.com/security/cve/CVE-2010-1675/" source="CVE"/>
		<reference ref_id="CVE-2016-1245" ref_url="https://www.suse.com/security/cve/CVE-2016-1245/" source="CVE"/>
		<reference ref_id="CVE-2016-2342" ref_url="https://www.suse.com/security/cve/CVE-2016-2342/" source="CVE"/>
		<reference ref_id="CVE-2016-4049" ref_url="https://www.suse.com/security/cve/CVE-2016-4049/" source="CVE"/>
		<description>
These are all security issues fixed in the quagga-0.99.22.1-15.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1674/">CVE-2010-1674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1674">CVE-2010-1674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1675/">CVE-2010-1675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1675">CVE-2010-1675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1245/">CVE-2016-1245 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1245">CVE-2016-1245 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2342/">CVE-2016-2342 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2342">CVE-2016-2342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4049/">CVE-2016-4049 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4049">CVE-2016-4049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131838" comment="quagga-0.99.22.1-15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148084" version="1" class="patch">
	<metadata>
		<title>radvd-1.9.7-2.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3602" ref_url="https://www.suse.com/security/cve/CVE-2011-3602/" source="CVE"/>
		<description>
These are all security issues fixed in the radvd-1.9.7-2.12 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3602/">CVE-2011-3602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3602">CVE-2011-3602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141103" comment="radvd-1.9.7-2.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148085" version="1" class="patch">
	<metadata>
		<title>res-signingkeys-3.0.25-48.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>
These are all security issues fixed in the res-signingkeys-3.0.25-48.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159292" comment="res-signingkeys-3.0.25-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159293" comment="smt-3.0.25-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159294" comment="smt-support-3.0.25-48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148086" version="1" class="patch">
	<metadata>
		<title>rpcbind-0.2.3-23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236/" source="CVE"/>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<description>
These are all security issues fixed in the rpcbind-0.2.3-23.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7236">CVE-2015-7236 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8779">CVE-2017-8779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155620" comment="rpcbind-0.2.3-23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148087" version="1" class="patch">
	<metadata>
		<title>rpm-32bit-4.11.2-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-6435" ref_url="https://www.suse.com/security/cve/CVE-2013-6435/" source="CVE"/>
		<reference ref_id="CVE-2014-8118" ref_url="https://www.suse.com/security/cve/CVE-2014-8118/" source="CVE"/>
		<description>
These are all security issues fixed in the rpm-32bit-4.11.2-15.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6435/">CVE-2013-6435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6435">CVE-2013-6435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8118/">CVE-2014-8118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8118">CVE-2014-8118 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141108" comment="rpm-4.11.2-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141109" comment="rpm-32bit-4.11.2-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141110" comment="rpm-build-4.11.2-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148088" version="1" class="patch">
	<metadata>
		<title>rrdtool-1.4.7-20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2131" ref_url="https://www.suse.com/security/cve/CVE-2013-2131/" source="CVE"/>
		<description>
These are all security issues fixed in the rrdtool-1.4.7-20.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2131/">CVE-2013-2131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2131">CVE-2013-2131 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009146857" comment="rrdtool-1.4.7-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009146858" comment="rrdtool-cached-1.4.7-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148089" version="1" class="patch">
	<metadata>
		<title>rsync-3.1.0-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1097" ref_url="https://www.suse.com/security/cve/CVE-2011-1097/" source="CVE"/>
		<reference ref_id="CVE-2014-2855" ref_url="https://www.suse.com/security/cve/CVE-2014-2855/" source="CVE"/>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.1.0-12.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1097/">CVE-2011-1097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1097">CVE-2011-1097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2855/">CVE-2014-2855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2855">CVE-2014-2855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8242">CVE-2014-8242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9512">CVE-2014-9512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141111" comment="rsync-3.1.0-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148090" version="1" class="patch">
	<metadata>
		<title>rsyslog-8.24.0-1.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3200" ref_url="https://www.suse.com/security/cve/CVE-2011-3200/" source="CVE"/>
		<reference ref_id="CVE-2013-4758" ref_url="https://www.suse.com/security/cve/CVE-2013-4758/" source="CVE"/>
		<reference ref_id="CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370/" source="CVE"/>
		<reference ref_id="CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371/" source="CVE"/>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<reference ref_id="CVE-2014-3683" ref_url="https://www.suse.com/security/cve/CVE-2014-3683/" source="CVE"/>
		<description>
These are all security issues fixed in the rsyslog-8.24.0-1.20 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3200/">CVE-2011-3200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3200">CVE-2011-3200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4758/">CVE-2013-4758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4758">CVE-2013-4758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6370">CVE-2013-6370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6371">CVE-2013-6371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3634">CVE-2014-3634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3683/">CVE-2014-3683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3683">CVE-2014-3683 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159295" comment="rsyslog-8.24.0-1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159296" comment="rsyslog-diag-tools-8.24.0-1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159297" comment="rsyslog-doc-8.24.0-1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159298" comment="rsyslog-module-gssapi-8.24.0-1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159299" comment="rsyslog-module-gtls-8.24.0-1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159300" comment="rsyslog-module-mysql-8.24.0-1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159301" comment="rsyslog-module-pgsql-8.24.0-1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159302" comment="rsyslog-module-relp-8.24.0-1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159303" comment="rsyslog-module-snmp-8.24.0-1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159304" comment="rsyslog-module-udpspoof-8.24.0-1.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148091" version="1" class="patch">
	<metadata>
		<title>rtkit-0.11_git201205151338-8.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-4326" ref_url="https://www.suse.com/security/cve/CVE-2013-4326/" source="CVE"/>
		<description>
These are all security issues fixed in the rtkit-0.11_git201205151338-8.14 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4326/">CVE-2013-4326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4326">CVE-2013-4326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141122" comment="rtkit-0.11_git201205151338-8.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148092" version="1" class="patch">
	<metadata>
		<title>ruby-2.1-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-4492" ref_url="https://www.suse.com/security/cve/CVE-2009-4492/" source="CVE"/>
		<reference ref_id="CVE-2010-0541" ref_url="https://www.suse.com/security/cve/CVE-2010-0541/" source="CVE"/>
		<reference ref_id="CVE-2011-1004" ref_url="https://www.suse.com/security/cve/CVE-2011-1004/" source="CVE"/>
		<reference ref_id="CVE-2011-1005" ref_url="https://www.suse.com/security/cve/CVE-2011-1005/" source="CVE"/>
		<reference ref_id="CVE-2011-4815" ref_url="https://www.suse.com/security/cve/CVE-2011-4815/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby-2.1-1.4 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4492/">CVE-2009-4492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4492">CVE-2009-4492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0541/">CVE-2010-0541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0541">CVE-2010-0541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1004/">CVE-2011-1004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1004">CVE-2011-1004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1005/">CVE-2011-1005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1005">CVE-2011-1005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4815/">CVE-2011-4815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4815">CVE-2011-4815 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141123" comment="ruby-2.1-1.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148093" version="1" class="patch">
	<metadata>
		<title>sane-backends-1.0.24-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<description>
These are all security issues fixed in the sane-backends-1.0.24-3.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6318">CVE-2017-6318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009149621" comment="sane-backends-1.0.24-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148094" version="1" class="patch">
	<metadata>
		<title>sblim-sfcb-1.4.8-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-5185" ref_url="https://www.suse.com/security/cve/CVE-2015-5185/" source="CVE"/>
		<description>
These are all security issues fixed in the sblim-sfcb-1.4.8-16.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5185/">CVE-2015-5185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5185">CVE-2015-5185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159305" comment="sblim-sfcb-1.4.8-16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148095" version="1" class="patch">
	<metadata>
		<title>shim-0.9-23.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675/" source="CVE"/>
		<reference ref_id="CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676/" source="CVE"/>
		<reference ref_id="CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677/" source="CVE"/>
		<description>
These are all security issues fixed in the shim-0.9-23.14 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3675">CVE-2014-3675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3676">CVE-2014-3676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3677">CVE-2014-3677 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159306" comment="shim-0.9-23.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148096" version="1" class="patch">
	<metadata>
		<title>socat-1.7.2.4-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-3571" ref_url="https://www.suse.com/security/cve/CVE-2013-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-0019" ref_url="https://www.suse.com/security/cve/CVE-2014-0019/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>
These are all security issues fixed in the socat-1.7.2.4-3.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3571/">CVE-2013-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3571">CVE-2013-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0019/">CVE-2014-0019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0019">CVE-2014-0019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009122758" comment="socat-1.7.2.4-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148097" version="1" class="patch">
	<metadata>
		<title>squashfs-4.3-6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-4024" ref_url="https://www.suse.com/security/cve/CVE-2012-4024/" source="CVE"/>
		<reference ref_id="CVE-2012-4025" ref_url="https://www.suse.com/security/cve/CVE-2012-4025/" source="CVE"/>
		<description>
These are all security issues fixed in the squashfs-4.3-6.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4024/">CVE-2012-4024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4024">CVE-2012-4024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4025/">CVE-2012-4025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4025">CVE-2012-4025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141126" comment="squashfs-4.3-6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148098" version="1" class="patch">
	<metadata>
		<title>squid-3.5.21-25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2014-7141" ref_url="https://www.suse.com/security/cve/CVE-2014-7141/" source="CVE"/>
		<reference ref_id="CVE-2014-7142" ref_url="https://www.suse.com/security/cve/CVE-2014-7142/" source="CVE"/>
		<reference ref_id="CVE-2014-9749" ref_url="https://www.suse.com/security/cve/CVE-2014-9749/" source="CVE"/>
		<reference ref_id="CVE-2015-5400" ref_url="https://www.suse.com/security/cve/CVE-2015-5400/" source="CVE"/>
		<reference ref_id="CVE-2016-10002" ref_url="https://www.suse.com/security/cve/CVE-2016-10002/" source="CVE"/>
		<reference ref_id="CVE-2016-10003" ref_url="https://www.suse.com/security/cve/CVE-2016-10003/" source="CVE"/>
		<reference ref_id="CVE-2016-2390" ref_url="https://www.suse.com/security/cve/CVE-2016-2390/" source="CVE"/>
		<reference ref_id="CVE-2016-2569" ref_url="https://www.suse.com/security/cve/CVE-2016-2569/" source="CVE"/>
		<reference ref_id="CVE-2016-2570" ref_url="https://www.suse.com/security/cve/CVE-2016-2570/" source="CVE"/>
		<reference ref_id="CVE-2016-2571" ref_url="https://www.suse.com/security/cve/CVE-2016-2571/" source="CVE"/>
		<reference ref_id="CVE-2016-2572" ref_url="https://www.suse.com/security/cve/CVE-2016-2572/" source="CVE"/>
		<reference ref_id="CVE-2016-3947" ref_url="https://www.suse.com/security/cve/CVE-2016-3947/" source="CVE"/>
		<reference ref_id="CVE-2016-3948" ref_url="https://www.suse.com/security/cve/CVE-2016-3948/" source="CVE"/>
		<reference ref_id="CVE-2016-4051" ref_url="https://www.suse.com/security/cve/CVE-2016-4051/" source="CVE"/>
		<reference ref_id="CVE-2016-4052" ref_url="https://www.suse.com/security/cve/CVE-2016-4052/" source="CVE"/>
		<reference ref_id="CVE-2016-4053" ref_url="https://www.suse.com/security/cve/CVE-2016-4053/" source="CVE"/>
		<reference ref_id="CVE-2016-4054" ref_url="https://www.suse.com/security/cve/CVE-2016-4054/" source="CVE"/>
		<reference ref_id="CVE-2016-4553" ref_url="https://www.suse.com/security/cve/CVE-2016-4553/" source="CVE"/>
		<reference ref_id="CVE-2016-4554" ref_url="https://www.suse.com/security/cve/CVE-2016-4554/" source="CVE"/>
		<reference ref_id="CVE-2016-4555" ref_url="https://www.suse.com/security/cve/CVE-2016-4555/" source="CVE"/>
		<reference ref_id="CVE-2016-4556" ref_url="https://www.suse.com/security/cve/CVE-2016-4556/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-3.5.21-25.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5643">CVE-2012-5643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7141/">CVE-2014-7141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7141">CVE-2014-7141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7142/">CVE-2014-7142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7142">CVE-2014-7142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9749/">CVE-2014-9749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9749">CVE-2014-9749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5400/">CVE-2015-5400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5400">CVE-2015-5400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10002/">CVE-2016-10002 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10002">CVE-2016-10002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10003/">CVE-2016-10003 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10003">CVE-2016-10003 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2390/">CVE-2016-2390 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2390">CVE-2016-2390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2569/">CVE-2016-2569 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2569">CVE-2016-2569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2570/">CVE-2016-2570 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2570">CVE-2016-2570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2571/">CVE-2016-2571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2571">CVE-2016-2571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2572/">CVE-2016-2572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2572">CVE-2016-2572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3947/">CVE-2016-3947 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3947">CVE-2016-3947 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3948/">CVE-2016-3948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3948">CVE-2016-3948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4051/">CVE-2016-4051 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4051">CVE-2016-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4052/">CVE-2016-4052 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4052">CVE-2016-4052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4053/">CVE-2016-4053 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4053">CVE-2016-4053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4054/">CVE-2016-4054 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4054">CVE-2016-4054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4553/">CVE-2016-4553 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4553">CVE-2016-4553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4554/">CVE-2016-4554 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4554">CVE-2016-4554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4555/">CVE-2016-4555 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4555">CVE-2016-4555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4556/">CVE-2016-4556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4556">CVE-2016-4556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009146970" comment="squid-3.5.21-25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148099" version="1" class="patch">
	<metadata>
		<title>squidGuard-1.4-29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3700" ref_url="https://www.suse.com/security/cve/CVE-2009-3700/" source="CVE"/>
		<reference ref_id="CVE-2009-3826" ref_url="https://www.suse.com/security/cve/CVE-2009-3826/" source="CVE"/>
		<reference ref_id="CVE-2015-8936" ref_url="https://www.suse.com/security/cve/CVE-2015-8936/" source="CVE"/>
		<description>
These are all security issues fixed in the squidGuard-1.4-29.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3700/">CVE-2009-3700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3700">CVE-2009-3700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3826/">CVE-2009-3826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3826">CVE-2009-3826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8936/">CVE-2015-8936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8936">CVE-2015-8936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155979" comment="squidGuard-1.4-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155980" comment="squidGuard-doc-1.4-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148100" version="1" class="patch">
	<metadata>
		<title>strongswan-5.1.3-25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0790" ref_url="https://www.suse.com/security/cve/CVE-2009-0790/" source="CVE"/>
		<reference ref_id="CVE-2012-2388" ref_url="https://www.suse.com/security/cve/CVE-2012-2388/" source="CVE"/>
		<reference ref_id="CVE-2013-2944" ref_url="https://www.suse.com/security/cve/CVE-2013-2944/" source="CVE"/>
		<reference ref_id="CVE-2013-5018" ref_url="https://www.suse.com/security/cve/CVE-2013-5018/" source="CVE"/>
		<reference ref_id="CVE-2013-6075" ref_url="https://www.suse.com/security/cve/CVE-2013-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-6076" ref_url="https://www.suse.com/security/cve/CVE-2013-6076/" source="CVE"/>
		<reference ref_id="CVE-2014-2338" ref_url="https://www.suse.com/security/cve/CVE-2014-2338/" source="CVE"/>
		<reference ref_id="CVE-2014-9221" ref_url="https://www.suse.com/security/cve/CVE-2014-9221/" source="CVE"/>
		<reference ref_id="CVE-2015-4171" ref_url="https://www.suse.com/security/cve/CVE-2015-4171/" source="CVE"/>
		<reference ref_id="CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023/" source="CVE"/>
		<reference ref_id="CVE-2017-9022" ref_url="https://www.suse.com/security/cve/CVE-2017-9022/" source="CVE"/>
		<reference ref_id="CVE-2017-9023" ref_url="https://www.suse.com/security/cve/CVE-2017-9023/" source="CVE"/>
		<description>
These are all security issues fixed in the strongswan-5.1.3-25.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0790/">CVE-2009-0790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0790">CVE-2009-0790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2388/">CVE-2012-2388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2388">CVE-2012-2388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2944/">CVE-2013-2944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2944">CVE-2013-2944 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5018/">CVE-2013-5018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5018">CVE-2013-5018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6075/">CVE-2013-6075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6075">CVE-2013-6075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6076/">CVE-2013-6076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6076">CVE-2013-6076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2338/">CVE-2014-2338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2338">CVE-2014-2338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9221/">CVE-2014-9221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9221">CVE-2014-9221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4171/">CVE-2015-4171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4171">CVE-2015-4171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8023">CVE-2015-8023 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9022/">CVE-2017-9022 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9022">CVE-2017-9022 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9023/">CVE-2017-9023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9023">CVE-2017-9023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156341" comment="strongswan-5.1.3-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156342" comment="strongswan-doc-5.1.3-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156345" comment="strongswan-hmac-5.1.3-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156343" comment="strongswan-ipsec-5.1.3-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156344" comment="strongswan-libs0-5.1.3-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148101" version="1" class="patch">
	<metadata>
		<title>stunnel-5.00-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1762" ref_url="https://www.suse.com/security/cve/CVE-2013-1762/" source="CVE"/>
		<reference ref_id="CVE-2014-0016" ref_url="https://www.suse.com/security/cve/CVE-2014-0016/" source="CVE"/>
		<reference ref_id="CVE-2015-3644" ref_url="https://www.suse.com/security/cve/CVE-2015-3644/" source="CVE"/>
		<description>
These are all security issues fixed in the stunnel-5.00-3.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1762/">CVE-2013-1762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1762">CVE-2013-1762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0016/">CVE-2014-0016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0016">CVE-2014-0016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3644/">CVE-2015-3644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3644">CVE-2015-3644 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110494" comment="stunnel-5.00-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148102" version="1" class="patch">
	<metadata>
		<title>sudo-1.8.20p2-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-1163" ref_url="https://www.suse.com/security/cve/CVE-2010-1163/" source="CVE"/>
		<reference ref_id="CVE-2010-1646" ref_url="https://www.suse.com/security/cve/CVE-2010-1646/" source="CVE"/>
		<reference ref_id="CVE-2011-0010" ref_url="https://www.suse.com/security/cve/CVE-2011-0010/" source="CVE"/>
		<reference ref_id="CVE-2012-2337" ref_url="https://www.suse.com/security/cve/CVE-2012-2337/" source="CVE"/>
		<reference ref_id="CVE-2013-1775" ref_url="https://www.suse.com/security/cve/CVE-2013-1775/" source="CVE"/>
		<reference ref_id="CVE-2013-1776" ref_url="https://www.suse.com/security/cve/CVE-2013-1776/" source="CVE"/>
		<reference ref_id="CVE-2014-9680" ref_url="https://www.suse.com/security/cve/CVE-2014-9680/" source="CVE"/>
		<reference ref_id="CVE-2016-7032" ref_url="https://www.suse.com/security/cve/CVE-2016-7032/" source="CVE"/>
		<reference ref_id="CVE-2016-7076" ref_url="https://www.suse.com/security/cve/CVE-2016-7076/" source="CVE"/>
		<reference ref_id="CVE-2017-1000367" ref_url="https://www.suse.com/security/cve/CVE-2017-1000367/" source="CVE"/>
		<reference ref_id="CVE-2017-1000368" ref_url="https://www.suse.com/security/cve/CVE-2017-1000368/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.8.20p2-1.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1163/">CVE-2010-1163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1163">CVE-2010-1163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1646/">CVE-2010-1646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1646">CVE-2010-1646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0010/">CVE-2011-0010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0010">CVE-2011-0010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2337/">CVE-2012-2337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2337">CVE-2012-2337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1775/">CVE-2013-1775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1775">CVE-2013-1775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1776/">CVE-2013-1776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1776">CVE-2013-1776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9680/">CVE-2014-9680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9680">CVE-2014-9680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7032/">CVE-2016-7032 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7032">CVE-2016-7032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7076/">CVE-2016-7076 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7076">CVE-2016-7076 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000367/">CVE-2017-1000367 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000367">CVE-2017-1000367 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000368/">CVE-2017-1000368 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000368">CVE-2017-1000368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159307" comment="sudo-1.8.20p2-1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148103" version="1" class="patch">
	<metadata>
		<title>supportutils-3.0-94.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-1602" ref_url="https://www.suse.com/security/cve/CVE-2016-1602/" source="CVE"/>
		<description>
These are all security issues fixed in the supportutils-3.0-94.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1602/">CVE-2016-1602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1602">CVE-2016-1602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159308" comment="supportutils-3.0-94.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148104" version="1" class="patch">
	<metadata>
		<title>sysconfig-0.84.0-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-4182" ref_url="https://www.suse.com/security/cve/CVE-2011-4182/" source="CVE"/>
		<description>
These are all security issues fixed in the sysconfig-0.84.0-13.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4182/">CVE-2011-4182 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-4182">CVE-2011-4182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141132" comment="sysconfig-0.84.0-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141133" comment="sysconfig-netconfig-0.84.0-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148105" version="1" class="patch">
	<metadata>
		<title>syslog-service-2.0-778.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<description>
These are all security issues fixed in the syslog-service-2.0-778.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3634">CVE-2014-3634 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141134" comment="syslog-service-2.0-778.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148106" version="1" class="patch">
	<metadata>
		<title>systemtap-3.0-10.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2911" ref_url="https://www.suse.com/security/cve/CVE-2009-2911/" source="CVE"/>
		<reference ref_id="CVE-2009-4273" ref_url="https://www.suse.com/security/cve/CVE-2009-4273/" source="CVE"/>
		<reference ref_id="CVE-2010-0411" ref_url="https://www.suse.com/security/cve/CVE-2010-0411/" source="CVE"/>
		<reference ref_id="CVE-2010-0412" ref_url="https://www.suse.com/security/cve/CVE-2010-0412/" source="CVE"/>
		<description>
These are all security issues fixed in the systemtap-3.0-10.15 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2911/">CVE-2009-2911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2911">CVE-2009-2911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4273/">CVE-2009-4273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4273">CVE-2009-4273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0411/">CVE-2010-0411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0411">CVE-2010-0411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0412/">CVE-2010-0412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0412">CVE-2010-0412 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159309" comment="systemtap-3.0-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159310" comment="systemtap-runtime-3.0-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159311" comment="systemtap-server-3.0-10.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148107" version="1" class="patch">
	<metadata>
		<title>sysvinit-tools-2.88+-99.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>
These are all security issues fixed in the sysvinit-tools-2.88+-99.15 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2483">CVE-2011-2483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159312" comment="sysvinit-tools-2.88+-99.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141139" comment="whois-5.1.1-1.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148108" version="1" class="patch">
	<metadata>
		<title>tar-1.27.1-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<reference ref_id="CVE-2016-6321" ref_url="https://www.suse.com/security/cve/CVE-2016-6321/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.27.1-14.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0624">CVE-2010-0624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6321/">CVE-2016-6321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6321">CVE-2016-6321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159313" comment="tar-1.27.1-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159314" comment="tar-lang-1.27.1-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148109" version="1" class="patch">
	<metadata>
		<title>tcpdump-4.9.0-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-8767" ref_url="https://www.suse.com/security/cve/CVE-2014-8767/" source="CVE"/>
		<reference ref_id="CVE-2014-8768" ref_url="https://www.suse.com/security/cve/CVE-2014-8768/" source="CVE"/>
		<reference ref_id="CVE-2014-8769" ref_url="https://www.suse.com/security/cve/CVE-2014-8769/" source="CVE"/>
		<reference ref_id="CVE-2014-9140" ref_url="https://www.suse.com/security/cve/CVE-2014-9140/" source="CVE"/>
		<reference ref_id="CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261/" source="CVE"/>
		<reference ref_id="CVE-2015-2153" ref_url="https://www.suse.com/security/cve/CVE-2015-2153/" source="CVE"/>
		<reference ref_id="CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154/" source="CVE"/>
		<reference ref_id="CVE-2015-2155" ref_url="https://www.suse.com/security/cve/CVE-2015-2155/" source="CVE"/>
		<reference ref_id="CVE-2015-3138" ref_url="https://www.suse.com/security/cve/CVE-2015-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-7922" ref_url="https://www.suse.com/security/cve/CVE-2016-7922/" source="CVE"/>
		<reference ref_id="CVE-2016-7923" ref_url="https://www.suse.com/security/cve/CVE-2016-7923/" source="CVE"/>
		<reference ref_id="CVE-2016-7924" ref_url="https://www.suse.com/security/cve/CVE-2016-7924/" source="CVE"/>
		<reference ref_id="CVE-2016-7925" ref_url="https://www.suse.com/security/cve/CVE-2016-7925/" source="CVE"/>
		<reference ref_id="CVE-2016-7926" ref_url="https://www.suse.com/security/cve/CVE-2016-7926/" source="CVE"/>
		<reference ref_id="CVE-2016-7927" ref_url="https://www.suse.com/security/cve/CVE-2016-7927/" source="CVE"/>
		<reference ref_id="CVE-2016-7928" ref_url="https://www.suse.com/security/cve/CVE-2016-7928/" source="CVE"/>
		<reference ref_id="CVE-2016-7929" ref_url="https://www.suse.com/security/cve/CVE-2016-7929/" source="CVE"/>
		<reference ref_id="CVE-2016-7930" ref_url="https://www.suse.com/security/cve/CVE-2016-7930/" source="CVE"/>
		<reference ref_id="CVE-2016-7931" ref_url="https://www.suse.com/security/cve/CVE-2016-7931/" source="CVE"/>
		<reference ref_id="CVE-2016-7932" ref_url="https://www.suse.com/security/cve/CVE-2016-7932/" source="CVE"/>
		<reference ref_id="CVE-2016-7933" ref_url="https://www.suse.com/security/cve/CVE-2016-7933/" source="CVE"/>
		<reference ref_id="CVE-2016-7934" ref_url="https://www.suse.com/security/cve/CVE-2016-7934/" source="CVE"/>
		<reference ref_id="CVE-2016-7935" ref_url="https://www.suse.com/security/cve/CVE-2016-7935/" source="CVE"/>
		<reference ref_id="CVE-2016-7936" ref_url="https://www.suse.com/security/cve/CVE-2016-7936/" source="CVE"/>
		<reference ref_id="CVE-2016-7937" ref_url="https://www.suse.com/security/cve/CVE-2016-7937/" source="CVE"/>
		<reference ref_id="CVE-2016-7938" ref_url="https://www.suse.com/security/cve/CVE-2016-7938/" source="CVE"/>
		<reference ref_id="CVE-2016-7939" ref_url="https://www.suse.com/security/cve/CVE-2016-7939/" source="CVE"/>
		<reference ref_id="CVE-2016-7940" ref_url="https://www.suse.com/security/cve/CVE-2016-7940/" source="CVE"/>
		<reference ref_id="CVE-2016-7973" ref_url="https://www.suse.com/security/cve/CVE-2016-7973/" source="CVE"/>
		<reference ref_id="CVE-2016-7974" ref_url="https://www.suse.com/security/cve/CVE-2016-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-7975" ref_url="https://www.suse.com/security/cve/CVE-2016-7975/" source="CVE"/>
		<reference ref_id="CVE-2016-7983" ref_url="https://www.suse.com/security/cve/CVE-2016-7983/" source="CVE"/>
		<reference ref_id="CVE-2016-7984" ref_url="https://www.suse.com/security/cve/CVE-2016-7984/" source="CVE"/>
		<reference ref_id="CVE-2016-7985" ref_url="https://www.suse.com/security/cve/CVE-2016-7985/" source="CVE"/>
		<reference ref_id="CVE-2016-7986" ref_url="https://www.suse.com/security/cve/CVE-2016-7986/" source="CVE"/>
		<reference ref_id="CVE-2016-7992" ref_url="https://www.suse.com/security/cve/CVE-2016-7992/" source="CVE"/>
		<reference ref_id="CVE-2016-7993" ref_url="https://www.suse.com/security/cve/CVE-2016-7993/" source="CVE"/>
		<reference ref_id="CVE-2016-8574" ref_url="https://www.suse.com/security/cve/CVE-2016-8574/" source="CVE"/>
		<reference ref_id="CVE-2016-8575" ref_url="https://www.suse.com/security/cve/CVE-2016-8575/" source="CVE"/>
		<reference ref_id="CVE-2017-5202" ref_url="https://www.suse.com/security/cve/CVE-2017-5202/" source="CVE"/>
		<reference ref_id="CVE-2017-5203" ref_url="https://www.suse.com/security/cve/CVE-2017-5203/" source="CVE"/>
		<reference ref_id="CVE-2017-5204" ref_url="https://www.suse.com/security/cve/CVE-2017-5204/" source="CVE"/>
		<reference ref_id="CVE-2017-5205" ref_url="https://www.suse.com/security/cve/CVE-2017-5205/" source="CVE"/>
		<reference ref_id="CVE-2017-5341" ref_url="https://www.suse.com/security/cve/CVE-2017-5341/" source="CVE"/>
		<reference ref_id="CVE-2017-5342" ref_url="https://www.suse.com/security/cve/CVE-2017-5342/" source="CVE"/>
		<reference ref_id="CVE-2017-5482" ref_url="https://www.suse.com/security/cve/CVE-2017-5482/" source="CVE"/>
		<reference ref_id="CVE-2017-5483" ref_url="https://www.suse.com/security/cve/CVE-2017-5483/" source="CVE"/>
		<reference ref_id="CVE-2017-5484" ref_url="https://www.suse.com/security/cve/CVE-2017-5484/" source="CVE"/>
		<reference ref_id="CVE-2017-5485" ref_url="https://www.suse.com/security/cve/CVE-2017-5485/" source="CVE"/>
		<reference ref_id="CVE-2017-5486" ref_url="https://www.suse.com/security/cve/CVE-2017-5486/" source="CVE"/>
		<description>
These are all security issues fixed in the tcpdump-4.9.0-13.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8767/">CVE-2014-8767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8767">CVE-2014-8767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8768/">CVE-2014-8768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8768">CVE-2014-8768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8769/">CVE-2014-8769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8769">CVE-2014-8769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9140/">CVE-2014-9140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9140">CVE-2014-9140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0261">CVE-2015-0261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2153/">CVE-2015-2153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2153">CVE-2015-2153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2154">CVE-2015-2154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2155/">CVE-2015-2155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2155">CVE-2015-2155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3138/">CVE-2015-3138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3138">CVE-2015-3138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7922/">CVE-2016-7922 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7922">CVE-2016-7922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7923/">CVE-2016-7923 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7923">CVE-2016-7923 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7924/">CVE-2016-7924 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7924">CVE-2016-7924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7925/">CVE-2016-7925 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7925">CVE-2016-7925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7926/">CVE-2016-7926 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7926">CVE-2016-7926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7927/">CVE-2016-7927 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7927">CVE-2016-7927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7928/">CVE-2016-7928 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7928">CVE-2016-7928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7929/">CVE-2016-7929 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7929">CVE-2016-7929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7930/">CVE-2016-7930 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7930">CVE-2016-7930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7931/">CVE-2016-7931 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7931">CVE-2016-7931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7932/">CVE-2016-7932 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7932">CVE-2016-7932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7933/">CVE-2016-7933 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7933">CVE-2016-7933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7934/">CVE-2016-7934 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7934">CVE-2016-7934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7935/">CVE-2016-7935 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7935">CVE-2016-7935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7936/">CVE-2016-7936 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7936">CVE-2016-7936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7937/">CVE-2016-7937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7937">CVE-2016-7937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7938/">CVE-2016-7938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7938">CVE-2016-7938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7939/">CVE-2016-7939 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7939">CVE-2016-7939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7940/">CVE-2016-7940 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7940">CVE-2016-7940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7973/">CVE-2016-7973 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7973">CVE-2016-7973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7974/">CVE-2016-7974 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7974">CVE-2016-7974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7975/">CVE-2016-7975 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7975">CVE-2016-7975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7983/">CVE-2016-7983 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7983">CVE-2016-7983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7984/">CVE-2016-7984 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7984">CVE-2016-7984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7985/">CVE-2016-7985 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7985">CVE-2016-7985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7986/">CVE-2016-7986 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7986">CVE-2016-7986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7992/">CVE-2016-7992 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7992">CVE-2016-7992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7993/">CVE-2016-7993 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7993">CVE-2016-7993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8574/">CVE-2016-8574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8574">CVE-2016-8574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8575/">CVE-2016-8575 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8575">CVE-2016-8575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5202/">CVE-2017-5202 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5202">CVE-2017-5202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5203/">CVE-2017-5203 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5203">CVE-2017-5203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5204/">CVE-2017-5204 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5204">CVE-2017-5204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5205/">CVE-2017-5205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5205">CVE-2017-5205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5341/">CVE-2017-5341 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5341">CVE-2017-5341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5342/">CVE-2017-5342 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5342">CVE-2017-5342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5482/">CVE-2017-5482 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5482">CVE-2017-5482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5483/">CVE-2017-5483 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5483">CVE-2017-5483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5484/">CVE-2017-5484 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5484">CVE-2017-5484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5485/">CVE-2017-5485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5485">CVE-2017-5485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5486/">CVE-2017-5486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5486">CVE-2017-5486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154731" comment="tcpdump-4.9.0-13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148110" version="1" class="patch">
	<metadata>
		<title>tftp-5.2-10.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2199" ref_url="https://www.suse.com/security/cve/CVE-2011-2199/" source="CVE"/>
		<description>
These are all security issues fixed in the tftp-5.2-10.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2199/">CVE-2011-2199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2199">CVE-2011-2199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141141" comment="tftp-5.2-10.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148111" version="1" class="patch">
	<metadata>
		<title>tomcat-8.0.43-23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2014-0050" ref_url="https://www.suse.com/security/cve/CVE-2014-0050/" source="CVE"/>
		<reference ref_id="CVE-2015-5174" ref_url="https://www.suse.com/security/cve/CVE-2015-5174/" source="CVE"/>
		<reference ref_id="CVE-2015-5345" ref_url="https://www.suse.com/security/cve/CVE-2015-5345/" source="CVE"/>
		<reference ref_id="CVE-2015-5346" ref_url="https://www.suse.com/security/cve/CVE-2015-5346/" source="CVE"/>
		<reference ref_id="CVE-2015-5351" ref_url="https://www.suse.com/security/cve/CVE-2015-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-0706" ref_url="https://www.suse.com/security/cve/CVE-2016-0706/" source="CVE"/>
		<reference ref_id="CVE-2016-0714" ref_url="https://www.suse.com/security/cve/CVE-2016-0714/" source="CVE"/>
		<reference ref_id="CVE-2016-0762" ref_url="https://www.suse.com/security/cve/CVE-2016-0762/" source="CVE"/>
		<reference ref_id="CVE-2016-0763" ref_url="https://www.suse.com/security/cve/CVE-2016-0763/" source="CVE"/>
		<reference ref_id="CVE-2016-3092" ref_url="https://www.suse.com/security/cve/CVE-2016-3092/" source="CVE"/>
		<reference ref_id="CVE-2016-5018" ref_url="https://www.suse.com/security/cve/CVE-2016-5018/" source="CVE"/>
		<reference ref_id="CVE-2016-6794" ref_url="https://www.suse.com/security/cve/CVE-2016-6794/" source="CVE"/>
		<reference ref_id="CVE-2016-6796" ref_url="https://www.suse.com/security/cve/CVE-2016-6796/" source="CVE"/>
		<reference ref_id="CVE-2016-6797" ref_url="https://www.suse.com/security/cve/CVE-2016-6797/" source="CVE"/>
		<reference ref_id="CVE-2016-6816" ref_url="https://www.suse.com/security/cve/CVE-2016-6816/" source="CVE"/>
		<reference ref_id="CVE-2016-8735" ref_url="https://www.suse.com/security/cve/CVE-2016-8735/" source="CVE"/>
		<reference ref_id="CVE-2016-8745" ref_url="https://www.suse.com/security/cve/CVE-2016-8745/" source="CVE"/>
		<reference ref_id="CVE-2017-5647" ref_url="https://www.suse.com/security/cve/CVE-2017-5647/" source="CVE"/>
		<reference ref_id="CVE-2017-5648" ref_url="https://www.suse.com/security/cve/CVE-2017-5648/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-8.0.43-23.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1976">CVE-2013-1976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0050/">CVE-2014-0050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0050">CVE-2014-0050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5174/">CVE-2015-5174 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5174">CVE-2015-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5345/">CVE-2015-5345 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5345">CVE-2015-5345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5346/">CVE-2015-5346 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5346">CVE-2015-5346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5351/">CVE-2015-5351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5351">CVE-2015-5351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0706/">CVE-2016-0706 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0706">CVE-2016-0706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0714/">CVE-2016-0714 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0714">CVE-2016-0714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0762/">CVE-2016-0762 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0762">CVE-2016-0762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0763/">CVE-2016-0763 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0763">CVE-2016-0763 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3092/">CVE-2016-3092 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3092">CVE-2016-3092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5018/">CVE-2016-5018 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5018">CVE-2016-5018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6794/">CVE-2016-6794 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6794">CVE-2016-6794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6796/">CVE-2016-6796 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6796">CVE-2016-6796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6797/">CVE-2016-6797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6797">CVE-2016-6797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6816/">CVE-2016-6816 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6816">CVE-2016-6816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8735/">CVE-2016-8735 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8735">CVE-2016-8735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8745/">CVE-2016-8745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8745">CVE-2016-8745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5647/">CVE-2017-5647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5647">CVE-2017-5647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5648/">CVE-2017-5648 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5648">CVE-2017-5648 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009155282" comment="tomcat-8.0.43-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155283" comment="tomcat-admin-webapps-8.0.43-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155284" comment="tomcat-docs-webapp-8.0.43-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155285" comment="tomcat-el-3_0-api-8.0.43-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155286" comment="tomcat-javadoc-8.0.43-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155287" comment="tomcat-jsp-2_3-api-8.0.43-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155288" comment="tomcat-lib-8.0.43-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155289" comment="tomcat-servlet-3_1-api-8.0.43-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009155290" comment="tomcat-webapps-8.0.43-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148112" version="1" class="patch">
	<metadata>
		<title>tpm2.0-tools-2.0.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2017-7524" ref_url="https://www.suse.com/security/cve/CVE-2017-7524/" source="CVE"/>
		<description>
These are all security issues fixed in the tpm2.0-tools-2.0.0-2.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7524/">CVE-2017-7524 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7524">CVE-2017-7524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159315" comment="tpm2.0-tools-2.0.0-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148113" version="1" class="patch">
	<metadata>
		<title>unixODBC-2.3.4-6.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1145" ref_url="https://www.suse.com/security/cve/CVE-2011-1145/" source="CVE"/>
		<description>
These are all security issues fixed in the unixODBC-2.3.4-6.5 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2011-1145/">CVE-2011-1145 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-1145">CVE-2011-1145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141151" comment="unixODBC-2.3.4-6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141152" comment="unixODBC-32bit-2.3.4-6.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148114" version="1" class="patch">
	<metadata>
		<title>unrar-5.0.14-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<description>
These are all security issues fixed in the unrar-5.0.14-3.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6706">CVE-2012-6706 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157766" comment="unrar-5.0.14-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148115" version="1" class="patch">
	<metadata>
		<title>unzip-6.00-32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139/" source="CVE"/>
		<reference ref_id="CVE-2014-8140" ref_url="https://www.suse.com/security/cve/CVE-2014-8140/" source="CVE"/>
		<reference ref_id="CVE-2014-8141" ref_url="https://www.suse.com/security/cve/CVE-2014-8141/" source="CVE"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<description>
These are all security issues fixed in the unzip-6.00-32.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8139">CVE-2014-8139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8140/">CVE-2014-8140 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8140">CVE-2014-8140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8141/">CVE-2014-8141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8141">CVE-2014-8141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9636">CVE-2014-9636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106381" comment="unzip-6.00-32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148116" version="1" class="patch">
	<metadata>
		<title>update-alternatives-1.18.4-14.216 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-0840" ref_url="https://www.suse.com/security/cve/CVE-2015-0840/" source="CVE"/>
		<description>
These are all security issues fixed in the update-alternatives-1.18.4-14.216 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0840/">CVE-2015-0840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0840">CVE-2015-0840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141153" comment="update-alternatives-1.18.4-14.216 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148117" version="1" class="patch">
	<metadata>
		<title>vino-3.20.2-5.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0904" ref_url="https://www.suse.com/security/cve/CVE-2011-0904/" source="CVE"/>
		<reference ref_id="CVE-2011-0905" ref_url="https://www.suse.com/security/cve/CVE-2011-0905/" source="CVE"/>
		<reference ref_id="CVE-2011-1164" ref_url="https://www.suse.com/security/cve/CVE-2011-1164/" source="CVE"/>
		<description>
These are all security issues fixed in the vino-3.20.2-5.8 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0904/">CVE-2011-0904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0904">CVE-2011-0904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0905/">CVE-2011-0905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0905">CVE-2011-0905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1164/">CVE-2011-1164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1164">CVE-2011-1164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141154" comment="vino-3.20.2-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141155" comment="vino-lang-3.20.2-5.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148118" version="1" class="patch">
	<metadata>
		<title>vorbis-tools-1.4.0-26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-1686" ref_url="https://www.suse.com/security/cve/CVE-2008-1686/" source="CVE"/>
		<reference ref_id="CVE-2014-9638" ref_url="https://www.suse.com/security/cve/CVE-2014-9638/" source="CVE"/>
		<reference ref_id="CVE-2014-9639" ref_url="https://www.suse.com/security/cve/CVE-2014-9639/" source="CVE"/>
		<reference ref_id="CVE-2014-9640" ref_url="https://www.suse.com/security/cve/CVE-2014-9640/" source="CVE"/>
		<reference ref_id="CVE-2015-6749" ref_url="https://www.suse.com/security/cve/CVE-2015-6749/" source="CVE"/>
		<description>
These are all security issues fixed in the vorbis-tools-1.4.0-26.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1686/">CVE-2008-1686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1686">CVE-2008-1686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9638/">CVE-2014-9638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9638">CVE-2014-9638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9639/">CVE-2014-9639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9639">CVE-2014-9639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9640/">CVE-2014-9640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9640">CVE-2014-9640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6749/">CVE-2015-6749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6749">CVE-2015-6749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009115051" comment="vorbis-tools-1.4.0-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115052" comment="vorbis-tools-lang-1.4.0-26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148119" version="1" class="patch">
	<metadata>
		<title>vsftpd-3.0.2-39.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-1419" ref_url="https://www.suse.com/security/cve/CVE-2015-1419/" source="CVE"/>
		<description>
These are all security issues fixed in the vsftpd-3.0.2-39.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1419/">CVE-2015-1419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1419">CVE-2015-1419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159316" comment="vsftpd-3.0.2-39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148120" version="1" class="patch">
	<metadata>
		<title>w3m-0.5.3.git20161120-160.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2016-9434" ref_url="https://www.suse.com/security/cve/CVE-2016-9434/" source="CVE"/>
		<reference ref_id="CVE-2016-9435" ref_url="https://www.suse.com/security/cve/CVE-2016-9435/" source="CVE"/>
		<reference ref_id="CVE-2016-9436" ref_url="https://www.suse.com/security/cve/CVE-2016-9436/" source="CVE"/>
		<reference ref_id="CVE-2016-9437" ref_url="https://www.suse.com/security/cve/CVE-2016-9437/" source="CVE"/>
		<reference ref_id="CVE-2016-9438" ref_url="https://www.suse.com/security/cve/CVE-2016-9438/" source="CVE"/>
		<reference ref_id="CVE-2016-9439" ref_url="https://www.suse.com/security/cve/CVE-2016-9439/" source="CVE"/>
		<reference ref_id="CVE-2016-9440" ref_url="https://www.suse.com/security/cve/CVE-2016-9440/" source="CVE"/>
		<reference ref_id="CVE-2016-9441" ref_url="https://www.suse.com/security/cve/CVE-2016-9441/" source="CVE"/>
		<reference ref_id="CVE-2016-9442" ref_url="https://www.suse.com/security/cve/CVE-2016-9442/" source="CVE"/>
		<reference ref_id="CVE-2016-9443" ref_url="https://www.suse.com/security/cve/CVE-2016-9443/" source="CVE"/>
		<reference ref_id="CVE-2016-9621" ref_url="https://www.suse.com/security/cve/CVE-2016-9621/" source="CVE"/>
		<reference ref_id="CVE-2016-9622" ref_url="https://www.suse.com/security/cve/CVE-2016-9622/" source="CVE"/>
		<reference ref_id="CVE-2016-9623" ref_url="https://www.suse.com/security/cve/CVE-2016-9623/" source="CVE"/>
		<reference ref_id="CVE-2016-9624" ref_url="https://www.suse.com/security/cve/CVE-2016-9624/" source="CVE"/>
		<reference ref_id="CVE-2016-9625" ref_url="https://www.suse.com/security/cve/CVE-2016-9625/" source="CVE"/>
		<reference ref_id="CVE-2016-9626" ref_url="https://www.suse.com/security/cve/CVE-2016-9626/" source="CVE"/>
		<reference ref_id="CVE-2016-9627" ref_url="https://www.suse.com/security/cve/CVE-2016-9627/" source="CVE"/>
		<reference ref_id="CVE-2016-9628" ref_url="https://www.suse.com/security/cve/CVE-2016-9628/" source="CVE"/>
		<reference ref_id="CVE-2016-9629" ref_url="https://www.suse.com/security/cve/CVE-2016-9629/" source="CVE"/>
		<reference ref_id="CVE-2016-9630" ref_url="https://www.suse.com/security/cve/CVE-2016-9630/" source="CVE"/>
		<reference ref_id="CVE-2016-9631" ref_url="https://www.suse.com/security/cve/CVE-2016-9631/" source="CVE"/>
		<reference ref_id="CVE-2016-9632" ref_url="https://www.suse.com/security/cve/CVE-2016-9632/" source="CVE"/>
		<reference ref_id="CVE-2016-9633" ref_url="https://www.suse.com/security/cve/CVE-2016-9633/" source="CVE"/>
		<description>
These are all security issues fixed in the w3m-0.5.3.git20161120-160.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2074">CVE-2010-2074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4929">CVE-2012-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9434/">CVE-2016-9434 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9434">CVE-2016-9434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9435/">CVE-2016-9435 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9435">CVE-2016-9435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9436/">CVE-2016-9436 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9436">CVE-2016-9436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9437/">CVE-2016-9437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9437">CVE-2016-9437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9438/">CVE-2016-9438 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9438">CVE-2016-9438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9439/">CVE-2016-9439 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9439">CVE-2016-9439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9440/">CVE-2016-9440 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9440">CVE-2016-9440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9441/">CVE-2016-9441 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9441">CVE-2016-9441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9442/">CVE-2016-9442 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9442">CVE-2016-9442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9443/">CVE-2016-9443 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9443">CVE-2016-9443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9621/">CVE-2016-9621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-9621">CVE-2016-9621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9622/">CVE-2016-9622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9622">CVE-2016-9622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9623/">CVE-2016-9623 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9623">CVE-2016-9623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9624/">CVE-2016-9624 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9624">CVE-2016-9624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9625/">CVE-2016-9625 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9625">CVE-2016-9625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9626/">CVE-2016-9626 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9626">CVE-2016-9626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9627/">CVE-2016-9627 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9627">CVE-2016-9627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9628/">CVE-2016-9628 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9628">CVE-2016-9628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9629/">CVE-2016-9629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9629">CVE-2016-9629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9630/">CVE-2016-9630 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9630">CVE-2016-9630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9631/">CVE-2016-9631 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9631">CVE-2016-9631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9632/">CVE-2016-9632 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9632">CVE-2016-9632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9633/">CVE-2016-9633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9633">CVE-2016-9633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009136644" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148121" version="1" class="patch">
	<metadata>
		<title>wget-1.14-20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2252" ref_url="https://www.suse.com/security/cve/CVE-2010-2252/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971/" source="CVE"/>
		<reference ref_id="CVE-2016-7098" ref_url="https://www.suse.com/security/cve/CVE-2016-7098/" source="CVE"/>
		<reference ref_id="CVE-2017-6508" ref_url="https://www.suse.com/security/cve/CVE-2017-6508/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-1.14-20.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2252/">CVE-2010-2252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2252">CVE-2010-2252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4929">CVE-2012-4929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4877">CVE-2014-4877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2059">CVE-2015-2059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4971">CVE-2016-4971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7098/">CVE-2016-7098 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7098">CVE-2016-7098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6508/">CVE-2017-6508 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6508">CVE-2017-6508 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009149815" comment="wget-1.14-20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148122" version="1" class="patch">
	<metadata>
		<title>wpa_supplicant-2.2-14.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686/" source="CVE"/>
		<reference ref_id="CVE-2015-0210" ref_url="https://www.suse.com/security/cve/CVE-2015-0210/" source="CVE"/>
		<reference ref_id="CVE-2015-1863" ref_url="https://www.suse.com/security/cve/CVE-2015-1863/" source="CVE"/>
		<reference ref_id="CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141/" source="CVE"/>
		<reference ref_id="CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142/" source="CVE"/>
		<reference ref_id="CVE-2015-4143" ref_url="https://www.suse.com/security/cve/CVE-2015-4143/" source="CVE"/>
		<reference ref_id="CVE-2015-5130" ref_url="https://www.suse.com/security/cve/CVE-2015-5130/" source="CVE"/>
		<reference ref_id="CVE-2015-5310" ref_url="https://www.suse.com/security/cve/CVE-2015-5310/" source="CVE"/>
		<reference ref_id="CVE-2015-8041" ref_url="https://www.suse.com/security/cve/CVE-2015-8041/" source="CVE"/>
		<description>
These are all security issues fixed in the wpa_supplicant-2.2-14.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3686">CVE-2014-3686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0210/">CVE-2015-0210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0210">CVE-2015-0210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1863/">CVE-2015-1863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1863">CVE-2015-1863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4141">CVE-2015-4141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4142">CVE-2015-4142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4143/">CVE-2015-4143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4143">CVE-2015-4143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5130/">CVE-2015-5130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5130">CVE-2015-5130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5310/">CVE-2015-5310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5310">CVE-2015-5310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8041/">CVE-2015-8041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8041">CVE-2015-8041 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131098" comment="wpa_supplicant-2.2-14.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148123" version="1" class="patch">
	<metadata>
		<title>xalan-j2-2.7.0-264.133 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107/" source="CVE"/>
		<description>
These are all security issues fixed in the xalan-j2-2.7.0-264.133 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0107">CVE-2014-0107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141158" comment="xalan-j2-2.7.0-264.38 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148124" version="1" class="patch">
	<metadata>
		<title>xdg-utils-20140630-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-9622" ref_url="https://www.suse.com/security/cve/CVE-2014-9622/" source="CVE"/>
		<description>
These are all security issues fixed in the xdg-utils-20140630-5.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9622/">CVE-2014-9622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9622">CVE-2014-9622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106065" comment="xdg-utils-20140630-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148125" version="1" class="patch">
	<metadata>
		<title>xen-4.9.0_08-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1898" ref_url="https://www.suse.com/security/cve/CVE-2011-1898/" source="CVE"/>
		<reference ref_id="CVE-2012-0029" ref_url="https://www.suse.com/security/cve/CVE-2012-0029/" source="CVE"/>
		<reference ref_id="CVE-2012-0217" ref_url="https://www.suse.com/security/cve/CVE-2012-0217/" source="CVE"/>
		<reference ref_id="CVE-2012-2625" ref_url="https://www.suse.com/security/cve/CVE-2012-2625/" source="CVE"/>
		<reference ref_id="CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432/" source="CVE"/>
		<reference ref_id="CVE-2012-3433" ref_url="https://www.suse.com/security/cve/CVE-2012-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<reference ref_id="CVE-2012-5510" ref_url="https://www.suse.com/security/cve/CVE-2012-5510/" source="CVE"/>
		<reference ref_id="CVE-2012-5511" ref_url="https://www.suse.com/security/cve/CVE-2012-5511/" source="CVE"/>
		<reference ref_id="CVE-2012-5513" ref_url="https://www.suse.com/security/cve/CVE-2012-5513/" source="CVE"/>
		<reference ref_id="CVE-2012-5514" ref_url="https://www.suse.com/security/cve/CVE-2012-5514/" source="CVE"/>
		<reference ref_id="CVE-2012-5515" ref_url="https://www.suse.com/security/cve/CVE-2012-5515/" source="CVE"/>
		<reference ref_id="CVE-2012-5525" ref_url="https://www.suse.com/security/cve/CVE-2012-5525/" source="CVE"/>
		<reference ref_id="CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634/" source="CVE"/>
		<reference ref_id="CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-0151" ref_url="https://www.suse.com/security/cve/CVE-2013-0151/" source="CVE"/>
		<reference ref_id="CVE-2013-0152" ref_url="https://www.suse.com/security/cve/CVE-2013-0152/" source="CVE"/>
		<reference ref_id="CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919/" source="CVE"/>
		<reference ref_id="CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922/" source="CVE"/>
		<reference ref_id="CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<reference ref_id="CVE-2013-3495" ref_url="https://www.suse.com/security/cve/CVE-2013-3495/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4356" ref_url="https://www.suse.com/security/cve/CVE-2013-4356/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4551" ref_url="https://www.suse.com/security/cve/CVE-2013-4551/" source="CVE"/>
		<reference ref_id="CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553/" source="CVE"/>
		<reference ref_id="CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3124" ref_url="https://www.suse.com/security/cve/CVE-2014-3124/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2014-5146" ref_url="https://www.suse.com/security/cve/CVE-2014-5146/" source="CVE"/>
		<reference ref_id="CVE-2014-5149" ref_url="https://www.suse.com/security/cve/CVE-2014-5149/" source="CVE"/>
		<reference ref_id="CVE-2014-6268" ref_url="https://www.suse.com/security/cve/CVE-2014-6268/" source="CVE"/>
		<reference ref_id="CVE-2014-7154" ref_url="https://www.suse.com/security/cve/CVE-2014-7154/" source="CVE"/>
		<reference ref_id="CVE-2014-7155" ref_url="https://www.suse.com/security/cve/CVE-2014-7155/" source="CVE"/>
		<reference ref_id="CVE-2014-7156" ref_url="https://www.suse.com/security/cve/CVE-2014-7156/" source="CVE"/>
		<reference ref_id="CVE-2014-7188" ref_url="https://www.suse.com/security/cve/CVE-2014-7188/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-3340" ref_url="https://www.suse.com/security/cve/CVE-2015-3340/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8615" ref_url="https://www.suse.com/security/cve/CVE-2015-8615/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-10025" ref_url="https://www.suse.com/security/cve/CVE-2016-10025/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6259" ref_url="https://www.suse.com/security/cve/CVE-2016-6259/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7093" ref_url="https://www.suse.com/security/cve/CVE-2016-7093/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9377" ref_url="https://www.suse.com/security/cve/CVE-2016-9377/" source="CVE"/>
		<reference ref_id="CVE-2016-9378" ref_url="https://www.suse.com/security/cve/CVE-2016-9378/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9384" ref_url="https://www.suse.com/security/cve/CVE-2016-9384/" source="CVE"/>
		<reference ref_id="CVE-2016-9385" ref_url="https://www.suse.com/security/cve/CVE-2016-9385/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.9.0_08-2.2 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1898/">CVE-2011-1898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1898">CVE-2011-1898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0029/">CVE-2012-0029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0029">CVE-2012-0029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0217/">CVE-2012-0217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0217">CVE-2012-0217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2625/">CVE-2012-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2625">CVE-2012-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3432">CVE-2012-3432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3433/">CVE-2012-3433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3433">CVE-2012-3433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4411">CVE-2012-4411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4535">CVE-2012-4535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4536">CVE-2012-4536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4537">CVE-2012-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4538">CVE-2012-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4539">CVE-2012-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4544">CVE-2012-4544 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5510/">CVE-2012-5510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5510">CVE-2012-5510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5511/">CVE-2012-5511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5511">CVE-2012-5511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5513/">CVE-2012-5513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5513">CVE-2012-5513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5514/">CVE-2012-5514 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5514">CVE-2012-5514 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5515/">CVE-2012-5515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5515">CVE-2012-5515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5525/">CVE-2012-5525 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5525">CVE-2012-5525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5634">CVE-2012-5634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6075">CVE-2012-6075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0151/">CVE-2013-0151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0151">CVE-2013-0151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0152/">CVE-2013-0152 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0152">CVE-2013-0152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0153">CVE-2013-0153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1442">CVE-2013-1442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1917">CVE-2013-1917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1918">CVE-2013-1918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1919">CVE-2013-1919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1922">CVE-2013-1922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1952">CVE-2013-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2007">CVE-2013-2007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3495/">CVE-2013-3495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3495">CVE-2013-3495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4355">CVE-2013-4355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4356/">CVE-2013-4356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4356">CVE-2013-4356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4361">CVE-2013-4361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4375">CVE-2013-4375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4416">CVE-2013-4416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4494">CVE-2013-4494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4533">CVE-2013-4533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4534">CVE-2013-4534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4537">CVE-2013-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4538">CVE-2013-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4539">CVE-2013-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4540">CVE-2013-4540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4551/">CVE-2013-4551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4551">CVE-2013-4551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4553">CVE-2013-4553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4554">CVE-2013-4554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3124/">CVE-2014-3124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3124">CVE-2014-3124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3640">CVE-2014-3640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3672">CVE-2014-3672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5146/">CVE-2014-5146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5146">CVE-2014-5146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5149/">CVE-2014-5149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5149">CVE-2014-5149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6268/">CVE-2014-6268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6268">CVE-2014-6268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7154/">CVE-2014-7154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7154">CVE-2014-7154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7155/">CVE-2014-7155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7155">CVE-2014-7155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7156/">CVE-2014-7156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7156">CVE-2014-7156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7188/">CVE-2014-7188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7188">CVE-2014-7188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7815">CVE-2014-7815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1779">CVE-2015-1779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3259">CVE-2015-3259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3340/">CVE-2015-3340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3340">CVE-2015-3340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3456">CVE-2015-3456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4037">CVE-2015-4037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4103">CVE-2015-4103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4104">CVE-2015-4104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4105">CVE-2015-4105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4106">CVE-2015-4106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5154">CVE-2015-5154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5239">CVE-2015-5239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5278">CVE-2015-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5307">CVE-2015-5307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6815">CVE-2015-6815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6855">CVE-2015-6855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7311">CVE-2015-7311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7504">CVE-2015-7504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7512">CVE-2015-7512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7549">CVE-2015-7549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7835">CVE-2015-7835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7969">CVE-2015-7969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7970">CVE-2015-7970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7971">CVE-2015-7971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7972">CVE-2015-7972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8104">CVE-2015-8104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8339">CVE-2015-8339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8340">CVE-2015-8340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8341">CVE-2015-8341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8345">CVE-2015-8345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8504">CVE-2015-8504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8550">CVE-2015-8550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8554">CVE-2015-8554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8555">CVE-2015-8555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8558">CVE-2015-8558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8567">CVE-2015-8567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8568">CVE-2015-8568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8613">CVE-2015-8613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8615/">CVE-2015-8615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8615">CVE-2015-8615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8619">CVE-2015-8619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8743">CVE-2015-8743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8744">CVE-2015-8744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8745">CVE-2015-8745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10013">CVE-2016-10013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10024">CVE-2016-10024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10025/">CVE-2016-10025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10025">CVE-2016-10025 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1568">CVE-2016-1568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1570">CVE-2016-1570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1571">CVE-2016-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1714">CVE-2016-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1922">CVE-2016-1922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1981">CVE-2016-1981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2198">CVE-2016-2198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2270">CVE-2016-2270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2271">CVE-2016-2271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2391">CVE-2016-2391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2392">CVE-2016-2392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2538">CVE-2016-2538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2841">CVE-2016-2841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4439">CVE-2016-4439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4441">CVE-2016-4441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5238">CVE-2016-5238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5338">CVE-2016-5338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6258">CVE-2016-6258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6259/">CVE-2016-6259 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6259">CVE-2016-6259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6351">CVE-2016-6351 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7092">CVE-2016-7092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7093/">CVE-2016-7093 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7093">CVE-2016-7093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7094">CVE-2016-7094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7777">CVE-2016-7777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7908">CVE-2016-7908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7909">CVE-2016-7909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8667">CVE-2016-8667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8669">CVE-2016-8669 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8910">CVE-2016-8910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9377/">CVE-2016-9377 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9377">CVE-2016-9377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9378/">CVE-2016-9378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9378">CVE-2016-9378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9379">CVE-2016-9379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9380">CVE-2016-9380 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9381">CVE-2016-9381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9382">CVE-2016-9382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9383">CVE-2016-9383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9384/">CVE-2016-9384 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9384">CVE-2016-9384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9385/">CVE-2016-9385 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9385">CVE-2016-9385 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9386">CVE-2016-9386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9637">CVE-2016-9637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9921">CVE-2016-9921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9922">CVE-2016-9922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9932">CVE-2016-9932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2615">CVE-2017-2615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2620">CVE-2017-2620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6505">CVE-2017-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8309">CVE-2017-8309 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9330">CVE-2017-9330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009159317" comment="xen-4.9.0_08-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159318" comment="xen-doc-html-4.9.0_08-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159319" comment="xen-libs-4.9.0_08-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159320" comment="xen-libs-32bit-4.9.0_08-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159321" comment="xen-tools-4.9.0_08-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159322" comment="xen-tools-domU-4.9.0_08-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148126" version="1" class="patch">
	<metadata>
		<title>xf86-video-intel-2.99.917.770_gcb6ba2da-1.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2014-4910" ref_url="https://www.suse.com/security/cve/CVE-2014-4910/" source="CVE"/>
		<description>
These are all security issues fixed in the xf86-video-intel-2.99.917.770_gcb6ba2da-1.23 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4910/">CVE-2014-4910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4910">CVE-2014-4910 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159323" comment="xf86-video-intel-2.99.917.770_gcb6ba2da-1.23 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148127" version="1" class="patch">
	<metadata>
		<title>xfsprogs-4.3.0-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2150" ref_url="https://www.suse.com/security/cve/CVE-2012-2150/" source="CVE"/>
		<description>
These are all security issues fixed in the xfsprogs-4.3.0-12.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2150/">CVE-2012-2150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2150">CVE-2012-2150 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159324" comment="xfsprogs-4.3.0-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148128" version="1" class="patch">
	<metadata>
		<title>xinetd-2.3.15-7.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-0862" ref_url="https://www.suse.com/security/cve/CVE-2012-0862/" source="CVE"/>
		<reference ref_id="CVE-2013-4342" ref_url="https://www.suse.com/security/cve/CVE-2013-4342/" source="CVE"/>
		<description>
These are all security issues fixed in the xinetd-2.3.15-7.3 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0862/">CVE-2012-0862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0862">CVE-2012-0862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4342/">CVE-2013-4342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4342">CVE-2013-4342 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141167" comment="xinetd-2.3.15-7.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148129" version="1" class="patch">
	<metadata>
		<title>xlockmore-5.43-5.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-4143" ref_url="https://www.suse.com/security/cve/CVE-2013-4143/" source="CVE"/>
		<description>
These are all security issues fixed in the xlockmore-5.43-5.30 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4143/">CVE-2013-4143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4143">CVE-2013-4143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141168" comment="xlockmore-5.43-5.33 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148130" version="1" class="patch">
	<metadata>
		<title>xorg-x11-7.6_1-14.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0465" ref_url="https://www.suse.com/security/cve/CVE-2011-0465/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-7.6_1-14.17 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0465/">CVE-2011-0465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0465">CVE-2011-0465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141169" comment="xorg-x11-7.6_1-14.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141170" comment="xorg-x11-essentials-7.6_1-14.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141171" comment="xrdb-1.1.0-3.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148131" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libs-7.6-45.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libs-7.6-45.14 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2895">CVE-2011-2895 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141172" comment="xorg-x11-libs-7.6-45.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148132" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-7.6_1.18.3-71.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2013-1940" ref_url="https://www.suse.com/security/cve/CVE-2013-1940/" source="CVE"/>
		<reference ref_id="CVE-2013-4396" ref_url="https://www.suse.com/security/cve/CVE-2013-4396/" source="CVE"/>
		<reference ref_id="CVE-2013-6424" ref_url="https://www.suse.com/security/cve/CVE-2013-6424/" source="CVE"/>
		<reference ref_id="CVE-2014-8091" ref_url="https://www.suse.com/security/cve/CVE-2014-8091/" source="CVE"/>
		<reference ref_id="CVE-2014-8092" ref_url="https://www.suse.com/security/cve/CVE-2014-8092/" source="CVE"/>
		<reference ref_id="CVE-2014-8093" ref_url="https://www.suse.com/security/cve/CVE-2014-8093/" source="CVE"/>
		<reference ref_id="CVE-2014-8094" ref_url="https://www.suse.com/security/cve/CVE-2014-8094/" source="CVE"/>
		<reference ref_id="CVE-2014-8095" ref_url="https://www.suse.com/security/cve/CVE-2014-8095/" source="CVE"/>
		<reference ref_id="CVE-2014-8096" ref_url="https://www.suse.com/security/cve/CVE-2014-8096/" source="CVE"/>
		<reference ref_id="CVE-2014-8097" ref_url="https://www.suse.com/security/cve/CVE-2014-8097/" source="CVE"/>
		<reference ref_id="CVE-2014-8098" ref_url="https://www.suse.com/security/cve/CVE-2014-8098/" source="CVE"/>
		<reference ref_id="CVE-2014-8099" ref_url="https://www.suse.com/security/cve/CVE-2014-8099/" source="CVE"/>
		<reference ref_id="CVE-2014-8100" ref_url="https://www.suse.com/security/cve/CVE-2014-8100/" source="CVE"/>
		<reference ref_id="CVE-2014-8101" ref_url="https://www.suse.com/security/cve/CVE-2014-8101/" source="CVE"/>
		<reference ref_id="CVE-2014-8102" ref_url="https://www.suse.com/security/cve/CVE-2014-8102/" source="CVE"/>
		<reference ref_id="CVE-2014-8103" ref_url="https://www.suse.com/security/cve/CVE-2014-8103/" source="CVE"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<reference ref_id="CVE-2015-3164" ref_url="https://www.suse.com/security/cve/CVE-2015-3164/" source="CVE"/>
		<reference ref_id="CVE-2015-3418" ref_url="https://www.suse.com/security/cve/CVE-2015-3418/" source="CVE"/>
		<reference ref_id="CVE-2017-2624" ref_url="https://www.suse.com/security/cve/CVE-2017-2624/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-7.6_1.18.3-71.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2240">CVE-2010-2240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1940/">CVE-2013-1940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1940">CVE-2013-1940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4396/">CVE-2013-4396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4396">CVE-2013-4396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6424/">CVE-2013-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6424">CVE-2013-6424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8091/">CVE-2014-8091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8091">CVE-2014-8091 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2014-8092/">CVE-2014-8092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8092">CVE-2014-8092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8093/">CVE-2014-8093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8093">CVE-2014-8093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8094/">CVE-2014-8094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8094">CVE-2014-8094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8095/">CVE-2014-8095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8095">CVE-2014-8095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8096/">CVE-2014-8096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8096">CVE-2014-8096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8097/">CVE-2014-8097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8097">CVE-2014-8097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8098/">CVE-2014-8098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8098">CVE-2014-8098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8099/">CVE-2014-8099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8099">CVE-2014-8099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8100/">CVE-2014-8100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8100">CVE-2014-8100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8101/">CVE-2014-8101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8101">CVE-2014-8101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8102/">CVE-2014-8102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8102">CVE-2014-8102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8103/">CVE-2014-8103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8103">CVE-2014-8103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0255">CVE-2015-0255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3164/">CVE-2015-3164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3164">CVE-2015-3164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3418/">CVE-2015-3418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3418">CVE-2015-3418 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2624/">CVE-2017-2624 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2624">CVE-2017-2624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009157352" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009157353" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148133" version="1" class="patch">
	<metadata>
		<title>xscreensaver-5.22-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025/" source="CVE"/>
		<description>
These are all security issues fixed in the xscreensaver-5.22-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8025">CVE-2015-8025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009119273" comment="xscreensaver-5.22-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119274" comment="xscreensaver-data-5.22-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148134" version="1" class="patch">
	<metadata>
		<title>yast2-3.2.36-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-3.2.36-1.11 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3177">CVE-2011-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159325" comment="yast2-3.2.36-1.11 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148135" version="1" class="patch">
	<metadata>
		<title>yast2-core-3.2.2-1.29 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-core-3.2.2-1.29 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2483">CVE-2011-2483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3177">CVE-2011-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159326" comment="yast2-core-3.2.2-1.29 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148136" version="1" class="patch">
	<metadata>
		<title>yast2-users-3.2.11-1.47 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2016-1601" ref_url="https://www.suse.com/security/cve/CVE-2016-1601/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-users-3.2.11-1.47 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1601/">CVE-2016-1601 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1601">CVE-2016-1601 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009159327" comment="yast2-users-3.2.11-1.47 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148137" version="1" class="patch">
	<metadata>
		<title>zoo-2.10-1020.56 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-0855" ref_url="https://www.suse.com/security/cve/CVE-2006-0855/" source="CVE"/>
		<reference ref_id="CVE-2007-1669" ref_url="https://www.suse.com/security/cve/CVE-2007-1669/" source="CVE"/>
		<description>
These are all security issues fixed in the zoo-2.10-1020.56 package on the GA media of SUSE Linux Enterprise Server 12 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-0855/">CVE-2006-0855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-0855">CVE-2006-0855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1669/">CVE-2007-1669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1669">CVE-2007-1669 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512004" comment="zoo-2.10-1020.62 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148138" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1095218" ref_url="https://bugzilla.suse.com/1095218" source="BUGZILLA"/>
		<reference ref_id="1095219" ref_url="https://bugzilla.suse.com/1095219" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11233" ref_url="https://www.suse.com/security/cve/CVE-2018-11233/" source="CVE"/>
		<reference ref_id="CVE-2018-11235" ref_url="https://www.suse.com/security/cve/CVE-2018-11235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004159.html" source="SUSE-SU"/>
		<description>
This update for git fixes several issues.

These security issues were fixed:

- CVE-2018-11233: Path sanity-checks on NTFS allowed attackers to read arbitrary memory (bsc#1095218)
- CVE-2018-11235: Arbitrary code execution when recursively cloning a malicious repository (bsc#1095219)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-07"/>
	<updated date="2018-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1095218">SUSE bug 1095218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095219">SUSE bug 1095219</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11233/">CVE-2018-11233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11233">CVE-2018-11233 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11235/">CVE-2018-11235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11235">CVE-2018-11235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596504" comment="git-2.12.3-27.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148139" version="1" class="patch">
	<metadata>
		<title>Security update for pdns (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1092540" ref_url="https://bugzilla.suse.com/1092540" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1046" ref_url="https://www.suse.com/security/cve/CVE-2018-1046/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004184.html" source="SUSE-SU"/>
		<description>
This update for pdns fixes the following issues:

Security issues fixed:

- CVE-2018-1046: Fix an issue with replaying a specially crafted PCAP file that can trigger a stack-based buffer overflow, leading to a crash and potentially arbitrary code execution (bsc#1092540).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-12"/>
	<updated date="2018-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092540">SUSE bug 1092540</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1046/">CVE-2018-1046 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1046">CVE-2018-1046 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596505" comment="pdns-4.1.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596506" comment="pdns-backend-mysql-4.1.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148140" version="1" class="patch">
	<metadata>
		<title>Security update for slf4j (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1085970" ref_url="https://bugzilla.suse.com/1085970" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8088" ref_url="https://www.suse.com/security/cve/CVE-2018-8088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004199.html" source="SUSE-SU"/>
		<description>
This update for slf4j fixes the following issues:

- CVE-2018-8088: Disallow EventData deserialization by default to avoid arbitrary code execution using serialized data (bsc#1085970)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-19"/>
	<updated date="2018-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085970">SUSE bug 1085970</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8088/">CVE-2018-8088 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8088">CVE-2018-8088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541515" comment="slf4j-1.7.12-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148141" version="1" class="patch">
	<metadata>
		<title>Security update for cobbler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1074594" ref_url="https://bugzilla.suse.com/1074594" source="BUGZILLA"/>
		<reference ref_id="1075014" ref_url="https://bugzilla.suse.com/1075014" source="BUGZILLA"/>
		<reference ref_id="1081714" ref_url="https://bugzilla.suse.com/1081714" source="BUGZILLA"/>
		<reference ref_id="1090205" ref_url="https://bugzilla.suse.com/1090205" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000469" ref_url="https://www.suse.com/security/cve/CVE-2017-1000469/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004196.html" source="SUSE-SU"/>
		<description>
This update for cobbler fixes the following issues:

The following security issue has been fixed:

- CVE-2017-1000469: Escape shell parameters provided by the user for the reposync action. (bsc#1074594)

Additionally, the following non-security issues have been fixed:

- Fix signature for SLES15. (bsc#1075014)
- Detect if there is already another instance of 'cobbler sync' running and exit with failure if so. (bsc#1081714)
- Add SLES 15 distro profile. (bsc#1090205)
- Require tftp(server) instead of atftp.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-19"/>
	<updated date="2018-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074594">SUSE bug 1074594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075014">SUSE bug 1075014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081714">SUSE bug 1081714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090205">SUSE bug 1090205</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000469/">CVE-2017-1000469 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000469">CVE-2017-1000469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596507" comment="cobbler-2.6.6-49.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148142" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb, mariadb-connector-c, xtrabackup (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1080891" ref_url="https://bugzilla.suse.com/1080891" source="BUGZILLA"/>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1088681" ref_url="https://bugzilla.suse.com/1088681" source="BUGZILLA"/>
		<reference ref_id="1092544" ref_url="https://bugzilla.suse.com/1092544" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755/" source="CVE"/>
		<reference ref_id="CVE-2018-2759" ref_url="https://www.suse.com/security/cve/CVE-2018-2759/" source="CVE"/>
		<reference ref_id="CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761/" source="CVE"/>
		<reference ref_id="CVE-2018-2766" ref_url="https://www.suse.com/security/cve/CVE-2018-2766/" source="CVE"/>
		<reference ref_id="CVE-2018-2767" ref_url="https://www.suse.com/security/cve/CVE-2018-2767/" source="CVE"/>
		<reference ref_id="CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771/" source="CVE"/>
		<reference ref_id="CVE-2018-2777" ref_url="https://www.suse.com/security/cve/CVE-2018-2777/" source="CVE"/>
		<reference ref_id="CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781/" source="CVE"/>
		<reference ref_id="CVE-2018-2782" ref_url="https://www.suse.com/security/cve/CVE-2018-2782/" source="CVE"/>
		<reference ref_id="CVE-2018-2784" ref_url="https://www.suse.com/security/cve/CVE-2018-2784/" source="CVE"/>
		<reference ref_id="CVE-2018-2786" ref_url="https://www.suse.com/security/cve/CVE-2018-2786/" source="CVE"/>
		<reference ref_id="CVE-2018-2787" ref_url="https://www.suse.com/security/cve/CVE-2018-2787/" source="CVE"/>
		<reference ref_id="CVE-2018-2810" ref_url="https://www.suse.com/security/cve/CVE-2018-2810/" source="CVE"/>
		<reference ref_id="CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813/" source="CVE"/>
		<reference ref_id="CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817/" source="CVE"/>
		<reference ref_id="CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<description>
This MariaDB update to version 10.2.15 brings the following fixes and improvements.

Security issues:

- CVE-2018-2767: The embedded server library now supports SSL when connecting to remote servers (bsc#1088681).
- Collected CVEs fixes:
  * 10.2.15: CVE-2018-2786, CVE-2018-2759, CVE-2018-2777, CVE-2018-2810,
             CVE-2018-2782, CVE-2018-2784, CVE-2018-2787, CVE-2018-2766,
             CVE-2018-2755, CVE-2018-2819, CVE-2018-2817, CVE-2018-2761, 
             CVE-2018-2781, CVE-2018-2771, CVE-2018-2813

Bugfixes:

- bsc#1092544: Update suse_skipped_tests.list and add tests that are failing with GCC 8.
- bsc#1080891: Compile option DWITH_SYSTEMD=ON is no longer needed - systemd is detected automatically.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-21"/>
	<updated date="2018-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1080891">SUSE bug 1080891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088681">SUSE bug 1088681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092544">SUSE bug 1092544</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2755">CVE-2018-2755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2759/">CVE-2018-2759 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2759">CVE-2018-2759 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2761">CVE-2018-2761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2766/">CVE-2018-2766 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2766">CVE-2018-2766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2767/">CVE-2018-2767 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2767">CVE-2018-2767 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2771">CVE-2018-2771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2777/">CVE-2018-2777 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2777">CVE-2018-2777 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2781">CVE-2018-2781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2782/">CVE-2018-2782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2782">CVE-2018-2782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2784/">CVE-2018-2784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2784">CVE-2018-2784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2786/">CVE-2018-2786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2786">CVE-2018-2786 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2787/">CVE-2018-2787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2787">CVE-2018-2787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2810/">CVE-2018-2810 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2810">CVE-2018-2810 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2813">CVE-2018-2813 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2817">CVE-2018-2817 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2819">CVE-2018-2819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596508" comment="libmariadb3-3.0.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596509" comment="mariadb-10.2.15-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596510" comment="mariadb-client-10.2.15-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596511" comment="mariadb-errormessages-10.2.15-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596512" comment="mariadb-galera-10.2.15-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596513" comment="mariadb-tools-10.2.15-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596514" comment="xtrabackup-2.4.10-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148143" version="1" class="patch">
	<metadata>
		<title>Security update for grafana, kafka, logstash, openstack-monasca-installer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1090336" ref_url="https://bugzilla.suse.com/1090336" source="BUGZILLA"/>
		<reference ref_id="1090849" ref_url="https://bugzilla.suse.com/1090849" source="BUGZILLA"/>
		<reference ref_id="1094448" ref_url="https://bugzilla.suse.com/1094448" source="BUGZILLA"/>
		<reference ref_id="1095603" ref_url="https://bugzilla.suse.com/1095603" source="BUGZILLA"/>
		<reference ref_id="1096985" ref_url="https://bugzilla.suse.com/1096985" source="BUGZILLA"/>
		<reference ref_id="1097847" ref_url="https://bugzilla.suse.com/1097847" source="BUGZILLA"/>
		<reference ref_id="1101366" ref_url="https://bugzilla.suse.com/1101366" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12099" ref_url="https://www.suse.com/security/cve/CVE-2018-12099/" source="CVE"/>
		<reference ref_id="CVE-2018-3817" ref_url="https://www.suse.com/security/cve/CVE-2018-3817/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004406.html" source="SUSE-SU"/>
		<description>
This update for grafana, kafka, logstash, openstack-monasca-installer fixes the following issues:

Security issues fixed:

- CVE-2018-12099: grafana: Fix XSS vulnerabilities in dashboard links (bsc#1096985).
- CVE-2018-3817: logstash: Fix inadvertently logging of sensitive information (bsc#1090849).

Bug fixes:

- bsc#1095603: Disable jmxremote debugging.
- bsc#1097847: Make time series database schema setup conditional.
- bsc#1094448: Set log rotation options.
- bsc#1090336: Add complete set of elasticsearch performance tunables.
- bsc#1101366: Fix build issues with s390x, ppc64le and aarch64.
- Fix various spec errors affecting Leap 15 and Tumbleweed 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1090336">SUSE bug 1090336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090849">SUSE bug 1090849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094448">SUSE bug 1094448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095603">SUSE bug 1095603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096985">SUSE bug 1096985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097847">SUSE bug 1097847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101366">SUSE bug 1101366</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12099/">CVE-2018-12099 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12099">CVE-2018-12099 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3817/">CVE-2018-3817 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3817">CVE-2018-3817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596515" comment="grafana-4.5.1-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596516" comment="kafka-0.9.0.1-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596517" comment="logstash-2.4.1-5.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596518" comment="openstack-monasca-installer-20180622_15.06-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148144" version="1" class="patch">
	<metadata>
		<title>Security update for cobbler (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1097733" ref_url="https://bugzilla.suse.com/1097733" source="BUGZILLA"/>
		<reference ref_id="1101670" ref_url="https://bugzilla.suse.com/1101670" source="BUGZILLA"/>
		<reference ref_id="1104189" ref_url="https://bugzilla.suse.com/1104189" source="BUGZILLA"/>
		<reference ref_id="1104190" ref_url="https://bugzilla.suse.com/1104190" source="BUGZILLA"/>
		<reference ref_id="1104287" ref_url="https://bugzilla.suse.com/1104287" source="BUGZILLA"/>
		<reference ref_id="1105440" ref_url="https://bugzilla.suse.com/1105440" source="BUGZILLA"/>
		<reference ref_id="1105442" ref_url="https://bugzilla.suse.com/1105442" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000225" ref_url="https://www.suse.com/security/cve/CVE-2018-1000225/" source="CVE"/>
		<reference ref_id="CVE-2018-1000226" ref_url="https://www.suse.com/security/cve/CVE-2018-1000226/" source="CVE"/>
		<reference ref_id="CVE-2018-10931" ref_url="https://www.suse.com/security/cve/CVE-2018-10931/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004514.html" source="SUSE-SU"/>
		<description>
This update for cobbler fixes the following issues:

Security issues fixed:

- Forbid exposure of private methods in the API (CVE-2018-10931,
  CVE-2018-1000225, bsc#1104287, bsc#1104189, bsc#1105442)
- Check access token when calling 'modify_setting' API endpoint (bsc#1104190,
  bsc#1105440, CVE-2018-1000226)

Other bugs fixed:

- Do not try to hardlink to a symlink. The result will be a dangling symlink
  in the general case. (bsc#1097733)
- fix kernel options when generating bootiso (bsc#1101670)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-30"/>
	<updated date="2018-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097733">SUSE bug 1097733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101670">SUSE bug 1101670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104189">SUSE bug 1104189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104190">SUSE bug 1104190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104287">SUSE bug 1104287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105440">SUSE bug 1105440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105442">SUSE bug 1105442</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000225/">CVE-2018-1000225 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000225">CVE-2018-1000225 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000226/">CVE-2018-1000226 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000226">CVE-2018-1000226 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10931/">CVE-2018-10931 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10931">CVE-2018-10931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596519" comment="cobbler-2.6.6-49.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148145" version="1" class="patch">
	<metadata>
		<title>Security update for OpenStack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1084362" ref_url="https://bugzilla.suse.com/1084362" source="BUGZILLA"/>
		<reference ref_id="1102151" ref_url="https://bugzilla.suse.com/1102151" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14432" ref_url="https://www.suse.com/security/cve/CVE-2018-14432/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004566.html" source="SUSE-SU"/>
		<description>
This update for OpenStack fixes the following issues:

The following security issue with openstack-keystone has been fixed:

- CVE-2018-14432: Reduce duplication in federated authentication APIs. (bsc#1102151)

Additionally, the following non-security issues have been fixed:

aodh:

- Support same projects in different domain.

barbican:

- Add zuulv3 to Pike.

cinder:

- Empty option value maybe cause Unity driver failed to initialize.
- GoodnessWeigher schedules non-type volumes.
- Fix quota error when deleting temporary volume.
- Fix cinder quota-usage error.
- Unity: Return logged-out initiators.
- Correct S-Series to DS-Series systems.
- Update storage backends supported for Lenovo.
- Unity: Add support of removing empty host.
- NetApp: Fix to support SVM scoped permissions.
- NetApp ONTAP iSCSI: Force exception on online extend.
- NetApp ONTAP: Set new sub-lun clone limit for ONTAP driver.

dashboard:

- Make @memoize thread-aware.

designate:

- Add provides to handle installation of mdns and producer seamlessly.
- Fix service files.
- Install a default pools.yaml.

glance:

- doc: Modify the description for the command.
- Make ImageTarget behave like a dictionary.
- Add barbican-tempest experimental job.

heat:

- Fixing unicode issue when to\_dict is called on py2.7 env.
- Ignore NotFound error in prepare\_for\_replace.
- Reset resource replaced\_by field for rollback.
- Ignore RESOLVE translation errors when translating before\_props.
- Ignore errors in purging events.

heat-templates:

- Deprecate hooks in heat-templates.

horizon-plugin-designate-ui:

- Install all designate panels that are available.

horizon-plugin-freezer-ui:

- Avoid using deprecated opt in Web-UI.

horizon-plugin-gbp-ui:

- Fix patching of create instance dialog.

neutron-lbaas-dashboard:

- Remove custom zuul jobs.

horizon-plugin-trove-ui:

- Update UPPER\_CONSTRAINTS\_FILE for stable/pike.

ironic:

- Fix error when deleting a non-existent port.
- Tear down console during unprovisioning.

manila:

- Fix ZFSOnLinux doc about manage ops.
- DB Migration: Fix downgrade.
- Fix share-service VM restart problem.
- Added Handling Newer Quobyte API Error Codes.
- NetApp ONTAP: Fix delete-share for vsadmin users.
- Remove confusing DB deprecation messages.
- Add missing Requires: for python-tooz

neutron:


- Skip MTU check during deletion of Networks.
- HA L3 agent restart only standby agents.
- Retry dhcp\_release on failures.
- Reduce IP address collision during port creating.
- Refactor DVR HA migarations DB operations.
- Disallow router interface out of subnet IP range.
- Fix fwaas v1 configuration doc.
- Add list of all working DSCP marks.
- Set trusted port only once in iptables firewall driver.
- Fix UT BridgeLibTest when IPv6 is disabled.

neutron-fwaas:

- DVR-FWaaS: Fix DVR FWaaS rules for fipnamespace.

neutron-lbaas:

- Get providers directly from ORM to make startup take half as long.
- Cap haproxy log level severity.
- Fix sphinx-docs job for stable branch.

neutron-vpnaas:

- Fix sphinx-docs job for stable branch and pep8 issues.

neutron-zvm-agent:

- Backport zCC backend networking-zvm.

nova:

- libvirt: Add method to configure migration speed.
- Make host\_aggregate\_map dictionary case-insensitive.
- Fix unbound local when saving an unchanged RequestSpec.
- Cleanup mapping/reqspec after archive instance.
- Default embedded instance.flavor.disabled attribute.
- Backport tox.ini to switch to stestr.
- Cleanup RP and HM records while deleting a compute service.
- Delete allocations from API if nova-compute is down.
- Block deleting compute services which are hosting instances.
- api-ref: Add a note in DELETE /os-services about deleting computes.
- Add functional test for deleting a compute service.
- Factor out compute service start in ServerMovingTest.
- Moving more utils to ProviderUsageBaseTestCase.
- Make nova service-list use scatter-gather routine.
- libvirt: Slow live-migration to ensure network is ready.
- Use instance project/user when creating RequestSpec during resize reschedule.
- Mock utils.execute() in qemu-img unit test.
- Add policy rule to block image-backed servers with 0 root disk flavor.
- Change consecutive build failure limit to a weigher.
- Ensure resource class cache when listing usages.
- Metadata-API fails to retrieve avz for instances created before Pike.
- placement: Fix HTTP error generation.
- Add amd-ssbd and amd-no-ssb CPU flags.
- Fixed auto-convergence option name in doc.
- libvirt: Skip fetching the virtual size of block devices.
- libvirt: Handle DiskNotFound during update\_available\_resource.
- Avoid showing password in log.
- Fix shelving a paused instance.
- Document how to disable notifications.
- Add ssbd and virt-ssbd flags to cpu\_model\_extra\_flags whitelist.
- Stringify instance UUID.

nova-virt-zvm:

- Backport zvm driver.

octavia:

- Update introduction documention page.
- Use HMAC.hexdigest to avoid non-ascii characters for package data.

trove:

- Add .stestr.conf to fix tox-py27 stable job.
- Fix mysql instance create failed when enable skip-name-resolve.
- Failed to build mongo image.
- Open the volume\_support of redis.
- Remove Mitaka reference in install/dashboard.rst.
- Enable longer Keystone token life.
- Fix gate issues.

python-barbicanclient:

- Update time for functional tests. (bsc#1084362)

python-keystone-json-assignment:

- Speedup project lookup.

python-manilaclient:

- Fix for use endpoint_type in _discover_client method.
- Add search_opts in func list of ManagerWithFind type classes.
- Fix share can not be found by name in admin context.

python-vmware-nsx:

- NSX|V3: Handle port-not-found during get_ports.
- NSXAdminV3: Add message on client cert generation.
- NSX-V: Add server-ip-address to the supported dhcp options.
- NSX|V3: Fix global SG creation duplication.
- Fix security groups ext_properties loading.
- NSXv3: Add pool-level lock for LB pool member operations.
- NSX|v3: Do not retry on DB duplications on section init.
- NSXv: Handle listener failures on backend.
- Add mock to the requirements.
- AdminUtils V3: Do not set nat_pass for NO-NAT rules.
- NSX|V3: Wait for another neutron to create default section.
- NSX|V3: Cleanup duplicate sections on startup.
- V and D: Make security group logging more robust.
- NSX|v3: Ensure that 0.0.0.0/# is treated correctly in SG rules.
- NSX|V: Fix create/delete subnet race condition.

python-vmware-nsxlib:

- Fix service ports for egress firewall rule.
- Add server-ip-address to the suppoprted dhcp options.
- Retry on 503 Service Unavailable.
- Remove sha224 from supported client cert hash algs.
- Add logging when initializing a default FW section.
- Fixed tenacity usage.
- Retry is IOError is received.
- Handle cluster connection closed by server.		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-20"/>
	<updated date="2018-09-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1084362">SUSE bug 1084362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102151">SUSE bug 1102151</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14432/">CVE-2018-14432 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14432">CVE-2018-14432 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596520" comment="openstack-aodh-5.1.1~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596521" comment="openstack-aodh-api-5.1.1~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596522" comment="openstack-aodh-doc-5.1.1~dev5-3.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596523" comment="openstack-aodh-evaluator-5.1.1~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596524" comment="openstack-aodh-expirer-5.1.1~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596525" comment="openstack-aodh-listener-5.1.1~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596526" comment="openstack-aodh-notifier-5.1.1~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596527" comment="openstack-barbican-5.0.1~dev11-3.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596528" comment="openstack-barbican-api-5.0.1~dev11-3.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596529" comment="openstack-barbican-doc-5.0.1~dev11-3.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596530" comment="openstack-barbican-keystone-listener-5.0.1~dev11-3.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596531" comment="openstack-barbican-retry-5.0.1~dev11-3.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596532" comment="openstack-barbican-worker-5.0.1~dev11-3.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596533" comment="openstack-cinder-11.1.2~dev14-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596534" comment="openstack-cinder-api-11.1.2~dev14-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596535" comment="openstack-cinder-backup-11.1.2~dev14-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596536" comment="openstack-cinder-doc-11.1.2~dev14-3.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596537" comment="openstack-cinder-scheduler-11.1.2~dev14-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596538" comment="openstack-cinder-volume-11.1.2~dev14-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596539" comment="openstack-dashboard-12.0.4~dev1-3.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596540" comment="openstack-designate-5.0.2~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596541" comment="openstack-designate-agent-5.0.2~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596542" comment="openstack-designate-api-5.0.2~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596543" comment="openstack-designate-central-5.0.2~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596544" comment="openstack-designate-doc-5.0.2~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596545" comment="openstack-designate-producer-5.0.2~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596546" comment="openstack-designate-sink-5.0.2~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596547" comment="openstack-designate-worker-5.0.2~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596548" comment="openstack-glance-15.0.2~dev4-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596549" comment="openstack-glance-api-15.0.2~dev4-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596550" comment="openstack-glance-doc-15.0.2~dev4-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596551" comment="openstack-glance-registry-15.0.2~dev4-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596552" comment="openstack-heat-9.0.5~dev11-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596553" comment="openstack-heat-api-9.0.5~dev11-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596554" comment="openstack-heat-api-cfn-9.0.5~dev11-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596555" comment="openstack-heat-api-cloudwatch-9.0.5~dev11-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596556" comment="openstack-heat-doc-9.0.5~dev11-3.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596557" comment="openstack-heat-engine-9.0.5~dev11-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596558" comment="openstack-heat-plugin-heat_docker-9.0.5~dev11-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596559" comment="openstack-heat-templates-0.0.0+git.1525957319.6b5a7cd-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596560" comment="openstack-heat-test-9.0.5~dev11-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596561" comment="openstack-horizon-plugin-designate-ui-5.0.2~dev5-3.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596562" comment="openstack-horizon-plugin-freezer-ui-5.0.1~dev6-3.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596563" comment="openstack-horizon-plugin-gbp-ui-5.0.1~dev21-4.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596564" comment="openstack-horizon-plugin-manila-ui-2.10.3~dev4-4.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596565" comment="openstack-horizon-plugin-neutron-lbaas-ui-3.0.3~dev2-3.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596566" comment="openstack-horizon-plugin-trove-ui-9.0.1~dev7-3.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596567" comment="openstack-ironic-9.1.5~dev7-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596568" comment="openstack-ironic-api-9.1.5~dev7-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596569" comment="openstack-ironic-conductor-9.1.5~dev7-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596570" comment="openstack-ironic-doc-9.1.5~dev7-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596571" comment="openstack-keystone-12.0.1~dev19-5.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596572" comment="openstack-keystone-doc-12.0.1~dev19-5.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596573" comment="openstack-manila-5.0.2~dev55-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596574" comment="openstack-manila-api-5.0.2~dev55-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596575" comment="openstack-manila-data-5.0.2~dev55-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596576" comment="openstack-manila-doc-5.0.2~dev55-3.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596577" comment="openstack-manila-scheduler-5.0.2~dev55-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596578" comment="openstack-manila-share-5.0.2~dev55-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596579" comment="openstack-neutron-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596580" comment="openstack-neutron-dhcp-agent-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596581" comment="openstack-neutron-doc-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596582" comment="openstack-neutron-fwaas-11.0.2~dev7-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596583" comment="openstack-neutron-fwaas-doc-11.0.2~dev7-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596584" comment="openstack-neutron-ha-tool-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596585" comment="openstack-neutron-l3-agent-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596586" comment="openstack-neutron-lbaas-11.0.4~dev4-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596587" comment="openstack-neutron-lbaas-agent-11.0.4~dev4-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596588" comment="openstack-neutron-lbaas-doc-11.0.4~dev4-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596589" comment="openstack-neutron-linuxbridge-agent-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596590" comment="openstack-neutron-macvtap-agent-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596591" comment="openstack-neutron-metadata-agent-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596592" comment="openstack-neutron-metering-agent-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596593" comment="openstack-neutron-openvswitch-agent-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596594" comment="openstack-neutron-server-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596595" comment="openstack-neutron-vpn-agent-11.0.1~dev1-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596596" comment="openstack-neutron-vpnaas-11.0.1~dev1-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596597" comment="openstack-neutron-vpnaas-doc-11.0.1~dev1-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596598" comment="openstack-neutron-vyatta-agent-11.0.1~dev1-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596599" comment="openstack-neutron-zvm-agent-8.0.1~dev12-4.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596600" comment="openstack-nova-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596601" comment="openstack-nova-api-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596602" comment="openstack-nova-cells-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596603" comment="openstack-nova-compute-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596604" comment="openstack-nova-conductor-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596605" comment="openstack-nova-console-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596606" comment="openstack-nova-consoleauth-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596607" comment="openstack-nova-doc-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596608" comment="openstack-nova-novncproxy-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596609" comment="openstack-nova-placement-api-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596610" comment="openstack-nova-scheduler-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596611" comment="openstack-nova-serialproxy-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596612" comment="openstack-nova-virt-zvm-8.0.1~dev56-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596613" comment="openstack-nova-vncproxy-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596614" comment="openstack-octavia-1.0.3~dev21-4.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596615" comment="openstack-octavia-amphora-agent-1.0.3~dev21-4.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596616" comment="openstack-octavia-api-1.0.3~dev21-4.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596617" comment="openstack-octavia-health-manager-1.0.3~dev21-4.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596618" comment="openstack-octavia-housekeeping-1.0.3~dev21-4.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596619" comment="openstack-octavia-worker-1.0.3~dev21-4.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596620" comment="openstack-trove-8.0.1~dev11-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596621" comment="openstack-trove-api-8.0.1~dev11-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596622" comment="openstack-trove-conductor-8.0.1~dev11-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596623" comment="openstack-trove-doc-8.0.1~dev11-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596624" comment="openstack-trove-guestagent-8.0.1~dev11-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596625" comment="openstack-trove-taskmanager-8.0.1~dev11-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596626" comment="python-aodh-5.1.1~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596627" comment="python-barbican-5.0.1~dev11-3.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596628" comment="python-barbicanclient-4.5.2-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596629" comment="python-barbicanclient-doc-4.5.2-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596630" comment="python-cinder-11.1.2~dev14-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596631" comment="python-designate-5.0.2~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596632" comment="python-glance-15.0.2~dev4-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596633" comment="python-heat-9.0.5~dev11-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596634" comment="python-horizon-12.0.4~dev1-3.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596635" comment="python-horizon-plugin-designate-ui-5.0.2~dev5-3.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596636" comment="python-horizon-plugin-freezer-ui-5.0.1~dev6-3.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596637" comment="python-horizon-plugin-gbp-ui-5.0.1~dev21-4.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596638" comment="python-horizon-plugin-manila-ui-2.10.3~dev4-4.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596639" comment="python-horizon-plugin-neutron-lbaas-ui-3.0.3~dev2-3.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596640" comment="python-horizon-plugin-trove-ui-9.0.1~dev7-3.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596641" comment="python-ironic-9.1.5~dev7-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596642" comment="python-keystone-12.0.1~dev19-5.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596643" comment="python-keystone-json-assignment-0.0.2-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596644" comment="python-manila-5.0.2~dev55-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596645" comment="python-manilaclient-1.17.3-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596646" comment="python-manilaclient-doc-1.17.3-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596647" comment="python-neutron-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596648" comment="python-neutron-fwaas-11.0.2~dev7-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596649" comment="python-neutron-lbaas-11.0.4~dev4-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596650" comment="python-neutron-vpnaas-11.0.1~dev1-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596651" comment="python-nova-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596652" comment="python-octavia-1.0.3~dev21-4.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596653" comment="python-trove-8.0.1~dev11-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596654" comment="python-vmware-nsx-11.0.3~dev16-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596655" comment="python-vmware-nsxlib-11.0.4~dev7-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596656" comment="venv-openstack-aodh-x86_64-5.0.1-12.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596657" comment="venv-openstack-barbican-x86_64-5.0.1-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596658" comment="venv-openstack-cinder-x86_64-11.0.2-14.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596659" comment="venv-openstack-designate-x86_64-5.0.1-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596660" comment="venv-openstack-glance-x86_64-15.0.1-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596661" comment="venv-openstack-heat-x86_64-9.0.1-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596662" comment="venv-openstack-horizon-x86_64-11.0.2-14.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596663" comment="venv-openstack-ironic-x86_64-9.1.3-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596664" comment="venv-openstack-keystone-x86_64-12.0.1-11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596665" comment="venv-openstack-magnum-x86_64-5.0.2-11.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596666" comment="venv-openstack-manila-x86_64-5.0.2-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596667" comment="venv-openstack-neutron-x86_64-11.0.2-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596668" comment="venv-openstack-nova-x86_64-16.0.3-11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596669" comment="venv-openstack-octavia-x86_64-1.0.2-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596670" comment="venv-openstack-sahara-x86_64-7.0.1-11.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596671" comment="venv-openstack-trove-x86_64-8.0.0.0-11.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148146" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1101820" ref_url="https://bugzilla.suse.com/1101820" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10903" ref_url="https://www.suse.com/security/cve/CVE-2018-10903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004808.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2018-10903: The finalize_with_tag API did not enforce a minimum tag
  length. If a user did not validate the input length prior to passing it to
  finalize_with_tag an attacker could craft an invalid payload with a shortened
  tag (e.g. 1 byte) such that they would have a 1 in 256 chance of passing the
  MAC check. GCM tag forgeries could have caused key leakage (bsc#1101820)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-29"/>
	<updated date="2018-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101820">SUSE bug 1101820</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10903/">CVE-2018-10903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10903">CVE-2018-10903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596672" comment="python-cryptography-2.0.3-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148147" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1102680" ref_url="https://bugzilla.suse.com/1102680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14574" ref_url="https://www.suse.com/security/cve/CVE-2018-14574/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004807.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2018-14574: Prevent open redirect in
  django.middleware.common.CommonMiddleware (bsc#1102680)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-29"/>
	<updated date="2018-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1102680">SUSE bug 1102680</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14574/">CVE-2018-14574 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14574">CVE-2018-14574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596673" comment="python-Django-1.11.11-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148148" version="1" class="patch">
	<metadata>
		<title>Security update for ardana-monasca, ardana-spark, kafka, kafka-kit, openstack-monasca-api (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1094851" ref_url="https://bugzilla.suse.com/1094851" source="BUGZILLA"/>
		<reference ref_id="1094971" ref_url="https://bugzilla.suse.com/1094971" source="BUGZILLA"/>
		<reference ref_id="1102662" ref_url="https://bugzilla.suse.com/1102662" source="BUGZILLA"/>
		<reference ref_id="1102920" ref_url="https://bugzilla.suse.com/1102920" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1288" ref_url="https://www.suse.com/security/cve/CVE-2018-1288/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004812.html" source="SUSE-SU"/>
		<description>
This update for ardana-monasca, ardana-spark, kafka, kafka-kit, openstack-monasca-api fixes the following issues:

This update for ardana-monasca to version 8.0+git.1535031421.9262a47 fixes these issues:

- Requests Apache to reload on change (bsc#1102662)
- Avoids managing non-Monasca users (bsc#1102662)
- Line up perms on storm.conf to match rpm (bsc#1094971)

This update for ardana-spark to version 8.0+git.1532114050.04654a8 fixes this issue:

- Only set log dir perms on legacy install (bsc#1094851)

This update for kafka to version 0.10.2.2 fixes this security issue:

- CVE-2018-1288: Authenticated Kafka users may have performed action reserved
  for the Broker via a manually created fetch request interfering with data
  replication, resulting in data loss (bsc#1102920).

This update for kafka to version 0.10.2.2 fixes these non-security issues:

- set internal.leave.group.on.close to false in KafkaStreams
- Improve message for Kafka failed startup with non-Kafka data in data.dirs
- add max_number _of_retries to exponential backoff strategy
- Mute logger for reflections.org at the warn level in system tests
- Kafka connect: error with special characters in connector name
- streams task gets stuck after re-balance due to LockException
- CachingSessionStore doesn't use the default keySerde.
- RocksDBSessionStore doesn't use default aggSerde.
- Recommended values for Connect transformations contain the wrong class name
- Kafka broker fails to start if a topic containing dot in its name is marked for delete but hasn't been deleted during previous uptime
- GlobalKTable does not checkpoint offsets after restoring state
- Log cleaning can increase message size and cause cleaner to crash with buffer overflow
- Some socket connections not closed after restart of Kafka Streams
- Distributed Herder Deadlocks on Shutdown
- Log cleaner fails due to large offset in segment file
- StreamsKafkaClient should not use StreamsConfig.POLL_MS_CONFIG
- Refactor kafkatest docker support
- ducktape kafka service: do not assume Service contains num_nodes
- Using _DUCKTAPE_OPTIONS has no effect on executing tests
- Connect WorkerSinkTask out of order offset commit can lead to inconsistent state
- RocksDB segments not removed when store is closed causes re-initialization to fail
- FetchMetadata creates unneeded Strings on instantiation
- SourceTask#stop() not called after exception raised in poll()
- Sink connectors that explicitly 'resume' topic partitions can resume a paused task
- GlobalStateManagerImpl should not write offsets of in-memory stores in checkpoint file
- Source KTable checkpoint is not correct
- ConnectSchema#equals() broken for array-typed default values

This update for openstack-monasca-api to version 2.2.1~dev24 fixes these issues:

- devstack: download storm from archive.apache.org
- Backport tempest test robustness improvements
- 1724543-fixed kafka partition creation error in devstack installation
- Fix:No alarms created if metric name in alarm def. expr. is mix case
- Zuul: Remove project name
- Run against Pike requirements
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-30"/>
	<updated date="2018-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1094851">SUSE bug 1094851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094971">SUSE bug 1094971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102662">SUSE bug 1102662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102920">SUSE bug 1102920</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1288/">CVE-2018-1288 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1288">CVE-2018-1288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596674" comment="ardana-monasca-8.0+git.1535031421.9262a47-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596675" comment="ardana-spark-8.0+git.1534267176.a5f3a22-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596676" comment="kafka-0.10.2.2-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596677" comment="openstack-monasca-api-2.2.1~dev24-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596678" comment="python-monasca-api-2.2.1~dev24-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148149" version="1" class="patch">
	<metadata>
		<title>Recommended update for ardana-ansible (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1005886" ref_url="https://bugzilla.suse.com/1005886" source="BUGZILLA"/>
		<reference ref_id="1049737" ref_url="https://bugzilla.suse.com/1049737" source="BUGZILLA"/>
		<reference ref_id="1082708" ref_url="https://bugzilla.suse.com/1082708" source="BUGZILLA"/>
		<reference ref_id="1089243" ref_url="https://bugzilla.suse.com/1089243" source="BUGZILLA"/>
		<reference ref_id="1091490" ref_url="https://bugzilla.suse.com/1091490" source="BUGZILLA"/>
		<reference ref_id="1094847" ref_url="https://bugzilla.suse.com/1094847" source="BUGZILLA"/>
		<reference ref_id="1095166" ref_url="https://bugzilla.suse.com/1095166" source="BUGZILLA"/>
		<reference ref_id="1096798" ref_url="https://bugzilla.suse.com/1096798" source="BUGZILLA"/>
		<reference ref_id="1096988" ref_url="https://bugzilla.suse.com/1096988" source="BUGZILLA"/>
		<reference ref_id="1097241" ref_url="https://bugzilla.suse.com/1097241" source="BUGZILLA"/>
		<reference ref_id="1099412" ref_url="https://bugzilla.suse.com/1099412" source="BUGZILLA"/>
		<reference ref_id="1099741" ref_url="https://bugzilla.suse.com/1099741" source="BUGZILLA"/>
		<reference ref_id="1100688" ref_url="https://bugzilla.suse.com/1100688" source="BUGZILLA"/>
		<reference ref_id="1102662" ref_url="https://bugzilla.suse.com/1102662" source="BUGZILLA"/>
		<reference ref_id="1102789" ref_url="https://bugzilla.suse.com/1102789" source="BUGZILLA"/>
		<reference ref_id="1103903" ref_url="https://bugzilla.suse.com/1103903" source="BUGZILLA"/>
		<reference ref_id="1104047" ref_url="https://bugzilla.suse.com/1104047" source="BUGZILLA"/>
		<reference ref_id="1104407" ref_url="https://bugzilla.suse.com/1104407" source="BUGZILLA"/>
		<reference ref_id="1105141" ref_url="https://bugzilla.suse.com/1105141" source="BUGZILLA"/>
		<reference ref_id="1105420" ref_url="https://bugzilla.suse.com/1105420" source="BUGZILLA"/>
		<reference ref_id="1109264" ref_url="https://bugzilla.suse.com/1109264" source="BUGZILLA"/>
		<reference ref_id="1109445" ref_url="https://bugzilla.suse.com/1109445" source="BUGZILLA"/>
		<reference ref_id="1111886" ref_url="https://bugzilla.suse.com/1111886" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8611" ref_url="https://www.suse.com/security/cve/CVE-2016-8611/" source="CVE"/>
		<reference ref_id="SUSE-RU-2018:3638-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-November/009993.html" source="SUSE-SU"/>
		<description>
This update for ardana-ansible fixes the following issues:

ardana-ansible:

- Initial checkin of info capture tool
- Rename dayzero-site.yml (bsc#1111886)
- Switch to non-legacy media layout by default.
- Add Keystone Fernet master node monitoring. (bsc#1097241)
- Add restart verb for maintenance updates.
- Remove tasks to in-place modify systemd files.
- Don't install systemd service file when SUSEified. (bsc#1082708)
- Use sosreport for RHEL and supportutils for SLES nodes (bsc#1100688)
- Obtain notification URL from environment
- Add support for callback plugin post initial install
- Added start and stop tracking events
- New Service Manila Integration in Ardana
- Make changes to return both openstack and cloud pkgs
- Added a new playbook to generate hosts file
- Make get_ts_pkgs more robust
- Add Ansible play and library tool to gather package data
- Adding sosreport upgrade to be included in update path (bsc#1105141)
- Remove obsolete config.json file (bsc#1104047)

ardana-barbican:

- Switch to stable/pike branch

ardana-cinder:

- Updating swift backup url to check non-empty value (bsc#1099412)

ardana-cluster:

- Fix haproxy not being able to log using journald (bsc#1005886)

ardana-cobbler:

- Updating failure behavior on power down step in reimage (bsc#1089243)

ardana-freezer:

- Freezer: Restoring control node fails (bsc#1099741)

ardana-glance:

- Fix security audit. (bsc#1109445)
- Filter out API health checks from logs (bsc#1049737, bsc#1096798)

ardana-input-model:

- Relicense manila to Apache-2.0.
- Remove manila-share dependency to keystone-client (bsc#1109264)
- New Service Manila Integration in Ardana
- CVE-2016-8611: Add glance-api rate limit to address (bsc#1005886)

ardana-keystone:

- Updates keystone user if it exists (bsc#1102662)
- Reruns of keystone credentials change (bsc#1102662)

ardana-mq:

- Add rabbitmq-server-plugins (bsc#1103903)

ardana-neutron:

- Make ovsvapp_agent.log logging consistent with other agents (bsc#1105420)
- Allow 3rd-party drivers to pass in dhcp_driver option value
- Allow SDNs to replace neutron's policy.json file

ardana-nova:

- Fixes cell0 map updates (bsc#1091490)

ardana-octavia:

- Set the correct systemd_service_dir for octavia (bsc#1094847)

ardana-osconfig:

- Restart dpdk network after restarting openvswitch (bsc#1104407)
- Allow passwordless root logins
- Added start and stop tracking events

ardana-service:

- Pass notify_url in extra-vars to playbook
- add monasca support
- filter out the item where ardana_ansible_host empty
- Pass encrypt and rekey parms when running config-processor (bsc#1102789)
- Support legacy playbook names for dev env for day2
- Replace dayzero playbook reference with installui
- Added mocks for running ardana-start.yml
- merge changes up to Sept 17 2018 to stable/pike
- Support legacy playbook names for dev env for day2
- Updated REST packages call to handle all packages
- handle run playbooks for adding compute nodes
- Add DELETE service file method
- Added deployed_servers endpoint in ardana-service
- Add mock for keystone endpoints
- add mocking, robustness, pep8 fix
- Gracefully handle missing service description
- Add fake playbook, log for running keystone-status
- Support insecure mode for keystone
- Add caching for internal cp files
- Allow insecure mode for keystone sessions
- Make packages changes Python 3 compatible
- Add ability to get remote host package data
- Add endpoint for getting internal cp files
- add python-monascaclient dependency
- Make packages changes Python 3 compatible
- Add ability to get remote host package data

ardana-service-ansible:

- Include service URL in config file
- Create cache directory

ardana-ses:

- Support phase 2 SES config.
- Add SES config yaml conversion utility.
- Fix the cinder-backup settings (bsc#1096988, bsc#1096798)

ardana-swift:

- Switch to stable/pike branch
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-06"/>
	<updated date="2018-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005886">SUSE bug 1005886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049737">SUSE bug 1049737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082708">SUSE bug 1082708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089243">SUSE bug 1089243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091490">SUSE bug 1091490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094847">SUSE bug 1094847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095166">SUSE bug 1095166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096798">SUSE bug 1096798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096988">SUSE bug 1096988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097241">SUSE bug 1097241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099412">SUSE bug 1099412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099741">SUSE bug 1099741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100688">SUSE bug 1100688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102662">SUSE bug 1102662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102789">SUSE bug 1102789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103903">SUSE bug 1103903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104047">SUSE bug 1104047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104407">SUSE bug 1104407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105141">SUSE bug 1105141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105420">SUSE bug 1105420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109264">SUSE bug 1109264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109445">SUSE bug 1109445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111886">SUSE bug 1111886</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8611/">CVE-2016-8611 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8611">CVE-2016-8611 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597709" comment="ardana-ansible-8.0+git.1539739656.0ef51c9-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597710" comment="ardana-barbican-8.0+git.1534266594.8136db7-4.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597711" comment="ardana-cinder-8.0+git.1535412193.d9ad231-3.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597712" comment="ardana-cluster-8.0+git.1534266734.ec4822f-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597713" comment="ardana-cobbler-8.0+git.1534780521.780753b-3.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597714" comment="ardana-freezer-8.0+git.1534266805.c9ea29b-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597715" comment="ardana-glance-8.0+git.1537790499.b15fdea-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597717" comment="ardana-input-model-8.0+git.1539086744.5ae1d6f-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597718" comment="ardana-keystone-8.0+git.1536100286.ddd8d3e-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849303" comment="ardana-mq-8.0+git.1534267034.f95e1ec-3.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597722" comment="ardana-neutron-8.0+git.1537805998.7898f24-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597723" comment="ardana-nova-8.0+git.1537895345.35a03a2-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597724" comment="ardana-octavia-8.0+git.1534267086.b7dbe77-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849304" comment="ardana-osconfig-8.0+git.1540330973.aab0174-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597726" comment="ardana-service-8.0+git.1537825617.23552c2-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597727" comment="ardana-service-ansible-8.0+git.1537806377.25b5d68-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597728" comment="ardana-ses-8.0+git.1539113493.6631423-1.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597729" comment="ardana-swift-8.0+git.1534267211.78fb7e3-3.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148150" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1110949" ref_url="https://bugzilla.suse.com/1110949" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17456" ref_url="https://www.suse.com/security/cve/CVE-2018-17456/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004957.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issue:

- CVE-2018-17456: Git allowed remote code execution during processing of a recursive 'git clone' of a superproject if a .gitmodules file has a URL field beginning with a '-' character. (boo#1110949).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1110949">SUSE bug 1110949</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17456/">CVE-2018-17456 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17456">CVE-2018-17456 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596679" comment="git-2.12.3-27.17.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148151" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1097775" ref_url="https://bugzilla.suse.com/1097775" source="BUGZILLA"/>
		<reference ref_id="1099805" ref_url="https://bugzilla.suse.com/1099805" source="BUGZILLA"/>
		<reference ref_id="1099808" ref_url="https://bugzilla.suse.com/1099808" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10855" ref_url="https://www.suse.com/security/cve/CVE-2018-10855/" source="CVE"/>
		<reference ref_id="CVE-2018-10874" ref_url="https://www.suse.com/security/cve/CVE-2018-10874/" source="CVE"/>
		<reference ref_id="CVE-2018-10875" ref_url="https://www.suse.com/security/cve/CVE-2018-10875/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004967.html" source="SUSE-SU"/>
		<description>
This update for ansible fixes the following issues:

Ansible was updated to ansible 2.4.6.0.

The full release notes can be found on:

	https://github.com/ansible/ansible/blob/stable-2.4/CHANGELOG.md

Security issues fixed:

- CVE-2018-10875: ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing the attacker to execute arbitrary code. (bsc#1099808)
- CVE-2018-10874: It was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result. (bsc#1099805)
- CVE-2018-10855: Ansible did not honor the no_log task flag for failed tasks. When the no_log flag has been used to protect sensitive data passed to a task from being logged, and that task does not run successfully, Ansible will expose sensitive data in log files and on the terminal of the user running Ansible. (bsc#1097775)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097775">SUSE bug 1097775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099805">SUSE bug 1099805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099808">SUSE bug 1099808</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10855/">CVE-2018-10855 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10855">CVE-2018-10855 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10874/">CVE-2018-10874 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10874">CVE-2018-10874 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10875/">CVE-2018-10875 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10875">CVE-2018-10875 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596680" comment="ansible-2.4.6.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148152" version="1" class="patch">
	<metadata>
		<title>Recommended update for ardana-ansible, ardana-cobbler, ardana-db, ardana-heat, ardana-manila, ardana-neutron, ardana-nova, ardana-octavia, ardana-osconfig, ardana-service, ardana-ses, ardana-swift, ardana-tempest, crowbar, crowbar-core, crowbar-ha, crowbar-openstack, documentation-suse-openstack-cloud, galera-python-clustercheck, openstack-dashboard, openstack-ec2-api, openstack-heat, openstack-heat-templates, openstack-horizon-plugin-ironic-ui, openstack-horizon-plugin-magnum-ui, openstack-horizon-plugin-sahara-ui, openstack-ironic, openstack-keystone, openstack-magnum, openstack-manila, openstack-monasca-api, openstack-monasca-notification, openstack-monasca-persister, openstack-murano, openstack-neutron, openstack-neutron-fwaas, openstack-nova, openstack-octavia, openstack-sahara, openstack-swift, openstack-tempest, python-cinderclient, python-cryptography, python-monasca-common, python-networking-hyperv, python-os-brick, python-venvjail, venv-openstack-aodh, venv-openstack-barbican, venv-openstack-ceilometer, venv-openstack-cinder, venv-openstack-designate, venv-openstack-freezer, venv-openstack-glance, venv-openstack-heat, venv-openstack-horizon, venv-openstack-ironic, venv-openstack-keystone, venv-openstack-magnum, venv-openstack-manila, venv-openstack-monasca, venv-openstack-monasca-ceilometer, venv-openstack-murano, venv-openstack-nova, venv-openstack-octavia, venv-openstack-sahara, venv-openstack-swift, venv-openstack-trove (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1063535" ref_url="https://bugzilla.suse.com/1063535" source="BUGZILLA"/>
		<reference ref_id="1094690" ref_url="https://bugzilla.suse.com/1094690" source="BUGZILLA"/>
		<reference ref_id="1105822" ref_url="https://bugzilla.suse.com/1105822" source="BUGZILLA"/>
		<reference ref_id="1111634" ref_url="https://bugzilla.suse.com/1111634" source="BUGZILLA"/>
		<reference ref_id="1111635" ref_url="https://bugzilla.suse.com/1111635" source="BUGZILLA"/>
		<reference ref_id="1114632" ref_url="https://bugzilla.suse.com/1114632" source="BUGZILLA"/>
		<reference ref_id="1116501" ref_url="https://bugzilla.suse.com/1116501" source="BUGZILLA"/>
		<reference ref_id="1116686" ref_url="https://bugzilla.suse.com/1116686" source="BUGZILLA"/>
		<reference ref_id="1122053" ref_url="https://bugzilla.suse.com/1122053" source="BUGZILLA"/>
		<reference ref_id="1122237" ref_url="https://bugzilla.suse.com/1122237" source="BUGZILLA"/>
		<reference ref_id="1122875" ref_url="https://bugzilla.suse.com/1122875" source="BUGZILLA"/>
		<reference ref_id="1124017" ref_url="https://bugzilla.suse.com/1124017" source="BUGZILLA"/>
		<reference ref_id="1124022" ref_url="https://bugzilla.suse.com/1124022" source="BUGZILLA"/>
		<reference ref_id="1125180" ref_url="https://bugzilla.suse.com/1125180" source="BUGZILLA"/>
		<reference ref_id="1125216" ref_url="https://bugzilla.suse.com/1125216" source="BUGZILLA"/>
		<reference ref_id="1127752" ref_url="https://bugzilla.suse.com/1127752" source="BUGZILLA"/>
		<reference ref_id="1128479" ref_url="https://bugzilla.suse.com/1128479" source="BUGZILLA"/>
		<reference ref_id="1128928" ref_url="https://bugzilla.suse.com/1128928" source="BUGZILLA"/>
		<reference ref_id="1130414" ref_url="https://bugzilla.suse.com/1130414" source="BUGZILLA"/>
		<reference ref_id="127227" ref_url="https://bugzilla.suse.com/127227" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000807" ref_url="https://www.suse.com/security/cve/CVE-2018-1000807/" source="CVE"/>
		<reference ref_id="CVE-2018-1000808" ref_url="https://www.suse.com/security/cve/CVE-2018-1000808/" source="CVE"/>
		<reference ref_id="SUSE-RU-2019:1161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-May/011426.html" source="SUSE-SU"/>
		<description>
This update for ardana-ansible, ardana-cobbler, ardana-db, ardana-heat, ardana-manila, ardana-neutron, ardana-nova, ardana-octavia, ardana-osconfig, ardana-service, ardana-ses, ardana-swift, ardana-tempest, crowbar, crowbar-core, crowbar-ha, crowbar-openstack, documentation-suse-openstack-cloud, galera-python-clustercheck, openstack-dashboard, openstack-ec2-api, openstack-heat, openstack-heat-templates, openstack-horizon-plugin-ironic-ui, openstack-horizon-plugin-magnum-ui, openstack-horizon-plugin-sahara-ui, openstack-ironic, openstack-keystone, openstack-magnum, openstack-manila, openstack-monasca-api, openstack-monasca-notification, openstack-monasca-persister, openstack-murano, openstack-neutron, openstack-neutron-fwaas, openstack-nova, openstack-octavia, openstack-sahara, openstack-swift, openstack-tempest, python-cinderclient, python-cryptography, python-monasca-common, python-networking-hyperv, python-os-brick, python-venvjail, venv-openstack-aodh, venv-openstack-barbican, venv-openstack-ceilometer, venv-openstack-cinder, venv-openstack-designate, venv-openstack-freezer, venv-openstack-glance, venv-openstack-heat, venv-openstack-horizon, venv-openstack-ironic, venv-openstack-keystone, venv-openstack-magnum, venv-openstack-manila, venv-openstack-monasca, venv-openstack-monasca-ceilometer, venv-openstack-murano, venv-openstack-nova, venv-openstack-octavia, venv-openstack-sahara, venv-openstack-swift, venv-openstack-trove fixes the following issues:

This update fixes the following issues:

ardana-ansible:

* Move manila to the correct location in verb action list files (SCRD-6812)
* Enable manila service in verb action list files (SCRD-6812)
* Improve user experience (bsc#1114632)

ardana-cobbler:

* gate cobbler import on distro existence (SCRD-6821)

ardana-db:

* xtrabackup no longer needed (SCRD-7640, bsc#1116686)

ardana-heat:

* Fix typo so that heat gets correct name for hostname certs (bsc#127227)

ardana-manila:

* Put all config into one template (SCRD-7770)
* Fail when Manila service is not running (SCRD-7413)
* Split Manila API and Share deployment (SCRD-7773)
* Comment out example backends (bsc#1116501)

ardana-neutron:

* Fix misspelled variable names (SCRD-7836)
* Neutron services require network service to be started (SCRD-7764)

ardana-nova:

* Add dosfstools as requirement for nova-comptue (SCRD-8175)

ardana-octavia:

* Remove octavia dependency from monasca (SCRD-7690)

ardana-osconfig:

* Clean up ifcfg- files left behind by udevadm (bsc#1105822)

ardana-service:

* Add support for deprecated encryption-key parameter (SCRD-7837)

ardana-ses:

* Run SWF-PRX tasks in dedicated play (SCRD-8602)
* Make SES globals available to SWF (SCRD-8109)
* Add symlink ceph.conf.j2 to ~/openstack/my_cloud/config/ses (bsc#1128479)
* Add support for reusing clients (bsc#1122237)
* Ensure keyring files are readable (bsc#1122237)

ardana-swift:

* Prefer Kronos logrotate conf to Swift RPM logrotate conf (SCRD-7410)

ardana-tempest:

* Enable additional keystone tests (SCRD-7496)
* Enable domain specific drivers on tempest (SCRD-7496)
* Fix tempest heat plugin configuration (SCRD-7508)
* Add freezer to tempest available/testable list (SCRD-7496)
* Fix tempest configuration for magnum (SCRD-7496)
* Add missing test packages (SCRD-7496)
* Set cinder/glance admin on tempest roles (SCRD-7496)
* Update tempest test filters (SCRD-7496)
* Configure tempest accordingly when SES enabled (SCRD-7496)
* Merge test results from parallel and serial filters (SCRD-7784)

crowbar:

* install-chef-suse: filter comments from  authorized_keys file 

crowbar-core:

* crowbar: Do not rely on Chef::Util::FileEdit to write the file (bsc#1127752)
* Revert 'Disable upgrade API in Cloud8'
* upgrade: Make sure all compute nodes get compute related scripts
* network: run wicked ifdown for interface cleanup (bsc#1063535)

crowbar-ha:

* improve galera HA setup (bsc#1122875)

crowbar-openstack:

* ceilometer: Install package which contains cron file (bsc#1130414)
* monasca: Set hostname for monasca-agent as FQDN (SCRD-8705)
* memcache: Use first array element as fallback (SCRD-8255)
* db: Raise default connection limit to 2048
* rabbit: fix mirroring regex
* neutron: Add osprofiler support
* nova: Add osprofiler support
* cinder: Add osprofiler support
* glance: Add osprofiler support
* keystone: Make osprofiler connection_string configurable
* keystone: Add basic osprofiler support

documentation-suse-openstack-cloud:

* Additional corrections from Carl
* Fix reference to wrong neutron-reconfigure.yml playbook (SCRD-7709)
* increasing url_timeout parameter (SCRD-8512)
* Fix &lt;screen&gt; prompts in migration guide (SCRD-3763)
* Revert 'Fix &lt;screen&gt; prompts in migration guide (SCRD-3763)'
* Fix &lt;screen&gt; prompts in migration guide (SCRD-3763)
* Include additional notes for 3PAR multipath instructions (SCRD-8584)
* remove L2 Gateway Agent (SCRD-7645)
* Added more detail about how to test load balancer during migration
* Fix RHEL SMT repo setup command (SCPM-93)
* added &lt;step&gt; tags
* Update to octavia migration process
* Support Octavia LB's during HOS 5 -&gt; C8 migration (bsc#1094690)
* change parameters ardana-update-status.yml (SCRD-8530)
* Fix haproxy user deletion
* Update description of kernel patch needed for RHEL 7.5 (SCPM-93)
* Adding missing nova guide
* Remove screenshots
* Fix IDs and x-refs
* Fix Magnim user guide. WIP
* Add missing guide. Need fixing
* change 3par multipath statements (bsc#1128928,SCRD-8396)
* remove vlan transparency section (bsc#1125216,SCRD-7648)
* remove ESXi create DVS from the Command Line (bsc#1125180)
* make QE recommended edits (bsc#1124017, bsc#1124022)
* Use &amp;clm; instead of &amp;lcm; for C*loud Lifec*ycle Manager
* add supportconfig, sosreport cross-references (SCRD-2680)
* Fixing xref tag for package builds
* Fix missing ID
* make hidden-tag consistent (SCRD-7870)
* Nesting availability zone aware section
* Removing the API content from the admin guide
* Remove empty sections
* Remove weird [OBJ] characters in odd places
* Replace &lt;function&gt; -&gt; &lt;literal&gt;
* Fixing broken ref
* Add references to DIB back to guide
* rabbitmq cluster replace node (SCRD-7468,SCRD-7469)
* minor typo and prompt changes (no bsc or SCRD)

galera-python-clustercheck:

* Add socket read timeout (bsc#1122053)

openstack-dashboard:

* network topology: handle port AZ correctly

openstack-ec2-api:

* Replace openstack.org git:// URLs with https://

openstack-heat:

* Retry on DB deadlock when updating resource

openstack-heat-templates:

* Replace openstack.org git:// URLs with https://

openstack-horizon-plugin-ironic-ui:

* Normalize operation messages into capital case
* Replace openstack.org git:// URLs with https://


penstack-horizon-plugin-magnum-ui:

* Replace openstack.org git:// URLs with https://
* Set ubuntu-xenial for nodejs jobs

openstack-horizon-plugin-sahara-ui:

* Replace openstack.org git:// URLs with https://
* Remove the legacy integration tests job

penstack-ironic:

* Fix CPU count returned by introspection in Ironic iDRAC driver

openstack-keystone:

* create proper tmpdir for locking
* Remove publish-loci post job

openstack-magnum:

* Replace openstack.org git:// URLs with https://

openstack-manila:

* Replace openstack.org git:// URLs with https://
* Manila VMAX docs -  differences between quotas
* Manila VMAX docs -  improve pre-configurations on VMAX section
* Manila VMAX docs -  clarify snapshot support
* Manila VMAX docs -  clarify driver\_handles\_share\_servers
* VMAX manila doc - SSL Support
* VMAX manila doc - use of correct VMAX tags
* VMAX manila - deprecate old tags correctly
* Destroy type quotas when a share type is deleted
* Fix driver filter to not check share\_backend\_name
* Only run the needed services for CephFS jobs
* Return request-id to APIs that don't respond with a body
* Fix service image boot issues
* Port dummy driver manage/unmanage changes to stable

openstack-monasca-api:

* Replace openstack.org git:// URLs with https://

openstack-monasca-notification:

* Replace openstack.org git:// URLs with https://

openstack-monasca-persister:

* Replace openstack.org git:// URLs with https://

openstack-murano: 

* Replace openstack.org git:// URLs with https://

openstack-neutron:

* Specify tenant\_id in TestRevisionPlugin objects
* Fix QoS rule update
* Add rootwrap filters to kill state change monitor
* Fix port update deferred IP allocation with host\_id + new MAC
* Try to enable dnsmasq process several times
* Remove conntrack rule when FIP is deleted
* More accurate agent restart state transfer
* [OVS] Exception message when retrieving bridge-id and is not present
* [Functional tests] Change way how conntrack entries are checked
* Change duplicate OVS bridge datapath-ids
* Fix KeyError in OVS firewall
* ovs: raise RuntimeError in \_get\_dp if id is None
* Replace openstack.org git:// URLs with https://
* [Functional] Don't assert that HA router don't have IPs configured
* Improve invalid port ranges error message
* Do not release DHCP lease when no client ID is set on port
* ovsfw: Update SG rules even if OVSFW Port is not found
* Enable ipv6\_forwarding in HA router's namespace
* Spawn metadata proxy on dvr ha standby routers
* Set initial ha router state in neutron-keepalived-state-change
* When converting sg rules to iptables, do not emit dport if not supported
* DVR edge router: avoid accidental centralized floating IP remove
* ovsfw: Don't create rules if updated port doesn't exist
* Add new test decorator skip\_if\_timeout
* Fix notification about arp entries for dvr routers
* Add lock\_path in installation guide
* Fix update of ports cache in router\_info class
* Ensure dnsmasq is down before enabling it in restart method
* Block port update from unbound DHCP agent
* Fix performance regression adding rules to security groups
* Always fill UDP checksums in DHCPv6 replies
* Secure dnsmasq process against external abuse
* Check port VNIC type when associating a floating IP
* Enable 'all' IPv6 forwarding knob correctly
* protect DHCP agent cache out of sync
* Add kill\_timeout to AsyncProcess
* Fullstack: init trunk agent's driver only when necessary
* Don't modify global variables in unit tests
* Do state report after setting start\_flag on OVS restart
* Do not delete trunk bridges if service port attached
* Fix the bug about DHCP port whose network has multiple subnets
* Force all fdb entries update after ovs-vswitchd restart
* Get centralized FIP only on router's snat host
* Include all rootwrap filters when building wheels

openstack-neutron-fwaas:

* don't package tempest plugin twice

openstack-nova:

* Document unset/reset wrinkle for \*\_allocation\_ratio options
* Replace openstack.org git:// URLs with https://
* Refix disk size during live migration with disk over-commit
* Fix WeighedHost logging regression
* Correct examples in 'Manage Compute services' documentation
* Fix disk size during live migration with disk over-commit
* Exclude build request marker from server listing
* Update port device\_owner when unshelving
* Handle tags in \_bury\_in\_cell0
* Null out instance.availability\_zone on shelve offload
* Fix server\_group\_members quota check
* Add functional regressions tests for server\_group\_members OverQuota
* Fix bug case by none token context
* Migrate nova v2.0 legacy job to zuulv3
* Handle missing marker during online data migration
* tox: Don't write byte code (maybe)
* [pike-only] Fix resize\_instance rpcapi call
* Lock detach\_volume
* PCI: do not force remove allocated devices
* Note the aggregate allocation ratio restriction in scheduler docs
* Add regression test for bug #1764883
* Create BDMs/tags in cell with instance when over-quota
* Add functional regression test for bug 1806064
* Not set instance to ERROR if set\_admin\_password failed
* De-dupe subnet IDs when calling neutron /subnets API
* Fix destination\_type attribute in the bdm\_v2 documentation

openstack-octavia:

* Replace openstack.org git:// URLs with https://

openstack-sahara:

* Replace openstack.org git:// URLs with https://
* Use venv-py2 to run sahara-scenario, remove the py3 job
* archive-primary.cloudera.com -&gt; archive.cloudera.com
* Changing hdfs fs to hdfs dfs
* Add DEBIAN\_FRONTEND=noninteractive in front of apt-get install commands

openstack-swift:

* Fixed a cache invalidation issue related to GET and PUT requests to
  containers that would occasionally cause object PUTs to a container to
  404 after the container had been successfully created.
* Removed a race condition where a POST to an SLO could modify the X-Static-Large-Object metadata.
* Fixed rare socket leak on range requests to erasure-coded objects.
* Fix SLO delete for accounts with non-ASCII names.
* Fixed an issue in COPY where concurrent requests may have copied the wrong data.
* Fixed time skew when using X-Delete-After.
* Send ETag header in 206 Partial Content responses to SLO reads.

openstack-tempest:

* create lockdir on install

python-cinderclient:

* Update .gitreview for stable/pike
* Fix get_highest_client_server_version with Cinder API + uWSGI
* Updated from global requirements
* import zuul job settings from project-config
* Update UPPER_CONSTRAINTS_FILE for stable/pike

python-cryptography:

* Add X509_up_ref() function to help pyOpenSSL deal with CVE-2018-1000807 (bsc#1111635) and CVE-2018-1000808 (bsc#1111634).

python-monasca-common:

* update to version 2.3.1~dev4

python-networking-hyperv:

* import zuul job settings from project-config

python-os-brick:

* iscsiadm -m session' failure handling
* Handle multiple errors in multipath -l parsing
* Fixing FC scanning
* RemoteFS: don't fail in do_mount if already mounted
* Fix multipath disconnect with path failure
* import zuul job settings from project-config

python-venvjail:

* Set [] as default value for --no-relocate-shebang-list
* Exclude some files from relocation (SCRD-8594)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-06"/>
	<updated date="2019-05-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1063535">SUSE bug 1063535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094690">SUSE bug 1094690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105822">SUSE bug 1105822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111634">SUSE bug 1111634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111635">SUSE bug 1111635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114632">SUSE bug 1114632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116501">SUSE bug 1116501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122053">SUSE bug 1122053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122237">SUSE bug 1122237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122875">SUSE bug 1122875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124017">SUSE bug 1124017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124022">SUSE bug 1124022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125180">SUSE bug 1125180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125216">SUSE bug 1125216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127752">SUSE bug 1127752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128479">SUSE bug 1128479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128928">SUSE bug 1128928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130414">SUSE bug 1130414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/127227">SUSE bug 127227</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000807/">CVE-2018-1000807 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000807">CVE-2018-1000807 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000808/">CVE-2018-1000808 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000808">CVE-2018-1000808 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597769" comment="ardana-ansible-8.0+git.1553878455.7439e04-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597770" comment="ardana-cobbler-8.0+git.1550694449.df88054-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597771" comment="ardana-db-8.0+git.1550589454.df2e733-3.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597772" comment="ardana-heat-8.0+git.1552935705.e9a92b3-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597773" comment="ardana-manila-8.0+git.1551748668.7427826-1.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597774" comment="ardana-neutron-8.0+git.1551113207.9f1db17-3.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597775" comment="ardana-nova-8.0+git.1551718533.227cb9e-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597776" comment="ardana-octavia-8.0+git.1553890679.8a50307-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597777" comment="ardana-osconfig-8.0+git.1552503158.6b6b195-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597778" comment="ardana-service-8.0+git.1551382173.a81d5e1-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597779" comment="ardana-ses-8.0+git.1554145115.63a4cf2-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597780" comment="ardana-swift-8.0+git.1551502730.f4d219d-3.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597781" comment="ardana-tempest-8.0+git.1554307220.ed24e63-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597782" comment="documentation-suse-openstack-cloud-installation-8.20190329-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597783" comment="documentation-suse-openstack-cloud-operations-8.20190329-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597784" comment="documentation-suse-openstack-cloud-opsconsole-8.20190329-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597785" comment="documentation-suse-openstack-cloud-planning-8.20190329-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597786" comment="documentation-suse-openstack-cloud-security-8.20190329-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597787" comment="documentation-suse-openstack-cloud-supplement-8.20190329-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597788" comment="documentation-suse-openstack-cloud-upstream-admin-8.20190329-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597789" comment="documentation-suse-openstack-cloud-upstream-user-8.20190329-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597790" comment="documentation-suse-openstack-cloud-user-8.20190329-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597791" comment="galera-python-clustercheck-0.0+git.1506329536.8f5878c-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597792" comment="openstack-dashboard-12.0.4~dev5-3.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597793" comment="openstack-ec2-api-5.0.1~dev10-4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597794" comment="openstack-ec2-api-api-5.0.1~dev10-4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597795" comment="openstack-ec2-api-metadata-5.0.1~dev10-4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597796" comment="openstack-ec2-api-s3-5.0.1~dev10-4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597797" comment="openstack-heat-9.0.6~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597798" comment="openstack-heat-api-9.0.6~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597799" comment="openstack-heat-api-cfn-9.0.6~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597800" comment="openstack-heat-api-cloudwatch-9.0.6~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597801" comment="openstack-heat-doc-9.0.6~dev17-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597802" comment="openstack-heat-engine-9.0.6~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597803" comment="openstack-heat-plugin-heat_docker-9.0.6~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597804" comment="openstack-heat-templates-0.0.0+git.1553459627.948e8cc-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597805" comment="openstack-heat-test-9.0.6~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597806" comment="openstack-horizon-plugin-ironic-ui-3.0.4~dev3-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597807" comment="openstack-horizon-plugin-magnum-ui-3.0.1~dev9-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597808" comment="openstack-horizon-plugin-sahara-ui-7.0.4~dev1-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597809" comment="openstack-ironic-9.1.7~dev7-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597810" comment="openstack-ironic-api-9.1.7~dev7-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597811" comment="openstack-ironic-conductor-9.1.7~dev7-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597812" comment="openstack-ironic-doc-9.1.7~dev7-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597813" comment="openstack-keystone-12.0.3~dev1-5.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597814" comment="openstack-keystone-doc-12.0.3~dev1-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597815" comment="openstack-magnum-5.0.2~dev31-4.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597816" comment="openstack-magnum-api-5.0.2~dev31-4.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597817" comment="openstack-magnum-conductor-5.0.2~dev31-4.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597818" comment="openstack-magnum-doc-5.0.2~dev31-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597819" comment="openstack-manila-5.0.4~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597820" comment="openstack-manila-api-5.0.4~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597821" comment="openstack-manila-data-5.0.4~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597822" comment="openstack-manila-doc-5.0.4~dev17-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597823" comment="openstack-manila-scheduler-5.0.4~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597824" comment="openstack-manila-share-5.0.4~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597825" comment="openstack-monasca-api-2.2.1~dev25-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597826" comment="openstack-monasca-notification-1.10.2~dev2-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597827" comment="openstack-monasca-persister-1.7.1~dev8-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597828" comment="openstack-murano-4.0.1~dev5-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597829" comment="openstack-murano-api-4.0.1~dev5-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597830" comment="openstack-murano-doc-4.0.1~dev5-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597831" comment="openstack-murano-engine-4.0.1~dev5-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597832" comment="openstack-neutron-11.0.7~dev100-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597833" comment="openstack-neutron-dhcp-agent-11.0.7~dev100-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597834" comment="openstack-neutron-doc-11.0.7~dev100-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597835" comment="openstack-neutron-fwaas-11.0.2~dev8-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597836" comment="openstack-neutron-fwaas-doc-11.0.2~dev8-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597837" comment="openstack-neutron-ha-tool-11.0.7~dev100-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597838" comment="openstack-neutron-l3-agent-11.0.7~dev100-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597839" comment="openstack-neutron-linuxbridge-agent-11.0.7~dev100-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597840" comment="openstack-neutron-macvtap-agent-11.0.7~dev100-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597841" comment="openstack-neutron-metadata-agent-11.0.7~dev100-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597842" comment="openstack-neutron-metering-agent-11.0.7~dev100-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597843" comment="openstack-neutron-openvswitch-agent-11.0.7~dev100-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597844" comment="openstack-neutron-server-11.0.7~dev100-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597845" comment="openstack-nova-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597846" comment="openstack-nova-api-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597847" comment="openstack-nova-cells-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597848" comment="openstack-nova-compute-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597849" comment="openstack-nova-conductor-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597850" comment="openstack-nova-console-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597851" comment="openstack-nova-consoleauth-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597852" comment="openstack-nova-doc-16.1.8~dev53-3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597853" comment="openstack-nova-novncproxy-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597854" comment="openstack-nova-placement-api-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597855" comment="openstack-nova-scheduler-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597856" comment="openstack-nova-serialproxy-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597857" comment="openstack-nova-vncproxy-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597858" comment="openstack-octavia-1.0.5~dev1-4.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597859" comment="openstack-octavia-amphora-agent-1.0.5~dev1-4.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597860" comment="openstack-octavia-api-1.0.5~dev1-4.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597861" comment="openstack-octavia-health-manager-1.0.5~dev1-4.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597862" comment="openstack-octavia-housekeeping-1.0.5~dev1-4.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597863" comment="openstack-octavia-worker-1.0.5~dev1-4.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597864" comment="openstack-sahara-7.0.4~dev1-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597865" comment="openstack-sahara-api-7.0.4~dev1-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597866" comment="openstack-sahara-doc-7.0.4~dev1-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597867" comment="openstack-sahara-engine-7.0.4~dev1-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597868" comment="openstack-swift-2.15.2~dev32-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597869" comment="openstack-swift-account-2.15.2~dev32-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597870" comment="openstack-swift-container-2.15.2~dev32-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597871" comment="openstack-swift-doc-2.15.2~dev32-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597872" comment="openstack-swift-object-2.15.2~dev32-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597873" comment="openstack-swift-proxy-2.15.2~dev32-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597874" comment="openstack-tempest-17.0.0-4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597875" comment="openstack-tempest-test-17.0.0-4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597876" comment="python-cinderclient-3.1.1-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597877" comment="python-cinderclient-doc-3.1.1-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597878" comment="python-cryptography-2.0.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597879" comment="python-ec2api-5.0.1~dev10-4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597880" comment="python-heat-9.0.6~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597881" comment="python-horizon-12.0.4~dev5-3.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597882" comment="python-horizon-plugin-ironic-ui-3.0.4~dev3-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597883" comment="python-horizon-plugin-magnum-ui-3.0.1~dev9-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597884" comment="python-horizon-plugin-sahara-ui-7.0.4~dev1-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597885" comment="python-ironic-9.1.7~dev7-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597886" comment="python-keystone-12.0.3~dev1-5.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597887" comment="python-magnum-5.0.2~dev31-4.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597888" comment="python-manila-5.0.4~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597889" comment="python-monasca-api-2.2.1~dev25-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597890" comment="python-monasca-common-2.3.1~dev4-4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597891" comment="python-monasca-notification-1.10.2~dev2-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597892" comment="python-monasca-persister-1.7.1~dev8-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597893" comment="python-murano-4.0.1~dev5-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597894" comment="python-neutron-11.0.7~dev100-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597895" comment="python-neutron-fwaas-11.0.2~dev8-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597896" comment="python-nova-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597897" comment="python-octavia-1.0.5~dev1-4.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597898" comment="python-os-brick-1.15.8-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597899" comment="python-sahara-7.0.4~dev1-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597900" comment="python-swift-2.15.2~dev32-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597901" comment="python-tempest-17.0.0-4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597902" comment="venv-openstack-aodh-x86_64-5.1.1~dev6-12.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597903" comment="venv-openstack-barbican-x86_64-5.0.2~dev2-12.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597904" comment="venv-openstack-ceilometer-x86_64-9.0.7~dev2-12.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597905" comment="venv-openstack-cinder-x86_64-11.1.2~dev58-14.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597906" comment="venv-openstack-designate-x86_64-5.0.3~dev6-12.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597907" comment="venv-openstack-freezer-x86_64-5.0.0.0~xrc2~dev2-10.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597908" comment="venv-openstack-glance-x86_64-15.0.2~dev9-12.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597909" comment="venv-openstack-heat-x86_64-9.0.6~dev17-12.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597910" comment="venv-openstack-horizon-x86_64-12.0.4~dev5-14.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597911" comment="venv-openstack-ironic-x86_64-9.1.7~dev7-12.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597912" comment="venv-openstack-keystone-x86_64-12.0.3~dev1-11.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597913" comment="venv-openstack-magnum-x86_64-5.0.2-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597914" comment="venv-openstack-manila-x86_64-5.0.4~dev17-12.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597915" comment="venv-openstack-monasca-ceilometer-x86_64-1.5.1-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597916" comment="venv-openstack-monasca-x86_64-2.2.1-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597917" comment="venv-openstack-murano-x86_64-4.0.1-12.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597918" comment="venv-openstack-neutron-x86_64-11.0.2-13.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597919" comment="venv-openstack-nova-x86_64-16.1.8~dev53-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597920" comment="venv-openstack-octavia-x86_64-1.0.5~dev1-12.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597921" comment="venv-openstack-sahara-x86_64-7.0.4~dev1-11.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597922" comment="venv-openstack-swift-x86_64-2.15.2-11.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597923" comment="venv-openstack-trove-x86_64-8.0.1~dev12-11.14.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148153" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Low)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1112767" ref_url="https://bugzilla.suse.com/1112767" source="BUGZILLA"/>
		<reference ref_id="1122198" ref_url="https://bugzilla.suse.com/1122198" source="BUGZILLA"/>
		<reference ref_id="1122475" ref_url="https://bugzilla.suse.com/1122475" source="BUGZILLA"/>
		<reference ref_id="1127027" ref_url="https://bugzilla.suse.com/1127027" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2510" ref_url="https://www.suse.com/security/cve/CVE-2019-2510/" source="CVE"/>
		<reference ref_id="CVE-2019-2537" ref_url="https://www.suse.com/security/cve/CVE-2019-2537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005427.html" source="SUSE-SU"/>
		<description>
This update for mariadb to version 10.2.22 fixes the following issues:
	  
Security issues fixed (bsc#1122198):

- CVE-2019-2510: Fixed a vulnerability which can lead to MySQL compromise and lead to Denial of Service.
- CVE-2019-2537: Fixed a vulnerability which can lead to MySQL compromise and lead to Denial of Service.

Other issues fixed:

- Fixed an issue where mysl_install_db fails due to incorrect basedir (bsc#1127027).
- Fixed an issue where the lograte was not working (bsc#1112767).
- Backport Information Schema CHECK_CONSTRAINTS Table.
- Maximum value of table_definition_cache is now 2097152.
- InnoDB ALTER TABLE fixes.
- Galera crash recovery fixes.
- Encryption fixes.
- Remove xtrabackup dependency  as MariaDB ships a build in mariabackup so xtrabackup is not needed (bsc#1122475).

The complete changelog can be found at:  https://mariadb.com/kb/en/library/mariadb-10222-changelog/
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-06"/>
	<updated date="2019-05-06"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1112767">SUSE bug 1112767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122475">SUSE bug 1122475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127027">SUSE bug 1127027</bugzilla>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2510/">CVE-2019-2510 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2510">CVE-2019-2510 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2537/">CVE-2019-2537 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2537">CVE-2019-2537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596681" comment="mariadb-10.2.22-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596682" comment="mariadb-client-10.2.22-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596683" comment="mariadb-errormessages-10.2.22-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596684" comment="mariadb-galera-10.2.22-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596685" comment="mariadb-tools-10.2.22-4.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148154" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1136570" ref_url="https://bugzilla.suse.com/1136570" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1606-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005832.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- Fix the previous fix for CVE-2019-3860 (bsc#1136570, bsc#1128481)
  (Out-of-bounds reads with specially crafted SFTP packets)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-21"/>
	<updated date="2019-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3860">CVE-2019-3860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521526" comment="libssh2-1-1.4.3-20.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521924" comment="libssh2-1-32bit-1.4.3-20.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148155" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1138872" ref_url="https://bugzilla.suse.com/1138872" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005624.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Mozilla Firefox Firefox 60.7.2
  MFSA 2019-19 (bsc#1138872)

- CVE-2019-11708: Fix sandbox escape using Prompt:Open.
  * Insufficient vetting of parameters passed with the Prompt:Open IPC
    message between child and parent processes could result in the non-sandboxed
    parent process opening web content chosen by a compromised child process.
    When combined with additional vulnerabilities this could result in executing
    arbitrary code on the user's computer.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-22"/>
	<updated date="2019-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138872">SUSE bug 1138872</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11708">CVE-2019-11708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521537" comment="MozillaFirefox-60.7.2-109.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521538" comment="MozillaFirefox-translations-common-60.7.2-109.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148156" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1054429" ref_url="https://bugzilla.suse.com/1054429" source="BUGZILLA"/>
		<reference ref_id="1076958" ref_url="https://bugzilla.suse.com/1076958" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15107" ref_url="https://www.suse.com/security/cve/CVE-2017-15107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005642.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

Security issue fixed:

- CVE-2017-15107: Fixed a vulnerability in DNSSEC implementation. Processing of
  wildcard synthesized NSEC records may result improper validation for non-existance. (bsc#1076958)

Non-security issue fixed:

- Reload system dbus to pick up policy change on install (bsc#1054429).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-02"/>
	<updated date="2019-07-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054429">SUSE bug 1054429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076958">SUSE bug 1076958</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15107/">CVE-2017-15107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15107">CVE-2017-15107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596686" comment="dnsmasq-utils-2.78-18.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148157" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1138034" ref_url="https://bugzilla.suse.com/1138034" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005674.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 to version 10.9 fixes the following issue:

Security issue fixed:	  

- CVE-2019-10164: Fixed buffer-overflow vulnerabilities in SCRAM verifier parsing (bsc#1138034).

More information at https://www.postgresql.org/docs/10/release-10-9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-09"/>
	<updated date="2019-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138034">SUSE bug 1138034</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10164">CVE-2019-10164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521936" comment="libecpg6-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521937" comment="libpq5-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521938" comment="libpq5-32bit-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521939" comment="postgresql10-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530575" comment="postgresql10-contrib-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530576" comment="postgresql10-docs-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530577" comment="postgresql10-plperl-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530578" comment="postgresql10-plpython-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530579" comment="postgresql10-pltcl-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530580" comment="postgresql10-server-10.9-1.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148158" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1139959" ref_url="https://bugzilla.suse.com/1139959" source="BUGZILLA"/>
		<reference ref_id="1140122" ref_url="https://bugzilla.suse.com/1140122" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13012" ref_url="https://www.suse.com/security/cve/CVE-2019-13012/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005704.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

Security issue fixed:

- CVE-2019-13012: Fixed improper restriction of file permissions when creating directories (bsc#1139959).

Non-security issue fixed:

- Added explicit requires between libglib2 and libgio2 (bsc#1140122).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-12"/>
	<updated date="2019-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139959">SUSE bug 1139959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140122">SUSE bug 1140122</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13012/">CVE-2019-13012 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13012">CVE-2019-13012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521943" comment="glib2-lang-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521944" comment="glib2-tools-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521945" comment="libgio-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521946" comment="libgio-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521948" comment="libglib-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521949" comment="libglib-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521950" comment="libgmodule-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521951" comment="libgmodule-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521952" comment="libgobject-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521953" comment="libgobject-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521954" comment="libgthread-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521955" comment="libgthread-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148159" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1053043" ref_url="https://bugzilla.suse.com/1053043" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1094555" ref_url="https://bugzilla.suse.com/1094555" source="BUGZILLA"/>
		<reference ref_id="1108382" ref_url="https://bugzilla.suse.com/1108382" source="BUGZILLA"/>
		<reference ref_id="1109137" ref_url="https://bugzilla.suse.com/1109137" source="BUGZILLA"/>
		<reference ref_id="1111188" ref_url="https://bugzilla.suse.com/1111188" source="BUGZILLA"/>
		<reference ref_id="1119086" ref_url="https://bugzilla.suse.com/1119086" source="BUGZILLA"/>
		<reference ref_id="1120902" ref_url="https://bugzilla.suse.com/1120902" source="BUGZILLA"/>
		<reference ref_id="1121263" ref_url="https://bugzilla.suse.com/1121263" source="BUGZILLA"/>
		<reference ref_id="1125580" ref_url="https://bugzilla.suse.com/1125580" source="BUGZILLA"/>
		<reference ref_id="1126961" ref_url="https://bugzilla.suse.com/1126961" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1129770" ref_url="https://bugzilla.suse.com/1129770" source="BUGZILLA"/>
		<reference ref_id="1131335" ref_url="https://bugzilla.suse.com/1131335" source="BUGZILLA"/>
		<reference ref_id="1131336" ref_url="https://bugzilla.suse.com/1131336" source="BUGZILLA"/>
		<reference ref_id="1131645" ref_url="https://bugzilla.suse.com/1131645" source="BUGZILLA"/>
		<reference ref_id="1132390" ref_url="https://bugzilla.suse.com/1132390" source="BUGZILLA"/>
		<reference ref_id="1133140" ref_url="https://bugzilla.suse.com/1133140" source="BUGZILLA"/>
		<reference ref_id="1133190" ref_url="https://bugzilla.suse.com/1133190" source="BUGZILLA"/>
		<reference ref_id="1133191" ref_url="https://bugzilla.suse.com/1133191" source="BUGZILLA"/>
		<reference ref_id="1133738" ref_url="https://bugzilla.suse.com/1133738" source="BUGZILLA"/>
		<reference ref_id="1134395" ref_url="https://bugzilla.suse.com/1134395" source="BUGZILLA"/>
		<reference ref_id="1135642" ref_url="https://bugzilla.suse.com/1135642" source="BUGZILLA"/>
		<reference ref_id="1136598" ref_url="https://bugzilla.suse.com/1136598" source="BUGZILLA"/>
		<reference ref_id="1136889" ref_url="https://bugzilla.suse.com/1136889" source="BUGZILLA"/>
		<reference ref_id="1136922" ref_url="https://bugzilla.suse.com/1136922" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137004" ref_url="https://bugzilla.suse.com/1137004" source="BUGZILLA"/>
		<reference ref_id="1137194" ref_url="https://bugzilla.suse.com/1137194" source="BUGZILLA"/>
		<reference ref_id="1137739" ref_url="https://bugzilla.suse.com/1137739" source="BUGZILLA"/>
		<reference ref_id="1137749" ref_url="https://bugzilla.suse.com/1137749" source="BUGZILLA"/>
		<reference ref_id="1137752" ref_url="https://bugzilla.suse.com/1137752" source="BUGZILLA"/>
		<reference ref_id="1137915" ref_url="https://bugzilla.suse.com/1137915" source="BUGZILLA"/>
		<reference ref_id="1138291" ref_url="https://bugzilla.suse.com/1138291" source="BUGZILLA"/>
		<reference ref_id="1138293" ref_url="https://bugzilla.suse.com/1138293" source="BUGZILLA"/>
		<reference ref_id="1138374" ref_url="https://bugzilla.suse.com/1138374" source="BUGZILLA"/>
		<reference ref_id="1138681" ref_url="https://bugzilla.suse.com/1138681" source="BUGZILLA"/>
		<reference ref_id="1139751" ref_url="https://bugzilla.suse.com/1139751" source="BUGZILLA"/>
		<reference ref_id="1140575" ref_url="https://bugzilla.suse.com/1140575" source="BUGZILLA"/>
		<reference ref_id="1140577" ref_url="https://bugzilla.suse.com/1140577" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20836" ref_url="https://www.suse.com/security/cve/CVE-2018-20836/" source="CVE"/>
		<reference ref_id="CVE-2019-10126" ref_url="https://www.suse.com/security/cve/CVE-2019-10126/" source="CVE"/>
		<reference ref_id="CVE-2019-10638" ref_url="https://www.suse.com/security/cve/CVE-2019-10638/" source="CVE"/>
		<reference ref_id="CVE-2019-10639" ref_url="https://www.suse.com/security/cve/CVE-2019-10639/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-11599" ref_url="https://www.suse.com/security/cve/CVE-2019-11599/" source="CVE"/>
		<reference ref_id="CVE-2019-12380" ref_url="https://www.suse.com/security/cve/CVE-2019-12380/" source="CVE"/>
		<reference ref_id="CVE-2019-12456" ref_url="https://www.suse.com/security/cve/CVE-2019-12456/" source="CVE"/>
		<reference ref_id="CVE-2019-12614" ref_url="https://www.suse.com/security/cve/CVE-2019-12614/" source="CVE"/>
		<reference ref_id="CVE-2019-12818" ref_url="https://www.suse.com/security/cve/CVE-2019-12818/" source="CVE"/>
		<reference ref_id="CVE-2019-12819" ref_url="https://www.suse.com/security/cve/CVE-2019-12819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may have been conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses (bnc#1140575 1140577).
- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), that lead to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack could be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visited the attacker's web page, then WebRTC or gQUIC could be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable because IP ID generation was changed to have a dependency on an address associated with a network namespace (bnc#1140577).
- CVE-2019-10126: A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might have lead to memory corruption and possibly other consequences (bnc#1136935).
- CVE-2018-20836: An issue was discovered in the Linux kernel There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).
- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm call. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c (bnc#1131645 1133738).
- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel There was an unchecked kstrdup of prop-name, which might have allowed an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).
- CVE-2019-12819: An issue was discovered in the Linux kernel The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which would trigger a fixed_mdio_bus_init use-after-free. This would cause a denial of service (bnc#1138291).
- CVE-2019-12818: An issue was discovered in the Linux kernel The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller did not check for this, it would trigger a NULL pointer dereference. This would cause a denial of service. This affected nfc_llcp_build_gb in net/nfc/llcp_core.c (bnc#1138293).
- CVE-2019-12456: A double-fetch bug in _ctl_ioctl_main() could lead to a local denial of service attack (bsc#1136922 CVE-2019-12456).
- CVE-2019-12380: An issue was discovered in the efi subsystem in the Linux kernel phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because ;All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it (bnc#1136598).
- CVE-2019-11487: The Linux kernel before allowed page-_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It could occur with FUSE requests (bnc#1133190 1133191).

The following non-security bugs were fixed:

- Drop multiversion(kernel) from the KMP template (bsc#1127155).
- Fix ixgbe backport (bsc#1133140)
- Revert 'KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).' This reverts commit 4cc83da426b53d47f1fde9328112364eab1e9a19.
- Update 'TCP SACK Panic' series
- ACPI / CPPC: Check for valid PCC subspace only if PCC is used (bsc#1126961).
- ACPI / CPPC: Fix KASAN global out of bounds warning (bsc#1126961).
- ACPI / CPPC: Make CPPC ACPI driver aware of PCC subspace IDs (bsc#1126961).
- ACPI / CPPC: Update all pr_(debug/err) messages to log the susbspace id (bsc#1126961).
- ACPI / CPPC: Use 64-bit arithmetic instead of 32-bit (bsc#1126961).
- ACPI / CPPC: fix build issue with ktime_t used in logical operation (bsc#1126961).
- ACPI: CPPC: remove initial assignment of pcc_ss_data (bsc#1126961).
- at76c50x-usb: Do not register led_trigger if usb_register_driver failed (bsc#1135642).
- ath6kl: Only use match sets when firmware supports it (bsc#1120902).
- btrfs: check for refs on snapshot delete resume (bsc#1131335, bsc#1137004).
- btrfs: run delayed items before dropping the snapshot (bsc#1121263, bsc#1111188, bsc#1137004).
- btrfs: save drop_progress if we drop refs at all (bsc#1131336, bsc#1137004).
- ceph: fix potential use-after-free in ceph_mdsc_build_path (bsc#1138681).
- ceph: flush dirty inodes before proceeding with remount (bsc#1138681).
- ceph: print inode number in __caps_issued_mask debugging messages (bsc#1138681).
- cpu/hotplug: Provide cpus_read|write_[un]lock() (bsc#1138374, LTC#178199).
- cpu/hotplug: Provide lockdep_assert_cpus_held() (bsc#1138374, LTC#178199).
- cpufreq / CPPC: Add cpuinfo_cur_freq support for CPPC (bsc#1126961).
- cpufreq: CPPC: fix build in absence of v3 support (bsc#1126961).
- cpufreq: Replace 'max_transition_latency' with 'dynamic_switching' (bsc#1126961).
- cpufreq: cn99xx: set platform specific sampling rate (bsc#1126961).
- ibmvnic: Add device identification to requested IRQs (bsc#1137739).
- ibmvnic: Do not close unopened driver during reset (bsc#1137752).
- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).
- ibmvnic: Refresh device multicast list after reset (bsc#1137752).
- ibmvnic: remove set but not used variable 'netdev' (bsc#1137739).
- iwiwifi: fix bad monitor buffer register addresses (bsc#1129770).
- kabi: cpufreq: rename dynamic_switching to max_transition_latency (bsc#1126961).
- kernel/sys.c: prctl: fix false positive in validate_prctl_map() (bsc#1137749).
- libertas_tf: prevent underflow in process_cmdrequest() (bsc#1119086).
- mailbox: PCC: Move the MAX_PCC_SUBSPACES definition to header file (bsc#1126961).
- mailbox: pcc: Drop uninformative output during boot (bsc#1126961).
- mailbox: pcc: Fix crash when request PCC channel 0 (bsc#1126961).
- mwl8k: Fix rate_idx underflow (bsc#1135642).
- net/ibmvnic: Remove tests of member address (bsc#1137739).
- net: Remove NO_IRQ from powerpc-only network drivers (bsc#1137739).
- nvmet-fc: bring Disconnect into compliance with FC-NVME spec (bsc#1136889).
- nvmet-fc: fix issues with targetport assoc_list list walking (bsc#1136889).
- nvmet: fix fatal_err_work deadlock (bsc#1136889).
- nvmet_fc: support target port removal with nvmet layer (bsc#1136889).
- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).
- powerpc/eeh: Fix race with driver un/bind (bsc#1066223).
- powerpc/perf: Add blacklisted events for Power9 DD2.1 (bsc#1053043).
- powerpc/perf: Add blacklisted events for Power9 DD2.2 (bsc#1053043).
- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).
- powerpc/perf: Infrastructure to support addition of blacklisted events (bsc#1053043).
- powerpc/process: Fix sparse address space warnings (bsc#1066223).
- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).
- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).
- rtlwifi: fix false rates in _rtl8821ae_mrate_idx_to_arfr_id() (bsc#1120902).
- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).
- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).
- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).
- signals: avoid random wakeups in sigsuspend() (bsc#1137915)
- treewide: Use DEVICE_ATTR_WO (bsc#1137739).
- x86/entry/64/compat: Fix stack switching for XEN PV (bsc#1108382).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-15"/>
	<updated date="2019-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1053043">SUSE bug 1053043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094555">SUSE bug 1094555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108382">SUSE bug 1108382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109137">SUSE bug 1109137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111188">SUSE bug 1111188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119086">SUSE bug 1119086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120902">SUSE bug 1120902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121263">SUSE bug 1121263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125580">SUSE bug 1125580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126961">SUSE bug 1126961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129770">SUSE bug 1129770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131335">SUSE bug 1131335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131336">SUSE bug 1131336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131645">SUSE bug 1131645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132390">SUSE bug 1132390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133140">SUSE bug 1133140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133190">SUSE bug 1133190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133738">SUSE bug 1133738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134395">SUSE bug 1134395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135642">SUSE bug 1135642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136598">SUSE bug 1136598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136889">SUSE bug 1136889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136922">SUSE bug 1136922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137004">SUSE bug 1137004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137194">SUSE bug 1137194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137739">SUSE bug 1137739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137749">SUSE bug 1137749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137752">SUSE bug 1137752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137915">SUSE bug 1137915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138291">SUSE bug 1138291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138293">SUSE bug 1138293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138374">SUSE bug 1138374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138681">SUSE bug 1138681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139751">SUSE bug 1139751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140575">SUSE bug 1140575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140577">SUSE bug 1140577</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20836/">CVE-2018-20836 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20836">CVE-2018-20836 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10126/">CVE-2019-10126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10126">CVE-2019-10126 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10638/">CVE-2019-10638 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10638">CVE-2019-10638 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10639/">CVE-2019-10639 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10639">CVE-2019-10639 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11487">CVE-2019-11487 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11599/">CVE-2019-11599 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11599">CVE-2019-11599 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12380/">CVE-2019-12380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12380">CVE-2019-12380 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12456/">CVE-2019-12456 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12456">CVE-2019-12456 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12614/">CVE-2019-12614 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12614">CVE-2019-12614 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12818/">CVE-2019-12818 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12818">CVE-2019-12818 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12819/">CVE-2019-12819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12819">CVE-2019-12819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521583" comment="kernel-default-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596687" comment="kernel-default-base-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521584" comment="kernel-default-devel-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521586" comment="kernel-devel-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521587" comment="kernel-macros-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521588" comment="kernel-source-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521589" comment="kernel-syms-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596688" comment="kgraft-patch-4_4_180-94_100-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148160" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes the following issues:

MozillaFirefox to version ESR 60.8:

- CVE-2019-9811: Sandbox escape via installation of malicious language pack (bsc#1140868).
- CVE-2019-11711: Script injection within domain through inner window reuse (bsc#1140868).
- CVE-2019-11712: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (bsc#1140868).
- CVE-2019-11713: Use-after-free with HTTP/2 cached stream (bsc#1140868).
- CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (bsc#1140868).
- CVE-2019-11715: HTML parsing error can contribute to content XSS (bsc#1140868).
- CVE-2019-11717: Caret character improperly escaped in origins (bsc#1140868).
- CVE-2019-11719: Out-of-bounds read when importing curve25519 private key (bsc#1140868).
- CVE-2019-11730: Same-origin policy treats all files in a directory as having the same-origin (bsc#1140868).
- CVE-2019-11709: Multiple Memory safety bugs fixed (bsc#1140868).

mozilla-nss to version 3.44.1:

* Added IPSEC IKE support to softoken 
* Many new FIPS test cases
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-17"/>
	<updated date="2019-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521974" comment="MozillaFirefox-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521975" comment="MozillaFirefox-translations-common-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530590" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530591" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530592" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530593" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148161" version="1" class="patch">
	<metadata>
		<title>Security update for ardana and crowbar (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1083721" ref_url="https://bugzilla.suse.com/1083721" source="BUGZILLA"/>
		<reference ref_id="1105559" ref_url="https://bugzilla.suse.com/1105559" source="BUGZILLA"/>
		<reference ref_id="1118003" ref_url="https://bugzilla.suse.com/1118003" source="BUGZILLA"/>
		<reference ref_id="1120932" ref_url="https://bugzilla.suse.com/1120932" source="BUGZILLA"/>
		<reference ref_id="1122875" ref_url="https://bugzilla.suse.com/1122875" source="BUGZILLA"/>
		<reference ref_id="1124170" ref_url="https://bugzilla.suse.com/1124170" source="BUGZILLA"/>
		<reference ref_id="1126391" ref_url="https://bugzilla.suse.com/1126391" source="BUGZILLA"/>
		<reference ref_id="1128753" ref_url="https://bugzilla.suse.com/1128753" source="BUGZILLA"/>
		<reference ref_id="1130593" ref_url="https://bugzilla.suse.com/1130593" source="BUGZILLA"/>
		<reference ref_id="1131712" ref_url="https://bugzilla.suse.com/1131712" source="BUGZILLA"/>
		<reference ref_id="1131791" ref_url="https://bugzilla.suse.com/1131791" source="BUGZILLA"/>
		<reference ref_id="1132542" ref_url="https://bugzilla.suse.com/1132542" source="BUGZILLA"/>
		<reference ref_id="1132852" ref_url="https://bugzilla.suse.com/1132852" source="BUGZILLA"/>
		<reference ref_id="1132860" ref_url="https://bugzilla.suse.com/1132860" source="BUGZILLA"/>
		<reference ref_id="124991" ref_url="https://bugzilla.suse.com/124991" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14574" ref_url="https://www.suse.com/security/cve/CVE-2018-14574/" source="CVE"/>
		<reference ref_id="CVE-2019-10876" ref_url="https://www.suse.com/security/cve/CVE-2019-10876/" source="CVE"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="CVE-2019-3498" ref_url="https://www.suse.com/security/cve/CVE-2019-3498/" source="CVE"/>
		<reference ref_id="CVE-2019-6975" ref_url="https://www.suse.com/security/cve/CVE-2019-6975/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005722.html" source="SUSE-SU"/>
		<description>
This update for ardana and crowbar fixes the following issues:

- Restrict rootwrap directories for cinder (bsc#1132542)
- Change Cinder default log level from DEBUG to INFO (SCRD-7132)
- Remove configuration from migration (bsc#1126391)
- Configurable innodb flush options (SCRD-7496)
- Secure designate's rootwrap files (bsc#1132542)
- specify rootwrap config file in designate sudoer (bsc#1132542)
- Update Designate log threshold from DEBUG to INFO (SCRD-8459)
- Change Glance default log level from DEBUG to INFO (SCRD-8592)
- Change Heat default log level from DEBUG to INFO (SCRD-7132)
- Fix Horizon missing create snapshot action for users (bsc#1130593)
- Don't set external-name in ardana-ci models (SCRD-7471)
- Fix fail-over/-back behavior of haproxy for galera (bsc#1122875)
- Update swift endpoints from keystone-reconfigure.yml if needed (SCRD-8703)
- Change Magnum default log level from DEFAULT to INFO (SCRD-7132)
- Rip out vertica related code (SCRD-9031)
- Tighten neutron sudoers to only execute rootwrap (bsc#1132542)
- Change Neutron default log level from DEBUG to INFO (SCRD-7132)
- SCRD-9031 Change permitted nova-rootwrap config file pattern (bsc#1132542)
- specify rootwrap config file in nova sudoer (bsc#1132542)
- Change Nova default log level from DEBUG to INFO (SCRD-7132)
- Stop installing a sudoers root escalator (SCRD-9031)
- Change Octavia default log level from DEBUG to INFO (SCRD-7132)
- Increase number of connect retries (SCRD-7496)
- UDEV rules for multi-port nics (SCRD-8329)
- Ensure that the ceph group exists (SCRD-8347)
- Disable test_create_health_monitor_with_scenarios tempest (SOC-9176)
- Make --os-test-timeout configurable and increase default (SCRD-7496)
- Disable TestVolumeBootPattern.test_volume_boot_pattern (SCRD-9015)
- Increase and make timeout values configurable (SCRD-7496)
- Configure heat boot config template path (SCRD-7496)
- Fix typo on ceilometer filter (SCRD-7496)
- barclamp: Fix setting MTU on networks using a bridge
- Fix order of values in nodes piechart
- Ignore CVE-2019-11068 during Travis (SOC-9262)
- Fix cloud-mkcloud9-job-backup-restore (SCRD-7126)
- Update suse-branding.patch with correct links for documentation
  (SCRD-8294)
- pacemaker: add failure nodes to sync fail message (bsc#1083721)
- update suse-branding.patch (SOC-9297)
- pacemaker: wait more for founder if SBD is configured (SCRD-8462)
- pacemaker: don't check cluster members on founder (SCRD-8462)
-  database: Make wsrep_provider_options configurable (fate#327745)
-  database: Raise and align promote/demote timeouts (bsc#1131791)
-  mysql: improve galera HA setup (bsc#1122875)
- Update suse-branding.patch with correct links for documentation
  (SCRD-8294)
-  neutron: Fix the rest of the keystone related settings for LBaaS
-  neutron: properly define neutron lbaas region (bsc#1128753)
-  CLM - update MariaDB manually (bsc#1132852, SOC-9022)
-  update MariaDB manually (bsc#1132852, SOC-9022)
-  SOC8 alarm table restructure ((SCRD-7710, bsc#1124170)
-  Fix bsc#1118003
-  add deprecation decision tree (shrub) (SCRD-8530)
-  add cert section (SCRD-5542)
-  grammar; make migration pairing more explicit (SCRD-7595)
-  Remove whitespace on top of login page (SCRD-7142)
-  Revert alert and form colors to default SCRD-6919
-  Change active sidebar section text white SCRD-6919
- Updated the openstack-monasca-agent-sudoers file (bsc#1132542)
- Don't restart neutron-ovs-cleanup on RPM update (bsc#1132860)
-  Fix KeyError in OVS firewall (bsc#1131712, CVE-2019-10876)
- update to 1.11.20 (bsc#124991, CVE-2019-6975):
-  Memory exhaustion in ``django.utils.numberformat.format()``
-  Include ops-console logs if exist (bsc-1126912)
-  Add a sed pattern to censor passwords from servers.yml (bsc#1105559)
-  Show the status file of crowbar upgrade (if it exists)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-17"/>
	<updated date="2019-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1083721">SUSE bug 1083721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105559">SUSE bug 1105559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118003">SUSE bug 1118003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120932">SUSE bug 1120932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122875">SUSE bug 1122875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124170">SUSE bug 1124170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126391">SUSE bug 1126391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128753">SUSE bug 1128753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130593">SUSE bug 1130593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131712">SUSE bug 1131712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131791">SUSE bug 1131791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132542">SUSE bug 1132542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132852">SUSE bug 1132852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132860">SUSE bug 1132860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/124991">SUSE bug 124991</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14574/">CVE-2018-14574 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14574">CVE-2018-14574 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10876/">CVE-2019-10876 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10876">CVE-2019-10876 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3498/">CVE-2019-3498 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3498">CVE-2019-3498 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6975/">CVE-2019-6975 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6975">CVE-2019-6975 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596689" comment="ardana-ansible-8.0+git.1553878455.7439e04-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596690" comment="ardana-barbican-8.0+git.1534266594.8136db7-4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596691" comment="ardana-cassandra-8.0+git.1534266612.44dcb20-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596692" comment="ardana-ceilometer-8.0+git.1534266629.0bb5d54-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596693" comment="ardana-cinder-8.0+git.1558619942.6bd075c-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596694" comment="ardana-cluster-8.0+git.1534266734.ec4822f-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596695" comment="ardana-cobbler-8.0+git.1550694449.df88054-3.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596696" comment="ardana-db-8.0+git.1555341117.d812d88-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596697" comment="ardana-designate-8.0+git.1558636763.f7f09ca-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596698" comment="ardana-freezer-8.0+git.1534266805.c9ea29b-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596699" comment="ardana-glance-8.0+git.1555450219.97789ac-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596700" comment="ardana-heat-8.0+git.1555450207.a7d3bfe-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596701" comment="ardana-horizon-8.0+git.1554732431.8f9dd50-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596702" comment="ardana-input-model-8.0+git.1557418274.fb273dd-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596703" comment="ardana-ironic-8.0+git.1534266893.1d69df7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596704" comment="ardana-keystone-8.0+git.1554915846.db23473-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596705" comment="ardana-logging-8.0+git.1544117621.1c9a954-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596706" comment="ardana-magnum-8.0+git.1555450198.c42dc52-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596707" comment="ardana-manila-8.0+git.1551748668.7427826-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596708" comment="ardana-memcached-8.0+git.1534266982.498c352-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596709" comment="ardana-monasca-8.0+git.1557856965.bde9eb2-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596710" comment="ardana-monasca-transform-8.0+git.1534267017.4bbecd9-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596711" comment="ardana-mq-8.0+git.1549882721.b2e8873-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596712" comment="ardana-neutron-8.0+git.1557523208.81aa1da-3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596713" comment="ardana-nova-8.0+git.1559253853.bb932ea-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596714" comment="ardana-octavia-8.0+git.1557523035.ab44613-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596715" comment="ardana-opsconsole-8.0+git.1534267103.829be13-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596716" comment="ardana-opsconsole-ui-8.0+git.1537201508.68c32e6-3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596717" comment="ardana-osconfig-8.0+git.1557503482.852ec24-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596718" comment="ardana-service-8.0+git.1551382173.a81d5e1-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596719" comment="ardana-service-ansible-8.0+git.1544119019.e68516a-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596720" comment="ardana-ses-8.0+git.1554912320.73ad306-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596721" comment="ardana-spark-8.0+git.1539709555.5b31c25-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596722" comment="ardana-swift-8.0+git.1551502730.f4d219d-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596723" comment="ardana-tempest-8.0+git.1557761054.b971c8f-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596724" comment="ardana-tls-8.0+git.1534267264.6b1e899-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596725" comment="documentation-suse-openstack-cloud-installation-8.20190521-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596726" comment="documentation-suse-openstack-cloud-operations-8.20190521-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596727" comment="documentation-suse-openstack-cloud-opsconsole-8.20190521-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596728" comment="documentation-suse-openstack-cloud-planning-8.20190521-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596729" comment="documentation-suse-openstack-cloud-security-8.20190521-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596730" comment="documentation-suse-openstack-cloud-supplement-8.20190521-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596731" comment="documentation-suse-openstack-cloud-upstream-admin-8.20190521-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596732" comment="documentation-suse-openstack-cloud-upstream-user-8.20190521-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596733" comment="documentation-suse-openstack-cloud-user-8.20190521-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596734" comment="openstack-aodh-5.1.1~dev7-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596735" comment="openstack-aodh-api-5.1.1~dev7-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596736" comment="openstack-aodh-doc-5.1.1~dev7-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596737" comment="openstack-aodh-evaluator-5.1.1~dev7-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596738" comment="openstack-aodh-expirer-5.1.1~dev7-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596739" comment="openstack-aodh-listener-5.1.1~dev7-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596740" comment="openstack-aodh-notifier-5.1.1~dev7-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596741" comment="openstack-barbican-5.0.2~dev3-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596742" comment="openstack-barbican-api-5.0.2~dev3-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596743" comment="openstack-barbican-doc-5.0.2~dev3-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596744" comment="openstack-barbican-keystone-listener-5.0.2~dev3-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596745" comment="openstack-barbican-retry-5.0.2~dev3-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596746" comment="openstack-barbican-worker-5.0.2~dev3-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596747" comment="openstack-ceilometer-9.0.8~dev7-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596748" comment="openstack-ceilometer-agent-central-9.0.8~dev7-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596749" comment="openstack-ceilometer-agent-compute-9.0.8~dev7-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596750" comment="openstack-ceilometer-agent-ipmi-9.0.8~dev7-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596751" comment="openstack-ceilometer-agent-notification-9.0.8~dev7-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596752" comment="openstack-ceilometer-api-9.0.8~dev7-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596753" comment="openstack-ceilometer-collector-9.0.8~dev7-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596754" comment="openstack-ceilometer-doc-9.0.8~dev7-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596755" comment="openstack-ceilometer-polling-9.0.8~dev7-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596756" comment="openstack-cinder-11.2.3~dev5-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596757" comment="openstack-cinder-api-11.2.3~dev5-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596758" comment="openstack-cinder-backup-11.2.3~dev5-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596759" comment="openstack-cinder-doc-11.2.3~dev5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596760" comment="openstack-cinder-scheduler-11.2.3~dev5-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596761" comment="openstack-cinder-volume-11.2.3~dev5-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596762" comment="openstack-dashboard-12.0.4~dev6-3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596763" comment="openstack-dashboard-theme-SUSE-2017.2+git.1554906711.9dbe79b-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596764" comment="openstack-designate-5.0.3~dev7-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596765" comment="openstack-designate-agent-5.0.3~dev7-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596766" comment="openstack-designate-api-5.0.3~dev7-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596767" comment="openstack-designate-central-5.0.3~dev7-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596768" comment="openstack-designate-doc-5.0.3~dev7-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596769" comment="openstack-designate-producer-5.0.3~dev7-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596770" comment="openstack-designate-sink-5.0.3~dev7-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596771" comment="openstack-designate-worker-5.0.3~dev7-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596772" comment="openstack-heat-9.0.8~dev3-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596773" comment="openstack-heat-api-9.0.8~dev3-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596774" comment="openstack-heat-api-cfn-9.0.8~dev3-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596775" comment="openstack-heat-api-cloudwatch-9.0.8~dev3-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596776" comment="openstack-heat-doc-9.0.8~dev3-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596777" comment="openstack-heat-engine-9.0.8~dev3-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596778" comment="openstack-heat-gbp-7.0.1~dev1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596779" comment="openstack-heat-plugin-heat_docker-9.0.8~dev3-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596780" comment="openstack-heat-test-9.0.8~dev3-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596781" comment="openstack-horizon-plugin-trove-ui-9.0.1~dev10-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596782" comment="openstack-ironic-9.1.8~dev5-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596783" comment="openstack-ironic-api-9.1.8~dev5-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596784" comment="openstack-ironic-conductor-9.1.8~dev5-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596785" comment="openstack-ironic-doc-9.1.8~dev5-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596786" comment="openstack-keystone-12.0.4~dev2-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596787" comment="openstack-keystone-doc-12.0.4~dev2-5.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596788" comment="openstack-monasca-agent-2.2.5~dev2-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596789" comment="openstack-monasca-api-2.2.1~dev26-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596790" comment="openstack-monasca-log-api-2.3.1~dev12-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596791" comment="openstack-neutron-11.0.9~dev28-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596792" comment="openstack-neutron-dhcp-agent-11.0.9~dev28-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596793" comment="openstack-neutron-doc-11.0.9~dev28-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596794" comment="openstack-neutron-fwaas-11.0.3~dev1-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596795" comment="openstack-neutron-fwaas-doc-11.0.3~dev1-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596796" comment="openstack-neutron-gbp-7.3.1~dev28-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596797" comment="openstack-neutron-ha-tool-11.0.9~dev28-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596798" comment="openstack-neutron-l3-agent-11.0.9~dev28-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596799" comment="openstack-neutron-lbaas-11.0.4~dev6-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596800" comment="openstack-neutron-lbaas-agent-11.0.4~dev6-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596801" comment="openstack-neutron-lbaas-doc-11.0.4~dev6-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596802" comment="openstack-neutron-linuxbridge-agent-11.0.9~dev28-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596803" comment="openstack-neutron-macvtap-agent-11.0.9~dev28-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596804" comment="openstack-neutron-metadata-agent-11.0.9~dev28-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596805" comment="openstack-neutron-metering-agent-11.0.9~dev28-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596806" comment="openstack-neutron-openvswitch-agent-11.0.9~dev28-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596807" comment="openstack-neutron-server-11.0.9~dev28-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596808" comment="openstack-neutron-vpn-agent-11.0.1~dev5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596809" comment="openstack-neutron-vpnaas-11.0.1~dev5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596810" comment="openstack-neutron-vpnaas-doc-11.0.1~dev5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596811" comment="openstack-neutron-vyatta-agent-11.0.1~dev5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596812" comment="openstack-nova-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596813" comment="openstack-nova-api-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596814" comment="openstack-nova-cells-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596815" comment="openstack-nova-compute-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596816" comment="openstack-nova-conductor-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596817" comment="openstack-nova-console-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596818" comment="openstack-nova-consoleauth-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596819" comment="openstack-nova-doc-16.1.9~dev3-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596820" comment="openstack-nova-novncproxy-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596821" comment="openstack-nova-placement-api-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596822" comment="openstack-nova-scheduler-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596823" comment="openstack-nova-serialproxy-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596824" comment="openstack-nova-vncproxy-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596825" comment="openstack-trove-8.0.1~dev13-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596826" comment="openstack-trove-api-8.0.1~dev13-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596827" comment="openstack-trove-conductor-8.0.1~dev13-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596828" comment="openstack-trove-doc-8.0.1~dev13-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596829" comment="openstack-trove-guestagent-8.0.1~dev13-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596830" comment="openstack-trove-taskmanager-8.0.1~dev13-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596831" comment="python-Django-1.11.20-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596832" comment="python-aodh-5.1.1~dev7-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596833" comment="python-ardana-configurationprocessor-8.0+git.1534266236.fb1623c-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596834" comment="python-barbican-5.0.2~dev3-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596835" comment="python-ceilometer-9.0.8~dev7-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596836" comment="python-cinder-11.2.3~dev5-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596837" comment="python-cinderlm-0.0.2+git.1541444073.4d3347c-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596838" comment="python-cliff-2.8.3-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596839" comment="python-designate-5.0.3~dev7-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596840" comment="python-freezerclient-1.5.1-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596841" comment="python-freezerclient-doc-1.5.1-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596842" comment="python-heat-9.0.8~dev3-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596843" comment="python-heat-gbp-7.0.1~dev1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596844" comment="python-horizon-12.0.4~dev6-3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596845" comment="python-horizon-plugin-trove-ui-9.0.1~dev10-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596846" comment="python-ironic-9.1.8~dev5-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596847" comment="python-ironicclient-1.17.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596848" comment="python-ironicclient-doc-1.17.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596849" comment="python-keystone-12.0.4~dev2-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596850" comment="python-magnumclient-2.7.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596851" comment="python-magnumclient-doc-2.7.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596852" comment="python-manilaclient-1.17.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596853" comment="python-manilaclient-doc-1.17.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596854" comment="python-monasca-agent-2.2.5~dev2-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596855" comment="python-monasca-api-2.2.1~dev26-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596856" comment="python-monasca-log-api-2.3.1~dev12-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596857" comment="python-muranoclient-0.14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596858" comment="python-muranoclient-doc-0.14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596859" comment="python-neutron-11.0.9~dev28-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596860" comment="python-neutron-fwaas-11.0.3~dev1-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596861" comment="python-neutron-gbp-7.3.1~dev28-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596862" comment="python-neutron-lbaas-11.0.4~dev6-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596863" comment="python-neutron-vpnaas-11.0.1~dev5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596864" comment="python-nova-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596865" comment="python-novaclient-9.1.3-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596866" comment="python-novaclient-doc-9.1.3-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596867" comment="python-openstackclient-3.12.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596868" comment="python-os-brick-1.15.9-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596869" comment="python-os-client-config-1.28.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596870" comment="python-os-vif-1.7.2-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596871" comment="python-os-win-2.2.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596872" comment="python-oslo.cache-1.25.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596873" comment="python-oslo.concurrency-3.21.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596874" comment="python-oslo.config-4.11.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596875" comment="python-oslo.config-doc-4.11.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596876" comment="python-oslo.i18n-3.17.2-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596877" comment="python-oslo.log-3.30.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596878" comment="python-oslo.messaging-5.30.8-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596879" comment="python-oslo.middleware-3.30.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596880" comment="python-oslo.policy-1.25.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596881" comment="python-oslo.privsep-1.22.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596882" comment="python-oslo.reports-1.22.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596883" comment="python-oslo.utils-3.28.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596884" comment="python-oslo.versionedobjects-1.26.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596885" comment="python-oslo.vmware-2.23.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596886" comment="python-oslotest-2.17.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596887" comment="python-python-subunit-1.2.0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596888" comment="python-saharaclient-1.3.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596889" comment="python-saharaclient-doc-1.3.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596890" comment="python-swiftclient-3.4.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596891" comment="python-swiftclient-doc-3.4.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596892" comment="python-trove-8.0.1~dev13-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596893" comment="python-zaqarclient-1.7.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596894" comment="supportutils-plugin-suse-openstack-cloud-8.0.1551262227.7a7deb6-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596895" comment="venv-openstack-aodh-x86_64-5.1.1~dev7-12.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596896" comment="venv-openstack-barbican-x86_64-5.0.2~dev3-12.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596897" comment="venv-openstack-ceilometer-x86_64-9.0.8~dev7-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596898" comment="venv-openstack-cinder-x86_64-11.2.3~dev5-14.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596899" comment="venv-openstack-designate-x86_64-5.0.3~dev7-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596900" comment="venv-openstack-freezer-x86_64-5.0.0.0~xrc2~dev2-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596901" comment="venv-openstack-glance-x86_64-15.0.2~dev9-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596902" comment="venv-openstack-heat-x86_64-9.0.8~dev3-12.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596903" comment="venv-openstack-horizon-x86_64-12.0.4~dev6-14.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596904" comment="venv-openstack-ironic-x86_64-9.1.8~dev5-12.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596905" comment="venv-openstack-keystone-x86_64-12.0.4~dev2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596906" comment="venv-openstack-magnum-x86_64-5.0.2-11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596907" comment="venv-openstack-manila-x86_64-5.0.4~dev17-12.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596908" comment="venv-openstack-monasca-ceilometer-x86_64-1.5.1-8.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596909" comment="venv-openstack-monasca-x86_64-2.2.1-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596910" comment="venv-openstack-murano-x86_64-4.0.1-12.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596911" comment="venv-openstack-neutron-x86_64-11.0.2-13.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596912" comment="venv-openstack-nova-x86_64-16.1.9~dev3-11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596913" comment="venv-openstack-octavia-x86_64-1.0.5~dev1-12.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596914" comment="venv-openstack-sahara-x86_64-7.0.4~dev1-11.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596915" comment="venv-openstack-swift-x86_64-2.15.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596916" comment="venv-openstack-trove-x86_64-8.0.1~dev13-11.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148162" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

---- updated platforms ------------------------------------
SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061d-&gt;0000061f Xeon E3/E5, Core X
SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000714-&gt;00000718 Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148163" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="985657" ref_url="https://bugzilla.suse.com/985657" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005739.html" source="SUSE-SU"/>
		<description>
This update for bzip2 fixes the following issues:

Security issue fixed:

- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1139083).
- CVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985657">SUSE bug 985657</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3189">CVE-2016-3189 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521995" comment="bzip2-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530594" comment="bzip2-doc-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521996" comment="libbz2-1-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521997" comment="libbz2-1-32bit-1.0.6-30.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148164" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1127223" ref_url="https://bugzilla.suse.com/1127223" source="BUGZILLA"/>
		<reference ref_id="1127308" ref_url="https://bugzilla.suse.com/1127308" source="BUGZILLA"/>
		<reference ref_id="1128574" ref_url="https://bugzilla.suse.com/1128574" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155/" source="CVE"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005745.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2019-9169: Fixed a heap-based buffer over-read via an attempted case-insensitive regular-expression match (bsc#1127308).
- CVE-2009-5155: Fixed a denial of service in parse_reg_exp() (bsc#1127223).

Non-security issues fixed:

- Added cfi information for start routines in order to stop unwinding on S390 (bsc#1128574).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127223">SUSE bug 1127223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127308">SUSE bug 1127308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128574">SUSE bug 1128574</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-5155">CVE-2009-5155 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9169">CVE-2019-9169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530595" comment="glibc-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530596" comment="glibc-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530597" comment="glibc-devel-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530598" comment="glibc-devel-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530599" comment="glibc-html-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530600" comment="glibc-i18ndata-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530601" comment="glibc-info-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530602" comment="glibc-locale-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530603" comment="glibc-locale-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530604" comment="glibc-profile-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530605" comment="glibc-profile-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530606" comment="nscd-2.22-62.22.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148165" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp, zypper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1109893" ref_url="https://bugzilla.suse.com/1109893" source="BUGZILLA"/>
		<reference ref_id="1110542" ref_url="https://bugzilla.suse.com/1110542" source="BUGZILLA"/>
		<reference ref_id="1111319" ref_url="https://bugzilla.suse.com/1111319" source="BUGZILLA"/>
		<reference ref_id="1112911" ref_url="https://bugzilla.suse.com/1112911" source="BUGZILLA"/>
		<reference ref_id="1113296" ref_url="https://bugzilla.suse.com/1113296" source="BUGZILLA"/>
		<reference ref_id="1120629" ref_url="https://bugzilla.suse.com/1120629" source="BUGZILLA"/>
		<reference ref_id="1120630" ref_url="https://bugzilla.suse.com/1120630" source="BUGZILLA"/>
		<reference ref_id="1120631" ref_url="https://bugzilla.suse.com/1120631" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1131823" ref_url="https://bugzilla.suse.com/1131823" source="BUGZILLA"/>
		<reference ref_id="1134226" ref_url="https://bugzilla.suse.com/1134226" source="BUGZILLA"/>
		<reference ref_id="1137977" ref_url="https://bugzilla.suse.com/1137977" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005752.html" source="SUSE-SU"/>
		<description>
This update for libsolv, libzypp and zypper fixes the following issues:

libsolv was updated to version 0.6.36 fixes the following issues:

Security issues fixed:

- CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629).
- CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630).
- CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631).

Non-security issues fixed:

- Made cleandeps jobs on patterns work (bsc#1137977).
- Fixed an issue multiversion packages that obsolete their own name (bsc#1127155).
- Keep consistent package name if there are multiple alternatives (bsc#1131823).

libzypp received following fixes:

- Fixes a bug where locking the kernel was not possible (bsc#1113296)

zypper received following fixes:

- Fixes a bug where the wrong exit code was set when refreshing
  repos if --root was used (bsc#1134226)
- Improved the displaying of locks (bsc#1112911)
- Fixes an issue where `https` repository urls caused an error prompt to
   appear twice (bsc#1110542)
- zypper will now always warn when no repositories are defined (bsc#1109893)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-25"/>
	<updated date="2019-07-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109893">SUSE bug 1109893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110542">SUSE bug 1110542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111319">SUSE bug 1111319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112911">SUSE bug 1112911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113296">SUSE bug 1113296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131823">SUSE bug 1131823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134226">SUSE bug 1134226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137977">SUSE bug 1137977</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20532">CVE-2018-20532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20533">CVE-2018-20533 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20534">CVE-2018-20534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522010" comment="libsolv-tools-0.6.36-2.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522011" comment="libzypp-16.20.0-2.39.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557323" comment="perl-solv-0.6.36-2.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522012" comment="python-solv-0.6.36-2.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522013" comment="zypper-1.13.51-21.26.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522014" comment="zypper-log-1.13.51-21.26.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148166" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005756.html" source="SUSE-SU"/>
		<description>
This update for bzip2 fixes the following issues:

- Fixed a regression with the fix for CVE-2019-12900, which caused incompatibilities
  with files that used many selectors (bsc#1139083).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-29"/>
	<updated date="2019-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522027" comment="bzip2-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530613" comment="bzip2-doc-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522028" comment="libbz2-1-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522029" comment="libbz2-1-32bit-1.0.6-30.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148167" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1121826" ref_url="https://bugzilla.suse.com/1121826" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005768.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2019-6133: Fixed improper caching of auth decisions, which could bypass 
  uid checking in the interactive backend (bsc#1121826).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-01"/>
	<updated date="2019-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6133">CVE-2019-6133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522035" comment="libpolkit0-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522037" comment="polkit-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522038" comment="typelib-1_0-Polkit-1_0-0.113-5.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148168" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1115375" ref_url="https://bugzilla.suse.com/1115375" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141784" ref_url="https://bugzilla.suse.com/1141784" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141786" ref_url="https://bugzilla.suse.com/1141786" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2842" ref_url="https://www.suse.com/security/cve/CVE-2019-2842/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u222 fixes the following issues:

Security issues fixed:

- CVE-2019-2745: Improved ECC Implementation (bsc#1141784).
- CVE-2019-2762: Exceptional throw cases (bsc#1141782).
- CVE-2019-2766: Improve file protocol handling (bsc#1141789).
- CVE-2019-2769: Better copies of CopiesList (bsc#1141783).
- CVE-2019-2786: More limited privilege usage (bsc#1141787).
- CVE-2019-2816: Normalize normalization (bsc#1141785).
- CVE-2019-2842: Extended AES support (bsc#1141786).
- CVE-2019-7317: Improve PNG support (bsc#1141780).
- Certificate validation improvements

Non-security issue fixed:

- Fixed an issue where the installation failed when the manpages are not present (bsc#1115375)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-01"/>
	<updated date="2019-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115375">SUSE bug 1115375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141784">SUSE bug 1141784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141786">SUSE bug 1141786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2745">CVE-2019-2745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2786">CVE-2019-2786 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2842/">CVE-2019-2842 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2842">CVE-2019-2842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530614" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530615" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148169" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="1101676" ref_url="https://bugzilla.suse.com/1101676" source="BUGZILLA"/>
		<reference ref_id="1101677" ref_url="https://bugzilla.suse.com/1101677" source="BUGZILLA"/>
		<reference ref_id="1101678" ref_url="https://bugzilla.suse.com/1101678" source="BUGZILLA"/>
		<reference ref_id="1103342" ref_url="https://bugzilla.suse.com/1103342" source="BUGZILLA"/>
		<reference ref_id="1112368" ref_url="https://bugzilla.suse.com/1112368" source="BUGZILLA"/>
		<reference ref_id="1112397" ref_url="https://bugzilla.suse.com/1112397" source="BUGZILLA"/>
		<reference ref_id="1112417" ref_url="https://bugzilla.suse.com/1112417" source="BUGZILLA"/>
		<reference ref_id="1112421" ref_url="https://bugzilla.suse.com/1112421" source="BUGZILLA"/>
		<reference ref_id="1112432" ref_url="https://bugzilla.suse.com/1112432" source="BUGZILLA"/>
		<reference ref_id="1116686" ref_url="https://bugzilla.suse.com/1116686" source="BUGZILLA"/>
		<reference ref_id="1118754" ref_url="https://bugzilla.suse.com/1118754" source="BUGZILLA"/>
		<reference ref_id="1132666" ref_url="https://bugzilla.suse.com/1132666" source="BUGZILLA"/>
		<reference ref_id="1136037" ref_url="https://bugzilla.suse.com/1136037" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063/" source="CVE"/>
		<reference ref_id="CVE-2018-3064" ref_url="https://www.suse.com/security/cve/CVE-2018-3064/" source="CVE"/>
		<reference ref_id="CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066/" source="CVE"/>
		<reference ref_id="CVE-2018-3143" ref_url="https://www.suse.com/security/cve/CVE-2018-3143/" source="CVE"/>
		<reference ref_id="CVE-2018-3156" ref_url="https://www.suse.com/security/cve/CVE-2018-3156/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3251" ref_url="https://www.suse.com/security/cve/CVE-2018-3251/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="CVE-2019-2529" ref_url="https://www.suse.com/security/cve/CVE-2019-2529/" source="CVE"/>
		<reference ref_id="CVE-2019-2537" ref_url="https://www.suse.com/security/cve/CVE-2019-2537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Update to MariaDB 10.0.38 GA (bsc#1136037).

Security issues fixed:

- CVE-2019-2537: Denial of service via multiple protocols (bsc#1136037)
- CVE-2019-2529: Denial of service via multiple protocols (bsc#1136037)
- CVE-2018-3282: Server Storage Engines unspecified vulnerability (CPU Oct 2018) (bsc#1112432)
- CVE-2018-3251: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112397)
- CVE-2018-3174: Client programs unspecified vulnerability (CPU Oct 2018) (bsc#1112368)
- CVE-2018-3156: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112417)
- CVE-2018-3143: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112421)
- CVE-2018-3066: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent Server Options). (bsc#1101678)
- CVE-2018-3064: InnoDB unspecified vulnerability (CPU Jul 2018) (bsc#1103342)
- CVE-2018-3063: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent Server Security Privileges). (bsc#1101677)
- CVE-2018-3058: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent MyISAM). (bsc#1101676)
- CVE-2016-9843: Big-endian out-of-bounds pointer (bsc#1013882)

Non-security changes:

- Removed PerconaFT from the package as it has AGPL licence (bsc#1118754).
- Do not just remove tokudb plugin but don't build it at all (missing jemalloc dependency).
- Fixed reading options for multiple instances if my${INSTANCE}.cnf is used (bsc#1132666).
- Removed 'umask 077' from mysql-systemd-helper that caused new datadirs created 
  with wrong permissions (bsc#1132666).

Release notes and changelog:

- https://kb.askmonty.org/en/mariadb-10038-release-notes
- https://kb.askmonty.org/en/mariadb-10038-changelog
- https://kb.askmonty.org/en/mariadb-10037-release-notes
- https://kb.askmonty.org/en/mariadb-10037-changelog
- https://kb.askmonty.org/en/mariadb-10036-release-notes
- https://kb.askmonty.org/en/mariadb-10036-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-05"/>
	<updated date="2019-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101676">SUSE bug 1101676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101677">SUSE bug 1101677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101678">SUSE bug 1101678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103342">SUSE bug 1103342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112368">SUSE bug 1112368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112397">SUSE bug 1112397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112417">SUSE bug 1112417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112421">SUSE bug 1112421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112432">SUSE bug 1112432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118754">SUSE bug 1118754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132666">SUSE bug 1132666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136037">SUSE bug 1136037</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3058">CVE-2018-3058 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3063">CVE-2018-3063 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3064/">CVE-2018-3064 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3064">CVE-2018-3064 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3066">CVE-2018-3066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3143/">CVE-2018-3143 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3143">CVE-2018-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3156/">CVE-2018-3156 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3156">CVE-2018-3156 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3174">CVE-2018-3174 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3251/">CVE-2018-3251 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3251">CVE-2018-3251 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3282">CVE-2018-3282 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2529/">CVE-2019-2529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2529">CVE-2019-2529 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2537/">CVE-2019-2537 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2537">CVE-2019-2537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530616" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148170" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1109663" ref_url="https://bugzilla.suse.com/1109663" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005780.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-14647: Fixed a denial of service vulnerability caused by a crafted XML document (bsc#1109847).
- CVE-2018-1000802: Fixed a command injection in the shutil module (bsc#1109663).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-06"/>
	<updated date="2019-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000802">CVE-2018-1000802 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522041" comment="libpython3_4m1_0-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522042" comment="python3-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522043" comment="python3-base-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522044" comment="python3-curses-3.4.6-25.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148171" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1137825" ref_url="https://bugzilla.suse.com/1137825" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12387" ref_url="https://www.suse.com/security/cve/CVE-2019-12387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005784.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issue:

Security issue fixed: 	  

- CVE-2019-12387: Fixed an improper sanitization of URIs or HTTP which could have allowed 
  attackers to perfrom CRLF attacks (bsc#1137825).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-06"/>
	<updated date="2019-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1137825">SUSE bug 1137825</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12387/">CVE-2019-12387 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12387">CVE-2019-12387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596917" comment="python-Twisted-15.2.1-9.5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148172" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1133037" ref_url="https://bugzilla.suse.com/1133037" source="BUGZILLA"/>
		<reference ref_id="1141619" ref_url="https://bugzilla.suse.com/1141619" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005797.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issues:

Security issues fixed: 	  

- CVE-2019-11459: Fixed an improper error handling in which could have led to use of uninitialized use of memory (bsc#1133037).
- CVE-2019-1010006: Fixed a buffer overflow in backend/tiff/tiff-document.c (bsc#1141619).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-07"/>
	<updated date="2019-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141619">SUSE bug 1141619</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010006">CVE-2019-1010006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11459">CVE-2019-11459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522052" comment="evince-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522053" comment="evince-browser-plugin-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522054" comment="evince-lang-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522055" comment="evince-plugin-djvudocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522056" comment="evince-plugin-dvidocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522057" comment="evince-plugin-pdfdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522058" comment="evince-plugin-psdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522059" comment="evince-plugin-tiffdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522060" comment="evince-plugin-xpsdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522061" comment="libevdocument3-4-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522062" comment="libevview3-3-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522063" comment="nautilus-evince-3.20.2-6.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148173" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1140738" ref_url="https://bugzilla.suse.com/1140738" source="BUGZILLA"/>
		<reference ref_id="1141329" ref_url="https://bugzilla.suse.com/1141329" source="BUGZILLA"/>
		<reference ref_id="1141332" ref_url="https://bugzilla.suse.com/1141332" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525/" source="CVE"/>
		<reference ref_id="CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529/" source="CVE"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005801.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

Security issue fixed:

- CVE-2019-12529: Fixed a potential denial of service associated with HTTP Basic Authentication credentials (bsc#1141329).
- CVE-2019-12525: Fixed a denial of service during processing of HTTP Digest Authentication credentials (bsc#1141332).
- CVE-2019-13345: Fixed a cross site scripting vulnerability via user_name or auth parameter in cachemgr.cgi (bsc#1140738).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-08"/>
	<updated date="2019-08-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141329">SUSE bug 1141329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141332">SUSE bug 1141332</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12525">CVE-2019-12525 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12529">CVE-2019-12529 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13345">CVE-2019-13345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530622" comment="squid-3.5.21-26.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148174" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005803.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-20852: Fixed an information leak where cookies could be send to the wrong server because of incorrect domain validation (bsc#1141853).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-23"/>
	<updated date="2019-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522067" comment="libpython2_7-1_0-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522068" comment="libpython2_7-1_0-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522069" comment="python-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530623" comment="python-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522070" comment="python-base-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530624" comment="python-base-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522071" comment="python-curses-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530625" comment="python-demo-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522072" comment="python-devel-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530626" comment="python-doc-2.7.13-28.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530627" comment="python-doc-pdf-2.7.13-28.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530628" comment="python-gdbm-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530629" comment="python-idle-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522073" comment="python-tk-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522074" comment="python-xml-2.7.13-28.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148175" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005834.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:                    
                                                                                          
Security issue fixed:                                                                                 
                                                                                  
- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-10208">CVE-2019-10208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530671" comment="postgresql96-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530672" comment="postgresql96-contrib-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530673" comment="postgresql96-docs-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530674" comment="postgresql96-plperl-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530675" comment="postgresql96-plpython-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530676" comment="postgresql96-pltcl-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530677" comment="postgresql96-server-9.6.15-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148176" version="1" class="patch">
	<metadata>
		<title>Security update for ardana-ansible, ardana-db, ardana-freezer, ardana-glance, ardana-input-model, ardana-nova, ardana-osconfig, ardana-tempest, caasp-openstack-heat-templates, crowbar-core, crowbar-ha, crowbar-openstack, crowbar-ui, documentation-suse-openstack-cloud, galera-python-clustercheck, openstack-cinder, openstack-glance, openstack-heat, openstack-horizon-plugin-monasca-ui, openstack-horizon-plugin-neutron-fwaas-ui, openstack-ironic, openstack-keystone, openstack-manila, openstack-monasca-agent, openstack-monasca-api, openstack-monasca-persister, openstack-monasca-persister-java, openstack-murano, openstack-neutron, openstack-neutron-gbp, openstack-neutron-lbaas, openstack-nova, openstack-octavia, python-Beaver, python-oslo.db, python-osprofiler, python-swiftlm, venv-openstack-magnum, venv-openstack-monasca, venv-openstack-monasca-ceilometer, venv-openstack-murano, venv-openstack-neutron (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1070500" ref_url="https://bugzilla.suse.com/1070500" source="BUGZILLA"/>
		<reference ref_id="1108818" ref_url="https://bugzilla.suse.com/1108818" source="BUGZILLA"/>
		<reference ref_id="1118159" ref_url="https://bugzilla.suse.com/1118159" source="BUGZILLA"/>
		<reference ref_id="1120657" ref_url="https://bugzilla.suse.com/1120657" source="BUGZILLA"/>
		<reference ref_id="1122053" ref_url="https://bugzilla.suse.com/1122053" source="BUGZILLA"/>
		<reference ref_id="1122825" ref_url="https://bugzilla.suse.com/1122825" source="BUGZILLA"/>
		<reference ref_id="1124170" ref_url="https://bugzilla.suse.com/1124170" source="BUGZILLA"/>
		<reference ref_id="1128382" ref_url="https://bugzilla.suse.com/1128382" source="BUGZILLA"/>
		<reference ref_id="1128453" ref_url="https://bugzilla.suse.com/1128453" source="BUGZILLA"/>
		<reference ref_id="1128783" ref_url="https://bugzilla.suse.com/1128783" source="BUGZILLA"/>
		<reference ref_id="1129729" ref_url="https://bugzilla.suse.com/1129729" source="BUGZILLA"/>
		<reference ref_id="1132654" ref_url="https://bugzilla.suse.com/1132654" source="BUGZILLA"/>
		<reference ref_id="1132852" ref_url="https://bugzilla.suse.com/1132852" source="BUGZILLA"/>
		<reference ref_id="1133719" ref_url="https://bugzilla.suse.com/1133719" source="BUGZILLA"/>
		<reference ref_id="1134495" ref_url="https://bugzilla.suse.com/1134495" source="BUGZILLA"/>
		<reference ref_id="1134589" ref_url="https://bugzilla.suse.com/1134589" source="BUGZILLA"/>
		<reference ref_id="1136569" ref_url="https://bugzilla.suse.com/1136569" source="BUGZILLA"/>
		<reference ref_id="1137377" ref_url="https://bugzilla.suse.com/1137377" source="BUGZILLA"/>
		<reference ref_id="1137817" ref_url="https://bugzilla.suse.com/1137817" source="BUGZILLA"/>
		<reference ref_id="1138124" ref_url="https://bugzilla.suse.com/1138124" source="BUGZILLA"/>
		<reference ref_id="1138187" ref_url="https://bugzilla.suse.com/1138187" source="BUGZILLA"/>
		<reference ref_id="1138489" ref_url="https://bugzilla.suse.com/1138489" source="BUGZILLA"/>
		<reference ref_id="1138967" ref_url="https://bugzilla.suse.com/1138967" source="BUGZILLA"/>
		<reference ref_id="1139750" ref_url="https://bugzilla.suse.com/1139750" source="BUGZILLA"/>
		<reference ref_id="1140512" ref_url="https://bugzilla.suse.com/1140512" source="BUGZILLA"/>
		<reference ref_id="1140663" ref_url="https://bugzilla.suse.com/1140663" source="BUGZILLA"/>
		<reference ref_id="1142032" ref_url="https://bugzilla.suse.com/1142032" source="BUGZILLA"/>
		<reference ref_id="1142521" ref_url="https://bugzilla.suse.com/1142521" source="BUGZILLA"/>
		<reference ref_id="1142686" ref_url="https://bugzilla.suse.com/1142686" source="BUGZILLA"/>
		<reference ref_id="1143310" ref_url="https://bugzilla.suse.com/1143310" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3448" ref_url="https://www.suse.com/security/cve/CVE-2015-3448/" source="CVE"/>
		<reference ref_id="CVE-2017-17051" ref_url="https://www.suse.com/security/cve/CVE-2017-17051/" source="CVE"/>
		<reference ref_id="CVE-2019-9735" ref_url="https://www.suse.com/security/cve/CVE-2019-9735/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005842.html" source="SUSE-SU"/>
		<description>
This update for ardana-ansible, ardana-db, ardana-freezer, ardana-glance, ardana-input-model, ardana-nova, ardana-osconfig, ardana-tempest, caasp-openstack-heat-templates, crowbar-core, crowbar-ha, crowbar-openstack, crowbar-ui, documentation-suse-openstack-cloud, galera-python-clustercheck, openstack-cinder, openstack-glance, openstack-heat, openstack-horizon-plugin-monasca-ui, openstack-horizon-plugin-neutron-fwaas-ui, openstack-ironic, openstack-keystone, openstack-manila, openstack-monasca-agent, openstack-monasca-api, openstack-monasca-persister, openstack-monasca-persister-java, openstack-murano, openstack-neutron, openstack-neutron-gbp, openstack-neutron-lbaas, openstack-nova, openstack-octavia, python-Beaver, python-oslo.db, python-osprofiler, python-swiftlm, venv-openstack-magnum, venv-openstack-monasca, venv-openstack-monasca-ceilometer, venv-openstack-murano, venv-openstack-neutron fixes the following issues:

- Update to version 8.0+git.1560208949.67048e3:
  * Adds repository list parameter (bsc#1122825)

- Update to version 8.0+git.1564410318.f0cca2c:
  * Don't use 'latest' with 'zypper' (SOC-9997)

- Update to version 8.0+git.1564164977.ef9baeb:
  * Freezer Config file is mixed case (SOC-9700)

- Update to version 8.0+git.1564491709.349d78e:
  * Default glance_default_store to rbd if SES enabled (SOC-8749)

- Update to version 8.0+git.1562848601.c3daff0:
  * Include memcached in the minimal ardana-ci model (SOC-9800)

- Update to version 8.0+git.1565388406.c6abb8d:
  * Make default/rpc_response_timeout configurable (SOC-9285)

- Update to version 8.0+git.1562943864.e04a92f:
  * Resolves nova-novncproxy random status failures (SOC-9574)

- Update to version 8.0+git.1560180700.bd26898:
  * Adding support for qemu-ovmf to ardana (SOC-8985)

- Update to version 8.0+git.1563383198.c7fd9b4:
  * Add an global_filter entry to lvm.conf  (bsc#1140512)

- Update to version 8.0+git.1559761021.5605746:
  * Enable FCOE for SUSE platform family (SCRD-8562)

- Update to version 8.0+git.1562849010.73bc517:
  * Fix Keystone only deployment tempest testing (SOC-9800)

- Update to version 8.0+git.1560764545.6c8d2dc:
  * Install manila tempest tests package (SOC-7496)

- Update to version 8.0+git.1560330843.b7d807c:
  * Add configuration for manila-tempest-plugin (SOC-7496)

- Update to version 1.0+git.1560518045.ad7dc6d:
  * Patching node before bootstraping

- Update to version 5.0+git.1565280360.01fed6905:
  * batch: Fix get_proposal_json (SOC-9954)
  * batch: Format crowbar batch error output (SOC-9954)
  * batch: Format crowbar batch error output (SOC-9954)

- Update to version 5.0+git.1564657662.75174c965:
  * travis: Whitelist CVE-2015-3448 (SOC-9911)
  * travis: Use env variable for commit range (SOC-9911)
  * Use proper names for the Travis Tests (SOC-9565)
  * Replace Danger with Gitlint (SOC-9565)
  * Switch from Travis dist from Trusty to Xenial (SOC-9565)

- Update to version 5.0+git.1563983933.03880f1c8:
  * dns: fix migration for designate

- Update to version 5.0+git.1562080799.f2dd7d0dd:
  * network: Don't set datapath-ids on ovs-bridges anymore
  * crowbar: Save sync_mark attributes in databag

- Update to version 5.0+git.1561648142.b6be652e9:
  * dns: forwards dns queries to dns-master when using desingate
  * dns: write admin network in ip/mask notation for bind9
  * dns: skip installing designate-rndc-key on non-master nodes
  * dns: fix designate migration
  * dns: allow using dns-server as designate target
  * bind: Allow new zones configured via rndc
  * bind: Disable listening on IPv6 addresses for now

- Update to version 5.0+git.1561465092.4dc67a7fa:
  * travis: pin sexp_processor to 4.12.0

- Update to version 5.0+git.1561380950.b4e37c0e2:
  * deployer: Use dhcp on crowbar_register only when enable_pxe is set (bsc#1132654)
  * network: Allow locking down the network config for nodes (bsc#1120657)

- Update to version 5.0+git.1562069707.e2de18c:
  * Add timeout multiplier
  * Make default sync_mark timeout configurable

- Update to version 5.0+git.1565270683.ea6e63d87:
  * designate: Use server node for VIP look ups (SOC-9631)

- Update to version 5.0+git.1565081678.e15f2c9a9:
  * nova: add max_threads_per_process tuneable (SOC-10001, bsc#1133719)

- Update to version 5.0+git.1562911219.f22efd5c2:
  * designate: allow worker on cluster (SOC-9632)
  * swift: Sync HA nodes (SOC-9683)

- Update to version 5.0+git.1562731577.aefaf8a6d:
  * Improve Mnesia IO performances

- Update to version 5.0+git.1562650331.0e86ce8ba:
  * cinder: Set cinder pool to exclusive by default when using embedded ceph

- Update to version 5.0+git.1561984197.a675e8c50:
  * designate: do not install the keystone_authtoken on worker nodes
  * neutron: enable designate integration
  * designate: rely on dns-master entirely
  * designate: Fix variables initialization in mdns
  * designate: start and run the mdns service
  * designate: Finish rename of role to designate-worker
  * designate: address most hound comments.
  * designate: update monasca monitoring.
  * neutron: add floating_dns_domain setting
  * designate: Add initial designate barclamp

- Update to version 5.0+git.1559857295.d68afb38f:
  * rabbitmq: Fix ACL of SSL key after uid/gid change

- Update to version 5.0+git.1559536094.a9cc7f312:
  * nova: Don't retry creating existing flavors

- Update to version 1.2.0+git.1563181545.65360af5:
  * upgrade: Update repocheck keys
  * Update texts for 8-9 upgrade (SOC-9689)

- Update to version 1.2.0+git.1562579063.5690a1bc:
  * Pin gulp-angular-templatecache version

- Update to version 8.20190805:
  * DC files: Align profiling, throw out unnecessary attributes
  * Rename DCs: 'hos-imported' to 'clm-all' &amp; '-all' to 'crowbar-all'
  * Fix styleroot of Helion set
  * add ardana prompt, add ardana-init step (bsc#1143310)
  * New ID format (noref)
- Update packaging to deal with new IDs

- Update to version 8.20190729:
  * add image-volume cache instructions for SES (bsc#1140663)

- Update to version 8.20190725:
  * warning about .j2 file comments (bsc#1142521)
  * MANAGEMENT network group name cannot be changed (bsc#1142686)

- Update to version 8.20190724:
  * replace SUSE ca-certificate instructions for Crowbar (bsc#1136569)
  * replace SUSE ca-certificate instructions (bsc#1136569)

- Update to version 8.20190723:
  * update MariaDB manually with CLI (bsc#1132852, SOC-9022)
  * clarify No Maintenance Mode (bsc#1108818)
  * replace empty ESX compatibility guide (noref)
  * delete cache volume before trying to use source volume (bsc#1142032)
  * delete cache volume when source volume is changed (bsc#1142032)
  * replace empty ESX compatibility guide (noref)

- Update to version 8.20190719:
  * add hostnamectl to ardana-update-pkgs process (bsc#1138967)

- Update to version 8.20190718:
  * correct repo URL (bsc#1134589)
  * remove duplicate content (bsc#1138489)

- Update to version 8.20190717:
  * corrections from Scott Wulf (bsc#1128453)
  * replace SLES 12 SP2 with SLES 12 SP3 (bsc#1128382)
  * add information about image-volume-cache (bsc#1140663)
  * remove deprecated parameters (bsc#1138124)
  * correct file reference (bsc#1137377)
  * change SES URL (bsc#1137817)
  * manually set br-int(bsc#1139750)
  * update MariaDB manually with CLI (bsc#1132852, SOC-9022)

- Update to version 8.20190717:
  * Fix DC file

- Update to version 8.20190621:
  * minor grammar fixups
  * add external reference to Deploy Keystone
  * add LDAP integration troubleshooting (bsc#1134495)
  * clarify LDAP manual vs GUI (bsc#1134495)
  * address requested changes
  * SOC8 alarm table restructure ((SCRD-7710, bsc#1124170)

- Update to version 8.20190620:
  * Update installation-installation-ses_integration.xml
  * Adding copy-on-write cloning backport - BSC#1138187
  * move fernet token to supported Keystone feature
  * Remove obsolete DC/DEF file
  * Fix title
  * CLM - update MariaDB manually (bsc#1132852, SOC-9022)
  * update MariaDB manually (bsc#1132852, SOC-9022)
  * Fix command to create external network
  * Remove sudo from commands in 'Setting Up Multiple External Networks'
  * address requested changes
  * SOC8 alarm table restructure ((SCRD-7710, bsc#1124170)
  * add scottwulf content
  * address recommended changes
  * change PTF deploy instructions (bsc#1128453)

- Update to version 8.20190613:
  * Update installation-installation-ses_integration.xml
  * Adding copy-on-write cloning backport - BSC#1138187

- Update to version 8.20190605:
  * move fernet token to supported Keystone feature

- Add 0001-Use-strings-when-setting-X-Cache-header.patch
  Fixes a problem with Twisted versions where headers values
  must be strings, not bools.

- Update to version 0.0+git.1562242499.36b8b64 (bsc#1122053):
  * Add optional systemd ready and watchdog support
  * Drop unneeded check for 'conn'
  * Reset last_query_response when the cache needs to be updated
  * Drop unneeded 'conn' var initialization
  * Move respone header generation to own function
  * Use None as default result
  * Drop opts.being_updated variable
  * Use contextmanager for DB connection
  * Refactor DB method to get WSREP local state
  * Refactor method to get readonly DB status
  * pep8: Fix E712 comparison to False should be 'if cond is False:'
  * pep8: Fix E305 expected 2 blank lines after class or function def
  * pep8: Fix E124 closing bracket does not match visual indentation
  * pep8: Fix E251 unexpected spaces around keyword / parameter equals
  * pep8: Fix E262 inline comment should start with '# '
  * pep8: Fix E261 at least two spaces before inline comment
  * pep8: Fix F841 local variable is assigned to but never used
  * pep8: Fix E302 expected 2 blank lines, found 1
  * pep8: Fix E265 block comment should start with '# '
  * pep8: Fix E231 missing whitespace after ','
  * pep8: Fix E999 SyntaxError: invalid syntax
  * pep8: Fix F821 undefined name
  * pep8: Fix E225 missing whitespace around operator
  * pep8: Fix E221 multiple spaces before operator
  * pep8: Fix F401 module imported but unused
  * Add clustercheck to console_scripts
  * Add basic test infrastructure and a first pep8 job
  * Fix exception handling for pymysql exception
  * Readd argparse usage
  * Fix installation requirements
  * Add read timeout to prevent connection hanging forever
  * Exclude benchmark/ directory when creating sdist tarball
  * Use argparse instead of optparse
  * Add basic logging infrastructure
  * Add a standard setup.py file
  * Catch all query exceptions
  * Switch to PyMySQL
- Drop pymysql.patch and readtimeout.patch. Both merged upstream.
- Use systemd service type=notify which is now supported upstream
- Use systemd watchdog which is now supported upstream

- Update to version cinder-11.2.3.dev7:
  * [VNX] Fix test case issue

- Update to version cinder-11.2.3.dev6:
  * VMAX Pike docs - clarifying supported software in Pike

- Update to version cinder-11.2.3.dev7:
  * [VNX] Fix test case issue

- Update to version cinder-11.2.3.dev6:
  * VMAX Pike docs - clarifying supported software in Pike

- Update to version glance-15.0.3.dev2:
  * Add a local bindep.txt override
  * OpenDev Migration Patch
  15.0.2

- Update to version glance-15.0.3.dev2:
  * Add a local bindep.txt override
  * OpenDev Migration Patch
  15.0.2

- Update to version heat-9.0.8.dev11:
  * Retry on DB deadlock in event\_create()

- Update to version heat-9.0.8.dev10:
  * Add local bindep.txt and limit bandit version

- Update to version heat-9.0.8.dev9:
  * Fix regression with SW deployments when region not configured
  * Return None for attributes of sd with no actions
  * Fix multi region issue for software deployment

- Update to version heat-9.0.8.dev4:
  * Blacklist bandit 1.6.0 and cap Sphinx on Python2

- Update to version heat-9.0.8.dev11:
  * Retry on DB deadlock in event\_create()

- Update to version heat-9.0.8.dev10:
  * Add local bindep.txt and limit bandit version

- Update to version heat-9.0.8.dev9:
  * Fix regression with SW deployments when region not configured
  * Return None for attributes of sd with no actions
  * Fix multi region issue for software deployment

- Update to version heat-9.0.8.dev4:
  * Blacklist bandit 1.6.0 and cap Sphinx on Python2

- update to version 1.8.1~dev39
  - Convert README.md to ReStructuredText format
  - OpenDev Migration Patch

- don't exclude *pyc files to fix update/upgrade (SOC-9339)

- Update to version ironic-9.1.8.dev7:
  * Add bindep.txt

- Update to version ironic-9.1.8.dev6:
  * Update sphinx requirements

- Update to version ironic-9.1.8.dev7:
  * Add bindep.txt

- Update to version ironic-9.1.8.dev6:
  * Update sphinx requirements

- 0001-Allow-domain-admin-to-list-projest-assignments.patch
  * bsc#1118159
  * forward-port from SOC 7

- Update to version manila-5.1.1.dev2:
  * [CI] Add bindep.txt
  * OpenDev Migration Patch
  5.1.0

- Update to version manila-5.1.1.dev2:
  * [CI] Add bindep.txt
  * OpenDev Migration Patch
  5.1.0

- update to version 2.2.5~dev5
  - Convert README to reStructuredText
  - OpenDev Migration Patch

- update to version 2.2.2~dev1
  - OpenDev Migration Patch
  - Fix test_metrics tempest-test encoding
  - Convert README.md to ReStructuredText format

- update to version 1.7.1~dev10
  - OpenDev Migration Patch
  - Convert README.md to ReStructuredTest format

- Add 0001-Update-all-columns-in-metrics-on-an-update-to-refres.patch (bsc#1128783)

- Add java-persister-defaults.patch
- Update to version murano-4.0.2.dev2:
  * Add local bindep.txt
  * OpenDev Migration Patch
  4.0.1

- Update to version murano-4.0.2.dev2:
  * Add local bindep.txt
  * OpenDev Migration Patch
  4.0.1

- Update to version neutron-11.0.9.dev42:
  * Yield control to other greenthreads while processing trusted ports

- Update to version neutron-11.0.9.dev41:
  * DVR: on new port only send router update on port's host

- Update to version neutron-11.0.9.dev40:
  * Reset MAC on unbinding direct-physical port

- Update to version neutron-11.0.9.dev38:
  * SRIOV agent: wait VFs initialization on embedded switch create

- Update to version neutron-11.0.9.dev36:
  * Make OVS controller inactivity\_probe configurable

- Update to version neutron-11.0.9.dev34:
  * Packets getting lost during SNAT with too many connections
  * [DVR] Block ARP to dvr router's port instead of subnet's gateway

- Update to version neutron-11.0.9.dev30:
  * improve dvr port update under large scale deployment

- Update to version neutron-11.0.9.dev29:
  * cap bandit in test-requirements.txt

- Update to version neutron-11.0.9.dev42:
  * Yield control to other greenthreads while processing trusted ports

- Update to version neutron-11.0.9.dev41:
  * DVR: on new port only send router update on port's host

- Update to version neutron-11.0.9.dev40:
  * Reset MAC on unbinding direct-physical port

- Update to version neutron-11.0.9.dev38:
  * SRIOV agent: wait VFs initialization on embedded switch create

- Update to version neutron-11.0.9.dev36:
  * Make OVS controller inactivity\_probe configurable

- Update to version neutron-11.0.9.dev34:
  * Packets getting lost during SNAT with too many connections
  * [DVR] Block ARP to dvr router's port instead of subnet's gateway

- Update to version neutron-11.0.9.dev30:
  * improve dvr port update under large scale deployment

- Update to version neutron-11.0.9.dev29:
  * cap bandit in test-requirements.txt

  * When converting sg rules to iptables, do not emit dport if not supported (CVE-2019-9735, bsc#1129729)
- Update to version group-based-policy-7.3.1.dev45:
  * Adding icmp\_code and icmp\_type for SG rule

- Update to version group-based-policy-7.3.1.dev43:
  * A VM could be associated with multiple ports
  * Optimize the extend\_router\_dict() call

- Update to version group-based-policy-7.3.1.dev40:
  * [AIM] Enhance gbp-validate to detect routed subnet overlap
  * [AIM] Prevent overlapping CIDRs in routed VRF

- Update to version group-based-policy-7.3.1.dev37:
  * Disallow external subnets as router interfaces
  * Make DHCP provisioning blocks conditional

- Update to version group-based-policy-7.3.1.dev34:
  * Fix issues on sync\_state display on neutron based on AIM status
  * Send the port updates for the SNAT case if needed

- Update to version group-based-policy-7.3.1.dev32:
  * Pull the upper constraint file also from the opendev.org site

- Update to version group-based-policy-7.3.1.dev31:
  * Fix the thread concurrency issue while calling gbp purge

- Update to version group-based-policy-7.3.1.dev30:
  * [AIM] Fix handling of missing PortSecurityBinding

- Update to version group-based-policy-7.3.1.dev29:
  * [AIM] Don't override loading of SG rules when validating

- add 0001-neutron-lbaas-haproxy-agent-prevent-vif-unplug-when-.patch
  and 0001-Fix-memory-leak-in-the-haproxy-provider-driver.patch

- Update to version nova-16.1.9.dev4:
  * Implement power\_off/power\_on for the FakeDriver

- Update to version nova-16.1.9.dev4:
  * Implement power\_off/power\_on for the FakeDriver

  * Fix doubling allocations on rebuild (CVE-2017-17051, bsc#1070500)
- Update to version octavia-1.0.6.dev2:
  * Add bindep.txt and ignore sha1 warning
  * OpenDev Migration Patch
  1.0.5

- Switch to new Gerrit Server

- added 0001-exc_filters-fix-deadlock-detection-for-MariaDB-Galer.patch

- added 0001-Add-sqlalchemy-collector.patch
- added 0001-Don-t-fail-if-sqlalchemy-driver-fails-to-initialize.patch
- update to version 1.11.1
  - Update .gitreview for stable/pike
  - import zuul job settings from project-config

- Switch to new Gerrit Server

- Fix lower version numver after inheriting the version from main
  component (SCRD-8523)

- Do not relocate shebang in make-cert.py (SCRD-8594)

- Inherit version number of venv from main component (SCRD-8523)

- Inherit version number of venv from main component (SCRD-8523)

- Fix lower version numver after inheriting the version from main
  component (SCRD-8523)

- Inherit version number of venv from main component (SCRD-8523)

- Inherit version number of venv from main component (SCRD-8523)

- Remove openstack-neutron-opflex-agent, python-aci-integration-module,
  python-acitoolkit, python-apicapi and python-networking-cisco as
  they pull in new requirements into the product

- Inherit version number of venv from main component (SCRD-8523)

- Added to the neutron virtual environment:
  * python-aci-integration-module
  * python-acitoolkit
  * python-apicapi
  * python-networking-cisco
  * openstack-neutron-gbp
  * openstack-neutron-opflex-agent

- Inherit version number of venv from main component (SCRD-8523)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-26"/>
	<updated date="2019-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1070500">SUSE bug 1070500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108818">SUSE bug 1108818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118159">SUSE bug 1118159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120657">SUSE bug 1120657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122053">SUSE bug 1122053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122825">SUSE bug 1122825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124170">SUSE bug 1124170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128382">SUSE bug 1128382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128453">SUSE bug 1128453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128783">SUSE bug 1128783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129729">SUSE bug 1129729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132654">SUSE bug 1132654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132852">SUSE bug 1132852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133719">SUSE bug 1133719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134495">SUSE bug 1134495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134589">SUSE bug 1134589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136569">SUSE bug 1136569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137377">SUSE bug 1137377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137817">SUSE bug 1137817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138124">SUSE bug 1138124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138187">SUSE bug 1138187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138489">SUSE bug 1138489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138967">SUSE bug 1138967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139750">SUSE bug 1139750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140512">SUSE bug 1140512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140663">SUSE bug 1140663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142032">SUSE bug 1142032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142521">SUSE bug 1142521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142686">SUSE bug 1142686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143310">SUSE bug 1143310</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3448/">CVE-2015-3448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3448">CVE-2015-3448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17051/">CVE-2017-17051 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17051">CVE-2017-17051 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9735/">CVE-2019-9735 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9735">CVE-2019-9735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596918" comment="ardana-ansible-8.0+git.1560208949.67048e3-3.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596919" comment="ardana-db-8.0+git.1564410318.f0cca2c-3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596920" comment="ardana-freezer-8.0+git.1564164977.ef9baeb-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596921" comment="ardana-glance-8.0+git.1564491709.349d78e-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596922" comment="ardana-input-model-8.0+git.1562848601.c3daff0-3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596923" comment="ardana-nova-8.0+git.1565388406.c6abb8d-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596924" comment="ardana-osconfig-8.0+git.1563383198.c7fd9b4-3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596925" comment="ardana-swiftlm-drive-provision-8.0+git.1541434883.e0ebe69-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596926" comment="ardana-swiftlm-log-tailer-8.0+git.1541434883.e0ebe69-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596927" comment="ardana-swiftlm-uptime-mon-8.0+git.1541434883.e0ebe69-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596928" comment="ardana-tempest-8.0+git.1562849010.73bc517-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596929" comment="caasp-openstack-heat-templates-1.0+git.1560518045.ad7dc6d-4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596930" comment="documentation-suse-openstack-cloud-installation-8.20190805-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596931" comment="documentation-suse-openstack-cloud-operations-8.20190805-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596932" comment="documentation-suse-openstack-cloud-opsconsole-8.20190805-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596933" comment="documentation-suse-openstack-cloud-planning-8.20190805-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596934" comment="documentation-suse-openstack-cloud-security-8.20190805-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596935" comment="documentation-suse-openstack-cloud-supplement-8.20190805-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596936" comment="documentation-suse-openstack-cloud-upstream-admin-8.20190805-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596937" comment="documentation-suse-openstack-cloud-upstream-user-8.20190805-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596938" comment="documentation-suse-openstack-cloud-user-8.20190805-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596939" comment="galera-python-clustercheck-0.0+git.1562242499.36b8b64-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596940" comment="grafana-monasca-ui-drilldown-1.8.1~dev39-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596941" comment="openstack-cinder-11.2.3~dev7-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596942" comment="openstack-cinder-api-11.2.3~dev7-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596943" comment="openstack-cinder-backup-11.2.3~dev7-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596944" comment="openstack-cinder-doc-11.2.3~dev7-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596945" comment="openstack-cinder-scheduler-11.2.3~dev7-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596946" comment="openstack-cinder-volume-11.2.3~dev7-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596947" comment="openstack-glance-15.0.3~dev2-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596948" comment="openstack-glance-api-15.0.3~dev2-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596949" comment="openstack-glance-doc-15.0.3~dev2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596950" comment="openstack-glance-registry-15.0.3~dev2-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596951" comment="openstack-heat-9.0.8~dev11-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596952" comment="openstack-heat-api-9.0.8~dev11-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596953" comment="openstack-heat-api-cfn-9.0.8~dev11-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596954" comment="openstack-heat-api-cloudwatch-9.0.8~dev11-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596955" comment="openstack-heat-doc-9.0.8~dev11-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596956" comment="openstack-heat-engine-9.0.8~dev11-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596957" comment="openstack-heat-plugin-heat_docker-9.0.8~dev11-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596958" comment="openstack-heat-test-9.0.8~dev11-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596959" comment="openstack-horizon-plugin-monasca-ui-1.8.1~dev39-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596960" comment="openstack-horizon-plugin-neutron-fwaas-ui-1.0.1~dev9-4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596961" comment="openstack-ironic-9.1.8~dev7-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596962" comment="openstack-ironic-api-9.1.8~dev7-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596963" comment="openstack-ironic-conductor-9.1.8~dev7-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596964" comment="openstack-ironic-doc-9.1.8~dev7-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596965" comment="openstack-keystone-12.0.4~dev2-5.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596966" comment="openstack-keystone-doc-12.0.4~dev2-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596967" comment="openstack-manila-5.1.1~dev2-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596968" comment="openstack-manila-api-5.1.1~dev2-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596969" comment="openstack-manila-data-5.1.1~dev2-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596970" comment="openstack-manila-doc-5.1.1~dev2-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596971" comment="openstack-manila-scheduler-5.1.1~dev2-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596972" comment="openstack-manila-share-5.1.1~dev2-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596973" comment="openstack-monasca-agent-2.2.5~dev5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596974" comment="openstack-monasca-api-2.2.2~dev1-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596975" comment="openstack-monasca-persister-1.7.1~dev10-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596976" comment="openstack-monasca-persister-java-1.7.1~a0~dev2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596977" comment="openstack-murano-4.0.2~dev2-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596978" comment="openstack-murano-api-4.0.2~dev2-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596979" comment="openstack-murano-doc-4.0.2~dev2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596980" comment="openstack-murano-engine-4.0.2~dev2-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596981" comment="openstack-neutron-11.0.9~dev42-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596982" comment="openstack-neutron-dhcp-agent-11.0.9~dev42-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596983" comment="openstack-neutron-doc-11.0.9~dev42-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596984" comment="openstack-neutron-gbp-7.3.1~dev45-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596985" comment="openstack-neutron-ha-tool-11.0.9~dev42-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596986" comment="openstack-neutron-l3-agent-11.0.9~dev42-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596987" comment="openstack-neutron-lbaas-11.0.4~dev6-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596988" comment="openstack-neutron-lbaas-agent-11.0.4~dev6-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596989" comment="openstack-neutron-lbaas-doc-11.0.4~dev6-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596990" comment="openstack-neutron-linuxbridge-agent-11.0.9~dev42-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596991" comment="openstack-neutron-macvtap-agent-11.0.9~dev42-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596992" comment="openstack-neutron-metadata-agent-11.0.9~dev42-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596993" comment="openstack-neutron-metering-agent-11.0.9~dev42-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596994" comment="openstack-neutron-openvswitch-agent-11.0.9~dev42-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596995" comment="openstack-neutron-server-11.0.9~dev42-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596996" comment="openstack-nova-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596997" comment="openstack-nova-api-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596998" comment="openstack-nova-cells-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596999" comment="openstack-nova-compute-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597000" comment="openstack-nova-conductor-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597001" comment="openstack-nova-console-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597002" comment="openstack-nova-consoleauth-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597003" comment="openstack-nova-doc-16.1.9~dev4-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597004" comment="openstack-nova-novncproxy-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597005" comment="openstack-nova-placement-api-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597006" comment="openstack-nova-scheduler-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597007" comment="openstack-nova-serialproxy-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597008" comment="openstack-nova-vncproxy-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597009" comment="openstack-octavia-1.0.6~dev2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597010" comment="openstack-octavia-amphora-agent-1.0.6~dev2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597011" comment="openstack-octavia-api-1.0.6~dev2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597012" comment="openstack-octavia-health-manager-1.0.6~dev2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597013" comment="openstack-octavia-housekeeping-1.0.6~dev2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597014" comment="openstack-octavia-worker-1.0.6~dev2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597015" comment="python-Beaver-8.0+git.1502900605.3e0068a-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597016" comment="python-cinder-11.2.3~dev7-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597017" comment="python-glance-15.0.3~dev2-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597018" comment="python-heat-9.0.8~dev11-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597019" comment="python-horizon-plugin-monasca-ui-1.8.1~dev39-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597020" comment="python-horizon-plugin-neutron-fwaas-ui-1.0.1~dev9-4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597021" comment="python-ironic-9.1.8~dev7-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597022" comment="python-keystone-12.0.4~dev2-5.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597023" comment="python-manila-5.1.1~dev2-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597024" comment="python-monasca-agent-2.2.5~dev5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597025" comment="python-monasca-api-2.2.2~dev1-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597026" comment="python-monasca-persister-1.7.1~dev10-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597027" comment="python-murano-4.0.2~dev2-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597028" comment="python-neutron-11.0.9~dev42-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597029" comment="python-neutron-gbp-7.3.1~dev45-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597030" comment="python-neutron-lbaas-11.0.4~dev6-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597031" comment="python-nova-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597032" comment="python-octavia-1.0.6~dev2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597033" comment="python-oslo.db-4.25.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597034" comment="python-osprofiler-1.11.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597035" comment="python-swiftlm-8.0+git.1541434883.e0ebe69-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597036" comment="venv-openstack-magnum-x86_64-5.0.2_5.0.2_5.0.2~dev31-11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597037" comment="venv-openstack-monasca-ceilometer-x86_64-1.5.1_1.5.1_1.5.1~dev3-8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597038" comment="venv-openstack-monasca-x86_64-2.2.2~dev1-11.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597039" comment="venv-openstack-murano-x86_64-4.0.2~dev2-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597040" comment="venv-openstack-neutron-x86_64-11.0.9~dev42-13.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148177" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1133719" ref_url="https://bugzilla.suse.com/1133719" source="BUGZILLA"/>
		<reference ref_id="1138301" ref_url="https://bugzilla.suse.com/1138301" source="BUGZILLA"/>
		<reference ref_id="1138303" ref_url="https://bugzilla.suse.com/1138303" source="BUGZILLA"/>
		<reference ref_id="1138734" ref_url="https://bugzilla.suse.com/1138734" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<reference ref_id="CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005851.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path
  parameter pointing anywhere on the system and potentially leading to execution
  of a malicious file with root privileges by libvirtd (bsc#1138301).
- CVE-2019-10167: Fixed an issue with virConnectGetDomainCapabilities API which
  could have been used to execute arbitrary emulators (bsc#1138303).

Non-security issues fixed:

- Fixed an issue with short bitmaps when setting vcpu affinity using the vcpupin (bsc#1138734).
- Added support for overriding max threads per process limit (bsc#1133719)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-28"/>
	<updated date="2019-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133719">SUSE bug 1133719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138303">SUSE bug 1138303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138734">SUSE bug 1138734</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10161">CVE-2019-10161 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10167">CVE-2019-10167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555647" comment="libvirt-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555648" comment="libvirt-admin-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555649" comment="libvirt-client-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555650" comment="libvirt-daemon-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555651" comment="libvirt-daemon-config-network-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555652" comment="libvirt-daemon-config-nwfilter-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555653" comment="libvirt-daemon-driver-interface-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538264" comment="libvirt-daemon-driver-libxl-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555654" comment="libvirt-daemon-driver-lxc-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555655" comment="libvirt-daemon-driver-network-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555656" comment="libvirt-daemon-driver-nodedev-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555657" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555658" comment="libvirt-daemon-driver-qemu-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555659" comment="libvirt-daemon-driver-secret-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555660" comment="libvirt-daemon-driver-storage-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555661" comment="libvirt-daemon-driver-storage-core-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555662" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555663" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555664" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555665" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538277" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555666" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555667" comment="libvirt-daemon-hooks-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555668" comment="libvirt-daemon-lxc-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555669" comment="libvirt-daemon-qemu-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538282" comment="libvirt-daemon-xen-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555670" comment="libvirt-doc-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555671" comment="libvirt-libs-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555672" comment="libvirt-lock-sanlock-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555673" comment="libvirt-nss-3.3.0-5.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148178" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1136468" ref_url="https://bugzilla.suse.com/1136468" source="BUGZILLA"/>
		<reference ref_id="1139945" ref_url="https://bugzilla.suse.com/1139945" source="BUGZILLA"/>
		<reference ref_id="1142880" ref_url="https://bugzilla.suse.com/1142880" source="BUGZILLA"/>
		<reference ref_id="1142882" ref_url="https://bugzilla.suse.com/1142882" source="BUGZILLA"/>
		<reference ref_id="1142883" ref_url="https://bugzilla.suse.com/1142883" source="BUGZILLA"/>
		<reference ref_id="1142885" ref_url="https://bugzilla.suse.com/1142885" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12308" ref_url="https://www.suse.com/security/cve/CVE-2019-12308/" source="CVE"/>
		<reference ref_id="CVE-2019-12781" ref_url="https://www.suse.com/security/cve/CVE-2019-12781/" source="CVE"/>
		<reference ref_id="CVE-2019-14232" ref_url="https://www.suse.com/security/cve/CVE-2019-14232/" source="CVE"/>
		<reference ref_id="CVE-2019-14233" ref_url="https://www.suse.com/security/cve/CVE-2019-14233/" source="CVE"/>
		<reference ref_id="CVE-2019-14234" ref_url="https://www.suse.com/security/cve/CVE-2019-14234/" source="CVE"/>
		<reference ref_id="CVE-2019-14235" ref_url="https://www.suse.com/security/cve/CVE-2019-14235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2257-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192257-1.html" source="SUSE-SU"/>
		<description>
This update for python-Django to version 1.11.23 fixes the following issues:

- CVE-2019-14232: Fixed a denial of service in 'django.utils.text.Truncator' (bsc#1142880).
- CVE-2019-14233: Fixed a denial of service in strip_tags() (bsc#1142882).
- CVE-2019-14234: Fixed an SQL injection in key and index lookups for 'JSONField'/'HStoreField' (bsc#1142883).
- CVE-2019-14235: Fixed a potential memory exhaustion in 'django.utils.encoding.uri_to_iri()' (bsc#1142885).
- CVE-2019-12781: Fixed incorrect HTTP detection with reverse-proxy connecting via HTTPS (bsc#1139945).
- CVE-2019-12308: Fixed a cross site scripting vulnerability in the AdminURLFieldWidget (bsc#1136468).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136468">SUSE bug 1136468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139945">SUSE bug 1139945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142880">SUSE bug 1142880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142882">SUSE bug 1142882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142883">SUSE bug 1142883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142885">SUSE bug 1142885</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12308/">CVE-2019-12308 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12308">CVE-2019-12308 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12781/">CVE-2019-12781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12781">CVE-2019-12781 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14232/">CVE-2019-14232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14232">CVE-2019-14232 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14233/">CVE-2019-14233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14233">CVE-2019-14233 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14234/">CVE-2019-14234 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14234">CVE-2019-14234 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14235/">CVE-2019-14235 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14235">CVE-2019-14235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597041" comment="python-Django-1.11.23-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148179" version="1" class="patch">
	<metadata>
		<title>Security update for python-SQLAlchemy (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1124593" ref_url="https://bugzilla.suse.com/1124593" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7164" ref_url="https://www.suse.com/security/cve/CVE-2019-7164/" source="CVE"/>
		<reference ref_id="CVE-2019-7548" ref_url="https://www.suse.com/security/cve/CVE-2019-7548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2261-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192261-1.html" source="SUSE-SU"/>
		<description>
This update for python-SQLAlchemy fixes the following issues:

Security issues fixed:

- CVE-2019-7164: Fixed SQL Injection via the order_by parameter (bsc#1124593).
- CVE-2019-7548: Fixed SQL Injection via the group_by parameter (bsc#1124593).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124593">SUSE bug 1124593</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7164/">CVE-2019-7164 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7164">CVE-2019-7164 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7548/">CVE-2019-7548 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7548">CVE-2019-7548 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597042" comment="python-SQLAlchemy-1.1.12-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148180" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1106061" ref_url="https://bugzilla.suse.com/1106061" source="BUGZILLA"/>
		<reference ref_id="1123161" ref_url="https://bugzilla.suse.com/1123161" source="BUGZILLA"/>
		<reference ref_id="1125674" ref_url="https://bugzilla.suse.com/1125674" source="BUGZILLA"/>
		<reference ref_id="1127034" ref_url="https://bugzilla.suse.com/1127034" source="BUGZILLA"/>
		<reference ref_id="1128977" ref_url="https://bugzilla.suse.com/1128977" source="BUGZILLA"/>
		<reference ref_id="1130972" ref_url="https://bugzilla.suse.com/1130972" source="BUGZILLA"/>
		<reference ref_id="1133860" ref_url="https://bugzilla.suse.com/1133860" source="BUGZILLA"/>
		<reference ref_id="1134399" ref_url="https://bugzilla.suse.com/1134399" source="BUGZILLA"/>
		<reference ref_id="1135335" ref_url="https://bugzilla.suse.com/1135335" source="BUGZILLA"/>
		<reference ref_id="1135365" ref_url="https://bugzilla.suse.com/1135365" source="BUGZILLA"/>
		<reference ref_id="1137584" ref_url="https://bugzilla.suse.com/1137584" source="BUGZILLA"/>
		<reference ref_id="1139358" ref_url="https://bugzilla.suse.com/1139358" source="BUGZILLA"/>
		<reference ref_id="1139826" ref_url="https://bugzilla.suse.com/1139826" source="BUGZILLA"/>
		<reference ref_id="1140652" ref_url="https://bugzilla.suse.com/1140652" source="BUGZILLA"/>
		<reference ref_id="1140903" ref_url="https://bugzilla.suse.com/1140903" source="BUGZILLA"/>
		<reference ref_id="1140945" ref_url="https://bugzilla.suse.com/1140945" source="BUGZILLA"/>
		<reference ref_id="1141181" ref_url="https://bugzilla.suse.com/1141181" source="BUGZILLA"/>
		<reference ref_id="1141401" ref_url="https://bugzilla.suse.com/1141401" source="BUGZILLA"/>
		<reference ref_id="1141402" ref_url="https://bugzilla.suse.com/1141402" source="BUGZILLA"/>
		<reference ref_id="1141452" ref_url="https://bugzilla.suse.com/1141452" source="BUGZILLA"/>
		<reference ref_id="1141453" ref_url="https://bugzilla.suse.com/1141453" source="BUGZILLA"/>
		<reference ref_id="1141454" ref_url="https://bugzilla.suse.com/1141454" source="BUGZILLA"/>
		<reference ref_id="1142023" ref_url="https://bugzilla.suse.com/1142023" source="BUGZILLA"/>
		<reference ref_id="1142254" ref_url="https://bugzilla.suse.com/1142254" source="BUGZILLA"/>
		<reference ref_id="1142857" ref_url="https://bugzilla.suse.com/1142857" source="BUGZILLA"/>
		<reference ref_id="1143045" ref_url="https://bugzilla.suse.com/1143045" source="BUGZILLA"/>
		<reference ref_id="1143048" ref_url="https://bugzilla.suse.com/1143048" source="BUGZILLA"/>
		<reference ref_id="1143189" ref_url="https://bugzilla.suse.com/1143189" source="BUGZILLA"/>
		<reference ref_id="1143191" ref_url="https://bugzilla.suse.com/1143191" source="BUGZILLA"/>
		<reference ref_id="1143333" ref_url="https://bugzilla.suse.com/1143333" source="BUGZILLA"/>
		<reference ref_id="1144257" ref_url="https://bugzilla.suse.com/1144257" source="BUGZILLA"/>
		<reference ref_id="1144273" ref_url="https://bugzilla.suse.com/1144273" source="BUGZILLA"/>
		<reference ref_id="1144288" ref_url="https://bugzilla.suse.com/1144288" source="BUGZILLA"/>
		<reference ref_id="1144920" ref_url="https://bugzilla.suse.com/1144920" source="BUGZILLA"/>
		<reference ref_id="1145920" ref_url="https://bugzilla.suse.com/1145920" source="BUGZILLA"/>
		<reference ref_id="1145922" ref_url="https://bugzilla.suse.com/1145922" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20855" ref_url="https://www.suse.com/security/cve/CVE-2018-20855/" source="CVE"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10207" ref_url="https://www.suse.com/security/cve/CVE-2019-10207/" source="CVE"/>
		<reference ref_id="CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125/" source="CVE"/>
		<reference ref_id="CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810/" source="CVE"/>
		<reference ref_id="CVE-2019-13631" ref_url="https://www.suse.com/security/cve/CVE-2019-13631/" source="CVE"/>
		<reference ref_id="CVE-2019-13648" ref_url="https://www.suse.com/security/cve/CVE-2019-13648/" source="CVE"/>
		<reference ref_id="CVE-2019-14283" ref_url="https://www.suse.com/security/cve/CVE-2019-14283/" source="CVE"/>
		<reference ref_id="CVE-2019-14284" ref_url="https://www.suse.com/security/cve/CVE-2019-14284/" source="CVE"/>
		<reference ref_id="CVE-2019-15117" ref_url="https://www.suse.com/security/cve/CVE-2019-15117/" source="CVE"/>
		<reference ref_id="CVE-2019-15118" ref_url="https://www.suse.com/security/cve/CVE-2019-15118/" source="CVE"/>
		<reference ref_id="CVE-2019-3819" ref_url="https://www.suse.com/security/cve/CVE-2019-3819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).
- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).
- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).
- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).
- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c (bnc#1142254).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).
- CVE-2019-15118: Fixed kernel stack exhaustion in check_input_term in sound/usb/mixer.c via mishandled recursion (bnc#1145922).
- CVE-2019-15117: Fixed out-of-bounds memory access in parse_audio_mixer_unit in sound/usb/mixer.c via mishandled short descriptor (bnc#1145920).
- CVE-2019-3819: A flaw was fixed in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may have enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') could have caused a system lock up and a denial of service (bnc#1123161).
- CVE-2019-10207: Check for missing tty operations in bluetooth/hci_uart (bsc#1142857).
- CVE-2018-20856: Fixed a use-after-free issue in block/blk-core.c, where certain error case are mishandled (bnc#1143048).

The following non-security bugs were fixed:

- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1125674).
- dlm: Fix saving of NULL callbacks (bsc#1135365).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652, bsc#1144288).
- bcache: Revert 'bcache: free heap cache_set-&gt;flush_btree in bch_journal_free' (bsc#1140652, bsc#1144288).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652, bsc#1144288).
- bcache: fix race in btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1130972, bsc#1144257).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1130972, bsc#1144273).
- bcache: performance improvement for btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652, bsc#1144288).
- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
- clocksource: Defer override invalidation unless clock is unstable (bsc#1139826).
- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
- kvmclock: fix TSC calibration for nested guests (bsc#1133860, jsc#PM-1211).
- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945, bsc#1141401, bsc#1141402, bsc#1141452, bsc#1141453, bsc#1141454).
- qla2xxx: performance degradation when enabling blk-mq (bsc#1128977).
- qlge: Deduplicate lbq_buf_size (bsc#1106061).
- qlge: Deduplicate rx buffer queue management (bsc#1106061).
- qlge: Factor out duplicated expression (bsc#1106061).
- qlge: Fix dma_sync_single calls (bsc#1106061).
- qlge: Fix irq masking in INTx mode (bsc#1106061).
- qlge: Refill empty buffer queues from wq (bsc#1106061).
- qlge: Refill rx buffers up to multiple of 16 (bsc#1106061).
- qlge: Remove bq_desc.maplen (bsc#1106061).
- qlge: Remove irq_cnt (bsc#1106061).
- qlge: Remove page_chunk.last_flag (bsc#1106061).
- qlge: Remove qlge_bq.len size (bsc#1106061).
- qlge: Remove rx_ring.sbq_buf_size (bsc#1106061).
- qlge: Remove rx_ring.type (bsc#1106061).
- qlge: Remove useless dma synchronization calls (bsc#1106061).
- qlge: Remove useless memset (bsc#1106061).
- qlge: Replace memset with assignment (bsc#1106061).
- qlge: Update buffer queue prod index despite oom (bsc#1106061).
- rbd: flush rbd_dev-&gt;watch_dwork after watch is unregistered (bsc#1143333).
- rbd: retry watch re-registration periodically (bsc#1143333).
- sched/fair: Do not free p-&gt;numa_faults with concurrent readers (bsc#1144920).
- sched/fair: Use RCU accessors consistently for -&gt;numa_group (bsc#1144920).
- scsi: virtio_scsi: let host do exception handling (bsc#1141181).
- x86: mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- x86: tsc: Add X86_FEATURE_TSC_KNOWN_FREQ flag (bsc#1133860, jsc#PM-1211).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (XSA-300).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106061">SUSE bug 1106061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123161">SUSE bug 1123161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125674">SUSE bug 1125674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127034">SUSE bug 1127034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128977">SUSE bug 1128977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130972">SUSE bug 1130972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133860">SUSE bug 1133860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134399">SUSE bug 1134399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135335">SUSE bug 1135335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135365">SUSE bug 1135365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137584">SUSE bug 1137584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139358">SUSE bug 1139358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139826">SUSE bug 1139826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140652">SUSE bug 1140652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140903">SUSE bug 1140903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140945">SUSE bug 1140945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141181">SUSE bug 1141181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141401">SUSE bug 1141401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141402">SUSE bug 1141402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141452">SUSE bug 1141452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141453">SUSE bug 1141453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141454">SUSE bug 1141454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142023">SUSE bug 1142023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142254">SUSE bug 1142254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142857">SUSE bug 1142857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143045">SUSE bug 1143045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143048">SUSE bug 1143048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143189">SUSE bug 1143189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143333">SUSE bug 1143333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144257">SUSE bug 1144257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144273">SUSE bug 1144273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144288">SUSE bug 1144288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144920">SUSE bug 1144920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145920">SUSE bug 1145920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145922">SUSE bug 1145922</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20855/">CVE-2018-20855 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20855">CVE-2018-20855 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20856">CVE-2018-20856 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10207/">CVE-2019-10207 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10207">CVE-2019-10207 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1125">CVE-2019-1125 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11810">CVE-2019-11810 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13631/">CVE-2019-13631 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13631">CVE-2019-13631 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13648/">CVE-2019-13648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13648">CVE-2019-13648 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14283/">CVE-2019-14283 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14283">CVE-2019-14283 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14284/">CVE-2019-14284 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14284">CVE-2019-14284 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15117/">CVE-2019-15117 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15117">CVE-2019-15117 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15118/">CVE-2019-15118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15118">CVE-2019-15118 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3819/">CVE-2019-3819 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3819">CVE-2019-3819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555674" comment="kernel-default-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555675" comment="kernel-default-base-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555676" comment="kernel-default-devel-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538290" comment="kernel-devel-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538291" comment="kernel-macros-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538292" comment="kernel-source-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555677" comment="kernel-syms-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556048" comment="kgraft-patch-4_4_180-94_103-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148181" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1114674" ref_url="https://bugzilla.suse.com/1114674" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2264-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192264-1.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

Security issue fixed:

- CVE-2018-18311: Fixed integer overflow with oversize environment (bsc#1114674).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1114674">SUSE bug 1114674</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18311">CVE-2018-18311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522096" comment="perl-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522097" comment="perl-32bit-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522098" comment="perl-base-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522099" comment="perl-doc-5.18.2-12.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148182" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp, zypper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1049825" ref_url="https://bugzilla.suse.com/1049825" source="BUGZILLA"/>
		<reference ref_id="1109893" ref_url="https://bugzilla.suse.com/1109893" source="BUGZILLA"/>
		<reference ref_id="1110542" ref_url="https://bugzilla.suse.com/1110542" source="BUGZILLA"/>
		<reference ref_id="1111319" ref_url="https://bugzilla.suse.com/1111319" source="BUGZILLA"/>
		<reference ref_id="1112911" ref_url="https://bugzilla.suse.com/1112911" source="BUGZILLA"/>
		<reference ref_id="1113296" ref_url="https://bugzilla.suse.com/1113296" source="BUGZILLA"/>
		<reference ref_id="1116995" ref_url="https://bugzilla.suse.com/1116995" source="BUGZILLA"/>
		<reference ref_id="1120629" ref_url="https://bugzilla.suse.com/1120629" source="BUGZILLA"/>
		<reference ref_id="1120630" ref_url="https://bugzilla.suse.com/1120630" source="BUGZILLA"/>
		<reference ref_id="1120631" ref_url="https://bugzilla.suse.com/1120631" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1131823" ref_url="https://bugzilla.suse.com/1131823" source="BUGZILLA"/>
		<reference ref_id="1134226" ref_url="https://bugzilla.suse.com/1134226" source="BUGZILLA"/>
		<reference ref_id="1137977" ref_url="https://bugzilla.suse.com/1137977" source="BUGZILLA"/>
		<reference ref_id="1140039" ref_url="https://bugzilla.suse.com/1140039" source="BUGZILLA"/>
		<reference ref_id="1145521" ref_url="https://bugzilla.suse.com/1145521" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<description>
This update for libsolv, libzypp and zypper fixes the following issues:

libsolv was updated to version 0.6.36 and fixes the following issues:

Security issues fixed:

- CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629).
- CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630).
- CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631).

Non-security issues fixed:

- Made cleandeps jobs on patterns work (bsc#1137977).
- Fixed an issue multiversion packages that obsolete their own name (bsc#1127155).
- Keep consistent package name if there are multiple alternatives (bsc#1131823).

Fixes for libzypp:

- Fixes a bug where locking the kernel was not possible (bsc#1113296)
- Fixes a file descriptor leak (bsc#1116995)
- Will now run file conflict check on dry-run (best with download-only) (bsc#1140039)

Fixes for zypper:

- Fixes a bug where the wrong exit code was set when refreshing repos if --root was used (bsc#1134226)
- Improved the displaying of locks (bsc#1112911)
- Fixes an issue where `https` repository urls caused an error prompt to appear twice (bsc#1110542)
- zypper will now always warn when no repositories are defined (bsc#1109893)
- Fixes bash completion option detection (bsc#1049825)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049825">SUSE bug 1049825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109893">SUSE bug 1109893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110542">SUSE bug 1110542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111319">SUSE bug 1111319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112911">SUSE bug 1112911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113296">SUSE bug 1113296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116995">SUSE bug 1116995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131823">SUSE bug 1131823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134226">SUSE bug 1134226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137977">SUSE bug 1137977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140039">SUSE bug 1140039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145521">SUSE bug 1145521</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20532">CVE-2018-20532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20533">CVE-2018-20533 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20534">CVE-2018-20534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522100" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522101" comment="libzypp-16.20.2-27.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530678" comment="perl-solv-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522102" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522103" comment="zypper-1.13.54-18.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148183" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1142690" ref_url="https://bugzilla.suse.com/1142690" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10206" ref_url="https://www.suse.com/security/cve/CVE-2019-10206/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005874.html" source="SUSE-SU"/>
		<description>
This update for ansible fixes the following issues:

Security issue fixed:

- CVE-2019-10206: Fixed ansible cli tools that prompt passwords by expanding them from templates as they could contain special characters (bsc#1142690).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-03"/>
	<updated date="2019-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1142690">SUSE bug 1142690</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10206/">CVE-2019-10206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10206">CVE-2019-10206 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597043" comment="ansible-2.4.6.0-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148184" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1119376" ref_url="https://bugzilla.suse.com/1119376" source="BUGZILLA"/>
		<reference ref_id="1129071" ref_url="https://bugzilla.suse.com/1129071" source="BUGZILLA"/>
		<reference ref_id="1132663" ref_url="https://bugzilla.suse.com/1132663" source="BUGZILLA"/>
		<reference ref_id="1132900" ref_url="https://bugzilla.suse.com/1132900" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20060" ref_url="https://www.suse.com/security/cve/CVE-2018-20060/" source="CVE"/>
		<reference ref_id="CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236/" source="CVE"/>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005880.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issues:

Security issues fixed:

- CVE-2019-9740: Fixed CRLF injection issue (bsc#1129071).
- CVE-2019-11324: Fixed invalid CA certificat verification (bsc#1132900).
- CVE-2019-11236: Fixed CRLF injection via request parameter (bsc#1132663).
- CVE-2018-20060: Remove Authorization header when redirecting cross-host (bsc#1119376).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-05"/>
	<updated date="2019-09-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1119376">SUSE bug 1119376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129071">SUSE bug 1129071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132663">SUSE bug 1132663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132900">SUSE bug 1132900</bugzilla>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20060/">CVE-2018-20060 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20060">CVE-2018-20060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11236">CVE-2019-11236 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">CVE-2019-11324 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9740">CVE-2019-9740 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597044" comment="python-urllib3-1.22-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148185" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update to Java 7.1 Service Refresh 4 Fix Pack 50.

Security issues fixed:

- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-09"/>
	<updated date="2019-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11771">CVE-2019-11771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11775">CVE-2019-11775 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-4473">CVE-2019-4473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530688" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530691" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148186" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1149496" ref_url="https://bugzilla.suse.com/1149496" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2339-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192339-2.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5482: Fixed TFTP small blocksize heap buffer overflow (bsc#1149496).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-12"/>
	<updated date="2019-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5482">CVE-2019-5482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530693" comment="curl-7.37.0-37.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530694" comment="libcurl4-7.37.0-37.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530695" comment="libcurl4-32bit-7.37.0-37.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148187" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1135715" ref_url="https://bugzilla.suse.com/1135715" source="BUGZILLA"/>
		<reference ref_id="1148931" ref_url="https://bugzilla.suse.com/1148931" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595/" source="CVE"/>
		<reference ref_id="CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607/" source="CVE"/>
		<reference ref_id="CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615/" source="CVE"/>
		<reference ref_id="CVE-2019-8644" ref_url="https://www.suse.com/security/cve/CVE-2019-8644/" source="CVE"/>
		<reference ref_id="CVE-2019-8649" ref_url="https://www.suse.com/security/cve/CVE-2019-8649/" source="CVE"/>
		<reference ref_id="CVE-2019-8658" ref_url="https://www.suse.com/security/cve/CVE-2019-8658/" source="CVE"/>
		<reference ref_id="CVE-2019-8666" ref_url="https://www.suse.com/security/cve/CVE-2019-8666/" source="CVE"/>
		<reference ref_id="CVE-2019-8669" ref_url="https://www.suse.com/security/cve/CVE-2019-8669/" source="CVE"/>
		<reference ref_id="CVE-2019-8671" ref_url="https://www.suse.com/security/cve/CVE-2019-8671/" source="CVE"/>
		<reference ref_id="CVE-2019-8672" ref_url="https://www.suse.com/security/cve/CVE-2019-8672/" source="CVE"/>
		<reference ref_id="CVE-2019-8673" ref_url="https://www.suse.com/security/cve/CVE-2019-8673/" source="CVE"/>
		<reference ref_id="CVE-2019-8676" ref_url="https://www.suse.com/security/cve/CVE-2019-8676/" source="CVE"/>
		<reference ref_id="CVE-2019-8677" ref_url="https://www.suse.com/security/cve/CVE-2019-8677/" source="CVE"/>
		<reference ref_id="CVE-2019-8678" ref_url="https://www.suse.com/security/cve/CVE-2019-8678/" source="CVE"/>
		<reference ref_id="CVE-2019-8679" ref_url="https://www.suse.com/security/cve/CVE-2019-8679/" source="CVE"/>
		<reference ref_id="CVE-2019-8680" ref_url="https://www.suse.com/security/cve/CVE-2019-8680/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8683" ref_url="https://www.suse.com/security/cve/CVE-2019-8683/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8686" ref_url="https://www.suse.com/security/cve/CVE-2019-8686/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Updated to version 2.24.4 (bsc#1148931).

Security issues fixed:
	  
- CVE-2019-8644, CVE-2019-8649, CVE-2019-8658, CVE-2019-8669, CVE-2019-8678,
  CVE-2019-8680, CVE-2019-8683, CVE-2019-8684, CVE-2019-8688, CVE-2019-8595,
  CVE-2019-8607, CVE-2019-8615, CVE-2019-8644, CVE-2019-8649, CVE-2019-8658,
  CVE-2019-8666, CVE-2019-8669, CVE-2019-8671, CVE-2019-8672, CVE-2019-8673,
  CVE-2019-8676, CVE-2019-8677, CVE-2019-8678, CVE-2019-8679, CVE-2019-8680,
  CVE-2019-8681, CVE-2019-8683, CVE-2019-8684, CVE-2019-8686, CVE-2019-8687,
  CVE-2019-8688, CVE-2019-8689, CVE-2019-8690

Non-security issues fixed:
	  
- Improved loading of multimedia streams to avoid memory exhaustion due to excessive caching.
- Updated the user agent string to make happy certain websites which would claim that the browser being used was unsupported.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-11"/>
	<updated date="2019-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8595">CVE-2019-8595 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8607">CVE-2019-8607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8615">CVE-2019-8615 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8644/">CVE-2019-8644 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8644">CVE-2019-8644 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8649/">CVE-2019-8649 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8649">CVE-2019-8649 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8658/">CVE-2019-8658 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8658">CVE-2019-8658 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8666/">CVE-2019-8666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8666">CVE-2019-8666 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8669/">CVE-2019-8669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8669">CVE-2019-8669 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8671/">CVE-2019-8671 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8671">CVE-2019-8671 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8672/">CVE-2019-8672 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8672">CVE-2019-8672 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8673/">CVE-2019-8673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8673">CVE-2019-8673 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8676/">CVE-2019-8676 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8676">CVE-2019-8676 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8677/">CVE-2019-8677 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8677">CVE-2019-8677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8678/">CVE-2019-8678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8678">CVE-2019-8678 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8679/">CVE-2019-8679 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8679">CVE-2019-8679 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8680/">CVE-2019-8680 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8680">CVE-2019-8680 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8681">CVE-2019-8681 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8683/">CVE-2019-8683 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8683">CVE-2019-8683 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8684">CVE-2019-8684 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8686/">CVE-2019-8686 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8686">CVE-2019-8686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8687">CVE-2019-8687 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8688">CVE-2019-8688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8689">CVE-2019-8689 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8690">CVE-2019-8690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148188" version="1" class="patch">
	<metadata>
		<title>Security update for python-Werkzeug (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1145383" ref_url="https://bugzilla.suse.com/1145383" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14806" ref_url="https://www.suse.com/security/cve/CVE-2019-14806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005907.html" source="SUSE-SU"/>
		<description>
This update for python-Werkzeug fixes the following issues:

Security issue fixed:

- CVE-2019-14806: Fixed the development server in Docker, the debugger security pin is now unique per container (bsc#1145383).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-11"/>
	<updated date="2019-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1145383">SUSE bug 1145383</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14806/">CVE-2019-14806 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14806">CVE-2019-14806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597045" comment="python-Werkzeug-0.12.2-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148189" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1122292" ref_url="https://bugzilla.suse.com/1122292" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11772" ref_url="https://www.suse.com/security/cve/CVE-2019-11772/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2449" ref_url="https://www.suse.com/security/cve/CVE-2019-2449/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 5 Fix Pack 40.

Security issues fixed:

- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11772: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
- CVE-2019-2786: Fixed issue inside Component Security (bsc#1141787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-12"/>
	<updated date="2019-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122292">SUSE bug 1122292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11771">CVE-2019-11771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11772/">CVE-2019-11772 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11772">CVE-2019-11772 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11775">CVE-2019-11775 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2449/">CVE-2019-2449 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2449">CVE-2019-2449 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2786">CVE-2019-2786 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-4473">CVE-2019-4473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530698" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148190" version="1" class="patch">
	<metadata>
		<title>Security update for ibus (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1150011" ref_url="https://bugzilla.suse.com/1150011" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14822" ref_url="https://www.suse.com/security/cve/CVE-2019-14822/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005925.html" source="SUSE-SU"/>
		<description>
This update for ibus fixes the following issues:

Security issue fixed:

- CVE-2019-14822: Fixed a misconfiguration of the DBus server that allowed an unprivileged user to monitor and send method calls to the ibus bus of another user. (bsc#1150011)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150011">SUSE bug 1150011</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14822/">CVE-2019-14822 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14822">CVE-2019-14822 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522144" comment="ibus-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522145" comment="ibus-gtk-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522146" comment="ibus-gtk3-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522148" comment="ibus-lang-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522149" comment="libibus-1_0-5-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522152" comment="typelib-1_0-IBus-1_0-1.5.13-15.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148191" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005943.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

- CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance (bsc#1150003).
- CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-20"/>
	<updated date="2019-09-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1547">CVE-2019-1547 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1563">CVE-2019-1563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530702" comment="libopenssl-devel-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530703" comment="libopenssl1_0_0-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530704" comment="libopenssl1_0_0-32bit-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530705" comment="libopenssl1_0_0-hmac-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530706" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530707" comment="openssl-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530708" comment="openssl-doc-1.0.2j-60.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148192" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1149294" ref_url="https://bugzilla.suse.com/1149294" source="BUGZILLA"/>
		<reference ref_id="1149295" ref_url="https://bugzilla.suse.com/1149295" source="BUGZILLA"/>
		<reference ref_id="1149296" ref_url="https://bugzilla.suse.com/1149296" source="BUGZILLA"/>
		<reference ref_id="1149297" ref_url="https://bugzilla.suse.com/1149297" source="BUGZILLA"/>
		<reference ref_id="1149298" ref_url="https://bugzilla.suse.com/1149298" source="BUGZILLA"/>
		<reference ref_id="1149299" ref_url="https://bugzilla.suse.com/1149299" source="BUGZILLA"/>
		<reference ref_id="1149303" ref_url="https://bugzilla.suse.com/1149303" source="BUGZILLA"/>
		<reference ref_id="1149304" ref_url="https://bugzilla.suse.com/1149304" source="BUGZILLA"/>
		<reference ref_id="1149324" ref_url="https://bugzilla.suse.com/1149324" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to ESR 60.9 fixes the following issues:

Security issues fixed:

- CVE-2019-11742: Fixed a same-origin policy violation involving SVG filters and canvas to steal cross-origin images. (bsc#1149303)
- CVE-2019-11746: Fixed a use-after-free while manipulating video. (bsc#1149297)
- CVE-2019-11744: Fixed an XSS caused by breaking out of title and textarea elements using innerHTML. (bsc#1149304)
- CVE-2019-11753: Fixed a privilege escalation with Mozilla Maintenance Service in custom Firefox installation location. (bsc#1149295)
- CVE-2019-11752: Fixed a use-after-free while extracting a key value in IndexedDB. (bsc#1149296)
- CVE-2019-11743: Fixed a timing side-channel attack on cross-origin information, utilizing unload event attributes. (bsc#1149298)
- CVE-2019-11740: Fixed several memory safety bugs. (bsc#1149299)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-23"/>
	<updated date="2019-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149294">SUSE bug 1149294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149295">SUSE bug 1149295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149296">SUSE bug 1149296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149297">SUSE bug 1149297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149298">SUSE bug 1149298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149299">SUSE bug 1149299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149303">SUSE bug 1149303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149304">SUSE bug 1149304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11753">CVE-2019-11753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522212" comment="MozillaFirefox-60.9.0-109.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522213" comment="MozillaFirefox-translations-common-60.9.0-109.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148193" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1138461" ref_url="https://bugzilla.suse.com/1138461" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12855" ref_url="https://www.suse.com/security/cve/CVE-2019-12855/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005962.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

Security issue fixed:

- CVE-2019-12855: Fixed TLS certificate verification to protecting against MITM attacks (bsc#1138461).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1138461">SUSE bug 1138461</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12855/">CVE-2019-12855 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12855">CVE-2019-12855 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597046" comment="python-Twisted-15.2.1-9.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148194" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1145559" ref_url="https://bugzilla.suse.com/1145559" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11500" ref_url="https://www.suse.com/security/cve/CVE-2019-11500/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005961.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2019-11500: Fixed a potential remote code execution in the IMAP and ManageSieve protocol parsers (bsc#1145559).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145559">SUSE bug 1145559</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11500/">CVE-2019-11500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11500">CVE-2019-11500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530710" comment="dovecot22-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530711" comment="dovecot22-backend-mysql-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530712" comment="dovecot22-backend-pgsql-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530713" comment="dovecot22-backend-sqlite-2.2.31-19.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148195" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1127027" ref_url="https://bugzilla.suse.com/1127027" source="BUGZILLA"/>
		<reference ref_id="1132826" ref_url="https://bugzilla.suse.com/1132826" source="BUGZILLA"/>
		<reference ref_id="1141798" ref_url="https://bugzilla.suse.com/1141798" source="BUGZILLA"/>
		<reference ref_id="1142058" ref_url="https://bugzilla.suse.com/1142058" source="BUGZILLA"/>
		<reference ref_id="1143215" ref_url="https://bugzilla.suse.com/1143215" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2614" ref_url="https://www.suse.com/security/cve/CVE-2019-2614/" source="CVE"/>
		<reference ref_id="CVE-2019-2627" ref_url="https://www.suse.com/security/cve/CVE-2019-2627/" source="CVE"/>
		<reference ref_id="CVE-2019-2737" ref_url="https://www.suse.com/security/cve/CVE-2019-2737/" source="CVE"/>
		<reference ref_id="CVE-2019-2739" ref_url="https://www.suse.com/security/cve/CVE-2019-2739/" source="CVE"/>
		<reference ref_id="CVE-2019-2740" ref_url="https://www.suse.com/security/cve/CVE-2019-2740/" source="CVE"/>
		<reference ref_id="CVE-2019-2805" ref_url="https://www.suse.com/security/cve/CVE-2019-2805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Updated to MariaDB 10.0.40-1.

Security issues fixed:

- CVE-2019-2805, CVE-2019-2740, CVE-2019-2739, CVE-2019-2737, 
  CVE-2019-2614, CVE-2019-2627. (bsc#1132826) (bsc#1141798).

Non-security issues fixed:

- Adjusted mysql-systemd-helper ('shutdown protected MySQL' section)
  so it checks both ping response and the pid in a process list
  as it can take some time till the process is terminated.
  Otherwise it can lead to 'found left-over process' situation
  when regular mariadb is started. (bsc#1143215)
- Fixed IP resolving in mysql_install_db script. (bsc#1142058, bsc#1127027, MDEV-18526)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-25"/>
	<updated date="2019-09-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127027">SUSE bug 1127027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142058">SUSE bug 1142058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143215">SUSE bug 1143215</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2614/">CVE-2019-2614 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2614">CVE-2019-2614 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2627/">CVE-2019-2627 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2627">CVE-2019-2627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2737/">CVE-2019-2737 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2737">CVE-2019-2737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2739/">CVE-2019-2739 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2739">CVE-2019-2739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2740/">CVE-2019-2740 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2740">CVE-2019-2740 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2805/">CVE-2019-2805 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2805">CVE-2019-2805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557375" comment="libmysqlclient18-10.0.40.1-29.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148196" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1129180" ref_url="https://bugzilla.suse.com/1129180" source="BUGZILLA"/>
		<reference ref_id="1131863" ref_url="https://bugzilla.suse.com/1131863" source="BUGZILLA"/>
		<reference ref_id="1134156" ref_url="https://bugzilla.suse.com/1134156" source="BUGZILLA"/>
		<reference ref_id="1140359" ref_url="https://bugzilla.suse.com/1140359" source="BUGZILLA"/>
		<reference ref_id="1146882" ref_url="https://bugzilla.suse.com/1146882" source="BUGZILLA"/>
		<reference ref_id="1146884" ref_url="https://bugzilla.suse.com/1146884" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12973" ref_url="https://www.suse.com/security/cve/CVE-2019-12973/" source="CVE"/>
		<reference ref_id="CVE-2019-14811" ref_url="https://www.suse.com/security/cve/CVE-2019-14811/" source="CVE"/>
		<reference ref_id="CVE-2019-14812" ref_url="https://www.suse.com/security/cve/CVE-2019-14812/" source="CVE"/>
		<reference ref_id="CVE-2019-14813" ref_url="https://www.suse.com/security/cve/CVE-2019-14813/" source="CVE"/>
		<reference ref_id="CVE-2019-14817" ref_url="https://www.suse.com/security/cve/CVE-2019-14817/" source="CVE"/>
		<reference ref_id="CVE-2019-3835" ref_url="https://www.suse.com/security/cve/CVE-2019-3835/" source="CVE"/>
		<reference ref_id="CVE-2019-3839" ref_url="https://www.suse.com/security/cve/CVE-2019-3839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to 9.27 fixes the following issues:

Security issues fixed:

- CVE-2019-3835: Fixed an unauthorized file system access caused by an available superexec operator.  (bsc#1129180)
- CVE-2019-3839: Fixed an unauthorized file system access caused by available privileged operators. (bsc#1134156)
- CVE-2019-12973: Fixed a denial-of-service vulnerability in the OpenJPEG function opj_t1_encode_cblks. (bsc#1140359)
- CVE-2019-14811: Fixed a safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator. (bsc#1146882)
- CVE-2019-14812: Fixed a safer mode bypass by .forceput exposure in setuserparams. (bsc#1146882)
- CVE-2019-14813: Fixed a safer mode bypass by .forceput exposure in setsystemparams. (bsc#1146882)
- CVE-2019-14817: Fixed a safer mode bypass by .forceput exposure in .pdfexectoken and other procedures. (bsc#1146884)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-26"/>
	<updated date="2019-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129180">SUSE bug 1129180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131863">SUSE bug 1131863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134156">SUSE bug 1134156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140359">SUSE bug 1140359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146884">SUSE bug 1146884</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12973/">CVE-2019-12973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12973">CVE-2019-12973 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14811/">CVE-2019-14811 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14811">CVE-2019-14811 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14812/">CVE-2019-14812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14812">CVE-2019-14812 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14813/">CVE-2019-14813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14813">CVE-2019-14813 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14817/">CVE-2019-14817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14817">CVE-2019-14817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3835/">CVE-2019-3835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3835">CVE-2019-3835 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3839/">CVE-2019-3839 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3839">CVE-2019-3839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522218" comment="ghostscript-9.27-23.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522219" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148197" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1148987" ref_url="https://bugzilla.suse.com/1148987" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005976.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

Security issues fixed:
	  
- CVE-2019-13627: Mitigated ECDSA timing attack. (bsc#1148987)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-01"/>
	<updated date="2019-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1148987">SUSE bug 1148987</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13627">CVE-2019-13627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522236" comment="libgcrypt20-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522237" comment="libgcrypt20-32bit-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530714" comment="libgcrypt20-hmac-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530715" comment="libgcrypt20-hmac-32bit-1.6.1-16.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148198" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1087200" ref_url="https://bugzilla.suse.com/1087200" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1117473" ref_url="https://bugzilla.suse.com/1117473" source="BUGZILLA"/>
		<reference ref_id="1123482" ref_url="https://bugzilla.suse.com/1123482" source="BUGZILLA"/>
		<reference ref_id="1124525" ref_url="https://bugzilla.suse.com/1124525" source="BUGZILLA"/>
		<reference ref_id="1133810" ref_url="https://bugzilla.suse.com/1133810" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="1145665" ref_url="https://bugzilla.suse.com/1145665" source="BUGZILLA"/>
		<reference ref_id="1149323" ref_url="https://bugzilla.suse.com/1149323" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Updated to new ESR version 68.1 (bsc#1149323).

In addition to the already fixed vulnerabilities released in previous ESR updates,
the following were also fixed:
    CVE-2019-11751, CVE-2019-11736, CVE-2019-9812, CVE-2019-11748, CVE-2019-11749,
    CVE-2019-11750, CVE-2019-11738, CVE-2019-11747, CVE-2019-11735.

Several run-time issues were also resolved (bsc#1117473, bsc#1124525, bsc#1133810).

The version displayed in Help &gt; About is now correct (bsc#1087200).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-09"/>
	<updated date="2019-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087200">SUSE bug 1087200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117473">SUSE bug 1117473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123482">SUSE bug 1123482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124525">SUSE bug 1124525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133810">SUSE bug 1133810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145665">SUSE bug 1145665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11710">CVE-2019-11710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11714">CVE-2019-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11716">CVE-2019-11716 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11718">CVE-2019-11718 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11720">CVE-2019-11720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11721">CVE-2019-11721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11723">CVE-2019-11723 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11724">CVE-2019-11724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11725">CVE-2019-11725 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11727">CVE-2019-11727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11728">CVE-2019-11728 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11733">CVE-2019-11733 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11735">CVE-2019-11735 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11736">CVE-2019-11736 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11738">CVE-2019-11738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11747">CVE-2019-11747 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11748">CVE-2019-11748 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11749">CVE-2019-11749 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11750">CVE-2019-11750 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11751">CVE-2019-11751 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11753">CVE-2019-11753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148199" version="1" class="patch">
	<metadata>
		<title>Recommended update for python-setuptools and dependend packages (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1024540" ref_url="https://bugzilla.suse.com/1024540" source="BUGZILLA"/>
		<reference ref_id="1054413" ref_url="https://bugzilla.suse.com/1054413" source="BUGZILLA"/>
		<reference ref_id="1074247" ref_url="https://bugzilla.suse.com/1074247" source="BUGZILLA"/>
		<reference ref_id="1075812" ref_url="https://bugzilla.suse.com/1075812" source="BUGZILLA"/>
		<reference ref_id="1088358" ref_url="https://bugzilla.suse.com/1088358" source="BUGZILLA"/>
		<reference ref_id="1091826" ref_url="https://bugzilla.suse.com/1091826" source="BUGZILLA"/>
		<reference ref_id="1110422" ref_url="https://bugzilla.suse.com/1110422" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9015" ref_url="https://www.suse.com/security/cve/CVE-2016-9015/" source="CVE"/>
		<reference ref_id="SUSE-RU-2019:2627-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012691.html" source="SUSE-SU"/>
		<description>

All changes necessary for upgrade of python-setuptools to 40.6.2 (bsc#1075812)

New packages:
- python-cachetools
- python-google-auth
- python-packaging

Rebuilt without source changes:

- python-cffi
- python-cliff
- python-mock
- python-oauthlib
- python-pbr
- python-PyJWT
- python-pytest

Added python3 packages:

- python-hgtools
- python-pyasn1-modules
- python-rsa

Updated:

- python-kubernetes
  Updated to version 6.0

- python-pyparsing

  Was updated to version 2.2.0.

- python-setuptools

  Was upgraded to version 40.6.2.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-11"/>
	<updated date="2019-10-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024540">SUSE bug 1024540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054413">SUSE bug 1054413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074247">SUSE bug 1074247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075812">SUSE bug 1075812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088358">SUSE bug 1088358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091826">SUSE bug 1091826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110422">SUSE bug 1110422</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9015/">CVE-2016-9015 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9015">CVE-2016-9015 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009561946" comment="python-oauthlib-0.7.2-3.9.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148200" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1109412" ref_url="https://bugzilla.suse.com/1109412" source="BUGZILLA"/>
		<reference ref_id="1109413" ref_url="https://bugzilla.suse.com/1109413" source="BUGZILLA"/>
		<reference ref_id="1109414" ref_url="https://bugzilla.suse.com/1109414" source="BUGZILLA"/>
		<reference ref_id="1111996" ref_url="https://bugzilla.suse.com/1111996" source="BUGZILLA"/>
		<reference ref_id="1112534" ref_url="https://bugzilla.suse.com/1112534" source="BUGZILLA"/>
		<reference ref_id="1112535" ref_url="https://bugzilla.suse.com/1112535" source="BUGZILLA"/>
		<reference ref_id="1113247" ref_url="https://bugzilla.suse.com/1113247" source="BUGZILLA"/>
		<reference ref_id="1113252" ref_url="https://bugzilla.suse.com/1113252" source="BUGZILLA"/>
		<reference ref_id="1113255" ref_url="https://bugzilla.suse.com/1113255" source="BUGZILLA"/>
		<reference ref_id="1116827" ref_url="https://bugzilla.suse.com/1116827" source="BUGZILLA"/>
		<reference ref_id="1118830" ref_url="https://bugzilla.suse.com/1118830" source="BUGZILLA"/>
		<reference ref_id="1118831" ref_url="https://bugzilla.suse.com/1118831" source="BUGZILLA"/>
		<reference ref_id="1120640" ref_url="https://bugzilla.suse.com/1120640" source="BUGZILLA"/>
		<reference ref_id="1121034" ref_url="https://bugzilla.suse.com/1121034" source="BUGZILLA"/>
		<reference ref_id="1121035" ref_url="https://bugzilla.suse.com/1121035" source="BUGZILLA"/>
		<reference ref_id="1121056" ref_url="https://bugzilla.suse.com/1121056" source="BUGZILLA"/>
		<reference ref_id="1133131" ref_url="https://bugzilla.suse.com/1133131" source="BUGZILLA"/>
		<reference ref_id="1133232" ref_url="https://bugzilla.suse.com/1133232" source="BUGZILLA"/>
		<reference ref_id="1141913" ref_url="https://bugzilla.suse.com/1141913" source="BUGZILLA"/>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000876" ref_url="https://www.suse.com/security/cve/CVE-2018-1000876/" source="CVE"/>
		<reference ref_id="CVE-2018-17358" ref_url="https://www.suse.com/security/cve/CVE-2018-17358/" source="CVE"/>
		<reference ref_id="CVE-2018-17359" ref_url="https://www.suse.com/security/cve/CVE-2018-17359/" source="CVE"/>
		<reference ref_id="CVE-2018-17360" ref_url="https://www.suse.com/security/cve/CVE-2018-17360/" source="CVE"/>
		<reference ref_id="CVE-2018-17985" ref_url="https://www.suse.com/security/cve/CVE-2018-17985/" source="CVE"/>
		<reference ref_id="CVE-2018-18309" ref_url="https://www.suse.com/security/cve/CVE-2018-18309/" source="CVE"/>
		<reference ref_id="CVE-2018-18483" ref_url="https://www.suse.com/security/cve/CVE-2018-18483/" source="CVE"/>
		<reference ref_id="CVE-2018-18484" ref_url="https://www.suse.com/security/cve/CVE-2018-18484/" source="CVE"/>
		<reference ref_id="CVE-2018-18605" ref_url="https://www.suse.com/security/cve/CVE-2018-18605/" source="CVE"/>
		<reference ref_id="CVE-2018-18606" ref_url="https://www.suse.com/security/cve/CVE-2018-18606/" source="CVE"/>
		<reference ref_id="CVE-2018-18607" ref_url="https://www.suse.com/security/cve/CVE-2018-18607/" source="CVE"/>
		<reference ref_id="CVE-2018-19931" ref_url="https://www.suse.com/security/cve/CVE-2018-19931/" source="CVE"/>
		<reference ref_id="CVE-2018-19932" ref_url="https://www.suse.com/security/cve/CVE-2018-19932/" source="CVE"/>
		<reference ref_id="CVE-2018-20623" ref_url="https://www.suse.com/security/cve/CVE-2018-20623/" source="CVE"/>
		<reference ref_id="CVE-2018-20651" ref_url="https://www.suse.com/security/cve/CVE-2018-20651/" source="CVE"/>
		<reference ref_id="CVE-2018-20671" ref_url="https://www.suse.com/security/cve/CVE-2018-20671/" source="CVE"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

binutils was updated to current 2.32 branch @7b468db3 [jsc#ECO-368]:

Includes the following security fixes:

- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)
- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)
- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)
- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)
- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)
- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)
- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)
- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)
- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)
- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)
- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)
- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)
- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)
- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)
- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in  load_specific_debug_section in objdump.c (bsc#1121056)
- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)
- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)

- Enable xtensa architecture (Tensilica lc6 and related)
- Use -ffat-lto-objects in order to provide assembly for static libs
  (bsc#1141913).
- Fixed some LTO problems (bsc#1133131 bsc#1133232).
- riscv: Don't check ABI flags if no code section

Update to binutils 2.32:

* The binutils now support for the C-SKY processor series.
* The x86 assembler now supports a -mvexwig=[0|1] option to control
  encoding of VEX.W-ignored (WIG) VEX instructions.
  It also has a new -mx86-used-note=[yes|no] option to generate (or
  not) x86 GNU property notes.
* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),
  the Loongson EXTensions (EXT) instructions, the Loongson Content
  Address Memory (CAM) ASE and the Loongson MultiMedia extensions
  Instructions (MMI) ASE.
* The addr2line, c++filt, nm and objdump tools now have a default
  limit on the maximum amount of recursion that is allowed whilst
  demangling strings.  This limit can be disabled if necessary.
* Objdump's --disassemble option can now take a parameter,
  specifying the starting symbol for disassembly.  Disassembly will
  continue from this symbol up to the next symbol or the end of the
  function.
* The BFD linker will now report property change in linker map file
  when merging GNU properties.
* The BFD linker's -t option now doesn't report members within
  archives, unless -t is given twice.  This makes it more useful
  when generating a list of files that should be packaged for a
  linker bug report.
* The GOLD linker has improved warning messages for relocations that
  refer to discarded sections.

- Improve relro support on s390 [fate#326356]
- Handle ELF compressed header alignment correctly.

  		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-14"/>
	<updated date="2019-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109412">SUSE bug 1109412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109413">SUSE bug 1109413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109414">SUSE bug 1109414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111996">SUSE bug 1111996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112534">SUSE bug 1112534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112535">SUSE bug 1112535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113247">SUSE bug 1113247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113252">SUSE bug 1113252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113255">SUSE bug 1113255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116827">SUSE bug 1116827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118830">SUSE bug 1118830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118831">SUSE bug 1118831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120640">SUSE bug 1120640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121034">SUSE bug 1121034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121035">SUSE bug 1121035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121056">SUSE bug 1121056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133131">SUSE bug 1133131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133232">SUSE bug 1133232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141913">SUSE bug 1141913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000876/">CVE-2018-1000876 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000876">CVE-2018-1000876 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17358/">CVE-2018-17358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17358">CVE-2018-17358 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17359/">CVE-2018-17359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17359">CVE-2018-17359 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17360/">CVE-2018-17360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17360">CVE-2018-17360 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17985/">CVE-2018-17985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17985">CVE-2018-17985 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18309/">CVE-2018-18309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18309">CVE-2018-18309 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18483/">CVE-2018-18483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18483">CVE-2018-18483 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18484/">CVE-2018-18484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18484">CVE-2018-18484 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18605/">CVE-2018-18605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18605">CVE-2018-18605 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18606/">CVE-2018-18606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18606">CVE-2018-18606 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18607/">CVE-2018-18607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18607">CVE-2018-18607 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19931/">CVE-2018-19931 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19931">CVE-2018-19931 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19932/">CVE-2018-19932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19932">CVE-2018-19932 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20623/">CVE-2018-20623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20623">CVE-2018-20623 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20651/">CVE-2018-20651 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20651">CVE-2018-20651 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20671/">CVE-2018-20671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20671">CVE-2018-20671 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010180">CVE-2019-1010180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148201" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1153674" ref_url="https://bugzilla.suse.com/1153674" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006015.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

Security issue fixed: 	  

- CVE-2019-14287: Fixed an issue where a user with sudo privileges
  that allowed them to run commands with an arbitrary uid, could
  run commands as root, despite being forbidden to do so in sudoers
  (bsc#1153674).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14287">CVE-2019-14287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522249" comment="sudo-1.8.20p2-3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148202" version="1" class="patch">
	<metadata>
		<title>Security update for libpcap (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1153332" ref_url="https://bugzilla.suse.com/1153332" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2019-15165" ref_url="https://www.suse.com/security/cve/CVE-2019-15165/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006016.html" source="SUSE-SU"/>
		<description>
This update for libpcap fixes the following issues:

- CVE-2019-15165: Added sanity checks for PHB header length before allocating memory (bsc#1153332).
- CVE-2018-16301: Fixed a buffer overflow (bsc#1153332).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15165/">CVE-2019-15165 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15165">CVE-2019-15165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522250" comment="libpcap1-1.8.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522252" comment="tcpdump-4.9.2-14.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148203" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126197" ref_url="https://bugzilla.suse.com/1126197" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1133818" ref_url="https://bugzilla.suse.com/1133818" source="BUGZILLA"/>
		<reference ref_id="1143797" ref_url="https://bugzilla.suse.com/1143797" source="BUGZILLA"/>
		<reference ref_id="1146874" ref_url="https://bugzilla.suse.com/1146874" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-17340" ref_url="https://www.suse.com/security/cve/CVE-2019-17340/" source="CVE"/>
		<reference ref_id="CVE-2019-17341" ref_url="https://www.suse.com/security/cve/CVE-2019-17341/" source="CVE"/>
		<reference ref_id="CVE-2019-17342" ref_url="https://www.suse.com/security/cve/CVE-2019-17342/" source="CVE"/>
		<reference ref_id="CVE-2019-17343" ref_url="https://www.suse.com/security/cve/CVE-2019-17343/" source="CVE"/>
		<reference ref_id="CVE-2019-17344" ref_url="https://www.suse.com/security/cve/CVE-2019-17344/" source="CVE"/>
		<reference ref_id="CVE-2019-17345" ref_url="https://www.suse.com/security/cve/CVE-2019-17345/" source="CVE"/>
		<reference ref_id="CVE-2019-17346" ref_url="https://www.suse.com/security/cve/CVE-2019-17346/" source="CVE"/>
		<reference ref_id="CVE-2019-17347" ref_url="https://www.suse.com/security/cve/CVE-2019-17347/" source="CVE"/>
		<reference ref_id="CVE-2019-17348" ref_url="https://www.suse.com/security/cve/CVE-2019-17348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed: 	  

- CVE-2019-15890: Fixed a use-after-free in SLiRP networking implementation of QEMU emulator
  which could have led to Denial of Service (bsc#1149813).
- CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite loop and denial of 
  service (bsc#1146874).
- CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking implementation of QEMU 
  emulator which could have led to execution of  arbitrary code with privileges of the 
  QEMU process (bsc#1143797).

Other issue fixed: 

- Fixed an issue where libxenlight could not restore domain vsa6535522 on live migration (bsc#1133818).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-24"/>
	<updated date="2019-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126197">SUSE bug 1126197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133818">SUSE bug 1133818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146874">SUSE bug 1146874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12068">CVE-2019-12068 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14378">CVE-2019-14378 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17340/">CVE-2019-17340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17340">CVE-2019-17340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17341/">CVE-2019-17341 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17341">CVE-2019-17341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17342/">CVE-2019-17342 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17342">CVE-2019-17342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17343/">CVE-2019-17343 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17343">CVE-2019-17343 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17344/">CVE-2019-17344 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17344">CVE-2019-17344 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17345/">CVE-2019-17345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17345">CVE-2019-17345 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17346/">CVE-2019-17346 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17346">CVE-2019-17346 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17347/">CVE-2019-17347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17347">CVE-2019-17347 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17348/">CVE-2019-17348 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17348">CVE-2019-17348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538307" comment="xen-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538308" comment="xen-doc-html-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538309" comment="xen-libs-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538310" comment="xen-libs-32bit-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538311" comment="xen-tools-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538312" comment="xen-tools-domU-4.9.4_04-3.56.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148204" version="1" class="patch">
	<metadata>
		<title>Security update for nfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1150733" ref_url="https://bugzilla.suse.com/1150733" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3689" ref_url="https://www.suse.com/security/cve/CVE-2019-3689/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2781-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192781-1.html" source="SUSE-SU"/>
		<description>
This update for nfs-utils fixes the following issues:

- CVE-2019-3689: Fixed root-owned files stored in insecure /var/lib/nfs. (bsc#1150733)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-25"/>
	<updated date="2019-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150733">SUSE bug 1150733</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3689/">CVE-2019-3689 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3689">CVE-2019-3689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522280" comment="nfs-client-1.3.0-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530719" comment="nfs-doc-1.3.0-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522281" comment="nfs-kernel-server-1.3.0-34.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148205" version="1" class="patch">
	<metadata>
		<title>Security update for ardana-ansible, ardana-glance, ardana-horizon, ardana-input-model, ardana-manila, ardana-neutron, ardana-nova, ardana-octavia, ardana-tempest, crowbar-core, crowbar-ha, crowbar-openstack, crowbar-ui, galera-3, grafana, mariadb, mariadb-connector-c, novnc, openstack-cinder, openstack-glance, openstack-heat, openstack-horizon-plugin-neutron-vpnaas-ui, openstack-keystone, openstack-monasca-installer, openstack-neutron, openstack-neutron-gbp, openstack-neutron-lbaas, openstack-nova, python-amqp, python-ovs, python-pysaml2, python-python-engineio, python-urllib3, release-notes-suse-openstack-cloud, rubygem-easy_diff, rubygem-rest-client-1_6, venv-openstack-keystone (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1019074" ref_url="https://bugzilla.suse.com/1019074" source="BUGZILLA"/>
		<reference ref_id="1096985" ref_url="https://bugzilla.suse.com/1096985" source="BUGZILLA"/>
		<reference ref_id="1106515" ref_url="https://bugzilla.suse.com/1106515" source="BUGZILLA"/>
		<reference ref_id="1115960" ref_url="https://bugzilla.suse.com/1115960" source="BUGZILLA"/>
		<reference ref_id="1116846" ref_url="https://bugzilla.suse.com/1116846" source="BUGZILLA"/>
		<reference ref_id="1118900" ref_url="https://bugzilla.suse.com/1118900" source="BUGZILLA"/>
		<reference ref_id="1120657" ref_url="https://bugzilla.suse.com/1120657" source="BUGZILLA"/>
		<reference ref_id="1125893" ref_url="https://bugzilla.suse.com/1125893" source="BUGZILLA"/>
		<reference ref_id="1126088" ref_url="https://bugzilla.suse.com/1126088" source="BUGZILLA"/>
		<reference ref_id="1132593" ref_url="https://bugzilla.suse.com/1132593" source="BUGZILLA"/>
		<reference ref_id="1132666" ref_url="https://bugzilla.suse.com/1132666" source="BUGZILLA"/>
		<reference ref_id="1136035" ref_url="https://bugzilla.suse.com/1136035" source="BUGZILLA"/>
		<reference ref_id="1141121" ref_url="https://bugzilla.suse.com/1141121" source="BUGZILLA"/>
		<reference ref_id="1141676" ref_url="https://bugzilla.suse.com/1141676" source="BUGZILLA"/>
		<reference ref_id="1143215" ref_url="https://bugzilla.suse.com/1143215" source="BUGZILLA"/>
		<reference ref_id="1145796" ref_url="https://bugzilla.suse.com/1145796" source="BUGZILLA"/>
		<reference ref_id="1146578" ref_url="https://bugzilla.suse.com/1146578" source="BUGZILLA"/>
		<reference ref_id="1148158" ref_url="https://bugzilla.suse.com/1148158" source="BUGZILLA"/>
		<reference ref_id="1148383" ref_url="https://bugzilla.suse.com/1148383" source="BUGZILLA"/>
		<reference ref_id="1150895" ref_url="https://bugzilla.suse.com/1150895" source="BUGZILLA"/>
		<reference ref_id="917802" ref_url="https://bugzilla.suse.com/917802" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3448" ref_url="https://www.suse.com/security/cve/CVE-2015-3448/" source="CVE"/>
		<reference ref_id="CVE-2016-10127" ref_url="https://www.suse.com/security/cve/CVE-2016-10127/" source="CVE"/>
		<reference ref_id="CVE-2018-15727" ref_url="https://www.suse.com/security/cve/CVE-2018-15727/" source="CVE"/>
		<reference ref_id="CVE-2018-19039" ref_url="https://www.suse.com/security/cve/CVE-2018-19039/" source="CVE"/>
		<reference ref_id="CVE-2018-558213" ref_url="https://www.suse.com/security/cve/CVE-2018-558213/" source="CVE"/>
		<reference ref_id="CVE-2019-13611" ref_url="https://www.suse.com/security/cve/CVE-2019-13611/" source="CVE"/>
		<reference ref_id="CVE-2019-15043" ref_url="https://www.suse.com/security/cve/CVE-2019-15043/" source="CVE"/>
		<reference ref_id="CVE-2019-2614" ref_url="https://www.suse.com/security/cve/CVE-2019-2614/" source="CVE"/>
		<reference ref_id="CVE-2019-2627" ref_url="https://www.suse.com/security/cve/CVE-2019-2627/" source="CVE"/>
		<reference ref_id="CVE-2019-2628" ref_url="https://www.suse.com/security/cve/CVE-2019-2628/" source="CVE"/>
		<reference ref_id="CVE-2019-5477" ref_url="https://www.suse.com/security/cve/CVE-2019-5477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2867-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192867-1.html" source="SUSE-SU"/>
		<description>
This update for ardana-ansible, ardana-glance, ardana-horizon, ardana-input-model, ardana-manila, ardana-neutron, ardana-nova, ardana-octavia, ardana-tempest, crowbar-core, crowbar-ha, crowbar-openstack, crowbar-ui, galera-3, grafana, mariadb, mariadb-connector-c, novnc, openstack-cinder, openstack-glance, openstack-heat, openstack-horizon-plugin-neutron-vpnaas-ui, openstack-keystone, openstack-monasca-installer, openstack-neutron, openstack-neutron-gbp, openstack-neutron-lbaas, openstack-nova, python-amqp, python-ovs, python-pysaml2, python-python-engineio, python-urllib3, release-notes-suse-openstack-cloud, rubygem-easy_diff, rubygem-rest-client-1_6, venv-openstack-keystone contains the following fixes:

- Update to version 8.0+git.1566374355.c509923:
  * Use raw image format when using SES backend on Nova (SOC-9285)

- Update to version 8.0+git.1566376789.be0fe01:
  * Configure glance image_direct_url/multiple_locations (SOC-9285)

- Update to version 8.0+git.1565816064.5d4f73f:
  * Removed None condition from rule (SOC-10003)

- Update to version 8.0+git.1566517401.98450e6:
  * Add neutron-fwaas.json when neutron-l3-agent is deployed (SOC-10280)

- Update to version 8.0+git.1568835837.2452e7a:
  * Ensure Manila services don't auto start on reboot (SOC-10641)

- Update to version 8.0+git.1568220097.74ee4b4:
  * API extension paths separated by colon (SOC-10447)

- Update to version 8.0+git.1567555448.5ecd5b0:
  * Add dependent services to neutron services (SOC-8746)

- Update to version 8.0+git.1566517377.f2a8c54:
  * Add policy.d/neutron-fwaas.json.j2 (SOC-10280)

- Update to version 8.0+git.1566902754.c58ff69:
  * Install libosinfo package (SOC-10295)

- Update to version 8.0+git.1565946419.a76c00e:
  * Set diskcachemode and disk discard when using RBD (SOC-10182)

- Update to version 8.0+git.1568373448.bcaee7e:
  * Make octavia heartbeat frequency options configurable (SOC-9285)

- Update to version 8.0+git.1566374572.a3c91d9:
  * Include SES variables when configuring image (SOC-9285)

- Update to version 8.0+git.1566208257.5213d93:
  * Use default values for amphora connection retries/timeout (SOC-9285)

- Update to version 8.0+git.1566471887.fd2fec7:
  * Delete existing run filter before deploying it (SOC-10287)

- Update to version 5.0+git.1569597589.1f025c557:
  * barclamp_lib: Sync timeout with other barclamps (SOC-10513, SOC-10011)

- Update to version 5.0+git.1569231378.ac645b753:
  * Revert 'batch: Use easy_merge for merging (SOC-10505)'

- Update to version 5.0+git.1569103607.ee4a6cbc9:
  * upgrade: Fix pie chart colors on dashboard (SOC-10619)

- Update to version 5.0+git.1568983947.70c39b8c7:
  * batch: Use easy_merge for merging (SOC-10505)

- Update to version 5.0+git.1568317972.dfb856def:
  * upgrade: Fix pre-checks tests (SOC-9868)
  * Allow designate rndc for all nodes (SOC-10339)

- Update to version 5.0+git.1568210854.4f87b86f8:
  * gems: Update easy_diff to 1.0.0 (SOC-10505)

- Update to version 5.0+git.1567531836.e06d68030:
  * Public ips for dns nodes when designate integration is in use (SOC-9635)

- Update to version 5.0+git.1567513044.e9ef28b03:
  * crowbar: Do not read /etc/crowbar.install.key in non-SUSE init script
  * transition.sh: Do not read /etc/crowbar.install.key
  * gather_logs: Make it a bit useful again
  * gather_logs: Do not read /etc/crowbar.install.key
  * network: Check existing upper layers before bond setup  (bsc#1120657)
  * network: never plug two interface into the same ovs bridge (bsc#1120657)
  * network: Avoid plugging the same interface to two ovs bridges (bsc#1120657)
  * nic library: some helper for identifying base interface (bsc#1120657)
  * network: Rework the vlan port replugging code (bsc#1120657)
  * network: DRY out 'kill_nic_files' (noref)

- Update to version 5.0+git.1567161136.fa34ac9f2:
  * Add CVE-2019-5477 the to travis ignore list (SOC-9635)

- Update to version 5.0+git.1567094388.48f2be817:
  * upgrade: Add more prechecks for 8-&gt;9 (SOC-9868)

- Update to version 5.0+git.1567673535.607aada:
  * Fix typo in error message

- add cirros-0.4.0-x86_64-disk.img (SOC-9298, SOC-10844)
* the disk img is required to run the barbican tempest test

- Update to version 5.0+git.1570141351.058c8bd44:
  * tempest:install designate tempest plugin for SOC8 (SOC-10288)

- Update to version 5.0+git.1569972328.9d475ceb9:
  * [5.0] Designate: Add dns_domain_ports config (SOC-10740)

- Update to version 5.0+git.1569933916.d38d07e2d:
  * Install barbican tempest plugin for SOC8 (SOC-10191)
  * Designate: Filter out the admin node (SOC-10658)

- Update to version 5.0+git.1569885207.573f090bd:
  * 5.0: designate: Fix the keys syntax error on migrations (SOC-10660)

- Update to version 5.0+git.1569620621.21c6c5459:
  * helper:move config_for_role_exists from horizon to crowbar-openstack(SOC-10191)

- Update to version 5.0+git.1569431597.02675553d:
  * tempest: don't rely on service catalogue (SOC-10633)
  * glance: don't reuse sync mark names (SOC-10348)
  * enable LDAP chase_referrals configuration (SOC-7364)
  * nova: set default attribute for max_threads_per_process

- Update to version 5.0+git.1569053854.bb65c0fd1:
  * Make ovs of_inactivity_probe configurable from neutron barclamp

- Update to version 5.0+git.1568904694.4d6e71fd1:
  * Revert 'designate: Mark as user managed (SOC-10233)'

- Update to version 5.0+git.1568762121.5889ee9c4:
  * Octavia: Hide UI until complete (SOC-10550)

- Update to version 5.0+git.1568721569.5927d34b8:
  * designate: Mark as user managed (SOC-10233)

- Update to version 5.0+git.1568593066.8a7e963dd:
  * designate: cleanup producer HA deployment (SOC-9766)

- Update to version 5.0+git.1568373930.d508e93f7:
  * designate: Correct missing variable (SOC-10549)

- Update to version 5.0+git.1568323106.c080edcc1:
  * neutron: Add 'insecure' to old cli calls (SOC-10453)

- Update to version 5.0+git.1568303804.bd258bef6:
  * designate: No longer care about master/slave (SOC-10456)

- Update to version 5.0+git.1568173760.4a32699b1:
  * nova: raise neutron client timeout to 5 minutes
  * neutron: Small cleanup to neutron_lbaas.conf template

- Update to version 5.0+git.1568117991.15d77c6ea:
  * Designate default Bind9 pool config (SOC-10339)

- Update to version 5.0+git.1568034797.254b8fb85:
  * tempest: Skip manila and ceilometer tests (SOC-9799)

- Update to version 5.0+git.1567660321.885064382:
  * nova: Don't put nova-compute roles on monasca node (SOC-10373)

- Update to version 5.0+git.1567513535.f2939eeed:
  * designate: Update ns_records with all nameservers (SOC-9636)
  * designate: Deploy producer on a server node (SOC-9766)

- Update to version 5.0+git.1567165725.8d5b4fa26:
  * horizon: fix Grafana in HA clouds (bsc#1116846)

- Update to version 5.0+git.1567094879.c918a5e23:
  * Fix barbican SSL support (SOC-9298)
  * Add/fix run_filters
  * Add tempest filters based on services (SOC-9298)

- Update to version 5.0+git.1566858336.891ddbf31:
  * Fix magnum tempest tests (SOC-9298)
  * tempest: only assign creator role if needed
  * database: Hardcode ruby version for package installation (SOC-10010)

- Update to version 5.0+git.1566838653.efe3b147d:
  * memcache: lookup memcached servers port only on local node (SOC-10173)
  * designate: initialize email in default designate proposal
  * horizon: Install designate plugin when configured (SOC-9695)

- Update to version 5.0+git.1566629404.88dae370a:
  * Designate: Update DB pools configuration (SOC-9767)

- Update to version 5.0+git.1566256160.59ebd76c0:
  * designate: Configure resource settings (SOC-9633)

- Update to version 1.2.0+git.1568396400.0344a727:
  * upgrade: Add missing precheck titles

- Update to 25.3.25:
  * A new Galera configuration parameter cert.optimistic_pa was added. If the
    parameter value is set to true, full parallellization in applying write
    sets is allowed as determined by certification algorithm. If set to false,
    no more parallellism is allowed in applying than seen on the master.
  * Support for ECDH OpenSSL engines on CentOS 6 (galera#520)
  * Fixed compilation on Debian testing and unstable (galera#516, galera#528)

- Add unescape_IPv6_bind_ip.patch
  * https://github.com/dciabrin/galera-1/commit/0f6f8aeeb09809280c956514cfd5844b8acad4f9

- Add CVE-2019-15043.patch (SOC-10357)
  * Adds authentication to a few rest endpoints
    see: https://github.com/grafana/grafana/compare/v5.4.4...v5.4.5

- Update to version 4.6.5:
  * release 4.6.5
    CVE-2018-19039 (jsc#SOC-9976)
    File Exfiltration vulnerability Security fix
  * Updated version to 4.6.4.
    CVE-2018-558213/CVE-2018-558213 (jsc#SOC-9980)
    Important fix for LDAP &amp; OAuth login vulnerability
  * Updated version to 4.6.4.
  * sql: added code migration type
  * release 4.6.3
  * fix default alias
  * fixes broken alert eval when first condition is using OR
  * fix: alert list panel now works correctly after adding manual annotation on dashboard, fixes #9951
  * fix: fix for avatar images when gzip is turned on, fixes #5952
  * sets version to 4.6.2
  * prom: add support for default step param (#9866)
  * build: fixed jshint error
  * fix: Html escaping caused issue in InfluxDB query editor,  could not pick greater than or less then operators, fixes #9871
  * heatmap: fix tooltip in 'Time series bucket' mode, #9332 (#9867)
  * fix cloudwatch ec2_instance_attribute (#9718)
  * colorpicker: fix color string change #9769 (#9780)
  * changes version to 4.6.1
  * fix: panel view now wraps, no scrolling required, fixes #9746
  * plugins: fix for loading external plugins behind auth proxy, fixes #9509
  * fix: color picker bug at series overrides page, #9715 (#9738)
  * tech: switch to golang 1.9.2
  * tech: add missing include
  * save as should only delete threshold for panels with alerts
  * fix: graphite annotation tooltip included undefined, fixes #9707
  * build: updated version to v4.6.0
  * plugins: added backward compatible path for rxjs
  * ux: updated singlestat default colors
  * prometheus: fixed unsaved changes warning when changing time range due to step option on query model was changed in datasource.query code, fixes #9675
  * fix: firefox can now create region annotations, fixes #9638
  * alerting: only editors can pause rules
  * fix: another fix for playlist view state, #9639
  * fix: fixed playlist controls and view state, fixes #9639
  * prom: adds pre built grafana dashboard
  * bump version for publish_testing.sh
  * update version to 4.6.0-beta3
  * plugins: expose dashboard impression store
  * modify $__timeGroup macro so it can be used in select clause (#9527)
  * plugins: fixes path issue on Windows
  * prometheus: enable gzip for /metrics endpoint
  * fix: fixed save to file button in export modal, fixes #9586
  * mysql: add usage stats for mysql
  * pluginloader: esModule true for systemjs config
  * Fix heatmap Y axis rendering (#9580)
  * fix vector range
  * prometheus: add builtin template variable as range vectors
  * fix: fixed prometheus step issue that caused browser crash, fixes #9575
  * fix: getting started panel and mark adding data source as done, fixes #9568
  * Fixes for annotations API (#9577)
  * bump packagecloud script
  * build: added imports of rxjs utility functions
  * prepare for v4.6.0-beta2 release
  * fix template variable expanding
  * annotations: quote reserved fields (#9550)
  * ux: align alert and btn colors
  * fix: fixed color pickers that were broken in minified builds, fixes #9549
  * textpanel: fixes #9491
  * csv: fix import for saveAs shim
  * plugins: expose more util and flot dependencies
  * alert_tab: clear test result when testing rules
  * (cloudwatch) fix cloudwatch query error over 24h (#9536)
  * show error message when cloudwatch datasource can't add
  * update packagecloud script for 4.6.0-beta1
  * changelog: adds note about closing #9516
  * alerting: add count_non_null reducer
  * Update rpm.md
  * fix: can now remove annotation tags without popover closing
  * tech: add backward compatibility for &lt;spectrum-picker&gt; directive (#9510)
  * fix: fixed links on new 404 page, fixes #9493
  * logging: dont use cli logger in http_server
  * oauth: raise error if session state is missing
  * oauth: provide more logging for failed oauth requests
  * prepare for 4.6.0-beta1 release
  * docs: updated whats new article
  * docs: initial draft release v46
  * graph: fix y-axis decimalTick check. Fixes #9405
  * minor docs update
  * docs: annotation docs update
  * changelog: adds note about closing #7104
  * changelog: adds note about closing #9373
  * metrics: disable gzip for /metrics endpoint (#9468)
  * Annotation docs (#9506)
  * Update CHANGELOG.md
  * Update PLUGIN_DEV.md
  * Update PLUGIN_DEV.md
  * Update README.md
  * Fixed link issue in CHANGELOG
  * Create PLUGIN_DEV.md
  * changelog: adds note about closing #9371,#5334,#8812
  * ds_edit: placeholder should only be cert header
  * fixed minor styling issus (#9497)
  * fix: alert api limit param did not work and caused SQL syntax error, fixes #9492
  * annotations: add endpoint for writing graphite-like events (#9495)
  * Update unsaved_changes_modal.ts
  * fix: set lastSeenAt date when creating users to then years in past insteasd of empty date, fixes #9260
  * ux: minor ux fix
  * Retain old name for TLS client auth
  * Return error if datasource TLS CA not parsed
  * Datasource settings: Make HTTP all caps
  * Datasource HTTP settings: Add TLS skip verify
  * Make URL capitalisation consistent in UI
  * Alias macron package in app_routes.go
  * Verify datasource TLS and split client auth and CA
  * Tidy spacing in datasource TLS settings
  * Tests: Clarify what InsecureSkipVerify does
  * postgres: add missing ngInject decorator
  * docs: initial docs for new annotation features, #9483
  * Adds note for #9209 to changelog
  * Postgres Data Source  (#9475)
  * tech: expose more to plugins, closes #9456
  * Fix NaN handling (#9469)
  * snapshots: improve snapshot listing performance, #9314 (#9477)
  * mysql: fix interpolation for numbers in temp vars
  * Added docs for Kafka alerting
  * Fixed failing go tests
  * gofmt fixes
  * Added tests
  * Kafka REST Proxy works with Grafana
  * added insrtuctions for oauth2 okta bitbucket (#9471)
  * Unified Color picker fixes (#9466)
  * Show min interval query option for mixed datasource (#9467)
  * gzip: plugin readme content set explicitly
  * ignore pattern for vendored libs
  * fix: escape metric segment auto complete, fixes #9423
  * Corrected a PostgreSQL SELECT statement. (#9460)
  * tests: found the unhandled promise issue in the dash import tests
  * testing: fixing tests
  * annotations: minor change to default/edit annotation color
  * Create annotations (#8197)
  * OAuth: Rename sslcli
  * OAuth: Separate TLS client auth and CA config
  * OAuth: Check both TLS client cert and key
  * Always verify TLS unless explicitly told otherwise
  * fix: threshold's colors in table panels (#9445) (#9453)
  * singlestat: fix sizing bug #9337 (#9448)
  * Revert 'Fix coloring in singlestat if null value (#9438)' (#9443)
  * Fix coloring in singlestat if null value (#9438)
  * fix: missing semicolon
  * changed jsontree to use jsonexplorer (#9416)
  * docs page for authproxy (#9420)
  * Update codebox (#9430)
  * Series color picker fix (#9442)
  * fix type in readme
  * removed commented line
  * changelog: adds note about closing #9110
  * Fixed typo
  * Change empty string checks and improve logging
  * changelog: adds note about closing #9208
  * Fix spelling on 404 page.
  * Lint fix
  * Update kbn.js
  * Add Norwegian Krone denominator for currency
  * fixed layout for column options, changed dropdown for date format kept old code
  * build: add noUnusedLocals to tsc parameters
  * build: install go based on env variable
  * changes go version to 1.9.1
  * changelog: adds note about closing #9226
  * changelog: add note about closing #9429
  * changelog: adds note about closing #9399
  * Fix formatting issue
  * Add milliseconds format in table panel's config
  * support for s3 path (#9151)
  * Remove apparently unnecessary .flush() calls.
  * Fix empty message and toolong attribute names Use default state message if no message is provided by the user Slice attribute name to maximum of 50 chars
  * Address review comments.
  * changelog: add note about closing #7175
  * plugin_loader: expose app_events to plugins
  * Add the missing comma
  * colorpicker: refactoring the new unififed colorpicker, #9347
  * Unified colorpicker (#9347)
  * fix missing column headers in excel export (#9413)
  * build: remove clean plugin from dev build
  * build: fixed broken elastic unit test
  * shore: cleanup unused stuff in common.d.ts
  * Build URL for close alert request differently
  * some restyling (#9409)
  * Docs text fixes (#9408)
  * Checkbox fixes (#9400)
  * fix: ensure panel.datasource is null as default
  * plugibs: expose more to plugins
  * properly parse &amp; pass upload image bool from config
  * break out slack upload into separate function
  * tech: minor npm scripts update
  * build: fixed build
  * refactoring: minor refactoring of PR #8916
  * Update script to make it use OpsGenie's REST API
  * docs: minor docs fix
  * Merge branch 'master' of github.com:grafana/grafana
  * build: minor webpack fix
  * docs: updated building from source docs
  * playlist: play and edit should use same width
  * shore: fixed html indentation, #9368
  * tech: updated yarn.lock
  * shore: minor cleanup
  * Webpack (#9391)
  * fixing json for CI
  * adding support for token-based slack file.upload API call for posting images to slack
  * changelog: adds note about closing #8479
  * changelog: adds note about closing #8050
  * changelog: adds note about closing #9386
  * change pdiff to percent_diff for conditions
  * panel: rename label on csv export modal
  * add diff and pdiff for conditions
  * fix, add targetContainsTemplate()
  * fix cloudwatch alert bug
  * add debug log
  * move extend statistics handling code to backend
  * fix assume role
  * improve cloudwatch tsdb
  * refactor cloudwatch code
  * remove obsolete code
  * move cloudwatch crendential related code
  * remove old handler
  * fix annotation query
  * fix time
  * fix dimension convertion
  * re-implement annotation query
  * fix parameter format
  * fix alert feature
  * fix parameter format
  * refactor cloudwatch to support new tsdb interface
  * refactor cloudwatch frontend code
  * refactor cloudwatch frontend code
  * fix test
  * re-implement dimension_values()
  * fix error message
  * remove performEC2DescribeInstances()
  * re-implement ec2_instance_attribute()
  * re-implement ebs_volume_ids()
  * import the change, https://github.com/grafana/grafana/pull/9268
  * fix conflict
  * fix test
  * remove obsolete GetMetricStatistics()
  * fix test
  * move test code
  * fix conflict
  * porting other suggestion
  * re-implement get regions
  * move the metric find query code
  * (cloudwatch) move query parameter to 'parameters'
  * parse duration
  * remove offset for startTime
  * cache creds for keys/credentials auth type
  * fix test
  * fix invalid query filter
  * count up metrics
  * (cloudwatch) alerting
  * add brazil currency
  * tech: upgrade of systemjs to 0.20.x working
  * tech: reverted to systemjs
  * tech: migrating elasticsearch to typescript
  * changelog: add note about using golang 1.9
  * change go version to 1.9
  * changelog: adds note about closing #9367
  * tech: systemjs upgrade
  * made a text-panel page, maybe we don't need it
  * cleaned up html/sass and added final touches
  * Enable dualstack in every net.Dialer, fixes #9364
  * jaeger: capitalize tracer name
  * jaeger: logging improvement
  * tech: systemjs upgrade
  * Have  include intervalFactor in its calculation, so always equal to the step query parameter.
  * alertlist: toggle play/pause button
  * updated css and html for recent state changes for alert lists
  * Fix export_modal message (#9353)
  * s3: minor fix for PR #9223
  * internal metrics: add grafana version
  * changelog: adds note about closing 5765
  * Update latest.json
  * typescript: stricter typescript option
  * prom_docker: give targets correct job name
  * testdata: add bucket scenarios for heatmap
  * dev-docker: add grafana as target
  * changelog: add note ablout closing #9319
  * introduce smtp config option for EHLO identity
  * changelog: note about closing #9250
  * go fmt
  * new page for text, needs more work
  * replaced img in graph, created alert list page
  * docs: update docs
  * Update CHANGELOG.md
  * changelog: adds note about closing #5873
  * replaced image
  * Docs new updates (#9324)
  * Update CHANGELOG.md
  * Update latest.json
  * cleanup: removed unused file
  * tech: remove bower and moved remaining bower dependencies to npm
  * tech: cleanup and fixed build issue
  * tech: upgraded angularjs and moved dependency from bower to npm, closes #9327
  * follow go idiom and return error as second param
  * tech: updated tsconfig
  * docker: adds alertmanager to prometheus fig
  * tech: more tslint rules
  * another img update
  * tech: removing unused variables from typescript files, and making tslint rules more strict
  * deleted old shortcuts instruction
  * text uppdates for dashlist and singlestat(+img). updated the keyboard shortcuts
  * context is reserved for go's context
  * make ds a param for Query
  * remove batch abstraction
  * rename executor into tsdbqueryendpoint
  * remove unused structs
  * refactor response flow
  * tech: removed test component
  * ux: minor singlestat update
  * singlestat: minor change
  * Update CHANGELOG.md
  * Singlestat time (#9298)
  * tech: progress on react poc
  * adds note about closing #9213
  * Update _navbar.scss
  * replaced images, updating text(not finished)
  * fix: close for 'Unsaved Changes' modal, #9284 (#9313)
  * Initial graphite tags support (#9239)
  * tech: initial react poc
  * Make details more clean in PD description
  * bug: enable HEAD requests again
  * Add `DbClusterIdentifier` to CloudWatch dimensions (#9297)
  * templating: fix dependent variable updating (#9306)
  * Fix adhoc filters restoration (#9303)
  * Explicitly refer to Github 'OAuth' applications
  * config bucket and region for s3 uploader
  * fixes bug introduced with prom namespaces
  * fixing spelling of millesecond -&gt; millisecond
  * fixing spelling of millesecond -&gt; millisecond
  * Remove duplicate bus.AddHandler() (#9289)
  * Update CHANGELOG.md
  * use same key as mt
  * tag alert queries that return no_data
  * updated error page html+css, added ds_store to ignore (#9285)
  * public/app/plugins/panel/graph/specs/graph_specs.ts: relax tests to be 'within' instead of 'equal', so they won't fail on i686 (#9286)
  * Fix path to icon (#9276)
  * adds note about fix in v4.5.2
  * skip NaN values when writing to graphite
  * addded mass units, #9265 (#9273)
  * Fully fill out nulls in cloudfront data source (#9268)
  * make it possible to configure sampler type
  * mark &gt;=400 responses as error
  * change port for jaeger dev container
  * logwrapper for jaeger
  * make samplerconfig.param configurable
  * adds custom tags from settings
  * use route as span name
  * add trace headers for outgoing requests
  * docker file for running jaeger
  * better formating for error trace
  * attach context with span to *http.Request
  * add traces for datasource reverse proxy requests
  * trace failed executions
  * use tags instead of logs
  * use opentracing ext package when possible
  * set example port to zipkin default
  * adds codahale to vendor
  * makes jaeger tracing configurable
  * add trace parameters for outgoing requests
  * adds basic traces using open traces
  * require dashboard panels to have id
  * fix: jsonData should not be allowed to be null, fixes #9258
  * packaging: reduce package size
  * Update upgrading.md (#9263)
  * Added --pluginUrl option to grafana-cli for local network plugin installation
  * adds note about closing #1395
  * add locale format
  * update changelog
  * fixes broken tests :boom:
  * minor code adjusetments
  * pass context to image uploaders
  * remove unused deps
  * Reduced OAuth scope to read_write
  * GCS support via JSON API
  * gofmt fixes
  * Added GCS support #8370
  * move more known datasources from others
  * Remove alert thresholds on panel duplicate, issue #9178 (#9257)
  * 4.5.1 docs + update version to 5.0.0-pre1
  * publish_both.sh update for 4.5.1
  * Update CHANGELOG.md
  * docs: updated changelog
  * packaging: reducing package size be only including public vendor stuff we need
  * docs: update download links
  * allow ssl renegotiation for datasources
  * check args for query
  * add test for completer
  * fix
  * follow token name change
  * (prometheus) support label value completion
  * (prometheus) support label name completion
  * get s3 url via aws-sdk-go, fix #9189
  * Prometheus: Rework the interaction between auto interval (computed based on graph resolution), min interval (where specified, per query) and intervalFactor (AKA resolution, where specified, per query). As a bonus, have  and  reflect the actual interval (not the auto interval), taking into account min interval and Prometheus' 11k data points limit.
  * minor fix
  * (prometheus) support instant query for table format, use checkbox to switch query type
  * (prometheus) instant query support
  * Add thumbnail to card
  * Add values to the hipchat card
  * Reorder editorconfig
  * Enable datasources to be able to round off to a UTC day properly
  * Include triggering metrics to pagerduty alerts

- Add 0001-fix-XSS-vulnerabilities-in-dashboard-links.patch (bsc#1096985)
- adjust mysql-systemd-helper ('shutdown protected MySQL' section)
  so it checks both ping response and the pid in a process list
  as it can take some time till the process is terminated.
  Otherwise it can lead to 'found left-over process' situation
  when regular mariadb is started [bsc#1143215]
- update suse_skipped_tests.list

- remove client_ed25519.so plugin because it's shipped in
  mariadb-connector-c package (libmariadb_plugins)
- update suse_skipped_tests.list

- update to 10.2.25 GA
  * Fixes for the following security vulnerabilities:
    * 10.2.23: none
    * 10.2.24: CVE-2019-2628, CVE-2019-2627, CVE-2019-2614
    * 10.2.25: none
  * release notes and changelog:
    https://mariadb.com/kb/en/library/mariadb-10223-release-notes
    https://mariadb.com/kb/en/library/mariadb-10223-changelog
    https://mariadb.com/kb/en/library/mariadb-10224-release-notes
    https://mariadb.com/kb/en/library/mariadb-10224-changelog
    https://mariadb.com/kb/en/library/mariadb-10225-release-notes
    https://mariadb.com/kb/en/library/mariadb-10225-changelog
- remove mariadb-10.2.22-fix_path.patch that was applied upstream
  in mariadb 10.2.23
- remove caching_sha2_password.so because it's shipped in
  mariadb-connector-c package (libmariadb_plugins)
- remove xtrabackup scripts as it was replaced by mariabackup (we
  already removed xtrabackup requires in the first phase)
- fix reading options for multiple instances if my${INSTANCE}.cnf
  is used. Also remove 'umask 077' from mysql-systemd-helper that
  causes that new datadirs are created with wrong permissions. Set
  correct permissions for files created by us (mysql_upgrade_info,
  .run-mysql_upgrade) [bsc#1132666]
- fix build comment to not refer to openSUSE
- tracker bug [bsc#1136035]

- New upstream version 3.1.2 [bsc#1136035]
  * CONC-383: client plugins can't be loaded due to missing prefix
  * Fixed version setting in GnuTLS by moving 'NORMAL' at the end
    of priority string
  * CONC-386: Added support for pem files which contain certificate
    and private key.
  * Replication/Binlog API: The main mechanism used in replication
    is the binary log.
  * CONC-395: Dashes and underscores are not interchangeable in
    options in my.cnf
  * CONC-384: Incorrect packet when a connection attribute name or
    value is equal to or greater than 251
  * CONC-388: field-&gt;def_length is always set to 0
  * Getter should get and the setter should set
    CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS
  * Disable LOAD DATA LOCAL INFILE suport by default and auto-enable
    it for the duration of one query, if the query string starts with
    the word 'load'. In all other cases the application should enable
    LOAD DATA LOCAL INFILE support explicitly.
  * Changed return code for mysql_optionv/mysql_get_optionv to 1 (was -1)
    and added CR_NOT_IMPLEMENTED error message if a option is unknown
    or not supported.
  * mingw fix: use lowercase names for include files
  * CONC-375: Fixed handshake errors when mixing TLSv1.3 cipher
    suites with cipher suites from other TLS protocols
  * CONC-312: Added new caching_sha2_password authentication plugin
    for authentication with MySQL 8.0
- refresh mariadb-connector-c-2.3.1_unresolved_symbols.patch and
  private_library.patch
- pack caching_sha2_password.so and client_ed25519.so
- move libmariadb.pc from /usr/lib/pkgconfig to
  /usr/lib64/pkgconfig for x86_64 [bsc#1126088] 

- Fixes bugs bsc#1145796: Add tightPNG encoding
  * Apply novnc-1.0.0-add-encoding-support-for-TightPNG.patch
    This patch cherry-picks commit 2c813a33f to novnc 1.0.0 to enable tightPNG encoding.
    This encoding is needed to allow noVNC to work with instances that
    run on ESX hypervisors. It is not possible to update the Pike package
    to noVNC 1.1.0 as that version is not supported with openstack-nova until Rocky.

- Update to version cinder-11.2.3.dev16:
  * RBD: remove redundant exception log to reduce noise

- Update to version cinder-11.2.3.dev14:
  * Fix NFS volume retype with migrate

- Update to version cinder-11.2.3.dev12:
  * Remove Sheepdog tests from zuul config
  * NetApp: Return all iSCSI targets-portals

- Update to version cinder-11.2.3.dev8:
  * Remove experimental openSUSE 42.3 job

- Update to version cinder-11.2.3.dev16:
  * RBD: remove redundant exception log to reduce noise

- Update to version cinder-11.2.3.dev14:
  * Fix NFS volume retype with migrate

- Update to version cinder-11.2.3.dev12:
  * Remove Sheepdog tests from zuul config
  * NetApp: Return all iSCSI targets-portals

- Update to version cinder-11.2.3.dev8:
  * Remove experimental openSUSE 42.3 job

- Update to version glance-15.0.3.dev3:
  * Remove experimental openSUSE 42.3 job

- Update to version glance-15.0.3.dev3:
  * Remove experimental openSUSE 42.3 job

- Update to version heat-9.0.8.dev13:
  * Unlimited cinder quotas throws exception

- Update to version heat-9.0.8.dev12:
  * Do not perform the tenant stack limit check for admin user

- Update to version heat-9.0.8.dev13:
  * Unlimited cinder quotas throws exception

- Update to version heat-9.0.8.dev12:
  * Do not perform the tenant stack limit check for admin user

- don't exclude pyc files to fix update/upgrade (SOC-9339)

- Update to version keystone-12.0.4.dev4:
  * Remove experimental openSUSE 42.3 job
  * Cap bandit

- Update to version keystone-12.0.4.dev4:
  * Remove experimental openSUSE 42.3 job
  * Cap bandit

- Update to version keystone-12.0.4.dev4:
  * Remove experimental openSUSE 42.3 job
  * Cap bandit

- Update to version keystone-12.0.4.dev4:
  * Remove experimental openSUSE 42.3 job
  * Cap bandit

- Update to version Build_20190923_16.32 (bsc#1148158)
  * Create path.repo directory for Elasticseach

- Update to version neutron-11.0.9.dev51:
  * Check for agent restarted after checking for DVR port

- Update to version neutron-11.0.9.dev49:
  * Allow first address in an IPv6 subnet as valid unicast

- Update to version neutron-11.0.9.dev47:
  * Remove experimental openSUSE 42.3 job

- Update to version neutron-11.0.9.dev45:
  * Clear skb mark on encapsulating packets
  * fix update port bug

- Update to version neutron-11.0.9.dev51:
  * Check for agent restarted after checking for DVR port

- Update to version neutron-11.0.9.dev49:
  * Allow first address in an IPv6 subnet as valid unicast

- Update to version neutron-11.0.9.dev47:
  * Remove experimental openSUSE 42.3 job

- Update to version neutron-11.0.9.dev45:
  * Clear skb mark on encapsulating packets
  * fix update port bug

- Update to version group-based-policy-7.3.1.dev56:
  * [AIM] Fix HAIP RPC query

- Update to version group-based-policy-7.3.1.dev55:
  * Fix implicit ICMPv6 Security Group Rules

- Update to version group-based-policy-7.3.1.dev54:
  * Fixed snat port status to be ACTIVE and UP

- Update to version group-based-policy-7.3.1.dev53:
  * Verify aim\_epg exists before proceeding
  * Revert 'Make DHCP provisioning blocks conditional'
  * Some refactoring regarding merge aim statuses

- Update to version group-based-policy-7.3.1.dev47:
  * Bulk extension support for routers

- Update to version group-based-policy-7.3.1.dev46:
  * [AIM] Eliminate redundant router extension content

- add 0001-Remove-DDT-tests-from-tempest-plugin.patch 

- add 0001-Fix-unable-to-delete-subnet-in-API-tests.patch

- Update to version nova-16.1.9.dev7:
  * Remove experimental job on openSUSE 42.3

- Update to version nova-16.1.9.dev6:
  * Fix misuse of nova.objects.base.obj\_equal\_prims

- Update to version nova-16.1.9.dev5:
  * Replace non-nova server fault message

- Allow to attach more than 26 volumes (bsc#1118900)
  * This is a forward port from SOC7
  * Add 0001-Add-method-to-generate-device-names-universally.patch
  * Add 0002-Raise-403-instead-of-500-error-from-attach-volume-AP.patch
  * Add 0003-Add-configuration-of-maximum-disk-devices-to-attach.patch

- Update to version nova-16.1.9.dev7:
  * Remove experimental job on openSUSE 42.3

- Update to version nova-16.1.9.dev6:
  * Fix misuse of nova.objects.base.obj\_equal\_prims

- Update to version nova-16.1.9.dev5:
  * Replace non-nova server fault message

- add 0002-Do_not_send_AAAA_DNS_request_when_domain_resolved_to_IPv4_address.patch (SOC-9144)

- update to 2.7.2:
  * includes fix for controller connection over SSL
  * enable build against openvswitch-devel to get C extensions enabled (bsc#1141121)

- Added fix-xxe-in-xml-parsing.patch (CVE-2016-10127, bsc#1019074)

- Add patch CVE-2019-13611.patch (SOC-9989, bsc#1141676)
  * python-python-engineio: An issue was discovered in
    python-engineio through 3.8.2. There is a Cross-Site WebSocket
    Hijacking (CSWSH) vulnerability that allows attackers to make
    WebSocket connections to a server

- Add missing dependency on python-six (bsc#1150895)

- Update to version 8.20190911:
  * Fixing broken markup (noref)

- Update to version 8.20190909:
  * Adding networking loop known issue (SOC-10150)
  * add Keystone default is still UUID (noref)
  * remove Known Issue-WebSSO not working (bsc#1132593)
  * Remove de-de from the URL again.
  * transfer C8 revision history from MF wiki (SCRD-7737)
  * Typo/grammar fixes + URL fix
  * remove Crowbar deprecation date (bsc#1125893)
  *  remove comment that ovsvapp is not functional

- Update to version 8.20190909:
  * Adding networking loop known issue (SOC-10150)
  * add Keystone default is still UUID (noref)
  * remove Known Issue-WebSSO not working (bsc#1132593)

- Add python-defusedxml (bsc#1019074)

rubygem-easy_diff, rubygem-rest-client-1_6:
- CVE-2015-3448: Fixed a plain text local password disclosure. (bsc#917802)

Non-security issue fixed:

- rubygem-easy_diff was updated to version 1.0.0.
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019074">SUSE bug 1019074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096985">SUSE bug 1096985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106515">SUSE bug 1106515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115960">SUSE bug 1115960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116846">SUSE bug 1116846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118900">SUSE bug 1118900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120657">SUSE bug 1120657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125893">SUSE bug 1125893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126088">SUSE bug 1126088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132593">SUSE bug 1132593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132666">SUSE bug 1132666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136035">SUSE bug 1136035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141121">SUSE bug 1141121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141676">SUSE bug 1141676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143215">SUSE bug 1143215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145796">SUSE bug 1145796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146578">SUSE bug 1146578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148158">SUSE bug 1148158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148383">SUSE bug 1148383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150895">SUSE bug 1150895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917802">SUSE bug 917802</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3448/">CVE-2015-3448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3448">CVE-2015-3448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10127/">CVE-2016-10127 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10127">CVE-2016-10127 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-15727/">CVE-2018-15727 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15727">CVE-2018-15727 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19039/">CVE-2018-19039 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19039">CVE-2018-19039 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-558213/">CVE-2018-558213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-558213">CVE-2018-558213 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13611/">CVE-2019-13611 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13611">CVE-2019-13611 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15043/">CVE-2019-15043 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15043">CVE-2019-15043 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2614/">CVE-2019-2614 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2614">CVE-2019-2614 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2627/">CVE-2019-2627 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2627">CVE-2019-2627 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2628/">CVE-2019-2628 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2628">CVE-2019-2628 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5477/">CVE-2019-5477 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5477">CVE-2019-5477 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597047" comment="ardana-ansible-8.0+git.1566374355.c509923-3.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597048" comment="ardana-glance-8.0+git.1566376789.be0fe01-3.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597049" comment="ardana-horizon-8.0+git.1565816064.5d4f73f-3.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597050" comment="ardana-input-model-8.0+git.1566517401.98450e6-3.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597051" comment="ardana-manila-8.0+git.1568835837.2452e7a-1.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597052" comment="ardana-neutron-8.0+git.1568220097.74ee4b4-3.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597053" comment="ardana-nova-8.0+git.1566902754.c58ff69-3.35.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597054" comment="ardana-octavia-8.0+git.1568373448.bcaee7e-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597055" comment="ardana-tempest-8.0+git.1566471887.fd2fec7-3.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597056" comment="galera-3-wsrep-provider-25.3.25-4.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597057" comment="grafana-4.6.5-4.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597058" comment="libmariadb3-3.1.2-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597059" comment="mariadb-10.2.25-4.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597060" comment="mariadb-client-10.2.25-4.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597061" comment="mariadb-errormessages-10.2.25-4.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597062" comment="mariadb-galera-10.2.25-4.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597063" comment="mariadb-tools-10.2.25-4.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597064" comment="novnc-1.0.0-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597065" comment="openstack-cinder-11.2.3~dev16-3.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597066" comment="openstack-cinder-api-11.2.3~dev16-3.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597067" comment="openstack-cinder-backup-11.2.3~dev16-3.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597068" comment="openstack-cinder-doc-11.2.3~dev16-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597069" comment="openstack-cinder-scheduler-11.2.3~dev16-3.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597070" comment="openstack-cinder-volume-11.2.3~dev16-3.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597071" comment="openstack-glance-15.0.3~dev3-3.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597072" comment="openstack-glance-api-15.0.3~dev3-3.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597073" comment="openstack-glance-doc-15.0.3~dev3-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597074" comment="openstack-glance-registry-15.0.3~dev3-3.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597075" comment="openstack-heat-9.0.8~dev13-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597076" comment="openstack-heat-api-9.0.8~dev13-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597077" comment="openstack-heat-api-cfn-9.0.8~dev13-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597078" comment="openstack-heat-api-cloudwatch-9.0.8~dev13-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597079" comment="openstack-heat-doc-9.0.8~dev13-3.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597080" comment="openstack-heat-engine-9.0.8~dev13-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597081" comment="openstack-heat-plugin-heat_docker-9.0.8~dev13-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597082" comment="openstack-heat-test-9.0.8~dev13-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597083" comment="openstack-horizon-plugin-neutron-vpnaas-ui-1.0.1~dev3-3.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597084" comment="openstack-keystone-12.0.4~dev4-5.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597085" comment="openstack-keystone-doc-12.0.4~dev4-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597086" comment="openstack-monasca-installer-20190923_16.32-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597087" comment="openstack-neutron-11.0.9~dev51-3.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597088" comment="openstack-neutron-dhcp-agent-11.0.9~dev51-3.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597089" comment="openstack-neutron-doc-11.0.9~dev51-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597090" comment="openstack-neutron-gbp-7.3.1~dev56-3.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597091" comment="openstack-neutron-ha-tool-11.0.9~dev51-3.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597092" comment="openstack-neutron-l3-agent-11.0.9~dev51-3.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597093" comment="openstack-neutron-lbaas-11.0.4~dev6-3.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597094" comment="openstack-neutron-lbaas-agent-11.0.4~dev6-3.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597095" comment="openstack-neutron-lbaas-doc-11.0.4~dev6-3.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597096" comment="openstack-neutron-linuxbridge-agent-11.0.9~dev51-3.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597097" comment="openstack-neutron-macvtap-agent-11.0.9~dev51-3.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597098" comment="openstack-neutron-metadata-agent-11.0.9~dev51-3.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597099" comment="openstack-neutron-metering-agent-11.0.9~dev51-3.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597100" comment="openstack-neutron-openvswitch-agent-11.0.9~dev51-3.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597101" comment="openstack-neutron-server-11.0.9~dev51-3.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597102" comment="openstack-nova-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597103" comment="openstack-nova-api-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597104" comment="openstack-nova-cells-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597105" comment="openstack-nova-compute-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597106" comment="openstack-nova-conductor-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597107" comment="openstack-nova-console-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597108" comment="openstack-nova-consoleauth-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597109" comment="openstack-nova-doc-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597110" comment="openstack-nova-novncproxy-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597111" comment="openstack-nova-placement-api-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597112" comment="openstack-nova-scheduler-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597113" comment="openstack-nova-serialproxy-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597114" comment="openstack-nova-vncproxy-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597115" comment="python-amqp-2.2.2-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597116" comment="python-cinder-11.2.3~dev16-3.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597117" comment="python-glance-15.0.3~dev3-3.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597118" comment="python-heat-9.0.8~dev13-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597119" comment="python-horizon-plugin-neutron-vpnaas-ui-1.0.1~dev3-3.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597120" comment="python-keystone-12.0.4~dev4-5.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597121" comment="python-neutron-11.0.9~dev51-3.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597122" comment="python-neutron-gbp-7.3.1~dev56-3.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597123" comment="python-neutron-lbaas-11.0.4~dev6-3.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597124" comment="python-nova-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597125" comment="python-ovs-2.7.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597126" comment="python-pysaml2-4.0.2-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597127" comment="python-python-engineio-2.0.2-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597128" comment="python-urllib3-1.22-5.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597129" comment="release-notes-suse-openstack-cloud-8.20190911-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597130" comment="venv-openstack-aodh-x86_64-5.1.1~dev7-12.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597131" comment="venv-openstack-barbican-x86_64-5.0.2~dev3-12.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597132" comment="venv-openstack-ceilometer-x86_64-9.0.8~dev7-12.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597133" comment="venv-openstack-cinder-x86_64-11.2.3~dev16-14.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597134" comment="venv-openstack-designate-x86_64-5.0.3~dev7-12.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597135" comment="venv-openstack-freezer-x86_64-5.0.0.0~xrc2~dev2-10.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597136" comment="venv-openstack-glance-x86_64-15.0.3~dev3-12.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597137" comment="venv-openstack-heat-x86_64-9.0.8~dev13-12.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597138" comment="venv-openstack-horizon-x86_64-12.0.4~dev6-14.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597139" comment="venv-openstack-ironic-x86_64-9.1.8~dev7-12.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597140" comment="venv-openstack-keystone-x86_64-12.0.4~dev4-11.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597141" comment="venv-openstack-magnum-x86_64-5.0.2_5.0.2_5.0.2~dev31-11.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597142" comment="venv-openstack-manila-x86_64-5.1.1~dev2-12.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597143" comment="venv-openstack-monasca-ceilometer-x86_64-1.5.1_1.5.1_1.5.1~dev3-8.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597144" comment="venv-openstack-monasca-x86_64-2.2.2~dev1-11.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597145" comment="venv-openstack-murano-x86_64-4.0.2~dev2-12.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597146" comment="venv-openstack-neutron-x86_64-11.0.9~dev51-13.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597147" comment="venv-openstack-nova-x86_64-16.1.9~dev7-11.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597148" comment="venv-openstack-octavia-x86_64-1.0.6~dev2-12.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597149" comment="venv-openstack-sahara-x86_64-7.0.4~dev1-11.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597150" comment="venv-openstack-swift-x86_64-2.15.2-11.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597151" comment="venv-openstack-trove-x86_64-8.0.1~dev13-11.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148206" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1010399" ref_url="https://bugzilla.suse.com/1010399" source="BUGZILLA"/>
		<reference ref_id="1010405" ref_url="https://bugzilla.suse.com/1010405" source="BUGZILLA"/>
		<reference ref_id="1010406" ref_url="https://bugzilla.suse.com/1010406" source="BUGZILLA"/>
		<reference ref_id="1010408" ref_url="https://bugzilla.suse.com/1010408" source="BUGZILLA"/>
		<reference ref_id="1010409" ref_url="https://bugzilla.suse.com/1010409" source="BUGZILLA"/>
		<reference ref_id="1010421" ref_url="https://bugzilla.suse.com/1010421" source="BUGZILLA"/>
		<reference ref_id="1010423" ref_url="https://bugzilla.suse.com/1010423" source="BUGZILLA"/>
		<reference ref_id="1010424" ref_url="https://bugzilla.suse.com/1010424" source="BUGZILLA"/>
		<reference ref_id="1010425" ref_url="https://bugzilla.suse.com/1010425" source="BUGZILLA"/>
		<reference ref_id="1010426" ref_url="https://bugzilla.suse.com/1010426" source="BUGZILLA"/>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1043008" ref_url="https://bugzilla.suse.com/1043008" source="BUGZILLA"/>
		<reference ref_id="1047281" ref_url="https://bugzilla.suse.com/1047281" source="BUGZILLA"/>
		<reference ref_id="1074235" ref_url="https://bugzilla.suse.com/1074235" source="BUGZILLA"/>
		<reference ref_id="1092611" ref_url="https://bugzilla.suse.com/1092611" source="BUGZILLA"/>
		<reference ref_id="1120374" ref_url="https://bugzilla.suse.com/1120374" source="BUGZILLA"/>
		<reference ref_id="1137990" ref_url="https://bugzilla.suse.com/1137990" source="BUGZILLA"/>
		<reference ref_id="1149429" ref_url="https://bugzilla.suse.com/1149429" source="BUGZILLA"/>
		<reference ref_id="1154738" ref_url="https://bugzilla.suse.com/1154738" source="BUGZILLA"/>
		<reference ref_id="959933" ref_url="https://bugzilla.suse.com/959933" source="BUGZILLA"/>
		<reference ref_id="983922" ref_url="https://bugzilla.suse.com/983922" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-5289" ref_url="https://www.suse.com/security/cve/CVE-2016-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-5292" ref_url="https://www.suse.com/security/cve/CVE-2016-5292/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2016-9067" ref_url="https://www.suse.com/security/cve/CVE-2016-9067/" source="CVE"/>
		<reference ref_id="CVE-2016-9068" ref_url="https://www.suse.com/security/cve/CVE-2016-9068/" source="CVE"/>
		<reference ref_id="CVE-2016-9069" ref_url="https://www.suse.com/security/cve/CVE-2016-9069/" source="CVE"/>
		<reference ref_id="CVE-2016-9071" ref_url="https://www.suse.com/security/cve/CVE-2016-9071/" source="CVE"/>
		<reference ref_id="CVE-2016-9073" ref_url="https://www.suse.com/security/cve/CVE-2016-9073/" source="CVE"/>
		<reference ref_id="CVE-2016-9075" ref_url="https://www.suse.com/security/cve/CVE-2016-9075/" source="CVE"/>
		<reference ref_id="CVE-2016-9076" ref_url="https://www.suse.com/security/cve/CVE-2016-9076/" source="CVE"/>
		<reference ref_id="CVE-2016-9077" ref_url="https://www.suse.com/security/cve/CVE-2016-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-7789" ref_url="https://www.suse.com/security/cve/CVE-2017-7789/" source="CVE"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5151" ref_url="https://www.suse.com/security/cve/CVE-2018-5151/" source="CVE"/>
		<reference ref_id="CVE-2018-5152" ref_url="https://www.suse.com/security/cve/CVE-2018-5152/" source="CVE"/>
		<reference ref_id="CVE-2018-5153" ref_url="https://www.suse.com/security/cve/CVE-2018-5153/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5160" ref_url="https://www.suse.com/security/cve/CVE-2018-5160/" source="CVE"/>
		<reference ref_id="CVE-2018-5163" ref_url="https://www.suse.com/security/cve/CVE-2018-5163/" source="CVE"/>
		<reference ref_id="CVE-2018-5164" ref_url="https://www.suse.com/security/cve/CVE-2018-5164/" source="CVE"/>
		<reference ref_id="CVE-2018-5165" ref_url="https://www.suse.com/security/cve/CVE-2018-5165/" source="CVE"/>
		<reference ref_id="CVE-2018-5166" ref_url="https://www.suse.com/security/cve/CVE-2018-5166/" source="CVE"/>
		<reference ref_id="CVE-2018-5167" ref_url="https://www.suse.com/security/cve/CVE-2018-5167/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5169" ref_url="https://www.suse.com/security/cve/CVE-2018-5169/" source="CVE"/>
		<reference ref_id="CVE-2018-5172" ref_url="https://www.suse.com/security/cve/CVE-2018-5172/" source="CVE"/>
		<reference ref_id="CVE-2018-5173" ref_url="https://www.suse.com/security/cve/CVE-2018-5173/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5175" ref_url="https://www.suse.com/security/cve/CVE-2018-5175/" source="CVE"/>
		<reference ref_id="CVE-2018-5176" ref_url="https://www.suse.com/security/cve/CVE-2018-5176/" source="CVE"/>
		<reference ref_id="CVE-2018-5177" ref_url="https://www.suse.com/security/cve/CVE-2018-5177/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5179" ref_url="https://www.suse.com/security/cve/CVE-2018-5179/" source="CVE"/>
		<reference ref_id="CVE-2018-5180" ref_url="https://www.suse.com/security/cve/CVE-2018-5180/" source="CVE"/>
		<reference ref_id="CVE-2018-5181" ref_url="https://www.suse.com/security/cve/CVE-2018-5181/" source="CVE"/>
		<reference ref_id="CVE-2018-5182" ref_url="https://www.suse.com/security/cve/CVE-2018-5182/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to 68.2.0 ESR fixes the following issues:

Mozilla Firefox was updated to version 68.2.0 ESR (bsc#1154738).

Security issues fixed:

-  CVE-2019-15903: Fixed a heap overflow in the expat library (bsc#1149429).
-  CVE-2019-11757: Fixed a use-after-free when creating index updates in IndexedDB (bsc#1154738).
-  CVE-2019-11758: Fixed a potentially exploitable crash due to 360 Total Security (bsc#1154738).
-  CVE-2019-11759: Fixed a stack buffer overflow in HKDF output (bsc#1154738).
-  CVE-2019-11760: Fixed a stack buffer overflow in WebRTC networking (bsc#1154738).
-  CVE-2019-11761: Fixed an unintended access to a privileged JSONView object (bsc#1154738).
-  CVE-2019-11762: Fixed a same-origin-property violation (bsc#1154738).
-  CVE-2019-11763: Fixed an XSS bypass (bsc#1154738).
-  CVE-2019-11764: Fixed several memory safety bugs (bsc#1154738).

Non-security issues fixed:

- Firefox 60.7 ESR changed the user interface language (bsc#1137990).
- Wrong Firefox GUI Language (bsc#1120374).
- Fixed an inadvertent crash report transmission without user opt-in (bsc#1074235).
- Firefox hangs randomly when browsing and scrolling (bsc#1043008).
- Firefox stops loading page until mouse is moved (bsc#1025108).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-31"/>
	<updated date="2019-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010399">SUSE bug 1010399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010405">SUSE bug 1010405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010406">SUSE bug 1010406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010408">SUSE bug 1010408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010409">SUSE bug 1010409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010421">SUSE bug 1010421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010423">SUSE bug 1010423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010424">SUSE bug 1010424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010425">SUSE bug 1010425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010426">SUSE bug 1010426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043008">SUSE bug 1043008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047281">SUSE bug 1047281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074235">SUSE bug 1074235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120374">SUSE bug 1120374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137990">SUSE bug 1137990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959933">SUSE bug 959933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983922">SUSE bug 983922</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2830">CVE-2016-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5289/">CVE-2016-5289 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5289">CVE-2016-5289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5292/">CVE-2016-5292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5292">CVE-2016-5292 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9067/">CVE-2016-9067 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9067">CVE-2016-9067 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9068/">CVE-2016-9068 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9068">CVE-2016-9068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9069/">CVE-2016-9069 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9069">CVE-2016-9069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9071/">CVE-2016-9071 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9071">CVE-2016-9071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9073/">CVE-2016-9073 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9073">CVE-2016-9073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9075/">CVE-2016-9075 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9075">CVE-2016-9075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9076/">CVE-2016-9076 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9076">CVE-2016-9076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9077/">CVE-2016-9077 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9077">CVE-2016-9077 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7789/">CVE-2017-7789 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7789">CVE-2017-7789 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5150">CVE-2018-5150 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5151/">CVE-2018-5151 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5151">CVE-2018-5151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5152/">CVE-2018-5152 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5152">CVE-2018-5152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5153/">CVE-2018-5153 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5153">CVE-2018-5153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5154">CVE-2018-5154 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5155">CVE-2018-5155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5157">CVE-2018-5157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5158">CVE-2018-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5159">CVE-2018-5159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5160/">CVE-2018-5160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5160">CVE-2018-5160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5163/">CVE-2018-5163 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5163">CVE-2018-5163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5164/">CVE-2018-5164 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5164">CVE-2018-5164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5165/">CVE-2018-5165 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5165">CVE-2018-5165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5166/">CVE-2018-5166 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5166">CVE-2018-5166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5167/">CVE-2018-5167 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5167">CVE-2018-5167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5168">CVE-2018-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5169/">CVE-2018-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5169">CVE-2018-5169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5172/">CVE-2018-5172 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5172">CVE-2018-5172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5173/">CVE-2018-5173 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5173">CVE-2018-5173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5174">CVE-2018-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5175/">CVE-2018-5175 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5175">CVE-2018-5175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5176/">CVE-2018-5176 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5176">CVE-2018-5176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5177/">CVE-2018-5177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5177">CVE-2018-5177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5178">CVE-2018-5178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5179/">CVE-2018-5179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5179">CVE-2018-5179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5180/">CVE-2018-5180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5180">CVE-2018-5180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5181/">CVE-2018-5181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5181">CVE-2018-5181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5182/">CVE-2018-5182 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5182">CVE-2018-5182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5183">CVE-2018-5183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11757">CVE-2019-11757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11758">CVE-2019-11758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11759">CVE-2019-11759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11760">CVE-2019-11760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11761">CVE-2019-11761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11762">CVE-2019-11762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11763">CVE-2019-11763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11764">CVE-2019-11764 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148207" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1144902" ref_url="https://bugzilla.suse.com/1144902" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006085.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2019-10218: Client code can return filenames containing path separators (bsc#1144902).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-04"/>
	<updated date="2019-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10218">CVE-2019-10218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522302" comment="libdcerpc-binding0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522303" comment="libdcerpc-binding0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522304" comment="libdcerpc0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522305" comment="libdcerpc0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522306" comment="libndr-krb5pac0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522307" comment="libndr-krb5pac0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522308" comment="libndr-nbt0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522309" comment="libndr-nbt0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522310" comment="libndr-standard0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522311" comment="libndr-standard0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522312" comment="libndr0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522313" comment="libndr0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522314" comment="libnetapi0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522315" comment="libnetapi0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522316" comment="libsamba-credentials0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522317" comment="libsamba-credentials0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522318" comment="libsamba-errors0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522319" comment="libsamba-errors0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522320" comment="libsamba-hostconfig0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522321" comment="libsamba-hostconfig0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522322" comment="libsamba-passdb0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522323" comment="libsamba-passdb0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522324" comment="libsamba-util0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522325" comment="libsamba-util0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522326" comment="libsamdb0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522327" comment="libsamdb0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522328" comment="libsmbclient0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522329" comment="libsmbclient0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522330" comment="libsmbconf0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522331" comment="libsmbconf0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522332" comment="libsmbldap0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522333" comment="libsmbldap0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522334" comment="libtevent-util0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522335" comment="libtevent-util0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522336" comment="libwbclient0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522337" comment="libwbclient0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522338" comment="samba-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522339" comment="samba-client-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522340" comment="samba-client-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522341" comment="samba-doc-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522342" comment="samba-libs-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522343" comment="samba-libs-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522344" comment="samba-winbind-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522345" comment="samba-winbind-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148208" version="1" class="patch">
	<metadata>
		<title>Security update for gdb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1115034" ref_url="https://bugzilla.suse.com/1115034" source="BUGZILLA"/>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="1145692" ref_url="https://bugzilla.suse.com/1145692" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006098.html" source="SUSE-SU"/>
		<description>
This update for gdb fixes the following issues:

Update to gdb 8.3.1: (jsc#ECO-368)

Security issues fixed:

- CVE-2019-1010180: Fixed a potential buffer overflow when loading ELF sections larger than the file. (bsc#1142772)

Upgrade libipt from v2.0 to v2.0.1.

- Enable librpm for version &gt; librpm.so.3 [bsc#1145692]:
  * Allow any librpm.so.x
  * Add %build test to check for 'zypper install &lt;rpm-packagename&gt;'
    message

- Copy gdbinit from fedora master @ 25caf28.  Add
  gdbinit.without-python, and use it for --without=python.

Rebase to 8.3 release (as in fedora 30 @ 1e222a3).

* DWARF index cache: GDB can now automatically save indices of DWARF
  symbols on disk to speed up further loading of the same binaries.
* Ada task switching is now supported on aarch64-elf targets when
  debugging a program using the Ravenscar Profile.
* Terminal styling is now available for the CLI and the TUI.
* Removed support for old demangling styles arm, edg, gnu, hp and
  lucid.
* Support for new native configuration RISC-V GNU/Linux (riscv*-*-linux*).

- Implemented access to more POWER8 registers.  [fate#326120, fate#325178]
- Also handle most new s390 arch13 instructions.  [fate#327369, jsc#ECO-368]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-07"/>
	<updated date="2019-11-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1115034">SUSE bug 1115034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145692">SUSE bug 1145692</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010180">CVE-2019-1010180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522349" comment="gdb-8.3.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148209" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1154862" ref_url="https://bugzilla.suse.com/1154862" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2936-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192936-1.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issue:

- CVE-2019-17498: Fixed an integer overflow in a bounds check that might have led to the disclosure of sensitive information or a denial of service (bsc#1154862).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-08"/>
	<updated date="2019-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">CVE-2019-17498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522350" comment="libssh2-1-1.4.3-20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522351" comment="libssh2-1-32bit-1.4.3-20.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148210" version="1" class="patch">
	<metadata>
		<title>Security update for libseccomp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1128828" ref_url="https://bugzilla.suse.com/1128828" source="BUGZILLA"/>
		<reference ref_id="1142614" ref_url="https://bugzilla.suse.com/1142614" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9893" ref_url="https://www.suse.com/security/cve/CVE-2019-9893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006108.html" source="SUSE-SU"/>
		<description>
This update for libseccomp fixes the following issues:

Update to new upstream release 2.4.1:

* Fix a BPF generation bug where the optimizer mistakenly
  identified duplicate BPF code blocks.

Updated to 2.4.0 (bsc#1128828 CVE-2019-9893):

* Update the syscall table for Linux v5.0-rc5
* Added support for the SCMP_ACT_KILL_PROCESS action
* Added support for the SCMP_ACT_LOG action and SCMP_FLTATR_CTL_LOG attribute
* Added explicit 32-bit (SCMP_AX_32(...)) and 64-bit (SCMP_AX_64(...)) argument comparison macros to help protect against unexpected sign extension
* Added support for the parisc and parisc64 architectures
* Added the ability to query and set the libseccomp API level via seccomp_api_get(3) and seccomp_api_set(3)
* Return -EDOM on an endian mismatch when adding an architecture to a filter
* Renumber the pseudo syscall number for subpage_prot() so it no longer conflicts with spu_run()
* Fix PFC generation when a syscall is prioritized, but no rule exists
* Numerous fixes to the seccomp-bpf filter generation code
* Switch our internal hashing function to jhash/Lookup3 to MurmurHash3
* Numerous tests added to the included test suite, coverage now at ~92%
* Update our Travis CI configuration to use Ubuntu 16.04
* Numerous documentation fixes and updates

Update to release 2.3.3:

* Updated the syscall table for Linux v4.15-rc7

Update to release 2.3.2:

* Achieved full compliance with the CII Best Practices program
* Added Travis CI builds to the GitHub repository
* Added code coverage reporting with the '--enable-code-coverage' configure
  flag and added Coveralls to the GitHub repository
* Updated the syscall tables to match Linux v4.10-rc6+
* Support for building with Python v3.x
* Allow rules with the -1 syscall if the SCMP\_FLTATR\_API\_TSKIP attribute is
  set to true
* Several small documentation fixes

- ignore make check error for ppc64/ppc64le, bypass bsc#1142614
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128828">SUSE bug 1128828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142614">SUSE bug 1142614</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9893/">CVE-2019-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9893">CVE-2019-9893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522352" comment="libseccomp2-2.4.1-11.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522353" comment="libseccomp2-32bit-2.4.1-11.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148211" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1084878" ref_url="https://bugzilla.suse.com/1084878" source="BUGZILLA"/>
		<reference ref_id="1117665" ref_url="https://bugzilla.suse.com/1117665" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1133140" ref_url="https://bugzilla.suse.com/1133140" source="BUGZILLA"/>
		<reference ref_id="1135966" ref_url="https://bugzilla.suse.com/1135966" source="BUGZILLA"/>
		<reference ref_id="1135967" ref_url="https://bugzilla.suse.com/1135967" source="BUGZILLA"/>
		<reference ref_id="1136261" ref_url="https://bugzilla.suse.com/1136261" source="BUGZILLA"/>
		<reference ref_id="1137865" ref_url="https://bugzilla.suse.com/1137865" source="BUGZILLA"/>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1140671" ref_url="https://bugzilla.suse.com/1140671" source="BUGZILLA"/>
		<reference ref_id="1141013" ref_url="https://bugzilla.suse.com/1141013" source="BUGZILLA"/>
		<reference ref_id="1141054" ref_url="https://bugzilla.suse.com/1141054" source="BUGZILLA"/>
		<reference ref_id="1142458" ref_url="https://bugzilla.suse.com/1142458" source="BUGZILLA"/>
		<reference ref_id="1143187" ref_url="https://bugzilla.suse.com/1143187" source="BUGZILLA"/>
		<reference ref_id="1144123" ref_url="https://bugzilla.suse.com/1144123" source="BUGZILLA"/>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1145477" ref_url="https://bugzilla.suse.com/1145477" source="BUGZILLA"/>
		<reference ref_id="1146042" ref_url="https://bugzilla.suse.com/1146042" source="BUGZILLA"/>
		<reference ref_id="1146163" ref_url="https://bugzilla.suse.com/1146163" source="BUGZILLA"/>
		<reference ref_id="1146285" ref_url="https://bugzilla.suse.com/1146285" source="BUGZILLA"/>
		<reference ref_id="1146361" ref_url="https://bugzilla.suse.com/1146361" source="BUGZILLA"/>
		<reference ref_id="1146378" ref_url="https://bugzilla.suse.com/1146378" source="BUGZILLA"/>
		<reference ref_id="1146391" ref_url="https://bugzilla.suse.com/1146391" source="BUGZILLA"/>
		<reference ref_id="1146413" ref_url="https://bugzilla.suse.com/1146413" source="BUGZILLA"/>
		<reference ref_id="1146425" ref_url="https://bugzilla.suse.com/1146425" source="BUGZILLA"/>
		<reference ref_id="1146512" ref_url="https://bugzilla.suse.com/1146512" source="BUGZILLA"/>
		<reference ref_id="1146514" ref_url="https://bugzilla.suse.com/1146514" source="BUGZILLA"/>
		<reference ref_id="1146516" ref_url="https://bugzilla.suse.com/1146516" source="BUGZILLA"/>
		<reference ref_id="1146519" ref_url="https://bugzilla.suse.com/1146519" source="BUGZILLA"/>
		<reference ref_id="1146524" ref_url="https://bugzilla.suse.com/1146524" source="BUGZILLA"/>
		<reference ref_id="1146526" ref_url="https://bugzilla.suse.com/1146526" source="BUGZILLA"/>
		<reference ref_id="1146529" ref_url="https://bugzilla.suse.com/1146529" source="BUGZILLA"/>
		<reference ref_id="1146540" ref_url="https://bugzilla.suse.com/1146540" source="BUGZILLA"/>
		<reference ref_id="1146543" ref_url="https://bugzilla.suse.com/1146543" source="BUGZILLA"/>
		<reference ref_id="1146547" ref_url="https://bugzilla.suse.com/1146547" source="BUGZILLA"/>
		<reference ref_id="1146550" ref_url="https://bugzilla.suse.com/1146550" source="BUGZILLA"/>
		<reference ref_id="1146584" ref_url="https://bugzilla.suse.com/1146584" source="BUGZILLA"/>
		<reference ref_id="1146589" ref_url="https://bugzilla.suse.com/1146589" source="BUGZILLA"/>
		<reference ref_id="1147022" ref_url="https://bugzilla.suse.com/1147022" source="BUGZILLA"/>
		<reference ref_id="1147122" ref_url="https://bugzilla.suse.com/1147122" source="BUGZILLA"/>
		<reference ref_id="1148394" ref_url="https://bugzilla.suse.com/1148394" source="BUGZILLA"/>
		<reference ref_id="1148938" ref_url="https://bugzilla.suse.com/1148938" source="BUGZILLA"/>
		<reference ref_id="1149083" ref_url="https://bugzilla.suse.com/1149083" source="BUGZILLA"/>
		<reference ref_id="1149376" ref_url="https://bugzilla.suse.com/1149376" source="BUGZILLA"/>
		<reference ref_id="1149522" ref_url="https://bugzilla.suse.com/1149522" source="BUGZILLA"/>
		<reference ref_id="1149527" ref_url="https://bugzilla.suse.com/1149527" source="BUGZILLA"/>
		<reference ref_id="1149555" ref_url="https://bugzilla.suse.com/1149555" source="BUGZILLA"/>
		<reference ref_id="1149612" ref_url="https://bugzilla.suse.com/1149612" source="BUGZILLA"/>
		<reference ref_id="1150025" ref_url="https://bugzilla.suse.com/1150025" source="BUGZILLA"/>
		<reference ref_id="1150112" ref_url="https://bugzilla.suse.com/1150112" source="BUGZILLA"/>
		<reference ref_id="1150452" ref_url="https://bugzilla.suse.com/1150452" source="BUGZILLA"/>
		<reference ref_id="1150457" ref_url="https://bugzilla.suse.com/1150457" source="BUGZILLA"/>
		<reference ref_id="1150465" ref_url="https://bugzilla.suse.com/1150465" source="BUGZILLA"/>
		<reference ref_id="1150727" ref_url="https://bugzilla.suse.com/1150727" source="BUGZILLA"/>
		<reference ref_id="1150942" ref_url="https://bugzilla.suse.com/1150942" source="BUGZILLA"/>
		<reference ref_id="1151347" ref_url="https://bugzilla.suse.com/1151347" source="BUGZILLA"/>
		<reference ref_id="1151350" ref_url="https://bugzilla.suse.com/1151350" source="BUGZILLA"/>
		<reference ref_id="1152685" ref_url="https://bugzilla.suse.com/1152685" source="BUGZILLA"/>
		<reference ref_id="1152782" ref_url="https://bugzilla.suse.com/1152782" source="BUGZILLA"/>
		<reference ref_id="1152788" ref_url="https://bugzilla.suse.com/1152788" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153263" ref_url="https://bugzilla.suse.com/1153263" source="BUGZILLA"/>
		<reference ref_id="1154103" ref_url="https://bugzilla.suse.com/1154103" source="BUGZILLA"/>
		<reference ref_id="1154372" ref_url="https://bugzilla.suse.com/1154372" source="BUGZILLA"/>
		<reference ref_id="1155131" ref_url="https://bugzilla.suse.com/1155131" source="BUGZILLA"/>
		<reference ref_id="1155671" ref_url="https://bugzilla.suse.com/1155671" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10906" ref_url="https://www.suse.com/security/cve/CVE-2016-10906/" source="CVE"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2017-18509" ref_url="https://www.suse.com/security/cve/CVE-2017-18509/" source="CVE"/>
		<reference ref_id="CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551/" source="CVE"/>
		<reference ref_id="CVE-2017-18595" ref_url="https://www.suse.com/security/cve/CVE-2017-18595/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-20976" ref_url="https://www.suse.com/security/cve/CVE-2018-20976/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15211" ref_url="https://www.suse.com/security/cve/CVE-2019-15211/" source="CVE"/>
		<reference ref_id="CVE-2019-15212" ref_url="https://www.suse.com/security/cve/CVE-2019-15212/" source="CVE"/>
		<reference ref_id="CVE-2019-15214" ref_url="https://www.suse.com/security/cve/CVE-2019-15214/" source="CVE"/>
		<reference ref_id="CVE-2019-15215" ref_url="https://www.suse.com/security/cve/CVE-2019-15215/" source="CVE"/>
		<reference ref_id="CVE-2019-15216" ref_url="https://www.suse.com/security/cve/CVE-2019-15216/" source="CVE"/>
		<reference ref_id="CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217/" source="CVE"/>
		<reference ref_id="CVE-2019-15218" ref_url="https://www.suse.com/security/cve/CVE-2019-15218/" source="CVE"/>
		<reference ref_id="CVE-2019-15219" ref_url="https://www.suse.com/security/cve/CVE-2019-15219/" source="CVE"/>
		<reference ref_id="CVE-2019-15220" ref_url="https://www.suse.com/security/cve/CVE-2019-15220/" source="CVE"/>
		<reference ref_id="CVE-2019-15221" ref_url="https://www.suse.com/security/cve/CVE-2019-15221/" source="CVE"/>
		<reference ref_id="CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15505" ref_url="https://www.suse.com/security/cve/CVE-2019-15505/" source="CVE"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2019-15807" ref_url="https://www.suse.com/security/cve/CVE-2019-15807/" source="CVE"/>
		<reference ref_id="CVE-2019-15902" ref_url="https://www.suse.com/security/cve/CVE-2019-15902/" source="CVE"/>
		<reference ref_id="CVE-2019-15924" ref_url="https://www.suse.com/security/cve/CVE-2019-15924/" source="CVE"/>
		<reference ref_id="CVE-2019-15926" ref_url="https://www.suse.com/security/cve/CVE-2019-15926/" source="CVE"/>
		<reference ref_id="CVE-2019-15927" ref_url="https://www.suse.com/security/cve/CVE-2019-15927/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-16413" ref_url="https://www.suse.com/security/cve/CVE-2019-16413/" source="CVE"/>
		<reference ref_id="CVE-2019-16995" ref_url="https://www.suse.com/security/cve/CVE-2019-16995/" source="CVE"/>
		<reference ref_id="CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055/" source="CVE"/>
		<reference ref_id="CVE-2019-17056" ref_url="https://www.suse.com/security/cve/CVE-2019-17056/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-9456" ref_url="https://www.suse.com/security/cve/CVE-2019-9456/" source="CVE"/>
		<reference ref_id="CVE-2019-9506" ref_url="https://www.suse.com/security/cve/CVE-2019-9506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12-SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
  condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
  Exception during Page Size Change, causing the CPU core to be non-functional.

  The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in
  executable pages by splitting / merging huge pages into small pages as
  needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7023735

- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port
  failed to add a port, which may have caused denial of service (bsc#1152685).

- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
  Transactional Memory support could be used to facilitate sidechannel
  information leaks out of microarchitectural buffers, similar to the
  previously described 'Microarchitectural Data Sampling' attack.

  The Linux kernel was supplemented with the option to disable TSX operation
  altogether (requiring CPU Microcode updates on older systems) and better
  flushing of microarchitectural buffers (VERW).

  The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251

- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the
  alloc_workqueue return value, leading to a NULL pointer dereference.
  (bsc#1150457).

- CVE-2019-10220: Added sanity checks on the pathnames passed to the user
  space. (bsc#1144903).

- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).

- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,
  leading to a Buffer Overflow (bsc#1153158).

- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell
  libertas driver (bsc#1150465).

- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return
  value, leading to a NULL pointer dereference. (bsc#1150452).

- CVE-2019-17055: The AF_ISDN network module in the Linux kernel did not
  enforce CAP_NET_RAW, which meant that unprivileged users could create a raw
  socket (bnc#1152782).

- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which
  meant that unprivileged users could create a raw socket (bsc#1152788).

- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly,
  which caused an i_size_read() infinite loop and denial of service on SMP
  systems (bnc#1151347).

- CVE-2019-15902: A backporting issue was discovered that re-introduced the
  Spectre vulnerability it had aimed to eliminate. This occurred because the
  backport process depends on cherry picking specific commits, and because two
  (correctly ordered) code lines were swapped (bnc#1149376).

- CVE-2019-15291: Fixed a NULL pointer dereference issue that could be caused
  by a malicious USB device (bnc#1146519).

- CVE-2019-15807: Fixed a memory leak in the SCSI module that could be abused
  to cause denial of service (bnc#1148938).

- CVE-2019-13272: Fixed a mishandled the recording of the credentials of a
  process that wants to create a ptrace relationship, which allowed local users
  to obtain root access by leveraging certain scenarios with a parent-child
  process relationship, where a parent drops privileges and calls execve
  (potentially allowing control by an attacker). (bnc#1140671).

- CVE-2019-14821: An out-of-bounds access issue was fixed in the kernel's KVM
  hypervisor. An unprivileged host user or process with access to '/dev/kvm'
  device could use this flaw to crash the host kernel, resulting in a denial of
  service or potentially escalating privileges on the system (bnc#1151350).

- CVE-2019-15505: An out-of-bounds issue had been fixed that could be caused by
  crafted USB device traffic (bnc#1147122).

- CVE-2017-18595: A double free in allocate_trace_buffer was fixed
  (bnc#1149555).

- CVE-2019-14835: A buffer overflow flaw was found in the kernel's vhost
  functionality that translates virtqueue buffers to IOVs. A privileged guest
  user able to pass descriptors with invalid length to the host could use this
  flaw to increase their privileges on the host (bnc#1150112).

- CVE-2019-15216: A NULL pointer dereference was fixed that could be malicious
  USB device (bnc#1146361).

- CVE-2019-15924: A a NULL pointer dereference has been fixed in the
  drivers/net/ethernet/intel/fm10k module (bnc#1149612).

- CVE-2019-9456: An out-of-bounds write in the USB monitor driver has been
  fixed. This issue could lead to local escalation of privilege with System
  execution privileges needed. (bnc#1150025).

- CVE-2019-15926: An out-of-bounds access was fixed in the
  drivers/net/wireless/ath/ath6kl module. (bnc#1149527).

- CVE-2019-15927: An out-of-bounds access was fixed in the sound/usb/mixer
  module (bnc#1149522).

- CVE-2019-15666: There was an out-of-bounds array access in the net/xfrm
  module that could cause denial of service (bnc#1148394).

- CVE-2017-18379: An out-of-boundary access was fixed in the
  drivers/nvme/target module (bnc#1143187).

- CVE-2019-15219: A NULL pointer dereference was fixed that could be abused by
  a malicious USB device (bnc#1146519 1146524).

- CVE-2019-15220: A use-after-free issue was fixed that could be caused by a
  malicious USB device (bnc#1146519 1146526).

- CVE-2019-15221: A NULL pointer dereference was fixed that could be caused by
  a malicious USB device (bnc#1146519 1146529).

- CVE-2019-14814: A heap-based buffer overflow was fixed in the marvell wifi
  chip driver. That issue allowed local users to cause a denial of service
  (system crash) or possibly execute arbitrary code (bnc#1146512).

- CVE-2019-14815: A missing length check while parsing WMM IEs was fixed
  (bsc#1146512, bsc#1146514, bsc#1146516).

- CVE-2019-14816: A heap-based buffer overflow in the marvell wifi chip driver
  was fixed. Local users would have abused this issue to cause a denial of
  service (system crash) or possibly execute arbitrary code (bnc#1146516).

- CVE-2017-18509: An issue in net/ipv6 as fixed. By setting a specific socket
  option, an attacker could control a pointer in kernel land and cause an
  inet_csk_listen_stop general protection fault, or potentially execute
  arbitrary code under certain circumstances. The issue can be triggered as
  root (e.g., inside a default LXC container or with the CAP_NET_ADMIN
  capability) or after namespace unsharing. (bnc#1145477)

- CVE-2019-9506: The Bluetooth BR/EDR specification used to permit sufficiently
  low encryption key length and did not prevent an attacker from influencing
  the key length negotiation. This allowed practical brute-force attacks (aka
  'KNOB') that could decrypt traffic and inject arbitrary ciphertext without
  the victim noticing (bnc#1137865).

- CVE-2019-15098: A NULL pointer dereference in drivers/net/wireless/ath was
  fixed (bnc#1146378).

- CVE-2019-15290: A NULL pointer dereference in ath6kl_usb_alloc_urb_from_pipe
  was fixed (bsc#1146378).

- CVE-2019-15239: A incorrect patch to net/ipv4 was fixed. By adding to a write
  queue between disconnection and re-connection, a local attacker could trigger
  multiple use-after-free conditions. This could result in kernel crashes or
  potentially in privilege escalation. (bnc#1146589)

- CVE-2019-15212: A double-free issue was fixed in drivers/usb driver
  (bnc#1146391).

- CVE-2016-10906: A use-after-free issue was fixed in drivers/net/ethernet/arc
  (bnc#1146584).

- CVE-2019-15211: A use-after-free issue caused by a malicious USB device was
  fixed in the drivers/media/v4l2-core driver (bnc#1146519).

- CVE-2019-15217: A a NULL pointer dereference issue caused by a malicious USB
  device was fixed in the drivers/media/usb/zr364xx driver (bnc#1146519).

- CVE-2019-15214: An a use-after-free issue in the sound subsystem was fixed
  (bnc#1146519).

- CVE-2019-15218: A NULL pointer dereference caused by a malicious USB device
  was fixed in the drivers/media/usb/siano driver (bnc#1146413).

- CVE-2019-15215: A use-after-free issue caused by a malicious USB device was
  fixed in the drivers/media/usb/cpia2 driver (bnc#1146425).

- CVE-2018-20976: A use-after-free issue was fixed in the fs/xfs driver
  (bnc#1146285).

- CVE-2017-18551: An out-of-bounds write was fixed in the drivers/i2c driver
  (bnc#1146163).

- CVE-2019-0154: An unprotected read access to i915 registers has been fixed
  that could have been abused to facilitate a local denial-of-service attack.
  (bsc#1135966)

- CVE-2019-0155: A privilege escalation vulnerability has been fixed in the
  i915 module that allowed batch buffers from user mode to gain super user
  privileges. (bsc#1135967)

The following non-security bugs were fixed:

- array_index_nospec: Sanitize speculative array (bsc#1155671)
- bonding/802.3ad: fix link_failure_count tracking (bsc#1141013).
- bonding/802.3ad: fix slave link initialization transition states (bsc#1141013).
- bonding: correctly update link status during mii-commit phase (bsc#1141013).
- bonding: fix active-backup transition (bsc#1141013).
- bonding: make speed, duplex setting consistent with link state (bsc#1141013).
- bonding: ratelimit failed speed/duplex update warning (bsc#1141013).
- bonding: require speed/duplex only for 802.3ad, alb and tlb (bsc#1141013).
- bonding: set default miimon value for non-arp modes if not set (bsc#1141013).
- bonding: speed/duplex update at NETDEV_UP event (bsc#1141013).
- cifs: fix panic in smb2_reconnect (bsc#1142458).
- cifs: handle netapp error codes (bsc#1136261).
- cpu/speculation: Uninline and export CPU mitigations helpers (bnc#1117665).
- ib/core, ipoib: Do not overreact to SM LID change event (bsc#1154103)
- ib/core: Add mitigation for Spectre V1 (bsc#1155671)
- ixgbe: sync the first fragment unconditionally (bsc#1133140).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: lapic: cap __delay at lapic_timer_advance_ns (bsc#1149083).
- kvm: mmu: drop vcpu param in gpte_access (bsc#1117665).
- kvm: mmu: introduce kvm_mmu_gfn_{allow,disallow}_lpage (bsc#1117665).
- kvm: mmu: rename has_wrprotected_page to mmu_gfn_lpage_is_disallowed (bsc#1117665).
- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- kvm: x86: MMU: Consolidate quickly_check_mmio_pf() and is_mmio_page_fault() (bsc#1117665).
- kvm: x86: MMU: Encapsulate the type of rmap-chain head in a new struct (bsc#1117665).
- kvm: x86: MMU: Move handle_mmio_page_fault() call to kvm_mmu_page_fault() (bsc#1117665).
- kvm: x86: MMU: Move initialization of parent_ptes out from kvm_mmu_alloc_page() (bsc#1117665).
- kvm: x86: MMU: Move parent_pte handling from kvm_mmu_get_page() to link_shadow_page() (bsc#1117665).
- kvm: x86: MMU: Remove unused parameter parent_pte from kvm_mmu_get_page() (bsc#1117665).
- kvm: x86: MMU: always set accessed bit in shadow PTEs (bsc#1117665).
- kvm: x86: Reduce the overhead when lapic_timer_advance is disabled (bsc#1149083).
- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- kvm: x86: extend usage of RET_MMIO_PF_* constants (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT (bnc#1117665).
- kvm: x86: move nsec_to_cycles from x86.c to x86.h (bsc#1149083).
- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- kvm: x86: simplify ept_misconfig (bsc#1117665).
- media: smsusb: better handle optional alignment (bsc#1146413).
- pci: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).
- powerpc/64s: support nospectre_v2 cmdline option (bsc#1131107).
- powerpc/pseries: correctly track irq state in default idle (bsc#1150727 bsc#1150942 ltc#178925 ltc#181484).
- powerpc/rtas: use device model APIs and serialization during LPM (bsc#1144123 ltc#178840).
- powerpc/security: Show powerpc_security_features in debugfs (bsc#1131107).
- scsi: scsi_transport_fc: Drop double list_del() (bsc#1084878) During the backport of 260f4aeddb48 ('scsi: scsi_transport_fc: return -EBUSY for deleted vport') an additional list_del() was introduced. The list entry will be freed in fc_vport_terminate(). Do not free it premature in fc_remove_host().
- swiotlb: Add support for DMA_ATTR_SKIP_CPU_SYNC in Xen-swiotlb unmap path (bsc#1133140).
- vmci: Release resource if the work is already queued (bsc#1051510).
- x86/cpu: Add Atom Tremont (Jacobsville) (bsc#1117665).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084878">SUSE bug 1084878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117665">SUSE bug 1117665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133140">SUSE bug 1133140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135966">SUSE bug 1135966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135967">SUSE bug 1135967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136261">SUSE bug 1136261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137865">SUSE bug 1137865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140671">SUSE bug 1140671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141013">SUSE bug 1141013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141054">SUSE bug 1141054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142458">SUSE bug 1142458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143187">SUSE bug 1143187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144123">SUSE bug 1144123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145477">SUSE bug 1145477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146042">SUSE bug 1146042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146163">SUSE bug 1146163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146285">SUSE bug 1146285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146361">SUSE bug 1146361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146378">SUSE bug 1146378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146391">SUSE bug 1146391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146413">SUSE bug 1146413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146425">SUSE bug 1146425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146512">SUSE bug 1146512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146514">SUSE bug 1146514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146516">SUSE bug 1146516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146524">SUSE bug 1146524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146526">SUSE bug 1146526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146529">SUSE bug 1146529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146540">SUSE bug 1146540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146543">SUSE bug 1146543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146547">SUSE bug 1146547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146550">SUSE bug 1146550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146584">SUSE bug 1146584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146589">SUSE bug 1146589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147022">SUSE bug 1147022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147122">SUSE bug 1147122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148394">SUSE bug 1148394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148938">SUSE bug 1148938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149083">SUSE bug 1149083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149376">SUSE bug 1149376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149522">SUSE bug 1149522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149527">SUSE bug 1149527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149555">SUSE bug 1149555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149612">SUSE bug 1149612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150025">SUSE bug 1150025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150112">SUSE bug 1150112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150452">SUSE bug 1150452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150457">SUSE bug 1150457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150465">SUSE bug 1150465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150727">SUSE bug 1150727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150942">SUSE bug 1150942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151347">SUSE bug 1151347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151350">SUSE bug 1151350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152685">SUSE bug 1152685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152782">SUSE bug 1152782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152788">SUSE bug 1152788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153263">SUSE bug 1153263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154103">SUSE bug 1154103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154372">SUSE bug 1154372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155131">SUSE bug 1155131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155671">SUSE bug 1155671</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10906/">CVE-2016-10906 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10906">CVE-2016-10906 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18509/">CVE-2017-18509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18509">CVE-2017-18509 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18551">CVE-2017-18551 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18595/">CVE-2017-18595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18595">CVE-2017-18595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20976/">CVE-2018-20976 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20976">CVE-2018-20976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0154">CVE-2019-0154 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0155">CVE-2019-0155 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13272">CVE-2019-13272 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14814">CVE-2019-14814 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14815">CVE-2019-14815 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14816">CVE-2019-14816 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14821">CVE-2019-14821 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15098">CVE-2019-15098 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15211/">CVE-2019-15211 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15211">CVE-2019-15211 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15212/">CVE-2019-15212 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15212">CVE-2019-15212 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15214/">CVE-2019-15214 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15214">CVE-2019-15214 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15215/">CVE-2019-15215 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15215">CVE-2019-15215 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15216/">CVE-2019-15216 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15216">CVE-2019-15216 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15217">CVE-2019-15217 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15218/">CVE-2019-15218 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15218">CVE-2019-15218 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15219/">CVE-2019-15219 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15219">CVE-2019-15219 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15220/">CVE-2019-15220 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15220">CVE-2019-15220 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15221/">CVE-2019-15221 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15221">CVE-2019-15221 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15239">CVE-2019-15239 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15290">CVE-2019-15290 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15291">CVE-2019-15291 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15505/">CVE-2019-15505 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15505">CVE-2019-15505 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15666">CVE-2019-15666 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15807/">CVE-2019-15807 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15807">CVE-2019-15807 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15902/">CVE-2019-15902 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15902">CVE-2019-15902 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15924/">CVE-2019-15924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15924">CVE-2019-15924 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15926/">CVE-2019-15926 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15926">CVE-2019-15926 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15927/">CVE-2019-15927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15927">CVE-2019-15927 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16232">CVE-2019-16232 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16233">CVE-2019-16233 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16234">CVE-2019-16234 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16413/">CVE-2019-16413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-16413">CVE-2019-16413 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16995/">CVE-2019-16995 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16995">CVE-2019-16995 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17055">CVE-2019-17055 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17056/">CVE-2019-17056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-17056">CVE-2019-17056 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17666">CVE-2019-17666 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9456/">CVE-2019-9456 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9456">CVE-2019-9456 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9506/">CVE-2019-9506 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9506">CVE-2019-9506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555678" comment="kernel-default-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555679" comment="kernel-default-base-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555680" comment="kernel-default-devel-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556142" comment="kernel-default-kgraft-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538349" comment="kernel-devel-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538350" comment="kernel-macros-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538351" comment="kernel-source-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555681" comment="kernel-syms-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556144" comment="kgraft-patch-4_4_180-94_107-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148212" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2959-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to 20191112 security release (bsc#1155988)
  - Processor             Identifier     Version       Products
  - Model        Stepping F-MO-S/PI      Old-&gt;New
  - ---- new platforms ----------------------------------------
  - CML-U62      A0       6-a6-0/80           000000c6 Core Gen10 Mobile
  - CNL-U        D0       6-66-3/80           0000002a Core Gen8 Mobile
  - SKX-SP       B1       6-55-3/97           01000150 Xeon Scalable
  - ICL U/Y      D1       6-7e-5/80           00000046 Core Gen10 Mobile
  - ---- updated platforms ------------------------------------
  - SKL U/Y      D0       6-4e-3/c0 000000cc-&gt;000000d4 Core Gen6 Mobile
  - SKL H/S/E3   R0/N0    6-5e-3/36 000000cc-&gt;000000d4 Core Gen6
  - AML-Y22      H0       6-8e-9/10 000000b4-&gt;000000c6 Core Gen8 Mobile
  - KBL-U/Y      H0       6-8e-9/c0 000000b4-&gt;000000c6 Core Gen7 Mobile
  - CFL-U43e     D0       6-8e-a/c0 000000b4-&gt;000000c6 Core Gen8 Mobile
  - WHL-U        W0       6-8e-b/d0 000000b8-&gt;000000c6 Core Gen8 Mobile
  - AML-Y        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - CML-U42      V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - WHL-U        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen8 Mobile
  - KBL-G/X      H0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7/Gen8
  - KBL-H/S/E3   B0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7; Xeon E3 v6
  - CFL-H/S/E3   U0       6-9e-a/22 000000b4-&gt;000000c6 Core Gen8 Desktop, Mobile, Xeon E
  - CFL-S        B0       6-9e-b/02 000000b4-&gt;000000c6 Core Gen8
  - CFL-H        R0       6-9e-d/22 000000b8-&gt;000000c6 Core Gen9 Mobile
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)

- requires coreutils for the %post script (bsc#1154043)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11139">CVE-2019-11139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522370" comment="ucode-intel-20191112-13.53.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148213" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1156402" ref_url="https://bugzilla.suse.com/1156402" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006137.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2019-2201: Several integer overflow issues and subsequent segfaults occurred in libjpeg-turbo,
  when attempting to compress or decompress gigapixel images. [bsc#1156402]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-14"/>
	<updated date="2019-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156402">SUSE bug 1156402</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2201">CVE-2019-2201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522374" comment="libjpeg-turbo-1.5.3-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522375" comment="libjpeg62-62.2.0-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522376" comment="libjpeg62-32bit-62.2.0-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522377" comment="libjpeg62-turbo-1.5.3-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522378" comment="libjpeg8-8.1.2-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522379" comment="libjpeg8-32bit-8.1.2-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522380" comment="libturbojpeg0-8.1.2-31.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148214" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1156275" ref_url="https://bugzilla.suse.com/1156275" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14869" ref_url="https://www.suse.com/security/cve/CVE-2019-14869/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006145.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issue:
	  
- CVE-2019-14869: Fixed a possible  dSAFER escape which could have allowed 
  an attacker to gain high privileges by a specially crafted Postscript 
  code (bsc#1156275).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156275">SUSE bug 1156275</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14869/">CVE-2019-14869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14869">CVE-2019-14869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522381" comment="ghostscript-9.27-23.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522382" comment="ghostscript-x11-9.27-23.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148215" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006148.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to 20191112 official security release (bsc#1155988)
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11139">CVE-2019-11139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522383" comment="ucode-intel-20191112a-13.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148216" version="1" class="patch">
	<metadata>
		<title>Security update for python-ecdsa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1153165" ref_url="https://bugzilla.suse.com/1153165" source="BUGZILLA"/>
		<reference ref_id="1154217" ref_url="https://bugzilla.suse.com/1154217" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14853" ref_url="https://www.suse.com/security/cve/CVE-2019-14853/" source="CVE"/>
		<reference ref_id="CVE-2019-14859" ref_url="https://www.suse.com/security/cve/CVE-2019-14859/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006158.html" source="SUSE-SU"/>
		<description>
This update for python-ecdsa to version 0.13.3 fixes the following issues:

Security issues fixed:

- CVE-2019-14853: Fixed unexpected exceptions during signature decoding (bsc#1153165).
- CVE-2019-14859: Fixed a signature malleability caused by insufficient checks of DER encoding (bsc#1154217).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-21"/>
	<updated date="2019-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153165">SUSE bug 1153165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154217">SUSE bug 1154217</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14853/">CVE-2019-14853 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14853">CVE-2019-14853 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14859/">CVE-2019-14859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14859">CVE-2019-14859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525259" comment="python-ecdsa-0.13.3-5.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148217" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1155787" ref_url="https://bugzilla.suse.com/1155787" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006167.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2017-2518: Fixed a use-after-free vulnerability which could have 
  led to buffer overflow via a crafted SQL statement (bsc#1155787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155787">SUSE bug 1155787</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2518">CVE-2017-2518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522390" comment="libsqlite3-0-3.8.10.2-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522391" comment="libsqlite3-0-32bit-3.8.10.2-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522392" comment="sqlite3-3.8.10.2-9.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148218" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1146358" ref_url="https://bugzilla.suse.com/1146358" source="BUGZILLA"/>
		<reference ref_id="1146359" ref_url="https://bugzilla.suse.com/1146359" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006170.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2019-8675: Fixed a stack buffer overflow in libcups's asn1_get_type function(bsc#1146358). 
- CVE-2019-8696: Fixed a stack buffer overflow in libcups's asn1_get_packed function (bsc#1146359).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146359">SUSE bug 1146359</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8675">CVE-2019-8675 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8696">CVE-2019-8696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522393" comment="cups-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522394" comment="cups-client-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522395" comment="cups-libs-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522396" comment="cups-libs-32bit-1.7.5-20.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148219" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="1151839" ref_url="https://bugzilla.suse.com/1151839" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006180.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Security issue fixed:

- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).

Non-security issues fixed:

- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option (bsc#1144504).
- Increased the startup timeout of clamd to 5 minutes to cater for the grown virus database as a workaround until clamd has learned to talk to systemd to extend the timeout as long as needed (bsc#1151839).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151839">SUSE bug 1151839</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12625">CVE-2019-12625 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522401" comment="clamav-0.100.3-33.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148220" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1154328" ref_url="https://bugzilla.suse.com/1154328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3693" ref_url="https://www.suse.com/security/cve/CVE-2019-3693/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006186.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:
	  
- CVE-2019-3693: Fixed a local privilege escalation from wwwrun to root (bsc#1154328).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154328">SUSE bug 1154328</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3693/">CVE-2019-3693 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3693">CVE-2019-3693 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530781" comment="mailman-2.1.17-3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148221" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1152856" ref_url="https://bugzilla.suse.com/1152856" source="BUGZILLA"/>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2894" ref_url="https://www.suse.com/security/cve/CVE-2019-2894/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Security issues fixed (October 2019 CPU  bsc#1154212):	  

- CVE-2019-2933: Windows file handling redux
- CVE-2019-2945: Better socket support
- CVE-2019-2949: Better Kerberos ccache handling
- CVE-2019-2958: Build Better Processes
- CVE-2019-2964: Better support for patterns
- CVE-2019-2962: Better Glyph Images
- CVE-2019-2973: Better pattern compilation
- CVE-2019-2978: Improved handling of jar files
- CVE-2019-2981: Better Path supports
- CVE-2019-2983: Better serial attributes
- CVE-2019-2987: Better rendering of native glyphs
- CVE-2019-2988: Better Graphics2D drawing
- CVE-2019-2989: Improve TLS connection support
- CVE-2019-2992: Enhance font glyph mapping
- CVE-2019-2999: Commentary on Javadoc comments
- CVE-2019-2894: Enhance ECDSA operations (bsc#1152856).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-27"/>
	<updated date="2019-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152856">SUSE bug 1152856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2894/">CVE-2019-2894 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2894">CVE-2019-2894 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2949">CVE-2019-2949 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2958">CVE-2019-2958 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2987">CVE-2019-2987 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530782" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530783" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148222" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006210.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:
	  
- CVE-2019-15961: Fixed a denial of service which might occur when 
  scanning a specially crafted email file as (bsc#1157763).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15961">CVE-2019-15961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522421" comment="clamav-0.100.3-33.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148223" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1093414" ref_url="https://bugzilla.suse.com/1093414" source="BUGZILLA"/>
		<reference ref_id="1150734" ref_url="https://bugzilla.suse.com/1150734" source="BUGZILLA"/>
		<reference ref_id="1157198" ref_url="https://bugzilla.suse.com/1157198" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3688" ref_url="https://www.suse.com/security/cve/CVE-2019-3688/" source="CVE"/>
		<reference ref_id="CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006211.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

- CVE-2019-3688: Changed wrong ownership in /usr/sbin/pinger to root:squid
  which could have allowed a squid user to gain persistence by changing the 
  binary (bsc#1093414).
- CVE-2019-3690: Fixed a privilege escalation through untrusted symbolic 
  links (bsc#1150734).
- Fixed a regression which caused segmentation fault (bsc#1157198).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1093414">SUSE bug 1093414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150734">SUSE bug 1150734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157198">SUSE bug 1157198</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3688/">CVE-2019-3688 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3688">CVE-2019-3688 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3690">CVE-2019-3690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530786" comment="permissions-2015.09.28.1626-17.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148224" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1009254" ref_url="https://bugzilla.suse.com/1009254" source="BUGZILLA"/>
		<reference ref_id="1071853" ref_url="https://bugzilla.suse.com/1071853" source="BUGZILLA"/>
		<reference ref_id="1093536" ref_url="https://bugzilla.suse.com/1093536" source="BUGZILLA"/>
		<reference ref_id="1094462" ref_url="https://bugzilla.suse.com/1094462" source="BUGZILLA"/>
		<reference ref_id="1107874" ref_url="https://bugzilla.suse.com/1107874" source="BUGZILLA"/>
		<reference ref_id="1109845" ref_url="https://bugzilla.suse.com/1109845" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10811" ref_url="https://www.suse.com/security/cve/CVE-2018-10811/" source="CVE"/>
		<reference ref_id="CVE-2018-16151" ref_url="https://www.suse.com/security/cve/CVE-2018-16151/" source="CVE"/>
		<reference ref_id="CVE-2018-16152" ref_url="https://www.suse.com/security/cve/CVE-2018-16152/" source="CVE"/>
		<reference ref_id="CVE-2018-17540" ref_url="https://www.suse.com/security/cve/CVE-2018-17540/" source="CVE"/>
		<reference ref_id="CVE-2018-5388" ref_url="https://www.suse.com/security/cve/CVE-2018-5388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006239.html" source="SUSE-SU"/>
		<description>
This update for strongswan provides the following fixes:
	  
Security issues fixed: 

- CVE-2018-5388: Fixed a buffer underflow which may allow to a remote attacker 
  with local user credentials to resource exhaustion and denial of service while 
  reading from the socket (bsc#1094462).
- CVE-2018-10811: Fixed a denial of service during  the IKEv2 key derivation if 
  the openssl plugin is used in FIPS mode and HMAC-MD5 is negotiated as PRF 
  (bsc#1093536).
- CVE-2018-16151,CVE-2018-16152: Fixed multiple flaws in the gmp plugin which 
  might lead to authorization bypass (bsc#1107874).
- CVE-2018-17540: Fixed an improper input validation in gmp plugin (bsc#1109845).  

Other issues addressed:

- Fixed some client fails when the scep server URL is used with HTTPS protocol (bsc#1071853).
- Reject Diffie-Hellman key exchanges using primes smaller than 1024 bit.
- Handle unexpected informational message from SonicWall. (bsc#1009254)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009254">SUSE bug 1009254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071853">SUSE bug 1071853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093536">SUSE bug 1093536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094462">SUSE bug 1094462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109845">SUSE bug 1109845</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10811/">CVE-2018-10811 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10811">CVE-2018-10811 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16151/">CVE-2018-16151 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16151">CVE-2018-16151 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16152/">CVE-2018-16152 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16152">CVE-2018-16152 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17540/">CVE-2018-17540 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17540">CVE-2018-17540 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5388/">CVE-2018-5388 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5388">CVE-2018-5388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522423" comment="strongswan-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552195" comment="strongswan-hmac-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522425" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522426" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148225" version="1" class="patch">
	<metadata>
		<title>Security update for haproxy (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1154980" ref_url="https://bugzilla.suse.com/1154980" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18277" ref_url="https://www.suse.com/security/cve/CVE-2019-18277/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006251.html" source="SUSE-SU"/>
		<description>
This update for haproxy fixes the following issues:

- CVE-2019-18277: Fixed HTTP smuggling in messages with transfer-encoding header missing the 'chunked' value (bsc#1154980).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-12"/>
	<updated date="2019-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154980">SUSE bug 1154980</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18277/">CVE-2019-18277 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18277">CVE-2019-18277 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597152" comment="haproxy-1.6.11-11.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148226" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1152497" ref_url="https://bugzilla.suse.com/1152497" source="BUGZILLA"/>
		<reference ref_id="1154448" ref_url="https://bugzilla.suse.com/1154448" source="BUGZILLA"/>
		<reference ref_id="1154456" ref_url="https://bugzilla.suse.com/1154456" source="BUGZILLA"/>
		<reference ref_id="1154458" ref_url="https://bugzilla.suse.com/1154458" source="BUGZILLA"/>
		<reference ref_id="1154460" ref_url="https://bugzilla.suse.com/1154460" source="BUGZILLA"/>
		<reference ref_id="1154461" ref_url="https://bugzilla.suse.com/1154461" source="BUGZILLA"/>
		<reference ref_id="1154464" ref_url="https://bugzilla.suse.com/1154464" source="BUGZILLA"/>
		<reference ref_id="1155945" ref_url="https://bugzilla.suse.com/1155945" source="BUGZILLA"/>
		<reference ref_id="1157888" ref_url="https://bugzilla.suse.com/1157888" source="BUGZILLA"/>
		<reference ref_id="1158003" ref_url="https://bugzilla.suse.com/1158003" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1158007" ref_url="https://bugzilla.suse.com/1158007" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-18420" ref_url="https://www.suse.com/security/cve/CVE-2019-18420/" source="CVE"/>
		<reference ref_id="CVE-2019-18421" ref_url="https://www.suse.com/security/cve/CVE-2019-18421/" source="CVE"/>
		<reference ref_id="CVE-2019-18422" ref_url="https://www.suse.com/security/cve/CVE-2019-18422/" source="CVE"/>
		<reference ref_id="CVE-2019-18423" ref_url="https://www.suse.com/security/cve/CVE-2019-18423/" source="CVE"/>
		<reference ref_id="CVE-2019-18424" ref_url="https://www.suse.com/security/cve/CVE-2019-18424/" source="CVE"/>
		<reference ref_id="CVE-2019-18425" ref_url="https://www.suse.com/security/cve/CVE-2019-18425/" source="CVE"/>
		<reference ref_id="CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19581" ref_url="https://www.suse.com/security/cve/CVE-2019-19581/" source="CVE"/>
		<reference ref_id="CVE-2019-19582" ref_url="https://www.suse.com/security/cve/CVE-2019-19582/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2019-19581: Fixed a potential out of bounds on 32-bit Arm (bsc#1158003 XSA-307).
- CVE-2019-19582: Fixed a potential infinite loop when x86 accesses to bitmaps with 
  a compile time known size of 64 (bsc#1158003 XSA-307).
- CVE-2019-19583: Fixed improper checks which could have allowed HVM/PVH guest userspace 
  code to crash the guest,leading to a guest denial of service (bsc#1158004 XSA-308).
- CVE-2019-19578: Fixed an issue where a malicious or buggy PV guest could have caused
  hypervisor crash resulting in denial of service affecting the entire host (bsc#1158005 XSA-309).
- CVE-2019-19580: Fixed a privilege escalation where a malicious PV guest administrator 
  could have been able to escalate their privilege to that of the host (bsc#1158006 XSA-310).
- CVE-2019-19577: Fixed an issue where a malicious guest administrator could have caused Xen 
  to access data structures while they are being modified leading to a crash (bsc#1158007 XSA-311). 
- CVE-2019-19579: Fixed a privilege escaltion where an untrusted domain with access 
  to a physical device can DMA into host memory (bsc#1157888 XSA-306).
- CVE-2019-18420: Malicious x86 PV guests may have caused a hypervisor crash, 
  resulting in a denial of service (bsc#1154448 XSA-296)
- CVE-2019-18425: 32-bit PV guest user mode could elevate its privileges to that 
  of the guest kernel. (bsc#1154456 XSA-298).
- CVE-2019-18421: A malicious PV guest administrator may have been able to
  escalate their privilege to that of the host. (bsc#1154458 XSA-299).
- CVE-2019-18423: A malicious guest administrator may cause a hypervisor crash,
  resulting in a denial of service  (bsc#1154460 XSA-301).
- CVE-2019-18422: A malicious ARM guest might contrive to arrange for critical 
  Xen code to run with interrupts erroneously enabled. This could lead to data
  corruption, denial of service, or possibly even privilege escalation. However
  a precise attack technique has not been identified. (bsc#1154464 XSA-303)
- CVE-2019-18424: An untrusted domain with access to a physical device can DMA 
  into host memory, leading to privilege escalation. (bsc#1154461 XSA-302).  
- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
  condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
  Exception during Page Size Change, causing the CPU core to be non-functional.
  (bsc#1155945 XSA-304)  
- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
  Transactional Memory support could be used to facilitate sidechannel
  information leaks out of microarchitectural buffers, similar to the
  previously described 'Microarchitectural Data Sampling' attack. (bsc#1152497 XSA-305).  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-13"/>
	<updated date="2019-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152497">SUSE bug 1152497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154448">SUSE bug 1154448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154456">SUSE bug 1154456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154460">SUSE bug 1154460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154461">SUSE bug 1154461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154464">SUSE bug 1154464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155945">SUSE bug 1155945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18420/">CVE-2019-18420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18420">CVE-2019-18420 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18421/">CVE-2019-18421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18421">CVE-2019-18421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18422/">CVE-2019-18422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18422">CVE-2019-18422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18423/">CVE-2019-18423 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18423">CVE-2019-18423 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18424/">CVE-2019-18424 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18424">CVE-2019-18424 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18425/">CVE-2019-18425 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18425">CVE-2019-18425 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19577">CVE-2019-19577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19578">CVE-2019-19578 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19579">CVE-2019-19579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19580">CVE-2019-19580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19581/">CVE-2019-19581 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19581">CVE-2019-19581 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19582/">CVE-2019-19582 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19582">CVE-2019-19582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19583">CVE-2019-19583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538360" comment="xen-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538361" comment="xen-doc-html-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538362" comment="xen-libs-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538363" comment="xen-libs-32bit-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538364" comment="xen-tools-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538365" comment="xen-tools-domU-4.9.4_06-3.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148227" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1082023" ref_url="https://bugzilla.suse.com/1082023" source="BUGZILLA"/>
		<reference ref_id="1158785" ref_url="https://bugzilla.suse.com/1158785" source="BUGZILLA"/>
		<reference ref_id="1158787" ref_url="https://bugzilla.suse.com/1158787" source="BUGZILLA"/>
		<reference ref_id="1158788" ref_url="https://bugzilla.suse.com/1158788" source="BUGZILLA"/>
		<reference ref_id="1158789" ref_url="https://bugzilla.suse.com/1158789" source="BUGZILLA"/>
		<reference ref_id="1158790" ref_url="https://bugzilla.suse.com/1158790" source="BUGZILLA"/>
		<reference ref_id="1158791" ref_url="https://bugzilla.suse.com/1158791" source="BUGZILLA"/>
		<reference ref_id="1158792" ref_url="https://bugzilla.suse.com/1158792" source="BUGZILLA"/>
		<reference ref_id="1158793" ref_url="https://bugzilla.suse.com/1158793" source="BUGZILLA"/>
		<reference ref_id="1158795" ref_url="https://bugzilla.suse.com/1158795" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1348" ref_url="https://www.suse.com/security/cve/CVE-2019-1348/" source="CVE"/>
		<reference ref_id="CVE-2019-1349" ref_url="https://www.suse.com/security/cve/CVE-2019-1349/" source="CVE"/>
		<reference ref_id="CVE-2019-1350" ref_url="https://www.suse.com/security/cve/CVE-2019-1350/" source="CVE"/>
		<reference ref_id="CVE-2019-1351" ref_url="https://www.suse.com/security/cve/CVE-2019-1351/" source="CVE"/>
		<reference ref_id="CVE-2019-1352" ref_url="https://www.suse.com/security/cve/CVE-2019-1352/" source="CVE"/>
		<reference ref_id="CVE-2019-1353" ref_url="https://www.suse.com/security/cve/CVE-2019-1353/" source="CVE"/>
		<reference ref_id="CVE-2019-1354" ref_url="https://www.suse.com/security/cve/CVE-2019-1354/" source="CVE"/>
		<reference ref_id="CVE-2019-1387" ref_url="https://www.suse.com/security/cve/CVE-2019-1387/" source="CVE"/>
		<reference ref_id="CVE-2019-19604" ref_url="https://www.suse.com/security/cve/CVE-2019-19604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

Security issues fixed:

- CVE-2019-1349: Fixed issue on Windows, when submodules are cloned recursively, under certain circumstances Git could be fooled into using the same Git directory twice (bsc#1158787).
- CVE-2019-19604: Fixed a recursive clone followed by a submodule update could execute code contained within the repository without the user explicitly having asked for that (bsc#1158795).
- CVE-2019-1387: Fixed recursive clones that are currently affected by a vulnerability that is caused by too-lax validation of submodule names, allowing very targeted attacks via remote code execution in recursive clones (bsc#1158793).
- CVE-2019-1354: Fixed issue on Windows that refuses to write tracked files with filenames that contain backslashes (bsc#1158792).
- CVE-2019-1353: Fixed issue when run in the Windows Subsystem for Linux while accessing a working directory on a regular Windows drive, none of the NTFS protections were active (bsc#1158791).
- CVE-2019-1352: Fixed issue on Windows was unaware of NTFS Alternate Data Streams (bsc#1158790).
- CVE-2019-1351: Fixed issue on Windows mistakes drive letters outside of the US-English alphabet as relative paths (bsc#1158789).
- CVE-2019-1350: Fixed incorrect quoting of command-line arguments allowed remote code execution during a recursive clone in conjunction with SSH URLs (bsc#1158788).
- CVE-2019-1348: Fixed the --export-marks option of fast-import is exposed also via  the in-stream command feature export-marks=... and it allows overwriting arbitrary paths (bsc#1158785).
- Fixed an issue where git send-email fails to authenticate with SMTP server (bsc#1082023)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-16"/>
	<updated date="2019-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082023">SUSE bug 1082023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158787">SUSE bug 1158787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158788">SUSE bug 1158788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158789">SUSE bug 1158789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158790">SUSE bug 1158790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158791">SUSE bug 1158791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158792">SUSE bug 1158792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158793">SUSE bug 1158793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158795">SUSE bug 1158795</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-1348/">CVE-2019-1348 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1348">CVE-2019-1348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1349/">CVE-2019-1349 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1349">CVE-2019-1349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1350/">CVE-2019-1350 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1350">CVE-2019-1350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1351/">CVE-2019-1351 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1351">CVE-2019-1351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1352/">CVE-2019-1352 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1352">CVE-2019-1352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1353/">CVE-2019-1353 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1353">CVE-2019-1353 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1354/">CVE-2019-1354 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1354">CVE-2019-1354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1387/">CVE-2019-1387 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1387">CVE-2019-1387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19604/">CVE-2019-19604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19604">CVE-2019-19604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597153" comment="git-2.12.3-27.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530787" comment="git-core-2.12.3-27.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148228" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1158328" ref_url="https://bugzilla.suse.com/1158328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Mozilla Firefox was updated to 68.3esr (MFSA 2019-37 bsc#1158328)	  
	  
Security issues fixed: 

- CVE-2019-17008: Fixed a use-after-free in worker destruction (bmo#1546331)
- CVE-2019-13722: Fixed a stack corruption due to incorrect number of arguments 
  in WebRTC code (bmo#1580156)
- CVE-2019-11745: Fixed an out of bounds write in NSS when encrypting with a 
  block cipher (bmo#1586176)
- CVE-2019-17009: Fixed an issue where updater temporary files accessible to 
  unprivileged processes (bmo#1510494)
- CVE-2019-17010: Fixed a use-after-free when performing device orientation 
  checks (bmo#1581084)
- CVE-2019-17005: Fixed a buffer overflow in plain text serializer (bmo#1584170)
- CVE-2019-17011: Fixed a use-after-free when retrieving a document 
  in antitracking (bmo#1591334)
- CVE-2019-17012: Fixed multiple memmory issues
  (bmo#1449736, bmo#1533957, bmo#1560667,bmo#1567209, bmo#1580288, bmo#1585760, 
  bmo#1592502)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-19"/>
	<updated date="2019-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13722">CVE-2019-13722 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17005">CVE-2019-17005 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17008">CVE-2019-17008 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17009">CVE-2019-17009 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17010">CVE-2019-17010 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17011">CVE-2019-17011 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17012">CVE-2019-17012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148229" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1091041" ref_url="https://bugzilla.suse.com/1091041" source="BUGZILLA"/>
		<reference ref_id="1119461" ref_url="https://bugzilla.suse.com/1119461" source="BUGZILLA"/>
		<reference ref_id="1119465" ref_url="https://bugzilla.suse.com/1119465" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1138190" ref_url="https://bugzilla.suse.com/1138190" source="BUGZILLA"/>
		<reference ref_id="1146544" ref_url="https://bugzilla.suse.com/1146544" source="BUGZILLA"/>
		<reference ref_id="1146612" ref_url="https://bugzilla.suse.com/1146612" source="BUGZILLA"/>
		<reference ref_id="1150466" ref_url="https://bugzilla.suse.com/1150466" source="BUGZILLA"/>
		<reference ref_id="1150483" ref_url="https://bugzilla.suse.com/1150483" source="BUGZILLA"/>
		<reference ref_id="1152631" ref_url="https://bugzilla.suse.com/1152631" source="BUGZILLA"/>
		<reference ref_id="1153811" ref_url="https://bugzilla.suse.com/1153811" source="BUGZILLA"/>
		<reference ref_id="1154905" ref_url="https://bugzilla.suse.com/1154905" source="BUGZILLA"/>
		<reference ref_id="1155689" ref_url="https://bugzilla.suse.com/1155689" source="BUGZILLA"/>
		<reference ref_id="1155897" ref_url="https://bugzilla.suse.com/1155897" source="BUGZILLA"/>
		<reference ref_id="1155898" ref_url="https://bugzilla.suse.com/1155898" source="BUGZILLA"/>
		<reference ref_id="1156187" ref_url="https://bugzilla.suse.com/1156187" source="BUGZILLA"/>
		<reference ref_id="1157038" ref_url="https://bugzilla.suse.com/1157038" source="BUGZILLA"/>
		<reference ref_id="1157042" ref_url="https://bugzilla.suse.com/1157042" source="BUGZILLA"/>
		<reference ref_id="1157070" ref_url="https://bugzilla.suse.com/1157070" source="BUGZILLA"/>
		<reference ref_id="1157143" ref_url="https://bugzilla.suse.com/1157143" source="BUGZILLA"/>
		<reference ref_id="1157158" ref_url="https://bugzilla.suse.com/1157158" source="BUGZILLA"/>
		<reference ref_id="1157191" ref_url="https://bugzilla.suse.com/1157191" source="BUGZILLA"/>
		<reference ref_id="1157324" ref_url="https://bugzilla.suse.com/1157324" source="BUGZILLA"/>
		<reference ref_id="1157333" ref_url="https://bugzilla.suse.com/1157333" source="BUGZILLA"/>
		<reference ref_id="1157464" ref_url="https://bugzilla.suse.com/1157464" source="BUGZILLA"/>
		<reference ref_id="1158132" ref_url="https://bugzilla.suse.com/1158132" source="BUGZILLA"/>
		<reference ref_id="1158394" ref_url="https://bugzilla.suse.com/1158394" source="BUGZILLA"/>
		<reference ref_id="1158398" ref_url="https://bugzilla.suse.com/1158398" source="BUGZILLA"/>
		<reference ref_id="1158410" ref_url="https://bugzilla.suse.com/1158410" source="BUGZILLA"/>
		<reference ref_id="1158413" ref_url="https://bugzilla.suse.com/1158413" source="BUGZILLA"/>
		<reference ref_id="1158417" ref_url="https://bugzilla.suse.com/1158417" source="BUGZILLA"/>
		<reference ref_id="1158445" ref_url="https://bugzilla.suse.com/1158445" source="BUGZILLA"/>
		<reference ref_id="1158823" ref_url="https://bugzilla.suse.com/1158823" source="BUGZILLA"/>
		<reference ref_id="1158824" ref_url="https://bugzilla.suse.com/1158824" source="BUGZILLA"/>
		<reference ref_id="1158827" ref_url="https://bugzilla.suse.com/1158827" source="BUGZILLA"/>
		<reference ref_id="1158834" ref_url="https://bugzilla.suse.com/1158834" source="BUGZILLA"/>
		<reference ref_id="1158900" ref_url="https://bugzilla.suse.com/1158900" source="BUGZILLA"/>
		<reference ref_id="1158903" ref_url="https://bugzilla.suse.com/1158903" source="BUGZILLA"/>
		<reference ref_id="1158904" ref_url="https://bugzilla.suse.com/1158904" source="BUGZILLA"/>
		<reference ref_id="1158954" ref_url="https://bugzilla.suse.com/1158954" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-15213" ref_url="https://www.suse.com/security/cve/CVE-2019-15213/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18680" ref_url="https://www.suse.com/security/cve/CVE-2019-18680/" source="CVE"/>
		<reference ref_id="CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683/" source="CVE"/>
		<reference ref_id="CVE-2019-18805" ref_url="https://www.suse.com/security/cve/CVE-2019-18805/" source="CVE"/>
		<reference ref_id="CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19065" ref_url="https://www.suse.com/security/cve/CVE-2019-19065/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19338" ref_url="https://www.suse.com/security/cve/CVE-2019-19338/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525/" source="CVE"/>
		<reference ref_id="CVE-2019-19527" ref_url="https://www.suse.com/security/cve/CVE-2019-19527/" source="CVE"/>
		<reference ref_id="CVE-2019-19530" ref_url="https://www.suse.com/security/cve/CVE-2019-19530/" source="CVE"/>
		<reference ref_id="CVE-2019-19531" ref_url="https://www.suse.com/security/cve/CVE-2019-19531/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533/" source="CVE"/>
		<reference ref_id="CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534/" source="CVE"/>
		<reference ref_id="CVE-2019-19535" ref_url="https://www.suse.com/security/cve/CVE-2019-19535/" source="CVE"/>
		<reference ref_id="CVE-2019-19536" ref_url="https://www.suse.com/security/cve/CVE-2019-19536/" source="CVE"/>
		<reference ref_id="CVE-2019-19537" ref_url="https://www.suse.com/security/cve/CVE-2019-19537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP 3 LTSS kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2019-14895: A heap-based buffer overflow was discovered in the Linux kernel in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could have allowed the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).
- CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038).
- CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid in the Linux kernel. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free (bnc#1155897).
- CVE-2019-19062: A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333).
- CVE-2019-19065: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures (bnc#1157191).
- CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324).
- CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157143).
- CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function (bnc#1157070).
- CVE-2019-16231: drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150466).
- CVE-2019-18805: An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel There was a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact (bnc#1156187).
- CVE-2019-18680: An issue was discovered in the Linux kernel. There was a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c that will cause denial of service (bnc#1155898).
- CVE-2019-15213: An use-after-free was fixed caused by malicious USB device in drivers/media/usb/dvb-usb/dvb-usb-init.c (bsc#1146544).
- CVE-2019-19536: An uninitialized Kernel memory can leak to USB devices in drivers/net/can/usb/peak_usb/pcan_usb_pro.c (bsc#1158394).
- CVE-2019-19534: An uninitialized Kernel memory can leak to USB devices in drivers/net/can/usb/peak_usb/pcan_usb_core.c (bsc#1158398).
- CVE-2019-19530: An use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver (bsc#1158410).
- CVE-2019-19524: An use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver (bsc#1158413).
- CVE-2019-19525: An use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver (bsc#1158417).
- CVE-2019-19531: An use-after-free in yurex_delete may lead to denial of service (bsc#1158445).
- CVE-2019-19523: An use-after-free on disconnect in USB adutux (bsc#1158823).
- CVE-2019-19532: An out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers (bsc#1158824).
- CVE-2019-19332: An out-of-bounds memory write via kvm_dev_ioctl_get_cpuid (bsc#1158827).
- CVE-2019-19533: An info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver (bsc#1158834).
- CVE-2019-19527: An use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (bsc#1158900).
- CVE-2019-19535: An info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver (bsc#1158903).
- CVE-2019-19537: Two races in the USB character device registration and deregistration routines (bsc#1158904).
- CVE-2019-19338: An incomplete fix for Transaction Asynchronous Abort (TAA) (bsc#1158954).


The following non-security bugs were fixed:

- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).
- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).
- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).
- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).
- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).
- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).
- sched/fair: WARN() and refuse to set buddy when !se-&gt;on_rq (bsc#1158132).
- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).
- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).
- xen/pv: Fix a boot up hang revealed by int3 self test (bsc#1153811).
- arp: Fix cache issue during Life Partition Migration (bsc#1152631).
- futexes: Fix speed on 4.12 kernel (bsc#1157464).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-21"/>
	<updated date="2019-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1091041">SUSE bug 1091041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119461">SUSE bug 1119461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119465">SUSE bug 1119465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138190">SUSE bug 1138190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146544">SUSE bug 1146544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146612">SUSE bug 1146612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150466">SUSE bug 1150466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150483">SUSE bug 1150483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152631">SUSE bug 1152631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153811">SUSE bug 1153811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154905">SUSE bug 1154905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155689">SUSE bug 1155689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155897">SUSE bug 1155897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155898">SUSE bug 1155898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156187">SUSE bug 1156187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157038">SUSE bug 1157038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157042">SUSE bug 1157042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157070">SUSE bug 1157070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157143">SUSE bug 1157143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157158">SUSE bug 1157158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157191">SUSE bug 1157191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157324">SUSE bug 1157324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157333">SUSE bug 1157333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157464">SUSE bug 1157464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158132">SUSE bug 1158132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158394">SUSE bug 1158394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158398">SUSE bug 1158398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158410">SUSE bug 1158410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158413">SUSE bug 1158413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158417">SUSE bug 1158417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158445">SUSE bug 1158445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158823">SUSE bug 1158823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158824">SUSE bug 1158824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158827">SUSE bug 1158827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158900">SUSE bug 1158900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158903">SUSE bug 1158903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158904">SUSE bug 1158904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158954">SUSE bug 1158954</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14895">CVE-2019-14895 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15213/">CVE-2019-15213 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15213">CVE-2019-15213 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16231">CVE-2019-16231 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18660">CVE-2019-18660 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18680/">CVE-2019-18680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18680">CVE-2019-18680 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18683">CVE-2019-18683 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18805/">CVE-2019-18805 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18805">CVE-2019-18805 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19052">CVE-2019-19052 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19062">CVE-2019-19062 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19065/">CVE-2019-19065 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19065">CVE-2019-19065 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19073">CVE-2019-19073 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19074">CVE-2019-19074 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19332">CVE-2019-19332 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19338/">CVE-2019-19338 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19338">CVE-2019-19338 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19523">CVE-2019-19523 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19524">CVE-2019-19524 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19525">CVE-2019-19525 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19527/">CVE-2019-19527 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19527">CVE-2019-19527 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19530/">CVE-2019-19530 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19530">CVE-2019-19530 at NVD</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19531/">CVE-2019-19531 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19531">CVE-2019-19531 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19532">CVE-2019-19532 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19533">CVE-2019-19533 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19534">CVE-2019-19534 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19535/">CVE-2019-19535 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19535">CVE-2019-19535 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19536/">CVE-2019-19536 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19536">CVE-2019-19536 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19537/">CVE-2019-19537 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19537">CVE-2019-19537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555682" comment="kernel-default-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555683" comment="kernel-default-base-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555684" comment="kernel-default-devel-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556175" comment="kernel-default-kgraft-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538370" comment="kernel-devel-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538371" comment="kernel-macros-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538372" comment="kernel-source-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555685" comment="kernel-syms-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556177" comment="kgraft-patch-4_4_180-94_113-default-1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148230" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyKMIP (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1120767" ref_url="https://bugzilla.suse.com/1120767" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000872" ref_url="https://www.suse.com/security/cve/CVE-2018-1000872/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005119.html" source="SUSE-SU"/>
		<description>
This update for python-PyKMIP fixes the following issues:

Security issue fixed:

- CVE-2018-1000872: Fixed a denial-of-service vulnerability which was caused by exhausting 
  the available sockets. To mitigate the issue server socket timeout was decreased (bsc#1120767).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-14"/>
	<updated date="2019-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120767">SUSE bug 1120767</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000872/">CVE-2018-1000872 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000872">CVE-2018-1000872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597154" comment="python-PyKMIP-0.6.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148231" version="1" class="patch">
	<metadata>
		<title>Security update for python-paramiko (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1111151" ref_url="https://bugzilla.suse.com/1111151" source="BUGZILLA"/>
		<reference ref_id="1120531" ref_url="https://bugzilla.suse.com/1120531" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000805" ref_url="https://www.suse.com/security/cve/CVE-2018-1000805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0396-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190396-1.html" source="SUSE-SU"/>
		<description>
This update for python-paramiko to version 2.2.4 fixes the following issues:

Security issue fixed:

- CVE-2018-1000805: Fixed an authentication bypass in auth_handler.py (bsc#1111151)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-14"/>
	<updated date="2019-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111151">SUSE bug 1111151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120531">SUSE bug 1120531</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000805/">CVE-2018-1000805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000805">CVE-2018-1000805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597155" comment="python-paramiko-2.2.4-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148232" version="1" class="patch">
	<metadata>
		<title>Security update for galera-3, mariadb, mariadb-connector-c (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="1097938" ref_url="https://bugzilla.suse.com/1097938" source="BUGZILLA"/>
		<reference ref_id="1098683" ref_url="https://bugzilla.suse.com/1098683" source="BUGZILLA"/>
		<reference ref_id="1101676" ref_url="https://bugzilla.suse.com/1101676" source="BUGZILLA"/>
		<reference ref_id="1101677" ref_url="https://bugzilla.suse.com/1101677" source="BUGZILLA"/>
		<reference ref_id="1101678" ref_url="https://bugzilla.suse.com/1101678" source="BUGZILLA"/>
		<reference ref_id="1103342" ref_url="https://bugzilla.suse.com/1103342" source="BUGZILLA"/>
		<reference ref_id="1111858" ref_url="https://bugzilla.suse.com/1111858" source="BUGZILLA"/>
		<reference ref_id="1111859" ref_url="https://bugzilla.suse.com/1111859" source="BUGZILLA"/>
		<reference ref_id="1112368" ref_url="https://bugzilla.suse.com/1112368" source="BUGZILLA"/>
		<reference ref_id="1112377" ref_url="https://bugzilla.suse.com/1112377" source="BUGZILLA"/>
		<reference ref_id="1112384" ref_url="https://bugzilla.suse.com/1112384" source="BUGZILLA"/>
		<reference ref_id="1112386" ref_url="https://bugzilla.suse.com/1112386" source="BUGZILLA"/>
		<reference ref_id="1112391" ref_url="https://bugzilla.suse.com/1112391" source="BUGZILLA"/>
		<reference ref_id="1112397" ref_url="https://bugzilla.suse.com/1112397" source="BUGZILLA"/>
		<reference ref_id="1112404" ref_url="https://bugzilla.suse.com/1112404" source="BUGZILLA"/>
		<reference ref_id="1112415" ref_url="https://bugzilla.suse.com/1112415" source="BUGZILLA"/>
		<reference ref_id="1112417" ref_url="https://bugzilla.suse.com/1112417" source="BUGZILLA"/>
		<reference ref_id="1112421" ref_url="https://bugzilla.suse.com/1112421" source="BUGZILLA"/>
		<reference ref_id="1112432" ref_url="https://bugzilla.suse.com/1112432" source="BUGZILLA"/>
		<reference ref_id="1116686" ref_url="https://bugzilla.suse.com/1116686" source="BUGZILLA"/>
		<reference ref_id="1118754" ref_url="https://bugzilla.suse.com/1118754" source="BUGZILLA"/>
		<reference ref_id="1120041" ref_url="https://bugzilla.suse.com/1120041" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3060" ref_url="https://www.suse.com/security/cve/CVE-2018-3060/" source="CVE"/>
		<reference ref_id="CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063/" source="CVE"/>
		<reference ref_id="CVE-2018-3064" ref_url="https://www.suse.com/security/cve/CVE-2018-3064/" source="CVE"/>
		<reference ref_id="CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066/" source="CVE"/>
		<reference ref_id="CVE-2018-3143" ref_url="https://www.suse.com/security/cve/CVE-2018-3143/" source="CVE"/>
		<reference ref_id="CVE-2018-3156" ref_url="https://www.suse.com/security/cve/CVE-2018-3156/" source="CVE"/>
		<reference ref_id="CVE-2018-3162" ref_url="https://www.suse.com/security/cve/CVE-2018-3162/" source="CVE"/>
		<reference ref_id="CVE-2018-3173" ref_url="https://www.suse.com/security/cve/CVE-2018-3173/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3185" ref_url="https://www.suse.com/security/cve/CVE-2018-3185/" source="CVE"/>
		<reference ref_id="CVE-2018-3200" ref_url="https://www.suse.com/security/cve/CVE-2018-3200/" source="CVE"/>
		<reference ref_id="CVE-2018-3251" ref_url="https://www.suse.com/security/cve/CVE-2018-3251/" source="CVE"/>
		<reference ref_id="CVE-2018-3277" ref_url="https://www.suse.com/security/cve/CVE-2018-3277/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="CVE-2018-3284" ref_url="https://www.suse.com/security/cve/CVE-2018-3284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<description>
This update for mariadb, galera-3, mariadb-connector fixes the following issues:

Security vulnerabilities addressed for mariadb:

- CVE-2016-9843 [bsc#1013882]
- CVE-2018-3058 [bsc#1101676]
- CVE-2018-3060
- CVE-2018-3063 [bsc#1101677]
- CVE-2018-3064 [bsc#1103342]
- CVE-2018-3066 [bsc#1101678]
- CVE-2018-3143 [bsc#1112421]
- CVE-2018-3156 [bsc#1112417]
- CVE-2018-3162 [bsc#1112415]
- CVE-2018-3173 [bsc#1112386]
- CVE-2018-3174 [bsc#1112368]
- CVE-2018-3185 [bsc#1112384]
- CVE-2018-3200 [bsc#1112404]
- CVE-2018-3251 [bsc#1112397]
- CVE-2018-3277 [bsc#1112391]
- CVE-2018-3282 [bsc#1112432]
- CVE-2018-3284 [bsc#1112377]

Other bug fixes and changes for mariadb:

- update to 10.2.21 GA
    * MDEV-17589 - Stack-buffer-overflow with indexed varchar
      (utf8) field
    * MDEV-16987 - ALTER DATABASE possible in read-only mode
      (forbid ALTER DATABASE in read_only)
    * MDEV-17720 - slave_ddl_exec_mode=IDEMPOTENT does not handle
      DROP DATABASE
    * MDEV-6453 - Assertion `inited==NONE || (inited==RND &amp;&amp; scan)'
      failed in handler::ha_rnd_init(bool) with InnoDB, joins,
      AND/OR conditions
    * MDEV-18105 - Mariabackup fails to copy encrypted InnoDB
      system tablespace if LSN&gt;4G
    * MDEV-18041 - Database corruption after renaming a
      prefix-indexed column [bsc#1120041]
    * MDEV-17470 - Orphan temporary files after interrupted ALTER
      cause InnoDB: Operating system error number 17 and eventual
      fatal error 71
    * MDEV-17833: ALTER TABLE is not enforcing prefix index size
      limit
    * MDEV-17989: InnoDB: Failing assertion:
      dict_tf2_is_valid(flags, flags2)
    * MDEV-17765: Locking bug fix for SPATIAL INDEX
    * MDEV-17923, MDEV-17904, MDEV-17938: Fixes for FULLTEXT INDEX
    * Fixes for regressions introduced in MariaDB Server 10.2.19 by
      the backup-safe TRUNCATE TABLE (MDEV-13564,
      innodb_safe_truncate=ON) and innodb_undo_log_truncate:
      * MDEV-17780, MDEV-17816, MDEV-17849, MDEV-17851, MDEV-17885
    * Several improvements to MariaDB Server and backup for dealing
      with encrypted or page_compressed pages:
      * MDEV-12112: corruption in encrypted table may be overlooked
      * MDEV-17958: On little-endian systems, remove bug-compatible
        variant of innodb_checksum_algorithm=crc32
      * MDEV-17957: Make innodb_checksum_algorithm stricter for
        strict_* values
      * MDEV-18025: Mariabackup fails to detect corrupted
        page_compressed=1 tables
    * release notes and changelog:
      - https://mariadb.com/kb/en/library/mariadb-10221-release-notes
      - https://mariadb.com/kb/en/library/mariadb-10221-changelog
      - https://mariadb.com/kb/en/library/mariadb-10220-release-notes
      - https://mariadb.com/kb/en/library/mariadb-10220-changelog
- remove PerconaFT from the package as it has AGPL licence (bsc#1118754)
- Add patch to link against libatomic where necessary and
  use C++11 atomics instead of gcc built-in atomics
- update to 10.2.19 GA [bsc#1116686]
    * innodb_safe_truncate system variable for a backup-safe
      TRUNCATE TABLE implementation that is based on RENAME,
      CREATE, DROP (MDEV-14717, MDEV-14585, MDEV-13564). Default
      value for this variable is ON. If you absolutely must use
      XtraBackup instead of Mariabackup, you can set it to OFF and
      restart the server
    * MDEV-17289: Multi-pass recovery fails to apply some redo
      log records
    * MDEV-17073: INSERT…ON DUPLICATE KEY UPDATE became more
      deadlock-prone
    * MDEV-17491: micro optimize page_id_t
    * MDEV-13671: InnoDB should use case-insensitive column name
      comparisons like the rest of the server
    * Fixes for indexed virtual columns: MDEV-17215, MDEV-16980
    * MDEV-17433: Allow InnoDB start up with empty ib_logfile0
      from mariabackup --prepare
    * MDEV-12547: InnoDB FULLTEXT index has too strict
      innodb_ft_result_cache_limit max limit
    * MDEV-17541: KILL QUERY during lock wait in FOREIGN KEY
      check causes hang
    * MDEV-17531: Crash in RENAME TABLE with FOREIGN KEY and
      FULLTEXT INDEX
    * MDEV-17532: Performance_schema reports wrong directory for
      the temporary files of ALTER TABLE…ALGORITHM=INPLACE
    * MDEV-17545: Predicate lock for SPATIAL INDEX should lock
      non-matching record
    * MDEV-17546: SPATIAL INDEX should not be allowed for
      FOREIGN KEY
    * MDEV-17548: Incorrect access to off-page column for
      indexed virtual column
    * MDEV-12023: Assertion failure sym_node-&gt;table != NULL
      on startup
    * MDEV-17230: encryption_key_id from alter is ignored by
      encryption threads
    * release notes and changelog:
      - https://mariadb.com/kb/en/library/mariadb-10219-release-notes
      - https://mariadb.com/kb/en/library/mariadb-10219-changelog
- do not pack libmariadb.pc (packed in mariadb-connector-c)
- add 'Requires: libmariadb_plugins' to the mariadb-test subpackage
  in order to be able to test client plugins successfuly
  (bsc#1111859)
- don't remove debug_key_management.so anymore (bsc#1111858)
- update to 10.2.18 GA
    * MDEV-15511 - if available, stunnel can be used during Galera
      rsync SST
    * MDEV-16791 - mariabackup: Support DDL commands during backup
    * MDEV-13564 - Refuse MLOG_TRUNCATE in mariabackup
    * MDEV-16934 - add new system variable eq_range_index_dive_limit
      to speed up queries that new long nested IN lists. The default
      value, for backward compatibility, is 0 meaning 'unlimited'.
    * MDEV-13333 - errors on InnoDB lock conflict
    * Report all InnoDB redo log corruption
    * MDEV-17043 - Purge of indexed virtual columns may cause hang
      on table-rebuilding DDL
    * MDEV-16868 - corruption of InnoDB temporary tables
    * MDEV-16465 - Invalid (old?) table or database name or hang
      in ha_innobase::delete_table and log semaphore wait upon
      concurrent DDL with foreign keys
    * release notes and changelog:
      - https://mariadb.com/kb/en/library/mariadb-10218-release-notes
      - https://mariadb.com/kb/en/library/mariadb-10218-changelog
- update to 10.2.17 GA
    * New variable innodb_log_optimize_ddl for avoiding delay due
      to page flushing and allowing concurrent backup
    * InnoDB updated to 5.7.23
    * MDEV-14637 - Fix hang due to DDL with FOREIGN KEY or
      persistent statistics
    * MDEV-15953 - Alter InnoDB Partitioned Table Moves Files
      (which were originally not in the datadir) to the datadir
    * MDEV-16515 - InnoDB: Failing assertion: ++retries &lt; 10000 in
      file dict0dict.cc line 2737
    * MDEV-16809 - Allow full redo logging for ALTER TABLE
    * Temporary tables: MDEV-16713 - InnoDB hang with repeating
      log entry
    * indexed virtual columns: MDEV-15855 - Deadlock between purge
      thread and DDL statement
    * MDEV-16664 - Change the default to
      innodb_lock_schedule_algorithm=fcfs
    * Galera: MDEV-15822 - WSREP: BF lock wait long for trx
    * release notes and changelog:
      - https://mariadb.com/kb/en/library/mariadb-10217-release-notes
      - https://mariadb.com/kb/en/library/mariadb-10217-changelog
- switch to libedit as control sequences were already fixed there
  so we don't have to avoid it (bsc#1098683)
- update to 10.2.16 GA
    * MDEV-13122: mariabackup now supports MyRocks
    * MDEV-13779 - InnoDB fails to shut down purge workers, causing
      hang
    * MDEV-16267 - Wrong INFORMATION_SCHEMA.INNODB_BUFFER_PAGE.\
      TABLE_NAME
    * MDEV-13834 - Upgrade failure from 10.1 innodb_encrypt_log
    * MDEV-16283 - ALTER TABLE...DISCARD TABLESPACE still takes long
      on a large buffer pool
    * MDEV-16376 - ASAN: heap-use-after-free in
      gcol.innodb_virtual_debug
    * MDEV-15824 - innodb_defragment=ON trumps
      innodb_optimize_fulltext_only=ON in OPTIMIZE TABLE
    * MDEV-16124 - fil_rename_tablespace() times out and crashes
      server during table-rebuilding ALTER TABLE
    * MDEV-16416 - Crash on IMPORT TABLESPACE of a
      ROW_FORMAT=COMPRESSED table
    * MDEV-16456 - InnoDB error 'returned OS error 71' complains
      about wrong path
    * MDEV-13103 - Deal with page_compressed page corruption
    * MDEV-16496 - Mariabackup: Implement --verbose option to
      instrument InnoDB log apply
    * MDEV-16087 - Inconsistent SELECT results when query cache
      is enabled
    * MDEV-15114 - ASAN heap-use-after-free in mem_heap_dup or
      dfield_data_is_binary_equal (fix for indexed virtual columns)
    * release notes and changelog:
      - https://mariadb.com/kb/en/library/mariadb-10216-release-notes
      - https://mariadb.com/kb/en/library/mariadb-10216-changelog
- pack wsrep_sst_rsync_wan file to galera subpackage

Bug fixes and changes for galera-3:

- update to 25.3.24:
  * A support for new certification key type was added to allow
    more relaxed certification rules for foreign key references (galera#491).
  * New status variables were added to display the number of open transactions
    and referenced client connections inside Galera provider (galera#492).
  * GCache was sometimes cleared unnecessarily on startup if the recovered
    state had smaller sequence number than the highest found from GCache.
    Now only entries with sequence number higher than recovery point will be
    cleared (galera#498).
  * Non-primary configuration is saved into grastate.dat only when if the
    node is in closing state (galera#499).
  * Exception from GComm was not always handled properly resulting in
    Galera to remain in half closed state. This was fixed by propagating the
    error condition appropriately to upper layers (galera#500).
  * A new status variable displaying the total weight of the cluster nodes
    was added (galera#501).
  * The value of pc.weight did not reflect the actual effective value after
    setting it via wsrep_provider_options. This was fixed by making sure that
    the new value is taken into use before returning the control back to
    caller (galera#505, MDEV-11959)
  * Use of ECHD algorithms with old OpenSSL versions was enabled (galera#511).
  * Default port value is now used by garbd if the port is not explicitly
    given in cluster address (MDEV-15531).
  * Correct error handling for posix_fallocate().
  * Failed causal reads are retried during configuration changes.

Bug fixes and changes for mariadb-connector-c:

- New upstream version 3.0.6
  * MDEV-15263: FIx IS_NUM() macro
  * CONC-297: local infile parameter must be unsigned int instead
    of my_bool
  * CONC-329: change return value of internal socket functions
    from my_bool to int
  * CONC-332: my_auth doesn't read/update server ok packet
  * CONC-344: reset internal row counter
  * CONC-345: invalid heap use after free
  * CONC-346: Remove old cmake policies
  * fixed crash in mysql_select_db if NULL parameter was provided
- New upstream version 3.0.5
  * CONC-336: Allow multiple initialization of client library
  * Fixed string to MYSQL_TIME conversion (prepared statements)
  * CONC-334: Copy all members of MYSQL_FIELD to internal
    statement structure
  * Fixed double free in dynamic column library
  * Added checks for corrupted packets in protocol
  * MDEV-15450: Added default connection attribute _server_host
  * CONC-326: fixed wrong openssl thread id callback
- New upstream version 3.0.4
  * Added option MYSQL_OPT_CAN_HANDLE_EXPIRED_PASSWORDS for
    mysql_options()/mysql_optionsv():
  * New plugin configuration interface: The default configuration
    for a specific plugin can be specified via cmake parameter
    -DCLIENT_PLUGIN_${PLUGIN}=[DYNAMIC|STATIC|OFF].
  * Added support for linux abstract socket (MDEV-15655).
  * CONC-320: Added asynchronous/non-blocking support for
    OpenSSL and GnuTLS
  * CONC-294: Access violation in mysql_close when using
    a connection plugin.
  * MDEV-14977: If built dynamically the old_password plugin
    could not be located due to wrong filename (must be
    mysql_old_password.so instead of old_password.so).
  * CONC-315: If no default client character set was specified,
    the utf8 character set will be used by default (instead of
    setting the client character set to server character set)
  * CONC-317: Parsing of configuration file fails if key/value
    pairs contain white spaces.
  * CONC-322: Correct handling of EAGAIN and EINPROGRESS in
    internal_connect (socket) for non windows platforms.
  * CONC-323: mariadb_stmt_execute_direct hangs forever if
    compression used.
  * CONC-324: Wrong codepage numbers for some collations.
  * CONC-326: ssl_thread_init() uses wrong openssl threadid
    callback
- Drop libmysqlclient_r Provides from the -devel package.
  (bsc#1097938)
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-18"/>
	<updated date="2019-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097938">SUSE bug 1097938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098683">SUSE bug 1098683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101676">SUSE bug 1101676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101677">SUSE bug 1101677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101678">SUSE bug 1101678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103342">SUSE bug 1103342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111858">SUSE bug 1111858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111859">SUSE bug 1111859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112368">SUSE bug 1112368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112377">SUSE bug 1112377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112384">SUSE bug 1112384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112386">SUSE bug 1112386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112391">SUSE bug 1112391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112397">SUSE bug 1112397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112404">SUSE bug 1112404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112415">SUSE bug 1112415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112417">SUSE bug 1112417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112421">SUSE bug 1112421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112432">SUSE bug 1112432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118754">SUSE bug 1118754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120041">SUSE bug 1120041</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3058">CVE-2018-3058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3060/">CVE-2018-3060 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3060">CVE-2018-3060 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3063">CVE-2018-3063 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3064/">CVE-2018-3064 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3064">CVE-2018-3064 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3066">CVE-2018-3066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3143/">CVE-2018-3143 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3143">CVE-2018-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3156/">CVE-2018-3156 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3156">CVE-2018-3156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3162/">CVE-2018-3162 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3162">CVE-2018-3162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3173/">CVE-2018-3173 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3173">CVE-2018-3173 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3174">CVE-2018-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3185/">CVE-2018-3185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3185">CVE-2018-3185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3200/">CVE-2018-3200 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3200">CVE-2018-3200 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3251/">CVE-2018-3251 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3251">CVE-2018-3251 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3277/">CVE-2018-3277 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3277">CVE-2018-3277 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3282">CVE-2018-3282 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3284/">CVE-2018-3284 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3284">CVE-2018-3284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597156" comment="galera-3-wsrep-provider-25.3.24-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597157" comment="libmariadb3-3.0.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597158" comment="mariadb-10.2.21-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597159" comment="mariadb-client-10.2.21-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597160" comment="mariadb-errormessages-10.2.21-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597161" comment="mariadb-galera-10.2.21-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597162" comment="mariadb-tools-10.2.21-4.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148233" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1144524" ref_url="https://bugzilla.suse.com/1144524" source="BUGZILLA"/>
		<reference ref_id="1146848" ref_url="https://bugzilla.suse.com/1146848" source="BUGZILLA"/>
		<reference ref_id="1166847" ref_url="https://bugzilla.suse.com/1166847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13456" ref_url="https://www.suse.com/security/cve/CVE-2019-13456/" source="CVE"/>
		<reference ref_id="CVE-2019-17185" ref_url="https://www.suse.com/security/cve/CVE-2019-17185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006713.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

- CVE-2019-13456: Fixed a side-channel password leak in EAP-pwd
  (bsc#1144524).
- CVE-2019-17185: Fixed a debial of service due to multithreaded
  BN_CTX access (bsc#1166847).
- Fixed an issue in TLS-EAP where the OCSP verification, when an 
  intermediate client certificate was not explicitly trusted 
  (bsc#1146848).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-17"/>
	<updated date="2020-04-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144524">SUSE bug 1144524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146848">SUSE bug 1146848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166847">SUSE bug 1166847</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13456/">CVE-2019-13456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13456">CVE-2019-13456 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17185/">CVE-2019-17185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17185">CVE-2019-17185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555686" comment="freeradius-server-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555687" comment="freeradius-server-doc-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555688" comment="freeradius-server-krb5-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555689" comment="freeradius-server-ldap-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555690" comment="freeradius-server-libs-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555691" comment="freeradius-server-mysql-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555692" comment="freeradius-server-perl-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555693" comment="freeradius-server-postgresql-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555694" comment="freeradius-server-python-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555695" comment="freeradius-server-sqlite-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555696" comment="freeradius-server-utils-3.0.15-2.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148234" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1168422" ref_url="https://bugzilla.suse.com/1168422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006730.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-3898: Fixed a heap buffer overflow in ppdFindOption() (bsc#1168422).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-23"/>
	<updated date="2020-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3898">CVE-2020-3898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530902" comment="cups-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530903" comment="cups-client-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530904" comment="cups-libs-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530905" comment="cups-libs-32bit-1.7.5-20.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148235" version="1" class="patch">
	<metadata>
		<title>Security update for ardana-ansible, ardana-barbican, ardana-db, ardana-monasca, ardana-mq, ardana-neutron, ardana-octavia, ardana-tempest, crowbar-core, crowbar-ha, crowbar-openstack, documentation-suse-openstack-cloud, memcached, openstack-manila, openstack-neutron, openstack-nova, pdns, python-amqp, rubygem-puma, zookeeper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1040519" ref_url="https://bugzilla.suse.com/1040519" source="BUGZILLA"/>
		<reference ref_id="1048688" ref_url="https://bugzilla.suse.com/1048688" source="BUGZILLA"/>
		<reference ref_id="1077718" ref_url="https://bugzilla.suse.com/1077718" source="BUGZILLA"/>
		<reference ref_id="1111180" ref_url="https://bugzilla.suse.com/1111180" source="BUGZILLA"/>
		<reference ref_id="1114157" ref_url="https://bugzilla.suse.com/1114157" source="BUGZILLA"/>
		<reference ref_id="1114169" ref_url="https://bugzilla.suse.com/1114169" source="BUGZILLA"/>
		<reference ref_id="1115904" ref_url="https://bugzilla.suse.com/1115904" source="BUGZILLA"/>
		<reference ref_id="1125357" ref_url="https://bugzilla.suse.com/1125357" source="BUGZILLA"/>
		<reference ref_id="1129734" ref_url="https://bugzilla.suse.com/1129734" source="BUGZILLA"/>
		<reference ref_id="1132852" ref_url="https://bugzilla.suse.com/1132852" source="BUGZILLA"/>
		<reference ref_id="1133817" ref_url="https://bugzilla.suse.com/1133817" source="BUGZILLA"/>
		<reference ref_id="1135773" ref_url="https://bugzilla.suse.com/1135773" source="BUGZILLA"/>
		<reference ref_id="1145498" ref_url="https://bugzilla.suse.com/1145498" source="BUGZILLA"/>
		<reference ref_id="1146206" ref_url="https://bugzilla.suse.com/1146206" source="BUGZILLA"/>
		<reference ref_id="1148426" ref_url="https://bugzilla.suse.com/1148426" source="BUGZILLA"/>
		<reference ref_id="1149110" ref_url="https://bugzilla.suse.com/1149110" source="BUGZILLA"/>
		<reference ref_id="1149535" ref_url="https://bugzilla.suse.com/1149535" source="BUGZILLA"/>
		<reference ref_id="1151206" ref_url="https://bugzilla.suse.com/1151206" source="BUGZILLA"/>
		<reference ref_id="1165402" ref_url="https://bugzilla.suse.com/1165402" source="BUGZILLA"/>
		<reference ref_id="1165643" ref_url="https://bugzilla.suse.com/1165643" source="BUGZILLA"/>
		<reference ref_id="1166290" ref_url="https://bugzilla.suse.com/1166290" source="BUGZILLA"/>
		<reference ref_id="1167240" ref_url="https://bugzilla.suse.com/1167240" source="BUGZILLA"/>
		<reference ref_id="144694" ref_url="https://bugzilla.suse.com/144694" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5637" ref_url="https://www.suse.com/security/cve/CVE-2017-5637/" source="CVE"/>
		<reference ref_id="CVE-2018-10851" ref_url="https://www.suse.com/security/cve/CVE-2018-10851/" source="CVE"/>
		<reference ref_id="CVE-2018-14626" ref_url="https://www.suse.com/security/cve/CVE-2018-14626/" source="CVE"/>
		<reference ref_id="CVE-2019-0201" ref_url="https://www.suse.com/security/cve/CVE-2019-0201/" source="CVE"/>
		<reference ref_id="CVE-2019-11596" ref_url="https://www.suse.com/security/cve/CVE-2019-11596/" source="CVE"/>
		<reference ref_id="CVE-2019-15026" ref_url="https://www.suse.com/security/cve/CVE-2019-15026/" source="CVE"/>
		<reference ref_id="CVE-2019-3871" ref_url="https://www.suse.com/security/cve/CVE-2019-3871/" source="CVE"/>
		<reference ref_id="CVE-2020-5247" ref_url="https://www.suse.com/security/cve/CVE-2020-5247/" source="CVE"/>
		<reference ref_id="CVE-2020-9543" ref_url="https://www.suse.com/security/cve/CVE-2020-9543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006723.html" source="SUSE-SU"/>
		<description>
This update for ardana-ansible, ardana-barbican, ardana-db, ardana-monasca, ardana-mq, ardana-neutron, ardana-octavia, ardana-tempest, crowbar-core, crowbar-ha, crowbar-openstack, documentation-suse-openstack-cloud, memcached, openstack-manila, openstack-neutron, openstack-nova, pdns, python-amqp, rubygem-puma, zookeeper contains the following fixes:

Security fix for rubygem-puma:
- CVE-2020-5247: Fixed an issue where the newlines in headers according to Rack spec were not split (bsc#1165402)

Security fix for openstack-manila:

- CVE-2020-9543: Fixed an issue where an attacker could view, update, delete, or share resources that do not

Security fixes for memcached:

- CVE-2019-15026: Fixed a stack-based buffer over-read in conn_to_str() in memcached.c (bsc#1149110).
- CVE-2019-11596: Fixed NULL pointer dereference in process_lru_command() in memcached.c (bsc#1133817).

Security fixes for pdns:

- CVE-2019-3871: Fixed a denial of service with the HTTP remote backend when the attacker can send crafted DNS queries (bsc#1129734).
- CVE-2018-10851: Fixed a denial of service via crafted zone record (bnc#1114157).
- CVE-2018-14626: Fixed a denial of service by hiding DNSSEC records using a crafted DNS query (bsc#1114169).

Security fixes for zookeeper:

- CVE-2019-0201: Fixed an information disclosure in the ACL handling (bsc#1135773).
- CVE-2017-5637: Fixed incorrect input validation with wchp/wchc four letter words (bsc#1040519).

Changes in ardana-ansible:
- Update to version 8.0+git.1583432621.24fa60e:
  * Upgrade pre-checks in Cloud 8 and Cloud 9 (SOC-10300)

Changes in ardana-barbican:
- Update to version 8.0+git.1585152761.8ef3d61:
  * monitor ardana-node-cert (SOC-10873)

Changes in ardana-db:
- Update to version 8.0+git.1583944923.03cca6c:
  * monitor MySQL TLS certificate (SOC-10873)

Changes in ardana-monasca:
- Update to version 8.0+git.1583944894.38f023a:
  * Add certificate file check alarm (SOC-10873)

Changes in ardana-mq:
- Update to version 8.0+git.1583944811.dc14403:
  * monitor RabbitMQ TLS certificate (SOC-10873)

Changes in ardana-neutron:
- Update to version 8.0+git.1584715262.e4ea620:
  * Add symlink for neutron-fwaas.json.j2 (bsc#1166290)

Changes in ardana-octavia:
- Update to version 8.0+git.1585171918.418f5cf:
  * Reconfigure monitor if needed (SOC-10873)

- Update to version 8.0+git.1585168661.135c735:
  * fix Octavia client cert redeploy (SOC-10873)

- Update to version 8.0+git.1585152502.f15907a:
  * monitor Octavia client certificate (SOC-10873)

Changes in ardana-tempest:
- Update to version 8.0+git.1585311051.6ab5488:
  * Enable port-security feature in tempest(SOC-11027)

Changes in crowbar-core:
- Update to version 5.0+git.1585575551.16781d00d:
  * upgrade: Point to config dir instead of config file (SOC-11171)
  * upgrade: Do not call neutron-evacuate-lbaasv2-agent with use_crm (SOC-11171)

- Update to version 5.0+git.1585316726.670746c8c:
  * upgrade: Fix systemd unit listing (trivial)

- Update to version 5.0+git.1585213241.46f12f9be:
  * upgrade: Remove the assignement of crowbar-upgrade role (SOC-11166)

- Update to version 5.0+git.1585118470.eed9020de:
  * Update the default value of OS version (trivial)
  * Ignore CVE-2020-5267 in CI (bsc#1167240)
  * Ignore CVE-2020-10663 in CI (bsc#1167244)

- Update to version 5.0+git.1583911121.d6b4b4b1a:
  * ses: Make SES UI safe for unknown options (trivial)
  * ses: Use cinder user for nova (SOC-11119)
  * ses: Added helper for populating cinder volumes (SOC-11117)
  * ses: Add ses cookbook (SOC-11114)
  * ses: Configuration upload (SOC-11115)

- Update to version 5.0+git.1583309007.e3a8b81e9:
  * Ignore CVE-2020-8130 in CI (bsc#1164804)
  * Ignore CVE-2020-5247 (bsc#1165402)

Changes in crowbar-ha:
- Update to version 5.0+git.1585316176.344190f:
  * add ssl termination on haproxy (bsc#1149535)

Changes in crowbar-openstack:
- Update to version 5.0+git.1585304226.2164b7895:
  * nova: Fix migration numbers (trivial)

- Update to version 5.0+git.1584692779.369c58aca:
  * nova: Drop redundant disk_cachemodes (trivial)
  * nova: Add option to disable ephemeral on ceph (SOC-11119)
  * keystone: Register SES RadosGW endpoints (SOC-5270)
  * heat: Increase heat_register syncmark timeout (SOC-11103)
  * heat: Simplify domain registration code (SOC-11103)
  * nova: Setup CEPH secrets later (SOC-11141)
  * nova: Enable ephemeral volumes on SES (SOC-11119)
  * glance: Set SES as default for new deployments (SOC-11118)
  * cinder: Correctly show old internal backends (SOC-11117)
  * nova: SES integration (SOC-11117)
  * nova: Hound fixes (trivial)
  * nova: Better error handling when Cephx auth is failing (noref)
  * nova: delete libvirt secret snippet immediately (noref)
  * nova: reduce nesting of ceph management code (noref)
  * nova: Remove obsolete rbd/ceph attributes (trivial)
  * cinder: SES integration (SOC-11117)
  * cinder: Disable use_crowbar default (SOC-11117)
  * glance: SES integration (SOC-11118)

Changes in documentation-suse-openstack-cloud:
- Update to version 8.20200319:
  * Adding ses-integration docs to cloud 8 (noref)
  * Fix bsc-1130532. Add feedback
  * fix bsc-1130532

- Update to version 8.20200116:
  * Fixing links from suse.com/doc to new URL (noref)

- Update to version 8.20200224:
  * Designate: add instructions on using PowerDNS backend (SOC-11051)
  * Designate: recommend deploying DNS in a cluster in HA deployment (SOC-10636)
  * message to add non-admin node for public network (SOC-10658)
  * update designate deployment (SOC-8739)
  * add designate barclamp (SCRD-8739)
  * remove Designate name server instruction (bsc#1125357,SCRD-7649)

- Update to version 8.20200130:
  * Add instructions for lbaas v2 loadbalancers (SOC-10980) (#1253)

- Update to version 8.20191211:
  * Specify that manila-share should be installed on the control node (SOC-10938) (#1230)
  * Remove (commented) mention of phrases-decl.ent (trivial)

- Update to version 8.20191206:
  * Clarify keyring chown instructions for Ceph (bsc#1111180)
  * Clarify VSA/Ceph support in HOS 8 , SOC-10981 (bsc#144694)

- Update to version 8.20191205:
  * Update incorrect Manila install/setup instructions (SOC-10975)

- Update to version 8.20191029:
  * Supplement/UAdmin: Group guides on documentation.suse.com (trivial)

- Update to version 8.20191023:
  * fix instructions for TLS certitificate renewal (SOC-10846)

- Update to version 8.20191002:
  * Added missing edit (SOC-8480)
  * Adding Carl's second round of edits (SOC-8480)
  * Removing accidentally re-added guilabels (SOC-8480)
  * Applying Carl's edits (SOC-8480)
  * Optimizing PNGs (SOC-8480)
  * Removing guilabel complaint (SOC-8480)
  * Adding xi:include to commit (SOC-8480)
  * Add SSLCA-SelfSigned cert info to SOC Crowbar documentation (SOC-8480)
  * Add SSLCA-SelfSigned cert info to SOC Crowbar documentation (SOC-8480)

- Update to version 8.20190923:
  * remove zvm references, only in SOC6 (noref)

- Update to version 8.20190920:
  * remove workaround, leave description (bsc#1151206)
  * add qos to neutron not supported (bsc#1151206)

- Update to version 8.20190829:
  * add available clients, dedicated CLM (bsc#1148426)
  * add tempest to service components, dedicated CLM (bsc#1148426)

- Update to version 8.20190823:
  * Create CC-BY license file (noref)
  * for MariaDB update, db cluster must be running, healthy (bsc#1132852)

- Update to version 8.20190820:
  * Fix broken URLs (SOC-10109)

- Update to version 8.20190820:
  * add requirement for dummy entries in servers.yml (bsc#1146206)

- Update to version 8.20190816:
  * add workaround for partition image resize (bsc#1145498)

- Update to version 8.20190813:
  * MANAGEMENT network group cannot be changed, is required (SOC-10106)
  * remove NSX references from Crowbar deployment (SOC-10081)

Changes in memcached:
- version update to 1.5.17
  * bugfixes
    fix strncpy call in stats conns to avoid ASAN violation (bsc#1149110, CVE-2019-15026)
    extstore: fix indentation
    add error handling when calling dup function
    add unlock when item_cachedump malloc failed
    extstore: emulate pread(v) for macOS
    fix off-by-one in logger to allow CAS commands to be logged.
    use strdup for explicitly configured slab sizes
    move mem_requested from slabs.c to items.c (internal cleanup)
  * new features
    add server address to the 'stats conns' output
    log client connection id with fetchers and mutations
    Add a handler for seccomp crashes
- version update to 1.5.16
  * bugfixes
    When nsuffix is 0 space for flags hasn't been allocated so don't memcpy them.
- version update to 1.5.15
  * bugfixes
    Speed up incr/decr by replacing snprintf.
    Use correct buffer size for internal URI encoding.
    change some links from http to https
    Fix small memory leak in testapp.c.
    free window_global in slab_automove_extstore.c
    remove inline_ascii_response option
    -Y [filename] for ascii authentication mode
    fix: idle-timeout wasn't compatible with binprot
  * features
    -Y [authfile] enables an authentication mode for ASCII protocol.
- modified patches
  % memcached-autofoo.patch (refreshed)

- version update to 1.5.14
  * update -h output for -I (max item size)
  * fix segfault in 'lru' command (bsc#1133817, CVE-2019-11596)
  * fix compile error on centos7
  * extstore: error adjusting page_size after ext_path
  * extstore: fix segfault if page_count is too high.
  * close delete + incr item survival race bug
  * memcached-tool dump fix loss of exp value
  * Fix 'qw' in 'MemcachedTest.pm' so wait_ext_flush is exported properly
  * Experimental TLS support.
  * Basic implementation of TLS for memcached.
  * Improve Get And Touch documentation
  * fix INCR/DECR refcount leak for invalid items
- modified patches
  % memcached-autofoo.patch (refreshed)

- Version bump to 1.5.11:
  * extstore: balance IO thread queues
- Drop memcached-fix_test.patch that is present now upstream

- Add patch to fix aarch64, ppc64* and s390x tests:
  * memcached-fix_test.patch

- Fix linter errors regarding COPYING

- update to 1.5.10:
  * disruptive change in extstore: -o ext_page_count= is deprecated
    and no longer works. To specify size: -o ext_path=/d/m/e:500G
    extstore figures out the page count based on your desired page
    size. M|G|T|P supported.
  * extstore: Add basic JBOD support: ext_path can be specified
    multiple times for striping onto simimar devices
  * fix alignment issues on some ARM platforms for chunked items

- Update to 1.5.9:
  * Bugfix release.
  * Important note: if using --enable-seccomp, privilege dropping
    is no longer on by default. The feature is experimental and many
    users are reporting hard to diagnose problems on varied platforms.
  * Seccomp is now marked EXPERIMENTAL, and must be explicitly
    enabled by adding -o drop_privileges. Once we're more confident
    with the usability of the feature, it will be enabled in -o modern,
    like any other new change. You should only use it if you are
    willing to carefully test it, especially if you're a vendor or
    distribution.
  * Also important is a crash fix in extstore when using the ASCII
    protocol, large items, and running low on memory.

- update to 1.5.8:
  * Bugfixes for seccomp and extstore
  * Extstore platform portability has been greatly improved for ARM
    and 32bit systems
- includes changes from 1.5.7:
  * Fix alignment issues for 64bit ARM processors
  * Fix seccomp portability
  * Fix refcount leak with extstore while using binary touch commands

- turn on the testsuite again, it seems to pass server side,
  too

- Home directory shouldn't be world readable bsc#1077718
- Mention that this stream isn't affected by bsc#1085209,
  CVE-2018-1000127 to make the checker bots happy.

Changes in openstack-manila:
- Update to version manila-5.1.1.dev5:
  * Fix manila-tempest-minimal-dsvm-lvm-centos-7 job
  * share\_networks: enable project\_only API only

Changes in openstack-manila:
- Rebased patches:
  + cve-2020-9543-stable-pike.patch dropped (merged upstream)

- Update to version manila-5.1.1.dev5:
  * Fix manila-tempest-minimal-dsvm-lvm-centos-7 job
  * share\_networks: enable project\_only API only

Changes in openstack-neutron:
- Update to version neutron-11.0.9.dev63:
  * ovs agent: signal to plugin if tunnel refresh needed
  * Do not initialize snat-ns twice

Changes in openstack-neutron:
- Update to version neutron-11.0.9.dev63:
  * ovs agent: signal to plugin if tunnel refresh needed
  * Do not initialize snat-ns twice

Changes in openstack-nova:
- Update to version nova-16.1.9.dev61:
  * Avoid circular reference during serialization
  * Mask the token used to allow access to consoles
  * Improve metadata server performance with large security groups
  * Remove exp legacy-tempest-dsvm-full-devstack-plugin-nfs

- Update to version nova-16.1.9.dev54:
  * pike-only: remove broken non-voting ceph jobs
  * nova-live-migration: Wait for n-cpu services to come up after configuring Ceph
  * rt: only map compute node if we created it

Changes in openstack-nova:
- Update to version nova-16.1.9.dev61:
  * Avoid circular reference during serialization
  * Mask the token used to allow access to consoles
  * Improve metadata server performance with large security groups
  * Remove exp legacy-tempest-dsvm-full-devstack-plugin-nfs

- Update to version nova-16.1.9.dev54:
  * pike-only: remove broken non-voting ceph jobs
  * nova-live-migration: Wait for n-cpu services to come up after configuring Ceph
  * rt: only map compute node if we created it

Changes in pdns:
- Add missing 'BuildRequires: libmysqlclient-devel' to allow
  the package to build correctly.

- CVE-2019-3871-auth-4.1.6.patch: fixes insufficient validation in
  HTTP remote backend (bsc#1129734, CVE-2019-3871)

- CVE-2018-10851-auth-4.1.4.patch: fixes DoS via crafted zone record
  (bnc#1114157, CVE-2018-10851)
- CVE-2018-14626-auth-4.1.4.patch: fixes an issue allowing a
  remote user to craft a DNS query that will cause an answer without
  DNSSEC records to be inserted into the packet cache and be
  returned to clients asking for DNSSEC records, thus hiding
  the presence of DNSSEC signatures leading to a potential DoS
  (bsc#1114169, CVE-2018-14626)

Changes in python-amqp:
- Make it build for SLE12SP3:
  - remove pytest-sugar build dependency
  - used %doc macro instead of %license
- Removed patches that are already included in 2.4.2
  - 0002-Do_not_send_AAAA_DNS_request_when_domain_resolved_to_IPv4_address.patch (SOC-9144)
  - 0001-Always-treat-SSLError-timeouts-as-socket-timeouts-24.patch (bsc#1115904)
- Update to 2.4.2:
  - Added support for the Cygwin platform
  - Correct offset incrementation when parsing bitmaps.
  - Consequent bitmaps are now parsed correctly.
- Better call of py.test
- Add versions to dependencies
- Remove python-sasl from build dependencies
- Update to version 2.4.1
  * To avoid breaking the API basic_consume() now returns the consumer tag
    instead of a tuple when nowait is True.
  * Fix crash in basic_publish when broker does not support connection.blocked
    capability.
  * read_frame() is now Python 3 compatible for large payloads.
  * Support float read_timeout/write_timeout.
  * Always treat SSLError timeouts as socket timeouts.
  * Treat EWOULDBLOCK as timeout.
- from 2.4.0
  * Fix inconsistent frame_handler return value.
    The function returned by frame_handler is meant to return True
    once the complete message is received and the callback is called,
    False otherwise.
    This fixes the return value for messages with a body split across
    multiple frames, and heartbeat frames.
  * Don't default content_encoding to utf-8 for bytes.
    This is not an acceptable default as the content may not be
    valid utf-8, and even if it is, the producer likely does not
    expect the message to be decoded by the consumer.
  * Fix encoding of messages with multibyte characters.
    Body length was previously calculated using string length,
    which may be less than the length of the encoded body when
    it contains multibyte sequences. This caused the body of
    the frame to be truncated.
  * Respect content_encoding when encoding messages.
    Previously the content_encoding was ignored and messages
    were always encoded as utf-8. This caused messages to be
    incorrectly decoded if content_encoding is properly respected
    when decoding.
  * Fix AMQP protocol header for AMQP 0-9-1.
    Previously it was set to a different value for unknown reasons.
  * Add support for Python 3.7.
    Change direct SSLSocket instantiation with wrap_socket.
  * Add support for field type 'x' (byte array).
  * If there is an exception raised on Connection.connect or
    Connection.close, ensure that the underlying transport socket
    is closed.  Adjust exception message on connection errors as well.
  * TCP_USER_TIMEOUT has to be excluded from KNOWN_TCP_OPTS in BSD platforms.
  * Handle negative acknowledgments.
  * Added integration tests.
  * Fix basic_consume() with no consumer_tag provided.
  * Improved empty AMQPError string representation.
  * Drain events before publish.
    This is needed to capture out of memory messages for clients that only
    publish. Otherwise on_blocked is never called.
  * Don't revive channel when connection is closing.
    When connection is closing don't raise error when Channel.Close
    method is received.

Changes in zookeeper:
- Apply 0002-Apply-patch-to-resolve-CVE-2019-0201.patch
  This applies the patch for ZOOKEEPER-1392 to resolve CVE-2019-0201
  Should not allow to read ACL when not authorized to read node 
  (bsc#1135773)

- Various cleanups in spec file

- Fixed off-by-one in zkCleanTRX.sh and made output more useful (bsc#1048688, FATE#323204)

- Fixed ExecStartPre statment in service file

- added zkCleanTRX.sh to clean up 0 length transaction logs

- Update to to zookeeper-3.4.10 (bsc#1040519)
  * Fixes CVE-2017-5637
- Remove Changes.txt (missing as of 3.4.10)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-22"/>
	<updated date="2020-04-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040519">SUSE bug 1040519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048688">SUSE bug 1048688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077718">SUSE bug 1077718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111180">SUSE bug 1111180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114157">SUSE bug 1114157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114169">SUSE bug 1114169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115904">SUSE bug 1115904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125357">SUSE bug 1125357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129734">SUSE bug 1129734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132852">SUSE bug 1132852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133817">SUSE bug 1133817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135773">SUSE bug 1135773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145498">SUSE bug 1145498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146206">SUSE bug 1146206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148426">SUSE bug 1148426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149110">SUSE bug 1149110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149535">SUSE bug 1149535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151206">SUSE bug 1151206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165402">SUSE bug 1165402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165643">SUSE bug 1165643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166290">SUSE bug 1166290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167240">SUSE bug 1167240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/144694">SUSE bug 144694</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5637/">CVE-2017-5637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5637">CVE-2017-5637 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10851/">CVE-2018-10851 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10851">CVE-2018-10851 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14626/">CVE-2018-14626 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14626">CVE-2018-14626 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0201/">CVE-2019-0201 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0201">CVE-2019-0201 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11596/">CVE-2019-11596 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11596">CVE-2019-11596 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15026/">CVE-2019-15026 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15026">CVE-2019-15026 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-3871/">CVE-2019-3871 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3871">CVE-2019-3871 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-5247/">CVE-2020-5247 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5247">CVE-2020-5247 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9543/">CVE-2020-9543 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9543">CVE-2020-9543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597163" comment="ardana-ansible-8.0+git.1583432621.24fa60e-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597164" comment="ardana-barbican-8.0+git.1585152761.8ef3d61-4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597165" comment="ardana-db-8.0+git.1583944923.03cca6c-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597166" comment="ardana-monasca-8.0+git.1583944894.38f023a-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597167" comment="ardana-mq-8.0+git.1583944811.dc14403-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597168" comment="ardana-neutron-8.0+git.1584715262.e4ea620-3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597169" comment="ardana-octavia-8.0+git.1585171918.418f5cf-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597170" comment="ardana-tempest-8.0+git.1585311051.6ab5488-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597171" comment="documentation-suse-openstack-cloud-installation-8.20200319-1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597172" comment="documentation-suse-openstack-cloud-operations-8.20200319-1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597173" comment="documentation-suse-openstack-cloud-opsconsole-8.20200319-1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597174" comment="documentation-suse-openstack-cloud-planning-8.20200319-1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597175" comment="documentation-suse-openstack-cloud-security-8.20200319-1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597176" comment="documentation-suse-openstack-cloud-supplement-8.20200319-1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597177" comment="documentation-suse-openstack-cloud-upstream-admin-8.20200319-1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597178" comment="documentation-suse-openstack-cloud-upstream-user-8.20200319-1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597179" comment="documentation-suse-openstack-cloud-user-8.20200319-1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597180" comment="memcached-1.5.17-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597181" comment="openstack-manila-5.1.1~dev5-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597182" comment="openstack-manila-api-5.1.1~dev5-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597183" comment="openstack-manila-data-5.1.1~dev5-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597184" comment="openstack-manila-doc-5.1.1~dev5-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597185" comment="openstack-manila-scheduler-5.1.1~dev5-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597186" comment="openstack-manila-share-5.1.1~dev5-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597187" comment="openstack-neutron-11.0.9~dev63-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597188" comment="openstack-neutron-dhcp-agent-11.0.9~dev63-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597189" comment="openstack-neutron-doc-11.0.9~dev63-3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597190" comment="openstack-neutron-ha-tool-11.0.9~dev63-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597191" comment="openstack-neutron-l3-agent-11.0.9~dev63-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597192" comment="openstack-neutron-linuxbridge-agent-11.0.9~dev63-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597193" comment="openstack-neutron-macvtap-agent-11.0.9~dev63-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597194" comment="openstack-neutron-metadata-agent-11.0.9~dev63-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597195" comment="openstack-neutron-metering-agent-11.0.9~dev63-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597196" comment="openstack-neutron-openvswitch-agent-11.0.9~dev63-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597197" comment="openstack-neutron-server-11.0.9~dev63-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597198" comment="openstack-nova-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597199" comment="openstack-nova-api-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597200" comment="openstack-nova-cells-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597201" comment="openstack-nova-compute-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597202" comment="openstack-nova-conductor-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597203" comment="openstack-nova-console-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597204" comment="openstack-nova-consoleauth-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597205" comment="openstack-nova-doc-16.1.9~dev61-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597206" comment="openstack-nova-novncproxy-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597207" comment="openstack-nova-placement-api-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597208" comment="openstack-nova-scheduler-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597209" comment="openstack-nova-serialproxy-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597210" comment="openstack-nova-vncproxy-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597211" comment="pdns-4.1.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597212" comment="pdns-backend-mysql-4.1.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597213" comment="python-amqp-2.4.2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597214" comment="python-manila-5.1.1~dev5-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597215" comment="python-neutron-11.0.9~dev63-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597216" comment="python-nova-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597217" comment="venv-openstack-aodh-x86_64-5.1.1~dev7-12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597218" comment="venv-openstack-barbican-x86_64-5.0.2~dev3-12.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597219" comment="venv-openstack-ceilometer-x86_64-9.0.8~dev7-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597220" comment="venv-openstack-cinder-x86_64-11.2.3~dev23-14.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597221" comment="venv-openstack-designate-x86_64-5.0.3~dev7-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597222" comment="venv-openstack-freezer-x86_64-5.0.0.0~xrc2~dev2-10.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597223" comment="venv-openstack-glance-x86_64-15.0.3~dev3-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597224" comment="venv-openstack-heat-x86_64-9.0.8~dev22-12.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597225" comment="venv-openstack-ironic-x86_64-9.1.8~dev8-12.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597226" comment="venv-openstack-keystone-x86_64-12.0.4~dev5-11.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597227" comment="venv-openstack-magnum-x86_64-5.0.2_5.0.2_5.0.2~dev31-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597228" comment="venv-openstack-manila-x86_64-5.1.1~dev5-12.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597229" comment="venv-openstack-monasca-ceilometer-x86_64-1.5.1_1.5.1_1.5.1~dev3-8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597230" comment="venv-openstack-murano-x86_64-4.0.2~dev2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597231" comment="venv-openstack-neutron-x86_64-11.0.9~dev63-13.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597232" comment="venv-openstack-nova-x86_64-16.1.9~dev61-11.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597233" comment="venv-openstack-octavia-x86_64-1.0.6~dev3-12.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597234" comment="venv-openstack-sahara-x86_64-7.0.5~dev4-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597235" comment="venv-openstack-trove-x86_64-8.0.2~dev2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597236" comment="zookeeper-server-3.4.10-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148236" version="1" class="patch">
	<metadata>
		<title>Security update for pam_radius (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1141670" ref_url="https://bugzilla.suse.com/1141670" source="BUGZILLA"/>
		<reference ref_id="1163933" ref_url="https://bugzilla.suse.com/1163933" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9542" ref_url="https://www.suse.com/security/cve/CVE-2015-9542/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006742.html" source="SUSE-SU"/>
		<description>
This update for pam_radius fixes the following issues:

- CVE-2015-9542: Fixed a buffer overflow in password field (bsc#1163933).
- On s390x didn't decrypt passwords correctly (bsc#1141670).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-27"/>
	<updated date="2020-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141670">SUSE bug 1141670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163933">SUSE bug 1163933</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9542/">CVE-2015-9542 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9542">CVE-2015-9542 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530906" comment="pam_radius-1.3.16-239.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530907" comment="pam_radius-32bit-1.3.16-239.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148237" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1155321" ref_url="https://bugzilla.suse.com/1155321" source="BUGZILLA"/>
		<reference ref_id="1156318" ref_url="https://bugzilla.suse.com/1156318" source="BUGZILLA"/>
		<reference ref_id="1159329" ref_url="https://bugzilla.suse.com/1159329" source="BUGZILLA"/>
		<reference ref_id="1161719" ref_url="https://bugzilla.suse.com/1161719" source="BUGZILLA"/>
		<reference ref_id="1163809" ref_url="https://bugzilla.suse.com/1163809" source="BUGZILLA"/>
		<reference ref_id="1165528" ref_url="https://bugzilla.suse.com/1165528" source="BUGZILLA"/>
		<reference ref_id="1169658" ref_url="https://bugzilla.suse.com/1169658" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8625" ref_url="https://www.suse.com/security/cve/CVE-2019-8625/" source="CVE"/>
		<reference ref_id="CVE-2019-8710" ref_url="https://www.suse.com/security/cve/CVE-2019-8710/" source="CVE"/>
		<reference ref_id="CVE-2019-8720" ref_url="https://www.suse.com/security/cve/CVE-2019-8720/" source="CVE"/>
		<reference ref_id="CVE-2019-8743" ref_url="https://www.suse.com/security/cve/CVE-2019-8743/" source="CVE"/>
		<reference ref_id="CVE-2019-8764" ref_url="https://www.suse.com/security/cve/CVE-2019-8764/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8769" ref_url="https://www.suse.com/security/cve/CVE-2019-8769/" source="CVE"/>
		<reference ref_id="CVE-2019-8771" ref_url="https://www.suse.com/security/cve/CVE-2019-8771/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8783" ref_url="https://www.suse.com/security/cve/CVE-2019-8783/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8811" ref_url="https://www.suse.com/security/cve/CVE-2019-8811/" source="CVE"/>
		<reference ref_id="CVE-2019-8812" ref_url="https://www.suse.com/security/cve/CVE-2019-8812/" source="CVE"/>
		<reference ref_id="CVE-2019-8813" ref_url="https://www.suse.com/security/cve/CVE-2019-8813/" source="CVE"/>
		<reference ref_id="CVE-2019-8814" ref_url="https://www.suse.com/security/cve/CVE-2019-8814/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8816" ref_url="https://www.suse.com/security/cve/CVE-2019-8816/" source="CVE"/>
		<reference ref_id="CVE-2019-8819" ref_url="https://www.suse.com/security/cve/CVE-2019-8819/" source="CVE"/>
		<reference ref_id="CVE-2019-8820" ref_url="https://www.suse.com/security/cve/CVE-2019-8820/" source="CVE"/>
		<reference ref_id="CVE-2019-8823" ref_url="https://www.suse.com/security/cve/CVE-2019-8823/" source="CVE"/>
		<reference ref_id="CVE-2019-8835" ref_url="https://www.suse.com/security/cve/CVE-2019-8835/" source="CVE"/>
		<reference ref_id="CVE-2019-8844" ref_url="https://www.suse.com/security/cve/CVE-2019-8844/" source="CVE"/>
		<reference ref_id="CVE-2019-8846" ref_url="https://www.suse.com/security/cve/CVE-2019-8846/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-11793" ref_url="https://www.suse.com/security/cve/CVE-2020-11793/" source="CVE"/>
		<reference ref_id="CVE-2020-3862" ref_url="https://www.suse.com/security/cve/CVE-2020-3862/" source="CVE"/>
		<reference ref_id="CVE-2020-3864" ref_url="https://www.suse.com/security/cve/CVE-2020-3864/" source="CVE"/>
		<reference ref_id="CVE-2020-3865" ref_url="https://www.suse.com/security/cve/CVE-2020-3865/" source="CVE"/>
		<reference ref_id="CVE-2020-3867" ref_url="https://www.suse.com/security/cve/CVE-2020-3867/" source="CVE"/>
		<reference ref_id="CVE-2020-3868" ref_url="https://www.suse.com/security/cve/CVE-2020-3868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.28.1 fixes the following issues:

Security issues fixed:

- CVE-2020-10018: Fixed a denial of service because the m_deferredFocusedNodeChange data structure was mishandled (bsc#1165528).
- CVE-2020-11793: Fixed a potential arbitrary code execution caused by a use-after-free vulnerability (bsc#1169658).
- CVE-2019-8835: Fixed multiple memory corruption issues (bsc#1161719).
- CVE-2019-8844: Fixed multiple memory corruption issues (bsc#1161719).
- CVE-2019-8846: Fixed a use-after-free issue (bsc#1161719).
- CVE-2020-3862: Fixed a memory handling issue (bsc#1163809).
- CVE-2020-3867: Fixed an XSS issue (bsc#1163809).
- CVE-2020-3868: Fixed multiple memory corruption issues that could have lead to arbitrary code execution (bsc#1163809).
- CVE-2020-3864,CVE-2020-3865: Fixed logic issues in the DOM object context handling (bsc#1163809).

Non-security issues fixed:

- Add API to enable Process Swap on (Cross-site) Navigation.
- Add user messages API for the communication with the web extension.
- Add support for same-site cookies.
- Service workers are enabled by default.
- Add support for Pointer Lock API.
- Add flatpak sandbox support.
- Make ondemand hardware acceleration policy never leave accelerated compositing mode.
- Always use a light theme for rendering form controls.
- Add about:gpu to show information about the graphics stack.
- Fixed issues while trying to play a video on NextCloud.
- Fixed vertical alignment of text containing arabic diacritics.
- Fixed build with icu 65.1.
- Fixed page loading errors with websites using HSTS.
- Fixed web process crash when displaying a KaTeX formula.
- Fixed several crashes and rendering issues.
- Switched to a single web process for Evolution and geary (bsc#1159329).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-29"/>
	<updated date="2020-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159329">SUSE bug 1159329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161719">SUSE bug 1161719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165528">SUSE bug 1165528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169658">SUSE bug 1169658</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8625/">CVE-2019-8625 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8625">CVE-2019-8625 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8710/">CVE-2019-8710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8710">CVE-2019-8710 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8720/">CVE-2019-8720 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8720">CVE-2019-8720 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8743/">CVE-2019-8743 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8743">CVE-2019-8743 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8764/">CVE-2019-8764 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8764">CVE-2019-8764 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8766">CVE-2019-8766 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8769/">CVE-2019-8769 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8769">CVE-2019-8769 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8771/">CVE-2019-8771 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8771">CVE-2019-8771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8782">CVE-2019-8782 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8783/">CVE-2019-8783 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8783">CVE-2019-8783 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8808">CVE-2019-8808 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8811/">CVE-2019-8811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8811">CVE-2019-8811 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8812/">CVE-2019-8812 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8812">CVE-2019-8812 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8813/">CVE-2019-8813 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8813">CVE-2019-8813 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8814/">CVE-2019-8814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8814">CVE-2019-8814 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8815">CVE-2019-8815 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8816/">CVE-2019-8816 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8816">CVE-2019-8816 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8819/">CVE-2019-8819 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8819">CVE-2019-8819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8820/">CVE-2019-8820 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8820">CVE-2019-8820 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8823/">CVE-2019-8823 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8823">CVE-2019-8823 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8835/">CVE-2019-8835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8835">CVE-2019-8835 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8844/">CVE-2019-8844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8844">CVE-2019-8844 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8846/">CVE-2019-8846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8846">CVE-2019-8846 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10018">CVE-2020-10018 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11793/">CVE-2020-11793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11793">CVE-2020-11793 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-3862/">CVE-2020-3862 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3862">CVE-2020-3862 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-3864/">CVE-2020-3864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3864">CVE-2020-3864 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3865/">CVE-2020-3865 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3865">CVE-2020-3865 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3867/">CVE-2020-3867 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3867">CVE-2020-3867 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3868/">CVE-2020-3868 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3868">CVE-2020-3868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148238" version="1" class="patch">
	<metadata>
		<title>Security update for shibboleth-sp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1157471" ref_url="https://bugzilla.suse.com/1157471" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19191" ref_url="https://www.suse.com/security/cve/CVE-2019-19191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006355.html" source="SUSE-SU"/>
		<description>
This update for shibboleth-sp fixes the following issues:

Security issue fixed:

- CVE-2019-19191: Fixed escalation to root by fixing ownership of log files (bsc#1157471).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-16"/>
	<updated date="2020-01-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1157471">SUSE bug 1157471</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19191/">CVE-2019-19191 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19191">CVE-2019-19191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530916" comment="libshibsp-lite6-2.5.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530917" comment="libshibsp6-2.5.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530918" comment="shibboleth-sp-2.5.5-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148239" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1170170" ref_url="https://bugzilla.suse.com/1170170" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12059" ref_url="https://www.suse.com/security/cve/CVE-2020-12059/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006768.html" source="SUSE-SU"/>
		<description>
This update for ceph fixes the following issues:

- CVE-2020-12059: Fixed a denial of service caused by a specially crafted XML payload on POST requests (bsc#1170170).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-30"/>
	<updated date="2020-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170170">SUSE bug 1170170</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12059/">CVE-2020-12059 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12059">CVE-2020-12059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555697" comment="ceph-common-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555698" comment="libcephfs2-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555699" comment="librados2-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555700" comment="libradosstriper1-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555701" comment="librbd1-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555702" comment="librgw2-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555703" comment="python-cephfs-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555704" comment="python-rados-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555705" comment="python-rbd-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555706" comment="python-rgw-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148240" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1155419" ref_url="https://bugzilla.suse.com/1155419" source="BUGZILLA"/>
		<reference ref_id="1160471" ref_url="https://bugzilla.suse.com/1160471" source="BUGZILLA"/>
		<reference ref_id="1170441" ref_url="https://bugzilla.suse.com/1170441" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<reference ref_id="CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006773.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2019-15690: Fixed a heap buffer overflow (bsc#1160471).
- CVE-2019-15681: Fixed a memory leak which could have allowed to a remote attacker to read stack memory (bsc#1155419).
- CVE-2019-20788: Fixed a integer overflow and heap-based buffer overflow via a large height or width value (bsc#1170441).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-04"/>
	<updated date="2020-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160471">SUSE bug 1160471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170441">SUSE bug 1170441</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15681">CVE-2019-15681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15690">CVE-2019-15690 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20788">CVE-2019-20788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530919" comment="libvncclient0-0.9.9-17.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530920" comment="libvncserver0-0.9.9-17.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148241" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1166844" ref_url="https://bugzilla.suse.com/1166844" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006779.html" source="SUSE-SU"/>
		<description>
This update for icu fixes the following issues:

- CVE-2020-10531: Fixed integer overflow in UnicodeString:doAppend() (bsc#1166844).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1166844">SUSE bug 1166844</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10531">CVE-2020-10531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530921" comment="libicu-doc-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530922" comment="libicu52_1-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530923" comment="libicu52_1-32bit-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530924" comment="libicu52_1-data-52.1-8.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148242" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1170771" ref_url="https://bugzilla.suse.com/1170771" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006783.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-12243: Fixed a denial of service related to recursive filters (bsc#1170771).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12243">CVE-2020-12243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530925" comment="libldap-2_4-2-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530926" comment="libldap-2_4-2-32bit-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530927" comment="openldap2-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530928" comment="openldap2-back-meta-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530929" comment="openldap2-client-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530930" comment="openldap2-doc-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530931" comment="openldap2-ppolicy-check-password-1.2-18.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148243" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1170643" ref_url="https://bugzilla.suse.com/1170643" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3899" ref_url="https://www.suse.com/security/cve/CVE-2020-3899/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006800.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Security issue fixed:

- CVE-2020-3899: Fixed a memory consumption issue that could have led to remote code execution (bsc#1170643).

Non-security issues fixed:

- Update to version 2.28.2 (bsc#1170643):
  + Fix excessive CPU usage due to GdkFrameClock not being stopped.
  + Fix UI process crash when EGL_WL_bind_wayland_display extension
    is not available.
  + Fix position of select popup menus in X11.
  + Fix playing of Youtube 'live stream'/H264 URLs.
  + Fix a crash under X11 when cairo uses xcb.
  + Fix the build in MIPS64.
  + Fix several crashes and rendering issues.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3899/">CVE-2020-3899 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3899">CVE-2020-3899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530932" comment="libjavascriptcoregtk-4_0-18-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530933" comment="libwebkit2gtk-4_0-37-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530934" comment="libwebkit2gtk3-lang-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530935" comment="typelib-1_0-JavaScriptCore-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530936" comment="typelib-1_0-WebKit2-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530938" comment="webkit2gtk-4_0-injected-bundles-2.28.2-2.53.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148244" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1170603" ref_url="https://bugzilla.suse.com/1170603" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12268" ref_url="https://www.suse.com/security/cve/CVE-2020-12268/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006798.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.52 fixes the following issues:

- CVE-2020-12268: Fixed a heap-based buffer overflow in jbig2_image_compose (bsc#1170603).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170603">SUSE bug 1170603</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-12268/">CVE-2020-12268 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12268">CVE-2020-12268 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530940" comment="ghostscript-9.52-23.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530941" comment="ghostscript-x11-9.52-23.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530942" comment="libspectre1-0.2.7-12.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148245" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1171186" ref_url="https://bugzilla.suse.com/1171186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388/" source="CVE"/>
		<reference ref_id="CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to version 68.8.0 ESR (bsc#1171186):

- CVE-2020-12387: Use-after-free during worker shutdown
- CVE-2020-12388: Sandbox escape with improperly guarded Access Tokens
- CVE-2020-12389: Sandbox escape with improperly separated process types
- CVE-2020-6831: Buffer overflow in SCTP chunk input validation
- CVE-2020-12392: Arbitrary local file access with 'Copy as cURL'
- CVE-2020-12393: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection
- CVE-2020-12395: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12387">CVE-2020-12387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12388">CVE-2020-12388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12389">CVE-2020-12389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12392">CVE-2020-12392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12393">CVE-2020-12393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12395">CVE-2020-12395 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6831">CVE-2020-6831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530943" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530945" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148246" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1169659" ref_url="https://bugzilla.suse.com/1169659" source="BUGZILLA"/>
		<reference ref_id="1170313" ref_url="https://bugzilla.suse.com/1170313" source="BUGZILLA"/>
		<reference ref_id="1170423" ref_url="https://bugzilla.suse.com/1170423" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519/" source="CVE"/>
		<reference ref_id="CVE-2019-12520" ref_url="https://www.suse.com/security/cve/CVE-2019-12520/" source="CVE"/>
		<reference ref_id="CVE-2019-12521" ref_url="https://www.suse.com/security/cve/CVE-2019-12521/" source="CVE"/>
		<reference ref_id="CVE-2019-12524" ref_url="https://www.suse.com/security/cve/CVE-2019-12524/" source="CVE"/>
		<reference ref_id="CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006808.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2019-12519, CVE-2019-12521: fixes incorrect buffer handling that can 
  result in cache poisoning, remote execution, and denial of service attacks
  when processing ESI responses (bsc#1169659).
- CVE-2020-11945: fixes a potential remote execution vulnerability
  when using HTTP Digest Authentication (bsc#1170313).
- CVE-2019-12520, CVE-2019-12524: fixes a potential ACL bypass, cache-bypass
  and cross-site scripting attack when processing invalid HTTP
  Request messages (bsc#1170423).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-08"/>
	<updated date="2020-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169659">SUSE bug 1169659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170313">SUSE bug 1170313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170423">SUSE bug 1170423</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12519">CVE-2019-12519 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12520/">CVE-2019-12520 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12520">CVE-2019-12520 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12521/">CVE-2019-12521 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12521">CVE-2019-12521 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12524/">CVE-2019-12524 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12524">CVE-2019-12524 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11945">CVE-2020-11945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530946" comment="squid-3.5.21-26.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148247" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1168404" ref_url="https://bugzilla.suse.com/1168404" source="BUGZILLA"/>
		<reference ref_id="1168407" ref_url="https://bugzilla.suse.com/1168407" source="BUGZILLA"/>
		<reference ref_id="1169066" ref_url="https://bugzilla.suse.com/1169066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1927" ref_url="https://www.suse.com/security/cve/CVE-2020-1927/" source="CVE"/>
		<reference ref_id="CVE-2020-1934" ref_url="https://www.suse.com/security/cve/CVE-2020-1934/" source="CVE"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006814.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-1934: mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server (bsc#1168404).
- CVE-2020-1927: mod_rewrite configurations vulnerable to open redirect (bsc#1168407).
- CVE-2020-1938: mod_proxy_ajp: Add 'secret' parameter to proxy workers to implement legacy AJP13 authentication (bsc#1169066).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-13"/>
	<updated date="2020-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168404">SUSE bug 1168404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168407">SUSE bug 1168407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169066">SUSE bug 1169066</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1927/">CVE-2020-1927 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1927">CVE-2020-1927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1934/">CVE-2020-1934 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1934">CVE-2020-1934 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530955" comment="apache2-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530956" comment="apache2-doc-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530957" comment="apache2-example-pages-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530958" comment="apache2-prefork-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530959" comment="apache2-utils-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530960" comment="apache2-worker-2.4.23-29.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148248" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1056134" ref_url="https://bugzilla.suse.com/1056134" source="BUGZILLA"/>
		<reference ref_id="1087813" ref_url="https://bugzilla.suse.com/1087813" source="BUGZILLA"/>
		<reference ref_id="1120386" ref_url="https://bugzilla.suse.com/1120386" source="BUGZILLA"/>
		<reference ref_id="1133147" ref_url="https://bugzilla.suse.com/1133147" source="BUGZILLA"/>
		<reference ref_id="1137325" ref_url="https://bugzilla.suse.com/1137325" source="BUGZILLA"/>
		<reference ref_id="1145929" ref_url="https://bugzilla.suse.com/1145929" source="BUGZILLA"/>
		<reference ref_id="1149591" ref_url="https://bugzilla.suse.com/1149591" source="BUGZILLA"/>
		<reference ref_id="1154118" ref_url="https://bugzilla.suse.com/1154118" source="BUGZILLA"/>
		<reference ref_id="1154844" ref_url="https://bugzilla.suse.com/1154844" source="BUGZILLA"/>
		<reference ref_id="1155689" ref_url="https://bugzilla.suse.com/1155689" source="BUGZILLA"/>
		<reference ref_id="1157155" ref_url="https://bugzilla.suse.com/1157155" source="BUGZILLA"/>
		<reference ref_id="1157157" ref_url="https://bugzilla.suse.com/1157157" source="BUGZILLA"/>
		<reference ref_id="1157303" ref_url="https://bugzilla.suse.com/1157303" source="BUGZILLA"/>
		<reference ref_id="1157804" ref_url="https://bugzilla.suse.com/1157804" source="BUGZILLA"/>
		<reference ref_id="1158021" ref_url="https://bugzilla.suse.com/1158021" source="BUGZILLA"/>
		<reference ref_id="1158642" ref_url="https://bugzilla.suse.com/1158642" source="BUGZILLA"/>
		<reference ref_id="1158819" ref_url="https://bugzilla.suse.com/1158819" source="BUGZILLA"/>
		<reference ref_id="1159199" ref_url="https://bugzilla.suse.com/1159199" source="BUGZILLA"/>
		<reference ref_id="1159285" ref_url="https://bugzilla.suse.com/1159285" source="BUGZILLA"/>
		<reference ref_id="1159297" ref_url="https://bugzilla.suse.com/1159297" source="BUGZILLA"/>
		<reference ref_id="1159841" ref_url="https://bugzilla.suse.com/1159841" source="BUGZILLA"/>
		<reference ref_id="1159908" ref_url="https://bugzilla.suse.com/1159908" source="BUGZILLA"/>
		<reference ref_id="1159910" ref_url="https://bugzilla.suse.com/1159910" source="BUGZILLA"/>
		<reference ref_id="1159911" ref_url="https://bugzilla.suse.com/1159911" source="BUGZILLA"/>
		<reference ref_id="1159912" ref_url="https://bugzilla.suse.com/1159912" source="BUGZILLA"/>
		<reference ref_id="1160195" ref_url="https://bugzilla.suse.com/1160195" source="BUGZILLA"/>
		<reference ref_id="1161586" ref_url="https://bugzilla.suse.com/1161586" source="BUGZILLA"/>
		<reference ref_id="1162227" ref_url="https://bugzilla.suse.com/1162227" source="BUGZILLA"/>
		<reference ref_id="1162928" ref_url="https://bugzilla.suse.com/1162928" source="BUGZILLA"/>
		<reference ref_id="1162929" ref_url="https://bugzilla.suse.com/1162929" source="BUGZILLA"/>
		<reference ref_id="1162931" ref_url="https://bugzilla.suse.com/1162931" source="BUGZILLA"/>
		<reference ref_id="1163508" ref_url="https://bugzilla.suse.com/1163508" source="BUGZILLA"/>
		<reference ref_id="1163971" ref_url="https://bugzilla.suse.com/1163971" source="BUGZILLA"/>
		<reference ref_id="1164009" ref_url="https://bugzilla.suse.com/1164009" source="BUGZILLA"/>
		<reference ref_id="1164051" ref_url="https://bugzilla.suse.com/1164051" source="BUGZILLA"/>
		<reference ref_id="1164069" ref_url="https://bugzilla.suse.com/1164069" source="BUGZILLA"/>
		<reference ref_id="1164078" ref_url="https://bugzilla.suse.com/1164078" source="BUGZILLA"/>
		<reference ref_id="1164846" ref_url="https://bugzilla.suse.com/1164846" source="BUGZILLA"/>
		<reference ref_id="1165111" ref_url="https://bugzilla.suse.com/1165111" source="BUGZILLA"/>
		<reference ref_id="1165311" ref_url="https://bugzilla.suse.com/1165311" source="BUGZILLA"/>
		<reference ref_id="1165873" ref_url="https://bugzilla.suse.com/1165873" source="BUGZILLA"/>
		<reference ref_id="1165881" ref_url="https://bugzilla.suse.com/1165881" source="BUGZILLA"/>
		<reference ref_id="1165984" ref_url="https://bugzilla.suse.com/1165984" source="BUGZILLA"/>
		<reference ref_id="1165985" ref_url="https://bugzilla.suse.com/1165985" source="BUGZILLA"/>
		<reference ref_id="1167421" ref_url="https://bugzilla.suse.com/1167421" source="BUGZILLA"/>
		<reference ref_id="1167423" ref_url="https://bugzilla.suse.com/1167423" source="BUGZILLA"/>
		<reference ref_id="1167629" ref_url="https://bugzilla.suse.com/1167629" source="BUGZILLA"/>
		<reference ref_id="1168075" ref_url="https://bugzilla.suse.com/1168075" source="BUGZILLA"/>
		<reference ref_id="1168295" ref_url="https://bugzilla.suse.com/1168295" source="BUGZILLA"/>
		<reference ref_id="1168424" ref_url="https://bugzilla.suse.com/1168424" source="BUGZILLA"/>
		<reference ref_id="1168829" ref_url="https://bugzilla.suse.com/1168829" source="BUGZILLA"/>
		<reference ref_id="1168854" ref_url="https://bugzilla.suse.com/1168854" source="BUGZILLA"/>
		<reference ref_id="1170056" ref_url="https://bugzilla.suse.com/1170056" source="BUGZILLA"/>
		<reference ref_id="1170345" ref_url="https://bugzilla.suse.com/1170345" source="BUGZILLA"/>
		<reference ref_id="1170778" ref_url="https://bugzilla.suse.com/1170778" source="BUGZILLA"/>
		<reference ref_id="1170847" ref_url="https://bugzilla.suse.com/1170847" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18255" ref_url="https://www.suse.com/security/cve/CVE-2017-18255/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-21008" ref_url="https://www.suse.com/security/cve/CVE-2018-21008/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="CVE-2019-18675" ref_url="https://www.suse.com/security/cve/CVE-2019-18675/" source="CVE"/>
		<reference ref_id="CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066/" source="CVE"/>
		<reference ref_id="CVE-2019-19319" ref_url="https://www.suse.com/security/cve/CVE-2019-19319/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-19966" ref_url="https://www.suse.com/security/cve/CVE-2019-19966/" source="CVE"/>
		<reference ref_id="CVE-2019-20054" ref_url="https://www.suse.com/security/cve/CVE-2019-20054/" source="CVE"/>
		<reference ref_id="CVE-2019-20096" ref_url="https://www.suse.com/security/cve/CVE-2019-20096/" source="CVE"/>
		<reference ref_id="CVE-2019-3701" ref_url="https://www.suse.com/security/cve/CVE-2019-3701/" source="CVE"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2019-9455" ref_url="https://www.suse.com/security/cve/CVE-2019-9455/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690/" source="CVE"/>
		<reference ref_id="CVE-2020-10720" ref_url="https://www.suse.com/security/cve/CVE-2020-10720/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11494" ref_url="https://www.suse.com/security/cve/CVE-2020-11494/" source="CVE"/>
		<reference ref_id="CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608/" source="CVE"/>
		<reference ref_id="CVE-2020-11609" ref_url="https://www.suse.com/security/cve/CVE-2020-11609/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-8992" ref_url="https://www.suse.com/security/cve/CVE-2020-8992/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-11494: An issue was discovered in slc_bump in drivers/net/can/slcan.c, which allowed attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL (bnc#1168424).
- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bnc#1167629).
- CVE-2020-8647: Fixed a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bnc#1162929).
- CVE-2020-8649: Fixed a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bnc#1162931).
- CVE-2020-9383: Fixed an issue in set_fdc in drivers/block/floppy.c, which leads to a wait_til_ready out-of-bounds read (bnc#1165111).
- CVE-2019-9458: In the video driver there was a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed (bnc#1168295).
- CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a system crash (bnc#1120386).
- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bnc#1159285).
- CVE-2020-11609: Fixed a NULL pointer dereference in the stv06xx subsystem caused by mishandling invalid descriptors (bnc#1168854).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bnc#1170345).
- CVE-2020-11608: Fixed an issue in drivers/media/usb/gspca/ov519.c caused by a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bnc#1168829).
- CVE-2017-18255: The perf_cpu_time_max_percent_handler function in kernel/events/core.c allowed local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation (bnc#1087813).
- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).
- CVE-2020-2732: A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest (bnc#1163971).
- CVE-2019-5108: Fixed a denial-of-service vulnerability caused by triggering AP to send IAPP location updates for stations before the required authentication process has completed (bnc#1159912).
- CVE-2020-8992: ext4_protect_reserved_inode in fs/ext4/block_validity.c allowed attackers to cause a denial of service (soft lockup) via a crafted journal size (bnc#1164069).
- CVE-2018-21008: Fixed a use-after-free which could be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c (bnc#1149591).
- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bnc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bnc#1157155).
- CVE-2019-18675: Fixed an integer overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bnc#1157804).
- CVE-2019-14615: Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may have allowed an unauthenticated user to potentially enable information disclosure via local access (bnc#1160195, bsc#1165881).
- CVE-2019-19965: Fixed a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bnc#1159911).
- CVE-2019-20054: Fixed a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bnc#1159910).
- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bnc#1159908).
- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bnc#1159841).
- CVE-2019-19447: Fixed an issue with mounting a crafted ext4 filesystem image, performing some operations, and unmounting could lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c (bnc#1158819).
- CVE-2019-19319: Fixed an issue with a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call (bnc#1158021).
- CVE-2019-19767: Fixed mishandling of ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c (bnc#1159297).
- CVE-2019-11091,CVE-2018-12126,CVE-2018-12130,CVE-2018-12127: Earlier mitigations for the 'MDS' Microarchitectural Data Sampling attacks were not complete.
  An additional fix was added to the x86_64 fast systemcall path to further mitigate these attacks. (bsc#1164846 bsc#1170847)


The following non-security bugs were fixed:

- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).
- blktrace: fix dereference after null check (bsc#1159285).
- blktrace: fix trace mutex deadlock (bsc#1159285).
- btrfs: fix btrfs_wait_ordered_range() so that it waits for all ordered extents (bsc#1163508).
- btrfs: fix panic during relocation after ENOSPC before writeback happens (bsc#1163508).
- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1158642)
- btrfs: relocation: fix reloc_root lifespan and access (bsc#1164009).
- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).
- fix PageHeadHuge() race with THP split (VM Functionality, bsc#1165311).
- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).
- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).
- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).
- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).
- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).
- input: add safety guards to input_set_keycode() (bsc#1168075).
- ipv4: correct gso_size for UFO (bsc#1154844).
- ipv6: fix memory accounting during ipv6 queue expire (bsc#1162227) (bsc#1162227).
- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).
- md: add mddev-&gt;pers to avoid potential NULL pointer dereference (bsc#1056134).
- md/bitmap: do not read page from device with Bitmap_sync (bsc#1056134).
- md: change the initialization value for a spare device spot to MD_DISK_ROLE_SPARE (bsc#1056134).
- md: Delete gendisk before cleaning up the request queue (bsc#1056134).
- md: do not call bitmap_create() while array is quiesced (bsc#1056134).
- md: do not set In_sync if array is frozen (bsc#1056134).
- md: fix a potential deadlock of raid5/raid10 reshape (bsc#1056134).
- md: md.c: Return -ENODEV when mddev is NULL in rdev_attr_show (bsc#1056134).
- md: notify about new spare disk in the container (bsc#1056134).
- md/raid0: Fix buffer overflow at debug print (bsc#1164051).
- md/raid10: end bio when the device faulty (bsc#1056134).
- md/raid10: Fix raid10 replace hang when new added disk faulty (bsc#1056134).
- md/raid1,raid10: silence warning about wait-within-wait (bsc#1056134).
- md: return -ENODEV if rdev has no mddev assigned (bsc#1056134).
- media: ov519: add missing endpoint sanity checks (bsc#1168829).
- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).
- net: ena: Add PCI shutdown handler to allow safe kexec (bsc#1167421, bsc#1167423).
- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).
- net/ibmvnic: Fix typo in retry check (bsc#1155689 ltc#182047).
- rpm/kernel-binary.spec.in: Replace Novell with SUSE
- sched/fair: Scale bandwidth quota and period without losing quota/period ratio precision (bsc#1161586).
- scsi: core: avoid repetitive logging of device offline messages (bsc#1145929).
- scsi: core: kABI fix already_offline (bsc#1145929).
- tcp: clear tp-&gt;packets_out when purging write queue (bsc#1154118).
- x86/mitigations: Clear CPU buffers on the SYSCALL fast path (bsc#1164846 bsc#1170847).
- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).
- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-14"/>
	<updated date="2020-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056134">SUSE bug 1056134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087813">SUSE bug 1087813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120386">SUSE bug 1120386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133147">SUSE bug 1133147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137325">SUSE bug 1137325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145929">SUSE bug 1145929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149591">SUSE bug 1149591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154118">SUSE bug 1154118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154844">SUSE bug 1154844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155689">SUSE bug 1155689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157155">SUSE bug 1157155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157157">SUSE bug 1157157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157303">SUSE bug 1157303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157804">SUSE bug 1157804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158021">SUSE bug 1158021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158642">SUSE bug 1158642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158819">SUSE bug 1158819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159199">SUSE bug 1159199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159285">SUSE bug 1159285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159297">SUSE bug 1159297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159841">SUSE bug 1159841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159908">SUSE bug 1159908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159910">SUSE bug 1159910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159911">SUSE bug 1159911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159912">SUSE bug 1159912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160195">SUSE bug 1160195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161586">SUSE bug 1161586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162227">SUSE bug 1162227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162928">SUSE bug 1162928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162929">SUSE bug 1162929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162931">SUSE bug 1162931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163508">SUSE bug 1163508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163971">SUSE bug 1163971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164009">SUSE bug 1164009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164051">SUSE bug 1164051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164069">SUSE bug 1164069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164078">SUSE bug 1164078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164846">SUSE bug 1164846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165111">SUSE bug 1165111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165311">SUSE bug 1165311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165873">SUSE bug 1165873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165881">SUSE bug 1165881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165984">SUSE bug 1165984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165985">SUSE bug 1165985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167421">SUSE bug 1167421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167423">SUSE bug 1167423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167629">SUSE bug 1167629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168075">SUSE bug 1168075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168295">SUSE bug 1168295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168424">SUSE bug 1168424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168829">SUSE bug 1168829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168854">SUSE bug 1168854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170056">SUSE bug 1170056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170345">SUSE bug 1170345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170778">SUSE bug 1170778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170847">SUSE bug 1170847</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18255/">CVE-2017-18255 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18255">CVE-2017-18255 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-21008/">CVE-2018-21008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21008">CVE-2018-21008 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14615">CVE-2019-14615 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18675/">CVE-2019-18675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18675">CVE-2019-18675 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19066">CVE-2019-19066 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19319/">CVE-2019-19319 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19319">CVE-2019-19319 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19447">CVE-2019-19447 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19767">CVE-2019-19767 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19768">CVE-2019-19768 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19965">CVE-2019-19965 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19966/">CVE-2019-19966 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19966">CVE-2019-19966 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20054/">CVE-2019-20054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20054">CVE-2019-20054 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20096/">CVE-2019-20096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20096">CVE-2019-20096 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3701/">CVE-2019-3701 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3701">CVE-2019-3701 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5108">CVE-2019-5108 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9455/">CVE-2019-9455 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9455">CVE-2019-9455 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9458">CVE-2019-9458 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10690">CVE-2020-10690 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10720/">CVE-2020-10720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10720">CVE-2020-10720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10942">CVE-2020-10942 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11494/">CVE-2020-11494 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11494">CVE-2020-11494 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11608">CVE-2020-11608 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11609/">CVE-2020-11609 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11609">CVE-2020-11609 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2732">CVE-2020-2732 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8647">CVE-2020-8647 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8648">CVE-2020-8648 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8649">CVE-2020-8649 at NVD</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8992/">CVE-2020-8992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8992">CVE-2020-8992 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9383">CVE-2020-9383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555707" comment="kernel-default-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555708" comment="kernel-default-base-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555709" comment="kernel-default-devel-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556240" comment="kernel-default-kgraft-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538400" comment="kernel-devel-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538401" comment="kernel-macros-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538402" comment="kernel-source-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555710" comment="kernel-syms-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556242" comment="kgraft-patch-4_4_180-94_116-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148249" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyYAML (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1165439" ref_url="https://bugzilla.suse.com/1165439" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1747" ref_url="https://www.suse.com/security/cve/CVE-2020-1747/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006820.html" source="SUSE-SU"/>
		<description>
This update for python-PyYAML fixes the following issues:

- CVE-2020-1747: Fixed an arbitrary code execution when YAML files are parsed by FullLoader (bsc#1165439).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-15"/>
	<updated date="2020-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165439">SUSE bug 1165439</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1747/">CVE-2020-1747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1747">CVE-2020-1747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009524550" comment="python-PyYAML-5.1.2-26.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530070" comment="python3-PyYAML-5.1.2-26.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148250" version="1" class="patch">
	<metadata>
		<title>Security update for git (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1168930" ref_url="https://bugzilla.suse.com/1168930" source="BUGZILLA"/>
		<reference ref_id="1169605" ref_url="https://bugzilla.suse.com/1169605" source="BUGZILLA"/>
		<reference ref_id="1169786" ref_url="https://bugzilla.suse.com/1169786" source="BUGZILLA"/>
		<reference ref_id="1169936" ref_url="https://bugzilla.suse.com/1169936" source="BUGZILLA"/>
		<reference ref_id="1170302" ref_url="https://bugzilla.suse.com/1170302" source="BUGZILLA"/>
		<reference ref_id="1170741" ref_url="https://bugzilla.suse.com/1170741" source="BUGZILLA"/>
		<reference ref_id="1170939" ref_url="https://bugzilla.suse.com/1170939" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11008" ref_url="https://www.suse.com/security/cve/CVE-2020-11008/" source="CVE"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006829.html" source="SUSE-SU"/>
		<description>
This update for git to 2.26.2 fixes the following issues:

Security issue fixed:

- CVE-2020-11008: Specially crafted URLs may have tricked the credentials helper 
  to providing credential information that is not appropriate for the protocol 
  in use and host being contacted (bsc#1169936).

Non-security issue fixed:

- Fixed git-daemon not starting after conversion from sysvinit to systemd service (bsc#1169605).
- Enabled access for git-daemon in firewall configuration (bsc#1170302).
- Fixed problems with recent switch to protocol v2, which caused fetches transferring unreasonable amount of data (bsc#1170741).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-18"/>
	<updated date="2020-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169605">SUSE bug 1169605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169786">SUSE bug 1169786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169936">SUSE bug 1169936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170302">SUSE bug 1170302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170741">SUSE bug 1170741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170939">SUSE bug 1170939</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11008/">CVE-2020-11008 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11008">CVE-2020-11008 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5260">CVE-2020-5260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597237" comment="git-2.26.2-27.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530961" comment="git-core-2.26.2-27.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148251" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1167068" ref_url="https://bugzilla.suse.com/1167068" source="BUGZILLA"/>
		<reference ref_id="1170558" ref_url="https://bugzilla.suse.com/1170558" source="BUGZILLA"/>
		<reference ref_id="1171363" ref_url="https://bugzilla.suse.com/1171363" source="BUGZILLA"/>
		<reference ref_id="682920" ref_url="https://bugzilla.suse.com/682920" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12108" ref_url="https://www.suse.com/security/cve/CVE-2020-12108/" source="CVE"/>
		<reference ref_id="CVE-2020-12137" ref_url="https://www.suse.com/security/cve/CVE-2020-12137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006830.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2020-12108: Fixed a content injection bug (bsc#1171363).
- CVE-2020-12137: Fixed a XSS vulnerability caused by MIME type confusion (bsc#1170558).

Non-security issue fixed:

- Fixed rights and ownership on /var/lib/mailman/archives (bsc#1167068).
- Don't default to invalid hosts for DEFAULT_EMAIL_HOST (bsc#682920).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-18"/>
	<updated date="2020-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167068">SUSE bug 1167068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170558">SUSE bug 1170558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171363">SUSE bug 1171363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682920">SUSE bug 682920</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12108/">CVE-2020-12108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12108">CVE-2020-12108 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12137/">CVE-2020-12137 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12137">CVE-2020-12137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530963" comment="mailman-2.1.17-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148252" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1136085" ref_url="https://bugzilla.suse.com/1136085" source="BUGZILLA"/>
		<reference ref_id="1159723" ref_url="https://bugzilla.suse.com/1159723" source="BUGZILLA"/>
		<reference ref_id="1159729" ref_url="https://bugzilla.suse.com/1159729" source="BUGZILLA"/>
		<reference ref_id="1164825" ref_url="https://bugzilla.suse.com/1164825" source="BUGZILLA"/>
		<reference ref_id="1171928" ref_url="https://bugzilla.suse.com/1171928" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221/" source="CVE"/>
		<reference ref_id="CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418/" source="CVE"/>
		<reference ref_id="CVE-2019-17563" ref_url="https://www.suse.com/security/cve/CVE-2019-17563/" source="CVE"/>
		<reference ref_id="CVE-2019-17569" ref_url="https://www.suse.com/security/cve/CVE-2019-17569/" source="CVE"/>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006867.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

CVE-2020-9484 (bsc#1171928)
Apache Tomcat Remote Code Execution via session persistence

If an attacker was able to control the contents and name of a file on a
server configured to use the PersistenceManager, then the attacker could
have triggered a remote code execution via deserialization of the file under
their control.

CVE-2019-12418 (bsc#1159723)
Local privilege escalation by manipulating the RMI registry and performing a man-in-the-middle attack

When Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files was able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface.
The attacker could then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.

CVE-2019-0221 (bsc#1136085)
The SSI printenv command echoed user provided data without escaping, which
made it vulnerable to XSS.

CVE-2019-17563 (bsc#1159729)
When using FORM authentication there was a narrow window where an attacker could perform a session fixation attack.

CVE-2019-17569 (bsc#1164825)
Invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling
if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-28"/>
	<updated date="2020-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136085">SUSE bug 1136085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159723">SUSE bug 1159723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159729">SUSE bug 1159729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164825">SUSE bug 1164825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171928">SUSE bug 1171928</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0221">CVE-2019-0221 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12418">CVE-2019-12418 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17563/">CVE-2019-17563 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17563">CVE-2019-17563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17569/">CVE-2019-17569 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17569">CVE-2019-17569 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9484">CVE-2020-9484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530964" comment="tomcat-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530965" comment="tomcat-admin-webapps-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530966" comment="tomcat-docs-webapp-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530967" comment="tomcat-el-3_0-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530968" comment="tomcat-javadoc-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530969" comment="tomcat-jsp-2_3-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530970" comment="tomcat-lib-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530971" comment="tomcat-servlet-3_1-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530972" comment="tomcat-webapps-8.0.53-29.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148253" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1027282" ref_url="https://bugzilla.suse.com/1027282" source="BUGZILLA"/>
		<reference ref_id="1041090" ref_url="https://bugzilla.suse.com/1041090" source="BUGZILLA"/>
		<reference ref_id="1042670" ref_url="https://bugzilla.suse.com/1042670" source="BUGZILLA"/>
		<reference ref_id="1073269" ref_url="https://bugzilla.suse.com/1073269" source="BUGZILLA"/>
		<reference ref_id="1073748" ref_url="https://bugzilla.suse.com/1073748" source="BUGZILLA"/>
		<reference ref_id="1078326" ref_url="https://bugzilla.suse.com/1078326" source="BUGZILLA"/>
		<reference ref_id="1078485" ref_url="https://bugzilla.suse.com/1078485" source="BUGZILLA"/>
		<reference ref_id="1081750" ref_url="https://bugzilla.suse.com/1081750" source="BUGZILLA"/>
		<reference ref_id="1084650" ref_url="https://bugzilla.suse.com/1084650" source="BUGZILLA"/>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1153830" ref_url="https://bugzilla.suse.com/1153830" source="BUGZILLA"/>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1159035" ref_url="https://bugzilla.suse.com/1159035" source="BUGZILLA"/>
		<reference ref_id="1162224" ref_url="https://bugzilla.suse.com/1162224" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="1170411" ref_url="https://bugzilla.suse.com/1170411" source="BUGZILLA"/>
		<reference ref_id="1171561" ref_url="https://bugzilla.suse.com/1171561" source="BUGZILLA"/>
		<reference ref_id="945401" ref_url="https://bugzilla.suse.com/945401" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006878.html" source="SUSE-SU"/>
		<description>


This update for python to version 2.7.17 fixes the following issues:

Syncing with lots of upstream bug fixes and security fixes.

Bug fixes:

- CVE-2019-9674: Improved the documentation to reflect the dangers of zip-bombs (bsc#1162825).
- CVE-2019-18348: Fixed a CRLF injection via the host part of the url passed to urlopen(). Now an InvalidURL exception is raised (bsc#1155094).
- CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367).
- Fixed mismatches between libpython and python-base versions (bsc#1162224).
- Fixed segfault in libpython2.7.so.1 (bsc#1073748).
- Unified packages among openSUSE:Factory and SLE versions (bsc#1159035).
- Added idle.desktop and idle.appdata.xml to provide IDLE in menus (bsc#1153830).
- Excluded tsl_check files from python-base to prevent file conflict with python-strict-tls-checks package (bsc#945401).
- Changed the name of idle3 icons to idle3.png to avoid collision with Python 2 version (bsc#1165894).

Additionally a new 'shared-python-startup' package is provided containing startup files.

python-rpm-macros was updated to fix:

- Do not write .pyc files for tests (bsc#1171561)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-03"/>
	<updated date="2020-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027282">SUSE bug 1027282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041090">SUSE bug 1041090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042670">SUSE bug 1042670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073269">SUSE bug 1073269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073748">SUSE bug 1073748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078326">SUSE bug 1078326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078485">SUSE bug 1078485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081750">SUSE bug 1081750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084650">SUSE bug 1084650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153830">SUSE bug 1153830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159035">SUSE bug 1159035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162224">SUSE bug 1162224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170411">SUSE bug 1170411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171561">SUSE bug 1171561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945401">SUSE bug 945401</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530973" comment="libpython2_7-1_0-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530974" comment="libpython2_7-1_0-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530975" comment="python-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530976" comment="python-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530977" comment="python-base-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530978" comment="python-base-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530979" comment="python-curses-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530980" comment="python-demo-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530981" comment="python-devel-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530982" comment="python-doc-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530983" comment="python-doc-pdf-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530984" comment="python-gdbm-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530985" comment="python-idle-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530986" comment="python-rpm-macros-20200207.5feb6c1-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530987" comment="python-tk-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530988" comment="python-xml-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530989" comment="shared-python-startup-0.1-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148254" version="1" class="patch">
	<metadata>
		<title>Security update for krb5-appl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1165787" ref_url="https://bugzilla.suse.com/1165787" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10188" ref_url="https://www.suse.com/security/cve/CVE-2020-10188/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006882.html" source="SUSE-SU"/>
		<description>
This update for krb5-appl fixes the following issues:

- CVE-2020-10188: Fixed a remote root execution (bsc#1165787).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165787">SUSE bug 1165787</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10188/">CVE-2020-10188 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10188">CVE-2020-10188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531003" comment="krb5-appl-clients-1.0.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531004" comment="krb5-appl-servers-1.0.3-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148255" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1055857" ref_url="https://bugzilla.suse.com/1055857" source="BUGZILLA"/>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="1171475" ref_url="https://bugzilla.suse.com/1171475" source="BUGZILLA"/>
		<reference ref_id="1171847" ref_url="https://bugzilla.suse.com/1171847" source="BUGZILLA"/>
		<reference ref_id="1172105" ref_url="https://bugzilla.suse.com/1172105" source="BUGZILLA"/>
		<reference ref_id="1172116" ref_url="https://bugzilla.suse.com/1172116" source="BUGZILLA"/>
		<reference ref_id="1172121" ref_url="https://bugzilla.suse.com/1172121" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328/" source="CVE"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="CVE-2020-0093" ref_url="https://www.suse.com/security/cve/CVE-2020-0093/" source="CVE"/>
		<reference ref_id="CVE-2020-12767" ref_url="https://www.suse.com/security/cve/CVE-2020-12767/" source="CVE"/>
		<reference ref_id="CVE-2020-13112" ref_url="https://www.suse.com/security/cve/CVE-2020-13112/" source="CVE"/>
		<reference ref_id="CVE-2020-13113" ref_url="https://www.suse.com/security/cve/CVE-2020-13113/" source="CVE"/>
		<reference ref_id="CVE-2020-13114" ref_url="https://www.suse.com/security/cve/CVE-2020-13114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

Security issues fixed:

- CVE-2016-6328: Fixed an integer overflow in parsing MNOTE entry data of the input file (bsc#1055857).
- CVE-2017-7544: Fixed an out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c (bsc#1059893).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2020-0093: Fixed an out-of-bounds read in exif_data_save_data_entry (bsc#1171847).
- CVE-2020-12767: Fixed a divide-by-zero error in exif_entry_get_value (bsc#1171475).
- CVE-2020-13112: Fixed a time consumption DoS when parsing canon array markers (bsc#1172121).
- CVE-2020-13113: Fixed a potential use of uninitialized memory (bsc#1172105).
- CVE-2020-13114: Fixed various buffer overread fixes due to integer overflows in maker notes (bsc#1172116).

Non-security issues fixed:

- libexif was updated to version 0.6.22:
  * New translations: ms
  * Updated translations for most languages
  * Some useful EXIF 2.3 tag added:
    * EXIF_TAG_GAMMA
    * EXIF_TAG_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_IMAGE_NUMBER_OF_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_EXPOSURE_TIMES_OF_COMPOSITE_IMAGE
    * EXIF_TAG_GPS_H_POSITIONING_ERROR
    * EXIF_TAG_CAMERA_OWNER_NAME
    * EXIF_TAG_BODY_SERIAL_NUMBER
    * EXIF_TAG_LENS_SPECIFICATION
    * EXIF_TAG_LENS_MAKE
    * EXIF_TAG_LENS_MODEL
    * EXIF_TAG_LENS_SERIAL_NUMBER
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055857">SUSE bug 1055857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171475">SUSE bug 1171475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171847">SUSE bug 1171847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172105">SUSE bug 1172105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172116">SUSE bug 1172116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172121">SUSE bug 1172121</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6328">CVE-2016-6328 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7544">CVE-2017-7544 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20030">CVE-2018-20030 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9278">CVE-2019-9278 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0093/">CVE-2020-0093 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0093">CVE-2020-0093 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12767/">CVE-2020-12767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12767">CVE-2020-12767 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13112/">CVE-2020-13112 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13112">CVE-2020-13112 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13113/">CVE-2020-13113 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13113">CVE-2020-13113 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13114/">CVE-2020-13114 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13114">CVE-2020-13114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531005" comment="libexif12-0.6.22-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531006" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148256" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="1146873" ref_url="https://bugzilla.suse.com/1146873" source="BUGZILLA"/>
		<reference ref_id="1149811" ref_url="https://bugzilla.suse.com/1149811" source="BUGZILLA"/>
		<reference ref_id="1160024" ref_url="https://bugzilla.suse.com/1160024" source="BUGZILLA"/>
		<reference ref_id="1161066" ref_url="https://bugzilla.suse.com/1161066" source="BUGZILLA"/>
		<reference ref_id="1163018" ref_url="https://bugzilla.suse.com/1163018" source="BUGZILLA"/>
		<reference ref_id="1166240" ref_url="https://bugzilla.suse.com/1166240" source="BUGZILLA"/>
		<reference ref_id="1170940" ref_url="https://bugzilla.suse.com/1170940" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2020-1711: Fixed a potential OOB access in the iSCSI client code (bsc#1166240).
- CVE-2019-12068: Fixed a potential DoS in the LSI SCSI controller emulation (bsc#1146873).
- CVE-2020-1983: Fixed a use-after-free in the ip_reass function of slirp (bsc#1170940).
- CVE-2020-8608: Fixed a potential OOB access in slirp (bsc#1163018).
- CVE-2020-7039: Fixed a potential OOB access in slirp (bsc#1161066).
- CVE-2019-15890: Fixed a use-after-free during packet reassembly in slirp (bsc#1149811).
- Fixed multiple potential DoS issues in SLIRP, similar to CVE-2019-6778 (bsc#1123156).

Non-security issue fixed:

- Make sure that required memory is mapped properly during an incoming migration of a Xen HVM domU (bsc#1160024).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146873">SUSE bug 1146873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149811">SUSE bug 1149811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160024">SUSE bug 1160024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161066">SUSE bug 1161066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163018">SUSE bug 1163018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166240">SUSE bug 1166240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170940">SUSE bug 1170940</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12068">CVE-2019-12068 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1711">CVE-2020-1711 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1983">CVE-2020-1983 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7039">CVE-2020-7039 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555711" comment="qemu-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555712" comment="qemu-block-curl-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555713" comment="qemu-block-iscsi-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538416" comment="qemu-block-rbd-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555714" comment="qemu-block-ssh-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555715" comment="qemu-guest-agent-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538419" comment="qemu-ipxe-1.0.0+-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538420" comment="qemu-kvm-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555716" comment="qemu-lang-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538423" comment="qemu-seabios-1.10.2-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538424" comment="qemu-sgabios-8-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555717" comment="qemu-tools-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538426" comment="qemu-vgabios-1.10.2-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538427" comment="qemu-x86-2.9.1-6.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148257" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1172031" ref_url="https://bugzilla.suse.com/1172031" source="BUGZILLA"/>
		<reference ref_id="1172225" ref_url="https://bugzilla.suse.com/1172225" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006895.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2019-20807: Fixed an issue where escaping from the restrictive mode of vim 
  was possible using interfaces (bsc#1172225 and bsc#1172031).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172031">SUSE bug 1172031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172225">SUSE bug 1172225</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20807">CVE-2019-20807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531007" comment="gvim-7.4.326-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531008" comment="vim-7.4.326-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531009" comment="vim-data-7.4.326-17.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148258" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1172402" ref_url="https://bugzilla.suse.com/1172402" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006901.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- MozillaFirefox was updated to version 68.9.0 Extended Support Release (bsc#1172402).

- CVE-2020-12405: Fixed a use-after-free in SharedWorkerService. 
- CVE-2020-12406: Fixed a JavaScript Type confusion with NativeTypes.
- CVE-2020-12410: Fixed multiple memory safety bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12405">CVE-2020-12405 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12406">CVE-2020-12406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12410">CVE-2020-12410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531010" comment="MozillaFirefox-68.9.0-109.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531012" comment="MozillaFirefox-translations-common-68.9.0-109.123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148259" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1043983" ref_url="https://bugzilla.suse.com/1043983" source="BUGZILLA"/>
		<reference ref_id="1048072" ref_url="https://bugzilla.suse.com/1048072" source="BUGZILLA"/>
		<reference ref_id="1055265" ref_url="https://bugzilla.suse.com/1055265" source="BUGZILLA"/>
		<reference ref_id="1056286" ref_url="https://bugzilla.suse.com/1056286" source="BUGZILLA"/>
		<reference ref_id="1056782" ref_url="https://bugzilla.suse.com/1056782" source="BUGZILLA"/>
		<reference ref_id="1058754" ref_url="https://bugzilla.suse.com/1058754" source="BUGZILLA"/>
		<reference ref_id="1058755" ref_url="https://bugzilla.suse.com/1058755" source="BUGZILLA"/>
		<reference ref_id="1058757" ref_url="https://bugzilla.suse.com/1058757" source="BUGZILLA"/>
		<reference ref_id="1062452" ref_url="https://bugzilla.suse.com/1062452" source="BUGZILLA"/>
		<reference ref_id="1069607" ref_url="https://bugzilla.suse.com/1069607" source="BUGZILLA"/>
		<reference ref_id="1069632" ref_url="https://bugzilla.suse.com/1069632" source="BUGZILLA"/>
		<reference ref_id="1073002" ref_url="https://bugzilla.suse.com/1073002" source="BUGZILLA"/>
		<reference ref_id="1078782" ref_url="https://bugzilla.suse.com/1078782" source="BUGZILLA"/>
		<reference ref_id="1082007" ref_url="https://bugzilla.suse.com/1082007" source="BUGZILLA"/>
		<reference ref_id="1082008" ref_url="https://bugzilla.suse.com/1082008" source="BUGZILLA"/>
		<reference ref_id="1082009" ref_url="https://bugzilla.suse.com/1082009" source="BUGZILLA"/>
		<reference ref_id="1082010" ref_url="https://bugzilla.suse.com/1082010" source="BUGZILLA"/>
		<reference ref_id="1082011" ref_url="https://bugzilla.suse.com/1082011" source="BUGZILLA"/>
		<reference ref_id="1082014" ref_url="https://bugzilla.suse.com/1082014" source="BUGZILLA"/>
		<reference ref_id="1082058" ref_url="https://bugzilla.suse.com/1082058" source="BUGZILLA"/>
		<reference ref_id="1087433" ref_url="https://bugzilla.suse.com/1087433" source="BUGZILLA"/>
		<reference ref_id="1087434" ref_url="https://bugzilla.suse.com/1087434" source="BUGZILLA"/>
		<reference ref_id="1087436" ref_url="https://bugzilla.suse.com/1087436" source="BUGZILLA"/>
		<reference ref_id="1087437" ref_url="https://bugzilla.suse.com/1087437" source="BUGZILLA"/>
		<reference ref_id="1087440" ref_url="https://bugzilla.suse.com/1087440" source="BUGZILLA"/>
		<reference ref_id="1087441" ref_url="https://bugzilla.suse.com/1087441" source="BUGZILLA"/>
		<reference ref_id="1112530" ref_url="https://bugzilla.suse.com/1112530" source="BUGZILLA"/>
		<reference ref_id="1112532" ref_url="https://bugzilla.suse.com/1112532" source="BUGZILLA"/>
		<reference ref_id="1130611" ref_url="https://bugzilla.suse.com/1130611" source="BUGZILLA"/>
		<reference ref_id="1130617" ref_url="https://bugzilla.suse.com/1130617" source="BUGZILLA"/>
		<reference ref_id="1130620" ref_url="https://bugzilla.suse.com/1130620" source="BUGZILLA"/>
		<reference ref_id="1130622" ref_url="https://bugzilla.suse.com/1130622" source="BUGZILLA"/>
		<reference ref_id="1130623" ref_url="https://bugzilla.suse.com/1130623" source="BUGZILLA"/>
		<reference ref_id="1130627" ref_url="https://bugzilla.suse.com/1130627" source="BUGZILLA"/>
		<reference ref_id="1152990" ref_url="https://bugzilla.suse.com/1152990" source="BUGZILLA"/>
		<reference ref_id="1152992" ref_url="https://bugzilla.suse.com/1152992" source="BUGZILLA"/>
		<reference ref_id="1152994" ref_url="https://bugzilla.suse.com/1152994" source="BUGZILLA"/>
		<reference ref_id="1152995" ref_url="https://bugzilla.suse.com/1152995" source="BUGZILLA"/>
		<reference ref_id="1171517" ref_url="https://bugzilla.suse.com/1171517" source="BUGZILLA"/>
		<reference ref_id="1172275" ref_url="https://bugzilla.suse.com/1172275" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9096" ref_url="https://www.suse.com/security/cve/CVE-2015-9096/" source="CVE"/>
		<reference ref_id="CVE-2016-2339" ref_url="https://www.suse.com/security/cve/CVE-2016-2339/" source="CVE"/>
		<reference ref_id="CVE-2016-7798" ref_url="https://www.suse.com/security/cve/CVE-2016-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-0898" ref_url="https://www.suse.com/security/cve/CVE-2017-0898/" source="CVE"/>
		<reference ref_id="CVE-2017-0899" ref_url="https://www.suse.com/security/cve/CVE-2017-0899/" source="CVE"/>
		<reference ref_id="CVE-2017-0900" ref_url="https://www.suse.com/security/cve/CVE-2017-0900/" source="CVE"/>
		<reference ref_id="CVE-2017-0901" ref_url="https://www.suse.com/security/cve/CVE-2017-0901/" source="CVE"/>
		<reference ref_id="CVE-2017-0902" ref_url="https://www.suse.com/security/cve/CVE-2017-0902/" source="CVE"/>
		<reference ref_id="CVE-2017-0903" ref_url="https://www.suse.com/security/cve/CVE-2017-0903/" source="CVE"/>
		<reference ref_id="CVE-2017-10784" ref_url="https://www.suse.com/security/cve/CVE-2017-10784/" source="CVE"/>
		<reference ref_id="CVE-2017-14033" ref_url="https://www.suse.com/security/cve/CVE-2017-14033/" source="CVE"/>
		<reference ref_id="CVE-2017-14064" ref_url="https://www.suse.com/security/cve/CVE-2017-14064/" source="CVE"/>
		<reference ref_id="CVE-2017-17405" ref_url="https://www.suse.com/security/cve/CVE-2017-17405/" source="CVE"/>
		<reference ref_id="CVE-2017-17742" ref_url="https://www.suse.com/security/cve/CVE-2017-17742/" source="CVE"/>
		<reference ref_id="CVE-2017-17790" ref_url="https://www.suse.com/security/cve/CVE-2017-17790/" source="CVE"/>
		<reference ref_id="CVE-2017-9228" ref_url="https://www.suse.com/security/cve/CVE-2017-9228/" source="CVE"/>
		<reference ref_id="CVE-2017-9229" ref_url="https://www.suse.com/security/cve/CVE-2017-9229/" source="CVE"/>
		<reference ref_id="CVE-2018-1000073" ref_url="https://www.suse.com/security/cve/CVE-2018-1000073/" source="CVE"/>
		<reference ref_id="CVE-2018-1000074" ref_url="https://www.suse.com/security/cve/CVE-2018-1000074/" source="CVE"/>
		<reference ref_id="CVE-2018-1000075" ref_url="https://www.suse.com/security/cve/CVE-2018-1000075/" source="CVE"/>
		<reference ref_id="CVE-2018-1000076" ref_url="https://www.suse.com/security/cve/CVE-2018-1000076/" source="CVE"/>
		<reference ref_id="CVE-2018-1000077" ref_url="https://www.suse.com/security/cve/CVE-2018-1000077/" source="CVE"/>
		<reference ref_id="CVE-2018-1000078" ref_url="https://www.suse.com/security/cve/CVE-2018-1000078/" source="CVE"/>
		<reference ref_id="CVE-2018-1000079" ref_url="https://www.suse.com/security/cve/CVE-2018-1000079/" source="CVE"/>
		<reference ref_id="CVE-2018-16395" ref_url="https://www.suse.com/security/cve/CVE-2018-16395/" source="CVE"/>
		<reference ref_id="CVE-2018-16396" ref_url="https://www.suse.com/security/cve/CVE-2018-16396/" source="CVE"/>
		<reference ref_id="CVE-2018-6914" ref_url="https://www.suse.com/security/cve/CVE-2018-6914/" source="CVE"/>
		<reference ref_id="CVE-2018-8777" ref_url="https://www.suse.com/security/cve/CVE-2018-8777/" source="CVE"/>
		<reference ref_id="CVE-2018-8778" ref_url="https://www.suse.com/security/cve/CVE-2018-8778/" source="CVE"/>
		<reference ref_id="CVE-2018-8779" ref_url="https://www.suse.com/security/cve/CVE-2018-8779/" source="CVE"/>
		<reference ref_id="CVE-2018-8780" ref_url="https://www.suse.com/security/cve/CVE-2018-8780/" source="CVE"/>
		<reference ref_id="CVE-2019-15845" ref_url="https://www.suse.com/security/cve/CVE-2019-15845/" source="CVE"/>
		<reference ref_id="CVE-2019-16201" ref_url="https://www.suse.com/security/cve/CVE-2019-16201/" source="CVE"/>
		<reference ref_id="CVE-2019-16254" ref_url="https://www.suse.com/security/cve/CVE-2019-16254/" source="CVE"/>
		<reference ref_id="CVE-2019-16255" ref_url="https://www.suse.com/security/cve/CVE-2019-16255/" source="CVE"/>
		<reference ref_id="CVE-2019-8320" ref_url="https://www.suse.com/security/cve/CVE-2019-8320/" source="CVE"/>
		<reference ref_id="CVE-2019-8321" ref_url="https://www.suse.com/security/cve/CVE-2019-8321/" source="CVE"/>
		<reference ref_id="CVE-2019-8322" ref_url="https://www.suse.com/security/cve/CVE-2019-8322/" source="CVE"/>
		<reference ref_id="CVE-2019-8323" ref_url="https://www.suse.com/security/cve/CVE-2019-8323/" source="CVE"/>
		<reference ref_id="CVE-2019-8324" ref_url="https://www.suse.com/security/cve/CVE-2019-8324/" source="CVE"/>
		<reference ref_id="CVE-2019-8325" ref_url="https://www.suse.com/security/cve/CVE-2019-8325/" source="CVE"/>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<description>
This update for ruby2.1 fixes the following issues:

Security issues fixed:

- CVE-2015-9096: Fixed an SMTP command injection via CRLFsequences in a RCPT TO or MAIL FROM command (bsc#1043983).
- CVE-2016-7798: Fixed an IV Reuse in GCM Mode (bsc#1055265).
- CVE-2017-0898: Fixed a buffer underrun vulnerability in Kernel.sprintf (bsc#1058755).
- CVE-2017-0899: Fixed an issue with malicious gem specifications, insufficient sanitation when printing gem specifications could have included terminal characters (bsc#1056286).
- CVE-2017-0900: Fixed an issue with malicious gem specifications, the query command could have led to a denial of service attack against clients (bsc#1056286).
- CVE-2017-0901: Fixed an issue with malicious gem specifications, potentially overwriting arbitrary files on the client system (bsc#1056286).
- CVE-2017-0902: Fixed an issue with malicious gem specifications, that could have enabled MITM attacks against clients (bsc#1056286).
- CVE-2017-0903: Fixed an unsafe object deserialization vulnerability (bsc#1062452).
- CVE-2017-9228: Fixed a heap out-of-bounds write in bitset_set_range() during regex compilation (bsc#1069607).
- CVE-2017-9229: Fixed an invalid pointer dereference in left_adjust_char_head() in oniguruma (bsc#1069632).
- CVE-2017-10784: Fixed an escape sequence injection vulnerability in the Basic authentication of WEBrick (bsc#1058754).
- CVE-2017-14033: Fixed a buffer underrun vulnerability in OpenSSL ASN1 decode (bsc#1058757).
- CVE-2017-14064: Fixed an arbitrary memory exposure during a JSON.generate call (bsc#1056782).
- CVE-2017-17405: Fixed a command injection vulnerability in Net::FTP (bsc#1073002).
- CVE-2017-17742: Fixed an HTTP response splitting issue in WEBrick (bsc#1087434).
- CVE-2017-17790: Fixed a command injection in lib/resolv.rb:lazy_initialize() (bsc#1078782).
- CVE-2018-6914: Fixed an unintentional file and directory creation with directory traversal in tempfile and tmpdir (bsc#1087441).
- CVE-2018-8777: Fixed a potential DoS caused by large requests in WEBrick (bsc#1087436).
- CVE-2018-8778: Fixed a buffer under-read in String#unpack (bsc#1087433).
- CVE-2018-8779: Fixed an unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket (bsc#1087440).
- CVE-2018-8780: Fixed an unintentional directory traversal by poisoned NUL byte in Dir (bsc#1087437).
- CVE-2018-16395: Fixed an issue with OpenSSL::X509::Name equality checking (bsc#1112530).
- CVE-2018-16396: Fixed an issue with tainted string handling, where the flag was not propagated in Array#pack and String#unpack with some directives (bsc#1112532).
- CVE-2018-1000073: Fixed a path traversal issue (bsc#1082007).
- CVE-2018-1000074: Fixed an unsafe object deserialization vulnerability in gem owner, allowing arbitrary code execution with specially crafted YAML (bsc#1082008).
- CVE-2018-1000075: Fixed an infinite loop vulnerability due to negative size in tar header causes Denial of Service (bsc#1082014).
- CVE-2018-1000076: Fixed an improper verification of signatures in tarballs (bsc#1082009).
- CVE-2018-1000077: Fixed an improper URL validation in the homepage attribute of ruby gems (bsc#1082010).
- CVE-2018-1000078: Fixed a XSS vulnerability in the homepage attribute when displayed via gem server (bsc#1082011).
- CVE-2018-1000079: Fixed a path traversal issue during gem installation allows to write to arbitrary filesystem locations (bsc#1082058).
- CVE-2019-8320: Fixed a directory traversal issue when decompressing tar files (bsc#1130627).
- CVE-2019-8321: Fixed an escape sequence injection vulnerability in verbose (bsc#1130623).
- CVE-2019-8322: Fixed an escape sequence injection vulnerability in gem owner (bsc#1130622).
- CVE-2019-8323: Fixed an escape sequence injection vulnerability in API response handling (bsc#1130620).
- CVE-2019-8324: Fixed an issue with malicious gems that may have led to arbitrary code execution (bsc#1130617).
- CVE-2019-8325: Fixed an escape sequence injection vulnerability in errors (bsc#1130611).
- CVE-2019-15845: Fixed a NUL injection vulnerability in File.fnmatch and File.fnmatch? (bsc#1152994).
- CVE-2019-16201: Fixed a regular expression denial of service vulnerability in WEBrick's digest access authentication (bsc#1152995).
- CVE-2019-16254: Fixed an HTTP response splitting vulnerability in WEBrick (bsc#1152992).
- CVE-2019-16255: Fixed a code injection vulnerability in Shell#[] and Shell#test (bsc#1152990).
- CVE-2020-10663: Fixed an unsafe object creation vulnerability in JSON (bsc#1171517).

Non-security issue fixed:

- Add conflicts to libruby to make sure ruby and ruby-stdlib are also updated when libruby is updated (bsc#1048072).

Also yast2-ruby-bindings on SLES 12 SP2 LTSS was updated to handle the updated ruby interpreter. (bsc#1172275)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1043983">SUSE bug 1043983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048072">SUSE bug 1048072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055265">SUSE bug 1055265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056286">SUSE bug 1056286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056782">SUSE bug 1056782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058754">SUSE bug 1058754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058755">SUSE bug 1058755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058757">SUSE bug 1058757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062452">SUSE bug 1062452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069607">SUSE bug 1069607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069632">SUSE bug 1069632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073002">SUSE bug 1073002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078782">SUSE bug 1078782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082007">SUSE bug 1082007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082008">SUSE bug 1082008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082009">SUSE bug 1082009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082010">SUSE bug 1082010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082011">SUSE bug 1082011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082014">SUSE bug 1082014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082058">SUSE bug 1082058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087433">SUSE bug 1087433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087434">SUSE bug 1087434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087436">SUSE bug 1087436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087437">SUSE bug 1087437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087440">SUSE bug 1087440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087441">SUSE bug 1087441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112530">SUSE bug 1112530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112532">SUSE bug 1112532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130611">SUSE bug 1130611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130617">SUSE bug 1130617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130620">SUSE bug 1130620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130622">SUSE bug 1130622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130623">SUSE bug 1130623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130627">SUSE bug 1130627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152990">SUSE bug 1152990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152992">SUSE bug 1152992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152994">SUSE bug 1152994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152995">SUSE bug 1152995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171517">SUSE bug 1171517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172275">SUSE bug 1172275</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-9096/">CVE-2015-9096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-9096">CVE-2015-9096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2339/">CVE-2016-2339 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2339">CVE-2016-2339 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7798/">CVE-2016-7798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7798">CVE-2016-7798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0898/">CVE-2017-0898 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0898">CVE-2017-0898 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-0899/">CVE-2017-0899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0899">CVE-2017-0899 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-0900/">CVE-2017-0900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0900">CVE-2017-0900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-0901/">CVE-2017-0901 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0901">CVE-2017-0901 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0902/">CVE-2017-0902 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0902">CVE-2017-0902 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0903/">CVE-2017-0903 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0903">CVE-2017-0903 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10784/">CVE-2017-10784 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10784">CVE-2017-10784 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14033/">CVE-2017-14033 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14033">CVE-2017-14033 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14064/">CVE-2017-14064 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14064">CVE-2017-14064 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17405/">CVE-2017-17405 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17405">CVE-2017-17405 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17742/">CVE-2017-17742 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17742">CVE-2017-17742 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17790/">CVE-2017-17790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17790">CVE-2017-17790 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9228/">CVE-2017-9228 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9228">CVE-2017-9228 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9229/">CVE-2017-9229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9229">CVE-2017-9229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000073/">CVE-2018-1000073 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000073">CVE-2018-1000073 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000074/">CVE-2018-1000074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000074">CVE-2018-1000074 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000075/">CVE-2018-1000075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000075">CVE-2018-1000075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000076/">CVE-2018-1000076 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000076">CVE-2018-1000076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000077/">CVE-2018-1000077 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000077">CVE-2018-1000077 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000078/">CVE-2018-1000078 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000078">CVE-2018-1000078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000079/">CVE-2018-1000079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000079">CVE-2018-1000079 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16395/">CVE-2018-16395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16395">CVE-2018-16395 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16396/">CVE-2018-16396 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16396">CVE-2018-16396 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6914/">CVE-2018-6914 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6914">CVE-2018-6914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8777/">CVE-2018-8777 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8777">CVE-2018-8777 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8778/">CVE-2018-8778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8778">CVE-2018-8778 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8779/">CVE-2018-8779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8779">CVE-2018-8779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8780/">CVE-2018-8780 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8780">CVE-2018-8780 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-15845/">CVE-2019-15845 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15845">CVE-2019-15845 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16201/">CVE-2019-16201 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16201">CVE-2019-16201 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16254/">CVE-2019-16254 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16254">CVE-2019-16254 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-16255/">CVE-2019-16255 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16255">CVE-2019-16255 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8320/">CVE-2019-8320 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8320">CVE-2019-8320 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8321/">CVE-2019-8321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8321">CVE-2019-8321 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8322/">CVE-2019-8322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8322">CVE-2019-8322 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8323/">CVE-2019-8323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8323">CVE-2019-8323 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8324/">CVE-2019-8324 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8324">CVE-2019-8324 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8325/">CVE-2019-8325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8325">CVE-2019-8325 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148260" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk to version 7u261 fixes the following issues:

- CVE-2020-2756: Better mapping of serial ENUMs (bsc#1169511)
- CVE-2020-2757: Less Blocking Array Queues (bsc#1169511)
- CVE-2020-2773: Better signatures in XML (bsc#1169511)
- CVE-2020-2781: Improve TLS session handling (bsc#1169511)
- CVE-2020-2800: Better Headings for HTTP Servers (bsc#1169511)
- CVE-2020-2803: Enhance buffering of byte buffers (bsc#1169511)
- CVE-2020-2805: Enhance typing of methods (bsc#1169511)
- CVE-2020-2830: Better Scanner conversions (bsc#1169511)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2773">CVE-2020-2773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531017" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531018" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531019" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531020" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148261" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1159856" ref_url="https://bugzilla.suse.com/1159856" source="BUGZILLA"/>
		<reference ref_id="1159858" ref_url="https://bugzilla.suse.com/1159858" source="BUGZILLA"/>
		<reference ref_id="1159860" ref_url="https://bugzilla.suse.com/1159860" source="BUGZILLA"/>
		<reference ref_id="1160250" ref_url="https://bugzilla.suse.com/1160250" source="BUGZILLA"/>
		<reference ref_id="1160251" ref_url="https://bugzilla.suse.com/1160251" source="BUGZILLA"/>
		<reference ref_id="1160937" ref_url="https://bugzilla.suse.com/1160937" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15691" ref_url="https://www.suse.com/security/cve/CVE-2019-15691/" source="CVE"/>
		<reference ref_id="CVE-2019-15692" ref_url="https://www.suse.com/security/cve/CVE-2019-15692/" source="CVE"/>
		<reference ref_id="CVE-2019-15693" ref_url="https://www.suse.com/security/cve/CVE-2019-15693/" source="CVE"/>
		<reference ref_id="CVE-2019-15694" ref_url="https://www.suse.com/security/cve/CVE-2019-15694/" source="CVE"/>
		<reference ref_id="CVE-2019-15695" ref_url="https://www.suse.com/security/cve/CVE-2019-15695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006396.html" source="SUSE-SU"/>
		<description>
This update for tigervnc fixes the following issues:

- CVE-2019-15691: Fixed a use-after-return due to incorrect usage of stack memory in ZRLEDecoder (bsc#1159856).
- CVE-2019-15692: Fixed a heap-based buffer overflow in CopyRectDecode (bsc#1160250).
- CVE-2019-15693: Fixed a heap-based buffer overflow in TightDecoder::FilterGradient (bsc#1159858).
- CVE-2019-15694: Fixed a heap-based buffer overflow, caused by improper error handling in processing MemOutStream (bsc#1160251).
- CVE-2019-15695: Fixed a stack-based buffer overflow, which could be triggered from CMsgReader::readSetCursor (bsc#1159860).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159856">SUSE bug 1159856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159858">SUSE bug 1159858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159860">SUSE bug 1159860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160250">SUSE bug 1160250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160251">SUSE bug 1160251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160937">SUSE bug 1160937</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15691/">CVE-2019-15691 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15691">CVE-2019-15691 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15692/">CVE-2019-15692 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15692">CVE-2019-15692 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15693/">CVE-2019-15693 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15693">CVE-2019-15693 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15694/">CVE-2019-15694 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15694">CVE-2019-15694 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15695/">CVE-2019-15695 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15695">CVE-2019-15695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531021" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531022" comment="tigervnc-1.6.0-18.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531023" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148262" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1156353" ref_url="https://bugzilla.suse.com/1156353" source="BUGZILLA"/>
		<reference ref_id="1172466" ref_url="https://bugzilla.suse.com/1172466" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006918.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)
  
This update contains security mitigations for:

- CVE-2020-0543: Fixed a side channel attack against special registers
  which could have resulted in leaking of read values to cores other
  than the one which called it.  This attack is known as Special Register
  Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to
  mitigate the Vector Register and L1D Eviction Sampling aka 'CacheOutAttack'
  attacks. (bsc#1156353)

Microcode Table:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  HSW          C0       6-3c-3/32 00000027-&gt;00000028 Core Gen4
  BDW-U/Y      E0/F0    6-3d-4/c0 0000002e-&gt;0000002f Core Gen5
  HSW-U        C0/D0    6-45-1/72 00000025-&gt;00000026 Core Gen4
  HSW-H        C0       6-46-1/32 0000001b-&gt;0000001c Core Gen4
  BDW-H/E3     E0/G0    6-47-1/22 00000021-&gt;00000022 Core Gen5
  SKL-U/Y      D0       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKL-U23e     K1       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKX-SP       B1       6-55-3/97 01000151-&gt;01000157 Xeon Scalable
  SKX-SP       H0/M0/U0 6-55-4/b7 02000065-&gt;02006906 Xeon Scalable
  SKX-D        M1       6-55-4/b7 02000065-&gt;02006906 Xeon D-21xx
  CLX-SP       B0       6-55-6/bf 0400002c-&gt;04002f01 Xeon Scalable Gen2
  CLX-SP       B1       6-55-7/bf 0500002c-&gt;04002f01 Xeon Scalable Gen2
  SKL-H/S      R0/N0    6-5e-3/36 000000d6-&gt;000000dc Core Gen6; Xeon E3 v5
  AML-Y22      H0       6-8e-9/10 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-U/Y      H0       6-8e-9/c0 000000ca-&gt;000000d6 Core Gen7 Mobile
  CFL-U43e     D0       6-8e-a/c0 000000ca-&gt;000000d6 Core Gen8 Mobile
  WHL-U        W0       6-8e-b/d0 000000ca-&gt;000000d6 Core Gen8 Mobile
  AML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  CML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  WHL-U        V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-G/H/S/E3 B0       6-9e-9/2a 000000ca-&gt;000000d6 Core Gen7; Xeon E3 v6
  CFL-H/S/E3   U0       6-9e-a/22 000000ca-&gt;000000d6 Core Gen8 Desktop, Mobile, Xeon E
  CFL-S        B0       6-9e-b/02 000000ca-&gt;000000d6 Core Gen8
  CFL-H/S      P0       6-9e-c/22 000000ca-&gt;000000d6 Core Gen9
  CFL-H        R0       6-9e-d/22 000000ca-&gt;000000d6 Core Gen9 Mobile

Also contains the Intel CPU Microcode update to 20200520:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061f-&gt;00000621 Xeon E3/E5, Core X
  SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000718-&gt;0000071a Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172466">SUSE bug 1172466</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0548">CVE-2020-0548 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0549">CVE-2020-0549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531024" comment="ucode-intel-20200602-13.68.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148263" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1161951" ref_url="https://bugzilla.suse.com/1161951" source="BUGZILLA"/>
		<reference ref_id="1164871" ref_url="https://bugzilla.suse.com/1164871" source="BUGZILLA"/>
		<reference ref_id="1169025" ref_url="https://bugzilla.suse.com/1169025" source="BUGZILLA"/>
		<reference ref_id="1169625" ref_url="https://bugzilla.suse.com/1169625" source="BUGZILLA"/>
		<reference ref_id="1170383" ref_url="https://bugzilla.suse.com/1170383" source="BUGZILLA"/>
		<reference ref_id="1170618" ref_url="https://bugzilla.suse.com/1170618" source="BUGZILLA"/>
		<reference ref_id="1170620" ref_url="https://bugzilla.suse.com/1170620" source="BUGZILLA"/>
		<reference ref_id="1171098" ref_url="https://bugzilla.suse.com/1171098" source="BUGZILLA"/>
		<reference ref_id="1171195" ref_url="https://bugzilla.suse.com/1171195" source="BUGZILLA"/>
		<reference ref_id="1171202" ref_url="https://bugzilla.suse.com/1171202" source="BUGZILLA"/>
		<reference ref_id="1171218" ref_url="https://bugzilla.suse.com/1171218" source="BUGZILLA"/>
		<reference ref_id="1171219" ref_url="https://bugzilla.suse.com/1171219" source="BUGZILLA"/>
		<reference ref_id="1171689" ref_url="https://bugzilla.suse.com/1171689" source="BUGZILLA"/>
		<reference ref_id="1171698" ref_url="https://bugzilla.suse.com/1171698" source="BUGZILLA"/>
		<reference ref_id="1172032" ref_url="https://bugzilla.suse.com/1172032" source="BUGZILLA"/>
		<reference ref_id="1172221" ref_url="https://bugzilla.suse.com/1172221" source="BUGZILLA"/>
		<reference ref_id="1172317" ref_url="https://bugzilla.suse.com/1172317" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="CVE-2020-12114" ref_url="https://www.suse.com/security/cve/CVE-2020-12114/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
  This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12114: Fixed A pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).

The following non-security bugs were fixed:

- can, slip: Protect tty-&gt;disc_data in write_wakeup and close with RCU (bsc#1171698).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).
- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).
- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).
- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).
- Drivers: hv: vmbus: Make panic reporting to be more useful (bsc#1170618).
- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).
- EDAC: Convert to new X86 CPU match macros
- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).
- ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).
- KEYS: reaching the keys quotas correctly (bsc#1171689).
- NFS: Cleanup if nfs_match_client is interrupted (bsc#1169025).
- NFS: Fix a double unlock from nfs_match,get_client (bsc#1169025).
- NFS: make nfs_match_client killable (bsc#1169025).
- NFS: Unlock requests must never fail (bsc#1172032).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (bsc#1161951 ltc#183551).
- scsi: ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).
- x86/dumpstack/64: Handle faults when printing the 'Stack: ' part of an OOPS (bsc#1170383).
- x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170620).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).
- x86: hyperv: report value of misc_features (git fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161951">SUSE bug 1161951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164871">SUSE bug 1164871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169025">SUSE bug 1169025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169625">SUSE bug 1169625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170383">SUSE bug 1170383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170618">SUSE bug 1170618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170620">SUSE bug 1170620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171098">SUSE bug 1171098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171195">SUSE bug 1171195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171202">SUSE bug 1171202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171218">SUSE bug 1171218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171689">SUSE bug 1171689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171698">SUSE bug 1171698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172032">SUSE bug 1172032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172221">SUSE bug 1172221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172317">SUSE bug 1172317</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12114/">CVE-2020-12114 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12114">CVE-2020-12114 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12652">CVE-2020-12652 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12656">CVE-2020-12656 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555718" comment="kernel-default-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555719" comment="kernel-default-base-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555720" comment="kernel-default-devel-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556289" comment="kernel-default-kgraft-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538432" comment="kernel-devel-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538433" comment="kernel-macros-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538434" comment="kernel-source-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555721" comment="kernel-syms-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556291" comment="kgraft-patch-4_4_180-94_121-default-1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148264" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1159478" ref_url="https://bugzilla.suse.com/1159478" source="BUGZILLA"/>
		<reference ref_id="1159479" ref_url="https://bugzilla.suse.com/1159479" source="BUGZILLA"/>
		<reference ref_id="1159482" ref_url="https://bugzilla.suse.com/1159482" source="BUGZILLA"/>
		<reference ref_id="1159486" ref_url="https://bugzilla.suse.com/1159486" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18388" ref_url="https://www.suse.com/security/cve/CVE-2019-18388/" source="CVE"/>
		<reference ref_id="CVE-2019-18389" ref_url="https://www.suse.com/security/cve/CVE-2019-18389/" source="CVE"/>
		<reference ref_id="CVE-2019-18390" ref_url="https://www.suse.com/security/cve/CVE-2019-18390/" source="CVE"/>
		<reference ref_id="CVE-2019-18391" ref_url="https://www.suse.com/security/cve/CVE-2019-18391/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<description>
This update for virglrenderer fixes the following issues:

- CVE-2019-18388: Fixed a null pointer dereference which could have led
   to denial of service (bsc#1159479).
- CVE-2019-18390: Fixed an out of bound read which could have led to
  denial of service (bsc#1159478).
- CVE-2019-18389: Fixed a heap buffer overflow which could have led to
  guest escape or denial of service (bsc#1159482).
- CVE-2019-18391: Fixed a heap based buffer overflow which could have led to
  guest escape or denial of service (bsc#1159486).  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159478">SUSE bug 1159478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159479">SUSE bug 1159479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159482">SUSE bug 1159482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159486">SUSE bug 1159486</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18388/">CVE-2019-18388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18388">CVE-2019-18388 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18389/">CVE-2019-18389 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18389">CVE-2019-18389 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18390/">CVE-2019-18390 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18390">CVE-2019-18390 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18391/">CVE-2019-18391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18391">CVE-2019-18391 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522550" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148265" version="1" class="patch">
	<metadata>
		<title>Security update for adns (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1172265" ref_url="https://bugzilla.suse.com/1172265" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9103" ref_url="https://www.suse.com/security/cve/CVE-2017-9103/" source="CVE"/>
		<reference ref_id="CVE-2017-9104" ref_url="https://www.suse.com/security/cve/CVE-2017-9104/" source="CVE"/>
		<reference ref_id="CVE-2017-9105" ref_url="https://www.suse.com/security/cve/CVE-2017-9105/" source="CVE"/>
		<reference ref_id="CVE-2017-9106" ref_url="https://www.suse.com/security/cve/CVE-2017-9106/" source="CVE"/>
		<reference ref_id="CVE-2017-9107" ref_url="https://www.suse.com/security/cve/CVE-2017-9107/" source="CVE"/>
		<reference ref_id="CVE-2017-9108" ref_url="https://www.suse.com/security/cve/CVE-2017-9108/" source="CVE"/>
		<reference ref_id="CVE-2017-9109" ref_url="https://www.suse.com/security/cve/CVE-2017-9109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006937.html" source="SUSE-SU"/>
		<description>
This update for adns fixes the following issues:
	  
- CVE-2017-9103,CVE-2017-9104,CVE-2017-9105,CVE-2017-9109: Fixed an issue in local recursive resolver
  which could have led to remote code execution (bsc#1172265).
- CVE-2017-9106: Fixed an issue with upstream DNS data sources which could have led to denial of 
  service (bsc#1172265).
- CVE-2017-9107: Fixed an issue when quering domain names which could have led to denial of service (bsc#1172265).
- CVE-2017-9108: Fixed an issue which could have led to denial of service (bsc#1172265).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-12"/>
	<updated date="2020-06-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9103/">CVE-2017-9103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9103">CVE-2017-9103 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9104/">CVE-2017-9104 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9104">CVE-2017-9104 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9105/">CVE-2017-9105 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9105">CVE-2017-9105 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9106/">CVE-2017-9106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9106">CVE-2017-9106 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9107/">CVE-2017-9107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9107">CVE-2017-9107 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9108/">CVE-2017-9108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9108">CVE-2017-9108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9109/">CVE-2017-9109 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9109">CVE-2017-9109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531033" comment="libadns1-1.4-103.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148266" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1171550" ref_url="https://bugzilla.suse.com/1171550" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2752" ref_url="https://www.suse.com/security/cve/CVE-2020-2752/" source="CVE"/>
		<reference ref_id="CVE-2020-2812" ref_url="https://www.suse.com/security/cve/CVE-2020-2812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006946.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

mariadb was updated to version 10.0.44 (bsc#1171550)

- CVE-2020-2752: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.
- CVE-2020-2812: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-16"/>
	<updated date="2020-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171550">SUSE bug 1171550</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2752/">CVE-2020-2752 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2752">CVE-2020-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2812/">CVE-2020-2812 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2812">CVE-2020-2812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557472" comment="libmysqlclient18-10.0.40.4-29.41.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148267" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1157888" ref_url="https://bugzilla.suse.com/1157888" source="BUGZILLA"/>
		<reference ref_id="1158003" ref_url="https://bugzilla.suse.com/1158003" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1158007" ref_url="https://bugzilla.suse.com/1158007" source="BUGZILLA"/>
		<reference ref_id="1161181" ref_url="https://bugzilla.suse.com/1161181" source="BUGZILLA"/>
		<reference ref_id="1167152" ref_url="https://bugzilla.suse.com/1167152" source="BUGZILLA"/>
		<reference ref_id="1168140" ref_url="https://bugzilla.suse.com/1168140" source="BUGZILLA"/>
		<reference ref_id="1168142" ref_url="https://bugzilla.suse.com/1168142" source="BUGZILLA"/>
		<reference ref_id="1169392" ref_url="https://bugzilla.suse.com/1169392" source="BUGZILLA"/>
		<reference ref_id="1172205" ref_url="https://bugzilla.suse.com/1172205" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19581" ref_url="https://www.suse.com/security/cve/CVE-2019-19581/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-11739" ref_url="https://www.suse.com/security/cve/CVE-2020-11739/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742/" source="CVE"/>
		<reference ref_id="CVE-2020-7211" ref_url="https://www.suse.com/security/cve/CVE-2020-7211/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
  This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1172205).
- CVE-2020-11742: Bad continuation handling in GNTTABOP_copy (bsc#1169392).
- CVE-2020-11740, CVE-2020-11741: xen: XSA-313 multiple xenoprof issues (bsc#1168140).
- CVE-2020-11739: Missing memory barriers in read-write unlock paths (bsc#1168142).
- CVE-2019-19583: Fixed improper checks which could have allowed HVM/PVH guest userspace code to crash the guest, leading to a guest denial of service (bsc#1158004 XSA-308).
- CVE-2019-19581: Fixed a potential out of bounds on 32-bit Arm (bsc#1158003 XSA-307).
- CVE-2019-19580: Fixed a privilege escalation where a malicious PV guest administrator could have been able to escalate their privilege to that of the host (bsc#1158006 XSA-310).
- CVE-2019-19579: Fixed a privilege escalation where an untrusted domain with access to a physical device can DMA into host memory (bsc#1157888 XSA-306).
- CVE-2019-19578: Fixed an issue where a malicious or buggy PV guest could have caused hypervisor crash resulting in denial of service affecting the entire host (bsc#1158005 XSA-309).
- CVE-2019-19577: Fixed an issue where a malicious guest administrator could have caused Xen to access data structures while they are being modified leading to a crash (bsc#1158007 XSA-311). 
- Xenstored Crashed during VM install (bsc#1167152)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-16"/>
	<updated date="2020-06-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161181">SUSE bug 1161181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167152">SUSE bug 1167152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168142">SUSE bug 1168142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19577">CVE-2019-19577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19578">CVE-2019-19578 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19579">CVE-2019-19579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19580">CVE-2019-19580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19581/">CVE-2019-19581 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19581">CVE-2019-19581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19583">CVE-2019-19583 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11739/">CVE-2020-11739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11739">CVE-2020-11739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11740">CVE-2020-11740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11741">CVE-2020-11741 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11742">CVE-2020-11742 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7211/">CVE-2020-7211 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7211">CVE-2020-7211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538437" comment="xen-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538438" comment="xen-doc-html-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538439" comment="xen-libs-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538440" comment="xen-libs-32bit-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538441" comment="xen-tools-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538442" comment="xen-tools-domU-4.9.4_06-3.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148268" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1102840" ref_url="https://bugzilla.suse.com/1102840" source="BUGZILLA"/>
		<reference ref_id="1160039" ref_url="https://bugzilla.suse.com/1160039" source="BUGZILLA"/>
		<reference ref_id="1170601" ref_url="https://bugzilla.suse.com/1170601" source="BUGZILLA"/>
		<reference ref_id="1171863" ref_url="https://bugzilla.suse.com/1171863" source="BUGZILLA"/>
		<reference ref_id="1171864" ref_url="https://bugzilla.suse.com/1171864" source="BUGZILLA"/>
		<reference ref_id="1171866" ref_url="https://bugzilla.suse.com/1171866" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543/" source="CVE"/>
		<reference ref_id="CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878/" source="CVE"/>
		<reference ref_id="CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006972.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

- CVE-2020-10543: Fixed a heap buffer overflow in regular expression compiler which could have 
  allowed overwriting of allocated memory with attacker's data (bsc#1171863).
- CVE-2020-10878: Fixed multiple integer overflows which could have allowed the insertion of 
  instructions into the compiled form of Perl regular expression (bsc#1171864).
- CVE-2020-12723: Fixed an attacker's corruption of the intermediate language state of a 
  compiled regular expression (bsc#1171866).
- Fixed utf8 handling in perldoc by useing 'term' instead of 'man' (bsc#1170601).
- Some packages make assumptions about the date and time they are built. 
  This update will solve the issues caused by calling the perl function timelocal
  expressing the year with two digit only instead of four digits. (bsc#1102840) (bsc#1160039)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-18"/>
	<updated date="2020-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102840">SUSE bug 1102840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160039">SUSE bug 1160039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170601">SUSE bug 1170601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171863">SUSE bug 1171863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171864">SUSE bug 1171864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171866">SUSE bug 1171866</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10543">CVE-2020-10543 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10878">CVE-2020-10878 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12723">CVE-2020-12723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531034" comment="perl-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531035" comment="perl-32bit-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531036" comment="perl-base-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531037" comment="perl-doc-5.18.2-12.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148269" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 65 (bsc#1172277 and bsc#1169511)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531038" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531040" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531041" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148270" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

java-1_8_0-ibm was updated to Java 8.0 Service Refresh 6 Fix Pack 10 (bsc#1172277,bsc#1169511,bsc#1160968)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2754: Forwarded references to Nashorn 
- CVE-2020-2755: Improved Nashorn matching 
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
- CVE-2019-2949: Fixed an issue which could have resulted in unauthorized access to critical data 
- Added RSA PSS SUPPORT TO IBMPKCS11IMPL
- The pack200 and unpack200 alternatives should be slaves of java (bsc#1171352).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2949">CVE-2019-2949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2754">CVE-2020-2754 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2755">CVE-2020-2755 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531043" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531045" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148271" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1160398" ref_url="https://bugzilla.suse.com/1160398" source="BUGZILLA"/>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version jdk8u252 fixes the following issues:

- CVE-2020-2754: Forward references to Nashorn (bsc#1169511)
- CVE-2020-2755: Improve Nashorn matching (bsc#1169511)
- CVE-2020-2756: Better mapping of serial ENUMs (bsc#1169511)
- CVE-2020-2757: Less Blocking Array Queues (bsc#1169511)
- CVE-2020-2773: Better signatures in XML (bsc#1169511)
- CVE-2020-2781: Improve TLS session handling (bsc#1169511)
- CVE-2020-2800: Better Headings for HTTP Servers (bsc#1169511)
- CVE-2020-2803: Enhance buffering of byte buffers (bsc#1169511)
- CVE-2020-2805: Enhance typing of methods (bsc#1169511)
- CVE-2020-2830: Better Scanner conversions (bsc#1169511)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160398">SUSE bug 1160398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2754">CVE-2020-2754 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2755">CVE-2020-2755 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2773">CVE-2020-2773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531047" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531048" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531049" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531050" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148272" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1172049" ref_url="https://bugzilla.suse.com/1172049" source="BUGZILLA"/>
		<reference ref_id="1172781" ref_url="https://bugzilla.suse.com/1172781" source="BUGZILLA"/>
		<reference ref_id="1172782" ref_url="https://bugzilla.suse.com/1172782" source="BUGZILLA"/>
		<reference ref_id="1172783" ref_url="https://bugzilla.suse.com/1172783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766/" source="CVE"/>
		<reference ref_id="CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767/" source="CVE"/>
		<reference ref_id="CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007008.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-10768: Fixed an issue with the prctl() function which could have allowed indirect branch speculation even after it has been disabled (bsc#1172783).
- CVE-2020-10767: Fixed an issue where the Indirect Branch Prediction Barrier (IBPB) would have been disabled when STIBP is unavailable or enhanced IBRS is available making the system vulnerable to spectre v2 (bsc#1172782).
- CVE-2020-10766: Fixed an issue with Linux scheduler which could have allowed an attacker to turn off the SSBD protection (bsc#1172781).

- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1172049).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-23"/>
	<updated date="2020-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172049">SUSE bug 1172049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10766">CVE-2020-10766 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10767">CVE-2020-10767 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10768">CVE-2020-10768 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555722" comment="kernel-default-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555723" comment="kernel-default-base-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555724" comment="kernel-default-devel-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556303" comment="kernel-default-kgraft-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538447" comment="kernel-devel-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538448" comment="kernel-macros-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538449" comment="kernel-source-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555725" comment="kernel-syms-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556305" comment="kgraft-patch-4_4_180-94_124-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148273" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1173027" ref_url="https://bugzilla.suse.com/1173027" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007017.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious server to overwrite a local file when using the -J option (bsc#1173027).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-24"/>
	<updated date="2020-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8177">CVE-2020-8177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531051" comment="curl-7.37.0-37.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531052" comment="libcurl4-7.37.0-37.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531053" comment="libcurl4-32bit-7.37.0-37.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148274" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1126230" ref_url="https://bugzilla.suse.com/1126230" source="BUGZILLA"/>
		<reference ref_id="1136082" ref_url="https://bugzilla.suse.com/1136082" source="BUGZILLA"/>
		<reference ref_id="1157607" ref_url="https://bugzilla.suse.com/1157607" source="BUGZILLA"/>
		<reference ref_id="1161096" ref_url="https://bugzilla.suse.com/1161096" source="BUGZILLA"/>
		<reference ref_id="1162553" ref_url="https://bugzilla.suse.com/1162553" source="BUGZILLA"/>
		<reference ref_id="1171670" ref_url="https://bugzilla.suse.com/1171670" source="BUGZILLA"/>
		<reference ref_id="1171921" ref_url="https://bugzilla.suse.com/1171921" source="BUGZILLA"/>
		<reference ref_id="1171960" ref_url="https://bugzilla.suse.com/1171960" source="BUGZILLA"/>
		<reference ref_id="1171961" ref_url="https://bugzilla.suse.com/1171961" source="BUGZILLA"/>
		<reference ref_id="1171963" ref_url="https://bugzilla.suse.com/1171963" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10753" ref_url="https://www.suse.com/security/cve/CVE-2020-10753/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007029.html" source="SUSE-SU"/>
		<description>
This is a version update for ceph to version 12.2.13:

Security issue fixed: 	  

- CVE-2020-10753: Fixed an HTTP header injection via CORS ExposeHeader tag (bsc#1171921).

- Notable changes in this update for ceph:
  * mgr: telemetry: backported and now available on SES5.5. Please
    consider enabling via 'ceph telemetry on' (bsc#1171670)
  * OSD heartbeat ping time: new health warning, options and admin
    commands (bsc#1171960)
  * 'osd_calc_pg_upmaps_max_stddev' ceph.conf parameter has been
    removed; use 'upmap_max_deviation' instead (bsc#1171961)
  * Default maximum concurrent bluestore rocksdb compaction threads
    raised from 1 to 2 for improved ability to keep up with rgw
    bucket index workloads (bsc#1171963)

- Bug fixes in this ceph update:
  * mon: Error message displayed when mon_osd_max_split_count would be
    exceeded is not as user-friendly as it could be (bsc#1126230)
  * ceph_volume_client: remove ceph mds calls in favor of ceph fs
    calls (bsc#1136082)
  * rgw: crypt: permit RGW-AUTO/default with SSE-S3 headers
    (bsc#1157607)
  * mon/AuthMonitor: don't validate fs caps on authorize (bsc#1161096)

- Additional bug fixes:
  * ceph-volume: strip _dmcrypt suffix in simple scan json output (bsc#1162553)		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-25"/>
	<updated date="2020-06-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1126230">SUSE bug 1126230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136082">SUSE bug 1136082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157607">SUSE bug 1157607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161096">SUSE bug 1161096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162553">SUSE bug 1162553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171670">SUSE bug 1171670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171921">SUSE bug 1171921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171960">SUSE bug 1171960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171961">SUSE bug 1171961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171963">SUSE bug 1171963</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10753/">CVE-2020-10753 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10753">CVE-2020-10753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555726" comment="ceph-common-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555727" comment="libcephfs2-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555728" comment="librados2-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555729" comment="libradosstriper1-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555730" comment="librbd1-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555731" comment="librgw2-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555732" comment="python-cephfs-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555733" comment="python-rados-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555734" comment="python-rbd-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555735" comment="python-rgw-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148275" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1172405" ref_url="https://bugzilla.suse.com/1172405" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8022" ref_url="https://www.suse.com/security/cve/CVE-2020-8022/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007047.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-8022: Fixed a local root exploit due to improper permissions (bsc#1172405)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172405">SUSE bug 1172405</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8022/">CVE-2020-8022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8022">CVE-2020-8022 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531054" comment="tomcat-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531055" comment="tomcat-admin-webapps-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531056" comment="tomcat-docs-webapp-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531057" comment="tomcat-el-3_0-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531058" comment="tomcat-javadoc-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531059" comment="tomcat-jsp-2_3-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531060" comment="tomcat-lib-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531061" comment="tomcat-servlet-3_1-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531062" comment="tomcat-webapps-8.0.53-29.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148276" version="1" class="patch">
	<metadata>
		<title>Security update for python3-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1054413" ref_url="https://bugzilla.suse.com/1054413" source="BUGZILLA"/>
		<reference ref_id="1073879" ref_url="https://bugzilla.suse.com/1073879" source="BUGZILLA"/>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="1122668" ref_url="https://bugzilla.suse.com/1122668" source="BUGZILLA"/>
		<reference ref_id="761500" ref_url="https://bugzilla.suse.com/761500" source="BUGZILLA"/>
		<reference ref_id="922448" ref_url="https://bugzilla.suse.com/922448" source="BUGZILLA"/>
		<reference ref_id="929736" ref_url="https://bugzilla.suse.com/929736" source="BUGZILLA"/>
		<reference ref_id="935252" ref_url="https://bugzilla.suse.com/935252" source="BUGZILLA"/>
		<reference ref_id="945455" ref_url="https://bugzilla.suse.com/945455" source="BUGZILLA"/>
		<reference ref_id="947357" ref_url="https://bugzilla.suse.com/947357" source="BUGZILLA"/>
		<reference ref_id="961596" ref_url="https://bugzilla.suse.com/961596" source="BUGZILLA"/>
		<reference ref_id="967128" ref_url="https://bugzilla.suse.com/967128" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007049.html" source="SUSE-SU"/>
		<description>
This update for python3-requests provides the following fix:

python-requests was updated to 2.20.1.

Update to version 2.20.1:

* Fixed bug with unintended Authorization header stripping for
  redirects using default ports (http/80, https/443).

Update to version 2.20.0:

* Bugfixes

  + Content-Type header parsing is now case-insensitive
    (e.g. charset=utf8 v Charset=utf8).
  + Fixed exception leak where certain redirect urls would raise
    uncaught urllib3 exceptions.
  + Requests removes Authorization header from requests redirected
    from https to http on the same hostname. (CVE-2018-18074)
  + should_bypass_proxies now handles URIs without hostnames
    (e.g. files).

Update to version 2.19.1:

* Fixed issue where status_codes.py’s init function failed trying
  to append to a __doc__ value of None.

Update to version 2.19.0:

* Improvements

  + Warn about possible slowdown with cryptography version &lt; 1.3.4
  + Check host in proxy URL, before forwarding request to adapter.
  + Maintain fragments properly across redirects. (RFC7231 7.1.2)
  + Removed use of cgi module to expedite library load time.
  + Added support for SHA-256 and SHA-512 digest auth algorithms.
  + Minor performance improvement to Request.content.

* Bugfixes

  + Parsing empty Link headers with parse_header_links() no longer
    return one bogus entry.
  + Fixed issue where loading the default certificate bundle from
    a zip archive would raise an IOError.
  + Fixed issue with unexpected ImportError on windows system
    which do not support winreg module.
  + DNS resolution in proxy bypass no longer includes the username
    and password in the request. This also fixes the issue of DNS
    queries failing on macOS.
  + Properly normalize adapter prefixes for url comparison.
  + Passing None as a file pointer to the files param no longer
    raises an exception.
  + Calling copy on a RequestsCookieJar will now preserve the
    cookie policy correctly.

Update to version 2.18.4:

* Improvements

  + Error messages for invalid headers now include the header name
    for easier debugging

Update to version 2.18.3:

* Improvements
  + Running $ python -m requests.help now includes the installed
    version of idna.
* Bugfixes
  + Fixed issue where Requests would raise ConnectionError instead
    of SSLError when encountering SSL problems when using urllib3
    v1.22.

- Add ca-certificates (and ca-certificates-mozilla) to dependencies, otherwise https
  connections will fail.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054413">SUSE bug 1054413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073879">SUSE bug 1073879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122668">SUSE bug 1122668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761500">SUSE bug 761500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922448">SUSE bug 922448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929736">SUSE bug 929736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935252">SUSE bug 935252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945455">SUSE bug 945455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947357">SUSE bug 947357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961596">SUSE bug 961596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967128">SUSE bug 967128</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2296">CVE-2015-2296 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009525269" comment="python3-certifi-2018.4.16-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525270" comment="python3-chardet-3.0.4-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531063" comment="python3-requests-2.20.1-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525271" comment="python3-urllib3-1.22-3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148277" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1172906" ref_url="https://bugzilla.suse.com/1172906" source="BUGZILLA"/>
		<reference ref_id="1172935" ref_url="https://bugzilla.suse.com/1172935" source="BUGZILLA"/>
		<reference ref_id="1173197" ref_url="https://bugzilla.suse.com/1173197" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093/" source="CVE"/>
		<reference ref_id="CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154/" source="CVE"/>
		<reference ref_id="CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007050.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-14954: Fixed a response injection due to a STARTTLS buffering issue which was
  affecting IMAP, SMTP, and POP3 (bsc#1173197).
- CVE-2020-14093: Fixed a potential IMAP Man-in-the-Middle attack via a PREAUTH response (bsc#1172906, bsc#1172935).
- CVE-2020-14154: Fixed an issue where Mutt was ignoring an expired certificate and was
  proceeding with a connection (bsc#1172906, bsc#1172935).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-29"/>
	<updated date="2020-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173197">SUSE bug 1173197</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14093">CVE-2020-14093 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14154">CVE-2020-14154 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14954">CVE-2020-14954 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531064" comment="mutt-1.10.1-55.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148278" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1167373" ref_url="https://bugzilla.suse.com/1167373" source="BUGZILLA"/>
		<reference ref_id="1173304" ref_url="https://bugzilla.suse.com/1173304" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860/" source="CVE"/>
		<reference ref_id="CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007055.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-14059: Fixed an issue where a client could potentially deny the service of a server 
  during TLS Handshake (bsc#1173304).
- CVE-2019-18860: Fixed handling of invalid domain names in cachemgr.cgi (bsc#1167373).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167373">SUSE bug 1167373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173304">SUSE bug 1173304</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18860">CVE-2019-18860 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14059">CVE-2020-14059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531065" comment="squid-3.5.21-26.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148279" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1169740" ref_url="https://bugzilla.suse.com/1169740" source="BUGZILLA"/>
		<reference ref_id="1171355" ref_url="https://bugzilla.suse.com/1171355" source="BUGZILLA"/>
		<reference ref_id="1172651" ref_url="https://bugzilla.suse.com/1172651" source="BUGZILLA"/>
		<reference ref_id="1173334" ref_url="https://bugzilla.suse.com/1173334" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8956" ref_url="https://www.suse.com/security/cve/CVE-2018-8956/" source="CVE"/>
		<reference ref_id="CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868/" source="CVE"/>
		<reference ref_id="CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817/" source="CVE"/>
		<reference ref_id="CVE-2020-15025" ref_url="https://www.suse.com/security/cve/CVE-2020-15025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007056.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

ntp was updated to 4.2.8p15

- CVE-2020-11868: Fixed an issue which a server mode packet with spoofed source address 
  frequently send to the client ntpd could have caused denial of service (bsc#1169740).
- CVE-2018-8956: Fixed an issue which could have allowed remote attackers to prevent 
  a broadcast client from synchronizing its clock with a broadcast NTP server via spoofed 
  mode 3 and mode 5 packets (bsc#1171355).
- CVE-2020-13817: Fixed an issue which an off-path attacker with the ability to query time 
  from victim's ntpd instance could have modified the victim's clock by a limited amount (bsc#1172651).
- CVE-2020-15025: Fixed an issue which remote attacker could have caused denial of service by consuming 
  the memory when a CMAC key was used andassociated with a CMAC algorithm in the ntp.keys (bsc#1173334).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169740">SUSE bug 1169740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171355">SUSE bug 1171355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172651">SUSE bug 1172651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173334">SUSE bug 1173334</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8956/">CVE-2018-8956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8956">CVE-2018-8956 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11868">CVE-2020-11868 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13817">CVE-2020-13817 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15025/">CVE-2020-15025 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15025">CVE-2020-15025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531066" comment="ntp-4.2.8p15-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531067" comment="ntp-doc-4.2.8p15-88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148280" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="1168669" ref_url="https://bugzilla.suse.com/1168669" source="BUGZILLA"/>
		<reference ref_id="1169746" ref_url="https://bugzilla.suse.com/1169746" source="BUGZILLA"/>
		<reference ref_id="1170908" ref_url="https://bugzilla.suse.com/1170908" source="BUGZILLA"/>
		<reference ref_id="1171978" ref_url="https://bugzilla.suse.com/1171978" source="BUGZILLA"/>
		<reference ref_id="1173022" ref_url="https://bugzilla.suse.com/1173022" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007069.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to version 3.53.1

- CVE-2020-12402: Fixed a potential side channel attack during RSA key generation (bsc#1173032).
- CVE-2020-12399: Fixed a timing attack on DSA signature generation (bsc#1171978).
- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- Fixed various FIPS issues in libfreebl3 which were causing segfaults in the test suite of chrony (bsc#1168669).
- Fixed an issue where Firefox tab was crashing (bsc#1170908).

Release notes: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes

mozilla-nspr to version 4.25
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-03"/>
	<updated date="2020-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168669">SUSE bug 1168669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169746">SUSE bug 1169746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170908">SUSE bug 1170908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171978">SUSE bug 1171978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173022">SUSE bug 1173022</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17006">CVE-2019-17006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12399">CVE-2020-12399 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531068" comment="libfreebl3-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531069" comment="libfreebl3-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531070" comment="libfreebl3-hmac-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531071" comment="libfreebl3-hmac-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531072" comment="libsoftokn3-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531073" comment="libsoftokn3-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531074" comment="libsoftokn3-hmac-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531075" comment="libsoftokn3-hmac-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531076" comment="mozilla-nspr-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531077" comment="mozilla-nspr-32bit-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597238" comment="mozilla-nspr-devel-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531078" comment="mozilla-nss-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531079" comment="mozilla-nss-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531080" comment="mozilla-nss-certs-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531081" comment="mozilla-nss-certs-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597239" comment="mozilla-nss-devel-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531082" comment="mozilla-nss-sysinit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531083" comment="mozilla-nss-sysinit-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531084" comment="mozilla-nss-tools-3.53.1-58.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148281" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1170715" ref_url="https://bugzilla.suse.com/1170715" source="BUGZILLA"/>
		<reference ref_id="1172698" ref_url="https://bugzilla.suse.com/1172698" source="BUGZILLA"/>
		<reference ref_id="1172704" ref_url="https://bugzilla.suse.com/1172704" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007077.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8023: Fixed a potential local privilege escalation from ldap to root when OPENLDAP_CONFIG_BACKEND='ldap' was used (bsc#1172698).	  
- Changed DB_CONFIG to root:ldap permissions (bsc#1172704).	 
- Fixed an issue where slapd becomes unresponsive after many failed login/bind attempts(bsc#1170715).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170715">SUSE bug 1170715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172704">SUSE bug 1172704</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8023">CVE-2020-8023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531085" comment="libldap-2_4-2-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531086" comment="libldap-2_4-2-32bit-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531087" comment="openldap2-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531088" comment="openldap2-back-meta-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531089" comment="openldap2-client-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531090" comment="openldap2-doc-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531091" comment="openldap2-ppolicy-check-password-1.2-18.71.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148282" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1173377" ref_url="https://bugzilla.suse.com/1173377" source="BUGZILLA"/>
		<reference ref_id="1173378" ref_url="https://bugzilla.suse.com/1173378" source="BUGZILLA"/>
		<reference ref_id="1173380" ref_url="https://bugzilla.suse.com/1173380" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15563" ref_url="https://www.suse.com/security/cve/CVE-2020-15563/" source="CVE"/>
		<reference ref_id="CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565/" source="CVE"/>
		<reference ref_id="CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007116.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).
- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).
- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-10"/>
	<updated date="2020-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173377">SUSE bug 1173377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173378">SUSE bug 1173378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173380">SUSE bug 1173380</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15563/">CVE-2020-15563 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15563">CVE-2020-15563 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15565">CVE-2020-15565 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15567">CVE-2020-15567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538473" comment="xen-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538474" comment="xen-doc-html-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538475" comment="xen-libs-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538476" comment="xen-libs-32bit-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538477" comment="xen-tools-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538478" comment="xen-tools-domU-4.9.4_08-3.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148283" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1167231" ref_url="https://bugzilla.suse.com/1167231" source="BUGZILLA"/>
		<reference ref_id="1173576" ref_url="https://bugzilla.suse.com/1173576" source="BUGZILLA"/>
		<reference ref_id="1173613" ref_url="https://bugzilla.suse.com/1173613" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415/" source="CVE"/>
		<reference ref_id="CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426/" source="CVE"/>
		<reference ref_id="CVE-2020-6813" ref_url="https://www.suse.com/security/cve/CVE-2020-6813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 78.0.1 ESR fixes the following issues:

Security issues fixed:

- CVE-2020-12415: AppCache manifest poisoning due to url encoded character processing (bsc#1173576).
- CVE-2020-12416: Use-after-free in WebRTC VideoBroadcaster (bsc#1173576).
- CVE-2020-12417: Memory corruption due to missing sign-extension for ValueTags on ARM64 (bsc#1173576).
- CVE-2020-12418: Information disclosure due to manipulated URL object (bsc#1173576).
- CVE-2020-12419: Use-after-free in nsGlobalWindowInner (bsc#1173576).
- CVE-2020-12420: Use-After-Free when trying to connect to a STUN server (bsc#1173576).
- CVE-2020-12402: RSA Key Generation vulnerable to side-channel attack (bsc#1173576).
- CVE-2020-12421: Add-On updates did not respect the same certificate trust rules as software updates (bsc#1173576).
- CVE-2020-12422: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (bsc#1173576).
- CVE-2020-12423: DLL Hijacking due to searching %PATH% for a library (bsc#1173576).
- CVE-2020-12424: WebRTC permission prompt could have been bypassed by a compromised content process (bsc#1173576).
- CVE-2020-12425: Out of bound read in Date.parse() (bsc#1173576).
- CVE-2020-12426: Memory safety bugs fixed in Firefox 78 (bsc#1173576).
- FIPS: MozillaFirefox: allow /proc/sys/crypto/fips_enabled (bsc#1167231).

Non-security issues fixed:

- Fixed interaction with freetype6 (bsc#1173613).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-13"/>
	<updated date="2020-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167231">SUSE bug 1167231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173613">SUSE bug 1173613</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12415">CVE-2020-12415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12416">CVE-2020-12416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12417">CVE-2020-12417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12418">CVE-2020-12418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12419">CVE-2020-12419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12420">CVE-2020-12420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12421">CVE-2020-12421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12422">CVE-2020-12422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12423">CVE-2020-12423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12424">CVE-2020-12424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12425">CVE-2020-12425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12426">CVE-2020-12426 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6813/">CVE-2020-6813 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6813">CVE-2020-6813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531092" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531093" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531094" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531095" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148284" version="1" class="patch">
	<metadata>
		<title>Security update for ansible, ansible1, ardana-ansible, ardana-cluster, ardana-freezer, ardana-input-model, ardana-logging, ardana-mq, ardana-neutron, ardana-octavia, ardana-osconfig, caasp-openstack-heat-templates, crowbar-core, crowbar-openstack, documentation-suse-openstack-cloud, grafana, kibana, openstack-dashboard, openstack-dashboard-theme-HPE, openstack-heat-templates, openstack-keystone, openstack-monasca-agent, openstack-monasca-installer, openstack-neutron, openstack-octavia-amphora-image, python-Django, python-Flask, python-GitPython, python-Pillow, python-amqp, python-apicapi, python-keystoneauth1, python-oslo.messaging, python-psutil, python-pyroute2, python-pysaml2, python-tooz, python-waitress, storm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1068612" ref_url="https://bugzilla.suse.com/1068612" source="BUGZILLA"/>
		<reference ref_id="1092420" ref_url="https://bugzilla.suse.com/1092420" source="BUGZILLA"/>
		<reference ref_id="1107190" ref_url="https://bugzilla.suse.com/1107190" source="BUGZILLA"/>
		<reference ref_id="1108719" ref_url="https://bugzilla.suse.com/1108719" source="BUGZILLA"/>
		<reference ref_id="1123872" ref_url="https://bugzilla.suse.com/1123872" source="BUGZILLA"/>
		<reference ref_id="1126503" ref_url="https://bugzilla.suse.com/1126503" source="BUGZILLA"/>
		<reference ref_id="1141968" ref_url="https://bugzilla.suse.com/1141968" source="BUGZILLA"/>
		<reference ref_id="11483483" ref_url="https://bugzilla.suse.com/11483483" source="BUGZILLA"/>
		<reference ref_id="1148383" ref_url="https://bugzilla.suse.com/1148383" source="BUGZILLA"/>
		<reference ref_id="1153191" ref_url="https://bugzilla.suse.com/1153191" source="BUGZILLA"/>
		<reference ref_id="1156525" ref_url="https://bugzilla.suse.com/1156525" source="BUGZILLA"/>
		<reference ref_id="1159046" ref_url="https://bugzilla.suse.com/1159046" source="BUGZILLA"/>
		<reference ref_id="1160152" ref_url="https://bugzilla.suse.com/1160152" source="BUGZILLA"/>
		<reference ref_id="1160153" ref_url="https://bugzilla.suse.com/1160153" source="BUGZILLA"/>
		<reference ref_id="1160192" ref_url="https://bugzilla.suse.com/1160192" source="BUGZILLA"/>
		<reference ref_id="1160790" ref_url="https://bugzilla.suse.com/1160790" source="BUGZILLA"/>
		<reference ref_id="1160851" ref_url="https://bugzilla.suse.com/1160851" source="BUGZILLA"/>
		<reference ref_id="1161088" ref_url="https://bugzilla.suse.com/1161088" source="BUGZILLA"/>
		<reference ref_id="1161089" ref_url="https://bugzilla.suse.com/1161089" source="BUGZILLA"/>
		<reference ref_id="1161670" ref_url="https://bugzilla.suse.com/1161670" source="BUGZILLA"/>
		<reference ref_id="1164322" ref_url="https://bugzilla.suse.com/1164322" source="BUGZILLA"/>
		<reference ref_id="1167244" ref_url="https://bugzilla.suse.com/1167244" source="BUGZILLA"/>
		<reference ref_id="1168593" ref_url="https://bugzilla.suse.com/1168593" source="BUGZILLA"/>
		<reference ref_id="1169770" ref_url="https://bugzilla.suse.com/1169770" source="BUGZILLA"/>
		<reference ref_id="1170657" ref_url="https://bugzilla.suse.com/1170657" source="BUGZILLA"/>
		<reference ref_id="1171273" ref_url="https://bugzilla.suse.com/1171273" source="BUGZILLA"/>
		<reference ref_id="1171560" ref_url="https://bugzilla.suse.com/1171560" source="BUGZILLA"/>
		<reference ref_id="1171594" ref_url="https://bugzilla.suse.com/1171594" source="BUGZILLA"/>
		<reference ref_id="1171661" ref_url="https://bugzilla.suse.com/1171661" source="BUGZILLA"/>
		<reference ref_id="1171909" ref_url="https://bugzilla.suse.com/1171909" source="BUGZILLA"/>
		<reference ref_id="1172166" ref_url="https://bugzilla.suse.com/1172166" source="BUGZILLA"/>
		<reference ref_id="1172167" ref_url="https://bugzilla.suse.com/1172167" source="BUGZILLA"/>
		<reference ref_id="1172175" ref_url="https://bugzilla.suse.com/1172175" source="BUGZILLA"/>
		<reference ref_id="1172176" ref_url="https://bugzilla.suse.com/1172176" source="BUGZILLA"/>
		<reference ref_id="1172409" ref_url="https://bugzilla.suse.com/1172409" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000246" ref_url="https://www.suse.com/security/cve/CVE-2017-1000246/" source="CVE"/>
		<reference ref_id="CVE-2019-1010083" ref_url="https://www.suse.com/security/cve/CVE-2019-1010083/" source="CVE"/>
		<reference ref_id="CVE-2019-15043" ref_url="https://www.suse.com/security/cve/CVE-2019-15043/" source="CVE"/>
		<reference ref_id="CVE-2019-16785" ref_url="https://www.suse.com/security/cve/CVE-2019-16785/" source="CVE"/>
		<reference ref_id="CVE-2019-16786" ref_url="https://www.suse.com/security/cve/CVE-2019-16786/" source="CVE"/>
		<reference ref_id="CVE-2019-16789" ref_url="https://www.suse.com/security/cve/CVE-2019-16789/" source="CVE"/>
		<reference ref_id="CVE-2019-16792" ref_url="https://www.suse.com/security/cve/CVE-2019-16792/" source="CVE"/>
		<reference ref_id="CVE-2019-16865" ref_url="https://www.suse.com/security/cve/CVE-2019-16865/" source="CVE"/>
		<reference ref_id="CVE-2019-18874" ref_url="https://www.suse.com/security/cve/CVE-2019-18874/" source="CVE"/>
		<reference ref_id="CVE-2019-19911" ref_url="https://www.suse.com/security/cve/CVE-2019-19911/" source="CVE"/>
		<reference ref_id="CVE-2019-3828" ref_url="https://www.suse.com/security/cve/CVE-2019-3828/" source="CVE"/>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<reference ref_id="CVE-2020-10743" ref_url="https://www.suse.com/security/cve/CVE-2020-10743/" source="CVE"/>
		<reference ref_id="CVE-2020-11076" ref_url="https://www.suse.com/security/cve/CVE-2020-11076/" source="CVE"/>
		<reference ref_id="CVE-2020-11077" ref_url="https://www.suse.com/security/cve/CVE-2020-11077/" source="CVE"/>
		<reference ref_id="CVE-2020-12052" ref_url="https://www.suse.com/security/cve/CVE-2020-12052/" source="CVE"/>
		<reference ref_id="CVE-2020-13254" ref_url="https://www.suse.com/security/cve/CVE-2020-13254/" source="CVE"/>
		<reference ref_id="CVE-2020-13379" ref_url="https://www.suse.com/security/cve/CVE-2020-13379/" source="CVE"/>
		<reference ref_id="CVE-2020-13596" ref_url="https://www.suse.com/security/cve/CVE-2020-13596/" source="CVE"/>
		<reference ref_id="CVE-2020-5312" ref_url="https://www.suse.com/security/cve/CVE-2020-5312/" source="CVE"/>
		<reference ref_id="CVE-2020-5313" ref_url="https://www.suse.com/security/cve/CVE-2020-5313/" source="CVE"/>
		<reference ref_id="CVE-2020-5390" ref_url="https://www.suse.com/security/cve/CVE-2020-5390/" source="CVE"/>
		<reference ref_id="CVE-2020-8151" ref_url="https://www.suse.com/security/cve/CVE-2020-8151/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<description>
This update for ansible, ansible1, ardana-ansible, ardana-cluster, ardana-freezer, ardana-input-model, ardana-logging, ardana-mq, ardana-neutron, ardana-octavia, ardana-osconfig, caasp-openstack-heat-templates, crowbar-core, crowbar-openstack, documentation-suse-openstack-cloud, grafana, kibana, openstack-dashboard, openstack-dashboard-theme-HPE, openstack-heat-templates, openstack-keystone, openstack-monasca-agent, openstack-monasca-installer, openstack-neutron, openstack-octavia-amphora-image, python-Django, python-Flask, python-GitPython, python-Pillow, python-amqp, python-apicapi, python-keystoneauth1, python-oslo.messaging, python-psutil, python-pyroute2, python-pysaml2, python-tooz, python-waitress, storm contains the following fixes:

The update fixes several security issues:

ansible
- CVE-2019-3828: Fixed a path traversal in the fetch module (bsc#1126503).

grafana
- CVE-2020-13379: Fixed an incorrect access control issue which could lead to information
  leaks or denial of service (bsc#1172409).
- CVE-2020-12052: Fixed an cross site scripting vulnerability related to the annotation
  popup (bsc#1170657).

kibana
- CVE-2020-10743: Fixed a clickjacking vulnerability (bsc#1171909).

python-Django
- CVE-2020-13254: Fixed a data leakage via malformed memcached keys. (bsc#1172167)
- CVE-2020-13596: Fixed a cross site scripting vulnerability related to the admin
  parameters of the ForeignKeyRawIdWidget. (bsc#1172166)

python-Flask
- CVE-2019-1010083: Fixed a denial of service via crafted encoded JSON. (bsc#1141968)


python-Pillow
- CVE-2019-16865: Fixed a denial of service with specially crafted
image files. (bsc#1153191)
- CVE-2020-5312: Fixed a buffer overflow in the PCX P mode. (bsc#1160152)
- CVE-2020-5313: Fixed a buffer overflow related to FLI. (bsc#1160153)
- CVE-2019-19911: Fixed a denial of service in FpxImagePlugin.py. (bsc#1160192)

python-psutil
- CVE-2019-18874: Fixed a double free caused by refcount mishandling. (bsc#1156525)

python-pysaml2
- CVE-2020-5390: Fixed an issue with the verification of signatures in SAML documents.
  (bsc#1160851)
- CVE-2017-1000246: Fixed an issue with  weak encryption data, caused by initialization
  vector reuse. (bsc#1068612)

python-waitress (to version 1.4.3)
- CVE-2019-16785: Fixed HTTP request smuggling through LF vs CRLF handling. (bsc#1161088)
- CVE-2019-16786: Fixed HTTP request smuggling through invalid Transfer-Encoding.
  (bsc#1161089)
- CVE-2019-16789: Fixed HTTP Request Smuggling through Invalid whitespace characters.
  (bsc#1160790)
- CVE-2019-16792: Fixed HTTP Request Smuggling through Content-Length header handling.
  (bsc#1161670)

rubygem-activeresource
- CVE-2020-8151: Fixed information disclosure issue via specially crafted requests.
  (bsc#1171560)

rubygem-json-1_7
- CVE-2020-10663: Fixed an unsafe object creation vulnerability. (bsc#1167244)

rubygem-puma
- CVE-2020-11077: Fixed a HTTP smuggling issue related to proxy usage. (bsc#1172175)
- CVE-2020-11076: Fixed a HTTP smuggling issue when using an invalid transfer-encoding
  header. (bsc#1172176)



Other non-security fixes in in the update below:

Changes in ansible:
- Add 0001-Disallow-use-of-remote-home-directories-containing-..patch
  (bsc#1126503, CVE-2019-3828)

Changes in ansible1:
- Add 0001-Disallow-use-of-remote-home-directories-containing-..patch
  (bsc#1126503, CVE-2019-3828)

Changes in ardana-ansible:
- Update to version 8.0+git.1589740980.6c3bcdc:
  * Reconfigure rabbitmq user permissions on update (SOC-11082)

- Update to version 8.0+git.1588953487.9bfd5cb:
  * Fix incorrect prefix used to collect supportconfig files (bsc#1171273)

- Update to version 8.0+git.1585690828.81d8f45:
  * Cleanup keystone-ansible (bsc#1108719)

Changes in ardana-cluster:
- Update to version 8.0+git.1585685203.3e71e49:
  * Use bool filter to ensure valid boolean evaluation (SOC-11192)

Changes in ardana-freezer:
- Update to version 8.0+git.1586539529.b7d295f:
  * Recovering Cloud8 using Freezer or SSH backups if upgrade fails (SOC-10137)

Changes in ardana-input-model:
- Update to version 8.0+git.1589740934.0e0ad61:
  * Add default rabbitmq exchange write permissions (SOC-11082)

- Update to version 8.0+git.1586174594.2b92ec3:
  * add port neutron security extension to CI models (SOC-11027)

Changes in ardana-logging:
- Update to version 8.0+git.1591194866.b7375d0:
  * kibana: set x-frame-options header (bsc#1171909)

- Update to version 8.0+git.1586179244.ae61f62:
  * Fix YAMLLoadWarning: calling yaml.load() without Loader (bsc#1168593)

Changes in ardana-mq:
- Update to version 8.0+git.1589715269.62ad6df:
  * Don't mirror reply queues (SOC-10317)

- Update to version 8.0+git.1586784724.586343d:
  * Actually fail if sync HA queues retries exceeded (SOC-11083)

Changes in ardana-neutron:
- Update to version 8.0+git.1590756744.ba84abc:
  * Update L3 rootwrap filters (SOC-11306)

- Update to version 8.0+git.1587737509.4e09de3:
  * Add network.target 'After' option (bsc#1169770)

- Update to version 8.0+git.1586546152.e7bc07f:
  * Add neutron-common role dependencies (SOC-10875)

- Update to version 8.0+git.1586543712.62bb5a3:
  * Fix neutron-ovsvapp-agent status (SOC-10637)

- Update to version 8.0+git.1586535447.55769df:
  * Improve neutron service restart limit handling (SOC-8746)

- Update to version 8.0+git.1586519528.a28db53:
  * Correctly setup ardana_notify_... fact (SOC-10902)

Changes in ardana-octavia:
- Update to version 8.0+git.1590100427.cf4cc8f:
  * fix octavia to glance communication over internal endpoint (SOC-11294)

Changes in ardana-osconfig:
- Update to version 8.0+git.1587034587.eac37b8:
  * Include SLE 12 SP3 LTSS repos in list of managed repos (SOC-11223)

Changes in caasp-openstack-heat-templates:
- Switch github URL from git@ to git:// to bypass authentication

Changes in crowbar-core:
- Update to version 5.0+git.1593156248.55bbdb26d:
  * Ignore CVE-8184 (SOC-11299)
  * Ignore latest ruby-related CVEs in the CI (SOC-11299)

- Update to version 5.0+git.1589804984.44a89be24:
  * provisioner: Fix ssh key validation (SOC-11126)
  * assign host to hostless keys (noref)

Changes in crowbar-openstack:
- Update to version 5.0+git.1593085772.64c4ab43c:
  * monasca: Prevent deploying monasca-server to the node in pacemaker cluster (SOC-6354)

- Update to version 5.0+git.1591171674.1f299cd1c:
  * Restore undeprecated nova dhcp_domain option (bsc#1171594)

- Update to version 5.0+git.1591104265.683d76534:
  * [5.0] Fix availability zone script (bsc#1171661)

- Update to version 5.0+git.1590398068.f5cfacc12:
  * nova: only create nonexistent cell1

- Update to version 5.0+git.1590150829.e86326d03:
  * [5.0] Tempest: enable test_volume_boot_pattern test (SOC-10874)

- Update to version 5.0+git.1589814633.23fde86ab:
  * rabbitmq: sync startup definitions.json with recipe (SOC-11077,SOC-11274)

- Update to version 5.0+git.1589647291.73c7f1cb6:
  * [5.0] trove: fix rabbitmq connection URL (SOC-11286)

- Update to version 5.0+git.1589214669.8332efff3:
  * Fix monasca libvirt ping checks (bsc#1107190)

- Update to version 5.0+git.1588271874.90adebc7a:
  * run keystone_register on cluster founder only when HA (SOC-11248)
  * nova: run keystone_register on cluster founder only (SOC-11243)

- Update to version 5.0+git.1588059034.3823515b7:
  * tempest: retry openstack commands (SOC-11238)

- Update to version 5.0+git.1587403360.c43cd9905:
  * tempest: disable block migration when using RBD (SOC-11176)

- Update to version 5.0+git.1586293860.901cb0f55:
  * monasca: disable postgres backend monitoring by default (SOC-11190)

- Update to version 5.0+git.1585659861.c29fac257:
  * magnum: Populate SSL configuration (SOC-9849)
  * magnum: Add SSL support (SOC-9849)
  * nova: Populate cinder SES settings early (SOC-11179)

Changes in documentation-suse-openstack-cloud:
- Update to version 8.20200527:
  * Update Travis config: new container name (noref)

- Update to version 8.20200417:
  * Recovering Cloud8 using Freezer or SSH backups if upgrade fails (SOC-10137)

- Update to version 8.20200326:
  * Clarify wipe_disks does not affect non-OS partitions (bsc#1092420)

Changes in grafana:
- Add CVE-2020-13379.patch
  * Security: fix unauthorized avatar proxying (bsc#1172409, CVE-2020-13379)
- Refresh systemd-notification.patch
- Fix declaration for LICENSE

- Add 0002-CVE-2020-12052-bsc1170657-XSS-annotation-popup-vulnerability.patch
  * Security: Fix annotation popup XSS vulnerability
    (bsc#1170657)

- Add CVE-2019-15043.patch (SOC-10357, CVE-2019-15043, bsc#11483483)
Changes in kibana:
- Add 0001-Configurable-custom-response-headers-for-server.patch
  (bsc#1171909, CVE-2020-10743)

Changes in openstack-dashboard:
- Update to version horizon-12.0.5.dev3:
  * Fix typo in publicize\_image policy name

Changes in openstack-dashboard-theme-HPE:
- Switch github URL from git@ to https:// to bypass authentication

Changes in openstack-heat-templates:
- Update to version 0.0.0+git.1582270132.8a20477:
  * Drop use of git.openstack.org
  * Add sample templates for Blazar

Changes in openstack-keystone:
- Update to version keystone-12.0.4.dev11:
  * Fix security issues with EC2 credentials

- Update to version keystone-12.0.4.dev10:
  * Check timestamp of signed EC2 token request
  * Ensure OAuth1 authorized roles are respected

- Update to version keystone-12.0.4.dev6:
  * Remove neutron-grenade job

Changes in openstack-keystone:
- Update to version keystone-12.0.4.dev11:
  * Fix security issues with EC2 credentials

- Update to version keystone-12.0.4.dev10:
  * Check timestamp of signed EC2 token request
  * Ensure OAuth1 authorized roles are respected

- Update to version keystone-12.0.4.dev6:
  * Remove neutron-grenade job

Changes in openstack-monasca-agent:
- update to version 2.2.6~dev4
  - Add debug output for libvirt ping checks

- Lockdown /bin/ip permissions for the monasca-agent (bsc#1107190)
  - add addtional arguments to /bin/ip in sudoers

- Fix missing sudo privleges (bsc#1107190)
  - add /bin/ip and /usr/bin/ovs-vsctl to monasca-agent sudoers

- removed 0001-Avoid-overwriting-sys.path-ip-command.patch
- update to version 2.2.6~dev3
  - Do not copy /sbin/ip to /usr/bin/monasa-agent-ip

- update to version 2.2.6~dev2
  - Remove incorrect assignment of ping_cmd to 'True'

- update to version 2.2.6~dev1
  - Update hacking version to 1.1.x

Changes in openstack-monasca-installer:
- Add 0001-kibana:-set-x-frame-options-header.patch (bsc#1171909,
  CVE-2020-10743)

Changes in openstack-neutron:
- Update to version neutron-11.0.9.dev65:
  * Revert iptables TCP checksum-fill code

- Update to version neutron-11.0.9.dev64:
  * [Pike-only]: make grenade jobs non-voting

Changes in openstack-neutron:
- Update to version neutron-11.0.9.dev65:
  * Revert iptables TCP checksum-fill code

- Update to version neutron-11.0.9.dev64:
  * [Pike-only]: make grenade jobs non-voting

Changes in openstack-octavia-amphora-image:
- Update image to 0.1.4 to include latest changes

Changes in python-Django:
- Security fixes (bsc#1172167, bsc#1172166, CVE-2020-13254,  CVE-2020-13596)
  * Added patch CVE-2020-13254-1.8.19.patch
  * Added patch CVE-2020-13596-1.8.19.patch

Changes in python-Flask:
- Apply patch to resolve CVE-2019-1010083 (bsc#1141968)
  - 0001-detect-UTF-encodings-when-loading-json.patch

Changes in python-GitPython:
- Require git-core instead of git

Changes in python-Pillow:
- Remove decompression_bomb.gif and relevant test case to avoid
  ClamAV scan alerts during build

- Add 001-Corrected-negative-seeks.patch
   * From upstream, backported
   * Fixes part of CVE-2019-16865, bsc#1153191
- Add 002-Added-DecompressionBombError.patch
   * From upstream, backported
   * Adds DecompressionBombError class
   * Used by 003-Added-decompression-bomb-checks.patch
- Add 003-Added-decompression-bomb-checks.patch
   * From upstream, backported
   * Fixes part of CVE-2019-16865, bsc#1153191
- Add 004-Raise-error-if-dimension-is-a-string.patch
   * From upstream, backported
   * Fixes part of CVE-2019-16865, bsc#1153191
- Add 005-Catch-buffer-overruns.patch
   * From upstream, backported
   * Fixes part of CVE-2019-16865, bsc#1153191
- Add 006-Catch-PCX-P-mode-buffer-overrun.patch
   * From upstream, backported
   * Fixes CVE-2020-5312, bsc#1160152
- Add 007-Test-animated-FLI-file.patch
   * From upstream, backported
   * Adds test animated FLI file
   * Used by 008-Ensure-previous-FLI-frame-is-loaded.patch
- Add 008-Ensure-previous-FLI-frame-is-loaded.patch
   * From upstream, backported
   * Fixes https://github.com/python-pillow/Pillow/issues/2649
   * Uncovers CVE-2020-5313, bsc#1160153
- Add 009-Catch-FLI-buffer-overrun.patch
   * From upstream, backported
   * Fixes CVE-2020-5313, bsc#1160153
- Add 010-Invalid-number-of-bands-in-FPX-image.patch
   * From upstream, backported
   * Fixes CVE-2019-19911, bsc#1160192

Changes in python-amqp:
- Add python-devel as build dependecy
  * Required when building against python 2.7.17

Changes in python-apicapi:
- Add python-devel as build dependecy
  * Required when building against python 2.7.17

Changes in python-keystoneauth1:
- switch to tracking stable/pike tarball
- disable renderspec
- update to version 3.1.2.dev2
  - Make tests pass in 2020
  - OpenDev Migration Patch
  - import zuul job settings from project-config into stable/pike
  - Remove tox_install.sh
  - import zuul job settings from project-config
  - Update UPPER_CONSTRAINTS_FILE for stable/pike into stable/pike
  - Update .gitreview for stable/pike into stable/pike
  - Updated from global requirements
  - Update UPPER_CONSTRAINTS_FILE for stable/pike
  - Update .gitreview for stable/pike

Changes in python-oslo.messaging:
- added 0001-Use-default-exchange-for-direct-messaging.patch
  (SOC-11082, SOC-11274, bsc#1159046)

- Add 0001-Retry-to-declare-a-queue-after-internal-error.patch (bsc#1123872)
   After receiving 'AMQP internal error 541', retry to create the queue after a delay.

Changes in python-psutil:
- Add bsc1156525-CVE-2019-18874.patch (bsc#1156525, CVE-2019-18874))

Changes in python-pyroute2:
- netns: fix NetNS resource leakage (#504) (bsc#1164322)

Changes in python-pysaml2:
- Add 0001-Always-generate-a-random-IV-for-AES-operations.patch
  (CVE-2017-1000246, bsc#1068612)

- Add 0001-Fix-XML-Signature-Wrapping-XSW-vulnerabilities.patch
  (CVE-2020-5390, bsc#1160851)

Changes in python-tooz:
- update to version 1.58.1
  - Update .gitreview for stable/pike
  - import zuul job settings from project-config
  - Add doc/requirements.txt
  - Fix sphinx-docs job for stable branch

Changes in python-waitress:
- update to 1.4.3 to include fixes for:
  * CVE-2019-16785 / bsc#1161088
  * CVE-2019-16786 / bsc#1161089
  * CVE-2019-16789 / bsc#1160790
  * CVE-2019-16792 / bsc#1161670

- make sure UTF8 locale is used when runnning tests
  * Sometimes functional tests executed in python3 failed if stdout was not
    set to UTF-8. The error message was:
      ValueError: underlying buffer has been detached

- %python3_only -&gt; %python_alternative

- update to 1.4.3
  * Waitress did not properly validate that the HTTP headers it received
    were properly formed, thereby potentially allowing a front-end server
    to treat a request different from Waitress. This could lead to HTTP
    request smuggling/splitting.
- drop patch local-intersphinx-inventories.patch
  * it was commented out, anyway

- update to 1.4.0:
  - Waitress used to slam the door shut on HTTP pipelined requests without
  setting the ``Connection: close`` header as appropriate in the response. This
  is of course not very friendly. Waitress now explicitly sets the header when
  responding with an internally generated error such as 400 Bad Request or 500
  Internal Server Error to notify the remote client that it will be closing the
  connection after the response is sent.
  - Waitress no longer allows any spaces to exist between the header field-name
  and the colon. While waitress did not strip the space and thereby was not
  vulnerable to any potential header field-name confusion, it should have sent
  back a 400 Bad Request. See https://github.com/Pylons/waitress/issues/273
  - CRLR handling Security fixes

- update to 1.3.1
  * Waitress won’t accidentally throw away part of the path if it
    starts with a double slash

- version update to 1.3.0
  Deprecations
  ~~~~~~~~~~~~
  - The ``send_bytes`` adjustment now defaults to ``1`` and is deprecated
    pending removal in a future release.
    and https://github.com/Pylons/waitress/pull/246
  Features
  ~~~~~~~~
  - Add a new ``outbuf_high_watermark`` adjustment which is used to apply
    backpressure on the ``app_iter`` to avoid letting it spin faster than data
    can be written to the socket. This stabilizes responses that iterate quickly
    with a lot of data.
    See https://github.com/Pylons/waitress/pull/242
  - Stop early and close the ``app_iter`` when attempting to write to a closed
    socket due to a client disconnect. This should notify a long-lived streaming
    response when a client hangs up.
    See https://github.com/Pylons/waitress/pull/238
    and https://github.com/Pylons/waitress/pull/240
    and https://github.com/Pylons/waitress/pull/241
  - Adjust the flush to output ``SO_SNDBUF`` bytes instead of whatever was
    set in the ``send_bytes`` adjustment. ``send_bytes`` now only controls how
    much waitress will buffer internally before flushing to the kernel, whereas
    previously it used to also throttle how much data was sent to the kernel.
    This change enables a streaming ``app_iter`` containing small chunks to
    still be flushed efficiently.
    See https://github.com/Pylons/waitress/pull/246
  Bugfixes
  ~~~~~~~~
  - Upon receiving a request that does not include HTTP/1.0 or HTTP/1.1 we will
    no longer set the version to the string value 'None'. See
    https://github.com/Pylons/waitress/pull/252 and
    https://github.com/Pylons/waitress/issues/110
  - When a client closes a socket unexpectedly there was potential for memory
    leaks in which data was written to the buffers after they were closed,
    causing them to reopen.
    See https://github.com/Pylons/waitress/pull/239
  - Fix the queue depth warnings to only show when all threads are busy.
    See https://github.com/Pylons/waitress/pull/243
    and https://github.com/Pylons/waitress/pull/247
  - Trigger the ``app_iter`` to close as part of shutdown. This will only be
    noticeable for users of the internal server api. In more typical operations
    the server will die before benefiting from these changes.
    See https://github.com/Pylons/waitress/pull/245
  - Fix a bug in which a streaming ``app_iter`` may never cleanup data that has
    already been sent. This would cause buffers in waitress to grow without
    bounds. These buffers now properly rotate and release their data.
    See https://github.com/Pylons/waitress/pull/242
  - Fix a bug in which non-seekable subclasses of ``io.IOBase`` would trigger
    an exception when passed to the ``wsgi.file_wrapper`` callback.
    See https://github.com/Pylons/waitress/pull/249

- Trim marketing wording and other platform mentions.

- Add fetch-intersphinx-inventories.sh to sources
- Add local-intersphinx-inventories.patch for generating the docs
  correctly

- update to version 1.2.1:
  too many changes to list here, see:
  https://github.com/Pylons/waitress/blob/master/CHANGES.txt
  or even:
  https://github.com/Pylons/waitress/commits/master

- Remove superfluous devel dependency for noarch package

- update to version 1.1.0:
  * Features
    + Waitress now has a __main__ and thus may be called with 'python
      -mwaitress'
  * Bugfixes
    + Waitress no longer allows lowercase HTTP verbs. This change was
      made to fall in line with most HTTP servers. See
      https://github.com/Pylons/waitress/pull/170
    + When receiving non-ascii bytes in the request URL, waitress will
      no longer abruptly close the connection, instead returning a 400
      Bad Request. See https://github.com/Pylons/waitress/pull/162 and
      https://github.com/Pylons/waitress/issues/64

- Update to 1.0.2
  * Python 3.6 is now officially supported in Waitress
  * Add a work-around for libc issue on Linux not following the
    documented standards. If getnameinfo() fails because of DNS not
    being available it should return the IP address instead of the
    reverse DNS entry, however instead getnameinfo() raises. We
    catch this, and ask getnameinfo() for the same information
    again, explicitly asking for IP address instead of reverse
    DNS hostname.
- Implement single-spec version.
- Fix source URL.

- update to 1.0.1:
  - IPv6 support on Windows was broken due to missing constants in the socket
    module. This has been resolved by setting the constants on Windows if they
    are missing. See https://github.com/Pylons/waitress/issues/138
  - A ValueError was raised on Windows when passing a string for the port, on
    Windows in Python 2 using service names instead of port numbers doesn't work
    with `getaddrinfo`. This has been resolved by attempting to convert the port
    number to an integer, if that fails a ValueError will be raised. See
    https://github.com/Pylons/waitress/issues/139
  - Removed `AI_ADDRCONFIG` from the call to `getaddrinfo`, this resolves an
    issue whereby `getaddrinfo` wouldn't return any addresses to `bind` to on
    hosts where there is no internet connection but localhost is requested to be
    bound to. See https://github.com/Pylons/waitress/issues/131 for more
    information.
- disable tests. need network access.

Changes in storm:
- update to 1.1.3:
  * 1.1.3:
    * [STORM-3026] - Upgrade ZK instance for security
    * [STORM-3027] - Make Impersonation Optional
    * [STORM-3011] - Use default bin path in flight.bash if $JAVA_HOME is undefined
    * [STORM-3039] - Ports of killed topologies remain in TIME_WAIT state preventing to start new topology
    * [STORM-2911] - SpoutConfig is serializable but does not declare a serialVersionUID field
    * [STORM-2978] - The fix for STORM-2706 is broken, and adds a transitive dependency on Zookeeper 3.5.3-beta for projects that depend on e.g. storm-kafka
    * [STORM-2979] - WorkerHooks EOFException during run_worker_shutdown_hooks
    * [STORM-2981] - Upgrade Curator to lastest patch version
    * [STORM-2985] - Add jackson-annotations to dependency management
    * [STORM-2989] - LogCleaner should preserve current worker.log.metrics
    * [STORM-2994] - KafkaSpout consumes messages but doesn't commit offsets
    * [STORM-3043] - NullPointerException thrown in SimpleRecordTranslator.apply()
    * [STORM-3052] - Let blobs un archive
    * [STORM-3059] - KafkaSpout throws NPE when hitting a null tuple if the processing guarantee is not AT_LEAST_ONCE
    * [STORM-2960] - Better to stress importance of setting up proper OS account for Storm processes
    * [STORM-3060] - Configuration mapping between storm-kafka &amp; storm-kafka-client
    * [STORM-2952] - Deprecate storm-kafka in 1.x
    * [STORM-3005] - [DRPC] LinearDRPCTopologyBuilder shouldn't be deprecated
    * [STORM-2841] - testNoAcksIfFlushFails UT fails with NullPointerException
  * 1.1.2:
    * [STORM-2512] - Change KafkaSpoutConfig in storm-kafka-client to make it work with flux
    * [STORM-2616] - Document the built in metrics (just in time to replace them???)
    * [STORM-2657] - Update SECURITY.MD
    * [STORM-2663] - Backport STORM-2558 and deprecate storm.cmd on 1.x-branch
    * [STORM-2712] - accept arbitrary number of rows per tuple in storm-cassandra
    * [STORM-2775] - Improve KafkaPartition Metric Names
    * [STORM-2807] - Integration test should shut down topologies immediately after the test
    * [STORM-2862] - More flexible logging in multilang (Python, Ruby, JS)
    * [STORM-2877] - Introduce an option to configure pagination in Storm UI
    * [STORM-2917] - Check the config(nimbus.host) before using it to connect
    * [STORM-2231] - NULL in DisruptorQueue while multi-threaded ack
    * [STORM-2426] - First tuples fail after worker is respawn
    * [STORM-2500] - waitUntilReady in PacemakerClient cannot be invoked
    * [STORM-2525] - Fix flaky integration tests
    * [STORM-2535] - test-reset-timeout is flaky. Replace with a more reliable test.
    * [STORM-2541] - Manual partition assignment doesn't work
    * [STORM-2607] - [kafka-client] Consumer group every time with lag 1
    * [STORM-2642] - Storm-kafka-client spout cannot be serialized when using manual partition assignment
    * [STORM-2660] - The Nimbus storm-local directory is relative to the working directory of the shell executing 'storm nimbus'
    * [STORM-2666] - Storm-kafka-client spout can sometimes emit messages that were already committed.
    * [STORM-2674] - NoNodeException when ZooKeeper tries to delete nodes
    * [STORM-2677] - consider all sampled tuples which took greater than 0 ms processing time
    * [STORM-2682] - Supervisor crashes with NullPointerException
    * [STORM-2690] - resurrect invocation of ISupervisor.assigned() &amp; make Supervisor.launchDaemon() accessible
    * [STORM-2695] - BlobStore uncompress argument should be Boolean
    * [STORM-2705] - DRPCSpout sleeps twice when idle
    * [STORM-2706] - Nimbus stuck in exception and does not fail fast
    * [STORM-2724] - ExecutorService in WaterMarkEventGenerator never shutdown
    * [STORM-2736] - o.a.s.b.BlobStoreUtils [ERROR] Could not update the blob with key
    * [STORM-2750] - fix double_checked locking
    * [STORM-2751] - Remove AsyncLoggingContext from Supervisor
    * [STORM-2764] - HDFSBlobStore leaks file system objects
    * [STORM-2769] - Fast-fail if output stream Id is null
    * [STORM-2771] - Some tests are being run twice
    * [STORM-2779] - NPE on shutting down WindowedBoltExecutor
    * [STORM-2786] - Ackers leak tracking info on failure and lots of other cases.
    * [STORM-2810] - Storm-hdfs tests are leaking resources
    * [STORM-2811] - Nimbus may throw NPE if the same topology is killed multiple times, and the integration test kills the same topology multiple times
    * [STORM-2814] - Logviewer HTTP server should return 403 instead of 200 if the user is unauthorized
    * [STORM-2815] - UI HTTP server should return 403 if the user is unauthorized
    * [STORM-2833] - Cached Netty Connections can have different keys for the same thing.
    * [STORM-2853] - Deactivated topologies cause high cpu utilization
    * [STORM-2855] - Travis build doesn't work after update of Ubuntu image
    * [STORM-2856] - Make Storm build work on post 2017Q4 Travis Trusty image
    * [STORM-2868] - Address handling activate/deactivate in multilang module files
    * [STORM-2870] - FileBasedEventLogger leaks non-daemon ExecutorService which prevents process to be finished
    * [STORM-2876] - Some storm-hdfs tests fail with out of memory periodically
    * [STORM-2879] - Supervisor collapse continuously when there is a expired assignment for overdue storm
    * [STORM-2892] - Flux test fails to parse valid PATH environment variable
    * [STORM-2894] - fix some random typos in tests
    * [STORM-2912] - Tick tuple is being shared without resetting start time and incur side-effect to break metrics
    * [STORM-2918] - Upgrade Netty version
    * [STORM-2942] - Remove javadoc and source jars from toollib directory in binary distribution
    * [STORM-2874] - Minor style improvements to backpressure code
    * [STORM-2858] - Fix worker-launcher build
  * 1.1.1:
    * STORM-2659: Add daemon.name variable to storm.cmd to fix log4j logging
    * STORM-2652: fix error in open method of JmsSpout
    * STORM-2645: Update storm.py to be python3 compatible
    * STORM-2621: add tuple_population metric
    * STORM-2639: Kafka Spout incorrectly computes numCommittedOffsets due to voids in the topic (topic compaction)
    * STORM-2544: Fixing issue in acking of tuples that hit retry limit under manual commit mode
    * STORM-2618: Add TridentKafkaStateUpdater for storm-kafka-client
    * STORM-2608: Remove any pending offsets that are no longer valid
    * STORM-2503: Fix lgtm.com alerts on equality and comparison operations
    * STORM-2478: Fix BlobStoreTest.testDeleteAfterFailedCreate on Windows
    * STORM-2602: storm.zookeeper.topology.auth.payload doesn't work even you set it
    * STORM-2597: Don't parse passed in class paths
    * STORM-2564: We should provide a template for storm-cluster-auth.yaml
    * STORM-2568: Fix getTopicsString
    * STORM-2563: Remove the workaround to handle missing UGI.loginUserFromSubject
    * STORM-2552: KafkaSpoutMessageId should be serializable
    * STORM-2562: Use stronger key size than default for blow fish key generator and get rid of stack trace
    * STORM-2557: A bug in DisruptorQueue causing severe underestimation of queue arrival rates
    * STORM-2449: Ensure same key appears only once in State iterator
    * STORM-2516: Fix timing issues with testPrepareLateTupleStreamWithoutBuilder
    * STORM-2489: Overlap and data loss on WindowedBolt based on Duration
    * STORM-2528: Bump log4j version to 2.8.2
    * STORM-2527: Initialize java.sql.DriverManager earlier to avoid deadlock
    * STORM-2413: Make new Kafka spout respect tuple retry limits
    * STORM-2518: Handles empty name for 'USER type' ACL when normalizing ACLs
    * STORM-2511: Submitting a topology with name containing unicode getting failed
    * STORM-2496: Dependency artifacts should be uploaded to blobstore with READ permission for all
    * STORM-2505: Spout to support topic compaction
    * STORM-2498: Fix Download Full File link
    * STORM-2343: New Kafka spout can stop emitting tuples if more than maxUncommittedOffsets tuples fail at once.
    * STORM-2486: Prevent cd from printing target directory to avoid breaking classpath
    * STORM-2488: The UI user Must be HTTP.
    * STORM-2481: Upgrade Aether version to resolve Aether bug BUG-451566
    * STORM-2435: Logging in storm.js inconsistent to console.log and does not support log levels
    * STORM-2315: New kafka spout can't commit offset when ack is disabled
    * STORM-2467: Use explicit charset when decoding from array backed buffer
    * STORM-1114: Race condition in trident zookeeper zk-node create/delete
    * STORM-2448: Add in Storm and JDK versions when submitting a topology
    * STORM-2343: Fix new Kafka spout stopping processing if more than maxUncommittedOffsets tuples fail at once
    * STORM-2431: the default blobstore.dir is storm.local.dir/blobs which is different from distcache-blobstore.md
    * STORM-2429: Properly validate supervisor.scheduler.meta
    * STORM-2451: windows storm.cmd does not set log4j2 config file correctly by default
    * STORM-2450: Write resources into correct local director
    * STORM-2440: Kill process if executor catches java.net.SocketTimeoutException
    * STORM-2432: Storm-Kafka-Client Trident Spout Seeks Incorrect Offset With UNCOMMITTED_LATEST Strategy
  * 1.1.0:
    * STORM-2425: Storm Hive Bolt not closing open transactions
    * STORM-2409: Storm-Kafka-Client KafkaSpout Support for Failed and NullTuples
    * STORM-2423: Join Bolt should use explicit instead of default window anchoring for emitted tuples
    * STORM-2416: Improve Release Packaging to Reduce File Size
    * STORM-2414: Skip checking meta's ACL when subject has write privileges for any blobs
    * STORM-2038: Disable symlinks with a config option
    * STORM-2240: STORM PMML Bolt - Add Support to Load Models from Blob Store
    * STORM-2412: Nimbus isLeader check while waiting for max replication
    * STORM-2408: build failed if storm.kafka.client.version = 0.10.2.0
    * STORM-2403: Fix KafkaBolt test failure: tick tuple should not be acked
    * STORM-2361: Kafka spout - after leader change, it stops committing offsets to ZK
    * STORM-2353: Replace kafka-unit by kafka_2.11 and kafka-clients to test kafka-clients:0.10.1.1
    * STORM-2387: Handle tick tuples properly for Bolts in external modules
    * STORM-2345: Type mismatch in ReadClusterState's ProfileAction processing Map
    * STORM-2400: Upgraded Curator to 2.12.0 and made respective API changes
    * STORM-2396: setting interrupted status back before throwing a RuntimeException
    * STORM-1772: Adding Perf module with topologies for measuring performance
    * STORM-2395: storm.cmd supervisor calls the wrong class name
    * STORM-2391: Move HdfsSpoutTopology from storm-starter to storm-hdfs-examples
    * STORM-2389: Avoid instantiating Event Logger when topology.eventlogger.executors=0
    * STORM-2386: Fail-back Blob deletion also fails in BlobSynchronizer.syncBlobs.
    * STORM-2388: JoinBolt breaks compilation against JDK 7
    * STORM-2374: Storm Kafka Client Test Topologies Must be Serializable
    * STORM-2372: Pacemaker client doesn't clean up heartbeats properly
    * STORM-2326: Upgrade log4j and slf4j
    * STORM-2334: Join Bolt implementation
    * STORM-1363: TridentKafkaState should handle null values from TridentTupleToKafkaMapper.getMessageFromTuple()
    * STORM-2365: Support for specifying output stream in event hubs spout
    * STORM-2250: Kafka spout refactoring to increase modularity and testability
    * STORM-2340: fix AutoCommitMode issue in KafkaSpout
    * STORM-2344: Flux YAML File Viewer for Nimbus UI
    * STORM-2350: Storm-HDFS's listFilesByModificationTime is broken
    * STORM-2270 Kafka spout should consume from latest when ZK partition commit offset bigger than the latest offset
    * STORM-1464: storm-hdfs support for multiple output files and partitioning
    * STORM-2320: DRPC client printer class reusable for local and remote DRPC
    * STORM-2281: Running Multiple Kafka Spouts (Trident) Throws Illegal State Exception
    * STORM-2296: Kafka spout no dup on leader changes
    * STORM-2244: Some shaded jars doesn't exclude dependency signature files
    * STORM-2014: New Kafka spout duplicates checking if failed messages have reached max retries
    * STORM-1443: [Storm SQL] Support customizing parallelism in StormSQL
    * STORM-2148: [Storm SQL] Trident mode: back to code generate and compile Trident topology
    * STORM-2331: Emitting from JavaScript should work when not anchoring.
    * STORM-2225: change spout config to be simpler.
    * STORM-2323: Precondition for Leader Nimbus should check all topology blobs and also corresponding dependencies
    * STORM-2330: Fix storm sql code generation for UDAF with non standard sql types
    * STORM-2298: Don't kill Nimbus when ClusterMetricsConsumer is failed to initialize
    * STORM-2301: [storm-cassandra] upgrade cassandra driver to 3.1.2
    * STORM-1446: Compile the Calcite logical plan to Storm Trident logical plan
    * STORM-2303: [storm-opentsdb] Fix list invariant issue for JDK 7
    * STORM-2236: storm kafka client should support manual partition management
    * STORM-2295: KafkaSpoutStreamsNamedTopics should return output fields with predictable ordering
    * STORM-2300: [Flux] support list of references
    * STORM-2297: [storm-opentsdb] Support Flux for OpenTSDBBolt
    * STORM-2294: Send activate and deactivate command to ShellSpout
    * STORM-2280: Upgrade Calcite version to 1.11.0
    * STORM-2278: Allow max number of disruptor queue flusher threads to be configurable
    * STORM-2277: Add shaded jar for Druid connector
    * STORM-2274: Support named output streams in Hdfs Spout
    * STORM-2204: Adding caching capabilities in HBaseLookupBolt
    * STORM-2267: Use user's local maven repo. directory to local repo.
    * STORM-2254: Provide Socket time out for nimbus thrift client
    * STORM-2200: [Storm SQL] Drop Aggregate &amp; Join support on Trident mode
    * STORM-2266: Close NimbusClient instances appropriately
    * STORM-2203: Add a getAll method to KeyValueState interface
    * STORM-1886: Extend KeyValueState iface with delete
    * STORM-2022: update Fields test to match new behavior
    * STORM-2020: Stop using sun internal classes
    * STORM-1228: port fields_test to java
    * STORM-2104: New Kafka spout crashes if partitions are reassigned while tuples are in-flight
    * STORM-2257: Add built in support for sum function with different types.
    * STORM-2082: add sql external module storm-sql-hdfs
    * STORM-2256: storm-pmml breaks on java 1.7
    * STORM-2223: PMML Bolt.
    * STORM-2222: Repeated NPEs thrown in nimbus if rebalance fails
    * STORM-2190: reduce contention between submission and scheduling
    * STORM-2239: Handle InterruptException in new Kafka spout
    * STORM-2087: Storm-kafka-client: Failed tuples are not always replayed
    * STORM-2238: Add Timestamp extractor for windowed bolt
    * STORM-2235: Introduce new option: 'add remote repositories' for dependency resolver
    * STORM-2215: validate blobs are present before submitting
    * STORM-2170: [Storm SQL] Add built-in socket datasource to runtime
    * STORM-2226: Fix kafka spout offset lag ui for kerberized kafka
    * STORM-2224: Exposed a method to override in computing the field from given tuple in FieldSelector
    * STORM-2220: Added config support for each bolt in Cassandra bolts, fixed the bolts to be used also as sinks.
    * STORM-2205: Racecondition in getting nimbus summaries while ZK connectionions are reconnected
    * STORM-2182: Refactor Storm Kafka Examples Into Own Modules.
    * STORM-1694: Kafka Spout Trident Implementation Using New Kafka Consumer API
    * STORM-2173: [SQL] Support CSV as input / output format
    * STORM-2177: [SQL] Support TSV as input / output format
    * STORM-2172: [SQL] Support Avro as input / output format
    * STORM-2185: Storm Supervisor doesn't delete directories properly sometimes
    * STORM-2103: [SQL] Introduce new sql external module: storm-sql-mongodb
    * STORM-2175: fix double close of workers
    * STORM-2109: Under supervisor V2 SUPERVISOR_MEMORY_CAPACITY_MB and SUPERVISOR_CPU_CAPACITY must be Doubles
    * STORM-2110: in supervisor v2 filter out empty command line args
    * STORM-2117: Supervisor V2 with local mode extracts resources directory to topology root directory instead of temporary directory
    * STORM-2131: Add blob command to worker-launcher, make stormdist directory not writeable by topo owner
    * STORM-2018: Supervisor V2
    * STORM-2139: Let ShellBolts and ShellSpouts run with scripts from blobs
    * STORM-2072: Add map, flatMap with different outputs (T-&gt;V) in Trident
    * STORM-2134: improving the current scheduling strategy for RAS
    * STORM-2125: Use Calcite's implementation of Rex Compiler
    * STORM-1546: Adding Read and Write Aggregations for Pacemaker to make it HA compatible
    * STORM-1444: Support EXPLAIN statement in StormSQL
    * STORM-2099: Introduce new sql external module: storm-sql-redis
    * STORM-2097: Improve logging in trident core and examples
    * STORM-2144: Fix Storm-sql group-by behavior in standalone mode
    * STORM-2066: make error message in IsolatedPool.java more descriptive
    * STORM-1870: Allow FluxShellBolt/Spout set custom 'componentConfig' via yaml
    * STORM-2126: fix NPE due to race condition in compute-new-sched-assign…
    * STORM-2124: show requested cpu mem for each component
    * STORM-2089: Replace Consumer of ISqlTridentDataSource with SqlTridentConsumer
    * STORM-2118: A few fixes for storm-sql standalone mode
    * STORM-2105: Cluster/Supervisor total and available resources displayed in the UI
    * STORM-2078: enable paging in worker datatable
    * STORM-1664: Allow Java users to start a local cluster with a Nimbus Thrift server.
    * STORM-1872: Release Jedis connection when topology shutdown
    * STORM-2100: Fix Trident SQL join tests to not rely on ordering
    * STORM-1837: Fix complete-topology and prevent message loss
    * STORM-2098: DruidBeamBolt: Pass DruidConfig.Builder as constructor argument
    * STORM-2092: optimize TridentKafkaState batch sending
    * STORM-1979: Storm Druid Connector implementation.
    * STORM-2057: Support JOIN statement in Storm SQL
    * STORM-1970: external project examples refator
    * STORM-2074: fix storm-kafka-monitor NPE bug
    * STORM-1459: Allow not specifying producer properties in read-only Kafka table in StormSQL
    * STORM-2052: Kafka Spout New Client API - Log Improvements and Parameter Tuning for Better Performance.
    * STORM-2050: [storm-sql] Support User Defined Aggregate Function for Trident mode
    * STORM-1434: Support the GROUP BY clause in StormSQL
    * STORM-2016: Topology submission improvement: support adding local jars and maven artifacts on submission
    * STORM-1994: Add table with per-topology &amp; worker resource usage and components in (new) supervisor and topology pages
    * STORM-2042: Nimbus client connections not closed properly causing connection leaks
    * STORM-1766: A better algorithm server rack selection for RAS
    * STORM-1913: Additions and Improvements for Trident RAS API
    * STORM-2037: debug operation should be whitelisted in SimpleAclAuthorizer.
    * STORM-2023: Add calcite-core to dependency of storm-sql-runtime
    * STORM-2036: Fix minor bug in RAS Tests
    * STORM-1979: Storm Druid Connector implementation.
    * STORM-1839: Storm spout implementation for Amazon Kinesis Streams.
    * STORM-1876: Option to build storm-kafka and storm-kafka-client with different kafka client version
    * STORM-2000: Package storm-opentsdb as part of external dir in installation
    * STORM-1989: X-Frame-Options support for Storm UI
    * STORM-1962: support python 3 and 2 in multilang
    * STORM-1964: Unexpected behavior when using count window together with timestamp extraction
    * STORM-1890: ensure we refetch static resources after package build
    * STORM-1988: Kafka Offset not showing due to bad classpath.
    * STORM-1966: Expand metric having Map type as value into multiple metrics based on entries
    * STORM-1737: storm-kafka-client has compilation errors with Apache Kafka 0.10
    * STORM-1968: Storm logviewer does not work for nimbus.log in secure cluster
    * STORM-1910: One topology cannot use hdfs spout to read from two locations
    * STORM-1960: Add CORS support to STORM UI Rest api
    * STORM-1959: Add missing license header to KafkaPartitionOffsetLag
    * STORM-1950: Change response json of 'Topology Lag' REST API to keyed by spoutId, topic, partition.
    * STORM-1833: Simple equi-join in storm-sql standalone mode
    * STORM-1866: Update Resource Aware Scheduler Documentation
    * STORM-1930: Kafka New Client API - Support for Topic Wildcards
    * STORM-1924: Adding conf options for Persistent Word Count Topology
    * STORM-1956: Disabling Backpressure by default
    * STORM-1934: Fix race condition between sync-supervisor and sync-processes
    * STORM-1919: Introduce FilterBolt on storm-redis
    * STORM-1945: Fix NPE bugs on topology spout lag for storm-kafka-monitor
    * STORM-1888: add description for shell command
    * STORM-1902: add a simple &amp; flexible FileNameFormat for storm-hdfs
    * STORM-1914: Storm Kafka Field Topic Selector
    * STORM-1907: PartitionedTridentSpoutExecutor has incompatible types that cause ClassCastException
    * STORM-1925: Remove Nimbus thrift call from Nimbus itself
    * STORM-1909: Update HDFS spout documentation
    * STORM-1136: Command line module to return kafka spout offsets lag and display in storm ui
    * STORM-1911: IClusterMetricsConsumer should use seconds to timestamp unit
    * STORM-1893: Support OpenTSDB for storing timeseries data.
    * STORM-1723: Introduce ClusterMetricsConsumer
    * STORM-1700: Introduce 'whitelist' / 'blacklist' option to MetricsConsumer
    * STORM-1698: Asynchronous MetricsConsumerBolt
    * STORM-1705: Cap number of retries for a failed message
    * STORM-1884: Prioritize pendingPrepare over pendingCommit
    * STORM-1575: fix TwitterSampleSpout NPE on close
    * STORM-1874: Update logger private permissions
    * STORM-1865: update command line client document
    * STORM-1771: HiveState should flushAndClose before closing old or idle Hive connections
    * STORM-1882: Expose TextFileReader public
    * STORM-1873: Implement alternative behaviour for late tuples
    * STORM-1719: Introduce REST API: Topology metric stats for stream
    * STORM-1887: Fixed help message for set_log_level command
    * STORM-1878: Flux can now handle IStatefulBolts
    * STORM-1864: StormSubmitter should throw respective exceptions and log respective errors forregistered submitter hook invocation
    * STORM-1868: Modify TridentKafkaWordCount to run in distributed mode
    * STORM-1859: Ack late tuples in windowed mode
    * STORM-1851: Fix default nimbus impersonation authorizer config
    * STORM-1848: Make KafkaMessageId and Partition serializable to support
    * STORM-1862: Flux ShellSpout and ShellBolt can't emit to named streams
    * Storm-1728: TransactionalTridentKafkaSpout error
    * STORM-1850: State Checkpointing Documentation update
    * STORM-1674: Idle KafkaSpout consumes more bandwidth than needed
    * STORM-1842: Forward references in storm.thrift cause tooling issues
    * STORM-1730: LocalCluster#shutdown() does not terminate all storm threads/thread pools.
    * STORM-1709: Added group by support in storm sql standalone mode
    * STORM-1720: Support GEO in storm-redis
  * 1.0.6:
    * [STORM-2877] - Introduce an option to configure pagination in Storm UI
    * [STORM-2917] - Check the config(nimbus.host) before using it to connect
    * [STORM-2451] - windows storm.cmd does not set log4j2 config file correctly by default
    * [STORM-2690] - resurrect invocation of ISupervisor.assigned() &amp; make Supervisor.launchDaemon() accessible
    * [STORM-2751] - Remove AsyncLoggingContext from Supervisor
    * [STORM-2764] - HDFSBlobStore leaks file system objects
    * [STORM-2771] - Some tests are being run twice
    * [STORM-2786] - Ackers leak tracking info on failure and lots of other cases.
    * [STORM-2853] - Deactivated topologies cause high cpu utilization
    * [STORM-2856] - Make Storm build work on post 2017Q4 Travis Trusty image
    * [STORM-2870] - FileBasedEventLogger leaks non-daemon ExecutorService which prevents process to be finished
    * [STORM-2879] - Supervisor collapse continuously when there is a expired assignment for overdue storm
    * [STORM-2892] - Flux test fails to parse valid PATH environment variable
    * [STORM-2894] - fix some random typos in tests
    * [STORM-2912] - Tick tuple is being shared without resetting start time and incur side-effect to break metrics
    * [STORM-2918] - Upgrade Netty version
    * [STORM-2874] - Minor style improvements to backpressure code
    * [STORM-2937] - Overwrite storm-kafka-client 1.x-branch into 1.0.x-branch
    * [STORM-2858] - Fix worker-launcher build
- Use %license macro

  * 1.0.5:
    * [STORM-2657] - Update SECURITY.MD
    * [STORM-2231] - NULL in DisruptorQueue while multi-threaded ack
    * [STORM-2660] - The Nimbus storm-local directory is relative to the working directory of the shell executing 'storm nimbus'
    * [STORM-2674] - NoNodeException when ZooKeeper tries to delete nodes
    * [STORM-2677] - consider all sampled tuples which took greater than 0 ms processing time
    * [STORM-2682] - Supervisor crashes with NullPointerException
    * [STORM-2695] - BlobStore uncompress argument should be Boolean
    * [STORM-2705] - DRPCSpout sleeps twice when idle
  * 1.0.4:
    * STORM-2627: Update docs for storm.zookeeper.topology.auth.scheme
    * STORM-2597: Don't parse passed in class paths
    * STORM-2524: Set Kafka client.id with storm-kafka
    * STORM-2448: Add in Storm and JDK versions when submitting a topology
    * STORM-2511: Submitting a topology with name containing unicode getting failed
    * STORM-2498: Fix Download Full File link
    * STORM-2486: Prevent cd from printing target directory to avoid breaking classpath
    * STORM-1114: Race condition in trident zookeeper zk-node create/delete
    * STORM-2429: Properly validate supervisor.scheduler.meta
    * STORM-2194: Stop ignoring socket timeout error from executor
    * STORM-2450: Write resources into correct local director
    * STORM-2414: Skip checking meta's ACL when subject has write privileges for any blobs
    * STORM-2038: Disable symlinks with a config option
    * STORM-2038: No symlinks for local cluster
    * STORM-2403: Fix KafkaBolt test failure: tick tuple should not be acked
    * STORM-2361: Kafka spout - after leader change, it stops committing offsets to ZK
    * STORM-2296: Kafka spout - no duplicates on leader changes
    * STORM-2387: Handle tick tuples properly for Bolts in external modules
    * STORM-2345: Type mismatch in ReadClusterState's ProfileAction processing Map
    * STORM-2104: New Kafka spout crashes if partitions are reassigned while tuples are in-flight
    * STORM-2396: setting interrupted status back before throwing a RuntimeException
    * STORM-2395: storm.cmd supervisor calls the wrong class name
    * STORM-2385: pacemaker_state_factory.clj does not compile on branch-1.0.x
    * STORM-2389: Avoid instantiating Event Logger when topology.eventlogger.executors=0
    * STORM-2386: Fail-back Blob deletion also fails in BlobSynchronizer.syncBlobs
    * STORM-2360: Storm-Hive: Thrift version mismatch with storm-core
    * STORM-2372: Pacemaker client doesn't clean up heartbeats properly
    * STORM-2326: Upgrade log4j and slf4j
    * STORM-2350: Storm-HDFS's listFilesByModificationTime is broken
  * 1.0.3:
    * STORM-2197: NimbusClient connectins leak due to leakage in ThriftClient
    * STORM-2321: Handle blobstore zk key deletion in KeySequenceNumber.
    * STORM-2324: Fix deployment failure if resources directory is missing in topology jar
    * STORM-2335: Fix broken Topology visualization with empty ':transferred' in executor stats
    * STORM-2336: Close Localizer and AsyncLocalizer when supervisor is shutting down
    * STORM-2338: Subprocess exception handling is broken in storm.py on Windows environment
    * STORM-2337: Broken documentation generation for storm-metrics-profiling-internal-actions.md and windows-users-guide.md
    * STORM-2325: Logviewer doesn't consider 'storm.local.hostname'
    * STORM-1742: More accurate 'complete latency'
    * STORM-2176: Workers do not shutdown cleanly and worker hooks don't run when a topology is killed
    * STORM-2293: hostname should only refer node's 'storm.local.hostname'
    * STORM-2246: Logviewer download link has urlencoding on part of the URL
    * STORM-1906: Window count/length of zero should be disallowed
    * STORM-1841: Address a few minor issues in windowing and doc
    * STORM-2268: Fix integration test for Travis CI build
    * STORM-2283: Fix DefaultStateHandler kryo multithreading issues
    * STORM-2264: OpaqueTridentKafkaSpout failing after STORM-2216
    * STORM-2276: Remove twitter4j usages due to license issue (JSON.org is catalog X)
    * STORM-2095: remove any remaining files when deleting blobstore directory
    * STORM-2222: Repeated NPEs thrown in nimbus if rebalance fails
    * STORM-2251: Integration test refers specific version of Storm which should be project version
    * STORM-2234: heartBeatExecutorService in shellSpout don't work well with deactivate
    * STORM-2216: Favor JSONValue.parseWithException
    * STORM-2208: HDFS State Throws FileNotFoundException in Azure Data Lake Store file system (adl://)
    * STORM-2213: ShellSpout has race condition when ShellSpout is being inactive longer than heartbeat timeout
    * STORM-2210: remove array shuffle from ShuffleGrouping
    * STORM-2052: Kafka Spout - New Client API - Performance Improvements
    * storm-2205: Racecondition in getting nimbus summaries while ZK connections are reconnected
    * STORM-2198: perform RotationAction when stopping HdfsBolt
    * STORM-2196: A typo in RAS_Node::consumeCPU
    * STORM-2189: RAS_Node::freeCPU outputs incorrect info
    * STORM-2184: Don't wakeup KafkaConsumer on shutdown
    * STORM-2185: Storm Supervisor doesn't delete directories properly sometimes
    * STORM-2175: fix double close of workers
    * STORM-2018: Supervisor V2
    * STORM-2145: Leave leader nimbus's hostname to log when trying to connect leader nimbus
    * STORM-2127: Storm-eventhubs should use latest amqp and eventhubs-client versions
    * STORM-2040: Fix bug on assert-can-serialize
    * STORM-2017: ShellBolt stops reporting task ids
    * STORM-2119: bug in log message printing to stdout
    * STORM-2120: Emit to _spoutConfig.outputStreamId
    * STORM-2101: fixes npe in compute-executors in nimbus
    * STORM-2090: Add integration test for storm windowing
    * STORM-2003: Make sure config contains TOPIC before get it
    * STORM-1567: in defaults.yaml 'topology.disable.loadaware' should be 'topology.disable.loadaware.messaging'
    * STORM-1987: Fix TridentKafkaWordCount arg handling in distributed mode.
    * STORM-1969: Modify HiveTopology to show usage of non-partition table.
    * STORM-1849: HDFSFileTopology should use the 3rd argument as topologyName
    * STORM-2086: use DefaultTopicSelector instead of creating a new one
    * STORM-2079: Unneccessary readStormConfig operation
    * STORM-2081: create external directory for storm-sql various data sources and move storm-sql-kafka to it
    * STORM-2070: Fix sigar native binary download link
    * STORM-2056: Bugs in logviewer
    * STORM-1646: Fix ExponentialBackoffMsgRetryManager test
    * STORM-2039: Backpressure refactoring in worker and executor
    * STORM-2064: Add storm name and function, access result and function to log-thrift-access
    * STORM-2063: Add thread name in worker logs
    * STORM-2042: Nimbus client connections not closed properly causing connection leaks
    * STORM-2032: removes warning in case more than one metrics tuple is received
    * STORM-1594: org.apache.storm.tuple.Fields can throw NPE if given invalid field in selector
    * STORM-1995: downloadChunk in nimbus.clj should close the input stream

Changes in rubygem-activeresource:
- Add bsc#1171560-CVE-2020-8151-encode-id-param.patch
  Prevent possible information disclosure issue that could allow
  an attacker to create specially crafted requests to access data
  in an unexpected way (bsc#1171560 CVE-2020-8151))_

Changes in rubygem-crowbar-client:
- Update to 3.9.2
  - Enable SES commands in Cloud8 (SOC-11122)

Changes in rubygem-json-1_7:
- Add CVE-2020-10663.patch (CVE-2020-10663, bsc#1167244)

Changes in rubygem-puma:
- Fix indentation in gem2rpm.yml_

- Add CVE-2020-11077.patch (bsc#1172175, CVE-2020-11077)
- Add chunked-request-handling.patch (needed for CVE-2020-11076.patch)
- Add CVE-2020-11076.patch (bsc#1172176, CVE-2020-11076)
- Add all patches to gem2rpm.yml

		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-14"/>
	<updated date="2020-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068612">SUSE bug 1068612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092420">SUSE bug 1092420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107190">SUSE bug 1107190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108719">SUSE bug 1108719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123872">SUSE bug 1123872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126503">SUSE bug 1126503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141968">SUSE bug 1141968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/11483483">SUSE bug 11483483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148383">SUSE bug 1148383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153191">SUSE bug 1153191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156525">SUSE bug 1156525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159046">SUSE bug 1159046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160152">SUSE bug 1160152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160153">SUSE bug 1160153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160192">SUSE bug 1160192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160790">SUSE bug 1160790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160851">SUSE bug 1160851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161088">SUSE bug 1161088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161089">SUSE bug 1161089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161670">SUSE bug 1161670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164322">SUSE bug 1164322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167244">SUSE bug 1167244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168593">SUSE bug 1168593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169770">SUSE bug 1169770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170657">SUSE bug 1170657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171273">SUSE bug 1171273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171560">SUSE bug 1171560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171594">SUSE bug 1171594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171661">SUSE bug 1171661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171909">SUSE bug 1171909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172166">SUSE bug 1172166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172167">SUSE bug 1172167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172175">SUSE bug 1172175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172176">SUSE bug 1172176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172409">SUSE bug 1172409</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000246/">CVE-2017-1000246 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000246">CVE-2017-1000246 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010083/">CVE-2019-1010083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010083">CVE-2019-1010083 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15043/">CVE-2019-15043 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15043">CVE-2019-15043 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16785/">CVE-2019-16785 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16785">CVE-2019-16785 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16786/">CVE-2019-16786 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16786">CVE-2019-16786 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16789/">CVE-2019-16789 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16789">CVE-2019-16789 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16792/">CVE-2019-16792 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16792">CVE-2019-16792 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16865/">CVE-2019-16865 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16865">CVE-2019-16865 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18874/">CVE-2019-18874 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18874">CVE-2019-18874 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19911/">CVE-2019-19911 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19911">CVE-2019-19911 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3828/">CVE-2019-3828 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3828">CVE-2019-3828 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10743/">CVE-2020-10743 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10743">CVE-2020-10743 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11076/">CVE-2020-11076 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11076">CVE-2020-11076 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11077/">CVE-2020-11077 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11077">CVE-2020-11077 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12052/">CVE-2020-12052 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12052">CVE-2020-12052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13254/">CVE-2020-13254 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13254">CVE-2020-13254 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13379/">CVE-2020-13379 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13379">CVE-2020-13379 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13596/">CVE-2020-13596 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13596">CVE-2020-13596 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5312/">CVE-2020-5312 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5312">CVE-2020-5312 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5313/">CVE-2020-5313 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5313">CVE-2020-5313 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-5390/">CVE-2020-5390 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5390">CVE-2020-5390 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8151/">CVE-2020-8151 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8151">CVE-2020-8151 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597240" comment="ansible-2.4.6.0-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597241" comment="ansible1-1.9.6-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597242" comment="ardana-ansible-8.0+git.1589740980.6c3bcdc-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597243" comment="ardana-cluster-8.0+git.1585685203.3e71e49-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597244" comment="ardana-freezer-8.0+git.1586539529.b7d295f-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597245" comment="ardana-input-model-8.0+git.1589740934.0e0ad61-3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597246" comment="ardana-logging-8.0+git.1591194866.b7375d0-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597247" comment="ardana-mq-8.0+git.1589715269.62ad6df-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597248" comment="ardana-neutron-8.0+git.1590756744.ba84abc-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597249" comment="ardana-octavia-8.0+git.1590100427.cf4cc8f-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597250" comment="ardana-osconfig-8.0+git.1587034587.eac37b8-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597251" comment="caasp-openstack-heat-templates-1.0+git.1560518045.ad7dc6d-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597252" comment="documentation-suse-openstack-cloud-installation-8.20200527-1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597253" comment="documentation-suse-openstack-cloud-operations-8.20200527-1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597254" comment="documentation-suse-openstack-cloud-opsconsole-8.20200527-1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597255" comment="documentation-suse-openstack-cloud-planning-8.20200527-1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597256" comment="documentation-suse-openstack-cloud-security-8.20200527-1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597257" comment="documentation-suse-openstack-cloud-supplement-8.20200527-1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597258" comment="documentation-suse-openstack-cloud-upstream-admin-8.20200527-1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597259" comment="documentation-suse-openstack-cloud-upstream-user-8.20200527-1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597260" comment="documentation-suse-openstack-cloud-user-8.20200527-1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597261" comment="grafana-4.6.5-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597262" comment="kibana-4.6.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597263" comment="openstack-dashboard-12.0.5~dev3-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597264" comment="openstack-heat-templates-0.0.0+git.1582270132.8a20477-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597265" comment="openstack-keystone-12.0.4~dev11-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597266" comment="openstack-keystone-doc-12.0.4~dev11-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597267" comment="openstack-monasca-agent-2.2.6~dev4-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597268" comment="openstack-monasca-installer-20190923_16.32-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597269" comment="openstack-neutron-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597270" comment="openstack-neutron-dhcp-agent-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597271" comment="openstack-neutron-doc-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597272" comment="openstack-neutron-ha-tool-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597273" comment="openstack-neutron-l3-agent-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597274" comment="openstack-neutron-linuxbridge-agent-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597275" comment="openstack-neutron-macvtap-agent-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597276" comment="openstack-neutron-metadata-agent-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597277" comment="openstack-neutron-metering-agent-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597278" comment="openstack-neutron-openvswitch-agent-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597279" comment="openstack-neutron-server-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597280" comment="openstack-octavia-amphora-image-x86_64-0.1.4-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597281" comment="python-Django-1.11.23-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597282" comment="python-Flask-0.12.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597283" comment="python-GitPython-2.1.8-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597284" comment="python-Pillow-4.2.1-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597285" comment="python-amqp-2.4.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597286" comment="python-apicapi-1.6.0-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597287" comment="python-horizon-12.0.5~dev3-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597288" comment="python-keystone-12.0.4~dev11-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597289" comment="python-keystoneauth1-3.1.2~dev2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597290" comment="python-monasca-agent-2.2.6~dev4-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597291" comment="python-neutron-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597292" comment="python-oslo.messaging-5.30.8-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597293" comment="python-psutil-5.2.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597294" comment="python-pyroute2-0.4.21-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597295" comment="python-pysaml2-4.0.2-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597296" comment="python-tooz-1.58.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597297" comment="storm-1.1.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597298" comment="storm-nimbus-1.1.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597299" comment="storm-supervisor-1.1.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597300" comment="venv-openstack-aodh-x86_64-5.1.1~dev7-12.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597301" comment="venv-openstack-barbican-x86_64-5.0.2~dev3-12.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597302" comment="venv-openstack-ceilometer-x86_64-9.0.8~dev7-12.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597303" comment="venv-openstack-cinder-x86_64-11.2.3~dev23-14.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597304" comment="venv-openstack-designate-x86_64-5.0.3~dev7-12.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597305" comment="venv-openstack-freezer-x86_64-5.0.0.0~xrc2~dev2-10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597306" comment="venv-openstack-glance-x86_64-15.0.3~dev3-12.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597307" comment="venv-openstack-heat-x86_64-9.0.8~dev22-12.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597308" comment="venv-openstack-horizon-x86_64-12.0.5~dev3-14.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597309" comment="venv-openstack-ironic-x86_64-9.1.8~dev8-12.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597310" comment="venv-openstack-keystone-x86_64-12.0.4~dev11-11.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597311" comment="venv-openstack-magnum-x86_64-5.0.2_5.0.2_5.0.2~dev31-11.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597312" comment="venv-openstack-manila-x86_64-5.1.1~dev5-12.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597313" comment="venv-openstack-monasca-ceilometer-x86_64-1.5.1_1.5.1_1.5.1~dev3-8.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597314" comment="venv-openstack-monasca-x86_64-2.2.2~dev1-11.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597315" comment="venv-openstack-murano-x86_64-4.0.2~dev2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597316" comment="venv-openstack-neutron-x86_64-11.0.9~dev65-13.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597317" comment="venv-openstack-nova-x86_64-16.1.9~dev61-11.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597318" comment="venv-openstack-octavia-x86_64-1.0.6~dev3-12.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597319" comment="venv-openstack-sahara-x86_64-7.0.5~dev4-11.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597320" comment="venv-openstack-swift-x86_64-2.15.2_2.15.2_2.15.2~dev32-11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597321" comment="venv-openstack-trove-x86_64-8.0.2~dev2-11.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148285" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1109160" ref_url="https://bugzilla.suse.com/1109160" source="BUGZILLA"/>
		<reference ref_id="1118367" ref_url="https://bugzilla.suse.com/1118367" source="BUGZILLA"/>
		<reference ref_id="1118368" ref_url="https://bugzilla.suse.com/1118368" source="BUGZILLA"/>
		<reference ref_id="1171740" ref_url="https://bugzilla.suse.com/1171740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741/" source="CVE"/>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007135.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- Amended documentation referring to rule types 'krb5-subdomain'
  and 'ms-subdomain'. This incorrect documentation could mislead
  operators into believing that policies they had configured were 
  more restrictive than they actually were. [CVE-2018-5741]
- Further limit the number of queries that can be triggered from a
  request.  Root and TLD servers are no longer exempt from 
  max-recursion-queries. Fetches for missing name server address
  records are limited to 4 for any domain. [CVE-2020-8616]
- Replaying a TSIG BADTIME response as a request could trigger an
  assertion failure. [CVE-2020-8617]
  [bsc#1109160, bsc#1171740,
   CVE-2018-5741, bind-CVE-2018-5741.patch,
   CVE-2020-8616, bind-CVE-2020-8616.patch,
   CVE-2020-8617, bind-CVE-2020-8617.patch]

- Don't rely on /etc/insserv.conf anymore for proper dependencies
  against nss-lookup.target in named.service and lwresd.service
  (bsc#1118367 bsc#1118368)
- Using a drop-in file
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118367">SUSE bug 1118367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118368">SUSE bug 1118368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5741">CVE-2018-5741 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8616">CVE-2020-8616 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8617">CVE-2020-8617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531096" comment="bind-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531097" comment="bind-chrootenv-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531098" comment="bind-doc-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531099" comment="bind-libs-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531100" comment="bind-libs-32bit-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531101" comment="bind-utils-9.9.9P1-63.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148286" version="1" class="patch">
	<metadata>
		<title>Security update for python-ipaddress (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007151.html" source="SUSE-SU"/>
		<description>
This update for python-ipaddress fixes the following issues:

- Add CVE-2020-14422-ipaddress-hash-collision.patch fixing
  CVE-2020-14422 (bsc#1173274, bpo#41004), where hash collisions
  in IPv4Interface and IPv6Interface could lead to DOS. 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14422">CVE-2020-14422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498241" comment="python-ipaddress-1.0.18-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148287" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1173455" ref_url="https://bugzilla.suse.com/1173455" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007148.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-15049.patch: fixes a Cache Poisoning and Request Smuggling
  attack (CVE-2020-15049, bsc#1173455)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173455">SUSE bug 1173455</bugzilla>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15049">CVE-2020-15049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531103" comment="squid-3.5.21-26.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148288" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1113160" ref_url="https://bugzilla.suse.com/1113160" source="BUGZILLA"/>
		<reference ref_id="1134195" ref_url="https://bugzilla.suse.com/1134195" source="BUGZILLA"/>
		<reference ref_id="1138822" ref_url="https://bugzilla.suse.com/1138822" source="BUGZILLA"/>
		<reference ref_id="1141661" ref_url="https://bugzilla.suse.com/1141661" source="BUGZILLA"/>
		<reference ref_id="1142038" ref_url="https://bugzilla.suse.com/1142038" source="BUGZILLA"/>
		<reference ref_id="1143913" ref_url="https://bugzilla.suse.com/1143913" source="BUGZILLA"/>
		<reference ref_id="1148177" ref_url="https://bugzilla.suse.com/1148177" source="BUGZILLA"/>
		<reference ref_id="1153090" ref_url="https://bugzilla.suse.com/1153090" source="BUGZILLA"/>
		<reference ref_id="1153277" ref_url="https://bugzilla.suse.com/1153277" source="BUGZILLA"/>
		<reference ref_id="1154940" ref_url="https://bugzilla.suse.com/1154940" source="BUGZILLA"/>
		<reference ref_id="1154968" ref_url="https://bugzilla.suse.com/1154968" source="BUGZILLA"/>
		<reference ref_id="1155372" ref_url="https://bugzilla.suse.com/1155372" source="BUGZILLA"/>
		<reference ref_id="1163871" ref_url="https://bugzilla.suse.com/1163871" source="BUGZILLA"/>
		<reference ref_id="1165921" ref_url="https://bugzilla.suse.com/1165921" source="BUGZILLA"/>
		<reference ref_id="1168310" ref_url="https://bugzilla.suse.com/1168310" source="BUGZILLA"/>
		<reference ref_id="1170231" ref_url="https://bugzilla.suse.com/1170231" source="BUGZILLA"/>
		<reference ref_id="1170557" ref_url="https://bugzilla.suse.com/1170557" source="BUGZILLA"/>
		<reference ref_id="1171687" ref_url="https://bugzilla.suse.com/1171687" source="BUGZILLA"/>
		<reference ref_id="1172462" ref_url="https://bugzilla.suse.com/1172462" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10215" ref_url="https://www.suse.com/security/cve/CVE-2019-10215/" source="CVE"/>
		<reference ref_id="CVE-2019-15043" ref_url="https://www.suse.com/security/cve/CVE-2019-15043/" source="CVE"/>
		<reference ref_id="CVE-2020-12245" ref_url="https://www.suse.com/security/cve/CVE-2020-12245/" source="CVE"/>
		<reference ref_id="CVE-2020-13379" ref_url="https://www.suse.com/security/cve/CVE-2020-13379/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007159.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

cobbler:

- Calculate relative path for kernel and inited when generating
  grub entry (bsc#1170231)
  Added: fix-grub2-entry-paths.diff
- Fix os-release version detection for SUSE
  Modified: sles15.patch
- Jinja2 template library fix (bsc#1141661)
- Removes string replace for textmode fix (bsc#1134195)

golang-github-prometheus-node_exporter:

- Update to 0.18.1
  * [BUGFIX] Fix incorrect sysctl call in BSD meminfo collector, resulting in broken swap metrics on FreeBSD #1345
  * [BUGFIX] Fix rollover bug in mountstats collector #1364
  * Renamed interface label to device in netclass collector for consistency with
  * other network metrics #1224
  * The cpufreq metrics now separate the cpufreq and scaling data based on what the driver provides. #1248
  * The labels for the network_up metric have changed, see issue #1236
  * Bonding collector now uses mii_status instead of operstatus #1124
  * Several systemd metrics have been turned off by default to improve performance #1254
  * These include unit_tasks_current, unit_tasks_max, service_restart_total, and unit_start_time_seconds
  * The systemd collector blacklist now includes automount, device, mount, and slice units by default. #1255
  * [CHANGE] Bonding state uses mii_status #1124
  * [CHANGE] Add a limit to the number of in-flight requests #1166
  * [CHANGE] Renamed interface label to device in netclass collector #1224
  * [CHANGE] Add separate cpufreq and scaling metrics #1248
  * [CHANGE] Several systemd metrics have been turned off by default to improve performance #1254
  * [CHANGE] Expand systemd collector blacklist #1255
  * [CHANGE] Split cpufreq metrics into a separate collector #1253
  * [FEATURE] Add a flag to disable exporter metrics #1148
  * [FEATURE] Add kstat-based Solaris metrics for boottime, cpu and zfs collectors #1197
  * [FEATURE] Add uname collector for FreeBSD #1239
  * [FEATURE] Add diskstats collector for OpenBSD #1250
  * [FEATURE] Add pressure collector exposing pressure stall information for Linux #1174
  * [FEATURE] Add perf exporter for Linux #1274
  * [ENHANCEMENT] Add Infiniband counters #1120
  * [ENHANCEMENT] Add TCPSynRetrans to netstat default filter #1143
  * [ENHANCEMENT] Move network_up labels into new metric network_info #1236
  * [ENHANCEMENT] Use 64-bit counters for Darwin netstat
  * [BUGFIX] Add fallback for missing /proc/1/mounts #1172
  * [BUGFIX] Fix node_textfile_mtime_seconds to work properly on symlinks #1326
- Add network-online (Wants and After) dependency to systemd unit bsc#1143913

golang-github-prometheus-prometheus:

- Update change log and spec file
  + Modified spec file: default to golang 1.14 to avoid 'have choice' build issues in OBS. 
  + Rebase and update patches for version 2.18.0
  + Changed:  
    * 0002-Default-settings.patch Changed
- Update to 2.18.0 
  + Features 
    * Tracing: Added experimental Jaeger support #7148
  + Changes
    * Federation: Only use local TSDB for federation (ignore remote read). #7096
    * Rules: `rule_evaluations_total` and `rule_evaluation_failures_total` have a `rule_group` label now. #7094
  + Enhancements
    * TSDB: Significantly reduce WAL size kept around after a block cut. #7098
    * Discovery: Add `architecture` meta label for EC2. #7000
  + Bug fixes
    * UI: Fixed wrong MinTime reported by /status. #7182
    * React UI: Fixed multiselect legend on OSX. #6880
    * Remote Write: Fixed blocked resharding edge case. #7122
    * Remote Write: Fixed remote write not updating on relabel configs change. #7073
- Changes from 2.17.2
  + Bug fixes
    * Federation: Register federation metrics #7081
    * PromQL: Fix panic in parser error handling #7132
    * Rules: Fix reloads hanging when deleting a rule group that is being evaluated #7138
    * TSDB: Fix a memory leak when prometheus starts with an empty TSDB WAL #7135
    * TSDB: Make isolation more robust to panics in web handlers #7129 #7136
- Changes from 2.17.1
  + Bug fixes
    * TSDB: Fix query performance regression that increased memory and CPU usage #7051
- Changes from 2.17.0
  + Features 
    * TSDB: Support isolation #6841
    * This release implements isolation in TSDB. API queries and recording rules are
      guaranteed to only see full scrapes and full recording rules. This comes with a
      certain overhead in resource usage. Depending on the situation, there might be
      some increase in memory usage, CPU usage, or query latency.
  + Enhancements
    * PromQL: Allow more keywords as metric names #6933
    * React UI: Add normalization of localhost URLs in targets page #6794
    * Remote read: Read from remote storage concurrently #6770
    * Rules: Mark deleted rule series as stale after a reload #6745
    * Scrape: Log scrape append failures as debug rather than warn #6852
    * TSDB: Improve query performance for queries that partially hit the head #6676
    * Consul SD: Expose service health as meta label #5313
    * EC2 SD: Expose EC2 instance lifecycle as meta label #6914
    * Kubernetes SD: Expose service type as meta label for K8s service role #6684
    * Kubernetes SD: Expose label_selector and field_selector #6807
    * Openstack SD: Expose hypervisor id as meta label #6962
  + Bug fixes
    * PromQL: Do not escape HTML-like chars in query log #6834 #6795
    * React UI: Fix data table matrix values #6896
    * React UI: Fix new targets page not loading when using non-ASCII characters #6892
    * Remote read: Fix duplication of metrics read from remote storage with external labels #6967 #7018
    * Remote write: Register WAL watcher and live reader metrics for all remotes, not just the first one #6998
    * Scrape: Prevent removal of metric names upon relabeling #6891
    * Scrape: Fix 'superfluous response.WriteHeader call' errors when scrape fails under some circonstances #6986
    * Scrape: Fix crash when reloads are separated by two scrape intervals #7011
- Changes from 2.16.0
  + Features 
    * React UI: Support local timezone on /graph #6692
    * PromQL: add absent_over_time query function #6490
    * Adding optional logging of queries to their own file #6520
  + Enhancements
    * React UI: Add support for rules page and 'Xs ago' duration displays #6503
    * React UI: alerts page, replace filtering togglers tabs with checkboxes #6543
    * TSDB: Export metric for WAL write errors #6647
    * TSDB: Improve query performance for queries that only touch the most recent 2h of data. #6651
    * PromQL: Refactoring in parser errors to improve error messages #6634
    * PromQL: Support trailing commas in grouping opts #6480
    * Scrape: Reduce memory usage on reloads by reusing scrape cache #6670
    * Scrape: Add metrics to track bytes and entries in the metadata cache #6675
    * promtool: Add support for line-column numbers for invalid rules output #6533
    * Avoid restarting rule groups when it is unnecessary #6450
  + Bug fixes
    * React UI: Send cookies on fetch() on older browsers #6553
    * React UI: adopt grafana flot fix for stacked graphs #6603
    * React UI: broken graph page browser history so that back button works as expected #6659
    * TSDB: ensure compactionsSkipped metric is registered, and log proper error if one is returned from head.Init #6616
    * TSDB: return an error on ingesting series with duplicate labels #6664
    * PromQL: Fix unary operator precedence #6579
    * PromQL: Respect query.timeout even when we reach query.max-concurrency #6712
    * PromQL: Fix string and parentheses handling in engine, which affected React UI #6612
    * PromQL: Remove output labels returned by absent() if they are produced by multiple identical label matchers #6493
    * Scrape: Validate that OpenMetrics input ends with `# EOF` #6505
    * Remote read: return the correct error if configs can't be marshal'd to JSON #6622
    * Remote write: Make remote client `Store` use passed context, which can affect shutdown timing #6673
    * Remote write: Improve sharding calculation in cases where we would always be consistently behind by tracking pendingSamples #6511
    * Ensure prometheus_rule_group metrics are deleted when a rule group is removed #6693
- Changes from 2.15.2
  + Bug fixes
    * TSDB: Fixed support for TSDB blocks built with Prometheus before 2.1.0. #6564
    * TSDB: Fixed block compaction issues on Windows. #6547
- Changes from 2.15.1
  + Bug fixes
    * TSDB: Fixed race on concurrent queries against same data. #6512
- Changes from 2.15.0
  + Features 
    * API: Added new endpoint for exposing per metric metadata `/metadata`. #6420 #6442
  + Changes
    * Discovery: Removed `prometheus_sd_kubernetes_cache_*` metrics. Additionally `prometheus_sd_kubernetes_workqueue_latency_seconds` and `prometheus_sd_kubernetes_workqueue_work_duration_seconds` metrics now show correct values in seconds. #6393
    * Remote write: Changed `query` label on `prometheus_remote_storage_*` metrics to `remote_name` and `url`. #6043
  + Enhancements
    * TSDB: Significantly reduced memory footprint of loaded TSDB blocks. #6418 #6461
    * TSDB: Significantly optimized what we buffer during compaction which should result in lower memory footprint during compaction. #6422 #6452 #6468 #6475
    * TSDB: Improve replay latency. #6230
    * TSDB: WAL size is now used for size based retention calculation. #5886
    * Remote read: Added query grouping and range hints to the remote read request #6401
    * Remote write: Added `prometheus_remote_storage_sent_bytes_total` counter per queue. #6344
    * promql: Improved PromQL parser performance. #6356
    * React UI: Implemented missing pages like `/targets` #6276, TSDB status page #6281 #6267 and many other fixes and performance improvements.
    * promql: Prometheus now accepts spaces between time range and square bracket. e.g `[ 5m]` #6065  
  + Bug fixes
    * Config: Fixed alertmanager configuration to not miss targets when configurations are similar. #6455
    * Remote write: Value of `prometheus_remote_storage_shards_desired` gauge shows raw value of desired shards and it's updated correctly. #6378
    * Rules: Prometheus now fails the evaluation of rules and alerts where metric results collide with labels specified in `labels` field. #6469
    * API: Targets Metadata API `/targets/metadata` now accepts empty `match_targets` parameter as in the spec. #6303
- Changes from 2.14.0
  + Features 
    * API: `/api/v1/status/runtimeinfo` and `/api/v1/status/buildinfo` endpoints added for use by the React UI. #6243
    * React UI: implement the new experimental React based UI. #5694 and many more
      * Can be found by under `/new`.
      * Not all pages are implemented yet.
    * Status: Cardinality statistics added to the Runtime &amp; Build Information page. #6125
  + Enhancements
    * Remote write: fix delays in remote write after a compaction. #6021
    * UI: Alerts can be filtered by state. #5758
  + Bug fixes
    * Ensure warnings from the API are escaped. #6279
    * API: lifecycle endpoints return 403 when not enabled. #6057
    * Build: Fix Solaris build. #6149
    * Promtool: Remove false duplicate rule warnings when checking rule files with alerts. #6270
    * Remote write: restore use of deduplicating logger in remote write. #6113
    * Remote write: do not reshard when unable to send samples. #6111
    * Service discovery: errors are no longer logged on context cancellation. #6116, #6133
    * UI: handle null response from API properly. #6071
- Changes from 2.13.1
  + Bug fixes
    * Fix panic in ARM builds of Prometheus. #6110
    * promql: fix potential panic in the query logger. #6094
    * Multiple errors of http: superfluous response.WriteHeader call in the logs. #6145
- Changes from 2.13.0
  + Enhancements
    * Metrics: renamed prometheus_sd_configs_failed_total to prometheus_sd_failed_configs and changed to Gauge #5254
    * Include the tsdb tool in builds. #6089
    * Service discovery: add new node address types for kubernetes. #5902
    * UI: show warnings if query have returned some warnings. #5964
    * Remote write: reduce memory usage of the series cache. #5849
    * Remote read: use remote read streaming to reduce memory usage. #5703
    * Metrics: added metrics for remote write max/min/desired shards to queue manager. #5787
    * Promtool: show the warnings during label query. #5924
    * Promtool: improve error messages when parsing bad rules. #5965
    * Promtool: more promlint rules. #5515
  + Bug fixes
    * UI: Fix a Stored DOM XSS vulnerability with query history [CVE-2019-10215](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10215). #6098
    * Promtool: fix recording inconsistency due to duplicate labels. #6026
    * UI: fixes service-discovery view when accessed from unhealthy targets. #5915
    * Metrics format: OpenMetrics parser crashes on short input. #5939
    * UI: avoid truncated Y-axis values. #6014
- Changes from 2.12.0
  + Features 
    * Track currently active PromQL queries in a log file. #5794
    * Enable and provide binaries for `mips64` / `mips64le` architectures. #5792
  + Enhancements
    * Improve responsiveness of targets web UI and API endpoint. #5740
    * Improve remote write desired shards calculation. #5763
    * Flush TSDB pages more precisely. tsdb#660
    * Add `prometheus_tsdb_retention_limit_bytes` metric. tsdb#667
    * Add logging during TSDB WAL replay on startup. tsdb#662
    * Improve TSDB memory usage. tsdb#653, tsdb#643, tsdb#654, tsdb#642, tsdb#627
  + Bug fixes
    * Check for duplicate label names in remote read. #5829
    * Mark deleted rules' series as stale on next evaluation. #5759
    * Fix JavaScript error when showing warning about out-of-sync server time. #5833
    * Fix `promtool test rules` panic when providing empty `exp_labels`. #5774
    * Only check last directory when discovering checkpoint number. #5756
    * Fix error propagation in WAL watcher helper functions. #5741
    * Correctly handle empty labels from alert templates. #5845
- Update Uyuni/SUSE Manager service discovery patch
  + Modified 0003-Add-Uyuni-service-discovery.patch:
  + Adapt service discovery to the new Uyuni API endpoints
  + Modified spec file: force golang 1.12 to fix build issues in SLE15SP2
- Update to Prometheus 2.11.2

grafana:

- Update to version 7.0.3
  * Features / Enhancements
    - Stats: include all fields. #24829, @ryantxu
    - Variables: change VariableEditorList row action Icon to IconButton. #25217, @hshoff
  * Bug fixes
    - Cloudwatch: Fix dimensions of DDoSProtection. #25317, @papagian
    - Configuration: Fix env var override of sections containing hyphen. #25178, @marefr
    - Dashboard: Get panels in collapsed rows. #25079, @peterholmberg
    - Do not show alerts tab when alerting is disabled. #25285, @dprokop
    - Jaeger: fixes cascader option label duration value. #25129, @Estrax
    - Transformations: Fixed Transform tab crash &amp; no update after adding first transform. #25152, @torkelo
- Update to version 7.0.2
  * Bug fixes
    - Security: Urgent security patch release to fix CVE-2020-13379
- Update to version 7.0.1
  * Features / Enhancements
    - Datasource/CloudWatch: Makes CloudWatch Logs query history more readable. #24795, @kaydelaney
    - Download CSV: Add date and time formatting. #24992, @ryantxu
    - Table: Make last cell value visible when right aligned. #24921, @peterholmberg
    - TablePanel: Adding sort order persistance. #24705, @torkelo
    - Transformations: Display correct field name when using reduce transformation. #25068, @peterholmberg
    - Transformations: Allow custom number input for binary operations. #24752, @ryantxu
  * Bug fixes
    - Dashboard/Links: Fixes dashboard links by tags not working. #24773, @KamalGalrani
    - Dashboard/Links: Fixes open in new window for dashboard link. #24772, @KamalGalrani
    - Dashboard/Links: Variables are resolved and limits to 100. #25076, @hugohaggmark
    - DataLinks: Bring back variables interpolation in title. #24970, @dprokop
    - Datasource/CloudWatch: Field suggestions no longer limited to prefix-only. #24855, @kaydelaney
    - Explore/Table: Keep existing field types if possible. #24944, @kaydelaney
    - Explore: Fix wrap lines toggle for results of queries with filter expression. #24915, @ivanahuckova
    - Explore: fix undo in query editor. #24797, @zoltanbedi
    - Explore: fix word break in type head info. #25014, @zoltanbedi
    - Graph: Legend decimals now work as expected. #24931, @torkelo
    - LoginPage: Fix hover color for service buttons. #25009, @tskarhed
    - LogsPanel: Fix scrollbar. #24850, @ivanahuckova
    - MoveDashboard: Fix for moving dashboard caused all variables to be lost. #25005, @torkelo
    - Organize transformer: Use display name in field order comparer. #24984, @dprokop
    - Panel: shows correct panel menu items in view mode. #24912, @hugohaggmark
    - PanelEditor Fix missing labels and description if there is only single option in category. #24905, @dprokop
    - PanelEditor: Overrides name matcher still show all original field names even after Field default display name is specified. #24933, @torkelo
    - PanelInspector: Makes sure Data display options are visible. #24902, @hugohaggmark
    - PanelInspector: Hides unsupported data display options for Panel type. #24918, @hugohaggmark
    - PanelMenu: Make menu disappear on button press. #25015, @tskarhed
    - Postgres: Fix add button. #25087, @phemmer
    - Prometheus: Fix recording rules expansion. #24977, @ivanahuckova
    - Stackdriver: Fix creating Service Level Objectives (SLO) datasource query variable. #25023, @papagian
- Update to version 7.0.0 
  * Breaking changes
    - Removed PhantomJS: PhantomJS was deprecated in Grafana v6.4 and starting from Grafana v7.0.0, all PhantomJS support has been removed. This means that Grafana no longer ships with a built-in image renderer, and we advise you to install the Grafana Image Renderer plugin.
    - Dashboard: A global minimum dashboard refresh interval is now enforced and defaults to 5 seconds.
    - Interval calculation: There is now a new option Max data points that controls the auto interval $__interval calculation. Interval was previously calculated by dividing the panel width by the time range. With the new max data points option it is now easy to set $__interval to a dynamic value that is time range agnostic. For example if you set Max data points to 10 Grafana will dynamically set $__interval by dividing the current time range by 10.
    - Datasource/Loki: Support for deprecated Loki endpoints has been removed.
    - Backend plugins: Grafana now requires backend plugins to be signed, otherwise Grafana will not load/start them. This is an additional security measure to make sure backend plugin binaries and files haven't been tampered with. Refer to Upgrade Grafana for more information.
    - @grafana/ui: Forms migration notice, see @grafana/ui changelog
    - @grafana/ui: Select API change for creating custom values, see @grafana/ui changelog
    + Deprecation warnings
      - Scripted dashboards is now deprecated. The feature is not removed but will be in a future release. We hope to address the underlying requirement of dynamic dashboards in a different way. #24059
      - The unofficial first version of backend plugins together with usage of grafana/grafana-plugin-model is now deprecated and support for that will be removed in a future release. Please refer to backend plugins documentation for information about the new officially supported backend plugins.
  * Features / Enhancements
    - Backend plugins: Log deprecation warning when using the unofficial first version of backend plugins. #24675, @marefr
    - Editor: New line on Enter, run query on Shift+Enter. #24654, @davkal
    - Loki: Allow multiple derived fields with the same name. #24437, @aocenas
    - Orgs: Add future deprecation notice. #24502, @torkelo
  * Bug Fixes
    - @grafana/toolkit: Use process.cwd() instead of PWD to get directory. #24677, @zoltanbedi
    - Admin: Makes long settings values line break in settings page. #24559, @hugohaggmark
    - Dashboard: Allow editing provisioned dashboard JSON and add confirmation when JSON is copied to dashboard. #24680, @dprokop
    - Dashboard: Fix for strange 'dashboard not found' errors when opening links in dashboard settings. #24416, @torkelo
    - Dashboard: Fix so default data source is selected when data source can't be found in panel editor. #24526, @mckn
    - Dashboard: Fixed issue changing a panel from transparent back to normal in panel editor. #24483, @torkelo
    - Dashboard: Make header names reflect the field name when exporting to CSV file from the the panel inspector. #24624, @peterholmberg
    - Dashboard: Make sure side pane is displayed with tabs by default in panel editor. #24636, @dprokop
    - Data source: Fix query/annotation help content formatting. #24687, @AgnesToulet
    - Data source: Fixes async mount errors. #24579, @Estrax
    - Data source: Fixes saving a data source without failure when URL doesn't specify a protocol. #24497, @aknuds1
    - Explore/Prometheus: Show results of instant queries only in table. #24508, @ivanahuckova
    - Explore: Fix rendering of react query editors. #24593, @ivanahuckova
    - Explore: Fixes loading more logs in logs context view. #24135, @Estrax
    - Graphite: Fix schema and dedupe strategy in rollup indicators for Metrictank queries. #24685, @torkelo
    - Graphite: Makes query annotations work again. #24556, @hugohaggmark
    - Logs: Clicking 'Load more' from context overlay doesn't expand log row. #24299, @kaydelaney
    - Logs: Fix total bytes process calculation. #24691, @davkal
    - Org/user/team preferences: Fixes so UI Theme can be set back to Default. #24628, @AgnesToulet
    - Plugins: Fix manifest validation. #24573, @aknuds1
    - Provisioning: Use proxy as default access mode in provisioning. #24669, @bergquist
    - Search: Fix select item when pressing enter and Grafana is served using a sub path. #24634, @tskarhed
    - Search: Save folder expanded state. #24496, @Clarity-89
    - Security: Tag value sanitization fix in OpenTSDB data source. #24539, @rotemreiss
    - Table: Do not include angular options in options when switching from angular panel. #24684, @torkelo
    - Table: Fixed persisting column resize for time series fields. #24505, @torkelo
    - Table: Fixes Cannot read property subRows of null. #24578, @hugohaggmark
    - Time picker: Fixed so you can enter a relative range in the time picker without being converted to absolute range. #24534, @mckn
    - Transformations: Make transform dropdowns not cropped. #24615, @dprokop
    - Transformations: Sort order should be preserved as entered by user when using the reduce transformation. #24494, @hugohaggmark
    - Units: Adds scale symbol for currencies with suffixed symbol. #24678, @hugohaggmark
    - Variables: Fixes filtering options with more than 1000 entries. #24614, @hugohaggmark
    - Variables: Fixes so Textbox variables read value from url. #24623, @hugohaggmark
    - Zipkin: Fix error when span contains remoteEndpoint. #24524, @aocenas
    - SAML: Switch from email to login for user login attribute mapping (Enterprise)
- Update Makefile and spec file
  * Remove phantomJS patch from Makefile 
  * Fix multiline strings in Makefile
  * Exclude s390 from SLE12 builds, golang 1.14 is not built for s390
- Add instructions for patching the Grafana javascript frontend.
- BuildRequires golang(API) instead of go metapackage version range
  * BuildRequires:  golang(API) &gt;= 1.14   from
    BuildRequires:  ( go &gt;= 1.14 with go &lt; 1.15 )
- Update to version 6.7.3
  - This version fixes bsc#1170557 and its corresponding CVE-2020-12245
  - Admin: Fix Synced via LDAP message for non-LDAP external users. #23477, @alexanderzobnin
  - Alerting: Fixes notifications for alerts with empty message in Google Hangouts notifier. #23559, @hugohaggmark
  - AuthProxy: Fixes bug where long username could not be cached.. #22926, @jcmcken
  - Dashboard: Fix saving dashboard when editing raw dashboard JSON model. #23314, @peterholmberg
  - Dashboard: Try to parse 8 and 15 digit numbers as timestamps if parsing of time range as date fails. #21694, @jessetan
  - DashboardListPanel: Fixed problem with empty panel after going into edit mode (General folder filter being automatically added) . #23426, @torkelo
  - Data source: Handle datasource withCredentials option properly. #23380, @hvtuananh
  - Security: Fix annotation popup XSS vulnerability. #23813, @torkelo
  - Server: Exit Grafana with status code 0 if no error. #23312, @aknuds1
  - TablePanel: Fix XSS issue in header column rename (backport). #23814, @torkelo
  - Variables: Fixes error when setting adhoc variable values. #23580, @hugohaggmark
- Update to version 6.7.2:
  (see installed changelog for the full list of changes)
  -  BackendSrv: Adds config to response to fix issue for external plugins that used this property . #23032, @torkelo
  -  Dashboard: Fixed issue with saving new dashboard after changing title . #23104, @dprokop
  -  DataLinks: make sure we use the correct datapoint when dataset contains null value.. #22981, @mckn
  -  Plugins: Fixed issue for plugins that imported dateMath util . #23069, @mckn
  -  Security: Fix for dashboard snapshot original dashboard link could contain XSS vulnerability in url. #23254, @torkelo
  -  Variables: Fixes issue with too many queries being issued for nested template variables after value change. #23220, @torkelo
  -  Plugins: Expose promiseToDigest. #23249, @torkelo
  -  Reporting (Enterprise): Fixes issue updating a report created by someone else
- Update to 6.7.1:
  (see installed changelog for the full list of changes)
  Bug Fixes
  - Azure: Fixed dropdowns not showing current value. #22914, @torkelo
  - BackendSrv: only add content-type on POST, PUT requests. #22910, @hugohaggmark
  - Panels: Fixed size issue with panel internal size when exiting panel edit mode. #22912, @torkelo
  - Reporting: fixes migrations compatibility with mysql (Enterprise)
  - Reporting: Reduce default concurrency limit to 4 (Enterprise)
- Update to 6.7.0:
  (see installed changelog for the full list of changes)
  Bug Fixes
  - AngularPanels: Fixed inner height calculation for angular panels . #22796, @torkelo
  - BackendSrv: makes sure provided headers are correctly recognized and set. #22778, @hugohaggmark
  - Forms: Fix input suffix position (caret-down in Select) . #22780, @torkelo
  - Graphite: Fixed issue with query editor and next select metric now showing after selecting metric node . #22856, @torkelo
  - Rich History: UX adjustments and fixes. #22729, @ivanahuckova
- Update to 6.7.0-beta1:
  Breaking changes
  -  Slack: Removed Mention setting and instead introduce Mention Users, Mention Groups, and Mention Channel. The first two settings require user and group IDs, respectively. This change was necessary because the way of mentioning via the Slack API changed and mentions in Slack notifications no longer worked.
  -  Alerting: Reverts the behavior of diff and percent_diff to not always be absolute. Something we introduced by mistake in 6.1.0. Alerting now support diff(), diff_abs(), percent_diff() and percent_diff_abs(). #21338
  - Notice about changes in backendSrv for plugin authors
    In our mission to migrate away from AngularJS to React we have removed all AngularJS dependencies in the core data retrieval service backendSrv.
    Removing the AngularJS dependencies in backendSrv has the unfortunate side effect of AngularJS digest no longer being triggered for any request made with backendSrv. Because of this, external plugins using backendSrv directly may suffer from strange behaviour in the UI.
    To remedy this issue, as a plugin author you need to trigger the digest after a direct call to backendSrv.
  Bug Fixes
    API: Fix redirect issues. #22285, @papagian
    Alerting: Don't include image_url field with Slack message if empty. #22372, @aknuds1
    Alerting: Fixed bad background color for default notifications in alert tab . #22660, @krvajal
    Annotations: In table panel when setting transform to annotation, they will now show up right away without a manual refresh. #22323, @krvajal
    Azure Monitor: Fix app insights source to allow for new __timeFrom and __timeTo. #21879, @ChadNedzlek
    BackendSrv: Fixes POST body for form data. gmark
    CloudWatch: Credentials cache invalidation fix. #22473, @sunker
    CloudWatch: Expand alias variables when query yields no result. #22695, @sunker
    Dashboard: Fix bug with NaN in alerting. #22053, @a-melnyk
    Explore: Fix display of multiline logs in log panel and explore. #22057, @thomasdraebing
    Heatmap: Legend color range is incorrect when using custom min/max. #21748, @sv5d
    Security: Fixed XSS issue in dashboard history diff . #22680, @torkelo
    StatPanel: Fixes base color is being used for null values .
    #22646, @torkelo
- Update to version 6.6.2:
  (see installed changelog for the full list of changes)
- Update to version 6.6.1:
  (see installed changelog for the full list of changes)
- Update to version 6.6.0:
  (see installed changelog for the full list of changes)
- Update to version 6.5.3:
  (see installed changelog for the full list of changes)
- Update to version 6.5.2:
  (see installed changelog for the full list of changes)
- Update to version 6.5.1:
  (see installed changelog for the full list of changes)
- Update to version 6.5.0
  (see installed changelog for the full list of changes)
- Update to version 6.4.5:
  * Create version 6.4.5
  * CloudWatch: Fix high CPU load (#20579)
- Add obs-service-go_modules to download required modules into vendor.tar.gz
- Adjusted spec file to use vendor.tar.gz
- Adjusted Makefile to work with new filenames
- BuildRequire go1.14
- Update to version 6.4.4:
  * DataLinks: Fix blur issues. #19883, @aocenas
  * Docker: Makes it possible to parse timezones in the docker image. #20081, @xlson
  * LDAP: All LDAP servers should be tried even if one of them returns a connection error. #20077, @jongyllen
  * LDAP: No longer shows incorrectly matching groups based on role in debug page. #20018, @xlson
  * Singlestat: Fix no data / null value mapping . #19951, @ryantxu
- Revert the spec file and make script
- Remove PhantomJS dependency
- Update to 6.4.3
  * Bug Fixes
    - Alerting: All notification channels should send even if one fails to send. #19807, @jan25
    - AzureMonitor: Fix slate interference with dropdowns. #19799, @aocenas
    - ContextMenu: make ContextMenu positioning aware of the viewport width. #19699, @krvajal
    - DataLinks: Fix context menu not showing in singlestat-ish visualisations. #19809, @dprokop
    - DataLinks: Fix url field not releasing focus. #19804, @aocenas
    - Datasource: Fixes clicking outside of some query editors required 2 clicks. #19822, @aocenas
    - Panels: Fixes default tab for visualizations without Queries Tab. #19803, @hugohaggmark
    - Singlestat: Fixed issue with mapping null to text. #19689, @torkelo
    - @grafana/toolkit: Don't fail plugin creation when git user.name config is not set. #19821, @dprokop
    - @grafana/toolkit: TSLint line number off by 1. #19782, @fredwangwang
- Update to 6.4.2
  * Bug Fixes
    - CloudWatch: Changes incorrect dimension wmlid to wlmid . #19679, @ATTron
    - Grafana Image Renderer: Fixes plugin page. #19664, @hugohaggmark
    - Graph: Fixes auto decimals logic for y axis ticks that results in too many decimals for high values. #19618, @torkelo
    - Graph: Switching to series mode should re-render graph. #19623, @torkelo
    - Loki: Fix autocomplete on label values. #19579, @aocenas
    - Loki: Removes live option for logs panel. #19533, @davkal
    - Profile: Fix issue with user profile not showing more than sessions sessions in some cases. #19578, @huynhsamha
    - Prometheus: Fixes so results in Panel always are sorted by query order. #19597, @hugohaggmark
    - sted keys in YAML provisioning caused a server crash, #19547
    - ImageRendering: Fixed issue with image rendering in enterprise build (Enterprise)
    - Reporting: Fixed issue with reporting service when STMP was disabled (Enterprise).
- Changes from 6.4.0
  * Features / Enhancements
    - Build: Upgrade go to 1.12.10. #19499, @marefr
    - DataLinks: Suggestions menu improvements. #19396, @dprokop
    - Explore: Take root_url setting into account when redirecting from dashboard to explore. #19447, @ivanahuckova
    - Explore: Update broken link to logql docs. #19510, @ivanahuckova
    - Logs: Adds Logs Panel as a visualization. #19504, @davkal
  * Bug Fixes
    - CLI: Fix version selection for plugin install. #19498, @aocenas
    - Graph: Fixes minor issue with series override color picker and custom color . #19516, @torkelo
- Changes from 6.4.0 Beta 2
  * Features / Enhancements
    - Azure Monitor: Remove support for cross resource queries (#19115)'. #19346, @sunker
    - Docker: Upgrade packages to resolve reported vulnerabilities. #19188, @marefr
    - Graphite: Time range expansion reduced from 1 minute to 1 second. #19246, @torkelo
    - grafana/toolkit: Add plugin creation task. #19207, @dprokop
  * Bug Fixes
    - Alerting: Prevents creating alerts from unsupported queries. #19250, @hugohaggmark
    - Alerting: Truncate PagerDuty summary when greater than 1024 characters. #18730, @nvllsvm
    - Cloudwatch: Fix autocomplete for Gamelift dimensions. #19146, @kevinpz
    - Dashboard: Fix export for sharing when panels use default data source. #19315, @torkelo
    - Database: Rewrite system statistics query to perform better. #19178, @papagian
    - Gauge/BarGauge: Fix issue with [object Object] in titles . #19217, @ryantxu
    - MSSQL: Revert usage of new connectionstring format introduced by #18384. #19203, @marefr
    - Multi-LDAP: Do not fail-fast on invalid credentials. #19261, @gotjosh
    - MySQL, Postgres, MSSQL: Fix validating query with template variables in alert . #19237, @marefr
    - MySQL, Postgres: Update raw sql when query builder updates. #19209, @marefr
    - MySQL: Limit datasource error details returned from the backend. #19373, @marefr
- Changes from 6.4.0 Beta 1
  * Features / Enhancements
    - API: Readonly datasources should not be created via the API. #19006, @papagian
    - Alerting: Include configured AlertRuleTags in Webhooks notifier. #18233, @dominic-miglar
    - Annotations: Add annotations support to Loki. #18949, @aocenas
    - Annotations: Use a single row to represent a region. #17673, @ryantxu
    - Auth: Allow inviting existing users when login form is disabled. #19048, @548017
    - Azure Monitor: Add support for cross resource queries. #19115, @sunker
    - CLI: Allow installing custom binary plugins. #17551, @aocenas
    - Dashboard: Adds Logs Panel (alpha) as visualization option for Dashboards. #18641, @hugohaggmark
    - Dashboard: Reuse query results between panels . #16660, @ryantxu
    - Dashboard: Set time to to 23:59:59 when setting To time using calendar. #18595, @simPod
    - DataLinks: Add DataLinks support to Gauge, BarGauge and SingleStat2 panel. #18605, @ryantxu
    - DataLinks: Enable access to labels &amp; field names. #18918, @torkelo
    - DataLinks: Enable multiple data links per panel. #18434, @dprokop
    - Docker: switch docker image to alpine base with phantomjs support. #18468, @DanCech
    - Elasticsearch: allow templating queries to order by doc_count. #18870, @hackery
    - Explore: Add throttling when doing live queries. #19085, @aocenas
    - Explore: Adds ability to go back to dashboard, optionally with query changes. #17982, @kaydelaney
    - Explore: Reduce default time range to last hour. #18212, @davkal
    - Gauge/BarGauge: Support decimals for min/max. #18368, @ryantxu
    - Graph: New series override transform constant that renders a single point as a line across the whole graph. #19102, @davkal
    - Image rendering: Add deprecation warning when PhantomJS is used for rendering images. #18933, @papagian
    - InfluxDB: Enable interpolation within ad-hoc filter values. #18077, @kvc-code
    - LDAP: Allow an user to be synchronized against LDAP. #18976, @gotjosh
    - Ldap: Add ldap debug page. #18759, @peterholmberg
    - Loki: Remove prefetching of default label values. #18213, @davkal
    - Metrics: Add failed alert notifications metric. #18089, @koorgoo
    - OAuth: Support JMES path lookup when retrieving user email. #14683, @bobmshannon
    - OAuth: return GitLab groups as a part of user info (enable team sync). #18388, @alexanderzobnin
    - Panels: Add unit for electrical charge - ampere-hour. #18950, @anirudh-ramesh
    - Plugin: AzureMonitor - Reapply MetricNamespace support. #17282, @raphaelquati
    - Plugins: better warning when plugins fail to load. #18671, @ryantxu
    - Postgres: Add support for scram sha 256 authentication. #18397, @nonamef
    - RemoteCache: Support SSL with Redis. #18511, @kylebrandt
    - SingleStat: The gauge option in now disabled/hidden (unless it's an old panel with it already enabled) . #18610, @ryantxu
    - Stackdriver: Add extra alignment period options. #18909, @sunker
    - Units: Add South African Rand (ZAR) to currencies. #18893, @jeteon
    - Units: Adding T,P,E,Z,and Y bytes. #18706, @chiqomar
  * Bug Fixes
    - Alerting: Notification is sent when state changes from no_data to ok. #18920, @papagian
    - Alerting: fix duplicate alert states when the alert fails to save to the database. #18216, @kylebrandt
    - Alerting: fix response popover prompt when add notification channels. #18967, @lzdw
    - CloudWatch: Fix alerting for queries with Id (using GetMetricData). #17899, @alex-berger
    - Explore: Fix auto completion on label values for Loki. #18988, @aocenas
    - Explore: Fixes crash using back button with a zoomed in graph. #19122, @hugohaggmark
    - Explore: Fixes so queries in Explore are only run if Graph/Table is shown. #19000, @hugohaggmark
    - MSSQL: Change connectionstring to URL format to fix using passwords with semicolon. #18384, @Russiancold
    - MSSQL: Fix memory leak when debug enabled. #19049, @briangann
    - Provisioning: Allow escaping literal '$' with '$$' in configs to avoid interpolation. #18045, @kylebrandt
    - TimePicker: Fixes hiding time picker dropdown in FireFox. #19154, @hugohaggmark
  * Breaking changes
    + Annotations
      There are some breaking changes in the annotations HTTP API for region annotations. Region annotations are now represented
      using a single event instead of two seperate events. Check breaking changes in HTTP API below and HTTP API documentation for more details.
    + Docker
      Grafana is now using Alpine 3.10 as docker base image.
    + HTTP API
      - GET /api/alert-notifications now requires at least editor access.
        New /api/alert-notifications/lookup returns less information than /api/alert-notifications and can be access by any authenticated user.
      - GET /api/alert-notifiers now requires at least editor access
      - GET /api/org/users now requires org admin role.
        New /api/org/users/lookup returns less information than /api/org/users and can be access by users that are org admins,
        admin in any folder or admin of any team.
      - GET /api/annotations no longer returns regionId property.
      - POST /api/annotations no longer supports isRegion property.
      - PUT /api/annotations/:id no longer supports isRegion property.
      - PATCH /api/annotations/:id no longer supports isRegion property.
      - DELETE /api/annotations/region/:id has been removed.
  * Deprecation notes
    + PhantomJS
      - PhantomJS, which is used for rendering images of dashboards and panels,
        is deprecated and will be removed in a future Grafana release.
        A deprecation warning will from now on be logged when Grafana starts up if PhantomJS is in use.
        Please consider migrating from PhantomJS to the Grafana Image Renderer plugin.
- Changes from 6.3.6
  * Features / Enhancements
    - Metrics: Adds setting for turning off total stats metrics. #19142, @marefr
  * Bug Fixes
    - Database: Rewrite system statistics query to perform better. #19178, @papagian
    - Explore: Fixes error when switching from prometheus to loki data sources. #18599, @kaydelaney
- Rebase package spec. Use mostly from fedora, fix suse specified things and fix some errors.
- Add missing directories provisioning/datasources and provisioning/notifiers
  and sample.yaml as described in packaging/rpm/control from upstream.
  Missing directories are shown in logfiles.
- Version 6.3.5
  * Upgrades
    + Build: Upgrade to go 1.12.9.
  * Bug Fixes
    + Dashboard: Fixes dashboards init failed loading error for dashboards with panel links that had missing properties.
    + Editor: Fixes issue where only entire lines were being copied.
    + Explore: Fixes query field layout in splitted view for Safari browsers.
    + LDAP: multildap + ldap integration.
    + Profile/UserAdmin: Fix for user agent parser crashes grafana-server on 32-bit builds.
    + Prometheus: Prevents panel editor crash when switching to Prometheus datasource.
    + Prometheus: Changes brace-insertion behavior to be less annoying.
- Version 6.3.4
  * Security: CVE-2019-15043 - Parts of the HTTP API allow unauthenticated use.
- Version 6.3.3
  * Bug Fixes
    + Annotations: Fix failing annotation query when time series query is cancelled. #18532 1, @dprokop 1
    + Auth: Do not set SameSite cookie attribute if cookie_samesite is none. #18462 1, @papagian 3
    + DataLinks: Apply scoped variables to data links correctly. #18454 1, @dprokop 1
    + DataLinks: Respect timezone when displaying datapoint’s timestamp in graph context menu. #18461 2, @dprokop 1
    + DataLinks: Use datapoint timestamp correctly when interpolating variables. #18459 1, @dprokop 1
    + Explore: Fix loading error for empty queries. #18488 1, @davkal
    + Graph: Fixes legend issue clicking on series line icon and issue with horizontal scrollbar being visible on windows. #18563 1, @torkelo 2
    + Graphite: Avoid glob of single-value array variables . #18420, @gotjosh
    + Prometheus: Fix queries with label_replace remove the $1 match when loading query editor. #18480 5, @hugohaggmark 3
    + Prometheus: More consistently allows for multi-line queries in editor. #18362 2, @kaydelaney 2
    + TimeSeries: Assume values are all numbers. #18540 4, @ryantxu
- Version 6.3.2
  * Bug Fixes
    + Gauge/BarGauge: Fixes issue with losts thresholds and issue loading Gauge with avg stat. #18375 12
- Version 6.3.1
  * Bug Fixes
    + PanelLinks: Fix crash issue Gauge &amp; Bar Gauge for panels with panel links (drill down links). #18430 2
- Version 6.3.0
  * Features / Enhancements
    + OAuth: Do not set SameSite OAuth cookie if cookie_samesite is None. #18392 4, @papagian 3
    + Auth Proxy: Include additional headers as part of the cache key. #18298 6, @gotjosh
    + Build grafana images consistently. #18224 12, @hassanfarid
    + Docs: SAML. #18069 11, @gotjosh
    + Permissions: Show plugins in nav for non admin users but hide plugin configuration. #18234 1, @aocenas
    + TimePicker: Increase max height of quick range dropdown. #18247 2, @torkelo 2
    + Alerting: Add tags to alert rules. #10989 13, @Thib17 1
    + Alerting: Attempt to send email notifications to all given email addresses. #16881 1, @zhulongcheng
    + Alerting: Improve alert rule testing. #16286 2, @marefr
    + Alerting: Support for configuring content field for Discord alert notifier. #17017 2, @jan25
    + Alertmanager: Replace illegal chars with underscore in label names. #17002 5, @bergquist 1
    + Auth: Allow expiration of API keys. #17678, @papagian 3
    + Auth: Return device, os and browser when listing user auth tokens in HTTP API. #17504, @shavonn 1
    + Auth: Support list and revoke of user auth tokens in UI. #17434 2, @shavonn 1
    + AzureMonitor: change clashing built-in Grafana variables/macro names for Azure Logs. #17140, @shavonn 1
    + CloudWatch: Made region visible for AWS Cloudwatch Expressions. #17243 2, @utkarshcmu
    + Cloudwatch: Add AWS DocDB metrics. #17241, @utkarshcmu
    + Dashboard: Use timezone dashboard setting when exporting to CSV. #18002 1, @dehrax
    + Data links. #17267 11, @torkelo 2
    + Docker: Switch base image to ubuntu:latest from debian:stretch to avoid security issues… #17066 5, @bergquist 1
    + Elasticsearch: Support for visualizing logs in Explore . #17605 7, @marefr
    + Explore: Adds Live option for supported datasources. #17062 1, @hugohaggmark 3
    + Explore: Adds orgId to URL for sharing purposes. #17895 1, @kaydelaney 2
    + Explore: Adds support for new loki ‘start’ and ‘end’ params for labels endpoint. #17512, @kaydelaney 2
    + Explore: Adds support for toggling raw query mode in explore. #17870, @kaydelaney 2
    + Explore: Allow switching between metrics and logs . #16959 2, @marefr
    + Explore: Combines the timestamp and local time columns into one. #17775, @hugohaggmark 3
    + Explore: Display log lines context . #17097, @dprokop 1
    + Explore: Don’t parse log levels if provided by field or label. #17180 1, @marefr
    + Explore: Improves performance of Logs element by limiting re-rendering. #17685, @kaydelaney 2
    + Explore: Support for new LogQL filtering syntax. #16674 4, @davkal
    + Explore: Use new TimePicker from Grafana/UI. #17793, @hugohaggmark 3
    + Explore: handle newlines in LogRow Highlighter. #17425, @rrfeng 1
    + Graph: Added new fill gradient option. #17528 3, @torkelo 2
    + GraphPanel: Don’t sort series when legend table &amp; sort column is not visible . #17095, @shavonn 1
    + InfluxDB: Support for visualizing logs in Explore. #17450 9, @hugohaggmark 3
    + Logging: Login and Logout actions (#17760). #17883 1, @ATTron
    + Logging: Move log package to pkg/infra. #17023, @zhulongcheng
    + Metrics: Expose stats about roles as metrics. #17469 2, @bergquist 1
    + MySQL/Postgres/MSSQL: Add parsing for day, weeks and year intervals in macros. #13086 6, @bernardd
    + MySQL: Add support for periodically reloading client certs. #14892, @tpetr
    + Plugins: replace dataFormats list with skipDataQuery flag in plugin.json. #16984, @ryantxu
    + Prometheus: Take timezone into account for step alignment. #17477, @fxmiii
    + Prometheus: Use overridden panel range for $__range instead of dashboard range. #17352, @patrick246
    + Prometheus: added time range filter to series labels query. #16851 3, @FUSAKLA
    + Provisioning: Support folder that doesn’t exist yet in dashboard provisioning. #17407 1, @Nexucis
    + Refresh picker: Handle empty intervals. #17585 1, @dehrax
    + Singlestat: Add y min/max config to singlestat sparklines. #17527 4, @pitr
    + Snapshot: use given key and deleteKey. #16876, @zhulongcheng
    + Templating: Correctly display __text in multi-value variable after page reload. #17840 1, @EduardSergeev
    + Templating: Support selecting all filtered values of a multi-value variable. #16873 2, @r66ad
    + Tracing: allow propagation with Zipkin headers. #17009 4, @jrockway
    + Users: Disable users removed from LDAP. #16820 2, @alexanderzobnin
  * Bug Fixes
    + PanelLinks: Fix render issue when there is no panel description. #18408 3, @dehrax
    + OAuth: Fix “missing saved state” OAuth login failure due to SameSite cookie policy. #18332 1, @papagian 3
    + cli: fix for recognizing when in dev mode… #18334, @xlson
    + DataLinks: Fixes incorrect interpolation of ${__series_name} . #18251 1, @torkelo 2
    + Loki: Display live tailed logs in correct order in Explore. #18031 3, @kaydelaney 2
    + PhantomJS: Fixes rendering on Debian Buster. #18162 2, @xlson
    + TimePicker: Fixed style issue for custom range popover. #18244, @torkelo 2
    + Timerange: Fixes a bug where custom time ranges didn’t respect UTC. #18248 1, @kaydelaney 2
    + remote_cache: Fix redis connstr parsing. #18204 1, @mblaschke
    + AddPanel: Fix issue when removing moved add panel widget . #17659 2, @dehrax
    + CLI: Fix encrypt-datasource-passwords fails with sql error. #18014, @marefr
    + Elasticsearch: Fix default max concurrent shard requests. #17770 4, @marefr
    + Explore: Fix browsing back to dashboard panel. #17061, @jschill
    + Explore: Fix filter by series level in logs graph. #17798, @marefr
    + Explore: Fix issues when loading and both graph/table are collapsed. #17113, @marefr
    + Explore: Fix selection/copy of log lines. #17121, @marefr
    + Fix: Wrap value of multi variable in array when coming from URL. #16992 1, @aocenas
    + Frontend: Fix for Json tree component not working. #17608, @srid12
    + Graphite: Fix for issue with alias function being moved last. #17791, @torkelo 2
    + Graphite: Fixes issue with seriesByTag &amp; function with variable param. #17795, @torkelo 2
    + Graphite: use POST for /metrics/find requests. #17814 2, @papagian 3
    + HTTP Server: Serve Grafana with a custom URL path prefix. #17048 6, @jan25
    + InfluxDB: Fixes single quotes are not escaped in label value filters. #17398 1, @Panzki
    + Prometheus: Correctly escape ‘|’ literals in interpolated PromQL variables. #16932, @Limess
    + Prometheus: Fix when adding label for metrics which contains colons in Explore. #16760, @tolwi
    + SinglestatPanel: Remove background color when value turns null. #17552 1, @druggieri
- Make phantomjs dependency configurable
- Create plugin directory and clean up (create in %install,
  add to %files) handling of /var/lib/grafana/* and

mgr-cfg:

- Remove commented code in test files
- Replace spacewalk-usix with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)
- Add mgr manpage links

mgr-custom-info:

- Bump version to 4.1.0 (bsc#1154940)

mgr-daemon:

- Bump version to 4.1.0 (bsc#1154940)
- Fix systemd timer configuration on SLE12 (bsc#1142038)

mgr-osad:

- Separate osa-dispatcher and jabberd so it can be disabled independently
- Replace spacewalk-usix with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)
- Move /usr/share/rhn/config-defaults to uyuni-base-common
- Require uyuni-base-common for /etc/rhn (for osa-dispatcher)
- Ensure bytes type when using hashlib to avoid traceback (bsc#1138822)

mgr-push:

- Replace spacewalk-usix and spacewalk-backend-libs with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)

mgr-virtualization:

- Replace spacewalk-usix with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)
- Fix mgr-virtualization timer

rhnlib:

- Fix building
- Fix malformed XML response when data contains non-ASCII chars (bsc#1154968)
- Bump version to 4.1.0 (bsc#1154940)
- Fix bootstrapping SLE11SP4 trad client with SSL enabled (bsc#1148177)

spacecmd:

- Only report real error, not result (bsc#1171687)
- Use defined return values for spacecmd methods so scripts can
  check for failure (bsc#1171687)
- Disable globbing for api subcommand to allow wildcards in filter
  settings (bsc#1163871)
- Bugfix: attempt to purge SSM when it is empty (bsc#1155372)
- Bump version to 4.1.0 (bsc#1154940)
- Prevent error when piping stdout in Python 2 (bsc#1153090)
- Java api expects content as encoded string instead of encoded bytes like before (bsc#1153277)
- Enable building and installing for Ubuntu 16.04 and Ubuntu 18.04
- Add unit test for schedule, errata, user, utils, misc, configchannel
  and kickstart modules
- Multiple minor bugfixes alongside the unit tests
- Bugfix: referenced variable before assignment.
- Add unit test for report, package, org, repo and group

spacewalk-client-tools:

- Add workaround for uptime overflow to spacewalk-update-status as well (bsc#1165921)
- Spell correctly 'successful' and 'successfully'
- Skip dmidecode data on aarch64 to prevent coredump (bsc#1113160)
- Replace spacewalk-usix with uyuni-common-libs
- Return a non-zero exit status on errors in rhn_check
- Bump version to 4.1.0 (bsc#1154940)
- Make a explicit requirement to systemd for spacewalk-client-tools
  when rhnsd timer is installed

spacewalk-koan:

- Bump version to 4.1.0 (bsc#1154940)
- Require commands we use in merge-rd.sh

spacewalk-oscap:

- Bump version to 4.1.0 (bsc#1154940)

spacewalk-remote-utils:

- Update spacewalk-create-channel with RHEL 7.7 channel definitions
- Bump version to 4.1.0 (bsc#1154940)

supportutils-plugin-susemanager-client:

- Bump version to 4.1.0 (bsc#1154940)

suseRegisterInfo:

- SuseRegisterInfo only needs perl-base, not full perl (bsc#1168310)
- Bump version to 4.1.0 (bsc#1154940)

zypp-plugin-spacewalk:

- Prevent issue with non-ASCII characters in Python 2 systems (bsc#1172462)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-21"/>
	<updated date="2020-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1113160">SUSE bug 1113160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134195">SUSE bug 1134195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138822">SUSE bug 1138822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141661">SUSE bug 1141661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142038">SUSE bug 1142038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143913">SUSE bug 1143913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148177">SUSE bug 1148177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153090">SUSE bug 1153090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153277">SUSE bug 1153277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154940">SUSE bug 1154940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154968">SUSE bug 1154968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155372">SUSE bug 1155372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163871">SUSE bug 1163871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165921">SUSE bug 1165921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168310">SUSE bug 1168310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170231">SUSE bug 1170231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170557">SUSE bug 1170557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171687">SUSE bug 1171687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172462">SUSE bug 1172462</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10215/">CVE-2019-10215 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10215">CVE-2019-10215 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15043/">CVE-2019-15043 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15043">CVE-2019-15043 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12245/">CVE-2020-12245 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12245">CVE-2020-12245 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13379/">CVE-2020-13379 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13379">CVE-2020-13379 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597322" comment="cobbler-2.6.6-49.26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555736" comment="golang-github-prometheus-node_exporter-0.18.1-1.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148289" version="1" class="patch">
	<metadata>
		<title>Security update for xrdp (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1173580" ref_url="https://bugzilla.suse.com/1173580" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-4044" ref_url="https://www.suse.com/security/cve/CVE-2020-4044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007166.html" source="SUSE-SU"/>
		<description>
This update for xrdp fixes the following issues:

- Security fixes (bsc#1173580, CVE-2020-4044):
  + Add patches:
    * xrdp-cve-2020-4044-fix-0.patch
    * xrdp-cve-2020-4044-fix-1.patch
  + Rebase SLE patch:
    * xrdp-fate318398-change-expired-password.patch
- Update patch:
  + xrdp-Allow-sessions-with-32-bpp.patch.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-21"/>
	<updated date="2020-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173580">SUSE bug 1173580</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-4044/">CVE-2020-4044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4044">CVE-2020-4044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555737" comment="xrdp-0.9.0~git.1456906198.f422461-21.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148290" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1173369" ref_url="https://bugzilla.suse.com/1173369" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15011" ref_url="https://www.suse.com/security/cve/CVE-2020-15011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007181.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2020-15011: Fixed a possible Arbitrary Content Injection via the private archive login page (bsc#1173369).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-24"/>
	<updated date="2020-07-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173369">SUSE bug 1173369</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15011/">CVE-2020-15011 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15011">CVE-2020-15011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531104" comment="mailman-2.1.17-3.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148291" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1173160" ref_url="https://bugzilla.suse.com/1173160" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007194.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-10745: Fixed an issue which parsing and packing of NBT and DNS packets containing dots could potentially have consumed excessive CPU (bsc#1173160).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10745">CVE-2020-10745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555738" comment="libdcerpc-binding0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538485" comment="libdcerpc-binding0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555739" comment="libdcerpc0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538487" comment="libdcerpc0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555740" comment="libndr-krb5pac0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538489" comment="libndr-krb5pac0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555741" comment="libndr-nbt0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538491" comment="libndr-nbt0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555742" comment="libndr-standard0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538493" comment="libndr-standard0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555743" comment="libndr0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538495" comment="libndr0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555744" comment="libnetapi0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538497" comment="libnetapi0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555745" comment="libsamba-credentials0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538499" comment="libsamba-credentials0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555746" comment="libsamba-errors0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538501" comment="libsamba-errors0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555747" comment="libsamba-hostconfig0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538503" comment="libsamba-hostconfig0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555748" comment="libsamba-passdb0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538505" comment="libsamba-passdb0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555749" comment="libsamba-util0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538507" comment="libsamba-util0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555750" comment="libsamdb0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538509" comment="libsamdb0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555751" comment="libsmbclient0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538511" comment="libsmbclient0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555752" comment="libsmbconf0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538513" comment="libsmbconf0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555753" comment="libsmbldap0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538515" comment="libsmbldap0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555754" comment="libtevent-util0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538517" comment="libtevent-util0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555755" comment="libwbclient0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538519" comment="libwbclient0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555756" comment="samba-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555757" comment="samba-client-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538522" comment="samba-client-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538523" comment="samba-doc-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555758" comment="samba-libs-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538525" comment="samba-libs-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555759" comment="samba-winbind-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538527" comment="samba-winbind-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148292" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1173998" ref_url="https://bugzilla.suse.com/1173998" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9806" ref_url="https://www.suse.com/security/cve/CVE-2020-9806/" source="CVE"/>
		<reference ref_id="CVE-2020-9807" ref_url="https://www.suse.com/security/cve/CVE-2020-9807/" source="CVE"/>
		<reference ref_id="CVE-2020-9843" ref_url="https://www.suse.com/security/cve/CVE-2020-9843/" source="CVE"/>
		<reference ref_id="CVE-2020-9850" ref_url="https://www.suse.com/security/cve/CVE-2020-9850/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.3 (bsc#1173998):
  + Enable kinetic scrolling with async scrolling.
  + Fix web process hangs on large GitHub pages.
  + Bubblewrap sandbox should not attempt to bind empty paths.
  + Fix threading issues in the media player.
  + Fix several crashes and rendering issues.
  + Security fixes:  CVE-2020-9802, CVE-2020-9803, CVE-2020-9805,
    CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850,
    CVE-2020-13753.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13753">CVE-2020-13753 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9802">CVE-2020-9802 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9803">CVE-2020-9803 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9805">CVE-2020-9805 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9806/">CVE-2020-9806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9806">CVE-2020-9806 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9807/">CVE-2020-9807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9807">CVE-2020-9807 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9843/">CVE-2020-9843 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9843">CVE-2020-9843 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9850/">CVE-2020-9850 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9850">CVE-2020-9850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531105" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531106" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531108" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531109" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531110" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531111" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148293" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1084632" ref_url="https://bugzilla.suse.com/1084632" source="BUGZILLA"/>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1173812" ref_url="https://bugzilla.suse.com/1173812" source="BUGZILLA"/>
		<reference ref_id="1174463" ref_url="https://bugzilla.suse.com/1174463" source="BUGZILLA"/>
		<reference ref_id="1174570" ref_url="https://bugzilla.suse.com/1174570" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308/" source="CVE"/>
		<reference ref_id="CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309/" source="CVE"/>
		<reference ref_id="CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310/" source="CVE"/>
		<reference ref_id="CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311/" source="CVE"/>
		<reference ref_id="CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706/" source="CVE"/>
		<reference ref_id="CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- Fix for CVE-2020-10713 (bsc#1168994)
- Fix for CVE-2020-14308 CVE-2020-14309, CVE-2020-14310, CVE-2020-14311
  (bsc#1173812)
- Fix for CVE-2020-15706 (bsc#1174463)
- Fix for CVE-2020-15707 (bsc#1174570)

- Use overflow checking primitives where the arithmetic expression for buffer
  allocations may include unvalidated data
- Use grub_calloc for overflow check and return NULL when it would occur 
- Use gcc-9 compiler for overflow check builtins
- Backport gcc-9 build fixes
- Fix packed-not-aligned error on GCC 8 (bsc#1084632)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1084632">SUSE bug 1084632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174463">SUSE bug 1174463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174570">SUSE bug 1174570</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14308">CVE-2020-14308 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14309">CVE-2020-14309 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14310">CVE-2020-14310 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14311">CVE-2020-14311 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15706">CVE-2020-15706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15707">CVE-2020-15707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555760" comment="grub2-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538529" comment="grub2-i386-pc-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538531" comment="grub2-snapper-plugin-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538532" comment="grub2-systemd-sleep-plugin-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538533" comment="grub2-x86_64-efi-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538534" comment="grub2-x86_64-xen-2.02-4.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148294" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1174415" ref_url="https://bugzilla.suse.com/1174415" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15900" ref_url="https://www.suse.com/security/cve/CVE-2020-15900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007204.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- fixed CVE-2020-15900 Memory Corruption (SAFER Sandbox Breakout)
  cf. https://bugs.ghostscript.com/show_bug.cgi?id=702582
  (bsc#1174415)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-30"/>
	<updated date="2020-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174415">SUSE bug 1174415</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15900/">CVE-2020-15900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15900">CVE-2020-15900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531119" comment="ghostscript-9.52-23.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531120" comment="ghostscript-x11-9.52-23.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148295" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1173948" ref_url="https://bugzilla.suse.com/1173948" source="BUGZILLA"/>
		<reference ref_id="1174538" ref_url="https://bugzilla.suse.com/1174538" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.1.0 ESR
  * Fixed: Various stability, functionality, and security fixes (bsc#1174538)
  * CVE-2020-15652: Potential leak of redirect targets when loading scripts in a worker
  * CVE-2020-6514: WebRTC data channel leaks internal address to peer
  * CVE-2020-15655: Extension APIs could be used to bypass Same-Origin Policy
  * CVE-2020-15653: Bypassing iframe sandbox when allowing popups
  * CVE-2020-6463: Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture
  * CVE-2020-15656: Type confusion for special arguments in IonMonkey
  * CVE-2020-15658: Overriding file type when saving to disk
  * CVE-2020-15657: DLL hijacking due to incorrect loading path
  * CVE-2020-15654: Custom cursor can overlay user interface
  * CVE-2020-15659: Memory safety bugs fixed in Firefox 79 and Firefox ESR 78.1
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-31"/>
	<updated date="2020-07-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173948">SUSE bug 1173948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15652">CVE-2020-15652 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15653">CVE-2020-15653 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15654">CVE-2020-15654 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15655">CVE-2020-15655 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15656">CVE-2020-15656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15657">CVE-2020-15657 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15658">CVE-2020-15658 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15659">CVE-2020-15659 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6463">CVE-2020-6463 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6514">CVE-2020-6514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531121" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531122" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531123" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148296" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007222.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-04"/>
	<updated date="2020-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531124" comment="libX11-6-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531125" comment="libX11-6-32bit-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531126" comment="libX11-data-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531127" comment="libX11-xcb1-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531128" comment="libX11-xcb1-32bit-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531129" comment="libxcb-dri2-0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531130" comment="libxcb-dri2-0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531131" comment="libxcb-dri3-0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531132" comment="libxcb-dri3-0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531133" comment="libxcb-glx0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531134" comment="libxcb-glx0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531135" comment="libxcb-present0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531136" comment="libxcb-present0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531137" comment="libxcb-randr0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531138" comment="libxcb-render0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531139" comment="libxcb-render0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531140" comment="libxcb-shape0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531141" comment="libxcb-shm0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531142" comment="libxcb-shm0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531143" comment="libxcb-sync1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531144" comment="libxcb-sync1-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531145" comment="libxcb-xf86dri0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531146" comment="libxcb-xfixes0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531147" comment="libxcb-xfixes0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531148" comment="libxcb-xinerama0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531149" comment="libxcb-xkb1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531150" comment="libxcb-xkb1-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531151" comment="libxcb-xv0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531152" comment="libxcb1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531153" comment="libxcb1-32bit-1.10-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148297" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1146351" ref_url="https://bugzilla.suse.com/1146351" source="BUGZILLA"/>
		<reference ref_id="1149652" ref_url="https://bugzilla.suse.com/1149652" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1162002" ref_url="https://bugzilla.suse.com/1162002" source="BUGZILLA"/>
		<reference ref_id="1164910" ref_url="https://bugzilla.suse.com/1164910" source="BUGZILLA"/>
		<reference ref_id="1170011" ref_url="https://bugzilla.suse.com/1170011" source="BUGZILLA"/>
		<reference ref_id="1170618" ref_url="https://bugzilla.suse.com/1170618" source="BUGZILLA"/>
		<reference ref_id="1171078" ref_url="https://bugzilla.suse.com/1171078" source="BUGZILLA"/>
		<reference ref_id="1171189" ref_url="https://bugzilla.suse.com/1171189" source="BUGZILLA"/>
		<reference ref_id="1171191" ref_url="https://bugzilla.suse.com/1171191" source="BUGZILLA"/>
		<reference ref_id="1171220" ref_url="https://bugzilla.suse.com/1171220" source="BUGZILLA"/>
		<reference ref_id="1171732" ref_url="https://bugzilla.suse.com/1171732" source="BUGZILLA"/>
		<reference ref_id="1171988" ref_url="https://bugzilla.suse.com/1171988" source="BUGZILLA"/>
		<reference ref_id="1172453" ref_url="https://bugzilla.suse.com/1172453" source="BUGZILLA"/>
		<reference ref_id="1172458" ref_url="https://bugzilla.suse.com/1172458" source="BUGZILLA"/>
		<reference ref_id="1172775" ref_url="https://bugzilla.suse.com/1172775" source="BUGZILLA"/>
		<reference ref_id="1172999" ref_url="https://bugzilla.suse.com/1172999" source="BUGZILLA"/>
		<reference ref_id="1173280" ref_url="https://bugzilla.suse.com/1173280" source="BUGZILLA"/>
		<reference ref_id="1173658" ref_url="https://bugzilla.suse.com/1173658" source="BUGZILLA"/>
		<reference ref_id="1174115" ref_url="https://bugzilla.suse.com/1174115" source="BUGZILLA"/>
		<reference ref_id="1174462" ref_url="https://bugzilla.suse.com/1174462" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810/" source="CVE"/>
		<reference ref_id="CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135/" source="CVE"/>
		<reference ref_id="CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).
- CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).
- CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).
- CVE-2020-10732: A flaw was found in the implementation of userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed  (bnc#1172999).
- CVE-2020-14416: A race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. (bnc#1172775).
- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).

The following non-security bugs were fixed:

- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170618).
- ibmvnic: Do not process device remove during device reset (bsc#1065729).
- ibmvnic: Do not process reset during or after device removal (bsc#1149652 ltc#179635).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).
- ibmvnic: Unmap DMA address of TX descriptor buffers after use (bsc#1146351 ltc#180726).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1164910).
- net/ibmvnic: Fix missing { in __ibmvnic_reset (bsc#1149652 ltc#179635).
- net/ibmvnic: free reset work of removed device from queue (bsc#1149652 ltc#179635).
- net/ibmvnic: prevent more than one thread from running in reset (bsc#1152457 ltc#174432).
- net/ibmvnic: unlock rtnl_lock in reset so linkwatch_event can run (bsc#1152457 ltc#174432).
- udp: drop corrupt packets earlier to avoid data corruption (bsc#1173658).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146351">SUSE bug 1146351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149652">SUSE bug 1149652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164910">SUSE bug 1164910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170011">SUSE bug 1170011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170618">SUSE bug 1170618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171078">SUSE bug 1171078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171189">SUSE bug 1171189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171191">SUSE bug 1171191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171732">SUSE bug 1171732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171988">SUSE bug 1171988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172453">SUSE bug 1172453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172458">SUSE bug 1172458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173280">SUSE bug 1173280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173658">SUSE bug 1173658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174115">SUSE bug 1174115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20810">CVE-2019-20810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20812">CVE-2019-20812 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0305">CVE-2020-0305 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10135">CVE-2020-10135 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10711">CVE-2020-10711 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10732">CVE-2020-10732 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10751">CVE-2020-10751 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10773">CVE-2020-10773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12771">CVE-2020-12771 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13974">CVE-2020-13974 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14416">CVE-2020-14416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555761" comment="kernel-default-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555762" comment="kernel-default-base-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555763" comment="kernel-default-devel-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556413" comment="kernel-default-kgraft-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538541" comment="kernel-devel-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538542" comment="kernel-macros-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538543" comment="kernel-source-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555764" comment="kernel-syms-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556415" comment="kgraft-patch-4_4_180-94_127-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148298" version="1" class="patch">
	<metadata>
		<title>Security update for python-ipaddress (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007239.html" source="SUSE-SU"/>
		<description>
This update for python-ipaddress fixes the following issues:

- Add CVE-2020-14422-ipaddress-hash-collision.patch fixing
  CVE-2020-14422 (bsc#1173274, bpo#41004), where hash collisions
  in IPv4Interface and IPv6Interface could lead to DOS. 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14422">CVE-2020-14422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531162" comment="python-ipaddress-1.0.18-3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148299" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1173477" ref_url="https://bugzilla.suse.com/1173477" source="BUGZILLA"/>
		<reference ref_id="1173691" ref_url="https://bugzilla.suse.com/1173691" source="BUGZILLA"/>
		<reference ref_id="1173694" ref_url="https://bugzilla.suse.com/1173694" source="BUGZILLA"/>
		<reference ref_id="1173700" ref_url="https://bugzilla.suse.com/1173700" source="BUGZILLA"/>
		<reference ref_id="1173701" ref_url="https://bugzilla.suse.com/1173701" source="BUGZILLA"/>
		<reference ref_id="1173743" ref_url="https://bugzilla.suse.com/1173743" source="BUGZILLA"/>
		<reference ref_id="1173874" ref_url="https://bugzilla.suse.com/1173874" source="BUGZILLA"/>
		<reference ref_id="1173875" ref_url="https://bugzilla.suse.com/1173875" source="BUGZILLA"/>
		<reference ref_id="1173876" ref_url="https://bugzilla.suse.com/1173876" source="BUGZILLA"/>
		<reference ref_id="1173880" ref_url="https://bugzilla.suse.com/1173880" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922/" source="CVE"/>
		<reference ref_id="CVE-2018-21247" ref_url="https://www.suse.com/security/cve/CVE-2018-21247/" source="CVE"/>
		<reference ref_id="CVE-2019-20839" ref_url="https://www.suse.com/security/cve/CVE-2019-20839/" source="CVE"/>
		<reference ref_id="CVE-2019-20840" ref_url="https://www.suse.com/security/cve/CVE-2019-20840/" source="CVE"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398/" source="CVE"/>
		<reference ref_id="CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399/" source="CVE"/>
		<reference ref_id="CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400/" source="CVE"/>
		<reference ref_id="CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401/" source="CVE"/>
		<reference ref_id="CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402/" source="CVE"/>
		<reference ref_id="CVE-2020-14403" ref_url="https://www.suse.com/security/cve/CVE-2020-14403/" source="CVE"/>
		<reference ref_id="CVE-2020-14404" ref_url="https://www.suse.com/security/cve/CVE-2020-14404/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- security update
  fix CVE-2018-21247 [bsc#1173874], uninitialized memory contents are vulnerable to Information leak
  fix CVE-2019-20839 [bsc#1173875], buffer overflow in ConnectClientToUnixSock()
  fix CVE-2019-20840 [bsc#1173876], unaligned accesses in hybiReadAndDecode can lead to denial of service
  fix CVE-2020-14398 [bsc#1173880], improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c
  fix CVE-2020-14397 [bsc#1173700], NULL pointer dereference in libvncserver/rfbregion.c
  fix CVE-2020-14399 [bsc#1173743], Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c.
  fix CVE-2020-14400 [bsc#1173691], Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c.
  fix CVE-2020-14401 [bsc#1173694], potential integer overflows in libvncserver/scale.c
  fix CVE-2020-14402 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2020-14403 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2020-14404 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2017-18922 [bsc#1173477], preauth buffer overwrite
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-07"/>
	<updated date="2020-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173691">SUSE bug 1173691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173694">SUSE bug 1173694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173700">SUSE bug 1173700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173743">SUSE bug 1173743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173874">SUSE bug 1173874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173875">SUSE bug 1173875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173876">SUSE bug 1173876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173880">SUSE bug 1173880</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18922">CVE-2017-18922 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-21247/">CVE-2018-21247 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21247">CVE-2018-21247 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20839/">CVE-2019-20839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20839">CVE-2019-20839 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20840/">CVE-2019-20840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20840">CVE-2019-20840 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14397">CVE-2020-14397 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14398">CVE-2020-14398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14399">CVE-2020-14399 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14400">CVE-2020-14400 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14401">CVE-2020-14401 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14402">CVE-2020-14402 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14403/">CVE-2020-14403 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14403">CVE-2020-14403 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14404/">CVE-2020-14404 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14404">CVE-2020-14404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531163" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531164" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148300" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007243.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1174543 - secure boot related fixes
- bsc#1163019 - CVE-2020-8608: Potential OOB access due to unsafe snprintf() usages
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-07"/>
	<updated date="2020-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538546" comment="xen-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538547" comment="xen-doc-html-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538548" comment="xen-libs-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538549" comment="xen-libs-32bit-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538550" comment="xen-tools-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538551" comment="xen-tools-domU-4.9.4_10-3.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148301" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1156146" ref_url="https://bugzilla.suse.com/1156146" source="BUGZILLA"/>
		<reference ref_id="1171477" ref_url="https://bugzilla.suse.com/1171477" source="BUGZILLA"/>
		<reference ref_id="1171930" ref_url="https://bugzilla.suse.com/1171930" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14818" ref_url="https://www.suse.com/security/cve/CVE-2019-14818/" source="CVE"/>
		<reference ref_id="CVE-2020-10722" ref_url="https://www.suse.com/security/cve/CVE-2020-10722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007254.html" source="SUSE-SU"/>
		<description>
This update for dpdk to version 16.11.9 following issue:

- CVE-2019-14818: Fixed a memory leak vulnerability caused by a malicious container may lead to to denial of service (bsc#1156146).
- CVE-2020-12693: Fixed an authentication bypass via an alternate path or channel (boo#1172004).

- rebuilt with new signing key. (bsc#1174543)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156146">SUSE bug 1156146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171477">SUSE bug 1171477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171930">SUSE bug 1171930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14818/">CVE-2019-14818 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14818">CVE-2019-14818 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10722/">CVE-2020-10722 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10722">CVE-2020-10722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555765" comment="dpdk-16.11.9-8.15.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538553" comment="dpdk-kmp-default-16.11.9_k4.4.180_94.127-8.15.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555766" comment="dpdk-tools-16.11.9-8.15.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148302" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007253.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531165" comment="libX11-6-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531166" comment="libX11-6-32bit-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531167" comment="libX11-data-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531168" comment="libX11-xcb1-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531169" comment="libX11-xcb1-32bit-1.6.2-12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148303" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-c (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1083630" ref_url="https://bugzilla.suse.com/1083630" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12627" ref_url="https://www.suse.com/security/cve/CVE-2017-12627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007262.html" source="SUSE-SU"/>
		<description>
This update for xerces-c fixes the following issues:

- CVE-2017-12627: Processing of external DTD paths could have resulted in a
  null pointer dereference under certain conditions (bsc#1083630)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083630">SUSE bug 1083630</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12627/">CVE-2017-12627 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12627">CVE-2017-12627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531170" comment="libxerces-c-3_1-3.1.1-13.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531171" comment="libxerces-c-3_1-32bit-3.1.1-13.3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148304" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1174662" ref_url="https://bugzilla.suse.com/1174662" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-9862" ref_url="https://www.suse.com/security/cve/CVE-2020-9862/" source="CVE"/>
		<reference ref_id="CVE-2020-9893" ref_url="https://www.suse.com/security/cve/CVE-2020-9893/" source="CVE"/>
		<reference ref_id="CVE-2020-9894" ref_url="https://www.suse.com/security/cve/CVE-2020-9894/" source="CVE"/>
		<reference ref_id="CVE-2020-9895" ref_url="https://www.suse.com/security/cve/CVE-2020-9895/" source="CVE"/>
		<reference ref_id="CVE-2020-9915" ref_url="https://www.suse.com/security/cve/CVE-2020-9915/" source="CVE"/>
		<reference ref_id="CVE-2020-9925" ref_url="https://www.suse.com/security/cve/CVE-2020-9925/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.4 (bsc#1174662):
  + Fix several crashes and rendering issues.
  + Security fixes: CVE-2020-9862, CVE-2020-9893, CVE-2020-9894,
    CVE-2020-9895, CVE-2020-9915, CVE-2020-9925.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9862/">CVE-2020-9862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9862">CVE-2020-9862 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9893/">CVE-2020-9893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9893">CVE-2020-9893 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9894/">CVE-2020-9894 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9894">CVE-2020-9894 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9895/">CVE-2020-9895 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9895">CVE-2020-9895 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9915/">CVE-2020-9915 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9915">CVE-2020-9915 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9925/">CVE-2020-9925 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9925">CVE-2020-9925 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531172" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531173" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531175" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531176" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531177" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531178" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148305" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1174922" ref_url="https://bugzilla.suse.com/1174922" source="BUGZILLA"/>
		<reference ref_id="1174923" ref_url="https://bugzilla.suse.com/1174923" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12673" ref_url="https://www.suse.com/security/cve/CVE-2020-12673/" source="CVE"/>
		<reference ref_id="CVE-2020-12674" ref_url="https://www.suse.com/security/cve/CVE-2020-12674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007281.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2020-12673: improper implementation of NTLM does not check message buffer size (bsc#1174922).
- CVE-2020-12674: improper implementation of RPA mechanism (bsc#1174923).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-19"/>
	<updated date="2020-08-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174922">SUSE bug 1174922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174923">SUSE bug 1174923</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12673/">CVE-2020-12673 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12673">CVE-2020-12673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12674/">CVE-2020-12674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12674">CVE-2020-12674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531186" comment="dovecot22-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531187" comment="dovecot22-backend-mysql-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531188" comment="dovecot22-backend-pgsql-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531189" comment="dovecot22-backend-sqlite-2.2.31-19.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148306" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1172745" ref_url="https://bugzilla.suse.com/1172745" source="BUGZILLA"/>
		<reference ref_id="1174421" ref_url="https://bugzilla.suse.com/1174421" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007290.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- CVE-2020-15705: Fail kernel validation without shim protocol (bsc#1174421).
- Add fibre channel device's ofpath support to grub-ofpathname and search hint to speed up root device discovery (bsc#1172745).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172745">SUSE bug 1172745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174421">SUSE bug 1174421</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15705">CVE-2020-15705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555767" comment="grub2-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538556" comment="grub2-i386-pc-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538558" comment="grub2-snapper-plugin-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538559" comment="grub2-systemd-sleep-plugin-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538560" comment="grub2-x86_64-efi-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538561" comment="grub2-x86_64-xen-2.02-4.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148307" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1160888" ref_url="https://bugzilla.suse.com/1160888" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14907" ref_url="https://www.suse.com/security/cve/CVE-2019-14907/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006407.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2019-14907: Fixed a Server-side crash after charset conversion failure during NTLMSSP processing (bsc#1160888).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-24"/>
	<updated date="2020-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1160888">SUSE bug 1160888</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14907/">CVE-2019-14907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14907">CVE-2019-14907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522551" comment="libdcerpc-binding0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522552" comment="libdcerpc-binding0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522553" comment="libdcerpc0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522554" comment="libdcerpc0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522555" comment="libndr-krb5pac0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522556" comment="libndr-krb5pac0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522557" comment="libndr-nbt0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522558" comment="libndr-nbt0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522559" comment="libndr-standard0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522560" comment="libndr-standard0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522561" comment="libndr0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522562" comment="libndr0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522563" comment="libnetapi0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522564" comment="libnetapi0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522565" comment="libsamba-credentials0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522566" comment="libsamba-credentials0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522567" comment="libsamba-errors0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522568" comment="libsamba-errors0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522569" comment="libsamba-hostconfig0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522570" comment="libsamba-hostconfig0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522571" comment="libsamba-passdb0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522572" comment="libsamba-passdb0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522573" comment="libsamba-util0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522574" comment="libsamba-util0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522575" comment="libsamdb0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522576" comment="libsamdb0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522577" comment="libsmbclient0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522578" comment="libsmbclient0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522579" comment="libsmbconf0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522580" comment="libsmbconf0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522581" comment="libsmbldap0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522582" comment="libsmbldap0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522583" comment="libtevent-util0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522584" comment="libtevent-util0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522585" comment="libwbclient0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522586" comment="libwbclient0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522587" comment="samba-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522588" comment="samba-client-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522589" comment="samba-client-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522590" comment="samba-doc-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522591" comment="samba-libs-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522592" comment="samba-libs-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522593" comment="samba-winbind-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522594" comment="samba-winbind-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148308" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1174633" ref_url="https://bugzilla.suse.com/1174633" source="BUGZILLA"/>
		<reference ref_id="1174635" ref_url="https://bugzilla.suse.com/1174635" source="BUGZILLA"/>
		<reference ref_id="1174638" ref_url="https://bugzilla.suse.com/1174638" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14346" ref_url="https://www.suse.com/security/cve/CVE-2020-14346/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007305.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14347: Leak of uninitialized heap memory from the X server to clients on pixmap allocation (bsc#1174633, ZDI-CAN-11426).
- CVE-2020-14346: XIChangeHierarchy Integer Underflow Privilege Escalation Vulnerability (bsc#1174638, ZDI-CAN-11429).
- CVE-2020-14345: XKB out-of-bounds access privilege escalation vulnerability (bsc#1174635, ZDI-CAN-11428).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-26"/>
	<updated date="2020-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14345">CVE-2020-14345 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14346/">CVE-2020-14346 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14346">CVE-2020-14346 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14347">CVE-2020-14347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531240" comment="xorg-x11-server-7.6_1.18.3-76.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531241" comment="xorg-x11-server-extra-7.6_1.18.3-76.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148309" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17631" ref_url="https://www.suse.com/security/cve/CVE-2019-17631/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2996" ref_url="https://www.suse.com/security/cve/CVE-2019-2996/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2958
    CVE-2019-2962 CVE-2019-2964 CVE-2019-2975
    CVE-2019-2978 CVE-2019-2983 CVE-2019-2988
    CVE-2019-2989 CVE-2019-2992 CVE-2019-2996
    CVE-2019-2999 CVE-2019-2973 CVE-2019-2981
    CVE-2019-17631
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17631/">CVE-2019-17631 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17631">CVE-2019-17631 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2958">CVE-2019-2958 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2975">CVE-2019-2975 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2996/">CVE-2019-2996 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2996">CVE-2019-2996 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148310" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1174910" ref_url="https://bugzilla.suse.com/1174910" source="BUGZILLA"/>
		<reference ref_id="1174913" ref_url="https://bugzilla.suse.com/1174913" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007319.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14361: Fix XkbSelectEvents() integer underflow (bsc#1174910 ZDI-CAN-11573).
- CVE-2020-14362: Fix XRecordRegisterClients() Integer underflow (bsc#1174913 ZDI-CAN-11574).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-01"/>
	<updated date="2020-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14361">CVE-2020-14361 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14362">CVE-2020-14362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531257" comment="xorg-x11-server-7.6_1.18.3-76.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531258" comment="xorg-x11-server-extra-7.6_1.18.3-76.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148311" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1175070" ref_url="https://bugzilla.suse.com/1175070" source="BUGZILLA"/>
		<reference ref_id="1175071" ref_url="https://bugzilla.suse.com/1175071" source="BUGZILLA"/>
		<reference ref_id="1175072" ref_url="https://bugzilla.suse.com/1175072" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11985" ref_url="https://www.suse.com/security/cve/CVE-2020-11985/" source="CVE"/>
		<reference ref_id="CVE-2020-11993" ref_url="https://www.suse.com/security/cve/CVE-2020-11993/" source="CVE"/>
		<reference ref_id="CVE-2020-9490" ref_url="https://www.suse.com/security/cve/CVE-2020-9490/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007331.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-9490: Fixed a crash caused by a specially crafted value for the 'Cache-Digest' header in a HTTP/2 request (bsc#1175071).
- CVE-2020-11985: IP address spoofing when proxying using mod_remoteip and mod_rewrite (bsc#1175072).
- CVE-2020-11993: When trace/debug was enabled for the HTTP/2 module logging statements were made on the wrong connection (bsc#1175070).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175070">SUSE bug 1175070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175071">SUSE bug 1175071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175072">SUSE bug 1175072</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11985/">CVE-2020-11985 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11985">CVE-2020-11985 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11993/">CVE-2020-11993 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11993">CVE-2020-11993 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-9490/">CVE-2020-9490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9490">CVE-2020-9490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531259" comment="apache2-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531260" comment="apache2-doc-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531261" comment="apache2-example-pages-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531262" comment="apache2-prefork-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531263" comment="apache2-utils-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531264" comment="apache2-worker-2.4.23-29.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148312" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 15 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14581
  CVE-2020-14556 CVE-2020-14621 CVE-2020-14593 CVE-2020-14583
  CVE-2019-17639
  * Class Libraries:
    - JAVA.UTIL.ZIP.DEFLATER OPERATIONS THROW JAVA.LANG.INTERNALERROR
    - JAVA 8 DECODER OBJECTS CONSUME A LARGE AMOUNT OF JAVA HEAP
    - TRANSLATION MESSAGES UPDATE FOR JCL
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Java Virtual Machine:
    - IBM JAVA REGISTERS A HANDLER BY DEFAULT FOR SIGABRT
    - LARGE MEMORY FOOTPRINT HELD BY TRACECONTEXT OBJECT
  * JIT Compiler:
    - CRASH IN THE INTERPRETER AFTER OSR FROM INLINED SYNCHRONIZED METHOD
      IN DEBUGGING MODE
    - INTERMITTENT ASSERTION FAILURE REPORTED
    - CRASH IN RESOLVECLASSREF() DURING AOT LOAD
    - JIT CRASH DURING CLASS UNLOADING IN J9METHOD_HT::ONCLASSUNLOADING()
    - SEGMENTATION FAULT WHILE COMPILING A METHOD
    - UNEXPECTED CLASSCASTEXCEPTION THROWN IN HIGH LEVEL PARALLEL
      APPLICATION ON IBM Z PLATFORM
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
    - CHANGES TO IBMJCE AND IBMJCEPLUS PROVIDERS
    - IBMJCEPLUS FAILS, WHEN THE SECURITY MANAGER IS ENABLED, WITH
      DEFAULT PERMISSIONS, SPECIFIED IN JAVA.POLICY FILE
    - IN CERTAIN INSTANCES, IBMJCEPLUS PROVIDER THROWS EXCEPTION FROM
      KEYFACTORY CLASS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17639">CVE-2019-17639 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531265" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531267" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148313" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="1175665" ref_url="https://bugzilla.suse.com/1175665" source="BUGZILLA"/>
		<reference ref_id="1175671" ref_url="https://bugzilla.suse.com/1175671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811/" source="CVE"/>
		<reference ref_id="CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007341.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-24606: Fix livelocking in peerDigestHandleReply (bsc#1175671).
- CVE-2020-15811: Improve Transfer-Encoding handling (bsc#1175665).
- CVE-2020-15810: Enforce token characters for field-name (bsc#1175664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175665">SUSE bug 1175665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175671">SUSE bug 1175671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15810">CVE-2020-15810 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15811">CVE-2020-15811 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24606">CVE-2020-24606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531269" comment="squid-3.5.21-26.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148314" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1175239" ref_url="https://bugzilla.suse.com/1175239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2475-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007895.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- CVE-2020-14363: Fix an integer overflow in init_om() (bsc#1175239).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175239">SUSE bug 1175239</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14363">CVE-2020-14363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531270" comment="libX11-6-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531271" comment="libX11-6-32bit-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531272" comment="libX11-data-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531273" comment="libX11-xcb1-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531274" comment="libX11-xcb1-32bit-1.6.2-12.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148315" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 70 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14621
  CVE-2020-14593 CVE-2020-14583 CVE-2019-17639
  * Class Libraries:
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17639">CVE-2019-17639 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531275" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531277" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531278" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148316" version="1" class="patch">
	<metadata>
		<title>Security update for aws-cli (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1092493" ref_url="https://bugzilla.suse.com/1092493" source="BUGZILLA"/>
		<reference ref_id="1105988" ref_url="https://bugzilla.suse.com/1105988" source="BUGZILLA"/>
		<reference ref_id="1118021" ref_url="https://bugzilla.suse.com/1118021" source="BUGZILLA"/>
		<reference ref_id="1118024" ref_url="https://bugzilla.suse.com/1118024" source="BUGZILLA"/>
		<reference ref_id="1118099" ref_url="https://bugzilla.suse.com/1118099" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15869" ref_url="https://www.suse.com/security/cve/CVE-2018-15869/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006409.html" source="SUSE-SU"/>
		<description>
This update for aws-cli to version 1.16.297 fixes the following issues:

Security issue fixed:

- CVE-2018-15869: Fixed an permission handling issue where an unexpected AMI could potentially be used (bsc#1105988).

Non-security issues fixed:

- Fixed an issue with the CLI client, where a ModuleNotFoundError was triggered (bsc#1092493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-28"/>
	<updated date="2020-01-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092493">SUSE bug 1092493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105988">SUSE bug 1105988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118021">SUSE bug 1118021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118024">SUSE bug 1118024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118099">SUSE bug 1118099</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15869/">CVE-2018-15869 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15869">CVE-2018-15869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525274" comment="aws-cli-1.16.297-22.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148317" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1173991" ref_url="https://bugzilla.suse.com/1173991" source="BUGZILLA"/>
		<reference ref_id="1174284" ref_url="https://bugzilla.suse.com/1174284" source="BUGZILLA"/>
		<reference ref_id="1175686" ref_url="https://bugzilla.suse.com/1175686" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007373.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.2.0 ESR
  * Fixed: Various stability, functionality, and security fixes
- Mozilla Firefox ESR 78.2
  MFSA 2020-38 (bsc#1175686)
  * CVE-2020-15663 (bmo#1643199)
    Downgrade attack on the Mozilla Maintenance Service could
    have resulted in escalation of privilege
  * CVE-2020-15664 (bmo#1658214)
    Attacker-induced prompt for extension installation
  * CVE-2020-15670 (bmo#1651001, bmo#1651449, bmo#1653626,
    bmo#1656957)
    Memory safety bugs fixed in Firefox 80 and Firefox ESR 78.2

- Fixed Firefox tab crash in FIPS mode (bsc#1174284).

- Fix broken translation-loading. (bsc#1173991) 
  * allow addon sideloading
  * mark signatures for langpacks non-mandatory
  * do not autodisable user profile scopes
- Google API key is not usable for geolocation service any more
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173991">SUSE bug 1173991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174284">SUSE bug 1174284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15663">CVE-2020-15663 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15664">CVE-2020-15664 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15670">CVE-2020-15670 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531280" comment="MozillaFirefox-78.2.0-112.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531281" comment="MozillaFirefox-devel-78.2.0-112.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531282" comment="MozillaFirefox-translations-common-78.2.0-112.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148318" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1152107" ref_url="https://bugzilla.suse.com/1152107" source="BUGZILLA"/>
		<reference ref_id="1173798" ref_url="https://bugzilla.suse.com/1173798" source="BUGZILLA"/>
		<reference ref_id="1174205" ref_url="https://bugzilla.suse.com/1174205" source="BUGZILLA"/>
		<reference ref_id="1174757" ref_url="https://bugzilla.suse.com/1174757" source="BUGZILLA"/>
		<reference ref_id="1174771" ref_url="https://bugzilla.suse.com/1174771" source="BUGZILLA"/>
		<reference ref_id="1175112" ref_url="https://bugzilla.suse.com/1175112" source="BUGZILLA"/>
		<reference ref_id="1175127" ref_url="https://bugzilla.suse.com/1175127" source="BUGZILLA"/>
		<reference ref_id="1175228" ref_url="https://bugzilla.suse.com/1175228" source="BUGZILLA"/>
		<reference ref_id="1175691" ref_url="https://bugzilla.suse.com/1175691" source="BUGZILLA"/>
		<reference ref_id="1176069" ref_url="https://bugzilla.suse.com/1176069" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).
- CVE-2019-16746: Fixed an improper check of the length of variable elements in a beacon head, leading to a buffer overflow (bsc#1152107).
- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).

The following non-security bugs were fixed:

- bonding: fix active-backup failover for current ARP slave (bsc#1174771).
- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1175691).
- ocfs2: add trimfs dlm lock resource (bsc#1175228).
- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).
- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-09"/>
	<updated date="2020-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152107">SUSE bug 1152107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173798">SUSE bug 1173798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174757">SUSE bug 1174757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174771">SUSE bug 1174771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175112">SUSE bug 1175112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175127">SUSE bug 1175127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175228">SUSE bug 1175228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175691">SUSE bug 1175691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14314">CVE-2020-14314 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16166">CVE-2020-16166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555768" comment="kernel-default-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555769" comment="kernel-default-base-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555770" comment="kernel-default-devel-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556480" comment="kernel-default-kgraft-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538595" comment="kernel-devel-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538596" comment="kernel-macros-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538597" comment="kernel-source-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555771" comment="kernel-syms-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556482" comment="kgraft-patch-4_4_180-94_130-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148319" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update java-1_8_0-openjdk to version jdk8u242 (icedtea 3.15.0) (January 2020 CPU, bsc#1160968):

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2020-2590: Improve Kerberos interop capabilities
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2601: Better Ticket Granting Services
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support
- CVE-2020-2654: Improve Object Identifier Processing
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-30"/>
	<updated date="2020-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2590">CVE-2020-2590 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2601">CVE-2020-2601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522598" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531291" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531292" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522599" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148320" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1164860" ref_url="https://bugzilla.suse.com/1164860" source="BUGZILLA"/>
		<reference ref_id="1174117" ref_url="https://bugzilla.suse.com/1174117" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13935" ref_url="https://www.suse.com/security/cve/CVE-2020-13935/" source="CVE"/>
		<reference ref_id="CVE-2020-1935" ref_url="https://www.suse.com/security/cve/CVE-2020-1935/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007410.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-1935: Fixed an HTTP request smuggling vulnerability (bsc#1164860).
- CVE-2020-13935: Fixed a WebSocket DoS (bsc#1174117).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-11"/>
	<updated date="2020-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1164860">SUSE bug 1164860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174117">SUSE bug 1174117</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13935/">CVE-2020-13935 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13935">CVE-2020-13935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1935/">CVE-2020-1935 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1935">CVE-2020-1935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531293" comment="tomcat-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531294" comment="tomcat-admin-webapps-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531295" comment="tomcat-docs-webapp-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531296" comment="tomcat-el-3_0-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531297" comment="tomcat-javadoc-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531298" comment="tomcat-jsp-2_3-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531299" comment="tomcat-lib-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531300" comment="tomcat-servlet-3_1-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531301" comment="tomcat-webapps-8.0.53-29.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148321" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1175626" ref_url="https://bugzilla.suse.com/1175626" source="BUGZILLA"/>
		<reference ref_id="1175656" ref_url="https://bugzilla.suse.com/1175656" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007424.html" source="SUSE-SU"/>
		<description>
This update for shim fixes the following issues:

- Update to the unified shim binary from SUSE Linux Enterprise 15-SP1 (bsc#1168994)

This update addresses the 'BootHole' security issue (master CVE CVE-2020-10713), by
disallowing binaries signed by the previous SUSE UEFI signing key from booting.

This update should only be installed after updates of grub2, the Linux kernel and (if used)
Xen from July / August 2020 are applied.

Additional fixes:

+ shim-install: install MokManager to \EFI\boot to process the pending MOK request (bsc#1175626, bsc#1175656)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-14"/>
	<updated date="2020-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175626">SUSE bug 1175626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175656">SUSE bug 1175656</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538600" comment="shim-15+git47-25.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148322" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1120629" ref_url="https://bugzilla.suse.com/1120629" source="BUGZILLA"/>
		<reference ref_id="1120630" ref_url="https://bugzilla.suse.com/1120630" source="BUGZILLA"/>
		<reference ref_id="1120631" ref_url="https://bugzilla.suse.com/1120631" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1131823" ref_url="https://bugzilla.suse.com/1131823" source="BUGZILLA"/>
		<reference ref_id="1137977" ref_url="https://bugzilla.suse.com/1137977" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007438.html" source="SUSE-SU"/>
		<description>
This update for libsolv fixes the following issues:

This is a reissue of an existing libsolv update that also included libsolv-devel for LTSS products.

libsolv was updated to version 0.6.36 fixes the following issues:

Security issues fixed:

- CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629).
- CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630).
- CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631).

Non-security issues fixed:

- Made cleandeps jobs on patterns work (bsc#1137977).
- Fixed an issue multiversion packages that obsolete their own name (bsc#1127155).
- Keep consistent package name if there are multiple alternatives (bsc#1131823).

		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131823">SUSE bug 1131823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137977">SUSE bug 1137977</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20532">CVE-2018-20532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20533">CVE-2018-20533 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20534">CVE-2018-20534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555772" comment="libsolv-devel-0.6.36-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555773" comment="libsolv-tools-0.6.36-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555774" comment="perl-solv-0.6.36-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555775" comment="python-solv-0.6.36-2.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148323" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1176409" ref_url="https://bugzilla.suse.com/1176409" source="BUGZILLA"/>
		<reference ref_id="1176412" ref_url="https://bugzilla.suse.com/1176412" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392/" source="CVE"/>
		<reference ref_id="CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007439.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

Security issues fixed:

- CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated (bsc#1176412).
- CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name (bsc#1176409).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176409">SUSE bug 1176409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176412">SUSE bug 1176412</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14392">CVE-2020-14392 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14393">CVE-2020-14393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531302" comment="perl-DBI-1.628-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148324" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="1130840" ref_url="https://bugzilla.suse.com/1130840" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="1153238" ref_url="https://bugzilla.suse.com/1153238" source="BUGZILLA"/>
		<reference ref_id="1162423" ref_url="https://bugzilla.suse.com/1162423" source="BUGZILLA"/>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="1174701" ref_url="https://bugzilla.suse.com/1174701" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-20907: Fixed denial of service by avoiding possible infinite loop in specifically crafted tarball (bsc#1174091).
- CVE-2020-14422: Fixed an improper computation of hash values in the IPv4Interface and IPv6Interface 
  could have led to denial of service (bsc#1173274).
- CVE-2019-16935: Fixed a reflected XSS in python/Lib/DocXMLRPCServer.py (bsc#1153238).
- CVE-2019-9947: Fixed an issue in urllib2 which allowed CRLF injection if the attacker controls a url parameter (bsc#1130840).
- If the locale is 'C', coerce it to C.UTF-8 (bsc#1162423).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-21"/>
	<updated date="2020-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162423">SUSE bug 1162423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174701">SUSE bug 1174701</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16935">CVE-2019-16935 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14422">CVE-2020-14422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531303" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531304" comment="python3-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531305" comment="python3-base-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531306" comment="python3-curses-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531307" comment="python3-devel-3.4.10-25.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148325" version="1" class="patch">
	<metadata>
		<title>Security update for pdns (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1176535" ref_url="https://bugzilla.suse.com/1176535" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17482" ref_url="https://www.suse.com/security/cve/CVE-2020-17482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007467.html" source="SUSE-SU"/>
		<description>
This update for pdns fixes the following issues:

- CVE-2020-17482: Fixed an issue where an authorized user with the ability to insert crafted 
  records into a zone might be able to leak the content of uninitialized memory (bsc#1176535)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176535">SUSE bug 1176535</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-17482/">CVE-2020-17482 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17482">CVE-2020-17482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597323" comment="pdns-4.1.2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597324" comment="pdns-backend-mysql-4.1.2-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148326" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1174120" ref_url="https://bugzilla.suse.com/1174120" source="BUGZILLA"/>
		<reference ref_id="1174316" ref_url="https://bugzilla.suse.com/1174316" source="BUGZILLA"/>
		<reference ref_id="1176579" ref_url="https://bugzilla.suse.com/1176579" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007463.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

-  ZeroLogon: An elevation of privilege was possible with some configurations when an attacker established
a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC) 
(CVE-2020-1472, bsc#1176579).

- Fixed an issue where multiple home folders were created(bsc#1174316, bso#13369).

- Fixed an issue where the net command was unable to negotiate SMB2 (bsc#1174120);
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174120">SUSE bug 1174120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174316">SUSE bug 1174316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176579">SUSE bug 1176579</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1472">CVE-2020-1472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555776" comment="libdcerpc-binding0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538606" comment="libdcerpc-binding0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555777" comment="libdcerpc0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538608" comment="libdcerpc0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555778" comment="libndr-krb5pac0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538610" comment="libndr-krb5pac0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555779" comment="libndr-nbt0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538612" comment="libndr-nbt0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555780" comment="libndr-standard0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538614" comment="libndr-standard0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555781" comment="libndr0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538616" comment="libndr0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555782" comment="libnetapi0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538618" comment="libnetapi0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555783" comment="libsamba-credentials0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538620" comment="libsamba-credentials0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555784" comment="libsamba-errors0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538622" comment="libsamba-errors0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555785" comment="libsamba-hostconfig0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538624" comment="libsamba-hostconfig0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555786" comment="libsamba-passdb0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538626" comment="libsamba-passdb0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555787" comment="libsamba-util0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538628" comment="libsamba-util0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555788" comment="libsamdb0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538630" comment="libsamdb0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555789" comment="libsmbclient0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538632" comment="libsmbclient0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555790" comment="libsmbconf0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538634" comment="libsmbconf0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555791" comment="libsmbldap0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538636" comment="libsmbldap0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555792" comment="libtevent-util0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538638" comment="libtevent-util0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555793" comment="libwbclient0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538640" comment="libwbclient0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555794" comment="samba-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555795" comment="samba-client-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538643" comment="samba-client-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538644" comment="samba-doc-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555796" comment="samba-libs-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538646" comment="samba-libs-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555797" comment="samba-winbind-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538648" comment="samba-winbind-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148327" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007473.html" source="SUSE-SU"/>
		<description>
This update for python-pip fixes the following issues:

- CVE-2019-20916: Fixed a directory traversal in _download_http_url (bsc#1176262)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597325" comment="python-pip-9.0.1-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148328" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1172515" ref_url="https://bugzilla.suse.com/1172515" source="BUGZILLA"/>
		<reference ref_id="1176315" ref_url="https://bugzilla.suse.com/1176315" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007486.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2020-17507: Fixed a buffer overflow in XBM parser (bsc#1176315)
- Made handling of XDG_RUNTIME_DIR more secure (bsc#1172515)	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-25"/>
	<updated date="2020-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172515">SUSE bug 1172515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176315">SUSE bug 1176315</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17507">CVE-2020-17507 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555798" comment="libQt5Concurrent5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555799" comment="libQt5Core5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555800" comment="libQt5DBus5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555801" comment="libQt5Gui5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555802" comment="libQt5Network5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555803" comment="libQt5OpenGL5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555804" comment="libQt5PrintSupport5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555805" comment="libQt5Sql5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555806" comment="libQt5Sql5-mysql-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555807" comment="libQt5Sql5-postgresql-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555808" comment="libQt5Sql5-sqlite-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555809" comment="libQt5Sql5-unixODBC-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555810" comment="libQt5Test5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555811" comment="libQt5Widgets5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555812" comment="libQt5Xml5-5.6.2-6.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148329" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1167976" ref_url="https://bugzilla.suse.com/1167976" source="BUGZILLA"/>
		<reference ref_id="1173986" ref_url="https://bugzilla.suse.com/1173986" source="BUGZILLA"/>
		<reference ref_id="1174420" ref_url="https://bugzilla.suse.com/1174420" source="BUGZILLA"/>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

-Firefox was updated to 78.3.0 ESR (bsc#1176756, MFSA 2020-43)
   - CVE-2020-15677: Download origin spoofing via redirect
   - CVE-2020-15676: Fixed an XSS when pasting attacker-controlled data into a
     contenteditable element 
   - CVE-2020-15678: When recursing through layers while scrolling, an iterator
     may have become invalid, resulting in a potential use-after-free scenario
   - CVE-2020-15673: Fixed memory safety bugs 
- Enhance fix for wayland-detection (bsc#1174420)
- Attempt to fix langpack-parallelization by introducing separate
  obj-dirs for each lang (bsc#1173986, bsc#1167976)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-26"/>
	<updated date="2020-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167976">SUSE bug 1167976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173986">SUSE bug 1173986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174420">SUSE bug 1174420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15673">CVE-2020-15673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15676">CVE-2020-15676 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15677">CVE-2020-15677 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15678">CVE-2020-15678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531352" comment="MozillaFirefox-78.3.0-112.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531353" comment="MozillaFirefox-devel-78.3.0-112.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531354" comment="MozillaFirefox-translations-common-78.3.0-112.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148330" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1176343" ref_url="https://bugzilla.suse.com/1176343" source="BUGZILLA"/>
		<reference ref_id="1176344" ref_url="https://bugzilla.suse.com/1176344" source="BUGZILLA"/>
		<reference ref_id="1176345" ref_url="https://bugzilla.suse.com/1176345" source="BUGZILLA"/>
		<reference ref_id="1176346" ref_url="https://bugzilla.suse.com/1176346" source="BUGZILLA"/>
		<reference ref_id="1176347" ref_url="https://bugzilla.suse.com/1176347" source="BUGZILLA"/>
		<reference ref_id="1176348" ref_url="https://bugzilla.suse.com/1176348" source="BUGZILLA"/>
		<reference ref_id="1176349" ref_url="https://bugzilla.suse.com/1176349" source="BUGZILLA"/>
		<reference ref_id="1176350" ref_url="https://bugzilla.suse.com/1176350" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595/" source="CVE"/>
		<reference ref_id="CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596/" source="CVE"/>
		<reference ref_id="CVE-2020-25597" ref_url="https://www.suse.com/security/cve/CVE-2020-25597/" source="CVE"/>
		<reference ref_id="CVE-2020-25599" ref_url="https://www.suse.com/security/cve/CVE-2020-25599/" source="CVE"/>
		<reference ref_id="CVE-2020-25600" ref_url="https://www.suse.com/security/cve/CVE-2020-25600/" source="CVE"/>
		<reference ref_id="CVE-2020-25601" ref_url="https://www.suse.com/security/cve/CVE-2020-25601/" source="CVE"/>
		<reference ref_id="CVE-2020-25603" ref_url="https://www.suse.com/security/cve/CVE-2020-25603/" source="CVE"/>
		<reference ref_id="CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-25604: Fixed a race condition when migrating timers between x86 
  HVM vCPU-s (bsc#1176343,XSA-336)
- CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers (bsc#1176344,XSA-337)
- CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid (bsc#1176346,XSA-338)
- CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER (bsc#1176345,XSA-339)
- CVE-2020-25603: Fixed an issue due to  missing barriers when accessing/allocating an event channel (bsc#1176347,XSA-340)
- CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains (bsc#1176348,XSA-342)
- CVE-2020-25599: Fixed race conditions with evtchn_reset() (bsc#1176349,XSA-343)
- CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset() / evtchn_destroy() (bsc#1176350,XSA-344)	  
- CVE-2020-14364: Fixed an out-of-bounds read/write access while processing usb packets (bsc#1175534).
- Various bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-29"/>
	<updated date="2020-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176343">SUSE bug 1176343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176344">SUSE bug 1176344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176345">SUSE bug 1176345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176346">SUSE bug 1176346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176347">SUSE bug 1176347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176348">SUSE bug 1176348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176349">SUSE bug 1176349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176350">SUSE bug 1176350</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25595">CVE-2020-25595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25596">CVE-2020-25596 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25597/">CVE-2020-25597 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25597">CVE-2020-25597 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25599/">CVE-2020-25599 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25599">CVE-2020-25599 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25600/">CVE-2020-25600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25600">CVE-2020-25600 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25601/">CVE-2020-25601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25601">CVE-2020-25601 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25603/">CVE-2020-25603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25603">CVE-2020-25603 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25604">CVE-2020-25604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538664" comment="xen-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538665" comment="xen-doc-html-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538666" comment="xen-libs-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538667" comment="xen-libs-32bit-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538668" comment="xen-tools-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538669" comment="xen-tools-domU-4.9.4_12-3.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148331" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1176496" ref_url="https://bugzilla.suse.com/1176496" source="BUGZILLA"/>
		<reference ref_id="1176764" ref_url="https://bugzilla.suse.com/1176764" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7490" ref_url="https://www.suse.com/security/cve/CVE-2013-7490/" source="CVE"/>
		<reference ref_id="CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007519.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

- CVE-2019-20919: Fixed a NULL profile dereference in dbi_profile (bsc#1176764).
- CVE-2013-7490: Fixed memory corruption when using many arguments 
  to methods for CallbacksUsing (bsc#1176496).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176496">SUSE bug 1176496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176764">SUSE bug 1176764</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7490/">CVE-2013-7490 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7490">CVE-2013-7490 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20919">CVE-2019-20919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531376" comment="perl-DBI-1.628-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148332" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- java-1_7_0-openjdk was updated to 2.6.23 (July 2020 CPU, bsc#1174157)
    - JDK-8028431, CVE-2020-14579: NullPointerException in
    - DerValue.equals(DerValue)
    - JDK-8028591, CVE-2020-14578: NegativeArraySizeException in
    - sun.security.util.DerInputStream.getUnalignedBitString()
    - JDK-8230613: Better ASCII conversions
    - JDK-8231800: Better listing of arrays
    - JDK-8232014: Expand DTD support
    - JDK-8233255: Better Swing Buttons
    - JDK-8234032: Improve basic calendar services
    - JDK-8234042: Better factory production of certificates
    - JDK-8234418: Better parsing with CertificateFactory
    - JDK-8234836: Improve serialization handling
    - JDK-8236191: Enhance OID processing
    - JDK-8237592, CVE-2020-14577: Enhance certificate verification
    - JDK-8238002, CVE-2020-14581: Better matrix operations
    - JDK-8238804: Enhance key handling process
    - JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    - JDK-8238843: Enhanced font handing
    - JDK-8238920, CVE-2020-14583: Better Buffer support
    - JDK-8238925: Enhance WAV file playback
    - JDK-8240119, CVE-2020-14593: Less Affine Transformations
    - JDK-8240482: Improved WAV file playback
    - JDK-8241379: Update JCEKS support
    - JDK-8241522: Manifest improved jar headers redux
    - JDK-8242136, CVE-2020-14621: Better XML namespace handling
    - JDK-8040113: File not initialized in src/share/native/sun/awt/giflib/dgif_lib.c
    - JDK-8054446: Repeated offer and remove on ConcurrentLinkedQueue lead to an OutOfMemoryError
    - JDK-8077982: GIFLIB upgrade
    - JDK-8081315: 8077982 giflib upgrade breaks system giflib builds with earlier versions
    - JDK-8147087: Race when reusing PerRegionTable bitmaps may result in dropped remembered set entries
    - JDK-8151582: (ch) test java/nio/channels/AsyncCloseAndInterrupt.java failing due to 'Connection succeeded'
    - JDK-8155691: Update GIFlib library to the latest up-to-date
    - JDK-8181841: A TSA server returns timestamp with precision higher than milliseconds
    - JDK-8203190: SessionId.hashCode generates too many collisions
    - JDK-8217676: Upgrade libpng to 1.6.37
    - JDK-8220495: Update GIFlib library to the 5.1.8
    - JDK-8226892: ActionListeners on JRadioButtons don't get notified when selection is changed with arrow keys
    - JDK-8229899: Make java.io.File.isInvalid() less racy
    - JDK-8230597: Update GIFlib library to the 5.2.1
    - JDK-8230769: BufImg_SetupICM add ReleasePrimitiveArrayCritical call in early return
    - JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a
    - JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion() returns wrong result
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531377" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531378" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531379" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531380" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148333" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1176733" ref_url="https://bugzilla.suse.com/1176733" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26117" ref_url="https://www.suse.com/security/cve/CVE-2020-26117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007542.html" source="SUSE-SU"/>
		<description>
This update for tigervnc fixes the following issues:

- CVE-2020-26117: Server certificates were stored as certiticate
  authorities, allowing malicious owners of these certificates
  to impersonate any server after a client had added an exception
  (bsc#1176733).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1176733">SUSE bug 1176733</bugzilla>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26117/">CVE-2020-26117 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26117">CVE-2020-26117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531381" comment="libXvnc1-1.6.0-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531382" comment="tigervnc-1.6.0-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531383" comment="xorg-x11-Xvnc-1.6.0-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148334" version="1" class="patch">
	<metadata>
		<title>Security update for libproxy (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1176410" ref_url="https://bugzilla.suse.com/1176410" source="BUGZILLA"/>
		<reference ref_id="1177143" ref_url="https://bugzilla.suse.com/1177143" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25219" ref_url="https://www.suse.com/security/cve/CVE-2020-25219/" source="CVE"/>
		<reference ref_id="CVE-2020-26154" ref_url="https://www.suse.com/security/cve/CVE-2020-26154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007543.html" source="SUSE-SU"/>
		<description>
This update for libproxy fixes the following issues:

- CVE-2020-25219: Rewrote url::recvline to be nonrecursive (bsc#1176410).
- CVE-2020-26154: Fixed a buffer overflow when PAC is enabled (bsc#1177143).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176410">SUSE bug 1176410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177143">SUSE bug 1177143</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25219/">CVE-2020-25219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25219">CVE-2020-25219 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26154/">CVE-2020-26154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26154">CVE-2020-26154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531384" comment="libproxy1-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531385" comment="libproxy1-32bit-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531386" comment="libproxy1-config-gnome3-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531387" comment="libproxy1-config-gnome3-32bit-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531388" comment="libproxy1-networkmanager-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531389" comment="libproxy1-pacrunner-webkit-0.4.13-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148335" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1177914" ref_url="https://bugzilla.suse.com/1177914" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007609.html" source="SUSE-SU"/>
		<description>
This update for freetype2 fixes the following issues:

- CVE-2020-15999: fixed a heap buffer overflow found in the handling of embedded PNG bitmaps (bsc#1177914).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-22"/>
	<updated date="2020-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177914">SUSE bug 1177914</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531390" comment="ft2demos-2.6.3-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531391" comment="libfreetype6-2.6.3-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531392" comment="libfreetype6-32bit-2.6.3-7.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148336" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1149332" ref_url="https://bugzilla.suse.com/1149332" source="BUGZILLA"/>
		<reference ref_id="1165784" ref_url="https://bugzilla.suse.com/1165784" source="BUGZILLA"/>
		<reference ref_id="1171878" ref_url="https://bugzilla.suse.com/1171878" source="BUGZILLA"/>
		<reference ref_id="1172085" ref_url="https://bugzilla.suse.com/1172085" source="BUGZILLA"/>
		<reference ref_id="1176013" ref_url="https://bugzilla.suse.com/1176013" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10029" ref_url="https://www.suse.com/security/cve/CVE-2020-10029/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007618.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:
	  
- CVE-2020-10029: Fixed a stack corruption from range reduction of pseudo-zero (bsc#1165784)
- Use posix_spawn on popen (bsc#1149332, bsc#1176013)
- Correct locking and cancellation cleanup in syslog functions (bsc#1172085)
- Fixed concurrent changes on nscd aware files (bsc#1171878)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-23"/>
	<updated date="2020-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149332">SUSE bug 1149332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165784">SUSE bug 1165784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171878">SUSE bug 1171878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172085">SUSE bug 1172085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176013">SUSE bug 1176013</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10029/">CVE-2020-10029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">CVE-2020-10029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531393" comment="glibc-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531394" comment="glibc-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531395" comment="glibc-devel-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531396" comment="glibc-devel-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531397" comment="glibc-html-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531398" comment="glibc-i18ndata-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531399" comment="glibc-info-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531400" comment="glibc-locale-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531401" comment="glibc-locale-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531402" comment="glibc-profile-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531403" comment="glibc-profile-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531404" comment="nscd-2.22-113.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148337" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="1177872" ref_url="https://bugzilla.suse.com/1177872" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007631.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.0 ESR
  * Fixed: Various stability, functionality, and security fixes MFSA 2020-46 (bsc#1177872, bsc#1176756)
  * CVE-2020-15969 Use-after-free in usersctp
  * CVE-2020-15683 Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4
  * Fixed: Fixed legacy preferences not being properly applied when set via GPO
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-27"/>
	<updated date="2020-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15683">CVE-2020-15683 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15969">CVE-2020-15969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531405" comment="MozillaFirefox-78.4.0-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531406" comment="MozillaFirefox-devel-78.4.0-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531407" comment="MozillaFirefox-translations-common-78.4.0-112.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148338" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1177158" ref_url="https://bugzilla.suse.com/1177158" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007658.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

- CVE-2020-14355: Fixed multiple buffer overflow vulnerabilities in QUIC image decoding (bsc#1177158).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14355">CVE-2020-14355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555813" comment="libspice-server1-0.12.8-15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148339" version="1" class="patch">
	<metadata>
		<title>Security update for spice-gtk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1177158" ref_url="https://bugzilla.suse.com/1177158" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007662.html" source="SUSE-SU"/>
		<description>
This update for spice-gtk fixes the following issues:

- CVE-2020-14355: Fixed multiple buffer overflow vulnerabilities in QUIC image decoding (bsc#1177158).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14355">CVE-2020-14355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555814" comment="libspice-client-glib-2_0-8-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555815" comment="libspice-client-glib-helper-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555816" comment="libspice-client-gtk-3_0-5-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555817" comment="libspice-controller0-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555818" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555819" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148340" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1173902" ref_url="https://bugzilla.suse.com/1173902" source="BUGZILLA"/>
		<reference ref_id="1173994" ref_url="https://bugzilla.suse.com/1173994" source="BUGZILLA"/>
		<reference ref_id="1177613" ref_url="https://bugzilla.suse.com/1177613" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<reference ref_id="CVE-2020-14383" ref_url="https://www.suse.com/security/cve/CVE-2020-14383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007673.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-14383: An authenticated user can crash the DCE/RPC DNS with easily crafted records (bsc#1177613).
- CVE-2020-14323: Unprivileged user can crash winbind (bsc#1173994).
- CVE-2020-14318: Missing permissions check in SMB1/2/3 ChangeNotify (bsc#1173902).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173902">SUSE bug 1173902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173994">SUSE bug 1173994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177613">SUSE bug 1177613</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14318">CVE-2020-14318 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14323">CVE-2020-14323 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14383/">CVE-2020-14383 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14383">CVE-2020-14383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555820" comment="libdcerpc-binding0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538678" comment="libdcerpc-binding0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555821" comment="libdcerpc0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538680" comment="libdcerpc0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555822" comment="libndr-krb5pac0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538682" comment="libndr-krb5pac0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555823" comment="libndr-nbt0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538684" comment="libndr-nbt0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555824" comment="libndr-standard0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538686" comment="libndr-standard0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555825" comment="libndr0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538688" comment="libndr0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555826" comment="libnetapi0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538690" comment="libnetapi0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555827" comment="libsamba-credentials0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538692" comment="libsamba-credentials0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555828" comment="libsamba-errors0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538694" comment="libsamba-errors0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555829" comment="libsamba-hostconfig0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538696" comment="libsamba-hostconfig0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555830" comment="libsamba-passdb0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538698" comment="libsamba-passdb0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555831" comment="libsamba-util0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538700" comment="libsamba-util0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555832" comment="libsamdb0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538702" comment="libsamdb0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555833" comment="libsmbclient0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538704" comment="libsmbclient0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555834" comment="libsmbconf0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538706" comment="libsmbconf0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555835" comment="libsmbldap0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538708" comment="libsmbldap0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555836" comment="libtevent-util0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538710" comment="libtevent-util0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555837" comment="libwbclient0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538712" comment="libwbclient0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555838" comment="samba-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555839" comment="samba-client-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538715" comment="samba-client-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538716" comment="samba-doc-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555840" comment="samba-libs-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538718" comment="samba-libs-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555841" comment="samba-winbind-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538720" comment="samba-winbind-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148341" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1174955" ref_url="https://bugzilla.suse.com/1174955" source="BUGZILLA"/>
		<reference ref_id="1177155" ref_url="https://bugzilla.suse.com/1177155" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15708" ref_url="https://www.suse.com/security/cve/CVE-2020-15708/" source="CVE"/>
		<reference ref_id="CVE-2020-25637" ref_url="https://www.suse.com/security/cve/CVE-2020-25637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007670.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

CVE-2020-15708: Added a note to libvirtd.conf about polkit auth in SUSE distros (bsc#1174955).
CVE-2020-25637: Fixed a double free in qemuAgentGetInterfaces() (bsc#1177155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174955">SUSE bug 1174955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177155">SUSE bug 1177155</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15708/">CVE-2020-15708 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15708">CVE-2020-15708 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25637/">CVE-2020-25637 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25637">CVE-2020-25637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555842" comment="libvirt-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555843" comment="libvirt-admin-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555844" comment="libvirt-client-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555845" comment="libvirt-daemon-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555846" comment="libvirt-daemon-config-network-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555847" comment="libvirt-daemon-config-nwfilter-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555848" comment="libvirt-daemon-driver-interface-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538728" comment="libvirt-daemon-driver-libxl-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555849" comment="libvirt-daemon-driver-lxc-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555850" comment="libvirt-daemon-driver-network-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555851" comment="libvirt-daemon-driver-nodedev-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555852" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555853" comment="libvirt-daemon-driver-qemu-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555854" comment="libvirt-daemon-driver-secret-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555855" comment="libvirt-daemon-driver-storage-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555856" comment="libvirt-daemon-driver-storage-core-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555857" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555858" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555859" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555860" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538741" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555861" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555862" comment="libvirt-daemon-hooks-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555863" comment="libvirt-daemon-lxc-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555864" comment="libvirt-daemon-qemu-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538746" comment="libvirt-daemon-xen-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555865" comment="libvirt-doc-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555866" comment="libvirt-libs-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555867" comment="libvirt-lock-sanlock-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555868" comment="libvirt-nss-3.3.0-5.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148342" version="1" class="patch">
	<metadata>
		<title>Security update for sane-backends (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1172524" ref_url="https://bugzilla.suse.com/1172524" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<reference ref_id="CVE-2020-12861" ref_url="https://www.suse.com/security/cve/CVE-2020-12861/" source="CVE"/>
		<reference ref_id="CVE-2020-12862" ref_url="https://www.suse.com/security/cve/CVE-2020-12862/" source="CVE"/>
		<reference ref_id="CVE-2020-12863" ref_url="https://www.suse.com/security/cve/CVE-2020-12863/" source="CVE"/>
		<reference ref_id="CVE-2020-12864" ref_url="https://www.suse.com/security/cve/CVE-2020-12864/" source="CVE"/>
		<reference ref_id="CVE-2020-12865" ref_url="https://www.suse.com/security/cve/CVE-2020-12865/" source="CVE"/>
		<reference ref_id="CVE-2020-12866" ref_url="https://www.suse.com/security/cve/CVE-2020-12866/" source="CVE"/>
		<reference ref_id="CVE-2020-12867" ref_url="https://www.suse.com/security/cve/CVE-2020-12867/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<description>
This update for sane-backends fixes the following issues:

- sane-backends version upgrade to 1.0.31:
  * sane-backends version upgrade to 1.0.30
    fixes memory corruption bugs CVE-2020-12861, CVE-2020-12862,
    CVE-2020-12863, CVE-2020-12864, CVE-2020-12865,
    CVE-2020-12866, CVE-2020-12867 (bsc#1172524)
  * sane-backends version upgrade to 1.0.31
    to further improve hardware enablement for scanner devices
    (jsc#SLE-15561 and jsc#SLE-15560 with jsc#ECO-2418)
  * The new escl backend cannot be provided for SLE12 because
    it requires more additional software (avahi-client, libcurl,
    and libpoppler-glib-devel) where in particular for libcurl
    the one that is in SLE12 (via libcurl-devel-7.37.0) is likely
    too old because with that building the escl backend fails with
    'escl/escl.c:1267:34: error: 'CURLOPT_UNIX_SOCKET_PATH'
    undeclared curl_easy_setopt(handle, CURLOPT_UNIX_SOCKET_PATH'
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6318">CVE-2017-6318 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12861/">CVE-2020-12861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12861">CVE-2020-12861 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12862/">CVE-2020-12862 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12862">CVE-2020-12862 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12863/">CVE-2020-12863 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12863">CVE-2020-12863 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12864/">CVE-2020-12864 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12864">CVE-2020-12864 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12865/">CVE-2020-12865 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12865">CVE-2020-12865 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12866/">CVE-2020-12866 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12866">CVE-2020-12866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12867/">CVE-2020-12867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12867">CVE-2020-12867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531452" comment="sane-backends-1.0.31-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148343" version="1" class="patch">
	<metadata>
		<title>Security update for apache-commons-httpclient (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1178171" ref_url="https://bugzilla.suse.com/1178171" source="BUGZILLA"/>
		<reference ref_id="945190" ref_url="https://bugzilla.suse.com/945190" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3577" ref_url="https://www.suse.com/security/cve/CVE-2014-3577/" source="CVE"/>
		<reference ref_id="CVE-2015-5262" ref_url="https://www.suse.com/security/cve/CVE-2015-5262/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007689.html" source="SUSE-SU"/>
		<description>
This update for apache-commons-httpclient fixes the following issues:

- http/conn/ssl/SSLConnectionSocketFactory.java ignores the
  http.socket.timeout configuration setting during an SSL handshake,
  which allows remote attackers to cause a denial of service (HTTPS
  call hang) via unspecified vectors. [bsc#945190, CVE-2015-5262]
- org.apache.http.conn.ssl.AbstractVerifier does not properly
  verify that the server hostname matches a domain name in the
  subject's Common Name (CN) or subjectAltName field of the X.509
  certificate, which allows MITM attackers to spoof SSL servers
  via a 'CN=' string in a field in the distinguished name (DN)
  of a certificate. [bsc#1178171, CVE-2014-3577]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-04"/>
	<updated date="2020-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178171">SUSE bug 1178171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945190">SUSE bug 945190</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3577/">CVE-2014-3577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3577">CVE-2014-3577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5262/">CVE-2015-5262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5262">CVE-2015-5262 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531477" comment="apache-commons-httpclient-3.1-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148344" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1118597" ref_url="https://bugzilla.suse.com/1118597" source="BUGZILLA"/>
		<reference ref_id="1130246" ref_url="https://bugzilla.suse.com/1130246" source="BUGZILLA"/>
		<reference ref_id="1161167" ref_url="https://bugzilla.suse.com/1161167" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19870" ref_url="https://www.suse.com/security/cve/CVE-2018-19870/" source="CVE"/>
		<reference ref_id="CVE-2018-19872" ref_url="https://www.suse.com/security/cve/CVE-2018-19872/" source="CVE"/>
		<reference ref_id="CVE-2020-0569" ref_url="https://www.suse.com/security/cve/CVE-2020-0569/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006448.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

Security issues fixed:	  

- CVE-2020-0569: Fixed a potential local code execution by loading plugins from CWD (bsc#1161167).
- CVE-2018-19870: Fixed an improper check in QImage allocation which could allow Denial of Service
  when opening crafted gif files (bsc#1118597).
- CVE-2018-19872: Fixed an issue which could allow a division by zero leading to crash (bsc#1130246).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-04"/>
	<updated date="2020-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118597">SUSE bug 1118597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130246">SUSE bug 1130246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161167">SUSE bug 1161167</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19870/">CVE-2018-19870 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19870">CVE-2018-19870 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19872/">CVE-2018-19872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19872">CVE-2018-19872 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0569/">CVE-2020-0569 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0569">CVE-2020-0569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522604" comment="libQt5Concurrent5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522605" comment="libQt5Core5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522606" comment="libQt5DBus5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522607" comment="libQt5Gui5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522608" comment="libQt5Network5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522609" comment="libQt5OpenGL5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522610" comment="libQt5PrintSupport5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522611" comment="libQt5Sql5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522612" comment="libQt5Sql5-mysql-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522613" comment="libQt5Sql5-postgresql-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522614" comment="libQt5Sql5-sqlite-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522615" comment="libQt5Sql5-unixODBC-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522616" comment="libQt5Test5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522617" comment="libQt5Widgets5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522618" comment="libQt5Xml5-5.6.2-6.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148345" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Fix regression '8250861: Crash in MinINode::Ideal(PhaseGVN*, bool)',
  introduced in October 2020 CPU.

- Update to version jdk8u272 (icedtea 3.17.0) (July 2020 CPU,
  bsc#1174157, and October 2020 CPU, bsc#1177943)
  * New features
    + JDK-8245468: Add TLSv1.3 implementation classes from 11.0.7
    + PR3796: Allow the number of curves supported to be specified
  * Security fixes
    + JDK-8028431, CVE-2020-14579: NullPointerException in
      DerValue.equals(DerValue)
    + JDK-8028591, CVE-2020-14578: NegativeArraySizeException in
      sun.security.util.DerInputStream.getUnalignedBitString()
    + JDK-8230613: Better ASCII conversions
    + JDK-8231800: Better listing of arrays
    + JDK-8232014: Expand DTD support
    + JDK-8233255: Better Swing Buttons
    + JDK-8233624: Enhance JNI linkage
    + JDK-8234032: Improve basic calendar services
    + JDK-8234042: Better factory production of certificates
    + JDK-8234418: Better parsing with CertificateFactory
    + JDK-8234836: Improve serialization handling
    + JDK-8236191: Enhance OID processing
    + JDK-8236196: Improve string pooling
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237117, CVE-2020-14556: Better ForkJoinPool behavior
    + JDK-8237592, CVE-2020-14577: Enhance certificate verification
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8238002, CVE-2020-14581: Better matrix operations
    + JDK-8238804: Enhance key handling process
    + JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    + JDK-8238843: Enhanced font handing
    + JDK-8238920, CVE-2020-14583: Better Buffer support
    + JDK-8238925: Enhance WAV file playback
    + JDK-8240119, CVE-2020-14593: Less Affine Transformations
    + JDK-8240124: Better VM Interning
    + JDK-8240482: Improved WAV file playback
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8241379: Update JCEKS support
    + JDK-8241522: Manifest improved jar headers redux
    + JDK-8242136, CVE-2020-14621: Better XML namespace handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Import of OpenJDK 8 u262 build 01
    + JDK-4949105: Access Bridge lacks html tags parsing
    + JDK-8003209: JFR events for network utilization
    + JDK-8030680: 292 cleanup from default method code assessment
    + JDK-8035633: TEST_BUG: java/net/NetworkInterface/Equals.java
      and some tests failed on windows intermittently
    + JDK-8041626: Shutdown tracing event
    + JDK-8141056: Erroneous assignment in HeapRegionSet.cpp
    + JDK-8149338: JVM Crash caused by Marlin renderer not handling
       NaN coordinates
    + JDK-8151582: (ch) test java/nio/channels/
      /AsyncCloseAndInterrupt.java failing due to 'Connection
      succeeded'
    + JDK-8165675: Trace event for thread park has incorrect unit
       for timeout
    + JDK-8176182: 4 security tests are not run
    + JDK-8178910: Problemlist sample tests
    + JDK-8183925: Decouple crash protection from watcher thread
    + JDK-8191393: Random crashes during cfree+0x1c
    + JDK-8195817: JFR.stop should require name of recording
    + JDK-8195818: JFR.start should increase autogenerated name by
       one
    + JDK-8195819: Remove recording=x from jcmd JFR.check output
    + JDK-8199712: Flight Recorder
    + JDK-8202578: Revisit location for class unload events
    + JDK-8202835: jfr/event/os/TestSystemProcess.java fails on
      missing events
    + JDK-8203287: Zero fails to build after JDK-8199712 (Flight
      Recorder)
    + JDK-8203346: JFR: Inconsistent signature of
      jfr_add_string_constant
    + JDK-8203664: JFR start failure after AppCDS archive created
      with JFR StartFlightRecording
    + JDK-8203921: JFR thread sampling is missing fixes from
      JDK-8194552
    + JDK-8203929: Limit amount of data for JFR.dump
    + JDK-8205516: JFR tool
    + JDK-8207392: [PPC64] Implement JFR profiling
    + JDK-8207829: FlightRecorderMXBeanImpl is leaking the first
      classloader which calls it
    + JDK-8209960: -Xlog:jfr* doesn't work with the JFR
    + JDK-8210024: JFR calls virtual is_Java_thread from ~Thread()
    + JDK-8210776: Upgrade X Window System 6.8.2 to the latest XWD
      1.0.7
    + JDK-8211239: Build fails without JFR: empty JFR events
      signatures mismatch
    + JDK-8212232: Wrong metadata for the configuration of the
      cutoff for old object sample events
    + JDK-8213015: Inconsistent settings between JFR.configure and
      -XX:FlightRecorderOptions
    + JDK-8213421: Line number information for execution samples
      always 0
    + JDK-8213617: JFR should record the PID of the recorded process
    + JDK-8213734: SAXParser.parse(File, ..) does not close
      resources when Exception occurs.
    + JDK-8213914: [TESTBUG] Several JFR VM events are not covered
      by tests
    + JDK-8213917: [TESTBUG] Shutdown JFR event is not covered by
      test
    + JDK-8213966: The ZGC JFR events should be marked as
      experimental
    + JDK-8214542: JFR: Old Object Sample event slow on a deep heap
      in debug builds
    + JDK-8214750: Unnecessary &lt;p&gt; tags in jfr classes
    + JDK-8214896: JFR Tool left files behind
    + JDK-8214906: [TESTBUG] jfr/event/sampling/TestNative.java
      fails with UnsatisfiedLinkError
    + JDK-8214925: JFR tool fails to execute
    + JDK-8215175: Inconsistencies in JFR event metadata
    + JDK-8215237: jdk.jfr.Recording javadoc does not compile
    + JDK-8215284: Reduce noise induced by periodic task
      getFileSize()
    + JDK-8215355: Object monitor deadlock with no threads holding
      the monitor (using jemalloc 5.1)
    + JDK-8215362: JFR GTest JfrTestNetworkUtilization fails
    + JDK-8215771: The jfr tool should pretty print reference chains
    + JDK-8216064: -XX:StartFlightRecording:settings= doesn't work
      properly
    + JDK-8216486: Possibility of integer overflow in
      JfrThreadSampler::run()
    + JDK-8216528: test/jdk/java/rmi/transport/
       /runtimeThreadInheritanceLeak/
       /RuntimeThreadInheritanceLeak.java failing with Xcomp
    + JDK-8216559: [JFR] Native libraries not correctly parsed from
      /proc/self/maps
    + JDK-8216578: Remove unused/obsolete method in JFR code
    + JDK-8216995: Clean up JFR command line processing
    + JDK-8217744: [TESTBUG] JFR TestShutdownEvent fails on some
      systems due to process surviving SIGINT
    + JDK-8217748: [TESTBUG] Exclude TestSig test case from JFR
      TestShutdownEvent
    + JDK-8218935: Make jfr strncpy uses GCC 8.x friendly
    + JDK-8223147: JFR Backport
    + JDK-8223689: Add JFR Thread Sampling Support
    + JDK-8223690: Add JFR BiasedLock Event Support
    + JDK-8223691: Add JFR G1 Region Type Change Event Support
    + JDK-8223692: Add JFR G1 Heap Summary Event Support
    + JDK-8224172: assert(jfr_is_event_enabled(id)) failed:
      invariant
    + JDK-8224475: JTextPane does not show images in HTML rendering
    + JDK-8226253: JAWS reports wrong number of radio buttons when
      buttons are hidden.
    + JDK-8226779: [TESTBUG] Test JFR API from Java agent
    + JDK-8226892: ActionListeners on JRadioButtons don't get
      notified when selection is changed with arrow keys
    + JDK-8227011: Starting a JFR recording in response to JVMTI
      VMInit and / or Java agent premain corrupts memory
    + JDK-8227605: Kitchensink fails 'assert((((klass)-&gt;trace_id()
      &amp; (JfrTraceIdEpoch::leakp_in_use_this_epoch_bit())) != 0))
      failed: invariant'
    + JDK-8229366: JFR backport allows unchecked writing to memory
    + JDK-8229401: Fix JFR code cache test failures
    + JDK-8229708: JFR backport code does not initialize
    + JDK-8229873: 8229401 broke jdk8u-jfr-incubator
    + JDK-8230448: [test] JFRSecurityTestSuite.java is failing on
      Windows
    + JDK-8230707: JFR related tests are failing
    + JDK-8230782: Robot.createScreenCapture() fails if
      'awt.robot.gtk' is set to false
    + JDK-8230856: Java_java_net_NetworkInterface_getByName0 on
       unix misses ReleaseStringUTFChars in early return
    + JDK-8230947: TestLookForUntestedEvents.java is failing after
      JDK-8230707
    + JDK-8231995: two jtreg tests failed after 8229366 is fixed
    + JDK-8233623: Add classpath exception to copyright in
      EventHandlerProxyCreator.java file
    + JDK-8236002: CSR for JFR backport suggests not leaving out
      the package-info
    + JDK-8236008: Some backup files were accidentally left in the
      hotspot tree
    + JDK-8236074: Missed package-info
    + JDK-8236174: Should update javadoc since tags
    + JDK-8238076: Fix OpenJDK 7 Bootstrap Broken by JFR Backport
    + JDK-8238452: Keytool generates wrong expiration date if
      validity is set to 2050/01/01
    + JDK-8238555: Allow Initialization of SunPKCS11 with NSS when
      there are external FIPS modules in the NSSDB
    + JDK-8238589: Necessary code cleanup in JFR for JDK8u
    + JDK-8238590: Enable JFR by default during compilation in 8u
    + JDK-8239055: Wrong implementation of VMState.hasListener
    + JDK-8239476: JDK-8238589 broke windows build by moving
      OrderedPair
    + JDK-8239479: minimal1 and zero builds are failing
    + JDK-8239867: correct over use of INCLUDE_JFR macro
    + JDK-8240375: Disable JFR by default for July 2020 release
    + JDK-8241444: Metaspace::_class_vsm not initialized if
      compressed class pointers are disabled
    + JDK-8241902: AIX Build broken after integration of
      JDK-8223147 (JFR Backport)
    + JDK-8242788: Non-PCH build is broken after JDK-8191393
  * Import of OpenJDK 8 u262 build 02
    + JDK-8130737: AffineTransformOp can't handle child raster with
      non-zero x-offset
    + JDK-8172559: [PIT][TEST_BUG] Move @test to be 1st annotation
      in java/awt/image/Raster/TestChildRasterOp.java
    + JDK-8230926: [macosx] Two apostrophes are entered instead of
      one with 'U.S. International - PC' layout
    + JDK-8240576: JVM crashes after transformation in C2
      IdealLoopTree::merge_many_backedges
    + JDK-8242883: Incomplete backport of JDK-8078268: backport
      test part
  * Import of OpenJDK 8 u262 build 03
    + JDK-8037866: Replace the Fun class in tests with lambdas
    + JDK-8146612: C2: Precedence edges specification violated
    + JDK-8150986: serviceability/sa/jmap-hprof/
       /JMapHProfLargeHeapTest.java failing because expects HPROF
      JAVA PROFILE 1.0.1 file format
    + JDK-8229888: (zipfs) Updating an existing zip file does not
      preserve original permissions
    + JDK-8230597: Update GIFlib library to the 5.2.1
    + JDK-8230769: BufImg_SetupICM add
      ReleasePrimitiveArrayCritical call in early return
    + JDK-8233880, PR3798: Support compilers with multi-digit major
      version numbers
    + JDK-8239852: java/util/concurrent tests fail with
      -XX:+VerifyGraphEdges: assert(!VerifyGraphEdges) failed:
      verification should have failed
    + JDK-8241638: launcher time metrics always report 1 on Linux
      when _JAVA_LAUNCHER_DEBUG set
    + JDK-8243059: Build fails when --with-vendor-name contains a
      comma
    + JDK-8243474: [TESTBUG] removed three tests of 0 bytes
    + JDK-8244461: [JDK 8u] Build fails with glibc 2.32
    + JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion()
      returns wrong result
  * Import of OpenJDK 8 u262 build 04
    + JDK-8067796: (process) Process.waitFor(timeout, unit) doesn't
      throw NPE if timeout is less than, or equal to zero when unit
      == null
    + JDK-8148886: SEGV in sun.java2d.marlin.Renderer._endRendering
    + JDK-8171934:
      ObjectSizeCalculator.getEffectiveMemoryLayoutSpecification()
      does not recognize OpenJDK's HotSpot VM
    + JDK-8196969: JTreg Failure:
      serviceability/sa/ClhsdbJstack.java causes NPE
    + JDK-8243539: Copyright info (Year) should be updated for fix
      of 8241638
    + JDK-8244777: ClassLoaderStats VM Op uses constant hash value
  * Import of OpenJDK 8 u262 build 05
    + JDK-7147060: com/sun/org/apache/xml/internal/security/
      /transforms/ClassLoaderTest.java doesn't run in agentvm mode
    + JDK-8178374: Problematic ByteBuffer handling in
      CipherSpi.bufferCrypt method
    + JDK-8181841: A TSA server returns timestamp with precision
      higher than milliseconds
    + JDK-8227269: Slow class loading when running with JDWP
    + JDK-8229899: Make java.io.File.isInvalid() less racy
    + JDK-8236996: Incorrect Roboto font rendering on Windows with
      subpixel antialiasing
    + JDK-8241750: x86_32 build failure after JDK-8227269
    + JDK-8244407: JVM crashes after transformation in C2
      IdealLoopTree::split_fall_in
    + JDK-8244843: JapanEraNameCompatTest fails
  * Import of OpenJDK 8 u262 build 06
    + JDK-8246223: Windows build fails after JDK-8227269
  * Import of OpenJDK 8 u262 build 07
    + JDK-8233197: Invert JvmtiExport::post_vm_initialized() and
      Jfr:on_vm_start() start-up order for correct option parsing
    + JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a
    + JDK-8245167: Top package in method profiling shows null in JMC
    + JDK-8246703: [TESTBUG] Add test for JDK-8233197
  * Import of OpenJDK 8 u262 build 08
    + JDK-8220293: Deadlock in JFR string pool
    + JDK-8225068: Remove DocuSign root certificate that is
      expiring in May 2020
    + JDK-8225069: Remove Comodo root certificate that is expiring
      in May 2020
  * Import of OpenJDK 8 u262 build 09
    + JDK-8248399: Build installs jfr binary when JFR is disabled
  * Import of OpenJDK 8 u262 build 10
    + JDK-8248715: New JavaTimeSupplementary localisation for 'in'
      installed in wrong package
  * Import of OpenJDK 8 u265 build 01
    + JDK-8249677: Regression in 8u after JDK-8237117: Better
      ForkJoinPool behavior
    + JDK-8250546: Expect changed behaviour reported in JDK-8249846
  * Import of OpenJDK 8 u272 build 01
    + JDK-8006205: [TESTBUG] NEED_TEST: please JTREGIFY
      test/compiler/7177917/Test7177917.java
    + JDK-8035493: JVMTI PopFrame capability must instruct
      compilers not to prune locals
    + JDK-8036088: Replace strtok() with its safe equivalent
      strtok_s() in DefaultProxySelector.c
    + JDK-8039082: [TEST_BUG] Test java/awt/dnd/
      /BadSerializationTest/BadSerializationTest.java fails
    + JDK-8075774: Small readability and performance improvements
      for zipfs
    + JDK-8132206: move ScanTest.java into OpenJDK
    + JDK-8132376: Add @requires os.family to the client tests with
      access to internal OS-specific API
    + JDK-8132745: minor cleanup of java/util/Scanner/ScanTest.java
    + JDK-8137087: [TEST_BUG] Cygwin failure of java/awt/
      /appletviewer/IOExceptionIfEncodedURLTest/
      /IOExceptionIfEncodedURLTest.sh
    + JDK-8145808: java/awt/Graphics2D/MTGraphicsAccessTest/
      /MTGraphicsAccessTest.java hangs on Win. 8
    + JDK-8151788: NullPointerException from ntlm.Client.type3
    + JDK-8151834: Test SmallPrimeExponentP.java times out
      intermittently
    + JDK-8153430: jdk regression test MletParserLocaleTest,
      ParserInfiniteLoopTest reduce default timeout
    + JDK-8153583: Make OutputAnalyzer.reportDiagnosticSummary
      public
    + JDK-8156169: Some sound tests rarely hangs because of
      incorrect synchronization
    + JDK-8165936: Potential Heap buffer overflow when seaching
      timezone info files
    + JDK-8166148: Fix for JDK-8165936 broke solaris builds
    + JDK-8167300: Scheduling failures during gcm should be fatal
    + JDK-8167615: Opensource unit/regression tests for JavaSound
    + JDK-8172012: [TEST_BUG] delays needed in
      javax/swing/JTree/4633594/bug4633594.java
    + JDK-8177628: Opensource unit/regression tests for ImageIO
    + JDK-8183341: Better cleanup for javax/imageio/AllowSearch.java
    + JDK-8183351: Better cleanup for jdk/test/javax/imageio/spi/
      /AppletContextTest/BadPluginConfigurationTest.sh
    + JDK-8193137: Nashorn crashes when given an empty script file
    + JDK-8194298: Add support for per Socket configuration of TCP
      keepalive
    + JDK-8198004: javax/swing/JFileChooser/6868611/bug6868611.java
      throws error
    + JDK-8200313: java/awt/Gtk/GtkVersionTest/GtkVersionTest.java
      fails
    + JDK-8210147: adjust some WSAGetLastError usages in windows
      network coding
    + JDK-8211714: Need to update vm_version.cpp to recognise
      VS2017 minor versions
    + JDK-8214862: assert(proj != __null) at compile.cpp:3251
    + JDK-8217606: LdapContext#reconnect always opens a new
      connection
    + JDK-8217647: JFR: recordings on 32-bit systems unreadable
    + JDK-8226697: Several tests which need the @key headful
      keyword are missing it.
    + JDK-8229378: jdwp library loader in linker_md.c quietly
      truncates on buffer overflow
    + JDK-8230303: JDB hangs when running monitor command
    + JDK-8230711: ConnectionGraph::unique_java_object(Node* N)
      return NULL if n is not in the CG
    + JDK-8234617: C1: Incorrect result of field load due to
      missing narrowing conversion
    + JDK-8235243: handle VS2017 15.9 and VS2019 in
      abstract_vm_version
    + JDK-8235325: build failure on Linux after 8235243
    + JDK-8235687: Contents/MacOS/libjli.dylib cannot be a symlink
    + JDK-8237951: CTW: C2 compilation fails with 'malformed
      control flow'
    + JDK-8238225: Issues reported after replacing symlink at
      Contents/MacOS/libjli.dylib with binary
    + JDK-8239385: KerberosTicket client name refers wrongly to
      sAMAccountName in AD
    + JDK-8239819: XToolkit: Misread of screen information memory
    + JDK-8240295: hs_err elapsed time in seconds is not accurate
      enough
    + JDK-8241888: Mirror jdk.security.allowNonCaAnchor system
      property with a security one
    + JDK-8242498: Invalid 'sun.awt.TimedWindowEvent' object leads
      to JVM crash
    + JDK-8243489: Thread CPU Load event may contain wrong data for
      CPU time under certain conditions
    + JDK-8244818: Java2D Queue Flusher crash while moving
      application window to external monitor
    + JDK-8246310: Clean commented-out code about ModuleEntry
      and PackageEntry in JFR
    + JDK-8246384: Enable JFR by default on supported architectures
      for October 2020 release
    + JDK-8248643: Remove extra leading space in JDK-8240295 8u
      backport
    + JDK-8249610: Make
      sun.security.krb5.Config.getBooleanObject(String... keys)
      method public
  * Import of OpenJDK 8 u272 build 02
    + JDK-8023697: failed class resolution reports different class
      name in detail message for the first and subsequent times
    + JDK-8025886: replace [[ and == bash extensions in regtest
    + JDK-8046274: Removing dependency on jakarta-regexp
    + JDK-8048933: -XX:+TraceExceptions output should include the
      message
    + JDK-8076151: [TESTBUG] Test java/awt/FontClass/CreateFont/
      /fileaccess/FontFile.java fails
    + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'
      treated by JVM as an equivalent
    + JDK-8154313: Generated javadoc scattered all over the place
    + JDK-8163251: Hard coded loop limit prevents reading of smart
      card data greater than 8k
    + JDK-8173300: [TESTBUG]compiler/tiered/NonTieredLevelsTest.java
      fails with compiler.whitebox.SimpleTestCaseHelper(int) must be
      compiled
    + JDK-8183349: Better cleanup for jdk/test/javax/imageio/
      /plugins/shared/CanWriteSequence.java and WriteAfterAbort.java
    + JDK-8191678: [TESTBUG] Add keyword headful in java/awt
      FocusTransitionTest test.
    + JDK-8201633: Problems with AES-GCM native acceleration
    + JDK-8211049: Second parameter of 'initialize' method is not
          used
    + JDK-8219566: JFR did not collect call stacks when
      MaxJavaStackTraceDepth is set to zero
    + JDK-8220165: Encryption using GCM results in
      RuntimeException- input length out of bound
    + JDK-8220555: JFR tool shows potentially misleading message
      when it cannot access a file
    + JDK-8224217: RecordingInfo should use textual representation
      of path
    + JDK-8231779: crash
      HeapWord*ParallelScavengeHeap::failed_mem_allocate
    + JDK-8238380, PR3798: java.base/unix/native/libjava/childproc.c
      'multiple definition' link errors with GCC10
    + JDK-8238386, PR3798: (sctp) jdk.sctp/unix/native/libsctp/
      /SctpNet.c 'multiple definition' link errors with GCC10
    + JDK-8238388, PR3798: libj2gss/NativeFunc.o 'multiple
      definition' link errors with GCC10
    + JDK-8242556: Cannot load RSASSA-PSS public key with non-null
      params from byte array
    + JDK-8250755: Better cleanup for jdk/test/javax/imageio/
      /plugins/shared/CanWriteSequence.java
  * Import of OpenJDK 8 u272 build 03
    + JDK-6574989: TEST_BUG:
      javax/sound/sampled/Clip/bug5070081.java fails sometimes
    + JDK-8148754: C2 loop unrolling fails due to unexpected graph
      shape
    + JDK-8192953: sun/management/jmxremote/bootstrap/*.sh tests
      fail with error : revokeall.exe: Permission denied
    + JDK-8203357: Container Metrics
    + JDK-8209113: Use WeakReference for lastFontStrike for created
      Fonts
    + JDK-8216283: Allow shorter method sampling interval than 10 ms
    + JDK-8221569: JFR tool produces incorrect output when both
      --categories and --events are specified
    + JDK-8233097: Fontmetrics for large Fonts has zero width
    + JDK-8248851: CMS: Missing memory fences between free chunk
      check and klass read
    + JDK-8250875: Incorrect parameter type for update_number in
      JDK_Version::jdk_update
  * Import of OpenJDK 8 u272 build 04
    + JDK-8061616: HotspotDiagnosticMXBean.getVMOption() throws
      IllegalArgumentException for flags of type double
    + JDK-8177334: Update xmldsig implementation to Apache
      Santuario 2.1.1
    + JDK-8217878: ENVELOPING XML signature no longer works in JDK
      11
    + JDK-8218629: XML Digital Signature throws NAMESPACE_ERR
      exception on OpenJDK 11, works 8/9/10
    + JDK-8243138: Enhance BaseLdapServer to support starttls
      extended request
  * Import of OpenJDK 8 u272 build 05
    + JDK-8026236: Add PrimeTest for BigInteger
    + JDK-8057003: Large reference arrays cause extremely long
      synchronization times
    + JDK-8060721: Test runtime/SharedArchiveFile/
      /LimitSharedSizes.java fails in jdk 9 fcs new
      platforms/compiler
    + JDK-8152077: (cal) Calendar.roll does not always roll the
      hours during daylight savings
    + JDK-8168517: java/lang/ProcessBuilder/Basic.java failed
    + JDK-8211163: UNIX version of Java_java_io_Console_echo does
      not return a clean boolean
    + JDK-8220674: [TESTBUG] MetricsMemoryTester failcount test in
      docker container only works with debug JVMs
    + JDK-8231213: Migrate SimpleDateFormatConstTest to JDK Repo
    + JDK-8236645: JDK 8u231 introduces a regression with
      incompatible handling of XML messages
    + JDK-8240676: Meet not symmetric failure when running lucene
      on jdk8
    + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA
      program
    + JDK-8249158: THREAD_START and THREAD_END event posted in
      primordial phase
    + JDK-8250627: Use -XX:+/-UseContainerSupport for
      enabling/disabling Java container metrics
    + JDK-8251546: 8u backport of JDK-8194298 breaks AIX and
      Solaris builds
    + JDK-8252084: Minimal VM fails to bootcycle: undefined symbol:
      AgeTableTracer::is_tenuring_distribution_event_enabled
  * Import of OpenJDK 8 u272 build 06
    + JDK-8064319: Need to enable -XX:+TraceExceptions in release
      builds
    + JDK-8080462, PR3801: Update SunPKCS11 provider with PKCS11
      v2.40 support
    + JDK-8160768: Add capability to custom resolve host/domain
      names within the default JNDI LDAP provider
    + JDK-8161973: PKIXRevocationChecker.getSoftFailExceptions()
      not working
    + JDK-8169925, PR3801: PKCS #11 Cryptographic Token Interface
      license
    + JDK-8184762: ZapStackSegments should use optimized memset
    + JDK-8193234: When using -Xcheck:jni an internally allocated
      buffer can leak
    + JDK-8219919: RuntimeStub name lost with
      PrintFrameConverterAssembly
    + JDK-8220313: [TESTBUG] Update base image for Docker testing
      to OL 7.6
    + JDK-8222079: Don't use memset to initialize fields decode_env
      constructor in disassembler.cpp
    + JDK-8225695: 32-bit build failures after JDK-8080462 (Update
      SunPKCS11 provider with PKCS11 v2.40 support)
    + JDK-8226575: OperatingSystemMXBean should be made container
      aware
    + JDK-8226809: Circular reference in printed stack trace is not
      correctly indented &amp; ambiguous
    + JDK-8228835: Memory leak in PKCS11 provider when using AES GCM
    + JDK-8233621: Mismatch in jsse.enableMFLNExtension property
      name
    + JDK-8238898, PR3801: Missing hash characters for header on
      license file
    + JDK-8243320: Add SSL root certificates to Oracle Root CA
      program
    + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest
      release 1.8.26
    + JDK-8245467: Remove 8u TLSv1.2 implementation files
    + JDK-8245469: Remove DTLS protocol implementation
    + JDK-8245470: Fix JDK8 compatibility issues
    + JDK-8245471: Revert JDK-8148188
    + JDK-8245472: Backport JDK-8038893 to JDK8
    + JDK-8245473: OCSP stapling support
    + JDK-8245474: Add TLS_KRB5 cipher suites support according to
      RFC-2712
    + JDK-8245476: Disable TLSv1.3 protocol in the ClientHello
      message by default
    + JDK-8245477: Adjust TLS tests location
    + JDK-8245653: Remove 8u TLS tests
    + JDK-8245681: Add TLSv1.3 regression test from 11.0.7
    + JDK-8251117: Cannot check P11Key size in P11Cipher and
      P11AEADCipher
    + JDK-8251120, PR3793: [8u] HotSpot build assumes ENABLE_JFR is
      set to either true or false
    + JDK-8251341: Minimal Java specification change
    + JDK-8251478: Backport TLSv1.3 regression tests to JDK8u
  * Import of OpenJDK 8 u272 build 07
    + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ
  * Import of OpenJDK 8 u272 build 08
    + JDK-8062947: Fix exception message to correctly represent
      LDAP connection failure
    + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed
      due to timeout on DeadServerNoTimeoutTest is incorrect
    + JDK-8252573: 8u: Windows build failed after 8222079 backport
  * Import of OpenJDK 8 u272 build 09
    + JDK-8252886: [TESTBUG] sun/security/ec/TestEC.java :
      Compilation failed
  * Import of OpenJDK 8 u272 build 10
    + JDK-8254673: Call to JvmtiExport::post_vm_start() was removed
      by the fix for JDK-8249158
    + JDK-8254937: Revert JDK-8148854 for 8u272
  * Backports
    + JDK-8038723, PR3806: Openup some PrinterJob tests
    + JDK-8041480, PR3806: ArrayIndexOutOfBoundsException when
      JTable contains certain string
    + JDK-8058779, PR3805: Faster implementation of
      String.replace(CharSequence, CharSequence)
    + JDK-8130125, PR3806: [TEST_BUG] add @modules to the several
      client tests unaffected by the automated bulk update
    + JDK-8144015, PR3806: [PIT] failures of text layout font tests
    + JDK-8144023, PR3806: [PIT] failure of text measurements in
      javax/swing/text/html/parser/Parser/6836089/bug6836089.java
    + JDK-8144240, PR3806: [macosx][PIT] AIOOB in
      closed/javax/swing/text/GlyphPainter2/6427244/bug6427244.java
    + JDK-8145542, PR3806: The case failed automatically and thrown
      java.lang.ArrayIndexOutOfBoundsException exception
    + JDK-8151725, PR3806: [macosx] ArrayIndexOOB exception when
      displaying Devanagari text in JEditorPane
    + JDK-8152358, PR3800: code and comment cleanups found during
      the hunt for 8077392
    + JDK-8152545, PR3804: Use preprocessor instead of compiling a
      program to generate native nio constants
    + JDK-8152680, PR3806: Regression in
      GlyphVector.getGlyphCharIndex behaviour
    + JDK-8158924, PR3806: Incorrect i18n text document layout
    + JDK-8166003, PR3806: [PIT][TEST_BUG] missing helper for
      javax/swing/text/GlyphPainter2/6427244/bug6427244.java
    + JDK-8166068, PR3806: test/java/awt/font/GlyphVector/
      /GetGlyphCharIndexTest.java does not compile
    + JDK-8169879, PR3806: [TEST_BUG] javax/swing/text/
      /GlyphPainter2/6427244/bug6427244.java - compilation failed
    + JDK-8191512, PR3806: T2K font rasterizer code removal
    + JDK-8191522, PR3806: Remove Bigelow&amp;Holmes Lucida fonts from
      JDK sources
    + JDK-8236512, PR3801: PKCS11 Connection closed after
      Cipher.doFinal and NoPadding
    + JDK-8254177, PR3809: (tz) Upgrade time-zone data to
      tzdata2020b
  * Bug fixes
    + PR3798: Fix format-overflow error on GCC 10, caused by
      passing NULL to a '%s' directive
    + PR3795: ECDSAUtils for XML digital signatures should support
      the same curve set as the rest of the JDK
    + PR3799: Adapt elliptic curve patches to JDK-8245468: Add
      TLSv1.3 implementation classes from 11.0.7
    + PR3808: IcedTea does not install the JFR *.jfc files
    + PR3810: Enable JFR on x86 (32-bit) now that JDK-8252096 has
      fixed its use with Shenandoah
    + PR3811: Don't attempt to install JFR files when JFR is
      disabled
  * Shenandoah
    + [backport] 8221435: Shenandoah should not mark through weak
      roots
    + [backport] 8221629: Shenandoah: Cleanup class unloading logic
    + [backport] 8222992: Shenandoah: Pre-evacuate all roots
    + [backport] 8223215: Shenandoah: Support verifying subset of
      roots
    + [backport] 8223774: Shenandoah: Refactor
      ShenandoahRootProcessor and family
    + [backport] 8224210: Shenandoah: Refactor
      ShenandoahRootScanner to support scanning CSet codecache roots
    + [backport] 8224508: Shenandoah: Need to update thread roots
      in final mark for piggyback ref update cycle
    + [backport] 8224579: ResourceMark not declared in
      shenandoahRootProcessor.inline.hpp with
      --disable-precompiled-headers
    + [backport] 8224679: Shenandoah: Make
      ShenandoahParallelCodeCacheIterator noncopyable
    + [backport] 8224751: Shenandoah: Shenandoah Verifier should
      select proper roots according to current GC cycle
    + [backport] 8225014: Separate ShenandoahRootScanner method for
      object_iterate
    + [backport] 8225216: gc/logging/TestMetaSpaceLog.java doesn't
      work for Shenandoah
    + [backport] 8225573: Shenandoah: Enhance ShenandoahVerifier to
      ensure roots to-space invariant
    + [backport] 8225590: Shenandoah: Refactor
      ShenandoahClassLoaderDataRoots API
    + [backport] 8226413: Shenandoah: Separate root scanner for
      SH::object_iterate()
    + [backport] 8230853: Shenandoah: replace leftover
      assert(is_in(...)) with rich asserts
    + [backport] 8231198: Shenandoah: heap walking should visit all
      roots most of the time
    + [backport] 8231244: Shenandoah: all-roots heap walking misses
      some weak roots
    + [backport] 8237632: Shenandoah: accept NULL fwdptr to
      cooperate with JVMTI and JFR
    + [backport] 8239786: Shenandoah: print per-cycle statistics
    + [backport] 8239926: Shenandoah: Shenandoah needs to mark
      nmethod's metadata
    + [backport] 8240671: Shenandoah: refactor
      ShenandoahPhaseTimings
    + [backport] 8240749: Shenandoah: refactor ShenandoahUtils
    + [backport] 8240750: Shenandoah: remove leftover files and
      mentions of ShenandoahAllocTracker
    + [backport] 8240868: Shenandoah: remove CM-with-UR
      piggybacking cycles
    + [backport] 8240872: Shenandoah: Avoid updating new regions
      from start of evacuation
    + [backport] 8240873: Shenandoah: Short-cut arraycopy barriers
    + [backport] 8240915: Shenandoah: Remove unused fields in init
      mark tasks
    + [backport] 8240948: Shenandoah: cleanup not-forwarded-objects
      paths after JDK-8240868
    + [backport] 8241007: Shenandoah: remove
      ShenandoahCriticalControlThreadPriority support
    + [backport] 8241062: Shenandoah: rich asserts trigger 'empty
      statement' inspection
    + [backport] 8241081: Shenandoah: Do not modify
      update-watermark concurrently
    + [backport] 8241093: Shenandoah: editorial changes in flag
      descriptions
    + [backport] 8241139: Shenandoah: distribute mark-compact work
      exactly to minimize fragmentation
    + [backport] 8241142: Shenandoah: should not use parallel
      reference processing with single GC thread
    + [backport] 8241351: Shenandoah: fragmentation metrics overhaul
    + [backport] 8241435: Shenandoah: avoid disabling pacing with
      'aggressive'
    + [backport] 8241520: Shenandoah: simplify region sequence
      numbers handling
    + [backport] 8241534: Shenandoah: region status should include
      update watermark
    + [backport] 8241574: Shenandoah: remove
      ShenandoahAssertToSpaceClosure
    + [backport] 8241583: Shenandoah: turn heap lock asserts into
      macros
    + [backport] 8241668: Shenandoah: make ShenandoahHeapRegion not
      derive from ContiguousSpace
    + [backport] 8241673: Shenandoah: refactor anti-false-sharing
      padding
    + [backport] 8241675: Shenandoah: assert(n-&gt;outcnt() &gt; 0) at
      shenandoahSupport.cpp:2858 with
      java/util/Collections/FindSubList.java
    + [backport] 8241692: Shenandoah: remove
      ShenandoahHeapRegion::_reserved
    + [backport] 8241700: Shenandoah: Fold
      ShenandoahKeepAliveBarrier flag into ShenandoahSATBBarrier
    + [backport] 8241740: Shenandoah: remove
      ShenandoahHeapRegion::_heap
    + [backport] 8241743: Shenandoah: refactor and inline
      ShenandoahHeap::heap()
    + [backport] 8241748: Shenandoah: inline MarkingContext TAMS
      methods
    + [backport] 8241838: Shenandoah: no need to trash cset during
      final mark
    + [backport] 8241841: Shenandoah: ditch one of allocation type
      counters in ShenandoahHeapRegion
    + [backport] 8241842: Shenandoah: inline
      ShenandoahHeapRegion::region_number
    + [backport] 8241844: Shenandoah: rename
      ShenandoahHeapRegion::region_number
    + [backport] 8241845: Shenandoah: align ShenandoahHeapRegions
      to cache lines
    + [backport] 8241926: Shenandoah: only print heap changes for
      operations that directly affect it
    + [backport] 8241983: Shenandoah: simplify FreeSet logging
    + [backport] 8241985: Shenandoah: simplify collectable garbage
      logging
    + [backport] 8242040: Shenandoah: print allocation failure type
    + [backport] 8242041: Shenandoah: adaptive heuristics should
      account evac reserve in free target
    + [backport] 8242042: Shenandoah: tune down
      ShenandoahGarbageThreshold
    + [backport] 8242054: Shenandoah: New incremental-update mode
    + [backport] 8242075: Shenandoah: rename
      ShenandoahHeapRegionSize flag
    + [backport] 8242082: Shenandoah: Purge Traversal mode
    + [backport] 8242083: Shenandoah: split 'Prepare Evacuation'
      tracking into cset/freeset counters
    + [backport] 8242089: Shenandoah: per-worker stats should be
      summed up, not averaged
    + [backport] 8242101: Shenandoah: coalesce and parallelise heap
      region walks during the pauses
    + [backport] 8242114: Shenandoah: remove
      ShenandoahHeapRegion::reset_alloc_metadata_to_shared
    + [backport] 8242130: Shenandoah: Simplify arraycopy-barrier
      dispatching
    + [backport] 8242211: Shenandoah: remove
      ShenandoahHeuristics::RegionData::_seqnum_last_alloc
    + [backport] 8242212: Shenandoah: initialize
      ShenandoahHeuristics::_region_data eagerly
    + [backport] 8242213: Shenandoah: remove
      ShenandoahHeuristics::_bytes_in_cset
    + [backport] 8242217: Shenandoah: Enable GC mode to be
      diagnostic/experimental and have a name
    + [backport] 8242227: Shenandoah: transit regions to cset state
      when adding to collection set
    + [backport] 8242228: Shenandoah: remove unused
      ShenandoahCollectionSet methods
    + [backport] 8242229: Shenandoah: inline ShenandoahHeapRegion
      liveness-related methods
    + [backport] 8242267: Shenandoah: regions space needs to be
      aligned by os::vm_allocation_granularity()
    + [backport] 8242271: Shenandoah: add test to verify GC mode
      unlock
    + [backport] 8242273: Shenandoah: accept either SATB or IU
      barriers, but not both
    + [backport] 8242301: Shenandoah: Inline LRB runtime call
    + [backport] 8242316: Shenandoah: Turn NULL-check into assert
      in SATB slow-path entry
    + [backport] 8242353: Shenandoah: micro-optimize region
      liveness handling
    + [backport] 8242365: Shenandoah: use uint16_t instead of
      jushort for liveness cache
    + [backport] 8242375: Shenandoah: Remove
      ShenandoahHeuristic::record_gc_start/end methods
    + [backport] 8242641: Shenandoah: clear live data and update
      TAMS optimistically
    + [backport] 8243238: Shenandoah: explicit GC request should
      wait for a complete GC cycle
    + [backport] 8243301: Shenandoah: ditch
      ShenandoahAllowMixedAllocs
    + [backport] 8243307: Shenandoah: remove
      ShCollectionSet::live_data
    + [backport] 8243395: Shenandoah: demote guarantee in
      ShenandoahPhaseTimings::record_workers_end
    + [backport] 8243463: Shenandoah: ditch total_pause counters
    + [backport] 8243464: Shenandoah: print statistic counters in
      time order
    + [backport] 8243465: Shenandoah: ditch unused pause_other,
      conc_other counters
    + [backport] 8243487: Shenandoah: make _num_phases illegal
      phase type
    + [backport] 8243494: Shenandoah: set counters once per cycle
    + [backport] 8243573: Shenandoah: rename GCParPhases and
      related code
    + [backport] 8243848: Shenandoah: Windows build fails after
      JDK-8239786
    + [backport] 8244180: Shenandoah: carry Phase to
      ShWorkerTimingsTracker explicitly
    + [backport] 8244200: Shenandoah: build breakages after
      JDK-8241743
    + [backport] 8244226: Shenandoah: per-cycle statistics contain
      worker data from previous cycles
    + [backport] 8244326: Shenandoah: global statistics should not
      accept bogus samples
    + [backport] 8244509: Shenandoah: refactor
      ShenandoahBarrierC2Support::test_* methods
    + [backport] 8244551: Shenandoah: Fix racy update of
      update_watermark
    + [backport] 8244667: Shenandoah: SBC2Support::test_gc_state
      takes loop for wrong control
    + [backport] 8244730: Shenandoah: gc/shenandoah/options/
      /TestHeuristicsUnlock.java should only verify the heuristics
    + [backport] 8244732: Shenandoah: move heuristics code to
      gc/shenandoah/heuristics
    + [backport] 8244737: Shenandoah: move mode code to
      gc/shenandoah/mode
    + [backport] 8244739: Shenandoah: break superclass dependency
      on ShenandoahNormalMode
    + [backport] 8244740: Shenandoah: rename ShenandoahNormalMode
      to ShenandoahSATBMode
    + [backport] 8245461: Shenandoah: refine mode name()-s
    + [backport] 8245463: Shenandoah: refine ShenandoahPhaseTimings
      constructor arguments
    + [backport] 8245464: Shenandoah: allocate collection set
      bitmap at lower addresses
    + [backport] 8245465: Shenandoah: test_in_cset can use more
      efficient encoding
    + [backport] 8245726: Shenandoah: lift/cleanup
      ShenandoahHeuristics names and properties
    + [backport] 8245754: Shenandoah: ditch ShenandoahAlwaysPreTouch
    + [backport] 8245757: Shenandoah: AlwaysPreTouch should not
      disable heap resizing or uncommits
    + [backport] 8245773: Shenandoah: Windows assertion failure
      after JDK-8245464
    + [backport] 8245812: Shenandoah: compute root phase parallelism
    + [backport] 8245814: Shenandoah: reconsider format specifiers
      for stats
    + [backport] 8245825: Shenandoah: Remove diagnostic flag
      ShenandoahConcurrentScanCodeRoots
    + [backport] 8246162: Shenandoah: full GC does not mark code
      roots when class unloading is off
    + [backport] 8247310: Shenandoah: pacer should not affect
      interrupt status
    + [backport] 8247358: Shenandoah: reconsider free budget slice
      for marking
    + [backport] 8247367: Shenandoah: pacer should wait on lock
      instead of exponential backoff
    + [backport] 8247474: Shenandoah: Windows build warning after
      JDK-8247310
    + [backport] 8247560: Shenandoah: heap iteration holds root
      locks all the time
    + [backport] 8247593: Shenandoah: should not block pacing
      reporters
    + [backport] 8247751: Shenandoah: options tests should run with
      smaller heaps
    + [backport] 8247754: Shenandoah: mxbeans tests can be shorter
    + [backport] 8247757: Shenandoah: split heavy tests by
      heuristics to improve parallelism
    + [backport] 8247860: Shenandoah: add update watermark line in
      rich assert failure message
    + [backport] 8248041: Shenandoah: pre-Full GC root updates may
      miss some roots
    + [backport] 8248652: Shenandoah: SATB buffer handling may
      assume no forwarded objects
    + [backport] 8249560: Shenandoah: Fix racy GC request handling
    + [backport] 8249649: Shenandoah: provide per-cycle pacing stats
    + [backport] 8249801: Shenandoah: Clear soft-refs on requested
      GC cycle
    + [backport] 8249953: Shenandoah: gc/shenandoah/mxbeans tests
      should account for corner cases
    + Fix slowdebug build after JDK-8230853 backport
    + JDK-8252096: Shenandoah: adjust SerialPageShiftCount for
      x86_32 and JFR
    + JDK-8252366: Shenandoah: revert/cleanup changes in
      graphKit.cpp
    + Shenandoah: add JFR roots to root processor after JFR
      integration
    + Shenandoah: add root statistics for string dedup table/queues
    + Shenandoah: enable low-frequency STW class unloading
    + Shenandoah: fix build failures after JDK-8244737 backport
    + Shenandoah: Fix build failure with +JFR -PCH
    + Shenandoah: fix forceful pacer claim
    + Shenandoah: fix formats in
      ShenandoahStringSymbolTableUnlinkTask
    + Shenandoah: fix runtime linking failure due to non-compiled
      shenandoahBarrierSetC1
    + Shenandoah: hook statistics printing to PrintGCDetails, not
      PrintGC
    + Shenandoah: JNI weak roots are always cleared before Full GC
      mark
    + Shenandoah: missing SystemDictionary roots in
      ShenandoahHeapIterationRootScanner
    + Shenandoah: move barrier sets to their proper locations
    + Shenandoah: move parallelCleaning.* to shenandoah/
    + Shenandoah: pacer should use proper Atomics for intptr_t
    + Shenandoah: properly deallocates class loader metadata
    + Shenandoah: specialize String Table scans for better pause
      performance
    + Shenandoah: Zero build fails after recent Atomic cleanup in
      Pacer
  * AArch64 port
    + JDK-8161072, PR3797: AArch64: jtreg
      compiler/uncommontrap/TestDeoptOOM failure
    + JDK-8171537, PR3797: aarch64: compiler/c1/Test6849574.java
      generates guarantee failure in C1
    + JDK-8183925, PR3797: [AArch64] Decouple crash protection from
      watcher thread
    + JDK-8199712, PR3797: [AArch64] Flight Recorder
    + JDK-8203481, PR3797: Incorrect constraint for unextended_sp
      in frame:safe_for_sender
    + JDK-8203699, PR3797: java/lang/invoke/SpecialInterfaceCall
      fails with SIGILL on aarch64
    + JDK-8209413, PR3797: AArch64: NPE in clhsdb jstack command
    + JDK-8215961, PR3797: jdk/jfr/event/os/TestCPUInformation.java
      fails on AArch64
    + JDK-8216989, PR3797:
      CardTableBarrierSetAssembler::gen_write_ref_array_post_barrier()
      does not check for zero length on AARCH64
    + JDK-8217368, PR3797: AArch64: C2 recursive stack locking
      optimisation not triggered
    + JDK-8221658, PR3797: aarch64: add necessary predicate for
      ubfx patterns
    + JDK-8237512, PR3797: AArch64: aarch64TestHook leaks a
      BufferBlob
    + JDK-8246482, PR3797: Build failures with +JFR -PCH
    + JDK-8247979, PR3797: aarch64: missing side effect of killing
      flags for clearArray_reg_reg
    + JDK-8248219, PR3797: aarch64: missing memory barrier in
      fast_storefield and fast_accessfield

- Ignore whitespaces after the header or footer in PEM X.509 cert
  (bsc#1171352)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531493" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531494" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531495" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531496" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148346" version="1" class="patch">
	<metadata>
		<title>Security update for gcc10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1172798" ref_url="https://bugzilla.suse.com/1172798" source="BUGZILLA"/>
		<reference ref_id="1172846" ref_url="https://bugzilla.suse.com/1172846" source="BUGZILLA"/>
		<reference ref_id="1173972" ref_url="https://bugzilla.suse.com/1173972" source="BUGZILLA"/>
		<reference ref_id="1174753" ref_url="https://bugzilla.suse.com/1174753" source="BUGZILLA"/>
		<reference ref_id="1174817" ref_url="https://bugzilla.suse.com/1174817" source="BUGZILLA"/>
		<reference ref_id="1175168" ref_url="https://bugzilla.suse.com/1175168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007739.html" source="SUSE-SU"/>
		<description>
This update for gcc10 fixes the following issues:
This update provides the GCC10 compiler suite and runtime libraries.

The base SUSE Linux Enterprise libraries libgcc_s1, libstdc++6 are replaced by
the gcc10 variants.

The new compiler variants are available with '-10' suffix, you can specify them
via:

        CC=gcc-10
        CXX=g++-10

or similar commands.

For a detailed changelog check out https://gcc.gnu.org/gcc-10/changes.html
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-10"/>
	<updated date="2020-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172798">SUSE bug 1172798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172846">SUSE bug 1172846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173972">SUSE bug 1173972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174753">SUSE bug 1174753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174817">SUSE bug 1174817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175168">SUSE bug 1175168</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13844">CVE-2020-13844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531497" comment="libasan6-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531498" comment="libasan6-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531499" comment="libatomic1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531500" comment="libatomic1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531501" comment="libgcc_s1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531502" comment="libgcc_s1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531503" comment="libgfortran5-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531504" comment="libgfortran5-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531505" comment="libgo16-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531506" comment="libgo16-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531507" comment="libgomp1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531508" comment="libgomp1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531509" comment="libitm1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531510" comment="libitm1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531511" comment="liblsan0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531512" comment="libobjc4-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531513" comment="libobjc4-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531514" comment="libquadmath0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531515" comment="libquadmath0-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531516" comment="libstdc++6-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531517" comment="libstdc++6-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531518" comment="libstdc++6-locale-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531519" comment="libstdc++6-pp-gcc10-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531520" comment="libstdc++6-pp-gcc10-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531521" comment="libtsan0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531522" comment="libubsan1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531523" comment="libubsan1-32bit-10.2.1+git583-1.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148347" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007757.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Intel CPU Microcode updated to 20201027 prerelease 
- CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) (bsc#1170446)
- CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)

# New Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  # Updated Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531524" comment="ucode-intel-20201027-13.76.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148348" version="1" class="patch">
	<metadata>
		<title>Security update for ansible, ardana-ansible, ardana-cinder, ardana-glance, ardana-mq, ardana-nova, ardana-osconfig, crowbar-core, crowbar-openstack, documentation-suse-openstack-cloud, grafana, grafana-natel-discrete-panel, openstack-cinder, openstack-monasca-installer, openstack-neutron, openstack-nova, python-Django, python-Flask-Cors, python-Pillow, python-ardana-packager, python-keystoneclient, python-keystonemiddleware, python-kombu, python-straight-plugin, python-urllib3, release-notes-suse-openstack-cloud, storm, storm-kit, venv-openstack-cinder, venv-openstack-swift (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1008037" ref_url="https://bugzilla.suse.com/1008037" source="BUGZILLA"/>
		<reference ref_id="1008038" ref_url="https://bugzilla.suse.com/1008038" source="BUGZILLA"/>
		<reference ref_id="1010940" ref_url="https://bugzilla.suse.com/1010940" source="BUGZILLA"/>
		<reference ref_id="1019021" ref_url="https://bugzilla.suse.com/1019021" source="BUGZILLA"/>
		<reference ref_id="1038785" ref_url="https://bugzilla.suse.com/1038785" source="BUGZILLA"/>
		<reference ref_id="1056094" ref_url="https://bugzilla.suse.com/1056094" source="BUGZILLA"/>
		<reference ref_id="1059235" ref_url="https://bugzilla.suse.com/1059235" source="BUGZILLA"/>
		<reference ref_id="1080682" ref_url="https://bugzilla.suse.com/1080682" source="BUGZILLA"/>
		<reference ref_id="1097775" ref_url="https://bugzilla.suse.com/1097775" source="BUGZILLA"/>
		<reference ref_id="1102126" ref_url="https://bugzilla.suse.com/1102126" source="BUGZILLA"/>
		<reference ref_id="1109957" ref_url="https://bugzilla.suse.com/1109957" source="BUGZILLA"/>
		<reference ref_id="1112959" ref_url="https://bugzilla.suse.com/1112959" source="BUGZILLA"/>
		<reference ref_id="1117080" ref_url="https://bugzilla.suse.com/1117080" source="BUGZILLA"/>
		<reference ref_id="1118896" ref_url="https://bugzilla.suse.com/1118896" source="BUGZILLA"/>
		<reference ref_id="1123561" ref_url="https://bugzilla.suse.com/1123561" source="BUGZILLA"/>
		<reference ref_id="1126503" ref_url="https://bugzilla.suse.com/1126503" source="BUGZILLA"/>
		<reference ref_id="1137479" ref_url="https://bugzilla.suse.com/1137479" source="BUGZILLA"/>
		<reference ref_id="1137528" ref_url="https://bugzilla.suse.com/1137528" source="BUGZILLA"/>
		<reference ref_id="1142121" ref_url="https://bugzilla.suse.com/1142121" source="BUGZILLA"/>
		<reference ref_id="1142542" ref_url="https://bugzilla.suse.com/1142542" source="BUGZILLA"/>
		<reference ref_id="1144453" ref_url="https://bugzilla.suse.com/1144453" source="BUGZILLA"/>
		<reference ref_id="1153452" ref_url="https://bugzilla.suse.com/1153452" source="BUGZILLA"/>
		<reference ref_id="1154231" ref_url="https://bugzilla.suse.com/1154231" source="BUGZILLA"/>
		<reference ref_id="1154232" ref_url="https://bugzilla.suse.com/1154232" source="BUGZILLA"/>
		<reference ref_id="1154830" ref_url="https://bugzilla.suse.com/1154830" source="BUGZILLA"/>
		<reference ref_id="1157968" ref_url="https://bugzilla.suse.com/1157968" source="BUGZILLA"/>
		<reference ref_id="1157969" ref_url="https://bugzilla.suse.com/1157969" source="BUGZILLA"/>
		<reference ref_id="1159447" ref_url="https://bugzilla.suse.com/1159447" source="BUGZILLA"/>
		<reference ref_id="1161919" ref_url="https://bugzilla.suse.com/1161919" source="BUGZILLA"/>
		<reference ref_id="1164133" ref_url="https://bugzilla.suse.com/1164133" source="BUGZILLA"/>
		<reference ref_id="1164134" ref_url="https://bugzilla.suse.com/1164134" source="BUGZILLA"/>
		<reference ref_id="1164135" ref_url="https://bugzilla.suse.com/1164135" source="BUGZILLA"/>
		<reference ref_id="1164136" ref_url="https://bugzilla.suse.com/1164136" source="BUGZILLA"/>
		<reference ref_id="1164137" ref_url="https://bugzilla.suse.com/1164137" source="BUGZILLA"/>
		<reference ref_id="1164138" ref_url="https://bugzilla.suse.com/1164138" source="BUGZILLA"/>
		<reference ref_id="1164139" ref_url="https://bugzilla.suse.com/1164139" source="BUGZILLA"/>
		<reference ref_id="1164140" ref_url="https://bugzilla.suse.com/1164140" source="BUGZILLA"/>
		<reference ref_id="1165022" ref_url="https://bugzilla.suse.com/1165022" source="BUGZILLA"/>
		<reference ref_id="1165393" ref_url="https://bugzilla.suse.com/1165393" source="BUGZILLA"/>
		<reference ref_id="1166389" ref_url="https://bugzilla.suse.com/1166389" source="BUGZILLA"/>
		<reference ref_id="1167440" ref_url="https://bugzilla.suse.com/1167440" source="BUGZILLA"/>
		<reference ref_id="1167532" ref_url="https://bugzilla.suse.com/1167532" source="BUGZILLA"/>
		<reference ref_id="1171162" ref_url="https://bugzilla.suse.com/1171162" source="BUGZILLA"/>
		<reference ref_id="1171823" ref_url="https://bugzilla.suse.com/1171823" source="BUGZILLA"/>
		<reference ref_id="1172450" ref_url="https://bugzilla.suse.com/1172450" source="BUGZILLA"/>
		<reference ref_id="1173413" ref_url="https://bugzilla.suse.com/1173413" source="BUGZILLA"/>
		<reference ref_id="1173416" ref_url="https://bugzilla.suse.com/1173416" source="BUGZILLA"/>
		<reference ref_id="1173418" ref_url="https://bugzilla.suse.com/1173418" source="BUGZILLA"/>
		<reference ref_id="1174006" ref_url="https://bugzilla.suse.com/1174006" source="BUGZILLA"/>
		<reference ref_id="1174145" ref_url="https://bugzilla.suse.com/1174145" source="BUGZILLA"/>
		<reference ref_id="1174242" ref_url="https://bugzilla.suse.com/1174242" source="BUGZILLA"/>
		<reference ref_id="1174302" ref_url="https://bugzilla.suse.com/1174302" source="BUGZILLA"/>
		<reference ref_id="1174583" ref_url="https://bugzilla.suse.com/1174583" source="BUGZILLA"/>
		<reference ref_id="1175484" ref_url="https://bugzilla.suse.com/1175484" source="BUGZILLA"/>
		<reference ref_id="1175986" ref_url="https://bugzilla.suse.com/1175986" source="BUGZILLA"/>
		<reference ref_id="1175993" ref_url="https://bugzilla.suse.com/1175993" source="BUGZILLA"/>
		<reference ref_id="1177120" ref_url="https://bugzilla.suse.com/1177120" source="BUGZILLA"/>
		<reference ref_id="1177948" ref_url="https://bugzilla.suse.com/1177948" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8614" ref_url="https://www.suse.com/security/cve/CVE-2016-8614/" source="CVE"/>
		<reference ref_id="CVE-2016-8628" ref_url="https://www.suse.com/security/cve/CVE-2016-8628/" source="CVE"/>
		<reference ref_id="CVE-2016-8647" ref_url="https://www.suse.com/security/cve/CVE-2016-8647/" source="CVE"/>
		<reference ref_id="CVE-2016-9587" ref_url="https://www.suse.com/security/cve/CVE-2016-9587/" source="CVE"/>
		<reference ref_id="CVE-2017-7466" ref_url="https://www.suse.com/security/cve/CVE-2017-7466/" source="CVE"/>
		<reference ref_id="CVE-2017-7550" ref_url="https://www.suse.com/security/cve/CVE-2017-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-10875" ref_url="https://www.suse.com/security/cve/CVE-2018-10875/" source="CVE"/>
		<reference ref_id="CVE-2018-11779" ref_url="https://www.suse.com/security/cve/CVE-2018-11779/" source="CVE"/>
		<reference ref_id="CVE-2018-16837" ref_url="https://www.suse.com/security/cve/CVE-2018-16837/" source="CVE"/>
		<reference ref_id="CVE-2018-16859" ref_url="https://www.suse.com/security/cve/CVE-2018-16859/" source="CVE"/>
		<reference ref_id="CVE-2018-16876" ref_url="https://www.suse.com/security/cve/CVE-2018-16876/" source="CVE"/>
		<reference ref_id="CVE-2018-18623" ref_url="https://www.suse.com/security/cve/CVE-2018-18623/" source="CVE"/>
		<reference ref_id="CVE-2018-18624" ref_url="https://www.suse.com/security/cve/CVE-2018-18624/" source="CVE"/>
		<reference ref_id="CVE-2018-18625" ref_url="https://www.suse.com/security/cve/CVE-2018-18625/" source="CVE"/>
		<reference ref_id="CVE-2019-0202" ref_url="https://www.suse.com/security/cve/CVE-2019-0202/" source="CVE"/>
		<reference ref_id="CVE-2019-10156" ref_url="https://www.suse.com/security/cve/CVE-2019-10156/" source="CVE"/>
		<reference ref_id="CVE-2019-10206" ref_url="https://www.suse.com/security/cve/CVE-2019-10206/" source="CVE"/>
		<reference ref_id="CVE-2019-10217" ref_url="https://www.suse.com/security/cve/CVE-2019-10217/" source="CVE"/>
		<reference ref_id="CVE-2019-14846" ref_url="https://www.suse.com/security/cve/CVE-2019-14846/" source="CVE"/>
		<reference ref_id="CVE-2019-14856" ref_url="https://www.suse.com/security/cve/CVE-2019-14856/" source="CVE"/>
		<reference ref_id="CVE-2019-14858" ref_url="https://www.suse.com/security/cve/CVE-2019-14858/" source="CVE"/>
		<reference ref_id="CVE-2019-14864" ref_url="https://www.suse.com/security/cve/CVE-2019-14864/" source="CVE"/>
		<reference ref_id="CVE-2019-14904" ref_url="https://www.suse.com/security/cve/CVE-2019-14904/" source="CVE"/>
		<reference ref_id="CVE-2019-14905" ref_url="https://www.suse.com/security/cve/CVE-2019-14905/" source="CVE"/>
		<reference ref_id="CVE-2019-19844" ref_url="https://www.suse.com/security/cve/CVE-2019-19844/" source="CVE"/>
		<reference ref_id="CVE-2019-3828" ref_url="https://www.suse.com/security/cve/CVE-2019-3828/" source="CVE"/>
		<reference ref_id="CVE-2020-10177" ref_url="https://www.suse.com/security/cve/CVE-2020-10177/" source="CVE"/>
		<reference ref_id="CVE-2020-10378" ref_url="https://www.suse.com/security/cve/CVE-2020-10378/" source="CVE"/>
		<reference ref_id="CVE-2020-10684" ref_url="https://www.suse.com/security/cve/CVE-2020-10684/" source="CVE"/>
		<reference ref_id="CVE-2020-10685" ref_url="https://www.suse.com/security/cve/CVE-2020-10685/" source="CVE"/>
		<reference ref_id="CVE-2020-10691" ref_url="https://www.suse.com/security/cve/CVE-2020-10691/" source="CVE"/>
		<reference ref_id="CVE-2020-10729" ref_url="https://www.suse.com/security/cve/CVE-2020-10729/" source="CVE"/>
		<reference ref_id="CVE-2020-10744" ref_url="https://www.suse.com/security/cve/CVE-2020-10744/" source="CVE"/>
		<reference ref_id="CVE-2020-10994" ref_url="https://www.suse.com/security/cve/CVE-2020-10994/" source="CVE"/>
		<reference ref_id="CVE-2020-11110" ref_url="https://www.suse.com/security/cve/CVE-2020-11110/" source="CVE"/>
		<reference ref_id="CVE-2020-14330" ref_url="https://www.suse.com/security/cve/CVE-2020-14330/" source="CVE"/>
		<reference ref_id="CVE-2020-14332" ref_url="https://www.suse.com/security/cve/CVE-2020-14332/" source="CVE"/>
		<reference ref_id="CVE-2020-14365" ref_url="https://www.suse.com/security/cve/CVE-2020-14365/" source="CVE"/>
		<reference ref_id="CVE-2020-1733" ref_url="https://www.suse.com/security/cve/CVE-2020-1733/" source="CVE"/>
		<reference ref_id="CVE-2020-1734" ref_url="https://www.suse.com/security/cve/CVE-2020-1734/" source="CVE"/>
		<reference ref_id="CVE-2020-1735" ref_url="https://www.suse.com/security/cve/CVE-2020-1735/" source="CVE"/>
		<reference ref_id="CVE-2020-1736" ref_url="https://www.suse.com/security/cve/CVE-2020-1736/" source="CVE"/>
		<reference ref_id="CVE-2020-1737" ref_url="https://www.suse.com/security/cve/CVE-2020-1737/" source="CVE"/>
		<reference ref_id="CVE-2020-17376" ref_url="https://www.suse.com/security/cve/CVE-2020-17376/" source="CVE"/>
		<reference ref_id="CVE-2020-1738" ref_url="https://www.suse.com/security/cve/CVE-2020-1738/" source="CVE"/>
		<reference ref_id="CVE-2020-1739" ref_url="https://www.suse.com/security/cve/CVE-2020-1739/" source="CVE"/>
		<reference ref_id="CVE-2020-1740" ref_url="https://www.suse.com/security/cve/CVE-2020-1740/" source="CVE"/>
		<reference ref_id="CVE-2020-1746" ref_url="https://www.suse.com/security/cve/CVE-2020-1746/" source="CVE"/>
		<reference ref_id="CVE-2020-1753" ref_url="https://www.suse.com/security/cve/CVE-2020-1753/" source="CVE"/>
		<reference ref_id="CVE-2020-25032" ref_url="https://www.suse.com/security/cve/CVE-2020-25032/" source="CVE"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<reference ref_id="CVE-2020-7471" ref_url="https://www.suse.com/security/cve/CVE-2020-7471/" source="CVE"/>
		<reference ref_id="CVE-2020-9402" ref_url="https://www.suse.com/security/cve/CVE-2020-9402/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<description>
This update for ansible, ardana-ansible, ardana-cinder, ardana-glance, ardana-mq, ardana-nova, ardana-osconfig, crowbar-core, crowbar-openstack, documentation-suse-openstack-cloud, grafana, grafana-natel-discrete-panel, openstack-cinder, openstack-monasca-installer, openstack-neutron, openstack-nova, python-Django, python-Flask-Cors, python-Pillow, python-ardana-packager, python-keystoneclient, python-keystonemiddleware, python-kombu, python-straight-plugin, python-urllib3, release-notes-suse-openstack-cloud, storm, storm-kit, venv-openstack-cinder, venv-openstack-swift contains the following fixes:

Security fixes included in this update:
ansible to 2.9.14:
- CVE-2020-1733: Fixed insecure temporary directory when running
become_user (bsc#1164140).
 - CVE-2020-1753: Kubectl connection plugin - connection plugin now
redact kubectl_token and kubectl_password in console log. (bsc#1166389)
 - CVE-2020-14365: Previously, regardless of the disable_gpg_check
option, packages were not GPG validated. They are now. (bsc#1175993)
 - CVE-2020-14332: copy - Redact the value of the no_log 'content'
parameter in the result's invocation.module_args in check mode.
Previously when used with check mode and with '-vvv', the module would
not censor the content if a change would be made to the destination
path. (bsc#1174302)
 - CVE-2020-1736: atomic_move - Change default permissions when creating
temporary files so they are not world readable (bsc#1164134).
 - CVE-2020-14330: Sanitize no_log values from any response keys that
might be returned from the uri module (bsc#1174145).
 - CVE-2019-14846: Reset logging level to INFO. (bsc#1153452).
 - CVE-2020-10744: incomplete fix for CVE-2020-1733 (bsc#1171823).

grafana:
- CVE-2018-18623, CVE-2018-18624,CVE-2018-18625: Fixed multiple XSS 
  vulnerabilities in dashboard due to a incomplete fix for CVE-2018-12099
  (bsc#1172450).
- CVE-2020-11110: Fixed a stored XSS (bsc#1174583).

openstack-nova:
- CVE-2020-17376: Fixed an information leak during live migration (bsc#1175484).

python-Django to 1.11.29
- CVE-2020-7471: Fixed a SQL injection via StringAgg delimiter (bsc#1161919).
- CVE-2020-9402: Fixed a SQL injection via tolerance parameter in GIS functions 
  and aggregates (bsc#1165022).
- CVE-2019-19844: Fixed a potential account hijack via password reset form (bsc#1159447).

python-Flask-Cors
- CVE-2020-25032: Fixed a potential information leak through path traversal (bsc#1175986).

python-Pillow
- CVE-2020-10177: Fixed multiple out-of-bounds reads in libImaging/FliDecode.c (bsc#1173413).
- CVE-2020-10994: Fixed multiple out-of-bounds reads via a crafted JP2 files (bsc#1173418).
- CVE-2020-10378: Fixed an out-of-bounds read when reading PCX files (bsc#1173416).

python-urllib3
- CVE-2020-26137: Fixed CRLF injection via HTTP request method (bsc#1177120)

storm:
- CVE-2018-11779: Fixed java deserialization vulnerability related to the usage of 
  storm-kafka-client or storm-kafka modules (bsc#1143163).
- CVE-2019-0202: Fixed an information leak related to the log viewer (bsc#1142617).

rubygem-crowbar-client update to 3.9.3:
- CVE-2018-17954: Fixed information leak of the admin password to all
nodes in cleartext during provisioning (bsc#1117080)

Non-security fixes included on this update:

Changes in ansible:
- Update to ansible 2.9.14:
  - minor bugs and fixes, including security bugs:
    - CVE-2020-1753, bsc#1166389: Kubectl connection plugin - connection
      plugin now redact kubectl_token and kubectl_password in console
      log.
    - revert CVE-2020-1736. Users are encouraged to specify a mode
      parameter in their file-based tasks when the files being
      manipulated contain sensitive data.
    - CVE-2020-14365, bsc#1175993: Previously, regardless of the
      disable_gpg_check option, packages were not GPG validated. They
      are now.
    - CVE-2020-14332, bsc#1174302: copy - Redact the value of the no_log
      'content' parameter in the result's invocation.module_args in
      check mode. Previously when used with check mode and with '-vvv',
      the module would not censor the content if a change would be made
      to the destination path.
    - CVE-2020-1736, bsc#1164134: atomic_move - Change default
      permissions when creating temporary files so they are not world
      readable
    - CVE-2020-14330, bsc#1174145: Sanitize no_log values from any
      response keys that might be returned from the uri module.
    - CVE-2019-14846, bsc#1153452: Reset logging level to INFO.
    - CVE-2020-10744, bsc#1171823, gh#ansible/ansible#69782: incomplete
      fix for CVE-2020-1733
- Remove patches included upstream:
  - CVE-2020-14330_exposed_keys_uri_mod.patch
  - CVE-2020-10744_avoid_mkdir_p.patch
- Don't Require python-coverage, it is needed only for testing
  (bsc#1177948).

- Add CVE-2020-14330_exposed_keys_uri_mod.patch which fixes
  CVE-2020-14330 (bsc#1174145). Sanitize no_log values from any
  response keys that might be returned from the uri module. 
  Sensitive values marked with ``no_log=True`` will automatically
  have that value stripped from module return values. If
  your module could return these sensitive values as
  part of a dictionary key name, you should call the
  ``ansible.module_utils.basic.sanitize_keys()`` function to
  strip the values from the keys. See the ``uri`` module for an
  example.

- importlib and argparse are required only on SLE-11 and less.

- Add CVE-2020-10744_avoid_mkdir_p.patch (bsc#1171823) to fix
  insecure temporary directory creation.

- Add metadata information to this file to mark which SUSE
  bugzilla have been already fixed.
- Remove CVE-2017-7550-jenkins-disallow-password-in-params.patch
  as it has been already included in 2.4.1.0

- update to version 2.9.9
  * fix for a regression introduced in 2.9.8

- update to version 2.9.8
  maintenance release containing numerous bugfixes

- update to version 2.9.7 with many bug fixes,
  especially for these security issues:
  - bsc#1164140 CVE-2020-1733 - insecure temporary directory when
    running become_user from become directive
  - bsc#1164139 CVE-2020-1734 shell enabled by default in a pipe
    lookup plugin subprocess
  - bsc#1164137 CVE-2020-1735 - path injection on dest parameter
    in fetch module
  - bsc#1164134 CVE-2020-1736 atomic_move primitive sets
    permissive permissions
  - bsc#1164138 CVE-2020-1737 - Extract-Zip function in win_unzip
    module does not check extracted path
  - bsc#1164136 CVE-2020-1738 module package can be selected by
    the ansible facts
  - bsc#1164133 CVE-2020-1739  - svn module leaks password when
    specified as a parameter
  - bsc#1164135 CVE-2020-1740 - secrets readable after
    ansible-vault edit
  - bsc#1165393 CVE-2020-1746 - information disclosure issue in
    ldap_attr and ldap_entry modules
  - bsc#1166389 CVE-2020-1753 - kubectl connection plugin leaks
    sensitive information
  - bsc#1167532 CVE-2020-10684 - code injection when using
    ansible_facts as a subkey
  - bsc#1167440 CVE-2020-10685 - modules which use files
    encrypted with vault are not properly cleaned up
  - CVE-2020-10691 - archive traversal vulnerability in ansible-galaxy collection install [2]

- create missing (empty) template and files directories for 
  'ansible-galaxy init' during package build (fixes boo#1137479)
- require python-xml on python 2 systems (boo#1142542)

- update to version 2.9.6 (maintenance release) including
  these security issues:
  - bsc#1171162 CVE-2020-10729 two random password lookups in
    same task return same value

- update to version 2.9.5 (maintenance release)

- update to version 2.9.4 (maintenance release)
  - fix in yum module
  - security fixes:
    - bsc#1157968 CVE-2019-14904 vulnerability in solaris_zone
      module via crafted solaris zone
    - bsc#1157969 CVE-2019-14905 malicious code could craft
      filename in nxos_file_copy module

- update to version 2.9.3 (maintenance release)
  * security fixes
    - CVE-2019-14904 (solaris_zone module) (boo#1157968)
    - CVE-2019-14905 (nxos_file_copy module) (boo#1157969)
  * various bugfixes

- sync with upstream spec file (especially for RHEL &amp; Fedora builds)
- ran spec-cleaner
- remove old SUSE targets (SLE-11, Leap 42.3 and below)
  This simplifies the spec file and makes building easier
- Additional required packages for building:
  + python-boto3 and python-botocore for Amazon EC2
  + python-jmespath for json queries
  + python-memcached for cloud modules and local caching of JSON 
    formatted, per host records
  + python-redis for cloud modules and local caching of JSON 
    formatted, per host records
  + python-requests for many web-based modules (cloud, network, 
    netapp)
  =&gt; as the need for those packages depends on the usage of the 
     tool, they are just recommended on openSUSE/SUSE machines
- made dependencies for gitlab, vmware and winrm modules configurable,
  as most of their dependencies are not (yet) available on current 
  openSUSE/SUSE distributions
- exclude /usr/bin/pwsh from the automatic dependency generation, 
  as the Windows Power Shell is not available (yet) on openSUSE/SUSE
- build additional docs and split up ansible-doc package; 
  moving changelogs, contrib and example directories there
- prepare for building HTML documentation, but disable this per 
  default for the moment, as not all package dependencies are available
  in openSUSE/SUSE (yet)
- package some test scripts with executable permissions

- update to version 2.9.2
  maintenance release containing numerous bugfixes

- Create system directories that Ansible defines as default locations 
  in ansible/config/base.yml
- rephrase the summary line 
- Disable shebang munging for specific paths. These files are data files.
  ansible-test munges the shebangs itself.

- split out ansible-test package for module developers

- update to version 2.9.1
  Full changelog is packaged at /usr/share/doc/packages/ansible/changelogs/
  and also available online at
  https://github.com/ansible/ansible/blob/stable-2.9/changelogs/CHANGELOG-v2.9.rst
  + CVE-2019-14864: fixed Splunk and Sumologic callback plugins leak 
    sensitive data in logs (boo#1154830)
- replace all #!/usr/bin/env lines to use #!/usr/bin/$1 directly

- added file '/usr/bin/ansible-test' to spec file

- Update to version 2.9.0:
  Full changelog is packaged at /usr/share/doc/packages/ansible/changelogs/
  and also available online at
  https://github.com/ansible/ansible/blob/stable-2.9/changelogs/CHANGELOG-v2.9.rst
- Fixed among other this security bug:
  - bsc#1112959 CVE-2018-16837 Information leak in 'user' module patch added

- include the sha checksum file in the source, which allows to verify
  the original sources

- Update to version 2.8.6:
  Full changelog is packaged at /usr/share/doc/packages/ansible/changelogs/
  and also available online at
  https://github.com/ansible/ansible/blob/stable-2.8/changelogs/CHANGELOG-v2.8.rst
  Included security fixes:
  * CVE-2019-14846: Fixed secrets disclosure on logs due to display is hardcoded
    to DEBUG level (bsc#1153452)
  * CVE-2019-14856: Fixed insufficient fix for CVE-2019-10206 (bsc#1154232)
  * CVE-2019-14858: Fixed data in the sub parameter fields that will not be masked
    and will be displayed when run with increased verbosity (bsc#1154231) 

- Update to version 2.8.5:
  Full changelog is packaged at /usr/share/doc/packages/ansible/changelogs/
  and also available online at
  https://github.com/ansible/ansible/blob/stable-2.8/changelogs/CHANGELOG-v2.8.rst
- removed patches fixed upstream:
  + CVE-2019-10206-data-disclosure.patch
  + CVE-2019-10217-gcp-modules-sensitive-fields.patch

- Update to version 2.8.3:
  Full changelog is packaged, but also at
  https://github.com/ansible/ansible/blob/stable-2.8/changelogs/CHANGELOG-v2.8.rst
  - (bsc#1137528) CVE-2019-10156: ansible: templating causing an
    unexpected key file to be set on remote node
- (bsc#1144453) Adds CVE-2019-10217-gcp-modules-sensitive-fields.patch
  CVE-2019-10217: Fields managing sensitive data should be set as
  such by no_log feature. Some of these fields in GCP modules are
  not set properly. service_account_contents() which is common
  class for all gcp modules is not setting no_log to True. Any
  sensitive data managed by that function would be leak as an
  output when running ansible playbooks.

- Update to version 2.8.1
  Full changelog is at /usr/share/doc/packages/ansible/changelogs/
  Bugfixes
  --------
  - ACI - DO not encode query_string
  - ACI modules - Fix non-signature authentication
  - Add missing directory provided via ``--playbook-dir`` to adjacent collection loading
  - Fix 'Interface not found' errors when using eos_l2_interface with nonexistant
    interfaces configured
  - Fix cannot get credential when `source_auth` set to `credential_file`.
  - Fix netconf_config backup string issue
  - Fix privilege escalation support for the docker connection plugin when
    credentials need to be supplied (e.g. sudo with password).
  - Fix vyos cli prompt inspection
  - Fixed loading namespaced documentation fragments from collections.
  - Fixing bug came up after running cnos_vrf module against coverity.
  - Properly handle data importer failures on PVC creation, instead of timing out.
  - To fix the ios static route TC failure in CI
  - To fix the nios member module params
  - To fix the nios_zone module idempotency failure
  - add terminal initial prompt for initial connection
  - allow include_role to work with ansible command
  - allow python_requirements_facts to report on dependencies containing dashes
  - asa_config fix
  - azure_rm_roledefinition - fix a small error in build scope.
  - azure_rm_virtualnetworkpeering - fix cross subscriptions virtual network
    peering.
  - cgroup_perf_recap - When not using file_per_task, make sure we don't
    prematurely close the perf files
  - display underlying error when reporting an invalid ``tasks:`` block.
  - dnf - fix wildcard matching for state: absent
  - docker connection plugin - accept version ``dev`` as 'newest version' and
    print warning.
  - docker_container - ``oom_killer`` and ``oom_score_adj`` options are available
    since docker-py 1.8.0, not 2.0.0 as assumed by the version check.
  - docker_container - fix network creation when ``networks_cli_compatible`` is
    enabled.
  - docker_container - use docker API's ``restart`` instead of ``stop``/``start``
    to restart a container.
  - docker_image - if ``build`` was not specified, the wrong default for
    ``build.rm`` is used.
  - docker_image - if ``nocache`` set to ``yes`` but not ``build.nocache``, the
    module failed.
  - docker_image - module failed when ``source: build`` was set but
    ``build.path`` options not specified.
  - docker_network module - fix idempotency when using ``aux_addresses`` in
    ``ipam_config``.
  - ec2_instance - make Name tag idempotent
  - eos: don't fail modules without become set, instead show message and continue
  - eos_config: check for session support when asked to 'diff_against: session'
  - eos_eapi: fix idempotency issues when vrf was unspecified.
  - fix bugs for ce - more info see
  - fix incorrect uses of to_native that should be to_text instead.
  - hcloud_volume - Fix idempotency when attaching a server to a volume.
  - ibm_storage - Added a check for null fields in ibm_storage utils module.
  - include_tasks - whitelist ``listen`` as a valid keyword
  - k8s - resource updates applied with force work correctly now
  - keep results subset also when not no_log.
  - meraki_switchport - improve reliability with native VLAN functionality.
  - netapp_e_iscsi_target - fix netapp_e_iscsi_target chap secret size and
    clearing functionality
  - netapp_e_volumes - fix workload profileId indexing when no previous workload
    tags exist on the storage array.
  - nxos_acl some platforms/versions raise when no ACLs are present
  - nxos_facts fix &lt;https://github.com/ansible/ansible/pull/57009&gt;
  - nxos_file_copy fix passwordless workflow
  - nxos_interface Fix admin_state check for n6k
  - nxos_snmp_traps fix group all for N35 platforms
  - nxos_snmp_user fix platform fixes for get_snmp_user
  - nxos_vlan mode idempotence bug
  - nxos_vlan vlan names containing regex ctl chars should be escaped
  - nxos_vtp_* modules fix n6k issues
  - openssl_certificate - fix private key passphrase handling for
    ``cryptography`` backend.
  - openssl_pkcs12 - fixes crash when private key has a passphrase and the module
    is run a second time.
  - os_stack - Apply tags conditionally so that the module does not throw up an
    error when using an older distro of openstacksdk
  - pass correct loading context to persistent connections other than local
  - pkg_mgr - Ansible 2.8.0 failing to install yum packages on Amazon Linux
  - postgresql - added initial SSL related tests
  - postgresql - added missing_required_libs, removed excess param mapping
  - postgresql - move connect_to_db and get_pg_version into
    module_utils/postgres.py (https://github.com/ansible/ansible/pull/55514)
  - postgresql_db - add note to the documentation about state dump and the
    incorrect rc (https://github.com/ansible/ansible/pull/57297)
  - postgresql_db - fix for postgresql_db fails if stderr contains output
  - postgresql_ping - fixed a typo in the module documentation
  - preserve actual ssh error when we cannot connect.
  - route53_facts - the module did not advertise check mode support, causing it
    not to be run in check mode.
  - sysctl: the module now also checks the output of STDERR to report if values
    are correctly set (https://github.com/ansible/ansible/pull/55695)
  - ufw - correctly check status when logging is off
  - uri - always return a value for status even during failure
  - urls - Handle redirects properly for IPv6 address by not splitting on ``:``
    and rely on already parsed hostname and port values
  - vmware_vm_facts - fix the support with regular ESXi
  - vyos_interface fix &lt;https://github.com/ansible/ansible/pull/57169&gt;
  - we don't really need to template vars on definition as we do this on demand
    in templating.
  - win_acl - Fix qualifier parser when using UNC paths -
  - win_hostname - Fix non netbios compliant name handling
  - winrm - Fix issue when attempting to parse CLIXML on send input failure
  - xenserver_guest - fixed an issue where VM whould be powered off even though
    check mode is used if reconfiguration requires VM to be powered off.
  - xenserver_guest - proper error message is shown when maximum number of
    network interfaces is reached and multiple network interfaces are added at
    once.
  - yum - Fix false error message about autoremove not being supported
  - yum - fix failure when using ``update_cache`` standalone
  - yum - handle special '_none_' value for proxy in yum.conf and .repo files

- Update to version 2.8.0
  Major changes:
  * Experimental support for Ansible Collections and content namespacing -
    Ansible content can now be packaged in a collection and addressed via
    namespaces. This allows for easier sharing, distribution, and installation
    of bundled modules/roles/plugins, and consistent rules for accessing
    specific content via namespaces.
  * Python interpreter discovery - The first time a Python module runs on a
    target, Ansible will attempt to discover the proper default Python
    interpreter to use for the target platform/version (instead of immediately
    defaulting to /usr/bin/python). You can override this behavior by
    setting ansible_python_interpreter or via config. 
    (see https://github.com/ansible/ansible/pull/50163)
  * become - The deprecated CLI arguments for --sudo, --sudo-user,
    --ask-sudo-pass, -su, --su-user, and --ask-su-pass have been removed, in
    favor of the more generic --become, --become-user, --become-method, and
    --ask-become-pass.
  * become - become functionality has been migrated to a plugin architecture,
    to allow customization of become functionality and 3rd party become methods
    (https://github.com/ansible/ansible/pull/50991)
- addresses CVE-2018-16859, CVE-2018-16876, CVE-2019-3828, CVE-2018-16837
For the full changelog see /usr/share/doc/packages/ansible/changelogs or online:
https://github.com/ansible/ansible/blob/stable-2.8/changelogs/CHANGELOG-v2.8.rst

- Update to version 2.7.10
Minor Changes
- Catch all connection timeout related exceptions and raise AnsibleConnectionError instead
- openssl_pkcs12, openssl_privatekey, openssl_publickey - These modules no longer delete the output file before starting to regenerate the output, or when generating the output failed.
Bugfixes
- Backport of https://github.com/ansible/ansible/pull/54105, pamd - fix idempotence issue when removing rules
- Use custom JSON encoder in conneciton.py so that ansible objects (AnsibleVaultEncryptedUnicode, for example) can be sent to the persistent connection process
- allow 'dict()' jinja2 global to function the same even though it has changed in jinja2 versions
- azure_rm inventory plugin - fix missing hostvars properties (https://github.com/ansible/ansible/pull/53046)
- azure_rm inventory plugin - fix no nic type in vmss nic. (https://github.com/ansible/ansible/pull/53496)
- deprecate {Get/Set}ManagerAttributes commands (https://github.com/ansible/ansible/issues/47590)
- flatpak_remote - Handle empty output in remote_exists, fixes https://github.com/ansible/ansible/issues/51481
- foreman - fix Foreman returning host parameters
- get_url - Fix issue with checksum validation when using a file to ensure we skip lines in the file that do not contain exactly 2 parts. Also restrict exception handling to the minimum number of necessary lines (https://github.com/ansible/ansible/issues/48790)
- grafana_datasource - Fixed an issue when running Python3 and using basic auth (https://github.com/ansible/ansible/issues/49147)
- include_tasks - Fixed an unexpected exception if no file was given to include.
- openssl_certificate - fix ``state=absent``.
- openssl_certificate, openssl_csr, openssl_pkcs12, openssl_privatekey, openssl_publickey - The modules are now able to overwrite write-protected files (https://github.com/ansible/ansible/issues/48656).
- openssl_dhparam - fix ``state=absent`` idempotency and ``changed`` flag.
- openssl_pkcs12, openssl_privatekey - These modules now accept the output file mode in symbolic form or as a octal string (https://github.com/ansible/ansible/issues/53476).
- openssl_publickey - fixed crash on Python 3 when OpenSSH private keys were used with passphrases.
- openstack inventory plugin: allow 'constructed' functionality (``compose``, ``groups``, and ``keyed_groups``) to work as documented.
- random_mac - generate a proper MAC address when the provided vendor prefix is two or four characters (https://github.com/ansible/ansible/issues/50838)
- replace - fix behavior when ``before`` and ``after`` are used together (https://github.com/ansible/ansible/issues/31354)
- report correct CPU information on ARM systems (https://github.com/ansible/ansible/pull/52884)
- slurp - Fix issues when using paths on Windows with glob like characters, e.g. ``[``, ``]``
- ssh - Check the return code of the ssh process before raising AnsibleConnectionFailure, as the error message for the ssh process will likely contain more useful information. This will improve the missing interpreter messaging when using modules such as setup which have a larger payload to transfer when combined with pipelining. (https://github.com/ansible/ansible/issues/53487)
- tower_settings - 'name' and 'value' parameters are always required, module can not be used in order to get a setting
- win_acl - Fix issues when using paths with glob like characters, e.g. ``[``, ``]``
- win_acl_inheritance - Fix issues when using paths with glob like characters, e.g. ``[``, ``]``
- win_certificate_store - Fix issues when using paths with glob like characters, e.g. ``[``, ``]``
- win_chocolatey - Fix incompatibilities with the latest release of Chocolatey ``v0.10.12+``
- win_copy - Fix issues when using paths with glob like characters, e.g. ``[``, ``]``
- win_file - Fix issues when using paths with glob like characters, e.g. ``[``, ``]``
- win_find - Ensure found files are sorted alphabetically by the path instead of it being random
- win_find - Fix issues when using paths with glob like characters, e.g. ``[``, ``]``
- win_owner - Fix issues when using paths with glob like characters, e.g. ``[``, ``]``
- win_psexec - Support executables with a space in the path
- win_reboot - Fix reboot command validation failure when running under the psrp connection plugin
- win_tempfile - Always return the full NTFS absolute path and not a DOS 8.3 path.
- win_user_right - Fix output containing non json data - https://github.com/ansible/ansible/issues/54413
- windows - Fixed various module utils that did not work with path that had glob like chars
- yum - fix disable_excludes on systems with yum rhn plugin enabled (https://github.com/ansible/ansible/issues/53134)

- Update to version 2.7.9
  Minor Changes
  * Add missing import for ConnectionError in edge and routeros module_utils.
  * ``to_yaml`` filter updated to maintain formatting consistency when used 
    with ``pyyaml`` versions 5.1 and later 
    (https://github.com/ansible/ansible/pull/53772)
  * docker_image * set ``changed`` to ``false`` when using ``force: yes`` to 
    tag or push an image that ends up being identical to one already present on 
    the Docker host or Docker registry.
  * jenkins_plugin * Set new default value for the update_url parameter 
    (https://github.com/ansible/ansible/issues/52086)
  Bugfixes
  * Fix bug where some inventory parsing tracebacks were missing or reported under the wrong plugin.
  * Fix rabbitmq_plugin idempotence due to information message in new version of rabbitmq (https://github.com/ansible/ansible/pull/52166)
  * Fixed KeyError issue in vmware_host_config_manager when a supported option isn't already set (https://github.com/ansible/ansible/issues/44561).
  * Fixed issue related to --yaml flag in vmware_vm_inventory. Also fixed caching issue in vmware_vm_inventory (https://github.com/ansible/ansible/issues/52381).
  * If large integers are passed as options to modules under Python 2, module argument parsing will reject them as they are of type ``long`` and not of type ``int``.
  * allow nice error to work when auto plugin reads file w/o `plugin` field
  * ansible-doc * Fix traceback on providing arguemnt --all to ansible-doc command
  * azure_rm_virtualmachine_facts * fixed crash related to attached managed disks (https://github.com/ansible/ansible/issues/52181)
  * basic * modify the correct variable when determining available hashing algorithms to avoid errors when md5 is not available (https://github.com/ansible/ansible/issues/51355)
  * cloudscale * Fix compatibilty with Python3 in version 3.5 and lower.
  * convert input into text to ensure valid comparisons in nmap inventory plugin
  * dict2items * Allow dict2items to work with hostvars
  * dnsimple * fixed a KeyError exception related to record types handling.
  * docker_container * now returns warnings from docker daemon on container creation and updating.
  * docker_swarm * Fixed node_id parameter not working for node removal (https://github.com/ansible/ansible/issues/53501)
  * docker_swarm * do not crash with older docker daemons (https://github.com/ansible/ansible/issues/51175).
  * docker_swarm * fixes idempotency for the ``ca_force_rotate`` option.
  * docker_swarm * improve Swarm detection.
  * docker_swarm * improve idempotency checking; ``rotate_worker_token`` and ``rotate_manager_token`` are now also used when all other parameters have not changed.
  * docker_swarm * now supports docker-py 1.10.0 and newer for most operations, instead only docker 2.6.0 and newer.
  * docker_swarm * properly implement check mode (it did apply changes).
  * docker_swarm * the ``force`` option was ignored when ``state: present``.
  * docker_swarm_service * do basic validation of ``publish`` option if specified (must be list of dicts).
  * docker_swarm_service * don't crash when ``publish`` is not specified.
  * docker_swarm_service * fix problem with docker daemons which do not return ``UpdateConfig`` in the swarm service spec.
  * docker_swarm_service * the return value was documented as ``ansible_swarm_service``, but the module actually returned ``ansible_docker_service``. Documentation and code have been updated so that the variable is now called ``swarm_service``. In Ansible 2.7.x, the old name ``ansible_docker_service`` can still be used to access the result.
  * ec2 * if the private_ip has been provided for the new network interface it shouldn't also be added to top level parameters for run_instances()
  * fix DNSimple to ensure check works even when the number of records is larger than 100
  * get_url * return no change in check mode when checksum matches
  * inventory plugins * Fix creating groups from composed variables by getting the latest host variables
  * inventory_aws_ec2 * fix no_log indentation so AWS temporary credentials aren't displayed in tests
  * jenkins_plugin * Prevent plugin to be reinstalled when state=present (https://github.com/ansible/ansible/issues/43728)
  * lvol * fixed ValueError when using float size (https://github.com/ansible/ansible/issues/32886, https://github.com/ansible/ansible/issues/29429)
  * mysql * MySQLdb doesn't import the cursors module for its own purposes so it has to be imported in MySQL module utilities before it can be used in dependent modules like the proxysql module family.
  * mysql * fixing unexpected keyword argument 'cursorclass' issue after migration from MySQLdb to PyMySQL.
  * mysql_user: match backticks, single and double quotes when checking user privileges.
  * onepassword_facts * Fixes issues which prevented this module working with 1Password CLI version 0.5.5 (or greater). Older versions of the CLI were deprecated by 1Password and will no longer function.
  * openssl_certificate * ``has_expired`` correctly checks if the certificate is expired or not
  * openssl_certificate * fix Python 3 string/bytes problems for `notBefore`/`notAfter` for self-signed and ownCA providers.
  * openssl_certificate * make sure that extensions are actually present when their values should be checked.
  * openssl_csr * improve ``subject`` validation.
  * openssl_csr * improve error messages for invalid SANs.
  * play order is now applied under all circumstances, fixes
  * remote_management foreman * Fixed issue where it was impossible to createdelete a product because product was missing in dict choices ( https://github.com/ansible/ansible/issues/48594 )
  * rhsm_repository * handle systems without any repos
  * skip invalid plugin after warning in loader
  * urpmi module * fixed issue
  * win_certificate_store * Fix exception handling typo
  * win_chocolatey * Fix issue when parsing a beta Chocolatey install * https://github.com/ansible/ansible/issues/52331
  * win_chocolatey_source * fix bug where a Chocolatey source could not be disabled unless ``source`` was also set * https://github.com/ansible/ansible/issues/50133
  * win_domain * Do not fail if DC is already promoted but a reboot is required, return ``reboot_required: True``
  * win_domain * Fix when running without credential delegated authentication * https://github.com/ansible/ansible/issues/53182
  * win_file * Fix issue when managing hidden files and directories * https://github.com/ansible/ansible/issues/42466
  * winrm * attempt to recover from a WinRM send input failure if possible
  * zabbix_hostmacro: fixes truncation of macro contexts that contain colons (see https://github.com/ansible/ansible/pull/51853)
  New Plugins
  * vmware_vm_inventory * VMware Guest inventory source

- update URL (use SSL version of the URL)
- prepare update for multiple releases (bsc#1102126, bsc#1109957)

- Update to version 2.7.8
  Minor Changes:
  * Raise AnsibleConnectionError on winrm connnection errors
  Bugfixes:
  * Backport of https://github.com/ansible/ansible/pull/46478 , fixes name collision in haproxy module
  * Fix aws_ec2 inventory plugin code to automatically populate regions when missing as documentation states, also leverage config system vs self default/type validation
  * Fix unexpected error when using Jinja2 native types with non-strict constructed keyed_groups (https://github.com/ansible/ansible/issues/52158).
  * If an ios module uses a section filter on a device which does not support it, retry the command without the filter.
  * acme_challenge_cert_helper * the module no longer crashes when the required ``cryptography`` library cannot be found.
  * azure_rm_managed_disk_facts * added missing implementation of listing managed disks by resource group
  * azure_rm_mysqlserver * fixed issues with passing parameters while updating existing server instance
  * azure_rm_postgresqldatabase * fix force_update bug (https://github.com/ansible/ansible/issues/50978).
  * azure_rm_postgresqldatabase * fix force_update bug.
  * azure_rm_postgresqlserver * fixed issues with passing parameters while updating existing server instance
  * azure_rm_sqlserver * fix for tags support
  * azure_rm_virtualmachine * fixed several crashes in module
  * azure_rm_virtualmachine_facts * fix crash when vm created from custom image
  * azure_rm_virtualmachine_facts * fixed crash related to VM with managed disk attached
  * ec2 * Correctly sets the end date of the Spot Instance request. Sets `ValidUntil` value in proper way so it will be auto-canceled through `spot_wait_timeout` interval.
  * openssl_csr * fixes idempotence problem with PyOpenSSL backend when no Subject Alternative Names were specified.
  * openstack inventory plugin * send logs from sdk to stderr so they do not combine with output
  * psrp * do not display bootstrap wrapper for each module exec run
  * redfish_utils * get standard properties for firmware entries (https://github.com/ansible/ansible/issues/49832)
  * remote home directory * Disallow use of remote home directories that include relative pathing by means of `..` (CVE-2019-3828, bsc#1126503) (https://github.com/ansible/ansible/pull/52133)
  * ufw * when using ``state: reset`` in check mode, ``ufw --dry-run reset`` was executed, which causes a loss of firewall rules. The ``ufw`` module was adjusted to no longer run ``ufw --dry-run reset`` to prevent this from happening.
  * ufw: make sure that only valid values for ``direction`` are passed on.
  * update GetBiosBootOrder to use standard Redfish resources (https://github.com/ansible/ansible/issues/47571)
  * win become * Fix some scenarios where become failed to create an elevated process
  * win_psmodule * the NuGet package provider will be updated, if needed, to avoid issue under adding a repository
  * yum * Remove incorrect disable_includes error message when using disable_excludes (https://github.com/ansible/ansible/issues/51697)
  * yum * properly handle a proxy config in yum.conf for an unauthenticated proxy

- Update to version 2.7.7
  Minor Changes:
  * Allow check_mode with supports_generate_diff capability in cli_config. (https://github.com/ansible/ansible/pull/51417)
  * Fixed typo in vmware documentation fragment. Changed 'supported added' to 'support added'.
  Bugfixes:
  * All K8S_AUTH_* environment variables are now properly loaded by the k8s lookup plugin
  * Change backup file globbing for network _config modules so backing up one host's config will not delete the backed up config of any host whose hostname is a subset of the first host's hostname (e.g., switch1 and switch11)
  * Fixes bug where nios_a_record wasn't getting deleted if an uppercase named a_record was being passed. (https://github.com/ansible/ansible/pull/51539)
  * aci_aaa_user - Fix setting user description (https://github.com/ansible/ansible/issues/51406)
  * apt_repository - fixed failure under Python 3.7 (https://github.com/ansible/ansible/pull/47219)
  * archive - Fix check if archive is created in path to be removed
  * azure_rm inventory plugin - fix azure batch request (https://github.com/ansible/ansible/pull/50006)
  * cnos_backup - fixed syntax error (https://github.com/ansible/ansible/pull/47219)
  * cnos_image - fixed syntax error (https://github.com/ansible/ansible/pull/47219)
  * consul_kv - minor error-handling bugfix under Python 3.7 (https://github.com/ansible/ansible/pull/47219)
  * copy - align invocation in return value between check and normal mode
  * delegate_facts - fix to work properly under block and include_role (https://github.com/ansible/ansible/pull/51553)
  * docker_swarm_service - fix endpoint_mode and publish idempotency.
  * ec2_instance - Correctly adds description when adding a single ENI to the instance
  * ensure we have a XDG_RUNTIME_DIR, as it is not handled correctly by some privilege escalation configurations
  * file - Allow state=touch on file the user does not own https://github.com/ansible/ansible/issues/50943
  * fix ansible-pull hanlding of extra args, complex quoting is needed for inline JSON
  * fix ansible_connect_timeout variable in network_cli,netconf,httpapi and nxos_install_os timeout check
  * netapp_e_storagepool - fixed failure under Python 3.7 (https://github.com/ansible/ansible/pull/47219)
  * onepassword_facts - Fix an issue looking up some 1Password items which have a 'password' attribute alongside the 'fields' attribute, not inside it.
  * prevent import_role from inserting dupe into roles: execution when duplicate signature role already exists in the section.
  * reboot - Fix bug where the connection timeout was not reset in the same task after rebooting
  * ssh connection - do not retry with invalid credentials to prevent account lockout (https://github.com/ansible/ansible/issues/48422)
  * systemd - warn when exeuting in a chroot environment rather than failing (https://github.com/ansible/ansible/pull/43904)
  * win_chocolatey - Fix hang when used with proxy for the first time - https://github.com/ansible/ansible/issues/47669
  * win_power_plan - Fix issue where win_power_plan failed on newer Windows 10 builds - https://github.com/ansible/ansible/issues/43827

- update to version 2.7.6
  Minor Changes:
  * Added documentation about using VMware dynamic inventory plugin.
  * Fixed bug around populating host_ip in hostvars in vmware_vm_inventory.
  * Image reference change in Azure VMSS is detected and applied correctly.
  * docker_volume - reverted changed behavior of force, which was released in Ansible 2.7.1 to 2.7.5, and Ansible 2.6.8 to 2.6.11. Volumes are now only recreated if the parameters changed and force is set to true (instead of or). This is the behavior which has been described in the documentation all the time.
  * set ansible_os_family from name variable in os-release
  * yum and dnf can now handle installing packages from URIs that are proxy redirects and don't end in the .rpm file extension
  Bugfixes:
  * Added log message at -vvvv when using netconf connection listing connection details.
  * Changes how ansible-connection names socket lock files. They now use the same name as the socket itself, and as such do not lock other attempts on connections to the same host, or cause issues with overly-long hostnames.
  * Fix mandatory statement error for junos modules (https://github.com/ansible/ansible/pull/50138)
  * Moved error in netconf connection plugin from at import to on connection.
  * This reverts some changes from commit 723daf3. If a line is found in the file, exactly or via regexp matching, it must not be added again. insertafter/insertbefore options are used only when a line is to be inserted, to specify where it must be added.
  * allow using openstack inventory plugin w/o a cache
  * callbacks - Do not filter out exception, warnings, deprecations on failure when using debug (https://github.com/ansible/ansible/issues/47576)
  * certificate_complete_chain - fix behavior when invalid file is parsed while reading intermediate or root certificates.
  * copy - Ensure that the src file contents is converted to unicode in diff information so that it is properly wrapped by AnsibleUnsafeText to prevent unexpected templating of diff data in Python3 (https://github.com/ansible/ansible/issues/45717)
  * correct behaviour of verify_file for vmware inventory plugin, it was always returning True
  * dnf - fix issue where conf_file was not being loaded properly
  * dnf - fix update_cache combined with install operation to not cause dnf transaction failure
  * docker_container - fix network_mode idempotency if the container:&lt;container-name&gt; form is used (as opposed to container:&lt;container-id&gt;) (https://github.com/ansible/ansible/issues/49794)
  * docker_container - warning when non-string env values are found, avoiding YAML parsing issues. Will be made an error in Ansible 2.8. (https://github.com/ansible/ansible/issues/49802)
  * docker_swarm_service - Document labels and container_labels with correct type.
  * docker_swarm_service - Document limit_memory and reserve_memory correctly on how to specify sizes.
  * docker_swarm_service - Document minimal API version for configs and secrets.
  * docker_swarm_service - fix use of Docker API so that services are not detected as present if there is an existing service whose name is a substring of the desired service
  * docker_swarm_service - fixing falsely reporting update_order as changed when option is not used.
  * document old option that was initally missed
  * ec2_instance now respects check mode https://github.com/ansible/ansible/pull/46774
  * fix for network_cli - ansible_command_timeout not working as expected (#49466)
  * fix handling of firewalld port if protocol is missing
  * fix lastpass lookup failure on python 3 (https://github.com/ansible/ansible/issues/42062)
  * flatpak - Fixed Python 2/3 compatibility
  * flatpak - Fixed issue where newer versions of flatpak failed on flatpak removal
  * flatpak_remote - Fixed Python 2/3 compatibility
  * gcp_compute_instance - fix crash when the instance metadata is not set
  * grafana_dashboard - Fix a pair of unicode string handling issues with version checking (https://github.com/ansible/ansible/pull/49194)
  * host execution order - Fix reverse_inventory not to change the order of the items before reversing on python2 and to not backtrace on python3
  * icinga2_host - fixed the issue with not working use_proxy option of the module.
  * influxdb_user - An unspecified password now sets the password to blank, except on existing users. This previously caused an unhandled exception.
  * influxdb_user - Fixed unhandled exception when using invalid login credentials (https://github.com/ansible/ansible/issues/50131)
  * openssl_* - fix error when path contains a file name without path.
  * openssl_csr - fix problem with idempotency of keyUsage option.
  * openssl_pkcs12 - now does proper path expansion for ca_certificates.
  * os_security_group_rule - os_security_group_rule doesn't exit properly when secgroup doesn't exist and state=absent (https://github.com/ansible/ansible/issues/50057)
  * paramiko_ssh - add auth_timeout parameter to ssh.connect when supported by installed paramiko version. This will prevent 'Authentication timeout' errors when a slow authentication step (&gt;30s) happens with a host (https://github.com/ansible/ansible/issues/42596)
  * purefa_facts and purefb_facts now correctly adds facts into main ansible_fact dictionary (https://github.com/ansible/ansible/pull/50349)
  * reboot - add appropriate commands to make the plugin work with VMware ESXi (https://github.com/ansible/ansible/issues/48425)
  * reboot - add support for rebooting AIX (https://github.com/ansible/ansible/issues/49712)
  * reboot - gather distribution information in order to support Alpine and other distributions (https://github.com/ansible/ansible/issues/46723)
  * reboot - search common paths for the shutdown command and use the full path to the binary rather than depending on the PATH of the remote system (https://github.com/ansible/ansible/issues/47131)
  * reboot - use a common set of commands for older and newer Solaris and SunOS variants (https://github.com/ansible/ansible/pull/48986)
  * redfish_utils - fix reference to local variable 'systems_service'
  * setup - fix the rounding of the ansible_memtotal_mb value on VMWare vm's (https://github.com/ansible/ansible/issues/49608)
  * vultr_server - fixed multiple ssh keys were not handled.
  * win_copy - Fix copy of a dir that contains an empty directory - https://github.com/ansible/ansible/issues/50077
  * win_firewall_rule - Remove invalid 'bypass' action
  * win_lineinfile - Fix issue where a malformed json block was returned causing an error
  * win_updates - Correctly report changes on success

- update to version 2.7.5
  Minor Changes:
  * Add warning about falling back to jinja2_native=false when Jinja2 version is lower than 2.10.
  * Change the position to search os-release since clearlinux new versions are providing /etc/os-release too
  * Fixed typo in ansible-galaxy info command.
  * Improve the deprecation message for squashing, to not give misleading advice
  * Update docs and return section of vmware_host_service_facts module.
  * ansible-galaxy: properly warn when git isn't found in an installed bin path instead of traceback
  * dnf module properly load and initialize dnf package manager plugins
  * docker_swarm_service: use docker defaults for the user parameter if it is set to null 
  Bugfixes:
  * bsc#1118896 CVE-2018-16876 Information disclosure in vvv+ mode with no_log on (https://github.com/ansible/ansible/pull/49569)
  * ACME modules: improve error messages in some cases (include error returned by server).
  * Added unit test for VMware module_utils.
  * Also check stdout for interpreter errors for more intelligent messages to user
  * Backported support for Devuan-based distribution
  * Convert hostvars data in OpenShift inventory plugin to be serializable by ansible-inventory
  * Fix AttributeError (Python 3 only) when an exception occurs while rendering a template
  * Fix N3K power supply facts (https://github.com/ansible/ansible/pull/49150).
  * Fix NameError nxos_facts (https://github.com/ansible/ansible/pull/48981).
  * Fix VMware module utils for self usage.
  * Fix error in OpenShift inventory plugin when a pod has errored and is empty
  * Fix if the route table changed to none (https://github.com/ansible/ansible/pull/49533)
  * Fix iosxr netconf plugin response namespace (https://github.com/ansible/ansible/pull/49300)
  * Fix issues with nxos_install_os module for nxapi (https://github.com/ansible/ansible/pull/48811).
  * Fix lldp and cdp neighbors information (https://github.com/ansible/ansible/pull/48318)(https://github.com/ansible/ansible/pull/48087)(https://github.com/ansible/ansible/pull/49024).
  * Fix nxos_interface and nxos_linkagg Idempotence issue (https://github.com/ansible/ansible/pull/46437).
  * Fix traceback when updating facts and the fact cache plugin was nonfunctional
  * Fix using vault encrypted data with jinja2_native (https://github.com/ansible/ansible/issues/48950)
  * Fixed: Make sure that the files excluded when extracting the archive are not checked. https://github.com/ansible/ansible/pull/45122
  * Fixes issue where a password parameter was not set to no_log
  * Respect no_log on retry and high verbosity (CVE-2018-16876)
  * aci_rest - Fix issue ignoring custom port
  * acme_account, acme_account_facts - in some cases, it could happen that the modules return information on disabled accounts accidentally returned by the ACME server.
  * docker_swarm - decreased minimal required API version from 1.35 to 1.25; some features require API version 1.30 though.
  * docker_swarm_service: fails because of default 'user: root' (https://github.com/ansible/ansible/issues/49199)
  * ec2_metadata_facts - Parse IAM role name from the security credential field since the instance profile name is different
  * fix azure_rm_image module use positional parameter (https://github.com/ansible/ansible/pull/49394)
  * fixes an issue with dict_merge in network utils (https://github.com/ansible/ansible/pull/49474)
  * gcp_utils - fix google auth scoping issue with application default credentials or google cloud engine credentials. Only scope credentials that can be scoped.
  * mail - fix python 2.7 regression
  * openstack - fix parameter handling when cloud provided as dict https://github.com/ansible/ansible/issues/42858
  * os_user - Include domain parameter in user deletion https://github.com/ansible/ansible/issues/42901
  * os_user - Include domain parameter in user lookup https://github.com/ansible/ansible/issues/42901
  * ovirt_storage_connection - comparing passwords breaks idempotency in update_check (https://github.com/ansible/ansible/issues/48933)
  * paramiko_ssh - improve log message to state the connection type
  * reboot - use IndexError instead of TypeError in exception
  * redis cache - Support version 3 of the redis python library (https://github.com/ansible/ansible/issues/49341)
  * sensu_silence - Cast int for expire field to avoid call failure to sensu API.
  * vmware_host_service_facts - handle exception when service package does not have package name.
  * win_nssm - Switched to Argv-ToString for escaping NSSM credentials (https://github.com/ansible/ansible/issues/48728)
  * zabbix_hostmacro - Added missing validate_certs logic for running module against Zabbix servers with untrused SSL certificates (https://github.com/ansible/ansible/issues/47611)
  * zabbix_hostmacro - Fixed support for user macros with context (https://github.com/ansible/ansible/issues/46953)

- update to version 2.7.4
  Bugfixes:
  * powershell - add lib/ansible/executor/powershell to the packaging data

- update to version 2.7.3
  Minor Changes:
  * Document Path and Port are mutually exclusive parameters in wait_for module
  * Puppet module remove --ignorecache to allow Puppet 6 support
  * dnf properly support modularity appstream installation via overloaded group
	modifier syntax
  * proxmox_kvm - fix exception
  * win_security_policy - warn users to use win_user_right instead when editing
	Privilege Rights
  Bugfixes:
  * Fix the issue that FTD HTTP API retries authentication-related HTTP requests
  * Fix the issue that module fails when the Swagger model does not have required fields
  * Fix the issue with comparing string-like objects
  * Fix using omit on play keywords
  * Windows - prevent sensitive content from appearing in scriptblock logging (CVE-2018-16859)
  * apt_key - Disable TTY requirement in GnuPG for the module to work correctly 
	when SSH pipelining is enabled
  * better error message when bad type in config, deal with EVNAR= more gracefully
  * configuration retrieval would fail on non primed plugins
  * cs_template - Fixed a KeyError on state=extracted
  * docker_container - fix idempotency problems with docker-py caused by previous
	init idempotency fix
  * docker_container - fix interplay of docker-py version check with argument_spec
	validation improvements
  * docker_network - driver_options containing Python booleans would cause Docker
    to throw exceptions
  * ec2_group - Fix comparison of determining which rules to purge by ignoring descriptions
  * pip module - fix setuptools/distutils replacement
  * sysvinit - enabling a service should use 'defaults' if no runlevels are specified

- update to version 2.7.2
  Minor changes:
  * Fix documentation for cloning template
  * Parsing plugin filter may raise TypeError, gracefully handle this 
	exception and let user know about the syntax error in plugin filter file
  * Scenario guide for VMware HTTP API usage
  * Update plugin filter documentation
  * fix yum and dnf autoremove input sanitization to properly warn user if 
	invalid options passed and update documentation to match
  * improve readability and fix privileges names on vmware scenario_clone_template
  * k8s - updated module documentation to mention how to avoid SSL validation errors
  * yum - when checking for updates, now properly include Obsoletes 
	(both old and new) package data in the module JSON output

- update to 2.7.1
  Minor changes:
  * Fix yum module to properly check for empty conf_file value
  * added capability to set the scheme for the consul_kv lookup
  * added optional certificate and certificate validation for consul_kv lookups
  * dnf - properly handle modifying the enable/disable excludes data field
  * dnf appropriately handles disable_excludes repoid argument
  * dnf proerly honors disable_gpg_check for local package installation
  * fix yum module to handle list argument optional empty strings properly
  * netconf_config - Make default_operation optional in netconf_config module
  * yum - properly handle proxy password and username embedded in url
  * yum/dnf - fail when space separated string of names 

- update to 2.7.0
  Major changes:
  * Allow config to enable native jinja types
  * Remove support for simplejson
  * yum and dnf modules now at feature parity
  Minor changes:
  * Changed the prefix of all Vultr modules from vr to vultr
  * Enable installroot tests for yum4(dnf) integration testing, dnf backend now supports that
  * Fixed timer in exponential backoff algorithm in vmware.py
  Bugfixes:
  * Security Fix - avoid loading host/group vars from cwd when not specifying a playbook or playbook base dir
  * Security Fix - avoid using ansible.cfg in a world writable dir
  * Some connection exception would cause no_log specified on a task to be ignored (stdout info disclosure)
  * Fix glob path of rc.d (SUSE-specific)
  * Fix lambda_policy updates
  * Fix alt linux detection/matching
  

- update to 2.6.4
  Minor Changes:
  * add azure_rm_storageaccount support to StorageV2 kind. 
  * import_tasks - Do not allow import_tasks to transition to dynamic
    if the file is missing
  Bugfixes:
  * Add md5sum check in nxos_file_copy module
  * Allow arbitrary log_driver for docker_container
  * Fix Python2.6 regex bug terminal plugin nxos, iosxr
  * Fix check_mode in nxos_static_route module
  * Fix glob path of rc.d Some distribtuions like SUSE has the rc%.d
    directories under /etc/init.d
  * Fix network config diff issue for lines 
  * Fixed an issue where ansible_facts.pkg_mgr would incorrectly set 
    to zypper on Debian/Ubuntu systems that happened to have the 
    command installed
  * The docker_* modules respect the DOCKER_* environment variables again
  * The fix for CVE-2018-10875 prints out a warning message about 
    skipping a config file from a world writable current working directory.
    However, if the user is in a world writable current working directory 
    which does not contain a config file, it should not print a warning 
    message. This release fixes that extaneous warning.
  * To resolve nios_network issue where vendor-encapsulated-options 
    can not have a use_option flag.
  * To resolve the issue of handling exception for Nios lookup gracefully.
  * always correctly template no log for tasks
  * ansible-galaxy - properly list all roles in roles_path
  * basic.py - catch ValueError in case a FIPS enabled platform 
    raises this exception
  * docker_container: fixing working_dir idempotency problem 
  * docker_container: makes unit parsing for memory sizes more consistent, 
    and fixes idempotency problem when kernel_memory is set
  * fix example code for AWS lightsail documentation
  * fix the enable_snat parameter that is only supposed to be used by 
    an user with the right policies.
  * fixes docker_container check and debug mode
  * improves docker_container idempotency
  * ios_l2_interface - fix bug when list of vlans ends with comma
  * ios_l2_interface - fix issue with certain interface types
  * ios_user - fix unable to delete user admin issue 
  * ios_vlan - fix unable to work on certain interface types issue 
  * nxos_facts test lldp feature and fix nxapi check_rc 
  * nxos_interface port-channel idempotence fix for mode
  * nxos_linkagg mode fix 
  * nxos_system idempotence fix
  * nxos_vlan refactor to support non structured output
  * one_host - fixes settings via environment variables
  * use retry_json nxos_banner
  * user - Strip trailing comments in /etc/default/passwd 
  * user - when creating a new user without an expiration date, 
    properly set no expiration rather that expirining the account
  * win_domain_computer - fixed deletion of computer active directory 
    object that have dependent objects
  * win_domain_computer - fixed error in diff_support
  * win_domain_computer - fixed error when description parameter is empty 
  * win_psexec - changed code to not escape the command option when building the args
  * win_uri -- Fix support for JSON output when charset is set
  * win_wait_for - fix issue where timeout doesn't wait unless state=drained

- update to 2.6.3
  Bugfixes:
  * Fix lxd module to be idempotent when the given configuration for
	the lxd container has not changed
  * Fix setting value type to str to avoid conversion during template
	read. Fix Idempotency in case of 'no key'.
  * Fix the mount module's handling of swap entries in fstab
  * The fix for (CVE-2018-10875) prints out a warning message about
	skipping a config file from a world writable current working
	directory. However, if the user explicitly specifies that the 
	config file should be used via the ANSIBLE_CONFIG environment
	variable then Ansible would honor that but still print out the
	warning message. This has been fixed so that Ansible honors the
	user's explicit wishes and does not print a warning message in
	that circumstance.
  * To fix the bug where existing host_record was deleted when existing
	record name is used with different IP.
  * VMware handle pnic in proxyswitch
  * fix azure security group cannot add rules when purge_rule set to false.
  * fix azure_rm_deployment collect tags from existing Resource Group.
  * fix azure_rm_loadbalancer_facts list takes at least 2 arguments.
  * fix for the bundled selectors module (used in the ssh and local 
	connection plugins) when a syscall is restarted after being 
	interrupted by a signal
  * get_url - fix the bug that get_url does not change mode when checksum matches
  * nicer error when multiprocessing breaks
  * openssl_certificate - Convert valid_date to bytes for conversion
  * openstack_inventory.py dynamic inventory file fixed the plugin to the 
	script so that it will work with current ansible-inventory. Also 
    redirect stdout before dumping the ouptput, because not doing so will
	cause JSON parse errors in some cases.
  * slack callback - Fix invocation by looking up data from cli.options
  * sysvinit module: handle values of optional parameters. Don't disable 
	service when enabled parameter isn't set. Fix command when arguments 
	parameter isn't set.
  * vars_prompt - properly template play level variables in vars_prompt
  * win_domain - ensure the Netlogon service is up and running after 
	promoting host to controller
  * win_domain_controller - ensure the Netlogon service is up and running
	after promoting host to controller

- update to 2.6.2
  Minor Changes
  + Sceanrio guide for removing an existing virtual machine is added.
  + lineinfile - add warning when using an empty regexp 
  + Restore module_utils.basic.BOOLEANS variable for backwards compatibility
    with the module API in older ansible releases.
  Bugfixes:
  + Includes fix for bsc#1099808 (CVE-2018-10875) ansible.cfg is being read
    from current working directory allowing possible code execution
  + Add text output along with structured output in nxos_facts 
  + Allow more than one page of results by using the right pagination 
    indicator ('NextMarker' instead of 'NextToken').
  + Fix an atomic_move error that is 'true', but misleading. 
    Now we show all 3 files involved and clarify what happened.
  + Fix eos_l2_interface eapi.
  + Fix fetching old style facts in junos_facts module
  + Fix get_device_info nxos zero or more whitespace regex
  + Fix nxos CI failures
  + Fix nxos_nxapi default http behavior
  + Fix nxos_vxlan_vtep_vni
  + Fix regex network_os_platform nxos
  + Refactor nxos cliconf get_device_info for non structured 
    output supported devices
  + To fix the NoneType error raised in ios_l2_interface when 
    Access Mode VLAN is unassigned
  + emtpy host/group name is an error
  + fix default SSL version for docker modules
  + fix mail module when using starttls
  + fix nmap config example
  + fix ps detection of service
  + fix the remote tmp folder permissions issue when becoming a non 
    admin user
  + fix typoe in sysvinit that breaks update.rc-d detection
  + fixes docker_container compatibilty with docker-py &lt; 2.2
  + get_capabilities in nxapi module_utils should not return empty dictionary
  + inventory - When using an inventory directory, ensure extension 
    comparison uses text types
  + ios_vlan - fix unable to identify correct vlans issue
  + nxos_facts warning message improved
  + openvswitch_db - make 'key' argument optional
  + pause - do not set stdout to raw mode when redirecting to a file
  + pause - nest try except when importing curses to gracefully fail 
    if curses is not present
  + plugins/inventory/openstack.py - Do not create group with empty 
    name if region is not set
  + preseve delegation info on nolog
  + remove ambiguity when it comes to 'the source'
  + remove dupes from var precedence
  + restores filtering out conflicting facts
  + user - fix bug that resulted in module always reporting a change when 
    specifiying the home directory on FreeBSD
  + user - use correct attribute name in FreeBSD for creat_home
  + vultr - Do not fail trying to load configuration from ini files if 
    required variables have been set as environment variables.
  + vyos_command correcting conditionals looping
  + win_chocolatey - enable TLSv1.2 support when downloading the 
    Chocolatey installer 
  + win_reboot - fix for handling an already scheduled reboot and other 
    minor log formatting issues
  + win_reboot - fix issue when overridding connection timeout hung 
    the post reboot uptime check
  + win_reboot - handle post reboots when running test_command 
  + win_security_policy - allows an empty string to reset a policy value
  + win_share - discard any cmdlet output we don't use to ensure only the 
    return json is received by Ansible
  + win_unzip - discard any cmdlet output we don't use to ensure only the 
    return json is received by Ansible
  + win_updates - fixed module return value is lost in error in some cases
  + win_user - Use LogonUser to validate the password as it does not 
    rely on SMB/RPC to be available
  + Security Fix - avoid loading host/group vars from cwd when not 
    specifying a playbook or playbook base dir
  + Security Fix - avoid using ansible.cfg in a world writable dir.
  + Fix junos_config confirm commit timeout issue 
    (https://github.com/ansible/ansible/pull/41527)
  + file module - The touch subcommand had its diff output broken during
    the 2.6.x development cycle. This is now fixed.
  + inventory manager - This fixes required options being populated before 
    the inventory config file is read, so the required options may be 
    set in the config file.
  + nsupdate - allow hmac-sha384 https://github.com/ansible/ansible/pull/42209
  + win_domain - fixes typo in one of the AD cmdlets 
    https://github.com/ansible/ansible/issues/41536
  + win_group_membership - uses the internal Ansible SID conversion logic 
    and uses that when comparing group membership instead of the name 
- use fdupes to save some space in python_sitelib
- define BuildRoot on older distributions like SLE-11
- be a bit more flexible with the ending of manpage files to allow
  Fedora builds to succeed
- includes fix for bsc#1099805 (CVE-2018-10874) Inventory
  variables are loaded from current working directory when
  running ad-hoc command that can lead to code execution
  (included upstream in 2.6.1).

- revert some unneeded changes from spec-cleaner

- updated to latest release 2.6.0 
- New Plugins:
  + Callback: 
    - cgroup_memory_recap
    - grafana_annotations
    - sumologic
  + Connection:
    - httpapi
  + Inventory:
    - foreman
    - gcp_compute
    - generator
    - nmap
  + Lookup:
    - onepassword
    - onepassword_raw
- Modules updates too many to mention here
  please look at package documentation directory (/usr/share/doc/packages/.../changelogs)
- bug fixes:
  - **Security Fix** - Some connection exceptions would cause no_log
    specified on a task to be ignored.  If this happened, the task information,
    including any private information coul d have been displayed to stdout and
    (if enabled, not the default) logged to a log file specified in
    ansible.cfg's log_path.  Additionally, sites which redirected stdout from
    ansible runs to a log file may have stored that private information onto
    disk that way as well.  (https://github.com/ansible/ansible/pull/41414)
  - Changed the admin_users config option to not include 'admin' by default
    as admin is frequently used for a non-privileged account
    (https://github.com/ansible/ansible/pull/41164)
  - Changed the output to 'text' for 'show vrf' command as default 'json'
    output format with respect to 'eapi' transport was failing
    (https://github.com/ansible/ansible/pull/41470)
  - Document mode=preserve for both the copy and template module
  - Fix added for Digital Ocean Volumes API change causing Ansible to
    recieve an unexpected value in the response. 
    (https://github.com/ansible/ansible/pull/41431)
  - Fix an encoding issue when parsing the examples from a plugins'
    documentation
  - Fix iosxr_config module to handle route-policy, community-set,
    prefix-set, as-path-set and rd-set blocks.  All these blocks are part of
    route-policy language of iosxr.
  - Fix mode=preserve with remote_src=True for the copy module
  - Implement mode=preserve for the template module
  - The yaml callback plugin now allows non-ascii characters to be
    displayed.
  - Various grafana_* modules - Port away from the deprecated
    b64encodestring function to the b64encode function instead. 
    https://github.com/ansible/ansible/pull/38388
  - added missing 'raise' to exception definition
    https://github.com/ansible/ansible/pull/41690
  - allow custom endpoints to be used in the aws_s3 module
    (https://github.com/ansible/ansible/pull/36832)
  - allow set_options to be called multiple times
    https://github.com/ansible/ansible/pull/41913
  - ansible-doc - fixed traceback on missing plugins
    (https://github.com/ansible/ansible/pull/41167)
  - cast the device_mapping volume size to an int in the ec2_ami module
    (https://github.com/ansible/ansible/pull/40938)
  - copy - fixed copy to only follow symlinks for files in the non-recursive case
  - copy module - The copy module was attempting to change the mode of files
    for remote_src=True even if mode was not set as a parameter.  This
    failed on filesystems which do not have permission bits
    (https://github.com/ansible/ansible/pull/40099)
  - copy module - fixed recursive copy with relative paths
    (https://github.com/ansible/ansible/pull/40166)
  - correct debug display for all cases
    https://github.com/ansible/ansible/pull/41331
  - correctly check hostvars for vars term
    https://github.com/ansible/ansible/pull/41819
  - correctly handle yaml inventory files when entries are null dicts
    https://github.com/ansible/ansible/issues/41692
  - dynamic includes - Allow inheriting attributes from static parents
    (https://github.com/ansible/ansible/pull/38827)
  - dynamic includes - Don't treat undefined vars for conditional includes
    as truthy (https://github.com/ansible/ansible/pull/39377)
  - dynamic includes - Fix IncludedFile comparison for free strategy
    (https://github.com/ansible/ansible/pull/37083)
  - dynamic includes - Improved performance by fixing re-parenting on copy
    (https://github.com/ansible/ansible/pull/38747)
  - dynamic includes - Use the copied and merged task for calculating task
    vars (https://github.com/ansible/ansible/pull/39762)
  - file - fixed the default follow behaviour of file to be true
  - file module - Eliminate an error if we're asked to remove a file but
    something removes it while we are processing the request
    (https://github.com/ansible/ansible/pull/39466)
  - file module - Fix error when recursively assigning permissions and a
    symlink to a nonexistent file is present in the directory tree
    (https://github.com/ansible/ansible/issues/39456)
  - file module - Fix error when running a task which assures a symlink to a
    nonexistent file exists for the second and subsequent times
    (https://github.com/ansible/ansible/issues/39558)
  - file module - The file module allowed the user to specify src as a
    parameter when state was not link or hard.  This is documented as only
    applying to state=link or state=hard but in previous Ansible, this could
    have an effect in rare cornercases.  For instance, 'ansible -m file -a
    'state=directory path=/tmp src=/var/lib'' would create /tmp/lib.  This
    has been disabled and a warning emitted (will change to an error in
    Ansible-2.10).
  - file module - The touch subcommand had its diff output broken during the
    2.6.x development cycle.  This is now fixed
    (https://github.com/ansible/ansible/issues/41755)
  - fix BotoCoreError exception handling
  - fix apt-mark on debian6 (https://github.com/ansible/ansible/pull/41530)
  - fix async for the aws_s3 module by adding async support to the action
    plugin (https://github.com/ansible/ansible/pull/40826)
  - fix decrypting vault files for the aws_s3 module
    (https://github.com/ansible/ansible/pull/39634)
  - fix errors with S3-compatible APIs if they cannot use ACLs for buckets
    or objects
  - fix permission handling to try to download a file even if the user does
    not have permission to list all objects in the bucket
  - fixed config required handling, specifically for _terms in lookups
    https://github.com/ansible/ansible/pull/41740
  - gce_net - Fix sorting of allowed ports
    (https://github.com/ansible/ansible/pull/41567)
  - group_by - support implicit localhost
    (https://github.com/ansible/ansible/pull/41860)
  - import/include - Ensure role handlers have the proper parent, allowing
    for correct attribute inheritance
    (https://github.com/ansible/ansible/pull/39426)
  - import_playbook - Pass vars applied to import_playbook into parsing of
    the playbook as they may be needed to parse the imported plays
    (https://github.com/ansible/ansible/pull/39521)
  - include_role/import_role - Don't overwrite included role handlers with
    play handlers on parse (https://github.com/ansible/ansible/pull/39563)
  - include_role/import_role - Fix parameter templating
    (https://github.com/ansible/ansible/pull/36372)
  - include_role/import_role - Use the computed role name for
    include_role/import_role so to diffentiate between names computed from
    host vars (https://github.com/ansible/ansible/pull/39516)-
    include_role/import_role - improved performance and recursion depth
    (https://github.com/ansible/ansible/pull/36470)
  - lineinfile - fix insertbefore when used with BOF to not insert duplicate
    lines (https://github.com/ansible/ansible/issues/38219)
  - password lookup - Do not load password lookup in network filters,
    allowing the password lookup to be overriden
    (https://github.com/ansible/ansible/pull/41907)
  - pause - ensure ctrl+c interrupt works in all cases
    (https://github.com/ansible/ansible/issues/35372)
  - powershell - use the tmpdir set by `remote_tmp` for become/async tasks
    instead of the generic $env:TEMP -
    https://github.com/ansible/ansible/pull/40210
  - selinux - correct check mode behavior to report same changes as normal
    mode (https://github.com/ansible/ansible/pull/40721)
  - spwd - With python 3.6 spwd.getspnam returns PermissionError instead of
    KeyError if user does not have privileges
    (https://github.com/ansible/ansible/issues/39472)
  - synchronize - Ensure the local connection created by synchronize uses
    _remote_is_local=True, which causes ActionBase to build a local tmpdir
    (https://github.com/ansible/ansible/pull/40833)
  - template - Fix for encoding issues when a template path contains
    non-ascii characters and using the template path in ansible_managed
    (https://github.com/ansible/ansible/issues/27262)
  - template action plugin - fix the encoding of filenames to avoid
    tracebacks on Python2 when characters that are not present in the user's
    locale are present.  (https://github.com/ansible/ansible/pull/39424)
  - user - only change the expiration time when necessary
    (https://github.com/ansible/ansible/issues/13235)
  - uses correct conn info for reset_connection
    https://github.com/ansible/ansible/issues/27520
  - win_environment - Fix for issue where the environment value was deleted
    when a null value or empty string was set -
    https://github.com/ansible/ansible/issues/40450
  - win_file - fix issue where special chars like [ and ] were not being
    handled correctly https://github.com/ansible/ansible/pull/37901
  - win_get_url - fixed a few bugs around authentication and force no when
    using an FTP URL
  - win_iis_webapppool - redirect some module output to null so Ansible can
    read the output JSON https://github.com/ansible/ansible/issues/40874
  - win_template - fix when specifying the dest option as a directory with
    and without the trailing slash
    https://github.com/ansible/ansible/issues/39886
  - win_updates - Added the ability to run on a scheduled task for older
    hosts so async starts working again -
    https://github.com/ansible/ansible/issues/38364
  - win_updates - Fix logic when using a whitelist for multiple updates
  - win_updates - Fix typo that hid the download error when a download
    failed
  - win_updates - Fixed issue where running win_updates on async fails
    without any error
  - windows become - Show better error messages when the become process fails
  - winrm - Add better error handling when the kinit process fails
  - winrm - allow `ansible_user` or `ansible_winrm_user` to override
    `ansible_ssh_user` when both are defined in an inventory -
    https://github.com/ansible/ansible/issues/39844
  - winrm - ensure pexpect is set to not echo the input on a failure and have
    a manual sanity check afterwards
    https://github.com/ansible/ansible/issues/41865
  - winrm connection plugin - Fix exception messages sometimes raising a
    traceback when the winrm connection plugin encounters an unrecoverable
    error.  https://github.com/ansible/ansible/pull/39333
  - xenserver_facts - ensure module works with newer versions of XenServer
    (https://github.com/ansible/ansible/pull/35821)

- use python3 on (open)SUSE 15 or newer

- Update to 2.5.5
  - Fixed the honouration of the no_log option with failed task iterations
    (CVE-2018-10855 boo#1097775)
  - Bufixes:
    - Changed the admin_users config option to not include 'admin' by default
      as admin is frequently used for a non-privileged account
    - aws_s3 - add async support to the action plugin
    - aws_s3 - fix decrypting vault files
    - ec2_ami - cast the device_mapping volume size to an int
    - eos_logging - fix idempotency issues
    - cache plugins - A cache timeout of 0 means the cache will not expire.
    - ios_logging - fix idempotency issues
    - ios/nxos/eos_config - don't retrieve config in running_config when config is provided for diff
    - nxos_banner - fix multiline banner issue
    - nxos terminal plugin - fix output truncation
    - nxos_l3_interface - fix no switchport issue with loopback and svi interfaces
    - nxos_snapshot - fix compare_option
- Applied spec-cleaner

- Update to 2.5.1
  Minor Changes
  + Updated example in vcenter_license module.
  + Updated virtual machine facts with instanceUUID which is unique 
    for each VM irrespective of name and BIOS UUID.
  + A lot of Bugfixes, please refer to the Changelog installed in 
    /usr/share/doc/packages/ansible/changelogs/CHANGELOG-v2.5.rst

- Update to 2.5.0:
  Major Changes
  * Ansible Network improvements
    + Created new connection plugins network_cli and netconf to replace
      connection=local. connection=local will continue to work for a
      number of Ansible releases.
    + No more unable to open shell. A clear and descriptive message will 
      be displayed in normal ansible-playbook output without needing to enable debug mode
    + Loads of documentation, see Ansible for Network Automation Documentation.
    + Refactor common network shared code into package under module_utils/network/
    + Filters: Add a filter to convert XML response from a network device to JSON object.
    + Loads of bug fixes.
    + Plus lots more.
  * New simpler and more intuitive 'loop' keyword for task loops. The 
    with_&lt;lookup&gt; loops will likely be deprecated in the near future 
    and eventually removed.
  * Added fact namespacing; from now on facts will be available under 
    ansible_facts namespace (for example: ansible_facts.os_distribution) 
    without the ansible_ prefix. They will continue to be added into the 
    main namespace directly, but now with a configuration toggle to enable
    this. This is currently on by default, but in the future it will default to off.
  * Added a configuration file that a site administrator can use to 
    specify modules to exclude from being used.
  Minor Changes
  * please refer to /share/doc/packages/ansible/changelogs/CHANGELOG-v2.5.rst
  Deprecated Features
  * Previously deprecated 'hostfile' config settings have been 're-deprecated' 
    because previously code did not warn about deprecated configuration settings.
  * Using Ansible-provided Jinja tests as filters is deprecated and will 
    be removed in Ansible 2.9.
  * The stat and win_stat modules have deprecated get_md5 and the md5 return
    values. These options will become undocumented in Ansible 2.9 and 
    removed in a later version.
  * The redis_kv lookup has been deprecated in favor of new redis lookup
  * Passing arbitrary parameters that begin with HEADER_ to the uri module, 
    used for passing http headers, is deprecated. Use the headers parameter 
    with a dictionary of header names to value instead. 
    This will be removed in Ansible 2.9
  * Passing arbitrary parameters to the zfs module to set zfs properties is 
    deprecated. Use the extra_zfs_properties parameter with a dictionary of
    property names to values instead. This will be removed in Ansible 2.9.
  * Use of the AnsibleModule parameter check\_invalid\_arguments in custom
    modules is deprecated. In the future, all parameters will be checked to 
    see whether they are listed in the arg spec and an error raised if they 
    are not listed. This behaviour is the current and future default so most 
    custom modules can simply remove check\_invalid\_arguments if they set it 
    to the default value of True. The check\_invalid\_arguments parameter 
    will be removed in Ansible 2.9.
  * The nxos_ip_interface module is deprecated in Ansible 2.5. 
    Use nxos_l3_interface module instead.
  * The nxos_portchannel module is deprecated in Ansible 2.5. 
    Use nxos_linkagg module instead.
  * The nxos_switchport module is deprecated in Ansible 2.5. 
    Use nxos_l2_interface module instead.
  * The ec2_ami_find has been deprecated; use ec2_ami_facts instead.
  * panos_security_policy: Use panos_security_rule - the old module uses 
    deprecated API calls
  * vsphere_guest is deprecated in Ansible 2.5 and will be removed in 
    Ansible-2.9. Use vmware_guest module instead.
  Removed Features (previously deprecated)
  * accelerate.
  * boundary_meter: There was no deprecation period for this but the hosted 
    service it relied on has gone away so the module has been removed. #29387
  * cl_ : cl_interface, cl_interface_policy, cl_bridge, cl_img_install, 
    cl_ports, cl_license, cl_bond. Use nclu instead
  * docker. Use docker_container and docker_image instead.
  * ec2_vpc.
  * ec2_ami_search, use ec2_ami_facts instead.
  * nxos_mtu. Use nxos_system's system_mtu option instead. 
    To specify an interface's MTU use nxos_interface.
  * panos_nat_policy: Use panos_nat_rule the old module uses
    deprecated API calls
- also package the changelogs directory below 
  /usr/share/doc/packages/ansible/ for better reference

- License changed to GPL-3.0-or-later, as mentioned in the source
  (former license focues on GPL-3.0 only)

- Add python-passlib as Requires (bsc#1080682)
  passlib is needed for the 'vars_prompt' feature of ansible

- Update to version 2.4.3.0:
  * Fix `pamd` rule args regexp to match file paths.
  * Check if SELinux policy exists before setting.
  * Set locale to `C` in `letsencrypt` module to fix date parsing
    errors.
  * Fix include in loop when stategy=free.
  * Fix save parameter in asa_config.
  * Fix --vault-id support in ansible-pull.
  * In nxos_interface_ospf, fail nicely if loopback is used with
    passive_interface.
  * Fix quote filter when given an integer to quote.
  * nxos_vrf_interface fix when validating the interface.
  * Fix for win_copy when sourcing files from an SMBv1 share.
  * correctly report callback plugin file.
  * restrict revaulting to vault cli.
  * Fix python3 tracebacks in letsencrypt module.
  * Fix ansible_*_interpreter variables to be templated prior to
    being used.
  * Fix setting of environment in a task that uses a loop
  * Fix fetch on Windows failing to fetch files or particular
    block size.
  * preserve certain fields during no log.
  * fix issue with order of declaration of sections in ini
    inventory.
  * Fix win_iis_webapppool to correctly stop a apppool.
  * Fix CloudEngine host failed.
  * Fix ios_config save issue.
  * Handle vault filenames with nonascii chars when displaying
    messages.
  * Fix win_iis_webapppool to not return passwords.
  * Fix extended file attributes detection and changing.
  * correctly ensure 'ungrouped' membership rules.
  * made warnings less noisy when empty/no inventory is supplied.
  * Fixes a failure which prevents to create servers in module
    cloudscale_server.
  * Fix win_firewall_rule 'Specified cast is invalid' error when
    modifying a rule with all of Domain/Public/Private profiles set.
  * Fix case for multilib when installing from a file in the yum
    module.
  * Fix WinRM parsing/escaping of IPv6 addresses.
  * Fix win_package to detect MSI regardless of the extension case.
  * Updated win_mapped_drive docs to clarify what it is used for.
  * Fix file related modules run in check_mode when the file being
    operated on does not exist.
  * Make eos_vlan idempotent.
  * Fix win_iis_website to properly check attributes before setting.
  * Fixed the removal date for ios_config save and force parameters.
  * cloudstack: fix timeout from ini config file being ignored.
  * fixes memory usage issues with many blocks/includes.
  * Fixes maximum recursion depth exceeded with include_role.
  * Fix to win_dns_client module to take ordering of DNS servers to
    resolve into account.
  * Fix for the nxos_banner module where some nxos images nest the
    output inside of an additional dict.
  * Fix failure message 'got multiple values for keyword argument
    id' in the azure_rm_securitygroup module (caused by changes to
    the azure python API).
  * Bump Azure storage client minimum to 1.5.0 to fix
    deserialization issues.
    This will break Azure Stack until it receives storage API
    version 2017-10-01 or changes are made to support multiple
    versions.
  * Flush stdin when passing the become password. Fixes some cases
    of timeout on Python 3 with the ssh connection plugin.
update to version v2.4.2.0:
  * lock azure containerservice to below 2.0.0
  * ovirt_host_networks: Fix label assignment
  * Fix vault --ask-vault-pass with no tty (#31493)
  * cherry-pick changes of azure_rm_common from devel to 2.4 (#32607)
  * Fixes #31090. In network parse_cli filter plugin, this change moves the creation of a (#31092) (#32458)
  * Use an abspath for network inventory ssh key path.
  * Remove toLower on source (#31983)
  * Add k8s_common.py logging fixes to the changelog
  * inserts enable cmd hash with auth_pass used (#32107)
  * Fix exception upon display.warn() (#31876)
  * ios_system: Fix typo in unit test (#32284)
  * yum: use the C locale when screen scraping (#32203)
  * Use region derived from get_aws_connection_info() in dynamodb_table to fix tagging bug (#32557)
  * fix item var in delegation (#32986)
  * Add changelog entry for elb_application_lb fix
  * Add a validate example to blockinfile. (#32088)
  * Correct formatting --arguments (#31808)
  * Add changelog for URI/get_url fix
  * [cloud] Bugfix for aws_s3 empty directory creation (#32198)
  * Fix junos integration test fixes as per connection refactor (#33050) (#33055)
  * Update win_copy for #32677 (#32682)
  * ios_interface testfix (#32381)
  * Add proper check mode support to the script module (#31852)
  * Add galaxy --force fix to changelog
  * Fix non-ascii errors in config manager
  * Add python3 urllib fixes to changelog
  * Add changelog entry for the stdin py3 fix
  * Update version info for the 2.4.2 release
  * Add max_fail_percentage fix to changelog
  * Changelog entry for script inventory plugin fix.
  * Make RPM spec compatible with RHEL 6 (#31653)
  * Add changelog entry for the yum locale fix
  * Use vyos/1.1.8 in CI.
  * Fix patching to epel package
  * Pass proper error value to to_text (#33030)
  * Fix and re-enable zypper* integration tests in CI.
  * avoid chroot paths (#32778)
  * Add changelog entry for inventory nonascii paths fix
  * Fix ios_config integration test failures (#32959) (#32970)
  * Fix ios_config file prompt issue (#32744) (#32780)
  * Mdd module unit test docs (#31373)
  * dont add all group vars to implicit on create
  * Fix nxos_banner removal idempotence issue in N1 images (#31259)
  * Clarify the release and maintenance cycle (#32402)
  * Add ansible_distribution_major_version to macOS (#31708)
  * Docs (#32718)
  * Keep newlines when reading LXC container config file (#32219)
  * Updated changelog for vmware logon error handling
  * New release v2.4.2.0-0.2.beta2
  * added doc notes about vars plugins in precedence
  * revert module_utils/nxos change from #32846 (#32956)
  * [cloud] add boto3 requirement to `cloudformation` module docs (#31135)
  * Fixes #31056 (#31057)
  * - Fix logging module issue where facility is being deleted along with host (#32234)
  * Get the moid in a more failsafe manner (#32671)
  * Integration Tests only: add static route, snmp_user, snapshot and hsrp it cases (#28933)
  * Add the change to when we escape backslashes (for the template lookup plugin) to changelog
  * correctly deal with changed (#31812)
  * Add the template lookup escaping to the 2.4 porting guide (#32760)
  * tests for InventoryModule error conditions (#31381)
  * Disable pylint rules for stable-2.4.
  * fix typo
  * Enable TLS1.1 and TLS1.2 for win_package (#32184)
  * Add remove host fix to changelog
  * ios_interface provider issue testfix (#32335)
  * win_service: quoted path fix (#32469)
  * Add changes to succeeded/failed tests to the 2.4 porting guide (#33201)
  * Run OS X tests in 3 groups in CI.
  * ini inventory: document value parsing workaround
  * Change netconf port in testcase as per test enviornment (#32883) (#32889)
  * fix inventory loading for ansible-doc
  * jsonify inventory (#32990)
  * firewalld: don't reference undefined variable in error case (#31949)
  * change ports to non well known ports and drop time_range for N1 (#31261)
  * make vars only group declarations an error
  * Add changelog for os_floating_ip fix
  * Fix example on comparing master config (#32406)
  * py2/py3 safer shas on hostvars (#31788)
  * ensure we always have a basedir
  * Add missing ansible-test --remote-terminate support. (#32918)
  * Use show command to support wider platform set for nxos_interface module (#33037)
  * ios_logging: change IOS command pipe to section to include (#33100) (#33116)
  * win_find: allow module to skip on files it fails to check (#32105)
  * New release v2.4.2.0-0.4.beta4
  * multiple nxos fixes (#32905)
  * Add changelog entry for git archive fix
  * Add changelog entries for a myriad of 2.4.2 bugfixes
  * iosxr integration testfix (#32344)
  * Fix #31694: running with closed stdin on python 3 (#31695)
  * Add eos_user fix to changelog
  * updated changelog with win_find fix
  * Added urls python3 fix to changelog
  * [cloud] Support changeset_name parameter on CloudFormation stack create (#31436)
  * use configured ansible_shell_executable
  * New release v2.4.2.0-0.3.beta3
  * Fix ec2_lc failing to create multi-volume configurations (#32191)
  * Changelog win_package TLS fix
  * Fix wrong prompt issue for network modules (#32426) (#32442)
  * New release v2.4.2.0-0.1.beta1
  * Exclude stack policy when running in check mode.
  * change inventory_hostname to ansible_host to fix test (#32890) (#32891)
  * Add azure_rm_acs check mode fix
  * Updated changelog for win_copy fix
  * corrected package docs
  * make sure patterns are strings
  * Add more bugfixes to changelog
  * Fix junos netconf port issue in integration test (#32610) (#32668)
  * fixed .loads error for non decoded json in Python 3 (#32065)
  * nxos_config and nxos_facts - fixes for N35 platform.  (#32762) (#32875)
  * Add changelog entry for #32219
  * Remove provider from  ios integration test (#31037) (#32230)
  * added note about serial behaviour (#32461)
  * Fixes ios_logging unit test (#32240)
  * Avoid AttributeError: internal_network on os_floating_ip (#32887)
  * use to_str instead of json.dumps when serializing k8s object for logging
  * Prefer the stdlib SSLContext over urllib3 context
  * git: fix archive when update is set to no (#31829)
  * Add elb_target_group port fix to the changelog
  * Changelog entry for aws_s3 issue #32144
  * Add error handling for user login (#32613)
  * Move asa provider to suboptions (#32356)
  * fix dci failure nxos (#32877) (#32878)
  * Add inventory jsonification to the changelog
  * eos_eapi: adding the desired state config to the new vrf fixes #32111 (#32112) (#32452)
  * Handle ip name-server lines containing multiple nameservers (#32235) (#32373)
  * Remove provider from prepare_ios_tests integration test (#31038)
  * Add last minute bugfixes and doc updates for rc1
  * Fix snmp bugs on Nexus 3500 platform (#32773) (#32847)
  * validate that existing dest is valid directory
  * Update the release data for 2.4.1 in the changelog
  * add check mode for acs delete (#32063)
  * More fixes added to changelog
  * Add wait_for fix to the changelog
  * removed psobject to hashtables that were missed (#32710)
  * wait_for: treat broken connections as 'unready' (#28839)
  * Return all elements in a more robust way
  * fix ios_interface test (#32372)
  * Add missing packages to default docker image.
  * fix nxos_igmp_snooping (#31688)
  * - Fix to return error message back to the module. (#31035)
  * Ensure that readonly result members are serialized (#33170)
  * Keywords docs (#32807)
  * remove hosts from removed when rescuing
  * Add panos_security_rule docs typo fix to changelog
  * Update vyos completion in network.txt.
  * move to use ansible logging
  * ovirt_clusters: Fix fencing and kuma comparision
  * Documentation typo fixes (#32473)
  * [fix] issue #30516 : take care about autoremove in upgrade function
  * Enable ECHO in prompt module (#32083)
  * calculate max fail against all hosts in batch
  * Fix urlparse import for Python3 (#31240)
  * Bunch of changelog updates for cherry-picks
  * restore hostpattern regex/glob behaviour
  * Better handling of malformed vault data envelope (#32515)
  * Updated changelog regarding win_service quoted path fix
  * nxos_interface error handling (#32846)
  * An availability zone will be selected if none is provided. Set az to an empty string if it's None to avoid traceback. (#32216)
  * Use to_native when validating proxy result (#32596)
  * vmware_guest: refactor spec serialization (#32681)
  * Add new default Docker container for ansible-test. (#31944)
  * warn on bad keys in group
  * NXOS: Integration tests to Ansible (part 3) (#29030)
  * Add spec file fix to changelog
  * eos_user testfix (#32264)
  * iam.py: return iam.role dict when creating roles (#28964)
  * Add networking bug fixes to changelog (#32201)
  * [cloud] sns_topic: Fix unreferenced variable
  * Fix service_mgr fact collection (#32086)
  * Fix include_role unit tests (#31920)
  * Updated changelog for win_iis_* modules things
  * handle ignore_errors in loop
  * adjust nohome param when using luser
  * better cleanup on task results display (#27175)
  * Improve python 2/3 ABC fallback for pylint. (#31848)
  * fix html formatting
  * Add ansible_shell_executable fix to changelog
  * Move resource pool login to a separate function and fix undefined var reference (#32674)
  * Update ansible-test sanity command. (#31958)
  * ios_ping test fix (#32342)
  * fix CI failure yaml syntax (#32374)
  * Scan group_vars/host_vars in sorted order
  *     luseradd defaults to creating w/o need for -m (#32411)
  * Integration Tests only:  nxos_udld, nxos_udld_interface, nxos_vxlan_vtep_vni (#29143) (#32962)
  * Fix: modifying existing application lb using certificates now properly sets certificates (#28217)
  * ios_logging: Fix some smaller issues, add unit test (#32321)
  * Fix nxos_snmp_host bug (#32916) (#32958)
  * ovirt_hosts: Don't fail upgrade when NON_RESPONSIVE state
  * ini plugin should recursively instantiate pending
  * eos_user: sends user secret first on user creation fixes #31680 (#32162)
  * Cast target port to an int in elb_target_group. Fixes #32098 (#32202)
  * New release v2.4.2.0-0.5.rc1
  * remove misleading group vars as they are flat (#32276)
  * Fix typo
  * Avoid default inventory proccessing for pull (#32135)
  * Fix ansible-test default image. (#31966)
  * removed superfluous `type` field from RecordSet constructor (#33167)
  * Update k8s_common.py
  * Add ios_logging fixes to changelog 2.4.2beta2 (#32447)
  * Revert 'Removed a force conditional (#28851)' (#32282)
  * Add new documentation on writing unittests to the changelog
  * Fix ansible-test race calling get_coverage_path.
  * New release v2.4.2.0-1
- update to 2.3.2.0 (final) - bsc#1059235
- update to 2.3.1 RC1 (package version 2.3.0.1) (bsc#1056094):
    as 'unsafe'. bsc#1038785
  * SECURITY (MODERATE): fix for CVE-2017-7466, which finally fixes
    an arbitrary command execution vulnerability
- security update to rc4 of 2.2.1.0 version CVE-2016-9587,
  CVE-2016-8628, CVE-2016-8614, CVE-2016-8647, CVE-2016-9587
  (bsc#1008037, bsc#1008038, bsc#1010940, bsc#1019021)

Changes in ardana-ansible:
- Update to version 8.0+git.1596735237.54109b1:
  * Update the Swift XFS inode size check (SOC-10300)

- Update to version 8.0+git.1596204601.75b0e4e:
  * Fix upgrade validations Keystone V3 check target (SOC-10300)

Changes in ardana-cinder:
- Update to version 8.0+git.1596129856.263f430:
  * Install python-swiftclient as cinder-backup dependency (SOC-11364)

Changes in ardana-glance:
- Update to version 8.0+git.1593631779.76fa9b7:
  * Idempotent cirros image upload to glance (SOC-11342)

Changes in ardana-mq:
- Update to version 8.0+git.1593618123.678c32b:
  * Ensure epmd.service started/stopped independent of rabbitmq (SOC-6780)

Changes in ardana-nova:
- Update to version 8.0+git.1601298847.dd01585:
  * restore ram_weight_multiplier to default (bsc#1123561)
  * enable all weigher classes by default (bsc#1123561)

- Update to version 8.0+git.1595857666.cf6b4a9:
  * Correction for (bsc#1174242)

- Update to version 8.0+git.1595356665.56726ed:
  * Disable nova-consoleauth monasca process check (bsc#1174242)

Changes in ardana-osconfig:
- Update to version 8.0+git.1595885113.93abcbc:
  * Enable SLE12 SP3 LTSS for SMT deployments (SOC-11223)

Changes in crowbar-core:
- Update to version 5.0+git.1600432272.b3ad722f0:
  * provisioner: check for client_user (SOC-11389)
  * upgrade: Allow transition from crowbar_upgrade to reboot (trivial)

- Update to version 5.0+git.1600352887.1e23b8015:
  * Ignore CVE-2020-15169 (SOC-11391)

- Update to version 5.0+git.1594898401.caf0b325c:
  * crowbar: Also add access to /restricted/ in SSL vhost (SOC-11352)

- Update to version 5.0+git.1593779118.8362c57e5:
  * crowbar: Allow hardware-installing -&gt; discovering transition (noref)
  * crowbar: Add Restricted controller with API for restricted clients (bsc#1117080)
  * crowbar: Add complete list of states to Crowbar::State (noref)
  * provisioner: Remove the need for /updates/parse_node_data (noref)
  * crowbar: Create helper module to validate states (noref)
  * provisioner: Use new restricted API (bsc#1117080)
  * provisioner: Do not read /etc/crowbar.install.key from crowbar_joi (bsc#1117080)
  * provisioner: Remove use of privileged user for Windows machine (bsc#1117080)
  * provisioner: Use restricted client during provisioning (bsc#1117080)
  * provisioner: Use restricted client for crowbar_register (bsc#1117080)
  * provisioner: Drop /etc/crowbar.install.key bits from autoyast prof (bsc#1117080)
  * Avoid hardcoding machine-install user (bsc#1117080)
  * crowbar: Restrict admin access (bsc#1117080)

Changes in crowbar-openstack:
- Update to version 5.0+git.1599037158.5c4d07480:
  * horizon: Update configuration for Grafana 5.x

Changes in documentation-suse-openstack-cloud:
- Update to version 8.20201007:
  * reveresed step8 and 9 in PTF installation (SOC-10616)
  * Modified the PTF install instructions as per the (SOC-10616)

- Update to version 8.20200904:
  * Clarify reboot instructions during update workflow (SOC-11386)

- Update to version 8.20200921:
  * replacd postgreSQL to MariaDB as per comments4 and 5 in ticket (SOC-11000)

- Update to version 8.20200424:
  * Update ESX documentation for DVS creation (bsc#1142121)
  * Fix table issues

Changes in grafana:
- BuildRequire go1.14 explicitly 

- Add recompress source service
- Add go_modules source service to create vendor.tar.gz
  containing 3rd party go modules.
- Adjust spec to work for Grafana-6.7.4
- Adjust Makefile to work for Grafana-6.7.4
- Remove CVE-2019-15043.patch (merged upstream)
- Remove CVE-2020-13379.patch (merged upstream)
- Remove 0001-fix-XSS-vulnerabilities-in-dashboard-links.patch (merged upstream)
- Remove 0002-CVE-2020-12052-bsc1170657-XSS-annotation-popup-vulnerability.patch
  (merged upstream)
- Remove systemd-notification.patch (merged upstream)
- Update to version 6.7.4 (bsc#1172450, CVE-2018-18623,
  CVE-2018-18624, CVE-2018-18625, bsc#1174583, CVE-2020-11110)
  * Security: Urgent security fix for stored XSS
- Update to version 6.7.3
  * Admin: Fix Synced via LDAP message for non-LDAP external users. [#23477]
  * Alerting: Fix notifications for alerts with empty message in Google
    Hangouts notifier. [#23559]
  * AuthProxy: Fix bug where long username could not be cached. [#22926]
  * Dashboard: Fix saving dashboard when editing raw dashboard JSON model.
    [#23314]
  * Dashboard: Try to parse 8 and 15 digit numbers as timestamps if parsing of
    time range as date fails. [#21694]
  * DashboardListPanel: Fix problem with empty panel after going into edit
    mode (General folder filter being automatically added) . [#23426]
  * Data source: Handle datasource withCredentials option properly. [#23380]
  * Security: Fix annotation popup XSS vulnerability [#23813]
  * Security: Fix XSS vulnerability in table panel [#23816]
  * Server: Exit Grafana with status code 0 if no error. [#23312]
  * TablePanel: Fix XSS issue in header column rename (backport). [#23814]
  * Variables: Fix error when setting adhoc variable values. [#23580]
- Update to version 6.7.2
  * BackendSrv: Adds config to response to fix issue for external plugins that
    used this property . [#23032]
  * Dashboard: Fix issue with saving new dashboard after changing title .
    [#23104]
  * DataLinks: make sure we use the correct datapoint when dataset contains
    null value.. [#22981]
  * Plugins: Fix issue for plugins that imported dateMath util . [#23069]
  * Security: Fix for dashboard snapshot original dashboard link could contain
    XSS vulnerability in url. [#23254]
  * Variables: Fix issue with too many queries being issued for nested
    template variables after value change. [#23220]
  * Plugins: Expose promiseToDigest. [#23249]
  * Reporting: Fix issue updating a report created by someone else
    (Enterprise)
- Update to version 6.7.1
  * Azure: Fix dropdowns not showing current value. [#22914]
  * BackendSrv: only add content-type on POST, PUT requests. [#22910]
  * Panels: Fix size issue with panel internal size when exiting panel edit
    mode. [#22912]
  * Reporting: fixes migrations compatibility with mysql (Enterprise)
  * Reporting: Reduce default concurrency limit to 4 (Enterprise)
- Update to version 6.7.0
  * AzureMonitor: support workspaces function for template variables. [#22882]
  * SQLStore: Add migration for adding index on annotation.alert_id. [#22876]
  * TablePanel: Enable new units picker . [#22833]
  * AngularPanels: Fix inner height calculation for angular panels. [#22796]
  * BackendSrv: makes sure provided headers are correctly recognized and set. [#22778]
  * Forms: Fix input suffix position (caret-down in Select) . [#22780]
  * Graphite: Fix issue with query editor and next select metric now showing
    after selecting metric node [#22856]
  * Rich History: UX adjustments and fixes. [#22729]
  * Slack: Removed _Mention_ setting and instead introduce _Mention Users_,
    _Mention Groups_, and _Mention Channel_.
  * Alerting: Reverts the behavior of `diff` and `percent_diff` to not always
    be absolute.
  * API: Include IP address when logging request error. [#21596]
  * Alerting: Support passing tags to Pagerduty and allow notification on
    specific event categories [#21335]
  * Chore: Remove angular dependency from backendSrv. [#20999]
  * CloudWatch: Surround dimension names with double quotes. [#22222]
  * CloudWatch: updated metrics and dimensions for Athena, DocDB, and
    Route53Resolver. [#22604]
  * Cloudwatch: add Usage Metrics. [#22179]
  * Dashboard: Adds support for a global minimum dashboard refresh interval.
    [#19416]
  * DatasourceEditor: Add UI to edit custom HTTP headers. [#17846]
    Elastic: To get fields, start with today's index and go backwards. [#22318]
  * Explore: Rich history. [#22570]
  * Graph: canvas's Stroke is executed after loop. [#22610]
  * Graphite: Don't issue empty 'select metric' queries. [#22699]
  * Image Rendering: Store render key in remote cache to enable renderer to
    callback to public/load balancer URL when running in HA mode. [#22031]
  * LDAP: Add fallback to search_base_dns if group_search_base_dns is
    undefined [#21263]
  * OAuth: Implement Azure AD provide. [#20030]
  * Prometheus: Implement region annotation. [#22225]
  * Prometheus: make \$\_\_range more precise. [#21722]
  * Prometheus: Do not show rate hint when increase function is used in query.
    [#21955]
  * Stackdriver: Project selector. [#22447]
  * TablePanel: display multi-line text. [#20210]
  * Templating: Add new global built-in variables. [#21790]
  * Reporting: add concurrent render limit to settings (Enterprise)
  * Reporting: Add rendering timeout in settings (Enterprise)
  * API: Fix redirect issues. [#22285]
  * Alerting: Don't include image_url field with Slack message if empty.
    [#22372]
  * Alerting: Fix bad background color for default notifications in alert tab
    . [#22660]
  * Annotations: In table panel when setting transform to annotation, they will
    now show up right away without a manual refresh. [#22323]
  * Azure Monitor: Fix app insights source to allow for new timeFrom and
    timeTo. [#21879]
  * BackendSrv: Fix POST body for form data. [#21714]
  * CloudWatch: Credentials cache invalidation fix. [#22473]
    CloudWatch: Expand alias variables when query yields no result [#22695]
  * Dashboard: Fix bug with NaN in alerting. [#22053]
  * Explore: Fix display of multiline logs in log panel and explore. [#22057]
  * Heatmap: Legend color range is incorrect when using custom min/max
    [#21748]
  * Security: Fix XSS issue in dashboard history diff. [#22680]
  * StatPanel: Fix base color being used for null values. [#22646]
- Update to version 6.6.2
  * Data proxy: Log proxy errors using Grafana logger. [#22174]
  * Metrics: Add gauge for requests currently in flight. [#22168]
  * @grafana/ui: Fix displaying of bars in React Graph. [#21968]
  * API: Fix redirect issue when configured to use a subpath. [#21652]
  * API: Improve recovery middleware when response already been written [#22256]
  * Auth: Don't rotate auth token when requests are cancelled by client [#22106]
  * Elasticsearch: Fix auto interval for date histogram in explore logs mode. [#21937]
  * Image Rendering: Fix PhantomJS compatibility with es2016 node dependencies. [#21677]
  * Links: Assure base url when single stat, panel and data links are built. [#21956]
  * Loki, Prometheus: Fix PromQL and LogQL syntax highlighting. [#21944]
  * OAuth: Enforce auto_assign_org_id setting when role mapping enabled using
    Generic OAuth. [#22268]
  * Prometheus: Updates explore query editor to prevent it from throwing error
    on edit. [#21605]
  * Server: Reorder cipher suites for better security. [#22101]
  * TimePicker: fixing weird behavior with calendar when switching between
    months/years. [#22253]
- Update to version 6.6.1
  * Annotations: Change indices and rewrites annotation find query to improve
    database query performance. [#21915]
  * Azure Monitor: Fix Application Insights API key field to allow input. [#21738]
  * BarGauge: Fix so we properly display the 'no result' value when query
    returns empty result. [#21791]
  * Datasource: Show access (Browser/Server) select on the Prometheus
    datasource. [#21833]
  * DatasourceSettings: Fix issue navigating away from data source settings
    page. [#21841]
  * Graph Panel: Fix typo in thresholds form. [#21903]
  * Graphite: Fix issue with functions with multiple required params and no
    defaults [#21814]
  * Image Rendering: Fix render of graph panel legend aligned to the right
    using Grafana image renderer plugin/service. [#21854]
  * Metrics: Adds back missing summary quantiles. [#21858]
  * OpenTSDB: Adds back missing ngInject to make it work again. [#21796]
  * Plugins: Fix routing in app plugin pages. [#21847]
  * Prometheus: Fix default step value for annotation query. [#21934]
  * Quota: Makes LDAP + Quota work for the first login of a new user. [#21949]
  * StatPanels: Fix change from singlestat to Gauge / BarGauge / Stat where
    default min &amp; max (0, 100) was copied . [#21820]
  * TimePicker: Should display in kiosk mode. [#21816]
  * grafana/toolkit: Fix failing linter when there were lint issues. [#21849]
- Update to version 6.6.0
  * CloudWatch: Add DynamoDB Accelerator (DAX) metrics &amp; dimensions. [#21644]
  * CloudWatch: Auto period snap to next higher period. [#21659]
  * Template variables: Add error for failed query variable on time range
    update. [#21731]
  * XSS: Sanitize column link. [#21735]
  * Elasticsearch: Fix adhoc variable filtering for logs query. [#21346]
  * Explore: Fix colors for log level when level value is capitalised. [#21646]
  * Explore: Fix context view in logs, where some rows may have been filtered
    out. [#21729]
    Loki: Fix Loki with repeated panels and interpolation for Explore. [#21685]
  * SQLStore: Fix PostgreSQL failure to create organisation for first time. [#21648]
  * PagerDuty: Change `payload.custom_details` field in PagerDuty notification
    to be a JSON object instead of a string.
  * Security: The `[security]` setting `cookie_samesite` configured to `none`
    now renders cookies with `SameSite=None` attribute.
  * Graphite: Add Metrictank dashboard to Graphite datasource
  * Admin: Show name of user in users table view. [#18108]
  * Alerting: Add configurable severity support for PagerDuty notifier. [#19425]
  * Alerting: Add more information to webhook notifications. [#20420]
  * Alerting: Add support for sending tags in OpsGenie notifier. [#20810]
  * Alerting: Added fallbackText to Google Chat notifier. [#21464]
  * Alerting: Adds support for sending a single email to all recipients in
    email notifier. [#21091]
  * Alerting: Enable setting of OpsGenie priority via a tag. [#21298]
  * Alerting: Use fully qualified status emoji in Threema notifier. [#21305]
  * Alerting: new min_interval_seconds option to enforce a minimum evaluation
    frequency. [#21188]
  * CloudWatch: Calculate period based on time range. [#21471]
  * CloudWatch: Display partial result in graph when max DP/call limit is
    reached. [#21533]
  * CloudWatch: ECS/ContainerInsights metrics support. [#21125]
  * CloudWatch: Upgrade aws-sdk-go. [#20510]
  * DataLinks: allow using values from other fields in the same row (cells). [#21478]
  * Editor: Ignore closing brace when it was added by editor. [#21172]
  * Explore: Context tooltip to copy labels and values from graph. [#21405]
  * Explore: Log message line wrapping options for logs. [#20360]
  * Forms: introduce RadioButtonGroup. [#20828]
  * Frontend: Changes in Redux location should not strip subpath from location
    url. [#20161]
  * Graph: Add fill gradient option to series override line fill. [#20941]
  * Graphite: Add metrictank dashboard to Graphite datasource. [#20776]
  * Graphite: Do not change query when opening the query editor and there is no
    data. [#21588]
  * Gravatar: Use HTTPS by default. [#20964]
  * Loki: Support for template variable queries. [#20697]
  * NewsPanel: Add news as a builtin panel. [#21128]
  * OAuth: Removes send_client_credentials_via_post setting. [#20044]
  * OpenTSDB: Adding lookup limit to OpenTSDB datasource settings. [#20647]
  * Postgres/MySQL/MSSQL: Adds support for region annotations. [#20752]
  * Prometheus: Field to specify step in Explore. [#20195]
  * Prometheus: User metrics metadata to inform query hints. [#21304]
  * Renderer: Add user-agent to remote rendering service requests. [#20956]
  * Security: Add disabled option for cookie samesite attribute. [#21472]
  * Stackdriver: Support meta labels. [#21373]
  * TablePanel, GraphPanel: Exclude hidden columns from CSV. [#19925]
  * Templating: Update variables on location changed. [#21480]
  * Tracing: Support configuring Jaeger client from environment. [#21103]
  * Units: Add currency and energy units. [#20428]
  * Units: Support dynamic count and currency units. [#21279]
  * grafana/toolkit: Add option to override webpack config. [#20872]
  * grafana/ui: ConfirmModal component. [#20965]
  * grafana/ui: Create Tabs component. [#21328]
  * grafana/ui: New table component. [#20991]
  * grafana/ui: New updated time picker. [#20931]
  * White-labeling: Makes it possible to customize the footer and login
    background (Enterprise)
  * API: Optionally list expired API keys. [#20468]
  * Alerting: Fix custom_details to be a JSON object instead of a string in
    PagerDuty notifier. [#21150]
  * Alerting: Fix image rendering and uploading timeout preventing to send
    alert notifications. [#21536]
  * Alerting: Fix panic in dingding notifier. [#20378]
  * Alerting: Fix template query validation logic. [#20721]
  * Alerting: If no permission to clear history, keep the historical data. [#19007]
  * Alerting: Unpausing a non-paused alert rule should not change status to
    Unknown. [#21375]
  * Api: Fix returned message when enabling, disabling and deleting a
    non-existing user. [#21391]
  * Auth: Rotate auth tokens at the end of requests. [#21347]
  * Azure Monitor: Fix error when using azure monitor credentials with log
    analytics and non-default cloud. [#21032]
  * CLI: Return error and aborts when plugin file extraction fails. [#20849]
  * CloudWatch: Multi-valued template variable dimension alias fix. [#21541]
  * Dashboard: Disable draggable panels on small devices. [#20629]
  * DataLinks: Links with \${\_\_value.time} do not work when clicking on first
    result. [#20019]
  * Explore: Fix showing of results in selected timezone (UTC/local). [#20812]
  * Explore: Fix timepicker when browsing back after switching datasource. [#21454]
  * Explore: Sync timepicker and logs after live-tailing stops. [#20979]
  * Graph: Fix when clicking a plot on a touch device we won't display the
    annotation menu. [#21479]
  * OAuth: Fix role mapping from id token. [#20300]
  * Plugins: Add appSubUrl string to config pages. [#21414]
  * Provisioning: Start provision dashboards after Grafana server have started. [#21564]
  * Render: Use https as protocol when rendering if HTTP2 enabled. [#21600]
  * Security: Use same cookie settings for all cookies. [#19787]
  * Singlestat: Support empty value map texts. [#20952]
  * Units: Custom suffix and prefix units can now be specified, for example
    custom currency &amp; SI &amp; time formats. [#20763]
  * grafana/ui: Do not build grafana/ui in strict mode as it depends on
    non-strict libs. [#21319]
- Update to version 6.5.3
  * API: Validate redirect_to cookie has valid (Grafana) url. [#21057]
  * AdHocFilter: Shows SubMenu when filtering directly from table. [#21017]
  * Cloudwatch: Fix crash when switching from cloudwatch data source. [#21376]
  * DataLinks: Sanitize data/panel link URLs. [#21140]
  * Elastic: Fix multiselect variable interpolation for logs. [#20894]
  * Prometheus: allow user to change HTTP Method in config settings. [#21055]
  * Prometheus: Prevents validation of inputs when clicking in them without
    changing the value. [#21059]
  * Rendering: Fix panel PNG rendering when using sub url and
    serve_from_sub_path = true. [#21306]
  * Table: Matches column names with unescaped regex characters. [#21164]
- Update to version 6.5.2
  * Alerting: Improve alert threshold handle dragging behavior. [#20922]
  * AngularPanels: Fix loading spinner being stuck in some rare cases. [#20878]
  * CloudWatch: Fix query editor does not render in Explore. [#20909]
  * CloudWatch: Remove illegal character escaping in inferred expressions. [#20915]
  * CloudWatch: Remove template variable error message. [#20864]
  * CloudWatch: Use datasource template variable in curated dashboards. [#20917]
  * Elasticsearch: Set default port to 9200 in ConfigEditor. [#20948]
  * Gauge/BarGauge: Added support for value mapping of 'no data'-state to
    text/value. [#20842]
  * Graph: Prevent tooltip from being displayed outside of window. [#20874]
  * Graphite: Fix error with annotation metric queries. [#20857]
  * Login: Fix fatal error when navigating from reset password page. [#20747]
  * MixedDatasources: Do not filter out all mixed data sources in add mixed
    query dropdown. [#20990]
  * Prometheus: Fix caching for default labels request. [#20718]
  * Prometheus: Run default labels query only once. [#20898]
  * Security: Fix invite link still accessible after completion or revocation. [#20863]
  * Server: Fail when unable to create log directory. [#20804]
  * TeamPicker: Increase size limit from 10 to 100. [#20882]
  * Units: Remove SI prefix symbol from new milli/microSievert(/h) units. [#20650]
- Update to version 6.5.1
  * CloudWatch: Region template query fix. [#20661]
  * CloudWatch: Fix annotations query editor loading. [#20687]
  * Panel: Fix undefined services/dependencies in plugins without
    `/@ngInject*/`. [#20696]
  * Server: Fix failure to start with 'bind: address already in use' when using
    socket as protocol. [#20679]
  * Stats: Fix active admins/editors/viewers stats are counted more than once
    if the user is part of more than one org. [#20711]
- Update to version 6.5.0
  * CloudWatch: Add curated dashboards for most popular amazon services. [#20486]
  * CloudWatch: Enable Min time interval. [#20260]
  * Explore: UI improvements for log details. [#20485]
  * Server: Improve grafana-server diagnostics configuration for profiling and
    tracing. [#20593]
  * BarGauge/Gauge: Add back missing title option field display options. [#20616]
  * CloudWatch: Fix high CPU load. [#20579]
  * CloudWatch: Fix high resolution mode without expression. [#20459]
  * CloudWatch: Make sure period variable is being interpreted correctly. [#20447]
  * CloudWatch: Remove HighResolution toggle since it's not being used. [#20440]
  * Cloudwatch: Fix LaunchTime attribute tag bug. [#20237]
  * Data links: Fix URL field turns read-only for graph panels. [#20381]
  * Explore: Keep logQL filters when selecting labels in log row details. [#20570]
  * MySQL: Fix TLS auth settings in config page. [#20501]
  * Provisioning: Fix unmarshaling nested jsonData values. [#20399]
  * Server: Should fail when server is unable to bind port. [#20409]
  * Templating: Prevents crash when \$\_\_searchFilter is not a string. [#20526]
  * TextPanel: Fix issue with template variable value not properly html
    escaped [#20588]
  * TimePicker: Should update after location change. [#20466]
  * CloudWatch: use GetMetricsData API for all queries
  * CloudWatch: The GetMetricData API does not return metric unit, so unit auto
    detection in panels is no longer supported.
  * CloudWatch: The `HighRes` switch has been removed from the query editor.
  * API: Add `createdAt` and `updatedAt` to api/users/lookup. [#19496]
  * API: Add createdAt field to /api/users/:id. [#19475]
  * Admin: Adds setting to disable creating initial admin user. [#19505]
  * Alerting: Include alert_state in Kafka notifier payload. [#20099]
  * AuthProxy: Can now login with auth proxy and get a login token. [#20175]
  * AuthProxy: replaces setting ldap_sync_ttl with sync_ttl. [#20191]
  * AzureMonitor: Alerting for Azure Application Insights. [#19381]
  * Build: Upgrade to Go 1.13. [#19502]
  * CLI: Reduce memory usage for plugin installation. [#19639]
  * CloudWatch: Add ap-east-1 to hard-coded region lists. [#19523]
  * CloudWatch: ContainerInsights metrics support. [#18971]
  * CloudWatch: Support dynamic queries using dimension wildcards [#20058]
  * CloudWatch: Stop using GetMetricStatistics and use GetMetricData for all
    time series requests [#20057]
  * CloudWatch: Convert query editor from Angular to React [#19880]
  * CloudWatch: Convert config editor from Angular to React [#19881]
  * CloudWatch: Improved error handling when throttling occurs [#20348]
  * CloudWatch: Deep linking from Grafana panel to CloudWatch console [#20279]
  * CloudWatch: Add Grafana user agent to GMD calls [#20277]
  * Dashboard: Allows the d-solo route to be used without slug. [#19640]
  * Elasticsearch: Adds support for region annotations. [#17602]
  * Explore: Add custom DataLinks on datasource level (like tracing links). [#20060]
  * Explore: Add functionality to show/hide query row results. [#19794]
  * Explore: Synchronise time ranges in split mode. [#19274]
  * Explore: UI change for log row details . [#20034]
  * Frontend: Migrate DataSource HTTP Settings to React. [#19452]
  * Frontend: Show browser not supported notification. [#19904]
  * Graph: Added series override option to have hidden series be persisted on
    save. [#20124]
  * Graphite: Add Metrictank option to settings to view Metrictank request
    processing info in new inspect feature. [#20138]
  * LDAP: Enable single user sync. [#19446]
  * LDAP: Last org admin can login but wont be removed. [#20326]
  * LDAP: Support env variable expressions in ldap.toml file. [#20173]
  * OAuth: Generic OAuth role mapping support. [#17149]
  * Prometheus: Custom query parameters string for Thanos downsampling. [#19121]
  * Provisioning: Allow saving of provisioned dashboards. [#19820]
  * Security: Minor XSS issue resolved by angularjs upgrade from 1.6.6 -&gt;
    1.6.9. [#19849]
  * TablePanel: Prevents crash when data contains mixed data formats. [#20202]
  * Templating: Introduces \$\_\_searchFilter to Query Variables. [#19858]
  * Templating: Made default template variable query editor field a textarea
    with automatic height. [#20288]
  * Units: Add milli/microSievert, milli/microSievert/h and pixels. [#20144]
  * Units: Added mega ampere and watt-hour per kg. [#19922]
  * Enterprise: Enterprise without a license behaves like OSS (Enterprise)
  * API: Added dashboardId and slug in response to dashboard import api. [#19692]
  * API: Fix logging of dynamic listening port. [#19644]
  * BarGauge: Fix so that default thresholds not keeps resetting. [#20190]
  * CloudWatch: Fix incorrect casing of Redshift dimension entry for service
    class and stage. [#19897]
  * CloudWatch: Fixing AWS Kafka dimension names. [#19986]
  * CloudWatch: Metric math broken when using multi template variables [#18337]
  * CloudWatch: Graphs with multiple multi-value dimension variables don't work [#17949]
  * CloudWatch: Variables' values surrounded with braces in request sent to AWS [#14451]
  * CloudWatch: Cloudwatch Query for a list of instances for which data is
    available in the selected time interval [#12784]
  * CloudWatch: Dimension's positioning/order should be stored in the json
    dashboard [#11062]
  * CloudWatch: Batch CloudWatch API call support in backend [#7991]
  * ColorPicker: Fix issue with ColorPicker disappearing too quickly. [#20289]
  * Datasource: Add custom headers on alerting queries. [#19508]
    plugins in alpine. [#20214]
  * Elasticsearch: Fix template variables interpolation when redirecting to
    Explore. [#20314]
  * Elasticsearch: Support rendering in logs panel. [#20229]
  * Explore: Expand template variables when redirecting from dashboard panel. [#19582]
  * OAuth: Make the login button display name of custom OAuth provider. [#20209]
  * ReactPanels: Adds Explore menu item. [#20236]
  * Team Sync: Fix URL encode Group IDs for external team sync. [#20280]
- Update to version 6.4.5
  * CloudWatch: Fix high CPU load [#20579]
- Update to version 6.4.4
  * MySQL: Fix encoding in connection string [#20192]
  * DataLinks: Fix blur issues. [#19883]
  * LDAP: try all LDAP servers even if one returns a connection error. [#20077]
  * LDAP: No longer shows incorrectly matching groups based on role in debug
    page. [#20018]
  * Singlestat: Fix no data / null value mapping . [#19951]
- Update to version 6.4.3
  * Alerting: All notification channels should send even if one fails to send. [#19807]
  * AzureMonitor: Fix slate interference with dropdowns. [#19799]
  * ContextMenu: make ContextMenu positioning aware of the viewport width. [#19699]
  * DataLinks: Fix context menu not showing in singlestat-ish visualisations. [#19809]
  * DataLinks: Fix url field not releasing focus. [#19804]
  * Datasource: Fix issue where clicking outside of some query editors required
    2 clicks. [#19822]
  * Panels: Fix default tab for visualizations without Queries Tab. [#19803]
  * Singlestat: Fix issue with mapping null to text. [#19689]
  * @grafana/toolkit: Don't fail plugin creation when git user.name config is
    not set. [#19821]
  * @grafana/toolkit: TSLint line number off by 1. [#19782]
- Update to version  6.4.2
  * CloudWatch: Changes incorrect dimension wmlid to wlmid . [#19679]
  * Grafana Image Renderer: Fix plugin page. [#19664]
  * Graph: Fix auto decimals logic for y axis ticks that results in too many
    decimals for high values. [#19618]
  * Graph: Switching to series mode should re-render graph. [#19623]
  * Loki: Fix autocomplete on label values. [#19579]
  * Loki: Removes live option for logs panel. [#19533]
  * Profile: Fix issue with user profile not showing more than sessions
    sessions in some cases. [#19578]
  * Prometheus: Always sort results in Panel by query order. [#19597]
  * Show SAML login button if SAML is enabled. [#19591]
  * SingleStat: Fix $__name postfix/prefix usage. [#19687]
  * Table: Proper handling of json data with dataframes. [#19596]
  * Units: Fix wrong id for Terabits/sec. [#19611]
- Update to version 6.4.1
  * Provisioning: Fix issue where empty nested keys in YAML provisioning
    caused server crash, [#19547]
- Update to version 6.4.0
  * Build: Upgrade go to 1.12.10. [#19499]
  * DataLinks: Suggestions menu improvements. [#19396]
  * Explore: Take root_url setting into account when redirecting from dashboard
    to explore. [#19447]
  * Explore: Update broken link to logql docs. [#19510]
  * Logs: Adds Logs Panel as a visualization. [#19504]
  * Reporting: Generate and email PDF reports based on Dashboards (Enterprise)
  * CLI: Fix version selection for plugin install. [#19498]
  * Graph: Fix minor issue with series override color picker and custom color. [#19516]
  * Splunk plugin needs to be updated when upgrading from 6.3 to 6.4
  * Azure Monitor: Remove support for cross resource queries (#19115)'. [#19346]
  * Graphite: Time range expansion reduced from 1 minute to 1 second. [#19246]
  * grafana/toolkit: Add plugin creation task. [#19207]
  * Alerting: Prevents creating alerts from unsupported queries. [#19250]
  * Alerting: Truncate PagerDuty summary when greater than 1024 characters. [#18730]
  * Cloudwatch: Fix autocomplete for Gamelift dimensions. [#19146]
  * Dashboard: Fix export for sharing when panels use default data source. [#19315]
  * Database: Rewrite system statistics query to perform better. [#19178]
  * Gauge/BarGauge: Fix issue with [object Object] in titles . [#19217]
  * MSSQL: Revert usage of new connectionstring format introduced by #18384. [#19203]
  * Multi-LDAP: Do not fail-fast on invalid credentials. [#19261]
  * MySQL, Postgres, MSSQL: Fix validating query with template variables in
    alert. [#19237]
  * MySQL, Postgres: Update raw sql when query builder updates. [#19209]
  * MySQL: Limit datasource error details returned from the backend. [#19373]
  * Reporting: Created scheduled PDF reports for any dashboard (Enterprise).
  * API: Readonly datasources should not be created via the API. [#19006]
  * Alerting: Include configured AlertRuleTags in Webhooks notifier. [#18233]
  * Annotations: Add annotations support to Loki. [#18949]
  * Annotations: Use a single row to represent a region. [#17673]
  * Auth: Allow inviting existing users when login form is disabled. [#19048]
  * Azure Monitor: Add support for cross resource queries. [#19115]
  * CLI: Allow installing custom binary plugins. [#17551]
  * Dashboard: Adds Logs Panel (alpha) as visualization option for Dashboards. [#18641]
  * Dashboard: Reuse query results between panels . [#16660]
  * Dashboard: Set time to to 23:59:59 when setting To time using calendar. [#18595]
  * DataLinks: Add DataLinks support to Gauge, BarGauge and stat panel. [#18605]
  * DataLinks: Enable access to labels &amp; field names. [#18918]
  * DataLinks: Enable multiple data links per panel. [#18434]
  * Elasticsearch: allow templating queries to order by doc_count. [#18870]
  * Explore: Add throttling when doing live queries. [#19085]
  * Explore: Adds ability to go back to dashboard, optionally with query
    changes. [#17982]
  * Explore: Reduce default time range to last hour. [#18212]
  * Gauge/BarGauge: Support decimals for min/max. [#18368]
  * Graph: New series override transform constant that renders a single point
    as a line across the whole graph. [#19102]
  * Image rendering: Add deprecation warning when PhantomJS is used for
    rendering images. [#18933]
  * InfluxDB: Enable interpolation within ad-hoc filter values. [#18077]
  * LDAP: Allow an user to be synchronized against LDAP. [#18976]
  * Ldap: Add ldap debug page. [#18759]
  * Loki: Remove prefetching of default label values. [#18213]
  * Metrics: Add failed alert notifications metric. [#18089]
  * OAuth: Support JMES path lookup when retrieving user email. [#14683]
  * OAuth: return GitLab groups as a part of user info (enable team sync). [#18388]
  * Panels: Add unit for electrical charge - ampere-hour. [#18950]
  * Plugin: AzureMonitor - Reapply MetricNamespace support. [#17282]
  * Plugins: better warning when plugins fail to load. [#18671]
  * Postgres: Add support for scram sha 256 authentication. [#18397]
  * RemoteCache: Support SSL with Redis. [#18511]
  * SingleStat: The gauge option in now disabled/hidden (unless it's an old
    panel with it already enabled) . [#18610]
  * Stackdriver: Add extra alignment period options. [#18909]
  * Units: Add South African Rand (ZAR) to currencies. [#18893]
  * Units: Adding T,P,E,Z,and Y bytes. [#18706]
  * Alerting: Notification is sent when state changes from no_data to ok. [#18920]
  * Alerting: fix duplicate alert states when the alert fails to save to the
    database. [#18216]
  * Alerting: fix response popover prompt when add notification channels. [#18967]
  * CloudWatch: Fix alerting for queries with Id (using GetMetricData). [#17899]
  * Explore: Fix auto completion on label values for Loki. [#18988]
  * Explore: Fix crash using back button with a zoomed in graph. [#19122]
  * Explore: only run queries in Explore if Graph/Table is shown. [#19000]
  * MSSQL: Change connectionstring to URL format to fix using passwords with
    semicolon. [#18384]
  * MSSQL: Fix memory leak when debug enabled. [#19049]
  * Provisioning: Allow escaping literal '$' with '$\$' in configs to avoid
    interpolation. [#18045]
  * TimePicker: Fix hiding time picker dropdown in FireFox. [#19154]
  * Various breaking changes in the annotations HTTP API for region annotations.
- Update to version 6.3.7
  * CloudWatch: Fix high CPU load [#20579]
- Update to version 6.3.6
  * Metrics: Adds setting for turning off total stats metrics. [#19142]
  * Database: Rewrite system statistics query to perform better. [#19178]
  * Explore: Fix error when switching from prometheus to loki data sources. [#18599]
- Update to version 6.3.5
  * Dashboard: Fix dashboards init failed loading error for dashboards with
    panel links that had missing properties. [#18786]
  * Editor: Fix issue where only entire lines were being copied. [#18806]
  * Explore: Fix query field layout in splitted view for Safari browsers. [#18654]
  * LDAP: multildap + ldap integration. [#18588]
  * Profile/UserAdmin: Fix for user agent parser crashes grafana-server on
    32-bit builds. [#18788]
  * Prometheus: Prevents panel editor crash when switching to Prometheus data
    source. [#18616]
  * Prometheus: Changes brace-insertion behavior to be less annoying. [#18698]
- Update to version 6.3.4
  * Annotations: Fix failing annotation query when time series query is
    cancelled. [#18532]
  * Auth: Do not set SameSite cookie attribute if cookie_samesite is none. [#18462]
  * DataLinks: Apply scoped variables to data links correctly. [#18454]
  * DataLinks: Respect timezone when displaying datapoint's timestamp in graph
    context menu. [#18461]
  * DataLinks: Use datapoint timestamp correctly when interpolating variables. [#18459]
  * Explore: Fix loading error for empty queries. [#18488]
  * Graph: Fix legend issue clicking on series line icon and issue with
    horizontal scrollbar being visible on windows. [#18563]
  * Graphite: Avoid glob of single-value array variables . [#18420]
  * Prometheus: Fix queries with label_replace remove the \$1 match when
    loading query editor. [#18480]
  * Prometheus: More consistently allows for multi-line queries in editor. [#18362]
  * TimeSeries: Assume values are all numbers. [#18540]
- Update to version 6.3.2
  * Gauge/BarGauge: Fix issue with lost thresholds and an issue loading Gauge
    with avg stat. [#18375]
- Update to version 6.3.1
  * PanelLinks: Fix crash issue with Gauge &amp; Bar Gauge panels with panel links
    (drill down links). [#18430]
- Update to version 6.3.0
  * OAuth: Do not set SameSite OAuth cookie if cookie_samesite is None. [#18392]
  * PanelLinks: Fix render issue when there is no panel description. [#18408]
  * Auth Proxy: Include additional headers as part of the cache key. [#18298]
  * OAuth: Fix 'missing saved state' OAuth login failure due to SameSite cookie
    policy. [#18332]
  * cli: fix for recognizing when in dev mode.. [#18334]
  * Build grafana images consistently. [#18224]
  * Docs: SAML. [#18069]
  * Permissions: Show plugins in nav for non admin users but hide plugin
    configuration. [#18234]
  * TimePicker: Increase max height of quick range dropdown. [#18247]
  * DataLinks: Fix incorrect interpolation of \${\_\_series_name} . [#18251]
  * Loki: Display live tailed logs in correct order in Explore. [#18031]
  * PhantomJS: Fix rendering on Debian Buster. [#18162]
  * TimePicker: Fix style issue for custom range popover. [#18244]
  * Timerange: Fix a bug where custom time ranges didn't respect UTC. [#18248]
  * remote_cache: Fix redis connstr parsing. [#18204]
  * Alerting: Add tags to alert rules. [#10989]
  * Alerting: Attempt to send email notifications to all given email addresses. [#16881]
  * Alerting: Improve alert rule testing. [#16286]
  * Alerting: Support for configuring content field for Discord alert notifier. [#17017]
  * Alertmanager: Replace illegal chars with underscore in label names. [#17002]
  * Auth: Allow expiration of API keys. [#17678]
  * Auth: Return device, os and browser when listing user auth tokens in HTTP
    API. [#17504]
  * Auth: Support list and revoke of user auth tokens in UI. [#17434]
  * AzureMonitor: change clashing built-in Grafana variables/macro names for
    Azure Logs. [#17140]
  * CloudWatch: Made region visible for AWS Cloudwatch Expressions. [#17243]
  * Cloudwatch: Add AWS DocDB metrics. [#17241]
  * Dashboard: Use timezone dashboard setting when exporting to CSV. [#18002]
  * Data links. [#17267]
  * Elasticsearch: Support for visualizing logs in Explore . [#17605]
  * Explore: Adds Live option for supported data sources. [#17062]
  * Explore: Adds orgId to URL for sharing purposes. [#17895]
  * Explore: Adds support for new loki 'start' and 'end' params for labels
    endpoint. [#17512]
  * Explore: Adds support for toggling raw query mode in explore. [#17870]
  * Explore: Allow switching between metrics and logs . [#16959]
  * Explore: Combines the timestamp and local time columns into one. [#17775]
  * Explore: Display log lines context . [#17097]
  * Explore: Don't parse log levels if provided by field or label. [#17180]
  * Explore: Improves performance of Logs element by limiting re-rendering. [#17685]
  * Explore: Support for new LogQL filtering syntax. [#16674]
  * Explore: Use new TimePicker from Grafana/UI. [#17793]
  * Explore: handle newlines in LogRow Highlighter. [#17425]
  * Graph: Added new fill gradient option. [#17528]
  * GraphPanel: Don't sort series when legend table &amp; sort column is not
    visible. [#17095]
  * InfluxDB: Support for visualizing logs in Explore. [#17450]
  * Logging: Login and Logout actions (#17760). [#17883]
  * Logging: Move log package to pkg/infra. [#17023]
  * Metrics: Expose stats about roles as metrics. [#17469]
  * MySQL/Postgres/MSSQL: Add parsing for day, weeks and year intervals in
    macros. [#13086]
  * MySQL: Add support for periodically reloading client certs. [#14892]
  * Plugins: replace dataFormats list with skipDataQuery flag in plugin.json. [#16984]
  * Prometheus: Take timezone into account for step alignment. [#17477]
  * Prometheus: Use overridden panel range for \$\_\_range instead of dashboard
    range. [#17352]
  * Prometheus: added time range filter to series labels query. [#16851]
  * Provisioning: Support folder that doesn't exist yet in dashboard
    provisioning. [#17407]
  * Refresh picker: Handle empty intervals. [#17585]
  * Singlestat: Add y min/max config to singlestat sparklines. [#17527]
  * Snapshot: use given key and deleteKey. [#16876]
  * Templating: Correctly display __text in multi-value variable after page
    reload. [#17840]
  * Templating: Support selecting all filtered values of a multi-value
    variable. [#16873]
  * Tracing: allow propagation with Zipkin headers. [#17009]
  * Users: Disable users removed from LDAP. [#16820]
  * SAML: Add SAML as an authentication option (Enterprise)
  * AddPanel: Fix issue when removing moved add panel widget . [#17659]
  * CLI: Fix encrypt-datasource-passwords fails with sql error. [#18014]
  * Elasticsearch: Fix default max concurrent shard requests. [#17770]
  * Explore: Fix browsing back to dashboard panel. [#17061]
  * Explore: Fix filter by series level in logs graph. [#17798]
  * Explore: Fix issues when loading and both graph/table are collapsed. [#17113]
  * Explore: Fix selection/copy of log lines. [#17121]
  * Fix: Wrap value of multi variable in array when coming from URL. [#16992]
  * Frontend: Fix for Json tree component not working. [#17608]
  * Graphite: Fix for issue with alias function being moved last. [#17791]
  * Graphite: Fix issue with seriesByTag &amp; function with variable param. [#17795]
  * Graphite: use POST for /metrics/find requests. [#17814]
  * HTTP Server: Serve Grafana with a custom URL path prefix. [#17048]
  * InfluxDB: Fix single quotes are not escaped in label value filters. [#17398]
  * Prometheus: Correctly escape '|' literals in interpolated PromQL variables. [#16932]
  * Prometheus: Fix when adding label for metrics which contains colons in
    Explore. [#16760]
  * SinglestatPanel: Remove background color when value turns null. [#17552]
- Update to version 6.2.5
  * Grafana-CLI: Wrapper for `grafana-cli` within RPM/DEB packages and
    config/homepath are now global flags. [#17695]
  * Panel: Fully escape html in drilldown links (was only sanitized before). [#17731]
  * Config: Fix connectionstring for remote_cache in defaults.ini. [#17675]
  * Elasticsearch: Fix empty query (via template variable) should be sent as
    wildcard. [#17488]
  * HTTP-Server: Fix Strict-Transport-Security header. [#17644]
  * TablePanel: fix annotations display. [#17646]
- Update to version 6.2.4
  * Grafana-CLI: Fix receiving flags via command line . [#17617]
  * HTTPServer: Fix X-XSS-Protection header formatting. [#17620]
- Update to version 6.2.3
  * AuthProxy: Optimistic lock pattern for remote cache Set. [#17485]
  * HTTPServer: Options for returning new headers X-Content-Type-Options,
    X-XSS-Protection and Strict-Transport-Security. [#17522]
  * Auth Proxy: Fix non-negative cache TTL. [#17495]
  * Grafana-CLI: Fix receiving configuration flags from the command line. [#17606]
  * OAuth: Fix for wrong user token updated on OAuth refresh in DS proxy. [#17541]
  * remote_cache: Fix redis. [#17483]
- Update to version 6.2.2
  * Security: Prevent CSV formula injection attack when exporting data. [#17363]
  * CloudWatch: Fix error when hiding/disabling queries. [#17283]
  * Database: Fix slow permission query in folder/dashboard search. [#17427]
  * Explore: Fix updating time range before running queries. [#17349]
  * Plugins: Fix plugin config page navigation when using subpath. [#17364]
- Update to version 6.2.1
  * CLI: Add command to migrate all data sources to use encrypted password fields . [#17118]
  * Gauge/BarGauge: Improvements to auto value font size . [#17292]
  * Auth Proxy: Resolve database is locked errors. [#17274]
  * Database: Retry transaction if sqlite returns database is locked error. [#17276]
  * Explore: Fix filtering query by clicked value when a Prometheus Table is
    clicked. [#17083]
  * Singlestat: Fix issue with value placement and line wraps. [#17249]
  * Tech: Update jQuery to 3.4.1 to fix issue on iOS 10 based browsers as well
    as Chrome 53.x. [#17290]
- Update to version 6.2.0
  * BarGauge: Fix for negative min values. [#17192]
  * Gauge/BarGauge: Fix for issues editing min &amp; max options. [#17174]
  * Search: Make only folder name only open search with current folder filter. [#17226]
  * AzureMonitor: Revert to clearing chained dropdowns. [#17212]
  * Data source plugins that process hidden queries need to add a
    'hiddenQueries: true' attribute in plugin.json. [#17124]
  * Plugins: Support templated urls in plugin routes. [#16599]
  * Packaging: New MSI windows installer package\*\*. [#17073]
  * Dashboard: Fix blank dashboard after window resize with panel without
    title. [#16942]
  * Dashboard: Fix lazy loading &amp; expanding collapsed rows on mobile. [#17055]
  * Dashboard: Fix scrolling issues for Edge browser. [#17033]
  * Dashboard: Show refresh button in first kiosk(tv) mode. [#17032]
  * Explore: Fix empty result from data source should render logs container. [#16999]
  * Explore: Filter query by clicked value when clicking in a Prometheus Table [#17083]
  * Explore: Makes it possible to zoom in Explore/Loki/Graph without exception. [#16991]
  * Gauge: Fix orientation issue after switching from BarGauge to Gauge. [#17064]
  * GettingStarted: Fix layout issues in getting started panel. [#16941]
  * InfluxDB: Fix HTTP method should default to GET. [#16949]
  * Panels: Fix alert icon position in panel header. [#17070]
  * Panels: Fix panel error tooltip not showing. [#16993]
  * Plugins: Fix how datemath utils are exposed to plugins. [#16976]
  * Singlestat: fixed centering issue for very small panels. [#16944]
  * Search: Scroll issue in dashboard search in latest Chrome. [#17054]
  * Gauge: Adds background shade to gauge track and improves height usage. [#17019]
  * RemoteCache: Avoid race condition in Set causing error on insert. . [#17082]
  * Admin: Add more stats about roles. [#16667]
  * Alert list panel: Support variables in filters. [#16892]
  * Alerting: Adjust label for send on all alerts to default . [#16554]
  * Alerting: Makes timeouts and retries configurable. [#16259]
  * Alerting: No notification when going from no data to pending. [#16905]
  * Alerting: Pushover alert, support for different sound for OK. [#16525]
  * Auth: Enable retries and transaction for some db calls for auth tokens. [#16785]
  * AzureMonitor: Adds support for multiple subscriptions per data source. [#16922]
  * Bar Gauge: New multi series enabled gauge like panel with horizontal and
    vertical layouts and 3 display modes. [#16918]
  * Build: Upgrades to golang 1.12.4. [#16545]
  * CloudWatch: Update AWS/IoT metric and dimensions. [#16337]
  * Config: Show user-friendly error message instead of stack trace. [#16564]
  * Dashboard: Enable filtering dashboards in search by current folder. [#16790]
  * Dashboard: Lazy load out of view panels . [#15554]
  * DataProxy: Restore Set-Cookie header after proxy request. [#16838]
  * Data Sources: Add pattern validation for time input on data source config
    pages. [#16837]
  * Elasticsearch: Add 7.x version support. [#16646]
  * Explore: Adds reconnect for failing data source. [#16226]
  * Explore: Support user timezone. [#16469]
  * InfluxDB: Add support for POST HTTP verb. [#16690]
  * Loki: Search is now case insensitive. [#15948]
  * OAuth: Update jwt regexp to include `=`. [#16521]
  * Panels: No title will no longer make panel header take up space. [#16884]
  * Prometheus: Adds tracing headers for Prometheus datasource. [#16724]
  * Provisioning: Add API endpoint to reload provisioning configs. [#16579]
  * Provisioning: Do not allow deletion of provisioned dashboards. [#16211]
  * Provisioning: Interpolate env vars in provisioning files. [#16499]
  * Provisioning: Support FolderUid in Dashboard Provisioning Config. [#16559]
  * Security: Add new setting allow_embedding. [#16853]
  * Security: Store data source passwords encrypted in secureJsonData. [#16175]
  * UX: Improve Grafana usage for smaller screens. [#16783]
  * Units: Add angle units, Arc Minutes and Seconds. [#16271]
  * CloudWatch: Fix query order not affecting series ordering &amp; color. [#16408]
  * CloudWatch: Use default alias if there is no alias for metrics. [#16732]
  * Config: Fix bug where timeouts for alerting was not parsed correctly. [#16784]
  * Elasticsearch: Fix view percentiles metric in table without date histogram. [#15686]
  * Explore: Prevents histogram loading from killing Prometheus instance. [#16768]
  * Graph: Allow override decimals to fully override. [#16414]
  * Mixed Data Source: Fix error when one query is disabled. [#16409]
  * Search: Fix search limits and add a page parameter. [#16458]
  * Security: Responses from backend should not be cached. [#16848]
  * Gauge Panel: The suffix / prefix options have been removed from the new
    Gauge Panel (introduced in v6.0). [#16870]
- Update to version 6.1.6
  * Security: Bump jQuery to 3.4.0 . [#16761]
  * Playlist: Fix loading dashboards by tag. [#16727]
- Update to version 6.1.4
  * DataPanel: Added missing built-in interval variables to scopedVars. [#16556]
  * Explore: Adds maxDataPoints to data source query options . [#16513]
  * Explore: Recalculate intervals on run query. [#16510]
  * Heatmap: Fix for empty graph when panel is too narrow (#16378). [#16460]
  * Heatmap: Fix auto decimals when bucket name is not number. [#16609]
  * QueryInspector: Now shows error responses again. [#16514]
- Update to version 6.1.3
  * Graph: Fix auto decimals in legend values for some units like `ms` and
    `s`. [#16455]
  * Graph: Fix png rendering with legend to the right. [#16463]
  * Singlestat: Use decimals when manually specified. [#16451]
  * Fix broken UI switches: Default Data Source switch, Explore Logs switches,
    Gauge option switches. [#16303]
- Update to version 6.1.2
  * Graph: Fix series legend color for hidden series. [#16438]
  * Graph: Fix tooltip highlight on white theme. [#16429]
  * Styles: Fix menu hover highlight border. [#16431]
  * Singlestat Panel: Correctly use the override decimals. [#16413]
- Update to version 6.1.1
  * Graphite: Editing graphite query function now works again. [#16390]
  * Playlist: Kiosk &amp; auto fit panels modes are working normally again . [#16403]

  * QueryEditors: Toggle edit mode now always work on slower computers. [#16394]
- Update to version 6.1.0
  * CloudWatch: Fix for dimension value list when changing dimension key. [#16356]
  * Graphite: Editing function arguments now works again. [#16297]
  * InfluxDB: Fix tag names with periods in alert evaluation. [#16255]
  * PngRendering: Fix for panel height &amp; title centering . [#16351]
  * Templating: Fix for editing query variables. [#16299]
  * Prometheus: adhoc filter support [#8253]
  * Permissions: Editors can become admin for dashboards, folders and teams
    they create. [#15977]
  * Alerting: Don't include non-existing image in MS Teams notifications. [#16116]
  * Api: Invalid org invite code [#10506]
  * Annotations: Fix for native annotations filtered by template variable with
    pipe. [#15515]
  * Dashboard: Fix for time regions spanning across midnight. [#16201]
  * Data Source: Handles nil jsondata field gracefully [#14239]
  * Data Source: Empty user/password was not updated when updating data sources [#15608]
  * Elasticsearch: Fix using template variables in the alias field. [#16229]
  * Elasticsearch: Fix incorrect index pattern padding in alerting queries. [#15892]
  * Explore: Fix for Prometheus autocomplete not working in Firefox. [#16192]
  * Explore: Fix for url does not keep query after browser refresh. [#16189]
  * Gauge: Interpolate scoped variables in repeated gauges [#15739]
  * Graphite: Fix issue with using series ref and series by tag. [#16111]
  * Graphite: Fix variable quoting when variable value is numeric. [#16149]
  * Heatmap: Fix Y-axis tick labels being in wrong order for some Prometheus
    queries. [#15932]
  * Heatmap: Negative values are now displayed correctly in graph &amp; legend. [#15953]
  * Heatmap: legend shows wrong colors for small values [#14019]
  * InfluxDB: Always close request body even for error status codes. [#16207]
  * ManageDashboards: Fix for checkboxes not appearing properly Firefox . [#15981]
  * Playlist: Leaving playlist now always stops playlist . [#15791]
  * Prometheus: fixes regex ad-hoc filters variables with wildcards. [#16234]
  * TablePanel: Column color style now works even after removing columns. [#16227]
  * TablePanel: Fix for white text on white background when value is null. [#16199]
- Update to version 6.0.2
  * Alerting: Fix issue with AlertList panel links resulting in panel not
    found errors. [#15975]
  * Dashboard: Improved error handling when rendering dashboard panels. [#15970]
  * LDAP: Fix allow anonymous server bind for ldap search. [#15872]
  * Discord: Fix discord notifier so it doesn't crash when there are no image
    generated. [#15833]
  * Panel Edit: Prevent search in VizPicker from stealing focus. [#15802]
  * Data Source admin: Fix url of back button in data source edit page, when
    root_url configured. [#15759]
- Update to version 6.0.1
  * Metrics: Fix broken usagestats metrics for /metrics [#15651]
  * Dashboard: append &amp;kiosk to the url in Kiosk mode [#15765]
  * Dashboard: respect header in kiosk=tv mode with autofitpanels [#15650]
  * Image rendering: Fix image rendering issue for dashboards with auto
    refresh. [#15818]
  * Dashboard: Fix only users that can edit a dashboard should be able to
    update panel json. [#15805]
  * LDAP: fix allow anonymous initial bind for ldap search. [#15803]
  * UX: ixed scrollbar not visible initially (only after manual scroll). [#15798]
  * Data Source admin TestData [#15793]
  * Dashboard: Fix scrolling issue that caused scroll to be locked to bottom. [#15792]
  * Explore: Viewers with viewers_can_edit should be able to access /explore. [#15787]
  * Security fix: limit access to org admin and alerting pages. [#15761]
  * Panel Edit minInterval changes did not persist [#15757]
  * Teams: Fix bug when getting teams for user. [#15595]
  * Stackdriver: fix for float64 bounds for distribution metrics [#14509]
  * Stackdriver: no reducers available for distribution type [#15179]
- Update to version 6.0.0
  * Dashboard: fixes click after scroll in series override menu [#15621]
  * MySQL: fix mysql query using \_interval_ms variable throws error [#14507]
  * Influxdb: Add support for alerting on InfluxDB queries that use the
    non_negative_difference function [#15415]
  * Alerting: Fix percent_diff calculation when points are nulls [#15443]
  * Alerting: Fix handling of alert urls with true flags [#15454]
  * AzureMonitor: Enable alerting by converting Azure Monitor API to Go [#14623]
  * Security: Fix CSRF Token validation for POSTs [#1441]
  * Internal Metrics Edition has been added to the build_info metric. This will
    break any Graphite queries using this metric. Edition will be a new label
    for the Prometheus metric. [#15363]
  * Gauge: Fix issue with gauge requests being cancelled [#15366]
  * Gauge: Accept decimal inputs for thresholds [#15372]
  * UI: Fix error caused by named colors that are not part of named colors
    palette [#15373]
  * Search: Bug pressing special regexp chars in input fields [#12972]
  * Permissions: No need to have edit permissions to be able to 'Save as' [#13066]
  * Alerting: Adds support for Google Hangouts Chat notifications [#11221]
  * Elasticsearch: Support bucket script pipeline aggregations [#5968]
  * Influxdb: Add support for time zone (`tz`) clause [#10322]
  * Snapshots: Enable deletion of public snapshot [#14109]
  * Provisioning: Provisioning support for alert notifiers [#10487]
  * Explore: A whole new way to do ad-hoc metric queries and exploration. Split
    view in half and compare metrics &amp; logs.
  * Auth: Replace remember me cookie solution for Grafana's builtin, LDAP and
    OAuth authentication with a solution based on short-lived tokens [#15303]
  * Search: Fix for issue with scrolling the 'tags filter' dropdown, fixes [#14486]
  * Prometheus: fix annotation always using 60s step regardless of
    dashboard range [#14795]
  * Annotations: Fix creating annotation when graph panel has no data points
    position the popup outside viewport [#13765]
  * Piechart/Flot: Fix multiple piechart instances with donut bug [#15062]
  * Postgres: Fix default port not added when port not configured [#15189]
  * Alerting: Fix crash bug when alert notifier folders are missing [#15295]
  * Dashboard: Fix save provisioned dashboard modal [#15219]
  * Dashboard: Fix having a long query in prometheus dashboard query editor
  * blocks 30% of the query field when on OSX and having native scrollbars
    [#15122]
  * Explore: Fix issue with wrapping on long queries [#15222]
  * Explore: Fix cut &amp; paste adds newline before and after selection [#15223]
  * Dataproxy: Fix global data source proxy timeout not added to correct http
    client [#15258]
  * Text Panel: The text panel does no longer by default allow unsanitized
    HTML. [#4117]
  * Dashboard: Panel property `minSpan` replaced by `maxPerRow`. Dashboard
  * migration will automatically migrate all dashboard panels using the
    `minSpan` property to the new `maxPerRow` property [#12991]
- Update to version 5.4.3
  * MySQL only update session in mysql database when required [#14540]
  * Alerting Invalid frequency causes division by zero in alert scheduler [#14810]
  * Dashboard Dashboard links do not update when time range changes [#14493]
  * Limits Support more than 1000 data sources per org [#13883]
  * Backend fix signed in user for orgId=0 result should return active org id [#14574]
  * Provisioning Adds orgId to user dto for provisioned dashboards [#14678]
- Update to version 5.4.2
  * Data Source admin: Fix for issue creating new data source when same name
    exists [#14467]
  * OAuth: Fix for oauth auto login setting, can now be set using env variable [#14435]
- Update to version 5.4.1
  * Stackdriver: Fix issue with data proxy and Authorization header [#14262]
  * Units: fixedUnit for Flow:l/min and mL/min [#14294]
  * Logging: Fix for issue where data proxy logged a secret when debug logging
    was enabled, now redacted. [#14319]
  * TSDB: Fix always take dashboard timezone into consideration when handle
    custom time ranges: Add support for alerting on InfluxDB queries that use
    the cumulative_sum function. [#14314]
  * Embedded Graphs: Iframe graph panels should now work as usual. [#14284]
  * Postgres: Improve PostgreSQL Query Editor if using different Schemas, [#14313]
  * Quotas: Fix updating org &amp; user quotas. [#14347]
  * Cloudwatch: Add the AWS/SES Cloudwatch metrics of BounceRate and
    ComplaintRate to auto complete list. [#14401]
  * Dashboard Search: Fix filtering by tag issues.
  * Graph: Fix time region issues, [#14425]
- Update to version 5.4.0
  * Cloudwatch: Fix invalid time range causes segmentation fault [#14150]
  * Cloudwatch: AWS/CodeBuild metrics and dimensions [#14167]
  * MySQL: Fix `$__timeFrom()` and `$__timeTo()` should respect local time zone [#14228]
  * Graph: Fix legend always visible even if configured to be hidden [#14144]
  * Elasticsearch: Fix regression when using data source version 6.0+ and
    alerting [#14175]
  * Alerting: Introduce alert debouncing with the `FOR` setting. [#7886]
  * Alerting: Option to disable OK alert notifications [#12330]
  * Postgres/MySQL/MSSQL: Adds support for configuration of max open/idle
    connections and connection max lifetime. Also, panels with multiple SQL
    queries will now be executed concurrently [#11711]
  * MySQL: Graphical query builder [#13762]
  * MySQL: Support connecting thru Unix socket for MySQL data source [#12342]
  * MSSQL: Add encrypt setting to allow configuration of how data sent between
    client and server are encrypted [#13629]
  * Stackdriver: Not possible to authenticate using GCE metadata server [#13669]
  * Teams: Team preferences (theme, home dashboard, timezone) support [#12550]
  * Graph: Time regions support enabling highlight of weekdays and/or certain
    timespans [#5930]
  * OAuth: Automatic redirect to sign-in with OAuth [#11893]
  * Stackdriver: Template query editor [#13561]
  * Security: Upgrade macaron session package to fix security issue. [#14043]
  * Postgres/MySQL/MSSQL data sources now per default uses `max open
    connections` = `unlimited` (earlier 10), `max idle connections` = `2`
    (earlier 10) and `connection max lifetime` = `4` hours (earlier unlimited).
- Update to version 5.3.4
  * Alerting: Delete alerts when parent folder was deleted [#13322]
  * MySQL: Fix `$__timeFilter()` should respect local time zone [#13769]
  * Dashboard: Fix data source selection in panel by enter key [#13932]
  * Graph: Fix table legend height when positioned below graph and using
    Internet Explorer 11 [#13903]
  * Dataproxy: Drop origin and referer http headers [#13328]
- Update to version 5.3.3
  * Fix file exfiltration vulnerability
- Update to version 5.3.2
  * InfluxDB/Graphite/Postgres: Prevent XSS in query editor [#13667]
  * Postgres: Fix template variables error [#13692]
  * Cloudwatch: Fix service panic because of race conditions [#13674]
  * Cloudwatch: Fix check for invalid percentile statistics [#13633]
  * Stackdriver/Cloudwatch: Allow user to change unit in graph panel if
    cloudwatch/stackdriver data source response doesn't include unit [#13718]
  * Stackdriver: stackdriver user-metrics duplicated response when multiple
    resource types [#13691]
  * Variables: Fix text box template variable doesn't work properly without a
    default value [#13666]
  * Variables: Fix variable dependency check when using `${var}` format [#13600]
  * Dashboard: Fix kiosk=1 url parameter should put dashboard in kiosk mode [#13764]
  * LDAP: Fix super admins can also be admins of orgs [#13710]
  * Provisioning: Fix deleting provisioned dashboard folder should cleanup
    provisioning meta data [#13280]
- Update to version 5.3.1
  * Render: Fix PhantomJS render of graph panel when legend displayed as table
    to the right [#13616]
  * Stackdriver: Filter option disappears after removing initial filter [#13607]
  * Elasticsearch: Fix no limit size in terms aggregation for alerting queries [#13172]
  * InfluxDB: Fix for annotation issue that caused text to be shown twice [#13553]
  * Variables: Fix nesting variables leads to exception and missing refresh [#13628]
  * Variables: Prometheus: Single letter labels are not supported [#13641]
  * Graph: Fix graph time formatting for Last 24h ranges [#13650]
  * Playlist: Fix cannot add dashboards with long names to playlist [#13464]
  * HTTP API: Fix /api/org/users so that query and limit querystrings works
- Update to version 5.3.0
  * Stackdriver: Filter wildcards and regex matching are not yet supported [#13495]
  * Stackdriver: Support the distribution metric type for heatmaps [#13559]
  * Cloudwatch: Automatically set graph yaxis unit [#13575]
  * Stackdriver: Fix for missing ngInject [#13511]
  * Permissions: Fix for broken permissions selector [#13507]
  * Alerting: Alert reminders deduping not working as expected when running
    multiple Grafana instances [#13492]
  * Annotations: Enable template variables in tagged annotations queries [#9735]
  * Stackdriver: Support for Google Stackdriver data source [#13289]
  * Alerting: Notification reminders [#7330]
  * Dashboard: TV &amp; Kiosk mode changes, new cycle view mode button in dashboard
    toolbar [#13025]
  * OAuth: Gitlab OAuth with support for filter by groups [#5623]
  * Postgres: Graphical query builder [#10095]
  * LDAP: Define Grafana Admin permission in ldap group mappings [#2469]
  * LDAP: Client certificates support [#12805]
  * Profile: List teams that the user is member of in current/active
    organization [#12476]
  * Configuration: Allow auto-assigning users to specific organization (other
    than Main. Org) [#1823]
  * Dataproxy: Pass configured/auth headers to a data source [#10971]
  * CloudWatch: GetMetricData support [#11487]
  * Postgres: TimescaleDB support, e.g. use `time_bucket` for grouping by time
    when option enabled [#12680]
  * Cleanup: Make temp file time to live configurable [#11607]
  * Postgres data source no longer automatically adds time column alias when
    using the $__timeGroup alias.
  * Kiosk mode now also hides submenu (variables)
  * ?inactive url parameter no longer supported, replaced with kiosk=tv url parameter
  * Dashboard: Auto fit dashboard panels to optimize space used for current TV
    or Monitor [#12768]
  * Frontend: Convert all Frontend Karma tests to Jest tests [#12224]
  * Backend: Upgrade to golang 1.11 [#13030]
- Update to version 5.2.4
  * GrafanaCli: Fix issue with grafana-cli install plugin resulting in
    corrupt http response from source error. [#13079]
- Update to version 5.2.3
  * Important fix for LDAP &amp; OAuth login vulnerability
- Update to version 5.2.2
  * Prometheus: Fix graph panel bar width issue in aligned prometheus queries [#12379]
  * Dashboard: Dashboard links not updated when changing variables [#12506]
  * Postgres/MySQL/MSSQL: Fix connection leak [#12636]
  * Plugins: Fix loading of external plugins [#12551]
  * Dashboard: Remove unwanted scrollbars in embedded panels [#12589]
  * Prometheus: Prevent error using \$\_\_interval_ms in query [#12533]
- Update to version 5.2.1
  * Auth Proxy: Important security fix for whitelist of IP address feature [#12444]
  * UI: Fix - Grafana footer overlapping page [#12430]
  * Logging: Errors should be reported before crashing [#12438]
- Update to version 5.2.0
  * Plugins: Handle errors correctly when loading data source plugin [#12383]
  * Render: Enhance error message if phantomjs executable is not found [#11868]
  * Dashboard: Set correct text in drop down when variable is present in url [#11968]
  * LDAP: Handle 'dn' ldap attribute more gracefully [#12385]
  * Dashboard: Import dashboard to folder [#10796]
  * Permissions: Important security fix for API keys with viewer role [#12343]
  * Dashboard: Fix so panel titles doesn't wrap [#11074]
  * Dashboard: Prevent double-click when saving dashboard [#11963]
  * Dashboard: AutoFocus the add-panel search filter [#12189]
  * Units: W/m2 (energy), l/h (flow) and kPa (pressure) [#11233]
  * Units: Liter/min (flow) and milliLiter/min (flow) [#12282]
  * Alerting: Fix mobile notifications for Microsoft Teams alert notifier [#11484]
  * Influxdb: Add support for mode function [#12286]
  * Cloudwatch: Fix panic caused by bad timerange settings [#12199]
  * Auth Proxy: Whitelist proxy IP address instead of client IP address [#10707]
  * User Management: Make sure that a user always has a current org assigned [#11076]
  * Snapshots: Fix: annotations not properly extracted leading to incorrect
    rendering of annotations [#12278]
  * LDAP: Allow use of DN in group_search_filter_user_attribute and member_of [#3132]
  * Graph: Fix legend decimals precision calculation [#11792]
  * Dashboard: Make sure to process panels in collapsed rows when exporting
    dashboard [#12256]
  * Dashboard: Dashboard link doesn't work when 'As dropdown' option is checked [#12315]
  * Dashboard: Fix regressions after save modal changes, including adhoc
    template issues [#12240]
  * Elasticsearch: Alerting support [#5893]
  * Build: Crosscompile and packages Grafana on arm, windows, linux and darwin [#11920]
  * Login: Change admin password after first login [#11882]
  * Alert list panel: Updated to support filtering alerts by name, dashboard
    title, folder, tags [#11500]
  * Dashboard: Modified time range and variables are now not saved by default [#10748]
  * Graph: Show invisible highest value bucket in histogram [#11498]
  * Dashboard: Enable 'Save As...' if user has edit permission [#11625]
  * Prometheus: Query dates are now step-aligned [#10434]
  * Prometheus: Table columns order now changes when rearrange queries [#11690]
  * Variables: Fix variable interpolation when using multiple formatting types [#11800]
  * Dashboard: Fix date selector styling for dark/light theme in time picker
    control [#11616]
  * Discord: Alert notification channel type for Discord, [#7964]
  * InfluxDB: Support SELECT queries in templating query, [#5013]
  * InfluxDB: Support count distinct aggregation [#11645]
  * Dashboard: JSON Model under dashboard settings can now be updated &amp; changes
    saved. [#1429]
  * Security: Fix XSS vulnerabilities in dashboard links [#11813]
  * Singlestat: Fix 'time of last point' shows local time when dashboard
    timezone set to UTC [#10338]
  * Prometheus: Add support for passing timeout parameter to Prometheus [#11788]
  * Login: Add optional option sign out url for generic oauth [#9847]
  * Login: Use proxy server from environment variable if available [#9703]
  * Invite users: Friendlier error message when smtp is not configured [#12087]
  * Graphite: Don't send distributed tracing headers when using direct/browser
    access mode [#11494]
  * Sidenav: Show create dashboard link for viewers if at least editor in one
    folder [#11858]
  * SQL: Second epochs are now correctly converted to ms. [#12085]
  * Singlestat: Fix singlestat threshold tooltip [#11971]
  * Dashboard: Hide grid controls in fullscreen/low-activity views [#11771]
  * Dashboard: Validate uid when importing dashboards [#11515]
  * Alert list panel: Show alerts for user with viewer role [#11167]
  * Provisioning: Verify checksum of dashboards before updating to reduce load
    on database [#11670]
  * Provisioning: Support symlinked files in dashboard provisioning config
    files [#11958]
  * Dashboard list panel: Search dashboards by folder [#11525]
  * Sidenav: Always show server admin link in sidenav if grafana admin [#11657]
- Update to version 5.1.4
  * Permissions: Important security fix for API keys with viewer role [#12343]
- Update to version 5.1.3
  * Scroll: Graph panel / legend texts shifts on the left each time we move
    scrollbar on firefox [#11830]
- Update to version 5.1.2
  * Database: Fix MySql migration issue [#11862]
  * Google Analytics: Enable Google Analytics anonymizeIP setting for GDPR [#11656]
- Update to version 5.1.1
  * LDAP: LDAP login with MariaDB/MySQL database and dn&gt;100 chars not possible [#11754]
  * Build: AppVeyor Windows build missing version and commit info [#11758]
  * Scroll: Scroll can't start in graphs on Chrome mobile [#11710]
  * Units: Revert renaming of unit key ppm [#11743]
- Update to version 5.1.0
  * Folders: Default permissions on folder are not shown as inherited in its
    dashboards [#11668]
  * Templating: Allow more than 20 previews when creating a variable [#11508]
  * Dashboard: Row edit icon not shown [#11466]
  * SQL: Unsupported data types for value column using time series query [#11703]
  * Prometheus: Prometheus query inspector expands to be very large on
    autocomplete queries [#11673]
  * MSSQL: New Microsoft SQL Server data source [#10093]
  * Prometheus: The heatmap panel now support Prometheus histograms [#10009]
  * Postgres/MySQL: Ability to insert 0s or nulls for missing intervals [#9487]
  * Postgres/MySQL/MSSQL: Fix precision for the time column in table mode [#11306]
  * Graph: Align left and right Y-axes to one level [#1271]
  * Graph: Thresholds for Right Y axis [#7107]
  * Graph: Support multiple series stacking in histogram mode [#8151]
  * Alerting: Pausing/un alerts now updates new_state_date [#10942]
  * Alerting: Support Pagerduty notification channel using Pagerduty V2 API [#10531]
  * Templating: Add comma templating format [#10632]
  * Prometheus: Show template variable candidate in query editor [#9210]
  * Prometheus: Support POST for query and query_range [#9859]
  * Alerting: Add support for retries on alert queries [#5855]
  * Table: Table plugin value mappings [#7119]
  * IE11: IE 11 compatibility [#11165]
  * Scrolling: Better scrolling experience [#11053]
  * Folders: A folder admin cannot add user/team permissions for folder/its
    dashboards [#11173]
  * Provisioning: Improved workflow for provisioned dashboards [#10883]
  * OpsGenie: Add triggered alerts as description [#11046]
  * Cloudwatch: Support high resolution metrics [#10925]
  * Cloudwatch: Add dimension filtering to CloudWatch `dimension_values()` [#10029]
  * Units: Second to HH:mm:ss formatter [#11107]
  * Singlestat: Add color to prefix and postfix in singlestat panel [#11143]
  * Dashboards: Version cleanup fails on old databases with many entries [#11278]
  * Server: Adjust permissions of unix socket [#11343]
  * Shortcuts: Add shortcut for duplicate panel [#11102]
  * AuthProxy: Support IPv6 in Auth proxy white list [#11330]
  * SMTP: Don't connect to STMP server using TLS unless configured. [#7189]
  * Prometheus: Escape backslash in labels correctly. [#10555]
  * Variables: Case-insensitive sorting for template values [#11128]
  * Annotations (native): Change default limit from 10 to 100 when querying api [#11569]
  * MySQL/Postgres/MSSQL: PostgreSQL data source generates invalid query with
    dates before 1970 [#11530]
  * Kiosk: Adds url parameter for starting a dashboard in inactive mode [#11228]
  * Dashboard: Enable closing timepicker using escape key [#11332]
  * Data Sources: Rename direct access mode in the data source settings [#11391]
  * Search: Display dashboards in folder indented [#11073]
  * Units: Use B/s instead Bps for Bytes per second [#9342]
  * Units: Radiation units [#11001]
  * Units: Timeticks unit [#11183]
  * Units: Concentration units and 'Normal cubic meter' [#11211]
  * Units: New currency - Czech koruna [#11384]
  * Avatar: Fix DISABLE_GRAVATAR option [#11095]
  * Heatmap: Disable log scale when using time time series buckets [#10792]
  * Provisioning: Remove `id` from json when provisioning dashboards, [#11138]
  * Prometheus: tooltip for legend format not showing properly [#11516]
  * Playlist: Empty playlists cannot be deleted [#11133]
  * Switch Orgs: Alphabetic order in Switch Organization modal [#11556]
  * Postgres: improve `$__timeFilter` macro [#11578]
  * Permission list: Improved ux [#10747]
  * Dashboard: Sizing and positioning of settings menu icons [#11572]
  * Dashboard: Add search filter/tabs to new panel control [#10427]
  * Folders: User with org viewer role should not be able to save/move
    dashboards in/to general folder [#11553]
  * Influxdb: Don't assume the first column in table response is time. [#11476]
- Update to version 5.0.4
  * Dashboard Fix inability to link collapsed panels directly to [#11114]
  * Dashboard Provisioning dashboard with alert rules should create alerts [#11247]
  * Snapshots For snapshots, the Graph panel renders the legend incorrectly on
    right hand side [#11318]
  * Alerting Link back to Grafana returns wrong URL if root_path contains
    sub-path components [#11403]
  * Alerting Incorrect default value for upload images setting for alert
    notifiers [#11413]
- Update to version 5.0.3
  * Mysql: Mysql panic occurring occasionally upon Grafana dashboard access (a
    bigger patch than the one in 5.0.2) [#11155]
- Update to version 5.0.2
  * Mysql: Mysql panic occurring occasionally upon Grafana dashboard access [#11155]
  * Dashboards: Should be possible to browse dashboard using only uid [#11231]
  * Alerting: Fix bug where alerts from hidden panels where deleted [#11222]
  * Import: Fix bug where dashboards with alerts couldn't be imported [#11227]
  * Teams: Remove quota restrictions from teams [#11220]
  * Render: Fix bug with legacy url redirection for panel rendering [#11180]
- Update to version 5.0.1
  * Postgres: PostgreSQL error when using ipv6 address as hostname in
    connection string [#11055]
  * Dashboards: Changing templated value from dropdown is causing unsaved
    changes [#11063]
  * Prometheus: Fix bundled Prometheus 2.0 dashboard [#11016]
  * Sidemenu: Profile menu 'invisible' when gravatar is disabled [#11097]
  * Dashboard: Fix a bug with resizable handles for panels [#11103]
  * Alerting: Telegram inline image mode fails when caption too long [#10975]
  * Alerting: Fix silent failing validation [#11145]
  * OAuth: Only use jwt token if it contains an email address [#11127]
- Update to version 5.0.0
  * oauth Fix GitHub OAuth not working with private Organizations [#11028]
  * kiosk white area over bottom panels in kiosk mode [#11010]
  * alerting Fix OK state doesn't show up in Microsoft Teams [#11032]
  * Permissions Fix search permissions issues [#10822]
  * Permissions Fix problem issues displaying permissions lists [#10864]
  * PNG-Rendering Fix problem rendering legend to the right [#10526]
  * Reset password Fix problem with reset password form [#10870]
  * Light theme Fix problem with light theme in safari, [#10869]
  * Provisioning Now handles deletes when dashboard json files removed from
    disk [#10865]
  * MySQL: Fix issue with schema migration on old mysql (index too long) [#10779]
  * GitHub OAuth: Fix fetching github orgs from private github org [#10823]
  * Embedding:Fix issues with embedding panel [#10787]
  * Dashboards: Dashboard folders, [#1611]
  * Teams User groups (teams) implemented. Can be used in folder &amp; dashboard
    permission list.

  * Dashboard grid: Panels are now laid out in a two dimensional grid (with x,
    y, w, h). [#9093]
  * Templating: Vertical repeat direction for panel repeats.
  * UX: Major update to page header and navigation
  * Dashboard settings: Combine dashboard settings views into one with side menu, [#9750]
  * Persistent dashboard url's: New url's for dashboards that allows renaming
    dashboards without breaking links. [#7883]
  * dashboard.json files have been replaced with dashboard provisioning API.
  * Config files for provisioning data sources as configuration have changed
    from /etc/grafana/conf/datasources to /etc/grafana/provisioning/datasources.
  * Pagerduty notifier now defaults to not auto resolve incidents. More details at [#10222]
  * `GET /api/alerts` property dashboardUri renamed to url
  * New grid engine for positioning dashboard panels
  * Alerting: Add support for internal image store [#6922]
  * Data Source Proxy: Add support for whitelisting specified cookies to be
    be passed through to the data source when proxying [#5457]
  * Postgres/MySQL: add \_\_timeGroup macro for mysql [#9596]
  * Text: Text panel are now edited in the ace editor. [#9698]
  * Teams: Add Microsoft Teams notifier as [#8523]
  * Data Sources: Its now possible to configure data sources with config files [#1789]
  * Graphite: Query editor updated to support new query by tag features [#9230]
  * Dashboard history: New config file option versions_to_keep sets how many
    versions per dashboard to store, [#9671]
  * Dashboard as cfg: Load dashboards from file into Grafana on startup/change [#9654]
  * Prometheus: Grafana can now send alerts to Prometheus Alertmanager while
    firing [#7481]
  * Table: Support multiple table formatted queries in table panel [#9170]
  * Security: Protect against brute force (frequent) login attempts [#7616]
  * Graph: Don't hide graph display options (Lines/Points) when draw mode is
    unchecked [#9770]
  * Alert panel: Adds placeholder text when no alerts are within the time range [#9624]
  * Mysql: MySQL enable MaxOpenCon and MaxIdleCon regards how constring is
    configured. [#9784]
  * Cloudwatch: Fix broken query inspector for cloudwatch [#9661]
  * Dashboard: Make it possible to start dashboards from search and dashboard
    list panel [#1871]
  * Annotations: Posting annotations now return the id of the annotation [#9798]
  * Systemd: Use systemd notification ready flag [#10024]
  * GitHub: Use organizations_url provided from github to verify user belongs
    in org. [#10111]
  * Backend: Fix bug where Grafana exited before all sub routines where finished [#10131]
  * Azure: Adds support for Azure blob storage as external image stor [#8955]
  * Telegram: Add support for inline image uploads to telegram notifier plugin [#9967]
  * Sensu: Send alert message to sensu output [#9551]
  * Singlestat: suppress error when result contains no datapoints [#9636]
  * Postgres/MySQL: Control quoting in SQL-queries when using template variables [#9030]
  * Pagerduty: Pagerduty don't auto resolve incidents by default anymore. [#10222]
  * Cloudwatch: Fix for multi-valued templated queries. [#9903]
  * RabbitMq: Remove support for publishing events to RabbitMQ [#9645]
  * API: GET /api/dashboards/db/:slug deprecated, use GET /api/dashboards/uid/:uid
  * API: DELETE /api/dashboards/db/:slug deprecated, use DELETE /api/dashboards/uid/:uid
  * API: `uri` property in GET /api/search deprecated, use `url` or `uid` property
  * API: `meta.slug` property in GET /api/dashboards/uid/:uid and GET
    /api/dashboards/db/:slug deprecated, use `meta.url` or `dashboard.uid` property

Changes in grafana-natel-discrete-panel:
- Add recompress source service
- Add set_version source service
- Enable changesgenerate for tar_scm source service
- Update to version 0.0.9:
  * split commands
  * put back the history

Changes in openstack-cinder:
- Update to version cinder-11.2.3.dev29:
  * Remove VxFlex OS credentials from connection\_properties
  * Fix stable/pike gate
  * tintri: Enable SSL with requests
  * [Unity] Fix TypeError for test case test\_delete\_host\_wo\_lock

Changes in openstack-cinder:
- Update to version cinder-11.2.3.dev29:
  * Remove VxFlex OS credentials from connection\_properties
  * Fix stable/pike gate
  * tintri: Enable SSL with requests
  * [Unity] Fix TypeError for test case test\_delete\_host\_wo\_lock

Changes in openstack-monasca-installer:
- Add 0001-Add-support-for-ansible-2.9.patch

Changes in openstack-neutron:
- Update to version neutron-11.0.9.dev69:
  * Do not block connection between br-int and br-phys on startup
  * [EM releases] Move non-voting jobs to the experimental queue

- Update to version neutron-11.0.9.dev66:
  * Fix pike gates, multiple fixes

Changes in openstack-neutron:
- Add 0001-Ensure-drop-flows-on-br-int-at-agent-startup-for-DVR-too.patch (LP#1887148)

- Update to version neutron-11.0.9.dev69:
  * Do not block connection between br-int and br-phys on startup
  * [EM releases] Move non-voting jobs to the experimental queue

- Update to version neutron-11.0.9.dev66:
  * Fix pike gates, multiple fixes

Changes in openstack-nova:
- Update to version nova-16.1.9.dev76:
  * Removed the host FQDN from the exception message

- Update to version nova-16.1.9.dev74:
  * libvirt: Provide VIR\_MIGRATE\_PARAM\_PERSIST\_XML during live migration

- Update to version nova-16.1.9.dev73:
  * Fix os-simple-tenant-usage result order

- Update to version nova-16.1.9.dev71:
  * Fix false ERROR message at compute restart

- Update to version nova-16.1.9.dev69:
  * Check cherry-pick hashes in pep8 tox target

- Update to version nova-16.1.9.dev67:
  * libvirt: Do not reraise DiskNotFound exceptions during resize

- Update to version nova-16.1.9.dev66:
  * Clean up allocation if unshelve fails due to neutron
  * Reproduce bug 1862633

- Update to version nova-16.1.9.dev64:
  * Init HostState.failed\_builds

- Update to version nova-16.1.9.dev62:
  * Fix os\_CODENAME detection and repo refresh during ceph tests

Changes in openstack-nova:
- Update to version nova-16.1.9.dev76:
  * Removed the host FQDN from the exception message

- Rebased patches:
  + 0004-Provide-VIR_MIGRATE_PARAM_PERSIST_XML-during-live-migration.patch dropped (merged upstream)

- Update to version nova-16.1.9.dev74:
  * libvirt: Provide VIR\_MIGRATE\_PARAM\_PERSIST\_XML during live migration

- Add 0004-Provide-VIR_MIGRATE_PARAM_PERSIST_XML-during-live-migration.patch
  * (bsc#1175484, CVE-2020-17376)

- Update to version nova-16.1.9.dev73:
  * Fix os-simple-tenant-usage result order

- Update to version nova-16.1.9.dev71:
  * Fix false ERROR message at compute restart

- Update to version nova-16.1.9.dev69:
  * Check cherry-pick hashes in pep8 tox target

- Update to version nova-16.1.9.dev67:
  * libvirt: Do not reraise DiskNotFound exceptions during resize

- Update to version nova-16.1.9.dev66:
  * Clean up allocation if unshelve fails due to neutron
  * Reproduce bug 1862633

- Update to version nova-16.1.9.dev64:
  * Init HostState.failed\_builds

- Update to version nova-16.1.9.dev62:
  * Fix os\_CODENAME detection and repo refresh during ceph tests

Changes in python-Django:
- Update to version 1.11.29 (bsc#1161919, CVE-2020-7471, bsc#1165022, CVE-2020-9402, bsc#1159447, CVE-2019-19844)
  * Fixed CVE-2020-9402 -- Properly escaped tolerance parameter in GIS functions and aggregates on Oracle.
  * Pinned PyYAML &lt; 5.3 in test requirements.
  * Fixed CVE-2020-7471 -- Properly escaped StringAgg(delimiter) parameter.
  * Fixed timezones tests for PyYAML 5.3+.
  * Fixed CVE-2019-19844 -- Used verified user email for password reset requests.
  * Fixed #31073 -- Prevented CheckboxInput.get_context() from mutating attrs.
  * Fixed #30826 -- Fixed crash of many JSONField lookups when one hand side is key transform.
  * Fixed #30769 -- Fixed a crash when filtering against a subquery JSON/HStoreField annotation.
  * Fixed #30672 -- Fixed crash of JSONField/HStoreField key transforms on expressions with params.

  * Added patch CVE-2020-13254.patch
  * Added patch CVE-2020-13596.patch
Changes in python-Flask-Cors:
- Add patches to fix a relative directory traversal issue
  (boo#1175986, CVE-2020-25032):
  * 0001-Handle-request_headers-None.patch
  * 0002-Fix-request-path-normalization.patch

Changes in python-Pillow:
- Add 011-Fix-OOB-reads-in-FLI-decoding.patch
   * From upstream, backported
   * Fixes CVE-2020-10177, bsc#1173413
- Add 012-Fix-bounds-overflow-in-JPEG-2000-decoding.patch
   * From upstream, backported
   * Fixes CVE-2020-10994, bsc#1173418
- Add 013-Fix-bounds-overflow-in-PCX-decoding.patch
   * From upstream, backported
   * Fixes CVE-2020-10378, bsc#1173416

Changes in python-ardana-packager:
- fetch updated nova_host_aggregate from git
 - Add missing novaclient required domain entries (bsc#1174006) 

Changes in python-keystoneclient:
- add 2020-tests-pass.patch:
  - Make tests pass in 2020 

- update to version 3.13.1
  - Updated from global requirements
  - Update .gitreview for stable/pike
  - Update UPPER_CONSTRAINTS_FILE for stable/pike
  - import zuul job settings from project-config
  - Avoid tox_install.sh for constraints support

Changes in python-keystonemiddleware:
- added 0001-Make-tests-pass-in-2022.patch
- removed 0001-Add-use_oslo_messaging-option.patch

- update to version 4.17.1
  - Update .gitreview for stable/pike
  - Update UPPER_CONSTRAINTS_FILE for stable/pike
  - Add option to disable using oslo_message notifier
  - Fix docs builds
  - Updated from global requirements
  - import zuul job settings from project-config

Changes in python-kombu:
- Add 0001-Fix-failing-unittests-of-pyamqp-transport.patch

Changes in python-straight-plugin:

- Add pip_no_plugins.patch to avoid error: 'UnboundLocalError:
  local variable 'r' referenced before assignment', when there
  is no plugin available.

- Initial packaging

Changes in python-urllib3:
- Update urllib3-fix-test-urls.patch. Adjust to match upstream solution.

- Add urllib3-fix-test-urls.patch. Fix tests failing on python checks for
  CVE-2019-9740.

- Add urllib3-cve-2020-26137.patch. Don't allow control chars in request
  method. (bsc#1177120, CVE-2020-26137)

Changes in release-notes-suse-openstack-cloud:
- Update to version 8.20200922:
  * postgreSQL db replace changes are updated for suse openstack cloud section (SOC-11000)

Changes in storm:
- Fix duplicate BuildRequire on storm-kit
- update to 1.2.3 (SOC-9974, CVE-2019-0202, SOC-9998, CVE-2018-11779):
  * 1.2.3
    * [STORM-3233] - Upgrade zookeeper client to newest version (3.4.13)
    * [STORM-3077] - Upgrade Disruptor version to 3.3.11
    * [STORM-3083] - Upgrade HikariCP version to 2.4.7
    * [STORM-3094] - Topology name needs to be validated at storm-client
    * [STORM-3222] - Fix KafkaSpout internals to use LinkedList instead of ArrayList
    * [STORM-3292] - Trident HiveState must flush writers when the batch commits
    * [STORM-3013] - Deactivated topology restarts if data flows into Kafka
    * [STORM-3028] - HdfsSpout does not handle empty files in case of ack enabled
    * [STORM-3046] - Getting a NPE leading worker to die when starting a topology.
    * [STORM-3047] - Ensure Trident emitter refreshPartitions is only called with partitions assigned to the emitter
    * [STORM-3055] - never refresh connection
    * [STORM-3068] - STORM_JAR_JVM_OPTS are not passed to storm-kafka-monitor properly
    * [STORM-3082] - NamedTopicFilter can't handle topics that don't exist yet
    * [STORM-3087] - FluxBuilder.canInvokeWithArgs is too permissive when the method parameter type is a primitive
    * [STORM-3090] - The same offset value is used by the same partition number of different topics.
    * [STORM-3097] - Remove storm-druid in 2.x and deprecate support for it in 1.x
    * [STORM-3102] - Storm Kafka Client performance issues with Kafka Client v1.0.0
    * [STORM-3109] - Wrong canonical path set to STORM_LOCAL_DIR in storm kill_workers
    * [STORM-3110] - Supervisor does not kill all worker processes in secure mode in case of user mismatch
    * [STORM-3121] - Fix flaky metrics tests in storm-core
    * [STORM-3122] - FNFE due to race condition between 'async localizer' and 'update blob' timer thread
    * [STORM-3123] - Storm Kafka Monitor does not work with Kafka over two-way SSL
    * [STORM-3161] - Local mode should force setting min replication count to 1
    * [STORM-3164] - Multilang storm.py uses traceback.format_exc incorrectly
    * [STORM-3184] - Storm supervisor log showing keystore and truststore password in plaintext
    * [STORM-3201] - kafka spout lag on UI needs some cleanup
    * [STORM-3301] - The KafkaSpout can in some cases still replay tuples that were already committed
    * [STORM-3381] - Upgrading to Zookeeper 3.4.14 added an LGPL dependency
    * [STORM-3384] - storm set-log-level command throws wrong exception when the topology is not running
    * [STORM-3086] - Update Flux documentation to demonstrate static factory methods (STORM-2796)
    * [STORM-3089] - Document worker hooks on the hooks page
    * [STORM-3199] - Metrics-ganglia depends on an LGPL library, so we shouldn't depend on it
    * [STORM-3289] - Add note about KAFKA-7044 to storm-kafka-client compatibility docs
    * [STORM-3330] - Migrate parts of storm-webapp, and reduce use of mocks for files
  * 1.2.2
    * [STORM-3026] - Upgrade ZK instance for security
    * [STORM-3027] - Make Impersonation Optional
    * [STORM-2896] - Support automatic migration of offsets from storm-kafka to storm-kafka-client KafkaSpout
    * [STORM-2997] - Add logviewer ssl module in SECURITY.md
    * [STORM-3006] - Distributed RPC documentation needs an update
    * [STORM-3011] - Use default bin path in flight.bash if $JAVA_HOME is undefined
    * [STORM-3022] - Decouple storm-hive UTs with Hive
    * [STORM-3039] - Ports of killed topologies remain in TIME_WAIT state preventing to start new topology
    * [STORM-3069] - Allow users to specify maven local repository directory for storm submit tool
    * [STORM-2911] - SpoutConfig is serializable but does not declare a serialVersionUID field
    * [STORM-2967] - Upgrade jackson to latest version 2.9.4
    * [STORM-2968] - Exclude a few unwanted jars from storm-autocreds
    * [STORM-2978] - The fix for STORM-2706 is broken, and adds a transitive dependency on Zookeeper 3.5.3-beta for projects that depend on e.g. storm-kafka
    * [STORM-2979] - WorkerHooks EOFException during run_worker_shutdown_hooks
    * [STORM-2981] - Upgrade Curator to lastest patch version
    * [STORM-2985] - Add jackson-annotations to dependency management
    * [STORM-2988] - 'Error on initialization of server mk-worker' when using org.apache.storm.metrics2.reporters.JmxStormReporter on worker
    * [STORM-2989] - LogCleaner should preserve current worker.log.metrics
    * [STORM-2993] - Storm HDFS bolt throws ClosedChannelException when Time rotation policy is used
    * [STORM-2994] - KafkaSpout consumes messages but doesn't commit offsets
    * [STORM-3043] - NullPointerException thrown in SimpleRecordTranslator.apply()
    * [STORM-3052] - Let blobs un archive
    * [STORM-3059] - KafkaSpout throws NPE when hitting a null tuple if the processing guarantee is not AT_LEAST_ONCE
    * [STORM-2960] - Better to stress importance of setting up proper OS account for Storm processes
    * [STORM-3060] - Configuration mapping between storm-kafka &amp; storm-kafka-client
    * [STORM-2952] - Deprecate storm-kafka in 1.x
    * [STORM-3005] - [DRPC] LinearDRPCTopologyBuilder shouldn't be deprecated

Changes in storm-kit:
- Add _constraints to prevent build from running out of disk space

- Updated kit for storm-1.2.3

Changes in venv-openstack-cinder:
- Ensure that python-swiftclient is pulled into the built venv
  via an explicit BuildRequires directive. (SOC-10522)

Changes in venv-openstack-swift:
- Ensure that python-oslo.log is pulled into the built venv by
  explicitly requiring the package using a BuildRequires entry.

  		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1008037">SUSE bug 1008037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008038">SUSE bug 1008038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010940">SUSE bug 1010940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019021">SUSE bug 1019021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038785">SUSE bug 1038785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056094">SUSE bug 1056094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059235">SUSE bug 1059235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080682">SUSE bug 1080682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097775">SUSE bug 1097775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102126">SUSE bug 1102126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109957">SUSE bug 1109957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112959">SUSE bug 1112959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117080">SUSE bug 1117080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118896">SUSE bug 1118896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123561">SUSE bug 1123561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126503">SUSE bug 1126503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137479">SUSE bug 1137479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137528">SUSE bug 1137528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142121">SUSE bug 1142121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142542">SUSE bug 1142542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144453">SUSE bug 1144453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153452">SUSE bug 1153452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154231">SUSE bug 1154231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154232">SUSE bug 1154232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154830">SUSE bug 1154830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157968">SUSE bug 1157968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157969">SUSE bug 1157969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159447">SUSE bug 1159447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161919">SUSE bug 1161919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164133">SUSE bug 1164133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164134">SUSE bug 1164134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164135">SUSE bug 1164135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164136">SUSE bug 1164136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164137">SUSE bug 1164137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164138">SUSE bug 1164138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164139">SUSE bug 1164139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164140">SUSE bug 1164140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165022">SUSE bug 1165022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165393">SUSE bug 1165393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166389">SUSE bug 1166389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167440">SUSE bug 1167440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167532">SUSE bug 1167532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171162">SUSE bug 1171162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171823">SUSE bug 1171823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172450">SUSE bug 1172450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173413">SUSE bug 1173413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173416">SUSE bug 1173416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173418">SUSE bug 1173418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174006">SUSE bug 1174006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174145">SUSE bug 1174145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174242">SUSE bug 1174242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174302">SUSE bug 1174302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174583">SUSE bug 1174583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175484">SUSE bug 1175484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175986">SUSE bug 1175986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175993">SUSE bug 1175993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177948">SUSE bug 1177948</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8614/">CVE-2016-8614 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8614">CVE-2016-8614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8628/">CVE-2016-8628 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8628">CVE-2016-8628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8647/">CVE-2016-8647 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8647">CVE-2016-8647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9587/">CVE-2016-9587 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9587">CVE-2016-9587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7466/">CVE-2017-7466 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7466">CVE-2017-7466 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7550/">CVE-2017-7550 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7550">CVE-2017-7550 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10875/">CVE-2018-10875 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10875">CVE-2018-10875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11779/">CVE-2018-11779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11779">CVE-2018-11779 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16837/">CVE-2018-16837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16837">CVE-2018-16837 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16859/">CVE-2018-16859 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16859">CVE-2018-16859 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16876/">CVE-2018-16876 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16876">CVE-2018-16876 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-18623/">CVE-2018-18623 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18623">CVE-2018-18623 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-18624/">CVE-2018-18624 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18624">CVE-2018-18624 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-18625/">CVE-2018-18625 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18625">CVE-2018-18625 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0202/">CVE-2019-0202 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0202">CVE-2019-0202 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10156/">CVE-2019-10156 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10156">CVE-2019-10156 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10206/">CVE-2019-10206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10206">CVE-2019-10206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10217/">CVE-2019-10217 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10217">CVE-2019-10217 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14846/">CVE-2019-14846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14846">CVE-2019-14846 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14856/">CVE-2019-14856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14856">CVE-2019-14856 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14858/">CVE-2019-14858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-14858">CVE-2019-14858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14864/">CVE-2019-14864 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14864">CVE-2019-14864 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14904/">CVE-2019-14904 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14904">CVE-2019-14904 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14905/">CVE-2019-14905 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14905">CVE-2019-14905 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19844/">CVE-2019-19844 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19844">CVE-2019-19844 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3828/">CVE-2019-3828 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3828">CVE-2019-3828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10177/">CVE-2020-10177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10177">CVE-2020-10177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10378/">CVE-2020-10378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10378">CVE-2020-10378 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10684/">CVE-2020-10684 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10684">CVE-2020-10684 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10685/">CVE-2020-10685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10685">CVE-2020-10685 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10691/">CVE-2020-10691 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10691">CVE-2020-10691 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10729/">CVE-2020-10729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10729">CVE-2020-10729 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10744/">CVE-2020-10744 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10744">CVE-2020-10744 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10994/">CVE-2020-10994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10994">CVE-2020-10994 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11110/">CVE-2020-11110 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11110">CVE-2020-11110 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14330/">CVE-2020-14330 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14330">CVE-2020-14330 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14332/">CVE-2020-14332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14332">CVE-2020-14332 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14365/">CVE-2020-14365 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14365">CVE-2020-14365 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1733/">CVE-2020-1733 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1733">CVE-2020-1733 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1734/">CVE-2020-1734 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1734">CVE-2020-1734 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1735/">CVE-2020-1735 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1735">CVE-2020-1735 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1736/">CVE-2020-1736 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1736">CVE-2020-1736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1737/">CVE-2020-1737 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1737">CVE-2020-1737 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-17376/">CVE-2020-17376 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17376">CVE-2020-17376 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1738/">CVE-2020-1738 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1738">CVE-2020-1738 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1739/">CVE-2020-1739 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1739">CVE-2020-1739 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1740/">CVE-2020-1740 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1740">CVE-2020-1740 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1746/">CVE-2020-1746 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1746">CVE-2020-1746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1753/">CVE-2020-1753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1753">CVE-2020-1753 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25032/">CVE-2020-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25032">CVE-2020-25032 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26137">CVE-2020-26137 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-7471/">CVE-2020-7471 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7471">CVE-2020-7471 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9402/">CVE-2020-9402 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9402">CVE-2020-9402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597326" comment="ansible-2.9.14-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597327" comment="ardana-ansible-8.0+git.1596735237.54109b1-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597328" comment="ardana-cinder-8.0+git.1596129856.263f430-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597329" comment="ardana-glance-8.0+git.1593631779.76fa9b7-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597330" comment="ardana-mq-8.0+git.1593618123.678c32b-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597331" comment="ardana-nova-8.0+git.1601298847.dd01585-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597332" comment="ardana-osconfig-8.0+git.1595885113.93abcbc-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597333" comment="documentation-suse-openstack-cloud-installation-8.20201007-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597334" comment="documentation-suse-openstack-cloud-operations-8.20201007-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597335" comment="documentation-suse-openstack-cloud-opsconsole-8.20201007-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597336" comment="documentation-suse-openstack-cloud-planning-8.20201007-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597337" comment="documentation-suse-openstack-cloud-security-8.20201007-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597338" comment="documentation-suse-openstack-cloud-supplement-8.20201007-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597339" comment="documentation-suse-openstack-cloud-upstream-admin-8.20201007-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597340" comment="documentation-suse-openstack-cloud-upstream-user-8.20201007-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597341" comment="documentation-suse-openstack-cloud-user-8.20201007-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597342" comment="grafana-6.7.4-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597343" comment="grafana-natel-discrete-panel-0.0.9-3.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597344" comment="openstack-cinder-11.2.3~dev29-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597345" comment="openstack-cinder-api-11.2.3~dev29-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597346" comment="openstack-cinder-backup-11.2.3~dev29-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597347" comment="openstack-cinder-doc-11.2.3~dev29-3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597348" comment="openstack-cinder-scheduler-11.2.3~dev29-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597349" comment="openstack-cinder-volume-11.2.3~dev29-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597350" comment="openstack-monasca-installer-20190923_16.32-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597351" comment="openstack-neutron-11.0.9~dev69-3.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597352" comment="openstack-neutron-dhcp-agent-11.0.9~dev69-3.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597353" comment="openstack-neutron-doc-11.0.9~dev69-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597354" comment="openstack-neutron-ha-tool-11.0.9~dev69-3.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597355" comment="openstack-neutron-l3-agent-11.0.9~dev69-3.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597356" comment="openstack-neutron-linuxbridge-agent-11.0.9~dev69-3.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597357" comment="openstack-neutron-macvtap-agent-11.0.9~dev69-3.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597358" comment="openstack-neutron-metadata-agent-11.0.9~dev69-3.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597359" comment="openstack-neutron-metering-agent-11.0.9~dev69-3.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597360" comment="openstack-neutron-openvswitch-agent-11.0.9~dev69-3.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597361" comment="openstack-neutron-server-11.0.9~dev69-3.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597362" comment="openstack-nova-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597363" comment="openstack-nova-api-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597364" comment="openstack-nova-cells-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597365" comment="openstack-nova-compute-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597366" comment="openstack-nova-conductor-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597367" comment="openstack-nova-console-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597368" comment="openstack-nova-consoleauth-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597369" comment="openstack-nova-doc-16.1.9~dev76-3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597370" comment="openstack-nova-novncproxy-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597371" comment="openstack-nova-placement-api-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597372" comment="openstack-nova-scheduler-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597373" comment="openstack-nova-serialproxy-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597374" comment="openstack-nova-vncproxy-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597375" comment="python-Django-1.11.29-3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597376" comment="python-Flask-Cors-3.0.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597377" comment="python-Pillow-4.2.1-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597378" comment="python-ardana-packager-0.0.3-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597379" comment="python-cinder-11.2.3~dev29-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597380" comment="python-keystoneclient-3.13.1-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597381" comment="python-keystoneclient-doc-3.13.1-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597382" comment="python-keystonemiddleware-4.17.1-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597383" comment="python-kombu-4.1.0-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597384" comment="python-neutron-11.0.9~dev69-3.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597385" comment="python-nova-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597386" comment="python-straight-plugin-1.5.0-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597387" comment="python-urllib3-1.22-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597388" comment="release-notes-suse-openstack-cloud-8.20200922-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597389" comment="storm-1.2.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597390" comment="storm-nimbus-1.2.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597391" comment="storm-supervisor-1.2.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597392" comment="venv-openstack-aodh-x86_64-5.1.1~dev7-12.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597393" comment="venv-openstack-barbican-x86_64-5.0.2~dev3-12.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597394" comment="venv-openstack-ceilometer-x86_64-9.0.8~dev7-12.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597395" comment="venv-openstack-cinder-x86_64-11.2.3~dev29-14.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597396" comment="venv-openstack-designate-x86_64-5.0.3~dev7-12.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597397" comment="venv-openstack-freezer-x86_64-5.0.0.0~xrc2~dev2-10.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597398" comment="venv-openstack-glance-x86_64-15.0.3~dev3-12.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597399" comment="venv-openstack-heat-x86_64-9.0.8~dev22-12.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597400" comment="venv-openstack-horizon-x86_64-12.0.5~dev3-14.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597401" comment="venv-openstack-ironic-x86_64-9.1.8~dev8-12.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597402" comment="venv-openstack-keystone-x86_64-12.0.4~dev11-11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597403" comment="venv-openstack-magnum-x86_64-5.0.2_5.0.2_5.0.2~dev31-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597404" comment="venv-openstack-manila-x86_64-5.1.1~dev5-12.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597405" comment="venv-openstack-monasca-ceilometer-x86_64-1.5.1_1.5.1_1.5.1~dev3-8.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597406" comment="venv-openstack-monasca-x86_64-2.2.2~dev1-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597407" comment="venv-openstack-murano-x86_64-4.0.2~dev2-12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597408" comment="venv-openstack-neutron-x86_64-11.0.9~dev69-13.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597409" comment="venv-openstack-nova-x86_64-16.1.9~dev76-11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597410" comment="venv-openstack-octavia-x86_64-1.0.6~dev3-12.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597411" comment="venv-openstack-sahara-x86_64-7.0.5~dev4-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597412" comment="venv-openstack-swift-x86_64-2.15.2_2.15.2_2.15.2~dev32-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597413" comment="venv-openstack-trove-x86_64-8.0.2~dev2-11.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148349" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1106383" ref_url="https://bugzilla.suse.com/1106383" source="BUGZILLA"/>
		<reference ref_id="1133495" ref_url="https://bugzilla.suse.com/1133495" source="BUGZILLA"/>
		<reference ref_id="1139459" ref_url="https://bugzilla.suse.com/1139459" source="BUGZILLA"/>
		<reference ref_id="1151377" ref_url="https://bugzilla.suse.com/1151377" source="BUGZILLA"/>
		<reference ref_id="1151506" ref_url="https://bugzilla.suse.com/1151506" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1155574" ref_url="https://bugzilla.suse.com/1155574" source="BUGZILLA"/>
		<reference ref_id="1156482" ref_url="https://bugzilla.suse.com/1156482" source="BUGZILLA"/>
		<reference ref_id="1159814" ref_url="https://bugzilla.suse.com/1159814" source="BUGZILLA"/>
		<reference ref_id="1162108" ref_url="https://bugzilla.suse.com/1162108" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1712" ref_url="https://www.suse.com/security/cve/CVE-2020-1712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006452.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2020-1712 (bsc#bsc#1162108)
  Fix a heap use-after-free vulnerability, when asynchronous
  Polkit queries were performed while handling Dbus messages. A local
  unprivileged attacker could have abused this flaw to crash systemd services or
  potentially execute code and elevate their privileges, by sending specially
  crafted Dbus messages.

- Unconfirmed fix for prevent hanging of systemctl during restart. (bsc#1139459)
- Fix warnings thrown during package installation. (bsc#1154043)
- Fix for system-udevd prevent crash within OES2018. (bsc#1151506)
- Fragments of masked units ought not be considered for 'NeedDaemonReload'. (bsc#1156482)
- Wait for workers to finish when exiting. (bsc#1106383)
- Improve log message when inotify limit is reached. (bsc#1155574)
- Mention in the man pages that alias names are only effective after command 'systemctl enable'. (bsc#1151377)
- Introduce function for reading virtual files in 'sysfs' and 'procfs'. (bsc#1133495, bsc#1159814)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106383">SUSE bug 1106383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133495">SUSE bug 1133495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139459">SUSE bug 1139459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151377">SUSE bug 1151377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151506">SUSE bug 1151506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155574">SUSE bug 1155574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156482">SUSE bug 1156482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159814">SUSE bug 1159814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162108">SUSE bug 1162108</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1712/">CVE-2020-1712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1712">CVE-2020-1712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522619" comment="libsystemd0-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522620" comment="libsystemd0-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531525" comment="libudev-devel-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522621" comment="libudev1-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522622" comment="libudev1-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522623" comment="systemd-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522624" comment="systemd-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522625" comment="systemd-bash-completion-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522626" comment="systemd-sysvinit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522627" comment="udev-228-150.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148350" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.24 - OpenJDK 7u281 (October 2020 CPU, bsc#1177943)
  * Security fixes
    + JDK-8233624: Enhance JNI linkage
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8240124: Better VM Interning
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Import of OpenJDK 7 u281 build 1
    + JDK-8145096: Undefined behaviour in HotSpot
    + JDK-8215265: C2: range check elimination may allow illegal
      out of bound access
  * Backports
    + JDK-8250861, PR3812: Crash in MinINode::Ideal(PhaseGVN*, bool)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531526" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531527" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531528" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531529" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148351" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1178387" ref_url="https://bugzilla.suse.com/1178387" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007768.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25692">CVE-2020-25692 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531530" comment="libldap-2_4-2-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531531" comment="libldap-2_4-2-32bit-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531532" comment="openldap2-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531533" comment="openldap2-back-meta-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531534" comment="openldap2-client-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531535" comment="openldap2-doc-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531536" comment="openldap2-ppolicy-check-password-1.2-18.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148352" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1178588" ref_url="https://bugzilla.suse.com/1178588" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007779.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-49 (bsc#1178588)
  * CVE-2020-26950 (bmo#1675905)
    Write side effects in MCallGetProperty opcode not accounted
    for
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178588">SUSE bug 1178588</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26950">CVE-2020-26950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531537" comment="MozillaFirefox-78.4.1-112.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531538" comment="MozillaFirefox-devel-78.4.1-112.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531539" comment="MozillaFirefox-translations-common-78.4.1-112.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148353" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql96, postgresql10 and postgresql12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1171924" ref_url="https://bugzilla.suse.com/1171924" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007780.html" source="SUSE-SU"/>
		<description>


This update changes the internal packaging for postgresql, and so contains
all currently maintained postgresql versions across our SUSE Linux Enterprise 12
products.


* postgresql12 is shipped new in version 12.3 (bsc#1171924).

  The server and client packages only on SUSE Linux Enterprise Server 12 SP5,
  the libraries on SUSE Linux Enterprise Server 12 SP2 LTSS up to 12 SP5.

  + https://www.postgresql.org/about/news/2038/
  + https://www.postgresql.org/docs/12/release-12-3.html


* postgresql10 is updated to 10.13 (bsc#1171924).

  On SUSE Linux Enterprise Server 12 SP2 LTSS up to 12 SP5.

  +  https://www.postgresql.org/about/news/2038/
  +  https://www.postgresql.org/docs/10/release-10-13.html


* postgresql96 is updated to 9.6.18 (bsc#1171924):

  +  https://www.postgresql.org/about/news/2038/
  +  https://www.postgresql.org/docs/9.6/release-9-6-18.html

  On SUSE Linux Enterprise Server 12-SP2 and 12-SP3 LTSS only.

* postgresql 9.4 is updated to 9.4.26:

  +  https://www.postgresql.org/about/news/2011/
  +  https://www.postgresql.org/docs/9.4/release-9-4-26.html
  +  https://www.postgresql.org/about/news/1994/
  +  https://www.postgresql.org/docs/9.4/release-9-4-25.html

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171924">SUSE bug 1171924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531546" comment="libecpg6-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531547" comment="libpq5-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531548" comment="libpq5-32bit-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531549" comment="postgresql-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531550" comment="postgresql-contrib-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531551" comment="postgresql-docs-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531552" comment="postgresql-plperl-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531553" comment="postgresql-plpython-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531554" comment="postgresql-pltcl-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531555" comment="postgresql-server-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531556" comment="postgresql10-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531557" comment="postgresql10-contrib-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531558" comment="postgresql10-docs-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531559" comment="postgresql10-plperl-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531560" comment="postgresql10-plpython-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531561" comment="postgresql10-pltcl-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531562" comment="postgresql10-server-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531570" comment="postgresql96-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531571" comment="postgresql96-contrib-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531572" comment="postgresql96-docs-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531573" comment="postgresql96-plperl-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531574" comment="postgresql96-plpython-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531575" comment="postgresql96-pltcl-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531576" comment="postgresql96-server-9.6.19-6.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148354" version="1" class="patch">
	<metadata>
		<title>Security update for raptor (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1178593" ref_url="https://bugzilla.suse.com/1178593" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18926" ref_url="https://www.suse.com/security/cve/CVE-2017-18926/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007782.html" source="SUSE-SU"/>
		<description>
This update for raptor fixes the following issues:

- Fixed a heap overflow vulnerability (bsc#1178593, CVE-2017-18926).
- Update raptor to version 2.0.15
  * Made several fixes to Turtle / N-Triples family of parsers and serializers
  * Added utility functions for re-entrant sorting of objects and sequences.
  * Made other fixes and improvements including fixing reported issues:
    0000574, 0000575, 0000576, 0000577, 0000579, 0000581 and 0000584.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178593">SUSE bug 1178593</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18926/">CVE-2017-18926 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18926">CVE-2017-18926 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531577" comment="libraptor2-0-2.0.15-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148355" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1178671" ref_url="https://bugzilla.suse.com/1178671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12321" ref_url="https://www.suse.com/security/cve/CVE-2020-12321/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007786.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issue:

- CVE-2020-12321: Updated the Intel Bluetooth firmware for buffer overflow security bugs (bsc#1178671).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-17"/>
	<updated date="2020-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178671">SUSE bug 1178671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12321/">CVE-2020-12321 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12321">CVE-2020-12321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531578" comment="kernel-firmware-20170530-21.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531579" comment="ucode-amd-20170530-21.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148356" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1178512" ref_url="https://bugzilla.suse.com/1178512" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28196" ref_url="https://www.suse.com/security/cve/CVE-2020-28196/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007792.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following security issue:

- CVE-2020-28196: Fixed an unbounded recursion via an ASN.1-encoded Kerberos message (bsc#1178512).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178512">SUSE bug 1178512</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28196/">CVE-2020-28196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28196">CVE-2020-28196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531584" comment="krb5-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531585" comment="krb5-32bit-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531586" comment="krb5-client-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531587" comment="krb5-doc-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531588" comment="krb5-plugin-kdb-ldap-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531589" comment="krb5-plugin-preauth-otp-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531590" comment="krb5-plugin-preauth-pkinit-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531591" comment="krb5-server-1.12.5-40.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148357" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007828.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

Upgrade to version 10.15:

  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/10/release-10-15.html

Update to 10.14:

  * CVE-2020-14349, bsc#1175193: Set a secure search_path in
    logical replication walsenders and apply workers
  * CVE-2020-14350, bsc#1175194: Make contrib modules' installation
    scripts more secure.
  * https://www.postgresql.org/docs/10/release-10-14.html

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14349">CVE-2020-14349 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531592" comment="postgresql10-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531593" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531595" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531596" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531597" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531598" comment="postgresql10-server-10.15-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148358" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007833.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

Upgrade to version 9.6.20:

  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/9.6/release-9-6-20.html

Changes from 9.6.19:

  * CVE-2020-14350, bsc#1175194: Make contrib modules installation
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531599" comment="postgresql96-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531600" comment="postgresql96-contrib-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531601" comment="postgresql96-docs-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531602" comment="postgresql96-plperl-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531603" comment="postgresql96-plpython-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531604" comment="postgresql96-pltcl-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531605" comment="postgresql96-server-9.6.20-6.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148359" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1083244" ref_url="https://bugzilla.suse.com/1083244" source="BUGZILLA"/>
		<reference ref_id="1121826" ref_url="https://bugzilla.suse.com/1121826" source="BUGZILLA"/>
		<reference ref_id="1121872" ref_url="https://bugzilla.suse.com/1121872" source="BUGZILLA"/>
		<reference ref_id="1157298" ref_url="https://bugzilla.suse.com/1157298" source="BUGZILLA"/>
		<reference ref_id="1160917" ref_url="https://bugzilla.suse.com/1160917" source="BUGZILLA"/>
		<reference ref_id="1170415" ref_url="https://bugzilla.suse.com/1170415" source="BUGZILLA"/>
		<reference ref_id="1175228" ref_url="https://bugzilla.suse.com/1175228" source="BUGZILLA"/>
		<reference ref_id="1175306" ref_url="https://bugzilla.suse.com/1175306" source="BUGZILLA"/>
		<reference ref_id="1175721" ref_url="https://bugzilla.suse.com/1175721" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1176011" ref_url="https://bugzilla.suse.com/1176011" source="BUGZILLA"/>
		<reference ref_id="1176069" ref_url="https://bugzilla.suse.com/1176069" source="BUGZILLA"/>
		<reference ref_id="1176235" ref_url="https://bugzilla.suse.com/1176235" source="BUGZILLA"/>
		<reference ref_id="1176253" ref_url="https://bugzilla.suse.com/1176253" source="BUGZILLA"/>
		<reference ref_id="1176278" ref_url="https://bugzilla.suse.com/1176278" source="BUGZILLA"/>
		<reference ref_id="1176381" ref_url="https://bugzilla.suse.com/1176381" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176423" ref_url="https://bugzilla.suse.com/1176423" source="BUGZILLA"/>
		<reference ref_id="1176482" ref_url="https://bugzilla.suse.com/1176482" source="BUGZILLA"/>
		<reference ref_id="1176721" ref_url="https://bugzilla.suse.com/1176721" source="BUGZILLA"/>
		<reference ref_id="1176722" ref_url="https://bugzilla.suse.com/1176722" source="BUGZILLA"/>
		<reference ref_id="1176725" ref_url="https://bugzilla.suse.com/1176725" source="BUGZILLA"/>
		<reference ref_id="1176816" ref_url="https://bugzilla.suse.com/1176816" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176990" ref_url="https://bugzilla.suse.com/1176990" source="BUGZILLA"/>
		<reference ref_id="1177027" ref_url="https://bugzilla.suse.com/1177027" source="BUGZILLA"/>
		<reference ref_id="1177086" ref_url="https://bugzilla.suse.com/1177086" source="BUGZILLA"/>
		<reference ref_id="1177121" ref_url="https://bugzilla.suse.com/1177121" source="BUGZILLA"/>
		<reference ref_id="1177165" ref_url="https://bugzilla.suse.com/1177165" source="BUGZILLA"/>
		<reference ref_id="1177206" ref_url="https://bugzilla.suse.com/1177206" source="BUGZILLA"/>
		<reference ref_id="1177226" ref_url="https://bugzilla.suse.com/1177226" source="BUGZILLA"/>
		<reference ref_id="1177410" ref_url="https://bugzilla.suse.com/1177410" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177511" ref_url="https://bugzilla.suse.com/1177511" source="BUGZILLA"/>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="1177725" ref_url="https://bugzilla.suse.com/1177725" source="BUGZILLA"/>
		<reference ref_id="1177766" ref_url="https://bugzilla.suse.com/1177766" source="BUGZILLA"/>
		<reference ref_id="1177816" ref_url="https://bugzilla.suse.com/1177816" source="BUGZILLA"/>
		<reference ref_id="1178123" ref_url="https://bugzilla.suse.com/1178123" source="BUGZILLA"/>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178782" ref_url="https://bugzilla.suse.com/1178782" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18204" ref_url="https://www.suse.com/security/cve/CVE-2017-18204/" source="CVE"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-25641" ref_url="https://www.suse.com/security/cve/CVE-2020-25641/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bug fixes.


The following security bugs were fixed:

- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-25212: Fixed A TOCTOU mismatch in the NFS client code which could have been used by local attackers to corrupt memory (bsc#1176381).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).
- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2019-19063: Fixed two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c, which could have allowed an attacker to cause a denial of service (memory consumption) (bsc#1157298).
- CVE-2019-6133: In PolicyKit (aka polkit), the 'start time' protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c (bsc#1121872).
- CVE-2017-18204: Fixed a denial of service in the ocfs2_setattr function of fs/ocfs2/file.c (bnc#1083244).

The following non-security bugs were fixed:

- hv: vmbus: Add timeout to vmbus_wait_for_unload (bsc#1177816).
- hyperv_fb: disable superfluous VERSION_WIN10_V5 case (bsc#1175306).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1176816).
- net/packet: fix overflow in tpacket_rcv (bsc#1176069).
- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083244">SUSE bug 1083244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121872">SUSE bug 1121872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157298">SUSE bug 1157298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160917">SUSE bug 1160917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175228">SUSE bug 1175228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175306">SUSE bug 1175306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176011">SUSE bug 1176011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176253">SUSE bug 1176253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176721">SUSE bug 1176721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176725">SUSE bug 1176725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176816">SUSE bug 1176816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176990">SUSE bug 1176990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177027">SUSE bug 1177027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177086">SUSE bug 1177086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177121">SUSE bug 1177121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177165">SUSE bug 1177165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177226">SUSE bug 1177226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177410">SUSE bug 1177410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177725">SUSE bug 1177725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177816">SUSE bug 1177816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178782">SUSE bug 1178782</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18204/">CVE-2017-18204 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18204">CVE-2017-18204 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19063">CVE-2019-19063 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6133">CVE-2019-6133 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0404">CVE-2020-0404 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0427">CVE-2020-0427 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0432">CVE-2020-0432 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12352">CVE-2020-12352 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14351">CVE-2020-14351 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14390">CVE-2020-14390 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25284">CVE-2020-25284 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25641/">CVE-2020-25641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25641">CVE-2020-25641 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25643">CVE-2020-25643 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25656">CVE-2020-25656 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26088">CVE-2020-26088 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555870" comment="kernel-default-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555871" comment="kernel-default-base-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555872" comment="kernel-default-devel-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556703" comment="kernel-default-kgraft-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538784" comment="kernel-devel-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538785" comment="kernel-macros-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538786" comment="kernel-source-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555873" comment="kernel-syms-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556705" comment="kgraft-patch-4_4_180-94_135-default-1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148360" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173592" ref_url="https://bugzilla.suse.com/1173592" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="1178971" ref_url="https://bugzilla.suse.com/1178971" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated Intel CPU Microcode to 20201118 official release. (bsc#1178971)
 - Removed TGL/06-8c-01/80 due to functional issues with some OEM platforms.
 - CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) INTEL-SA-00389 (bsc#1170446)
 - CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)
 - CVE-2020-8696: Vector Register Sampling Active INTEL-SA-00381 (bsc#1173592)

- Release notes:
  - Security updates for [INTEL-SA-00381](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html).
  - Security updates for [INTEL-SA-00389](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html).
  - Update for functional issues. Refer to [Second Generation Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
  - Update for functional issues. Refer to [10th Gen Intel? Core™ Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
  - Update for functional issues. Refer to [8th and 9th Gen Intel? Core™ Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
  - Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel? Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
  - Update for functional issues. Refer to [6th Gen Intel? Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

  ### New Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | LKF            | B2/B3    | 06-8a-01/10 |          | 00000028 | Core w/Hybrid Technology
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  ### Updated Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173592">SUSE bug 1173592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178971">SUSE bug 1178971</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8696">CVE-2020-8696 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531614" comment="ucode-intel-20201118-13.81.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148361" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1166751" ref_url="https://bugzilla.suse.com/1166751" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0556" ref_url="https://www.suse.com/security/cve/CVE-2020-0556/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007858.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2020-0556: Fixed improper access control which may lead to escalation of privilege and denial of service by an unauthenticated user (bsc#1166751).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166751">SUSE bug 1166751</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-0556/">CVE-2020-0556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0556">CVE-2020-0556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531615" comment="bluez-5.13-5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531616" comment="libbluetooth3-5.13-5.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148362" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1178824" ref_url="https://bugzilla.suse.com/1178824" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.5.0 ESR (bsc#1178824)
  * CVE-2020-26951: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code
  * CVE-2020-16012: Variable time processing of cross-origin images during drawImage calls
  * CVE-2020-26953: Fullscreen could be enabled without displaying the security UI
  * CVE-2020-26956: XSS through paste (manual and clipboard API)
  * CVE-2020-26958: Requests intercepted through ServiceWorkers lacked MIME type restrictions
  * CVE-2020-26959: Use-after-free in WebRequestService
  * CVE-2020-26960: Potential use-after-free in uses of nsTArray
  * CVE-2020-15999: Heap buffer overflow in freetype
  * CVE-2020-26961: DoH did not filter IPv4 mapped IP Addresses
  * CVE-2020-26965: Software keyboards may have remembered typed passwords
  * CVE-2020-26966: Single-word search queries were also broadcast to local network
  * CVE-2020-26968: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-27"/>
	<updated date="2020-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16012">CVE-2020-16012 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26951">CVE-2020-26951 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26953">CVE-2020-26953 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26956">CVE-2020-26956 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26958">CVE-2020-26958 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26959">CVE-2020-26959 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26960">CVE-2020-26960 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26961">CVE-2020-26961 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26965">CVE-2020-26965 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26966">CVE-2020-26966 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26968">CVE-2020-26968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531617" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531618" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531619" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148363" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1178682" ref_url="https://bugzilla.suse.com/1178682" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007885.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2020-25708 [bsc#1178682], libvncserver/rfbserver.c has a divide by zero which could result in DoS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-27"/>
	<updated date="2020-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178682">SUSE bug 1178682</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25708">CVE-2020-25708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531620" comment="libvncclient0-0.9.9-17.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531621" comment="libvncserver0-0.9.9-17.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148364" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1174908" ref_url="https://bugzilla.suse.com/1174908" source="BUGZILLA"/>
		<reference ref_id="1177596" ref_url="https://bugzilla.suse.com/1177596" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007901.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to privilege escalation (bsc#1177596).
- CVE-2020-14360: Fixed an out of bounds memory accesses on too short request which could lead to denial of service (bsc#1174908).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14360">CVE-2020-14360 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25712">CVE-2020-25712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531622" comment="xorg-x11-server-7.6_1.18.3-76.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531623" comment="xorg-x11-server-extra-7.6_1.18.3-76.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148365" version="1" class="patch">
	<metadata>
		<title>Security update for python-setuptools (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007907.html" source="SUSE-SU"/>
		<description>
This update for python-setuptools fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009524556" comment="python-setuptools-40.6.2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525277" comment="python3-setuptools-40.6.2-4.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148366" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007903.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531624" comment="libpython3_4m1_0-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531625" comment="python3-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531626" comment="python3-base-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531627" comment="python3-curses-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531628" comment="python3-devel-3.4.10-25.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148367" version="1" class="patch">
	<metadata>
		<title>Security update for gdm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1178150" ref_url="https://bugzilla.suse.com/1178150" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16125" ref_url="https://www.suse.com/security/cve/CVE-2020-16125/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007912.html" source="SUSE-SU"/>
		<description>
This update for gdm fixes the following issues:

- CVE-2020-16125: Fixed a privilege escalation (bsc#1178150).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178150">SUSE bug 1178150</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16125/">CVE-2020-16125 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16125">CVE-2020-16125 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531629" comment="gdm-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531630" comment="gdm-lang-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531631" comment="gdmflexiserver-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531632" comment="libgdm1-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531633" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148368" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1178168" ref_url="https://bugzilla.suse.com/1178168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007919.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-25659: Attempted to mitigate Bleichenbacher attacks on RSA decryption (bsc#1178168).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178168">SUSE bug 1178168</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25659">CVE-2020-25659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531634" comment="python-cryptography-2.1.4-7.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531635" comment="python3-cryptography-2.1.4-7.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148369" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<description>

This update for postgresql12 fixes the following issues:

Upgrade to version 12.5:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/12/release-12-5.html

The previous postgresql12 update already addressed:

Update to 12.4:

* CVE-2020-14349, bsc#1175193: Set a secure search_path in logical replication walsenders and apply workers
* CVE-2020-14350, bsc#1175194: Make contrib modules' installation scripts more secure.

* https://www.postgresql.org/docs/12/release-12-4.html

  		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14349">CVE-2020-14349 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531636" comment="libecpg6-12.5-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531637" comment="libpq5-12.5-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531638" comment="libpq5-32bit-12.5-3.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148370" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1177409" ref_url="https://bugzilla.suse.com/1177409" source="BUGZILLA"/>
		<reference ref_id="1177412" ref_url="https://bugzilla.suse.com/1177412" source="BUGZILLA"/>
		<reference ref_id="1177413" ref_url="https://bugzilla.suse.com/1177413" source="BUGZILLA"/>
		<reference ref_id="1177414" ref_url="https://bugzilla.suse.com/1177414" source="BUGZILLA"/>
		<reference ref_id="1178591" ref_url="https://bugzilla.suse.com/1178591" source="BUGZILLA"/>
		<reference ref_id="1178963" ref_url="https://bugzilla.suse.com/1178963" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674/" source="CVE"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1178963 - stack corruption from XSA-346 change (XSA-355) 
- bsc#1177409 - CVE-2020-27674: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286)
- bsc#1177412 - CVE-2020-27672: Race condition in Xen mapping code (XSA-345)
- bsc#1177413 - CVE-2020-27671: undue deferral of IOMMU TLB flushes (XSA-346)
- bsc#1177414 - CVE-2020-27670: unsafe AMD IOMMU page table updates (XSA-347)
- bsc#1178591 - CVE-2020-28368: Intel RAPL sidechannel attack aka PLATYPUS attack aka XSA-351
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177413">SUSE bug 1177413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178963">SUSE bug 1178963</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27670">CVE-2020-27670 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27671">CVE-2020-27671 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27672">CVE-2020-27672 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27674">CVE-2020-27674 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28368">CVE-2020-28368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538789" comment="xen-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538790" comment="xen-doc-html-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538791" comment="xen-libs-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538792" comment="xen-libs-32bit-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538793" comment="xen-tools-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538794" comment="xen-tools-domU-4.9.4_14-3.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148371" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1179035" ref_url="https://bugzilla.suse.com/1179035" source="BUGZILLA"/>
		<reference ref_id="1179113" ref_url="https://bugzilla.suse.com/1179113" source="BUGZILLA"/>
		<reference ref_id="1179461" ref_url="https://bugzilla.suse.com/1179461" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007921.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- Find and display the content of messages properly. (bsc#1179461)
- CVE-2020-28896: incomplete connection termination could send credentials over unencrypted connections. (bsc#1179035)
- Avoid that message with a million tiny parts can freeze MUA for several minutes. (bsc#1179113)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179035">SUSE bug 1179035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179113">SUSE bug 1179113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179461">SUSE bug 1179461</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28896">CVE-2020-28896 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531639" comment="mutt-1.10.1-55.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148372" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1137832" ref_url="https://bugzilla.suse.com/1137832" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2820-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006487.html" source="SUSE-SU"/>
		<description>
This update for dbus-1 fixes the following issues:
	  
Security issue fixed:     
    
- CVE-2019-12749: Fixed an implementation flaw in DBUS_COOKIE_SHA1 which 
  could have allowed local attackers to bypass authentication (bsc#1137832).   
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-18"/>
	<updated date="2020-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12749">CVE-2019-12749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522634" comment="dbus-1-1.8.22-29.17.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522635" comment="dbus-1-x11-1.8.22-29.17.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522636" comment="libdbus-1-3-1.8.22-29.17.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522637" comment="libdbus-1-3-32bit-1.8.22-29.17.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148373" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1179491" ref_url="https://bugzilla.suse.com/1179491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007976.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2020-1971: Fixed a null pointer dereference in EDIPARTYNAME (bsc#1179491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">CVE-2020-1971 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531646" comment="libopenssl-devel-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531647" comment="libopenssl1_0_0-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531648" comment="libopenssl1_0_0-32bit-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531649" comment="libopenssl1_0_0-hmac-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531650" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531651" comment="openssl-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531652" comment="openssl-doc-1.0.2j-60.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148374" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007975.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531653" comment="libpython2_7-1_0-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531654" comment="libpython2_7-1_0-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531655" comment="python-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531656" comment="python-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531657" comment="python-base-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531658" comment="python-base-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531659" comment="python-curses-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531660" comment="python-demo-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531661" comment="python-devel-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531662" comment="python-doc-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531663" comment="python-doc-pdf-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531664" comment="python-gdbm-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531665" comment="python-idle-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531666" comment="python-tk-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531667" comment="python-xml-2.7.17-28.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148375" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1161799" ref_url="https://bugzilla.suse.com/1161799" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.5.0 ESR
  * CVE-2020-6796 (bmo#1610426)
    Missing bounds check on shared memory read in the parent
    process
  * CVE-2020-6797 (bmo#1596668)
    Extensions granted downloads.open permission could open
    arbitrary applications on Mac OSX
  * CVE-2020-6798 (bmo#1602944)
    Incorrect parsing of template tag could result in JavaScript
    injection
  * CVE-2020-6799 (bmo#1606596)
    Arbitrary code execution when opening pdf links from other
    applications, when Firefox is configured as default pdf
    reader
  * CVE-2020-6800 (bmo#1595786, bmo#1596706, bmo#1598543,
    bmo#1604851, bmo#1605777, bmo#1608580, bmo#1608785)
    Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
  * Fixed: Fixed various issues opening files with spaces in
    their path (bmo#1601905, bmo#1602726)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-17"/>
	<updated date="2020-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161799">SUSE bug 1161799</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6796">CVE-2020-6796 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6797">CVE-2020-6797 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6798">CVE-2020-6798 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6799">CVE-2020-6799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6800">CVE-2020-6800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522638" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522639" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148376" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1180039" ref_url="https://bugzilla.suse.com/1180039" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2020-55 (bsc#1180039)
  * CVE-2020-16042 (bmo#1679003)
    Operations on a BigInt could have caused uninitialized memory
    to be exposed
  * CVE-2020-26971 (bmo#1663466)
    Heap buffer overflow in WebGL
  * CVE-2020-26973 (bmo#1680084)
    CSS Sanitizer performed incorrect sanitization
  * CVE-2020-26974 (bmo#1681022)
    Incorrect cast of StyleGenericFlexBasis resulted in a heap
    use-after-free
  * CVE-2020-26978 (bmo#1677047)
    Internal network hosts could have been probed by a malicious
    webpage
  * CVE-2020-35111 (bmo#1657916)
    The proxy.onRequest API did not catch view-source URLs
  * CVE-2020-35112 (bmo#1661365)
    Opening an extension-less download may have inadvertently
    launched an executable instead
  * CVE-2020-35113 (bmo#1664831, bmo#1673589)
    Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16042">CVE-2020-16042 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26971">CVE-2020-26971 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26973">CVE-2020-26973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26974">CVE-2020-26974 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26978">CVE-2020-26978 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35111">CVE-2020-35111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35112">CVE-2020-35112 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35113">CVE-2020-35113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531677" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531678" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531679" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148377" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1118459" ref_url="https://bugzilla.suse.com/1118459" source="BUGZILLA"/>
		<reference ref_id="1119353" ref_url="https://bugzilla.suse.com/1119353" source="BUGZILLA"/>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="1171981" ref_url="https://bugzilla.suse.com/1171981" source="BUGZILLA"/>
		<reference ref_id="1174250" ref_url="https://bugzilla.suse.com/1174250" source="BUGZILLA"/>
		<reference ref_id="1174255" ref_url="https://bugzilla.suse.com/1174255" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123/" source="CVE"/>
		<reference ref_id="CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327/" source="CVE"/>
		<reference ref_id="CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341/" source="CVE"/>
		<reference ref_id="CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350/" source="CVE"/>
		<reference ref_id="CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

clamav was updated to 0.103.0 to implement jsc#ECO-3010 and bsc#1118459.

* clamd can now reload the signature database without blocking
  scanning. This multi-threaded database reload improvement was made
  possible thanks to a community effort.
  - Non-blocking database reloads are now the default behavior. Some
    systems that are more constrained on RAM may need to disable
    non-blocking reloads as it will temporarily consume two times as
    much memory. We added a new clamd config option
    ConcurrentDatabaseReload, which may be set to no.
* Fix clamav-milter.service (requires clamd.service to run)
* bsc#1119353, clamav-fips.patch: Fix freshclam crash in FIPS mode.
* Partial sync with SLE15.

Update to version 0.102.4

Accumulated security fixes:

* CVE-2020-3350: Fix a vulnerability wherein a malicious user could
  replace a scan target's directory with a symlink to another path
  to trick clamscan, clamdscan, or clamonacc into removing or moving
  a different file (eg. a critical system file). The issue would
  affect users that use the --move or --remove options for clamscan,
  clamdscan, and clamonacc. (bsc#1174255)
* CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
  module in ClamAV 0.102.3 that could cause a Denial-of-Service
  (DoS) condition. Improper bounds checking results in an
  out-of-bounds read which could cause a crash. The previous fix for
  this CVE in 0.102.3 was incomplete. This fix correctly resolves
  the issue.
* CVE-2020-3481: Fix a vulnerability in the EGG archive module in
  ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)
  condition. Improper error handling may result in a crash due to a
  NULL pointer dereference. This vulnerability is mitigated for
  those using the official ClamAV signature databases because the
  file type signatures in daily.cvd will not enable the EGG archive
  parser in versions affected by the vulnerability. (bsc#1174250)
* CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
  ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
  condition. Improper size checking of a buffer used to initialize AES
  decryption routines results in an out-of-bounds read which may cause
  a crash. (bsc#1171981)
* CVE-2020-3123: A denial-of-service (DoS) condition may occur when
  using the optional credit card data-loss-prevention (DLP) feature.
  Improper bounds checking of an unsigned variable resulted in an
  out-of-bounds read, which causes a crash.
* CVE-2019-15961: A Denial-of-Service (DoS) vulnerability may
  occur when scanning a specially crafted email file as a result
  of excessively long scan times. The issue is resolved by
  implementing several maximums in parsing MIME messages and by
  optimizing use of memory allocation. (bsc#1157763).
* CVE-2019-12900: An out of bounds write in the NSIS bzip2
  (bsc#1149458)
* CVE-2019-12625: Introduce a configurable time limit to mitigate
  zip bomb vulnerability completely. Default is 2 minutes,
  configurable useing the clamscan --max-scantime and for clamd
  using the MaxScanTime config option (bsc#1144504)

Update to version 0.101.3:

* ZIP bomb causes extreme CPU spikes (bsc#1144504)

Update to version 0.101.2 (bsc#1118459):

* Support for RAR v5 archive extraction.
* Incompatible changes to the arguments of cl_scandesc,
  cl_scandesc_callback, and cl_scanmap_callback.
* Scanning options have been converted from a single flag
  bit-field into a structure of multiple categorized flag
  bit-fields.
* The CL_SCAN_HEURISTIC_ENCRYPTED scan option was replaced by
  2 new scan options: CL_SCAN_HEURISTIC_ENCRYPTED_ARCHIVE, and
  CL_SCAN_HEURISTIC_ENCRYPTED_DOC
* Incompatible clamd.conf and command line interface changes.
* Heuristic Alerts' (aka 'Algorithmic Detection') options have
  been changed to make the names more consistent. The original
  options are deprecated in 0.101, and will be removed in a
  future feature release.
* For details, see https://blog.clamav.net/2018/12/clamav-01010-has-been-released.html		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118459">SUSE bug 1118459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119353">SUSE bug 1119353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171981">SUSE bug 1171981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174255">SUSE bug 1174255</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15961">CVE-2019-15961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3123">CVE-2020-3123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3327">CVE-2020-3327 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3341">CVE-2020-3341 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3350">CVE-2020-3350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3481">CVE-2020-3481 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531686" comment="clamav-0.103.0-33.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148378" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1159635" ref_url="https://bugzilla.suse.com/1159635" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008123.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2019-19906: Fixed an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet (bsc#1159635).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-28"/>
	<updated date="2020-12-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159635">SUSE bug 1159635</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19906">CVE-2019-19906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531687" comment="cyrus-sasl-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531688" comment="cyrus-sasl-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531689" comment="cyrus-sasl-crammd5-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531690" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531691" comment="cyrus-sasl-digestmd5-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531692" comment="cyrus-sasl-gssapi-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531693" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531694" comment="cyrus-sasl-otp-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531695" comment="cyrus-sasl-otp-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531696" comment="cyrus-sasl-plain-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531697" comment="cyrus-sasl-plain-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531698" comment="libsasl2-3-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531699" comment="libsasl2-3-32bit-2.1.26-8.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148379" version="1" class="patch">
	<metadata>
		<title>Security update for gcc9 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1114592" ref_url="https://bugzilla.suse.com/1114592" source="BUGZILLA"/>
		<reference ref_id="1135254" ref_url="https://bugzilla.suse.com/1135254" source="BUGZILLA"/>
		<reference ref_id="1141897" ref_url="https://bugzilla.suse.com/1141897" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1142654" ref_url="https://bugzilla.suse.com/1142654" source="BUGZILLA"/>
		<reference ref_id="1148517" ref_url="https://bugzilla.suse.com/1148517" source="BUGZILLA"/>
		<reference ref_id="1149145" ref_url="https://bugzilla.suse.com/1149145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-15847" ref_url="https://www.suse.com/security/cve/CVE-2019-15847/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006488.html" source="SUSE-SU"/>
		<description>
This update for gcc9 fixes the following issues:

The GNU Compiler Collection is shipped in version 9.

A detailed changelog on what changed in GCC 9 is available at https://gcc.gnu.org/gcc-9/changes.html

The compilers have been added to the SUSE Linux Enterprise Toolchain Module.

To use these compilers, install e.g. gcc9, gcc9-c++ and build with CC=gcc-9
CXX=g++-9 set.


For SUSE Linux Enterprise base products, the libstdc++6, libgcc_s1 and
other compiler libraries have been switched from their gcc8 variants to
their gcc9 variants.

Security issues fixed:

- CVE-2019-15847: Fixed a miscompilation in the POWER9 back end, that optimized multiple calls of the __builtin_darn intrinsic into a single call. (bsc#1149145)
- CVE-2019-14250: Fixed a heap overflow in the LTO linker. (bsc#1142649)

Non-security issues fixed:

- Split out libstdc++ pretty-printers into a separate package supplementing gdb and the installed runtime. (bsc#1135254)
- Fixed miscompilation for vector shift on s390. (bsc#1141897)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-14"/>
	<updated date="2020-04-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114592">SUSE bug 1114592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135254">SUSE bug 1135254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141897">SUSE bug 1141897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142654">SUSE bug 1142654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148517">SUSE bug 1148517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149145">SUSE bug 1149145</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14250">CVE-2019-14250 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15847/">CVE-2019-15847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15847">CVE-2019-15847 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531700" comment="libasan5-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531701" comment="libasan5-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531702" comment="libatomic1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531703" comment="libatomic1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531704" comment="libgcc_s1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531705" comment="libgcc_s1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531706" comment="libgfortran5-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531707" comment="libgfortran5-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531708" comment="libgo14-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531709" comment="libgo14-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531710" comment="libgomp1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531711" comment="libgomp1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531712" comment="libitm1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531713" comment="libitm1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531714" comment="liblsan0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531715" comment="libquadmath0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531716" comment="libquadmath0-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531717" comment="libstdc++6-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531718" comment="libstdc++6-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531719" comment="libstdc++6-locale-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531720" comment="libtsan0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531721" comment="libubsan1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531722" comment="libubsan1-32bit-9.2.1+r275327-1.3.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148380" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1176782" ref_url="https://bugzilla.suse.com/1176782" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1179496" ref_url="https://bugzilla.suse.com/1179496" source="BUGZILLA"/>
		<reference ref_id="1179498" ref_url="https://bugzilla.suse.com/1179498" source="BUGZILLA"/>
		<reference ref_id="1179501" ref_url="https://bugzilla.suse.com/1179501" source="BUGZILLA"/>
		<reference ref_id="1179502" ref_url="https://bugzilla.suse.com/1179502" source="BUGZILLA"/>
		<reference ref_id="1179506" ref_url="https://bugzilla.suse.com/1179506" source="BUGZILLA"/>
		<reference ref_id="1179514" ref_url="https://bugzilla.suse.com/1179514" source="BUGZILLA"/>
		<reference ref_id="1179516" ref_url="https://bugzilla.suse.com/1179516" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480/" source="CVE"/>
		<reference ref_id="CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481/" source="CVE"/>
		<reference ref_id="CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483/" source="CVE"/>
		<reference ref_id="CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484/" source="CVE"/>
		<reference ref_id="CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566/" source="CVE"/>
		<reference ref_id="CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570/" source="CVE"/>
		<reference ref_id="CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-29480: Fixed an issue which could have allowed leak of non-sensitive data to administrator guests (bsc#117949 XSA-115).
- CVE-2020-29481: Fixed an issue which could have allowd to new domains to inherit existing node permissions (bsc#1179498 XSA-322). 
- CVE-2020-29483: Fixed an issue where guests could disturb domain cleanup (bsc#1179502 XSA-325).
- CVE-2020-29484: Fixed an issue where guests could crash xenstored via watchs (bsc#1179501 XSA-324). 
- CVE-2020-29566: Fixed an undue recursion in x86 HVM context switch code (bsc#1179506 XSA-348).
- CVE-2020-29570: Fixed an issue where FIFO event channels control block related ordering (bsc#1179514 XSA-358).
- CVE-2020-29571: Fixed an issue where FIFO event channels control structure ordering (bsc#1179516 XSA-359).
- CVE-2020-29130: Fixed an out-of-bounds access while processing ARP packets (bsc#1179477). 
- Fixed an issue where dump-core shows missing nr_pages during core (bsc#1176782).
- Multiple other bugs (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-29"/>
	<updated date="2020-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176782">SUSE bug 1176782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179496">SUSE bug 1179496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179498">SUSE bug 1179498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179501">SUSE bug 1179501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179502">SUSE bug 1179502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179506">SUSE bug 1179506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179514">SUSE bug 1179514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179516">SUSE bug 1179516</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29480">CVE-2020-29480 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29481">CVE-2020-29481 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29483">CVE-2020-29483 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29484">CVE-2020-29484 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29566">CVE-2020-29566 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29570">CVE-2020-29570 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29571">CVE-2020-29571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538805" comment="xen-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538806" comment="xen-doc-html-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538807" comment="xen-libs-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538808" comment="xen-libs-32bit-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538809" comment="xen-tools-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538810" comment="xen-tools-domU-4.9.4_16-3.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148381" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1162202" ref_url="https://bugzilla.suse.com/1162202" source="BUGZILLA"/>
		<reference ref_id="1162675" ref_url="https://bugzilla.suse.com/1162675" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006491.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

Security issue fixed:

- CVE-2019-18634: Fixed a buffer overflow in the passphrase prompt that could occur when pwfeedback was enabled in /etc/sudoers (bsc#1162202).

Non-security issue fixed:

- Fixed an issue where sudo -l would ask for a password even though `listpw` was set to `never` (bsc#1162675).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-19"/>
	<updated date="2020-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162202">SUSE bug 1162202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162675">SUSE bug 1162675</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18634">CVE-2019-18634 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522640" comment="sudo-1.8.20p2-3.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148382" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1138743" ref_url="https://bugzilla.suse.com/1138743" source="BUGZILLA"/>
		<reference ref_id="1154849" ref_url="https://bugzilla.suse.com/1154849" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14834" ref_url="https://www.suse.com/security/cve/CVE-2019-14834/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006501.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

Security issue fixed:

- CVE-2019-14834: Fixed a memory leak which could have allowed to remote attackers 
  to cause denial of service via DHCP response creation (bsc#1154849)

Other issue addressed:  

- Removed cache size limit (bsc#1138743).

		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-19"/>
	<updated date="2020-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1138743">SUSE bug 1138743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154849">SUSE bug 1154849</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14834/">CVE-2019-14834 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14834">CVE-2019-14834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597414" comment="dnsmasq-utils-2.78-18.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148383" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Java was updated to 7.1 Service Refresh 4 Fix Pack 60 [bsc#1162972, bsc#1160968].

Security issues fixed:

- CVE-2020-2583: Fixed a serialization vulnerability in BeanContextSupport (bsc#1162972).
- CVE-2020-2593: Fixed an incorrect check in isBuiltinStreamHandler, causing URL normalization issues (bsc#1162972).
- CVE-2020-2604: Fixed a serialization issue in jdk.serialFilter (bsc#1162972).
- CVE-2020-2659: Fixed the incomplete enforcement of the maxDatagramSockets limit in DatagramChannelImpl (bsc#1162972).

Non-security issues fixed:

* Class Libraries:
  IJ22333 HANG IN JAVA_JAVA_NET_SOCKETINPUTSTREAM_SOCKETREAD0 EVEN
          WHEN TIMEOUT IS SET
  IJ22350 JAVA 7 AND JAVA 8 NOT WORKING WELL WITH TRADITIONAL/SIMPLIFIED
          CHINESE EDITION OF WINDOWS CLIENT SYSTEM
  IJ22337 THE NAME OF THE REPUBLIC OF BELARUS IN THE RUSSIAN LOCALE
          INCONSISTENT WITH CLDR
  IJ22349 UPDATE TIMEZONE INFORMATION TO TZDATA2019C
* JIT Compiler:
  IJ11368 JAVA JIT PPC: CRASH IN JIT COMPILED CODE ON PPC MACHINES
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-07"/>
	<updated date="2020-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531724" comment="java-1_7_1-ibm-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531725" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531726" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531727" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531728" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-38.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148384" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006521.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20030">CVE-2018-20030 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9278">CVE-2019-9278 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522649" comment="libexif12-0.6.21-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522650" comment="libexif12-32bit-0.6.21-8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148385" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1158809" ref_url="https://bugzilla.suse.com/1158809" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006529.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issue fixed:

- CVE-2019-1551: Fixed an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli (bsc#1158809).

Non-security issue fixed:

- Fixed a crash in BN_copy (bsc#1160163).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158809">SUSE bug 1158809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1551">CVE-2019-1551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531729" comment="libopenssl-devel-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531730" comment="libopenssl1_0_0-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531731" comment="libopenssl1_0_0-32bit-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531732" comment="libopenssl1_0_0-hmac-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531733" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531734" comment="openssl-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531735" comment="openssl-doc-1.0.2j-60.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148386" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1162610" ref_url="https://bugzilla.suse.com/1162610" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006533.html" source="SUSE-SU"/>
		<description>
This update for ppp fixes the following security issue:

- CVE-2020-8597: Fixed a buffer overflow in the eap_request and eap_response functions (bsc#1162610).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-26"/>
	<updated date="2020-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162610">SUSE bug 1162610</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8597">CVE-2020-8597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522651" comment="ppp-2.4.7-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148387" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="1159208" ref_url="https://bugzilla.suse.com/1159208" source="BUGZILLA"/>
		<reference ref_id="1159623" ref_url="https://bugzilla.suse.com/1159623" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-4472" ref_url="https://www.suse.com/security/cve/CVE-2016-4472/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Update to 3.4.10 (jsc#SLE-9427, bsc#1159208) from 3.4.6:

Security issues fixed:

- Update expat copy from 2.1.1 to 2.2.0 to fix the following issues:
  CVE-2012-0876, CVE-2016-0718, CVE-2016-4472, CVE-2017-9233, CVE-2016-9063
- CVE-2017-1000158: Fix an integer overflow in thePyString_DecodeEscape function in stringobject.c, resulting in heap-based bufferoverflow (bsc#1068664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-20"/>
	<updated date="2020-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159208">SUSE bug 1159208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159623">SUSE bug 1159623</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0876">CVE-2012-0876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0718">CVE-2016-0718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4472/">CVE-2016-4472 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4472">CVE-2016-4472 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000158">CVE-2017-1000158 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9233">CVE-2017-9233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531736" comment="python3-devel-3.4.10-25.39.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148388" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1154162" ref_url="https://bugzilla.suse.com/1154162" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0050-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200050-1.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Security issue fixed:

- CVE-2019-2974: Fixed Server Optimizer (bsc#1154162).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2974">CVE-2019-2974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531737" comment="libmysqlclient18-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531738" comment="libmysqlclient18-32bit-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531739" comment="mariadb-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531740" comment="mariadb-client-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531741" comment="mariadb-errormessages-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531742" comment="mariadb-tools-10.0.40.2-29.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148389" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to 7.1 Service Refresh 4 Fix Pack 55 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2962 CVE-2019-2964
    CVE-2019-2978 CVE-2019-2983 CVE-2019-2989 CVE-2019-2992
    CVE-2019-2999 CVE-2019-2973 CVE-2019-2981
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531743" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531746" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148390" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1077717" ref_url="https://bugzilla.suse.com/1077717" source="BUGZILLA"/>
		<reference ref_id="1160895" ref_url="https://bugzilla.suse.com/1160895" source="BUGZILLA"/>
		<reference ref_id="1160912" ref_url="https://bugzilla.suse.com/1160912" source="BUGZILLA"/>
		<reference ref_id="1162388" ref_url="https://bugzilla.suse.com/1162388" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18901" ref_url="https://www.suse.com/security/cve/CVE-2019-18901/" source="CVE"/>
		<reference ref_id="CVE-2020-2574" ref_url="https://www.suse.com/security/cve/CVE-2020-2574/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006549.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

MariaDB was updated to version 10.0.40-3 (bsc#1162388).

Security issues fixed:

- CVE-2020-2574: Fixed a difficult to exploit vulnerability that allowed an attacker to crash the client (bsc#1162388).
- CVE-2019-18901: Fixed an unsafe path handling behavior in mysql-systemd-helper (bsc#1160895).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-28"/>
	<updated date="2020-02-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077717">SUSE bug 1077717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160895">SUSE bug 1160895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160912">SUSE bug 1160912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162388">SUSE bug 1162388</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18901/">CVE-2019-18901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18901">CVE-2019-18901 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2574/">CVE-2020-2574 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2574">CVE-2020-2574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557638" comment="libmysqlclient18-10.0.40.3-29.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148391" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-4732" ref_url="https://www.suse.com/security/cve/CVE-2019-4732/" source="CVE"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Java 8.0 was updated to Service Refresh 6 Fix Pack 5 (bsc#1162972, bsc#1160968)

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2019-4732: Untrusted DLL search path vulnerability 
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-4732/">CVE-2019-4732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-4732">CVE-2019-4732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531748" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531750" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148392" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1159646" ref_url="https://bugzilla.suse.com/1159646" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0054-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200054-1.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2019-17571: Fixed a remote code execution by deserialization of untrusted data in SocketServer (bsc#1159646).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159646">SUSE bug 1159646</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17571">CVE-2019-17571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531752" comment="log4j-1.2.15-126.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148393" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1123886" ref_url="https://bugzilla.suse.com/1123886" source="BUGZILLA"/>
		<reference ref_id="1160594" ref_url="https://bugzilla.suse.com/1160594" source="BUGZILLA"/>
		<reference ref_id="1160764" ref_url="https://bugzilla.suse.com/1160764" source="BUGZILLA"/>
		<reference ref_id="1161779" ref_url="https://bugzilla.suse.com/1161779" source="BUGZILLA"/>
		<reference ref_id="1163922" ref_url="https://bugzilla.suse.com/1163922" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8013" ref_url="https://www.suse.com/security/cve/CVE-2020-8013/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006557.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

Security issues fixed:

- CVE-2020-8013: Fixed an issue where chkstat set unintended setuid/capabilities for mrsh and wodim (bsc#1163922).

Non-security issues fixed:

- Fixed a regression where chkstat broke when /proc was not available (bsc#1160764, bsc#1160594).
- Fixed capability handling when doing multiple permission changes at once (bsc#1161779).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-28"/>
	<updated date="2020-02-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123886">SUSE bug 1123886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160594">SUSE bug 1160594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160764">SUSE bug 1160764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161779">SUSE bug 1161779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163922">SUSE bug 1163922</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8013/">CVE-2020-8013 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8013">CVE-2020-8013 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531753" comment="permissions-2015.09.28.1626-17.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148394" version="1" class="patch">
	<metadata>
		<title>Security update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="1122668" ref_url="https://bugzilla.suse.com/1122668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006561.html" source="SUSE-SU"/>
		<description>
This update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer, python-jsonpatch, python-jsonpointer, python-scandir, python-PyYAML fixes the following issues:

python-cfn-lint was included as a new package in 0.21.4.


python-aws-sam-translator was updated to 1.11.0:

  * Add ReservedConcurrentExecutions to globals
  * Fix ElasticsearchHttpPostPolicy resource reference
  * Support using AWS::Region in Ref and Sub
  * Documentation and examples updates
  * Add VersionDescription property to Serverless::Function
  * Update ServerlessRepoReadWriteAccessPolicy
  * Add additional template validation

Upgrade to 1.10.0:

  * Add GSIs to DynamoDBReadPolicy and DynamoDBCrudPolicy
  * Add DynamoDBReconfigurePolicy
  * Add CostExplorerReadOnlyPolicy and OrganizationsListAccountsPolicy
  * Add EKSDescribePolicy
  * Add SESBulkTemplatedCrudPolicy
  * Add FilterLogEventsPolicy
  * Add SSMParameterReadPolicy
  * Add SESEmailTemplateCrudPolicy
  * Add s3:PutObjectAcl to S3CrudPolicy
  * Add allow_credentials CORS option
  * Add support for AccessLogSetting and CanarySetting Serverless::Api properties
  * Add support for X-Ray in Serverless::Api
  * Add support for MinimumCompressionSize in Serverless::Api
  * Add Auth to Serverless::Api globals
  * Remove trailing slashes from APIGW permissions
  * Add SNS FilterPolicy and an example application
  * Add Enabled property to Serverless::Function event sources
  * Add support for PermissionsBoundary in Serverless::Function
  * Fix boto3 client initialization
  * Add PublicAccessBlockConfiguration property to S3 bucket resource
  * Make PAY_PER_REQUEST default mode for Serverless::SimpleTable
  * Add limited support for resolving intrinsics in Serverless::LayerVersion
  * SAM now uses Flake8
  * Add example application for S3 Events written in Go
  * Updated several example applications

- Initial build
  + Version 1.9.0
- Add patch to drop compatible releases operator from setup.py,
  required for SLES12 as the setuptools version is too old
  + ast_drop-compatible-releases-operator.patch


python-jsonschema was updated to 2.6.0:

* Improved performance on CPython by adding caching around ref resolution

Update to version 2.5.0:

* Improved performance on CPython by adding caching around ref
  resolution (#203)

Update to version 2.4.0:

* Added a CLI (#134)
* Added absolute path and absolute schema path to errors (#120)
* Added ``relevance``
* Meta-schemas are now loaded via ``pkgutil``
* Added ``by_relevance`` and ``best_match`` (#91)
* Fixed ``format`` to allow adding formats for non-strings (#125)
* Fixed the ``uri`` format to reject URI references (#131)

- Install /usr/bin/jsonschema with update-alternatives support

python-nose2 was updated to 0.9.1:

* the prof plugin now uses cProfile instead of hotshot for profiling
* skipped tests now include the user's reason in junit XML's message field
* the prettyassert plugin mishandled multi-line function definitions
* Using a plugin's CLI flag when the plugin is already enabled via config
  no longer errors
* nose2.plugins.prettyassert, enabled with --pretty-assert
* Cleanup code for EOLed python versions
* Dropped support for distutils.
* Result reporter respects failure status set by other plugins
* JUnit XML plugin now includes the skip reason in its output

Upgrade to 0.8.0:

List of changes is too long to show here, see
https://github.com/nose-devs/nose2/blob/master/docs/changelog.rst
changes between 0.6.5 and 0.8.0

Update to 0.7.0:

* Added parameterized_class feature, for parameterizing entire test
  classes (many thanks to @TobyLL for their suggestions and help testing!)
* Fix DeprecationWarning on `inspect.getargs` (thanks @brettdh;
  https://github.com/wolever/parameterized/issues/67)
* Make sure that `setUp` and `tearDown` methods work correctly (#40)
* Raise a ValueError when input is empty (thanks @danielbradburn;
  https://github.com/wolever/parameterized/pull/48)
* Fix the order when number of cases exceeds 10 (thanks @ntflc;
  https://github.com/wolever/parameterized/pull/49)

python-scandir was included in version 2.3.2.

python-requests was updated to version 2.20.1 (bsc#1111622)

* Fixed bug with unintended Authorization header stripping for
  redirects using default ports (http/80, https/443).


* remove restriction for urllib3 &lt; 1.24

Update to version 2.20.0:

* Bugfixes
  + Content-Type header parsing is now case-insensitive
    (e.g. charset=utf8 v Charset=utf8).
  + Fixed exception leak where certain redirect urls would raise
    uncaught urllib3 exceptions.
  + Requests removes Authorization header from requests redirected
    from https to http on the same hostname. (CVE-2018-18074)
  + should_bypass_proxies now handles URIs without hostnames
    (e.g. files).
* Dependencies
  + Requests now supports urllib3 v1.24.
* Deprecations
  + Requests has officially stopped support for Python 2.6.

Update to version 2.19.1:

* Fixed issue where status_codes.py’s init function failed trying
  to append to a __doc__ value of None.

Update to version 2.19.0:

* Improvements
  + Warn about possible slowdown with cryptography version &lt; 1.3.4
  + Check host in proxy URL, before forwarding request to adapter.
  + Maintain fragments properly across redirects. (RFC7231 7.1.2)
  + Removed use of cgi module to expedite library load time.
  + Added support for SHA-256 and SHA-512 digest auth algorithms.
  + Minor performance improvement to Request.content.
  + Migrate to using collections.abc for 3.7 compatibility.
* Bugfixes
  + Parsing empty Link headers with parse_header_links() no longer
    return one bogus entry.
  + Fixed issue where loading the default certificate bundle from
    a zip archive would raise an IOError.
  + Fixed issue with unexpected ImportError on windows system
    which do not support winreg module.
  + DNS resolution in proxy bypass no longer includes the username
    and password in the request. This also fixes the issue of DNS
    queries failing on macOS.
  + Properly normalize adapter prefixes for url comparison.
  + Passing None as a file pointer to the files param no longer
    raises an exception.
  + Calling copy on a RequestsCookieJar will now preserve the
    cookie policy correctly.
* We now support idna v2.7 and urllib3 v1.23.

update to version 2.18.4:

* Improvements
  + Error messages for invalid headers now include the header name
    for easier debugging
* Dependencies
  + We now support idna v2.6.

update to version 2.18.3:

* Improvements
  + Running $ python -m requests.help now includes the installed
    version of idna.
* Bugfixes
  + Fixed issue where Requests would raise ConnectionError instead
    of SSLError when encountering SSL problems when using urllib3
    v1.22.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-02"/>
	<updated date="2020-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122668">SUSE bug 1122668</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009524562" comment="python-PyYAML-5.1.2-26.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522744" comment="python-asn1crypto-0.24.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525283" comment="python-botocore-1.12.213-28.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525286" comment="python-jsonpatch-1.1-10.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525287" comment="python-jsonpointer-1.0-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522745" comment="python-packaging-17.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530078" comment="python3-PyYAML-5.1.2-26.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522747" comment="python3-asn1crypto-0.24.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525297" comment="python3-jsonpointer-1.0-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522748" comment="python3-packaging-17.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148395" version="1" class="patch">
	<metadata>
		<title>Security update for libpng16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1124211" ref_url="https://bugzilla.suse.com/1124211" source="BUGZILLA"/>
		<reference ref_id="1141493" ref_url="https://bugzilla.suse.com/1141493" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006567.html" source="SUSE-SU"/>
		<description>
This update for libpng16 fixes the following issues:

Security issues fixed:

- CVE-2019-7317: Fixed a use-after-free vulnerability, triggered when
  png_image_free() was called under png_safe_execute (bsc#1124211).
- CVE-2017-12652: Fixed an Input Validation Error related to the length of chunks (bsc#1141493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-03"/>
	<updated date="2020-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124211">SUSE bug 1124211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141493">SUSE bug 1141493</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12652">CVE-2017-12652 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522656" comment="libpng16-16-1.6.8-15.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522657" comment="libpng16-16-32bit-1.6.8-15.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148396" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Low)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006573.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

PostgreSQL was updated to version 9.6.17.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-04"/>
	<updated date="2020-03-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1720">CVE-2020-1720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531754" comment="postgresql96-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531755" comment="postgresql96-contrib-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531756" comment="postgresql96-docs-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531757" comment="postgresql96-plperl-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531758" comment="postgresql96-plpython-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531759" comment="postgresql96-pltcl-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531760" comment="postgresql96-server-9.6.17-3.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148397" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Update java-1_7_0-openjdk to version jdk7u251 (January 2020 CPU, bsc#1160968):

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2020-2590: Improve Kerberos interop capabilities
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2601: Better Ticket Granting Services
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support
- CVE-2020-2654: Improve Object Identifier Processing	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-10"/>
	<updated date="2020-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2590">CVE-2020-2590 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2601">CVE-2020-2601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522665" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531761" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531762" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522666" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148398" version="1" class="patch">
	<metadata>
		<title>Security update for ipmitool (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1085469" ref_url="https://bugzilla.suse.com/1085469" source="BUGZILLA"/>
		<reference ref_id="1163026" ref_url="https://bugzilla.suse.com/1163026" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-5208" ref_url="https://www.suse.com/security/cve/CVE-2020-5208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006594.html" source="SUSE-SU"/>
		<description>
This update for ipmitool fixes the following issues:

- CVE-2020-5208: Fixed multiple remote code executtion vulnerabilities (bsc#1163026).	  
- picmg discover messages are now DEBUG and not INFO messages (bsc#1085469).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-10"/>
	<updated date="2020-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085469">SUSE bug 1085469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163026">SUSE bug 1163026</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5208/">CVE-2020-5208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5208">CVE-2020-5208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522667" comment="ipmitool-1.8.18-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148399" version="1" class="patch">
	<metadata>
		<title>Security update for ardana-cinder, ardana-cobbler, ardana-designate, ardana-extensions-example, ardana-extensions-nsx, ardana-glance, ardana-heat, ardana-input-model, ardana-ironic, ardana-keystone, ardana-logging, ardana-monasca, ardana-monasca-transform, ardana-mq, ardana-neutron, ardana-nova, ardana-octavia, ardana-osconfig, ardana-tempest, crowbar-core, crowbar-ha, crowbar-openstack, crowbar-ui, keepalived, mariadb, openstack-cinder, openstack-dashboard, openstack-dashboard-theme-SUSE, openstack-heat, openstack-heat-templates, openstack-horizon-plugin-designate-ui, openstack-horizon-plugin-neutron-lbaas-ui, openstack-ironic, openstack-keystone, openstack-monasca-agent, openstack-neutron, openstack-neutron-gbp, openstack-neutron-vsphere, openstack-nova, openstack-octavia, openstack-octavia-amphora-image, openstack-resource-agents, openstack-sahara, openstack-trove, python-cinderlm, python-congressclient, python-designateclient, python-ironic-lib, python-networking-cisco, python-osc-lib, python-oslo.context, python-oslo.rootwrap, python-oslo.serialization, python-oslo.service, python-stevedore, python-taskflow, rubygem-crowbar-client, rubygem-pumavenv-openstack-swift (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1077717" ref_url="https://bugzilla.suse.com/1077717" source="BUGZILLA"/>
		<reference ref_id="1117080" ref_url="https://bugzilla.suse.com/1117080" source="BUGZILLA"/>
		<reference ref_id="1117840" ref_url="https://bugzilla.suse.com/1117840" source="BUGZILLA"/>
		<reference ref_id="1123191" ref_url="https://bugzilla.suse.com/1123191" source="BUGZILLA"/>
		<reference ref_id="1148158" ref_url="https://bugzilla.suse.com/1148158" source="BUGZILLA"/>
		<reference ref_id="1152007" ref_url="https://bugzilla.suse.com/1152007" source="BUGZILLA"/>
		<reference ref_id="1154235" ref_url="https://bugzilla.suse.com/1154235" source="BUGZILLA"/>
		<reference ref_id="1155089" ref_url="https://bugzilla.suse.com/1155089" source="BUGZILLA"/>
		<reference ref_id="1155942" ref_url="https://bugzilla.suse.com/1155942" source="BUGZILLA"/>
		<reference ref_id="1156305" ref_url="https://bugzilla.suse.com/1156305" source="BUGZILLA"/>
		<reference ref_id="1156669" ref_url="https://bugzilla.suse.com/1156669" source="BUGZILLA"/>
		<reference ref_id="1156914" ref_url="https://bugzilla.suse.com/1156914" source="BUGZILLA"/>
		<reference ref_id="1157028" ref_url="https://bugzilla.suse.com/1157028" source="BUGZILLA"/>
		<reference ref_id="1157206" ref_url="https://bugzilla.suse.com/1157206" source="BUGZILLA"/>
		<reference ref_id="1157482" ref_url="https://bugzilla.suse.com/1157482" source="BUGZILLA"/>
		<reference ref_id="1158675" ref_url="https://bugzilla.suse.com/1158675" source="BUGZILLA"/>
		<reference ref_id="1160048" ref_url="https://bugzilla.suse.com/1160048" source="BUGZILLA"/>
		<reference ref_id="1160878" ref_url="https://bugzilla.suse.com/1160878" source="BUGZILLA"/>
		<reference ref_id="1160883" ref_url="https://bugzilla.suse.com/1160883" source="BUGZILLA"/>
		<reference ref_id="1160895" ref_url="https://bugzilla.suse.com/1160895" source="BUGZILLA"/>
		<reference ref_id="1160912" ref_url="https://bugzilla.suse.com/1160912" source="BUGZILLA"/>
		<reference ref_id="1161351" ref_url="https://bugzilla.suse.com/1161351" source="BUGZILLA"/>
		<reference ref_id="1161517" ref_url="https://bugzilla.suse.com/1161517" source="BUGZILLA"/>
		<reference ref_id="1162388" ref_url="https://bugzilla.suse.com/1162388" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1002201" ref_url="https://www.suse.com/security/cve/CVE-2017-1002201/" source="CVE"/>
		<reference ref_id="CVE-2018-17954" ref_url="https://www.suse.com/security/cve/CVE-2018-17954/" source="CVE"/>
		<reference ref_id="CVE-2019-13117" ref_url="https://www.suse.com/security/cve/CVE-2019-13117/" source="CVE"/>
		<reference ref_id="CVE-2019-16770" ref_url="https://www.suse.com/security/cve/CVE-2019-16770/" source="CVE"/>
		<reference ref_id="CVE-2019-18901" ref_url="https://www.suse.com/security/cve/CVE-2019-18901/" source="CVE"/>
		<reference ref_id="CVE-2019-2737" ref_url="https://www.suse.com/security/cve/CVE-2019-2737/" source="CVE"/>
		<reference ref_id="CVE-2019-2739" ref_url="https://www.suse.com/security/cve/CVE-2019-2739/" source="CVE"/>
		<reference ref_id="CVE-2019-2740" ref_url="https://www.suse.com/security/cve/CVE-2019-2740/" source="CVE"/>
		<reference ref_id="CVE-2019-2758" ref_url="https://www.suse.com/security/cve/CVE-2019-2758/" source="CVE"/>
		<reference ref_id="CVE-2019-2805" ref_url="https://www.suse.com/security/cve/CVE-2019-2805/" source="CVE"/>
		<reference ref_id="CVE-2019-2938" ref_url="https://www.suse.com/security/cve/CVE-2019-2938/" source="CVE"/>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<reference ref_id="CVE-2020-2574" ref_url="https://www.suse.com/security/cve/CVE-2020-2574/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<description>
This update for ardana-cinder, ardana-cobbler, ardana-designate, ardana-extensions-example, ardana-extensions-nsx, ardana-glance, ardana-heat, ardana-input-model, ardana-ironic, ardana-keystone, ardana-logging, ardana-monasca, ardana-monasca-transform, ardana-mq, ardana-neutron, ardana-nova, ardana-octavia, ardana-osconfig, ardana-tempest, crowbar-core, crowbar-ha, crowbar-openstack, crowbar-ui, keepalived, mariadb, openstack-cinder, openstack-dashboard, openstack-dashboard-theme-SUSE, openstack-heat, openstack-heat-templates, openstack-horizon-plugin-designate-ui, openstack-horizon-plugin-neutron-lbaas-ui, openstack-ironic, openstack-keystone, openstack-monasca-agent, openstack-neutron, openstack-neutron-gbp, openstack-neutron-vsphere, openstack-nova, openstack-octavia, openstack-octavia-amphora-image, openstack-resource-agents, openstack-sahara, openstack-trove, python-cinderlm, python-congressclient, python-designateclient, python-ironic-lib, python-networking-cisco, python-osc-lib, python-oslo.context, python-oslo.rootwrap, python-oslo.serialization, python-oslo.service, python-stevedore, python-taskflow, rubygem-crowbar-client, rubygem-puma, venv-openstack-swift fixes the following issues:
Security issues fixed:

The update of rubygem-crowbar-client, rubygem-puma fixes the following security issues:
- CVE-2018-17954: Fixed an issue where crowbar was leaking the secret admin passwords to all nodes (bsc#1117080).
- CVE-2019-16770: Fixed a denial-of-service vulnerability that was exploitable by clients sending extraneous keepalive requests (bsc#1158675).

The update of mariadb to 10.2.29 fixes several security issues:
- CVE-2020-2574: Fixed a difficult to exploit vulnerability that allowed an attacker to crash the client (bsc#1162388).
- CVE-2019-18901: Fixed a difficult to exploit vulnerability that allowed an attacker to crash the client (bsc#1162388).
- CVE-2017-1002201: Fixed an issue where special characters did not escpae properly (bsc#1155089)
- CVE-2019-2737, CVE-2019-2739, CVE-2019-2740, CVE-2019-2758, CVE-2019-2805, CVE-2019-2938, CVE-2019-2974: Fixed an issue where could lead a remote attacker to cause denial of service (bsc#1156669)

Non-security issues fixed:

Changes in ardana-cinder:
- Update to version 8.0+git.1579279939.ee7da88:
  * Add option to flatten snapshots when using SES (SOC-11054)

- Update to version 8.0+git.1571846011.1a2f62b:
  * SCRD-4764 move v2.0 endpoints to v3 (SOC-9753)

Changes in ardana-cobbler:
- Update to version 8.0+git.1575037115.0326803:
  * Set root device on SLES autoyast templates (SOC-7365)

Changes in ardana-designate:
- Update to version 8.0+git.1573597788.15b7984:
  * Update gerrit location (SOC-9140)

Changes in ardana-extensions-example:
- Switch to new Gerrit Server

- Update to version 8.0+git.1534266307.db1ec28:
  * SCPL-409 Fix .gitreview for stable/pike

Changes in ardana-extensions-nsx:
- Update to version 8.0+git.1567529036.a41a037:
  * Update policy json templates for vmware-nsx (SOC-10254)

- Switch to new Gerrit Server

Changes in ardana-glance:
- Update to version 8.0+git.1571846045.ab9e3ea:
  * SCRD-4764 move v2.0 endpoints to v3 (SOC-9753)

Changes in ardana-heat:
- Update to version 8.0+git.1571777596.14dce6a:
  * SCRD-4764 remove V2.0 auth end points (SOC-9753)

Changes in ardana-input-model:
- Update to version 8.0+git.1582147997.b9ed134:
  * Enable port security extension neutron (SOC-11027)

- Update to version 8.0+git.1573658751.38e822a:
  * Move manila share to controller (SOC-10938)

Changes in ardana-ironic:
- Update to version 8.0+git.1571845225.006843d:
  * SCRD-4764 remove V2.0 auth end points (SOC-9753)

Changes in ardana-keystone:
- Update to version 8.0+git.1573147067.09e3ea0:
  * enable debug and insecure_debug on demand (SOC-10934)

Changes in ardana-logging:
- Update to version 8.0+git.1572452293.e65d714:
  * use correct Keystone v3 params bsc#1117840 (SOC-9753)

Changes in ardana-monasca:
- Update to version 8.0+git.1572527728.9b34bdf:
  * use correct Keystone v3 params bsc#1117840 (SOC-9753)
  * SCRD-4764 remove V2.0 auth end points (SOC-9753)

Changes in ardana-monasca-transform:
- Update to version 8.0+git.1571845965.97714fb:
  * SCRD-4764 remove V2.0 auth end points (SOC-9753)

Changes in ardana-mq:
- Update to version 8.0+git.1581024906.fbf0be3:
  * Ensure HA queue sync wait fails (SOC-11083)
  * Fix HA policy setting comments (SOC-10317, SOC-11082)

- Update to version 8.0+git.1580853688.4e72fc1:
  * Set HA policy accordingly (SOC-10317, SOC-11082)

- Update to version 8.0+git.1579014733.a855e3a:
  * Change the HA policy mirror (SOC-10317)

Changes in ardana-neutron:
- Update to version 8.0+git.1573050365.ff6fa06:
  * Kill dhclient before restarting neutron-openvswitch-agent (SOC-9230)

- Update to version 8.0+git.1571846086.19cb7eb:
  * SCRD-4764 move v2.0 endpoints to v3 (SOC-9753)

Changes in ardana-nova:
- Update to version 8.0+git.1571846125.584d988:
  * SCRD-4764 remove V2.0 auth end points (SOC-9753)

Changes in ardana-octavia:
- Update to version 8.0+git.1575642049.1f321d0:
  * Change event_streamer_driver to noop (bsc#1154235)

Changes in ardana-osconfig:
- Update to version 8.0+git.1581015942.2d21e63:
  * Adjust 'fs.inotify.max_user_instances' to align with crowbar (bsc#1161351)

- Update to version 8.0+git.1580469528.0ac2a8b:
  * Start OVS services before wicked service at boot (SOC-11067)

Changes in ardana-tempest:
- Update to version 8.0+git.1579261264.7dd213a:
  * Create network resources needed by some heat tests (SOC-7028)

- Update to version 8.0+git.1573571182.8fa9823:
  * Restrore designate test (SOC-9753)

- Update to version 8.0+git.1571846164.6279bc0:
  * SCRD-4764 remove V2.0 auth end points (SOC-9753)

Changes in crowbar-core:
- Update to version 5.0+git.1582968668.1a55c77c5:
  * Ignore CVE-2020-7595 in CI (bsc#1161517)

- Update to version 5.0+git.1582543433.f71d39544:
  * Fix deployment queue display (SOC-10741)

- Update to version 5.0+git.1580209640.80f2ba3d9:
  * network: start OVS before wickedd (SOC-11067)

- Update to version 5.0+git.1579705862.220974047:
  * dns: add checks to designate migration (SOC-11047)

- Update to version 5.0+git.1579271614.eac1c490c:
  * upgrade: Add the upgrade menu entry (SOC-11053)
  * upgrade: Fix upgrade link (SOC-11053)

- Update to version 5.0+git.1578989446.a2d23b7e1:
  * Do not log an error for a case that is correct (trivial)

- Update to version 5.0+git.1578472131.b88a31055:
  * apache2: Restart after enabling SSL flag (SOC-11029)

- Update to version 5.0+git.1578295229.96952deab:
  * Avoid nil crash when provisioner attributes are not set (bsc#1160048)

- Update to version 5.0+git.1578063264.d0223905b:
  * Ignore CVE-2019-16770 (SOC-10999)

- Update to version 5.0+git.1576053049.a2f4c9820:
  * upgrade: Remove DRBD specific code from the preparation parts (SOC-10985)

- Update to version 5.0+git.1575020613.fc167f4dc:
  * List XEN nodes when failing precheck (trivial)

- Update to version 5.0+git.1574763025.0a6957f37:
  * Disable installation repository (bsc#1152007)
  * Disable automatic repo services (bsc#1152007)
  * Designate: Don't add the admin node to the public network (SOC-10658)

- Update to version 5.0+git.1574715523.ee8e58f4b:
  * upgrade: Check the result after commiting proposal (noref)
  * upgrade: Do not try to disable services that might not exist (noref)

- Update to version 5.0+git.1574667034.76644f658:
  * [upgrade] Remove existing upgrade directories from nodes (SOC-10956)

- Update to version 5.0+git.1574348992.88de970a6:
  * [upgrade] Wait for keystone to be ready after start (bsc#1157206)

- Update to version 5.0+git.1574270784.294f0e830:
  * upgrade: Ignore Cloud repository during repocheck (bsc#1152007)

- Update to version 5.0+git.1574165163.52870c62e:
  * [upgrade] Call finalize_nodes_upgrade at the very end (bsc#1155942)

- Update to version 5.0+git.1574103089.1fbb5a51d:
  * Ignore CVE-2019-13117 in CI builds (bsc#1157028)
  * upgrade: Make the time before next upgrade configurable (SOC-10955)
  * upgrade: Make sure cinder-volume is really stopped (bsc#1156305)

- Update to version 5.0+git.1573110008.449237f0d:
  * Allow pacemaker remotes for upgrade (SOC-10133)
  * upgrade: Precheck for unsaved proposals (SOC-10912)

- Update to version 5.0+git.1572880575.4a6efa3a1:
  * upgrade: Add a precheck for XEN compute nodes presence (SOC-10495)
  * upgrade: Reload repo config in repochecks (SOC-10718)

- Update to version 5.0+git.1572097431.519baa552:
  * Ignore CVE-2017-1002201 in CI builds (bsc#1155089)

- Update to version 5.0+git.1571210032.8648ab99c:
  * Revert 'Use block-migration when needed' (SOC-10133)

Changes in crowbar-ha:
- Update to version 5.0+git.1574286229.e0364c3:
  * Drop g-haproxy location before group deletion (bsc#1156914)

Changes in crowbar-openstack:
- Update to version 5.0+git.1582911795.5081ef1da:
  * designate: Mark as user managed (SOC-10233)
  * Designate: make sure dns-server is active on a non-admin node (SOC-10636)

- Update to version 5.0+git.1580549331.ba1e1a0a3:
  * [5.0] ec2-api: run keystone_register on cluster founder only (SOC-11079)

- Update to version 5.0+git.1579182968.f54cfa8f5:
  * tempest: tempest run filters as templates (SOC-11052)

- Update to version 5.0+git.1578515319.fdab3a0b2:
  * Install openstack client for neutron recipes (SOC-11039)

- Update to version 5.0+git.1576764142.8efe58655:
  * Do not read data from barclamp that has not been saved (SOC-11028)

- Update to version 5.0+git.1576666547.b7a0b8814:
  * Revert 'Octavia: Hide UI until complete (SOC-10550)'

- Update to version 5.0+git.1576250115.67b80cbca:
  * [5.0] tempest: Update default image on schema (SOC-11023)

- Update to version 5.0+git.1576078873.ecc798ffe:
  * neutron: Revert remove .openrc creation from neutron cookbooks (SOC-10378)
  * keystone: Add OS_INTERFACE env var to .openrc (SOC-11006)

- Update to version 5.0+git.1574927541.694ac3863:
  * designate: move keystone resource lookup to convergence (SOC-10887)

- Update to version 5.0+git.1574769056.07a7c373e:
  * designate: declare all mdns servers as master on pool config (SOC-10952)
  * designate: add support for SSL (SOC-10877)
  * designate: change default configuration (SOC-10899)

- Update to version 5.0+git.1574421761.ace345683:
  * Add tempest filter for designate (SOC-10288)

- Update to version 5.0+git.1574359417.113b616b2:
  * horizon: install lbaas horizon dashboard (SOC-10883)

- Update to version 5.0+git.1572937880.ffb86e88b:
  * Make sure the input file with ssh key exists (SOC-10133)

- Update to version 5.0+git.1571764038.ad48726d6:
  * mysql: fix WSREP sync race (SOC-10717)
  * mysql: stop service for mysql_install_db (SOC-10717)
  * Do not use obsoleted --endpoint-type option with CLI

- Update to version 5.0+git.1571323259.7402ef5eb:
  * [5.0] Tempest: blacklist test_volume_boot_pattern (SOC-10874)

- Update to version 5.0+git.1571241534.f4af21325:
  * rabbitmq: fix migration 200 (SOC-10623)
  * Fix Cloud 8 no-op migrations (SOC-10623)
  * neutron-lbaas: remove loadbalancer/pool limit
  * [5.0] Configurable timeout for Galera pre-sync

- Update to version 5.0+git.1571138324.edb9e8b56:
  * horizon: tighten check for existence of monasca while deploying grafana
  * monasca: improve detection if monasca-server is available
  * monasca: install agent before run setup monitors in server
  * Monasca: Handle node reinstall (jsc#SOC-10440, bsc#1148158 )

- Update to version 5.0+git.1570618886.06022a6ef:
  * glance: Set barbican auth endpoint (bsc#1123191, SOC-10844)
  * tempest: Add barbican run_filters from ardana (SOC-10844)
  * Fix nova tempest tests (SOC-9298, SOC-10844)

- Update to version 5.0+git.1570505588.4bdc5aa6f:
  * No rndc key if no public DNS server (SOC-10835)

Changes in crowbar-ui:
- Update to version 1.2.0+git.1575896697.a01a3a08:
  * upgrade: Added missing error title
  * travis: Stop testing against nodejs4

- Update to version 1.2.0+git.1572871359.50fc6087:
  * Add title for XEN compute nodes precheck (SOC-10495)

Changes in keepalived:
- update to 2.0.19
- new BR pkgconfig(libnftnl) to fix nftables support
- add nftables to the BR
- added patch
  * linux-4.15.patch
- add buildrequires for file-devel
  - used in the checker to verify scripts
- enable json stats and config dump support
  new BR: pkgconfig(json-c)
- enable http regexp support: new BR pcre2-devel
- disable dbus instance creation support as it is marked as
  dangerous
- Add BFD build option to keepalived.spec rpm file
  Issue #1114 identified that the keepalived.spec file was not being
  generated to build BFD support even if keepalived had been
  configured to support it.
- full changelog
  https://keepalived.org/changelog.html

Changes in mariadb:
- update to 10.2.31 GA [bsc#1162388]
  * Fixes for the following security vulnerabilities:
    * 10.2.31: CVE-2020-2574
    * 10.2.30: none
  * release notes and changelog:
    https://mariadb.com/kb/en/library/mariadb-10231-release-notes
    https://mariadb.com/kb/en/library/mariadb-10231-changelog
    https://mariadb.com/kb/en/library/mariadb-10230-release-notes
    https://mariadb.com/kb/en/library/mariadb-10230-changelog
- refresh mariadb-10.1.12-deharcode-libdir.patch
- remove mariadb-10.2.29-bufferoverflowstrncat.patch (upstreamed)
- pack pam_user_map.so module in the /%{_lib}/security directory
  and user_map.conf configuration file in the /etc/security directory

- fix race condition with mysql_upgrade_info status file by moving
  it to the location owned by root (/var/lib/misc) CVE-2019-18901
  [bsc#1160895]
- move .run-mysql_upgrade file from $datadir/.run-mysql_upgrade
  to /var/lib/misc/.mariadb_run_upgrade so the mysql user can't
  use it for a symlink attack [bsc#1160912]

- on BTRFS systems /var/lib/mysql is created as a subvolume with 
  755 permissions during the system installaion. Fix it to 700 as 
  mysql_install_db doesn't do it [bsc#1077717]
- add important options to mariadb.service and mariadb@.service
  (ProtectSystem, ProtectHome and UMask) [bsc#1160878]
- mysql-systemd-helper: use systemd-tmpfiles instead of shell 
  script operations for a cleaner and safer creating of /run/mysql
  [bsc#1160883]

- update to 10.2.29 GA
  * Fixes for the following security vulnerabilities:
    * 10.2.29: none
    * 10.2.28: CVE-2019-2974, CVE-2019-2938
    * 10.2.27: none
    * 10.2.26: CVE-2019-2805, CVE-2019-2740, CVE-2019-2739,
               CVE-2019-2737, CVE-2019-2758
  * release notes and changelog:
    https://mariadb.com/kb/en/library/mariadb-10229-release-notes
    https://mariadb.com/kb/en/library/mariadb-10229-changelog
    https://mariadb.com/kb/en/library/mariadb-10228-release-notes
    https://mariadb.com/kb/en/library/mariadb-10228-changelog
    https://mariadb.com/kb/en/library/mariadb-10227-release-notes
    https://mariadb.com/kb/en/library/mariadb-10227-changelog
    https://mariadb.com/kb/en/library/mariadb-10226-release-notes
    https://mariadb.com/kb/en/library/mariadb-10226-changelog
- refresh
  mariadb-10.0.15-logrotate-su.patch
  mariadb-10.2.4-logrotate.patch
- add mariadb-10.2.29-bufferoverflowstrncat.patch to fix 'Statement
  might be overflowing a buffer in strncat' error
- tracker bug [bsc#1156669]
- add main.gis_notembedded to the skipped tests (fails when latin1
  is not set)

Changes in openstack-cinder:
- Update to version cinder-11.2.3.dev23:
  * Fix handling of 'cinder\_encryption\_key\_id' image metadata

- Update to version cinder-11.2.3.dev21:
  * Add retry to LVM deactivation

- Update to version cinder-11.2.3.dev19:
  * Fix ceph: only close rbd image after snapshot iteration is finished

- Update to version cinder-11.2.3.dev17:
  * Exclude disabled API versions from listing

Changes in openstack-cinder:
- Update to version cinder-11.2.3.dev23:
  * Fix handling of 'cinder\_encryption\_key\_id' image metadata

- Update to version cinder-11.2.3.dev21:
  * Add retry to LVM deactivation

- Update to version cinder-11.2.3.dev19:
  * Fix ceph: only close rbd image after snapshot iteration is finished

- Update to version cinder-11.2.3.dev17:
  * Exclude disabled API versions from listing

Changes in openstack-dashboard:
- Update to version horizon-12.0.5.dev2:
  * Use python 2.7 as the default interpreter in tox
  * OpenDev Migration Patch
  12.0.4

Changes in openstack-dashboard-theme-SUSE:
- Update to version 2017.2+git.1573629528.6b21fa5:
  * SCRD-7984 fixed help links

Changes in openstack-heat:
- Update to version heat-9.0.8.dev22:
  * Do deepcopy when copying templates

- Update to version heat-9.0.8.dev21:
  * Set stack.thread\_group\_mgr for cancel\_update
  * Eliminate client race condition in convergence delete
  * Delete snapshots using contemporary resources

- Update to version heat-9.0.8.dev15:
  * Unskip StackSnapshotRestoreTest

- Update to version heat-9.0.8.dev14:
  * Fix translate tenants in flavor

Changes in openstack-heat:
- Update to version heat-9.0.8.dev22:
  * Do deepcopy when copying templates

- Update to version heat-9.0.8.dev21:
  * Set stack.thread\_group\_mgr for cancel\_update
  * Eliminate client race condition in convergence delete
  * Delete snapshots using contemporary resources

- Update to version heat-9.0.8.dev15:
  * Unskip StackSnapshotRestoreTest

- Update to version heat-9.0.8.dev14:
  * Fix translate tenants in flavor

Changes in openstack-heat-templates:
- Update to version 0.0.0+git.1560033670.e3b5a52:
  * Add example for running Zun container
  * OpenDev Migration Patch
  * Replace openstack.org git:// URLs with https://
  * Remove docs, deprecated hooks, tests
  * Update the bugs link to storyboard
  * Use octavia resources for autoscaling example
  * Fix the incorrect cirros default password

Changes in openstack-horizon-plugin-designate-ui:
- Update to version designate-dashboard-5.0.3.dev2:
  * Fix list zones updated at same time
  * OpenDev Migration Patch
  5.0.2

Changes in openstack-horizon-plugin-neutron-lbaas-ui:
- Add _1481_project_ng_loadbalancersv2_panel.pyc file to package (SOC-10883)
The .pyc file needs to be removed when the package is uninstalled,
otherwise the panel will remain enabled in the dashboard and cause
errors.

Changes in openstack-ironic:
- Update to version ironic-9.1.8.dev8:
  * Place upper bound on python-dracclient version

Changes in openstack-ironic:
- Update to version ironic-9.1.8.dev8:
  * Place upper bound on python-dracclient version

Changes in openstack-keystone:
- Update to version keystone-12.0.4.dev5:
  * Import LDAP job into project

Changes in openstack-keystone:
- Update to version keystone-12.0.4.dev5:
  * Import LDAP job into project

Changes in openstack-monasca-agent:
- Added dependency:
  * fdupes
  * pwdutils and shadow-utils for useradd/groupadd

- added 0001-add-X.509-certificate-check-plugin.patch

Changes in openstack-neutron:
- Update to version neutron-11.0.9.dev60:
  * Set DB retry for quota\_enforcement pecan\_wsgi hook

- Update to version neutron-11.0.9.dev58:
  * don't clear skb mark when ovs is hw-offload enabled

- Update to version neutron-11.0.9.dev57:
  * doc: add known limitation about attaching SR-IOV ports

- Update to version neutron-11.0.9.dev56:
  * raise priority of dead vlan drop

- Update to version neutron-11.0.9.dev54:
  * [Unit tests] Skip TestWSGIServer with IPv6 if no IPv6 enabled

- Update to version neutron-11.0.9.dev52:
  * Initialize phys bridges before setup\_rpc

Changes in openstack-neutron:
- Update neutron-ha-tool to latest version:
  * Add DHCP agent evacuation (SOC-11046)

- Update to version neutron-11.0.9.dev60:
  * Set DB retry for quota\_enforcement pecan\_wsgi hook

- Update to version neutron-11.0.9.dev58:
  * don't clear skb mark when ovs is hw-offload enabled

- neutron: Remove stop action from ovs-cleanup (bsc#1157482)
  backport of https://review.opendev.org/#/c/695867/

- Update to version neutron-11.0.9.dev57:
  * doc: add known limitation about attaching SR-IOV ports

- Update to version neutron-11.0.9.dev56:
  * raise priority of dead vlan drop

- Update to version neutron-11.0.9.dev54:
  * [Unit tests] Skip TestWSGIServer with IPv6 if no IPv6 enabled

- Update to version neutron-11.0.9.dev52:
  * Initialize phys bridges before setup\_rpc

Changes in openstack-neutron-gbp:
- Update to version group-based-policy-7.3.1.dev72:
  * Refactor static path code

- Update to version group-based-policy-7.3.1.dev71:
  * Support named ip protocols for SecurityGroupRules

- Update to version group-based-policy-7.3.1.dev70:
  * Allow both FIP and SNAT on a single port

- Update to version group-based-policy-7.3.1.dev69:
  * Fix active-active AAP RPC query

- Update to version group-based-policy-7.3.1.dev67:
  * [AIM] Add extra provided/consumed contracts to network extension

- Update to version group-based-policy-7.3.1.dev66:
  * Active active AAP feature

- Update to version group-based-policy-7.3.1.dev64:
  * Support cache option for legacy GBP driver

- Update to version group-based-policy-7.3.1.dev63:
  * Fix host ID length in VM names table

- Update to version group-based-policy-7.3.1.dev62:
  * Update\_proj\_descr in apic when project description is updated in os

- Update to version group-based-policy-7.3.1.dev61:
  * Send port notifications when host\_route is getting updated
  * Provide a control knob to use the internal EP interface

- Update to version group-based-policy-7.3.1.dev57:
  * Fix pep8 failures seen on submitted patches

Changes in openstack-neutron-vsphere:
- Update to version networking-vsphere-2.0.1.dev133:
  * Update to use Agent model from neutron.db.models
  * Fix neutron-dvs-agent startup errors
  * OpenDev Migration Patch
- Remove 0001-fix-dvs-agent-config.patch as changes
  had been backported to stable/pike
   - See https://review.opendev.org/#/c/682482

Changes in openstack-nova:
- Update to version nova-16.1.9.dev49:
  * Use stable constraint for Tempest pinned stable branches

- Update to version nova-16.1.9.dev48:
  * Avoid redundant initialize\_connection on source post live migration
  * Error out interrupted builds
  * Skip checking of target\_dev for vhostuser
  * Functional reproduce for bug 1833581
  * Prevent init\_host test to interfere with other tests
  * Add functional test for resize crash compute restart revert
  * Move restart\_compute\_service to a common place
  * lxc: make use of filter python3 compatible
  * cleanup evacuated instances not on hypervisor
  * Delete resource providers for all nodes when deleting compute service

- Update to version nova-16.1.9.dev30:
  * Explicitly fail if trying to attach SR-IOV port
  * Stabilize unshelve notification sample tests

- Update to version nova-16.1.9.dev26:
  * Fix listing deleted servers with a marker
  * Add functional regression test for bug 1849409

- Update to version nova-16.1.9.dev22:
  * Hook resource\_tracker to remove stale node information

- Update to version nova-16.1.9.dev20:
  * Workaround missing RequestSpec.instance\_group.uuid
  * Add regression recreate test for bug 1830747

- Update to version nova-16.1.9.dev16:
  * Changing scheduler sync event from INFO to DEBUG

- Update to version nova-16.1.9.dev14:
  * Only nil az during shelve offload
  * Delete instance\_id\_mappings record in instance\_destroy

- Update to version nova-16.1.9.dev11:
  * Revert 'openstack server create' to 'nova boot' in nova docs
  * doc: fix and clarify --block-device usage in user docs

- Update to version nova-16.1.9.dev8:
  * Functional reproduce for bug 1852207

Changes in openstack-nova:
- Update to version nova-16.1.9.dev49:
  * Use stable constraint for Tempest pinned stable branches

- Update to version nova-16.1.9.dev48:
  * Avoid redundant initialize\_connection on source post live migration
  * Error out interrupted builds
  * Skip checking of target\_dev for vhostuser
  * Functional reproduce for bug 1833581
  * Prevent init\_host test to interfere with other tests
  * Add functional test for resize crash compute restart revert
  * Move restart\_compute\_service to a common place
  * lxc: make use of filter python3 compatible
  * cleanup evacuated instances not on hypervisor
  * Delete resource providers for all nodes when deleting compute service

- Update to version nova-16.1.9.dev30:
  * Explicitly fail if trying to attach SR-IOV port
  * Stabilize unshelve notification sample tests

- Update to version nova-16.1.9.dev26:
  * Fix listing deleted servers with a marker
  * Add functional regression test for bug 1849409

- Update to version nova-16.1.9.dev22:
  * Hook resource\_tracker to remove stale node information

- Update to version nova-16.1.9.dev20:
  * Workaround missing RequestSpec.instance\_group.uuid
  * Add regression recreate test for bug 1830747

- Update to version nova-16.1.9.dev16:
  * Changing scheduler sync event from INFO to DEBUG

- Update to version nova-16.1.9.dev14:
  * Only nil az during shelve offload
  * Delete instance\_id\_mappings record in instance\_destroy

- Update to version nova-16.1.9.dev11:
  * Revert 'openstack server create' to 'nova boot' in nova docs
  * doc: fix and clarify --block-device usage in user docs

- Update to version nova-16.1.9.dev8:
  * Functional reproduce for bug 1852207

Changes in openstack-octavia:
- Update to version octavia-1.0.6.dev3:
  * Fix urgent amphora two-way auth security bug

Changes in openstack-octavia-amphora-image:
- Update image to 0.1.2 to include udated keepalived 2.0.19

- Update image to 0.1.1 to include latest changes

- Add keepalived service
Changes in openstack-resource-agents:
- Update to version 1.0+git.1569436425.8b9c49f:
  * Add a configurable delay to Nova Evacuate calls
  * OpenDev Migration Patch
  * NovaEvacuate: fix a syntax error
  * NovaEvacuate: Support the new split-out IHA fence agents with backwards compatibility
  * NovaEvacuate: Correctly handle stopped hypervisors
  * neutron-ha-tool: do not replicate dhcp
  * NovaCompute: Support parsing host option from /etc/nova/nova.conf.d
  * NovaCompute: Use variable to avoid calling crudini a second time
  * NovaEvacuate: Allow debug logging to be turned on easily

Changes in openstack-sahara:
- Update to version sahara-7.0.5.dev4:
  * Run sahara-scenario using Python 3
  * Enforce python 2 for documentation build
  * Fix requirements(bandit)
  * OpenDev Migration Patch
  7.0.4

Changes in openstack-sahara:
- Update to version sahara-7.0.5.dev4:
  * Run sahara-scenario using Python 3
  * Enforce python 2 for documentation build
  * Fix requirements (bandit)
  * OpenDev Migration Patch
  7.0.4

Changes in openstack-trove:
- Update to version trove-8.0.2.dev2:
  * Add local bindep.txt
  * OpenDev Migration Patch
  8.0.1

Changes in openstack-trove:
- Update to version trove-8.0.2.dev2:
  * Add local bindep.txt
  * OpenDev Migration Patch
  8.0.1

Changes in python-cinderlm:
- Update to version 0.0.2+git.1571845893.27f0b7b:
  * SCRD-4764 remove V2.0 auth end points (SOC-9753)

Changes in python-congressclient:
- update to version 1.8.1
  - Update .gitreview for stable/pike
  - Update UPPER_CONSTRAINTS_FILE for stable/pike
  - import zuul job settings from project-config
  - Updated from global requirements

Changes in python-designateclient:
- update to version 2.7.1
  - Update .gitreview for stable/pike
  - Updated from global requirements
  - import zuul job settings from project-config
  - Update UPPER_CONSTRAINTS_FILE for stable/pike
  - server-get/update show wrong values about 'id' and 'update_at'

Changes in python-ironic-lib:
- update to version 2.10.2
  - Replace openstack.org git:// URLs with https://
  - Make search for config drive partition case insensitive
  - Revert 'Use dd conv=sparse when writing images to nodes'
  - Check GPT table with sgdisk insread of partprobe
  - Avoid tox_install.sh for constraints support
  - Fix GPT bug with whole disk images
  - import zuul job settings from project-config

Changes in python-networking-cisco:
- Update to version networking-cisco-6.1.1.dev65:
  * Nexus: Add CA Bundle path to https doc
  * Improve Nexus Ironic related doc and logs
  * Upgrade release notes to include Tripleo/puppet
  * Fix socket not closed errors in unit test logs
  * Add release note about adding support for Rocky OpenStack
  * Update publish-openstack-python-branch-tarball job
  * Remove MultiConfigParser from SAF application
  * More fixes for networking\_cisco rocky support
  * Remove MultiConfigParser from the device manger config loader
  * Ensure CFG agent is started after neutron config is written
  * Removed older version of python added 3.5
  * Begin process of supporting neutron Rocky
  * Typo in tar command in doc install guide
  * Add cisco providernet extension to Nexus doc
  * Add missing policy to fix stable/queens unit tests
  * Pin stestr version (1.1.0) for Mitaka
  * Fix places in ucsm network driver using .ucsm instead of .ucsms
  * Fix doc build under python3
  * Fix mitaka bug with NeutronWorker missing parameter
  * Eliminate 30 sec delay for Nexus replay thread
  * Fix foreign key constraint violation while creating primary key with subnet\_id
  * Put upper constraint on ncclient version to prevent breakages
  * Improvements to the networking-cisco zuul jobs
  * Remove deprecated host/interface map config
  * Include device manager configuration file when starting config agent
  * Fix pep8 and other tox environments locally
  * Add rocky to CI
  * Add bandit to tox and resolve Nexus SA errors
  * Deprecate old ML2 Nexus/UCSM documentation file
  * Secure Nexus https certificates by default
- Add tempest_plugin subpackage

Changes in python-osc-lib:
- update to version 1.7.1
  - import zuul job settings from project-config
  - Update UPPER_CONSTRAINTS_FILE for stable/pike
  - Updated from global requirements
  - Update .gitreview for stable/pike
  - Avoid tox_install.sh for constraints support

Changes iython-oslo.context:
- update to version 2.17.2
  - Fix sphinx-docs job for stable branch
  - import zuul job settings from project-config

Changes in python-oslo.rootwrap:
- update to version 5.9.3
  - Avoid tox_install.sh for constraints support
  - Follow the new PTI for document build
  - import zuul job settings from project-config

Changes in python-oslo.serialization:
- update to version 2.20.3
  - import zuul job settings from project-config
  - Fix sphinx-docs job for stable branch

Changes in python-oslo.service:
- update to version 1.25.2
  - import zuul job settings from project-config
  - Fix sphinx-docs job for stable branch

Changes in python-stevedore:
- update to version 1.25.2
  - move doc requirements to doc/requirements.txt
  - Use stable branch for upper-constraints
  - remove duplicate sphinx dependency
  - Avoid tox_install.sh for constraints support
  - import zuul job settings from project-config

Changes in python-taskflow:
- update to version 2.14.2
  - don't let tox_install.sh error if there is nothing to do
  - import zuul job settings from project-config
  - Updated from global requirements
  - Use doc/requirements.txt

Changes in rubygem-crowbar-client:
- Update to 3.9.1
  - Fix repocheck table output (SOC-10718)
  - Enable restricted commands for Cloud8 (bsc#1117080, CVE-2018-17954)

Changes in rubygem-puma:
- Add CVE-2019-16770.patch (bsc#1158675, SOC-10999, CVE-2019-16770)
  This patch fixes a DoS vulnerability a malicious client could use to
  block a large amount of threads.

Changes in venv-openstack-swift:
- Fix lower version numver after inheriting the version from main
  component (SCRD-8523)

- Revert: 'Inherit version number of venv from main component
  (SCRD-8523)' as zypper reports the new version number as older
  than what is released

- Inherit version number of venv from main component (SCRD-8523)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-11"/>
	<updated date="2020-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077717">SUSE bug 1077717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117080">SUSE bug 1117080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117840">SUSE bug 1117840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123191">SUSE bug 1123191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148158">SUSE bug 1148158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152007">SUSE bug 1152007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154235">SUSE bug 1154235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155089">SUSE bug 1155089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155942">SUSE bug 1155942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156305">SUSE bug 1156305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156914">SUSE bug 1156914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157028">SUSE bug 1157028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157206">SUSE bug 1157206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157482">SUSE bug 1157482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158675">SUSE bug 1158675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160048">SUSE bug 1160048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160878">SUSE bug 1160878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160883">SUSE bug 1160883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160895">SUSE bug 1160895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160912">SUSE bug 1160912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161351">SUSE bug 1161351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161517">SUSE bug 1161517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162388">SUSE bug 1162388</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1002201/">CVE-2017-1002201 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1002201">CVE-2017-1002201 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17954/">CVE-2018-17954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17954">CVE-2018-17954 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13117/">CVE-2019-13117 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13117">CVE-2019-13117 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16770/">CVE-2019-16770 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16770">CVE-2019-16770 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18901/">CVE-2019-18901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18901">CVE-2019-18901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2737/">CVE-2019-2737 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2737">CVE-2019-2737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2739/">CVE-2019-2739 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2739">CVE-2019-2739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2740/">CVE-2019-2740 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2740">CVE-2019-2740 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-2758/">CVE-2019-2758 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2758">CVE-2019-2758 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2805/">CVE-2019-2805 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2805">CVE-2019-2805 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2938/">CVE-2019-2938 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2938">CVE-2019-2938 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2974">CVE-2019-2974 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2574/">CVE-2020-2574 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2574">CVE-2020-2574 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597415" comment="ardana-cinder-8.0+git.1579279939.ee7da88-3.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597416" comment="ardana-cobbler-8.0+git.1575037115.0326803-3.41.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597417" comment="ardana-designate-8.0+git.1573597788.15b7984-3.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597418" comment="ardana-extensions-example-8.0+git.1534266307.db1ec28-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597419" comment="ardana-extensions-nsx-8.0+git.1567529036.a41a037-3.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597420" comment="ardana-glance-8.0+git.1571846045.ab9e3ea-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597421" comment="ardana-heat-8.0+git.1571777596.14dce6a-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597422" comment="ardana-input-model-8.0+git.1582147997.b9ed134-3.36.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597423" comment="ardana-ironic-8.0+git.1571845225.006843d-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597424" comment="ardana-keystone-8.0+git.1573147067.09e3ea0-3.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597425" comment="ardana-logging-8.0+git.1572452293.e65d714-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597426" comment="ardana-monasca-8.0+git.1572527728.9b34bdf-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597427" comment="ardana-monasca-transform-8.0+git.1571845965.97714fb-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597428" comment="ardana-mq-8.0+git.1581024906.fbf0be3-3.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597429" comment="ardana-neutron-8.0+git.1573050365.ff6fa06-3.36.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597430" comment="ardana-nova-8.0+git.1571846125.584d988-3.38.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597431" comment="ardana-octavia-8.0+git.1575642049.1f321d0-3.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597432" comment="ardana-osconfig-8.0+git.1581015942.2d21e63-3.42.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597433" comment="ardana-tempest-8.0+git.1579261264.7dd213a-3.30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597434" comment="keepalived-2.0.19-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597435" comment="mariadb-10.2.31-4.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597436" comment="mariadb-client-10.2.31-4.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597437" comment="mariadb-errormessages-10.2.31-4.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597438" comment="mariadb-galera-10.2.31-4.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597439" comment="mariadb-tools-10.2.31-4.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597440" comment="openstack-cinder-11.2.3~dev23-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597441" comment="openstack-cinder-api-11.2.3~dev23-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597442" comment="openstack-cinder-backup-11.2.3~dev23-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597443" comment="openstack-cinder-doc-11.2.3~dev23-3.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597444" comment="openstack-cinder-scheduler-11.2.3~dev23-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597445" comment="openstack-cinder-volume-11.2.3~dev23-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597446" comment="openstack-dashboard-12.0.5~dev2-3.23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597447" comment="openstack-dashboard-theme-SUSE-2017.2+git.1573629528.6b21fa5-7.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597448" comment="openstack-heat-9.0.8~dev22-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597449" comment="openstack-heat-api-9.0.8~dev22-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597450" comment="openstack-heat-api-cfn-9.0.8~dev22-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597451" comment="openstack-heat-api-cloudwatch-9.0.8~dev22-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597452" comment="openstack-heat-doc-9.0.8~dev22-3.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597453" comment="openstack-heat-engine-9.0.8~dev22-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597454" comment="openstack-heat-plugin-heat_docker-9.0.8~dev22-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597455" comment="openstack-heat-templates-0.0.0+git.1560033670.e3b5a52-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597456" comment="openstack-heat-test-9.0.8~dev22-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597457" comment="openstack-horizon-plugin-designate-ui-5.0.3~dev2-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597458" comment="openstack-horizon-plugin-neutron-lbaas-ui-3.0.3~dev5-3.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597459" comment="openstack-ironic-9.1.8~dev8-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597460" comment="openstack-ironic-api-9.1.8~dev8-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597461" comment="openstack-ironic-conductor-9.1.8~dev8-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597462" comment="openstack-ironic-doc-9.1.8~dev8-3.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597463" comment="openstack-keystone-12.0.4~dev5-5.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597464" comment="openstack-keystone-doc-12.0.4~dev5-5.30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597465" comment="openstack-monasca-agent-2.2.5~dev5-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597466" comment="openstack-neutron-11.0.9~dev60-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597467" comment="openstack-neutron-dhcp-agent-11.0.9~dev60-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597468" comment="openstack-neutron-doc-11.0.9~dev60-3.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597469" comment="openstack-neutron-gbp-7.3.1~dev72-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597470" comment="openstack-neutron-ha-tool-11.0.9~dev60-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597471" comment="openstack-neutron-l3-agent-11.0.9~dev60-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597472" comment="openstack-neutron-linuxbridge-agent-11.0.9~dev60-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597473" comment="openstack-neutron-macvtap-agent-11.0.9~dev60-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597474" comment="openstack-neutron-metadata-agent-11.0.9~dev60-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597475" comment="openstack-neutron-metering-agent-11.0.9~dev60-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597476" comment="openstack-neutron-openvswitch-agent-11.0.9~dev60-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597477" comment="openstack-neutron-server-11.0.9~dev60-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597478" comment="openstack-neutron-vsphere-2.0.1~dev133-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597479" comment="openstack-neutron-vsphere-doc-2.0.1~dev133-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597480" comment="openstack-neutron-vsphere-dvs-agent-2.0.1~dev133-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597481" comment="openstack-neutron-vsphere-ovsvapp-agent-2.0.1~dev133-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597482" comment="openstack-nova-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597483" comment="openstack-nova-api-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597484" comment="openstack-nova-cells-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597485" comment="openstack-nova-compute-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597486" comment="openstack-nova-conductor-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597487" comment="openstack-nova-console-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597488" comment="openstack-nova-consoleauth-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597489" comment="openstack-nova-doc-16.1.9~dev49-3.32.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597490" comment="openstack-nova-novncproxy-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597491" comment="openstack-nova-placement-api-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597492" comment="openstack-nova-scheduler-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597493" comment="openstack-nova-serialproxy-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597494" comment="openstack-nova-vncproxy-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597495" comment="openstack-octavia-1.0.6~dev3-4.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597496" comment="openstack-octavia-amphora-agent-1.0.6~dev3-4.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597497" comment="openstack-octavia-amphora-image-x86_64-0.1.2-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597498" comment="openstack-octavia-api-1.0.6~dev3-4.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597499" comment="openstack-octavia-health-manager-1.0.6~dev3-4.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597500" comment="openstack-octavia-housekeeping-1.0.6~dev3-4.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597501" comment="openstack-octavia-worker-1.0.6~dev3-4.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597502" comment="openstack-resource-agents-1.0+git.1569436425.8b9c49f-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597503" comment="openstack-sahara-7.0.5~dev4-3.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597504" comment="openstack-sahara-api-7.0.5~dev4-3.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597505" comment="openstack-sahara-doc-7.0.5~dev4-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597506" comment="openstack-sahara-engine-7.0.5~dev4-3.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597507" comment="openstack-trove-8.0.2~dev2-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597508" comment="openstack-trove-api-8.0.2~dev2-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597509" comment="openstack-trove-conductor-8.0.2~dev2-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597510" comment="openstack-trove-doc-8.0.2~dev2-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597511" comment="openstack-trove-guestagent-8.0.2~dev2-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597512" comment="openstack-trove-taskmanager-8.0.2~dev2-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597513" comment="python-cinder-11.2.3~dev23-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597514" comment="python-cinderlm-0.0.2+git.1571845893.27f0b7b-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597515" comment="python-congressclient-1.8.1-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597516" comment="python-designateclient-2.7.1-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597517" comment="python-designateclient-doc-2.7.1-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597518" comment="python-freezegun-0.3.9-1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597519" comment="python-heat-9.0.8~dev22-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597520" comment="python-horizon-12.0.5~dev2-3.23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597521" comment="python-horizon-plugin-designate-ui-5.0.3~dev2-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597522" comment="python-horizon-plugin-neutron-lbaas-ui-3.0.3~dev5-3.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597523" comment="python-ironic-9.1.8~dev8-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597524" comment="python-ironic-lib-2.10.2-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597525" comment="python-keystone-12.0.4~dev5-5.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597526" comment="python-monasca-agent-2.2.5~dev5-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597527" comment="python-networking-cisco-6.1.1~dev65-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597528" comment="python-networking-vsphere-2.0.1~dev133-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597529" comment="python-neutron-11.0.9~dev60-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597530" comment="python-neutron-gbp-7.3.1~dev72-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597531" comment="python-nova-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597532" comment="python-octavia-1.0.6~dev3-4.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597533" comment="python-osc-lib-1.7.1-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597534" comment="python-oslo.context-2.17.2-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597535" comment="python-oslo.rootwrap-5.9.3-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597536" comment="python-oslo.serialization-2.20.3-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597537" comment="python-oslo.service-1.25.2-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597538" comment="python-sahara-7.0.5~dev4-3.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597539" comment="python-stevedore-1.25.2-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597540" comment="python-taskflow-2.14.2-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597541" comment="python-trove-8.0.2~dev2-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597542" comment="venv-openstack-aodh-x86_64-5.1.1~dev7-12.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597543" comment="venv-openstack-barbican-x86_64-5.0.2~dev3-12.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597544" comment="venv-openstack-ceilometer-x86_64-9.0.8~dev7-12.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597545" comment="venv-openstack-cinder-x86_64-11.2.3~dev23-14.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597546" comment="venv-openstack-designate-x86_64-5.0.3~dev7-12.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597547" comment="venv-openstack-freezer-x86_64-5.0.0.0~xrc2~dev2-10.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597548" comment="venv-openstack-glance-x86_64-15.0.3~dev3-12.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597549" comment="venv-openstack-heat-x86_64-9.0.8~dev22-12.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597550" comment="venv-openstack-horizon-x86_64-12.0.5~dev2-14.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597551" comment="venv-openstack-ironic-x86_64-9.1.8~dev8-12.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597552" comment="venv-openstack-keystone-x86_64-12.0.4~dev5-11.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597553" comment="venv-openstack-magnum-x86_64-5.0.2_5.0.2_5.0.2~dev31-11.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597554" comment="venv-openstack-manila-x86_64-5.1.1~dev2-12.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597555" comment="venv-openstack-monasca-ceilometer-x86_64-1.5.1_1.5.1_1.5.1~dev3-8.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597556" comment="venv-openstack-monasca-x86_64-2.2.2~dev1-11.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597557" comment="venv-openstack-murano-x86_64-4.0.2~dev2-12.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597558" comment="venv-openstack-neutron-x86_64-11.0.9~dev60-13.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597559" comment="venv-openstack-nova-x86_64-16.1.9~dev49-11.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597560" comment="venv-openstack-octavia-x86_64-1.0.6~dev3-12.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597561" comment="venv-openstack-sahara-x86_64-7.0.5~dev4-11.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597562" comment="venv-openstack-swift-x86_64-2.15.2_2.15.2_2.15.2~dev32-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597563" comment="venv-openstack-trove-x86_64-8.0.2~dev2-11.22.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148400" version="1" class="patch">
	<metadata>
		<title>Security update for openstack-manila (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1165643" ref_url="https://bugzilla.suse.com/1165643" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-9543" ref_url="https://www.suse.com/security/cve/CVE-2020-9543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006602.html" source="SUSE-SU"/>
		<description>
This update for openstack-manila fixes the following issues:

- CVE-2020-9543: Fixed an issue where other project users to view, update,
  delete, or share resources that do not belong to them, due to a
  context-free lookup of a UUID (bsc#1165643)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-12"/>
	<updated date="2020-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165643">SUSE bug 1165643</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9543/">CVE-2020-9543 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9543">CVE-2020-9543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597564" comment="openstack-manila-5.1.1~dev2-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597565" comment="openstack-manila-api-5.1.1~dev2-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597566" comment="openstack-manila-data-5.1.1~dev2-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597567" comment="openstack-manila-doc-5.1.1~dev2-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597568" comment="openstack-manila-scheduler-5.1.1~dev2-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597569" comment="openstack-manila-share-5.1.1~dev2-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597570" comment="python-manila-5.1.1~dev2-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597571" comment="venv-openstack-manila-x86_64-5.1.1~dev2-12.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148401" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1156323" ref_url="https://bugzilla.suse.com/1156323" source="BUGZILLA"/>
		<reference ref_id="1156324" ref_url="https://bugzilla.suse.com/1156324" source="BUGZILLA"/>
		<reference ref_id="1156326" ref_url="https://bugzilla.suse.com/1156326" source="BUGZILLA"/>
		<reference ref_id="1156328" ref_url="https://bugzilla.suse.com/1156328" source="BUGZILLA"/>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1162687" ref_url="https://bugzilla.suse.com/1162687" source="BUGZILLA"/>
		<reference ref_id="1162689" ref_url="https://bugzilla.suse.com/1162689" source="BUGZILLA"/>
		<reference ref_id="1162691" ref_url="https://bugzilla.suse.com/1162691" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526/" source="CVE"/>
		<reference ref_id="CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677/" source="CVE"/>
		<reference ref_id="CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678/" source="CVE"/>
		<reference ref_id="CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679/" source="CVE"/>
		<reference ref_id="CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449/" source="CVE"/>
		<reference ref_id="CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450/" source="CVE"/>
		<reference ref_id="CVE-2020-8517" ref_url="https://www.suse.com/security/cve/CVE-2020-8517/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2019-12528: Fixed an information disclosure flaw in the FTP gateway (bsc#1162689). 
- CVE-2019-12526: Fixed potential remote code execution during URN processing (bsc#1156326).
- CVE-2019-12523,CVE-2019-18676: Fixed multiple improper validations in URI processing (bsc#1156329).
- CVE-2019-18677: Fixed Cross-Site Request Forgery in HTTP Request processing (bsc#1156328).
- CVE-2019-18678: Fixed incorrect message parsing which could have led to HTTP request splitting issue (bsc#1156323).
- CVE-2019-18679: Fixed information disclosure when processing HTTP Digest Authentication (bsc#1156324).
- CVE-2020-8449: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
- CVE-2020-8450: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
- CVE-2020-8517: Fixed a buffer overflow in ext_lm_group_acl when processing NTLM Authentication credentials (bsc#1162691).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-12"/>
	<updated date="2020-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156323">SUSE bug 1156323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156324">SUSE bug 1156324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156326">SUSE bug 1156326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156328">SUSE bug 1156328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162689">SUSE bug 1162689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162691">SUSE bug 1162691</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12523">CVE-2019-12523 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12526">CVE-2019-12526 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12528">CVE-2019-12528 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18676">CVE-2019-18676 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18677">CVE-2019-18677 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18678">CVE-2019-18678 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18679">CVE-2019-18679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8449">CVE-2020-8449 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8450">CVE-2020-8450 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8517/">CVE-2020-8517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8517">CVE-2020-8517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531763" comment="squid-3.5.21-26.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148402" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1160305" ref_url="https://bugzilla.suse.com/1160305" source="BUGZILLA"/>
		<reference ref_id="1160498" ref_url="https://bugzilla.suse.com/1160498" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-03 (bsc#1160498)
  * CVE-2019-17026 (bmo#1607443)
    IonMonkey type confusion with StoreElementHole and
    FallibleStoreElement 

- Firefox Extended Support Release 68.4.0 ESR
  * Fixed: Various security fixes
  MFSA 2020-02 (bsc#1160305)
  * CVE-2019-17015 (bmo#1599005)
    Memory corruption in parent process during new content
    process initialization on Windows
  * CVE-2019-17016 (bmo#1599181)
    Bypass of @namespace CSS sanitization during pasting
  * CVE-2019-17017 (bmo#1603055)
    Type Confusion in XPCVariant.cpp
  * CVE-2019-17021 (bmo#1599008)
    Heap address disclosure in parent process during content
    process initialization on Windows
  * CVE-2019-17022 (bmo#1602843)
    CSS sanitization does not escape HTML tags
  * CVE-2019-17024 (bmo#1507180, bmo#1595470, bmo#1598605,
    bmo#1601826)
    Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-10"/>
	<updated date="2020-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160498">SUSE bug 1160498</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17015">CVE-2019-17015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17016">CVE-2019-17016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17017">CVE-2019-17017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17021">CVE-2019-17021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17022">CVE-2019-17022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17024">CVE-2019-17024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17026">CVE-2019-17026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522668" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522669" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148403" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Low)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006625.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

PostgreSQL was updated to version 10.12.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1720">CVE-2020-1720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522670" comment="libecpg6-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522671" comment="libpq5-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522672" comment="libpq5-32bit-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522673" comment="postgresql10-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531765" comment="postgresql10-contrib-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531766" comment="postgresql10-docs-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531767" comment="postgresql10-plperl-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531768" comment="postgresql10-plpython-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531769" comment="postgresql10-pltcl-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531770" comment="postgresql10-server-10.12-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148404" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1132665" ref_url="https://bugzilla.suse.com/1132665" source="BUGZILLA"/>
		<reference ref_id="1166238" ref_url="https://bugzilla.suse.com/1166238" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to 68.6.0 ESR (MFSA 2020-09 bsc#1132665 bsc#1166238)
          
- CVE-2020-6805: Fixed a use-after-free when removing data about origins
- CVE-2020-6806: Fixed improper protections against state confusion
- CVE-2020-6807: Fixed a use-after-free in cubeb during stream destruction 
- CVE-2020-6811: Fixed an issue where copy as cURL' feature did not fully 
  escape website-controlled data potentially leading to command injection 
- CVE-2019-20503: Fixed out of bounds reads in sctp_load_addresses_from_init 
- CVE-2020-6812: Fixed an issue where the names of AirPods with personally 
  identifiable information were exposed to websites with camera or microphone 
  permission     
- CVE-2020-6814: Fixed multiple memory safety bugs
- Fixed an issue with minimizing a window (bsc#1132665).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-19"/>
	<updated date="2020-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132665">SUSE bug 1132665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20503">CVE-2019-20503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6805">CVE-2020-6805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6806">CVE-2020-6806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6807">CVE-2020-6807 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6811">CVE-2020-6811 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6812">CVE-2020-6812 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6814">CVE-2020-6814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531771" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531773" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148405" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1164692" ref_url="https://bugzilla.suse.com/1164692" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006629.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-1938: Fixed a file contents disclosure vulnerability (bsc#1164692).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-19"/>
	<updated date="2020-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1164692">SUSE bug 1164692</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531774" comment="tomcat-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531775" comment="tomcat-admin-webapps-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531776" comment="tomcat-docs-webapp-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531777" comment="tomcat-el-3_0-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531778" comment="tomcat-javadoc-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531779" comment="tomcat-jsp-2_3-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531780" comment="tomcat-lib-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531781" comment="tomcat-servlet-3_1-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531782" comment="tomcat-webapps-8.0.53-29.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148406" version="1" class="patch">
	<metadata>
		<title>Recommended update for python-botocore (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1069697" ref_url="https://bugzilla.suse.com/1069697" source="BUGZILLA"/>
		<reference ref_id="1075263" ref_url="https://bugzilla.suse.com/1075263" source="BUGZILLA"/>
		<reference ref_id="1088310" ref_url="https://bugzilla.suse.com/1088310" source="BUGZILLA"/>
		<reference ref_id="1095041" ref_url="https://bugzilla.suse.com/1095041" source="BUGZILLA"/>
		<reference ref_id="1118021" ref_url="https://bugzilla.suse.com/1118021" source="BUGZILLA"/>
		<reference ref_id="1118024" ref_url="https://bugzilla.suse.com/1118024" source="BUGZILLA"/>
		<reference ref_id="1118027" ref_url="https://bugzilla.suse.com/1118027" source="BUGZILLA"/>
		<reference ref_id="1129696" ref_url="https://bugzilla.suse.com/1129696" source="BUGZILLA"/>
		<reference ref_id="1136184" ref_url="https://bugzilla.suse.com/1136184" source="BUGZILLA"/>
		<reference ref_id="1146853" ref_url="https://bugzilla.suse.com/1146853" source="BUGZILLA"/>
		<reference ref_id="1146854" ref_url="https://bugzilla.suse.com/1146854" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="SUSE-RU-2020:0775-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014210.html" source="SUSE-SU"/>
		<description>
This update for python-boto3, python-botocore and python-futures fixes the following issues:


python-botocore was updated to 1.13.33:

- Fix for python3-botocore versioning issues between SLES12 SP3 Teradata and Public Cloud Module. (bsc#1129696)
- Remove the broken attempt to avoid using the bundled requests module provided by the source. (boo#1088310)
- Update to the latest SDK components. (bsc#1146853, bsc#1146854)
- Add support for urllib 1.25 for CVE-2019-9947. (boo#1136184)
- Fix implementing MD5 header injection into new operations if they are necessary and create default session configuration. (bsc#1118021, bsc#1118024, bsc#1118027)
- Add attribute 'ssl_context' to 'AWSHTTPSConnection'. (bsc#1095041)

python-boto3 was updated to 1.10.33.

python-futures also provides python2-futures in the python2 build.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-24"/>
	<updated date="2020-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1069697">SUSE bug 1069697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075263">SUSE bug 1075263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088310">SUSE bug 1088310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095041">SUSE bug 1095041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118021">SUSE bug 1118021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118024">SUSE bug 1118024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118027">SUSE bug 1118027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129696">SUSE bug 1129696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136184">SUSE bug 1136184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146853">SUSE bug 1146853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146854">SUSE bug 1146854</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562705" comment="python-botocore-1.13.33-28.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562703" comment="python-futures-3.0.2-15.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148407" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1158763" ref_url="https://bugzilla.suse.com/1158763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18900" ref_url="https://www.suse.com/security/cve/CVE-2019-18900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0079-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007437.html" source="SUSE-SU"/>
		<description>
This update for libzypp fixes the following issues:

Security issue fixed:

- CVE-2019-18900: Fixed assert cookie file that was world readable (bsc#1158763).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1158763">SUSE bug 1158763</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18900/">CVE-2019-18900 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18900">CVE-2019-18900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522674" comment="libzypp-16.21.2-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555874" comment="libzypp-devel-16.21.2-2.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148408" version="1" class="patch">
	<metadata>
		<title>Security update for python-cffi, python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1055478" ref_url="https://bugzilla.suse.com/1055478" source="BUGZILLA"/>
		<reference ref_id="1070737" ref_url="https://bugzilla.suse.com/1070737" source="BUGZILLA"/>
		<reference ref_id="1101820" ref_url="https://bugzilla.suse.com/1101820" source="BUGZILLA"/>
		<reference ref_id="1111657" ref_url="https://bugzilla.suse.com/1111657" source="BUGZILLA"/>
		<reference ref_id="1138748" ref_url="https://bugzilla.suse.com/1138748" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="981848" ref_url="https://bugzilla.suse.com/981848" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10903" ref_url="https://www.suse.com/security/cve/CVE-2018-10903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006644.html" source="SUSE-SU"/>
		<description>
This update for python-cffi, python-cryptography fixes the following issues:

Security issue fixed:

- CVE-2018-10903: Fixed GCM tag forgery via truncated tag in finalize_with_tag API (bsc#1101820).

Non-security issues fixed:

python-cffi was updated to 1.11.2 (bsc#1138748, jsc#ECO-1256, jsc#PM-1598):

- fixed a build failure on i586 (bsc#1111657)
- Salt was unable to highstate in snapshot 20171129 (bsc#1070737)

- Update pytest in spec to add c directory tests in addition to 
  testing directory.

- update to version 1.11.2:
  * Fix Windows issue with managing the thread-state on CPython 3.0 to
    3.5

- Update pytest in spec to add c directory tests in addition to 
  testing directory.
- Omit test_init_once_multithread tests as they rely on multiple
  threads finishing in a given time. Returns sporadic pass/fail
  within build.
- Update to 1.11.1:
  * Fix tests, remove deprecated C API usage
  * Fix (hack) for 3.6.0/3.6.1/3.6.2 giving incompatible binary
    extensions (cpython issue #29943)
  * Fix for 3.7.0a1+

- Update to 1.11.0:
  * Support the modern standard types char16_t and char32_t. These
    work like wchar_t: they represent one unicode character, or when
    used as charN_t * or charN_t[] they represent a unicode string.
    The difference with wchar_t is that they have a known, fixed
    size. They should work at all places that used to work with
    wchar_t (please report an issue if I missed something). Note
    that with set_source(), you need to make sure that these types
    are actually defined by the C source you provide (if used in
    cdef()).
  * Support the C99 types float _Complex and double _Complex. Note
    that libffi doesn't support them, which means that in the ABI
    mode you still cannot call C functions that take complex
    numbers directly as arguments or return type.
  * Fixed a rare race condition when creating multiple FFI instances
    from multiple threads. (Note that you aren't meant to create
    many FFI instances: in inline mode, you should write
    ffi = cffi.FFI() at module level just after import cffi; and in
    out-of-line mode you don't instantiate FFI explicitly at all.)
  * Windows: using callbacks can be messy because the CFFI internal
    error messages show up to stderr-but stderr goes nowhere in many
    applications. This makes it particularly hard to get started
    with the embedding mode. (Once you get started, you can at least
    use @ffi.def_extern(onerror=...) and send the error logs where
    it makes sense for your application, or record them in log
    files, and so on.) So what is new in CFFI is that now, on
    Windows CFFI will try to open a non-modal MessageBox (in addition
    to sending raw messages to stderr). The MessageBox is only
    visible if the process stays alive: typically, console
    applications that crash close immediately, but that is also the
    situation where stderr should be visible anyway.
  * Progress on support for callbacks in NetBSD.
  * Functions returning booleans would in some case still return 0
    or 1 instead of False or True. Fixed.
  * ffi.gc() now takes an optional third parameter, which gives an
    estimate of the size (in bytes) of the object. So far, this is
    only used by PyPy, to make the next GC occur more quickly
    (issue #320). In the future, this might have an effect on
    CPython too (provided the CPython issue 31105 is addressed).
  * Add a note to the documentation: the ABI mode gives function
    objects that are slower to call than the API mode does. For
    some reason it is often thought to be faster. It is not!
- Update to 1.10.1:
  * Fixed the line numbers reported in case of cdef() errors. Also,
    I just noticed, but pycparser always supported the preprocessor
    directive # 42 'foo.h' to mean 'from the next line, we're in
    file foo.h starting from line 42';, which it puts in the error
    messages. 

- update to 1.10.0:
 * Issue #295: use calloc() directly instead of PyObject_Malloc()+memset()
   to handle ffi.new() with a default allocator. Speeds up ffi.new(large-array)
   where most of the time you never touch most of the array.
  * Some OS/X build fixes ('only with Xcode but without CLT';).
  * Improve a couple of error messages: when getting mismatched versions of
    cffi and its backend; and when calling functions which cannot be called with
    libffi because an argument is a struct that is 'too complicated'; (and not
    a struct pointer, which always works).
  * Add support for some unusual compilers (non-msvc, non-gcc, non-icc, non-clang)
  * Implemented the remaining cases for ffi.from_buffer. Now all
    buffer/memoryview objects can be passed. The one remaining check is against
    passing unicode strings in Python 2. (They support the buffer interface, but
    that gives the raw bytes behind the UTF16/UCS4 storage, which is most of the
    times not what you expect. In Python 3 this has been fixed and the unicode
    strings don't support the memoryview interface any more.)
  * The C type _Bool or bool now converts to a Python boolean when reading,
    instead of the content of the byte as an integer. The potential
    incompatibility here is what occurs if the byte contains a value different
    from 0 and 1. Previously, it would just return it; with this change, CFFI
    raises an exception in this case. But this case means 'undefined behavior';
    in C; if you really have to interface with a library relying on this,
    don't use bool in the CFFI side. Also, it is still valid to use a byte
    string as initializer for a bool[], but now it must only contain \x00 or
    \x01. As an aside, ffi.string() no longer works on bool[] (but it never made
    much sense, as this function stops at the first zero).
  * ffi.buffer is now the name of cffi's buffer type, and ffi.buffer() works
    like before but is the constructor of that type.
  * ffi.addressof(lib, 'name') now works also in in-line mode, not only in
    out-of-line mode. This is useful for taking the address of global variables.
  * Issue #255: cdata objects of a primitive type (integers, floats, char) are
    now compared and ordered by value. For example, &lt;cdata 'int' 42&gt; compares
    equal to 42 and &lt;cdata 'char' b'A'&gt; compares equal to b'A'. Unlike C,
    &lt;cdata 'int' -1&gt; does not compare equal to ffi.cast('unsigned int', -1): it
    compares smaller, because -1 &lt; 4294967295.
  * PyPy: ffi.new() and ffi.new_allocator()() did not record 'memory pressure';,
    causing the GC to run too infrequently if you call ffi.new() very often
    and/or with large arrays. Fixed in PyPy 5.7.
  * Support in ffi.cdef() for numeric expressions with + or -. Assumes that
    there is no overflow; it should be fixed first before we add more general
    support for arbitrary arithmetic on constants.

- do not generate HTML documentation for packages that are indirect
  dependencies of Sphinx
  (see docs at https://cffi.readthedocs.org/ )

- update to 1.9.1
  - Structs with variable-sized arrays as their last field: now we track the
    length of the array after ffi.new() is called, just like we always tracked
    the length of ffi.new('int[]', 42). This lets us detect out-of-range
    accesses to array items. This also lets us display a better repr(), and
    have the total size returned by ffi.sizeof() and ffi.buffer(). Previously
    both functions would return a result based on the size of the declared
    structure type, with an assumed empty array. (Thanks andrew for starting
    this refactoring.)
  - Add support in cdef()/set_source() for unspecified-length arrays in
    typedefs: typedef int foo_t[...];. It was already supported for global
    variables or structure fields.
  - I turned in v1.8 a warning from cffi/model.py into an error: 'enum xxx' has
    no values explicitly defined: refusing to guess which integer type it is
    meant to be (unsigned/signed, int/long). Now I'm turning it back to a
    warning again; it seems that guessing that the enum has size int is a
    99%-safe bet. (But not 100%, so it stays as a warning.)
  - Fix leaks in the code handling FILE * arguments. In CPython 3 there is a
    remaining issue that is hard to fix: if you pass a Python file object to a
    FILE * argument, then os.dup() is used and the new file descriptor is only
    closed when the GC reclaims the Python file object-and not at the earlier
    time when you call close(), which only closes the original file descriptor.
    If this is an issue, you should avoid this automatic convertion of Python
    file objects: instead, explicitly manipulate file descriptors and call
    fdopen() from C (...via cffi).
  - When passing a void * argument to a function with a different pointer type,
    or vice-versa, the cast occurs automatically, like in C. The same occurs
    for initialization with ffi.new() and a few other places. However, I
    thought that char * had the same property-but I was mistaken. In C you get
    the usual warning if you try to give a char * to a char ** argument, for
    example. Sorry about the confusion. This has been fixed in CFFI by giving
    for now a warning, too. It will turn into an error in a future version.
  - Issue #283: fixed ffi.new() on structures/unions with nested anonymous
    structures/unions, when there is at least one union in the mix. When
    initialized with a list or a dict, it should now behave more closely like
    the { } syntax does in GCC.
  - CPython 3.x: experimental: the generated C extension modules now use the
    'limited API';, which means that, as a compiled .so/.dll, it should work
    directly on any version of CPython &gt;= 3.2. The name produced by distutils
    is still version-specific. To get the version-independent name, you can
    rename it manually to NAME.abi3.so, or use the very recent setuptools 26.
  - Added ffi.compile(debug=...), similar to python setup.py build --debug but
    defaulting to True if we are running a debugging version of Python itself.
  - Removed the restriction that ffi.from_buffer() cannot be used on byte
    strings. Now you can get a char * out of a byte string, which is valid as
    long as the string object is kept alive. (But don't use it to modify the
    string object! If you need this, use bytearray or other official
    techniques.)
  - PyPy 5.4 can now pass a byte string directly to a char * argument (in older
    versions, a copy would be made). This used to be a CPython-only
    optimization.
  - ffi.gc(p, None) removes the destructor on an object previously created by
    another call to ffi.gc()
  - bool(ffi.cast('primitive type', x)) now returns False if the value is zero
    (including -0.0), and True otherwise. Previously this would only return
    False for cdata objects of a pointer type when the pointer is NULL.
  - bytearrays: ffi.from_buffer(bytearray-object) is now supported. (The reason
    it was not supported was that it was hard to do in PyPy, but it works since
    PyPy 5.3.) To call a C function with a char * argument from a buffer
    object-now including bytearrays-you write lib.foo(ffi.from_buffer(x)).
    Additionally, this is now supported: p[0:length] = bytearray-object. The
    problem with this was that a iterating over bytearrays gives numbers
    instead of characters. (Now it is implemented with just a memcpy, of
    course, not actually iterating over the characters.)
  - C++: compiling the generated C code with C++ was supposed to work, but
    failed if you make use the bool type (because that is rendered as the C
    _Bool type, which doesn't exist in C++).
  - help(lib) and help(lib.myfunc) now give useful information, as well as
    dir(p) where p is a struct or pointer-to-struct.

- update for multipython build

- disable 'negative left shift' warning in test suite to prevent
  failures with gcc6, until upstream fixes the undefined code
  in question (bsc#981848)

- Update to version 1.6.0:
  * ffi.list_types()
  * ffi.unpack()
  * extern 'Python+C';
  * in API mode, lib.foo.__doc__ contains the C signature now.
  * Yet another attempt at robustness of ffi.def_extern() against
    CPython's interpreter shutdown logic.
- Update in SLE-12 (bsc#1138748, jsc#ECO-1256, jsc#PM-1598)

- Make this version of the package compatible with OpenSSL 1.1.1d, thus fixing bsc#1149792.

- bsc#1101820 CVE-2018-10903 GCM tag forgery via truncated tag in
  finalize_with_tag API

- Add proper conditional for the python2, the ifpython works only
  for the requires/etc

- add missing dependency on python ssl

- update to version 2.1.4:
  * Added X509_up_ref for an upcoming pyOpenSSL release.

- update to version 2.1.3:
  * Updated Windows, macOS, and manylinux1 wheels to be compiled with
    OpenSSL 1.1.0g.

- update to version 2.1.2:
  * Corrected a bug with the manylinux1 wheels where OpenSSL's stack
    was marked executable.

- fix BuildRequires conditions for python3

- update to 2.1.1

- Fix cffi version requirement.

- Disable memleak tests to fix build with OpenSSL 1.1 (bsc#1055478)


- update to 2.0.3

- update to 2.0.2

- update to 2.0

- update to 1.9

- add python-packaging to requirements explicitly instead of relying
  on setuptools to pull it in

- Switch to singlespec approach

- update to 1.8.1
- Adust Requires and BuildRequires		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-25"/>
	<updated date="2020-03-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055478">SUSE bug 1055478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070737">SUSE bug 1070737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101820">SUSE bug 1101820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111657">SUSE bug 1111657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138748">SUSE bug 1138748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981848">SUSE bug 981848</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10903/">CVE-2018-10903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10903">CVE-2018-10903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531783" comment="python-cffi-1.11.2-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531784" comment="python-cryptography-2.1.4-7.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531785" comment="python-xattr-0.7.5-6.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531786" comment="python3-cffi-1.11.2-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531787" comment="python3-cryptography-2.1.4-7.28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148409" version="1" class="patch">
	<metadata>
		<title>Security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1118987" ref_url="https://bugzilla.suse.com/1118987" source="BUGZILLA"/>
		<reference ref_id="1162197" ref_url="https://bugzilla.suse.com/1162197" source="BUGZILLA"/>
		<reference ref_id="1162200" ref_url="https://bugzilla.suse.com/1162200" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11805" ref_url="https://www.suse.com/security/cve/CVE-2018-11805/" source="CVE"/>
		<reference ref_id="CVE-2020-1930" ref_url="https://www.suse.com/security/cve/CVE-2020-1930/" source="CVE"/>
		<reference ref_id="CVE-2020-1931" ref_url="https://www.suse.com/security/cve/CVE-2020-1931/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006648.html" source="SUSE-SU"/>
		<description>
This update for spamassassin fixes the following issues:

- CVE-2018-11805: Fixed an issue with delimiter handling in rule files 
  related to is_regexp_valid() (bsc#1118987).
- CVE-2020-1930: Fixed an issue with rule configuration (.cf) files which 
  can be configured to run system commands (bsc#1162197).
- CVE-2020-1931: Fixed an issue with rule configuration (.cf) files which 
  can be configured to run system commands with warnings (bsc#1162200).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-30"/>
	<updated date="2020-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118987">SUSE bug 1118987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162197">SUSE bug 1162197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162200">SUSE bug 1162200</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11805/">CVE-2018-11805 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11805">CVE-2018-11805 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1930/">CVE-2020-1930 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1930">CVE-2020-1930 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1931/">CVE-2020-1931 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1931">CVE-2020-1931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531788" comment="perl-Mail-SpamAssassin-3.4.2-44.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531789" comment="spamassassin-3.4.2-44.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148410" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1162224" ref_url="https://bugzilla.suse.com/1162224" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006666.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issue:

- CVE-2019-18348: Fixed a CRLF injection via the host part 
  of the url passed to urlopen(). Now an InvalidURL exception 
  is raised (bsc#1155094).
- CVE-2019-9674: Improved the documentation to reflect the 
  dangers of zip-bombs (bsc#1162825).
- CVE-2020-8492: Fixed a regular expression in urllib that 
  was prone to denial of service via HTTP (bsc#1162367).
- Fixed an issue with version missmatch (bsc#1162224).
- Rename idle icons to idle3 in order to not conflict with python2
  variant of the package. (bsc#1165894)
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-02"/>
	<updated date="2020-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162224">SUSE bug 1162224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531790" comment="libpython3_4m1_0-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531791" comment="python3-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531792" comment="python3-base-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531793" comment="python3-curses-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531794" comment="python3-devel-3.4.10-25.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148411" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1141322" ref_url="https://bugzilla.suse.com/1141322" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0088-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200088-1.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to NSS 3.47.1:

Security issues fixed:

- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- CVE-2019-11745: EncryptUpdate should use maxout, not block size (bsc#1158527).
- CVE-2019-11727: Fixed vulnerability sign CertificateVerify with PKCS#1 v1.5 signatures issue (bsc#1141322).

mozilla-nspr was updated to version 4.23:

- Whitespace in C files was cleaned up and no longer uses tab characters for indenting.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-13"/>
	<updated date="2020-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141322">SUSE bug 1141322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17006">CVE-2019-17006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522675" comment="libfreebl3-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522676" comment="libfreebl3-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531795" comment="libfreebl3-hmac-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531796" comment="libfreebl3-hmac-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522677" comment="libsoftokn3-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522678" comment="libsoftokn3-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531797" comment="libsoftokn3-hmac-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531798" comment="libsoftokn3-hmac-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522679" comment="mozilla-nspr-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522680" comment="mozilla-nspr-32bit-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536452" comment="mozilla-nspr-devel-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522681" comment="mozilla-nss-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522682" comment="mozilla-nss-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522683" comment="mozilla-nss-certs-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522684" comment="mozilla-nss-certs-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536453" comment="mozilla-nss-devel-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522685" comment="mozilla-nss-sysinit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522686" comment="mozilla-nss-sysinit-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522687" comment="mozilla-nss-tools-3.47.1-58.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148412" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1154609" ref_url="https://bugzilla.suse.com/1154609" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0920-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007307.html" source="SUSE-SU"/>
		<description>
This update for libxslt fixes the following issue:

- CVE-2019-18197: Fixed a dangling pointer in xsltCopyText which may have led to information disclosure (bsc#1154609).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-26"/>
	<updated date="2020-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154609">SUSE bug 1154609</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18197">CVE-2019-18197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531799" comment="libxslt-tools-1.1.28-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531800" comment="libxslt1-1.1.28-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531801" comment="libxslt1-32bit-1.1.28-17.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148413" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1168630" ref_url="https://bugzilla.suse.com/1168630" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006677.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Mozilla Firefox 68.6.1esr
  MFSA 2020-11 (bsc#1168630)
  * CVE-2020-6819 (bmo#1620818)
    Use-after-free while running the nsDocShell destructor
  * CVE-2020-6820 (bmo#1626728)
    Use-after-free when handling a ReadableStream
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-06"/>
	<updated date="2020-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6819">CVE-2020-6819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6820">CVE-2020-6820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531802" comment="MozillaFirefox-68.6.1-109.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531804" comment="MozillaFirefox-translations-common-68.6.1-109.113.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148414" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1168874" ref_url="https://bugzilla.suse.com/1168874" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6827" ref_url="https://www.suse.com/security/cve/CVE-2020-6827/" source="CVE"/>
		<reference ref_id="CVE-2020-6828" ref_url="https://www.suse.com/security/cve/CVE-2020-6828/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006698.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 68.7.0 ESR fixes the following issues:

- CVE-2020-6821: Uninitialized memory could be read when using the WebGL copyTexSubImage method (bsc#1168874).
- CVE-2020-6822: Fixed out of bounds write in GMPDecodeData when processing large images (bsc#1168874).
- CVE-2020-6825: Fixed Memory safety bugs (bsc#1168874).
- CVE-2020-6827: Custom Tabs could have the URI spoofed (bsc#1168874).
- CVE-2020-6828: Preference overwrite via crafted Intent (bsc#1168874).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-09"/>
	<updated date="2020-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6821">CVE-2020-6821 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6822">CVE-2020-6822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6825">CVE-2020-6825 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6827/">CVE-2020-6827 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6827">CVE-2020-6827 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6828/">CVE-2020-6828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6828">CVE-2020-6828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531805" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531807" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148415" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1167890" ref_url="https://bugzilla.suse.com/1167890" source="BUGZILLA"/>
		<reference ref_id="1168930" ref_url="https://bugzilla.suse.com/1168930" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006709.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

Security issue fixed:

- CVE-2020-5260: With a crafted URL that contains a newline in it, the credential
  helper machinery can be fooled to give credential information for a wrong host (bsc#1168930). 

Non-security issue fixed: 

git was updated to 2.26.0 for SHA256 support (bsc#1167890, jsc#SLE-11608):

- the xinetd snippet was removed
- the System V init script for the git-daemon was replaced by a systemd
  service file of the same name.

git 2.26.0:

* 'git rebase' now uses a different backend that is based on the
  'merge' machinery by default. The 'rebase.backend' configuration
   variable reverts to old behaviour when set to  'apply'
* Improved handling of sparse checkouts
* Improvements to many commands and internal features

git 2.25.1:

* 'git commit' now honors advise.statusHints
* various updates, bug fixes and documentation updates

git 2.25.0:

* The branch description ('git branch --edit-description') has been
  used to fill the body of the cover letters by the format-patch
  command; this has been enhanced so that the subject can also be
  filled.
* A few commands learned to take the pathspec from the standard input
  or a named file, instead of taking it as the command line
  arguments, with the '--pathspec-from-file' option.
* Test updates to prepare for SHA-2 transition continues.
* Redo 'git name-rev' to avoid recursive calls.
* When all files from some subdirectory were renamed to the root
  directory, the directory rename heuristics would fail to detect that
  as a rename/merge of the subdirectory to the root directory, which has
  been corrected.
* HTTP transport had possible allocator/deallocator mismatch, which
  has been corrected.

git 2.24.1:

* CVE-2019-1348: The --export-marks option of fast-import is
  exposed also via the in-stream command feature export-marks=...
  and it allows overwriting arbitrary paths (bsc#1158785)
* CVE-2019-1349: on Windows, when submodules are cloned
  recursively, under certain circumstances Git could be fooled
  into using the same Git directory twice (bsc#1158787)
* CVE-2019-1350: Incorrect quoting of command-line arguments
  allowed remote code execution during a recursive clone in
  conjunction with SSH URLs (bsc#1158788)
* CVE-2019-1351: on Windows mistakes drive letters outside of
  the US-English alphabet as relative paths (bsc#1158789)
* CVE-2019-1352: on Windows was unaware of NTFS Alternate Data
  Streams (bsc#1158790)
* CVE-2019-1353: when run in the Windows Subsystem for Linux
  while accessing a working directory on a regular Windows
  drive, none of the NTFS protections were active (bsc#1158791)
* CVE-2019-1354: on Windows refuses to write tracked files with
  filenames that contain backslashes (bsc#1158792)
* CVE-2019-1387: Recursive clones vulnerability that is caused
  by too-lax validation of submodule names, allowing very
  targeted attacks via remote code execution in recursive
  clones (bsc#1158793)
* CVE-2019-19604: a recursive clone followed by a submodule
  update could execute code contained within the repository
  without the user explicitly having asked for that (bsc#1158795)

- Fix building with asciidoctor and without DocBook4 stylesheets.

git 2.24.0

* The command line parser learned '--end-of-options' notation.
* A mechanism to affect the default setting for a (related) group of
  configuration variables is introduced.
* 'git fetch' learned '--set-upstream' option to help those who first
  clone from their private fork they intend to push to, add the true
  upstream via 'git remote add' and then 'git fetch' from it.
* fixes and improvements to UI, workflow and features, bash completion fixes
* part of it merged upstream
* the Makefile attempted to download some documentation, banned

git 2.23.0:

* The '--base' option of 'format-patch' computed the patch-ids for
  prerequisite patches in an unstable way, which has been updated
  to compute in a way that is compatible with 'git patch-id
  --stable'.
* The 'git log' command by default behaves as if the --mailmap
  option was given.
* fixes and improvements to UI, workflow and features

git 2.22.1:

* A relative pathname given to 'git init --template=&lt;path&gt; &lt;repo&gt;'
  ought to be relative to the directory 'git init' gets invoked in,
  but it instead was made relative to the repository, which has been
  corrected.
* 'git worktree add' used to fail when another worktree connected to
  the same repository was corrupt, which has been corrected.
* 'git am -i --resolved' segfaulted after trying to see a commit as
  if it were a tree, which has been corrected.
* 'git merge --squash' is designed to update the working tree and the
  index without creating the commit, and this cannot be countermanded
  by adding the '--commit' option; the command now refuses to work
  when both options are given.
* Update to Unicode 12.1 width table.
* 'git request-pull' learned to warn when the ref we ask them to pull
  from in the local repository and in the published repository are
  different.
* 'git fetch' into a lazy clone forgot to fetch base objects that are
  necessary to complete delta in a thin packfile, which has been
  corrected.
* The URL decoding code has been updated to avoid going past the end
  of the string while parsing %-&lt;hex&gt;-&lt;hex&gt; sequence.
* 'git clean' silently skipped a path when it cannot lstat() it; now
  it gives a warning.
* 'git rm' to resolve a conflicted path leaked an internal message
  'needs merge' before actually removing the path, which was
  confusing. This has been corrected.
* Many more bugfixes and code cleanups.

- removal of SuSEfirewall2 service, since SuSEfirewall2 has been replaced by
  firewalld, see [1].
  [1]: https://lists.opensuse.org/opensuse-factory/2019-01/msg00490.html

git 2.22.0:

* The filter specification '--filter=sparse:path=&lt;path&gt;' used to
  create a lazy/partial clone has been removed. Using a blob that is
  part of the project as sparse specification is still supported with
  the '--filter=sparse:oid=&lt;blob&gt;' option
* 'git checkout --no-overlay' can be used to trigger a new mode of
  checking out paths out of the tree-ish, that allows paths that
  match the pathspec that are in the current index and working tree
  and are not in the tree-ish.
* Four new configuration variables {author,committer}.{name,email}
  have been introduced to override user.{name,email} in more specific
  cases.
* 'git branch' learned a new subcommand '--show-current'.
* The command line completion (in contrib/) has been taught to
  complete more subcommand parameters.
* The completion helper code now pays attention to repository-local
  configuration (when available), which allows --list-cmds to honour
  a repository specific setting of completion.commands, for example.
* The list of conflicted paths shown in the editor while concluding a
  conflicted merge was shown above the scissors line when the
  clean-up mode is set to 'scissors', even though it was commented
  out just like the list of updated paths and other information to
  help the user explain the merge better.
* 'git rebase' that was reimplemented in C did not set ORIG_HEAD
  correctly, which has been corrected.
* 'git worktree add' used to do a 'find an available name with stat
  and then mkdir', which is race-prone. This has been fixed by using
  mkdir and reacting to EEXIST in a loop. 

- update git-web AppArmor profile for bash and tar usrMerge (bsc#1132350)

git 2.21.0:

* Historically, the '-m' (mainline) option can only be used for 'git
  cherry-pick' and 'git revert' when working with a merge commit.
  This version of Git no longer warns or errors out when working with
  a single-parent commit, as long as the argument to the '-m' option
  is 1 (i.e. it has only one parent, and the request is to pick or
  revert relative to that first parent). Scripts that relied on the
  behaviour may get broken with this change.
* Small fixes and features for fast-export and fast-import.
* The 'http.version' configuration variable can be used with recent
  enough versions of cURL library to force the version of HTTP used
  to talk when fetching and pushing.
* 'git push $there $src:$dst' rejects when $dst is not a fully
  qualified refname and it is not clear what the end user meant.
* Update 'git multimail' from the upstream.
* A new date format '--date=human' that morphs its output depending
  on how far the time is from the current time has been introduced.
  '--date=auto:human' can be used to use this new format (or any
  existing format) when the output is going to the pager or to the
  terminal, and otherwise the default format.

- Fix worktree creation race (bsc#1114225).

git 2.20.1:

* portability fixes
* 'git help -a' did not work well when an overly long alias was
  defined
* no longer squelched an error message when the run_command API
  failed to run a missing command

git 2.20.0:

* 'git help -a' now gives verbose output (same as 'git help -av').
  Those who want the old output may say 'git help --no-verbose -a'..
* 'git send-email' learned to grab address-looking string on any
  trailer whose name ends with '-by'.
* 'git format-patch' learned new '--interdiff' and '--range-diff'
  options to explain the difference between this version and the
  previous attempt in the cover letter (or after the three-dashes as
  a comment).
* Developer builds now use -Wunused-function compilation option.
* Fix a bug in which the same path could be registered under multiple
  worktree entries if the path was missing (for instance, was removed
  manually).  Also, as a convenience, expand the number of cases in
  which --force is applicable.
* The overly large Documentation/config.txt file have been split into
  million little pieces.  This potentially allows each individual piece
  to be included into the manual page of the command it affects more easily.
* Malformed or crafted data in packstream can make our code attempt
  to read or write past the allocated buffer and abort, instead of
  reporting an error, which has been fixed.
* Fix for a long-standing bug that leaves the index file corrupt when
  it shrinks during a partial commit.
* 'git merge' and 'git pull' that merges into an unborn branch used
  to completely ignore '--verify-signatures', which has been
  corrected.
* ...and much more features and fixes

- fix CVE-2018-19486 (bsc#1117257)

git 2.19.2:

* various bug fixes for multiple subcommands and operations

git 2.19.1:

* CVE-2018-17456: Specially crafted .gitmodules files may have
  allowed arbitrary code execution when the repository is cloned
  with --recurse-submodules (bsc#1110949)

git 2.19.0:

* 'git diff' compares the index and the working tree.  For paths
   added with intent-to-add bit, the command shows the full contents
   of them as added, but the paths themselves were not marked as new
   files.  They are now shown as new by default.
* 'git apply' learned the '--intent-to-add' option so that an
   otherwise working-tree-only application of a patch will add new
   paths to the index marked with the 'intent-to-add' bit.
* 'git grep' learned the '--column' option that gives not just the
   line number but the column number of the hit.
* The '-l' option in 'git branch -l' is an unfortunate short-hand for
   '--create-reflog', but many users, both old and new, somehow expect
   it to be something else, perhaps '--list'.  This step warns when '-l'
   is used as a short-hand for '--create-reflog' and warns about the
   future repurposing of the it when it is used.
* The userdiff pattern for .php has been updated.
* The content-transfer-encoding of the message 'git send-email' sends
   out by default was 8bit, which can cause trouble when there is an
   overlong line to bust RFC 5322/2822 limit.  A new option 'auto' to
   automatically switch to quoted-printable when there is such a line
   in the payload has been introduced and is made the default.
* 'git checkout' and 'git worktree add' learned to honor
   checkout.defaultRemote when auto-vivifying a local branch out of a
   remote tracking branch in a repository with multiple remotes that
   have tracking branches that share the same names.
   (merge 8d7b558bae ab/checkout-default-remote later to maint).
* 'git grep' learned the '--only-matching' option.
* 'git rebase --rebase-merges' mode now handles octopus merges as
   well.
* Add a server-side knob to skip commits in exponential/fibbonacci
  stride in an attempt to cover wider swath of history with a smaller
  number of iterations, potentially accepting a larger packfile
  transfer, instead of going back one commit a time during common
  ancestor discovery during the 'git fetch' transaction.
  (merge 42cc7485a2 jt/fetch-negotiator-skipping later to maint).
* A new configuration variable core.usereplacerefs has been added,
  primarily to help server installations that want to ignore the
  replace mechanism altogether.
* Teach 'git tag -s' etc. a few configuration variables (gpg.format
  that can be set to 'openpgp' or 'x509', and gpg.&lt;format&gt;.program
  that is used to specify what program to use to deal with the format)
  to allow x.509 certs with CMS via 'gpgsm' to be used instead of
  openpgp via 'gnupg'.
* Many more strings are prepared for l10n.
* 'git p4 submit' learns to ask its own pre-submit hook if it should
  continue with submitting.
* The test performed at the receiving end of 'git push' to prevent
  bad objects from entering repository can be customized via
  receive.fsck.* configuration variables; we now have gained a
  counterpart to do the same on the 'git fetch' side, with
  fetch.fsck.* configuration variables.
* 'git pull --rebase=interactive' learned 'i' as a short-hand for
  'interactive'.
* 'git instaweb' has been adjusted to run better with newer Apache on
  RedHat based distros.
* 'git range-diff' is a reimplementation of 'git tbdiff' that lets us
  compare individual patches in two iterations of a topic.
* The sideband code learned to optionally paint selected keywords at
  the beginning of incoming lines on the receiving end.
* 'git branch --list' learned to take the default sort order from the
  'branch.sort' configuration variable, just like 'git tag --list'
  pays attention to 'tag.sort'.
* 'git worktree' command learned '--quiet' option to make it less
  verbose.

git 2.18.0:

* improvements to rename detection logic
* When built with more recent cURL, GIT_SSL_VERSION can now
  specify 'tlsv1.3' as its value.
* 'git mergetools' learned talking to guiffy.
* various other workflow improvements and fixes
* performance improvements and other developer visible fixes

Update to git 2.16.4: security fix release

git 2.17.1:

* Submodule 'names' come from the untrusted .gitmodules file, but
  we blindly append them to $GIT_DIR/modules to create our on-disk
  repo paths. This means you can do bad things by putting '../'
  into the name. We now enforce some rules for submodule names
  which will cause Git to ignore these malicious names
  (CVE-2018-11235, bsc#1095219)
* It was possible to trick the code that sanity-checks paths on
  NTFS into reading random piece of memory
  (CVE-2018-11233, bsc#1095218)
* Support on the server side to reject pushes to repositories
  that attempt to create such problematic .gitmodules file etc.
  as tracked contents, to help hosting sites protect their
  customers by preventing malicious contents from spreading.

git 2.17.0:

* 'diff' family of commands learned '--find-object=&lt;object-id&gt;' option
  to limit the findings to changes that involve the named object.
* 'git format-patch' learned to give 72-cols to diffstat, which is
  consistent with other line length limits the subcommand uses for
  its output meant for e-mails.
* The log from 'git daemon' can be redirected with a new option; one
  relevant use case is to send the log to standard error (instead of
  syslog) when running it from inetd.
* 'git rebase' learned to take '--allow-empty-message' option.
* 'git am' has learned the '--quit' option, in addition to the
  existing '--abort' option; having the pair mirrors a few other
  commands like 'rebase' and 'cherry-pick'.
* 'git worktree add' learned to run the post-checkout hook, just like
  'git clone' runs it upon the initial checkout.
* 'git tag' learned an explicit '--edit' option that allows the
  message given via '-m' and '-F' to be further edited.
* 'git fetch --prune-tags' may be used as a handy short-hand for
  getting rid of stale tags that are locally held.
* The new '--show-current-patch' option gives an end-user facing way
  to get the diff being applied when 'git rebase' (and 'git am')
  stops with a conflict.
* 'git add -p' used to offer '/' (look for a matching hunk) as a
  choice, even there was only one hunk, which has been corrected.
  Also the single-key help is now given only for keys that are
  enabled (e.g. help for '/' won't be shown when there is only one
  hunk).
* Since Git 1.7.9, 'git merge' defaulted to --no-ff (i.e. even when
  the side branch being merged is a descendant of the current commit,
  create a merge commit instead of fast-forwarding) when merging a
  tag object.  This was appropriate default for integrators who pull
  signed tags from their downstream contributors, but caused an
  unnecessary merges when used by downstream contributors who
  habitually 'catch up' their topic branches with tagged releases
  from the upstream.  Update 'git merge' to default to --no-ff only
  when merging a tag object that does *not* sit at its usual place in
  refs/tags/ hierarchy, and allow fast-forwarding otherwise, to
  mitigate the problem.
* 'git status' can spend a lot of cycles to compute the relation
  between the current branch and its upstream, which can now be
  disabled with '--no-ahead-behind' option.
* 'git diff' and friends learned funcname patterns for Go language
  source files.
* 'git send-email' learned '--reply-to=&lt;address&gt;' option.
* Funcname pattern used for C# now recognizes 'async' keyword.
* In a way similar to how 'git tag' learned to honor the pager
  setting only in the list mode, 'git config' learned to ignore the
  pager setting when it is used for setting values (i.e. when the
  purpose of the operation is not to 'show').
- Use %license instead of %doc [bsc#1082318]

git 2.16.3:

* 'git status' after moving a path in the working tree (hence
  making it appear 'removed') and then adding with the -N option
  (hence making that appear 'added') detected it as a rename, but
  did not report the  old and new pathnames correctly.
* 'git commit --fixup' did not allow '-m&lt;message&gt;' option to be
  used at the same time; allow it to annotate resulting commit
  with more text.
* When resetting the working tree files recursively, the working
  tree of submodules are now also reset to match.
* Fix for a commented-out code to adjust it to a rather old API
  change around object ID.
* When there are too many changed paths, 'git diff' showed a
  warning message but in the middle of a line.
* The http tracing code, often used to debug connection issues,
  learned to redact potentially sensitive information from its
  output so that it can be more safely sharable.
* Crash fix for a corner case where an error codepath tried to
  unlock what it did not acquire lock on.
* The split-index mode had a few corner case bugs fixed.
* Assorted fixes to 'git daemon'.
* Completion of 'git merge -s&lt;strategy&gt;' (in contrib/) did not
  work well in non-C locale.
* Workaround for segfault with more recent versions of SVN.
* Recently introduced leaks in fsck have been plugged.
* Travis CI integration now builds the executable in 'script'
  phase to follow the established practice, rather than during
  'before_script' phase.  This allows the CI categorize the
  failures better ('failed' is project's fault, 'errored' is
  build environment's).

- Drop superfluous xinetd snippet, no longer used (bsc#1084460)

- Build with asciidoctor for the recent distros (bsc#1075764)

- Move %{?systemd_requires} to daemon subpackage
- Create subpackage for libsecret credential helper.

git 2.16.2:

* An old regression in 'git describe --all $annotated_tag^0' has
  been fixed.
* 'git svn dcommit' did not take into account the fact that a
  svn+ssh:// URL with a username@ (typically used for pushing)
  refers to the same SVN repository without the username@ and
  failed when svn.pushmergeinfo option is set.
* 'git merge -Xours/-Xtheirs' learned to use our/their version
  when resolving a conflicting updates to a symbolic link.
* 'git clone $there $here' is allowed even when here directory
  exists as long as it is an empty directory, but the command
   incorrectly removed it upon a failure of the operation.
* 'git stash -- &lt;pathspec&gt;' incorrectly blew away untracked files
  in the directory that matched the pathspec, which has been
  corrected.
* 'git add -p' was taught to ignore local changes to submodules
  as they do not interfere with the partial addition of regular
  changes anyway.

git 2.16.1:

* 'git clone' segfaulted when cloning a project that happens to
  track two paths that differ only in case on a case insensitive
  filesystem

git 2.16.0 (CVE-2017-15298, bsc#1063412):

* See https://raw.github.com/git/git/master/Documentation/RelNotes/2.16.0.txt

git 2.15.1:

* fix 'auto' column output 
* fixes to moved lines diffing
* documentation updates
* fix use of repositories immediately under the root directory
* improve usage of libsecret
* fixes to various error conditions in git commands

- Rewrite from sysv init to systemd unit file for git-daemon
  (bsc#1069803)

- Replace references to /var/adm/fillup-templates with new 
  %_fillupdir macro (bsc#1069468)

- split off p4 to a subpackage (bsc#1067502)

- Build with the external libsha1detectcoll (bsc#1042644)

git 2.15.0:

* Use of an empty string as a pathspec element that is used for
 'everything matches' is still warned and Git asks users to use a
  more explicit '.' for that instead. Removal scheduled for 2.16
* Git now avoids blindly falling back to '.git' when the setup
  sequence said we are _not_ in Git repository (another corner
  case removed)
* 'branch --set-upstream' was retired, deprecated since 1.8
* many other improvements and updates

git 2.14.3:

* git send-email understands more cc: formats
* fixes so gitk --bisect
* git commit-tree fixed to handle -F file alike
* Prevent segfault in 'git cat-file --textconv'
* Fix function header parsing for HTML
* Various small fixes to user commands and and internal functions

git 2.14.2:

* fixes to color output
* http.{sslkey,sslCert} now interpret '~[username]/' prefix
* fixes to walking of reflogs via 'log -g' and friends
* various fixes to output correctness
* 'git push --recurse-submodules $there HEAD:$target' is now
  propagated down to the submodules
* 'git clone --recurse-submodules --quiet' c$how propagates quiet
  option down to submodules.
* 'git svn --localtime' correctness fixes
* 'git grep -L' and 'git grep --quiet -L' now report same exit code
* fixes to 'git apply' when converting line endings
* Various Perl scripts did not use safe_pipe_capture() instead 
  of backticks, leaving them susceptible to end-user input.
  CVE-2017-14867 bsc#1061041
* 'git cvsserver' no longer is invoked by 'git daemon' by
  default 

git 2.14.1 (bsc#1052481):
* Security fix for CVE-2017-1000117: A malicious third-party can
  give a crafted 'ssh://...' URL to an unsuspecting victim, and
  an attempt to visit the URL can result in any program that
  exists on the victim's machine being executed. Such a URL could
  be placed in the .gitmodules file of a malicious project, and
  an unsuspecting victim could be tricked into running
  'git clone --recurse-submodules' to trigger the vulnerability.
* A 'ssh://...' URL can result in a 'ssh' command line with a
  hostname that begins with a dash '-', which would cause the
  'ssh' command to instead (mis)treat it as an option. This is
  now prevented by forbidding such a hostname (which should not
  impact any real-world usage).
* Similarly, when GIT_PROXY_COMMAND is configured, the command
  is run with host and port that are parsed out from 'ssh://...'
  URL; a poorly written GIT_PROXY_COMMAND could be tricked into
  treating a string that begins with a dash '-' as an option.
  This is now prevented by forbidding such a hostname and port
  number (again, which should not impact any real-world usage).
* In the same spirit, a repository name that begins with a dash
  '-' is also forbidden now.

git 2.14.0:

* Use of an empty string as a pathspec element that is used for
  'everything matches' is deprecated, use '.'
* Avoid blindly falling back to '.git' when the setup sequence
  indicates operation not on a Git repository
* 'indent heuristics' are now the default.
* Builds with pcre2
* Many bug fixes, improvements and updates

git 2.13.4:

* Update the character width tables.
* Fix an alias that contained an uppercase letter
* Progress meter fixes
* git gc concurrency fixes

git 2.13.3:

* various internal bug fixes
* Fix a  regression to 'git rebase -i'
* Correct unaligned 32-bit access in pack-bitmap code
* Tighten error checks for invalid 'git apply' input
* The split index code did not honor core.sharedrepository setting
  correctly
* Fix 'git branch --list' handling of color.branch.local

git 2.13.2:

* 'collision detecting' SHA-1 update for platform fixes
* 'git checkout --recurse-submodules' did not quite work with a
  submodule that itself has submodules.
* The 'run-command' API implementation has been made more robust
  against dead-locking in a threaded environment.
* 'git clean -d' now only cleans ignored files with '-x'
* 'git status --ignored'  did not list ignored and untracked files
  without '-uall'
* 'git pull --rebase --autostash' didn't auto-stash when the local
  history fast-forwards to the upstream.
* 'git describe --contains' gives as much weight to lightweight
  tags as annotated tags
* Fix 'git stash push &lt;pathspec&gt;' from a subdirectory

git 2.13.1:

* Setting 'log.decorate=false' in the configuration file did not
  take effect in v2.13, which has been corrected.
* corrections to documentation and command help output
* garbage collection fixes
* memory leaks fixed
* receive-pack now makes sure that the push certificate records
  the same set of push options used for pushing
* shell completion corrections for git stash
* fix 'git clone --config var=val' with empty strings
* internal efficiency improvements
* Update sha1 collision detection code for big-endian platforms
  and platforms not supporting unaligned fetches

- Fix packaging of documentation

git 2.13.0:

* empty string as a pathspec element for 'everything matches'
  is still warned, for future removal.
* deprecated argument order 'git merge &lt;msg&gt; HEAD &lt;commit&gt;...'
  was removed
* default location '~/.git-credential-cache/socket' for the
  socket used to communicate with the credential-cache daemon 
  moved to '~/.cache/git/credential/socket'.
* now avoid blindly falling back to '.git' when the setup
  sequence indicated otherwise
* many workflow features, improvements and bug fixes
* add a hardened implementation of SHA1 in response to practical
  collision attacks (CVE-2005-4900, bsc#1042640)
* CVE-2017-8386: On a server running git-shell as login shell to
  restrict user to git commands, remote users may have been able
  to have git service programs spawn an interactive pager
  and thus escape the shell restrictions. (bsc#1038395)

Changes in pcre2:

- Include the libraries, development and tools packages.
  
  git uses only libpcre2-8 so far, but this allows further
  application usage of pcre2.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-14"/>
	<updated date="2020-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167890">SUSE bug 1167890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5260">CVE-2020-5260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597572" comment="git-2.26.0-27.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531808" comment="git-core-2.26.0-27.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531810" comment="libpcre2-16-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531811" comment="libpcre2-32-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531812" comment="libpcre2-8-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531813" comment="libpcre2-posix2-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531814" comment="perl-CGI-4.38-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148416" version="1" class="patch">
	<metadata>
		<title>Security update for fwupdate (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008600.html" source="SUSE-SU"/>
		<description>
This update for fwupdate fixes the following issues:

- Add SBAT section to EFI images (bsc#1182057)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-08"/>
	<updated date="2021-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538834" comment="fwupdate-0.5-10.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538835" comment="fwupdate-efi-0.5-10.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538836" comment="libfwup0-0.5-10.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148417" version="1" class="patch">
	<metadata>
		<title>Security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1159133" ref_url="https://bugzilla.suse.com/1159133" source="BUGZILLA"/>
		<reference ref_id="1184221" ref_url="https://bugzilla.suse.com/1184221" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12420" ref_url="https://www.suse.com/security/cve/CVE-2019-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-1946" ref_url="https://www.suse.com/security/cve/CVE-2020-1946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008613.html" source="SUSE-SU"/>
		<description>
This update for spamassassin fixes the following issues:

- spamassassin was updated to version 3.4.5
- CVE-2019-12420: memory leak via crafted messages (bsc#1159133)
- CVE-2020-1946: security update (bsc#1184221)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-12"/>
	<updated date="2021-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159133">SUSE bug 1159133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184221">SUSE bug 1184221</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12420/">CVE-2019-12420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12420">CVE-2019-12420 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1946/">CVE-2020-1946 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1946">CVE-2020-1946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552206" comment="perl-Mail-SpamAssassin-3.4.5-44.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552207" comment="spamassassin-3.4.5-44.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148418" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1180128" ref_url="https://bugzilla.suse.com/1180128" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008639.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-3472: XChangeFeedbackControl Integer Underflow Privilege Escalation (bsc#1180128)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180128">SUSE bug 1180128</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3472">CVE-2021-3472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552208" comment="xorg-x11-server-7.6_1.18.3-76.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552209" comment="xorg-x11-server-extra-7.6_1.18.3-76.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148419" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1181256" ref_url="https://bugzilla.suse.com/1181256" source="BUGZILLA"/>
		<reference ref_id="1184532" ref_url="https://bugzilla.suse.com/1184532" source="BUGZILLA"/>
		<reference ref_id="1184533" ref_url="https://bugzilla.suse.com/1184533" source="BUGZILLA"/>
		<reference ref_id="1184534" ref_url="https://bugzilla.suse.com/1184534" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-1252" ref_url="https://www.suse.com/security/cve/CVE-2021-1252/" source="CVE"/>
		<reference ref_id="CVE-2021-1404" ref_url="https://www.suse.com/security/cve/CVE-2021-1404/" source="CVE"/>
		<reference ref_id="CVE-2021-1405" ref_url="https://www.suse.com/security/cve/CVE-2021-1405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008638.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2021-1252: Fix for Excel XLM parser infinite loop. (bsc#1184532)
- CVE-2021-1404: Fix for PDF parser buffer over-read; possible crash. (bsc#1184533)
- CVE-2021-1405: Fix for mail parser NULL-dereference crash. (bsc#1184534)
- Fix errors when scanning files &gt; 4G (bsc#1181256)
- Update clamav.keyring
- Update to 0.103.2
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181256">SUSE bug 1181256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184532">SUSE bug 1184532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184533">SUSE bug 1184533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184534">SUSE bug 1184534</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1252/">CVE-2021-1252 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1252">CVE-2021-1252 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1404/">CVE-2021-1404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1404">CVE-2021-1404 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1405/">CVE-2021-1405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1405">CVE-2021-1405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552210" comment="clamav-0.103.2-33.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148420" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1172383" ref_url="https://bugzilla.suse.com/1172383" source="BUGZILLA"/>
		<reference ref_id="1172384" ref_url="https://bugzilla.suse.com/1172384" source="BUGZILLA"/>
		<reference ref_id="1172385" ref_url="https://bugzilla.suse.com/1172385" source="BUGZILLA"/>
		<reference ref_id="1172386" ref_url="https://bugzilla.suse.com/1172386" source="BUGZILLA"/>
		<reference ref_id="1172478" ref_url="https://bugzilla.suse.com/1172478" source="BUGZILLA"/>
		<reference ref_id="1173612" ref_url="https://bugzilla.suse.com/1173612" source="BUGZILLA"/>
		<reference ref_id="1174386" ref_url="https://bugzilla.suse.com/1174386" source="BUGZILLA"/>
		<reference ref_id="1174641" ref_url="https://bugzilla.suse.com/1174641" source="BUGZILLA"/>
		<reference ref_id="1175441" ref_url="https://bugzilla.suse.com/1175441" source="BUGZILLA"/>
		<reference ref_id="1176673" ref_url="https://bugzilla.suse.com/1176673" source="BUGZILLA"/>
		<reference ref_id="1176682" ref_url="https://bugzilla.suse.com/1176682" source="BUGZILLA"/>
		<reference ref_id="1176684" ref_url="https://bugzilla.suse.com/1176684" source="BUGZILLA"/>
		<reference ref_id="1178174" ref_url="https://bugzilla.suse.com/1178174" source="BUGZILLA"/>
		<reference ref_id="1178934" ref_url="https://bugzilla.suse.com/1178934" source="BUGZILLA"/>
		<reference ref_id="1179467" ref_url="https://bugzilla.suse.com/1179467" source="BUGZILLA"/>
		<reference ref_id="1179468" ref_url="https://bugzilla.suse.com/1179468" source="BUGZILLA"/>
		<reference ref_id="1180523" ref_url="https://bugzilla.suse.com/1180523" source="BUGZILLA"/>
		<reference ref_id="1181108" ref_url="https://bugzilla.suse.com/1181108" source="BUGZILLA"/>
		<reference ref_id="1181639" ref_url="https://bugzilla.suse.com/1181639" source="BUGZILLA"/>
		<reference ref_id="1182137" ref_url="https://bugzilla.suse.com/1182137" source="BUGZILLA"/>
		<reference ref_id="1182425" ref_url="https://bugzilla.suse.com/1182425" source="BUGZILLA"/>
		<reference ref_id="1182577" ref_url="https://bugzilla.suse.com/1182577" source="BUGZILLA"/>
		<reference ref_id="1182968" ref_url="https://bugzilla.suse.com/1182968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11947" ref_url="https://www.suse.com/security/cve/CVE-2020-11947/" source="CVE"/>
		<reference ref_id="CVE-2020-12829" ref_url="https://www.suse.com/security/cve/CVE-2020-12829/" source="CVE"/>
		<reference ref_id="CVE-2020-13361" ref_url="https://www.suse.com/security/cve/CVE-2020-13361/" source="CVE"/>
		<reference ref_id="CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362/" source="CVE"/>
		<reference ref_id="CVE-2020-13659" ref_url="https://www.suse.com/security/cve/CVE-2020-13659/" source="CVE"/>
		<reference ref_id="CVE-2020-13765" ref_url="https://www.suse.com/security/cve/CVE-2020-13765/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-15469" ref_url="https://www.suse.com/security/cve/CVE-2020-15469/" source="CVE"/>
		<reference ref_id="CVE-2020-15863" ref_url="https://www.suse.com/security/cve/CVE-2020-15863/" source="CVE"/>
		<reference ref_id="CVE-2020-16092" ref_url="https://www.suse.com/security/cve/CVE-2020-16092/" source="CVE"/>
		<reference ref_id="CVE-2020-25084" ref_url="https://www.suse.com/security/cve/CVE-2020-25084/" source="CVE"/>
		<reference ref_id="CVE-2020-25624" ref_url="https://www.suse.com/security/cve/CVE-2020-25624/" source="CVE"/>
		<reference ref_id="CVE-2020-25625" ref_url="https://www.suse.com/security/cve/CVE-2020-25625/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-27617" ref_url="https://www.suse.com/security/cve/CVE-2020-27617/" source="CVE"/>
		<reference ref_id="CVE-2020-28916" ref_url="https://www.suse.com/security/cve/CVE-2020-28916/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29443" ref_url="https://www.suse.com/security/cve/CVE-2020-29443/" source="CVE"/>
		<reference ref_id="CVE-2021-20181" ref_url="https://www.suse.com/security/cve/CVE-2021-20181/" source="CVE"/>
		<reference ref_id="CVE-2021-20203" ref_url="https://www.suse.com/security/cve/CVE-2021-20203/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-3416" ref_url="https://www.suse.com/security/cve/CVE-2021-3416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- Fix OOB access in sm501 device emulation (CVE-2020-12829, bsc#1172385)
- Fix OOB access possibility in MegaRAID SAS 8708EM2 emulation (CVE-2020-13362 bsc#1172383)
- Fix use-after-free in usb xhci packet handling (CVE-2020-25723, bsc#1178934)
- Fix use-after-free in usb ehci packet handling (CVE-2020-25084, bsc#1176673)
- Fix OOB access in usb hcd-ohci emulation (CVE-2020-25624, bsc#1176682)
- Fix infinite loop (DoS) in usb hcd-ohci emulation (CVE-2020-25625, bsc#1176684)
- Fix guest triggerable assert in shared network handling code (CVE-2020-27617, bsc#1178174)
- Fix infinite loop (DoS) in e1000e device emulation (CVE-2020-28916, bsc#1179468)
- Fix OOB access in atapi emulation (CVE-2020-29443, bsc#1181108)
- Fix null pointer deref. (DoS) in mmio ops (CVE-2020-15469, bsc#1173612)
- Fix infinite loop (DoS) in e1000 device emulation (CVE-2021-20257, bsc#1182577)
- Fix OOB access (stack overflow) in rtl8139 NIC emulation (CVE-2021-3416, bsc#1182968)
- Fix OOB access (stack overflow) in other NIC emulations (CVE-2021-3416)
- Fix OOB access in SLIRP ARP packet processing (CVE-2020-29130, bsc#1179467)
- Fix null pointer dereference possibility (DoS) in MegaRAID SAS 8708EM2 emulation (CVE-2020-13659 bsc#1172386
- Fix OOB access in iscsi (CVE-2020-11947 bsc#1180523)
- Fix OOB access in vmxnet3 emulation (CVE-2021-20203 bsc#1181639)
- Fix buffer overflow in the XGMAC device (CVE-2020-15863, bsc#1174386)
- Fix DoS in packet processing of various emulated NICs (CVE-2020-16092 bsc#1174641)
- Fix OOB access while processing USB packets (CVE-2020-14364 bsc#1175441)
- Fix package scripts to not use hard coded paths for temporary working directories and log files (bsc#1182425)
- Fix potential privilege escalation in virtfs (CVE-2021-20181 bsc#1182137)
- Fix OOB access possibility in ES1370 audio device emulation (CVE-2020-13361 bsc#1172384)
- Fix OOB access in ROM loading (CVE-2020-13765 bsc#1172478)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-16"/>
	<updated date="2021-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172383">SUSE bug 1172383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172384">SUSE bug 1172384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172385">SUSE bug 1172385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172386">SUSE bug 1172386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172478">SUSE bug 1172478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173612">SUSE bug 1173612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174386">SUSE bug 1174386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174641">SUSE bug 1174641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175441">SUSE bug 1175441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176673">SUSE bug 1176673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176682">SUSE bug 1176682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176684">SUSE bug 1176684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178174">SUSE bug 1178174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178934">SUSE bug 1178934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179468">SUSE bug 1179468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180523">SUSE bug 1180523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181108">SUSE bug 1181108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181639">SUSE bug 1181639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182137">SUSE bug 1182137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182425">SUSE bug 1182425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182577">SUSE bug 1182577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182968">SUSE bug 1182968</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11947/">CVE-2020-11947 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11947">CVE-2020-11947 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12829/">CVE-2020-12829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12829">CVE-2020-12829 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13361/">CVE-2020-13361 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13361">CVE-2020-13361 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13362">CVE-2020-13362 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13659/">CVE-2020-13659 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13659">CVE-2020-13659 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13765/">CVE-2020-13765 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13765">CVE-2020-13765 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15469/">CVE-2020-15469 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15469">CVE-2020-15469 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15863/">CVE-2020-15863 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15863">CVE-2020-15863 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16092/">CVE-2020-16092 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16092">CVE-2020-16092 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25084/">CVE-2020-25084 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25084">CVE-2020-25084 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25624/">CVE-2020-25624 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25624">CVE-2020-25624 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25625/">CVE-2020-25625 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25625">CVE-2020-25625 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25723">CVE-2020-25723 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27617/">CVE-2020-27617 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27617">CVE-2020-27617 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28916/">CVE-2020-28916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28916">CVE-2020-28916 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29443/">CVE-2020-29443 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29443">CVE-2020-29443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20181/">CVE-2021-20181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20181">CVE-2021-20181 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20203/">CVE-2021-20203 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20203">CVE-2021-20203 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3416/">CVE-2021-3416 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3416">CVE-2021-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555875" comment="qemu-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555876" comment="qemu-block-curl-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555877" comment="qemu-block-iscsi-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538845" comment="qemu-block-rbd-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555878" comment="qemu-block-ssh-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555879" comment="qemu-guest-agent-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538848" comment="qemu-ipxe-1.0.0+-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538849" comment="qemu-kvm-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555880" comment="qemu-lang-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538852" comment="qemu-seabios-1.10.2_0_g5f4c7b1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538853" comment="qemu-sgabios-8-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555881" comment="qemu-tools-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538855" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538856" comment="qemu-x86-2.9.1-6.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148421" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1182431" ref_url="https://bugzilla.suse.com/1182431" source="BUGZILLA"/>
		<reference ref_id="1182846" ref_url="https://bugzilla.suse.com/1182846" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-27379" ref_url="https://www.suse.com/security/cve/CVE-2021-27379/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008654.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-20257: xen: infinite loop issue in the e1000 NIC emulator (bsc#1182846).
- CVE-2021-27379: Fixed an issue where entries in the IOMMU were not being updated 
  under certain circumstances due to improper backport of XSA-321 (XSA-366, bsc#1182431).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-19"/>
	<updated date="2021-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182431">SUSE bug 1182431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27379/">CVE-2021-27379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27379">CVE-2021-27379 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538857" comment="xen-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538858" comment="xen-doc-html-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538859" comment="xen-libs-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538860" comment="xen-libs-32bit-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538861" comment="xen-tools-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538862" comment="xen-tools-domU-4.9.4_16-3.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148422" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1183936" ref_url="https://bugzilla.suse.com/1183936" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008663.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- L3: Tenable Scan reports sudo is vulnerable to CVE-2021-3156 (bsc#1183936)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183936">SUSE bug 1183936</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3156">CVE-2021-3156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555882" comment="sudo-1.8.20p2-3.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148423" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1184960" ref_url="https://bugzilla.suse.com/1184960" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.10.0 ESR (bsc#1184960)
  * CVE-2021-23994: Out of bound write due to lazy initialization
  * CVE-2021-23995: Use-after-free in Responsive Design Mode
  * CVE-2021-23998: Secure Lock icon could have been spoofed
  * CVE-2021-23961: More internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23999: Blob URLs may have been granted additional privileges
  * CVE-2021-24002: Arbitrary FTP command execution on FTP servers using an encoded URL
  * CVE-2021-29945: Incorrect size computation in WebAssembly JIT could lead to null-reads
  * CVE-2021-29946: Port blocking could be bypassed
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-27"/>
	<updated date="2021-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23961">CVE-2021-23961 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23994">CVE-2021-23994 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23995">CVE-2021-23995 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23998">CVE-2021-23998 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23999">CVE-2021-23999 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24002">CVE-2021-24002 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29945">CVE-2021-29945 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29946">CVE-2021-29946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552225" comment="MozillaFirefox-78.10.0-112.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552226" comment="MozillaFirefox-devel-78.10.0-112.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552227" comment="MozillaFirefox-translations-common-78.10.0-112.57.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148424" version="1" class="patch">
	<metadata>
		<title>Security update for libnettle (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1183835" ref_url="https://bugzilla.suse.com/1183835" source="BUGZILLA"/>
		<reference ref_id="1184401" ref_url="https://bugzilla.suse.com/1184401" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20305" ref_url="https://www.suse.com/security/cve/CVE-2021-20305/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008682.html" source="SUSE-SU"/>
		<description>
This update for libnettle fixes the following issues:

- CVE-2021-20305: Fixed the multiply function which was being called with out-of-range scalars (bsc#1184401, bsc#1183835).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183835">SUSE bug 1183835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184401">SUSE bug 1184401</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20305/">CVE-2021-20305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20305">CVE-2021-20305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552228" comment="libhogweed2-2.7.1-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538876" comment="libhogweed2-32bit-2.7.1-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552229" comment="libnettle4-2.7.1-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538878" comment="libnettle4-32bit-2.7.1-13.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148425" version="1" class="patch">
	<metadata>
		<title>Security update for gdm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1184456" ref_url="https://bugzilla.suse.com/1184456" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008681.html" source="SUSE-SU"/>
		<description>
This update for gdm fixes the following issues:

-  Avoid the signal SIGTRAP when gdm exits (bsc#1184456).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184456">SUSE bug 1184456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552230" comment="gdm-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538880" comment="gdm-lang-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538881" comment="gdmflexiserver-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552231" comment="libgdm1-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552232" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148426" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1182909" ref_url="https://bugzilla.suse.com/1182909" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25329" ref_url="https://www.suse.com/security/cve/CVE-2021-25329/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008703.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2021-25329: Complete fix for CVE-2020-9484 (bsc#1182909)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182909">SUSE bug 1182909</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25329/">CVE-2021-25329 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25329">CVE-2021-25329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538884" comment="tomcat-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538885" comment="tomcat-admin-webapps-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538886" comment="tomcat-docs-webapp-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538887" comment="tomcat-el-3_0-api-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538888" comment="tomcat-javadoc-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538889" comment="tomcat-jsp-2_3-api-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538890" comment="tomcat-lib-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538891" comment="tomcat-servlet-3_1-api-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538892" comment="tomcat-webapps-8.0.53-29.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148427" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008701.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.25 - OpenJDK 7u291 (January 2021 CPU, bsc#1181239)
  * Security fixes
    + JDK-8247619: Improve Direct Buffering of Characters
  * Import of OpenJDK 7 u291 build 1
    + JDK-8254177: (tz) Upgrade time-zone data to tzdata2020b
    + JDK-8254982: (tz) Upgrade time-zone data to tzdata2020c
    + JDK-8255226: (tz) Upgrade time-zone data to tzdata2020d
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552233" comment="java-1_7_0-openjdk-1.7.0.291-43.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552234" comment="java-1_7_0-openjdk-demo-1.7.0.291-43.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552235" comment="java-1_7_0-openjdk-devel-1.7.0.291-43.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552236" comment="java-1_7_0-openjdk-headless-1.7.0.291-43.47.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148428" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1184161" ref_url="https://bugzilla.suse.com/1184161" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25317" ref_url="https://www.suse.com/security/cve/CVE-2021-25317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008713.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2021-25317: ownership of /var/log/cups could allow privilege escalation from lp user to root via symlink attacks (bsc#1184161)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184161">SUSE bug 1184161</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-25317/">CVE-2021-25317 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25317">CVE-2021-25317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552282" comment="cups-1.7.5-20.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552283" comment="cups-client-1.7.5-20.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552284" comment="cups-libs-1.7.5-20.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538900" comment="cups-libs-32bit-1.7.5-20.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148429" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1181495" ref_url="https://bugzilla.suse.com/1181495" source="BUGZILLA"/>
		<reference ref_id="1185345" ref_url="https://bugzilla.suse.com/1185345" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214/" source="CVE"/>
		<reference ref_id="CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215/" source="CVE"/>
		<reference ref_id="CVE-2021-25216" ref_url="https://www.suse.com/security/cve/CVE-2021-25216/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008723.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25214: Fixed a broken inbound incremental zone update (IXFR) which could have caused named to terminate unexpectedly (bsc#1185345).
- CVE-2021-25215: Fixed an assertion check which could have failed while answering queries for DNAME records that required the DNAME to be processed to resolve itself (bsc#1185345).
- CVE-2021-25216: Fixed an issue where policy negotiation can be targeted by a buffer overflow attack (bsc#1185345).
- MD5 warning message using host, dig, nslookup (bind-utils) with FIPS enabled (bsc#1181495).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181495">SUSE bug 1181495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25214">CVE-2021-25214 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25215">CVE-2021-25215 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25216/">CVE-2021-25216 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25216">CVE-2021-25216 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552285" comment="bind-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552286" comment="bind-chrootenv-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538903" comment="bind-doc-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552287" comment="bind-libs-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538905" comment="bind-libs-32bit-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552288" comment="bind-utils-9.9.9P1-63.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148430" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1178469" ref_url="https://bugzilla.suse.com/1178469" source="BUGZILLA"/>
		<reference ref_id="1179156" ref_url="https://bugzilla.suse.com/1179156" source="BUGZILLA"/>
		<reference ref_id="1184677" ref_url="https://bugzilla.suse.com/1184677" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008729.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-20254: Fixed a buffer overrun in sids_to_unixids() (bsc#1184677).
- Avoid free'ing our own pointer in memcache when memcache_trim attempts to reduce cache size (bsc#1179156).
- Adjust smbcacls '--propagate-inheritance' feature to align with upstream (bsc#1178469).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178469">SUSE bug 1178469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179156">SUSE bug 1179156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184677">SUSE bug 1184677</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20254">CVE-2021-20254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555883" comment="libdcerpc-binding0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538908" comment="libdcerpc-binding0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555884" comment="libdcerpc0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538910" comment="libdcerpc0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555885" comment="libndr-krb5pac0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538912" comment="libndr-krb5pac0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555886" comment="libndr-nbt0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538914" comment="libndr-nbt0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555887" comment="libndr-standard0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538916" comment="libndr-standard0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555888" comment="libndr0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538918" comment="libndr0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555889" comment="libnetapi0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538920" comment="libnetapi0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555890" comment="libsamba-credentials0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538922" comment="libsamba-credentials0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555891" comment="libsamba-errors0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538924" comment="libsamba-errors0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555892" comment="libsamba-hostconfig0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538926" comment="libsamba-hostconfig0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555893" comment="libsamba-passdb0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538928" comment="libsamba-passdb0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555894" comment="libsamba-util0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538930" comment="libsamba-util0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555895" comment="libsamdb0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538932" comment="libsamdb0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555896" comment="libsmbclient0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538934" comment="libsmbclient0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555897" comment="libsmbconf0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538936" comment="libsmbconf0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555898" comment="libsmbldap0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538938" comment="libsmbldap0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555899" comment="libtevent-util0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538940" comment="libtevent-util0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555900" comment="libwbclient0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538942" comment="libwbclient0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555901" comment="samba-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555902" comment="samba-client-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538945" comment="samba-client-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538946" comment="samba-doc-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555903" comment="samba-libs-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538948" comment="samba-libs-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555904" comment="samba-winbind-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538950" comment="samba-winbind-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148431" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1184521" ref_url="https://bugzilla.suse.com/1184521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1494-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008929.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2021-3468: avoid infinite loop by handling  HUP event in client_work (bsc#1184521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-03"/>
	<updated date="2021-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184521">SUSE bug 1184521</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3468">CVE-2021-3468 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552289" comment="avahi-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538952" comment="avahi-lang-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552290" comment="avahi-utils-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552291" comment="libavahi-client3-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538955" comment="libavahi-client3-32bit-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552292" comment="libavahi-common3-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538957" comment="libavahi-common3-32bit-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552293" comment="libavahi-core7-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552294" comment="libavahi-glib1-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538960" comment="libavahi-glib1-32bit-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552295" comment="libdns_sd-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538962" comment="libdns_sd-32bit-0.6.32-32.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148432" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="CVE-2020-27619" ref_url="https://www.suse.com/security/cve/CVE-2020-27619/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008779.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Security issues fixed:

- CVE-2020-27619: where Lib/test/multibytecodec_support calls eval() on content retrieved via HTTP. (bsc#1178009)

Other fixes:

- Make sure to close the 'import_failed.map' file after the exception
  has been raised in order to avoid ResourceWarnings when the
  failing import is part of a try...except block
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-17"/>
	<updated date="2021-05-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27619/">CVE-2020-27619 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27619">CVE-2020-27619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552303" comment="libpython3_4m1_0-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552304" comment="python3-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552305" comment="python3-base-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552306" comment="python3-curses-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597573" comment="python3-devel-3.4.10-25.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148433" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1120163" ref_url="https://bugzilla.suse.com/1120163" source="BUGZILLA"/>
		<reference ref_id="1152974" ref_url="https://bugzilla.suse.com/1152974" source="BUGZILLA"/>
		<reference ref_id="1152975" ref_url="https://bugzilla.suse.com/1152975" source="BUGZILLA"/>
		<reference ref_id="1155179" ref_url="https://bugzilla.suse.com/1155179" source="BUGZILLA"/>
		<reference ref_id="1155184" ref_url="https://bugzilla.suse.com/1155184" source="BUGZILLA"/>
		<reference ref_id="1155186" ref_url="https://bugzilla.suse.com/1155186" source="BUGZILLA"/>
		<reference ref_id="1159483" ref_url="https://bugzilla.suse.com/1159483" source="BUGZILLA"/>
		<reference ref_id="1165629" ref_url="https://bugzilla.suse.com/1165629" source="BUGZILLA"/>
		<reference ref_id="1165823" ref_url="https://bugzilla.suse.com/1165823" source="BUGZILLA"/>
		<reference ref_id="1172247" ref_url="https://bugzilla.suse.com/1172247" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1176720" ref_url="https://bugzilla.suse.com/1176720" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177855" ref_url="https://bugzilla.suse.com/1177855" source="BUGZILLA"/>
		<reference ref_id="1177856" ref_url="https://bugzilla.suse.com/1177856" source="BUGZILLA"/>
		<reference ref_id="1178181" ref_url="https://bugzilla.suse.com/1178181" source="BUGZILLA"/>
		<reference ref_id="1178634" ref_url="https://bugzilla.suse.com/1178634" source="BUGZILLA"/>
		<reference ref_id="1179575" ref_url="https://bugzilla.suse.com/1179575" source="BUGZILLA"/>
		<reference ref_id="1182047" ref_url="https://bugzilla.suse.com/1182047" source="BUGZILLA"/>
		<reference ref_id="1182261" ref_url="https://bugzilla.suse.com/1182261" source="BUGZILLA"/>
		<reference ref_id="1182715" ref_url="https://bugzilla.suse.com/1182715" source="BUGZILLA"/>
		<reference ref_id="1182716" ref_url="https://bugzilla.suse.com/1182716" source="BUGZILLA"/>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183022" ref_url="https://bugzilla.suse.com/1183022" source="BUGZILLA"/>
		<reference ref_id="1183069" ref_url="https://bugzilla.suse.com/1183069" source="BUGZILLA"/>
		<reference ref_id="1183593" ref_url="https://bugzilla.suse.com/1183593" source="BUGZILLA"/>
		<reference ref_id="1184120" ref_url="https://bugzilla.suse.com/1184120" source="BUGZILLA"/>
		<reference ref_id="1184167" ref_url="https://bugzilla.suse.com/1184167" source="BUGZILLA"/>
		<reference ref_id="1184168" ref_url="https://bugzilla.suse.com/1184168" source="BUGZILLA"/>
		<reference ref_id="1184194" ref_url="https://bugzilla.suse.com/1184194" source="BUGZILLA"/>
		<reference ref_id="1184198" ref_url="https://bugzilla.suse.com/1184198" source="BUGZILLA"/>
		<reference ref_id="1184208" ref_url="https://bugzilla.suse.com/1184208" source="BUGZILLA"/>
		<reference ref_id="1184211" ref_url="https://bugzilla.suse.com/1184211" source="BUGZILLA"/>
		<reference ref_id="1184391" ref_url="https://bugzilla.suse.com/1184391" source="BUGZILLA"/>
		<reference ref_id="1184393" ref_url="https://bugzilla.suse.com/1184393" source="BUGZILLA"/>
		<reference ref_id="1184397" ref_url="https://bugzilla.suse.com/1184397" source="BUGZILLA"/>
		<reference ref_id="1184509" ref_url="https://bugzilla.suse.com/1184509" source="BUGZILLA"/>
		<reference ref_id="1184583" ref_url="https://bugzilla.suse.com/1184583" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1185248" ref_url="https://bugzilla.suse.com/1185248" source="BUGZILLA"/>
		<reference ref_id="1185555" ref_url="https://bugzilla.suse.com/1185555" source="BUGZILLA"/>
		<reference ref_id="1185556" ref_url="https://bugzilla.suse.com/1185556" source="BUGZILLA"/>
		<reference ref_id="1185557" ref_url="https://bugzilla.suse.com/1185557" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0433" ref_url="https://www.suse.com/security/cve/CVE-2020-0433/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-27673" ref_url="https://www.suse.com/security/cve/CVE-2020-27673/" source="CVE"/>
		<reference ref_id="CVE-2020-36312" ref_url="https://www.suse.com/security/cve/CVE-2020-36312/" source="CVE"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-20219" ref_url="https://www.suse.com/security/cve/CVE-2021-20219/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28038" ref_url="https://www.suse.com/security/cve/CVE-2021-28038/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950/" source="CVE"/>
		<reference ref_id="CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-29264" ref_url="https://www.suse.com/security/cve/CVE-2021-29264/" source="CVE"/>
		<reference ref_id="CVE-2021-29265" ref_url="https://www.suse.com/security/cve/CVE-2021-29265/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-36312: Fixed an issue in virt/kvm/kvm_main.c that had a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure (bnc#1184509).
- CVE-2021-29650: Fixed an issue inside the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).
- CVE-2020-27673: Fixed an issue in Xen where a guest OS users could have caused a denial of service (host OS hang) via a high rate of events to dom0 (bnc#1177411, bnc#1184583).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bnc#1184391).
- CVE-2020-25673: Fixed NFC endless loops caused by repeated llcp_sock_connect() (bsc#1178181).
- CVE-2020-25672: Fixed NFC memory leak in llcp_sock_connect() (bsc#1178181).
- CVE-2020-25671: Fixed NFC refcount leak in llcp_sock_connect() (bsc#1178181).
- CVE-2020-25670: Fixed NFC refcount leak in llcp_sock_bind() (bsc#1178181).
- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h where a 'stall on CPU' could have occured because a retry loop continually finds the same bad inode (bnc#1184194, bnc#1184211).
- CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bnc#1184211).
- CVE-2021-30002: Fixed a memory leak issue when a webcam device exists (bnc#1184120).
- CVE-2021-3483: Fixed a use-after-free bug in nosy_ioctl() (bsc#1184393).
- CVE-2021-20219: Fixed a denial of service vulnerability in drivers/tty/n_tty.c of the Linux kernel. In this flaw a local attacker with a normal user privilege could have delayed the loop and cause a threat to the system availability (bnc#1184397).
- CVE-2021-29265: Fixed an issue in usbip_sockfd_store in drivers/usb/usbip/stub_dev.c that allowed attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status (bnc#1184167).
- CVE-2021-29264: Fixed an issue in drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver that allowed attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled (bnc#1184168).
- CVE-2021-28972: Fixed an issue in drivers/pci/hotplug/rpadlpar_sysfs.c where the RPA PCI Hotplug driver had a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\0' termination (bnc#1184198).
- CVE-2021-28660: Fixed rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c that allowed writing beyond the end of the ssid array (bnc#1183593).
- CVE-2020-0433: Fixed blk_mq_queue_tag_busy_iter of blk-mq-tag.c, where a possible use after free due to improper locking could have happened. This could have led to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1176720).
- CVE-2021-28038: Fixed an issue with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931 (bnc#1183022, bnc#1183069).
- CVE-2021-27365: Fixed an issue inside the iSCSI data structures that does not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bnc#1182715).
- CVE-2021-27363: Fixed an issue with a kernel pointer leak that could have been used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables (bnc#1182716).
- CVE-2021-27364: Fixed an issue in drivers/scsi/scsi_transport_iscsi.c where an unprivileged user can craft Netlink messages (bnc#1182717).
- CVE-2020-1749: Fixed a flaw inside of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality (bnc#1165629).

The following non-security bugs were fixed:

- bluetooth: eliminate the potential race condition when removing the HCI controller (bsc#1184611).
- Btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).
- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).
- btrfs: Cleanup try_flush_qgroup (bsc#1182047).
- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: drop unused parameter qgroup_reserved (bsc#1182261).
- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1182261).
- btrfs: fix qgroup_free wrong num_bytes in btrfs_subvolume_reserve_metadata (bsc#1182261).
- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).
- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).
- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).
- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).
- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).
- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).
- btrfs: qgroup: Do not hold qgroup_ioctl_lock in btrfs_qgroup_inherit() (bsc#1165823).
- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).
- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).
- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).
- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).
- btrfs: qgroup: Fix reserved data space leak if we have multiple reserve calls (bsc#1152975).
- btrfs: qgroup: Fix the wrong target io_tree when freeing reserved data space (bsc#1152974).
- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).
- btrfs: qgroup: mark qgroup inconsistent if we're inherting snapshot to a new qgroup (bsc#1165823).
- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).
- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).
- btrfs: remove unused parameter from btrfs_subvolume_release_metadata (bsc#1182261).
- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).
- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- hv_netvsc: remove ndo_poll_controller (bsc#1185248).
- KVM: Add proper lockdep assertion in I/O bus unregister (bsc#1185555).
- KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU (bsc#1185556).
- KVM: Stop looking for coalesced MMIO zones if the bus is destroyed (bsc#1185557).
- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).
- Xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-18"/>
	<updated date="2021-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120163">SUSE bug 1120163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152974">SUSE bug 1152974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152975">SUSE bug 1152975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155179">SUSE bug 1155179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155184">SUSE bug 1155184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155186">SUSE bug 1155186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159483">SUSE bug 1159483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165629">SUSE bug 1165629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165823">SUSE bug 1165823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172247">SUSE bug 1172247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176720">SUSE bug 1176720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177855">SUSE bug 1177855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177856">SUSE bug 1177856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178634">SUSE bug 1178634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179575">SUSE bug 1179575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182047">SUSE bug 1182047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182261">SUSE bug 1182261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183069">SUSE bug 1183069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183593">SUSE bug 1183593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184120">SUSE bug 1184120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184167">SUSE bug 1184167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184168">SUSE bug 1184168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184194">SUSE bug 1184194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184393">SUSE bug 1184393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184397">SUSE bug 1184397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184509">SUSE bug 1184509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184583">SUSE bug 1184583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185248">SUSE bug 1185248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185555">SUSE bug 1185555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185556">SUSE bug 1185556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185557">SUSE bug 1185557</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0433/">CVE-2020-0433 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0433">CVE-2020-0433 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25670">CVE-2020-25670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25671">CVE-2020-25671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25672">CVE-2020-25672 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25673">CVE-2020-25673 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27673/">CVE-2020-27673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27673">CVE-2020-27673 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36312/">CVE-2020-36312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36312">CVE-2020-36312 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20219/">CVE-2021-20219 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20219">CVE-2021-20219 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28038/">CVE-2021-28038 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28038">CVE-2021-28038 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28660">CVE-2021-28660 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28950">CVE-2021-28950 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28972">CVE-2021-28972 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29264/">CVE-2021-29264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29264">CVE-2021-29264 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29265/">CVE-2021-29265 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29265">CVE-2021-29265 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29650">CVE-2021-29650 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30002">CVE-2021-30002 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3483">CVE-2021-3483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555905" comment="kernel-default-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555906" comment="kernel-default-base-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555907" comment="kernel-default-devel-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556949" comment="kernel-default-kgraft-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538972" comment="kernel-devel-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538973" comment="kernel-macros-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538974" comment="kernel-source-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555908" comment="kernel-syms-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556951" comment="kgraft-patch-4_4_180-94_144-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148434" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1185900" ref_url="https://bugzilla.suse.com/1185900" source="BUGZILLA"/>
		<reference ref_id="1185904" ref_url="https://bugzilla.suse.com/1185904" source="BUGZILLA"/>
		<reference ref_id="1185905" ref_url="https://bugzilla.suse.com/1185905" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18804" ref_url="https://www.suse.com/security/cve/CVE-2019-18804/" source="CVE"/>
		<reference ref_id="CVE-2021-32491" ref_url="https://www.suse.com/security/cve/CVE-2021-32491/" source="CVE"/>
		<reference ref_id="CVE-2021-32492" ref_url="https://www.suse.com/security/cve/CVE-2021-32492/" source="CVE"/>
		<reference ref_id="CVE-2021-32493" ref_url="https://www.suse.com/security/cve/CVE-2021-32493/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008794.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

Security issues fixed:

- CVE-2021-32491 [bsc#1185900]: Integer overflow in function render() in tools/ddjvu via crafted djvu file
- CVE-2021-32492 [bsc#1185904]: Out of bounds read in function DJVU:DataPool:has_data() via crafted djvu file
- CVE-2021-32493 [bsc#1185905]: Heap buffer overflow in function DJVU:GBitmap:decode() via crafted djvu file
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185900">SUSE bug 1185900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185904">SUSE bug 1185904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185905">SUSE bug 1185905</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18804/">CVE-2019-18804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18804">CVE-2019-18804 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32491/">CVE-2021-32491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32491">CVE-2021-32491 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32492/">CVE-2021-32492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32492">CVE-2021-32492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32493/">CVE-2021-32493 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32493">CVE-2021-32493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552307" comment="libdjvulibre21-3.5.25.3-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148435" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1185833" ref_url="https://bugzilla.suse.com/1185833" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-18032" ref_url="https://www.suse.com/security/cve/CVE-2020-18032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008793.html" source="SUSE-SU"/>
		<description>
This update for graphviz fixes the following issues:

- CVE-2020-18032: Fixed possible remote code execution via buffer overflow (bsc#1185833).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185833">SUSE bug 1185833</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-18032/">CVE-2020-18032 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18032">CVE-2020-18032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552308" comment="graphviz-2.28.0-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552309" comment="graphviz-gd-2.28.0-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552310" comment="graphviz-gnome-2.28.0-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552311" comment="graphviz-tcl-2.28.0-29.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148436" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="1185698" ref_url="https://bugzilla.suse.com/1185698" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008798.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:

CVE-2021-3537: NULL pointer dereference in valid.c:xmlValidBuildAContentModel (bsc#1185698)
- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in entities.c:xmlEncodeEntitiesInternal (bsc#1185409).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185698">SUSE bug 1185698</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">CVE-2021-3537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552312" comment="libxml2-2-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538983" comment="libxml2-2-32bit-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538984" comment="libxml2-doc-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552313" comment="libxml2-tools-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552314" comment="python-libxml2-2.9.4-46.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148437" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1176076" ref_url="https://bugzilla.suse.com/1176076" source="BUGZILLA"/>
		<reference ref_id="1177077" ref_url="https://bugzilla.suse.com/1177077" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681/" source="CVE"/>
		<reference ref_id="CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682/" source="CVE"/>
		<reference ref_id="CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683/" source="CVE"/>
		<reference ref_id="CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684/" source="CVE"/>
		<reference ref_id="CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685/" source="CVE"/>
		<reference ref_id="CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686/" source="CVE"/>
		<reference ref_id="CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- bsc#1177077: Fixed DNSpooq vulnerabilities
- CVE-2020-25684, CVE-2020-25685, CVE-2020-25686:
  Fixed multiple Cache Poisoning attacks.
- CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687:
  Fixed multiple potential Heap-based overflows when DNSSEC is
  enabled.

- Retry query to other servers on receipt of SERVFAIL rcode
  (bsc#1176076)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-19"/>
	<updated date="2021-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176076">SUSE bug 1176076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25681">CVE-2020-25681 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25682">CVE-2020-25682 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25683">CVE-2020-25683 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25684">CVE-2020-25684 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25685">CVE-2020-25685 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25686">CVE-2020-25686 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25687">CVE-2020-25687 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531824" comment="dnsmasq-2.78-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597574" comment="dnsmasq-utils-2.78-18.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148438" version="1" class="patch">
	<metadata>
		<title>Security update for flac (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1180099" ref_url="https://bugzilla.suse.com/1180099" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0499" ref_url="https://www.suse.com/security/cve/CVE-2020-0499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008132.html" source="SUSE-SU"/>
		<description>
This update for flac fixes the following issues:

- CVE-2020-0499: Fixed an out-of-bounds access (bsc#1180099).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180099">SUSE bug 1180099</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0499/">CVE-2020-0499 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0499">CVE-2020-0499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531825" comment="libFLAC++6-1.3.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531826" comment="libFLAC8-1.3.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531827" comment="libFLAC8-32bit-1.3.0-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148439" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1180405" ref_url="https://bugzilla.suse.com/1180405" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24386" ref_url="https://www.suse.com/security/cve/CVE-2020-24386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008134.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2020-24386: Fixed an issue with IMAP hibernation that allowed users to access other users' emails (bsc#1180405).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180405">SUSE bug 1180405</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24386/">CVE-2020-24386 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24386">CVE-2020-24386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531828" comment="dovecot22-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531829" comment="dovecot22-backend-mysql-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531830" comment="dovecot22-backend-pgsql-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531831" comment="dovecot22-backend-sqlite-2.2.31-19.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148440" version="1" class="patch">
	<metadata>
		<title>Security update for python-httplib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1171998" ref_url="https://bugzilla.suse.com/1171998" source="BUGZILLA"/>
		<reference ref_id="1182053" ref_url="https://bugzilla.suse.com/1182053" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11078" ref_url="https://www.suse.com/security/cve/CVE-2020-11078/" source="CVE"/>
		<reference ref_id="CVE-2021-21240" ref_url="https://www.suse.com/security/cve/CVE-2021-21240/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019148.html" source="SUSE-SU"/>
		<description>
This update for python-httplib2 contains the following fixes:

Security fixes included in this update:
- CVE-2021-21240: Fixed a regular expression denial of service via malicious header (bsc#1182053).
- CVE-2020-11078: Fixed an issue where an attacker could change request headers and body (bsc#1171998).

Non security fixes included in this update:
- Update in SLE to 0.19.0 (bsc#1182053, CVE-2021-21240)

- update to 0.19.0:
  * auth: parse headers using pyparsing instead of regexp
  * auth: WSSE token needs to be string not bytes

- update to 0.18.1: (bsc#1171998, CVE-2020-11078)
  * explicit build-backend workaround for pip build isolation bug
  * IMPORTANT security vulnerability CWE-93 CRLF injection
  Force %xx quote of space, CR, LF characters in uri.
  * Ship test suite in source dist

- update to 0.17.3:
  * bugfixes

- Update to 0.17.1
  * python3: no_proxy was not checked with https
  * feature: Http().redirect_codes set, works after follow(_all)_redirects check
    This allows one line workaround for old gcloud library that uses 308
    response without redirect semantics.
  * IMPORTANT cache invalidation change, fix 307 keep method, add 308 Redirects
  * proxy: username/password as str compatible with pysocks
  * python2: regression in connect() error handling
  * add support for password protected certificate files
  * feature: Http.close() to clean persistent connections and sensitive data

- Update to 0.14.0:
  * Python3: PROXY_TYPE_SOCKS5 with str user/pass raised TypeError

- version update to 0.13.1
  0.13.1
   * Python3: Use no_proxy
     https://github.com/httplib2/httplib2/pull/140
  0.13.0
    * Allow setting TLS max/min versions
      https://github.com/httplib2/httplib2/pull/138
  0.12.3
    * No changes to library. Distribute py3 wheels.
  0.12.1
    * Catch socket timeouts and clear dead connection
      https://github.com/httplib2/httplib2/issues/18
      https://github.com/httplib2/httplib2/pull/111
    * Officially support Python 3.7 (package metadata)
      https://github.com/httplib2/httplib2/issues/123
  0.12.0
    * Drop support for Python 3.3
    * ca_certs from environment HTTPLIB2_CA_CERTS or certifi
      https://github.com/httplib2/httplib2/pull/117
    * PROXY_TYPE_HTTP with non-empty user/pass raised TypeError: bytes required
      https://github.com/httplib2/httplib2/pull/115
    * Revert http:443-&gt;https workaround
      https://github.com/httplib2/httplib2/issues/112
    * eliminate connection pool read race
      https://github.com/httplib2/httplib2/pull/110
    * cache: stronger safename
      https://github.com/httplib2/httplib2/pull/101
  0.11.3
    * No changes, just reupload of 0.11.2 after fixing automatic release conditions in Travis.
  0.11.2
    * proxy: py3 NameError basestring
      https://github.com/httplib2/httplib2/pull/100
  0.11.1
    * Fix HTTP(S)ConnectionWithTimeout AttributeError proxy_info
      https://github.com/httplib2/httplib2/pull/97
  0.11.0
    * Add DigiCert Global Root G2 serial 033af1e6a711a9a0bb2864b11d09fae5
      https://github.com/httplib2/httplib2/pull/91
    * python3 proxy support
      https://github.com/httplib2/httplib2/pull/90
    * If no_proxy environment value ends with comma then proxy is not used
      https://github.com/httplib2/httplib2/issues/11
    * fix UnicodeDecodeError using socks5 proxy
      https://github.com/httplib2/httplib2/pull/64
    * Respect NO_PROXY env var in proxy_info_from_url
      https://github.com/httplib2/httplib2/pull/58
    * NO_PROXY=bar was matching foobar (suffix without dot delimiter)
      New behavior matches curl/wget:
      - no_proxy=foo.bar will only skip proxy for exact hostname match
      - no_proxy=.wild.card will skip proxy for any.subdomains.wild.card
      https://github.com/httplib2/httplib2/issues/94
    * Bugfix for Content-Encoding: deflate
      https://stackoverflow.com/a/22311297
- deleted patches
  - httplib2 started to use certifi and this is already bent to
    use system certificate bundle
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-31"/>
	<updated date="2021-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171998">SUSE bug 1171998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182053">SUSE bug 1182053</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11078/">CVE-2020-11078 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11078">CVE-2020-11078 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21240/">CVE-2021-21240 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21240">CVE-2021-21240 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597575" comment="python-httplib2-0.19.0-7.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148441" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1186253" ref_url="https://bugzilla.suse.com/1186253" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3500" ref_url="https://www.suse.com/security/cve/CVE-2021-3500/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008888.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3500: Stack overflow in function DJVU:DjVuDocument:get_djvu_file() via crafted djvu file (bsc#1186253)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-31"/>
	<updated date="2021-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186253">SUSE bug 1186253</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3500/">CVE-2021-3500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3500">CVE-2021-3500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552315" comment="libdjvulibre21-3.5.25.3-5.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148442" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1186382" ref_url="https://bugzilla.suse.com/1186382" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008906.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

- CVE-2021-25217: A buffer overrun in lease file parsing code can be used to exploit a common vulnerability shared by dhcpd and dhclient (bsc#1186382)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-01"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186382">SUSE bug 1186382</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25217">CVE-2021-25217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552316" comment="dhcp-4.3.3-10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552317" comment="dhcp-client-4.3.3-10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552318" comment="dhcp-relay-4.3.3-10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552319" comment="dhcp-server-4.3.3-10.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148443" version="1" class="patch">
	<metadata>
		<title>Security update for libwebp (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1185652" ref_url="https://bugzilla.suse.com/1185652" source="BUGZILLA"/>
		<reference ref_id="1185654" ref_url="https://bugzilla.suse.com/1185654" source="BUGZILLA"/>
		<reference ref_id="1185673" ref_url="https://bugzilla.suse.com/1185673" source="BUGZILLA"/>
		<reference ref_id="1185674" ref_url="https://bugzilla.suse.com/1185674" source="BUGZILLA"/>
		<reference ref_id="1185685" ref_url="https://bugzilla.suse.com/1185685" source="BUGZILLA"/>
		<reference ref_id="1185686" ref_url="https://bugzilla.suse.com/1185686" source="BUGZILLA"/>
		<reference ref_id="1185690" ref_url="https://bugzilla.suse.com/1185690" source="BUGZILLA"/>
		<reference ref_id="1185691" ref_url="https://bugzilla.suse.com/1185691" source="BUGZILLA"/>
		<reference ref_id="1186247" ref_url="https://bugzilla.suse.com/1186247" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25009" ref_url="https://www.suse.com/security/cve/CVE-2018-25009/" source="CVE"/>
		<reference ref_id="CVE-2018-25010" ref_url="https://www.suse.com/security/cve/CVE-2018-25010/" source="CVE"/>
		<reference ref_id="CVE-2018-25011" ref_url="https://www.suse.com/security/cve/CVE-2018-25011/" source="CVE"/>
		<reference ref_id="CVE-2018-25012" ref_url="https://www.suse.com/security/cve/CVE-2018-25012/" source="CVE"/>
		<reference ref_id="CVE-2018-25013" ref_url="https://www.suse.com/security/cve/CVE-2018-25013/" source="CVE"/>
		<reference ref_id="CVE-2020-36329" ref_url="https://www.suse.com/security/cve/CVE-2020-36329/" source="CVE"/>
		<reference ref_id="CVE-2020-36330" ref_url="https://www.suse.com/security/cve/CVE-2020-36330/" source="CVE"/>
		<reference ref_id="CVE-2020-36331" ref_url="https://www.suse.com/security/cve/CVE-2020-36331/" source="CVE"/>
		<reference ref_id="CVE-2020-36332" ref_url="https://www.suse.com/security/cve/CVE-2020-36332/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008911.html" source="SUSE-SU"/>
		<description>
This update for libwebp fixes the following issues:

- CVE-2018-25010: Fixed heap-based buffer overflow in ApplyFilter() (bsc#1185685).
- CVE-2020-36330: Fixed heap-based buffer overflow in ChunkVerifyAndAssign() (bsc#1185691).
- CVE-2020-36332: Fixed extreme memory allocation when reading a file (bsc#1185674).
- CVE-2020-36329: Fixed use-after-free in EmitFancyRGB() (bsc#1185652).
- CVE-2018-25012: Fixed heap-based buffer overflow in GetLE24() (bsc#1185690).
- CVE-2018-25013: Fixed heap-based buffer overflow in ShiftBytes() (bsc#1185654).
- CVE-2020-36331: Fixed heap-based buffer overflow in ChunkAssignData() (bsc#1185686).
- CVE-2018-25009: Fixed heap-based buffer overflow in GetLE16() (bsc#1185673).
- CVE-2018-25011: Fixed fail on multiple image chunks (bsc#1186247).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-02"/>
	<updated date="2021-06-02"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185652">SUSE bug 1185652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185654">SUSE bug 1185654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185673">SUSE bug 1185673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185674">SUSE bug 1185674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185685">SUSE bug 1185685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185686">SUSE bug 1185686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185690">SUSE bug 1185690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185691">SUSE bug 1185691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186247">SUSE bug 1186247</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25009/">CVE-2018-25009 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25009">CVE-2018-25009 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25010/">CVE-2018-25010 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25010">CVE-2018-25010 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25011/">CVE-2018-25011 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25011">CVE-2018-25011 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25012/">CVE-2018-25012 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25012">CVE-2018-25012 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25013/">CVE-2018-25013 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25013">CVE-2018-25013 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36329/">CVE-2020-36329 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36329">CVE-2020-36329 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36330/">CVE-2020-36330 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36330">CVE-2020-36330 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36331/">CVE-2020-36331 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36331">CVE-2020-36331 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36332/">CVE-2020-36332 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36332">CVE-2020-36332 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552333" comment="libwebp5-0.4.3-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538993" comment="libwebp5-32bit-0.4.3-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552334" comment="libwebpdemux1-0.4.3-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597576" comment="libwebpmux1-0.4.3-4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148444" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1186497" ref_url="https://bugzilla.suse.com/1186497" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3560" ref_url="https://www.suse.com/security/cve/CVE-2021-3560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008927.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-3560: Fixed a local privilege escalation using polkit_system_bus_name_get_creds_sync() (bsc#1186497).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-03"/>
	<updated date="2021-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186497">SUSE bug 1186497</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3560/">CVE-2021-3560 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3560">CVE-2021-3560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552335" comment="libpolkit0-0.113-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552336" comment="polkit-0.113-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552337" comment="typelib-1_0-Polkit-1_0-0.113-5.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148445" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1181255" ref_url="https://bugzilla.suse.com/1181255" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008942.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-bad fixes the following issues:

- CVE-2021-3185: Fixed buffer overflow in gst_h264_slice_parse_dec_ref_pic_marking (bsc#1181255).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-07"/>
	<updated date="2021-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181255">SUSE bug 1181255</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3185">CVE-2021-3185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552339" comment="gstreamer-plugins-bad-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539006" comment="gstreamer-plugins-bad-lang-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552340" comment="libgstadaptivedemux-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552341" comment="libgstbadaudio-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552342" comment="libgstbadbase-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552343" comment="libgstbadvideo-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552344" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552345" comment="libgstcodecparsers-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552346" comment="libgstgl-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552347" comment="libgstmpegts-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552348" comment="libgstphotography-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552349" comment="libgsturidownloader-1_0-0-1.8.3-18.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148446" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1185633" ref_url="https://bugzilla.suse.com/1185633" source="BUGZILLA"/>
		<reference ref_id="1186696" ref_url="https://bugzilla.suse.com/1186696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29951" ref_url="https://www.suse.com/security/cve/CVE-2021-29951/" source="CVE"/>
		<reference ref_id="CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008953.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.11.0 ESR (bsc#1186696)

  * CVE-2021-29964: Out of bounds-read when parsing a `WM_COPYDATA` message
  * CVE-2021-29967: Memory safety bugs fixed in Firefox
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185633">SUSE bug 1185633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186696">SUSE bug 1186696</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29951/">CVE-2021-29951 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29951">CVE-2021-29951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29964">CVE-2021-29964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29967">CVE-2021-29967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552350" comment="MozillaFirefox-78.11.0-112.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552351" comment="MozillaFirefox-devel-78.11.0-112.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552352" comment="MozillaFirefox-translations-common-78.11.0-112.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148447" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1186643" ref_url="https://bugzilla.suse.com/1186643" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008951.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Regression in the fix for CVE-2021-31535, causing segfaults for xforms applications like fdesign (bsc#1186643)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186643">SUSE bug 1186643</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31535">CVE-2021-31535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552353" comment="libX11-6-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539021" comment="libX11-6-32bit-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539022" comment="libX11-data-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552354" comment="libX11-xcb1-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539024" comment="libX11-xcb1-32bit-1.6.2-12.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148448" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1094725" ref_url="https://bugzilla.suse.com/1094725" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1172380" ref_url="https://bugzilla.suse.com/1172380" source="BUGZILLA"/>
		<reference ref_id="1172382" ref_url="https://bugzilla.suse.com/1172382" source="BUGZILLA"/>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1178683" ref_url="https://bugzilla.suse.com/1178683" source="BUGZILLA"/>
		<reference ref_id="1178935" ref_url="https://bugzilla.suse.com/1178935" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1181933" ref_url="https://bugzilla.suse.com/1181933" source="BUGZILLA"/>
		<reference ref_id="1182846" ref_url="https://bugzilla.suse.com/1182846" source="BUGZILLA"/>
		<reference ref_id="1182975" ref_url="https://bugzilla.suse.com/1182975" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756/" source="CVE"/>
		<reference ref_id="CVE-2020-13754" ref_url="https://www.suse.com/security/cve/CVE-2020-13754/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-25707" ref_url="https://www.suse.com/security/cve/CVE-2020-25707/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="CVE-2021-20221" ref_url="https://www.suse.com/security/cve/CVE-2021-20221/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-3419" ref_url="https://www.suse.com/security/cve/CVE-2021-3419/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- Fix OOB access during mmio operations (CVE-2020-13754, bsc#1172382)
- Fix out-of-bounds read information disclosure in icmp6_send_echoreply (CVE-2020-10756, bsc#1172380)
- Fix out-of-bound heap buffer access via an interrupt ID field (CVE-2021-20221, bsc#1181933)
- For the record, these issues are fixed in this package already.
  Most are alternate references to previously mentioned issues:
  (CVE-2019-15890, bsc#1149813, CVE-2020-8608, bsc#1163019,
  CVE-2020-14364, bsc#1175534, CVE-2020-25707, bsc#1178683,
  CVE-2020-25723, bsc#1178935, CVE-2020-29130, bsc#1179477,
  CVE-2021-20257, bsc#1182846, CVE-2021-3419, bsc#1182975,
  bsc#1094725)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1094725">SUSE bug 1094725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172380">SUSE bug 1172380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172382">SUSE bug 1172382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178683">SUSE bug 1178683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178935">SUSE bug 1178935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181933">SUSE bug 1181933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182975">SUSE bug 1182975</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10756">CVE-2020-10756 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13754/">CVE-2020-13754 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13754">CVE-2020-13754 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25707/">CVE-2020-25707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-25707">CVE-2020-25707 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25723">CVE-2020-25723 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20221/">CVE-2021-20221 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20221">CVE-2021-20221 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3419/">CVE-2021-3419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3419">CVE-2021-3419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555909" comment="qemu-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555910" comment="qemu-block-curl-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555911" comment="qemu-block-iscsi-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539028" comment="qemu-block-rbd-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555912" comment="qemu-block-ssh-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555913" comment="qemu-guest-agent-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539031" comment="qemu-ipxe-1.0.0+-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539032" comment="qemu-kvm-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555914" comment="qemu-lang-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539035" comment="qemu-seabios-1.10.2_0_g5f4c7b1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539036" comment="qemu-sgabios-8-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555915" comment="qemu-tools-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539038" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539039" comment="qemu-x86-2.9.1-6.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148449" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 75 [bsc#1180063, bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14782 CVE-2020-14781
  CVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class Libraries:
    - Z/OS specific C function send_file is changing the file pointer position
  * Security:
    - Add the new oracle signer certificate
    - Certificate parsing error
    - JVM memory growth can be caused by the IBMPKCS11IMPL crypto provider
    - Remove check for websphere signed jars
    - sessionid.hashcode generates too many collisions
    - The Java 8 IBM certpath provider does not honor the user
      specified system property for CLR connect timeout
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531832" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531834" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531835" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148450" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1181686" ref_url="https://bugzilla.suse.com/1181686" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20201" ref_url="https://www.suse.com/security/cve/CVE-2021-20201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008964.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

- CVE-2021-20201: client initiated renegotiation causing denial of service (bsc#1181686)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181686">SUSE bug 1181686</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20201/">CVE-2021-20201 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20201">CVE-2021-20201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555916" comment="libspice-server1-0.12.8-18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148451" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1179833" ref_url="https://bugzilla.suse.com/1179833" source="BUGZILLA"/>
		<reference ref_id="1179836" ref_url="https://bugzilla.suse.com/1179836" source="BUGZILLA"/>
		<reference ref_id="1179837" ref_url="https://bugzilla.suse.com/1179837" source="BUGZILLA"/>
		<reference ref_id="1179839" ref_url="https://bugzilla.suse.com/1179839" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489/" source="CVE"/>
		<reference ref_id="CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511/" source="CVE"/>
		<reference ref_id="CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512/" source="CVE"/>
		<reference ref_id="CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019273.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20210608 release.

- CVE-2020-24513: A domain bypass transient execution vulnerability was discovered on some Intel Atom processors that use a micro-architectural incident channel. (INTEL-SA-00465 bsc#1179833)

  See also: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html

- CVE-2020-24511: The IBRS feature to mitigate Spectre variant 2 transient execution side channel vulnerabilities may not fully prevent non-root (guest) branches from controlling the branch predictions of the root (host) (INTEL-SA-00464 bsc#1179836)

  See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html)

- CVE-2020-24512: Fixed trivial data value cache-lines such as all-zero value cache-lines may lead to changes in cache-allocation or write-back behavior for such cache-lines (bsc#1179837 INTEL-SA-00464)

  See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html)

- CVE-2020-24489: Fixed Intel VT-d device pass through potential local privilege escalation (INTEL-SA-00442 bsc#1179839)

  See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html

Other fixes:

- Update for functional issues. Refer to [Third Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780)for details.
- Update for functional issues. Refer to [Second Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
- Update for functional issues. Refer to [Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
- Update for functional issues. Refer to [Intel Xeon Processor D-1500, D-1500 NS and D-1600 NS Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-d-1500-specification-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon E7-8800 and E7-4800 v3 Processor Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e7-v3-spec-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
- Update for functional issues. Refer to [10th Gen Intel Core Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
- Update for functional issues. Refer to [8th and 9th Gen Intel Core Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
- Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
- Update for functional issues. Refer to [6th Gen Intel Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
- Update for functional issues. Refer to [Intel Xeon E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

- New platforms:

| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| CLX-SP         | A0       | 06-55-05/b7 |          | 03000010 | Xeon Scalable Gen2
| ICX-SP         | C0       | 06-6a-05/87 |          | 0c0002f0 | Xeon Scalable Gen3
| ICX-SP         | D0       | 06-6a-06/87 |          | 0d0002a0 | Xeon Scalable Gen3
| SNR            | B0       | 06-86-04/01 |          | 0b00000f | Atom P59xxB
| SNR            | B1       | 06-86-05/01 |          | 0b00000f | Atom P59xxB
| TGL            | B1       | 06-8c-01/80 |          | 00000088 | Core Gen11 Mobile
| TGL-R          | C0       | 06-8c-02/c2 |          | 00000016 | Core Gen11 Mobile
| TGL-H          | R0       | 06-8d-01/c2 |          | 0000002c | Core Gen11 Mobile
| EHL            | B1       | 06-96-01/01 |          | 00000011 | Pentium J6426/N6415, Celeron J6412/J6413/N6210/N6211, Atom x6000E
| JSL            | A0/A1    | 06-9c-00/01 |          | 0000001d | Pentium N6000/N6005, Celeron N4500/N4505/N5100/N5105
| RKL-S          | B0       | 06-a7-01/02 |          | 00000040 | Core Gen11

- Updated platforms:

| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000044 | 00000046 | Core Gen4 X series; Xeon E5 v3
| HSX-EX         | E0       | 06-3f-04/80 | 00000016 | 00000019 | Xeon E7 v3
| SKL-U/Y        | D0       | 06-4e-03/c0 | 000000e2 | 000000ea | Core Gen6 Mobile
| SKL-U23e       | K1       | 06-4e-03/c0 | 000000e2 | 000000ea | Core Gen6 Mobile
| BDX-ML         | B0/M0/R0 | 06-4f-01/ef | 0b000038 | 0b00003e | Xeon E5/E7 v4; Core i7-69xx/68xx
| SKX-SP         | B1       | 06-55-03/97 | 01000159 | 0100015b | Xeon Scalable
| SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006a0a | 02006b06 | Xeon Scalable
| SKX-D          | M1       | 06-55-04/b7 | 02006a0a | 02006b06 | Xeon D-21xx
| CLX-SP         | B0       | 06-55-06/bf | 04003006 | 04003102 | Xeon Scalable Gen2
| CLX-SP         | B1       | 06-55-07/bf | 05003006 | 05003102 | Xeon Scalable Gen2
| CPX-SP         | A1       | 06-55-0b/bf | 0700001e | 07002302 | Xeon Scalable Gen3
| BDX-DE         | V2/V3    | 06-56-03/10 | 07000019 | 0700001b | Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
| BDX-DE         | Y0       | 06-56-04/10 | 0f000017 | 0f000019 | Xeon D-1557/59/67/71/77/81/87
| BDX-NS         | A0       | 06-56-05/10 | 0e00000f | 0e000012 | Xeon D-1513N/23/33/43/53
| APL            | D0       | 06-5c-09/03 | 00000040 | 00000044 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
| APL            | E0       | 06-5c-0a/03 | 0000001e | 00000020 | Atom x5-E39xx
| SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000e2 | 000000ea | Core Gen6; Xeon E3 v5
| DNV            | B0       | 06-5f-01/01 | 0000002e | 00000034 | Atom C Series
| GLK            | B0       | 06-7a-01/01 | 00000034 | 00000036 | Pentium Silver N/J5xxx, Celeron N/J4xxx
| GKL-R          | R0       | 06-7a-08/01 | 00000018 | 0000001a | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
| ICL-U/Y        | D1       | 06-7e-05/80 | 000000a0 | 000000a6 | Core Gen10 Mobile
| LKF            | B2/B3    | 06-8a-01/10 | 00000028 | 0000002a | Core w/Hybrid Technology
| AML-Y22        | H0       | 06-8e-09/10 | 000000de | 000000ea | Core Gen8 Mobile
| KBL-U/Y        | H0       | 06-8e-09/c0 | 000000de | 000000ea | Core Gen7 Mobile
| CFL-U43e       | D0       | 06-8e-0a/c0 | 000000e0 | 000000ea | Core Gen8 Mobile
| WHL-U          | W0       | 06-8e-0b/d0 | 000000de | 000000ea | Core Gen8 Mobile
| AML-Y42        | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen10 Mobile
| CML-Y42        | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen10 Mobile
| WHL-U          | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen8 Mobile
| KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000de | 000000ea | Core Gen7; Xeon E3 v6
| CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000de | 000000ea | Core Gen8 Desktop, Mobile, Xeon E
| CFL-S          | B0       | 06-9e-0b/02 | 000000de | 000000ea | Core Gen8
| CFL-H/S        | P0       | 06-9e-0c/22 | 000000de | 000000ea | Core Gen9
| CFL-H          | R0       | 06-9e-0d/22 | 000000de | 000000ea | Core Gen9 Mobile
| CML-H          | R1       | 06-a5-02/20 | 000000e0 | 000000ea | Core Gen10 Mobile
| CML-S62        | G1       | 06-a5-03/22 | 000000e0 | 000000ea | Core Gen10
| CML-S102       | Q0       | 06-a5-05/22 | 000000e0 | 000000ec | Core Gen10
| CML-U62        | A0       | 06-a6-00/80 | 000000e0 | 000000e8 | Core Gen10 Mobile
| CML-U62 V2     | K0       | 06-a6-01/80 | 000000e0 | 000000ea | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-10"/>
	<updated date="2021-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179833">SUSE bug 1179833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179836">SUSE bug 1179836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179837">SUSE bug 1179837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179839">SUSE bug 1179839</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24489">CVE-2020-24489 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24511">CVE-2020-24511 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24512">CVE-2020-24512 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24513">CVE-2020-24513 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539041" comment="ucode-intel-20210525-13.90.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148452" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1180834" ref_url="https://bugzilla.suse.com/1180834" source="BUGZILLA"/>
		<reference ref_id="1183101" ref_url="https://bugzilla.suse.com/1183101" source="BUGZILLA"/>
		<reference ref_id="1183105" ref_url="https://bugzilla.suse.com/1183105" source="BUGZILLA"/>
		<reference ref_id="1183107" ref_url="https://bugzilla.suse.com/1183107" source="BUGZILLA"/>
		<reference ref_id="1183108" ref_url="https://bugzilla.suse.com/1183108" source="BUGZILLA"/>
		<reference ref_id="1185785" ref_url="https://bugzilla.suse.com/1185785" source="BUGZILLA"/>
		<reference ref_id="1185786" ref_url="https://bugzilla.suse.com/1185786" source="BUGZILLA"/>
		<reference ref_id="1185803" ref_url="https://bugzilla.suse.com/1185803" source="BUGZILLA"/>
		<reference ref_id="1185804" ref_url="https://bugzilla.suse.com/1185804" source="BUGZILLA"/>
		<reference ref_id="1185805" ref_url="https://bugzilla.suse.com/1185805" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35653" ref_url="https://www.suse.com/security/cve/CVE-2020-35653/" source="CVE"/>
		<reference ref_id="CVE-2021-25287" ref_url="https://www.suse.com/security/cve/CVE-2021-25287/" source="CVE"/>
		<reference ref_id="CVE-2021-25288" ref_url="https://www.suse.com/security/cve/CVE-2021-25288/" source="CVE"/>
		<reference ref_id="CVE-2021-25290" ref_url="https://www.suse.com/security/cve/CVE-2021-25290/" source="CVE"/>
		<reference ref_id="CVE-2021-25292" ref_url="https://www.suse.com/security/cve/CVE-2021-25292/" source="CVE"/>
		<reference ref_id="CVE-2021-27922" ref_url="https://www.suse.com/security/cve/CVE-2021-27922/" source="CVE"/>
		<reference ref_id="CVE-2021-27923" ref_url="https://www.suse.com/security/cve/CVE-2021-27923/" source="CVE"/>
		<reference ref_id="CVE-2021-28675" ref_url="https://www.suse.com/security/cve/CVE-2021-28675/" source="CVE"/>
		<reference ref_id="CVE-2021-28676" ref_url="https://www.suse.com/security/cve/CVE-2021-28676/" source="CVE"/>
		<reference ref_id="CVE-2021-28677" ref_url="https://www.suse.com/security/cve/CVE-2021-28677/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008982.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2021-25292: Fixed a backtracking regex in PDF parser could be used as a DOS attack (bsc#1183101).
- CVE-2021-25290: Fixed a negative-offset memcpy with an invalid size in TiffDecode.c (bsc#1183105).
- CVE-2021-27922,CVE-2021-27923: Fixed improper reported size of a contained image (bsc#1183108,bsc#1183107)
- CVE-2020-35653: Fixed buffer over-read in PcxDecode when decoding a crafted PCX file (bsc#1180834).
- CVE-2021-25287: Fixed out-of-bounds read in J2kDecode in j2ku_graya_la (bsc#1185805).
- CVE-2021-25288: Fixed out-of-bounds read in J2kDecode in j2ku_gray_i (bsc#1185803).
- CVE-2021-28675: Fixed DoS in PsdImagePlugin (bsc#1185804).
- CVE-2021-28677: Fixed DoS in the open phase via a malicious EPS file (bsc#1185785).
- CVE-2021-28676: Fixed infinite loop in FliDecode.c (bsc#1185786).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-10"/>
	<updated date="2021-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180834">SUSE bug 1180834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183101">SUSE bug 1183101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183105">SUSE bug 1183105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183107">SUSE bug 1183107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183108">SUSE bug 1183108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185785">SUSE bug 1185785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185786">SUSE bug 1185786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185803">SUSE bug 1185803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185804">SUSE bug 1185804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185805">SUSE bug 1185805</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35653/">CVE-2020-35653 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35653">CVE-2020-35653 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25287/">CVE-2021-25287 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25287">CVE-2021-25287 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25288/">CVE-2021-25288 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25288">CVE-2021-25288 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25290/">CVE-2021-25290 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25290">CVE-2021-25290 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25292/">CVE-2021-25292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25292">CVE-2021-25292 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27922/">CVE-2021-27922 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27922">CVE-2021-27922 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27923/">CVE-2021-27923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27923">CVE-2021-27923 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28675/">CVE-2021-28675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28675">CVE-2021-28675 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28676/">CVE-2021-28676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28676">CVE-2021-28676 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28677/">CVE-2021-28677 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28677">CVE-2021-28677 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597577" comment="python-Pillow-4.2.1-3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148453" version="1" class="patch">
	<metadata>
		<title>Security update for caribou (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1186617" ref_url="https://bugzilla.suse.com/1186617" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3567" ref_url="https://www.suse.com/security/cve/CVE-2021-3567/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008985.html" source="SUSE-SU"/>
		<description>
This update for caribou fixes the following issues:

Security issue fixed:

- CVE-2021-3567: Fixed a segfault when attempting to use shifted characters (bsc#1186617).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-10"/>
	<updated date="2021-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186617">SUSE bug 1186617</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3567/">CVE-2021-3567 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3567">CVE-2021-3567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552363" comment="caribou-common-0.4.21-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552364" comment="libcaribou0-0.4.21-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552365" comment="typelib-1_0-Caribou-1_0-0.4.21-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148454" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1184016" ref_url="https://bugzilla.suse.com/1184016" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009000.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

- Do not log passwords in logfiles (bsc#1184016)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-11"/>
	<updated date="2021-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184016">SUSE bug 1184016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555917" comment="freeradius-server-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555918" comment="freeradius-server-doc-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555919" comment="freeradius-server-krb5-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555920" comment="freeradius-server-ldap-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555921" comment="freeradius-server-libs-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555922" comment="freeradius-server-mysql-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555923" comment="freeradius-server-perl-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555924" comment="freeradius-server-postgresql-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555925" comment="freeradius-server-python-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555926" comment="freeradius-server-sqlite-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555927" comment="freeradius-server-utils-3.0.15-2.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148455" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009020.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u292 (icedtea 3.19.0).
- CVE-2021-2161: Fixed incomplete enforcement of JAR signing disabled algorithms (bsc#1185055).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-15"/>
	<updated date="2021-06-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552366" comment="java-1_8_0-openjdk-1.8.0.292-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552367" comment="java-1_8_0-openjdk-demo-1.8.0.292-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552368" comment="java-1_8_0-openjdk-devel-1.8.0.292-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552369" comment="java-1_8_0-openjdk-headless-1.8.0.292-27.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148456" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1179103" ref_url="https://bugzilla.suse.com/1179103" source="BUGZILLA"/>
		<reference ref_id="1179202" ref_url="https://bugzilla.suse.com/1179202" source="BUGZILLA"/>
		<reference ref_id="1179208" ref_url="https://bugzilla.suse.com/1179208" source="BUGZILLA"/>
		<reference ref_id="1179212" ref_url="https://bugzilla.suse.com/1179212" source="BUGZILLA"/>
		<reference ref_id="1179223" ref_url="https://bugzilla.suse.com/1179223" source="BUGZILLA"/>
		<reference ref_id="1179240" ref_url="https://bugzilla.suse.com/1179240" source="BUGZILLA"/>
		<reference ref_id="1179244" ref_url="https://bugzilla.suse.com/1179244" source="BUGZILLA"/>
		<reference ref_id="1179260" ref_url="https://bugzilla.suse.com/1179260" source="BUGZILLA"/>
		<reference ref_id="1179268" ref_url="https://bugzilla.suse.com/1179268" source="BUGZILLA"/>
		<reference ref_id="1179269" ref_url="https://bugzilla.suse.com/1179269" source="BUGZILLA"/>
		<reference ref_id="1179278" ref_url="https://bugzilla.suse.com/1179278" source="BUGZILLA"/>
		<reference ref_id="1179281" ref_url="https://bugzilla.suse.com/1179281" source="BUGZILLA"/>
		<reference ref_id="1179285" ref_url="https://bugzilla.suse.com/1179285" source="BUGZILLA"/>
		<reference ref_id="1179311" ref_url="https://bugzilla.suse.com/1179311" source="BUGZILLA"/>
		<reference ref_id="1179312" ref_url="https://bugzilla.suse.com/1179312" source="BUGZILLA"/>
		<reference ref_id="1179313" ref_url="https://bugzilla.suse.com/1179313" source="BUGZILLA"/>
		<reference ref_id="1179315" ref_url="https://bugzilla.suse.com/1179315" source="BUGZILLA"/>
		<reference ref_id="1179317" ref_url="https://bugzilla.suse.com/1179317" source="BUGZILLA"/>
		<reference ref_id="1179321" ref_url="https://bugzilla.suse.com/1179321" source="BUGZILLA"/>
		<reference ref_id="1179322" ref_url="https://bugzilla.suse.com/1179322" source="BUGZILLA"/>
		<reference ref_id="1179327" ref_url="https://bugzilla.suse.com/1179327" source="BUGZILLA"/>
		<reference ref_id="1179333" ref_url="https://bugzilla.suse.com/1179333" source="BUGZILLA"/>
		<reference ref_id="1179336" ref_url="https://bugzilla.suse.com/1179336" source="BUGZILLA"/>
		<reference ref_id="1179338" ref_url="https://bugzilla.suse.com/1179338" source="BUGZILLA"/>
		<reference ref_id="1179339" ref_url="https://bugzilla.suse.com/1179339" source="BUGZILLA"/>
		<reference ref_id="1179343" ref_url="https://bugzilla.suse.com/1179343" source="BUGZILLA"/>
		<reference ref_id="1179345" ref_url="https://bugzilla.suse.com/1179345" source="BUGZILLA"/>
		<reference ref_id="1179346" ref_url="https://bugzilla.suse.com/1179346" source="BUGZILLA"/>
		<reference ref_id="1179347" ref_url="https://bugzilla.suse.com/1179347" source="BUGZILLA"/>
		<reference ref_id="1179361" ref_url="https://bugzilla.suse.com/1179361" source="BUGZILLA"/>
		<reference ref_id="1179362" ref_url="https://bugzilla.suse.com/1179362" source="BUGZILLA"/>
		<reference ref_id="1179397" ref_url="https://bugzilla.suse.com/1179397" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667/" source="CVE"/>
		<reference ref_id="CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664/" source="CVE"/>
		<reference ref_id="CVE-2020-25665" ref_url="https://www.suse.com/security/cve/CVE-2020-25665/" source="CVE"/>
		<reference ref_id="CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666/" source="CVE"/>
		<reference ref_id="CVE-2020-25674" ref_url="https://www.suse.com/security/cve/CVE-2020-25674/" source="CVE"/>
		<reference ref_id="CVE-2020-25675" ref_url="https://www.suse.com/security/cve/CVE-2020-25675/" source="CVE"/>
		<reference ref_id="CVE-2020-25676" ref_url="https://www.suse.com/security/cve/CVE-2020-25676/" source="CVE"/>
		<reference ref_id="CVE-2020-27750" ref_url="https://www.suse.com/security/cve/CVE-2020-27750/" source="CVE"/>
		<reference ref_id="CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751/" source="CVE"/>
		<reference ref_id="CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752/" source="CVE"/>
		<reference ref_id="CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753/" source="CVE"/>
		<reference ref_id="CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754/" source="CVE"/>
		<reference ref_id="CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755/" source="CVE"/>
		<reference ref_id="CVE-2020-27757" ref_url="https://www.suse.com/security/cve/CVE-2020-27757/" source="CVE"/>
		<reference ref_id="CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759/" source="CVE"/>
		<reference ref_id="CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760/" source="CVE"/>
		<reference ref_id="CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761/" source="CVE"/>
		<reference ref_id="CVE-2020-27762" ref_url="https://www.suse.com/security/cve/CVE-2020-27762/" source="CVE"/>
		<reference ref_id="CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763/" source="CVE"/>
		<reference ref_id="CVE-2020-27764" ref_url="https://www.suse.com/security/cve/CVE-2020-27764/" source="CVE"/>
		<reference ref_id="CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765/" source="CVE"/>
		<reference ref_id="CVE-2020-27766" ref_url="https://www.suse.com/security/cve/CVE-2020-27766/" source="CVE"/>
		<reference ref_id="CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767/" source="CVE"/>
		<reference ref_id="CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768/" source="CVE"/>
		<reference ref_id="CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769/" source="CVE"/>
		<reference ref_id="CVE-2020-27770" ref_url="https://www.suse.com/security/cve/CVE-2020-27770/" source="CVE"/>
		<reference ref_id="CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771/" source="CVE"/>
		<reference ref_id="CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772/" source="CVE"/>
		<reference ref_id="CVE-2020-27773" ref_url="https://www.suse.com/security/cve/CVE-2020-27773/" source="CVE"/>
		<reference ref_id="CVE-2020-27774" ref_url="https://www.suse.com/security/cve/CVE-2020-27774/" source="CVE"/>
		<reference ref_id="CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775/" source="CVE"/>
		<reference ref_id="CVE-2020-27776" ref_url="https://www.suse.com/security/cve/CVE-2020-27776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103).
- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202).
- CVE-2020-25665: Fixed a heap-based buffer overflow in WritePALMImage (bsc#1179208).
- CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212).
- CVE-2020-25674: Fixed a heap-based buffer overflow in WriteOnePNGImage (bsc#1179223).
- CVE-2020-25675: Fixed an outside the range of representable values of type 'long' and integer overflow (bsc#1179240).
- CVE-2020-25676: Fixed an outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c (bsc#1179244).
- CVE-2020-27750: Fixed an division by zero in MagickCore/colorspace-private.h (bsc#1179260).
- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397).
- CVE-2020-27754: Fixed an outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336).
- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345).
- CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
- CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313).
- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281).
- CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315).
- CVE-2020-27762: Fixed an outside the range of representable values of type 'unsigned char' (bsc#1179278).
- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312).
- CVE-2020-27764: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179317).
- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311).
- CVE-2020-27766: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179361).
- CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322).
- CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
- CVE-2020-27769: Fixed an outside the range of representable values of type 'float' at MagickCore/quantize.c (bsc#1179321).
- CVE-2020-27770: Fixed an unsigned offset overflowed at MagickCore/string.c (bsc#1179343).
- CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327).
- CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347).
- CVE-2020-27773: Fixed a division by zero at MagickCore/gem-private.h (bsc#1179285).
- CVE-2020-27774: Fixed an integer overflow at MagickCore/statistic.c (bsc#1179333).
- CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
- CVE-2020-27776: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179362).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-22"/>
	<updated date="2021-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179103">SUSE bug 1179103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179208">SUSE bug 1179208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179212">SUSE bug 1179212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179223">SUSE bug 1179223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179240">SUSE bug 1179240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179244">SUSE bug 1179244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179260">SUSE bug 1179260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179268">SUSE bug 1179268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179278">SUSE bug 1179278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179281">SUSE bug 1179281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179285">SUSE bug 1179285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179311">SUSE bug 1179311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179312">SUSE bug 1179312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179315">SUSE bug 1179315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179317">SUSE bug 1179317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179327">SUSE bug 1179327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179338">SUSE bug 1179338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179339">SUSE bug 1179339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179343">SUSE bug 1179343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179345">SUSE bug 1179345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179347">SUSE bug 1179347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179361">SUSE bug 1179361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179362">SUSE bug 1179362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179397">SUSE bug 1179397</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19667">CVE-2020-19667 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25664">CVE-2020-25664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25665/">CVE-2020-25665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25665">CVE-2020-25665 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25666">CVE-2020-25666 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25674/">CVE-2020-25674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25674">CVE-2020-25674 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25675/">CVE-2020-25675 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25675">CVE-2020-25675 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25676/">CVE-2020-25676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25676">CVE-2020-25676 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27750/">CVE-2020-27750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27750">CVE-2020-27750 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27751">CVE-2020-27751 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27752">CVE-2020-27752 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27753">CVE-2020-27753 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27754">CVE-2020-27754 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27755">CVE-2020-27755 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27757/">CVE-2020-27757 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27757">CVE-2020-27757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27759">CVE-2020-27759 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27760">CVE-2020-27760 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27761">CVE-2020-27761 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27762/">CVE-2020-27762 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27762">CVE-2020-27762 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27763">CVE-2020-27763 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27764/">CVE-2020-27764 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27764">CVE-2020-27764 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27765">CVE-2020-27765 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27766/">CVE-2020-27766 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27766">CVE-2020-27766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27767">CVE-2020-27767 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27768">CVE-2020-27768 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27769">CVE-2020-27769 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27770/">CVE-2020-27770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27770">CVE-2020-27770 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27771">CVE-2020-27771 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27772">CVE-2020-27772 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27773/">CVE-2020-27773 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27773">CVE-2020-27773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27774/">CVE-2020-27774 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27774">CVE-2020-27774 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27775">CVE-2020-27775 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27776/">CVE-2020-27776 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27776">CVE-2020-27776 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148457" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1177087" ref_url="https://bugzilla.suse.com/1177087" source="BUGZILLA"/>
		<reference ref_id="1179122" ref_url="https://bugzilla.suse.com/1179122" source="BUGZILLA"/>
		<reference ref_id="1179451" ref_url="https://bugzilla.suse.com/1179451" source="BUGZILLA"/>
		<reference ref_id="1182286" ref_url="https://bugzilla.suse.com/1182286" source="BUGZILLA"/>
		<reference ref_id="1184155" ref_url="https://bugzilla.suse.com/1184155" source="BUGZILLA"/>
		<reference ref_id="1184262" ref_url="https://bugzilla.suse.com/1184262" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13543" ref_url="https://www.suse.com/security/cve/CVE-2020-13543/" source="CVE"/>
		<reference ref_id="CVE-2020-13558" ref_url="https://www.suse.com/security/cve/CVE-2020-13558/" source="CVE"/>
		<reference ref_id="CVE-2020-13584" ref_url="https://www.suse.com/security/cve/CVE-2020-13584/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9983" ref_url="https://www.suse.com/security/cve/CVE-2020-9983/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1789" ref_url="https://www.suse.com/security/cve/CVE-2021-1789/" source="CVE"/>
		<reference ref_id="CVE-2021-1799" ref_url="https://www.suse.com/security/cve/CVE-2021-1799/" source="CVE"/>
		<reference ref_id="CVE-2021-1801" ref_url="https://www.suse.com/security/cve/CVE-2021-1801/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1870" ref_url="https://www.suse.com/security/cve/CVE-2021-1870/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.1:
  + Improve handling of Media Capture devices.
  + Improve WebAudio playback.
  + Improve video orientation handling.
  + Improve seeking support for MSE playback.
  + Improve flush support in EME decryptors.
  + Fix HTTP status codes for requests done through a custom URI handler.
  + Fix the Bubblewrap sandbox in certain 32-bit systems.
  + Fix inconsistencies between the WebKitWebView.is-muted property
    state and values returned by
    webkit_web_view_is_playing_audio().
  + Fix the build with ENABLE_VIDEO=OFF.
  + Fix wrong timestamps for long-lived cookies.
  + Fix UI process crash when failing to load favicons.
  + Fix several crashes and rendering issues.
- Including Security fixes for: CVE-2021-1788, CVE-2021-1844, CVE-2021-1871,
    CVE-2020-27918, CVE-2020-29623, CVE-2021-1765, CVE-2021-1789, CVE-2021-1799,
    CVE-2021-1801, CVE-2021-1870, CVE-2020-13558, CVE-2020-13584, CVE-2020-9983, 
    CVE-2020-13543, CVE-2020-9947, CVE-2020-9948, CVE-2020-9951.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177087">SUSE bug 1177087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179122">SUSE bug 1179122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179451">SUSE bug 1179451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182286">SUSE bug 1182286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184155">SUSE bug 1184155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13543/">CVE-2020-13543 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13543">CVE-2020-13543 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13558/">CVE-2020-13558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13558">CVE-2020-13558 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13584/">CVE-2020-13584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13584">CVE-2020-13584 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27918">CVE-2020-27918 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29623">CVE-2020-29623 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9947">CVE-2020-9947 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9948">CVE-2020-9948 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9951">CVE-2020-9951 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9983/">CVE-2020-9983 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9983">CVE-2020-9983 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1765">CVE-2021-1765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1788">CVE-2021-1788 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1789/">CVE-2021-1789 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1789">CVE-2021-1789 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1799/">CVE-2021-1799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1799">CVE-2021-1799 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1801/">CVE-2021-1801 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1801">CVE-2021-1801 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1844">CVE-2021-1844 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1870/">CVE-2021-1870 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1870">CVE-2021-1870 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1871">CVE-2021-1871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552370" comment="libjavascriptcoregtk-4_0-18-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552371" comment="libwebkit2gtk-4_0-37-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539068" comment="libwebkit2gtk3-lang-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552372" comment="typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552373" comment="typelib-1_0-WebKit2-4_0-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552374" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552375" comment="webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148458" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1186922" ref_url="https://bugzilla.suse.com/1186922" source="BUGZILLA"/>
		<reference ref_id="1186923" ref_url="https://bugzilla.suse.com/1186923" source="BUGZILLA"/>
		<reference ref_id="1186924" ref_url="https://bugzilla.suse.com/1186924" source="BUGZILLA"/>
		<reference ref_id="1187017" ref_url="https://bugzilla.suse.com/1187017" source="BUGZILLA"/>
		<reference ref_id="1187174" ref_url="https://bugzilla.suse.com/1187174" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35452" ref_url="https://www.suse.com/security/cve/CVE-2020-35452/" source="CVE"/>
		<reference ref_id="CVE-2021-26690" ref_url="https://www.suse.com/security/cve/CVE-2021-26690/" source="CVE"/>
		<reference ref_id="CVE-2021-26691" ref_url="https://www.suse.com/security/cve/CVE-2021-26691/" source="CVE"/>
		<reference ref_id="CVE-2021-30641" ref_url="https://www.suse.com/security/cve/CVE-2021-30641/" source="CVE"/>
		<reference ref_id="CVE-2021-31618" ref_url="https://www.suse.com/security/cve/CVE-2021-31618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009032.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- fixed CVE-2021-30641 [bsc#1187174]: MergeSlashes regression
- fixed CVE-2021-31618 [bsc#1186924]: NULL pointer dereference on specially crafted HTTP/2 request
- fixed CVE-2020-35452 [bsc#1186922]: Single zero byte stack overflow in mod_auth_digest 
- fixed CVE-2021-26690 [bsc#1186923]: mod_session NULL pointer dereference in parser
- fixed CVE-2021-26691 [bsc#1187017]: Heap overflow in mod_session
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186922">SUSE bug 1186922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186923">SUSE bug 1186923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186924">SUSE bug 1186924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187017">SUSE bug 1187017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187174">SUSE bug 1187174</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35452/">CVE-2020-35452 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35452">CVE-2020-35452 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26690/">CVE-2021-26690 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26690">CVE-2021-26690 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26691/">CVE-2021-26691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26691">CVE-2021-26691 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30641/">CVE-2021-30641 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30641">CVE-2021-30641 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31618/">CVE-2021-31618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31618">CVE-2021-31618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552377" comment="apache2-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539074" comment="apache2-doc-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552378" comment="apache2-example-pages-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552379" comment="apache2-prefork-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552380" comment="apache2-utils-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552381" comment="apache2-worker-2.4.23-29.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148459" version="1" class="patch">
	<metadata>
		<title>Security update for xterm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1182091" ref_url="https://bugzilla.suse.com/1182091" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009039.html" source="SUSE-SU"/>
		<description>
This update for xterm fixes the following issues:

- CVE-2021-27135: Fixed buffer-overflow when clicking on selected utf8 text. (bsc#1182091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182091">SUSE bug 1182091</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27135">CVE-2021-27135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552382" comment="xterm-308-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148460" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1186151" ref_url="https://bugzilla.suse.com/1186151" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009071.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

- Fixed a possible  buffer overflow in IScsiDxe (bsc#1186151)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-22"/>
	<updated date="2021-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186151">SUSE bug 1186151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009539087" comment="ovmf-2017+git1492060560.b6d11d7c46-4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539088" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539089" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148461" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1180816" ref_url="https://bugzilla.suse.com/1180816" source="BUGZILLA"/>
		<reference ref_id="1180942" ref_url="https://bugzilla.suse.com/1180942" source="BUGZILLA"/>
		<reference ref_id="1181119" ref_url="https://bugzilla.suse.com/1181119" source="BUGZILLA"/>
		<reference ref_id="1181935" ref_url="https://bugzilla.suse.com/1181935" source="BUGZILLA"/>
		<reference ref_id="1183684" ref_url="https://bugzilla.suse.com/1183684" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20178" ref_url="https://www.suse.com/security/cve/CVE-2021-20178/" source="CVE"/>
		<reference ref_id="CVE-2021-20180" ref_url="https://www.suse.com/security/cve/CVE-2021-20180/" source="CVE"/>
		<reference ref_id="CVE-2021-20191" ref_url="https://www.suse.com/security/cve/CVE-2021-20191/" source="CVE"/>
		<reference ref_id="CVE-2021-20228" ref_url="https://www.suse.com/security/cve/CVE-2021-20228/" source="CVE"/>
		<reference ref_id="CVE-2021-3447" ref_url="https://www.suse.com/security/cve/CVE-2021-3447/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009066.html" source="SUSE-SU"/>
		<description>
This update for ansible fixes the following issues:

- Update to 2.9.22:
- CVE-2021-3447: multiple modules expose secured values (bsc#1183684)
- CVE-2021-20228: basic.py no_log with fallback option (bsc#1181935)
- CVE-2021-20191: multiple collections exposes secured values (bsc#1181119)
- CVE-2021-20180: bitbucket_pipeline_variable exposes sensitive values (bsc#1180942)
- CVE-2021-20178: user data leak in snmp_facts module (bsc#1180816)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-22"/>
	<updated date="2021-06-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180816">SUSE bug 1180816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180942">SUSE bug 1180942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181119">SUSE bug 1181119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181935">SUSE bug 1181935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183684">SUSE bug 1183684</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20178/">CVE-2021-20178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20178">CVE-2021-20178 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20180/">CVE-2021-20180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20180">CVE-2021-20180 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20191/">CVE-2021-20191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20191">CVE-2021-20191 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20228/">CVE-2021-20228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20228">CVE-2021-20228 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3447/">CVE-2021-3447 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3447">CVE-2021-3447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597581" comment="ansible-2.9.22-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148462" version="1" class="patch">
	<metadata>
		<title>Security update for libnettle (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1187060" ref_url="https://bugzilla.suse.com/1187060" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3580" ref_url="https://www.suse.com/security/cve/CVE-2021-3580/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009077.html" source="SUSE-SU"/>
		<description>
This update for libnettle fixes the following issues:

- CVE-2021-3580: Fixed a remote denial of service in the RSA decryption via manipulated ciphertext (bsc#1187060).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-23"/>
	<updated date="2021-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187060">SUSE bug 1187060</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3580/">CVE-2021-3580 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3580">CVE-2021-3580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552386" comment="libhogweed2-2.7.1-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539091" comment="libhogweed2-32bit-2.7.1-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552387" comment="libnettle4-2.7.1-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539093" comment="libnettle4-32bit-2.7.1-13.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148463" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1187212" ref_url="https://bugzilla.suse.com/1187212" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009087.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2021-33560: Fixed a side-channel against ElGamal encryption, caused by missing exponent blinding (bsc#1187212).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-24"/>
	<updated date="2021-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187212">SUSE bug 1187212</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">CVE-2021-33560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552394" comment="libgcrypt20-1.6.1-16.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539096" comment="libgcrypt20-32bit-1.6.1-16.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552395" comment="libgcrypt20-hmac-1.6.1-16.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539098" comment="libgcrypt20-hmac-32bit-1.6.1-16.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148464" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1184354" ref_url="https://bugzilla.suse.com/1184354" source="BUGZILLA"/>
		<reference ref_id="1187310" ref_url="https://bugzilla.suse.com/1187310" source="BUGZILLA"/>
		<reference ref_id="1187395" ref_url="https://bugzilla.suse.com/1187395" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3479" ref_url="https://www.suse.com/security/cve/CVE-2021-3479/" source="CVE"/>
		<reference ref_id="CVE-2021-3598" ref_url="https://www.suse.com/security/cve/CVE-2021-3598/" source="CVE"/>
		<reference ref_id="CVE-2021-3605" ref_url="https://www.suse.com/security/cve/CVE-2021-3605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009088.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- Fixed CVE-2021-3479 [bsc#1184354]: Out-of-memory caused by allocation of a very large buffer
- Fixed CVE-2021-3605 [bsc#1187395]: Heap buffer overflow in the rleUncompress function
- Fixed CVE-2021-3598 [bsc#1187310]: Heap buffer overflow in Imf_3_1:CharPtrIO:readChars
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-24"/>
	<updated date="2021-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184354">SUSE bug 1184354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187310">SUSE bug 1187310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187395">SUSE bug 1187395</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3479/">CVE-2021-3479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3479">CVE-2021-3479 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3598/">CVE-2021-3598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3598">CVE-2021-3598 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3605/">CVE-2021-3605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3605">CVE-2021-3605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552396" comment="libIlmImf-Imf_2_1-21-2.1.0-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552397" comment="openexr-2.1.0-6.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148465" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql12, postgresql13 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="1178961" ref_url="https://bugzilla.suse.com/1178961" source="BUGZILLA"/>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008245.html" source="SUSE-SU"/>
		<description>
This update for postgresql, postgresql12, postgresql13 fixes the following issues:

Initial packaging of PostgreSQL 13:

* https://www.postgresql.org/about/news/2077/
* https://www.postgresql.org/docs/13/release-13.html

Changes in postgresql:

- Bump postgresql major version to 13.

Changes in postgresql12:

- %ghost the symlinks to pg_config and ecpg. (bsc#1178961)
- BuildRequire libpq5 and libecpg6 when not building them to avoid dangling symlinks in the devel package. (bsc#1179765)
- Fix a DST problem in the test suite.

Changes in postgresql13:

- Add postgresql-icu68.patch: fix build with ICU 68

- %ghost the symlinks to pg_config and ecpg. (bsc#1178961)
- BuildRequire libpq5 and libecpg6 when not building them to avoid dangling symlinks in the devel package. (bsc#1179765)

Upgrade to version 13.1:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/13/release-13-1.html

- Fix a DST problem in the test suite.

  		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-26"/>
	<updated date="2021-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178961">SUSE bug 1178961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531841" comment="libecpg6-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531842" comment="libpq5-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531843" comment="libpq5-32bit-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531844" comment="postgresql-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531845" comment="postgresql-contrib-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531846" comment="postgresql-docs-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531847" comment="postgresql-plperl-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531848" comment="postgresql-plpython-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531849" comment="postgresql-pltcl-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531850" comment="postgresql-server-13-4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148466" version="1" class="patch">
	<metadata>
		<title>Security update for arpwatch (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1186240" ref_url="https://bugzilla.suse.com/1186240" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25321" ref_url="https://www.suse.com/security/cve/CVE-2021-25321/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009095.html" source="SUSE-SU"/>
		<description>
This update for arpwatch fixes the following issues:

- CVE-2021-25321: Fixed local privilege escalation from runtime user to root (bsc#1186240).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186240">SUSE bug 1186240</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25321/">CVE-2021-25321 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25321">CVE-2021-25321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615943" comment="arpwatch-2.1a15-159.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148467" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1161510" ref_url="https://bugzilla.suse.com/1161510" source="BUGZILLA"/>
		<reference ref_id="1186229" ref_url="https://bugzilla.suse.com/1186229" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20387" ref_url="https://www.suse.com/security/cve/CVE-2019-20387/" source="CVE"/>
		<reference ref_id="CVE-2021-3200" ref_url="https://www.suse.com/security/cve/CVE-2021-3200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009094.html" source="SUSE-SU"/>
		<description>
This update for libsolv fixes the following issues:

Security issues fixed:

- CVE-2019-20387: Fixed heap-buffer-overflow in repodata_schema2id (bsc#1161510)
- CVE-2021-3200: testcase_read: error out if repos are added or the system is changed too late (bsc#1186229)

Other issues fixed:

- backport support for blacklisted packages to support ptf packages and retracted patches
- fix ruleinfo of complex dependencies returning the wrong origin
- fix SOLVER_FLAG_FOCUS_BEST updateing packages without reason
- fix add_complex_recommends() selecting conflicted packages in rare cases
- fix potential segfault in resolve_jobrules
- fix solv_zchunk decoding error if large chunks are used
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161510">SUSE bug 1161510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186229">SUSE bug 1186229</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20387/">CVE-2019-20387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20387">CVE-2019-20387 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3200/">CVE-2021-3200 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3200">CVE-2021-3200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555928" comment="libsolv-devel-0.6.37-2.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555929" comment="libsolv-tools-0.6.37-2.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555930" comment="libzypp-16.21.4-2.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555931" comment="libzypp-devel-16.21.4-2.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555932" comment="perl-solv-0.6.37-2.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555933" comment="python-solv-0.6.37-2.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148468" version="1" class="patch">
	<metadata>
		<title>Recommended update for the Azure and AWS SDKs (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1125671" ref_url="https://bugzilla.suse.com/1125671" source="BUGZILLA"/>
		<reference ref_id="1154393" ref_url="https://bugzilla.suse.com/1154393" source="BUGZILLA"/>
		<reference ref_id="1175289" ref_url="https://bugzilla.suse.com/1175289" source="BUGZILLA"/>
		<reference ref_id="1176784" ref_url="https://bugzilla.suse.com/1176784" source="BUGZILLA"/>
		<reference ref_id="1176785" ref_url="https://bugzilla.suse.com/1176785" source="BUGZILLA"/>
		<reference ref_id="1182421" ref_url="https://bugzilla.suse.com/1182421" source="BUGZILLA"/>
		<reference ref_id="1187045" ref_url="https://bugzilla.suse.com/1187045" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33503" ref_url="https://www.suse.com/security/cve/CVE-2021-33503/" source="CVE"/>
		<reference ref_id="SUSE-RU-2021:2194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019478.html" source="SUSE-SU"/>
		<description>
This update for the SLE Public Cloud module provides the following fixes:

Azure SDK update:
This update for the Azure SDK and CLI adds support for the AHB (Azure Hybrid Benefit).
(bsc#1176784, jsc#ECO-3105)

AWS SDK update:
This update for the AWS SDK updates python-boto3 to version 1.17.9 and aws-cli to 1.19.9.
(bsc#1182421, jsc#ECO-3352)

Security fix for python-urllib3:

- Improve performance of sub-authority splitting in URL. (bsc#1187045, CVE-2021-33503)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1125671">SUSE bug 1125671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154393">SUSE bug 1154393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175289">SUSE bug 1175289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176784">SUSE bug 1176784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176785">SUSE bug 1176785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182421">SUSE bug 1182421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187045">SUSE bug 1187045</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33503/">CVE-2021-33503 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33503">CVE-2021-33503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009615955" comment="aws-cli-1.19.9-22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616455" comment="python-PyYAML-5.3.1-28.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616162" comment="python-botocore-1.20.9-28.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616164" comment="python-colorama-0.4.4-4.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615952" comment="python-pexpect-4.3.1-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615953" comment="python-ptyprocess-0.5.2-2.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616195" comment="python-six-1.14.0-13.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616449" comment="python3-requests-2.24.0-8.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616438" comment="python3-six-1.14.0-13.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616441" comment="python3-urllib3-1.25.10-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148469" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3, python-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1176784" ref_url="https://bugzilla.suse.com/1176784" source="BUGZILLA"/>
		<reference ref_id="1182421" ref_url="https://bugzilla.suse.com/1182421" source="BUGZILLA"/>
		<reference ref_id="1187045" ref_url="https://bugzilla.suse.com/1187045" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33503" ref_url="https://www.suse.com/security/cve/CVE-2021-33503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009099.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 and python-requests fixes the following issues:

Security fix:

- Improve performance of sub-authority splitting in URL. (bsc#1187045, CVE-2021-33503)

Non-security changes:

- Update python-urllib3 to version 1.25.10 to stay compatible with changes needed in the
  Server and Public Cloud products. (bsc#1182421, jsc#ECO-3352)
- Update python-requests to version 2.24.0 to stay compatible with changes needed in the
  Server and Public Cloud products. (bsc#1176784, jsc#ECO-3105))
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176784">SUSE bug 1176784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182421">SUSE bug 1182421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187045">SUSE bug 1187045</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33503/">CVE-2021-33503 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33503">CVE-2021-33503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597579" comment="python-requests-2.24.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597580" comment="python-urllib3-1.25.10-5.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148470" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1173513" ref_url="https://bugzilla.suse.com/1173513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14145" ref_url="https://www.suse.com/security/cve/CVE-2020-14145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008149.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2020-14145: Fixed a potential information leak during host key exchange (bsc#1173513).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173513">SUSE bug 1173513</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14145/">CVE-2020-14145 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14145">CVE-2020-14145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531851" comment="openssh-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531852" comment="openssh-askpass-gnome-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531853" comment="openssh-fips-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531854" comment="openssh-helpers-7.2p2-74.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148471" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1180684" ref_url="https://bugzilla.suse.com/1180684" source="BUGZILLA"/>
		<reference ref_id="1180685" ref_url="https://bugzilla.suse.com/1180685" source="BUGZILLA"/>
		<reference ref_id="1180687" ref_url="https://bugzilla.suse.com/1180687" source="BUGZILLA"/>
		<reference ref_id="1181090" ref_url="https://bugzilla.suse.com/1181090" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23239" ref_url="https://www.suse.com/security/cve/CVE-2021-23239/" source="CVE"/>
		<reference ref_id="CVE-2021-23240" ref_url="https://www.suse.com/security/cve/CVE-2021-23240/" source="CVE"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008249.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- A Heap-based buffer overflow in sudo could be exploited to allow a user to gain root privileges 
  [bsc#1181090,CVE-2021-3156]
- It was possible for a user to test for the existence of a directory due to a Race Condition in `sudoedit`
  [bsc#1180684,CVE-2021-23239]
- A Possible Symlink Attack vector existed in `sudoedit` if SELinux was running in permissive mode [bsc#1180685,
  CVE-2021-23240]
- It was possible for a User to enable Debug Settings not Intended for them [bsc#1180687]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-26"/>
	<updated date="2021-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180684">SUSE bug 1180684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180685">SUSE bug 1180685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180687">SUSE bug 1180687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181090">SUSE bug 1181090</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23239/">CVE-2021-23239 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23239">CVE-2021-23239 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23240/">CVE-2021-23240 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23240">CVE-2021-23240 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3156">CVE-2021-3156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555934" comment="sudo-1.8.20p2-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148472" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1188275" ref_url="https://bugzilla.suse.com/1188275" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009155.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.12.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-29 (bsc#1188275)

* CVE-2021-29970: Use-after-free in accessibility features of a document
* CVE-2021-30547: Out of bounds write in ANGLE
* CVE-2021-29976: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29970">CVE-2021-29970 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29976">CVE-2021-29976 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30547">CVE-2021-30547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625232" comment="MozillaFirefox-78.12.0-112.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625233" comment="MozillaFirefox-devel-78.12.0-112.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625234" comment="MozillaFirefox-translations-common-78.12.0-112.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148473" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1181414" ref_url="https://bugzilla.suse.com/1181414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.7.0 ESR  (MFSA 2021-04, bsc#1181414)
  * CVE-2021-23953: Fixed a Cross-origin information leakage via redirected PDF requests
  * CVE-2021-23954: Fixed a type confusion when using logical assignment operators in JavaScript switch statements
  * CVE-2020-26976: Fixed an issue where HTTPS pages could have been intercepted by a registered service worker when they should not have been
  * CVE-2021-23960: Fixed a use-after-poison for incorrectly redeclared JavaScript variables during GC
  * CVE-2021-23964: Fixed Memory safety bugs 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-29"/>
	<updated date="2021-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26976">CVE-2020-26976 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23953">CVE-2021-23953 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23954">CVE-2021-23954 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23960">CVE-2021-23960 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23964">CVE-2021-23964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531856" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531857" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531858" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148474" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1178561" ref_url="https://bugzilla.suse.com/1178561" source="BUGZILLA"/>
		<reference ref_id="1184761" ref_url="https://bugzilla.suse.com/1184761" source="BUGZILLA"/>
		<reference ref_id="1184967" ref_url="https://bugzilla.suse.com/1184967" source="BUGZILLA"/>
		<reference ref_id="1185046" ref_url="https://bugzilla.suse.com/1185046" source="BUGZILLA"/>
		<reference ref_id="1185331" ref_url="https://bugzilla.suse.com/1185331" source="BUGZILLA"/>
		<reference ref_id="1185807" ref_url="https://bugzilla.suse.com/1185807" source="BUGZILLA"/>
		<reference ref_id="1188063" ref_url="https://bugzilla.suse.com/1188063" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33910" ref_url="https://www.suse.com/security/cve/CVE-2021-33910/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009184.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2021-33910: Fixed a denial of service (stack exhaustion) in systemd (PID 1) (bsc#1188063)

Other fixes:

- mount-util: shorten the loop a bit (#7545)
- mount-util: do not use the official MAX_HANDLE_SZ (#7523)
- mount-util: tape over name_to_handle_at() flakiness (#7517) (bsc#1184761)
- mount-util: fix bad indenting
- mount-util: EOVERFLOW might have other causes than buffer size issues
- mount-util: fix error propagation in fd_fdinfo_mnt_id()
- mount-util: drop exponential buffer growing in name_to_handle_at_loop()
- udev: port udev_has_devtmpfs() to use path_get_mnt_id()
- mount-util: add new path_get_mnt_id() call that queries the mnt ID of a path
- mount-util: add name_to_handle_at_loop() wrapper around name_to_handle_at()
- mount-util: accept that name_to_handle_at() might fail with EPERM (#5499)
- basic: fallback to the fstat if we don't have access to the /proc/self/fdinfo
- sysusers: use the usual comment style
- test/TEST-21-SYSUSERS: add tests for new functionality
- sysusers: allow admin/runtime overrides to command-line config
- basic/strv: add function to insert items at position
- sysusers: allow the shell to be specified
- sysusers: move various user credential validity checks to src/basic/
- man: reformat table in sysusers.d(5)
- sysusers: take configuration as positional arguments
- sysusers: emit a bit more info at debug level when locking fails
- sysusers: allow force reusing existing user/group IDs (#8037)
- sysusers: ensure GID in uid:gid syntax exists
- sysusers: make ADD_GROUP always create a group
- test: add TEST-21-SYSUSERS test
- sysuser: use OrderedHashmap
- sysusers: allow uid:gid in sysusers.conf files
- sysusers: fix memleak (#4430)
- These commits implement the option '--replace' for systemd-sysusers
  so %sysusers_create_package can be introduced in SLE and packages
  can rely on this rpm macro without wondering whether the macro is
  available on the different target the package is submitted to.
- Expect 644 permissions for /usr/lib/udev/compat-symlink-generation (bsc#1185807)
- systemctl: add --value option
- execute: make sure to call into PAM after initializing resource limits (bsc#1184967)
- rlimit-util: introduce setrlimit_closest_all()
- system-conf: drop reference to ShutdownWatchdogUsec=
- core: rename ShutdownWatchdogSec to RebootWatchdogSec (bsc#1185331)
- Return -EAGAIN instead of -EALREADY from unit_reload (bsc#1185046)
- rules: don't ignore Xen virtual interfaces anymore (bsc#1178561)
- write_net_rules: set execute bits (bsc#1178561)
- udev: rework network device renaming
- Revert 'Revert 'udev: network device renaming - immediately give up if the target name isn't available''
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178561">SUSE bug 1178561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184761">SUSE bug 1184761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184967">SUSE bug 1184967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185046">SUSE bug 1185046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185331">SUSE bug 1185331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185807">SUSE bug 1185807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33910/">CVE-2021-33910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33910">CVE-2021-33910 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625777" comment="libsystemd0-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625743" comment="libsystemd0-32bit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626176" comment="libudev-devel-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625778" comment="libudev1-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625746" comment="libudev1-32bit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625779" comment="systemd-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625748" comment="systemd-32bit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625749" comment="systemd-bash-completion-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625780" comment="systemd-devel-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625781" comment="systemd-sysvinit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625782" comment="udev-228-150.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148475" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1186819" ref_url="https://bugzilla.suse.com/1186819" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009198.html" source="SUSE-SU"/>
		<description>
This update for python-pip fixes the following issues:

- CVE-2021-3572: Fixed incorrect handling of unicode separators in git references (bsc#1186819).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186819">SUSE bug 1186819</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3572">CVE-2021-3572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597578" comment="python-pip-9.0.1-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148476" version="1" class="patch">
	<metadata>
		<title>Security update for linuxptp (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1187646" ref_url="https://bugzilla.suse.com/1187646" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3570" ref_url="https://www.suse.com/security/cve/CVE-2021-3570/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009196.html" source="SUSE-SU"/>
		<description>
This update for linuxptp fixes the following issues:

- CVE-2021-3570: Validate the messageLength field of incoming messages. (bsc#1187646)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187646">SUSE bug 1187646</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3570/">CVE-2021-3570 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3570">CVE-2021-3570 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626114" comment="linuxptp-1.4-15.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148477" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1115026" ref_url="https://bugzilla.suse.com/1115026" source="BUGZILLA"/>
		<reference ref_id="1175462" ref_url="https://bugzilla.suse.com/1175462" source="BUGZILLA"/>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1185724" ref_url="https://bugzilla.suse.com/1185724" source="BUGZILLA"/>
		<reference ref_id="1185859" ref_url="https://bugzilla.suse.com/1185859" source="BUGZILLA"/>
		<reference ref_id="1185860" ref_url="https://bugzilla.suse.com/1185860" source="BUGZILLA"/>
		<reference ref_id="1185861" ref_url="https://bugzilla.suse.com/1185861" source="BUGZILLA"/>
		<reference ref_id="1185862" ref_url="https://bugzilla.suse.com/1185862" source="BUGZILLA"/>
		<reference ref_id="1185863" ref_url="https://bugzilla.suse.com/1185863" source="BUGZILLA"/>
		<reference ref_id="1185898" ref_url="https://bugzilla.suse.com/1185898" source="BUGZILLA"/>
		<reference ref_id="1185987" ref_url="https://bugzilla.suse.com/1185987" source="BUGZILLA"/>
		<reference ref_id="1186060" ref_url="https://bugzilla.suse.com/1186060" source="BUGZILLA"/>
		<reference ref_id="1186062" ref_url="https://bugzilla.suse.com/1186062" source="BUGZILLA"/>
		<reference ref_id="1186111" ref_url="https://bugzilla.suse.com/1186111" source="BUGZILLA"/>
		<reference ref_id="1186235" ref_url="https://bugzilla.suse.com/1186235" source="BUGZILLA"/>
		<reference ref_id="1186390" ref_url="https://bugzilla.suse.com/1186390" source="BUGZILLA"/>
		<reference ref_id="1186463" ref_url="https://bugzilla.suse.com/1186463" source="BUGZILLA"/>
		<reference ref_id="1187038" ref_url="https://bugzilla.suse.com/1187038" source="BUGZILLA"/>
		<reference ref_id="1187050" ref_url="https://bugzilla.suse.com/1187050" source="BUGZILLA"/>
		<reference ref_id="1187193" ref_url="https://bugzilla.suse.com/1187193" source="BUGZILLA"/>
		<reference ref_id="1187215" ref_url="https://bugzilla.suse.com/1187215" source="BUGZILLA"/>
		<reference ref_id="1187388" ref_url="https://bugzilla.suse.com/1187388" source="BUGZILLA"/>
		<reference ref_id="1187452" ref_url="https://bugzilla.suse.com/1187452" source="BUGZILLA"/>
		<reference ref_id="1187595" ref_url="https://bugzilla.suse.com/1187595" source="BUGZILLA"/>
		<reference ref_id="1187601" ref_url="https://bugzilla.suse.com/1187601" source="BUGZILLA"/>
		<reference ref_id="1187934" ref_url="https://bugzilla.suse.com/1187934" source="BUGZILLA"/>
		<reference ref_id="1188062" ref_url="https://bugzilla.suse.com/1188062" source="BUGZILLA"/>
		<reference ref_id="1188063" ref_url="https://bugzilla.suse.com/1188063" source="BUGZILLA"/>
		<reference ref_id="1188116" ref_url="https://bugzilla.suse.com/1188116" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141/" source="CVE"/>
		<reference ref_id="CVE-2020-26145" ref_url="https://www.suse.com/security/cve/CVE-2020-26145/" source="CVE"/>
		<reference ref_id="CVE-2020-26147" ref_url="https://www.suse.com/security/cve/CVE-2020-26147/" source="CVE"/>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)
- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)
- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)
- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)
- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)
- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bsc#1186463)
- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bsc#1179610)
- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)
- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861)
- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)
- CVE-2021-33034: Fixed an issue in net/bluetooth/hci_event.c where a use-after-free leads to writing an arbitrary value. (bsc#1186111)
- CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1186062)
- CVE-2021-23134: Fixed a use After Free vulnerability in nfc sockets which allows local attackers to elevate their privileges. (bsc#1186060)
- CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859)
- CVE-2020-26141: Fixed a flaw that could allows an adversary to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bsc#1185987)
- CVE-2020-26145: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject arbitrary network packets. (bsc#1185860)
- CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862)
- CVE-2020-26147: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames. (bsc#1185987)

The following non-security bugs were fixed:

- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).
- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).
- hv_netvsc: Add handlers for ethtool get/set msg level (bsc#1175462).
- hv_netvsc: avoid retry on send during shutdown (bsc#1175462).
- hv_netvsc: avoid unnecessary wakeups on subchannel creation (bsc#1175462).
- hv_netvsc: cancel subchannel setup before halting device (bsc#1175462).
- hv_netvsc: change GPAD teardown order on older versions (bsc#1175462).
- hv_netvsc: common detach logic (bsc#1175462).
- hv_netvsc: delay setup of VF device (bsc#1175462).
- hv_netvsc: disable NAPI before channel close (bsc#1175462).
- hv_netvsc: Ensure correct teardown message sequence order (bsc#1175462).
- hv_netvsc: Fix a deadlock by getting rtnl lock earlier in netvsc_probe() (bsc#1175462).
- hv_netvsc: Fix a network regression after ifdown/ifup (bsc#1175462).
- hv_netvsc: fix deadlock on hotplug (bsc#1175462).
- hv_netvsc: Fix error handling in netvsc_attach() (bsc#1175462).
- hv_netvsc: fix error unwind handling if vmbus_open fails (bsc#1175462).
- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (bsc#1175462).
- hv_netvsc: fix handling of fallback to single queue mode (bsc#1175462).
- hv_netvsc: Fix hash key value reset after other ops (bsc#1175462).
- hv_netvsc: Fix IP header checksum for coalesced packets (bsc#1175462).
- hv_netvsc: Fix net device attach on older Windows hosts (bsc#1175462).
- hv_netvsc: fix network namespace issues with VF support (bsc#1175462).
- hv_netvsc: Fix NULL dereference at single queue mode fallback (bsc#1175462).
- hv_netvsc: fix race during initialization (bsc#1175462).
- hv_netvsc: fix race on sub channel creation (bsc#1175462).
- hv_netvsc: fix race that may miss tx queue wakeup (bsc#1175462).
- hv_netvsc: fix schedule in RCU context (bsc#1175462).
- hv_netvsc: Fix the variable sizes in ipsecv2 and rsc offload (bsc#1175462).
- hv_netvsc: Fix tx_table init in rndis_set_subchannel() (bsc#1175462).
- hv_netvsc: Fix unwanted wakeup after tx_disable (bsc#1175462).
- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (bsc#1175462).
- hv_netvsc: flag software created hash value (bsc#1175462).
- hv_netvsc: netvsc_teardown_gpadl() split (bsc#1175462).
- hv_netvsc: only wake transmit queue if link is up (bsc#1175462).
- hv_netvsc: pass netvsc_device to rndis halt (bsc#1175462).
- hv_netvsc: preserve hw_features on mtu/channels/ringparam changes (bsc#1175462).
- hv_netvsc: Refactor assignments of struct netvsc_device_info (bsc#1175462).
- hv_netvsc: set master device (bsc#1175462).
- hv_netvsc: Set tx_table to equal weight after subchannels open (bsc#1175462).
- hv_netvsc: Simplify num_chn checking in rndis_filter_device_add() (bsc#1175462).
- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() (bsc#1175462).
- hv_netvsc: split sub-channel setup into async and sync (bsc#1175462).
- hv_netvsc: typo in NDIS RSS parameters structure (bsc#1175462).
- hv_netvsc: use RCU to fix concurrent rx and queue changes (bsc#1175462).
- hv_netvsc: use reciprocal divide to speed up percent calculation (bsc#1175462).
- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown (bsc#1175462).
- kgraft: truncate the output from state_show() sysfs attr (bsc#1186235).
- mm, memory_hotplug: do not clear numa_node association after hot_remove (bsc#1115026).
- mm: consider __HW_POISON pages when allocating from pcp lists (bsc#1187388).
- scsi: storvsc: Enable scatterlist entry lengths &gt; 4Kbytes (bsc#1187193).
- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-22"/>
	<updated date="2021-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115026">SUSE bug 1115026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175462">SUSE bug 1175462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185724">SUSE bug 1185724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185860">SUSE bug 1185860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185861">SUSE bug 1185861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185862">SUSE bug 1185862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185863">SUSE bug 1185863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185898">SUSE bug 1185898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185987">SUSE bug 1185987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186060">SUSE bug 1186060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186062">SUSE bug 1186062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186111">SUSE bug 1186111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186235">SUSE bug 1186235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186390">SUSE bug 1186390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187193">SUSE bug 1187193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187388">SUSE bug 1187388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187601">SUSE bug 1187601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187934">SUSE bug 1187934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188116">SUSE bug 1188116</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24586">CVE-2020-24586 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24587">CVE-2020-24587 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24588">CVE-2020-24588 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26139">CVE-2020-26139 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26141">CVE-2020-26141 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26145/">CVE-2020-26145 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26145">CVE-2020-26145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26147/">CVE-2020-26147 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26147">CVE-2020-26147 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26558">CVE-2020-26558 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36386">CVE-2020-36386 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0129">CVE-2021-0129 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0605">CVE-2021-0605 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23134">CVE-2021-23134 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34693">CVE-2021-34693 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625812" comment="kernel-default-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625813" comment="kernel-default-base-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625814" comment="kernel-default-devel-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626312" comment="kernel-default-kgraft-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625761" comment="kernel-devel-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625762" comment="kernel-macros-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625763" comment="kernel-source-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625815" comment="kernel-syms-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626314" comment="kgraft-patch-4_4_180-94_147-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148478" version="1" class="patch">
	<metadata>
		<title>Security update for ardana-cobbler, cassandra, cassandra-kit, crowbar-core, crowbar-openstack, documentation-suse-openstack-cloud, grafana, kibana, openstack-heat-templates, openstack-monasca-installer, openstack-nova, python-Django, python-elementpath, python-eventlet, python-py, python-pysaml2, python-six, python-xmlschema  (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1019074" ref_url="https://bugzilla.suse.com/1019074" source="BUGZILLA"/>
		<reference ref_id="1044849" ref_url="https://bugzilla.suse.com/1044849" source="BUGZILLA"/>
		<reference ref_id="1057496" ref_url="https://bugzilla.suse.com/1057496" source="BUGZILLA"/>
		<reference ref_id="1073879" ref_url="https://bugzilla.suse.com/1073879" source="BUGZILLA"/>
		<reference ref_id="1113302" ref_url="https://bugzilla.suse.com/1113302" source="BUGZILLA"/>
		<reference ref_id="1123064" ref_url="https://bugzilla.suse.com/1123064" source="BUGZILLA"/>
		<reference ref_id="1143893" ref_url="https://bugzilla.suse.com/1143893" source="BUGZILLA"/>
		<reference ref_id="1166139" ref_url="https://bugzilla.suse.com/1166139" source="BUGZILLA"/>
		<reference ref_id="1176784" ref_url="https://bugzilla.suse.com/1176784" source="BUGZILLA"/>
		<reference ref_id="1179805" ref_url="https://bugzilla.suse.com/1179805" source="BUGZILLA"/>
		<reference ref_id="1180507" ref_url="https://bugzilla.suse.com/1180507" source="BUGZILLA"/>
		<reference ref_id="1181277" ref_url="https://bugzilla.suse.com/1181277" source="BUGZILLA"/>
		<reference ref_id="1181278" ref_url="https://bugzilla.suse.com/1181278" source="BUGZILLA"/>
		<reference ref_id="1181689" ref_url="https://bugzilla.suse.com/1181689" source="BUGZILLA"/>
		<reference ref_id="1181828" ref_url="https://bugzilla.suse.com/1181828" source="BUGZILLA"/>
		<reference ref_id="1182433" ref_url="https://bugzilla.suse.com/1182433" source="BUGZILLA"/>
		<reference ref_id="1183174" ref_url="https://bugzilla.suse.com/1183174" source="BUGZILLA"/>
		<reference ref_id="1183803" ref_url="https://bugzilla.suse.com/1183803" source="BUGZILLA"/>
		<reference ref_id="1184148" ref_url="https://bugzilla.suse.com/1184148" source="BUGZILLA"/>
		<reference ref_id="1185623" ref_url="https://bugzilla.suse.com/1185623" source="BUGZILLA"/>
		<reference ref_id="1185836" ref_url="https://bugzilla.suse.com/1185836" source="BUGZILLA"/>
		<reference ref_id="1186608" ref_url="https://bugzilla.suse.com/1186608" source="BUGZILLA"/>
		<reference ref_id="1186611" ref_url="https://bugzilla.suse.com/1186611" source="BUGZILLA"/>
		<reference ref_id="940812" ref_url="https://bugzilla.suse.com/940812" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11481" ref_url="https://www.suse.com/security/cve/CVE-2017-11481/" source="CVE"/>
		<reference ref_id="CVE-2017-11499" ref_url="https://www.suse.com/security/cve/CVE-2017-11499/" source="CVE"/>
		<reference ref_id="CVE-2017-5929" ref_url="https://www.suse.com/security/cve/CVE-2017-5929/" source="CVE"/>
		<reference ref_id="CVE-2019-25025" ref_url="https://www.suse.com/security/cve/CVE-2019-25025/" source="CVE"/>
		<reference ref_id="CVE-2020-17516" ref_url="https://www.suse.com/security/cve/CVE-2020-17516/" source="CVE"/>
		<reference ref_id="CVE-2020-26247" ref_url="https://www.suse.com/security/cve/CVE-2020-26247/" source="CVE"/>
		<reference ref_id="CVE-2020-29651" ref_url="https://www.suse.com/security/cve/CVE-2020-29651/" source="CVE"/>
		<reference ref_id="CVE-2021-21238" ref_url="https://www.suse.com/security/cve/CVE-2021-21238/" source="CVE"/>
		<reference ref_id="CVE-2021-21239" ref_url="https://www.suse.com/security/cve/CVE-2021-21239/" source="CVE"/>
		<reference ref_id="CVE-2021-21419" ref_url="https://www.suse.com/security/cve/CVE-2021-21419/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2021-27358" ref_url="https://www.suse.com/security/cve/CVE-2021-27358/" source="CVE"/>
		<reference ref_id="CVE-2021-28658" ref_url="https://www.suse.com/security/cve/CVE-2021-28658/" source="CVE"/>
		<reference ref_id="CVE-2021-31542" ref_url="https://www.suse.com/security/cve/CVE-2021-31542/" source="CVE"/>
		<reference ref_id="CVE-2021-33203" ref_url="https://www.suse.com/security/cve/CVE-2021-33203/" source="CVE"/>
		<reference ref_id="CVE-2021-33571" ref_url="https://www.suse.com/security/cve/CVE-2021-33571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009227.html" source="SUSE-SU"/>
		<description>
This update for ardana-cobbler, cassandra, cassandra-kit, crowbar-core, crowbar-openstack, documentation-suse-openstack-cloud, grafana, kibana, openstack-heat-templates, openstack-monasca-installer, openstack-nova, python-Django, python-elementpath, python-eventlet, python-py, python-pysaml2, python-six, python-xmlschema fixes the following issues:

Security fixes included on this update:

cassandra-kit:
- CVE-2020-17516: Internode encryption enforcement vulnerability

cassandra:
- CVE-2020-17516: Internode encryption enforcement vulnerability
- CVE-2017-5929 logback: Fixed a serialization vulnerability in SocketServer and ServerSocketReceiver

crowbar-core:
CVE-2020-26247: Potentially XXE or SSRF attacks by parsed Nokogiri::XML::Schema

grafana:
- CVE-2021-27358: Unauthenticated remote attackers to trigger a Denial of Service via a remote API call

kibana:
- CVE-2017-11481: Fixed an XSS via URL fields
- CVE-2017-11499: Fixed a constant hashtable seeds vulnerability

python-Django:
- CVE-2021-28658: Potential directory-traversal via uploaded files
- CVE-2021-31542: Potential directory-traversal via uploaded files
- CVE-2021-33203: Potential directory traversal via admindocs
- CVE-2021-33571: Possible indeterminate SSRF, RFI, and LFI attacks since validators accepted leading zeros in IPv4 addresses
- CVE-2021-23336: Fixed web cache poisoning via django.utils.http.limited_parse_qsl

python-eventlet:
- CVE-2021-21419: Improper handling of highly compressed data and memory allocation with excessive size value

python-pysaml2:
- CVE-2021-21238: Fixed an improper verification of cryptographic signatures for signed SAML documents
- CVE-2021-21239: Fixed an improper verification of cryptographic signatures when using CryptoBackendXmlSec1()_

python-py:
- CVE-2020-29651: Regular expression denial of service in svnwc.py

rubygem-activerecord-session_store:
- CVE-2019-25025: Fixed a hijack sessions by using timing attacks targeting the session id
CVE-2019-16782

Non-security fixes included on this update:

Changes in ardana-cobbler:
- Update to version 8.0+git.1614096566.e8c2b27:
  * Change install_recommended to true (bsc#1181828)

Changes in cassandra:
- update to 3.11.10 (bsc#1181689, CVE-2020-17516)
 * Fix digest computation for queries with fetched but non queried columns (CASSANDRA-15962)
 * Reduce amount of allocations during batch statement execution (CASSANDRA-16201)
 * Update jflex-1.6.0.jar to match upstream (CASSANDRA-16393)
 * Fix DecimalDeserializer#toString OOM (CASSANDRA-14925)
 * Rate limit validation compactions using compaction_throughput_mb_per_sec (CASSANDRA-16161)
 * SASI's `max_compaction_flush_memory_in_mb` settings over 100GB revert to default of 1GB (CASSANDRA-16071)
 * Prevent unbounded number of pending flushing tasks (CASSANDRA-16261)
 * Improve empty hint file handling during startup (CASSANDRA-16162)
 * Allow empty string in collections with COPY FROM in cqlsh (CASSANDRA-16372)
 * Fix skipping on pre-3.0 created compact storage sstables due to missing primary key liveness (CASSANDRA-16226)
 * Extend the exclusion of replica filtering protection to other indices instead of just SASI (CASSANDRA-16311)
 * Synchronize transaction logs for JBOD (CASSANDRA-16225)
 * Fix the counting of cells per partition (CASSANDRA-16259)
 * Fix serial read/non-applying CAS linearizability (CASSANDRA-12126)
 * Avoid potential NPE in JVMStabilityInspector (CASSANDRA-16294)
 * Improved check of num_tokens against the length of initial_token (CASSANDRA-14477)
 * Fix a race condition on ColumnFamilyStore and TableMetrics (CASSANDRA-16228)
 * Remove the SEPExecutor blocking behavior (CASSANDRA-16186)
 * Fix invalid cell value skipping when reading from disk (CASSANDRA-16223)
 * Prevent invoking enable/disable gossip when not in NORMAL (CASSANDRA-16146)
 * Wait for schema agreement when bootstrapping (CASSANDRA-15158)
 * Fix the histogram merge of the table metrics (CASSANDRA-16259)
 * Synchronize Keyspace instance store/clear (CASSANDRA-16210)
 * Fix ColumnFilter to avoid querying cells of unselected complex columns (CASSANDRA-15977)
 * Fix memory leak in CompressedChunkReader (CASSANDRA-15880)
 * Don't attempt value skipping with mixed version cluster (CASSANDRA-15833)
 * Avoid failing compactions with very large partitions (CASSANDRA-15164)
 * Make sure LCS handles duplicate sstable added/removed notifications correctly (CASSANDRA-14103)
 * Fix OOM when terminating repair session (CASSANDRA-15902)
 * Avoid marking shutting down nodes as up after receiving gossip shutdown message (CASSANDRA-16094)
 * Check SSTables for latest version before dropping compact storage (CASSANDRA-16063)
 * Handle unexpected columns due to schema races (CASSANDRA-15899)
 * Add flag to ignore unreplicated keyspaces during repair (CASSANDRA-15160)
 * Package tools/bin scripts as executable (CASSANDRA-16151)
 * Fixed a NullPointerException when calling nodetool enablethrift (CASSANDRA-16127)
 * Correctly interpret SASI's `max_compaction_flush_memory_in_mb` setting in megabytes not bytes (CASSANDRA-16071)
 * Fix short read protection for GROUP BY queries (CASSANDRA-15459)
 * Frozen RawTuple is not annotated with frozen in the toString method (CASSANDRA-15857)
Merged from 3.0:
 * Use IF NOT EXISTS for index and UDT create statements in snapshot schema files (CASSANDRA-13935)
 * Fix gossip shutdown order (CASSANDRA-15816)
 * Remove broken 'defrag-on-read' optimization (CASSANDRA-15432)
 * Check for endpoint collision with hibernating nodes (CASSANDRA-14599)
 * Operational improvements and hardening for replica filtering protection (CASSANDRA-15907)
 * stop_paranoid disk failure policy is ignored on CorruptSSTableException after node is up (CASSANDRA-15191)
 * Forbid altering UDTs used in partition keys (CASSANDRA-15933)
 * Fix empty/null json string representation (CASSANDRA-15896)
 * 3.x fails to start if commit log has range tombstones from a column which is also deleted (CASSANDRA-15970)
 * Handle difference in timestamp precision between java8 and java11 in LogFIle.java (CASSANDRA-16050)
Merged from 2.2:
 * Fix CQL parsing of collections when the column type is reversed (CASSANDRA-15814)
 * Only allow strings to be passed to JMX authentication (CASSANDRA-16077)
 * Fix cqlsh output when fetching all rows in batch mode (CASSANDRA-15905)
 * Upgrade Jackson to 2.9.10 (CASSANDRA-15867)
 * Fix CQL formatting of read command restrictions for slow query log (CASSANDRA-15503)
 * Allow sstableloader to use SSL on the native port (CASSANDRA-14904)
 * Backport CASSANDRA-12189: escape string literals (CASSANDRA-15948)
 * Avoid hinted handoff per-host throttle being arounded to 0 in large cluster (CASSANDRA-15859)
 * Avoid emitting empty range tombstones from RangeTombstoneList (CASSANDRA-15924)
 * Avoid thread starvation, and improve compare-and-swap performance, in the slab allocators (CASSANDRA-15922)
 * Add token to tombstone warning and error messages (CASSANDRA-15890)
 * Fixed range read concurrency factor computation and capped as 10 times tpc cores (CASSANDRA-15752)
 * Catch exception on bootstrap resume and init native transport (CASSANDRA-15863)
 * Fix replica-side filtering returning stale data with CL &gt; ONE (CASSANDRA-8272, CASSANDRA-8273)
 * Fix duplicated row on 2.x upgrades when multi-rows range tombstones interact with collection ones (CASSANDRA-15805)
 * Rely on snapshotted session infos on StreamResultFuture.maybeComplete to avoid race conditions (CASSANDRA-15667)
 * EmptyType doesn't override writeValue so could attempt to write bytes when expected not to (CASSANDRA-15790)
 * Fix index queries on partition key columns when some partitions contains only static data (CASSANDRA-13666)
 * Avoid creating duplicate rows during major upgrades (CASSANDRA-15789)
 * liveDiskSpaceUsed and totalDiskSpaceUsed get corrupted if IndexSummaryRedistribution gets interrupted (CASSANDRA-15674)
 * Fix Debian init start/stop (CASSANDRA-15770)
 * Fix infinite loop on index query paging in tables with clustering (CASSANDRA-14242)
 * Fix chunk index overflow due to large sstable with small chunk length (CASSANDRA-15595)
 * Allow selecting static column only when querying static index (CASSANDRA-14242)
 * cqlsh return non-zero status when STDIN CQL fails (CASSANDRA-15623)
 * Don't skip sstables in slice queries based only on local min/max/deletion timestamp (CASSANDRA-15690)
 * Memtable memory allocations may deadlock (CASSANDRA-15367)
 * Run evictFromMembership in GossipStage (CASSANDRA-15592)
 * Fix nomenclature of allow and deny lists (CASSANDRA-15862)
 * Remove generated files from source artifact (CASSANDRA-15849)
 * Remove duplicated tools binaries from tarballs (CASSANDRA-15768)
 * Duplicate results with DISTINCT queries in mixed mode (CASSANDRA-15501)
 * Disable JMX rebinding (CASSANDRA-15653)
 * Fix writing of snapshot manifest when the table has table-backed secondary indexes (CASSANDRA-10968)
 * Fix parse error in cqlsh COPY FROM and formatting for map of blobs (CASSANDRA-15679)
 * Fix Commit log replays when static column clustering keys are collections (CASSANDRA-14365)
 * Fix Red Hat init script on newer systemd versions (CASSANDRA-15273)
 * Allow EXTRA_CLASSPATH to work on tar/source installations (CASSANDRA-15567)
 * Fix bad UDT sstable metadata serialization headers written by C* 3.0 on upgrade and in sstablescrub (CASSANDRA-15035)
 * Fix nodetool compactionstats showing extra pending task for TWCS - patch implemented (CASSANDRA-15409)
 * Fix SELECT JSON formatting for the 'duration' type (CASSANDRA-15075)
 * Fix LegacyLayout to have same behavior as 2.x when handling unknown column names (CASSANDRA-15081)
 * Update nodetool help stop output (CASSANDRA-15401)
 * Run in-jvm upgrade dtests in circleci (CASSANDRA-15506)
 * Include updates to static column in mutation size calculations (CASSANDRA-15293)
 * Fix point-in-time recoevery ignoring timestamp of updates to static columns (CASSANDRA-15292)
 * GC logs are also put under $CASSANDRA_LOG_DIR (CASSANDRA-14306)
 * Fix sstabledump's position key value when partitions have multiple rows (CASSANDRA-14721)
 * Avoid over-scanning data directories in LogFile.verify() (CASSANDRA-15364)
 * Bump generations and document changes to system_distributed and system_traces in 3.0, 3.11
   (CASSANDRA-15441)
 * Fix system_traces creation timestamp; optimise system keyspace upgrades (CASSANDRA-15398)
 * Fix various data directory prefix matching issues (CASSANDRA-13974)
 * Minimize clustering values in metadata collector (CASSANDRA-15400)
 * Avoid over-trimming of results in mixed mode clusters (CASSANDRA-15405)
 * validate value sizes in LegacyLayout (CASSANDRA-15373)
 * Ensure that tracing doesn't break connections in 3.x/4.0 mixed mode by default (CASSANDRA-15385)
 * Make sure index summary redistribution does not start when compactions are paused (CASSANDRA-15265)
 * Ensure legacy rows have primary key livenessinfo when they contain illegal cells (CASSANDRA-15365)
 * Fix race condition when setting bootstrap flags (CASSANDRA-14878)
 * Fix NativeLibrary.tryOpenDirectory callers for Windows (CASSANDRA-15426)
 * Fix SELECT JSON output for empty blobs (CASSANDRA-15435)
 * In-JVM DTest: Set correct internode message version for upgrade test (CASSANDRA-15371)
 * In-JVM DTest: Support NodeTool in dtest (CASSANDRA-15429)
 * Fix NativeLibrary.tryOpenDirectory callers for Windows (CASSANDRA-15426)
 * Fix SASI non-literal string comparisons (range operators) (CASSANDRA-15169)
 * Make sure user defined compaction transactions are always closed (CASSANDRA-15123)
 * Fix cassandra-env.sh to use $CASSANDRA_CONF to find cassandra-jaas.config (CASSANDRA-14305)
 * Fixed nodetool cfstats printing index name twice (CASSANDRA-14903)
 * Add flag to disable SASI indexes, and warnings on creation (CASSANDRA-14866)
 * Add ability to cap max negotiable protocol version (CASSANDRA-15193)
 * Gossip tokens on startup if available (CASSANDRA-15335)
 * Fix resource leak in CompressedSequentialWriter (CASSANDRA-15340)
 * Fix bad merge that reverted CASSANDRA-14993 (CASSANDRA-15289)
 * Fix LegacyLayout RangeTombstoneList IndexOutOfBoundsException when upgrading and RangeTombstone bounds are asymmetric (CASSANDRA-15172)
 * Fix NPE when using allocate_tokens_for_keyspace on new DC/rack (CASSANDRA-14952)
 * Filter sstables earlier when running cleanup (CASSANDRA-15100)
 * Use mean row count instead of mean column count for index selectivity calculation (CASSANDRA-15259)
 * Avoid updating unchanged gossip states (CASSANDRA-15097)
 * Prevent recreation of previously dropped columns with a different kind (CASSANDRA-14948)
 * Prevent client requests from blocking on executor task queue (CASSANDRA-15013)
 * Toughen up column drop/recreate type validations (CASSANDRA-15204)
 * LegacyLayout should handle paging states that cross a collection column (CASSANDRA-15201)
 * Prevent RuntimeException when username or password is empty/null (CASSANDRA-15198)
 * Multiget thrift query returns null records after digest mismatch (CASSANDRA-14812)
 * Skipping illegal legacy cells can break reverse iteration of indexed partitions (CASSANDRA-15178)
 * Handle paging states serialized with a different version than the session's (CASSANDRA-15176)
 * Throw IOE instead of asserting on unsupporter peer versions (CASSANDRA-15066)
 * Update token metadata when handling MOVING/REMOVING_TOKEN events (CASSANDRA-15120)
 * Add ability to customize cassandra log directory using $CASSANDRA_LOG_DIR (CASSANDRA-15090)
 * Skip cells with illegal column names when reading legacy sstables (CASSANDRA-15086)
 * Fix assorted gossip races and add related runtime checks (CASSANDRA-15059)
 * Fix mixed mode partition range scans with limit (CASSANDRA-15072)
 * cassandra-stress works with frozen collections: list and set (CASSANDRA-14907)
 * Fix handling FS errors on writing and reading flat files - LogTransaction and hints (CASSANDRA-15053)
 * Avoid double closing the iterator to avoid overcounting the number of requests (CASSANDRA-15058)
 * Improve `nodetool status -r` speed (CASSANDRA-14847)
 * Improve merkle tree size and time on heap (CASSANDRA-14096)
 * Add missing commands to nodetool_completion (CASSANDRA-14916)
 * Anti-compaction temporarily corrupts sstable state for readers (CASSANDRA-15004)
 * Catch non-IOException in FileUtils.close to make sure that all resources are closed (CASSANDRA-15225)
 * Handle exceptions during authentication/authorization (CASSANDRA-15041)
 * Support cross version messaging in in-jvm upgrade dtests (CASSANDRA-15078)
 * Fix index summary redistribution cancellation (CASSANDRA-15045)
 * Fixing invalid CQL in security documentation (CASSANDRA-15020)
 * Allow instance class loaders to be garbage collected for inJVM dtest (CASSANDRA-15170)
 * Add support for network topology and query tracing for inJVM dtest (CASSANDRA-15319)
 * Correct sstable sorting for garbagecollect and levelled compaction (CASSANDRA-14870)
 * Severe concurrency issues in STCS,DTCS,TWCS,TMD.Topology,TypeParser
 * Add a script to make running the cqlsh tests in cassandra repo easier (CASSANDRA-14951)
 * If SizeEstimatesRecorder misses a 'onDropTable' notification, the size_estimates table will never be cleared for that table. (CASSANDRA-14905)
 * Counters fail to increment in 2.1/2.2 to 3.X mixed version clusters (CASSANDRA-14958)
 * Streaming needs to synchronise access to LifecycleTransaction (CASSANDRA-14554)
 * Fix cassandra-stress write hang with default options (CASSANDRA-14616)
 * Differentiate between slices and RTs when decoding legacy bounds (CASSANDRA-14919)
 * Netty epoll IOExceptions caused by unclean client disconnects being logged at INFO (CASSANDRA-14909)
 * Unfiltered.isEmpty conflicts with Row extends AbstractCollection.isEmpty (CASSANDRA-14588)
 * RangeTombstoneList doesn't properly clean up mergeable or superseded rts in some cases (CASSANDRA-14894)
 * Fix handling of collection tombstones for dropped columns from legacy sstables (CASSANDRA-14912)
 * Throw exception if Columns serialized subset encode more columns than possible (CASSANDRA-14591)
 * Drop/add column name with different Kind can result in corruption (CASSANDRA-14843)
 * Fix missing rows when reading 2.1 SSTables with static columns in 3.0 (CASSANDRA-14873)
 * Move TWCS message 'No compaction necessary for bucket size' to Trace level (CASSANDRA-14884)
 * Sstable min/max metadata can cause data loss (CASSANDRA-14861)
 * Dropped columns can cause reverse sstable iteration to return prematurely (CASSANDRA-14838)
 * Legacy sstables with  multi block range tombstones create invalid bound sequences (CASSANDRA-14823)
 * Expand range tombstone validation checks to multiple interim request stages (CASSANDRA-14824)
 * Reverse order reads can return incomplete results (CASSANDRA-14803)
 * Avoid calling iter.next() in a loop when notifying indexers about range tombstones (CASSANDRA-14794)
 * Fix purging semi-expired RT boundaries in reversed iterators (CASSANDRA-14672)
 * DESC order reads can fail to return the last Unfiltered in the partition (CASSANDRA-14766)
 * Fix corrupted collection deletions for dropped columns in 3.0  2.{1,2} messages (CASSANDRA-14568)
 * Fix corrupted static collection deletions in 3.0 2.{1,2} messages (CASSANDRA-14568)
 * Handle failures in parallelAllSSTableOperation (cleanup/upgradesstables/etc) (CASSANDRA-14657)
 * Improve TokenMetaData cache populating performance avoid long locking (CASSANDRA-14660)
 * Backport: Flush netty client messages immediately (not by default) (CASSANDRA-13651)
 * Fix static column order for SELECT * wildcard queries (CASSANDRA-14638)
 * sstableloader should use discovered broadcast address to connect intra-cluster (CASSANDRA-14522)
 * Fix reading columns with non-UTF names from schema (CASSANDRA-14468)
 * Don't enable client transports when bootstrap is pending (CASSANDRA-14525)
 * MigrationManager attempts to pull schema from different major version nodes (CASSANDRA-14928)
 * Fix incorrect cqlsh results when selecting same columns multiple times (CASSANDRA-13262)
 * Returns null instead of NaN or Infinity in JSON strings (CASSANDRA-14377)
 * Paged Range Slice queries with DISTINCT can drop rows from results (CASSANDRA-14956)
 * Validate supported column type with SASI analyzer (CASSANDRA-13669)
 * Remove BTree.Builder Recycler to reduce memory usage (CASSANDRA-13929)
 * Reduce nodetool GC thread count (CASSANDRA-14475)
 * Fix New SASI view creation during Index Redistribution (CASSANDRA-14055)
 * Remove string formatting lines from BufferPool hot path (CASSANDRA-14416)
 * Update metrics to 3.1.5 (CASSANDRA-12924)
 * Detect OpenJDK jvm type and architecture (CASSANDRA-12793)
 * Don't use guava collections in the non-system keyspace jmx attributes (CASSANDRA-12271)
 * Allow existing nodes to use all peers in shadow round (CASSANDRA-13851)
 * Fix cqlsh to read connection.ssl cqlshrc option again (CASSANDRA-14299)
 * Downgrade log level to trace for CommitLogSegmentManager (CASSANDRA-14370)
 * CQL fromJson(null) throws NullPointerException (CASSANDRA-13891)
 * Serialize empty buffer as empty string for json output format (CASSANDRA-14245)
 * Allow logging implementation to be interchanged for embedded testing (CASSANDRA-13396)
 * SASI tokenizer for simple delimiter based entries (CASSANDRA-14247)
 * Fix Loss of digits when doing CAST from varint/bigint to decimal (CASSANDRA-14170)
 * RateBasedBackPressure unnecessarily invokes a lock on the Guava RateLimiter (CASSANDRA-14163)
 * Fix wildcard GROUP BY queries (CASSANDRA-14209)
 * Fix corrupted static collection deletions in 3.0 -&gt; 2.{1,2} messages (CASSANDRA-14568)
 * Fix potential IndexOutOfBoundsException with counters (CASSANDRA-14167)
 * Always close RT markers returned by ReadCommand#executeLocally() (CASSANDRA-14515)
 * Reverse order queries with range tombstones can cause data loss (CASSANDRA-14513)
 * Fix regression of lagging commitlog flush log message (CASSANDRA-14451)
 * Add Missing dependencies in pom-all (CASSANDRA-14422)
 * Cleanup StartupClusterConnectivityChecker and PING Verb (CASSANDRA-14447)
 * Fix deprecated repair error notifications from 3.x clusters to legacy JMX clients (CASSANDRA-13121)
 * Cassandra not starting when using enhanced startup scripts in windows (CASSANDRA-14418)
 * Fix progress stats and units in compactionstats (CASSANDRA-12244)
 * Better handle missing partition columns in system_schema.columns (CASSANDRA-14379)
 * Delay hints store excise by write timeout to avoid race with decommission (CASSANDRA-13740)
 * Deprecate background repair and probablistic read_repair_chance table options
   (CASSANDRA-13910)
 * Add missed CQL keywords to documentation (CASSANDRA-14359)
 * Fix unbounded validation compactions on repair / revert CASSANDRA-13797 (CASSANDRA-14332)
 * Avoid deadlock when running nodetool refresh before node is fully up (CASSANDRA-14310)
 * Handle all exceptions when opening sstables (CASSANDRA-14202)
 * Handle incompletely written hint descriptors during startup (CASSANDRA-14080)
 * Handle repeat open bound from SRP in read repair (CASSANDRA-14330)
 * Respect max hint window when hinting for LWT (CASSANDRA-14215)
 * Adding missing WriteType enum values to v3, v4, and v5 spec (CASSANDRA-13697)
 * Don't regenerate bloomfilter and summaries on startup (CASSANDRA-11163)
 * Fix NPE when performing comparison against a null frozen in LWT (CASSANDRA-14087)
 * Log when SSTables are deleted (CASSANDRA-14302)
 * Fix batch commitlog sync regression (CASSANDRA-14292)
 * Write to pending endpoint when view replica is also base replica (CASSANDRA-14251)
 * Chain commit log marker potential performance regression in batch commit mode (CASSANDRA-14194)
 * Fully utilise specified compaction threads (CASSANDRA-14210)
 * Pre-create deletion log records to finish compactions quicker (CASSANDRA-12763)
 * Fix bug that prevented compaction of SSTables after full repairs (CASSANDRA-14423)
 * Incorrect counting of pending messages in OutboundTcpConnection (CASSANDRA-11551)
 * Fix compaction failure caused by reading un-flushed data (CASSANDRA-12743)
 * Use Bounds instead of Range for sstables in anticompaction (CASSANDRA-14411)
 * Fix JSON queries with IN restrictions and ORDER BY clause (CASSANDRA-14286)
 * Backport circleci yaml (CASSANDRA-14240)
 * Check checksum before decompressing data (CASSANDRA-14284)
 * CVE-2017-5929 Security vulnerability in Logback warning in NEWS.txt (CASSANDRA-14183)
- Use %license macro

Changes in cassandra-kit:
- Update to Cassandra 3.11.10 (bsc#1181689, CVE-2020-17516)

Changes in crowbar-core:
- Update to version 5.0+git.1622489449.a8e60e238:
  * avoid v4.1.5 of delayed_job_active_record (noref)
  * add CVE-2020-26247 to travis ignore list (bsc#1180507)

Changes in crowbar-openstack:
- Update to version 5.0+git.1616001417.67fd9c2a1:
  * monasca: restart Kibana on update (bsc#1044849)

- Update to version 5.0+git.1615542070.7841c34b7:
  * monasca: fix monasca-server reinstall state check (SOC-11471)

Changes in documentation-suse-openstack-cloud:
- Update to version 8.20210512:
  * Moved Monasca deployment to immediately after keystone (SOC-11525) (#1312)

- Update to version 8.20210511:
  * Update the correct SLES version to suse-12.3 (SOC-11521) (#1321)
  * Renamed the repo name from SLE12-SP3-HA to SLE-HA12-SP3 (SOC-11523) (#1320)

- Update to version 8.20210511:
  * Add bm-power-status playbook to add sles compute section (#1317)

- Update to version 8.20210507:
  * Add instructions for checking MySQL cert expiry (SOC-11422) (#1311)

- Update to version 8.20210304:
  * Add nova and heat db purge cron jobs to maintenance section (SOC-9876) (#1307)

Changes in grafana:
- Add CVE-2021-27358.patch (bsc#1183803, CVE-2021-27358)
  * Prevent unauthenticated remote attackers from causing a DoS through the
    snapshots API.

Changes in kibana:
- Ensure /etc/sysconfig/kibana is present

- Update to Kibana 4.6.6 (bsc#1044849, CVE-2017-11499, ESA-2017-14, 
  ESA-2017-16)
  * [4.6] ignore forked code for babel transpile build phase (#13483)
  * Allow more than match queries in custom filters (#8614) (#10857)
  * [state] don't make extra $location.replace() calls (#9954)
  * [optimizer] move to querystring-browser package for up-to-date api
  * [state/unhashUrl] use encode-uri-query to generate cleanly encoded urls
  * server: refactor log_interceptor to be more DRY (#9617)
  * server: downgrade ECANCELED logs to debug (#9616)
  * server: do not treat logged warnings as errors (#8746) (#9610)
  * [server/logger] downgrade EPIPE errors to debug level (#9023)
  * Add basepath when redirecting from a trailling slash (#9035)
  * [es/kibanaIndex] use unmapped_type rather than ignore_unmapped (#8968)
  * [server/shortUrl] validate urls before shortening them
- Add CVE-2017-11481.patch (bsc#1044849, CVE-2017-11481)
  * This fixes an XSS vulnerability in URL fields
- Remove %dir declaration from /opt/kibana/optimize to ensure
  no files owned by root end up in there
- Exclude /opt/kibana/optimize from %fdupes
- Restart service on upgrade
- Do not copy LICENSE.txt and README.txt to /opt/kibana
- Fix rpmlint warnings/errors
- Switch to explicit patch application
- Fix source URL
- Fix logic for systemd/systemv detection

Changes in openstack-heat-templates:
- Update to version 0.0.0+git.1623056900.7917e18:
  * Fix zuul config for heat-templates-check

- Update to version 0.0.0+git.1621405516.71a0f7a:
  * Remove testr

Changes in openstack-monasca-installer:
- Add 0001-fix-influxdb-stop-task.patch (SOC-11470)
- Add 0001-fix-cassandra-deployment.patch (SOC-11470)

Changes in openstack-nova:
- Update to version nova-16.1.9.dev92:
  * Lowercase ironic driver hash ring and ignore case in cache
  * Include only required fields in ironic node cache
  * Add resource\_class to fields in ironic node cache

- Update to version nova-16.1.9.dev86:
  * [stable-only] Move grenade jobs to experimental
  * Update resources once in update\_available\_resource
  * rt: Make resource tracker always invoking get\_inventory()

- Update to version nova-16.1.9.dev81:
  * [stable-only] gate: Pin CEPH\_RELEASE to nautilus in LM hook

- Update to version nova-16.1.9.dev80:
  * [placement] Add status and links fields to version document at /

Changes in openstack-nova:
- Update to version nova-16.1.9.dev92:
  * Lowercase ironic driver hash ring and ignore case in cache
  * Include only required fields in ironic node cache
  * Add resource\_class to fields in ironic node cache

- Update to version nova-16.1.9.dev86:
  * [stable-only] Move grenade jobs to experimental
  * Update resources once in update\_available\_resource
  * rt: Make resource tracker always invoking get\_inventory()

- Update to version nova-16.1.9.dev81:
  * [stable-only] gate: Pin CEPH\_RELEASE to nautilus in LM hook

- Update to version nova-16.1.9.dev80:
  * [placement] Add status and links fields to version document at /

Changes in python-Django:
- Add CVE-2021-33203.patch (bsc#1186608, CVE-2021-33203)
    * Fixed potential path-traversal via admindocs' TemplateDetailView.
- Add CVE-2021-33571.patch (bsc#1186611, CVE-2021-33571)
    * Prevented leading zeros in IPv4 addresses.

- Add CVE-2021-31542.patch (bsc#1185623, CVE-2021-31542)
    * Fixed CVE-2021-31542 -- Tightened path and file name sanitation in file
      uploads.

- Add CVE-2021-28658.patch (bsc#1184148, CVE-2021-28658)
  * Fixed potential directory-traversal via uploaded files

- Add CVE-2021-23336.patch (bsc#1182433, CVE-2021-23336)
  * Fixed web cache poisoning via django.utils.http.limited_parse_qsl()

Changes in python-eventlet:
- Add 0001-websocket-fd-leak-when-client-did-not-close-connecti.patch 
- Add 0002-websocket-Limit-maximum-uncompressed-frame-length-to.patch (bsc#1185836 CVE-2021-21419)
    * websocket: Limit maximum uncompressed frame length to 8MiB

Changes in python-py:
- Add CVE-2020-29651.patch ((bsc#1179805, CVE-2020-29651)
  * svnwc: fix regular expression vulnerable to DoS in blame
    functionality

Changes in python-pysaml2:
- Add %dir declaration for %{_licensedir}

- Fix CVE-2021-21238, bsc#1181277 with
  0004-Strengthen-XSW-tests.patch ,
  0005-Fix-the-parser-to-not-break-on-ePTID-AttributeValues.patch ,
  0006-Add-xsd-schemas.patch ,
  0007-Fix-CVE-2021-21238-SAML-XML-Signature-wrapping.patch .
  This adds a dependency on python-xmlschema, which depends on
  python-elementpath and build depends python-pathlib2, which depends on
  python-scandir, thus all these need to be added for this to work.
  The used python-xmlschema needs to support the sandbox argument
  which was added in 1.2.0 and refined in 1.2.1, but that version
  doesn't support python2, so a patched version that does both is
  needed.
  0009-Make-previous-commits-python2-compatible.patch to
  not add a dependency on reportlib_resources and make other
  changes python2 compatible.
- Fix CVE-2021-21239, bsc#1181278 with
  0008-Fix-CVE-2021-21239-Restrict-the-key-data-that-xmlsec.patch

Changes in venv-openstack-keystone:
- Add python-xmlschema and python-elementpath for new python-pysaml2 version.

Changes in python-xmlschema:

- Add missed BuildRequires on pathlib2

- Add 3 patches to backport sandbox argument, which is needed by a security fix
  in python-pysaml2 and one patch to make backport python2 compatible.
- Upstream url changed
- Add rpmlintrc to make it work on Leap 42.3
- Update to 1.0.18:
  * Fix for *ModelVisitor.iter_unordered_content()*
  * Fixed default converter, AbderaConverter and JsonMLConverter for xs:anyType decode
  * Fixed validation tests with all converters
  * Added UnorderedConverter to validation tests
- Update to 1.0.17:
  * Enhancement of validation-only speed (~15%)
  * Added *is_valid()* and *iter_errors()* to module API
- Update to 1.0.16:
  * Improved XMLResource class for working with compressed files
  * Fix for validation with XSD wildcards and 'lax' process content
  * Fix ambiguous items validation for xs:choice and xs:sequence models

- Handle UnicodeDecodeErrors during build process

- Update to 1.0.15:
  * Improved XPath 2.0 bindings
  * Added logging for schema initialization and building (handled with argument loglevel)
  * Update encoding of collapsed contents with a new model based reordering method
  * Removed XLink namespace from meta-schema (loaded from a fallback location like XHTML)
  * Fixed half of failed W3C instance tests (remain 255 over 15344 tests)

- Initial commit, needed by pytest 5.1.2

Changes in python-elementpath:

- Update to 1.3.1:
  * Improved schema proxy
  * Improved XSD type matching using paths
  * Cached parent path for XPathContext (only Python 3)
  * Improve typed selection with TypedAttribute and TypedElement named-tuples
  * Add iter_results to XPathContext
  * Remove XMLSchemaProxy from package
  * Fix descendant shortcut operator '//'
  * Fix text() function
  * Fix typed select of '(name)' token
  * Fix 24-hour time for DateTime

- Skip test_hashing to fix 32bit builds

- Initial commit needed by python-xmlschema

Changes in python-six:
- Update in SLE-12 (bsc#1176784, jsc#ECO-3105, jsc#PM-2352)

- Fix testsuite on SLE-12
  + Add python to BuildRequires for suse_version less 1500

- Fix dbm deps as the MU for provides: python-dbm was not released
  on sle12 yet
- Add requirement on pytest &gt; 4.0 to see the pytest module works
  with this MU

- Do not cause buildcycle with previous change but rather
  install the egg-info prepared metadata from the tarball

- use setuptools for building to support pip 10.x (bsc#1166139)

- update to 1.14.0
 * Add `six.assertNotRegex`
 * `six.moves._dummy_thread` now points to the `_thread` module on
    Python 3.9+. Python 3.7 and later requires threading and deprecated the
    `_dummy_thread` module
 * Remove support for Python 2.6 and Python 3.2
 * `six.wraps` now ignores missing attributes

- Pull in dbm/gdbm module from python for testing

- update to 0.13.0:
  - Issue #298, pull request #299: Add `six.moves.dbm_ndbm`.
  - Issue #155: Add `six.moves.collections_abc`, which aliases the `collections`
    module on Python 2-3.2 and the `collections.abc` on Python 3.3 and greater.
  - Pull request #304: Re-add distutils fallback in `setup.py`.
  - Pull request #305: On Python 3.7, `with_metaclass` supports classes using PEP

- Simplify the pytest call

- Fix pytest call
- Fixdocumentation package generating

- Change %pretrans back to %pre to fix bootstrap issue
  boo#1123064 bsc#1143893

- Require just base python module, even full python is too much
  and it is not required here

- Update to 0.12.0:
    * `six.add_metaclass` now preserves `__qualname__` from the
      original class.
    * Add `six.ensure_binary`, `six.ensure_text`, and
      `six.ensure_str`.
- Because of cyclical dependencies between six and Sphinx, we
  need to to do multibuild.

- Include in SLE-12 (FATE#326838, bsc#1113302)

- remove egg-info directory in %pretrans
- fix egg-info directory pattern
- match any version of egg-info for a certain python version

- Break the cycilical dependency on python-setuptools.

- Remove argparse dependency

- build python3 subpackage (FATE#324435, bsc#1073879)

- remove egg-info directory before installation if it exists,
  because setuptools produce directory and six switched to distutils
  that produce a file
  (and because rpm can't handle that by itself)
  fixes bsc#1057496

- Fix Source url

- README-&gt;README.rst, add CHANGES
- update to version 1.11.0:
  * Pull request #178: `with_metaclass` now properly proxies
    `__prepare__` to the underlying metaclass.
  * Pull request #191: Allow `with_metaclass` to work with metaclasses
    implemented in C.
  * Pull request #203: Add parse_http_list and parse_keqv_list to
    moved urllib.request.
  * Pull request #172 and issue #171: Add unquote_to_bytes to moved
    urllib.parse.
  * Pull request #167: Add `six.moves.getoutput`.
  * Pull request #80: Add `six.moves.urllib_parse.splitvalue`.
  * Pull request #75: Add `six.moves.email_mime_image`.
  * Pull request #72: Avoid creating reference cycles through
    tracebacks in `reraise`.

- Submit 1.9.0 to SLE-12 (fate#319030, fate#318838, bsc#940812)

- sanitize release line in specfile

Changes in rubygem-activerecord-session_store.SUSE_SLE-12-SP4_Update_Products_Cloud9_Update:
- added CVE-2019-25025.patch (CVE-2019-25025, bsc#1183174)
  * This requires CVE-2019-16782.patch to be included in rubygem-actionpack-4_2
  to work correctly.

Changes in venv-openstack-keystone:
- Add python-xmlschema and python-elementpath for new python-pysaml2 version.

- Add python-defusedxml (bsc#1019074)

- Inherit version number of venv from main component (SCRD-8523)

  		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-28"/>
	<updated date="2021-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019074">SUSE bug 1019074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044849">SUSE bug 1044849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057496">SUSE bug 1057496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073879">SUSE bug 1073879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113302">SUSE bug 1113302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123064">SUSE bug 1123064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143893">SUSE bug 1143893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166139">SUSE bug 1166139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176784">SUSE bug 1176784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179805">SUSE bug 1179805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180507">SUSE bug 1180507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181277">SUSE bug 1181277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181278">SUSE bug 1181278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181689">SUSE bug 1181689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181828">SUSE bug 1181828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182433">SUSE bug 1182433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183174">SUSE bug 1183174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183803">SUSE bug 1183803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184148">SUSE bug 1184148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185623">SUSE bug 1185623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185836">SUSE bug 1185836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186608">SUSE bug 1186608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186611">SUSE bug 1186611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940812">SUSE bug 940812</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-11481/">CVE-2017-11481 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11481">CVE-2017-11481 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11499/">CVE-2017-11499 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11499">CVE-2017-11499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5929/">CVE-2017-5929 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5929">CVE-2017-5929 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-25025/">CVE-2019-25025 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25025">CVE-2019-25025 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17516/">CVE-2020-17516 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17516">CVE-2020-17516 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26247/">CVE-2020-26247 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26247">CVE-2020-26247 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29651/">CVE-2020-29651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29651">CVE-2020-29651 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21238/">CVE-2021-21238 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21238">CVE-2021-21238 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21239/">CVE-2021-21239 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21239">CVE-2021-21239 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21419/">CVE-2021-21419 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21419">CVE-2021-21419 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27358/">CVE-2021-27358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27358">CVE-2021-27358 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28658/">CVE-2021-28658 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28658">CVE-2021-28658 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31542/">CVE-2021-31542 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31542">CVE-2021-31542 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33203/">CVE-2021-33203 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33203">CVE-2021-33203 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33571/">CVE-2021-33571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33571">CVE-2021-33571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626559" comment="ardana-cobbler-8.0+git.1614096566.e8c2b27-3.44.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626560" comment="cassandra-3.11.10-5.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626561" comment="cassandra-tools-3.11.10-5.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626562" comment="documentation-suse-openstack-cloud-installation-8.20210512-1.32.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626563" comment="documentation-suse-openstack-cloud-operations-8.20210512-1.32.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626564" comment="documentation-suse-openstack-cloud-opsconsole-8.20210512-1.32.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626565" comment="documentation-suse-openstack-cloud-planning-8.20210512-1.32.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626566" comment="documentation-suse-openstack-cloud-security-8.20210512-1.32.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626567" comment="documentation-suse-openstack-cloud-supplement-8.20210512-1.32.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626568" comment="documentation-suse-openstack-cloud-upstream-admin-8.20210512-1.32.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626569" comment="documentation-suse-openstack-cloud-upstream-user-8.20210512-1.32.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626570" comment="documentation-suse-openstack-cloud-user-8.20210512-1.32.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624420" comment="grafana-6.7.4-4.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624421" comment="kibana-4.6.6-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624422" comment="openstack-heat-templates-0.0.0+git.1623056900.7917e18-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624423" comment="openstack-monasca-installer-20190923_16.32-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626571" comment="openstack-nova-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626572" comment="openstack-nova-api-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626573" comment="openstack-nova-cells-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626574" comment="openstack-nova-compute-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626575" comment="openstack-nova-conductor-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626576" comment="openstack-nova-console-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626577" comment="openstack-nova-consoleauth-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626578" comment="openstack-nova-doc-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626579" comment="openstack-nova-novncproxy-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626580" comment="openstack-nova-placement-api-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626581" comment="openstack-nova-scheduler-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626582" comment="openstack-nova-serialproxy-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626583" comment="openstack-nova-vncproxy-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624437" comment="python-Django-1.11.29-3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009599115" comment="python-elementpath-1.3.1-1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624438" comment="python-eventlet-0.20.0-6.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626584" comment="python-nova-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624440" comment="python-py-1.4.34-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624441" comment="python-pysaml2-4.0.2-5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624442" comment="python-xmlschema-1.0.18-1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626585" comment="venv-openstack-aodh-x86_64-5.1.1~dev7-12.32.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626586" comment="venv-openstack-barbican-x86_64-5.0.2~dev3-12.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626587" comment="venv-openstack-ceilometer-x86_64-9.0.8~dev7-12.30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626588" comment="venv-openstack-cinder-x86_64-11.2.3~dev29-14.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626589" comment="venv-openstack-designate-x86_64-5.0.3~dev7-12.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626590" comment="venv-openstack-freezer-x86_64-5.0.0.0~xrc2~dev2-10.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626591" comment="venv-openstack-glance-x86_64-15.0.3~dev3-12.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626592" comment="venv-openstack-heat-x86_64-9.0.8~dev22-12.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626593" comment="venv-openstack-horizon-x86_64-12.0.5~dev6-14.36.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626594" comment="venv-openstack-ironic-x86_64-9.1.8~dev8-12.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626595" comment="venv-openstack-keystone-x86_64-12.0.4~dev11-11.35.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626596" comment="venv-openstack-magnum-x86_64-5.0.2_5.0.2_5.0.2~dev31-11.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626597" comment="venv-openstack-manila-x86_64-5.1.1~dev5-12.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626598" comment="venv-openstack-monasca-ceilometer-x86_64-1.5.1_1.5.1_1.5.1~dev3-8.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626599" comment="venv-openstack-monasca-x86_64-2.2.2~dev1-11.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626600" comment="venv-openstack-murano-x86_64-4.0.2~dev2-12.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626601" comment="venv-openstack-neutron-x86_64-11.0.9~dev69-13.38.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626602" comment="venv-openstack-nova-x86_64-16.1.9~dev92-11.36.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626603" comment="venv-openstack-octavia-x86_64-1.0.6~dev3-12.33.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626604" comment="venv-openstack-sahara-x86_64-7.0.5~dev4-11.32.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626605" comment="venv-openstack-swift-x86_64-2.15.2_2.15.2_2.15.2~dev32-11.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626606" comment="venv-openstack-trove-x86_64-8.0.2~dev2-11.32.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148479" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1187364" ref_url="https://bugzilla.suse.com/1187364" source="BUGZILLA"/>
		<reference ref_id="1187365" ref_url="https://bugzilla.suse.com/1187365" source="BUGZILLA"/>
		<reference ref_id="1187366" ref_url="https://bugzilla.suse.com/1187366" source="BUGZILLA"/>
		<reference ref_id="1187367" ref_url="https://bugzilla.suse.com/1187367" source="BUGZILLA"/>
		<reference ref_id="1187529" ref_url="https://bugzilla.suse.com/1187529" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3593" ref_url="https://www.suse.com/security/cve/CVE-2021-3593/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<reference ref_id="CVE-2021-3611" ref_url="https://www.suse.com/security/cve/CVE-2021-3611/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009229.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2021-3595: Fixed slirp: invalid pointer initialization may lead to information disclosure (tftp) (bsc#1187366)
- CVE-2021-3592: Fix for slirp: invalid pointer initialization may lead to information disclosure (bootp) (bsc#1187364)
- CVE-2021-3594: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp) (bsc#1187367)
- CVE-2021-3593: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp6) (bsc#1187365)
- CVE-2021-3611: Fix intel-hda segmentation fault due to stack overflow (bsc#1187529)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-29"/>
	<updated date="2021-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187365">SUSE bug 1187365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187366">SUSE bug 1187366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187529">SUSE bug 1187529</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3593/">CVE-2021-3593 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3593">CVE-2021-3593 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3595">CVE-2021-3595 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3611/">CVE-2021-3611 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3611">CVE-2021-3611 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625025" comment="qemu-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625026" comment="qemu-block-curl-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625027" comment="qemu-block-iscsi-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624976" comment="qemu-block-rbd-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625028" comment="qemu-block-ssh-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625029" comment="qemu-guest-agent-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624979" comment="qemu-ipxe-1.0.0+-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624980" comment="qemu-kvm-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625030" comment="qemu-lang-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624983" comment="qemu-seabios-1.10.2_0_g5f4c7b1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624984" comment="qemu-sgabios-8-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625031" comment="qemu-tools-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624986" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624987" comment="qemu-x86-2.9.1-6.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148480" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1172505" ref_url="https://bugzilla.suse.com/1172505" source="BUGZILLA"/>
		<reference ref_id="1187105" ref_url="https://bugzilla.suse.com/1187105" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12049" ref_url="https://www.suse.com/security/cve/CVE-2020-12049/" source="CVE"/>
		<reference ref_id="CVE-2020-35512" ref_url="https://www.suse.com/security/cve/CVE-2020-35512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009240.html" source="SUSE-SU"/>
		<description>
This update for dbus-1 fixes the following issues:

- CVE-2020-35512: Fixed a bug where users with the same numeric UID could lead to use-after-free and undefined behaviour. (bsc#1187105)
- CVE-2020-12049: Fixed a bug where a truncated messages lead to resource exhaustion. (bsc#1172505)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-02"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172505">SUSE bug 1172505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187105">SUSE bug 1187105</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12049/">CVE-2020-12049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12049">CVE-2020-12049 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35512/">CVE-2020-35512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35512">CVE-2020-35512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625809" comment="dbus-1-1.8.22-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625810" comment="dbus-1-x11-1.8.22-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625811" comment="libdbus-1-3-1.8.22-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625756" comment="libdbus-1-3-32bit-1.8.22-29.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148481" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1188697" ref_url="https://bugzilla.suse.com/1188697" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21775" ref_url="https://www.suse.com/security/cve/CVE-2021-21775/" source="CVE"/>
		<reference ref_id="CVE-2021-21779" ref_url="https://www.suse.com/security/cve/CVE-2021-21779/" source="CVE"/>
		<reference ref_id="CVE-2021-30663" ref_url="https://www.suse.com/security/cve/CVE-2021-30663/" source="CVE"/>
		<reference ref_id="CVE-2021-30665" ref_url="https://www.suse.com/security/cve/CVE-2021-30665/" source="CVE"/>
		<reference ref_id="CVE-2021-30689" ref_url="https://www.suse.com/security/cve/CVE-2021-30689/" source="CVE"/>
		<reference ref_id="CVE-2021-30720" ref_url="https://www.suse.com/security/cve/CVE-2021-30720/" source="CVE"/>
		<reference ref_id="CVE-2021-30734" ref_url="https://www.suse.com/security/cve/CVE-2021-30734/" source="CVE"/>
		<reference ref_id="CVE-2021-30744" ref_url="https://www.suse.com/security/cve/CVE-2021-30744/" source="CVE"/>
		<reference ref_id="CVE-2021-30749" ref_url="https://www.suse.com/security/cve/CVE-2021-30749/" source="CVE"/>
		<reference ref_id="CVE-2021-30758" ref_url="https://www.suse.com/security/cve/CVE-2021-30758/" source="CVE"/>
		<reference ref_id="CVE-2021-30795" ref_url="https://www.suse.com/security/cve/CVE-2021-30795/" source="CVE"/>
		<reference ref_id="CVE-2021-30797" ref_url="https://www.suse.com/security/cve/CVE-2021-30797/" source="CVE"/>
		<reference ref_id="CVE-2021-30799" ref_url="https://www.suse.com/security/cve/CVE-2021-30799/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.32.3:

- CVE-2021-21775: Fixed a use-after-free vulnerability in the way certain events are processed for ImageLoader objects. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. (bsc#1188697)
- CVE-2021-21779: Fixed a use-after-free vulnerability in the way that WebKit GraphicsContext handles certain events. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. (bsc#1188697)
- CVE-2021-30663: An integer overflow was addressed with improved input validation. (bsc#1188697)
- CVE-2021-30665: A memory corruption issue was addressed with improved state management. (bsc#1188697)
- CVE-2021-30689: A logic issue was addressed with improved state management. (bsc#1188697)
- CVE-2021-30720: A logic issue was addressed with improved restrictions. (bsc#1188697)
- CVE-2021-30734: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
- CVE-2021-30744: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. (bsc#1188697)
- CVE-2021-30749: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
- CVE-2021-30758: A type confusion issue was addressed with improved state handling. (bsc#1188697)
- CVE-2021-30795: A use after free issue was addressed with improved memory management. (bsc#1188697)
- CVE-2021-30797: This issue was addressed with improved checks. (bsc#1188697)
- CVE-2021-30799: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-03"/>
	<updated date="2021-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21775/">CVE-2021-21775 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21775">CVE-2021-21775 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21779/">CVE-2021-21779 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21779">CVE-2021-21779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30663/">CVE-2021-30663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30663">CVE-2021-30663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30665/">CVE-2021-30665 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30665">CVE-2021-30665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30689/">CVE-2021-30689 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30689">CVE-2021-30689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30720/">CVE-2021-30720 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30720">CVE-2021-30720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30734/">CVE-2021-30734 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30734">CVE-2021-30734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30744/">CVE-2021-30744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30744">CVE-2021-30744 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30749/">CVE-2021-30749 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30749">CVE-2021-30749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30758/">CVE-2021-30758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30758">CVE-2021-30758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30795/">CVE-2021-30795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30795">CVE-2021-30795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30797/">CVE-2021-30797 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30797">CVE-2021-30797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30799/">CVE-2021-30799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30799">CVE-2021-30799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627312" comment="libjavascriptcoregtk-4_0-18-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627313" comment="libwebkit2gtk-4_0-37-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627305" comment="libwebkit2gtk3-lang-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627314" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627315" comment="typelib-1_0-WebKit2-4_0-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627316" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627317" comment="webkit2gtk-4_0-injected-bundles-2.32.3-2.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148482" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1100167" ref_url="https://bugzilla.suse.com/1100167" source="BUGZILLA"/>
		<reference ref_id="1116993" ref_url="https://bugzilla.suse.com/1116993" source="BUGZILLA"/>
		<reference ref_id="1117954" ref_url="https://bugzilla.suse.com/1117954" source="BUGZILLA"/>
		<reference ref_id="1188540" ref_url="https://bugzilla.suse.com/1188540" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13139" ref_url="https://www.suse.com/security/cve/CVE-2018-13139/" source="CVE"/>
		<reference ref_id="CVE-2018-19432" ref_url="https://www.suse.com/security/cve/CVE-2018-19432/" source="CVE"/>
		<reference ref_id="CVE-2018-19758" ref_url="https://www.suse.com/security/cve/CVE-2018-19758/" source="CVE"/>
		<reference ref_id="CVE-2021-3246" ref_url="https://www.suse.com/security/cve/CVE-2021-3246/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009252.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2018-13139: Fixed a stack-based buffer overflow in psf_memset in common.c in libsndfile 1.0.28allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact. (bsc#1100167)
- CVE-2018-19432: Fixed a NULL pointer dereference in the function sf_write_int in sndfile.c, which will lead to a denial of service. (bsc#1116993)
- CVE-2021-3246: Fixed a heap buffer overflow vulnerability in msadpcm_decode_block. (bsc#1188540)
- CVE-2018-19758: Fixed a heap-based buffer over-read at wav.c in wav_write_header in libsndfile 1.0.28 that will cause a denial of service. (bsc#1117954)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1100167">SUSE bug 1100167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116993">SUSE bug 1116993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117954">SUSE bug 1117954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188540">SUSE bug 1188540</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13139/">CVE-2018-13139 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13139">CVE-2018-13139 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19432/">CVE-2018-19432 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19432">CVE-2018-19432 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19758/">CVE-2018-19758 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19758">CVE-2018-19758 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3246/">CVE-2021-3246 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3246">CVE-2021-3246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626903" comment="libsndfile1-1.0.25-36.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626901" comment="libsndfile1-32bit-1.0.25-36.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148483" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009250.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3630: out-of-bounds write in DJVU:DjVuTXT:decode() in DjVuText.cpp (bsc#1187869)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3630">CVE-2021-3630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627946" comment="libdjvulibre21-3.5.25.3-5.19.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148484" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1188574" ref_url="https://bugzilla.suse.com/1188574" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34552" ref_url="https://www.suse.com/security/cve/CVE-2021-34552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009267.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2021-34552: Fixed a buffer overflow in Convert.c (bsc#1188574)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-06"/>
	<updated date="2021-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188574">SUSE bug 1188574</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34552/">CVE-2021-34552 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34552">CVE-2021-34552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627135" comment="python-Pillow-4.2.1-3.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148485" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1189206" ref_url="https://bugzilla.suse.com/1189206" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009291.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

  It was possible to trigger Remote code execution due to a integer overflow (CVE-2021-38185, bsc#1189206)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-14"/>
	<updated date="2021-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189206">SUSE bug 1189206</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630615" comment="cpio-2.11-36.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630610" comment="cpio-lang-2.11-36.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148486" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1188881" ref_url="https://bugzilla.suse.com/1188881" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009294.html" source="SUSE-SU"/>
		<description>
This update for libcares2 fixes the following issues:

- CVE-2021-3672: Fixed input validation on hostnames (bsc#1188881).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3672">CVE-2021-3672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630393" comment="libcares2-1.9.1-9.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148487" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.13.0 ESR (MFSA 2021-34, bsc#1188891):

- CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
- CVE-2021-29988: Memory corruption as a result of incorrect style treatment
- CVE-2021-29984: Incorrect instruction reordering during JIT optimization
- CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
- CVE-2021-29985: Use-after-free media channels
- CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630616" comment="MozillaFirefox-78.13.0-112.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630617" comment="MozillaFirefox-devel-78.13.0-112.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630618" comment="MozillaFirefox-translations-common-78.13.0-112.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148488" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1033081" ref_url="https://bugzilla.suse.com/1033081" source="BUGZILLA"/>
		<reference ref_id="1182807" ref_url="https://bugzilla.suse.com/1182807" source="BUGZILLA"/>
		<reference ref_id="1188034" ref_url="https://bugzilla.suse.com/1188034" source="BUGZILLA"/>
		<reference ref_id="1188875" ref_url="https://bugzilla.suse.com/1188875" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36386" ref_url="https://www.suse.com/security/cve/CVE-2021-36386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009308.html" source="SUSE-SU"/>
		<description>
This update for fetchmail fixes the following issues:

- CVE-2021-36386: DoS or information disclosure in some configurations (bsc#1188875)
- Change PASSWORDLEN from 64 to 256 [bsc#1188034]
- Set the hostname for SNI when using TLS [bsc#1182807]
- Allow --syslog option in daemon mode. (bsc#1033081)
- Set the hostname for SNI when using TLS. (bsc#1182807)
- Change PASSWORDLEN from 64 to 256 (bsc#1188034)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-18"/>
	<updated date="2021-08-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033081">SUSE bug 1033081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182807">SUSE bug 1182807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188034">SUSE bug 1188034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188875">SUSE bug 1188875</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36386/">CVE-2021-36386 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36386">CVE-2021-36386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630872" comment="fetchmail-6.3.26-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630873" comment="fetchmailconf-6.3.26-13.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148489" version="1" class="patch">
	<metadata>
		<title>Recommended update for cpio (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1189465" ref_url="https://bugzilla.suse.com/1189465" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<reference ref_id="SUSE-RU-2021:2779-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019895.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

- A regression in the previous update could lead to crashes (bsc#1189465)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-19"/>
	<updated date="2021-08-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1189465">SUSE bug 1189465</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631319" comment="cpio-2.11-36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631320" comment="cpio-lang-2.11-36.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148490" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1185056" ref_url="https://bugzilla.suse.com/1185056" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188566" ref_url="https://bugzilla.suse.com/1188566" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2161" ref_url="https://www.suse.com/security/cve/CVE-2021-2161/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009315.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u302 (icedtea 3.20.0)
- CVE-2021-2341: Improve file transfers. (bsc#1188564)
- CVE-2021-2369: Better jar file validation. (bsc#1188565)
- CVE-2021-2388: Enhance compiler validation. (bsc#1188566)
- CVE-2021-2161: Less ambiguous processing. (bsc#1185056)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185056">SUSE bug 1185056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188566">SUSE bug 1188566</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2161/">CVE-2021-2161 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2161">CVE-2021-2161 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2388">CVE-2021-2388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627215" comment="java-1_8_0-openjdk-1.8.0.302-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627216" comment="java-1_8_0-openjdk-demo-1.8.0.302-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627217" comment="java-1_8_0-openjdk-devel-1.8.0.302-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627218" comment="java-1_8_0-openjdk-headless-1.8.0.302-27.63.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148491" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1189465" ref_url="https://bugzilla.suse.com/1189465" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009333.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

- A patch previously applied to remedy CVE-2021-38185 introduced a regression
  that had the potential to cause a segmentation fault in cpio. [bsc#1189465]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189465">SUSE bug 1189465</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631542" comment="cpio-2.11-36.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631541" comment="cpio-lang-2.11-36.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148492" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyYAML (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1174514" ref_url="https://bugzilla.suse.com/1174514" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14343" ref_url="https://www.suse.com/security/cve/CVE-2020-14343/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009336.html" source="SUSE-SU"/>
		<description>

This update for python-PyYAML fixes the following issues:

- Update to 5.3.1.

- CVE-2020-14343: A vulnerability was discovered in the PyYAML library,
  where it was susceptible to arbitrary code execution when it processes
  untrusted YAML files through the full_load method or with the FullLoader
  loader. Applications that use the library to process untrusted input
  may be vulnerable to this flaw. This flaw allows an attacker to
  execute arbitrary code on the system by abusing the python/object/new
  constructor. This flaw is due to an incomplete fix for CVE-2020-1747.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174514">SUSE bug 1174514</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14343/">CVE-2020-14343 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14343">CVE-2020-14343 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628223" comment="python-PyYAML-5.3.1-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628224" comment="python3-PyYAML-5.3.1-28.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148493" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009342.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following security issue:

- CVE-2021-3712: a bug in the code for printing certificate details could lead
  to a buffer overrun that a malicious actor could exploit to crash the
  application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631696" comment="libopenssl-devel-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631697" comment="libopenssl1_0_0-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631678" comment="libopenssl1_0_0-32bit-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631698" comment="libopenssl1_0_0-hmac-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631680" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631699" comment="openssl-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631682" comment="openssl-doc-1.0.2j-60.69.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148494" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1046882" ref_url="https://bugzilla.suse.com/1046882" source="BUGZILLA"/>
		<reference ref_id="1054038" ref_url="https://bugzilla.suse.com/1054038" source="BUGZILLA"/>
		<reference ref_id="1187974" ref_url="https://bugzilla.suse.com/1187974" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-12938" ref_url="https://www.suse.com/security/cve/CVE-2017-12938/" source="CVE"/>
		<reference ref_id="CVE-2017-12940" ref_url="https://www.suse.com/security/cve/CVE-2017-12940/" source="CVE"/>
		<reference ref_id="CVE-2017-12941" ref_url="https://www.suse.com/security/cve/CVE-2017-12941/" source="CVE"/>
		<reference ref_id="CVE-2017-12942" ref_url="https://www.suse.com/security/cve/CVE-2017-12942/" source="CVE"/>
		<reference ref_id="CVE-2017-20006" ref_url="https://www.suse.com/security/cve/CVE-2017-20006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009355.html" source="SUSE-SU"/>
		<description>
This update for unrar to version 5.6.1 fixes several issues.

These security issues were fixed:

- CVE-2017-12938: Prevent remote attackers to bypass a directory-traversal
  protection mechanism via vectors involving a symlink to the . directory, a
  symlink to the .. directory, and a regular file (bsc#1054038).
- CVE-2017-12940: Prevent out-of-bounds read in the EncodeFileName::Decode call
  within the Archive::ReadHeader15 function (bsc#1054038).
- CVE-2017-12941: Prevent an out-of-bounds read in the Unpack::Unpack20
  function (bsc#1054038).
- CVE-2017-12942: Prevent a buffer overflow in the Unpack::LongLZ function
  (bsc#1054038).
- CVE-2017-20006: Fixed heap-based buffer overflow in Unpack:CopyString (bsc#1187974).

These non-security issues were fixed:

- Added extraction support for .LZ archives created by Lzip compressor
- Enable unpacking of files in ZIP archives compressed with XZ algorithm and
  encrypted with AES
- Added support for PAX extended headers inside of TAR archive
- If RAR recovery volumes (.rev files) are present in the same folder as usual
  RAR volumes, archive test command verifies .rev contents after completing
  testing .rar files
- By default unrar skips symbolic links with absolute paths in link target when
  extracting unless -ola command line switch is specified
- Added support for AES-NI CPU instructions
- Support for a new RAR 5.0 archiving format
- Wildcard exclusion mask for folders
- Prevent conditional jumps depending on uninitialised values (bsc#1046882)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046882">SUSE bug 1046882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054038">SUSE bug 1054038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187974">SUSE bug 1187974</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6706">CVE-2012-6706 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12938/">CVE-2017-12938 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12938">CVE-2017-12938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12940/">CVE-2017-12940 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12940">CVE-2017-12940 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12941/">CVE-2017-12941 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12941">CVE-2017-12941 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12942/">CVE-2017-12942 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12942">CVE-2017-12942 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-20006/">CVE-2017-20006 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-20006">CVE-2017-20006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631579" comment="unrar-5.6.1-4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148495" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1117483" ref_url="https://bugzilla.suse.com/1117483" source="BUGZILLA"/>
		<reference ref_id="1181345" ref_url="https://bugzilla.suse.com/1181345" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27827" ref_url="https://www.suse.com/security/cve/CVE-2020-27827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008266.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:
	  
- openvswitch was updated to 2.7.12
- CVE-2020-27827: Fixed a memory leak when parsing lldp packets (bsc#1181345)	  
A lot more minor bugs have been fixed with this openvswitch version. Please refer to the changelog of
the openvswitch.rpm file in order to obtain a list of all changes.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-02"/>
	<updated date="2021-02-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1117483">SUSE bug 1117483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181345">SUSE bug 1181345</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27827/">CVE-2020-27827 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27827">CVE-2020-27827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555935" comment="openvswitch-2.7.12-3.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148496" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1188576" ref_url="https://bugzilla.suse.com/1188576" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25051" ref_url="https://www.suse.com/security/cve/CVE-2019-25051/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009356.html" source="SUSE-SU"/>
		<description>
This update for aspell fixes the following issues:

- CVE-2019-25051: Fixed heap-buffer-overflow in acommon:ObjStack:dup_top (bsc#1188576).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188576">SUSE bug 1188576</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25051/">CVE-2019-25051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25051">CVE-2019-25051 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627800" comment="aspell-0.60.6.1-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627801" comment="aspell-ispell-0.60.6.1-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627802" comment="libaspell15-0.60.6.1-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627791" comment="libaspell15-32bit-0.60.6.1-18.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148497" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1175443" ref_url="https://bugzilla.suse.com/1175443" source="BUGZILLA"/>
		<reference ref_id="1188888" ref_url="https://bugzilla.suse.com/1188888" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8622" ref_url="https://www.suse.com/security/cve/CVE-2020-8622/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009368.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8622: A truncated TSIG response can lead to an assertion failure (bsc#1175443).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-30"/>
	<updated date="2021-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188888">SUSE bug 1188888</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8622/">CVE-2020-8622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8622">CVE-2020-8622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627796" comment="bind-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627797" comment="bind-chrootenv-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627784" comment="bind-doc-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627798" comment="bind-libs-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627786" comment="bind-libs-32bit-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627799" comment="bind-utils-9.9.9P1-63.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148498" version="1" class="patch">
	<metadata>
		<title>Security update for mysql-connector-java (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1173600" ref_url="https://bugzilla.suse.com/1173600" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2875" ref_url="https://www.suse.com/security/cve/CVE-2020-2875/" source="CVE"/>
		<reference ref_id="CVE-2020-2933" ref_url="https://www.suse.com/security/cve/CVE-2020-2933/" source="CVE"/>
		<reference ref_id="CVE-2020-2934" ref_url="https://www.suse.com/security/cve/CVE-2020-2934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009371.html" source="SUSE-SU"/>
		<description>
This update for mysql-connector-java fixes the following issues:

- CVE-2020-2875: Unauthenticated attacker with network access via multiple protocols can compromise MySQL Connectors. (bsc#1173600)
- CVE-2020-2934: Fixed a vulnerability which could cause a partial denial of service of MySQL Connectors. (bsc#1173600)
- CVE-2020-2933: Fixed a vulnerability which could allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. (bsc#1173600)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-30"/>
	<updated date="2021-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173600">SUSE bug 1173600</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2875/">CVE-2020-2875 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2875">CVE-2020-2875 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2933/">CVE-2020-2933 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2933">CVE-2020-2933 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-2934/">CVE-2020-2934 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2934">CVE-2020-2934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627023" comment="mysql-connector-java-5.1.42-5.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148499" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1188457" ref_url="https://bugzilla.suse.com/1188457" source="BUGZILLA"/>
		<reference ref_id="1188458" ref_url="https://bugzilla.suse.com/1188458" source="BUGZILLA"/>
		<reference ref_id="1188459" ref_url="https://bugzilla.suse.com/1188459" source="BUGZILLA"/>
		<reference ref_id="1188460" ref_url="https://bugzilla.suse.com/1188460" source="BUGZILLA"/>
		<reference ref_id="1188461" ref_url="https://bugzilla.suse.com/1188461" source="BUGZILLA"/>
		<reference ref_id="1188462" ref_url="https://bugzilla.suse.com/1188462" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20298" ref_url="https://www.suse.com/security/cve/CVE-2021-20298/" source="CVE"/>
		<reference ref_id="CVE-2021-20299" ref_url="https://www.suse.com/security/cve/CVE-2021-20299/" source="CVE"/>
		<reference ref_id="CVE-2021-20300" ref_url="https://www.suse.com/security/cve/CVE-2021-20300/" source="CVE"/>
		<reference ref_id="CVE-2021-20302" ref_url="https://www.suse.com/security/cve/CVE-2021-20302/" source="CVE"/>
		<reference ref_id="CVE-2021-20303" ref_url="https://www.suse.com/security/cve/CVE-2021-20303/" source="CVE"/>
		<reference ref_id="CVE-2021-20304" ref_url="https://www.suse.com/security/cve/CVE-2021-20304/" source="CVE"/>
		<reference ref_id="CVE-2021-3476" ref_url="https://www.suse.com/security/cve/CVE-2021-3476/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009386.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- CVE-2021-20298 [bsc#1188460]: Fixed Out-of-memory in B44Compressor
- CVE-2021-20299 [bsc#1188459]: Fixed Null-dereference READ in Imf_2_5:Header:operator
- CVE-2021-20300 [bsc#1188458]: Fixed Integer-overflow in Imf_2_5:hufUncompress
- CVE-2021-20302 [bsc#1188462]: Fixed Floating-point-exception in Imf_2_5:precalculateTileInfot
- CVE-2021-20303 [bsc#1188457]: Fixed Heap-buffer-overflow in Imf_2_5::copyIntoFrameBuffer
- CVE-2021-20304 [bsc#1188461]: Fixed Undefined-shift in Imf_2_5:hufDecode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188457">SUSE bug 1188457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188458">SUSE bug 1188458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188459">SUSE bug 1188459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188460">SUSE bug 1188460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188461">SUSE bug 1188461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188462">SUSE bug 1188462</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20298/">CVE-2021-20298 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20298">CVE-2021-20298 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20299/">CVE-2021-20299 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20299">CVE-2021-20299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20300/">CVE-2021-20300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20300">CVE-2021-20300 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20302/">CVE-2021-20302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20302">CVE-2021-20302 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-20303/">CVE-2021-20303 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20303">CVE-2021-20303 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20304/">CVE-2021-20304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20304">CVE-2021-20304 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3476/">CVE-2021-3476 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3476">CVE-2021-3476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627947" comment="libIlmImf-Imf_2_1-21-2.1.0-6.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627948" comment="openexr-2.1.0-6.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148500" version="1" class="patch">
	<metadata>
		<title>Security update for libesmtp (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1160462" ref_url="https://bugzilla.suse.com/1160462" source="BUGZILLA"/>
		<reference ref_id="1189097" ref_url="https://bugzilla.suse.com/1189097" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19977" ref_url="https://www.suse.com/security/cve/CVE-2019-19977/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009380.html" source="SUSE-SU"/>
		<description>
This update for libesmtp fixes the following issues:

- CVE-2019-19977: Fix stack-based buffer over-read in ntlm/ntlmstruct.c (bsc#1160462).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160462">SUSE bug 1160462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189097">SUSE bug 1189097</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19977/">CVE-2019-19977 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19977">CVE-2019-19977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628213" comment="libesmtp-1.0.6-17.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148501" version="1" class="patch">
	<metadata>
		<title>Security update for file (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1154661" ref_url="https://bugzilla.suse.com/1154661" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18218" ref_url="https://www.suse.com/security/cve/CVE-2019-18218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009396.html" source="SUSE-SU"/>
		<description>
This update for file fixes the following issues:

- CVE-2019-18218: Fixed heap-based buffer overflow in cdf_read_property_info in cdf.c (bsc#1154661).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154661">SUSE bug 1154661</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18218/">CVE-2019-18218 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18218">CVE-2019-18218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628151" comment="file-5.22-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628152" comment="file-magic-5.22-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628153" comment="libmagic1-5.22-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628154" comment="libmagic1-32bit-5.22-10.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148502" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1182654" ref_url="https://bugzilla.suse.com/1182654" source="BUGZILLA"/>
		<reference ref_id="1186429" ref_url="https://bugzilla.suse.com/1186429" source="BUGZILLA"/>
		<reference ref_id="1186433" ref_url="https://bugzilla.suse.com/1186433" source="BUGZILLA"/>
		<reference ref_id="1186434" ref_url="https://bugzilla.suse.com/1186434" source="BUGZILLA"/>
		<reference ref_id="1187369" ref_url="https://bugzilla.suse.com/1187369" source="BUGZILLA"/>
		<reference ref_id="1187376" ref_url="https://bugzilla.suse.com/1187376" source="BUGZILLA"/>
		<reference ref_id="1187378" ref_url="https://bugzilla.suse.com/1187378" source="BUGZILLA"/>
		<reference ref_id="1189373" ref_url="https://bugzilla.suse.com/1189373" source="BUGZILLA"/>
		<reference ref_id="1189376" ref_url="https://bugzilla.suse.com/1189376" source="BUGZILLA"/>
		<reference ref_id="1189378" ref_url="https://bugzilla.suse.com/1189378" source="BUGZILLA"/>
		<reference ref_id="1189380" ref_url="https://bugzilla.suse.com/1189380" source="BUGZILLA"/>
		<reference ref_id="1189882" ref_url="https://bugzilla.suse.com/1189882" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0089" ref_url="https://www.suse.com/security/cve/CVE-2021-0089/" source="CVE"/>
		<reference ref_id="CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255/" source="CVE"/>
		<reference ref_id="CVE-2021-28690" ref_url="https://www.suse.com/security/cve/CVE-2021-28690/" source="CVE"/>
		<reference ref_id="CVE-2021-28692" ref_url="https://www.suse.com/security/cve/CVE-2021-28692/" source="CVE"/>
		<reference ref_id="CVE-2021-28694" ref_url="https://www.suse.com/security/cve/CVE-2021-28694/" source="CVE"/>
		<reference ref_id="CVE-2021-28695" ref_url="https://www.suse.com/security/cve/CVE-2021-28695/" source="CVE"/>
		<reference ref_id="CVE-2021-28696" ref_url="https://www.suse.com/security/cve/CVE-2021-28696/" source="CVE"/>
		<reference ref_id="CVE-2021-28697" ref_url="https://www.suse.com/security/cve/CVE-2021-28697/" source="CVE"/>
		<reference ref_id="CVE-2021-28698" ref_url="https://www.suse.com/security/cve/CVE-2021-28698/" source="CVE"/>
		<reference ref_id="CVE-2021-28699" ref_url="https://www.suse.com/security/cve/CVE-2021-28699/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-3594: slirp: invalid pointer initialization may lead to information disclosure (udp)(bsc#1187378).
- CVE-2021-3595: slirp: invalid pointer initialization may lead to information disclosure (tftp)(bsc#1187376).
- CVE-2021-28698: long running loops in grant table handling (XSA-380)(bsc#1189378).
- CVE-2021-28699: inadequate grant-v2 status frames array bounds check (XSA-382)(bsc#1189380).
- CVE-2021-20255: Fixed stack overflow via infinite recursion in eepro100 (bsc#1182654)
- CVE-2021-28690: xen: x86: TSX Async Abort protections not restored after S3 (bsc#1186434)
- CVE-2021-28692: xen: inappropriate x86 IOMMU timeout detection / handling (bsc#1186429)
- CVE-2021-28694,CVE-2021-28695,CVE-2021-28696: IOMMU page mapping issues on x86 (XSA-378)(bsc#1189373).
- CVE-2021-0089: xen: Speculative Code Store Bypass (bsc#1186433)
- CVE-2021-28697: grant table v2 status pages may remain accessible after de-allocation (XSA-379)(bsc#1189376).
- CVE-2021-3592: slirp: invalid pointer initialization may lead to information disclosure (bootp)(bsc#1187369).

- Prevent superpage allocation in the LAPIC and ACPI_INFO range (bsc#1189882).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-06"/>
	<updated date="2021-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182654">SUSE bug 1182654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186429">SUSE bug 1186429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186433">SUSE bug 1186433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186434">SUSE bug 1186434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187369">SUSE bug 1187369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187376">SUSE bug 1187376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187378">SUSE bug 1187378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189376">SUSE bug 1189376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189378">SUSE bug 1189378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189380">SUSE bug 1189380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189882">SUSE bug 1189882</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0089/">CVE-2021-0089 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0089">CVE-2021-0089 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20255">CVE-2021-20255 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28690/">CVE-2021-28690 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28690">CVE-2021-28690 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-28692/">CVE-2021-28692 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28692">CVE-2021-28692 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28694/">CVE-2021-28694 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28694">CVE-2021-28694 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28695/">CVE-2021-28695 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28695">CVE-2021-28695 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28696/">CVE-2021-28696 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28696">CVE-2021-28696 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28697/">CVE-2021-28697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28697">CVE-2021-28697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28698/">CVE-2021-28698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28698">CVE-2021-28698 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28699/">CVE-2021-28699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28699">CVE-2021-28699 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3595">CVE-2021-3595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632286" comment="xen-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632287" comment="xen-doc-html-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632288" comment="xen-libs-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632289" comment="xen-libs-32bit-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632290" comment="xen-tools-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632291" comment="xen-tools-domU-4.9.4_20-3.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148503" version="1" class="patch">
	<metadata>
		<title>Recommended update for mozilla-nspr, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1029961" ref_url="https://bugzilla.suse.com/1029961" source="BUGZILLA"/>
		<reference ref_id="1174697" ref_url="https://bugzilla.suse.com/1174697" source="BUGZILLA"/>
		<reference ref_id="1176206" ref_url="https://bugzilla.suse.com/1176206" source="BUGZILLA"/>
		<reference ref_id="1176934" ref_url="https://bugzilla.suse.com/1176934" source="BUGZILLA"/>
		<reference ref_id="1179382" ref_url="https://bugzilla.suse.com/1179382" source="BUGZILLA"/>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12400" ref_url="https://www.suse.com/security/cve/CVE-2020-12400/" source="CVE"/>
		<reference ref_id="CVE-2020-12401" ref_url="https://www.suse.com/security/cve/CVE-2020-12401/" source="CVE"/>
		<reference ref_id="CVE-2020-12403" ref_url="https://www.suse.com/security/cve/CVE-2020-12403/" source="CVE"/>
		<reference ref_id="CVE-2020-25648" ref_url="https://www.suse.com/security/cve/CVE-2020-25648/" source="CVE"/>
		<reference ref_id="CVE-2020-6829" ref_url="https://www.suse.com/security/cve/CVE-2020-6829/" source="CVE"/>
		<reference ref_id="SUSE-RU-2021:3116-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020178.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr fixes the following issues:

mozilla-nspr was updated to version 4.32:

* implement new socket option PR_SockOpt_DontFrag
* support larger DNS records by increasing the default buffer
  size for DNS queries 
* Lock access to PRCallOnceType members in PR_CallOnce* for
  thread safety bmo#1686138
* PR_GetSystemInfo supports a new flag PR_SI_RELEASE_BUILD to get
  information about the operating system build version.


Mozilla NSS was updated to version 3.68:

* bmo#1713562 - Fix test leak.
* bmo#1717452 - NSS 3.68 should depend on NSPR 4.32.
* bmo#1693206 - Implement PKCS8 export of ECDSA keys.
* bmo#1712883 - DTLS 1.3 draft-43.
* bmo#1655493 - Support SHA2 HW acceleration using Intel SHA Extension.
* bmo#1713562 - Validate ECH public names.
* bmo#1717610 - Add function to get seconds from epoch from pkix::Time.

update to NSS 3.67

* bmo#1683710 - Add a means to disable ALPN.
* bmo#1715720 - Fix nssckbi version number in NSS 3.67 (was supposed to be incremented in 3.66).
* bmo#1714719 - Set NSS_USE_64 on riscv64 target when using GYP/Ninja.
* bmo#1566124 - Fix counter increase in ppc-gcm-wrap.c.
* bmo#1566124 - Fix AES_GCM mode on ppc64le for messages of length more than 255-byte.

update to NSS 3.66

* bmo#1710716 - Remove Expired Sonera Class2 CA from NSS.
* bmo#1710716 - Remove Expired Root Certificates from NSS - QuoVadis Root Certification Authority.
* bmo#1708307 - Remove Trustis FPS Root CA from NSS.
* bmo#1707097 - Add Certum Trusted Root CA to NSS.
* bmo#1707097 - Add Certum EC-384 CA to NSS.
* bmo#1703942 - Add ANF Secure Server Root CA to NSS.
* bmo#1697071 - Add GLOBALTRUST 2020 root cert to NSS.
* bmo#1712184 - NSS tools manpages need to be updated to reflect that sqlite is the default database.
* bmo#1712230 - Don't build ppc-gcm.s with clang integrated assembler.
* bmo#1712211 - Strict prototype error when trying to compile nss code that includes blapi.h.
* bmo#1710773 - NSS needs FIPS 180-3 FIPS indicators.
* bmo#1709291 - Add VerifyCodeSigningCertificateChain.

update to NSS 3.65

* bmo#1709654 - Update for NetBSD configuration.
* bmo#1709750 - Disable HPKE test when fuzzing.
* bmo#1566124 - Optimize AES-GCM for ppc64le.
* bmo#1699021 - Add AES-256-GCM to HPKE.
* bmo#1698419 - ECH -10 updates.
* bmo#1692930 - Update HPKE to final version.
* bmo#1707130 - NSS should use modern algorithms in PKCS#12 files by default.
* bmo#1703936 - New coverity/cpp scanner errors.
* bmo#1697303 - NSS needs to update it's csp clearing to FIPS 180-3 standards.
* bmo#1702663 - Need to support RSA PSS with Hashing PKCS #11 Mechanisms.
* bmo#1705119 - Deadlock when using GCM and non-thread safe tokens.

update to NSS 3.64

* bmo#1705286 - Properly detect mips64.
* bmo#1687164 - Introduce NSS_DISABLE_CRYPTO_VSX and
		disable_crypto_vsx.
* bmo#1698320 - replace __builtin_cpu_supports('vsx') with
		ppc_crypto_support() for clang.
* bmo#1613235 - Add POWER ChaCha20 stream cipher vector
		acceleration.

Fixed in 3.63

* bmo#1697380 - Make a clang-format run on top of helpful contributions.
* bmo#1683520 - ECCKiila P384, change syntax of nested structs
		initialization to prevent build isses with GCC 4.8.
* bmo#1683520 - [lib/freebl/ecl] P-384: allow zero scalars in dual
		scalar multiplication.
* bmo#1683520 - ECCKiila P521, change syntax of nested structs
		initialization to prevent build isses with GCC 4.8.
* bmo#1683520 - [lib/freebl/ecl] P-521: allow zero scalars in dual
		scalar multiplication.
* bmo#1696800 - HACL* update March 2021 - c95ab70fcb2bc21025d8845281bc4bc8987ca683.
* bmo#1694214 - tstclnt can't enable middlebox compat mode.
* bmo#1694392 - NSS does not work with PKCS #11 modules not supporting
		profiles.
* bmo#1685880 - Minor fix to prevent unused variable on early return.
* bmo#1685880 - Fix for the gcc compiler version 7 to support setenv
		with nss build.
* bmo#1693217 - Increase nssckbi.h version number for March 2021 batch
		of root CA changes, CA list version 2.48.
* bmo#1692094 - Set email distrust after to 21-03-01 for Camerfirma's
		'Chambers of Commerce' and 'Global Chambersign' roots.
* bmo#1618407 - Symantec root certs - Set CKA_NSS_EMAIL_DISTRUST_AFTER.
* bmo#1693173 - Add GlobalSign R45, E45, R46, and E46 root certs to NSS.
* bmo#1683738 - Add AC RAIZ FNMT-RCM SERVIDORES SEGUROS root cert to NSS.
* bmo#1686854 - Remove GeoTrust PCA-G2 and VeriSign Universal root certs
		from NSS.
* bmo#1687822 - Turn off Websites trust bit for the “Staat der
		Nederlanden Root CA - G3” root cert in NSS.
* bmo#1692094 - Turn off Websites Trust Bit for 'Chambers of Commerce
		Root - 2008' and 'Global Chambersign Root - 2008’.
* bmo#1694291 - Tracing fixes for ECH.

update to NSS 3.62

* bmo#1688374 - Fix parallel build NSS-3.61 with make
* bmo#1682044 - pkix_Build_GatherCerts() + pkix_CacheCert_Add()
		can corrupt 'cachedCertTable'
* bmo#1690583 - Fix CH padding extension size calculation
* bmo#1690421 - Adjust 3.62 ABI report formatting for new libabigail
* bmo#1690421 - Install packaged libabigail in docker-builds image
* bmo#1689228 - Minor ECH -09 fixes for interop testing, fuzzing
* bmo#1674819 - Fixup a51fae403328, enum type may be signed
* bmo#1681585 - Add ECH support to selfserv
* bmo#1681585 - Update ECH to Draft-09
* bmo#1678398 - Add Export/Import functions for HPKE context
* bmo#1678398 - Update HPKE to draft-07

update to NSS 3.61

* bmo#1682071 - Fix issue with IKE Quick mode deriving incorrect key
		values under certain conditions.
* bmo#1684300 - Fix default PBE iteration count when NSS is compiled
		with NSS_DISABLE_DBM.
* bmo#1651411 - Improve constant-timeness in RSA operations.
* bmo#1677207 - Upgrade Google Test version to latest release.
* bmo#1654332 - Add aarch64-make target to nss-try.

Update to NSS 3.60.1:

Notable changes in NSS 3.60:
* TLS 1.3 Encrypted Client Hello (draft-ietf-tls-esni-08) support
  has been added, replacing the previous ESNI (draft-ietf-tls-esni-01)
  implementation. See bmo#1654332 for more information.
* December 2020 batch of Root CA changes, builtins library updated
  to version 2.46. See bmo#1678189, bmo#1678166, and bmo#1670769
  for more information.

Update to NSS 3.59.1:

* bmo#1679290 - Fix potential deadlock with certain third-party
		PKCS11 modules

Update to NSS 3.59:

Notable changes:

* Exported two existing functions from libnss:
  CERT_AddCertToListHeadWithData and CERT_AddCertToListTailWithData

Bugfixes

* bmo#1607449 - Lock cert-&gt;nssCertificate to prevent a potential data race
* bmo#1672823 - Add Wycheproof test cases for HMAC, HKDF, and DSA
* bmo#1663661 - Guard against NULL token in nssSlot_IsTokenPresent
* bmo#1670835 - Support enabling and disabling signatures via Crypto Policy
* bmo#1672291 - Resolve libpkix OCSP failures on SHA1 self-signed
		root certs when SHA1 signatures are disabled.
* bmo#1644209 - Fix broken SelectedCipherSuiteReplacer filter to
		solve some test intermittents
* bmo#1672703 - Tolerate the first CCS in TLS 1.3 to fix a regression in
		our CVE-2020-25648 fix that broke purple-discord
		(boo#1179382)
* bmo#1666891 - Support key wrap/unwrap with RSA-OAEP
* bmo#1667989 - Fix gyp linking on Solaris
* bmo#1668123 - Export CERT_AddCertToListHeadWithData and
		CERT_AddCertToListTailWithData from libnss
* bmo#1634584 - Set CKA_NSS_SERVER_DISTRUST_AFTER for Trustis FPS Root CA
* bmo#1663091 - Remove unnecessary assertions in the streaming
		ASN.1 decoder that affected decoding certain PKCS8
		private keys when using NSS debug builds
*  bmo#670839 - Use ARM crypto extension for AES, SHA1 and SHA2 on MacOS.

update to NSS 3.58

Bugs fixed:

* bmo#1641480 (CVE-2020-25648)
  Tighten CCS handling for middlebox compatibility mode.
* bmo#1631890 - Add support for Hybrid Public Key Encryption
  (draft-irtf-cfrg-hpke) support for TLS Encrypted Client Hello
  (draft-ietf-tls-esni).
* bmo#1657255 - Add CI tests that disable SHA1/SHA2 ARM crypto
  extensions.
* bmo#1668328 - Handle spaces in the Python path name when using
  gyp on Windows.
* bmo#1667153 - Add PK11_ImportDataKey for data object import.
* bmo#1665715 - Pass the embedded SCT list extension (if present)
  to TrustDomain::CheckRevocation instead of the notBefore value.

update to NSS 3.57

* The following CA certificates were Added:
  bmo#1663049 - CN=Trustwave Global Certification Authority
      SHA-256 Fingerprint: 97552015F5DDFC3C8788C006944555408894450084F100867086BC1A2BB58DC8
  bmo#1663049 - CN=Trustwave Global ECC P256 Certification Authority
      SHA-256 Fingerprint: 945BBC825EA554F489D1FD51A73DDF2EA624AC7019A05205225C22A78CCFA8B4
  bmo#1663049 - CN=Trustwave Global ECC P384 Certification Authority
      SHA-256 Fingerprint: 55903859C8C0C3EBB8759ECE4E2557225FF5758BBD38EBD48276601E1BD58097
* The following CA certificates were Removed:
  bmo#1651211 - CN=EE Certification Centre Root CA
      SHA-256 Fingerprint: 3E84BA4342908516E77573C0992F0979CA084E4685681FF195CCBA8A229B8A76
  bmo#1656077 - O=Government Root Certification Authority; C=TW
      SHA-256 Fingerprint: 7600295EEFE85B9E1FD624DB76062AAAAE59818A54D2774CD4C0B2C01131E1B3
* Trust settings for the following CA certificates were Modified:
  bmo#1653092 - CN=OISTE WISeKey Global Root GA CA
      Websites (server authentication) trust bit removed.
* https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.57_release_notes

update to NSS 3.56

Notable changes

* bmo#1650702 - Support SHA-1 HW acceleration on ARMv8
* bmo#1656981 - Use MPI comba and mulq optimizations on x86-64 MacOS.
* bmo#1654142 - Add CPU feature detection for Intel SHA extension.
* bmo#1648822 - Add stricter validation of DH keys in FIPS mode.
* bmo#1656986 - Properly detect arm64 during GYP build architecture
		detection.
* bmo#1652729 - Add build flag to disable RC2 and relocate to
		lib/freebl/deprecated.
* bmo#1656429 - Correct RTT estimate used in 0-RTT anti-replay.
* bmo#1588941 - Send empty certificate message when scheme selection
		fails.
* bmo#1652032 - Fix failure to build in Windows arm64 makefile
		cross-compilation.
* bmo#1625791 - Fix deadlock issue in nssSlot_IsTokenPresent.
* bmo#1653975 - Fix 3.53 regression by setting 'all' as the default
		makefile target.
* bmo#1659792 - Fix broken libpkix tests with unexpired PayPal cert.
* bmo#1659814 - Fix interop.sh failures with newer tls-interop
		commit and dependencies.
* bmo#1656519 - NSPR dependency updated to 4.28

update to NSS 3.55

Notable changes
* P384 and P521 elliptic curve implementations are replaced with
  verifiable implementations from Fiat-Crypto [0] and ECCKiila [1].
* PK11_FindCertInSlot is added. With this function, a given slot
  can be queried with a DER-Encoded certificate, providing performance
  and usability improvements over other mechanisms. (bmo#1649633)
* DTLS 1.3 implementation is updated to draft-38. (bmo#1647752)

Relevant Bugfixes

* bmo#1631583 (CVE-2020-6829, CVE-2020-12400) - Replace P384 and
  P521 with new, verifiable implementations from Fiat-Crypto and ECCKiila.
* bmo#1649487 - Move overzealous assertion in VFY_EndWithSignature.
* bmo#1631573 (CVE-2020-12401) - Remove unnecessary scalar padding.
* bmo#1636771 (CVE-2020-12403) - Explicitly disable multi-part
  ChaCha20 (which was not functioning correctly) and more strictly
  enforce tag length.
* bmo#1649648 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1649316 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1649322 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1653202 - Fix initialization bug in blapitest when compiled
  with NSS_DISABLE_DEPRECATED_SEED.
* bmo#1646594 - Fix AVX2 detection in makefile builds.
* bmo#1649633 - Add PK11_FindCertInSlot to search a given slot
  for a DER-encoded certificate.
* bmo#1651520 - Fix slotLock race in NSC_GetTokenInfo.
* bmo#1647752 - Update DTLS 1.3 implementation to draft-38.
* bmo#1649190 - Run cipher, sdr, and ocsp tests under standard test cycle in CI.
* bmo#1649226 - Add Wycheproof ECDSA tests.
* bmo#1637222 - Consistently enforce IV requirements for DES and 3DES.
* bmo#1067214 - Enforce minimum PKCS#1 v1.5 padding length in
  RSA_CheckSignRecover.
* bmo#1646324 - Advertise PKCS#1 schemes for certificates in the
  signature_algorithms extension.

update to NSS 3.54

Notable changes

* Support for TLS 1.3 external pre-shared keys (bmo#1603042).
* Use ARM Cryptography Extension for SHA256, when available
  (bmo#1528113)
* The following CA certificates were Added:
  bmo#1645186 - certSIGN Root CA G2.
  bmo#1645174 - e-Szigno Root CA 2017.
  bmo#1641716 - Microsoft ECC Root Certificate Authority 2017.
  bmo#1641716 - Microsoft RSA Root Certificate Authority 2017.
* The following CA certificates were Removed:
  bmo#1645199 - AddTrust Class 1 CA Root.
  bmo#1645199 - AddTrust External CA Root.
  bmo#1641718 - LuxTrust Global Root 2.
  bmo#1639987 - Staat der Nederlanden Root CA - G2.
  bmo#1618402 - Symantec Class 2 Public Primary Certification Authority - G4.
  bmo#1618402 - Symantec Class 1 Public Primary Certification Authority - G4.
  bmo#1618402 - VeriSign Class 3 Public Primary Certification Authority - G3.

* A number of certificates had their Email trust bit disabled.
  See bmo#1618402 for a complete list.

Bugs fixed

* bmo#1528113 - Use ARM Cryptography Extension for SHA256.
* bmo#1603042 - Add TLS 1.3 external PSK support.
* bmo#1642802 - Add uint128 support for HACL* curve25519 on Windows.
* bmo#1645186 - Add 'certSIGN Root CA G2' root certificate.
* bmo#1645174 - Add Microsec's 'e-Szigno Root CA 2017' root certificate.
* bmo#1641716 - Add Microsoft's non-EV root certificates.
* bmo1621151 - Disable email trust bit for 'O=Government
	       Root Certification Authority; C=TW' root.
* bmo#1645199 - Remove AddTrust root certificates.
* bmo#1641718 - Remove 'LuxTrust Global Root 2' root certificate.
* bmo#1639987 - Remove 'Staat der Nederlanden Root CA - G2' root
		certificate.
* bmo#1618402 - Remove Symantec root certificates and disable email trust
		bit.
* bmo#1640516 - NSS 3.54 should depend on NSPR 4.26.
* bmo#1642146 - Fix undefined reference to `PORT_ZAlloc_stub' in seed.c.
* bmo#1642153 - Fix infinite recursion building NSS.
* bmo#1642638 - Fix fuzzing assertion crash.
* bmo#1642871 - Enable SSL_SendSessionTicket after resumption.
* bmo#1643123 - Support SSL_ExportEarlyKeyingMaterial with External PSKs.
* bmo#1643557 - Fix numerous compile warnings in NSS.
* bmo#1644774 - SSL gtests to use ClearServerCache when resetting
		self-encrypt keys.
* bmo#1645479 - Don't use SECITEM_MakeItem in secutil.c.
* bmo#1646520 - Stricter enforcement of ASN.1 INTEGER encoding.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029961">SUSE bug 1029961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174697">SUSE bug 1174697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176206">SUSE bug 1176206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176934">SUSE bug 1176934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179382">SUSE bug 1179382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12400/">CVE-2020-12400 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12400">CVE-2020-12400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12401/">CVE-2020-12401 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12401">CVE-2020-12401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12403/">CVE-2020-12403 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12403">CVE-2020-12403 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25648/">CVE-2020-25648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25648">CVE-2020-25648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6829/">CVE-2020-6829 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6829">CVE-2020-6829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633044" comment="libfreebl3-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633045" comment="libfreebl3-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633046" comment="libfreebl3-hmac-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633047" comment="libfreebl3-hmac-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633048" comment="libsoftokn3-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633049" comment="libsoftokn3-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633050" comment="libsoftokn3-hmac-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633051" comment="libsoftokn3-hmac-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633052" comment="mozilla-nspr-4.32-19.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633053" comment="mozilla-nspr-32bit-4.32-19.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633102" comment="mozilla-nspr-devel-4.32-19.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633054" comment="mozilla-nss-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633055" comment="mozilla-nss-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633056" comment="mozilla-nss-certs-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633057" comment="mozilla-nss-certs-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633103" comment="mozilla-nss-devel-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633058" comment="mozilla-nss-sysinit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633059" comment="mozilla-nss-sysinit-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633060" comment="mozilla-nss-tools-3.68-58.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148504" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1136882" ref_url="https://bugzilla.suse.com/1136882" source="BUGZILLA"/>
		<reference ref_id="1159130" ref_url="https://bugzilla.suse.com/1159130" source="BUGZILLA"/>
		<reference ref_id="1159293" ref_url="https://bugzilla.suse.com/1159293" source="BUGZILLA"/>
		<reference ref_id="1161698" ref_url="https://bugzilla.suse.com/1161698" source="BUGZILLA"/>
		<reference ref_id="1186329" ref_url="https://bugzilla.suse.com/1186329" source="BUGZILLA"/>
		<reference ref_id="1189325" ref_url="https://bugzilla.suse.com/1189325" source="BUGZILLA"/>
		<reference ref_id="1189343" ref_url="https://bugzilla.suse.com/1189343" source="BUGZILLA"/>
		<reference ref_id="1189345" ref_url="https://bugzilla.suse.com/1189345" source="BUGZILLA"/>
		<reference ref_id="1189346" ref_url="https://bugzilla.suse.com/1189346" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19555" ref_url="https://www.suse.com/security/cve/CVE-2019-19555/" source="CVE"/>
		<reference ref_id="CVE-2019-19746" ref_url="https://www.suse.com/security/cve/CVE-2019-19746/" source="CVE"/>
		<reference ref_id="CVE-2019-19797" ref_url="https://www.suse.com/security/cve/CVE-2019-19797/" source="CVE"/>
		<reference ref_id="CVE-2020-21680" ref_url="https://www.suse.com/security/cve/CVE-2020-21680/" source="CVE"/>
		<reference ref_id="CVE-2020-21681" ref_url="https://www.suse.com/security/cve/CVE-2020-21681/" source="CVE"/>
		<reference ref_id="CVE-2020-21682" ref_url="https://www.suse.com/security/cve/CVE-2020-21682/" source="CVE"/>
		<reference ref_id="CVE-2020-21683" ref_url="https://www.suse.com/security/cve/CVE-2020-21683/" source="CVE"/>
		<reference ref_id="CVE-2021-3561" ref_url="https://www.suse.com/security/cve/CVE-2021-3561/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Update to version 3.2.8, including fixes for

- CVE-2021-3561: overflow in fig2dev/read.c in function read_colordef() (bsc#1186329).
- CVE-2020-21683: Fixed buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c (bsc#1189325).
- CVE-2020-21682: Fixed buffer overflow in the set_fill component in genge.c (bsc#1189346).
- CVE-2020-21681: Fixed buffer overflow in the set_color component in genge.c (bsc#1189345).
- CVE-2020-21680: Fixed stack-based buffer overflow in the put_arrow() component in genpict2e.c (bsc#1189343).
- CVE-2019-19797: out-of-bounds write in read_colordef in read.c (bsc#1159293).
- CVE-2019-19555: stack-based buffer overflow because of an incorrect sscanf (bsc#1161698).
- CVE-2019-19746: segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type (bsc#1159130).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1136882">SUSE bug 1136882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159130">SUSE bug 1159130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159293">SUSE bug 1159293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161698">SUSE bug 1161698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186329">SUSE bug 1186329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189325">SUSE bug 1189325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189343">SUSE bug 1189343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189345">SUSE bug 1189345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189346">SUSE bug 1189346</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19555/">CVE-2019-19555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19555">CVE-2019-19555 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19746/">CVE-2019-19746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19746">CVE-2019-19746 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19797/">CVE-2019-19797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19797">CVE-2019-19797 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21680/">CVE-2020-21680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21680">CVE-2020-21680 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21681/">CVE-2020-21681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21681">CVE-2020-21681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21682/">CVE-2020-21682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21682">CVE-2020-21682 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21683/">CVE-2020-21683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21683">CVE-2020-21683 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3561/">CVE-2021-3561 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3561">CVE-2021-3561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631268" comment="transfig-3.2.8a-2.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148505" version="1" class="patch">
	<metadata>
		<title>Security update for gtk-vnc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1024266" ref_url="https://bugzilla.suse.com/1024266" source="BUGZILLA"/>
		<reference ref_id="1024268" ref_url="https://bugzilla.suse.com/1024268" source="BUGZILLA"/>
		<reference ref_id="1046782" ref_url="https://bugzilla.suse.com/1046782" source="BUGZILLA"/>
		<reference ref_id="1188292" ref_url="https://bugzilla.suse.com/1188292" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5884" ref_url="https://www.suse.com/security/cve/CVE-2017-5884/" source="CVE"/>
		<reference ref_id="CVE-2017-5885" ref_url="https://www.suse.com/security/cve/CVE-2017-5885/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009456.html" source="SUSE-SU"/>
		<description>
This update for gtk-vnc fixes the following issues:

- CVE-2017-5885: Correctly validate color map range indexes (bsc#1024268).
- CVE-2017-5884: Fix bounds checking for RRE, hextile &amp; copyrect encodings (bsc#1024266).
- Fix crash when opening connection from a GSocketAddress (bsc#1046782).
- Fix possible crash on connection failure (bsc#1188292).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024266">SUSE bug 1024266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024268">SUSE bug 1024268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046782">SUSE bug 1046782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188292">SUSE bug 1188292</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5884/">CVE-2017-5884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5884">CVE-2017-5884 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5885/">CVE-2017-5885 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5885">CVE-2017-5885 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628130" comment="libgtk-vnc-1_0-0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628131" comment="libgtk-vnc-2_0-0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628132" comment="libgvnc-1_0-0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628133" comment="python-gtk-vnc-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628134" comment="typelib-1_0-GVnc-1_0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628135" comment="typelib-1_0-GtkVnc-2_0-0.6.0-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148506" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009467.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712. 
  Read buffer overruns processing ASN.1 strings (bsc#1189521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-20"/>
	<updated date="2021-09-20"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632419" comment="libopenssl-devel-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632420" comment="libopenssl1_0_0-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632401" comment="libopenssl1_0_0-32bit-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632421" comment="libopenssl1_0_0-hmac-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632403" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632422" comment="openssl-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632405" comment="openssl-doc-1.0.2j-60.72.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148507" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1190381" ref_url="https://bugzilla.suse.com/1190381" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3781" ref_url="https://www.suse.com/security/cve/CVE-2021-3781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009476.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2021-3781: Fixed a trivial -dSAFER bypass command injection (bsc#1190381)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-21"/>
	<updated date="2021-09-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1190381">SUSE bug 1190381</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3781/">CVE-2021-3781 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3781">CVE-2021-3781 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632780" comment="ghostscript-9.52-23.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632781" comment="ghostscript-devel-9.52-23.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632782" comment="ghostscript-x11-9.52-23.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632783" comment="libspectre-devel-0.2.7-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632784" comment="libspectre1-0.2.7-12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148508" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.1.0 ESR.

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-22"/>
	<updated date="2021-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29981">CVE-2021-29981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29982">CVE-2021-29982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29983">CVE-2021-29983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29987">CVE-2021-29987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29990">CVE-2021-29990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29991">CVE-2021-29991 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38492">CVE-2021-38492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38495">CVE-2021-38495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633610" comment="MozillaFirefox-91.1.0-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633611" comment="MozillaFirefox-branding-SLE-91-35.6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633612" comment="MozillaFirefox-devel-91.1.0-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633613" comment="MozillaFirefox-translations-common-91.1.0-112.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148509" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 20 [bsc#1180063,bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14781 CVE-2020-14779
  CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class libraries:
    - SOCKETADAPTOR$SOCKETINPUTSTREAM.READ is blocking for more time
      that the set timeout
    - Z/OS specific C function send_file is changing the file pointer
      position
  * Java Virtual Machine:
    - Crash on iterate java stack
    - Java process hang on SIGTERM
  * JIT Compiler:
    - JMS performance regression from JDK8 SR5 FP40 TO FP41

  * Class Libraries:
    - z15 high utilization following Z/VM and Linux migration from
      z14 To z15
  * Java Virtual Machine:
    - Assertion failed when trying to write a class file
    - Assertion failure at modronapi.cpp
    - Improve the performance of defining and finding classes
  * JIT Compiler:
    - An assert in ppcbinaryencoding.cpp may trigger when running
      with traps disabled on power
    - AOT field offset off by n bytes
    - Segmentation fault in jit module on ibm z platform		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531863" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531865" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148510" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1189373" ref_url="https://bugzilla.suse.com/1189373" source="BUGZILLA"/>
		<reference ref_id="1189378" ref_url="https://bugzilla.suse.com/1189378" source="BUGZILLA"/>
		<reference ref_id="1189632" ref_url="https://bugzilla.suse.com/1189632" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28701" ref_url="https://www.suse.com/security/cve/CVE-2021-28701/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009501.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-28701: Fixed race condition in XENMAPSPACE_grant_table handling (XSA-384) (bsc#1189632).

- Integrate bugfixes (bsc#1189373, bsc#1189378).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189378">SUSE bug 1189378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189632">SUSE bug 1189632</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28701/">CVE-2021-28701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28701">CVE-2021-28701 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633441" comment="xen-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633442" comment="xen-doc-html-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633443" comment="xen-libs-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633444" comment="xen-libs-32bit-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633445" comment="xen-tools-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633446" comment="xen-tools-domU-4.9.4_22-3.94.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148511" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1157818" ref_url="https://bugzilla.suse.com/1157818" source="BUGZILLA"/>
		<reference ref_id="1158812" ref_url="https://bugzilla.suse.com/1158812" source="BUGZILLA"/>
		<reference ref_id="1158958" ref_url="https://bugzilla.suse.com/1158958" source="BUGZILLA"/>
		<reference ref_id="1158959" ref_url="https://bugzilla.suse.com/1158959" source="BUGZILLA"/>
		<reference ref_id="1158960" ref_url="https://bugzilla.suse.com/1158960" source="BUGZILLA"/>
		<reference ref_id="1159491" ref_url="https://bugzilla.suse.com/1159491" source="BUGZILLA"/>
		<reference ref_id="1159715" ref_url="https://bugzilla.suse.com/1159715" source="BUGZILLA"/>
		<reference ref_id="1159847" ref_url="https://bugzilla.suse.com/1159847" source="BUGZILLA"/>
		<reference ref_id="1159850" ref_url="https://bugzilla.suse.com/1159850" source="BUGZILLA"/>
		<reference ref_id="1160309" ref_url="https://bugzilla.suse.com/1160309" source="BUGZILLA"/>
		<reference ref_id="1160438" ref_url="https://bugzilla.suse.com/1160438" source="BUGZILLA"/>
		<reference ref_id="1160439" ref_url="https://bugzilla.suse.com/1160439" source="BUGZILLA"/>
		<reference ref_id="1164719" ref_url="https://bugzilla.suse.com/1164719" source="BUGZILLA"/>
		<reference ref_id="1172091" ref_url="https://bugzilla.suse.com/1172091" source="BUGZILLA"/>
		<reference ref_id="1172115" ref_url="https://bugzilla.suse.com/1172115" source="BUGZILLA"/>
		<reference ref_id="1172234" ref_url="https://bugzilla.suse.com/1172234" source="BUGZILLA"/>
		<reference ref_id="1172236" ref_url="https://bugzilla.suse.com/1172236" source="BUGZILLA"/>
		<reference ref_id="1172240" ref_url="https://bugzilla.suse.com/1172240" source="BUGZILLA"/>
		<reference ref_id="1173641" ref_url="https://bugzilla.suse.com/1173641" source="BUGZILLA"/>
		<reference ref_id="928700" ref_url="https://bugzilla.suse.com/928700" source="BUGZILLA"/>
		<reference ref_id="928701" ref_url="https://bugzilla.suse.com/928701" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3414" ref_url="https://www.suse.com/security/cve/CVE-2015-3414/" source="CVE"/>
		<reference ref_id="CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415/" source="CVE"/>
		<reference ref_id="CVE-2016-6153" ref_url="https://www.suse.com/security/cve/CVE-2016-6153/" source="CVE"/>
		<reference ref_id="CVE-2017-10989" ref_url="https://www.suse.com/security/cve/CVE-2017-10989/" source="CVE"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<reference ref_id="CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740/" source="CVE"/>
		<reference ref_id="CVE-2019-16168" ref_url="https://www.suse.com/security/cve/CVE-2019-16168/" source="CVE"/>
		<reference ref_id="CVE-2019-19244" ref_url="https://www.suse.com/security/cve/CVE-2019-19244/" source="CVE"/>
		<reference ref_id="CVE-2019-19317" ref_url="https://www.suse.com/security/cve/CVE-2019-19317/" source="CVE"/>
		<reference ref_id="CVE-2019-19603" ref_url="https://www.suse.com/security/cve/CVE-2019-19603/" source="CVE"/>
		<reference ref_id="CVE-2019-19645" ref_url="https://www.suse.com/security/cve/CVE-2019-19645/" source="CVE"/>
		<reference ref_id="CVE-2019-19646" ref_url="https://www.suse.com/security/cve/CVE-2019-19646/" source="CVE"/>
		<reference ref_id="CVE-2019-19880" ref_url="https://www.suse.com/security/cve/CVE-2019-19880/" source="CVE"/>
		<reference ref_id="CVE-2019-19923" ref_url="https://www.suse.com/security/cve/CVE-2019-19923/" source="CVE"/>
		<reference ref_id="CVE-2019-19924" ref_url="https://www.suse.com/security/cve/CVE-2019-19924/" source="CVE"/>
		<reference ref_id="CVE-2019-19925" ref_url="https://www.suse.com/security/cve/CVE-2019-19925/" source="CVE"/>
		<reference ref_id="CVE-2019-19926" ref_url="https://www.suse.com/security/cve/CVE-2019-19926/" source="CVE"/>
		<reference ref_id="CVE-2019-19959" ref_url="https://www.suse.com/security/cve/CVE-2019-19959/" source="CVE"/>
		<reference ref_id="CVE-2019-20218" ref_url="https://www.suse.com/security/cve/CVE-2019-20218/" source="CVE"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<reference ref_id="CVE-2020-13434" ref_url="https://www.suse.com/security/cve/CVE-2020-13434/" source="CVE"/>
		<reference ref_id="CVE-2020-13435" ref_url="https://www.suse.com/security/cve/CVE-2020-13435/" source="CVE"/>
		<reference ref_id="CVE-2020-13630" ref_url="https://www.suse.com/security/cve/CVE-2020-13630/" source="CVE"/>
		<reference ref_id="CVE-2020-13631" ref_url="https://www.suse.com/security/cve/CVE-2020-13631/" source="CVE"/>
		<reference ref_id="CVE-2020-13632" ref_url="https://www.suse.com/security/cve/CVE-2020-13632/" source="CVE"/>
		<reference ref_id="CVE-2020-15358" ref_url="https://www.suse.com/security/cve/CVE-2020-15358/" source="CVE"/>
		<reference ref_id="CVE-2020-9327" ref_url="https://www.suse.com/security/cve/CVE-2020-9327/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

sqlite3 is sync version 3.36.0 from Factory (jsc#SLE-16032).

The following CVEs have been fixed in upstream releases up to
this point, but were not mentioned in the change log so far:

* bsc#1173641, CVE-2020-15358: heap-based buffer overflow in
  multiSelectOrderBy due to mishandling of query-flattener
  optimization
* bsc#1164719, CVE-2020-9327: NULL pointer dereference and
  segmentation fault because of generated column optimizations in
  isAuxiliaryVtabOperator
* bsc#1160439, CVE-2019-20218: selectExpander in select.c proceeds
  with WITH stack unwinding even after a parsing error
* bsc#1160438, CVE-2019-19959: memory-management error via
  ext/misc/zipfile.c involving embedded '\0' input
* bsc#1160309, CVE-2019-19923: improper handling  of  certain uses
  of SELECT DISTINCT in flattenSubquery may lead to null pointer
  dereference
* bsc#1159850, CVE-2019-19924: improper error handling in
  sqlite3WindowRewrite()
* bsc#1159847, CVE-2019-19925: improper handling of NULL pathname
  during an update of a ZIP archive
* bsc#1159715, CVE-2019-19926: improper handling  of certain
  errors during parsing  multiSelect in select.c
* bsc#1159491, CVE-2019-19880: exprListAppendList in window.c
  allows attackers to trigger an invalid pointer dereference
* bsc#1158960, CVE-2019-19603: during handling of CREATE TABLE
  and CREATE VIEW statements, does not consider confusion with
  a shadow table name
* bsc#1158959, CVE-2019-19646: pragma.c mishandles NOT NULL in an
  integrity_check PRAGMA command in certain cases of generated
  columns
* bsc#1158958, CVE-2019-19645: alter.c allows attackers to trigger
  infinite recursion via certain types of self-referential views
  in conjunction with ALTER TABLE statements
* bsc#1158812, CVE-2019-19317: lookupName in resolve.c omits bits
  from the colUsed bitmask in the case of a generated column,
  which allows attackers to cause a denial of service
* bsc#1157818, CVE-2019-19244: sqlite3,sqlite2,sqlite: The
  function sqlite3Select in select.c allows a crash if a
  sub-select uses both DISTINCT and window functions, and also
  has certain ORDER BY usage
* bsc#928701, CVE-2015-3415: sqlite3VdbeExec comparison operator
  vulnerability
* bsc#928700, CVE-2015-3414: sqlite3,sqlite2: dequoting of
  collation-sequence names
* CVE-2020-13434 bsc#1172115: integer overflow in
  sqlite3_str_vappendf
* CVE-2020-13630 bsc#1172234: use-after-free in fts3EvalNextRow
* CVE-2020-13631 bsc#1172236: virtual table allowed to be renamed
  to one of its shadow tables
* CVE-2020-13632 bsc#1172240: NULL pointer dereference via
  crafted matchinfo() query
* CVE-2020-13435: Malicious SQL statements could have crashed the
  process that is running SQLite (bsc#1172091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157818">SUSE bug 1157818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158812">SUSE bug 1158812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158958">SUSE bug 1158958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158959">SUSE bug 1158959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158960">SUSE bug 1158960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159491">SUSE bug 1159491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159715">SUSE bug 1159715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159847">SUSE bug 1159847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159850">SUSE bug 1159850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160309">SUSE bug 1160309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160438">SUSE bug 1160438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160439">SUSE bug 1160439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164719">SUSE bug 1164719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172091">SUSE bug 1172091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172115">SUSE bug 1172115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172234">SUSE bug 1172234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172236">SUSE bug 1172236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172240">SUSE bug 1172240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173641">SUSE bug 1173641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3414/">CVE-2015-3414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3414">CVE-2015-3414 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3415">CVE-2015-3415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6153/">CVE-2016-6153 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6153">CVE-2016-6153 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10989/">CVE-2017-10989 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10989">CVE-2017-10989 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2518">CVE-2017-2518 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20346">CVE-2018-20346 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8740">CVE-2018-8740 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16168/">CVE-2019-16168 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16168">CVE-2019-16168 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19244/">CVE-2019-19244 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19244">CVE-2019-19244 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19317/">CVE-2019-19317 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19317">CVE-2019-19317 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19603/">CVE-2019-19603 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19603">CVE-2019-19603 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19645/">CVE-2019-19645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19645">CVE-2019-19645 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19646/">CVE-2019-19646 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19646">CVE-2019-19646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19880/">CVE-2019-19880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19880">CVE-2019-19880 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19923/">CVE-2019-19923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19923">CVE-2019-19923 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19924/">CVE-2019-19924 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19924">CVE-2019-19924 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19925/">CVE-2019-19925 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19925">CVE-2019-19925 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19926/">CVE-2019-19926 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19926">CVE-2019-19926 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19959/">CVE-2019-19959 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19959">CVE-2019-19959 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20218/">CVE-2019-20218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20218">CVE-2019-20218 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8457">CVE-2019-8457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13434/">CVE-2020-13434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13434">CVE-2020-13434 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13435/">CVE-2020-13435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13435">CVE-2020-13435 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13630/">CVE-2020-13630 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13630">CVE-2020-13630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13631/">CVE-2020-13631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13631">CVE-2020-13631 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13632/">CVE-2020-13632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13632">CVE-2020-13632 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15358/">CVE-2020-15358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15358">CVE-2020-15358 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-9327/">CVE-2020-9327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9327">CVE-2020-9327 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148512" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1190229" ref_url="https://bugzilla.suse.com/1190229" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23437" ref_url="https://www.suse.com/security/cve/CVE-2021-23437/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009513.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2021-23437: Fixed regular expression denial of service (ReDoS) via the getrgb function (bsc#1190229).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-27"/>
	<updated date="2021-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190229">SUSE bug 1190229</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23437/">CVE-2021-23437 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23437">CVE-2021-23437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633651" comment="python-Pillow-4.2.1-3.20.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148513" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1177120" ref_url="https://bugzilla.suse.com/1177120" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009517.html" source="SUSE-SU"/>
		<description>

This update for python-urllib3 fixes the following security issue:

- CVE-2020-26137: A CRLF injection via HTTP request method was fixed (bsc#1177120)

Note that this was fixed in a previous version update to 1.25.9, this update just complements the tracking.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-29"/>
	<updated date="2021-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26137">CVE-2020-26137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631062" comment="python3-urllib3-1.25.10-3.31.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148514" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1117993" ref_url="https://bugzilla.suse.com/1117993" source="BUGZILLA"/>
		<reference ref_id="1186489" ref_url="https://bugzilla.suse.com/1186489" source="BUGZILLA"/>
		<reference ref_id="1187911" ref_url="https://bugzilla.suse.com/1187911" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574/" source="CVE"/>
		<reference ref_id="CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009546.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2021-35942: wordexp: handle overflow in positional parameter number (bsc#1187911)
- CVE-2021-33574: Use __pthread_attr_copy in mq_notify (bsc#1186489)

Also the following bug was fixed:

- Avoid concurrency problem in ldconfig (bsc#1117993)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117993">SUSE bug 1117993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186489">SUSE bug 1186489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187911">SUSE bug 1187911</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">CVE-2021-33574 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">CVE-2021-35942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651126" comment="glibc-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651115" comment="glibc-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651127" comment="glibc-devel-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651117" comment="glibc-devel-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651118" comment="glibc-html-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651119" comment="glibc-i18ndata-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651120" comment="glibc-info-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651128" comment="glibc-locale-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651122" comment="glibc-locale-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651129" comment="glibc-profile-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651124" comment="glibc-profile-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651130" comment="nscd-2.22-116.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148515" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1188697" ref_url="https://bugzilla.suse.com/1188697" source="BUGZILLA"/>
		<reference ref_id="1190701" ref_url="https://bugzilla.suse.com/1190701" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21806" ref_url="https://www.suse.com/security/cve/CVE-2021-21806/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009534.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.4
- CVE-2021-30858: Fixed a security bug that could allow maliciously crafted web content to achieve arbitrary code execution. (bsc#1190701)
- CVE-2021-21806: Fixed an exploitable use-after-free vulnerability via specially crafted HTML web page. (bsc#1188697)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190701">SUSE bug 1190701</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21806/">CVE-2021-21806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21806">CVE-2021-21806 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30858">CVE-2021-30858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634387" comment="libjavascriptcoregtk-4_0-18-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634388" comment="libwebkit2gtk-4_0-37-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634365" comment="libwebkit2gtk3-lang-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634389" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634390" comment="typelib-1_0-WebKit2-4_0-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634391" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634392" comment="webkit2gtk-4_0-injected-bundles-2.32.4-2.71.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148516" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1190666" ref_url="https://bugzilla.suse.com/1190666" source="BUGZILLA"/>
		<reference ref_id="1190669" ref_url="https://bugzilla.suse.com/1190669" source="BUGZILLA"/>
		<reference ref_id="1190703" ref_url="https://bugzilla.suse.com/1190703" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34798" ref_url="https://www.suse.com/security/cve/CVE-2021-34798/" source="CVE"/>
		<reference ref_id="CVE-2021-39275" ref_url="https://www.suse.com/security/cve/CVE-2021-39275/" source="CVE"/>
		<reference ref_id="CVE-2021-40438" ref_url="https://www.suse.com/security/cve/CVE-2021-40438/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009537.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-40438: Fixed a SRF via a crafted request uri-path. (bsc#1190703)
- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)
- CVE-2021-34798: Fixed a NULL pointer dereference via malformed requests. (bsc#1190669)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190666">SUSE bug 1190666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190669">SUSE bug 1190669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190703">SUSE bug 1190703</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34798/">CVE-2021-34798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34798">CVE-2021-34798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39275/">CVE-2021-39275 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39275">CVE-2021-39275 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40438/">CVE-2021-40438 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40438">CVE-2021-40438 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633904" comment="apache2-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633898" comment="apache2-doc-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633905" comment="apache2-example-pages-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633906" comment="apache2-prefork-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633907" comment="apache2-utils-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633908" comment="apache2-worker-2.4.23-29.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148517" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008282.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-08"/>
	<updated date="2021-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531867" comment="libpython3_4m1_0-3.4.10-25.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531868" comment="python3-3.4.10-25.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531869" comment="python3-base-3.4.10-25.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531870" comment="python3-curses-3.4.10-25.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531871" comment="python3-devel-3.4.10-25.63.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148518" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1190710" ref_url="https://bugzilla.suse.com/1190710" source="BUGZILLA"/>
		<reference ref_id="1191332" ref_url="https://bugzilla.suse.com/1191332" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.2.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-45 (bsc#1191332)

* CVE-2021-38496: Use-after-free in MessageTask
* CVE-2021-38497: Validation message could have been overlaid on another origin
* CVE-2021-38498: Use-after-free of nsLanguageAtomService object
* CVE-2021-32810: Fixed Data race in crossbeam-deque
* CVE-2021-38500: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2
* CVE-2021-38501: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2

- Fixed crash in FIPS mode (bsc#1190710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-15"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190710">SUSE bug 1190710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32810">CVE-2021-32810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38496">CVE-2021-38496 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38497">CVE-2021-38497 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38498">CVE-2021-38498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38500">CVE-2021-38500 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38501">CVE-2021-38501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651862" comment="MozillaFirefox-91.2.0-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651863" comment="MozillaFirefox-devel-91.2.0-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651864" comment="MozillaFirefox-translations-common-91.2.0-112.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148519" version="1" class="patch">
	<metadata>
		<title>Security update for javapackages-tools, javassist, mysql-connector-java, protobuf, python-python-gflags (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1036025" ref_url="https://bugzilla.suse.com/1036025" source="BUGZILLA"/>
		<reference ref_id="1133277" ref_url="https://bugzilla.suse.com/1133277" source="BUGZILLA"/>
		<reference ref_id="1162343" ref_url="https://bugzilla.suse.com/1162343" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009599.html" source="SUSE-SU"/>
		<description>
This update for javapackages-tools, javassist, mysql-connector-java, protobuf, python-python-gflags contains the following fixes:

Changes in mysql-connector-java:
- Restrict license to GPL-2.0-only
- Fix README adjustments
- Depend on log4j rather than log4j-mini and adjust log4j dependencies to
  account for the lack of log4j12 Provides in some code streams.
- Add missing Group tag
- Update to 8.0.25 (SOC-11543)
  Changes in 8.0.25
    * No functional changes: version alignment with MySQL Server 8.0.25.
  Changes in 8.0.24
    * Bug#102188 (32526663), AccessControlException with AuthenticationLdapSaslClientPlugin.
    * Bug#22508715, SETSESSIONMAXROWS() CALL ON CLOSED CONNECTION RESULTS IN NPE.
    * Bug#102131 (32338451), UPDATABLERESULTSET NPE WHEN USING DERIVED QUERIES OR VIEWS.
    * Bug#101596 (32151143), GET THE 'HOST' PROPERTY ERROR AFTER CALLING TRANSFORMPROPERTIES() METHOD.
    * Bug#20391832, SETOBJECT() FOR TYPES.TIME RESULTS IN EXCEPTION WHEN VALUE HAS FRACTIONAL PART.
    * Bug#97730 (31699993), xdev api: ConcurrentModificationException at Session.close.
    * Bug#99708 (31510398), mysql-connector-java 8.0.20 ASSERTION FAILED: Unknown message type: 57 s.close.
    * Bug#32122553, EXTRA BYTE IN COM_STMT_EXECUTE.
    * Bug#101558 (32141210), NULLPOINTEREXCEPTION WHEN EXECUTING INVALID QUERY WITH USEUSAGEADVISOR ENABLED.
    * Bug#102076 (32329915), CONTRIBUTION: MYSQL JDBC DRIVER RESULTSET.GETLONG() THROWS NUMBEROUTOFRANGE.
    * Bug#31747910, BUG 30474158 FIX IMPROVES JDBC COMPLIANCE BUT CHANGES DEFAULT RESULTSETTYPE HANDLING.
    * Bug#102321 (32405590), CALLING RESULTSETMETADATA.GETCOLUMNCLASSNAME RETURNS WRONG VALUE FOR DATETIME.
    * WL#14453, Pluggable authentication: new default behavior &amp; user-less authentications.
    * WL#14392, Improve timeout error messages [classic].
    * WL#14202, XProtocol: Support connection close notification.
  Changes in 8.0.23
    * Bug#21789378, FORCED TO SET SERVER TIMEZONE IN CONNECT STRING.
    * Bug#95644 (30573281), JDBC GETDATE/GETTIME/GETTIMESTAMP INTERFACE BEHAVIOR CHANGE AFTER UPGRADE 8.0.
    * Bug#94457 (29402209), CONNECTOR/J RESULTSET.GETOBJECT( ..., OFFSETDATETIME.CLASS ) THROWS.
    * Bug#76775 (20959249), FRACTIONAL SECONDS IN TIME VALUES ARE NOT AVAILABLE VIA JDBC.
    * Bug#99013 (31074051), AN EXTRA HOUR GETS ADDED TO THE TIMESTAMP WHEN SUBTRACTING INTERVAL 'N' DAYS.
    * Bug#98695 (30962953), EXECUTION OF 'LOAD DATA LOCAL INFILE' COMMAND THROUGH JDBC FOR DATETIME COLUMN.
    * Bug#101413 (32099505), JAVA.TIME.LOCALDATETIME CANNOT BE CAST TO JAVA.SQL.TIMESTAMP.
    * Bug#101242 (32046007), CANNOT USE BYTEARRAYINPUTSTREAM AS ARGUMENTS IN PREPARED STATEMENTS AN MORE.
    * WL#14274, Support for authentication_ldap_sasl_client(SCRAM-SHA-256) authentication plugin.
    * WL#14206, Support for authentication_ldap_sasl_client(GSSAPI) authentication plugin.
    * WL#14207, Replace language in APIs and source code/docs.
  Changes in 8.0.22
    * Bug#98667 (31711961), 'All pipe instances are busy' exception on multiple connections to named Pipe.
    * Bug#96309 (31699357), MultiHost in loadbalance may lead to a TPS reduction during a quick switch.
    * Bug#99076 (31083755), Unclear exception/error when connecting with jdbc:mysql to a mysqlx port.
    * Bug#96870 (30304764), Contribution: Allow to disable AbandonedConnectionCleanupThread completely.
    * WL#14115, Support for authentication_ldap_sasl_client (SCRAM-SHA-1) authentication plugin.
    * WL#14096, Add option to specify LOAD DATA LOCAL allow list folder.
    * WL#13780, Skip system-wide trust and key stores (incl. X DevAPI client certs).
    * WL#14017, XProtocol -- support for configurable compression algorithms.
    * Bug#92903 (28834903), MySQL Connector/j should support wildcard names or alternative names.
    * Bug#99767 (31443178), Contribution: Check SubjectAlternativeName for TLS instead of commonName.
    * Bug#93444 (29015453), LOCALDATETIME PARAMETER VA UES ALTERED WHEN CLIENT AND SERVER TIMEZONES DIFFER.
    * WL#14052, Remove asynchronous variant of X Protocol.
    * Bug#99713 (31418928), NPE DURING COM.MYSQL.CJ.SERVERPREPAREDQUERYBINDVALUE.STOREDATE().
    * WL#14068, Remove legacy integration with JBoss.
  Changes in 8.0.21
    * WL#14051, Upgrade Protocol Buffers dependency to protobuf-java-3.11.4.
    * WL#14042, Upgrade testsuite to JUnit 5.
    * Bug#98237 (30911870),  PREPAREDSTATEMENT.SETOBJECT(I, 'FALSE', TYPES.BOOLEAN) ALWAYS SETS TRUE OR 1.
    * WL#13008, DevAPI: Add schema validation to create collection.
  Changes in 8.0.20
    * Bug#30805426, IN CASE OF ISAUTHMETHODSWITCHREQUESTPACKET , TOSERVERS &gt; 1 ARE IGNORED.
    * Bug#97714 (30570249), Contribution: Expose elapsed time for query interceptor
    * Bug#97724 (30570721), Contribution: Allow \'3.\' formatted numbers.
    * Bug#98536 (30877755), SIMPLEDATEFORMAT COULD CACHE A WRONG CALENDAR.
      Fix for Bug#91112 (28125069), AGAIN WRONG JAVA.SQL.DATE.
    * Bug#30474158, CONNECTOR/J 8 DOES NOT HONOR THE REQUESTED RESULTSETTYPE SCROLL_INSENSITIVE ETC.
    * Bug#98445 (30832513), Connection option clientInfoProvider=ClientInfoProviderSP causes NPE.
    * WL#12248, DevAPI: Connection compression.
    * Bug#30636056, ResultSetUtil.resultSetToMap() can be unsafe to use.
    * Bug#97757 (30584907), NULLPOINTEREXCEPTION WITH CACHERESULTSETMETADATA=TRUE AND EXECUTEQUERY OF 'SET'.
  Changes in 8.0.19
    * WL#13346, Support for mult-host and failover.
    * Bug#97413 (30477722), DATABASEMETADATA IS BROKEN AFTER SERVER WL#13528.
    * WL#13367, DNS SRV support.
    * WL#12736, DevAPI: Specify TLS ciphers to be used by a client or session.
    * Bug#96383 (30119545) RS.GETTIMESTAMP() HAS * DIFFERENT RESULTS FOR TIME FIELDS WITH USECURSORFETCH=TRUE.
    * Bug#96059 (29999318), ERROR STREAMING MULTI RESULTSETS WITH MYSQL-CONNECTOR-JAVA 8.0.X.
    * Bug#96442 (30151808), INCORRECT DATE ERROR WHEN CALLING GETMETADATA ON PREPARED STATEMENT.
  Changes in 8.0.18
    * WL#13347, Connectors should handle expired password sandbox without SET operations.
    * Bug#84098 (25223123), endless loop in LoadBalancedAutoCommitInterceptor.
    * Bug#23721537, MULTI-SELECT WITH EXECUTEASYNC() GIVES IMPROPER ERROR.
    * Bug#95741 (29898567), METADATA QUERY USES UPPER() AROUND NUMERIC EXPRESSION.
    * Bug#20913289, PSTMT.EXECUTEUPDATE() FAILS WHEN SQL MODE IS NO_BACKSLASH_ESCAPES.
    * Bug#80441 (22850444), SYNTAX ERROR ON RESULTSET.UPDATEROW() WITH SQL_MODE NO_BACKSLASH_ESCAPES.
  Changes in 8.0.17
    * WL#13210, Generate Javadocs via ant.
    * WL#12247, DevAPI: indexing array fields.
    * WL#12726, DevAPI: Add overlaps and not_overlaps as operator.
    * Bug#95503 (29821029), Operator IN not mapping consistently to the right X Plugin operation.
    * WL#12942, Update README.md and add new CONTRIBUTING.md.
    * WL#13125, Support fully qualified hostnames longer than 60 characters.
    * Bug#95210 (29807741), ClassCastException in BlobFromLocator when connecting as jdbc:mysql:replication.
    * Bug#29591275, THE JAR FILE NEEDS TO CONTAIN A README AND LICENSE FILE.
    * WL#13124, Support new utf8mb4 bin collation.
    * WL#13009, DevAPI: Deprecate methods.
    * WL#11101, Remove de-cache and close of SSPSs on double call to close().
    * Bug#89133 (27356869)  CONTRIBUTION: UPDATE DA ABASEMETADATA.JAVA.
    * Bug#11891000, DABATASEMETADATA.GETTABLES() IGNORES THE SCHEMA_PATTERN ARGUMENT.
    * Bug#94101 (29277648), SETTING LOGSLOWQUERIES SHOULD NOT AUTOMATICALLY ENABLE PROFILESQL FOR QUERIES.
    * Bug#74690 (20010454), PROFILEREVENT HOSTNAME HAS NO GETTER().
    * Bug#70677 (17640628), CONNECTOR J WITH PROFILESQL - LOG CONTAINS LOTS OF STACKTRACE DATA.
    * Bug#41172 (11750577), PROFILEREVENT.PACK() THROWS ARRAYINDEXOUTOFBOUNDSEXCEPTION.
    * Bug#27453692, CHARACTERS GET GARBLED IN CONCAT() IN PS WHEN USECURSORFETCH=TRUE.
    * Bug#94585 (29452669), GETTABLENAME() RETURNS NULL FOR A QUERY HAVING COUNT(*) WITH JDBC DRIVER V8.0.12.
    * Bug#94442 (29446059), RESULTSETIMPL.GETDOUBLE IS INEFFICIENT BECAUSE OF BIGDECIMAL (RE)CONSTRUCTIONS.
  Changes in 8.0.16
    * WL#12825, Remove third-party libraries from sources and bundles.
    * Bug#93590 (29054329), javax.net.ssl.SSLException: closing inbound before receiving peer's close_notify.
    * Bug#94414 (29384853), Connector/J RPM package have version number in path.
    * Bug#27786499, REDUNDANT FILES IN DEBIAN PACKAGE FOR DEBIAN9(COMMUNITY PACKAGE) FOR CJAVA.
    * WL#12246, DevAPI: Prepared statement support.
    * WL#10839, Adjust c/J tests to the new 'ON' default for explicit_defaults_for_timestamp.
    * Bug#29329326, PLEASE AVOID SHOW PROCESSLIST IF POSSIBLE.
    * WL#12460, DevAPI: Support new session reset functionality.
    * WL#12459, DevAPI: Support connection-attributes.
    * Bug#25650385, GETBYTE() RETURNS ERROR FOR BINARY() FLD.
    * Bug#27784363, MYSQL 8.0 JDBC DRIVER THROWS NUMBERFORMATEXCEPTION FOR TEXT DATA
    * Bug#93007 (28860051), LoadBalancedConnectionProxy.getGlobalBlacklist bug.
    * Bug#29186870, CONNECTOR/J REGRESSION: NOT RETURNING PRECISION GETPROCEDURECOLUMNS.
    * Bug#22038729, X DEVAPI: ANY API CALL AFTER A FAILED CALL PROC() RESULTS IN HANG.
    * Bug#29244101, ADD MAPPING FOR UTF8MB4_ZH_0900_AS_CS COLLATION.
    * Bug#92819 (28834959), EXPRPARSER THROWS WRONGARGUMENTEXCEPTION WHEN PARSING EMPTY JSON ARRAY.
    * Bug#21921956, X DEVAPI: EXPRESSION PARSE ERROR WITH UNARY OPERATOR.
    * Bug#94031 (29257922), WRONG JSON_UNQUOTE WORKAROUND.
    * Bug#22931700, BINDINGS.GETBOOLEAN() ALWAYS RETURNS FALSE.
    * Bug#25650912, ERROR MESSAGE NOT CLEAR WHEN WE PASS A CHAR DATA TO ANY TABLE API.
    * Bug#25642021, CHANGEUSER() FAILS WHEN ENABLEPACKETDEBUG=TRUE.
  Changes in 8.0.15
    * Bug#94051 (29261254), Not recommended default for 'allowLoadLocalInfile'.
  Changes in 8.0.14
    * WL#12298, Connectors: Expose metadata about source and binaries in unified way.
    * Bug#93111 (28894344), ConnectionUrl.java contains char U+00A7 (section sign).
    * WL#12621, DevAPI: Handling of Default Schema.
    * Bug#93340 (28970166), C/J BUILD SCRIPT IS TOO VERBOSE
    * WL#12462, DevAPI: Be prepared for initial notice on connection.
    * Bug#28924137, WL#12463:IF COLLECTION DOESN'T EXIST, COLL.COUNT() IS GIVING A WRONG ERROR MESSAGE.
    * WL#12463, DevAPI: Standardize count method.
    * Bug#92508 (28747636), mysql-connector in bootclasspath causing memory leak.
    * Bug#25650514, UPDATEROW() CALL FAILS WITH NPE WHEN SSPS=TRUE AND TABLE HAS MULTI-FLD KEY.
    * Bug#25650482, REFRESHROW() CALL AFTER UPDATEROW() API FAILS WHEN USESERVERPREPSTMTS=TRUE.
    * Bug#92536 (28692243), UPDATEING SERVER SIDE PREPSTMTS RESULTSET FAIL.
    * Bug#92625 (28731795), CONTRIBUTION: FIX OBSERVED NPE IN CLEARINPUTSTREAM.
    * Bug#23045642, ADDING NO-DOC (MYSQLCONNJ-696) RESULTS IN EXCEPTION.
    * Bug#91065 (28101003), ZERODATETIMEBEHAVIOR=CONVERT_TO_NULL SHOULD NOT APPLY TO 00:00:00 TIME COLUMNS.
    * Bug#92574 (28706219), WHEN CONVERTING FROM VARCHAR TO JAVA BOOLEAN, 'N' IS NOT SUPPORTED.
    * Bug#25642226, CHANGEUSER() NOT SETTING THE DATABASE PROPERLY WITH SHA USER.
    * Bug#28606708, NAMED PIPE CONNECTION FOR X PROTOCOL RETURNS NPE, EXPECTED PROPER ERROR MESSAGE.
  Changes in 8.0.13
    * Bug#91317 (28207422), Wrong defaults on collation mappings.
    * WL#12245, DevAPI: Implement connect timeout.
    * Bug#21774249, UNIT TEST FAILS WITH ERROR ' 'CEST' IS UNRECOGNIZED TIME ZONE'.
    * WL#11857, DevAPI: Implement connection pooling for xprotocol.
    * Bug#91873 (28444461), REMOVE USEOLDUTF8BEHAVIOR CONNECTION PROPERTY.
    * Bug#92264 (28594434), JSONPARSER PUTS UNNECESSARY MAXIMUM LIMIT ON JSONNUMBER TO 10 DIGITS.
    * WL#12110, Extend PropertyDefinitions.PropertyKey usage.
    * Bug#81063 (23098159), w/ rewriteBatchedStatements, when 2 tables involved, the rewriting not correct.
    * Bug#84813 (25501750), rewriteBatchedStatements fails in INSERT.
    * Bug#81196 (23227334), CONNECTOR/J NOT FOLLOWING DATABASE CHARACTER SET.
    * Bug#72609 (18749544), SETDATE() NOT USING A PROLEPTIC GREGORIAN CALENDAR.
    * Bug#87534 (26730196), UNION ALL query fails when useServerPrepStmts=true on database connection.
    * Bug#89948 (27658489), Batched statements are not committed for useLocalTransactionState=true.
    * BUG#22305979, WRONG RECORD UPDATED IF SENDFRACTIONALSECONDS=FALSE AND SMT IS SCROLLABLE.
    * Bug#27102307, CHANGE USESSL AND VERIFYSERVERCERTIFICATE TO SSLMODE OPTION.
    * Bug#28150662, CONNECTOR/J 8 MALFORMED DATABASE URL EXCEPTION WHIT CORRECT URL STRING.
    * Bug#91421 (28246270), ALLOWED VALUES FOR ZERODATETIMEBEHAVIOR ARE INCOMPATIBLE WITH NETBEANS.
    * Bug#23045604, XSESSION.GETURI() RETURNS NPE.
    * Bug#21914769, NPE WHEN TRY TO EXECUTE INVALID JSON STRING.
    * Bug#BUG#90887 (28034570), DATABASEMETADATAUSINGINFOSCHEMA#GETTABLES FAILS IF METHOD ARGUMENTS ARE NULL.
    * Bug#28207088, C/JAVA: UPDATECLOB(INT COLUMNLABEL, JAVA.SQL.CLOB CLOB) IS FAILING.
    * Bug#27629553, NPE FROM GETSESSION() FOR SSL CONNECTION WHEN NO PASSWORD PASSED.
  Changes in 8.0.12
    * Bug#28208000, MASTER : HANG IN ASYNCHRONOUS SELECT TEST.
    * WL#10544, Update MySQL 8.0 keywords list.
    * WL#11858, DevAPI: Core API v1 alignment.
    * Bug#27652379, NPE FROM GETSESSION(PROPERTIES) WHEN HOST PARAMETER IS GIVEN IN SMALL LETTER.
    * BUG#87600 (26724154), CONNECTOR THROWS 'MALFORMED DATABASE URL' ON NON MYSQL CONNECTION-URLS.
    * BUG#26089880, GETCONNECTION('MYSQLX://..') RETURNS NON-X PROTOCOL CONNECTION.
    * WL#11876, Improve connection properties design.
    * WL#11933, Connector/J 8.0 X DevAPI reference documentation update.
    * WL#11860, Ensure &gt;= 75% code coverage.
    * Bug#90753 (27977617), WAIT_TIMEOUT EXCEEDED MESSAGE NOT TRIGGERED.
    * Bug#85941 (25924324), WASNULL NOT SET AFTER GETBYTES IS CALLED.
    * Bug#28066709, COLLECTION.CREATEINDEX() TEST IS BROKEN AFTER WL#11808 IMPLEMENTATION.
    * Bug#90872 (28027459), FILTERPARAMS CLASS IS NOT NEEDED.
    * Bug#27522054, POSSIBLE ASYNC XPROTOCOL MESSAGE HANDLING PERF ISSUE.
      The 'xdevapi.useAsyncProtocol' connection property default value is changed to 'false'.
  Changes in 8.0.11
    * WL#11293, DevAPI: Support new locking modes : NOWAIT and SKIP LOCKED.
    * Bug#90029 (27678308), FAILURE WHEN GETTING GEOMCOLLECTION COLUMN TYPE.
    * BUG#90024 (27677574), SOME TESTS FAILED AGAINST MYSQL 8.0.5 BECAUSE OF DEPRECATED FEATURES REMOVAL.
    * Bug#86741 (26314325), Multi-Host connection with autocommit=0 getAutoCommit maybe wrong.
    * Bug#27231383, PROVIDE MAVEN-FRIENDLY COMMERCIAL PACKAGES WITHOUT '-BIN'.
    * Bug#26819691, SETTING PACKETDEBUGBUFFERSIZE=0 RESULTS IN CONNECTION FAILURE.
    * Bug#88227 (27029657), Connector/J 5.1.44 cannot be used against MySQL 5.7.20 without warnings.
    * Bug#27374581, CONNECTION FAILS WHEN GPL SERVER STARTED WITH TLS-VERSION=TLSV1.2.
    * WL#11419, DevAPI: New document _id generation support.
    * WL#11620, Change caching_sha2_password padding.
    * WL#11604, DevAPI: Add SHA256_MEMORY support.
    * BUG#86278 (26092824), SUPPORT CUSTOM CONSTRUCTION OF SSLSOCKET DURING CONNECTION ESTABLISHMENT.
    * BUG#27226293, JSONNUMBER.GETINTEGER() &amp; NUMBERFORMATEXCEPTION.
    * WL#10527, Clean up Protocol and Session interfaces.
  Changes in 8.0.9
    * WL#11469, Update license header in GPL packages.
    * BUG#27247349, WL#11208 : UNIQUE DOES NOT GIVE ERROR EVEN THOUGH IT IS NOT SUPPORTED.
    * WL#11208, DevAPI: Collection.createIndex.
    * WL#10156, Add setters/getters for connection properties to MysqlDataSource,
      MysqlXADataSource and MysqlConnectionPoolDataSource.
    * WL#11401, DevAPI: Remove configuration API.
    * WL#10619, Ensure compatibility with new data dictionary.
    * BUG#27217264, WL#10937: NULL POINTER EXCEPTION WHEN NULL IS PASSED AS _ID IN COLL.REPLACEONE.
    * WL#10937, DevAPI: ReplaceOne, AddOrReplaceOne, GetOne, RemoveOne.
    * Bug#26723646, JSON_MERGE() FUNCTION IS DEPRECATED IN MYSQL 8.0.
    * Bug#27185332, WL#11210:ERROR IS THROWN WHEN NESTED EMPTY DOCUMENTS ARE INSERTED TO COLLECTION.
    * Bug#27151601, WL#11210: DOCUMENT PATCH EXPRESSIONS ARE NOT SUPPORTED.
    * WL#11210, DevAPI: Modify/MergePatch.
    * Bug#79612 (22362474), CONNECTION ATTRIBUTES LOST WHEN CONNECTING WITHOUT DEFAULT DATABASE.
    * WL#10152, Enable TLSv1.2 on mysqlx.
    * Bug#27131768, NULL POINTER EXCEPTION IN CONNECTION.
    * Bug#88232 (27047676), c/J does not rollback transaction when autoReconnect=true.
    * Bug#88242 (27040063), autoReconnect and socketTimeout JDBC option makes wrong order of client packet.
    * Bug#88021 (26939943), High GC pressure when driver configured with serversideprepared statements.
    * Bug#26724085, CHARSET MAPPING TO BE UPDATED FOR MYSQL 8.0.3.
    * Bug#87704 (26771560), THE STREAM GETS THE RESULT SET ?THE DRIVER SIDE GET WRONG ABOUT GETLONG().
    * Bug#24924097, SERVER GREETING ERROR ISN'T RECOGNIZED DURING HANDSHAKE.
    * Bug#26748909, MASTER : ERROR - NO OPERATIONS ALLOWED AFTER STATEMENT CLOSED FOR TOSTRING().
    * Bug#26266731, CONCUR_UPDATABLE RESULTSET OPERATIONS FAIL AGAINST 8.0 FOR BOOLEAN COLUMN.
    * WL#11239, DevAPI: Remove create table implementation.
    * Bug#27131100, WL#11212 : SAVEPOINT CREATING WITH EMPTY STRING AND SPACE AS NAME.
    * WL#11212, DevAPI: transaction save-points.
    * WL#11060, Support new SHA-256 authentication system.
    * Bug#87826 (26846249), MYSQL JDBC CONNECTOR/J DATABASEMETADATA NULL PATTERN HANDLING IS NON-COMPLIANT.
    * WL#11163, Extract parameter setters, serverPrepare() and serverExecute() to core classes.
    * BUG#26995710, WL#11161 : NULL POINTER EXCEPTION IN EXECUTEBATCH() AND CLOSE().
    * WL#11161, Unify query bindings.
    * WL#8469, Don't extract query text from packets when possible.
  Changes in 8.0.8
    * BUG#26722030, TEST FAILING DUE TO BINARY LOGGING ENABLED BY DEFAULT IN MYSQL 8.0.3.
    * BUG#26722018, TESTS FAILING DUE TO CHANGE IN INFORMATION_SCHEMA.INNODB_SYS_* NAMING.
    * BUG#26750807, MASTER : NULL POINTER EXCEPTION IN SCHEMA.DROPVIEW(NULL).
    * BUG#26750705, MASTER : ERROR - UNSUPPORTED CONVERSION FROM TIME TO JAVA.SQL.DATE.
    * WL#10620, DevAPI: SHA256 Authentication support.
    * WL#10936, DevAPI: Row locking for Crud.Find.
    * WL#9868, DevAPI: Configuration handling interface.
    * WL#10935, DevAPI: Array or Object 'contains' operator.
    * WL#9875, Prepare c/J 8.0 for DEB and RPM builds.
    * BUG#26259384, CALLABLE STATEMENT GIVES ERROR IN C/JAVA WHEN RUN AGAINST MYSQL 8.0.
    * Bug#26393132, NULLPOINTEREXCEPTION IS THROWN WHEN TRIED TO DROP A NULL COLLECTION.
    * WL#10532, DevAPI: Cleanup Drop APIs.
    * Bug#87429 (26633984), repeated close of ServerPreparedStatement causes memory leak.
    * Bug#87379 (26646676), Perform actual TLS capabilities check when restricting TLSv1.2.
    * Bug#85601 (25777822), Unit notation is missing in the description of the property involved in the time.
    * Bug#87153 (26501245), INCORRECT RESULT OF DBMD.GETVERSIONCOLUMNS() AGAINST MYSQL 8.0.2+.
    * Bug#78313 (21931572), proxies not handling Object.equals(Object) calls correctly.
    * Bug#85885 (25874048), resultSetConcurrency and resultSetType are swapped in call to prepareStatement.
    * Bug#74932 (20066806), ConnectionImp Doesn't Close Server Prepared Statement (PreparedStatement Leak).
    * WL#10536, Deprecating COM_SHUTDOWN.
    * Bug#25946965, UPDATE THE TIME ZONE MAPPINGS WITH LATEST TZ DATABASES.
    * Bug#20182108, INCLUDE CUSTOM LOAD BALANCING STRATEGY USING PLUGIN API.
    * Bug#26440544, CONNECTOR/J SHOULD NOT USE TX_{READ_ONLY,ISOLATION} WHICH IS PLANNED FOR REMOVAL.
    * Bug#26399958, UNABLE TO CONNECT TO MYSQL 8.0.3.
    * Bug#25650305, GETDATE(),GETTIME() AND GETTIMESTAMP() CALL WITH NULL CALENDAR RETURNS NPE.
  Changes in 8.0.7
    * Bug#26227653, WL#10528 DIFF BEHAVIOUR WHEN SYSTEM PROP JAVAX.NET.SSL.TRUSTSTORETYPE IS SET.
    * WL#10528, DevAPI: Ensure all connectors are secure by default.
    * WL#8305, Remove internal dependency on connection objects.
    * Bug#22972057, X DEVAPI: CLIENT HANGS AFTER CONNECTION FAILURE.
    * Bug#26140577, GIS TESTS ARE FAILING WITH MYSQL 8.0.1.
    * WL#10765, DevAPI: Forbid modify() and remove() with no condition.
    * Bug#26090721, CONNECTION FAILING WHEN SERVER STARTED WITH COLLATION UTF8MB4_DE_PB_0900_AI_CI.
    * WL#10781, enum-based connection properties.
    * Bug#73775 (19531384), DBMD.getProcedureColumns()/.getFunctionColumns() fail to filter by columnPattern.
    * Bug#84324 (25321524), CallableStatement.extractProcedureName() not work when catalog name with dash.
    * Bug#79561 (22333996), NullPointerException when calling a fully qualified stored procedure.
    * Bug#84783 (25490163), query timeout is not working(thread hang).
    * Bug#70704 (17653733), Deadlock using UpdatableResultSet.
    * Bug#66430 (16714868), setCatalog on connection leaves ServerPreparedStatement cache for old catalog.
    * Bug#70808 (17757070), Set sessionVariables in a single query.
    * Bug#77192 (21170603), Description for the Property replicationConnetionGroup Missing from the Manual.
    * Bug#83834 (25101890), Typo in Connector/J error message.
    * WL#10531, Support utf8mb4 as default charset.
    * Bug#85555 (25757019), useConfigs Can't find configuration template named, in mysql-connector-java 6.x
    * WL#10529, Move version number to 8.0.
    * WL#10530, DevAPI: Remove XSession, rename NodeSession to Session.
    * Bug#23510958, CONCURRENT ASYNC OPERATIONS RESULT IN HANG.
    * Bug#23597281, GETNODESESSION() CALL WITH SSL PARAMETERS RETURNS CJCOMMUNICATIONSEXCEPTION.
    * Bug#25207784, C/J DOESN'T FOLLOW THE FINAL X DEVAPI MY-193 SPECIFICATION.
    * Bug#25494338, ENABLEDSSLCIPHERSUITES PARAMETER NOT WORKING AS EXPECTED WITH X-PLUGIN.
    * Bug#84084 (25215008), JAVA.LANG.ARRAYINDEXOUTOFBOUNDSEXCEPTION ON ATTEMPT TO GET VALUE FROM RESULTSET.
    * WL#10553, Add mapping for Japanese utf8mb4 collation.
    * Bug#25575103, NPE FROM CREATETABLE() WHEN SOME OF THE INPUTS ARE NULL.
    * Bug#25575156, NPE FROM CREATEVIEW() WHEN SOME OF THE INPUTS ARE NULL.
    * Bug#25636947, CONNECTION USING MYSQL CLIENT FAILS IF WE USE THE SSL CERTIFICATES FROM C/J SRC.
    * Bug#25687718, INCORRECT TIME ZONE IDENTIFIER IN STATEMENTREGRESSIONTEST.
    * Bug#25556597, RESULTSETTEST.TESTPADDING UNIT TEST IS FAILING IN 5.1.41 RELEASE PACKAGE.
    * Bug#25517837, CONNECT PERFORMNACE DEGRADED BY 10% IN 5.1.41.
    * Bug#25504578, CONNECT FAILS WHEN CONNECTIONCOLLATION=ISO-8859-13.
    * Bug#25438355, Improper automatic deserialization of binary data.
    * Bug#70785 (17756825), MySQL Connector/J inconsistent init state for autocommit.
    * Bug#66884: Property 'elideSetAutoCommits' temporarily  defaults to 'false' until this bug is fixed.
    * Bug#75615 (21181249), Incorrect implementation of Connection.setNetworkTimeout().
    * Bug#81706 (23535001), NullPointerException in driver.
    * Bug#83052 (25048543), static method in com.mysql.jdbc.Util relies on null object.
    * Bug#69526 (17035755), 'Abandoned connection cleanup thread' at mysql-connector-java-5.1.25.
    * Bug#82826 (24942672), Unneeded version requirement for javax.net.ssl Import-Package on OSGi MANIFEST.MF.
  Changes in 6.0.6
    * Added Core TLS/SSL options for the mysqlx URI scheme.
    * Updated collations map.
    * Bug#24350526, UNEXPECTED BEHAVIOUR OF IS_NUMBER_SIGNED API IN C/JAVA.
    * Bug#82707 (24512766), WRONG MILLI SECOND VALUE RETURNED FROM TIMESTAMP COLUMN.
    * Bug#82005 (23702040), JDBCDATEVALUEFACTORY FAILS TO PARSE SOME DATES.
    * Bug#83725 (25056803), NPE IN XPROTOCOL.GETPLUGINVERSION() WITH MYSQL 5.7.17.
    * Bug#24525461, UPDATABLE RESULTSET FEATURE FAILS WHEN USESERVERPREPSTMTS=TRUE.
    * Bug#24527173, QUERY EXECUTION USING PREPARED STMT FAILS WHEN USECURSORFETCH=TRUE.
    * Bug#82964 (24658016), JSR-310 DATA TYPES CREATED THROUGH JAVA.SQL TYPES.
    * Bug#81202 (23188159), RESULTSETIMPL.GETOBJECT THROWS NULLPOINTEREXCEPTION WHEN FIELD IS NULL.
    * Bug#22931277, COLUMN.GETTYPE() RETURNS ERROR FOR VALID DATATYPES.
    * BUG#24471057, UPDATE FAILS WHEN THE NEW VALUE IS OF TYPE DBDOC WHICH HAS ARRAY IN IT.
    * Bug#81691 (23519211), GETLASTDOCUMENTIDS() DOESN'T REPORT IDS PROVIDED BY USER.
    * Bug#82826 (24942672), Unneeded version requirement for javax.net.ssl Import-Package on OSGi MANIFEST.MF.
  Changes in 6.0.5
    * BUG#82896 (24613062), Unexpected behavior on attempt to connect to JDBC driver with unsupported URL.
    * Added client-side failover during XSession initialization for multi-router configuration.
    * Removed Extension interface. All extension classes now implement their specific interfaces.
    * Bug#22988922, GETLENGTH() RETURNS -1 FOR LONGBLOB AND LONGTEXT FIELDS.
    * Bug#24619829, NEW FAILURES IN C/JAVA UNITTESTS AGAINST MYSQL 8.0.
    * Bug#75209 (20212882), Set useLocalTransactionState may result in partially committed transaction.
    * Bug#48346 (11756431), Communications link failure when reading compressed data with compressed=true.
    * Bug#80631 (22891845), ResultSet.getString return garbled result with json type data.
    * Bug#64188 (13702433), MysqlXAConnection.MYSQL_ERROR_CODES_TO_XA_ERROR_CODES is missing XA error codes.
    * Bug#72632 (18759269), NullPointerException for invalid JDBC URL.
    * Bug#82115 (23743956), Some exceptions are intercepted twice or fail to set the init cause.
    * Bug#78685 (21938551), Wrong results when retrieving the value of a BIT column as an integer.
    * Bug#80615 (22954007), prepared statement leak when rewriteBatchedStatements=true and useServerPrepStmt.
    * Extended X DevAPI with flexible parameter lists.
    * Added a virtual NodeSession to X DevAPI. 
  Changes in 6.0.4
    * X DevAPI URL prefix changed from 'mysql:x:' to 'mysqlx:'.
    * Bug#24301468 X DEVAPI SSL CONNECTION FAILS ON WINDOWS
    * The X DevAPI Table object now represents both database tables and views.
    * Added support for matching against pattern for X DevAPI list_objects calls.
    * Added Schema.getCollections(String pattern) and Schema.getTables(String pattern) interface methods.
    * Switched to 'mysqlx' namespace for X DevAPI StmtExecute messages.
      This change is incompatible to MySQL server versions &lt; 5.7.14.
    * Bug#82046 (23743947), MYSQL CONNECTOR JAVA OSGI METADATA BROKEN.
    * Bug#21690043, CONNECT FAILS WHEN PASSWORD IS BLANK.
    * Bug#22931433, GETTING VALUE OF BIT COLUMN RESULTS IN EXCEPTION.
  Changes in 6.0.3
    * Bug#23535571, EXCESSIVE MEMORY USAGE WHEN ENABLEPACKETDEBUG=TRUE.
    * Bug#23212347, ALL API CALLS ON RESULTSET METADATA RESULTS IN NPE WHEN USESERVERPREPSTMTS=TRUE.
    * Bug#23201930, CLIENT HANG WHEN RSLT CUNCURRENCY=CONCUR_UPDATABLE AND RSLTSET TYPE=FORWARD_ONLY.
    * Bug#23188498, CLIENT HANG WHILE USING SERVERPREPSTMT WHEN PROFILESQL=TRUE AND USEIS=TRUE.
    * Bug#22678872, NPE DURING UPDATE WITH FABRIC.
    * Bug#71131 (18068303), Poor error message in CallableStatement.java.
    * Bug#59462 (16736619), ConcurrentModificationException inside ConnectionImpl.closeAllOpenStatements().
    * Bug#22848249, LOADBALANCECONNECTIONGROUPMANAGER.REMOVEHOST() NOT WORKING AS EXPECTED.
    * Bug#22730682, ARRAYINDEXOUTOFBOUNDSEXCEPTION FROM CONNECTIONGROUPMANAGER.REMOVEHOST().
    * Bug#77171 (21181466), On every connect getting sql_mode from server creates unnecessary exception.
    * Bug#79343 (22353759), NPE in TimeUtil.loadTimeZoneMappings causing server time zone value unrecognized.
    * Bug#22038729, X DevAPI: Any API call after a failed CALL PROC() results in hang
    * Replace Schema.drop(), Collection.drop() by X DevAPI's session.dropSchema() and session.dropCollection().
    * Added session.dropTable().
    * Bug#22932078, GETTIMESTAMP() RETURNS WRONG VALUE FOR FRACTIONAL PART
    * Extracted packet readers from MysqlaProtocol.
    * Bug#22972057, X protocol CLIENT HANGS AFTER CONNECTION FAILURE
    * Bug#23044312, NullPointerException in X protocol AsyncMessageReader due to race condition
    * Returned support for MySQL 5.5 and 5.6.
  Changes in 6.0.2
    * Deprecate the EOF packet.
    * Bug#75956, Inserting timestamps using a server PreparedStatement and useLegacyDatetimeCode=false
    * Bug#22385172, CONNECTOR/J MANIFEST DOES NOT EXPOSE FABRIC (OSGi).
    * Bug#22598938, FABRICMYSQLDATASOURCE.GETCONNECTION() NPE AFTER SWITCHOVER.
    * Bug#21286268, CONNECTOR/J REPLICATION USE MASTER IF SLAVE IS UNAVAILABLE.
    * Bug#21296840 &amp; Bug#17910835, Server information in a group from Fabric is not refreshed after expired TTL.
    * Bug#56122 (11763419), JDBC4 functionality failure when using replication connections.
    * Added support for TLSv1.1 and TLSv1.2
    * Bug#78961 (22096981), Can't call MySQL procedure with InOut parameters in Fabric environment.
    * Bug#56100 (11763401), Replication driver routes DML statements to read-only slaves.
    * StandardSSLSocketFactory implements SocketMetadata.
    * Bug#21978216, GETTYPEINFO REPORT MAXIMUM PRECISION OF 255 FOR VARBINARY.
    * Bug#78706 (21947042), Prefer TLS where supported by MySQL Server.
    * Bug#21934573, FABRIC CODE INVOLVED IN THREAD DEADLOCK.
    * Bug#21876798, CONNECTOR/J WITH MYSQL FABRIC AND SPRING PRODUCES PROXY ERROR.
  Changes in 6.0.1
    * Removed useJvmCharsetConverters connection property. JVM charset converters are now used in all cases.
    * Refactored value decoding and removed all date/time connection properties
    * Refactored connection properties
    * Assume existence of INFORMATION_SCHEMA.PARAMETERS (and thus MySQL 5.5) when preparing stored procedure calls.
    * Removed retainStatementAfterResultSetClose connection property.
    * Null-merge of Bug#54095 (11761585) fix.
    * Removed support code for MySQL server versions &lt; 5.7.
    * Bug#76859 (20969312), DBMD getColumns using I_S doesn't have column IS_GENERATEDCOLUMN as per JDBC 4.1.
    * Added support for GENERATED COLUMNS.
    * Update Time Zone mappings with IANA Time Zone database tsdata2015f and Unicode CLDR v.28.
    * Update DatabaseMetaData SQL keywords.
    * Added tests for Optimizer hints syntax introduced in MySQL 5.7.7.
    * Bug#21860833, JSON DATA TYPE DOESN'T WORK WITH SSPS.
    * Added support for JSON data type.
    * Added support for JDBC 4.2 new features.
    * Bug#16634180, LOCK WAIT TIMEOUT EXCEEDED CAUSES SQLEXCEPTION, SHOULD CAUSE SQLTRANSIENTEXCEPTION
    * Bug#75849 (20536592), NPE in abortInternal() method on line 1358 of ConnectionImpl.
    * Bug#78106 (21648826), Potential memory leak with inflater.
    * Bug#78225 (21697684), DEFAULT NO_AUTO_CREATE_USER SQL_MODE BEHAVIOR BROKE SOME TESTS
    * Bug#77665 (21415165), JDBC fails to connect with MySQL 5.0.
    * Bug#77681 (21429909), rewrite replace sql like insert when rewriteBatchedStatements=true (contribution).
    * Bug#77449 (21304726) Add 'truncateFractionalSeconds=true|false' property (contribution).
    * Bug#50348 (11758179), mysql connector/j 5.1.10 render the wrong value for dateTime column in GMT DB.
    * Bug#75670 (20433047), Connection fails with 'Public Key Retrieval is not allowed' for native auth.
    * Bug#76187 (20675539), getTypeInfo report maximum precision of 255 for varchar.
    * Add test for new syntax 'ALTER TABLE ... DISCARD|IMPORT PARTITION ...' introduced in MySQL 5.7.4.
    * Bug#20727196, GETPROCEDURECOLUMNS() RETURNS EXCEPTION FOR FUNCTION WHICH RETURNS ENUM/SET TYPE.
    * Bug#19803348, GETPROCEDURES() RETURNS INCORRECT OUTPUT WHEN USEINFORMATIONSCHEMA=FALSE.
    * Bug#21215151, DATABASEMETADATA.GETCATALOGS() FAILS TO SORT RESULTS.
    * Bug#72630 (18758686), NullPointerException during handshake in some situations
    * Bug#20825727, CONNECT FAILURE WHEN TRY TO CONNECT SHA USER WITH DIFFERENT CHARSET.
    * Flag RowDataDynamic.isInterrupted removed as it isn't needed.
    * Bug#20518653, XSL FILES IN PACKAGES
    * Bug#20804635, GETTIME() AND GETDATE() FUNCTIONS FAILS WHEN FRACTIONAL PART EXISTS
    * Bug#62452 (16444069), NPE thrown in JDBC4MySQLPooledException when statement is closed.
    * BUG#70927 (17810800), Connector/J COM_CHANGE_USER handling is broken
    * Bug#75335 (20283655), Maven artifact for Connector/J is missing source jar.
    * BUG#75592 (20408891), 'SHOW VARIABLES WHERE' is expensive.
    * Bug#75113 (20821888), Fail in failover of the connection in MySQL fabric
    * Bug#72077 (18425861), Fabric connection with username to a server with disabled auth throws NPE
    * Add test for already fixed Bug#72546 (18719760), C/J Fabric createGroup() throws ClassCastException
    * Bug#77217 (21184949), ClassCastException when executing a streaming PreparedStatement with Fabric
    * Bug#19536760, GETSTRING() CALL AFTER RS.RELATIVE() RETURNS NULLPOINTEREXCEPTION
    * BUG#20453712, CLOB.SETSTRING() WITH VALID INPUT RETURNS EXCEPTION
    * BUG#20453671, CLOB.POSITION() API CALL WITH CLOB INPUT RETURNS EXCEPTION
    * Bug#20685022, SSL CONNECTION TO MYSQL 5.7.6 COMMUNITY SERVER FAILS.
    * Bug#20606107, TEST FAILURES WHEN RUNNING AGAINST 5.7.6 SERVER VERSION
    * Bug#20533907, BUG#20204783 FIX EXPOSES WRONG BEAHAVIORS IN FAILOVER CONNECTIONS.
    * Bug#20504139, GETFUNCTIONCOLUMNS() AND GETPROCEDURECOLUMNS() RETURNS ERROR FOR VALID INPUTS.
    * Expose PreparedStatment.ParseInfo for external usage, with no capture of the connection
    * Bug#75309 (20272931), mysql connector/J driver in streaming mode will in the blocking state.
    * New property 'readOnlyPropagatesToServer' controls the implicit propagation of read only transaction access mode to server.
    * Bug#54095 (11761585), Unnecessary call in newSetTimestampInternal.
    * Bug#67760 (15936413), Deadlock when concurrently executing prepared statements with Timestamp objects.
    * Bug#71084 (18028319), Wrong java.sql.Date stored if client and server time zones differ.
    * Bug#75080 (20217686), NullPointerException during setTimestamp on Fabric connection.
    * Bug#75168 (20204783), loadBalanceExceptionChecker interface cannot work using JDBC4/JDK7.
    * Bug#73595 (19465516), Replace usage of StringBuffer in JDBC driver.
    * Bug#18925727, SQL INJECTION IN MYSQL JDBC DRIVER.
    * Bug#74998 (20112694), readRemainingMultiPackets not computed correctly for rows larger than 16 MB.
    * Bug#73012 (19219158), Precedence between timezone options is unclear.
    * Implement support for connecting through SOCKS proxies (WL#8105).
    * Ant buildfile reworked to fix incompatibilities with latest Eclipse
    * Bug#18474141, TESTSUITE.FABRIC TEST CASES FAIL IF NO FABRIC.TESTSUITE PROPERTIES PROVIDED
    * Bug#19383371, CONNECT USING MYSQL_OLD_PASSWORD USER FAILS WHEN PWD IS BLANK
    * Bug#17441747, C/J DOESN'T SUPPORT XA RECOVER OUTPUT FORMAT CHANGED IN MYSQL 5.7.
    * Bug#19145408, Error messages may not be interpreted according to the proper character set
    * Bug#19505524, UNIT TEST SUITE DOES NOT CONSIDER ALL THE PARAMETERS PASSED TO BUILD.XML.
    * Bug#73474 (19365473), Invalid empty line in MANIFEST.MF
    * Bug#70436 (17527948), Incorrect mapping of windows timezone to Olson timezone.
    * Bug73163 (19171665), IndexOutOfBoundsException thrown preparing statement.
    * Added support for gb18030 character set
    * Bug#73663 (19479242), utf8mb4 does not work for connector/j &gt;=5.1.13
    * Bug#73594 (19450418), ClassCastException in MysqlXADataSource if pinGlobalTxToPhysicalConnection=true
    * Bug#19354014, changeUser() call results in 'packets out of order' error when useCompression=true.
    * Bug#73577 (19443777), CHANGEUSER() CALL WITH USECOMPRESSION=TRUE COULD LEAD TO IO FREEZE
    * Bug#19172037, TEST FAILURES WHEN RUNNING AGAINST 5.6.20 SERVER VERSION
    * Bug#71923 (18344403), Incorrect generated keys if ON DUPLICATE KEY UPDATE not exact.
    * Bug#72502 (18691866), NullPointerException in isInterfaceJdbc() when using DynaTrace
    * Bug#72890 (18970520), Java jdbc driver returns incorrect return code when it's part of XA transaction.
    * Fabric client now supports Fabric 1.5. Older versions are no longer supported.
    * Bug#71672 (18232840), Every SQL statement is checked if it contains 'ON DUPLICATE KEY UPDATE' or not.
    * Bug#73070 (19034681), Preparing a stored procedure call with Fabric results in an exception
    * Bug#73053 (19022745), Endless loop in MysqlIO.clearInputStream due to Linux kernel bug.
    * Bug#18869381, CHANGEUSER() FOR SHA USER RESULTS IN NULLPOINTEREXCEPTION
    * Bug#62577 (16722757), XA connection fails with ClassCastException
    * Bug#18852587, CONNECT WITH A USER CREATED USING SHA256_PASSWORD PLUGIN FAILS WHEN PWD IS BLANK
    * Bug#18852682, TEST TESTSHA256PASSWORDPLUGIN FAILS WHEN EXECUTE AGAINST COMMERCIAL SERVER
    * failing tests when running test suite with Java 6+.
    * Bug#72712 (18836319), No way to configure Connector JDBC to not do extra queries on connection
- Adjust log4j/log4j-mini dependencies to account for the lack of
  log4j12/log4jmini12 Provides in some code streams.

Changes in javapackages-tools:
- Can't assume non-existence of python38 macros in Leap.
  gh#openSUSE/python-rpm-macros#107
  Test for suse_version instead. Only Tumbleweed has and needs the
  python_subpackage_only support.

- Fix typo in spec file sitearch -&gt; sitelib

- Fix the python subpackage generation
  gh#openSUSE/python-rpm-macros#79

- Support python subpackages for each flavor
  gh#openSUSE/python-rpm-macros#66
- Replace old nose with pytest gh#fedora-java/javapackages#86

- when building extra flavor, BuildRequire javapackages-filesystem:
  /etc/java is being cleaned out of the filesystems package.

- Upgrade to version 5.3.1
- Define _rpmmacrodir for distributions that don't have it

- Use %{_rpmmacrodir} instead of %{_libexecdir}/rpm/macros.d: this
  just happens to overlap in some distros.

- Rename gradle-local and ivy-local to javapackages-gradle and
  javapackages-ivy and let them depend only on javapackages-tools
  and javapackages-local. These packages only install files
  produced during the javapackages-tools build. The dependencies
  will be pulled by gradle-local, ivy-local and maven-local
  meta-packages built in a separate spec file.

- Split maven-local meta-package out of javapackages-tools spec
  file

- Make the ivy-local and maven-local sub-packages depend on the
  right stuff, so that they actually can be used for building

- Provide both com.sun:tools and sun.jdk:jconsole that are part of
  standard OpenJDK installation. These provides cannot be generated
  from metadata due to build sequence.

  + fix directories for eclipse.conf too

- Make the javapackages-local package depend on java-devel. It is
  used for package building and this avoids each package to require
  java-devel itself.

- Replace the occurences of /usr/lib by libdir in configuration
  files too

- Update to version 5.3.0
- Modified patch:
- Build the :extras flavour as noarch
    + we did not bump epoch of OpenJDK packages in SUSE
    + fix a potential generation of unresolvable requires
    + adapt the tests to not expect the epoch

- Switch to multibuild layout

- Update to version 5.2.0+git20180620.70fa2258:
  * Rename the async kwarg in call_script to wait (reverses the logic)
  * Actually bump version to 5.3.0 snapshot
  * Bump version in VERSION file
  * [man] s/Pacakge/Package/g
  * Fix typos in README
  * Fix configure-base.sh after filesystem macro split
  * Split filesystem macros to separate macro file
  * Introduce javapackages-filesystem package
  * [java-functions] extend ABRT Java agent options
  * change abrt-java-connector upstream URL
  * Remove resolverSettings/prefixes from XMvn config
  * Add macros to allow passing arbitrary options to XMvn
  * [spec] Bump package version to 5.1.0
  * Allow specifying custom repo when calling xmvn-install

- Update to version 5.0.0+git20180104.9367c8f6:
  * [java-functions] Avoid colons in jar names
  * Workaround for SCL enable scripts not working with -e
  * Second argument to pom_xpath_inject is mandatory
  * [mvn_artifact] Provide more helpful error messages
  * Fix traceback on corrupt zipfile
  * [test] Add reproducer for rhbz#1481005
  * [spec] Fix default JRE path
  * [readme] Fix typo
  * Add initial content to README.md (#21)
  * Decouple JAVA_HOME setting from java command alternatives

- Fix url to correct one https://github.com/fedora-java/javapackages

- Split to python and non-python edition for smaller depgraph
- Fix abs2rel shebang:
- Fix Requires on subpackages to point to javapackages-tools proper

- Update to version 4.7.0+git20170331.ef4057e7:
  * Reimplement abs2rel in Python
  * Don't expand {scl} in macro definitions
  * Install expanded rpmfc attr files
  * [spec] Avoid file conflicts between in SCL
  * Fix macros.d directory ownership
  * Make %ant macro enable SCL when needed
  * [spec] Fix file conflicts between SCL and non-SCL packages
  * Fix ownership of ivyxmldir
  * [test] Force locale for python processes
  * Don't include timestamp in generated pom.properties
  * We switch to /usr/lib/ location for macros
- Try to reduce some dependencies bsc#1036025

- python-lxml 3.5.0 introduces validation for xml comments, and 
  one of the comments created in this package were not valid.
  This patch fixes the problem.  It backported from upstream and
  should be in the next release.
  https://github.com/mizdebsk/javapackages/commit/84211c0ee761e93ee507f5d37e9fc80ec377e89d

- Version update to 4.6.0:
  * various bugfixes for maven tooling
  * introduction to gradle-local package for gradle packaging

- Drop dependency over source-highlight as it causes build cycle

- Try to break buildcycle detected on Factory

- Fix build on SLE11

- Use python-devel instead of pkgconfig to build on sle11

- Add python-javapackages as requirement for main package

- Update requires on python packages to properly have all the needed
  dependencies on runtime

- Install macros to /etc/rpm as we do in SUSE:
- Cleanup with spec-cleaner

- Fix rpmlint errors
- Enable maven-local
- Avoid unsatisfiable dependencies
- Enable unit tests
- Update to version 4.4.0

- create directories for java, so that ant build works
- Add virtual provide jpackage-utils-java9 to be able to
  distinguish the presence of java9 compatibility

- fix bashisms

- SLES patch for ZipFile, having no attribute '__exit__' which was causing 
  ecj build failures

- set correct libxslt package when building for SLES

Changes in javassist:
    + Add OSGi manifest to the javassist.jar
    - Allow building on systems that do not have java 9 or higher

- Install and package the maven pom and metadata files

- BuildRequire at least Java 9. This version uses APIs introduced
  in Java 9

- Replace old $RPM_* shell vars by macros.

- Version update to 3.23.1:
  * 3.23.1 Github PR #171
  * 3.23   Fix leaking file handlers in ClassPool and removed
           ClassPath.close(). Github issue #165
  * 3.22   Java 9 supports.
           JIRA JASSIST-261.

- Specify java target and source version 1.6 in order to allow
  building with jdk9
    - fix javadoc errors that are fatal with jdk9

- Version update to 3.21.0:
  * various compiler settings
  * Require java &gt;= 1.6

- Update to version 3.19.0
  * Including a number of bug fixes and Java 8 supports.
- Clean up specfile
- Remove redundant %clean section
- Build for java API 1.5
- Remove unzip requirement
- Update home page and download source Urls

Changes in protobuf:
- Update to 3.17.3:
  C++
  * Introduce FieldAccessListener.
  * Stop emitting boilerplate {Copy/Merge}From in each ProtoBuf class
  * Provide stable versions of SortAndUnique().
  * Make sure to cache proto3 optional message fields when they are cleared.
  * Expose UnsafeArena methods to Reflection.
  * Use std::string::empty() rather than std::string::size() &gt; 0.
  * [Protoc] C++ Resolved an issue where NO_DESTROY and CONSTINIT are in incorrect order (#8296)
  * Fix PROTOBUF_CONSTINIT macro redefinition (#8323)
  * Delete StringPiecePod (#8353)
  * Create a CMake option to control whether or not RTTI is enabled (#8347)
  * Make util::Status more similar to absl::Status (#8405)
  * The ::pb namespace is no longer exposed due to conflicts.
  * Allow MessageDifferencer::TreatAsSet() (and friends) to override previous
  calls instead of crashing.
  * Reduce the size of generated proto headers for protos with string or
  bytes fields.
  * Move arena() operation on uncommon path to out-of-line routine
  * For iterator-pair function parameter types, take both iterators by value.
  * Code-space savings and perhaps some modest performance improvements in
  * RepeatedPtrField.
  * Eliminate nullptr check from every tag parse.
  * Remove unused _$name$cached_byte_size fields.
  * Serialize extension ranges together when not broken by a proto field in the
  middle.
  * Do out-of-line allocation and deallocation of string object in ArenaString.
  * Streamline ParseContext::ParseMessage to avoid code bloat and improve
  performance.
  * New member functions RepeatedField::Assign, RepeatedPtrField::{Add, Assign}.
  on an error path.
  * util::DefaultFieldComparator will be final in a future version of protobuf.
  * Subclasses should inherit from SimpleFieldComparator instead.
  Kotlin
  * Introduce support for Kotlin protos (#8272)
  * Restrict extension setter and getter operators to non-nullable T.
  Java
  * Fixed parser to check that we are at a proper limit when a sub-message has
  finished parsing.
  * updating GSON and Guava to more recent versions (#8524)
  * Reduce the time spent evaluating isExtensionNumber by storing the extension
  ranges in a TreeMap for faster queries. This is particularly relevant for
  protos which define a large number of extension ranges, for example when
  each tag is defined as an extension.
  * Fix java bytecode estimation logic for optional fields.
  * Optimize Descriptor.isExtensionNumber.
  * deps: update JUnit and Truth (#8319)
  * Detect invalid overflow of byteLimit and return InvalidProtocolBufferException as documented.
  * Exceptions thrown while reading from an InputStream in parseFrom are now
  included as causes.
  * Support potentially more efficient proto parsing from RopeByteStrings.
  * Clarify runtime of ByteString.Output.toStringBuffer().
  * Added UnsafeByteOperations to protobuf-lite (#8426)
  Python
  * Add MethodDescriptor.CopyToProto() (#8327)
  * Remove unused python_protobuf.{cc,h} (#8513)
  * Start publishing python aarch64 manylinux wheels normally (#8530)
  * Fix constness issue detected by MSVC standard conforming mode (#8568)
  * Make JSON parsing match C++ and Java when multiple fields from the same
  oneof are present and all but one is null.
  * Fix some constness / char literal issues being found by MSVC standard conforming mode (#8344)
  * Switch on 'new' buffer API (#8339)
  * Enable crosscompiling aarch64 python wheels under dockcross manylinux docker image (#8280)
  * Fixed a bug in text format where a trailing colon was printed for repeated field.
  * When TextFormat encounters a duplicate message map key, replace the current
  one instead of merging.
  Ruby
  * Add support for proto3 json_name in compiler and field definitions (#8356)
  * Fixed memory leak of Ruby arena objects. (#8461)
  * Fix source gem compilation (#8471)
  * Fix various exceptions in Ruby on 64-bit Windows (#8563)
  * Fix crash when calculating Message hash values on 64-bit Windows (#8565)
  General
  * Support M1 (#8557)

- Update to 3.15.8:
  - Fixed memory leak of Ruby arena objects (#8461)

- update to 3.15.7:
  C++
  * Remove the ::pb namespace (alias) (#8423)
  Ruby
  * Fix unbounded memory growth for Ruby &lt;2.7 (#8429)
  * Fixed message equality in cases where the message type is different (#8434)

- Can't assume non-existence of python38 macros in Leap.
  gh#openSUSE/python-rpm-macros#107
  Test for suse_version instead. Only Tumbleweed has and needs the
  python_subpackage_only support.

- update to 3.15.6:
  Ruby
  * Fixed bug in string comparison logic (#8386)
  * Fixed quadratic memory use in array append (#8379)
  * Fixed SEGV when users pass nil messages (#8363)
  * Fixed quadratic memory usage when appending to arrays (#8364)
  * Ruby &lt;2.7 now uses WeakMap too, which prevents memory leaks. (#8341)
  * Fix for FieldDescriptor.get(msg) (#8330)
  * Bugfix for Message.[] for repeated or map fields (#8313)
  PHP
  * read_property() handler is not supposed to return NULL (#8362)
  Protocol Compiler
  * Optional fields for proto3 are enabled by default, and no longer require
    the --experimental_allow_proto3_optional flag.
  C++
  * Do not disable RTTI by default in the CMake build (#8377)
  * Create a CMake option to control whether or not RTTI is enabled (#8361)
  * Fix PROTOBUF_CONSTINIT macro redefinition (#8323)
  * MessageDifferencer: fixed bug when using custom ignore with multiple
    unknown fields
  * Use init_seg in MSVC to push initialization to an earlier phase.
  * Runtime no longer triggers -Wsign-compare warnings.
  * Fixed -Wtautological-constant-out-of-range-compare warning.
  * DynamicCastToGenerated works for nullptr input for even if RTTI is disabled
  * Arena is refactored and optimized.
  * Clarified/specified that the exact value of Arena::SpaceAllocated() is an
    implementation detail users must not rely on. It should not be used in
    unit tests.
  * Change the signature of Any::PackFrom() to return false on error.
  * Add fast reflection getter API for strings.
  * Constant initialize the global message instances
  * Avoid potential for missed wakeup in UnknownFieldSet
  * Now Proto3 Oneof fields have 'has' methods for checking their presence in
    C++.
  * Bugfix for NVCC
  * Return early in _InternalSerialize for empty maps.
  * Adding functionality for outputting map key values in proto path logging
    output (does not affect comparison logic) and stop printing 'value' in the
    path. The modified print functionality is in the
    MessageDifferencer::StreamReporter.
  * Fixed https://github.com/protocolbuffers/protobuf/issues/8129
  * Ensure that null char symbol, package and file names do not result in a
    crash.
  * Constant initialize the global message instances
  * Pretty print 'max' instead of numeric values in reserved ranges.
  * Removed remaining instances of std::is_pod, which is deprecated in C++20.
  * Changes to reduce code size for unknown field handling by making uncommon
    cases out of line.
  * Fix std::is_pod deprecated in C++20 (#7180)
  * Fix some -Wunused-parameter warnings (#8053)
  * Fix detecting file as directory on zOS issue #8051 (#8052)
  * Don't include sys/param.h for _BYTE_ORDER (#8106)
  * remove CMAKE_THREAD_LIBS_INIT from pkgconfig CFLAGS (#8154)
  * Fix TextFormatMapTest.DynamicMessage issue#5136 (#8159)
  * Fix for compiler warning issue#8145 (#8160)
  * fix: support deprecated enums for GCC &lt; 6 (#8164)
  * Fix some warning when compiling with Visual Studio 2019 on x64 target (#8125)
  Python
  * Provided an override for the reverse() method that will reverse the internal
    collection directly instead of using the other methods of the BaseContainer.
  * MessageFactory.CreateProtoype can be overridden to customize class creation.
  * Fix PyUnknownFields memory leak (#7928)
  * Add macOS big sur compatibility (#8126)
  JavaScript
  * Generate `getDescriptor` methods with `*` as their `this` type.
  * Enforce `let/const` for generated messages.
  * js/binary/utils.js: Fix jspb.utils.joinUnsignedDecimalString to work with
    negative bitsLow and low but non-zero bitsHigh parameter. (#8170)
  PHP
  * Added support for PHP 8. (#8105)
  * unregister INI entries and fix invalid read on shutdown (#8042)
  * Fix PhpDoc comments for message accessors to include '|null'. (#8136)
  * fix: convert native PHP floats to single precision (#8187)
  * Fixed PHP to support field numbers &gt;=2**28. (#8235)
  * feat: add support for deprecated fields to PHP compiler (#8223)
  * Protect against stack overflow if the user derives from Message. (#8248)
  * Fixed clone for Message, RepeatedField, and MapField. (#8245)
  * Updated upb to allow nonzero offset minutes in JSON timestamps. (#8258)
  Ruby
  * Added support for Ruby 3. (#8184)
  * Rewrote the data storage layer to be based on upb_msg objects from the
    upb library. This should lead to much better parsing performance,
    particularly for large messages. (#8184).
  * Fill out JRuby support (#7923)
  * [Ruby] Fix: (SIGSEGV) gRPC-Ruby issue on Windows. memory alloc infinite
    recursion/run out of memory (#8195)
  * Fix jruby support to handle messages nested more than 1 level deep (#8194)
  Java
  * Avoid possible UnsupportedOperationException when using CodedInputSteam
    with a direct ByteBuffer.
  * Make Durations.comparator() and Timestamps.comparator() Serializable.
  * Add more detailed error information for dynamic message field type
    validation failure
  * Removed declarations of functions declared in java_names.h from
    java_helpers.h.
  * Now Proto3 Oneof fields have 'has' methods for checking their presence in
    Java.
  * Annotates Java proto generated *_FIELD_NUMBER constants.
  * Add -assumevalues to remove JvmMemoryAccessor on Android.
  C#
  * Fix parsing negative Int32Value that crosses segment boundary (#8035)
  * Change ByteString to use memory and support unsafe create without copy (#7645)
  * Optimize MapField serialization by removing MessageAdapter (#8143)
  * Allow FileDescriptors to be parsed with extension registries (#8220)
  * Optimize writing small strings (#8149)

- Updated URL to https://github.com/protocolbuffers/protobuf
- Update to v3.14.0
  Protocol Compiler
  * The proto compiler no longer requires a .proto filename when it is not
    generating code.
  * Added flag `--deterministic_output` to `protoc --encode=...`.
  * Fixed deadlock when using google.protobuf.Any embedded in aggregate options.
  C++
  * Arenas are now unconditionally enabled. cc_enable_arenas no longer has
    any effect.
  * Removed inlined string support, which is incompatible with arenas.
  * Fix a memory corruption bug in reflection when mixing optional and
    non-optional fields.
  * Make SpaceUsed() calculation more thorough for map fields.
  * Add stack overflow protection for text format with unknown field values.
  * FieldPath::FollowAll() now returns a bool to signal if an out-of-bounds
    error was encountered.
  * Performance improvements for Map.
  * Minor formatting fix when dumping a descriptor to .proto format with
    DebugString.
  * UBSAN fix in RepeatedField
  * When running under ASAN, skip a test that makes huge allocations.
  * Fixed a crash that could happen when creating more than 256 extensions in
    a single message.
  * Fix a crash in BuildFile when passing in invalid descriptor proto.
  * Parser security fix when operating with CodedInputStream.
  * Warn against the use of AllowUnknownExtension.
  * Migrated to C++11 for-range loops instead of index-based loops where
    possible. This fixes a lot of warnings when compiling with -Wsign-compare.
  * Fix segment fault for proto3 optional
  * Adds a CMake option to build `libprotoc` separately
  Java
  * Bugfix in mergeFrom() when a oneof has multiple message fields.
  * Fix RopeByteString.RopeInputStream.read() returning -1 when told to read
    0 bytes when not at EOF.
  * Redefine remove(Object) on primitive repeated field Lists to avoid
    autoboxing.
  * Support '\u' escapes in textformat string literals.
  * Trailing empty spaces are no longer ignored for FieldMask.
  * Fix FieldMaskUtil.subtract to recursively remove mask.
  * Mark enums with `@java.lang.Deprecated` if the proto enum has option
    `deprecated = true;`.
  * Adding forgotten duration.proto to the lite library
  Python
  * Print google.protobuf.NullValue as null instead of 'NULL_VALUE' when it is
    used outside WKT Value/Struct.
  * Fix bug occurring when attempting to deep copy an enum type in python 3.
  * Add a setuptools extension for generating Python protobufs
  * Remove uses of pkg_resources in non-namespace packages
  * [bazel/py] Omit google/__init__.py from the Protobuf runtime
  * Removed the unnecessary setuptools package dependency for Python package
  * Fix PyUnknownFields memory leak
  PHP
  * Added support for '==' to the PHP C extension
  * Added `==` operators for Map and Array
  * Native C well-known types
  * Optimized away hex2bin() call in generated code
  * New version of upb, and a new hash function wyhash in third_party
  * add missing hasOneof method to check presence of oneof fields
  Go:
  * Update go_package options to reference google.golang.org/protobuf module.
  C#:
  * annotate ByteString.CopyFrom(ReadOnlySpan&lt;byte&gt;) as SecuritySafeCritical
  * Fix C# optional field reflection when there are regular fields too
  * Fix parsing negative Int32Value that crosses segment boundary
  Javascript:
  * JS: parse (un)packed fields conditionally
- from version 3.13.0
  PHP:
  * The C extension is completely rewritten. The new C extension has significantly
    better parsing performance and fixes a handful of conformance issues. It will
    also make it easier to add support for more features like proto2 and proto3 presence.
  * The new C extension does not support PHP 5.x. PHP 5.x users can still use pure-PHP.
  C++:
  * Removed deprecated unsafe arena string accessors
  * Enabled heterogeneous lookup for std::string keys in maps.
  * Removed implicit conversion from StringPiece to std::string
  * Fix use-after-destroy bug when the Map is allocated in the arena.
  * Improved the randomness of map ordering
  * Added stack overflow protection for text format with unknown fields
  * Use std::hash for proto maps to help with portability.
  * Added more Windows macros to proto whitelist.
  * Arena constructors for map entry messages are now marked 'explicit'
    (for regular messages they were already explicit).
  * Fix subtle aliasing bug in RepeatedField::Add
  * Fix mismatch between MapEntry ByteSize and Serialize with respect to unset
    fields.
  Python:
  * JSON format conformance fixes:
    * Reject lowercase t for Timestamp json format.
    * Print full_name directly for extensions (no camelCase).
    * Reject boolean values for integer fields.
    * Reject NaN, Infinity, -Infinity that is not quoted.
    * Base64 fixes for bytes fields: accept URL-safe base64 and missing padding.
  * Bugfix for fields/files named 'async' or 'await'.
  * Improved the error message when AttributeError is returned from __getattr__
    in EnumTypeWrapper.
  Java:
  * Fixed a bug where setting optional proto3 enums with setFooValue() would
    not mark the value as present.
  * Add Subtract function to FieldMaskUtil.
  C#:
  * Dropped support for netstandard1.0 (replaced by support for netstandard1.1).
    This was required to modernize the parsing stack to use the `Span&lt;byte&gt;`
    type internally
  * Add `ParseFrom(ReadOnlySequence&lt;byte&gt;)` method to enable GC friendly
    parsing with reduced allocations and buffer copies
  * Add support for serialization directly to a `IBufferWriter&lt;byte&gt;` or
    to a `Span&lt;byte&gt;` to enable GC friendly serialization.
    The new API is available as extension methods on the `IMessage` type
  * Add `GOOGLE_PROTOBUF_REFSTRUCT_COMPATIBILITY_MODE` define to make
    generated code compatible with old C# compilers (pre-roslyn compilers
    from .NET framework and old versions of mono) that do not support
    ref structs. Users that are still on a legacy stack that does
    not support C# 7.2 compiler might need to use the new define
    in their projects to be able to build the newly generated code
  * Due to the major overhaul of parsing and serialization internals,
    it is recommended to regenerate your generated code to achieve the best
    performance (the legacy generated code will still work, but might incur
    a slight performance penalty).

- Fix the python subpackage generation
  gh#openSUSE/python-rpm-macros#79

- Support multiple python3 flavors gh#openSUSE/python-rpm-macros#66

- Update to version 3.12.3; notable changes since 3.11.4:
  Protocol Compiler
  * [experimental] Singular, non-message typed fields in proto3 now support
    presence tracking. This is enabled by adding the 'optional' field label and
    passing the --experimental_allow_proto3_optional flag to protoc.
    * For usage info, see docs/field_presence.md.
    * During this experimental phase, code generators should update to support
      proto3 presence, see docs/implementing_proto3_presence.md for instructions.
  * Allow duplicate symbol names when multiple descriptor sets are passed on
    the command-line, to match the behavior when multiple .proto files are passed.
  * Deterministic `protoc --descriptor_set_out` (#7175)
  Objective-C
  * Tweak the union used for Extensions to support old generated code. #7573
  * Fix for the :protobuf_objc target in the Bazel BUILD file. (#7538)
    if p['result'] == 'FAIL': 
  * [experimental] ObjC Proto3 optional support (#7421)
  * Block subclassing of generated classes (#7124)
  * Use references to Obj C classes instead of names in descriptors. (#7026)
  * Revisit how the WKTs are bundled with ObjC. (#7173)
  C++
  * Simplified the template export macros to fix the build for mingw32. (#7539)
  * [experimental] Added proto3 presence support.
  * New descriptor APIs to support proto3 presence.
  * Enable Arenas by default on all .proto files.
  * Documented that users are not allowed to subclass Message or MessageLite.
  * Mark generated classes as final; inheriting from protos is strongly discouraged.
  * Add stack overflow protection for text format with unknown fields.
  * Add accessors for map key and value FieldDescriptors.
  * Add FieldMaskUtil::FromFieldNumbers().
  * MessageDifferencer: use ParsePartial() on Any fields so the diff does not
    fail when there are missing required fields.
  * ReflectionOps::Merge(): lookup messages in the right factory, if it can.
  * Added Descriptor::WellKnownTypes enum and Descriptor::well_known_type()
    accessor as an easier way of determining if a message is a Well-Known Type.
  * Optimized RepeatedField::Add() when it is used in a loop.
  * Made proto move/swap more efficient.
  * De-virtualize the GetArena() method in MessageLite.
  * Improves performance of json_stream_parser.cc by factor 1000 (#7230)
  * bug: #7076 undefine Windows OUT and OPTIONAL macros (#7087)
  * Fixed a bug in FieldDescriptor::DebugString() that would erroneously print
    an 'optional' label for a field in a oneof.
  * Fix bug in parsing bool extensions that assumed they are always 1 byte.
  * Fix off-by-one error in FieldOptions::ByteSize() when extensions are present.
  * Clarified the comments to show an example of the difference between
    Descriptor::extension and DescriptorPool::FindAllExtensions.
  * Add a compiler option 'code_size' to force optimize_for=code_size on all
    protos where this is possible.
  Ruby
  * Re-add binary gems for Ruby 2.3 and 2.4. These are EOL upstream, however
    many people still use them and dropping support will require more
    coordination.
  * [experimental] Implemented proto3 presence for Ruby. (#7406)
  * Stop building binary gems for ruby &lt;2.5 (#7453)
  * Fix for wrappers with a zero value (#7195)
  * Fix for JSON serialization of 0/empty-valued wrapper types (#7198)
  * Call 'Class#new' over rb_class_new_instance in decoding (#7352)
  * Build extensions for Ruby 2.7 (#7027)
  * assigning 'nil' to submessage should clear the field. (#7397)
  Java
  * [experimental] Added proto3 presence support.
  * Mark java enum _VALUE constants as @Deprecated if the enum field is deprecated
  * reduce &lt;clinit&gt; size for enums with allow_alias set to true.
  * Sort map fields alphabetically by the field's key when printing textproto.
  * Fixed a bug in map sorting that appeared in -rc1 and -rc2 (#7508).
  * TextFormat.merge() handles Any as top level type.
  * Throw a descriptive IllegalArgumentException when calling
    getValueDescriptor() on enum special value UNRECOGNIZED instead of
    ArrayIndexOutOfBoundsException.
  * Fixed an issue with JsonFormat.printer() where setting printingEnumsAsInts()
    would override the configuration passed into includingDefaultValueFields().
  * Implement overrides of indexOf() and contains() on primitive lists returned
    for repeated fields to avoid autoboxing the list contents.
  * Add overload to FieldMaskUtil.fromStringList that accepts a descriptor.
  * [bazel] Move Java runtime/toolchains into //java (#7190)
  Python
  * [experimental] Added proto3 presence support.
  * [experimental] fast import protobuf module, only works with cpp generated code linked in.
  * Truncate 'float' fields to 4 bytes of precision in setters for pure-Python
    implementation (C++ extension was already doing this).
  * Fixed a memory leak in C++ bindings.
  * Added a deprecation warning when code tries to create Descriptor objects
    directly.
  * Fix unintended comparison between bytes and string in descriptor.py.
  * Avoid printing excess digits for float fields in TextFormat.
  * Remove Python 2.5 syntax compatibility from the proto compiler generated _pb2.py module code.
  * Drop 3.3, 3.4 and use single version docker images for all python tests (#7396)
  JavaScript
  * Fix js message pivot selection (#6813)
  PHP
  * Persistent Descriptor Pool (#6899)
  * Implement lazy loading of php class for proto messages (#6911)
  * Correct @return in Any.unpack docblock (#7089)
  * Ignore unknown enum value when ignore_unknown specified (#7455)
  C#
  * [experimental] Add support for proto3 presence fields in C# (#7382)
  * Mark GetOption API as obsolete and expose the 'GetOptions()' method on descriptors instead (#7491)
  * Remove Has/Clear members for C# message fields in proto2 (#7429)
  * Enforce recursion depth checking for unknown fields (#7132)
  * Fix conformance test failures for Google.Protobuf (#6910)
  * Cleanup various bits of Google.Protobuf (#6674)
  * Fix latest ArgumentException for C# extensions (#6938)
  * Remove unnecessary branch from ReadTag (#7289)
  Other
  * Add a proto_lang_toolchain for javalite (#6882)
  * [bazel] Update gtest and deprecate //external:{gtest,gtest_main} (#7237)
  * Add application note for explicit presence tracking. (#7390)
  * Howto doc for implementing proto3 presence in a code generator. (#7407)

- Python: Add requirement on python-six

- Update to version 3.11.4; notable changes since 3.9.2:
  * C++: Make serialization method naming consistent
  * C++: Moved ShutdownProtobufLibrary() to message_lite.h. For
         backward compatibility a declaration is still available
         in stubs/common.h, but users should prefer message_lite.h
  * C++: Removed non-namespace macro EXPECT_OK()
  * C++: Removed mathlimits.h from stubs in favor of using
         std::numeric_limits from C++11
  * C++: Support direct pickling of nested messages
  * C++: Disable extension code gen for C#
  * C++: Switch the proto parser to the faster MOMI parser
  * C++: Unused imports of files defining descriptor extensions
         will now be reported
  * C++: Add proto2::util::RemoveSubranges to remove multiple
         subranges in linear time
  * C++: Support 32 bit values for ProtoStreamObjectWriter to Struct
  * C++: Removed the internal-only header coded_stream_inl.h and
         the internal-only methods defined there
  * C++: Enforced no SWIG wrapping of descriptor_database.h
         (other headers already had this restriction)
  * C++: Implementation of the equivalent of the MOMI parser for
         serialization. This removes one of the two serialization
         routines, by making the fast array serialization routine
         completely general. SerializeToCodedStream can now be
         implemented in terms of the much much faster array
         serialization. The array serialization regresses slightly,
         but when array serialization is not possible this wins big
  * C++: Add move constructor for Reflection's SetString
  * Java: Remove the usage of MethodHandle, so that Android users
          prior to API version 26 can use protobuf-java
  * Java: Publish ProGuard config for javalite
  * Java: Include unknown fields when merging proto3 messages in
          Java lite builders
  * Java: Have oneof enums implement a separate interface (other
          than EnumLite) for clarity
  * Java: Opensource Android Memory Accessors
  * Java: Change ProtobufArrayList to use Object[] instead of
          ArrayList for 5-10% faster parsing
  * Java: Make a copy of JsonFormat.TypeRegistry at the protobuf
          top level package. This will eventually replace
          JsonFormat.TypeRegistry
  * Java: Add Automatic-Module-Name entries to the Manifest
  * Python: Add float_precision option in json format printer
  * Python: Optionally print bytes fields as messages in unknown
            fields, if possible
  * Python: Experimental code gen (fast import protobuf module)
            which only work with cpp generated code linked in
  * Python: Add descriptor methods in descriptor_pool are deprecated
  * Python: Added delitem for Python extension dict
  * JavaScript: Remove guard for Symbol iterator for jspb.Map
  * JavaScript: Remove deprecated boolean option to getResultBase64String()
  * JavaScript: Change the parameter types of binaryReaderFn in
                ExtensionFieldBinaryInfo to (number, ?, ?)
  * JavaScript: Create dates.ts and time_of_days.ts to mirror Java
                versions. This is a near-identical conversion of
                c.g.type.util.{Dates,TimeOfDays} respectively
  * JavaScript: Migrate moneys to TypeScript
  * PHP: Increase php7.4 compatibility
  * PHP: Implement lazy loading of php class for proto messages
  * Ruby: Support hashes for struct initializers
  * C#: Experimental proto2 support is now officially available
  * C#: Change _Extensions property to normal body rather than expression
  * Objective C: Remove OSReadLittle* due to alignment requirements
  * Other: Override CocoaPods module to lowercase
  * further bugfixes and optimisations

- Use tarball provided by upstream
- Small package cleanup

- Updated to version 3.9.2 (bsc#1162343)
   (Objective-C)
  * Remove OSReadLittle* due to alignment requirements. (#6678)
  * Don't use unions and instead use memcpy for the type swaps. (#6672)

- Package also the protobuf-bom pom file

- Update to new upstream release 3.9.1
  * Optimized the implementation of RepeatedPtrFieldBase.
  * Added delimited parse and serialize util.
  * Added FieldDescriptor::PrintableNameForExtension() and
    DescriptorPool::FindExtensionByPrintableName(). The latter
    will replace Reflection::FindKnownExtensionByName().
  * Created a new Add method in repeated field that allows adding
    a range of elements all at once.
  * Drop building wheel for Python 3.4.

- Specify java source and target levels in order to build
  compatible protobuf-java binaries

- Update to new upstream release 3.8.0
  * Introduced new MOMI (maybe-outside-memory-interval) parser.
  * Added use of C++ override keyword where appropriate.
  * Always declare enums to be int-sized.
  * Append '_' to C++ reserved keywords for message, enum, extension.

- Disable LTO (boo#1133277).

- fixes build with Bazel 0.22.0.

- Add protobuf-source package - some programs using gRPC and
  protobuf need protobuf definitions which are included inside the
  source code, but are not included in the devel package.

- Add maven pom files to the protobuf-java package

- update to version v3.6.1:
  * PHP namespaces for nested messages and enums (#4536)
  * Allows the json marshaller to be passed json marshal options (#4252)
  * Make sure to delete temporary maps used by FileDescriptorTables
  * fix python cpp kokoro build
  * Change C# reflection to avoid using expression trees
  * Updated checked-in generated code
  * Removed unused variables in repeated_scalar_container.cc
  * Removed unused code pertaining to shared_ptr
  * Include no_package.proto in Python test
  * Only check filenames when end with .py in _CalledFromGeneratedFile() (#4262)
  * Convert descriptortype to type for upb_msgval_sizeof (#4357)
  * Removed duplicate using statement from ReflectionUtil.cs
  * Add support for power ppc64le
  * Cat the test-suite.log on errors for presubits
  * Address review comments
  * Add third-party RPC implementation: raster - a network framework supports pbrpc by 'service' keyword.
  * Delete javanano kokoro build configs.
  * Updated Ruby conformance test failure list
  * Removed use of some type traits
  * Adopt php_metadata_namespace in php code generator (#4622)
  * Move to Xcode 9.3 which also means a High Sierra image.
  * Add protoc release script for Linux build.
  * protoc-artifacts: Avoid storing temporary files and use fewer layers
  * Rewrite go_benchmark
  * Add files to build ruby artifact for mac on kokoro (#4814)
  * Remove javanano.
  * Comment out unused command from release script.
  * Avoid direct check of class name (#4601)
  * The JsonParseOptions::ignore_unknown_fields option behavior treats
  * Fix php memory leak test (#4692)
  * Fix benchmark build
  * Add VS2017 optional component dependency details to the C# readme (#4128)
  * Fix initialization with Visual Studio
  * For windows, all python version should use /MT (#4468)
  * use brew install instead of easy_install in OSX (#4537)
  * Sync upb change (#4373)
  * Always add -std=c++11 for mac (#4684)
  * Add kokoro build status badges.
  * Removed unrecognized option from no_package.proto
  * Fixed up proto3_lite_unittest.cc
  * Update Xcode settings
  * Cleanup LICENSE file.
  * Remove js_embed binary. (#4709)
  * Fixed JS parsing of unspecified map keys
  * Update version number to 3.6.0
  * Deliberately call simple code to avoid Unity linker pruning
  * Revert 'Move `compiler/plugin.pb.cc` to libprotobuf with the other WKT sources.'
  * protoc-artifacts: Use ENTRYPOINT to enable devtoolset-1.1
  * MinGW build failed
  * Support using MSVC intrinsics in Log2FloorNonZero
  * Fix array constructor in c extension for compatibility (#4667)
  * Add space between class name and concat message (#4577)
  * fix python
  * Add performance.md and add instruction for linking tcmalloc
  * Add script for run and upload the benchmark result to bq
  * Add test for failing write of raw pointer to output stream
  * [objectivec] Fix memory leak of exceptions raised by RaiseException() (#4556)
  * Remove stray indent on normal imports.
  * Fix python ext build on kokoro (#4527)
  * Add compile test sources for to test include order.
  * Fixed a Visual Studio 2017 build error. (#4488)
  * fix linux kokoro build in docker
  * Fixes MSVC compiler warning C4800 'Forcing value to bool 'true' or 'false'' (#4350)
  * Updated Docker setup to use GCC 4.8
  * Remove broken build status icons.
  * Run autogen.sh in release script.
  * Output *_pb2_grpc.py when use_grpc_plugin=True
  * Adopt ruby_package in ruby generated code. (#4627)
  * Cygwin build failed
  * Work around an 'old runtime' issue with reflection
  * Added Kokoro protoc release build for OS X (#4770)
  * Updated change log for 3.6.1 release
  * Move methods out of class (#4697)
  * Fix to allow AOT compilers to play nicely with reflection
  * Update Makefile.am for Java lite files.
  * Added map_lite_test.proto to fix LiteTest
  * Introduce a compatiblity shim to support .NET 3.5 delegate creation
  * Revert 'Removed mention of Buffer in byteSourceToUint8Array'
  * Add gogo benchmark
  * Set ext.no_native = true for non mac platform
  * Removed atomicops.h since it is no longer used
  * Rename a shadowed variable.
  * Add kokoro bazel configs for 3.6.x branch.
  * Deleted scoped_ptr.h
  * Check the message to be encoded is the wrong type. (#4885) (#4949)
  * protoc-artifacts: Avoid checking out protobuf code
  * Add conformance test for null value in list JSON
  * Build ruby gem on kokoro (#4819)
  * Try using a new version of Visual Studio on AppVeyor
  * Make ruby release configs consistent with protoc.
  * fix for API change in PHP 7.3 (#4898)
  * Add .proto files to extract_includes.bat
  * Update protoc build scripts.
  * Blacklist all WELL_KNOWN_PROTOS from Bazel C++ code generation.
  * Additional support for building and deploying ppcle_64 artifacts
  * Fix php tests
  * Cleanup + documentation for Java Lite runtime.
  * Added Kokoro Windows release build config for protoc (#4766)
  * typo
  * fix golang kokoro linux build
  * Fix spelling error of __GNUC_MINOR__
  * Update code to work for Xcode 10b1 (#4729)
  * Added pyext/thread_unsafe_shared_ptr.h
  * Added missing .inc files to BUILD
  * js message support for jstype string on integers (#4332)
  * Improve error message when googletest is missing.
  * Make assertEquals pass for message (#4947)
  * Sync internal benchmark changes
  * Removed some unused C++ source files
  * Fix missing LIBPROTOC_EXPORT.
  * Added new test source files to Makefile.am
  * Update php version to 3.6.0 (#4736)
  * Fix RepeatedField#delete_if (#4292)
  * Merge branch (#4466)
  * Implement array constructor in php c extension.
  * protoc-artifacts: Update centos base from 6.6 to 6.9
  * PHP array constructors for protobuf messages (#4530)
  * Fix problem: cmake build failed in c++11  by clang
  * Don't assume Windows builds use MSVC.
  * Use legacy name in php runtime (#4741)
  * Add file option php_metadata_namespace and ruby_package (#4609)
  * Fix cpp benchmark dependency on mac
  * Use the first enum value instead of 0 in DefaultValueObjectWriter::FindEnumDefault
  * Check return value on write of raw pointer
  * Delete unused directories.
  * Replace //:protoc and similar default macro arguments with
  * Add extra C# file to Makefile.am
  * includes the expected class in the exception, otherwise the error is harder to track down (#3371)
  * Update instructions about getting protobuf source.
  * Add cpp tests under release docker image.
  * fix java benchmark, fix dashboard build
  * `update_file_lists.sh` depends on Bash features, thus needs Bash sebang.
  * Rename build_artifacts.cfg to release.cfg (#4818)
  * Fix bug: whether always_print_enums_as_ints is true or false, it always print the default value of enums as strings
  * source code info for interpreted options; fix source code info for extension range options (#4342)
  * Updated version numbers to 3.6.1
  * Trim imports for bundled generated protos.
  * Require C++11 and pass -std=c++11
  * Remove the iOS Test App.
  * fix duplicate mkdir in update_file_lists.sh
  * Updated csharp/README.md to reflect testing changes
  * Fix bazel build of examples.
  * Add missing ruby/tests/test_ruby_package.proto
  * Fix cpp_distcheck
  * Updated the change log with changes for 3.6.0
  * some fix
  * CMake: Update CXX Standard management
  * Add the files added in #4485.
  * Change to deal all messages in one loop
  * Fix php conformance test.
  * Add __init__.py files to compiler and util subpackages (#4117)
  * Updated .gitignore to exclude downloaded gmock/ directory
  * Fix error in Clang UndefinedBehaviorSanitizer
  * Work around MSVC issue with std::atomic initialization (#4777)
  * Updated conformance failure lists
  * Add back GeneratedClassName to public (#4686)
  * Add continuous test for ruby 2.3, 2.4 and 2.5 (#4829)
  * Throw error if user want to access message properties (#4603)
  * fix json_decode call parameters (#4381)
  * Move `compiler/plugin.pb.cc` to libprotobuf with the other WKT sources.
  * PHP: fixed typo in message.c
  * Add go benchmark
  * Allow list values to be null when parsing
  * Added instruction for existing ZLIB configuration
  * Fix 32bit php tests
  * Removed javanano from post_process_dist.sh
  * Don't generate imports for the WKTs unless generating the WKTs.
  * For encoding upb needs descriptor type instead of type. (#4354)
  * Include googletest as a submodule (#3993)
  * Write messages to backing field in generated C# cloning code (#4440)
  * Integrated internal changes from Google
- bump soname version

update to version v3.5.2:
  * Update release date
  * Disable pip cache when testing uploaded packages
  * Replace private timelib_update_ts with public date_timestamp_get
  * Remove py2.6 support.
  * Cherrypick for csharp, including:
  * Update changelog
  * Update changelog for 3.5.1
  * Fix uploading binary wheel.
  * Fix memory leak when creating map field via array.
  * Update rake file to build of 2.1.6.
  * Avoid using php_date_get_date_ce() in case date extension is not
  * Update protoc-artfacts
  * Fix string::back() usage in googletest.cc
  * Fix memory leak in php7
  * Support ruby2.5
  * io_win32: support non-ASCII paths
  * Explicitly propagate the status of Flush().
  * Add discard unknown API in ruby. (#3990)
  * Update version for 3.5.0.post1
  * remove nullptr
  * Fix more memory leak for php c extension (#4211)
  * Bumping number to fix ruby 2.1 on mac
  * io_win32_unittest: remove incorrect error check
  * Fix memory leak when creating repeated field via array.
  * Update version number for php c extension (#3896)
  * Fix file permission for python package.
  * Create containing directory before generating well_known_types_embed.cc
  * Replace C++11 only method std::map::at
  * Recursively clear unknown fields in submessages. (#3982)
  * Update version number to 3.5.1
  * io_win32_unittest: fix condition in GetCwdAsUtf8
  * Add release log
  * io_win32_unittest: use CWD as last tempdir
  * Add PROTOBUF_ENABLE_TIMESTAMP to let user decide whether timestamp util
  * Add support for Windows ARM64 build
  * Add protobuf-all in post release
  * Use fully qualifed name for DescriptorPool in Any.php to avoid name (#3886)
  * Add _file_desc_by_toplevel_extension back
  * Fix setup.py for windows build.
  * io_win32_unittest: make //:win32_test run again
  * Provide discardUnknonwnFields API in php (#3976)
  * Update php c extension version number to 3.5.0.1
  * Fix ruby gc_test in ruby 2.4 (#4011)
  * Remove duplicate typedef. (#3975)
  * Accept DatetimeInterface in fromDatetime
  * io_win32: add more encoding-related tests
  * Bump version number to 3.5.2
  * Bump protoc-artifact version for a patch rebuild
  * Call php method via function name instead of calling directly.
  * Well known types are not initialized properly. (#4139)
  * Use matching enum type for IsPOD.
  * Fix several more memory leak
  * Fix for php5.5
  * Add backslach to make class explict in global namespace

  * Fix compile error undefined reference to
    `google::protobuf::internal::Release_CompareAndSwap(long volatile*, long, long)'
    on s390x https://github.com/google/protobuf/issues/3937

- Conditionalize python2 and python3 in order to be able to build
  without python2 present in distribution
  * Use singlespec macros to simplify the logic
- Run fdupes on python modules to avoid duplicates
- Remove shebangs from import-only code

- Update to new upstream release 3.5.0
  * Proto3 messages are now preserving unknown fields by default.
    If you rely on unknowns fields being dropped, use
    DiscardUnknownFields() explicitly.
  * Deprecated the unsafe_arena_release_* and
    unsafe_arena_add_allocated_* methods for string fields.
  * Added move constructor and move assignment to RepeatedField,
    RepeatedPtrField and google::protobuf::Any.
  * Added perfect forwarding in Arena::CreateMessage.
  * In-progress experimental support for implicit weak fields
    with lite protos. This feature allows the linker to strip out
    more unused messages and reduce binary size.
- Rename %soname to %sover to better reflect its use.

- Install LICENSE

- Update to 3.3.0 :
  * C++:
    * Fixed map fields serialization of DynamicMessage to correctly serialize
      both key and value regardless of their presence.
    * Parser now rejects field number 0 correctly.
    * New API Message::SpaceUsedLong() that’s equivalent to
      Message::SpaceUsed() but returns the value in size_t.
    * JSON support
      - New flag always_print_enums_as_ints in JsonPrintOptions.
      - New flag preserve_proto_field_names in JsonPrintOptions. It will instruct
        the JSON printer to use the original field name declared in the .proto
        file instead of converting them to lowerCamelCase when printing JSON.
      - JsonPrintOptions.always_print_primtive_fields now works for oneof message
        fields.
      - Fixed a bug that doesn’t allow different fields to set the same json_name
        value.
      - Fixed a performance bug that causes excessive memory copy when printing
        large messages.
    * Various performance optimizations.
  * Java:
    * Map field setters eagerly validate inputs and throw NullPointerExceptions
      as appropriate.
    * Added ByteBuffer overloads to the generated parsing methods and the Parser
      interface.
    * proto3 enum's getNumber() method now throws on UNRECOGNIZED values.
    * Output of JsonFormat is now locale independent.
  * Python:
    * Added FindServiceByName() in the pure-Python DescriptorPool. This works only
      for descriptors added with DescriptorPool.Add(). Generated descriptor_pool
      does not support this yet.
    * Added a descriptor_pool parameter for parsing Any in text_format.Parse().
    * descriptor_pool.FindFileContainingSymbol() now is able to find nested
      extensions.
    * Extending empty [] to repeated field now sets parent message presence.
- Update to 3.2.0 :
  * Added protoc version number to protoc plugin protocol. It can be used by
    protoc plugin to detect which version of protoc is used with the plugin and
    mitigate known problems in certain version of protoc.
  * C++:
    * The default parsing byte size limit has been raised from 64MB to 2GB.
    * Added rvalue setters for non-arena string fields.
    * Enabled debug logging for Android.
    * Fixed a double-free problem when using Reflection::SetAllocatedMessage()
      with extension fields.
    * Fixed several deterministic serialization bugs:
      * MessageLite::SerializeAsString() now respects the global deterministic
        serialization flag.
      * Extension fields are serialized deterministically as well.  Fixed protocol
        compiler to correctly report importing-self as an error.
    * Fixed FileDescriptor::DebugString() to print custom options correctly.
    * Various performance/codesize optimizations and cleanups.
  * Java:
    * The default parsing byte size limit has been raised from 64MB to 2GB.
    * Added recursion limit when parsing JSON.
    * Fixed a bug that enumType.getDescriptor().getOptions() doesn't have custom
      options.
    * Fixed generated code to support field numbers up to 2^29-1.
  * Python:
    * You can now assign NumPy scalars/arrays (np.int32, np.int64) to protobuf
      fields, and assigning other numeric types has been optimized for
      performance.
    * Pure-Python: message types are now garbage-collectable.
    * Python/C++: a lot of internal cleanup/refactoring.
- Increase soname to 13
- Generate python2-protobuf and python3-protobuf packages in Factory
- Make the python2-protobuf package provide and obsolete python-protobuf
  to make the transition smooth in Tumbleweed

- Fix an issue with setup.py where some files are built on the
  first invocation, but only copied on the second. This resulted
  in an incomplete protobuf-python package.

- Update to protobuf v3.1.0. Protobuf v3.0.0 introduceced a new
  version of the protocol buffer language, proto3, which supersedes
  proto2.
  The protoc compiler is able to read old proto2 protocol definitions,
  and defaults to the proto2 syntax if a syntax is not specified, thus
  packages can be recompiled to link to the new library. For backwards
  compatibility, the old library version is available from the
  protobuf2 package.
  As the API for proto2 is not compatible to the proto3 API, proto3
  should only be used for new Protocol Buffers, whereas current users
  are advised to keep using proto2. For a detailed list of changes,
  see https://github.com/google/protobuf/releases

- Use py_sitedir for library installation with setup.py install

- Drop protobuf-libs as it is just workaround for rpmlint issue

- Cleanup specfile:
  * remove any conditionals for versions predating SLES 12/Leap 42.x
  * add Provides: protobuf-libs to fix rpmlint warning

Changes in python-python-gflags:
- Don't provide python2-gflags, singlespec packages should use
  correct name.

- Provide python-gflags in the python2 package

- Fix URL.

- Update to version 3.1.1
  * Added PEP8 style method/function aliases.
- Update to version 3.1.0
  * Python3 compatibility
  * Removed UnrecognizedFlag exception.
  * Replaced flags.DuplicateFlag with flags.DuplicateFlagError.
  * Moved the validators.Error class to exceptions.ValidationError.
  * Renamed IllegalFlagValue to IllegalFlagValueError.
  * Removed MutualExclusionValidator class, in favor of flags.MarkFlagsAsMutualExclusive.
  * Removed FlagValues.AddValidator method.
  * Removed _helpers.GetMainModule.
  * Use xml.dom.minidom to create XML strings, instead of manual crafting.
  * Declared PEP8-style names.
  * Added examples.
- Update to version 3.0.7
  * Removed the unused method ShortestUniquePrefixes.
  * Removed _GetCallingModule function alias.
- Update to version 3.0.6
  * Declared pypi package classifiers.
  * Added support for CLIF flag processing (not included in python-gflags repo
    yet).
- Update to version 3.0.5
  * Added a warning when FLAGS.SetDefault is used after flags were parsed.
  * Added new function: MarkFlagsAsRequired.
- Update to version 3.0.4
  * One more fix for setup.py - this time about third_party package.
- Update to version 3.0.3
  * Fixed setup.py.
  * --noflag if argument is given is no longer allowed.
  * Python3 compatibility: removed need for cgi import.
  * Disallowed unparsed flag usage after FLAGS.Reset()
- Update to version 3.0.2
  * Fix MANIFEST.in to include all relevant files.
- Update to version 3.0.1
  * Some changes for python3 compatibility.
  * Automatically generate ordering operations for Flag.
  * Add optional comma compatibility to whitespace-separated list flags.
  * A lot of potentially backwards incompatible changes since 2.0.
  * This version is NOT recommended to use in production. Some of the files and
    documentation has been lost during export; this will be fixed in next
    versions.
- Fix source URL
- Implement single-spec version

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-15"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036025">SUSE bug 1036025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133277">SUSE bug 1133277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162343">SUSE bug 1162343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651303" comment="javapackages-filesystem-5.3.1-14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651257" comment="mysql-connector-java-8.0.25-5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148520" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1081947" ref_url="https://bugzilla.suse.com/1081947" source="BUGZILLA"/>
		<reference ref_id="1082293" ref_url="https://bugzilla.suse.com/1082293" source="BUGZILLA"/>
		<reference ref_id="1084671" ref_url="https://bugzilla.suse.com/1084671" source="BUGZILLA"/>
		<reference ref_id="1085196" ref_url="https://bugzilla.suse.com/1085196" source="BUGZILLA"/>
		<reference ref_id="1106214" ref_url="https://bugzilla.suse.com/1106214" source="BUGZILLA"/>
		<reference ref_id="1122417" ref_url="https://bugzilla.suse.com/1122417" source="BUGZILLA"/>
		<reference ref_id="1125886" ref_url="https://bugzilla.suse.com/1125886" source="BUGZILLA"/>
		<reference ref_id="1135534" ref_url="https://bugzilla.suse.com/1135534" source="BUGZILLA"/>
		<reference ref_id="1135708" ref_url="https://bugzilla.suse.com/1135708" source="BUGZILLA"/>
		<reference ref_id="1151708" ref_url="https://bugzilla.suse.com/1151708" source="BUGZILLA"/>
		<reference ref_id="1168235" ref_url="https://bugzilla.suse.com/1168235" source="BUGZILLA"/>
		<reference ref_id="1168389" ref_url="https://bugzilla.suse.com/1168389" source="BUGZILLA"/>
		<reference ref_id="1169006" ref_url="https://bugzilla.suse.com/1169006" source="BUGZILLA"/>
		<reference ref_id="1174942" ref_url="https://bugzilla.suse.com/1174942" source="BUGZILLA"/>
		<reference ref_id="1175514" ref_url="https://bugzilla.suse.com/1175514" source="BUGZILLA"/>
		<reference ref_id="1175623" ref_url="https://bugzilla.suse.com/1175623" source="BUGZILLA"/>
		<reference ref_id="1178236" ref_url="https://bugzilla.suse.com/1178236" source="BUGZILLA"/>
		<reference ref_id="1178554" ref_url="https://bugzilla.suse.com/1178554" source="BUGZILLA"/>
		<reference ref_id="1178825" ref_url="https://bugzilla.suse.com/1178825" source="BUGZILLA"/>
		<reference ref_id="1188921" ref_url="https://bugzilla.suse.com/1188921" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37600" ref_url="https://www.suse.com/security/cve/CVE-2021-37600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009610.html" source="SUSE-SU"/>
		<description>
This update for util-linux fixes the following issues:

- CVE-2021-37600: Fixed an integer overflow which could lead to buffer overflow in get_sem_elements. (bsc#1188921)
- Prevent outdated pam files (bsc#1082293, bsc#1081947#c68).
- Do not trim read-only volumes (bsc#1106214).
- libmount: To prevent incorrect behavior, recognize more pseudofs and netfs (bsc#1122417).
- raw.service: Add RemainAfterExit=yes (bsc#1135534).
- agetty: Reload issue only if it is really needed (bsc#1085196)
- agetty: Return previous response of agetty for special characters (bsc#1085196, bsc#1125886)
- blockdev: Do not fail --report on kpartx-style partitions on multipath. (bsc#1168235)
- nologin: Add support for -c to prevent error from su -c. (bsc#1151708)
- Avoid triggering autofs in lookup_umount_fs_by_statfs. (bsc#1168389)
- libblkid: Do not trigger CDROM autoclose. (bsc#1084671)
- Avoid sulogin failing on not existing or not functional console devices. (bsc#1175514)
- Build with libudev support to support non-root users. (bsc#1169006)
- lscpu: avoid segfault on PowerPC systems with valid hardware configurations. (bsc#1175623, bsc#1178554, bsc#1178825)
- Fix for warning on mounts to CIFS with mount. (SG#57988, bsc#1174942)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081947">SUSE bug 1081947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082293">SUSE bug 1082293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084671">SUSE bug 1084671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085196">SUSE bug 1085196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106214">SUSE bug 1106214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122417">SUSE bug 1122417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125886">SUSE bug 1125886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135534">SUSE bug 1135534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135708">SUSE bug 1135708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151708">SUSE bug 1151708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168235">SUSE bug 1168235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168389">SUSE bug 1168389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169006">SUSE bug 1169006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174942">SUSE bug 1174942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175514">SUSE bug 1175514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175623">SUSE bug 1175623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178236">SUSE bug 1178236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178554">SUSE bug 1178554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178825">SUSE bug 1178825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188921">SUSE bug 1188921</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37600/">CVE-2021-37600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">CVE-2021-37600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652523" comment="libblkid1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652487" comment="libblkid1-32bit-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652524" comment="libfdisk1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652525" comment="libmount1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652490" comment="libmount1-32bit-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652526" comment="libsmartcols1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652527" comment="libuuid1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652493" comment="libuuid1-32bit-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652528" comment="python-libmount-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652529" comment="util-linux-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652496" comment="util-linux-lang-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652530" comment="util-linux-systemd-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652531" comment="uuidd-2.29.2-3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148521" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1191435" ref_url="https://bugzilla.suse.com/1191435" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41991" ref_url="https://www.suse.com/security/cve/CVE-2021-41991/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009611.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191435">SUSE bug 1191435</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41991/">CVE-2021-41991 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41991">CVE-2021-41991 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652805" comment="strongswan-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652801" comment="strongswan-doc-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652806" comment="strongswan-hmac-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652807" comment="strongswan-ipsec-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652808" comment="strongswan-libs0-5.1.3-26.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148522" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1178961" ref_url="https://bugzilla.suse.com/1178961" source="BUGZILLA"/>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1183118" ref_url="https://bugzilla.suse.com/1183118" source="BUGZILLA"/>
		<reference ref_id="1183168" ref_url="https://bugzilla.suse.com/1183168" source="BUGZILLA"/>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="1185952" ref_url="https://bugzilla.suse.com/1185952" source="BUGZILLA"/>
		<reference ref_id="1187751" ref_url="https://bugzilla.suse.com/1187751" source="BUGZILLA"/>
		<reference ref_id="1190177" ref_url="https://bugzilla.suse.com/1190177" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009622.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

- Fix for build with llvm12 on s390x. (bsc#1185952)
- Re-enable 'icu' for PostgreSQL 10. (bsc#1179945)
- Add postgresqlXX-server-devel as a dependency for postgresql13-server-devel. (bsc#1187751)
- Upgrade to version 10.18. (bsc#1190177)

Upgrade to version 10.17 (already released for SUSE Linux Enterprise 12 SP5):

- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).

- Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).
- Re-enable build of the llvmjit subpackage on SLE, but it will only be delivered on PackageHub for now (bsc#1183118).
- Disable icu for PostgreSQL 10 (and older) on TW (bsc#1179945).
- Fixed an issue droping irregular warning messages by removing the package. (bsc#1178961)
- Fixed an issue when build does not build the requiements to avoid dangling symlinks in the devel package. (bsc#1179765)
- Fix recently-added timetz test case so it works when the USA is not observing daylight savings time.

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178961">SUSE bug 1178961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183118">SUSE bug 1183118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183168">SUSE bug 1183168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185952">SUSE bug 1185952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187751">SUSE bug 1187751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190177">SUSE bug 1190177</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652164" comment="postgresql10-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652165" comment="postgresql10-contrib-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652158" comment="postgresql10-docs-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652166" comment="postgresql10-plperl-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652167" comment="postgresql10-plpython-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652168" comment="postgresql10-pltcl-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652169" comment="postgresql10-server-10.18-4.19.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148523" version="1" class="patch">
	<metadata>
		<title>Security update for git (Low)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1189992" ref_url="https://bugzilla.suse.com/1189992" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-40330" ref_url="https://www.suse.com/security/cve/CVE-2021-40330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009627.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2021-40330: Fixed unexpected cross-protocol requests via newline character in git_connect_git repository path (bsc#1189992).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189992">SUSE bug 1189992</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-40330/">CVE-2021-40330 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40330">CVE-2021-40330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652544" comment="git-2.26.2-27.49.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148524" version="1" class="patch">
	<metadata>
		<title>Recommended update for ardana-horizon, ardana-logging, ardana-monasca, ardana-mq, ardana-osconfig, crowbar-ha, crowbar-openstack, kibana, openstack-neutron, openstack-nova, python-Django, release-notes-suse-openstack-cloud, sleshammer, spark (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1048688" ref_url="https://bugzilla.suse.com/1048688" source="BUGZILLA"/>
		<reference ref_id="1164838" ref_url="https://bugzilla.suse.com/1164838" source="BUGZILLA"/>
		<reference ref_id="1177611" ref_url="https://bugzilla.suse.com/1177611" source="BUGZILLA"/>
		<reference ref_id="1179189" ref_url="https://bugzilla.suse.com/1179189" source="BUGZILLA"/>
		<reference ref_id="1179955" ref_url="https://bugzilla.suse.com/1179955" source="BUGZILLA"/>
		<reference ref_id="1180916" ref_url="https://bugzilla.suse.com/1180916" source="BUGZILLA"/>
		<reference ref_id="1181379" ref_url="https://bugzilla.suse.com/1181379" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8611" ref_url="https://www.suse.com/security/cve/CVE-2016-8611/" source="CVE"/>
		<reference ref_id="CVE-2020-10743" ref_url="https://www.suse.com/security/cve/CVE-2020-10743/" source="CVE"/>
		<reference ref_id="CVE-2021-3281" ref_url="https://www.suse.com/security/cve/CVE-2021-3281/" source="CVE"/>
		<reference ref_id="SUSE-RU-2021:0351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017922.html" source="SUSE-SU"/>
		<description>
This update for ardana-horizon, ardana-logging, ardana-monasca, ardana-mq, ardana-osconfig, crowbar-ha, crowbar-openstack, kibana, openstack-neutron, openstack-nova, python-Django, release-notes-suse-openstack-cloud, sleshammer, spark fixes the following issues:

Security fix from this update:
python-Django1
- CVE-2021-3281: Fixed a potential directory traversal when extracting
  archives (bsc#1181379).

Changes in ardana-horizon_Update:
- Update to version 8.0+git.1610733160.0f577f4:
  * Add Fix for logfile permissions (bsc#1179189)

Changes in ardana-logging_Update:
- Update to version 8.0+git.1610573640.452aed1:
  * Remove some files from upgrade.yml (bsc#1179189)

Changes in ardana-monasca_Update:
- Update to version 8.0+git.1610740501.5dca121:
  * Add Fix for logfile permissions (bsc#1179189)

Changes in ardana-mq_Update:
- Update to version 8.0+git.1605176800.52cccfa:
  * Re-enable mirroring of fanout and reply queues (bsc#1177611)

Changes in ardana-osconfig_Update:
- Update to version 8.0+git.1610643571.91b88d6:
  * Remove SLES-12-SP3-LTSS repos (bsc#1180916)

Changes in crowbar-ha:
- Update to version 5.0+git.1610564036.b75ee1b:
  * [5.0] crowbar-pacemaker: Cluster member SSH key improvements

Changes in crowbar-openstack:
- Update to version 5.0+git.1610402513.08dca931e:
  * neutron: Fix handling of networks with non-ascii names (SOC-11429)

- Update to version 5.0+git.1610372799.621afb999:
  * keystone: fix keystone node lookup (SOC-11333, bsc#1164838)

Changes in kibana:
- Add 0001-Configurable-custom-response-headers-for-server.patch
 (bsc#1171909, CVE-2020-10743)

- Added kibana.yml symlink (bsc#1048688, FATE#323204)


Changes in openstack-nova_Update:
- Update to version nova-16.1.9.dev78:
  * [stable-only] Cap bandit to 1.6.2

Changes in python-Django_Update:
- Add CVE-2021-3281.patch (bsc#1181379, CVE-2021-3281)
  * Fixes a potential directory traversal when extracting archives

Changes in release-notes-suse-openstack-cloud:
- Fix incorrect issue number for bsc#1179955
- Update to version 8.20201214:
  * Add workaround for secure boot issue when shim package is updated. (bsc#1179955)

Changes in spark_Update:
- Add _constraints to prevent build from running out of disk space.

Changes in sleshammer:
- Really drop etc/udev/rules.d/70-persistent-net.rules from the overlay
  it was still present in the tarball. (SOC-9288)

- added ruby2.1-rubygem-crowbar-client providing crowbarctl

		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-09"/>
	<updated date="2021-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1048688">SUSE bug 1048688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164838">SUSE bug 1164838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177611">SUSE bug 1177611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179189">SUSE bug 1179189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179955">SUSE bug 1179955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180916">SUSE bug 1180916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181379">SUSE bug 1181379</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8611/">CVE-2016-8611 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8611">CVE-2016-8611 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10743/">CVE-2020-10743 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10743">CVE-2020-10743 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3281/">CVE-2021-3281 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3281">CVE-2021-3281 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597716" comment="ardana-horizon-8.0+git.1610733160.0f577f4-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597719" comment="ardana-logging-8.0+git.1610573640.452aed1-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597720" comment="ardana-monasca-8.0+git.1610740501.5dca121-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597721" comment="ardana-mq-8.0+git.1605176800.52cccfa-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597725" comment="ardana-osconfig-8.0+git.1610643571.91b88d6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597730" comment="kibana-4.6.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597731" comment="openstack-neutron-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597732" comment="openstack-neutron-dhcp-agent-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597733" comment="openstack-neutron-doc-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597734" comment="openstack-neutron-ha-tool-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597735" comment="openstack-neutron-l3-agent-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597736" comment="openstack-neutron-linuxbridge-agent-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597737" comment="openstack-neutron-macvtap-agent-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597738" comment="openstack-neutron-metadata-agent-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597739" comment="openstack-neutron-metering-agent-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597740" comment="openstack-neutron-openvswitch-agent-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597741" comment="openstack-neutron-server-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597742" comment="openstack-nova-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597743" comment="openstack-nova-api-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597744" comment="openstack-nova-cells-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597745" comment="openstack-nova-compute-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597746" comment="openstack-nova-conductor-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597747" comment="openstack-nova-console-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597748" comment="openstack-nova-consoleauth-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597749" comment="openstack-nova-doc-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597750" comment="openstack-nova-novncproxy-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597751" comment="openstack-nova-placement-api-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597752" comment="openstack-nova-scheduler-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597753" comment="openstack-nova-serialproxy-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597754" comment="openstack-nova-vncproxy-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597755" comment="python-Django-1.11.29-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597756" comment="python-neutron-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597757" comment="python-nova-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597758" comment="release-notes-suse-openstack-cloud-8.20201214-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597759" comment="spark-1.6.3-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597760" comment="venv-openstack-horizon-x86_64-12.0.5~dev6-14.34.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597761" comment="venv-openstack-neutron-x86_64-11.0.9~dev69-13.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597762" comment="venv-openstack-nova-x86_64-16.1.9~dev78-11.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148525" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1191957" ref_url="https://bugzilla.suse.com/1191957" source="BUGZILLA"/>
		<reference ref_id="1191992" ref_url="https://bugzilla.suse.com/1191992" source="BUGZILLA"/>
		<reference ref_id="1192000" ref_url="https://bugzilla.suse.com/1192000" source="BUGZILLA"/>
		<reference ref_id="1192005" ref_url="https://bugzilla.suse.com/1192005" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42779" ref_url="https://www.suse.com/security/cve/CVE-2021-42779/" source="CVE"/>
		<reference ref_id="CVE-2021-42780" ref_url="https://www.suse.com/security/cve/CVE-2021-42780/" source="CVE"/>
		<reference ref_id="CVE-2021-42781" ref_url="https://www.suse.com/security/cve/CVE-2021-42781/" source="CVE"/>
		<reference ref_id="CVE-2021-42782" ref_url="https://www.suse.com/security/cve/CVE-2021-42782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009683.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2021-42780: Fixed use after return in insert_pin() (bsc#1192005).
- CVE-2021-42779: Fixed use after free in sc_file_valid() (bsc#1191992).
- CVE-2021-42781: Fixed multiple heap buffer overflows in pkcs15-oberthur.c (bsc#1192000).
- CVE-2021-42782: Stack buffer overflow issues in various places (bsc#1191957).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191957">SUSE bug 1191957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191992">SUSE bug 1191992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192000">SUSE bug 1192000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192005">SUSE bug 1192005</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42779/">CVE-2021-42779 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42779">CVE-2021-42779 at NVD</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-42780/">CVE-2021-42780 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42780">CVE-2021-42780 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42781/">CVE-2021-42781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42781">CVE-2021-42781 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42782/">CVE-2021-42782 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42782">CVE-2021-42782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653628" comment="opensc-0.13.0-3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148526" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1190607" ref_url="https://bugzilla.suse.com/1190607" source="BUGZILLA"/>
		<reference ref_id="1190611" ref_url="https://bugzilla.suse.com/1190611" source="BUGZILLA"/>
		<reference ref_id="1190612" ref_url="https://bugzilla.suse.com/1190612" source="BUGZILLA"/>
		<reference ref_id="1190615" ref_url="https://bugzilla.suse.com/1190615" source="BUGZILLA"/>
		<reference ref_id="1190616" ref_url="https://bugzilla.suse.com/1190616" source="BUGZILLA"/>
		<reference ref_id="1190617" ref_url="https://bugzilla.suse.com/1190617" source="BUGZILLA"/>
		<reference ref_id="1190618" ref_url="https://bugzilla.suse.com/1190618" source="BUGZILLA"/>
		<reference ref_id="1192019" ref_url="https://bugzilla.suse.com/1192019" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-21529" ref_url="https://www.suse.com/security/cve/CVE-2020-21529/" source="CVE"/>
		<reference ref_id="CVE-2020-21530" ref_url="https://www.suse.com/security/cve/CVE-2020-21530/" source="CVE"/>
		<reference ref_id="CVE-2020-21531" ref_url="https://www.suse.com/security/cve/CVE-2020-21531/" source="CVE"/>
		<reference ref_id="CVE-2020-21532" ref_url="https://www.suse.com/security/cve/CVE-2020-21532/" source="CVE"/>
		<reference ref_id="CVE-2020-21533" ref_url="https://www.suse.com/security/cve/CVE-2020-21533/" source="CVE"/>
		<reference ref_id="CVE-2020-21534" ref_url="https://www.suse.com/security/cve/CVE-2020-21534/" source="CVE"/>
		<reference ref_id="CVE-2020-21535" ref_url="https://www.suse.com/security/cve/CVE-2020-21535/" source="CVE"/>
		<reference ref_id="CVE-2021-32280" ref_url="https://www.suse.com/security/cve/CVE-2021-32280/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009685.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Update to fig2dev version 3.2.8 Patchlevel 8b (Aug 2021)

- bsc#1190618, CVE-2020-21529: stack buffer overflow in the bezier_spline function in genepic.c.
- bsc#1190615, CVE-2020-21530: segmentation fault in the read_objects function in read.c.
- bsc#1190617, CVE-2020-21531: global buffer overflow in the conv_pattern_index function in gencgm.c.
- bsc#1190616, CVE-2020-21532: global buffer overflow in the setfigfont function in genepic.c.
- bsc#1190612, CVE-2020-21533: stack buffer overflow in the read_textobject function in read.c.
- bsc#1190611, CVE-2020-21534: global buffer overflow in the get_line function in read.c.
- bsc#1190607, CVE-2020-21535: segmentation fault in the gencgm_start function in gencgm.c.
- bsc#1192019, CVE-2021-32280: NULL pointer dereference in compute_closed_spline() in trans_spline.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190607">SUSE bug 1190607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190611">SUSE bug 1190611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190612">SUSE bug 1190612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190615">SUSE bug 1190615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190616">SUSE bug 1190616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190617">SUSE bug 1190617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190618">SUSE bug 1190618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192019">SUSE bug 1192019</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21529/">CVE-2020-21529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21529">CVE-2020-21529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21530/">CVE-2020-21530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21530">CVE-2020-21530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21531/">CVE-2020-21531 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21531">CVE-2020-21531 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21532/">CVE-2020-21532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21532">CVE-2020-21532 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21533/">CVE-2020-21533 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21533">CVE-2020-21533 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21534/">CVE-2020-21534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21534">CVE-2020-21534 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21535/">CVE-2020-21535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21535">CVE-2020-21535 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32280/">CVE-2021-32280 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32280">CVE-2021-32280 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653544" comment="transfig-3.2.8b-2.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148527" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1126826" ref_url="https://bugzilla.suse.com/1126826" source="BUGZILLA"/>
		<reference ref_id="1126829" ref_url="https://bugzilla.suse.com/1126829" source="BUGZILLA"/>
		<reference ref_id="1126831" ref_url="https://bugzilla.suse.com/1126831" source="BUGZILLA"/>
		<reference ref_id="1140126" ref_url="https://bugzilla.suse.com/1140126" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1143609" ref_url="https://bugzilla.suse.com/1143609" source="BUGZILLA"/>
		<reference ref_id="1153768" ref_url="https://bugzilla.suse.com/1153768" source="BUGZILLA"/>
		<reference ref_id="1153770" ref_url="https://bugzilla.suse.com/1153770" source="BUGZILLA"/>
		<reference ref_id="1157755" ref_url="https://bugzilla.suse.com/1157755" source="BUGZILLA"/>
		<reference ref_id="1160254" ref_url="https://bugzilla.suse.com/1160254" source="BUGZILLA"/>
		<reference ref_id="1160590" ref_url="https://bugzilla.suse.com/1160590" source="BUGZILLA"/>
		<reference ref_id="1163333" ref_url="https://bugzilla.suse.com/1163333" source="BUGZILLA"/>
		<reference ref_id="1163744" ref_url="https://bugzilla.suse.com/1163744" source="BUGZILLA"/>
		<reference ref_id="1179036" ref_url="https://bugzilla.suse.com/1179036" source="BUGZILLA"/>
		<reference ref_id="1179341" ref_url="https://bugzilla.suse.com/1179341" source="BUGZILLA"/>
		<reference ref_id="1179898" ref_url="https://bugzilla.suse.com/1179898" source="BUGZILLA"/>
		<reference ref_id="1179899" ref_url="https://bugzilla.suse.com/1179899" source="BUGZILLA"/>
		<reference ref_id="1179900" ref_url="https://bugzilla.suse.com/1179900" source="BUGZILLA"/>
		<reference ref_id="1179901" ref_url="https://bugzilla.suse.com/1179901" source="BUGZILLA"/>
		<reference ref_id="1179902" ref_url="https://bugzilla.suse.com/1179902" source="BUGZILLA"/>
		<reference ref_id="1179903" ref_url="https://bugzilla.suse.com/1179903" source="BUGZILLA"/>
		<reference ref_id="1180451" ref_url="https://bugzilla.suse.com/1180451" source="BUGZILLA"/>
		<reference ref_id="1180454" ref_url="https://bugzilla.suse.com/1180454" source="BUGZILLA"/>
		<reference ref_id="1180461" ref_url="https://bugzilla.suse.com/1180461" source="BUGZILLA"/>
		<reference ref_id="1181452" ref_url="https://bugzilla.suse.com/1181452" source="BUGZILLA"/>
		<reference ref_id="1182252" ref_url="https://bugzilla.suse.com/1182252" source="BUGZILLA"/>
		<reference ref_id="1183511" ref_url="https://bugzilla.suse.com/1183511" source="BUGZILLA"/>
		<reference ref_id="1184620" ref_url="https://bugzilla.suse.com/1184620" source="BUGZILLA"/>
		<reference ref_id="1184794" ref_url="https://bugzilla.suse.com/1184794" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12972" ref_url="https://www.suse.com/security/cve/CVE-2019-12972/" source="CVE"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-14444" ref_url="https://www.suse.com/security/cve/CVE-2019-14444/" source="CVE"/>
		<reference ref_id="CVE-2019-17450" ref_url="https://www.suse.com/security/cve/CVE-2019-17450/" source="CVE"/>
		<reference ref_id="CVE-2019-17451" ref_url="https://www.suse.com/security/cve/CVE-2019-17451/" source="CVE"/>
		<reference ref_id="CVE-2019-9074" ref_url="https://www.suse.com/security/cve/CVE-2019-9074/" source="CVE"/>
		<reference ref_id="CVE-2019-9075" ref_url="https://www.suse.com/security/cve/CVE-2019-9075/" source="CVE"/>
		<reference ref_id="CVE-2019-9077" ref_url="https://www.suse.com/security/cve/CVE-2019-9077/" source="CVE"/>
		<reference ref_id="CVE-2020-16590" ref_url="https://www.suse.com/security/cve/CVE-2020-16590/" source="CVE"/>
		<reference ref_id="CVE-2020-16591" ref_url="https://www.suse.com/security/cve/CVE-2020-16591/" source="CVE"/>
		<reference ref_id="CVE-2020-16592" ref_url="https://www.suse.com/security/cve/CVE-2020-16592/" source="CVE"/>
		<reference ref_id="CVE-2020-16593" ref_url="https://www.suse.com/security/cve/CVE-2020-16593/" source="CVE"/>
		<reference ref_id="CVE-2020-16598" ref_url="https://www.suse.com/security/cve/CVE-2020-16598/" source="CVE"/>
		<reference ref_id="CVE-2020-16599" ref_url="https://www.suse.com/security/cve/CVE-2020-16599/" source="CVE"/>
		<reference ref_id="CVE-2020-35448" ref_url="https://www.suse.com/security/cve/CVE-2020-35448/" source="CVE"/>
		<reference ref_id="CVE-2020-35493" ref_url="https://www.suse.com/security/cve/CVE-2020-35493/" source="CVE"/>
		<reference ref_id="CVE-2020-35496" ref_url="https://www.suse.com/security/cve/CVE-2020-35496/" source="CVE"/>
		<reference ref_id="CVE-2020-35507" ref_url="https://www.suse.com/security/cve/CVE-2020-35507/" source="CVE"/>
		<reference ref_id="CVE-2021-20197" ref_url="https://www.suse.com/security/cve/CVE-2021-20197/" source="CVE"/>
		<reference ref_id="CVE-2021-20284" ref_url="https://www.suse.com/security/cve/CVE-2021-20284/" source="CVE"/>
		<reference ref_id="CVE-2021-3487" ref_url="https://www.suse.com/security/cve/CVE-2021-3487/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

Update to binutils 2.37:

* The GNU Binutils sources now requires a C99 compiler and library to
  build.
* Support for the arm-symbianelf format has been removed.
* Support for Realm Management Extension (RME) for AArch64 has been
  added.
* A new linker option '-z report-relative-reloc' for x86 ELF targets
  has been added to report dynamic relative relocations.
* A new linker option '-z start-stop-gc' has been added to disable
  special treatment of __start_*/__stop_* references when
  --gc-sections.
* A new linker options '-Bno-symbolic' has been added which will
  cancel the '-Bsymbolic' and '-Bsymbolic-functions' options.
* The readelf tool has a new command line option which can be used to
  specify how the numeric values of symbols are reported.
  --sym-base=0|8|10|16 tells readelf to display the values in base 8,
  base 10 or base 16.  A sym base of 0 represents the default action
  of displaying values under 10000 in base 10 and values above that in
  base 16.
* A new format has been added to the nm program.  Specifying
  '--format=just-symbols' (or just using -j) will tell the program to
  only display symbol names and nothing else.
* A new command line option '--keep-section-symbols' has been added to
  objcopy and strip.  This stops the removal of unused section symbols
  when the file is copied.  Removing these symbols saves space, but
  sometimes they are needed by other tools.
* The '--weaken', '--weaken-symbol' and '--weaken-symbols' options
  supported by objcopy now make undefined symbols weak on targets that
  support weak symbols. 
* Readelf and objdump can now display and use the contents of .debug_sup
  sections.
* Readelf and objdump will now follow links to separate debug info
  files by default.  This behaviour can be stopped via the use of the
  new '-wN' or '--debug-dump=no-follow-links' options for readelf and
  the '-WN' or '--dwarf=no-follow-links' options for objdump.  Also
  the old behaviour can be restored by the use of the
  '--enable-follow-debug-links=no' configure time option.

  The semantics of the =follow-links option have also been slightly
  changed.  When enabled, the option allows for the loading of symbol
  tables and string tables from the separate files which can be used
  to enhance the information displayed when dumping other sections,
  but it does not automatically imply that information from the
  separate files should be displayed.

  If other debug section display options are also enabled (eg
  '--debug-dump=info') then the contents of matching sections in both
  the main file and the separate debuginfo file *will* be displayed.
  This is because in most cases the debug section will only be present
  in one of the files.

  If however non-debug section display options are enabled (eg
  '--sections') then the contents of matching parts of the separate
  debuginfo file will *not* be displayed.  This is because in most
  cases the user probably only wanted to load the symbol information
  from the separate debuginfo file.  In order to change this behaviour
  a new command line option --process-links can be used.  This will
  allow di0pslay options to applied to both the main file and any
  separate debuginfo files.
* Nm has a new command line option: '--quiet'.  This suppresses 'no
  symbols' diagnostic.

Update to binutils 2.36:

 New features in the Assembler:

  General:

   * When setting the link order attribute of ELF sections, it is now
     possible to use a numeric section index instead of symbol name.
   * Added a .nop directive to generate a single no-op instruction in
     a target neutral manner.  This instruction does have an effect on
     DWARF line number generation, if that is active.
   * Removed --reduce-memory-overheads and --hash-size as gas now
     uses hash tables that can be expand and shrink automatically.

   X86/x86_64:

     * Add support for AVX VNNI, HRESET, UINTR, TDX, AMX and Key
       Locker instructions. 
     * Support non-absolute segment values for lcall and ljmp.
     * Add {disp16} pseudo prefix to x86 assembler.
     * Configure with --enable-x86-used-note by default for Linux/x86.

   ARM/AArch64:

     * Add support for Cortex-A78, Cortex-A78AE and Cortex-X1,
       Cortex-R82, Neoverse V1, and Neoverse N2 cores.
     * Add support for ETMv4 (Embedded Trace Macrocell), ETE (Embedded
       Trace Extension), TRBE (Trace Buffer Extension), CSRE (Call
       Stack Recorder Extension) and BRBE (Branch Record Buffer
       Extension) system registers.
     * Add support for Armv8-R and Armv8.7-A ISA extensions.
     * Add support for DSB memory nXS barrier, WFET and WFIT
       instruction for Armv8.7.
     * Add support for +csre feature for -march. Add CSR PDEC
       instruction for CSRE feature in AArch64.
     * Add support for +flagm feature for -march in Armv8.4 AArch64.
     * Add support for +ls64 feature for -march in Armv8.7
       AArch64. Add atomic 64-byte load/store instructions for this
       feature. 
     * Add support for +pauth (Pointer Authentication) feature for
       -march in AArch64.

  New features in the Linker:

    * Add --error-handling-script=&lt;NAME&gt; command line option to allow
      a helper script to be invoked when an undefined symbol or a
      missing library is encountered.  This option can be suppressed
      via the configure time switch: --enable-error-handling-script=no.
    * Add -z x86-64-{baseline|v[234]} to the x86 ELF linker to mark
      x86-64-{baseline|v[234]} ISA level as needed.
    * Add -z unique-symbol to avoid duplicated local symbol names.
    * The creation of PE format DLLs now defaults to using a more
      secure set of DLL characteristics.
    * The linker now deduplicates the types in .ctf sections.  The new 
       command-line option --ctf-share-types describes how to do this:
       its default value, share-unconflicted, produces the most compact
       output.
    * The linker now omits the 'variable section' from .ctf sections
      by default, saving space.  This is almost certainly what you
      want unless you are working on a project that has its own
      analogue of symbol tables that are not reflected in the ELF
      symtabs.

New features in other binary tools:

    * The ar tool's previously unused l modifier is now used for
      specifying dependencies of a static library. The arguments of
      this option (or --record-libdeps long form option) will be
      stored verbatim in the __.LIBDEP member of the archive, which
      the linker may read at link time.
    * Readelf can now display the contents of LTO symbol table
      sections when asked to do so via the --lto-syms command line
      option.
    * Readelf now accepts the -C command line option to enable the
      demangling of symbol names.  In addition the --demangle=&lt;style&gt;,
      --no-demangle, --recurse-limit and --no-recurse-limit options
      are also now availale.

Update to binutils 2.35.1:

* This is a point release over the previous 2.35 version, containing bug
  fixes, and as an exception to the usual rule, one new feature.  The
  new feature is the support for a new directive in the assembler:
  '.nop'.  This directive creates a single no-op instruction in whatever
  encoding is correct for the target architecture.  Unlike the .space or
  .fill this is a real instruction, and it does affect the generation of
  DWARF line number tables, should they be enabled.

Update to binutils 2.35:

* The assembler can now produce DWARF-5 format line number tables.
* Readelf now has a 'lint' mode to enable extra checks of the files it is processing.
* Readelf will now display '[...]' when it has to truncate a symbol name.  
  The old behaviour - of displaying as many characters as possible, up to
  the 80 column limit - can be restored by the use of the --silent-truncation
  option.
* The linker can now produce a dependency file listing the inputs that it
  has processed, much like the -M -MP option supported by the compiler.

Update to binutils 2.34:

* The disassembler (objdump --disassemble) now has an option to
  generate ascii art thats show the arcs between that start and end
  points of control flow instructions.
* The binutils tools now have support for debuginfod.  Debuginfod is a 
  HTTP service for distributing ELF/DWARF debugging information as
  well as source code.  The tools can now connect to debuginfod
  servers in order to download debug information about the files that
  they are processing.
* The assembler and linker now support the generation of ELF format
  files for the Z80 architecture.

Update to binutils 2.33.1:

* Adds support for the Arm Scalable Vector Extension version 2
  (SVE2) instructions, the Arm Transactional Memory Extension (TME)
  instructions and the Armv8.1-M Mainline and M-profile Vector
  Extension (MVE) instructions.
* Adds support for the Arm Cortex-A76AE, Cortex-A77 and Cortex-M35P
  processors and the AArch64 Cortex-A34, Cortex-A65, Cortex-A65AE,
  Cortex-A76AE, and Cortex-A77 processors.
* Adds a .float16 directive for both Arm and AArch64 to allow
  encoding of 16-bit floating point literals.
* For MIPS, Add -m[no-]fix-loongson3-llsc option to fix (or not)
  Loongson3 LLSC Errata.  Add a --enable-mips-fix-loongson3-llsc=[yes|no]
  configure time option to set the default behavior. Set the default
  if the configure option is not used to 'no'.
* The Cortex-A53 Erratum 843419 workaround now supports a choice of
  which workaround to use.  The option --fix-cortex-a53-843419 now
  takes an optional argument --fix-cortex-a53-843419[=full|adr|adrp]
  which can be used to force a particular workaround to be used.
  See --help for AArch64 for more details.
* Add support for GNU_PROPERTY_AARCH64_FEATURE_1_BTI and
  GNU_PROPERTY_AARCH64_FEATURE_1_PAC  in ELF GNU program properties
  in the AArch64 ELF linker. 
* Add -z force-bti for AArch64 to enable GNU_PROPERTY_AARCH64_FEATURE_1_BTI
  on output while warning about missing GNU_PROPERTY_AARCH64_FEATURE_1_BTI 
  on inputs and use PLTs protected with BTI.
* Add -z pac-plt for AArch64 to pick PAC enabled PLTs.
* Add --source-comment[=&lt;txt&gt;] option to objdump which if present,
  provides a prefix to source code lines displayed in a disassembly.
* Add --set-section-alignment &lt;section-name&gt;=&lt;power-of-2-align&gt;
  option to objcopy to allow the changing of section alignments.
* Add --verilog-data-width option to objcopy for verilog targets to
  control width of data elements in verilog hex format.
* The separate debug info file options of readelf (--debug-dump=links
  and --debug-dump=follow) and objdump (--dwarf=links and
  --dwarf=follow-links) will now display and/or follow multiple
  links if more than one are present in a file.  (This usually
  happens when gcc's -gsplit-dwarf option is used).
  In addition objdump's --dwarf=follow-links now also affects its
  other display options, so that for example, when combined with
  --syms it will cause the symbol tables in any linked debug info
  files to also be displayed.  In addition when combined with
  --disassemble the --dwarf= follow-links option will ensure that
  any symbol tables in the linked files are read and used when
  disassembling code in the main file.
* Add support for dumping types encoded in the Compact Type Format
  to objdump and readelf.

The following security fixes are addressed by the update:

- CVE-2021-20197: Fixed a race condition which allows users to own arbitrary files (bsc#1181452).
- CVE-2021-20284: Fixed a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c (bsc#1183511).
- CVE-2021-3487: Fixed a denial of service via excessive debug section size causing excessive memory consumption in bfd's dwarf2.c read_section() (bsc#1184620).
- CVE-2020-35448: Fixed a heap-based buffer over-read in bfd_getl_signed_32() in libbfd.c (bsc#1184794).
- CVE-2020-16590: Fixed a double free vulnerability in process_symbol_table() (bsc#1179898).
- CVE-2020-16591: Fixed an invalid read in process_symbol_table() (bsc#1179899).
- CVE-2020-16592: Fixed an use-after-free in bfd_hash_lookup() (bsc#1179900).
- CVE-2020-16593: Fixed a null pointer dereference in scan_unit_for_symbols() (bsc#1179901).
- CVE-2020-16598: Fixed a null pointer dereference in debug_get_real_type() (bsc#1179902).
- CVE-2020-16599: Fixed a null pointer dereference in _bfd_elf_get_symbol_version_string() (bsc#1179903)
- CVE-2020-35493: Fixed heap-based buffer overflow in bfd_pef_parse_function_stubs function in bfd/pef.c via crafted PEF file (bsc#1180451).
- CVE-2020-35496: Fixed multiple null pointer dereferences in bfd module due to not checking return value of bfd_malloc (bsc#1180454).
- CVE-2020-35507: Fixed a null pointer dereference in bfd_pef_parse_function_stubs() (bsc#1180461).
- CVE-2019-17451: Fixed an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line() in dwarf2.c (bsc#1153768).
- CVE-2019-17450: Fixed a potential denial of service in find_abstract_instance() in dwarf2.c (bsc#1153770).
- CVE-2019-9077: Fixed a heap-based buffer overflow in process_mips_specific() in readelf.c via a malformed MIPS option section (bsc#1126826).
- CVE-2019-9075: Fixed a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap() in archive64.c (bsc#1126829).
- CVE-2019-9074: Fixed a out-of-bounds read leading to a SEGV in bfd_getl32() in libbfd.c (bsc#1126831).
- CVE-2019-12972: Fixed a heap-based buffer over-read in _bfd_doprnt() in bfd.c (bsc#1140126).
- CVE-2019-14444: Fixed an integer overflow apply_relocations() in readelf.c (bsc#1143609).
- CVE-2019-14250: Fixed an integer overflow in simple_object_elf_match() in simple-object-elf.c (bsc#1142649).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-02"/>
	<updated date="2021-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126826">SUSE bug 1126826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126829">SUSE bug 1126829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126831">SUSE bug 1126831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140126">SUSE bug 1140126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143609">SUSE bug 1143609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153768">SUSE bug 1153768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153770">SUSE bug 1153770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157755">SUSE bug 1157755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160254">SUSE bug 1160254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160590">SUSE bug 1160590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163333">SUSE bug 1163333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163744">SUSE bug 1163744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179036">SUSE bug 1179036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179341">SUSE bug 1179341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179898">SUSE bug 1179898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179899">SUSE bug 1179899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179900">SUSE bug 1179900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179901">SUSE bug 1179901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179902">SUSE bug 1179902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179903">SUSE bug 1179903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180451">SUSE bug 1180451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180454">SUSE bug 1180454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180461">SUSE bug 1180461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181452">SUSE bug 1181452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182252">SUSE bug 1182252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183511">SUSE bug 1183511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184620">SUSE bug 1184620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184794">SUSE bug 1184794</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12972/">CVE-2019-12972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12972">CVE-2019-12972 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14250">CVE-2019-14250 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14444/">CVE-2019-14444 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14444">CVE-2019-14444 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17450/">CVE-2019-17450 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17450">CVE-2019-17450 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17451/">CVE-2019-17451 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17451">CVE-2019-17451 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9074/">CVE-2019-9074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9074">CVE-2019-9074 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9075/">CVE-2019-9075 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9075">CVE-2019-9075 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9077/">CVE-2019-9077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9077">CVE-2019-9077 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16590/">CVE-2020-16590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16590">CVE-2020-16590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16591/">CVE-2020-16591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16591">CVE-2020-16591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16592/">CVE-2020-16592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16592">CVE-2020-16592 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16593/">CVE-2020-16593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16593">CVE-2020-16593 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16598/">CVE-2020-16598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16598">CVE-2020-16598 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16599/">CVE-2020-16599 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16599">CVE-2020-16599 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-35448/">CVE-2020-35448 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35448">CVE-2020-35448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35493/">CVE-2020-35493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35493">CVE-2020-35493 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35496/">CVE-2020-35496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35496">CVE-2020-35496 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35507/">CVE-2020-35507 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35507">CVE-2020-35507 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20197/">CVE-2021-20197 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20197">CVE-2021-20197 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20284/">CVE-2021-20284 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20284">CVE-2021-20284 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3487/">CVE-2021-3487 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3487">CVE-2021-3487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148528" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1183909" ref_url="https://bugzilla.suse.com/1183909" source="BUGZILLA"/>
		<reference ref_id="1184519" ref_url="https://bugzilla.suse.com/1184519" source="BUGZILLA"/>
		<reference ref_id="1188941" ref_url="https://bugzilla.suse.com/1188941" source="BUGZILLA"/>
		<reference ref_id="1191473" ref_url="https://bugzilla.suse.com/1191473" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20294" ref_url="https://www.suse.com/security/cve/CVE-2021-20294/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009707.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

- For compatibility on old code stream that expect 'brcl 0,label' to
  not be disassembled as 'jgnop label' on s390x.  (bsc#1192267)
  This reverts IBM zSeries HLASM support for now.
- Fixed that ppc64 optflags did not enable LTO (bsc#1188941).
- Fix empty man-pages from broken release tarball
- Fixed a memory corruption with rpath option (bsc#1191473).

- Fixed slow performance of stripping some binaries (bsc#1183909).

Security issue fixed:

- CVE-2021-20294: Fixed out-of-bounds write in print_dynamic_symbol in readelf (bnc#1184519)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183909">SUSE bug 1183909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184519">SUSE bug 1184519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188941">SUSE bug 1188941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191473">SUSE bug 1191473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20294/">CVE-2021-20294 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20294">CVE-2021-20294 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654414" comment="binutils-2.37-9.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654415" comment="binutils-devel-2.37-9.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654416" comment="libctf-nobfd0-2.37-9.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654417" comment="libctf0-2.37-9.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148529" version="1" class="patch">
	<metadata>
		<title>Security update for pcre (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1025709" ref_url="https://bugzilla.suse.com/1025709" source="BUGZILLA"/>
		<reference ref_id="1030066" ref_url="https://bugzilla.suse.com/1030066" source="BUGZILLA"/>
		<reference ref_id="1030803" ref_url="https://bugzilla.suse.com/1030803" source="BUGZILLA"/>
		<reference ref_id="1030805" ref_url="https://bugzilla.suse.com/1030805" source="BUGZILLA"/>
		<reference ref_id="1030807" ref_url="https://bugzilla.suse.com/1030807" source="BUGZILLA"/>
		<reference ref_id="1172973" ref_url="https://bugzilla.suse.com/1172973" source="BUGZILLA"/>
		<reference ref_id="1172974" ref_url="https://bugzilla.suse.com/1172974" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6004" ref_url="https://www.suse.com/security/cve/CVE-2017-6004/" source="CVE"/>
		<reference ref_id="CVE-2017-7186" ref_url="https://www.suse.com/security/cve/CVE-2017-7186/" source="CVE"/>
		<reference ref_id="CVE-2017-7244" ref_url="https://www.suse.com/security/cve/CVE-2017-7244/" source="CVE"/>
		<reference ref_id="CVE-2017-7245" ref_url="https://www.suse.com/security/cve/CVE-2017-7245/" source="CVE"/>
		<reference ref_id="CVE-2017-7246" ref_url="https://www.suse.com/security/cve/CVE-2017-7246/" source="CVE"/>
		<reference ref_id="CVE-2019-20838" ref_url="https://www.suse.com/security/cve/CVE-2019-20838/" source="CVE"/>
		<reference ref_id="CVE-2020-14155" ref_url="https://www.suse.com/security/cve/CVE-2020-14155/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
		<description>
This update for pcre fixes the following issues:

Update pcre to version 8.45:

- CVE-2020-14155: Fixed integer overflow via a large number after a '(?C' substring (bsc#1172974).
- CVE-2019-20838: Fixed buffer over-read in JIT compiler (bsc#1172973).
- CVE-2017-7244: Fixed invalid read in _pcre32_xclass() (bsc#1030807).
- CVE-2017-7245: Fixed buffer overflow in the pcre32_copy_substring (bsc#1030805).
- CVE-2017-7246: Fixed another buffer overflow in the pcre32_copy_substring (bsc#1030803).
- CVE-2017-7186: Fixed denial of service caused by an invalid Unicode property lookup (bsc#1030066).
- CVE-2017-6004: Fixed denial of service via crafted regular expression (bsc#1025709).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-10"/>
	<updated date="2021-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025709">SUSE bug 1025709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030066">SUSE bug 1030066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030803">SUSE bug 1030803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030805">SUSE bug 1030805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030807">SUSE bug 1030807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172973">SUSE bug 1172973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172974">SUSE bug 1172974</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6004/">CVE-2017-6004 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6004">CVE-2017-6004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7186/">CVE-2017-7186 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7186">CVE-2017-7186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7244/">CVE-2017-7244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7244">CVE-2017-7244 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7245/">CVE-2017-7245 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7245">CVE-2017-7245 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7246/">CVE-2017-7246 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7246">CVE-2017-7246 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20838/">CVE-2019-20838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20838">CVE-2019-20838 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14155/">CVE-2020-14155 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">CVE-2020-14155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653038" comment="libpcre1-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653016" comment="libpcre1-32bit-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653039" comment="libpcre16-0-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653066" comment="libpcrecpp0-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653354" comment="libpcreposix0-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653191" comment="pcre-devel-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653349" comment="selinux-policy-20140730-36.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653350" comment="selinux-policy-devel-20140730-36.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653351" comment="selinux-policy-minimum-20140730-36.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148530" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1189702" ref_url="https://bugzilla.suse.com/1189702" source="BUGZILLA"/>
		<reference ref_id="1189938" ref_url="https://bugzilla.suse.com/1189938" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3713" ref_url="https://www.suse.com/security/cve/CVE-2021-3713/" source="CVE"/>
		<reference ref_id="CVE-2021-3748" ref_url="https://www.suse.com/security/cve/CVE-2021-3748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020738.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- Fix out-of-bounds write in UAS (USB Attached SCSI) device emulation (bsc#1189702, CVE-2021-3713)
- Fix heap use-after-free in virtio_net_receive_rcu (bsc#1189938, CVE-2021-3748)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-10"/>
	<updated date="2021-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189702">SUSE bug 1189702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189938">SUSE bug 1189938</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3713/">CVE-2021-3713 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3713">CVE-2021-3713 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3748/">CVE-2021-3748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3748">CVE-2021-3748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653192" comment="qemu-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653193" comment="qemu-block-curl-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653194" comment="qemu-block-iscsi-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653156" comment="qemu-block-rbd-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653195" comment="qemu-block-ssh-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653196" comment="qemu-guest-agent-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653159" comment="qemu-ipxe-1.0.0+-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653160" comment="qemu-kvm-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653197" comment="qemu-lang-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653163" comment="qemu-seabios-1.10.2_0_g5f4c7b1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653164" comment="qemu-sgabios-8-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653198" comment="qemu-tools-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653166" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653167" comment="qemu-x86-2.9.1-43.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148531" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1192250" ref_url="https://bugzilla.suse.com/1192250" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38505" ref_url="https://www.suse.com/security/cve/CVE-2021-38505/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<reference ref_id="CVE-2021-38510" ref_url="https://www.suse.com/security/cve/CVE-2021-38510/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to Extended Support Release 91.3.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-49 (bsc#1192250)

  * CVE-2021-38503: iframe sandbox rules did not apply to XSLT stylesheets
  * CVE-2021-38504: Use-after-free in file picker dialog
  * CVE-2021-38505: Windows 10 Cloud Clipboard may have recorded sensitive user data
  * CVE-2021-38506: Firefox could be coaxed into going into fullscreen mode without notification or warning
  * CVE-2021-38507: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports
  * CVE-2021-38508: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing
  * CVE-2021-38509: Javascript alert box could have been spoofed onto an arbitrary domain
  * CVE-2021-38510: Download Protections were bypassed by .inetloc files on Mac OS
  * MOZ-2021-0008: Use-after-free in HTTP2 Session object
  * MOZ-2021-0007: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38503">CVE-2021-38503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38504">CVE-2021-38504 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38505/">CVE-2021-38505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38505">CVE-2021-38505 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38506">CVE-2021-38506 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38507">CVE-2021-38507 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38508">CVE-2021-38508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38509">CVE-2021-38509 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38510/">CVE-2021-38510 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38510">CVE-2021-38510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655637" comment="MozillaFirefox-91.3.0-112.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655638" comment="MozillaFirefox-devel-91.3.0-112.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655639" comment="MozillaFirefox-translations-common-91.3.0-112.80.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148532" version="1" class="patch">
	<metadata>
		<title>Security update for ardana-ansible, ardana-monasca, documentation-suse-openstack-cloud, openstack-ec2-api, openstack-heat-templates, python-Django, python-monasca-common, rubygem-redcarpet, rubygem-puma (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1180837" ref_url="https://bugzilla.suse.com/1180837" source="BUGZILLA"/>
		<reference ref_id="1191681" ref_url="https://bugzilla.suse.com/1191681" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26298" ref_url="https://www.suse.com/security/cve/CVE-2020-26298/" source="CVE"/>
		<reference ref_id="CVE-2021-41136" ref_url="https://www.suse.com/security/cve/CVE-2021-41136/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009746.html" source="SUSE-SU"/>
		<description>
This update for ardana-ansible, ardana-monasca, documentation-suse-openstack-cloud, openstack-ec2-api, openstack-heat-templates, python-Django, python-monasca-common, rubygem-redcarpet, rubygem-puma contains the following fixes:

Security fixes included in this update:

rubygem-redcarpet:
CVE-2020-26298: Fixed XSS via HTML escaping when processing quotes. (bsc#1180837)

rubygem-puma:
CVE-2021-41136: Fixed build of the Java state machine for parsing HTTP. (bsc#1191681)

Non-security fixes included in this update:

Changes in ardana-ansible:
  * Patch service.py to skip blank lines.

Changes in ardana-monasca:
  * Use specific TLS versions for monasca-thresh DB connections. (SOC-11543)

Changes in documentation-suse-openstack-cloud:
  * CI: only run on DocBook/AsciiDoc paths, make upload fails nonfatal
  * DC files: Update to 2021 stylesheets (#1327)
  * CI: Use GitHub Actions

Changes in openstack-ec2-api:
  * Remove jobs corresponds to obselete featuresets
  * OpenDev Migration Patch

Changes in openstack-heat-templates:
  * [ussuri][goal] Update contributor documentation

Changes in python-Django:
- Add missing dependency for CVE-2021-31542

Changes in python-monasca-common:
- Remove renderspec source service.
- Retry publish once on failures. (SOC-11543)
  
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180837">SUSE bug 1180837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191681">SUSE bug 1191681</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26298/">CVE-2020-26298 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26298">CVE-2020-26298 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41136/">CVE-2021-41136 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41136">CVE-2021-41136 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656071" comment="ardana-ansible-8.0+git.1632499354.a56668f-3.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656072" comment="ardana-monasca-8.0+git.1627997000.6c3bc04-3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656073" comment="documentation-suse-openstack-cloud-installation-8.20210806-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656074" comment="documentation-suse-openstack-cloud-operations-8.20210806-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656075" comment="documentation-suse-openstack-cloud-opsconsole-8.20210806-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656076" comment="documentation-suse-openstack-cloud-planning-8.20210806-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656077" comment="documentation-suse-openstack-cloud-security-8.20210806-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656078" comment="documentation-suse-openstack-cloud-supplement-8.20210806-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656079" comment="documentation-suse-openstack-cloud-upstream-admin-8.20210806-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656080" comment="documentation-suse-openstack-cloud-upstream-user-8.20210806-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656081" comment="documentation-suse-openstack-cloud-user-8.20210806-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656082" comment="openstack-ec2-api-5.0.1~dev12-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656083" comment="openstack-ec2-api-api-5.0.1~dev12-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656084" comment="openstack-ec2-api-metadata-5.0.1~dev12-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656085" comment="openstack-ec2-api-s3-5.0.1~dev12-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656086" comment="openstack-heat-templates-0.0.0+git.1628179051.7d761bf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656087" comment="python-Django-1.11.29-3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656088" comment="python-ec2api-5.0.1~dev12-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656089" comment="python-monasca-common-2.3.1~dev4-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656090" comment="venv-openstack-heat-x86_64-9.0.8~dev22-12.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656091" comment="venv-openstack-horizon-x86_64-12.0.5~dev6-14.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656092" comment="venv-openstack-monasca-x86_64-2.2.2~dev1-11.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148533" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1014440" ref_url="https://bugzilla.suse.com/1014440" source="BUGZILLA"/>
		<reference ref_id="1192284" ref_url="https://bugzilla.suse.com/1192284" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124/" source="CVE"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009750.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:
	  
- CVE-2016-2124: Fixed not to fallback to non spnego authentication if we require kerberos (bsc#1014440).
- CVE-2020-25717: Fixed privilege escalation inside an AD Domain where a user could become root on domain members (bsc#1192284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014440">SUSE bug 1014440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192284">SUSE bug 1192284</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2124">CVE-2016-2124 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25717">CVE-2020-25717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655686" comment="libdcerpc-binding0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655588" comment="libdcerpc-binding0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655687" comment="libdcerpc0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655590" comment="libdcerpc0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655688" comment="libndr-krb5pac0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655592" comment="libndr-krb5pac0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655689" comment="libndr-nbt0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655594" comment="libndr-nbt0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655690" comment="libndr-standard0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655596" comment="libndr-standard0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655691" comment="libndr0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655598" comment="libndr0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655692" comment="libnetapi0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655600" comment="libnetapi0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655693" comment="libsamba-credentials0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655602" comment="libsamba-credentials0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655694" comment="libsamba-errors0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655604" comment="libsamba-errors0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655695" comment="libsamba-hostconfig0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655606" comment="libsamba-hostconfig0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655696" comment="libsamba-passdb0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655608" comment="libsamba-passdb0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655697" comment="libsamba-util0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655610" comment="libsamba-util0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655698" comment="libsamdb0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655612" comment="libsamdb0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655699" comment="libsmbclient0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655614" comment="libsmbclient0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655700" comment="libsmbconf0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655616" comment="libsmbconf0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655701" comment="libsmbldap0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655618" comment="libsmbldap0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655702" comment="libtevent-util0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655620" comment="libtevent-util0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655703" comment="libwbclient0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655622" comment="libwbclient0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655704" comment="samba-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655705" comment="samba-client-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655625" comment="samba-client-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655626" comment="samba-doc-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655706" comment="samba-libs-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655628" comment="samba-libs-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655707" comment="samba-winbind-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655630" comment="samba-winbind-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148534" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql13, postgresql14  (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009760.html" source="SUSE-SU"/>
		<description>
This update for postgresql, postgresql13 and postgresql14 fixes the following issues:

Security issues fixed:

- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).

This update also ships postgresql14 to SUSE Linux Enterprise 12 SP5. (jsc#SLE-22673)
On older service packs only libpq5 and libecpg6 are being replaced by the postgresql14 variants.

Feature changes in postgresql14:

- https://www.postgresql.org/about/news/postgresql-14-released-2318/
- https://www.postgresql.org/docs/14/release-14.html

		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-20"/>
	<updated date="2021-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656243" comment="libecpg6-14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656244" comment="libpq5-14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656229" comment="libpq5-32bit-14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656230" comment="postgresql-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656231" comment="postgresql-contrib-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656232" comment="postgresql-docs-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656233" comment="postgresql-plperl-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656234" comment="postgresql-plpython-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656235" comment="postgresql-pltcl-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656236" comment="postgresql-server-14-4.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148535" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009763.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656863" comment="postgresql96-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656864" comment="postgresql96-contrib-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656857" comment="postgresql96-docs-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656865" comment="postgresql96-plperl-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656866" comment="postgresql96-plpython-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656867" comment="postgresql96-pltcl-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656868" comment="postgresql96-server-9.6.24-6.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148536" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009764.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:
          
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656548" comment="postgresql10-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656549" comment="postgresql10-contrib-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656534" comment="postgresql10-docs-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656550" comment="postgresql10-plperl-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656551" comment="postgresql10-plpython-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656552" comment="postgresql10-pltcl-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656553" comment="postgresql10-server-10.19-4.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148537" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1191937" ref_url="https://bugzilla.suse.com/1191937" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42762" ref_url="https://www.suse.com/security/cve/CVE-2021-42762/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009769.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2021-42762: Updated seccomp rules with latest changes from flatpak (bsc#1191937).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-23"/>
	<updated date="2021-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191937">SUSE bug 1191937</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42762/">CVE-2021-42762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42762">CVE-2021-42762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657339" comment="libjavascriptcoregtk-4_0-18-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657340" comment="libwebkit2gtk-4_0-37-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657332" comment="libwebkit2gtk3-lang-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657341" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657342" comment="typelib-1_0-WebKit2-4_0-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657343" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657344" comment="webkit2gtk-4_0-injected-bundles-2.32.4-2.74.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148538" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1191901" ref_url="https://bugzilla.suse.com/1191901" source="BUGZILLA"/>
		<reference ref_id="1191903" ref_url="https://bugzilla.suse.com/1191903" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191906" ref_url="https://bugzilla.suse.com/1191906" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version OpenJDK 8u312 (October 2021 CPU):
  
- CVE-2021-35550: Fixed weak ciphers preferred over stronger ones for TLS (bsc#1191901).
- CVE-2021-35556: Fixed excessive memory allocation in RTFParser (bsc#1191910).
- CVE-2021-35559: Fixed excessive memory allocation in RTFReader (bsc#1191911).
- CVE-2021-35561: Fixed excessive memory allocation in HashMap and HashSet (bsc#1191912).
- CVE-2021-35564: Fixed certificates with end dates too far in the future can corrupt keystore (bsc#1191913).
- CVE-2021-35565: Fixed loop in HttpsServer triggered during TLS session close (bsc#1191909).
- CVE-2021-35567: Fixed incorrect principal selection when using Kerberos Constrained Delegation (bsc#1191903).
- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake (bsc#1191904).
- CVE-2021-35586: Fixed excessive memory allocation in BMPImageReader (bsc#1191914).
- CVE-2021-35588: Fixed incomplete validation of inner class references in ClassFileParser (bsc#1191905)
- CVE-2021-35603: Fixed non-constant comparison during TLS handshakes (bsc#1191906).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-23"/>
	<updated date="2021-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191903">SUSE bug 1191903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35550">CVE-2021-35550 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35567">CVE-2021-35567 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657044" comment="java-1_8_0-openjdk-1.8.0.312-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657045" comment="java-1_8_0-openjdk-demo-1.8.0.312-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657046" comment="java-1_8_0-openjdk-devel-1.8.0.312-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657047" comment="java-1_8_0-openjdk-headless-1.8.0.312-27.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148539" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1191901" ref_url="https://bugzilla.suse.com/1191901" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191906" ref_url="https://bugzilla.suse.com/1191906" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:


Update to OpenJDK 7u321 (October 2021 CPU):

- CVE-2021-35550: Fixed weak ciphers preferred over stronger ones for TLS (bsc#1191901).
- CVE-2021-35556: Fixed excessive memory allocation in RTFParser (bsc#1191910).
- CVE-2021-35559: Fixed excessive memory allocation in RTFReader (bsc#1191911).
- CVE-2021-35561: Fixed excessive memory allocation in HashMap and HashSet (bsc#1191912).
- CVE-2021-35564: Fixed certificates with end dates too far in the future can corrupt keystore (bsc#1191913).
- CVE-2021-35565: Fixed loop in HttpsServer triggered during TLS session close (bsc#1191909).
- CVE-2021-35586: Fixed excessive memory allocation in BMPImageReader (bsc#1191914).
- CVE-2021-35588: Fixed incomplete validation of inner class references in ClassFileParser (bsc#1191905)
- CVE-2021-35603: Fixed non-constant comparison during TLS handshakes (bsc#1191906).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35550">CVE-2021-35550 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656897" comment="java-1_7_0-openjdk-1.7.0.321-43.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656898" comment="java-1_7_0-openjdk-demo-1.7.0.321-43.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656899" comment="java-1_7_0-openjdk-devel-1.7.0.321-43.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656900" comment="java-1_7_0-openjdk-headless-1.7.0.321-43.53.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148540" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1177125" ref_url="https://bugzilla.suse.com/1177125" source="BUGZILLA"/>
		<reference ref_id="1188160" ref_url="https://bugzilla.suse.com/1188160" source="BUGZILLA"/>
		<reference ref_id="1188161" ref_url="https://bugzilla.suse.com/1188161" source="BUGZILLA"/>
		<reference ref_id="1190375" ref_url="https://bugzilla.suse.com/1190375" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25613" ref_url="https://www.suse.com/security/cve/CVE-2020-25613/" source="CVE"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009790.html" source="SUSE-SU"/>
		<description>
This update for ruby2.1 fixes the following issues:

- CVE-2020-25613: Fixed potential HTTP request smuggling in WEBrick (bsc#1177125).
- CVE-2021-31799: Fixed Command injection vulnerability in RDoc (bsc#1190375).
- CVE-2021-31810: Fixed trusting FTP PASV responses vulnerability in Net:FTP (bsc#1188161).
- CVE-2021-32066: Fixed StartTLS stripping vulnerability in Net:IMAP (bsc#1188160).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177125">SUSE bug 1177125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188160">SUSE bug 1188160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188161">SUSE bug 1188161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190375">SUSE bug 1190375</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25613/">CVE-2020-25613 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25613">CVE-2020-25613 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31799">CVE-2021-31799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31810">CVE-2021-31810 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32066">CVE-2021-32066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657553" comment="libruby2_1-2_1-2.1.9-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657554" comment="ruby2.1-2.1.9-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657555" comment="ruby2.1-stdlib-2.1.9-19.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148541" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1192554" ref_url="https://bugzilla.suse.com/1192554" source="BUGZILLA"/>
		<reference ref_id="1192557" ref_url="https://bugzilla.suse.com/1192557" source="BUGZILLA"/>
		<reference ref_id="1192559" ref_url="https://bugzilla.suse.com/1192559" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28704" ref_url="https://www.suse.com/security/cve/CVE-2021-28704/" source="CVE"/>
		<reference ref_id="CVE-2021-28705" ref_url="https://www.suse.com/security/cve/CVE-2021-28705/" source="CVE"/>
		<reference ref_id="CVE-2021-28706" ref_url="https://www.suse.com/security/cve/CVE-2021-28706/" source="CVE"/>
		<reference ref_id="CVE-2021-28707" ref_url="https://www.suse.com/security/cve/CVE-2021-28707/" source="CVE"/>
		<reference ref_id="CVE-2021-28708" ref_url="https://www.suse.com/security/cve/CVE-2021-28708/" source="CVE"/>
		<reference ref_id="CVE-2021-28709" ref_url="https://www.suse.com/security/cve/CVE-2021-28709/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009783.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-28704, CVE-2021-28707, CVE-2021-28708: Fixed PoD operations on misaligned GFNs (XSA-388) (bsc#1192557).
- CVE-2021-28705, CVE-2021-28709: Fixed issues with partially successful P2M updates on x86 (XSA-389) (bsc#1192559).
- CVE-2021-28706: Fixed guests may exceed their designated memory limit (XSA-385) (bsc#1192554).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192554">SUSE bug 1192554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192557">SUSE bug 1192557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192559">SUSE bug 1192559</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28704/">CVE-2021-28704 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28704">CVE-2021-28704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28705/">CVE-2021-28705 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28705">CVE-2021-28705 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28706/">CVE-2021-28706 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28706">CVE-2021-28706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28707/">CVE-2021-28707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28707">CVE-2021-28707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28708/">CVE-2021-28708 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28708">CVE-2021-28708 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28709/">CVE-2021-28709 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28709">CVE-2021-28709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658666" comment="xen-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658667" comment="xen-doc-html-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658668" comment="xen-libs-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658669" comment="xen-libs-32bit-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658670" comment="xen-tools-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658671" comment="xen-tools-domU-4.9.4_24-3.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148542" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1103032" ref_url="https://bugzilla.suse.com/1103032" source="BUGZILLA"/>
		<reference ref_id="1188284" ref_url="https://bugzilla.suse.com/1188284" source="BUGZILLA"/>
		<reference ref_id="1192346" ref_url="https://bugzilla.suse.com/1192346" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009804.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2018-14679: Fixed off-by-one issue in embedded libmspack that could lead to denial of service (bsc#1103032). 
  
- Update to 0.103.4 (bsc#1192346).
- Update to 0.103.3 (bsc#1188284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188284">SUSE bug 1188284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192346">SUSE bug 1192346</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14679">CVE-2018-14679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656968" comment="clamav-0.103.4-33.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148543" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1192063" ref_url="https://bugzilla.suse.com/1192063" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009802.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2021-30846: Fixed memory corruption issue that could lead to arbitrary code execution when processing maliciously crafted web content (bsc#1192063).
- CVE-2021-30851: Fixed memory corruption vulnerability that could lead to arbitrary code execution when processing maliciously crafted web content (bsc#1192063).   
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192063">SUSE bug 1192063</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30846">CVE-2021-30846 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30851">CVE-2021-30851 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658205" comment="libjavascriptcoregtk-4_0-18-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658206" comment="libwebkit2gtk-4_0-37-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658196" comment="libwebkit2gtk3-lang-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658207" comment="typelib-1_0-JavaScriptCore-4_0-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658208" comment="typelib-1_0-WebKit2-4_0-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658209" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658210" comment="webkit2gtk-4_0-injected-bundles-2.34.1-2.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148544" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1073928" ref_url="https://bugzilla.suse.com/1073928" source="BUGZILLA"/>
		<reference ref_id="1098425" ref_url="https://bugzilla.suse.com/1098425" source="BUGZILLA"/>
		<reference ref_id="1100416" ref_url="https://bugzilla.suse.com/1100416" source="BUGZILLA"/>
		<reference ref_id="1119934" ref_url="https://bugzilla.suse.com/1119934" source="BUGZILLA"/>
		<reference ref_id="1129735" ref_url="https://bugzilla.suse.com/1129735" source="BUGZILLA"/>
		<reference ref_id="1171217" ref_url="https://bugzilla.suse.com/1171217" source="BUGZILLA"/>
		<reference ref_id="1171420" ref_url="https://bugzilla.suse.com/1171420" source="BUGZILLA"/>
		<reference ref_id="1173346" ref_url="https://bugzilla.suse.com/1173346" source="BUGZILLA"/>
		<reference ref_id="1176724" ref_url="https://bugzilla.suse.com/1176724" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1181158" ref_url="https://bugzilla.suse.com/1181158" source="BUGZILLA"/>
		<reference ref_id="1181854" ref_url="https://bugzilla.suse.com/1181854" source="BUGZILLA"/>
		<reference ref_id="1181855" ref_url="https://bugzilla.suse.com/1181855" source="BUGZILLA"/>
		<reference ref_id="1183089" ref_url="https://bugzilla.suse.com/1183089" source="BUGZILLA"/>
		<reference ref_id="1184673" ref_url="https://bugzilla.suse.com/1184673" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185727" ref_url="https://bugzilla.suse.com/1185727" source="BUGZILLA"/>
		<reference ref_id="1185758" ref_url="https://bugzilla.suse.com/1185758" source="BUGZILLA"/>
		<reference ref_id="1185973" ref_url="https://bugzilla.suse.com/1185973" source="BUGZILLA"/>
		<reference ref_id="1186109" ref_url="https://bugzilla.suse.com/1186109" source="BUGZILLA"/>
		<reference ref_id="1186390" ref_url="https://bugzilla.suse.com/1186390" source="BUGZILLA"/>
		<reference ref_id="1188172" ref_url="https://bugzilla.suse.com/1188172" source="BUGZILLA"/>
		<reference ref_id="1188563" ref_url="https://bugzilla.suse.com/1188563" source="BUGZILLA"/>
		<reference ref_id="1188601" ref_url="https://bugzilla.suse.com/1188601" source="BUGZILLA"/>
		<reference ref_id="1188838" ref_url="https://bugzilla.suse.com/1188838" source="BUGZILLA"/>
		<reference ref_id="1188876" ref_url="https://bugzilla.suse.com/1188876" source="BUGZILLA"/>
		<reference ref_id="1188983" ref_url="https://bugzilla.suse.com/1188983" source="BUGZILLA"/>
		<reference ref_id="1188985" ref_url="https://bugzilla.suse.com/1188985" source="BUGZILLA"/>
		<reference ref_id="1189057" ref_url="https://bugzilla.suse.com/1189057" source="BUGZILLA"/>
		<reference ref_id="1189262" ref_url="https://bugzilla.suse.com/1189262" source="BUGZILLA"/>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189291" ref_url="https://bugzilla.suse.com/1189291" source="BUGZILLA"/>
		<reference ref_id="1189399" ref_url="https://bugzilla.suse.com/1189399" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="1189706" ref_url="https://bugzilla.suse.com/1189706" source="BUGZILLA"/>
		<reference ref_id="1190022" ref_url="https://bugzilla.suse.com/1190022" source="BUGZILLA"/>
		<reference ref_id="1190023" ref_url="https://bugzilla.suse.com/1190023" source="BUGZILLA"/>
		<reference ref_id="1190025" ref_url="https://bugzilla.suse.com/1190025" source="BUGZILLA"/>
		<reference ref_id="1190067" ref_url="https://bugzilla.suse.com/1190067" source="BUGZILLA"/>
		<reference ref_id="1190117" ref_url="https://bugzilla.suse.com/1190117" source="BUGZILLA"/>
		<reference ref_id="1190159" ref_url="https://bugzilla.suse.com/1190159" source="BUGZILLA"/>
		<reference ref_id="1190194" ref_url="https://bugzilla.suse.com/1190194" source="BUGZILLA"/>
		<reference ref_id="1190349" ref_url="https://bugzilla.suse.com/1190349" source="BUGZILLA"/>
		<reference ref_id="1190351" ref_url="https://bugzilla.suse.com/1190351" source="BUGZILLA"/>
		<reference ref_id="1190601" ref_url="https://bugzilla.suse.com/1190601" source="BUGZILLA"/>
		<reference ref_id="1190717" ref_url="https://bugzilla.suse.com/1190717" source="BUGZILLA"/>
		<reference ref_id="1191193" ref_url="https://bugzilla.suse.com/1191193" source="BUGZILLA"/>
		<reference ref_id="1191315" ref_url="https://bugzilla.suse.com/1191315" source="BUGZILLA"/>
		<reference ref_id="1191790" ref_url="https://bugzilla.suse.com/1191790" source="BUGZILLA"/>
		<reference ref_id="1191801" ref_url="https://bugzilla.suse.com/1191801" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1191961" ref_url="https://bugzilla.suse.com/1191961" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192400" ref_url="https://bugzilla.suse.com/1192400" source="BUGZILLA"/>
		<reference ref_id="1192775" ref_url="https://bugzilla.suse.com/1192775" source="BUGZILLA"/>
		<reference ref_id="1192781" ref_url="https://bugzilla.suse.com/1192781" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17862" ref_url="https://www.suse.com/security/cve/CVE-2017-17862/" source="CVE"/>
		<reference ref_id="CVE-2017-17864" ref_url="https://www.suse.com/security/cve/CVE-2017-17864/" source="CVE"/>
		<reference ref_id="CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405/" source="CVE"/>
		<reference ref_id="CVE-2018-16882" ref_url="https://www.suse.com/security/cve/CVE-2018-16882/" source="CVE"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-12655" ref_url="https://www.suse.com/security/cve/CVE-2020-12655/" source="CVE"/>
		<reference ref_id="CVE-2020-14305" ref_url="https://www.suse.com/security/cve/CVE-2020-14305/" source="CVE"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<reference ref_id="CVE-2021-20265" ref_url="https://www.suse.com/security/cve/CVE-2021-20265/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="CVE-2021-31916" ref_url="https://www.suse.com/security/cve/CVE-2021-31916/" source="CVE"/>
		<reference ref_id="CVE-2021-33033" ref_url="https://www.suse.com/security/cve/CVE-2021-33033/" source="CVE"/>
		<reference ref_id="CVE-2021-34556" ref_url="https://www.suse.com/security/cve/CVE-2021-34556/" source="CVE"/>
		<reference ref_id="CVE-2021-34981" ref_url="https://www.suse.com/security/cve/CVE-2021-34981/" source="CVE"/>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<reference ref_id="CVE-2021-35477" ref_url="https://www.suse.com/security/cve/CVE-2021-35477/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655/" source="CVE"/>
		<reference ref_id="CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159/" source="CVE"/>
		<reference ref_id="CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="CVE-2021-3760" ref_url="https://www.suse.com/security/cve/CVE-2021-3760/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="CVE-2021-38204" ref_url="https://www.suse.com/security/cve/CVE-2021-38204/" source="CVE"/>
		<reference ref_id="CVE-2021-3896" ref_url="https://www.suse.com/security/cve/CVE-2021-3896/" source="CVE"/>
		<reference ref_id="CVE-2021-40490" ref_url="https://www.suse.com/security/cve/CVE-2021-40490/" source="CVE"/>
		<reference ref_id="CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)

  You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails  (bsc#1191961).
- CVE-2020-12655: An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767 (bnc#1171217).
- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).
- CVE-2021-34556: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack (bnc#1188983).
- CVE-2021-35477: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation did not necessarily occur before a store operation that has an attacker-controlled value (bnc#1188985).
- CVE-2017-17862: kernel/bpf/verifier.c in the Linux kernel ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service (bnc#1073928).
- CVE-2017-17864: kernel/bpf/verifier.c in the Linux kernel mishandled states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allowed local users to obtain potentially sensitive address information, aka a 'pointer leak (bnc#1073928).
- CVE-2021-20265: A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allowed an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability (bnc#1183089).
- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
- CVE-2021-3655: Missing size validations on inbound SCTP packets may have allowed the kernel to read uninitialized memory (bnc#1188563).
- CVE-2018-13405: The inode_init_owner function in fs/inode.c in the Linux kernel allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416 bnc#1129735).
- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-&gt;rf_conn_info object (bsc#1190067).
- CVE-2021-42739: The firewire subsystem in the Linux kernel has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bnc#1184673).
- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).
- CVE-2021-33033: The Linux kernel has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value (bnc#1186109 bnc#1186390 bnc#1188876).
- CVE-2020-14305: An out-of-bounds memory write flaw was found in how the Linux kernel&amp;#8217;s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allowed an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability (bnc#1173346).
- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).
- CVE-2021-3896: Fixed a array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (bsc#1191958).
- CVE-2021-42008: The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access (bnc#1191315).
- CVE-2020-3702: Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic (bnc#1191193).
- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel's bluetooth module. (bsc#1190023)
- CVE-2021-40490: A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel (bnc#1190159 bnc#1192775)
- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)
- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).
- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).
- CVE-2021-3653: A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the 'int_ctl' field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7 (bnc#1189399 bnc#1189420).
- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262 bnc#1189278).
- CVE-2021-38204: drivers/usb/host/max3421-hcd.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).
- CVE-2021-3679: A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).
- CVE-2018-16882: A use-after-free issue was found in the way the Linux kernel's KVM hypervisor processed posted interrupts when nested(=1) virtualization is enabled. In nested_get_vmcs12_pages(), in case of an error while processing posted interrupt address, it unmaps the 'pi_desc_page' without resetting 'pi_desc' descriptor address, which is later used in pi_test_and_clear_on(). A guest user/process could use this flaw to crash the host kernel resulting in DoS or potentially gain privileged access to a system. Kernel versions and are vulnerable (bnc#1119934).
- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1176724).
- CVE-2020-4788: IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296 (bnc#1177666 bnc#1181158).
- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).
- CVE-2021-37576: arch/powerpc/kvm/book3s_rtas.c in the Linux kernel on the powerpc platform allowed KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e (bnc#1188838).

The following non-security bugs were fixed:

- PCI: hv: Use expected affinity when unmasking IRQ (bsc#1185973).
- SUNRPC: improve error response to over-size gss credential (bsc#1190022).
- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
- blacklist.conf: Drop a line that was added by mistake
- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22918)
- bpf: Disallow unprivileged bpf by default (jsc#SLE-22918).
- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).
- config: disable unprivileged BPF by default (jsc#SLE-22918)
- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758,bsc#1192400).
- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).
- hv: mana: adjust mana_select_queue to old API (jsc#SLE-18779, bsc#1185727).
- hv: mana: declare vzalloc (jsc#SLE-18779, bsc#1185726).
- hv: mana: fake bitmap API (jsc#SLE-18779, bsc#1185726).
- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185727).
- kABI: protect struct bpf_map (kabi).
- mm: replace open coded page to virt conversion with page_to_virt() (jsc#SLE-18779, bsc#1185727).
- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854 bsc#1181855).
- net/mlx4_en: Handle TX error CQE (bsc#1181854 bsc#1181855).
- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185727).
- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185727).
- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185727).
- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185727).
- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191801).
- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185727).
- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185727).
- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185727).
- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185727).
- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (bsc#1190601).
- s390/bpf: Fix branch shortening during codegen pass (bsc#1190601).
- s390/bpf: Fix optimizing out zero-extensions (bsc#1190601).
- s390/bpf: Wrap JIT macro parameter usages in parentheses (bsc#1190601).
- s390: bpf: implement jitting of BPF_ALU | BPF_ARSH | BPF_* (bsc#1190601).
- scsi: sg: add sg_remove_request in sg_write (bsc#1171420 CVE2020-12770).
- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).
- sctp: fully initialize v4 addr in some functions (bsc#1188563).
- sctp: simplify addr copy (bsc#1188563).
- x86/CPU: Add more Icelake model numbers (bsc#1185758,bsc#1192400).
- x86/tlb: Flush global mappings when KAISER is disabled (bsc#1190194).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073928">SUSE bug 1073928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098425">SUSE bug 1098425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100416">SUSE bug 1100416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119934">SUSE bug 1119934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129735">SUSE bug 1129735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171217">SUSE bug 1171217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171420">SUSE bug 1171420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173346">SUSE bug 1173346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176724">SUSE bug 1176724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181854">SUSE bug 1181854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181855">SUSE bug 1181855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183089">SUSE bug 1183089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185727">SUSE bug 1185727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185758">SUSE bug 1185758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185973">SUSE bug 1185973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186109">SUSE bug 1186109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186390">SUSE bug 1186390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188838">SUSE bug 1188838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188983">SUSE bug 1188983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188985">SUSE bug 1188985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189291">SUSE bug 1189291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189706">SUSE bug 1189706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190022">SUSE bug 1190022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190023">SUSE bug 1190023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190067">SUSE bug 1190067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190159">SUSE bug 1190159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190194">SUSE bug 1190194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190349">SUSE bug 1190349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190601">SUSE bug 1190601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190717">SUSE bug 1190717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191193">SUSE bug 1191193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191801">SUSE bug 1191801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191961">SUSE bug 1191961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192400">SUSE bug 1192400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192775">SUSE bug 1192775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192781">SUSE bug 1192781</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17862/">CVE-2017-17862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17862">CVE-2017-17862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17864/">CVE-2017-17864 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17864">CVE-2017-17864 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13405">CVE-2018-13405 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16882/">CVE-2018-16882 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16882">CVE-2018-16882 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12655/">CVE-2020-12655 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12655">CVE-2020-12655 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14305/">CVE-2020-14305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14305">CVE-2020-14305 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3702">CVE-2020-3702 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4788">CVE-2020-4788 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20265/">CVE-2021-20265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20265">CVE-2021-20265 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20322">CVE-2021-20322 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31916/">CVE-2021-31916 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31916">CVE-2021-31916 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33033/">CVE-2021-33033 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33033">CVE-2021-33033 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34556/">CVE-2021-34556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34556">CVE-2021-34556 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34981/">CVE-2021-34981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-34981">CVE-2021-34981 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3542">CVE-2021-3542 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35477/">CVE-2021-35477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35477">CVE-2021-35477 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3655">CVE-2021-3655 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3659">CVE-2021-3659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3679">CVE-2021-3679 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3715">CVE-2021-3715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37159">CVE-2021-37159 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3732">CVE-2021-3732 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3752">CVE-2021-3752 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3753">CVE-2021-3753 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3760/">CVE-2021-3760 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3760">CVE-2021-3760 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3772">CVE-2021-3772 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160">CVE-2021-38160 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38204/">CVE-2021-38204 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38204">CVE-2021-38204 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3896/">CVE-2021-3896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3896">CVE-2021-3896 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40490/">CVE-2021-40490 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40490">CVE-2021-40490 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42008">CVE-2021-42008 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43389">CVE-2021-43389 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657875" comment="kernel-default-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657876" comment="kernel-default-base-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657877" comment="kernel-default-devel-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659139" comment="kernel-default-kgraft-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657858" comment="kernel-devel-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657859" comment="kernel-macros-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657860" comment="kernel-source-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657878" comment="kernel-syms-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659141" comment="kgraft-patch-4_4_180-94_150-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148545" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1193170" ref_url="https://bugzilla.suse.com/1193170" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009847.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Update to version 3.68.1:

- CVE-2021-43527: Fixed a Heap overflow in NSS when verifying DER-encoded DSA or RSA-PSS signatures (bsc#1193170).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659103" comment="libfreebl3-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659086" comment="libfreebl3-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659104" comment="libfreebl3-hmac-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659088" comment="libfreebl3-hmac-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659105" comment="libsoftokn3-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659090" comment="libsoftokn3-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659106" comment="libsoftokn3-hmac-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659092" comment="libsoftokn3-hmac-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659107" comment="mozilla-nss-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659094" comment="mozilla-nss-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659108" comment="mozilla-nss-certs-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659096" comment="mozilla-nss-certs-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659191" comment="mozilla-nss-devel-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659109" comment="mozilla-nss-sysinit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659099" comment="mozilla-nss-sysinit-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659110" comment="mozilla-nss-tools-3.68.1-58.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148546" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1190975" ref_url="https://bugzilla.suse.com/1190975" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009848.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:
  
- CVE-2021-41617: Fixed privilege escalation when AuthorizedKeysCommand/AuthorizedPrincipalsCommand are configured (bsc#1190975).  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190975">SUSE bug 1190975</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41617">CVE-2021-41617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658348" comment="openssh-7.2p2-74.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658349" comment="openssh-askpass-gnome-7.2p2-74.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658350" comment="openssh-fips-7.2p2-74.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658351" comment="openssh-helpers-7.2p2-74.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148547" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1193321" ref_url="https://bugzilla.suse.com/1193321" source="BUGZILLA"/>
		<reference ref_id="1193485" ref_url="https://bugzilla.suse.com/1193485" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:
                                                                                                                    
Update to Extended Support Release 91.4.0 (bsc#1193485):                                                            
                                                                                                                    
- CVE-2021-43536: URL leakage when navigating while executing asynchronous function
- CVE-2021-43537: Heap buffer overflow when using structured clone                         
- CVE-2021-43538: Missing fullscreen and pointer lock notification when requesting both
- CVE-2021-43539: GC rooting failure when calling wasm instance methods 
- CVE-2021-43541: External protocol handler parameters were unescaped                                                  
- CVE-2021-43542: XMLHttpRequest error codes could have leaked the existence of an external protocol handler           
- CVE-2021-43543: Bypass of CSP sandbox directive when embedding                                                       
- CVE-2021-43545: Denial of Service when using the Location API in a loop                                              
- CVE-2021-43546: Cursor spoofing could overlay user interface when native cursor is zoomed                         
- Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4                                                       
- Removed x-scheme-handler/ftp from MozillaFirefox.desktop (bsc#1193321)                                            
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-12"/>
	<updated date="2021-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193321">SUSE bug 1193321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43536">CVE-2021-43536 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43537">CVE-2021-43537 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43538">CVE-2021-43538 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43539">CVE-2021-43539 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43541">CVE-2021-43541 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43542">CVE-2021-43542 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43543">CVE-2021-43543 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43545">CVE-2021-43545 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43546">CVE-2021-43546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659444" comment="MozillaFirefox-91.4.0-112.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659445" comment="MozillaFirefox-devel-91.4.0-112.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659446" comment="MozillaFirefox-translations-common-91.4.0-112.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148548" version="1" class="patch">
	<metadata>
		<title>Security update for glib-networking (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1172460" ref_url="https://bugzilla.suse.com/1172460" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13645" ref_url="https://www.suse.com/security/cve/CVE-2020-13645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009886.html" source="SUSE-SU"/>
		<description>
This update for glib-networking fixes the following issues:

- CVE-2020-13645: Fixed a connection failure when the server identity is unset (bsc#1172460).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-13"/>
	<updated date="2021-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172460">SUSE bug 1172460</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13645/">CVE-2020-13645 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13645">CVE-2020-13645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659102" comment="glib-networking-2.48.2-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659084" comment="glib-networking-lang-2.48.2-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148549" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1193030" ref_url="https://bugzilla.suse.com/1193030" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009903.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:
 
- CVE-2021-4008: Fixed Privilege Escalation Vulnerability via Out-Of-Bounds Access in SProcRenderCompositeGlyphs (bsc#1193030).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193030">SUSE bug 1193030</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4008">CVE-2021-4008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659889" comment="xorg-x11-server-7.6_1.18.3-76.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659890" comment="xorg-x11-server-extra-7.6_1.18.3-76.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148550" version="1" class="patch">
	<metadata>
		<title>Security update for storm (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1193611" ref_url="https://bugzilla.suse.com/1193611" source="BUGZILLA"/>
		<reference ref_id="1193641" ref_url="https://bugzilla.suse.com/1193641" source="BUGZILLA"/>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="CVE-2021-44228" ref_url="https://www.suse.com/security/cve/CVE-2021-44228/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009911.html" source="SUSE-SU"/>
		<description>
This update for storm fixes the following issues:

- Remove JndiLookup from log4j 2.x jars during build to prevent 'log4shell' code injection. (bsc#1193641, bsc#1193611, CVE-2021-44228)
- Remove JMSAppender from log4j 1.2.x jars during build to prevent attacks when JMS is enabled (bsc#1193641, bsc#1193662, CVE-2021-4104)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-15"/>
	<updated date="2021-12-15"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1193611">SUSE bug 1193611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193641">SUSE bug 1193641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">CVE-2021-4104 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44228/">CVE-2021-44228 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228">CVE-2021-44228 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659918" comment="storm-1.2.3-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659919" comment="storm-nimbus-1.2.3-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659920" comment="storm-supervisor-1.2.3-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659921" comment="venv-openstack-monasca-x86_64-2.2.2~dev1-11.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148551" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009918.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issue:

- CVE-2021-4104: Disable the JMSAppender class from log4j to protect against
  the log4jshell vulnerability. [bsc#1193662]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-17"/>
	<updated date="2021-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">CVE-2021-4104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660148" comment="log4j-1.2.15-126.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148552" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1190487" ref_url="https://bugzilla.suse.com/1190487" source="BUGZILLA"/>
		<reference ref_id="1190489" ref_url="https://bugzilla.suse.com/1190489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009/" source="CVE"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009920.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4009: The handler for the CreatePointerBarrier request of the XFixes 
  extension does not properly validate the request length leading to out of 
  bounds memory write. (bsc#1190487)
- CVE-2021-4011: The handlers for the RecordCreateContext and RecordRegisterClients
  requests of the Record extension do not properly validate the request
  length leading to out of bounds memory write. (bsc#1190489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-20"/>
	<updated date="2021-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190487">SUSE bug 1190487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4009">CVE-2021-4009 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4011">CVE-2021-4011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660798" comment="xorg-x11-server-7.6_1.18.3-76.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660799" comment="xorg-x11-server-extra-7.6_1.18.3-76.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148553" version="1" class="patch">
	<metadata>
		<title>Recommended update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1192849" ref_url="https://bugzilla.suse.com/1192849" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<reference ref_id="SUSE-RU-2021:4126-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021140.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

The username map advice from the CVE-2020-25717 advisory
note has undesired side effects for the local nt token. Fallback
to a SID/UID based mapping if the name based lookup fails (bsc#1192849).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-20"/>
	<updated date="2021-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192849">SUSE bug 1192849</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25717">CVE-2020-25717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660811" comment="libdcerpc-binding0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660812" comment="libdcerpc-binding0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660813" comment="libdcerpc0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660814" comment="libdcerpc0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660815" comment="libndr-krb5pac0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660816" comment="libndr-krb5pac0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660817" comment="libndr-nbt0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660818" comment="libndr-nbt0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660819" comment="libndr-standard0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660820" comment="libndr-standard0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660821" comment="libndr0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660822" comment="libndr0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660823" comment="libnetapi0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660824" comment="libnetapi0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660825" comment="libsamba-credentials0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660826" comment="libsamba-credentials0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660827" comment="libsamba-errors0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660828" comment="libsamba-errors0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660829" comment="libsamba-hostconfig0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660830" comment="libsamba-hostconfig0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660831" comment="libsamba-passdb0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660832" comment="libsamba-passdb0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660833" comment="libsamba-util0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660834" comment="libsamba-util0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660835" comment="libsamdb0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660836" comment="libsamdb0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660837" comment="libsmbclient0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660838" comment="libsmbclient0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660839" comment="libsmbconf0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660840" comment="libsmbconf0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660841" comment="libsmbldap0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660842" comment="libsmbldap0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660843" comment="libtevent-util0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660844" comment="libtevent-util0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660845" comment="libwbclient0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660846" comment="libwbclient0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660847" comment="samba-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660848" comment="samba-client-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660849" comment="samba-client-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660850" comment="samba-doc-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660851" comment="samba-libs-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660852" comment="samba-libs-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660853" comment="samba-winbind-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660854" comment="samba-winbind-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148554" version="1" class="patch">
	<metadata>
		<title>Security update for chrony (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1063704" ref_url="https://bugzilla.suse.com/1063704" source="BUGZILLA"/>
		<reference ref_id="1069468" ref_url="https://bugzilla.suse.com/1069468" source="BUGZILLA"/>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1083597" ref_url="https://bugzilla.suse.com/1083597" source="BUGZILLA"/>
		<reference ref_id="1099272" ref_url="https://bugzilla.suse.com/1099272" source="BUGZILLA"/>
		<reference ref_id="1115529" ref_url="https://bugzilla.suse.com/1115529" source="BUGZILLA"/>
		<reference ref_id="1128846" ref_url="https://bugzilla.suse.com/1128846" source="BUGZILLA"/>
		<reference ref_id="1156884" ref_url="https://bugzilla.suse.com/1156884" source="BUGZILLA"/>
		<reference ref_id="1159840" ref_url="https://bugzilla.suse.com/1159840" source="BUGZILLA"/>
		<reference ref_id="1161119" ref_url="https://bugzilla.suse.com/1161119" source="BUGZILLA"/>
		<reference ref_id="1162964" ref_url="https://bugzilla.suse.com/1162964" source="BUGZILLA"/>
		<reference ref_id="1171806" ref_url="https://bugzilla.suse.com/1171806" source="BUGZILLA"/>
		<reference ref_id="1172113" ref_url="https://bugzilla.suse.com/1172113" source="BUGZILLA"/>
		<reference ref_id="1173277" ref_url="https://bugzilla.suse.com/1173277" source="BUGZILLA"/>
		<reference ref_id="1173760" ref_url="https://bugzilla.suse.com/1173760" source="BUGZILLA"/>
		<reference ref_id="1174075" ref_url="https://bugzilla.suse.com/1174075" source="BUGZILLA"/>
		<reference ref_id="1174911" ref_url="https://bugzilla.suse.com/1174911" source="BUGZILLA"/>
		<reference ref_id="1180689" ref_url="https://bugzilla.suse.com/1180689" source="BUGZILLA"/>
		<reference ref_id="1181826" ref_url="https://bugzilla.suse.com/1181826" source="BUGZILLA"/>
		<reference ref_id="1183783" ref_url="https://bugzilla.suse.com/1183783" source="BUGZILLA"/>
		<reference ref_id="1184400" ref_url="https://bugzilla.suse.com/1184400" source="BUGZILLA"/>
		<reference ref_id="1187906" ref_url="https://bugzilla.suse.com/1187906" source="BUGZILLA"/>
		<reference ref_id="1190926" ref_url="https://bugzilla.suse.com/1190926" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14367" ref_url="https://www.suse.com/security/cve/CVE-2020-14367/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009931.html" source="SUSE-SU"/>
		<description>
This update for chrony fixes the following issues:

Chrony was updated to 4.1:

* Add support for NTS servers specified by IP address (matching
  Subject Alternative Name in server certificate)
* Add source-specific configuration of trusted certificates
* Allow multiple files and directories with trusted certificates
* Allow multiple pairs of server keys and certificates
* Add copy option to server/pool directive
* Increase PPS lock limit to 40% of pulse interval
* Perform source selection immediately after loading dump files
* Reload dump files for addresses negotiated by NTS-KE server
* Update seccomp filter and add less restrictive level
* Restart ongoing name resolution on online command
* Fix dump files to not include uncorrected offset
* Fix initstepslew to accept time from own NTP clients
* Reset NTP address and port when no longer negotiated by NTS-KE
  server
- Update clknetsim to snapshot f89702d.

- Ensure the correct pool packages are installed for openSUSE and SLE (bsc#1180689).

- Enable syscallfilter unconditionally (bsc#1181826).

Chrony was updated to 4.0:

Enhancements

- Add support for Network Time Security (NTS) authentication
- Add support for AES-CMAC keys (AES128, AES256) with Nettle
- Add authselectmode directive to control selection of
  unauthenticated sources
- Add binddevice, bindacqdevice, bindcmddevice directives
- Add confdir directive to better support fragmented
  configuration
- Add sourcedir directive and 'reload sources' command to
  support dynamic NTP sources specified in files
- Add clockprecision directive
- Add dscp directive to set Differentiated Services Code Point
  (DSCP)
- Add -L option to limit log messages by severity
- Add -p option to print whole configuration with included
  files
- Add -U option to allow start under non-root user
- Allow maxsamples to be set to 1 for faster update with -q/-Q
  option
- Avoid replacing NTP sources with sources that have
  unreachable address
- Improve pools to repeat name resolution to get 'maxsources'
  sources
- Improve source selection with trusted sources
- Improve NTP loop test to prevent synchronisation to itself
- Repeat iburst when NTP source is switched from offline state
  to online
- Update clock synchronisation status and leap status more
  frequently
- Update seccomp filter
- Add 'add pool' command
- Add 'reset sources' command to drop all measurements
- Add authdata command to print details about NTP
  authentication
- Add selectdata command to print details about source
  selection
- Add -N option and sourcename command to print original names
  of sources
- Add -a option to some commands to print also unresolved
  sources
- Add -k, -p, -r options to clients command to select, limit,
  reset data
- Bug fixes
- Don’t set interface for NTP responses to allow asymmetric
  routing
- Handle RTCs that don’t support interrupts
- Respond to command requests with correct address on
  multihomed hosts
- Removed features
- Drop support for RIPEMD keys (RMD128, RMD160, RMD256, RMD320)
- Drop support for long (non-standard) MACs in NTPv4 packets
  (chrony 2.x clients using non-MD5/SHA1 keys need to use
  option 'version 3')

- By default we don't write log files but log to journald, so
  only recommend logrotate.

- Adjust and rename the sysconfig file, so that it matches the
  expectations of chronyd.service (bsc#1173277).

Chrony was updated to 3.5.1:

* Create new file when writing pidfile (CVE-2020-14367, bsc#1174911)

- Add chrony-pool-suse and chrony-pool-openSUSE subpackages that
  preconfigure chrony to use NTP servers from the  respective
  pools for SUSE and openSUSE (bsc#1156884, SLE-11424).
- Add chrony-pool-empty to still allow installing chrony without
  preconfigured servers.
- Use iburst in the default pool statements to speed up initial
  synchronisation (bsc#1172113).

- Update clknetsim to version 79ffe44 (fixes bsc#1162964).

Update to 3.5:

+ Add support for more accurate reading of PHC on Linux 5.0
+ Add support for hardware timestamping on interfaces with read-only timestamping configuration
+ Add support for memory locking and real-time priority on FreeBSD, NetBSD, Solaris
+ Update seccomp filter to work on more architectures
+ Validate refclock driver options
+ Fix bindaddress directive on FreeBSD
+ Fix transposition of hardware RX timestamp on Linux 4.13 and later
+ Fix building on non-glibc systems

- Fix location of helper script in chrony-dnssrv@.service (bsc#1128846).

- Read runtime servers from /var/run/netconfig/chrony.servers (bsc#1099272)
- Move chrony-helper to /usr/lib/chrony/helper, because there should be no executables in /usr/share.
- Remove discrepancies between spec file and chrony-tmpfiles (bsc#1115529) 

Update to version 3.4

* Enhancements

  + Add filter option to server/pool/peer directive
  + Add minsamples and maxsamples options to hwtimestamp directive
  + Add support for faster frequency adjustments in Linux 4.19
  + Change default pidfile to /var/run/chrony/chronyd.pid to allow chronyd 
    without root privileges to remove it on exit
  + Disable sub-second polling intervals for distant NTP sources
  + Extend range of supported sub-second polling intervals
  + Get/set IPv4 destination/source address of NTP packets on FreeBSD
  + Make burst options and command useful with short polling intervals
  + Modify auto_offline option to activate when sending request failed
  + Respond from interface that received NTP request if possible
  + Add onoffline command to switch between online and offline state 
    according to current system network configuration
  + Improve example NetworkManager dispatcher script

* Bug fixes

  + Avoid waiting in Linux getrandom system call
  + Fix PPS support on FreeBSD and NetBSD

Update to version 3.3

* Enhancements:

  + Add burst option to server/pool directive
  + Add stratum and tai options to refclock directive
  + Add support for Nettle crypto library
  + Add workaround for missing kernel receive timestamps on Linux
  + Wait for late hardware transmit timestamps
  + Improve source selection with unreachable sources
  + Improve protection against replay attacks on symmetric mode
  + Allow PHC refclock to use socket in /var/run/chrony
  + Add shutdown command to stop chronyd
  + Simplify format of response to manual list command
  + Improve handling of unknown responses in chronyc

* Bug fixes:

  + Respond to NTPv1 client requests with zero mode
  + Fix -x option to not require CAP_SYS_TIME under non-root user
  + Fix acquisitionport directive to work with privilege separation
  + Fix handling of socket errors on Linux to avoid high CPU usage
  + Fix chronyc to not get stuck in infinite loop after clock step

- Added /etc/chrony.d/ directory to the package (bsc#1083597) Modifed default chrony.conf to add 'include /etc/chrony.d/*'

- Enable pps support

Upgraded to version 3.2:

Enhancements

* Improve stability with NTP sources and reference clocks
* Improve stability with hardware timestamping
* Improve support for NTP interleaved modes
* Control frequency of system clock on macOS 10.13 and later
* Set TAI-UTC offset of system clock with leapsectz directive
* Minimise data in client requests to improve privacy
* Allow transmit-only hardware timestamping
* Add support for new timestamping options introduced in Linux 4.13
* Add root delay, root dispersion and maximum error to tracking log
* Add mindelay and asymmetry options to server/peer/pool directive
* Add extpps option to PHC refclock to timestamp external PPS signal
* Add pps option to refclock directive to treat any refclock as PPS
* Add width option to refclock directive to filter wrong pulse edges
* Add rxfilter option to hwtimestamp directive
* Add -x option to disable control of system clock
* Add -l option to log to specified file instead of syslog
* Allow multiple command-line options to be specified together
* Allow starting without root privileges with -Q option
* Update seccomp filter for new glibc versions
* Dump history on exit by default with dumpdir directive
* Use hardening compiler options by default

Bug fixes

* Don't drop PHC samples with low-resolution system clock
* Ignore outliers in PHC tracking, RTC tracking, manual input
* Increase polling interval when peer is not responding
* Exit with error message when include directive fails
* Don't allow slash after hostname in allow/deny directive/command
* Try to connect to all addresses in chronyc before giving up

Upgraded to version 3.1:

- Enhancements

  - Add support for precise cross timestamping of PHC on Linux
  - Add minpoll, precision, nocrossts options to hwtimestamp directive
  - Add rawmeasurements option to log directive and modify measurements
    option to log only valid measurements from synchronised sources
  - Allow sub-second polling interval with NTP sources

- Bug fixes

  - Fix time smoothing in interleaved mode

Upgraded to version 3.0:

- Enhancements

  - Add support for software and hardware timestamping on Linux
  - Add support for client/server and symmetric interleaved modes
  - Add support for MS-SNTP authentication in Samba
  - Add support for truncated MACs in NTPv4 packets
  - Estimate and correct for asymmetric network jitter
  - Increase default minsamples and polltarget to improve stability with very low jitter
  - Add maxjitter directive to limit source selection by jitter
  - Add offset option to server/pool/peer directive
  - Add maxlockage option to refclock directive
  - Add -t option to chronyd to exit after specified time
  - Add partial protection against replay attacks on symmetric mode
  - Don't reset polling interval when switching sources to online state
  - Allow rate limiting with very short intervals
  - Improve maximum server throughput on Linux and NetBSD
  - Remove dump files after start
  - Add tab-completion to chronyc with libedit/readline
  - Add ntpdata command to print details about NTP measurements
  - Allow all source options to be set in add server/peer command
  - Indicate truncated addresses/hostnames in chronyc output
  - Print reference IDs as hexadecimal numbers to avoid confusion with IPv4 addresses

- Bug fixes

  - Fix crash with disabled asynchronous name resolving

Upgraded to version 2.4.1:

- Bug fixes

  - Fix processing of kernel timestamps on non-Linux systems
  - Fix crash with smoothtime directive
  - Fix validation of refclock sample times
  - Fix parsing of refclock directive

update to 2.4:

- Enhancements

  - Add orphan option to local directive for orphan mode
    compatible with ntpd
  - Add distance option to local directive to set activation
    threshold (1 second by default)
  - Add maxdrift directive to set maximum allowed drift of system
    clock
  - Try to replace NTP sources exceeding maximum distance
  - Randomise source replacement to avoid getting stuck with bad
    sources
  - Randomise selection of sources from pools on start
  - Ignore reference timestamp as ntpd doesn't always set it
    correctly
  - Modify tracking report to use same values as seen by NTP
    clients
  - Add -c option to chronyc to write reports in CSV format
  - Provide detailed manual pages

- Bug fixes

  - Fix SOCK refclock to work correctly when not specified as
    last refclock
  - Fix initstepslew and -q/-Q options to accept time from own
    NTP clients
  - Fix authentication with keys using 512-bit hash functions
  - Fix crash on exit when multiple signals are received
  - Fix conversion of very small floating-point numbers in
    command packets
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1063704">SUSE bug 1063704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069468">SUSE bug 1069468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083597">SUSE bug 1083597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099272">SUSE bug 1099272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115529">SUSE bug 1115529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128846">SUSE bug 1128846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156884">SUSE bug 1156884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159840">SUSE bug 1159840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161119">SUSE bug 1161119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162964">SUSE bug 1162964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171806">SUSE bug 1171806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172113">SUSE bug 1172113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173277">SUSE bug 1173277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173760">SUSE bug 1173760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174075">SUSE bug 1174075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174911">SUSE bug 1174911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180689">SUSE bug 1180689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181826">SUSE bug 1181826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183783">SUSE bug 1183783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184400">SUSE bug 1184400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187906">SUSE bug 1187906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190926">SUSE bug 1190926</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14367/">CVE-2020-14367 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14367">CVE-2020-14367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659981" comment="chrony-4.1-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148555" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1176460" ref_url="https://bugzilla.suse.com/1176460" source="BUGZILLA"/>
		<reference ref_id="1187725" ref_url="https://bugzilla.suse.com/1187725" source="BUGZILLA"/>
		<reference ref_id="1188061" ref_url="https://bugzilla.suse.com/1188061" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3583" ref_url="https://www.suse.com/security/cve/CVE-2021-3583/" source="CVE"/>
		<reference ref_id="CVE-2021-3620" ref_url="https://www.suse.com/security/cve/CVE-2021-3620/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009930.html" source="SUSE-SU"/>
		<description>
This update for ansible fixes the following issues:

Update to 2.9.27:

- CVE-2021-3620: ansible-connection module discloses sensitive info in traceback error message (bsc#1187725).
- CVE-2021-3583: Template Injection through yaml multi-line strings with ansible facts used in template (bsc#1188061).
- ansible module nmcli is broken in ansible 2.9.13 (bsc#1176460)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176460">SUSE bug 1176460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187725">SUSE bug 1187725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188061">SUSE bug 1188061</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3583/">CVE-2021-3583 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3583">CVE-2021-3583 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3620/">CVE-2021-3620 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3620">CVE-2021-3620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659371" comment="ansible-2.9.27-3.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148556" version="1" class="patch">
	<metadata>
		<title>Security update for logstash (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009943.html" source="SUSE-SU"/>
		<description>
This update for logstash fixes the following issues:

Fixed vulnerability related to log4j version 1.2.x

- CVE-2021-4104: Fixed remote code execution through the JMS API via the ldap JNDI parser (bsc#1193662)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-24"/>
	<updated date="2021-12-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">CVE-2021-4104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660953" comment="elasticsearch-2.4.2-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660954" comment="kafka-0.10.2.2-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660215" comment="logstash-2.4.1-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660955" comment="openstack-monasca-agent-2.2.6~dev4-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660956" comment="openstack-monasca-persister-java-1.7.1~a0~dev2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660957" comment="openstack-monasca-thresh-2.1.1-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660958" comment="python-monasca-agent-2.2.6~dev4-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660959" comment="venv-openstack-aodh-x86_64-5.1.1~dev7-12.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660960" comment="venv-openstack-barbican-x86_64-5.0.2~dev3-12.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660961" comment="venv-openstack-ceilometer-x86_64-9.0.8~dev7-12.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660962" comment="venv-openstack-cinder-x86_64-11.2.3~dev29-14.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660963" comment="venv-openstack-designate-x86_64-5.0.3~dev7-12.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660964" comment="venv-openstack-freezer-x86_64-5.0.0.0~xrc2~dev2-10.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660965" comment="venv-openstack-glance-x86_64-15.0.3~dev3-12.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660966" comment="venv-openstack-heat-x86_64-9.0.8~dev22-12.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660967" comment="venv-openstack-horizon-x86_64-12.0.5~dev6-14.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660968" comment="venv-openstack-ironic-x86_64-9.1.8~dev8-12.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660969" comment="venv-openstack-keystone-x86_64-12.0.4~dev11-11.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660970" comment="venv-openstack-magnum-x86_64-5.0.2_5.0.2_5.0.2~dev31-11.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660971" comment="venv-openstack-manila-x86_64-5.1.1~dev5-12.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660972" comment="venv-openstack-monasca-ceilometer-x86_64-1.5.1_1.5.1_1.5.1~dev3-8.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660973" comment="venv-openstack-monasca-x86_64-2.2.2~dev1-11.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660974" comment="venv-openstack-murano-x86_64-4.0.2~dev2-12.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660975" comment="venv-openstack-neutron-x86_64-11.0.9~dev69-13.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660976" comment="venv-openstack-nova-x86_64-16.1.9~dev92-11.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660977" comment="venv-openstack-octavia-x86_64-1.0.6~dev3-12.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660978" comment="venv-openstack-sahara-x86_64-7.0.5~dev4-11.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660979" comment="venv-openstack-swift-x86_64-2.15.2_2.15.2_2.15.2~dev32-11.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660980" comment="venv-openstack-trove-x86_64-8.0.2~dev2-11.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660981" comment="zookeeper-server-3.4.10-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148557" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008310.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- buffer overflow in PyCArg_repr in _ctypes/callproc.c,
  which may lead to remote code execution (bsc#1181126, CVE-2021-3177).
- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-11"/>
	<updated date="2021-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531872" comment="libpython2_7-1_0-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531873" comment="libpython2_7-1_0-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531874" comment="python-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531875" comment="python-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531876" comment="python-base-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531877" comment="python-base-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531878" comment="python-curses-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531879" comment="python-demo-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531880" comment="python-devel-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531881" comment="python-doc-2.7.17-28.64.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531882" comment="python-doc-pdf-2.7.17-28.64.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531883" comment="python-gdbm-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531884" comment="python-idle-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531885" comment="python-tk-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531886" comment="python-xml-2.7.17-28.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148558" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1181742" ref_url="https://bugzilla.suse.com/1181742" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35498" ref_url="https://www.suse.com/security/cve/CVE-2020-35498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008320.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2020-35498: Fixed a denial of service related to the handling of Ethernet padding (bsc#1181742).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-12"/>
	<updated date="2021-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181742">SUSE bug 1181742</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35498/">CVE-2020-35498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35498">CVE-2020-35498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555936" comment="openvswitch-2.7.12-3.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148559" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1105322" ref_url="https://bugzilla.suse.com/1105322" source="BUGZILLA"/>
		<reference ref_id="1105323" ref_url="https://bugzilla.suse.com/1105323" source="BUGZILLA"/>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1168952" ref_url="https://bugzilla.suse.com/1168952" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1175306" ref_url="https://bugzilla.suse.com/1175306" source="BUGZILLA"/>
		<reference ref_id="1176395" ref_url="https://bugzilla.suse.com/1176395" source="BUGZILLA"/>
		<reference ref_id="1176485" ref_url="https://bugzilla.suse.com/1176485" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1178182" ref_url="https://bugzilla.suse.com/1178182" source="BUGZILLA"/>
		<reference ref_id="1178272" ref_url="https://bugzilla.suse.com/1178272" source="BUGZILLA"/>
		<reference ref_id="1178589" ref_url="https://bugzilla.suse.com/1178589" source="BUGZILLA"/>
		<reference ref_id="1178886" ref_url="https://bugzilla.suse.com/1178886" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179140" ref_url="https://bugzilla.suse.com/1179140" source="BUGZILLA"/>
		<reference ref_id="1179141" ref_url="https://bugzilla.suse.com/1179141" source="BUGZILLA"/>
		<reference ref_id="1179204" ref_url="https://bugzilla.suse.com/1179204" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179508" ref_url="https://bugzilla.suse.com/1179508" source="BUGZILLA"/>
		<reference ref_id="1179509" ref_url="https://bugzilla.suse.com/1179509" source="BUGZILLA"/>
		<reference ref_id="1179601" ref_url="https://bugzilla.suse.com/1179601" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1179663" ref_url="https://bugzilla.suse.com/1179663" source="BUGZILLA"/>
		<reference ref_id="1179666" ref_url="https://bugzilla.suse.com/1179666" source="BUGZILLA"/>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1179878" ref_url="https://bugzilla.suse.com/1179878" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1179961" ref_url="https://bugzilla.suse.com/1179961" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180027" ref_url="https://bugzilla.suse.com/1180027" source="BUGZILLA"/>
		<reference ref_id="1180028" ref_url="https://bugzilla.suse.com/1180028" source="BUGZILLA"/>
		<reference ref_id="1180029" ref_url="https://bugzilla.suse.com/1180029" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180031" ref_url="https://bugzilla.suse.com/1180031" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180052" ref_url="https://bugzilla.suse.com/1180052" source="BUGZILLA"/>
		<reference ref_id="1180086" ref_url="https://bugzilla.suse.com/1180086" source="BUGZILLA"/>
		<reference ref_id="1180559" ref_url="https://bugzilla.suse.com/1180559" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="1180815" ref_url="https://bugzilla.suse.com/1180815" source="BUGZILLA"/>
		<reference ref_id="1181096" ref_url="https://bugzilla.suse.com/1181096" source="BUGZILLA"/>
		<reference ref_id="1181158" ref_url="https://bugzilla.suse.com/1181158" source="BUGZILLA"/>
		<reference ref_id="1181349" ref_url="https://bugzilla.suse.com/1181349" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="969755" ref_url="https://bugzilla.suse.com/969755" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2019-20934" ref_url="https://www.suse.com/security/cve/CVE-2019-20934/" source="CVE"/>
		<reference ref_id="CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444/" source="CVE"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2020-27835" ref_url="https://www.suse.com/security/cve/CVE-2020-27835/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2020-25211: Fixed a buffer overflow in ctnetlink_parse_tuple_filter() which could be triggered by a local attackers by injecting conntrack netlink configuration (bnc#1176395).
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation (bnc#1105322).

The following non-security bugs were fixed:

- cifs: do not revalidate mountpoint dentries (bsc#1177440).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: ignore revalidate failures in case of process gets signaled (bsc#1177440).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- futex: Avoid freeing an active timer (bsc#969755).
- futex: Avoid violating the 10th rule of futex (bsc#969755).
- futex: Change locking rules (bsc#969755).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#969755).
- futex: Drop hb-&gt;lock before enqueueing on the rtmutex (bsc#969755).
- futex: Fix incorrect should_fail_futex() handling (bsc#969755).
- futex: Fix more put_pi_state() vs. exit_pi_state_list() races (bsc#969755).
- futex: Fix OWNER_DEAD fixup (bsc#969755).
- futex: Fix pi_state-&gt;owner serialization (bsc#969755).
- futex: Fix small (and harmless looking) inconsistencies (bsc#969755).
- futex: Futex_unlock_pi() determinism (bsc#969755).
- futex: Handle early deadlock return correctly (bsc#969755).
- futex: Handle transient 'ownerless' rtmutex state correctly (bsc#969755).
- futex: Pull rt_mutex_futex_unlock() out from under hb-&gt;lock (bsc#969755).
- futex: Rework futex_lock_pi() to use rt_mutex_*_proxy_lock() (bsc#969755).
- futex: Rework inconsistent rt_mutex/futex_q state (bsc#969755).
- futex,rt_mutex: Fix rt_mutex_cleanup_proxy_lock() (bsc#969755).
- futex,rt_mutex: Introduce rt_mutex_init_waiter() (bsc#969755).
- futex,rt_mutex: Provide futex specific rt_mutex API (bsc#969755).
- futex,rt_mutex: Restructure rt_mutex_finish_proxy_lock() (bsc#969755).
- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- IB/hfi1: Clean up hfi1_user_exp_rcv_setup function (bsc#1179878).
- IB/hfi1: Clean up pin_vector_pages() function (bsc#1179878).
- IB/hfi1: Fix the bail out code in pin_vector_pages() function (bsc#1179878).
- IB/hfi1: Move structure definitions from user_exp_rcv.c to user_exp_rcv.h (bsc#1179878).
- IB/hfi1: Name function prototype parameters (bsc#1179878).
- IB/hfi1: Use filedata rather than filepointer (bsc#1179878).
- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#969755).
- mm/userfaultfd: do not access vma-&gt;vm_mm after calling handle_userfault() (bsc#1179204).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1178272).
- Use r3 instead of r13 for l1d fallback flush in do_uaccess_fush (bsc#1181096 ltc#190883).
- video: hyperv_fb: include vmalloc.h (bsc#1175306).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-12"/>
	<updated date="2021-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175306">SUSE bug 1175306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178272">SUSE bug 1178272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179204">SUSE bug 1179204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179508">SUSE bug 1179508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179509">SUSE bug 1179509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179663">SUSE bug 1179663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179666">SUSE bug 1179666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179878">SUSE bug 1179878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179961">SUSE bug 1179961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180027">SUSE bug 1180027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180028">SUSE bug 1180028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180031">SUSE bug 1180031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180052">SUSE bug 1180052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180815">SUSE bug 1180815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181096">SUSE bug 1181096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969755">SUSE bug 969755</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10902">CVE-2018-10902 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20934/">CVE-2019-20934 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20934">CVE-2019-20934 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0444">CVE-2020-0444 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15436">CVE-2020-15436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15437">CVE-2020-15437 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25211">CVE-2020-25211 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25285">CVE-2020-25285 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25669">CVE-2020-25669 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27068">CVE-2020-27068 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27777">CVE-2020-27777 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27825">CVE-2020-27825 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27835/">CVE-2020-27835 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27835">CVE-2020-27835 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28915">CVE-2020-28915 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28974">CVE-2020-28974 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29568">CVE-2020-29568 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">CVE-2020-29569 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4788">CVE-2020-4788 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555937" comment="kernel-default-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555938" comment="kernel-default-base-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555939" comment="kernel-default-devel-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557097" comment="kernel-default-kgraft-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539114" comment="kernel-devel-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539115" comment="kernel-macros-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539116" comment="kernel-source-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555940" comment="kernel-syms-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557099" comment="kgraft-patch-4_4_180-94_138-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148560" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1150934" ref_url="https://bugzilla.suse.com/1150934" source="BUGZILLA"/>
		<reference ref_id="1181777" ref_url="https://bugzilla.suse.com/1181777" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16275" ref_url="https://www.suse.com/security/cve/CVE-2019-16275/" source="CVE"/>
		<reference ref_id="CVE-2021-0326" ref_url="https://www.suse.com/security/cve/CVE-2021-0326/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008327.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-0326: P2P group information processing vulnerability (bsc#1181777).
- CVE-2019-16275: AP mode PMF disconnection protection bypass (bsc#1150934)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-15"/>
	<updated date="2021-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150934">SUSE bug 1150934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181777">SUSE bug 1181777</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16275/">CVE-2019-16275 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16275">CVE-2019-16275 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0326/">CVE-2021-0326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0326">CVE-2021-0326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531899" comment="wpa_supplicant-2.6-15.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148561" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1179748" ref_url="https://bugzilla.suse.com/1179748" source="BUGZILLA"/>
		<reference ref_id="1181483" ref_url="https://bugzilla.suse.com/1181483" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008333.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

- bsc#1179748 CVE-2020-27828: Fix heap overflow by checking maxrlvls
- bsc#1181483 CVE-2021-3272: Fix buffer over-read in jp2_decode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179748">SUSE bug 1179748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181483">SUSE bug 1181483</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27828">CVE-2020-27828 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3272">CVE-2021-3272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531900" comment="libjasper1-1.900.14-195.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531901" comment="libjasper1-32bit-1.900.14-195.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148562" version="1" class="patch">
	<metadata>
		<title>Security update for screen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1182092" ref_url="https://bugzilla.suse.com/1182092" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26937" ref_url="https://www.suse.com/security/cve/CVE-2021-26937/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008336.html" source="SUSE-SU"/>
		<description>
This update for screen fixes the following issues:

- CVE-2021-26937: Fixed double width combining char handling that could lead to a denial of service or code execution (bsc#1182092).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-17"/>
	<updated date="2021-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182092">SUSE bug 1182092</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26937/">CVE-2021-26937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26937">CVE-2021-26937 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531902" comment="screen-4.0.4-23.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148563" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1182246" ref_url="https://bugzilla.suse.com/1182246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008342.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy
  negotiation can be targeted by a buffer overflow attack [bsc#1182246, CVE-2020-8625]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182246">SUSE bug 1182246</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8625">CVE-2020-8625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531903" comment="bind-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531904" comment="bind-chrootenv-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531905" comment="bind-doc-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531906" comment="bind-libs-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531907" comment="bind-libs-32bit-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531908" comment="bind-utils-9.9.9P1-63.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148564" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008344.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 80
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27221">CVE-2020-27221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531909" comment="java-1_7_1-ibm-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531910" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531911" comment="java-1_7_1-ibm-devel-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531912" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531913" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.80-38.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148565" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1177211" ref_url="https://bugzilla.suse.com/1177211" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008345.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2020-26116: Raise ValueError if method contains control characters and thus prevent CRLF injection into URLs (bsc#1177211).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26116">CVE-2020-26116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597582" comment="python-urllib3-1.22-5.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148566" version="1" class="patch">
	<metadata>
		<title>Security update for krb5-appl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1131109" ref_url="https://bugzilla.suse.com/1131109" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25017" ref_url="https://www.suse.com/security/cve/CVE-2019-25017/" source="CVE"/>
		<reference ref_id="CVE-2019-25018" ref_url="https://www.suse.com/security/cve/CVE-2019-25018/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008353.html" source="SUSE-SU"/>
		<description>
This update for krb5-appl fixes the following issues:

- CVE-2019-25017: Check the filenames sent by the server match those requested by the client (bsc#1131109).
- CVE-2019-25018: Disallow empty incoming filename or ones that refer to the current directory (bsc#1131109).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131109">SUSE bug 1131109</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25017/">CVE-2019-25017 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25017">CVE-2019-25017 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25018/">CVE-2019-25018 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25018">CVE-2019-25018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531914" comment="krb5-appl-clients-1.0.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531915" comment="krb5-appl-servers-1.0.3-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148567" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008355.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u282 (icedtea 3.18.0)
  * January 2021 CPU (bsc#1181239)
  * Security fixes
    + JDK-8247619: Improve Direct Buffering of Characters (CVE-2020-14803)
  * Import of OpenJDK 8 u282 build 01
    + JDK-6962725: Regtest javax/swing/JFileChooser/6738668/
      /bug6738668.java fails under Linux
    + JDK-8025936: Windows .pdb and .map files does not have proper
      dependencies setup
    + JDK-8030350: Enable additional compiler warnings for GCC
    + JDK-8031423: Test java/awt/dnd/DisposeFrameOnDragCrash/
      /DisposeFrameOnDragTest.java fails by Timeout on Windows
    + JDK-8036122: Fix warning 'format not a string literal'
    + JDK-8051853: new
      URI('x/').resolve('..').getSchemeSpecificPart() returns null!
    + JDK-8132664: closed/javax/swing/DataTransfer/DefaultNoDrop/
      /DefaultNoDrop.java locks on Windows
    + JDK-8134632: Mark javax/sound/midi/Devices/
      /InitializationHang.java as headful
    + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'
      treated by JVM as an equivalent
    + JDK-8148916: Mark bug6400879.java as intermittently failing
    + JDK-8148983: Fix extra comma in changes for JDK-8148916
    + JDK-8160438: javax/swing/plaf/nimbus/8057791/bug8057791.java
      fails
    + JDK-8165808: Add release barriers when allocating objects
      with concurrent collection
    + JDK-8185003: JMX: Add a version of
      ThreadMXBean.dumpAllThreads with a maxDepth argument
    + JDK-8202076: test/jdk/java/io/File/WinSpecialFiles.java on
      windows with VS2017
    + JDK-8207766: [testbug] Adapt tests for Aix.
    + JDK-8212070: Introduce diagnostic flag to abort VM on failed
      JIT compilation
    + JDK-8213448: [TESTBUG] enhance jfr/jvm/TestDumpOnCrash
    + JDK-8215727: Restore JFR thread sampler loop to old /
      previous behavior
    + JDK-8220657: JFR.dump does not work when filename is set
    + JDK-8221342: [TESTBUG] Generate Dockerfile for docker testing
    + JDK-8224502: [TESTBUG] JDK docker test TestSystemMetrics.java
      fails with access issues and OOM
    + JDK-8231209: [REDO] ThreadMXBean::getThreadAllocatedBytes()
      can be quicker for self thread
    + JDK-8231968: getCurrentThreadAllocatedBytes default
      implementation s/b getThreadAllocatedBytes
    + JDK-8232114: JVM crashed at imjpapi.dll in native code
    + JDK-8234270: [REDO] JDK-8204128 NMT might report incorrect
      numbers for Compiler area
    + JDK-8234339: replace JLI_StrTok in java_md_solinux.c
    + JDK-8238448: RSASSA-PSS signature verification fail when
      using certain odd key sizes
    + JDK-8242335: Additional Tests for RSASSA-PSS
    + JDK-8244225: stringop-overflow warning on strncpy call from
      compile_the_world_in
    + JDK-8245400: Upgrade to LittleCMS 2.11
    + JDK-8248214: Add paddings for TaskQueueSuper to reduce
      false-sharing cache contention
    + JDK-8249176: Update GlobalSignR6CA test certificates
    + JDK-8250665: Wrong translation for the month name of May in
      ar_JO,LB,SY
    + JDK-8250928: JFR: Improve hash algorithm for stack traces
    + JDK-8251469: Better cleanup for
      test/jdk/javax/imageio/SetOutput.java
    + JDK-8251840: Java_sun_awt_X11_XToolkit_getDefaultScreenData
      should not be in make/mapfiles/libawt_xawt/mapfile-vers
    + JDK-8252384: [TESTBUG] Some tests refer to COMPAT provider
      rather than JRE
    + JDK-8252395: [8u] --with-native-debug-symbols=external
      doesn't include debuginfo files for binaries
    + JDK-8252497: Incorrect numeric currency code for ROL
    + JDK-8252754: Hash code calculation of JfrStackTrace is
      inconsistent
    + JDK-8252904: VM crashes when JFR is used and JFR event class
      is transformed
    + JDK-8252975: [8u] JDK-8252395 breaks the build for
      --with-native-debug-symbols=internal
    + JDK-8253284: Zero OrderAccess barrier mappings are incorrect
    + JDK-8253550: [8u] JDK-8252395 breaks the build for make
      STRIP_POLICY=no_strip
    + JDK-8253752: test/sun/management/jmxremote/bootstrap/
      /RmiBootstrapTest.java fails randomly
    + JDK-8254081: java/security/cert/PolicyNode/
      /GetPolicyQualifiers.java fails due to an expired certificate
    + JDK-8254144: Non-x86 Zero builds fail with return-type
      warning in os_linux_zero.cpp
    + JDK-8254166: Zero: return-type warning in
       zeroInterpreter_zero.cpp
    + JDK-8254683: [TEST_BUG] jdk/test/sun/tools/jconsole/
      /WorkerDeadlockTest.java fails
    + JDK-8255003: Build failures on Solaris
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531916" comment="java-1_8_0-openjdk-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531917" comment="java-1_8_0-openjdk-demo-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531918" comment="java-1_8_0-openjdk-devel-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531919" comment="java-1_8_0-openjdk-headless-1.8.0.282-27.56.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148568" version="1" class="patch">
	<metadata>
		<title>Security update for crowbar-core, crowbar-openstack, grafana, influxdb, openstack-heat-templates, openstack-nova, python-Jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1117080" ref_url="https://bugzilla.suse.com/1117080" source="BUGZILLA"/>
		<reference ref_id="1125815" ref_url="https://bugzilla.suse.com/1125815" source="BUGZILLA"/>
		<reference ref_id="1132174" ref_url="https://bugzilla.suse.com/1132174" source="BUGZILLA"/>
		<reference ref_id="1132323" ref_url="https://bugzilla.suse.com/1132323" source="BUGZILLA"/>
		<reference ref_id="1178243" ref_url="https://bugzilla.suse.com/1178243" source="BUGZILLA"/>
		<reference ref_id="1178988" ref_url="https://bugzilla.suse.com/1178988" source="BUGZILLA"/>
		<reference ref_id="1179161" ref_url="https://bugzilla.suse.com/1179161" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10745" ref_url="https://www.suse.com/security/cve/CVE-2016-10745/" source="CVE"/>
		<reference ref_id="CVE-2018-17954" ref_url="https://www.suse.com/security/cve/CVE-2018-17954/" source="CVE"/>
		<reference ref_id="CVE-2019-10906" ref_url="https://www.suse.com/security/cve/CVE-2019-10906/" source="CVE"/>
		<reference ref_id="CVE-2019-20933" ref_url="https://www.suse.com/security/cve/CVE-2019-20933/" source="CVE"/>
		<reference ref_id="CVE-2019-8341" ref_url="https://www.suse.com/security/cve/CVE-2019-8341/" source="CVE"/>
		<reference ref_id="CVE-2020-24303" ref_url="https://www.suse.com/security/cve/CVE-2020-24303/" source="CVE"/>
		<description>
This update for crowbar-core, crowbar-openstack, grafana, influxdb, openstack-heat-templates, openstack-nova, python-Jinja2 fixes the following issues:

Security fixes included in this request:

grafana:
- CVE-2020-24303: Fixed an XXS with series overides. (bsc#1178243)

influxdb:
- CVE-2019-20933: Fixed an authentication bypass. (bsc#1178988)

python-Jinja2:
- CVE-2019-10906, CVE-2019-8341, CVE-2016-10745: 'SandboxedEnvironment' securely handles
   'str.format_map' in order to prevent code execution through untrusted format strings.
   (bsc#1132323, bsc#1125815, bsc#1132174)

Non-security fixes included in this request:

Changes in crowbar-core.SUSE_SLE-12-SP3_Update_Products_Cloud8:
- Update to version 5.0+git.1606840757.839a64745:
  * ntp: Do not use rate-limiting (bsc#1179161)

Changes in crowbar-openstack.SUSE_SLE-12-SP3_Update_Products_Cloud8:
- Update to version 5.0+git.1604938523.ded915845:
  * rabbitmq: Fix crm running check (SOC-11240)

Changes in grafana.SUSE_SLE-12-SP3_Update_Products_Cloud8_Update:
- Fix bsc#1178243 CVE-2020-24303 by adding
  25401-Fix-XSS-vulnerability-with-series-overrides.patch

Changes in influxdb.SUSE_SLE-12-SP3_Update_Products_Cloud8:
- Add CVE-2019-20933.patch (bsc#1178988, CVE-2019-20933) to
  fix authentication bypass 
- Declare license files correctly

Changes in openstack-heat-templates.SUSE_SLE-12-SP3_Update_Products_Cloud8_Update:
- Update to version 0.0.0+git.1605509190.64f020b:
  * Fix software config on rdo
  * optimize size and time using --no-cache-dir
  * add template for servers using Octavia

- Update to version 0.0.0+git.1604032742.c5733ee:
  * Move heat-templates-check job to zuul v3

Changes in openstack-nova-doc.SUSE_SLE-12-SP3_Update_Products_Cloud8_Update:
- Update to version nova-16.1.9.dev77:
  * Follow up for cherry-pick check for merge patch

Changes in openstack-nova.SUSE_SLE-12-SP3_Update_Products_Cloud8_Update:
- Update to version nova-16.1.9.dev77:
  * Follow up for cherry-pick check for merge patch

Changes in python-Jinja2.SUSE_SLE-12-SP3_Update_Products_Cloud8_Update:
- add 0001-sandbox-str.format_map.patch (bsc#1132323, CVE-2019-10906, bsc#1125815, CVE-2019-8341)
  * 'SandboxedEnvironment' securely handles 'str.format_map' in order
    to prevent code execution through untrusted format strings.  The
    sandbox already handled 'str.format'.
- add 0001-SECURITY-support-sandboxing-in-format-expressions.patch (bsc#1132174, CVE-2016-10745)

- Allows Recommends and Suggest in Fedora

- Recommends only for SUSE

Changes in rubygem-crowbar-client:

 - Update to 3.9.3
   - Enable restricted commands for Cloud 7 (bsc#1117080, CVE-2018-17954)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-11"/>
	<updated date="2021-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1117080">SUSE bug 1117080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125815">SUSE bug 1125815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132174">SUSE bug 1132174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132323">SUSE bug 1132323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178243">SUSE bug 1178243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178988">SUSE bug 1178988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179161">SUSE bug 1179161</bugzilla>
	<cve impact="high" cvss3="8.7/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2016-10745/">CVE-2016-10745 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10745">CVE-2016-10745 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17954/">CVE-2018-17954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17954">CVE-2018-17954 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-10906/">CVE-2019-10906 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10906">CVE-2019-10906 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-20933/">CVE-2019-20933 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20933">CVE-2019-20933 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8341/">CVE-2019-8341 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8341">CVE-2019-8341 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24303/">CVE-2020-24303 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24303">CVE-2020-24303 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597583" comment="grafana-6.7.4-4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597584" comment="influxdb-1.3.4-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597585" comment="openstack-heat-templates-0.0.0+git.1605509190.64f020b-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597586" comment="openstack-nova-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597587" comment="openstack-nova-api-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597588" comment="openstack-nova-cells-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597589" comment="openstack-nova-compute-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597590" comment="openstack-nova-conductor-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597591" comment="openstack-nova-console-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597592" comment="openstack-nova-consoleauth-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597593" comment="openstack-nova-doc-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597594" comment="openstack-nova-novncproxy-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597595" comment="openstack-nova-placement-api-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597596" comment="openstack-nova-scheduler-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597597" comment="openstack-nova-serialproxy-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597598" comment="openstack-nova-vncproxy-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597599" comment="python-Jinja2-2.9.6-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597600" comment="python-nova-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597601" comment="venv-openstack-aodh-x86_64-5.1.1~dev7-12.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597602" comment="venv-openstack-barbican-x86_64-5.0.2~dev3-12.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597603" comment="venv-openstack-ceilometer-x86_64-9.0.8~dev7-12.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597604" comment="venv-openstack-cinder-x86_64-11.2.3~dev29-14.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597605" comment="venv-openstack-designate-x86_64-5.0.3~dev7-12.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597606" comment="venv-openstack-freezer-x86_64-5.0.0.0~xrc2~dev2-10.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597607" comment="venv-openstack-glance-x86_64-15.0.3~dev3-12.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597608" comment="venv-openstack-heat-x86_64-9.0.8~dev22-12.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597609" comment="venv-openstack-ironic-x86_64-9.1.8~dev8-12.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597610" comment="venv-openstack-keystone-x86_64-12.0.4~dev11-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597611" comment="venv-openstack-magnum-x86_64-5.0.2_5.0.2_5.0.2~dev31-11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597612" comment="venv-openstack-manila-x86_64-5.1.1~dev5-12.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597613" comment="venv-openstack-monasca-ceilometer-x86_64-1.5.1_1.5.1_1.5.1~dev3-8.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597614" comment="venv-openstack-monasca-x86_64-2.2.2~dev1-11.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597615" comment="venv-openstack-murano-x86_64-4.0.2~dev2-12.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597616" comment="venv-openstack-neutron-x86_64-11.0.9~dev69-13.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597617" comment="venv-openstack-nova-x86_64-16.1.9~dev77-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597618" comment="venv-openstack-octavia-x86_64-1.0.6~dev3-12.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597619" comment="venv-openstack-sahara-x86_64-7.0.5~dev4-11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597620" comment="venv-openstack-trove-x86_64-8.0.2~dev2-11.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148569" version="1" class="patch">
	<metadata>
		<title>Security update for python-Jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1181944" ref_url="https://bugzilla.suse.com/1181944" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28493" ref_url="https://www.suse.com/security/cve/CVE-2020-28493/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008373.html" source="SUSE-SU"/>
		<description>
This update for python-Jinja2 fixes the following issues:

- CVE-2020-28493: Improve the speed of the 'urlize' filter by reducing regex
    backtracking. Email matching requires a word character at the start of the
    domain part, and only word characters in the TLD. (bsc#1181944)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181944">SUSE bug 1181944</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28493/">CVE-2020-28493 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28493">CVE-2020-28493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597621" comment="python-Jinja2-2.9.6-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148570" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008394.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 25
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27221">CVE-2020-27221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531920" comment="java-1_8_0-ibm-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531921" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531922" comment="java-1_8_0-ibm-devel-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531923" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.25-30.81.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148571" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-Twig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1008644" ref_url="https://bugzilla.suse.com/1008644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9180" ref_url="https://www.suse.com/security/cve/CVE-2016-9180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008410.html" source="SUSE-SU"/>
		<description>
This update for perl-XML-Twig fixes the following issues:

- Security fix [bsc#1008644, CVE-2016-9180]
  * Added: the no_xxe option to XML::Twig::new, which causes the
    parse to fail if external entities are used (to prevent
    malicious XML to access the filesystem).
  * Setting expand_external_ents to 0 or -1 currently doesn't work
    as expected; To completely turn off expanding external entities
    use no_xxe.
  * Update documentation for XML::Twig to mention problems with
    expand_external_ents and add information about new no_xxe argument
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008644">SUSE bug 1008644</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9180/">CVE-2016-9180 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9180">CVE-2016-9180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531924" comment="perl-XML-Twig-3.44-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148572" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1182357" ref_url="https://bugzilla.suse.com/1182357" source="BUGZILLA"/>
		<reference ref_id="1182614" ref_url="https://bugzilla.suse.com/1182614" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008404.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.8.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2021-08 (bsc#1182614)
  * CVE-2021-23969: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23968: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23973: MediaError message property could have leaked information about cross-origin resources
  * CVE-2021-23978: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182357">SUSE bug 1182357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23968">CVE-2021-23968 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23969">CVE-2021-23969 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23973">CVE-2021-23973 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23978">CVE-2021-23978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531925" comment="MozillaFirefox-78.8.0-112.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531926" comment="MozillaFirefox-devel-78.8.0-112.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531927" comment="MozillaFirefox-translations-common-78.8.0-112.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148573" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1182066" ref_url="https://bugzilla.suse.com/1182066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008412.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-36242: Using the Fernet class to symmetrically encrypt multi gigabyte
  values could result in an integer overflow and buffer overflow (bsc#1182066).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182066">SUSE bug 1182066</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36242">CVE-2020-36242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597622" comment="python-cryptography-2.0.3-3.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148574" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1182066" ref_url="https://bugzilla.suse.com/1182066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008413.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-36242: Using the Fernet class to symmetrically encrypt multi gigabyte
  values could result in an integer overflow and buffer overflow (bsc#1182066).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182066">SUSE bug 1182066</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36242">CVE-2020-36242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531928" comment="python-cryptography-2.1.4-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531929" comment="python3-cryptography-2.1.4-7.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148575" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1175970" ref_url="https://bugzilla.suse.com/1175970" source="BUGZILLA"/>
		<reference ref_id="1176711" ref_url="https://bugzilla.suse.com/1176711" source="BUGZILLA"/>
		<reference ref_id="1177883" ref_url="https://bugzilla.suse.com/1177883" source="BUGZILLA"/>
		<reference ref_id="1179264" ref_url="https://bugzilla.suse.com/1179264" source="BUGZILLA"/>
		<reference ref_id="1179265" ref_url="https://bugzilla.suse.com/1179265" source="BUGZILLA"/>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="1182262" ref_url="https://bugzilla.suse.com/1182262" source="BUGZILLA"/>
		<reference ref_id="1182263" ref_url="https://bugzilla.suse.com/1182263" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

grub2 now implements the new 'SBAT' method for SHIM based secure boot revocation. (bsc#1182057)

Following security issues are fixed that can violate secure boot constraints:

- CVE-2020-25632: Fixed a use-after-free in rmmod command (bsc#1176711)
- CVE-2020-25647: Fixed an out-of-bound write in grub_usb_device_initialize() (bsc#1177883)
- CVE-2020-27749: Fixed a stack buffer overflow in grub_parser_split_cmdline (bsc#1179264)
- CVE-2020-27779, CVE-2020-14372: Disallow cutmem and acpi commands in secure boot mode (bsc#1179265 bsc#1175970)
- CVE-2021-20225: Fixed a heap out-of-bounds write in short form option parser (bsc#1182262)
- CVE-2021-20233: Fixed a heap out-of-bound write due to mis-calculation of space required for quoting (bsc#1182263)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175970">SUSE bug 1175970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176711">SUSE bug 1176711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177883">SUSE bug 1177883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179264">SUSE bug 1179264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179265">SUSE bug 1179265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182262">SUSE bug 1182262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182263">SUSE bug 1182263</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14372">CVE-2020-14372 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25632">CVE-2020-25632 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25647">CVE-2020-25647 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27749">CVE-2020-27749 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27779">CVE-2020-27779 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20225">CVE-2021-20225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20233">CVE-2021-20233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555941" comment="grub2-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539120" comment="grub2-i386-pc-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539122" comment="grub2-snapper-plugin-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539123" comment="grub2-systemd-sleep-plugin-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539124" comment="grub2-x86_64-efi-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539125" comment="grub2-x86_64-xen-2.02-4.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148576" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1182279" ref_url="https://bugzilla.suse.com/1182279" source="BUGZILLA"/>
		<reference ref_id="1182408" ref_url="https://bugzilla.suse.com/1182408" source="BUGZILLA"/>
		<reference ref_id="1182411" ref_url="https://bugzilla.suse.com/1182411" source="BUGZILLA"/>
		<reference ref_id="1182412" ref_url="https://bugzilla.suse.com/1182412" source="BUGZILLA"/>
		<reference ref_id="1182413" ref_url="https://bugzilla.suse.com/1182413" source="BUGZILLA"/>
		<reference ref_id="1182415" ref_url="https://bugzilla.suse.com/1182415" source="BUGZILLA"/>
		<reference ref_id="1182416" ref_url="https://bugzilla.suse.com/1182416" source="BUGZILLA"/>
		<reference ref_id="1182417" ref_url="https://bugzilla.suse.com/1182417" source="BUGZILLA"/>
		<reference ref_id="1182418" ref_url="https://bugzilla.suse.com/1182418" source="BUGZILLA"/>
		<reference ref_id="1182419" ref_url="https://bugzilla.suse.com/1182419" source="BUGZILLA"/>
		<reference ref_id="1182420" ref_url="https://bugzilla.suse.com/1182420" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch-&gt;bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-03"/>
	<updated date="2021-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36221">CVE-2020-36221 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36222">CVE-2020-36222 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36223">CVE-2020-36223 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36224">CVE-2020-36224 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36225">CVE-2020-36225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36226">CVE-2020-36226 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36227">CVE-2020-36227 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36228">CVE-2020-36228 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36229">CVE-2020-36229 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36230">CVE-2020-36230 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27212">CVE-2021-27212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531942" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148577" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1178372" ref_url="https://bugzilla.suse.com/1178372" source="BUGZILLA"/>
		<reference ref_id="1181747" ref_url="https://bugzilla.suse.com/1181747" source="BUGZILLA"/>
		<reference ref_id="1181753" ref_url="https://bugzilla.suse.com/1181753" source="BUGZILLA"/>
		<reference ref_id="1181843" ref_url="https://bugzilla.suse.com/1181843" source="BUGZILLA"/>
		<reference ref_id="1182175" ref_url="https://bugzilla.suse.com/1182175" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008448.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used
  by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).

The following non-security bugs were fixed:

- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178372">SUSE bug 1178372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181747">SUSE bug 1181747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181753">SUSE bug 1181753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181843">SUSE bug 1181843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182175">SUSE bug 1182175</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26932">CVE-2021-26932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555942" comment="kernel-default-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555943" comment="kernel-default-base-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555944" comment="kernel-default-devel-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557127" comment="kernel-default-kgraft-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539130" comment="kernel-devel-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539131" comment="kernel-macros-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539132" comment="kernel-source-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555945" comment="kernel-syms-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557129" comment="kgraft-patch-4_4_180-94_141-default-1-4.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148578" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1182805" ref_url="https://bugzilla.suse.com/1182805" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27803" ref_url="https://www.suse.com/security/cve/CVE-2021-27803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008451.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-27803: P2P provision discovery processing vulnerability (bsc#1182805) 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182805">SUSE bug 1182805</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27803/">CVE-2021-27803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27803">CVE-2021-27803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531951" comment="wpa_supplicant-2.6-15.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148579" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1183026" ref_url="https://bugzilla.suse.com/1183026" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21300" ref_url="https://www.suse.com/security/cve/CVE-2021-21300/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008456.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- On case-insensitive filesystems, with support for symbolic links,
  if Git is configured globally to apply delay-capable clean/smudge
  filters (such as Git LFS), Git could be fooled into running
  remote code during a clone. (bsc#1183026, CVE-2021-21300)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183026">SUSE bug 1183026</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21300/">CVE-2021-21300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21300">CVE-2021-21300 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531952" comment="git-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531953" comment="git-core-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531954" comment="git-cvs-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531955" comment="git-daemon-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531957" comment="git-email-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531958" comment="git-gui-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531959" comment="git-svn-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531960" comment="git-web-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531961" comment="gitk-2.26.2-27.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148580" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008491.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- python27 was upgraded to 2.7.18
- CVE-2021-23336: Fixed a potential web cache poisoning by using a semicolon in query parameters use of semicolon as a query string separator (bsc#1182379).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-16"/>
	<updated date="2021-03-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531962" comment="libpython2_7-1_0-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531963" comment="libpython2_7-1_0-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531964" comment="python-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531965" comment="python-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531966" comment="python-base-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531967" comment="python-base-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531968" comment="python-curses-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531969" comment="python-demo-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531970" comment="python-devel-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531971" comment="python-doc-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531972" comment="python-doc-pdf-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531973" comment="python-gdbm-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531974" comment="python-idle-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531975" comment="python-tk-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531976" comment="python-xml-2.7.18-28.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148581" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1180623" ref_url="https://bugzilla.suse.com/1180623" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008173.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.1 ESR
  * Fixed: Critical security issue MFSA 2021-01 (bsc#1180623)
  * CVE-2020-16044
    Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180623">SUSE bug 1180623</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16044">CVE-2020-16044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531977" comment="MozillaFirefox-78.6.1-112.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531978" comment="MozillaFirefox-devel-78.6.1-112.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531979" comment="MozillaFirefox-translations-common-78.6.1-112.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148582" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1182328" ref_url="https://bugzilla.suse.com/1182328" source="BUGZILLA"/>
		<reference ref_id="1182362" ref_url="https://bugzilla.suse.com/1182362" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27218" ref_url="https://www.suse.com/security/cve/CVE-2021-27218/" source="CVE"/>
		<reference ref_id="CVE-2021-27219" ref_url="https://www.suse.com/security/cve/CVE-2021-27219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008493.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2021-27218: g_byte_array_new_take takes a gsize as length but stores in a guint, this patch will refuse if the length is larger than guint. (bsc#1182328)
- CVE-2021-27219: g_memdup takes a guint as parameter and sometimes leads into an integer overflow, so add a g_memdup2 function which uses gsize to replace it. (bsc#1182362)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-16"/>
	<updated date="2021-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182328">SUSE bug 1182328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182362">SUSE bug 1182362</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-27218/">CVE-2021-27218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27218">CVE-2021-27218 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27219/">CVE-2021-27219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27219">CVE-2021-27219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531980" comment="glib2-lang-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531981" comment="glib2-tools-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531982" comment="libgio-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531983" comment="libgio-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531984" comment="libglib-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531985" comment="libglib-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531986" comment="libgmodule-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531987" comment="libgmodule-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531988" comment="libgobject-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531989" comment="libgobject-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531990" comment="libgthread-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531991" comment="libgthread-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148583" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1180414" ref_url="https://bugzilla.suse.com/1180414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008537.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:
	
- CVE-2020-35738: Fixed an out-of-bounds write in WavpackPackSamples (bsc#1180414). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180414">SUSE bug 1180414</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35738">CVE-2020-35738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531994" comment="libwavpack1-4.60.99-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148584" version="1" class="patch">
	<metadata>
		<title>Security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1088639" ref_url="https://bugzilla.suse.com/1088639" source="BUGZILLA"/>
		<reference ref_id="1112438" ref_url="https://bugzilla.suse.com/1112438" source="BUGZILLA"/>
		<reference ref_id="1125689" ref_url="https://bugzilla.suse.com/1125689" source="BUGZILLA"/>
		<reference ref_id="1134616" ref_url="https://bugzilla.suse.com/1134616" source="BUGZILLA"/>
		<reference ref_id="1146182" ref_url="https://bugzilla.suse.com/1146182" source="BUGZILLA"/>
		<reference ref_id="1146184" ref_url="https://bugzilla.suse.com/1146184" source="BUGZILLA"/>
		<reference ref_id="1181358" ref_url="https://bugzilla.suse.com/1181358" source="BUGZILLA"/>
		<reference ref_id="962914" ref_url="https://bugzilla.suse.com/962914" source="BUGZILLA"/>
		<reference ref_id="964140" ref_url="https://bugzilla.suse.com/964140" source="BUGZILLA"/>
		<reference ref_id="966514" ref_url="https://bugzilla.suse.com/966514" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1544" ref_url="https://www.suse.com/security/cve/CVE-2016-1544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" source="SUSE-SU"/>
		<description>
This update for nghttp2 fixes the following issues:

Security issues fixed:

- CVE-2020-11080: HTTP/2 Large Settings Frame DoS (bsc#1181358).
- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service (bsc#1146184).
- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146182).
- CVE-2018-1000168: Fixed ALTSVC frame client side denial of service (bsc#1088639).
- CVE-2016-1544: Fixed out of memory due to unlimited incoming HTTP header fields (bsc#966514).

Bug fixes and enhancements:

- Packages must not mark license files as %doc (bsc#1082318)
- Typo in description of libnghttp2_asio1 (bsc#962914)
- Fixed mistake in spec file (bsc#1125689)
- Fixed build issue with boost 1.70.0 (bsc#1134616)
- Fixed build issue with GCC 6 (bsc#964140)
- Feature: Add W&amp;S module (FATE#326776, bsc#1112438)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088639">SUSE bug 1088639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112438">SUSE bug 1112438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125689">SUSE bug 1125689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134616">SUSE bug 1134616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146182">SUSE bug 1146182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146184">SUSE bug 1146184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181358">SUSE bug 1181358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962914">SUSE bug 962914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964140">SUSE bug 964140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966514">SUSE bug 966514</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1544/">CVE-2016-1544 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1544">CVE-2016-1544 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000168">CVE-2018-1000168 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9511">CVE-2019-9511 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9513">CVE-2019-9513 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11080">CVE-2020-11080 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531995" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148585" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008551.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841">CVE-2021-23841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531996" comment="libopenssl-devel-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531997" comment="libopenssl1_0_0-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531998" comment="libopenssl1_0_0-32bit-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531999" comment="libopenssl1_0_0-hmac-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532000" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532001" comment="openssl-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532002" comment="openssl-doc-1.0.2j-60.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148586" version="1" class="patch">
	<metadata>
		<title>Security update for openstack-dashboard, release-notes-suse-openstack-cloud (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1179955" ref_url="https://bugzilla.suse.com/1179955" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29565" ref_url="https://www.suse.com/security/cve/CVE-2020-29565/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008190.html" source="SUSE-SU"/>
		<description>
This update for openstack-dashboard, release-notes-suse-openstack-cloud fixes the following issues:

- Fix open redirect (OSSA-2020-008, CVE-2020-29565)
- Fix horizon-nodejs jobs.
- Add workaround for secure boot issue when shim package is updated. (bsc#1179955)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179955">SUSE bug 1179955</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29565/">CVE-2020-29565 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29565">CVE-2020-29565 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597623" comment="openstack-dashboard-12.0.5~dev6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597624" comment="python-horizon-12.0.5~dev6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597625" comment="release-notes-suse-openstack-cloud-8.20201214-3.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148587" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1183942" ref_url="https://bugzilla.suse.com/1183942" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.9.0 ESR  (MFSA 2021-11, bsc#1183942)
  * CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read
  * CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23984: Malicious extensions could have spoofed popup information
  * CVE-2021-23987: Memory safety bugs
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-31"/>
	<updated date="2021-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23981">CVE-2021-23981 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23982">CVE-2021-23982 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23984">CVE-2021-23984 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23987">CVE-2021-23987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009532003" comment="MozillaFirefox-78.9.0-112.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532004" comment="MozillaFirefox-devel-78.9.0-112.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532005" comment="MozillaFirefox-translations-common-78.9.0-112.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148588" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1194115" ref_url="https://bugzilla.suse.com/1194115" source="BUGZILLA"/>
		<reference ref_id="1194116" ref_url="https://bugzilla.suse.com/1194116" source="BUGZILLA"/>
		<reference ref_id="1194117" ref_url="https://bugzilla.suse.com/1194117" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45115" ref_url="https://www.suse.com/security/cve/CVE-2021-45115/" source="CVE"/>
		<reference ref_id="CVE-2021-45116" ref_url="https://www.suse.com/security/cve/CVE-2021-45116/" source="CVE"/>
		<reference ref_id="CVE-2021-45452" ref_url="https://www.suse.com/security/cve/CVE-2021-45452/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010010.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2021-45115: Fixed denial-of-service possibility in UserAttributeSimilarityValidator (bsc#1194115).
- CVE-2021-45116: Fixed potential information disclosure in dictsort template filter (bsc#1194117).
- CVE-2021-45452: Fixed potential directory-traversal via Storage.save() (bsc#1194116).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194115">SUSE bug 1194115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194116">SUSE bug 1194116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194117">SUSE bug 1194117</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45115/">CVE-2021-45115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45115">CVE-2021-45115 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45116/">CVE-2021-45116 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45116">CVE-2021-45116 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-45452/">CVE-2021-45452 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45452">CVE-2021-45452 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664016" comment="python-Django-1.11.29-3.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148589" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1197341" ref_url="https://bugzilla.suse.com/1197341" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0547" ref_url="https://www.suse.com/security/cve/CVE-2022-0547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010562.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2022-0547: Fixed possible authentication bypass in external authentication plug-in (bsc#1197341).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197341">SUSE bug 1197341</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0547/">CVE-2022-0547 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0547">CVE-2022-0547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009676877" comment="openvpn-2.3.8-16.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676878" comment="openvpn-auth-pam-plugin-2.3.8-16.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148590" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1196500" ref_url="https://bugzilla.suse.com/1196500" source="BUGZILLA"/>
		<reference ref_id="1197126" ref_url="https://bugzilla.suse.com/1197126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update Java 7.1 to Service Refresh 7 Fix Pack 5 (bsc#1197126).

Including fixes for the following vulnerabilities: 

  CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349,
  CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277,
  CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294,
  CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248,
  CVE-2022-21271.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21271">CVE-2022-21271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21349">CVE-2022-21349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148591" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1195146" ref_url="https://bugzilla.suse.com/1195146" source="BUGZILLA"/>
		<reference ref_id="1196500" ref_url="https://bugzilla.suse.com/1196500" source="BUGZILLA"/>
		<reference ref_id="1197126" ref_url="https://bugzilla.suse.com/1197126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update Java 8.0 to Service Refresh 7 Fix Pack 5 (bsc#1197126).

Including fixes for the following vulnerabilities: 

  CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349,
  CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277,
  CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294,
  CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248,
  CVE-2022-21271.

Non-securtiy fix:

- Fixed a broken symlink for javaws (bsc#1195146).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195146">SUSE bug 1195146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21271">CVE-2022-21271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21349">CVE-2022-21349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148592" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1197459" ref_url="https://bugzilla.suse.com/1197459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010583.html" source="SUSE-SU"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677126" comment="libz1-1.2.8-12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677109" comment="libz1-32bit-1.2.8-12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677127" comment="zlib-devel-1.2.8-12.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148593" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1191902" ref_url="https://bugzilla.suse.com/1191902" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35560" ref_url="https://www.suse.com/security/cve/CVE-2021-35560/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 7 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
- CVE-2021-35560: Fixed a vulnerability in the component Deployment. (bsc#1191902)
- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake. (bsc#1191904)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191902">SUSE bug 1191902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35560/">CVE-2021-35560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35560">CVE-2021-35560 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41035">CVE-2021-41035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662502" comment="java-1_8_0-ibm-1.8.0_sr7.0-30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662492" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662503" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662494" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-30.84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148594" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010659.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.3 (bsc#1197903):
  - CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11
    tokens are removed while in use.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-05"/>
	<updated date="2022-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678285" comment="libfreebl3-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678251" comment="libfreebl3-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678286" comment="libfreebl3-hmac-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678253" comment="libfreebl3-hmac-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678287" comment="libsoftokn3-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678255" comment="libsoftokn3-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678288" comment="libsoftokn3-hmac-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678257" comment="libsoftokn3-hmac-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678289" comment="mozilla-nss-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678259" comment="mozilla-nss-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678290" comment="mozilla-nss-certs-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678261" comment="mozilla-nss-certs-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678512" comment="mozilla-nss-devel-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678291" comment="mozilla-nss-sysinit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678264" comment="mozilla-nss-sysinit-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678292" comment="mozilla-nss-tools-3.68.3-58.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148595" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<reference ref_id="SUSE-RU-2022:1114-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022464.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.8.0 ESR (bsc#1197903):

MFSA 2022-14 (bsc#1197903)

* CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11 tokens are removed while in use
* CVE-2022-28281: Fixed an out of bounds write due to unexpected WebAuthN Extensions
* CVE-2022-1196: Fixed a use-after-free after VR Process destruction
* CVE-2022-28282: Fixed a use-after-free in DocumentL10n::TranslateDocument
* CVE-2022-28285: Fixed incorrect AliasSet used in JIT Codegen
* CVE-2022-28286: Fixed that iframe contents could be rendered outside the border
* CVE-2022-24713: Fixed a denial of service via complex regular expressions
* CVE-2022-28289: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1196">CVE-2022-1196 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28281">CVE-2022-28281 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28282">CVE-2022-28282 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28285">CVE-2022-28285 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28286">CVE-2022-28286 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28289">CVE-2022-28289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678497" comment="MozillaFirefox-91.8.0-112.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678498" comment="MozillaFirefox-devel-91.8.0-112.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678499" comment="MozillaFirefox-translations-common-91.8.0-112.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148596" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1167631" ref_url="https://bugzilla.suse.com/1167631" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1752" ref_url="https://www.suse.com/security/cve/CVE-2020-1752/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010664.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2020-1752: Fix use-after-free in glob when expanding ~user (bsc#1167631)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167631">SUSE bug 1167631</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1752/">CVE-2020-1752 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">CVE-2020-1752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677624" comment="glibc-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677550" comment="glibc-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677625" comment="glibc-devel-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677552" comment="glibc-devel-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677553" comment="glibc-html-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677554" comment="glibc-i18ndata-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677555" comment="glibc-info-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677626" comment="glibc-locale-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677557" comment="glibc-locale-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677627" comment="glibc-profile-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677559" comment="glibc-profile-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677628" comment="nscd-2.22-123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148597" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1102016" ref_url="https://bugzilla.suse.com/1102016" source="BUGZILLA"/>
		<reference ref_id="1106881" ref_url="https://bugzilla.suse.com/1106881" source="BUGZILLA"/>
		<reference ref_id="1106882" ref_url="https://bugzilla.suse.com/1106882" source="BUGZILLA"/>
		<reference ref_id="1140130" ref_url="https://bugzilla.suse.com/1140130" source="BUGZILLA"/>
		<reference ref_id="1140205" ref_url="https://bugzilla.suse.com/1140205" source="BUGZILLA"/>
		<reference ref_id="1162090" ref_url="https://bugzilla.suse.com/1162090" source="BUGZILLA"/>
		<reference ref_id="1173578" ref_url="https://bugzilla.suse.com/1173578" source="BUGZILLA"/>
		<reference ref_id="1180457" ref_url="https://bugzilla.suse.com/1180457" source="BUGZILLA"/>
		<reference ref_id="1184774" ref_url="https://bugzilla.suse.com/1184774" source="BUGZILLA"/>
		<reference ref_id="1197738" ref_url="https://bugzilla.suse.com/1197738" source="BUGZILLA"/>
		<reference ref_id="971617" ref_url="https://bugzilla.suse.com/971617" source="BUGZILLA"/>
		<reference ref_id="980504" ref_url="https://bugzilla.suse.com/980504" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1924" ref_url="https://www.suse.com/security/cve/CVE-2016-1924/" source="CVE"/>
		<reference ref_id="CVE-2016-3183" ref_url="https://www.suse.com/security/cve/CVE-2016-3183/" source="CVE"/>
		<reference ref_id="CVE-2016-4797" ref_url="https://www.suse.com/security/cve/CVE-2016-4797/" source="CVE"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16375" ref_url="https://www.suse.com/security/cve/CVE-2018-16375/" source="CVE"/>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2018-20845" ref_url="https://www.suse.com/security/cve/CVE-2018-20845/" source="CVE"/>
		<reference ref_id="CVE-2018-20846" ref_url="https://www.suse.com/security/cve/CVE-2018-20846/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="CVE-2022-1122" ref_url="https://www.suse.com/security/cve/CVE-2022-1122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes the following issues:

- CVE-2016-1924: Fixed heap buffer overflow (bsc#980504).
- CVE-2016-3183: Fixed out-of-bounds read in sycc422_to_rgb function (bsc#971617).
- CVE-2016-4797: Fixed heap buffer overflow (bsc#980504).
- CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016).
- CVE-2018-16375: Fixed missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c (bsc#1106882).
- CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881).
- CVE-2018-20845: Fixed division-by-zero in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c (bsc#1140130).
- CVE-2018-20846: Fixed out-of-bounds accesses in pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c (bsc#1140205).
- CVE-2020-8112: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090).
- CVE-2020-15389: Fixed use-after-free if t a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578).
- CVE-2020-27823: Fixed heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457).
- CVE-2021-29338: Fixed integer overflow that allows remote attackers to crash the application (bsc#1184774).
- CVE-2022-1122: Fixed segmentation fault in opj2_decompress due to uninitialized pointer (bsc#1197738).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-07"/>
	<updated date="2022-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102016">SUSE bug 1102016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106881">SUSE bug 1106881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106882">SUSE bug 1106882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140130">SUSE bug 1140130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140205">SUSE bug 1140205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180457">SUSE bug 1180457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184774">SUSE bug 1184774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197738">SUSE bug 1197738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971617">SUSE bug 971617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980504">SUSE bug 980504</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1924/">CVE-2016-1924 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1924">CVE-2016-1924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3183/">CVE-2016-3183 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3183">CVE-2016-3183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-4797/">CVE-2016-4797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4797">CVE-2016-4797 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14423">CVE-2018-14423 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16375/">CVE-2018-16375 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16375">CVE-2018-16375 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16376">CVE-2018-16376 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20845/">CVE-2018-20845 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20845">CVE-2018-20845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20846/">CVE-2018-20846 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20846">CVE-2018-20846 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15389">CVE-2020-15389 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27823">CVE-2020-27823 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8112">CVE-2020-8112 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29338">CVE-2021-29338 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1122/">CVE-2022-1122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1122">CVE-2022-1122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677943" comment="libopenjp2-7-2.1.0-4.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148598" version="1" class="patch">
	<metadata>
		<title>Security update for mysql-connector-java (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1195557" ref_url="https://bugzilla.suse.com/1195557" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2471" ref_url="https://www.suse.com/security/cve/CVE-2021-2471/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010675.html" source="SUSE-SU"/>
		<description>
This update for mysql-connector-java fixes the following issues:

- CVE-2021-2471: Fixed unauthorized access to critical data or complete access to all MySQL Connectors (bsc#1195557).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-11"/>
	<updated date="2022-04-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195557">SUSE bug 1195557</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2471/">CVE-2021-2471 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2471">CVE-2021-2471 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671018" comment="mysql-connector-java-8.0.25-5.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148599" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1194547" ref_url="https://bugzilla.suse.com/1194547" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- CVE-2021-4140: Fixed iframe sandbox bypass with XSLT (bsc#1194547).
- CVE-2022-22737: Fixed race condition when playing audio files (bsc#1194547).
- CVE-2022-22738: Fixed heap-buffer-overflow in blendGaussianBlur (bsc#1194547).
- CVE-2022-22739: Fixed missing throttling on external protocol launch dialog (bsc#1194547).
- CVE-2022-22740: Fixed use-after-free of ChannelEventQueue::mOwner (bsc#1194547).
- CVE-2022-22741: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22742: Fixed out-of-bounds memory access when inserting text in edit mode (bsc#1194547).
- CVE-2022-22743: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22744: Fixed possible command injection via the 'Copy as curl' feature in DevTools (bsc#1194547).
- CVE-2022-22745: Fixed leaking cross-origin URLs through securitypolicyviolation event (bsc#1194547).
- CVE-2022-22746: Fixed calling into reportValidity could have lead to fullscreen window spoof (bsc#1194547).
- CVE-2022-22747: Fixed crash when handling empty pkcs7 sequence(bsc#1194547).
- CVE-2022-22748: Fixed spoofed origin on external protocol launch dialog (bsc#1194547).
- CVE-2022-22751: Fixed memory safety bugs (bsc#1194547).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4140">CVE-2021-4140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22737">CVE-2022-22737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22738">CVE-2022-22738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22739">CVE-2022-22739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22740">CVE-2022-22740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22741">CVE-2022-22741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22742">CVE-2022-22742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22743">CVE-2022-22743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22744">CVE-2022-22744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22745">CVE-2022-22745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22746">CVE-2022-22746 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22747">CVE-2022-22747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22748">CVE-2022-22748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22751">CVE-2022-22751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663799" comment="MozillaFirefox-91.5.0-112.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663800" comment="MozillaFirefox-devel-91.5.0-112.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663801" comment="MozillaFirefox-translations-common-91.5.0-112.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148600" version="1" class="patch">
	<metadata>
		<title>Security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010685.html" source="SUSE-SU"/>
		<description>
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679302" comment="liblzma5-5.0.5-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679278" comment="liblzma5-32bit-5.0.5-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679303" comment="xz-5.0.5-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679280" comment="xz-lang-5.0.5-6.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148601" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1172768" ref_url="https://bugzilla.suse.com/1172768" source="BUGZILLA"/>
		<reference ref_id="1172802" ref_url="https://bugzilla.suse.com/1172802" source="BUGZILLA"/>
		<reference ref_id="1178479" ref_url="https://bugzilla.suse.com/1178479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0181" ref_url="https://www.suse.com/security/cve/CVE-2020-0181/" source="CVE"/>
		<reference ref_id="CVE-2020-0198" ref_url="https://www.suse.com/security/cve/CVE-2020-0198/" source="CVE"/>
		<reference ref_id="CVE-2020-0452" ref_url="https://www.suse.com/security/cve/CVE-2020-0452/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010691.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2020-0181: Fixed an integer overflow that could lead to denial of service
  (bsc#1172802).
- CVE-2020-0198: Fixed and unsigned integer overflow that could lead to denial
  of service (bsc#1172768).
- CVE-2020-0452: Fixed a buffer overflow check that could be optimized away
  by the compiler (bsc#1178479).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172768">SUSE bug 1172768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172802">SUSE bug 1172802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178479">SUSE bug 1178479</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0181/">CVE-2020-0181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0181">CVE-2020-0181 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0198/">CVE-2020-0198 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0198">CVE-2020-0198 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0452/">CVE-2020-0452 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0452">CVE-2020-0452 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677635" comment="libexif12-0.6.22-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677562" comment="libexif12-32bit-0.6.22-8.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148602" version="1" class="patch">
	<metadata>
		<title>Security update for openstack-monasca-agent, spark, spark-kit, zookeeper (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010026.html" source="SUSE-SU"/>
		<description>
This update for openstack-monasca-agent, spark, spark-kit, zookeeper fixes the following issues:

- CVE-2021-4104: Remove JMSAppender from log4j jars (bsc#1193662)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-19"/>
	<updated date="2022-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">CVE-2021-4104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663701" comment="openstack-monasca-agent-2.2.6~dev4-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663702" comment="python-monasca-agent-2.2.6~dev4-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663703" comment="spark-1.6.3-8.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663704" comment="venv-openstack-monasca-x86_64-2.2.2~dev1-11.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663705" comment="zookeeper-server-3.4.10-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148603" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196488" ref_url="https://bugzilla.suse.com/1196488" source="BUGZILLA"/>
		<reference ref_id="1196761" ref_url="https://bugzilla.suse.com/1196761" source="BUGZILLA"/>
		<reference ref_id="1196830" ref_url="https://bugzilla.suse.com/1196830" source="BUGZILLA"/>
		<reference ref_id="1196836" ref_url="https://bugzilla.suse.com/1196836" source="BUGZILLA"/>
		<reference ref_id="1197227" ref_url="https://bugzilla.suse.com/1197227" source="BUGZILLA"/>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1197366" ref_url="https://bugzilla.suse.com/1197366" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868/" source="CVE"/>
		<reference ref_id="CVE-2022-0850" ref_url="https://www.suse.com/security/cve/CVE-2022-0850/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-23036" ref_url="https://www.suse.com/security/cve/CVE-2022-23036/" source="CVE"/>
		<reference ref_id="CVE-2022-23037" ref_url="https://www.suse.com/security/cve/CVE-2022-23037/" source="CVE"/>
		<reference ref_id="CVE-2022-23038" ref_url="https://www.suse.com/security/cve/CVE-2022-23038/" source="CVE"/>
		<reference ref_id="CVE-2022-23039" ref_url="https://www.suse.com/security/cve/CVE-2022-23039/" source="CVE"/>
		<reference ref_id="CVE-2022-23040" ref_url="https://www.suse.com/security/cve/CVE-2022-23040/" source="CVE"/>
		<reference ref_id="CVE-2022-23041" ref_url="https://www.suse.com/security/cve/CVE-2022-23041/" source="CVE"/>
		<reference ref_id="CVE-2022-23042" ref_url="https://www.suse.com/security/cve/CVE-2022-23042/" source="CVE"/>
		<reference ref_id="CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490/" source="CVE"/>
		<reference ref_id="CVE-2022-26966" ref_url="https://www.suse.com/security/cve/CVE-2022-26966/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated.

The following security bugs were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331)
- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)
- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device. (bsc#1196836)
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)

The following non-security bugs were fixed:

- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018).
- clocksource: Initialize cs-&gt;wd_list (git-fixes)
- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).
- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).
- net: usb: ax88179_178a: fix packet alignment padding (bsc#1196018).
- sched/autogroup: Fix possible Spectre-v1 indexing for (git-fixes)
- sr9700: sanity check for packet length (bsc#1196836).
- usb: host: xen-hcd: add missing unlock in error path (git-fixes).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196488">SUSE bug 1196488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196761">SUSE bug 1196761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196830">SUSE bug 1196830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196836">SUSE bug 1196836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197227">SUSE bug 1197227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197366">SUSE bug 1197366</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45868">CVE-2021-45868 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0850/">CVE-2022-0850 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0850">CVE-2022-0850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23036/">CVE-2022-23036 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23036">CVE-2022-23036 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23037/">CVE-2022-23037 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23037">CVE-2022-23037 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23038/">CVE-2022-23038 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23038">CVE-2022-23038 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23039/">CVE-2022-23039 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23039">CVE-2022-23039 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23040/">CVE-2022-23040 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23040">CVE-2022-23040 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23041/">CVE-2022-23041 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23041">CVE-2022-23041 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23042/">CVE-2022-23042 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23042">CVE-2022-23042 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26490">CVE-2022-26490 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26966/">CVE-2022-26966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26966">CVE-2022-26966 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679319" comment="kernel-default-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679320" comment="kernel-default-base-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679321" comment="kernel-default-devel-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680628" comment="kernel-default-kgraft-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679285" comment="kernel-devel-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679286" comment="kernel-macros-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679287" comment="kernel-source-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679322" comment="kernel-syms-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680630" comment="kgraft-patch-4_4_180-94_161-default-1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148604" version="1" class="patch">
	<metadata>
		<title>Security update for gzip (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010766.html" source="SUSE-SU"/>
		<description>
This update for gzip fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679548" comment="gzip-1.6-9.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148605" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1183709" ref_url="https://bugzilla.suse.com/1183709" source="BUGZILLA"/>
		<reference ref_id="1197872" ref_url="https://bugzilla.suse.com/1197872" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3448" ref_url="https://www.suse.com/security/cve/CVE-2021-3448/" source="CVE"/>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010784.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2021-3448: Fixed a potential DNS cache poisoning issue due to a constant
  outgoing port being used when for certain use cases of the --server option
  (bsc#1183709).
- CVE-2022-0934: Fixed an invalid memory access that could lead to remote denial
  of service via crafted packet (bsc#1197872).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183709">SUSE bug 1183709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197872">SUSE bug 1197872</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3448/">CVE-2021-3448 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3448">CVE-2021-3448 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0934">CVE-2022-0934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679550" comment="dnsmasq-2.78-18.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679572" comment="dnsmasq-utils-2.78-18.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148606" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1198234" ref_url="https://bugzilla.suse.com/1198234" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010798.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2022-24765: Fixed a potential command injection via git worktree (bsc#1198234).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198234">SUSE bug 1198234</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24765">CVE-2022-24765 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680006" comment="git-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680007" comment="git-core-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680008" comment="git-cvs-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680009" comment="git-daemon-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680010" comment="git-email-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680011" comment="git-gui-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680012" comment="git-svn-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680013" comment="git-web-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680014" comment="gitk-2.26.2-27.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148607" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1196490" ref_url="https://bugzilla.suse.com/1196490" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010799.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-23308: Fixed use-after-free of ID and IDREF attributes. (bsc#1196490)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680015" comment="libxml2-2-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679983" comment="libxml2-2-32bit-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679984" comment="libxml2-doc-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680016" comment="libxml2-tools-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680017" comment="python-libxml2-2.9.4-46.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148608" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010794.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:

- CVE-2020-14409: Fixed an integer overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c. (bsc#1181202)
- CVE-2020-14410: Fixed a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c. (bsc#1181201)
- CVE-2021-33657: Fixed a Heap overflow problem in video/SDL_pixels.c. (bsc#1198001)
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14409">CVE-2020-14409 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14410">CVE-2020-14410 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33657">CVE-2021-33657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679549" comment="libSDL-1_2-0-1.2.15-15.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679539" comment="libSDL-1_2-0-32bit-1.2.15-15.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148609" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1196915" ref_url="https://bugzilla.suse.com/1196915" source="BUGZILLA"/>
		<reference ref_id="1197423" ref_url="https://bugzilla.suse.com/1197423" source="BUGZILLA"/>
		<reference ref_id="1197425" ref_url="https://bugzilla.suse.com/1197425" source="BUGZILLA"/>
		<reference ref_id="1197426" ref_url="https://bugzilla.suse.com/1197426" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26401" ref_url="https://www.suse.com/security/cve/CVE-2021-26401/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-26356" ref_url="https://www.suse.com/security/cve/CVE-2022-26356/" source="CVE"/>
		<reference ref_id="CVE-2022-26357" ref_url="https://www.suse.com/security/cve/CVE-2022-26357/" source="CVE"/>
		<reference ref_id="CVE-2022-26358" ref_url="https://www.suse.com/security/cve/CVE-2022-26358/" source="CVE"/>
		<reference ref_id="CVE-2022-26359" ref_url="https://www.suse.com/security/cve/CVE-2022-26359/" source="CVE"/>
		<reference ref_id="CVE-2022-26360" ref_url="https://www.suse.com/security/cve/CVE-2022-26360/" source="CVE"/>
		<reference ref_id="CVE-2022-26361" ref_url="https://www.suse.com/security/cve/CVE-2022-26361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that
  could cause a denial of service in the host (bsc#1197423).
- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts
  using VT-d IOMMU hardware, which could lead to a denial of service in the host
  (bsc#1197425).
- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory
  corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be
  leveraged by an attacker to cause a denial of service in the host (bsc#1197426).
- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue
  mitigations (bsc#1196915).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-26"/>
	<updated date="2022-04-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196915">SUSE bug 1196915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197423">SUSE bug 1197423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197425">SUSE bug 1197425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26401/">CVE-2021-26401 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26401">CVE-2021-26401 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0002">CVE-2022-0002 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26356/">CVE-2022-26356 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26356">CVE-2022-26356 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26357/">CVE-2022-26357 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26357">CVE-2022-26357 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26358/">CVE-2022-26358 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26358">CVE-2022-26358 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26359/">CVE-2022-26359 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26359">CVE-2022-26359 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26360/">CVE-2022-26360 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26360">CVE-2022-26360 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26361/">CVE-2022-26361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26361">CVE-2022-26361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680580" comment="xen-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680581" comment="xen-doc-html-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680582" comment="xen-libs-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680583" comment="xen-libs-32bit-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680584" comment="xen-tools-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680585" comment="xen-tools-domU-4.9.4_28-3.103.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148610" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1194019" ref_url="https://bugzilla.suse.com/1194019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8518" ref_url="https://www.suse.com/security/cve/CVE-2018-8518/" source="CVE"/>
		<reference ref_id="CVE-2018-8523" ref_url="https://www.suse.com/security/cve/CVE-2018-8523/" source="CVE"/>
		<reference ref_id="CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551/" source="CVE"/>
		<reference ref_id="CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558/" source="CVE"/>
		<reference ref_id="CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559/" source="CVE"/>
		<reference ref_id="CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563/" source="CVE"/>
		<reference ref_id="CVE-2019-8674" ref_url="https://www.suse.com/security/cve/CVE-2019-8674/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<reference ref_id="CVE-2019-8707" ref_url="https://www.suse.com/security/cve/CVE-2019-8707/" source="CVE"/>
		<reference ref_id="CVE-2019-8719" ref_url="https://www.suse.com/security/cve/CVE-2019-8719/" source="CVE"/>
		<reference ref_id="CVE-2019-8726" ref_url="https://www.suse.com/security/cve/CVE-2019-8726/" source="CVE"/>
		<reference ref_id="CVE-2019-8733" ref_url="https://www.suse.com/security/cve/CVE-2019-8733/" source="CVE"/>
		<reference ref_id="CVE-2019-8763" ref_url="https://www.suse.com/security/cve/CVE-2019-8763/" source="CVE"/>
		<reference ref_id="CVE-2019-8765" ref_url="https://www.suse.com/security/cve/CVE-2019-8765/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8768" ref_url="https://www.suse.com/security/cve/CVE-2019-8768/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8821" ref_url="https://www.suse.com/security/cve/CVE-2019-8821/" source="CVE"/>
		<reference ref_id="CVE-2019-8822" ref_url="https://www.suse.com/security/cve/CVE-2019-8822/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-3885" ref_url="https://www.suse.com/security/cve/CVE-2020-3885/" source="CVE"/>
		<reference ref_id="CVE-2020-3894" ref_url="https://www.suse.com/security/cve/CVE-2020-3894/" source="CVE"/>
		<reference ref_id="CVE-2020-3895" ref_url="https://www.suse.com/security/cve/CVE-2020-3895/" source="CVE"/>
		<reference ref_id="CVE-2020-3897" ref_url="https://www.suse.com/security/cve/CVE-2020-3897/" source="CVE"/>
		<reference ref_id="CVE-2020-3900" ref_url="https://www.suse.com/security/cve/CVE-2020-3900/" source="CVE"/>
		<reference ref_id="CVE-2020-3901" ref_url="https://www.suse.com/security/cve/CVE-2020-3901/" source="CVE"/>
		<reference ref_id="CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9952" ref_url="https://www.suse.com/security/cve/CVE-2020-9952/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1817" ref_url="https://www.suse.com/security/cve/CVE-2021-1817/" source="CVE"/>
		<reference ref_id="CVE-2021-1820" ref_url="https://www.suse.com/security/cve/CVE-2021-1820/" source="CVE"/>
		<reference ref_id="CVE-2021-1825" ref_url="https://www.suse.com/security/cve/CVE-2021-1825/" source="CVE"/>
		<reference ref_id="CVE-2021-1826" ref_url="https://www.suse.com/security/cve/CVE-2021-1826/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="CVE-2021-30661" ref_url="https://www.suse.com/security/cve/CVE-2021-30661/" source="CVE"/>
		<reference ref_id="CVE-2021-30666" ref_url="https://www.suse.com/security/cve/CVE-2021-30666/" source="CVE"/>
		<reference ref_id="CVE-2021-30682" ref_url="https://www.suse.com/security/cve/CVE-2021-30682/" source="CVE"/>
		<reference ref_id="CVE-2021-30761" ref_url="https://www.suse.com/security/cve/CVE-2021-30761/" source="CVE"/>
		<reference ref_id="CVE-2021-30762" ref_url="https://www.suse.com/security/cve/CVE-2021-30762/" source="CVE"/>
		<reference ref_id="CVE-2021-30809" ref_url="https://www.suse.com/security/cve/CVE-2021-30809/" source="CVE"/>
		<reference ref_id="CVE-2021-30818" ref_url="https://www.suse.com/security/cve/CVE-2021-30818/" source="CVE"/>
		<reference ref_id="CVE-2021-30823" ref_url="https://www.suse.com/security/cve/CVE-2021-30823/" source="CVE"/>
		<reference ref_id="CVE-2021-30836" ref_url="https://www.suse.com/security/cve/CVE-2021-30836/" source="CVE"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30848" ref_url="https://www.suse.com/security/cve/CVE-2021-30848/" source="CVE"/>
		<reference ref_id="CVE-2021-30849" ref_url="https://www.suse.com/security/cve/CVE-2021-30849/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="CVE-2021-30884" ref_url="https://www.suse.com/security/cve/CVE-2021-30884/" source="CVE"/>
		<reference ref_id="CVE-2021-30887" ref_url="https://www.suse.com/security/cve/CVE-2021-30887/" source="CVE"/>
		<reference ref_id="CVE-2021-30888" ref_url="https://www.suse.com/security/cve/CVE-2021-30888/" source="CVE"/>
		<reference ref_id="CVE-2021-30889" ref_url="https://www.suse.com/security/cve/CVE-2021-30889/" source="CVE"/>
		<reference ref_id="CVE-2021-30890" ref_url="https://www.suse.com/security/cve/CVE-2021-30890/" source="CVE"/>
		<reference ref_id="CVE-2021-30897" ref_url="https://www.suse.com/security/cve/CVE-2021-30897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.34.3 (bsc#1194019).
- CVE-2021-30887: Fixed logic issue allowing unexpectedly unenforced Content Security Policy when processing maliciously crafted web content.
- CVE-2021-30890: Fixed logic issue allowing universal cross site scripting when processing maliciously crafted web content.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8518/">CVE-2018-8518 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8518">CVE-2018-8518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8523/">CVE-2018-8523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-8523">CVE-2018-8523 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8551">CVE-2019-8551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8558">CVE-2019-8558 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8559">CVE-2019-8559 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8563">CVE-2019-8563 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8674/">CVE-2019-8674 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8674">CVE-2019-8674 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8681">CVE-2019-8681 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8684">CVE-2019-8684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8687">CVE-2019-8687 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8688">CVE-2019-8688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8689">CVE-2019-8689 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8690">CVE-2019-8690 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8707/">CVE-2019-8707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8707">CVE-2019-8707 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8719/">CVE-2019-8719 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8719">CVE-2019-8719 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8726/">CVE-2019-8726 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8726">CVE-2019-8726 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8733/">CVE-2019-8733 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8733">CVE-2019-8733 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8763/">CVE-2019-8763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8763">CVE-2019-8763 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8765/">CVE-2019-8765 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8765">CVE-2019-8765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8766">CVE-2019-8766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8768/">CVE-2019-8768 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8768">CVE-2019-8768 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8782">CVE-2019-8782 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8808">CVE-2019-8808 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8815">CVE-2019-8815 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8821/">CVE-2019-8821 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8821">CVE-2019-8821 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8822/">CVE-2019-8822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8822">CVE-2019-8822 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10018">CVE-2020-10018 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13753">CVE-2020-13753 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27918">CVE-2020-27918 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29623">CVE-2020-29623 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3885/">CVE-2020-3885 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3885">CVE-2020-3885 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3894/">CVE-2020-3894 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3894">CVE-2020-3894 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3895/">CVE-2020-3895 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3895">CVE-2020-3895 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3897/">CVE-2020-3897 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3897">CVE-2020-3897 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3900/">CVE-2020-3900 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3900">CVE-2020-3900 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3901/">CVE-2020-3901 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3901">CVE-2020-3901 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3902">CVE-2020-3902 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9802">CVE-2020-9802 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9803">CVE-2020-9803 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9805">CVE-2020-9805 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9947">CVE-2020-9947 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9948">CVE-2020-9948 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9951">CVE-2020-9951 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-9952/">CVE-2020-9952 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9952">CVE-2020-9952 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1765">CVE-2021-1765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1788">CVE-2021-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1817/">CVE-2021-1817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1817">CVE-2021-1817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1820/">CVE-2021-1820 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1820">CVE-2021-1820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1825/">CVE-2021-1825 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1825">CVE-2021-1825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1826/">CVE-2021-1826 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1826">CVE-2021-1826 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1844">CVE-2021-1844 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1871">CVE-2021-1871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30661/">CVE-2021-30661 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30661">CVE-2021-30661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30666/">CVE-2021-30666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30666">CVE-2021-30666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30682/">CVE-2021-30682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30682">CVE-2021-30682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30761/">CVE-2021-30761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30761">CVE-2021-30761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30762/">CVE-2021-30762 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30762">CVE-2021-30762 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30809/">CVE-2021-30809 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30809">CVE-2021-30809 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30818/">CVE-2021-30818 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30818">CVE-2021-30818 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30823/">CVE-2021-30823 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30823">CVE-2021-30823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30836/">CVE-2021-30836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30836">CVE-2021-30836 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30846">CVE-2021-30846 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30848/">CVE-2021-30848 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30848">CVE-2021-30848 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30849/">CVE-2021-30849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30849">CVE-2021-30849 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30851">CVE-2021-30851 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30858">CVE-2021-30858 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30884/">CVE-2021-30884 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30884">CVE-2021-30884 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30887/">CVE-2021-30887 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30887">CVE-2021-30887 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30888/">CVE-2021-30888 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30888">CVE-2021-30888 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30889/">CVE-2021-30889 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30889">CVE-2021-30889 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30890/">CVE-2021-30890 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30890">CVE-2021-30890 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30897/">CVE-2021-30897 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30897">CVE-2021-30897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148611" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1197216" ref_url="https://bugzilla.suse.com/1197216" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010844.html" source="SUSE-SU"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2022-27239: Fixed a buffer overflow in the command line ip option (bsc#1197216).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197216">SUSE bug 1197216</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27239">CVE-2022-27239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681235" comment="cifs-utils-6.9-9.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148612" version="1" class="patch">
	<metadata>
		<title>Security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1194735" ref_url="https://bugzilla.suse.com/1194735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010044.html" source="SUSE-SU"/>
		<description>
This update for aide fixes the following issues:

- CVE-2021-45417: Fix a bufferoverflow in base64 functions (bsc#1194735)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45417">CVE-2021-45417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664239" comment="aide-0.16-20.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148613" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1198086" ref_url="https://bugzilla.suse.com/1198086" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24801" ref_url="https://www.suse.com/security/cve/CVE-2022-24801/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010948.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

- CVE-2022-24801: Fixed to not be as lenient as earlier HTTP/1.1 RFCs to prevent HTTP
  request smuggling. (bsc#1198086)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-05"/>
	<updated date="2022-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198086">SUSE bug 1198086</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24801/">CVE-2022-24801 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24801">CVE-2022-24801 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680674" comment="python-Twisted-15.2.1-9.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148614" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.1.0 ESR.

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-09"/>
	<updated date="2022-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29981">CVE-2021-29981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29982">CVE-2021-29982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29983">CVE-2021-29983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29987">CVE-2021-29987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29990">CVE-2021-29990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29991">CVE-2021-29991 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38492">CVE-2021-38492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38495">CVE-2021-38495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682635" comment="MozillaFirefox-91.9.0-112.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682636" comment="MozillaFirefox-devel-91.9.0-112.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682637" comment="MozillaFirefox-translations-common-91.9.0-112.104.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148615" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1107294" ref_url="https://bugzilla.suse.com/1107294" source="BUGZILLA"/>
		<reference ref_id="1107296" ref_url="https://bugzilla.suse.com/1107296" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0502" ref_url="https://www.suse.com/security/cve/CVE-2018-0502/" source="CVE"/>
		<reference ref_id="CVE-2018-13259" ref_url="https://www.suse.com/security/cve/CVE-2018-13259/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010048.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2018-0502: Fixed execve call vulnerability to program named on the second line when the beginning of a #! script file was mishandled. (bsc#1107296, bsc#1107294)
- CVE-2018-13259: Fixed execve call vulnerability to program name that is a substring of the intended one. (bsc#1107296, bsc#1107294)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-24"/>
	<updated date="2022-01-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107294">SUSE bug 1107294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107296">SUSE bug 1107296</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0502/">CVE-2018-0502 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0502">CVE-2018-0502 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13259/">CVE-2018-13259 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13259">CVE-2018-13259 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663987" comment="zsh-5.0.5-6.12.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148616" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1197135" ref_url="https://bugzilla.suse.com/1197135" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011206.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25220: Fixed potentially incorrect answers by cached forwarders (bsc#1197135).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197135">SUSE bug 1197135</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25220">CVE-2021-25220 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682675" comment="bind-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682676" comment="bind-chrootenv-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682677" comment="bind-doc-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682678" comment="bind-libs-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682679" comment="bind-libs-32bit-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682680" comment="bind-utils-9.9.9P1-63.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148617" version="1" class="patch">
	<metadata>
		<title>Security update for e2fsprogs (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1198446" ref_url="https://bugzilla.suse.com/1198446" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1304" ref_url="https://www.suse.com/security/cve/CVE-2022-1304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010997.html" source="SUSE-SU"/>
		<description>
This update for e2fsprogs fixes the following issues:

- CVE-2022-1304: Fixed out-of-bounds read/write leading to segmentation fault
  and possibly arbitrary code execution. (bsc#1198446)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-12"/>
	<updated date="2022-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198446">SUSE bug 1198446</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1304/">CVE-2022-1304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">CVE-2022-1304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682319" comment="e2fsprogs-1.42.11-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682320" comment="libcom_err2-1.42.11-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682310" comment="libcom_err2-32bit-1.42.11-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682321" comment="libext2fs2-1.42.11-16.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148618" version="1" class="patch">
	<metadata>
		<title>Security update for documentation-suse-openstack-cloud, kibana, openstack-keystone, openstack-monasca-notification (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1186868" ref_url="https://bugzilla.suse.com/1186868" source="BUGZILLA"/>
		<reference ref_id="1189390" ref_url="https://bugzilla.suse.com/1189390" source="BUGZILLA"/>
		<reference ref_id="1197204" ref_url="https://bugzilla.suse.com/1197204" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22141" ref_url="https://www.suse.com/security/cve/CVE-2021-22141/" source="CVE"/>
		<reference ref_id="CVE-2021-38155" ref_url="https://www.suse.com/security/cve/CVE-2021-38155/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010996.html" source="SUSE-SU"/>
		<description>
This update for documentation-suse-openstack-cloud, kibana, openstack-keystone, openstack-monasca-notification fixes the following issues:

- CVE-2021-22141: Fixed URL redirection flaw (bsc#1186868).
- CVE-2021-38155: Fixed information disclosure during account locking (bsc#1189390).

The following non-security bugs were fixed:

- Fix smtp server authentication (bsc#1197204)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-12"/>
	<updated date="2022-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186868">SUSE bug 1186868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189390">SUSE bug 1189390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197204">SUSE bug 1197204</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22141/">CVE-2021-22141 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22141">CVE-2021-22141 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38155/">CVE-2021-38155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38155">CVE-2021-38155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681128" comment="documentation-suse-openstack-cloud-installation-8.20211112-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681129" comment="documentation-suse-openstack-cloud-operations-8.20211112-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681130" comment="documentation-suse-openstack-cloud-opsconsole-8.20211112-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681131" comment="documentation-suse-openstack-cloud-planning-8.20211112-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681132" comment="documentation-suse-openstack-cloud-security-8.20211112-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681133" comment="documentation-suse-openstack-cloud-supplement-8.20211112-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681134" comment="documentation-suse-openstack-cloud-upstream-admin-8.20211112-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681135" comment="documentation-suse-openstack-cloud-upstream-user-8.20211112-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681136" comment="documentation-suse-openstack-cloud-user-8.20211112-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681137" comment="kibana-4.6.6-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681138" comment="openstack-keystone-12.0.4~dev11-5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681139" comment="openstack-keystone-doc-12.0.4~dev11-5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681140" comment="openstack-monasca-notification-1.10.2~dev4-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681141" comment="python-keystone-12.0.4~dev11-5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681142" comment="python-monasca-notification-1.10.2~dev4-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681143" comment="venv-openstack-keystone-x86_64-12.0.4~dev11-11.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681144" comment="venv-openstack-monasca-x86_64-2.2.2~dev1-11.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148619" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188568" ref_url="https://bugzilla.suse.com/1188568" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2432" ref_url="https://www.suse.com/security/cve/CVE-2021-2432/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 5 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2432: Fixed a vulnerability in the omponent JNDI. (bsc#1188568)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-24"/>
	<updated date="2022-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188568">SUSE bug 1188568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-2432/">CVE-2021-2432 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2432">CVE-2021-2432 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41035">CVE-2021-41035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662499" comment="java-1_7_1-ibm-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662487" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662500" comment="java-1_7_1-ibm-devel-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662501" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662490" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.0-38.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148620" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1198383" ref_url="https://bugzilla.suse.com/1198383" source="BUGZILLA"/>
		<reference ref_id="1199240" ref_url="https://bugzilla.suse.com/1199240" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29155" ref_url="https://www.suse.com/security/cve/CVE-2022-29155/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011023.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2022-29155: Fixed SQL injection in back-sql (bsc#1199240).
- Fixed issue with SASL init that crashed slapd at startup under certain conditions (bsc#1198383).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198383">SUSE bug 1198383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199240">SUSE bug 1199240</bugzilla>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29155/">CVE-2022-29155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29155">CVE-2022-29155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682642" comment="libldap-2_4-2-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682621" comment="libldap-2_4-2-32bit-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682643" comment="openldap2-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682644" comment="openldap2-back-meta-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682645" comment="openldap2-client-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682625" comment="openldap2-doc-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682659" comment="openldap2-ppolicy-check-password-1.2-18.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148621" version="1" class="patch">
	<metadata>
		<title>Security update for gzip (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011029.html" source="SUSE-SU"/>
		<description>
This update for gzip fixes the following issues:

- CVE-2022-1271: Add hardening for zgrep. (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682638" comment="gzip-1.6-9.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148622" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="1198290" ref_url="https://bugzilla.suse.com/1198290" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<reference ref_id="CVE-2022-22624" ref_url="https://www.suse.com/security/cve/CVE-2022-22624/" source="CVE"/>
		<reference ref_id="CVE-2022-22628" ref_url="https://www.suse.com/security/cve/CVE-2022-22628/" source="CVE"/>
		<reference ref_id="CVE-2022-22629" ref_url="https://www.suse.com/security/cve/CVE-2022-22629/" source="CVE"/>
		<reference ref_id="CVE-2022-22637" ref_url="https://www.suse.com/security/cve/CVE-2022-22637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011016.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.0 (bsc#1198290):

- CVE-2022-22624: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22628: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22629: Fixed a buffer overflow that may lead to arbitrary code execution.
- CVE-2022-22637: Fixed an unexpected cross-origin behavior due to a logic error.

Missing CVE reference for the update to 2.34.6 (bsc#1196133):

- CVE-2022-22594: Fixed a cross-origin issue in the IndexDB API.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198290">SUSE bug 1198290</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22594">CVE-2022-22594 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22624/">CVE-2022-22624 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22624">CVE-2022-22624 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22628/">CVE-2022-22628 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22628">CVE-2022-22628 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22629/">CVE-2022-22629 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22629">CVE-2022-22629 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22637/">CVE-2022-22637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22637">CVE-2022-22637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681316" comment="libjavascriptcoregtk-4_0-18-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681317" comment="libwebkit2gtk-4_0-37-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681309" comment="libwebkit2gtk3-lang-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681318" comment="typelib-1_0-JavaScriptCore-4_0-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681319" comment="typelib-1_0-WebKit2-4_0-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681320" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681321" comment="webkit2gtk-4_0-injected-bundles-2.36.0-2.96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148623" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1199223" ref_url="https://bugzilla.suse.com/1199223" source="BUGZILLA"/>
		<reference ref_id="1199224" ref_url="https://bugzilla.suse.com/1199224" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27781" ref_url="https://www.suse.com/security/cve/CVE-2022-27781/" source="CVE"/>
		<reference ref_id="CVE-2022-27782" ref_url="https://www.suse.com/security/cve/CVE-2022-27782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011074.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-27781: Fixed CERTINFO never-ending busy-loop (bsc#1199223)
- CVE-2022-27782: Fixed TLS and SSH connection too eager reuse (bsc#1199224)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-18"/>
	<updated date="2022-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199223">SUSE bug 1199223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199224">SUSE bug 1199224</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-27781/">CVE-2022-27781 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27781">CVE-2022-27781 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27782/">CVE-2022-27782 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27782">CVE-2022-27782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684081" comment="curl-7.37.0-37.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684082" comment="libcurl4-7.37.0-37.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684074" comment="libcurl4-32bit-7.37.0-37.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148624" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1198717" ref_url="https://bugzilla.suse.com/1198717" source="BUGZILLA"/>
		<reference ref_id="1199423" ref_url="https://bugzilla.suse.com/1199423" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21151" ref_url="https://www.suse.com/security/cve/CVE-2022-21151/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011092.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220510 release. (bsc#1199423)
Updated to Intel CPU Microcode 20220419 release. (bsc#1198717)

- CVE-2022-21151: Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access (bsc#1199423).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198717">SUSE bug 1198717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199423">SUSE bug 1199423</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21151/">CVE-2022-21151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21151">CVE-2022-21151 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683677" comment="ucode-intel-20220510-13.97.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148625" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1198970" ref_url="https://bugzilla.suse.com/1198970" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909/" source="CVE"/>
		<reference ref_id="CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911/" source="CVE"/>
		<reference ref_id="CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912/" source="CVE"/>
		<reference ref_id="CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914/" source="CVE"/>
		<reference ref_id="CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916/" source="CVE"/>
		<reference ref_id="CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.9.0 ESR (MFSA 2022-17)(bsc#1198970):

- CVE-2022-29914: Fullscreen notification bypass using popups
- CVE-2022-29909: Bypassing permission prompt in nested browsing contexts
- CVE-2022-29916: Leaking browser history with CSS variables
- CVE-2022-29911: iframe Sandbox bypass
- CVE-2022-29912: Reader mode bypassed SameSite cookies
- CVE-2022-29917: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29909">CVE-2022-29909 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29911">CVE-2022-29911 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29912">CVE-2022-29912 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29914">CVE-2022-29914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29916">CVE-2022-29916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29917">CVE-2022-29917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684083" comment="MozillaFirefox-91.9.0-112.108.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684084" comment="MozillaFirefox-devel-91.9.0-112.108.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684085" comment="MozillaFirefox-translations-common-91.9.0-112.108.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148626" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1194251" ref_url="https://bugzilla.suse.com/1194251" source="BUGZILLA"/>
		<reference ref_id="1194362" ref_url="https://bugzilla.suse.com/1194362" source="BUGZILLA"/>
		<reference ref_id="1194474" ref_url="https://bugzilla.suse.com/1194474" source="BUGZILLA"/>
		<reference ref_id="1194476" ref_url="https://bugzilla.suse.com/1194476" source="BUGZILLA"/>
		<reference ref_id="1194477" ref_url="https://bugzilla.suse.com/1194477" source="BUGZILLA"/>
		<reference ref_id="1194478" ref_url="https://bugzilla.suse.com/1194478" source="BUGZILLA"/>
		<reference ref_id="1194479" ref_url="https://bugzilla.suse.com/1194479" source="BUGZILLA"/>
		<reference ref_id="1194480" ref_url="https://bugzilla.suse.com/1194480" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2021-45960: Fixed left shift in the storeAtts function in xmlparse.c that can lead to realloc misbehavior (bsc#1194251).
- CVE-2021-46143: Fixed integer overflow in m_groupSize in doProlog (bsc#1194362).
- CVE-2022-22822: Fixed integer overflow in addBinding in xmlparse.c (bsc#1194474).
- CVE-2022-22823: Fixed integer overflow in build_model in xmlparse.c (bsc#1194476).
- CVE-2022-22824: Fixed integer overflow in defineAttribute in xmlparse.c (bsc#1194477).
- CVE-2022-22825: Fixed integer overflow in lookup in xmlparse.c (bsc#1194478).
- CVE-2022-22826: Fixed integer overflow in nextScaffoldPart in xmlparse.c (bsc#1194479).
- CVE-2022-22827: Fixed integer overflow in storeAtts in xmlparse.c (bsc#1194480).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">CVE-2021-45960 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">CVE-2021-46143 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">CVE-2022-22825 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">CVE-2022-22826 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">CVE-2022-22827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664107" comment="expat-2.1.0-21.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664108" comment="libexpat1-2.1.0-21.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664105" comment="libexpat1-32bit-2.1.0-21.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148627" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1199475" ref_url="https://bugzilla.suse.com/1199475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011129.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:
 
- CVE-2022-1552: Confine additional operations within 'security restricted operation' sandboxes (bsc#1199475).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199475">SUSE bug 1199475</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696333" comment="postgresql10-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696334" comment="postgresql10-contrib-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696064" comment="postgresql10-docs-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696335" comment="postgresql10-plperl-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696336" comment="postgresql10-plpython-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696337" comment="postgresql10-pltcl-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696338" comment="postgresql10-server-10.21-4.28.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148628" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1199768" ref_url="https://bugzilla.suse.com/1199768" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1529" ref_url="https://www.suse.com/security/cve/CVE-2022-1529/" source="CVE"/>
		<reference ref_id="CVE-2022-1802" ref_url="https://www.suse.com/security/cve/CVE-2022-1802/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011131.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.9.1 ESR - MFSA 2022-19 (bsc#1199768):

- CVE-2022-1802: Prototype pollution in Top-Level Await implementation
- CVE-2022-1529: Untrusted input used in JavaScript object indexing, leading to prototype pollution
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199768">SUSE bug 1199768</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1529/">CVE-2022-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1529">CVE-2022-1529 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1802/">CVE-2022-1802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1802">CVE-2022-1802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696339" comment="MozillaFirefox-91.9.1-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696340" comment="MozillaFirefox-devel-91.9.1-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696341" comment="MozillaFirefox-translations-common-91.9.1-112.111.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148629" version="1" class="patch">
	<metadata>
		<title>Security update for python-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011137.html" source="SUSE-SU"/>
		<description>
This update for python-requests fixes the following issues:

- CVE-2018-18074: Fixed to prevent the package to send an HTTP Authorization header to an http URI
  upon receiving a same-hostname https-to-http redirect. (bsc#1111622) 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595040" comment="python-requests-2.11.1-6.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148630" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1069689" ref_url="https://bugzilla.suse.com/1069689" source="BUGZILLA"/>
		<reference ref_id="1199132" ref_url="https://bugzilla.suse.com/1199132" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16932" ref_url="https://www.suse.com/security/cve/CVE-2017-16932/" source="CVE"/>
		<reference ref_id="CVE-2022-29824" ref_url="https://www.suse.com/security/cve/CVE-2022-29824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011148.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-29824: Fixed integer overflow leading to out-of-bounds write in buf.c and tree.c (bsc#1199132).
- CVE-2017-16932: Prevent infinite recursion in parameter entities (bsc#1069689).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-24"/>
	<updated date="2022-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1069689">SUSE bug 1069689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199132">SUSE bug 1199132</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16932/">CVE-2017-16932 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16932">CVE-2017-16932 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29824/">CVE-2022-29824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824">CVE-2022-29824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696342" comment="libxml2-2-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696073" comment="libxml2-2-32bit-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696074" comment="libxml2-doc-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696343" comment="libxml2-tools-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696344" comment="python-libxml2-2.9.4-46.54.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148631" version="1" class="patch">
	<metadata>
		<title>Security update for pcre2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1199232" ref_url="https://bugzilla.suse.com/1199232" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1586" ref_url="https://www.suse.com/security/cve/CVE-2022-1586/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011157.html" source="SUSE-SU"/>
		<description>
This update for pcre2 fixes the following issues:

- CVE-2022-1586: Fixed out-of-bounds read via missing Unicode property matching issue in JIT compiled regular expressions (bsc#1199232).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-25"/>
	<updated date="2022-05-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199232">SUSE bug 1199232</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1586/">CVE-2022-1586 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">CVE-2022-1586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696345" comment="libpcre2-16-0-10.34-1.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696346" comment="libpcre2-32-0-10.34-1.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696347" comment="libpcre2-8-0-10.34-1.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696348" comment="libpcre2-posix2-10.34-1.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148632" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1131644" ref_url="https://bugzilla.suse.com/1131644" source="BUGZILLA"/>
		<reference ref_id="1131868" ref_url="https://bugzilla.suse.com/1131868" source="BUGZILLA"/>
		<reference ref_id="1131870" ref_url="https://bugzilla.suse.com/1131870" source="BUGZILLA"/>
		<reference ref_id="1131871" ref_url="https://bugzilla.suse.com/1131871" source="BUGZILLA"/>
		<reference ref_id="1131872" ref_url="https://bugzilla.suse.com/1131872" source="BUGZILLA"/>
		<reference ref_id="1131874" ref_url="https://bugzilla.suse.com/1131874" source="BUGZILLA"/>
		<reference ref_id="1133640" ref_url="https://bugzilla.suse.com/1133640" source="BUGZILLA"/>
		<reference ref_id="1144443" ref_url="https://bugzilla.suse.com/1144443" source="BUGZILLA"/>
		<reference ref_id="1156920" ref_url="https://bugzilla.suse.com/1156920" source="BUGZILLA"/>
		<reference ref_id="1165266" ref_url="https://bugzilla.suse.com/1165266" source="BUGZILLA"/>
		<reference ref_id="1166933" ref_url="https://bugzilla.suse.com/1166933" source="BUGZILLA"/>
		<reference ref_id="1167331" ref_url="https://bugzilla.suse.com/1167331" source="BUGZILLA"/>
		<reference ref_id="1182805" ref_url="https://bugzilla.suse.com/1182805" source="BUGZILLA"/>
		<reference ref_id="1194732" ref_url="https://bugzilla.suse.com/1194732" source="BUGZILLA"/>
		<reference ref_id="1194733" ref_url="https://bugzilla.suse.com/1194733" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8041" ref_url="https://www.suse.com/security/cve/CVE-2015-8041/" source="CVE"/>
		<reference ref_id="CVE-2017-13077" ref_url="https://www.suse.com/security/cve/CVE-2017-13077/" source="CVE"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-13082" ref_url="https://www.suse.com/security/cve/CVE-2017-13082/" source="CVE"/>
		<reference ref_id="CVE-2017-13086" ref_url="https://www.suse.com/security/cve/CVE-2017-13086/" source="CVE"/>
		<reference ref_id="CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087/" source="CVE"/>
		<reference ref_id="CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088/" source="CVE"/>
		<reference ref_id="CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526/" source="CVE"/>
		<reference ref_id="CVE-2019-11555" ref_url="https://www.suse.com/security/cve/CVE-2019-11555/" source="CVE"/>
		<reference ref_id="CVE-2019-13377" ref_url="https://www.suse.com/security/cve/CVE-2019-13377/" source="CVE"/>
		<reference ref_id="CVE-2019-9494" ref_url="https://www.suse.com/security/cve/CVE-2019-9494/" source="CVE"/>
		<reference ref_id="CVE-2019-9495" ref_url="https://www.suse.com/security/cve/CVE-2019-9495/" source="CVE"/>
		<reference ref_id="CVE-2019-9497" ref_url="https://www.suse.com/security/cve/CVE-2019-9497/" source="CVE"/>
		<reference ref_id="CVE-2019-9498" ref_url="https://www.suse.com/security/cve/CVE-2019-9498/" source="CVE"/>
		<reference ref_id="CVE-2019-9499" ref_url="https://www.suse.com/security/cve/CVE-2019-9499/" source="CVE"/>
		<reference ref_id="CVE-2022-23303" ref_url="https://www.suse.com/security/cve/CVE-2022-23303/" source="CVE"/>
		<reference ref_id="CVE-2022-23304" ref_url="https://www.suse.com/security/cve/CVE-2022-23304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2022-23303, CVE-2022-23304: Fixed SAE/EAP-pwd side-channel attacks (bsc#1194732, bsc#1194733)
- CVE-2021-0326: Fixed P2P group information processing vulnerability (bsc#1181777)

- Fix systemd device ready dependencies in wpa_supplicant@.service file. (bsc#1182805)

- Limit P2P_DEVICE name to appropriate ifname size
- Enable SAE support(jsc#SLE-14992).
- Fix wicked wlan (bsc#1156920)
- Change wpa_supplicant.service to ensure wpa_supplicant gets started before
  network. Fix WLAN config on boot with wicked. (bsc#1166933)

- Adjust the service to start after network.target wrt bsc#1165266

Update to 2.9 release:

* SAE changes
  - disable use of groups using Brainpool curves
  - improved protection against side channel attacks
  [https://w1.fi/security/2019-6/]
* EAP-pwd changes
  - disable use of groups using Brainpool curves
  - allow the set of groups to be configured (eap_pwd_groups)
  - improved protection against side channel attacks
  [https://w1.fi/security/2019-6/]
* fixed FT-EAP initial mobility domain association using PMKSA caching
  (disabled by default for backwards compatibility; can be enabled
  with ft_eap_pmksa_caching=1)
* fixed a regression in OpenSSL 1.1+ engine loading
* added validation of RSNE in (Re)Association Response frames
* fixed DPP bootstrapping URI parser of channel list
* extended EAP-SIM/AKA fast re-authentication to allow use with FILS
* extended ca_cert_blob to support PEM format
* improved robustness of P2P Action frame scheduling
* added support for EAP-SIM/AKA using anonymous@realm identity
* fixed Hotspot 2.0 credential selection based on roaming consortium
  to ignore credentials without a specific EAP method
* added experimental support for EAP-TEAP peer (RFC 7170)
* added experimental support for EAP-TLS peer with TLS v1.3
* fixed a regression in WMM parameter configuration for a TDLS peer
* fixed a regression in operation with drivers that offload 802.1X
  4-way handshake
* fixed an ECDH operation corner case with OpenSSL
* SAE changes
  - added support for SAE Password Identifier
  - changed default configuration to enable only groups 19, 20, 21
    (i.e., disable groups 25 and 26) and disable all unsuitable groups
    completely based on REVmd changes
  - do not regenerate PWE unnecessarily when the AP uses the
    anti-clogging token mechanisms
  - fixed some association cases where both SAE and FT-SAE were enabled
    on both the station and the selected AP
  - started to prefer FT-SAE over SAE AKM if both are enabled
  - started to prefer FT-SAE over FT-PSK if both are enabled
  - fixed FT-SAE when SAE PMKSA caching is used
  - reject use of unsuitable groups based on new implementation guidance
    in REVmd (allow only FFC groups with prime &gt;= 3072 bits and ECC
    groups with prime &gt;= 256)
  - minimize timing and memory use differences in PWE derivation
    [https://w1.fi/security/2019-1/] (CVE-2019-9494, bsc#1131868)
* EAP-pwd changes
  - minimize timing and memory use differences in PWE derivation
    [https://w1.fi/security/2019-2/] (CVE-2019-9495, bsc#1131870)
  - verify server scalar/element
    [https://w1.fi/security/2019-4/] (CVE-2019-9497, CVE-2019-9498,
    CVE-2019-9499, bsc#1131874, bsc#1131872, bsc#1131871, bsc#1131644)
  - fix message reassembly issue with unexpected fragment
    [https://w1.fi/security/2019-5/] (CVE-2019-11555, bsc#1133640)
  - enforce rand,mask generation rules more strictly
  - fix a memory leak in PWE derivation
  - disallow ECC groups with a prime under 256 bits (groups 25, 26, and
    27)
  - SAE/EAP-pwd side-channel attack update
    [https://w1.fi/security/2019-6/] (CVE-2019-13377, bsc#1144443)
* fixed CONFIG_IEEE80211R=y (FT) build without CONFIG_FILS=y
* Hotspot 2.0 changes
  - do not indicate release number that is higher than the one
    AP supports
  - added support for release number 3
  - enable PMF automatically for network profiles created from
    credentials
* fixed OWE network profile saving
* fixed DPP network profile saving
* added support for RSN operating channel validation
  (CONFIG_OCV=y and network profile parameter ocv=1)
* added Multi-AP backhaul STA support
* fixed build with LibreSSL
* number of MKA/MACsec fixes and extensions
* extended domain_match and domain_suffix_match to allow list of values
* fixed dNSName matching in domain_match and domain_suffix_match when
  using wolfSSL
* started to prefer FT-EAP-SHA384 over WPA-EAP-SUITE-B-192 AKM if both
  are enabled
* extended nl80211 Connect and external authentication to support
  SAE, FT-SAE, FT-EAP-SHA384
* fixed KEK2 derivation for FILS+FT
* extended client_cert file to allow loading of a chain of PEM
  encoded certificates
* extended beacon reporting functionality
* extended D-Bus interface with number of new properties
* fixed a regression in FT-over-DS with mac80211-based drivers
* OpenSSL: allow systemwide policies to be overridden
* extended driver flags indication for separate 802.1X and PSK
  4-way handshake offload capability
* added support for random P2P Device/Interface Address use
* extended PEAP to derive EMSK to enable use with ERP/FILS
* extended WPS to allow SAE configuration to be added automatically
  for PSK (wps_cred_add_sae=1)
* removed support for the old D-Bus interface (CONFIG_CTRL_IFACE_DBUS)
* extended domain_match and domain_suffix_match to allow list of values
* added a RSN workaround for misbehaving PMF APs that advertise
  IGTK/BIP KeyID using incorrect byte order
* fixed PTK rekeying with FILS and FT
* fixed WPA packet number reuse with replayed messages and key
  reinstallation
  [https://w1.fi/security/2017-1/] (CVE-2017-13077, CVE-2017-13078,
  CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082,
  CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)
* fixed unauthenticated EAPOL-Key decryption in wpa_supplicant
  [https://w1.fi/security/2018-1/] (CVE-2018-14526)
* added support for FILS (IEEE 802.11ai) shared key authentication
* added support for OWE (Opportunistic Wireless Encryption, RFC 8110;
  and transition mode defined by WFA)
* added support for DPP (Wi-Fi Device Provisioning Protocol)
* added support for RSA 3k key case with Suite B 192-bit level
* fixed Suite B PMKSA caching not to update PMKID during each 4-way
  handshake
* fixed EAP-pwd pre-processing with PasswordHashHash
* added EAP-pwd client support for salted passwords
* fixed a regression in TDLS prohibited bit validation
* started to use estimated throughput to avoid undesired signal
  strength based roaming decision
* MACsec/MKA:
  - new macsec_linux driver interface support for the Linux
    kernel macsec module
  - number of fixes and extensions
* added support for external persistent storage of PMKSA cache
  (PMKSA_GET/PMKSA_ADD control interface commands; and
   MESH_PMKSA_GET/MESH_PMKSA_SET for the mesh case)
* fixed mesh channel configuration pri/sec switch case
* added support for beacon report
* large number of other fixes, cleanup, and extensions
* added support for randomizing local address for GAS queries
  (gas_rand_mac_addr parameter)
* fixed EAP-SIM/AKA/AKA' ext auth cases within TLS tunnel
* added option for using random WPS UUID (auto_uuid=1)
* added SHA256-hash support for OCSP certificate matching
* fixed EAP-AKA' to add AT_KDF into Synchronization-Failure
* fixed a regression in RSN pre-authentication candidate selection
* added option to configure allowed group management cipher suites
  (group_mgmt network profile parameter)
* removed all PeerKey functionality
* fixed nl80211 AP and mesh mode configuration regression with
  Linux 4.15 and newer
* added ap_isolate configuration option for AP mode
* added support for nl80211 to offload 4-way handshake into the driver
* added support for using wolfSSL cryptographic library
* SAE
  - added support for configuring SAE password separately of the
    WPA2 PSK/passphrase
  - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection
    for SAE;
    note: this is not backwards compatible, i.e., both the AP and
    station side implementations will need to be update at the same
    time to maintain interoperability
  - added support for Password Identifier
  - fixed FT-SAE PMKID matching
* Hotspot 2.0
  - added support for fetching of Operator Icon Metadata ANQP-element
  - added support for Roaming Consortium Selection element
  - added support for Terms and Conditions
  - added support for OSEN connection in a shared RSN BSS
  - added support for fetching Venue URL information
* added support for using OpenSSL 1.1.1
* FT
  - disabled PMKSA caching with FT since it is not fully functional
  - added support for SHA384 based AKM
  - added support for BIP ciphers BIP-CMAC-256, BIP-GMAC-128,
    BIP-GMAC-256 in addition to previously supported BIP-CMAC-128
  - fixed additional IE inclusion in Reassociation Request frame when
    using FT protocol

- CVE-2015-8041: Using O_WRONLY flag [http://w1.fi/security/2015-5/]		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-26"/>
	<updated date="2022-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131644">SUSE bug 1131644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131868">SUSE bug 1131868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131870">SUSE bug 1131870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131871">SUSE bug 1131871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131872">SUSE bug 1131872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131874">SUSE bug 1131874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133640">SUSE bug 1133640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144443">SUSE bug 1144443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156920">SUSE bug 1156920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165266">SUSE bug 1165266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166933">SUSE bug 1166933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167331">SUSE bug 1167331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182805">SUSE bug 1182805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194732">SUSE bug 1194732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194733">SUSE bug 1194733</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8041/">CVE-2015-8041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8041">CVE-2015-8041 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13077/">CVE-2017-13077 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13077">CVE-2017-13077 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13078">CVE-2017-13078 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13079">CVE-2017-13079 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13081">CVE-2017-13081 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13082/">CVE-2017-13082 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13082">CVE-2017-13082 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13086/">CVE-2017-13086 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13086">CVE-2017-13086 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13087">CVE-2017-13087 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13088">CVE-2017-13088 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14526">CVE-2018-14526 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11555/">CVE-2019-11555 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11555">CVE-2019-11555 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13377/">CVE-2019-13377 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13377">CVE-2019-13377 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9494/">CVE-2019-9494 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9494">CVE-2019-9494 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9495/">CVE-2019-9495 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9495">CVE-2019-9495 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9497/">CVE-2019-9497 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9497">CVE-2019-9497 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9498/">CVE-2019-9498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9498">CVE-2019-9498 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9499/">CVE-2019-9499 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9499">CVE-2019-9499 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23303/">CVE-2022-23303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23303">CVE-2022-23303 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23304/">CVE-2022-23304 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23304">CVE-2022-23304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696349" comment="wpa_supplicant-2.9-15.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148633" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1199475" ref_url="https://bugzilla.suse.com/1199475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011173.html" source="SUSE-SU"/>
		<description>
This update for postgresql14 fixes the following issues:
 
- CVE-2022-1552: Confine additional operations within 'security restricted operation' sandboxes (bsc#1199475).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-27"/>
	<updated date="2022-05-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199475">SUSE bug 1199475</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696350" comment="libecpg6-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696351" comment="libpq5-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696084" comment="libpq5-32bit-14.3-3.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148634" version="1" class="patch">
	<metadata>
		<title>Security update for openstack-neutron (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1189794" ref_url="https://bugzilla.suse.com/1189794" source="BUGZILLA"/>
		<reference ref_id="1190339" ref_url="https://bugzilla.suse.com/1190339" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-40085" ref_url="https://www.suse.com/security/cve/CVE-2021-40085/" source="CVE"/>
		<reference ref_id="CVE-2021-40797" ref_url="https://www.suse.com/security/cve/CVE-2021-40797/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011199.html" source="SUSE-SU"/>
		<description>
This update for openstack-neutron fixes the following issues:

- CVE-2021-40797: Fixed routes middleware memory leak for nonexistent controllers (bsc#1190339).
- CVE-2021-40085: Fixed arbitrary dnsmasq reconfiguration via extra_dhcp_opts (bsc#1189794).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189794">SUSE bug 1189794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190339">SUSE bug 1190339</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40085/">CVE-2021-40085 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40085">CVE-2021-40085 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-40797/">CVE-2021-40797 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40797">CVE-2021-40797 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009697246" comment="openstack-neutron-11.0.9~dev69-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697247" comment="openstack-neutron-dhcp-agent-11.0.9~dev69-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697248" comment="openstack-neutron-doc-11.0.9~dev69-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697249" comment="openstack-neutron-ha-tool-11.0.9~dev69-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697250" comment="openstack-neutron-l3-agent-11.0.9~dev69-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697251" comment="openstack-neutron-linuxbridge-agent-11.0.9~dev69-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697252" comment="openstack-neutron-macvtap-agent-11.0.9~dev69-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697253" comment="openstack-neutron-metadata-agent-11.0.9~dev69-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697254" comment="openstack-neutron-metering-agent-11.0.9~dev69-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697255" comment="openstack-neutron-openvswitch-agent-11.0.9~dev69-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697256" comment="openstack-neutron-server-11.0.9~dev69-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697257" comment="python-neutron-11.0.9~dev69-3.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148635" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1198351" ref_url="https://bugzilla.suse.com/1198351" source="BUGZILLA"/>
		<reference ref_id="1199350" ref_url="https://bugzilla.suse.com/1199350" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1270" ref_url="https://www.suse.com/security/cve/CVE-2022-1270/" source="CVE"/>
		<reference ref_id="CVE-2022-28463" ref_url="https://www.suse.com/security/cve/CVE-2022-28463/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011200.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2022-1270: Fixed a memory corruption issue when parsing MIFF files (bsc#1198351).
- CVE-2022-28463: Fixed buffer overflow in coders/cin.c (bsc#1199350).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198351">SUSE bug 1198351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199350">SUSE bug 1199350</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-1270/">CVE-2022-1270 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1270">CVE-2022-1270 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28463/">CVE-2022-28463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28463">CVE-2022-28463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696352" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696353" comment="ImageMagick-config-6-upstream-6.8.8.1-71.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696354" comment="libMagickCore-6_Q16-1-6.8.8.1-71.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696355" comment="libMagickWand-6_Q16-1-6.8.8.1-71.172.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148636" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1191959" ref_url="https://bugzilla.suse.com/1191959" source="BUGZILLA"/>
		<reference ref_id="1192735" ref_url="https://bugzilla.suse.com/1192735" source="BUGZILLA"/>
		<reference ref_id="1192741" ref_url="https://bugzilla.suse.com/1192741" source="BUGZILLA"/>
		<reference ref_id="1193316" ref_url="https://bugzilla.suse.com/1193316" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42096" ref_url="https://www.suse.com/security/cve/CVE-2021-42096/" source="CVE"/>
		<reference ref_id="CVE-2021-43331" ref_url="https://www.suse.com/security/cve/CVE-2021-43331/" source="CVE"/>
		<reference ref_id="CVE-2021-43332" ref_url="https://www.suse.com/security/cve/CVE-2021-43332/" source="CVE"/>
		<reference ref_id="CVE-2021-44227" ref_url="https://www.suse.com/security/cve/CVE-2021-44227/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011201.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2021-44227: Preventing list moderator or list member accessing the admin UI (bsc#1193316).
- CVE-2021-43332: Preventing list moderator from cracking the list admin password encrypted in a CSRF token (bsc#1192741).
- CVE-2021-43331: Fixed XSS in Cgi/options.py (bsc#1192735).
- CVE-2021-42096: Add protection against remote privilege escalation via csrf_token derived from admin password (bsc#1191959).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191959">SUSE bug 1191959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192735">SUSE bug 1192735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192741">SUSE bug 1192741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193316">SUSE bug 1193316</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-42096/">CVE-2021-42096 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42096">CVE-2021-42096 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43331/">CVE-2021-43331 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43331">CVE-2021-43331 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43332/">CVE-2021-43332 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43332">CVE-2021-43332 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-44227/">CVE-2021-44227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44227">CVE-2021-44227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696356" comment="mailman-2.1.17-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148637" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1194568" ref_url="https://bugzilla.suse.com/1194568" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4034" ref_url="https://www.suse.com/security/cve/CVE-2021-4034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010074.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-4034: Fixed a local privilege escalation in pkexec (bsc#1194568).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194568">SUSE bug 1194568</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4034/">CVE-2021-4034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4034">CVE-2021-4034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664690" comment="libpolkit0-0.113-5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664691" comment="polkit-0.113-5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664692" comment="typelib-1_0-Polkit-1_0-0.113-5.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148638" version="1" class="patch">
	<metadata>
		<title>Security update for librelp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1086730" ref_url="https://bugzilla.suse.com/1086730" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000140" ref_url="https://www.suse.com/security/cve/CVE-2018-1000140/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011210.html" source="SUSE-SU"/>
		<description>
This update for librelp fixes the following issues:

- CVE-2018-1000140: Fixed remote attack via specially crafted x509 certificates when connecting to rsyslog to trigger a stack buffer overflow and run arbitrary code (bsc#1086730).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086730">SUSE bug 1086730</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000140/">CVE-2018-1000140 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000140">CVE-2018-1000140 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696535" comment="librelp0-1.2.15-3.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148639" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1200027" ref_url="https://bugzilla.suse.com/1200027" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31736" ref_url="https://www.suse.com/security/cve/CVE-2022-31736/" source="CVE"/>
		<reference ref_id="CVE-2022-31737" ref_url="https://www.suse.com/security/cve/CVE-2022-31737/" source="CVE"/>
		<reference ref_id="CVE-2022-31738" ref_url="https://www.suse.com/security/cve/CVE-2022-31738/" source="CVE"/>
		<reference ref_id="CVE-2022-31739" ref_url="https://www.suse.com/security/cve/CVE-2022-31739/" source="CVE"/>
		<reference ref_id="CVE-2022-31740" ref_url="https://www.suse.com/security/cve/CVE-2022-31740/" source="CVE"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="CVE-2022-31742" ref_url="https://www.suse.com/security/cve/CVE-2022-31742/" source="CVE"/>
		<reference ref_id="CVE-2022-31747" ref_url="https://www.suse.com/security/cve/CVE-2022-31747/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011223.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.10.0 ESR (MFSA 2022-21)(bsc#1200027)

- CVE-2022-31736: Cross-Origin resource's length leaked
- CVE-2022-31737: Heap buffer overflow in WebGL
- CVE-2022-31738: Browser window spoof using fullscreen mode
- CVE-2022-31739: Attacker-influenced path traversal when saving downloaded files
- CVE-2022-31740: Register allocation problem in WASM on arm64
- CVE-2022-31741: Uninitialized variable leads to invalid memory read
- CVE-2022-31742: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information
- CVE-2022-31747: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-02"/>
	<updated date="2022-06-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31736/">CVE-2022-31736 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31736">CVE-2022-31736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31737/">CVE-2022-31737 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31737">CVE-2022-31737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31738/">CVE-2022-31738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31738">CVE-2022-31738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31739/">CVE-2022-31739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31739">CVE-2022-31739 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31740/">CVE-2022-31740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31740">CVE-2022-31740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31742/">CVE-2022-31742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31742">CVE-2022-31742 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31747/">CVE-2022-31747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31747">CVE-2022-31747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696357" comment="MozillaFirefox-91.10.0-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696358" comment="MozillaFirefox-devel-91.10.0-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696359" comment="MozillaFirefox-translations-common-91.10.0-112.114.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148640" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1194471" ref_url="https://bugzilla.suse.com/1194471" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010084.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194471">SUSE bug 1194471</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45079">CVE-2021-45079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664933" comment="strongswan-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664929" comment="strongswan-doc-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664934" comment="strongswan-hmac-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664935" comment="strongswan-ipsec-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664936" comment="strongswan-libs0-5.1.3-26.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148641" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1200027" ref_url="https://bugzilla.suse.com/1200027" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011255.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.4 (bsc#1200027)

* CVE-2022-31741: Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple.  (bmo#1767590)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-09"/>
	<updated date="2022-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696360" comment="libfreebl3-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696100" comment="libfreebl3-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696361" comment="libfreebl3-hmac-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696102" comment="libfreebl3-hmac-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696362" comment="libsoftokn3-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696104" comment="libsoftokn3-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696363" comment="libsoftokn3-hmac-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696106" comment="libsoftokn3-hmac-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696364" comment="mozilla-nss-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696108" comment="mozilla-nss-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696365" comment="mozilla-nss-certs-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696110" comment="mozilla-nss-certs-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697258" comment="mozilla-nss-devel-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696366" comment="mozilla-nss-sysinit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696113" comment="mozilla-nss-sysinit-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696367" comment="mozilla-nss-tools-3.68.4-58.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148642" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1191184" ref_url="https://bugzilla.suse.com/1191184" source="BUGZILLA"/>
		<reference ref_id="1191185" ref_url="https://bugzilla.suse.com/1191185" source="BUGZILLA"/>
		<reference ref_id="1191186" ref_url="https://bugzilla.suse.com/1191186" source="BUGZILLA"/>
		<reference ref_id="1193282" ref_url="https://bugzilla.suse.com/1193282" source="BUGZILLA"/>
		<reference ref_id="1197948" ref_url="https://bugzilla.suse.com/1197948" source="BUGZILLA"/>
		<reference ref_id="1198460" ref_url="https://bugzilla.suse.com/1198460" source="BUGZILLA"/>
		<reference ref_id="1198493" ref_url="https://bugzilla.suse.com/1198493" source="BUGZILLA"/>
		<reference ref_id="1198496" ref_url="https://bugzilla.suse.com/1198496" source="BUGZILLA"/>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3695" ref_url="https://www.suse.com/security/cve/CVE-2021-3695/" source="CVE"/>
		<reference ref_id="CVE-2021-3696" ref_url="https://www.suse.com/security/cve/CVE-2021-3696/" source="CVE"/>
		<reference ref_id="CVE-2021-3697" ref_url="https://www.suse.com/security/cve/CVE-2021-3697/" source="CVE"/>
		<reference ref_id="CVE-2022-28733" ref_url="https://www.suse.com/security/cve/CVE-2022-28733/" source="CVE"/>
		<reference ref_id="CVE-2022-28734" ref_url="https://www.suse.com/security/cve/CVE-2022-28734/" source="CVE"/>
		<reference ref_id="CVE-2022-28736" ref_url="https://www.suse.com/security/cve/CVE-2022-28736/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011257.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

Security fixes and hardenings for boothole 3 / boothole 2022 (bsc#1198581)

- CVE-2021-3695: Fixed that a crafted PNG grayscale image could lead to out-of-bounds write in heap (bsc#1191184)
- CVE-2021-3696: Fixed that a crafted PNG image could lead to out-of-bound write during huffman table handling (bsc#1191185)
- CVE-2021-3697: Fixed that a crafted JPEG image could lead to buffer underflow write in the heap (bsc#1191186)
- CVE-2022-28733: Fixed fragmentation math in net/ip (bsc#1198460)
- CVE-2022-28734: Fixed an out-of-bound write for split http headers (bsc#1198493)
- CVE-2022-28736: Fixed a use-after-free in chainloader command (bsc#1198496)
- Update SBAT security contact (bsc#1193282)
- Bump grub's SBAT generation to 2

- Use boot disks in OpenFirmware, fixing regression caused when the root LV is completely in the boot LUN (bsc#1197948)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-10"/>
	<updated date="2022-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191184">SUSE bug 1191184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191185">SUSE bug 1191185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191186">SUSE bug 1191186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193282">SUSE bug 1193282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197948">SUSE bug 1197948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198460">SUSE bug 1198460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198493">SUSE bug 1198493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198496">SUSE bug 1198496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3695/">CVE-2021-3695 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3695">CVE-2021-3695 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3696/">CVE-2021-3696 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3696">CVE-2021-3696 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3697/">CVE-2021-3697 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3697">CVE-2021-3697 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28733/">CVE-2022-28733 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28733">CVE-2022-28733 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-28734/">CVE-2022-28734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28734">CVE-2022-28734 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28736/">CVE-2022-28736 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28736">CVE-2022-28736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696536" comment="grub2-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696116" comment="grub2-i386-pc-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696118" comment="grub2-snapper-plugin-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696119" comment="grub2-systemd-sleep-plugin-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696120" comment="grub2-x86_64-efi-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696121" comment="grub2-x86_64-xen-2.02-137.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148643" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1055710" ref_url="https://bugzilla.suse.com/1055710" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1084513" ref_url="https://bugzilla.suse.com/1084513" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1126703" ref_url="https://bugzilla.suse.com/1126703" source="BUGZILLA"/>
		<reference ref_id="1158266" ref_url="https://bugzilla.suse.com/1158266" source="BUGZILLA"/>
		<reference ref_id="1173265" ref_url="https://bugzilla.suse.com/1173265" source="BUGZILLA"/>
		<reference ref_id="1182171" ref_url="https://bugzilla.suse.com/1182171" source="BUGZILLA"/>
		<reference ref_id="1183646" ref_url="https://bugzilla.suse.com/1183646" source="BUGZILLA"/>
		<reference ref_id="1183723" ref_url="https://bugzilla.suse.com/1183723" source="BUGZILLA"/>
		<reference ref_id="1187055" ref_url="https://bugzilla.suse.com/1187055" source="BUGZILLA"/>
		<reference ref_id="1191647" ref_url="https://bugzilla.suse.com/1191647" source="BUGZILLA"/>
		<reference ref_id="1195651" ref_url="https://bugzilla.suse.com/1195651" source="BUGZILLA"/>
		<reference ref_id="1196426" ref_url="https://bugzilla.suse.com/1196426" source="BUGZILLA"/>
		<reference ref_id="1197343" ref_url="https://bugzilla.suse.com/1197343" source="BUGZILLA"/>
		<reference ref_id="1198031" ref_url="https://bugzilla.suse.com/1198031" source="BUGZILLA"/>
		<reference ref_id="1198032" ref_url="https://bugzilla.suse.com/1198032" source="BUGZILLA"/>
		<reference ref_id="1198516" ref_url="https://bugzilla.suse.com/1198516" source="BUGZILLA"/>
		<reference ref_id="1198577" ref_url="https://bugzilla.suse.com/1198577" source="BUGZILLA"/>
		<reference ref_id="1198660" ref_url="https://bugzilla.suse.com/1198660" source="BUGZILLA"/>
		<reference ref_id="1198687" ref_url="https://bugzilla.suse.com/1198687" source="BUGZILLA"/>
		<reference ref_id="1198742" ref_url="https://bugzilla.suse.com/1198742" source="BUGZILLA"/>
		<reference ref_id="1198962" ref_url="https://bugzilla.suse.com/1198962" source="BUGZILLA"/>
		<reference ref_id="1198997" ref_url="https://bugzilla.suse.com/1198997" source="BUGZILLA"/>
		<reference ref_id="1199012" ref_url="https://bugzilla.suse.com/1199012" source="BUGZILLA"/>
		<reference ref_id="1199063" ref_url="https://bugzilla.suse.com/1199063" source="BUGZILLA"/>
		<reference ref_id="1199314" ref_url="https://bugzilla.suse.com/1199314" source="BUGZILLA"/>
		<reference ref_id="1199426" ref_url="https://bugzilla.suse.com/1199426" source="BUGZILLA"/>
		<reference ref_id="1199505" ref_url="https://bugzilla.suse.com/1199505" source="BUGZILLA"/>
		<reference ref_id="1199507" ref_url="https://bugzilla.suse.com/1199507" source="BUGZILLA"/>
		<reference ref_id="1199605" ref_url="https://bugzilla.suse.com/1199605" source="BUGZILLA"/>
		<reference ref_id="1199650" ref_url="https://bugzilla.suse.com/1199650" source="BUGZILLA"/>
		<reference ref_id="1199785" ref_url="https://bugzilla.suse.com/1199785" source="BUGZILLA"/>
		<reference ref_id="1200143" ref_url="https://bugzilla.suse.com/1200143" source="BUGZILLA"/>
		<reference ref_id="1200144" ref_url="https://bugzilla.suse.com/1200144" source="BUGZILLA"/>
		<reference ref_id="1200249" ref_url="https://bugzilla.suse.com/1200249" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13695" ref_url="https://www.suse.com/security/cve/CVE-2017-13695/" source="CVE"/>
		<reference ref_id="CVE-2018-20784" ref_url="https://www.suse.com/security/cve/CVE-2018-20784/" source="CVE"/>
		<reference ref_id="CVE-2018-7755" ref_url="https://www.suse.com/security/cve/CVE-2018-7755/" source="CVE"/>
		<reference ref_id="CVE-2019-19377" ref_url="https://www.suse.com/security/cve/CVE-2019-19377/" source="CVE"/>
		<reference ref_id="CVE-2020-10769" ref_url="https://www.suse.com/security/cve/CVE-2020-10769/" source="CVE"/>
		<reference ref_id="CVE-2021-20292" ref_url="https://www.suse.com/security/cve/CVE-2021-20292/" source="CVE"/>
		<reference ref_id="CVE-2021-20321" ref_url="https://www.suse.com/security/cve/CVE-2021-20321/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-33061" ref_url="https://www.suse.com/security/cve/CVE-2021-33061/" source="CVE"/>
		<reference ref_id="CVE-2021-38208" ref_url="https://www.suse.com/security/cve/CVE-2021-38208/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1184" ref_url="https://www.suse.com/security/cve/CVE-2022-1184/" source="CVE"/>
		<reference ref_id="CVE-2022-1353" ref_url="https://www.suse.com/security/cve/CVE-2022-1353/" source="CVE"/>
		<reference ref_id="CVE-2022-1419" ref_url="https://www.suse.com/security/cve/CVE-2022-1419/" source="CVE"/>
		<reference ref_id="CVE-2022-1516" ref_url="https://www.suse.com/security/cve/CVE-2022-1516/" source="CVE"/>
		<reference ref_id="CVE-2022-1652" ref_url="https://www.suse.com/security/cve/CVE-2022-1652/" source="CVE"/>
		<reference ref_id="CVE-2022-1729" ref_url="https://www.suse.com/security/cve/CVE-2022-1729/" source="CVE"/>
		<reference ref_id="CVE-2022-1734" ref_url="https://www.suse.com/security/cve/CVE-2022-1734/" source="CVE"/>
		<reference ref_id="CVE-2022-1974" ref_url="https://www.suse.com/security/cve/CVE-2022-1974/" source="CVE"/>
		<reference ref_id="CVE-2022-1975" ref_url="https://www.suse.com/security/cve/CVE-2022-1975/" source="CVE"/>
		<reference ref_id="CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123/" source="CVE"/>
		<reference ref_id="CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125/" source="CVE"/>
		<reference ref_id="CVE-2022-21127" ref_url="https://www.suse.com/security/cve/CVE-2022-21127/" source="CVE"/>
		<reference ref_id="CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166/" source="CVE"/>
		<reference ref_id="CVE-2022-21180" ref_url="https://www.suse.com/security/cve/CVE-2022-21180/" source="CVE"/>
		<reference ref_id="CVE-2022-21499" ref_url="https://www.suse.com/security/cve/CVE-2022-21499/" source="CVE"/>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to 3.12.31 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-1975: Fixed a bug that allows an attacker to crash the linux kernel by simulating nfc device from user-space. (bsc#1200143)
- CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144)
- CVE-2019-19377: Fixed an user-after-free that could be triggered when an attacker mounts a crafted btrfs filesystem image. (bnc#1158266)
- CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).
- CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)
- CVE-2022-21499: Reinforce the kernel lockdown feature, until now it's been trivial to break out of it with kgdb or kdb. (bsc#1199426)
- CVE-2017-13695: Fixed a bug that caused a stack dump allowing local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted ACPI table. (bnc#1055710)
- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).
- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)
- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).
- CVE-2021-28688: Fixed XSA-365 that includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains (bnc#1183646).
- CVE-2020-10769: Fixed a buffer over-read flaw in the IPsec Cryptographic algorithm's module. This flaw allowed a local attacker with user privileges to cause a denial of service. (bnc#1173265)
- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).
- CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012).
- CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc#1191647).
- CVE-2018-7755: Fixed an issue in the fd_locked_ioctl function in drivers/block/floppy.c. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR (bnc#1084513).
- CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742).
- CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055).
- CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c. (bnc#1198516)
- CVE-2018-20784: Fixed a denial of service (infinite loop in update_blocked_averages) by mishandled leaf cfs_rq in kernel/sched/fair.c (bnc#1126703).
- CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc#1183723).
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel (bnc#1198032).
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bnc#1197343)

The following non-security bugs were fixed:

- btrfs: tree-checker: fix incorrect printk format (bsc#1200249).
- net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651).
- net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651).
- PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314).
- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900 bsc#1198660 ltc#197803).
- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729 bsc#1198660 ltc#197803).
- vmbus: do not return values for uninitalized channels (bsc#1051510 bsc#1198997).
- vt: vt_ioctl: fix race in VT_RESIZEX (bsc#1199785).
- x86/hyperv: Read TSC frequency from a synthetic MSR (bsc#1198962).
- x86/speculation: Fix redundant MDS mitigation message (bsc#1199650).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-14"/>
	<updated date="2022-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055710">SUSE bug 1055710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084513">SUSE bug 1084513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126703">SUSE bug 1126703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158266">SUSE bug 1158266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173265">SUSE bug 1173265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182171">SUSE bug 1182171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183646">SUSE bug 1183646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183723">SUSE bug 1183723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187055">SUSE bug 1187055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191647">SUSE bug 1191647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195651">SUSE bug 1195651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196426">SUSE bug 1196426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197343">SUSE bug 1197343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198031">SUSE bug 1198031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198032">SUSE bug 1198032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198516">SUSE bug 1198516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198577">SUSE bug 1198577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198660">SUSE bug 1198660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198687">SUSE bug 1198687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198742">SUSE bug 1198742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198962">SUSE bug 1198962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198997">SUSE bug 1198997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199012">SUSE bug 1199012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199063">SUSE bug 1199063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199314">SUSE bug 1199314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199426">SUSE bug 1199426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199505">SUSE bug 1199505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199507">SUSE bug 1199507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199605">SUSE bug 1199605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199650">SUSE bug 1199650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199785">SUSE bug 1199785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200143">SUSE bug 1200143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200144">SUSE bug 1200144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200249">SUSE bug 1200249</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13695/">CVE-2017-13695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13695">CVE-2017-13695 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20784/">CVE-2018-20784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20784">CVE-2018-20784 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7755/">CVE-2018-7755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7755">CVE-2018-7755 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19377/">CVE-2019-19377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19377">CVE-2019-19377 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10769/">CVE-2020-10769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10769">CVE-2020-10769 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20292/">CVE-2021-20292 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20292">CVE-2021-20292 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20321/">CVE-2021-20321 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20321">CVE-2021-20321 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33061/">CVE-2021-33061 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33061">CVE-2021-33061 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38208/">CVE-2021-38208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38208">CVE-2021-38208 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1184/">CVE-2022-1184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1184">CVE-2022-1184 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1353/">CVE-2022-1353 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1353">CVE-2022-1353 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1419/">CVE-2022-1419 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1419">CVE-2022-1419 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1516/">CVE-2022-1516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1516">CVE-2022-1516 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1652/">CVE-2022-1652 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1652">CVE-2022-1652 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1729/">CVE-2022-1729 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1729">CVE-2022-1729 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1734/">CVE-2022-1734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1974/">CVE-2022-1974 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1974">CVE-2022-1974 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1975/">CVE-2022-1975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1975">CVE-2022-1975 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123">CVE-2022-21123 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21125">CVE-2022-21125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21127/">CVE-2022-21127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21127">CVE-2022-21127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166">CVE-2022-21166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21180/">CVE-2022-21180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21180">CVE-2022-21180 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21499/">CVE-2022-21499 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21499">CVE-2022-21499 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28388">CVE-2022-28388 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28390">CVE-2022-28390 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696537" comment="kernel-default-4.4.180-94.164.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696538" comment="kernel-default-base-4.4.180-94.164.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696539" comment="kernel-default-devel-4.4.180-94.164.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696611" comment="kernel-default-kgraft-4.4.180-94.164.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696126" comment="kernel-devel-4.4.180-94.164.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696127" comment="kernel-macros-4.4.180-94.164.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696128" comment="kernel-source-4.4.180-94.164.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696540" comment="kernel-syms-4.4.180-94.164.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696613" comment="kgraft-patch-4_4_180-94_164-default-1-4.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148644" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1199287" ref_url="https://bugzilla.suse.com/1199287" source="BUGZILLA"/>
		<reference ref_id="1200106" ref_url="https://bugzilla.suse.com/1200106" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26700" ref_url="https://www.suse.com/security/cve/CVE-2022-26700/" source="CVE"/>
		<reference ref_id="CVE-2022-26709" ref_url="https://www.suse.com/security/cve/CVE-2022-26709/" source="CVE"/>
		<reference ref_id="CVE-2022-26716" ref_url="https://www.suse.com/security/cve/CVE-2022-26716/" source="CVE"/>
		<reference ref_id="CVE-2022-26717" ref_url="https://www.suse.com/security/cve/CVE-2022-26717/" source="CVE"/>
		<reference ref_id="CVE-2022-26719" ref_url="https://www.suse.com/security/cve/CVE-2022-26719/" source="CVE"/>
		<reference ref_id="CVE-2022-30293" ref_url="https://www.suse.com/security/cve/CVE-2022-30293/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011295.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.3 (bsc#1200106)

- CVE-2022-30293: Fixed heap-based buffer overflow in WebCore::TextureMapperLayer::setContentsLayer (bsc#1199287).
- CVE-2022-26700: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26709: Fixed use after free issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26716: Fixed use after free issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26717: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26719: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-15"/>
	<updated date="2022-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199287">SUSE bug 1199287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200106">SUSE bug 1200106</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26700/">CVE-2022-26700 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26700">CVE-2022-26700 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26709/">CVE-2022-26709 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26709">CVE-2022-26709 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26716/">CVE-2022-26716 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26716">CVE-2022-26716 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26717/">CVE-2022-26717 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26717">CVE-2022-26717 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26719/">CVE-2022-26719 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26719">CVE-2022-26719 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30293/">CVE-2022-30293 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30293">CVE-2022-30293 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696381" comment="libjavascriptcoregtk-4_0-18-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696382" comment="libwebkit2gtk-4_0-37-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696133" comment="libwebkit2gtk3-lang-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696383" comment="typelib-1_0-JavaScriptCore-4_0-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696384" comment="typelib-1_0-WebKit2-4_0-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696385" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696386" comment="webkit2gtk-4_0-injected-bundles-2.36.3-2.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148645" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1199166" ref_url="https://bugzilla.suse.com/1199166" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1292" ref_url="https://www.suse.com/security/cve/CVE-2022-1292/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011296.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:
	  
- CVE-2022-1292: Fixed command injection in c_rehash (bsc#1199166).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-16"/>
	<updated date="2022-06-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199166">SUSE bug 1199166</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1292/">CVE-2022-1292 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696388" comment="libopenssl-devel-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696389" comment="libopenssl1_0_0-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696140" comment="libopenssl1_0_0-32bit-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696390" comment="libopenssl1_0_0-hmac-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696142" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696391" comment="openssl-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696144" comment="openssl-doc-1.0.2j-60.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148646" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1200338" ref_url="https://bugzilla.suse.com/1200338" source="BUGZILLA"/>
		<reference ref_id="1200340" ref_url="https://bugzilla.suse.com/1200340" source="BUGZILLA"/>
		<reference ref_id="1200341" ref_url="https://bugzilla.suse.com/1200341" source="BUGZILLA"/>
		<reference ref_id="1200345" ref_url="https://bugzilla.suse.com/1200345" source="BUGZILLA"/>
		<reference ref_id="1200348" ref_url="https://bugzilla.suse.com/1200348" source="BUGZILLA"/>
		<reference ref_id="1200350" ref_url="https://bugzilla.suse.com/1200350" source="BUGZILLA"/>
		<reference ref_id="1200352" ref_url="https://bugzilla.suse.com/1200352" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26377" ref_url="https://www.suse.com/security/cve/CVE-2022-26377/" source="CVE"/>
		<reference ref_id="CVE-2022-28614" ref_url="https://www.suse.com/security/cve/CVE-2022-28614/" source="CVE"/>
		<reference ref_id="CVE-2022-28615" ref_url="https://www.suse.com/security/cve/CVE-2022-28615/" source="CVE"/>
		<reference ref_id="CVE-2022-29404" ref_url="https://www.suse.com/security/cve/CVE-2022-29404/" source="CVE"/>
		<reference ref_id="CVE-2022-30522" ref_url="https://www.suse.com/security/cve/CVE-2022-30522/" source="CVE"/>
		<reference ref_id="CVE-2022-30556" ref_url="https://www.suse.com/security/cve/CVE-2022-30556/" source="CVE"/>
		<reference ref_id="CVE-2022-31813" ref_url="https://www.suse.com/security/cve/CVE-2022-31813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011297.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-26377: Fixed possible request smuggling in mod_proxy_ajp (bsc#1200338)
- CVE-2022-28614: Fixed read beyond bounds via ap_rwrite() (bsc#1200340)
- CVE-2022-28615: Fixed read beyond bounds in ap_strcmp_match() (bsc#1200341)
- CVE-2022-29404: Fixed denial of service in mod_lua r:parsebody (bsc#1200345)
- CVE-2022-30556: Fixed information disclosure in mod_lua with websockets (bsc#1200350)
- CVE-2022-30522: Fixed mod_sed denial of service (bsc#1200352)
- CVE-2022-31813: Fixed mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism (bsc#1200348)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-16"/>
	<updated date="2022-06-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200338">SUSE bug 1200338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200340">SUSE bug 1200340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200341">SUSE bug 1200341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200345">SUSE bug 1200345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200348">SUSE bug 1200348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200350">SUSE bug 1200350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200352">SUSE bug 1200352</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-26377/">CVE-2022-26377 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26377">CVE-2022-26377 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28614/">CVE-2022-28614 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28614">CVE-2022-28614 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28615/">CVE-2022-28615 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28615">CVE-2022-28615 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29404/">CVE-2022-29404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29404">CVE-2022-29404 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30522/">CVE-2022-30522 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30522">CVE-2022-30522 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30556/">CVE-2022-30556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30556">CVE-2022-30556 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-31813/">CVE-2022-31813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31813">CVE-2022-31813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696392" comment="apache2-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696146" comment="apache2-doc-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696393" comment="apache2-example-pages-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696394" comment="apache2-prefork-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696395" comment="apache2-utils-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696396" comment="apache2-worker-2.4.23-29.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148647" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1196739" ref_url="https://bugzilla.suse.com/1196739" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21716" ref_url="https://www.suse.com/security/cve/CVE-2022-21716/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011312.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

- CVE-2022-21716: Fixed that ssh server accepts an infinite amount of data using all the available memory (bsc#1196739).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-20"/>
	<updated date="2022-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196739">SUSE bug 1196739</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21716/">CVE-2022-21716 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21716">CVE-2022-21716 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697259" comment="python-Twisted-15.2.1-9.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148648" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010124.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2022-23307: Fix deserialization issue by removing the chainsaw sub-package. (bsc#1194844)
- CVE-2022-23305: Fix SQL injection by removing src/main/java/org/apache/log4j/jdbc/JDBCAppender.java. (bsc#1194843)
- CVE-2022-23302: Fix remote code execution by removing src/main/java/org/apache/log4j/net/JMSSink.java. (bsc#1194842)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-27"/>
	<updated date="2022-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23302">CVE-2022-23302 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23305">CVE-2022-23305 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23307">CVE-2022-23307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664687" comment="log4j-1.2.15-126.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148649" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1181223" ref_url="https://bugzilla.suse.com/1181223" source="BUGZILLA"/>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1190462" ref_url="https://bugzilla.suse.com/1190462" source="BUGZILLA"/>
		<reference ref_id="1190535" ref_url="https://bugzilla.suse.com/1190535" source="BUGZILLA"/>
		<reference ref_id="1193600" ref_url="https://bugzilla.suse.com/1193600" source="BUGZILLA"/>
		<reference ref_id="1194873" ref_url="https://bugzilla.suse.com/1194873" source="BUGZILLA"/>
		<reference ref_id="1195726" ref_url="https://bugzilla.suse.com/1195726" source="BUGZILLA"/>
		<reference ref_id="1195727" ref_url="https://bugzilla.suse.com/1195727" source="BUGZILLA"/>
		<reference ref_id="1195728" ref_url="https://bugzilla.suse.com/1195728" source="BUGZILLA"/>
		<reference ref_id="1196338" ref_url="https://bugzilla.suse.com/1196338" source="BUGZILLA"/>
		<reference ref_id="1196704" ref_url="https://bugzilla.suse.com/1196704" source="BUGZILLA"/>
		<reference ref_id="1197507" ref_url="https://bugzilla.suse.com/1197507" source="BUGZILLA"/>
		<reference ref_id="1197689" ref_url="https://bugzilla.suse.com/1197689" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36222" ref_url="https://www.suse.com/security/cve/CVE-2021-36222/" source="CVE"/>
		<reference ref_id="CVE-2021-3711" ref_url="https://www.suse.com/security/cve/CVE-2021-3711/" source="CVE"/>
		<reference ref_id="CVE-2021-39226" ref_url="https://www.suse.com/security/cve/CVE-2021-39226/" source="CVE"/>
		<reference ref_id="CVE-2021-41174" ref_url="https://www.suse.com/security/cve/CVE-2021-41174/" source="CVE"/>
		<reference ref_id="CVE-2021-41244" ref_url="https://www.suse.com/security/cve/CVE-2021-41244/" source="CVE"/>
		<reference ref_id="CVE-2021-43798" ref_url="https://www.suse.com/security/cve/CVE-2021-43798/" source="CVE"/>
		<reference ref_id="CVE-2021-43813" ref_url="https://www.suse.com/security/cve/CVE-2021-43813/" source="CVE"/>
		<reference ref_id="CVE-2021-43815" ref_url="https://www.suse.com/security/cve/CVE-2021-43815/" source="CVE"/>
		<reference ref_id="CVE-2022-21673" ref_url="https://www.suse.com/security/cve/CVE-2022-21673/" source="CVE"/>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<reference ref_id="CVE-2022-21702" ref_url="https://www.suse.com/security/cve/CVE-2022-21702/" source="CVE"/>
		<reference ref_id="CVE-2022-21703" ref_url="https://www.suse.com/security/cve/CVE-2022-21703/" source="CVE"/>
		<reference ref_id="CVE-2022-21713" ref_url="https://www.suse.com/security/cve/CVE-2022-21713/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011316.html" source="SUSE-SU"/>
		<description>
This update fixes the following issues:

golang-github-QubitProducts-exporter_exporter:

- Adapted to build on Enterprise Linux.
- Fix build for RedHat 7
- Require Go &gt;= 1.14 also for CentOS
- Add support for CentOS
- Replace %{?systemd_requires} with %{?systemd_ordering}

golang-github-prometheus-alertmanager:

- CVE-2022-21698: Denial of service using InstrumentHandlerCounter.
  * Update vendor tarball with prometheus/client_golang 1.11.1  (bsc#1196338, jsc#SLE-24077)
- Update required Go version to 1.16
- Update to version 0.23.0:
  * amtool: Detect version drift and warn users (#2672)
  * Add ability to skip TLS verification for amtool (#2663)
  * Fix empty isEqual in amtool. (#2668)
  * Fix main tests (#2670)
  * cli: add new template render command (#2538)
  * OpsGenie: refer to alert instead of incident (#2609)
  * Docs: target_match and source_match are DEPRECATED (#2665)
  * Fix test not waiting for cluster member to be ready
- Added hardening to systemd service(s) (bsc#1181400)

golang-github-prometheus-node_exporter:

- CVE-2022-21698: Denial of service using InstrumentHandlerCounter.
  * Update vendor tarball with prometheus/client_golang 1.11.1
  (bsc#1196338, jsc#SLE-24238, jsc#SLE-24239)
- Update to 1.3.0
  * [CHANGE] Add path label to rapl collector #2146
  * [CHANGE] Exclude filesystems under /run/credentials #2157
  * [CHANGE] Add TCPTimeouts to netstat default filter #2189
  * [FEATURE] Add lnstat collector for metrics from /proc/net/stat/ #1771
  * [FEATURE] Add darwin powersupply collector #1777
  * [FEATURE] Add support for monitoring GPUs on Linux #1998
  * [FEATURE] Add Darwin thermal collector #2032
  * [FEATURE] Add os release collector #2094
  * [FEATURE] Add netdev.address-info collector #2105
  * [FEATURE] Add clocksource metrics to time collector #2197
  * [ENHANCEMENT] Support glob textfile collector directories #1985
  * [ENHANCEMENT] ethtool: Expose node_ethtool_info metric #2080
  * [ENHANCEMENT] Use include/exclude flags for ethtool filtering #2165
  * [ENHANCEMENT] Add flag to disable guest CPU metrics #2123
  * [ENHANCEMENT] Add DMI collector #2131
  * [ENHANCEMENT] Add threads metrics to processes collector #2164
  * [ENHANCMMENT] Reduce timer GC delays in the Linux filesystem collector #2169
  * [ENHANCMMENT] Add TCPTimeouts to netstat default filter #2189
  * [ENHANCMMENT] Use SysctlTimeval for boottime collector on BSD #2208
  * [BUGFIX] ethtool: Sanitize metric names #2093
  * [BUGFIX] Fix ethtool collector for multiple interfaces #2126
  * [BUGFIX] Fix possible panic on macOS #2133
  * [BUGFIX] Collect flag_info and bug_info only for one core #2156
  * [BUGFIX] Prevent duplicate ethtool metric names #2187
- Update to 1.2.2
  * Bug fixes
     Fix processes collector long int parsing #2112
- Update to 1.2.1
  * Removed
     Remove obsolete capture permission denied error patch that is already included upstream
     Fix zoneinfo parsing prometheus/procfs#386
     Fix nvme collector log noise #2091
     Fix rapl collector log noise #2092
- Update to 1.2.0
  * Changes
     Rename filesystem collector flags to match other collectors #2012
     Make node_exporter print usage to STDOUT #203
  * Features
     Add conntrack statistics metrics #1155
     Add ethtool stats collector #1832
     Add flag to ignore network speed if it is unknown #1989
     Add tapestats collector for Linux #2044
     Add nvme collector #2062
  * Enhancements
     Add ErrorLog plumbing to promhttp #1887
     Add more Infiniband counters #2019
     netclass: retrieve interface names and filter before parsing #2033
     Add time zone offset metric #2060
     Handle errors from disabled PSI subsystem #1983
     Fix panic when using backwards compatible flags #2000
     Fix wrong value for OpenBSD memory buffer cache #2015
     Only initiate collectors once #2048
     Handle small backwards jumps in CPU idle #2067
- Apply patch to capture permission denied error for 'energy_uj' file (bsc#1190535)

grafana:

- Update to version 8.3.5 (jsc#SLE-23439, jsc#SLE-23422)
  + Security:
    * Fixes XSS vulnerability in handling data sources
      (bsc#1195726, CVE-2022-21702)
    * Fixes cross-origin request forgery vulnerability
      (bsc#1195727, CVE-2022-21703)
    * Fixes Insecure Direct Object Reference vulnerability in Teams
      API (bsc#1195728, CVE-2022-21713)
- Update to Go 1.17.
- Add build-time dependency on `wire`.
- Update license to GNU Affero General Public License v3.0.
- Update to version 8.3.4
    * GetUserInfo: return an error if no user was found
      (bsc#1194873, CVE-2022-21673)
  + Features and enhancements:
    * Alerting: Allow configuration of non-ready alertmanagers.
    * Alerting: Allow customization of Google chat message.
    * AppPlugins: Support app plugins with only default nav.
    * InfluxDB: query editor: skip fields in metadata queries.
    * Postgres/MySQL/MSSQL: Cancel in-flight SQL query if user
      cancels query in grafana.
    * Prometheus: Forward oauth tokens after prometheus datasource
      migration.
  + Bug fixes:
    * Azure Monitor: Bug fix for variable interpolations in metrics
      dropdowns.
    * Azure Monitor: Improved error messages for variable queries.
    * CloudMonitoring: Fixes broken variable queries that use group
      bys.
    * Configuration: You can now see your expired API keys if you
      have no active ones.
    * Elasticsearch: Fix handling multiple datalinks for a single
      field.
    * Export: Fix error being thrown when exporting dashboards
      using query variables that reference the default datasource.
    * ImportDashboard: Fixes issue with importing dashboard and
      name ending up in uid.
    * Login: Page no longer overflows on mobile.
    * Plugins: Set backend metadata property for core plugins.
    * Prometheus: Fill missing steps with null values.
    * Prometheus: Fix interpolation of $__rate_interval variable.
    * Prometheus: Interpolate variables with curly brackets syntax.
    * Prometheus: Respect the http-method data source setting.
    * Table: Fixes issue with field config applied to wrong fields
      when hiding columns.
    * Toolkit: Fix bug with rootUrls not being properly parsed when
      signing a private plugin.
    * Variables: Fix so data source variables are added to adhoc
      configuration.
  + Plugin development fixes &amp; changes:
    * Toolkit: Revert build config so tslib is bundled with plugins
      to prevent plugins from crashing.
- Update to version 8.3.3:
    * BarChart: Use new data error view component to show actions
      in panel edit.
    * CloudMonitor: Iterate over pageToken for resources.
    * Macaron: Prevent WriteHeader invalid HTTP status code panic.
    * AnnoListPanel: Fix interpolation of variables in tags.
    * CloudWatch: Allow queries to have no dimensions specified.
    * CloudWatch: Fix broken queries for users migrating from
      8.2.4/8.2.5 to 8.3.0.
    * CloudWatch: Make sure MatchExact flag gets the right value.
    * Dashboards: Fix so that empty folders can be deleted from the
      manage dashboards/folders page.
    * InfluxDB: Improve handling of metadata query errors in
      InfluxQL.
    * Loki: Fix adding of ad hoc filters for queries with parser
      and line_format expressions.
    * Prometheus: Fix running of exemplar queries for non-histogram
      metrics.
    * Prometheus: Interpolate template variables in interval.
    * StateTimeline: Fix toolitp not showing when for frames with
      multiple fields.
    * TraceView: Fix virtualized scrolling when trace view is
      opened in right pane in Explore.
    * Variables: Fix repeating panels for on time range changed
      variables.
    * Variables: Fix so queryparam option works for scoped
- Update to version 8.3.2
  + Security: Fixes CVE-2021-43813 and CVE-2021-43815.
- Update to version 8.3.1
  + Security: Fixes CVE-2021-43798.
- Update to version 8.3.0
    * Alerting: Prevent folders from being deleted when they
      contain alerts.
    * Alerting: Show full preview value in tooltip.
    * BarGauge: Limit title width when name is really long.
    * CloudMonitoring: Avoid to escape regexps in filters.
    * CloudWatch: Add support for AWS Metric Insights.
    * TooltipPlugin: Remove other panels' shared tooltip in edit
      panel.
    * Visualizations: Limit y label width to 40% of visualization
      width.
    * Alerting: Clear alerting rule evaluation errors after
      intermittent failures.
    * Alerting: Fix refresh on legacy Alert List panel.
    * Dashboard: Fix queries for panels with non-integer widths.
    * Explore: Fix url update inconsistency.
    * Prometheus: Fix range variables interpolation for time ranges
      smaller than 1 second.
    * ValueMappings: Fixes issue with regex value mapping that only
      sets color.
- Update to version 8.3.0-beta2
  + Breaking changes:
    * Grafana 8 Alerting enabled by default for installations that
      do not use legacy alerting.
    * Keep Last State for 'If execution error or timeout' when
      upgrading to Grafana 8 alerting.
    * Alerting: Create DatasourceError alert if evaluation returns
      error.
    * Alerting: Make Unified Alerting enabled by default for those
      who do not use legacy alerting.
    * Alerting: Support mute timings configuration through the api
      for the embedded alert manager.
    * CloudWatch: Add missing AWS/Events metrics.
    * Docs: Add easier to find deprecation notices to certain data
      sources and to the changelog.
    * Plugins Catalog: Enable install controls based on the
      pluginAdminEnabled flag.
    * Table: Add space between values for the DefaultCell and
      JSONViewCell.
    * Tracing: Make query editors available in dashboard for Tempo
      and Zipkin.
    * AccessControl: Renamed orgs roles, removed fixed:orgs:reader
      introduced in beta1.
    * Azure Monitor: Add trap focus for modals in grafana/ui and
      other small a11y fixes for Azure Monitor.
    * CodeEditor: Prevent suggestions from being clipped.
    * Dashboard: Fix cache timeout persistence.
    * Datasource: Fix stable sort order of query responses.
    * Explore: Fix error in query history when removing last item.
    * Logs: Fix requesting of older logs when flipped order.
    * Prometheus: Fix running of health check query based on access
      mode.
    * TextPanel: Fix suggestions for existing panels.
    * Tracing: Fix incorrect indentations due to reoccurring
      spanIDs.
    * Tracing: Show start time of trace with milliseconds
      precision.
    * Variables: Make renamed or missing variable section
      expandable.
    * Select: Select menus now properly scroll during keyboard
      navigation.
- Update to version 8.3.0-beta1
    * Alerting: Add UI for contact point testing with custom
      annotations and labels.
    * Alerting: Make alert state indicator in panel header work
      with Grafana 8 alerts.
    * Alerting: Option for Discord notifier to use webhook name.
    * Annotations: Deprecate AnnotationsSrv.
    * Auth: Omit all base64 paddings in JWT tokens for the JWT
      auth.
    * Azure Monitor: Clean up fields when editing Metrics.
    * AzureMonitor: Add new starter dashboards.
    * AzureMonitor: Add starter dashboard for app monitoring with
      Application Insights.
    * Barchart/Time series: Allow x axis label.
    * CLI: Improve error handling for installing plugins.
    * CloudMonitoring: Migrate to use backend plugin SDK contracts.
    * CloudWatch Logs: Add retry strategy for hitting max
      concurrent queries.
    * CloudWatch: Add AWS RoboMaker metrics and dimension.
    * CloudWatch: Add AWS Transfer metrics and dimension.
    * Dashboard: replace datasource name with a reference object.
    * Dashboards: Show logs on time series when hovering.
    * Elasticsearch: Add support for Elasticsearch 8.0 (Beta).
    * Elasticsearch: Add time zone setting to Date Histogram
      aggregation.
    * Elasticsearch: Enable full range log volume histogram.
    * Elasticsearch: Full range logs volume.
    * Explore: Allow changing the graph type.
    * Explore: Show ANSI colors when highlighting matched words in
      the logs panel.
    * Graph(old) panel: Listen to events from Time series panel.
    * Import: Load gcom dashboards from URL.
    * LibraryPanels: Improves export and import of library panels
      between orgs.
    * OAuth: Support PKCE.
    * Panel edit: Overrides now highlight correctly when searching.
    * PanelEdit: Display drag indicators on draggable sections.
    * Plugins: Refactor Plugin Management.
    * Prometheus: Add custom query parameters when creating
      PromLink url.
    * Prometheus: Remove limits on metrics, labels, and values in
      Metrics Browser.
    * StateTimeline: Share cursor with rest of the panels.
    * Tempo: Add error details when json upload fails.
    * Tempo: Add filtering for service graph query.
    * Tempo: Add links to nodes in Service Graph pointing to
      Prometheus metrics.
    * Time series/Bar chart panel: Add ability to sort series via
      legend.
    * TimeSeries: Allow multiple axes for the same unit.
    * TraceView: Allow span links defined on dataFrame.
    * Transformations: Support a rows mode in labels to fields.
    * ValueMappings: Don't apply field config defaults to time
      fields.
    * Variables: Only update panels that are impacted by variable
      change.
    * API: Fix dashboard quota limit for imports.
    * Alerting: Fix rule editor issues with Azure Monitor data
      source.
    * Azure monitor: Make sure alert rule editor is not enabled
      when template variables are being used.
    * CloudMonitoring: Fix annotation queries.
    * CodeEditor: Trigger the latest getSuggestions() passed to
      CodeEditor.
    * Dashboard: Remove the current panel from the list of options
      in the Dashboard datasource.
    * Encryption: Fix decrypting secrets in alerting migration.
    * InfluxDB: Fix corner case where index is too large in ALIAS
    * NavBar: Order App plugins alphabetically.
    * NodeGraph: Fix zooming sensitivity on touchpads.
    * Plugins: Add OAuth pass-through logic to api/ds/query
      endpoint.
    * Snapshots: Fix panel inspector for snapshot data.
    * Tempo: Fix basic auth password reset on adding tag.
    * ValueMapping: Fixes issue with regex mappings.
    * grafana/ui: Enable slider marks display.
- Update to version 8.2.7
- Update to version 8.2.6
    * Security: Upgrade Docker base image to Alpine 3.14.3.
    * Security: Upgrade Go to 1.17.2.
    * TimeSeries: Fix fillBelowTo wrongly affecting fills of
      unrelated series.
- Update to version 8.2.5
    * Fix No Data behaviour in Legacy Alerting.
    * Alerting: Fix a bug where the metric in the evaluation string
      was not correctly populated.
    * Alerting: Fix no data behaviour in Legacy Alerting for alert
      rules using the AND operator.
    * CloudMonitoring: Ignore min and max aggregation in MQL
      queries.
    * Dashboards: 'Copy' is no longer added to new dashboard
      titles.
    * DataProxy: Fix overriding response body when response is a
      WebSocket upgrade.
    * Elasticsearch: Use field configured in query editor as field
      for date_histogram aggregations.
    * Explore: Fix running queries without a datasource property
      set.
    * InfluxDB: Fix numeric aliases in queries.
    * Plugins: Ensure consistent plugin settings list response.
    * Tempo: Fix validation of float durations.
    * Tracing: Correct tags for each span are shown.
- Update to version 8.2.4
  + Security: Fixes CVE-2021-41244.
- Update to version 8.2.3
  + Security: Fixes CVE-2021-41174.
- Update to version 8.2.2
    * Annotations: We have improved tag search performance.
    * Application: You can now configure an error-template title.
    * AzureMonitor: We removed a restriction from the resource
      filter query.
    * Packaging: We removed the ProcSubset option in systemd. This
      option prevented Grafana from starting in LXC environments.
    * Prometheus: We removed the autocomplete limit for metrics.
    * Table: We improved the styling of the type icons to make them
      more distinct from column / field name.
    * ValueMappings: You can now use value mapping in stat, gauge,
      bar gauge, and pie chart visualizations.
    * Alerting: Fix panic when Slack's API sends unexpected
      response.
    * Alerting: The Create Alert button now appears on the
      dashboard panel when you are working with a default
      datasource.
    * Explore: We fixed the problem where the Explore log panel
      disappears when an Elasticsearch logs query returns no
      results.
    * Graph: You can now see annotation descriptions on hover.
    * Logs: The system now uses the JSON parser only if the line is
      parsed to an object.
    * Prometheus: We fixed the issue where the system did not reuse
      TCP connections when querying from Grafana alerting.
    * Prometheus: We fixed the problem that resulted in an error
      when a user created a query with a $__interval min step.
    * RowsToFields: We fixed the issue where the system was not
      properly interpreting number values.
    * Scale: We fixed how the system handles NaN percent when data
      min = data max.
    * Table panel: You can now create a filter that includes
      special characters.
- Update to version 8.2.1
    * Dashboard: Fix rendering of repeating panels.
    * Datasources: Fix deletion of data source if plugin is not
      found.
    * Packaging: Remove systemcallfilters sections from systemd
      unit files.
    * Prometheus: Add Headers to HTTP client options.
- Update to version 8.2.0
    * AWS: Updated AWS authentication documentation.
    * Alerting: Added support Alertmanager data source for upstream
      Prometheus AM implementation.
    * Alerting: Allows more characters in label names so
      notifications are sent.
    * Alerting: Get alert rules for a dashboard or a panel using
      /api/v1/rules endpoints.
    * Annotations: Improved rendering performance of event markers.
    * CloudWatch Logs: Skip caching for log queries.
    * Explore: Added an opt-in configuration for Node Graph in
      Jaeger, Zipkin, and Tempo.
    * Packaging: Add stricter systemd unit options.
    * Prometheus: Metrics browser can now handle label values with
    * CodeEditor: Ensure that we trigger the latest onSave callback
      provided to the component.
    * DashboardList/AlertList: Fix for missing All folder value.
    * Plugins: Create a mock icon component to prevent console
      errors.
- Update to version 8.2.0-beta2
    * AccessControl: Document new permissions restricting data
      source access.
    * TimePicker: Add fiscal years and search to time picker.
    * Alerting: Added support for Unified Alerting with Grafana HA.
    * Alerting: Added support for tune rule evaluation using
      configuration options.
    * Alerting: Cleanups alertmanager namespace from key-value
      store when disabling Grafana 8 alerts.
    * Alerting: Remove ngalert feature toggle and introduce two new
      settings for enabling Grafana 8 alerts and disabling them for
      specific organisations.
    * CloudWatch: Introduced new math expression where it is
      necessary to specify the period field.
    * InfluxDB: Added support for $__interval and $__interval_ms in
      Flux queries for alerting.
    * InfluxDB: Flux queries can use more precise start and end
      timestamps with nanosecond-precision.
    * Plugins Catalog: Make the catalog the default way to interact
      with plugins.
    * Prometheus: Removed autocomplete limit for metrics.
    * Alerting: Fixed an issue where the edit page crashes if you
      tried to preview an alert without a condition set.
    * Alerting: Fixed rules migration to keep existing Grafana 8
      alert rules.
    * Alerting: Fixed the silence file content generated during
    * Analytics: Fixed an issue related to interaction event
      propagation in Azure Application Insights.
    * BarGauge: Fixed an issue where the cell color was lit even
      though there was no data.
    * BarGauge: Improved handling of streaming data.
    * CloudMonitoring: Fixed INT64 label unmarshal error.
    * ConfirmModal: Fixes confirm button focus on modal open.
    * Dashboard: Add option to generate short URL for variables
      with values containing spaces.
    * Explore: No longer hides errors containing refId property.
    * Fixed an issue that produced State timeline panel tooltip
      error when data was not in sync.
    * InfluxDB: InfluxQL query editor is set to always use
      resultFormat.
    * Loki: Fixed creating context query for logs with parsed
      labels.
    * PageToolbar: Fixed alignment of titles.
    * Plugins Catalog: Update to the list of available panels after
      an install, update or uninstall.
    * TimeSeries: Fixed an issue where the shared cursor was not
      showing when hovering over in old Graph panel.
    * Variables: Fixed issues related to change of focus or refresh
      pages when pressing enter in a text box variable input.
    * Variables: Panel no longer crash when using the adhoc
      variable in data links.
- Update to version 8.2.0-beta1
    * AccessControl: Introduce new permissions to restrict access
      for reloading provisioning configuration.
    * Alerting: Add UI to edit Cortex/Loki namespace, group names,
      and group evaluation interval.
    * Alerting: Add a Test button to test contact point.
    * Alerting: Allow creating/editing recording rules for Loki and
      Cortex.
    * Alerting: Metrics should have the label org instead of user.
    * Alerting: Sort notification channels by name to make them
      easier to locate.
    * Alerting: Support org level isolation of notification
    * AzureMonitor: Add data links to deep link to Azure Portal
      Azure Resource Graph.
    * AzureMonitor: Add support for annotations from Azure Monitor
      Metrics and Azure Resource Graph services.
    * AzureMonitor: Show error message when subscriptions request
      fails in ConfigEditor.
    * Chore: Update to Golang 1.16.7.
    * CloudWatch Logs: Add link to X-Ray data source for trace IDs
      in logs.
    * CloudWatch Logs: Disable query path using websockets (Live)
      feature.
    * CloudWatch/Logs: Don't group dataframes for non time series
    * Cloudwatch: Migrate queries that use multiple stats to one
      query per stat.
    * Dashboard: Keep live timeseries moving left (v2).
    * Datasources: Introduce response_limit for datasource
      responses.
    * Explore: Add filter by trace or span ID to trace to logs
    * Explore: Download traces as JSON in Explore Inspector.
    * Explore: Reuse Dashboard's QueryRows component.
    * Explore: Support custom display label for derived fields
      buttons for Loki datasource.
    * Grafana UI: Update monaco-related dependencies.
    * Graphite: Deprecate browser access mode.
    * InfluxDB: Improve handling of intervals in alerting.
    * InfluxDB: InfluxQL query editor: Handle unusual characters in
      tag values better.
    * Jaeger: Add ability to upload JSON file for trace data.
    * LibraryElements: Enable specifying UID for new and existing
      library elements.
    * LibraryPanels: Remove library panel icon from the panel
      header so you can no longer tell that a panel is a library
      panel from the dashboard view.
    * Logs panel: Scroll to the bottom on page refresh when sorting
      in ascending order.
    * Loki: Add fuzzy search to label browser.
    * Navigation: Implement active state for items in the Sidemenu.
    * Packaging: Update PID file location from /var/run to /run.
    * Plugins: Add Hide OAuth Forward config option.
    * Postgres/MySQL/MSSQL: Add setting to limit the maximum number
      of rows processed.
    * Prometheus: Add browser access mode deprecation warning.
    * Prometheus: Add interpolation for built-in-time variables to
      backend.
    * Tempo: Add ability to upload trace data in JSON format.
    * TimeSeries/XYChart: Allow grid lines visibility control in
      XYChart and TimeSeries panels.
    * Transformations: Convert field types to time string number or
      boolean.
    * Value mappings: Add regular-expression based value mapping.
    * Zipkin: Add ability to upload trace JSON.
    * Admin: Prevent user from deleting user's current/active
      organization.
    * LibraryPanels: Fix library panel getting saved in the
      dashboard's folder.
    * OAuth: Make generic teams URL and JMES path configurable.
    * QueryEditor: Fix broken copy-paste for mouse middle-click
    * Thresholds: Fix undefined color in 'Add threshold'.
    * Timeseries: Add wide-to-long, and fix multi-frame output.
    * TooltipPlugin: Fix behavior of Shared Crosshair when Tooltip
      is set to All.
    * Grafana UI: Fix TS error property css is missing in type.
- Update to version 8.1.8
- Update to version 8.1.7
    * Alerting: Fix alerts with evaluation interval more than 30
      seconds resolving before notification.
    * Elasticsearch/Prometheus: Fix usage of proper SigV4 service
      namespace.
- Update to version 8.1.6
  + Security: Fixes CVE-2021-39226.
- Update to version 8.1.5
    * BarChart: Fixes panel error that happens on second refresh.
- Update to version 8.1.4
  + Features and enhancements
    * Explore: Ensure logs volume bar colors match legend colors.
    * LDAP: Search all DNs for users.
    * Alerting: Fix notification channel migration.
    * Annotations: Fix blank panels for queries with unknown data
      sources.
    * BarChart: Fix stale values and x axis labels.
    * Graph: Make old graph panel thresholds work even if ngalert
      is enabled.
    * InfluxDB: Fix regex to identify / as separator.
    * LibraryPanels: Fix update issues related to library panels in
      rows.
    * Variables: Fix variables not updating inside a Panel when the
      preceding Row uses 'Repeat For'.
- Update to version 8.1.3
  + Bug fixes
    * Alerting: Fix alert flapping in the internal alertmanager.
    * Alerting: Fix request handler failed to convert dataframe
      'results' to plugins.DataTimeSeriesSlice: input frame is not
      recognized as a time series.
    * Dashboard: Fix UIDs are not preserved when importing/creating
      dashboards thru importing .json file.
    * Dashboard: Forces panel re-render when exiting panel edit.
    * Dashboard: Prevent folder from changing when navigating to
      general settings.
    * Docker: Force use of libcrypto1.1 and libssl1.1 versions to
      fix CVE-2021-3711.
    * Elasticsearch: Fix metric names for alert queries.
    * Elasticsearch: Limit Histogram field parameter to numeric
      values.
    * Elasticsearch: Prevent pipeline aggregations to show up in
      terms order by options.
    * LibraryPanels: Prevent duplicate repeated panels from being
      created.
    * Loki: Fix ad-hoc filter in dashboard when used with parser.
    * Plugins: Track signed files + add warn log for plugin assets
      which are not signed.
    * Postgres/MySQL/MSSQL: Fix region annotations not displayed
      correctly.
    * Prometheus: Fix validate selector in metrics browser.
    * Security: Fix stylesheet injection vulnerability.
    * Security: Fix short URL vulnerability.
- Update to version 8.1.2
    * AzureMonitor: Add support for PostgreSQL and MySQL Flexible
      Servers.
    * Datasource: Change HTTP status code for failed datasource
      health check to 400.
    * Explore: Add span duration to left panel in trace viewer.
    * Plugins: Use file extension allowlist when serving plugin
      assets instead of checking for UNIX executable.
    * Profiling: Add support for binding pprof server to custom
      network interfaces.
    * Search: Make search icon keyboard navigable.
    * Template variables: Keyboard navigation improvements.
    * Tooltip: Display ms within minute time range.
    * Alerting: Fix saving LINE contact point.
    * Annotations: Fix alerting annotation coloring.
    * Annotations: Alert annotations are now visible in the correct
      Panel.
    * Auth: Hide SigV4 config UI and disable middleware when its
      config flag is disabled.
    * Dashboard: Prevent incorrect panel layout by comparing window
      width against theme breakpoints.
    * Explore: Fix showing of full log context.
    * PanelEdit: Fix 'Actual' size by passing the correct panel
      size to Dashboard.
    * Plugins: Fix TLS datasource settings.
    * Variables: Fix issue with empty drop downs on navigation.
    * Variables: Fix URL util converting false into true.
    * Toolkit: Fix matchMedia not found error.
- Update to version 8.1.1
    * CloudWatch Logs: Fix crash when no region is selected.
- Update to version 8.1.0
    * Alerting: Deduplicate receivers during migration.
    * ColorPicker: Display colors as RGBA.
    * Select: Make portalling the menu opt-in, but opt-in
      everywhere.
    * TimeRangePicker: Improve accessibility.
    * Annotations: Correct annotations that are displayed upon page
      refresh.
    * Annotations: Fix Enabled button that disappeared from Grafana
      v8.0.6.
    * Annotations: Fix data source template variable that was not
      available for annotations.
    * AzureMonitor: Fix annotations query editor that does not
      load.
    * Geomap: Fix scale calculations.
    * GraphNG: Fix y-axis autosizing.
    * Live: Display stream rate and fix duplicate channels in list
    * Loki: Update labels in log browser when time range changes in
      dashboard.
    * NGAlert: Send resolve signal to alertmanager on alerting -&gt;
      Normal.
    * PasswordField: Prevent a password from being displayed when
      you click the Enter button.
    * Renderer: Remove debug.log file when Grafana is stopped.
    * Security: Update dependencies to fix CVE-2021-36222.
- Update to version 8.1.0-beta3
    * Alerting: Support label matcher syntax in alert rule list
      filter.
    * IconButton: Put tooltip text as aria-label.
    * Live: Experimental HA with Redis.
    * UI: FileDropzone component.
    * CloudWatch: Add AWS LookoutMetrics.
    * Docker: Fix builds by delaying go mod verify until all
      required files are copied over.
    * Exemplars: Fix disable exemplars only on the query that
      failed.
    * SQL: Fix SQL dataframe resampling (fill mode + time
      intervals).
- Update to version 8.1.0-beta2
    * Alerting: Expand the value string in alert annotations and
    * Auth: Add Azure HTTP authentication middleware.
    * Auth: Auth: Pass user role when using the authentication
      proxy.
    * Gazetteer: Update countries.json file to allow for linking to
      3-letter country codes.
    * Config: Fix Docker builds by correcting formatting in
      sample.ini.
    * Explore: Fix encoding of internal URLs.
- Update to version 8.1.0-beta1
    * Alerting: Add Alertmanager notifications tab.
    * Alerting: Add button to deactivate current Alertmanager
    * Alerting: Add toggle in Loki/Prometheus data source
      configuration to opt out of alerting UI.
    * Alerting: Allow any 'evaluate for' value &gt;=0 in the alert
      rule form.
    * Alerting: Load default configuration from status endpoint, if
      Cortex Alertmanager returns empty user configuration. 
    * Alerting: view to display alert rule and its underlying data.
    * Annotation panel: Release the annotation panel.
    * Annotations: Add typeahead support for tags in built-in
      annotations.
    * AzureMonitor: Add curated dashboards for Azure services.
    * AzureMonitor: Add support for deep links to Microsoft Azure
      portal for Metrics.
    * AzureMonitor: Remove support for different credentials for
      Azure Monitor Logs.
    * AzureMonitor: Support querying any Resource for Logs queries.
    * Elasticsearch: Add frozen indices search support.
    * Elasticsearch: Name fields after template variables values
      instead of their name.
    * Elasticsearch: add rate aggregation.
    * Email: Allow configuration of content types for email
      notifications.
    * Explore: Add more meta information when line limit is hit.
    * Explore: UI improvements to trace view.
    * FieldOverrides: Added support to change display name in an
      override field and have it be matched by a later rule.
    * HTTP Client: Introduce dataproxy_max_idle_connections config
      variable.
    * InfluxDB: InfluxQL: adds tags to timeseries data.
    * InfluxDB: InfluxQL: make measurement search case insensitive.
      Legacy Alerting: Replace simplejson with a struct in webhook
      notification channel.
    * Legend: Updates display name for Last (not null) to just
      Last*.
    * Logs panel: Add option to show common labels.
    * Loki: Add $__range variable.
    * Loki: Add support for 'label_values(log stream selector,
      label)' in templating.
    * Loki: Add support for ad-hoc filtering in dashboard.
    * MySQL Datasource: Add timezone parameter.
    * NodeGraph: Show gradient fields in legend.
    * PanelOptions: Don't mutate panel options/field config object
      when updating.
    * PieChart: Make pie gradient more subtle to match other
      charts.
    * Prometheus: Update PromQL typeahead and highlighting.
    * Prometheus: interpolate variable for step field.
    * Provisioning: Improve validation by validating across all
      dashboard providers.
    * SQL Datasources: Allow multiple string/labels columns with
      time series.
    * Select: Portal select menu to document.body.
    * Team Sync: Add group mapping to support team sync in the
      Generic OAuth provider.
    * Tooltip: Make active series more noticeable.
    * Tracing: Add support to configure trace to logs start and end
      time.
    * Transformations: Skip merge when there is only a single data
      frame.
    * ValueMapping: Added support for mapping text to color,
      boolean values, NaN and Null. Improved UI for value mapping.
    * Visualizations: Dynamically set any config (min, max, unit,
      color, thresholds) from query results.
    * live: Add support to handle origin without a value for the
      port when matching with root_url.
    * Alerting: Handle marshaling Inf values.
    * AzureMonitor: Fix macro resolution for template variables.
    * AzureMonitor: Fix queries with Microsoft.NetApp/../../volumes
      resources.
    * AzureMonitor: Request and concat subsequent resource pages.
    * Bug: Fix parse duration for day.
    * Datasources: Improve error handling for error messages.
    * Explore: Correct the functionality of shift-enter shortcut
      across all uses.
    * Explore: Show all dataFrames in data tab in Inspector.
    * GraphNG: Fix Tooltip mode 'All' for XYChart.
    * Loki: Fix highlight of logs when using filter expressions
      with backticks.
    * Modal: Force modal content to overflow with scroll.
    * Plugins: Ignore symlinked folders when verifying plugin
      signature.
    * Toolkit: Improve error messages when tasks fail.
- Update to version 8.0.7
- Update to version 8.0.6
    * Alerting: Add annotation upon alert state change.
    * Alerting: Allow space in label and annotation names.
    * InfluxDB: Improve legend labels for InfluxDB query results.
    * Alerting: Fix improper alert by changing the handling of
      empty labels.
    * CloudWatch/Logs: Reestablish Cloud Watch alert behavior.
    * Dashboard: Avoid migration breaking on fieldConfig without
      defaults field in folded panel.
    * DashboardList: Fix issue not re-fetching dashboard list after
      variable change.
    * Database: Fix incorrect format of isolation level
      configuration parameter for MySQL.
    * InfluxDB: Correct tag filtering on InfluxDB data.
    * Links: Fix links that caused a full page reload.
    * Live: Fix HTTP error when InfluxDB metrics have an incomplete
      or asymmetrical field set.
    * Postgres/MySQL/MSSQL: Change time field to 'Time' for time
      series queries.
    * Postgres: Fix the handling of a null return value in query
    * Tempo: Show hex strings instead of uints for IDs.
    * TimeSeries: Improve tooltip positioning when tooltip
      overflows.
    * Transformations: Add 'prepare time series' transformer.
- Update to version 8.0.5
    * Cloudwatch Logs: Send error down to client.
    * Folders: Return 409 Conflict status when folder already
      exists.
    * TimeSeries: Do not show series in tooltip if it's hidden in
      the viz.
    * AzureMonitor: Fix issue where resource group name is missing
      on the resource picker button.
    * Chore: Fix AWS auth assuming role with workspace IAM.
    * DashboardQueryRunner: Fixes unrestrained subscriptions being
    * DateFormats: Fix reading correct setting key for
      use_browser_locale.
    * Links: Fix links to other apps outside Grafana when under sub
      path.
    * Snapshots: Fix snapshot absolute time range issue.
    * Table: Fix data link color.
    * Time Series: Fix X-axis time format when tick increment is
      larger than a year.
    * Tooltip Plugin: Prevent tooltip render if field is undefined.
- Update to version 8.0.4
    * Live: Rely on app url for origin check.
    * PieChart: Sort legend descending, update placeholder.
    * TimeSeries panel: Do not reinitialize plot when thresholds
      mode change.
    * Elasticsearch: Allow case sensitive custom options in
      date_histogram interval.
    * Elasticsearch: Restore previous field naming strategy when
      using variables.
    * Explore: Fix import of queries between SQL data sources.
    * InfluxDB: InfluxQL query editor: fix retention policy
      handling.
    * Loki: Send correct time range in template variable queries.
    * TimeSeries: Preserve RegExp series overrides when migrating
      from old graph panel.
- Update to version 8.0.3
    * Alerting: Increase alertmanager_conf column if MySQL.
    * Time series/Bar chart panel: Handle infinite numbers as nulls
      when converting to plot array.
    * TimeSeries: Ensure series overrides that contain color are
      migrated, and migrate the previous fieldConfig when changing
      the panel type.
    * ValueMappings: Improve singlestat value mappings migration.
    * Annotations: Fix annotation line and marker colors.
    * AzureMonitor: Fix KQL template variable queries without
      default workspace.
    * CloudWatch/Logs: Fix missing response data for log queries.
    * LibraryPanels: Fix crash in library panels list when panel
      plugin is not found.
    * LogsPanel: Fix performance drop when moving logs panel in
    * Loki: Parse log levels when ANSI coloring is enabled.
    * MSSQL: Fix issue with hidden queries still being executed.
    * PanelEdit: Display the VisualizationPicker that was not
      displayed if a panel has an unknown panel plugin.
    * Plugins: Fix loading symbolically linked plugins.
    * Prometheus: Fix issue where legend name was replaced with
      name Value in stat and gauge panels.
    * State Timeline: Fix crash when hovering over panel.
- Update to version 8.0.2
    * Datasource: Add support for max_conns_per_host in dataproxy
      settings.
    * Configuration: Fix changing org preferences in FireFox.
    * PieChart: Fix legend dimension limits.
    * Postgres/MySQL/MSSQL: Fix panic in concurrent map writes.
    * Variables: Hide default data source if missing from regex.
- Update to version 8.0.1
    * Alerting/SSE: Fix 'count_non_null' reducer validation.
    * Cloudwatch: Fix duplicated time series.
    * Cloudwatch: Fix missing defaultRegion.
    * Dashboard: Fix Dashboard init failed error on dashboards with
      old singlestat panels in collapsed rows.
    * Datasource: Fix storing timeout option as numeric.
    * Postgres/MySQL/MSSQL: Fix annotation parsing for empty
    * Postgres/MySQL/MSSQL: Numeric/non-string values are now
      returned from query variables.
    * Postgres: Fix an error that was thrown when the annotation
      query did not return any results.
    * StatPanel: Fix an issue with the appearance of the graph when
      switching color mode.
    * Visualizations: Fix an issue in the
      Stat/BarGauge/Gauge/PieChart panels where all values mode
      were showing the same name if they had the same value.
    * Toolkit: Resolve external fonts when Grafana is served from a
      sub path.
- Update to version 8.0.0
    * The following endpoints were deprecated for Grafana v5.0 and
      support for them has now been removed:
      GET /dashboards/db/:slug
      GET /dashboard-solo/db/:slug
      GET /api/dashboard/db/:slug
      DELETE /api/dashboards/db/:slug
    * AzureMonitor: Require default subscription for workspaces()
      template variable query.
    * AzureMonitor: Use resource type display names in the UI.
    * Dashboard: Remove support for loading and deleting dashboard
      by slug.
    * InfluxDB: Deprecate direct browser access in data source.
    * VizLegend: Add a read-only property.
    * AzureMonitor: Fix Azure Resource Graph queries in Azure
      China.
    * Checkbox: Fix vertical layout issue with checkboxes due to
      fixed height.
    * Dashboard: Fix Table view when editing causes the panel data
      to not update.
    * Dashboard: Fix issues where unsaved-changes warning is not
      displayed.
    * Login: Fixes Unauthorized message showing when on login page
      or snapshot page.
    * NodeGraph: Fix sorting markers in grid view.
    * Short URL: Include orgId in generated short URLs.
    * Variables: Support raw values of boolean type.
- Update to version 8.0.0-beta3
    * The default HTTP method for Prometheus data source is now
      POST.
    * API: Support folder UID in dashboards API.
    * Alerting: Add support for configuring avatar URL for the
      Discord notifier.
    * Alerting: Clarify that Threema Gateway Alerts support only
      Basic IDs.
    * Azure: Expose Azure settings to external plugins.
    * AzureMonitor: Deprecate using separate credentials for Azure
      Monitor Logs.
    * AzureMonitor: Display variables in resource picker for Azure
    * AzureMonitor: Hide application insights for data sources not
      using it.
    * AzureMonitor: Support querying subscriptions and resource
      groups in Azure Monitor Logs.
    * AzureMonitor: remove requirement for default subscription.
    * CloudWatch: Add Lambda@Edge Amazon CloudFront metrics.
    * CloudWatch: Add missing AWS AppSync metrics.
    * ConfirmModal: Auto focus delete button.
    * Explore: Add caching for queries that are run from logs
    * Loki: Add formatting for annotations.
    * Loki: Bring back processed bytes as meta information.
    * NodeGraph: Display node graph collapsed by default with trace
      view.
    * Overrides: Include a manual override option to hide something
      from visualization.
    * PieChart: Support row data in pie charts.
    * Prometheus: Update default HTTP method to POST for existing
      data sources.
    * Time series panel: Position tooltip correctly when window is
      scrolled or resized.
    * Admin: Fix infinite loading edit on the profile page.
    * Color: Fix issues with random colors in string and date
    * Dashboard: Fix issue with title or folder change has no
      effect after exiting settings view.
    * DataLinks: Fix an issue __series.name is not working in data
      link.
    * Datasource: Fix dataproxy timeout should always be applied
      for outgoing data source HTTP requests.
    * Elasticsearch: Fix NewClient not passing httpClientProvider
      to client impl.
    * Explore: Fix Browser title not updated on Navigation to
      Explore.
    * GraphNG: Remove fieldName and hideInLegend properties from
      UPlotSeriesBuilder.
    * OAuth: Fix fallback to auto_assign_org_role setting for Azure
      AD OAuth when no role claims exists.
    * PanelChrome: Fix issue with empty panel after adding a non
      data panel and coming back from panel edit.
    * StatPanel: Fix data link tooltip not showing for single
      value.
    * Table: Fix sorting for number fields.
    * Table: Have text underline for datalink, and add support for
      image datalink.
    * Transformations: Prevent FilterByValue transform from
      crashing panel edit.
- Update to version 8.0.0-beta2
    * AppPlugins: Expose react-router to apps.
    * AzureMonitor: Add Azure Resource Graph.
    * AzureMonitor: Managed Identity configuration UI.
    * AzureMonitor: Token provider with support for Managed
      Identities.
    * AzureMonitor: Update Logs workspace() template variable query
      to return resource URIs.
    * BarChart: Value label sizing.
    * CloudMonitoring: Add support for preprocessing.
    * CloudWatch: Add AWS/EFS StorageBytes metric.
    * CloudWatch: Allow use of missing AWS namespaces using custom
    * Datasource: Shared HTTP client provider for core backend data
      sources and any data source using the data source proxy.
    * InfluxDB: InfluxQL: allow empty tag values in the query
      editor.
    * Instrumentation: Instrument incoming HTTP request with
      histograms by default.
    * Library Panels: Add name endpoint &amp; unique name validation to
      AddLibraryPanelModal.
    * Logs panel: Support details view.
    * PieChart: Always show the calculation options dropdown in the
    * PieChart: Remove beta flag.
    * Plugins: Enforce signing for all plugins.
    * Plugins: Remove support for deprecated backend plugin
      protocol version.
    * Tempo/Jaeger: Add better display name to legend.
    * Timeline: Add time range zoom.
    * Timeline: Adds opacity &amp; line width option.
    * Timeline: Value text alignment option.
    * ValueMappings: Add duplicate action, and disable dismiss on
      backdrop click.
    * Zipkin: Add node graph view to trace response.
    * Annotations panel: Remove subpath from dashboard links.
    * Content Security Policy: Allow all image sources by default.
    * Content Security Policy: Relax default template wrt. loading
      of scripts, due to nonces not working.
    * Datasource: Fix tracing propagation for alert execution by
      introducing HTTP client outgoing tracing middleware.
    * InfluxDB: InfluxQL always apply time interval end.
    * Library Panels: Fixes 'error while loading library panels'.
    * NewsPanel: Fixes rendering issue in Safari.
    * PanelChrome: Fix queries being issued again when scrolling in
      and out of view.
    * Plugins: Fix Azure token provider cache panic and auth param
      nil value.
    * Snapshots: Fix key and deleteKey being ignored when creating
      an external snapshot.
    * Table: Fix issue with cell border not showing with colored
      background cells.
    * Table: Makes tooltip scrollable for long JSON values.
    * TimeSeries: Fix for Connected null values threshold toggle
      during panel editing.
    * Variables: Fixes inconsistent selected states on dashboard
    * Variables: Refreshes all panels even if panel is full screen.
    * QueryField: Remove carriage return character from pasted text.
- Update to version 8.0.0-beta1
  + License update:
    * AGPL License: Update license from Apache 2.0 to the GNU
      Affero General Public License (AGPL).
    * Removes the never refresh option for Query variables.
    * Removes the experimental Tags feature for Variables.
  + Deprecations:
    * The InfoBox &amp; FeatureInfoBox are now deprecated please use
      the Alert component instead with severity info.
    * API: Add org users with pagination.
    * API: Return 404 when deleting nonexistent API key.
    * API: Return query results as JSON rather than base64 encoded
      Arrow.
    * Alerting: Allow sending notification tags to Opsgenie as
      extra properties.
    * Alerts: Replaces all uses of InfoBox &amp; FeatureInfoBox with
      Alert.
    * Auth: Add support for JWT Authentication.
    * AzureMonitor: Add support for
      Microsoft.SignalRService/SignalR metrics.
    * AzureMonitor: Azure settings in Grafana server config.
    * AzureMonitor: Migrate Metrics query editor to React.
    * BarChart panel: enable series toggling via legend.
    * BarChart panel: Adds support for Tooltip in BarChartPanel.
    * PieChart panel: Change look of highlighted pie slices.
    * CloudMonitoring: Migrate config editor from angular to react.
    * CloudWatch: Add Amplify Console metrics and dimensions.
    * CloudWatch: Add missing Redshift metrics to CloudWatch data
    * CloudWatch: Add metrics for managed RabbitMQ service.
    * DashboardList: Enable templating on search tag input.
    * Datasource config: correctly remove single custom http
      header.
    * Elasticsearch: Add generic support for template variables.
    * Elasticsearch: Allow omitting field when metric supports
      inline script.
    * Elasticsearch: Allow setting a custom limit for log queries.
    * Elasticsearch: Guess field type from first non-empty value.
    * Elasticsearch: Use application/x-ndjson content type for
      multisearch requests.
    * Elasticsearch: Use semver strings to identify ES version.
    * Explore: Add logs navigation to request more logs.
    * Explore: Map Graphite queries to Loki.
    * Explore: Scroll split panes in Explore independently.
    * Explore: Wrap each panel in separate error boundary.
    * FieldDisplay: Smarter naming of stat values when visualising
      row values (all values) in stat panels.
    * Graphite: Expand metric names for variables.
    * Graphite: Handle unknown Graphite functions without breaking
      the visual editor.
    * Graphite: Show graphite functions descriptions.
    * Graphite: Support request cancellation properly (Uses new
      backendSrv.fetch Observable request API).
    * InfluxDB: Flux: Improve handling of complex
      response-structures.
    * InfluxDB: Support region annotations.
    * Inspector: Download logs for manual processing.
    * Jaeger: Add node graph view for trace.
    * Jaeger: Search traces.
    * Loki: Use data source settings for alerting queries.
    * NodeGraph: Exploration mode.
    * OAuth: Add support for empty scopes.
    * PanelChrome: New logic-less emotion based component with no
      dependency on PanelModel or DashboardModel.
    * PanelEdit: Adds a table view toggle to quickly view data in
      table form.
    * PanelEdit: Highlight matched words when searching options.
    * PanelEdit: UX improvements.
    * Plugins: PanelRenderer and simplified QueryRunner to be used
      from plugins.
    * Plugins: AuthType in route configuration and params
      interpolation.
    * Plugins: Enable plugin runtime install/uninstall
      capabilities.
    * Plugins: Support set body content in plugin routes.
    * Plugins: Introduce marketplace app.
    * Plugins: Moving the DataSourcePicker to grafana/runtime so it
      can be reused in plugins.
    * Prometheus: Add custom query params for alert and exemplars
    * Prometheus: Use fuzzy string matching to autocomplete metric
      names and label.
    * Routing: Replace Angular routing with react-router.
    * Slack: Use chat.postMessage API by default.
    * Tempo: Search for Traces by querying Loki directly from
      Tempo.
    * Tempo: Show graph view of the trace.
    * Themes: Switch theme without reload using global shortcut.
    * TimeSeries panel: Add support for shared cursor.
    * TimeSeries panel: Do not crash the panel if there is no time
      series data in the response.
    * Variables: Do not save repeated panels, rows and scopedVars.
    * Variables: Removes experimental Tags feature.
    * Variables: Removes the never refresh option.
    * Visualizations: Unify tooltip options across visualizations.
    * Visualizations: Refactor and unify option creation between
      new visualizations.
    * Visualizations: Remove singlestat panel.
    * APIKeys: Fixes issue with adding first api key.
    * Alerting: Add checks for non supported units - disable
      defaulting to seconds.
    * Alerting: Fix issue where Slack notifications won't link to
      user IDs.
    * Alerting: Omit empty message in PagerDuty notifier.
    * AzureMonitor: Fix migration error from older versions of App
      Insights queries.
    * CloudWatch: Fix AWS/Connect dimensions.
    * CloudWatch: Fix broken AWS/MediaTailor dimension name.
    * Dashboards: Allow string manipulation as advanced variable
      format option.
    * DataLinks: Includes harmless extended characters like
      Cyrillic characters.
    * Drawer: Fixes title overflowing its container.
    * Explore: Fix issue when some query errors were not shown.
    * Generic OAuth: Prevent adding duplicated users.
    * Graphite: Handle invalid annotations.
    * Graphite: Fix autocomplete when tags are not available.
    * InfluxDB: Fix Cannot read property 'length' of undefined in
      when parsing response.
    * Instrumentation: Enable tracing when Jaeger host and port are
    * Instrumentation: Prefix metrics with grafana.
    * MSSQL: By default let driver choose port.
    * OAuth: Add optional strict parsing of role_attribute_path.
    * Panel: Fixes description markdown with inline code being
      rendered on newlines and full width.
    * PanelChrome: Ignore data updates &amp; errors for non data
      panels.
    * Permissions: Fix inherited folder permissions can prevent new
      permissions being added to a dashboard.
    * Plugins: Remove pre-existing plugin installs when installing
      with grafana-cli.
    * Plugins: Support installing to folders with whitespace and
      fix pluginUrl trailing and leading whitespace failures.
    * Postgres/MySQL/MSSQL: Don't return connection failure details
      to the client.
    * Postgres: Fix ms precision of interval in time group macro
      when TimescaleDB is enabled.
    * Provisioning: Use dashboard checksum field as change
      indicator.
    * SQL: Fix so that all captured errors are returned from sql
      engine.
    * Shortcuts: Fixes panel shortcuts so they always work.
    * Table: Fixes so border is visible for cells with links.
    * Variables: Clear query when data source type changes.
    * Variables: Filters out builtin variables from unknown list.
    * Button: Introduce buttonStyle prop.
    * DataQueryRequest: Remove deprecated props showingGraph and
      showingTabel and exploreMode.
    * grafana/ui: Update React Hook Form to v7.
    * IconButton: Introduce variant for red and blue icon buttons.
    * Plugins: Expose the getTimeZone function to be able to get
      the current selected timeZone.
    * TagsInput: Add className to TagsInput.
    * VizLegend: Move onSeriesColorChanged to PanelContext
      (breaking change).
- Update to version 7.5.13
    * Alerting: Fix NoDataFound for alert rules using AND operator.

mgr-cfg:

- Version 4.3.6-1
  * Corrected source URL in spec file
  * Fix installation problem for SLE15SP4 due missing python-selinux
  * Fix python selinux package name depending on build target (bsc#1193600)
  * Do not build python 2 package for SLE15SP4 and higher
  * Remove unused legacy code

mgr-custom-info:

- Version 4.3.3-1
  * Remove unused legacy code

mgr-daemon:

- Version 4.3.4-1
  * Corrected source URLs in spec file
  * Update translation strings

mgr-osad:

- Version 4.3.6-1
  * Corrected source URL in spec file.
  * Do not build python 2 package for SLE15SP4 and higher
  * Removed spacewalk-selinux dependencies.
  * Updated source url.

mgr-push:

- Version 4.3.4-1
  * Corrected source URLs in spec file

mgr-virtualization:

- Version 4.3.5-1
  * Corrected source URLs in spec file.
  * Do not build python 2 package for SLE15SP4 and higher

prometheus-blackbox_exporter:

- Enhanced to build on Enterprise Linux 8

prometheus-postgres_exporter:

- Updated for RHEL8.

python-hwdata:

- Require python macros for building

rhnlib:

- Version 4.3.4-1
  * Reorganize python files

spacecmd:

- Version 4.3.11-1
  * on full system update call schedulePackageUpdate API (bsc#1197507)
  * parse boolean paramaters correctly (bsc#1197689)
  * Add parameter to set containerized proxy SSH port
  * Add proxy config generation subcommand
  * Option 'org_createfirst' added to perform initial organization and user creation
  * Added gettext build requirement for RHEL.
  * Removed RHEL 5 references.
  * Include group formulas configuration in spacecmd group_backup and
    spacecmd group_restore. This changes backup format to json,
    previously used plain text is still supported for reading (bsc#1190462)
  * Update translation strings
  * Improved event history listing and added new system_eventdetails 
    command to retrieve the details of an event
  * Make schedule_deletearchived to get all actions without display limit
  * Allow passing a date limit for schedule_deletearchived on spacecmd (bsc#1181223)

spacewalk-client-tools:

- Version 4.3.9-1
  * Corrected source URLs in spec file.
  * do not build python 2 package for SLE15
  * Remove unused legacy code
  * Update translation strings

spacewalk-koan:

- Version 4.3.5-1
  * Corrected source URLs in spec file.

spacewalk-oscap:

- Version 4.3.5-1
  * Corrected source URLs in spec file.
  * Do not build python 2 package for SLE15SP4 and higher

spacewalk-remote-utils:

- Version 4.3.3-1
  * Adapt the package for changes in rhnlib

supportutils-plugin-susemanager-client:

- Version 4.3.2-1
  * Add proxy containers config and logs

suseRegisterInfo:

- Version 4.3.3-1
  * Bump version to 4.3.0

supportutils-plugin-salt:

- Add support for Salt Bundle

uyuni-common-libs:

- Version 4.3.4-1
  * implement more decompression algorithms for reposync (bsc#1196704)
  * Reorganize python files
  * Add decompression of zck files to fileutils

		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-20"/>
	<updated date="2022-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181223">SUSE bug 1181223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190462">SUSE bug 1190462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190535">SUSE bug 1190535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193600">SUSE bug 1193600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194873">SUSE bug 1194873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195726">SUSE bug 1195726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195727">SUSE bug 1195727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195728">SUSE bug 1195728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196338">SUSE bug 1196338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196704">SUSE bug 1196704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197507">SUSE bug 1197507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197689">SUSE bug 1197689</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36222/">CVE-2021-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">CVE-2021-36222 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3711/">CVE-2021-3711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3711">CVE-2021-3711 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-39226/">CVE-2021-39226 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39226">CVE-2021-39226 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-41174/">CVE-2021-41174 at SUSE</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41174">CVE-2021-41174 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41244/">CVE-2021-41244 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41244">CVE-2021-41244 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43798/">CVE-2021-43798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43798">CVE-2021-43798 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43813/">CVE-2021-43813 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43813">CVE-2021-43813 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43815/">CVE-2021-43815 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43815">CVE-2021-43815 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21673/">CVE-2022-21673 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21673">CVE-2022-21673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21698">CVE-2022-21698 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21702/">CVE-2022-21702 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21702">CVE-2022-21702 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21703/">CVE-2022-21703 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21703">CVE-2022-21703 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21713/">CVE-2022-21713 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21713">CVE-2022-21713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696541" comment="golang-github-prometheus-node_exporter-1.3.0-1.15.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148650" version="1" class="patch">
	<metadata>
		<title>Security update for fwupdate (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011330.html" source="SUSE-SU"/>
		<description>

This update of fwupdate fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-22"/>
	<updated date="2022-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696152" comment="fwupdate-0.5-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696153" comment="fwupdate-efi-0.5-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696154" comment="libfwup0-0.5-10.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148651" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1070738" ref_url="https://bugzilla.suse.com/1070738" source="BUGZILLA"/>
		<reference ref_id="1198511" ref_url="https://bugzilla.suse.com/1198511" source="BUGZILLA"/>
		<reference ref_id="1199441" ref_url="https://bugzilla.suse.com/1199441" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011339.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2015-20107: avoid command injection in the mailcap module (bsc#1198511).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-23"/>
	<updated date="2022-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070738">SUSE bug 1070738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198511">SUSE bug 1198511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199441">SUSE bug 1199441</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696400" comment="libpython3_4m1_0-3.4.10-25.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696401" comment="python3-3.4.10-25.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696402" comment="python3-base-3.4.10-25.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696403" comment="python3-curses-3.4.10-25.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697260" comment="python3-devel-3.4.10-25.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148652" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1200550" ref_url="https://bugzilla.suse.com/1200550" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2068" ref_url="https://www.suse.com/security/cve/CVE-2022-2068/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011354.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-2068: Fixed more shell code injection issues in c_rehash. (bsc#1200550)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-24"/>
	<updated date="2022-06-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1200550">SUSE bug 1200550</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2068/">CVE-2022-2068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">CVE-2022-2068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696404" comment="libopenssl-devel-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696405" comment="libopenssl1_0_0-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696162" comment="libopenssl1_0_0-32bit-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696406" comment="libopenssl1_0_0-hmac-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696164" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696407" comment="openssl-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696166" comment="openssl-doc-1.0.2j-60.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148653" version="1" class="patch">
	<metadata>
		<title>Security update for oracleasm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011369.html" source="SUSE-SU"/>
		<description>

This update of oracleasm fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-28"/>
	<updated date="2022-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696542" comment="oracleasm-kmp-default-2.0.8_k4.4.180_94.164-3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148654" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1198511" ref_url="https://bugzilla.suse.com/1198511" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011384.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2015-20107: avoid command injection in the mailcap module (bsc#1198511).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-04"/>
	<updated date="2022-07-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198511">SUSE bug 1198511</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696408" comment="libpython2_7-1_0-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696171" comment="libpython2_7-1_0-32bit-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696409" comment="python-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696173" comment="python-32bit-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696410" comment="python-base-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696175" comment="python-base-32bit-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696411" comment="python-curses-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696412" comment="python-demo-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696543" comment="python-devel-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696179" comment="python-doc-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696180" comment="python-doc-pdf-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696413" comment="python-gdbm-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696414" comment="python-idle-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696415" comment="python-tk-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696416" comment="python-xml-2.7.18-28.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148655" version="1" class="patch">
	<metadata>
		<title>Security update for sysstat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1144923" ref_url="https://bugzilla.suse.com/1144923" source="BUGZILLA"/>
		<reference ref_id="1159104" ref_url="https://bugzilla.suse.com/1159104" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19725" ref_url="https://www.suse.com/security/cve/CVE-2019-19725/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0026-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011392.html" source="SUSE-SU"/>
		<description>
This update for sysstat fixes the following issues:

Security issue fixed:                                                                                                                                                               
                                                                                                                                                                                   
- CVE-2019-19725: Fixed double free in check_file_actlst in sa_common.c (bsc#1159104).                                                                                    

Bug fixes:

- Enable log information of starting/stoping services. (bsc#1144923, jsc#SLE-5958)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-04"/>
	<updated date="2022-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144923">SUSE bug 1144923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159104">SUSE bug 1159104</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19725/">CVE-2019-19725 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19725">CVE-2019-19725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522597" comment="sysstat-12.0.2-10.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557523" comment="sysstat-isag-12.0.2-10.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148656" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011404.html" source="SUSE-SU"/>
		<description>

This update of dpdk fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-05"/>
	<updated date="2022-07-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696554" comment="dpdk-16.11.9-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696196" comment="dpdk-kmp-default-16.11.9_k4.4.180_94.164-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696555" comment="dpdk-tools-16.11.9-8.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148657" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1200793" ref_url="https://bugzilla.suse.com/1200793" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-31744" ref_url="https://www.suse.com/security/cve/CVE-2022-31744/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34478" ref_url="https://www.suse.com/security/cve/CVE-2022-34478/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011428.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 91.11.0 ESR (MFSA 2022-25) (bsc#1200793):

- CVE-2022-2200: Undesired attributes could be set as part of prototype pollution (bmo#1771381)
- CVE-2022-31744: CSP bypass enabling stylesheet injection (bmo#1757604)
- CVE-2022-34468: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI (bmo#1768537)
- CVE-2022-34470: Use-after-free in nsSHistory (bmo#1765951)
- CVE-2022-34472: Unavailable PAC file resulted in OCSP requests being blocked (bmo#1770123)
- CVE-2022-34478: Microsoft protocols can be attacked if a user accepts a prompt (bmo#1773717)
- CVE-2022-34479: A popup window could be resized in a way to overlay the address bar with web content (bmo#1745595)
- CVE-2022-34481: Potential integer overflow in ReplaceElementsAt (bmo#1497246)
- CVE-2022-34484: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 (bmo#1763634, bmo#1772651)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-06"/>
	<updated date="2022-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2200">CVE-2022-2200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31744/">CVE-2022-31744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31744">CVE-2022-31744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34468">CVE-2022-34468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34470">CVE-2022-34470 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34472">CVE-2022-34472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34478/">CVE-2022-34478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34478">CVE-2022-34478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34479">CVE-2022-34479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34481">CVE-2022-34481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34484">CVE-2022-34484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700049" comment="MozillaFirefox-91.11.0-112.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700050" comment="MozillaFirefox-devel-91.11.0-112.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700051" comment="MozillaFirefox-translations-common-91.11.0-112.119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148658" version="1" class="patch">
	<metadata>
		<title>Security update for rsyslog (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1199061" ref_url="https://bugzilla.suse.com/1199061" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24903" ref_url="https://www.suse.com/security/cve/CVE-2022-24903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011474.html" source="SUSE-SU"/>
		<description>
This update for rsyslog fixes the following issues:

- CVE-2022-24903: fix potential heap buffer overflow in modules for TCP syslog reception (bsc#1199061)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-07"/>
	<updated date="2022-07-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199061">SUSE bug 1199061</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24903/">CVE-2022-24903 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24903">CVE-2022-24903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696544" comment="rsyslog-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696545" comment="rsyslog-diag-tools-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696546" comment="rsyslog-doc-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696547" comment="rsyslog-module-gssapi-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696548" comment="rsyslog-module-gtls-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696549" comment="rsyslog-module-mysql-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696550" comment="rsyslog-module-pgsql-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696551" comment="rsyslog-module-relp-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696552" comment="rsyslog-module-snmp-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696553" comment="rsyslog-module-udpspoof-8.24.0-3.58.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148659" version="1" class="patch">
	<metadata>
		<title>Security update for pcre (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1199232" ref_url="https://bugzilla.suse.com/1199232" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1586" ref_url="https://www.suse.com/security/cve/CVE-2022-1586/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011480.html" source="SUSE-SU"/>
		<description>
This update for pcre fixes the following issues:
	  
- CVE-2022-1586: Fixed unicode property matching issue. (bsc#1199232)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-08"/>
	<updated date="2022-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199232">SUSE bug 1199232</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1586/">CVE-2022-1586 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">CVE-2022-1586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696418" comment="libpcre1-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696199" comment="libpcre1-32bit-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696419" comment="libpcre16-0-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696556" comment="libpcrecpp0-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696557" comment="libpcreposix0-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696558" comment="pcre-devel-8.45-8.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148660" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1200119" ref_url="https://bugzilla.suse.com/1200119" source="BUGZILLA"/>
		<reference ref_id="1201431" ref_url="https://bugzilla.suse.com/1201431" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29187" ref_url="https://www.suse.com/security/cve/CVE-2022-29187/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011634.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2022-29187: Incomplete fix for CVE-2022-24765: potential command injection via git worktree (bsc#1201431).
- Allow to opt-out from the check added in the security fix for CVE-2022-24765 (bsc#1200119)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-22"/>
	<updated date="2022-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200119">SUSE bug 1200119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201431">SUSE bug 1201431</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29187/">CVE-2022-29187 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29187">CVE-2022-29187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700082" comment="git-2.26.2-27.57.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148661" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1194859" ref_url="https://bugzilla.suse.com/1194859" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44142" ref_url="https://www.suse.com/security/cve/CVE-2021-44142/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010159.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-44142: Fixed out-of-Bound Read/Write on Samba vfs_fruit module. (bsc#1194859)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-01"/>
	<updated date="2022-02-01"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194859">SUSE bug 1194859</bugzilla>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44142/">CVE-2021-44142 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44142">CVE-2021-44142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666331" comment="libdcerpc-binding0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666161" comment="libdcerpc-binding0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666332" comment="libdcerpc0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666163" comment="libdcerpc0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666333" comment="libndr-krb5pac0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666165" comment="libndr-krb5pac0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666334" comment="libndr-nbt0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666167" comment="libndr-nbt0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666335" comment="libndr-standard0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666169" comment="libndr-standard0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666336" comment="libndr0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666171" comment="libndr0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666337" comment="libnetapi0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666173" comment="libnetapi0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666338" comment="libsamba-credentials0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666175" comment="libsamba-credentials0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666339" comment="libsamba-errors0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666177" comment="libsamba-errors0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666340" comment="libsamba-hostconfig0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666179" comment="libsamba-hostconfig0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666341" comment="libsamba-passdb0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666181" comment="libsamba-passdb0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666342" comment="libsamba-util0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666183" comment="libsamba-util0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666343" comment="libsamdb0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666185" comment="libsamdb0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666344" comment="libsmbclient0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666187" comment="libsmbclient0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666345" comment="libsmbconf0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666189" comment="libsmbconf0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666346" comment="libsmbldap0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666191" comment="libsmbldap0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666347" comment="libtevent-util0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666193" comment="libtevent-util0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666348" comment="libwbclient0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666195" comment="libwbclient0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666349" comment="samba-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666350" comment="samba-client-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666198" comment="samba-client-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666199" comment="samba-doc-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666351" comment="samba-libs-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666201" comment="samba-libs-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666352" comment="samba-winbind-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666203" comment="samba-winbind-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148662" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1166457" ref_url="https://bugzilla.suse.com/1166457" source="BUGZILLA"/>
		<reference ref_id="1166458" ref_url="https://bugzilla.suse.com/1166458" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10108" ref_url="https://www.suse.com/security/cve/CVE-2020-10108/" source="CVE"/>
		<reference ref_id="CVE-2020-10109" ref_url="https://www.suse.com/security/cve/CVE-2020-10109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011915.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

- CVE-2020-10108: Fixed an HTTP request smuggling issue (bsc#1166457).
- CVE-2020-10109: Fixed an HTTP request smuggling issue (bsc#1166458).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-16"/>
	<updated date="2022-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166457">SUSE bug 1166457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166458">SUSE bug 1166458</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10108/">CVE-2020-10108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10108">CVE-2020-10108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10109/">CVE-2020-10109 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10109">CVE-2020-10109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703864" comment="python-Twisted-15.2.1-9.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148663" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1194116" ref_url="https://bugzilla.suse.com/1194116" source="BUGZILLA"/>
		<reference ref_id="1195086" ref_url="https://bugzilla.suse.com/1195086" source="BUGZILLA"/>
		<reference ref_id="1195088" ref_url="https://bugzilla.suse.com/1195088" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45452" ref_url="https://www.suse.com/security/cve/CVE-2021-45452/" source="CVE"/>
		<reference ref_id="CVE-2022-22818" ref_url="https://www.suse.com/security/cve/CVE-2022-22818/" source="CVE"/>
		<reference ref_id="CVE-2022-23833" ref_url="https://www.suse.com/security/cve/CVE-2022-23833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010163.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2022-22818: Fixed possible XSS via {% debug %} template tag (bsc#1195086)
- CVE-2022-23833: Fixed denial-of-service possibility in file uploads. (bsc#1195088)

A regression in the fix for CVE-2021-45452 was fixed (bsc#1194116)

		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-01"/>
	<updated date="2022-02-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194116">SUSE bug 1194116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195086">SUSE bug 1195086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195088">SUSE bug 1195088</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-45452/">CVE-2021-45452 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45452">CVE-2021-45452 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22818/">CVE-2022-22818 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22818">CVE-2022-22818 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23833/">CVE-2022-23833 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23833">CVE-2022-23833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666751" comment="python-Django-1.11.29-3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666752" comment="venv-openstack-aodh-x86_64-5.1.1~dev7-12.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666753" comment="venv-openstack-barbican-x86_64-5.0.2~dev3-12.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666754" comment="venv-openstack-ceilometer-x86_64-9.0.8~dev7-12.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666755" comment="venv-openstack-cinder-x86_64-11.2.3~dev29-14.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666756" comment="venv-openstack-designate-x86_64-5.0.3~dev7-12.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666757" comment="venv-openstack-freezer-x86_64-5.0.0.0~xrc2~dev2-10.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666758" comment="venv-openstack-glance-x86_64-15.0.3~dev3-12.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666759" comment="venv-openstack-heat-x86_64-9.0.8~dev22-12.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666760" comment="venv-openstack-horizon-x86_64-12.0.5~dev6-14.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666761" comment="venv-openstack-ironic-x86_64-9.1.8~dev8-12.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666762" comment="venv-openstack-keystone-x86_64-12.0.4~dev11-11.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666763" comment="venv-openstack-magnum-x86_64-5.0.2_5.0.2_5.0.2~dev31-11.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666764" comment="venv-openstack-manila-x86_64-5.1.1~dev5-12.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666765" comment="venv-openstack-monasca-ceilometer-x86_64-1.5.1_1.5.1_1.5.1~dev3-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666766" comment="venv-openstack-monasca-x86_64-2.2.2~dev1-11.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666767" comment="venv-openstack-murano-x86_64-4.0.2~dev2-12.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666768" comment="venv-openstack-neutron-x86_64-11.0.9~dev69-13.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666769" comment="venv-openstack-nova-x86_64-16.1.9~dev92-11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666770" comment="venv-openstack-octavia-x86_64-1.0.6~dev3-12.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666771" comment="venv-openstack-sahara-x86_64-7.0.5~dev4-11.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666772" comment="venv-openstack-swift-x86_64-2.15.2_2.15.2_2.15.2~dev32-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666773" comment="venv-openstack-trove-x86_64-8.0.2~dev2-11.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148664" version="1" class="patch">
	<metadata>
		<title>Security update for python-Babel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1185768" ref_url="https://bugzilla.suse.com/1185768" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42771" ref_url="https://www.suse.com/security/cve/CVE-2021-42771/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009967.html" source="SUSE-SU"/>
		<description>
This update for python-Babel fixes the following issues:


- CVE-2021-42771: Fixed relative path traversal leading to loading arbitrary
  locale files on disk and executing arbitrary code (bsc#1185768).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185768">SUSE bug 1185768</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42771/">CVE-2021-42771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42771">CVE-2021-42771 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660159" comment="python-Babel-2.3.4-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148665" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1100146" ref_url="https://bugzilla.suse.com/1100146" source="BUGZILLA"/>
		<reference ref_id="1145864" ref_url="https://bugzilla.suse.com/1145864" source="BUGZILLA"/>
		<reference ref_id="1152968" ref_url="https://bugzilla.suse.com/1152968" source="BUGZILLA"/>
		<reference ref_id="1174961" ref_url="https://bugzilla.suse.com/1174961" source="BUGZILLA"/>
		<reference ref_id="1178021" ref_url="https://bugzilla.suse.com/1178021" source="BUGZILLA"/>
		<reference ref_id="1178351" ref_url="https://bugzilla.suse.com/1178351" source="BUGZILLA"/>
		<reference ref_id="1179009" ref_url="https://bugzilla.suse.com/1179009" source="BUGZILLA"/>
		<reference ref_id="1179699" ref_url="https://bugzilla.suse.com/1179699" source="BUGZILLA"/>
		<reference ref_id="1184839" ref_url="https://bugzilla.suse.com/1184839" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15862" ref_url="https://www.suse.com/security/cve/CVE-2020-15862/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009966.html" source="SUSE-SU"/>
		<description>
This update for net-snmp fixes the following issues:

- CVE-2020-15862: Make extended MIB read-only (bsc#1174961)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1100146">SUSE bug 1100146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145864">SUSE bug 1145864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152968">SUSE bug 1152968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174961">SUSE bug 1174961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178021">SUSE bug 1178021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178351">SUSE bug 1178351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179009">SUSE bug 1179009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179699">SUSE bug 1179699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184839">SUSE bug 1184839</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15862/">CVE-2020-15862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15862">CVE-2020-15862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661606" comment="libsnmp30-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661599" comment="libsnmp30-32bit-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661607" comment="net-snmp-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661608" comment="perl-SNMP-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661609" comment="snmp-mibs-5.7.3-6.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148666" version="1" class="patch">
	<metadata>
		<title>Security update for keepalived (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1193115" ref_url="https://bugzilla.suse.com/1193115" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44225" ref_url="https://www.suse.com/security/cve/CVE-2021-44225/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012202.html" source="SUSE-SU"/>
		<description>
This update for keepalived fixes the following issues:

- CVE-2021-44225: Fix a potential privilege escalation due to
  insufficient control in the D-Bus policy (bsc#1193115).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-09"/>
	<updated date="2022-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193115">SUSE bug 1193115</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-44225/">CVE-2021-44225 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44225">CVE-2021-44225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707933" comment="keepalived-2.0.19-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148667" version="1" class="patch">
	<metadata>
		<title>Security update for python-rsa (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1172389" ref_url="https://bugzilla.suse.com/1172389" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13757" ref_url="https://www.suse.com/security/cve/CVE-2020-13757/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012269.html" source="SUSE-SU"/>
		<description>
This update for python-rsa fixes the following issues:

- CVE-2020-13757: Fixed an issue where leading null bytes in a
  ciphertext would be ignored during decryption, leading to a
  potential information leak (bsc#1172389).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-16"/>
	<updated date="2022-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172389">SUSE bug 1172389</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13757/">CVE-2020-13757 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13757">CVE-2020-13757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707934" comment="python-rsa-3.4.2-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148668" version="1" class="patch">
	<metadata>
		<title>Security update for ardana-ansible, ardana-cobbler, grafana, openstack-heat-templates, openstack-murano, python-Django, rabbitmq-server, rubygem-puma (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1157665" ref_url="https://bugzilla.suse.com/1157665" source="BUGZILLA"/>
		<reference ref_id="1191454" ref_url="https://bugzilla.suse.com/1191454" source="BUGZILLA"/>
		<reference ref_id="1193597" ref_url="https://bugzilla.suse.com/1193597" source="BUGZILLA"/>
		<reference ref_id="1197818" ref_url="https://bugzilla.suse.com/1197818" source="BUGZILLA"/>
		<reference ref_id="1198398" ref_url="https://bugzilla.suse.com/1198398" source="BUGZILLA"/>
		<reference ref_id="1201186" ref_url="https://bugzilla.suse.com/1201186" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11287" ref_url="https://www.suse.com/security/cve/CVE-2019-11287/" source="CVE"/>
		<reference ref_id="CVE-2020-1734" ref_url="https://www.suse.com/security/cve/CVE-2020-1734/" source="CVE"/>
		<reference ref_id="CVE-2021-39226" ref_url="https://www.suse.com/security/cve/CVE-2021-39226/" source="CVE"/>
		<reference ref_id="CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716/" source="CVE"/>
		<reference ref_id="CVE-2022-24790" ref_url="https://www.suse.com/security/cve/CVE-2022-24790/" source="CVE"/>
		<reference ref_id="CVE-2022-28346" ref_url="https://www.suse.com/security/cve/CVE-2022-28346/" source="CVE"/>
		<reference ref_id="CVE-2022-34265" ref_url="https://www.suse.com/security/cve/CVE-2022-34265/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012332.html" source="SUSE-SU"/>
		<description>
This update for ardana-ansible, ardana-cobbler, grafana, openstack-heat-templates, openstack-murano, python-Django, rabbitmq-server, rubygem-puma fixes the following issues:

Security updates included on this update:

ardana-ansible, ardana-cobbler, grafana, openstack-heat-templates, openstack-murano, rabbitmq-server:
- CVE-2020-1734: Fixed vulnerability where shell was enabled by default in a pipe lookup plugin subprocess. (SOC-11662, bnc#1164139)
- CVE-2021-44716: Fixed uncontrolled memory consumption in go's net/http. (bsc#1193597)
- CVE-2019-11287: Fixed DoS via 'X-Reason' HTTP Header in malicious Erlang format string. (bsc#1157665)

grafana:
- CVE-2021-39226: Fixed snapshot authentication bypass (bsc#1191454).
- CVE-2021-44716: Fixed uncontrolled memory consumption in go's net/http (bsc#1193597).

python-Django:
- CVE-2022-28346: Fixed vulnerability that could lead to SQL injection in QuerySet.annotate(),aggregate() and extra(). (bsc#1198398)
- CVE-2022-34265: Fixed vulnerability that could lead to SQL injection via Trunc(kind) and Extract(lookup_name) arguments. (bsc#1201186)

rubygem puma:
- CVE-2022-24790: Fixed HTTP request smuggling vulnerability. (bsc#1197818)

Additional information about the this update:

Changes in ardana-ansible:
- Update to version 8.0+git.1660773729.3789a6d:
  * Mitigate CVE-2020-1734 (SOC-11662)

Changes in ardana-cobbler:
- Update to version 8.0+git.1660773402.d845a45:
  * Mitigate CVE-2020-1734 (SOC-11662)

Changes in grafana:
- Add CVE-2021-39226 patch (bsc#1191454, CVE-2021-39226)
  * snapshot authentication bypass

- Bump Go to 1.16 (bsc#1193597, CVE-2021-44716)
  * Fix Go net/http: limit growth of header canonicalization cache.

Changes in openstack-heat-templates:
- Update to version 0.0.0+git.1654529662.75fa04a:
  * doc: Comment out language option

Changes in openstack-murano:
- Update to version murano-4.0.2.dev3:
  * [stable-only] Remove periodic-stable-jobs template

Changes in openstack-murano:
- Update to version murano-4.0.2.dev3:
  * [stable-only] Remove periodic-stable-jobs template

Changes in rabbitmq-server:
- add explanation-format patch to fix CVE-2019-11287 (bsc#1157665)

Changes in python-Django:
- Rename Django-1.11.29.tar.gz.asc to Django-1.11.29.tar.gz.checksums.txt
  to avoid source_validator incorrectly trying to use it as a detached
  signature file for the sources tarball.
- Remove unnecessary project.diff file.

- Add CVE-2022-28346 patch (bsc#1198398, CVE-2022-28346)
    * Potential SQL injection in QuerySet.annotate(),aggregate() and extra()
- Add CVE-2022-34265 patch (bsc#1201186, CVE-2022-34265)
    * SQL injection via Trunc(kind) and Extract(lookup_name) arguments

Changes in rubygem-puma:
- Add CVE-2022-24790: Fixed HTTP request smuggling vulnerability (bsc#1197818).

  		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-22"/>
	<updated date="2022-09-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1157665">SUSE bug 1157665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191454">SUSE bug 1191454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193597">SUSE bug 1193597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197818">SUSE bug 1197818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198398">SUSE bug 1198398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201186">SUSE bug 1201186</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11287/">CVE-2019-11287 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11287">CVE-2019-11287 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1734/">CVE-2020-1734 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1734">CVE-2020-1734 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-39226/">CVE-2021-39226 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39226">CVE-2021-39226 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44716">CVE-2021-44716 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-24790/">CVE-2022-24790 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24790">CVE-2022-24790 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28346/">CVE-2022-28346 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28346">CVE-2022-28346 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34265/">CVE-2022-34265 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34265">CVE-2022-34265 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009713935" comment="ardana-ansible-8.0+git.1660773729.3789a6d-3.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713936" comment="ardana-cobbler-8.0+git.1660773402.d845a45-3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713937" comment="grafana-6.7.4-4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713938" comment="openstack-heat-templates-0.0.0+git.1654529662.75fa04a-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713939" comment="openstack-murano-4.0.2~dev3-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713940" comment="openstack-murano-api-4.0.2~dev3-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713941" comment="openstack-murano-doc-4.0.2~dev3-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713942" comment="openstack-murano-engine-4.0.2~dev3-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713943" comment="python-Django-1.11.29-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713944" comment="python-murano-4.0.2~dev3-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713945" comment="rabbitmq-server-3.6.16-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713946" comment="rabbitmq-server-plugins-3.6.16-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713947" comment="venv-openstack-heat-x86_64-9.0.8~dev22-12.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713948" comment="venv-openstack-horizon-x86_64-12.0.5~dev6-14.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713949" comment="venv-openstack-murano-x86_64-4.0.2~dev3-12.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148669" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1194006" ref_url="https://bugzilla.suse.com/1194006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009971.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-4156: Fixed heap buffer overflow in flac_buffer_copy that 
could potentially lead to heap exploitation (bsc#1194006).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4156">CVE-2021-4156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662498" comment="libsndfile1-1.0.25-36.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662485" comment="libsndfile1-32bit-1.0.25-36.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148670" version="1" class="patch">
	<metadata>
		<title>Security update for elasticsearch, elasticsearch-kit, kafka, kafka-kit, logstash, openstack-monasca-agent, openstack-monasca-log-metrics, openstack-monasca-log-persister, openstack-monasca-log-transformer, openstack-monasca-persister-java, openstack-monasca-persister-java-kit, openstack-monasca-thresh, openstack-monasca-thresh-kit, spark, spark-kit, venv-openstack-monasca, zookeeper, zookeeper-kit (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010196.html" source="SUSE-SU"/>
		<description>
This update for elasticsearch, elasticsearch-kit, kafka, kafka-kit, logstash, openstack-monasca-agent, openstack-monasca-log-metrics, openstack-monasca-log-persister, openstack-monasca-log-transformer, openstack-monasca-persister-java, openstack-monasca-persister-java-kit, openstack-monasca-thresh, openstack-monasca-thresh-kit, spark, spark-kit, venv-openstack-monasca, zookeeper, zookeeper-kit fixes the following issues:

- CVE-2021-4104: Fixed remote code execution through JMS API via the ldap JNDI parser (bsc#1193662).
- CVE-2022-23302: Fixed remote code execution in Log4j 1.x when application is configured to use JMSSink (bsc#1194842).
- CVE-2022-23305: Fixed SQL injection in Log4j 1.x when application is configured to use JDBCAppender (bsc#1194843).
- CVE-2022-23307: Fixed deserialization flaw in the Chainsaw component of Log4j 1 that could lead to malicious code execution (bsc#1194844).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-09"/>
	<updated date="2022-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">CVE-2021-4104 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23302">CVE-2022-23302 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23305">CVE-2022-23305 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23307">CVE-2022-23307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666978" comment="elasticsearch-2.4.2-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666979" comment="kafka-0.10.2.2-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664953" comment="logstash-2.4.1-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664954" comment="openstack-monasca-agent-2.2.6~dev4-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666980" comment="openstack-monasca-log-metrics-0.0.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666981" comment="openstack-monasca-log-persister-0.0.1-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666982" comment="openstack-monasca-log-transformer-0.0.1-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666983" comment="openstack-monasca-persister-java-1.7.1~a0~dev2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666984" comment="openstack-monasca-thresh-2.1.1-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664960" comment="python-monasca-agent-2.2.6~dev4-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666985" comment="spark-1.6.3-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666986" comment="storm-1.2.3-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666987" comment="storm-nimbus-1.2.3-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666988" comment="storm-supervisor-1.2.3-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666989" comment="venv-openstack-aodh-x86_64-5.1.1~dev7-12.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666990" comment="venv-openstack-barbican-x86_64-5.0.2~dev3-12.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666991" comment="venv-openstack-ceilometer-x86_64-9.0.8~dev7-12.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666992" comment="venv-openstack-cinder-x86_64-11.2.3~dev29-14.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666993" comment="venv-openstack-designate-x86_64-5.0.3~dev7-12.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666994" comment="venv-openstack-freezer-x86_64-5.0.0.0~xrc2~dev2-10.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666995" comment="venv-openstack-glance-x86_64-15.0.3~dev3-12.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666996" comment="venv-openstack-heat-x86_64-9.0.8~dev22-12.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666997" comment="venv-openstack-horizon-x86_64-12.0.5~dev6-14.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666998" comment="venv-openstack-ironic-x86_64-9.1.8~dev8-12.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666999" comment="venv-openstack-keystone-x86_64-12.0.4~dev11-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667000" comment="venv-openstack-magnum-x86_64-5.0.2_5.0.2_5.0.2~dev31-11.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667001" comment="venv-openstack-manila-x86_64-5.1.1~dev5-12.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667002" comment="venv-openstack-monasca-ceilometer-x86_64-1.5.1_1.5.1_1.5.1~dev3-8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667003" comment="venv-openstack-monasca-x86_64-2.2.2~dev1-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667004" comment="venv-openstack-murano-x86_64-4.0.2~dev2-12.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667005" comment="venv-openstack-neutron-x86_64-11.0.9~dev69-13.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667006" comment="venv-openstack-nova-x86_64-16.1.9~dev92-11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667007" comment="venv-openstack-octavia-x86_64-1.0.6~dev3-12.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667008" comment="venv-openstack-sahara-x86_64-7.0.5~dev4-11.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667009" comment="venv-openstack-swift-x86_64-2.15.2_2.15.2_2.15.2~dev32-11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667010" comment="venv-openstack-trove-x86_64-8.0.2~dev2-11.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667011" comment="zookeeper-server-3.4.10-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148671" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010197.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-09"/>
	<updated date="2022-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20698">CVE-2022-20698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664693" comment="clamav-0.103.5-33.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148672" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1194581" ref_url="https://bugzilla.suse.com/1194581" source="BUGZILLA"/>
		<reference ref_id="1194588" ref_url="https://bugzilla.suse.com/1194588" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23034" ref_url="https://www.suse.com/security/cve/CVE-2022-23034/" source="CVE"/>
		<reference ref_id="CVE-2022-23035" ref_url="https://www.suse.com/security/cve/CVE-2022-23035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010198.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-23034: Fixed possible DoS by a PV guest Xen while unmapping a grant. (XSA-394) (bsc#1194581)
- CVE-2022-23035: Fixed insufficient cleanup of passed-through device IRQs. (XSA-395) (bsc#1194588)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-09"/>
	<updated date="2022-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194581">SUSE bug 1194581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194588">SUSE bug 1194588</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23034/">CVE-2022-23034 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23034">CVE-2022-23034 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23035/">CVE-2022-23035 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23035">CVE-2022-23035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666154" comment="xen-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666155" comment="xen-doc-html-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666156" comment="xen-libs-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666157" comment="xen-libs-32bit-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666158" comment="xen-tools-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666159" comment="xen-tools-domU-4.9.4_26-3.100.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148673" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1183696" ref_url="https://bugzilla.suse.com/1183696" source="BUGZILLA"/>
		<reference ref_id="1186207" ref_url="https://bugzilla.suse.com/1186207" source="BUGZILLA"/>
		<reference ref_id="1192032" ref_url="https://bugzilla.suse.com/1192032" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192847" ref_url="https://bugzilla.suse.com/1192847" source="BUGZILLA"/>
		<reference ref_id="1192877" ref_url="https://bugzilla.suse.com/1192877" source="BUGZILLA"/>
		<reference ref_id="1192946" ref_url="https://bugzilla.suse.com/1192946" source="BUGZILLA"/>
		<reference ref_id="1193157" ref_url="https://bugzilla.suse.com/1193157" source="BUGZILLA"/>
		<reference ref_id="1193440" ref_url="https://bugzilla.suse.com/1193440" source="BUGZILLA"/>
		<reference ref_id="1193442" ref_url="https://bugzilla.suse.com/1193442" source="BUGZILLA"/>
		<reference ref_id="1193507" ref_url="https://bugzilla.suse.com/1193507" source="BUGZILLA"/>
		<reference ref_id="1193575" ref_url="https://bugzilla.suse.com/1193575" source="BUGZILLA"/>
		<reference ref_id="1193669" ref_url="https://bugzilla.suse.com/1193669" source="BUGZILLA"/>
		<reference ref_id="1193727" ref_url="https://bugzilla.suse.com/1193727" source="BUGZILLA"/>
		<reference ref_id="1193861" ref_url="https://bugzilla.suse.com/1193861" source="BUGZILLA"/>
		<reference ref_id="1193864" ref_url="https://bugzilla.suse.com/1193864" source="BUGZILLA"/>
		<reference ref_id="1193867" ref_url="https://bugzilla.suse.com/1193867" source="BUGZILLA"/>
		<reference ref_id="1194001" ref_url="https://bugzilla.suse.com/1194001" source="BUGZILLA"/>
		<reference ref_id="1194087" ref_url="https://bugzilla.suse.com/1194087" source="BUGZILLA"/>
		<reference ref_id="1194094" ref_url="https://bugzilla.suse.com/1194094" source="BUGZILLA"/>
		<reference ref_id="1194272" ref_url="https://bugzilla.suse.com/1194272" source="BUGZILLA"/>
		<reference ref_id="1194302" ref_url="https://bugzilla.suse.com/1194302" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1194529" ref_url="https://bugzilla.suse.com/1194529" source="BUGZILLA"/>
		<reference ref_id="1194880" ref_url="https://bugzilla.suse.com/1194880" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25020" ref_url="https://www.suse.com/security/cve/CVE-2018-25020/" source="CVE"/>
		<reference ref_id="CVE-2019-0136" ref_url="https://www.suse.com/security/cve/CVE-2019-0136/" source="CVE"/>
		<reference ref_id="CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519/" source="CVE"/>
		<reference ref_id="CVE-2021-0935" ref_url="https://www.suse.com/security/cve/CVE-2021-0935/" source="CVE"/>
		<reference ref_id="CVE-2021-28711" ref_url="https://www.suse.com/security/cve/CVE-2021-28711/" source="CVE"/>
		<reference ref_id="CVE-2021-28712" ref_url="https://www.suse.com/security/cve/CVE-2021-28712/" source="CVE"/>
		<reference ref_id="CVE-2021-28713" ref_url="https://www.suse.com/security/cve/CVE-2021-28713/" source="CVE"/>
		<reference ref_id="CVE-2021-28715" ref_url="https://www.suse.com/security/cve/CVE-2021-28715/" source="CVE"/>
		<reference ref_id="CVE-2021-33098" ref_url="https://www.suse.com/security/cve/CVE-2021-33098/" source="CVE"/>
		<reference ref_id="CVE-2021-3564" ref_url="https://www.suse.com/security/cve/CVE-2021-3564/" source="CVE"/>
		<reference ref_id="CVE-2021-39648" ref_url="https://www.suse.com/security/cve/CVE-2021-39648/" source="CVE"/>
		<reference ref_id="CVE-2021-39657" ref_url="https://www.suse.com/security/cve/CVE-2021-39657/" source="CVE"/>
		<reference ref_id="CVE-2021-4002" ref_url="https://www.suse.com/security/cve/CVE-2021-4002/" source="CVE"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4149" ref_url="https://www.suse.com/security/cve/CVE-2021-4149/" source="CVE"/>
		<reference ref_id="CVE-2021-4155" ref_url="https://www.suse.com/security/cve/CVE-2021-4155/" source="CVE"/>
		<reference ref_id="CVE-2021-4197" ref_url="https://www.suse.com/security/cve/CVE-2021-4197/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2021-45485" ref_url="https://www.suse.com/security/cve/CVE-2021-45485/" source="CVE"/>
		<reference ref_id="CVE-2021-45486" ref_url="https://www.suse.com/security/cve/CVE-2021-45486/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 LTSS kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2018-25020: Fixed an overflow in the BPF subsystem due to a mishandling of a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions. This affects kernel/bpf/core.c and net/core/filter.c (bnc#1193575).
- CVE-2019-0136: Fixed insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver that may have allowed an unauthenticated user to potentially enable denial of service via adjacent access (bnc#1193157).
- CVE-2020-35519: Fixed out-of-bounds memory access in x25_bind in net/x25/af_x25.c. A bounds check failure allowed a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information (bnc#1183696).
- CVE-2021-0935: Fixed possible out of bounds write in ip6_xmit of ip6_output.c due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192032).
- CVE-2021-28711: Fixed issue with xen/blkfront to harden blkfront against event channel storms (XSA-391) (bsc#1193440).
- CVE-2021-28712: Fixed issue with xen/netfront to harden netfront against event channel storms (XSA-391) (bsc#1193440).
- CVE-2021-28713: Fixed issue with xen/console to harden hvc_xen against event channel storms (XSA-391) (bsc#1193440).
- CVE-2021-28715: Fixed issue with xen/netback to do not queue unlimited number of packages (XSA-392) (bsc#1193442).
- CVE-2021-33098: Fixed improper input validation in the Intel(R) Ethernet ixgbe driver that may have allowed an authenticated user to potentially cause denial of service via local access (bnc#1192877).
- CVE-2021-3564: Fixed double-free memory corruption in the Linux kernel HCI device initialization subsystem that could have been used by attaching malicious HCI TTY Bluetooth devices. A local user could use this flaw to crash the system (bnc#1186207).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-4002: Fixed incorrect TLBs flush in hugetlbfs after huge_pmd_unshare (bsc#1192946).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1193727).
- CVE-2021-4149: Fixed btrfs unlock newly allocated extent buffer after error (bsc#1194001).
- CVE-2021-4155: Fixed XFS map issue when unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate (bsc#1194272).
- CVE-2021-4197: Use cgroup open-time credentials for process migraton perm checks (bsc#1194302).
- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194529).
- CVE-2021-43976: Fixed insufficient access control in drivers/net/wireless/marvell/mwifiex/usb.c that allowed an attacker who connect a crafted USB device to cause denial of service (bnc#1192847).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2021-45485: Fixed information leak in the IPv6 implementation in net/ipv6/output_core.c (bnc#1194094).
- CVE-2021-45486: Fixed information leak inside the IPv4 implementation caused by very small hash table (bnc#1194087).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).


The following non-security bugs were fixed:

- fget: clarify and improve __fget_files() implementation (bsc#1193727).
- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (bsc#1193507).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193507).
- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- memstick: rtsx_usb_ms: fix UAF
- moxart: fix potential use-after-free on remove path (bsc1194516).
- net/x25: fix a race in x25_bind() (networking-stable-19_03_15).
- net: mana: Add RX fencing (bsc#1193507).
- net: mana: Allow setting the number of queues while the NIC is down (bsc#1193507).
- net: mana: Fix spelling mistake 'calledd' -&gt; 'called' (bsc#1193507).
- net: mana: Fix the netdev_err()'s vPort argument in mana_init_port() (bsc#1193507).
- net: mana: Improve the HWC error handling (bsc#1193507).
- net: mana: Support hibernation and kexec (bsc#1193507).
- net: mana: Use kcalloc() instead of kzalloc() (bsc#1193507).
- recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267).
- recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc#1192267).
- ring-buffer: Protect ring_buffer_reset() from reentrancy (bsc#1179960).
- tty: hvc: replace BUG_ON() with negative return value (git-fixes).
- xen-netfront: do not assume sk_buff_head list is empty in error handling (git-fixes).
- xen-netfront: do not use ~0U as error return value for xennet_fill_frags() (git-fixes).
- xen/blkfront: do not take local copy of a request from the ring page (git-fixes).
- xen/blkfront: do not trust the backend response data blindly (git-fixes).
- xen/blkfront: read response from backend only once (git-fixes).
- xen/netfront: disentangle tx_skb_freelist (git-fixes).
- xen/netfront: do not bug in case of too many frags (bnc#1012382).
- xen/netfront: do not cache skb_shinfo() (bnc#1012382).
- xen/netfront: do not read data from request on the ring page (git-fixes).
- xen/netfront: do not trust the backend response data blindly (git-fixes).
- xen/netfront: read response from backend only once (git-fixes).
- xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-10"/>
	<updated date="2022-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183696">SUSE bug 1183696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186207">SUSE bug 1186207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192032">SUSE bug 1192032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192847">SUSE bug 1192847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192877">SUSE bug 1192877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192946">SUSE bug 1192946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193157">SUSE bug 1193157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193440">SUSE bug 1193440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193442">SUSE bug 1193442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193507">SUSE bug 1193507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193575">SUSE bug 1193575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193669">SUSE bug 1193669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193727">SUSE bug 1193727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193861">SUSE bug 1193861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193864">SUSE bug 1193864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194001">SUSE bug 1194001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194087">SUSE bug 1194087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194094">SUSE bug 1194094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194272">SUSE bug 1194272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194302">SUSE bug 1194302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194529">SUSE bug 1194529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194880">SUSE bug 1194880</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25020/">CVE-2018-25020 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25020">CVE-2018-25020 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0136/">CVE-2019-0136 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0136">CVE-2019-0136 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35519">CVE-2020-35519 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0935/">CVE-2021-0935 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0935">CVE-2021-0935 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28711/">CVE-2021-28711 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28711">CVE-2021-28711 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28712/">CVE-2021-28712 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28712">CVE-2021-28712 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28713/">CVE-2021-28713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28713">CVE-2021-28713 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28715/">CVE-2021-28715 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28715">CVE-2021-28715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33098/">CVE-2021-33098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33098">CVE-2021-33098 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3564/">CVE-2021-3564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3564">CVE-2021-3564 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39648/">CVE-2021-39648 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39648">CVE-2021-39648 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39657/">CVE-2021-39657 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39657">CVE-2021-39657 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4002/">CVE-2021-4002 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4002">CVE-2021-4002 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">CVE-2021-4083 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4149/">CVE-2021-4149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4149">CVE-2021-4149 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4155/">CVE-2021-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4155">CVE-2021-4155 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4197/">CVE-2021-4197 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4197">CVE-2021-4197 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4202">CVE-2021-4202 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43976">CVE-2021-43976 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45095">CVE-2021-45095 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45485/">CVE-2021-45485 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45485">CVE-2021-45485 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45486/">CVE-2021-45486 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45486">CVE-2021-45486 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666922" comment="kernel-default-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666923" comment="kernel-default-base-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666924" comment="kernel-default-devel-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667641" comment="kernel-default-kgraft-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666898" comment="kernel-devel-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666899" comment="kernel-macros-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666900" comment="kernel-source-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666925" comment="kernel-syms-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667643" comment="kgraft-patch-4_4_180-94_153-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148674" version="1" class="patch">
	<metadata>
		<title>Security update for python-waitress (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1197255" ref_url="https://bugzilla.suse.com/1197255" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24761" ref_url="https://www.suse.com/security/cve/CVE-2022-24761/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012565.html" source="SUSE-SU"/>
		<description>
This update for python-waitress fixes the following issues:

- CVE-2022-24761: Fixed a bug to avoid inconsistent interpretation of HTTP requests leading to request smuggling. (bsc#1197255)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-18"/>
	<updated date="2022-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197255">SUSE bug 1197255</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-24761/">CVE-2022-24761 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24761">CVE-2022-24761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716729" comment="python-waitress-1.4.3-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148675" version="1" class="patch">
	<metadata>
		<title>Security update for python-Mako (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1203246" ref_url="https://bugzilla.suse.com/1203246" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40023" ref_url="https://www.suse.com/security/cve/CVE-2022-40023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012638.html" source="SUSE-SU"/>
		<description>
This update for python-Mako fixes the following issues:

  - CVE-2022-40023: Fixed regular expression Denial of Service when using the Lexer class to parse (bsc#1203246).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-24"/>
	<updated date="2022-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203246">SUSE bug 1203246</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40023/">CVE-2022-40023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40023">CVE-2022-40023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717342" comment="python-Mako-1.0.7-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148676" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_wsgi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1201634" ref_url="https://bugzilla.suse.com/1201634" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2255" ref_url="https://www.suse.com/security/cve/CVE-2022-2255/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012943.html" source="SUSE-SU"/>
		<description>
This update for apache2-mod_wsgi fixes the following issues:

- CVE-2022-2255: Hardened the trusted proxy header filter to avoid bypass. (bsc#1201634)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-16"/>
	<updated date="2022-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201634">SUSE bug 1201634</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2255/">CVE-2022-2255 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2255">CVE-2022-2255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717341" comment="apache2-mod_wsgi-4.4.13-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148677" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1204781" ref_url="https://bugzilla.suse.com/1204781" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12387" ref_url="https://www.suse.com/security/cve/CVE-2019-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-10108" ref_url="https://www.suse.com/security/cve/CVE-2020-10108/" source="CVE"/>
		<reference ref_id="CVE-2022-21712" ref_url="https://www.suse.com/security/cve/CVE-2022-21712/" source="CVE"/>
		<reference ref_id="CVE-2022-39348" ref_url="https://www.suse.com/security/cve/CVE-2022-39348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026310.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

- CVE-2022-39348: Fixed NameVirtualHost Host header injection (bsc#1204781).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-18"/>
	<updated date="2022-11-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204781">SUSE bug 1204781</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12387/">CVE-2019-12387 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12387">CVE-2019-12387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10108/">CVE-2020-10108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10108">CVE-2020-10108 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21712/">CVE-2022-21712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21712">CVE-2022-21712 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39348/">CVE-2022-39348 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39348">CVE-2022-39348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723313" comment="python-Twisted-15.2.1-9.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148678" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1192876" ref_url="https://bugzilla.suse.com/1192876" source="BUGZILLA"/>
		<reference ref_id="1193981" ref_url="https://bugzilla.suse.com/1193981" source="BUGZILLA"/>
		<reference ref_id="1194041" ref_url="https://bugzilla.suse.com/1194041" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3975" ref_url="https://www.suse.com/security/cve/CVE-2021-3975/" source="CVE"/>
		<reference ref_id="CVE-2021-4147" ref_url="https://www.suse.com/security/cve/CVE-2021-4147/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009983.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2021-4147: libxl: Fix libvirtd deadlocks and segfaults. (bsc#1194041)
- CVE-2021-3975: Add missing lock in qemuProcessHandleMonitorEOF. (bsc#1192876)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-10"/>
	<updated date="2022-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192876">SUSE bug 1192876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193981">SUSE bug 1193981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194041">SUSE bug 1194041</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3975/">CVE-2021-3975 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3975">CVE-2021-3975 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4147/">CVE-2021-4147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4147">CVE-2021-4147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662251" comment="libvirt-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662252" comment="libvirt-admin-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662253" comment="libvirt-client-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662254" comment="libvirt-daemon-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662255" comment="libvirt-daemon-config-network-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662256" comment="libvirt-daemon-config-nwfilter-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662257" comment="libvirt-daemon-driver-interface-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662170" comment="libvirt-daemon-driver-libxl-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662258" comment="libvirt-daemon-driver-lxc-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662259" comment="libvirt-daemon-driver-network-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662260" comment="libvirt-daemon-driver-nodedev-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662261" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662262" comment="libvirt-daemon-driver-qemu-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662263" comment="libvirt-daemon-driver-secret-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662264" comment="libvirt-daemon-driver-storage-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662265" comment="libvirt-daemon-driver-storage-core-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662266" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662267" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662268" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662269" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662183" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662270" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662271" comment="libvirt-daemon-hooks-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662272" comment="libvirt-daemon-lxc-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662273" comment="libvirt-daemon-qemu-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662188" comment="libvirt-daemon-xen-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662274" comment="libvirt-doc-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662275" comment="libvirt-libs-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662276" comment="libvirt-lock-sanlock-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662277" comment="libvirt-nss-3.3.0-5.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148679" version="1" class="patch">
	<metadata>
		<title>Security update for git (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1204455" ref_url="https://bugzilla.suse.com/1204455" source="BUGZILLA"/>
		<reference ref_id="1204456" ref_url="https://bugzilla.suse.com/1204456" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-39253" ref_url="https://www.suse.com/security/cve/CVE-2022-39253/" source="CVE"/>
		<reference ref_id="CVE-2022-39260" ref_url="https://www.suse.com/security/cve/CVE-2022-39260/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026619.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

  - CVE-2022-39260: Fixed overflow in split_cmdline() (bsc#1204456).
  - CVE-2022-39253: Fixed dereference issue with symbolic links via the `--local` clone mechanism (bsc#1204455).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2022-11-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204455">SUSE bug 1204455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204456">SUSE bug 1204456</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39253/">CVE-2022-39253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39253">CVE-2022-39253 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-39260/">CVE-2022-39260 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39260">CVE-2022-39260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720754" comment="git-2.26.2-27.60.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148680" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1195389" ref_url="https://bugzilla.suse.com/1195389" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0135" ref_url="https://www.suse.com/security/cve/CVE-2022-0135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010244.html" source="SUSE-SU"/>
		<description>
This update for virglrenderer fixes the following issues:

- CVE-2022-0135: Fixed out-of-bonds write in read_transfer_data() (bsc#1195389).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195389">SUSE bug 1195389</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0135/">CVE-2022-0135 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0135">CVE-2022-0135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667335" comment="libvirglrenderer0-0.5.0-12.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148681" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1195054" ref_url="https://bugzilla.suse.com/1195054" source="BUGZILLA"/>
		<reference ref_id="1195217" ref_url="https://bugzilla.suse.com/1195217" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010253.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">CVE-2022-23852 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23990">CVE-2022-23990 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666236" comment="expat-2.1.0-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666237" comment="libexpat1-2.1.0-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666209" comment="libexpat1-32bit-2.1.0-21.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148682" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1071031" ref_url="https://bugzilla.suse.com/1071031" source="BUGZILLA"/>
		<reference ref_id="1154365" ref_url="https://bugzilla.suse.com/1154365" source="BUGZILLA"/>
		<reference ref_id="1182808" ref_url="https://bugzilla.suse.com/1182808" source="BUGZILLA"/>
		<reference ref_id="1182809" ref_url="https://bugzilla.suse.com/1182809" source="BUGZILLA"/>
		<reference ref_id="1182811" ref_url="https://bugzilla.suse.com/1182811" source="BUGZILLA"/>
		<reference ref_id="1182812" ref_url="https://bugzilla.suse.com/1182812" source="BUGZILLA"/>
		<reference ref_id="1190312" ref_url="https://bugzilla.suse.com/1190312" source="BUGZILLA"/>
		<reference ref_id="1194539" ref_url="https://bugzilla.suse.com/1194539" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17095" ref_url="https://www.suse.com/security/cve/CVE-2017-17095/" source="CVE"/>
		<reference ref_id="CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546/" source="CVE"/>
		<reference ref_id="CVE-2020-19131" ref_url="https://www.suse.com/security/cve/CVE-2020-19131/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<reference ref_id="CVE-2022-22844" ref_url="https://www.suse.com/security/cve/CVE-2022-22844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010261.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2017-17095: Fixed DoS in tools/pal2rgb.c in pal2rgb (bsc#1071031).
- CVE-2019-17546: Fixed integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image (bsc#1154365).
- CVE-2020-19131: Fixed buffer overflow in tiffcrop that may cause DoS via the invertImage() function (bsc#1190312).
- CVE-2020-35521: Fixed memory allocation failure in tif_read.c (bsc#1182808).
- CVE-2020-35522: Fixed memory allocation failure in tif_pixarlog.c (bsc#1182809).
- CVE-2020-35523: Fixed integer overflow in tif_getimage.c (bsc#1182811).
- CVE-2020-35524: Fixed heap-based buffer overflow in TIFF2PDF tool (bsc#1182812).
- CVE-2022-22844: Fixed out-of-bounds read in _TIFFmemcpy in tif_unix.c (bsc#1194539).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071031">SUSE bug 1071031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154365">SUSE bug 1154365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182808">SUSE bug 1182808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182809">SUSE bug 1182809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182811">SUSE bug 1182811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182812">SUSE bug 1182812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190312">SUSE bug 1190312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194539">SUSE bug 1194539</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17095/">CVE-2017-17095 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17095">CVE-2017-17095 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17546">CVE-2019-17546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-19131/">CVE-2020-19131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19131">CVE-2020-19131 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35521">CVE-2020-35521 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35522">CVE-2020-35522 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35523">CVE-2020-35523 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35524">CVE-2020-35524 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22844/">CVE-2022-22844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22844">CVE-2022-22844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666234" comment="libtiff5-4.0.9-44.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666205" comment="libtiff5-32bit-4.0.9-44.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666235" comment="tiff-4.0.9-44.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148683" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1195825" ref_url="https://bugzilla.suse.com/1195825" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010269.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2018-16301: Fixed segfault when handling large files (bsc#1195825).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668119" comment="tcpdump-4.9.2-14.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148684" version="1" class="patch">
	<metadata>
		<title>Security update for cobbler (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1193671" ref_url="https://bugzilla.suse.com/1193671" source="BUGZILLA"/>
		<reference ref_id="1195906" ref_url="https://bugzilla.suse.com/1195906" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45083" ref_url="https://www.suse.com/security/cve/CVE-2021-45083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010260.html" source="SUSE-SU"/>
		<description>
This update for cobbler fixes the following issues:

- CVE-2021-45083: Fixed unsafe permissions on sensitive files (bsc#1193671).

The following non-security bugs were fixed:

- Move configuration files ownership to apache (bsc#1195906) 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193671">SUSE bug 1193671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195906">SUSE bug 1195906</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-45083/">CVE-2021-45083 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45083">CVE-2021-45083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668404" comment="cobbler-2.6.6-49.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148685" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1195108" ref_url="https://bugzilla.suse.com/1195108" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010280.html" source="SUSE-SU"/>
		<description>
This update for xerces-j2 fixes the following issues:

- CVE-2022-23437: Fixed infinite loop within Apache XercesJ xml parser (bsc#1195108).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-21"/>
	<updated date="2022-02-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23437">CVE-2022-23437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667934" comment="xerces-j2-2.8.1-268.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667935" comment="xerces-j2-xml-apis-2.8.1-268.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667936" comment="xerces-j2-xml-resolver-2.8.1-268.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148686" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1195230" ref_url="https://bugzilla.suse.com/1195230" source="BUGZILLA"/>
		<reference ref_id="1195682" ref_url="https://bugzilla.suse.com/1195682" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010302.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682)

- CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via Maintenance Service
- CVE-2022-22754: Extensions could have bypassed permission confirmation during update
- CVE-2022-22756: Drag and dropping an image could have resulted in the dropped object being an executable
- CVE-2022-22759: Sandboxed iframes could have executed script if the parent appended elements
- CVE-2022-22760: Cross-Origin responses could be distinguished between script and non-script content-types
- CVE-2022-22761: frame-ancestors Content Security Policy directive was not enforced for framed extension pages
- CVE-2022-22763: Script Execution during invalid object state
- CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6


Firefox Extended Support Release 91.5.1 ESR (bsc#1195230)

- Fixed an issue that allowed unexpected data to be submitted in some of our search telemetry
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-24"/>
	<updated date="2022-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195230">SUSE bug 1195230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22753">CVE-2022-22753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22754">CVE-2022-22754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22756">CVE-2022-22756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22759">CVE-2022-22759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22760">CVE-2022-22760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22761">CVE-2022-22761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22763">CVE-2022-22763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22764">CVE-2022-22764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668887" comment="MozillaFirefox-91.6.0-112.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668888" comment="MozillaFirefox-devel-91.6.0-112.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668889" comment="MozillaFirefox-translations-common-91.6.0-112.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148687" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1192615" ref_url="https://bugzilla.suse.com/1192615" source="BUGZILLA"/>
		<reference ref_id="1195779" ref_url="https://bugzilla.suse.com/1195779" source="BUGZILLA"/>
		<reference ref_id="1195780" ref_url="https://bugzilla.suse.com/1195780" source="BUGZILLA"/>
		<reference ref_id="1195781" ref_url="https://bugzilla.suse.com/1195781" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0127" ref_url="https://www.suse.com/security/cve/CVE-2021-0127/" source="CVE"/>
		<reference ref_id="CVE-2021-0145" ref_url="https://www.suse.com/security/cve/CVE-2021-0145/" source="CVE"/>
		<reference ref_id="CVE-2021-0146" ref_url="https://www.suse.com/security/cve/CVE-2021-0146/" source="CVE"/>
		<reference ref_id="CVE-2021-33120" ref_url="https://www.suse.com/security/cve/CVE-2021-33120/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010308.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220207 release.

- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)
- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)
- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)
- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)

- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)
- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-25"/>
	<updated date="2022-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192615">SUSE bug 1192615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195779">SUSE bug 1195779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195780">SUSE bug 1195780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195781">SUSE bug 1195781</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0127/">CVE-2021-0127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0127">CVE-2021-0127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0145/">CVE-2021-0145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0145">CVE-2021-0145 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0146/">CVE-2021-0146 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0146">CVE-2021-0146 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33120/">CVE-2021-33120 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33120">CVE-2021-33120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667937" comment="ucode-intel-20220207-13.93.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148688" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1193942" ref_url="https://bugzilla.suse.com/1193942" source="BUGZILLA"/>
		<reference ref_id="1193943" ref_url="https://bugzilla.suse.com/1193943" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44224" ref_url="https://www.suse.com/security/cve/CVE-2021-44224/" source="CVE"/>
		<reference ref_id="CVE-2021-44790" ref_url="https://www.suse.com/security/cve/CVE-2021-44790/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010001.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-44224: Fixed NULL dereference or SSRF in forward proxy configurations. (bsc#1193943)
- CVE-2021-44790: Fixed buffer overflow when parsing multipart content in mod_lua. (bsc#1193942)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-12"/>
	<updated date="2022-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193942">SUSE bug 1193942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193943">SUSE bug 1193943</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44224/">CVE-2021-44224 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44224">CVE-2021-44224 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44790/">CVE-2021-44790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44790">CVE-2021-44790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663078" comment="apache2-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663071" comment="apache2-doc-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663079" comment="apache2-example-pages-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663080" comment="apache2-prefork-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663081" comment="apache2-utils-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663082" comment="apache2-worker-2.4.23-29.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148689" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010322.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

-  CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24407">CVE-2022-24407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669342" comment="cyrus-sasl-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669310" comment="cyrus-sasl-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669343" comment="cyrus-sasl-crammd5-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669312" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669344" comment="cyrus-sasl-digestmd5-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669345" comment="cyrus-sasl-gssapi-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669315" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669346" comment="cyrus-sasl-otp-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669317" comment="cyrus-sasl-otp-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669347" comment="cyrus-sasl-plain-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669319" comment="cyrus-sasl-plain-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669348" comment="libsasl2-3-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669321" comment="libsasl2-3-32bit-2.1.26-8.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148690" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1195064" ref_url="https://bugzilla.suse.com/1195064" source="BUGZILLA"/>
		<reference ref_id="1195735" ref_url="https://bugzilla.suse.com/1195735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30934" ref_url="https://www.suse.com/security/cve/CVE-2021-30934/" source="CVE"/>
		<reference ref_id="CVE-2021-30936" ref_url="https://www.suse.com/security/cve/CVE-2021-30936/" source="CVE"/>
		<reference ref_id="CVE-2021-30951" ref_url="https://www.suse.com/security/cve/CVE-2021-30951/" source="CVE"/>
		<reference ref_id="CVE-2021-30952" ref_url="https://www.suse.com/security/cve/CVE-2021-30952/" source="CVE"/>
		<reference ref_id="CVE-2021-30953" ref_url="https://www.suse.com/security/cve/CVE-2021-30953/" source="CVE"/>
		<reference ref_id="CVE-2021-30954" ref_url="https://www.suse.com/security/cve/CVE-2021-30954/" source="CVE"/>
		<reference ref_id="CVE-2021-30984" ref_url="https://www.suse.com/security/cve/CVE-2021-30984/" source="CVE"/>
		<reference ref_id="CVE-2021-45481" ref_url="https://www.suse.com/security/cve/CVE-2021-45481/" source="CVE"/>
		<reference ref_id="CVE-2021-45482" ref_url="https://www.suse.com/security/cve/CVE-2021-45482/" source="CVE"/>
		<reference ref_id="CVE-2021-45483" ref_url="https://www.suse.com/security/cve/CVE-2021-45483/" source="CVE"/>
		<reference ref_id="CVE-2022-22589" ref_url="https://www.suse.com/security/cve/CVE-2022-22589/" source="CVE"/>
		<reference ref_id="CVE-2022-22590" ref_url="https://www.suse.com/security/cve/CVE-2022-22590/" source="CVE"/>
		<reference ref_id="CVE-2022-22592" ref_url="https://www.suse.com/security/cve/CVE-2022-22592/" source="CVE"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010335.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.34.5 (bsc#1195735):

- CVE-2022-22589: A validation issue was addressed with improved input sanitization.
- CVE-2022-22590: A use after free issue was addressed with improved memory management.
- CVE-2022-22592: A logic issue was addressed with improved state management.

Update to version 2.34.4 (bsc#1195064):

- CVE-2021-30934: A buffer overflow issue was addressed with improved memory handling.
- CVE-2021-30936: A use after free issue was addressed with improved memory management.
- CVE-2021-30951: A use after free issue was addressed with improved memory management.
- CVE-2021-30952: An integer overflow was addressed with improved input validation.
- CVE-2021-30953: An out-of-bounds read was addressed with improved bounds checking.
- CVE-2021-30954: A type confusion issue was addressed with improved memory handling.
- CVE-2021-30984: A race condition was addressed with improved state handling.
- CVE-2022-22594: A cross-origin issue in the IndexDB API was addressed with improved input validation.

The following CVEs were addressed in a previous update:

- CVE-2021-45481: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create.
- CVE-2021-45482: A use-after-free in WebCore::ContainerNode::firstChild.
- CVE-2021-45483: A use-after-free in WebCore::Frame::page.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195735">SUSE bug 1195735</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30934/">CVE-2021-30934 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30934">CVE-2021-30934 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30936/">CVE-2021-30936 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30936">CVE-2021-30936 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30951/">CVE-2021-30951 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30951">CVE-2021-30951 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30952/">CVE-2021-30952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30952">CVE-2021-30952 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30953/">CVE-2021-30953 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30953">CVE-2021-30953 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30954/">CVE-2021-30954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30954">CVE-2021-30954 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30984/">CVE-2021-30984 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30984">CVE-2021-30984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45481/">CVE-2021-45481 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45481">CVE-2021-45481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45482/">CVE-2021-45482 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45482">CVE-2021-45482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45483/">CVE-2021-45483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45483">CVE-2021-45483 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-22589/">CVE-2022-22589 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22589">CVE-2022-22589 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22590/">CVE-2022-22590 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22590">CVE-2022-22590 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22592/">CVE-2022-22592 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22592">CVE-2022-22592 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22594">CVE-2022-22594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669696" comment="libjavascriptcoregtk-4_0-18-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669697" comment="libwebkit2gtk-4_0-37-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669688" comment="libwebkit2gtk3-lang-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669698" comment="typelib-1_0-JavaScriptCore-4_0-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669699" comment="typelib-1_0-WebKit2-4_0-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669700" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669701" comment="webkit2gtk-4_0-injected-bundles-2.34.5-2.85.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148691" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196026" ref_url="https://bugzilla.suse.com/1196026" source="BUGZILLA"/>
		<reference ref_id="1196168" ref_url="https://bugzilla.suse.com/1196168" source="BUGZILLA"/>
		<reference ref_id="1196169" ref_url="https://bugzilla.suse.com/1196169" source="BUGZILLA"/>
		<reference ref_id="1196171" ref_url="https://bugzilla.suse.com/1196171" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010336.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">CVE-2022-25313 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25314">CVE-2022-25314 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669382" comment="expat-2.1.0-21.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669383" comment="libexpat1-2.1.0-21.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669384" comment="libexpat1-32bit-2.1.0-21.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148692" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1089030" ref_url="https://bugzilla.suse.com/1089030" source="BUGZILLA"/>
		<reference ref_id="1163882" ref_url="https://bugzilla.suse.com/1163882" source="BUGZILLA"/>
		<reference ref_id="1196435" ref_url="https://bugzilla.suse.com/1196435" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1100" ref_url="https://www.suse.com/security/cve/CVE-2018-1100/" source="CVE"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<reference ref_id="CVE-2021-45444" ref_url="https://www.suse.com/security/cve/CVE-2021-45444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010368.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2021-45444: Fixed a vulnerability where arbitrary shell commands could be 
  executed related to prompt expansion (bsc#1196435).
- CVE-2019-20044: Fixed a vulnerability where shell privileges would not be
  properly dropped when unsetting the PRIVILEGED option (bsc#1163882).
- CVE-2018-1100: Fixed a potential code execution via a stack-based buffer
  overflow in utils.c:checkmailpath() (bsc#1089030).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1089030">SUSE bug 1089030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196435">SUSE bug 1196435</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1100/">CVE-2018-1100 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1100">CVE-2018-1100 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20044">CVE-2019-20044 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45444/">CVE-2021-45444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45444">CVE-2021-45444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670824" comment="zsh-5.0.5-6.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148693" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1195667" ref_url="https://bugzilla.suse.com/1195667" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21712" ref_url="https://www.suse.com/security/cve/CVE-2022-21712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010370.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

- CVE-2022-21712: Fixed secret exposure in cross-origin redirects (bsc#1195667, GHSA-92x2-jw7w-xvvx) from
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195667">SUSE bug 1195667</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21712/">CVE-2022-21712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21712">CVE-2022-21712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667847" comment="python-Twisted-15.2.1-9.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148694" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1146312" ref_url="https://bugzilla.suse.com/1146312" source="BUGZILLA"/>
		<reference ref_id="1185973" ref_url="https://bugzilla.suse.com/1185973" source="BUGZILLA"/>
		<reference ref_id="1191580" ref_url="https://bugzilla.suse.com/1191580" source="BUGZILLA"/>
		<reference ref_id="1193731" ref_url="https://bugzilla.suse.com/1193731" source="BUGZILLA"/>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="1195536" ref_url="https://bugzilla.suse.com/1195536" source="BUGZILLA"/>
		<reference ref_id="1195543" ref_url="https://bugzilla.suse.com/1195543" source="BUGZILLA"/>
		<reference ref_id="1195612" ref_url="https://bugzilla.suse.com/1195612" source="BUGZILLA"/>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195939" ref_url="https://bugzilla.suse.com/1195939" source="BUGZILLA"/>
		<reference ref_id="1196079" ref_url="https://bugzilla.suse.com/1196079" source="BUGZILLA"/>
		<reference ref_id="1196612" ref_url="https://bugzilla.suse.com/1196612" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10905" ref_url="https://www.suse.com/security/cve/CVE-2016-10905/" source="CVE"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.


Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc (bsc#1193731).
- CVE-2016-10905: Fixed a use-after-free is gfs2_clear_rgrpd() and read_rindex_entry() (bsc#1146312).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-08"/>
	<updated date="2022-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146312">SUSE bug 1146312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185973">SUSE bug 1185973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193731">SUSE bug 1193731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195536">SUSE bug 1195536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195612">SUSE bug 1195612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195939">SUSE bug 1195939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10905/">CVE-2016-10905 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10905">CVE-2016-10905 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0920">CVE-2021-0920 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0002">CVE-2022-0002 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0617">CVE-2022-0617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24448">CVE-2022-24448 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671801" comment="kernel-default-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671802" comment="kernel-default-base-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671803" comment="kernel-default-devel-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671811" comment="kernel-default-kgraft-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671768" comment="kernel-devel-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671769" comment="kernel-macros-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671770" comment="kernel-source-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671804" comment="kernel-syms-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671813" comment="kgraft-patch-4_4_180-94_156-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148695" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1196809" ref_url="https://bugzilla.suse.com/1196809" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010408.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):

- CVE-2022-26485: Use-after-free in XSLT parameter processing
- CVE-2022-26486: Use-after-free in WebGPU IPC Framework
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26485">CVE-2022-26485 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26486">CVE-2022-26486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671783" comment="MozillaFirefox-91.6.1-112.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671784" comment="MozillaFirefox-devel-91.6.1-112.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671785" comment="MozillaFirefox-translations-common-91.6.1-112.92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148696" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1195255" ref_url="https://bugzilla.suse.com/1195255" source="BUGZILLA"/>
		<reference ref_id="1196091" ref_url="https://bugzilla.suse.com/1196091" source="BUGZILLA"/>
		<reference ref_id="1196137" ref_url="https://bugzilla.suse.com/1196137" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23181" ref_url="https://www.suse.com/security/cve/CVE-2022-23181/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010411.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

Security issues fixed:

- CVE-2022-23181: Fixed time of check, time of use vulnerability that allowed local privilege escalation. (bsc#1195255)
- Remove log4j dependency, which is currently directly in use (bsc#1196137)

- Make the package RPM conflict even more specific to conflict with java-openjdk-headless &gt;= 9 (bsc#1196091)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195255">SUSE bug 1195255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196091">SUSE bug 1196091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196137">SUSE bug 1196137</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23181/">CVE-2022-23181 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23181">CVE-2022-23181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670264" comment="javapackages-filesystem-5.3.1-14.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148697" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22620" ref_url="https://www.suse.com/security/cve/CVE-2022-22620/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010419.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.34.6 (bsc#1196133):

- CVE-2022-22620: Processing maliciously crafted web content may have lead to arbitrary code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-11"/>
	<updated date="2022-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22620/">CVE-2022-22620 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22620">CVE-2022-22620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670816" comment="libjavascriptcoregtk-4_0-18-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670817" comment="libwebkit2gtk-4_0-37-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670802" comment="libwebkit2gtk3-lang-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670818" comment="typelib-1_0-JavaScriptCore-4_0-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670819" comment="typelib-1_0-WebKit2-4_0-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670820" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670821" comment="webkit2gtk-4_0-injected-bundles-2.34.6-2.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148698" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1184751" ref_url="https://bugzilla.suse.com/1184751" source="BUGZILLA"/>
		<reference ref_id="1184752" ref_url="https://bugzilla.suse.com/1184752" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010432.html" source="SUSE-SU"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-30498, CVE-2021-30499: If an image has a size of 0x0, when exporting, no 
  data is written and space is allocated for the header only, not taking into
  account that sprintf appends a NUL byte (bsc#1184751, bsc#1184752).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184751">SUSE bug 1184751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184752">SUSE bug 1184752</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30498">CVE-2021-30498 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30499">CVE-2021-30499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670823" comment="libcaca0-0.99.beta18-14.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148699" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1196900" ref_url="https://bugzilla.suse.com/1196900" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010434.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):

- CVE-2022-26383: Browser window spoof using fullscreen mode
- CVE-2022-26384: iframe allow-scripts sandbox bypass
- CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures
- CVE-2022-26381: Use-after-free in text reflows
- CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26381">CVE-2022-26381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26383">CVE-2022-26383 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26384">CVE-2022-26384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26386">CVE-2022-26386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26387">CVE-2022-26387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672571" comment="MozillaFirefox-91.7.0-112.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672572" comment="MozillaFirefox-devel-91.7.0-112.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672573" comment="MozillaFirefox-translations-common-91.7.0-112.95.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148700" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196784" ref_url="https://bugzilla.suse.com/1196784" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010442.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671277" comment="expat-2.1.0-21.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671278" comment="libexpat1-2.1.0-21.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671275" comment="libexpat1-32bit-2.1.0-21.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148701" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010449.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673055" comment="libopenssl-devel-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673056" comment="libopenssl1_0_0-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673023" comment="libopenssl1_0_0-32bit-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673057" comment="libopenssl1_0_0-hmac-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673025" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673058" comment="openssl-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673027" comment="openssl-doc-1.0.2j-60.75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148702" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1193314" ref_url="https://bugzilla.suse.com/1193314" source="BUGZILLA"/>
		<reference ref_id="1193444" ref_url="https://bugzilla.suse.com/1193444" source="BUGZILLA"/>
		<reference ref_id="1193491" ref_url="https://bugzilla.suse.com/1193491" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1195163" ref_url="https://bugzilla.suse.com/1195163" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u322 (icedtea-3.22.0)

Including the following security fixes:

- CVE-2022-21248, bsc#1194926: Enhance cross VM serialization
- CVE-2022-21283, bsc#1194937: Better String matching
- CVE-2022-21293, bsc#1194935: Improve String constructions
- CVE-2022-21294, bsc#1194934: Enhance construction of Identity maps
- CVE-2022-21282, bsc#1194933: Better resolution of URIs
- CVE-2022-21296, bsc#1194932: Improve SAX Parser configuration management
- CVE-2022-21299, bsc#1194931: Improved scanning of XML entities
- CVE-2022-21305, bsc#1194939: Better array indexing
- CVE-2022-21340, bsc#1194940: Verify Jar Verification
- CVE-2022-21341, bsc#1194941: Improve serial forms for transport
- CVE-2022-21349: Improve Solaris font rendering
- CVE-2022-21360, bsc#1194929: Enhance BMP image support
- CVE-2022-21365, bsc#1194928: Enhanced BMP processing
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193314">SUSE bug 1193314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193444">SUSE bug 1193444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193491">SUSE bug 1193491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195163">SUSE bug 1195163</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21349">CVE-2022-21349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672567" comment="java-1_8_0-openjdk-1.8.0.322-27.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672568" comment="java-1_8_0-openjdk-demo-1.8.0.322-27.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672569" comment="java-1_8_0-openjdk-devel-1.8.0.322-27.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672570" comment="java-1_8_0-openjdk-headless-1.8.0.322-27.72.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148703" version="1" class="patch">
	<metadata>
		<title>Security update for python-lxml (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1118088" ref_url="https://bugzilla.suse.com/1118088" source="BUGZILLA"/>
		<reference ref_id="1179534" ref_url="https://bugzilla.suse.com/1179534" source="BUGZILLA"/>
		<reference ref_id="1184177" ref_url="https://bugzilla.suse.com/1184177" source="BUGZILLA"/>
		<reference ref_id="1193752" ref_url="https://bugzilla.suse.com/1193752" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19787" ref_url="https://www.suse.com/security/cve/CVE-2018-19787/" source="CVE"/>
		<reference ref_id="CVE-2020-27783" ref_url="https://www.suse.com/security/cve/CVE-2020-27783/" source="CVE"/>
		<reference ref_id="CVE-2021-28957" ref_url="https://www.suse.com/security/cve/CVE-2021-28957/" source="CVE"/>
		<reference ref_id="CVE-2021-43818" ref_url="https://www.suse.com/security/cve/CVE-2021-43818/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010467.html" source="SUSE-SU"/>
		<description>
This update for python-lxml fixes the following issues:

- CVE-2021-43818: Removed SVG image data URLs since they can embed script
  content (bsc#1193752).
- CVE-2021-28957: Fixed a potential XSS due to improper input sanitization (bsc#1184177).
- CVE-2020-27783: Fixed a potential XSS due to improper HTML parsing (bsc#1179534).
- CVE-2018-19787: Fixed a potential XSS due to improper input sanitization (bsc#1118088).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-17"/>
	<updated date="2022-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118088">SUSE bug 1118088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179534">SUSE bug 1179534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184177">SUSE bug 1184177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193752">SUSE bug 1193752</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19787/">CVE-2018-19787 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19787">CVE-2018-19787 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-27783/">CVE-2020-27783 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27783">CVE-2020-27783 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28957/">CVE-2021-28957 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28957">CVE-2021-28957 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-43818/">CVE-2021-43818 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43818">CVE-2021-43818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670849" comment="python-lxml-3.6.1-8.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148704" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1194640" ref_url="https://bugzilla.suse.com/1194640" source="BUGZILLA"/>
		<reference ref_id="1194768" ref_url="https://bugzilla.suse.com/1194768" source="BUGZILLA"/>
		<reference ref_id="1194770" ref_url="https://bugzilla.suse.com/1194770" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010485.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2022-23219: Fixed buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768)
- CVE-2022-23218: Fixed buffer overflow in sunrpc svcunix_create (bsc#1194770)
- CVE-2021-3999: Fixed getcwd to set errno to ERANGE for size == 1 (bsc#1194640)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3999">CVE-2021-3999 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">CVE-2022-23218 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">CVE-2022-23219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673031" comment="glibc-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673010" comment="glibc-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673032" comment="glibc-devel-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673012" comment="glibc-devel-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673013" comment="glibc-html-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673014" comment="glibc-i18ndata-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673015" comment="glibc-info-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673033" comment="glibc-locale-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673017" comment="glibc-locale-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673034" comment="glibc-profile-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673019" comment="glibc-profile-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673035" comment="nscd-2.22-119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148705" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1197091" ref_url="https://bugzilla.suse.com/1197091" source="BUGZILLA"/>
		<reference ref_id="1197095" ref_url="https://bugzilla.suse.com/1197095" source="BUGZILLA"/>
		<reference ref_id="1197096" ref_url="https://bugzilla.suse.com/1197096" source="BUGZILLA"/>
		<reference ref_id="1197098" ref_url="https://bugzilla.suse.com/1197098" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22719" ref_url="https://www.suse.com/security/cve/CVE-2022-22719/" source="CVE"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<reference ref_id="CVE-2022-23943" ref_url="https://www.suse.com/security/cve/CVE-2022-23943/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010494.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-23943: heap out-of-bounds write in mod_sed (bsc#1197098).
- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22719: use of uninitialized value of in r:parsebody in mod_lua (bsc#1197091).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197091">SUSE bug 1197091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197098">SUSE bug 1197098</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22719/">CVE-2022-22719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22719">CVE-2022-22719 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22720">CVE-2022-22720 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22721">CVE-2022-22721 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23943/">CVE-2022-23943 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23943">CVE-2022-23943 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673758" comment="apache2-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673736" comment="apache2-doc-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673759" comment="apache2-example-pages-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673760" comment="apache2-prefork-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673761" comment="apache2-utils-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673762" comment="apache2-worker-2.4.23-29.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148706" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1207032" ref_url="https://bugzilla.suse.com/1207032" source="BUGZILLA"/>
		<reference ref_id="1207033" ref_url="https://bugzilla.suse.com/1207033" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23521" ref_url="https://www.suse.com/security/cve/CVE-2022-23521/" source="CVE"/>
		<reference ref_id="CVE-2022-41903" ref_url="https://www.suse.com/security/cve/CVE-2022-41903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013487.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2022-41903: Fixed a heap overflow in the 'git archive' and
  'git log --format' commands (bsc#1207033).
- CVE-2022-23521: Fixed an integer overflow that could be triggered
  when parsing a gitattributes file (bsc#1207032).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-20"/>
	<updated date="2023-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207032">SUSE bug 1207032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207033">SUSE bug 1207033</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23521/">CVE-2022-23521 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23521">CVE-2022-23521 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41903/">CVE-2022-41903 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41903">CVE-2022-41903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734278" comment="git-2.26.2-27.63.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148707" version="1" class="patch">
	<metadata>
		<title>Security update for openstack-cinder, openstack-nova, python-oslo.utils (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1207321" ref_url="https://bugzilla.suse.com/1207321" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-47951" ref_url="https://www.suse.com/security/cve/CVE-2022-47951/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014546.html" source="SUSE-SU"/>
		<description>
This update for openstack-cinder, openstack-nova, python-oslo.utils contains the following fixes:

Security fixes included on this update:

openstack-cinder, openstack-nova:

- CVE-2022-47951: Fixed file access control through custom VMDK flat descriptor. (bsc#1207321)

Non-security changes included on this update:

Changes in openstack-cinder:
-  Fixed file access control through custom VMDK flat descriptor. (bsc#1207321, CVE-2022-47951)

Changes in openstack-nova:
- Fixed file access control through custom VMDK flat descriptor. (bsc#1207321, CVE-2022-47951)

Changes in python-oslo.utils:
- Report format specific details when using JSON output format. (bsc#1207321)

  		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-21"/>
	<updated date="2023-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207321">SUSE bug 1207321</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47951/">CVE-2022-47951 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47951">CVE-2022-47951 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009750543" comment="openstack-cinder-11.2.3~dev29-3.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750544" comment="openstack-cinder-api-11.2.3~dev29-3.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750545" comment="openstack-cinder-backup-11.2.3~dev29-3.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750546" comment="openstack-cinder-doc-11.2.3~dev29-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750547" comment="openstack-cinder-scheduler-11.2.3~dev29-3.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750548" comment="openstack-cinder-volume-11.2.3~dev29-3.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750549" comment="openstack-nova-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750550" comment="openstack-nova-api-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750551" comment="openstack-nova-cells-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750552" comment="openstack-nova-compute-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750553" comment="openstack-nova-conductor-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750554" comment="openstack-nova-console-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750555" comment="openstack-nova-consoleauth-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750556" comment="openstack-nova-doc-16.1.9~dev92-3.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750557" comment="openstack-nova-novncproxy-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750558" comment="openstack-nova-placement-api-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750559" comment="openstack-nova-scheduler-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750560" comment="openstack-nova-serialproxy-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750561" comment="openstack-nova-vncproxy-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750562" comment="python-cinder-11.2.3~dev29-3.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750563" comment="python-nova-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750564" comment="python-oslo.utils-3.28.4-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750565" comment="venv-openstack-aodh-x86_64-5.1.1~dev7-12.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750566" comment="venv-openstack-barbican-x86_64-5.0.2~dev3-12.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750567" comment="venv-openstack-ceilometer-x86_64-9.0.8~dev7-12.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750568" comment="venv-openstack-cinder-x86_64-11.2.3~dev29-14.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750569" comment="venv-openstack-designate-x86_64-5.0.3~dev7-12.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750570" comment="venv-openstack-freezer-x86_64-5.0.0.0~xrc2~dev2-10.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750571" comment="venv-openstack-glance-x86_64-15.0.3~dev3-12.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750572" comment="venv-openstack-heat-x86_64-9.0.8~dev22-12.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750573" comment="venv-openstack-horizon-x86_64-12.0.5~dev6-14.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750574" comment="venv-openstack-ironic-x86_64-9.1.8~dev8-12.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750575" comment="venv-openstack-keystone-x86_64-12.0.4~dev11-11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750576" comment="venv-openstack-magnum-x86_64-5.0.2_5.0.2_5.0.2~dev31-11.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750577" comment="venv-openstack-manila-x86_64-5.1.1~dev5-12.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750578" comment="venv-openstack-monasca-ceilometer-x86_64-1.5.1_1.5.1_1.5.1~dev3-8.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750579" comment="venv-openstack-monasca-x86_64-2.2.2~dev1-11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750580" comment="venv-openstack-murano-x86_64-4.0.2~dev3-12.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750581" comment="venv-openstack-neutron-x86_64-11.0.9~dev69-13.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750582" comment="venv-openstack-nova-x86_64-16.1.9~dev92-11.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750583" comment="venv-openstack-octavia-x86_64-1.0.6~dev3-12.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750584" comment="venv-openstack-sahara-x86_64-7.0.5~dev4-11.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750585" comment="venv-openstack-swift-x86_64-2.15.2_2.15.2_2.15.2~dev32-11.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750586" comment="venv-openstack-trove-x86_64-8.0.2~dev2-11.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148708" version="1" class="patch">
	<metadata>
		<title>Security update for git (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1210686" ref_url="https://bugzilla.suse.com/1210686" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-25652" ref_url="https://www.suse.com/security/cve/CVE-2023-25652/" source="CVE"/>
		<reference ref_id="CVE-2023-25815" ref_url="https://www.suse.com/security/cve/CVE-2023-25815/" source="CVE"/>
		<reference ref_id="CVE-2023-29007" ref_url="https://www.suse.com/security/cve/CVE-2023-29007/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014673.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2023-25652: Fixed partial overwrite of paths outside the working tree (bsc#1210686).
- CVE-2023-25815: Fixed malicious placemtn of crafted message (bsc#1210686).
- CVE-2023-29007: Fixed arbitrary configuration injection (bsc#1210686).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-28"/>
	<updated date="2023-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210686">SUSE bug 1210686</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-25652/">CVE-2023-25652 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25652">CVE-2023-25652 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-25815/">CVE-2023-25815 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25815">CVE-2023-25815 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-29007/">CVE-2023-29007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29007">CVE-2023-29007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755532" comment="git-2.26.2-27.69.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148709" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1209358" ref_url="https://bugzilla.suse.com/1209358" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28450" ref_url="https://www.suse.com/security/cve/CVE-2023-28450/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014781.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2023-28450: Fixed default maximum size for EDNS.0 UDP packets (bsc#1209358).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-08"/>
	<updated date="2023-05-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209358">SUSE bug 1209358</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28450/">CVE-2023-28450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28450">CVE-2023-28450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752243" comment="dnsmasq-utils-2.78-18.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148710" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1208036" ref_url="https://bugzilla.suse.com/1208036" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-23931" ref_url="https://www.suse.com/security/cve/CVE-2023-23931/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2144-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029303.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2023-23931: Fixed memory corruption in Cipher.update_into (bsc#1208036).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-09"/>
	<updated date="2023-05-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1208036">SUSE bug 1208036</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23931/">CVE-2023-23931 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23931">CVE-2023-23931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009756575" comment="python-cryptography-2.0.3-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756576" comment="venv-openstack-aodh-x86_64-5.1.1~dev7-12.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756577" comment="venv-openstack-barbican-x86_64-5.0.2~dev3-12.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756578" comment="venv-openstack-ceilometer-x86_64-9.0.8~dev7-12.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756579" comment="venv-openstack-cinder-x86_64-11.2.3~dev29-14.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756580" comment="venv-openstack-designate-x86_64-5.0.3~dev7-12.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756581" comment="venv-openstack-freezer-x86_64-5.0.0.0~xrc2~dev2-10.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756582" comment="venv-openstack-glance-x86_64-15.0.3~dev3-12.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756583" comment="venv-openstack-heat-x86_64-9.0.8~dev22-12.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756584" comment="venv-openstack-horizon-x86_64-12.0.5~dev6-14.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756585" comment="venv-openstack-ironic-x86_64-9.1.8~dev8-12.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756586" comment="venv-openstack-keystone-x86_64-12.0.4~dev11-11.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756587" comment="venv-openstack-magnum-x86_64-5.0.2_5.0.2_5.0.2~dev31-11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756588" comment="venv-openstack-manila-x86_64-5.1.1~dev5-12.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756589" comment="venv-openstack-monasca-ceilometer-x86_64-1.5.1_1.5.1_1.5.1~dev3-8.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756590" comment="venv-openstack-monasca-x86_64-2.2.2~dev1-11.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756591" comment="venv-openstack-murano-x86_64-4.0.2~dev3-12.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756592" comment="venv-openstack-neutron-x86_64-11.0.9~dev69-13.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756593" comment="venv-openstack-nova-x86_64-16.1.9~dev92-11.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756594" comment="venv-openstack-octavia-x86_64-1.0.6~dev3-12.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756595" comment="venv-openstack-sahara-x86_64-7.0.5~dev4-11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756596" comment="venv-openstack-swift-x86_64-2.15.2_2.15.2_2.15.2~dev32-11.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756597" comment="venv-openstack-trove-x86_64-8.0.2~dev2-11.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148711" version="1" class="patch">
	<metadata>
		<title>Security update for openstack-heat, python-Werkzeug (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1208283" ref_url="https://bugzilla.suse.com/1208283" source="BUGZILLA"/>
		<reference ref_id="1209774" ref_url="https://bugzilla.suse.com/1209774" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1625" ref_url="https://www.suse.com/security/cve/CVE-2023-1625/" source="CVE"/>
		<reference ref_id="CVE-2023-25577" ref_url="https://www.suse.com/security/cve/CVE-2023-25577/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2379-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029723.html" source="SUSE-SU"/>
		<description>
This update for openstack-heat, python-Werkzeug contains the following fixes:

Security fixes included on this update:

openstack-heat:
- CVE-2023-1625: Fixed an issue where parameter values marked as 'hidden' would be shown in the stack's environment. (bsc#1209774)

python-Werkzeug:
- CVE-2023-25577: Fixed an unbounded resource usage when parsing multipart forms with many fields. (bsc#1208283)
  		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-05"/>
	<updated date="2023-06-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208283">SUSE bug 1208283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209774">SUSE bug 1209774</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1625/">CVE-2023-1625 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1625">CVE-2023-1625 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25577/">CVE-2023-25577 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25577">CVE-2023-25577 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009757256" comment="openstack-heat-9.0.8~dev22-3.30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757257" comment="openstack-heat-api-9.0.8~dev22-3.30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757258" comment="openstack-heat-api-cfn-9.0.8~dev22-3.30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757259" comment="openstack-heat-api-cloudwatch-9.0.8~dev22-3.30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757260" comment="openstack-heat-doc-9.0.8~dev22-3.30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757261" comment="openstack-heat-engine-9.0.8~dev22-3.30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757262" comment="openstack-heat-plugin-heat_docker-9.0.8~dev22-3.30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757263" comment="openstack-heat-test-9.0.8~dev22-3.30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757264" comment="python-Werkzeug-0.12.2-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757265" comment="python-heat-9.0.8~dev22-3.30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757266" comment="venv-openstack-designate-x86_64-5.0.3~dev7-12.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757267" comment="venv-openstack-heat-x86_64-9.0.8~dev22-12.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757268" comment="venv-openstack-magnum-x86_64-5.0.2_5.0.2_5.0.2~dev31-11.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757269" comment="venv-openstack-octavia-x86_64-1.0.6~dev3-12.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757270" comment="venv-openstack-sahara-x86_64-7.0.5~dev4-11.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148712" version="1" class="patch">
	<metadata>
		<title>Security update for libwebp (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1210212" ref_url="https://bugzilla.suse.com/1210212" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1999" ref_url="https://www.suse.com/security/cve/CVE-2023-1999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015241.html" source="SUSE-SU"/>
		<description>
This update for libwebp fixes the following issues:

- CVE-2023-1999: Fixed double free (bsc#1210212).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-20"/>
	<updated date="2023-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1999/">CVE-2023-1999 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1999">CVE-2023-1999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764534" comment="libwebpmux1-0.4.3-4.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148713" version="1" class="patch">
	<metadata>
		<title>Security update for python-sqlparse (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1210617" ref_url="https://bugzilla.suse.com/1210617" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-30608" ref_url="https://www.suse.com/security/cve/CVE-2023-30608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2693-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030115.html" source="SUSE-SU"/>
		<description>
This update for python-sqlparse fixes the following issues:

- CVE-2023-30608: Fixed a regular rexpression that is vulnerable to ReDOS (bsc#1210617).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-28"/>
	<updated date="2023-06-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210617">SUSE bug 1210617</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-30608/">CVE-2023-30608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30608">CVE-2023-30608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767075" comment="python-sqlparse-0.2.3-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148714" version="1" class="patch">
	<metadata>
		<title>Security update for python-tornado (Low)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1211741" ref_url="https://bugzilla.suse.com/1211741" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28370" ref_url="https://www.suse.com/security/cve/CVE-2023-28370/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015409.html" source="SUSE-SU"/>
		<description>
This update for python-tornado fixes the following issues:

- CVE-2023-28370: Fixed an open redirect issue in the static file
  handler (bsc#1211741).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2023-07-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1211741">SUSE bug 1211741</bugzilla>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28370/">CVE-2023-28370 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28370">CVE-2023-28370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764069" comment="python-tornado-4.4.3-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148715" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1212742" ref_url="https://bugzilla.suse.com/1212742" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-36053" ref_url="https://www.suse.com/security/cve/CVE-2023-36053/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015764.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2023-36053: Fixed potential regular expression denial of service vulnerability in EmailValidator/URLValidator (bsc#1212742).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-02"/>
	<updated date="2023-08-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212742">SUSE bug 1212742</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-36053/">CVE-2023-36053 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36053">CVE-2023-36053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771825" comment="python-Django-1.11.29-3.48.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148716" version="1" class="patch">
	<metadata>
		<title>Security update for python-swift3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1207035" ref_url="https://bugzilla.suse.com/1207035" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-47950" ref_url="https://www.suse.com/security/cve/CVE-2022-47950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013703.html" source="SUSE-SU"/>
		<description>
This update for python-swift3 fixes the following issues:

- CVE-2022-47950: Fixed an issue that could allow a remote attacker to
  disclose local file contents via a crafted XML file (bsc#1207035).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-08"/>
	<updated date="2023-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207035">SUSE bug 1207035</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-47950/">CVE-2022-47950 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47950">CVE-2022-47950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738555" comment="python-swift3-1.7.0.dev372-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148717" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1196137" ref_url="https://bugzilla.suse.com/1196137" source="BUGZILLA"/>
		<reference ref_id="1198136" ref_url="https://bugzilla.suse.com/1198136" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:3232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015806.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- Remove the log4j dependency as it is not used by the tomcat package (bsc#1196137)
    
Security hardening, related to Spring Framework vulnerabilities:    
- Deprecate getResources() and always return null (bsc#1198136).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-08"/>
	<updated date="2023-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196137">SUSE bug 1196137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198136">SUSE bug 1198136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679547" comment="javapackages-filesystem-5.3.1-14.7.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148718" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1214667" ref_url="https://bugzilla.suse.com/1214667" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-41164" ref_url="https://www.suse.com/security/cve/CVE-2023-41164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016133.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2023-41164: Fixed a potential denial of service vulnerability in django.utils.encoding.uri_to_iri() (bsc#1214667).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-11"/>
	<updated date="2023-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214667">SUSE bug 1214667</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-41164/">CVE-2023-41164 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41164">CVE-2023-41164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781690" comment="python-Django-1.11.29-3.51.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148719" version="1" class="patch">
	<metadata>
		<title>Security update for libwebp (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1215231" ref_url="https://bugzilla.suse.com/1215231" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016334.html" source="SUSE-SU"/>
		<description>
This update for libwebp fixes the following issues:

 - CVE-2023-4863: Fixed a heap buffer overflow (bsc#1215231).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-26"/>
	<updated date="2023-09-26"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1215231">SUSE bug 1215231</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798108" comment="libwebpmux1-0.4.3-4.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148720" version="1" class="patch">
	<metadata>
		<title>Security update for python-gevent (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1215469" ref_url="https://bugzilla.suse.com/1215469" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-41419" ref_url="https://www.suse.com/security/cve/CVE-2023-41419/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016572.html" source="SUSE-SU"/>
		<description>
This update for python-gevent fixes the following issues:

- CVE-2023-41419: Fixed a http request smuggling (bsc#1215469).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-09"/>
	<updated date="2023-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215469">SUSE bug 1215469</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-41419/">CVE-2023-41419 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41419">CVE-2023-41419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799876" comment="python-gevent-1.1.2-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148721" version="1" class="patch">
	<metadata>
		<title>Security update for python-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1206667" ref_url="https://bugzilla.suse.com/1206667" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40897" ref_url="https://www.suse.com/security/cve/CVE-2022-40897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013754.html" source="SUSE-SU"/>
		<description>
This update for python-setuptools fixes the following issues:

- CVE-2022-40897: Fixed an excessive CPU usage that could be triggered
  by fetching a malicious HTML document (bsc#1206667).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-14"/>
	<updated date="2023-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206667">SUSE bug 1206667</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40897/">CVE-2022-40897 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40897">CVE-2022-40897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732000" comment="python-setuptools-36.5.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148722" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1215968" ref_url="https://bugzilla.suse.com/1215968" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43804" ref_url="https://www.suse.com/security/cve/CVE-2023-43804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016809.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2023-43804: Fixed a potential cookie leak via HTTP redirect if
  the user manually set the corresponding header (bsc#1215968).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-23"/>
	<updated date="2023-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215968">SUSE bug 1215968</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-43804/">CVE-2023-43804 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43804">CVE-2023-43804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800622" comment="python-urllib3-1.25.10-5.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148723" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1215978" ref_url="https://bugzilla.suse.com/1215978" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43665" ref_url="https://www.suse.com/security/cve/CVE-2023-43665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016894.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2023-43665: Fixed a Denial-of-service in django.utils.text.Truncator. (bsc#1215978)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-27"/>
	<updated date="2023-10-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215978">SUSE bug 1215978</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-43665/">CVE-2023-43665 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43665">CVE-2023-43665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802097" comment="python-Django-1.11.29-3.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148724" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1208027" ref_url="https://bugzilla.suse.com/1208027" source="BUGZILLA"/>
		<reference ref_id="1208028" ref_url="https://bugzilla.suse.com/1208028" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22490" ref_url="https://www.suse.com/security/cve/CVE-2023-22490/" source="CVE"/>
		<reference ref_id="CVE-2023-23946" ref_url="https://www.suse.com/security/cve/CVE-2023-23946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013771.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

  - CVE-2023-22490: Fixed incorrectly usable local clone optimization even when using a non-local transport (bsc#1208027).
  - CVE-2023-23946: Fixed issue where a path outside the working tree can be overwritten as the user who is running 'git apply' (bsc#1208028).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2023-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208027">SUSE bug 1208027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208028">SUSE bug 1208028</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22490/">CVE-2023-22490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22490">CVE-2023-22490 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-23946/">CVE-2023-23946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23946">CVE-2023-23946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740121" comment="git-2.26.2-27.66.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148725" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1216377" ref_url="https://bugzilla.suse.com/1216377" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45803" ref_url="https://www.suse.com/security/cve/CVE-2023-45803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4356-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032594.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2023-45803: Fix a request body leak that could occur when
  receiving a 303 HTTP response (bsc#1216377).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2023-11-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216377">SUSE bug 1216377</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45803/">CVE-2023-45803 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45803">CVE-2023-45803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803605" comment="python-urllib3-1.25.10-5.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148726" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1216894" ref_url="https://bugzilla.suse.com/1216894" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-44271" ref_url="https://www.suse.com/security/cve/CVE-2023-44271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017271.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2023-44271: Fixed uncontrolled resource consumption when textlength in an ImageDraw instance operates on a long text argument (bsc#1216894).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-01"/>
	<updated date="2023-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216894">SUSE bug 1216894</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44271/">CVE-2023-44271 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44271">CVE-2023-44271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810414" comment="python-Pillow-4.2.1-3.23.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148727" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1208082" ref_url="https://bugzilla.suse.com/1208082" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-24580" ref_url="https://www.suse.com/security/cve/CVE-2023-24580/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014016.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

  - CVE-2023-24580: Fixed DOS in file uploads (bsc#1208082).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-10"/>
	<updated date="2023-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208082">SUSE bug 1208082</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24580/">CVE-2023-24580 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24580">CVE-2023-24580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744502" comment="python-Django-1.11.29-3.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148728" version="1" class="patch">
	<metadata>
		<title>Security update for openstack-barbican (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1203873" ref_url="https://bugzilla.suse.com/1203873" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3100" ref_url="https://www.suse.com/security/cve/CVE-2022-3100/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013455.html" source="SUSE-SU"/>
		<description>
This update for openstack-barbican contains the following fix:

Security fix included on this update:
openstack-barbican:

- CVE-2022-3100: Fixed an access policy bypass via query string injection (bsc#1203873).

Update for openstack-barbican:
- Add patch for CVE-2022-3100 to address access policy bypass via query string injection. (bsc#1203873, CVE-2022-3100)
  		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-11"/>
	<updated date="2023-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203873">SUSE bug 1203873</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3100/">CVE-2022-3100 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3100">CVE-2022-3100 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009729989" comment="openstack-barbican-5.0.2~dev3-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729990" comment="openstack-barbican-api-5.0.2~dev3-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729991" comment="openstack-barbican-doc-5.0.2~dev3-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729992" comment="openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729993" comment="openstack-barbican-retry-5.0.2~dev3-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729994" comment="openstack-barbican-worker-5.0.2~dev3-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729995" comment="python-barbican-5.0.2~dev3-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729996" comment="venv-openstack-barbican-x86_64-5.0.2~dev3-12.43.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148729" version="1" class="patch">
	<metadata>
		<title>Security update for python-cffi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1208036" ref_url="https://bugzilla.suse.com/1208036" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-23931" ref_url="https://www.suse.com/security/cve/CVE-2023-23931/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014111.html" source="SUSE-SU"/>
		<description>
This update for python-cffi fixes the following issues:

  - CVE-2023-23931: Fixed memory corruption due to immutable python object being changed (bsc#1208036).

  Bugfixes:

  - Disabled broken tests related to Threads.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-21"/>
	<updated date="2023-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1208036">SUSE bug 1208036</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23931/">CVE-2023-23931 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23931">CVE-2023-23931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009741576" comment="python-cffi-1.10.0-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148730" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1220358" ref_url="https://bugzilla.suse.com/1220358" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-27351" ref_url="https://www.suse.com/security/cve/CVE-2024-27351/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034881.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2024-27351: Align the patch with the upstream one and make it more robust. (bsc#1220358)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220358">SUSE bug 1220358</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27351/">CVE-2024-27351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27351">CVE-2024-27351 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853579" comment="python-Django-1.11.29-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853580" comment="venv-openstack-horizon-x86_64-12.0.5~dev6-14.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148731" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1222262" ref_url="https://bugzilla.suse.com/1222262" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-28219" ref_url="https://www.suse.com/security/cve/CVE-2024-28219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034956.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2024-28219: Fixed buffer overflow in _imagingcms.c (bsc#1222262) 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2024-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222262">SUSE bug 1222262</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-28219/">CVE-2024-28219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28219">CVE-2024-28219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854664" comment="python-Pillow-4.2.1-3.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854665" comment="venv-openstack-horizon-x86_64-12.0.5~dev6-14.58.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148732" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1194521" ref_url="https://bugzilla.suse.com/1194521" source="BUGZILLA"/>
		<reference ref_id="1219048" ref_url="https://bugzilla.suse.com/1219048" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22817" ref_url="https://www.suse.com/security/cve/CVE-2022-22817/" source="CVE"/>
		<reference ref_id="CVE-2023-50447" ref_url="https://www.suse.com/security/cve/CVE-2023-50447/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017823.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

 - CVE-2023-50447: Fixed arbitrary code execution via the environment parameter. (bsc#1219048)
 - CVE-2022-22817: Fixes evaluation of arbitrary expressions via PIL.ImageMath.eval. (bsc#1194521)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-31"/>
	<updated date="2024-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194521">SUSE bug 1194521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219048">SUSE bug 1219048</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22817/">CVE-2022-22817 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22817">CVE-2022-22817 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50447/">CVE-2023-50447 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50447">CVE-2023-50447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845117" comment="python-Pillow-4.2.1-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148733" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 8</platform>
		</affected>
		<reference ref_id="1219683" ref_url="https://bugzilla.suse.com/1219683" source="BUGZILLA"/>
		<reference ref_id="1220358" ref_url="https://bugzilla.suse.com/1220358" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24680" ref_url="https://www.suse.com/security/cve/CVE-2024-24680/" source="CVE"/>
		<reference ref_id="CVE-2024-27351" ref_url="https://www.suse.com/security/cve/CVE-2024-27351/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018161.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2024-24680: Fixed a denial-of-service in intcomma template filter (bsc#1219683).
- CVE-2024-27351: Fixed potential regular expression denial-of-service in ``django.utils.text.Truncator.words()`` (bsc#1220358).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-03-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219683">SUSE bug 1219683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220358">SUSE bug 1220358</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24680/">CVE-2024-24680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24680">CVE-2024-24680 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27351/">CVE-2024-27351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27351">CVE-2024-27351 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851290" comment="python-Django-1.11.29-3.59.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851291" comment="venv-openstack-horizon-x86_64-12.0.5~dev6-14.54.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148734" version="1" class="patch">
	<metadata>
		<title>Security update for slf4j (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1085970" ref_url="https://bugzilla.suse.com/1085970" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8088" ref_url="https://www.suse.com/security/cve/CVE-2018-8088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004199.html" source="SUSE-SU"/>
		<description>
This update for slf4j fixes the following issues:

- CVE-2018-8088: Disallow EventData deserialization by default to avoid arbitrary code execution using serialized data (bsc#1085970)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-19"/>
	<updated date="2018-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085970">SUSE bug 1085970</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8088/">CVE-2018-8088 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8088">CVE-2018-8088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541515" comment="slf4j-1.7.12-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148735" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb, mariadb-connector-c, xtrabackup (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1080891" ref_url="https://bugzilla.suse.com/1080891" source="BUGZILLA"/>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1088681" ref_url="https://bugzilla.suse.com/1088681" source="BUGZILLA"/>
		<reference ref_id="1092544" ref_url="https://bugzilla.suse.com/1092544" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755/" source="CVE"/>
		<reference ref_id="CVE-2018-2759" ref_url="https://www.suse.com/security/cve/CVE-2018-2759/" source="CVE"/>
		<reference ref_id="CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761/" source="CVE"/>
		<reference ref_id="CVE-2018-2766" ref_url="https://www.suse.com/security/cve/CVE-2018-2766/" source="CVE"/>
		<reference ref_id="CVE-2018-2767" ref_url="https://www.suse.com/security/cve/CVE-2018-2767/" source="CVE"/>
		<reference ref_id="CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771/" source="CVE"/>
		<reference ref_id="CVE-2018-2777" ref_url="https://www.suse.com/security/cve/CVE-2018-2777/" source="CVE"/>
		<reference ref_id="CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781/" source="CVE"/>
		<reference ref_id="CVE-2018-2782" ref_url="https://www.suse.com/security/cve/CVE-2018-2782/" source="CVE"/>
		<reference ref_id="CVE-2018-2784" ref_url="https://www.suse.com/security/cve/CVE-2018-2784/" source="CVE"/>
		<reference ref_id="CVE-2018-2786" ref_url="https://www.suse.com/security/cve/CVE-2018-2786/" source="CVE"/>
		<reference ref_id="CVE-2018-2787" ref_url="https://www.suse.com/security/cve/CVE-2018-2787/" source="CVE"/>
		<reference ref_id="CVE-2018-2810" ref_url="https://www.suse.com/security/cve/CVE-2018-2810/" source="CVE"/>
		<reference ref_id="CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813/" source="CVE"/>
		<reference ref_id="CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817/" source="CVE"/>
		<reference ref_id="CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<description>
This MariaDB update to version 10.2.15 brings the following fixes and improvements.

Security issues:

- CVE-2018-2767: The embedded server library now supports SSL when connecting to remote servers (bsc#1088681).
- Collected CVEs fixes:
  * 10.2.15: CVE-2018-2786, CVE-2018-2759, CVE-2018-2777, CVE-2018-2810,
             CVE-2018-2782, CVE-2018-2784, CVE-2018-2787, CVE-2018-2766,
             CVE-2018-2755, CVE-2018-2819, CVE-2018-2817, CVE-2018-2761, 
             CVE-2018-2781, CVE-2018-2771, CVE-2018-2813

Bugfixes:

- bsc#1092544: Update suse_skipped_tests.list and add tests that are failing with GCC 8.
- bsc#1080891: Compile option DWITH_SYSTEMD=ON is no longer needed - systemd is detected automatically.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-21"/>
	<updated date="2018-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1080891">SUSE bug 1080891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088681">SUSE bug 1088681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092544">SUSE bug 1092544</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2755">CVE-2018-2755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2759/">CVE-2018-2759 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2759">CVE-2018-2759 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2761">CVE-2018-2761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2766/">CVE-2018-2766 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2766">CVE-2018-2766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2767/">CVE-2018-2767 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2767">CVE-2018-2767 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2771">CVE-2018-2771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2777/">CVE-2018-2777 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2777">CVE-2018-2777 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2781">CVE-2018-2781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2782/">CVE-2018-2782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2782">CVE-2018-2782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2784/">CVE-2018-2784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2784">CVE-2018-2784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2786/">CVE-2018-2786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2786">CVE-2018-2786 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2787/">CVE-2018-2787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2787">CVE-2018-2787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2810/">CVE-2018-2810 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2810">CVE-2018-2810 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2813">CVE-2018-2813 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2817">CVE-2018-2817 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2819">CVE-2018-2819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596508" comment="libmariadb3-3.0.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596509" comment="mariadb-10.2.15-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596510" comment="mariadb-client-10.2.15-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596511" comment="mariadb-errormessages-10.2.15-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596512" comment="mariadb-galera-10.2.15-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596513" comment="mariadb-tools-10.2.15-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596514" comment="xtrabackup-2.4.10-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148736" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1091764" ref_url="https://bugzilla.suse.com/1091764" source="BUGZILLA"/>
		<reference ref_id="1097375" ref_url="https://bugzilla.suse.com/1097375" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7167" ref_url="https://www.suse.com/security/cve/CVE-2018-7167/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004249.html" source="SUSE-SU"/>
		<description>
This update for nodejs6 to version 6.14.3 fixes the following issues:

The following security vulnerability was addressed:

- Fixed a denial of service (DoS) vulnerability in Buffer.fill(), which could
  hang when being called (CVE-2018-7167, bsc#1097375).

The following other changes were made:

- Use absolute paths in executable shebang lines
- Fixed building with ICU61.1 (bsc#1091764)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-05"/>
	<updated date="2018-07-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091764">SUSE bug 1091764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097375">SUSE bug 1097375</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7167/">CVE-2018-7167 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7167">CVE-2018-7167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597626" comment="nodejs6-6.14.3-11.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148737" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-sprockets-2_12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1098369" ref_url="https://bugzilla.suse.com/1098369" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3760" ref_url="https://www.suse.com/security/cve/CVE-2018-3760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2176-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182176-1.html" source="SUSE-SU"/>
		<description>
This update for rubygem-sprockets-2_12 fixes the following issues:

Security issue fixed:

- CVE-2018-3760: Fix path traversal in sprockets/server.rb:forbidden_request?() that can allow remote attackers to read
  arbitrary files (bsc#1098369).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-02"/>
	<updated date="2018-08-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1098369">SUSE bug 1098369</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3760/">CVE-2018-3760 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3760">CVE-2018-3760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597627" comment="ruby2.1-rubygem-sprockets-2_12-2.12.5-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148738" version="1" class="patch">
	<metadata>
		<title>Security update for grafana, kafka, logstash, openstack-monasca-installer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1090336" ref_url="https://bugzilla.suse.com/1090336" source="BUGZILLA"/>
		<reference ref_id="1090849" ref_url="https://bugzilla.suse.com/1090849" source="BUGZILLA"/>
		<reference ref_id="1094448" ref_url="https://bugzilla.suse.com/1094448" source="BUGZILLA"/>
		<reference ref_id="1095603" ref_url="https://bugzilla.suse.com/1095603" source="BUGZILLA"/>
		<reference ref_id="1096985" ref_url="https://bugzilla.suse.com/1096985" source="BUGZILLA"/>
		<reference ref_id="1097847" ref_url="https://bugzilla.suse.com/1097847" source="BUGZILLA"/>
		<reference ref_id="1101366" ref_url="https://bugzilla.suse.com/1101366" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12099" ref_url="https://www.suse.com/security/cve/CVE-2018-12099/" source="CVE"/>
		<reference ref_id="CVE-2018-3817" ref_url="https://www.suse.com/security/cve/CVE-2018-3817/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004406.html" source="SUSE-SU"/>
		<description>
This update for grafana, kafka, logstash, openstack-monasca-installer fixes the following issues:

Security issues fixed:

- CVE-2018-12099: grafana: Fix XSS vulnerabilities in dashboard links (bsc#1096985).
- CVE-2018-3817: logstash: Fix inadvertently logging of sensitive information (bsc#1090849).

Bug fixes:

- bsc#1095603: Disable jmxremote debugging.
- bsc#1097847: Make time series database schema setup conditional.
- bsc#1094448: Set log rotation options.
- bsc#1090336: Add complete set of elasticsearch performance tunables.
- bsc#1101366: Fix build issues with s390x, ppc64le and aarch64.
- Fix various spec errors affecting Leap 15 and Tumbleweed 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1090336">SUSE bug 1090336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090849">SUSE bug 1090849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094448">SUSE bug 1094448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095603">SUSE bug 1095603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096985">SUSE bug 1096985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097847">SUSE bug 1097847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101366">SUSE bug 1101366</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12099/">CVE-2018-12099 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12099">CVE-2018-12099 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3817/">CVE-2018-3817 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3817">CVE-2018-3817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596515" comment="grafana-4.5.1-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596516" comment="kafka-0.9.0.1-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596517" comment="logstash-2.4.1-5.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596518" comment="openstack-monasca-installer-20180622_15.06-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148739" version="1" class="patch">
	<metadata>
		<title>Security update for crowbar, crowbar-core, crowbar-ha, crowbar-init, crowbar-openstack, crowbar-ui (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1005886" ref_url="https://bugzilla.suse.com/1005886" source="BUGZILLA"/>
		<reference ref_id="1073703" ref_url="https://bugzilla.suse.com/1073703" source="BUGZILLA"/>
		<reference ref_id="1081518" ref_url="https://bugzilla.suse.com/1081518" source="BUGZILLA"/>
		<reference ref_id="1083093" ref_url="https://bugzilla.suse.com/1083093" source="BUGZILLA"/>
		<reference ref_id="1090336" ref_url="https://bugzilla.suse.com/1090336" source="BUGZILLA"/>
		<reference ref_id="1093898" ref_url="https://bugzilla.suse.com/1093898" source="BUGZILLA"/>
		<reference ref_id="1095420" ref_url="https://bugzilla.suse.com/1095420" source="BUGZILLA"/>
		<reference ref_id="1096043" ref_url="https://bugzilla.suse.com/1096043" source="BUGZILLA"/>
		<reference ref_id="1096759" ref_url="https://bugzilla.suse.com/1096759" source="BUGZILLA"/>
		<reference ref_id="1098369" ref_url="https://bugzilla.suse.com/1098369" source="BUGZILLA"/>
		<reference ref_id="1099392" ref_url="https://bugzilla.suse.com/1099392" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8611" ref_url="https://www.suse.com/security/cve/CVE-2016-8611/" source="CVE"/>
		<reference ref_id="CVE-2018-3760" ref_url="https://www.suse.com/security/cve/CVE-2018-3760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004567.html" source="SUSE-SU"/>
		<description>
This update for crowbar, crowbar-ha, crowbar-init, crowbar-openstack, crowbar-ui fixes the following issues:

This security issues was fixed:

- CVE-2018-3760: Upgrade rubygem-sprockets to prevent an information leak.
  Specially crafted requests could have been be used to access files that exists
  on the filesystem that is outside an application's root directory, when the
  Sprockets server is used in production (bsc#1098369).
- CVE-2016-861: Add rate limiting for glance api (bsc#1005886)

These non-security issues were fixed for crowbar:

- upgrade: Lock crowbar-ui before admin upgrade
- upgrade: Make sure schemas are properly migrated after the upgrade
- upgrade: No need for database dump before the upgrade
- upgrade: No need to use crowbar-init during the upgrade

These non-security issues were fixed for crowbar-core:

- upgrade: Remove pre-upgrade constraints from existing locations
- upgrade: Show the grep result when checking for not-migrated instances
- upgrade: Set clone_stateless_services to false on upgrade
- control_lib: fix host allocation check
- Fix exception handling in get_log_lines
- apache: copytruncate apache logs bsc#1083093
- upgrade: Refresh repos before crowbar-ui update (bsc#1099392)
- upgrade: Reset RabbitMQ nodes during upgrade
- upgrade: Do not allow cinder-volume on compute nodes
- upgrade: Wait until all nova-compute services are up before evacuation
- upgrade: Save the information which set of nodes should be upgraded
- Let skip_unready_nodes skip also nodes that are in crowbar_upgrade state
- upgrade: Add missing brackets checking for nodes
- upgrade: Make sure postponed nodes can be skipped when applying proposal
- upgrade: When the upgrade is not finished, show a link to wizard
- upgrade: Correctly delete remaining upgrade scripts
- upgrade: Wait for services shutdown to finish
- upgrade: Unlock crowbar-ui after completed upgrade
- upgrade: Stop cron before stopping any other service
- upgrade: Provide better information after the failure
- upgrade: Report missing scripts
- upgrade: Better check for upgraded nodes - do not rely on state
- upgrade: Improve error messages with lists
- upgrade: Check input is a valid node for nodes
- upgrade: Delete upgrade scripts really at the end of upgrade
- upgrade: Increase the timeout for deleting pacemaker resources
- upgrade: Adapt the check for upgraded? value
- upgrade: Move step to mark the admin upgrade end
- upgrade: Do not finalize nodes that are not upgraded
- upgrade: Fix file layout for rails' autoloading (bsc#1096759)
- upgrade: Deleting cinder services from database no longer needed
- upgrade: Allow postpone and resume of compute nodes upgrade
- upgrade: Allow the access to controller actions when upgrade is postponed
- upgrade: Finalize upgrade of controller nodes after they are done
- upgrade: Added API calls for postponing/resuming compute nodes upgrade
- upgrade: Unblock upgrade status API in Cloud8
- upgrade: Do not end admin step while it is still running (bsc#1095420)
- upgrade: Adapt ceph-related checks to 7-8 upgrade
- upgrade: Allow running schema migrations on upgrade
- upgrade: Fix platform retrieval

These non-security issues were fixed for crowbar-ha:

- pacemaker: allow multiple meta parameters (bsc#1093898)
- haproxy: active-active mode, just one VIP

These non-security issues were fixed for crowbar-openstack:

- Synchronize SSL in the cluster (bsc#1081518)
- neutron: add force_metadata attribute
- rabbitmq: set client timout to default value
- /etc/sysctl.d/99-sysctl.conf is a symlink to /etc/sysctl.conf
- Do not automatically put manila-share roles to compute nodes
- rabbitmq: check for rabbit readiness
- rabbitmq: Make sure rabbit is running on cluster
- monasca: various monasca-installer improvements
- monasca: reduce monasca-installer runs (bsc#1096043)
- manila: Correct field name for cluster name
- Do not mark [:nova][:db_synced] too early
- nova: Do not do partial online migrations, that was Newton specific
- monasca: add elasticsearch tunables (bsc#1090336)
- copytruncate apache logs instead of creating
- rabbitmq: Better dependency check
- aodh: Add config for alarm_history_ttl (bsc#1073703)
- upgrade: cinder: run live migrations at correct rev

These non-security issues were fixed for crowbar-ui:

- upgrade: Dummy backend for status testing
- upgrade: Refactor postpone nodes upgrade
- upgrade: Allow interruption of status wait loop
- upgrade: Added ability to postpone upgrade nodes
- upgrade: Add ability to postpone upgrade nodes
- upgrade: Add ability to postpone upgrade nodes
- upgrade: Add ability to postpone upgrade nodes
- Add ability to postpone upgrade
- upgrade: Remove openstack precheck
- upgrade: Fixed error key for ha_configured
- upgrade: Remove CEPH related code
- Remove the non-essential database-configuration controller
- remove ui typo test
- Remove database configuration option
- upgrade: Update SUSE-OpenStack-Cloud-8 label
- upgrade: Update admin and nodes repo names
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-20"/>
	<updated date="2018-09-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005886">SUSE bug 1005886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073703">SUSE bug 1073703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081518">SUSE bug 1081518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083093">SUSE bug 1083093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090336">SUSE bug 1090336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093898">SUSE bug 1093898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095420">SUSE bug 1095420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096043">SUSE bug 1096043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096759">SUSE bug 1096759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098369">SUSE bug 1098369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099392">SUSE bug 1099392</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8611/">CVE-2016-8611 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8611">CVE-2016-8611 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3760/">CVE-2018-3760 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3760">CVE-2018-3760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597628" comment="crowbar-5.0+git.1528696845.81a7b5d0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597629" comment="crowbar-core-5.0+git.1533887407.6e9b0412d-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597630" comment="crowbar-core-branding-upstream-5.0+git.1533887407.6e9b0412d-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597631" comment="crowbar-devel-5.0+git.1528696845.81a7b5d0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597632" comment="crowbar-ha-5.0+git.1530177874.35b9099-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597633" comment="crowbar-init-5.0+git.1520420379.d5bbb35-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597634" comment="crowbar-openstack-5.0+git.1534167599.d325ef804-4.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597635" comment="crowbar-ui-1.2.0+git.1533844061.4ac8e723-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148740" version="1" class="patch">
	<metadata>
		<title>Security update for OpenStack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1084362" ref_url="https://bugzilla.suse.com/1084362" source="BUGZILLA"/>
		<reference ref_id="1102151" ref_url="https://bugzilla.suse.com/1102151" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14432" ref_url="https://www.suse.com/security/cve/CVE-2018-14432/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004566.html" source="SUSE-SU"/>
		<description>
This update for OpenStack fixes the following issues:

The following security issue with openstack-keystone has been fixed:

- CVE-2018-14432: Reduce duplication in federated authentication APIs. (bsc#1102151)

Additionally, the following non-security issues have been fixed:

aodh:

- Support same projects in different domain.

barbican:

- Add zuulv3 to Pike.

cinder:

- Empty option value maybe cause Unity driver failed to initialize.
- GoodnessWeigher schedules non-type volumes.
- Fix quota error when deleting temporary volume.
- Fix cinder quota-usage error.
- Unity: Return logged-out initiators.
- Correct S-Series to DS-Series systems.
- Update storage backends supported for Lenovo.
- Unity: Add support of removing empty host.
- NetApp: Fix to support SVM scoped permissions.
- NetApp ONTAP iSCSI: Force exception on online extend.
- NetApp ONTAP: Set new sub-lun clone limit for ONTAP driver.

dashboard:

- Make @memoize thread-aware.

designate:

- Add provides to handle installation of mdns and producer seamlessly.
- Fix service files.
- Install a default pools.yaml.

glance:

- doc: Modify the description for the command.
- Make ImageTarget behave like a dictionary.
- Add barbican-tempest experimental job.

heat:

- Fixing unicode issue when to\_dict is called on py2.7 env.
- Ignore NotFound error in prepare\_for\_replace.
- Reset resource replaced\_by field for rollback.
- Ignore RESOLVE translation errors when translating before\_props.
- Ignore errors in purging events.

heat-templates:

- Deprecate hooks in heat-templates.

horizon-plugin-designate-ui:

- Install all designate panels that are available.

horizon-plugin-freezer-ui:

- Avoid using deprecated opt in Web-UI.

horizon-plugin-gbp-ui:

- Fix patching of create instance dialog.

neutron-lbaas-dashboard:

- Remove custom zuul jobs.

horizon-plugin-trove-ui:

- Update UPPER\_CONSTRAINTS\_FILE for stable/pike.

ironic:

- Fix error when deleting a non-existent port.
- Tear down console during unprovisioning.

manila:

- Fix ZFSOnLinux doc about manage ops.
- DB Migration: Fix downgrade.
- Fix share-service VM restart problem.
- Added Handling Newer Quobyte API Error Codes.
- NetApp ONTAP: Fix delete-share for vsadmin users.
- Remove confusing DB deprecation messages.
- Add missing Requires: for python-tooz

neutron:


- Skip MTU check during deletion of Networks.
- HA L3 agent restart only standby agents.
- Retry dhcp\_release on failures.
- Reduce IP address collision during port creating.
- Refactor DVR HA migarations DB operations.
- Disallow router interface out of subnet IP range.
- Fix fwaas v1 configuration doc.
- Add list of all working DSCP marks.
- Set trusted port only once in iptables firewall driver.
- Fix UT BridgeLibTest when IPv6 is disabled.

neutron-fwaas:

- DVR-FWaaS: Fix DVR FWaaS rules for fipnamespace.

neutron-lbaas:

- Get providers directly from ORM to make startup take half as long.
- Cap haproxy log level severity.
- Fix sphinx-docs job for stable branch.

neutron-vpnaas:

- Fix sphinx-docs job for stable branch and pep8 issues.

neutron-zvm-agent:

- Backport zCC backend networking-zvm.

nova:

- libvirt: Add method to configure migration speed.
- Make host\_aggregate\_map dictionary case-insensitive.
- Fix unbound local when saving an unchanged RequestSpec.
- Cleanup mapping/reqspec after archive instance.
- Default embedded instance.flavor.disabled attribute.
- Backport tox.ini to switch to stestr.
- Cleanup RP and HM records while deleting a compute service.
- Delete allocations from API if nova-compute is down.
- Block deleting compute services which are hosting instances.
- api-ref: Add a note in DELETE /os-services about deleting computes.
- Add functional test for deleting a compute service.
- Factor out compute service start in ServerMovingTest.
- Moving more utils to ProviderUsageBaseTestCase.
- Make nova service-list use scatter-gather routine.
- libvirt: Slow live-migration to ensure network is ready.
- Use instance project/user when creating RequestSpec during resize reschedule.
- Mock utils.execute() in qemu-img unit test.
- Add policy rule to block image-backed servers with 0 root disk flavor.
- Change consecutive build failure limit to a weigher.
- Ensure resource class cache when listing usages.
- Metadata-API fails to retrieve avz for instances created before Pike.
- placement: Fix HTTP error generation.
- Add amd-ssbd and amd-no-ssb CPU flags.
- Fixed auto-convergence option name in doc.
- libvirt: Skip fetching the virtual size of block devices.
- libvirt: Handle DiskNotFound during update\_available\_resource.
- Avoid showing password in log.
- Fix shelving a paused instance.
- Document how to disable notifications.
- Add ssbd and virt-ssbd flags to cpu\_model\_extra\_flags whitelist.
- Stringify instance UUID.

nova-virt-zvm:

- Backport zvm driver.

octavia:

- Update introduction documention page.
- Use HMAC.hexdigest to avoid non-ascii characters for package data.

trove:

- Add .stestr.conf to fix tox-py27 stable job.
- Fix mysql instance create failed when enable skip-name-resolve.
- Failed to build mongo image.
- Open the volume\_support of redis.
- Remove Mitaka reference in install/dashboard.rst.
- Enable longer Keystone token life.
- Fix gate issues.

python-barbicanclient:

- Update time for functional tests. (bsc#1084362)

python-keystone-json-assignment:

- Speedup project lookup.

python-manilaclient:

- Fix for use endpoint_type in _discover_client method.
- Add search_opts in func list of ManagerWithFind type classes.
- Fix share can not be found by name in admin context.

python-vmware-nsx:

- NSX|V3: Handle port-not-found during get_ports.
- NSXAdminV3: Add message on client cert generation.
- NSX-V: Add server-ip-address to the supported dhcp options.
- NSX|V3: Fix global SG creation duplication.
- Fix security groups ext_properties loading.
- NSXv3: Add pool-level lock for LB pool member operations.
- NSX|v3: Do not retry on DB duplications on section init.
- NSXv: Handle listener failures on backend.
- Add mock to the requirements.
- AdminUtils V3: Do not set nat_pass for NO-NAT rules.
- NSX|V3: Wait for another neutron to create default section.
- NSX|V3: Cleanup duplicate sections on startup.
- V and D: Make security group logging more robust.
- NSX|v3: Ensure that 0.0.0.0/# is treated correctly in SG rules.
- NSX|V: Fix create/delete subnet race condition.

python-vmware-nsxlib:

- Fix service ports for egress firewall rule.
- Add server-ip-address to the suppoprted dhcp options.
- Retry on 503 Service Unavailable.
- Remove sha224 from supported client cert hash algs.
- Add logging when initializing a default FW section.
- Fixed tenacity usage.
- Retry is IOError is received.
- Handle cluster connection closed by server.		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-20"/>
	<updated date="2018-09-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1084362">SUSE bug 1084362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102151">SUSE bug 1102151</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14432/">CVE-2018-14432 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14432">CVE-2018-14432 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596520" comment="openstack-aodh-5.1.1~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596521" comment="openstack-aodh-api-5.1.1~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596522" comment="openstack-aodh-doc-5.1.1~dev5-3.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596523" comment="openstack-aodh-evaluator-5.1.1~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596524" comment="openstack-aodh-expirer-5.1.1~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596525" comment="openstack-aodh-listener-5.1.1~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596526" comment="openstack-aodh-notifier-5.1.1~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596527" comment="openstack-barbican-5.0.1~dev11-3.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596528" comment="openstack-barbican-api-5.0.1~dev11-3.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596529" comment="openstack-barbican-doc-5.0.1~dev11-3.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596530" comment="openstack-barbican-keystone-listener-5.0.1~dev11-3.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596531" comment="openstack-barbican-retry-5.0.1~dev11-3.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596532" comment="openstack-barbican-worker-5.0.1~dev11-3.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596533" comment="openstack-cinder-11.1.2~dev14-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596534" comment="openstack-cinder-api-11.1.2~dev14-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596535" comment="openstack-cinder-backup-11.1.2~dev14-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596536" comment="openstack-cinder-doc-11.1.2~dev14-3.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596537" comment="openstack-cinder-scheduler-11.1.2~dev14-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596538" comment="openstack-cinder-volume-11.1.2~dev14-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596539" comment="openstack-dashboard-12.0.4~dev1-3.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596540" comment="openstack-designate-5.0.2~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596541" comment="openstack-designate-agent-5.0.2~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596542" comment="openstack-designate-api-5.0.2~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596543" comment="openstack-designate-central-5.0.2~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596544" comment="openstack-designate-doc-5.0.2~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596545" comment="openstack-designate-producer-5.0.2~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596546" comment="openstack-designate-sink-5.0.2~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596547" comment="openstack-designate-worker-5.0.2~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596548" comment="openstack-glance-15.0.2~dev4-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596549" comment="openstack-glance-api-15.0.2~dev4-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596550" comment="openstack-glance-doc-15.0.2~dev4-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596551" comment="openstack-glance-registry-15.0.2~dev4-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596552" comment="openstack-heat-9.0.5~dev11-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596553" comment="openstack-heat-api-9.0.5~dev11-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596554" comment="openstack-heat-api-cfn-9.0.5~dev11-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596555" comment="openstack-heat-api-cloudwatch-9.0.5~dev11-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596556" comment="openstack-heat-doc-9.0.5~dev11-3.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596557" comment="openstack-heat-engine-9.0.5~dev11-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596558" comment="openstack-heat-plugin-heat_docker-9.0.5~dev11-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596559" comment="openstack-heat-templates-0.0.0+git.1525957319.6b5a7cd-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596560" comment="openstack-heat-test-9.0.5~dev11-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596561" comment="openstack-horizon-plugin-designate-ui-5.0.2~dev5-3.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596562" comment="openstack-horizon-plugin-freezer-ui-5.0.1~dev6-3.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596563" comment="openstack-horizon-plugin-gbp-ui-5.0.1~dev21-4.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596564" comment="openstack-horizon-plugin-manila-ui-2.10.3~dev4-4.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596565" comment="openstack-horizon-plugin-neutron-lbaas-ui-3.0.3~dev2-3.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596566" comment="openstack-horizon-plugin-trove-ui-9.0.1~dev7-3.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596567" comment="openstack-ironic-9.1.5~dev7-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596568" comment="openstack-ironic-api-9.1.5~dev7-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596569" comment="openstack-ironic-conductor-9.1.5~dev7-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596570" comment="openstack-ironic-doc-9.1.5~dev7-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596571" comment="openstack-keystone-12.0.1~dev19-5.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596572" comment="openstack-keystone-doc-12.0.1~dev19-5.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596573" comment="openstack-manila-5.0.2~dev55-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596574" comment="openstack-manila-api-5.0.2~dev55-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596575" comment="openstack-manila-data-5.0.2~dev55-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596576" comment="openstack-manila-doc-5.0.2~dev55-3.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596577" comment="openstack-manila-scheduler-5.0.2~dev55-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596578" comment="openstack-manila-share-5.0.2~dev55-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596579" comment="openstack-neutron-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596580" comment="openstack-neutron-dhcp-agent-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596581" comment="openstack-neutron-doc-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596582" comment="openstack-neutron-fwaas-11.0.2~dev7-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596583" comment="openstack-neutron-fwaas-doc-11.0.2~dev7-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596584" comment="openstack-neutron-ha-tool-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596585" comment="openstack-neutron-l3-agent-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596586" comment="openstack-neutron-lbaas-11.0.4~dev4-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596587" comment="openstack-neutron-lbaas-agent-11.0.4~dev4-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596588" comment="openstack-neutron-lbaas-doc-11.0.4~dev4-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596589" comment="openstack-neutron-linuxbridge-agent-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596590" comment="openstack-neutron-macvtap-agent-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596591" comment="openstack-neutron-metadata-agent-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596592" comment="openstack-neutron-metering-agent-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596593" comment="openstack-neutron-openvswitch-agent-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596594" comment="openstack-neutron-server-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596595" comment="openstack-neutron-vpn-agent-11.0.1~dev1-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596596" comment="openstack-neutron-vpnaas-11.0.1~dev1-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596597" comment="openstack-neutron-vpnaas-doc-11.0.1~dev1-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596598" comment="openstack-neutron-vyatta-agent-11.0.1~dev1-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596599" comment="openstack-neutron-zvm-agent-8.0.1~dev12-4.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596600" comment="openstack-nova-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596601" comment="openstack-nova-api-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596602" comment="openstack-nova-cells-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596603" comment="openstack-nova-compute-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596604" comment="openstack-nova-conductor-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596605" comment="openstack-nova-console-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596606" comment="openstack-nova-consoleauth-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596607" comment="openstack-nova-doc-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596608" comment="openstack-nova-novncproxy-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596609" comment="openstack-nova-placement-api-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596610" comment="openstack-nova-scheduler-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596611" comment="openstack-nova-serialproxy-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596612" comment="openstack-nova-virt-zvm-8.0.1~dev56-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596613" comment="openstack-nova-vncproxy-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596614" comment="openstack-octavia-1.0.3~dev21-4.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596615" comment="openstack-octavia-amphora-agent-1.0.3~dev21-4.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596616" comment="openstack-octavia-api-1.0.3~dev21-4.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596617" comment="openstack-octavia-health-manager-1.0.3~dev21-4.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596618" comment="openstack-octavia-housekeeping-1.0.3~dev21-4.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596619" comment="openstack-octavia-worker-1.0.3~dev21-4.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596620" comment="openstack-trove-8.0.1~dev11-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596621" comment="openstack-trove-api-8.0.1~dev11-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596622" comment="openstack-trove-conductor-8.0.1~dev11-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596623" comment="openstack-trove-doc-8.0.1~dev11-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596624" comment="openstack-trove-guestagent-8.0.1~dev11-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596625" comment="openstack-trove-taskmanager-8.0.1~dev11-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596626" comment="python-aodh-5.1.1~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596627" comment="python-barbican-5.0.1~dev11-3.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596628" comment="python-barbicanclient-4.5.2-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596629" comment="python-barbicanclient-doc-4.5.2-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596630" comment="python-cinder-11.1.2~dev14-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596631" comment="python-designate-5.0.2~dev5-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596632" comment="python-glance-15.0.2~dev4-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596633" comment="python-heat-9.0.5~dev11-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596634" comment="python-horizon-12.0.4~dev1-3.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596635" comment="python-horizon-plugin-designate-ui-5.0.2~dev5-3.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596636" comment="python-horizon-plugin-freezer-ui-5.0.1~dev6-3.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596637" comment="python-horizon-plugin-gbp-ui-5.0.1~dev21-4.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596638" comment="python-horizon-plugin-manila-ui-2.10.3~dev4-4.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596639" comment="python-horizon-plugin-neutron-lbaas-ui-3.0.3~dev2-3.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596640" comment="python-horizon-plugin-trove-ui-9.0.1~dev7-3.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596641" comment="python-ironic-9.1.5~dev7-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596642" comment="python-keystone-12.0.1~dev19-5.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596643" comment="python-keystone-json-assignment-0.0.2-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596644" comment="python-manila-5.0.2~dev55-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596645" comment="python-manilaclient-1.17.3-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596646" comment="python-manilaclient-doc-1.17.3-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596647" comment="python-neutron-11.0.6~dev63-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596648" comment="python-neutron-fwaas-11.0.2~dev7-3.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596649" comment="python-neutron-lbaas-11.0.4~dev4-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596650" comment="python-neutron-vpnaas-11.0.1~dev1-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596651" comment="python-nova-16.1.5~dev49-3.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596652" comment="python-octavia-1.0.3~dev21-4.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596653" comment="python-trove-8.0.1~dev11-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596654" comment="python-vmware-nsx-11.0.3~dev16-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596655" comment="python-vmware-nsxlib-11.0.4~dev7-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148741" version="1" class="patch">
	<metadata>
		<title>Security update for couchdb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1100973" ref_url="https://bugzilla.suse.com/1100973" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8007" ref_url="https://www.suse.com/security/cve/CVE-2018-8007/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004569.html" source="SUSE-SU"/>
		<description>
This update for couchdb fixes the following security issues:

- CVE-2018-8007: Apache CouchDB administrative users can configure the database
  server via HTTP(S). Due to insufficient validation of administrator-supplied
  configuration settings via the HTTP API, it was possible for a CouchDB
  administrator user to escalate their privileges to that of the operating
  system's user that CouchDB runs under, by bypassing the blacklist of
  configuration settings that are not allowed to be modified via the HTTP API
  (bsc#1100973)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-20"/>
	<updated date="2018-09-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100973">SUSE bug 1100973</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8007/">CVE-2018-8007 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8007">CVE-2018-8007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597636" comment="couchdb-1.7.2-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148742" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097748" ref_url="https://bugzilla.suse.com/1097748" source="BUGZILLA"/>
		<reference ref_id="1105019" ref_url="https://bugzilla.suse.com/1105019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-12115" ref_url="https://www.suse.com/security/cve/CVE-2018-12115/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004580.html" source="SUSE-SU"/>
		<description>
This update for nodejs6 to version 6.14.4 fixes the following issues:

Security issues fixed:

CVE-2018-12115: Fixed an out-of-bounds (OOB) write in Buffer.write() for UCS-2 encoding (bsc#1105019)
CVE-2018-0732: Upgrade to OpenSSL 1.0.2p, fixing a client DoS due to large DH parameter (bsc#1097158)

Other issues fixed:

- Recommend same major version npm package (bsc#1097748)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097748">SUSE bug 1097748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105019">SUSE bug 1105019</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0732">CVE-2018-0732 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12115/">CVE-2018-12115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12115">CVE-2018-12115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597637" comment="nodejs6-6.14.4-11.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148743" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1101820" ref_url="https://bugzilla.suse.com/1101820" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10903" ref_url="https://www.suse.com/security/cve/CVE-2018-10903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004808.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2018-10903: The finalize_with_tag API did not enforce a minimum tag
  length. If a user did not validate the input length prior to passing it to
  finalize_with_tag an attacker could craft an invalid payload with a shortened
  tag (e.g. 1 byte) such that they would have a 1 in 256 chance of passing the
  MAC check. GCM tag forgeries could have caused key leakage (bsc#1101820)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-29"/>
	<updated date="2018-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101820">SUSE bug 1101820</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10903/">CVE-2018-10903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10903">CVE-2018-10903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596672" comment="python-cryptography-2.0.3-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148744" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1102680" ref_url="https://bugzilla.suse.com/1102680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14574" ref_url="https://www.suse.com/security/cve/CVE-2018-14574/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004807.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2018-14574: Prevent open redirect in
  django.middleware.common.CommonMiddleware (bsc#1102680)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-29"/>
	<updated date="2018-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1102680">SUSE bug 1102680</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14574/">CVE-2018-14574 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14574">CVE-2018-14574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596673" comment="python-Django-1.11.11-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148745" version="1" class="patch">
	<metadata>
		<title>Security update for ardana-monasca, ardana-spark, kafka, kafka-kit, openstack-monasca-api (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1094851" ref_url="https://bugzilla.suse.com/1094851" source="BUGZILLA"/>
		<reference ref_id="1094971" ref_url="https://bugzilla.suse.com/1094971" source="BUGZILLA"/>
		<reference ref_id="1102662" ref_url="https://bugzilla.suse.com/1102662" source="BUGZILLA"/>
		<reference ref_id="1102920" ref_url="https://bugzilla.suse.com/1102920" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1288" ref_url="https://www.suse.com/security/cve/CVE-2018-1288/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004812.html" source="SUSE-SU"/>
		<description>
This update for ardana-monasca, ardana-spark, kafka, kafka-kit, openstack-monasca-api fixes the following issues:

This update for ardana-monasca to version 8.0+git.1535031421.9262a47 fixes these issues:

- Requests Apache to reload on change (bsc#1102662)
- Avoids managing non-Monasca users (bsc#1102662)
- Line up perms on storm.conf to match rpm (bsc#1094971)

This update for ardana-spark to version 8.0+git.1532114050.04654a8 fixes this issue:

- Only set log dir perms on legacy install (bsc#1094851)

This update for kafka to version 0.10.2.2 fixes this security issue:

- CVE-2018-1288: Authenticated Kafka users may have performed action reserved
  for the Broker via a manually created fetch request interfering with data
  replication, resulting in data loss (bsc#1102920).

This update for kafka to version 0.10.2.2 fixes these non-security issues:

- set internal.leave.group.on.close to false in KafkaStreams
- Improve message for Kafka failed startup with non-Kafka data in data.dirs
- add max_number _of_retries to exponential backoff strategy
- Mute logger for reflections.org at the warn level in system tests
- Kafka connect: error with special characters in connector name
- streams task gets stuck after re-balance due to LockException
- CachingSessionStore doesn't use the default keySerde.
- RocksDBSessionStore doesn't use default aggSerde.
- Recommended values for Connect transformations contain the wrong class name
- Kafka broker fails to start if a topic containing dot in its name is marked for delete but hasn't been deleted during previous uptime
- GlobalKTable does not checkpoint offsets after restoring state
- Log cleaning can increase message size and cause cleaner to crash with buffer overflow
- Some socket connections not closed after restart of Kafka Streams
- Distributed Herder Deadlocks on Shutdown
- Log cleaner fails due to large offset in segment file
- StreamsKafkaClient should not use StreamsConfig.POLL_MS_CONFIG
- Refactor kafkatest docker support
- ducktape kafka service: do not assume Service contains num_nodes
- Using _DUCKTAPE_OPTIONS has no effect on executing tests
- Connect WorkerSinkTask out of order offset commit can lead to inconsistent state
- RocksDB segments not removed when store is closed causes re-initialization to fail
- FetchMetadata creates unneeded Strings on instantiation
- SourceTask#stop() not called after exception raised in poll()
- Sink connectors that explicitly 'resume' topic partitions can resume a paused task
- GlobalStateManagerImpl should not write offsets of in-memory stores in checkpoint file
- Source KTable checkpoint is not correct
- ConnectSchema#equals() broken for array-typed default values

This update for openstack-monasca-api to version 2.2.1~dev24 fixes these issues:

- devstack: download storm from archive.apache.org
- Backport tempest test robustness improvements
- 1724543-fixed kafka partition creation error in devstack installation
- Fix:No alarms created if metric name in alarm def. expr. is mix case
- Zuul: Remove project name
- Run against Pike requirements
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-30"/>
	<updated date="2018-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1094851">SUSE bug 1094851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094971">SUSE bug 1094971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102662">SUSE bug 1102662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102920">SUSE bug 1102920</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1288/">CVE-2018-1288 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1288">CVE-2018-1288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596676" comment="kafka-0.10.2.2-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596677" comment="openstack-monasca-api-2.2.1~dev24-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596678" comment="python-monasca-api-2.2.1~dev24-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148746" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1097775" ref_url="https://bugzilla.suse.com/1097775" source="BUGZILLA"/>
		<reference ref_id="1099805" ref_url="https://bugzilla.suse.com/1099805" source="BUGZILLA"/>
		<reference ref_id="1099808" ref_url="https://bugzilla.suse.com/1099808" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10855" ref_url="https://www.suse.com/security/cve/CVE-2018-10855/" source="CVE"/>
		<reference ref_id="CVE-2018-10874" ref_url="https://www.suse.com/security/cve/CVE-2018-10874/" source="CVE"/>
		<reference ref_id="CVE-2018-10875" ref_url="https://www.suse.com/security/cve/CVE-2018-10875/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004967.html" source="SUSE-SU"/>
		<description>
This update for ansible fixes the following issues:

Ansible was updated to ansible 2.4.6.0.

The full release notes can be found on:

	https://github.com/ansible/ansible/blob/stable-2.4/CHANGELOG.md

Security issues fixed:

- CVE-2018-10875: ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing the attacker to execute arbitrary code. (bsc#1099808)
- CVE-2018-10874: It was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result. (bsc#1099805)
- CVE-2018-10855: Ansible did not honor the no_log task flag for failed tasks. When the no_log flag has been used to protect sensitive data passed to a task from being logged, and that task does not run successfully, Ansible will expose sensitive data in log files and on the terminal of the user running Ansible. (bsc#1097775)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097775">SUSE bug 1097775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099805">SUSE bug 1099805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099808">SUSE bug 1099808</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10855/">CVE-2018-10855 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10855">CVE-2018-10855 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10874/">CVE-2018-10874 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10874">CVE-2018-10874 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10875/">CVE-2018-10875 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10875">CVE-2018-10875 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596680" comment="ansible-2.4.6.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148747" version="1" class="patch">
	<metadata>
		<title>Recommended update for ardana-ansible, ardana-cobbler, ardana-db, ardana-heat, ardana-manila, ardana-neutron, ardana-nova, ardana-octavia, ardana-osconfig, ardana-service, ardana-ses, ardana-swift, ardana-tempest, crowbar, crowbar-core, crowbar-ha, crowbar-openstack, documentation-suse-openstack-cloud, galera-python-clustercheck, openstack-dashboard, openstack-ec2-api, openstack-heat, openstack-heat-templates, openstack-horizon-plugin-ironic-ui, openstack-horizon-plugin-magnum-ui, openstack-horizon-plugin-sahara-ui, openstack-ironic, openstack-keystone, openstack-magnum, openstack-manila, openstack-monasca-api, openstack-monasca-notification, openstack-monasca-persister, openstack-murano, openstack-neutron, openstack-neutron-fwaas, openstack-nova, openstack-octavia, openstack-sahara, openstack-swift, openstack-tempest, python-cinderclient, python-cryptography, python-monasca-common, python-networking-hyperv, python-os-brick, python-venvjail, venv-openstack-aodh, venv-openstack-barbican, venv-openstack-ceilometer, venv-openstack-cinder, venv-openstack-designate, venv-openstack-freezer, venv-openstack-glance, venv-openstack-heat, venv-openstack-horizon, venv-openstack-ironic, venv-openstack-keystone, venv-openstack-magnum, venv-openstack-manila, venv-openstack-monasca, venv-openstack-monasca-ceilometer, venv-openstack-murano, venv-openstack-nova, venv-openstack-octavia, venv-openstack-sahara, venv-openstack-swift, venv-openstack-trove (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1063535" ref_url="https://bugzilla.suse.com/1063535" source="BUGZILLA"/>
		<reference ref_id="1094690" ref_url="https://bugzilla.suse.com/1094690" source="BUGZILLA"/>
		<reference ref_id="1105822" ref_url="https://bugzilla.suse.com/1105822" source="BUGZILLA"/>
		<reference ref_id="1111634" ref_url="https://bugzilla.suse.com/1111634" source="BUGZILLA"/>
		<reference ref_id="1111635" ref_url="https://bugzilla.suse.com/1111635" source="BUGZILLA"/>
		<reference ref_id="1114632" ref_url="https://bugzilla.suse.com/1114632" source="BUGZILLA"/>
		<reference ref_id="1116501" ref_url="https://bugzilla.suse.com/1116501" source="BUGZILLA"/>
		<reference ref_id="1116686" ref_url="https://bugzilla.suse.com/1116686" source="BUGZILLA"/>
		<reference ref_id="1122053" ref_url="https://bugzilla.suse.com/1122053" source="BUGZILLA"/>
		<reference ref_id="1122237" ref_url="https://bugzilla.suse.com/1122237" source="BUGZILLA"/>
		<reference ref_id="1122875" ref_url="https://bugzilla.suse.com/1122875" source="BUGZILLA"/>
		<reference ref_id="1124017" ref_url="https://bugzilla.suse.com/1124017" source="BUGZILLA"/>
		<reference ref_id="1124022" ref_url="https://bugzilla.suse.com/1124022" source="BUGZILLA"/>
		<reference ref_id="1125180" ref_url="https://bugzilla.suse.com/1125180" source="BUGZILLA"/>
		<reference ref_id="1125216" ref_url="https://bugzilla.suse.com/1125216" source="BUGZILLA"/>
		<reference ref_id="1127752" ref_url="https://bugzilla.suse.com/1127752" source="BUGZILLA"/>
		<reference ref_id="1128479" ref_url="https://bugzilla.suse.com/1128479" source="BUGZILLA"/>
		<reference ref_id="1128928" ref_url="https://bugzilla.suse.com/1128928" source="BUGZILLA"/>
		<reference ref_id="1130414" ref_url="https://bugzilla.suse.com/1130414" source="BUGZILLA"/>
		<reference ref_id="127227" ref_url="https://bugzilla.suse.com/127227" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000807" ref_url="https://www.suse.com/security/cve/CVE-2018-1000807/" source="CVE"/>
		<reference ref_id="CVE-2018-1000808" ref_url="https://www.suse.com/security/cve/CVE-2018-1000808/" source="CVE"/>
		<reference ref_id="SUSE-RU-2019:1161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-May/011426.html" source="SUSE-SU"/>
		<description>
This update for ardana-ansible, ardana-cobbler, ardana-db, ardana-heat, ardana-manila, ardana-neutron, ardana-nova, ardana-octavia, ardana-osconfig, ardana-service, ardana-ses, ardana-swift, ardana-tempest, crowbar, crowbar-core, crowbar-ha, crowbar-openstack, documentation-suse-openstack-cloud, galera-python-clustercheck, openstack-dashboard, openstack-ec2-api, openstack-heat, openstack-heat-templates, openstack-horizon-plugin-ironic-ui, openstack-horizon-plugin-magnum-ui, openstack-horizon-plugin-sahara-ui, openstack-ironic, openstack-keystone, openstack-magnum, openstack-manila, openstack-monasca-api, openstack-monasca-notification, openstack-monasca-persister, openstack-murano, openstack-neutron, openstack-neutron-fwaas, openstack-nova, openstack-octavia, openstack-sahara, openstack-swift, openstack-tempest, python-cinderclient, python-cryptography, python-monasca-common, python-networking-hyperv, python-os-brick, python-venvjail, venv-openstack-aodh, venv-openstack-barbican, venv-openstack-ceilometer, venv-openstack-cinder, venv-openstack-designate, venv-openstack-freezer, venv-openstack-glance, venv-openstack-heat, venv-openstack-horizon, venv-openstack-ironic, venv-openstack-keystone, venv-openstack-magnum, venv-openstack-manila, venv-openstack-monasca, venv-openstack-monasca-ceilometer, venv-openstack-murano, venv-openstack-nova, venv-openstack-octavia, venv-openstack-sahara, venv-openstack-swift, venv-openstack-trove fixes the following issues:

This update fixes the following issues:

ardana-ansible:

* Move manila to the correct location in verb action list files (SCRD-6812)
* Enable manila service in verb action list files (SCRD-6812)
* Improve user experience (bsc#1114632)

ardana-cobbler:

* gate cobbler import on distro existence (SCRD-6821)

ardana-db:

* xtrabackup no longer needed (SCRD-7640, bsc#1116686)

ardana-heat:

* Fix typo so that heat gets correct name for hostname certs (bsc#127227)

ardana-manila:

* Put all config into one template (SCRD-7770)
* Fail when Manila service is not running (SCRD-7413)
* Split Manila API and Share deployment (SCRD-7773)
* Comment out example backends (bsc#1116501)

ardana-neutron:

* Fix misspelled variable names (SCRD-7836)
* Neutron services require network service to be started (SCRD-7764)

ardana-nova:

* Add dosfstools as requirement for nova-comptue (SCRD-8175)

ardana-octavia:

* Remove octavia dependency from monasca (SCRD-7690)

ardana-osconfig:

* Clean up ifcfg- files left behind by udevadm (bsc#1105822)

ardana-service:

* Add support for deprecated encryption-key parameter (SCRD-7837)

ardana-ses:

* Run SWF-PRX tasks in dedicated play (SCRD-8602)
* Make SES globals available to SWF (SCRD-8109)
* Add symlink ceph.conf.j2 to ~/openstack/my_cloud/config/ses (bsc#1128479)
* Add support for reusing clients (bsc#1122237)
* Ensure keyring files are readable (bsc#1122237)

ardana-swift:

* Prefer Kronos logrotate conf to Swift RPM logrotate conf (SCRD-7410)

ardana-tempest:

* Enable additional keystone tests (SCRD-7496)
* Enable domain specific drivers on tempest (SCRD-7496)
* Fix tempest heat plugin configuration (SCRD-7508)
* Add freezer to tempest available/testable list (SCRD-7496)
* Fix tempest configuration for magnum (SCRD-7496)
* Add missing test packages (SCRD-7496)
* Set cinder/glance admin on tempest roles (SCRD-7496)
* Update tempest test filters (SCRD-7496)
* Configure tempest accordingly when SES enabled (SCRD-7496)
* Merge test results from parallel and serial filters (SCRD-7784)

crowbar:

* install-chef-suse: filter comments from  authorized_keys file 

crowbar-core:

* crowbar: Do not rely on Chef::Util::FileEdit to write the file (bsc#1127752)
* Revert 'Disable upgrade API in Cloud8'
* upgrade: Make sure all compute nodes get compute related scripts
* network: run wicked ifdown for interface cleanup (bsc#1063535)

crowbar-ha:

* improve galera HA setup (bsc#1122875)

crowbar-openstack:

* ceilometer: Install package which contains cron file (bsc#1130414)
* monasca: Set hostname for monasca-agent as FQDN (SCRD-8705)
* memcache: Use first array element as fallback (SCRD-8255)
* db: Raise default connection limit to 2048
* rabbit: fix mirroring regex
* neutron: Add osprofiler support
* nova: Add osprofiler support
* cinder: Add osprofiler support
* glance: Add osprofiler support
* keystone: Make osprofiler connection_string configurable
* keystone: Add basic osprofiler support

documentation-suse-openstack-cloud:

* Additional corrections from Carl
* Fix reference to wrong neutron-reconfigure.yml playbook (SCRD-7709)
* increasing url_timeout parameter (SCRD-8512)
* Fix &lt;screen&gt; prompts in migration guide (SCRD-3763)
* Revert 'Fix &lt;screen&gt; prompts in migration guide (SCRD-3763)'
* Fix &lt;screen&gt; prompts in migration guide (SCRD-3763)
* Include additional notes for 3PAR multipath instructions (SCRD-8584)
* remove L2 Gateway Agent (SCRD-7645)
* Added more detail about how to test load balancer during migration
* Fix RHEL SMT repo setup command (SCPM-93)
* added &lt;step&gt; tags
* Update to octavia migration process
* Support Octavia LB's during HOS 5 -&gt; C8 migration (bsc#1094690)
* change parameters ardana-update-status.yml (SCRD-8530)
* Fix haproxy user deletion
* Update description of kernel patch needed for RHEL 7.5 (SCPM-93)
* Adding missing nova guide
* Remove screenshots
* Fix IDs and x-refs
* Fix Magnim user guide. WIP
* Add missing guide. Need fixing
* change 3par multipath statements (bsc#1128928,SCRD-8396)
* remove vlan transparency section (bsc#1125216,SCRD-7648)
* remove ESXi create DVS from the Command Line (bsc#1125180)
* make QE recommended edits (bsc#1124017, bsc#1124022)
* Use &amp;clm; instead of &amp;lcm; for C*loud Lifec*ycle Manager
* add supportconfig, sosreport cross-references (SCRD-2680)
* Fixing xref tag for package builds
* Fix missing ID
* make hidden-tag consistent (SCRD-7870)
* Nesting availability zone aware section
* Removing the API content from the admin guide
* Remove empty sections
* Remove weird [OBJ] characters in odd places
* Replace &lt;function&gt; -&gt; &lt;literal&gt;
* Fixing broken ref
* Add references to DIB back to guide
* rabbitmq cluster replace node (SCRD-7468,SCRD-7469)
* minor typo and prompt changes (no bsc or SCRD)

galera-python-clustercheck:

* Add socket read timeout (bsc#1122053)

openstack-dashboard:

* network topology: handle port AZ correctly

openstack-ec2-api:

* Replace openstack.org git:// URLs with https://

openstack-heat:

* Retry on DB deadlock when updating resource

openstack-heat-templates:

* Replace openstack.org git:// URLs with https://

openstack-horizon-plugin-ironic-ui:

* Normalize operation messages into capital case
* Replace openstack.org git:// URLs with https://


penstack-horizon-plugin-magnum-ui:

* Replace openstack.org git:// URLs with https://
* Set ubuntu-xenial for nodejs jobs

openstack-horizon-plugin-sahara-ui:

* Replace openstack.org git:// URLs with https://
* Remove the legacy integration tests job

penstack-ironic:

* Fix CPU count returned by introspection in Ironic iDRAC driver

openstack-keystone:

* create proper tmpdir for locking
* Remove publish-loci post job

openstack-magnum:

* Replace openstack.org git:// URLs with https://

openstack-manila:

* Replace openstack.org git:// URLs with https://
* Manila VMAX docs -  differences between quotas
* Manila VMAX docs -  improve pre-configurations on VMAX section
* Manila VMAX docs -  clarify snapshot support
* Manila VMAX docs -  clarify driver\_handles\_share\_servers
* VMAX manila doc - SSL Support
* VMAX manila doc - use of correct VMAX tags
* VMAX manila - deprecate old tags correctly
* Destroy type quotas when a share type is deleted
* Fix driver filter to not check share\_backend\_name
* Only run the needed services for CephFS jobs
* Return request-id to APIs that don't respond with a body
* Fix service image boot issues
* Port dummy driver manage/unmanage changes to stable

openstack-monasca-api:

* Replace openstack.org git:// URLs with https://

openstack-monasca-notification:

* Replace openstack.org git:// URLs with https://

openstack-monasca-persister:

* Replace openstack.org git:// URLs with https://

openstack-murano: 

* Replace openstack.org git:// URLs with https://

openstack-neutron:

* Specify tenant\_id in TestRevisionPlugin objects
* Fix QoS rule update
* Add rootwrap filters to kill state change monitor
* Fix port update deferred IP allocation with host\_id + new MAC
* Try to enable dnsmasq process several times
* Remove conntrack rule when FIP is deleted
* More accurate agent restart state transfer
* [OVS] Exception message when retrieving bridge-id and is not present
* [Functional tests] Change way how conntrack entries are checked
* Change duplicate OVS bridge datapath-ids
* Fix KeyError in OVS firewall
* ovs: raise RuntimeError in \_get\_dp if id is None
* Replace openstack.org git:// URLs with https://
* [Functional] Don't assert that HA router don't have IPs configured
* Improve invalid port ranges error message
* Do not release DHCP lease when no client ID is set on port
* ovsfw: Update SG rules even if OVSFW Port is not found
* Enable ipv6\_forwarding in HA router's namespace
* Spawn metadata proxy on dvr ha standby routers
* Set initial ha router state in neutron-keepalived-state-change
* When converting sg rules to iptables, do not emit dport if not supported
* DVR edge router: avoid accidental centralized floating IP remove
* ovsfw: Don't create rules if updated port doesn't exist
* Add new test decorator skip\_if\_timeout
* Fix notification about arp entries for dvr routers
* Add lock\_path in installation guide
* Fix update of ports cache in router\_info class
* Ensure dnsmasq is down before enabling it in restart method
* Block port update from unbound DHCP agent
* Fix performance regression adding rules to security groups
* Always fill UDP checksums in DHCPv6 replies
* Secure dnsmasq process against external abuse
* Check port VNIC type when associating a floating IP
* Enable 'all' IPv6 forwarding knob correctly
* protect DHCP agent cache out of sync
* Add kill\_timeout to AsyncProcess
* Fullstack: init trunk agent's driver only when necessary
* Don't modify global variables in unit tests
* Do state report after setting start\_flag on OVS restart
* Do not delete trunk bridges if service port attached
* Fix the bug about DHCP port whose network has multiple subnets
* Force all fdb entries update after ovs-vswitchd restart
* Get centralized FIP only on router's snat host
* Include all rootwrap filters when building wheels

openstack-neutron-fwaas:

* don't package tempest plugin twice

openstack-nova:

* Document unset/reset wrinkle for \*\_allocation\_ratio options
* Replace openstack.org git:// URLs with https://
* Refix disk size during live migration with disk over-commit
* Fix WeighedHost logging regression
* Correct examples in 'Manage Compute services' documentation
* Fix disk size during live migration with disk over-commit
* Exclude build request marker from server listing
* Update port device\_owner when unshelving
* Handle tags in \_bury\_in\_cell0
* Null out instance.availability\_zone on shelve offload
* Fix server\_group\_members quota check
* Add functional regressions tests for server\_group\_members OverQuota
* Fix bug case by none token context
* Migrate nova v2.0 legacy job to zuulv3
* Handle missing marker during online data migration
* tox: Don't write byte code (maybe)
* [pike-only] Fix resize\_instance rpcapi call
* Lock detach\_volume
* PCI: do not force remove allocated devices
* Note the aggregate allocation ratio restriction in scheduler docs
* Add regression test for bug #1764883
* Create BDMs/tags in cell with instance when over-quota
* Add functional regression test for bug 1806064
* Not set instance to ERROR if set\_admin\_password failed
* De-dupe subnet IDs when calling neutron /subnets API
* Fix destination\_type attribute in the bdm\_v2 documentation

openstack-octavia:

* Replace openstack.org git:// URLs with https://

openstack-sahara:

* Replace openstack.org git:// URLs with https://
* Use venv-py2 to run sahara-scenario, remove the py3 job
* archive-primary.cloudera.com -&gt; archive.cloudera.com
* Changing hdfs fs to hdfs dfs
* Add DEBIAN\_FRONTEND=noninteractive in front of apt-get install commands

openstack-swift:

* Fixed a cache invalidation issue related to GET and PUT requests to
  containers that would occasionally cause object PUTs to a container to
  404 after the container had been successfully created.
* Removed a race condition where a POST to an SLO could modify the X-Static-Large-Object metadata.
* Fixed rare socket leak on range requests to erasure-coded objects.
* Fix SLO delete for accounts with non-ASCII names.
* Fixed an issue in COPY where concurrent requests may have copied the wrong data.
* Fixed time skew when using X-Delete-After.
* Send ETag header in 206 Partial Content responses to SLO reads.

openstack-tempest:

* create lockdir on install

python-cinderclient:

* Update .gitreview for stable/pike
* Fix get_highest_client_server_version with Cinder API + uWSGI
* Updated from global requirements
* import zuul job settings from project-config
* Update UPPER_CONSTRAINTS_FILE for stable/pike

python-cryptography:

* Add X509_up_ref() function to help pyOpenSSL deal with CVE-2018-1000807 (bsc#1111635) and CVE-2018-1000808 (bsc#1111634).

python-monasca-common:

* update to version 2.3.1~dev4

python-networking-hyperv:

* import zuul job settings from project-config

python-os-brick:

* iscsiadm -m session' failure handling
* Handle multiple errors in multipath -l parsing
* Fixing FC scanning
* RemoteFS: don't fail in do_mount if already mounted
* Fix multipath disconnect with path failure
* import zuul job settings from project-config

python-venvjail:

* Set [] as default value for --no-relocate-shebang-list
* Exclude some files from relocation (SCRD-8594)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-06"/>
	<updated date="2019-05-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1063535">SUSE bug 1063535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094690">SUSE bug 1094690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105822">SUSE bug 1105822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111634">SUSE bug 1111634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111635">SUSE bug 1111635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114632">SUSE bug 1114632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116501">SUSE bug 1116501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122053">SUSE bug 1122053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122237">SUSE bug 1122237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122875">SUSE bug 1122875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124017">SUSE bug 1124017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124022">SUSE bug 1124022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125180">SUSE bug 1125180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125216">SUSE bug 1125216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127752">SUSE bug 1127752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128479">SUSE bug 1128479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128928">SUSE bug 1128928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130414">SUSE bug 1130414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/127227">SUSE bug 127227</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000807/">CVE-2018-1000807 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000807">CVE-2018-1000807 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000808/">CVE-2018-1000808 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000808">CVE-2018-1000808 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597924" comment="crowbar-5.0+git.1551088826.010c0399-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597925" comment="crowbar-core-5.0+git.1552461227.43e65d269-3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597926" comment="crowbar-core-branding-upstream-5.0+git.1552461227.43e65d269-3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597927" comment="crowbar-devel-5.0+git.1551088826.010c0399-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597928" comment="crowbar-ha-5.0+git.1553248675.7e103ea-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597929" comment="crowbar-openstack-5.0+git.1554709170.195ba0e26-4.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597930" comment="documentation-suse-openstack-cloud-deployment-8.20190329-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597787" comment="documentation-suse-openstack-cloud-supplement-8.20190329-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597788" comment="documentation-suse-openstack-cloud-upstream-admin-8.20190329-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597789" comment="documentation-suse-openstack-cloud-upstream-user-8.20190329-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597791" comment="galera-python-clustercheck-0.0+git.1506329536.8f5878c-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597792" comment="openstack-dashboard-12.0.4~dev5-3.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597793" comment="openstack-ec2-api-5.0.1~dev10-4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597794" comment="openstack-ec2-api-api-5.0.1~dev10-4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597795" comment="openstack-ec2-api-metadata-5.0.1~dev10-4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597796" comment="openstack-ec2-api-s3-5.0.1~dev10-4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597797" comment="openstack-heat-9.0.6~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597798" comment="openstack-heat-api-9.0.6~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597799" comment="openstack-heat-api-cfn-9.0.6~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597800" comment="openstack-heat-api-cloudwatch-9.0.6~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597801" comment="openstack-heat-doc-9.0.6~dev17-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597802" comment="openstack-heat-engine-9.0.6~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597803" comment="openstack-heat-plugin-heat_docker-9.0.6~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597804" comment="openstack-heat-templates-0.0.0+git.1553459627.948e8cc-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597805" comment="openstack-heat-test-9.0.6~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597806" comment="openstack-horizon-plugin-ironic-ui-3.0.4~dev3-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597807" comment="openstack-horizon-plugin-magnum-ui-3.0.1~dev9-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597808" comment="openstack-horizon-plugin-sahara-ui-7.0.4~dev1-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597809" comment="openstack-ironic-9.1.7~dev7-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597810" comment="openstack-ironic-api-9.1.7~dev7-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597811" comment="openstack-ironic-conductor-9.1.7~dev7-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597812" comment="openstack-ironic-doc-9.1.7~dev7-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597813" comment="openstack-keystone-12.0.3~dev1-5.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597814" comment="openstack-keystone-doc-12.0.3~dev1-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597815" comment="openstack-magnum-5.0.2~dev31-4.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597816" comment="openstack-magnum-api-5.0.2~dev31-4.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597817" comment="openstack-magnum-conductor-5.0.2~dev31-4.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597818" comment="openstack-magnum-doc-5.0.2~dev31-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597819" comment="openstack-manila-5.0.4~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597820" comment="openstack-manila-api-5.0.4~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597821" comment="openstack-manila-data-5.0.4~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597822" comment="openstack-manila-doc-5.0.4~dev17-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597823" comment="openstack-manila-scheduler-5.0.4~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597824" comment="openstack-manila-share-5.0.4~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597825" comment="openstack-monasca-api-2.2.1~dev25-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597826" comment="openstack-monasca-notification-1.10.2~dev2-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597827" comment="openstack-monasca-persister-1.7.1~dev8-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597828" comment="openstack-murano-4.0.1~dev5-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597829" comment="openstack-murano-api-4.0.1~dev5-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597830" comment="openstack-murano-doc-4.0.1~dev5-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597831" comment="openstack-murano-engine-4.0.1~dev5-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597832" comment="openstack-neutron-11.0.7~dev100-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597833" comment="openstack-neutron-dhcp-agent-11.0.7~dev100-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597834" comment="openstack-neutron-doc-11.0.7~dev100-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597835" comment="openstack-neutron-fwaas-11.0.2~dev8-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597836" comment="openstack-neutron-fwaas-doc-11.0.2~dev8-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597837" comment="openstack-neutron-ha-tool-11.0.7~dev100-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597838" comment="openstack-neutron-l3-agent-11.0.7~dev100-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597839" comment="openstack-neutron-linuxbridge-agent-11.0.7~dev100-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597840" comment="openstack-neutron-macvtap-agent-11.0.7~dev100-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597841" comment="openstack-neutron-metadata-agent-11.0.7~dev100-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597842" comment="openstack-neutron-metering-agent-11.0.7~dev100-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597843" comment="openstack-neutron-openvswitch-agent-11.0.7~dev100-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597844" comment="openstack-neutron-server-11.0.7~dev100-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597845" comment="openstack-nova-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597846" comment="openstack-nova-api-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597847" comment="openstack-nova-cells-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597848" comment="openstack-nova-compute-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597849" comment="openstack-nova-conductor-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597850" comment="openstack-nova-console-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597851" comment="openstack-nova-consoleauth-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597852" comment="openstack-nova-doc-16.1.8~dev53-3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597853" comment="openstack-nova-novncproxy-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597854" comment="openstack-nova-placement-api-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597855" comment="openstack-nova-scheduler-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597856" comment="openstack-nova-serialproxy-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597857" comment="openstack-nova-vncproxy-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597858" comment="openstack-octavia-1.0.5~dev1-4.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597859" comment="openstack-octavia-amphora-agent-1.0.5~dev1-4.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597860" comment="openstack-octavia-api-1.0.5~dev1-4.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597861" comment="openstack-octavia-health-manager-1.0.5~dev1-4.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597862" comment="openstack-octavia-housekeeping-1.0.5~dev1-4.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597863" comment="openstack-octavia-worker-1.0.5~dev1-4.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597864" comment="openstack-sahara-7.0.4~dev1-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597865" comment="openstack-sahara-api-7.0.4~dev1-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597866" comment="openstack-sahara-doc-7.0.4~dev1-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597867" comment="openstack-sahara-engine-7.0.4~dev1-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597868" comment="openstack-swift-2.15.2~dev32-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597869" comment="openstack-swift-account-2.15.2~dev32-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597870" comment="openstack-swift-container-2.15.2~dev32-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597871" comment="openstack-swift-doc-2.15.2~dev32-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597872" comment="openstack-swift-object-2.15.2~dev32-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597873" comment="openstack-swift-proxy-2.15.2~dev32-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597874" comment="openstack-tempest-17.0.0-4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597875" comment="openstack-tempest-test-17.0.0-4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597876" comment="python-cinderclient-3.1.1-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597877" comment="python-cinderclient-doc-3.1.1-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597878" comment="python-cryptography-2.0.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597879" comment="python-ec2api-5.0.1~dev10-4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597880" comment="python-heat-9.0.6~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597881" comment="python-horizon-12.0.4~dev5-3.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597882" comment="python-horizon-plugin-ironic-ui-3.0.4~dev3-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597883" comment="python-horizon-plugin-magnum-ui-3.0.1~dev9-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597884" comment="python-horizon-plugin-sahara-ui-7.0.4~dev1-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597885" comment="python-ironic-9.1.7~dev7-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597886" comment="python-keystone-12.0.3~dev1-5.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597887" comment="python-magnum-5.0.2~dev31-4.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597888" comment="python-manila-5.0.4~dev17-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597889" comment="python-monasca-api-2.2.1~dev25-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597890" comment="python-monasca-common-2.3.1~dev4-4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597891" comment="python-monasca-notification-1.10.2~dev2-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597892" comment="python-monasca-persister-1.7.1~dev8-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597893" comment="python-murano-4.0.1~dev5-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597894" comment="python-neutron-11.0.7~dev100-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597895" comment="python-neutron-fwaas-11.0.2~dev8-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597896" comment="python-nova-16.1.8~dev53-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597897" comment="python-octavia-1.0.5~dev1-4.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597898" comment="python-os-brick-1.15.8-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597899" comment="python-sahara-7.0.4~dev1-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597900" comment="python-swift-2.15.2~dev32-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597901" comment="python-tempest-17.0.0-4.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148748" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Low)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1112767" ref_url="https://bugzilla.suse.com/1112767" source="BUGZILLA"/>
		<reference ref_id="1122198" ref_url="https://bugzilla.suse.com/1122198" source="BUGZILLA"/>
		<reference ref_id="1122475" ref_url="https://bugzilla.suse.com/1122475" source="BUGZILLA"/>
		<reference ref_id="1127027" ref_url="https://bugzilla.suse.com/1127027" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2510" ref_url="https://www.suse.com/security/cve/CVE-2019-2510/" source="CVE"/>
		<reference ref_id="CVE-2019-2537" ref_url="https://www.suse.com/security/cve/CVE-2019-2537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005427.html" source="SUSE-SU"/>
		<description>
This update for mariadb to version 10.2.22 fixes the following issues:
	  
Security issues fixed (bsc#1122198):

- CVE-2019-2510: Fixed a vulnerability which can lead to MySQL compromise and lead to Denial of Service.
- CVE-2019-2537: Fixed a vulnerability which can lead to MySQL compromise and lead to Denial of Service.

Other issues fixed:

- Fixed an issue where mysl_install_db fails due to incorrect basedir (bsc#1127027).
- Fixed an issue where the lograte was not working (bsc#1112767).
- Backport Information Schema CHECK_CONSTRAINTS Table.
- Maximum value of table_definition_cache is now 2097152.
- InnoDB ALTER TABLE fixes.
- Galera crash recovery fixes.
- Encryption fixes.
- Remove xtrabackup dependency  as MariaDB ships a build in mariabackup so xtrabackup is not needed (bsc#1122475).

The complete changelog can be found at:  https://mariadb.com/kb/en/library/mariadb-10222-changelog/
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-06"/>
	<updated date="2019-05-06"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1112767">SUSE bug 1112767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122475">SUSE bug 1122475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127027">SUSE bug 1127027</bugzilla>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2510/">CVE-2019-2510 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2510">CVE-2019-2510 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2537/">CVE-2019-2537 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2537">CVE-2019-2537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596681" comment="mariadb-10.2.22-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596682" comment="mariadb-client-10.2.22-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596683" comment="mariadb-errormessages-10.2.22-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596684" comment="mariadb-galera-10.2.22-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596685" comment="mariadb-tools-10.2.22-4.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148749" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1114828" ref_url="https://bugzilla.suse.com/1114828" source="BUGZILLA"/>
		<reference ref_id="1116600" ref_url="https://bugzilla.suse.com/1116600" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16471" ref_url="https://www.suse.com/security/cve/CVE-2018-16471/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005535.html" source="SUSE-SU"/>
		<description>
This update for rubygem-rack fixes the following issues:

Security issued fixed:

- CVE-2018-16471: Fixed a cross-site scripting vulnerability via 'scheme' method (bsc#1116600).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-06"/>
	<updated date="2019-06-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114828">SUSE bug 1114828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116600">SUSE bug 1116600</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16471/">CVE-2018-16471 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16471">CVE-2018-16471 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597638" comment="ruby2.1-rubygem-rack-1.6.11-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148750" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activejob-4_2 (Low)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1117632" ref_url="https://bugzilla.suse.com/1117632" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16476" ref_url="https://www.suse.com/security/cve/CVE-2018-16476/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005062.html" source="SUSE-SU"/>
		<description>
This update for rubygem-activejob-4_2 fixes the following issues:

Security issue fixed:

- CVE-2018-16476: Fixed broken access control vulnerability (bsc#1117632).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-24"/>
	<updated date="2019-01-24"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1117632">SUSE bug 1117632</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16476/">CVE-2018-16476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16476">CVE-2018-16476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597639" comment="ruby2.1-rubygem-activejob-4_2-4.2.9-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148751" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1136570" ref_url="https://bugzilla.suse.com/1136570" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1606-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005832.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- Fix the previous fix for CVE-2019-3860 (bsc#1136570, bsc#1128481)
  (Out-of-bounds reads with specially crafted SFTP packets)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-21"/>
	<updated date="2019-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3860">CVE-2019-3860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521526" comment="libssh2-1-1.4.3-20.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521924" comment="libssh2-1-32bit-1.4.3-20.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148752" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1054429" ref_url="https://bugzilla.suse.com/1054429" source="BUGZILLA"/>
		<reference ref_id="1076958" ref_url="https://bugzilla.suse.com/1076958" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15107" ref_url="https://www.suse.com/security/cve/CVE-2017-15107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005642.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

Security issue fixed:

- CVE-2017-15107: Fixed a vulnerability in DNSSEC implementation. Processing of
  wildcard synthesized NSEC records may result improper validation for non-existance. (bsc#1076958)

Non-security issue fixed:

- Reload system dbus to pick up policy change on install (bsc#1054429).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-02"/>
	<updated date="2019-07-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054429">SUSE bug 1054429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076958">SUSE bug 1076958</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15107/">CVE-2017-15107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15107">CVE-2017-15107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596686" comment="dnsmasq-utils-2.78-18.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148753" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1138034" ref_url="https://bugzilla.suse.com/1138034" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1783-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005776.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 to version 10.9 fixes the following issue:

Security issue fixed:	  

- CVE-2019-10164: Fixed buffer-overflow vulnerabilities in SCRAM verifier parsing (bsc#1138034).

More information at https://www.postgresql.org/docs/10/release-10-9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-05"/>
	<updated date="2019-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138034">SUSE bug 1138034</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10164">CVE-2019-10164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521936" comment="libecpg6-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521937" comment="libpq5-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521938" comment="libpq5-32bit-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521939" comment="postgresql10-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530575" comment="postgresql10-contrib-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530576" comment="postgresql10-docs-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530577" comment="postgresql10-plperl-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530578" comment="postgresql10-plpython-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530579" comment="postgresql10-pltcl-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530580" comment="postgresql10-server-10.9-1.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148754" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1139959" ref_url="https://bugzilla.suse.com/1139959" source="BUGZILLA"/>
		<reference ref_id="1140122" ref_url="https://bugzilla.suse.com/1140122" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13012" ref_url="https://www.suse.com/security/cve/CVE-2019-13012/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1830-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005822.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

Security issue fixed:

- CVE-2019-13012: Fixed improper restriction of file permissions when creating directories (bsc#1139959).

Non-security issue fixed:

- Added explicit requires between libglib2 and libgio2 (bsc#1140122).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-16"/>
	<updated date="2019-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139959">SUSE bug 1139959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140122">SUSE bug 1140122</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13012/">CVE-2019-13012 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13012">CVE-2019-13012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521943" comment="glib2-lang-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521944" comment="glib2-tools-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521945" comment="libgio-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521946" comment="libgio-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521948" comment="libglib-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521949" comment="libglib-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521950" comment="libgmodule-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521951" comment="libgmodule-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521952" comment="libgobject-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521953" comment="libgobject-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521954" comment="libgthread-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521955" comment="libgthread-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148755" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes the following issues:

MozillaFirefox to version ESR 60.8:

- CVE-2019-9811: Sandbox escape via installation of malicious language pack (bsc#1140868).
- CVE-2019-11711: Script injection within domain through inner window reuse (bsc#1140868).
- CVE-2019-11712: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (bsc#1140868).
- CVE-2019-11713: Use-after-free with HTTP/2 cached stream (bsc#1140868).
- CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (bsc#1140868).
- CVE-2019-11715: HTML parsing error can contribute to content XSS (bsc#1140868).
- CVE-2019-11717: Caret character improperly escaped in origins (bsc#1140868).
- CVE-2019-11719: Out-of-bounds read when importing curve25519 private key (bsc#1140868).
- CVE-2019-11730: Same-origin policy treats all files in a directory as having the same-origin (bsc#1140868).
- CVE-2019-11709: Multiple Memory safety bugs fixed (bsc#1140868).

mozilla-nss to version 3.44.1:

* Added IPSEC IKE support to softoken 
* Many new FIPS test cases
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-29"/>
	<updated date="2019-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521974" comment="MozillaFirefox-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521975" comment="MozillaFirefox-translations-common-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530590" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530591" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530592" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530593" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148756" version="1" class="patch">
	<metadata>
		<title>Security update for ardana and crowbar (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1083721" ref_url="https://bugzilla.suse.com/1083721" source="BUGZILLA"/>
		<reference ref_id="1105559" ref_url="https://bugzilla.suse.com/1105559" source="BUGZILLA"/>
		<reference ref_id="1118003" ref_url="https://bugzilla.suse.com/1118003" source="BUGZILLA"/>
		<reference ref_id="1120932" ref_url="https://bugzilla.suse.com/1120932" source="BUGZILLA"/>
		<reference ref_id="1122875" ref_url="https://bugzilla.suse.com/1122875" source="BUGZILLA"/>
		<reference ref_id="1124170" ref_url="https://bugzilla.suse.com/1124170" source="BUGZILLA"/>
		<reference ref_id="1126391" ref_url="https://bugzilla.suse.com/1126391" source="BUGZILLA"/>
		<reference ref_id="1128753" ref_url="https://bugzilla.suse.com/1128753" source="BUGZILLA"/>
		<reference ref_id="1130593" ref_url="https://bugzilla.suse.com/1130593" source="BUGZILLA"/>
		<reference ref_id="1131712" ref_url="https://bugzilla.suse.com/1131712" source="BUGZILLA"/>
		<reference ref_id="1131791" ref_url="https://bugzilla.suse.com/1131791" source="BUGZILLA"/>
		<reference ref_id="1132542" ref_url="https://bugzilla.suse.com/1132542" source="BUGZILLA"/>
		<reference ref_id="1132852" ref_url="https://bugzilla.suse.com/1132852" source="BUGZILLA"/>
		<reference ref_id="1132860" ref_url="https://bugzilla.suse.com/1132860" source="BUGZILLA"/>
		<reference ref_id="124991" ref_url="https://bugzilla.suse.com/124991" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14574" ref_url="https://www.suse.com/security/cve/CVE-2018-14574/" source="CVE"/>
		<reference ref_id="CVE-2019-10876" ref_url="https://www.suse.com/security/cve/CVE-2019-10876/" source="CVE"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="CVE-2019-3498" ref_url="https://www.suse.com/security/cve/CVE-2019-3498/" source="CVE"/>
		<reference ref_id="CVE-2019-6975" ref_url="https://www.suse.com/security/cve/CVE-2019-6975/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005722.html" source="SUSE-SU"/>
		<description>
This update for ardana and crowbar fixes the following issues:

- Restrict rootwrap directories for cinder (bsc#1132542)
- Change Cinder default log level from DEBUG to INFO (SCRD-7132)
- Remove configuration from migration (bsc#1126391)
- Configurable innodb flush options (SCRD-7496)
- Secure designate's rootwrap files (bsc#1132542)
- specify rootwrap config file in designate sudoer (bsc#1132542)
- Update Designate log threshold from DEBUG to INFO (SCRD-8459)
- Change Glance default log level from DEBUG to INFO (SCRD-8592)
- Change Heat default log level from DEBUG to INFO (SCRD-7132)
- Fix Horizon missing create snapshot action for users (bsc#1130593)
- Don't set external-name in ardana-ci models (SCRD-7471)
- Fix fail-over/-back behavior of haproxy for galera (bsc#1122875)
- Update swift endpoints from keystone-reconfigure.yml if needed (SCRD-8703)
- Change Magnum default log level from DEFAULT to INFO (SCRD-7132)
- Rip out vertica related code (SCRD-9031)
- Tighten neutron sudoers to only execute rootwrap (bsc#1132542)
- Change Neutron default log level from DEBUG to INFO (SCRD-7132)
- SCRD-9031 Change permitted nova-rootwrap config file pattern (bsc#1132542)
- specify rootwrap config file in nova sudoer (bsc#1132542)
- Change Nova default log level from DEBUG to INFO (SCRD-7132)
- Stop installing a sudoers root escalator (SCRD-9031)
- Change Octavia default log level from DEBUG to INFO (SCRD-7132)
- Increase number of connect retries (SCRD-7496)
- UDEV rules for multi-port nics (SCRD-8329)
- Ensure that the ceph group exists (SCRD-8347)
- Disable test_create_health_monitor_with_scenarios tempest (SOC-9176)
- Make --os-test-timeout configurable and increase default (SCRD-7496)
- Disable TestVolumeBootPattern.test_volume_boot_pattern (SCRD-9015)
- Increase and make timeout values configurable (SCRD-7496)
- Configure heat boot config template path (SCRD-7496)
- Fix typo on ceilometer filter (SCRD-7496)
- barclamp: Fix setting MTU on networks using a bridge
- Fix order of values in nodes piechart
- Ignore CVE-2019-11068 during Travis (SOC-9262)
- Fix cloud-mkcloud9-job-backup-restore (SCRD-7126)
- Update suse-branding.patch with correct links for documentation
  (SCRD-8294)
- pacemaker: add failure nodes to sync fail message (bsc#1083721)
- update suse-branding.patch (SOC-9297)
- pacemaker: wait more for founder if SBD is configured (SCRD-8462)
- pacemaker: don't check cluster members on founder (SCRD-8462)
-  database: Make wsrep_provider_options configurable (fate#327745)
-  database: Raise and align promote/demote timeouts (bsc#1131791)
-  mysql: improve galera HA setup (bsc#1122875)
- Update suse-branding.patch with correct links for documentation
  (SCRD-8294)
-  neutron: Fix the rest of the keystone related settings for LBaaS
-  neutron: properly define neutron lbaas region (bsc#1128753)
-  CLM - update MariaDB manually (bsc#1132852, SOC-9022)
-  update MariaDB manually (bsc#1132852, SOC-9022)
-  SOC8 alarm table restructure ((SCRD-7710, bsc#1124170)
-  Fix bsc#1118003
-  add deprecation decision tree (shrub) (SCRD-8530)
-  add cert section (SCRD-5542)
-  grammar; make migration pairing more explicit (SCRD-7595)
-  Remove whitespace on top of login page (SCRD-7142)
-  Revert alert and form colors to default SCRD-6919
-  Change active sidebar section text white SCRD-6919
- Updated the openstack-monasca-agent-sudoers file (bsc#1132542)
- Don't restart neutron-ovs-cleanup on RPM update (bsc#1132860)
-  Fix KeyError in OVS firewall (bsc#1131712, CVE-2019-10876)
- update to 1.11.20 (bsc#124991, CVE-2019-6975):
-  Memory exhaustion in ``django.utils.numberformat.format()``
-  Include ops-console logs if exist (bsc-1126912)
-  Add a sed pattern to censor passwords from servers.yml (bsc#1105559)
-  Show the status file of crowbar upgrade (if it exists)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-17"/>
	<updated date="2019-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1083721">SUSE bug 1083721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105559">SUSE bug 1105559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118003">SUSE bug 1118003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120932">SUSE bug 1120932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122875">SUSE bug 1122875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124170">SUSE bug 1124170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126391">SUSE bug 1126391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128753">SUSE bug 1128753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130593">SUSE bug 1130593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131712">SUSE bug 1131712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131791">SUSE bug 1131791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132542">SUSE bug 1132542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132852">SUSE bug 1132852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132860">SUSE bug 1132860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/124991">SUSE bug 124991</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14574/">CVE-2018-14574 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14574">CVE-2018-14574 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10876/">CVE-2019-10876 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10876">CVE-2019-10876 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3498/">CVE-2019-3498 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3498">CVE-2019-3498 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6975/">CVE-2019-6975 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6975">CVE-2019-6975 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597640" comment="crowbar-core-5.0+git.1558533551.8d8ed2058-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597641" comment="crowbar-core-branding-SOC-5.0-10.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597642" comment="crowbar-core-branding-upstream-5.0+git.1558533551.8d8ed2058-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597643" comment="crowbar-ha-5.0+git.1559282566.6b06ca3-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597644" comment="crowbar-openstack-5.0+git.1559335140.62bb4c014-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597645" comment="documentation-suse-openstack-cloud-deployment-8.20190521-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596730" comment="documentation-suse-openstack-cloud-supplement-8.20190521-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596731" comment="documentation-suse-openstack-cloud-upstream-admin-8.20190521-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596732" comment="documentation-suse-openstack-cloud-upstream-user-8.20190521-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596734" comment="openstack-aodh-5.1.1~dev7-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596735" comment="openstack-aodh-api-5.1.1~dev7-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596736" comment="openstack-aodh-doc-5.1.1~dev7-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596737" comment="openstack-aodh-evaluator-5.1.1~dev7-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596738" comment="openstack-aodh-expirer-5.1.1~dev7-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596739" comment="openstack-aodh-listener-5.1.1~dev7-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596740" comment="openstack-aodh-notifier-5.1.1~dev7-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596741" comment="openstack-barbican-5.0.2~dev3-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596742" comment="openstack-barbican-api-5.0.2~dev3-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596743" comment="openstack-barbican-doc-5.0.2~dev3-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596744" comment="openstack-barbican-keystone-listener-5.0.2~dev3-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596745" comment="openstack-barbican-retry-5.0.2~dev3-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596746" comment="openstack-barbican-worker-5.0.2~dev3-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596747" comment="openstack-ceilometer-9.0.8~dev7-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596748" comment="openstack-ceilometer-agent-central-9.0.8~dev7-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596749" comment="openstack-ceilometer-agent-compute-9.0.8~dev7-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596750" comment="openstack-ceilometer-agent-ipmi-9.0.8~dev7-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596751" comment="openstack-ceilometer-agent-notification-9.0.8~dev7-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596752" comment="openstack-ceilometer-api-9.0.8~dev7-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596753" comment="openstack-ceilometer-collector-9.0.8~dev7-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596754" comment="openstack-ceilometer-doc-9.0.8~dev7-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596755" comment="openstack-ceilometer-polling-9.0.8~dev7-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596756" comment="openstack-cinder-11.2.3~dev5-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596757" comment="openstack-cinder-api-11.2.3~dev5-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596758" comment="openstack-cinder-backup-11.2.3~dev5-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596759" comment="openstack-cinder-doc-11.2.3~dev5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596760" comment="openstack-cinder-scheduler-11.2.3~dev5-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596761" comment="openstack-cinder-volume-11.2.3~dev5-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596762" comment="openstack-dashboard-12.0.4~dev6-3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596763" comment="openstack-dashboard-theme-SUSE-2017.2+git.1554906711.9dbe79b-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596764" comment="openstack-designate-5.0.3~dev7-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596765" comment="openstack-designate-agent-5.0.3~dev7-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596766" comment="openstack-designate-api-5.0.3~dev7-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596767" comment="openstack-designate-central-5.0.3~dev7-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596768" comment="openstack-designate-doc-5.0.3~dev7-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596769" comment="openstack-designate-producer-5.0.3~dev7-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596770" comment="openstack-designate-sink-5.0.3~dev7-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596771" comment="openstack-designate-worker-5.0.3~dev7-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596772" comment="openstack-heat-9.0.8~dev3-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596773" comment="openstack-heat-api-9.0.8~dev3-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596774" comment="openstack-heat-api-cfn-9.0.8~dev3-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596775" comment="openstack-heat-api-cloudwatch-9.0.8~dev3-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596776" comment="openstack-heat-doc-9.0.8~dev3-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596777" comment="openstack-heat-engine-9.0.8~dev3-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596778" comment="openstack-heat-gbp-7.0.1~dev1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596779" comment="openstack-heat-plugin-heat_docker-9.0.8~dev3-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596780" comment="openstack-heat-test-9.0.8~dev3-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596781" comment="openstack-horizon-plugin-trove-ui-9.0.1~dev10-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596782" comment="openstack-ironic-9.1.8~dev5-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596783" comment="openstack-ironic-api-9.1.8~dev5-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596784" comment="openstack-ironic-conductor-9.1.8~dev5-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596785" comment="openstack-ironic-doc-9.1.8~dev5-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596786" comment="openstack-keystone-12.0.4~dev2-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596787" comment="openstack-keystone-doc-12.0.4~dev2-5.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596788" comment="openstack-monasca-agent-2.2.5~dev2-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596789" comment="openstack-monasca-api-2.2.1~dev26-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596790" comment="openstack-monasca-log-api-2.3.1~dev12-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596791" comment="openstack-neutron-11.0.9~dev28-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596792" comment="openstack-neutron-dhcp-agent-11.0.9~dev28-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596793" comment="openstack-neutron-doc-11.0.9~dev28-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596794" comment="openstack-neutron-fwaas-11.0.3~dev1-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596795" comment="openstack-neutron-fwaas-doc-11.0.3~dev1-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596796" comment="openstack-neutron-gbp-7.3.1~dev28-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596797" comment="openstack-neutron-ha-tool-11.0.9~dev28-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596798" comment="openstack-neutron-l3-agent-11.0.9~dev28-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596799" comment="openstack-neutron-lbaas-11.0.4~dev6-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596800" comment="openstack-neutron-lbaas-agent-11.0.4~dev6-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596801" comment="openstack-neutron-lbaas-doc-11.0.4~dev6-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596802" comment="openstack-neutron-linuxbridge-agent-11.0.9~dev28-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596803" comment="openstack-neutron-macvtap-agent-11.0.9~dev28-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596804" comment="openstack-neutron-metadata-agent-11.0.9~dev28-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596805" comment="openstack-neutron-metering-agent-11.0.9~dev28-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596806" comment="openstack-neutron-openvswitch-agent-11.0.9~dev28-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596807" comment="openstack-neutron-server-11.0.9~dev28-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596808" comment="openstack-neutron-vpn-agent-11.0.1~dev5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596809" comment="openstack-neutron-vpnaas-11.0.1~dev5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596810" comment="openstack-neutron-vpnaas-doc-11.0.1~dev5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596811" comment="openstack-neutron-vyatta-agent-11.0.1~dev5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596812" comment="openstack-nova-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596813" comment="openstack-nova-api-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596814" comment="openstack-nova-cells-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596815" comment="openstack-nova-compute-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596816" comment="openstack-nova-conductor-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596817" comment="openstack-nova-console-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596818" comment="openstack-nova-consoleauth-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596819" comment="openstack-nova-doc-16.1.9~dev3-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596820" comment="openstack-nova-novncproxy-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596821" comment="openstack-nova-placement-api-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596822" comment="openstack-nova-scheduler-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596823" comment="openstack-nova-serialproxy-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596824" comment="openstack-nova-vncproxy-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596825" comment="openstack-trove-8.0.1~dev13-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596826" comment="openstack-trove-api-8.0.1~dev13-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596827" comment="openstack-trove-conductor-8.0.1~dev13-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596828" comment="openstack-trove-doc-8.0.1~dev13-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596829" comment="openstack-trove-guestagent-8.0.1~dev13-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596830" comment="openstack-trove-taskmanager-8.0.1~dev13-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596831" comment="python-Django-1.11.20-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596832" comment="python-aodh-5.1.1~dev7-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596834" comment="python-barbican-5.0.2~dev3-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596835" comment="python-ceilometer-9.0.8~dev7-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596836" comment="python-cinder-11.2.3~dev5-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596838" comment="python-cliff-2.8.3-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596839" comment="python-designate-5.0.3~dev7-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596840" comment="python-freezerclient-1.5.1-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596841" comment="python-freezerclient-doc-1.5.1-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596842" comment="python-heat-9.0.8~dev3-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596843" comment="python-heat-gbp-7.0.1~dev1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596844" comment="python-horizon-12.0.4~dev6-3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596845" comment="python-horizon-plugin-trove-ui-9.0.1~dev10-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596846" comment="python-ironic-9.1.8~dev5-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596847" comment="python-ironicclient-1.17.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596848" comment="python-ironicclient-doc-1.17.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596849" comment="python-keystone-12.0.4~dev2-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596850" comment="python-magnumclient-2.7.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596851" comment="python-magnumclient-doc-2.7.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596852" comment="python-manilaclient-1.17.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596853" comment="python-manilaclient-doc-1.17.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596854" comment="python-monasca-agent-2.2.5~dev2-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596855" comment="python-monasca-api-2.2.1~dev26-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596856" comment="python-monasca-log-api-2.3.1~dev12-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596857" comment="python-muranoclient-0.14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596858" comment="python-muranoclient-doc-0.14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596859" comment="python-neutron-11.0.9~dev28-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596860" comment="python-neutron-fwaas-11.0.3~dev1-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596861" comment="python-neutron-gbp-7.3.1~dev28-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596862" comment="python-neutron-lbaas-11.0.4~dev6-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596863" comment="python-neutron-vpnaas-11.0.1~dev5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596864" comment="python-nova-16.1.9~dev3-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596865" comment="python-novaclient-9.1.3-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596866" comment="python-novaclient-doc-9.1.3-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596867" comment="python-openstackclient-3.12.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596868" comment="python-os-brick-1.15.9-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596869" comment="python-os-client-config-1.28.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596870" comment="python-os-vif-1.7.2-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596871" comment="python-os-win-2.2.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596872" comment="python-oslo.cache-1.25.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596873" comment="python-oslo.concurrency-3.21.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596874" comment="python-oslo.config-4.11.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596875" comment="python-oslo.config-doc-4.11.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596876" comment="python-oslo.i18n-3.17.2-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596877" comment="python-oslo.log-3.30.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596878" comment="python-oslo.messaging-5.30.8-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596879" comment="python-oslo.middleware-3.30.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596880" comment="python-oslo.policy-1.25.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596881" comment="python-oslo.privsep-1.22.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596882" comment="python-oslo.reports-1.22.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596883" comment="python-oslo.utils-3.28.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596884" comment="python-oslo.versionedobjects-1.26.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596885" comment="python-oslo.vmware-2.23.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596886" comment="python-oslotest-2.17.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596887" comment="python-python-subunit-1.2.0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596888" comment="python-saharaclient-1.3.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596889" comment="python-saharaclient-doc-1.3.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596890" comment="python-swiftclient-3.4.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596891" comment="python-swiftclient-doc-3.4.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596892" comment="python-trove-8.0.1~dev13-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596893" comment="python-zaqarclient-1.7.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596894" comment="supportutils-plugin-suse-openstack-cloud-8.0.1551262227.7a7deb6-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148757" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

---- updated platforms ------------------------------------
SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061d-&gt;0000061f Xeon E3/E5, Core X
SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000714-&gt;00000718 Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148758" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1127223" ref_url="https://bugzilla.suse.com/1127223" source="BUGZILLA"/>
		<reference ref_id="1127308" ref_url="https://bugzilla.suse.com/1127308" source="BUGZILLA"/>
		<reference ref_id="1128574" ref_url="https://bugzilla.suse.com/1128574" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155/" source="CVE"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1958-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005821.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2019-9169: Fixed a heap-based buffer over-read via an attempted case-insensitive regular-expression match (bsc#1127308).
- CVE-2009-5155: Fixed a denial of service in parse_reg_exp() (bsc#1127223).

Non-security issues fixed:

- Added cfi information for start routines in order to stop unwinding on S390 (bsc#1128574).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-16"/>
	<updated date="2019-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127223">SUSE bug 1127223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127308">SUSE bug 1127308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128574">SUSE bug 1128574</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-5155">CVE-2009-5155 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9169">CVE-2019-9169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530595" comment="glibc-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530596" comment="glibc-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530597" comment="glibc-devel-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530598" comment="glibc-devel-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530599" comment="glibc-html-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530600" comment="glibc-i18ndata-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530601" comment="glibc-info-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530602" comment="glibc-locale-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530603" comment="glibc-locale-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530604" comment="glibc-profile-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530605" comment="glibc-profile-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530606" comment="nscd-2.22-62.22.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148759" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005756.html" source="SUSE-SU"/>
		<description>
This update for bzip2 fixes the following issues:

- Fixed a regression with the fix for CVE-2019-12900, which caused incompatibilities
  with files that used many selectors (bsc#1139083).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-29"/>
	<updated date="2019-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522027" comment="bzip2-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530613" comment="bzip2-doc-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522028" comment="libbz2-1-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522029" comment="libbz2-1-32bit-1.0.6-30.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148760" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1121826" ref_url="https://bugzilla.suse.com/1121826" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005768.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2019-6133: Fixed improper caching of auth decisions, which could bypass 
  uid checking in the interactive backend (bsc#1121826).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-01"/>
	<updated date="2019-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6133">CVE-2019-6133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522035" comment="libpolkit0-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522037" comment="polkit-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522038" comment="typelib-1_0-Polkit-1_0-0.113-5.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148761" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1115375" ref_url="https://bugzilla.suse.com/1115375" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141784" ref_url="https://bugzilla.suse.com/1141784" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141786" ref_url="https://bugzilla.suse.com/1141786" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2842" ref_url="https://www.suse.com/security/cve/CVE-2019-2842/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u222 fixes the following issues:

Security issues fixed:

- CVE-2019-2745: Improved ECC Implementation (bsc#1141784).
- CVE-2019-2762: Exceptional throw cases (bsc#1141782).
- CVE-2019-2766: Improve file protocol handling (bsc#1141789).
- CVE-2019-2769: Better copies of CopiesList (bsc#1141783).
- CVE-2019-2786: More limited privilege usage (bsc#1141787).
- CVE-2019-2816: Normalize normalization (bsc#1141785).
- CVE-2019-2842: Extended AES support (bsc#1141786).
- CVE-2019-7317: Improve PNG support (bsc#1141780).
- Certificate validation improvements

Non-security issue fixed:

- Fixed an issue where the installation failed when the manpages are not present (bsc#1115375)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-01"/>
	<updated date="2019-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115375">SUSE bug 1115375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141784">SUSE bug 1141784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141786">SUSE bug 1141786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2745">CVE-2019-2745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2786">CVE-2019-2786 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2842/">CVE-2019-2842 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2842">CVE-2019-2842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530614" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530615" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148762" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="1101676" ref_url="https://bugzilla.suse.com/1101676" source="BUGZILLA"/>
		<reference ref_id="1101677" ref_url="https://bugzilla.suse.com/1101677" source="BUGZILLA"/>
		<reference ref_id="1101678" ref_url="https://bugzilla.suse.com/1101678" source="BUGZILLA"/>
		<reference ref_id="1103342" ref_url="https://bugzilla.suse.com/1103342" source="BUGZILLA"/>
		<reference ref_id="1112368" ref_url="https://bugzilla.suse.com/1112368" source="BUGZILLA"/>
		<reference ref_id="1112397" ref_url="https://bugzilla.suse.com/1112397" source="BUGZILLA"/>
		<reference ref_id="1112417" ref_url="https://bugzilla.suse.com/1112417" source="BUGZILLA"/>
		<reference ref_id="1112421" ref_url="https://bugzilla.suse.com/1112421" source="BUGZILLA"/>
		<reference ref_id="1112432" ref_url="https://bugzilla.suse.com/1112432" source="BUGZILLA"/>
		<reference ref_id="1116686" ref_url="https://bugzilla.suse.com/1116686" source="BUGZILLA"/>
		<reference ref_id="1118754" ref_url="https://bugzilla.suse.com/1118754" source="BUGZILLA"/>
		<reference ref_id="1132666" ref_url="https://bugzilla.suse.com/1132666" source="BUGZILLA"/>
		<reference ref_id="1136037" ref_url="https://bugzilla.suse.com/1136037" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063/" source="CVE"/>
		<reference ref_id="CVE-2018-3064" ref_url="https://www.suse.com/security/cve/CVE-2018-3064/" source="CVE"/>
		<reference ref_id="CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066/" source="CVE"/>
		<reference ref_id="CVE-2018-3143" ref_url="https://www.suse.com/security/cve/CVE-2018-3143/" source="CVE"/>
		<reference ref_id="CVE-2018-3156" ref_url="https://www.suse.com/security/cve/CVE-2018-3156/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3251" ref_url="https://www.suse.com/security/cve/CVE-2018-3251/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="CVE-2019-2529" ref_url="https://www.suse.com/security/cve/CVE-2019-2529/" source="CVE"/>
		<reference ref_id="CVE-2019-2537" ref_url="https://www.suse.com/security/cve/CVE-2019-2537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Update to MariaDB 10.0.38 GA (bsc#1136037).

Security issues fixed:

- CVE-2019-2537: Denial of service via multiple protocols (bsc#1136037)
- CVE-2019-2529: Denial of service via multiple protocols (bsc#1136037)
- CVE-2018-3282: Server Storage Engines unspecified vulnerability (CPU Oct 2018) (bsc#1112432)
- CVE-2018-3251: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112397)
- CVE-2018-3174: Client programs unspecified vulnerability (CPU Oct 2018) (bsc#1112368)
- CVE-2018-3156: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112417)
- CVE-2018-3143: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112421)
- CVE-2018-3066: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent Server Options). (bsc#1101678)
- CVE-2018-3064: InnoDB unspecified vulnerability (CPU Jul 2018) (bsc#1103342)
- CVE-2018-3063: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent Server Security Privileges). (bsc#1101677)
- CVE-2018-3058: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent MyISAM). (bsc#1101676)
- CVE-2016-9843: Big-endian out-of-bounds pointer (bsc#1013882)

Non-security changes:

- Removed PerconaFT from the package as it has AGPL licence (bsc#1118754).
- Do not just remove tokudb plugin but don't build it at all (missing jemalloc dependency).
- Fixed reading options for multiple instances if my${INSTANCE}.cnf is used (bsc#1132666).
- Removed 'umask 077' from mysql-systemd-helper that caused new datadirs created 
  with wrong permissions (bsc#1132666).

Release notes and changelog:

- https://kb.askmonty.org/en/mariadb-10038-release-notes
- https://kb.askmonty.org/en/mariadb-10038-changelog
- https://kb.askmonty.org/en/mariadb-10037-release-notes
- https://kb.askmonty.org/en/mariadb-10037-changelog
- https://kb.askmonty.org/en/mariadb-10036-release-notes
- https://kb.askmonty.org/en/mariadb-10036-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-05"/>
	<updated date="2019-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101676">SUSE bug 1101676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101677">SUSE bug 1101677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101678">SUSE bug 1101678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103342">SUSE bug 1103342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112368">SUSE bug 1112368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112397">SUSE bug 1112397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112417">SUSE bug 1112417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112421">SUSE bug 1112421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112432">SUSE bug 1112432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118754">SUSE bug 1118754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132666">SUSE bug 1132666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136037">SUSE bug 1136037</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3058">CVE-2018-3058 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3063">CVE-2018-3063 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3064/">CVE-2018-3064 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3064">CVE-2018-3064 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3066">CVE-2018-3066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3143/">CVE-2018-3143 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3143">CVE-2018-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3156/">CVE-2018-3156 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3156">CVE-2018-3156 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3174">CVE-2018-3174 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3251/">CVE-2018-3251 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3251">CVE-2018-3251 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3282">CVE-2018-3282 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2529/">CVE-2019-2529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2529">CVE-2019-2529 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2537/">CVE-2019-2537 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2537">CVE-2019-2537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530616" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148763" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1109663" ref_url="https://bugzilla.suse.com/1109663" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2053-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005825.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-14647: Fixed a denial of service vulnerability caused by a crafted XML document (bsc#1109847).
- CVE-2018-1000802: Fixed a command injection in the shutil module (bsc#1109663).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-16"/>
	<updated date="2019-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000802">CVE-2018-1000802 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522041" comment="libpython3_4m1_0-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522042" comment="python3-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522043" comment="python3-base-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522044" comment="python3-curses-3.4.6-25.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148764" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1137825" ref_url="https://bugzilla.suse.com/1137825" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12387" ref_url="https://www.suse.com/security/cve/CVE-2019-12387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005784.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issue:

Security issue fixed: 	  

- CVE-2019-12387: Fixed an improper sanitization of URIs or HTTP which could have allowed 
  attackers to perfrom CRLF attacks (bsc#1137825).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-06"/>
	<updated date="2019-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1137825">SUSE bug 1137825</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12387/">CVE-2019-12387 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12387">CVE-2019-12387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596917" comment="python-Twisted-15.2.1-9.5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148765" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1133037" ref_url="https://bugzilla.suse.com/1133037" source="BUGZILLA"/>
		<reference ref_id="1141619" ref_url="https://bugzilla.suse.com/1141619" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2080-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005826.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issues:

Security issues fixed: 	  

- CVE-2019-11459: Fixed an improper error handling in which could have led to use of uninitialized use of memory (bsc#1133037).
- CVE-2019-1010006: Fixed a buffer overflow in backend/tiff/tiff-document.c (bsc#1141619).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-16"/>
	<updated date="2019-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141619">SUSE bug 1141619</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010006">CVE-2019-1010006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11459">CVE-2019-11459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522052" comment="evince-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522053" comment="evince-browser-plugin-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522054" comment="evince-lang-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522055" comment="evince-plugin-djvudocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522056" comment="evince-plugin-dvidocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522057" comment="evince-plugin-pdfdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522058" comment="evince-plugin-psdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522059" comment="evince-plugin-tiffdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522060" comment="evince-plugin-xpsdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522061" comment="libevdocument3-4-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522062" comment="libevview3-3-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522063" comment="nautilus-evince-3.20.2-6.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148766" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1140738" ref_url="https://bugzilla.suse.com/1140738" source="BUGZILLA"/>
		<reference ref_id="1141329" ref_url="https://bugzilla.suse.com/1141329" source="BUGZILLA"/>
		<reference ref_id="1141332" ref_url="https://bugzilla.suse.com/1141332" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525/" source="CVE"/>
		<reference ref_id="CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529/" source="CVE"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2089-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005827.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

Security issue fixed:

- CVE-2019-12529: Fixed a potential denial of service associated with HTTP Basic Authentication credentials (bsc#1141329).
- CVE-2019-12525: Fixed a denial of service during processing of HTTP Digest Authentication credentials (bsc#1141332).
- CVE-2019-13345: Fixed a cross site scripting vulnerability via user_name or auth parameter in cachemgr.cgi (bsc#1140738).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-16"/>
	<updated date="2019-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141329">SUSE bug 1141329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141332">SUSE bug 1141332</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12525">CVE-2019-12525 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12529">CVE-2019-12529 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13345">CVE-2019-13345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530622" comment="squid-3.5.21-26.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148767" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005803.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-20852: Fixed an information leak where cookies could be send to the wrong server because of incorrect domain validation (bsc#1141853).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-23"/>
	<updated date="2019-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522067" comment="libpython2_7-1_0-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522068" comment="libpython2_7-1_0-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522069" comment="python-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530623" comment="python-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522070" comment="python-base-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530624" comment="python-base-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522071" comment="python-curses-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530625" comment="python-demo-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522072" comment="python-devel-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530626" comment="python-doc-2.7.13-28.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530627" comment="python-doc-pdf-2.7.13-28.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530628" comment="python-gdbm-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530629" comment="python-idle-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522073" comment="python-tk-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522074" comment="python-xml-2.7.13-28.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148768" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005834.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:                    
                                                                                          
Security issue fixed:                                                                                 
                                                                                  
- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-10208">CVE-2019-10208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530671" comment="postgresql96-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530672" comment="postgresql96-contrib-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530673" comment="postgresql96-docs-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530674" comment="postgresql96-plperl-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530675" comment="postgresql96-plpython-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530676" comment="postgresql96-pltcl-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530677" comment="postgresql96-server-9.6.15-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148769" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs6 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1140290" ref_url="https://bugzilla.suse.com/1140290" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13173" ref_url="https://www.suse.com/security/cve/CVE-2019-13173/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005829.html" source="SUSE-SU"/>
		<description>
This update for nodejs6 fixes the following issues:

- CVE-2019-13173: Fixed a potential file overwrite via hardlink in fstream.DirWriter() (bsc#1140290).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-19"/>
	<updated date="2019-08-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140290">SUSE bug 1140290</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13173/">CVE-2019-13173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13173">CVE-2019-13173 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597646" comment="nodejs6-6.17.0-11.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148770" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rails-html-sanitizer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1086598" ref_url="https://bugzilla.suse.com/1086598" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3741" ref_url="https://www.suse.com/security/cve/CVE-2018-3741/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005828.html" source="SUSE-SU"/>
		<description>
This update for rubygem-rails-html-sanitizer fixes the following issues:

- CVE-2018-3741: Fixed a XSS vulnerability due to insufficient filtering in scrub_attribute (bsc#1086598).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-19"/>
	<updated date="2019-08-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086598">SUSE bug 1086598</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3741/">CVE-2018-3741 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3741">CVE-2018-3741 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597647" comment="ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148771" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-loofah (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1086598" ref_url="https://bugzilla.suse.com/1086598" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8048" ref_url="https://www.suse.com/security/cve/CVE-2018-8048/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005837.html" source="SUSE-SU"/>
		<description>
This update for rubygem-loofah fixes the following issues:

- Security issue fixed:

- CVE-2018-8048: Update fix to make Loofah::HTML5::Scrub.force_correct_attribute_escaping! callable from other gems (bsc#1086598). 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-23"/>
	<updated date="2019-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086598">SUSE bug 1086598</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8048/">CVE-2018-8048 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8048">CVE-2018-8048 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597648" comment="ruby2.1-rubygem-loofah-2.0.2-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148772" version="1" class="patch">
	<metadata>
		<title>Security update for ardana-ansible, ardana-db, ardana-freezer, ardana-glance, ardana-input-model, ardana-nova, ardana-osconfig, ardana-tempest, caasp-openstack-heat-templates, crowbar-core, crowbar-ha, crowbar-openstack, crowbar-ui, documentation-suse-openstack-cloud, galera-python-clustercheck, openstack-cinder, openstack-glance, openstack-heat, openstack-horizon-plugin-monasca-ui, openstack-horizon-plugin-neutron-fwaas-ui, openstack-ironic, openstack-keystone, openstack-manila, openstack-monasca-agent, openstack-monasca-api, openstack-monasca-persister, openstack-monasca-persister-java, openstack-murano, openstack-neutron, openstack-neutron-gbp, openstack-neutron-lbaas, openstack-nova, openstack-octavia, python-Beaver, python-oslo.db, python-osprofiler, python-swiftlm, venv-openstack-magnum, venv-openstack-monasca, venv-openstack-monasca-ceilometer, venv-openstack-murano, venv-openstack-neutron (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1070500" ref_url="https://bugzilla.suse.com/1070500" source="BUGZILLA"/>
		<reference ref_id="1108818" ref_url="https://bugzilla.suse.com/1108818" source="BUGZILLA"/>
		<reference ref_id="1118159" ref_url="https://bugzilla.suse.com/1118159" source="BUGZILLA"/>
		<reference ref_id="1120657" ref_url="https://bugzilla.suse.com/1120657" source="BUGZILLA"/>
		<reference ref_id="1122053" ref_url="https://bugzilla.suse.com/1122053" source="BUGZILLA"/>
		<reference ref_id="1122825" ref_url="https://bugzilla.suse.com/1122825" source="BUGZILLA"/>
		<reference ref_id="1124170" ref_url="https://bugzilla.suse.com/1124170" source="BUGZILLA"/>
		<reference ref_id="1128382" ref_url="https://bugzilla.suse.com/1128382" source="BUGZILLA"/>
		<reference ref_id="1128453" ref_url="https://bugzilla.suse.com/1128453" source="BUGZILLA"/>
		<reference ref_id="1128783" ref_url="https://bugzilla.suse.com/1128783" source="BUGZILLA"/>
		<reference ref_id="1129729" ref_url="https://bugzilla.suse.com/1129729" source="BUGZILLA"/>
		<reference ref_id="1132654" ref_url="https://bugzilla.suse.com/1132654" source="BUGZILLA"/>
		<reference ref_id="1132852" ref_url="https://bugzilla.suse.com/1132852" source="BUGZILLA"/>
		<reference ref_id="1133719" ref_url="https://bugzilla.suse.com/1133719" source="BUGZILLA"/>
		<reference ref_id="1134495" ref_url="https://bugzilla.suse.com/1134495" source="BUGZILLA"/>
		<reference ref_id="1134589" ref_url="https://bugzilla.suse.com/1134589" source="BUGZILLA"/>
		<reference ref_id="1136569" ref_url="https://bugzilla.suse.com/1136569" source="BUGZILLA"/>
		<reference ref_id="1137377" ref_url="https://bugzilla.suse.com/1137377" source="BUGZILLA"/>
		<reference ref_id="1137817" ref_url="https://bugzilla.suse.com/1137817" source="BUGZILLA"/>
		<reference ref_id="1138124" ref_url="https://bugzilla.suse.com/1138124" source="BUGZILLA"/>
		<reference ref_id="1138187" ref_url="https://bugzilla.suse.com/1138187" source="BUGZILLA"/>
		<reference ref_id="1138489" ref_url="https://bugzilla.suse.com/1138489" source="BUGZILLA"/>
		<reference ref_id="1138967" ref_url="https://bugzilla.suse.com/1138967" source="BUGZILLA"/>
		<reference ref_id="1139750" ref_url="https://bugzilla.suse.com/1139750" source="BUGZILLA"/>
		<reference ref_id="1140512" ref_url="https://bugzilla.suse.com/1140512" source="BUGZILLA"/>
		<reference ref_id="1140663" ref_url="https://bugzilla.suse.com/1140663" source="BUGZILLA"/>
		<reference ref_id="1142032" ref_url="https://bugzilla.suse.com/1142032" source="BUGZILLA"/>
		<reference ref_id="1142521" ref_url="https://bugzilla.suse.com/1142521" source="BUGZILLA"/>
		<reference ref_id="1142686" ref_url="https://bugzilla.suse.com/1142686" source="BUGZILLA"/>
		<reference ref_id="1143310" ref_url="https://bugzilla.suse.com/1143310" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3448" ref_url="https://www.suse.com/security/cve/CVE-2015-3448/" source="CVE"/>
		<reference ref_id="CVE-2017-17051" ref_url="https://www.suse.com/security/cve/CVE-2017-17051/" source="CVE"/>
		<reference ref_id="CVE-2019-9735" ref_url="https://www.suse.com/security/cve/CVE-2019-9735/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005842.html" source="SUSE-SU"/>
		<description>
This update for ardana-ansible, ardana-db, ardana-freezer, ardana-glance, ardana-input-model, ardana-nova, ardana-osconfig, ardana-tempest, caasp-openstack-heat-templates, crowbar-core, crowbar-ha, crowbar-openstack, crowbar-ui, documentation-suse-openstack-cloud, galera-python-clustercheck, openstack-cinder, openstack-glance, openstack-heat, openstack-horizon-plugin-monasca-ui, openstack-horizon-plugin-neutron-fwaas-ui, openstack-ironic, openstack-keystone, openstack-manila, openstack-monasca-agent, openstack-monasca-api, openstack-monasca-persister, openstack-monasca-persister-java, openstack-murano, openstack-neutron, openstack-neutron-gbp, openstack-neutron-lbaas, openstack-nova, openstack-octavia, python-Beaver, python-oslo.db, python-osprofiler, python-swiftlm, venv-openstack-magnum, venv-openstack-monasca, venv-openstack-monasca-ceilometer, venv-openstack-murano, venv-openstack-neutron fixes the following issues:

- Update to version 8.0+git.1560208949.67048e3:
  * Adds repository list parameter (bsc#1122825)

- Update to version 8.0+git.1564410318.f0cca2c:
  * Don't use 'latest' with 'zypper' (SOC-9997)

- Update to version 8.0+git.1564164977.ef9baeb:
  * Freezer Config file is mixed case (SOC-9700)

- Update to version 8.0+git.1564491709.349d78e:
  * Default glance_default_store to rbd if SES enabled (SOC-8749)

- Update to version 8.0+git.1562848601.c3daff0:
  * Include memcached in the minimal ardana-ci model (SOC-9800)

- Update to version 8.0+git.1565388406.c6abb8d:
  * Make default/rpc_response_timeout configurable (SOC-9285)

- Update to version 8.0+git.1562943864.e04a92f:
  * Resolves nova-novncproxy random status failures (SOC-9574)

- Update to version 8.0+git.1560180700.bd26898:
  * Adding support for qemu-ovmf to ardana (SOC-8985)

- Update to version 8.0+git.1563383198.c7fd9b4:
  * Add an global_filter entry to lvm.conf  (bsc#1140512)

- Update to version 8.0+git.1559761021.5605746:
  * Enable FCOE for SUSE platform family (SCRD-8562)

- Update to version 8.0+git.1562849010.73bc517:
  * Fix Keystone only deployment tempest testing (SOC-9800)

- Update to version 8.0+git.1560764545.6c8d2dc:
  * Install manila tempest tests package (SOC-7496)

- Update to version 8.0+git.1560330843.b7d807c:
  * Add configuration for manila-tempest-plugin (SOC-7496)

- Update to version 1.0+git.1560518045.ad7dc6d:
  * Patching node before bootstraping

- Update to version 5.0+git.1565280360.01fed6905:
  * batch: Fix get_proposal_json (SOC-9954)
  * batch: Format crowbar batch error output (SOC-9954)
  * batch: Format crowbar batch error output (SOC-9954)

- Update to version 5.0+git.1564657662.75174c965:
  * travis: Whitelist CVE-2015-3448 (SOC-9911)
  * travis: Use env variable for commit range (SOC-9911)
  * Use proper names for the Travis Tests (SOC-9565)
  * Replace Danger with Gitlint (SOC-9565)
  * Switch from Travis dist from Trusty to Xenial (SOC-9565)

- Update to version 5.0+git.1563983933.03880f1c8:
  * dns: fix migration for designate

- Update to version 5.0+git.1562080799.f2dd7d0dd:
  * network: Don't set datapath-ids on ovs-bridges anymore
  * crowbar: Save sync_mark attributes in databag

- Update to version 5.0+git.1561648142.b6be652e9:
  * dns: forwards dns queries to dns-master when using desingate
  * dns: write admin network in ip/mask notation for bind9
  * dns: skip installing designate-rndc-key on non-master nodes
  * dns: fix designate migration
  * dns: allow using dns-server as designate target
  * bind: Allow new zones configured via rndc
  * bind: Disable listening on IPv6 addresses for now

- Update to version 5.0+git.1561465092.4dc67a7fa:
  * travis: pin sexp_processor to 4.12.0

- Update to version 5.0+git.1561380950.b4e37c0e2:
  * deployer: Use dhcp on crowbar_register only when enable_pxe is set (bsc#1132654)
  * network: Allow locking down the network config for nodes (bsc#1120657)

- Update to version 5.0+git.1562069707.e2de18c:
  * Add timeout multiplier
  * Make default sync_mark timeout configurable

- Update to version 5.0+git.1565270683.ea6e63d87:
  * designate: Use server node for VIP look ups (SOC-9631)

- Update to version 5.0+git.1565081678.e15f2c9a9:
  * nova: add max_threads_per_process tuneable (SOC-10001, bsc#1133719)

- Update to version 5.0+git.1562911219.f22efd5c2:
  * designate: allow worker on cluster (SOC-9632)
  * swift: Sync HA nodes (SOC-9683)

- Update to version 5.0+git.1562731577.aefaf8a6d:
  * Improve Mnesia IO performances

- Update to version 5.0+git.1562650331.0e86ce8ba:
  * cinder: Set cinder pool to exclusive by default when using embedded ceph

- Update to version 5.0+git.1561984197.a675e8c50:
  * designate: do not install the keystone_authtoken on worker nodes
  * neutron: enable designate integration
  * designate: rely on dns-master entirely
  * designate: Fix variables initialization in mdns
  * designate: start and run the mdns service
  * designate: Finish rename of role to designate-worker
  * designate: address most hound comments.
  * designate: update monasca monitoring.
  * neutron: add floating_dns_domain setting
  * designate: Add initial designate barclamp

- Update to version 5.0+git.1559857295.d68afb38f:
  * rabbitmq: Fix ACL of SSL key after uid/gid change

- Update to version 5.0+git.1559536094.a9cc7f312:
  * nova: Don't retry creating existing flavors

- Update to version 1.2.0+git.1563181545.65360af5:
  * upgrade: Update repocheck keys
  * Update texts for 8-9 upgrade (SOC-9689)

- Update to version 1.2.0+git.1562579063.5690a1bc:
  * Pin gulp-angular-templatecache version

- Update to version 8.20190805:
  * DC files: Align profiling, throw out unnecessary attributes
  * Rename DCs: 'hos-imported' to 'clm-all' &amp; '-all' to 'crowbar-all'
  * Fix styleroot of Helion set
  * add ardana prompt, add ardana-init step (bsc#1143310)
  * New ID format (noref)
- Update packaging to deal with new IDs

- Update to version 8.20190729:
  * add image-volume cache instructions for SES (bsc#1140663)

- Update to version 8.20190725:
  * warning about .j2 file comments (bsc#1142521)
  * MANAGEMENT network group name cannot be changed (bsc#1142686)

- Update to version 8.20190724:
  * replace SUSE ca-certificate instructions for Crowbar (bsc#1136569)
  * replace SUSE ca-certificate instructions (bsc#1136569)

- Update to version 8.20190723:
  * update MariaDB manually with CLI (bsc#1132852, SOC-9022)
  * clarify No Maintenance Mode (bsc#1108818)
  * replace empty ESX compatibility guide (noref)
  * delete cache volume before trying to use source volume (bsc#1142032)
  * delete cache volume when source volume is changed (bsc#1142032)
  * replace empty ESX compatibility guide (noref)

- Update to version 8.20190719:
  * add hostnamectl to ardana-update-pkgs process (bsc#1138967)

- Update to version 8.20190718:
  * correct repo URL (bsc#1134589)
  * remove duplicate content (bsc#1138489)

- Update to version 8.20190717:
  * corrections from Scott Wulf (bsc#1128453)
  * replace SLES 12 SP2 with SLES 12 SP3 (bsc#1128382)
  * add information about image-volume-cache (bsc#1140663)
  * remove deprecated parameters (bsc#1138124)
  * correct file reference (bsc#1137377)
  * change SES URL (bsc#1137817)
  * manually set br-int(bsc#1139750)
  * update MariaDB manually with CLI (bsc#1132852, SOC-9022)

- Update to version 8.20190717:
  * Fix DC file

- Update to version 8.20190621:
  * minor grammar fixups
  * add external reference to Deploy Keystone
  * add LDAP integration troubleshooting (bsc#1134495)
  * clarify LDAP manual vs GUI (bsc#1134495)
  * address requested changes
  * SOC8 alarm table restructure ((SCRD-7710, bsc#1124170)

- Update to version 8.20190620:
  * Update installation-installation-ses_integration.xml
  * Adding copy-on-write cloning backport - BSC#1138187
  * move fernet token to supported Keystone feature
  * Remove obsolete DC/DEF file
  * Fix title
  * CLM - update MariaDB manually (bsc#1132852, SOC-9022)
  * update MariaDB manually (bsc#1132852, SOC-9022)
  * Fix command to create external network
  * Remove sudo from commands in 'Setting Up Multiple External Networks'
  * address requested changes
  * SOC8 alarm table restructure ((SCRD-7710, bsc#1124170)
  * add scottwulf content
  * address recommended changes
  * change PTF deploy instructions (bsc#1128453)

- Update to version 8.20190613:
  * Update installation-installation-ses_integration.xml
  * Adding copy-on-write cloning backport - BSC#1138187

- Update to version 8.20190605:
  * move fernet token to supported Keystone feature

- Add 0001-Use-strings-when-setting-X-Cache-header.patch
  Fixes a problem with Twisted versions where headers values
  must be strings, not bools.

- Update to version 0.0+git.1562242499.36b8b64 (bsc#1122053):
  * Add optional systemd ready and watchdog support
  * Drop unneeded check for 'conn'
  * Reset last_query_response when the cache needs to be updated
  * Drop unneeded 'conn' var initialization
  * Move respone header generation to own function
  * Use None as default result
  * Drop opts.being_updated variable
  * Use contextmanager for DB connection
  * Refactor DB method to get WSREP local state
  * Refactor method to get readonly DB status
  * pep8: Fix E712 comparison to False should be 'if cond is False:'
  * pep8: Fix E305 expected 2 blank lines after class or function def
  * pep8: Fix E124 closing bracket does not match visual indentation
  * pep8: Fix E251 unexpected spaces around keyword / parameter equals
  * pep8: Fix E262 inline comment should start with '# '
  * pep8: Fix E261 at least two spaces before inline comment
  * pep8: Fix F841 local variable is assigned to but never used
  * pep8: Fix E302 expected 2 blank lines, found 1
  * pep8: Fix E265 block comment should start with '# '
  * pep8: Fix E231 missing whitespace after ','
  * pep8: Fix E999 SyntaxError: invalid syntax
  * pep8: Fix F821 undefined name
  * pep8: Fix E225 missing whitespace around operator
  * pep8: Fix E221 multiple spaces before operator
  * pep8: Fix F401 module imported but unused
  * Add clustercheck to console_scripts
  * Add basic test infrastructure and a first pep8 job
  * Fix exception handling for pymysql exception
  * Readd argparse usage
  * Fix installation requirements
  * Add read timeout to prevent connection hanging forever
  * Exclude benchmark/ directory when creating sdist tarball
  * Use argparse instead of optparse
  * Add basic logging infrastructure
  * Add a standard setup.py file
  * Catch all query exceptions
  * Switch to PyMySQL
- Drop pymysql.patch and readtimeout.patch. Both merged upstream.
- Use systemd service type=notify which is now supported upstream
- Use systemd watchdog which is now supported upstream

- Update to version cinder-11.2.3.dev7:
  * [VNX] Fix test case issue

- Update to version cinder-11.2.3.dev6:
  * VMAX Pike docs - clarifying supported software in Pike

- Update to version cinder-11.2.3.dev7:
  * [VNX] Fix test case issue

- Update to version cinder-11.2.3.dev6:
  * VMAX Pike docs - clarifying supported software in Pike

- Update to version glance-15.0.3.dev2:
  * Add a local bindep.txt override
  * OpenDev Migration Patch
  15.0.2

- Update to version glance-15.0.3.dev2:
  * Add a local bindep.txt override
  * OpenDev Migration Patch
  15.0.2

- Update to version heat-9.0.8.dev11:
  * Retry on DB deadlock in event\_create()

- Update to version heat-9.0.8.dev10:
  * Add local bindep.txt and limit bandit version

- Update to version heat-9.0.8.dev9:
  * Fix regression with SW deployments when region not configured
  * Return None for attributes of sd with no actions
  * Fix multi region issue for software deployment

- Update to version heat-9.0.8.dev4:
  * Blacklist bandit 1.6.0 and cap Sphinx on Python2

- Update to version heat-9.0.8.dev11:
  * Retry on DB deadlock in event\_create()

- Update to version heat-9.0.8.dev10:
  * Add local bindep.txt and limit bandit version

- Update to version heat-9.0.8.dev9:
  * Fix regression with SW deployments when region not configured
  * Return None for attributes of sd with no actions
  * Fix multi region issue for software deployment

- Update to version heat-9.0.8.dev4:
  * Blacklist bandit 1.6.0 and cap Sphinx on Python2

- update to version 1.8.1~dev39
  - Convert README.md to ReStructuredText format
  - OpenDev Migration Patch

- don't exclude *pyc files to fix update/upgrade (SOC-9339)

- Update to version ironic-9.1.8.dev7:
  * Add bindep.txt

- Update to version ironic-9.1.8.dev6:
  * Update sphinx requirements

- Update to version ironic-9.1.8.dev7:
  * Add bindep.txt

- Update to version ironic-9.1.8.dev6:
  * Update sphinx requirements

- 0001-Allow-domain-admin-to-list-projest-assignments.patch
  * bsc#1118159
  * forward-port from SOC 7

- Update to version manila-5.1.1.dev2:
  * [CI] Add bindep.txt
  * OpenDev Migration Patch
  5.1.0

- Update to version manila-5.1.1.dev2:
  * [CI] Add bindep.txt
  * OpenDev Migration Patch
  5.1.0

- update to version 2.2.5~dev5
  - Convert README to reStructuredText
  - OpenDev Migration Patch

- update to version 2.2.2~dev1
  - OpenDev Migration Patch
  - Fix test_metrics tempest-test encoding
  - Convert README.md to ReStructuredText format

- update to version 1.7.1~dev10
  - OpenDev Migration Patch
  - Convert README.md to ReStructuredTest format

- Add 0001-Update-all-columns-in-metrics-on-an-update-to-refres.patch (bsc#1128783)

- Add java-persister-defaults.patch
- Update to version murano-4.0.2.dev2:
  * Add local bindep.txt
  * OpenDev Migration Patch
  4.0.1

- Update to version murano-4.0.2.dev2:
  * Add local bindep.txt
  * OpenDev Migration Patch
  4.0.1

- Update to version neutron-11.0.9.dev42:
  * Yield control to other greenthreads while processing trusted ports

- Update to version neutron-11.0.9.dev41:
  * DVR: on new port only send router update on port's host

- Update to version neutron-11.0.9.dev40:
  * Reset MAC on unbinding direct-physical port

- Update to version neutron-11.0.9.dev38:
  * SRIOV agent: wait VFs initialization on embedded switch create

- Update to version neutron-11.0.9.dev36:
  * Make OVS controller inactivity\_probe configurable

- Update to version neutron-11.0.9.dev34:
  * Packets getting lost during SNAT with too many connections
  * [DVR] Block ARP to dvr router's port instead of subnet's gateway

- Update to version neutron-11.0.9.dev30:
  * improve dvr port update under large scale deployment

- Update to version neutron-11.0.9.dev29:
  * cap bandit in test-requirements.txt

- Update to version neutron-11.0.9.dev42:
  * Yield control to other greenthreads while processing trusted ports

- Update to version neutron-11.0.9.dev41:
  * DVR: on new port only send router update on port's host

- Update to version neutron-11.0.9.dev40:
  * Reset MAC on unbinding direct-physical port

- Update to version neutron-11.0.9.dev38:
  * SRIOV agent: wait VFs initialization on embedded switch create

- Update to version neutron-11.0.9.dev36:
  * Make OVS controller inactivity\_probe configurable

- Update to version neutron-11.0.9.dev34:
  * Packets getting lost during SNAT with too many connections
  * [DVR] Block ARP to dvr router's port instead of subnet's gateway

- Update to version neutron-11.0.9.dev30:
  * improve dvr port update under large scale deployment

- Update to version neutron-11.0.9.dev29:
  * cap bandit in test-requirements.txt

  * When converting sg rules to iptables, do not emit dport if not supported (CVE-2019-9735, bsc#1129729)
- Update to version group-based-policy-7.3.1.dev45:
  * Adding icmp\_code and icmp\_type for SG rule

- Update to version group-based-policy-7.3.1.dev43:
  * A VM could be associated with multiple ports
  * Optimize the extend\_router\_dict() call

- Update to version group-based-policy-7.3.1.dev40:
  * [AIM] Enhance gbp-validate to detect routed subnet overlap
  * [AIM] Prevent overlapping CIDRs in routed VRF

- Update to version group-based-policy-7.3.1.dev37:
  * Disallow external subnets as router interfaces
  * Make DHCP provisioning blocks conditional

- Update to version group-based-policy-7.3.1.dev34:
  * Fix issues on sync\_state display on neutron based on AIM status
  * Send the port updates for the SNAT case if needed

- Update to version group-based-policy-7.3.1.dev32:
  * Pull the upper constraint file also from the opendev.org site

- Update to version group-based-policy-7.3.1.dev31:
  * Fix the thread concurrency issue while calling gbp purge

- Update to version group-based-policy-7.3.1.dev30:
  * [AIM] Fix handling of missing PortSecurityBinding

- Update to version group-based-policy-7.3.1.dev29:
  * [AIM] Don't override loading of SG rules when validating

- add 0001-neutron-lbaas-haproxy-agent-prevent-vif-unplug-when-.patch
  and 0001-Fix-memory-leak-in-the-haproxy-provider-driver.patch

- Update to version nova-16.1.9.dev4:
  * Implement power\_off/power\_on for the FakeDriver

- Update to version nova-16.1.9.dev4:
  * Implement power\_off/power\_on for the FakeDriver

  * Fix doubling allocations on rebuild (CVE-2017-17051, bsc#1070500)
- Update to version octavia-1.0.6.dev2:
  * Add bindep.txt and ignore sha1 warning
  * OpenDev Migration Patch
  1.0.5

- Switch to new Gerrit Server

- added 0001-exc_filters-fix-deadlock-detection-for-MariaDB-Galer.patch

- added 0001-Add-sqlalchemy-collector.patch
- added 0001-Don-t-fail-if-sqlalchemy-driver-fails-to-initialize.patch
- update to version 1.11.1
  - Update .gitreview for stable/pike
  - import zuul job settings from project-config

- Switch to new Gerrit Server

- Fix lower version numver after inheriting the version from main
  component (SCRD-8523)

- Do not relocate shebang in make-cert.py (SCRD-8594)

- Inherit version number of venv from main component (SCRD-8523)

- Inherit version number of venv from main component (SCRD-8523)

- Fix lower version numver after inheriting the version from main
  component (SCRD-8523)

- Inherit version number of venv from main component (SCRD-8523)

- Inherit version number of venv from main component (SCRD-8523)

- Remove openstack-neutron-opflex-agent, python-aci-integration-module,
  python-acitoolkit, python-apicapi and python-networking-cisco as
  they pull in new requirements into the product

- Inherit version number of venv from main component (SCRD-8523)

- Added to the neutron virtual environment:
  * python-aci-integration-module
  * python-acitoolkit
  * python-apicapi
  * python-networking-cisco
  * openstack-neutron-gbp
  * openstack-neutron-opflex-agent

- Inherit version number of venv from main component (SCRD-8523)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-26"/>
	<updated date="2019-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1070500">SUSE bug 1070500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108818">SUSE bug 1108818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118159">SUSE bug 1118159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120657">SUSE bug 1120657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122053">SUSE bug 1122053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122825">SUSE bug 1122825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124170">SUSE bug 1124170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128382">SUSE bug 1128382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128453">SUSE bug 1128453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128783">SUSE bug 1128783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129729">SUSE bug 1129729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132654">SUSE bug 1132654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132852">SUSE bug 1132852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133719">SUSE bug 1133719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134495">SUSE bug 1134495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134589">SUSE bug 1134589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136569">SUSE bug 1136569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137377">SUSE bug 1137377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137817">SUSE bug 1137817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138124">SUSE bug 1138124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138187">SUSE bug 1138187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138489">SUSE bug 1138489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138967">SUSE bug 1138967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139750">SUSE bug 1139750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140512">SUSE bug 1140512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140663">SUSE bug 1140663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142032">SUSE bug 1142032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142521">SUSE bug 1142521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142686">SUSE bug 1142686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143310">SUSE bug 1143310</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3448/">CVE-2015-3448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3448">CVE-2015-3448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17051/">CVE-2017-17051 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17051">CVE-2017-17051 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9735/">CVE-2019-9735 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9735">CVE-2019-9735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596929" comment="caasp-openstack-heat-templates-1.0+git.1560518045.ad7dc6d-4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597649" comment="crowbar-core-5.0+git.1565280360.01fed6905-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597650" comment="crowbar-core-branding-upstream-5.0+git.1565280360.01fed6905-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597651" comment="crowbar-ha-5.0+git.1562069707.e2de18c-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597652" comment="crowbar-openstack-5.0+git.1565270683.ea6e63d87-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597653" comment="crowbar-ui-1.2.0+git.1563181545.65360af5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597654" comment="documentation-suse-openstack-cloud-deployment-8.20190805-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596935" comment="documentation-suse-openstack-cloud-supplement-8.20190805-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596936" comment="documentation-suse-openstack-cloud-upstream-admin-8.20190805-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596937" comment="documentation-suse-openstack-cloud-upstream-user-8.20190805-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596939" comment="galera-python-clustercheck-0.0+git.1562242499.36b8b64-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596940" comment="grafana-monasca-ui-drilldown-1.8.1~dev39-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596941" comment="openstack-cinder-11.2.3~dev7-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596942" comment="openstack-cinder-api-11.2.3~dev7-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596943" comment="openstack-cinder-backup-11.2.3~dev7-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596944" comment="openstack-cinder-doc-11.2.3~dev7-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596945" comment="openstack-cinder-scheduler-11.2.3~dev7-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596946" comment="openstack-cinder-volume-11.2.3~dev7-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596947" comment="openstack-glance-15.0.3~dev2-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596948" comment="openstack-glance-api-15.0.3~dev2-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596949" comment="openstack-glance-doc-15.0.3~dev2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596950" comment="openstack-glance-registry-15.0.3~dev2-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596951" comment="openstack-heat-9.0.8~dev11-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596952" comment="openstack-heat-api-9.0.8~dev11-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596953" comment="openstack-heat-api-cfn-9.0.8~dev11-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596954" comment="openstack-heat-api-cloudwatch-9.0.8~dev11-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596955" comment="openstack-heat-doc-9.0.8~dev11-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596956" comment="openstack-heat-engine-9.0.8~dev11-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596957" comment="openstack-heat-plugin-heat_docker-9.0.8~dev11-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596958" comment="openstack-heat-test-9.0.8~dev11-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596959" comment="openstack-horizon-plugin-monasca-ui-1.8.1~dev39-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596960" comment="openstack-horizon-plugin-neutron-fwaas-ui-1.0.1~dev9-4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596961" comment="openstack-ironic-9.1.8~dev7-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596962" comment="openstack-ironic-api-9.1.8~dev7-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596963" comment="openstack-ironic-conductor-9.1.8~dev7-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596964" comment="openstack-ironic-doc-9.1.8~dev7-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596965" comment="openstack-keystone-12.0.4~dev2-5.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596966" comment="openstack-keystone-doc-12.0.4~dev2-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596967" comment="openstack-manila-5.1.1~dev2-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596968" comment="openstack-manila-api-5.1.1~dev2-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596969" comment="openstack-manila-data-5.1.1~dev2-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596970" comment="openstack-manila-doc-5.1.1~dev2-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596971" comment="openstack-manila-scheduler-5.1.1~dev2-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596972" comment="openstack-manila-share-5.1.1~dev2-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596973" comment="openstack-monasca-agent-2.2.5~dev5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596974" comment="openstack-monasca-api-2.2.2~dev1-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596975" comment="openstack-monasca-persister-1.7.1~dev10-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596976" comment="openstack-monasca-persister-java-1.7.1~a0~dev2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596977" comment="openstack-murano-4.0.2~dev2-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596978" comment="openstack-murano-api-4.0.2~dev2-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596979" comment="openstack-murano-doc-4.0.2~dev2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596980" comment="openstack-murano-engine-4.0.2~dev2-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596981" comment="openstack-neutron-11.0.9~dev42-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596982" comment="openstack-neutron-dhcp-agent-11.0.9~dev42-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596983" comment="openstack-neutron-doc-11.0.9~dev42-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596984" comment="openstack-neutron-gbp-7.3.1~dev45-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596985" comment="openstack-neutron-ha-tool-11.0.9~dev42-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596986" comment="openstack-neutron-l3-agent-11.0.9~dev42-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596987" comment="openstack-neutron-lbaas-11.0.4~dev6-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596988" comment="openstack-neutron-lbaas-agent-11.0.4~dev6-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596989" comment="openstack-neutron-lbaas-doc-11.0.4~dev6-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596990" comment="openstack-neutron-linuxbridge-agent-11.0.9~dev42-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596991" comment="openstack-neutron-macvtap-agent-11.0.9~dev42-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596992" comment="openstack-neutron-metadata-agent-11.0.9~dev42-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596993" comment="openstack-neutron-metering-agent-11.0.9~dev42-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596994" comment="openstack-neutron-openvswitch-agent-11.0.9~dev42-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596995" comment="openstack-neutron-server-11.0.9~dev42-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596996" comment="openstack-nova-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596997" comment="openstack-nova-api-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596998" comment="openstack-nova-cells-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596999" comment="openstack-nova-compute-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597000" comment="openstack-nova-conductor-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597001" comment="openstack-nova-console-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597002" comment="openstack-nova-consoleauth-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597003" comment="openstack-nova-doc-16.1.9~dev4-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597004" comment="openstack-nova-novncproxy-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597005" comment="openstack-nova-placement-api-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597006" comment="openstack-nova-scheduler-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597007" comment="openstack-nova-serialproxy-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597008" comment="openstack-nova-vncproxy-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597009" comment="openstack-octavia-1.0.6~dev2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597010" comment="openstack-octavia-amphora-agent-1.0.6~dev2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597011" comment="openstack-octavia-api-1.0.6~dev2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597012" comment="openstack-octavia-health-manager-1.0.6~dev2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597013" comment="openstack-octavia-housekeeping-1.0.6~dev2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597014" comment="openstack-octavia-worker-1.0.6~dev2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597016" comment="python-cinder-11.2.3~dev7-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597017" comment="python-glance-15.0.3~dev2-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597018" comment="python-heat-9.0.8~dev11-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597019" comment="python-horizon-plugin-monasca-ui-1.8.1~dev39-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597020" comment="python-horizon-plugin-neutron-fwaas-ui-1.0.1~dev9-4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597021" comment="python-ironic-9.1.8~dev7-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597022" comment="python-keystone-12.0.4~dev2-5.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597023" comment="python-manila-5.1.1~dev2-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597024" comment="python-monasca-agent-2.2.5~dev5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597025" comment="python-monasca-api-2.2.2~dev1-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597026" comment="python-monasca-persister-1.7.1~dev10-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597027" comment="python-murano-4.0.2~dev2-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597028" comment="python-neutron-11.0.9~dev42-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597029" comment="python-neutron-gbp-7.3.1~dev45-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597030" comment="python-neutron-lbaas-11.0.4~dev6-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597031" comment="python-nova-16.1.9~dev4-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597032" comment="python-octavia-1.0.6~dev2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597033" comment="python-oslo.db-4.25.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597034" comment="python-osprofiler-1.11.1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148773" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1133719" ref_url="https://bugzilla.suse.com/1133719" source="BUGZILLA"/>
		<reference ref_id="1138301" ref_url="https://bugzilla.suse.com/1138301" source="BUGZILLA"/>
		<reference ref_id="1138303" ref_url="https://bugzilla.suse.com/1138303" source="BUGZILLA"/>
		<reference ref_id="1138734" ref_url="https://bugzilla.suse.com/1138734" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<reference ref_id="CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005851.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path
  parameter pointing anywhere on the system and potentially leading to execution
  of a malicious file with root privileges by libvirtd (bsc#1138301).
- CVE-2019-10167: Fixed an issue with virConnectGetDomainCapabilities API which
  could have been used to execute arbitrary emulators (bsc#1138303).

Non-security issues fixed:

- Fixed an issue with short bitmaps when setting vcpu affinity using the vcpupin (bsc#1138734).
- Added support for overriding max threads per process limit (bsc#1133719)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-28"/>
	<updated date="2019-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133719">SUSE bug 1133719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138303">SUSE bug 1138303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138734">SUSE bug 1138734</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10161">CVE-2019-10161 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10167">CVE-2019-10167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555647" comment="libvirt-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555648" comment="libvirt-admin-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555649" comment="libvirt-client-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555650" comment="libvirt-daemon-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555651" comment="libvirt-daemon-config-network-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555652" comment="libvirt-daemon-config-nwfilter-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555653" comment="libvirt-daemon-driver-interface-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538264" comment="libvirt-daemon-driver-libxl-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555654" comment="libvirt-daemon-driver-lxc-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555655" comment="libvirt-daemon-driver-network-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555656" comment="libvirt-daemon-driver-nodedev-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555657" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555658" comment="libvirt-daemon-driver-qemu-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555659" comment="libvirt-daemon-driver-secret-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555660" comment="libvirt-daemon-driver-storage-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555661" comment="libvirt-daemon-driver-storage-core-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555662" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555663" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555664" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555665" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538277" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555666" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555667" comment="libvirt-daemon-hooks-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555668" comment="libvirt-daemon-lxc-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555669" comment="libvirt-daemon-qemu-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538282" comment="libvirt-daemon-xen-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555670" comment="libvirt-doc-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555671" comment="libvirt-libs-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555672" comment="libvirt-lock-sanlock-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555673" comment="libvirt-nss-3.3.0-5.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148774" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1136468" ref_url="https://bugzilla.suse.com/1136468" source="BUGZILLA"/>
		<reference ref_id="1139945" ref_url="https://bugzilla.suse.com/1139945" source="BUGZILLA"/>
		<reference ref_id="1142880" ref_url="https://bugzilla.suse.com/1142880" source="BUGZILLA"/>
		<reference ref_id="1142882" ref_url="https://bugzilla.suse.com/1142882" source="BUGZILLA"/>
		<reference ref_id="1142883" ref_url="https://bugzilla.suse.com/1142883" source="BUGZILLA"/>
		<reference ref_id="1142885" ref_url="https://bugzilla.suse.com/1142885" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12308" ref_url="https://www.suse.com/security/cve/CVE-2019-12308/" source="CVE"/>
		<reference ref_id="CVE-2019-12781" ref_url="https://www.suse.com/security/cve/CVE-2019-12781/" source="CVE"/>
		<reference ref_id="CVE-2019-14232" ref_url="https://www.suse.com/security/cve/CVE-2019-14232/" source="CVE"/>
		<reference ref_id="CVE-2019-14233" ref_url="https://www.suse.com/security/cve/CVE-2019-14233/" source="CVE"/>
		<reference ref_id="CVE-2019-14234" ref_url="https://www.suse.com/security/cve/CVE-2019-14234/" source="CVE"/>
		<reference ref_id="CVE-2019-14235" ref_url="https://www.suse.com/security/cve/CVE-2019-14235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2257-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192257-1.html" source="SUSE-SU"/>
		<description>
This update for python-Django to version 1.11.23 fixes the following issues:

- CVE-2019-14232: Fixed a denial of service in 'django.utils.text.Truncator' (bsc#1142880).
- CVE-2019-14233: Fixed a denial of service in strip_tags() (bsc#1142882).
- CVE-2019-14234: Fixed an SQL injection in key and index lookups for 'JSONField'/'HStoreField' (bsc#1142883).
- CVE-2019-14235: Fixed a potential memory exhaustion in 'django.utils.encoding.uri_to_iri()' (bsc#1142885).
- CVE-2019-12781: Fixed incorrect HTTP detection with reverse-proxy connecting via HTTPS (bsc#1139945).
- CVE-2019-12308: Fixed a cross site scripting vulnerability in the AdminURLFieldWidget (bsc#1136468).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136468">SUSE bug 1136468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139945">SUSE bug 1139945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142880">SUSE bug 1142880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142882">SUSE bug 1142882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142883">SUSE bug 1142883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142885">SUSE bug 1142885</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12308/">CVE-2019-12308 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12308">CVE-2019-12308 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12781/">CVE-2019-12781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12781">CVE-2019-12781 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14232/">CVE-2019-14232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14232">CVE-2019-14232 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14233/">CVE-2019-14233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14233">CVE-2019-14233 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14234/">CVE-2019-14234 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14234">CVE-2019-14234 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14235/">CVE-2019-14235 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14235">CVE-2019-14235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597041" comment="python-Django-1.11.23-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148775" version="1" class="patch">
	<metadata>
		<title>Security update for python-SQLAlchemy (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1124593" ref_url="https://bugzilla.suse.com/1124593" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7164" ref_url="https://www.suse.com/security/cve/CVE-2019-7164/" source="CVE"/>
		<reference ref_id="CVE-2019-7548" ref_url="https://www.suse.com/security/cve/CVE-2019-7548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2261-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192261-1.html" source="SUSE-SU"/>
		<description>
This update for python-SQLAlchemy fixes the following issues:

Security issues fixed:

- CVE-2019-7164: Fixed SQL Injection via the order_by parameter (bsc#1124593).
- CVE-2019-7548: Fixed SQL Injection via the group_by parameter (bsc#1124593).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124593">SUSE bug 1124593</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7164/">CVE-2019-7164 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7164">CVE-2019-7164 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7548/">CVE-2019-7548 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7548">CVE-2019-7548 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597042" comment="python-SQLAlchemy-1.1.12-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148776" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1106061" ref_url="https://bugzilla.suse.com/1106061" source="BUGZILLA"/>
		<reference ref_id="1123161" ref_url="https://bugzilla.suse.com/1123161" source="BUGZILLA"/>
		<reference ref_id="1125674" ref_url="https://bugzilla.suse.com/1125674" source="BUGZILLA"/>
		<reference ref_id="1127034" ref_url="https://bugzilla.suse.com/1127034" source="BUGZILLA"/>
		<reference ref_id="1128977" ref_url="https://bugzilla.suse.com/1128977" source="BUGZILLA"/>
		<reference ref_id="1130972" ref_url="https://bugzilla.suse.com/1130972" source="BUGZILLA"/>
		<reference ref_id="1133860" ref_url="https://bugzilla.suse.com/1133860" source="BUGZILLA"/>
		<reference ref_id="1134399" ref_url="https://bugzilla.suse.com/1134399" source="BUGZILLA"/>
		<reference ref_id="1135335" ref_url="https://bugzilla.suse.com/1135335" source="BUGZILLA"/>
		<reference ref_id="1135365" ref_url="https://bugzilla.suse.com/1135365" source="BUGZILLA"/>
		<reference ref_id="1137584" ref_url="https://bugzilla.suse.com/1137584" source="BUGZILLA"/>
		<reference ref_id="1139358" ref_url="https://bugzilla.suse.com/1139358" source="BUGZILLA"/>
		<reference ref_id="1139826" ref_url="https://bugzilla.suse.com/1139826" source="BUGZILLA"/>
		<reference ref_id="1140652" ref_url="https://bugzilla.suse.com/1140652" source="BUGZILLA"/>
		<reference ref_id="1140903" ref_url="https://bugzilla.suse.com/1140903" source="BUGZILLA"/>
		<reference ref_id="1140945" ref_url="https://bugzilla.suse.com/1140945" source="BUGZILLA"/>
		<reference ref_id="1141181" ref_url="https://bugzilla.suse.com/1141181" source="BUGZILLA"/>
		<reference ref_id="1141401" ref_url="https://bugzilla.suse.com/1141401" source="BUGZILLA"/>
		<reference ref_id="1141402" ref_url="https://bugzilla.suse.com/1141402" source="BUGZILLA"/>
		<reference ref_id="1141452" ref_url="https://bugzilla.suse.com/1141452" source="BUGZILLA"/>
		<reference ref_id="1141453" ref_url="https://bugzilla.suse.com/1141453" source="BUGZILLA"/>
		<reference ref_id="1141454" ref_url="https://bugzilla.suse.com/1141454" source="BUGZILLA"/>
		<reference ref_id="1142023" ref_url="https://bugzilla.suse.com/1142023" source="BUGZILLA"/>
		<reference ref_id="1142254" ref_url="https://bugzilla.suse.com/1142254" source="BUGZILLA"/>
		<reference ref_id="1142857" ref_url="https://bugzilla.suse.com/1142857" source="BUGZILLA"/>
		<reference ref_id="1143045" ref_url="https://bugzilla.suse.com/1143045" source="BUGZILLA"/>
		<reference ref_id="1143048" ref_url="https://bugzilla.suse.com/1143048" source="BUGZILLA"/>
		<reference ref_id="1143189" ref_url="https://bugzilla.suse.com/1143189" source="BUGZILLA"/>
		<reference ref_id="1143191" ref_url="https://bugzilla.suse.com/1143191" source="BUGZILLA"/>
		<reference ref_id="1143333" ref_url="https://bugzilla.suse.com/1143333" source="BUGZILLA"/>
		<reference ref_id="1144257" ref_url="https://bugzilla.suse.com/1144257" source="BUGZILLA"/>
		<reference ref_id="1144273" ref_url="https://bugzilla.suse.com/1144273" source="BUGZILLA"/>
		<reference ref_id="1144288" ref_url="https://bugzilla.suse.com/1144288" source="BUGZILLA"/>
		<reference ref_id="1144920" ref_url="https://bugzilla.suse.com/1144920" source="BUGZILLA"/>
		<reference ref_id="1145920" ref_url="https://bugzilla.suse.com/1145920" source="BUGZILLA"/>
		<reference ref_id="1145922" ref_url="https://bugzilla.suse.com/1145922" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20855" ref_url="https://www.suse.com/security/cve/CVE-2018-20855/" source="CVE"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10207" ref_url="https://www.suse.com/security/cve/CVE-2019-10207/" source="CVE"/>
		<reference ref_id="CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125/" source="CVE"/>
		<reference ref_id="CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810/" source="CVE"/>
		<reference ref_id="CVE-2019-13631" ref_url="https://www.suse.com/security/cve/CVE-2019-13631/" source="CVE"/>
		<reference ref_id="CVE-2019-13648" ref_url="https://www.suse.com/security/cve/CVE-2019-13648/" source="CVE"/>
		<reference ref_id="CVE-2019-14283" ref_url="https://www.suse.com/security/cve/CVE-2019-14283/" source="CVE"/>
		<reference ref_id="CVE-2019-14284" ref_url="https://www.suse.com/security/cve/CVE-2019-14284/" source="CVE"/>
		<reference ref_id="CVE-2019-15117" ref_url="https://www.suse.com/security/cve/CVE-2019-15117/" source="CVE"/>
		<reference ref_id="CVE-2019-15118" ref_url="https://www.suse.com/security/cve/CVE-2019-15118/" source="CVE"/>
		<reference ref_id="CVE-2019-3819" ref_url="https://www.suse.com/security/cve/CVE-2019-3819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).
- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).
- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).
- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).
- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c (bnc#1142254).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).
- CVE-2019-15118: Fixed kernel stack exhaustion in check_input_term in sound/usb/mixer.c via mishandled recursion (bnc#1145922).
- CVE-2019-15117: Fixed out-of-bounds memory access in parse_audio_mixer_unit in sound/usb/mixer.c via mishandled short descriptor (bnc#1145920).
- CVE-2019-3819: A flaw was fixed in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may have enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') could have caused a system lock up and a denial of service (bnc#1123161).
- CVE-2019-10207: Check for missing tty operations in bluetooth/hci_uart (bsc#1142857).
- CVE-2018-20856: Fixed a use-after-free issue in block/blk-core.c, where certain error case are mishandled (bnc#1143048).

The following non-security bugs were fixed:

- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1125674).
- dlm: Fix saving of NULL callbacks (bsc#1135365).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652, bsc#1144288).
- bcache: Revert 'bcache: free heap cache_set-&gt;flush_btree in bch_journal_free' (bsc#1140652, bsc#1144288).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652, bsc#1144288).
- bcache: fix race in btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1130972, bsc#1144257).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1130972, bsc#1144273).
- bcache: performance improvement for btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652, bsc#1144288).
- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
- clocksource: Defer override invalidation unless clock is unstable (bsc#1139826).
- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
- kvmclock: fix TSC calibration for nested guests (bsc#1133860, jsc#PM-1211).
- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945, bsc#1141401, bsc#1141402, bsc#1141452, bsc#1141453, bsc#1141454).
- qla2xxx: performance degradation when enabling blk-mq (bsc#1128977).
- qlge: Deduplicate lbq_buf_size (bsc#1106061).
- qlge: Deduplicate rx buffer queue management (bsc#1106061).
- qlge: Factor out duplicated expression (bsc#1106061).
- qlge: Fix dma_sync_single calls (bsc#1106061).
- qlge: Fix irq masking in INTx mode (bsc#1106061).
- qlge: Refill empty buffer queues from wq (bsc#1106061).
- qlge: Refill rx buffers up to multiple of 16 (bsc#1106061).
- qlge: Remove bq_desc.maplen (bsc#1106061).
- qlge: Remove irq_cnt (bsc#1106061).
- qlge: Remove page_chunk.last_flag (bsc#1106061).
- qlge: Remove qlge_bq.len size (bsc#1106061).
- qlge: Remove rx_ring.sbq_buf_size (bsc#1106061).
- qlge: Remove rx_ring.type (bsc#1106061).
- qlge: Remove useless dma synchronization calls (bsc#1106061).
- qlge: Remove useless memset (bsc#1106061).
- qlge: Replace memset with assignment (bsc#1106061).
- qlge: Update buffer queue prod index despite oom (bsc#1106061).
- rbd: flush rbd_dev-&gt;watch_dwork after watch is unregistered (bsc#1143333).
- rbd: retry watch re-registration periodically (bsc#1143333).
- sched/fair: Do not free p-&gt;numa_faults with concurrent readers (bsc#1144920).
- sched/fair: Use RCU accessors consistently for -&gt;numa_group (bsc#1144920).
- scsi: virtio_scsi: let host do exception handling (bsc#1141181).
- x86: mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- x86: tsc: Add X86_FEATURE_TSC_KNOWN_FREQ flag (bsc#1133860, jsc#PM-1211).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (XSA-300).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106061">SUSE bug 1106061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123161">SUSE bug 1123161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125674">SUSE bug 1125674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127034">SUSE bug 1127034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128977">SUSE bug 1128977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130972">SUSE bug 1130972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133860">SUSE bug 1133860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134399">SUSE bug 1134399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135335">SUSE bug 1135335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135365">SUSE bug 1135365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137584">SUSE bug 1137584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139358">SUSE bug 1139358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139826">SUSE bug 1139826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140652">SUSE bug 1140652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140903">SUSE bug 1140903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140945">SUSE bug 1140945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141181">SUSE bug 1141181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141401">SUSE bug 1141401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141402">SUSE bug 1141402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141452">SUSE bug 1141452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141453">SUSE bug 1141453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141454">SUSE bug 1141454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142023">SUSE bug 1142023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142254">SUSE bug 1142254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142857">SUSE bug 1142857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143045">SUSE bug 1143045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143048">SUSE bug 1143048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143189">SUSE bug 1143189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143333">SUSE bug 1143333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144257">SUSE bug 1144257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144273">SUSE bug 1144273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144288">SUSE bug 1144288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144920">SUSE bug 1144920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145920">SUSE bug 1145920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145922">SUSE bug 1145922</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20855/">CVE-2018-20855 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20855">CVE-2018-20855 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20856">CVE-2018-20856 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10207/">CVE-2019-10207 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10207">CVE-2019-10207 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1125">CVE-2019-1125 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11810">CVE-2019-11810 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13631/">CVE-2019-13631 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13631">CVE-2019-13631 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13648/">CVE-2019-13648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13648">CVE-2019-13648 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14283/">CVE-2019-14283 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14283">CVE-2019-14283 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14284/">CVE-2019-14284 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14284">CVE-2019-14284 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15117/">CVE-2019-15117 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15117">CVE-2019-15117 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15118/">CVE-2019-15118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15118">CVE-2019-15118 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3819/">CVE-2019-3819 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3819">CVE-2019-3819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555674" comment="kernel-default-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555675" comment="kernel-default-base-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555676" comment="kernel-default-devel-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538290" comment="kernel-devel-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538291" comment="kernel-macros-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538292" comment="kernel-source-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555677" comment="kernel-syms-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556048" comment="kgraft-patch-4_4_180-94_103-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148777" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1114674" ref_url="https://bugzilla.suse.com/1114674" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2264-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192264-1.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

Security issue fixed:

- CVE-2018-18311: Fixed integer overflow with oversize environment (bsc#1114674).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1114674">SUSE bug 1114674</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18311">CVE-2018-18311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522096" comment="perl-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522097" comment="perl-32bit-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522098" comment="perl-base-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522099" comment="perl-doc-5.18.2-12.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148778" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp, zypper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1049825" ref_url="https://bugzilla.suse.com/1049825" source="BUGZILLA"/>
		<reference ref_id="1109893" ref_url="https://bugzilla.suse.com/1109893" source="BUGZILLA"/>
		<reference ref_id="1110542" ref_url="https://bugzilla.suse.com/1110542" source="BUGZILLA"/>
		<reference ref_id="1111319" ref_url="https://bugzilla.suse.com/1111319" source="BUGZILLA"/>
		<reference ref_id="1112911" ref_url="https://bugzilla.suse.com/1112911" source="BUGZILLA"/>
		<reference ref_id="1113296" ref_url="https://bugzilla.suse.com/1113296" source="BUGZILLA"/>
		<reference ref_id="1116995" ref_url="https://bugzilla.suse.com/1116995" source="BUGZILLA"/>
		<reference ref_id="1120629" ref_url="https://bugzilla.suse.com/1120629" source="BUGZILLA"/>
		<reference ref_id="1120630" ref_url="https://bugzilla.suse.com/1120630" source="BUGZILLA"/>
		<reference ref_id="1120631" ref_url="https://bugzilla.suse.com/1120631" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1131823" ref_url="https://bugzilla.suse.com/1131823" source="BUGZILLA"/>
		<reference ref_id="1134226" ref_url="https://bugzilla.suse.com/1134226" source="BUGZILLA"/>
		<reference ref_id="1137977" ref_url="https://bugzilla.suse.com/1137977" source="BUGZILLA"/>
		<reference ref_id="1140039" ref_url="https://bugzilla.suse.com/1140039" source="BUGZILLA"/>
		<reference ref_id="1145521" ref_url="https://bugzilla.suse.com/1145521" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<description>
This update for libsolv, libzypp and zypper fixes the following issues:

libsolv was updated to version 0.6.36 and fixes the following issues:

Security issues fixed:

- CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629).
- CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630).
- CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631).

Non-security issues fixed:

- Made cleandeps jobs on patterns work (bsc#1137977).
- Fixed an issue multiversion packages that obsolete their own name (bsc#1127155).
- Keep consistent package name if there are multiple alternatives (bsc#1131823).

Fixes for libzypp:

- Fixes a bug where locking the kernel was not possible (bsc#1113296)
- Fixes a file descriptor leak (bsc#1116995)
- Will now run file conflict check on dry-run (best with download-only) (bsc#1140039)

Fixes for zypper:

- Fixes a bug where the wrong exit code was set when refreshing repos if --root was used (bsc#1134226)
- Improved the displaying of locks (bsc#1112911)
- Fixes an issue where `https` repository urls caused an error prompt to appear twice (bsc#1110542)
- zypper will now always warn when no repositories are defined (bsc#1109893)
- Fixes bash completion option detection (bsc#1049825)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049825">SUSE bug 1049825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109893">SUSE bug 1109893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110542">SUSE bug 1110542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111319">SUSE bug 1111319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112911">SUSE bug 1112911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113296">SUSE bug 1113296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116995">SUSE bug 1116995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131823">SUSE bug 1131823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134226">SUSE bug 1134226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137977">SUSE bug 1137977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140039">SUSE bug 1140039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145521">SUSE bug 1145521</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20532">CVE-2018-20532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20533">CVE-2018-20533 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20534">CVE-2018-20534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522100" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522101" comment="libzypp-16.20.2-27.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530678" comment="perl-solv-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522102" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522103" comment="zypper-1.13.54-18.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148779" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1142690" ref_url="https://bugzilla.suse.com/1142690" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10206" ref_url="https://www.suse.com/security/cve/CVE-2019-10206/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005874.html" source="SUSE-SU"/>
		<description>
This update for ansible fixes the following issues:

Security issue fixed:

- CVE-2019-10206: Fixed ansible cli tools that prompt passwords by expanding them from templates as they could contain special characters (bsc#1142690).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-03"/>
	<updated date="2019-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1142690">SUSE bug 1142690</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10206/">CVE-2019-10206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10206">CVE-2019-10206 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597043" comment="ansible-2.4.6.0-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148780" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1119376" ref_url="https://bugzilla.suse.com/1119376" source="BUGZILLA"/>
		<reference ref_id="1129071" ref_url="https://bugzilla.suse.com/1129071" source="BUGZILLA"/>
		<reference ref_id="1132663" ref_url="https://bugzilla.suse.com/1132663" source="BUGZILLA"/>
		<reference ref_id="1132900" ref_url="https://bugzilla.suse.com/1132900" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20060" ref_url="https://www.suse.com/security/cve/CVE-2018-20060/" source="CVE"/>
		<reference ref_id="CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236/" source="CVE"/>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005880.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issues:

Security issues fixed:

- CVE-2019-9740: Fixed CRLF injection issue (bsc#1129071).
- CVE-2019-11324: Fixed invalid CA certificat verification (bsc#1132900).
- CVE-2019-11236: Fixed CRLF injection via request parameter (bsc#1132663).
- CVE-2018-20060: Remove Authorization header when redirecting cross-host (bsc#1119376).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-05"/>
	<updated date="2019-09-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1119376">SUSE bug 1119376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129071">SUSE bug 1129071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132663">SUSE bug 1132663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132900">SUSE bug 1132900</bugzilla>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20060/">CVE-2018-20060 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20060">CVE-2018-20060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11236">CVE-2019-11236 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">CVE-2019-11324 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9740">CVE-2019-9740 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597044" comment="python-urllib3-1.22-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148781" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update to Java 7.1 Service Refresh 4 Fix Pack 50.

Security issues fixed:

- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-09"/>
	<updated date="2019-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11771">CVE-2019-11771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11775">CVE-2019-11775 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-4473">CVE-2019-4473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530688" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530691" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148782" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1149496" ref_url="https://bugzilla.suse.com/1149496" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2339-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192339-2.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5482: Fixed TFTP small blocksize heap buffer overflow (bsc#1149496).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-12"/>
	<updated date="2019-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5482">CVE-2019-5482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530693" comment="curl-7.37.0-37.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530694" comment="libcurl4-7.37.0-37.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530695" comment="libcurl4-32bit-7.37.0-37.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148783" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1135715" ref_url="https://bugzilla.suse.com/1135715" source="BUGZILLA"/>
		<reference ref_id="1148931" ref_url="https://bugzilla.suse.com/1148931" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595/" source="CVE"/>
		<reference ref_id="CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607/" source="CVE"/>
		<reference ref_id="CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615/" source="CVE"/>
		<reference ref_id="CVE-2019-8644" ref_url="https://www.suse.com/security/cve/CVE-2019-8644/" source="CVE"/>
		<reference ref_id="CVE-2019-8649" ref_url="https://www.suse.com/security/cve/CVE-2019-8649/" source="CVE"/>
		<reference ref_id="CVE-2019-8658" ref_url="https://www.suse.com/security/cve/CVE-2019-8658/" source="CVE"/>
		<reference ref_id="CVE-2019-8666" ref_url="https://www.suse.com/security/cve/CVE-2019-8666/" source="CVE"/>
		<reference ref_id="CVE-2019-8669" ref_url="https://www.suse.com/security/cve/CVE-2019-8669/" source="CVE"/>
		<reference ref_id="CVE-2019-8671" ref_url="https://www.suse.com/security/cve/CVE-2019-8671/" source="CVE"/>
		<reference ref_id="CVE-2019-8672" ref_url="https://www.suse.com/security/cve/CVE-2019-8672/" source="CVE"/>
		<reference ref_id="CVE-2019-8673" ref_url="https://www.suse.com/security/cve/CVE-2019-8673/" source="CVE"/>
		<reference ref_id="CVE-2019-8676" ref_url="https://www.suse.com/security/cve/CVE-2019-8676/" source="CVE"/>
		<reference ref_id="CVE-2019-8677" ref_url="https://www.suse.com/security/cve/CVE-2019-8677/" source="CVE"/>
		<reference ref_id="CVE-2019-8678" ref_url="https://www.suse.com/security/cve/CVE-2019-8678/" source="CVE"/>
		<reference ref_id="CVE-2019-8679" ref_url="https://www.suse.com/security/cve/CVE-2019-8679/" source="CVE"/>
		<reference ref_id="CVE-2019-8680" ref_url="https://www.suse.com/security/cve/CVE-2019-8680/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8683" ref_url="https://www.suse.com/security/cve/CVE-2019-8683/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8686" ref_url="https://www.suse.com/security/cve/CVE-2019-8686/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Updated to version 2.24.4 (bsc#1148931).

Security issues fixed:
	  
- CVE-2019-8644, CVE-2019-8649, CVE-2019-8658, CVE-2019-8669, CVE-2019-8678,
  CVE-2019-8680, CVE-2019-8683, CVE-2019-8684, CVE-2019-8688, CVE-2019-8595,
  CVE-2019-8607, CVE-2019-8615, CVE-2019-8644, CVE-2019-8649, CVE-2019-8658,
  CVE-2019-8666, CVE-2019-8669, CVE-2019-8671, CVE-2019-8672, CVE-2019-8673,
  CVE-2019-8676, CVE-2019-8677, CVE-2019-8678, CVE-2019-8679, CVE-2019-8680,
  CVE-2019-8681, CVE-2019-8683, CVE-2019-8684, CVE-2019-8686, CVE-2019-8687,
  CVE-2019-8688, CVE-2019-8689, CVE-2019-8690

Non-security issues fixed:
	  
- Improved loading of multimedia streams to avoid memory exhaustion due to excessive caching.
- Updated the user agent string to make happy certain websites which would claim that the browser being used was unsupported.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-11"/>
	<updated date="2019-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8595">CVE-2019-8595 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8607">CVE-2019-8607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8615">CVE-2019-8615 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8644/">CVE-2019-8644 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8644">CVE-2019-8644 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8649/">CVE-2019-8649 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8649">CVE-2019-8649 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8658/">CVE-2019-8658 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8658">CVE-2019-8658 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8666/">CVE-2019-8666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8666">CVE-2019-8666 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8669/">CVE-2019-8669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8669">CVE-2019-8669 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8671/">CVE-2019-8671 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8671">CVE-2019-8671 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8672/">CVE-2019-8672 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8672">CVE-2019-8672 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8673/">CVE-2019-8673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8673">CVE-2019-8673 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8676/">CVE-2019-8676 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8676">CVE-2019-8676 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8677/">CVE-2019-8677 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8677">CVE-2019-8677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8678/">CVE-2019-8678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8678">CVE-2019-8678 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8679/">CVE-2019-8679 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8679">CVE-2019-8679 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8680/">CVE-2019-8680 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8680">CVE-2019-8680 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8681">CVE-2019-8681 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8683/">CVE-2019-8683 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8683">CVE-2019-8683 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8684">CVE-2019-8684 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8686/">CVE-2019-8686 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8686">CVE-2019-8686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8687">CVE-2019-8687 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8688">CVE-2019-8688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8689">CVE-2019-8689 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8690">CVE-2019-8690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148784" version="1" class="patch">
	<metadata>
		<title>Security update for python-Werkzeug (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1145383" ref_url="https://bugzilla.suse.com/1145383" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14806" ref_url="https://www.suse.com/security/cve/CVE-2019-14806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005907.html" source="SUSE-SU"/>
		<description>
This update for python-Werkzeug fixes the following issues:

Security issue fixed:

- CVE-2019-14806: Fixed the development server in Docker, the debugger security pin is now unique per container (bsc#1145383).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-11"/>
	<updated date="2019-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1145383">SUSE bug 1145383</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14806/">CVE-2019-14806 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14806">CVE-2019-14806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597045" comment="python-Werkzeug-0.12.2-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148785" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1122292" ref_url="https://bugzilla.suse.com/1122292" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11772" ref_url="https://www.suse.com/security/cve/CVE-2019-11772/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2449" ref_url="https://www.suse.com/security/cve/CVE-2019-2449/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 5 Fix Pack 40.

Security issues fixed:

- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11772: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
- CVE-2019-2786: Fixed issue inside Component Security (bsc#1141787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-12"/>
	<updated date="2019-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122292">SUSE bug 1122292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11771">CVE-2019-11771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11772/">CVE-2019-11772 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11772">CVE-2019-11772 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11775">CVE-2019-11775 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2449/">CVE-2019-2449 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2449">CVE-2019-2449 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2786">CVE-2019-2786 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-4473">CVE-2019-4473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530698" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148786" version="1" class="patch">
	<metadata>
		<title>Security update for ibus (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1150011" ref_url="https://bugzilla.suse.com/1150011" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14822" ref_url="https://www.suse.com/security/cve/CVE-2019-14822/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005925.html" source="SUSE-SU"/>
		<description>
This update for ibus fixes the following issues:

Security issue fixed:

- CVE-2019-14822: Fixed a misconfiguration of the DBus server that allowed an unprivileged user to monitor and send method calls to the ibus bus of another user. (bsc#1150011)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150011">SUSE bug 1150011</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14822/">CVE-2019-14822 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14822">CVE-2019-14822 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522144" comment="ibus-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522145" comment="ibus-gtk-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522146" comment="ibus-gtk3-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522148" comment="ibus-lang-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522149" comment="libibus-1_0-5-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522152" comment="typelib-1_0-IBus-1_0-1.5.13-15.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148787" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005943.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

- CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance (bsc#1150003).
- CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-20"/>
	<updated date="2019-09-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1547">CVE-2019-1547 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1563">CVE-2019-1563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530702" comment="libopenssl-devel-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530703" comment="libopenssl1_0_0-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530704" comment="libopenssl1_0_0-32bit-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530705" comment="libopenssl1_0_0-hmac-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530706" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530707" comment="openssl-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530708" comment="openssl-doc-1.0.2j-60.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148788" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1149294" ref_url="https://bugzilla.suse.com/1149294" source="BUGZILLA"/>
		<reference ref_id="1149295" ref_url="https://bugzilla.suse.com/1149295" source="BUGZILLA"/>
		<reference ref_id="1149296" ref_url="https://bugzilla.suse.com/1149296" source="BUGZILLA"/>
		<reference ref_id="1149297" ref_url="https://bugzilla.suse.com/1149297" source="BUGZILLA"/>
		<reference ref_id="1149298" ref_url="https://bugzilla.suse.com/1149298" source="BUGZILLA"/>
		<reference ref_id="1149299" ref_url="https://bugzilla.suse.com/1149299" source="BUGZILLA"/>
		<reference ref_id="1149303" ref_url="https://bugzilla.suse.com/1149303" source="BUGZILLA"/>
		<reference ref_id="1149304" ref_url="https://bugzilla.suse.com/1149304" source="BUGZILLA"/>
		<reference ref_id="1149324" ref_url="https://bugzilla.suse.com/1149324" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to ESR 60.9 fixes the following issues:

Security issues fixed:

- CVE-2019-11742: Fixed a same-origin policy violation involving SVG filters and canvas to steal cross-origin images. (bsc#1149303)
- CVE-2019-11746: Fixed a use-after-free while manipulating video. (bsc#1149297)
- CVE-2019-11744: Fixed an XSS caused by breaking out of title and textarea elements using innerHTML. (bsc#1149304)
- CVE-2019-11753: Fixed a privilege escalation with Mozilla Maintenance Service in custom Firefox installation location. (bsc#1149295)
- CVE-2019-11752: Fixed a use-after-free while extracting a key value in IndexedDB. (bsc#1149296)
- CVE-2019-11743: Fixed a timing side-channel attack on cross-origin information, utilizing unload event attributes. (bsc#1149298)
- CVE-2019-11740: Fixed several memory safety bugs. (bsc#1149299)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-23"/>
	<updated date="2019-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149294">SUSE bug 1149294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149295">SUSE bug 1149295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149296">SUSE bug 1149296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149297">SUSE bug 1149297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149298">SUSE bug 1149298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149299">SUSE bug 1149299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149303">SUSE bug 1149303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149304">SUSE bug 1149304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11753">CVE-2019-11753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522212" comment="MozillaFirefox-60.9.0-109.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522213" comment="MozillaFirefox-translations-common-60.9.0-109.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148789" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1138461" ref_url="https://bugzilla.suse.com/1138461" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12855" ref_url="https://www.suse.com/security/cve/CVE-2019-12855/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005962.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

Security issue fixed:

- CVE-2019-12855: Fixed TLS certificate verification to protecting against MITM attacks (bsc#1138461).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1138461">SUSE bug 1138461</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12855/">CVE-2019-12855 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12855">CVE-2019-12855 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597046" comment="python-Twisted-15.2.1-9.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148790" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1145559" ref_url="https://bugzilla.suse.com/1145559" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11500" ref_url="https://www.suse.com/security/cve/CVE-2019-11500/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005961.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2019-11500: Fixed a potential remote code execution in the IMAP and ManageSieve protocol parsers (bsc#1145559).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145559">SUSE bug 1145559</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11500/">CVE-2019-11500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11500">CVE-2019-11500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530710" comment="dovecot22-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530711" comment="dovecot22-backend-mysql-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530712" comment="dovecot22-backend-pgsql-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530713" comment="dovecot22-backend-sqlite-2.2.31-19.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148791" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1127027" ref_url="https://bugzilla.suse.com/1127027" source="BUGZILLA"/>
		<reference ref_id="1132826" ref_url="https://bugzilla.suse.com/1132826" source="BUGZILLA"/>
		<reference ref_id="1141798" ref_url="https://bugzilla.suse.com/1141798" source="BUGZILLA"/>
		<reference ref_id="1142058" ref_url="https://bugzilla.suse.com/1142058" source="BUGZILLA"/>
		<reference ref_id="1143215" ref_url="https://bugzilla.suse.com/1143215" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2614" ref_url="https://www.suse.com/security/cve/CVE-2019-2614/" source="CVE"/>
		<reference ref_id="CVE-2019-2627" ref_url="https://www.suse.com/security/cve/CVE-2019-2627/" source="CVE"/>
		<reference ref_id="CVE-2019-2737" ref_url="https://www.suse.com/security/cve/CVE-2019-2737/" source="CVE"/>
		<reference ref_id="CVE-2019-2739" ref_url="https://www.suse.com/security/cve/CVE-2019-2739/" source="CVE"/>
		<reference ref_id="CVE-2019-2740" ref_url="https://www.suse.com/security/cve/CVE-2019-2740/" source="CVE"/>
		<reference ref_id="CVE-2019-2805" ref_url="https://www.suse.com/security/cve/CVE-2019-2805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Updated to MariaDB 10.0.40-1.

Security issues fixed:

- CVE-2019-2805, CVE-2019-2740, CVE-2019-2739, CVE-2019-2737, 
  CVE-2019-2614, CVE-2019-2627. (bsc#1132826) (bsc#1141798).

Non-security issues fixed:

- Adjusted mysql-systemd-helper ('shutdown protected MySQL' section)
  so it checks both ping response and the pid in a process list
  as it can take some time till the process is terminated.
  Otherwise it can lead to 'found left-over process' situation
  when regular mariadb is started. (bsc#1143215)
- Fixed IP resolving in mysql_install_db script. (bsc#1142058, bsc#1127027, MDEV-18526)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-25"/>
	<updated date="2019-09-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127027">SUSE bug 1127027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142058">SUSE bug 1142058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143215">SUSE bug 1143215</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2614/">CVE-2019-2614 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2614">CVE-2019-2614 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2627/">CVE-2019-2627 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2627">CVE-2019-2627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2737/">CVE-2019-2737 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2737">CVE-2019-2737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2739/">CVE-2019-2739 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2739">CVE-2019-2739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2740/">CVE-2019-2740 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2740">CVE-2019-2740 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2805/">CVE-2019-2805 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2805">CVE-2019-2805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557375" comment="libmysqlclient18-10.0.40.1-29.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148792" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1129180" ref_url="https://bugzilla.suse.com/1129180" source="BUGZILLA"/>
		<reference ref_id="1131863" ref_url="https://bugzilla.suse.com/1131863" source="BUGZILLA"/>
		<reference ref_id="1134156" ref_url="https://bugzilla.suse.com/1134156" source="BUGZILLA"/>
		<reference ref_id="1140359" ref_url="https://bugzilla.suse.com/1140359" source="BUGZILLA"/>
		<reference ref_id="1146882" ref_url="https://bugzilla.suse.com/1146882" source="BUGZILLA"/>
		<reference ref_id="1146884" ref_url="https://bugzilla.suse.com/1146884" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12973" ref_url="https://www.suse.com/security/cve/CVE-2019-12973/" source="CVE"/>
		<reference ref_id="CVE-2019-14811" ref_url="https://www.suse.com/security/cve/CVE-2019-14811/" source="CVE"/>
		<reference ref_id="CVE-2019-14812" ref_url="https://www.suse.com/security/cve/CVE-2019-14812/" source="CVE"/>
		<reference ref_id="CVE-2019-14813" ref_url="https://www.suse.com/security/cve/CVE-2019-14813/" source="CVE"/>
		<reference ref_id="CVE-2019-14817" ref_url="https://www.suse.com/security/cve/CVE-2019-14817/" source="CVE"/>
		<reference ref_id="CVE-2019-3835" ref_url="https://www.suse.com/security/cve/CVE-2019-3835/" source="CVE"/>
		<reference ref_id="CVE-2019-3839" ref_url="https://www.suse.com/security/cve/CVE-2019-3839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to 9.27 fixes the following issues:

Security issues fixed:

- CVE-2019-3835: Fixed an unauthorized file system access caused by an available superexec operator.  (bsc#1129180)
- CVE-2019-3839: Fixed an unauthorized file system access caused by available privileged operators. (bsc#1134156)
- CVE-2019-12973: Fixed a denial-of-service vulnerability in the OpenJPEG function opj_t1_encode_cblks. (bsc#1140359)
- CVE-2019-14811: Fixed a safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator. (bsc#1146882)
- CVE-2019-14812: Fixed a safer mode bypass by .forceput exposure in setuserparams. (bsc#1146882)
- CVE-2019-14813: Fixed a safer mode bypass by .forceput exposure in setsystemparams. (bsc#1146882)
- CVE-2019-14817: Fixed a safer mode bypass by .forceput exposure in .pdfexectoken and other procedures. (bsc#1146884)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-26"/>
	<updated date="2019-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129180">SUSE bug 1129180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131863">SUSE bug 1131863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134156">SUSE bug 1134156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140359">SUSE bug 1140359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146884">SUSE bug 1146884</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12973/">CVE-2019-12973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12973">CVE-2019-12973 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14811/">CVE-2019-14811 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14811">CVE-2019-14811 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14812/">CVE-2019-14812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14812">CVE-2019-14812 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14813/">CVE-2019-14813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14813">CVE-2019-14813 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14817/">CVE-2019-14817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14817">CVE-2019-14817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3835/">CVE-2019-3835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3835">CVE-2019-3835 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3839/">CVE-2019-3839 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3839">CVE-2019-3839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522218" comment="ghostscript-9.27-23.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522219" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148793" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1148987" ref_url="https://bugzilla.suse.com/1148987" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005976.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

Security issues fixed:
	  
- CVE-2019-13627: Mitigated ECDSA timing attack. (bsc#1148987)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-01"/>
	<updated date="2019-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1148987">SUSE bug 1148987</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13627">CVE-2019-13627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522236" comment="libgcrypt20-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522237" comment="libgcrypt20-32bit-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530714" comment="libgcrypt20-hmac-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530715" comment="libgcrypt20-hmac-32bit-1.6.1-16.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148794" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1087200" ref_url="https://bugzilla.suse.com/1087200" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1117473" ref_url="https://bugzilla.suse.com/1117473" source="BUGZILLA"/>
		<reference ref_id="1123482" ref_url="https://bugzilla.suse.com/1123482" source="BUGZILLA"/>
		<reference ref_id="1124525" ref_url="https://bugzilla.suse.com/1124525" source="BUGZILLA"/>
		<reference ref_id="1133810" ref_url="https://bugzilla.suse.com/1133810" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="1145665" ref_url="https://bugzilla.suse.com/1145665" source="BUGZILLA"/>
		<reference ref_id="1149323" ref_url="https://bugzilla.suse.com/1149323" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Updated to new ESR version 68.1 (bsc#1149323).

In addition to the already fixed vulnerabilities released in previous ESR updates,
the following were also fixed:
    CVE-2019-11751, CVE-2019-11736, CVE-2019-9812, CVE-2019-11748, CVE-2019-11749,
    CVE-2019-11750, CVE-2019-11738, CVE-2019-11747, CVE-2019-11735.

Several run-time issues were also resolved (bsc#1117473, bsc#1124525, bsc#1133810).

The version displayed in Help &gt; About is now correct (bsc#1087200).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-09"/>
	<updated date="2019-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087200">SUSE bug 1087200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117473">SUSE bug 1117473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123482">SUSE bug 1123482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124525">SUSE bug 1124525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133810">SUSE bug 1133810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145665">SUSE bug 1145665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11710">CVE-2019-11710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11714">CVE-2019-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11716">CVE-2019-11716 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11718">CVE-2019-11718 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11720">CVE-2019-11720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11721">CVE-2019-11721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11723">CVE-2019-11723 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11724">CVE-2019-11724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11725">CVE-2019-11725 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11727">CVE-2019-11727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11728">CVE-2019-11728 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11733">CVE-2019-11733 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11735">CVE-2019-11735 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11736">CVE-2019-11736 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11738">CVE-2019-11738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11747">CVE-2019-11747 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11748">CVE-2019-11748 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11749">CVE-2019-11749 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11750">CVE-2019-11750 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11751">CVE-2019-11751 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11753">CVE-2019-11753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148795" version="1" class="patch">
	<metadata>
		<title>Recommended update for python-setuptools and dependend packages (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1024540" ref_url="https://bugzilla.suse.com/1024540" source="BUGZILLA"/>
		<reference ref_id="1054413" ref_url="https://bugzilla.suse.com/1054413" source="BUGZILLA"/>
		<reference ref_id="1074247" ref_url="https://bugzilla.suse.com/1074247" source="BUGZILLA"/>
		<reference ref_id="1075812" ref_url="https://bugzilla.suse.com/1075812" source="BUGZILLA"/>
		<reference ref_id="1088358" ref_url="https://bugzilla.suse.com/1088358" source="BUGZILLA"/>
		<reference ref_id="1091826" ref_url="https://bugzilla.suse.com/1091826" source="BUGZILLA"/>
		<reference ref_id="1110422" ref_url="https://bugzilla.suse.com/1110422" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9015" ref_url="https://www.suse.com/security/cve/CVE-2016-9015/" source="CVE"/>
		<reference ref_id="SUSE-RU-2019:2627-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012691.html" source="SUSE-SU"/>
		<description>

All changes necessary for upgrade of python-setuptools to 40.6.2 (bsc#1075812)

New packages:
- python-cachetools
- python-google-auth
- python-packaging

Rebuilt without source changes:

- python-cffi
- python-cliff
- python-mock
- python-oauthlib
- python-pbr
- python-PyJWT
- python-pytest

Added python3 packages:

- python-hgtools
- python-pyasn1-modules
- python-rsa

Updated:

- python-kubernetes
  Updated to version 6.0

- python-pyparsing

  Was updated to version 2.2.0.

- python-setuptools

  Was upgraded to version 40.6.2.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-11"/>
	<updated date="2019-10-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024540">SUSE bug 1024540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054413">SUSE bug 1054413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074247">SUSE bug 1074247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075812">SUSE bug 1075812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088358">SUSE bug 1088358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091826">SUSE bug 1091826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110422">SUSE bug 1110422</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9015/">CVE-2016-9015 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9015">CVE-2016-9015 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009561946" comment="python-oauthlib-0.7.2-3.9.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148796" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1109412" ref_url="https://bugzilla.suse.com/1109412" source="BUGZILLA"/>
		<reference ref_id="1109413" ref_url="https://bugzilla.suse.com/1109413" source="BUGZILLA"/>
		<reference ref_id="1109414" ref_url="https://bugzilla.suse.com/1109414" source="BUGZILLA"/>
		<reference ref_id="1111996" ref_url="https://bugzilla.suse.com/1111996" source="BUGZILLA"/>
		<reference ref_id="1112534" ref_url="https://bugzilla.suse.com/1112534" source="BUGZILLA"/>
		<reference ref_id="1112535" ref_url="https://bugzilla.suse.com/1112535" source="BUGZILLA"/>
		<reference ref_id="1113247" ref_url="https://bugzilla.suse.com/1113247" source="BUGZILLA"/>
		<reference ref_id="1113252" ref_url="https://bugzilla.suse.com/1113252" source="BUGZILLA"/>
		<reference ref_id="1113255" ref_url="https://bugzilla.suse.com/1113255" source="BUGZILLA"/>
		<reference ref_id="1116827" ref_url="https://bugzilla.suse.com/1116827" source="BUGZILLA"/>
		<reference ref_id="1118830" ref_url="https://bugzilla.suse.com/1118830" source="BUGZILLA"/>
		<reference ref_id="1118831" ref_url="https://bugzilla.suse.com/1118831" source="BUGZILLA"/>
		<reference ref_id="1120640" ref_url="https://bugzilla.suse.com/1120640" source="BUGZILLA"/>
		<reference ref_id="1121034" ref_url="https://bugzilla.suse.com/1121034" source="BUGZILLA"/>
		<reference ref_id="1121035" ref_url="https://bugzilla.suse.com/1121035" source="BUGZILLA"/>
		<reference ref_id="1121056" ref_url="https://bugzilla.suse.com/1121056" source="BUGZILLA"/>
		<reference ref_id="1133131" ref_url="https://bugzilla.suse.com/1133131" source="BUGZILLA"/>
		<reference ref_id="1133232" ref_url="https://bugzilla.suse.com/1133232" source="BUGZILLA"/>
		<reference ref_id="1141913" ref_url="https://bugzilla.suse.com/1141913" source="BUGZILLA"/>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000876" ref_url="https://www.suse.com/security/cve/CVE-2018-1000876/" source="CVE"/>
		<reference ref_id="CVE-2018-17358" ref_url="https://www.suse.com/security/cve/CVE-2018-17358/" source="CVE"/>
		<reference ref_id="CVE-2018-17359" ref_url="https://www.suse.com/security/cve/CVE-2018-17359/" source="CVE"/>
		<reference ref_id="CVE-2018-17360" ref_url="https://www.suse.com/security/cve/CVE-2018-17360/" source="CVE"/>
		<reference ref_id="CVE-2018-17985" ref_url="https://www.suse.com/security/cve/CVE-2018-17985/" source="CVE"/>
		<reference ref_id="CVE-2018-18309" ref_url="https://www.suse.com/security/cve/CVE-2018-18309/" source="CVE"/>
		<reference ref_id="CVE-2018-18483" ref_url="https://www.suse.com/security/cve/CVE-2018-18483/" source="CVE"/>
		<reference ref_id="CVE-2018-18484" ref_url="https://www.suse.com/security/cve/CVE-2018-18484/" source="CVE"/>
		<reference ref_id="CVE-2018-18605" ref_url="https://www.suse.com/security/cve/CVE-2018-18605/" source="CVE"/>
		<reference ref_id="CVE-2018-18606" ref_url="https://www.suse.com/security/cve/CVE-2018-18606/" source="CVE"/>
		<reference ref_id="CVE-2018-18607" ref_url="https://www.suse.com/security/cve/CVE-2018-18607/" source="CVE"/>
		<reference ref_id="CVE-2018-19931" ref_url="https://www.suse.com/security/cve/CVE-2018-19931/" source="CVE"/>
		<reference ref_id="CVE-2018-19932" ref_url="https://www.suse.com/security/cve/CVE-2018-19932/" source="CVE"/>
		<reference ref_id="CVE-2018-20623" ref_url="https://www.suse.com/security/cve/CVE-2018-20623/" source="CVE"/>
		<reference ref_id="CVE-2018-20651" ref_url="https://www.suse.com/security/cve/CVE-2018-20651/" source="CVE"/>
		<reference ref_id="CVE-2018-20671" ref_url="https://www.suse.com/security/cve/CVE-2018-20671/" source="CVE"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

binutils was updated to current 2.32 branch @7b468db3 [jsc#ECO-368]:

Includes the following security fixes:

- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)
- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)
- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)
- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)
- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)
- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)
- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)
- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)
- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)
- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)
- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)
- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)
- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)
- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)
- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in  load_specific_debug_section in objdump.c (bsc#1121056)
- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)
- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)

- Enable xtensa architecture (Tensilica lc6 and related)
- Use -ffat-lto-objects in order to provide assembly for static libs
  (bsc#1141913).
- Fixed some LTO problems (bsc#1133131 bsc#1133232).
- riscv: Don't check ABI flags if no code section

Update to binutils 2.32:

* The binutils now support for the C-SKY processor series.
* The x86 assembler now supports a -mvexwig=[0|1] option to control
  encoding of VEX.W-ignored (WIG) VEX instructions.
  It also has a new -mx86-used-note=[yes|no] option to generate (or
  not) x86 GNU property notes.
* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),
  the Loongson EXTensions (EXT) instructions, the Loongson Content
  Address Memory (CAM) ASE and the Loongson MultiMedia extensions
  Instructions (MMI) ASE.
* The addr2line, c++filt, nm and objdump tools now have a default
  limit on the maximum amount of recursion that is allowed whilst
  demangling strings.  This limit can be disabled if necessary.
* Objdump's --disassemble option can now take a parameter,
  specifying the starting symbol for disassembly.  Disassembly will
  continue from this symbol up to the next symbol or the end of the
  function.
* The BFD linker will now report property change in linker map file
  when merging GNU properties.
* The BFD linker's -t option now doesn't report members within
  archives, unless -t is given twice.  This makes it more useful
  when generating a list of files that should be packaged for a
  linker bug report.
* The GOLD linker has improved warning messages for relocations that
  refer to discarded sections.

- Improve relro support on s390 [fate#326356]
- Handle ELF compressed header alignment correctly.

  		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-14"/>
	<updated date="2019-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109412">SUSE bug 1109412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109413">SUSE bug 1109413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109414">SUSE bug 1109414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111996">SUSE bug 1111996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112534">SUSE bug 1112534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112535">SUSE bug 1112535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113247">SUSE bug 1113247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113252">SUSE bug 1113252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113255">SUSE bug 1113255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116827">SUSE bug 1116827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118830">SUSE bug 1118830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118831">SUSE bug 1118831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120640">SUSE bug 1120640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121034">SUSE bug 1121034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121035">SUSE bug 1121035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121056">SUSE bug 1121056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133131">SUSE bug 1133131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133232">SUSE bug 1133232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141913">SUSE bug 1141913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000876/">CVE-2018-1000876 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000876">CVE-2018-1000876 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17358/">CVE-2018-17358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17358">CVE-2018-17358 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17359/">CVE-2018-17359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17359">CVE-2018-17359 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17360/">CVE-2018-17360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17360">CVE-2018-17360 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17985/">CVE-2018-17985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17985">CVE-2018-17985 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18309/">CVE-2018-18309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18309">CVE-2018-18309 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18483/">CVE-2018-18483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18483">CVE-2018-18483 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18484/">CVE-2018-18484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18484">CVE-2018-18484 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18605/">CVE-2018-18605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18605">CVE-2018-18605 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18606/">CVE-2018-18606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18606">CVE-2018-18606 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18607/">CVE-2018-18607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18607">CVE-2018-18607 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19931/">CVE-2018-19931 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19931">CVE-2018-19931 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19932/">CVE-2018-19932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19932">CVE-2018-19932 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20623/">CVE-2018-20623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20623">CVE-2018-20623 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20651/">CVE-2018-20651 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20651">CVE-2018-20651 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20671/">CVE-2018-20671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20671">CVE-2018-20671 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010180">CVE-2019-1010180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148797" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1153674" ref_url="https://bugzilla.suse.com/1153674" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006015.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

Security issue fixed: 	  

- CVE-2019-14287: Fixed an issue where a user with sudo privileges
  that allowed them to run commands with an arbitrary uid, could
  run commands as root, despite being forbidden to do so in sudoers
  (bsc#1153674).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14287">CVE-2019-14287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522249" comment="sudo-1.8.20p2-3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148798" version="1" class="patch">
	<metadata>
		<title>Security update for libpcap (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1153332" ref_url="https://bugzilla.suse.com/1153332" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2019-15165" ref_url="https://www.suse.com/security/cve/CVE-2019-15165/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006016.html" source="SUSE-SU"/>
		<description>
This update for libpcap fixes the following issues:

- CVE-2019-15165: Added sanity checks for PHB header length before allocating memory (bsc#1153332).
- CVE-2018-16301: Fixed a buffer overflow (bsc#1153332).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15165/">CVE-2019-15165 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15165">CVE-2019-15165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522250" comment="libpcap1-1.8.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522252" comment="tcpdump-4.9.2-14.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148799" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126197" ref_url="https://bugzilla.suse.com/1126197" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1133818" ref_url="https://bugzilla.suse.com/1133818" source="BUGZILLA"/>
		<reference ref_id="1143797" ref_url="https://bugzilla.suse.com/1143797" source="BUGZILLA"/>
		<reference ref_id="1146874" ref_url="https://bugzilla.suse.com/1146874" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-17340" ref_url="https://www.suse.com/security/cve/CVE-2019-17340/" source="CVE"/>
		<reference ref_id="CVE-2019-17341" ref_url="https://www.suse.com/security/cve/CVE-2019-17341/" source="CVE"/>
		<reference ref_id="CVE-2019-17342" ref_url="https://www.suse.com/security/cve/CVE-2019-17342/" source="CVE"/>
		<reference ref_id="CVE-2019-17343" ref_url="https://www.suse.com/security/cve/CVE-2019-17343/" source="CVE"/>
		<reference ref_id="CVE-2019-17344" ref_url="https://www.suse.com/security/cve/CVE-2019-17344/" source="CVE"/>
		<reference ref_id="CVE-2019-17345" ref_url="https://www.suse.com/security/cve/CVE-2019-17345/" source="CVE"/>
		<reference ref_id="CVE-2019-17346" ref_url="https://www.suse.com/security/cve/CVE-2019-17346/" source="CVE"/>
		<reference ref_id="CVE-2019-17347" ref_url="https://www.suse.com/security/cve/CVE-2019-17347/" source="CVE"/>
		<reference ref_id="CVE-2019-17348" ref_url="https://www.suse.com/security/cve/CVE-2019-17348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed: 	  

- CVE-2019-15890: Fixed a use-after-free in SLiRP networking implementation of QEMU emulator
  which could have led to Denial of Service (bsc#1149813).
- CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite loop and denial of 
  service (bsc#1146874).
- CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking implementation of QEMU 
  emulator which could have led to execution of  arbitrary code with privileges of the 
  QEMU process (bsc#1143797).

Other issue fixed: 

- Fixed an issue where libxenlight could not restore domain vsa6535522 on live migration (bsc#1133818).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-24"/>
	<updated date="2019-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126197">SUSE bug 1126197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133818">SUSE bug 1133818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146874">SUSE bug 1146874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12068">CVE-2019-12068 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14378">CVE-2019-14378 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17340/">CVE-2019-17340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17340">CVE-2019-17340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17341/">CVE-2019-17341 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17341">CVE-2019-17341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17342/">CVE-2019-17342 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17342">CVE-2019-17342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17343/">CVE-2019-17343 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17343">CVE-2019-17343 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17344/">CVE-2019-17344 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17344">CVE-2019-17344 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17345/">CVE-2019-17345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17345">CVE-2019-17345 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17346/">CVE-2019-17346 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17346">CVE-2019-17346 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17347/">CVE-2019-17347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17347">CVE-2019-17347 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17348/">CVE-2019-17348 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17348">CVE-2019-17348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538307" comment="xen-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538308" comment="xen-doc-html-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538309" comment="xen-libs-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538310" comment="xen-libs-32bit-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538311" comment="xen-tools-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538312" comment="xen-tools-domU-4.9.4_04-3.56.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148800" version="1" class="patch">
	<metadata>
		<title>Security update for nfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1150733" ref_url="https://bugzilla.suse.com/1150733" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3689" ref_url="https://www.suse.com/security/cve/CVE-2019-3689/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2781-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192781-1.html" source="SUSE-SU"/>
		<description>
This update for nfs-utils fixes the following issues:

- CVE-2019-3689: Fixed root-owned files stored in insecure /var/lib/nfs. (bsc#1150733)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-25"/>
	<updated date="2019-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150733">SUSE bug 1150733</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3689/">CVE-2019-3689 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3689">CVE-2019-3689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522280" comment="nfs-client-1.3.0-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530719" comment="nfs-doc-1.3.0-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522281" comment="nfs-kernel-server-1.3.0-34.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148801" version="1" class="patch">
	<metadata>
		<title>Security update for ardana-ansible, ardana-glance, ardana-horizon, ardana-input-model, ardana-manila, ardana-neutron, ardana-nova, ardana-octavia, ardana-tempest, crowbar-core, crowbar-ha, crowbar-openstack, crowbar-ui, galera-3, grafana, mariadb, mariadb-connector-c, novnc, openstack-cinder, openstack-glance, openstack-heat, openstack-horizon-plugin-neutron-vpnaas-ui, openstack-keystone, openstack-monasca-installer, openstack-neutron, openstack-neutron-gbp, openstack-neutron-lbaas, openstack-nova, python-amqp, python-ovs, python-pysaml2, python-python-engineio, python-urllib3, release-notes-suse-openstack-cloud, rubygem-easy_diff, rubygem-rest-client-1_6, venv-openstack-keystone (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1019074" ref_url="https://bugzilla.suse.com/1019074" source="BUGZILLA"/>
		<reference ref_id="1096985" ref_url="https://bugzilla.suse.com/1096985" source="BUGZILLA"/>
		<reference ref_id="1106515" ref_url="https://bugzilla.suse.com/1106515" source="BUGZILLA"/>
		<reference ref_id="1115960" ref_url="https://bugzilla.suse.com/1115960" source="BUGZILLA"/>
		<reference ref_id="1116846" ref_url="https://bugzilla.suse.com/1116846" source="BUGZILLA"/>
		<reference ref_id="1118900" ref_url="https://bugzilla.suse.com/1118900" source="BUGZILLA"/>
		<reference ref_id="1120657" ref_url="https://bugzilla.suse.com/1120657" source="BUGZILLA"/>
		<reference ref_id="1125893" ref_url="https://bugzilla.suse.com/1125893" source="BUGZILLA"/>
		<reference ref_id="1126088" ref_url="https://bugzilla.suse.com/1126088" source="BUGZILLA"/>
		<reference ref_id="1132593" ref_url="https://bugzilla.suse.com/1132593" source="BUGZILLA"/>
		<reference ref_id="1132666" ref_url="https://bugzilla.suse.com/1132666" source="BUGZILLA"/>
		<reference ref_id="1136035" ref_url="https://bugzilla.suse.com/1136035" source="BUGZILLA"/>
		<reference ref_id="1141121" ref_url="https://bugzilla.suse.com/1141121" source="BUGZILLA"/>
		<reference ref_id="1141676" ref_url="https://bugzilla.suse.com/1141676" source="BUGZILLA"/>
		<reference ref_id="1143215" ref_url="https://bugzilla.suse.com/1143215" source="BUGZILLA"/>
		<reference ref_id="1145796" ref_url="https://bugzilla.suse.com/1145796" source="BUGZILLA"/>
		<reference ref_id="1146578" ref_url="https://bugzilla.suse.com/1146578" source="BUGZILLA"/>
		<reference ref_id="1148158" ref_url="https://bugzilla.suse.com/1148158" source="BUGZILLA"/>
		<reference ref_id="1148383" ref_url="https://bugzilla.suse.com/1148383" source="BUGZILLA"/>
		<reference ref_id="1150895" ref_url="https://bugzilla.suse.com/1150895" source="BUGZILLA"/>
		<reference ref_id="917802" ref_url="https://bugzilla.suse.com/917802" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3448" ref_url="https://www.suse.com/security/cve/CVE-2015-3448/" source="CVE"/>
		<reference ref_id="CVE-2016-10127" ref_url="https://www.suse.com/security/cve/CVE-2016-10127/" source="CVE"/>
		<reference ref_id="CVE-2018-15727" ref_url="https://www.suse.com/security/cve/CVE-2018-15727/" source="CVE"/>
		<reference ref_id="CVE-2018-19039" ref_url="https://www.suse.com/security/cve/CVE-2018-19039/" source="CVE"/>
		<reference ref_id="CVE-2018-558213" ref_url="https://www.suse.com/security/cve/CVE-2018-558213/" source="CVE"/>
		<reference ref_id="CVE-2019-13611" ref_url="https://www.suse.com/security/cve/CVE-2019-13611/" source="CVE"/>
		<reference ref_id="CVE-2019-15043" ref_url="https://www.suse.com/security/cve/CVE-2019-15043/" source="CVE"/>
		<reference ref_id="CVE-2019-2614" ref_url="https://www.suse.com/security/cve/CVE-2019-2614/" source="CVE"/>
		<reference ref_id="CVE-2019-2627" ref_url="https://www.suse.com/security/cve/CVE-2019-2627/" source="CVE"/>
		<reference ref_id="CVE-2019-2628" ref_url="https://www.suse.com/security/cve/CVE-2019-2628/" source="CVE"/>
		<reference ref_id="CVE-2019-5477" ref_url="https://www.suse.com/security/cve/CVE-2019-5477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2867-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192867-1.html" source="SUSE-SU"/>
		<description>
This update for ardana-ansible, ardana-glance, ardana-horizon, ardana-input-model, ardana-manila, ardana-neutron, ardana-nova, ardana-octavia, ardana-tempest, crowbar-core, crowbar-ha, crowbar-openstack, crowbar-ui, galera-3, grafana, mariadb, mariadb-connector-c, novnc, openstack-cinder, openstack-glance, openstack-heat, openstack-horizon-plugin-neutron-vpnaas-ui, openstack-keystone, openstack-monasca-installer, openstack-neutron, openstack-neutron-gbp, openstack-neutron-lbaas, openstack-nova, python-amqp, python-ovs, python-pysaml2, python-python-engineio, python-urllib3, release-notes-suse-openstack-cloud, rubygem-easy_diff, rubygem-rest-client-1_6, venv-openstack-keystone contains the following fixes:

- Update to version 8.0+git.1566374355.c509923:
  * Use raw image format when using SES backend on Nova (SOC-9285)

- Update to version 8.0+git.1566376789.be0fe01:
  * Configure glance image_direct_url/multiple_locations (SOC-9285)

- Update to version 8.0+git.1565816064.5d4f73f:
  * Removed None condition from rule (SOC-10003)

- Update to version 8.0+git.1566517401.98450e6:
  * Add neutron-fwaas.json when neutron-l3-agent is deployed (SOC-10280)

- Update to version 8.0+git.1568835837.2452e7a:
  * Ensure Manila services don't auto start on reboot (SOC-10641)

- Update to version 8.0+git.1568220097.74ee4b4:
  * API extension paths separated by colon (SOC-10447)

- Update to version 8.0+git.1567555448.5ecd5b0:
  * Add dependent services to neutron services (SOC-8746)

- Update to version 8.0+git.1566517377.f2a8c54:
  * Add policy.d/neutron-fwaas.json.j2 (SOC-10280)

- Update to version 8.0+git.1566902754.c58ff69:
  * Install libosinfo package (SOC-10295)

- Update to version 8.0+git.1565946419.a76c00e:
  * Set diskcachemode and disk discard when using RBD (SOC-10182)

- Update to version 8.0+git.1568373448.bcaee7e:
  * Make octavia heartbeat frequency options configurable (SOC-9285)

- Update to version 8.0+git.1566374572.a3c91d9:
  * Include SES variables when configuring image (SOC-9285)

- Update to version 8.0+git.1566208257.5213d93:
  * Use default values for amphora connection retries/timeout (SOC-9285)

- Update to version 8.0+git.1566471887.fd2fec7:
  * Delete existing run filter before deploying it (SOC-10287)

- Update to version 5.0+git.1569597589.1f025c557:
  * barclamp_lib: Sync timeout with other barclamps (SOC-10513, SOC-10011)

- Update to version 5.0+git.1569231378.ac645b753:
  * Revert 'batch: Use easy_merge for merging (SOC-10505)'

- Update to version 5.0+git.1569103607.ee4a6cbc9:
  * upgrade: Fix pie chart colors on dashboard (SOC-10619)

- Update to version 5.0+git.1568983947.70c39b8c7:
  * batch: Use easy_merge for merging (SOC-10505)

- Update to version 5.0+git.1568317972.dfb856def:
  * upgrade: Fix pre-checks tests (SOC-9868)
  * Allow designate rndc for all nodes (SOC-10339)

- Update to version 5.0+git.1568210854.4f87b86f8:
  * gems: Update easy_diff to 1.0.0 (SOC-10505)

- Update to version 5.0+git.1567531836.e06d68030:
  * Public ips for dns nodes when designate integration is in use (SOC-9635)

- Update to version 5.0+git.1567513044.e9ef28b03:
  * crowbar: Do not read /etc/crowbar.install.key in non-SUSE init script
  * transition.sh: Do not read /etc/crowbar.install.key
  * gather_logs: Make it a bit useful again
  * gather_logs: Do not read /etc/crowbar.install.key
  * network: Check existing upper layers before bond setup  (bsc#1120657)
  * network: never plug two interface into the same ovs bridge (bsc#1120657)
  * network: Avoid plugging the same interface to two ovs bridges (bsc#1120657)
  * nic library: some helper for identifying base interface (bsc#1120657)
  * network: Rework the vlan port replugging code (bsc#1120657)
  * network: DRY out 'kill_nic_files' (noref)

- Update to version 5.0+git.1567161136.fa34ac9f2:
  * Add CVE-2019-5477 the to travis ignore list (SOC-9635)

- Update to version 5.0+git.1567094388.48f2be817:
  * upgrade: Add more prechecks for 8-&gt;9 (SOC-9868)

- Update to version 5.0+git.1567673535.607aada:
  * Fix typo in error message

- add cirros-0.4.0-x86_64-disk.img (SOC-9298, SOC-10844)
* the disk img is required to run the barbican tempest test

- Update to version 5.0+git.1570141351.058c8bd44:
  * tempest:install designate tempest plugin for SOC8 (SOC-10288)

- Update to version 5.0+git.1569972328.9d475ceb9:
  * [5.0] Designate: Add dns_domain_ports config (SOC-10740)

- Update to version 5.0+git.1569933916.d38d07e2d:
  * Install barbican tempest plugin for SOC8 (SOC-10191)
  * Designate: Filter out the admin node (SOC-10658)

- Update to version 5.0+git.1569885207.573f090bd:
  * 5.0: designate: Fix the keys syntax error on migrations (SOC-10660)

- Update to version 5.0+git.1569620621.21c6c5459:
  * helper:move config_for_role_exists from horizon to crowbar-openstack(SOC-10191)

- Update to version 5.0+git.1569431597.02675553d:
  * tempest: don't rely on service catalogue (SOC-10633)
  * glance: don't reuse sync mark names (SOC-10348)
  * enable LDAP chase_referrals configuration (SOC-7364)
  * nova: set default attribute for max_threads_per_process

- Update to version 5.0+git.1569053854.bb65c0fd1:
  * Make ovs of_inactivity_probe configurable from neutron barclamp

- Update to version 5.0+git.1568904694.4d6e71fd1:
  * Revert 'designate: Mark as user managed (SOC-10233)'

- Update to version 5.0+git.1568762121.5889ee9c4:
  * Octavia: Hide UI until complete (SOC-10550)

- Update to version 5.0+git.1568721569.5927d34b8:
  * designate: Mark as user managed (SOC-10233)

- Update to version 5.0+git.1568593066.8a7e963dd:
  * designate: cleanup producer HA deployment (SOC-9766)

- Update to version 5.0+git.1568373930.d508e93f7:
  * designate: Correct missing variable (SOC-10549)

- Update to version 5.0+git.1568323106.c080edcc1:
  * neutron: Add 'insecure' to old cli calls (SOC-10453)

- Update to version 5.0+git.1568303804.bd258bef6:
  * designate: No longer care about master/slave (SOC-10456)

- Update to version 5.0+git.1568173760.4a32699b1:
  * nova: raise neutron client timeout to 5 minutes
  * neutron: Small cleanup to neutron_lbaas.conf template

- Update to version 5.0+git.1568117991.15d77c6ea:
  * Designate default Bind9 pool config (SOC-10339)

- Update to version 5.0+git.1568034797.254b8fb85:
  * tempest: Skip manila and ceilometer tests (SOC-9799)

- Update to version 5.0+git.1567660321.885064382:
  * nova: Don't put nova-compute roles on monasca node (SOC-10373)

- Update to version 5.0+git.1567513535.f2939eeed:
  * designate: Update ns_records with all nameservers (SOC-9636)
  * designate: Deploy producer on a server node (SOC-9766)

- Update to version 5.0+git.1567165725.8d5b4fa26:
  * horizon: fix Grafana in HA clouds (bsc#1116846)

- Update to version 5.0+git.1567094879.c918a5e23:
  * Fix barbican SSL support (SOC-9298)
  * Add/fix run_filters
  * Add tempest filters based on services (SOC-9298)

- Update to version 5.0+git.1566858336.891ddbf31:
  * Fix magnum tempest tests (SOC-9298)
  * tempest: only assign creator role if needed
  * database: Hardcode ruby version for package installation (SOC-10010)

- Update to version 5.0+git.1566838653.efe3b147d:
  * memcache: lookup memcached servers port only on local node (SOC-10173)
  * designate: initialize email in default designate proposal
  * horizon: Install designate plugin when configured (SOC-9695)

- Update to version 5.0+git.1566629404.88dae370a:
  * Designate: Update DB pools configuration (SOC-9767)

- Update to version 5.0+git.1566256160.59ebd76c0:
  * designate: Configure resource settings (SOC-9633)

- Update to version 1.2.0+git.1568396400.0344a727:
  * upgrade: Add missing precheck titles

- Update to 25.3.25:
  * A new Galera configuration parameter cert.optimistic_pa was added. If the
    parameter value is set to true, full parallellization in applying write
    sets is allowed as determined by certification algorithm. If set to false,
    no more parallellism is allowed in applying than seen on the master.
  * Support for ECDH OpenSSL engines on CentOS 6 (galera#520)
  * Fixed compilation on Debian testing and unstable (galera#516, galera#528)

- Add unescape_IPv6_bind_ip.patch
  * https://github.com/dciabrin/galera-1/commit/0f6f8aeeb09809280c956514cfd5844b8acad4f9

- Add CVE-2019-15043.patch (SOC-10357)
  * Adds authentication to a few rest endpoints
    see: https://github.com/grafana/grafana/compare/v5.4.4...v5.4.5

- Update to version 4.6.5:
  * release 4.6.5
    CVE-2018-19039 (jsc#SOC-9976)
    File Exfiltration vulnerability Security fix
  * Updated version to 4.6.4.
    CVE-2018-558213/CVE-2018-558213 (jsc#SOC-9980)
    Important fix for LDAP &amp; OAuth login vulnerability
  * Updated version to 4.6.4.
  * sql: added code migration type
  * release 4.6.3
  * fix default alias
  * fixes broken alert eval when first condition is using OR
  * fix: alert list panel now works correctly after adding manual annotation on dashboard, fixes #9951
  * fix: fix for avatar images when gzip is turned on, fixes #5952
  * sets version to 4.6.2
  * prom: add support for default step param (#9866)
  * build: fixed jshint error
  * fix: Html escaping caused issue in InfluxDB query editor,  could not pick greater than or less then operators, fixes #9871
  * heatmap: fix tooltip in 'Time series bucket' mode, #9332 (#9867)
  * fix cloudwatch ec2_instance_attribute (#9718)
  * colorpicker: fix color string change #9769 (#9780)
  * changes version to 4.6.1
  * fix: panel view now wraps, no scrolling required, fixes #9746
  * plugins: fix for loading external plugins behind auth proxy, fixes #9509
  * fix: color picker bug at series overrides page, #9715 (#9738)
  * tech: switch to golang 1.9.2
  * tech: add missing include
  * save as should only delete threshold for panels with alerts
  * fix: graphite annotation tooltip included undefined, fixes #9707
  * build: updated version to v4.6.0
  * plugins: added backward compatible path for rxjs
  * ux: updated singlestat default colors
  * prometheus: fixed unsaved changes warning when changing time range due to step option on query model was changed in datasource.query code, fixes #9675
  * fix: firefox can now create region annotations, fixes #9638
  * alerting: only editors can pause rules
  * fix: another fix for playlist view state, #9639
  * fix: fixed playlist controls and view state, fixes #9639
  * prom: adds pre built grafana dashboard
  * bump version for publish_testing.sh
  * update version to 4.6.0-beta3
  * plugins: expose dashboard impression store
  * modify $__timeGroup macro so it can be used in select clause (#9527)
  * plugins: fixes path issue on Windows
  * prometheus: enable gzip for /metrics endpoint
  * fix: fixed save to file button in export modal, fixes #9586
  * mysql: add usage stats for mysql
  * pluginloader: esModule true for systemjs config
  * Fix heatmap Y axis rendering (#9580)
  * fix vector range
  * prometheus: add builtin template variable as range vectors
  * fix: fixed prometheus step issue that caused browser crash, fixes #9575
  * fix: getting started panel and mark adding data source as done, fixes #9568
  * Fixes for annotations API (#9577)
  * bump packagecloud script
  * build: added imports of rxjs utility functions
  * prepare for v4.6.0-beta2 release
  * fix template variable expanding
  * annotations: quote reserved fields (#9550)
  * ux: align alert and btn colors
  * fix: fixed color pickers that were broken in minified builds, fixes #9549
  * textpanel: fixes #9491
  * csv: fix import for saveAs shim
  * plugins: expose more util and flot dependencies
  * alert_tab: clear test result when testing rules
  * (cloudwatch) fix cloudwatch query error over 24h (#9536)
  * show error message when cloudwatch datasource can't add
  * update packagecloud script for 4.6.0-beta1
  * changelog: adds note about closing #9516
  * alerting: add count_non_null reducer
  * Update rpm.md
  * fix: can now remove annotation tags without popover closing
  * tech: add backward compatibility for &lt;spectrum-picker&gt; directive (#9510)
  * fix: fixed links on new 404 page, fixes #9493
  * logging: dont use cli logger in http_server
  * oauth: raise error if session state is missing
  * oauth: provide more logging for failed oauth requests
  * prepare for 4.6.0-beta1 release
  * docs: updated whats new article
  * docs: initial draft release v46
  * graph: fix y-axis decimalTick check. Fixes #9405
  * minor docs update
  * docs: annotation docs update
  * changelog: adds note about closing #7104
  * changelog: adds note about closing #9373
  * metrics: disable gzip for /metrics endpoint (#9468)
  * Annotation docs (#9506)
  * Update CHANGELOG.md
  * Update PLUGIN_DEV.md
  * Update PLUGIN_DEV.md
  * Update README.md
  * Fixed link issue in CHANGELOG
  * Create PLUGIN_DEV.md
  * changelog: adds note about closing #9371,#5334,#8812
  * ds_edit: placeholder should only be cert header
  * fixed minor styling issus (#9497)
  * fix: alert api limit param did not work and caused SQL syntax error, fixes #9492
  * annotations: add endpoint for writing graphite-like events (#9495)
  * Update unsaved_changes_modal.ts
  * fix: set lastSeenAt date when creating users to then years in past insteasd of empty date, fixes #9260
  * ux: minor ux fix
  * Retain old name for TLS client auth
  * Return error if datasource TLS CA not parsed
  * Datasource settings: Make HTTP all caps
  * Datasource HTTP settings: Add TLS skip verify
  * Make URL capitalisation consistent in UI
  * Alias macron package in app_routes.go
  * Verify datasource TLS and split client auth and CA
  * Tidy spacing in datasource TLS settings
  * Tests: Clarify what InsecureSkipVerify does
  * postgres: add missing ngInject decorator
  * docs: initial docs for new annotation features, #9483
  * Adds note for #9209 to changelog
  * Postgres Data Source  (#9475)
  * tech: expose more to plugins, closes #9456
  * Fix NaN handling (#9469)
  * snapshots: improve snapshot listing performance, #9314 (#9477)
  * mysql: fix interpolation for numbers in temp vars
  * Added docs for Kafka alerting
  * Fixed failing go tests
  * gofmt fixes
  * Added tests
  * Kafka REST Proxy works with Grafana
  * added insrtuctions for oauth2 okta bitbucket (#9471)
  * Unified Color picker fixes (#9466)
  * Show min interval query option for mixed datasource (#9467)
  * gzip: plugin readme content set explicitly
  * ignore pattern for vendored libs
  * fix: escape metric segment auto complete, fixes #9423
  * Corrected a PostgreSQL SELECT statement. (#9460)
  * tests: found the unhandled promise issue in the dash import tests
  * testing: fixing tests
  * annotations: minor change to default/edit annotation color
  * Create annotations (#8197)
  * OAuth: Rename sslcli
  * OAuth: Separate TLS client auth and CA config
  * OAuth: Check both TLS client cert and key
  * Always verify TLS unless explicitly told otherwise
  * fix: threshold's colors in table panels (#9445) (#9453)
  * singlestat: fix sizing bug #9337 (#9448)
  * Revert 'Fix coloring in singlestat if null value (#9438)' (#9443)
  * Fix coloring in singlestat if null value (#9438)
  * fix: missing semicolon
  * changed jsontree to use jsonexplorer (#9416)
  * docs page for authproxy (#9420)
  * Update codebox (#9430)
  * Series color picker fix (#9442)
  * fix type in readme
  * removed commented line
  * changelog: adds note about closing #9110
  * Fixed typo
  * Change empty string checks and improve logging
  * changelog: adds note about closing #9208
  * Fix spelling on 404 page.
  * Lint fix
  * Update kbn.js
  * Add Norwegian Krone denominator for currency
  * fixed layout for column options, changed dropdown for date format kept old code
  * build: add noUnusedLocals to tsc parameters
  * build: install go based on env variable
  * changes go version to 1.9.1
  * changelog: adds note about closing #9226
  * changelog: add note about closing #9429
  * changelog: adds note about closing #9399
  * Fix formatting issue
  * Add milliseconds format in table panel's config
  * support for s3 path (#9151)
  * Remove apparently unnecessary .flush() calls.
  * Fix empty message and toolong attribute names Use default state message if no message is provided by the user Slice attribute name to maximum of 50 chars
  * Address review comments.
  * changelog: add note about closing #7175
  * plugin_loader: expose app_events to plugins
  * Add the missing comma
  * colorpicker: refactoring the new unififed colorpicker, #9347
  * Unified colorpicker (#9347)
  * fix missing column headers in excel export (#9413)
  * build: remove clean plugin from dev build
  * build: fixed broken elastic unit test
  * shore: cleanup unused stuff in common.d.ts
  * Build URL for close alert request differently
  * some restyling (#9409)
  * Docs text fixes (#9408)
  * Checkbox fixes (#9400)
  * fix: ensure panel.datasource is null as default
  * plugibs: expose more to plugins
  * properly parse &amp; pass upload image bool from config
  * break out slack upload into separate function
  * tech: minor npm scripts update
  * build: fixed build
  * refactoring: minor refactoring of PR #8916
  * Update script to make it use OpsGenie's REST API
  * docs: minor docs fix
  * Merge branch 'master' of github.com:grafana/grafana
  * build: minor webpack fix
  * docs: updated building from source docs
  * playlist: play and edit should use same width
  * shore: fixed html indentation, #9368
  * tech: updated yarn.lock
  * shore: minor cleanup
  * Webpack (#9391)
  * fixing json for CI
  * adding support for token-based slack file.upload API call for posting images to slack
  * changelog: adds note about closing #8479
  * changelog: adds note about closing #8050
  * changelog: adds note about closing #9386
  * change pdiff to percent_diff for conditions
  * panel: rename label on csv export modal
  * add diff and pdiff for conditions
  * fix, add targetContainsTemplate()
  * fix cloudwatch alert bug
  * add debug log
  * move extend statistics handling code to backend
  * fix assume role
  * improve cloudwatch tsdb
  * refactor cloudwatch code
  * remove obsolete code
  * move cloudwatch crendential related code
  * remove old handler
  * fix annotation query
  * fix time
  * fix dimension convertion
  * re-implement annotation query
  * fix parameter format
  * fix alert feature
  * fix parameter format
  * refactor cloudwatch to support new tsdb interface
  * refactor cloudwatch frontend code
  * refactor cloudwatch frontend code
  * fix test
  * re-implement dimension_values()
  * fix error message
  * remove performEC2DescribeInstances()
  * re-implement ec2_instance_attribute()
  * re-implement ebs_volume_ids()
  * import the change, https://github.com/grafana/grafana/pull/9268
  * fix conflict
  * fix test
  * remove obsolete GetMetricStatistics()
  * fix test
  * move test code
  * fix conflict
  * porting other suggestion
  * re-implement get regions
  * move the metric find query code
  * (cloudwatch) move query parameter to 'parameters'
  * parse duration
  * remove offset for startTime
  * cache creds for keys/credentials auth type
  * fix test
  * fix invalid query filter
  * count up metrics
  * (cloudwatch) alerting
  * add brazil currency
  * tech: upgrade of systemjs to 0.20.x working
  * tech: reverted to systemjs
  * tech: migrating elasticsearch to typescript
  * changelog: add note about using golang 1.9
  * change go version to 1.9
  * changelog: adds note about closing #9367
  * tech: systemjs upgrade
  * made a text-panel page, maybe we don't need it
  * cleaned up html/sass and added final touches
  * Enable dualstack in every net.Dialer, fixes #9364
  * jaeger: capitalize tracer name
  * jaeger: logging improvement
  * tech: systemjs upgrade
  * Have  include intervalFactor in its calculation, so always equal to the step query parameter.
  * alertlist: toggle play/pause button
  * updated css and html for recent state changes for alert lists
  * Fix export_modal message (#9353)
  * s3: minor fix for PR #9223
  * internal metrics: add grafana version
  * changelog: adds note about closing 5765
  * Update latest.json
  * typescript: stricter typescript option
  * prom_docker: give targets correct job name
  * testdata: add bucket scenarios for heatmap
  * dev-docker: add grafana as target
  * changelog: add note ablout closing #9319
  * introduce smtp config option for EHLO identity
  * changelog: note about closing #9250
  * go fmt
  * new page for text, needs more work
  * replaced img in graph, created alert list page
  * docs: update docs
  * Update CHANGELOG.md
  * changelog: adds note about closing #5873
  * replaced image
  * Docs new updates (#9324)
  * Update CHANGELOG.md
  * Update latest.json
  * cleanup: removed unused file
  * tech: remove bower and moved remaining bower dependencies to npm
  * tech: cleanup and fixed build issue
  * tech: upgraded angularjs and moved dependency from bower to npm, closes #9327
  * follow go idiom and return error as second param
  * tech: updated tsconfig
  * docker: adds alertmanager to prometheus fig
  * tech: more tslint rules
  * another img update
  * tech: removing unused variables from typescript files, and making tslint rules more strict
  * deleted old shortcuts instruction
  * text uppdates for dashlist and singlestat(+img). updated the keyboard shortcuts
  * context is reserved for go's context
  * make ds a param for Query
  * remove batch abstraction
  * rename executor into tsdbqueryendpoint
  * remove unused structs
  * refactor response flow
  * tech: removed test component
  * ux: minor singlestat update
  * singlestat: minor change
  * Update CHANGELOG.md
  * Singlestat time (#9298)
  * tech: progress on react poc
  * adds note about closing #9213
  * Update _navbar.scss
  * replaced images, updating text(not finished)
  * fix: close for 'Unsaved Changes' modal, #9284 (#9313)
  * Initial graphite tags support (#9239)
  * tech: initial react poc
  * Make details more clean in PD description
  * bug: enable HEAD requests again
  * Add `DbClusterIdentifier` to CloudWatch dimensions (#9297)
  * templating: fix dependent variable updating (#9306)
  * Fix adhoc filters restoration (#9303)
  * Explicitly refer to Github 'OAuth' applications
  * config bucket and region for s3 uploader
  * fixes bug introduced with prom namespaces
  * fixing spelling of millesecond -&gt; millisecond
  * fixing spelling of millesecond -&gt; millisecond
  * Remove duplicate bus.AddHandler() (#9289)
  * Update CHANGELOG.md
  * use same key as mt
  * tag alert queries that return no_data
  * updated error page html+css, added ds_store to ignore (#9285)
  * public/app/plugins/panel/graph/specs/graph_specs.ts: relax tests to be 'within' instead of 'equal', so they won't fail on i686 (#9286)
  * Fix path to icon (#9276)
  * adds note about fix in v4.5.2
  * skip NaN values when writing to graphite
  * addded mass units, #9265 (#9273)
  * Fully fill out nulls in cloudfront data source (#9268)
  * make it possible to configure sampler type
  * mark &gt;=400 responses as error
  * change port for jaeger dev container
  * logwrapper for jaeger
  * make samplerconfig.param configurable
  * adds custom tags from settings
  * use route as span name
  * add trace headers for outgoing requests
  * docker file for running jaeger
  * better formating for error trace
  * attach context with span to *http.Request
  * add traces for datasource reverse proxy requests
  * trace failed executions
  * use tags instead of logs
  * use opentracing ext package when possible
  * set example port to zipkin default
  * adds codahale to vendor
  * makes jaeger tracing configurable
  * add trace parameters for outgoing requests
  * adds basic traces using open traces
  * require dashboard panels to have id
  * fix: jsonData should not be allowed to be null, fixes #9258
  * packaging: reduce package size
  * Update upgrading.md (#9263)
  * Added --pluginUrl option to grafana-cli for local network plugin installation
  * adds note about closing #1395
  * add locale format
  * update changelog
  * fixes broken tests :boom:
  * minor code adjusetments
  * pass context to image uploaders
  * remove unused deps
  * Reduced OAuth scope to read_write
  * GCS support via JSON API
  * gofmt fixes
  * Added GCS support #8370
  * move more known datasources from others
  * Remove alert thresholds on panel duplicate, issue #9178 (#9257)
  * 4.5.1 docs + update version to 5.0.0-pre1
  * publish_both.sh update for 4.5.1
  * Update CHANGELOG.md
  * docs: updated changelog
  * packaging: reducing package size be only including public vendor stuff we need
  * docs: update download links
  * allow ssl renegotiation for datasources
  * check args for query
  * add test for completer
  * fix
  * follow token name change
  * (prometheus) support label value completion
  * (prometheus) support label name completion
  * get s3 url via aws-sdk-go, fix #9189
  * Prometheus: Rework the interaction between auto interval (computed based on graph resolution), min interval (where specified, per query) and intervalFactor (AKA resolution, where specified, per query). As a bonus, have  and  reflect the actual interval (not the auto interval), taking into account min interval and Prometheus' 11k data points limit.
  * minor fix
  * (prometheus) support instant query for table format, use checkbox to switch query type
  * (prometheus) instant query support
  * Add thumbnail to card
  * Add values to the hipchat card
  * Reorder editorconfig
  * Enable datasources to be able to round off to a UTC day properly
  * Include triggering metrics to pagerduty alerts

- Add 0001-fix-XSS-vulnerabilities-in-dashboard-links.patch (bsc#1096985)
- adjust mysql-systemd-helper ('shutdown protected MySQL' section)
  so it checks both ping response and the pid in a process list
  as it can take some time till the process is terminated.
  Otherwise it can lead to 'found left-over process' situation
  when regular mariadb is started [bsc#1143215]
- update suse_skipped_tests.list

- remove client_ed25519.so plugin because it's shipped in
  mariadb-connector-c package (libmariadb_plugins)
- update suse_skipped_tests.list

- update to 10.2.25 GA
  * Fixes for the following security vulnerabilities:
    * 10.2.23: none
    * 10.2.24: CVE-2019-2628, CVE-2019-2627, CVE-2019-2614
    * 10.2.25: none
  * release notes and changelog:
    https://mariadb.com/kb/en/library/mariadb-10223-release-notes
    https://mariadb.com/kb/en/library/mariadb-10223-changelog
    https://mariadb.com/kb/en/library/mariadb-10224-release-notes
    https://mariadb.com/kb/en/library/mariadb-10224-changelog
    https://mariadb.com/kb/en/library/mariadb-10225-release-notes
    https://mariadb.com/kb/en/library/mariadb-10225-changelog
- remove mariadb-10.2.22-fix_path.patch that was applied upstream
  in mariadb 10.2.23
- remove caching_sha2_password.so because it's shipped in
  mariadb-connector-c package (libmariadb_plugins)
- remove xtrabackup scripts as it was replaced by mariabackup (we
  already removed xtrabackup requires in the first phase)
- fix reading options for multiple instances if my${INSTANCE}.cnf
  is used. Also remove 'umask 077' from mysql-systemd-helper that
  causes that new datadirs are created with wrong permissions. Set
  correct permissions for files created by us (mysql_upgrade_info,
  .run-mysql_upgrade) [bsc#1132666]
- fix build comment to not refer to openSUSE
- tracker bug [bsc#1136035]

- New upstream version 3.1.2 [bsc#1136035]
  * CONC-383: client plugins can't be loaded due to missing prefix
  * Fixed version setting in GnuTLS by moving 'NORMAL' at the end
    of priority string
  * CONC-386: Added support for pem files which contain certificate
    and private key.
  * Replication/Binlog API: The main mechanism used in replication
    is the binary log.
  * CONC-395: Dashes and underscores are not interchangeable in
    options in my.cnf
  * CONC-384: Incorrect packet when a connection attribute name or
    value is equal to or greater than 251
  * CONC-388: field-&gt;def_length is always set to 0
  * Getter should get and the setter should set
    CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS
  * Disable LOAD DATA LOCAL INFILE suport by default and auto-enable
    it for the duration of one query, if the query string starts with
    the word 'load'. In all other cases the application should enable
    LOAD DATA LOCAL INFILE support explicitly.
  * Changed return code for mysql_optionv/mysql_get_optionv to 1 (was -1)
    and added CR_NOT_IMPLEMENTED error message if a option is unknown
    or not supported.
  * mingw fix: use lowercase names for include files
  * CONC-375: Fixed handshake errors when mixing TLSv1.3 cipher
    suites with cipher suites from other TLS protocols
  * CONC-312: Added new caching_sha2_password authentication plugin
    for authentication with MySQL 8.0
- refresh mariadb-connector-c-2.3.1_unresolved_symbols.patch and
  private_library.patch
- pack caching_sha2_password.so and client_ed25519.so
- move libmariadb.pc from /usr/lib/pkgconfig to
  /usr/lib64/pkgconfig for x86_64 [bsc#1126088] 

- Fixes bugs bsc#1145796: Add tightPNG encoding
  * Apply novnc-1.0.0-add-encoding-support-for-TightPNG.patch
    This patch cherry-picks commit 2c813a33f to novnc 1.0.0 to enable tightPNG encoding.
    This encoding is needed to allow noVNC to work with instances that
    run on ESX hypervisors. It is not possible to update the Pike package
    to noVNC 1.1.0 as that version is not supported with openstack-nova until Rocky.

- Update to version cinder-11.2.3.dev16:
  * RBD: remove redundant exception log to reduce noise

- Update to version cinder-11.2.3.dev14:
  * Fix NFS volume retype with migrate

- Update to version cinder-11.2.3.dev12:
  * Remove Sheepdog tests from zuul config
  * NetApp: Return all iSCSI targets-portals

- Update to version cinder-11.2.3.dev8:
  * Remove experimental openSUSE 42.3 job

- Update to version cinder-11.2.3.dev16:
  * RBD: remove redundant exception log to reduce noise

- Update to version cinder-11.2.3.dev14:
  * Fix NFS volume retype with migrate

- Update to version cinder-11.2.3.dev12:
  * Remove Sheepdog tests from zuul config
  * NetApp: Return all iSCSI targets-portals

- Update to version cinder-11.2.3.dev8:
  * Remove experimental openSUSE 42.3 job

- Update to version glance-15.0.3.dev3:
  * Remove experimental openSUSE 42.3 job

- Update to version glance-15.0.3.dev3:
  * Remove experimental openSUSE 42.3 job

- Update to version heat-9.0.8.dev13:
  * Unlimited cinder quotas throws exception

- Update to version heat-9.0.8.dev12:
  * Do not perform the tenant stack limit check for admin user

- Update to version heat-9.0.8.dev13:
  * Unlimited cinder quotas throws exception

- Update to version heat-9.0.8.dev12:
  * Do not perform the tenant stack limit check for admin user

- don't exclude pyc files to fix update/upgrade (SOC-9339)

- Update to version keystone-12.0.4.dev4:
  * Remove experimental openSUSE 42.3 job
  * Cap bandit

- Update to version keystone-12.0.4.dev4:
  * Remove experimental openSUSE 42.3 job
  * Cap bandit

- Update to version keystone-12.0.4.dev4:
  * Remove experimental openSUSE 42.3 job
  * Cap bandit

- Update to version keystone-12.0.4.dev4:
  * Remove experimental openSUSE 42.3 job
  * Cap bandit

- Update to version Build_20190923_16.32 (bsc#1148158)
  * Create path.repo directory for Elasticseach

- Update to version neutron-11.0.9.dev51:
  * Check for agent restarted after checking for DVR port

- Update to version neutron-11.0.9.dev49:
  * Allow first address in an IPv6 subnet as valid unicast

- Update to version neutron-11.0.9.dev47:
  * Remove experimental openSUSE 42.3 job

- Update to version neutron-11.0.9.dev45:
  * Clear skb mark on encapsulating packets
  * fix update port bug

- Update to version neutron-11.0.9.dev51:
  * Check for agent restarted after checking for DVR port

- Update to version neutron-11.0.9.dev49:
  * Allow first address in an IPv6 subnet as valid unicast

- Update to version neutron-11.0.9.dev47:
  * Remove experimental openSUSE 42.3 job

- Update to version neutron-11.0.9.dev45:
  * Clear skb mark on encapsulating packets
  * fix update port bug

- Update to version group-based-policy-7.3.1.dev56:
  * [AIM] Fix HAIP RPC query

- Update to version group-based-policy-7.3.1.dev55:
  * Fix implicit ICMPv6 Security Group Rules

- Update to version group-based-policy-7.3.1.dev54:
  * Fixed snat port status to be ACTIVE and UP

- Update to version group-based-policy-7.3.1.dev53:
  * Verify aim\_epg exists before proceeding
  * Revert 'Make DHCP provisioning blocks conditional'
  * Some refactoring regarding merge aim statuses

- Update to version group-based-policy-7.3.1.dev47:
  * Bulk extension support for routers

- Update to version group-based-policy-7.3.1.dev46:
  * [AIM] Eliminate redundant router extension content

- add 0001-Remove-DDT-tests-from-tempest-plugin.patch 

- add 0001-Fix-unable-to-delete-subnet-in-API-tests.patch

- Update to version nova-16.1.9.dev7:
  * Remove experimental job on openSUSE 42.3

- Update to version nova-16.1.9.dev6:
  * Fix misuse of nova.objects.base.obj\_equal\_prims

- Update to version nova-16.1.9.dev5:
  * Replace non-nova server fault message

- Allow to attach more than 26 volumes (bsc#1118900)
  * This is a forward port from SOC7
  * Add 0001-Add-method-to-generate-device-names-universally.patch
  * Add 0002-Raise-403-instead-of-500-error-from-attach-volume-AP.patch
  * Add 0003-Add-configuration-of-maximum-disk-devices-to-attach.patch

- Update to version nova-16.1.9.dev7:
  * Remove experimental job on openSUSE 42.3

- Update to version nova-16.1.9.dev6:
  * Fix misuse of nova.objects.base.obj\_equal\_prims

- Update to version nova-16.1.9.dev5:
  * Replace non-nova server fault message

- add 0002-Do_not_send_AAAA_DNS_request_when_domain_resolved_to_IPv4_address.patch (SOC-9144)

- update to 2.7.2:
  * includes fix for controller connection over SSL
  * enable build against openvswitch-devel to get C extensions enabled (bsc#1141121)

- Added fix-xxe-in-xml-parsing.patch (CVE-2016-10127, bsc#1019074)

- Add patch CVE-2019-13611.patch (SOC-9989, bsc#1141676)
  * python-python-engineio: An issue was discovered in
    python-engineio through 3.8.2. There is a Cross-Site WebSocket
    Hijacking (CSWSH) vulnerability that allows attackers to make
    WebSocket connections to a server

- Add missing dependency on python-six (bsc#1150895)

- Update to version 8.20190911:
  * Fixing broken markup (noref)

- Update to version 8.20190909:
  * Adding networking loop known issue (SOC-10150)
  * add Keystone default is still UUID (noref)
  * remove Known Issue-WebSSO not working (bsc#1132593)
  * Remove de-de from the URL again.
  * transfer C8 revision history from MF wiki (SCRD-7737)
  * Typo/grammar fixes + URL fix
  * remove Crowbar deprecation date (bsc#1125893)
  *  remove comment that ovsvapp is not functional

- Update to version 8.20190909:
  * Adding networking loop known issue (SOC-10150)
  * add Keystone default is still UUID (noref)
  * remove Known Issue-WebSSO not working (bsc#1132593)

- Add python-defusedxml (bsc#1019074)

rubygem-easy_diff, rubygem-rest-client-1_6:
- CVE-2015-3448: Fixed a plain text local password disclosure. (bsc#917802)

Non-security issue fixed:

- rubygem-easy_diff was updated to version 1.0.0.
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019074">SUSE bug 1019074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096985">SUSE bug 1096985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106515">SUSE bug 1106515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115960">SUSE bug 1115960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116846">SUSE bug 1116846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118900">SUSE bug 1118900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120657">SUSE bug 1120657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125893">SUSE bug 1125893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126088">SUSE bug 1126088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132593">SUSE bug 1132593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132666">SUSE bug 1132666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136035">SUSE bug 1136035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141121">SUSE bug 1141121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141676">SUSE bug 1141676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143215">SUSE bug 1143215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145796">SUSE bug 1145796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146578">SUSE bug 1146578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148158">SUSE bug 1148158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148383">SUSE bug 1148383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150895">SUSE bug 1150895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917802">SUSE bug 917802</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3448/">CVE-2015-3448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3448">CVE-2015-3448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10127/">CVE-2016-10127 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10127">CVE-2016-10127 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-15727/">CVE-2018-15727 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15727">CVE-2018-15727 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19039/">CVE-2018-19039 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19039">CVE-2018-19039 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-558213/">CVE-2018-558213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-558213">CVE-2018-558213 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13611/">CVE-2019-13611 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13611">CVE-2019-13611 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15043/">CVE-2019-15043 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15043">CVE-2019-15043 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2614/">CVE-2019-2614 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2614">CVE-2019-2614 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2627/">CVE-2019-2627 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2627">CVE-2019-2627 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2628/">CVE-2019-2628 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2628">CVE-2019-2628 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5477/">CVE-2019-5477 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5477">CVE-2019-5477 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597655" comment="crowbar-core-5.0+git.1569597589.1f025c557-3.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597656" comment="crowbar-core-branding-upstream-5.0+git.1569597589.1f025c557-3.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597657" comment="crowbar-ha-5.0+git.1567673535.607aada-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597658" comment="crowbar-openstack-5.0+git.1570141351.058c8bd44-4.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597659" comment="crowbar-ui-1.2.0+git.1568396400.0344a727-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597056" comment="galera-3-wsrep-provider-25.3.25-4.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597057" comment="grafana-4.6.5-4.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597058" comment="libmariadb3-3.1.2-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597059" comment="mariadb-10.2.25-4.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597060" comment="mariadb-client-10.2.25-4.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597061" comment="mariadb-errormessages-10.2.25-4.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597062" comment="mariadb-galera-10.2.25-4.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597063" comment="mariadb-tools-10.2.25-4.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597064" comment="novnc-1.0.0-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597065" comment="openstack-cinder-11.2.3~dev16-3.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597066" comment="openstack-cinder-api-11.2.3~dev16-3.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597067" comment="openstack-cinder-backup-11.2.3~dev16-3.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597068" comment="openstack-cinder-doc-11.2.3~dev16-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597069" comment="openstack-cinder-scheduler-11.2.3~dev16-3.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597070" comment="openstack-cinder-volume-11.2.3~dev16-3.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597071" comment="openstack-glance-15.0.3~dev3-3.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597072" comment="openstack-glance-api-15.0.3~dev3-3.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597073" comment="openstack-glance-doc-15.0.3~dev3-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597074" comment="openstack-glance-registry-15.0.3~dev3-3.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597075" comment="openstack-heat-9.0.8~dev13-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597076" comment="openstack-heat-api-9.0.8~dev13-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597077" comment="openstack-heat-api-cfn-9.0.8~dev13-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597078" comment="openstack-heat-api-cloudwatch-9.0.8~dev13-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597079" comment="openstack-heat-doc-9.0.8~dev13-3.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597080" comment="openstack-heat-engine-9.0.8~dev13-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597081" comment="openstack-heat-plugin-heat_docker-9.0.8~dev13-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597082" comment="openstack-heat-test-9.0.8~dev13-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597083" comment="openstack-horizon-plugin-neutron-vpnaas-ui-1.0.1~dev3-3.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597084" comment="openstack-keystone-12.0.4~dev4-5.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597085" comment="openstack-keystone-doc-12.0.4~dev4-5.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597086" comment="openstack-monasca-installer-20190923_16.32-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597087" comment="openstack-neutron-11.0.9~dev51-3.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597088" comment="openstack-neutron-dhcp-agent-11.0.9~dev51-3.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597089" comment="openstack-neutron-doc-11.0.9~dev51-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597090" comment="openstack-neutron-gbp-7.3.1~dev56-3.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597091" comment="openstack-neutron-ha-tool-11.0.9~dev51-3.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597092" comment="openstack-neutron-l3-agent-11.0.9~dev51-3.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597093" comment="openstack-neutron-lbaas-11.0.4~dev6-3.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597094" comment="openstack-neutron-lbaas-agent-11.0.4~dev6-3.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597095" comment="openstack-neutron-lbaas-doc-11.0.4~dev6-3.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597096" comment="openstack-neutron-linuxbridge-agent-11.0.9~dev51-3.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597097" comment="openstack-neutron-macvtap-agent-11.0.9~dev51-3.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597098" comment="openstack-neutron-metadata-agent-11.0.9~dev51-3.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597099" comment="openstack-neutron-metering-agent-11.0.9~dev51-3.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597100" comment="openstack-neutron-openvswitch-agent-11.0.9~dev51-3.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597101" comment="openstack-neutron-server-11.0.9~dev51-3.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597102" comment="openstack-nova-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597103" comment="openstack-nova-api-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597104" comment="openstack-nova-cells-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597105" comment="openstack-nova-compute-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597106" comment="openstack-nova-conductor-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597107" comment="openstack-nova-console-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597108" comment="openstack-nova-consoleauth-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597109" comment="openstack-nova-doc-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597110" comment="openstack-nova-novncproxy-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597111" comment="openstack-nova-placement-api-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597112" comment="openstack-nova-scheduler-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597113" comment="openstack-nova-serialproxy-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597114" comment="openstack-nova-vncproxy-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597115" comment="python-amqp-2.2.2-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597116" comment="python-cinder-11.2.3~dev16-3.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597117" comment="python-glance-15.0.3~dev3-3.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597118" comment="python-heat-9.0.8~dev13-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597119" comment="python-horizon-plugin-neutron-vpnaas-ui-1.0.1~dev3-3.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597120" comment="python-keystone-12.0.4~dev4-5.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597121" comment="python-neutron-11.0.9~dev51-3.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597122" comment="python-neutron-gbp-7.3.1~dev56-3.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597123" comment="python-neutron-lbaas-11.0.4~dev6-3.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597124" comment="python-nova-16.1.9~dev7-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597125" comment="python-ovs-2.7.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597126" comment="python-pysaml2-4.0.2-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597128" comment="python-urllib3-1.22-5.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597129" comment="release-notes-suse-openstack-cloud-8.20190911-3.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597660" comment="ruby2.1-rubygem-easy_diff-1.0.0-3.4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148802" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1010399" ref_url="https://bugzilla.suse.com/1010399" source="BUGZILLA"/>
		<reference ref_id="1010405" ref_url="https://bugzilla.suse.com/1010405" source="BUGZILLA"/>
		<reference ref_id="1010406" ref_url="https://bugzilla.suse.com/1010406" source="BUGZILLA"/>
		<reference ref_id="1010408" ref_url="https://bugzilla.suse.com/1010408" source="BUGZILLA"/>
		<reference ref_id="1010409" ref_url="https://bugzilla.suse.com/1010409" source="BUGZILLA"/>
		<reference ref_id="1010421" ref_url="https://bugzilla.suse.com/1010421" source="BUGZILLA"/>
		<reference ref_id="1010423" ref_url="https://bugzilla.suse.com/1010423" source="BUGZILLA"/>
		<reference ref_id="1010424" ref_url="https://bugzilla.suse.com/1010424" source="BUGZILLA"/>
		<reference ref_id="1010425" ref_url="https://bugzilla.suse.com/1010425" source="BUGZILLA"/>
		<reference ref_id="1010426" ref_url="https://bugzilla.suse.com/1010426" source="BUGZILLA"/>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1043008" ref_url="https://bugzilla.suse.com/1043008" source="BUGZILLA"/>
		<reference ref_id="1047281" ref_url="https://bugzilla.suse.com/1047281" source="BUGZILLA"/>
		<reference ref_id="1074235" ref_url="https://bugzilla.suse.com/1074235" source="BUGZILLA"/>
		<reference ref_id="1092611" ref_url="https://bugzilla.suse.com/1092611" source="BUGZILLA"/>
		<reference ref_id="1120374" ref_url="https://bugzilla.suse.com/1120374" source="BUGZILLA"/>
		<reference ref_id="1137990" ref_url="https://bugzilla.suse.com/1137990" source="BUGZILLA"/>
		<reference ref_id="1149429" ref_url="https://bugzilla.suse.com/1149429" source="BUGZILLA"/>
		<reference ref_id="1154738" ref_url="https://bugzilla.suse.com/1154738" source="BUGZILLA"/>
		<reference ref_id="959933" ref_url="https://bugzilla.suse.com/959933" source="BUGZILLA"/>
		<reference ref_id="983922" ref_url="https://bugzilla.suse.com/983922" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-5289" ref_url="https://www.suse.com/security/cve/CVE-2016-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-5292" ref_url="https://www.suse.com/security/cve/CVE-2016-5292/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2016-9067" ref_url="https://www.suse.com/security/cve/CVE-2016-9067/" source="CVE"/>
		<reference ref_id="CVE-2016-9068" ref_url="https://www.suse.com/security/cve/CVE-2016-9068/" source="CVE"/>
		<reference ref_id="CVE-2016-9069" ref_url="https://www.suse.com/security/cve/CVE-2016-9069/" source="CVE"/>
		<reference ref_id="CVE-2016-9071" ref_url="https://www.suse.com/security/cve/CVE-2016-9071/" source="CVE"/>
		<reference ref_id="CVE-2016-9073" ref_url="https://www.suse.com/security/cve/CVE-2016-9073/" source="CVE"/>
		<reference ref_id="CVE-2016-9075" ref_url="https://www.suse.com/security/cve/CVE-2016-9075/" source="CVE"/>
		<reference ref_id="CVE-2016-9076" ref_url="https://www.suse.com/security/cve/CVE-2016-9076/" source="CVE"/>
		<reference ref_id="CVE-2016-9077" ref_url="https://www.suse.com/security/cve/CVE-2016-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-7789" ref_url="https://www.suse.com/security/cve/CVE-2017-7789/" source="CVE"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5151" ref_url="https://www.suse.com/security/cve/CVE-2018-5151/" source="CVE"/>
		<reference ref_id="CVE-2018-5152" ref_url="https://www.suse.com/security/cve/CVE-2018-5152/" source="CVE"/>
		<reference ref_id="CVE-2018-5153" ref_url="https://www.suse.com/security/cve/CVE-2018-5153/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5160" ref_url="https://www.suse.com/security/cve/CVE-2018-5160/" source="CVE"/>
		<reference ref_id="CVE-2018-5163" ref_url="https://www.suse.com/security/cve/CVE-2018-5163/" source="CVE"/>
		<reference ref_id="CVE-2018-5164" ref_url="https://www.suse.com/security/cve/CVE-2018-5164/" source="CVE"/>
		<reference ref_id="CVE-2018-5165" ref_url="https://www.suse.com/security/cve/CVE-2018-5165/" source="CVE"/>
		<reference ref_id="CVE-2018-5166" ref_url="https://www.suse.com/security/cve/CVE-2018-5166/" source="CVE"/>
		<reference ref_id="CVE-2018-5167" ref_url="https://www.suse.com/security/cve/CVE-2018-5167/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5169" ref_url="https://www.suse.com/security/cve/CVE-2018-5169/" source="CVE"/>
		<reference ref_id="CVE-2018-5172" ref_url="https://www.suse.com/security/cve/CVE-2018-5172/" source="CVE"/>
		<reference ref_id="CVE-2018-5173" ref_url="https://www.suse.com/security/cve/CVE-2018-5173/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5175" ref_url="https://www.suse.com/security/cve/CVE-2018-5175/" source="CVE"/>
		<reference ref_id="CVE-2018-5176" ref_url="https://www.suse.com/security/cve/CVE-2018-5176/" source="CVE"/>
		<reference ref_id="CVE-2018-5177" ref_url="https://www.suse.com/security/cve/CVE-2018-5177/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5179" ref_url="https://www.suse.com/security/cve/CVE-2018-5179/" source="CVE"/>
		<reference ref_id="CVE-2018-5180" ref_url="https://www.suse.com/security/cve/CVE-2018-5180/" source="CVE"/>
		<reference ref_id="CVE-2018-5181" ref_url="https://www.suse.com/security/cve/CVE-2018-5181/" source="CVE"/>
		<reference ref_id="CVE-2018-5182" ref_url="https://www.suse.com/security/cve/CVE-2018-5182/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to 68.2.0 ESR fixes the following issues:

Mozilla Firefox was updated to version 68.2.0 ESR (bsc#1154738).

Security issues fixed:

-  CVE-2019-15903: Fixed a heap overflow in the expat library (bsc#1149429).
-  CVE-2019-11757: Fixed a use-after-free when creating index updates in IndexedDB (bsc#1154738).
-  CVE-2019-11758: Fixed a potentially exploitable crash due to 360 Total Security (bsc#1154738).
-  CVE-2019-11759: Fixed a stack buffer overflow in HKDF output (bsc#1154738).
-  CVE-2019-11760: Fixed a stack buffer overflow in WebRTC networking (bsc#1154738).
-  CVE-2019-11761: Fixed an unintended access to a privileged JSONView object (bsc#1154738).
-  CVE-2019-11762: Fixed a same-origin-property violation (bsc#1154738).
-  CVE-2019-11763: Fixed an XSS bypass (bsc#1154738).
-  CVE-2019-11764: Fixed several memory safety bugs (bsc#1154738).

Non-security issues fixed:

- Firefox 60.7 ESR changed the user interface language (bsc#1137990).
- Wrong Firefox GUI Language (bsc#1120374).
- Fixed an inadvertent crash report transmission without user opt-in (bsc#1074235).
- Firefox hangs randomly when browsing and scrolling (bsc#1043008).
- Firefox stops loading page until mouse is moved (bsc#1025108).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-31"/>
	<updated date="2019-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010399">SUSE bug 1010399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010405">SUSE bug 1010405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010406">SUSE bug 1010406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010408">SUSE bug 1010408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010409">SUSE bug 1010409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010421">SUSE bug 1010421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010423">SUSE bug 1010423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010424">SUSE bug 1010424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010425">SUSE bug 1010425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010426">SUSE bug 1010426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043008">SUSE bug 1043008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047281">SUSE bug 1047281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074235">SUSE bug 1074235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120374">SUSE bug 1120374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137990">SUSE bug 1137990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959933">SUSE bug 959933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983922">SUSE bug 983922</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2830">CVE-2016-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5289/">CVE-2016-5289 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5289">CVE-2016-5289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5292/">CVE-2016-5292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5292">CVE-2016-5292 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9067/">CVE-2016-9067 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9067">CVE-2016-9067 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9068/">CVE-2016-9068 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9068">CVE-2016-9068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9069/">CVE-2016-9069 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9069">CVE-2016-9069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9071/">CVE-2016-9071 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9071">CVE-2016-9071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9073/">CVE-2016-9073 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9073">CVE-2016-9073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9075/">CVE-2016-9075 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9075">CVE-2016-9075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9076/">CVE-2016-9076 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9076">CVE-2016-9076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9077/">CVE-2016-9077 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9077">CVE-2016-9077 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7789/">CVE-2017-7789 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7789">CVE-2017-7789 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5150">CVE-2018-5150 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5151/">CVE-2018-5151 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5151">CVE-2018-5151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5152/">CVE-2018-5152 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5152">CVE-2018-5152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5153/">CVE-2018-5153 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5153">CVE-2018-5153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5154">CVE-2018-5154 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5155">CVE-2018-5155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5157">CVE-2018-5157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5158">CVE-2018-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5159">CVE-2018-5159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5160/">CVE-2018-5160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5160">CVE-2018-5160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5163/">CVE-2018-5163 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5163">CVE-2018-5163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5164/">CVE-2018-5164 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5164">CVE-2018-5164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5165/">CVE-2018-5165 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5165">CVE-2018-5165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5166/">CVE-2018-5166 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5166">CVE-2018-5166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5167/">CVE-2018-5167 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5167">CVE-2018-5167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5168">CVE-2018-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5169/">CVE-2018-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5169">CVE-2018-5169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5172/">CVE-2018-5172 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5172">CVE-2018-5172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5173/">CVE-2018-5173 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5173">CVE-2018-5173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5174">CVE-2018-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5175/">CVE-2018-5175 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5175">CVE-2018-5175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5176/">CVE-2018-5176 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5176">CVE-2018-5176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5177/">CVE-2018-5177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5177">CVE-2018-5177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5178">CVE-2018-5178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5179/">CVE-2018-5179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5179">CVE-2018-5179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5180/">CVE-2018-5180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5180">CVE-2018-5180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5181/">CVE-2018-5181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5181">CVE-2018-5181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5182/">CVE-2018-5182 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5182">CVE-2018-5182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5183">CVE-2018-5183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11757">CVE-2019-11757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11758">CVE-2019-11758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11759">CVE-2019-11759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11760">CVE-2019-11760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11761">CVE-2019-11761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11762">CVE-2019-11762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11763">CVE-2019-11763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11764">CVE-2019-11764 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148803" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1144902" ref_url="https://bugzilla.suse.com/1144902" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006085.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2019-10218: Client code can return filenames containing path separators (bsc#1144902).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-04"/>
	<updated date="2019-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10218">CVE-2019-10218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522302" comment="libdcerpc-binding0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522303" comment="libdcerpc-binding0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522304" comment="libdcerpc0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522305" comment="libdcerpc0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522306" comment="libndr-krb5pac0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522307" comment="libndr-krb5pac0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522308" comment="libndr-nbt0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522309" comment="libndr-nbt0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522310" comment="libndr-standard0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522311" comment="libndr-standard0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522312" comment="libndr0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522313" comment="libndr0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522314" comment="libnetapi0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522315" comment="libnetapi0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522316" comment="libsamba-credentials0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522317" comment="libsamba-credentials0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522318" comment="libsamba-errors0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522319" comment="libsamba-errors0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522320" comment="libsamba-hostconfig0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522321" comment="libsamba-hostconfig0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522322" comment="libsamba-passdb0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522323" comment="libsamba-passdb0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522324" comment="libsamba-util0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522325" comment="libsamba-util0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522326" comment="libsamdb0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522327" comment="libsamdb0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522328" comment="libsmbclient0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522329" comment="libsmbclient0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522330" comment="libsmbconf0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522331" comment="libsmbconf0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522332" comment="libsmbldap0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522333" comment="libsmbldap0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522334" comment="libtevent-util0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522335" comment="libtevent-util0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522336" comment="libwbclient0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522337" comment="libwbclient0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522338" comment="samba-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522339" comment="samba-client-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522340" comment="samba-client-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522341" comment="samba-doc-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522342" comment="samba-libs-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522343" comment="samba-libs-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522344" comment="samba-winbind-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522345" comment="samba-winbind-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148804" version="1" class="patch">
	<metadata>
		<title>Security update for gdb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1115034" ref_url="https://bugzilla.suse.com/1115034" source="BUGZILLA"/>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="1145692" ref_url="https://bugzilla.suse.com/1145692" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006098.html" source="SUSE-SU"/>
		<description>
This update for gdb fixes the following issues:

Update to gdb 8.3.1: (jsc#ECO-368)

Security issues fixed:

- CVE-2019-1010180: Fixed a potential buffer overflow when loading ELF sections larger than the file. (bsc#1142772)

Upgrade libipt from v2.0 to v2.0.1.

- Enable librpm for version &gt; librpm.so.3 [bsc#1145692]:
  * Allow any librpm.so.x
  * Add %build test to check for 'zypper install &lt;rpm-packagename&gt;'
    message

- Copy gdbinit from fedora master @ 25caf28.  Add
  gdbinit.without-python, and use it for --without=python.

Rebase to 8.3 release (as in fedora 30 @ 1e222a3).

* DWARF index cache: GDB can now automatically save indices of DWARF
  symbols on disk to speed up further loading of the same binaries.
* Ada task switching is now supported on aarch64-elf targets when
  debugging a program using the Ravenscar Profile.
* Terminal styling is now available for the CLI and the TUI.
* Removed support for old demangling styles arm, edg, gnu, hp and
  lucid.
* Support for new native configuration RISC-V GNU/Linux (riscv*-*-linux*).

- Implemented access to more POWER8 registers.  [fate#326120, fate#325178]
- Also handle most new s390 arch13 instructions.  [fate#327369, jsc#ECO-368]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-07"/>
	<updated date="2019-11-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1115034">SUSE bug 1115034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145692">SUSE bug 1145692</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010180">CVE-2019-1010180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522349" comment="gdb-8.3.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148805" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-haml (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1155089" ref_url="https://bugzilla.suse.com/1155089" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1002201" ref_url="https://www.suse.com/security/cve/CVE-2017-1002201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006101.html" source="SUSE-SU"/>
		<description>
This update for rubygem-haml fixes the following issue:

- CVE-2017-1002201: Fixed an insufficient character escape that could have led to arbitrary code execution (bsc#1155089).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-08"/>
	<updated date="2019-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155089">SUSE bug 1155089</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1002201/">CVE-2017-1002201 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1002201">CVE-2017-1002201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597661" comment="ruby2.1-rubygem-haml-4.0.6-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148806" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1154862" ref_url="https://bugzilla.suse.com/1154862" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2936-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192936-1.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issue:

- CVE-2019-17498: Fixed an integer overflow in a bounds check that might have led to the disclosure of sensitive information or a denial of service (bsc#1154862).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-08"/>
	<updated date="2019-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">CVE-2019-17498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522350" comment="libssh2-1-1.4.3-20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522351" comment="libssh2-1-32bit-1.4.3-20.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148807" version="1" class="patch">
	<metadata>
		<title>Security update for libseccomp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1128828" ref_url="https://bugzilla.suse.com/1128828" source="BUGZILLA"/>
		<reference ref_id="1142614" ref_url="https://bugzilla.suse.com/1142614" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9893" ref_url="https://www.suse.com/security/cve/CVE-2019-9893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006108.html" source="SUSE-SU"/>
		<description>
This update for libseccomp fixes the following issues:

Update to new upstream release 2.4.1:

* Fix a BPF generation bug where the optimizer mistakenly
  identified duplicate BPF code blocks.

Updated to 2.4.0 (bsc#1128828 CVE-2019-9893):

* Update the syscall table for Linux v5.0-rc5
* Added support for the SCMP_ACT_KILL_PROCESS action
* Added support for the SCMP_ACT_LOG action and SCMP_FLTATR_CTL_LOG attribute
* Added explicit 32-bit (SCMP_AX_32(...)) and 64-bit (SCMP_AX_64(...)) argument comparison macros to help protect against unexpected sign extension
* Added support for the parisc and parisc64 architectures
* Added the ability to query and set the libseccomp API level via seccomp_api_get(3) and seccomp_api_set(3)
* Return -EDOM on an endian mismatch when adding an architecture to a filter
* Renumber the pseudo syscall number for subpage_prot() so it no longer conflicts with spu_run()
* Fix PFC generation when a syscall is prioritized, but no rule exists
* Numerous fixes to the seccomp-bpf filter generation code
* Switch our internal hashing function to jhash/Lookup3 to MurmurHash3
* Numerous tests added to the included test suite, coverage now at ~92%
* Update our Travis CI configuration to use Ubuntu 16.04
* Numerous documentation fixes and updates

Update to release 2.3.3:

* Updated the syscall table for Linux v4.15-rc7

Update to release 2.3.2:

* Achieved full compliance with the CII Best Practices program
* Added Travis CI builds to the GitHub repository
* Added code coverage reporting with the '--enable-code-coverage' configure
  flag and added Coveralls to the GitHub repository
* Updated the syscall tables to match Linux v4.10-rc6+
* Support for building with Python v3.x
* Allow rules with the -1 syscall if the SCMP\_FLTATR\_API\_TSKIP attribute is
  set to true
* Several small documentation fixes

- ignore make check error for ppc64/ppc64le, bypass bsc#1142614
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128828">SUSE bug 1128828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142614">SUSE bug 1142614</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9893/">CVE-2019-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9893">CVE-2019-9893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522352" comment="libseccomp2-2.4.1-11.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522353" comment="libseccomp2-32bit-2.4.1-11.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148808" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1084878" ref_url="https://bugzilla.suse.com/1084878" source="BUGZILLA"/>
		<reference ref_id="1117665" ref_url="https://bugzilla.suse.com/1117665" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1133140" ref_url="https://bugzilla.suse.com/1133140" source="BUGZILLA"/>
		<reference ref_id="1135966" ref_url="https://bugzilla.suse.com/1135966" source="BUGZILLA"/>
		<reference ref_id="1135967" ref_url="https://bugzilla.suse.com/1135967" source="BUGZILLA"/>
		<reference ref_id="1136261" ref_url="https://bugzilla.suse.com/1136261" source="BUGZILLA"/>
		<reference ref_id="1137865" ref_url="https://bugzilla.suse.com/1137865" source="BUGZILLA"/>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1140671" ref_url="https://bugzilla.suse.com/1140671" source="BUGZILLA"/>
		<reference ref_id="1141013" ref_url="https://bugzilla.suse.com/1141013" source="BUGZILLA"/>
		<reference ref_id="1141054" ref_url="https://bugzilla.suse.com/1141054" source="BUGZILLA"/>
		<reference ref_id="1142458" ref_url="https://bugzilla.suse.com/1142458" source="BUGZILLA"/>
		<reference ref_id="1143187" ref_url="https://bugzilla.suse.com/1143187" source="BUGZILLA"/>
		<reference ref_id="1144123" ref_url="https://bugzilla.suse.com/1144123" source="BUGZILLA"/>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1145477" ref_url="https://bugzilla.suse.com/1145477" source="BUGZILLA"/>
		<reference ref_id="1146042" ref_url="https://bugzilla.suse.com/1146042" source="BUGZILLA"/>
		<reference ref_id="1146163" ref_url="https://bugzilla.suse.com/1146163" source="BUGZILLA"/>
		<reference ref_id="1146285" ref_url="https://bugzilla.suse.com/1146285" source="BUGZILLA"/>
		<reference ref_id="1146361" ref_url="https://bugzilla.suse.com/1146361" source="BUGZILLA"/>
		<reference ref_id="1146378" ref_url="https://bugzilla.suse.com/1146378" source="BUGZILLA"/>
		<reference ref_id="1146391" ref_url="https://bugzilla.suse.com/1146391" source="BUGZILLA"/>
		<reference ref_id="1146413" ref_url="https://bugzilla.suse.com/1146413" source="BUGZILLA"/>
		<reference ref_id="1146425" ref_url="https://bugzilla.suse.com/1146425" source="BUGZILLA"/>
		<reference ref_id="1146512" ref_url="https://bugzilla.suse.com/1146512" source="BUGZILLA"/>
		<reference ref_id="1146514" ref_url="https://bugzilla.suse.com/1146514" source="BUGZILLA"/>
		<reference ref_id="1146516" ref_url="https://bugzilla.suse.com/1146516" source="BUGZILLA"/>
		<reference ref_id="1146519" ref_url="https://bugzilla.suse.com/1146519" source="BUGZILLA"/>
		<reference ref_id="1146524" ref_url="https://bugzilla.suse.com/1146524" source="BUGZILLA"/>
		<reference ref_id="1146526" ref_url="https://bugzilla.suse.com/1146526" source="BUGZILLA"/>
		<reference ref_id="1146529" ref_url="https://bugzilla.suse.com/1146529" source="BUGZILLA"/>
		<reference ref_id="1146540" ref_url="https://bugzilla.suse.com/1146540" source="BUGZILLA"/>
		<reference ref_id="1146543" ref_url="https://bugzilla.suse.com/1146543" source="BUGZILLA"/>
		<reference ref_id="1146547" ref_url="https://bugzilla.suse.com/1146547" source="BUGZILLA"/>
		<reference ref_id="1146550" ref_url="https://bugzilla.suse.com/1146550" source="BUGZILLA"/>
		<reference ref_id="1146584" ref_url="https://bugzilla.suse.com/1146584" source="BUGZILLA"/>
		<reference ref_id="1146589" ref_url="https://bugzilla.suse.com/1146589" source="BUGZILLA"/>
		<reference ref_id="1147022" ref_url="https://bugzilla.suse.com/1147022" source="BUGZILLA"/>
		<reference ref_id="1147122" ref_url="https://bugzilla.suse.com/1147122" source="BUGZILLA"/>
		<reference ref_id="1148394" ref_url="https://bugzilla.suse.com/1148394" source="BUGZILLA"/>
		<reference ref_id="1148938" ref_url="https://bugzilla.suse.com/1148938" source="BUGZILLA"/>
		<reference ref_id="1149083" ref_url="https://bugzilla.suse.com/1149083" source="BUGZILLA"/>
		<reference ref_id="1149376" ref_url="https://bugzilla.suse.com/1149376" source="BUGZILLA"/>
		<reference ref_id="1149522" ref_url="https://bugzilla.suse.com/1149522" source="BUGZILLA"/>
		<reference ref_id="1149527" ref_url="https://bugzilla.suse.com/1149527" source="BUGZILLA"/>
		<reference ref_id="1149555" ref_url="https://bugzilla.suse.com/1149555" source="BUGZILLA"/>
		<reference ref_id="1149612" ref_url="https://bugzilla.suse.com/1149612" source="BUGZILLA"/>
		<reference ref_id="1150025" ref_url="https://bugzilla.suse.com/1150025" source="BUGZILLA"/>
		<reference ref_id="1150112" ref_url="https://bugzilla.suse.com/1150112" source="BUGZILLA"/>
		<reference ref_id="1150452" ref_url="https://bugzilla.suse.com/1150452" source="BUGZILLA"/>
		<reference ref_id="1150457" ref_url="https://bugzilla.suse.com/1150457" source="BUGZILLA"/>
		<reference ref_id="1150465" ref_url="https://bugzilla.suse.com/1150465" source="BUGZILLA"/>
		<reference ref_id="1150727" ref_url="https://bugzilla.suse.com/1150727" source="BUGZILLA"/>
		<reference ref_id="1150942" ref_url="https://bugzilla.suse.com/1150942" source="BUGZILLA"/>
		<reference ref_id="1151347" ref_url="https://bugzilla.suse.com/1151347" source="BUGZILLA"/>
		<reference ref_id="1151350" ref_url="https://bugzilla.suse.com/1151350" source="BUGZILLA"/>
		<reference ref_id="1152685" ref_url="https://bugzilla.suse.com/1152685" source="BUGZILLA"/>
		<reference ref_id="1152782" ref_url="https://bugzilla.suse.com/1152782" source="BUGZILLA"/>
		<reference ref_id="1152788" ref_url="https://bugzilla.suse.com/1152788" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153263" ref_url="https://bugzilla.suse.com/1153263" source="BUGZILLA"/>
		<reference ref_id="1154103" ref_url="https://bugzilla.suse.com/1154103" source="BUGZILLA"/>
		<reference ref_id="1154372" ref_url="https://bugzilla.suse.com/1154372" source="BUGZILLA"/>
		<reference ref_id="1155131" ref_url="https://bugzilla.suse.com/1155131" source="BUGZILLA"/>
		<reference ref_id="1155671" ref_url="https://bugzilla.suse.com/1155671" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10906" ref_url="https://www.suse.com/security/cve/CVE-2016-10906/" source="CVE"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2017-18509" ref_url="https://www.suse.com/security/cve/CVE-2017-18509/" source="CVE"/>
		<reference ref_id="CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551/" source="CVE"/>
		<reference ref_id="CVE-2017-18595" ref_url="https://www.suse.com/security/cve/CVE-2017-18595/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-20976" ref_url="https://www.suse.com/security/cve/CVE-2018-20976/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15211" ref_url="https://www.suse.com/security/cve/CVE-2019-15211/" source="CVE"/>
		<reference ref_id="CVE-2019-15212" ref_url="https://www.suse.com/security/cve/CVE-2019-15212/" source="CVE"/>
		<reference ref_id="CVE-2019-15214" ref_url="https://www.suse.com/security/cve/CVE-2019-15214/" source="CVE"/>
		<reference ref_id="CVE-2019-15215" ref_url="https://www.suse.com/security/cve/CVE-2019-15215/" source="CVE"/>
		<reference ref_id="CVE-2019-15216" ref_url="https://www.suse.com/security/cve/CVE-2019-15216/" source="CVE"/>
		<reference ref_id="CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217/" source="CVE"/>
		<reference ref_id="CVE-2019-15218" ref_url="https://www.suse.com/security/cve/CVE-2019-15218/" source="CVE"/>
		<reference ref_id="CVE-2019-15219" ref_url="https://www.suse.com/security/cve/CVE-2019-15219/" source="CVE"/>
		<reference ref_id="CVE-2019-15220" ref_url="https://www.suse.com/security/cve/CVE-2019-15220/" source="CVE"/>
		<reference ref_id="CVE-2019-15221" ref_url="https://www.suse.com/security/cve/CVE-2019-15221/" source="CVE"/>
		<reference ref_id="CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15505" ref_url="https://www.suse.com/security/cve/CVE-2019-15505/" source="CVE"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2019-15807" ref_url="https://www.suse.com/security/cve/CVE-2019-15807/" source="CVE"/>
		<reference ref_id="CVE-2019-15902" ref_url="https://www.suse.com/security/cve/CVE-2019-15902/" source="CVE"/>
		<reference ref_id="CVE-2019-15924" ref_url="https://www.suse.com/security/cve/CVE-2019-15924/" source="CVE"/>
		<reference ref_id="CVE-2019-15926" ref_url="https://www.suse.com/security/cve/CVE-2019-15926/" source="CVE"/>
		<reference ref_id="CVE-2019-15927" ref_url="https://www.suse.com/security/cve/CVE-2019-15927/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-16413" ref_url="https://www.suse.com/security/cve/CVE-2019-16413/" source="CVE"/>
		<reference ref_id="CVE-2019-16995" ref_url="https://www.suse.com/security/cve/CVE-2019-16995/" source="CVE"/>
		<reference ref_id="CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055/" source="CVE"/>
		<reference ref_id="CVE-2019-17056" ref_url="https://www.suse.com/security/cve/CVE-2019-17056/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-9456" ref_url="https://www.suse.com/security/cve/CVE-2019-9456/" source="CVE"/>
		<reference ref_id="CVE-2019-9506" ref_url="https://www.suse.com/security/cve/CVE-2019-9506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12-SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
  condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
  Exception during Page Size Change, causing the CPU core to be non-functional.

  The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in
  executable pages by splitting / merging huge pages into small pages as
  needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7023735

- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port
  failed to add a port, which may have caused denial of service (bsc#1152685).

- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
  Transactional Memory support could be used to facilitate sidechannel
  information leaks out of microarchitectural buffers, similar to the
  previously described 'Microarchitectural Data Sampling' attack.

  The Linux kernel was supplemented with the option to disable TSX operation
  altogether (requiring CPU Microcode updates on older systems) and better
  flushing of microarchitectural buffers (VERW).

  The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251

- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the
  alloc_workqueue return value, leading to a NULL pointer dereference.
  (bsc#1150457).

- CVE-2019-10220: Added sanity checks on the pathnames passed to the user
  space. (bsc#1144903).

- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).

- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,
  leading to a Buffer Overflow (bsc#1153158).

- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell
  libertas driver (bsc#1150465).

- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return
  value, leading to a NULL pointer dereference. (bsc#1150452).

- CVE-2019-17055: The AF_ISDN network module in the Linux kernel did not
  enforce CAP_NET_RAW, which meant that unprivileged users could create a raw
  socket (bnc#1152782).

- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which
  meant that unprivileged users could create a raw socket (bsc#1152788).

- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly,
  which caused an i_size_read() infinite loop and denial of service on SMP
  systems (bnc#1151347).

- CVE-2019-15902: A backporting issue was discovered that re-introduced the
  Spectre vulnerability it had aimed to eliminate. This occurred because the
  backport process depends on cherry picking specific commits, and because two
  (correctly ordered) code lines were swapped (bnc#1149376).

- CVE-2019-15291: Fixed a NULL pointer dereference issue that could be caused
  by a malicious USB device (bnc#1146519).

- CVE-2019-15807: Fixed a memory leak in the SCSI module that could be abused
  to cause denial of service (bnc#1148938).

- CVE-2019-13272: Fixed a mishandled the recording of the credentials of a
  process that wants to create a ptrace relationship, which allowed local users
  to obtain root access by leveraging certain scenarios with a parent-child
  process relationship, where a parent drops privileges and calls execve
  (potentially allowing control by an attacker). (bnc#1140671).

- CVE-2019-14821: An out-of-bounds access issue was fixed in the kernel's KVM
  hypervisor. An unprivileged host user or process with access to '/dev/kvm'
  device could use this flaw to crash the host kernel, resulting in a denial of
  service or potentially escalating privileges on the system (bnc#1151350).

- CVE-2019-15505: An out-of-bounds issue had been fixed that could be caused by
  crafted USB device traffic (bnc#1147122).

- CVE-2017-18595: A double free in allocate_trace_buffer was fixed
  (bnc#1149555).

- CVE-2019-14835: A buffer overflow flaw was found in the kernel's vhost
  functionality that translates virtqueue buffers to IOVs. A privileged guest
  user able to pass descriptors with invalid length to the host could use this
  flaw to increase their privileges on the host (bnc#1150112).

- CVE-2019-15216: A NULL pointer dereference was fixed that could be malicious
  USB device (bnc#1146361).

- CVE-2019-15924: A a NULL pointer dereference has been fixed in the
  drivers/net/ethernet/intel/fm10k module (bnc#1149612).

- CVE-2019-9456: An out-of-bounds write in the USB monitor driver has been
  fixed. This issue could lead to local escalation of privilege with System
  execution privileges needed. (bnc#1150025).

- CVE-2019-15926: An out-of-bounds access was fixed in the
  drivers/net/wireless/ath/ath6kl module. (bnc#1149527).

- CVE-2019-15927: An out-of-bounds access was fixed in the sound/usb/mixer
  module (bnc#1149522).

- CVE-2019-15666: There was an out-of-bounds array access in the net/xfrm
  module that could cause denial of service (bnc#1148394).

- CVE-2017-18379: An out-of-boundary access was fixed in the
  drivers/nvme/target module (bnc#1143187).

- CVE-2019-15219: A NULL pointer dereference was fixed that could be abused by
  a malicious USB device (bnc#1146519 1146524).

- CVE-2019-15220: A use-after-free issue was fixed that could be caused by a
  malicious USB device (bnc#1146519 1146526).

- CVE-2019-15221: A NULL pointer dereference was fixed that could be caused by
  a malicious USB device (bnc#1146519 1146529).

- CVE-2019-14814: A heap-based buffer overflow was fixed in the marvell wifi
  chip driver. That issue allowed local users to cause a denial of service
  (system crash) or possibly execute arbitrary code (bnc#1146512).

- CVE-2019-14815: A missing length check while parsing WMM IEs was fixed
  (bsc#1146512, bsc#1146514, bsc#1146516).

- CVE-2019-14816: A heap-based buffer overflow in the marvell wifi chip driver
  was fixed. Local users would have abused this issue to cause a denial of
  service (system crash) or possibly execute arbitrary code (bnc#1146516).

- CVE-2017-18509: An issue in net/ipv6 as fixed. By setting a specific socket
  option, an attacker could control a pointer in kernel land and cause an
  inet_csk_listen_stop general protection fault, or potentially execute
  arbitrary code under certain circumstances. The issue can be triggered as
  root (e.g., inside a default LXC container or with the CAP_NET_ADMIN
  capability) or after namespace unsharing. (bnc#1145477)

- CVE-2019-9506: The Bluetooth BR/EDR specification used to permit sufficiently
  low encryption key length and did not prevent an attacker from influencing
  the key length negotiation. This allowed practical brute-force attacks (aka
  'KNOB') that could decrypt traffic and inject arbitrary ciphertext without
  the victim noticing (bnc#1137865).

- CVE-2019-15098: A NULL pointer dereference in drivers/net/wireless/ath was
  fixed (bnc#1146378).

- CVE-2019-15290: A NULL pointer dereference in ath6kl_usb_alloc_urb_from_pipe
  was fixed (bsc#1146378).

- CVE-2019-15239: A incorrect patch to net/ipv4 was fixed. By adding to a write
  queue between disconnection and re-connection, a local attacker could trigger
  multiple use-after-free conditions. This could result in kernel crashes or
  potentially in privilege escalation. (bnc#1146589)

- CVE-2019-15212: A double-free issue was fixed in drivers/usb driver
  (bnc#1146391).

- CVE-2016-10906: A use-after-free issue was fixed in drivers/net/ethernet/arc
  (bnc#1146584).

- CVE-2019-15211: A use-after-free issue caused by a malicious USB device was
  fixed in the drivers/media/v4l2-core driver (bnc#1146519).

- CVE-2019-15217: A a NULL pointer dereference issue caused by a malicious USB
  device was fixed in the drivers/media/usb/zr364xx driver (bnc#1146519).

- CVE-2019-15214: An a use-after-free issue in the sound subsystem was fixed
  (bnc#1146519).

- CVE-2019-15218: A NULL pointer dereference caused by a malicious USB device
  was fixed in the drivers/media/usb/siano driver (bnc#1146413).

- CVE-2019-15215: A use-after-free issue caused by a malicious USB device was
  fixed in the drivers/media/usb/cpia2 driver (bnc#1146425).

- CVE-2018-20976: A use-after-free issue was fixed in the fs/xfs driver
  (bnc#1146285).

- CVE-2017-18551: An out-of-bounds write was fixed in the drivers/i2c driver
  (bnc#1146163).

- CVE-2019-0154: An unprotected read access to i915 registers has been fixed
  that could have been abused to facilitate a local denial-of-service attack.
  (bsc#1135966)

- CVE-2019-0155: A privilege escalation vulnerability has been fixed in the
  i915 module that allowed batch buffers from user mode to gain super user
  privileges. (bsc#1135967)

The following non-security bugs were fixed:

- array_index_nospec: Sanitize speculative array (bsc#1155671)
- bonding/802.3ad: fix link_failure_count tracking (bsc#1141013).
- bonding/802.3ad: fix slave link initialization transition states (bsc#1141013).
- bonding: correctly update link status during mii-commit phase (bsc#1141013).
- bonding: fix active-backup transition (bsc#1141013).
- bonding: make speed, duplex setting consistent with link state (bsc#1141013).
- bonding: ratelimit failed speed/duplex update warning (bsc#1141013).
- bonding: require speed/duplex only for 802.3ad, alb and tlb (bsc#1141013).
- bonding: set default miimon value for non-arp modes if not set (bsc#1141013).
- bonding: speed/duplex update at NETDEV_UP event (bsc#1141013).
- cifs: fix panic in smb2_reconnect (bsc#1142458).
- cifs: handle netapp error codes (bsc#1136261).
- cpu/speculation: Uninline and export CPU mitigations helpers (bnc#1117665).
- ib/core, ipoib: Do not overreact to SM LID change event (bsc#1154103)
- ib/core: Add mitigation for Spectre V1 (bsc#1155671)
- ixgbe: sync the first fragment unconditionally (bsc#1133140).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: lapic: cap __delay at lapic_timer_advance_ns (bsc#1149083).
- kvm: mmu: drop vcpu param in gpte_access (bsc#1117665).
- kvm: mmu: introduce kvm_mmu_gfn_{allow,disallow}_lpage (bsc#1117665).
- kvm: mmu: rename has_wrprotected_page to mmu_gfn_lpage_is_disallowed (bsc#1117665).
- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- kvm: x86: MMU: Consolidate quickly_check_mmio_pf() and is_mmio_page_fault() (bsc#1117665).
- kvm: x86: MMU: Encapsulate the type of rmap-chain head in a new struct (bsc#1117665).
- kvm: x86: MMU: Move handle_mmio_page_fault() call to kvm_mmu_page_fault() (bsc#1117665).
- kvm: x86: MMU: Move initialization of parent_ptes out from kvm_mmu_alloc_page() (bsc#1117665).
- kvm: x86: MMU: Move parent_pte handling from kvm_mmu_get_page() to link_shadow_page() (bsc#1117665).
- kvm: x86: MMU: Remove unused parameter parent_pte from kvm_mmu_get_page() (bsc#1117665).
- kvm: x86: MMU: always set accessed bit in shadow PTEs (bsc#1117665).
- kvm: x86: Reduce the overhead when lapic_timer_advance is disabled (bsc#1149083).
- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- kvm: x86: extend usage of RET_MMIO_PF_* constants (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT (bnc#1117665).
- kvm: x86: move nsec_to_cycles from x86.c to x86.h (bsc#1149083).
- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- kvm: x86: simplify ept_misconfig (bsc#1117665).
- media: smsusb: better handle optional alignment (bsc#1146413).
- pci: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).
- powerpc/64s: support nospectre_v2 cmdline option (bsc#1131107).
- powerpc/pseries: correctly track irq state in default idle (bsc#1150727 bsc#1150942 ltc#178925 ltc#181484).
- powerpc/rtas: use device model APIs and serialization during LPM (bsc#1144123 ltc#178840).
- powerpc/security: Show powerpc_security_features in debugfs (bsc#1131107).
- scsi: scsi_transport_fc: Drop double list_del() (bsc#1084878) During the backport of 260f4aeddb48 ('scsi: scsi_transport_fc: return -EBUSY for deleted vport') an additional list_del() was introduced. The list entry will be freed in fc_vport_terminate(). Do not free it premature in fc_remove_host().
- swiotlb: Add support for DMA_ATTR_SKIP_CPU_SYNC in Xen-swiotlb unmap path (bsc#1133140).
- vmci: Release resource if the work is already queued (bsc#1051510).
- x86/cpu: Add Atom Tremont (Jacobsville) (bsc#1117665).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084878">SUSE bug 1084878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117665">SUSE bug 1117665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133140">SUSE bug 1133140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135966">SUSE bug 1135966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135967">SUSE bug 1135967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136261">SUSE bug 1136261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137865">SUSE bug 1137865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140671">SUSE bug 1140671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141013">SUSE bug 1141013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141054">SUSE bug 1141054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142458">SUSE bug 1142458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143187">SUSE bug 1143187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144123">SUSE bug 1144123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145477">SUSE bug 1145477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146042">SUSE bug 1146042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146163">SUSE bug 1146163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146285">SUSE bug 1146285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146361">SUSE bug 1146361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146378">SUSE bug 1146378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146391">SUSE bug 1146391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146413">SUSE bug 1146413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146425">SUSE bug 1146425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146512">SUSE bug 1146512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146514">SUSE bug 1146514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146516">SUSE bug 1146516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146524">SUSE bug 1146524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146526">SUSE bug 1146526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146529">SUSE bug 1146529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146540">SUSE bug 1146540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146543">SUSE bug 1146543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146547">SUSE bug 1146547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146550">SUSE bug 1146550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146584">SUSE bug 1146584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146589">SUSE bug 1146589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147022">SUSE bug 1147022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147122">SUSE bug 1147122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148394">SUSE bug 1148394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148938">SUSE bug 1148938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149083">SUSE bug 1149083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149376">SUSE bug 1149376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149522">SUSE bug 1149522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149527">SUSE bug 1149527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149555">SUSE bug 1149555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149612">SUSE bug 1149612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150025">SUSE bug 1150025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150112">SUSE bug 1150112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150452">SUSE bug 1150452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150457">SUSE bug 1150457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150465">SUSE bug 1150465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150727">SUSE bug 1150727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150942">SUSE bug 1150942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151347">SUSE bug 1151347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151350">SUSE bug 1151350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152685">SUSE bug 1152685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152782">SUSE bug 1152782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152788">SUSE bug 1152788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153263">SUSE bug 1153263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154103">SUSE bug 1154103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154372">SUSE bug 1154372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155131">SUSE bug 1155131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155671">SUSE bug 1155671</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10906/">CVE-2016-10906 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10906">CVE-2016-10906 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18509/">CVE-2017-18509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18509">CVE-2017-18509 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18551">CVE-2017-18551 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18595/">CVE-2017-18595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18595">CVE-2017-18595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20976/">CVE-2018-20976 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20976">CVE-2018-20976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0154">CVE-2019-0154 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0155">CVE-2019-0155 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13272">CVE-2019-13272 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14814">CVE-2019-14814 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14815">CVE-2019-14815 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14816">CVE-2019-14816 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14821">CVE-2019-14821 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15098">CVE-2019-15098 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15211/">CVE-2019-15211 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15211">CVE-2019-15211 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15212/">CVE-2019-15212 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15212">CVE-2019-15212 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15214/">CVE-2019-15214 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15214">CVE-2019-15214 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15215/">CVE-2019-15215 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15215">CVE-2019-15215 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15216/">CVE-2019-15216 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15216">CVE-2019-15216 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15217">CVE-2019-15217 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15218/">CVE-2019-15218 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15218">CVE-2019-15218 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15219/">CVE-2019-15219 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15219">CVE-2019-15219 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15220/">CVE-2019-15220 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15220">CVE-2019-15220 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15221/">CVE-2019-15221 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15221">CVE-2019-15221 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15239">CVE-2019-15239 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15290">CVE-2019-15290 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15291">CVE-2019-15291 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15505/">CVE-2019-15505 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15505">CVE-2019-15505 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15666">CVE-2019-15666 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15807/">CVE-2019-15807 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15807">CVE-2019-15807 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15902/">CVE-2019-15902 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15902">CVE-2019-15902 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15924/">CVE-2019-15924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15924">CVE-2019-15924 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15926/">CVE-2019-15926 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15926">CVE-2019-15926 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15927/">CVE-2019-15927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15927">CVE-2019-15927 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16232">CVE-2019-16232 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16233">CVE-2019-16233 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16234">CVE-2019-16234 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16413/">CVE-2019-16413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-16413">CVE-2019-16413 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16995/">CVE-2019-16995 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16995">CVE-2019-16995 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17055">CVE-2019-17055 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17056/">CVE-2019-17056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-17056">CVE-2019-17056 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17666">CVE-2019-17666 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9456/">CVE-2019-9456 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9456">CVE-2019-9456 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9506/">CVE-2019-9506 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9506">CVE-2019-9506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555678" comment="kernel-default-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555679" comment="kernel-default-base-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555680" comment="kernel-default-devel-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556142" comment="kernel-default-kgraft-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538349" comment="kernel-devel-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538350" comment="kernel-macros-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538351" comment="kernel-source-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555681" comment="kernel-syms-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556144" comment="kgraft-patch-4_4_180-94_107-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148809" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2959-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to 20191112 security release (bsc#1155988)
  - Processor             Identifier     Version       Products
  - Model        Stepping F-MO-S/PI      Old-&gt;New
  - ---- new platforms ----------------------------------------
  - CML-U62      A0       6-a6-0/80           000000c6 Core Gen10 Mobile
  - CNL-U        D0       6-66-3/80           0000002a Core Gen8 Mobile
  - SKX-SP       B1       6-55-3/97           01000150 Xeon Scalable
  - ICL U/Y      D1       6-7e-5/80           00000046 Core Gen10 Mobile
  - ---- updated platforms ------------------------------------
  - SKL U/Y      D0       6-4e-3/c0 000000cc-&gt;000000d4 Core Gen6 Mobile
  - SKL H/S/E3   R0/N0    6-5e-3/36 000000cc-&gt;000000d4 Core Gen6
  - AML-Y22      H0       6-8e-9/10 000000b4-&gt;000000c6 Core Gen8 Mobile
  - KBL-U/Y      H0       6-8e-9/c0 000000b4-&gt;000000c6 Core Gen7 Mobile
  - CFL-U43e     D0       6-8e-a/c0 000000b4-&gt;000000c6 Core Gen8 Mobile
  - WHL-U        W0       6-8e-b/d0 000000b8-&gt;000000c6 Core Gen8 Mobile
  - AML-Y        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - CML-U42      V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - WHL-U        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen8 Mobile
  - KBL-G/X      H0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7/Gen8
  - KBL-H/S/E3   B0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7; Xeon E3 v6
  - CFL-H/S/E3   U0       6-9e-a/22 000000b4-&gt;000000c6 Core Gen8 Desktop, Mobile, Xeon E
  - CFL-S        B0       6-9e-b/02 000000b4-&gt;000000c6 Core Gen8
  - CFL-H        R0       6-9e-d/22 000000b8-&gt;000000c6 Core Gen9 Mobile
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)

- requires coreutils for the %post script (bsc#1154043)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11139">CVE-2019-11139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522370" comment="ucode-intel-20191112-13.53.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148810" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1156402" ref_url="https://bugzilla.suse.com/1156402" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006137.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2019-2201: Several integer overflow issues and subsequent segfaults occurred in libjpeg-turbo,
  when attempting to compress or decompress gigapixel images. [bsc#1156402]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-14"/>
	<updated date="2019-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156402">SUSE bug 1156402</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2201">CVE-2019-2201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522374" comment="libjpeg-turbo-1.5.3-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522375" comment="libjpeg62-62.2.0-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522376" comment="libjpeg62-32bit-62.2.0-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522377" comment="libjpeg62-turbo-1.5.3-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522378" comment="libjpeg8-8.1.2-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522379" comment="libjpeg8-32bit-8.1.2-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522380" comment="libturbojpeg0-8.1.2-31.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148811" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1156275" ref_url="https://bugzilla.suse.com/1156275" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14869" ref_url="https://www.suse.com/security/cve/CVE-2019-14869/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006145.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issue:
	  
- CVE-2019-14869: Fixed a possible  dSAFER escape which could have allowed 
  an attacker to gain high privileges by a specially crafted Postscript 
  code (bsc#1156275).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156275">SUSE bug 1156275</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14869/">CVE-2019-14869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14869">CVE-2019-14869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522381" comment="ghostscript-9.27-23.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522382" comment="ghostscript-x11-9.27-23.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148812" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006148.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to 20191112 official security release (bsc#1155988)
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11139">CVE-2019-11139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522383" comment="ucode-intel-20191112a-13.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148813" version="1" class="patch">
	<metadata>
		<title>Security update for python-ecdsa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1153165" ref_url="https://bugzilla.suse.com/1153165" source="BUGZILLA"/>
		<reference ref_id="1154217" ref_url="https://bugzilla.suse.com/1154217" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14853" ref_url="https://www.suse.com/security/cve/CVE-2019-14853/" source="CVE"/>
		<reference ref_id="CVE-2019-14859" ref_url="https://www.suse.com/security/cve/CVE-2019-14859/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006158.html" source="SUSE-SU"/>
		<description>
This update for python-ecdsa to version 0.13.3 fixes the following issues:

Security issues fixed:

- CVE-2019-14853: Fixed unexpected exceptions during signature decoding (bsc#1153165).
- CVE-2019-14859: Fixed a signature malleability caused by insufficient checks of DER encoding (bsc#1154217).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-21"/>
	<updated date="2019-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153165">SUSE bug 1153165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154217">SUSE bug 1154217</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14853/">CVE-2019-14853 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14853">CVE-2019-14853 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14859/">CVE-2019-14859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14859">CVE-2019-14859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525259" comment="python-ecdsa-0.13.3-5.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148814" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1155787" ref_url="https://bugzilla.suse.com/1155787" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006167.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2017-2518: Fixed a use-after-free vulnerability which could have 
  led to buffer overflow via a crafted SQL statement (bsc#1155787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155787">SUSE bug 1155787</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2518">CVE-2017-2518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522390" comment="libsqlite3-0-3.8.10.2-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522391" comment="libsqlite3-0-32bit-3.8.10.2-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522392" comment="sqlite3-3.8.10.2-9.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148815" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1146358" ref_url="https://bugzilla.suse.com/1146358" source="BUGZILLA"/>
		<reference ref_id="1146359" ref_url="https://bugzilla.suse.com/1146359" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006170.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2019-8675: Fixed a stack buffer overflow in libcups's asn1_get_type function(bsc#1146358). 
- CVE-2019-8696: Fixed a stack buffer overflow in libcups's asn1_get_packed function (bsc#1146359).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146359">SUSE bug 1146359</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8675">CVE-2019-8675 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8696">CVE-2019-8696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522393" comment="cups-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522394" comment="cups-client-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522395" comment="cups-libs-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522396" comment="cups-libs-32bit-1.7.5-20.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148816" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="1151839" ref_url="https://bugzilla.suse.com/1151839" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006180.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Security issue fixed:

- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).

Non-security issues fixed:

- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option (bsc#1144504).
- Increased the startup timeout of clamd to 5 minutes to cater for the grown virus database as a workaround until clamd has learned to talk to systemd to extend the timeout as long as needed (bsc#1151839).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151839">SUSE bug 1151839</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12625">CVE-2019-12625 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522401" comment="clamav-0.100.3-33.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148817" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1154328" ref_url="https://bugzilla.suse.com/1154328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3693" ref_url="https://www.suse.com/security/cve/CVE-2019-3693/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006186.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:
	  
- CVE-2019-3693: Fixed a local privilege escalation from wwwrun to root (bsc#1154328).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154328">SUSE bug 1154328</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3693/">CVE-2019-3693 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3693">CVE-2019-3693 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530781" comment="mailman-2.1.17-3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148818" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1152856" ref_url="https://bugzilla.suse.com/1152856" source="BUGZILLA"/>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2894" ref_url="https://www.suse.com/security/cve/CVE-2019-2894/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Security issues fixed (October 2019 CPU  bsc#1154212):	  

- CVE-2019-2933: Windows file handling redux
- CVE-2019-2945: Better socket support
- CVE-2019-2949: Better Kerberos ccache handling
- CVE-2019-2958: Build Better Processes
- CVE-2019-2964: Better support for patterns
- CVE-2019-2962: Better Glyph Images
- CVE-2019-2973: Better pattern compilation
- CVE-2019-2978: Improved handling of jar files
- CVE-2019-2981: Better Path supports
- CVE-2019-2983: Better serial attributes
- CVE-2019-2987: Better rendering of native glyphs
- CVE-2019-2988: Better Graphics2D drawing
- CVE-2019-2989: Improve TLS connection support
- CVE-2019-2992: Enhance font glyph mapping
- CVE-2019-2999: Commentary on Javadoc comments
- CVE-2019-2894: Enhance ECDSA operations (bsc#1152856).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-27"/>
	<updated date="2019-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152856">SUSE bug 1152856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2894/">CVE-2019-2894 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2894">CVE-2019-2894 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2949">CVE-2019-2949 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2958">CVE-2019-2958 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2987">CVE-2019-2987 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530782" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530783" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148819" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006210.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:
	  
- CVE-2019-15961: Fixed a denial of service which might occur when 
  scanning a specially crafted email file as (bsc#1157763).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15961">CVE-2019-15961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522421" comment="clamav-0.100.3-33.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148820" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1093414" ref_url="https://bugzilla.suse.com/1093414" source="BUGZILLA"/>
		<reference ref_id="1150734" ref_url="https://bugzilla.suse.com/1150734" source="BUGZILLA"/>
		<reference ref_id="1157198" ref_url="https://bugzilla.suse.com/1157198" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3688" ref_url="https://www.suse.com/security/cve/CVE-2019-3688/" source="CVE"/>
		<reference ref_id="CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006211.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

- CVE-2019-3688: Changed wrong ownership in /usr/sbin/pinger to root:squid
  which could have allowed a squid user to gain persistence by changing the 
  binary (bsc#1093414).
- CVE-2019-3690: Fixed a privilege escalation through untrusted symbolic 
  links (bsc#1150734).
- Fixed a regression which caused segmentation fault (bsc#1157198).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1093414">SUSE bug 1093414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150734">SUSE bug 1150734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157198">SUSE bug 1157198</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3688/">CVE-2019-3688 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3688">CVE-2019-3688 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3690">CVE-2019-3690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530786" comment="permissions-2015.09.28.1626-17.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148821" version="1" class="patch">
	<metadata>
		<title>Security update for haproxy (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1154980" ref_url="https://bugzilla.suse.com/1154980" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18277" ref_url="https://www.suse.com/security/cve/CVE-2019-18277/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006251.html" source="SUSE-SU"/>
		<description>
This update for haproxy fixes the following issues:

- CVE-2019-18277: Fixed HTTP smuggling in messages with transfer-encoding header missing the 'chunked' value (bsc#1154980).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-12"/>
	<updated date="2019-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154980">SUSE bug 1154980</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18277/">CVE-2019-18277 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18277">CVE-2019-18277 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597152" comment="haproxy-1.6.11-11.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148822" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1152497" ref_url="https://bugzilla.suse.com/1152497" source="BUGZILLA"/>
		<reference ref_id="1154448" ref_url="https://bugzilla.suse.com/1154448" source="BUGZILLA"/>
		<reference ref_id="1154456" ref_url="https://bugzilla.suse.com/1154456" source="BUGZILLA"/>
		<reference ref_id="1154458" ref_url="https://bugzilla.suse.com/1154458" source="BUGZILLA"/>
		<reference ref_id="1154460" ref_url="https://bugzilla.suse.com/1154460" source="BUGZILLA"/>
		<reference ref_id="1154461" ref_url="https://bugzilla.suse.com/1154461" source="BUGZILLA"/>
		<reference ref_id="1154464" ref_url="https://bugzilla.suse.com/1154464" source="BUGZILLA"/>
		<reference ref_id="1155945" ref_url="https://bugzilla.suse.com/1155945" source="BUGZILLA"/>
		<reference ref_id="1157888" ref_url="https://bugzilla.suse.com/1157888" source="BUGZILLA"/>
		<reference ref_id="1158003" ref_url="https://bugzilla.suse.com/1158003" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1158007" ref_url="https://bugzilla.suse.com/1158007" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-18420" ref_url="https://www.suse.com/security/cve/CVE-2019-18420/" source="CVE"/>
		<reference ref_id="CVE-2019-18421" ref_url="https://www.suse.com/security/cve/CVE-2019-18421/" source="CVE"/>
		<reference ref_id="CVE-2019-18422" ref_url="https://www.suse.com/security/cve/CVE-2019-18422/" source="CVE"/>
		<reference ref_id="CVE-2019-18423" ref_url="https://www.suse.com/security/cve/CVE-2019-18423/" source="CVE"/>
		<reference ref_id="CVE-2019-18424" ref_url="https://www.suse.com/security/cve/CVE-2019-18424/" source="CVE"/>
		<reference ref_id="CVE-2019-18425" ref_url="https://www.suse.com/security/cve/CVE-2019-18425/" source="CVE"/>
		<reference ref_id="CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19581" ref_url="https://www.suse.com/security/cve/CVE-2019-19581/" source="CVE"/>
		<reference ref_id="CVE-2019-19582" ref_url="https://www.suse.com/security/cve/CVE-2019-19582/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2019-19581: Fixed a potential out of bounds on 32-bit Arm (bsc#1158003 XSA-307).
- CVE-2019-19582: Fixed a potential infinite loop when x86 accesses to bitmaps with 
  a compile time known size of 64 (bsc#1158003 XSA-307).
- CVE-2019-19583: Fixed improper checks which could have allowed HVM/PVH guest userspace 
  code to crash the guest,leading to a guest denial of service (bsc#1158004 XSA-308).
- CVE-2019-19578: Fixed an issue where a malicious or buggy PV guest could have caused
  hypervisor crash resulting in denial of service affecting the entire host (bsc#1158005 XSA-309).
- CVE-2019-19580: Fixed a privilege escalation where a malicious PV guest administrator 
  could have been able to escalate their privilege to that of the host (bsc#1158006 XSA-310).
- CVE-2019-19577: Fixed an issue where a malicious guest administrator could have caused Xen 
  to access data structures while they are being modified leading to a crash (bsc#1158007 XSA-311). 
- CVE-2019-19579: Fixed a privilege escaltion where an untrusted domain with access 
  to a physical device can DMA into host memory (bsc#1157888 XSA-306).
- CVE-2019-18420: Malicious x86 PV guests may have caused a hypervisor crash, 
  resulting in a denial of service (bsc#1154448 XSA-296)
- CVE-2019-18425: 32-bit PV guest user mode could elevate its privileges to that 
  of the guest kernel. (bsc#1154456 XSA-298).
- CVE-2019-18421: A malicious PV guest administrator may have been able to
  escalate their privilege to that of the host. (bsc#1154458 XSA-299).
- CVE-2019-18423: A malicious guest administrator may cause a hypervisor crash,
  resulting in a denial of service  (bsc#1154460 XSA-301).
- CVE-2019-18422: A malicious ARM guest might contrive to arrange for critical 
  Xen code to run with interrupts erroneously enabled. This could lead to data
  corruption, denial of service, or possibly even privilege escalation. However
  a precise attack technique has not been identified. (bsc#1154464 XSA-303)
- CVE-2019-18424: An untrusted domain with access to a physical device can DMA 
  into host memory, leading to privilege escalation. (bsc#1154461 XSA-302).  
- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
  condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
  Exception during Page Size Change, causing the CPU core to be non-functional.
  (bsc#1155945 XSA-304)  
- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
  Transactional Memory support could be used to facilitate sidechannel
  information leaks out of microarchitectural buffers, similar to the
  previously described 'Microarchitectural Data Sampling' attack. (bsc#1152497 XSA-305).  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-13"/>
	<updated date="2019-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152497">SUSE bug 1152497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154448">SUSE bug 1154448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154456">SUSE bug 1154456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154460">SUSE bug 1154460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154461">SUSE bug 1154461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154464">SUSE bug 1154464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155945">SUSE bug 1155945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18420/">CVE-2019-18420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18420">CVE-2019-18420 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18421/">CVE-2019-18421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18421">CVE-2019-18421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18422/">CVE-2019-18422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18422">CVE-2019-18422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18423/">CVE-2019-18423 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18423">CVE-2019-18423 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18424/">CVE-2019-18424 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18424">CVE-2019-18424 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18425/">CVE-2019-18425 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18425">CVE-2019-18425 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19577">CVE-2019-19577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19578">CVE-2019-19578 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19579">CVE-2019-19579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19580">CVE-2019-19580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19581/">CVE-2019-19581 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19581">CVE-2019-19581 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19582/">CVE-2019-19582 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19582">CVE-2019-19582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19583">CVE-2019-19583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538360" comment="xen-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538361" comment="xen-doc-html-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538362" comment="xen-libs-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538363" comment="xen-libs-32bit-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538364" comment="xen-tools-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538365" comment="xen-tools-domU-4.9.4_06-3.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148823" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1158328" ref_url="https://bugzilla.suse.com/1158328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Mozilla Firefox was updated to 68.3esr (MFSA 2019-37 bsc#1158328)	  
	  
Security issues fixed: 

- CVE-2019-17008: Fixed a use-after-free in worker destruction (bmo#1546331)
- CVE-2019-13722: Fixed a stack corruption due to incorrect number of arguments 
  in WebRTC code (bmo#1580156)
- CVE-2019-11745: Fixed an out of bounds write in NSS when encrypting with a 
  block cipher (bmo#1586176)
- CVE-2019-17009: Fixed an issue where updater temporary files accessible to 
  unprivileged processes (bmo#1510494)
- CVE-2019-17010: Fixed a use-after-free when performing device orientation 
  checks (bmo#1581084)
- CVE-2019-17005: Fixed a buffer overflow in plain text serializer (bmo#1584170)
- CVE-2019-17011: Fixed a use-after-free when retrieving a document 
  in antitracking (bmo#1591334)
- CVE-2019-17012: Fixed multiple memmory issues
  (bmo#1449736, bmo#1533957, bmo#1560667,bmo#1567209, bmo#1580288, bmo#1585760, 
  bmo#1592502)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-19"/>
	<updated date="2019-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13722">CVE-2019-13722 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17005">CVE-2019-17005 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17008">CVE-2019-17008 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17009">CVE-2019-17009 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17010">CVE-2019-17010 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17011">CVE-2019-17011 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17012">CVE-2019-17012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148824" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1091041" ref_url="https://bugzilla.suse.com/1091041" source="BUGZILLA"/>
		<reference ref_id="1119461" ref_url="https://bugzilla.suse.com/1119461" source="BUGZILLA"/>
		<reference ref_id="1119465" ref_url="https://bugzilla.suse.com/1119465" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1138190" ref_url="https://bugzilla.suse.com/1138190" source="BUGZILLA"/>
		<reference ref_id="1146544" ref_url="https://bugzilla.suse.com/1146544" source="BUGZILLA"/>
		<reference ref_id="1146612" ref_url="https://bugzilla.suse.com/1146612" source="BUGZILLA"/>
		<reference ref_id="1150466" ref_url="https://bugzilla.suse.com/1150466" source="BUGZILLA"/>
		<reference ref_id="1150483" ref_url="https://bugzilla.suse.com/1150483" source="BUGZILLA"/>
		<reference ref_id="1152631" ref_url="https://bugzilla.suse.com/1152631" source="BUGZILLA"/>
		<reference ref_id="1153811" ref_url="https://bugzilla.suse.com/1153811" source="BUGZILLA"/>
		<reference ref_id="1154905" ref_url="https://bugzilla.suse.com/1154905" source="BUGZILLA"/>
		<reference ref_id="1155689" ref_url="https://bugzilla.suse.com/1155689" source="BUGZILLA"/>
		<reference ref_id="1155897" ref_url="https://bugzilla.suse.com/1155897" source="BUGZILLA"/>
		<reference ref_id="1155898" ref_url="https://bugzilla.suse.com/1155898" source="BUGZILLA"/>
		<reference ref_id="1156187" ref_url="https://bugzilla.suse.com/1156187" source="BUGZILLA"/>
		<reference ref_id="1157038" ref_url="https://bugzilla.suse.com/1157038" source="BUGZILLA"/>
		<reference ref_id="1157042" ref_url="https://bugzilla.suse.com/1157042" source="BUGZILLA"/>
		<reference ref_id="1157070" ref_url="https://bugzilla.suse.com/1157070" source="BUGZILLA"/>
		<reference ref_id="1157143" ref_url="https://bugzilla.suse.com/1157143" source="BUGZILLA"/>
		<reference ref_id="1157158" ref_url="https://bugzilla.suse.com/1157158" source="BUGZILLA"/>
		<reference ref_id="1157191" ref_url="https://bugzilla.suse.com/1157191" source="BUGZILLA"/>
		<reference ref_id="1157324" ref_url="https://bugzilla.suse.com/1157324" source="BUGZILLA"/>
		<reference ref_id="1157333" ref_url="https://bugzilla.suse.com/1157333" source="BUGZILLA"/>
		<reference ref_id="1157464" ref_url="https://bugzilla.suse.com/1157464" source="BUGZILLA"/>
		<reference ref_id="1158132" ref_url="https://bugzilla.suse.com/1158132" source="BUGZILLA"/>
		<reference ref_id="1158394" ref_url="https://bugzilla.suse.com/1158394" source="BUGZILLA"/>
		<reference ref_id="1158398" ref_url="https://bugzilla.suse.com/1158398" source="BUGZILLA"/>
		<reference ref_id="1158410" ref_url="https://bugzilla.suse.com/1158410" source="BUGZILLA"/>
		<reference ref_id="1158413" ref_url="https://bugzilla.suse.com/1158413" source="BUGZILLA"/>
		<reference ref_id="1158417" ref_url="https://bugzilla.suse.com/1158417" source="BUGZILLA"/>
		<reference ref_id="1158445" ref_url="https://bugzilla.suse.com/1158445" source="BUGZILLA"/>
		<reference ref_id="1158823" ref_url="https://bugzilla.suse.com/1158823" source="BUGZILLA"/>
		<reference ref_id="1158824" ref_url="https://bugzilla.suse.com/1158824" source="BUGZILLA"/>
		<reference ref_id="1158827" ref_url="https://bugzilla.suse.com/1158827" source="BUGZILLA"/>
		<reference ref_id="1158834" ref_url="https://bugzilla.suse.com/1158834" source="BUGZILLA"/>
		<reference ref_id="1158900" ref_url="https://bugzilla.suse.com/1158900" source="BUGZILLA"/>
		<reference ref_id="1158903" ref_url="https://bugzilla.suse.com/1158903" source="BUGZILLA"/>
		<reference ref_id="1158904" ref_url="https://bugzilla.suse.com/1158904" source="BUGZILLA"/>
		<reference ref_id="1158954" ref_url="https://bugzilla.suse.com/1158954" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-15213" ref_url="https://www.suse.com/security/cve/CVE-2019-15213/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18680" ref_url="https://www.suse.com/security/cve/CVE-2019-18680/" source="CVE"/>
		<reference ref_id="CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683/" source="CVE"/>
		<reference ref_id="CVE-2019-18805" ref_url="https://www.suse.com/security/cve/CVE-2019-18805/" source="CVE"/>
		<reference ref_id="CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19065" ref_url="https://www.suse.com/security/cve/CVE-2019-19065/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19338" ref_url="https://www.suse.com/security/cve/CVE-2019-19338/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525/" source="CVE"/>
		<reference ref_id="CVE-2019-19527" ref_url="https://www.suse.com/security/cve/CVE-2019-19527/" source="CVE"/>
		<reference ref_id="CVE-2019-19530" ref_url="https://www.suse.com/security/cve/CVE-2019-19530/" source="CVE"/>
		<reference ref_id="CVE-2019-19531" ref_url="https://www.suse.com/security/cve/CVE-2019-19531/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533/" source="CVE"/>
		<reference ref_id="CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534/" source="CVE"/>
		<reference ref_id="CVE-2019-19535" ref_url="https://www.suse.com/security/cve/CVE-2019-19535/" source="CVE"/>
		<reference ref_id="CVE-2019-19536" ref_url="https://www.suse.com/security/cve/CVE-2019-19536/" source="CVE"/>
		<reference ref_id="CVE-2019-19537" ref_url="https://www.suse.com/security/cve/CVE-2019-19537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP 3 LTSS kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2019-14895: A heap-based buffer overflow was discovered in the Linux kernel in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could have allowed the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).
- CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038).
- CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid in the Linux kernel. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free (bnc#1155897).
- CVE-2019-19062: A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333).
- CVE-2019-19065: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures (bnc#1157191).
- CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324).
- CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157143).
- CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function (bnc#1157070).
- CVE-2019-16231: drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150466).
- CVE-2019-18805: An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel There was a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact (bnc#1156187).
- CVE-2019-18680: An issue was discovered in the Linux kernel. There was a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c that will cause denial of service (bnc#1155898).
- CVE-2019-15213: An use-after-free was fixed caused by malicious USB device in drivers/media/usb/dvb-usb/dvb-usb-init.c (bsc#1146544).
- CVE-2019-19536: An uninitialized Kernel memory can leak to USB devices in drivers/net/can/usb/peak_usb/pcan_usb_pro.c (bsc#1158394).
- CVE-2019-19534: An uninitialized Kernel memory can leak to USB devices in drivers/net/can/usb/peak_usb/pcan_usb_core.c (bsc#1158398).
- CVE-2019-19530: An use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver (bsc#1158410).
- CVE-2019-19524: An use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver (bsc#1158413).
- CVE-2019-19525: An use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver (bsc#1158417).
- CVE-2019-19531: An use-after-free in yurex_delete may lead to denial of service (bsc#1158445).
- CVE-2019-19523: An use-after-free on disconnect in USB adutux (bsc#1158823).
- CVE-2019-19532: An out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers (bsc#1158824).
- CVE-2019-19332: An out-of-bounds memory write via kvm_dev_ioctl_get_cpuid (bsc#1158827).
- CVE-2019-19533: An info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver (bsc#1158834).
- CVE-2019-19527: An use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (bsc#1158900).
- CVE-2019-19535: An info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver (bsc#1158903).
- CVE-2019-19537: Two races in the USB character device registration and deregistration routines (bsc#1158904).
- CVE-2019-19338: An incomplete fix for Transaction Asynchronous Abort (TAA) (bsc#1158954).


The following non-security bugs were fixed:

- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).
- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).
- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).
- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).
- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).
- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).
- sched/fair: WARN() and refuse to set buddy when !se-&gt;on_rq (bsc#1158132).
- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).
- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).
- xen/pv: Fix a boot up hang revealed by int3 self test (bsc#1153811).
- arp: Fix cache issue during Life Partition Migration (bsc#1152631).
- futexes: Fix speed on 4.12 kernel (bsc#1157464).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-21"/>
	<updated date="2019-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1091041">SUSE bug 1091041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119461">SUSE bug 1119461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119465">SUSE bug 1119465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138190">SUSE bug 1138190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146544">SUSE bug 1146544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146612">SUSE bug 1146612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150466">SUSE bug 1150466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150483">SUSE bug 1150483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152631">SUSE bug 1152631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153811">SUSE bug 1153811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154905">SUSE bug 1154905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155689">SUSE bug 1155689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155897">SUSE bug 1155897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155898">SUSE bug 1155898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156187">SUSE bug 1156187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157038">SUSE bug 1157038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157042">SUSE bug 1157042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157070">SUSE bug 1157070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157143">SUSE bug 1157143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157158">SUSE bug 1157158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157191">SUSE bug 1157191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157324">SUSE bug 1157324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157333">SUSE bug 1157333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157464">SUSE bug 1157464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158132">SUSE bug 1158132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158394">SUSE bug 1158394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158398">SUSE bug 1158398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158410">SUSE bug 1158410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158413">SUSE bug 1158413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158417">SUSE bug 1158417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158445">SUSE bug 1158445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158823">SUSE bug 1158823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158824">SUSE bug 1158824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158827">SUSE bug 1158827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158900">SUSE bug 1158900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158903">SUSE bug 1158903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158904">SUSE bug 1158904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158954">SUSE bug 1158954</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14895">CVE-2019-14895 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15213/">CVE-2019-15213 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15213">CVE-2019-15213 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16231">CVE-2019-16231 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18660">CVE-2019-18660 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18680/">CVE-2019-18680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18680">CVE-2019-18680 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18683">CVE-2019-18683 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18805/">CVE-2019-18805 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18805">CVE-2019-18805 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19052">CVE-2019-19052 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19062">CVE-2019-19062 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19065/">CVE-2019-19065 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19065">CVE-2019-19065 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19073">CVE-2019-19073 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19074">CVE-2019-19074 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19332">CVE-2019-19332 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19338/">CVE-2019-19338 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19338">CVE-2019-19338 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19523">CVE-2019-19523 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19524">CVE-2019-19524 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19525">CVE-2019-19525 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19527/">CVE-2019-19527 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19527">CVE-2019-19527 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19530/">CVE-2019-19530 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19530">CVE-2019-19530 at NVD</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19531/">CVE-2019-19531 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19531">CVE-2019-19531 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19532">CVE-2019-19532 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19533">CVE-2019-19533 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19534">CVE-2019-19534 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19535/">CVE-2019-19535 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19535">CVE-2019-19535 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19536/">CVE-2019-19536 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19536">CVE-2019-19536 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19537/">CVE-2019-19537 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19537">CVE-2019-19537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555682" comment="kernel-default-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555683" comment="kernel-default-base-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555684" comment="kernel-default-devel-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556175" comment="kernel-default-kgraft-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538370" comment="kernel-devel-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538371" comment="kernel-macros-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538372" comment="kernel-source-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555685" comment="kernel-syms-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556177" comment="kgraft-patch-4_4_180-94_113-default-1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148825" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyKMIP (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1120767" ref_url="https://bugzilla.suse.com/1120767" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000872" ref_url="https://www.suse.com/security/cve/CVE-2018-1000872/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005119.html" source="SUSE-SU"/>
		<description>
This update for python-PyKMIP fixes the following issues:

Security issue fixed:

- CVE-2018-1000872: Fixed a denial-of-service vulnerability which was caused by exhausting 
  the available sockets. To mitigate the issue server socket timeout was decreased (bsc#1120767).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-14"/>
	<updated date="2019-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120767">SUSE bug 1120767</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000872/">CVE-2018-1000872 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000872">CVE-2018-1000872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597154" comment="python-PyKMIP-0.6.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148826" version="1" class="patch">
	<metadata>
		<title>Security update for couchdb (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1104204" ref_url="https://bugzilla.suse.com/1104204" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11769" ref_url="https://www.suse.com/security/cve/CVE-2018-11769/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005120.html" source="SUSE-SU"/>
		<description>
This update for couchdb fixes the following issues:

Security issue fixed:

- CVE-2018-11769: Fixed a remote code execution vulnerability by removing the _config route from default.ini (bsc#1104204)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-14"/>
	<updated date="2019-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104204">SUSE bug 1104204</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11769/">CVE-2018-11769 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11769">CVE-2018-11769 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597662" comment="couchdb-1.7.2-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148827" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-loofah (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1085967" ref_url="https://bugzilla.suse.com/1085967" source="BUGZILLA"/>
		<reference ref_id="1113969" ref_url="https://bugzilla.suse.com/1113969" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16468" ref_url="https://www.suse.com/security/cve/CVE-2018-16468/" source="CVE"/>
		<reference ref_id="CVE-2018-8048" ref_url="https://www.suse.com/security/cve/CVE-2018-8048/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005122.html" source="SUSE-SU"/>
		<description>
This update for rubygem-loofah fixes the following issues:

Security issues fixed:

- CVE-2018-16468: Fixed XXS by removing the svg animate attribute `from` from the allowlist (bsc#1113969).
- CVE-2018-8048: Fixed XSS vulnerability due to unescaped characters by libcxml2 (bsc#1085967).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-14"/>
	<updated date="2019-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085967">SUSE bug 1085967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113969">SUSE bug 1113969</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16468/">CVE-2018-16468 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16468">CVE-2018-16468 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8048/">CVE-2018-8048 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8048">CVE-2018-8048 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597663" comment="ruby2.1-rubygem-loofah-2.0.2-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148828" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs6 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="1117625" ref_url="https://bugzilla.suse.com/1117625" source="BUGZILLA"/>
		<reference ref_id="1117626" ref_url="https://bugzilla.suse.com/1117626" source="BUGZILLA"/>
		<reference ref_id="1117627" ref_url="https://bugzilla.suse.com/1117627" source="BUGZILLA"/>
		<reference ref_id="1117629" ref_url="https://bugzilla.suse.com/1117629" source="BUGZILLA"/>
		<reference ref_id="1117630" ref_url="https://bugzilla.suse.com/1117630" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-12116" ref_url="https://www.suse.com/security/cve/CVE-2018-12116/" source="CVE"/>
		<reference ref_id="CVE-2018-12120" ref_url="https://www.suse.com/security/cve/CVE-2018-12120/" source="CVE"/>
		<reference ref_id="CVE-2018-12121" ref_url="https://www.suse.com/security/cve/CVE-2018-12121/" source="CVE"/>
		<reference ref_id="CVE-2018-12122" ref_url="https://www.suse.com/security/cve/CVE-2018-12122/" source="CVE"/>
		<reference ref_id="CVE-2018-12123" ref_url="https://www.suse.com/security/cve/CVE-2018-12123/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005121.html" source="SUSE-SU"/>
		<description>
This update for nodejs6 to version 6.16.0 fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed a timing vulnerability in the DSA signature generation (bsc#1113652)
- CVE-2018-5407: Fixed a hyperthread port content side channel attack (aka 'PortSmash') (bsc#1113534)
- CVE-2018-12120: Fixed that the debugger listens on any interface by default (bsc#1117625)
- CVE-2018-12121: Fixed a denial of Service with large HTTP headers (bsc#1117626)
- CVE-2018-12122: Fixed the 'Slowloris' HTTP Denial of Service (bsc#1117627)
- CVE-2018-12116: Fixed HTTP request splitting (bsc#1117630)
- CVE-2018-12123: Fixed hostname spoofing in URL parser for javascript protocol (bsc#1117629)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-14"/>
	<updated date="2019-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117625">SUSE bug 1117625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117626">SUSE bug 1117626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117627">SUSE bug 1117627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117629">SUSE bug 1117629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117630">SUSE bug 1117630</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0734">CVE-2018-0734 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12116/">CVE-2018-12116 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12116">CVE-2018-12116 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12120/">CVE-2018-12120 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12120">CVE-2018-12120 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12121/">CVE-2018-12121 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12121">CVE-2018-12121 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12122/">CVE-2018-12122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12122">CVE-2018-12122 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12123/">CVE-2018-12123 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12123">CVE-2018-12123 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5407">CVE-2018-5407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597664" comment="nodejs6-6.16.0-11.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148829" version="1" class="patch">
	<metadata>
		<title>Security update for python-paramiko (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1111151" ref_url="https://bugzilla.suse.com/1111151" source="BUGZILLA"/>
		<reference ref_id="1120531" ref_url="https://bugzilla.suse.com/1120531" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000805" ref_url="https://www.suse.com/security/cve/CVE-2018-1000805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0396-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190396-1.html" source="SUSE-SU"/>
		<description>
This update for python-paramiko to version 2.2.4 fixes the following issues:

Security issue fixed:

- CVE-2018-1000805: Fixed an authentication bypass in auth_handler.py (bsc#1111151)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-14"/>
	<updated date="2019-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111151">SUSE bug 1111151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120531">SUSE bug 1120531</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000805/">CVE-2018-1000805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000805">CVE-2018-1000805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597155" comment="python-paramiko-2.2.4-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148830" version="1" class="patch">
	<metadata>
		<title>Security update for galera-3, mariadb, mariadb-connector-c (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="1097938" ref_url="https://bugzilla.suse.com/1097938" source="BUGZILLA"/>
		<reference ref_id="1098683" ref_url="https://bugzilla.suse.com/1098683" source="BUGZILLA"/>
		<reference ref_id="1101676" ref_url="https://bugzilla.suse.com/1101676" source="BUGZILLA"/>
		<reference ref_id="1101677" ref_url="https://bugzilla.suse.com/1101677" source="BUGZILLA"/>
		<reference ref_id="1101678" ref_url="https://bugzilla.suse.com/1101678" source="BUGZILLA"/>
		<reference ref_id="1103342" ref_url="https://bugzilla.suse.com/1103342" source="BUGZILLA"/>
		<reference ref_id="1111858" ref_url="https://bugzilla.suse.com/1111858" source="BUGZILLA"/>
		<reference ref_id="1111859" ref_url="https://bugzilla.suse.com/1111859" source="BUGZILLA"/>
		<reference ref_id="1112368" ref_url="https://bugzilla.suse.com/1112368" source="BUGZILLA"/>
		<reference ref_id="1112377" ref_url="https://bugzilla.suse.com/1112377" source="BUGZILLA"/>
		<reference ref_id="1112384" ref_url="https://bugzilla.suse.com/1112384" source="BUGZILLA"/>
		<reference ref_id="1112386" ref_url="https://bugzilla.suse.com/1112386" source="BUGZILLA"/>
		<reference ref_id="1112391" ref_url="https://bugzilla.suse.com/1112391" source="BUGZILLA"/>
		<reference ref_id="1112397" ref_url="https://bugzilla.suse.com/1112397" source="BUGZILLA"/>
		<reference ref_id="1112404" ref_url="https://bugzilla.suse.com/1112404" source="BUGZILLA"/>
		<reference ref_id="1112415" ref_url="https://bugzilla.suse.com/1112415" source="BUGZILLA"/>
		<reference ref_id="1112417" ref_url="https://bugzilla.suse.com/1112417" source="BUGZILLA"/>
		<reference ref_id="1112421" ref_url="https://bugzilla.suse.com/1112421" source="BUGZILLA"/>
		<reference ref_id="1112432" ref_url="https://bugzilla.suse.com/1112432" source="BUGZILLA"/>
		<reference ref_id="1116686" ref_url="https://bugzilla.suse.com/1116686" source="BUGZILLA"/>
		<reference ref_id="1118754" ref_url="https://bugzilla.suse.com/1118754" source="BUGZILLA"/>
		<reference ref_id="1120041" ref_url="https://bugzilla.suse.com/1120041" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3060" ref_url="https://www.suse.com/security/cve/CVE-2018-3060/" source="CVE"/>
		<reference ref_id="CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063/" source="CVE"/>
		<reference ref_id="CVE-2018-3064" ref_url="https://www.suse.com/security/cve/CVE-2018-3064/" source="CVE"/>
		<reference ref_id="CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066/" source="CVE"/>
		<reference ref_id="CVE-2018-3143" ref_url="https://www.suse.com/security/cve/CVE-2018-3143/" source="CVE"/>
		<reference ref_id="CVE-2018-3156" ref_url="https://www.suse.com/security/cve/CVE-2018-3156/" source="CVE"/>
		<reference ref_id="CVE-2018-3162" ref_url="https://www.suse.com/security/cve/CVE-2018-3162/" source="CVE"/>
		<reference ref_id="CVE-2018-3173" ref_url="https://www.suse.com/security/cve/CVE-2018-3173/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3185" ref_url="https://www.suse.com/security/cve/CVE-2018-3185/" source="CVE"/>
		<reference ref_id="CVE-2018-3200" ref_url="https://www.suse.com/security/cve/CVE-2018-3200/" source="CVE"/>
		<reference ref_id="CVE-2018-3251" ref_url="https://www.suse.com/security/cve/CVE-2018-3251/" source="CVE"/>
		<reference ref_id="CVE-2018-3277" ref_url="https://www.suse.com/security/cve/CVE-2018-3277/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="CVE-2018-3284" ref_url="https://www.suse.com/security/cve/CVE-2018-3284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<description>
This update for mariadb, galera-3, mariadb-connector fixes the following issues:

Security vulnerabilities addressed for mariadb:

- CVE-2016-9843 [bsc#1013882]
- CVE-2018-3058 [bsc#1101676]
- CVE-2018-3060
- CVE-2018-3063 [bsc#1101677]
- CVE-2018-3064 [bsc#1103342]
- CVE-2018-3066 [bsc#1101678]
- CVE-2018-3143 [bsc#1112421]
- CVE-2018-3156 [bsc#1112417]
- CVE-2018-3162 [bsc#1112415]
- CVE-2018-3173 [bsc#1112386]
- CVE-2018-3174 [bsc#1112368]
- CVE-2018-3185 [bsc#1112384]
- CVE-2018-3200 [bsc#1112404]
- CVE-2018-3251 [bsc#1112397]
- CVE-2018-3277 [bsc#1112391]
- CVE-2018-3282 [bsc#1112432]
- CVE-2018-3284 [bsc#1112377]

Other bug fixes and changes for mariadb:

- update to 10.2.21 GA
    * MDEV-17589 - Stack-buffer-overflow with indexed varchar
      (utf8) field
    * MDEV-16987 - ALTER DATABASE possible in read-only mode
      (forbid ALTER DATABASE in read_only)
    * MDEV-17720 - slave_ddl_exec_mode=IDEMPOTENT does not handle
      DROP DATABASE
    * MDEV-6453 - Assertion `inited==NONE || (inited==RND &amp;&amp; scan)'
      failed in handler::ha_rnd_init(bool) with InnoDB, joins,
      AND/OR conditions
    * MDEV-18105 - Mariabackup fails to copy encrypted InnoDB
      system tablespace if LSN&gt;4G
    * MDEV-18041 - Database corruption after renaming a
      prefix-indexed column [bsc#1120041]
    * MDEV-17470 - Orphan temporary files after interrupted ALTER
      cause InnoDB: Operating system error number 17 and eventual
      fatal error 71
    * MDEV-17833: ALTER TABLE is not enforcing prefix index size
      limit
    * MDEV-17989: InnoDB: Failing assertion:
      dict_tf2_is_valid(flags, flags2)
    * MDEV-17765: Locking bug fix for SPATIAL INDEX
    * MDEV-17923, MDEV-17904, MDEV-17938: Fixes for FULLTEXT INDEX
    * Fixes for regressions introduced in MariaDB Server 10.2.19 by
      the backup-safe TRUNCATE TABLE (MDEV-13564,
      innodb_safe_truncate=ON) and innodb_undo_log_truncate:
      * MDEV-17780, MDEV-17816, MDEV-17849, MDEV-17851, MDEV-17885
    * Several improvements to MariaDB Server and backup for dealing
      with encrypted or page_compressed pages:
      * MDEV-12112: corruption in encrypted table may be overlooked
      * MDEV-17958: On little-endian systems, remove bug-compatible
        variant of innodb_checksum_algorithm=crc32
      * MDEV-17957: Make innodb_checksum_algorithm stricter for
        strict_* values
      * MDEV-18025: Mariabackup fails to detect corrupted
        page_compressed=1 tables
    * release notes and changelog:
      - https://mariadb.com/kb/en/library/mariadb-10221-release-notes
      - https://mariadb.com/kb/en/library/mariadb-10221-changelog
      - https://mariadb.com/kb/en/library/mariadb-10220-release-notes
      - https://mariadb.com/kb/en/library/mariadb-10220-changelog
- remove PerconaFT from the package as it has AGPL licence (bsc#1118754)
- Add patch to link against libatomic where necessary and
  use C++11 atomics instead of gcc built-in atomics
- update to 10.2.19 GA [bsc#1116686]
    * innodb_safe_truncate system variable for a backup-safe
      TRUNCATE TABLE implementation that is based on RENAME,
      CREATE, DROP (MDEV-14717, MDEV-14585, MDEV-13564). Default
      value for this variable is ON. If you absolutely must use
      XtraBackup instead of Mariabackup, you can set it to OFF and
      restart the server
    * MDEV-17289: Multi-pass recovery fails to apply some redo
      log records
    * MDEV-17073: INSERT…ON DUPLICATE KEY UPDATE became more
      deadlock-prone
    * MDEV-17491: micro optimize page_id_t
    * MDEV-13671: InnoDB should use case-insensitive column name
      comparisons like the rest of the server
    * Fixes for indexed virtual columns: MDEV-17215, MDEV-16980
    * MDEV-17433: Allow InnoDB start up with empty ib_logfile0
      from mariabackup --prepare
    * MDEV-12547: InnoDB FULLTEXT index has too strict
      innodb_ft_result_cache_limit max limit
    * MDEV-17541: KILL QUERY during lock wait in FOREIGN KEY
      check causes hang
    * MDEV-17531: Crash in RENAME TABLE with FOREIGN KEY and
      FULLTEXT INDEX
    * MDEV-17532: Performance_schema reports wrong directory for
      the temporary files of ALTER TABLE…ALGORITHM=INPLACE
    * MDEV-17545: Predicate lock for SPATIAL INDEX should lock
      non-matching record
    * MDEV-17546: SPATIAL INDEX should not be allowed for
      FOREIGN KEY
    * MDEV-17548: Incorrect access to off-page column for
      indexed virtual column
    * MDEV-12023: Assertion failure sym_node-&gt;table != NULL
      on startup
    * MDEV-17230: encryption_key_id from alter is ignored by
      encryption threads
    * release notes and changelog:
      - https://mariadb.com/kb/en/library/mariadb-10219-release-notes
      - https://mariadb.com/kb/en/library/mariadb-10219-changelog
- do not pack libmariadb.pc (packed in mariadb-connector-c)
- add 'Requires: libmariadb_plugins' to the mariadb-test subpackage
  in order to be able to test client plugins successfuly
  (bsc#1111859)
- don't remove debug_key_management.so anymore (bsc#1111858)
- update to 10.2.18 GA
    * MDEV-15511 - if available, stunnel can be used during Galera
      rsync SST
    * MDEV-16791 - mariabackup: Support DDL commands during backup
    * MDEV-13564 - Refuse MLOG_TRUNCATE in mariabackup
    * MDEV-16934 - add new system variable eq_range_index_dive_limit
      to speed up queries that new long nested IN lists. The default
      value, for backward compatibility, is 0 meaning 'unlimited'.
    * MDEV-13333 - errors on InnoDB lock conflict
    * Report all InnoDB redo log corruption
    * MDEV-17043 - Purge of indexed virtual columns may cause hang
      on table-rebuilding DDL
    * MDEV-16868 - corruption of InnoDB temporary tables
    * MDEV-16465 - Invalid (old?) table or database name or hang
      in ha_innobase::delete_table and log semaphore wait upon
      concurrent DDL with foreign keys
    * release notes and changelog:
      - https://mariadb.com/kb/en/library/mariadb-10218-release-notes
      - https://mariadb.com/kb/en/library/mariadb-10218-changelog
- update to 10.2.17 GA
    * New variable innodb_log_optimize_ddl for avoiding delay due
      to page flushing and allowing concurrent backup
    * InnoDB updated to 5.7.23
    * MDEV-14637 - Fix hang due to DDL with FOREIGN KEY or
      persistent statistics
    * MDEV-15953 - Alter InnoDB Partitioned Table Moves Files
      (which were originally not in the datadir) to the datadir
    * MDEV-16515 - InnoDB: Failing assertion: ++retries &lt; 10000 in
      file dict0dict.cc line 2737
    * MDEV-16809 - Allow full redo logging for ALTER TABLE
    * Temporary tables: MDEV-16713 - InnoDB hang with repeating
      log entry
    * indexed virtual columns: MDEV-15855 - Deadlock between purge
      thread and DDL statement
    * MDEV-16664 - Change the default to
      innodb_lock_schedule_algorithm=fcfs
    * Galera: MDEV-15822 - WSREP: BF lock wait long for trx
    * release notes and changelog:
      - https://mariadb.com/kb/en/library/mariadb-10217-release-notes
      - https://mariadb.com/kb/en/library/mariadb-10217-changelog
- switch to libedit as control sequences were already fixed there
  so we don't have to avoid it (bsc#1098683)
- update to 10.2.16 GA
    * MDEV-13122: mariabackup now supports MyRocks
    * MDEV-13779 - InnoDB fails to shut down purge workers, causing
      hang
    * MDEV-16267 - Wrong INFORMATION_SCHEMA.INNODB_BUFFER_PAGE.\
      TABLE_NAME
    * MDEV-13834 - Upgrade failure from 10.1 innodb_encrypt_log
    * MDEV-16283 - ALTER TABLE...DISCARD TABLESPACE still takes long
      on a large buffer pool
    * MDEV-16376 - ASAN: heap-use-after-free in
      gcol.innodb_virtual_debug
    * MDEV-15824 - innodb_defragment=ON trumps
      innodb_optimize_fulltext_only=ON in OPTIMIZE TABLE
    * MDEV-16124 - fil_rename_tablespace() times out and crashes
      server during table-rebuilding ALTER TABLE
    * MDEV-16416 - Crash on IMPORT TABLESPACE of a
      ROW_FORMAT=COMPRESSED table
    * MDEV-16456 - InnoDB error 'returned OS error 71' complains
      about wrong path
    * MDEV-13103 - Deal with page_compressed page corruption
    * MDEV-16496 - Mariabackup: Implement --verbose option to
      instrument InnoDB log apply
    * MDEV-16087 - Inconsistent SELECT results when query cache
      is enabled
    * MDEV-15114 - ASAN heap-use-after-free in mem_heap_dup or
      dfield_data_is_binary_equal (fix for indexed virtual columns)
    * release notes and changelog:
      - https://mariadb.com/kb/en/library/mariadb-10216-release-notes
      - https://mariadb.com/kb/en/library/mariadb-10216-changelog
- pack wsrep_sst_rsync_wan file to galera subpackage

Bug fixes and changes for galera-3:

- update to 25.3.24:
  * A support for new certification key type was added to allow
    more relaxed certification rules for foreign key references (galera#491).
  * New status variables were added to display the number of open transactions
    and referenced client connections inside Galera provider (galera#492).
  * GCache was sometimes cleared unnecessarily on startup if the recovered
    state had smaller sequence number than the highest found from GCache.
    Now only entries with sequence number higher than recovery point will be
    cleared (galera#498).
  * Non-primary configuration is saved into grastate.dat only when if the
    node is in closing state (galera#499).
  * Exception from GComm was not always handled properly resulting in
    Galera to remain in half closed state. This was fixed by propagating the
    error condition appropriately to upper layers (galera#500).
  * A new status variable displaying the total weight of the cluster nodes
    was added (galera#501).
  * The value of pc.weight did not reflect the actual effective value after
    setting it via wsrep_provider_options. This was fixed by making sure that
    the new value is taken into use before returning the control back to
    caller (galera#505, MDEV-11959)
  * Use of ECHD algorithms with old OpenSSL versions was enabled (galera#511).
  * Default port value is now used by garbd if the port is not explicitly
    given in cluster address (MDEV-15531).
  * Correct error handling for posix_fallocate().
  * Failed causal reads are retried during configuration changes.

Bug fixes and changes for mariadb-connector-c:

- New upstream version 3.0.6
  * MDEV-15263: FIx IS_NUM() macro
  * CONC-297: local infile parameter must be unsigned int instead
    of my_bool
  * CONC-329: change return value of internal socket functions
    from my_bool to int
  * CONC-332: my_auth doesn't read/update server ok packet
  * CONC-344: reset internal row counter
  * CONC-345: invalid heap use after free
  * CONC-346: Remove old cmake policies
  * fixed crash in mysql_select_db if NULL parameter was provided
- New upstream version 3.0.5
  * CONC-336: Allow multiple initialization of client library
  * Fixed string to MYSQL_TIME conversion (prepared statements)
  * CONC-334: Copy all members of MYSQL_FIELD to internal
    statement structure
  * Fixed double free in dynamic column library
  * Added checks for corrupted packets in protocol
  * MDEV-15450: Added default connection attribute _server_host
  * CONC-326: fixed wrong openssl thread id callback
- New upstream version 3.0.4
  * Added option MYSQL_OPT_CAN_HANDLE_EXPIRED_PASSWORDS for
    mysql_options()/mysql_optionsv():
  * New plugin configuration interface: The default configuration
    for a specific plugin can be specified via cmake parameter
    -DCLIENT_PLUGIN_${PLUGIN}=[DYNAMIC|STATIC|OFF].
  * Added support for linux abstract socket (MDEV-15655).
  * CONC-320: Added asynchronous/non-blocking support for
    OpenSSL and GnuTLS
  * CONC-294: Access violation in mysql_close when using
    a connection plugin.
  * MDEV-14977: If built dynamically the old_password plugin
    could not be located due to wrong filename (must be
    mysql_old_password.so instead of old_password.so).
  * CONC-315: If no default client character set was specified,
    the utf8 character set will be used by default (instead of
    setting the client character set to server character set)
  * CONC-317: Parsing of configuration file fails if key/value
    pairs contain white spaces.
  * CONC-322: Correct handling of EAGAIN and EINPROGRESS in
    internal_connect (socket) for non windows platforms.
  * CONC-323: mariadb_stmt_execute_direct hangs forever if
    compression used.
  * CONC-324: Wrong codepage numbers for some collations.
  * CONC-326: ssl_thread_init() uses wrong openssl threadid
    callback
- Drop libmysqlclient_r Provides from the -devel package.
  (bsc#1097938)
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-18"/>
	<updated date="2019-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097938">SUSE bug 1097938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098683">SUSE bug 1098683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101676">SUSE bug 1101676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101677">SUSE bug 1101677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101678">SUSE bug 1101678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103342">SUSE bug 1103342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111858">SUSE bug 1111858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111859">SUSE bug 1111859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112368">SUSE bug 1112368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112377">SUSE bug 1112377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112384">SUSE bug 1112384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112386">SUSE bug 1112386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112391">SUSE bug 1112391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112397">SUSE bug 1112397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112404">SUSE bug 1112404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112415">SUSE bug 1112415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112417">SUSE bug 1112417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112421">SUSE bug 1112421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112432">SUSE bug 1112432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118754">SUSE bug 1118754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120041">SUSE bug 1120041</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3058">CVE-2018-3058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3060/">CVE-2018-3060 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3060">CVE-2018-3060 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3063">CVE-2018-3063 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3064/">CVE-2018-3064 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3064">CVE-2018-3064 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3066">CVE-2018-3066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3143/">CVE-2018-3143 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3143">CVE-2018-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3156/">CVE-2018-3156 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3156">CVE-2018-3156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3162/">CVE-2018-3162 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3162">CVE-2018-3162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3173/">CVE-2018-3173 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3173">CVE-2018-3173 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3174">CVE-2018-3174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3185/">CVE-2018-3185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3185">CVE-2018-3185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3200/">CVE-2018-3200 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3200">CVE-2018-3200 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3251/">CVE-2018-3251 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3251">CVE-2018-3251 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3277/">CVE-2018-3277 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3277">CVE-2018-3277 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3282">CVE-2018-3282 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3284/">CVE-2018-3284 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3284">CVE-2018-3284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597156" comment="galera-3-wsrep-provider-25.3.24-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597157" comment="libmariadb3-3.0.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597158" comment="mariadb-10.2.21-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597159" comment="mariadb-client-10.2.21-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597160" comment="mariadb-errormessages-10.2.21-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597161" comment="mariadb-galera-10.2.21-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597162" comment="mariadb-tools-10.2.21-4.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148831" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="1127532" ref_url="https://bugzilla.suse.com/1127532" source="BUGZILLA"/>
		<reference ref_id="1127533" ref_url="https://bugzilla.suse.com/1127533" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<reference ref_id="CVE-2019-5737" ref_url="https://www.suse.com/security/cve/CVE-2019-5737/" source="CVE"/>
		<reference ref_id="CVE-2019-5739" ref_url="https://www.suse.com/security/cve/CVE-2019-5739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005269.html" source="SUSE-SU"/>
		<description>
This update for nodejs6 to version 6.17.0 fixes the following issues:

Security issues fixed:


- CVE-2019-5739: Fixed a potentially attack vector which could lead to Denial of Service 
  when HTTP connection are kept active (bsc#1127533).
- CVE-2019-5737: Fixed a potentially attack vector which could lead to Denial of Service
  when HTTP connection are kept active (bsc#1127532).
- CVE-2019-1559: Fixed OpenSSL 0-byte Record Padding Oracle which under certain circumstances 
  a TLS server can be forced to respond differently to a client and lead to the decryption of the data (bsc#1127080).

Release Notes: https://nodejs.org/en/blog/release/v6.17.0/    
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127532">SUSE bug 1127532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127533">SUSE bug 1127533</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1559">CVE-2019-1559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5737/">CVE-2019-5737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5737">CVE-2019-5737 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5739/">CVE-2019-5739 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5739">CVE-2019-5739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597665" comment="nodejs6-6.17.0-11.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148832" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionpack-4_2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1129271" ref_url="https://bugzilla.suse.com/1129271" source="BUGZILLA"/>
		<reference ref_id="1129272" ref_url="https://bugzilla.suse.com/1129272" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2019-5419" ref_url="https://www.suse.com/security/cve/CVE-2019-5419/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0915-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190915-1.html" source="SUSE-SU"/>
		<description>
This update for rubygem-actionpack-4_2 fixes the following issues:

Security issues fixed: 	  

- CVE-2019-5418: Fixed a file content disclosure vulnerability in Action View which 
  could be exploited via specially crafted accept headers in combination with calls 
  to render file (bsc#1129272).
- CVE-2019-5419: Fixed a resource exhaustion issue in Action View which could make
  the server unable to process requests (bsc#1129271). 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1129271">SUSE bug 1129271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129272">SUSE bug 1129272</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5418">CVE-2019-5418 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5419/">CVE-2019-5419 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5419">CVE-2019-5419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597666" comment="ruby2.1-rubygem-actionpack-4_2-4.2.9-7.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148833" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1144524" ref_url="https://bugzilla.suse.com/1144524" source="BUGZILLA"/>
		<reference ref_id="1146848" ref_url="https://bugzilla.suse.com/1146848" source="BUGZILLA"/>
		<reference ref_id="1166847" ref_url="https://bugzilla.suse.com/1166847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13456" ref_url="https://www.suse.com/security/cve/CVE-2019-13456/" source="CVE"/>
		<reference ref_id="CVE-2019-17185" ref_url="https://www.suse.com/security/cve/CVE-2019-17185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006713.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

- CVE-2019-13456: Fixed a side-channel password leak in EAP-pwd
  (bsc#1144524).
- CVE-2019-17185: Fixed a debial of service due to multithreaded
  BN_CTX access (bsc#1166847).
- Fixed an issue in TLS-EAP where the OCSP verification, when an 
  intermediate client certificate was not explicitly trusted 
  (bsc#1146848).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-17"/>
	<updated date="2020-04-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144524">SUSE bug 1144524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146848">SUSE bug 1146848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166847">SUSE bug 1166847</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13456/">CVE-2019-13456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13456">CVE-2019-13456 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17185/">CVE-2019-17185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17185">CVE-2019-17185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555686" comment="freeradius-server-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555687" comment="freeradius-server-doc-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555688" comment="freeradius-server-krb5-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555689" comment="freeradius-server-ldap-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555690" comment="freeradius-server-libs-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555691" comment="freeradius-server-mysql-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555692" comment="freeradius-server-perl-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555693" comment="freeradius-server-postgresql-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555694" comment="freeradius-server-python-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555695" comment="freeradius-server-sqlite-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555696" comment="freeradius-server-utils-3.0.15-2.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148834" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1168422" ref_url="https://bugzilla.suse.com/1168422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006730.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-3898: Fixed a heap buffer overflow in ppdFindOption() (bsc#1168422).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-23"/>
	<updated date="2020-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3898">CVE-2020-3898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530902" comment="cups-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530903" comment="cups-client-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530904" comment="cups-libs-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530905" comment="cups-libs-32bit-1.7.5-20.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148835" version="1" class="patch">
	<metadata>
		<title>Security update for ardana-ansible, ardana-barbican, ardana-db, ardana-monasca, ardana-mq, ardana-neutron, ardana-octavia, ardana-tempest, crowbar-core, crowbar-ha, crowbar-openstack, documentation-suse-openstack-cloud, memcached, openstack-manila, openstack-neutron, openstack-nova, pdns, python-amqp, rubygem-puma, zookeeper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1040519" ref_url="https://bugzilla.suse.com/1040519" source="BUGZILLA"/>
		<reference ref_id="1048688" ref_url="https://bugzilla.suse.com/1048688" source="BUGZILLA"/>
		<reference ref_id="1077718" ref_url="https://bugzilla.suse.com/1077718" source="BUGZILLA"/>
		<reference ref_id="1111180" ref_url="https://bugzilla.suse.com/1111180" source="BUGZILLA"/>
		<reference ref_id="1114157" ref_url="https://bugzilla.suse.com/1114157" source="BUGZILLA"/>
		<reference ref_id="1114169" ref_url="https://bugzilla.suse.com/1114169" source="BUGZILLA"/>
		<reference ref_id="1115904" ref_url="https://bugzilla.suse.com/1115904" source="BUGZILLA"/>
		<reference ref_id="1125357" ref_url="https://bugzilla.suse.com/1125357" source="BUGZILLA"/>
		<reference ref_id="1129734" ref_url="https://bugzilla.suse.com/1129734" source="BUGZILLA"/>
		<reference ref_id="1132852" ref_url="https://bugzilla.suse.com/1132852" source="BUGZILLA"/>
		<reference ref_id="1133817" ref_url="https://bugzilla.suse.com/1133817" source="BUGZILLA"/>
		<reference ref_id="1135773" ref_url="https://bugzilla.suse.com/1135773" source="BUGZILLA"/>
		<reference ref_id="1145498" ref_url="https://bugzilla.suse.com/1145498" source="BUGZILLA"/>
		<reference ref_id="1146206" ref_url="https://bugzilla.suse.com/1146206" source="BUGZILLA"/>
		<reference ref_id="1148426" ref_url="https://bugzilla.suse.com/1148426" source="BUGZILLA"/>
		<reference ref_id="1149110" ref_url="https://bugzilla.suse.com/1149110" source="BUGZILLA"/>
		<reference ref_id="1149535" ref_url="https://bugzilla.suse.com/1149535" source="BUGZILLA"/>
		<reference ref_id="1151206" ref_url="https://bugzilla.suse.com/1151206" source="BUGZILLA"/>
		<reference ref_id="1165402" ref_url="https://bugzilla.suse.com/1165402" source="BUGZILLA"/>
		<reference ref_id="1165643" ref_url="https://bugzilla.suse.com/1165643" source="BUGZILLA"/>
		<reference ref_id="1166290" ref_url="https://bugzilla.suse.com/1166290" source="BUGZILLA"/>
		<reference ref_id="1167240" ref_url="https://bugzilla.suse.com/1167240" source="BUGZILLA"/>
		<reference ref_id="144694" ref_url="https://bugzilla.suse.com/144694" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5637" ref_url="https://www.suse.com/security/cve/CVE-2017-5637/" source="CVE"/>
		<reference ref_id="CVE-2018-10851" ref_url="https://www.suse.com/security/cve/CVE-2018-10851/" source="CVE"/>
		<reference ref_id="CVE-2018-14626" ref_url="https://www.suse.com/security/cve/CVE-2018-14626/" source="CVE"/>
		<reference ref_id="CVE-2019-0201" ref_url="https://www.suse.com/security/cve/CVE-2019-0201/" source="CVE"/>
		<reference ref_id="CVE-2019-11596" ref_url="https://www.suse.com/security/cve/CVE-2019-11596/" source="CVE"/>
		<reference ref_id="CVE-2019-15026" ref_url="https://www.suse.com/security/cve/CVE-2019-15026/" source="CVE"/>
		<reference ref_id="CVE-2019-3871" ref_url="https://www.suse.com/security/cve/CVE-2019-3871/" source="CVE"/>
		<reference ref_id="CVE-2020-5247" ref_url="https://www.suse.com/security/cve/CVE-2020-5247/" source="CVE"/>
		<reference ref_id="CVE-2020-9543" ref_url="https://www.suse.com/security/cve/CVE-2020-9543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006723.html" source="SUSE-SU"/>
		<description>
This update for ardana-ansible, ardana-barbican, ardana-db, ardana-monasca, ardana-mq, ardana-neutron, ardana-octavia, ardana-tempest, crowbar-core, crowbar-ha, crowbar-openstack, documentation-suse-openstack-cloud, memcached, openstack-manila, openstack-neutron, openstack-nova, pdns, python-amqp, rubygem-puma, zookeeper contains the following fixes:

Security fix for rubygem-puma:
- CVE-2020-5247: Fixed an issue where the newlines in headers according to Rack spec were not split (bsc#1165402)

Security fix for openstack-manila:

- CVE-2020-9543: Fixed an issue where an attacker could view, update, delete, or share resources that do not

Security fixes for memcached:

- CVE-2019-15026: Fixed a stack-based buffer over-read in conn_to_str() in memcached.c (bsc#1149110).
- CVE-2019-11596: Fixed NULL pointer dereference in process_lru_command() in memcached.c (bsc#1133817).

Security fixes for pdns:

- CVE-2019-3871: Fixed a denial of service with the HTTP remote backend when the attacker can send crafted DNS queries (bsc#1129734).
- CVE-2018-10851: Fixed a denial of service via crafted zone record (bnc#1114157).
- CVE-2018-14626: Fixed a denial of service by hiding DNSSEC records using a crafted DNS query (bsc#1114169).

Security fixes for zookeeper:

- CVE-2019-0201: Fixed an information disclosure in the ACL handling (bsc#1135773).
- CVE-2017-5637: Fixed incorrect input validation with wchp/wchc four letter words (bsc#1040519).

Changes in ardana-ansible:
- Update to version 8.0+git.1583432621.24fa60e:
  * Upgrade pre-checks in Cloud 8 and Cloud 9 (SOC-10300)

Changes in ardana-barbican:
- Update to version 8.0+git.1585152761.8ef3d61:
  * monitor ardana-node-cert (SOC-10873)

Changes in ardana-db:
- Update to version 8.0+git.1583944923.03cca6c:
  * monitor MySQL TLS certificate (SOC-10873)

Changes in ardana-monasca:
- Update to version 8.0+git.1583944894.38f023a:
  * Add certificate file check alarm (SOC-10873)

Changes in ardana-mq:
- Update to version 8.0+git.1583944811.dc14403:
  * monitor RabbitMQ TLS certificate (SOC-10873)

Changes in ardana-neutron:
- Update to version 8.0+git.1584715262.e4ea620:
  * Add symlink for neutron-fwaas.json.j2 (bsc#1166290)

Changes in ardana-octavia:
- Update to version 8.0+git.1585171918.418f5cf:
  * Reconfigure monitor if needed (SOC-10873)

- Update to version 8.0+git.1585168661.135c735:
  * fix Octavia client cert redeploy (SOC-10873)

- Update to version 8.0+git.1585152502.f15907a:
  * monitor Octavia client certificate (SOC-10873)

Changes in ardana-tempest:
- Update to version 8.0+git.1585311051.6ab5488:
  * Enable port-security feature in tempest(SOC-11027)

Changes in crowbar-core:
- Update to version 5.0+git.1585575551.16781d00d:
  * upgrade: Point to config dir instead of config file (SOC-11171)
  * upgrade: Do not call neutron-evacuate-lbaasv2-agent with use_crm (SOC-11171)

- Update to version 5.0+git.1585316726.670746c8c:
  * upgrade: Fix systemd unit listing (trivial)

- Update to version 5.0+git.1585213241.46f12f9be:
  * upgrade: Remove the assignement of crowbar-upgrade role (SOC-11166)

- Update to version 5.0+git.1585118470.eed9020de:
  * Update the default value of OS version (trivial)
  * Ignore CVE-2020-5267 in CI (bsc#1167240)
  * Ignore CVE-2020-10663 in CI (bsc#1167244)

- Update to version 5.0+git.1583911121.d6b4b4b1a:
  * ses: Make SES UI safe for unknown options (trivial)
  * ses: Use cinder user for nova (SOC-11119)
  * ses: Added helper for populating cinder volumes (SOC-11117)
  * ses: Add ses cookbook (SOC-11114)
  * ses: Configuration upload (SOC-11115)

- Update to version 5.0+git.1583309007.e3a8b81e9:
  * Ignore CVE-2020-8130 in CI (bsc#1164804)
  * Ignore CVE-2020-5247 (bsc#1165402)

Changes in crowbar-ha:
- Update to version 5.0+git.1585316176.344190f:
  * add ssl termination on haproxy (bsc#1149535)

Changes in crowbar-openstack:
- Update to version 5.0+git.1585304226.2164b7895:
  * nova: Fix migration numbers (trivial)

- Update to version 5.0+git.1584692779.369c58aca:
  * nova: Drop redundant disk_cachemodes (trivial)
  * nova: Add option to disable ephemeral on ceph (SOC-11119)
  * keystone: Register SES RadosGW endpoints (SOC-5270)
  * heat: Increase heat_register syncmark timeout (SOC-11103)
  * heat: Simplify domain registration code (SOC-11103)
  * nova: Setup CEPH secrets later (SOC-11141)
  * nova: Enable ephemeral volumes on SES (SOC-11119)
  * glance: Set SES as default for new deployments (SOC-11118)
  * cinder: Correctly show old internal backends (SOC-11117)
  * nova: SES integration (SOC-11117)
  * nova: Hound fixes (trivial)
  * nova: Better error handling when Cephx auth is failing (noref)
  * nova: delete libvirt secret snippet immediately (noref)
  * nova: reduce nesting of ceph management code (noref)
  * nova: Remove obsolete rbd/ceph attributes (trivial)
  * cinder: SES integration (SOC-11117)
  * cinder: Disable use_crowbar default (SOC-11117)
  * glance: SES integration (SOC-11118)

Changes in documentation-suse-openstack-cloud:
- Update to version 8.20200319:
  * Adding ses-integration docs to cloud 8 (noref)
  * Fix bsc-1130532. Add feedback
  * fix bsc-1130532

- Update to version 8.20200116:
  * Fixing links from suse.com/doc to new URL (noref)

- Update to version 8.20200224:
  * Designate: add instructions on using PowerDNS backend (SOC-11051)
  * Designate: recommend deploying DNS in a cluster in HA deployment (SOC-10636)
  * message to add non-admin node for public network (SOC-10658)
  * update designate deployment (SOC-8739)
  * add designate barclamp (SCRD-8739)
  * remove Designate name server instruction (bsc#1125357,SCRD-7649)

- Update to version 8.20200130:
  * Add instructions for lbaas v2 loadbalancers (SOC-10980) (#1253)

- Update to version 8.20191211:
  * Specify that manila-share should be installed on the control node (SOC-10938) (#1230)
  * Remove (commented) mention of phrases-decl.ent (trivial)

- Update to version 8.20191206:
  * Clarify keyring chown instructions for Ceph (bsc#1111180)
  * Clarify VSA/Ceph support in HOS 8 , SOC-10981 (bsc#144694)

- Update to version 8.20191205:
  * Update incorrect Manila install/setup instructions (SOC-10975)

- Update to version 8.20191029:
  * Supplement/UAdmin: Group guides on documentation.suse.com (trivial)

- Update to version 8.20191023:
  * fix instructions for TLS certitificate renewal (SOC-10846)

- Update to version 8.20191002:
  * Added missing edit (SOC-8480)
  * Adding Carl's second round of edits (SOC-8480)
  * Removing accidentally re-added guilabels (SOC-8480)
  * Applying Carl's edits (SOC-8480)
  * Optimizing PNGs (SOC-8480)
  * Removing guilabel complaint (SOC-8480)
  * Adding xi:include to commit (SOC-8480)
  * Add SSLCA-SelfSigned cert info to SOC Crowbar documentation (SOC-8480)
  * Add SSLCA-SelfSigned cert info to SOC Crowbar documentation (SOC-8480)

- Update to version 8.20190923:
  * remove zvm references, only in SOC6 (noref)

- Update to version 8.20190920:
  * remove workaround, leave description (bsc#1151206)
  * add qos to neutron not supported (bsc#1151206)

- Update to version 8.20190829:
  * add available clients, dedicated CLM (bsc#1148426)
  * add tempest to service components, dedicated CLM (bsc#1148426)

- Update to version 8.20190823:
  * Create CC-BY license file (noref)
  * for MariaDB update, db cluster must be running, healthy (bsc#1132852)

- Update to version 8.20190820:
  * Fix broken URLs (SOC-10109)

- Update to version 8.20190820:
  * add requirement for dummy entries in servers.yml (bsc#1146206)

- Update to version 8.20190816:
  * add workaround for partition image resize (bsc#1145498)

- Update to version 8.20190813:
  * MANAGEMENT network group cannot be changed, is required (SOC-10106)
  * remove NSX references from Crowbar deployment (SOC-10081)

Changes in memcached:
- version update to 1.5.17
  * bugfixes
    fix strncpy call in stats conns to avoid ASAN violation (bsc#1149110, CVE-2019-15026)
    extstore: fix indentation
    add error handling when calling dup function
    add unlock when item_cachedump malloc failed
    extstore: emulate pread(v) for macOS
    fix off-by-one in logger to allow CAS commands to be logged.
    use strdup for explicitly configured slab sizes
    move mem_requested from slabs.c to items.c (internal cleanup)
  * new features
    add server address to the 'stats conns' output
    log client connection id with fetchers and mutations
    Add a handler for seccomp crashes
- version update to 1.5.16
  * bugfixes
    When nsuffix is 0 space for flags hasn't been allocated so don't memcpy them.
- version update to 1.5.15
  * bugfixes
    Speed up incr/decr by replacing snprintf.
    Use correct buffer size for internal URI encoding.
    change some links from http to https
    Fix small memory leak in testapp.c.
    free window_global in slab_automove_extstore.c
    remove inline_ascii_response option
    -Y [filename] for ascii authentication mode
    fix: idle-timeout wasn't compatible with binprot
  * features
    -Y [authfile] enables an authentication mode for ASCII protocol.
- modified patches
  % memcached-autofoo.patch (refreshed)

- version update to 1.5.14
  * update -h output for -I (max item size)
  * fix segfault in 'lru' command (bsc#1133817, CVE-2019-11596)
  * fix compile error on centos7
  * extstore: error adjusting page_size after ext_path
  * extstore: fix segfault if page_count is too high.
  * close delete + incr item survival race bug
  * memcached-tool dump fix loss of exp value
  * Fix 'qw' in 'MemcachedTest.pm' so wait_ext_flush is exported properly
  * Experimental TLS support.
  * Basic implementation of TLS for memcached.
  * Improve Get And Touch documentation
  * fix INCR/DECR refcount leak for invalid items
- modified patches
  % memcached-autofoo.patch (refreshed)

- Version bump to 1.5.11:
  * extstore: balance IO thread queues
- Drop memcached-fix_test.patch that is present now upstream

- Add patch to fix aarch64, ppc64* and s390x tests:
  * memcached-fix_test.patch

- Fix linter errors regarding COPYING

- update to 1.5.10:
  * disruptive change in extstore: -o ext_page_count= is deprecated
    and no longer works. To specify size: -o ext_path=/d/m/e:500G
    extstore figures out the page count based on your desired page
    size. M|G|T|P supported.
  * extstore: Add basic JBOD support: ext_path can be specified
    multiple times for striping onto simimar devices
  * fix alignment issues on some ARM platforms for chunked items

- Update to 1.5.9:
  * Bugfix release.
  * Important note: if using --enable-seccomp, privilege dropping
    is no longer on by default. The feature is experimental and many
    users are reporting hard to diagnose problems on varied platforms.
  * Seccomp is now marked EXPERIMENTAL, and must be explicitly
    enabled by adding -o drop_privileges. Once we're more confident
    with the usability of the feature, it will be enabled in -o modern,
    like any other new change. You should only use it if you are
    willing to carefully test it, especially if you're a vendor or
    distribution.
  * Also important is a crash fix in extstore when using the ASCII
    protocol, large items, and running low on memory.

- update to 1.5.8:
  * Bugfixes for seccomp and extstore
  * Extstore platform portability has been greatly improved for ARM
    and 32bit systems
- includes changes from 1.5.7:
  * Fix alignment issues for 64bit ARM processors
  * Fix seccomp portability
  * Fix refcount leak with extstore while using binary touch commands

- turn on the testsuite again, it seems to pass server side,
  too

- Home directory shouldn't be world readable bsc#1077718
- Mention that this stream isn't affected by bsc#1085209,
  CVE-2018-1000127 to make the checker bots happy.

Changes in openstack-manila:
- Update to version manila-5.1.1.dev5:
  * Fix manila-tempest-minimal-dsvm-lvm-centos-7 job
  * share\_networks: enable project\_only API only

Changes in openstack-manila:
- Rebased patches:
  + cve-2020-9543-stable-pike.patch dropped (merged upstream)

- Update to version manila-5.1.1.dev5:
  * Fix manila-tempest-minimal-dsvm-lvm-centos-7 job
  * share\_networks: enable project\_only API only

Changes in openstack-neutron:
- Update to version neutron-11.0.9.dev63:
  * ovs agent: signal to plugin if tunnel refresh needed
  * Do not initialize snat-ns twice

Changes in openstack-neutron:
- Update to version neutron-11.0.9.dev63:
  * ovs agent: signal to plugin if tunnel refresh needed
  * Do not initialize snat-ns twice

Changes in openstack-nova:
- Update to version nova-16.1.9.dev61:
  * Avoid circular reference during serialization
  * Mask the token used to allow access to consoles
  * Improve metadata server performance with large security groups
  * Remove exp legacy-tempest-dsvm-full-devstack-plugin-nfs

- Update to version nova-16.1.9.dev54:
  * pike-only: remove broken non-voting ceph jobs
  * nova-live-migration: Wait for n-cpu services to come up after configuring Ceph
  * rt: only map compute node if we created it

Changes in openstack-nova:
- Update to version nova-16.1.9.dev61:
  * Avoid circular reference during serialization
  * Mask the token used to allow access to consoles
  * Improve metadata server performance with large security groups
  * Remove exp legacy-tempest-dsvm-full-devstack-plugin-nfs

- Update to version nova-16.1.9.dev54:
  * pike-only: remove broken non-voting ceph jobs
  * nova-live-migration: Wait for n-cpu services to come up after configuring Ceph
  * rt: only map compute node if we created it

Changes in pdns:
- Add missing 'BuildRequires: libmysqlclient-devel' to allow
  the package to build correctly.

- CVE-2019-3871-auth-4.1.6.patch: fixes insufficient validation in
  HTTP remote backend (bsc#1129734, CVE-2019-3871)

- CVE-2018-10851-auth-4.1.4.patch: fixes DoS via crafted zone record
  (bnc#1114157, CVE-2018-10851)
- CVE-2018-14626-auth-4.1.4.patch: fixes an issue allowing a
  remote user to craft a DNS query that will cause an answer without
  DNSSEC records to be inserted into the packet cache and be
  returned to clients asking for DNSSEC records, thus hiding
  the presence of DNSSEC signatures leading to a potential DoS
  (bsc#1114169, CVE-2018-14626)

Changes in python-amqp:
- Make it build for SLE12SP3:
  - remove pytest-sugar build dependency
  - used %doc macro instead of %license
- Removed patches that are already included in 2.4.2
  - 0002-Do_not_send_AAAA_DNS_request_when_domain_resolved_to_IPv4_address.patch (SOC-9144)
  - 0001-Always-treat-SSLError-timeouts-as-socket-timeouts-24.patch (bsc#1115904)
- Update to 2.4.2:
  - Added support for the Cygwin platform
  - Correct offset incrementation when parsing bitmaps.
  - Consequent bitmaps are now parsed correctly.
- Better call of py.test
- Add versions to dependencies
- Remove python-sasl from build dependencies
- Update to version 2.4.1
  * To avoid breaking the API basic_consume() now returns the consumer tag
    instead of a tuple when nowait is True.
  * Fix crash in basic_publish when broker does not support connection.blocked
    capability.
  * read_frame() is now Python 3 compatible for large payloads.
  * Support float read_timeout/write_timeout.
  * Always treat SSLError timeouts as socket timeouts.
  * Treat EWOULDBLOCK as timeout.
- from 2.4.0
  * Fix inconsistent frame_handler return value.
    The function returned by frame_handler is meant to return True
    once the complete message is received and the callback is called,
    False otherwise.
    This fixes the return value for messages with a body split across
    multiple frames, and heartbeat frames.
  * Don't default content_encoding to utf-8 for bytes.
    This is not an acceptable default as the content may not be
    valid utf-8, and even if it is, the producer likely does not
    expect the message to be decoded by the consumer.
  * Fix encoding of messages with multibyte characters.
    Body length was previously calculated using string length,
    which may be less than the length of the encoded body when
    it contains multibyte sequences. This caused the body of
    the frame to be truncated.
  * Respect content_encoding when encoding messages.
    Previously the content_encoding was ignored and messages
    were always encoded as utf-8. This caused messages to be
    incorrectly decoded if content_encoding is properly respected
    when decoding.
  * Fix AMQP protocol header for AMQP 0-9-1.
    Previously it was set to a different value for unknown reasons.
  * Add support for Python 3.7.
    Change direct SSLSocket instantiation with wrap_socket.
  * Add support for field type 'x' (byte array).
  * If there is an exception raised on Connection.connect or
    Connection.close, ensure that the underlying transport socket
    is closed.  Adjust exception message on connection errors as well.
  * TCP_USER_TIMEOUT has to be excluded from KNOWN_TCP_OPTS in BSD platforms.
  * Handle negative acknowledgments.
  * Added integration tests.
  * Fix basic_consume() with no consumer_tag provided.
  * Improved empty AMQPError string representation.
  * Drain events before publish.
    This is needed to capture out of memory messages for clients that only
    publish. Otherwise on_blocked is never called.
  * Don't revive channel when connection is closing.
    When connection is closing don't raise error when Channel.Close
    method is received.

Changes in zookeeper:
- Apply 0002-Apply-patch-to-resolve-CVE-2019-0201.patch
  This applies the patch for ZOOKEEPER-1392 to resolve CVE-2019-0201
  Should not allow to read ACL when not authorized to read node 
  (bsc#1135773)

- Various cleanups in spec file

- Fixed off-by-one in zkCleanTRX.sh and made output more useful (bsc#1048688, FATE#323204)

- Fixed ExecStartPre statment in service file

- added zkCleanTRX.sh to clean up 0 length transaction logs

- Update to to zookeeper-3.4.10 (bsc#1040519)
  * Fixes CVE-2017-5637
- Remove Changes.txt (missing as of 3.4.10)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-22"/>
	<updated date="2020-04-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040519">SUSE bug 1040519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048688">SUSE bug 1048688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077718">SUSE bug 1077718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111180">SUSE bug 1111180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114157">SUSE bug 1114157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114169">SUSE bug 1114169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115904">SUSE bug 1115904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125357">SUSE bug 1125357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129734">SUSE bug 1129734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132852">SUSE bug 1132852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133817">SUSE bug 1133817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135773">SUSE bug 1135773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145498">SUSE bug 1145498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146206">SUSE bug 1146206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148426">SUSE bug 1148426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149110">SUSE bug 1149110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149535">SUSE bug 1149535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151206">SUSE bug 1151206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165402">SUSE bug 1165402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165643">SUSE bug 1165643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166290">SUSE bug 1166290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167240">SUSE bug 1167240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/144694">SUSE bug 144694</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5637/">CVE-2017-5637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5637">CVE-2017-5637 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10851/">CVE-2018-10851 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10851">CVE-2018-10851 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14626/">CVE-2018-14626 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14626">CVE-2018-14626 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0201/">CVE-2019-0201 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0201">CVE-2019-0201 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11596/">CVE-2019-11596 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11596">CVE-2019-11596 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15026/">CVE-2019-15026 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15026">CVE-2019-15026 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-3871/">CVE-2019-3871 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3871">CVE-2019-3871 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-5247/">CVE-2020-5247 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5247">CVE-2020-5247 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9543/">CVE-2020-9543 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9543">CVE-2020-9543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597667" comment="crowbar-core-5.0+git.1585575551.16781d00d-3.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597668" comment="crowbar-core-branding-upstream-5.0+git.1585575551.16781d00d-3.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597669" comment="crowbar-ha-5.0+git.1585316176.344190f-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597670" comment="crowbar-openstack-5.0+git.1585304226.2164b7895-4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597671" comment="documentation-suse-openstack-cloud-deployment-8.20200319-1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597176" comment="documentation-suse-openstack-cloud-supplement-8.20200319-1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597177" comment="documentation-suse-openstack-cloud-upstream-admin-8.20200319-1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597178" comment="documentation-suse-openstack-cloud-upstream-user-8.20200319-1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597180" comment="memcached-1.5.17-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597181" comment="openstack-manila-5.1.1~dev5-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597182" comment="openstack-manila-api-5.1.1~dev5-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597183" comment="openstack-manila-data-5.1.1~dev5-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597184" comment="openstack-manila-doc-5.1.1~dev5-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597185" comment="openstack-manila-scheduler-5.1.1~dev5-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597186" comment="openstack-manila-share-5.1.1~dev5-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597187" comment="openstack-neutron-11.0.9~dev63-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597188" comment="openstack-neutron-dhcp-agent-11.0.9~dev63-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597189" comment="openstack-neutron-doc-11.0.9~dev63-3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597190" comment="openstack-neutron-ha-tool-11.0.9~dev63-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597191" comment="openstack-neutron-l3-agent-11.0.9~dev63-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597192" comment="openstack-neutron-linuxbridge-agent-11.0.9~dev63-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597193" comment="openstack-neutron-macvtap-agent-11.0.9~dev63-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597194" comment="openstack-neutron-metadata-agent-11.0.9~dev63-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597195" comment="openstack-neutron-metering-agent-11.0.9~dev63-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597196" comment="openstack-neutron-openvswitch-agent-11.0.9~dev63-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597197" comment="openstack-neutron-server-11.0.9~dev63-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597198" comment="openstack-nova-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597199" comment="openstack-nova-api-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597200" comment="openstack-nova-cells-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597201" comment="openstack-nova-compute-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597202" comment="openstack-nova-conductor-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597203" comment="openstack-nova-console-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597204" comment="openstack-nova-consoleauth-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597205" comment="openstack-nova-doc-16.1.9~dev61-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597206" comment="openstack-nova-novncproxy-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597207" comment="openstack-nova-placement-api-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597208" comment="openstack-nova-scheduler-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597209" comment="openstack-nova-serialproxy-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597210" comment="openstack-nova-vncproxy-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597213" comment="python-amqp-2.4.2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597214" comment="python-manila-5.1.1~dev5-3.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597215" comment="python-neutron-11.0.9~dev63-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597216" comment="python-nova-16.1.9~dev61-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597672" comment="ruby2.1-rubygem-puma-2.16.0-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597236" comment="zookeeper-server-3.4.10-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148836" version="1" class="patch">
	<metadata>
		<title>Security update for pam_radius (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1141670" ref_url="https://bugzilla.suse.com/1141670" source="BUGZILLA"/>
		<reference ref_id="1163933" ref_url="https://bugzilla.suse.com/1163933" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9542" ref_url="https://www.suse.com/security/cve/CVE-2015-9542/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006742.html" source="SUSE-SU"/>
		<description>
This update for pam_radius fixes the following issues:

- CVE-2015-9542: Fixed a buffer overflow in password field (bsc#1163933).
- On s390x didn't decrypt passwords correctly (bsc#1141670).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-27"/>
	<updated date="2020-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141670">SUSE bug 1141670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163933">SUSE bug 1163933</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9542/">CVE-2015-9542 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9542">CVE-2015-9542 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530906" comment="pam_radius-1.3.16-239.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530907" comment="pam_radius-32bit-1.3.16-239.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148837" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1155321" ref_url="https://bugzilla.suse.com/1155321" source="BUGZILLA"/>
		<reference ref_id="1156318" ref_url="https://bugzilla.suse.com/1156318" source="BUGZILLA"/>
		<reference ref_id="1159329" ref_url="https://bugzilla.suse.com/1159329" source="BUGZILLA"/>
		<reference ref_id="1161719" ref_url="https://bugzilla.suse.com/1161719" source="BUGZILLA"/>
		<reference ref_id="1163809" ref_url="https://bugzilla.suse.com/1163809" source="BUGZILLA"/>
		<reference ref_id="1165528" ref_url="https://bugzilla.suse.com/1165528" source="BUGZILLA"/>
		<reference ref_id="1169658" ref_url="https://bugzilla.suse.com/1169658" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8625" ref_url="https://www.suse.com/security/cve/CVE-2019-8625/" source="CVE"/>
		<reference ref_id="CVE-2019-8710" ref_url="https://www.suse.com/security/cve/CVE-2019-8710/" source="CVE"/>
		<reference ref_id="CVE-2019-8720" ref_url="https://www.suse.com/security/cve/CVE-2019-8720/" source="CVE"/>
		<reference ref_id="CVE-2019-8743" ref_url="https://www.suse.com/security/cve/CVE-2019-8743/" source="CVE"/>
		<reference ref_id="CVE-2019-8764" ref_url="https://www.suse.com/security/cve/CVE-2019-8764/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8769" ref_url="https://www.suse.com/security/cve/CVE-2019-8769/" source="CVE"/>
		<reference ref_id="CVE-2019-8771" ref_url="https://www.suse.com/security/cve/CVE-2019-8771/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8783" ref_url="https://www.suse.com/security/cve/CVE-2019-8783/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8811" ref_url="https://www.suse.com/security/cve/CVE-2019-8811/" source="CVE"/>
		<reference ref_id="CVE-2019-8812" ref_url="https://www.suse.com/security/cve/CVE-2019-8812/" source="CVE"/>
		<reference ref_id="CVE-2019-8813" ref_url="https://www.suse.com/security/cve/CVE-2019-8813/" source="CVE"/>
		<reference ref_id="CVE-2019-8814" ref_url="https://www.suse.com/security/cve/CVE-2019-8814/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8816" ref_url="https://www.suse.com/security/cve/CVE-2019-8816/" source="CVE"/>
		<reference ref_id="CVE-2019-8819" ref_url="https://www.suse.com/security/cve/CVE-2019-8819/" source="CVE"/>
		<reference ref_id="CVE-2019-8820" ref_url="https://www.suse.com/security/cve/CVE-2019-8820/" source="CVE"/>
		<reference ref_id="CVE-2019-8823" ref_url="https://www.suse.com/security/cve/CVE-2019-8823/" source="CVE"/>
		<reference ref_id="CVE-2019-8835" ref_url="https://www.suse.com/security/cve/CVE-2019-8835/" source="CVE"/>
		<reference ref_id="CVE-2019-8844" ref_url="https://www.suse.com/security/cve/CVE-2019-8844/" source="CVE"/>
		<reference ref_id="CVE-2019-8846" ref_url="https://www.suse.com/security/cve/CVE-2019-8846/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-11793" ref_url="https://www.suse.com/security/cve/CVE-2020-11793/" source="CVE"/>
		<reference ref_id="CVE-2020-3862" ref_url="https://www.suse.com/security/cve/CVE-2020-3862/" source="CVE"/>
		<reference ref_id="CVE-2020-3864" ref_url="https://www.suse.com/security/cve/CVE-2020-3864/" source="CVE"/>
		<reference ref_id="CVE-2020-3865" ref_url="https://www.suse.com/security/cve/CVE-2020-3865/" source="CVE"/>
		<reference ref_id="CVE-2020-3867" ref_url="https://www.suse.com/security/cve/CVE-2020-3867/" source="CVE"/>
		<reference ref_id="CVE-2020-3868" ref_url="https://www.suse.com/security/cve/CVE-2020-3868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.28.1 fixes the following issues:

Security issues fixed:

- CVE-2020-10018: Fixed a denial of service because the m_deferredFocusedNodeChange data structure was mishandled (bsc#1165528).
- CVE-2020-11793: Fixed a potential arbitrary code execution caused by a use-after-free vulnerability (bsc#1169658).
- CVE-2019-8835: Fixed multiple memory corruption issues (bsc#1161719).
- CVE-2019-8844: Fixed multiple memory corruption issues (bsc#1161719).
- CVE-2019-8846: Fixed a use-after-free issue (bsc#1161719).
- CVE-2020-3862: Fixed a memory handling issue (bsc#1163809).
- CVE-2020-3867: Fixed an XSS issue (bsc#1163809).
- CVE-2020-3868: Fixed multiple memory corruption issues that could have lead to arbitrary code execution (bsc#1163809).
- CVE-2020-3864,CVE-2020-3865: Fixed logic issues in the DOM object context handling (bsc#1163809).

Non-security issues fixed:

- Add API to enable Process Swap on (Cross-site) Navigation.
- Add user messages API for the communication with the web extension.
- Add support for same-site cookies.
- Service workers are enabled by default.
- Add support for Pointer Lock API.
- Add flatpak sandbox support.
- Make ondemand hardware acceleration policy never leave accelerated compositing mode.
- Always use a light theme for rendering form controls.
- Add about:gpu to show information about the graphics stack.
- Fixed issues while trying to play a video on NextCloud.
- Fixed vertical alignment of text containing arabic diacritics.
- Fixed build with icu 65.1.
- Fixed page loading errors with websites using HSTS.
- Fixed web process crash when displaying a KaTeX formula.
- Fixed several crashes and rendering issues.
- Switched to a single web process for Evolution and geary (bsc#1159329).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-29"/>
	<updated date="2020-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159329">SUSE bug 1159329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161719">SUSE bug 1161719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165528">SUSE bug 1165528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169658">SUSE bug 1169658</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8625/">CVE-2019-8625 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8625">CVE-2019-8625 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8710/">CVE-2019-8710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8710">CVE-2019-8710 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8720/">CVE-2019-8720 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8720">CVE-2019-8720 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8743/">CVE-2019-8743 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8743">CVE-2019-8743 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8764/">CVE-2019-8764 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8764">CVE-2019-8764 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8766">CVE-2019-8766 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8769/">CVE-2019-8769 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8769">CVE-2019-8769 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8771/">CVE-2019-8771 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8771">CVE-2019-8771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8782">CVE-2019-8782 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8783/">CVE-2019-8783 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8783">CVE-2019-8783 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8808">CVE-2019-8808 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8811/">CVE-2019-8811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8811">CVE-2019-8811 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8812/">CVE-2019-8812 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8812">CVE-2019-8812 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8813/">CVE-2019-8813 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8813">CVE-2019-8813 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8814/">CVE-2019-8814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8814">CVE-2019-8814 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8815">CVE-2019-8815 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8816/">CVE-2019-8816 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8816">CVE-2019-8816 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8819/">CVE-2019-8819 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8819">CVE-2019-8819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8820/">CVE-2019-8820 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8820">CVE-2019-8820 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8823/">CVE-2019-8823 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8823">CVE-2019-8823 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8835/">CVE-2019-8835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8835">CVE-2019-8835 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8844/">CVE-2019-8844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8844">CVE-2019-8844 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8846/">CVE-2019-8846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8846">CVE-2019-8846 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10018">CVE-2020-10018 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11793/">CVE-2020-11793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11793">CVE-2020-11793 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-3862/">CVE-2020-3862 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3862">CVE-2020-3862 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-3864/">CVE-2020-3864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3864">CVE-2020-3864 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3865/">CVE-2020-3865 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3865">CVE-2020-3865 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3867/">CVE-2020-3867 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3867">CVE-2020-3867 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3868/">CVE-2020-3868 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3868">CVE-2020-3868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148838" version="1" class="patch">
	<metadata>
		<title>Security update for shibboleth-sp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1157471" ref_url="https://bugzilla.suse.com/1157471" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19191" ref_url="https://www.suse.com/security/cve/CVE-2019-19191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006355.html" source="SUSE-SU"/>
		<description>
This update for shibboleth-sp fixes the following issues:

Security issue fixed:

- CVE-2019-19191: Fixed escalation to root by fixing ownership of log files (bsc#1157471).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-16"/>
	<updated date="2020-01-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1157471">SUSE bug 1157471</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19191/">CVE-2019-19191 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19191">CVE-2019-19191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530916" comment="libshibsp-lite6-2.5.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530917" comment="libshibsp6-2.5.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530918" comment="shibboleth-sp-2.5.5-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148839" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1170170" ref_url="https://bugzilla.suse.com/1170170" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12059" ref_url="https://www.suse.com/security/cve/CVE-2020-12059/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006768.html" source="SUSE-SU"/>
		<description>
This update for ceph fixes the following issues:

- CVE-2020-12059: Fixed a denial of service caused by a specially crafted XML payload on POST requests (bsc#1170170).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-30"/>
	<updated date="2020-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170170">SUSE bug 1170170</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12059/">CVE-2020-12059 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12059">CVE-2020-12059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555697" comment="ceph-common-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555698" comment="libcephfs2-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555699" comment="librados2-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555700" comment="libradosstriper1-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555701" comment="librbd1-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555702" comment="librgw2-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555703" comment="python-cephfs-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555704" comment="python-rados-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555705" comment="python-rbd-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555706" comment="python-rgw-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148840" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1155419" ref_url="https://bugzilla.suse.com/1155419" source="BUGZILLA"/>
		<reference ref_id="1160471" ref_url="https://bugzilla.suse.com/1160471" source="BUGZILLA"/>
		<reference ref_id="1170441" ref_url="https://bugzilla.suse.com/1170441" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<reference ref_id="CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006773.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2019-15690: Fixed a heap buffer overflow (bsc#1160471).
- CVE-2019-15681: Fixed a memory leak which could have allowed to a remote attacker to read stack memory (bsc#1155419).
- CVE-2019-20788: Fixed a integer overflow and heap-based buffer overflow via a large height or width value (bsc#1170441).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-04"/>
	<updated date="2020-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160471">SUSE bug 1160471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170441">SUSE bug 1170441</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15681">CVE-2019-15681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15690">CVE-2019-15690 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20788">CVE-2019-20788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530919" comment="libvncclient0-0.9.9-17.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530920" comment="libvncserver0-0.9.9-17.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148841" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1166844" ref_url="https://bugzilla.suse.com/1166844" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006779.html" source="SUSE-SU"/>
		<description>
This update for icu fixes the following issues:

- CVE-2020-10531: Fixed integer overflow in UnicodeString:doAppend() (bsc#1166844).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1166844">SUSE bug 1166844</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10531">CVE-2020-10531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530921" comment="libicu-doc-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530922" comment="libicu52_1-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530923" comment="libicu52_1-32bit-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530924" comment="libicu52_1-data-52.1-8.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148842" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1170771" ref_url="https://bugzilla.suse.com/1170771" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006783.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-12243: Fixed a denial of service related to recursive filters (bsc#1170771).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12243">CVE-2020-12243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530925" comment="libldap-2_4-2-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530926" comment="libldap-2_4-2-32bit-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530927" comment="openldap2-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530928" comment="openldap2-back-meta-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530929" comment="openldap2-client-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530930" comment="openldap2-doc-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530931" comment="openldap2-ppolicy-check-password-1.2-18.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148843" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1170643" ref_url="https://bugzilla.suse.com/1170643" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3899" ref_url="https://www.suse.com/security/cve/CVE-2020-3899/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006800.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Security issue fixed:

- CVE-2020-3899: Fixed a memory consumption issue that could have led to remote code execution (bsc#1170643).

Non-security issues fixed:

- Update to version 2.28.2 (bsc#1170643):
  + Fix excessive CPU usage due to GdkFrameClock not being stopped.
  + Fix UI process crash when EGL_WL_bind_wayland_display extension
    is not available.
  + Fix position of select popup menus in X11.
  + Fix playing of Youtube 'live stream'/H264 URLs.
  + Fix a crash under X11 when cairo uses xcb.
  + Fix the build in MIPS64.
  + Fix several crashes and rendering issues.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3899/">CVE-2020-3899 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3899">CVE-2020-3899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530932" comment="libjavascriptcoregtk-4_0-18-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530933" comment="libwebkit2gtk-4_0-37-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530934" comment="libwebkit2gtk3-lang-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530935" comment="typelib-1_0-JavaScriptCore-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530936" comment="typelib-1_0-WebKit2-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530938" comment="webkit2gtk-4_0-injected-bundles-2.28.2-2.53.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148844" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1170603" ref_url="https://bugzilla.suse.com/1170603" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12268" ref_url="https://www.suse.com/security/cve/CVE-2020-12268/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006798.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.52 fixes the following issues:

- CVE-2020-12268: Fixed a heap-based buffer overflow in jbig2_image_compose (bsc#1170603).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170603">SUSE bug 1170603</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-12268/">CVE-2020-12268 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12268">CVE-2020-12268 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530940" comment="ghostscript-9.52-23.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530941" comment="ghostscript-x11-9.52-23.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530942" comment="libspectre1-0.2.7-12.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148845" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1171186" ref_url="https://bugzilla.suse.com/1171186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388/" source="CVE"/>
		<reference ref_id="CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to version 68.8.0 ESR (bsc#1171186):

- CVE-2020-12387: Use-after-free during worker shutdown
- CVE-2020-12388: Sandbox escape with improperly guarded Access Tokens
- CVE-2020-12389: Sandbox escape with improperly separated process types
- CVE-2020-6831: Buffer overflow in SCTP chunk input validation
- CVE-2020-12392: Arbitrary local file access with 'Copy as cURL'
- CVE-2020-12393: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection
- CVE-2020-12395: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12387">CVE-2020-12387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12388">CVE-2020-12388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12389">CVE-2020-12389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12392">CVE-2020-12392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12393">CVE-2020-12393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12395">CVE-2020-12395 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6831">CVE-2020-6831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530943" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530945" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148846" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1169659" ref_url="https://bugzilla.suse.com/1169659" source="BUGZILLA"/>
		<reference ref_id="1170313" ref_url="https://bugzilla.suse.com/1170313" source="BUGZILLA"/>
		<reference ref_id="1170423" ref_url="https://bugzilla.suse.com/1170423" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519/" source="CVE"/>
		<reference ref_id="CVE-2019-12520" ref_url="https://www.suse.com/security/cve/CVE-2019-12520/" source="CVE"/>
		<reference ref_id="CVE-2019-12521" ref_url="https://www.suse.com/security/cve/CVE-2019-12521/" source="CVE"/>
		<reference ref_id="CVE-2019-12524" ref_url="https://www.suse.com/security/cve/CVE-2019-12524/" source="CVE"/>
		<reference ref_id="CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006808.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2019-12519, CVE-2019-12521: fixes incorrect buffer handling that can 
  result in cache poisoning, remote execution, and denial of service attacks
  when processing ESI responses (bsc#1169659).
- CVE-2020-11945: fixes a potential remote execution vulnerability
  when using HTTP Digest Authentication (bsc#1170313).
- CVE-2019-12520, CVE-2019-12524: fixes a potential ACL bypass, cache-bypass
  and cross-site scripting attack when processing invalid HTTP
  Request messages (bsc#1170423).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-08"/>
	<updated date="2020-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169659">SUSE bug 1169659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170313">SUSE bug 1170313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170423">SUSE bug 1170423</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12519">CVE-2019-12519 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12520/">CVE-2019-12520 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12520">CVE-2019-12520 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12521/">CVE-2019-12521 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12521">CVE-2019-12521 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12524/">CVE-2019-12524 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12524">CVE-2019-12524 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11945">CVE-2020-11945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530946" comment="squid-3.5.21-26.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148847" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1168404" ref_url="https://bugzilla.suse.com/1168404" source="BUGZILLA"/>
		<reference ref_id="1168407" ref_url="https://bugzilla.suse.com/1168407" source="BUGZILLA"/>
		<reference ref_id="1169066" ref_url="https://bugzilla.suse.com/1169066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1927" ref_url="https://www.suse.com/security/cve/CVE-2020-1927/" source="CVE"/>
		<reference ref_id="CVE-2020-1934" ref_url="https://www.suse.com/security/cve/CVE-2020-1934/" source="CVE"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006814.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-1934: mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server (bsc#1168404).
- CVE-2020-1927: mod_rewrite configurations vulnerable to open redirect (bsc#1168407).
- CVE-2020-1938: mod_proxy_ajp: Add 'secret' parameter to proxy workers to implement legacy AJP13 authentication (bsc#1169066).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-13"/>
	<updated date="2020-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168404">SUSE bug 1168404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168407">SUSE bug 1168407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169066">SUSE bug 1169066</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1927/">CVE-2020-1927 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1927">CVE-2020-1927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1934/">CVE-2020-1934 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1934">CVE-2020-1934 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530955" comment="apache2-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530956" comment="apache2-doc-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530957" comment="apache2-example-pages-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530958" comment="apache2-prefork-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530959" comment="apache2-utils-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530960" comment="apache2-worker-2.4.23-29.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148848" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1056134" ref_url="https://bugzilla.suse.com/1056134" source="BUGZILLA"/>
		<reference ref_id="1087813" ref_url="https://bugzilla.suse.com/1087813" source="BUGZILLA"/>
		<reference ref_id="1120386" ref_url="https://bugzilla.suse.com/1120386" source="BUGZILLA"/>
		<reference ref_id="1133147" ref_url="https://bugzilla.suse.com/1133147" source="BUGZILLA"/>
		<reference ref_id="1137325" ref_url="https://bugzilla.suse.com/1137325" source="BUGZILLA"/>
		<reference ref_id="1145929" ref_url="https://bugzilla.suse.com/1145929" source="BUGZILLA"/>
		<reference ref_id="1149591" ref_url="https://bugzilla.suse.com/1149591" source="BUGZILLA"/>
		<reference ref_id="1154118" ref_url="https://bugzilla.suse.com/1154118" source="BUGZILLA"/>
		<reference ref_id="1154844" ref_url="https://bugzilla.suse.com/1154844" source="BUGZILLA"/>
		<reference ref_id="1155689" ref_url="https://bugzilla.suse.com/1155689" source="BUGZILLA"/>
		<reference ref_id="1157155" ref_url="https://bugzilla.suse.com/1157155" source="BUGZILLA"/>
		<reference ref_id="1157157" ref_url="https://bugzilla.suse.com/1157157" source="BUGZILLA"/>
		<reference ref_id="1157303" ref_url="https://bugzilla.suse.com/1157303" source="BUGZILLA"/>
		<reference ref_id="1157804" ref_url="https://bugzilla.suse.com/1157804" source="BUGZILLA"/>
		<reference ref_id="1158021" ref_url="https://bugzilla.suse.com/1158021" source="BUGZILLA"/>
		<reference ref_id="1158642" ref_url="https://bugzilla.suse.com/1158642" source="BUGZILLA"/>
		<reference ref_id="1158819" ref_url="https://bugzilla.suse.com/1158819" source="BUGZILLA"/>
		<reference ref_id="1159199" ref_url="https://bugzilla.suse.com/1159199" source="BUGZILLA"/>
		<reference ref_id="1159285" ref_url="https://bugzilla.suse.com/1159285" source="BUGZILLA"/>
		<reference ref_id="1159297" ref_url="https://bugzilla.suse.com/1159297" source="BUGZILLA"/>
		<reference ref_id="1159841" ref_url="https://bugzilla.suse.com/1159841" source="BUGZILLA"/>
		<reference ref_id="1159908" ref_url="https://bugzilla.suse.com/1159908" source="BUGZILLA"/>
		<reference ref_id="1159910" ref_url="https://bugzilla.suse.com/1159910" source="BUGZILLA"/>
		<reference ref_id="1159911" ref_url="https://bugzilla.suse.com/1159911" source="BUGZILLA"/>
		<reference ref_id="1159912" ref_url="https://bugzilla.suse.com/1159912" source="BUGZILLA"/>
		<reference ref_id="1160195" ref_url="https://bugzilla.suse.com/1160195" source="BUGZILLA"/>
		<reference ref_id="1161586" ref_url="https://bugzilla.suse.com/1161586" source="BUGZILLA"/>
		<reference ref_id="1162227" ref_url="https://bugzilla.suse.com/1162227" source="BUGZILLA"/>
		<reference ref_id="1162928" ref_url="https://bugzilla.suse.com/1162928" source="BUGZILLA"/>
		<reference ref_id="1162929" ref_url="https://bugzilla.suse.com/1162929" source="BUGZILLA"/>
		<reference ref_id="1162931" ref_url="https://bugzilla.suse.com/1162931" source="BUGZILLA"/>
		<reference ref_id="1163508" ref_url="https://bugzilla.suse.com/1163508" source="BUGZILLA"/>
		<reference ref_id="1163971" ref_url="https://bugzilla.suse.com/1163971" source="BUGZILLA"/>
		<reference ref_id="1164009" ref_url="https://bugzilla.suse.com/1164009" source="BUGZILLA"/>
		<reference ref_id="1164051" ref_url="https://bugzilla.suse.com/1164051" source="BUGZILLA"/>
		<reference ref_id="1164069" ref_url="https://bugzilla.suse.com/1164069" source="BUGZILLA"/>
		<reference ref_id="1164078" ref_url="https://bugzilla.suse.com/1164078" source="BUGZILLA"/>
		<reference ref_id="1164846" ref_url="https://bugzilla.suse.com/1164846" source="BUGZILLA"/>
		<reference ref_id="1165111" ref_url="https://bugzilla.suse.com/1165111" source="BUGZILLA"/>
		<reference ref_id="1165311" ref_url="https://bugzilla.suse.com/1165311" source="BUGZILLA"/>
		<reference ref_id="1165873" ref_url="https://bugzilla.suse.com/1165873" source="BUGZILLA"/>
		<reference ref_id="1165881" ref_url="https://bugzilla.suse.com/1165881" source="BUGZILLA"/>
		<reference ref_id="1165984" ref_url="https://bugzilla.suse.com/1165984" source="BUGZILLA"/>
		<reference ref_id="1165985" ref_url="https://bugzilla.suse.com/1165985" source="BUGZILLA"/>
		<reference ref_id="1167421" ref_url="https://bugzilla.suse.com/1167421" source="BUGZILLA"/>
		<reference ref_id="1167423" ref_url="https://bugzilla.suse.com/1167423" source="BUGZILLA"/>
		<reference ref_id="1167629" ref_url="https://bugzilla.suse.com/1167629" source="BUGZILLA"/>
		<reference ref_id="1168075" ref_url="https://bugzilla.suse.com/1168075" source="BUGZILLA"/>
		<reference ref_id="1168295" ref_url="https://bugzilla.suse.com/1168295" source="BUGZILLA"/>
		<reference ref_id="1168424" ref_url="https://bugzilla.suse.com/1168424" source="BUGZILLA"/>
		<reference ref_id="1168829" ref_url="https://bugzilla.suse.com/1168829" source="BUGZILLA"/>
		<reference ref_id="1168854" ref_url="https://bugzilla.suse.com/1168854" source="BUGZILLA"/>
		<reference ref_id="1170056" ref_url="https://bugzilla.suse.com/1170056" source="BUGZILLA"/>
		<reference ref_id="1170345" ref_url="https://bugzilla.suse.com/1170345" source="BUGZILLA"/>
		<reference ref_id="1170778" ref_url="https://bugzilla.suse.com/1170778" source="BUGZILLA"/>
		<reference ref_id="1170847" ref_url="https://bugzilla.suse.com/1170847" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18255" ref_url="https://www.suse.com/security/cve/CVE-2017-18255/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-21008" ref_url="https://www.suse.com/security/cve/CVE-2018-21008/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="CVE-2019-18675" ref_url="https://www.suse.com/security/cve/CVE-2019-18675/" source="CVE"/>
		<reference ref_id="CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066/" source="CVE"/>
		<reference ref_id="CVE-2019-19319" ref_url="https://www.suse.com/security/cve/CVE-2019-19319/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-19966" ref_url="https://www.suse.com/security/cve/CVE-2019-19966/" source="CVE"/>
		<reference ref_id="CVE-2019-20054" ref_url="https://www.suse.com/security/cve/CVE-2019-20054/" source="CVE"/>
		<reference ref_id="CVE-2019-20096" ref_url="https://www.suse.com/security/cve/CVE-2019-20096/" source="CVE"/>
		<reference ref_id="CVE-2019-3701" ref_url="https://www.suse.com/security/cve/CVE-2019-3701/" source="CVE"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2019-9455" ref_url="https://www.suse.com/security/cve/CVE-2019-9455/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690/" source="CVE"/>
		<reference ref_id="CVE-2020-10720" ref_url="https://www.suse.com/security/cve/CVE-2020-10720/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11494" ref_url="https://www.suse.com/security/cve/CVE-2020-11494/" source="CVE"/>
		<reference ref_id="CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608/" source="CVE"/>
		<reference ref_id="CVE-2020-11609" ref_url="https://www.suse.com/security/cve/CVE-2020-11609/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-8992" ref_url="https://www.suse.com/security/cve/CVE-2020-8992/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-11494: An issue was discovered in slc_bump in drivers/net/can/slcan.c, which allowed attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL (bnc#1168424).
- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bnc#1167629).
- CVE-2020-8647: Fixed a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bnc#1162929).
- CVE-2020-8649: Fixed a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bnc#1162931).
- CVE-2020-9383: Fixed an issue in set_fdc in drivers/block/floppy.c, which leads to a wait_til_ready out-of-bounds read (bnc#1165111).
- CVE-2019-9458: In the video driver there was a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed (bnc#1168295).
- CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a system crash (bnc#1120386).
- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bnc#1159285).
- CVE-2020-11609: Fixed a NULL pointer dereference in the stv06xx subsystem caused by mishandling invalid descriptors (bnc#1168854).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bnc#1170345).
- CVE-2020-11608: Fixed an issue in drivers/media/usb/gspca/ov519.c caused by a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bnc#1168829).
- CVE-2017-18255: The perf_cpu_time_max_percent_handler function in kernel/events/core.c allowed local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation (bnc#1087813).
- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).
- CVE-2020-2732: A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest (bnc#1163971).
- CVE-2019-5108: Fixed a denial-of-service vulnerability caused by triggering AP to send IAPP location updates for stations before the required authentication process has completed (bnc#1159912).
- CVE-2020-8992: ext4_protect_reserved_inode in fs/ext4/block_validity.c allowed attackers to cause a denial of service (soft lockup) via a crafted journal size (bnc#1164069).
- CVE-2018-21008: Fixed a use-after-free which could be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c (bnc#1149591).
- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bnc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bnc#1157155).
- CVE-2019-18675: Fixed an integer overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bnc#1157804).
- CVE-2019-14615: Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may have allowed an unauthenticated user to potentially enable information disclosure via local access (bnc#1160195, bsc#1165881).
- CVE-2019-19965: Fixed a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bnc#1159911).
- CVE-2019-20054: Fixed a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bnc#1159910).
- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bnc#1159908).
- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bnc#1159841).
- CVE-2019-19447: Fixed an issue with mounting a crafted ext4 filesystem image, performing some operations, and unmounting could lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c (bnc#1158819).
- CVE-2019-19319: Fixed an issue with a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call (bnc#1158021).
- CVE-2019-19767: Fixed mishandling of ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c (bnc#1159297).
- CVE-2019-11091,CVE-2018-12126,CVE-2018-12130,CVE-2018-12127: Earlier mitigations for the 'MDS' Microarchitectural Data Sampling attacks were not complete.
  An additional fix was added to the x86_64 fast systemcall path to further mitigate these attacks. (bsc#1164846 bsc#1170847)


The following non-security bugs were fixed:

- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).
- blktrace: fix dereference after null check (bsc#1159285).
- blktrace: fix trace mutex deadlock (bsc#1159285).
- btrfs: fix btrfs_wait_ordered_range() so that it waits for all ordered extents (bsc#1163508).
- btrfs: fix panic during relocation after ENOSPC before writeback happens (bsc#1163508).
- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1158642)
- btrfs: relocation: fix reloc_root lifespan and access (bsc#1164009).
- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).
- fix PageHeadHuge() race with THP split (VM Functionality, bsc#1165311).
- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).
- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).
- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).
- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).
- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).
- input: add safety guards to input_set_keycode() (bsc#1168075).
- ipv4: correct gso_size for UFO (bsc#1154844).
- ipv6: fix memory accounting during ipv6 queue expire (bsc#1162227) (bsc#1162227).
- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).
- md: add mddev-&gt;pers to avoid potential NULL pointer dereference (bsc#1056134).
- md/bitmap: do not read page from device with Bitmap_sync (bsc#1056134).
- md: change the initialization value for a spare device spot to MD_DISK_ROLE_SPARE (bsc#1056134).
- md: Delete gendisk before cleaning up the request queue (bsc#1056134).
- md: do not call bitmap_create() while array is quiesced (bsc#1056134).
- md: do not set In_sync if array is frozen (bsc#1056134).
- md: fix a potential deadlock of raid5/raid10 reshape (bsc#1056134).
- md: md.c: Return -ENODEV when mddev is NULL in rdev_attr_show (bsc#1056134).
- md: notify about new spare disk in the container (bsc#1056134).
- md/raid0: Fix buffer overflow at debug print (bsc#1164051).
- md/raid10: end bio when the device faulty (bsc#1056134).
- md/raid10: Fix raid10 replace hang when new added disk faulty (bsc#1056134).
- md/raid1,raid10: silence warning about wait-within-wait (bsc#1056134).
- md: return -ENODEV if rdev has no mddev assigned (bsc#1056134).
- media: ov519: add missing endpoint sanity checks (bsc#1168829).
- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).
- net: ena: Add PCI shutdown handler to allow safe kexec (bsc#1167421, bsc#1167423).
- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).
- net/ibmvnic: Fix typo in retry check (bsc#1155689 ltc#182047).
- rpm/kernel-binary.spec.in: Replace Novell with SUSE
- sched/fair: Scale bandwidth quota and period without losing quota/period ratio precision (bsc#1161586).
- scsi: core: avoid repetitive logging of device offline messages (bsc#1145929).
- scsi: core: kABI fix already_offline (bsc#1145929).
- tcp: clear tp-&gt;packets_out when purging write queue (bsc#1154118).
- x86/mitigations: Clear CPU buffers on the SYSCALL fast path (bsc#1164846 bsc#1170847).
- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).
- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-14"/>
	<updated date="2020-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056134">SUSE bug 1056134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087813">SUSE bug 1087813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120386">SUSE bug 1120386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133147">SUSE bug 1133147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137325">SUSE bug 1137325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145929">SUSE bug 1145929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149591">SUSE bug 1149591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154118">SUSE bug 1154118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154844">SUSE bug 1154844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155689">SUSE bug 1155689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157155">SUSE bug 1157155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157157">SUSE bug 1157157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157303">SUSE bug 1157303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157804">SUSE bug 1157804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158021">SUSE bug 1158021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158642">SUSE bug 1158642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158819">SUSE bug 1158819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159199">SUSE bug 1159199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159285">SUSE bug 1159285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159297">SUSE bug 1159297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159841">SUSE bug 1159841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159908">SUSE bug 1159908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159910">SUSE bug 1159910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159911">SUSE bug 1159911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159912">SUSE bug 1159912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160195">SUSE bug 1160195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161586">SUSE bug 1161586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162227">SUSE bug 1162227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162928">SUSE bug 1162928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162929">SUSE bug 1162929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162931">SUSE bug 1162931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163508">SUSE bug 1163508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163971">SUSE bug 1163971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164009">SUSE bug 1164009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164051">SUSE bug 1164051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164069">SUSE bug 1164069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164078">SUSE bug 1164078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164846">SUSE bug 1164846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165111">SUSE bug 1165111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165311">SUSE bug 1165311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165873">SUSE bug 1165873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165881">SUSE bug 1165881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165984">SUSE bug 1165984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165985">SUSE bug 1165985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167421">SUSE bug 1167421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167423">SUSE bug 1167423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167629">SUSE bug 1167629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168075">SUSE bug 1168075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168295">SUSE bug 1168295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168424">SUSE bug 1168424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168829">SUSE bug 1168829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168854">SUSE bug 1168854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170056">SUSE bug 1170056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170345">SUSE bug 1170345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170778">SUSE bug 1170778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170847">SUSE bug 1170847</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18255/">CVE-2017-18255 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18255">CVE-2017-18255 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-21008/">CVE-2018-21008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21008">CVE-2018-21008 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14615">CVE-2019-14615 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18675/">CVE-2019-18675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18675">CVE-2019-18675 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19066">CVE-2019-19066 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19319/">CVE-2019-19319 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19319">CVE-2019-19319 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19447">CVE-2019-19447 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19767">CVE-2019-19767 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19768">CVE-2019-19768 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19965">CVE-2019-19965 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19966/">CVE-2019-19966 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19966">CVE-2019-19966 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20054/">CVE-2019-20054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20054">CVE-2019-20054 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20096/">CVE-2019-20096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20096">CVE-2019-20096 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3701/">CVE-2019-3701 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3701">CVE-2019-3701 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5108">CVE-2019-5108 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9455/">CVE-2019-9455 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9455">CVE-2019-9455 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9458">CVE-2019-9458 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10690">CVE-2020-10690 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10720/">CVE-2020-10720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10720">CVE-2020-10720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10942">CVE-2020-10942 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11494/">CVE-2020-11494 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11494">CVE-2020-11494 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11608">CVE-2020-11608 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11609/">CVE-2020-11609 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11609">CVE-2020-11609 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2732">CVE-2020-2732 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8647">CVE-2020-8647 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8648">CVE-2020-8648 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8649">CVE-2020-8649 at NVD</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8992/">CVE-2020-8992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8992">CVE-2020-8992 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9383">CVE-2020-9383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555707" comment="kernel-default-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555708" comment="kernel-default-base-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555709" comment="kernel-default-devel-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556240" comment="kernel-default-kgraft-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538400" comment="kernel-devel-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538401" comment="kernel-macros-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538402" comment="kernel-source-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555710" comment="kernel-syms-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556242" comment="kgraft-patch-4_4_180-94_116-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148849" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyYAML (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1165439" ref_url="https://bugzilla.suse.com/1165439" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1747" ref_url="https://www.suse.com/security/cve/CVE-2020-1747/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006820.html" source="SUSE-SU"/>
		<description>
This update for python-PyYAML fixes the following issues:

- CVE-2020-1747: Fixed an arbitrary code execution when YAML files are parsed by FullLoader (bsc#1165439).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-15"/>
	<updated date="2020-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165439">SUSE bug 1165439</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1747/">CVE-2020-1747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1747">CVE-2020-1747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009524550" comment="python-PyYAML-5.1.2-26.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530070" comment="python3-PyYAML-5.1.2-26.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148850" version="1" class="patch">
	<metadata>
		<title>Security update for git (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1168930" ref_url="https://bugzilla.suse.com/1168930" source="BUGZILLA"/>
		<reference ref_id="1169605" ref_url="https://bugzilla.suse.com/1169605" source="BUGZILLA"/>
		<reference ref_id="1169786" ref_url="https://bugzilla.suse.com/1169786" source="BUGZILLA"/>
		<reference ref_id="1169936" ref_url="https://bugzilla.suse.com/1169936" source="BUGZILLA"/>
		<reference ref_id="1170302" ref_url="https://bugzilla.suse.com/1170302" source="BUGZILLA"/>
		<reference ref_id="1170741" ref_url="https://bugzilla.suse.com/1170741" source="BUGZILLA"/>
		<reference ref_id="1170939" ref_url="https://bugzilla.suse.com/1170939" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11008" ref_url="https://www.suse.com/security/cve/CVE-2020-11008/" source="CVE"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006829.html" source="SUSE-SU"/>
		<description>
This update for git to 2.26.2 fixes the following issues:

Security issue fixed:

- CVE-2020-11008: Specially crafted URLs may have tricked the credentials helper 
  to providing credential information that is not appropriate for the protocol 
  in use and host being contacted (bsc#1169936).

Non-security issue fixed:

- Fixed git-daemon not starting after conversion from sysvinit to systemd service (bsc#1169605).
- Enabled access for git-daemon in firewall configuration (bsc#1170302).
- Fixed problems with recent switch to protocol v2, which caused fetches transferring unreasonable amount of data (bsc#1170741).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-18"/>
	<updated date="2020-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169605">SUSE bug 1169605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169786">SUSE bug 1169786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169936">SUSE bug 1169936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170302">SUSE bug 1170302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170741">SUSE bug 1170741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170939">SUSE bug 1170939</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11008/">CVE-2020-11008 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11008">CVE-2020-11008 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5260">CVE-2020-5260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530961" comment="git-core-2.26.2-27.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148851" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1167068" ref_url="https://bugzilla.suse.com/1167068" source="BUGZILLA"/>
		<reference ref_id="1170558" ref_url="https://bugzilla.suse.com/1170558" source="BUGZILLA"/>
		<reference ref_id="1171363" ref_url="https://bugzilla.suse.com/1171363" source="BUGZILLA"/>
		<reference ref_id="682920" ref_url="https://bugzilla.suse.com/682920" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12108" ref_url="https://www.suse.com/security/cve/CVE-2020-12108/" source="CVE"/>
		<reference ref_id="CVE-2020-12137" ref_url="https://www.suse.com/security/cve/CVE-2020-12137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006830.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2020-12108: Fixed a content injection bug (bsc#1171363).
- CVE-2020-12137: Fixed a XSS vulnerability caused by MIME type confusion (bsc#1170558).

Non-security issue fixed:

- Fixed rights and ownership on /var/lib/mailman/archives (bsc#1167068).
- Don't default to invalid hosts for DEFAULT_EMAIL_HOST (bsc#682920).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-18"/>
	<updated date="2020-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167068">SUSE bug 1167068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170558">SUSE bug 1170558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171363">SUSE bug 1171363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682920">SUSE bug 682920</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12108/">CVE-2020-12108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12108">CVE-2020-12108 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12137/">CVE-2020-12137 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12137">CVE-2020-12137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530963" comment="mailman-2.1.17-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148852" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1136085" ref_url="https://bugzilla.suse.com/1136085" source="BUGZILLA"/>
		<reference ref_id="1159723" ref_url="https://bugzilla.suse.com/1159723" source="BUGZILLA"/>
		<reference ref_id="1159729" ref_url="https://bugzilla.suse.com/1159729" source="BUGZILLA"/>
		<reference ref_id="1164825" ref_url="https://bugzilla.suse.com/1164825" source="BUGZILLA"/>
		<reference ref_id="1171928" ref_url="https://bugzilla.suse.com/1171928" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221/" source="CVE"/>
		<reference ref_id="CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418/" source="CVE"/>
		<reference ref_id="CVE-2019-17563" ref_url="https://www.suse.com/security/cve/CVE-2019-17563/" source="CVE"/>
		<reference ref_id="CVE-2019-17569" ref_url="https://www.suse.com/security/cve/CVE-2019-17569/" source="CVE"/>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006867.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

CVE-2020-9484 (bsc#1171928)
Apache Tomcat Remote Code Execution via session persistence

If an attacker was able to control the contents and name of a file on a
server configured to use the PersistenceManager, then the attacker could
have triggered a remote code execution via deserialization of the file under
their control.

CVE-2019-12418 (bsc#1159723)
Local privilege escalation by manipulating the RMI registry and performing a man-in-the-middle attack

When Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files was able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface.
The attacker could then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.

CVE-2019-0221 (bsc#1136085)
The SSI printenv command echoed user provided data without escaping, which
made it vulnerable to XSS.

CVE-2019-17563 (bsc#1159729)
When using FORM authentication there was a narrow window where an attacker could perform a session fixation attack.

CVE-2019-17569 (bsc#1164825)
Invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling
if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-28"/>
	<updated date="2020-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136085">SUSE bug 1136085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159723">SUSE bug 1159723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159729">SUSE bug 1159729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164825">SUSE bug 1164825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171928">SUSE bug 1171928</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0221">CVE-2019-0221 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12418">CVE-2019-12418 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17563/">CVE-2019-17563 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17563">CVE-2019-17563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17569/">CVE-2019-17569 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17569">CVE-2019-17569 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9484">CVE-2020-9484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530964" comment="tomcat-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530965" comment="tomcat-admin-webapps-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530966" comment="tomcat-docs-webapp-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530967" comment="tomcat-el-3_0-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530968" comment="tomcat-javadoc-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530969" comment="tomcat-jsp-2_3-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530970" comment="tomcat-lib-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530971" comment="tomcat-servlet-3_1-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530972" comment="tomcat-webapps-8.0.53-29.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148853" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1027282" ref_url="https://bugzilla.suse.com/1027282" source="BUGZILLA"/>
		<reference ref_id="1041090" ref_url="https://bugzilla.suse.com/1041090" source="BUGZILLA"/>
		<reference ref_id="1042670" ref_url="https://bugzilla.suse.com/1042670" source="BUGZILLA"/>
		<reference ref_id="1073269" ref_url="https://bugzilla.suse.com/1073269" source="BUGZILLA"/>
		<reference ref_id="1073748" ref_url="https://bugzilla.suse.com/1073748" source="BUGZILLA"/>
		<reference ref_id="1078326" ref_url="https://bugzilla.suse.com/1078326" source="BUGZILLA"/>
		<reference ref_id="1078485" ref_url="https://bugzilla.suse.com/1078485" source="BUGZILLA"/>
		<reference ref_id="1081750" ref_url="https://bugzilla.suse.com/1081750" source="BUGZILLA"/>
		<reference ref_id="1084650" ref_url="https://bugzilla.suse.com/1084650" source="BUGZILLA"/>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1153830" ref_url="https://bugzilla.suse.com/1153830" source="BUGZILLA"/>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1159035" ref_url="https://bugzilla.suse.com/1159035" source="BUGZILLA"/>
		<reference ref_id="1162224" ref_url="https://bugzilla.suse.com/1162224" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="1170411" ref_url="https://bugzilla.suse.com/1170411" source="BUGZILLA"/>
		<reference ref_id="1171561" ref_url="https://bugzilla.suse.com/1171561" source="BUGZILLA"/>
		<reference ref_id="945401" ref_url="https://bugzilla.suse.com/945401" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006878.html" source="SUSE-SU"/>
		<description>


This update for python to version 2.7.17 fixes the following issues:

Syncing with lots of upstream bug fixes and security fixes.

Bug fixes:

- CVE-2019-9674: Improved the documentation to reflect the dangers of zip-bombs (bsc#1162825).
- CVE-2019-18348: Fixed a CRLF injection via the host part of the url passed to urlopen(). Now an InvalidURL exception is raised (bsc#1155094).
- CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367).
- Fixed mismatches between libpython and python-base versions (bsc#1162224).
- Fixed segfault in libpython2.7.so.1 (bsc#1073748).
- Unified packages among openSUSE:Factory and SLE versions (bsc#1159035).
- Added idle.desktop and idle.appdata.xml to provide IDLE in menus (bsc#1153830).
- Excluded tsl_check files from python-base to prevent file conflict with python-strict-tls-checks package (bsc#945401).
- Changed the name of idle3 icons to idle3.png to avoid collision with Python 2 version (bsc#1165894).

Additionally a new 'shared-python-startup' package is provided containing startup files.

python-rpm-macros was updated to fix:

- Do not write .pyc files for tests (bsc#1171561)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-03"/>
	<updated date="2020-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027282">SUSE bug 1027282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041090">SUSE bug 1041090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042670">SUSE bug 1042670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073269">SUSE bug 1073269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073748">SUSE bug 1073748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078326">SUSE bug 1078326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078485">SUSE bug 1078485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081750">SUSE bug 1081750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084650">SUSE bug 1084650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153830">SUSE bug 1153830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159035">SUSE bug 1159035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162224">SUSE bug 1162224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170411">SUSE bug 1170411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171561">SUSE bug 1171561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945401">SUSE bug 945401</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530973" comment="libpython2_7-1_0-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530974" comment="libpython2_7-1_0-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530975" comment="python-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530976" comment="python-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530977" comment="python-base-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530978" comment="python-base-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530979" comment="python-curses-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530980" comment="python-demo-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530981" comment="python-devel-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530982" comment="python-doc-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530983" comment="python-doc-pdf-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530984" comment="python-gdbm-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530985" comment="python-idle-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530986" comment="python-rpm-macros-20200207.5feb6c1-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530987" comment="python-tk-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530988" comment="python-xml-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530989" comment="shared-python-startup-0.1-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148854" version="1" class="patch">
	<metadata>
		<title>Security update for krb5-appl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1165787" ref_url="https://bugzilla.suse.com/1165787" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10188" ref_url="https://www.suse.com/security/cve/CVE-2020-10188/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006882.html" source="SUSE-SU"/>
		<description>
This update for krb5-appl fixes the following issues:

- CVE-2020-10188: Fixed a remote root execution (bsc#1165787).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165787">SUSE bug 1165787</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10188/">CVE-2020-10188 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10188">CVE-2020-10188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531003" comment="krb5-appl-clients-1.0.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531004" comment="krb5-appl-servers-1.0.3-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148855" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1055857" ref_url="https://bugzilla.suse.com/1055857" source="BUGZILLA"/>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="1171475" ref_url="https://bugzilla.suse.com/1171475" source="BUGZILLA"/>
		<reference ref_id="1171847" ref_url="https://bugzilla.suse.com/1171847" source="BUGZILLA"/>
		<reference ref_id="1172105" ref_url="https://bugzilla.suse.com/1172105" source="BUGZILLA"/>
		<reference ref_id="1172116" ref_url="https://bugzilla.suse.com/1172116" source="BUGZILLA"/>
		<reference ref_id="1172121" ref_url="https://bugzilla.suse.com/1172121" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328/" source="CVE"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="CVE-2020-0093" ref_url="https://www.suse.com/security/cve/CVE-2020-0093/" source="CVE"/>
		<reference ref_id="CVE-2020-12767" ref_url="https://www.suse.com/security/cve/CVE-2020-12767/" source="CVE"/>
		<reference ref_id="CVE-2020-13112" ref_url="https://www.suse.com/security/cve/CVE-2020-13112/" source="CVE"/>
		<reference ref_id="CVE-2020-13113" ref_url="https://www.suse.com/security/cve/CVE-2020-13113/" source="CVE"/>
		<reference ref_id="CVE-2020-13114" ref_url="https://www.suse.com/security/cve/CVE-2020-13114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

Security issues fixed:

- CVE-2016-6328: Fixed an integer overflow in parsing MNOTE entry data of the input file (bsc#1055857).
- CVE-2017-7544: Fixed an out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c (bsc#1059893).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2020-0093: Fixed an out-of-bounds read in exif_data_save_data_entry (bsc#1171847).
- CVE-2020-12767: Fixed a divide-by-zero error in exif_entry_get_value (bsc#1171475).
- CVE-2020-13112: Fixed a time consumption DoS when parsing canon array markers (bsc#1172121).
- CVE-2020-13113: Fixed a potential use of uninitialized memory (bsc#1172105).
- CVE-2020-13114: Fixed various buffer overread fixes due to integer overflows in maker notes (bsc#1172116).

Non-security issues fixed:

- libexif was updated to version 0.6.22:
  * New translations: ms
  * Updated translations for most languages
  * Some useful EXIF 2.3 tag added:
    * EXIF_TAG_GAMMA
    * EXIF_TAG_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_IMAGE_NUMBER_OF_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_EXPOSURE_TIMES_OF_COMPOSITE_IMAGE
    * EXIF_TAG_GPS_H_POSITIONING_ERROR
    * EXIF_TAG_CAMERA_OWNER_NAME
    * EXIF_TAG_BODY_SERIAL_NUMBER
    * EXIF_TAG_LENS_SPECIFICATION
    * EXIF_TAG_LENS_MAKE
    * EXIF_TAG_LENS_MODEL
    * EXIF_TAG_LENS_SERIAL_NUMBER
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055857">SUSE bug 1055857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171475">SUSE bug 1171475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171847">SUSE bug 1171847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172105">SUSE bug 1172105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172116">SUSE bug 1172116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172121">SUSE bug 1172121</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6328">CVE-2016-6328 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7544">CVE-2017-7544 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20030">CVE-2018-20030 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9278">CVE-2019-9278 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0093/">CVE-2020-0093 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0093">CVE-2020-0093 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12767/">CVE-2020-12767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12767">CVE-2020-12767 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13112/">CVE-2020-13112 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13112">CVE-2020-13112 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13113/">CVE-2020-13113 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13113">CVE-2020-13113 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13114/">CVE-2020-13114 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13114">CVE-2020-13114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531005" comment="libexif12-0.6.22-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531006" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148856" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="1146873" ref_url="https://bugzilla.suse.com/1146873" source="BUGZILLA"/>
		<reference ref_id="1149811" ref_url="https://bugzilla.suse.com/1149811" source="BUGZILLA"/>
		<reference ref_id="1160024" ref_url="https://bugzilla.suse.com/1160024" source="BUGZILLA"/>
		<reference ref_id="1161066" ref_url="https://bugzilla.suse.com/1161066" source="BUGZILLA"/>
		<reference ref_id="1163018" ref_url="https://bugzilla.suse.com/1163018" source="BUGZILLA"/>
		<reference ref_id="1166240" ref_url="https://bugzilla.suse.com/1166240" source="BUGZILLA"/>
		<reference ref_id="1170940" ref_url="https://bugzilla.suse.com/1170940" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2020-1711: Fixed a potential OOB access in the iSCSI client code (bsc#1166240).
- CVE-2019-12068: Fixed a potential DoS in the LSI SCSI controller emulation (bsc#1146873).
- CVE-2020-1983: Fixed a use-after-free in the ip_reass function of slirp (bsc#1170940).
- CVE-2020-8608: Fixed a potential OOB access in slirp (bsc#1163018).
- CVE-2020-7039: Fixed a potential OOB access in slirp (bsc#1161066).
- CVE-2019-15890: Fixed a use-after-free during packet reassembly in slirp (bsc#1149811).
- Fixed multiple potential DoS issues in SLIRP, similar to CVE-2019-6778 (bsc#1123156).

Non-security issue fixed:

- Make sure that required memory is mapped properly during an incoming migration of a Xen HVM domU (bsc#1160024).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146873">SUSE bug 1146873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149811">SUSE bug 1149811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160024">SUSE bug 1160024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161066">SUSE bug 1161066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163018">SUSE bug 1163018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166240">SUSE bug 1166240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170940">SUSE bug 1170940</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12068">CVE-2019-12068 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1711">CVE-2020-1711 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1983">CVE-2020-1983 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7039">CVE-2020-7039 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555711" comment="qemu-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555712" comment="qemu-block-curl-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555713" comment="qemu-block-iscsi-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538416" comment="qemu-block-rbd-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555714" comment="qemu-block-ssh-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555715" comment="qemu-guest-agent-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538419" comment="qemu-ipxe-1.0.0+-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538420" comment="qemu-kvm-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555716" comment="qemu-lang-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538423" comment="qemu-seabios-1.10.2-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538424" comment="qemu-sgabios-8-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555717" comment="qemu-tools-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538426" comment="qemu-vgabios-1.10.2-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538427" comment="qemu-x86-2.9.1-6.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148857" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1172031" ref_url="https://bugzilla.suse.com/1172031" source="BUGZILLA"/>
		<reference ref_id="1172225" ref_url="https://bugzilla.suse.com/1172225" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006895.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2019-20807: Fixed an issue where escaping from the restrictive mode of vim 
  was possible using interfaces (bsc#1172225 and bsc#1172031).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172031">SUSE bug 1172031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172225">SUSE bug 1172225</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20807">CVE-2019-20807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531007" comment="gvim-7.4.326-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531008" comment="vim-7.4.326-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531009" comment="vim-data-7.4.326-17.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148858" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1172402" ref_url="https://bugzilla.suse.com/1172402" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006901.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- MozillaFirefox was updated to version 68.9.0 Extended Support Release (bsc#1172402).

- CVE-2020-12405: Fixed a use-after-free in SharedWorkerService. 
- CVE-2020-12406: Fixed a JavaScript Type confusion with NativeTypes.
- CVE-2020-12410: Fixed multiple memory safety bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12405">CVE-2020-12405 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12406">CVE-2020-12406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12410">CVE-2020-12410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531010" comment="MozillaFirefox-68.9.0-109.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531012" comment="MozillaFirefox-translations-common-68.9.0-109.123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148859" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1043983" ref_url="https://bugzilla.suse.com/1043983" source="BUGZILLA"/>
		<reference ref_id="1048072" ref_url="https://bugzilla.suse.com/1048072" source="BUGZILLA"/>
		<reference ref_id="1055265" ref_url="https://bugzilla.suse.com/1055265" source="BUGZILLA"/>
		<reference ref_id="1056286" ref_url="https://bugzilla.suse.com/1056286" source="BUGZILLA"/>
		<reference ref_id="1056782" ref_url="https://bugzilla.suse.com/1056782" source="BUGZILLA"/>
		<reference ref_id="1058754" ref_url="https://bugzilla.suse.com/1058754" source="BUGZILLA"/>
		<reference ref_id="1058755" ref_url="https://bugzilla.suse.com/1058755" source="BUGZILLA"/>
		<reference ref_id="1058757" ref_url="https://bugzilla.suse.com/1058757" source="BUGZILLA"/>
		<reference ref_id="1062452" ref_url="https://bugzilla.suse.com/1062452" source="BUGZILLA"/>
		<reference ref_id="1069607" ref_url="https://bugzilla.suse.com/1069607" source="BUGZILLA"/>
		<reference ref_id="1069632" ref_url="https://bugzilla.suse.com/1069632" source="BUGZILLA"/>
		<reference ref_id="1073002" ref_url="https://bugzilla.suse.com/1073002" source="BUGZILLA"/>
		<reference ref_id="1078782" ref_url="https://bugzilla.suse.com/1078782" source="BUGZILLA"/>
		<reference ref_id="1082007" ref_url="https://bugzilla.suse.com/1082007" source="BUGZILLA"/>
		<reference ref_id="1082008" ref_url="https://bugzilla.suse.com/1082008" source="BUGZILLA"/>
		<reference ref_id="1082009" ref_url="https://bugzilla.suse.com/1082009" source="BUGZILLA"/>
		<reference ref_id="1082010" ref_url="https://bugzilla.suse.com/1082010" source="BUGZILLA"/>
		<reference ref_id="1082011" ref_url="https://bugzilla.suse.com/1082011" source="BUGZILLA"/>
		<reference ref_id="1082014" ref_url="https://bugzilla.suse.com/1082014" source="BUGZILLA"/>
		<reference ref_id="1082058" ref_url="https://bugzilla.suse.com/1082058" source="BUGZILLA"/>
		<reference ref_id="1087433" ref_url="https://bugzilla.suse.com/1087433" source="BUGZILLA"/>
		<reference ref_id="1087434" ref_url="https://bugzilla.suse.com/1087434" source="BUGZILLA"/>
		<reference ref_id="1087436" ref_url="https://bugzilla.suse.com/1087436" source="BUGZILLA"/>
		<reference ref_id="1087437" ref_url="https://bugzilla.suse.com/1087437" source="BUGZILLA"/>
		<reference ref_id="1087440" ref_url="https://bugzilla.suse.com/1087440" source="BUGZILLA"/>
		<reference ref_id="1087441" ref_url="https://bugzilla.suse.com/1087441" source="BUGZILLA"/>
		<reference ref_id="1112530" ref_url="https://bugzilla.suse.com/1112530" source="BUGZILLA"/>
		<reference ref_id="1112532" ref_url="https://bugzilla.suse.com/1112532" source="BUGZILLA"/>
		<reference ref_id="1130611" ref_url="https://bugzilla.suse.com/1130611" source="BUGZILLA"/>
		<reference ref_id="1130617" ref_url="https://bugzilla.suse.com/1130617" source="BUGZILLA"/>
		<reference ref_id="1130620" ref_url="https://bugzilla.suse.com/1130620" source="BUGZILLA"/>
		<reference ref_id="1130622" ref_url="https://bugzilla.suse.com/1130622" source="BUGZILLA"/>
		<reference ref_id="1130623" ref_url="https://bugzilla.suse.com/1130623" source="BUGZILLA"/>
		<reference ref_id="1130627" ref_url="https://bugzilla.suse.com/1130627" source="BUGZILLA"/>
		<reference ref_id="1152990" ref_url="https://bugzilla.suse.com/1152990" source="BUGZILLA"/>
		<reference ref_id="1152992" ref_url="https://bugzilla.suse.com/1152992" source="BUGZILLA"/>
		<reference ref_id="1152994" ref_url="https://bugzilla.suse.com/1152994" source="BUGZILLA"/>
		<reference ref_id="1152995" ref_url="https://bugzilla.suse.com/1152995" source="BUGZILLA"/>
		<reference ref_id="1171517" ref_url="https://bugzilla.suse.com/1171517" source="BUGZILLA"/>
		<reference ref_id="1172275" ref_url="https://bugzilla.suse.com/1172275" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9096" ref_url="https://www.suse.com/security/cve/CVE-2015-9096/" source="CVE"/>
		<reference ref_id="CVE-2016-2339" ref_url="https://www.suse.com/security/cve/CVE-2016-2339/" source="CVE"/>
		<reference ref_id="CVE-2016-7798" ref_url="https://www.suse.com/security/cve/CVE-2016-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-0898" ref_url="https://www.suse.com/security/cve/CVE-2017-0898/" source="CVE"/>
		<reference ref_id="CVE-2017-0899" ref_url="https://www.suse.com/security/cve/CVE-2017-0899/" source="CVE"/>
		<reference ref_id="CVE-2017-0900" ref_url="https://www.suse.com/security/cve/CVE-2017-0900/" source="CVE"/>
		<reference ref_id="CVE-2017-0901" ref_url="https://www.suse.com/security/cve/CVE-2017-0901/" source="CVE"/>
		<reference ref_id="CVE-2017-0902" ref_url="https://www.suse.com/security/cve/CVE-2017-0902/" source="CVE"/>
		<reference ref_id="CVE-2017-0903" ref_url="https://www.suse.com/security/cve/CVE-2017-0903/" source="CVE"/>
		<reference ref_id="CVE-2017-10784" ref_url="https://www.suse.com/security/cve/CVE-2017-10784/" source="CVE"/>
		<reference ref_id="CVE-2017-14033" ref_url="https://www.suse.com/security/cve/CVE-2017-14033/" source="CVE"/>
		<reference ref_id="CVE-2017-14064" ref_url="https://www.suse.com/security/cve/CVE-2017-14064/" source="CVE"/>
		<reference ref_id="CVE-2017-17405" ref_url="https://www.suse.com/security/cve/CVE-2017-17405/" source="CVE"/>
		<reference ref_id="CVE-2017-17742" ref_url="https://www.suse.com/security/cve/CVE-2017-17742/" source="CVE"/>
		<reference ref_id="CVE-2017-17790" ref_url="https://www.suse.com/security/cve/CVE-2017-17790/" source="CVE"/>
		<reference ref_id="CVE-2017-9228" ref_url="https://www.suse.com/security/cve/CVE-2017-9228/" source="CVE"/>
		<reference ref_id="CVE-2017-9229" ref_url="https://www.suse.com/security/cve/CVE-2017-9229/" source="CVE"/>
		<reference ref_id="CVE-2018-1000073" ref_url="https://www.suse.com/security/cve/CVE-2018-1000073/" source="CVE"/>
		<reference ref_id="CVE-2018-1000074" ref_url="https://www.suse.com/security/cve/CVE-2018-1000074/" source="CVE"/>
		<reference ref_id="CVE-2018-1000075" ref_url="https://www.suse.com/security/cve/CVE-2018-1000075/" source="CVE"/>
		<reference ref_id="CVE-2018-1000076" ref_url="https://www.suse.com/security/cve/CVE-2018-1000076/" source="CVE"/>
		<reference ref_id="CVE-2018-1000077" ref_url="https://www.suse.com/security/cve/CVE-2018-1000077/" source="CVE"/>
		<reference ref_id="CVE-2018-1000078" ref_url="https://www.suse.com/security/cve/CVE-2018-1000078/" source="CVE"/>
		<reference ref_id="CVE-2018-1000079" ref_url="https://www.suse.com/security/cve/CVE-2018-1000079/" source="CVE"/>
		<reference ref_id="CVE-2018-16395" ref_url="https://www.suse.com/security/cve/CVE-2018-16395/" source="CVE"/>
		<reference ref_id="CVE-2018-16396" ref_url="https://www.suse.com/security/cve/CVE-2018-16396/" source="CVE"/>
		<reference ref_id="CVE-2018-6914" ref_url="https://www.suse.com/security/cve/CVE-2018-6914/" source="CVE"/>
		<reference ref_id="CVE-2018-8777" ref_url="https://www.suse.com/security/cve/CVE-2018-8777/" source="CVE"/>
		<reference ref_id="CVE-2018-8778" ref_url="https://www.suse.com/security/cve/CVE-2018-8778/" source="CVE"/>
		<reference ref_id="CVE-2018-8779" ref_url="https://www.suse.com/security/cve/CVE-2018-8779/" source="CVE"/>
		<reference ref_id="CVE-2018-8780" ref_url="https://www.suse.com/security/cve/CVE-2018-8780/" source="CVE"/>
		<reference ref_id="CVE-2019-15845" ref_url="https://www.suse.com/security/cve/CVE-2019-15845/" source="CVE"/>
		<reference ref_id="CVE-2019-16201" ref_url="https://www.suse.com/security/cve/CVE-2019-16201/" source="CVE"/>
		<reference ref_id="CVE-2019-16254" ref_url="https://www.suse.com/security/cve/CVE-2019-16254/" source="CVE"/>
		<reference ref_id="CVE-2019-16255" ref_url="https://www.suse.com/security/cve/CVE-2019-16255/" source="CVE"/>
		<reference ref_id="CVE-2019-8320" ref_url="https://www.suse.com/security/cve/CVE-2019-8320/" source="CVE"/>
		<reference ref_id="CVE-2019-8321" ref_url="https://www.suse.com/security/cve/CVE-2019-8321/" source="CVE"/>
		<reference ref_id="CVE-2019-8322" ref_url="https://www.suse.com/security/cve/CVE-2019-8322/" source="CVE"/>
		<reference ref_id="CVE-2019-8323" ref_url="https://www.suse.com/security/cve/CVE-2019-8323/" source="CVE"/>
		<reference ref_id="CVE-2019-8324" ref_url="https://www.suse.com/security/cve/CVE-2019-8324/" source="CVE"/>
		<reference ref_id="CVE-2019-8325" ref_url="https://www.suse.com/security/cve/CVE-2019-8325/" source="CVE"/>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<description>
This update for ruby2.1 fixes the following issues:

Security issues fixed:

- CVE-2015-9096: Fixed an SMTP command injection via CRLFsequences in a RCPT TO or MAIL FROM command (bsc#1043983).
- CVE-2016-7798: Fixed an IV Reuse in GCM Mode (bsc#1055265).
- CVE-2017-0898: Fixed a buffer underrun vulnerability in Kernel.sprintf (bsc#1058755).
- CVE-2017-0899: Fixed an issue with malicious gem specifications, insufficient sanitation when printing gem specifications could have included terminal characters (bsc#1056286).
- CVE-2017-0900: Fixed an issue with malicious gem specifications, the query command could have led to a denial of service attack against clients (bsc#1056286).
- CVE-2017-0901: Fixed an issue with malicious gem specifications, potentially overwriting arbitrary files on the client system (bsc#1056286).
- CVE-2017-0902: Fixed an issue with malicious gem specifications, that could have enabled MITM attacks against clients (bsc#1056286).
- CVE-2017-0903: Fixed an unsafe object deserialization vulnerability (bsc#1062452).
- CVE-2017-9228: Fixed a heap out-of-bounds write in bitset_set_range() during regex compilation (bsc#1069607).
- CVE-2017-9229: Fixed an invalid pointer dereference in left_adjust_char_head() in oniguruma (bsc#1069632).
- CVE-2017-10784: Fixed an escape sequence injection vulnerability in the Basic authentication of WEBrick (bsc#1058754).
- CVE-2017-14033: Fixed a buffer underrun vulnerability in OpenSSL ASN1 decode (bsc#1058757).
- CVE-2017-14064: Fixed an arbitrary memory exposure during a JSON.generate call (bsc#1056782).
- CVE-2017-17405: Fixed a command injection vulnerability in Net::FTP (bsc#1073002).
- CVE-2017-17742: Fixed an HTTP response splitting issue in WEBrick (bsc#1087434).
- CVE-2017-17790: Fixed a command injection in lib/resolv.rb:lazy_initialize() (bsc#1078782).
- CVE-2018-6914: Fixed an unintentional file and directory creation with directory traversal in tempfile and tmpdir (bsc#1087441).
- CVE-2018-8777: Fixed a potential DoS caused by large requests in WEBrick (bsc#1087436).
- CVE-2018-8778: Fixed a buffer under-read in String#unpack (bsc#1087433).
- CVE-2018-8779: Fixed an unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket (bsc#1087440).
- CVE-2018-8780: Fixed an unintentional directory traversal by poisoned NUL byte in Dir (bsc#1087437).
- CVE-2018-16395: Fixed an issue with OpenSSL::X509::Name equality checking (bsc#1112530).
- CVE-2018-16396: Fixed an issue with tainted string handling, where the flag was not propagated in Array#pack and String#unpack with some directives (bsc#1112532).
- CVE-2018-1000073: Fixed a path traversal issue (bsc#1082007).
- CVE-2018-1000074: Fixed an unsafe object deserialization vulnerability in gem owner, allowing arbitrary code execution with specially crafted YAML (bsc#1082008).
- CVE-2018-1000075: Fixed an infinite loop vulnerability due to negative size in tar header causes Denial of Service (bsc#1082014).
- CVE-2018-1000076: Fixed an improper verification of signatures in tarballs (bsc#1082009).
- CVE-2018-1000077: Fixed an improper URL validation in the homepage attribute of ruby gems (bsc#1082010).
- CVE-2018-1000078: Fixed a XSS vulnerability in the homepage attribute when displayed via gem server (bsc#1082011).
- CVE-2018-1000079: Fixed a path traversal issue during gem installation allows to write to arbitrary filesystem locations (bsc#1082058).
- CVE-2019-8320: Fixed a directory traversal issue when decompressing tar files (bsc#1130627).
- CVE-2019-8321: Fixed an escape sequence injection vulnerability in verbose (bsc#1130623).
- CVE-2019-8322: Fixed an escape sequence injection vulnerability in gem owner (bsc#1130622).
- CVE-2019-8323: Fixed an escape sequence injection vulnerability in API response handling (bsc#1130620).
- CVE-2019-8324: Fixed an issue with malicious gems that may have led to arbitrary code execution (bsc#1130617).
- CVE-2019-8325: Fixed an escape sequence injection vulnerability in errors (bsc#1130611).
- CVE-2019-15845: Fixed a NUL injection vulnerability in File.fnmatch and File.fnmatch? (bsc#1152994).
- CVE-2019-16201: Fixed a regular expression denial of service vulnerability in WEBrick's digest access authentication (bsc#1152995).
- CVE-2019-16254: Fixed an HTTP response splitting vulnerability in WEBrick (bsc#1152992).
- CVE-2019-16255: Fixed a code injection vulnerability in Shell#[] and Shell#test (bsc#1152990).
- CVE-2020-10663: Fixed an unsafe object creation vulnerability in JSON (bsc#1171517).

Non-security issue fixed:

- Add conflicts to libruby to make sure ruby and ruby-stdlib are also updated when libruby is updated (bsc#1048072).

Also yast2-ruby-bindings on SLES 12 SP2 LTSS was updated to handle the updated ruby interpreter. (bsc#1172275)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1043983">SUSE bug 1043983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048072">SUSE bug 1048072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055265">SUSE bug 1055265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056286">SUSE bug 1056286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056782">SUSE bug 1056782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058754">SUSE bug 1058754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058755">SUSE bug 1058755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058757">SUSE bug 1058757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062452">SUSE bug 1062452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069607">SUSE bug 1069607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069632">SUSE bug 1069632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073002">SUSE bug 1073002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078782">SUSE bug 1078782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082007">SUSE bug 1082007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082008">SUSE bug 1082008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082009">SUSE bug 1082009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082010">SUSE bug 1082010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082011">SUSE bug 1082011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082014">SUSE bug 1082014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082058">SUSE bug 1082058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087433">SUSE bug 1087433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087434">SUSE bug 1087434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087436">SUSE bug 1087436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087437">SUSE bug 1087437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087440">SUSE bug 1087440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087441">SUSE bug 1087441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112530">SUSE bug 1112530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112532">SUSE bug 1112532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130611">SUSE bug 1130611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130617">SUSE bug 1130617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130620">SUSE bug 1130620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130622">SUSE bug 1130622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130623">SUSE bug 1130623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130627">SUSE bug 1130627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152990">SUSE bug 1152990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152992">SUSE bug 1152992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152994">SUSE bug 1152994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152995">SUSE bug 1152995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171517">SUSE bug 1171517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172275">SUSE bug 1172275</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-9096/">CVE-2015-9096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-9096">CVE-2015-9096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2339/">CVE-2016-2339 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2339">CVE-2016-2339 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7798/">CVE-2016-7798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7798">CVE-2016-7798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0898/">CVE-2017-0898 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0898">CVE-2017-0898 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-0899/">CVE-2017-0899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0899">CVE-2017-0899 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-0900/">CVE-2017-0900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0900">CVE-2017-0900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-0901/">CVE-2017-0901 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0901">CVE-2017-0901 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0902/">CVE-2017-0902 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0902">CVE-2017-0902 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0903/">CVE-2017-0903 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0903">CVE-2017-0903 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10784/">CVE-2017-10784 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10784">CVE-2017-10784 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14033/">CVE-2017-14033 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14033">CVE-2017-14033 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14064/">CVE-2017-14064 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14064">CVE-2017-14064 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17405/">CVE-2017-17405 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17405">CVE-2017-17405 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17742/">CVE-2017-17742 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17742">CVE-2017-17742 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17790/">CVE-2017-17790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17790">CVE-2017-17790 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9228/">CVE-2017-9228 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9228">CVE-2017-9228 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9229/">CVE-2017-9229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9229">CVE-2017-9229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000073/">CVE-2018-1000073 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000073">CVE-2018-1000073 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000074/">CVE-2018-1000074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000074">CVE-2018-1000074 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000075/">CVE-2018-1000075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000075">CVE-2018-1000075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000076/">CVE-2018-1000076 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000076">CVE-2018-1000076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000077/">CVE-2018-1000077 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000077">CVE-2018-1000077 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000078/">CVE-2018-1000078 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000078">CVE-2018-1000078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000079/">CVE-2018-1000079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000079">CVE-2018-1000079 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16395/">CVE-2018-16395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16395">CVE-2018-16395 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16396/">CVE-2018-16396 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16396">CVE-2018-16396 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6914/">CVE-2018-6914 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6914">CVE-2018-6914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8777/">CVE-2018-8777 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8777">CVE-2018-8777 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8778/">CVE-2018-8778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8778">CVE-2018-8778 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8779/">CVE-2018-8779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8779">CVE-2018-8779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8780/">CVE-2018-8780 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8780">CVE-2018-8780 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-15845/">CVE-2019-15845 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15845">CVE-2019-15845 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16201/">CVE-2019-16201 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16201">CVE-2019-16201 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16254/">CVE-2019-16254 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16254">CVE-2019-16254 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-16255/">CVE-2019-16255 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16255">CVE-2019-16255 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8320/">CVE-2019-8320 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8320">CVE-2019-8320 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8321/">CVE-2019-8321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8321">CVE-2019-8321 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8322/">CVE-2019-8322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8322">CVE-2019-8322 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8323/">CVE-2019-8323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8323">CVE-2019-8323 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8324/">CVE-2019-8324 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8324">CVE-2019-8324 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8325/">CVE-2019-8325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8325">CVE-2019-8325 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148860" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk to version 7u261 fixes the following issues:

- CVE-2020-2756: Better mapping of serial ENUMs (bsc#1169511)
- CVE-2020-2757: Less Blocking Array Queues (bsc#1169511)
- CVE-2020-2773: Better signatures in XML (bsc#1169511)
- CVE-2020-2781: Improve TLS session handling (bsc#1169511)
- CVE-2020-2800: Better Headings for HTTP Servers (bsc#1169511)
- CVE-2020-2803: Enhance buffering of byte buffers (bsc#1169511)
- CVE-2020-2805: Enhance typing of methods (bsc#1169511)
- CVE-2020-2830: Better Scanner conversions (bsc#1169511)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2773">CVE-2020-2773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531017" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531018" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531019" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531020" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148861" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1159856" ref_url="https://bugzilla.suse.com/1159856" source="BUGZILLA"/>
		<reference ref_id="1159858" ref_url="https://bugzilla.suse.com/1159858" source="BUGZILLA"/>
		<reference ref_id="1159860" ref_url="https://bugzilla.suse.com/1159860" source="BUGZILLA"/>
		<reference ref_id="1160250" ref_url="https://bugzilla.suse.com/1160250" source="BUGZILLA"/>
		<reference ref_id="1160251" ref_url="https://bugzilla.suse.com/1160251" source="BUGZILLA"/>
		<reference ref_id="1160937" ref_url="https://bugzilla.suse.com/1160937" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15691" ref_url="https://www.suse.com/security/cve/CVE-2019-15691/" source="CVE"/>
		<reference ref_id="CVE-2019-15692" ref_url="https://www.suse.com/security/cve/CVE-2019-15692/" source="CVE"/>
		<reference ref_id="CVE-2019-15693" ref_url="https://www.suse.com/security/cve/CVE-2019-15693/" source="CVE"/>
		<reference ref_id="CVE-2019-15694" ref_url="https://www.suse.com/security/cve/CVE-2019-15694/" source="CVE"/>
		<reference ref_id="CVE-2019-15695" ref_url="https://www.suse.com/security/cve/CVE-2019-15695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006396.html" source="SUSE-SU"/>
		<description>
This update for tigervnc fixes the following issues:

- CVE-2019-15691: Fixed a use-after-return due to incorrect usage of stack memory in ZRLEDecoder (bsc#1159856).
- CVE-2019-15692: Fixed a heap-based buffer overflow in CopyRectDecode (bsc#1160250).
- CVE-2019-15693: Fixed a heap-based buffer overflow in TightDecoder::FilterGradient (bsc#1159858).
- CVE-2019-15694: Fixed a heap-based buffer overflow, caused by improper error handling in processing MemOutStream (bsc#1160251).
- CVE-2019-15695: Fixed a stack-based buffer overflow, which could be triggered from CMsgReader::readSetCursor (bsc#1159860).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159856">SUSE bug 1159856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159858">SUSE bug 1159858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159860">SUSE bug 1159860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160250">SUSE bug 1160250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160251">SUSE bug 1160251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160937">SUSE bug 1160937</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15691/">CVE-2019-15691 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15691">CVE-2019-15691 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15692/">CVE-2019-15692 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15692">CVE-2019-15692 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15693/">CVE-2019-15693 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15693">CVE-2019-15693 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15694/">CVE-2019-15694 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15694">CVE-2019-15694 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15695/">CVE-2019-15695 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15695">CVE-2019-15695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531021" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531022" comment="tigervnc-1.6.0-18.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531023" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148862" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1156353" ref_url="https://bugzilla.suse.com/1156353" source="BUGZILLA"/>
		<reference ref_id="1172466" ref_url="https://bugzilla.suse.com/1172466" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006918.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)
  
This update contains security mitigations for:

- CVE-2020-0543: Fixed a side channel attack against special registers
  which could have resulted in leaking of read values to cores other
  than the one which called it.  This attack is known as Special Register
  Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to
  mitigate the Vector Register and L1D Eviction Sampling aka 'CacheOutAttack'
  attacks. (bsc#1156353)

Microcode Table:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  HSW          C0       6-3c-3/32 00000027-&gt;00000028 Core Gen4
  BDW-U/Y      E0/F0    6-3d-4/c0 0000002e-&gt;0000002f Core Gen5
  HSW-U        C0/D0    6-45-1/72 00000025-&gt;00000026 Core Gen4
  HSW-H        C0       6-46-1/32 0000001b-&gt;0000001c Core Gen4
  BDW-H/E3     E0/G0    6-47-1/22 00000021-&gt;00000022 Core Gen5
  SKL-U/Y      D0       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKL-U23e     K1       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKX-SP       B1       6-55-3/97 01000151-&gt;01000157 Xeon Scalable
  SKX-SP       H0/M0/U0 6-55-4/b7 02000065-&gt;02006906 Xeon Scalable
  SKX-D        M1       6-55-4/b7 02000065-&gt;02006906 Xeon D-21xx
  CLX-SP       B0       6-55-6/bf 0400002c-&gt;04002f01 Xeon Scalable Gen2
  CLX-SP       B1       6-55-7/bf 0500002c-&gt;04002f01 Xeon Scalable Gen2
  SKL-H/S      R0/N0    6-5e-3/36 000000d6-&gt;000000dc Core Gen6; Xeon E3 v5
  AML-Y22      H0       6-8e-9/10 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-U/Y      H0       6-8e-9/c0 000000ca-&gt;000000d6 Core Gen7 Mobile
  CFL-U43e     D0       6-8e-a/c0 000000ca-&gt;000000d6 Core Gen8 Mobile
  WHL-U        W0       6-8e-b/d0 000000ca-&gt;000000d6 Core Gen8 Mobile
  AML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  CML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  WHL-U        V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-G/H/S/E3 B0       6-9e-9/2a 000000ca-&gt;000000d6 Core Gen7; Xeon E3 v6
  CFL-H/S/E3   U0       6-9e-a/22 000000ca-&gt;000000d6 Core Gen8 Desktop, Mobile, Xeon E
  CFL-S        B0       6-9e-b/02 000000ca-&gt;000000d6 Core Gen8
  CFL-H/S      P0       6-9e-c/22 000000ca-&gt;000000d6 Core Gen9
  CFL-H        R0       6-9e-d/22 000000ca-&gt;000000d6 Core Gen9 Mobile

Also contains the Intel CPU Microcode update to 20200520:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061f-&gt;00000621 Xeon E3/E5, Core X
  SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000718-&gt;0000071a Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172466">SUSE bug 1172466</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0548">CVE-2020-0548 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0549">CVE-2020-0549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531024" comment="ucode-intel-20200602-13.68.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148863" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1161951" ref_url="https://bugzilla.suse.com/1161951" source="BUGZILLA"/>
		<reference ref_id="1164871" ref_url="https://bugzilla.suse.com/1164871" source="BUGZILLA"/>
		<reference ref_id="1169025" ref_url="https://bugzilla.suse.com/1169025" source="BUGZILLA"/>
		<reference ref_id="1169625" ref_url="https://bugzilla.suse.com/1169625" source="BUGZILLA"/>
		<reference ref_id="1170383" ref_url="https://bugzilla.suse.com/1170383" source="BUGZILLA"/>
		<reference ref_id="1170618" ref_url="https://bugzilla.suse.com/1170618" source="BUGZILLA"/>
		<reference ref_id="1170620" ref_url="https://bugzilla.suse.com/1170620" source="BUGZILLA"/>
		<reference ref_id="1171098" ref_url="https://bugzilla.suse.com/1171098" source="BUGZILLA"/>
		<reference ref_id="1171195" ref_url="https://bugzilla.suse.com/1171195" source="BUGZILLA"/>
		<reference ref_id="1171202" ref_url="https://bugzilla.suse.com/1171202" source="BUGZILLA"/>
		<reference ref_id="1171218" ref_url="https://bugzilla.suse.com/1171218" source="BUGZILLA"/>
		<reference ref_id="1171219" ref_url="https://bugzilla.suse.com/1171219" source="BUGZILLA"/>
		<reference ref_id="1171689" ref_url="https://bugzilla.suse.com/1171689" source="BUGZILLA"/>
		<reference ref_id="1171698" ref_url="https://bugzilla.suse.com/1171698" source="BUGZILLA"/>
		<reference ref_id="1172032" ref_url="https://bugzilla.suse.com/1172032" source="BUGZILLA"/>
		<reference ref_id="1172221" ref_url="https://bugzilla.suse.com/1172221" source="BUGZILLA"/>
		<reference ref_id="1172317" ref_url="https://bugzilla.suse.com/1172317" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="CVE-2020-12114" ref_url="https://www.suse.com/security/cve/CVE-2020-12114/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
  This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12114: Fixed A pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).

The following non-security bugs were fixed:

- can, slip: Protect tty-&gt;disc_data in write_wakeup and close with RCU (bsc#1171698).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).
- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).
- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).
- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).
- Drivers: hv: vmbus: Make panic reporting to be more useful (bsc#1170618).
- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).
- EDAC: Convert to new X86 CPU match macros
- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).
- ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).
- KEYS: reaching the keys quotas correctly (bsc#1171689).
- NFS: Cleanup if nfs_match_client is interrupted (bsc#1169025).
- NFS: Fix a double unlock from nfs_match,get_client (bsc#1169025).
- NFS: make nfs_match_client killable (bsc#1169025).
- NFS: Unlock requests must never fail (bsc#1172032).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (bsc#1161951 ltc#183551).
- scsi: ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).
- x86/dumpstack/64: Handle faults when printing the 'Stack: ' part of an OOPS (bsc#1170383).
- x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170620).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).
- x86: hyperv: report value of misc_features (git fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161951">SUSE bug 1161951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164871">SUSE bug 1164871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169025">SUSE bug 1169025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169625">SUSE bug 1169625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170383">SUSE bug 1170383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170618">SUSE bug 1170618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170620">SUSE bug 1170620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171098">SUSE bug 1171098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171195">SUSE bug 1171195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171202">SUSE bug 1171202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171218">SUSE bug 1171218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171689">SUSE bug 1171689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171698">SUSE bug 1171698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172032">SUSE bug 1172032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172221">SUSE bug 1172221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172317">SUSE bug 1172317</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12114/">CVE-2020-12114 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12114">CVE-2020-12114 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12652">CVE-2020-12652 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12656">CVE-2020-12656 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555718" comment="kernel-default-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555719" comment="kernel-default-base-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555720" comment="kernel-default-devel-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556289" comment="kernel-default-kgraft-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538432" comment="kernel-devel-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538433" comment="kernel-macros-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538434" comment="kernel-source-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555721" comment="kernel-syms-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556291" comment="kgraft-patch-4_4_180-94_121-default-1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148864" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1159478" ref_url="https://bugzilla.suse.com/1159478" source="BUGZILLA"/>
		<reference ref_id="1159479" ref_url="https://bugzilla.suse.com/1159479" source="BUGZILLA"/>
		<reference ref_id="1159482" ref_url="https://bugzilla.suse.com/1159482" source="BUGZILLA"/>
		<reference ref_id="1159486" ref_url="https://bugzilla.suse.com/1159486" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18388" ref_url="https://www.suse.com/security/cve/CVE-2019-18388/" source="CVE"/>
		<reference ref_id="CVE-2019-18389" ref_url="https://www.suse.com/security/cve/CVE-2019-18389/" source="CVE"/>
		<reference ref_id="CVE-2019-18390" ref_url="https://www.suse.com/security/cve/CVE-2019-18390/" source="CVE"/>
		<reference ref_id="CVE-2019-18391" ref_url="https://www.suse.com/security/cve/CVE-2019-18391/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<description>
This update for virglrenderer fixes the following issues:

- CVE-2019-18388: Fixed a null pointer dereference which could have led
   to denial of service (bsc#1159479).
- CVE-2019-18390: Fixed an out of bound read which could have led to
  denial of service (bsc#1159478).
- CVE-2019-18389: Fixed a heap buffer overflow which could have led to
  guest escape or denial of service (bsc#1159482).
- CVE-2019-18391: Fixed a heap based buffer overflow which could have led to
  guest escape or denial of service (bsc#1159486).  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159478">SUSE bug 1159478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159479">SUSE bug 1159479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159482">SUSE bug 1159482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159486">SUSE bug 1159486</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18388/">CVE-2019-18388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18388">CVE-2019-18388 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18389/">CVE-2019-18389 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18389">CVE-2019-18389 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18390/">CVE-2019-18390 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18390">CVE-2019-18390 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18391/">CVE-2019-18391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18391">CVE-2019-18391 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522550" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148865" version="1" class="patch">
	<metadata>
		<title>Security update for adns (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1172265" ref_url="https://bugzilla.suse.com/1172265" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9103" ref_url="https://www.suse.com/security/cve/CVE-2017-9103/" source="CVE"/>
		<reference ref_id="CVE-2017-9104" ref_url="https://www.suse.com/security/cve/CVE-2017-9104/" source="CVE"/>
		<reference ref_id="CVE-2017-9105" ref_url="https://www.suse.com/security/cve/CVE-2017-9105/" source="CVE"/>
		<reference ref_id="CVE-2017-9106" ref_url="https://www.suse.com/security/cve/CVE-2017-9106/" source="CVE"/>
		<reference ref_id="CVE-2017-9107" ref_url="https://www.suse.com/security/cve/CVE-2017-9107/" source="CVE"/>
		<reference ref_id="CVE-2017-9108" ref_url="https://www.suse.com/security/cve/CVE-2017-9108/" source="CVE"/>
		<reference ref_id="CVE-2017-9109" ref_url="https://www.suse.com/security/cve/CVE-2017-9109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006937.html" source="SUSE-SU"/>
		<description>
This update for adns fixes the following issues:
	  
- CVE-2017-9103,CVE-2017-9104,CVE-2017-9105,CVE-2017-9109: Fixed an issue in local recursive resolver
  which could have led to remote code execution (bsc#1172265).
- CVE-2017-9106: Fixed an issue with upstream DNS data sources which could have led to denial of 
  service (bsc#1172265).
- CVE-2017-9107: Fixed an issue when quering domain names which could have led to denial of service (bsc#1172265).
- CVE-2017-9108: Fixed an issue which could have led to denial of service (bsc#1172265).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-12"/>
	<updated date="2020-06-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9103/">CVE-2017-9103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9103">CVE-2017-9103 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9104/">CVE-2017-9104 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9104">CVE-2017-9104 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9105/">CVE-2017-9105 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9105">CVE-2017-9105 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9106/">CVE-2017-9106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9106">CVE-2017-9106 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9107/">CVE-2017-9107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9107">CVE-2017-9107 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9108/">CVE-2017-9108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9108">CVE-2017-9108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9109/">CVE-2017-9109 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9109">CVE-2017-9109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531033" comment="libadns1-1.4-103.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148866" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs6 (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1166916" ref_url="https://bugzilla.suse.com/1166916" source="BUGZILLA"/>
		<reference ref_id="1172443" ref_url="https://bugzilla.suse.com/1172443" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7598" ref_url="https://www.suse.com/security/cve/CVE-2020-7598/" source="CVE"/>
		<reference ref_id="CVE-2020-8174" ref_url="https://www.suse.com/security/cve/CVE-2020-8174/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006945.html" source="SUSE-SU"/>
		<description>
This update for nodejs6 fixes the following issues:

- CVE-2020-8174: Fixed multiple memory corruption in napi_get_value_string_*() (bsc#1172443).
- CVE-2020-7598: Fixed an issue which could have tricked minimist into adding or modifying 
  properties of Object.prototype (bsc#1166916).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-15"/>
	<updated date="2020-06-15"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1166916">SUSE bug 1166916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172443">SUSE bug 1172443</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-7598/">CVE-2020-7598 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7598">CVE-2020-7598 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8174/">CVE-2020-8174 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8174">CVE-2020-8174 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597673" comment="nodejs6-6.17.1-11.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148867" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1171550" ref_url="https://bugzilla.suse.com/1171550" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2752" ref_url="https://www.suse.com/security/cve/CVE-2020-2752/" source="CVE"/>
		<reference ref_id="CVE-2020-2812" ref_url="https://www.suse.com/security/cve/CVE-2020-2812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006946.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

mariadb was updated to version 10.0.44 (bsc#1171550)

- CVE-2020-2752: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.
- CVE-2020-2812: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-16"/>
	<updated date="2020-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171550">SUSE bug 1171550</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2752/">CVE-2020-2752 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2752">CVE-2020-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2812/">CVE-2020-2812 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2812">CVE-2020-2812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557472" comment="libmysqlclient18-10.0.40.4-29.41.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148868" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1157888" ref_url="https://bugzilla.suse.com/1157888" source="BUGZILLA"/>
		<reference ref_id="1158003" ref_url="https://bugzilla.suse.com/1158003" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1158007" ref_url="https://bugzilla.suse.com/1158007" source="BUGZILLA"/>
		<reference ref_id="1161181" ref_url="https://bugzilla.suse.com/1161181" source="BUGZILLA"/>
		<reference ref_id="1167152" ref_url="https://bugzilla.suse.com/1167152" source="BUGZILLA"/>
		<reference ref_id="1168140" ref_url="https://bugzilla.suse.com/1168140" source="BUGZILLA"/>
		<reference ref_id="1168142" ref_url="https://bugzilla.suse.com/1168142" source="BUGZILLA"/>
		<reference ref_id="1169392" ref_url="https://bugzilla.suse.com/1169392" source="BUGZILLA"/>
		<reference ref_id="1172205" ref_url="https://bugzilla.suse.com/1172205" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19581" ref_url="https://www.suse.com/security/cve/CVE-2019-19581/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-11739" ref_url="https://www.suse.com/security/cve/CVE-2020-11739/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742/" source="CVE"/>
		<reference ref_id="CVE-2020-7211" ref_url="https://www.suse.com/security/cve/CVE-2020-7211/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
  This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1172205).
- CVE-2020-11742: Bad continuation handling in GNTTABOP_copy (bsc#1169392).
- CVE-2020-11740, CVE-2020-11741: xen: XSA-313 multiple xenoprof issues (bsc#1168140).
- CVE-2020-11739: Missing memory barriers in read-write unlock paths (bsc#1168142).
- CVE-2019-19583: Fixed improper checks which could have allowed HVM/PVH guest userspace code to crash the guest, leading to a guest denial of service (bsc#1158004 XSA-308).
- CVE-2019-19581: Fixed a potential out of bounds on 32-bit Arm (bsc#1158003 XSA-307).
- CVE-2019-19580: Fixed a privilege escalation where a malicious PV guest administrator could have been able to escalate their privilege to that of the host (bsc#1158006 XSA-310).
- CVE-2019-19579: Fixed a privilege escalation where an untrusted domain with access to a physical device can DMA into host memory (bsc#1157888 XSA-306).
- CVE-2019-19578: Fixed an issue where a malicious or buggy PV guest could have caused hypervisor crash resulting in denial of service affecting the entire host (bsc#1158005 XSA-309).
- CVE-2019-19577: Fixed an issue where a malicious guest administrator could have caused Xen to access data structures while they are being modified leading to a crash (bsc#1158007 XSA-311). 
- Xenstored Crashed during VM install (bsc#1167152)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-16"/>
	<updated date="2020-06-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161181">SUSE bug 1161181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167152">SUSE bug 1167152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168142">SUSE bug 1168142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19577">CVE-2019-19577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19578">CVE-2019-19578 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19579">CVE-2019-19579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19580">CVE-2019-19580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19581/">CVE-2019-19581 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19581">CVE-2019-19581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19583">CVE-2019-19583 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11739/">CVE-2020-11739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11739">CVE-2020-11739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11740">CVE-2020-11740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11741">CVE-2020-11741 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11742">CVE-2020-11742 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7211/">CVE-2020-7211 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7211">CVE-2020-7211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538437" comment="xen-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538438" comment="xen-doc-html-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538439" comment="xen-libs-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538440" comment="xen-libs-32bit-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538441" comment="xen-tools-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538442" comment="xen-tools-domU-4.9.4_06-3.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148869" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1102840" ref_url="https://bugzilla.suse.com/1102840" source="BUGZILLA"/>
		<reference ref_id="1160039" ref_url="https://bugzilla.suse.com/1160039" source="BUGZILLA"/>
		<reference ref_id="1170601" ref_url="https://bugzilla.suse.com/1170601" source="BUGZILLA"/>
		<reference ref_id="1171863" ref_url="https://bugzilla.suse.com/1171863" source="BUGZILLA"/>
		<reference ref_id="1171864" ref_url="https://bugzilla.suse.com/1171864" source="BUGZILLA"/>
		<reference ref_id="1171866" ref_url="https://bugzilla.suse.com/1171866" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543/" source="CVE"/>
		<reference ref_id="CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878/" source="CVE"/>
		<reference ref_id="CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006972.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

- CVE-2020-10543: Fixed a heap buffer overflow in regular expression compiler which could have 
  allowed overwriting of allocated memory with attacker's data (bsc#1171863).
- CVE-2020-10878: Fixed multiple integer overflows which could have allowed the insertion of 
  instructions into the compiled form of Perl regular expression (bsc#1171864).
- CVE-2020-12723: Fixed an attacker's corruption of the intermediate language state of a 
  compiled regular expression (bsc#1171866).
- Fixed utf8 handling in perldoc by useing 'term' instead of 'man' (bsc#1170601).
- Some packages make assumptions about the date and time they are built. 
  This update will solve the issues caused by calling the perl function timelocal
  expressing the year with two digit only instead of four digits. (bsc#1102840) (bsc#1160039)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-18"/>
	<updated date="2020-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102840">SUSE bug 1102840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160039">SUSE bug 1160039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170601">SUSE bug 1170601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171863">SUSE bug 1171863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171864">SUSE bug 1171864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171866">SUSE bug 1171866</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10543">CVE-2020-10543 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10878">CVE-2020-10878 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12723">CVE-2020-12723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531034" comment="perl-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531035" comment="perl-32bit-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531036" comment="perl-base-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531037" comment="perl-doc-5.18.2-12.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148870" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 65 (bsc#1172277 and bsc#1169511)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531038" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531040" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531041" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148871" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

java-1_8_0-ibm was updated to Java 8.0 Service Refresh 6 Fix Pack 10 (bsc#1172277,bsc#1169511,bsc#1160968)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2754: Forwarded references to Nashorn 
- CVE-2020-2755: Improved Nashorn matching 
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
- CVE-2019-2949: Fixed an issue which could have resulted in unauthorized access to critical data 
- Added RSA PSS SUPPORT TO IBMPKCS11IMPL
- The pack200 and unpack200 alternatives should be slaves of java (bsc#1171352).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2949">CVE-2019-2949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2754">CVE-2020-2754 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2755">CVE-2020-2755 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531043" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531045" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148872" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1160398" ref_url="https://bugzilla.suse.com/1160398" source="BUGZILLA"/>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version jdk8u252 fixes the following issues:

- CVE-2020-2754: Forward references to Nashorn (bsc#1169511)
- CVE-2020-2755: Improve Nashorn matching (bsc#1169511)
- CVE-2020-2756: Better mapping of serial ENUMs (bsc#1169511)
- CVE-2020-2757: Less Blocking Array Queues (bsc#1169511)
- CVE-2020-2773: Better signatures in XML (bsc#1169511)
- CVE-2020-2781: Improve TLS session handling (bsc#1169511)
- CVE-2020-2800: Better Headings for HTTP Servers (bsc#1169511)
- CVE-2020-2803: Enhance buffering of byte buffers (bsc#1169511)
- CVE-2020-2805: Enhance typing of methods (bsc#1169511)
- CVE-2020-2830: Better Scanner conversions (bsc#1169511)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160398">SUSE bug 1160398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2754">CVE-2020-2754 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2755">CVE-2020-2755 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2773">CVE-2020-2773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531047" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531048" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531049" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531050" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148873" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1172049" ref_url="https://bugzilla.suse.com/1172049" source="BUGZILLA"/>
		<reference ref_id="1172781" ref_url="https://bugzilla.suse.com/1172781" source="BUGZILLA"/>
		<reference ref_id="1172782" ref_url="https://bugzilla.suse.com/1172782" source="BUGZILLA"/>
		<reference ref_id="1172783" ref_url="https://bugzilla.suse.com/1172783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766/" source="CVE"/>
		<reference ref_id="CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767/" source="CVE"/>
		<reference ref_id="CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007008.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-10768: Fixed an issue with the prctl() function which could have allowed indirect branch speculation even after it has been disabled (bsc#1172783).
- CVE-2020-10767: Fixed an issue where the Indirect Branch Prediction Barrier (IBPB) would have been disabled when STIBP is unavailable or enhanced IBRS is available making the system vulnerable to spectre v2 (bsc#1172782).
- CVE-2020-10766: Fixed an issue with Linux scheduler which could have allowed an attacker to turn off the SSBD protection (bsc#1172781).

- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1172049).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-23"/>
	<updated date="2020-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172049">SUSE bug 1172049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10766">CVE-2020-10766 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10767">CVE-2020-10767 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10768">CVE-2020-10768 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555722" comment="kernel-default-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555723" comment="kernel-default-base-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555724" comment="kernel-default-devel-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556303" comment="kernel-default-kgraft-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538447" comment="kernel-devel-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538448" comment="kernel-macros-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538449" comment="kernel-source-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555725" comment="kernel-syms-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556305" comment="kgraft-patch-4_4_180-94_124-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148874" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1173027" ref_url="https://bugzilla.suse.com/1173027" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007017.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious server to overwrite a local file when using the -J option (bsc#1173027).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-24"/>
	<updated date="2020-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8177">CVE-2020-8177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531051" comment="curl-7.37.0-37.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531052" comment="libcurl4-7.37.0-37.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531053" comment="libcurl4-32bit-7.37.0-37.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148875" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1126230" ref_url="https://bugzilla.suse.com/1126230" source="BUGZILLA"/>
		<reference ref_id="1136082" ref_url="https://bugzilla.suse.com/1136082" source="BUGZILLA"/>
		<reference ref_id="1157607" ref_url="https://bugzilla.suse.com/1157607" source="BUGZILLA"/>
		<reference ref_id="1161096" ref_url="https://bugzilla.suse.com/1161096" source="BUGZILLA"/>
		<reference ref_id="1162553" ref_url="https://bugzilla.suse.com/1162553" source="BUGZILLA"/>
		<reference ref_id="1171670" ref_url="https://bugzilla.suse.com/1171670" source="BUGZILLA"/>
		<reference ref_id="1171921" ref_url="https://bugzilla.suse.com/1171921" source="BUGZILLA"/>
		<reference ref_id="1171960" ref_url="https://bugzilla.suse.com/1171960" source="BUGZILLA"/>
		<reference ref_id="1171961" ref_url="https://bugzilla.suse.com/1171961" source="BUGZILLA"/>
		<reference ref_id="1171963" ref_url="https://bugzilla.suse.com/1171963" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10753" ref_url="https://www.suse.com/security/cve/CVE-2020-10753/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007029.html" source="SUSE-SU"/>
		<description>
This is a version update for ceph to version 12.2.13:

Security issue fixed: 	  

- CVE-2020-10753: Fixed an HTTP header injection via CORS ExposeHeader tag (bsc#1171921).

- Notable changes in this update for ceph:
  * mgr: telemetry: backported and now available on SES5.5. Please
    consider enabling via 'ceph telemetry on' (bsc#1171670)
  * OSD heartbeat ping time: new health warning, options and admin
    commands (bsc#1171960)
  * 'osd_calc_pg_upmaps_max_stddev' ceph.conf parameter has been
    removed; use 'upmap_max_deviation' instead (bsc#1171961)
  * Default maximum concurrent bluestore rocksdb compaction threads
    raised from 1 to 2 for improved ability to keep up with rgw
    bucket index workloads (bsc#1171963)

- Bug fixes in this ceph update:
  * mon: Error message displayed when mon_osd_max_split_count would be
    exceeded is not as user-friendly as it could be (bsc#1126230)
  * ceph_volume_client: remove ceph mds calls in favor of ceph fs
    calls (bsc#1136082)
  * rgw: crypt: permit RGW-AUTO/default with SSE-S3 headers
    (bsc#1157607)
  * mon/AuthMonitor: don't validate fs caps on authorize (bsc#1161096)

- Additional bug fixes:
  * ceph-volume: strip _dmcrypt suffix in simple scan json output (bsc#1162553)		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-25"/>
	<updated date="2020-06-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1126230">SUSE bug 1126230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136082">SUSE bug 1136082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157607">SUSE bug 1157607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161096">SUSE bug 1161096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162553">SUSE bug 1162553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171670">SUSE bug 1171670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171921">SUSE bug 1171921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171960">SUSE bug 1171960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171961">SUSE bug 1171961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171963">SUSE bug 1171963</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10753/">CVE-2020-10753 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10753">CVE-2020-10753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555726" comment="ceph-common-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555727" comment="libcephfs2-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555728" comment="librados2-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555729" comment="libradosstriper1-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555730" comment="librbd1-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555731" comment="librgw2-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555732" comment="python-cephfs-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555733" comment="python-rados-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555734" comment="python-rbd-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555735" comment="python-rgw-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148876" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1172405" ref_url="https://bugzilla.suse.com/1172405" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8022" ref_url="https://www.suse.com/security/cve/CVE-2020-8022/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007047.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-8022: Fixed a local root exploit due to improper permissions (bsc#1172405)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172405">SUSE bug 1172405</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8022/">CVE-2020-8022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8022">CVE-2020-8022 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531054" comment="tomcat-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531055" comment="tomcat-admin-webapps-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531056" comment="tomcat-docs-webapp-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531057" comment="tomcat-el-3_0-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531058" comment="tomcat-javadoc-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531059" comment="tomcat-jsp-2_3-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531060" comment="tomcat-lib-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531061" comment="tomcat-servlet-3_1-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531062" comment="tomcat-webapps-8.0.53-29.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148877" version="1" class="patch">
	<metadata>
		<title>Security update for python3-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1054413" ref_url="https://bugzilla.suse.com/1054413" source="BUGZILLA"/>
		<reference ref_id="1073879" ref_url="https://bugzilla.suse.com/1073879" source="BUGZILLA"/>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="1122668" ref_url="https://bugzilla.suse.com/1122668" source="BUGZILLA"/>
		<reference ref_id="761500" ref_url="https://bugzilla.suse.com/761500" source="BUGZILLA"/>
		<reference ref_id="922448" ref_url="https://bugzilla.suse.com/922448" source="BUGZILLA"/>
		<reference ref_id="929736" ref_url="https://bugzilla.suse.com/929736" source="BUGZILLA"/>
		<reference ref_id="935252" ref_url="https://bugzilla.suse.com/935252" source="BUGZILLA"/>
		<reference ref_id="945455" ref_url="https://bugzilla.suse.com/945455" source="BUGZILLA"/>
		<reference ref_id="947357" ref_url="https://bugzilla.suse.com/947357" source="BUGZILLA"/>
		<reference ref_id="961596" ref_url="https://bugzilla.suse.com/961596" source="BUGZILLA"/>
		<reference ref_id="967128" ref_url="https://bugzilla.suse.com/967128" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007049.html" source="SUSE-SU"/>
		<description>
This update for python3-requests provides the following fix:

python-requests was updated to 2.20.1.

Update to version 2.20.1:

* Fixed bug with unintended Authorization header stripping for
  redirects using default ports (http/80, https/443).

Update to version 2.20.0:

* Bugfixes

  + Content-Type header parsing is now case-insensitive
    (e.g. charset=utf8 v Charset=utf8).
  + Fixed exception leak where certain redirect urls would raise
    uncaught urllib3 exceptions.
  + Requests removes Authorization header from requests redirected
    from https to http on the same hostname. (CVE-2018-18074)
  + should_bypass_proxies now handles URIs without hostnames
    (e.g. files).

Update to version 2.19.1:

* Fixed issue where status_codes.py’s init function failed trying
  to append to a __doc__ value of None.

Update to version 2.19.0:

* Improvements

  + Warn about possible slowdown with cryptography version &lt; 1.3.4
  + Check host in proxy URL, before forwarding request to adapter.
  + Maintain fragments properly across redirects. (RFC7231 7.1.2)
  + Removed use of cgi module to expedite library load time.
  + Added support for SHA-256 and SHA-512 digest auth algorithms.
  + Minor performance improvement to Request.content.

* Bugfixes

  + Parsing empty Link headers with parse_header_links() no longer
    return one bogus entry.
  + Fixed issue where loading the default certificate bundle from
    a zip archive would raise an IOError.
  + Fixed issue with unexpected ImportError on windows system
    which do not support winreg module.
  + DNS resolution in proxy bypass no longer includes the username
    and password in the request. This also fixes the issue of DNS
    queries failing on macOS.
  + Properly normalize adapter prefixes for url comparison.
  + Passing None as a file pointer to the files param no longer
    raises an exception.
  + Calling copy on a RequestsCookieJar will now preserve the
    cookie policy correctly.

Update to version 2.18.4:

* Improvements

  + Error messages for invalid headers now include the header name
    for easier debugging

Update to version 2.18.3:

* Improvements
  + Running $ python -m requests.help now includes the installed
    version of idna.
* Bugfixes
  + Fixed issue where Requests would raise ConnectionError instead
    of SSLError when encountering SSL problems when using urllib3
    v1.22.

- Add ca-certificates (and ca-certificates-mozilla) to dependencies, otherwise https
  connections will fail.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054413">SUSE bug 1054413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073879">SUSE bug 1073879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122668">SUSE bug 1122668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761500">SUSE bug 761500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922448">SUSE bug 922448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929736">SUSE bug 929736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935252">SUSE bug 935252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945455">SUSE bug 945455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947357">SUSE bug 947357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961596">SUSE bug 961596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967128">SUSE bug 967128</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2296">CVE-2015-2296 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009525269" comment="python3-certifi-2018.4.16-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525270" comment="python3-chardet-3.0.4-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531063" comment="python3-requests-2.20.1-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525271" comment="python3-urllib3-1.22-3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148878" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1172906" ref_url="https://bugzilla.suse.com/1172906" source="BUGZILLA"/>
		<reference ref_id="1172935" ref_url="https://bugzilla.suse.com/1172935" source="BUGZILLA"/>
		<reference ref_id="1173197" ref_url="https://bugzilla.suse.com/1173197" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093/" source="CVE"/>
		<reference ref_id="CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154/" source="CVE"/>
		<reference ref_id="CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007050.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-14954: Fixed a response injection due to a STARTTLS buffering issue which was
  affecting IMAP, SMTP, and POP3 (bsc#1173197).
- CVE-2020-14093: Fixed a potential IMAP Man-in-the-Middle attack via a PREAUTH response (bsc#1172906, bsc#1172935).
- CVE-2020-14154: Fixed an issue where Mutt was ignoring an expired certificate and was
  proceeding with a connection (bsc#1172906, bsc#1172935).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-29"/>
	<updated date="2020-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173197">SUSE bug 1173197</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14093">CVE-2020-14093 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14154">CVE-2020-14154 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14954">CVE-2020-14954 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531064" comment="mutt-1.10.1-55.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148879" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1167373" ref_url="https://bugzilla.suse.com/1167373" source="BUGZILLA"/>
		<reference ref_id="1173304" ref_url="https://bugzilla.suse.com/1173304" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860/" source="CVE"/>
		<reference ref_id="CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007055.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-14059: Fixed an issue where a client could potentially deny the service of a server 
  during TLS Handshake (bsc#1173304).
- CVE-2019-18860: Fixed handling of invalid domain names in cachemgr.cgi (bsc#1167373).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167373">SUSE bug 1167373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173304">SUSE bug 1173304</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18860">CVE-2019-18860 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14059">CVE-2020-14059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531065" comment="squid-3.5.21-26.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148880" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1169740" ref_url="https://bugzilla.suse.com/1169740" source="BUGZILLA"/>
		<reference ref_id="1171355" ref_url="https://bugzilla.suse.com/1171355" source="BUGZILLA"/>
		<reference ref_id="1172651" ref_url="https://bugzilla.suse.com/1172651" source="BUGZILLA"/>
		<reference ref_id="1173334" ref_url="https://bugzilla.suse.com/1173334" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8956" ref_url="https://www.suse.com/security/cve/CVE-2018-8956/" source="CVE"/>
		<reference ref_id="CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868/" source="CVE"/>
		<reference ref_id="CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817/" source="CVE"/>
		<reference ref_id="CVE-2020-15025" ref_url="https://www.suse.com/security/cve/CVE-2020-15025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007056.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

ntp was updated to 4.2.8p15

- CVE-2020-11868: Fixed an issue which a server mode packet with spoofed source address 
  frequently send to the client ntpd could have caused denial of service (bsc#1169740).
- CVE-2018-8956: Fixed an issue which could have allowed remote attackers to prevent 
  a broadcast client from synchronizing its clock with a broadcast NTP server via spoofed 
  mode 3 and mode 5 packets (bsc#1171355).
- CVE-2020-13817: Fixed an issue which an off-path attacker with the ability to query time 
  from victim's ntpd instance could have modified the victim's clock by a limited amount (bsc#1172651).
- CVE-2020-15025: Fixed an issue which remote attacker could have caused denial of service by consuming 
  the memory when a CMAC key was used andassociated with a CMAC algorithm in the ntp.keys (bsc#1173334).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169740">SUSE bug 1169740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171355">SUSE bug 1171355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172651">SUSE bug 1172651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173334">SUSE bug 1173334</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8956/">CVE-2018-8956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8956">CVE-2018-8956 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11868">CVE-2020-11868 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13817">CVE-2020-13817 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15025/">CVE-2020-15025 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15025">CVE-2020-15025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531066" comment="ntp-4.2.8p15-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531067" comment="ntp-doc-4.2.8p15-88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148881" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="1168669" ref_url="https://bugzilla.suse.com/1168669" source="BUGZILLA"/>
		<reference ref_id="1169746" ref_url="https://bugzilla.suse.com/1169746" source="BUGZILLA"/>
		<reference ref_id="1170908" ref_url="https://bugzilla.suse.com/1170908" source="BUGZILLA"/>
		<reference ref_id="1171978" ref_url="https://bugzilla.suse.com/1171978" source="BUGZILLA"/>
		<reference ref_id="1173022" ref_url="https://bugzilla.suse.com/1173022" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007069.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to version 3.53.1

- CVE-2020-12402: Fixed a potential side channel attack during RSA key generation (bsc#1173032).
- CVE-2020-12399: Fixed a timing attack on DSA signature generation (bsc#1171978).
- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- Fixed various FIPS issues in libfreebl3 which were causing segfaults in the test suite of chrony (bsc#1168669).
- Fixed an issue where Firefox tab was crashing (bsc#1170908).

Release notes: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes

mozilla-nspr to version 4.25
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-03"/>
	<updated date="2020-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168669">SUSE bug 1168669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169746">SUSE bug 1169746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170908">SUSE bug 1170908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171978">SUSE bug 1171978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173022">SUSE bug 1173022</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17006">CVE-2019-17006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12399">CVE-2020-12399 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531068" comment="libfreebl3-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531069" comment="libfreebl3-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531070" comment="libfreebl3-hmac-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531071" comment="libfreebl3-hmac-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531072" comment="libsoftokn3-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531073" comment="libsoftokn3-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531074" comment="libsoftokn3-hmac-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531075" comment="libsoftokn3-hmac-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531076" comment="mozilla-nspr-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531077" comment="mozilla-nspr-32bit-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597238" comment="mozilla-nspr-devel-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531078" comment="mozilla-nss-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531079" comment="mozilla-nss-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531080" comment="mozilla-nss-certs-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531081" comment="mozilla-nss-certs-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597239" comment="mozilla-nss-devel-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531082" comment="mozilla-nss-sysinit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531083" comment="mozilla-nss-sysinit-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531084" comment="mozilla-nss-tools-3.53.1-58.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148882" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1170715" ref_url="https://bugzilla.suse.com/1170715" source="BUGZILLA"/>
		<reference ref_id="1172698" ref_url="https://bugzilla.suse.com/1172698" source="BUGZILLA"/>
		<reference ref_id="1172704" ref_url="https://bugzilla.suse.com/1172704" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007077.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8023: Fixed a potential local privilege escalation from ldap to root when OPENLDAP_CONFIG_BACKEND='ldap' was used (bsc#1172698).	  
- Changed DB_CONFIG to root:ldap permissions (bsc#1172704).	 
- Fixed an issue where slapd becomes unresponsive after many failed login/bind attempts(bsc#1170715).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170715">SUSE bug 1170715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172704">SUSE bug 1172704</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8023">CVE-2020-8023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531085" comment="libldap-2_4-2-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531086" comment="libldap-2_4-2-32bit-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531087" comment="openldap2-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531088" comment="openldap2-back-meta-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531089" comment="openldap2-client-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531090" comment="openldap2-doc-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531091" comment="openldap2-ppolicy-check-password-1.2-18.71.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148883" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1173377" ref_url="https://bugzilla.suse.com/1173377" source="BUGZILLA"/>
		<reference ref_id="1173378" ref_url="https://bugzilla.suse.com/1173378" source="BUGZILLA"/>
		<reference ref_id="1173380" ref_url="https://bugzilla.suse.com/1173380" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15563" ref_url="https://www.suse.com/security/cve/CVE-2020-15563/" source="CVE"/>
		<reference ref_id="CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565/" source="CVE"/>
		<reference ref_id="CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007116.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).
- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).
- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-10"/>
	<updated date="2020-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173377">SUSE bug 1173377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173378">SUSE bug 1173378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173380">SUSE bug 1173380</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15563/">CVE-2020-15563 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15563">CVE-2020-15563 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15565">CVE-2020-15565 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15567">CVE-2020-15567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538473" comment="xen-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538474" comment="xen-doc-html-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538475" comment="xen-libs-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538476" comment="xen-libs-32bit-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538477" comment="xen-tools-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538478" comment="xen-tools-domU-4.9.4_08-3.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148884" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1167231" ref_url="https://bugzilla.suse.com/1167231" source="BUGZILLA"/>
		<reference ref_id="1173576" ref_url="https://bugzilla.suse.com/1173576" source="BUGZILLA"/>
		<reference ref_id="1173613" ref_url="https://bugzilla.suse.com/1173613" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415/" source="CVE"/>
		<reference ref_id="CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426/" source="CVE"/>
		<reference ref_id="CVE-2020-6813" ref_url="https://www.suse.com/security/cve/CVE-2020-6813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 78.0.1 ESR fixes the following issues:

Security issues fixed:

- CVE-2020-12415: AppCache manifest poisoning due to url encoded character processing (bsc#1173576).
- CVE-2020-12416: Use-after-free in WebRTC VideoBroadcaster (bsc#1173576).
- CVE-2020-12417: Memory corruption due to missing sign-extension for ValueTags on ARM64 (bsc#1173576).
- CVE-2020-12418: Information disclosure due to manipulated URL object (bsc#1173576).
- CVE-2020-12419: Use-after-free in nsGlobalWindowInner (bsc#1173576).
- CVE-2020-12420: Use-After-Free when trying to connect to a STUN server (bsc#1173576).
- CVE-2020-12402: RSA Key Generation vulnerable to side-channel attack (bsc#1173576).
- CVE-2020-12421: Add-On updates did not respect the same certificate trust rules as software updates (bsc#1173576).
- CVE-2020-12422: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (bsc#1173576).
- CVE-2020-12423: DLL Hijacking due to searching %PATH% for a library (bsc#1173576).
- CVE-2020-12424: WebRTC permission prompt could have been bypassed by a compromised content process (bsc#1173576).
- CVE-2020-12425: Out of bound read in Date.parse() (bsc#1173576).
- CVE-2020-12426: Memory safety bugs fixed in Firefox 78 (bsc#1173576).
- FIPS: MozillaFirefox: allow /proc/sys/crypto/fips_enabled (bsc#1167231).

Non-security issues fixed:

- Fixed interaction with freetype6 (bsc#1173613).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-13"/>
	<updated date="2020-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167231">SUSE bug 1167231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173613">SUSE bug 1173613</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12415">CVE-2020-12415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12416">CVE-2020-12416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12417">CVE-2020-12417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12418">CVE-2020-12418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12419">CVE-2020-12419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12420">CVE-2020-12420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12421">CVE-2020-12421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12422">CVE-2020-12422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12423">CVE-2020-12423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12424">CVE-2020-12424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12425">CVE-2020-12425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12426">CVE-2020-12426 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6813/">CVE-2020-6813 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6813">CVE-2020-6813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531092" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531093" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531094" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531095" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148885" version="1" class="patch">
	<metadata>
		<title>Security update for ansible, ansible1, ardana-ansible, ardana-cluster, ardana-freezer, ardana-input-model, ardana-logging, ardana-mq, ardana-neutron, ardana-octavia, ardana-osconfig, caasp-openstack-heat-templates, crowbar-core, crowbar-openstack, documentation-suse-openstack-cloud, grafana, kibana, openstack-dashboard, openstack-dashboard-theme-HPE, openstack-heat-templates, openstack-keystone, openstack-monasca-agent, openstack-monasca-installer, openstack-neutron, openstack-octavia-amphora-image, python-Django, python-Flask, python-GitPython, python-Pillow, python-amqp, python-apicapi, python-keystoneauth1, python-oslo.messaging, python-psutil, python-pyroute2, python-pysaml2, python-tooz, python-waitress, storm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1068612" ref_url="https://bugzilla.suse.com/1068612" source="BUGZILLA"/>
		<reference ref_id="1092420" ref_url="https://bugzilla.suse.com/1092420" source="BUGZILLA"/>
		<reference ref_id="1107190" ref_url="https://bugzilla.suse.com/1107190" source="BUGZILLA"/>
		<reference ref_id="1108719" ref_url="https://bugzilla.suse.com/1108719" source="BUGZILLA"/>
		<reference ref_id="1123872" ref_url="https://bugzilla.suse.com/1123872" source="BUGZILLA"/>
		<reference ref_id="1126503" ref_url="https://bugzilla.suse.com/1126503" source="BUGZILLA"/>
		<reference ref_id="1141968" ref_url="https://bugzilla.suse.com/1141968" source="BUGZILLA"/>
		<reference ref_id="11483483" ref_url="https://bugzilla.suse.com/11483483" source="BUGZILLA"/>
		<reference ref_id="1148383" ref_url="https://bugzilla.suse.com/1148383" source="BUGZILLA"/>
		<reference ref_id="1153191" ref_url="https://bugzilla.suse.com/1153191" source="BUGZILLA"/>
		<reference ref_id="1156525" ref_url="https://bugzilla.suse.com/1156525" source="BUGZILLA"/>
		<reference ref_id="1159046" ref_url="https://bugzilla.suse.com/1159046" source="BUGZILLA"/>
		<reference ref_id="1160152" ref_url="https://bugzilla.suse.com/1160152" source="BUGZILLA"/>
		<reference ref_id="1160153" ref_url="https://bugzilla.suse.com/1160153" source="BUGZILLA"/>
		<reference ref_id="1160192" ref_url="https://bugzilla.suse.com/1160192" source="BUGZILLA"/>
		<reference ref_id="1160790" ref_url="https://bugzilla.suse.com/1160790" source="BUGZILLA"/>
		<reference ref_id="1160851" ref_url="https://bugzilla.suse.com/1160851" source="BUGZILLA"/>
		<reference ref_id="1161088" ref_url="https://bugzilla.suse.com/1161088" source="BUGZILLA"/>
		<reference ref_id="1161089" ref_url="https://bugzilla.suse.com/1161089" source="BUGZILLA"/>
		<reference ref_id="1161670" ref_url="https://bugzilla.suse.com/1161670" source="BUGZILLA"/>
		<reference ref_id="1164322" ref_url="https://bugzilla.suse.com/1164322" source="BUGZILLA"/>
		<reference ref_id="1167244" ref_url="https://bugzilla.suse.com/1167244" source="BUGZILLA"/>
		<reference ref_id="1168593" ref_url="https://bugzilla.suse.com/1168593" source="BUGZILLA"/>
		<reference ref_id="1169770" ref_url="https://bugzilla.suse.com/1169770" source="BUGZILLA"/>
		<reference ref_id="1170657" ref_url="https://bugzilla.suse.com/1170657" source="BUGZILLA"/>
		<reference ref_id="1171273" ref_url="https://bugzilla.suse.com/1171273" source="BUGZILLA"/>
		<reference ref_id="1171560" ref_url="https://bugzilla.suse.com/1171560" source="BUGZILLA"/>
		<reference ref_id="1171594" ref_url="https://bugzilla.suse.com/1171594" source="BUGZILLA"/>
		<reference ref_id="1171661" ref_url="https://bugzilla.suse.com/1171661" source="BUGZILLA"/>
		<reference ref_id="1171909" ref_url="https://bugzilla.suse.com/1171909" source="BUGZILLA"/>
		<reference ref_id="1172166" ref_url="https://bugzilla.suse.com/1172166" source="BUGZILLA"/>
		<reference ref_id="1172167" ref_url="https://bugzilla.suse.com/1172167" source="BUGZILLA"/>
		<reference ref_id="1172175" ref_url="https://bugzilla.suse.com/1172175" source="BUGZILLA"/>
		<reference ref_id="1172176" ref_url="https://bugzilla.suse.com/1172176" source="BUGZILLA"/>
		<reference ref_id="1172409" ref_url="https://bugzilla.suse.com/1172409" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000246" ref_url="https://www.suse.com/security/cve/CVE-2017-1000246/" source="CVE"/>
		<reference ref_id="CVE-2019-1010083" ref_url="https://www.suse.com/security/cve/CVE-2019-1010083/" source="CVE"/>
		<reference ref_id="CVE-2019-15043" ref_url="https://www.suse.com/security/cve/CVE-2019-15043/" source="CVE"/>
		<reference ref_id="CVE-2019-16785" ref_url="https://www.suse.com/security/cve/CVE-2019-16785/" source="CVE"/>
		<reference ref_id="CVE-2019-16786" ref_url="https://www.suse.com/security/cve/CVE-2019-16786/" source="CVE"/>
		<reference ref_id="CVE-2019-16789" ref_url="https://www.suse.com/security/cve/CVE-2019-16789/" source="CVE"/>
		<reference ref_id="CVE-2019-16792" ref_url="https://www.suse.com/security/cve/CVE-2019-16792/" source="CVE"/>
		<reference ref_id="CVE-2019-16865" ref_url="https://www.suse.com/security/cve/CVE-2019-16865/" source="CVE"/>
		<reference ref_id="CVE-2019-18874" ref_url="https://www.suse.com/security/cve/CVE-2019-18874/" source="CVE"/>
		<reference ref_id="CVE-2019-19911" ref_url="https://www.suse.com/security/cve/CVE-2019-19911/" source="CVE"/>
		<reference ref_id="CVE-2019-3828" ref_url="https://www.suse.com/security/cve/CVE-2019-3828/" source="CVE"/>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<reference ref_id="CVE-2020-10743" ref_url="https://www.suse.com/security/cve/CVE-2020-10743/" source="CVE"/>
		<reference ref_id="CVE-2020-11076" ref_url="https://www.suse.com/security/cve/CVE-2020-11076/" source="CVE"/>
		<reference ref_id="CVE-2020-11077" ref_url="https://www.suse.com/security/cve/CVE-2020-11077/" source="CVE"/>
		<reference ref_id="CVE-2020-12052" ref_url="https://www.suse.com/security/cve/CVE-2020-12052/" source="CVE"/>
		<reference ref_id="CVE-2020-13254" ref_url="https://www.suse.com/security/cve/CVE-2020-13254/" source="CVE"/>
		<reference ref_id="CVE-2020-13379" ref_url="https://www.suse.com/security/cve/CVE-2020-13379/" source="CVE"/>
		<reference ref_id="CVE-2020-13596" ref_url="https://www.suse.com/security/cve/CVE-2020-13596/" source="CVE"/>
		<reference ref_id="CVE-2020-5312" ref_url="https://www.suse.com/security/cve/CVE-2020-5312/" source="CVE"/>
		<reference ref_id="CVE-2020-5313" ref_url="https://www.suse.com/security/cve/CVE-2020-5313/" source="CVE"/>
		<reference ref_id="CVE-2020-5390" ref_url="https://www.suse.com/security/cve/CVE-2020-5390/" source="CVE"/>
		<reference ref_id="CVE-2020-8151" ref_url="https://www.suse.com/security/cve/CVE-2020-8151/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<description>
This update for ansible, ansible1, ardana-ansible, ardana-cluster, ardana-freezer, ardana-input-model, ardana-logging, ardana-mq, ardana-neutron, ardana-octavia, ardana-osconfig, caasp-openstack-heat-templates, crowbar-core, crowbar-openstack, documentation-suse-openstack-cloud, grafana, kibana, openstack-dashboard, openstack-dashboard-theme-HPE, openstack-heat-templates, openstack-keystone, openstack-monasca-agent, openstack-monasca-installer, openstack-neutron, openstack-octavia-amphora-image, python-Django, python-Flask, python-GitPython, python-Pillow, python-amqp, python-apicapi, python-keystoneauth1, python-oslo.messaging, python-psutil, python-pyroute2, python-pysaml2, python-tooz, python-waitress, storm contains the following fixes:

The update fixes several security issues:

ansible
- CVE-2019-3828: Fixed a path traversal in the fetch module (bsc#1126503).

grafana
- CVE-2020-13379: Fixed an incorrect access control issue which could lead to information
  leaks or denial of service (bsc#1172409).
- CVE-2020-12052: Fixed an cross site scripting vulnerability related to the annotation
  popup (bsc#1170657).

kibana
- CVE-2020-10743: Fixed a clickjacking vulnerability (bsc#1171909).

python-Django
- CVE-2020-13254: Fixed a data leakage via malformed memcached keys. (bsc#1172167)
- CVE-2020-13596: Fixed a cross site scripting vulnerability related to the admin
  parameters of the ForeignKeyRawIdWidget. (bsc#1172166)

python-Flask
- CVE-2019-1010083: Fixed a denial of service via crafted encoded JSON. (bsc#1141968)


python-Pillow
- CVE-2019-16865: Fixed a denial of service with specially crafted
image files. (bsc#1153191)
- CVE-2020-5312: Fixed a buffer overflow in the PCX P mode. (bsc#1160152)
- CVE-2020-5313: Fixed a buffer overflow related to FLI. (bsc#1160153)
- CVE-2019-19911: Fixed a denial of service in FpxImagePlugin.py. (bsc#1160192)

python-psutil
- CVE-2019-18874: Fixed a double free caused by refcount mishandling. (bsc#1156525)

python-pysaml2
- CVE-2020-5390: Fixed an issue with the verification of signatures in SAML documents.
  (bsc#1160851)
- CVE-2017-1000246: Fixed an issue with  weak encryption data, caused by initialization
  vector reuse. (bsc#1068612)

python-waitress (to version 1.4.3)
- CVE-2019-16785: Fixed HTTP request smuggling through LF vs CRLF handling. (bsc#1161088)
- CVE-2019-16786: Fixed HTTP request smuggling through invalid Transfer-Encoding.
  (bsc#1161089)
- CVE-2019-16789: Fixed HTTP Request Smuggling through Invalid whitespace characters.
  (bsc#1160790)
- CVE-2019-16792: Fixed HTTP Request Smuggling through Content-Length header handling.
  (bsc#1161670)

rubygem-activeresource
- CVE-2020-8151: Fixed information disclosure issue via specially crafted requests.
  (bsc#1171560)

rubygem-json-1_7
- CVE-2020-10663: Fixed an unsafe object creation vulnerability. (bsc#1167244)

rubygem-puma
- CVE-2020-11077: Fixed a HTTP smuggling issue related to proxy usage. (bsc#1172175)
- CVE-2020-11076: Fixed a HTTP smuggling issue when using an invalid transfer-encoding
  header. (bsc#1172176)



Other non-security fixes in in the update below:

Changes in ansible:
- Add 0001-Disallow-use-of-remote-home-directories-containing-..patch
  (bsc#1126503, CVE-2019-3828)

Changes in ansible1:
- Add 0001-Disallow-use-of-remote-home-directories-containing-..patch
  (bsc#1126503, CVE-2019-3828)

Changes in ardana-ansible:
- Update to version 8.0+git.1589740980.6c3bcdc:
  * Reconfigure rabbitmq user permissions on update (SOC-11082)

- Update to version 8.0+git.1588953487.9bfd5cb:
  * Fix incorrect prefix used to collect supportconfig files (bsc#1171273)

- Update to version 8.0+git.1585690828.81d8f45:
  * Cleanup keystone-ansible (bsc#1108719)

Changes in ardana-cluster:
- Update to version 8.0+git.1585685203.3e71e49:
  * Use bool filter to ensure valid boolean evaluation (SOC-11192)

Changes in ardana-freezer:
- Update to version 8.0+git.1586539529.b7d295f:
  * Recovering Cloud8 using Freezer or SSH backups if upgrade fails (SOC-10137)

Changes in ardana-input-model:
- Update to version 8.0+git.1589740934.0e0ad61:
  * Add default rabbitmq exchange write permissions (SOC-11082)

- Update to version 8.0+git.1586174594.2b92ec3:
  * add port neutron security extension to CI models (SOC-11027)

Changes in ardana-logging:
- Update to version 8.0+git.1591194866.b7375d0:
  * kibana: set x-frame-options header (bsc#1171909)

- Update to version 8.0+git.1586179244.ae61f62:
  * Fix YAMLLoadWarning: calling yaml.load() without Loader (bsc#1168593)

Changes in ardana-mq:
- Update to version 8.0+git.1589715269.62ad6df:
  * Don't mirror reply queues (SOC-10317)

- Update to version 8.0+git.1586784724.586343d:
  * Actually fail if sync HA queues retries exceeded (SOC-11083)

Changes in ardana-neutron:
- Update to version 8.0+git.1590756744.ba84abc:
  * Update L3 rootwrap filters (SOC-11306)

- Update to version 8.0+git.1587737509.4e09de3:
  * Add network.target 'After' option (bsc#1169770)

- Update to version 8.0+git.1586546152.e7bc07f:
  * Add neutron-common role dependencies (SOC-10875)

- Update to version 8.0+git.1586543712.62bb5a3:
  * Fix neutron-ovsvapp-agent status (SOC-10637)

- Update to version 8.0+git.1586535447.55769df:
  * Improve neutron service restart limit handling (SOC-8746)

- Update to version 8.0+git.1586519528.a28db53:
  * Correctly setup ardana_notify_... fact (SOC-10902)

Changes in ardana-octavia:
- Update to version 8.0+git.1590100427.cf4cc8f:
  * fix octavia to glance communication over internal endpoint (SOC-11294)

Changes in ardana-osconfig:
- Update to version 8.0+git.1587034587.eac37b8:
  * Include SLE 12 SP3 LTSS repos in list of managed repos (SOC-11223)

Changes in caasp-openstack-heat-templates:
- Switch github URL from git@ to git:// to bypass authentication

Changes in crowbar-core:
- Update to version 5.0+git.1593156248.55bbdb26d:
  * Ignore CVE-8184 (SOC-11299)
  * Ignore latest ruby-related CVEs in the CI (SOC-11299)

- Update to version 5.0+git.1589804984.44a89be24:
  * provisioner: Fix ssh key validation (SOC-11126)
  * assign host to hostless keys (noref)

Changes in crowbar-openstack:
- Update to version 5.0+git.1593085772.64c4ab43c:
  * monasca: Prevent deploying monasca-server to the node in pacemaker cluster (SOC-6354)

- Update to version 5.0+git.1591171674.1f299cd1c:
  * Restore undeprecated nova dhcp_domain option (bsc#1171594)

- Update to version 5.0+git.1591104265.683d76534:
  * [5.0] Fix availability zone script (bsc#1171661)

- Update to version 5.0+git.1590398068.f5cfacc12:
  * nova: only create nonexistent cell1

- Update to version 5.0+git.1590150829.e86326d03:
  * [5.0] Tempest: enable test_volume_boot_pattern test (SOC-10874)

- Update to version 5.0+git.1589814633.23fde86ab:
  * rabbitmq: sync startup definitions.json with recipe (SOC-11077,SOC-11274)

- Update to version 5.0+git.1589647291.73c7f1cb6:
  * [5.0] trove: fix rabbitmq connection URL (SOC-11286)

- Update to version 5.0+git.1589214669.8332efff3:
  * Fix monasca libvirt ping checks (bsc#1107190)

- Update to version 5.0+git.1588271874.90adebc7a:
  * run keystone_register on cluster founder only when HA (SOC-11248)
  * nova: run keystone_register on cluster founder only (SOC-11243)

- Update to version 5.0+git.1588059034.3823515b7:
  * tempest: retry openstack commands (SOC-11238)

- Update to version 5.0+git.1587403360.c43cd9905:
  * tempest: disable block migration when using RBD (SOC-11176)

- Update to version 5.0+git.1586293860.901cb0f55:
  * monasca: disable postgres backend monitoring by default (SOC-11190)

- Update to version 5.0+git.1585659861.c29fac257:
  * magnum: Populate SSL configuration (SOC-9849)
  * magnum: Add SSL support (SOC-9849)
  * nova: Populate cinder SES settings early (SOC-11179)

Changes in documentation-suse-openstack-cloud:
- Update to version 8.20200527:
  * Update Travis config: new container name (noref)

- Update to version 8.20200417:
  * Recovering Cloud8 using Freezer or SSH backups if upgrade fails (SOC-10137)

- Update to version 8.20200326:
  * Clarify wipe_disks does not affect non-OS partitions (bsc#1092420)

Changes in grafana:
- Add CVE-2020-13379.patch
  * Security: fix unauthorized avatar proxying (bsc#1172409, CVE-2020-13379)
- Refresh systemd-notification.patch
- Fix declaration for LICENSE

- Add 0002-CVE-2020-12052-bsc1170657-XSS-annotation-popup-vulnerability.patch
  * Security: Fix annotation popup XSS vulnerability
    (bsc#1170657)

- Add CVE-2019-15043.patch (SOC-10357, CVE-2019-15043, bsc#11483483)
Changes in kibana:
- Add 0001-Configurable-custom-response-headers-for-server.patch
  (bsc#1171909, CVE-2020-10743)

Changes in openstack-dashboard:
- Update to version horizon-12.0.5.dev3:
  * Fix typo in publicize\_image policy name

Changes in openstack-dashboard-theme-HPE:
- Switch github URL from git@ to https:// to bypass authentication

Changes in openstack-heat-templates:
- Update to version 0.0.0+git.1582270132.8a20477:
  * Drop use of git.openstack.org
  * Add sample templates for Blazar

Changes in openstack-keystone:
- Update to version keystone-12.0.4.dev11:
  * Fix security issues with EC2 credentials

- Update to version keystone-12.0.4.dev10:
  * Check timestamp of signed EC2 token request
  * Ensure OAuth1 authorized roles are respected

- Update to version keystone-12.0.4.dev6:
  * Remove neutron-grenade job

Changes in openstack-keystone:
- Update to version keystone-12.0.4.dev11:
  * Fix security issues with EC2 credentials

- Update to version keystone-12.0.4.dev10:
  * Check timestamp of signed EC2 token request
  * Ensure OAuth1 authorized roles are respected

- Update to version keystone-12.0.4.dev6:
  * Remove neutron-grenade job

Changes in openstack-monasca-agent:
- update to version 2.2.6~dev4
  - Add debug output for libvirt ping checks

- Lockdown /bin/ip permissions for the monasca-agent (bsc#1107190)
  - add addtional arguments to /bin/ip in sudoers

- Fix missing sudo privleges (bsc#1107190)
  - add /bin/ip and /usr/bin/ovs-vsctl to monasca-agent sudoers

- removed 0001-Avoid-overwriting-sys.path-ip-command.patch
- update to version 2.2.6~dev3
  - Do not copy /sbin/ip to /usr/bin/monasa-agent-ip

- update to version 2.2.6~dev2
  - Remove incorrect assignment of ping_cmd to 'True'

- update to version 2.2.6~dev1
  - Update hacking version to 1.1.x

Changes in openstack-monasca-installer:
- Add 0001-kibana:-set-x-frame-options-header.patch (bsc#1171909,
  CVE-2020-10743)

Changes in openstack-neutron:
- Update to version neutron-11.0.9.dev65:
  * Revert iptables TCP checksum-fill code

- Update to version neutron-11.0.9.dev64:
  * [Pike-only]: make grenade jobs non-voting

Changes in openstack-neutron:
- Update to version neutron-11.0.9.dev65:
  * Revert iptables TCP checksum-fill code

- Update to version neutron-11.0.9.dev64:
  * [Pike-only]: make grenade jobs non-voting

Changes in openstack-octavia-amphora-image:
- Update image to 0.1.4 to include latest changes

Changes in python-Django:
- Security fixes (bsc#1172167, bsc#1172166, CVE-2020-13254,  CVE-2020-13596)
  * Added patch CVE-2020-13254-1.8.19.patch
  * Added patch CVE-2020-13596-1.8.19.patch

Changes in python-Flask:
- Apply patch to resolve CVE-2019-1010083 (bsc#1141968)
  - 0001-detect-UTF-encodings-when-loading-json.patch

Changes in python-GitPython:
- Require git-core instead of git

Changes in python-Pillow:
- Remove decompression_bomb.gif and relevant test case to avoid
  ClamAV scan alerts during build

- Add 001-Corrected-negative-seeks.patch
   * From upstream, backported
   * Fixes part of CVE-2019-16865, bsc#1153191
- Add 002-Added-DecompressionBombError.patch
   * From upstream, backported
   * Adds DecompressionBombError class
   * Used by 003-Added-decompression-bomb-checks.patch
- Add 003-Added-decompression-bomb-checks.patch
   * From upstream, backported
   * Fixes part of CVE-2019-16865, bsc#1153191
- Add 004-Raise-error-if-dimension-is-a-string.patch
   * From upstream, backported
   * Fixes part of CVE-2019-16865, bsc#1153191
- Add 005-Catch-buffer-overruns.patch
   * From upstream, backported
   * Fixes part of CVE-2019-16865, bsc#1153191
- Add 006-Catch-PCX-P-mode-buffer-overrun.patch
   * From upstream, backported
   * Fixes CVE-2020-5312, bsc#1160152
- Add 007-Test-animated-FLI-file.patch
   * From upstream, backported
   * Adds test animated FLI file
   * Used by 008-Ensure-previous-FLI-frame-is-loaded.patch
- Add 008-Ensure-previous-FLI-frame-is-loaded.patch
   * From upstream, backported
   * Fixes https://github.com/python-pillow/Pillow/issues/2649
   * Uncovers CVE-2020-5313, bsc#1160153
- Add 009-Catch-FLI-buffer-overrun.patch
   * From upstream, backported
   * Fixes CVE-2020-5313, bsc#1160153
- Add 010-Invalid-number-of-bands-in-FPX-image.patch
   * From upstream, backported
   * Fixes CVE-2019-19911, bsc#1160192

Changes in python-amqp:
- Add python-devel as build dependecy
  * Required when building against python 2.7.17

Changes in python-apicapi:
- Add python-devel as build dependecy
  * Required when building against python 2.7.17

Changes in python-keystoneauth1:
- switch to tracking stable/pike tarball
- disable renderspec
- update to version 3.1.2.dev2
  - Make tests pass in 2020
  - OpenDev Migration Patch
  - import zuul job settings from project-config into stable/pike
  - Remove tox_install.sh
  - import zuul job settings from project-config
  - Update UPPER_CONSTRAINTS_FILE for stable/pike into stable/pike
  - Update .gitreview for stable/pike into stable/pike
  - Updated from global requirements
  - Update UPPER_CONSTRAINTS_FILE for stable/pike
  - Update .gitreview for stable/pike

Changes in python-oslo.messaging:
- added 0001-Use-default-exchange-for-direct-messaging.patch
  (SOC-11082, SOC-11274, bsc#1159046)

- Add 0001-Retry-to-declare-a-queue-after-internal-error.patch (bsc#1123872)
   After receiving 'AMQP internal error 541', retry to create the queue after a delay.

Changes in python-psutil:
- Add bsc1156525-CVE-2019-18874.patch (bsc#1156525, CVE-2019-18874))

Changes in python-pyroute2:
- netns: fix NetNS resource leakage (#504) (bsc#1164322)

Changes in python-pysaml2:
- Add 0001-Always-generate-a-random-IV-for-AES-operations.patch
  (CVE-2017-1000246, bsc#1068612)

- Add 0001-Fix-XML-Signature-Wrapping-XSW-vulnerabilities.patch
  (CVE-2020-5390, bsc#1160851)

Changes in python-tooz:
- update to version 1.58.1
  - Update .gitreview for stable/pike
  - import zuul job settings from project-config
  - Add doc/requirements.txt
  - Fix sphinx-docs job for stable branch

Changes in python-waitress:
- update to 1.4.3 to include fixes for:
  * CVE-2019-16785 / bsc#1161088
  * CVE-2019-16786 / bsc#1161089
  * CVE-2019-16789 / bsc#1160790
  * CVE-2019-16792 / bsc#1161670

- make sure UTF8 locale is used when runnning tests
  * Sometimes functional tests executed in python3 failed if stdout was not
    set to UTF-8. The error message was:
      ValueError: underlying buffer has been detached

- %python3_only -&gt; %python_alternative

- update to 1.4.3
  * Waitress did not properly validate that the HTTP headers it received
    were properly formed, thereby potentially allowing a front-end server
    to treat a request different from Waitress. This could lead to HTTP
    request smuggling/splitting.
- drop patch local-intersphinx-inventories.patch
  * it was commented out, anyway

- update to 1.4.0:
  - Waitress used to slam the door shut on HTTP pipelined requests without
  setting the ``Connection: close`` header as appropriate in the response. This
  is of course not very friendly. Waitress now explicitly sets the header when
  responding with an internally generated error such as 400 Bad Request or 500
  Internal Server Error to notify the remote client that it will be closing the
  connection after the response is sent.
  - Waitress no longer allows any spaces to exist between the header field-name
  and the colon. While waitress did not strip the space and thereby was not
  vulnerable to any potential header field-name confusion, it should have sent
  back a 400 Bad Request. See https://github.com/Pylons/waitress/issues/273
  - CRLR handling Security fixes

- update to 1.3.1
  * Waitress won’t accidentally throw away part of the path if it
    starts with a double slash

- version update to 1.3.0
  Deprecations
  ~~~~~~~~~~~~
  - The ``send_bytes`` adjustment now defaults to ``1`` and is deprecated
    pending removal in a future release.
    and https://github.com/Pylons/waitress/pull/246
  Features
  ~~~~~~~~
  - Add a new ``outbuf_high_watermark`` adjustment which is used to apply
    backpressure on the ``app_iter`` to avoid letting it spin faster than data
    can be written to the socket. This stabilizes responses that iterate quickly
    with a lot of data.
    See https://github.com/Pylons/waitress/pull/242
  - Stop early and close the ``app_iter`` when attempting to write to a closed
    socket due to a client disconnect. This should notify a long-lived streaming
    response when a client hangs up.
    See https://github.com/Pylons/waitress/pull/238
    and https://github.com/Pylons/waitress/pull/240
    and https://github.com/Pylons/waitress/pull/241
  - Adjust the flush to output ``SO_SNDBUF`` bytes instead of whatever was
    set in the ``send_bytes`` adjustment. ``send_bytes`` now only controls how
    much waitress will buffer internally before flushing to the kernel, whereas
    previously it used to also throttle how much data was sent to the kernel.
    This change enables a streaming ``app_iter`` containing small chunks to
    still be flushed efficiently.
    See https://github.com/Pylons/waitress/pull/246
  Bugfixes
  ~~~~~~~~
  - Upon receiving a request that does not include HTTP/1.0 or HTTP/1.1 we will
    no longer set the version to the string value 'None'. See
    https://github.com/Pylons/waitress/pull/252 and
    https://github.com/Pylons/waitress/issues/110
  - When a client closes a socket unexpectedly there was potential for memory
    leaks in which data was written to the buffers after they were closed,
    causing them to reopen.
    See https://github.com/Pylons/waitress/pull/239
  - Fix the queue depth warnings to only show when all threads are busy.
    See https://github.com/Pylons/waitress/pull/243
    and https://github.com/Pylons/waitress/pull/247
  - Trigger the ``app_iter`` to close as part of shutdown. This will only be
    noticeable for users of the internal server api. In more typical operations
    the server will die before benefiting from these changes.
    See https://github.com/Pylons/waitress/pull/245
  - Fix a bug in which a streaming ``app_iter`` may never cleanup data that has
    already been sent. This would cause buffers in waitress to grow without
    bounds. These buffers now properly rotate and release their data.
    See https://github.com/Pylons/waitress/pull/242
  - Fix a bug in which non-seekable subclasses of ``io.IOBase`` would trigger
    an exception when passed to the ``wsgi.file_wrapper`` callback.
    See https://github.com/Pylons/waitress/pull/249

- Trim marketing wording and other platform mentions.

- Add fetch-intersphinx-inventories.sh to sources
- Add local-intersphinx-inventories.patch for generating the docs
  correctly

- update to version 1.2.1:
  too many changes to list here, see:
  https://github.com/Pylons/waitress/blob/master/CHANGES.txt
  or even:
  https://github.com/Pylons/waitress/commits/master

- Remove superfluous devel dependency for noarch package

- update to version 1.1.0:
  * Features
    + Waitress now has a __main__ and thus may be called with 'python
      -mwaitress'
  * Bugfixes
    + Waitress no longer allows lowercase HTTP verbs. This change was
      made to fall in line with most HTTP servers. See
      https://github.com/Pylons/waitress/pull/170
    + When receiving non-ascii bytes in the request URL, waitress will
      no longer abruptly close the connection, instead returning a 400
      Bad Request. See https://github.com/Pylons/waitress/pull/162 and
      https://github.com/Pylons/waitress/issues/64

- Update to 1.0.2
  * Python 3.6 is now officially supported in Waitress
  * Add a work-around for libc issue on Linux not following the
    documented standards. If getnameinfo() fails because of DNS not
    being available it should return the IP address instead of the
    reverse DNS entry, however instead getnameinfo() raises. We
    catch this, and ask getnameinfo() for the same information
    again, explicitly asking for IP address instead of reverse
    DNS hostname.
- Implement single-spec version.
- Fix source URL.

- update to 1.0.1:
  - IPv6 support on Windows was broken due to missing constants in the socket
    module. This has been resolved by setting the constants on Windows if they
    are missing. See https://github.com/Pylons/waitress/issues/138
  - A ValueError was raised on Windows when passing a string for the port, on
    Windows in Python 2 using service names instead of port numbers doesn't work
    with `getaddrinfo`. This has been resolved by attempting to convert the port
    number to an integer, if that fails a ValueError will be raised. See
    https://github.com/Pylons/waitress/issues/139
  - Removed `AI_ADDRCONFIG` from the call to `getaddrinfo`, this resolves an
    issue whereby `getaddrinfo` wouldn't return any addresses to `bind` to on
    hosts where there is no internet connection but localhost is requested to be
    bound to. See https://github.com/Pylons/waitress/issues/131 for more
    information.
- disable tests. need network access.

Changes in storm:
- update to 1.1.3:
  * 1.1.3:
    * [STORM-3026] - Upgrade ZK instance for security
    * [STORM-3027] - Make Impersonation Optional
    * [STORM-3011] - Use default bin path in flight.bash if $JAVA_HOME is undefined
    * [STORM-3039] - Ports of killed topologies remain in TIME_WAIT state preventing to start new topology
    * [STORM-2911] - SpoutConfig is serializable but does not declare a serialVersionUID field
    * [STORM-2978] - The fix for STORM-2706 is broken, and adds a transitive dependency on Zookeeper 3.5.3-beta for projects that depend on e.g. storm-kafka
    * [STORM-2979] - WorkerHooks EOFException during run_worker_shutdown_hooks
    * [STORM-2981] - Upgrade Curator to lastest patch version
    * [STORM-2985] - Add jackson-annotations to dependency management
    * [STORM-2989] - LogCleaner should preserve current worker.log.metrics
    * [STORM-2994] - KafkaSpout consumes messages but doesn't commit offsets
    * [STORM-3043] - NullPointerException thrown in SimpleRecordTranslator.apply()
    * [STORM-3052] - Let blobs un archive
    * [STORM-3059] - KafkaSpout throws NPE when hitting a null tuple if the processing guarantee is not AT_LEAST_ONCE
    * [STORM-2960] - Better to stress importance of setting up proper OS account for Storm processes
    * [STORM-3060] - Configuration mapping between storm-kafka &amp; storm-kafka-client
    * [STORM-2952] - Deprecate storm-kafka in 1.x
    * [STORM-3005] - [DRPC] LinearDRPCTopologyBuilder shouldn't be deprecated
    * [STORM-2841] - testNoAcksIfFlushFails UT fails with NullPointerException
  * 1.1.2:
    * [STORM-2512] - Change KafkaSpoutConfig in storm-kafka-client to make it work with flux
    * [STORM-2616] - Document the built in metrics (just in time to replace them???)
    * [STORM-2657] - Update SECURITY.MD
    * [STORM-2663] - Backport STORM-2558 and deprecate storm.cmd on 1.x-branch
    * [STORM-2712] - accept arbitrary number of rows per tuple in storm-cassandra
    * [STORM-2775] - Improve KafkaPartition Metric Names
    * [STORM-2807] - Integration test should shut down topologies immediately after the test
    * [STORM-2862] - More flexible logging in multilang (Python, Ruby, JS)
    * [STORM-2877] - Introduce an option to configure pagination in Storm UI
    * [STORM-2917] - Check the config(nimbus.host) before using it to connect
    * [STORM-2231] - NULL in DisruptorQueue while multi-threaded ack
    * [STORM-2426] - First tuples fail after worker is respawn
    * [STORM-2500] - waitUntilReady in PacemakerClient cannot be invoked
    * [STORM-2525] - Fix flaky integration tests
    * [STORM-2535] - test-reset-timeout is flaky. Replace with a more reliable test.
    * [STORM-2541] - Manual partition assignment doesn't work
    * [STORM-2607] - [kafka-client] Consumer group every time with lag 1
    * [STORM-2642] - Storm-kafka-client spout cannot be serialized when using manual partition assignment
    * [STORM-2660] - The Nimbus storm-local directory is relative to the working directory of the shell executing 'storm nimbus'
    * [STORM-2666] - Storm-kafka-client spout can sometimes emit messages that were already committed.
    * [STORM-2674] - NoNodeException when ZooKeeper tries to delete nodes
    * [STORM-2677] - consider all sampled tuples which took greater than 0 ms processing time
    * [STORM-2682] - Supervisor crashes with NullPointerException
    * [STORM-2690] - resurrect invocation of ISupervisor.assigned() &amp; make Supervisor.launchDaemon() accessible
    * [STORM-2695] - BlobStore uncompress argument should be Boolean
    * [STORM-2705] - DRPCSpout sleeps twice when idle
    * [STORM-2706] - Nimbus stuck in exception and does not fail fast
    * [STORM-2724] - ExecutorService in WaterMarkEventGenerator never shutdown
    * [STORM-2736] - o.a.s.b.BlobStoreUtils [ERROR] Could not update the blob with key
    * [STORM-2750] - fix double_checked locking
    * [STORM-2751] - Remove AsyncLoggingContext from Supervisor
    * [STORM-2764] - HDFSBlobStore leaks file system objects
    * [STORM-2769] - Fast-fail if output stream Id is null
    * [STORM-2771] - Some tests are being run twice
    * [STORM-2779] - NPE on shutting down WindowedBoltExecutor
    * [STORM-2786] - Ackers leak tracking info on failure and lots of other cases.
    * [STORM-2810] - Storm-hdfs tests are leaking resources
    * [STORM-2811] - Nimbus may throw NPE if the same topology is killed multiple times, and the integration test kills the same topology multiple times
    * [STORM-2814] - Logviewer HTTP server should return 403 instead of 200 if the user is unauthorized
    * [STORM-2815] - UI HTTP server should return 403 if the user is unauthorized
    * [STORM-2833] - Cached Netty Connections can have different keys for the same thing.
    * [STORM-2853] - Deactivated topologies cause high cpu utilization
    * [STORM-2855] - Travis build doesn't work after update of Ubuntu image
    * [STORM-2856] - Make Storm build work on post 2017Q4 Travis Trusty image
    * [STORM-2868] - Address handling activate/deactivate in multilang module files
    * [STORM-2870] - FileBasedEventLogger leaks non-daemon ExecutorService which prevents process to be finished
    * [STORM-2876] - Some storm-hdfs tests fail with out of memory periodically
    * [STORM-2879] - Supervisor collapse continuously when there is a expired assignment for overdue storm
    * [STORM-2892] - Flux test fails to parse valid PATH environment variable
    * [STORM-2894] - fix some random typos in tests
    * [STORM-2912] - Tick tuple is being shared without resetting start time and incur side-effect to break metrics
    * [STORM-2918] - Upgrade Netty version
    * [STORM-2942] - Remove javadoc and source jars from toollib directory in binary distribution
    * [STORM-2874] - Minor style improvements to backpressure code
    * [STORM-2858] - Fix worker-launcher build
  * 1.1.1:
    * STORM-2659: Add daemon.name variable to storm.cmd to fix log4j logging
    * STORM-2652: fix error in open method of JmsSpout
    * STORM-2645: Update storm.py to be python3 compatible
    * STORM-2621: add tuple_population metric
    * STORM-2639: Kafka Spout incorrectly computes numCommittedOffsets due to voids in the topic (topic compaction)
    * STORM-2544: Fixing issue in acking of tuples that hit retry limit under manual commit mode
    * STORM-2618: Add TridentKafkaStateUpdater for storm-kafka-client
    * STORM-2608: Remove any pending offsets that are no longer valid
    * STORM-2503: Fix lgtm.com alerts on equality and comparison operations
    * STORM-2478: Fix BlobStoreTest.testDeleteAfterFailedCreate on Windows
    * STORM-2602: storm.zookeeper.topology.auth.payload doesn't work even you set it
    * STORM-2597: Don't parse passed in class paths
    * STORM-2564: We should provide a template for storm-cluster-auth.yaml
    * STORM-2568: Fix getTopicsString
    * STORM-2563: Remove the workaround to handle missing UGI.loginUserFromSubject
    * STORM-2552: KafkaSpoutMessageId should be serializable
    * STORM-2562: Use stronger key size than default for blow fish key generator and get rid of stack trace
    * STORM-2557: A bug in DisruptorQueue causing severe underestimation of queue arrival rates
    * STORM-2449: Ensure same key appears only once in State iterator
    * STORM-2516: Fix timing issues with testPrepareLateTupleStreamWithoutBuilder
    * STORM-2489: Overlap and data loss on WindowedBolt based on Duration
    * STORM-2528: Bump log4j version to 2.8.2
    * STORM-2527: Initialize java.sql.DriverManager earlier to avoid deadlock
    * STORM-2413: Make new Kafka spout respect tuple retry limits
    * STORM-2518: Handles empty name for 'USER type' ACL when normalizing ACLs
    * STORM-2511: Submitting a topology with name containing unicode getting failed
    * STORM-2496: Dependency artifacts should be uploaded to blobstore with READ permission for all
    * STORM-2505: Spout to support topic compaction
    * STORM-2498: Fix Download Full File link
    * STORM-2343: New Kafka spout can stop emitting tuples if more than maxUncommittedOffsets tuples fail at once.
    * STORM-2486: Prevent cd from printing target directory to avoid breaking classpath
    * STORM-2488: The UI user Must be HTTP.
    * STORM-2481: Upgrade Aether version to resolve Aether bug BUG-451566
    * STORM-2435: Logging in storm.js inconsistent to console.log and does not support log levels
    * STORM-2315: New kafka spout can't commit offset when ack is disabled
    * STORM-2467: Use explicit charset when decoding from array backed buffer
    * STORM-1114: Race condition in trident zookeeper zk-node create/delete
    * STORM-2448: Add in Storm and JDK versions when submitting a topology
    * STORM-2343: Fix new Kafka spout stopping processing if more than maxUncommittedOffsets tuples fail at once
    * STORM-2431: the default blobstore.dir is storm.local.dir/blobs which is different from distcache-blobstore.md
    * STORM-2429: Properly validate supervisor.scheduler.meta
    * STORM-2451: windows storm.cmd does not set log4j2 config file correctly by default
    * STORM-2450: Write resources into correct local director
    * STORM-2440: Kill process if executor catches java.net.SocketTimeoutException
    * STORM-2432: Storm-Kafka-Client Trident Spout Seeks Incorrect Offset With UNCOMMITTED_LATEST Strategy
  * 1.1.0:
    * STORM-2425: Storm Hive Bolt not closing open transactions
    * STORM-2409: Storm-Kafka-Client KafkaSpout Support for Failed and NullTuples
    * STORM-2423: Join Bolt should use explicit instead of default window anchoring for emitted tuples
    * STORM-2416: Improve Release Packaging to Reduce File Size
    * STORM-2414: Skip checking meta's ACL when subject has write privileges for any blobs
    * STORM-2038: Disable symlinks with a config option
    * STORM-2240: STORM PMML Bolt - Add Support to Load Models from Blob Store
    * STORM-2412: Nimbus isLeader check while waiting for max replication
    * STORM-2408: build failed if storm.kafka.client.version = 0.10.2.0
    * STORM-2403: Fix KafkaBolt test failure: tick tuple should not be acked
    * STORM-2361: Kafka spout - after leader change, it stops committing offsets to ZK
    * STORM-2353: Replace kafka-unit by kafka_2.11 and kafka-clients to test kafka-clients:0.10.1.1
    * STORM-2387: Handle tick tuples properly for Bolts in external modules
    * STORM-2345: Type mismatch in ReadClusterState's ProfileAction processing Map
    * STORM-2400: Upgraded Curator to 2.12.0 and made respective API changes
    * STORM-2396: setting interrupted status back before throwing a RuntimeException
    * STORM-1772: Adding Perf module with topologies for measuring performance
    * STORM-2395: storm.cmd supervisor calls the wrong class name
    * STORM-2391: Move HdfsSpoutTopology from storm-starter to storm-hdfs-examples
    * STORM-2389: Avoid instantiating Event Logger when topology.eventlogger.executors=0
    * STORM-2386: Fail-back Blob deletion also fails in BlobSynchronizer.syncBlobs.
    * STORM-2388: JoinBolt breaks compilation against JDK 7
    * STORM-2374: Storm Kafka Client Test Topologies Must be Serializable
    * STORM-2372: Pacemaker client doesn't clean up heartbeats properly
    * STORM-2326: Upgrade log4j and slf4j
    * STORM-2334: Join Bolt implementation
    * STORM-1363: TridentKafkaState should handle null values from TridentTupleToKafkaMapper.getMessageFromTuple()
    * STORM-2365: Support for specifying output stream in event hubs spout
    * STORM-2250: Kafka spout refactoring to increase modularity and testability
    * STORM-2340: fix AutoCommitMode issue in KafkaSpout
    * STORM-2344: Flux YAML File Viewer for Nimbus UI
    * STORM-2350: Storm-HDFS's listFilesByModificationTime is broken
    * STORM-2270 Kafka spout should consume from latest when ZK partition commit offset bigger than the latest offset
    * STORM-1464: storm-hdfs support for multiple output files and partitioning
    * STORM-2320: DRPC client printer class reusable for local and remote DRPC
    * STORM-2281: Running Multiple Kafka Spouts (Trident) Throws Illegal State Exception
    * STORM-2296: Kafka spout no dup on leader changes
    * STORM-2244: Some shaded jars doesn't exclude dependency signature files
    * STORM-2014: New Kafka spout duplicates checking if failed messages have reached max retries
    * STORM-1443: [Storm SQL] Support customizing parallelism in StormSQL
    * STORM-2148: [Storm SQL] Trident mode: back to code generate and compile Trident topology
    * STORM-2331: Emitting from JavaScript should work when not anchoring.
    * STORM-2225: change spout config to be simpler.
    * STORM-2323: Precondition for Leader Nimbus should check all topology blobs and also corresponding dependencies
    * STORM-2330: Fix storm sql code generation for UDAF with non standard sql types
    * STORM-2298: Don't kill Nimbus when ClusterMetricsConsumer is failed to initialize
    * STORM-2301: [storm-cassandra] upgrade cassandra driver to 3.1.2
    * STORM-1446: Compile the Calcite logical plan to Storm Trident logical plan
    * STORM-2303: [storm-opentsdb] Fix list invariant issue for JDK 7
    * STORM-2236: storm kafka client should support manual partition management
    * STORM-2295: KafkaSpoutStreamsNamedTopics should return output fields with predictable ordering
    * STORM-2300: [Flux] support list of references
    * STORM-2297: [storm-opentsdb] Support Flux for OpenTSDBBolt
    * STORM-2294: Send activate and deactivate command to ShellSpout
    * STORM-2280: Upgrade Calcite version to 1.11.0
    * STORM-2278: Allow max number of disruptor queue flusher threads to be configurable
    * STORM-2277: Add shaded jar for Druid connector
    * STORM-2274: Support named output streams in Hdfs Spout
    * STORM-2204: Adding caching capabilities in HBaseLookupBolt
    * STORM-2267: Use user's local maven repo. directory to local repo.
    * STORM-2254: Provide Socket time out for nimbus thrift client
    * STORM-2200: [Storm SQL] Drop Aggregate &amp; Join support on Trident mode
    * STORM-2266: Close NimbusClient instances appropriately
    * STORM-2203: Add a getAll method to KeyValueState interface
    * STORM-1886: Extend KeyValueState iface with delete
    * STORM-2022: update Fields test to match new behavior
    * STORM-2020: Stop using sun internal classes
    * STORM-1228: port fields_test to java
    * STORM-2104: New Kafka spout crashes if partitions are reassigned while tuples are in-flight
    * STORM-2257: Add built in support for sum function with different types.
    * STORM-2082: add sql external module storm-sql-hdfs
    * STORM-2256: storm-pmml breaks on java 1.7
    * STORM-2223: PMML Bolt.
    * STORM-2222: Repeated NPEs thrown in nimbus if rebalance fails
    * STORM-2190: reduce contention between submission and scheduling
    * STORM-2239: Handle InterruptException in new Kafka spout
    * STORM-2087: Storm-kafka-client: Failed tuples are not always replayed
    * STORM-2238: Add Timestamp extractor for windowed bolt
    * STORM-2235: Introduce new option: 'add remote repositories' for dependency resolver
    * STORM-2215: validate blobs are present before submitting
    * STORM-2170: [Storm SQL] Add built-in socket datasource to runtime
    * STORM-2226: Fix kafka spout offset lag ui for kerberized kafka
    * STORM-2224: Exposed a method to override in computing the field from given tuple in FieldSelector
    * STORM-2220: Added config support for each bolt in Cassandra bolts, fixed the bolts to be used also as sinks.
    * STORM-2205: Racecondition in getting nimbus summaries while ZK connectionions are reconnected
    * STORM-2182: Refactor Storm Kafka Examples Into Own Modules.
    * STORM-1694: Kafka Spout Trident Implementation Using New Kafka Consumer API
    * STORM-2173: [SQL] Support CSV as input / output format
    * STORM-2177: [SQL] Support TSV as input / output format
    * STORM-2172: [SQL] Support Avro as input / output format
    * STORM-2185: Storm Supervisor doesn't delete directories properly sometimes
    * STORM-2103: [SQL] Introduce new sql external module: storm-sql-mongodb
    * STORM-2175: fix double close of workers
    * STORM-2109: Under supervisor V2 SUPERVISOR_MEMORY_CAPACITY_MB and SUPERVISOR_CPU_CAPACITY must be Doubles
    * STORM-2110: in supervisor v2 filter out empty command line args
    * STORM-2117: Supervisor V2 with local mode extracts resources directory to topology root directory instead of temporary directory
    * STORM-2131: Add blob command to worker-launcher, make stormdist directory not writeable by topo owner
    * STORM-2018: Supervisor V2
    * STORM-2139: Let ShellBolts and ShellSpouts run with scripts from blobs
    * STORM-2072: Add map, flatMap with different outputs (T-&gt;V) in Trident
    * STORM-2134: improving the current scheduling strategy for RAS
    * STORM-2125: Use Calcite's implementation of Rex Compiler
    * STORM-1546: Adding Read and Write Aggregations for Pacemaker to make it HA compatible
    * STORM-1444: Support EXPLAIN statement in StormSQL
    * STORM-2099: Introduce new sql external module: storm-sql-redis
    * STORM-2097: Improve logging in trident core and examples
    * STORM-2144: Fix Storm-sql group-by behavior in standalone mode
    * STORM-2066: make error message in IsolatedPool.java more descriptive
    * STORM-1870: Allow FluxShellBolt/Spout set custom 'componentConfig' via yaml
    * STORM-2126: fix NPE due to race condition in compute-new-sched-assign…
    * STORM-2124: show requested cpu mem for each component
    * STORM-2089: Replace Consumer of ISqlTridentDataSource with SqlTridentConsumer
    * STORM-2118: A few fixes for storm-sql standalone mode
    * STORM-2105: Cluster/Supervisor total and available resources displayed in the UI
    * STORM-2078: enable paging in worker datatable
    * STORM-1664: Allow Java users to start a local cluster with a Nimbus Thrift server.
    * STORM-1872: Release Jedis connection when topology shutdown
    * STORM-2100: Fix Trident SQL join tests to not rely on ordering
    * STORM-1837: Fix complete-topology and prevent message loss
    * STORM-2098: DruidBeamBolt: Pass DruidConfig.Builder as constructor argument
    * STORM-2092: optimize TridentKafkaState batch sending
    * STORM-1979: Storm Druid Connector implementation.
    * STORM-2057: Support JOIN statement in Storm SQL
    * STORM-1970: external project examples refator
    * STORM-2074: fix storm-kafka-monitor NPE bug
    * STORM-1459: Allow not specifying producer properties in read-only Kafka table in StormSQL
    * STORM-2052: Kafka Spout New Client API - Log Improvements and Parameter Tuning for Better Performance.
    * STORM-2050: [storm-sql] Support User Defined Aggregate Function for Trident mode
    * STORM-1434: Support the GROUP BY clause in StormSQL
    * STORM-2016: Topology submission improvement: support adding local jars and maven artifacts on submission
    * STORM-1994: Add table with per-topology &amp; worker resource usage and components in (new) supervisor and topology pages
    * STORM-2042: Nimbus client connections not closed properly causing connection leaks
    * STORM-1766: A better algorithm server rack selection for RAS
    * STORM-1913: Additions and Improvements for Trident RAS API
    * STORM-2037: debug operation should be whitelisted in SimpleAclAuthorizer.
    * STORM-2023: Add calcite-core to dependency of storm-sql-runtime
    * STORM-2036: Fix minor bug in RAS Tests
    * STORM-1979: Storm Druid Connector implementation.
    * STORM-1839: Storm spout implementation for Amazon Kinesis Streams.
    * STORM-1876: Option to build storm-kafka and storm-kafka-client with different kafka client version
    * STORM-2000: Package storm-opentsdb as part of external dir in installation
    * STORM-1989: X-Frame-Options support for Storm UI
    * STORM-1962: support python 3 and 2 in multilang
    * STORM-1964: Unexpected behavior when using count window together with timestamp extraction
    * STORM-1890: ensure we refetch static resources after package build
    * STORM-1988: Kafka Offset not showing due to bad classpath.
    * STORM-1966: Expand metric having Map type as value into multiple metrics based on entries
    * STORM-1737: storm-kafka-client has compilation errors with Apache Kafka 0.10
    * STORM-1968: Storm logviewer does not work for nimbus.log in secure cluster
    * STORM-1910: One topology cannot use hdfs spout to read from two locations
    * STORM-1960: Add CORS support to STORM UI Rest api
    * STORM-1959: Add missing license header to KafkaPartitionOffsetLag
    * STORM-1950: Change response json of 'Topology Lag' REST API to keyed by spoutId, topic, partition.
    * STORM-1833: Simple equi-join in storm-sql standalone mode
    * STORM-1866: Update Resource Aware Scheduler Documentation
    * STORM-1930: Kafka New Client API - Support for Topic Wildcards
    * STORM-1924: Adding conf options for Persistent Word Count Topology
    * STORM-1956: Disabling Backpressure by default
    * STORM-1934: Fix race condition between sync-supervisor and sync-processes
    * STORM-1919: Introduce FilterBolt on storm-redis
    * STORM-1945: Fix NPE bugs on topology spout lag for storm-kafka-monitor
    * STORM-1888: add description for shell command
    * STORM-1902: add a simple &amp; flexible FileNameFormat for storm-hdfs
    * STORM-1914: Storm Kafka Field Topic Selector
    * STORM-1907: PartitionedTridentSpoutExecutor has incompatible types that cause ClassCastException
    * STORM-1925: Remove Nimbus thrift call from Nimbus itself
    * STORM-1909: Update HDFS spout documentation
    * STORM-1136: Command line module to return kafka spout offsets lag and display in storm ui
    * STORM-1911: IClusterMetricsConsumer should use seconds to timestamp unit
    * STORM-1893: Support OpenTSDB for storing timeseries data.
    * STORM-1723: Introduce ClusterMetricsConsumer
    * STORM-1700: Introduce 'whitelist' / 'blacklist' option to MetricsConsumer
    * STORM-1698: Asynchronous MetricsConsumerBolt
    * STORM-1705: Cap number of retries for a failed message
    * STORM-1884: Prioritize pendingPrepare over pendingCommit
    * STORM-1575: fix TwitterSampleSpout NPE on close
    * STORM-1874: Update logger private permissions
    * STORM-1865: update command line client document
    * STORM-1771: HiveState should flushAndClose before closing old or idle Hive connections
    * STORM-1882: Expose TextFileReader public
    * STORM-1873: Implement alternative behaviour for late tuples
    * STORM-1719: Introduce REST API: Topology metric stats for stream
    * STORM-1887: Fixed help message for set_log_level command
    * STORM-1878: Flux can now handle IStatefulBolts
    * STORM-1864: StormSubmitter should throw respective exceptions and log respective errors forregistered submitter hook invocation
    * STORM-1868: Modify TridentKafkaWordCount to run in distributed mode
    * STORM-1859: Ack late tuples in windowed mode
    * STORM-1851: Fix default nimbus impersonation authorizer config
    * STORM-1848: Make KafkaMessageId and Partition serializable to support
    * STORM-1862: Flux ShellSpout and ShellBolt can't emit to named streams
    * Storm-1728: TransactionalTridentKafkaSpout error
    * STORM-1850: State Checkpointing Documentation update
    * STORM-1674: Idle KafkaSpout consumes more bandwidth than needed
    * STORM-1842: Forward references in storm.thrift cause tooling issues
    * STORM-1730: LocalCluster#shutdown() does not terminate all storm threads/thread pools.
    * STORM-1709: Added group by support in storm sql standalone mode
    * STORM-1720: Support GEO in storm-redis
  * 1.0.6:
    * [STORM-2877] - Introduce an option to configure pagination in Storm UI
    * [STORM-2917] - Check the config(nimbus.host) before using it to connect
    * [STORM-2451] - windows storm.cmd does not set log4j2 config file correctly by default
    * [STORM-2690] - resurrect invocation of ISupervisor.assigned() &amp; make Supervisor.launchDaemon() accessible
    * [STORM-2751] - Remove AsyncLoggingContext from Supervisor
    * [STORM-2764] - HDFSBlobStore leaks file system objects
    * [STORM-2771] - Some tests are being run twice
    * [STORM-2786] - Ackers leak tracking info on failure and lots of other cases.
    * [STORM-2853] - Deactivated topologies cause high cpu utilization
    * [STORM-2856] - Make Storm build work on post 2017Q4 Travis Trusty image
    * [STORM-2870] - FileBasedEventLogger leaks non-daemon ExecutorService which prevents process to be finished
    * [STORM-2879] - Supervisor collapse continuously when there is a expired assignment for overdue storm
    * [STORM-2892] - Flux test fails to parse valid PATH environment variable
    * [STORM-2894] - fix some random typos in tests
    * [STORM-2912] - Tick tuple is being shared without resetting start time and incur side-effect to break metrics
    * [STORM-2918] - Upgrade Netty version
    * [STORM-2874] - Minor style improvements to backpressure code
    * [STORM-2937] - Overwrite storm-kafka-client 1.x-branch into 1.0.x-branch
    * [STORM-2858] - Fix worker-launcher build
- Use %license macro

  * 1.0.5:
    * [STORM-2657] - Update SECURITY.MD
    * [STORM-2231] - NULL in DisruptorQueue while multi-threaded ack
    * [STORM-2660] - The Nimbus storm-local directory is relative to the working directory of the shell executing 'storm nimbus'
    * [STORM-2674] - NoNodeException when ZooKeeper tries to delete nodes
    * [STORM-2677] - consider all sampled tuples which took greater than 0 ms processing time
    * [STORM-2682] - Supervisor crashes with NullPointerException
    * [STORM-2695] - BlobStore uncompress argument should be Boolean
    * [STORM-2705] - DRPCSpout sleeps twice when idle
  * 1.0.4:
    * STORM-2627: Update docs for storm.zookeeper.topology.auth.scheme
    * STORM-2597: Don't parse passed in class paths
    * STORM-2524: Set Kafka client.id with storm-kafka
    * STORM-2448: Add in Storm and JDK versions when submitting a topology
    * STORM-2511: Submitting a topology with name containing unicode getting failed
    * STORM-2498: Fix Download Full File link
    * STORM-2486: Prevent cd from printing target directory to avoid breaking classpath
    * STORM-1114: Race condition in trident zookeeper zk-node create/delete
    * STORM-2429: Properly validate supervisor.scheduler.meta
    * STORM-2194: Stop ignoring socket timeout error from executor
    * STORM-2450: Write resources into correct local director
    * STORM-2414: Skip checking meta's ACL when subject has write privileges for any blobs
    * STORM-2038: Disable symlinks with a config option
    * STORM-2038: No symlinks for local cluster
    * STORM-2403: Fix KafkaBolt test failure: tick tuple should not be acked
    * STORM-2361: Kafka spout - after leader change, it stops committing offsets to ZK
    * STORM-2296: Kafka spout - no duplicates on leader changes
    * STORM-2387: Handle tick tuples properly for Bolts in external modules
    * STORM-2345: Type mismatch in ReadClusterState's ProfileAction processing Map
    * STORM-2104: New Kafka spout crashes if partitions are reassigned while tuples are in-flight
    * STORM-2396: setting interrupted status back before throwing a RuntimeException
    * STORM-2395: storm.cmd supervisor calls the wrong class name
    * STORM-2385: pacemaker_state_factory.clj does not compile on branch-1.0.x
    * STORM-2389: Avoid instantiating Event Logger when topology.eventlogger.executors=0
    * STORM-2386: Fail-back Blob deletion also fails in BlobSynchronizer.syncBlobs
    * STORM-2360: Storm-Hive: Thrift version mismatch with storm-core
    * STORM-2372: Pacemaker client doesn't clean up heartbeats properly
    * STORM-2326: Upgrade log4j and slf4j
    * STORM-2350: Storm-HDFS's listFilesByModificationTime is broken
  * 1.0.3:
    * STORM-2197: NimbusClient connectins leak due to leakage in ThriftClient
    * STORM-2321: Handle blobstore zk key deletion in KeySequenceNumber.
    * STORM-2324: Fix deployment failure if resources directory is missing in topology jar
    * STORM-2335: Fix broken Topology visualization with empty ':transferred' in executor stats
    * STORM-2336: Close Localizer and AsyncLocalizer when supervisor is shutting down
    * STORM-2338: Subprocess exception handling is broken in storm.py on Windows environment
    * STORM-2337: Broken documentation generation for storm-metrics-profiling-internal-actions.md and windows-users-guide.md
    * STORM-2325: Logviewer doesn't consider 'storm.local.hostname'
    * STORM-1742: More accurate 'complete latency'
    * STORM-2176: Workers do not shutdown cleanly and worker hooks don't run when a topology is killed
    * STORM-2293: hostname should only refer node's 'storm.local.hostname'
    * STORM-2246: Logviewer download link has urlencoding on part of the URL
    * STORM-1906: Window count/length of zero should be disallowed
    * STORM-1841: Address a few minor issues in windowing and doc
    * STORM-2268: Fix integration test for Travis CI build
    * STORM-2283: Fix DefaultStateHandler kryo multithreading issues
    * STORM-2264: OpaqueTridentKafkaSpout failing after STORM-2216
    * STORM-2276: Remove twitter4j usages due to license issue (JSON.org is catalog X)
    * STORM-2095: remove any remaining files when deleting blobstore directory
    * STORM-2222: Repeated NPEs thrown in nimbus if rebalance fails
    * STORM-2251: Integration test refers specific version of Storm which should be project version
    * STORM-2234: heartBeatExecutorService in shellSpout don't work well with deactivate
    * STORM-2216: Favor JSONValue.parseWithException
    * STORM-2208: HDFS State Throws FileNotFoundException in Azure Data Lake Store file system (adl://)
    * STORM-2213: ShellSpout has race condition when ShellSpout is being inactive longer than heartbeat timeout
    * STORM-2210: remove array shuffle from ShuffleGrouping
    * STORM-2052: Kafka Spout - New Client API - Performance Improvements
    * storm-2205: Racecondition in getting nimbus summaries while ZK connections are reconnected
    * STORM-2198: perform RotationAction when stopping HdfsBolt
    * STORM-2196: A typo in RAS_Node::consumeCPU
    * STORM-2189: RAS_Node::freeCPU outputs incorrect info
    * STORM-2184: Don't wakeup KafkaConsumer on shutdown
    * STORM-2185: Storm Supervisor doesn't delete directories properly sometimes
    * STORM-2175: fix double close of workers
    * STORM-2018: Supervisor V2
    * STORM-2145: Leave leader nimbus's hostname to log when trying to connect leader nimbus
    * STORM-2127: Storm-eventhubs should use latest amqp and eventhubs-client versions
    * STORM-2040: Fix bug on assert-can-serialize
    * STORM-2017: ShellBolt stops reporting task ids
    * STORM-2119: bug in log message printing to stdout
    * STORM-2120: Emit to _spoutConfig.outputStreamId
    * STORM-2101: fixes npe in compute-executors in nimbus
    * STORM-2090: Add integration test for storm windowing
    * STORM-2003: Make sure config contains TOPIC before get it
    * STORM-1567: in defaults.yaml 'topology.disable.loadaware' should be 'topology.disable.loadaware.messaging'
    * STORM-1987: Fix TridentKafkaWordCount arg handling in distributed mode.
    * STORM-1969: Modify HiveTopology to show usage of non-partition table.
    * STORM-1849: HDFSFileTopology should use the 3rd argument as topologyName
    * STORM-2086: use DefaultTopicSelector instead of creating a new one
    * STORM-2079: Unneccessary readStormConfig operation
    * STORM-2081: create external directory for storm-sql various data sources and move storm-sql-kafka to it
    * STORM-2070: Fix sigar native binary download link
    * STORM-2056: Bugs in logviewer
    * STORM-1646: Fix ExponentialBackoffMsgRetryManager test
    * STORM-2039: Backpressure refactoring in worker and executor
    * STORM-2064: Add storm name and function, access result and function to log-thrift-access
    * STORM-2063: Add thread name in worker logs
    * STORM-2042: Nimbus client connections not closed properly causing connection leaks
    * STORM-2032: removes warning in case more than one metrics tuple is received
    * STORM-1594: org.apache.storm.tuple.Fields can throw NPE if given invalid field in selector
    * STORM-1995: downloadChunk in nimbus.clj should close the input stream

Changes in rubygem-activeresource:
- Add bsc#1171560-CVE-2020-8151-encode-id-param.patch
  Prevent possible information disclosure issue that could allow
  an attacker to create specially crafted requests to access data
  in an unexpected way (bsc#1171560 CVE-2020-8151))_

Changes in rubygem-crowbar-client:
- Update to 3.9.2
  - Enable SES commands in Cloud8 (SOC-11122)

Changes in rubygem-json-1_7:
- Add CVE-2020-10663.patch (CVE-2020-10663, bsc#1167244)

Changes in rubygem-puma:
- Fix indentation in gem2rpm.yml_

- Add CVE-2020-11077.patch (bsc#1172175, CVE-2020-11077)
- Add chunked-request-handling.patch (needed for CVE-2020-11076.patch)
- Add CVE-2020-11076.patch (bsc#1172176, CVE-2020-11076)
- Add all patches to gem2rpm.yml

		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-14"/>
	<updated date="2020-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068612">SUSE bug 1068612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092420">SUSE bug 1092420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107190">SUSE bug 1107190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108719">SUSE bug 1108719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123872">SUSE bug 1123872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126503">SUSE bug 1126503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141968">SUSE bug 1141968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/11483483">SUSE bug 11483483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148383">SUSE bug 1148383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153191">SUSE bug 1153191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156525">SUSE bug 1156525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159046">SUSE bug 1159046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160152">SUSE bug 1160152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160153">SUSE bug 1160153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160192">SUSE bug 1160192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160790">SUSE bug 1160790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160851">SUSE bug 1160851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161088">SUSE bug 1161088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161089">SUSE bug 1161089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161670">SUSE bug 1161670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164322">SUSE bug 1164322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167244">SUSE bug 1167244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168593">SUSE bug 1168593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169770">SUSE bug 1169770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170657">SUSE bug 1170657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171273">SUSE bug 1171273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171560">SUSE bug 1171560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171594">SUSE bug 1171594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171661">SUSE bug 1171661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171909">SUSE bug 1171909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172166">SUSE bug 1172166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172167">SUSE bug 1172167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172175">SUSE bug 1172175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172176">SUSE bug 1172176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172409">SUSE bug 1172409</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000246/">CVE-2017-1000246 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000246">CVE-2017-1000246 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010083/">CVE-2019-1010083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010083">CVE-2019-1010083 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15043/">CVE-2019-15043 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15043">CVE-2019-15043 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16785/">CVE-2019-16785 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16785">CVE-2019-16785 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16786/">CVE-2019-16786 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16786">CVE-2019-16786 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16789/">CVE-2019-16789 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16789">CVE-2019-16789 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16792/">CVE-2019-16792 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16792">CVE-2019-16792 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16865/">CVE-2019-16865 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16865">CVE-2019-16865 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18874/">CVE-2019-18874 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18874">CVE-2019-18874 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19911/">CVE-2019-19911 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19911">CVE-2019-19911 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3828/">CVE-2019-3828 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3828">CVE-2019-3828 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10743/">CVE-2020-10743 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10743">CVE-2020-10743 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11076/">CVE-2020-11076 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11076">CVE-2020-11076 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11077/">CVE-2020-11077 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11077">CVE-2020-11077 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12052/">CVE-2020-12052 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12052">CVE-2020-12052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13254/">CVE-2020-13254 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13254">CVE-2020-13254 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13379/">CVE-2020-13379 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13379">CVE-2020-13379 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13596/">CVE-2020-13596 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13596">CVE-2020-13596 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5312/">CVE-2020-5312 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5312">CVE-2020-5312 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5313/">CVE-2020-5313 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5313">CVE-2020-5313 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-5390/">CVE-2020-5390 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5390">CVE-2020-5390 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8151/">CVE-2020-8151 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8151">CVE-2020-8151 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597240" comment="ansible-2.4.6.0-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597251" comment="caasp-openstack-heat-templates-1.0+git.1560518045.ad7dc6d-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597674" comment="crowbar-core-5.0+git.1593156248.55bbdb26d-3.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597675" comment="crowbar-core-branding-upstream-5.0+git.1593156248.55bbdb26d-3.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597676" comment="crowbar-openstack-5.0+git.1593085772.64c4ab43c-4.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597677" comment="documentation-suse-openstack-cloud-deployment-8.20200527-1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597257" comment="documentation-suse-openstack-cloud-supplement-8.20200527-1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597258" comment="documentation-suse-openstack-cloud-upstream-admin-8.20200527-1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597259" comment="documentation-suse-openstack-cloud-upstream-user-8.20200527-1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597261" comment="grafana-4.6.5-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597262" comment="kibana-4.6.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597263" comment="openstack-dashboard-12.0.5~dev3-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597264" comment="openstack-heat-templates-0.0.0+git.1582270132.8a20477-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597265" comment="openstack-keystone-12.0.4~dev11-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597266" comment="openstack-keystone-doc-12.0.4~dev11-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597267" comment="openstack-monasca-agent-2.2.6~dev4-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597268" comment="openstack-monasca-installer-20190923_16.32-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597269" comment="openstack-neutron-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597270" comment="openstack-neutron-dhcp-agent-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597271" comment="openstack-neutron-doc-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597272" comment="openstack-neutron-ha-tool-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597273" comment="openstack-neutron-l3-agent-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597274" comment="openstack-neutron-linuxbridge-agent-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597275" comment="openstack-neutron-macvtap-agent-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597276" comment="openstack-neutron-metadata-agent-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597277" comment="openstack-neutron-metering-agent-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597278" comment="openstack-neutron-openvswitch-agent-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597279" comment="openstack-neutron-server-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597280" comment="openstack-octavia-amphora-image-x86_64-0.1.4-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597281" comment="python-Django-1.11.23-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597282" comment="python-Flask-0.12.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597284" comment="python-Pillow-4.2.1-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597285" comment="python-amqp-2.4.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597286" comment="python-apicapi-1.6.0-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597287" comment="python-horizon-12.0.5~dev3-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597288" comment="python-keystone-12.0.4~dev11-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597289" comment="python-keystoneauth1-3.1.2~dev2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597290" comment="python-monasca-agent-2.2.6~dev4-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597291" comment="python-neutron-11.0.9~dev65-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597292" comment="python-oslo.messaging-5.30.8-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597293" comment="python-psutil-5.2.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597294" comment="python-pyroute2-0.4.21-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597295" comment="python-pysaml2-4.0.2-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597296" comment="python-tooz-1.58.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597678" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597679" comment="ruby2.1-rubygem-crowbar-client-3.9.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597680" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597681" comment="ruby2.1-rubygem-puma-2.16.0-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597297" comment="storm-1.1.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597298" comment="storm-nimbus-1.1.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597299" comment="storm-supervisor-1.1.3-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148886" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1109160" ref_url="https://bugzilla.suse.com/1109160" source="BUGZILLA"/>
		<reference ref_id="1118367" ref_url="https://bugzilla.suse.com/1118367" source="BUGZILLA"/>
		<reference ref_id="1118368" ref_url="https://bugzilla.suse.com/1118368" source="BUGZILLA"/>
		<reference ref_id="1171740" ref_url="https://bugzilla.suse.com/1171740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741/" source="CVE"/>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007135.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- Amended documentation referring to rule types 'krb5-subdomain'
  and 'ms-subdomain'. This incorrect documentation could mislead
  operators into believing that policies they had configured were 
  more restrictive than they actually were. [CVE-2018-5741]
- Further limit the number of queries that can be triggered from a
  request.  Root and TLD servers are no longer exempt from 
  max-recursion-queries. Fetches for missing name server address
  records are limited to 4 for any domain. [CVE-2020-8616]
- Replaying a TSIG BADTIME response as a request could trigger an
  assertion failure. [CVE-2020-8617]
  [bsc#1109160, bsc#1171740,
   CVE-2018-5741, bind-CVE-2018-5741.patch,
   CVE-2020-8616, bind-CVE-2020-8616.patch,
   CVE-2020-8617, bind-CVE-2020-8617.patch]

- Don't rely on /etc/insserv.conf anymore for proper dependencies
  against nss-lookup.target in named.service and lwresd.service
  (bsc#1118367 bsc#1118368)
- Using a drop-in file
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118367">SUSE bug 1118367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118368">SUSE bug 1118368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5741">CVE-2018-5741 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8616">CVE-2020-8616 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8617">CVE-2020-8617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531096" comment="bind-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531097" comment="bind-chrootenv-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531098" comment="bind-doc-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531099" comment="bind-libs-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531100" comment="bind-libs-32bit-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531101" comment="bind-utils-9.9.9P1-63.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148887" version="1" class="patch">
	<metadata>
		<title>Security update for python-ipaddress (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007151.html" source="SUSE-SU"/>
		<description>
This update for python-ipaddress fixes the following issues:

- Add CVE-2020-14422-ipaddress-hash-collision.patch fixing
  CVE-2020-14422 (bsc#1173274, bpo#41004), where hash collisions
  in IPv4Interface and IPv6Interface could lead to DOS. 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14422">CVE-2020-14422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498241" comment="python-ipaddress-1.0.18-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148888" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1173455" ref_url="https://bugzilla.suse.com/1173455" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007148.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-15049.patch: fixes a Cache Poisoning and Request Smuggling
  attack (CVE-2020-15049, bsc#1173455)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173455">SUSE bug 1173455</bugzilla>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15049">CVE-2020-15049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531103" comment="squid-3.5.21-26.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148889" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1113160" ref_url="https://bugzilla.suse.com/1113160" source="BUGZILLA"/>
		<reference ref_id="1134195" ref_url="https://bugzilla.suse.com/1134195" source="BUGZILLA"/>
		<reference ref_id="1138822" ref_url="https://bugzilla.suse.com/1138822" source="BUGZILLA"/>
		<reference ref_id="1141661" ref_url="https://bugzilla.suse.com/1141661" source="BUGZILLA"/>
		<reference ref_id="1142038" ref_url="https://bugzilla.suse.com/1142038" source="BUGZILLA"/>
		<reference ref_id="1143913" ref_url="https://bugzilla.suse.com/1143913" source="BUGZILLA"/>
		<reference ref_id="1148177" ref_url="https://bugzilla.suse.com/1148177" source="BUGZILLA"/>
		<reference ref_id="1153090" ref_url="https://bugzilla.suse.com/1153090" source="BUGZILLA"/>
		<reference ref_id="1153277" ref_url="https://bugzilla.suse.com/1153277" source="BUGZILLA"/>
		<reference ref_id="1154940" ref_url="https://bugzilla.suse.com/1154940" source="BUGZILLA"/>
		<reference ref_id="1154968" ref_url="https://bugzilla.suse.com/1154968" source="BUGZILLA"/>
		<reference ref_id="1155372" ref_url="https://bugzilla.suse.com/1155372" source="BUGZILLA"/>
		<reference ref_id="1163871" ref_url="https://bugzilla.suse.com/1163871" source="BUGZILLA"/>
		<reference ref_id="1165921" ref_url="https://bugzilla.suse.com/1165921" source="BUGZILLA"/>
		<reference ref_id="1168310" ref_url="https://bugzilla.suse.com/1168310" source="BUGZILLA"/>
		<reference ref_id="1170231" ref_url="https://bugzilla.suse.com/1170231" source="BUGZILLA"/>
		<reference ref_id="1170557" ref_url="https://bugzilla.suse.com/1170557" source="BUGZILLA"/>
		<reference ref_id="1171687" ref_url="https://bugzilla.suse.com/1171687" source="BUGZILLA"/>
		<reference ref_id="1172462" ref_url="https://bugzilla.suse.com/1172462" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10215" ref_url="https://www.suse.com/security/cve/CVE-2019-10215/" source="CVE"/>
		<reference ref_id="CVE-2019-15043" ref_url="https://www.suse.com/security/cve/CVE-2019-15043/" source="CVE"/>
		<reference ref_id="CVE-2020-12245" ref_url="https://www.suse.com/security/cve/CVE-2020-12245/" source="CVE"/>
		<reference ref_id="CVE-2020-13379" ref_url="https://www.suse.com/security/cve/CVE-2020-13379/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007159.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

cobbler:

- Calculate relative path for kernel and inited when generating
  grub entry (bsc#1170231)
  Added: fix-grub2-entry-paths.diff
- Fix os-release version detection for SUSE
  Modified: sles15.patch
- Jinja2 template library fix (bsc#1141661)
- Removes string replace for textmode fix (bsc#1134195)

golang-github-prometheus-node_exporter:

- Update to 0.18.1
  * [BUGFIX] Fix incorrect sysctl call in BSD meminfo collector, resulting in broken swap metrics on FreeBSD #1345
  * [BUGFIX] Fix rollover bug in mountstats collector #1364
  * Renamed interface label to device in netclass collector for consistency with
  * other network metrics #1224
  * The cpufreq metrics now separate the cpufreq and scaling data based on what the driver provides. #1248
  * The labels for the network_up metric have changed, see issue #1236
  * Bonding collector now uses mii_status instead of operstatus #1124
  * Several systemd metrics have been turned off by default to improve performance #1254
  * These include unit_tasks_current, unit_tasks_max, service_restart_total, and unit_start_time_seconds
  * The systemd collector blacklist now includes automount, device, mount, and slice units by default. #1255
  * [CHANGE] Bonding state uses mii_status #1124
  * [CHANGE] Add a limit to the number of in-flight requests #1166
  * [CHANGE] Renamed interface label to device in netclass collector #1224
  * [CHANGE] Add separate cpufreq and scaling metrics #1248
  * [CHANGE] Several systemd metrics have been turned off by default to improve performance #1254
  * [CHANGE] Expand systemd collector blacklist #1255
  * [CHANGE] Split cpufreq metrics into a separate collector #1253
  * [FEATURE] Add a flag to disable exporter metrics #1148
  * [FEATURE] Add kstat-based Solaris metrics for boottime, cpu and zfs collectors #1197
  * [FEATURE] Add uname collector for FreeBSD #1239
  * [FEATURE] Add diskstats collector for OpenBSD #1250
  * [FEATURE] Add pressure collector exposing pressure stall information for Linux #1174
  * [FEATURE] Add perf exporter for Linux #1274
  * [ENHANCEMENT] Add Infiniband counters #1120
  * [ENHANCEMENT] Add TCPSynRetrans to netstat default filter #1143
  * [ENHANCEMENT] Move network_up labels into new metric network_info #1236
  * [ENHANCEMENT] Use 64-bit counters for Darwin netstat
  * [BUGFIX] Add fallback for missing /proc/1/mounts #1172
  * [BUGFIX] Fix node_textfile_mtime_seconds to work properly on symlinks #1326
- Add network-online (Wants and After) dependency to systemd unit bsc#1143913

golang-github-prometheus-prometheus:

- Update change log and spec file
  + Modified spec file: default to golang 1.14 to avoid 'have choice' build issues in OBS. 
  + Rebase and update patches for version 2.18.0
  + Changed:  
    * 0002-Default-settings.patch Changed
- Update to 2.18.0 
  + Features 
    * Tracing: Added experimental Jaeger support #7148
  + Changes
    * Federation: Only use local TSDB for federation (ignore remote read). #7096
    * Rules: `rule_evaluations_total` and `rule_evaluation_failures_total` have a `rule_group` label now. #7094
  + Enhancements
    * TSDB: Significantly reduce WAL size kept around after a block cut. #7098
    * Discovery: Add `architecture` meta label for EC2. #7000
  + Bug fixes
    * UI: Fixed wrong MinTime reported by /status. #7182
    * React UI: Fixed multiselect legend on OSX. #6880
    * Remote Write: Fixed blocked resharding edge case. #7122
    * Remote Write: Fixed remote write not updating on relabel configs change. #7073
- Changes from 2.17.2
  + Bug fixes
    * Federation: Register federation metrics #7081
    * PromQL: Fix panic in parser error handling #7132
    * Rules: Fix reloads hanging when deleting a rule group that is being evaluated #7138
    * TSDB: Fix a memory leak when prometheus starts with an empty TSDB WAL #7135
    * TSDB: Make isolation more robust to panics in web handlers #7129 #7136
- Changes from 2.17.1
  + Bug fixes
    * TSDB: Fix query performance regression that increased memory and CPU usage #7051
- Changes from 2.17.0
  + Features 
    * TSDB: Support isolation #6841
    * This release implements isolation in TSDB. API queries and recording rules are
      guaranteed to only see full scrapes and full recording rules. This comes with a
      certain overhead in resource usage. Depending on the situation, there might be
      some increase in memory usage, CPU usage, or query latency.
  + Enhancements
    * PromQL: Allow more keywords as metric names #6933
    * React UI: Add normalization of localhost URLs in targets page #6794
    * Remote read: Read from remote storage concurrently #6770
    * Rules: Mark deleted rule series as stale after a reload #6745
    * Scrape: Log scrape append failures as debug rather than warn #6852
    * TSDB: Improve query performance for queries that partially hit the head #6676
    * Consul SD: Expose service health as meta label #5313
    * EC2 SD: Expose EC2 instance lifecycle as meta label #6914
    * Kubernetes SD: Expose service type as meta label for K8s service role #6684
    * Kubernetes SD: Expose label_selector and field_selector #6807
    * Openstack SD: Expose hypervisor id as meta label #6962
  + Bug fixes
    * PromQL: Do not escape HTML-like chars in query log #6834 #6795
    * React UI: Fix data table matrix values #6896
    * React UI: Fix new targets page not loading when using non-ASCII characters #6892
    * Remote read: Fix duplication of metrics read from remote storage with external labels #6967 #7018
    * Remote write: Register WAL watcher and live reader metrics for all remotes, not just the first one #6998
    * Scrape: Prevent removal of metric names upon relabeling #6891
    * Scrape: Fix 'superfluous response.WriteHeader call' errors when scrape fails under some circonstances #6986
    * Scrape: Fix crash when reloads are separated by two scrape intervals #7011
- Changes from 2.16.0
  + Features 
    * React UI: Support local timezone on /graph #6692
    * PromQL: add absent_over_time query function #6490
    * Adding optional logging of queries to their own file #6520
  + Enhancements
    * React UI: Add support for rules page and 'Xs ago' duration displays #6503
    * React UI: alerts page, replace filtering togglers tabs with checkboxes #6543
    * TSDB: Export metric for WAL write errors #6647
    * TSDB: Improve query performance for queries that only touch the most recent 2h of data. #6651
    * PromQL: Refactoring in parser errors to improve error messages #6634
    * PromQL: Support trailing commas in grouping opts #6480
    * Scrape: Reduce memory usage on reloads by reusing scrape cache #6670
    * Scrape: Add metrics to track bytes and entries in the metadata cache #6675
    * promtool: Add support for line-column numbers for invalid rules output #6533
    * Avoid restarting rule groups when it is unnecessary #6450
  + Bug fixes
    * React UI: Send cookies on fetch() on older browsers #6553
    * React UI: adopt grafana flot fix for stacked graphs #6603
    * React UI: broken graph page browser history so that back button works as expected #6659
    * TSDB: ensure compactionsSkipped metric is registered, and log proper error if one is returned from head.Init #6616
    * TSDB: return an error on ingesting series with duplicate labels #6664
    * PromQL: Fix unary operator precedence #6579
    * PromQL: Respect query.timeout even when we reach query.max-concurrency #6712
    * PromQL: Fix string and parentheses handling in engine, which affected React UI #6612
    * PromQL: Remove output labels returned by absent() if they are produced by multiple identical label matchers #6493
    * Scrape: Validate that OpenMetrics input ends with `# EOF` #6505
    * Remote read: return the correct error if configs can't be marshal'd to JSON #6622
    * Remote write: Make remote client `Store` use passed context, which can affect shutdown timing #6673
    * Remote write: Improve sharding calculation in cases where we would always be consistently behind by tracking pendingSamples #6511
    * Ensure prometheus_rule_group metrics are deleted when a rule group is removed #6693
- Changes from 2.15.2
  + Bug fixes
    * TSDB: Fixed support for TSDB blocks built with Prometheus before 2.1.0. #6564
    * TSDB: Fixed block compaction issues on Windows. #6547
- Changes from 2.15.1
  + Bug fixes
    * TSDB: Fixed race on concurrent queries against same data. #6512
- Changes from 2.15.0
  + Features 
    * API: Added new endpoint for exposing per metric metadata `/metadata`. #6420 #6442
  + Changes
    * Discovery: Removed `prometheus_sd_kubernetes_cache_*` metrics. Additionally `prometheus_sd_kubernetes_workqueue_latency_seconds` and `prometheus_sd_kubernetes_workqueue_work_duration_seconds` metrics now show correct values in seconds. #6393
    * Remote write: Changed `query` label on `prometheus_remote_storage_*` metrics to `remote_name` and `url`. #6043
  + Enhancements
    * TSDB: Significantly reduced memory footprint of loaded TSDB blocks. #6418 #6461
    * TSDB: Significantly optimized what we buffer during compaction which should result in lower memory footprint during compaction. #6422 #6452 #6468 #6475
    * TSDB: Improve replay latency. #6230
    * TSDB: WAL size is now used for size based retention calculation. #5886
    * Remote read: Added query grouping and range hints to the remote read request #6401
    * Remote write: Added `prometheus_remote_storage_sent_bytes_total` counter per queue. #6344
    * promql: Improved PromQL parser performance. #6356
    * React UI: Implemented missing pages like `/targets` #6276, TSDB status page #6281 #6267 and many other fixes and performance improvements.
    * promql: Prometheus now accepts spaces between time range and square bracket. e.g `[ 5m]` #6065  
  + Bug fixes
    * Config: Fixed alertmanager configuration to not miss targets when configurations are similar. #6455
    * Remote write: Value of `prometheus_remote_storage_shards_desired` gauge shows raw value of desired shards and it's updated correctly. #6378
    * Rules: Prometheus now fails the evaluation of rules and alerts where metric results collide with labels specified in `labels` field. #6469
    * API: Targets Metadata API `/targets/metadata` now accepts empty `match_targets` parameter as in the spec. #6303
- Changes from 2.14.0
  + Features 
    * API: `/api/v1/status/runtimeinfo` and `/api/v1/status/buildinfo` endpoints added for use by the React UI. #6243
    * React UI: implement the new experimental React based UI. #5694 and many more
      * Can be found by under `/new`.
      * Not all pages are implemented yet.
    * Status: Cardinality statistics added to the Runtime &amp; Build Information page. #6125
  + Enhancements
    * Remote write: fix delays in remote write after a compaction. #6021
    * UI: Alerts can be filtered by state. #5758
  + Bug fixes
    * Ensure warnings from the API are escaped. #6279
    * API: lifecycle endpoints return 403 when not enabled. #6057
    * Build: Fix Solaris build. #6149
    * Promtool: Remove false duplicate rule warnings when checking rule files with alerts. #6270
    * Remote write: restore use of deduplicating logger in remote write. #6113
    * Remote write: do not reshard when unable to send samples. #6111
    * Service discovery: errors are no longer logged on context cancellation. #6116, #6133
    * UI: handle null response from API properly. #6071
- Changes from 2.13.1
  + Bug fixes
    * Fix panic in ARM builds of Prometheus. #6110
    * promql: fix potential panic in the query logger. #6094
    * Multiple errors of http: superfluous response.WriteHeader call in the logs. #6145
- Changes from 2.13.0
  + Enhancements
    * Metrics: renamed prometheus_sd_configs_failed_total to prometheus_sd_failed_configs and changed to Gauge #5254
    * Include the tsdb tool in builds. #6089
    * Service discovery: add new node address types for kubernetes. #5902
    * UI: show warnings if query have returned some warnings. #5964
    * Remote write: reduce memory usage of the series cache. #5849
    * Remote read: use remote read streaming to reduce memory usage. #5703
    * Metrics: added metrics for remote write max/min/desired shards to queue manager. #5787
    * Promtool: show the warnings during label query. #5924
    * Promtool: improve error messages when parsing bad rules. #5965
    * Promtool: more promlint rules. #5515
  + Bug fixes
    * UI: Fix a Stored DOM XSS vulnerability with query history [CVE-2019-10215](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10215). #6098
    * Promtool: fix recording inconsistency due to duplicate labels. #6026
    * UI: fixes service-discovery view when accessed from unhealthy targets. #5915
    * Metrics format: OpenMetrics parser crashes on short input. #5939
    * UI: avoid truncated Y-axis values. #6014
- Changes from 2.12.0
  + Features 
    * Track currently active PromQL queries in a log file. #5794
    * Enable and provide binaries for `mips64` / `mips64le` architectures. #5792
  + Enhancements
    * Improve responsiveness of targets web UI and API endpoint. #5740
    * Improve remote write desired shards calculation. #5763
    * Flush TSDB pages more precisely. tsdb#660
    * Add `prometheus_tsdb_retention_limit_bytes` metric. tsdb#667
    * Add logging during TSDB WAL replay on startup. tsdb#662
    * Improve TSDB memory usage. tsdb#653, tsdb#643, tsdb#654, tsdb#642, tsdb#627
  + Bug fixes
    * Check for duplicate label names in remote read. #5829
    * Mark deleted rules' series as stale on next evaluation. #5759
    * Fix JavaScript error when showing warning about out-of-sync server time. #5833
    * Fix `promtool test rules` panic when providing empty `exp_labels`. #5774
    * Only check last directory when discovering checkpoint number. #5756
    * Fix error propagation in WAL watcher helper functions. #5741
    * Correctly handle empty labels from alert templates. #5845
- Update Uyuni/SUSE Manager service discovery patch
  + Modified 0003-Add-Uyuni-service-discovery.patch:
  + Adapt service discovery to the new Uyuni API endpoints
  + Modified spec file: force golang 1.12 to fix build issues in SLE15SP2
- Update to Prometheus 2.11.2

grafana:

- Update to version 7.0.3
  * Features / Enhancements
    - Stats: include all fields. #24829, @ryantxu
    - Variables: change VariableEditorList row action Icon to IconButton. #25217, @hshoff
  * Bug fixes
    - Cloudwatch: Fix dimensions of DDoSProtection. #25317, @papagian
    - Configuration: Fix env var override of sections containing hyphen. #25178, @marefr
    - Dashboard: Get panels in collapsed rows. #25079, @peterholmberg
    - Do not show alerts tab when alerting is disabled. #25285, @dprokop
    - Jaeger: fixes cascader option label duration value. #25129, @Estrax
    - Transformations: Fixed Transform tab crash &amp; no update after adding first transform. #25152, @torkelo
- Update to version 7.0.2
  * Bug fixes
    - Security: Urgent security patch release to fix CVE-2020-13379
- Update to version 7.0.1
  * Features / Enhancements
    - Datasource/CloudWatch: Makes CloudWatch Logs query history more readable. #24795, @kaydelaney
    - Download CSV: Add date and time formatting. #24992, @ryantxu
    - Table: Make last cell value visible when right aligned. #24921, @peterholmberg
    - TablePanel: Adding sort order persistance. #24705, @torkelo
    - Transformations: Display correct field name when using reduce transformation. #25068, @peterholmberg
    - Transformations: Allow custom number input for binary operations. #24752, @ryantxu
  * Bug fixes
    - Dashboard/Links: Fixes dashboard links by tags not working. #24773, @KamalGalrani
    - Dashboard/Links: Fixes open in new window for dashboard link. #24772, @KamalGalrani
    - Dashboard/Links: Variables are resolved and limits to 100. #25076, @hugohaggmark
    - DataLinks: Bring back variables interpolation in title. #24970, @dprokop
    - Datasource/CloudWatch: Field suggestions no longer limited to prefix-only. #24855, @kaydelaney
    - Explore/Table: Keep existing field types if possible. #24944, @kaydelaney
    - Explore: Fix wrap lines toggle for results of queries with filter expression. #24915, @ivanahuckova
    - Explore: fix undo in query editor. #24797, @zoltanbedi
    - Explore: fix word break in type head info. #25014, @zoltanbedi
    - Graph: Legend decimals now work as expected. #24931, @torkelo
    - LoginPage: Fix hover color for service buttons. #25009, @tskarhed
    - LogsPanel: Fix scrollbar. #24850, @ivanahuckova
    - MoveDashboard: Fix for moving dashboard caused all variables to be lost. #25005, @torkelo
    - Organize transformer: Use display name in field order comparer. #24984, @dprokop
    - Panel: shows correct panel menu items in view mode. #24912, @hugohaggmark
    - PanelEditor Fix missing labels and description if there is only single option in category. #24905, @dprokop
    - PanelEditor: Overrides name matcher still show all original field names even after Field default display name is specified. #24933, @torkelo
    - PanelInspector: Makes sure Data display options are visible. #24902, @hugohaggmark
    - PanelInspector: Hides unsupported data display options for Panel type. #24918, @hugohaggmark
    - PanelMenu: Make menu disappear on button press. #25015, @tskarhed
    - Postgres: Fix add button. #25087, @phemmer
    - Prometheus: Fix recording rules expansion. #24977, @ivanahuckova
    - Stackdriver: Fix creating Service Level Objectives (SLO) datasource query variable. #25023, @papagian
- Update to version 7.0.0 
  * Breaking changes
    - Removed PhantomJS: PhantomJS was deprecated in Grafana v6.4 and starting from Grafana v7.0.0, all PhantomJS support has been removed. This means that Grafana no longer ships with a built-in image renderer, and we advise you to install the Grafana Image Renderer plugin.
    - Dashboard: A global minimum dashboard refresh interval is now enforced and defaults to 5 seconds.
    - Interval calculation: There is now a new option Max data points that controls the auto interval $__interval calculation. Interval was previously calculated by dividing the panel width by the time range. With the new max data points option it is now easy to set $__interval to a dynamic value that is time range agnostic. For example if you set Max data points to 10 Grafana will dynamically set $__interval by dividing the current time range by 10.
    - Datasource/Loki: Support for deprecated Loki endpoints has been removed.
    - Backend plugins: Grafana now requires backend plugins to be signed, otherwise Grafana will not load/start them. This is an additional security measure to make sure backend plugin binaries and files haven't been tampered with. Refer to Upgrade Grafana for more information.
    - @grafana/ui: Forms migration notice, see @grafana/ui changelog
    - @grafana/ui: Select API change for creating custom values, see @grafana/ui changelog
    + Deprecation warnings
      - Scripted dashboards is now deprecated. The feature is not removed but will be in a future release. We hope to address the underlying requirement of dynamic dashboards in a different way. #24059
      - The unofficial first version of backend plugins together with usage of grafana/grafana-plugin-model is now deprecated and support for that will be removed in a future release. Please refer to backend plugins documentation for information about the new officially supported backend plugins.
  * Features / Enhancements
    - Backend plugins: Log deprecation warning when using the unofficial first version of backend plugins. #24675, @marefr
    - Editor: New line on Enter, run query on Shift+Enter. #24654, @davkal
    - Loki: Allow multiple derived fields with the same name. #24437, @aocenas
    - Orgs: Add future deprecation notice. #24502, @torkelo
  * Bug Fixes
    - @grafana/toolkit: Use process.cwd() instead of PWD to get directory. #24677, @zoltanbedi
    - Admin: Makes long settings values line break in settings page. #24559, @hugohaggmark
    - Dashboard: Allow editing provisioned dashboard JSON and add confirmation when JSON is copied to dashboard. #24680, @dprokop
    - Dashboard: Fix for strange 'dashboard not found' errors when opening links in dashboard settings. #24416, @torkelo
    - Dashboard: Fix so default data source is selected when data source can't be found in panel editor. #24526, @mckn
    - Dashboard: Fixed issue changing a panel from transparent back to normal in panel editor. #24483, @torkelo
    - Dashboard: Make header names reflect the field name when exporting to CSV file from the the panel inspector. #24624, @peterholmberg
    - Dashboard: Make sure side pane is displayed with tabs by default in panel editor. #24636, @dprokop
    - Data source: Fix query/annotation help content formatting. #24687, @AgnesToulet
    - Data source: Fixes async mount errors. #24579, @Estrax
    - Data source: Fixes saving a data source without failure when URL doesn't specify a protocol. #24497, @aknuds1
    - Explore/Prometheus: Show results of instant queries only in table. #24508, @ivanahuckova
    - Explore: Fix rendering of react query editors. #24593, @ivanahuckova
    - Explore: Fixes loading more logs in logs context view. #24135, @Estrax
    - Graphite: Fix schema and dedupe strategy in rollup indicators for Metrictank queries. #24685, @torkelo
    - Graphite: Makes query annotations work again. #24556, @hugohaggmark
    - Logs: Clicking 'Load more' from context overlay doesn't expand log row. #24299, @kaydelaney
    - Logs: Fix total bytes process calculation. #24691, @davkal
    - Org/user/team preferences: Fixes so UI Theme can be set back to Default. #24628, @AgnesToulet
    - Plugins: Fix manifest validation. #24573, @aknuds1
    - Provisioning: Use proxy as default access mode in provisioning. #24669, @bergquist
    - Search: Fix select item when pressing enter and Grafana is served using a sub path. #24634, @tskarhed
    - Search: Save folder expanded state. #24496, @Clarity-89
    - Security: Tag value sanitization fix in OpenTSDB data source. #24539, @rotemreiss
    - Table: Do not include angular options in options when switching from angular panel. #24684, @torkelo
    - Table: Fixed persisting column resize for time series fields. #24505, @torkelo
    - Table: Fixes Cannot read property subRows of null. #24578, @hugohaggmark
    - Time picker: Fixed so you can enter a relative range in the time picker without being converted to absolute range. #24534, @mckn
    - Transformations: Make transform dropdowns not cropped. #24615, @dprokop
    - Transformations: Sort order should be preserved as entered by user when using the reduce transformation. #24494, @hugohaggmark
    - Units: Adds scale symbol for currencies with suffixed symbol. #24678, @hugohaggmark
    - Variables: Fixes filtering options with more than 1000 entries. #24614, @hugohaggmark
    - Variables: Fixes so Textbox variables read value from url. #24623, @hugohaggmark
    - Zipkin: Fix error when span contains remoteEndpoint. #24524, @aocenas
    - SAML: Switch from email to login for user login attribute mapping (Enterprise)
- Update Makefile and spec file
  * Remove phantomJS patch from Makefile 
  * Fix multiline strings in Makefile
  * Exclude s390 from SLE12 builds, golang 1.14 is not built for s390
- Add instructions for patching the Grafana javascript frontend.
- BuildRequires golang(API) instead of go metapackage version range
  * BuildRequires:  golang(API) &gt;= 1.14   from
    BuildRequires:  ( go &gt;= 1.14 with go &lt; 1.15 )
- Update to version 6.7.3
  - This version fixes bsc#1170557 and its corresponding CVE-2020-12245
  - Admin: Fix Synced via LDAP message for non-LDAP external users. #23477, @alexanderzobnin
  - Alerting: Fixes notifications for alerts with empty message in Google Hangouts notifier. #23559, @hugohaggmark
  - AuthProxy: Fixes bug where long username could not be cached.. #22926, @jcmcken
  - Dashboard: Fix saving dashboard when editing raw dashboard JSON model. #23314, @peterholmberg
  - Dashboard: Try to parse 8 and 15 digit numbers as timestamps if parsing of time range as date fails. #21694, @jessetan
  - DashboardListPanel: Fixed problem with empty panel after going into edit mode (General folder filter being automatically added) . #23426, @torkelo
  - Data source: Handle datasource withCredentials option properly. #23380, @hvtuananh
  - Security: Fix annotation popup XSS vulnerability. #23813, @torkelo
  - Server: Exit Grafana with status code 0 if no error. #23312, @aknuds1
  - TablePanel: Fix XSS issue in header column rename (backport). #23814, @torkelo
  - Variables: Fixes error when setting adhoc variable values. #23580, @hugohaggmark
- Update to version 6.7.2:
  (see installed changelog for the full list of changes)
  -  BackendSrv: Adds config to response to fix issue for external plugins that used this property . #23032, @torkelo
  -  Dashboard: Fixed issue with saving new dashboard after changing title . #23104, @dprokop
  -  DataLinks: make sure we use the correct datapoint when dataset contains null value.. #22981, @mckn
  -  Plugins: Fixed issue for plugins that imported dateMath util . #23069, @mckn
  -  Security: Fix for dashboard snapshot original dashboard link could contain XSS vulnerability in url. #23254, @torkelo
  -  Variables: Fixes issue with too many queries being issued for nested template variables after value change. #23220, @torkelo
  -  Plugins: Expose promiseToDigest. #23249, @torkelo
  -  Reporting (Enterprise): Fixes issue updating a report created by someone else
- Update to 6.7.1:
  (see installed changelog for the full list of changes)
  Bug Fixes
  - Azure: Fixed dropdowns not showing current value. #22914, @torkelo
  - BackendSrv: only add content-type on POST, PUT requests. #22910, @hugohaggmark
  - Panels: Fixed size issue with panel internal size when exiting panel edit mode. #22912, @torkelo
  - Reporting: fixes migrations compatibility with mysql (Enterprise)
  - Reporting: Reduce default concurrency limit to 4 (Enterprise)
- Update to 6.7.0:
  (see installed changelog for the full list of changes)
  Bug Fixes
  - AngularPanels: Fixed inner height calculation for angular panels . #22796, @torkelo
  - BackendSrv: makes sure provided headers are correctly recognized and set. #22778, @hugohaggmark
  - Forms: Fix input suffix position (caret-down in Select) . #22780, @torkelo
  - Graphite: Fixed issue with query editor and next select metric now showing after selecting metric node . #22856, @torkelo
  - Rich History: UX adjustments and fixes. #22729, @ivanahuckova
- Update to 6.7.0-beta1:
  Breaking changes
  -  Slack: Removed Mention setting and instead introduce Mention Users, Mention Groups, and Mention Channel. The first two settings require user and group IDs, respectively. This change was necessary because the way of mentioning via the Slack API changed and mentions in Slack notifications no longer worked.
  -  Alerting: Reverts the behavior of diff and percent_diff to not always be absolute. Something we introduced by mistake in 6.1.0. Alerting now support diff(), diff_abs(), percent_diff() and percent_diff_abs(). #21338
  - Notice about changes in backendSrv for plugin authors
    In our mission to migrate away from AngularJS to React we have removed all AngularJS dependencies in the core data retrieval service backendSrv.
    Removing the AngularJS dependencies in backendSrv has the unfortunate side effect of AngularJS digest no longer being triggered for any request made with backendSrv. Because of this, external plugins using backendSrv directly may suffer from strange behaviour in the UI.
    To remedy this issue, as a plugin author you need to trigger the digest after a direct call to backendSrv.
  Bug Fixes
    API: Fix redirect issues. #22285, @papagian
    Alerting: Don't include image_url field with Slack message if empty. #22372, @aknuds1
    Alerting: Fixed bad background color for default notifications in alert tab . #22660, @krvajal
    Annotations: In table panel when setting transform to annotation, they will now show up right away without a manual refresh. #22323, @krvajal
    Azure Monitor: Fix app insights source to allow for new __timeFrom and __timeTo. #21879, @ChadNedzlek
    BackendSrv: Fixes POST body for form data. gmark
    CloudWatch: Credentials cache invalidation fix. #22473, @sunker
    CloudWatch: Expand alias variables when query yields no result. #22695, @sunker
    Dashboard: Fix bug with NaN in alerting. #22053, @a-melnyk
    Explore: Fix display of multiline logs in log panel and explore. #22057, @thomasdraebing
    Heatmap: Legend color range is incorrect when using custom min/max. #21748, @sv5d
    Security: Fixed XSS issue in dashboard history diff . #22680, @torkelo
    StatPanel: Fixes base color is being used for null values .
    #22646, @torkelo
- Update to version 6.6.2:
  (see installed changelog for the full list of changes)
- Update to version 6.6.1:
  (see installed changelog for the full list of changes)
- Update to version 6.6.0:
  (see installed changelog for the full list of changes)
- Update to version 6.5.3:
  (see installed changelog for the full list of changes)
- Update to version 6.5.2:
  (see installed changelog for the full list of changes)
- Update to version 6.5.1:
  (see installed changelog for the full list of changes)
- Update to version 6.5.0
  (see installed changelog for the full list of changes)
- Update to version 6.4.5:
  * Create version 6.4.5
  * CloudWatch: Fix high CPU load (#20579)
- Add obs-service-go_modules to download required modules into vendor.tar.gz
- Adjusted spec file to use vendor.tar.gz
- Adjusted Makefile to work with new filenames
- BuildRequire go1.14
- Update to version 6.4.4:
  * DataLinks: Fix blur issues. #19883, @aocenas
  * Docker: Makes it possible to parse timezones in the docker image. #20081, @xlson
  * LDAP: All LDAP servers should be tried even if one of them returns a connection error. #20077, @jongyllen
  * LDAP: No longer shows incorrectly matching groups based on role in debug page. #20018, @xlson
  * Singlestat: Fix no data / null value mapping . #19951, @ryantxu
- Revert the spec file and make script
- Remove PhantomJS dependency
- Update to 6.4.3
  * Bug Fixes
    - Alerting: All notification channels should send even if one fails to send. #19807, @jan25
    - AzureMonitor: Fix slate interference with dropdowns. #19799, @aocenas
    - ContextMenu: make ContextMenu positioning aware of the viewport width. #19699, @krvajal
    - DataLinks: Fix context menu not showing in singlestat-ish visualisations. #19809, @dprokop
    - DataLinks: Fix url field not releasing focus. #19804, @aocenas
    - Datasource: Fixes clicking outside of some query editors required 2 clicks. #19822, @aocenas
    - Panels: Fixes default tab for visualizations without Queries Tab. #19803, @hugohaggmark
    - Singlestat: Fixed issue with mapping null to text. #19689, @torkelo
    - @grafana/toolkit: Don't fail plugin creation when git user.name config is not set. #19821, @dprokop
    - @grafana/toolkit: TSLint line number off by 1. #19782, @fredwangwang
- Update to 6.4.2
  * Bug Fixes
    - CloudWatch: Changes incorrect dimension wmlid to wlmid . #19679, @ATTron
    - Grafana Image Renderer: Fixes plugin page. #19664, @hugohaggmark
    - Graph: Fixes auto decimals logic for y axis ticks that results in too many decimals for high values. #19618, @torkelo
    - Graph: Switching to series mode should re-render graph. #19623, @torkelo
    - Loki: Fix autocomplete on label values. #19579, @aocenas
    - Loki: Removes live option for logs panel. #19533, @davkal
    - Profile: Fix issue with user profile not showing more than sessions sessions in some cases. #19578, @huynhsamha
    - Prometheus: Fixes so results in Panel always are sorted by query order. #19597, @hugohaggmark
    - sted keys in YAML provisioning caused a server crash, #19547
    - ImageRendering: Fixed issue with image rendering in enterprise build (Enterprise)
    - Reporting: Fixed issue with reporting service when STMP was disabled (Enterprise).
- Changes from 6.4.0
  * Features / Enhancements
    - Build: Upgrade go to 1.12.10. #19499, @marefr
    - DataLinks: Suggestions menu improvements. #19396, @dprokop
    - Explore: Take root_url setting into account when redirecting from dashboard to explore. #19447, @ivanahuckova
    - Explore: Update broken link to logql docs. #19510, @ivanahuckova
    - Logs: Adds Logs Panel as a visualization. #19504, @davkal
  * Bug Fixes
    - CLI: Fix version selection for plugin install. #19498, @aocenas
    - Graph: Fixes minor issue with series override color picker and custom color . #19516, @torkelo
- Changes from 6.4.0 Beta 2
  * Features / Enhancements
    - Azure Monitor: Remove support for cross resource queries (#19115)'. #19346, @sunker
    - Docker: Upgrade packages to resolve reported vulnerabilities. #19188, @marefr
    - Graphite: Time range expansion reduced from 1 minute to 1 second. #19246, @torkelo
    - grafana/toolkit: Add plugin creation task. #19207, @dprokop
  * Bug Fixes
    - Alerting: Prevents creating alerts from unsupported queries. #19250, @hugohaggmark
    - Alerting: Truncate PagerDuty summary when greater than 1024 characters. #18730, @nvllsvm
    - Cloudwatch: Fix autocomplete for Gamelift dimensions. #19146, @kevinpz
    - Dashboard: Fix export for sharing when panels use default data source. #19315, @torkelo
    - Database: Rewrite system statistics query to perform better. #19178, @papagian
    - Gauge/BarGauge: Fix issue with [object Object] in titles . #19217, @ryantxu
    - MSSQL: Revert usage of new connectionstring format introduced by #18384. #19203, @marefr
    - Multi-LDAP: Do not fail-fast on invalid credentials. #19261, @gotjosh
    - MySQL, Postgres, MSSQL: Fix validating query with template variables in alert . #19237, @marefr
    - MySQL, Postgres: Update raw sql when query builder updates. #19209, @marefr
    - MySQL: Limit datasource error details returned from the backend. #19373, @marefr
- Changes from 6.4.0 Beta 1
  * Features / Enhancements
    - API: Readonly datasources should not be created via the API. #19006, @papagian
    - Alerting: Include configured AlertRuleTags in Webhooks notifier. #18233, @dominic-miglar
    - Annotations: Add annotations support to Loki. #18949, @aocenas
    - Annotations: Use a single row to represent a region. #17673, @ryantxu
    - Auth: Allow inviting existing users when login form is disabled. #19048, @548017
    - Azure Monitor: Add support for cross resource queries. #19115, @sunker
    - CLI: Allow installing custom binary plugins. #17551, @aocenas
    - Dashboard: Adds Logs Panel (alpha) as visualization option for Dashboards. #18641, @hugohaggmark
    - Dashboard: Reuse query results between panels . #16660, @ryantxu
    - Dashboard: Set time to to 23:59:59 when setting To time using calendar. #18595, @simPod
    - DataLinks: Add DataLinks support to Gauge, BarGauge and SingleStat2 panel. #18605, @ryantxu
    - DataLinks: Enable access to labels &amp; field names. #18918, @torkelo
    - DataLinks: Enable multiple data links per panel. #18434, @dprokop
    - Docker: switch docker image to alpine base with phantomjs support. #18468, @DanCech
    - Elasticsearch: allow templating queries to order by doc_count. #18870, @hackery
    - Explore: Add throttling when doing live queries. #19085, @aocenas
    - Explore: Adds ability to go back to dashboard, optionally with query changes. #17982, @kaydelaney
    - Explore: Reduce default time range to last hour. #18212, @davkal
    - Gauge/BarGauge: Support decimals for min/max. #18368, @ryantxu
    - Graph: New series override transform constant that renders a single point as a line across the whole graph. #19102, @davkal
    - Image rendering: Add deprecation warning when PhantomJS is used for rendering images. #18933, @papagian
    - InfluxDB: Enable interpolation within ad-hoc filter values. #18077, @kvc-code
    - LDAP: Allow an user to be synchronized against LDAP. #18976, @gotjosh
    - Ldap: Add ldap debug page. #18759, @peterholmberg
    - Loki: Remove prefetching of default label values. #18213, @davkal
    - Metrics: Add failed alert notifications metric. #18089, @koorgoo
    - OAuth: Support JMES path lookup when retrieving user email. #14683, @bobmshannon
    - OAuth: return GitLab groups as a part of user info (enable team sync). #18388, @alexanderzobnin
    - Panels: Add unit for electrical charge - ampere-hour. #18950, @anirudh-ramesh
    - Plugin: AzureMonitor - Reapply MetricNamespace support. #17282, @raphaelquati
    - Plugins: better warning when plugins fail to load. #18671, @ryantxu
    - Postgres: Add support for scram sha 256 authentication. #18397, @nonamef
    - RemoteCache: Support SSL with Redis. #18511, @kylebrandt
    - SingleStat: The gauge option in now disabled/hidden (unless it's an old panel with it already enabled) . #18610, @ryantxu
    - Stackdriver: Add extra alignment period options. #18909, @sunker
    - Units: Add South African Rand (ZAR) to currencies. #18893, @jeteon
    - Units: Adding T,P,E,Z,and Y bytes. #18706, @chiqomar
  * Bug Fixes
    - Alerting: Notification is sent when state changes from no_data to ok. #18920, @papagian
    - Alerting: fix duplicate alert states when the alert fails to save to the database. #18216, @kylebrandt
    - Alerting: fix response popover prompt when add notification channels. #18967, @lzdw
    - CloudWatch: Fix alerting for queries with Id (using GetMetricData). #17899, @alex-berger
    - Explore: Fix auto completion on label values for Loki. #18988, @aocenas
    - Explore: Fixes crash using back button with a zoomed in graph. #19122, @hugohaggmark
    - Explore: Fixes so queries in Explore are only run if Graph/Table is shown. #19000, @hugohaggmark
    - MSSQL: Change connectionstring to URL format to fix using passwords with semicolon. #18384, @Russiancold
    - MSSQL: Fix memory leak when debug enabled. #19049, @briangann
    - Provisioning: Allow escaping literal '$' with '$$' in configs to avoid interpolation. #18045, @kylebrandt
    - TimePicker: Fixes hiding time picker dropdown in FireFox. #19154, @hugohaggmark
  * Breaking changes
    + Annotations
      There are some breaking changes in the annotations HTTP API for region annotations. Region annotations are now represented
      using a single event instead of two seperate events. Check breaking changes in HTTP API below and HTTP API documentation for more details.
    + Docker
      Grafana is now using Alpine 3.10 as docker base image.
    + HTTP API
      - GET /api/alert-notifications now requires at least editor access.
        New /api/alert-notifications/lookup returns less information than /api/alert-notifications and can be access by any authenticated user.
      - GET /api/alert-notifiers now requires at least editor access
      - GET /api/org/users now requires org admin role.
        New /api/org/users/lookup returns less information than /api/org/users and can be access by users that are org admins,
        admin in any folder or admin of any team.
      - GET /api/annotations no longer returns regionId property.
      - POST /api/annotations no longer supports isRegion property.
      - PUT /api/annotations/:id no longer supports isRegion property.
      - PATCH /api/annotations/:id no longer supports isRegion property.
      - DELETE /api/annotations/region/:id has been removed.
  * Deprecation notes
    + PhantomJS
      - PhantomJS, which is used for rendering images of dashboards and panels,
        is deprecated and will be removed in a future Grafana release.
        A deprecation warning will from now on be logged when Grafana starts up if PhantomJS is in use.
        Please consider migrating from PhantomJS to the Grafana Image Renderer plugin.
- Changes from 6.3.6
  * Features / Enhancements
    - Metrics: Adds setting for turning off total stats metrics. #19142, @marefr
  * Bug Fixes
    - Database: Rewrite system statistics query to perform better. #19178, @papagian
    - Explore: Fixes error when switching from prometheus to loki data sources. #18599, @kaydelaney
- Rebase package spec. Use mostly from fedora, fix suse specified things and fix some errors.
- Add missing directories provisioning/datasources and provisioning/notifiers
  and sample.yaml as described in packaging/rpm/control from upstream.
  Missing directories are shown in logfiles.
- Version 6.3.5
  * Upgrades
    + Build: Upgrade to go 1.12.9.
  * Bug Fixes
    + Dashboard: Fixes dashboards init failed loading error for dashboards with panel links that had missing properties.
    + Editor: Fixes issue where only entire lines were being copied.
    + Explore: Fixes query field layout in splitted view for Safari browsers.
    + LDAP: multildap + ldap integration.
    + Profile/UserAdmin: Fix for user agent parser crashes grafana-server on 32-bit builds.
    + Prometheus: Prevents panel editor crash when switching to Prometheus datasource.
    + Prometheus: Changes brace-insertion behavior to be less annoying.
- Version 6.3.4
  * Security: CVE-2019-15043 - Parts of the HTTP API allow unauthenticated use.
- Version 6.3.3
  * Bug Fixes
    + Annotations: Fix failing annotation query when time series query is cancelled. #18532 1, @dprokop 1
    + Auth: Do not set SameSite cookie attribute if cookie_samesite is none. #18462 1, @papagian 3
    + DataLinks: Apply scoped variables to data links correctly. #18454 1, @dprokop 1
    + DataLinks: Respect timezone when displaying datapoint’s timestamp in graph context menu. #18461 2, @dprokop 1
    + DataLinks: Use datapoint timestamp correctly when interpolating variables. #18459 1, @dprokop 1
    + Explore: Fix loading error for empty queries. #18488 1, @davkal
    + Graph: Fixes legend issue clicking on series line icon and issue with horizontal scrollbar being visible on windows. #18563 1, @torkelo 2
    + Graphite: Avoid glob of single-value array variables . #18420, @gotjosh
    + Prometheus: Fix queries with label_replace remove the $1 match when loading query editor. #18480 5, @hugohaggmark 3
    + Prometheus: More consistently allows for multi-line queries in editor. #18362 2, @kaydelaney 2
    + TimeSeries: Assume values are all numbers. #18540 4, @ryantxu
- Version 6.3.2
  * Bug Fixes
    + Gauge/BarGauge: Fixes issue with losts thresholds and issue loading Gauge with avg stat. #18375 12
- Version 6.3.1
  * Bug Fixes
    + PanelLinks: Fix crash issue Gauge &amp; Bar Gauge for panels with panel links (drill down links). #18430 2
- Version 6.3.0
  * Features / Enhancements
    + OAuth: Do not set SameSite OAuth cookie if cookie_samesite is None. #18392 4, @papagian 3
    + Auth Proxy: Include additional headers as part of the cache key. #18298 6, @gotjosh
    + Build grafana images consistently. #18224 12, @hassanfarid
    + Docs: SAML. #18069 11, @gotjosh
    + Permissions: Show plugins in nav for non admin users but hide plugin configuration. #18234 1, @aocenas
    + TimePicker: Increase max height of quick range dropdown. #18247 2, @torkelo 2
    + Alerting: Add tags to alert rules. #10989 13, @Thib17 1
    + Alerting: Attempt to send email notifications to all given email addresses. #16881 1, @zhulongcheng
    + Alerting: Improve alert rule testing. #16286 2, @marefr
    + Alerting: Support for configuring content field for Discord alert notifier. #17017 2, @jan25
    + Alertmanager: Replace illegal chars with underscore in label names. #17002 5, @bergquist 1
    + Auth: Allow expiration of API keys. #17678, @papagian 3
    + Auth: Return device, os and browser when listing user auth tokens in HTTP API. #17504, @shavonn 1
    + Auth: Support list and revoke of user auth tokens in UI. #17434 2, @shavonn 1
    + AzureMonitor: change clashing built-in Grafana variables/macro names for Azure Logs. #17140, @shavonn 1
    + CloudWatch: Made region visible for AWS Cloudwatch Expressions. #17243 2, @utkarshcmu
    + Cloudwatch: Add AWS DocDB metrics. #17241, @utkarshcmu
    + Dashboard: Use timezone dashboard setting when exporting to CSV. #18002 1, @dehrax
    + Data links. #17267 11, @torkelo 2
    + Docker: Switch base image to ubuntu:latest from debian:stretch to avoid security issues… #17066 5, @bergquist 1
    + Elasticsearch: Support for visualizing logs in Explore . #17605 7, @marefr
    + Explore: Adds Live option for supported datasources. #17062 1, @hugohaggmark 3
    + Explore: Adds orgId to URL for sharing purposes. #17895 1, @kaydelaney 2
    + Explore: Adds support for new loki ‘start’ and ‘end’ params for labels endpoint. #17512, @kaydelaney 2
    + Explore: Adds support for toggling raw query mode in explore. #17870, @kaydelaney 2
    + Explore: Allow switching between metrics and logs . #16959 2, @marefr
    + Explore: Combines the timestamp and local time columns into one. #17775, @hugohaggmark 3
    + Explore: Display log lines context . #17097, @dprokop 1
    + Explore: Don’t parse log levels if provided by field or label. #17180 1, @marefr
    + Explore: Improves performance of Logs element by limiting re-rendering. #17685, @kaydelaney 2
    + Explore: Support for new LogQL filtering syntax. #16674 4, @davkal
    + Explore: Use new TimePicker from Grafana/UI. #17793, @hugohaggmark 3
    + Explore: handle newlines in LogRow Highlighter. #17425, @rrfeng 1
    + Graph: Added new fill gradient option. #17528 3, @torkelo 2
    + GraphPanel: Don’t sort series when legend table &amp; sort column is not visible . #17095, @shavonn 1
    + InfluxDB: Support for visualizing logs in Explore. #17450 9, @hugohaggmark 3
    + Logging: Login and Logout actions (#17760). #17883 1, @ATTron
    + Logging: Move log package to pkg/infra. #17023, @zhulongcheng
    + Metrics: Expose stats about roles as metrics. #17469 2, @bergquist 1
    + MySQL/Postgres/MSSQL: Add parsing for day, weeks and year intervals in macros. #13086 6, @bernardd
    + MySQL: Add support for periodically reloading client certs. #14892, @tpetr
    + Plugins: replace dataFormats list with skipDataQuery flag in plugin.json. #16984, @ryantxu
    + Prometheus: Take timezone into account for step alignment. #17477, @fxmiii
    + Prometheus: Use overridden panel range for $__range instead of dashboard range. #17352, @patrick246
    + Prometheus: added time range filter to series labels query. #16851 3, @FUSAKLA
    + Provisioning: Support folder that doesn’t exist yet in dashboard provisioning. #17407 1, @Nexucis
    + Refresh picker: Handle empty intervals. #17585 1, @dehrax
    + Singlestat: Add y min/max config to singlestat sparklines. #17527 4, @pitr
    + Snapshot: use given key and deleteKey. #16876, @zhulongcheng
    + Templating: Correctly display __text in multi-value variable after page reload. #17840 1, @EduardSergeev
    + Templating: Support selecting all filtered values of a multi-value variable. #16873 2, @r66ad
    + Tracing: allow propagation with Zipkin headers. #17009 4, @jrockway
    + Users: Disable users removed from LDAP. #16820 2, @alexanderzobnin
  * Bug Fixes
    + PanelLinks: Fix render issue when there is no panel description. #18408 3, @dehrax
    + OAuth: Fix “missing saved state” OAuth login failure due to SameSite cookie policy. #18332 1, @papagian 3
    + cli: fix for recognizing when in dev mode… #18334, @xlson
    + DataLinks: Fixes incorrect interpolation of ${__series_name} . #18251 1, @torkelo 2
    + Loki: Display live tailed logs in correct order in Explore. #18031 3, @kaydelaney 2
    + PhantomJS: Fixes rendering on Debian Buster. #18162 2, @xlson
    + TimePicker: Fixed style issue for custom range popover. #18244, @torkelo 2
    + Timerange: Fixes a bug where custom time ranges didn’t respect UTC. #18248 1, @kaydelaney 2
    + remote_cache: Fix redis connstr parsing. #18204 1, @mblaschke
    + AddPanel: Fix issue when removing moved add panel widget . #17659 2, @dehrax
    + CLI: Fix encrypt-datasource-passwords fails with sql error. #18014, @marefr
    + Elasticsearch: Fix default max concurrent shard requests. #17770 4, @marefr
    + Explore: Fix browsing back to dashboard panel. #17061, @jschill
    + Explore: Fix filter by series level in logs graph. #17798, @marefr
    + Explore: Fix issues when loading and both graph/table are collapsed. #17113, @marefr
    + Explore: Fix selection/copy of log lines. #17121, @marefr
    + Fix: Wrap value of multi variable in array when coming from URL. #16992 1, @aocenas
    + Frontend: Fix for Json tree component not working. #17608, @srid12
    + Graphite: Fix for issue with alias function being moved last. #17791, @torkelo 2
    + Graphite: Fixes issue with seriesByTag &amp; function with variable param. #17795, @torkelo 2
    + Graphite: use POST for /metrics/find requests. #17814 2, @papagian 3
    + HTTP Server: Serve Grafana with a custom URL path prefix. #17048 6, @jan25
    + InfluxDB: Fixes single quotes are not escaped in label value filters. #17398 1, @Panzki
    + Prometheus: Correctly escape ‘|’ literals in interpolated PromQL variables. #16932, @Limess
    + Prometheus: Fix when adding label for metrics which contains colons in Explore. #16760, @tolwi
    + SinglestatPanel: Remove background color when value turns null. #17552 1, @druggieri
- Make phantomjs dependency configurable
- Create plugin directory and clean up (create in %install,
  add to %files) handling of /var/lib/grafana/* and

mgr-cfg:

- Remove commented code in test files
- Replace spacewalk-usix with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)
- Add mgr manpage links

mgr-custom-info:

- Bump version to 4.1.0 (bsc#1154940)

mgr-daemon:

- Bump version to 4.1.0 (bsc#1154940)
- Fix systemd timer configuration on SLE12 (bsc#1142038)

mgr-osad:

- Separate osa-dispatcher and jabberd so it can be disabled independently
- Replace spacewalk-usix with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)
- Move /usr/share/rhn/config-defaults to uyuni-base-common
- Require uyuni-base-common for /etc/rhn (for osa-dispatcher)
- Ensure bytes type when using hashlib to avoid traceback (bsc#1138822)

mgr-push:

- Replace spacewalk-usix and spacewalk-backend-libs with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)

mgr-virtualization:

- Replace spacewalk-usix with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)
- Fix mgr-virtualization timer

rhnlib:

- Fix building
- Fix malformed XML response when data contains non-ASCII chars (bsc#1154968)
- Bump version to 4.1.0 (bsc#1154940)
- Fix bootstrapping SLE11SP4 trad client with SSL enabled (bsc#1148177)

spacecmd:

- Only report real error, not result (bsc#1171687)
- Use defined return values for spacecmd methods so scripts can
  check for failure (bsc#1171687)
- Disable globbing for api subcommand to allow wildcards in filter
  settings (bsc#1163871)
- Bugfix: attempt to purge SSM when it is empty (bsc#1155372)
- Bump version to 4.1.0 (bsc#1154940)
- Prevent error when piping stdout in Python 2 (bsc#1153090)
- Java api expects content as encoded string instead of encoded bytes like before (bsc#1153277)
- Enable building and installing for Ubuntu 16.04 and Ubuntu 18.04
- Add unit test for schedule, errata, user, utils, misc, configchannel
  and kickstart modules
- Multiple minor bugfixes alongside the unit tests
- Bugfix: referenced variable before assignment.
- Add unit test for report, package, org, repo and group

spacewalk-client-tools:

- Add workaround for uptime overflow to spacewalk-update-status as well (bsc#1165921)
- Spell correctly 'successful' and 'successfully'
- Skip dmidecode data on aarch64 to prevent coredump (bsc#1113160)
- Replace spacewalk-usix with uyuni-common-libs
- Return a non-zero exit status on errors in rhn_check
- Bump version to 4.1.0 (bsc#1154940)
- Make a explicit requirement to systemd for spacewalk-client-tools
  when rhnsd timer is installed

spacewalk-koan:

- Bump version to 4.1.0 (bsc#1154940)
- Require commands we use in merge-rd.sh

spacewalk-oscap:

- Bump version to 4.1.0 (bsc#1154940)

spacewalk-remote-utils:

- Update spacewalk-create-channel with RHEL 7.7 channel definitions
- Bump version to 4.1.0 (bsc#1154940)

supportutils-plugin-susemanager-client:

- Bump version to 4.1.0 (bsc#1154940)

suseRegisterInfo:

- SuseRegisterInfo only needs perl-base, not full perl (bsc#1168310)
- Bump version to 4.1.0 (bsc#1154940)

zypp-plugin-spacewalk:

- Prevent issue with non-ASCII characters in Python 2 systems (bsc#1172462)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-21"/>
	<updated date="2020-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1113160">SUSE bug 1113160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134195">SUSE bug 1134195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138822">SUSE bug 1138822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141661">SUSE bug 1141661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142038">SUSE bug 1142038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143913">SUSE bug 1143913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148177">SUSE bug 1148177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153090">SUSE bug 1153090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153277">SUSE bug 1153277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154940">SUSE bug 1154940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154968">SUSE bug 1154968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155372">SUSE bug 1155372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163871">SUSE bug 1163871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165921">SUSE bug 1165921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168310">SUSE bug 1168310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170231">SUSE bug 1170231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170557">SUSE bug 1170557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171687">SUSE bug 1171687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172462">SUSE bug 1172462</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10215/">CVE-2019-10215 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10215">CVE-2019-10215 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15043/">CVE-2019-15043 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15043">CVE-2019-15043 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12245/">CVE-2020-12245 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12245">CVE-2020-12245 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13379/">CVE-2020-13379 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13379">CVE-2020-13379 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555736" comment="golang-github-prometheus-node_exporter-0.18.1-1.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148890" version="1" class="patch">
	<metadata>
		<title>Security update for xrdp (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1173580" ref_url="https://bugzilla.suse.com/1173580" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-4044" ref_url="https://www.suse.com/security/cve/CVE-2020-4044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007166.html" source="SUSE-SU"/>
		<description>
This update for xrdp fixes the following issues:

- Security fixes (bsc#1173580, CVE-2020-4044):
  + Add patches:
    * xrdp-cve-2020-4044-fix-0.patch
    * xrdp-cve-2020-4044-fix-1.patch
  + Rebase SLE patch:
    * xrdp-fate318398-change-expired-password.patch
- Update patch:
  + xrdp-Allow-sessions-with-32-bpp.patch.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-21"/>
	<updated date="2020-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173580">SUSE bug 1173580</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-4044/">CVE-2020-4044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4044">CVE-2020-4044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555737" comment="xrdp-0.9.0~git.1456906198.f422461-21.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148891" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1173369" ref_url="https://bugzilla.suse.com/1173369" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15011" ref_url="https://www.suse.com/security/cve/CVE-2020-15011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007181.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2020-15011: Fixed a possible Arbitrary Content Injection via the private archive login page (bsc#1173369).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-24"/>
	<updated date="2020-07-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173369">SUSE bug 1173369</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15011/">CVE-2020-15011 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15011">CVE-2020-15011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531104" comment="mailman-2.1.17-3.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148892" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1173160" ref_url="https://bugzilla.suse.com/1173160" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007194.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-10745: Fixed an issue which parsing and packing of NBT and DNS packets containing dots could potentially have consumed excessive CPU (bsc#1173160).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10745">CVE-2020-10745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555738" comment="libdcerpc-binding0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538485" comment="libdcerpc-binding0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555739" comment="libdcerpc0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538487" comment="libdcerpc0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555740" comment="libndr-krb5pac0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538489" comment="libndr-krb5pac0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555741" comment="libndr-nbt0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538491" comment="libndr-nbt0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555742" comment="libndr-standard0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538493" comment="libndr-standard0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555743" comment="libndr0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538495" comment="libndr0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555744" comment="libnetapi0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538497" comment="libnetapi0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555745" comment="libsamba-credentials0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538499" comment="libsamba-credentials0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555746" comment="libsamba-errors0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538501" comment="libsamba-errors0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555747" comment="libsamba-hostconfig0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538503" comment="libsamba-hostconfig0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555748" comment="libsamba-passdb0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538505" comment="libsamba-passdb0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555749" comment="libsamba-util0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538507" comment="libsamba-util0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555750" comment="libsamdb0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538509" comment="libsamdb0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555751" comment="libsmbclient0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538511" comment="libsmbclient0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555752" comment="libsmbconf0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538513" comment="libsmbconf0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555753" comment="libsmbldap0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538515" comment="libsmbldap0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555754" comment="libtevent-util0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538517" comment="libtevent-util0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555755" comment="libwbclient0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538519" comment="libwbclient0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555756" comment="samba-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555757" comment="samba-client-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538522" comment="samba-client-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538523" comment="samba-doc-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555758" comment="samba-libs-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538525" comment="samba-libs-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555759" comment="samba-winbind-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538527" comment="samba-winbind-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148893" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1173998" ref_url="https://bugzilla.suse.com/1173998" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9806" ref_url="https://www.suse.com/security/cve/CVE-2020-9806/" source="CVE"/>
		<reference ref_id="CVE-2020-9807" ref_url="https://www.suse.com/security/cve/CVE-2020-9807/" source="CVE"/>
		<reference ref_id="CVE-2020-9843" ref_url="https://www.suse.com/security/cve/CVE-2020-9843/" source="CVE"/>
		<reference ref_id="CVE-2020-9850" ref_url="https://www.suse.com/security/cve/CVE-2020-9850/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.3 (bsc#1173998):
  + Enable kinetic scrolling with async scrolling.
  + Fix web process hangs on large GitHub pages.
  + Bubblewrap sandbox should not attempt to bind empty paths.
  + Fix threading issues in the media player.
  + Fix several crashes and rendering issues.
  + Security fixes:  CVE-2020-9802, CVE-2020-9803, CVE-2020-9805,
    CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850,
    CVE-2020-13753.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13753">CVE-2020-13753 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9802">CVE-2020-9802 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9803">CVE-2020-9803 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9805">CVE-2020-9805 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9806/">CVE-2020-9806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9806">CVE-2020-9806 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9807/">CVE-2020-9807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9807">CVE-2020-9807 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9843/">CVE-2020-9843 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9843">CVE-2020-9843 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9850/">CVE-2020-9850 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9850">CVE-2020-9850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531105" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531106" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531108" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531109" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531110" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531111" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148894" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1084632" ref_url="https://bugzilla.suse.com/1084632" source="BUGZILLA"/>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1173812" ref_url="https://bugzilla.suse.com/1173812" source="BUGZILLA"/>
		<reference ref_id="1174463" ref_url="https://bugzilla.suse.com/1174463" source="BUGZILLA"/>
		<reference ref_id="1174570" ref_url="https://bugzilla.suse.com/1174570" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308/" source="CVE"/>
		<reference ref_id="CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309/" source="CVE"/>
		<reference ref_id="CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310/" source="CVE"/>
		<reference ref_id="CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311/" source="CVE"/>
		<reference ref_id="CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706/" source="CVE"/>
		<reference ref_id="CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- Fix for CVE-2020-10713 (bsc#1168994)
- Fix for CVE-2020-14308 CVE-2020-14309, CVE-2020-14310, CVE-2020-14311
  (bsc#1173812)
- Fix for CVE-2020-15706 (bsc#1174463)
- Fix for CVE-2020-15707 (bsc#1174570)

- Use overflow checking primitives where the arithmetic expression for buffer
  allocations may include unvalidated data
- Use grub_calloc for overflow check and return NULL when it would occur 
- Use gcc-9 compiler for overflow check builtins
- Backport gcc-9 build fixes
- Fix packed-not-aligned error on GCC 8 (bsc#1084632)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1084632">SUSE bug 1084632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174463">SUSE bug 1174463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174570">SUSE bug 1174570</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14308">CVE-2020-14308 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14309">CVE-2020-14309 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14310">CVE-2020-14310 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14311">CVE-2020-14311 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15706">CVE-2020-15706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15707">CVE-2020-15707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555760" comment="grub2-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538529" comment="grub2-i386-pc-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538531" comment="grub2-snapper-plugin-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538532" comment="grub2-systemd-sleep-plugin-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538533" comment="grub2-x86_64-efi-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538534" comment="grub2-x86_64-xen-2.02-4.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148895" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1174415" ref_url="https://bugzilla.suse.com/1174415" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15900" ref_url="https://www.suse.com/security/cve/CVE-2020-15900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007204.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- fixed CVE-2020-15900 Memory Corruption (SAFER Sandbox Breakout)
  cf. https://bugs.ghostscript.com/show_bug.cgi?id=702582
  (bsc#1174415)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-30"/>
	<updated date="2020-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174415">SUSE bug 1174415</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15900/">CVE-2020-15900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15900">CVE-2020-15900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531119" comment="ghostscript-9.52-23.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531120" comment="ghostscript-x11-9.52-23.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148896" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1173948" ref_url="https://bugzilla.suse.com/1173948" source="BUGZILLA"/>
		<reference ref_id="1174538" ref_url="https://bugzilla.suse.com/1174538" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.1.0 ESR
  * Fixed: Various stability, functionality, and security fixes (bsc#1174538)
  * CVE-2020-15652: Potential leak of redirect targets when loading scripts in a worker
  * CVE-2020-6514: WebRTC data channel leaks internal address to peer
  * CVE-2020-15655: Extension APIs could be used to bypass Same-Origin Policy
  * CVE-2020-15653: Bypassing iframe sandbox when allowing popups
  * CVE-2020-6463: Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture
  * CVE-2020-15656: Type confusion for special arguments in IonMonkey
  * CVE-2020-15658: Overriding file type when saving to disk
  * CVE-2020-15657: DLL hijacking due to incorrect loading path
  * CVE-2020-15654: Custom cursor can overlay user interface
  * CVE-2020-15659: Memory safety bugs fixed in Firefox 79 and Firefox ESR 78.1
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-31"/>
	<updated date="2020-07-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173948">SUSE bug 1173948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15652">CVE-2020-15652 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15653">CVE-2020-15653 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15654">CVE-2020-15654 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15655">CVE-2020-15655 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15656">CVE-2020-15656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15657">CVE-2020-15657 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15658">CVE-2020-15658 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15659">CVE-2020-15659 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6463">CVE-2020-6463 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6514">CVE-2020-6514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531121" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531122" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531123" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148897" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007222.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-04"/>
	<updated date="2020-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531124" comment="libX11-6-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531125" comment="libX11-6-32bit-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531126" comment="libX11-data-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531127" comment="libX11-xcb1-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531128" comment="libX11-xcb1-32bit-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531129" comment="libxcb-dri2-0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531130" comment="libxcb-dri2-0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531131" comment="libxcb-dri3-0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531132" comment="libxcb-dri3-0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531133" comment="libxcb-glx0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531134" comment="libxcb-glx0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531135" comment="libxcb-present0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531136" comment="libxcb-present0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531137" comment="libxcb-randr0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531138" comment="libxcb-render0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531139" comment="libxcb-render0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531140" comment="libxcb-shape0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531141" comment="libxcb-shm0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531142" comment="libxcb-shm0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531143" comment="libxcb-sync1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531144" comment="libxcb-sync1-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531145" comment="libxcb-xf86dri0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531146" comment="libxcb-xfixes0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531147" comment="libxcb-xfixes0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531148" comment="libxcb-xinerama0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531149" comment="libxcb-xkb1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531150" comment="libxcb-xkb1-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531151" comment="libxcb-xv0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531152" comment="libxcb1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531153" comment="libxcb1-32bit-1.10-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148898" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionview-4_2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1173144" ref_url="https://bugzilla.suse.com/1173144" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8163" ref_url="https://www.suse.com/security/cve/CVE-2020-8163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007231.html" source="SUSE-SU"/>
		<description>
This update for rubygem-actionview-4_2 fixes the following issues:

- Fixed a potential remote code execution of user-provided local names (bsc#1173144, CVE-2020-8163).
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173144">SUSE bug 1173144</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8163/">CVE-2020-8163 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8163">CVE-2020-8163 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597682" comment="ruby2.1-rubygem-actionview-4_2-4.2.9-9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597683" comment="ruby2.1-rubygem-activesupport-4_2-4.2.9-7.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148899" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1146351" ref_url="https://bugzilla.suse.com/1146351" source="BUGZILLA"/>
		<reference ref_id="1149652" ref_url="https://bugzilla.suse.com/1149652" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1162002" ref_url="https://bugzilla.suse.com/1162002" source="BUGZILLA"/>
		<reference ref_id="1164910" ref_url="https://bugzilla.suse.com/1164910" source="BUGZILLA"/>
		<reference ref_id="1170011" ref_url="https://bugzilla.suse.com/1170011" source="BUGZILLA"/>
		<reference ref_id="1170618" ref_url="https://bugzilla.suse.com/1170618" source="BUGZILLA"/>
		<reference ref_id="1171078" ref_url="https://bugzilla.suse.com/1171078" source="BUGZILLA"/>
		<reference ref_id="1171189" ref_url="https://bugzilla.suse.com/1171189" source="BUGZILLA"/>
		<reference ref_id="1171191" ref_url="https://bugzilla.suse.com/1171191" source="BUGZILLA"/>
		<reference ref_id="1171220" ref_url="https://bugzilla.suse.com/1171220" source="BUGZILLA"/>
		<reference ref_id="1171732" ref_url="https://bugzilla.suse.com/1171732" source="BUGZILLA"/>
		<reference ref_id="1171988" ref_url="https://bugzilla.suse.com/1171988" source="BUGZILLA"/>
		<reference ref_id="1172453" ref_url="https://bugzilla.suse.com/1172453" source="BUGZILLA"/>
		<reference ref_id="1172458" ref_url="https://bugzilla.suse.com/1172458" source="BUGZILLA"/>
		<reference ref_id="1172775" ref_url="https://bugzilla.suse.com/1172775" source="BUGZILLA"/>
		<reference ref_id="1172999" ref_url="https://bugzilla.suse.com/1172999" source="BUGZILLA"/>
		<reference ref_id="1173280" ref_url="https://bugzilla.suse.com/1173280" source="BUGZILLA"/>
		<reference ref_id="1173658" ref_url="https://bugzilla.suse.com/1173658" source="BUGZILLA"/>
		<reference ref_id="1174115" ref_url="https://bugzilla.suse.com/1174115" source="BUGZILLA"/>
		<reference ref_id="1174462" ref_url="https://bugzilla.suse.com/1174462" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810/" source="CVE"/>
		<reference ref_id="CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135/" source="CVE"/>
		<reference ref_id="CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).
- CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).
- CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).
- CVE-2020-10732: A flaw was found in the implementation of userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed  (bnc#1172999).
- CVE-2020-14416: A race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. (bnc#1172775).
- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).

The following non-security bugs were fixed:

- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170618).
- ibmvnic: Do not process device remove during device reset (bsc#1065729).
- ibmvnic: Do not process reset during or after device removal (bsc#1149652 ltc#179635).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).
- ibmvnic: Unmap DMA address of TX descriptor buffers after use (bsc#1146351 ltc#180726).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1164910).
- net/ibmvnic: Fix missing { in __ibmvnic_reset (bsc#1149652 ltc#179635).
- net/ibmvnic: free reset work of removed device from queue (bsc#1149652 ltc#179635).
- net/ibmvnic: prevent more than one thread from running in reset (bsc#1152457 ltc#174432).
- net/ibmvnic: unlock rtnl_lock in reset so linkwatch_event can run (bsc#1152457 ltc#174432).
- udp: drop corrupt packets earlier to avoid data corruption (bsc#1173658).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146351">SUSE bug 1146351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149652">SUSE bug 1149652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164910">SUSE bug 1164910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170011">SUSE bug 1170011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170618">SUSE bug 1170618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171078">SUSE bug 1171078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171189">SUSE bug 1171189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171191">SUSE bug 1171191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171732">SUSE bug 1171732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171988">SUSE bug 1171988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172453">SUSE bug 1172453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172458">SUSE bug 1172458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173280">SUSE bug 1173280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173658">SUSE bug 1173658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174115">SUSE bug 1174115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20810">CVE-2019-20810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20812">CVE-2019-20812 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0305">CVE-2020-0305 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10135">CVE-2020-10135 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10711">CVE-2020-10711 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10732">CVE-2020-10732 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10751">CVE-2020-10751 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10773">CVE-2020-10773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12771">CVE-2020-12771 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13974">CVE-2020-13974 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14416">CVE-2020-14416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555761" comment="kernel-default-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555762" comment="kernel-default-base-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555763" comment="kernel-default-devel-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556413" comment="kernel-default-kgraft-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538541" comment="kernel-devel-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538542" comment="kernel-macros-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538543" comment="kernel-source-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555764" comment="kernel-syms-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556415" comment="kgraft-patch-4_4_180-94_127-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148900" version="1" class="patch">
	<metadata>
		<title>Security update for python-ipaddress (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007239.html" source="SUSE-SU"/>
		<description>
This update for python-ipaddress fixes the following issues:

- Add CVE-2020-14422-ipaddress-hash-collision.patch fixing
  CVE-2020-14422 (bsc#1173274, bpo#41004), where hash collisions
  in IPv4Interface and IPv6Interface could lead to DOS. 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14422">CVE-2020-14422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531162" comment="python-ipaddress-1.0.18-3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148901" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1173477" ref_url="https://bugzilla.suse.com/1173477" source="BUGZILLA"/>
		<reference ref_id="1173691" ref_url="https://bugzilla.suse.com/1173691" source="BUGZILLA"/>
		<reference ref_id="1173694" ref_url="https://bugzilla.suse.com/1173694" source="BUGZILLA"/>
		<reference ref_id="1173700" ref_url="https://bugzilla.suse.com/1173700" source="BUGZILLA"/>
		<reference ref_id="1173701" ref_url="https://bugzilla.suse.com/1173701" source="BUGZILLA"/>
		<reference ref_id="1173743" ref_url="https://bugzilla.suse.com/1173743" source="BUGZILLA"/>
		<reference ref_id="1173874" ref_url="https://bugzilla.suse.com/1173874" source="BUGZILLA"/>
		<reference ref_id="1173875" ref_url="https://bugzilla.suse.com/1173875" source="BUGZILLA"/>
		<reference ref_id="1173876" ref_url="https://bugzilla.suse.com/1173876" source="BUGZILLA"/>
		<reference ref_id="1173880" ref_url="https://bugzilla.suse.com/1173880" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922/" source="CVE"/>
		<reference ref_id="CVE-2018-21247" ref_url="https://www.suse.com/security/cve/CVE-2018-21247/" source="CVE"/>
		<reference ref_id="CVE-2019-20839" ref_url="https://www.suse.com/security/cve/CVE-2019-20839/" source="CVE"/>
		<reference ref_id="CVE-2019-20840" ref_url="https://www.suse.com/security/cve/CVE-2019-20840/" source="CVE"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398/" source="CVE"/>
		<reference ref_id="CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399/" source="CVE"/>
		<reference ref_id="CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400/" source="CVE"/>
		<reference ref_id="CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401/" source="CVE"/>
		<reference ref_id="CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402/" source="CVE"/>
		<reference ref_id="CVE-2020-14403" ref_url="https://www.suse.com/security/cve/CVE-2020-14403/" source="CVE"/>
		<reference ref_id="CVE-2020-14404" ref_url="https://www.suse.com/security/cve/CVE-2020-14404/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- security update
  fix CVE-2018-21247 [bsc#1173874], uninitialized memory contents are vulnerable to Information leak
  fix CVE-2019-20839 [bsc#1173875], buffer overflow in ConnectClientToUnixSock()
  fix CVE-2019-20840 [bsc#1173876], unaligned accesses in hybiReadAndDecode can lead to denial of service
  fix CVE-2020-14398 [bsc#1173880], improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c
  fix CVE-2020-14397 [bsc#1173700], NULL pointer dereference in libvncserver/rfbregion.c
  fix CVE-2020-14399 [bsc#1173743], Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c.
  fix CVE-2020-14400 [bsc#1173691], Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c.
  fix CVE-2020-14401 [bsc#1173694], potential integer overflows in libvncserver/scale.c
  fix CVE-2020-14402 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2020-14403 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2020-14404 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2017-18922 [bsc#1173477], preauth buffer overwrite
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-07"/>
	<updated date="2020-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173691">SUSE bug 1173691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173694">SUSE bug 1173694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173700">SUSE bug 1173700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173743">SUSE bug 1173743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173874">SUSE bug 1173874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173875">SUSE bug 1173875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173876">SUSE bug 1173876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173880">SUSE bug 1173880</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18922">CVE-2017-18922 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-21247/">CVE-2018-21247 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21247">CVE-2018-21247 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20839/">CVE-2019-20839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20839">CVE-2019-20839 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20840/">CVE-2019-20840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20840">CVE-2019-20840 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14397">CVE-2020-14397 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14398">CVE-2020-14398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14399">CVE-2020-14399 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14400">CVE-2020-14400 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14401">CVE-2020-14401 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14402">CVE-2020-14402 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14403/">CVE-2020-14403 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14403">CVE-2020-14403 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14404/">CVE-2020-14404 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14404">CVE-2020-14404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531163" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531164" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148902" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007243.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1174543 - secure boot related fixes
- bsc#1163019 - CVE-2020-8608: Potential OOB access due to unsafe snprintf() usages
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-07"/>
	<updated date="2020-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538546" comment="xen-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538547" comment="xen-doc-html-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538548" comment="xen-libs-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538549" comment="xen-libs-32bit-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538550" comment="xen-tools-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538551" comment="xen-tools-domU-4.9.4_10-3.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148903" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1156146" ref_url="https://bugzilla.suse.com/1156146" source="BUGZILLA"/>
		<reference ref_id="1171477" ref_url="https://bugzilla.suse.com/1171477" source="BUGZILLA"/>
		<reference ref_id="1171930" ref_url="https://bugzilla.suse.com/1171930" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14818" ref_url="https://www.suse.com/security/cve/CVE-2019-14818/" source="CVE"/>
		<reference ref_id="CVE-2020-10722" ref_url="https://www.suse.com/security/cve/CVE-2020-10722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007254.html" source="SUSE-SU"/>
		<description>
This update for dpdk to version 16.11.9 following issue:

- CVE-2019-14818: Fixed a memory leak vulnerability caused by a malicious container may lead to to denial of service (bsc#1156146).
- CVE-2020-12693: Fixed an authentication bypass via an alternate path or channel (boo#1172004).

- rebuilt with new signing key. (bsc#1174543)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156146">SUSE bug 1156146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171477">SUSE bug 1171477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171930">SUSE bug 1171930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14818/">CVE-2019-14818 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14818">CVE-2019-14818 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10722/">CVE-2020-10722 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10722">CVE-2020-10722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555765" comment="dpdk-16.11.9-8.15.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538553" comment="dpdk-kmp-default-16.11.9_k4.4.180_94.127-8.15.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555766" comment="dpdk-tools-16.11.9-8.15.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148904" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007253.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531165" comment="libX11-6-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531166" comment="libX11-6-32bit-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531167" comment="libX11-data-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531168" comment="libX11-xcb1-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531169" comment="libX11-xcb1-32bit-1.6.2-12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148905" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1174662" ref_url="https://bugzilla.suse.com/1174662" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-9862" ref_url="https://www.suse.com/security/cve/CVE-2020-9862/" source="CVE"/>
		<reference ref_id="CVE-2020-9893" ref_url="https://www.suse.com/security/cve/CVE-2020-9893/" source="CVE"/>
		<reference ref_id="CVE-2020-9894" ref_url="https://www.suse.com/security/cve/CVE-2020-9894/" source="CVE"/>
		<reference ref_id="CVE-2020-9895" ref_url="https://www.suse.com/security/cve/CVE-2020-9895/" source="CVE"/>
		<reference ref_id="CVE-2020-9915" ref_url="https://www.suse.com/security/cve/CVE-2020-9915/" source="CVE"/>
		<reference ref_id="CVE-2020-9925" ref_url="https://www.suse.com/security/cve/CVE-2020-9925/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.4 (bsc#1174662):
  + Fix several crashes and rendering issues.
  + Security fixes: CVE-2020-9862, CVE-2020-9893, CVE-2020-9894,
    CVE-2020-9895, CVE-2020-9915, CVE-2020-9925.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9862/">CVE-2020-9862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9862">CVE-2020-9862 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9893/">CVE-2020-9893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9893">CVE-2020-9893 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9894/">CVE-2020-9894 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9894">CVE-2020-9894 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9895/">CVE-2020-9895 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9895">CVE-2020-9895 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9915/">CVE-2020-9915 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9915">CVE-2020-9915 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9925/">CVE-2020-9925 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9925">CVE-2020-9925 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531172" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531173" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531175" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531176" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531177" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531178" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148906" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1174922" ref_url="https://bugzilla.suse.com/1174922" source="BUGZILLA"/>
		<reference ref_id="1174923" ref_url="https://bugzilla.suse.com/1174923" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12673" ref_url="https://www.suse.com/security/cve/CVE-2020-12673/" source="CVE"/>
		<reference ref_id="CVE-2020-12674" ref_url="https://www.suse.com/security/cve/CVE-2020-12674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007281.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2020-12673: improper implementation of NTLM does not check message buffer size (bsc#1174922).
- CVE-2020-12674: improper implementation of RPA mechanism (bsc#1174923).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-19"/>
	<updated date="2020-08-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174922">SUSE bug 1174922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174923">SUSE bug 1174923</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12673/">CVE-2020-12673 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12673">CVE-2020-12673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12674/">CVE-2020-12674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12674">CVE-2020-12674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531186" comment="dovecot22-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531187" comment="dovecot22-backend-mysql-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531188" comment="dovecot22-backend-pgsql-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531189" comment="dovecot22-backend-sqlite-2.2.31-19.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148907" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1172745" ref_url="https://bugzilla.suse.com/1172745" source="BUGZILLA"/>
		<reference ref_id="1174421" ref_url="https://bugzilla.suse.com/1174421" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007290.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- CVE-2020-15705: Fail kernel validation without shim protocol (bsc#1174421).
- Add fibre channel device's ofpath support to grub-ofpathname and search hint to speed up root device discovery (bsc#1172745).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172745">SUSE bug 1172745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174421">SUSE bug 1174421</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15705">CVE-2020-15705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555767" comment="grub2-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538556" comment="grub2-i386-pc-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538558" comment="grub2-snapper-plugin-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538559" comment="grub2-systemd-sleep-plugin-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538560" comment="grub2-x86_64-efi-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538561" comment="grub2-x86_64-xen-2.02-4.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148908" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1160888" ref_url="https://bugzilla.suse.com/1160888" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14907" ref_url="https://www.suse.com/security/cve/CVE-2019-14907/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006407.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2019-14907: Fixed a Server-side crash after charset conversion failure during NTLMSSP processing (bsc#1160888).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-24"/>
	<updated date="2020-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1160888">SUSE bug 1160888</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14907/">CVE-2019-14907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14907">CVE-2019-14907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522551" comment="libdcerpc-binding0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522552" comment="libdcerpc-binding0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522553" comment="libdcerpc0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522554" comment="libdcerpc0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522555" comment="libndr-krb5pac0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522556" comment="libndr-krb5pac0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522557" comment="libndr-nbt0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522558" comment="libndr-nbt0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522559" comment="libndr-standard0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522560" comment="libndr-standard0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522561" comment="libndr0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522562" comment="libndr0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522563" comment="libnetapi0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522564" comment="libnetapi0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522565" comment="libsamba-credentials0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522566" comment="libsamba-credentials0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522567" comment="libsamba-errors0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522568" comment="libsamba-errors0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522569" comment="libsamba-hostconfig0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522570" comment="libsamba-hostconfig0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522571" comment="libsamba-passdb0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522572" comment="libsamba-passdb0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522573" comment="libsamba-util0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522574" comment="libsamba-util0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522575" comment="libsamdb0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522576" comment="libsamdb0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522577" comment="libsmbclient0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522578" comment="libsmbclient0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522579" comment="libsmbconf0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522580" comment="libsmbconf0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522581" comment="libsmbldap0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522582" comment="libsmbldap0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522583" comment="libtevent-util0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522584" comment="libtevent-util0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522585" comment="libwbclient0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522586" comment="libwbclient0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522587" comment="samba-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522588" comment="samba-client-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522589" comment="samba-client-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522590" comment="samba-doc-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522591" comment="samba-libs-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522592" comment="samba-libs-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522593" comment="samba-winbind-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522594" comment="samba-winbind-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148909" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1174633" ref_url="https://bugzilla.suse.com/1174633" source="BUGZILLA"/>
		<reference ref_id="1174635" ref_url="https://bugzilla.suse.com/1174635" source="BUGZILLA"/>
		<reference ref_id="1174638" ref_url="https://bugzilla.suse.com/1174638" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14346" ref_url="https://www.suse.com/security/cve/CVE-2020-14346/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007305.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14347: Leak of uninitialized heap memory from the X server to clients on pixmap allocation (bsc#1174633, ZDI-CAN-11426).
- CVE-2020-14346: XIChangeHierarchy Integer Underflow Privilege Escalation Vulnerability (bsc#1174638, ZDI-CAN-11429).
- CVE-2020-14345: XKB out-of-bounds access privilege escalation vulnerability (bsc#1174635, ZDI-CAN-11428).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-26"/>
	<updated date="2020-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14345">CVE-2020-14345 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14346/">CVE-2020-14346 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14346">CVE-2020-14346 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14347">CVE-2020-14347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531240" comment="xorg-x11-server-7.6_1.18.3-76.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531241" comment="xorg-x11-server-extra-7.6_1.18.3-76.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148910" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17631" ref_url="https://www.suse.com/security/cve/CVE-2019-17631/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2996" ref_url="https://www.suse.com/security/cve/CVE-2019-2996/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2958
    CVE-2019-2962 CVE-2019-2964 CVE-2019-2975
    CVE-2019-2978 CVE-2019-2983 CVE-2019-2988
    CVE-2019-2989 CVE-2019-2992 CVE-2019-2996
    CVE-2019-2999 CVE-2019-2973 CVE-2019-2981
    CVE-2019-17631
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17631/">CVE-2019-17631 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17631">CVE-2019-17631 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2958">CVE-2019-2958 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2975">CVE-2019-2975 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2996/">CVE-2019-2996 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2996">CVE-2019-2996 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148911" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1174910" ref_url="https://bugzilla.suse.com/1174910" source="BUGZILLA"/>
		<reference ref_id="1174913" ref_url="https://bugzilla.suse.com/1174913" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007319.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14361: Fix XkbSelectEvents() integer underflow (bsc#1174910 ZDI-CAN-11573).
- CVE-2020-14362: Fix XRecordRegisterClients() Integer underflow (bsc#1174913 ZDI-CAN-11574).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-01"/>
	<updated date="2020-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14361">CVE-2020-14361 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14362">CVE-2020-14362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531257" comment="xorg-x11-server-7.6_1.18.3-76.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531258" comment="xorg-x11-server-extra-7.6_1.18.3-76.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148912" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1175070" ref_url="https://bugzilla.suse.com/1175070" source="BUGZILLA"/>
		<reference ref_id="1175071" ref_url="https://bugzilla.suse.com/1175071" source="BUGZILLA"/>
		<reference ref_id="1175072" ref_url="https://bugzilla.suse.com/1175072" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11985" ref_url="https://www.suse.com/security/cve/CVE-2020-11985/" source="CVE"/>
		<reference ref_id="CVE-2020-11993" ref_url="https://www.suse.com/security/cve/CVE-2020-11993/" source="CVE"/>
		<reference ref_id="CVE-2020-9490" ref_url="https://www.suse.com/security/cve/CVE-2020-9490/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007331.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-9490: Fixed a crash caused by a specially crafted value for the 'Cache-Digest' header in a HTTP/2 request (bsc#1175071).
- CVE-2020-11985: IP address spoofing when proxying using mod_remoteip and mod_rewrite (bsc#1175072).
- CVE-2020-11993: When trace/debug was enabled for the HTTP/2 module logging statements were made on the wrong connection (bsc#1175070).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175070">SUSE bug 1175070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175071">SUSE bug 1175071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175072">SUSE bug 1175072</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11985/">CVE-2020-11985 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11985">CVE-2020-11985 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11993/">CVE-2020-11993 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11993">CVE-2020-11993 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-9490/">CVE-2020-9490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9490">CVE-2020-9490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531259" comment="apache2-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531260" comment="apache2-doc-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531261" comment="apache2-example-pages-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531262" comment="apache2-prefork-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531263" comment="apache2-utils-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531264" comment="apache2-worker-2.4.23-29.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148913" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 15 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14581
  CVE-2020-14556 CVE-2020-14621 CVE-2020-14593 CVE-2020-14583
  CVE-2019-17639
  * Class Libraries:
    - JAVA.UTIL.ZIP.DEFLATER OPERATIONS THROW JAVA.LANG.INTERNALERROR
    - JAVA 8 DECODER OBJECTS CONSUME A LARGE AMOUNT OF JAVA HEAP
    - TRANSLATION MESSAGES UPDATE FOR JCL
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Java Virtual Machine:
    - IBM JAVA REGISTERS A HANDLER BY DEFAULT FOR SIGABRT
    - LARGE MEMORY FOOTPRINT HELD BY TRACECONTEXT OBJECT
  * JIT Compiler:
    - CRASH IN THE INTERPRETER AFTER OSR FROM INLINED SYNCHRONIZED METHOD
      IN DEBUGGING MODE
    - INTERMITTENT ASSERTION FAILURE REPORTED
    - CRASH IN RESOLVECLASSREF() DURING AOT LOAD
    - JIT CRASH DURING CLASS UNLOADING IN J9METHOD_HT::ONCLASSUNLOADING()
    - SEGMENTATION FAULT WHILE COMPILING A METHOD
    - UNEXPECTED CLASSCASTEXCEPTION THROWN IN HIGH LEVEL PARALLEL
      APPLICATION ON IBM Z PLATFORM
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
    - CHANGES TO IBMJCE AND IBMJCEPLUS PROVIDERS
    - IBMJCEPLUS FAILS, WHEN THE SECURITY MANAGER IS ENABLED, WITH
      DEFAULT PERMISSIONS, SPECIFIED IN JAVA.POLICY FILE
    - IN CERTAIN INSTANCES, IBMJCEPLUS PROVIDER THROWS EXCEPTION FROM
      KEYFACTORY CLASS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17639">CVE-2019-17639 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531265" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531267" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148914" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs6 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1159352" ref_url="https://bugzilla.suse.com/1159352" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16775" ref_url="https://www.suse.com/security/cve/CVE-2019-16775/" source="CVE"/>
		<reference ref_id="CVE-2019-16776" ref_url="https://www.suse.com/security/cve/CVE-2019-16776/" source="CVE"/>
		<reference ref_id="CVE-2019-16777" ref_url="https://www.suse.com/security/cve/CVE-2019-16777/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006408.html" source="SUSE-SU"/>
		<description>
This update for nodejs6 to version 6.17.1 fixes the following issues:

Security issues fixed:

- CVE-2019-16777, CVE-2019-16776, CVE-2019-16775: Updated npm to 6.13.4, fixing
    an arbitrary path overwrite and access via 'bin' field (bsc#1159352).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-28"/>
	<updated date="2020-01-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159352">SUSE bug 1159352</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16775/">CVE-2019-16775 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16775">CVE-2019-16775 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16776/">CVE-2019-16776 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16776">CVE-2019-16776 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16777/">CVE-2019-16777 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16777">CVE-2019-16777 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597684" comment="nodejs6-6.17.1-11.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148915" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="1175665" ref_url="https://bugzilla.suse.com/1175665" source="BUGZILLA"/>
		<reference ref_id="1175671" ref_url="https://bugzilla.suse.com/1175671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811/" source="CVE"/>
		<reference ref_id="CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007341.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-24606: Fix livelocking in peerDigestHandleReply (bsc#1175671).
- CVE-2020-15811: Improve Transfer-Encoding handling (bsc#1175665).
- CVE-2020-15810: Enforce token characters for field-name (bsc#1175664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175665">SUSE bug 1175665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175671">SUSE bug 1175671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15810">CVE-2020-15810 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15811">CVE-2020-15811 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24606">CVE-2020-24606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531269" comment="squid-3.5.21-26.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148916" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1175239" ref_url="https://bugzilla.suse.com/1175239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2475-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007895.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- CVE-2020-14363: Fix an integer overflow in init_om() (bsc#1175239).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175239">SUSE bug 1175239</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14363">CVE-2020-14363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531270" comment="libX11-6-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531271" comment="libX11-6-32bit-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531272" comment="libX11-data-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531273" comment="libX11-xcb1-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531274" comment="libX11-xcb1-32bit-1.6.2-12.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148917" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 70 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14621
  CVE-2020-14593 CVE-2020-14583 CVE-2019-17639
  * Class Libraries:
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17639">CVE-2019-17639 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531275" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531277" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531278" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148918" version="1" class="patch">
	<metadata>
		<title>Security update for aws-cli (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1092493" ref_url="https://bugzilla.suse.com/1092493" source="BUGZILLA"/>
		<reference ref_id="1105988" ref_url="https://bugzilla.suse.com/1105988" source="BUGZILLA"/>
		<reference ref_id="1118021" ref_url="https://bugzilla.suse.com/1118021" source="BUGZILLA"/>
		<reference ref_id="1118024" ref_url="https://bugzilla.suse.com/1118024" source="BUGZILLA"/>
		<reference ref_id="1118099" ref_url="https://bugzilla.suse.com/1118099" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15869" ref_url="https://www.suse.com/security/cve/CVE-2018-15869/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006409.html" source="SUSE-SU"/>
		<description>
This update for aws-cli to version 1.16.297 fixes the following issues:

Security issue fixed:

- CVE-2018-15869: Fixed an permission handling issue where an unexpected AMI could potentially be used (bsc#1105988).

Non-security issues fixed:

- Fixed an issue with the CLI client, where a ModuleNotFoundError was triggered (bsc#1092493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-28"/>
	<updated date="2020-01-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092493">SUSE bug 1092493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105988">SUSE bug 1105988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118021">SUSE bug 1118021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118024">SUSE bug 1118024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118099">SUSE bug 1118099</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15869/">CVE-2018-15869 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15869">CVE-2018-15869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525274" comment="aws-cli-1.16.297-22.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148919" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1173991" ref_url="https://bugzilla.suse.com/1173991" source="BUGZILLA"/>
		<reference ref_id="1174284" ref_url="https://bugzilla.suse.com/1174284" source="BUGZILLA"/>
		<reference ref_id="1175686" ref_url="https://bugzilla.suse.com/1175686" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007373.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.2.0 ESR
  * Fixed: Various stability, functionality, and security fixes
- Mozilla Firefox ESR 78.2
  MFSA 2020-38 (bsc#1175686)
  * CVE-2020-15663 (bmo#1643199)
    Downgrade attack on the Mozilla Maintenance Service could
    have resulted in escalation of privilege
  * CVE-2020-15664 (bmo#1658214)
    Attacker-induced prompt for extension installation
  * CVE-2020-15670 (bmo#1651001, bmo#1651449, bmo#1653626,
    bmo#1656957)
    Memory safety bugs fixed in Firefox 80 and Firefox ESR 78.2

- Fixed Firefox tab crash in FIPS mode (bsc#1174284).

- Fix broken translation-loading. (bsc#1173991) 
  * allow addon sideloading
  * mark signatures for langpacks non-mandatory
  * do not autodisable user profile scopes
- Google API key is not usable for geolocation service any more
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173991">SUSE bug 1173991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174284">SUSE bug 1174284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15663">CVE-2020-15663 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15664">CVE-2020-15664 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15670">CVE-2020-15670 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531280" comment="MozillaFirefox-78.2.0-112.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531281" comment="MozillaFirefox-devel-78.2.0-112.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531282" comment="MozillaFirefox-translations-common-78.2.0-112.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148920" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1152107" ref_url="https://bugzilla.suse.com/1152107" source="BUGZILLA"/>
		<reference ref_id="1173798" ref_url="https://bugzilla.suse.com/1173798" source="BUGZILLA"/>
		<reference ref_id="1174205" ref_url="https://bugzilla.suse.com/1174205" source="BUGZILLA"/>
		<reference ref_id="1174757" ref_url="https://bugzilla.suse.com/1174757" source="BUGZILLA"/>
		<reference ref_id="1174771" ref_url="https://bugzilla.suse.com/1174771" source="BUGZILLA"/>
		<reference ref_id="1175112" ref_url="https://bugzilla.suse.com/1175112" source="BUGZILLA"/>
		<reference ref_id="1175127" ref_url="https://bugzilla.suse.com/1175127" source="BUGZILLA"/>
		<reference ref_id="1175228" ref_url="https://bugzilla.suse.com/1175228" source="BUGZILLA"/>
		<reference ref_id="1175691" ref_url="https://bugzilla.suse.com/1175691" source="BUGZILLA"/>
		<reference ref_id="1176069" ref_url="https://bugzilla.suse.com/1176069" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).
- CVE-2019-16746: Fixed an improper check of the length of variable elements in a beacon head, leading to a buffer overflow (bsc#1152107).
- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).

The following non-security bugs were fixed:

- bonding: fix active-backup failover for current ARP slave (bsc#1174771).
- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1175691).
- ocfs2: add trimfs dlm lock resource (bsc#1175228).
- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).
- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-09"/>
	<updated date="2020-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152107">SUSE bug 1152107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173798">SUSE bug 1173798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174757">SUSE bug 1174757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174771">SUSE bug 1174771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175112">SUSE bug 1175112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175127">SUSE bug 1175127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175228">SUSE bug 1175228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175691">SUSE bug 1175691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14314">CVE-2020-14314 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16166">CVE-2020-16166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555768" comment="kernel-default-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555769" comment="kernel-default-base-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555770" comment="kernel-default-devel-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556480" comment="kernel-default-kgraft-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538595" comment="kernel-devel-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538596" comment="kernel-macros-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538597" comment="kernel-source-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555771" comment="kernel-syms-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556482" comment="kgraft-patch-4_4_180-94_130-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148921" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update java-1_8_0-openjdk to version jdk8u242 (icedtea 3.15.0) (January 2020 CPU, bsc#1160968):

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2020-2590: Improve Kerberos interop capabilities
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2601: Better Ticket Granting Services
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support
- CVE-2020-2654: Improve Object Identifier Processing
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-30"/>
	<updated date="2020-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2590">CVE-2020-2590 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2601">CVE-2020-2601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522598" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531291" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531292" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522599" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148922" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1164860" ref_url="https://bugzilla.suse.com/1164860" source="BUGZILLA"/>
		<reference ref_id="1174117" ref_url="https://bugzilla.suse.com/1174117" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13935" ref_url="https://www.suse.com/security/cve/CVE-2020-13935/" source="CVE"/>
		<reference ref_id="CVE-2020-1935" ref_url="https://www.suse.com/security/cve/CVE-2020-1935/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007410.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-1935: Fixed an HTTP request smuggling vulnerability (bsc#1164860).
- CVE-2020-13935: Fixed a WebSocket DoS (bsc#1174117).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-11"/>
	<updated date="2020-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1164860">SUSE bug 1164860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174117">SUSE bug 1174117</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13935/">CVE-2020-13935 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13935">CVE-2020-13935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1935/">CVE-2020-1935 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1935">CVE-2020-1935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531293" comment="tomcat-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531294" comment="tomcat-admin-webapps-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531295" comment="tomcat-docs-webapp-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531296" comment="tomcat-el-3_0-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531297" comment="tomcat-javadoc-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531298" comment="tomcat-jsp-2_3-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531299" comment="tomcat-lib-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531300" comment="tomcat-servlet-3_1-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531301" comment="tomcat-webapps-8.0.53-29.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148923" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1175626" ref_url="https://bugzilla.suse.com/1175626" source="BUGZILLA"/>
		<reference ref_id="1175656" ref_url="https://bugzilla.suse.com/1175656" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007424.html" source="SUSE-SU"/>
		<description>
This update for shim fixes the following issues:

- Update to the unified shim binary from SUSE Linux Enterprise 15-SP1 (bsc#1168994)

This update addresses the 'BootHole' security issue (master CVE CVE-2020-10713), by
disallowing binaries signed by the previous SUSE UEFI signing key from booting.

This update should only be installed after updates of grub2, the Linux kernel and (if used)
Xen from July / August 2020 are applied.

Additional fixes:

+ shim-install: install MokManager to \EFI\boot to process the pending MOK request (bsc#1175626, bsc#1175656)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-14"/>
	<updated date="2020-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175626">SUSE bug 1175626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175656">SUSE bug 1175656</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538600" comment="shim-15+git47-25.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148924" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1120629" ref_url="https://bugzilla.suse.com/1120629" source="BUGZILLA"/>
		<reference ref_id="1120630" ref_url="https://bugzilla.suse.com/1120630" source="BUGZILLA"/>
		<reference ref_id="1120631" ref_url="https://bugzilla.suse.com/1120631" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1131823" ref_url="https://bugzilla.suse.com/1131823" source="BUGZILLA"/>
		<reference ref_id="1137977" ref_url="https://bugzilla.suse.com/1137977" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007438.html" source="SUSE-SU"/>
		<description>
This update for libsolv fixes the following issues:

This is a reissue of an existing libsolv update that also included libsolv-devel for LTSS products.

libsolv was updated to version 0.6.36 fixes the following issues:

Security issues fixed:

- CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629).
- CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630).
- CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631).

Non-security issues fixed:

- Made cleandeps jobs on patterns work (bsc#1137977).
- Fixed an issue multiversion packages that obsolete their own name (bsc#1127155).
- Keep consistent package name if there are multiple alternatives (bsc#1131823).

		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131823">SUSE bug 1131823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137977">SUSE bug 1137977</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20532">CVE-2018-20532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20533">CVE-2018-20533 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20534">CVE-2018-20534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555772" comment="libsolv-devel-0.6.36-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555773" comment="libsolv-tools-0.6.36-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555774" comment="perl-solv-0.6.36-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555775" comment="python-solv-0.6.36-2.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148925" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1176409" ref_url="https://bugzilla.suse.com/1176409" source="BUGZILLA"/>
		<reference ref_id="1176412" ref_url="https://bugzilla.suse.com/1176412" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392/" source="CVE"/>
		<reference ref_id="CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007439.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

Security issues fixed:

- CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated (bsc#1176412).
- CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name (bsc#1176409).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176409">SUSE bug 1176409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176412">SUSE bug 1176412</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14392">CVE-2020-14392 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14393">CVE-2020-14393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531302" comment="perl-DBI-1.628-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148926" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1159548" ref_url="https://bugzilla.suse.com/1159548" source="BUGZILLA"/>
		<reference ref_id="1172037" ref_url="https://bugzilla.suse.com/1172037" source="BUGZILLA"/>
		<reference ref_id="1173351" ref_url="https://bugzilla.suse.com/1173351" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2020-8161" ref_url="https://www.suse.com/security/cve/CVE-2020-8161/" source="CVE"/>
		<reference ref_id="CVE-2020-8184" ref_url="https://www.suse.com/security/cve/CVE-2020-8184/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007441.html" source="SUSE-SU"/>
		<description>
This update for rubygem-rack to version 1.6.13 fixes the following issues:

- CVE-2020-8184: Fixed an issue where percent-encoded cookies could have been used to overwrite existing prefixed cookie names (bsc#1173351).
- CVE-2020-8161: Fixed a directory traversal (bsc#1172037).
- CVE-2019-16782: Fixed an information leak / session hijack vulnerability (bsc#1159548).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-18"/>
	<updated date="2020-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159548">SUSE bug 1159548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172037">SUSE bug 1172037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173351">SUSE bug 1173351</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8161/">CVE-2020-8161 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8161">CVE-2020-8161 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8184/">CVE-2020-8184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8184">CVE-2020-8184 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597685" comment="ruby2.1-rubygem-rack-1.6.13-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148927" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionview-4_2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1176421" ref_url="https://bugzilla.suse.com/1176421" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15169" ref_url="https://www.suse.com/security/cve/CVE-2020-15169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007446.html" source="SUSE-SU"/>
		<description>
This update for rubygem-actionview-4_2 fixes the following issues:

- CVE-2020-15169:  Fix cross-site scripting in translation helpers (bsc#1176421)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-21"/>
	<updated date="2020-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176421">SUSE bug 1176421</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15169/">CVE-2020-15169 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15169">CVE-2020-15169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597686" comment="ruby2.1-rubygem-actionview-4_2-4.2.9-9.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148928" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="1130840" ref_url="https://bugzilla.suse.com/1130840" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="1153238" ref_url="https://bugzilla.suse.com/1153238" source="BUGZILLA"/>
		<reference ref_id="1162423" ref_url="https://bugzilla.suse.com/1162423" source="BUGZILLA"/>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="1174701" ref_url="https://bugzilla.suse.com/1174701" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-20907: Fixed denial of service by avoiding possible infinite loop in specifically crafted tarball (bsc#1174091).
- CVE-2020-14422: Fixed an improper computation of hash values in the IPv4Interface and IPv6Interface 
  could have led to denial of service (bsc#1173274).
- CVE-2019-16935: Fixed a reflected XSS in python/Lib/DocXMLRPCServer.py (bsc#1153238).
- CVE-2019-9947: Fixed an issue in urllib2 which allowed CRLF injection if the attacker controls a url parameter (bsc#1130840).
- If the locale is 'C', coerce it to C.UTF-8 (bsc#1162423).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-21"/>
	<updated date="2020-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162423">SUSE bug 1162423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174701">SUSE bug 1174701</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16935">CVE-2019-16935 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14422">CVE-2020-14422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531303" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531304" comment="python3-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531305" comment="python3-base-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531306" comment="python3-curses-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531307" comment="python3-devel-3.4.10-25.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148929" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1174120" ref_url="https://bugzilla.suse.com/1174120" source="BUGZILLA"/>
		<reference ref_id="1174316" ref_url="https://bugzilla.suse.com/1174316" source="BUGZILLA"/>
		<reference ref_id="1176579" ref_url="https://bugzilla.suse.com/1176579" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007463.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

-  ZeroLogon: An elevation of privilege was possible with some configurations when an attacker established
a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC) 
(CVE-2020-1472, bsc#1176579).

- Fixed an issue where multiple home folders were created(bsc#1174316, bso#13369).

- Fixed an issue where the net command was unable to negotiate SMB2 (bsc#1174120);
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174120">SUSE bug 1174120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174316">SUSE bug 1174316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176579">SUSE bug 1176579</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1472">CVE-2020-1472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555776" comment="libdcerpc-binding0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538606" comment="libdcerpc-binding0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555777" comment="libdcerpc0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538608" comment="libdcerpc0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555778" comment="libndr-krb5pac0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538610" comment="libndr-krb5pac0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555779" comment="libndr-nbt0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538612" comment="libndr-nbt0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555780" comment="libndr-standard0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538614" comment="libndr-standard0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555781" comment="libndr0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538616" comment="libndr0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555782" comment="libnetapi0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538618" comment="libnetapi0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555783" comment="libsamba-credentials0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538620" comment="libsamba-credentials0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555784" comment="libsamba-errors0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538622" comment="libsamba-errors0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555785" comment="libsamba-hostconfig0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538624" comment="libsamba-hostconfig0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555786" comment="libsamba-passdb0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538626" comment="libsamba-passdb0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555787" comment="libsamba-util0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538628" comment="libsamba-util0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555788" comment="libsamdb0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538630" comment="libsamdb0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555789" comment="libsmbclient0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538632" comment="libsmbclient0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555790" comment="libsmbconf0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538634" comment="libsmbconf0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555791" comment="libsmbldap0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538636" comment="libsmbldap0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555792" comment="libtevent-util0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538638" comment="libtevent-util0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555793" comment="libwbclient0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538640" comment="libwbclient0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555794" comment="samba-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555795" comment="samba-client-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538643" comment="samba-client-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538644" comment="samba-doc-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555796" comment="samba-libs-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538646" comment="samba-libs-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555797" comment="samba-winbind-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538648" comment="samba-winbind-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148930" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007473.html" source="SUSE-SU"/>
		<description>
This update for python-pip fixes the following issues:

- CVE-2019-20916: Fixed a directory traversal in _download_http_url (bsc#1176262)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597325" comment="python-pip-9.0.1-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148931" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1172515" ref_url="https://bugzilla.suse.com/1172515" source="BUGZILLA"/>
		<reference ref_id="1176315" ref_url="https://bugzilla.suse.com/1176315" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007486.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2020-17507: Fixed a buffer overflow in XBM parser (bsc#1176315)
- Made handling of XDG_RUNTIME_DIR more secure (bsc#1172515)	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-25"/>
	<updated date="2020-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172515">SUSE bug 1172515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176315">SUSE bug 1176315</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17507">CVE-2020-17507 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555798" comment="libQt5Concurrent5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555799" comment="libQt5Core5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555800" comment="libQt5DBus5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555801" comment="libQt5Gui5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555802" comment="libQt5Network5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555803" comment="libQt5OpenGL5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555804" comment="libQt5PrintSupport5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555805" comment="libQt5Sql5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555806" comment="libQt5Sql5-mysql-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555807" comment="libQt5Sql5-postgresql-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555808" comment="libQt5Sql5-sqlite-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555809" comment="libQt5Sql5-unixODBC-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555810" comment="libQt5Test5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555811" comment="libQt5Widgets5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555812" comment="libQt5Xml5-5.6.2-6.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148932" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1167976" ref_url="https://bugzilla.suse.com/1167976" source="BUGZILLA"/>
		<reference ref_id="1173986" ref_url="https://bugzilla.suse.com/1173986" source="BUGZILLA"/>
		<reference ref_id="1174420" ref_url="https://bugzilla.suse.com/1174420" source="BUGZILLA"/>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

-Firefox was updated to 78.3.0 ESR (bsc#1176756, MFSA 2020-43)
   - CVE-2020-15677: Download origin spoofing via redirect
   - CVE-2020-15676: Fixed an XSS when pasting attacker-controlled data into a
     contenteditable element 
   - CVE-2020-15678: When recursing through layers while scrolling, an iterator
     may have become invalid, resulting in a potential use-after-free scenario
   - CVE-2020-15673: Fixed memory safety bugs 
- Enhance fix for wayland-detection (bsc#1174420)
- Attempt to fix langpack-parallelization by introducing separate
  obj-dirs for each lang (bsc#1173986, bsc#1167976)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-26"/>
	<updated date="2020-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167976">SUSE bug 1167976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173986">SUSE bug 1173986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174420">SUSE bug 1174420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15673">CVE-2020-15673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15676">CVE-2020-15676 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15677">CVE-2020-15677 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15678">CVE-2020-15678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531352" comment="MozillaFirefox-78.3.0-112.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531353" comment="MozillaFirefox-devel-78.3.0-112.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531354" comment="MozillaFirefox-translations-common-78.3.0-112.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148933" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1176343" ref_url="https://bugzilla.suse.com/1176343" source="BUGZILLA"/>
		<reference ref_id="1176344" ref_url="https://bugzilla.suse.com/1176344" source="BUGZILLA"/>
		<reference ref_id="1176345" ref_url="https://bugzilla.suse.com/1176345" source="BUGZILLA"/>
		<reference ref_id="1176346" ref_url="https://bugzilla.suse.com/1176346" source="BUGZILLA"/>
		<reference ref_id="1176347" ref_url="https://bugzilla.suse.com/1176347" source="BUGZILLA"/>
		<reference ref_id="1176348" ref_url="https://bugzilla.suse.com/1176348" source="BUGZILLA"/>
		<reference ref_id="1176349" ref_url="https://bugzilla.suse.com/1176349" source="BUGZILLA"/>
		<reference ref_id="1176350" ref_url="https://bugzilla.suse.com/1176350" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595/" source="CVE"/>
		<reference ref_id="CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596/" source="CVE"/>
		<reference ref_id="CVE-2020-25597" ref_url="https://www.suse.com/security/cve/CVE-2020-25597/" source="CVE"/>
		<reference ref_id="CVE-2020-25599" ref_url="https://www.suse.com/security/cve/CVE-2020-25599/" source="CVE"/>
		<reference ref_id="CVE-2020-25600" ref_url="https://www.suse.com/security/cve/CVE-2020-25600/" source="CVE"/>
		<reference ref_id="CVE-2020-25601" ref_url="https://www.suse.com/security/cve/CVE-2020-25601/" source="CVE"/>
		<reference ref_id="CVE-2020-25603" ref_url="https://www.suse.com/security/cve/CVE-2020-25603/" source="CVE"/>
		<reference ref_id="CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-25604: Fixed a race condition when migrating timers between x86 
  HVM vCPU-s (bsc#1176343,XSA-336)
- CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers (bsc#1176344,XSA-337)
- CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid (bsc#1176346,XSA-338)
- CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER (bsc#1176345,XSA-339)
- CVE-2020-25603: Fixed an issue due to  missing barriers when accessing/allocating an event channel (bsc#1176347,XSA-340)
- CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains (bsc#1176348,XSA-342)
- CVE-2020-25599: Fixed race conditions with evtchn_reset() (bsc#1176349,XSA-343)
- CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset() / evtchn_destroy() (bsc#1176350,XSA-344)	  
- CVE-2020-14364: Fixed an out-of-bounds read/write access while processing usb packets (bsc#1175534).
- Various bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-29"/>
	<updated date="2020-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176343">SUSE bug 1176343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176344">SUSE bug 1176344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176345">SUSE bug 1176345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176346">SUSE bug 1176346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176347">SUSE bug 1176347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176348">SUSE bug 1176348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176349">SUSE bug 1176349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176350">SUSE bug 1176350</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25595">CVE-2020-25595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25596">CVE-2020-25596 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25597/">CVE-2020-25597 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25597">CVE-2020-25597 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25599/">CVE-2020-25599 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25599">CVE-2020-25599 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25600/">CVE-2020-25600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25600">CVE-2020-25600 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25601/">CVE-2020-25601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25601">CVE-2020-25601 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25603/">CVE-2020-25603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25603">CVE-2020-25603 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25604">CVE-2020-25604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538664" comment="xen-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538665" comment="xen-doc-html-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538666" comment="xen-libs-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538667" comment="xen-libs-32bit-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538668" comment="xen-tools-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538669" comment="xen-tools-domU-4.9.4_12-3.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148934" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1176496" ref_url="https://bugzilla.suse.com/1176496" source="BUGZILLA"/>
		<reference ref_id="1176764" ref_url="https://bugzilla.suse.com/1176764" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7490" ref_url="https://www.suse.com/security/cve/CVE-2013-7490/" source="CVE"/>
		<reference ref_id="CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007519.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

- CVE-2019-20919: Fixed a NULL profile dereference in dbi_profile (bsc#1176764).
- CVE-2013-7490: Fixed memory corruption when using many arguments 
  to methods for CallbacksUsing (bsc#1176496).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176496">SUSE bug 1176496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176764">SUSE bug 1176764</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7490/">CVE-2013-7490 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7490">CVE-2013-7490 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20919">CVE-2019-20919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531376" comment="perl-DBI-1.628-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148935" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- java-1_7_0-openjdk was updated to 2.6.23 (July 2020 CPU, bsc#1174157)
    - JDK-8028431, CVE-2020-14579: NullPointerException in
    - DerValue.equals(DerValue)
    - JDK-8028591, CVE-2020-14578: NegativeArraySizeException in
    - sun.security.util.DerInputStream.getUnalignedBitString()
    - JDK-8230613: Better ASCII conversions
    - JDK-8231800: Better listing of arrays
    - JDK-8232014: Expand DTD support
    - JDK-8233255: Better Swing Buttons
    - JDK-8234032: Improve basic calendar services
    - JDK-8234042: Better factory production of certificates
    - JDK-8234418: Better parsing with CertificateFactory
    - JDK-8234836: Improve serialization handling
    - JDK-8236191: Enhance OID processing
    - JDK-8237592, CVE-2020-14577: Enhance certificate verification
    - JDK-8238002, CVE-2020-14581: Better matrix operations
    - JDK-8238804: Enhance key handling process
    - JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    - JDK-8238843: Enhanced font handing
    - JDK-8238920, CVE-2020-14583: Better Buffer support
    - JDK-8238925: Enhance WAV file playback
    - JDK-8240119, CVE-2020-14593: Less Affine Transformations
    - JDK-8240482: Improved WAV file playback
    - JDK-8241379: Update JCEKS support
    - JDK-8241522: Manifest improved jar headers redux
    - JDK-8242136, CVE-2020-14621: Better XML namespace handling
    - JDK-8040113: File not initialized in src/share/native/sun/awt/giflib/dgif_lib.c
    - JDK-8054446: Repeated offer and remove on ConcurrentLinkedQueue lead to an OutOfMemoryError
    - JDK-8077982: GIFLIB upgrade
    - JDK-8081315: 8077982 giflib upgrade breaks system giflib builds with earlier versions
    - JDK-8147087: Race when reusing PerRegionTable bitmaps may result in dropped remembered set entries
    - JDK-8151582: (ch) test java/nio/channels/AsyncCloseAndInterrupt.java failing due to 'Connection succeeded'
    - JDK-8155691: Update GIFlib library to the latest up-to-date
    - JDK-8181841: A TSA server returns timestamp with precision higher than milliseconds
    - JDK-8203190: SessionId.hashCode generates too many collisions
    - JDK-8217676: Upgrade libpng to 1.6.37
    - JDK-8220495: Update GIFlib library to the 5.1.8
    - JDK-8226892: ActionListeners on JRadioButtons don't get notified when selection is changed with arrow keys
    - JDK-8229899: Make java.io.File.isInvalid() less racy
    - JDK-8230597: Update GIFlib library to the 5.2.1
    - JDK-8230769: BufImg_SetupICM add ReleasePrimitiveArrayCritical call in early return
    - JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a
    - JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion() returns wrong result
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531377" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531378" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531379" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531380" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148936" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1176733" ref_url="https://bugzilla.suse.com/1176733" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26117" ref_url="https://www.suse.com/security/cve/CVE-2020-26117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007542.html" source="SUSE-SU"/>
		<description>
This update for tigervnc fixes the following issues:

- CVE-2020-26117: Server certificates were stored as certiticate
  authorities, allowing malicious owners of these certificates
  to impersonate any server after a client had added an exception
  (bsc#1176733).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1176733">SUSE bug 1176733</bugzilla>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26117/">CVE-2020-26117 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26117">CVE-2020-26117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531381" comment="libXvnc1-1.6.0-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531382" comment="tigervnc-1.6.0-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531383" comment="xorg-x11-Xvnc-1.6.0-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148937" version="1" class="patch">
	<metadata>
		<title>Security update for libproxy (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1176410" ref_url="https://bugzilla.suse.com/1176410" source="BUGZILLA"/>
		<reference ref_id="1177143" ref_url="https://bugzilla.suse.com/1177143" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25219" ref_url="https://www.suse.com/security/cve/CVE-2020-25219/" source="CVE"/>
		<reference ref_id="CVE-2020-26154" ref_url="https://www.suse.com/security/cve/CVE-2020-26154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007543.html" source="SUSE-SU"/>
		<description>
This update for libproxy fixes the following issues:

- CVE-2020-25219: Rewrote url::recvline to be nonrecursive (bsc#1176410).
- CVE-2020-26154: Fixed a buffer overflow when PAC is enabled (bsc#1177143).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176410">SUSE bug 1176410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177143">SUSE bug 1177143</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25219/">CVE-2020-25219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25219">CVE-2020-25219 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26154/">CVE-2020-26154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26154">CVE-2020-26154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531384" comment="libproxy1-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531385" comment="libproxy1-32bit-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531386" comment="libproxy1-config-gnome3-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531387" comment="libproxy1-config-gnome3-32bit-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531388" comment="libproxy1-networkmanager-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531389" comment="libproxy1-pacrunner-webkit-0.4.13-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148938" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activesupport-4_2 (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1172186" ref_url="https://bugzilla.suse.com/1172186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8165" ref_url="https://www.suse.com/security/cve/CVE-2020-8165/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007578.html" source="SUSE-SU"/>
		<description>
This update for rubygem-activesupport-4_2 fixes the following issues:

- CVE-2020-8165: Fixed deserialization of untrusted data in MemCacheStore potentially resulting in remote code execution (bsc#1172186)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-15"/>
	<updated date="2020-10-15"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1172186">SUSE bug 1172186</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8165/">CVE-2020-8165 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8165">CVE-2020-8165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597687" comment="ruby2.1-rubygem-activesupport-4_2-4.2.9-7.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148939" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1177914" ref_url="https://bugzilla.suse.com/1177914" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007609.html" source="SUSE-SU"/>
		<description>
This update for freetype2 fixes the following issues:

- CVE-2020-15999: fixed a heap buffer overflow found in the handling of embedded PNG bitmaps (bsc#1177914).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-22"/>
	<updated date="2020-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177914">SUSE bug 1177914</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531390" comment="ft2demos-2.6.3-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531391" comment="libfreetype6-2.6.3-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531392" comment="libfreetype6-32bit-2.6.3-7.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148940" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1149332" ref_url="https://bugzilla.suse.com/1149332" source="BUGZILLA"/>
		<reference ref_id="1165784" ref_url="https://bugzilla.suse.com/1165784" source="BUGZILLA"/>
		<reference ref_id="1171878" ref_url="https://bugzilla.suse.com/1171878" source="BUGZILLA"/>
		<reference ref_id="1172085" ref_url="https://bugzilla.suse.com/1172085" source="BUGZILLA"/>
		<reference ref_id="1176013" ref_url="https://bugzilla.suse.com/1176013" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10029" ref_url="https://www.suse.com/security/cve/CVE-2020-10029/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007618.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:
	  
- CVE-2020-10029: Fixed a stack corruption from range reduction of pseudo-zero (bsc#1165784)
- Use posix_spawn on popen (bsc#1149332, bsc#1176013)
- Correct locking and cancellation cleanup in syslog functions (bsc#1172085)
- Fixed concurrent changes on nscd aware files (bsc#1171878)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-23"/>
	<updated date="2020-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149332">SUSE bug 1149332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165784">SUSE bug 1165784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171878">SUSE bug 1171878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172085">SUSE bug 1172085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176013">SUSE bug 1176013</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10029/">CVE-2020-10029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">CVE-2020-10029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531393" comment="glibc-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531394" comment="glibc-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531395" comment="glibc-devel-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531396" comment="glibc-devel-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531397" comment="glibc-html-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531398" comment="glibc-i18ndata-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531399" comment="glibc-info-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531400" comment="glibc-locale-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531401" comment="glibc-locale-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531402" comment="glibc-profile-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531403" comment="glibc-profile-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531404" comment="nscd-2.22-113.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148941" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="1177872" ref_url="https://bugzilla.suse.com/1177872" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007631.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.0 ESR
  * Fixed: Various stability, functionality, and security fixes MFSA 2020-46 (bsc#1177872, bsc#1176756)
  * CVE-2020-15969 Use-after-free in usersctp
  * CVE-2020-15683 Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4
  * Fixed: Fixed legacy preferences not being properly applied when set via GPO
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-27"/>
	<updated date="2020-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15683">CVE-2020-15683 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15969">CVE-2020-15969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531405" comment="MozillaFirefox-78.4.0-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531406" comment="MozillaFirefox-devel-78.4.0-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531407" comment="MozillaFirefox-translations-common-78.4.0-112.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148942" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1177158" ref_url="https://bugzilla.suse.com/1177158" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007658.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

- CVE-2020-14355: Fixed multiple buffer overflow vulnerabilities in QUIC image decoding (bsc#1177158).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14355">CVE-2020-14355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555813" comment="libspice-server1-0.12.8-15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148943" version="1" class="patch">
	<metadata>
		<title>Security update for spice-gtk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1177158" ref_url="https://bugzilla.suse.com/1177158" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007662.html" source="SUSE-SU"/>
		<description>
This update for spice-gtk fixes the following issues:

- CVE-2020-14355: Fixed multiple buffer overflow vulnerabilities in QUIC image decoding (bsc#1177158).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14355">CVE-2020-14355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555814" comment="libspice-client-glib-2_0-8-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555815" comment="libspice-client-glib-helper-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555816" comment="libspice-client-gtk-3_0-5-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555817" comment="libspice-controller0-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555818" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555819" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148944" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1173902" ref_url="https://bugzilla.suse.com/1173902" source="BUGZILLA"/>
		<reference ref_id="1173994" ref_url="https://bugzilla.suse.com/1173994" source="BUGZILLA"/>
		<reference ref_id="1177613" ref_url="https://bugzilla.suse.com/1177613" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<reference ref_id="CVE-2020-14383" ref_url="https://www.suse.com/security/cve/CVE-2020-14383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007673.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-14383: An authenticated user can crash the DCE/RPC DNS with easily crafted records (bsc#1177613).
- CVE-2020-14323: Unprivileged user can crash winbind (bsc#1173994).
- CVE-2020-14318: Missing permissions check in SMB1/2/3 ChangeNotify (bsc#1173902).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173902">SUSE bug 1173902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173994">SUSE bug 1173994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177613">SUSE bug 1177613</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14318">CVE-2020-14318 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14323">CVE-2020-14323 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14383/">CVE-2020-14383 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14383">CVE-2020-14383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555820" comment="libdcerpc-binding0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538678" comment="libdcerpc-binding0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555821" comment="libdcerpc0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538680" comment="libdcerpc0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555822" comment="libndr-krb5pac0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538682" comment="libndr-krb5pac0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555823" comment="libndr-nbt0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538684" comment="libndr-nbt0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555824" comment="libndr-standard0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538686" comment="libndr-standard0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555825" comment="libndr0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538688" comment="libndr0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555826" comment="libnetapi0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538690" comment="libnetapi0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555827" comment="libsamba-credentials0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538692" comment="libsamba-credentials0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555828" comment="libsamba-errors0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538694" comment="libsamba-errors0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555829" comment="libsamba-hostconfig0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538696" comment="libsamba-hostconfig0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555830" comment="libsamba-passdb0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538698" comment="libsamba-passdb0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555831" comment="libsamba-util0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538700" comment="libsamba-util0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555832" comment="libsamdb0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538702" comment="libsamdb0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555833" comment="libsmbclient0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538704" comment="libsmbclient0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555834" comment="libsmbconf0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538706" comment="libsmbconf0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555835" comment="libsmbldap0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538708" comment="libsmbldap0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555836" comment="libtevent-util0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538710" comment="libtevent-util0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555837" comment="libwbclient0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538712" comment="libwbclient0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555838" comment="samba-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555839" comment="samba-client-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538715" comment="samba-client-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538716" comment="samba-doc-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555840" comment="samba-libs-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538718" comment="samba-libs-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555841" comment="samba-winbind-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538720" comment="samba-winbind-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148945" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1174955" ref_url="https://bugzilla.suse.com/1174955" source="BUGZILLA"/>
		<reference ref_id="1177155" ref_url="https://bugzilla.suse.com/1177155" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15708" ref_url="https://www.suse.com/security/cve/CVE-2020-15708/" source="CVE"/>
		<reference ref_id="CVE-2020-25637" ref_url="https://www.suse.com/security/cve/CVE-2020-25637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007670.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

CVE-2020-15708: Added a note to libvirtd.conf about polkit auth in SUSE distros (bsc#1174955).
CVE-2020-25637: Fixed a double free in qemuAgentGetInterfaces() (bsc#1177155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174955">SUSE bug 1174955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177155">SUSE bug 1177155</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15708/">CVE-2020-15708 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15708">CVE-2020-15708 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25637/">CVE-2020-25637 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25637">CVE-2020-25637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555842" comment="libvirt-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555843" comment="libvirt-admin-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555844" comment="libvirt-client-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555845" comment="libvirt-daemon-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555846" comment="libvirt-daemon-config-network-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555847" comment="libvirt-daemon-config-nwfilter-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555848" comment="libvirt-daemon-driver-interface-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538728" comment="libvirt-daemon-driver-libxl-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555849" comment="libvirt-daemon-driver-lxc-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555850" comment="libvirt-daemon-driver-network-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555851" comment="libvirt-daemon-driver-nodedev-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555852" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555853" comment="libvirt-daemon-driver-qemu-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555854" comment="libvirt-daemon-driver-secret-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555855" comment="libvirt-daemon-driver-storage-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555856" comment="libvirt-daemon-driver-storage-core-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555857" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555858" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555859" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555860" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538741" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555861" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555862" comment="libvirt-daemon-hooks-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555863" comment="libvirt-daemon-lxc-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555864" comment="libvirt-daemon-qemu-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538746" comment="libvirt-daemon-xen-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555865" comment="libvirt-doc-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555866" comment="libvirt-libs-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555867" comment="libvirt-lock-sanlock-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555868" comment="libvirt-nss-3.3.0-5.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148946" version="1" class="patch">
	<metadata>
		<title>Security update for sane-backends (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1172524" ref_url="https://bugzilla.suse.com/1172524" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<reference ref_id="CVE-2020-12861" ref_url="https://www.suse.com/security/cve/CVE-2020-12861/" source="CVE"/>
		<reference ref_id="CVE-2020-12862" ref_url="https://www.suse.com/security/cve/CVE-2020-12862/" source="CVE"/>
		<reference ref_id="CVE-2020-12863" ref_url="https://www.suse.com/security/cve/CVE-2020-12863/" source="CVE"/>
		<reference ref_id="CVE-2020-12864" ref_url="https://www.suse.com/security/cve/CVE-2020-12864/" source="CVE"/>
		<reference ref_id="CVE-2020-12865" ref_url="https://www.suse.com/security/cve/CVE-2020-12865/" source="CVE"/>
		<reference ref_id="CVE-2020-12866" ref_url="https://www.suse.com/security/cve/CVE-2020-12866/" source="CVE"/>
		<reference ref_id="CVE-2020-12867" ref_url="https://www.suse.com/security/cve/CVE-2020-12867/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<description>
This update for sane-backends fixes the following issues:

- sane-backends version upgrade to 1.0.31:
  * sane-backends version upgrade to 1.0.30
    fixes memory corruption bugs CVE-2020-12861, CVE-2020-12862,
    CVE-2020-12863, CVE-2020-12864, CVE-2020-12865,
    CVE-2020-12866, CVE-2020-12867 (bsc#1172524)
  * sane-backends version upgrade to 1.0.31
    to further improve hardware enablement for scanner devices
    (jsc#SLE-15561 and jsc#SLE-15560 with jsc#ECO-2418)
  * The new escl backend cannot be provided for SLE12 because
    it requires more additional software (avahi-client, libcurl,
    and libpoppler-glib-devel) where in particular for libcurl
    the one that is in SLE12 (via libcurl-devel-7.37.0) is likely
    too old because with that building the escl backend fails with
    'escl/escl.c:1267:34: error: 'CURLOPT_UNIX_SOCKET_PATH'
    undeclared curl_easy_setopt(handle, CURLOPT_UNIX_SOCKET_PATH'
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6318">CVE-2017-6318 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12861/">CVE-2020-12861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12861">CVE-2020-12861 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12862/">CVE-2020-12862 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12862">CVE-2020-12862 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12863/">CVE-2020-12863 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12863">CVE-2020-12863 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12864/">CVE-2020-12864 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12864">CVE-2020-12864 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12865/">CVE-2020-12865 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12865">CVE-2020-12865 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12866/">CVE-2020-12866 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12866">CVE-2020-12866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12867/">CVE-2020-12867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12867">CVE-2020-12867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531452" comment="sane-backends-1.0.31-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148947" version="1" class="patch">
	<metadata>
		<title>Security update for apache-commons-httpclient (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1178171" ref_url="https://bugzilla.suse.com/1178171" source="BUGZILLA"/>
		<reference ref_id="945190" ref_url="https://bugzilla.suse.com/945190" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3577" ref_url="https://www.suse.com/security/cve/CVE-2014-3577/" source="CVE"/>
		<reference ref_id="CVE-2015-5262" ref_url="https://www.suse.com/security/cve/CVE-2015-5262/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007689.html" source="SUSE-SU"/>
		<description>
This update for apache-commons-httpclient fixes the following issues:

- http/conn/ssl/SSLConnectionSocketFactory.java ignores the
  http.socket.timeout configuration setting during an SSL handshake,
  which allows remote attackers to cause a denial of service (HTTPS
  call hang) via unspecified vectors. [bsc#945190, CVE-2015-5262]
- org.apache.http.conn.ssl.AbstractVerifier does not properly
  verify that the server hostname matches a domain name in the
  subject's Common Name (CN) or subjectAltName field of the X.509
  certificate, which allows MITM attackers to spoof SSL servers
  via a 'CN=' string in a field in the distinguished name (DN)
  of a certificate. [bsc#1178171, CVE-2014-3577]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-04"/>
	<updated date="2020-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178171">SUSE bug 1178171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945190">SUSE bug 945190</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3577/">CVE-2014-3577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3577">CVE-2014-3577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5262/">CVE-2015-5262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5262">CVE-2015-5262 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531477" comment="apache-commons-httpclient-3.1-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148948" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Fix regression '8250861: Crash in MinINode::Ideal(PhaseGVN*, bool)',
  introduced in October 2020 CPU.

- Update to version jdk8u272 (icedtea 3.17.0) (July 2020 CPU,
  bsc#1174157, and October 2020 CPU, bsc#1177943)
  * New features
    + JDK-8245468: Add TLSv1.3 implementation classes from 11.0.7
    + PR3796: Allow the number of curves supported to be specified
  * Security fixes
    + JDK-8028431, CVE-2020-14579: NullPointerException in
      DerValue.equals(DerValue)
    + JDK-8028591, CVE-2020-14578: NegativeArraySizeException in
      sun.security.util.DerInputStream.getUnalignedBitString()
    + JDK-8230613: Better ASCII conversions
    + JDK-8231800: Better listing of arrays
    + JDK-8232014: Expand DTD support
    + JDK-8233255: Better Swing Buttons
    + JDK-8233624: Enhance JNI linkage
    + JDK-8234032: Improve basic calendar services
    + JDK-8234042: Better factory production of certificates
    + JDK-8234418: Better parsing with CertificateFactory
    + JDK-8234836: Improve serialization handling
    + JDK-8236191: Enhance OID processing
    + JDK-8236196: Improve string pooling
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237117, CVE-2020-14556: Better ForkJoinPool behavior
    + JDK-8237592, CVE-2020-14577: Enhance certificate verification
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8238002, CVE-2020-14581: Better matrix operations
    + JDK-8238804: Enhance key handling process
    + JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    + JDK-8238843: Enhanced font handing
    + JDK-8238920, CVE-2020-14583: Better Buffer support
    + JDK-8238925: Enhance WAV file playback
    + JDK-8240119, CVE-2020-14593: Less Affine Transformations
    + JDK-8240124: Better VM Interning
    + JDK-8240482: Improved WAV file playback
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8241379: Update JCEKS support
    + JDK-8241522: Manifest improved jar headers redux
    + JDK-8242136, CVE-2020-14621: Better XML namespace handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Import of OpenJDK 8 u262 build 01
    + JDK-4949105: Access Bridge lacks html tags parsing
    + JDK-8003209: JFR events for network utilization
    + JDK-8030680: 292 cleanup from default method code assessment
    + JDK-8035633: TEST_BUG: java/net/NetworkInterface/Equals.java
      and some tests failed on windows intermittently
    + JDK-8041626: Shutdown tracing event
    + JDK-8141056: Erroneous assignment in HeapRegionSet.cpp
    + JDK-8149338: JVM Crash caused by Marlin renderer not handling
       NaN coordinates
    + JDK-8151582: (ch) test java/nio/channels/
      /AsyncCloseAndInterrupt.java failing due to 'Connection
      succeeded'
    + JDK-8165675: Trace event for thread park has incorrect unit
       for timeout
    + JDK-8176182: 4 security tests are not run
    + JDK-8178910: Problemlist sample tests
    + JDK-8183925: Decouple crash protection from watcher thread
    + JDK-8191393: Random crashes during cfree+0x1c
    + JDK-8195817: JFR.stop should require name of recording
    + JDK-8195818: JFR.start should increase autogenerated name by
       one
    + JDK-8195819: Remove recording=x from jcmd JFR.check output
    + JDK-8199712: Flight Recorder
    + JDK-8202578: Revisit location for class unload events
    + JDK-8202835: jfr/event/os/TestSystemProcess.java fails on
      missing events
    + JDK-8203287: Zero fails to build after JDK-8199712 (Flight
      Recorder)
    + JDK-8203346: JFR: Inconsistent signature of
      jfr_add_string_constant
    + JDK-8203664: JFR start failure after AppCDS archive created
      with JFR StartFlightRecording
    + JDK-8203921: JFR thread sampling is missing fixes from
      JDK-8194552
    + JDK-8203929: Limit amount of data for JFR.dump
    + JDK-8205516: JFR tool
    + JDK-8207392: [PPC64] Implement JFR profiling
    + JDK-8207829: FlightRecorderMXBeanImpl is leaking the first
      classloader which calls it
    + JDK-8209960: -Xlog:jfr* doesn't work with the JFR
    + JDK-8210024: JFR calls virtual is_Java_thread from ~Thread()
    + JDK-8210776: Upgrade X Window System 6.8.2 to the latest XWD
      1.0.7
    + JDK-8211239: Build fails without JFR: empty JFR events
      signatures mismatch
    + JDK-8212232: Wrong metadata for the configuration of the
      cutoff for old object sample events
    + JDK-8213015: Inconsistent settings between JFR.configure and
      -XX:FlightRecorderOptions
    + JDK-8213421: Line number information for execution samples
      always 0
    + JDK-8213617: JFR should record the PID of the recorded process
    + JDK-8213734: SAXParser.parse(File, ..) does not close
      resources when Exception occurs.
    + JDK-8213914: [TESTBUG] Several JFR VM events are not covered
      by tests
    + JDK-8213917: [TESTBUG] Shutdown JFR event is not covered by
      test
    + JDK-8213966: The ZGC JFR events should be marked as
      experimental
    + JDK-8214542: JFR: Old Object Sample event slow on a deep heap
      in debug builds
    + JDK-8214750: Unnecessary &lt;p&gt; tags in jfr classes
    + JDK-8214896: JFR Tool left files behind
    + JDK-8214906: [TESTBUG] jfr/event/sampling/TestNative.java
      fails with UnsatisfiedLinkError
    + JDK-8214925: JFR tool fails to execute
    + JDK-8215175: Inconsistencies in JFR event metadata
    + JDK-8215237: jdk.jfr.Recording javadoc does not compile
    + JDK-8215284: Reduce noise induced by periodic task
      getFileSize()
    + JDK-8215355: Object monitor deadlock with no threads holding
      the monitor (using jemalloc 5.1)
    + JDK-8215362: JFR GTest JfrTestNetworkUtilization fails
    + JDK-8215771: The jfr tool should pretty print reference chains
    + JDK-8216064: -XX:StartFlightRecording:settings= doesn't work
      properly
    + JDK-8216486: Possibility of integer overflow in
      JfrThreadSampler::run()
    + JDK-8216528: test/jdk/java/rmi/transport/
       /runtimeThreadInheritanceLeak/
       /RuntimeThreadInheritanceLeak.java failing with Xcomp
    + JDK-8216559: [JFR] Native libraries not correctly parsed from
      /proc/self/maps
    + JDK-8216578: Remove unused/obsolete method in JFR code
    + JDK-8216995: Clean up JFR command line processing
    + JDK-8217744: [TESTBUG] JFR TestShutdownEvent fails on some
      systems due to process surviving SIGINT
    + JDK-8217748: [TESTBUG] Exclude TestSig test case from JFR
      TestShutdownEvent
    + JDK-8218935: Make jfr strncpy uses GCC 8.x friendly
    + JDK-8223147: JFR Backport
    + JDK-8223689: Add JFR Thread Sampling Support
    + JDK-8223690: Add JFR BiasedLock Event Support
    + JDK-8223691: Add JFR G1 Region Type Change Event Support
    + JDK-8223692: Add JFR G1 Heap Summary Event Support
    + JDK-8224172: assert(jfr_is_event_enabled(id)) failed:
      invariant
    + JDK-8224475: JTextPane does not show images in HTML rendering
    + JDK-8226253: JAWS reports wrong number of radio buttons when
      buttons are hidden.
    + JDK-8226779: [TESTBUG] Test JFR API from Java agent
    + JDK-8226892: ActionListeners on JRadioButtons don't get
      notified when selection is changed with arrow keys
    + JDK-8227011: Starting a JFR recording in response to JVMTI
      VMInit and / or Java agent premain corrupts memory
    + JDK-8227605: Kitchensink fails 'assert((((klass)-&gt;trace_id()
      &amp; (JfrTraceIdEpoch::leakp_in_use_this_epoch_bit())) != 0))
      failed: invariant'
    + JDK-8229366: JFR backport allows unchecked writing to memory
    + JDK-8229401: Fix JFR code cache test failures
    + JDK-8229708: JFR backport code does not initialize
    + JDK-8229873: 8229401 broke jdk8u-jfr-incubator
    + JDK-8230448: [test] JFRSecurityTestSuite.java is failing on
      Windows
    + JDK-8230707: JFR related tests are failing
    + JDK-8230782: Robot.createScreenCapture() fails if
      'awt.robot.gtk' is set to false
    + JDK-8230856: Java_java_net_NetworkInterface_getByName0 on
       unix misses ReleaseStringUTFChars in early return
    + JDK-8230947: TestLookForUntestedEvents.java is failing after
      JDK-8230707
    + JDK-8231995: two jtreg tests failed after 8229366 is fixed
    + JDK-8233623: Add classpath exception to copyright in
      EventHandlerProxyCreator.java file
    + JDK-8236002: CSR for JFR backport suggests not leaving out
      the package-info
    + JDK-8236008: Some backup files were accidentally left in the
      hotspot tree
    + JDK-8236074: Missed package-info
    + JDK-8236174: Should update javadoc since tags
    + JDK-8238076: Fix OpenJDK 7 Bootstrap Broken by JFR Backport
    + JDK-8238452: Keytool generates wrong expiration date if
      validity is set to 2050/01/01
    + JDK-8238555: Allow Initialization of SunPKCS11 with NSS when
      there are external FIPS modules in the NSSDB
    + JDK-8238589: Necessary code cleanup in JFR for JDK8u
    + JDK-8238590: Enable JFR by default during compilation in 8u
    + JDK-8239055: Wrong implementation of VMState.hasListener
    + JDK-8239476: JDK-8238589 broke windows build by moving
      OrderedPair
    + JDK-8239479: minimal1 and zero builds are failing
    + JDK-8239867: correct over use of INCLUDE_JFR macro
    + JDK-8240375: Disable JFR by default for July 2020 release
    + JDK-8241444: Metaspace::_class_vsm not initialized if
      compressed class pointers are disabled
    + JDK-8241902: AIX Build broken after integration of
      JDK-8223147 (JFR Backport)
    + JDK-8242788: Non-PCH build is broken after JDK-8191393
  * Import of OpenJDK 8 u262 build 02
    + JDK-8130737: AffineTransformOp can't handle child raster with
      non-zero x-offset
    + JDK-8172559: [PIT][TEST_BUG] Move @test to be 1st annotation
      in java/awt/image/Raster/TestChildRasterOp.java
    + JDK-8230926: [macosx] Two apostrophes are entered instead of
      one with 'U.S. International - PC' layout
    + JDK-8240576: JVM crashes after transformation in C2
      IdealLoopTree::merge_many_backedges
    + JDK-8242883: Incomplete backport of JDK-8078268: backport
      test part
  * Import of OpenJDK 8 u262 build 03
    + JDK-8037866: Replace the Fun class in tests with lambdas
    + JDK-8146612: C2: Precedence edges specification violated
    + JDK-8150986: serviceability/sa/jmap-hprof/
       /JMapHProfLargeHeapTest.java failing because expects HPROF
      JAVA PROFILE 1.0.1 file format
    + JDK-8229888: (zipfs) Updating an existing zip file does not
      preserve original permissions
    + JDK-8230597: Update GIFlib library to the 5.2.1
    + JDK-8230769: BufImg_SetupICM add
      ReleasePrimitiveArrayCritical call in early return
    + JDK-8233880, PR3798: Support compilers with multi-digit major
      version numbers
    + JDK-8239852: java/util/concurrent tests fail with
      -XX:+VerifyGraphEdges: assert(!VerifyGraphEdges) failed:
      verification should have failed
    + JDK-8241638: launcher time metrics always report 1 on Linux
      when _JAVA_LAUNCHER_DEBUG set
    + JDK-8243059: Build fails when --with-vendor-name contains a
      comma
    + JDK-8243474: [TESTBUG] removed three tests of 0 bytes
    + JDK-8244461: [JDK 8u] Build fails with glibc 2.32
    + JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion()
      returns wrong result
  * Import of OpenJDK 8 u262 build 04
    + JDK-8067796: (process) Process.waitFor(timeout, unit) doesn't
      throw NPE if timeout is less than, or equal to zero when unit
      == null
    + JDK-8148886: SEGV in sun.java2d.marlin.Renderer._endRendering
    + JDK-8171934:
      ObjectSizeCalculator.getEffectiveMemoryLayoutSpecification()
      does not recognize OpenJDK's HotSpot VM
    + JDK-8196969: JTreg Failure:
      serviceability/sa/ClhsdbJstack.java causes NPE
    + JDK-8243539: Copyright info (Year) should be updated for fix
      of 8241638
    + JDK-8244777: ClassLoaderStats VM Op uses constant hash value
  * Import of OpenJDK 8 u262 build 05
    + JDK-7147060: com/sun/org/apache/xml/internal/security/
      /transforms/ClassLoaderTest.java doesn't run in agentvm mode
    + JDK-8178374: Problematic ByteBuffer handling in
      CipherSpi.bufferCrypt method
    + JDK-8181841: A TSA server returns timestamp with precision
      higher than milliseconds
    + JDK-8227269: Slow class loading when running with JDWP
    + JDK-8229899: Make java.io.File.isInvalid() less racy
    + JDK-8236996: Incorrect Roboto font rendering on Windows with
      subpixel antialiasing
    + JDK-8241750: x86_32 build failure after JDK-8227269
    + JDK-8244407: JVM crashes after transformation in C2
      IdealLoopTree::split_fall_in
    + JDK-8244843: JapanEraNameCompatTest fails
  * Import of OpenJDK 8 u262 build 06
    + JDK-8246223: Windows build fails after JDK-8227269
  * Import of OpenJDK 8 u262 build 07
    + JDK-8233197: Invert JvmtiExport::post_vm_initialized() and
      Jfr:on_vm_start() start-up order for correct option parsing
    + JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a
    + JDK-8245167: Top package in method profiling shows null in JMC
    + JDK-8246703: [TESTBUG] Add test for JDK-8233197
  * Import of OpenJDK 8 u262 build 08
    + JDK-8220293: Deadlock in JFR string pool
    + JDK-8225068: Remove DocuSign root certificate that is
      expiring in May 2020
    + JDK-8225069: Remove Comodo root certificate that is expiring
      in May 2020
  * Import of OpenJDK 8 u262 build 09
    + JDK-8248399: Build installs jfr binary when JFR is disabled
  * Import of OpenJDK 8 u262 build 10
    + JDK-8248715: New JavaTimeSupplementary localisation for 'in'
      installed in wrong package
  * Import of OpenJDK 8 u265 build 01
    + JDK-8249677: Regression in 8u after JDK-8237117: Better
      ForkJoinPool behavior
    + JDK-8250546: Expect changed behaviour reported in JDK-8249846
  * Import of OpenJDK 8 u272 build 01
    + JDK-8006205: [TESTBUG] NEED_TEST: please JTREGIFY
      test/compiler/7177917/Test7177917.java
    + JDK-8035493: JVMTI PopFrame capability must instruct
      compilers not to prune locals
    + JDK-8036088: Replace strtok() with its safe equivalent
      strtok_s() in DefaultProxySelector.c
    + JDK-8039082: [TEST_BUG] Test java/awt/dnd/
      /BadSerializationTest/BadSerializationTest.java fails
    + JDK-8075774: Small readability and performance improvements
      for zipfs
    + JDK-8132206: move ScanTest.java into OpenJDK
    + JDK-8132376: Add @requires os.family to the client tests with
      access to internal OS-specific API
    + JDK-8132745: minor cleanup of java/util/Scanner/ScanTest.java
    + JDK-8137087: [TEST_BUG] Cygwin failure of java/awt/
      /appletviewer/IOExceptionIfEncodedURLTest/
      /IOExceptionIfEncodedURLTest.sh
    + JDK-8145808: java/awt/Graphics2D/MTGraphicsAccessTest/
      /MTGraphicsAccessTest.java hangs on Win. 8
    + JDK-8151788: NullPointerException from ntlm.Client.type3
    + JDK-8151834: Test SmallPrimeExponentP.java times out
      intermittently
    + JDK-8153430: jdk regression test MletParserLocaleTest,
      ParserInfiniteLoopTest reduce default timeout
    + JDK-8153583: Make OutputAnalyzer.reportDiagnosticSummary
      public
    + JDK-8156169: Some sound tests rarely hangs because of
      incorrect synchronization
    + JDK-8165936: Potential Heap buffer overflow when seaching
      timezone info files
    + JDK-8166148: Fix for JDK-8165936 broke solaris builds
    + JDK-8167300: Scheduling failures during gcm should be fatal
    + JDK-8167615: Opensource unit/regression tests for JavaSound
    + JDK-8172012: [TEST_BUG] delays needed in
      javax/swing/JTree/4633594/bug4633594.java
    + JDK-8177628: Opensource unit/regression tests for ImageIO
    + JDK-8183341: Better cleanup for javax/imageio/AllowSearch.java
    + JDK-8183351: Better cleanup for jdk/test/javax/imageio/spi/
      /AppletContextTest/BadPluginConfigurationTest.sh
    + JDK-8193137: Nashorn crashes when given an empty script file
    + JDK-8194298: Add support for per Socket configuration of TCP
      keepalive
    + JDK-8198004: javax/swing/JFileChooser/6868611/bug6868611.java
      throws error
    + JDK-8200313: java/awt/Gtk/GtkVersionTest/GtkVersionTest.java
      fails
    + JDK-8210147: adjust some WSAGetLastError usages in windows
      network coding
    + JDK-8211714: Need to update vm_version.cpp to recognise
      VS2017 minor versions
    + JDK-8214862: assert(proj != __null) at compile.cpp:3251
    + JDK-8217606: LdapContext#reconnect always opens a new
      connection
    + JDK-8217647: JFR: recordings on 32-bit systems unreadable
    + JDK-8226697: Several tests which need the @key headful
      keyword are missing it.
    + JDK-8229378: jdwp library loader in linker_md.c quietly
      truncates on buffer overflow
    + JDK-8230303: JDB hangs when running monitor command
    + JDK-8230711: ConnectionGraph::unique_java_object(Node* N)
      return NULL if n is not in the CG
    + JDK-8234617: C1: Incorrect result of field load due to
      missing narrowing conversion
    + JDK-8235243: handle VS2017 15.9 and VS2019 in
      abstract_vm_version
    + JDK-8235325: build failure on Linux after 8235243
    + JDK-8235687: Contents/MacOS/libjli.dylib cannot be a symlink
    + JDK-8237951: CTW: C2 compilation fails with 'malformed
      control flow'
    + JDK-8238225: Issues reported after replacing symlink at
      Contents/MacOS/libjli.dylib with binary
    + JDK-8239385: KerberosTicket client name refers wrongly to
      sAMAccountName in AD
    + JDK-8239819: XToolkit: Misread of screen information memory
    + JDK-8240295: hs_err elapsed time in seconds is not accurate
      enough
    + JDK-8241888: Mirror jdk.security.allowNonCaAnchor system
      property with a security one
    + JDK-8242498: Invalid 'sun.awt.TimedWindowEvent' object leads
      to JVM crash
    + JDK-8243489: Thread CPU Load event may contain wrong data for
      CPU time under certain conditions
    + JDK-8244818: Java2D Queue Flusher crash while moving
      application window to external monitor
    + JDK-8246310: Clean commented-out code about ModuleEntry
      and PackageEntry in JFR
    + JDK-8246384: Enable JFR by default on supported architectures
      for October 2020 release
    + JDK-8248643: Remove extra leading space in JDK-8240295 8u
      backport
    + JDK-8249610: Make
      sun.security.krb5.Config.getBooleanObject(String... keys)
      method public
  * Import of OpenJDK 8 u272 build 02
    + JDK-8023697: failed class resolution reports different class
      name in detail message for the first and subsequent times
    + JDK-8025886: replace [[ and == bash extensions in regtest
    + JDK-8046274: Removing dependency on jakarta-regexp
    + JDK-8048933: -XX:+TraceExceptions output should include the
      message
    + JDK-8076151: [TESTBUG] Test java/awt/FontClass/CreateFont/
      /fileaccess/FontFile.java fails
    + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'
      treated by JVM as an equivalent
    + JDK-8154313: Generated javadoc scattered all over the place
    + JDK-8163251: Hard coded loop limit prevents reading of smart
      card data greater than 8k
    + JDK-8173300: [TESTBUG]compiler/tiered/NonTieredLevelsTest.java
      fails with compiler.whitebox.SimpleTestCaseHelper(int) must be
      compiled
    + JDK-8183349: Better cleanup for jdk/test/javax/imageio/
      /plugins/shared/CanWriteSequence.java and WriteAfterAbort.java
    + JDK-8191678: [TESTBUG] Add keyword headful in java/awt
      FocusTransitionTest test.
    + JDK-8201633: Problems with AES-GCM native acceleration
    + JDK-8211049: Second parameter of 'initialize' method is not
          used
    + JDK-8219566: JFR did not collect call stacks when
      MaxJavaStackTraceDepth is set to zero
    + JDK-8220165: Encryption using GCM results in
      RuntimeException- input length out of bound
    + JDK-8220555: JFR tool shows potentially misleading message
      when it cannot access a file
    + JDK-8224217: RecordingInfo should use textual representation
      of path
    + JDK-8231779: crash
      HeapWord*ParallelScavengeHeap::failed_mem_allocate
    + JDK-8238380, PR3798: java.base/unix/native/libjava/childproc.c
      'multiple definition' link errors with GCC10
    + JDK-8238386, PR3798: (sctp) jdk.sctp/unix/native/libsctp/
      /SctpNet.c 'multiple definition' link errors with GCC10
    + JDK-8238388, PR3798: libj2gss/NativeFunc.o 'multiple
      definition' link errors with GCC10
    + JDK-8242556: Cannot load RSASSA-PSS public key with non-null
      params from byte array
    + JDK-8250755: Better cleanup for jdk/test/javax/imageio/
      /plugins/shared/CanWriteSequence.java
  * Import of OpenJDK 8 u272 build 03
    + JDK-6574989: TEST_BUG:
      javax/sound/sampled/Clip/bug5070081.java fails sometimes
    + JDK-8148754: C2 loop unrolling fails due to unexpected graph
      shape
    + JDK-8192953: sun/management/jmxremote/bootstrap/*.sh tests
      fail with error : revokeall.exe: Permission denied
    + JDK-8203357: Container Metrics
    + JDK-8209113: Use WeakReference for lastFontStrike for created
      Fonts
    + JDK-8216283: Allow shorter method sampling interval than 10 ms
    + JDK-8221569: JFR tool produces incorrect output when both
      --categories and --events are specified
    + JDK-8233097: Fontmetrics for large Fonts has zero width
    + JDK-8248851: CMS: Missing memory fences between free chunk
      check and klass read
    + JDK-8250875: Incorrect parameter type for update_number in
      JDK_Version::jdk_update
  * Import of OpenJDK 8 u272 build 04
    + JDK-8061616: HotspotDiagnosticMXBean.getVMOption() throws
      IllegalArgumentException for flags of type double
    + JDK-8177334: Update xmldsig implementation to Apache
      Santuario 2.1.1
    + JDK-8217878: ENVELOPING XML signature no longer works in JDK
      11
    + JDK-8218629: XML Digital Signature throws NAMESPACE_ERR
      exception on OpenJDK 11, works 8/9/10
    + JDK-8243138: Enhance BaseLdapServer to support starttls
      extended request
  * Import of OpenJDK 8 u272 build 05
    + JDK-8026236: Add PrimeTest for BigInteger
    + JDK-8057003: Large reference arrays cause extremely long
      synchronization times
    + JDK-8060721: Test runtime/SharedArchiveFile/
      /LimitSharedSizes.java fails in jdk 9 fcs new
      platforms/compiler
    + JDK-8152077: (cal) Calendar.roll does not always roll the
      hours during daylight savings
    + JDK-8168517: java/lang/ProcessBuilder/Basic.java failed
    + JDK-8211163: UNIX version of Java_java_io_Console_echo does
      not return a clean boolean
    + JDK-8220674: [TESTBUG] MetricsMemoryTester failcount test in
      docker container only works with debug JVMs
    + JDK-8231213: Migrate SimpleDateFormatConstTest to JDK Repo
    + JDK-8236645: JDK 8u231 introduces a regression with
      incompatible handling of XML messages
    + JDK-8240676: Meet not symmetric failure when running lucene
      on jdk8
    + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA
      program
    + JDK-8249158: THREAD_START and THREAD_END event posted in
      primordial phase
    + JDK-8250627: Use -XX:+/-UseContainerSupport for
      enabling/disabling Java container metrics
    + JDK-8251546: 8u backport of JDK-8194298 breaks AIX and
      Solaris builds
    + JDK-8252084: Minimal VM fails to bootcycle: undefined symbol:
      AgeTableTracer::is_tenuring_distribution_event_enabled
  * Import of OpenJDK 8 u272 build 06
    + JDK-8064319: Need to enable -XX:+TraceExceptions in release
      builds
    + JDK-8080462, PR3801: Update SunPKCS11 provider with PKCS11
      v2.40 support
    + JDK-8160768: Add capability to custom resolve host/domain
      names within the default JNDI LDAP provider
    + JDK-8161973: PKIXRevocationChecker.getSoftFailExceptions()
      not working
    + JDK-8169925, PR3801: PKCS #11 Cryptographic Token Interface
      license
    + JDK-8184762: ZapStackSegments should use optimized memset
    + JDK-8193234: When using -Xcheck:jni an internally allocated
      buffer can leak
    + JDK-8219919: RuntimeStub name lost with
      PrintFrameConverterAssembly
    + JDK-8220313: [TESTBUG] Update base image for Docker testing
      to OL 7.6
    + JDK-8222079: Don't use memset to initialize fields decode_env
      constructor in disassembler.cpp
    + JDK-8225695: 32-bit build failures after JDK-8080462 (Update
      SunPKCS11 provider with PKCS11 v2.40 support)
    + JDK-8226575: OperatingSystemMXBean should be made container
      aware
    + JDK-8226809: Circular reference in printed stack trace is not
      correctly indented &amp; ambiguous
    + JDK-8228835: Memory leak in PKCS11 provider when using AES GCM
    + JDK-8233621: Mismatch in jsse.enableMFLNExtension property
      name
    + JDK-8238898, PR3801: Missing hash characters for header on
      license file
    + JDK-8243320: Add SSL root certificates to Oracle Root CA
      program
    + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest
      release 1.8.26
    + JDK-8245467: Remove 8u TLSv1.2 implementation files
    + JDK-8245469: Remove DTLS protocol implementation
    + JDK-8245470: Fix JDK8 compatibility issues
    + JDK-8245471: Revert JDK-8148188
    + JDK-8245472: Backport JDK-8038893 to JDK8
    + JDK-8245473: OCSP stapling support
    + JDK-8245474: Add TLS_KRB5 cipher suites support according to
      RFC-2712
    + JDK-8245476: Disable TLSv1.3 protocol in the ClientHello
      message by default
    + JDK-8245477: Adjust TLS tests location
    + JDK-8245653: Remove 8u TLS tests
    + JDK-8245681: Add TLSv1.3 regression test from 11.0.7
    + JDK-8251117: Cannot check P11Key size in P11Cipher and
      P11AEADCipher
    + JDK-8251120, PR3793: [8u] HotSpot build assumes ENABLE_JFR is
      set to either true or false
    + JDK-8251341: Minimal Java specification change
    + JDK-8251478: Backport TLSv1.3 regression tests to JDK8u
  * Import of OpenJDK 8 u272 build 07
    + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ
  * Import of OpenJDK 8 u272 build 08
    + JDK-8062947: Fix exception message to correctly represent
      LDAP connection failure
    + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed
      due to timeout on DeadServerNoTimeoutTest is incorrect
    + JDK-8252573: 8u: Windows build failed after 8222079 backport
  * Import of OpenJDK 8 u272 build 09
    + JDK-8252886: [TESTBUG] sun/security/ec/TestEC.java :
      Compilation failed
  * Import of OpenJDK 8 u272 build 10
    + JDK-8254673: Call to JvmtiExport::post_vm_start() was removed
      by the fix for JDK-8249158
    + JDK-8254937: Revert JDK-8148854 for 8u272
  * Backports
    + JDK-8038723, PR3806: Openup some PrinterJob tests
    + JDK-8041480, PR3806: ArrayIndexOutOfBoundsException when
      JTable contains certain string
    + JDK-8058779, PR3805: Faster implementation of
      String.replace(CharSequence, CharSequence)
    + JDK-8130125, PR3806: [TEST_BUG] add @modules to the several
      client tests unaffected by the automated bulk update
    + JDK-8144015, PR3806: [PIT] failures of text layout font tests
    + JDK-8144023, PR3806: [PIT] failure of text measurements in
      javax/swing/text/html/parser/Parser/6836089/bug6836089.java
    + JDK-8144240, PR3806: [macosx][PIT] AIOOB in
      closed/javax/swing/text/GlyphPainter2/6427244/bug6427244.java
    + JDK-8145542, PR3806: The case failed automatically and thrown
      java.lang.ArrayIndexOutOfBoundsException exception
    + JDK-8151725, PR3806: [macosx] ArrayIndexOOB exception when
      displaying Devanagari text in JEditorPane
    + JDK-8152358, PR3800: code and comment cleanups found during
      the hunt for 8077392
    + JDK-8152545, PR3804: Use preprocessor instead of compiling a
      program to generate native nio constants
    + JDK-8152680, PR3806: Regression in
      GlyphVector.getGlyphCharIndex behaviour
    + JDK-8158924, PR3806: Incorrect i18n text document layout
    + JDK-8166003, PR3806: [PIT][TEST_BUG] missing helper for
      javax/swing/text/GlyphPainter2/6427244/bug6427244.java
    + JDK-8166068, PR3806: test/java/awt/font/GlyphVector/
      /GetGlyphCharIndexTest.java does not compile
    + JDK-8169879, PR3806: [TEST_BUG] javax/swing/text/
      /GlyphPainter2/6427244/bug6427244.java - compilation failed
    + JDK-8191512, PR3806: T2K font rasterizer code removal
    + JDK-8191522, PR3806: Remove Bigelow&amp;Holmes Lucida fonts from
      JDK sources
    + JDK-8236512, PR3801: PKCS11 Connection closed after
      Cipher.doFinal and NoPadding
    + JDK-8254177, PR3809: (tz) Upgrade time-zone data to
      tzdata2020b
  * Bug fixes
    + PR3798: Fix format-overflow error on GCC 10, caused by
      passing NULL to a '%s' directive
    + PR3795: ECDSAUtils for XML digital signatures should support
      the same curve set as the rest of the JDK
    + PR3799: Adapt elliptic curve patches to JDK-8245468: Add
      TLSv1.3 implementation classes from 11.0.7
    + PR3808: IcedTea does not install the JFR *.jfc files
    + PR3810: Enable JFR on x86 (32-bit) now that JDK-8252096 has
      fixed its use with Shenandoah
    + PR3811: Don't attempt to install JFR files when JFR is
      disabled
  * Shenandoah
    + [backport] 8221435: Shenandoah should not mark through weak
      roots
    + [backport] 8221629: Shenandoah: Cleanup class unloading logic
    + [backport] 8222992: Shenandoah: Pre-evacuate all roots
    + [backport] 8223215: Shenandoah: Support verifying subset of
      roots
    + [backport] 8223774: Shenandoah: Refactor
      ShenandoahRootProcessor and family
    + [backport] 8224210: Shenandoah: Refactor
      ShenandoahRootScanner to support scanning CSet codecache roots
    + [backport] 8224508: Shenandoah: Need to update thread roots
      in final mark for piggyback ref update cycle
    + [backport] 8224579: ResourceMark not declared in
      shenandoahRootProcessor.inline.hpp with
      --disable-precompiled-headers
    + [backport] 8224679: Shenandoah: Make
      ShenandoahParallelCodeCacheIterator noncopyable
    + [backport] 8224751: Shenandoah: Shenandoah Verifier should
      select proper roots according to current GC cycle
    + [backport] 8225014: Separate ShenandoahRootScanner method for
      object_iterate
    + [backport] 8225216: gc/logging/TestMetaSpaceLog.java doesn't
      work for Shenandoah
    + [backport] 8225573: Shenandoah: Enhance ShenandoahVerifier to
      ensure roots to-space invariant
    + [backport] 8225590: Shenandoah: Refactor
      ShenandoahClassLoaderDataRoots API
    + [backport] 8226413: Shenandoah: Separate root scanner for
      SH::object_iterate()
    + [backport] 8230853: Shenandoah: replace leftover
      assert(is_in(...)) with rich asserts
    + [backport] 8231198: Shenandoah: heap walking should visit all
      roots most of the time
    + [backport] 8231244: Shenandoah: all-roots heap walking misses
      some weak roots
    + [backport] 8237632: Shenandoah: accept NULL fwdptr to
      cooperate with JVMTI and JFR
    + [backport] 8239786: Shenandoah: print per-cycle statistics
    + [backport] 8239926: Shenandoah: Shenandoah needs to mark
      nmethod's metadata
    + [backport] 8240671: Shenandoah: refactor
      ShenandoahPhaseTimings
    + [backport] 8240749: Shenandoah: refactor ShenandoahUtils
    + [backport] 8240750: Shenandoah: remove leftover files and
      mentions of ShenandoahAllocTracker
    + [backport] 8240868: Shenandoah: remove CM-with-UR
      piggybacking cycles
    + [backport] 8240872: Shenandoah: Avoid updating new regions
      from start of evacuation
    + [backport] 8240873: Shenandoah: Short-cut arraycopy barriers
    + [backport] 8240915: Shenandoah: Remove unused fields in init
      mark tasks
    + [backport] 8240948: Shenandoah: cleanup not-forwarded-objects
      paths after JDK-8240868
    + [backport] 8241007: Shenandoah: remove
      ShenandoahCriticalControlThreadPriority support
    + [backport] 8241062: Shenandoah: rich asserts trigger 'empty
      statement' inspection
    + [backport] 8241081: Shenandoah: Do not modify
      update-watermark concurrently
    + [backport] 8241093: Shenandoah: editorial changes in flag
      descriptions
    + [backport] 8241139: Shenandoah: distribute mark-compact work
      exactly to minimize fragmentation
    + [backport] 8241142: Shenandoah: should not use parallel
      reference processing with single GC thread
    + [backport] 8241351: Shenandoah: fragmentation metrics overhaul
    + [backport] 8241435: Shenandoah: avoid disabling pacing with
      'aggressive'
    + [backport] 8241520: Shenandoah: simplify region sequence
      numbers handling
    + [backport] 8241534: Shenandoah: region status should include
      update watermark
    + [backport] 8241574: Shenandoah: remove
      ShenandoahAssertToSpaceClosure
    + [backport] 8241583: Shenandoah: turn heap lock asserts into
      macros
    + [backport] 8241668: Shenandoah: make ShenandoahHeapRegion not
      derive from ContiguousSpace
    + [backport] 8241673: Shenandoah: refactor anti-false-sharing
      padding
    + [backport] 8241675: Shenandoah: assert(n-&gt;outcnt() &gt; 0) at
      shenandoahSupport.cpp:2858 with
      java/util/Collections/FindSubList.java
    + [backport] 8241692: Shenandoah: remove
      ShenandoahHeapRegion::_reserved
    + [backport] 8241700: Shenandoah: Fold
      ShenandoahKeepAliveBarrier flag into ShenandoahSATBBarrier
    + [backport] 8241740: Shenandoah: remove
      ShenandoahHeapRegion::_heap
    + [backport] 8241743: Shenandoah: refactor and inline
      ShenandoahHeap::heap()
    + [backport] 8241748: Shenandoah: inline MarkingContext TAMS
      methods
    + [backport] 8241838: Shenandoah: no need to trash cset during
      final mark
    + [backport] 8241841: Shenandoah: ditch one of allocation type
      counters in ShenandoahHeapRegion
    + [backport] 8241842: Shenandoah: inline
      ShenandoahHeapRegion::region_number
    + [backport] 8241844: Shenandoah: rename
      ShenandoahHeapRegion::region_number
    + [backport] 8241845: Shenandoah: align ShenandoahHeapRegions
      to cache lines
    + [backport] 8241926: Shenandoah: only print heap changes for
      operations that directly affect it
    + [backport] 8241983: Shenandoah: simplify FreeSet logging
    + [backport] 8241985: Shenandoah: simplify collectable garbage
      logging
    + [backport] 8242040: Shenandoah: print allocation failure type
    + [backport] 8242041: Shenandoah: adaptive heuristics should
      account evac reserve in free target
    + [backport] 8242042: Shenandoah: tune down
      ShenandoahGarbageThreshold
    + [backport] 8242054: Shenandoah: New incremental-update mode
    + [backport] 8242075: Shenandoah: rename
      ShenandoahHeapRegionSize flag
    + [backport] 8242082: Shenandoah: Purge Traversal mode
    + [backport] 8242083: Shenandoah: split 'Prepare Evacuation'
      tracking into cset/freeset counters
    + [backport] 8242089: Shenandoah: per-worker stats should be
      summed up, not averaged
    + [backport] 8242101: Shenandoah: coalesce and parallelise heap
      region walks during the pauses
    + [backport] 8242114: Shenandoah: remove
      ShenandoahHeapRegion::reset_alloc_metadata_to_shared
    + [backport] 8242130: Shenandoah: Simplify arraycopy-barrier
      dispatching
    + [backport] 8242211: Shenandoah: remove
      ShenandoahHeuristics::RegionData::_seqnum_last_alloc
    + [backport] 8242212: Shenandoah: initialize
      ShenandoahHeuristics::_region_data eagerly
    + [backport] 8242213: Shenandoah: remove
      ShenandoahHeuristics::_bytes_in_cset
    + [backport] 8242217: Shenandoah: Enable GC mode to be
      diagnostic/experimental and have a name
    + [backport] 8242227: Shenandoah: transit regions to cset state
      when adding to collection set
    + [backport] 8242228: Shenandoah: remove unused
      ShenandoahCollectionSet methods
    + [backport] 8242229: Shenandoah: inline ShenandoahHeapRegion
      liveness-related methods
    + [backport] 8242267: Shenandoah: regions space needs to be
      aligned by os::vm_allocation_granularity()
    + [backport] 8242271: Shenandoah: add test to verify GC mode
      unlock
    + [backport] 8242273: Shenandoah: accept either SATB or IU
      barriers, but not both
    + [backport] 8242301: Shenandoah: Inline LRB runtime call
    + [backport] 8242316: Shenandoah: Turn NULL-check into assert
      in SATB slow-path entry
    + [backport] 8242353: Shenandoah: micro-optimize region
      liveness handling
    + [backport] 8242365: Shenandoah: use uint16_t instead of
      jushort for liveness cache
    + [backport] 8242375: Shenandoah: Remove
      ShenandoahHeuristic::record_gc_start/end methods
    + [backport] 8242641: Shenandoah: clear live data and update
      TAMS optimistically
    + [backport] 8243238: Shenandoah: explicit GC request should
      wait for a complete GC cycle
    + [backport] 8243301: Shenandoah: ditch
      ShenandoahAllowMixedAllocs
    + [backport] 8243307: Shenandoah: remove
      ShCollectionSet::live_data
    + [backport] 8243395: Shenandoah: demote guarantee in
      ShenandoahPhaseTimings::record_workers_end
    + [backport] 8243463: Shenandoah: ditch total_pause counters
    + [backport] 8243464: Shenandoah: print statistic counters in
      time order
    + [backport] 8243465: Shenandoah: ditch unused pause_other,
      conc_other counters
    + [backport] 8243487: Shenandoah: make _num_phases illegal
      phase type
    + [backport] 8243494: Shenandoah: set counters once per cycle
    + [backport] 8243573: Shenandoah: rename GCParPhases and
      related code
    + [backport] 8243848: Shenandoah: Windows build fails after
      JDK-8239786
    + [backport] 8244180: Shenandoah: carry Phase to
      ShWorkerTimingsTracker explicitly
    + [backport] 8244200: Shenandoah: build breakages after
      JDK-8241743
    + [backport] 8244226: Shenandoah: per-cycle statistics contain
      worker data from previous cycles
    + [backport] 8244326: Shenandoah: global statistics should not
      accept bogus samples
    + [backport] 8244509: Shenandoah: refactor
      ShenandoahBarrierC2Support::test_* methods
    + [backport] 8244551: Shenandoah: Fix racy update of
      update_watermark
    + [backport] 8244667: Shenandoah: SBC2Support::test_gc_state
      takes loop for wrong control
    + [backport] 8244730: Shenandoah: gc/shenandoah/options/
      /TestHeuristicsUnlock.java should only verify the heuristics
    + [backport] 8244732: Shenandoah: move heuristics code to
      gc/shenandoah/heuristics
    + [backport] 8244737: Shenandoah: move mode code to
      gc/shenandoah/mode
    + [backport] 8244739: Shenandoah: break superclass dependency
      on ShenandoahNormalMode
    + [backport] 8244740: Shenandoah: rename ShenandoahNormalMode
      to ShenandoahSATBMode
    + [backport] 8245461: Shenandoah: refine mode name()-s
    + [backport] 8245463: Shenandoah: refine ShenandoahPhaseTimings
      constructor arguments
    + [backport] 8245464: Shenandoah: allocate collection set
      bitmap at lower addresses
    + [backport] 8245465: Shenandoah: test_in_cset can use more
      efficient encoding
    + [backport] 8245726: Shenandoah: lift/cleanup
      ShenandoahHeuristics names and properties
    + [backport] 8245754: Shenandoah: ditch ShenandoahAlwaysPreTouch
    + [backport] 8245757: Shenandoah: AlwaysPreTouch should not
      disable heap resizing or uncommits
    + [backport] 8245773: Shenandoah: Windows assertion failure
      after JDK-8245464
    + [backport] 8245812: Shenandoah: compute root phase parallelism
    + [backport] 8245814: Shenandoah: reconsider format specifiers
      for stats
    + [backport] 8245825: Shenandoah: Remove diagnostic flag
      ShenandoahConcurrentScanCodeRoots
    + [backport] 8246162: Shenandoah: full GC does not mark code
      roots when class unloading is off
    + [backport] 8247310: Shenandoah: pacer should not affect
      interrupt status
    + [backport] 8247358: Shenandoah: reconsider free budget slice
      for marking
    + [backport] 8247367: Shenandoah: pacer should wait on lock
      instead of exponential backoff
    + [backport] 8247474: Shenandoah: Windows build warning after
      JDK-8247310
    + [backport] 8247560: Shenandoah: heap iteration holds root
      locks all the time
    + [backport] 8247593: Shenandoah: should not block pacing
      reporters
    + [backport] 8247751: Shenandoah: options tests should run with
      smaller heaps
    + [backport] 8247754: Shenandoah: mxbeans tests can be shorter
    + [backport] 8247757: Shenandoah: split heavy tests by
      heuristics to improve parallelism
    + [backport] 8247860: Shenandoah: add update watermark line in
      rich assert failure message
    + [backport] 8248041: Shenandoah: pre-Full GC root updates may
      miss some roots
    + [backport] 8248652: Shenandoah: SATB buffer handling may
      assume no forwarded objects
    + [backport] 8249560: Shenandoah: Fix racy GC request handling
    + [backport] 8249649: Shenandoah: provide per-cycle pacing stats
    + [backport] 8249801: Shenandoah: Clear soft-refs on requested
      GC cycle
    + [backport] 8249953: Shenandoah: gc/shenandoah/mxbeans tests
      should account for corner cases
    + Fix slowdebug build after JDK-8230853 backport
    + JDK-8252096: Shenandoah: adjust SerialPageShiftCount for
      x86_32 and JFR
    + JDK-8252366: Shenandoah: revert/cleanup changes in
      graphKit.cpp
    + Shenandoah: add JFR roots to root processor after JFR
      integration
    + Shenandoah: add root statistics for string dedup table/queues
    + Shenandoah: enable low-frequency STW class unloading
    + Shenandoah: fix build failures after JDK-8244737 backport
    + Shenandoah: Fix build failure with +JFR -PCH
    + Shenandoah: fix forceful pacer claim
    + Shenandoah: fix formats in
      ShenandoahStringSymbolTableUnlinkTask
    + Shenandoah: fix runtime linking failure due to non-compiled
      shenandoahBarrierSetC1
    + Shenandoah: hook statistics printing to PrintGCDetails, not
      PrintGC
    + Shenandoah: JNI weak roots are always cleared before Full GC
      mark
    + Shenandoah: missing SystemDictionary roots in
      ShenandoahHeapIterationRootScanner
    + Shenandoah: move barrier sets to their proper locations
    + Shenandoah: move parallelCleaning.* to shenandoah/
    + Shenandoah: pacer should use proper Atomics for intptr_t
    + Shenandoah: properly deallocates class loader metadata
    + Shenandoah: specialize String Table scans for better pause
      performance
    + Shenandoah: Zero build fails after recent Atomic cleanup in
      Pacer
  * AArch64 port
    + JDK-8161072, PR3797: AArch64: jtreg
      compiler/uncommontrap/TestDeoptOOM failure
    + JDK-8171537, PR3797: aarch64: compiler/c1/Test6849574.java
      generates guarantee failure in C1
    + JDK-8183925, PR3797: [AArch64] Decouple crash protection from
      watcher thread
    + JDK-8199712, PR3797: [AArch64] Flight Recorder
    + JDK-8203481, PR3797: Incorrect constraint for unextended_sp
      in frame:safe_for_sender
    + JDK-8203699, PR3797: java/lang/invoke/SpecialInterfaceCall
      fails with SIGILL on aarch64
    + JDK-8209413, PR3797: AArch64: NPE in clhsdb jstack command
    + JDK-8215961, PR3797: jdk/jfr/event/os/TestCPUInformation.java
      fails on AArch64
    + JDK-8216989, PR3797:
      CardTableBarrierSetAssembler::gen_write_ref_array_post_barrier()
      does not check for zero length on AARCH64
    + JDK-8217368, PR3797: AArch64: C2 recursive stack locking
      optimisation not triggered
    + JDK-8221658, PR3797: aarch64: add necessary predicate for
      ubfx patterns
    + JDK-8237512, PR3797: AArch64: aarch64TestHook leaks a
      BufferBlob
    + JDK-8246482, PR3797: Build failures with +JFR -PCH
    + JDK-8247979, PR3797: aarch64: missing side effect of killing
      flags for clearArray_reg_reg
    + JDK-8248219, PR3797: aarch64: missing memory barrier in
      fast_storefield and fast_accessfield

- Ignore whitespaces after the header or footer in PEM X.509 cert
  (bsc#1171352)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531493" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531494" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531495" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531496" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148949" version="1" class="patch">
	<metadata>
		<title>Security update for gcc10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1172798" ref_url="https://bugzilla.suse.com/1172798" source="BUGZILLA"/>
		<reference ref_id="1172846" ref_url="https://bugzilla.suse.com/1172846" source="BUGZILLA"/>
		<reference ref_id="1173972" ref_url="https://bugzilla.suse.com/1173972" source="BUGZILLA"/>
		<reference ref_id="1174753" ref_url="https://bugzilla.suse.com/1174753" source="BUGZILLA"/>
		<reference ref_id="1174817" ref_url="https://bugzilla.suse.com/1174817" source="BUGZILLA"/>
		<reference ref_id="1175168" ref_url="https://bugzilla.suse.com/1175168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007739.html" source="SUSE-SU"/>
		<description>
This update for gcc10 fixes the following issues:
This update provides the GCC10 compiler suite and runtime libraries.

The base SUSE Linux Enterprise libraries libgcc_s1, libstdc++6 are replaced by
the gcc10 variants.

The new compiler variants are available with '-10' suffix, you can specify them
via:

        CC=gcc-10
        CXX=g++-10

or similar commands.

For a detailed changelog check out https://gcc.gnu.org/gcc-10/changes.html
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-10"/>
	<updated date="2020-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172798">SUSE bug 1172798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172846">SUSE bug 1172846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173972">SUSE bug 1173972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174753">SUSE bug 1174753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174817">SUSE bug 1174817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175168">SUSE bug 1175168</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13844">CVE-2020-13844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531497" comment="libasan6-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531498" comment="libasan6-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531499" comment="libatomic1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531500" comment="libatomic1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531501" comment="libgcc_s1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531502" comment="libgcc_s1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531503" comment="libgfortran5-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531504" comment="libgfortran5-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531505" comment="libgo16-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531506" comment="libgo16-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531507" comment="libgomp1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531508" comment="libgomp1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531509" comment="libitm1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531510" comment="libitm1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531511" comment="liblsan0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531512" comment="libobjc4-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531513" comment="libobjc4-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531514" comment="libquadmath0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531515" comment="libquadmath0-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531516" comment="libstdc++6-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531517" comment="libstdc++6-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531518" comment="libstdc++6-locale-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531519" comment="libstdc++6-pp-gcc10-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531520" comment="libstdc++6-pp-gcc10-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531521" comment="libtsan0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531522" comment="libubsan1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531523" comment="libubsan1-32bit-10.2.1+git583-1.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148950" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007757.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Intel CPU Microcode updated to 20201027 prerelease 
- CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) (bsc#1170446)
- CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)

# New Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  # Updated Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531524" comment="ucode-intel-20201027-13.76.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148951" version="1" class="patch">
	<metadata>
		<title>Security update for ansible, ardana-ansible, ardana-cinder, ardana-glance, ardana-mq, ardana-nova, ardana-osconfig, crowbar-core, crowbar-openstack, documentation-suse-openstack-cloud, grafana, grafana-natel-discrete-panel, openstack-cinder, openstack-monasca-installer, openstack-neutron, openstack-nova, python-Django, python-Flask-Cors, python-Pillow, python-ardana-packager, python-keystoneclient, python-keystonemiddleware, python-kombu, python-straight-plugin, python-urllib3, release-notes-suse-openstack-cloud, storm, storm-kit, venv-openstack-cinder, venv-openstack-swift (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1008037" ref_url="https://bugzilla.suse.com/1008037" source="BUGZILLA"/>
		<reference ref_id="1008038" ref_url="https://bugzilla.suse.com/1008038" source="BUGZILLA"/>
		<reference ref_id="1010940" ref_url="https://bugzilla.suse.com/1010940" source="BUGZILLA"/>
		<reference ref_id="1019021" ref_url="https://bugzilla.suse.com/1019021" source="BUGZILLA"/>
		<reference ref_id="1038785" ref_url="https://bugzilla.suse.com/1038785" source="BUGZILLA"/>
		<reference ref_id="1056094" ref_url="https://bugzilla.suse.com/1056094" source="BUGZILLA"/>
		<reference ref_id="1059235" ref_url="https://bugzilla.suse.com/1059235" source="BUGZILLA"/>
		<reference ref_id="1080682" ref_url="https://bugzilla.suse.com/1080682" source="BUGZILLA"/>
		<reference ref_id="1097775" ref_url="https://bugzilla.suse.com/1097775" source="BUGZILLA"/>
		<reference ref_id="1102126" ref_url="https://bugzilla.suse.com/1102126" source="BUGZILLA"/>
		<reference ref_id="1109957" ref_url="https://bugzilla.suse.com/1109957" source="BUGZILLA"/>
		<reference ref_id="1112959" ref_url="https://bugzilla.suse.com/1112959" source="BUGZILLA"/>
		<reference ref_id="1117080" ref_url="https://bugzilla.suse.com/1117080" source="BUGZILLA"/>
		<reference ref_id="1118896" ref_url="https://bugzilla.suse.com/1118896" source="BUGZILLA"/>
		<reference ref_id="1123561" ref_url="https://bugzilla.suse.com/1123561" source="BUGZILLA"/>
		<reference ref_id="1126503" ref_url="https://bugzilla.suse.com/1126503" source="BUGZILLA"/>
		<reference ref_id="1137479" ref_url="https://bugzilla.suse.com/1137479" source="BUGZILLA"/>
		<reference ref_id="1137528" ref_url="https://bugzilla.suse.com/1137528" source="BUGZILLA"/>
		<reference ref_id="1142121" ref_url="https://bugzilla.suse.com/1142121" source="BUGZILLA"/>
		<reference ref_id="1142542" ref_url="https://bugzilla.suse.com/1142542" source="BUGZILLA"/>
		<reference ref_id="1144453" ref_url="https://bugzilla.suse.com/1144453" source="BUGZILLA"/>
		<reference ref_id="1153452" ref_url="https://bugzilla.suse.com/1153452" source="BUGZILLA"/>
		<reference ref_id="1154231" ref_url="https://bugzilla.suse.com/1154231" source="BUGZILLA"/>
		<reference ref_id="1154232" ref_url="https://bugzilla.suse.com/1154232" source="BUGZILLA"/>
		<reference ref_id="1154830" ref_url="https://bugzilla.suse.com/1154830" source="BUGZILLA"/>
		<reference ref_id="1157968" ref_url="https://bugzilla.suse.com/1157968" source="BUGZILLA"/>
		<reference ref_id="1157969" ref_url="https://bugzilla.suse.com/1157969" source="BUGZILLA"/>
		<reference ref_id="1159447" ref_url="https://bugzilla.suse.com/1159447" source="BUGZILLA"/>
		<reference ref_id="1161919" ref_url="https://bugzilla.suse.com/1161919" source="BUGZILLA"/>
		<reference ref_id="1164133" ref_url="https://bugzilla.suse.com/1164133" source="BUGZILLA"/>
		<reference ref_id="1164134" ref_url="https://bugzilla.suse.com/1164134" source="BUGZILLA"/>
		<reference ref_id="1164135" ref_url="https://bugzilla.suse.com/1164135" source="BUGZILLA"/>
		<reference ref_id="1164136" ref_url="https://bugzilla.suse.com/1164136" source="BUGZILLA"/>
		<reference ref_id="1164137" ref_url="https://bugzilla.suse.com/1164137" source="BUGZILLA"/>
		<reference ref_id="1164138" ref_url="https://bugzilla.suse.com/1164138" source="BUGZILLA"/>
		<reference ref_id="1164139" ref_url="https://bugzilla.suse.com/1164139" source="BUGZILLA"/>
		<reference ref_id="1164140" ref_url="https://bugzilla.suse.com/1164140" source="BUGZILLA"/>
		<reference ref_id="1165022" ref_url="https://bugzilla.suse.com/1165022" source="BUGZILLA"/>
		<reference ref_id="1165393" ref_url="https://bugzilla.suse.com/1165393" source="BUGZILLA"/>
		<reference ref_id="1166389" ref_url="https://bugzilla.suse.com/1166389" source="BUGZILLA"/>
		<reference ref_id="1167440" ref_url="https://bugzilla.suse.com/1167440" source="BUGZILLA"/>
		<reference ref_id="1167532" ref_url="https://bugzilla.suse.com/1167532" source="BUGZILLA"/>
		<reference ref_id="1171162" ref_url="https://bugzilla.suse.com/1171162" source="BUGZILLA"/>
		<reference ref_id="1171823" ref_url="https://bugzilla.suse.com/1171823" source="BUGZILLA"/>
		<reference ref_id="1172450" ref_url="https://bugzilla.suse.com/1172450" source="BUGZILLA"/>
		<reference ref_id="1173413" ref_url="https://bugzilla.suse.com/1173413" source="BUGZILLA"/>
		<reference ref_id="1173416" ref_url="https://bugzilla.suse.com/1173416" source="BUGZILLA"/>
		<reference ref_id="1173418" ref_url="https://bugzilla.suse.com/1173418" source="BUGZILLA"/>
		<reference ref_id="1174006" ref_url="https://bugzilla.suse.com/1174006" source="BUGZILLA"/>
		<reference ref_id="1174145" ref_url="https://bugzilla.suse.com/1174145" source="BUGZILLA"/>
		<reference ref_id="1174242" ref_url="https://bugzilla.suse.com/1174242" source="BUGZILLA"/>
		<reference ref_id="1174302" ref_url="https://bugzilla.suse.com/1174302" source="BUGZILLA"/>
		<reference ref_id="1174583" ref_url="https://bugzilla.suse.com/1174583" source="BUGZILLA"/>
		<reference ref_id="1175484" ref_url="https://bugzilla.suse.com/1175484" source="BUGZILLA"/>
		<reference ref_id="1175986" ref_url="https://bugzilla.suse.com/1175986" source="BUGZILLA"/>
		<reference ref_id="1175993" ref_url="https://bugzilla.suse.com/1175993" source="BUGZILLA"/>
		<reference ref_id="1177120" ref_url="https://bugzilla.suse.com/1177120" source="BUGZILLA"/>
		<reference ref_id="1177948" ref_url="https://bugzilla.suse.com/1177948" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8614" ref_url="https://www.suse.com/security/cve/CVE-2016-8614/" source="CVE"/>
		<reference ref_id="CVE-2016-8628" ref_url="https://www.suse.com/security/cve/CVE-2016-8628/" source="CVE"/>
		<reference ref_id="CVE-2016-8647" ref_url="https://www.suse.com/security/cve/CVE-2016-8647/" source="CVE"/>
		<reference ref_id="CVE-2016-9587" ref_url="https://www.suse.com/security/cve/CVE-2016-9587/" source="CVE"/>
		<reference ref_id="CVE-2017-7466" ref_url="https://www.suse.com/security/cve/CVE-2017-7466/" source="CVE"/>
		<reference ref_id="CVE-2017-7550" ref_url="https://www.suse.com/security/cve/CVE-2017-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-10875" ref_url="https://www.suse.com/security/cve/CVE-2018-10875/" source="CVE"/>
		<reference ref_id="CVE-2018-11779" ref_url="https://www.suse.com/security/cve/CVE-2018-11779/" source="CVE"/>
		<reference ref_id="CVE-2018-16837" ref_url="https://www.suse.com/security/cve/CVE-2018-16837/" source="CVE"/>
		<reference ref_id="CVE-2018-16859" ref_url="https://www.suse.com/security/cve/CVE-2018-16859/" source="CVE"/>
		<reference ref_id="CVE-2018-16876" ref_url="https://www.suse.com/security/cve/CVE-2018-16876/" source="CVE"/>
		<reference ref_id="CVE-2018-18623" ref_url="https://www.suse.com/security/cve/CVE-2018-18623/" source="CVE"/>
		<reference ref_id="CVE-2018-18624" ref_url="https://www.suse.com/security/cve/CVE-2018-18624/" source="CVE"/>
		<reference ref_id="CVE-2018-18625" ref_url="https://www.suse.com/security/cve/CVE-2018-18625/" source="CVE"/>
		<reference ref_id="CVE-2019-0202" ref_url="https://www.suse.com/security/cve/CVE-2019-0202/" source="CVE"/>
		<reference ref_id="CVE-2019-10156" ref_url="https://www.suse.com/security/cve/CVE-2019-10156/" source="CVE"/>
		<reference ref_id="CVE-2019-10206" ref_url="https://www.suse.com/security/cve/CVE-2019-10206/" source="CVE"/>
		<reference ref_id="CVE-2019-10217" ref_url="https://www.suse.com/security/cve/CVE-2019-10217/" source="CVE"/>
		<reference ref_id="CVE-2019-14846" ref_url="https://www.suse.com/security/cve/CVE-2019-14846/" source="CVE"/>
		<reference ref_id="CVE-2019-14856" ref_url="https://www.suse.com/security/cve/CVE-2019-14856/" source="CVE"/>
		<reference ref_id="CVE-2019-14858" ref_url="https://www.suse.com/security/cve/CVE-2019-14858/" source="CVE"/>
		<reference ref_id="CVE-2019-14864" ref_url="https://www.suse.com/security/cve/CVE-2019-14864/" source="CVE"/>
		<reference ref_id="CVE-2019-14904" ref_url="https://www.suse.com/security/cve/CVE-2019-14904/" source="CVE"/>
		<reference ref_id="CVE-2019-14905" ref_url="https://www.suse.com/security/cve/CVE-2019-14905/" source="CVE"/>
		<reference ref_id="CVE-2019-19844" ref_url="https://www.suse.com/security/cve/CVE-2019-19844/" source="CVE"/>
		<reference ref_id="CVE-2019-3828" ref_url="https://www.suse.com/security/cve/CVE-2019-3828/" source="CVE"/>
		<reference ref_id="CVE-2020-10177" ref_url="https://www.suse.com/security/cve/CVE-2020-10177/" source="CVE"/>
		<reference ref_id="CVE-2020-10378" ref_url="https://www.suse.com/security/cve/CVE-2020-10378/" source="CVE"/>
		<reference ref_id="CVE-2020-10684" ref_url="https://www.suse.com/security/cve/CVE-2020-10684/" source="CVE"/>
		<reference ref_id="CVE-2020-10685" ref_url="https://www.suse.com/security/cve/CVE-2020-10685/" source="CVE"/>
		<reference ref_id="CVE-2020-10691" ref_url="https://www.suse.com/security/cve/CVE-2020-10691/" source="CVE"/>
		<reference ref_id="CVE-2020-10729" ref_url="https://www.suse.com/security/cve/CVE-2020-10729/" source="CVE"/>
		<reference ref_id="CVE-2020-10744" ref_url="https://www.suse.com/security/cve/CVE-2020-10744/" source="CVE"/>
		<reference ref_id="CVE-2020-10994" ref_url="https://www.suse.com/security/cve/CVE-2020-10994/" source="CVE"/>
		<reference ref_id="CVE-2020-11110" ref_url="https://www.suse.com/security/cve/CVE-2020-11110/" source="CVE"/>
		<reference ref_id="CVE-2020-14330" ref_url="https://www.suse.com/security/cve/CVE-2020-14330/" source="CVE"/>
		<reference ref_id="CVE-2020-14332" ref_url="https://www.suse.com/security/cve/CVE-2020-14332/" source="CVE"/>
		<reference ref_id="CVE-2020-14365" ref_url="https://www.suse.com/security/cve/CVE-2020-14365/" source="CVE"/>
		<reference ref_id="CVE-2020-1733" ref_url="https://www.suse.com/security/cve/CVE-2020-1733/" source="CVE"/>
		<reference ref_id="CVE-2020-1734" ref_url="https://www.suse.com/security/cve/CVE-2020-1734/" source="CVE"/>
		<reference ref_id="CVE-2020-1735" ref_url="https://www.suse.com/security/cve/CVE-2020-1735/" source="CVE"/>
		<reference ref_id="CVE-2020-1736" ref_url="https://www.suse.com/security/cve/CVE-2020-1736/" source="CVE"/>
		<reference ref_id="CVE-2020-1737" ref_url="https://www.suse.com/security/cve/CVE-2020-1737/" source="CVE"/>
		<reference ref_id="CVE-2020-17376" ref_url="https://www.suse.com/security/cve/CVE-2020-17376/" source="CVE"/>
		<reference ref_id="CVE-2020-1738" ref_url="https://www.suse.com/security/cve/CVE-2020-1738/" source="CVE"/>
		<reference ref_id="CVE-2020-1739" ref_url="https://www.suse.com/security/cve/CVE-2020-1739/" source="CVE"/>
		<reference ref_id="CVE-2020-1740" ref_url="https://www.suse.com/security/cve/CVE-2020-1740/" source="CVE"/>
		<reference ref_id="CVE-2020-1746" ref_url="https://www.suse.com/security/cve/CVE-2020-1746/" source="CVE"/>
		<reference ref_id="CVE-2020-1753" ref_url="https://www.suse.com/security/cve/CVE-2020-1753/" source="CVE"/>
		<reference ref_id="CVE-2020-25032" ref_url="https://www.suse.com/security/cve/CVE-2020-25032/" source="CVE"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<reference ref_id="CVE-2020-7471" ref_url="https://www.suse.com/security/cve/CVE-2020-7471/" source="CVE"/>
		<reference ref_id="CVE-2020-9402" ref_url="https://www.suse.com/security/cve/CVE-2020-9402/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<description>
This update for ansible, ardana-ansible, ardana-cinder, ardana-glance, ardana-mq, ardana-nova, ardana-osconfig, crowbar-core, crowbar-openstack, documentation-suse-openstack-cloud, grafana, grafana-natel-discrete-panel, openstack-cinder, openstack-monasca-installer, openstack-neutron, openstack-nova, python-Django, python-Flask-Cors, python-Pillow, python-ardana-packager, python-keystoneclient, python-keystonemiddleware, python-kombu, python-straight-plugin, python-urllib3, release-notes-suse-openstack-cloud, storm, storm-kit, venv-openstack-cinder, venv-openstack-swift contains the following fixes:

Security fixes included in this update:
ansible to 2.9.14:
- CVE-2020-1733: Fixed insecure temporary directory when running
become_user (bsc#1164140).
 - CVE-2020-1753: Kubectl connection plugin - connection plugin now
redact kubectl_token and kubectl_password in console log. (bsc#1166389)
 - CVE-2020-14365: Previously, regardless of the disable_gpg_check
option, packages were not GPG validated. They are now. (bsc#1175993)
 - CVE-2020-14332: copy - Redact the value of the no_log 'content'
parameter in the result's invocation.module_args in check mode.
Previously when used with check mode and with '-vvv', the module would
not censor the content if a change would be made to the destination
path. (bsc#1174302)
 - CVE-2020-1736: atomic_move - Change default permissions when creating
temporary files so they are not world readable (bsc#1164134).
 - CVE-2020-14330: Sanitize no_log values from any response keys that
might be returned from the uri module (bsc#1174145).
 - CVE-2019-14846: Reset logging level to INFO. (bsc#1153452).
 - CVE-2020-10744: incomplete fix for CVE-2020-1733 (bsc#1171823).

grafana:
- CVE-2018-18623, CVE-2018-18624,CVE-2018-18625: Fixed multiple XSS 
  vulnerabilities in dashboard due to a incomplete fix for CVE-2018-12099
  (bsc#1172450).
- CVE-2020-11110: Fixed a stored XSS (bsc#1174583).

openstack-nova:
- CVE-2020-17376: Fixed an information leak during live migration (bsc#1175484).

python-Django to 1.11.29
- CVE-2020-7471: Fixed a SQL injection via StringAgg delimiter (bsc#1161919).
- CVE-2020-9402: Fixed a SQL injection via tolerance parameter in GIS functions 
  and aggregates (bsc#1165022).
- CVE-2019-19844: Fixed a potential account hijack via password reset form (bsc#1159447).

python-Flask-Cors
- CVE-2020-25032: Fixed a potential information leak through path traversal (bsc#1175986).

python-Pillow
- CVE-2020-10177: Fixed multiple out-of-bounds reads in libImaging/FliDecode.c (bsc#1173413).
- CVE-2020-10994: Fixed multiple out-of-bounds reads via a crafted JP2 files (bsc#1173418).
- CVE-2020-10378: Fixed an out-of-bounds read when reading PCX files (bsc#1173416).

python-urllib3
- CVE-2020-26137: Fixed CRLF injection via HTTP request method (bsc#1177120)

storm:
- CVE-2018-11779: Fixed java deserialization vulnerability related to the usage of 
  storm-kafka-client or storm-kafka modules (bsc#1143163).
- CVE-2019-0202: Fixed an information leak related to the log viewer (bsc#1142617).

rubygem-crowbar-client update to 3.9.3:
- CVE-2018-17954: Fixed information leak of the admin password to all
nodes in cleartext during provisioning (bsc#1117080)

Non-security fixes included on this update:

Changes in ansible:
- Update to ansible 2.9.14:
  - minor bugs and fixes, including security bugs:
    - CVE-2020-1753, bsc#1166389: Kubectl connection plugin - connection
      plugin now redact kubectl_token and kubectl_password in console
      log.
    - revert CVE-2020-1736. Users are encouraged to specify a mode
      parameter in their file-based tasks when the files being
      manipulated contain sensitive data.
    - CVE-2020-14365, bsc#1175993: Previously, regardless of the
      disable_gpg_check option, packages were not GPG validated. They
      are now.
    - CVE-2020-14332, bsc#1174302: copy - Redact the value of the no_log
      'content' parameter in the result's invocation.module_args in
      check mode. Previously when used with check mode and with '-vvv',
      the module would not censor the content if a change would be made
      to the destination path.
    - CVE-2020-1736, bsc#1164134: atomic_move - Change default
      permissions when creating temporary files so they are not world
      readable
    - CVE-2020-14330, bsc#1174145: Sanitize no_log values from any
      response keys that might be returned from the uri module.
    - CVE-2019-14846, bsc#1153452: Reset logging level to INFO.
    - CVE-2020-10744, bsc#1171823, gh#ansible/ansible#69782: incomplete
      fix for CVE-2020-1733
- Remove patches included upstream:
  - CVE-2020-14330_exposed_keys_uri_mod.patch
  - CVE-2020-10744_avoid_mkdir_p.patch
- Don't Require python-coverage, it is needed only for testing
  (bsc#1177948).

- Add CVE-2020-14330_exposed_keys_uri_mod.patch which fixes
  CVE-2020-14330 (bsc#1174145). Sanitize no_log values from any
  response keys that might be returned from the uri module. 
  Sensitive values marked with ``no_log=True`` will automatically
  have that value stripped from module return values. If
  your module could return these sensitive values as
  part of a dictionary key name, you should call the
  ``ansible.module_utils.basic.sanitize_keys()`` function to
  strip the values from the keys. See the ``uri`` module for an
  example.

- importlib and argparse are required only on SLE-11 and less.

- Add CVE-2020-10744_avoid_mkdir_p.patch (bsc#1171823) to fix
  insecure temporary directory creation.

- Add metadata information to this file to mark which SUSE
  bugzilla have been already fixed.
- Remove CVE-2017-7550-jenkins-disallow-password-in-params.patch
  as it has been already included in 2.4.1.0

- update to version 2.9.9
  * fix for a regression introduced in 2.9.8

- update to version 2.9.8
  maintenance release containing numerous bugfixes

- update to version 2.9.7 with many bug fixes,
  especially for these security issues:
  - bsc#1164140 CVE-2020-1733 - insecure temporary directory when
    running become_user from become directive
  - bsc#1164139 CVE-2020-1734 shell enabled by default in a pipe
    lookup plugin subprocess
  - bsc#1164137 CVE-2020-1735 - path injection on dest parameter
    in fetch module
  - bsc#1164134 CVE-2020-1736 atomic_move primitive sets
    permissive permissions
  - bsc#1164138 CVE-2020-1737 - Extract-Zip function in win_unzip
    module does not check extracted path
  - bsc#1164136 CVE-2020-1738 module package can be selected by
    the ansible facts
  - bsc#1164133 CVE-2020-1739  - svn module leaks password when
    specified as a parameter
  - bsc#1164135 CVE-2020-1740 - secrets readable after
    ansible-vault edit
  - bsc#1165393 CVE-2020-1746 - information disclosure issue in
    ldap_attr and ldap_entry modules
  - bsc#1166389 CVE-2020-1753 - kubectl connection plugin leaks
    sensitive information
  - bsc#1167532 CVE-2020-10684 - code injection when using
    ansible_facts as a subkey
  - bsc#1167440 CVE-2020-10685 - modules which use files
    encrypted with vault are not properly cleaned up
  - CVE-2020-10691 - archive traversal vulnerability in ansible-galaxy collection install [2]

- create missing (empty) template and files directories for 
  'ansible-galaxy init' during package build (fixes boo#1137479)
- require python-xml on python 2 systems (boo#1142542)

- update to version 2.9.6 (maintenance release) including
  these security issues:
  - bsc#1171162 CVE-2020-10729 two random password lookups in
    same task return same value

- update to version 2.9.5 (maintenance release)

- update to version 2.9.4 (maintenance release)
  - fix in yum module
  - security fixes:
    - bsc#1157968 CVE-2019-14904 vulnerability in solaris_zone
      module via crafted solaris zone
    - bsc#1157969 CVE-2019-14905 malicious code could craft
      filename in nxos_file_copy module

- update to version 2.9.3 (maintenance release)
  * security fixes
    - CVE-2019-14904 (solaris_zone module) (boo#1157968)
    - CVE-2019-14905 (nxos_file_copy module) (boo#1157969)
  * various bugfixes

- sync with upstream spec file (especially for RHEL &amp; Fedora builds)
- ran spec-cleaner
- remove old SUSE targets (SLE-11, Leap 42.3 and below)
  This simplifies the spec file and makes building easier
- Additional required packages for building:
  + python-boto3 and python-botocore for Amazon EC2
  + python-jmespath for json queries
  + python-memcached for cloud modules and local caching of JSON 
    formatted, per host records
  + python-redis for cloud modules and local caching of JSON 
    formatted, per host records
  + python-requests for many web-based modules (cloud, network, 
    netapp)
  =&gt; as the need for those packages depends on the usage of the 
     tool, they are just recommended on openSUSE/SUSE machines
- made dependencies for gitlab, vmware and winrm modules configurable,
  as most of their dependencies are not (yet) available on current 
  openSUSE/SUSE distributions
- exclude /usr/bin/pwsh from the automatic dependency generation, 
  as the Windows Power Shell is not available (yet) on openSUSE/SUSE
- build additional docs and split up ansible-doc package; 
  moving changelogs, contrib and example directories there
- prepare for building HTML documentation, but disable this per 
  default for the moment, as not all package dependencies are available
  in openSUSE/SUSE (yet)
- package some test scripts with executable permissions

- update to version 2.9.2
  maintenance release containing numerous bugfixes

- Create system directories that Ansible defines as default locations 
  in ansible/config/base.yml
- rephrase the summary line 
- Disable shebang munging for specific paths. These files are data files.
  ansible-test munges the shebangs itself.

- split out ansible-test package for module developers

- update to version 2.9.1
  Full changelog is packaged at /usr/share/doc/packages/ansible/changelogs/
  and also available online at
  https://github.com/ansible/ansible/blob/stable-2.9/changelogs/CHANGELOG-v2.9.rst
  + CVE-2019-14864: fixed Splunk and Sumologic callback plugins leak 
    sensitive data in logs (boo#1154830)
- replace all #!/usr/bin/env lines to use #!/usr/bin/$1 directly

- added file '/usr/bin/ansible-test' to spec file

- Update to version 2.9.0:
  Full changelog is packaged at /usr/share/doc/packages/ansible/changelogs/
  and also available online at
  https://github.com/ansible/ansible/blob/stable-2.9/changelogs/CHANGELOG-v2.9.rst
- Fixed among other this security bug:
  - bsc#1112959 CVE-2018-16837 Information leak in 'user' module patch added

- include the sha checksum file in the source, which allows to verify
  the original sources

- Update to version 2.8.6:
  Full changelog is packaged at /usr/share/doc/packages/ansible/changelogs/
  and also available online at
  https://github.com/ansible/ansible/blob/stable-2.8/changelogs/CHANGELOG-v2.8.rst
  Included security fixes:
  * CVE-2019-14846: Fixed secrets disclosure on logs due to display is hardcoded
    to DEBUG level (bsc#1153452)
  * CVE-2019-14856: Fixed insufficient fix for CVE-2019-10206 (bsc#1154232)
  * CVE-2019-14858: Fixed data in the sub parameter fields that will not be masked
    and will be displayed when run with increased verbosity (bsc#1154231) 

- Update to version 2.8.5:
  Full changelog is packaged at /usr/share/doc/packages/ansible/changelogs/
  and also available online at
  https://github.com/ansible/ansible/blob/stable-2.8/changelogs/CHANGELOG-v2.8.rst
- removed patches fixed upstream:
  + CVE-2019-10206-data-disclosure.patch
  + CVE-2019-10217-gcp-modules-sensitive-fields.patch

- Update to version 2.8.3:
  Full changelog is packaged, but also at
  https://github.com/ansible/ansible/blob/stable-2.8/changelogs/CHANGELOG-v2.8.rst
  - (bsc#1137528) CVE-2019-10156: ansible: templating causing an
    unexpected key file to be set on remote node
- (bsc#1144453) Adds CVE-2019-10217-gcp-modules-sensitive-fields.patch
  CVE-2019-10217: Fields managing sensitive data should be set as
  such by no_log feature. Some of these fields in GCP modules are
  not set properly. service_account_contents() which is common
  class for all gcp modules is not setting no_log to True. Any
  sensitive data managed by that function would be leak as an
  output when running ansible playbooks.

- Update to version 2.8.1
  Full changelog is at /usr/share/doc/packages/ansible/changelogs/
  Bugfixes
  --------
  - ACI - DO not encode query_string
  - ACI modules - Fix non-signature authentication
  - Add missing directory provided via ``--playbook-dir`` to adjacent collection loading
  - Fix 'Interface not found' errors when using eos_l2_interface with nonexistant
    interfaces configured
  - Fix cannot get credential when `source_auth` set to `credential_file`.
  - Fix netconf_config backup string issue
  - Fix privilege escalation support for the docker connection plugin when
    credentials need to be supplied (e.g. sudo with password).
  - Fix vyos cli prompt inspection
  - Fixed loading namespaced documentation fragments from collections.
  - Fixing bug came up after running cnos_vrf module against coverity.
  - Properly handle data importer failures on PVC creation, instead of timing out.
  - To fix the ios static route TC failure in CI
  - To fix the nios member module params
  - To fix the nios_zone module idempotency failure
  - add terminal initial prompt for initial connection
  - allow include_role to work with ansible command
  - allow python_requirements_facts to report on dependencies containing dashes
  - asa_config fix
  - azure_rm_roledefinition - fix a small error in build scope.
  - azure_rm_virtualnetworkpeering - fix cross subscriptions virtual network
    peering.
  - cgroup_perf_recap - When not using file_per_task, make sure we don't
    prematurely close the perf files
  - display underlying error when reporting an invalid ``tasks:`` block.
  - dnf - fix wildcard matching for state: absent
  - docker connection plugin - accept version ``dev`` as 'newest version' and
    print warning.
  - docker_container - ``oom_killer`` and ``oom_score_adj`` options are available
    since docker-py 1.8.0, not 2.0.0 as assumed by the version check.
  - docker_container - fix network creation when ``networks_cli_compatible`` is
    enabled.
  - docker_container - use docker API's ``restart`` instead of ``stop``/``start``
    to restart a container.
  - docker_image - if ``build`` was not specified, the wrong default for
    ``build.rm`` is used.
  - docker_image - if ``nocache`` set to ``yes`` but not ``build.nocache``, the
    module failed.
  - docker_image - module failed when ``source: build`` was set but
    ``build.path`` options not specified.
  - docker_network module - fix idempotency when using ``aux_addresses`` in
    ``ipam_config``.
  - ec2_instance - make Name tag idempotent
  - eos: don't fail modules without become set, instead show message and continue
  - eos_config: check for session support when asked to 'diff_against: session'
  - eos_eapi: fix idempotency issues when vrf was unspecified.
  - fix bugs for ce - more info see
  - fix incorrect uses of to_native that should be to_text instead.
  - hcloud_volume - Fix idempotency when attaching a server to a volume.
  - ibm_storage - Added a check for null fields in ibm_storage utils module.
  - include_tasks - whitelist ``listen`` as a valid keyword
  - k8s - resource updates applied with force work correctly now
  - keep results subset also when not no_log.
  - meraki_switchport - improve reliability with native VLAN functionality.
  - netapp_e_iscsi_target - fix netapp_e_iscsi_target chap secret size and
    clearing functionality
  - netapp_e_volumes - fix workload profileId indexing when no previous workload
    tags exist on the storage array.
  - nxos_acl some platforms/versions raise when no ACLs are present
  - nxos_facts fix &lt;https://github.com/ansible/ansible/pull/57009&gt;
  - nxos_file_copy fix passwordless workflow
  - nxos_interface Fix admin_state check for n6k
  - nxos_snmp_traps fix group all for N35 platforms
  - nxos_snmp_user fix platform fixes for get_snmp_user
  - nxos_vlan mode idempotence bug
  - nxos_vlan vlan names containing regex ctl chars should be escaped
  - nxos_vtp_* modules fix n6k issues
  - openssl_certificate - fix private key passphrase handling for
    ``cryptography`` backend.
  - openssl_pkcs12 - fixes crash when private key has a passphrase and the module
    is run a second time.
  - os_stack - Apply tags conditionally so that the module does not throw up an
    error when using an older distro of openstacksdk
  - pass correct loading context to persistent connections other than local
  - pkg_mgr - Ansible 2.8.0 failing to install yum packages on Amazon Linux
  - postgresql - added initial SSL related tests
  - postgresql - added missing_required_libs, removed excess param mapping
  - postgresql - move connect_to_db and get_pg_version into
    module_utils/postgres.py (https://github.com/ansible/ansible/pull/55514)
  - postgresql_db - add note to the documentation about state dump and the
    incorrect rc (https://github.com/ansible/ansible/pull/57297)
  - postgresql_db - fix for postgresql_db fails if stderr contains output
  - postgresql_ping - fixed a typo in the module documentation
  - preserve actual ssh error when we cannot connect.
  - route53_facts - the module did not advertise check mode support, causing it
    not to be run in check mode.
  - sysctl: the module now also checks the output of STDERR to report if values
    are correctly set (https://github.com/ansible/ansible/pull/55695)
  - ufw - correctly check status when logging is off
  - uri - always return a value for status even during failure
  - urls - Handle redirects properly for IPv6 address by not splitting on ``:``
    and rely on already parsed hostname and port values
  - vmware_vm_facts - fix the support with regular ESXi
  - vyos_interface fix &lt;https://github.com/ansible/ansible/pull/57169&gt;
  - we don't really need to template vars on definition as we do this on demand
    in templating.
  - win_acl - Fix qualifier parser when using UNC paths -
  - win_hostname - Fix non netbios compliant name handling
  - winrm - Fix issue when attempting to parse CLIXML on send input failure
  - xenserver_guest - fixed an issue where VM whould be powered off even though
    check mode is used if reconfiguration requires VM to be powered off.
  - xenserver_guest - proper error message is shown when maximum number of
    network interfaces is reached and multiple network interfaces are added at
    once.
  - yum - Fix false error message about autoremove not being supported
  - yum - fix failure when using ``update_cache`` standalone
  - yum - handle special '_none_' value for proxy in yum.conf and .repo files

- Update to version 2.8.0
  Major changes:
  * Experimental support for Ansible Collections and content namespacing -
    Ansible content can now be packaged in a collection and addressed via
    namespaces. This allows for easier sharing, distribution, and installation
    of bundled modules/roles/plugins, and consistent rules for accessing
    specific content via namespaces.
  * Python interpreter discovery - The first time a Python module runs on a
    target, Ansible will attempt to discover the proper default Python
    interpreter to use for the target platform/version (instead of immediately
    defaulting to /usr/bin/python). You can override this behavior by
    setting ansible_python_interpreter or via config. 
    (see https://github.com/ansible/ansible/pull/50163)
  * become - The deprecated CLI arguments for --sudo, --sudo-user,
    --ask-sudo-pass, -su, --su-user, and --ask-su-pass have been removed, in
    favor of the more generic --become, --become-user, --become-method, and
    --ask-become-pass.
  * become - become functionality has been migrated to a plugin architecture,
    to allow customization of become functionality and 3rd party become methods
    (https://github.com/ansible/ansible/pull/50991)
- addresses CVE-2018-16859, CVE-2018-16876, CVE-2019-3828, CVE-2018-16837
For the full changelog see /usr/share/doc/packages/ansible/changelogs or online:
https://github.com/ansible/ansible/blob/stable-2.8/changelogs/CHANGELOG-v2.8.rst

- Update to version 2.7.10
Minor Changes
- Catch all connection timeout related exceptions and raise AnsibleConnectionError instead
- openssl_pkcs12, openssl_privatekey, openssl_publickey - These modules no longer delete the output file before starting to regenerate the output, or when generating the output failed.
Bugfixes
- Backport of https://github.com/ansible/ansible/pull/54105, pamd - fix idempotence issue when removing rules
- Use custom JSON encoder in conneciton.py so that ansible objects (AnsibleVaultEncryptedUnicode, for example) can be sent to the persistent connection process
- allow 'dict()' jinja2 global to function the same even though it has changed in jinja2 versions
- azure_rm inventory plugin - fix missing hostvars properties (https://github.com/ansible/ansible/pull/53046)
- azure_rm inventory plugin - fix no nic type in vmss nic. (https://github.com/ansible/ansible/pull/53496)
- deprecate {Get/Set}ManagerAttributes commands (https://github.com/ansible/ansible/issues/47590)
- flatpak_remote - Handle empty output in remote_exists, fixes https://github.com/ansible/ansible/issues/51481
- foreman - fix Foreman returning host parameters
- get_url - Fix issue with checksum validation when using a file to ensure we skip lines in the file that do not contain exactly 2 parts. Also restrict exception handling to the minimum number of necessary lines (https://github.com/ansible/ansible/issues/48790)
- grafana_datasource - Fixed an issue when running Python3 and using basic auth (https://github.com/ansible/ansible/issues/49147)
- include_tasks - Fixed an unexpected exception if no file was given to include.
- openssl_certificate - fix ``state=absent``.
- openssl_certificate, openssl_csr, openssl_pkcs12, openssl_privatekey, openssl_publickey - The modules are now able to overwrite write-protected files (https://github.com/ansible/ansible/issues/48656).
- openssl_dhparam - fix ``state=absent`` idempotency and ``changed`` flag.
- openssl_pkcs12, openssl_privatekey - These modules now accept the output file mode in symbolic form or as a octal string (https://github.com/ansible/ansible/issues/53476).
- openssl_publickey - fixed crash on Python 3 when OpenSSH private keys were used with passphrases.
- openstack inventory plugin: allow 'constructed' functionality (``compose``, ``groups``, and ``keyed_groups``) to work as documented.
- random_mac - generate a proper MAC address when the provided vendor prefix is two or four characters (https://github.com/ansible/ansible/issues/50838)
- replace - fix behavior when ``before`` and ``after`` are used together (https://github.com/ansible/ansible/issues/31354)
- report correct CPU information on ARM systems (https://github.com/ansible/ansible/pull/52884)
- slurp - Fix issues when using paths on Windows with glob like characters, e.g. ``[``, ``]``
- ssh - Check the return code of the ssh process before raising AnsibleConnectionFailure, as the error message for the ssh process will likely contain more useful information. This will improve the missing interpreter messaging when using modules such as setup which have a larger payload to transfer when combined with pipelining. (https://github.com/ansible/ansible/issues/53487)
- tower_settings - 'name' and 'value' parameters are always required, module can not be used in order to get a setting
- win_acl - Fix issues when using paths with glob like characters, e.g. ``[``, ``]``
- win_acl_inheritance - Fix issues when using paths with glob like characters, e.g. ``[``, ``]``
- win_certificate_store - Fix issues when using paths with glob like characters, e.g. ``[``, ``]``
- win_chocolatey - Fix incompatibilities with the latest release of Chocolatey ``v0.10.12+``
- win_copy - Fix issues when using paths with glob like characters, e.g. ``[``, ``]``
- win_file - Fix issues when using paths with glob like characters, e.g. ``[``, ``]``
- win_find - Ensure found files are sorted alphabetically by the path instead of it being random
- win_find - Fix issues when using paths with glob like characters, e.g. ``[``, ``]``
- win_owner - Fix issues when using paths with glob like characters, e.g. ``[``, ``]``
- win_psexec - Support executables with a space in the path
- win_reboot - Fix reboot command validation failure when running under the psrp connection plugin
- win_tempfile - Always return the full NTFS absolute path and not a DOS 8.3 path.
- win_user_right - Fix output containing non json data - https://github.com/ansible/ansible/issues/54413
- windows - Fixed various module utils that did not work with path that had glob like chars
- yum - fix disable_excludes on systems with yum rhn plugin enabled (https://github.com/ansible/ansible/issues/53134)

- Update to version 2.7.9
  Minor Changes
  * Add missing import for ConnectionError in edge and routeros module_utils.
  * ``to_yaml`` filter updated to maintain formatting consistency when used 
    with ``pyyaml`` versions 5.1 and later 
    (https://github.com/ansible/ansible/pull/53772)
  * docker_image * set ``changed`` to ``false`` when using ``force: yes`` to 
    tag or push an image that ends up being identical to one already present on 
    the Docker host or Docker registry.
  * jenkins_plugin * Set new default value for the update_url parameter 
    (https://github.com/ansible/ansible/issues/52086)
  Bugfixes
  * Fix bug where some inventory parsing tracebacks were missing or reported under the wrong plugin.
  * Fix rabbitmq_plugin idempotence due to information message in new version of rabbitmq (https://github.com/ansible/ansible/pull/52166)
  * Fixed KeyError issue in vmware_host_config_manager when a supported option isn't already set (https://github.com/ansible/ansible/issues/44561).
  * Fixed issue related to --yaml flag in vmware_vm_inventory. Also fixed caching issue in vmware_vm_inventory (https://github.com/ansible/ansible/issues/52381).
  * If large integers are passed as options to modules under Python 2, module argument parsing will reject them as they are of type ``long`` and not of type ``int``.
  * allow nice error to work when auto plugin reads file w/o `plugin` field
  * ansible-doc * Fix traceback on providing arguemnt --all to ansible-doc command
  * azure_rm_virtualmachine_facts * fixed crash related to attached managed disks (https://github.com/ansible/ansible/issues/52181)
  * basic * modify the correct variable when determining available hashing algorithms to avoid errors when md5 is not available (https://github.com/ansible/ansible/issues/51355)
  * cloudscale * Fix compatibilty with Python3 in version 3.5 and lower.
  * convert input into text to ensure valid comparisons in nmap inventory plugin
  * dict2items * Allow dict2items to work with hostvars
  * dnsimple * fixed a KeyError exception related to record types handling.
  * docker_container * now returns warnings from docker daemon on container creation and updating.
  * docker_swarm * Fixed node_id parameter not working for node removal (https://github.com/ansible/ansible/issues/53501)
  * docker_swarm * do not crash with older docker daemons (https://github.com/ansible/ansible/issues/51175).
  * docker_swarm * fixes idempotency for the ``ca_force_rotate`` option.
  * docker_swarm * improve Swarm detection.
  * docker_swarm * improve idempotency checking; ``rotate_worker_token`` and ``rotate_manager_token`` are now also used when all other parameters have not changed.
  * docker_swarm * now supports docker-py 1.10.0 and newer for most operations, instead only docker 2.6.0 and newer.
  * docker_swarm * properly implement check mode (it did apply changes).
  * docker_swarm * the ``force`` option was ignored when ``state: present``.
  * docker_swarm_service * do basic validation of ``publish`` option if specified (must be list of dicts).
  * docker_swarm_service * don't crash when ``publish`` is not specified.
  * docker_swarm_service * fix problem with docker daemons which do not return ``UpdateConfig`` in the swarm service spec.
  * docker_swarm_service * the return value was documented as ``ansible_swarm_service``, but the module actually returned ``ansible_docker_service``. Documentation and code have been updated so that the variable is now called ``swarm_service``. In Ansible 2.7.x, the old name ``ansible_docker_service`` can still be used to access the result.
  * ec2 * if the private_ip has been provided for the new network interface it shouldn't also be added to top level parameters for run_instances()
  * fix DNSimple to ensure check works even when the number of records is larger than 100
  * get_url * return no change in check mode when checksum matches
  * inventory plugins * Fix creating groups from composed variables by getting the latest host variables
  * inventory_aws_ec2 * fix no_log indentation so AWS temporary credentials aren't displayed in tests
  * jenkins_plugin * Prevent plugin to be reinstalled when state=present (https://github.com/ansible/ansible/issues/43728)
  * lvol * fixed ValueError when using float size (https://github.com/ansible/ansible/issues/32886, https://github.com/ansible/ansible/issues/29429)
  * mysql * MySQLdb doesn't import the cursors module for its own purposes so it has to be imported in MySQL module utilities before it can be used in dependent modules like the proxysql module family.
  * mysql * fixing unexpected keyword argument 'cursorclass' issue after migration from MySQLdb to PyMySQL.
  * mysql_user: match backticks, single and double quotes when checking user privileges.
  * onepassword_facts * Fixes issues which prevented this module working with 1Password CLI version 0.5.5 (or greater). Older versions of the CLI were deprecated by 1Password and will no longer function.
  * openssl_certificate * ``has_expired`` correctly checks if the certificate is expired or not
  * openssl_certificate * fix Python 3 string/bytes problems for `notBefore`/`notAfter` for self-signed and ownCA providers.
  * openssl_certificate * make sure that extensions are actually present when their values should be checked.
  * openssl_csr * improve ``subject`` validation.
  * openssl_csr * improve error messages for invalid SANs.
  * play order is now applied under all circumstances, fixes
  * remote_management foreman * Fixed issue where it was impossible to createdelete a product because product was missing in dict choices ( https://github.com/ansible/ansible/issues/48594 )
  * rhsm_repository * handle systems without any repos
  * skip invalid plugin after warning in loader
  * urpmi module * fixed issue
  * win_certificate_store * Fix exception handling typo
  * win_chocolatey * Fix issue when parsing a beta Chocolatey install * https://github.com/ansible/ansible/issues/52331
  * win_chocolatey_source * fix bug where a Chocolatey source could not be disabled unless ``source`` was also set * https://github.com/ansible/ansible/issues/50133
  * win_domain * Do not fail if DC is already promoted but a reboot is required, return ``reboot_required: True``
  * win_domain * Fix when running without credential delegated authentication * https://github.com/ansible/ansible/issues/53182
  * win_file * Fix issue when managing hidden files and directories * https://github.com/ansible/ansible/issues/42466
  * winrm * attempt to recover from a WinRM send input failure if possible
  * zabbix_hostmacro: fixes truncation of macro contexts that contain colons (see https://github.com/ansible/ansible/pull/51853)
  New Plugins
  * vmware_vm_inventory * VMware Guest inventory source

- update URL (use SSL version of the URL)
- prepare update for multiple releases (bsc#1102126, bsc#1109957)

- Update to version 2.7.8
  Minor Changes:
  * Raise AnsibleConnectionError on winrm connnection errors
  Bugfixes:
  * Backport of https://github.com/ansible/ansible/pull/46478 , fixes name collision in haproxy module
  * Fix aws_ec2 inventory plugin code to automatically populate regions when missing as documentation states, also leverage config system vs self default/type validation
  * Fix unexpected error when using Jinja2 native types with non-strict constructed keyed_groups (https://github.com/ansible/ansible/issues/52158).
  * If an ios module uses a section filter on a device which does not support it, retry the command without the filter.
  * acme_challenge_cert_helper * the module no longer crashes when the required ``cryptography`` library cannot be found.
  * azure_rm_managed_disk_facts * added missing implementation of listing managed disks by resource group
  * azure_rm_mysqlserver * fixed issues with passing parameters while updating existing server instance
  * azure_rm_postgresqldatabase * fix force_update bug (https://github.com/ansible/ansible/issues/50978).
  * azure_rm_postgresqldatabase * fix force_update bug.
  * azure_rm_postgresqlserver * fixed issues with passing parameters while updating existing server instance
  * azure_rm_sqlserver * fix for tags support
  * azure_rm_virtualmachine * fixed several crashes in module
  * azure_rm_virtualmachine_facts * fix crash when vm created from custom image
  * azure_rm_virtualmachine_facts * fixed crash related to VM with managed disk attached
  * ec2 * Correctly sets the end date of the Spot Instance request. Sets `ValidUntil` value in proper way so it will be auto-canceled through `spot_wait_timeout` interval.
  * openssl_csr * fixes idempotence problem with PyOpenSSL backend when no Subject Alternative Names were specified.
  * openstack inventory plugin * send logs from sdk to stderr so they do not combine with output
  * psrp * do not display bootstrap wrapper for each module exec run
  * redfish_utils * get standard properties for firmware entries (https://github.com/ansible/ansible/issues/49832)
  * remote home directory * Disallow use of remote home directories that include relative pathing by means of `..` (CVE-2019-3828, bsc#1126503) (https://github.com/ansible/ansible/pull/52133)
  * ufw * when using ``state: reset`` in check mode, ``ufw --dry-run reset`` was executed, which causes a loss of firewall rules. The ``ufw`` module was adjusted to no longer run ``ufw --dry-run reset`` to prevent this from happening.
  * ufw: make sure that only valid values for ``direction`` are passed on.
  * update GetBiosBootOrder to use standard Redfish resources (https://github.com/ansible/ansible/issues/47571)
  * win become * Fix some scenarios where become failed to create an elevated process
  * win_psmodule * the NuGet package provider will be updated, if needed, to avoid issue under adding a repository
  * yum * Remove incorrect disable_includes error message when using disable_excludes (https://github.com/ansible/ansible/issues/51697)
  * yum * properly handle a proxy config in yum.conf for an unauthenticated proxy

- Update to version 2.7.7
  Minor Changes:
  * Allow check_mode with supports_generate_diff capability in cli_config. (https://github.com/ansible/ansible/pull/51417)
  * Fixed typo in vmware documentation fragment. Changed 'supported added' to 'support added'.
  Bugfixes:
  * All K8S_AUTH_* environment variables are now properly loaded by the k8s lookup plugin
  * Change backup file globbing for network _config modules so backing up one host's config will not delete the backed up config of any host whose hostname is a subset of the first host's hostname (e.g., switch1 and switch11)
  * Fixes bug where nios_a_record wasn't getting deleted if an uppercase named a_record was being passed. (https://github.com/ansible/ansible/pull/51539)
  * aci_aaa_user - Fix setting user description (https://github.com/ansible/ansible/issues/51406)
  * apt_repository - fixed failure under Python 3.7 (https://github.com/ansible/ansible/pull/47219)
  * archive - Fix check if archive is created in path to be removed
  * azure_rm inventory plugin - fix azure batch request (https://github.com/ansible/ansible/pull/50006)
  * cnos_backup - fixed syntax error (https://github.com/ansible/ansible/pull/47219)
  * cnos_image - fixed syntax error (https://github.com/ansible/ansible/pull/47219)
  * consul_kv - minor error-handling bugfix under Python 3.7 (https://github.com/ansible/ansible/pull/47219)
  * copy - align invocation in return value between check and normal mode
  * delegate_facts - fix to work properly under block and include_role (https://github.com/ansible/ansible/pull/51553)
  * docker_swarm_service - fix endpoint_mode and publish idempotency.
  * ec2_instance - Correctly adds description when adding a single ENI to the instance
  * ensure we have a XDG_RUNTIME_DIR, as it is not handled correctly by some privilege escalation configurations
  * file - Allow state=touch on file the user does not own https://github.com/ansible/ansible/issues/50943
  * fix ansible-pull hanlding of extra args, complex quoting is needed for inline JSON
  * fix ansible_connect_timeout variable in network_cli,netconf,httpapi and nxos_install_os timeout check
  * netapp_e_storagepool - fixed failure under Python 3.7 (https://github.com/ansible/ansible/pull/47219)
  * onepassword_facts - Fix an issue looking up some 1Password items which have a 'password' attribute alongside the 'fields' attribute, not inside it.
  * prevent import_role from inserting dupe into roles: execution when duplicate signature role already exists in the section.
  * reboot - Fix bug where the connection timeout was not reset in the same task after rebooting
  * ssh connection - do not retry with invalid credentials to prevent account lockout (https://github.com/ansible/ansible/issues/48422)
  * systemd - warn when exeuting in a chroot environment rather than failing (https://github.com/ansible/ansible/pull/43904)
  * win_chocolatey - Fix hang when used with proxy for the first time - https://github.com/ansible/ansible/issues/47669
  * win_power_plan - Fix issue where win_power_plan failed on newer Windows 10 builds - https://github.com/ansible/ansible/issues/43827

- update to version 2.7.6
  Minor Changes:
  * Added documentation about using VMware dynamic inventory plugin.
  * Fixed bug around populating host_ip in hostvars in vmware_vm_inventory.
  * Image reference change in Azure VMSS is detected and applied correctly.
  * docker_volume - reverted changed behavior of force, which was released in Ansible 2.7.1 to 2.7.5, and Ansible 2.6.8 to 2.6.11. Volumes are now only recreated if the parameters changed and force is set to true (instead of or). This is the behavior which has been described in the documentation all the time.
  * set ansible_os_family from name variable in os-release
  * yum and dnf can now handle installing packages from URIs that are proxy redirects and don't end in the .rpm file extension
  Bugfixes:
  * Added log message at -vvvv when using netconf connection listing connection details.
  * Changes how ansible-connection names socket lock files. They now use the same name as the socket itself, and as such do not lock other attempts on connections to the same host, or cause issues with overly-long hostnames.
  * Fix mandatory statement error for junos modules (https://github.com/ansible/ansible/pull/50138)
  * Moved error in netconf connection plugin from at import to on connection.
  * This reverts some changes from commit 723daf3. If a line is found in the file, exactly or via regexp matching, it must not be added again. insertafter/insertbefore options are used only when a line is to be inserted, to specify where it must be added.
  * allow using openstack inventory plugin w/o a cache
  * callbacks - Do not filter out exception, warnings, deprecations on failure when using debug (https://github.com/ansible/ansible/issues/47576)
  * certificate_complete_chain - fix behavior when invalid file is parsed while reading intermediate or root certificates.
  * copy - Ensure that the src file contents is converted to unicode in diff information so that it is properly wrapped by AnsibleUnsafeText to prevent unexpected templating of diff data in Python3 (https://github.com/ansible/ansible/issues/45717)
  * correct behaviour of verify_file for vmware inventory plugin, it was always returning True
  * dnf - fix issue where conf_file was not being loaded properly
  * dnf - fix update_cache combined with install operation to not cause dnf transaction failure
  * docker_container - fix network_mode idempotency if the container:&lt;container-name&gt; form is used (as opposed to container:&lt;container-id&gt;) (https://github.com/ansible/ansible/issues/49794)
  * docker_container - warning when non-string env values are found, avoiding YAML parsing issues. Will be made an error in Ansible 2.8. (https://github.com/ansible/ansible/issues/49802)
  * docker_swarm_service - Document labels and container_labels with correct type.
  * docker_swarm_service - Document limit_memory and reserve_memory correctly on how to specify sizes.
  * docker_swarm_service - Document minimal API version for configs and secrets.
  * docker_swarm_service - fix use of Docker API so that services are not detected as present if there is an existing service whose name is a substring of the desired service
  * docker_swarm_service - fixing falsely reporting update_order as changed when option is not used.
  * document old option that was initally missed
  * ec2_instance now respects check mode https://github.com/ansible/ansible/pull/46774
  * fix for network_cli - ansible_command_timeout not working as expected (#49466)
  * fix handling of firewalld port if protocol is missing
  * fix lastpass lookup failure on python 3 (https://github.com/ansible/ansible/issues/42062)
  * flatpak - Fixed Python 2/3 compatibility
  * flatpak - Fixed issue where newer versions of flatpak failed on flatpak removal
  * flatpak_remote - Fixed Python 2/3 compatibility
  * gcp_compute_instance - fix crash when the instance metadata is not set
  * grafana_dashboard - Fix a pair of unicode string handling issues with version checking (https://github.com/ansible/ansible/pull/49194)
  * host execution order - Fix reverse_inventory not to change the order of the items before reversing on python2 and to not backtrace on python3
  * icinga2_host - fixed the issue with not working use_proxy option of the module.
  * influxdb_user - An unspecified password now sets the password to blank, except on existing users. This previously caused an unhandled exception.
  * influxdb_user - Fixed unhandled exception when using invalid login credentials (https://github.com/ansible/ansible/issues/50131)
  * openssl_* - fix error when path contains a file name without path.
  * openssl_csr - fix problem with idempotency of keyUsage option.
  * openssl_pkcs12 - now does proper path expansion for ca_certificates.
  * os_security_group_rule - os_security_group_rule doesn't exit properly when secgroup doesn't exist and state=absent (https://github.com/ansible/ansible/issues/50057)
  * paramiko_ssh - add auth_timeout parameter to ssh.connect when supported by installed paramiko version. This will prevent 'Authentication timeout' errors when a slow authentication step (&gt;30s) happens with a host (https://github.com/ansible/ansible/issues/42596)
  * purefa_facts and purefb_facts now correctly adds facts into main ansible_fact dictionary (https://github.com/ansible/ansible/pull/50349)
  * reboot - add appropriate commands to make the plugin work with VMware ESXi (https://github.com/ansible/ansible/issues/48425)
  * reboot - add support for rebooting AIX (https://github.com/ansible/ansible/issues/49712)
  * reboot - gather distribution information in order to support Alpine and other distributions (https://github.com/ansible/ansible/issues/46723)
  * reboot - search common paths for the shutdown command and use the full path to the binary rather than depending on the PATH of the remote system (https://github.com/ansible/ansible/issues/47131)
  * reboot - use a common set of commands for older and newer Solaris and SunOS variants (https://github.com/ansible/ansible/pull/48986)
  * redfish_utils - fix reference to local variable 'systems_service'
  * setup - fix the rounding of the ansible_memtotal_mb value on VMWare vm's (https://github.com/ansible/ansible/issues/49608)
  * vultr_server - fixed multiple ssh keys were not handled.
  * win_copy - Fix copy of a dir that contains an empty directory - https://github.com/ansible/ansible/issues/50077
  * win_firewall_rule - Remove invalid 'bypass' action
  * win_lineinfile - Fix issue where a malformed json block was returned causing an error
  * win_updates - Correctly report changes on success

- update to version 2.7.5
  Minor Changes:
  * Add warning about falling back to jinja2_native=false when Jinja2 version is lower than 2.10.
  * Change the position to search os-release since clearlinux new versions are providing /etc/os-release too
  * Fixed typo in ansible-galaxy info command.
  * Improve the deprecation message for squashing, to not give misleading advice
  * Update docs and return section of vmware_host_service_facts module.
  * ansible-galaxy: properly warn when git isn't found in an installed bin path instead of traceback
  * dnf module properly load and initialize dnf package manager plugins
  * docker_swarm_service: use docker defaults for the user parameter if it is set to null 
  Bugfixes:
  * bsc#1118896 CVE-2018-16876 Information disclosure in vvv+ mode with no_log on (https://github.com/ansible/ansible/pull/49569)
  * ACME modules: improve error messages in some cases (include error returned by server).
  * Added unit test for VMware module_utils.
  * Also check stdout for interpreter errors for more intelligent messages to user
  * Backported support for Devuan-based distribution
  * Convert hostvars data in OpenShift inventory plugin to be serializable by ansible-inventory
  * Fix AttributeError (Python 3 only) when an exception occurs while rendering a template
  * Fix N3K power supply facts (https://github.com/ansible/ansible/pull/49150).
  * Fix NameError nxos_facts (https://github.com/ansible/ansible/pull/48981).
  * Fix VMware module utils for self usage.
  * Fix error in OpenShift inventory plugin when a pod has errored and is empty
  * Fix if the route table changed to none (https://github.com/ansible/ansible/pull/49533)
  * Fix iosxr netconf plugin response namespace (https://github.com/ansible/ansible/pull/49300)
  * Fix issues with nxos_install_os module for nxapi (https://github.com/ansible/ansible/pull/48811).
  * Fix lldp and cdp neighbors information (https://github.com/ansible/ansible/pull/48318)(https://github.com/ansible/ansible/pull/48087)(https://github.com/ansible/ansible/pull/49024).
  * Fix nxos_interface and nxos_linkagg Idempotence issue (https://github.com/ansible/ansible/pull/46437).
  * Fix traceback when updating facts and the fact cache plugin was nonfunctional
  * Fix using vault encrypted data with jinja2_native (https://github.com/ansible/ansible/issues/48950)
  * Fixed: Make sure that the files excluded when extracting the archive are not checked. https://github.com/ansible/ansible/pull/45122
  * Fixes issue where a password parameter was not set to no_log
  * Respect no_log on retry and high verbosity (CVE-2018-16876)
  * aci_rest - Fix issue ignoring custom port
  * acme_account, acme_account_facts - in some cases, it could happen that the modules return information on disabled accounts accidentally returned by the ACME server.
  * docker_swarm - decreased minimal required API version from 1.35 to 1.25; some features require API version 1.30 though.
  * docker_swarm_service: fails because of default 'user: root' (https://github.com/ansible/ansible/issues/49199)
  * ec2_metadata_facts - Parse IAM role name from the security credential field since the instance profile name is different
  * fix azure_rm_image module use positional parameter (https://github.com/ansible/ansible/pull/49394)
  * fixes an issue with dict_merge in network utils (https://github.com/ansible/ansible/pull/49474)
  * gcp_utils - fix google auth scoping issue with application default credentials or google cloud engine credentials. Only scope credentials that can be scoped.
  * mail - fix python 2.7 regression
  * openstack - fix parameter handling when cloud provided as dict https://github.com/ansible/ansible/issues/42858
  * os_user - Include domain parameter in user deletion https://github.com/ansible/ansible/issues/42901
  * os_user - Include domain parameter in user lookup https://github.com/ansible/ansible/issues/42901
  * ovirt_storage_connection - comparing passwords breaks idempotency in update_check (https://github.com/ansible/ansible/issues/48933)
  * paramiko_ssh - improve log message to state the connection type
  * reboot - use IndexError instead of TypeError in exception
  * redis cache - Support version 3 of the redis python library (https://github.com/ansible/ansible/issues/49341)
  * sensu_silence - Cast int for expire field to avoid call failure to sensu API.
  * vmware_host_service_facts - handle exception when service package does not have package name.
  * win_nssm - Switched to Argv-ToString for escaping NSSM credentials (https://github.com/ansible/ansible/issues/48728)
  * zabbix_hostmacro - Added missing validate_certs logic for running module against Zabbix servers with untrused SSL certificates (https://github.com/ansible/ansible/issues/47611)
  * zabbix_hostmacro - Fixed support for user macros with context (https://github.com/ansible/ansible/issues/46953)

- update to version 2.7.4
  Bugfixes:
  * powershell - add lib/ansible/executor/powershell to the packaging data

- update to version 2.7.3
  Minor Changes:
  * Document Path and Port are mutually exclusive parameters in wait_for module
  * Puppet module remove --ignorecache to allow Puppet 6 support
  * dnf properly support modularity appstream installation via overloaded group
	modifier syntax
  * proxmox_kvm - fix exception
  * win_security_policy - warn users to use win_user_right instead when editing
	Privilege Rights
  Bugfixes:
  * Fix the issue that FTD HTTP API retries authentication-related HTTP requests
  * Fix the issue that module fails when the Swagger model does not have required fields
  * Fix the issue with comparing string-like objects
  * Fix using omit on play keywords
  * Windows - prevent sensitive content from appearing in scriptblock logging (CVE-2018-16859)
  * apt_key - Disable TTY requirement in GnuPG for the module to work correctly 
	when SSH pipelining is enabled
  * better error message when bad type in config, deal with EVNAR= more gracefully
  * configuration retrieval would fail on non primed plugins
  * cs_template - Fixed a KeyError on state=extracted
  * docker_container - fix idempotency problems with docker-py caused by previous
	init idempotency fix
  * docker_container - fix interplay of docker-py version check with argument_spec
	validation improvements
  * docker_network - driver_options containing Python booleans would cause Docker
    to throw exceptions
  * ec2_group - Fix comparison of determining which rules to purge by ignoring descriptions
  * pip module - fix setuptools/distutils replacement
  * sysvinit - enabling a service should use 'defaults' if no runlevels are specified

- update to version 2.7.2
  Minor changes:
  * Fix documentation for cloning template
  * Parsing plugin filter may raise TypeError, gracefully handle this 
	exception and let user know about the syntax error in plugin filter file
  * Scenario guide for VMware HTTP API usage
  * Update plugin filter documentation
  * fix yum and dnf autoremove input sanitization to properly warn user if 
	invalid options passed and update documentation to match
  * improve readability and fix privileges names on vmware scenario_clone_template
  * k8s - updated module documentation to mention how to avoid SSL validation errors
  * yum - when checking for updates, now properly include Obsoletes 
	(both old and new) package data in the module JSON output

- update to 2.7.1
  Minor changes:
  * Fix yum module to properly check for empty conf_file value
  * added capability to set the scheme for the consul_kv lookup
  * added optional certificate and certificate validation for consul_kv lookups
  * dnf - properly handle modifying the enable/disable excludes data field
  * dnf appropriately handles disable_excludes repoid argument
  * dnf proerly honors disable_gpg_check for local package installation
  * fix yum module to handle list argument optional empty strings properly
  * netconf_config - Make default_operation optional in netconf_config module
  * yum - properly handle proxy password and username embedded in url
  * yum/dnf - fail when space separated string of names 

- update to 2.7.0
  Major changes:
  * Allow config to enable native jinja types
  * Remove support for simplejson
  * yum and dnf modules now at feature parity
  Minor changes:
  * Changed the prefix of all Vultr modules from vr to vultr
  * Enable installroot tests for yum4(dnf) integration testing, dnf backend now supports that
  * Fixed timer in exponential backoff algorithm in vmware.py
  Bugfixes:
  * Security Fix - avoid loading host/group vars from cwd when not specifying a playbook or playbook base dir
  * Security Fix - avoid using ansible.cfg in a world writable dir
  * Some connection exception would cause no_log specified on a task to be ignored (stdout info disclosure)
  * Fix glob path of rc.d (SUSE-specific)
  * Fix lambda_policy updates
  * Fix alt linux detection/matching
  

- update to 2.6.4
  Minor Changes:
  * add azure_rm_storageaccount support to StorageV2 kind. 
  * import_tasks - Do not allow import_tasks to transition to dynamic
    if the file is missing
  Bugfixes:
  * Add md5sum check in nxos_file_copy module
  * Allow arbitrary log_driver for docker_container
  * Fix Python2.6 regex bug terminal plugin nxos, iosxr
  * Fix check_mode in nxos_static_route module
  * Fix glob path of rc.d Some distribtuions like SUSE has the rc%.d
    directories under /etc/init.d
  * Fix network config diff issue for lines 
  * Fixed an issue where ansible_facts.pkg_mgr would incorrectly set 
    to zypper on Debian/Ubuntu systems that happened to have the 
    command installed
  * The docker_* modules respect the DOCKER_* environment variables again
  * The fix for CVE-2018-10875 prints out a warning message about 
    skipping a config file from a world writable current working directory.
    However, if the user is in a world writable current working directory 
    which does not contain a config file, it should not print a warning 
    message. This release fixes that extaneous warning.
  * To resolve nios_network issue where vendor-encapsulated-options 
    can not have a use_option flag.
  * To resolve the issue of handling exception for Nios lookup gracefully.
  * always correctly template no log for tasks
  * ansible-galaxy - properly list all roles in roles_path
  * basic.py - catch ValueError in case a FIPS enabled platform 
    raises this exception
  * docker_container: fixing working_dir idempotency problem 
  * docker_container: makes unit parsing for memory sizes more consistent, 
    and fixes idempotency problem when kernel_memory is set
  * fix example code for AWS lightsail documentation
  * fix the enable_snat parameter that is only supposed to be used by 
    an user with the right policies.
  * fixes docker_container check and debug mode
  * improves docker_container idempotency
  * ios_l2_interface - fix bug when list of vlans ends with comma
  * ios_l2_interface - fix issue with certain interface types
  * ios_user - fix unable to delete user admin issue 
  * ios_vlan - fix unable to work on certain interface types issue 
  * nxos_facts test lldp feature and fix nxapi check_rc 
  * nxos_interface port-channel idempotence fix for mode
  * nxos_linkagg mode fix 
  * nxos_system idempotence fix
  * nxos_vlan refactor to support non structured output
  * one_host - fixes settings via environment variables
  * use retry_json nxos_banner
  * user - Strip trailing comments in /etc/default/passwd 
  * user - when creating a new user without an expiration date, 
    properly set no expiration rather that expirining the account
  * win_domain_computer - fixed deletion of computer active directory 
    object that have dependent objects
  * win_domain_computer - fixed error in diff_support
  * win_domain_computer - fixed error when description parameter is empty 
  * win_psexec - changed code to not escape the command option when building the args
  * win_uri -- Fix support for JSON output when charset is set
  * win_wait_for - fix issue where timeout doesn't wait unless state=drained

- update to 2.6.3
  Bugfixes:
  * Fix lxd module to be idempotent when the given configuration for
	the lxd container has not changed
  * Fix setting value type to str to avoid conversion during template
	read. Fix Idempotency in case of 'no key'.
  * Fix the mount module's handling of swap entries in fstab
  * The fix for (CVE-2018-10875) prints out a warning message about
	skipping a config file from a world writable current working
	directory. However, if the user explicitly specifies that the 
	config file should be used via the ANSIBLE_CONFIG environment
	variable then Ansible would honor that but still print out the
	warning message. This has been fixed so that Ansible honors the
	user's explicit wishes and does not print a warning message in
	that circumstance.
  * To fix the bug where existing host_record was deleted when existing
	record name is used with different IP.
  * VMware handle pnic in proxyswitch
  * fix azure security group cannot add rules when purge_rule set to false.
  * fix azure_rm_deployment collect tags from existing Resource Group.
  * fix azure_rm_loadbalancer_facts list takes at least 2 arguments.
  * fix for the bundled selectors module (used in the ssh and local 
	connection plugins) when a syscall is restarted after being 
	interrupted by a signal
  * get_url - fix the bug that get_url does not change mode when checksum matches
  * nicer error when multiprocessing breaks
  * openssl_certificate - Convert valid_date to bytes for conversion
  * openstack_inventory.py dynamic inventory file fixed the plugin to the 
	script so that it will work with current ansible-inventory. Also 
    redirect stdout before dumping the ouptput, because not doing so will
	cause JSON parse errors in some cases.
  * slack callback - Fix invocation by looking up data from cli.options
  * sysvinit module: handle values of optional parameters. Don't disable 
	service when enabled parameter isn't set. Fix command when arguments 
	parameter isn't set.
  * vars_prompt - properly template play level variables in vars_prompt
  * win_domain - ensure the Netlogon service is up and running after 
	promoting host to controller
  * win_domain_controller - ensure the Netlogon service is up and running
	after promoting host to controller

- update to 2.6.2
  Minor Changes
  + Sceanrio guide for removing an existing virtual machine is added.
  + lineinfile - add warning when using an empty regexp 
  + Restore module_utils.basic.BOOLEANS variable for backwards compatibility
    with the module API in older ansible releases.
  Bugfixes:
  + Includes fix for bsc#1099808 (CVE-2018-10875) ansible.cfg is being read
    from current working directory allowing possible code execution
  + Add text output along with structured output in nxos_facts 
  + Allow more than one page of results by using the right pagination 
    indicator ('NextMarker' instead of 'NextToken').
  + Fix an atomic_move error that is 'true', but misleading. 
    Now we show all 3 files involved and clarify what happened.
  + Fix eos_l2_interface eapi.
  + Fix fetching old style facts in junos_facts module
  + Fix get_device_info nxos zero or more whitespace regex
  + Fix nxos CI failures
  + Fix nxos_nxapi default http behavior
  + Fix nxos_vxlan_vtep_vni
  + Fix regex network_os_platform nxos
  + Refactor nxos cliconf get_device_info for non structured 
    output supported devices
  + To fix the NoneType error raised in ios_l2_interface when 
    Access Mode VLAN is unassigned
  + emtpy host/group name is an error
  + fix default SSL version for docker modules
  + fix mail module when using starttls
  + fix nmap config example
  + fix ps detection of service
  + fix the remote tmp folder permissions issue when becoming a non 
    admin user
  + fix typoe in sysvinit that breaks update.rc-d detection
  + fixes docker_container compatibilty with docker-py &lt; 2.2
  + get_capabilities in nxapi module_utils should not return empty dictionary
  + inventory - When using an inventory directory, ensure extension 
    comparison uses text types
  + ios_vlan - fix unable to identify correct vlans issue
  + nxos_facts warning message improved
  + openvswitch_db - make 'key' argument optional
  + pause - do not set stdout to raw mode when redirecting to a file
  + pause - nest try except when importing curses to gracefully fail 
    if curses is not present
  + plugins/inventory/openstack.py - Do not create group with empty 
    name if region is not set
  + preseve delegation info on nolog
  + remove ambiguity when it comes to 'the source'
  + remove dupes from var precedence
  + restores filtering out conflicting facts
  + user - fix bug that resulted in module always reporting a change when 
    specifiying the home directory on FreeBSD
  + user - use correct attribute name in FreeBSD for creat_home
  + vultr - Do not fail trying to load configuration from ini files if 
    required variables have been set as environment variables.
  + vyos_command correcting conditionals looping
  + win_chocolatey - enable TLSv1.2 support when downloading the 
    Chocolatey installer 
  + win_reboot - fix for handling an already scheduled reboot and other 
    minor log formatting issues
  + win_reboot - fix issue when overridding connection timeout hung 
    the post reboot uptime check
  + win_reboot - handle post reboots when running test_command 
  + win_security_policy - allows an empty string to reset a policy value
  + win_share - discard any cmdlet output we don't use to ensure only the 
    return json is received by Ansible
  + win_unzip - discard any cmdlet output we don't use to ensure only the 
    return json is received by Ansible
  + win_updates - fixed module return value is lost in error in some cases
  + win_user - Use LogonUser to validate the password as it does not 
    rely on SMB/RPC to be available
  + Security Fix - avoid loading host/group vars from cwd when not 
    specifying a playbook or playbook base dir
  + Security Fix - avoid using ansible.cfg in a world writable dir.
  + Fix junos_config confirm commit timeout issue 
    (https://github.com/ansible/ansible/pull/41527)
  + file module - The touch subcommand had its diff output broken during
    the 2.6.x development cycle. This is now fixed.
  + inventory manager - This fixes required options being populated before 
    the inventory config file is read, so the required options may be 
    set in the config file.
  + nsupdate - allow hmac-sha384 https://github.com/ansible/ansible/pull/42209
  + win_domain - fixes typo in one of the AD cmdlets 
    https://github.com/ansible/ansible/issues/41536
  + win_group_membership - uses the internal Ansible SID conversion logic 
    and uses that when comparing group membership instead of the name 
- use fdupes to save some space in python_sitelib
- define BuildRoot on older distributions like SLE-11
- be a bit more flexible with the ending of manpage files to allow
  Fedora builds to succeed
- includes fix for bsc#1099805 (CVE-2018-10874) Inventory
  variables are loaded from current working directory when
  running ad-hoc command that can lead to code execution
  (included upstream in 2.6.1).

- revert some unneeded changes from spec-cleaner

- updated to latest release 2.6.0 
- New Plugins:
  + Callback: 
    - cgroup_memory_recap
    - grafana_annotations
    - sumologic
  + Connection:
    - httpapi
  + Inventory:
    - foreman
    - gcp_compute
    - generator
    - nmap
  + Lookup:
    - onepassword
    - onepassword_raw
- Modules updates too many to mention here
  please look at package documentation directory (/usr/share/doc/packages/.../changelogs)
- bug fixes:
  - **Security Fix** - Some connection exceptions would cause no_log
    specified on a task to be ignored.  If this happened, the task information,
    including any private information coul d have been displayed to stdout and
    (if enabled, not the default) logged to a log file specified in
    ansible.cfg's log_path.  Additionally, sites which redirected stdout from
    ansible runs to a log file may have stored that private information onto
    disk that way as well.  (https://github.com/ansible/ansible/pull/41414)
  - Changed the admin_users config option to not include 'admin' by default
    as admin is frequently used for a non-privileged account
    (https://github.com/ansible/ansible/pull/41164)
  - Changed the output to 'text' for 'show vrf' command as default 'json'
    output format with respect to 'eapi' transport was failing
    (https://github.com/ansible/ansible/pull/41470)
  - Document mode=preserve for both the copy and template module
  - Fix added for Digital Ocean Volumes API change causing Ansible to
    recieve an unexpected value in the response. 
    (https://github.com/ansible/ansible/pull/41431)
  - Fix an encoding issue when parsing the examples from a plugins'
    documentation
  - Fix iosxr_config module to handle route-policy, community-set,
    prefix-set, as-path-set and rd-set blocks.  All these blocks are part of
    route-policy language of iosxr.
  - Fix mode=preserve with remote_src=True for the copy module
  - Implement mode=preserve for the template module
  - The yaml callback plugin now allows non-ascii characters to be
    displayed.
  - Various grafana_* modules - Port away from the deprecated
    b64encodestring function to the b64encode function instead. 
    https://github.com/ansible/ansible/pull/38388
  - added missing 'raise' to exception definition
    https://github.com/ansible/ansible/pull/41690
  - allow custom endpoints to be used in the aws_s3 module
    (https://github.com/ansible/ansible/pull/36832)
  - allow set_options to be called multiple times
    https://github.com/ansible/ansible/pull/41913
  - ansible-doc - fixed traceback on missing plugins
    (https://github.com/ansible/ansible/pull/41167)
  - cast the device_mapping volume size to an int in the ec2_ami module
    (https://github.com/ansible/ansible/pull/40938)
  - copy - fixed copy to only follow symlinks for files in the non-recursive case
  - copy module - The copy module was attempting to change the mode of files
    for remote_src=True even if mode was not set as a parameter.  This
    failed on filesystems which do not have permission bits
    (https://github.com/ansible/ansible/pull/40099)
  - copy module - fixed recursive copy with relative paths
    (https://github.com/ansible/ansible/pull/40166)
  - correct debug display for all cases
    https://github.com/ansible/ansible/pull/41331
  - correctly check hostvars for vars term
    https://github.com/ansible/ansible/pull/41819
  - correctly handle yaml inventory files when entries are null dicts
    https://github.com/ansible/ansible/issues/41692
  - dynamic includes - Allow inheriting attributes from static parents
    (https://github.com/ansible/ansible/pull/38827)
  - dynamic includes - Don't treat undefined vars for conditional includes
    as truthy (https://github.com/ansible/ansible/pull/39377)
  - dynamic includes - Fix IncludedFile comparison for free strategy
    (https://github.com/ansible/ansible/pull/37083)
  - dynamic includes - Improved performance by fixing re-parenting on copy
    (https://github.com/ansible/ansible/pull/38747)
  - dynamic includes - Use the copied and merged task for calculating task
    vars (https://github.com/ansible/ansible/pull/39762)
  - file - fixed the default follow behaviour of file to be true
  - file module - Eliminate an error if we're asked to remove a file but
    something removes it while we are processing the request
    (https://github.com/ansible/ansible/pull/39466)
  - file module - Fix error when recursively assigning permissions and a
    symlink to a nonexistent file is present in the directory tree
    (https://github.com/ansible/ansible/issues/39456)
  - file module - Fix error when running a task which assures a symlink to a
    nonexistent file exists for the second and subsequent times
    (https://github.com/ansible/ansible/issues/39558)
  - file module - The file module allowed the user to specify src as a
    parameter when state was not link or hard.  This is documented as only
    applying to state=link or state=hard but in previous Ansible, this could
    have an effect in rare cornercases.  For instance, 'ansible -m file -a
    'state=directory path=/tmp src=/var/lib'' would create /tmp/lib.  This
    has been disabled and a warning emitted (will change to an error in
    Ansible-2.10).
  - file module - The touch subcommand had its diff output broken during the
    2.6.x development cycle.  This is now fixed
    (https://github.com/ansible/ansible/issues/41755)
  - fix BotoCoreError exception handling
  - fix apt-mark on debian6 (https://github.com/ansible/ansible/pull/41530)
  - fix async for the aws_s3 module by adding async support to the action
    plugin (https://github.com/ansible/ansible/pull/40826)
  - fix decrypting vault files for the aws_s3 module
    (https://github.com/ansible/ansible/pull/39634)
  - fix errors with S3-compatible APIs if they cannot use ACLs for buckets
    or objects
  - fix permission handling to try to download a file even if the user does
    not have permission to list all objects in the bucket
  - fixed config required handling, specifically for _terms in lookups
    https://github.com/ansible/ansible/pull/41740
  - gce_net - Fix sorting of allowed ports
    (https://github.com/ansible/ansible/pull/41567)
  - group_by - support implicit localhost
    (https://github.com/ansible/ansible/pull/41860)
  - import/include - Ensure role handlers have the proper parent, allowing
    for correct attribute inheritance
    (https://github.com/ansible/ansible/pull/39426)
  - import_playbook - Pass vars applied to import_playbook into parsing of
    the playbook as they may be needed to parse the imported plays
    (https://github.com/ansible/ansible/pull/39521)
  - include_role/import_role - Don't overwrite included role handlers with
    play handlers on parse (https://github.com/ansible/ansible/pull/39563)
  - include_role/import_role - Fix parameter templating
    (https://github.com/ansible/ansible/pull/36372)
  - include_role/import_role - Use the computed role name for
    include_role/import_role so to diffentiate between names computed from
    host vars (https://github.com/ansible/ansible/pull/39516)-
    include_role/import_role - improved performance and recursion depth
    (https://github.com/ansible/ansible/pull/36470)
  - lineinfile - fix insertbefore when used with BOF to not insert duplicate
    lines (https://github.com/ansible/ansible/issues/38219)
  - password lookup - Do not load password lookup in network filters,
    allowing the password lookup to be overriden
    (https://github.com/ansible/ansible/pull/41907)
  - pause - ensure ctrl+c interrupt works in all cases
    (https://github.com/ansible/ansible/issues/35372)
  - powershell - use the tmpdir set by `remote_tmp` for become/async tasks
    instead of the generic $env:TEMP -
    https://github.com/ansible/ansible/pull/40210
  - selinux - correct check mode behavior to report same changes as normal
    mode (https://github.com/ansible/ansible/pull/40721)
  - spwd - With python 3.6 spwd.getspnam returns PermissionError instead of
    KeyError if user does not have privileges
    (https://github.com/ansible/ansible/issues/39472)
  - synchronize - Ensure the local connection created by synchronize uses
    _remote_is_local=True, which causes ActionBase to build a local tmpdir
    (https://github.com/ansible/ansible/pull/40833)
  - template - Fix for encoding issues when a template path contains
    non-ascii characters and using the template path in ansible_managed
    (https://github.com/ansible/ansible/issues/27262)
  - template action plugin - fix the encoding of filenames to avoid
    tracebacks on Python2 when characters that are not present in the user's
    locale are present.  (https://github.com/ansible/ansible/pull/39424)
  - user - only change the expiration time when necessary
    (https://github.com/ansible/ansible/issues/13235)
  - uses correct conn info for reset_connection
    https://github.com/ansible/ansible/issues/27520
  - win_environment - Fix for issue where the environment value was deleted
    when a null value or empty string was set -
    https://github.com/ansible/ansible/issues/40450
  - win_file - fix issue where special chars like [ and ] were not being
    handled correctly https://github.com/ansible/ansible/pull/37901
  - win_get_url - fixed a few bugs around authentication and force no when
    using an FTP URL
  - win_iis_webapppool - redirect some module output to null so Ansible can
    read the output JSON https://github.com/ansible/ansible/issues/40874
  - win_template - fix when specifying the dest option as a directory with
    and without the trailing slash
    https://github.com/ansible/ansible/issues/39886
  - win_updates - Added the ability to run on a scheduled task for older
    hosts so async starts working again -
    https://github.com/ansible/ansible/issues/38364
  - win_updates - Fix logic when using a whitelist for multiple updates
  - win_updates - Fix typo that hid the download error when a download
    failed
  - win_updates - Fixed issue where running win_updates on async fails
    without any error
  - windows become - Show better error messages when the become process fails
  - winrm - Add better error handling when the kinit process fails
  - winrm - allow `ansible_user` or `ansible_winrm_user` to override
    `ansible_ssh_user` when both are defined in an inventory -
    https://github.com/ansible/ansible/issues/39844
  - winrm - ensure pexpect is set to not echo the input on a failure and have
    a manual sanity check afterwards
    https://github.com/ansible/ansible/issues/41865
  - winrm connection plugin - Fix exception messages sometimes raising a
    traceback when the winrm connection plugin encounters an unrecoverable
    error.  https://github.com/ansible/ansible/pull/39333
  - xenserver_facts - ensure module works with newer versions of XenServer
    (https://github.com/ansible/ansible/pull/35821)

- use python3 on (open)SUSE 15 or newer

- Update to 2.5.5
  - Fixed the honouration of the no_log option with failed task iterations
    (CVE-2018-10855 boo#1097775)
  - Bufixes:
    - Changed the admin_users config option to not include 'admin' by default
      as admin is frequently used for a non-privileged account
    - aws_s3 - add async support to the action plugin
    - aws_s3 - fix decrypting vault files
    - ec2_ami - cast the device_mapping volume size to an int
    - eos_logging - fix idempotency issues
    - cache plugins - A cache timeout of 0 means the cache will not expire.
    - ios_logging - fix idempotency issues
    - ios/nxos/eos_config - don't retrieve config in running_config when config is provided for diff
    - nxos_banner - fix multiline banner issue
    - nxos terminal plugin - fix output truncation
    - nxos_l3_interface - fix no switchport issue with loopback and svi interfaces
    - nxos_snapshot - fix compare_option
- Applied spec-cleaner

- Update to 2.5.1
  Minor Changes
  + Updated example in vcenter_license module.
  + Updated virtual machine facts with instanceUUID which is unique 
    for each VM irrespective of name and BIOS UUID.
  + A lot of Bugfixes, please refer to the Changelog installed in 
    /usr/share/doc/packages/ansible/changelogs/CHANGELOG-v2.5.rst

- Update to 2.5.0:
  Major Changes
  * Ansible Network improvements
    + Created new connection plugins network_cli and netconf to replace
      connection=local. connection=local will continue to work for a
      number of Ansible releases.
    + No more unable to open shell. A clear and descriptive message will 
      be displayed in normal ansible-playbook output without needing to enable debug mode
    + Loads of documentation, see Ansible for Network Automation Documentation.
    + Refactor common network shared code into package under module_utils/network/
    + Filters: Add a filter to convert XML response from a network device to JSON object.
    + Loads of bug fixes.
    + Plus lots more.
  * New simpler and more intuitive 'loop' keyword for task loops. The 
    with_&lt;lookup&gt; loops will likely be deprecated in the near future 
    and eventually removed.
  * Added fact namespacing; from now on facts will be available under 
    ansible_facts namespace (for example: ansible_facts.os_distribution) 
    without the ansible_ prefix. They will continue to be added into the 
    main namespace directly, but now with a configuration toggle to enable
    this. This is currently on by default, but in the future it will default to off.
  * Added a configuration file that a site administrator can use to 
    specify modules to exclude from being used.
  Minor Changes
  * please refer to /share/doc/packages/ansible/changelogs/CHANGELOG-v2.5.rst
  Deprecated Features
  * Previously deprecated 'hostfile' config settings have been 're-deprecated' 
    because previously code did not warn about deprecated configuration settings.
  * Using Ansible-provided Jinja tests as filters is deprecated and will 
    be removed in Ansible 2.9.
  * The stat and win_stat modules have deprecated get_md5 and the md5 return
    values. These options will become undocumented in Ansible 2.9 and 
    removed in a later version.
  * The redis_kv lookup has been deprecated in favor of new redis lookup
  * Passing arbitrary parameters that begin with HEADER_ to the uri module, 
    used for passing http headers, is deprecated. Use the headers parameter 
    with a dictionary of header names to value instead. 
    This will be removed in Ansible 2.9
  * Passing arbitrary parameters to the zfs module to set zfs properties is 
    deprecated. Use the extra_zfs_properties parameter with a dictionary of
    property names to values instead. This will be removed in Ansible 2.9.
  * Use of the AnsibleModule parameter check\_invalid\_arguments in custom
    modules is deprecated. In the future, all parameters will be checked to 
    see whether they are listed in the arg spec and an error raised if they 
    are not listed. This behaviour is the current and future default so most 
    custom modules can simply remove check\_invalid\_arguments if they set it 
    to the default value of True. The check\_invalid\_arguments parameter 
    will be removed in Ansible 2.9.
  * The nxos_ip_interface module is deprecated in Ansible 2.5. 
    Use nxos_l3_interface module instead.
  * The nxos_portchannel module is deprecated in Ansible 2.5. 
    Use nxos_linkagg module instead.
  * The nxos_switchport module is deprecated in Ansible 2.5. 
    Use nxos_l2_interface module instead.
  * The ec2_ami_find has been deprecated; use ec2_ami_facts instead.
  * panos_security_policy: Use panos_security_rule - the old module uses 
    deprecated API calls
  * vsphere_guest is deprecated in Ansible 2.5 and will be removed in 
    Ansible-2.9. Use vmware_guest module instead.
  Removed Features (previously deprecated)
  * accelerate.
  * boundary_meter: There was no deprecation period for this but the hosted 
    service it relied on has gone away so the module has been removed. #29387
  * cl_ : cl_interface, cl_interface_policy, cl_bridge, cl_img_install, 
    cl_ports, cl_license, cl_bond. Use nclu instead
  * docker. Use docker_container and docker_image instead.
  * ec2_vpc.
  * ec2_ami_search, use ec2_ami_facts instead.
  * nxos_mtu. Use nxos_system's system_mtu option instead. 
    To specify an interface's MTU use nxos_interface.
  * panos_nat_policy: Use panos_nat_rule the old module uses
    deprecated API calls
- also package the changelogs directory below 
  /usr/share/doc/packages/ansible/ for better reference

- License changed to GPL-3.0-or-later, as mentioned in the source
  (former license focues on GPL-3.0 only)

- Add python-passlib as Requires (bsc#1080682)
  passlib is needed for the 'vars_prompt' feature of ansible

- Update to version 2.4.3.0:
  * Fix `pamd` rule args regexp to match file paths.
  * Check if SELinux policy exists before setting.
  * Set locale to `C` in `letsencrypt` module to fix date parsing
    errors.
  * Fix include in loop when stategy=free.
  * Fix save parameter in asa_config.
  * Fix --vault-id support in ansible-pull.
  * In nxos_interface_ospf, fail nicely if loopback is used with
    passive_interface.
  * Fix quote filter when given an integer to quote.
  * nxos_vrf_interface fix when validating the interface.
  * Fix for win_copy when sourcing files from an SMBv1 share.
  * correctly report callback plugin file.
  * restrict revaulting to vault cli.
  * Fix python3 tracebacks in letsencrypt module.
  * Fix ansible_*_interpreter variables to be templated prior to
    being used.
  * Fix setting of environment in a task that uses a loop
  * Fix fetch on Windows failing to fetch files or particular
    block size.
  * preserve certain fields during no log.
  * fix issue with order of declaration of sections in ini
    inventory.
  * Fix win_iis_webapppool to correctly stop a apppool.
  * Fix CloudEngine host failed.
  * Fix ios_config save issue.
  * Handle vault filenames with nonascii chars when displaying
    messages.
  * Fix win_iis_webapppool to not return passwords.
  * Fix extended file attributes detection and changing.
  * correctly ensure 'ungrouped' membership rules.
  * made warnings less noisy when empty/no inventory is supplied.
  * Fixes a failure which prevents to create servers in module
    cloudscale_server.
  * Fix win_firewall_rule 'Specified cast is invalid' error when
    modifying a rule with all of Domain/Public/Private profiles set.
  * Fix case for multilib when installing from a file in the yum
    module.
  * Fix WinRM parsing/escaping of IPv6 addresses.
  * Fix win_package to detect MSI regardless of the extension case.
  * Updated win_mapped_drive docs to clarify what it is used for.
  * Fix file related modules run in check_mode when the file being
    operated on does not exist.
  * Make eos_vlan idempotent.
  * Fix win_iis_website to properly check attributes before setting.
  * Fixed the removal date for ios_config save and force parameters.
  * cloudstack: fix timeout from ini config file being ignored.
  * fixes memory usage issues with many blocks/includes.
  * Fixes maximum recursion depth exceeded with include_role.
  * Fix to win_dns_client module to take ordering of DNS servers to
    resolve into account.
  * Fix for the nxos_banner module where some nxos images nest the
    output inside of an additional dict.
  * Fix failure message 'got multiple values for keyword argument
    id' in the azure_rm_securitygroup module (caused by changes to
    the azure python API).
  * Bump Azure storage client minimum to 1.5.0 to fix
    deserialization issues.
    This will break Azure Stack until it receives storage API
    version 2017-10-01 or changes are made to support multiple
    versions.
  * Flush stdin when passing the become password. Fixes some cases
    of timeout on Python 3 with the ssh connection plugin.
update to version v2.4.2.0:
  * lock azure containerservice to below 2.0.0
  * ovirt_host_networks: Fix label assignment
  * Fix vault --ask-vault-pass with no tty (#31493)
  * cherry-pick changes of azure_rm_common from devel to 2.4 (#32607)
  * Fixes #31090. In network parse_cli filter plugin, this change moves the creation of a (#31092) (#32458)
  * Use an abspath for network inventory ssh key path.
  * Remove toLower on source (#31983)
  * Add k8s_common.py logging fixes to the changelog
  * inserts enable cmd hash with auth_pass used (#32107)
  * Fix exception upon display.warn() (#31876)
  * ios_system: Fix typo in unit test (#32284)
  * yum: use the C locale when screen scraping (#32203)
  * Use region derived from get_aws_connection_info() in dynamodb_table to fix tagging bug (#32557)
  * fix item var in delegation (#32986)
  * Add changelog entry for elb_application_lb fix
  * Add a validate example to blockinfile. (#32088)
  * Correct formatting --arguments (#31808)
  * Add changelog for URI/get_url fix
  * [cloud] Bugfix for aws_s3 empty directory creation (#32198)
  * Fix junos integration test fixes as per connection refactor (#33050) (#33055)
  * Update win_copy for #32677 (#32682)
  * ios_interface testfix (#32381)
  * Add proper check mode support to the script module (#31852)
  * Add galaxy --force fix to changelog
  * Fix non-ascii errors in config manager
  * Add python3 urllib fixes to changelog
  * Add changelog entry for the stdin py3 fix
  * Update version info for the 2.4.2 release
  * Add max_fail_percentage fix to changelog
  * Changelog entry for script inventory plugin fix.
  * Make RPM spec compatible with RHEL 6 (#31653)
  * Add changelog entry for the yum locale fix
  * Use vyos/1.1.8 in CI.
  * Fix patching to epel package
  * Pass proper error value to to_text (#33030)
  * Fix and re-enable zypper* integration tests in CI.
  * avoid chroot paths (#32778)
  * Add changelog entry for inventory nonascii paths fix
  * Fix ios_config integration test failures (#32959) (#32970)
  * Fix ios_config file prompt issue (#32744) (#32780)
  * Mdd module unit test docs (#31373)
  * dont add all group vars to implicit on create
  * Fix nxos_banner removal idempotence issue in N1 images (#31259)
  * Clarify the release and maintenance cycle (#32402)
  * Add ansible_distribution_major_version to macOS (#31708)
  * Docs (#32718)
  * Keep newlines when reading LXC container config file (#32219)
  * Updated changelog for vmware logon error handling
  * New release v2.4.2.0-0.2.beta2
  * added doc notes about vars plugins in precedence
  * revert module_utils/nxos change from #32846 (#32956)
  * [cloud] add boto3 requirement to `cloudformation` module docs (#31135)
  * Fixes #31056 (#31057)
  * - Fix logging module issue where facility is being deleted along with host (#32234)
  * Get the moid in a more failsafe manner (#32671)
  * Integration Tests only: add static route, snmp_user, snapshot and hsrp it cases (#28933)
  * Add the change to when we escape backslashes (for the template lookup plugin) to changelog
  * correctly deal with changed (#31812)
  * Add the template lookup escaping to the 2.4 porting guide (#32760)
  * tests for InventoryModule error conditions (#31381)
  * Disable pylint rules for stable-2.4.
  * fix typo
  * Enable TLS1.1 and TLS1.2 for win_package (#32184)
  * Add remove host fix to changelog
  * ios_interface provider issue testfix (#32335)
  * win_service: quoted path fix (#32469)
  * Add changes to succeeded/failed tests to the 2.4 porting guide (#33201)
  * Run OS X tests in 3 groups in CI.
  * ini inventory: document value parsing workaround
  * Change netconf port in testcase as per test enviornment (#32883) (#32889)
  * fix inventory loading for ansible-doc
  * jsonify inventory (#32990)
  * firewalld: don't reference undefined variable in error case (#31949)
  * change ports to non well known ports and drop time_range for N1 (#31261)
  * make vars only group declarations an error
  * Add changelog for os_floating_ip fix
  * Fix example on comparing master config (#32406)
  * py2/py3 safer shas on hostvars (#31788)
  * ensure we always have a basedir
  * Add missing ansible-test --remote-terminate support. (#32918)
  * Use show command to support wider platform set for nxos_interface module (#33037)
  * ios_logging: change IOS command pipe to section to include (#33100) (#33116)
  * win_find: allow module to skip on files it fails to check (#32105)
  * New release v2.4.2.0-0.4.beta4
  * multiple nxos fixes (#32905)
  * Add changelog entry for git archive fix
  * Add changelog entries for a myriad of 2.4.2 bugfixes
  * iosxr integration testfix (#32344)
  * Fix #31694: running with closed stdin on python 3 (#31695)
  * Add eos_user fix to changelog
  * updated changelog with win_find fix
  * Added urls python3 fix to changelog
  * [cloud] Support changeset_name parameter on CloudFormation stack create (#31436)
  * use configured ansible_shell_executable
  * New release v2.4.2.0-0.3.beta3
  * Fix ec2_lc failing to create multi-volume configurations (#32191)
  * Changelog win_package TLS fix
  * Fix wrong prompt issue for network modules (#32426) (#32442)
  * New release v2.4.2.0-0.1.beta1
  * Exclude stack policy when running in check mode.
  * change inventory_hostname to ansible_host to fix test (#32890) (#32891)
  * Add azure_rm_acs check mode fix
  * Updated changelog for win_copy fix
  * corrected package docs
  * make sure patterns are strings
  * Add more bugfixes to changelog
  * Fix junos netconf port issue in integration test (#32610) (#32668)
  * fixed .loads error for non decoded json in Python 3 (#32065)
  * nxos_config and nxos_facts - fixes for N35 platform.  (#32762) (#32875)
  * Add changelog entry for #32219
  * Remove provider from  ios integration test (#31037) (#32230)
  * added note about serial behaviour (#32461)
  * Fixes ios_logging unit test (#32240)
  * Avoid AttributeError: internal_network on os_floating_ip (#32887)
  * use to_str instead of json.dumps when serializing k8s object for logging
  * Prefer the stdlib SSLContext over urllib3 context
  * git: fix archive when update is set to no (#31829)
  * Add elb_target_group port fix to the changelog
  * Changelog entry for aws_s3 issue #32144
  * Add error handling for user login (#32613)
  * Move asa provider to suboptions (#32356)
  * fix dci failure nxos (#32877) (#32878)
  * Add inventory jsonification to the changelog
  * eos_eapi: adding the desired state config to the new vrf fixes #32111 (#32112) (#32452)
  * Handle ip name-server lines containing multiple nameservers (#32235) (#32373)
  * Remove provider from prepare_ios_tests integration test (#31038)
  * Add last minute bugfixes and doc updates for rc1
  * Fix snmp bugs on Nexus 3500 platform (#32773) (#32847)
  * validate that existing dest is valid directory
  * Update the release data for 2.4.1 in the changelog
  * add check mode for acs delete (#32063)
  * More fixes added to changelog
  * Add wait_for fix to the changelog
  * removed psobject to hashtables that were missed (#32710)
  * wait_for: treat broken connections as 'unready' (#28839)
  * Return all elements in a more robust way
  * fix ios_interface test (#32372)
  * Add missing packages to default docker image.
  * fix nxos_igmp_snooping (#31688)
  * - Fix to return error message back to the module. (#31035)
  * Ensure that readonly result members are serialized (#33170)
  * Keywords docs (#32807)
  * remove hosts from removed when rescuing
  * Add panos_security_rule docs typo fix to changelog
  * Update vyos completion in network.txt.
  * move to use ansible logging
  * ovirt_clusters: Fix fencing and kuma comparision
  * Documentation typo fixes (#32473)
  * [fix] issue #30516 : take care about autoremove in upgrade function
  * Enable ECHO in prompt module (#32083)
  * calculate max fail against all hosts in batch
  * Fix urlparse import for Python3 (#31240)
  * Bunch of changelog updates for cherry-picks
  * restore hostpattern regex/glob behaviour
  * Better handling of malformed vault data envelope (#32515)
  * Updated changelog regarding win_service quoted path fix
  * nxos_interface error handling (#32846)
  * An availability zone will be selected if none is provided. Set az to an empty string if it's None to avoid traceback. (#32216)
  * Use to_native when validating proxy result (#32596)
  * vmware_guest: refactor spec serialization (#32681)
  * Add new default Docker container for ansible-test. (#31944)
  * warn on bad keys in group
  * NXOS: Integration tests to Ansible (part 3) (#29030)
  * Add spec file fix to changelog
  * eos_user testfix (#32264)
  * iam.py: return iam.role dict when creating roles (#28964)
  * Add networking bug fixes to changelog (#32201)
  * [cloud] sns_topic: Fix unreferenced variable
  * Fix service_mgr fact collection (#32086)
  * Fix include_role unit tests (#31920)
  * Updated changelog for win_iis_* modules things
  * handle ignore_errors in loop
  * adjust nohome param when using luser
  * better cleanup on task results display (#27175)
  * Improve python 2/3 ABC fallback for pylint. (#31848)
  * fix html formatting
  * Add ansible_shell_executable fix to changelog
  * Move resource pool login to a separate function and fix undefined var reference (#32674)
  * Update ansible-test sanity command. (#31958)
  * ios_ping test fix (#32342)
  * fix CI failure yaml syntax (#32374)
  * Scan group_vars/host_vars in sorted order
  *     luseradd defaults to creating w/o need for -m (#32411)
  * Integration Tests only:  nxos_udld, nxos_udld_interface, nxos_vxlan_vtep_vni (#29143) (#32962)
  * Fix: modifying existing application lb using certificates now properly sets certificates (#28217)
  * ios_logging: Fix some smaller issues, add unit test (#32321)
  * Fix nxos_snmp_host bug (#32916) (#32958)
  * ovirt_hosts: Don't fail upgrade when NON_RESPONSIVE state
  * ini plugin should recursively instantiate pending
  * eos_user: sends user secret first on user creation fixes #31680 (#32162)
  * Cast target port to an int in elb_target_group. Fixes #32098 (#32202)
  * New release v2.4.2.0-0.5.rc1
  * remove misleading group vars as they are flat (#32276)
  * Fix typo
  * Avoid default inventory proccessing for pull (#32135)
  * Fix ansible-test default image. (#31966)
  * removed superfluous `type` field from RecordSet constructor (#33167)
  * Update k8s_common.py
  * Add ios_logging fixes to changelog 2.4.2beta2 (#32447)
  * Revert 'Removed a force conditional (#28851)' (#32282)
  * Add new documentation on writing unittests to the changelog
  * Fix ansible-test race calling get_coverage_path.
  * New release v2.4.2.0-1
- update to 2.3.2.0 (final) - bsc#1059235
- update to 2.3.1 RC1 (package version 2.3.0.1) (bsc#1056094):
    as 'unsafe'. bsc#1038785
  * SECURITY (MODERATE): fix for CVE-2017-7466, which finally fixes
    an arbitrary command execution vulnerability
- security update to rc4 of 2.2.1.0 version CVE-2016-9587,
  CVE-2016-8628, CVE-2016-8614, CVE-2016-8647, CVE-2016-9587
  (bsc#1008037, bsc#1008038, bsc#1010940, bsc#1019021)

Changes in ardana-ansible:
- Update to version 8.0+git.1596735237.54109b1:
  * Update the Swift XFS inode size check (SOC-10300)

- Update to version 8.0+git.1596204601.75b0e4e:
  * Fix upgrade validations Keystone V3 check target (SOC-10300)

Changes in ardana-cinder:
- Update to version 8.0+git.1596129856.263f430:
  * Install python-swiftclient as cinder-backup dependency (SOC-11364)

Changes in ardana-glance:
- Update to version 8.0+git.1593631779.76fa9b7:
  * Idempotent cirros image upload to glance (SOC-11342)

Changes in ardana-mq:
- Update to version 8.0+git.1593618123.678c32b:
  * Ensure epmd.service started/stopped independent of rabbitmq (SOC-6780)

Changes in ardana-nova:
- Update to version 8.0+git.1601298847.dd01585:
  * restore ram_weight_multiplier to default (bsc#1123561)
  * enable all weigher classes by default (bsc#1123561)

- Update to version 8.0+git.1595857666.cf6b4a9:
  * Correction for (bsc#1174242)

- Update to version 8.0+git.1595356665.56726ed:
  * Disable nova-consoleauth monasca process check (bsc#1174242)

Changes in ardana-osconfig:
- Update to version 8.0+git.1595885113.93abcbc:
  * Enable SLE12 SP3 LTSS for SMT deployments (SOC-11223)

Changes in crowbar-core:
- Update to version 5.0+git.1600432272.b3ad722f0:
  * provisioner: check for client_user (SOC-11389)
  * upgrade: Allow transition from crowbar_upgrade to reboot (trivial)

- Update to version 5.0+git.1600352887.1e23b8015:
  * Ignore CVE-2020-15169 (SOC-11391)

- Update to version 5.0+git.1594898401.caf0b325c:
  * crowbar: Also add access to /restricted/ in SSL vhost (SOC-11352)

- Update to version 5.0+git.1593779118.8362c57e5:
  * crowbar: Allow hardware-installing -&gt; discovering transition (noref)
  * crowbar: Add Restricted controller with API for restricted clients (bsc#1117080)
  * crowbar: Add complete list of states to Crowbar::State (noref)
  * provisioner: Remove the need for /updates/parse_node_data (noref)
  * crowbar: Create helper module to validate states (noref)
  * provisioner: Use new restricted API (bsc#1117080)
  * provisioner: Do not read /etc/crowbar.install.key from crowbar_joi (bsc#1117080)
  * provisioner: Remove use of privileged user for Windows machine (bsc#1117080)
  * provisioner: Use restricted client during provisioning (bsc#1117080)
  * provisioner: Use restricted client for crowbar_register (bsc#1117080)
  * provisioner: Drop /etc/crowbar.install.key bits from autoyast prof (bsc#1117080)
  * Avoid hardcoding machine-install user (bsc#1117080)
  * crowbar: Restrict admin access (bsc#1117080)

Changes in crowbar-openstack:
- Update to version 5.0+git.1599037158.5c4d07480:
  * horizon: Update configuration for Grafana 5.x

Changes in documentation-suse-openstack-cloud:
- Update to version 8.20201007:
  * reveresed step8 and 9 in PTF installation (SOC-10616)
  * Modified the PTF install instructions as per the (SOC-10616)

- Update to version 8.20200904:
  * Clarify reboot instructions during update workflow (SOC-11386)

- Update to version 8.20200921:
  * replacd postgreSQL to MariaDB as per comments4 and 5 in ticket (SOC-11000)

- Update to version 8.20200424:
  * Update ESX documentation for DVS creation (bsc#1142121)
  * Fix table issues

Changes in grafana:
- BuildRequire go1.14 explicitly 

- Add recompress source service
- Add go_modules source service to create vendor.tar.gz
  containing 3rd party go modules.
- Adjust spec to work for Grafana-6.7.4
- Adjust Makefile to work for Grafana-6.7.4
- Remove CVE-2019-15043.patch (merged upstream)
- Remove CVE-2020-13379.patch (merged upstream)
- Remove 0001-fix-XSS-vulnerabilities-in-dashboard-links.patch (merged upstream)
- Remove 0002-CVE-2020-12052-bsc1170657-XSS-annotation-popup-vulnerability.patch
  (merged upstream)
- Remove systemd-notification.patch (merged upstream)
- Update to version 6.7.4 (bsc#1172450, CVE-2018-18623,
  CVE-2018-18624, CVE-2018-18625, bsc#1174583, CVE-2020-11110)
  * Security: Urgent security fix for stored XSS
- Update to version 6.7.3
  * Admin: Fix Synced via LDAP message for non-LDAP external users. [#23477]
  * Alerting: Fix notifications for alerts with empty message in Google
    Hangouts notifier. [#23559]
  * AuthProxy: Fix bug where long username could not be cached. [#22926]
  * Dashboard: Fix saving dashboard when editing raw dashboard JSON model.
    [#23314]
  * Dashboard: Try to parse 8 and 15 digit numbers as timestamps if parsing of
    time range as date fails. [#21694]
  * DashboardListPanel: Fix problem with empty panel after going into edit
    mode (General folder filter being automatically added) . [#23426]
  * Data source: Handle datasource withCredentials option properly. [#23380]
  * Security: Fix annotation popup XSS vulnerability [#23813]
  * Security: Fix XSS vulnerability in table panel [#23816]
  * Server: Exit Grafana with status code 0 if no error. [#23312]
  * TablePanel: Fix XSS issue in header column rename (backport). [#23814]
  * Variables: Fix error when setting adhoc variable values. [#23580]
- Update to version 6.7.2
  * BackendSrv: Adds config to response to fix issue for external plugins that
    used this property . [#23032]
  * Dashboard: Fix issue with saving new dashboard after changing title .
    [#23104]
  * DataLinks: make sure we use the correct datapoint when dataset contains
    null value.. [#22981]
  * Plugins: Fix issue for plugins that imported dateMath util . [#23069]
  * Security: Fix for dashboard snapshot original dashboard link could contain
    XSS vulnerability in url. [#23254]
  * Variables: Fix issue with too many queries being issued for nested
    template variables after value change. [#23220]
  * Plugins: Expose promiseToDigest. [#23249]
  * Reporting: Fix issue updating a report created by someone else
    (Enterprise)
- Update to version 6.7.1
  * Azure: Fix dropdowns not showing current value. [#22914]
  * BackendSrv: only add content-type on POST, PUT requests. [#22910]
  * Panels: Fix size issue with panel internal size when exiting panel edit
    mode. [#22912]
  * Reporting: fixes migrations compatibility with mysql (Enterprise)
  * Reporting: Reduce default concurrency limit to 4 (Enterprise)
- Update to version 6.7.0
  * AzureMonitor: support workspaces function for template variables. [#22882]
  * SQLStore: Add migration for adding index on annotation.alert_id. [#22876]
  * TablePanel: Enable new units picker . [#22833]
  * AngularPanels: Fix inner height calculation for angular panels. [#22796]
  * BackendSrv: makes sure provided headers are correctly recognized and set. [#22778]
  * Forms: Fix input suffix position (caret-down in Select) . [#22780]
  * Graphite: Fix issue with query editor and next select metric now showing
    after selecting metric node [#22856]
  * Rich History: UX adjustments and fixes. [#22729]
  * Slack: Removed _Mention_ setting and instead introduce _Mention Users_,
    _Mention Groups_, and _Mention Channel_.
  * Alerting: Reverts the behavior of `diff` and `percent_diff` to not always
    be absolute.
  * API: Include IP address when logging request error. [#21596]
  * Alerting: Support passing tags to Pagerduty and allow notification on
    specific event categories [#21335]
  * Chore: Remove angular dependency from backendSrv. [#20999]
  * CloudWatch: Surround dimension names with double quotes. [#22222]
  * CloudWatch: updated metrics and dimensions for Athena, DocDB, and
    Route53Resolver. [#22604]
  * Cloudwatch: add Usage Metrics. [#22179]
  * Dashboard: Adds support for a global minimum dashboard refresh interval.
    [#19416]
  * DatasourceEditor: Add UI to edit custom HTTP headers. [#17846]
    Elastic: To get fields, start with today's index and go backwards. [#22318]
  * Explore: Rich history. [#22570]
  * Graph: canvas's Stroke is executed after loop. [#22610]
  * Graphite: Don't issue empty 'select metric' queries. [#22699]
  * Image Rendering: Store render key in remote cache to enable renderer to
    callback to public/load balancer URL when running in HA mode. [#22031]
  * LDAP: Add fallback to search_base_dns if group_search_base_dns is
    undefined [#21263]
  * OAuth: Implement Azure AD provide. [#20030]
  * Prometheus: Implement region annotation. [#22225]
  * Prometheus: make \$\_\_range more precise. [#21722]
  * Prometheus: Do not show rate hint when increase function is used in query.
    [#21955]
  * Stackdriver: Project selector. [#22447]
  * TablePanel: display multi-line text. [#20210]
  * Templating: Add new global built-in variables. [#21790]
  * Reporting: add concurrent render limit to settings (Enterprise)
  * Reporting: Add rendering timeout in settings (Enterprise)
  * API: Fix redirect issues. [#22285]
  * Alerting: Don't include image_url field with Slack message if empty.
    [#22372]
  * Alerting: Fix bad background color for default notifications in alert tab
    . [#22660]
  * Annotations: In table panel when setting transform to annotation, they will
    now show up right away without a manual refresh. [#22323]
  * Azure Monitor: Fix app insights source to allow for new timeFrom and
    timeTo. [#21879]
  * BackendSrv: Fix POST body for form data. [#21714]
  * CloudWatch: Credentials cache invalidation fix. [#22473]
    CloudWatch: Expand alias variables when query yields no result [#22695]
  * Dashboard: Fix bug with NaN in alerting. [#22053]
  * Explore: Fix display of multiline logs in log panel and explore. [#22057]
  * Heatmap: Legend color range is incorrect when using custom min/max
    [#21748]
  * Security: Fix XSS issue in dashboard history diff. [#22680]
  * StatPanel: Fix base color being used for null values. [#22646]
- Update to version 6.6.2
  * Data proxy: Log proxy errors using Grafana logger. [#22174]
  * Metrics: Add gauge for requests currently in flight. [#22168]
  * @grafana/ui: Fix displaying of bars in React Graph. [#21968]
  * API: Fix redirect issue when configured to use a subpath. [#21652]
  * API: Improve recovery middleware when response already been written [#22256]
  * Auth: Don't rotate auth token when requests are cancelled by client [#22106]
  * Elasticsearch: Fix auto interval for date histogram in explore logs mode. [#21937]
  * Image Rendering: Fix PhantomJS compatibility with es2016 node dependencies. [#21677]
  * Links: Assure base url when single stat, panel and data links are built. [#21956]
  * Loki, Prometheus: Fix PromQL and LogQL syntax highlighting. [#21944]
  * OAuth: Enforce auto_assign_org_id setting when role mapping enabled using
    Generic OAuth. [#22268]
  * Prometheus: Updates explore query editor to prevent it from throwing error
    on edit. [#21605]
  * Server: Reorder cipher suites for better security. [#22101]
  * TimePicker: fixing weird behavior with calendar when switching between
    months/years. [#22253]
- Update to version 6.6.1
  * Annotations: Change indices and rewrites annotation find query to improve
    database query performance. [#21915]
  * Azure Monitor: Fix Application Insights API key field to allow input. [#21738]
  * BarGauge: Fix so we properly display the 'no result' value when query
    returns empty result. [#21791]
  * Datasource: Show access (Browser/Server) select on the Prometheus
    datasource. [#21833]
  * DatasourceSettings: Fix issue navigating away from data source settings
    page. [#21841]
  * Graph Panel: Fix typo in thresholds form. [#21903]
  * Graphite: Fix issue with functions with multiple required params and no
    defaults [#21814]
  * Image Rendering: Fix render of graph panel legend aligned to the right
    using Grafana image renderer plugin/service. [#21854]
  * Metrics: Adds back missing summary quantiles. [#21858]
  * OpenTSDB: Adds back missing ngInject to make it work again. [#21796]
  * Plugins: Fix routing in app plugin pages. [#21847]
  * Prometheus: Fix default step value for annotation query. [#21934]
  * Quota: Makes LDAP + Quota work for the first login of a new user. [#21949]
  * StatPanels: Fix change from singlestat to Gauge / BarGauge / Stat where
    default min &amp; max (0, 100) was copied . [#21820]
  * TimePicker: Should display in kiosk mode. [#21816]
  * grafana/toolkit: Fix failing linter when there were lint issues. [#21849]
- Update to version 6.6.0
  * CloudWatch: Add DynamoDB Accelerator (DAX) metrics &amp; dimensions. [#21644]
  * CloudWatch: Auto period snap to next higher period. [#21659]
  * Template variables: Add error for failed query variable on time range
    update. [#21731]
  * XSS: Sanitize column link. [#21735]
  * Elasticsearch: Fix adhoc variable filtering for logs query. [#21346]
  * Explore: Fix colors for log level when level value is capitalised. [#21646]
  * Explore: Fix context view in logs, where some rows may have been filtered
    out. [#21729]
    Loki: Fix Loki with repeated panels and interpolation for Explore. [#21685]
  * SQLStore: Fix PostgreSQL failure to create organisation for first time. [#21648]
  * PagerDuty: Change `payload.custom_details` field in PagerDuty notification
    to be a JSON object instead of a string.
  * Security: The `[security]` setting `cookie_samesite` configured to `none`
    now renders cookies with `SameSite=None` attribute.
  * Graphite: Add Metrictank dashboard to Graphite datasource
  * Admin: Show name of user in users table view. [#18108]
  * Alerting: Add configurable severity support for PagerDuty notifier. [#19425]
  * Alerting: Add more information to webhook notifications. [#20420]
  * Alerting: Add support for sending tags in OpsGenie notifier. [#20810]
  * Alerting: Added fallbackText to Google Chat notifier. [#21464]
  * Alerting: Adds support for sending a single email to all recipients in
    email notifier. [#21091]
  * Alerting: Enable setting of OpsGenie priority via a tag. [#21298]
  * Alerting: Use fully qualified status emoji in Threema notifier. [#21305]
  * Alerting: new min_interval_seconds option to enforce a minimum evaluation
    frequency. [#21188]
  * CloudWatch: Calculate period based on time range. [#21471]
  * CloudWatch: Display partial result in graph when max DP/call limit is
    reached. [#21533]
  * CloudWatch: ECS/ContainerInsights metrics support. [#21125]
  * CloudWatch: Upgrade aws-sdk-go. [#20510]
  * DataLinks: allow using values from other fields in the same row (cells). [#21478]
  * Editor: Ignore closing brace when it was added by editor. [#21172]
  * Explore: Context tooltip to copy labels and values from graph. [#21405]
  * Explore: Log message line wrapping options for logs. [#20360]
  * Forms: introduce RadioButtonGroup. [#20828]
  * Frontend: Changes in Redux location should not strip subpath from location
    url. [#20161]
  * Graph: Add fill gradient option to series override line fill. [#20941]
  * Graphite: Add metrictank dashboard to Graphite datasource. [#20776]
  * Graphite: Do not change query when opening the query editor and there is no
    data. [#21588]
  * Gravatar: Use HTTPS by default. [#20964]
  * Loki: Support for template variable queries. [#20697]
  * NewsPanel: Add news as a builtin panel. [#21128]
  * OAuth: Removes send_client_credentials_via_post setting. [#20044]
  * OpenTSDB: Adding lookup limit to OpenTSDB datasource settings. [#20647]
  * Postgres/MySQL/MSSQL: Adds support for region annotations. [#20752]
  * Prometheus: Field to specify step in Explore. [#20195]
  * Prometheus: User metrics metadata to inform query hints. [#21304]
  * Renderer: Add user-agent to remote rendering service requests. [#20956]
  * Security: Add disabled option for cookie samesite attribute. [#21472]
  * Stackdriver: Support meta labels. [#21373]
  * TablePanel, GraphPanel: Exclude hidden columns from CSV. [#19925]
  * Templating: Update variables on location changed. [#21480]
  * Tracing: Support configuring Jaeger client from environment. [#21103]
  * Units: Add currency and energy units. [#20428]
  * Units: Support dynamic count and currency units. [#21279]
  * grafana/toolkit: Add option to override webpack config. [#20872]
  * grafana/ui: ConfirmModal component. [#20965]
  * grafana/ui: Create Tabs component. [#21328]
  * grafana/ui: New table component. [#20991]
  * grafana/ui: New updated time picker. [#20931]
  * White-labeling: Makes it possible to customize the footer and login
    background (Enterprise)
  * API: Optionally list expired API keys. [#20468]
  * Alerting: Fix custom_details to be a JSON object instead of a string in
    PagerDuty notifier. [#21150]
  * Alerting: Fix image rendering and uploading timeout preventing to send
    alert notifications. [#21536]
  * Alerting: Fix panic in dingding notifier. [#20378]
  * Alerting: Fix template query validation logic. [#20721]
  * Alerting: If no permission to clear history, keep the historical data. [#19007]
  * Alerting: Unpausing a non-paused alert rule should not change status to
    Unknown. [#21375]
  * Api: Fix returned message when enabling, disabling and deleting a
    non-existing user. [#21391]
  * Auth: Rotate auth tokens at the end of requests. [#21347]
  * Azure Monitor: Fix error when using azure monitor credentials with log
    analytics and non-default cloud. [#21032]
  * CLI: Return error and aborts when plugin file extraction fails. [#20849]
  * CloudWatch: Multi-valued template variable dimension alias fix. [#21541]
  * Dashboard: Disable draggable panels on small devices. [#20629]
  * DataLinks: Links with \${\_\_value.time} do not work when clicking on first
    result. [#20019]
  * Explore: Fix showing of results in selected timezone (UTC/local). [#20812]
  * Explore: Fix timepicker when browsing back after switching datasource. [#21454]
  * Explore: Sync timepicker and logs after live-tailing stops. [#20979]
  * Graph: Fix when clicking a plot on a touch device we won't display the
    annotation menu. [#21479]
  * OAuth: Fix role mapping from id token. [#20300]
  * Plugins: Add appSubUrl string to config pages. [#21414]
  * Provisioning: Start provision dashboards after Grafana server have started. [#21564]
  * Render: Use https as protocol when rendering if HTTP2 enabled. [#21600]
  * Security: Use same cookie settings for all cookies. [#19787]
  * Singlestat: Support empty value map texts. [#20952]
  * Units: Custom suffix and prefix units can now be specified, for example
    custom currency &amp; SI &amp; time formats. [#20763]
  * grafana/ui: Do not build grafana/ui in strict mode as it depends on
    non-strict libs. [#21319]
- Update to version 6.5.3
  * API: Validate redirect_to cookie has valid (Grafana) url. [#21057]
  * AdHocFilter: Shows SubMenu when filtering directly from table. [#21017]
  * Cloudwatch: Fix crash when switching from cloudwatch data source. [#21376]
  * DataLinks: Sanitize data/panel link URLs. [#21140]
  * Elastic: Fix multiselect variable interpolation for logs. [#20894]
  * Prometheus: allow user to change HTTP Method in config settings. [#21055]
  * Prometheus: Prevents validation of inputs when clicking in them without
    changing the value. [#21059]
  * Rendering: Fix panel PNG rendering when using sub url and
    serve_from_sub_path = true. [#21306]
  * Table: Matches column names with unescaped regex characters. [#21164]
- Update to version 6.5.2
  * Alerting: Improve alert threshold handle dragging behavior. [#20922]
  * AngularPanels: Fix loading spinner being stuck in some rare cases. [#20878]
  * CloudWatch: Fix query editor does not render in Explore. [#20909]
  * CloudWatch: Remove illegal character escaping in inferred expressions. [#20915]
  * CloudWatch: Remove template variable error message. [#20864]
  * CloudWatch: Use datasource template variable in curated dashboards. [#20917]
  * Elasticsearch: Set default port to 9200 in ConfigEditor. [#20948]
  * Gauge/BarGauge: Added support for value mapping of 'no data'-state to
    text/value. [#20842]
  * Graph: Prevent tooltip from being displayed outside of window. [#20874]
  * Graphite: Fix error with annotation metric queries. [#20857]
  * Login: Fix fatal error when navigating from reset password page. [#20747]
  * MixedDatasources: Do not filter out all mixed data sources in add mixed
    query dropdown. [#20990]
  * Prometheus: Fix caching for default labels request. [#20718]
  * Prometheus: Run default labels query only once. [#20898]
  * Security: Fix invite link still accessible after completion or revocation. [#20863]
  * Server: Fail when unable to create log directory. [#20804]
  * TeamPicker: Increase size limit from 10 to 100. [#20882]
  * Units: Remove SI prefix symbol from new milli/microSievert(/h) units. [#20650]
- Update to version 6.5.1
  * CloudWatch: Region template query fix. [#20661]
  * CloudWatch: Fix annotations query editor loading. [#20687]
  * Panel: Fix undefined services/dependencies in plugins without
    `/@ngInject*/`. [#20696]
  * Server: Fix failure to start with 'bind: address already in use' when using
    socket as protocol. [#20679]
  * Stats: Fix active admins/editors/viewers stats are counted more than once
    if the user is part of more than one org. [#20711]
- Update to version 6.5.0
  * CloudWatch: Add curated dashboards for most popular amazon services. [#20486]
  * CloudWatch: Enable Min time interval. [#20260]
  * Explore: UI improvements for log details. [#20485]
  * Server: Improve grafana-server diagnostics configuration for profiling and
    tracing. [#20593]
  * BarGauge/Gauge: Add back missing title option field display options. [#20616]
  * CloudWatch: Fix high CPU load. [#20579]
  * CloudWatch: Fix high resolution mode without expression. [#20459]
  * CloudWatch: Make sure period variable is being interpreted correctly. [#20447]
  * CloudWatch: Remove HighResolution toggle since it's not being used. [#20440]
  * Cloudwatch: Fix LaunchTime attribute tag bug. [#20237]
  * Data links: Fix URL field turns read-only for graph panels. [#20381]
  * Explore: Keep logQL filters when selecting labels in log row details. [#20570]
  * MySQL: Fix TLS auth settings in config page. [#20501]
  * Provisioning: Fix unmarshaling nested jsonData values. [#20399]
  * Server: Should fail when server is unable to bind port. [#20409]
  * Templating: Prevents crash when \$\_\_searchFilter is not a string. [#20526]
  * TextPanel: Fix issue with template variable value not properly html
    escaped [#20588]
  * TimePicker: Should update after location change. [#20466]
  * CloudWatch: use GetMetricsData API for all queries
  * CloudWatch: The GetMetricData API does not return metric unit, so unit auto
    detection in panels is no longer supported.
  * CloudWatch: The `HighRes` switch has been removed from the query editor.
  * API: Add `createdAt` and `updatedAt` to api/users/lookup. [#19496]
  * API: Add createdAt field to /api/users/:id. [#19475]
  * Admin: Adds setting to disable creating initial admin user. [#19505]
  * Alerting: Include alert_state in Kafka notifier payload. [#20099]
  * AuthProxy: Can now login with auth proxy and get a login token. [#20175]
  * AuthProxy: replaces setting ldap_sync_ttl with sync_ttl. [#20191]
  * AzureMonitor: Alerting for Azure Application Insights. [#19381]
  * Build: Upgrade to Go 1.13. [#19502]
  * CLI: Reduce memory usage for plugin installation. [#19639]
  * CloudWatch: Add ap-east-1 to hard-coded region lists. [#19523]
  * CloudWatch: ContainerInsights metrics support. [#18971]
  * CloudWatch: Support dynamic queries using dimension wildcards [#20058]
  * CloudWatch: Stop using GetMetricStatistics and use GetMetricData for all
    time series requests [#20057]
  * CloudWatch: Convert query editor from Angular to React [#19880]
  * CloudWatch: Convert config editor from Angular to React [#19881]
  * CloudWatch: Improved error handling when throttling occurs [#20348]
  * CloudWatch: Deep linking from Grafana panel to CloudWatch console [#20279]
  * CloudWatch: Add Grafana user agent to GMD calls [#20277]
  * Dashboard: Allows the d-solo route to be used without slug. [#19640]
  * Elasticsearch: Adds support for region annotations. [#17602]
  * Explore: Add custom DataLinks on datasource level (like tracing links). [#20060]
  * Explore: Add functionality to show/hide query row results. [#19794]
  * Explore: Synchronise time ranges in split mode. [#19274]
  * Explore: UI change for log row details . [#20034]
  * Frontend: Migrate DataSource HTTP Settings to React. [#19452]
  * Frontend: Show browser not supported notification. [#19904]
  * Graph: Added series override option to have hidden series be persisted on
    save. [#20124]
  * Graphite: Add Metrictank option to settings to view Metrictank request
    processing info in new inspect feature. [#20138]
  * LDAP: Enable single user sync. [#19446]
  * LDAP: Last org admin can login but wont be removed. [#20326]
  * LDAP: Support env variable expressions in ldap.toml file. [#20173]
  * OAuth: Generic OAuth role mapping support. [#17149]
  * Prometheus: Custom query parameters string for Thanos downsampling. [#19121]
  * Provisioning: Allow saving of provisioned dashboards. [#19820]
  * Security: Minor XSS issue resolved by angularjs upgrade from 1.6.6 -&gt;
    1.6.9. [#19849]
  * TablePanel: Prevents crash when data contains mixed data formats. [#20202]
  * Templating: Introduces \$\_\_searchFilter to Query Variables. [#19858]
  * Templating: Made default template variable query editor field a textarea
    with automatic height. [#20288]
  * Units: Add milli/microSievert, milli/microSievert/h and pixels. [#20144]
  * Units: Added mega ampere and watt-hour per kg. [#19922]
  * Enterprise: Enterprise without a license behaves like OSS (Enterprise)
  * API: Added dashboardId and slug in response to dashboard import api. [#19692]
  * API: Fix logging of dynamic listening port. [#19644]
  * BarGauge: Fix so that default thresholds not keeps resetting. [#20190]
  * CloudWatch: Fix incorrect casing of Redshift dimension entry for service
    class and stage. [#19897]
  * CloudWatch: Fixing AWS Kafka dimension names. [#19986]
  * CloudWatch: Metric math broken when using multi template variables [#18337]
  * CloudWatch: Graphs with multiple multi-value dimension variables don't work [#17949]
  * CloudWatch: Variables' values surrounded with braces in request sent to AWS [#14451]
  * CloudWatch: Cloudwatch Query for a list of instances for which data is
    available in the selected time interval [#12784]
  * CloudWatch: Dimension's positioning/order should be stored in the json
    dashboard [#11062]
  * CloudWatch: Batch CloudWatch API call support in backend [#7991]
  * ColorPicker: Fix issue with ColorPicker disappearing too quickly. [#20289]
  * Datasource: Add custom headers on alerting queries. [#19508]
    plugins in alpine. [#20214]
  * Elasticsearch: Fix template variables interpolation when redirecting to
    Explore. [#20314]
  * Elasticsearch: Support rendering in logs panel. [#20229]
  * Explore: Expand template variables when redirecting from dashboard panel. [#19582]
  * OAuth: Make the login button display name of custom OAuth provider. [#20209]
  * ReactPanels: Adds Explore menu item. [#20236]
  * Team Sync: Fix URL encode Group IDs for external team sync. [#20280]
- Update to version 6.4.5
  * CloudWatch: Fix high CPU load [#20579]
- Update to version 6.4.4
  * MySQL: Fix encoding in connection string [#20192]
  * DataLinks: Fix blur issues. [#19883]
  * LDAP: try all LDAP servers even if one returns a connection error. [#20077]
  * LDAP: No longer shows incorrectly matching groups based on role in debug
    page. [#20018]
  * Singlestat: Fix no data / null value mapping . [#19951]
- Update to version 6.4.3
  * Alerting: All notification channels should send even if one fails to send. [#19807]
  * AzureMonitor: Fix slate interference with dropdowns. [#19799]
  * ContextMenu: make ContextMenu positioning aware of the viewport width. [#19699]
  * DataLinks: Fix context menu not showing in singlestat-ish visualisations. [#19809]
  * DataLinks: Fix url field not releasing focus. [#19804]
  * Datasource: Fix issue where clicking outside of some query editors required
    2 clicks. [#19822]
  * Panels: Fix default tab for visualizations without Queries Tab. [#19803]
  * Singlestat: Fix issue with mapping null to text. [#19689]
  * @grafana/toolkit: Don't fail plugin creation when git user.name config is
    not set. [#19821]
  * @grafana/toolkit: TSLint line number off by 1. [#19782]
- Update to version  6.4.2
  * CloudWatch: Changes incorrect dimension wmlid to wlmid . [#19679]
  * Grafana Image Renderer: Fix plugin page. [#19664]
  * Graph: Fix auto decimals logic for y axis ticks that results in too many
    decimals for high values. [#19618]
  * Graph: Switching to series mode should re-render graph. [#19623]
  * Loki: Fix autocomplete on label values. [#19579]
  * Loki: Removes live option for logs panel. [#19533]
  * Profile: Fix issue with user profile not showing more than sessions
    sessions in some cases. [#19578]
  * Prometheus: Always sort results in Panel by query order. [#19597]
  * Show SAML login button if SAML is enabled. [#19591]
  * SingleStat: Fix $__name postfix/prefix usage. [#19687]
  * Table: Proper handling of json data with dataframes. [#19596]
  * Units: Fix wrong id for Terabits/sec. [#19611]
- Update to version 6.4.1
  * Provisioning: Fix issue where empty nested keys in YAML provisioning
    caused server crash, [#19547]
- Update to version 6.4.0
  * Build: Upgrade go to 1.12.10. [#19499]
  * DataLinks: Suggestions menu improvements. [#19396]
  * Explore: Take root_url setting into account when redirecting from dashboard
    to explore. [#19447]
  * Explore: Update broken link to logql docs. [#19510]
  * Logs: Adds Logs Panel as a visualization. [#19504]
  * Reporting: Generate and email PDF reports based on Dashboards (Enterprise)
  * CLI: Fix version selection for plugin install. [#19498]
  * Graph: Fix minor issue with series override color picker and custom color. [#19516]
  * Splunk plugin needs to be updated when upgrading from 6.3 to 6.4
  * Azure Monitor: Remove support for cross resource queries (#19115)'. [#19346]
  * Graphite: Time range expansion reduced from 1 minute to 1 second. [#19246]
  * grafana/toolkit: Add plugin creation task. [#19207]
  * Alerting: Prevents creating alerts from unsupported queries. [#19250]
  * Alerting: Truncate PagerDuty summary when greater than 1024 characters. [#18730]
  * Cloudwatch: Fix autocomplete for Gamelift dimensions. [#19146]
  * Dashboard: Fix export for sharing when panels use default data source. [#19315]
  * Database: Rewrite system statistics query to perform better. [#19178]
  * Gauge/BarGauge: Fix issue with [object Object] in titles . [#19217]
  * MSSQL: Revert usage of new connectionstring format introduced by #18384. [#19203]
  * Multi-LDAP: Do not fail-fast on invalid credentials. [#19261]
  * MySQL, Postgres, MSSQL: Fix validating query with template variables in
    alert. [#19237]
  * MySQL, Postgres: Update raw sql when query builder updates. [#19209]
  * MySQL: Limit datasource error details returned from the backend. [#19373]
  * Reporting: Created scheduled PDF reports for any dashboard (Enterprise).
  * API: Readonly datasources should not be created via the API. [#19006]
  * Alerting: Include configured AlertRuleTags in Webhooks notifier. [#18233]
  * Annotations: Add annotations support to Loki. [#18949]
  * Annotations: Use a single row to represent a region. [#17673]
  * Auth: Allow inviting existing users when login form is disabled. [#19048]
  * Azure Monitor: Add support for cross resource queries. [#19115]
  * CLI: Allow installing custom binary plugins. [#17551]
  * Dashboard: Adds Logs Panel (alpha) as visualization option for Dashboards. [#18641]
  * Dashboard: Reuse query results between panels . [#16660]
  * Dashboard: Set time to to 23:59:59 when setting To time using calendar. [#18595]
  * DataLinks: Add DataLinks support to Gauge, BarGauge and stat panel. [#18605]
  * DataLinks: Enable access to labels &amp; field names. [#18918]
  * DataLinks: Enable multiple data links per panel. [#18434]
  * Elasticsearch: allow templating queries to order by doc_count. [#18870]
  * Explore: Add throttling when doing live queries. [#19085]
  * Explore: Adds ability to go back to dashboard, optionally with query
    changes. [#17982]
  * Explore: Reduce default time range to last hour. [#18212]
  * Gauge/BarGauge: Support decimals for min/max. [#18368]
  * Graph: New series override transform constant that renders a single point
    as a line across the whole graph. [#19102]
  * Image rendering: Add deprecation warning when PhantomJS is used for
    rendering images. [#18933]
  * InfluxDB: Enable interpolation within ad-hoc filter values. [#18077]
  * LDAP: Allow an user to be synchronized against LDAP. [#18976]
  * Ldap: Add ldap debug page. [#18759]
  * Loki: Remove prefetching of default label values. [#18213]
  * Metrics: Add failed alert notifications metric. [#18089]
  * OAuth: Support JMES path lookup when retrieving user email. [#14683]
  * OAuth: return GitLab groups as a part of user info (enable team sync). [#18388]
  * Panels: Add unit for electrical charge - ampere-hour. [#18950]
  * Plugin: AzureMonitor - Reapply MetricNamespace support. [#17282]
  * Plugins: better warning when plugins fail to load. [#18671]
  * Postgres: Add support for scram sha 256 authentication. [#18397]
  * RemoteCache: Support SSL with Redis. [#18511]
  * SingleStat: The gauge option in now disabled/hidden (unless it's an old
    panel with it already enabled) . [#18610]
  * Stackdriver: Add extra alignment period options. [#18909]
  * Units: Add South African Rand (ZAR) to currencies. [#18893]
  * Units: Adding T,P,E,Z,and Y bytes. [#18706]
  * Alerting: Notification is sent when state changes from no_data to ok. [#18920]
  * Alerting: fix duplicate alert states when the alert fails to save to the
    database. [#18216]
  * Alerting: fix response popover prompt when add notification channels. [#18967]
  * CloudWatch: Fix alerting for queries with Id (using GetMetricData). [#17899]
  * Explore: Fix auto completion on label values for Loki. [#18988]
  * Explore: Fix crash using back button with a zoomed in graph. [#19122]
  * Explore: only run queries in Explore if Graph/Table is shown. [#19000]
  * MSSQL: Change connectionstring to URL format to fix using passwords with
    semicolon. [#18384]
  * MSSQL: Fix memory leak when debug enabled. [#19049]
  * Provisioning: Allow escaping literal '$' with '$\$' in configs to avoid
    interpolation. [#18045]
  * TimePicker: Fix hiding time picker dropdown in FireFox. [#19154]
  * Various breaking changes in the annotations HTTP API for region annotations.
- Update to version 6.3.7
  * CloudWatch: Fix high CPU load [#20579]
- Update to version 6.3.6
  * Metrics: Adds setting for turning off total stats metrics. [#19142]
  * Database: Rewrite system statistics query to perform better. [#19178]
  * Explore: Fix error when switching from prometheus to loki data sources. [#18599]
- Update to version 6.3.5
  * Dashboard: Fix dashboards init failed loading error for dashboards with
    panel links that had missing properties. [#18786]
  * Editor: Fix issue where only entire lines were being copied. [#18806]
  * Explore: Fix query field layout in splitted view for Safari browsers. [#18654]
  * LDAP: multildap + ldap integration. [#18588]
  * Profile/UserAdmin: Fix for user agent parser crashes grafana-server on
    32-bit builds. [#18788]
  * Prometheus: Prevents panel editor crash when switching to Prometheus data
    source. [#18616]
  * Prometheus: Changes brace-insertion behavior to be less annoying. [#18698]
- Update to version 6.3.4
  * Annotations: Fix failing annotation query when time series query is
    cancelled. [#18532]
  * Auth: Do not set SameSite cookie attribute if cookie_samesite is none. [#18462]
  * DataLinks: Apply scoped variables to data links correctly. [#18454]
  * DataLinks: Respect timezone when displaying datapoint's timestamp in graph
    context menu. [#18461]
  * DataLinks: Use datapoint timestamp correctly when interpolating variables. [#18459]
  * Explore: Fix loading error for empty queries. [#18488]
  * Graph: Fix legend issue clicking on series line icon and issue with
    horizontal scrollbar being visible on windows. [#18563]
  * Graphite: Avoid glob of single-value array variables . [#18420]
  * Prometheus: Fix queries with label_replace remove the \$1 match when
    loading query editor. [#18480]
  * Prometheus: More consistently allows for multi-line queries in editor. [#18362]
  * TimeSeries: Assume values are all numbers. [#18540]
- Update to version 6.3.2
  * Gauge/BarGauge: Fix issue with lost thresholds and an issue loading Gauge
    with avg stat. [#18375]
- Update to version 6.3.1
  * PanelLinks: Fix crash issue with Gauge &amp; Bar Gauge panels with panel links
    (drill down links). [#18430]
- Update to version 6.3.0
  * OAuth: Do not set SameSite OAuth cookie if cookie_samesite is None. [#18392]
  * PanelLinks: Fix render issue when there is no panel description. [#18408]
  * Auth Proxy: Include additional headers as part of the cache key. [#18298]
  * OAuth: Fix 'missing saved state' OAuth login failure due to SameSite cookie
    policy. [#18332]
  * cli: fix for recognizing when in dev mode.. [#18334]
  * Build grafana images consistently. [#18224]
  * Docs: SAML. [#18069]
  * Permissions: Show plugins in nav for non admin users but hide plugin
    configuration. [#18234]
  * TimePicker: Increase max height of quick range dropdown. [#18247]
  * DataLinks: Fix incorrect interpolation of \${\_\_series_name} . [#18251]
  * Loki: Display live tailed logs in correct order in Explore. [#18031]
  * PhantomJS: Fix rendering on Debian Buster. [#18162]
  * TimePicker: Fix style issue for custom range popover. [#18244]
  * Timerange: Fix a bug where custom time ranges didn't respect UTC. [#18248]
  * remote_cache: Fix redis connstr parsing. [#18204]
  * Alerting: Add tags to alert rules. [#10989]
  * Alerting: Attempt to send email notifications to all given email addresses. [#16881]
  * Alerting: Improve alert rule testing. [#16286]
  * Alerting: Support for configuring content field for Discord alert notifier. [#17017]
  * Alertmanager: Replace illegal chars with underscore in label names. [#17002]
  * Auth: Allow expiration of API keys. [#17678]
  * Auth: Return device, os and browser when listing user auth tokens in HTTP
    API. [#17504]
  * Auth: Support list and revoke of user auth tokens in UI. [#17434]
  * AzureMonitor: change clashing built-in Grafana variables/macro names for
    Azure Logs. [#17140]
  * CloudWatch: Made region visible for AWS Cloudwatch Expressions. [#17243]
  * Cloudwatch: Add AWS DocDB metrics. [#17241]
  * Dashboard: Use timezone dashboard setting when exporting to CSV. [#18002]
  * Data links. [#17267]
  * Elasticsearch: Support for visualizing logs in Explore . [#17605]
  * Explore: Adds Live option for supported data sources. [#17062]
  * Explore: Adds orgId to URL for sharing purposes. [#17895]
  * Explore: Adds support for new loki 'start' and 'end' params for labels
    endpoint. [#17512]
  * Explore: Adds support for toggling raw query mode in explore. [#17870]
  * Explore: Allow switching between metrics and logs . [#16959]
  * Explore: Combines the timestamp and local time columns into one. [#17775]
  * Explore: Display log lines context . [#17097]
  * Explore: Don't parse log levels if provided by field or label. [#17180]
  * Explore: Improves performance of Logs element by limiting re-rendering. [#17685]
  * Explore: Support for new LogQL filtering syntax. [#16674]
  * Explore: Use new TimePicker from Grafana/UI. [#17793]
  * Explore: handle newlines in LogRow Highlighter. [#17425]
  * Graph: Added new fill gradient option. [#17528]
  * GraphPanel: Don't sort series when legend table &amp; sort column is not
    visible. [#17095]
  * InfluxDB: Support for visualizing logs in Explore. [#17450]
  * Logging: Login and Logout actions (#17760). [#17883]
  * Logging: Move log package to pkg/infra. [#17023]
  * Metrics: Expose stats about roles as metrics. [#17469]
  * MySQL/Postgres/MSSQL: Add parsing for day, weeks and year intervals in
    macros. [#13086]
  * MySQL: Add support for periodically reloading client certs. [#14892]
  * Plugins: replace dataFormats list with skipDataQuery flag in plugin.json. [#16984]
  * Prometheus: Take timezone into account for step alignment. [#17477]
  * Prometheus: Use overridden panel range for \$\_\_range instead of dashboard
    range. [#17352]
  * Prometheus: added time range filter to series labels query. [#16851]
  * Provisioning: Support folder that doesn't exist yet in dashboard
    provisioning. [#17407]
  * Refresh picker: Handle empty intervals. [#17585]
  * Singlestat: Add y min/max config to singlestat sparklines. [#17527]
  * Snapshot: use given key and deleteKey. [#16876]
  * Templating: Correctly display __text in multi-value variable after page
    reload. [#17840]
  * Templating: Support selecting all filtered values of a multi-value
    variable. [#16873]
  * Tracing: allow propagation with Zipkin headers. [#17009]
  * Users: Disable users removed from LDAP. [#16820]
  * SAML: Add SAML as an authentication option (Enterprise)
  * AddPanel: Fix issue when removing moved add panel widget . [#17659]
  * CLI: Fix encrypt-datasource-passwords fails with sql error. [#18014]
  * Elasticsearch: Fix default max concurrent shard requests. [#17770]
  * Explore: Fix browsing back to dashboard panel. [#17061]
  * Explore: Fix filter by series level in logs graph. [#17798]
  * Explore: Fix issues when loading and both graph/table are collapsed. [#17113]
  * Explore: Fix selection/copy of log lines. [#17121]
  * Fix: Wrap value of multi variable in array when coming from URL. [#16992]
  * Frontend: Fix for Json tree component not working. [#17608]
  * Graphite: Fix for issue with alias function being moved last. [#17791]
  * Graphite: Fix issue with seriesByTag &amp; function with variable param. [#17795]
  * Graphite: use POST for /metrics/find requests. [#17814]
  * HTTP Server: Serve Grafana with a custom URL path prefix. [#17048]
  * InfluxDB: Fix single quotes are not escaped in label value filters. [#17398]
  * Prometheus: Correctly escape '|' literals in interpolated PromQL variables. [#16932]
  * Prometheus: Fix when adding label for metrics which contains colons in
    Explore. [#16760]
  * SinglestatPanel: Remove background color when value turns null. [#17552]
- Update to version 6.2.5
  * Grafana-CLI: Wrapper for `grafana-cli` within RPM/DEB packages and
    config/homepath are now global flags. [#17695]
  * Panel: Fully escape html in drilldown links (was only sanitized before). [#17731]
  * Config: Fix connectionstring for remote_cache in defaults.ini. [#17675]
  * Elasticsearch: Fix empty query (via template variable) should be sent as
    wildcard. [#17488]
  * HTTP-Server: Fix Strict-Transport-Security header. [#17644]
  * TablePanel: fix annotations display. [#17646]
- Update to version 6.2.4
  * Grafana-CLI: Fix receiving flags via command line . [#17617]
  * HTTPServer: Fix X-XSS-Protection header formatting. [#17620]
- Update to version 6.2.3
  * AuthProxy: Optimistic lock pattern for remote cache Set. [#17485]
  * HTTPServer: Options for returning new headers X-Content-Type-Options,
    X-XSS-Protection and Strict-Transport-Security. [#17522]
  * Auth Proxy: Fix non-negative cache TTL. [#17495]
  * Grafana-CLI: Fix receiving configuration flags from the command line. [#17606]
  * OAuth: Fix for wrong user token updated on OAuth refresh in DS proxy. [#17541]
  * remote_cache: Fix redis. [#17483]
- Update to version 6.2.2
  * Security: Prevent CSV formula injection attack when exporting data. [#17363]
  * CloudWatch: Fix error when hiding/disabling queries. [#17283]
  * Database: Fix slow permission query in folder/dashboard search. [#17427]
  * Explore: Fix updating time range before running queries. [#17349]
  * Plugins: Fix plugin config page navigation when using subpath. [#17364]
- Update to version 6.2.1
  * CLI: Add command to migrate all data sources to use encrypted password fields . [#17118]
  * Gauge/BarGauge: Improvements to auto value font size . [#17292]
  * Auth Proxy: Resolve database is locked errors. [#17274]
  * Database: Retry transaction if sqlite returns database is locked error. [#17276]
  * Explore: Fix filtering query by clicked value when a Prometheus Table is
    clicked. [#17083]
  * Singlestat: Fix issue with value placement and line wraps. [#17249]
  * Tech: Update jQuery to 3.4.1 to fix issue on iOS 10 based browsers as well
    as Chrome 53.x. [#17290]
- Update to version 6.2.0
  * BarGauge: Fix for negative min values. [#17192]
  * Gauge/BarGauge: Fix for issues editing min &amp; max options. [#17174]
  * Search: Make only folder name only open search with current folder filter. [#17226]
  * AzureMonitor: Revert to clearing chained dropdowns. [#17212]
  * Data source plugins that process hidden queries need to add a
    'hiddenQueries: true' attribute in plugin.json. [#17124]
  * Plugins: Support templated urls in plugin routes. [#16599]
  * Packaging: New MSI windows installer package\*\*. [#17073]
  * Dashboard: Fix blank dashboard after window resize with panel without
    title. [#16942]
  * Dashboard: Fix lazy loading &amp; expanding collapsed rows on mobile. [#17055]
  * Dashboard: Fix scrolling issues for Edge browser. [#17033]
  * Dashboard: Show refresh button in first kiosk(tv) mode. [#17032]
  * Explore: Fix empty result from data source should render logs container. [#16999]
  * Explore: Filter query by clicked value when clicking in a Prometheus Table [#17083]
  * Explore: Makes it possible to zoom in Explore/Loki/Graph without exception. [#16991]
  * Gauge: Fix orientation issue after switching from BarGauge to Gauge. [#17064]
  * GettingStarted: Fix layout issues in getting started panel. [#16941]
  * InfluxDB: Fix HTTP method should default to GET. [#16949]
  * Panels: Fix alert icon position in panel header. [#17070]
  * Panels: Fix panel error tooltip not showing. [#16993]
  * Plugins: Fix how datemath utils are exposed to plugins. [#16976]
  * Singlestat: fixed centering issue for very small panels. [#16944]
  * Search: Scroll issue in dashboard search in latest Chrome. [#17054]
  * Gauge: Adds background shade to gauge track and improves height usage. [#17019]
  * RemoteCache: Avoid race condition in Set causing error on insert. . [#17082]
  * Admin: Add more stats about roles. [#16667]
  * Alert list panel: Support variables in filters. [#16892]
  * Alerting: Adjust label for send on all alerts to default . [#16554]
  * Alerting: Makes timeouts and retries configurable. [#16259]
  * Alerting: No notification when going from no data to pending. [#16905]
  * Alerting: Pushover alert, support for different sound for OK. [#16525]
  * Auth: Enable retries and transaction for some db calls for auth tokens. [#16785]
  * AzureMonitor: Adds support for multiple subscriptions per data source. [#16922]
  * Bar Gauge: New multi series enabled gauge like panel with horizontal and
    vertical layouts and 3 display modes. [#16918]
  * Build: Upgrades to golang 1.12.4. [#16545]
  * CloudWatch: Update AWS/IoT metric and dimensions. [#16337]
  * Config: Show user-friendly error message instead of stack trace. [#16564]
  * Dashboard: Enable filtering dashboards in search by current folder. [#16790]
  * Dashboard: Lazy load out of view panels . [#15554]
  * DataProxy: Restore Set-Cookie header after proxy request. [#16838]
  * Data Sources: Add pattern validation for time input on data source config
    pages. [#16837]
  * Elasticsearch: Add 7.x version support. [#16646]
  * Explore: Adds reconnect for failing data source. [#16226]
  * Explore: Support user timezone. [#16469]
  * InfluxDB: Add support for POST HTTP verb. [#16690]
  * Loki: Search is now case insensitive. [#15948]
  * OAuth: Update jwt regexp to include `=`. [#16521]
  * Panels: No title will no longer make panel header take up space. [#16884]
  * Prometheus: Adds tracing headers for Prometheus datasource. [#16724]
  * Provisioning: Add API endpoint to reload provisioning configs. [#16579]
  * Provisioning: Do not allow deletion of provisioned dashboards. [#16211]
  * Provisioning: Interpolate env vars in provisioning files. [#16499]
  * Provisioning: Support FolderUid in Dashboard Provisioning Config. [#16559]
  * Security: Add new setting allow_embedding. [#16853]
  * Security: Store data source passwords encrypted in secureJsonData. [#16175]
  * UX: Improve Grafana usage for smaller screens. [#16783]
  * Units: Add angle units, Arc Minutes and Seconds. [#16271]
  * CloudWatch: Fix query order not affecting series ordering &amp; color. [#16408]
  * CloudWatch: Use default alias if there is no alias for metrics. [#16732]
  * Config: Fix bug where timeouts for alerting was not parsed correctly. [#16784]
  * Elasticsearch: Fix view percentiles metric in table without date histogram. [#15686]
  * Explore: Prevents histogram loading from killing Prometheus instance. [#16768]
  * Graph: Allow override decimals to fully override. [#16414]
  * Mixed Data Source: Fix error when one query is disabled. [#16409]
  * Search: Fix search limits and add a page parameter. [#16458]
  * Security: Responses from backend should not be cached. [#16848]
  * Gauge Panel: The suffix / prefix options have been removed from the new
    Gauge Panel (introduced in v6.0). [#16870]
- Update to version 6.1.6
  * Security: Bump jQuery to 3.4.0 . [#16761]
  * Playlist: Fix loading dashboards by tag. [#16727]
- Update to version 6.1.4
  * DataPanel: Added missing built-in interval variables to scopedVars. [#16556]
  * Explore: Adds maxDataPoints to data source query options . [#16513]
  * Explore: Recalculate intervals on run query. [#16510]
  * Heatmap: Fix for empty graph when panel is too narrow (#16378). [#16460]
  * Heatmap: Fix auto decimals when bucket name is not number. [#16609]
  * QueryInspector: Now shows error responses again. [#16514]
- Update to version 6.1.3
  * Graph: Fix auto decimals in legend values for some units like `ms` and
    `s`. [#16455]
  * Graph: Fix png rendering with legend to the right. [#16463]
  * Singlestat: Use decimals when manually specified. [#16451]
  * Fix broken UI switches: Default Data Source switch, Explore Logs switches,
    Gauge option switches. [#16303]
- Update to version 6.1.2
  * Graph: Fix series legend color for hidden series. [#16438]
  * Graph: Fix tooltip highlight on white theme. [#16429]
  * Styles: Fix menu hover highlight border. [#16431]
  * Singlestat Panel: Correctly use the override decimals. [#16413]
- Update to version 6.1.1
  * Graphite: Editing graphite query function now works again. [#16390]
  * Playlist: Kiosk &amp; auto fit panels modes are working normally again . [#16403]

  * QueryEditors: Toggle edit mode now always work on slower computers. [#16394]
- Update to version 6.1.0
  * CloudWatch: Fix for dimension value list when changing dimension key. [#16356]
  * Graphite: Editing function arguments now works again. [#16297]
  * InfluxDB: Fix tag names with periods in alert evaluation. [#16255]
  * PngRendering: Fix for panel height &amp; title centering . [#16351]
  * Templating: Fix for editing query variables. [#16299]
  * Prometheus: adhoc filter support [#8253]
  * Permissions: Editors can become admin for dashboards, folders and teams
    they create. [#15977]
  * Alerting: Don't include non-existing image in MS Teams notifications. [#16116]
  * Api: Invalid org invite code [#10506]
  * Annotations: Fix for native annotations filtered by template variable with
    pipe. [#15515]
  * Dashboard: Fix for time regions spanning across midnight. [#16201]
  * Data Source: Handles nil jsondata field gracefully [#14239]
  * Data Source: Empty user/password was not updated when updating data sources [#15608]
  * Elasticsearch: Fix using template variables in the alias field. [#16229]
  * Elasticsearch: Fix incorrect index pattern padding in alerting queries. [#15892]
  * Explore: Fix for Prometheus autocomplete not working in Firefox. [#16192]
  * Explore: Fix for url does not keep query after browser refresh. [#16189]
  * Gauge: Interpolate scoped variables in repeated gauges [#15739]
  * Graphite: Fix issue with using series ref and series by tag. [#16111]
  * Graphite: Fix variable quoting when variable value is numeric. [#16149]
  * Heatmap: Fix Y-axis tick labels being in wrong order for some Prometheus
    queries. [#15932]
  * Heatmap: Negative values are now displayed correctly in graph &amp; legend. [#15953]
  * Heatmap: legend shows wrong colors for small values [#14019]
  * InfluxDB: Always close request body even for error status codes. [#16207]
  * ManageDashboards: Fix for checkboxes not appearing properly Firefox . [#15981]
  * Playlist: Leaving playlist now always stops playlist . [#15791]
  * Prometheus: fixes regex ad-hoc filters variables with wildcards. [#16234]
  * TablePanel: Column color style now works even after removing columns. [#16227]
  * TablePanel: Fix for white text on white background when value is null. [#16199]
- Update to version 6.0.2
  * Alerting: Fix issue with AlertList panel links resulting in panel not
    found errors. [#15975]
  * Dashboard: Improved error handling when rendering dashboard panels. [#15970]
  * LDAP: Fix allow anonymous server bind for ldap search. [#15872]
  * Discord: Fix discord notifier so it doesn't crash when there are no image
    generated. [#15833]
  * Panel Edit: Prevent search in VizPicker from stealing focus. [#15802]
  * Data Source admin: Fix url of back button in data source edit page, when
    root_url configured. [#15759]
- Update to version 6.0.1
  * Metrics: Fix broken usagestats metrics for /metrics [#15651]
  * Dashboard: append &amp;kiosk to the url in Kiosk mode [#15765]
  * Dashboard: respect header in kiosk=tv mode with autofitpanels [#15650]
  * Image rendering: Fix image rendering issue for dashboards with auto
    refresh. [#15818]
  * Dashboard: Fix only users that can edit a dashboard should be able to
    update panel json. [#15805]
  * LDAP: fix allow anonymous initial bind for ldap search. [#15803]
  * UX: ixed scrollbar not visible initially (only after manual scroll). [#15798]
  * Data Source admin TestData [#15793]
  * Dashboard: Fix scrolling issue that caused scroll to be locked to bottom. [#15792]
  * Explore: Viewers with viewers_can_edit should be able to access /explore. [#15787]
  * Security fix: limit access to org admin and alerting pages. [#15761]
  * Panel Edit minInterval changes did not persist [#15757]
  * Teams: Fix bug when getting teams for user. [#15595]
  * Stackdriver: fix for float64 bounds for distribution metrics [#14509]
  * Stackdriver: no reducers available for distribution type [#15179]
- Update to version 6.0.0
  * Dashboard: fixes click after scroll in series override menu [#15621]
  * MySQL: fix mysql query using \_interval_ms variable throws error [#14507]
  * Influxdb: Add support for alerting on InfluxDB queries that use the
    non_negative_difference function [#15415]
  * Alerting: Fix percent_diff calculation when points are nulls [#15443]
  * Alerting: Fix handling of alert urls with true flags [#15454]
  * AzureMonitor: Enable alerting by converting Azure Monitor API to Go [#14623]
  * Security: Fix CSRF Token validation for POSTs [#1441]
  * Internal Metrics Edition has been added to the build_info metric. This will
    break any Graphite queries using this metric. Edition will be a new label
    for the Prometheus metric. [#15363]
  * Gauge: Fix issue with gauge requests being cancelled [#15366]
  * Gauge: Accept decimal inputs for thresholds [#15372]
  * UI: Fix error caused by named colors that are not part of named colors
    palette [#15373]
  * Search: Bug pressing special regexp chars in input fields [#12972]
  * Permissions: No need to have edit permissions to be able to 'Save as' [#13066]
  * Alerting: Adds support for Google Hangouts Chat notifications [#11221]
  * Elasticsearch: Support bucket script pipeline aggregations [#5968]
  * Influxdb: Add support for time zone (`tz`) clause [#10322]
  * Snapshots: Enable deletion of public snapshot [#14109]
  * Provisioning: Provisioning support for alert notifiers [#10487]
  * Explore: A whole new way to do ad-hoc metric queries and exploration. Split
    view in half and compare metrics &amp; logs.
  * Auth: Replace remember me cookie solution for Grafana's builtin, LDAP and
    OAuth authentication with a solution based on short-lived tokens [#15303]
  * Search: Fix for issue with scrolling the 'tags filter' dropdown, fixes [#14486]
  * Prometheus: fix annotation always using 60s step regardless of
    dashboard range [#14795]
  * Annotations: Fix creating annotation when graph panel has no data points
    position the popup outside viewport [#13765]
  * Piechart/Flot: Fix multiple piechart instances with donut bug [#15062]
  * Postgres: Fix default port not added when port not configured [#15189]
  * Alerting: Fix crash bug when alert notifier folders are missing [#15295]
  * Dashboard: Fix save provisioned dashboard modal [#15219]
  * Dashboard: Fix having a long query in prometheus dashboard query editor
  * blocks 30% of the query field when on OSX and having native scrollbars
    [#15122]
  * Explore: Fix issue with wrapping on long queries [#15222]
  * Explore: Fix cut &amp; paste adds newline before and after selection [#15223]
  * Dataproxy: Fix global data source proxy timeout not added to correct http
    client [#15258]
  * Text Panel: The text panel does no longer by default allow unsanitized
    HTML. [#4117]
  * Dashboard: Panel property `minSpan` replaced by `maxPerRow`. Dashboard
  * migration will automatically migrate all dashboard panels using the
    `minSpan` property to the new `maxPerRow` property [#12991]
- Update to version 5.4.3
  * MySQL only update session in mysql database when required [#14540]
  * Alerting Invalid frequency causes division by zero in alert scheduler [#14810]
  * Dashboard Dashboard links do not update when time range changes [#14493]
  * Limits Support more than 1000 data sources per org [#13883]
  * Backend fix signed in user for orgId=0 result should return active org id [#14574]
  * Provisioning Adds orgId to user dto for provisioned dashboards [#14678]
- Update to version 5.4.2
  * Data Source admin: Fix for issue creating new data source when same name
    exists [#14467]
  * OAuth: Fix for oauth auto login setting, can now be set using env variable [#14435]
- Update to version 5.4.1
  * Stackdriver: Fix issue with data proxy and Authorization header [#14262]
  * Units: fixedUnit for Flow:l/min and mL/min [#14294]
  * Logging: Fix for issue where data proxy logged a secret when debug logging
    was enabled, now redacted. [#14319]
  * TSDB: Fix always take dashboard timezone into consideration when handle
    custom time ranges: Add support for alerting on InfluxDB queries that use
    the cumulative_sum function. [#14314]
  * Embedded Graphs: Iframe graph panels should now work as usual. [#14284]
  * Postgres: Improve PostgreSQL Query Editor if using different Schemas, [#14313]
  * Quotas: Fix updating org &amp; user quotas. [#14347]
  * Cloudwatch: Add the AWS/SES Cloudwatch metrics of BounceRate and
    ComplaintRate to auto complete list. [#14401]
  * Dashboard Search: Fix filtering by tag issues.
  * Graph: Fix time region issues, [#14425]
- Update to version 5.4.0
  * Cloudwatch: Fix invalid time range causes segmentation fault [#14150]
  * Cloudwatch: AWS/CodeBuild metrics and dimensions [#14167]
  * MySQL: Fix `$__timeFrom()` and `$__timeTo()` should respect local time zone [#14228]
  * Graph: Fix legend always visible even if configured to be hidden [#14144]
  * Elasticsearch: Fix regression when using data source version 6.0+ and
    alerting [#14175]
  * Alerting: Introduce alert debouncing with the `FOR` setting. [#7886]
  * Alerting: Option to disable OK alert notifications [#12330]
  * Postgres/MySQL/MSSQL: Adds support for configuration of max open/idle
    connections and connection max lifetime. Also, panels with multiple SQL
    queries will now be executed concurrently [#11711]
  * MySQL: Graphical query builder [#13762]
  * MySQL: Support connecting thru Unix socket for MySQL data source [#12342]
  * MSSQL: Add encrypt setting to allow configuration of how data sent between
    client and server are encrypted [#13629]
  * Stackdriver: Not possible to authenticate using GCE metadata server [#13669]
  * Teams: Team preferences (theme, home dashboard, timezone) support [#12550]
  * Graph: Time regions support enabling highlight of weekdays and/or certain
    timespans [#5930]
  * OAuth: Automatic redirect to sign-in with OAuth [#11893]
  * Stackdriver: Template query editor [#13561]
  * Security: Upgrade macaron session package to fix security issue. [#14043]
  * Postgres/MySQL/MSSQL data sources now per default uses `max open
    connections` = `unlimited` (earlier 10), `max idle connections` = `2`
    (earlier 10) and `connection max lifetime` = `4` hours (earlier unlimited).
- Update to version 5.3.4
  * Alerting: Delete alerts when parent folder was deleted [#13322]
  * MySQL: Fix `$__timeFilter()` should respect local time zone [#13769]
  * Dashboard: Fix data source selection in panel by enter key [#13932]
  * Graph: Fix table legend height when positioned below graph and using
    Internet Explorer 11 [#13903]
  * Dataproxy: Drop origin and referer http headers [#13328]
- Update to version 5.3.3
  * Fix file exfiltration vulnerability
- Update to version 5.3.2
  * InfluxDB/Graphite/Postgres: Prevent XSS in query editor [#13667]
  * Postgres: Fix template variables error [#13692]
  * Cloudwatch: Fix service panic because of race conditions [#13674]
  * Cloudwatch: Fix check for invalid percentile statistics [#13633]
  * Stackdriver/Cloudwatch: Allow user to change unit in graph panel if
    cloudwatch/stackdriver data source response doesn't include unit [#13718]
  * Stackdriver: stackdriver user-metrics duplicated response when multiple
    resource types [#13691]
  * Variables: Fix text box template variable doesn't work properly without a
    default value [#13666]
  * Variables: Fix variable dependency check when using `${var}` format [#13600]
  * Dashboard: Fix kiosk=1 url parameter should put dashboard in kiosk mode [#13764]
  * LDAP: Fix super admins can also be admins of orgs [#13710]
  * Provisioning: Fix deleting provisioned dashboard folder should cleanup
    provisioning meta data [#13280]
- Update to version 5.3.1
  * Render: Fix PhantomJS render of graph panel when legend displayed as table
    to the right [#13616]
  * Stackdriver: Filter option disappears after removing initial filter [#13607]
  * Elasticsearch: Fix no limit size in terms aggregation for alerting queries [#13172]
  * InfluxDB: Fix for annotation issue that caused text to be shown twice [#13553]
  * Variables: Fix nesting variables leads to exception and missing refresh [#13628]
  * Variables: Prometheus: Single letter labels are not supported [#13641]
  * Graph: Fix graph time formatting for Last 24h ranges [#13650]
  * Playlist: Fix cannot add dashboards with long names to playlist [#13464]
  * HTTP API: Fix /api/org/users so that query and limit querystrings works
- Update to version 5.3.0
  * Stackdriver: Filter wildcards and regex matching are not yet supported [#13495]
  * Stackdriver: Support the distribution metric type for heatmaps [#13559]
  * Cloudwatch: Automatically set graph yaxis unit [#13575]
  * Stackdriver: Fix for missing ngInject [#13511]
  * Permissions: Fix for broken permissions selector [#13507]
  * Alerting: Alert reminders deduping not working as expected when running
    multiple Grafana instances [#13492]
  * Annotations: Enable template variables in tagged annotations queries [#9735]
  * Stackdriver: Support for Google Stackdriver data source [#13289]
  * Alerting: Notification reminders [#7330]
  * Dashboard: TV &amp; Kiosk mode changes, new cycle view mode button in dashboard
    toolbar [#13025]
  * OAuth: Gitlab OAuth with support for filter by groups [#5623]
  * Postgres: Graphical query builder [#10095]
  * LDAP: Define Grafana Admin permission in ldap group mappings [#2469]
  * LDAP: Client certificates support [#12805]
  * Profile: List teams that the user is member of in current/active
    organization [#12476]
  * Configuration: Allow auto-assigning users to specific organization (other
    than Main. Org) [#1823]
  * Dataproxy: Pass configured/auth headers to a data source [#10971]
  * CloudWatch: GetMetricData support [#11487]
  * Postgres: TimescaleDB support, e.g. use `time_bucket` for grouping by time
    when option enabled [#12680]
  * Cleanup: Make temp file time to live configurable [#11607]
  * Postgres data source no longer automatically adds time column alias when
    using the $__timeGroup alias.
  * Kiosk mode now also hides submenu (variables)
  * ?inactive url parameter no longer supported, replaced with kiosk=tv url parameter
  * Dashboard: Auto fit dashboard panels to optimize space used for current TV
    or Monitor [#12768]
  * Frontend: Convert all Frontend Karma tests to Jest tests [#12224]
  * Backend: Upgrade to golang 1.11 [#13030]
- Update to version 5.2.4
  * GrafanaCli: Fix issue with grafana-cli install plugin resulting in
    corrupt http response from source error. [#13079]
- Update to version 5.2.3
  * Important fix for LDAP &amp; OAuth login vulnerability
- Update to version 5.2.2
  * Prometheus: Fix graph panel bar width issue in aligned prometheus queries [#12379]
  * Dashboard: Dashboard links not updated when changing variables [#12506]
  * Postgres/MySQL/MSSQL: Fix connection leak [#12636]
  * Plugins: Fix loading of external plugins [#12551]
  * Dashboard: Remove unwanted scrollbars in embedded panels [#12589]
  * Prometheus: Prevent error using \$\_\_interval_ms in query [#12533]
- Update to version 5.2.1
  * Auth Proxy: Important security fix for whitelist of IP address feature [#12444]
  * UI: Fix - Grafana footer overlapping page [#12430]
  * Logging: Errors should be reported before crashing [#12438]
- Update to version 5.2.0
  * Plugins: Handle errors correctly when loading data source plugin [#12383]
  * Render: Enhance error message if phantomjs executable is not found [#11868]
  * Dashboard: Set correct text in drop down when variable is present in url [#11968]
  * LDAP: Handle 'dn' ldap attribute more gracefully [#12385]
  * Dashboard: Import dashboard to folder [#10796]
  * Permissions: Important security fix for API keys with viewer role [#12343]
  * Dashboard: Fix so panel titles doesn't wrap [#11074]
  * Dashboard: Prevent double-click when saving dashboard [#11963]
  * Dashboard: AutoFocus the add-panel search filter [#12189]
  * Units: W/m2 (energy), l/h (flow) and kPa (pressure) [#11233]
  * Units: Liter/min (flow) and milliLiter/min (flow) [#12282]
  * Alerting: Fix mobile notifications for Microsoft Teams alert notifier [#11484]
  * Influxdb: Add support for mode function [#12286]
  * Cloudwatch: Fix panic caused by bad timerange settings [#12199]
  * Auth Proxy: Whitelist proxy IP address instead of client IP address [#10707]
  * User Management: Make sure that a user always has a current org assigned [#11076]
  * Snapshots: Fix: annotations not properly extracted leading to incorrect
    rendering of annotations [#12278]
  * LDAP: Allow use of DN in group_search_filter_user_attribute and member_of [#3132]
  * Graph: Fix legend decimals precision calculation [#11792]
  * Dashboard: Make sure to process panels in collapsed rows when exporting
    dashboard [#12256]
  * Dashboard: Dashboard link doesn't work when 'As dropdown' option is checked [#12315]
  * Dashboard: Fix regressions after save modal changes, including adhoc
    template issues [#12240]
  * Elasticsearch: Alerting support [#5893]
  * Build: Crosscompile and packages Grafana on arm, windows, linux and darwin [#11920]
  * Login: Change admin password after first login [#11882]
  * Alert list panel: Updated to support filtering alerts by name, dashboard
    title, folder, tags [#11500]
  * Dashboard: Modified time range and variables are now not saved by default [#10748]
  * Graph: Show invisible highest value bucket in histogram [#11498]
  * Dashboard: Enable 'Save As...' if user has edit permission [#11625]
  * Prometheus: Query dates are now step-aligned [#10434]
  * Prometheus: Table columns order now changes when rearrange queries [#11690]
  * Variables: Fix variable interpolation when using multiple formatting types [#11800]
  * Dashboard: Fix date selector styling for dark/light theme in time picker
    control [#11616]
  * Discord: Alert notification channel type for Discord, [#7964]
  * InfluxDB: Support SELECT queries in templating query, [#5013]
  * InfluxDB: Support count distinct aggregation [#11645]
  * Dashboard: JSON Model under dashboard settings can now be updated &amp; changes
    saved. [#1429]
  * Security: Fix XSS vulnerabilities in dashboard links [#11813]
  * Singlestat: Fix 'time of last point' shows local time when dashboard
    timezone set to UTC [#10338]
  * Prometheus: Add support for passing timeout parameter to Prometheus [#11788]
  * Login: Add optional option sign out url for generic oauth [#9847]
  * Login: Use proxy server from environment variable if available [#9703]
  * Invite users: Friendlier error message when smtp is not configured [#12087]
  * Graphite: Don't send distributed tracing headers when using direct/browser
    access mode [#11494]
  * Sidenav: Show create dashboard link for viewers if at least editor in one
    folder [#11858]
  * SQL: Second epochs are now correctly converted to ms. [#12085]
  * Singlestat: Fix singlestat threshold tooltip [#11971]
  * Dashboard: Hide grid controls in fullscreen/low-activity views [#11771]
  * Dashboard: Validate uid when importing dashboards [#11515]
  * Alert list panel: Show alerts for user with viewer role [#11167]
  * Provisioning: Verify checksum of dashboards before updating to reduce load
    on database [#11670]
  * Provisioning: Support symlinked files in dashboard provisioning config
    files [#11958]
  * Dashboard list panel: Search dashboards by folder [#11525]
  * Sidenav: Always show server admin link in sidenav if grafana admin [#11657]
- Update to version 5.1.4
  * Permissions: Important security fix for API keys with viewer role [#12343]
- Update to version 5.1.3
  * Scroll: Graph panel / legend texts shifts on the left each time we move
    scrollbar on firefox [#11830]
- Update to version 5.1.2
  * Database: Fix MySql migration issue [#11862]
  * Google Analytics: Enable Google Analytics anonymizeIP setting for GDPR [#11656]
- Update to version 5.1.1
  * LDAP: LDAP login with MariaDB/MySQL database and dn&gt;100 chars not possible [#11754]
  * Build: AppVeyor Windows build missing version and commit info [#11758]
  * Scroll: Scroll can't start in graphs on Chrome mobile [#11710]
  * Units: Revert renaming of unit key ppm [#11743]
- Update to version 5.1.0
  * Folders: Default permissions on folder are not shown as inherited in its
    dashboards [#11668]
  * Templating: Allow more than 20 previews when creating a variable [#11508]
  * Dashboard: Row edit icon not shown [#11466]
  * SQL: Unsupported data types for value column using time series query [#11703]
  * Prometheus: Prometheus query inspector expands to be very large on
    autocomplete queries [#11673]
  * MSSQL: New Microsoft SQL Server data source [#10093]
  * Prometheus: The heatmap panel now support Prometheus histograms [#10009]
  * Postgres/MySQL: Ability to insert 0s or nulls for missing intervals [#9487]
  * Postgres/MySQL/MSSQL: Fix precision for the time column in table mode [#11306]
  * Graph: Align left and right Y-axes to one level [#1271]
  * Graph: Thresholds for Right Y axis [#7107]
  * Graph: Support multiple series stacking in histogram mode [#8151]
  * Alerting: Pausing/un alerts now updates new_state_date [#10942]
  * Alerting: Support Pagerduty notification channel using Pagerduty V2 API [#10531]
  * Templating: Add comma templating format [#10632]
  * Prometheus: Show template variable candidate in query editor [#9210]
  * Prometheus: Support POST for query and query_range [#9859]
  * Alerting: Add support for retries on alert queries [#5855]
  * Table: Table plugin value mappings [#7119]
  * IE11: IE 11 compatibility [#11165]
  * Scrolling: Better scrolling experience [#11053]
  * Folders: A folder admin cannot add user/team permissions for folder/its
    dashboards [#11173]
  * Provisioning: Improved workflow for provisioned dashboards [#10883]
  * OpsGenie: Add triggered alerts as description [#11046]
  * Cloudwatch: Support high resolution metrics [#10925]
  * Cloudwatch: Add dimension filtering to CloudWatch `dimension_values()` [#10029]
  * Units: Second to HH:mm:ss formatter [#11107]
  * Singlestat: Add color to prefix and postfix in singlestat panel [#11143]
  * Dashboards: Version cleanup fails on old databases with many entries [#11278]
  * Server: Adjust permissions of unix socket [#11343]
  * Shortcuts: Add shortcut for duplicate panel [#11102]
  * AuthProxy: Support IPv6 in Auth proxy white list [#11330]
  * SMTP: Don't connect to STMP server using TLS unless configured. [#7189]
  * Prometheus: Escape backslash in labels correctly. [#10555]
  * Variables: Case-insensitive sorting for template values [#11128]
  * Annotations (native): Change default limit from 10 to 100 when querying api [#11569]
  * MySQL/Postgres/MSSQL: PostgreSQL data source generates invalid query with
    dates before 1970 [#11530]
  * Kiosk: Adds url parameter for starting a dashboard in inactive mode [#11228]
  * Dashboard: Enable closing timepicker using escape key [#11332]
  * Data Sources: Rename direct access mode in the data source settings [#11391]
  * Search: Display dashboards in folder indented [#11073]
  * Units: Use B/s instead Bps for Bytes per second [#9342]
  * Units: Radiation units [#11001]
  * Units: Timeticks unit [#11183]
  * Units: Concentration units and 'Normal cubic meter' [#11211]
  * Units: New currency - Czech koruna [#11384]
  * Avatar: Fix DISABLE_GRAVATAR option [#11095]
  * Heatmap: Disable log scale when using time time series buckets [#10792]
  * Provisioning: Remove `id` from json when provisioning dashboards, [#11138]
  * Prometheus: tooltip for legend format not showing properly [#11516]
  * Playlist: Empty playlists cannot be deleted [#11133]
  * Switch Orgs: Alphabetic order in Switch Organization modal [#11556]
  * Postgres: improve `$__timeFilter` macro [#11578]
  * Permission list: Improved ux [#10747]
  * Dashboard: Sizing and positioning of settings menu icons [#11572]
  * Dashboard: Add search filter/tabs to new panel control [#10427]
  * Folders: User with org viewer role should not be able to save/move
    dashboards in/to general folder [#11553]
  * Influxdb: Don't assume the first column in table response is time. [#11476]
- Update to version 5.0.4
  * Dashboard Fix inability to link collapsed panels directly to [#11114]
  * Dashboard Provisioning dashboard with alert rules should create alerts [#11247]
  * Snapshots For snapshots, the Graph panel renders the legend incorrectly on
    right hand side [#11318]
  * Alerting Link back to Grafana returns wrong URL if root_path contains
    sub-path components [#11403]
  * Alerting Incorrect default value for upload images setting for alert
    notifiers [#11413]
- Update to version 5.0.3
  * Mysql: Mysql panic occurring occasionally upon Grafana dashboard access (a
    bigger patch than the one in 5.0.2) [#11155]
- Update to version 5.0.2
  * Mysql: Mysql panic occurring occasionally upon Grafana dashboard access [#11155]
  * Dashboards: Should be possible to browse dashboard using only uid [#11231]
  * Alerting: Fix bug where alerts from hidden panels where deleted [#11222]
  * Import: Fix bug where dashboards with alerts couldn't be imported [#11227]
  * Teams: Remove quota restrictions from teams [#11220]
  * Render: Fix bug with legacy url redirection for panel rendering [#11180]
- Update to version 5.0.1
  * Postgres: PostgreSQL error when using ipv6 address as hostname in
    connection string [#11055]
  * Dashboards: Changing templated value from dropdown is causing unsaved
    changes [#11063]
  * Prometheus: Fix bundled Prometheus 2.0 dashboard [#11016]
  * Sidemenu: Profile menu 'invisible' when gravatar is disabled [#11097]
  * Dashboard: Fix a bug with resizable handles for panels [#11103]
  * Alerting: Telegram inline image mode fails when caption too long [#10975]
  * Alerting: Fix silent failing validation [#11145]
  * OAuth: Only use jwt token if it contains an email address [#11127]
- Update to version 5.0.0
  * oauth Fix GitHub OAuth not working with private Organizations [#11028]
  * kiosk white area over bottom panels in kiosk mode [#11010]
  * alerting Fix OK state doesn't show up in Microsoft Teams [#11032]
  * Permissions Fix search permissions issues [#10822]
  * Permissions Fix problem issues displaying permissions lists [#10864]
  * PNG-Rendering Fix problem rendering legend to the right [#10526]
  * Reset password Fix problem with reset password form [#10870]
  * Light theme Fix problem with light theme in safari, [#10869]
  * Provisioning Now handles deletes when dashboard json files removed from
    disk [#10865]
  * MySQL: Fix issue with schema migration on old mysql (index too long) [#10779]
  * GitHub OAuth: Fix fetching github orgs from private github org [#10823]
  * Embedding:Fix issues with embedding panel [#10787]
  * Dashboards: Dashboard folders, [#1611]
  * Teams User groups (teams) implemented. Can be used in folder &amp; dashboard
    permission list.

  * Dashboard grid: Panels are now laid out in a two dimensional grid (with x,
    y, w, h). [#9093]
  * Templating: Vertical repeat direction for panel repeats.
  * UX: Major update to page header and navigation
  * Dashboard settings: Combine dashboard settings views into one with side menu, [#9750]
  * Persistent dashboard url's: New url's for dashboards that allows renaming
    dashboards without breaking links. [#7883]
  * dashboard.json files have been replaced with dashboard provisioning API.
  * Config files for provisioning data sources as configuration have changed
    from /etc/grafana/conf/datasources to /etc/grafana/provisioning/datasources.
  * Pagerduty notifier now defaults to not auto resolve incidents. More details at [#10222]
  * `GET /api/alerts` property dashboardUri renamed to url
  * New grid engine for positioning dashboard panels
  * Alerting: Add support for internal image store [#6922]
  * Data Source Proxy: Add support for whitelisting specified cookies to be
    be passed through to the data source when proxying [#5457]
  * Postgres/MySQL: add \_\_timeGroup macro for mysql [#9596]
  * Text: Text panel are now edited in the ace editor. [#9698]
  * Teams: Add Microsoft Teams notifier as [#8523]
  * Data Sources: Its now possible to configure data sources with config files [#1789]
  * Graphite: Query editor updated to support new query by tag features [#9230]
  * Dashboard history: New config file option versions_to_keep sets how many
    versions per dashboard to store, [#9671]
  * Dashboard as cfg: Load dashboards from file into Grafana on startup/change [#9654]
  * Prometheus: Grafana can now send alerts to Prometheus Alertmanager while
    firing [#7481]
  * Table: Support multiple table formatted queries in table panel [#9170]
  * Security: Protect against brute force (frequent) login attempts [#7616]
  * Graph: Don't hide graph display options (Lines/Points) when draw mode is
    unchecked [#9770]
  * Alert panel: Adds placeholder text when no alerts are within the time range [#9624]
  * Mysql: MySQL enable MaxOpenCon and MaxIdleCon regards how constring is
    configured. [#9784]
  * Cloudwatch: Fix broken query inspector for cloudwatch [#9661]
  * Dashboard: Make it possible to start dashboards from search and dashboard
    list panel [#1871]
  * Annotations: Posting annotations now return the id of the annotation [#9798]
  * Systemd: Use systemd notification ready flag [#10024]
  * GitHub: Use organizations_url provided from github to verify user belongs
    in org. [#10111]
  * Backend: Fix bug where Grafana exited before all sub routines where finished [#10131]
  * Azure: Adds support for Azure blob storage as external image stor [#8955]
  * Telegram: Add support for inline image uploads to telegram notifier plugin [#9967]
  * Sensu: Send alert message to sensu output [#9551]
  * Singlestat: suppress error when result contains no datapoints [#9636]
  * Postgres/MySQL: Control quoting in SQL-queries when using template variables [#9030]
  * Pagerduty: Pagerduty don't auto resolve incidents by default anymore. [#10222]
  * Cloudwatch: Fix for multi-valued templated queries. [#9903]
  * RabbitMq: Remove support for publishing events to RabbitMQ [#9645]
  * API: GET /api/dashboards/db/:slug deprecated, use GET /api/dashboards/uid/:uid
  * API: DELETE /api/dashboards/db/:slug deprecated, use DELETE /api/dashboards/uid/:uid
  * API: `uri` property in GET /api/search deprecated, use `url` or `uid` property
  * API: `meta.slug` property in GET /api/dashboards/uid/:uid and GET
    /api/dashboards/db/:slug deprecated, use `meta.url` or `dashboard.uid` property

Changes in grafana-natel-discrete-panel:
- Add recompress source service
- Add set_version source service
- Enable changesgenerate for tar_scm source service
- Update to version 0.0.9:
  * split commands
  * put back the history

Changes in openstack-cinder:
- Update to version cinder-11.2.3.dev29:
  * Remove VxFlex OS credentials from connection\_properties
  * Fix stable/pike gate
  * tintri: Enable SSL with requests
  * [Unity] Fix TypeError for test case test\_delete\_host\_wo\_lock

Changes in openstack-cinder:
- Update to version cinder-11.2.3.dev29:
  * Remove VxFlex OS credentials from connection\_properties
  * Fix stable/pike gate
  * tintri: Enable SSL with requests
  * [Unity] Fix TypeError for test case test\_delete\_host\_wo\_lock

Changes in openstack-monasca-installer:
- Add 0001-Add-support-for-ansible-2.9.patch

Changes in openstack-neutron:
- Update to version neutron-11.0.9.dev69:
  * Do not block connection between br-int and br-phys on startup
  * [EM releases] Move non-voting jobs to the experimental queue

- Update to version neutron-11.0.9.dev66:
  * Fix pike gates, multiple fixes

Changes in openstack-neutron:
- Add 0001-Ensure-drop-flows-on-br-int-at-agent-startup-for-DVR-too.patch (LP#1887148)

- Update to version neutron-11.0.9.dev69:
  * Do not block connection between br-int and br-phys on startup
  * [EM releases] Move non-voting jobs to the experimental queue

- Update to version neutron-11.0.9.dev66:
  * Fix pike gates, multiple fixes

Changes in openstack-nova:
- Update to version nova-16.1.9.dev76:
  * Removed the host FQDN from the exception message

- Update to version nova-16.1.9.dev74:
  * libvirt: Provide VIR\_MIGRATE\_PARAM\_PERSIST\_XML during live migration

- Update to version nova-16.1.9.dev73:
  * Fix os-simple-tenant-usage result order

- Update to version nova-16.1.9.dev71:
  * Fix false ERROR message at compute restart

- Update to version nova-16.1.9.dev69:
  * Check cherry-pick hashes in pep8 tox target

- Update to version nova-16.1.9.dev67:
  * libvirt: Do not reraise DiskNotFound exceptions during resize

- Update to version nova-16.1.9.dev66:
  * Clean up allocation if unshelve fails due to neutron
  * Reproduce bug 1862633

- Update to version nova-16.1.9.dev64:
  * Init HostState.failed\_builds

- Update to version nova-16.1.9.dev62:
  * Fix os\_CODENAME detection and repo refresh during ceph tests

Changes in openstack-nova:
- Update to version nova-16.1.9.dev76:
  * Removed the host FQDN from the exception message

- Rebased patches:
  + 0004-Provide-VIR_MIGRATE_PARAM_PERSIST_XML-during-live-migration.patch dropped (merged upstream)

- Update to version nova-16.1.9.dev74:
  * libvirt: Provide VIR\_MIGRATE\_PARAM\_PERSIST\_XML during live migration

- Add 0004-Provide-VIR_MIGRATE_PARAM_PERSIST_XML-during-live-migration.patch
  * (bsc#1175484, CVE-2020-17376)

- Update to version nova-16.1.9.dev73:
  * Fix os-simple-tenant-usage result order

- Update to version nova-16.1.9.dev71:
  * Fix false ERROR message at compute restart

- Update to version nova-16.1.9.dev69:
  * Check cherry-pick hashes in pep8 tox target

- Update to version nova-16.1.9.dev67:
  * libvirt: Do not reraise DiskNotFound exceptions during resize

- Update to version nova-16.1.9.dev66:
  * Clean up allocation if unshelve fails due to neutron
  * Reproduce bug 1862633

- Update to version nova-16.1.9.dev64:
  * Init HostState.failed\_builds

- Update to version nova-16.1.9.dev62:
  * Fix os\_CODENAME detection and repo refresh during ceph tests

Changes in python-Django:
- Update to version 1.11.29 (bsc#1161919, CVE-2020-7471, bsc#1165022, CVE-2020-9402, bsc#1159447, CVE-2019-19844)
  * Fixed CVE-2020-9402 -- Properly escaped tolerance parameter in GIS functions and aggregates on Oracle.
  * Pinned PyYAML &lt; 5.3 in test requirements.
  * Fixed CVE-2020-7471 -- Properly escaped StringAgg(delimiter) parameter.
  * Fixed timezones tests for PyYAML 5.3+.
  * Fixed CVE-2019-19844 -- Used verified user email for password reset requests.
  * Fixed #31073 -- Prevented CheckboxInput.get_context() from mutating attrs.
  * Fixed #30826 -- Fixed crash of many JSONField lookups when one hand side is key transform.
  * Fixed #30769 -- Fixed a crash when filtering against a subquery JSON/HStoreField annotation.
  * Fixed #30672 -- Fixed crash of JSONField/HStoreField key transforms on expressions with params.

  * Added patch CVE-2020-13254.patch
  * Added patch CVE-2020-13596.patch
Changes in python-Flask-Cors:
- Add patches to fix a relative directory traversal issue
  (boo#1175986, CVE-2020-25032):
  * 0001-Handle-request_headers-None.patch
  * 0002-Fix-request-path-normalization.patch

Changes in python-Pillow:
- Add 011-Fix-OOB-reads-in-FLI-decoding.patch
   * From upstream, backported
   * Fixes CVE-2020-10177, bsc#1173413
- Add 012-Fix-bounds-overflow-in-JPEG-2000-decoding.patch
   * From upstream, backported
   * Fixes CVE-2020-10994, bsc#1173418
- Add 013-Fix-bounds-overflow-in-PCX-decoding.patch
   * From upstream, backported
   * Fixes CVE-2020-10378, bsc#1173416

Changes in python-ardana-packager:
- fetch updated nova_host_aggregate from git
 - Add missing novaclient required domain entries (bsc#1174006) 

Changes in python-keystoneclient:
- add 2020-tests-pass.patch:
  - Make tests pass in 2020 

- update to version 3.13.1
  - Updated from global requirements
  - Update .gitreview for stable/pike
  - Update UPPER_CONSTRAINTS_FILE for stable/pike
  - import zuul job settings from project-config
  - Avoid tox_install.sh for constraints support

Changes in python-keystonemiddleware:
- added 0001-Make-tests-pass-in-2022.patch
- removed 0001-Add-use_oslo_messaging-option.patch

- update to version 4.17.1
  - Update .gitreview for stable/pike
  - Update UPPER_CONSTRAINTS_FILE for stable/pike
  - Add option to disable using oslo_message notifier
  - Fix docs builds
  - Updated from global requirements
  - import zuul job settings from project-config

Changes in python-kombu:
- Add 0001-Fix-failing-unittests-of-pyamqp-transport.patch

Changes in python-straight-plugin:

- Add pip_no_plugins.patch to avoid error: 'UnboundLocalError:
  local variable 'r' referenced before assignment', when there
  is no plugin available.

- Initial packaging

Changes in python-urllib3:
- Update urllib3-fix-test-urls.patch. Adjust to match upstream solution.

- Add urllib3-fix-test-urls.patch. Fix tests failing on python checks for
  CVE-2019-9740.

- Add urllib3-cve-2020-26137.patch. Don't allow control chars in request
  method. (bsc#1177120, CVE-2020-26137)

Changes in release-notes-suse-openstack-cloud:
- Update to version 8.20200922:
  * postgreSQL db replace changes are updated for suse openstack cloud section (SOC-11000)

Changes in storm:
- Fix duplicate BuildRequire on storm-kit
- update to 1.2.3 (SOC-9974, CVE-2019-0202, SOC-9998, CVE-2018-11779):
  * 1.2.3
    * [STORM-3233] - Upgrade zookeeper client to newest version (3.4.13)
    * [STORM-3077] - Upgrade Disruptor version to 3.3.11
    * [STORM-3083] - Upgrade HikariCP version to 2.4.7
    * [STORM-3094] - Topology name needs to be validated at storm-client
    * [STORM-3222] - Fix KafkaSpout internals to use LinkedList instead of ArrayList
    * [STORM-3292] - Trident HiveState must flush writers when the batch commits
    * [STORM-3013] - Deactivated topology restarts if data flows into Kafka
    * [STORM-3028] - HdfsSpout does not handle empty files in case of ack enabled
    * [STORM-3046] - Getting a NPE leading worker to die when starting a topology.
    * [STORM-3047] - Ensure Trident emitter refreshPartitions is only called with partitions assigned to the emitter
    * [STORM-3055] - never refresh connection
    * [STORM-3068] - STORM_JAR_JVM_OPTS are not passed to storm-kafka-monitor properly
    * [STORM-3082] - NamedTopicFilter can't handle topics that don't exist yet
    * [STORM-3087] - FluxBuilder.canInvokeWithArgs is too permissive when the method parameter type is a primitive
    * [STORM-3090] - The same offset value is used by the same partition number of different topics.
    * [STORM-3097] - Remove storm-druid in 2.x and deprecate support for it in 1.x
    * [STORM-3102] - Storm Kafka Client performance issues with Kafka Client v1.0.0
    * [STORM-3109] - Wrong canonical path set to STORM_LOCAL_DIR in storm kill_workers
    * [STORM-3110] - Supervisor does not kill all worker processes in secure mode in case of user mismatch
    * [STORM-3121] - Fix flaky metrics tests in storm-core
    * [STORM-3122] - FNFE due to race condition between 'async localizer' and 'update blob' timer thread
    * [STORM-3123] - Storm Kafka Monitor does not work with Kafka over two-way SSL
    * [STORM-3161] - Local mode should force setting min replication count to 1
    * [STORM-3164] - Multilang storm.py uses traceback.format_exc incorrectly
    * [STORM-3184] - Storm supervisor log showing keystore and truststore password in plaintext
    * [STORM-3201] - kafka spout lag on UI needs some cleanup
    * [STORM-3301] - The KafkaSpout can in some cases still replay tuples that were already committed
    * [STORM-3381] - Upgrading to Zookeeper 3.4.14 added an LGPL dependency
    * [STORM-3384] - storm set-log-level command throws wrong exception when the topology is not running
    * [STORM-3086] - Update Flux documentation to demonstrate static factory methods (STORM-2796)
    * [STORM-3089] - Document worker hooks on the hooks page
    * [STORM-3199] - Metrics-ganglia depends on an LGPL library, so we shouldn't depend on it
    * [STORM-3289] - Add note about KAFKA-7044 to storm-kafka-client compatibility docs
    * [STORM-3330] - Migrate parts of storm-webapp, and reduce use of mocks for files
  * 1.2.2
    * [STORM-3026] - Upgrade ZK instance for security
    * [STORM-3027] - Make Impersonation Optional
    * [STORM-2896] - Support automatic migration of offsets from storm-kafka to storm-kafka-client KafkaSpout
    * [STORM-2997] - Add logviewer ssl module in SECURITY.md
    * [STORM-3006] - Distributed RPC documentation needs an update
    * [STORM-3011] - Use default bin path in flight.bash if $JAVA_HOME is undefined
    * [STORM-3022] - Decouple storm-hive UTs with Hive
    * [STORM-3039] - Ports of killed topologies remain in TIME_WAIT state preventing to start new topology
    * [STORM-3069] - Allow users to specify maven local repository directory for storm submit tool
    * [STORM-2911] - SpoutConfig is serializable but does not declare a serialVersionUID field
    * [STORM-2967] - Upgrade jackson to latest version 2.9.4
    * [STORM-2968] - Exclude a few unwanted jars from storm-autocreds
    * [STORM-2978] - The fix for STORM-2706 is broken, and adds a transitive dependency on Zookeeper 3.5.3-beta for projects that depend on e.g. storm-kafka
    * [STORM-2979] - WorkerHooks EOFException during run_worker_shutdown_hooks
    * [STORM-2981] - Upgrade Curator to lastest patch version
    * [STORM-2985] - Add jackson-annotations to dependency management
    * [STORM-2988] - 'Error on initialization of server mk-worker' when using org.apache.storm.metrics2.reporters.JmxStormReporter on worker
    * [STORM-2989] - LogCleaner should preserve current worker.log.metrics
    * [STORM-2993] - Storm HDFS bolt throws ClosedChannelException when Time rotation policy is used
    * [STORM-2994] - KafkaSpout consumes messages but doesn't commit offsets
    * [STORM-3043] - NullPointerException thrown in SimpleRecordTranslator.apply()
    * [STORM-3052] - Let blobs un archive
    * [STORM-3059] - KafkaSpout throws NPE when hitting a null tuple if the processing guarantee is not AT_LEAST_ONCE
    * [STORM-2960] - Better to stress importance of setting up proper OS account for Storm processes
    * [STORM-3060] - Configuration mapping between storm-kafka &amp; storm-kafka-client
    * [STORM-2952] - Deprecate storm-kafka in 1.x
    * [STORM-3005] - [DRPC] LinearDRPCTopologyBuilder shouldn't be deprecated

Changes in storm-kit:
- Add _constraints to prevent build from running out of disk space

- Updated kit for storm-1.2.3

Changes in venv-openstack-cinder:
- Ensure that python-swiftclient is pulled into the built venv
  via an explicit BuildRequires directive. (SOC-10522)

Changes in venv-openstack-swift:
- Ensure that python-oslo.log is pulled into the built venv by
  explicitly requiring the package using a BuildRequires entry.

  		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1008037">SUSE bug 1008037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008038">SUSE bug 1008038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010940">SUSE bug 1010940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019021">SUSE bug 1019021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038785">SUSE bug 1038785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056094">SUSE bug 1056094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059235">SUSE bug 1059235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080682">SUSE bug 1080682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097775">SUSE bug 1097775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102126">SUSE bug 1102126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109957">SUSE bug 1109957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112959">SUSE bug 1112959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117080">SUSE bug 1117080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118896">SUSE bug 1118896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123561">SUSE bug 1123561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126503">SUSE bug 1126503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137479">SUSE bug 1137479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137528">SUSE bug 1137528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142121">SUSE bug 1142121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142542">SUSE bug 1142542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144453">SUSE bug 1144453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153452">SUSE bug 1153452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154231">SUSE bug 1154231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154232">SUSE bug 1154232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154830">SUSE bug 1154830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157968">SUSE bug 1157968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157969">SUSE bug 1157969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159447">SUSE bug 1159447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161919">SUSE bug 1161919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164133">SUSE bug 1164133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164134">SUSE bug 1164134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164135">SUSE bug 1164135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164136">SUSE bug 1164136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164137">SUSE bug 1164137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164138">SUSE bug 1164138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164139">SUSE bug 1164139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164140">SUSE bug 1164140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165022">SUSE bug 1165022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165393">SUSE bug 1165393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166389">SUSE bug 1166389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167440">SUSE bug 1167440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167532">SUSE bug 1167532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171162">SUSE bug 1171162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171823">SUSE bug 1171823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172450">SUSE bug 1172450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173413">SUSE bug 1173413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173416">SUSE bug 1173416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173418">SUSE bug 1173418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174006">SUSE bug 1174006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174145">SUSE bug 1174145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174242">SUSE bug 1174242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174302">SUSE bug 1174302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174583">SUSE bug 1174583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175484">SUSE bug 1175484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175986">SUSE bug 1175986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175993">SUSE bug 1175993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177948">SUSE bug 1177948</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8614/">CVE-2016-8614 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8614">CVE-2016-8614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8628/">CVE-2016-8628 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8628">CVE-2016-8628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8647/">CVE-2016-8647 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8647">CVE-2016-8647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9587/">CVE-2016-9587 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9587">CVE-2016-9587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7466/">CVE-2017-7466 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7466">CVE-2017-7466 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7550/">CVE-2017-7550 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7550">CVE-2017-7550 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10875/">CVE-2018-10875 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10875">CVE-2018-10875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11779/">CVE-2018-11779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11779">CVE-2018-11779 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16837/">CVE-2018-16837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16837">CVE-2018-16837 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16859/">CVE-2018-16859 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16859">CVE-2018-16859 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16876/">CVE-2018-16876 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16876">CVE-2018-16876 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-18623/">CVE-2018-18623 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18623">CVE-2018-18623 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-18624/">CVE-2018-18624 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18624">CVE-2018-18624 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-18625/">CVE-2018-18625 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18625">CVE-2018-18625 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0202/">CVE-2019-0202 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0202">CVE-2019-0202 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10156/">CVE-2019-10156 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10156">CVE-2019-10156 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10206/">CVE-2019-10206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10206">CVE-2019-10206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10217/">CVE-2019-10217 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10217">CVE-2019-10217 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14846/">CVE-2019-14846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14846">CVE-2019-14846 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14856/">CVE-2019-14856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14856">CVE-2019-14856 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14858/">CVE-2019-14858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-14858">CVE-2019-14858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14864/">CVE-2019-14864 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14864">CVE-2019-14864 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14904/">CVE-2019-14904 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14904">CVE-2019-14904 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14905/">CVE-2019-14905 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14905">CVE-2019-14905 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19844/">CVE-2019-19844 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19844">CVE-2019-19844 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3828/">CVE-2019-3828 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3828">CVE-2019-3828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10177/">CVE-2020-10177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10177">CVE-2020-10177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10378/">CVE-2020-10378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10378">CVE-2020-10378 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10684/">CVE-2020-10684 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10684">CVE-2020-10684 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10685/">CVE-2020-10685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10685">CVE-2020-10685 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10691/">CVE-2020-10691 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10691">CVE-2020-10691 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10729/">CVE-2020-10729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10729">CVE-2020-10729 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10744/">CVE-2020-10744 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10744">CVE-2020-10744 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10994/">CVE-2020-10994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10994">CVE-2020-10994 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11110/">CVE-2020-11110 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11110">CVE-2020-11110 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14330/">CVE-2020-14330 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14330">CVE-2020-14330 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14332/">CVE-2020-14332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14332">CVE-2020-14332 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14365/">CVE-2020-14365 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14365">CVE-2020-14365 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1733/">CVE-2020-1733 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1733">CVE-2020-1733 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1734/">CVE-2020-1734 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1734">CVE-2020-1734 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1735/">CVE-2020-1735 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1735">CVE-2020-1735 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1736/">CVE-2020-1736 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1736">CVE-2020-1736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1737/">CVE-2020-1737 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1737">CVE-2020-1737 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-17376/">CVE-2020-17376 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17376">CVE-2020-17376 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1738/">CVE-2020-1738 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1738">CVE-2020-1738 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1739/">CVE-2020-1739 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1739">CVE-2020-1739 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1740/">CVE-2020-1740 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1740">CVE-2020-1740 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1746/">CVE-2020-1746 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1746">CVE-2020-1746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1753/">CVE-2020-1753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1753">CVE-2020-1753 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25032/">CVE-2020-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25032">CVE-2020-25032 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26137">CVE-2020-26137 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-7471/">CVE-2020-7471 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7471">CVE-2020-7471 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9402/">CVE-2020-9402 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9402">CVE-2020-9402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597326" comment="ansible-2.9.14-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597688" comment="crowbar-core-5.0+git.1600432272.b3ad722f0-3.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597689" comment="crowbar-core-branding-upstream-5.0+git.1600432272.b3ad722f0-3.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597690" comment="crowbar-openstack-5.0+git.1599037158.5c4d07480-4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597691" comment="documentation-suse-openstack-cloud-deployment-8.20201007-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597338" comment="documentation-suse-openstack-cloud-supplement-8.20201007-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597339" comment="documentation-suse-openstack-cloud-upstream-admin-8.20201007-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597340" comment="documentation-suse-openstack-cloud-upstream-user-8.20201007-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597342" comment="grafana-6.7.4-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597343" comment="grafana-natel-discrete-panel-0.0.9-3.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597344" comment="openstack-cinder-11.2.3~dev29-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597345" comment="openstack-cinder-api-11.2.3~dev29-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597346" comment="openstack-cinder-backup-11.2.3~dev29-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597347" comment="openstack-cinder-doc-11.2.3~dev29-3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597348" comment="openstack-cinder-scheduler-11.2.3~dev29-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597349" comment="openstack-cinder-volume-11.2.3~dev29-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597350" comment="openstack-monasca-installer-20190923_16.32-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597351" comment="openstack-neutron-11.0.9~dev69-3.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597352" comment="openstack-neutron-dhcp-agent-11.0.9~dev69-3.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597353" comment="openstack-neutron-doc-11.0.9~dev69-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597354" comment="openstack-neutron-ha-tool-11.0.9~dev69-3.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597355" comment="openstack-neutron-l3-agent-11.0.9~dev69-3.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597356" comment="openstack-neutron-linuxbridge-agent-11.0.9~dev69-3.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597357" comment="openstack-neutron-macvtap-agent-11.0.9~dev69-3.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597358" comment="openstack-neutron-metadata-agent-11.0.9~dev69-3.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597359" comment="openstack-neutron-metering-agent-11.0.9~dev69-3.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597360" comment="openstack-neutron-openvswitch-agent-11.0.9~dev69-3.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597361" comment="openstack-neutron-server-11.0.9~dev69-3.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597362" comment="openstack-nova-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597363" comment="openstack-nova-api-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597364" comment="openstack-nova-cells-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597365" comment="openstack-nova-compute-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597366" comment="openstack-nova-conductor-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597367" comment="openstack-nova-console-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597368" comment="openstack-nova-consoleauth-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597369" comment="openstack-nova-doc-16.1.9~dev76-3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597370" comment="openstack-nova-novncproxy-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597371" comment="openstack-nova-placement-api-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597372" comment="openstack-nova-scheduler-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597373" comment="openstack-nova-serialproxy-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597374" comment="openstack-nova-vncproxy-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597375" comment="python-Django-1.11.29-3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597377" comment="python-Pillow-4.2.1-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597379" comment="python-cinder-11.2.3~dev29-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597380" comment="python-keystoneclient-3.13.1-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597381" comment="python-keystoneclient-doc-3.13.1-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597382" comment="python-keystonemiddleware-4.17.1-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597383" comment="python-kombu-4.1.0-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597384" comment="python-neutron-11.0.9~dev69-3.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597385" comment="python-nova-16.1.9~dev76-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597386" comment="python-straight-plugin-1.5.0-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597387" comment="python-urllib3-1.22-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597388" comment="release-notes-suse-openstack-cloud-8.20200922-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597692" comment="ruby2.1-rubygem-crowbar-client-3.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597389" comment="storm-1.2.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597390" comment="storm-nimbus-1.2.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597391" comment="storm-supervisor-1.2.3-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148952" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1106383" ref_url="https://bugzilla.suse.com/1106383" source="BUGZILLA"/>
		<reference ref_id="1133495" ref_url="https://bugzilla.suse.com/1133495" source="BUGZILLA"/>
		<reference ref_id="1139459" ref_url="https://bugzilla.suse.com/1139459" source="BUGZILLA"/>
		<reference ref_id="1151377" ref_url="https://bugzilla.suse.com/1151377" source="BUGZILLA"/>
		<reference ref_id="1151506" ref_url="https://bugzilla.suse.com/1151506" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1155574" ref_url="https://bugzilla.suse.com/1155574" source="BUGZILLA"/>
		<reference ref_id="1156482" ref_url="https://bugzilla.suse.com/1156482" source="BUGZILLA"/>
		<reference ref_id="1159814" ref_url="https://bugzilla.suse.com/1159814" source="BUGZILLA"/>
		<reference ref_id="1162108" ref_url="https://bugzilla.suse.com/1162108" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1712" ref_url="https://www.suse.com/security/cve/CVE-2020-1712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006452.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2020-1712 (bsc#bsc#1162108)
  Fix a heap use-after-free vulnerability, when asynchronous
  Polkit queries were performed while handling Dbus messages. A local
  unprivileged attacker could have abused this flaw to crash systemd services or
  potentially execute code and elevate their privileges, by sending specially
  crafted Dbus messages.

- Unconfirmed fix for prevent hanging of systemctl during restart. (bsc#1139459)
- Fix warnings thrown during package installation. (bsc#1154043)
- Fix for system-udevd prevent crash within OES2018. (bsc#1151506)
- Fragments of masked units ought not be considered for 'NeedDaemonReload'. (bsc#1156482)
- Wait for workers to finish when exiting. (bsc#1106383)
- Improve log message when inotify limit is reached. (bsc#1155574)
- Mention in the man pages that alias names are only effective after command 'systemctl enable'. (bsc#1151377)
- Introduce function for reading virtual files in 'sysfs' and 'procfs'. (bsc#1133495, bsc#1159814)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106383">SUSE bug 1106383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133495">SUSE bug 1133495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139459">SUSE bug 1139459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151377">SUSE bug 1151377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151506">SUSE bug 1151506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155574">SUSE bug 1155574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156482">SUSE bug 1156482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159814">SUSE bug 1159814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162108">SUSE bug 1162108</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1712/">CVE-2020-1712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1712">CVE-2020-1712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522619" comment="libsystemd0-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522620" comment="libsystemd0-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531525" comment="libudev-devel-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522621" comment="libudev1-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522622" comment="libudev1-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522623" comment="systemd-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522624" comment="systemd-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522625" comment="systemd-bash-completion-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522626" comment="systemd-sysvinit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522627" comment="udev-228-150.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148953" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.24 - OpenJDK 7u281 (October 2020 CPU, bsc#1177943)
  * Security fixes
    + JDK-8233624: Enhance JNI linkage
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8240124: Better VM Interning
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Import of OpenJDK 7 u281 build 1
    + JDK-8145096: Undefined behaviour in HotSpot
    + JDK-8215265: C2: range check elimination may allow illegal
      out of bound access
  * Backports
    + JDK-8250861, PR3812: Crash in MinINode::Ideal(PhaseGVN*, bool)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531526" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531527" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531528" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531529" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148954" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1178387" ref_url="https://bugzilla.suse.com/1178387" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007768.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25692">CVE-2020-25692 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531530" comment="libldap-2_4-2-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531531" comment="libldap-2_4-2-32bit-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531532" comment="openldap2-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531533" comment="openldap2-back-meta-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531534" comment="openldap2-client-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531535" comment="openldap2-doc-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531536" comment="openldap2-ppolicy-check-password-1.2-18.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148955" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1178588" ref_url="https://bugzilla.suse.com/1178588" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007779.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-49 (bsc#1178588)
  * CVE-2020-26950 (bmo#1675905)
    Write side effects in MCallGetProperty opcode not accounted
    for
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178588">SUSE bug 1178588</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26950">CVE-2020-26950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531537" comment="MozillaFirefox-78.4.1-112.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531538" comment="MozillaFirefox-devel-78.4.1-112.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531539" comment="MozillaFirefox-translations-common-78.4.1-112.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148956" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql96, postgresql10 and postgresql12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1171924" ref_url="https://bugzilla.suse.com/1171924" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007780.html" source="SUSE-SU"/>
		<description>


This update changes the internal packaging for postgresql, and so contains
all currently maintained postgresql versions across our SUSE Linux Enterprise 12
products.


* postgresql12 is shipped new in version 12.3 (bsc#1171924).

  The server and client packages only on SUSE Linux Enterprise Server 12 SP5,
  the libraries on SUSE Linux Enterprise Server 12 SP2 LTSS up to 12 SP5.

  + https://www.postgresql.org/about/news/2038/
  + https://www.postgresql.org/docs/12/release-12-3.html


* postgresql10 is updated to 10.13 (bsc#1171924).

  On SUSE Linux Enterprise Server 12 SP2 LTSS up to 12 SP5.

  +  https://www.postgresql.org/about/news/2038/
  +  https://www.postgresql.org/docs/10/release-10-13.html


* postgresql96 is updated to 9.6.18 (bsc#1171924):

  +  https://www.postgresql.org/about/news/2038/
  +  https://www.postgresql.org/docs/9.6/release-9-6-18.html

  On SUSE Linux Enterprise Server 12-SP2 and 12-SP3 LTSS only.

* postgresql 9.4 is updated to 9.4.26:

  +  https://www.postgresql.org/about/news/2011/
  +  https://www.postgresql.org/docs/9.4/release-9-4-26.html
  +  https://www.postgresql.org/about/news/1994/
  +  https://www.postgresql.org/docs/9.4/release-9-4-25.html

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171924">SUSE bug 1171924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531546" comment="libecpg6-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531547" comment="libpq5-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531548" comment="libpq5-32bit-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531549" comment="postgresql-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531550" comment="postgresql-contrib-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531551" comment="postgresql-docs-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531552" comment="postgresql-plperl-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531553" comment="postgresql-plpython-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531554" comment="postgresql-pltcl-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531555" comment="postgresql-server-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531556" comment="postgresql10-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531557" comment="postgresql10-contrib-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531558" comment="postgresql10-docs-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531559" comment="postgresql10-plperl-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531560" comment="postgresql10-plpython-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531561" comment="postgresql10-pltcl-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531562" comment="postgresql10-server-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531570" comment="postgresql96-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531571" comment="postgresql96-contrib-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531572" comment="postgresql96-docs-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531573" comment="postgresql96-plperl-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531574" comment="postgresql96-plpython-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531575" comment="postgresql96-pltcl-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531576" comment="postgresql96-server-9.6.19-6.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148957" version="1" class="patch">
	<metadata>
		<title>Security update for raptor (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1178593" ref_url="https://bugzilla.suse.com/1178593" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18926" ref_url="https://www.suse.com/security/cve/CVE-2017-18926/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007782.html" source="SUSE-SU"/>
		<description>
This update for raptor fixes the following issues:

- Fixed a heap overflow vulnerability (bsc#1178593, CVE-2017-18926).
- Update raptor to version 2.0.15
  * Made several fixes to Turtle / N-Triples family of parsers and serializers
  * Added utility functions for re-entrant sorting of objects and sequences.
  * Made other fixes and improvements including fixing reported issues:
    0000574, 0000575, 0000576, 0000577, 0000579, 0000581 and 0000584.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178593">SUSE bug 1178593</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18926/">CVE-2017-18926 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18926">CVE-2017-18926 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531577" comment="libraptor2-0-2.0.15-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148958" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1178671" ref_url="https://bugzilla.suse.com/1178671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12321" ref_url="https://www.suse.com/security/cve/CVE-2020-12321/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007786.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issue:

- CVE-2020-12321: Updated the Intel Bluetooth firmware for buffer overflow security bugs (bsc#1178671).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-17"/>
	<updated date="2020-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178671">SUSE bug 1178671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12321/">CVE-2020-12321 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12321">CVE-2020-12321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531578" comment="kernel-firmware-20170530-21.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531579" comment="ucode-amd-20170530-21.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148959" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1178512" ref_url="https://bugzilla.suse.com/1178512" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28196" ref_url="https://www.suse.com/security/cve/CVE-2020-28196/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007792.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following security issue:

- CVE-2020-28196: Fixed an unbounded recursion via an ASN.1-encoded Kerberos message (bsc#1178512).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178512">SUSE bug 1178512</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28196/">CVE-2020-28196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28196">CVE-2020-28196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531584" comment="krb5-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531585" comment="krb5-32bit-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531586" comment="krb5-client-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531587" comment="krb5-doc-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531588" comment="krb5-plugin-kdb-ldap-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531589" comment="krb5-plugin-preauth-otp-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531590" comment="krb5-plugin-preauth-pkinit-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531591" comment="krb5-server-1.12.5-40.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148960" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007828.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

Upgrade to version 10.15:

  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/10/release-10-15.html

Update to 10.14:

  * CVE-2020-14349, bsc#1175193: Set a secure search_path in
    logical replication walsenders and apply workers
  * CVE-2020-14350, bsc#1175194: Make contrib modules' installation
    scripts more secure.
  * https://www.postgresql.org/docs/10/release-10-14.html

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14349">CVE-2020-14349 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531592" comment="postgresql10-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531593" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531595" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531596" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531597" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531598" comment="postgresql10-server-10.15-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148961" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007833.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

Upgrade to version 9.6.20:

  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/9.6/release-9-6-20.html

Changes from 9.6.19:

  * CVE-2020-14350, bsc#1175194: Make contrib modules installation
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531599" comment="postgresql96-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531600" comment="postgresql96-contrib-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531601" comment="postgresql96-docs-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531602" comment="postgresql96-plperl-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531603" comment="postgresql96-plpython-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531604" comment="postgresql96-pltcl-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531605" comment="postgresql96-server-9.6.20-6.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148962" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1083244" ref_url="https://bugzilla.suse.com/1083244" source="BUGZILLA"/>
		<reference ref_id="1121826" ref_url="https://bugzilla.suse.com/1121826" source="BUGZILLA"/>
		<reference ref_id="1121872" ref_url="https://bugzilla.suse.com/1121872" source="BUGZILLA"/>
		<reference ref_id="1157298" ref_url="https://bugzilla.suse.com/1157298" source="BUGZILLA"/>
		<reference ref_id="1160917" ref_url="https://bugzilla.suse.com/1160917" source="BUGZILLA"/>
		<reference ref_id="1170415" ref_url="https://bugzilla.suse.com/1170415" source="BUGZILLA"/>
		<reference ref_id="1175228" ref_url="https://bugzilla.suse.com/1175228" source="BUGZILLA"/>
		<reference ref_id="1175306" ref_url="https://bugzilla.suse.com/1175306" source="BUGZILLA"/>
		<reference ref_id="1175721" ref_url="https://bugzilla.suse.com/1175721" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1176011" ref_url="https://bugzilla.suse.com/1176011" source="BUGZILLA"/>
		<reference ref_id="1176069" ref_url="https://bugzilla.suse.com/1176069" source="BUGZILLA"/>
		<reference ref_id="1176235" ref_url="https://bugzilla.suse.com/1176235" source="BUGZILLA"/>
		<reference ref_id="1176253" ref_url="https://bugzilla.suse.com/1176253" source="BUGZILLA"/>
		<reference ref_id="1176278" ref_url="https://bugzilla.suse.com/1176278" source="BUGZILLA"/>
		<reference ref_id="1176381" ref_url="https://bugzilla.suse.com/1176381" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176423" ref_url="https://bugzilla.suse.com/1176423" source="BUGZILLA"/>
		<reference ref_id="1176482" ref_url="https://bugzilla.suse.com/1176482" source="BUGZILLA"/>
		<reference ref_id="1176721" ref_url="https://bugzilla.suse.com/1176721" source="BUGZILLA"/>
		<reference ref_id="1176722" ref_url="https://bugzilla.suse.com/1176722" source="BUGZILLA"/>
		<reference ref_id="1176725" ref_url="https://bugzilla.suse.com/1176725" source="BUGZILLA"/>
		<reference ref_id="1176816" ref_url="https://bugzilla.suse.com/1176816" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176990" ref_url="https://bugzilla.suse.com/1176990" source="BUGZILLA"/>
		<reference ref_id="1177027" ref_url="https://bugzilla.suse.com/1177027" source="BUGZILLA"/>
		<reference ref_id="1177086" ref_url="https://bugzilla.suse.com/1177086" source="BUGZILLA"/>
		<reference ref_id="1177121" ref_url="https://bugzilla.suse.com/1177121" source="BUGZILLA"/>
		<reference ref_id="1177165" ref_url="https://bugzilla.suse.com/1177165" source="BUGZILLA"/>
		<reference ref_id="1177206" ref_url="https://bugzilla.suse.com/1177206" source="BUGZILLA"/>
		<reference ref_id="1177226" ref_url="https://bugzilla.suse.com/1177226" source="BUGZILLA"/>
		<reference ref_id="1177410" ref_url="https://bugzilla.suse.com/1177410" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177511" ref_url="https://bugzilla.suse.com/1177511" source="BUGZILLA"/>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="1177725" ref_url="https://bugzilla.suse.com/1177725" source="BUGZILLA"/>
		<reference ref_id="1177766" ref_url="https://bugzilla.suse.com/1177766" source="BUGZILLA"/>
		<reference ref_id="1177816" ref_url="https://bugzilla.suse.com/1177816" source="BUGZILLA"/>
		<reference ref_id="1178123" ref_url="https://bugzilla.suse.com/1178123" source="BUGZILLA"/>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178782" ref_url="https://bugzilla.suse.com/1178782" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18204" ref_url="https://www.suse.com/security/cve/CVE-2017-18204/" source="CVE"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-25641" ref_url="https://www.suse.com/security/cve/CVE-2020-25641/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bug fixes.


The following security bugs were fixed:

- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-25212: Fixed A TOCTOU mismatch in the NFS client code which could have been used by local attackers to corrupt memory (bsc#1176381).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).
- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2019-19063: Fixed two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c, which could have allowed an attacker to cause a denial of service (memory consumption) (bsc#1157298).
- CVE-2019-6133: In PolicyKit (aka polkit), the 'start time' protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c (bsc#1121872).
- CVE-2017-18204: Fixed a denial of service in the ocfs2_setattr function of fs/ocfs2/file.c (bnc#1083244).

The following non-security bugs were fixed:

- hv: vmbus: Add timeout to vmbus_wait_for_unload (bsc#1177816).
- hyperv_fb: disable superfluous VERSION_WIN10_V5 case (bsc#1175306).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1176816).
- net/packet: fix overflow in tpacket_rcv (bsc#1176069).
- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083244">SUSE bug 1083244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121872">SUSE bug 1121872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157298">SUSE bug 1157298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160917">SUSE bug 1160917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175228">SUSE bug 1175228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175306">SUSE bug 1175306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176011">SUSE bug 1176011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176253">SUSE bug 1176253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176721">SUSE bug 1176721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176725">SUSE bug 1176725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176816">SUSE bug 1176816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176990">SUSE bug 1176990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177027">SUSE bug 1177027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177086">SUSE bug 1177086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177121">SUSE bug 1177121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177165">SUSE bug 1177165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177226">SUSE bug 1177226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177410">SUSE bug 1177410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177725">SUSE bug 1177725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177816">SUSE bug 1177816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178782">SUSE bug 1178782</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18204/">CVE-2017-18204 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18204">CVE-2017-18204 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19063">CVE-2019-19063 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6133">CVE-2019-6133 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0404">CVE-2020-0404 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0427">CVE-2020-0427 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0432">CVE-2020-0432 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12352">CVE-2020-12352 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14351">CVE-2020-14351 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14390">CVE-2020-14390 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25284">CVE-2020-25284 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25641/">CVE-2020-25641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25641">CVE-2020-25641 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25643">CVE-2020-25643 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25656">CVE-2020-25656 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26088">CVE-2020-26088 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555870" comment="kernel-default-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555871" comment="kernel-default-base-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555872" comment="kernel-default-devel-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556703" comment="kernel-default-kgraft-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538784" comment="kernel-devel-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538785" comment="kernel-macros-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538786" comment="kernel-source-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555873" comment="kernel-syms-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556705" comment="kgraft-patch-4_4_180-94_135-default-1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148963" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173592" ref_url="https://bugzilla.suse.com/1173592" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="1178971" ref_url="https://bugzilla.suse.com/1178971" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated Intel CPU Microcode to 20201118 official release. (bsc#1178971)
 - Removed TGL/06-8c-01/80 due to functional issues with some OEM platforms.
 - CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) INTEL-SA-00389 (bsc#1170446)
 - CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)
 - CVE-2020-8696: Vector Register Sampling Active INTEL-SA-00381 (bsc#1173592)

- Release notes:
  - Security updates for [INTEL-SA-00381](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html).
  - Security updates for [INTEL-SA-00389](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html).
  - Update for functional issues. Refer to [Second Generation Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
  - Update for functional issues. Refer to [10th Gen Intel? Core™ Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
  - Update for functional issues. Refer to [8th and 9th Gen Intel? Core™ Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
  - Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel? Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
  - Update for functional issues. Refer to [6th Gen Intel? Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

  ### New Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | LKF            | B2/B3    | 06-8a-01/10 |          | 00000028 | Core w/Hybrid Technology
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  ### Updated Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173592">SUSE bug 1173592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178971">SUSE bug 1178971</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8696">CVE-2020-8696 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531614" comment="ucode-intel-20201118-13.81.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148964" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1166751" ref_url="https://bugzilla.suse.com/1166751" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0556" ref_url="https://www.suse.com/security/cve/CVE-2020-0556/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007858.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2020-0556: Fixed improper access control which may lead to escalation of privilege and denial of service by an unauthenticated user (bsc#1166751).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166751">SUSE bug 1166751</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-0556/">CVE-2020-0556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0556">CVE-2020-0556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531615" comment="bluez-5.13-5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531616" comment="libbluetooth3-5.13-5.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148965" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1178824" ref_url="https://bugzilla.suse.com/1178824" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.5.0 ESR (bsc#1178824)
  * CVE-2020-26951: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code
  * CVE-2020-16012: Variable time processing of cross-origin images during drawImage calls
  * CVE-2020-26953: Fullscreen could be enabled without displaying the security UI
  * CVE-2020-26956: XSS through paste (manual and clipboard API)
  * CVE-2020-26958: Requests intercepted through ServiceWorkers lacked MIME type restrictions
  * CVE-2020-26959: Use-after-free in WebRequestService
  * CVE-2020-26960: Potential use-after-free in uses of nsTArray
  * CVE-2020-15999: Heap buffer overflow in freetype
  * CVE-2020-26961: DoH did not filter IPv4 mapped IP Addresses
  * CVE-2020-26965: Software keyboards may have remembered typed passwords
  * CVE-2020-26966: Single-word search queries were also broadcast to local network
  * CVE-2020-26968: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-27"/>
	<updated date="2020-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16012">CVE-2020-16012 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26951">CVE-2020-26951 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26953">CVE-2020-26953 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26956">CVE-2020-26956 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26958">CVE-2020-26958 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26959">CVE-2020-26959 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26960">CVE-2020-26960 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26961">CVE-2020-26961 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26965">CVE-2020-26965 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26966">CVE-2020-26966 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26968">CVE-2020-26968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531617" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531618" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531619" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148966" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1178682" ref_url="https://bugzilla.suse.com/1178682" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007885.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2020-25708 [bsc#1178682], libvncserver/rfbserver.c has a divide by zero which could result in DoS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-27"/>
	<updated date="2020-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178682">SUSE bug 1178682</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25708">CVE-2020-25708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531620" comment="libvncclient0-0.9.9-17.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531621" comment="libvncserver0-0.9.9-17.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148967" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1174908" ref_url="https://bugzilla.suse.com/1174908" source="BUGZILLA"/>
		<reference ref_id="1177596" ref_url="https://bugzilla.suse.com/1177596" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007901.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to privilege escalation (bsc#1177596).
- CVE-2020-14360: Fixed an out of bounds memory accesses on too short request which could lead to denial of service (bsc#1174908).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14360">CVE-2020-14360 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25712">CVE-2020-25712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531622" comment="xorg-x11-server-7.6_1.18.3-76.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531623" comment="xorg-x11-server-extra-7.6_1.18.3-76.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148968" version="1" class="patch">
	<metadata>
		<title>Security update for python-setuptools (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007907.html" source="SUSE-SU"/>
		<description>
This update for python-setuptools fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009524556" comment="python-setuptools-40.6.2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525277" comment="python3-setuptools-40.6.2-4.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148969" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007903.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531624" comment="libpython3_4m1_0-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531625" comment="python3-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531626" comment="python3-base-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531627" comment="python3-curses-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531628" comment="python3-devel-3.4.10-25.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148970" version="1" class="patch">
	<metadata>
		<title>Security update for gdm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1178150" ref_url="https://bugzilla.suse.com/1178150" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16125" ref_url="https://www.suse.com/security/cve/CVE-2020-16125/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007912.html" source="SUSE-SU"/>
		<description>
This update for gdm fixes the following issues:

- CVE-2020-16125: Fixed a privilege escalation (bsc#1178150).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178150">SUSE bug 1178150</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16125/">CVE-2020-16125 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16125">CVE-2020-16125 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531629" comment="gdm-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531630" comment="gdm-lang-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531631" comment="gdmflexiserver-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531632" comment="libgdm1-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531633" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148971" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1178168" ref_url="https://bugzilla.suse.com/1178168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007919.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-25659: Attempted to mitigate Bleichenbacher attacks on RSA decryption (bsc#1178168).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178168">SUSE bug 1178168</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25659">CVE-2020-25659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531634" comment="python-cryptography-2.1.4-7.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531635" comment="python3-cryptography-2.1.4-7.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148972" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<description>

This update for postgresql12 fixes the following issues:

Upgrade to version 12.5:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/12/release-12-5.html

The previous postgresql12 update already addressed:

Update to 12.4:

* CVE-2020-14349, bsc#1175193: Set a secure search_path in logical replication walsenders and apply workers
* CVE-2020-14350, bsc#1175194: Make contrib modules' installation scripts more secure.

* https://www.postgresql.org/docs/12/release-12-4.html

  		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14349">CVE-2020-14349 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531636" comment="libecpg6-12.5-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531637" comment="libpq5-12.5-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531638" comment="libpq5-32bit-12.5-3.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148973" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1177409" ref_url="https://bugzilla.suse.com/1177409" source="BUGZILLA"/>
		<reference ref_id="1177412" ref_url="https://bugzilla.suse.com/1177412" source="BUGZILLA"/>
		<reference ref_id="1177413" ref_url="https://bugzilla.suse.com/1177413" source="BUGZILLA"/>
		<reference ref_id="1177414" ref_url="https://bugzilla.suse.com/1177414" source="BUGZILLA"/>
		<reference ref_id="1178591" ref_url="https://bugzilla.suse.com/1178591" source="BUGZILLA"/>
		<reference ref_id="1178963" ref_url="https://bugzilla.suse.com/1178963" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674/" source="CVE"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1178963 - stack corruption from XSA-346 change (XSA-355) 
- bsc#1177409 - CVE-2020-27674: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286)
- bsc#1177412 - CVE-2020-27672: Race condition in Xen mapping code (XSA-345)
- bsc#1177413 - CVE-2020-27671: undue deferral of IOMMU TLB flushes (XSA-346)
- bsc#1177414 - CVE-2020-27670: unsafe AMD IOMMU page table updates (XSA-347)
- bsc#1178591 - CVE-2020-28368: Intel RAPL sidechannel attack aka PLATYPUS attack aka XSA-351
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177413">SUSE bug 1177413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178963">SUSE bug 1178963</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27670">CVE-2020-27670 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27671">CVE-2020-27671 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27672">CVE-2020-27672 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27674">CVE-2020-27674 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28368">CVE-2020-28368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538789" comment="xen-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538790" comment="xen-doc-html-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538791" comment="xen-libs-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538792" comment="xen-libs-32bit-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538793" comment="xen-tools-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538794" comment="xen-tools-domU-4.9.4_14-3.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148974" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1179035" ref_url="https://bugzilla.suse.com/1179035" source="BUGZILLA"/>
		<reference ref_id="1179113" ref_url="https://bugzilla.suse.com/1179113" source="BUGZILLA"/>
		<reference ref_id="1179461" ref_url="https://bugzilla.suse.com/1179461" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007921.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- Find and display the content of messages properly. (bsc#1179461)
- CVE-2020-28896: incomplete connection termination could send credentials over unencrypted connections. (bsc#1179035)
- Avoid that message with a million tiny parts can freeze MUA for several minutes. (bsc#1179113)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179035">SUSE bug 1179035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179113">SUSE bug 1179113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179461">SUSE bug 1179461</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28896">CVE-2020-28896 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531639" comment="mutt-1.10.1-55.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148975" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1137832" ref_url="https://bugzilla.suse.com/1137832" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2820-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006487.html" source="SUSE-SU"/>
		<description>
This update for dbus-1 fixes the following issues:
	  
Security issue fixed:     
    
- CVE-2019-12749: Fixed an implementation flaw in DBUS_COOKIE_SHA1 which 
  could have allowed local attackers to bypass authentication (bsc#1137832).   
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-18"/>
	<updated date="2020-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12749">CVE-2019-12749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522634" comment="dbus-1-1.8.22-29.17.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522635" comment="dbus-1-x11-1.8.22-29.17.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522636" comment="libdbus-1-3-1.8.22-29.17.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522637" comment="libdbus-1-3-32bit-1.8.22-29.17.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148976" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1179491" ref_url="https://bugzilla.suse.com/1179491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007976.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2020-1971: Fixed a null pointer dereference in EDIPARTYNAME (bsc#1179491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">CVE-2020-1971 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531646" comment="libopenssl-devel-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531647" comment="libopenssl1_0_0-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531648" comment="libopenssl1_0_0-32bit-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531649" comment="libopenssl1_0_0-hmac-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531650" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531651" comment="openssl-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531652" comment="openssl-doc-1.0.2j-60.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148977" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007975.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531653" comment="libpython2_7-1_0-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531654" comment="libpython2_7-1_0-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531655" comment="python-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531656" comment="python-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531657" comment="python-base-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531658" comment="python-base-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531659" comment="python-curses-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531660" comment="python-demo-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531661" comment="python-devel-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531662" comment="python-doc-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531663" comment="python-doc-pdf-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531664" comment="python-gdbm-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531665" comment="python-idle-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531666" comment="python-tk-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531667" comment="python-xml-2.7.17-28.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148978" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1161799" ref_url="https://bugzilla.suse.com/1161799" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.5.0 ESR
  * CVE-2020-6796 (bmo#1610426)
    Missing bounds check on shared memory read in the parent
    process
  * CVE-2020-6797 (bmo#1596668)
    Extensions granted downloads.open permission could open
    arbitrary applications on Mac OSX
  * CVE-2020-6798 (bmo#1602944)
    Incorrect parsing of template tag could result in JavaScript
    injection
  * CVE-2020-6799 (bmo#1606596)
    Arbitrary code execution when opening pdf links from other
    applications, when Firefox is configured as default pdf
    reader
  * CVE-2020-6800 (bmo#1595786, bmo#1596706, bmo#1598543,
    bmo#1604851, bmo#1605777, bmo#1608580, bmo#1608785)
    Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
  * Fixed: Fixed various issues opening files with spaces in
    their path (bmo#1601905, bmo#1602726)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-17"/>
	<updated date="2020-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161799">SUSE bug 1161799</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6796">CVE-2020-6796 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6797">CVE-2020-6797 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6798">CVE-2020-6798 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6799">CVE-2020-6799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6800">CVE-2020-6800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522638" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522639" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148979" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1180039" ref_url="https://bugzilla.suse.com/1180039" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2020-55 (bsc#1180039)
  * CVE-2020-16042 (bmo#1679003)
    Operations on a BigInt could have caused uninitialized memory
    to be exposed
  * CVE-2020-26971 (bmo#1663466)
    Heap buffer overflow in WebGL
  * CVE-2020-26973 (bmo#1680084)
    CSS Sanitizer performed incorrect sanitization
  * CVE-2020-26974 (bmo#1681022)
    Incorrect cast of StyleGenericFlexBasis resulted in a heap
    use-after-free
  * CVE-2020-26978 (bmo#1677047)
    Internal network hosts could have been probed by a malicious
    webpage
  * CVE-2020-35111 (bmo#1657916)
    The proxy.onRequest API did not catch view-source URLs
  * CVE-2020-35112 (bmo#1661365)
    Opening an extension-less download may have inadvertently
    launched an executable instead
  * CVE-2020-35113 (bmo#1664831, bmo#1673589)
    Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16042">CVE-2020-16042 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26971">CVE-2020-26971 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26973">CVE-2020-26973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26974">CVE-2020-26974 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26978">CVE-2020-26978 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35111">CVE-2020-35111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35112">CVE-2020-35112 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35113">CVE-2020-35113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531677" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531678" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531679" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148980" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1118459" ref_url="https://bugzilla.suse.com/1118459" source="BUGZILLA"/>
		<reference ref_id="1119353" ref_url="https://bugzilla.suse.com/1119353" source="BUGZILLA"/>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="1171981" ref_url="https://bugzilla.suse.com/1171981" source="BUGZILLA"/>
		<reference ref_id="1174250" ref_url="https://bugzilla.suse.com/1174250" source="BUGZILLA"/>
		<reference ref_id="1174255" ref_url="https://bugzilla.suse.com/1174255" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123/" source="CVE"/>
		<reference ref_id="CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327/" source="CVE"/>
		<reference ref_id="CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341/" source="CVE"/>
		<reference ref_id="CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350/" source="CVE"/>
		<reference ref_id="CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

clamav was updated to 0.103.0 to implement jsc#ECO-3010 and bsc#1118459.

* clamd can now reload the signature database without blocking
  scanning. This multi-threaded database reload improvement was made
  possible thanks to a community effort.
  - Non-blocking database reloads are now the default behavior. Some
    systems that are more constrained on RAM may need to disable
    non-blocking reloads as it will temporarily consume two times as
    much memory. We added a new clamd config option
    ConcurrentDatabaseReload, which may be set to no.
* Fix clamav-milter.service (requires clamd.service to run)
* bsc#1119353, clamav-fips.patch: Fix freshclam crash in FIPS mode.
* Partial sync with SLE15.

Update to version 0.102.4

Accumulated security fixes:

* CVE-2020-3350: Fix a vulnerability wherein a malicious user could
  replace a scan target's directory with a symlink to another path
  to trick clamscan, clamdscan, or clamonacc into removing or moving
  a different file (eg. a critical system file). The issue would
  affect users that use the --move or --remove options for clamscan,
  clamdscan, and clamonacc. (bsc#1174255)
* CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
  module in ClamAV 0.102.3 that could cause a Denial-of-Service
  (DoS) condition. Improper bounds checking results in an
  out-of-bounds read which could cause a crash. The previous fix for
  this CVE in 0.102.3 was incomplete. This fix correctly resolves
  the issue.
* CVE-2020-3481: Fix a vulnerability in the EGG archive module in
  ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)
  condition. Improper error handling may result in a crash due to a
  NULL pointer dereference. This vulnerability is mitigated for
  those using the official ClamAV signature databases because the
  file type signatures in daily.cvd will not enable the EGG archive
  parser in versions affected by the vulnerability. (bsc#1174250)
* CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
  ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
  condition. Improper size checking of a buffer used to initialize AES
  decryption routines results in an out-of-bounds read which may cause
  a crash. (bsc#1171981)
* CVE-2020-3123: A denial-of-service (DoS) condition may occur when
  using the optional credit card data-loss-prevention (DLP) feature.
  Improper bounds checking of an unsigned variable resulted in an
  out-of-bounds read, which causes a crash.
* CVE-2019-15961: A Denial-of-Service (DoS) vulnerability may
  occur when scanning a specially crafted email file as a result
  of excessively long scan times. The issue is resolved by
  implementing several maximums in parsing MIME messages and by
  optimizing use of memory allocation. (bsc#1157763).
* CVE-2019-12900: An out of bounds write in the NSIS bzip2
  (bsc#1149458)
* CVE-2019-12625: Introduce a configurable time limit to mitigate
  zip bomb vulnerability completely. Default is 2 minutes,
  configurable useing the clamscan --max-scantime and for clamd
  using the MaxScanTime config option (bsc#1144504)

Update to version 0.101.3:

* ZIP bomb causes extreme CPU spikes (bsc#1144504)

Update to version 0.101.2 (bsc#1118459):

* Support for RAR v5 archive extraction.
* Incompatible changes to the arguments of cl_scandesc,
  cl_scandesc_callback, and cl_scanmap_callback.
* Scanning options have been converted from a single flag
  bit-field into a structure of multiple categorized flag
  bit-fields.
* The CL_SCAN_HEURISTIC_ENCRYPTED scan option was replaced by
  2 new scan options: CL_SCAN_HEURISTIC_ENCRYPTED_ARCHIVE, and
  CL_SCAN_HEURISTIC_ENCRYPTED_DOC
* Incompatible clamd.conf and command line interface changes.
* Heuristic Alerts' (aka 'Algorithmic Detection') options have
  been changed to make the names more consistent. The original
  options are deprecated in 0.101, and will be removed in a
  future feature release.
* For details, see https://blog.clamav.net/2018/12/clamav-01010-has-been-released.html		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118459">SUSE bug 1118459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119353">SUSE bug 1119353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171981">SUSE bug 1171981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174255">SUSE bug 1174255</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15961">CVE-2019-15961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3123">CVE-2020-3123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3327">CVE-2020-3327 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3341">CVE-2020-3341 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3350">CVE-2020-3350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3481">CVE-2020-3481 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531686" comment="clamav-0.103.0-33.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148981" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1159635" ref_url="https://bugzilla.suse.com/1159635" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008123.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2019-19906: Fixed an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet (bsc#1159635).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-28"/>
	<updated date="2020-12-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159635">SUSE bug 1159635</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19906">CVE-2019-19906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531687" comment="cyrus-sasl-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531688" comment="cyrus-sasl-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531689" comment="cyrus-sasl-crammd5-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531690" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531691" comment="cyrus-sasl-digestmd5-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531692" comment="cyrus-sasl-gssapi-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531693" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531694" comment="cyrus-sasl-otp-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531695" comment="cyrus-sasl-otp-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531696" comment="cyrus-sasl-plain-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531697" comment="cyrus-sasl-plain-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531698" comment="libsasl2-3-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531699" comment="libsasl2-3-32bit-2.1.26-8.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148982" version="1" class="patch">
	<metadata>
		<title>Security update for gcc9 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1114592" ref_url="https://bugzilla.suse.com/1114592" source="BUGZILLA"/>
		<reference ref_id="1135254" ref_url="https://bugzilla.suse.com/1135254" source="BUGZILLA"/>
		<reference ref_id="1141897" ref_url="https://bugzilla.suse.com/1141897" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1142654" ref_url="https://bugzilla.suse.com/1142654" source="BUGZILLA"/>
		<reference ref_id="1148517" ref_url="https://bugzilla.suse.com/1148517" source="BUGZILLA"/>
		<reference ref_id="1149145" ref_url="https://bugzilla.suse.com/1149145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-15847" ref_url="https://www.suse.com/security/cve/CVE-2019-15847/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006488.html" source="SUSE-SU"/>
		<description>
This update for gcc9 fixes the following issues:

The GNU Compiler Collection is shipped in version 9.

A detailed changelog on what changed in GCC 9 is available at https://gcc.gnu.org/gcc-9/changes.html

The compilers have been added to the SUSE Linux Enterprise Toolchain Module.

To use these compilers, install e.g. gcc9, gcc9-c++ and build with CC=gcc-9
CXX=g++-9 set.


For SUSE Linux Enterprise base products, the libstdc++6, libgcc_s1 and
other compiler libraries have been switched from their gcc8 variants to
their gcc9 variants.

Security issues fixed:

- CVE-2019-15847: Fixed a miscompilation in the POWER9 back end, that optimized multiple calls of the __builtin_darn intrinsic into a single call. (bsc#1149145)
- CVE-2019-14250: Fixed a heap overflow in the LTO linker. (bsc#1142649)

Non-security issues fixed:

- Split out libstdc++ pretty-printers into a separate package supplementing gdb and the installed runtime. (bsc#1135254)
- Fixed miscompilation for vector shift on s390. (bsc#1141897)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-14"/>
	<updated date="2020-04-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114592">SUSE bug 1114592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135254">SUSE bug 1135254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141897">SUSE bug 1141897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142654">SUSE bug 1142654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148517">SUSE bug 1148517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149145">SUSE bug 1149145</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14250">CVE-2019-14250 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15847/">CVE-2019-15847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15847">CVE-2019-15847 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531700" comment="libasan5-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531701" comment="libasan5-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531702" comment="libatomic1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531703" comment="libatomic1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531704" comment="libgcc_s1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531705" comment="libgcc_s1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531706" comment="libgfortran5-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531707" comment="libgfortran5-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531708" comment="libgo14-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531709" comment="libgo14-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531710" comment="libgomp1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531711" comment="libgomp1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531712" comment="libitm1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531713" comment="libitm1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531714" comment="liblsan0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531715" comment="libquadmath0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531716" comment="libquadmath0-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531717" comment="libstdc++6-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531718" comment="libstdc++6-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531719" comment="libstdc++6-locale-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531720" comment="libtsan0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531721" comment="libubsan1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531722" comment="libubsan1-32bit-9.2.1+r275327-1.3.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148983" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1176782" ref_url="https://bugzilla.suse.com/1176782" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1179496" ref_url="https://bugzilla.suse.com/1179496" source="BUGZILLA"/>
		<reference ref_id="1179498" ref_url="https://bugzilla.suse.com/1179498" source="BUGZILLA"/>
		<reference ref_id="1179501" ref_url="https://bugzilla.suse.com/1179501" source="BUGZILLA"/>
		<reference ref_id="1179502" ref_url="https://bugzilla.suse.com/1179502" source="BUGZILLA"/>
		<reference ref_id="1179506" ref_url="https://bugzilla.suse.com/1179506" source="BUGZILLA"/>
		<reference ref_id="1179514" ref_url="https://bugzilla.suse.com/1179514" source="BUGZILLA"/>
		<reference ref_id="1179516" ref_url="https://bugzilla.suse.com/1179516" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480/" source="CVE"/>
		<reference ref_id="CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481/" source="CVE"/>
		<reference ref_id="CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483/" source="CVE"/>
		<reference ref_id="CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484/" source="CVE"/>
		<reference ref_id="CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566/" source="CVE"/>
		<reference ref_id="CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570/" source="CVE"/>
		<reference ref_id="CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-29480: Fixed an issue which could have allowed leak of non-sensitive data to administrator guests (bsc#117949 XSA-115).
- CVE-2020-29481: Fixed an issue which could have allowd to new domains to inherit existing node permissions (bsc#1179498 XSA-322). 
- CVE-2020-29483: Fixed an issue where guests could disturb domain cleanup (bsc#1179502 XSA-325).
- CVE-2020-29484: Fixed an issue where guests could crash xenstored via watchs (bsc#1179501 XSA-324). 
- CVE-2020-29566: Fixed an undue recursion in x86 HVM context switch code (bsc#1179506 XSA-348).
- CVE-2020-29570: Fixed an issue where FIFO event channels control block related ordering (bsc#1179514 XSA-358).
- CVE-2020-29571: Fixed an issue where FIFO event channels control structure ordering (bsc#1179516 XSA-359).
- CVE-2020-29130: Fixed an out-of-bounds access while processing ARP packets (bsc#1179477). 
- Fixed an issue where dump-core shows missing nr_pages during core (bsc#1176782).
- Multiple other bugs (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-29"/>
	<updated date="2020-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176782">SUSE bug 1176782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179496">SUSE bug 1179496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179498">SUSE bug 1179498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179501">SUSE bug 1179501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179502">SUSE bug 1179502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179506">SUSE bug 1179506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179514">SUSE bug 1179514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179516">SUSE bug 1179516</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29480">CVE-2020-29480 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29481">CVE-2020-29481 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29483">CVE-2020-29483 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29484">CVE-2020-29484 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29566">CVE-2020-29566 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29570">CVE-2020-29570 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29571">CVE-2020-29571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538805" comment="xen-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538806" comment="xen-doc-html-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538807" comment="xen-libs-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538808" comment="xen-libs-32bit-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538809" comment="xen-tools-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538810" comment="xen-tools-domU-4.9.4_16-3.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148984" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1162202" ref_url="https://bugzilla.suse.com/1162202" source="BUGZILLA"/>
		<reference ref_id="1162675" ref_url="https://bugzilla.suse.com/1162675" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006491.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

Security issue fixed:

- CVE-2019-18634: Fixed a buffer overflow in the passphrase prompt that could occur when pwfeedback was enabled in /etc/sudoers (bsc#1162202).

Non-security issue fixed:

- Fixed an issue where sudo -l would ask for a password even though `listpw` was set to `never` (bsc#1162675).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-19"/>
	<updated date="2020-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162202">SUSE bug 1162202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162675">SUSE bug 1162675</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18634">CVE-2019-18634 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522640" comment="sudo-1.8.20p2-3.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148985" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1138743" ref_url="https://bugzilla.suse.com/1138743" source="BUGZILLA"/>
		<reference ref_id="1154849" ref_url="https://bugzilla.suse.com/1154849" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14834" ref_url="https://www.suse.com/security/cve/CVE-2019-14834/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006501.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

Security issue fixed:

- CVE-2019-14834: Fixed a memory leak which could have allowed to remote attackers 
  to cause denial of service via DHCP response creation (bsc#1154849)

Other issue addressed:  

- Removed cache size limit (bsc#1138743).

		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-19"/>
	<updated date="2020-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1138743">SUSE bug 1138743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154849">SUSE bug 1154849</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14834/">CVE-2019-14834 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14834">CVE-2019-14834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597414" comment="dnsmasq-utils-2.78-18.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148986" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Java was updated to 7.1 Service Refresh 4 Fix Pack 60 [bsc#1162972, bsc#1160968].

Security issues fixed:

- CVE-2020-2583: Fixed a serialization vulnerability in BeanContextSupport (bsc#1162972).
- CVE-2020-2593: Fixed an incorrect check in isBuiltinStreamHandler, causing URL normalization issues (bsc#1162972).
- CVE-2020-2604: Fixed a serialization issue in jdk.serialFilter (bsc#1162972).
- CVE-2020-2659: Fixed the incomplete enforcement of the maxDatagramSockets limit in DatagramChannelImpl (bsc#1162972).

Non-security issues fixed:

* Class Libraries:
  IJ22333 HANG IN JAVA_JAVA_NET_SOCKETINPUTSTREAM_SOCKETREAD0 EVEN
          WHEN TIMEOUT IS SET
  IJ22350 JAVA 7 AND JAVA 8 NOT WORKING WELL WITH TRADITIONAL/SIMPLIFIED
          CHINESE EDITION OF WINDOWS CLIENT SYSTEM
  IJ22337 THE NAME OF THE REPUBLIC OF BELARUS IN THE RUSSIAN LOCALE
          INCONSISTENT WITH CLDR
  IJ22349 UPDATE TIMEZONE INFORMATION TO TZDATA2019C
* JIT Compiler:
  IJ11368 JAVA JIT PPC: CRASH IN JIT COMPILED CODE ON PPC MACHINES
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-07"/>
	<updated date="2020-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531724" comment="java-1_7_1-ibm-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531725" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531726" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531727" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531728" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-38.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148987" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006521.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20030">CVE-2018-20030 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9278">CVE-2019-9278 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522649" comment="libexif12-0.6.21-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522650" comment="libexif12-32bit-0.6.21-8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148988" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1158809" ref_url="https://bugzilla.suse.com/1158809" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006529.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issue fixed:

- CVE-2019-1551: Fixed an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli (bsc#1158809).

Non-security issue fixed:

- Fixed a crash in BN_copy (bsc#1160163).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158809">SUSE bug 1158809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1551">CVE-2019-1551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531729" comment="libopenssl-devel-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531730" comment="libopenssl1_0_0-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531731" comment="libopenssl1_0_0-32bit-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531732" comment="libopenssl1_0_0-hmac-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531733" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531734" comment="openssl-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531735" comment="openssl-doc-1.0.2j-60.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148989" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs6 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1163102" ref_url="https://bugzilla.suse.com/1163102" source="BUGZILLA"/>
		<reference ref_id="1163103" ref_url="https://bugzilla.suse.com/1163103" source="BUGZILLA"/>
		<reference ref_id="1163104" ref_url="https://bugzilla.suse.com/1163104" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15604" ref_url="https://www.suse.com/security/cve/CVE-2019-15604/" source="CVE"/>
		<reference ref_id="CVE-2019-15605" ref_url="https://www.suse.com/security/cve/CVE-2019-15605/" source="CVE"/>
		<reference ref_id="CVE-2019-15606" ref_url="https://www.suse.com/security/cve/CVE-2019-15606/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006531.html" source="SUSE-SU"/>
		<description>
This update for nodejs6 fixes the following issues:

Security issues fixed:

- CVE-2019-15604: Fixed a remotely triggerable assertion in the TLS server via a crafted certificate string (CVE-2019-15604, bsc#1163104).
- CVE-2019-15605: Fixed an HTTP request smuggling vulnerability via malformed Transfer-Encoding header (CVE-2019-15605, bsc#1163102).
- CVE-2019-15606: Fixed the white space sanitation of HTTP headers (CVE-2019-15606, bsc#1163103).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-26"/>
	<updated date="2020-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1163102">SUSE bug 1163102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163103">SUSE bug 1163103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163104">SUSE bug 1163104</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15604/">CVE-2019-15604 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15604">CVE-2019-15604 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-15605/">CVE-2019-15605 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15605">CVE-2019-15605 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15606/">CVE-2019-15606 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15606">CVE-2019-15606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597693" comment="nodejs6-6.17.1-11.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148990" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1162610" ref_url="https://bugzilla.suse.com/1162610" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006533.html" source="SUSE-SU"/>
		<description>
This update for ppp fixes the following security issue:

- CVE-2020-8597: Fixed a buffer overflow in the eap_request and eap_response functions (bsc#1162610).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-26"/>
	<updated date="2020-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162610">SUSE bug 1162610</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8597">CVE-2020-8597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522651" comment="ppp-2.4.7-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148991" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="1159208" ref_url="https://bugzilla.suse.com/1159208" source="BUGZILLA"/>
		<reference ref_id="1159623" ref_url="https://bugzilla.suse.com/1159623" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-4472" ref_url="https://www.suse.com/security/cve/CVE-2016-4472/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Update to 3.4.10 (jsc#SLE-9427, bsc#1159208) from 3.4.6:

Security issues fixed:

- Update expat copy from 2.1.1 to 2.2.0 to fix the following issues:
  CVE-2012-0876, CVE-2016-0718, CVE-2016-4472, CVE-2017-9233, CVE-2016-9063
- CVE-2017-1000158: Fix an integer overflow in thePyString_DecodeEscape function in stringobject.c, resulting in heap-based bufferoverflow (bsc#1068664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-20"/>
	<updated date="2020-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159208">SUSE bug 1159208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159623">SUSE bug 1159623</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0876">CVE-2012-0876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0718">CVE-2016-0718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4472/">CVE-2016-4472 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4472">CVE-2016-4472 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000158">CVE-2017-1000158 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9233">CVE-2017-9233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531736" comment="python3-devel-3.4.10-25.39.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148992" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1154162" ref_url="https://bugzilla.suse.com/1154162" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0050-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200050-1.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Security issue fixed:

- CVE-2019-2974: Fixed Server Optimizer (bsc#1154162).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2974">CVE-2019-2974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531737" comment="libmysqlclient18-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531738" comment="libmysqlclient18-32bit-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531739" comment="mariadb-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531740" comment="mariadb-client-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531741" comment="mariadb-errormessages-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531742" comment="mariadb-tools-10.0.40.2-29.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148993" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to 7.1 Service Refresh 4 Fix Pack 55 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2962 CVE-2019-2964
    CVE-2019-2978 CVE-2019-2983 CVE-2019-2989 CVE-2019-2992
    CVE-2019-2999 CVE-2019-2973 CVE-2019-2981
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531743" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531746" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148994" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1077717" ref_url="https://bugzilla.suse.com/1077717" source="BUGZILLA"/>
		<reference ref_id="1160895" ref_url="https://bugzilla.suse.com/1160895" source="BUGZILLA"/>
		<reference ref_id="1160912" ref_url="https://bugzilla.suse.com/1160912" source="BUGZILLA"/>
		<reference ref_id="1162388" ref_url="https://bugzilla.suse.com/1162388" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18901" ref_url="https://www.suse.com/security/cve/CVE-2019-18901/" source="CVE"/>
		<reference ref_id="CVE-2020-2574" ref_url="https://www.suse.com/security/cve/CVE-2020-2574/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006549.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

MariaDB was updated to version 10.0.40-3 (bsc#1162388).

Security issues fixed:

- CVE-2020-2574: Fixed a difficult to exploit vulnerability that allowed an attacker to crash the client (bsc#1162388).
- CVE-2019-18901: Fixed an unsafe path handling behavior in mysql-systemd-helper (bsc#1160895).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-28"/>
	<updated date="2020-02-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077717">SUSE bug 1077717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160895">SUSE bug 1160895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160912">SUSE bug 1160912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162388">SUSE bug 1162388</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18901/">CVE-2019-18901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18901">CVE-2019-18901 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2574/">CVE-2020-2574 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2574">CVE-2020-2574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557638" comment="libmysqlclient18-10.0.40.3-29.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148995" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-4732" ref_url="https://www.suse.com/security/cve/CVE-2019-4732/" source="CVE"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Java 8.0 was updated to Service Refresh 6 Fix Pack 5 (bsc#1162972, bsc#1160968)

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2019-4732: Untrusted DLL search path vulnerability 
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-4732/">CVE-2019-4732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-4732">CVE-2019-4732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531748" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531750" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148996" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1159646" ref_url="https://bugzilla.suse.com/1159646" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0054-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200054-1.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2019-17571: Fixed a remote code execution by deserialization of untrusted data in SocketServer (bsc#1159646).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159646">SUSE bug 1159646</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17571">CVE-2019-17571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531752" comment="log4j-1.2.15-126.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148997" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1123886" ref_url="https://bugzilla.suse.com/1123886" source="BUGZILLA"/>
		<reference ref_id="1160594" ref_url="https://bugzilla.suse.com/1160594" source="BUGZILLA"/>
		<reference ref_id="1160764" ref_url="https://bugzilla.suse.com/1160764" source="BUGZILLA"/>
		<reference ref_id="1161779" ref_url="https://bugzilla.suse.com/1161779" source="BUGZILLA"/>
		<reference ref_id="1163922" ref_url="https://bugzilla.suse.com/1163922" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8013" ref_url="https://www.suse.com/security/cve/CVE-2020-8013/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006557.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

Security issues fixed:

- CVE-2020-8013: Fixed an issue where chkstat set unintended setuid/capabilities for mrsh and wodim (bsc#1163922).

Non-security issues fixed:

- Fixed a regression where chkstat broke when /proc was not available (bsc#1160764, bsc#1160594).
- Fixed capability handling when doing multiple permission changes at once (bsc#1161779).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-28"/>
	<updated date="2020-02-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123886">SUSE bug 1123886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160594">SUSE bug 1160594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160764">SUSE bug 1160764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161779">SUSE bug 1161779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163922">SUSE bug 1163922</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8013/">CVE-2020-8013 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8013">CVE-2020-8013 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531753" comment="permissions-2015.09.28.1626-17.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148998" version="1" class="patch">
	<metadata>
		<title>Security update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="1122668" ref_url="https://bugzilla.suse.com/1122668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006561.html" source="SUSE-SU"/>
		<description>
This update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer, python-jsonpatch, python-jsonpointer, python-scandir, python-PyYAML fixes the following issues:

python-cfn-lint was included as a new package in 0.21.4.


python-aws-sam-translator was updated to 1.11.0:

  * Add ReservedConcurrentExecutions to globals
  * Fix ElasticsearchHttpPostPolicy resource reference
  * Support using AWS::Region in Ref and Sub
  * Documentation and examples updates
  * Add VersionDescription property to Serverless::Function
  * Update ServerlessRepoReadWriteAccessPolicy
  * Add additional template validation

Upgrade to 1.10.0:

  * Add GSIs to DynamoDBReadPolicy and DynamoDBCrudPolicy
  * Add DynamoDBReconfigurePolicy
  * Add CostExplorerReadOnlyPolicy and OrganizationsListAccountsPolicy
  * Add EKSDescribePolicy
  * Add SESBulkTemplatedCrudPolicy
  * Add FilterLogEventsPolicy
  * Add SSMParameterReadPolicy
  * Add SESEmailTemplateCrudPolicy
  * Add s3:PutObjectAcl to S3CrudPolicy
  * Add allow_credentials CORS option
  * Add support for AccessLogSetting and CanarySetting Serverless::Api properties
  * Add support for X-Ray in Serverless::Api
  * Add support for MinimumCompressionSize in Serverless::Api
  * Add Auth to Serverless::Api globals
  * Remove trailing slashes from APIGW permissions
  * Add SNS FilterPolicy and an example application
  * Add Enabled property to Serverless::Function event sources
  * Add support for PermissionsBoundary in Serverless::Function
  * Fix boto3 client initialization
  * Add PublicAccessBlockConfiguration property to S3 bucket resource
  * Make PAY_PER_REQUEST default mode for Serverless::SimpleTable
  * Add limited support for resolving intrinsics in Serverless::LayerVersion
  * SAM now uses Flake8
  * Add example application for S3 Events written in Go
  * Updated several example applications

- Initial build
  + Version 1.9.0
- Add patch to drop compatible releases operator from setup.py,
  required for SLES12 as the setuptools version is too old
  + ast_drop-compatible-releases-operator.patch


python-jsonschema was updated to 2.6.0:

* Improved performance on CPython by adding caching around ref resolution

Update to version 2.5.0:

* Improved performance on CPython by adding caching around ref
  resolution (#203)

Update to version 2.4.0:

* Added a CLI (#134)
* Added absolute path and absolute schema path to errors (#120)
* Added ``relevance``
* Meta-schemas are now loaded via ``pkgutil``
* Added ``by_relevance`` and ``best_match`` (#91)
* Fixed ``format`` to allow adding formats for non-strings (#125)
* Fixed the ``uri`` format to reject URI references (#131)

- Install /usr/bin/jsonschema with update-alternatives support

python-nose2 was updated to 0.9.1:

* the prof plugin now uses cProfile instead of hotshot for profiling
* skipped tests now include the user's reason in junit XML's message field
* the prettyassert plugin mishandled multi-line function definitions
* Using a plugin's CLI flag when the plugin is already enabled via config
  no longer errors
* nose2.plugins.prettyassert, enabled with --pretty-assert
* Cleanup code for EOLed python versions
* Dropped support for distutils.
* Result reporter respects failure status set by other plugins
* JUnit XML plugin now includes the skip reason in its output

Upgrade to 0.8.0:

List of changes is too long to show here, see
https://github.com/nose-devs/nose2/blob/master/docs/changelog.rst
changes between 0.6.5 and 0.8.0

Update to 0.7.0:

* Added parameterized_class feature, for parameterizing entire test
  classes (many thanks to @TobyLL for their suggestions and help testing!)
* Fix DeprecationWarning on `inspect.getargs` (thanks @brettdh;
  https://github.com/wolever/parameterized/issues/67)
* Make sure that `setUp` and `tearDown` methods work correctly (#40)
* Raise a ValueError when input is empty (thanks @danielbradburn;
  https://github.com/wolever/parameterized/pull/48)
* Fix the order when number of cases exceeds 10 (thanks @ntflc;
  https://github.com/wolever/parameterized/pull/49)

python-scandir was included in version 2.3.2.

python-requests was updated to version 2.20.1 (bsc#1111622)

* Fixed bug with unintended Authorization header stripping for
  redirects using default ports (http/80, https/443).


* remove restriction for urllib3 &lt; 1.24

Update to version 2.20.0:

* Bugfixes
  + Content-Type header parsing is now case-insensitive
    (e.g. charset=utf8 v Charset=utf8).
  + Fixed exception leak where certain redirect urls would raise
    uncaught urllib3 exceptions.
  + Requests removes Authorization header from requests redirected
    from https to http on the same hostname. (CVE-2018-18074)
  + should_bypass_proxies now handles URIs without hostnames
    (e.g. files).
* Dependencies
  + Requests now supports urllib3 v1.24.
* Deprecations
  + Requests has officially stopped support for Python 2.6.

Update to version 2.19.1:

* Fixed issue where status_codes.py’s init function failed trying
  to append to a __doc__ value of None.

Update to version 2.19.0:

* Improvements
  + Warn about possible slowdown with cryptography version &lt; 1.3.4
  + Check host in proxy URL, before forwarding request to adapter.
  + Maintain fragments properly across redirects. (RFC7231 7.1.2)
  + Removed use of cgi module to expedite library load time.
  + Added support for SHA-256 and SHA-512 digest auth algorithms.
  + Minor performance improvement to Request.content.
  + Migrate to using collections.abc for 3.7 compatibility.
* Bugfixes
  + Parsing empty Link headers with parse_header_links() no longer
    return one bogus entry.
  + Fixed issue where loading the default certificate bundle from
    a zip archive would raise an IOError.
  + Fixed issue with unexpected ImportError on windows system
    which do not support winreg module.
  + DNS resolution in proxy bypass no longer includes the username
    and password in the request. This also fixes the issue of DNS
    queries failing on macOS.
  + Properly normalize adapter prefixes for url comparison.
  + Passing None as a file pointer to the files param no longer
    raises an exception.
  + Calling copy on a RequestsCookieJar will now preserve the
    cookie policy correctly.
* We now support idna v2.7 and urllib3 v1.23.

update to version 2.18.4:

* Improvements
  + Error messages for invalid headers now include the header name
    for easier debugging
* Dependencies
  + We now support idna v2.6.

update to version 2.18.3:

* Improvements
  + Running $ python -m requests.help now includes the installed
    version of idna.
* Bugfixes
  + Fixed issue where Requests would raise ConnectionError instead
    of SSLError when encountering SSL problems when using urllib3
    v1.22.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-02"/>
	<updated date="2020-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122668">SUSE bug 1122668</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009524562" comment="python-PyYAML-5.1.2-26.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522744" comment="python-asn1crypto-0.24.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525283" comment="python-botocore-1.12.213-28.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525286" comment="python-jsonpatch-1.1-10.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522745" comment="python-packaging-17.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530078" comment="python3-PyYAML-5.1.2-26.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522747" comment="python3-asn1crypto-0.24.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525297" comment="python3-jsonpointer-1.0-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522748" comment="python3-packaging-17.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148999" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Low)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006573.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

PostgreSQL was updated to version 9.6.17.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-04"/>
	<updated date="2020-03-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1720">CVE-2020-1720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531754" comment="postgresql96-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531755" comment="postgresql96-contrib-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531756" comment="postgresql96-docs-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531757" comment="postgresql96-plperl-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531758" comment="postgresql96-plpython-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531759" comment="postgresql96-pltcl-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531760" comment="postgresql96-server-9.6.17-3.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149000" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Update java-1_7_0-openjdk to version jdk7u251 (January 2020 CPU, bsc#1160968):

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2020-2590: Improve Kerberos interop capabilities
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2601: Better Ticket Granting Services
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support
- CVE-2020-2654: Improve Object Identifier Processing	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-10"/>
	<updated date="2020-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2590">CVE-2020-2590 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2601">CVE-2020-2601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522665" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531761" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531762" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522666" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149001" version="1" class="patch">
	<metadata>
		<title>Security update for ipmitool (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1085469" ref_url="https://bugzilla.suse.com/1085469" source="BUGZILLA"/>
		<reference ref_id="1163026" ref_url="https://bugzilla.suse.com/1163026" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-5208" ref_url="https://www.suse.com/security/cve/CVE-2020-5208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006594.html" source="SUSE-SU"/>
		<description>
This update for ipmitool fixes the following issues:

- CVE-2020-5208: Fixed multiple remote code executtion vulnerabilities (bsc#1163026).	  
- picmg discover messages are now DEBUG and not INFO messages (bsc#1085469).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-10"/>
	<updated date="2020-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085469">SUSE bug 1085469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163026">SUSE bug 1163026</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5208/">CVE-2020-5208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5208">CVE-2020-5208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522667" comment="ipmitool-1.8.18-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149002" version="1" class="patch">
	<metadata>
		<title>Security update for ardana-cinder, ardana-cobbler, ardana-designate, ardana-extensions-example, ardana-extensions-nsx, ardana-glance, ardana-heat, ardana-input-model, ardana-ironic, ardana-keystone, ardana-logging, ardana-monasca, ardana-monasca-transform, ardana-mq, ardana-neutron, ardana-nova, ardana-octavia, ardana-osconfig, ardana-tempest, crowbar-core, crowbar-ha, crowbar-openstack, crowbar-ui, keepalived, mariadb, openstack-cinder, openstack-dashboard, openstack-dashboard-theme-SUSE, openstack-heat, openstack-heat-templates, openstack-horizon-plugin-designate-ui, openstack-horizon-plugin-neutron-lbaas-ui, openstack-ironic, openstack-keystone, openstack-monasca-agent, openstack-neutron, openstack-neutron-gbp, openstack-neutron-vsphere, openstack-nova, openstack-octavia, openstack-octavia-amphora-image, openstack-resource-agents, openstack-sahara, openstack-trove, python-cinderlm, python-congressclient, python-designateclient, python-ironic-lib, python-networking-cisco, python-osc-lib, python-oslo.context, python-oslo.rootwrap, python-oslo.serialization, python-oslo.service, python-stevedore, python-taskflow, rubygem-crowbar-client, rubygem-pumavenv-openstack-swift (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1077717" ref_url="https://bugzilla.suse.com/1077717" source="BUGZILLA"/>
		<reference ref_id="1117080" ref_url="https://bugzilla.suse.com/1117080" source="BUGZILLA"/>
		<reference ref_id="1117840" ref_url="https://bugzilla.suse.com/1117840" source="BUGZILLA"/>
		<reference ref_id="1123191" ref_url="https://bugzilla.suse.com/1123191" source="BUGZILLA"/>
		<reference ref_id="1148158" ref_url="https://bugzilla.suse.com/1148158" source="BUGZILLA"/>
		<reference ref_id="1152007" ref_url="https://bugzilla.suse.com/1152007" source="BUGZILLA"/>
		<reference ref_id="1154235" ref_url="https://bugzilla.suse.com/1154235" source="BUGZILLA"/>
		<reference ref_id="1155089" ref_url="https://bugzilla.suse.com/1155089" source="BUGZILLA"/>
		<reference ref_id="1155942" ref_url="https://bugzilla.suse.com/1155942" source="BUGZILLA"/>
		<reference ref_id="1156305" ref_url="https://bugzilla.suse.com/1156305" source="BUGZILLA"/>
		<reference ref_id="1156669" ref_url="https://bugzilla.suse.com/1156669" source="BUGZILLA"/>
		<reference ref_id="1156914" ref_url="https://bugzilla.suse.com/1156914" source="BUGZILLA"/>
		<reference ref_id="1157028" ref_url="https://bugzilla.suse.com/1157028" source="BUGZILLA"/>
		<reference ref_id="1157206" ref_url="https://bugzilla.suse.com/1157206" source="BUGZILLA"/>
		<reference ref_id="1157482" ref_url="https://bugzilla.suse.com/1157482" source="BUGZILLA"/>
		<reference ref_id="1158675" ref_url="https://bugzilla.suse.com/1158675" source="BUGZILLA"/>
		<reference ref_id="1160048" ref_url="https://bugzilla.suse.com/1160048" source="BUGZILLA"/>
		<reference ref_id="1160878" ref_url="https://bugzilla.suse.com/1160878" source="BUGZILLA"/>
		<reference ref_id="1160883" ref_url="https://bugzilla.suse.com/1160883" source="BUGZILLA"/>
		<reference ref_id="1160895" ref_url="https://bugzilla.suse.com/1160895" source="BUGZILLA"/>
		<reference ref_id="1160912" ref_url="https://bugzilla.suse.com/1160912" source="BUGZILLA"/>
		<reference ref_id="1161351" ref_url="https://bugzilla.suse.com/1161351" source="BUGZILLA"/>
		<reference ref_id="1161517" ref_url="https://bugzilla.suse.com/1161517" source="BUGZILLA"/>
		<reference ref_id="1162388" ref_url="https://bugzilla.suse.com/1162388" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1002201" ref_url="https://www.suse.com/security/cve/CVE-2017-1002201/" source="CVE"/>
		<reference ref_id="CVE-2018-17954" ref_url="https://www.suse.com/security/cve/CVE-2018-17954/" source="CVE"/>
		<reference ref_id="CVE-2019-13117" ref_url="https://www.suse.com/security/cve/CVE-2019-13117/" source="CVE"/>
		<reference ref_id="CVE-2019-16770" ref_url="https://www.suse.com/security/cve/CVE-2019-16770/" source="CVE"/>
		<reference ref_id="CVE-2019-18901" ref_url="https://www.suse.com/security/cve/CVE-2019-18901/" source="CVE"/>
		<reference ref_id="CVE-2019-2737" ref_url="https://www.suse.com/security/cve/CVE-2019-2737/" source="CVE"/>
		<reference ref_id="CVE-2019-2739" ref_url="https://www.suse.com/security/cve/CVE-2019-2739/" source="CVE"/>
		<reference ref_id="CVE-2019-2740" ref_url="https://www.suse.com/security/cve/CVE-2019-2740/" source="CVE"/>
		<reference ref_id="CVE-2019-2758" ref_url="https://www.suse.com/security/cve/CVE-2019-2758/" source="CVE"/>
		<reference ref_id="CVE-2019-2805" ref_url="https://www.suse.com/security/cve/CVE-2019-2805/" source="CVE"/>
		<reference ref_id="CVE-2019-2938" ref_url="https://www.suse.com/security/cve/CVE-2019-2938/" source="CVE"/>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<reference ref_id="CVE-2020-2574" ref_url="https://www.suse.com/security/cve/CVE-2020-2574/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<description>
This update for ardana-cinder, ardana-cobbler, ardana-designate, ardana-extensions-example, ardana-extensions-nsx, ardana-glance, ardana-heat, ardana-input-model, ardana-ironic, ardana-keystone, ardana-logging, ardana-monasca, ardana-monasca-transform, ardana-mq, ardana-neutron, ardana-nova, ardana-octavia, ardana-osconfig, ardana-tempest, crowbar-core, crowbar-ha, crowbar-openstack, crowbar-ui, keepalived, mariadb, openstack-cinder, openstack-dashboard, openstack-dashboard-theme-SUSE, openstack-heat, openstack-heat-templates, openstack-horizon-plugin-designate-ui, openstack-horizon-plugin-neutron-lbaas-ui, openstack-ironic, openstack-keystone, openstack-monasca-agent, openstack-neutron, openstack-neutron-gbp, openstack-neutron-vsphere, openstack-nova, openstack-octavia, openstack-octavia-amphora-image, openstack-resource-agents, openstack-sahara, openstack-trove, python-cinderlm, python-congressclient, python-designateclient, python-ironic-lib, python-networking-cisco, python-osc-lib, python-oslo.context, python-oslo.rootwrap, python-oslo.serialization, python-oslo.service, python-stevedore, python-taskflow, rubygem-crowbar-client, rubygem-puma, venv-openstack-swift fixes the following issues:
Security issues fixed:

The update of rubygem-crowbar-client, rubygem-puma fixes the following security issues:
- CVE-2018-17954: Fixed an issue where crowbar was leaking the secret admin passwords to all nodes (bsc#1117080).
- CVE-2019-16770: Fixed a denial-of-service vulnerability that was exploitable by clients sending extraneous keepalive requests (bsc#1158675).

The update of mariadb to 10.2.29 fixes several security issues:
- CVE-2020-2574: Fixed a difficult to exploit vulnerability that allowed an attacker to crash the client (bsc#1162388).
- CVE-2019-18901: Fixed a difficult to exploit vulnerability that allowed an attacker to crash the client (bsc#1162388).
- CVE-2017-1002201: Fixed an issue where special characters did not escpae properly (bsc#1155089)
- CVE-2019-2737, CVE-2019-2739, CVE-2019-2740, CVE-2019-2758, CVE-2019-2805, CVE-2019-2938, CVE-2019-2974: Fixed an issue where could lead a remote attacker to cause denial of service (bsc#1156669)

Non-security issues fixed:

Changes in ardana-cinder:
- Update to version 8.0+git.1579279939.ee7da88:
  * Add option to flatten snapshots when using SES (SOC-11054)

- Update to version 8.0+git.1571846011.1a2f62b:
  * SCRD-4764 move v2.0 endpoints to v3 (SOC-9753)

Changes in ardana-cobbler:
- Update to version 8.0+git.1575037115.0326803:
  * Set root device on SLES autoyast templates (SOC-7365)

Changes in ardana-designate:
- Update to version 8.0+git.1573597788.15b7984:
  * Update gerrit location (SOC-9140)

Changes in ardana-extensions-example:
- Switch to new Gerrit Server

- Update to version 8.0+git.1534266307.db1ec28:
  * SCPL-409 Fix .gitreview for stable/pike

Changes in ardana-extensions-nsx:
- Update to version 8.0+git.1567529036.a41a037:
  * Update policy json templates for vmware-nsx (SOC-10254)

- Switch to new Gerrit Server

Changes in ardana-glance:
- Update to version 8.0+git.1571846045.ab9e3ea:
  * SCRD-4764 move v2.0 endpoints to v3 (SOC-9753)

Changes in ardana-heat:
- Update to version 8.0+git.1571777596.14dce6a:
  * SCRD-4764 remove V2.0 auth end points (SOC-9753)

Changes in ardana-input-model:
- Update to version 8.0+git.1582147997.b9ed134:
  * Enable port security extension neutron (SOC-11027)

- Update to version 8.0+git.1573658751.38e822a:
  * Move manila share to controller (SOC-10938)

Changes in ardana-ironic:
- Update to version 8.0+git.1571845225.006843d:
  * SCRD-4764 remove V2.0 auth end points (SOC-9753)

Changes in ardana-keystone:
- Update to version 8.0+git.1573147067.09e3ea0:
  * enable debug and insecure_debug on demand (SOC-10934)

Changes in ardana-logging:
- Update to version 8.0+git.1572452293.e65d714:
  * use correct Keystone v3 params bsc#1117840 (SOC-9753)

Changes in ardana-monasca:
- Update to version 8.0+git.1572527728.9b34bdf:
  * use correct Keystone v3 params bsc#1117840 (SOC-9753)
  * SCRD-4764 remove V2.0 auth end points (SOC-9753)

Changes in ardana-monasca-transform:
- Update to version 8.0+git.1571845965.97714fb:
  * SCRD-4764 remove V2.0 auth end points (SOC-9753)

Changes in ardana-mq:
- Update to version 8.0+git.1581024906.fbf0be3:
  * Ensure HA queue sync wait fails (SOC-11083)
  * Fix HA policy setting comments (SOC-10317, SOC-11082)

- Update to version 8.0+git.1580853688.4e72fc1:
  * Set HA policy accordingly (SOC-10317, SOC-11082)

- Update to version 8.0+git.1579014733.a855e3a:
  * Change the HA policy mirror (SOC-10317)

Changes in ardana-neutron:
- Update to version 8.0+git.1573050365.ff6fa06:
  * Kill dhclient before restarting neutron-openvswitch-agent (SOC-9230)

- Update to version 8.0+git.1571846086.19cb7eb:
  * SCRD-4764 move v2.0 endpoints to v3 (SOC-9753)

Changes in ardana-nova:
- Update to version 8.0+git.1571846125.584d988:
  * SCRD-4764 remove V2.0 auth end points (SOC-9753)

Changes in ardana-octavia:
- Update to version 8.0+git.1575642049.1f321d0:
  * Change event_streamer_driver to noop (bsc#1154235)

Changes in ardana-osconfig:
- Update to version 8.0+git.1581015942.2d21e63:
  * Adjust 'fs.inotify.max_user_instances' to align with crowbar (bsc#1161351)

- Update to version 8.0+git.1580469528.0ac2a8b:
  * Start OVS services before wicked service at boot (SOC-11067)

Changes in ardana-tempest:
- Update to version 8.0+git.1579261264.7dd213a:
  * Create network resources needed by some heat tests (SOC-7028)

- Update to version 8.0+git.1573571182.8fa9823:
  * Restrore designate test (SOC-9753)

- Update to version 8.0+git.1571846164.6279bc0:
  * SCRD-4764 remove V2.0 auth end points (SOC-9753)

Changes in crowbar-core:
- Update to version 5.0+git.1582968668.1a55c77c5:
  * Ignore CVE-2020-7595 in CI (bsc#1161517)

- Update to version 5.0+git.1582543433.f71d39544:
  * Fix deployment queue display (SOC-10741)

- Update to version 5.0+git.1580209640.80f2ba3d9:
  * network: start OVS before wickedd (SOC-11067)

- Update to version 5.0+git.1579705862.220974047:
  * dns: add checks to designate migration (SOC-11047)

- Update to version 5.0+git.1579271614.eac1c490c:
  * upgrade: Add the upgrade menu entry (SOC-11053)
  * upgrade: Fix upgrade link (SOC-11053)

- Update to version 5.0+git.1578989446.a2d23b7e1:
  * Do not log an error for a case that is correct (trivial)

- Update to version 5.0+git.1578472131.b88a31055:
  * apache2: Restart after enabling SSL flag (SOC-11029)

- Update to version 5.0+git.1578295229.96952deab:
  * Avoid nil crash when provisioner attributes are not set (bsc#1160048)

- Update to version 5.0+git.1578063264.d0223905b:
  * Ignore CVE-2019-16770 (SOC-10999)

- Update to version 5.0+git.1576053049.a2f4c9820:
  * upgrade: Remove DRBD specific code from the preparation parts (SOC-10985)

- Update to version 5.0+git.1575020613.fc167f4dc:
  * List XEN nodes when failing precheck (trivial)

- Update to version 5.0+git.1574763025.0a6957f37:
  * Disable installation repository (bsc#1152007)
  * Disable automatic repo services (bsc#1152007)
  * Designate: Don't add the admin node to the public network (SOC-10658)

- Update to version 5.0+git.1574715523.ee8e58f4b:
  * upgrade: Check the result after commiting proposal (noref)
  * upgrade: Do not try to disable services that might not exist (noref)

- Update to version 5.0+git.1574667034.76644f658:
  * [upgrade] Remove existing upgrade directories from nodes (SOC-10956)

- Update to version 5.0+git.1574348992.88de970a6:
  * [upgrade] Wait for keystone to be ready after start (bsc#1157206)

- Update to version 5.0+git.1574270784.294f0e830:
  * upgrade: Ignore Cloud repository during repocheck (bsc#1152007)

- Update to version 5.0+git.1574165163.52870c62e:
  * [upgrade] Call finalize_nodes_upgrade at the very end (bsc#1155942)

- Update to version 5.0+git.1574103089.1fbb5a51d:
  * Ignore CVE-2019-13117 in CI builds (bsc#1157028)
  * upgrade: Make the time before next upgrade configurable (SOC-10955)
  * upgrade: Make sure cinder-volume is really stopped (bsc#1156305)

- Update to version 5.0+git.1573110008.449237f0d:
  * Allow pacemaker remotes for upgrade (SOC-10133)
  * upgrade: Precheck for unsaved proposals (SOC-10912)

- Update to version 5.0+git.1572880575.4a6efa3a1:
  * upgrade: Add a precheck for XEN compute nodes presence (SOC-10495)
  * upgrade: Reload repo config in repochecks (SOC-10718)

- Update to version 5.0+git.1572097431.519baa552:
  * Ignore CVE-2017-1002201 in CI builds (bsc#1155089)

- Update to version 5.0+git.1571210032.8648ab99c:
  * Revert 'Use block-migration when needed' (SOC-10133)

Changes in crowbar-ha:
- Update to version 5.0+git.1574286229.e0364c3:
  * Drop g-haproxy location before group deletion (bsc#1156914)

Changes in crowbar-openstack:
- Update to version 5.0+git.1582911795.5081ef1da:
  * designate: Mark as user managed (SOC-10233)
  * Designate: make sure dns-server is active on a non-admin node (SOC-10636)

- Update to version 5.0+git.1580549331.ba1e1a0a3:
  * [5.0] ec2-api: run keystone_register on cluster founder only (SOC-11079)

- Update to version 5.0+git.1579182968.f54cfa8f5:
  * tempest: tempest run filters as templates (SOC-11052)

- Update to version 5.0+git.1578515319.fdab3a0b2:
  * Install openstack client for neutron recipes (SOC-11039)

- Update to version 5.0+git.1576764142.8efe58655:
  * Do not read data from barclamp that has not been saved (SOC-11028)

- Update to version 5.0+git.1576666547.b7a0b8814:
  * Revert 'Octavia: Hide UI until complete (SOC-10550)'

- Update to version 5.0+git.1576250115.67b80cbca:
  * [5.0] tempest: Update default image on schema (SOC-11023)

- Update to version 5.0+git.1576078873.ecc798ffe:
  * neutron: Revert remove .openrc creation from neutron cookbooks (SOC-10378)
  * keystone: Add OS_INTERFACE env var to .openrc (SOC-11006)

- Update to version 5.0+git.1574927541.694ac3863:
  * designate: move keystone resource lookup to convergence (SOC-10887)

- Update to version 5.0+git.1574769056.07a7c373e:
  * designate: declare all mdns servers as master on pool config (SOC-10952)
  * designate: add support for SSL (SOC-10877)
  * designate: change default configuration (SOC-10899)

- Update to version 5.0+git.1574421761.ace345683:
  * Add tempest filter for designate (SOC-10288)

- Update to version 5.0+git.1574359417.113b616b2:
  * horizon: install lbaas horizon dashboard (SOC-10883)

- Update to version 5.0+git.1572937880.ffb86e88b:
  * Make sure the input file with ssh key exists (SOC-10133)

- Update to version 5.0+git.1571764038.ad48726d6:
  * mysql: fix WSREP sync race (SOC-10717)
  * mysql: stop service for mysql_install_db (SOC-10717)
  * Do not use obsoleted --endpoint-type option with CLI

- Update to version 5.0+git.1571323259.7402ef5eb:
  * [5.0] Tempest: blacklist test_volume_boot_pattern (SOC-10874)

- Update to version 5.0+git.1571241534.f4af21325:
  * rabbitmq: fix migration 200 (SOC-10623)
  * Fix Cloud 8 no-op migrations (SOC-10623)
  * neutron-lbaas: remove loadbalancer/pool limit
  * [5.0] Configurable timeout for Galera pre-sync

- Update to version 5.0+git.1571138324.edb9e8b56:
  * horizon: tighten check for existence of monasca while deploying grafana
  * monasca: improve detection if monasca-server is available
  * monasca: install agent before run setup monitors in server
  * Monasca: Handle node reinstall (jsc#SOC-10440, bsc#1148158 )

- Update to version 5.0+git.1570618886.06022a6ef:
  * glance: Set barbican auth endpoint (bsc#1123191, SOC-10844)
  * tempest: Add barbican run_filters from ardana (SOC-10844)
  * Fix nova tempest tests (SOC-9298, SOC-10844)

- Update to version 5.0+git.1570505588.4bdc5aa6f:
  * No rndc key if no public DNS server (SOC-10835)

Changes in crowbar-ui:
- Update to version 1.2.0+git.1575896697.a01a3a08:
  * upgrade: Added missing error title
  * travis: Stop testing against nodejs4

- Update to version 1.2.0+git.1572871359.50fc6087:
  * Add title for XEN compute nodes precheck (SOC-10495)

Changes in keepalived:
- update to 2.0.19
- new BR pkgconfig(libnftnl) to fix nftables support
- add nftables to the BR
- added patch
  * linux-4.15.patch
- add buildrequires for file-devel
  - used in the checker to verify scripts
- enable json stats and config dump support
  new BR: pkgconfig(json-c)
- enable http regexp support: new BR pcre2-devel
- disable dbus instance creation support as it is marked as
  dangerous
- Add BFD build option to keepalived.spec rpm file
  Issue #1114 identified that the keepalived.spec file was not being
  generated to build BFD support even if keepalived had been
  configured to support it.
- full changelog
  https://keepalived.org/changelog.html

Changes in mariadb:
- update to 10.2.31 GA [bsc#1162388]
  * Fixes for the following security vulnerabilities:
    * 10.2.31: CVE-2020-2574
    * 10.2.30: none
  * release notes and changelog:
    https://mariadb.com/kb/en/library/mariadb-10231-release-notes
    https://mariadb.com/kb/en/library/mariadb-10231-changelog
    https://mariadb.com/kb/en/library/mariadb-10230-release-notes
    https://mariadb.com/kb/en/library/mariadb-10230-changelog
- refresh mariadb-10.1.12-deharcode-libdir.patch
- remove mariadb-10.2.29-bufferoverflowstrncat.patch (upstreamed)
- pack pam_user_map.so module in the /%{_lib}/security directory
  and user_map.conf configuration file in the /etc/security directory

- fix race condition with mysql_upgrade_info status file by moving
  it to the location owned by root (/var/lib/misc) CVE-2019-18901
  [bsc#1160895]
- move .run-mysql_upgrade file from $datadir/.run-mysql_upgrade
  to /var/lib/misc/.mariadb_run_upgrade so the mysql user can't
  use it for a symlink attack [bsc#1160912]

- on BTRFS systems /var/lib/mysql is created as a subvolume with 
  755 permissions during the system installaion. Fix it to 700 as 
  mysql_install_db doesn't do it [bsc#1077717]
- add important options to mariadb.service and mariadb@.service
  (ProtectSystem, ProtectHome and UMask) [bsc#1160878]
- mysql-systemd-helper: use systemd-tmpfiles instead of shell 
  script operations for a cleaner and safer creating of /run/mysql
  [bsc#1160883]

- update to 10.2.29 GA
  * Fixes for the following security vulnerabilities:
    * 10.2.29: none
    * 10.2.28: CVE-2019-2974, CVE-2019-2938
    * 10.2.27: none
    * 10.2.26: CVE-2019-2805, CVE-2019-2740, CVE-2019-2739,
               CVE-2019-2737, CVE-2019-2758
  * release notes and changelog:
    https://mariadb.com/kb/en/library/mariadb-10229-release-notes
    https://mariadb.com/kb/en/library/mariadb-10229-changelog
    https://mariadb.com/kb/en/library/mariadb-10228-release-notes
    https://mariadb.com/kb/en/library/mariadb-10228-changelog
    https://mariadb.com/kb/en/library/mariadb-10227-release-notes
    https://mariadb.com/kb/en/library/mariadb-10227-changelog
    https://mariadb.com/kb/en/library/mariadb-10226-release-notes
    https://mariadb.com/kb/en/library/mariadb-10226-changelog
- refresh
  mariadb-10.0.15-logrotate-su.patch
  mariadb-10.2.4-logrotate.patch
- add mariadb-10.2.29-bufferoverflowstrncat.patch to fix 'Statement
  might be overflowing a buffer in strncat' error
- tracker bug [bsc#1156669]
- add main.gis_notembedded to the skipped tests (fails when latin1
  is not set)

Changes in openstack-cinder:
- Update to version cinder-11.2.3.dev23:
  * Fix handling of 'cinder\_encryption\_key\_id' image metadata

- Update to version cinder-11.2.3.dev21:
  * Add retry to LVM deactivation

- Update to version cinder-11.2.3.dev19:
  * Fix ceph: only close rbd image after snapshot iteration is finished

- Update to version cinder-11.2.3.dev17:
  * Exclude disabled API versions from listing

Changes in openstack-cinder:
- Update to version cinder-11.2.3.dev23:
  * Fix handling of 'cinder\_encryption\_key\_id' image metadata

- Update to version cinder-11.2.3.dev21:
  * Add retry to LVM deactivation

- Update to version cinder-11.2.3.dev19:
  * Fix ceph: only close rbd image after snapshot iteration is finished

- Update to version cinder-11.2.3.dev17:
  * Exclude disabled API versions from listing

Changes in openstack-dashboard:
- Update to version horizon-12.0.5.dev2:
  * Use python 2.7 as the default interpreter in tox
  * OpenDev Migration Patch
  12.0.4

Changes in openstack-dashboard-theme-SUSE:
- Update to version 2017.2+git.1573629528.6b21fa5:
  * SCRD-7984 fixed help links

Changes in openstack-heat:
- Update to version heat-9.0.8.dev22:
  * Do deepcopy when copying templates

- Update to version heat-9.0.8.dev21:
  * Set stack.thread\_group\_mgr for cancel\_update
  * Eliminate client race condition in convergence delete
  * Delete snapshots using contemporary resources

- Update to version heat-9.0.8.dev15:
  * Unskip StackSnapshotRestoreTest

- Update to version heat-9.0.8.dev14:
  * Fix translate tenants in flavor

Changes in openstack-heat:
- Update to version heat-9.0.8.dev22:
  * Do deepcopy when copying templates

- Update to version heat-9.0.8.dev21:
  * Set stack.thread\_group\_mgr for cancel\_update
  * Eliminate client race condition in convergence delete
  * Delete snapshots using contemporary resources

- Update to version heat-9.0.8.dev15:
  * Unskip StackSnapshotRestoreTest

- Update to version heat-9.0.8.dev14:
  * Fix translate tenants in flavor

Changes in openstack-heat-templates:
- Update to version 0.0.0+git.1560033670.e3b5a52:
  * Add example for running Zun container
  * OpenDev Migration Patch
  * Replace openstack.org git:// URLs with https://
  * Remove docs, deprecated hooks, tests
  * Update the bugs link to storyboard
  * Use octavia resources for autoscaling example
  * Fix the incorrect cirros default password

Changes in openstack-horizon-plugin-designate-ui:
- Update to version designate-dashboard-5.0.3.dev2:
  * Fix list zones updated at same time
  * OpenDev Migration Patch
  5.0.2

Changes in openstack-horizon-plugin-neutron-lbaas-ui:
- Add _1481_project_ng_loadbalancersv2_panel.pyc file to package (SOC-10883)
The .pyc file needs to be removed when the package is uninstalled,
otherwise the panel will remain enabled in the dashboard and cause
errors.

Changes in openstack-ironic:
- Update to version ironic-9.1.8.dev8:
  * Place upper bound on python-dracclient version

Changes in openstack-ironic:
- Update to version ironic-9.1.8.dev8:
  * Place upper bound on python-dracclient version

Changes in openstack-keystone:
- Update to version keystone-12.0.4.dev5:
  * Import LDAP job into project

Changes in openstack-keystone:
- Update to version keystone-12.0.4.dev5:
  * Import LDAP job into project

Changes in openstack-monasca-agent:
- Added dependency:
  * fdupes
  * pwdutils and shadow-utils for useradd/groupadd

- added 0001-add-X.509-certificate-check-plugin.patch

Changes in openstack-neutron:
- Update to version neutron-11.0.9.dev60:
  * Set DB retry for quota\_enforcement pecan\_wsgi hook

- Update to version neutron-11.0.9.dev58:
  * don't clear skb mark when ovs is hw-offload enabled

- Update to version neutron-11.0.9.dev57:
  * doc: add known limitation about attaching SR-IOV ports

- Update to version neutron-11.0.9.dev56:
  * raise priority of dead vlan drop

- Update to version neutron-11.0.9.dev54:
  * [Unit tests] Skip TestWSGIServer with IPv6 if no IPv6 enabled

- Update to version neutron-11.0.9.dev52:
  * Initialize phys bridges before setup\_rpc

Changes in openstack-neutron:
- Update neutron-ha-tool to latest version:
  * Add DHCP agent evacuation (SOC-11046)

- Update to version neutron-11.0.9.dev60:
  * Set DB retry for quota\_enforcement pecan\_wsgi hook

- Update to version neutron-11.0.9.dev58:
  * don't clear skb mark when ovs is hw-offload enabled

- neutron: Remove stop action from ovs-cleanup (bsc#1157482)
  backport of https://review.opendev.org/#/c/695867/

- Update to version neutron-11.0.9.dev57:
  * doc: add known limitation about attaching SR-IOV ports

- Update to version neutron-11.0.9.dev56:
  * raise priority of dead vlan drop

- Update to version neutron-11.0.9.dev54:
  * [Unit tests] Skip TestWSGIServer with IPv6 if no IPv6 enabled

- Update to version neutron-11.0.9.dev52:
  * Initialize phys bridges before setup\_rpc

Changes in openstack-neutron-gbp:
- Update to version group-based-policy-7.3.1.dev72:
  * Refactor static path code

- Update to version group-based-policy-7.3.1.dev71:
  * Support named ip protocols for SecurityGroupRules

- Update to version group-based-policy-7.3.1.dev70:
  * Allow both FIP and SNAT on a single port

- Update to version group-based-policy-7.3.1.dev69:
  * Fix active-active AAP RPC query

- Update to version group-based-policy-7.3.1.dev67:
  * [AIM] Add extra provided/consumed contracts to network extension

- Update to version group-based-policy-7.3.1.dev66:
  * Active active AAP feature

- Update to version group-based-policy-7.3.1.dev64:
  * Support cache option for legacy GBP driver

- Update to version group-based-policy-7.3.1.dev63:
  * Fix host ID length in VM names table

- Update to version group-based-policy-7.3.1.dev62:
  * Update\_proj\_descr in apic when project description is updated in os

- Update to version group-based-policy-7.3.1.dev61:
  * Send port notifications when host\_route is getting updated
  * Provide a control knob to use the internal EP interface

- Update to version group-based-policy-7.3.1.dev57:
  * Fix pep8 failures seen on submitted patches

Changes in openstack-neutron-vsphere:
- Update to version networking-vsphere-2.0.1.dev133:
  * Update to use Agent model from neutron.db.models
  * Fix neutron-dvs-agent startup errors
  * OpenDev Migration Patch
- Remove 0001-fix-dvs-agent-config.patch as changes
  had been backported to stable/pike
   - See https://review.opendev.org/#/c/682482

Changes in openstack-nova:
- Update to version nova-16.1.9.dev49:
  * Use stable constraint for Tempest pinned stable branches

- Update to version nova-16.1.9.dev48:
  * Avoid redundant initialize\_connection on source post live migration
  * Error out interrupted builds
  * Skip checking of target\_dev for vhostuser
  * Functional reproduce for bug 1833581
  * Prevent init\_host test to interfere with other tests
  * Add functional test for resize crash compute restart revert
  * Move restart\_compute\_service to a common place
  * lxc: make use of filter python3 compatible
  * cleanup evacuated instances not on hypervisor
  * Delete resource providers for all nodes when deleting compute service

- Update to version nova-16.1.9.dev30:
  * Explicitly fail if trying to attach SR-IOV port
  * Stabilize unshelve notification sample tests

- Update to version nova-16.1.9.dev26:
  * Fix listing deleted servers with a marker
  * Add functional regression test for bug 1849409

- Update to version nova-16.1.9.dev22:
  * Hook resource\_tracker to remove stale node information

- Update to version nova-16.1.9.dev20:
  * Workaround missing RequestSpec.instance\_group.uuid
  * Add regression recreate test for bug 1830747

- Update to version nova-16.1.9.dev16:
  * Changing scheduler sync event from INFO to DEBUG

- Update to version nova-16.1.9.dev14:
  * Only nil az during shelve offload
  * Delete instance\_id\_mappings record in instance\_destroy

- Update to version nova-16.1.9.dev11:
  * Revert 'openstack server create' to 'nova boot' in nova docs
  * doc: fix and clarify --block-device usage in user docs

- Update to version nova-16.1.9.dev8:
  * Functional reproduce for bug 1852207

Changes in openstack-nova:
- Update to version nova-16.1.9.dev49:
  * Use stable constraint for Tempest pinned stable branches

- Update to version nova-16.1.9.dev48:
  * Avoid redundant initialize\_connection on source post live migration
  * Error out interrupted builds
  * Skip checking of target\_dev for vhostuser
  * Functional reproduce for bug 1833581
  * Prevent init\_host test to interfere with other tests
  * Add functional test for resize crash compute restart revert
  * Move restart\_compute\_service to a common place
  * lxc: make use of filter python3 compatible
  * cleanup evacuated instances not on hypervisor
  * Delete resource providers for all nodes when deleting compute service

- Update to version nova-16.1.9.dev30:
  * Explicitly fail if trying to attach SR-IOV port
  * Stabilize unshelve notification sample tests

- Update to version nova-16.1.9.dev26:
  * Fix listing deleted servers with a marker
  * Add functional regression test for bug 1849409

- Update to version nova-16.1.9.dev22:
  * Hook resource\_tracker to remove stale node information

- Update to version nova-16.1.9.dev20:
  * Workaround missing RequestSpec.instance\_group.uuid
  * Add regression recreate test for bug 1830747

- Update to version nova-16.1.9.dev16:
  * Changing scheduler sync event from INFO to DEBUG

- Update to version nova-16.1.9.dev14:
  * Only nil az during shelve offload
  * Delete instance\_id\_mappings record in instance\_destroy

- Update to version nova-16.1.9.dev11:
  * Revert 'openstack server create' to 'nova boot' in nova docs
  * doc: fix and clarify --block-device usage in user docs

- Update to version nova-16.1.9.dev8:
  * Functional reproduce for bug 1852207

Changes in openstack-octavia:
- Update to version octavia-1.0.6.dev3:
  * Fix urgent amphora two-way auth security bug

Changes in openstack-octavia-amphora-image:
- Update image to 0.1.2 to include udated keepalived 2.0.19

- Update image to 0.1.1 to include latest changes

- Add keepalived service
Changes in openstack-resource-agents:
- Update to version 1.0+git.1569436425.8b9c49f:
  * Add a configurable delay to Nova Evacuate calls
  * OpenDev Migration Patch
  * NovaEvacuate: fix a syntax error
  * NovaEvacuate: Support the new split-out IHA fence agents with backwards compatibility
  * NovaEvacuate: Correctly handle stopped hypervisors
  * neutron-ha-tool: do not replicate dhcp
  * NovaCompute: Support parsing host option from /etc/nova/nova.conf.d
  * NovaCompute: Use variable to avoid calling crudini a second time
  * NovaEvacuate: Allow debug logging to be turned on easily

Changes in openstack-sahara:
- Update to version sahara-7.0.5.dev4:
  * Run sahara-scenario using Python 3
  * Enforce python 2 for documentation build
  * Fix requirements(bandit)
  * OpenDev Migration Patch
  7.0.4

Changes in openstack-sahara:
- Update to version sahara-7.0.5.dev4:
  * Run sahara-scenario using Python 3
  * Enforce python 2 for documentation build
  * Fix requirements (bandit)
  * OpenDev Migration Patch
  7.0.4

Changes in openstack-trove:
- Update to version trove-8.0.2.dev2:
  * Add local bindep.txt
  * OpenDev Migration Patch
  8.0.1

Changes in openstack-trove:
- Update to version trove-8.0.2.dev2:
  * Add local bindep.txt
  * OpenDev Migration Patch
  8.0.1

Changes in python-cinderlm:
- Update to version 0.0.2+git.1571845893.27f0b7b:
  * SCRD-4764 remove V2.0 auth end points (SOC-9753)

Changes in python-congressclient:
- update to version 1.8.1
  - Update .gitreview for stable/pike
  - Update UPPER_CONSTRAINTS_FILE for stable/pike
  - import zuul job settings from project-config
  - Updated from global requirements

Changes in python-designateclient:
- update to version 2.7.1
  - Update .gitreview for stable/pike
  - Updated from global requirements
  - import zuul job settings from project-config
  - Update UPPER_CONSTRAINTS_FILE for stable/pike
  - server-get/update show wrong values about 'id' and 'update_at'

Changes in python-ironic-lib:
- update to version 2.10.2
  - Replace openstack.org git:// URLs with https://
  - Make search for config drive partition case insensitive
  - Revert 'Use dd conv=sparse when writing images to nodes'
  - Check GPT table with sgdisk insread of partprobe
  - Avoid tox_install.sh for constraints support
  - Fix GPT bug with whole disk images
  - import zuul job settings from project-config

Changes in python-networking-cisco:
- Update to version networking-cisco-6.1.1.dev65:
  * Nexus: Add CA Bundle path to https doc
  * Improve Nexus Ironic related doc and logs
  * Upgrade release notes to include Tripleo/puppet
  * Fix socket not closed errors in unit test logs
  * Add release note about adding support for Rocky OpenStack
  * Update publish-openstack-python-branch-tarball job
  * Remove MultiConfigParser from SAF application
  * More fixes for networking\_cisco rocky support
  * Remove MultiConfigParser from the device manger config loader
  * Ensure CFG agent is started after neutron config is written
  * Removed older version of python added 3.5
  * Begin process of supporting neutron Rocky
  * Typo in tar command in doc install guide
  * Add cisco providernet extension to Nexus doc
  * Add missing policy to fix stable/queens unit tests
  * Pin stestr version (1.1.0) for Mitaka
  * Fix places in ucsm network driver using .ucsm instead of .ucsms
  * Fix doc build under python3
  * Fix mitaka bug with NeutronWorker missing parameter
  * Eliminate 30 sec delay for Nexus replay thread
  * Fix foreign key constraint violation while creating primary key with subnet\_id
  * Put upper constraint on ncclient version to prevent breakages
  * Improvements to the networking-cisco zuul jobs
  * Remove deprecated host/interface map config
  * Include device manager configuration file when starting config agent
  * Fix pep8 and other tox environments locally
  * Add rocky to CI
  * Add bandit to tox and resolve Nexus SA errors
  * Deprecate old ML2 Nexus/UCSM documentation file
  * Secure Nexus https certificates by default
- Add tempest_plugin subpackage

Changes in python-osc-lib:
- update to version 1.7.1
  - import zuul job settings from project-config
  - Update UPPER_CONSTRAINTS_FILE for stable/pike
  - Updated from global requirements
  - Update .gitreview for stable/pike
  - Avoid tox_install.sh for constraints support

Changes iython-oslo.context:
- update to version 2.17.2
  - Fix sphinx-docs job for stable branch
  - import zuul job settings from project-config

Changes in python-oslo.rootwrap:
- update to version 5.9.3
  - Avoid tox_install.sh for constraints support
  - Follow the new PTI for document build
  - import zuul job settings from project-config

Changes in python-oslo.serialization:
- update to version 2.20.3
  - import zuul job settings from project-config
  - Fix sphinx-docs job for stable branch

Changes in python-oslo.service:
- update to version 1.25.2
  - import zuul job settings from project-config
  - Fix sphinx-docs job for stable branch

Changes in python-stevedore:
- update to version 1.25.2
  - move doc requirements to doc/requirements.txt
  - Use stable branch for upper-constraints
  - remove duplicate sphinx dependency
  - Avoid tox_install.sh for constraints support
  - import zuul job settings from project-config

Changes in python-taskflow:
- update to version 2.14.2
  - don't let tox_install.sh error if there is nothing to do
  - import zuul job settings from project-config
  - Updated from global requirements
  - Use doc/requirements.txt

Changes in rubygem-crowbar-client:
- Update to 3.9.1
  - Fix repocheck table output (SOC-10718)
  - Enable restricted commands for Cloud8 (bsc#1117080, CVE-2018-17954)

Changes in rubygem-puma:
- Add CVE-2019-16770.patch (bsc#1158675, SOC-10999, CVE-2019-16770)
  This patch fixes a DoS vulnerability a malicious client could use to
  block a large amount of threads.

Changes in venv-openstack-swift:
- Fix lower version numver after inheriting the version from main
  component (SCRD-8523)

- Revert: 'Inherit version number of venv from main component
  (SCRD-8523)' as zypper reports the new version number as older
  than what is released

- Inherit version number of venv from main component (SCRD-8523)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-11"/>
	<updated date="2020-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077717">SUSE bug 1077717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117080">SUSE bug 1117080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117840">SUSE bug 1117840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123191">SUSE bug 1123191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148158">SUSE bug 1148158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152007">SUSE bug 1152007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154235">SUSE bug 1154235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155089">SUSE bug 1155089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155942">SUSE bug 1155942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156305">SUSE bug 1156305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156914">SUSE bug 1156914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157028">SUSE bug 1157028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157206">SUSE bug 1157206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157482">SUSE bug 1157482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158675">SUSE bug 1158675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160048">SUSE bug 1160048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160878">SUSE bug 1160878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160883">SUSE bug 1160883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160895">SUSE bug 1160895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160912">SUSE bug 1160912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161351">SUSE bug 1161351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161517">SUSE bug 1161517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162388">SUSE bug 1162388</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1002201/">CVE-2017-1002201 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1002201">CVE-2017-1002201 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17954/">CVE-2018-17954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17954">CVE-2018-17954 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13117/">CVE-2019-13117 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13117">CVE-2019-13117 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16770/">CVE-2019-16770 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16770">CVE-2019-16770 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18901/">CVE-2019-18901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18901">CVE-2019-18901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2737/">CVE-2019-2737 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2737">CVE-2019-2737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2739/">CVE-2019-2739 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2739">CVE-2019-2739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2740/">CVE-2019-2740 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2740">CVE-2019-2740 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-2758/">CVE-2019-2758 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2758">CVE-2019-2758 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2805/">CVE-2019-2805 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2805">CVE-2019-2805 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2938/">CVE-2019-2938 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2938">CVE-2019-2938 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2974">CVE-2019-2974 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2574/">CVE-2020-2574 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2574">CVE-2020-2574 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597694" comment="crowbar-core-5.0+git.1582968668.1a55c77c5-3.35.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597695" comment="crowbar-core-branding-upstream-5.0+git.1582968668.1a55c77c5-3.35.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597696" comment="crowbar-ha-5.0+git.1574286229.e0364c3-3.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597697" comment="crowbar-openstack-5.0+git.1582911795.5081ef1da-4.34.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597698" comment="crowbar-ui-1.2.0+git.1575896697.a01a3a08-3.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597434" comment="keepalived-2.0.19-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597435" comment="mariadb-10.2.31-4.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597436" comment="mariadb-client-10.2.31-4.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597437" comment="mariadb-errormessages-10.2.31-4.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597438" comment="mariadb-galera-10.2.31-4.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597439" comment="mariadb-tools-10.2.31-4.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597440" comment="openstack-cinder-11.2.3~dev23-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597441" comment="openstack-cinder-api-11.2.3~dev23-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597442" comment="openstack-cinder-backup-11.2.3~dev23-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597443" comment="openstack-cinder-doc-11.2.3~dev23-3.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597444" comment="openstack-cinder-scheduler-11.2.3~dev23-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597445" comment="openstack-cinder-volume-11.2.3~dev23-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597446" comment="openstack-dashboard-12.0.5~dev2-3.23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597447" comment="openstack-dashboard-theme-SUSE-2017.2+git.1573629528.6b21fa5-7.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597448" comment="openstack-heat-9.0.8~dev22-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597449" comment="openstack-heat-api-9.0.8~dev22-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597450" comment="openstack-heat-api-cfn-9.0.8~dev22-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597451" comment="openstack-heat-api-cloudwatch-9.0.8~dev22-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597452" comment="openstack-heat-doc-9.0.8~dev22-3.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597453" comment="openstack-heat-engine-9.0.8~dev22-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597454" comment="openstack-heat-plugin-heat_docker-9.0.8~dev22-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597455" comment="openstack-heat-templates-0.0.0+git.1560033670.e3b5a52-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597456" comment="openstack-heat-test-9.0.8~dev22-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597457" comment="openstack-horizon-plugin-designate-ui-5.0.3~dev2-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597458" comment="openstack-horizon-plugin-neutron-lbaas-ui-3.0.3~dev5-3.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597459" comment="openstack-ironic-9.1.8~dev8-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597460" comment="openstack-ironic-api-9.1.8~dev8-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597461" comment="openstack-ironic-conductor-9.1.8~dev8-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597462" comment="openstack-ironic-doc-9.1.8~dev8-3.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597463" comment="openstack-keystone-12.0.4~dev5-5.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597464" comment="openstack-keystone-doc-12.0.4~dev5-5.30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597465" comment="openstack-monasca-agent-2.2.5~dev5-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597466" comment="openstack-neutron-11.0.9~dev60-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597467" comment="openstack-neutron-dhcp-agent-11.0.9~dev60-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597468" comment="openstack-neutron-doc-11.0.9~dev60-3.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597469" comment="openstack-neutron-gbp-7.3.1~dev72-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597470" comment="openstack-neutron-ha-tool-11.0.9~dev60-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597471" comment="openstack-neutron-l3-agent-11.0.9~dev60-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597472" comment="openstack-neutron-linuxbridge-agent-11.0.9~dev60-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597473" comment="openstack-neutron-macvtap-agent-11.0.9~dev60-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597474" comment="openstack-neutron-metadata-agent-11.0.9~dev60-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597475" comment="openstack-neutron-metering-agent-11.0.9~dev60-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597476" comment="openstack-neutron-openvswitch-agent-11.0.9~dev60-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597477" comment="openstack-neutron-server-11.0.9~dev60-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597478" comment="openstack-neutron-vsphere-2.0.1~dev133-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597479" comment="openstack-neutron-vsphere-doc-2.0.1~dev133-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597480" comment="openstack-neutron-vsphere-dvs-agent-2.0.1~dev133-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597481" comment="openstack-neutron-vsphere-ovsvapp-agent-2.0.1~dev133-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597482" comment="openstack-nova-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597483" comment="openstack-nova-api-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597484" comment="openstack-nova-cells-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597485" comment="openstack-nova-compute-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597486" comment="openstack-nova-conductor-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597487" comment="openstack-nova-console-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597488" comment="openstack-nova-consoleauth-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597489" comment="openstack-nova-doc-16.1.9~dev49-3.32.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597490" comment="openstack-nova-novncproxy-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597491" comment="openstack-nova-placement-api-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597492" comment="openstack-nova-scheduler-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597493" comment="openstack-nova-serialproxy-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597494" comment="openstack-nova-vncproxy-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597495" comment="openstack-octavia-1.0.6~dev3-4.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597496" comment="openstack-octavia-amphora-agent-1.0.6~dev3-4.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597497" comment="openstack-octavia-amphora-image-x86_64-0.1.2-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597498" comment="openstack-octavia-api-1.0.6~dev3-4.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597499" comment="openstack-octavia-health-manager-1.0.6~dev3-4.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597500" comment="openstack-octavia-housekeeping-1.0.6~dev3-4.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597501" comment="openstack-octavia-worker-1.0.6~dev3-4.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597502" comment="openstack-resource-agents-1.0+git.1569436425.8b9c49f-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597503" comment="openstack-sahara-7.0.5~dev4-3.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597504" comment="openstack-sahara-api-7.0.5~dev4-3.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597505" comment="openstack-sahara-doc-7.0.5~dev4-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597506" comment="openstack-sahara-engine-7.0.5~dev4-3.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597507" comment="openstack-trove-8.0.2~dev2-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597508" comment="openstack-trove-api-8.0.2~dev2-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597509" comment="openstack-trove-conductor-8.0.2~dev2-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597510" comment="openstack-trove-doc-8.0.2~dev2-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597511" comment="openstack-trove-guestagent-8.0.2~dev2-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597512" comment="openstack-trove-taskmanager-8.0.2~dev2-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597513" comment="python-cinder-11.2.3~dev23-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597515" comment="python-congressclient-1.8.1-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597516" comment="python-designateclient-2.7.1-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597517" comment="python-designateclient-doc-2.7.1-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597518" comment="python-freezegun-0.3.9-1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597519" comment="python-heat-9.0.8~dev22-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597520" comment="python-horizon-12.0.5~dev2-3.23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597521" comment="python-horizon-plugin-designate-ui-5.0.3~dev2-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597522" comment="python-horizon-plugin-neutron-lbaas-ui-3.0.3~dev5-3.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597523" comment="python-ironic-9.1.8~dev8-3.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597524" comment="python-ironic-lib-2.10.2-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597525" comment="python-keystone-12.0.4~dev5-5.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597526" comment="python-monasca-agent-2.2.5~dev5-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597527" comment="python-networking-cisco-6.1.1~dev65-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597528" comment="python-networking-vsphere-2.0.1~dev133-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597529" comment="python-neutron-11.0.9~dev60-3.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597530" comment="python-neutron-gbp-7.3.1~dev72-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597531" comment="python-nova-16.1.9~dev49-3.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597532" comment="python-octavia-1.0.6~dev3-4.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597533" comment="python-osc-lib-1.7.1-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597534" comment="python-oslo.context-2.17.2-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597535" comment="python-oslo.rootwrap-5.9.3-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597536" comment="python-oslo.serialization-2.20.3-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597537" comment="python-oslo.service-1.25.2-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597538" comment="python-sahara-7.0.5~dev4-3.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597539" comment="python-stevedore-1.25.2-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597540" comment="python-taskflow-2.14.2-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597541" comment="python-trove-8.0.2~dev2-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597699" comment="ruby2.1-rubygem-crowbar-client-3.9.1-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597700" comment="ruby2.1-rubygem-puma-2.16.0-3.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149003" version="1" class="patch">
	<metadata>
		<title>Security update for openstack-manila (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1165643" ref_url="https://bugzilla.suse.com/1165643" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-9543" ref_url="https://www.suse.com/security/cve/CVE-2020-9543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006602.html" source="SUSE-SU"/>
		<description>
This update for openstack-manila fixes the following issues:

- CVE-2020-9543: Fixed an issue where other project users to view, update,
  delete, or share resources that do not belong to them, due to a
  context-free lookup of a UUID (bsc#1165643)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-12"/>
	<updated date="2020-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165643">SUSE bug 1165643</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9543/">CVE-2020-9543 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9543">CVE-2020-9543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597564" comment="openstack-manila-5.1.1~dev2-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597565" comment="openstack-manila-api-5.1.1~dev2-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597566" comment="openstack-manila-data-5.1.1~dev2-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597567" comment="openstack-manila-doc-5.1.1~dev2-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597568" comment="openstack-manila-scheduler-5.1.1~dev2-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597569" comment="openstack-manila-share-5.1.1~dev2-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597570" comment="python-manila-5.1.1~dev2-3.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149004" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1156323" ref_url="https://bugzilla.suse.com/1156323" source="BUGZILLA"/>
		<reference ref_id="1156324" ref_url="https://bugzilla.suse.com/1156324" source="BUGZILLA"/>
		<reference ref_id="1156326" ref_url="https://bugzilla.suse.com/1156326" source="BUGZILLA"/>
		<reference ref_id="1156328" ref_url="https://bugzilla.suse.com/1156328" source="BUGZILLA"/>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1162687" ref_url="https://bugzilla.suse.com/1162687" source="BUGZILLA"/>
		<reference ref_id="1162689" ref_url="https://bugzilla.suse.com/1162689" source="BUGZILLA"/>
		<reference ref_id="1162691" ref_url="https://bugzilla.suse.com/1162691" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526/" source="CVE"/>
		<reference ref_id="CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677/" source="CVE"/>
		<reference ref_id="CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678/" source="CVE"/>
		<reference ref_id="CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679/" source="CVE"/>
		<reference ref_id="CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449/" source="CVE"/>
		<reference ref_id="CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450/" source="CVE"/>
		<reference ref_id="CVE-2020-8517" ref_url="https://www.suse.com/security/cve/CVE-2020-8517/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2019-12528: Fixed an information disclosure flaw in the FTP gateway (bsc#1162689). 
- CVE-2019-12526: Fixed potential remote code execution during URN processing (bsc#1156326).
- CVE-2019-12523,CVE-2019-18676: Fixed multiple improper validations in URI processing (bsc#1156329).
- CVE-2019-18677: Fixed Cross-Site Request Forgery in HTTP Request processing (bsc#1156328).
- CVE-2019-18678: Fixed incorrect message parsing which could have led to HTTP request splitting issue (bsc#1156323).
- CVE-2019-18679: Fixed information disclosure when processing HTTP Digest Authentication (bsc#1156324).
- CVE-2020-8449: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
- CVE-2020-8450: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
- CVE-2020-8517: Fixed a buffer overflow in ext_lm_group_acl when processing NTLM Authentication credentials (bsc#1162691).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-12"/>
	<updated date="2020-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156323">SUSE bug 1156323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156324">SUSE bug 1156324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156326">SUSE bug 1156326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156328">SUSE bug 1156328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162689">SUSE bug 1162689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162691">SUSE bug 1162691</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12523">CVE-2019-12523 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12526">CVE-2019-12526 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12528">CVE-2019-12528 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18676">CVE-2019-18676 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18677">CVE-2019-18677 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18678">CVE-2019-18678 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18679">CVE-2019-18679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8449">CVE-2020-8449 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8450">CVE-2020-8450 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8517/">CVE-2020-8517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8517">CVE-2020-8517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531763" comment="squid-3.5.21-26.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149005" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1160305" ref_url="https://bugzilla.suse.com/1160305" source="BUGZILLA"/>
		<reference ref_id="1160498" ref_url="https://bugzilla.suse.com/1160498" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-03 (bsc#1160498)
  * CVE-2019-17026 (bmo#1607443)
    IonMonkey type confusion with StoreElementHole and
    FallibleStoreElement 

- Firefox Extended Support Release 68.4.0 ESR
  * Fixed: Various security fixes
  MFSA 2020-02 (bsc#1160305)
  * CVE-2019-17015 (bmo#1599005)
    Memory corruption in parent process during new content
    process initialization on Windows
  * CVE-2019-17016 (bmo#1599181)
    Bypass of @namespace CSS sanitization during pasting
  * CVE-2019-17017 (bmo#1603055)
    Type Confusion in XPCVariant.cpp
  * CVE-2019-17021 (bmo#1599008)
    Heap address disclosure in parent process during content
    process initialization on Windows
  * CVE-2019-17022 (bmo#1602843)
    CSS sanitization does not escape HTML tags
  * CVE-2019-17024 (bmo#1507180, bmo#1595470, bmo#1598605,
    bmo#1601826)
    Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-10"/>
	<updated date="2020-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160498">SUSE bug 1160498</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17015">CVE-2019-17015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17016">CVE-2019-17016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17017">CVE-2019-17017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17021">CVE-2019-17021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17022">CVE-2019-17022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17024">CVE-2019-17024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17026">CVE-2019-17026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522668" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522669" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149006" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Low)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006625.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

PostgreSQL was updated to version 10.12.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1720">CVE-2020-1720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522670" comment="libecpg6-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522671" comment="libpq5-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522672" comment="libpq5-32bit-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522673" comment="postgresql10-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531765" comment="postgresql10-contrib-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531766" comment="postgresql10-docs-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531767" comment="postgresql10-plperl-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531768" comment="postgresql10-plpython-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531769" comment="postgresql10-pltcl-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531770" comment="postgresql10-server-10.12-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149007" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1132665" ref_url="https://bugzilla.suse.com/1132665" source="BUGZILLA"/>
		<reference ref_id="1166238" ref_url="https://bugzilla.suse.com/1166238" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to 68.6.0 ESR (MFSA 2020-09 bsc#1132665 bsc#1166238)
          
- CVE-2020-6805: Fixed a use-after-free when removing data about origins
- CVE-2020-6806: Fixed improper protections against state confusion
- CVE-2020-6807: Fixed a use-after-free in cubeb during stream destruction 
- CVE-2020-6811: Fixed an issue where copy as cURL' feature did not fully 
  escape website-controlled data potentially leading to command injection 
- CVE-2019-20503: Fixed out of bounds reads in sctp_load_addresses_from_init 
- CVE-2020-6812: Fixed an issue where the names of AirPods with personally 
  identifiable information were exposed to websites with camera or microphone 
  permission     
- CVE-2020-6814: Fixed multiple memory safety bugs
- Fixed an issue with minimizing a window (bsc#1132665).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-19"/>
	<updated date="2020-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132665">SUSE bug 1132665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20503">CVE-2019-20503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6805">CVE-2020-6805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6806">CVE-2020-6806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6807">CVE-2020-6807 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6811">CVE-2020-6811 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6812">CVE-2020-6812 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6814">CVE-2020-6814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531771" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531773" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149008" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1164692" ref_url="https://bugzilla.suse.com/1164692" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006629.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-1938: Fixed a file contents disclosure vulnerability (bsc#1164692).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-19"/>
	<updated date="2020-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1164692">SUSE bug 1164692</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531774" comment="tomcat-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531775" comment="tomcat-admin-webapps-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531776" comment="tomcat-docs-webapp-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531777" comment="tomcat-el-3_0-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531778" comment="tomcat-javadoc-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531779" comment="tomcat-jsp-2_3-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531780" comment="tomcat-lib-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531781" comment="tomcat-servlet-3_1-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531782" comment="tomcat-webapps-8.0.53-29.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149009" version="1" class="patch">
	<metadata>
		<title>Recommended update for python-botocore (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1069697" ref_url="https://bugzilla.suse.com/1069697" source="BUGZILLA"/>
		<reference ref_id="1075263" ref_url="https://bugzilla.suse.com/1075263" source="BUGZILLA"/>
		<reference ref_id="1088310" ref_url="https://bugzilla.suse.com/1088310" source="BUGZILLA"/>
		<reference ref_id="1095041" ref_url="https://bugzilla.suse.com/1095041" source="BUGZILLA"/>
		<reference ref_id="1118021" ref_url="https://bugzilla.suse.com/1118021" source="BUGZILLA"/>
		<reference ref_id="1118024" ref_url="https://bugzilla.suse.com/1118024" source="BUGZILLA"/>
		<reference ref_id="1118027" ref_url="https://bugzilla.suse.com/1118027" source="BUGZILLA"/>
		<reference ref_id="1129696" ref_url="https://bugzilla.suse.com/1129696" source="BUGZILLA"/>
		<reference ref_id="1136184" ref_url="https://bugzilla.suse.com/1136184" source="BUGZILLA"/>
		<reference ref_id="1146853" ref_url="https://bugzilla.suse.com/1146853" source="BUGZILLA"/>
		<reference ref_id="1146854" ref_url="https://bugzilla.suse.com/1146854" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="SUSE-RU-2020:0775-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014210.html" source="SUSE-SU"/>
		<description>
This update for python-boto3, python-botocore and python-futures fixes the following issues:


python-botocore was updated to 1.13.33:

- Fix for python3-botocore versioning issues between SLES12 SP3 Teradata and Public Cloud Module. (bsc#1129696)
- Remove the broken attempt to avoid using the bundled requests module provided by the source. (boo#1088310)
- Update to the latest SDK components. (bsc#1146853, bsc#1146854)
- Add support for urllib 1.25 for CVE-2019-9947. (boo#1136184)
- Fix implementing MD5 header injection into new operations if they are necessary and create default session configuration. (bsc#1118021, bsc#1118024, bsc#1118027)
- Add attribute 'ssl_context' to 'AWSHTTPSConnection'. (bsc#1095041)

python-boto3 was updated to 1.10.33.

python-futures also provides python2-futures in the python2 build.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-24"/>
	<updated date="2020-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1069697">SUSE bug 1069697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075263">SUSE bug 1075263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088310">SUSE bug 1088310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095041">SUSE bug 1095041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118021">SUSE bug 1118021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118024">SUSE bug 1118024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118027">SUSE bug 1118027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129696">SUSE bug 1129696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136184">SUSE bug 1136184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146853">SUSE bug 1146853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146854">SUSE bug 1146854</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562705" comment="python-botocore-1.13.33-28.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562703" comment="python-futures-3.0.2-15.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149010" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1158763" ref_url="https://bugzilla.suse.com/1158763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18900" ref_url="https://www.suse.com/security/cve/CVE-2019-18900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0079-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007437.html" source="SUSE-SU"/>
		<description>
This update for libzypp fixes the following issues:

Security issue fixed:

- CVE-2019-18900: Fixed assert cookie file that was world readable (bsc#1158763).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1158763">SUSE bug 1158763</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18900/">CVE-2019-18900 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18900">CVE-2019-18900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522674" comment="libzypp-16.21.2-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555874" comment="libzypp-devel-16.21.2-2.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149011" version="1" class="patch">
	<metadata>
		<title>Security update for python-cffi, python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1055478" ref_url="https://bugzilla.suse.com/1055478" source="BUGZILLA"/>
		<reference ref_id="1070737" ref_url="https://bugzilla.suse.com/1070737" source="BUGZILLA"/>
		<reference ref_id="1101820" ref_url="https://bugzilla.suse.com/1101820" source="BUGZILLA"/>
		<reference ref_id="1111657" ref_url="https://bugzilla.suse.com/1111657" source="BUGZILLA"/>
		<reference ref_id="1138748" ref_url="https://bugzilla.suse.com/1138748" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="981848" ref_url="https://bugzilla.suse.com/981848" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10903" ref_url="https://www.suse.com/security/cve/CVE-2018-10903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006644.html" source="SUSE-SU"/>
		<description>
This update for python-cffi, python-cryptography fixes the following issues:

Security issue fixed:

- CVE-2018-10903: Fixed GCM tag forgery via truncated tag in finalize_with_tag API (bsc#1101820).

Non-security issues fixed:

python-cffi was updated to 1.11.2 (bsc#1138748, jsc#ECO-1256, jsc#PM-1598):

- fixed a build failure on i586 (bsc#1111657)
- Salt was unable to highstate in snapshot 20171129 (bsc#1070737)

- Update pytest in spec to add c directory tests in addition to 
  testing directory.

- update to version 1.11.2:
  * Fix Windows issue with managing the thread-state on CPython 3.0 to
    3.5

- Update pytest in spec to add c directory tests in addition to 
  testing directory.
- Omit test_init_once_multithread tests as they rely on multiple
  threads finishing in a given time. Returns sporadic pass/fail
  within build.
- Update to 1.11.1:
  * Fix tests, remove deprecated C API usage
  * Fix (hack) for 3.6.0/3.6.1/3.6.2 giving incompatible binary
    extensions (cpython issue #29943)
  * Fix for 3.7.0a1+

- Update to 1.11.0:
  * Support the modern standard types char16_t and char32_t. These
    work like wchar_t: they represent one unicode character, or when
    used as charN_t * or charN_t[] they represent a unicode string.
    The difference with wchar_t is that they have a known, fixed
    size. They should work at all places that used to work with
    wchar_t (please report an issue if I missed something). Note
    that with set_source(), you need to make sure that these types
    are actually defined by the C source you provide (if used in
    cdef()).
  * Support the C99 types float _Complex and double _Complex. Note
    that libffi doesn't support them, which means that in the ABI
    mode you still cannot call C functions that take complex
    numbers directly as arguments or return type.
  * Fixed a rare race condition when creating multiple FFI instances
    from multiple threads. (Note that you aren't meant to create
    many FFI instances: in inline mode, you should write
    ffi = cffi.FFI() at module level just after import cffi; and in
    out-of-line mode you don't instantiate FFI explicitly at all.)
  * Windows: using callbacks can be messy because the CFFI internal
    error messages show up to stderr-but stderr goes nowhere in many
    applications. This makes it particularly hard to get started
    with the embedding mode. (Once you get started, you can at least
    use @ffi.def_extern(onerror=...) and send the error logs where
    it makes sense for your application, or record them in log
    files, and so on.) So what is new in CFFI is that now, on
    Windows CFFI will try to open a non-modal MessageBox (in addition
    to sending raw messages to stderr). The MessageBox is only
    visible if the process stays alive: typically, console
    applications that crash close immediately, but that is also the
    situation where stderr should be visible anyway.
  * Progress on support for callbacks in NetBSD.
  * Functions returning booleans would in some case still return 0
    or 1 instead of False or True. Fixed.
  * ffi.gc() now takes an optional third parameter, which gives an
    estimate of the size (in bytes) of the object. So far, this is
    only used by PyPy, to make the next GC occur more quickly
    (issue #320). In the future, this might have an effect on
    CPython too (provided the CPython issue 31105 is addressed).
  * Add a note to the documentation: the ABI mode gives function
    objects that are slower to call than the API mode does. For
    some reason it is often thought to be faster. It is not!
- Update to 1.10.1:
  * Fixed the line numbers reported in case of cdef() errors. Also,
    I just noticed, but pycparser always supported the preprocessor
    directive # 42 'foo.h' to mean 'from the next line, we're in
    file foo.h starting from line 42';, which it puts in the error
    messages. 

- update to 1.10.0:
 * Issue #295: use calloc() directly instead of PyObject_Malloc()+memset()
   to handle ffi.new() with a default allocator. Speeds up ffi.new(large-array)
   where most of the time you never touch most of the array.
  * Some OS/X build fixes ('only with Xcode but without CLT';).
  * Improve a couple of error messages: when getting mismatched versions of
    cffi and its backend; and when calling functions which cannot be called with
    libffi because an argument is a struct that is 'too complicated'; (and not
    a struct pointer, which always works).
  * Add support for some unusual compilers (non-msvc, non-gcc, non-icc, non-clang)
  * Implemented the remaining cases for ffi.from_buffer. Now all
    buffer/memoryview objects can be passed. The one remaining check is against
    passing unicode strings in Python 2. (They support the buffer interface, but
    that gives the raw bytes behind the UTF16/UCS4 storage, which is most of the
    times not what you expect. In Python 3 this has been fixed and the unicode
    strings don't support the memoryview interface any more.)
  * The C type _Bool or bool now converts to a Python boolean when reading,
    instead of the content of the byte as an integer. The potential
    incompatibility here is what occurs if the byte contains a value different
    from 0 and 1. Previously, it would just return it; with this change, CFFI
    raises an exception in this case. But this case means 'undefined behavior';
    in C; if you really have to interface with a library relying on this,
    don't use bool in the CFFI side. Also, it is still valid to use a byte
    string as initializer for a bool[], but now it must only contain \x00 or
    \x01. As an aside, ffi.string() no longer works on bool[] (but it never made
    much sense, as this function stops at the first zero).
  * ffi.buffer is now the name of cffi's buffer type, and ffi.buffer() works
    like before but is the constructor of that type.
  * ffi.addressof(lib, 'name') now works also in in-line mode, not only in
    out-of-line mode. This is useful for taking the address of global variables.
  * Issue #255: cdata objects of a primitive type (integers, floats, char) are
    now compared and ordered by value. For example, &lt;cdata 'int' 42&gt; compares
    equal to 42 and &lt;cdata 'char' b'A'&gt; compares equal to b'A'. Unlike C,
    &lt;cdata 'int' -1&gt; does not compare equal to ffi.cast('unsigned int', -1): it
    compares smaller, because -1 &lt; 4294967295.
  * PyPy: ffi.new() and ffi.new_allocator()() did not record 'memory pressure';,
    causing the GC to run too infrequently if you call ffi.new() very often
    and/or with large arrays. Fixed in PyPy 5.7.
  * Support in ffi.cdef() for numeric expressions with + or -. Assumes that
    there is no overflow; it should be fixed first before we add more general
    support for arbitrary arithmetic on constants.

- do not generate HTML documentation for packages that are indirect
  dependencies of Sphinx
  (see docs at https://cffi.readthedocs.org/ )

- update to 1.9.1
  - Structs with variable-sized arrays as their last field: now we track the
    length of the array after ffi.new() is called, just like we always tracked
    the length of ffi.new('int[]', 42). This lets us detect out-of-range
    accesses to array items. This also lets us display a better repr(), and
    have the total size returned by ffi.sizeof() and ffi.buffer(). Previously
    both functions would return a result based on the size of the declared
    structure type, with an assumed empty array. (Thanks andrew for starting
    this refactoring.)
  - Add support in cdef()/set_source() for unspecified-length arrays in
    typedefs: typedef int foo_t[...];. It was already supported for global
    variables or structure fields.
  - I turned in v1.8 a warning from cffi/model.py into an error: 'enum xxx' has
    no values explicitly defined: refusing to guess which integer type it is
    meant to be (unsigned/signed, int/long). Now I'm turning it back to a
    warning again; it seems that guessing that the enum has size int is a
    99%-safe bet. (But not 100%, so it stays as a warning.)
  - Fix leaks in the code handling FILE * arguments. In CPython 3 there is a
    remaining issue that is hard to fix: if you pass a Python file object to a
    FILE * argument, then os.dup() is used and the new file descriptor is only
    closed when the GC reclaims the Python file object-and not at the earlier
    time when you call close(), which only closes the original file descriptor.
    If this is an issue, you should avoid this automatic convertion of Python
    file objects: instead, explicitly manipulate file descriptors and call
    fdopen() from C (...via cffi).
  - When passing a void * argument to a function with a different pointer type,
    or vice-versa, the cast occurs automatically, like in C. The same occurs
    for initialization with ffi.new() and a few other places. However, I
    thought that char * had the same property-but I was mistaken. In C you get
    the usual warning if you try to give a char * to a char ** argument, for
    example. Sorry about the confusion. This has been fixed in CFFI by giving
    for now a warning, too. It will turn into an error in a future version.
  - Issue #283: fixed ffi.new() on structures/unions with nested anonymous
    structures/unions, when there is at least one union in the mix. When
    initialized with a list or a dict, it should now behave more closely like
    the { } syntax does in GCC.
  - CPython 3.x: experimental: the generated C extension modules now use the
    'limited API';, which means that, as a compiled .so/.dll, it should work
    directly on any version of CPython &gt;= 3.2. The name produced by distutils
    is still version-specific. To get the version-independent name, you can
    rename it manually to NAME.abi3.so, or use the very recent setuptools 26.
  - Added ffi.compile(debug=...), similar to python setup.py build --debug but
    defaulting to True if we are running a debugging version of Python itself.
  - Removed the restriction that ffi.from_buffer() cannot be used on byte
    strings. Now you can get a char * out of a byte string, which is valid as
    long as the string object is kept alive. (But don't use it to modify the
    string object! If you need this, use bytearray or other official
    techniques.)
  - PyPy 5.4 can now pass a byte string directly to a char * argument (in older
    versions, a copy would be made). This used to be a CPython-only
    optimization.
  - ffi.gc(p, None) removes the destructor on an object previously created by
    another call to ffi.gc()
  - bool(ffi.cast('primitive type', x)) now returns False if the value is zero
    (including -0.0), and True otherwise. Previously this would only return
    False for cdata objects of a pointer type when the pointer is NULL.
  - bytearrays: ffi.from_buffer(bytearray-object) is now supported. (The reason
    it was not supported was that it was hard to do in PyPy, but it works since
    PyPy 5.3.) To call a C function with a char * argument from a buffer
    object-now including bytearrays-you write lib.foo(ffi.from_buffer(x)).
    Additionally, this is now supported: p[0:length] = bytearray-object. The
    problem with this was that a iterating over bytearrays gives numbers
    instead of characters. (Now it is implemented with just a memcpy, of
    course, not actually iterating over the characters.)
  - C++: compiling the generated C code with C++ was supposed to work, but
    failed if you make use the bool type (because that is rendered as the C
    _Bool type, which doesn't exist in C++).
  - help(lib) and help(lib.myfunc) now give useful information, as well as
    dir(p) where p is a struct or pointer-to-struct.

- update for multipython build

- disable 'negative left shift' warning in test suite to prevent
  failures with gcc6, until upstream fixes the undefined code
  in question (bsc#981848)

- Update to version 1.6.0:
  * ffi.list_types()
  * ffi.unpack()
  * extern 'Python+C';
  * in API mode, lib.foo.__doc__ contains the C signature now.
  * Yet another attempt at robustness of ffi.def_extern() against
    CPython's interpreter shutdown logic.
- Update in SLE-12 (bsc#1138748, jsc#ECO-1256, jsc#PM-1598)

- Make this version of the package compatible with OpenSSL 1.1.1d, thus fixing bsc#1149792.

- bsc#1101820 CVE-2018-10903 GCM tag forgery via truncated tag in
  finalize_with_tag API

- Add proper conditional for the python2, the ifpython works only
  for the requires/etc

- add missing dependency on python ssl

- update to version 2.1.4:
  * Added X509_up_ref for an upcoming pyOpenSSL release.

- update to version 2.1.3:
  * Updated Windows, macOS, and manylinux1 wheels to be compiled with
    OpenSSL 1.1.0g.

- update to version 2.1.2:
  * Corrected a bug with the manylinux1 wheels where OpenSSL's stack
    was marked executable.

- fix BuildRequires conditions for python3

- update to 2.1.1

- Fix cffi version requirement.

- Disable memleak tests to fix build with OpenSSL 1.1 (bsc#1055478)


- update to 2.0.3

- update to 2.0.2

- update to 2.0

- update to 1.9

- add python-packaging to requirements explicitly instead of relying
  on setuptools to pull it in

- Switch to singlespec approach

- update to 1.8.1
- Adust Requires and BuildRequires		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-25"/>
	<updated date="2020-03-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055478">SUSE bug 1055478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070737">SUSE bug 1070737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101820">SUSE bug 1101820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111657">SUSE bug 1111657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138748">SUSE bug 1138748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981848">SUSE bug 981848</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10903/">CVE-2018-10903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10903">CVE-2018-10903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531783" comment="python-cffi-1.11.2-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531784" comment="python-cryptography-2.1.4-7.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531785" comment="python-xattr-0.7.5-6.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531786" comment="python3-cffi-1.11.2-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531787" comment="python3-cryptography-2.1.4-7.28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149012" version="1" class="patch">
	<metadata>
		<title>Security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1118987" ref_url="https://bugzilla.suse.com/1118987" source="BUGZILLA"/>
		<reference ref_id="1162197" ref_url="https://bugzilla.suse.com/1162197" source="BUGZILLA"/>
		<reference ref_id="1162200" ref_url="https://bugzilla.suse.com/1162200" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11805" ref_url="https://www.suse.com/security/cve/CVE-2018-11805/" source="CVE"/>
		<reference ref_id="CVE-2020-1930" ref_url="https://www.suse.com/security/cve/CVE-2020-1930/" source="CVE"/>
		<reference ref_id="CVE-2020-1931" ref_url="https://www.suse.com/security/cve/CVE-2020-1931/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006648.html" source="SUSE-SU"/>
		<description>
This update for spamassassin fixes the following issues:

- CVE-2018-11805: Fixed an issue with delimiter handling in rule files 
  related to is_regexp_valid() (bsc#1118987).
- CVE-2020-1930: Fixed an issue with rule configuration (.cf) files which 
  can be configured to run system commands (bsc#1162197).
- CVE-2020-1931: Fixed an issue with rule configuration (.cf) files which 
  can be configured to run system commands with warnings (bsc#1162200).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-30"/>
	<updated date="2020-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118987">SUSE bug 1118987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162197">SUSE bug 1162197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162200">SUSE bug 1162200</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11805/">CVE-2018-11805 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11805">CVE-2018-11805 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1930/">CVE-2020-1930 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1930">CVE-2020-1930 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1931/">CVE-2020-1931 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1931">CVE-2020-1931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531788" comment="perl-Mail-SpamAssassin-3.4.2-44.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531789" comment="spamassassin-3.4.2-44.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149013" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1162224" ref_url="https://bugzilla.suse.com/1162224" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006666.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issue:

- CVE-2019-18348: Fixed a CRLF injection via the host part 
  of the url passed to urlopen(). Now an InvalidURL exception 
  is raised (bsc#1155094).
- CVE-2019-9674: Improved the documentation to reflect the 
  dangers of zip-bombs (bsc#1162825).
- CVE-2020-8492: Fixed a regular expression in urllib that 
  was prone to denial of service via HTTP (bsc#1162367).
- Fixed an issue with version missmatch (bsc#1162224).
- Rename idle icons to idle3 in order to not conflict with python2
  variant of the package. (bsc#1165894)
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-02"/>
	<updated date="2020-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162224">SUSE bug 1162224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531790" comment="libpython3_4m1_0-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531791" comment="python3-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531792" comment="python3-base-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531793" comment="python3-curses-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531794" comment="python3-devel-3.4.10-25.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149014" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1141322" ref_url="https://bugzilla.suse.com/1141322" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0088-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200088-1.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to NSS 3.47.1:

Security issues fixed:

- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- CVE-2019-11745: EncryptUpdate should use maxout, not block size (bsc#1158527).
- CVE-2019-11727: Fixed vulnerability sign CertificateVerify with PKCS#1 v1.5 signatures issue (bsc#1141322).

mozilla-nspr was updated to version 4.23:

- Whitespace in C files was cleaned up and no longer uses tab characters for indenting.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-13"/>
	<updated date="2020-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141322">SUSE bug 1141322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17006">CVE-2019-17006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522675" comment="libfreebl3-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522676" comment="libfreebl3-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531795" comment="libfreebl3-hmac-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531796" comment="libfreebl3-hmac-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522677" comment="libsoftokn3-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522678" comment="libsoftokn3-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531797" comment="libsoftokn3-hmac-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531798" comment="libsoftokn3-hmac-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522679" comment="mozilla-nspr-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522680" comment="mozilla-nspr-32bit-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536452" comment="mozilla-nspr-devel-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522681" comment="mozilla-nss-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522682" comment="mozilla-nss-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522683" comment="mozilla-nss-certs-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522684" comment="mozilla-nss-certs-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536453" comment="mozilla-nss-devel-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522685" comment="mozilla-nss-sysinit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522686" comment="mozilla-nss-sysinit-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522687" comment="mozilla-nss-tools-3.47.1-58.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149015" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1154609" ref_url="https://bugzilla.suse.com/1154609" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0920-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007307.html" source="SUSE-SU"/>
		<description>
This update for libxslt fixes the following issue:

- CVE-2019-18197: Fixed a dangling pointer in xsltCopyText which may have led to information disclosure (bsc#1154609).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-26"/>
	<updated date="2020-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154609">SUSE bug 1154609</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18197">CVE-2019-18197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531799" comment="libxslt-tools-1.1.28-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531800" comment="libxslt1-1.1.28-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531801" comment="libxslt1-32bit-1.1.28-17.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149016" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1168630" ref_url="https://bugzilla.suse.com/1168630" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006677.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Mozilla Firefox 68.6.1esr
  MFSA 2020-11 (bsc#1168630)
  * CVE-2020-6819 (bmo#1620818)
    Use-after-free while running the nsDocShell destructor
  * CVE-2020-6820 (bmo#1626728)
    Use-after-free when handling a ReadableStream
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-06"/>
	<updated date="2020-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6819">CVE-2020-6819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6820">CVE-2020-6820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531802" comment="MozillaFirefox-68.6.1-109.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531804" comment="MozillaFirefox-translations-common-68.6.1-109.113.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149017" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionview-4_2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1167240" ref_url="https://bugzilla.suse.com/1167240" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-5267" ref_url="https://www.suse.com/security/cve/CVE-2020-5267/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006687.html" source="SUSE-SU"/>
		<description>
This update for rubygem-actionview-4_2 fixes the following issues:

- CVE-2020-5267: Fixed an XSS vulnerability in ActionView (bsc#1167240).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-08"/>
	<updated date="2020-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1167240">SUSE bug 1167240</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-5267/">CVE-2020-5267 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5267">CVE-2020-5267 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597701" comment="ruby2.1-rubygem-actionview-4_2-4.2.9-9.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149018" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1168874" ref_url="https://bugzilla.suse.com/1168874" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6827" ref_url="https://www.suse.com/security/cve/CVE-2020-6827/" source="CVE"/>
		<reference ref_id="CVE-2020-6828" ref_url="https://www.suse.com/security/cve/CVE-2020-6828/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006698.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 68.7.0 ESR fixes the following issues:

- CVE-2020-6821: Uninitialized memory could be read when using the WebGL copyTexSubImage method (bsc#1168874).
- CVE-2020-6822: Fixed out of bounds write in GMPDecodeData when processing large images (bsc#1168874).
- CVE-2020-6825: Fixed Memory safety bugs (bsc#1168874).
- CVE-2020-6827: Custom Tabs could have the URI spoofed (bsc#1168874).
- CVE-2020-6828: Preference overwrite via crafted Intent (bsc#1168874).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-09"/>
	<updated date="2020-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6821">CVE-2020-6821 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6822">CVE-2020-6822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6825">CVE-2020-6825 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6827/">CVE-2020-6827 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6827">CVE-2020-6827 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6828/">CVE-2020-6828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6828">CVE-2020-6828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531805" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531807" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149019" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1167890" ref_url="https://bugzilla.suse.com/1167890" source="BUGZILLA"/>
		<reference ref_id="1168930" ref_url="https://bugzilla.suse.com/1168930" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006709.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

Security issue fixed:

- CVE-2020-5260: With a crafted URL that contains a newline in it, the credential
  helper machinery can be fooled to give credential information for a wrong host (bsc#1168930). 

Non-security issue fixed: 

git was updated to 2.26.0 for SHA256 support (bsc#1167890, jsc#SLE-11608):

- the xinetd snippet was removed
- the System V init script for the git-daemon was replaced by a systemd
  service file of the same name.

git 2.26.0:

* 'git rebase' now uses a different backend that is based on the
  'merge' machinery by default. The 'rebase.backend' configuration
   variable reverts to old behaviour when set to  'apply'
* Improved handling of sparse checkouts
* Improvements to many commands and internal features

git 2.25.1:

* 'git commit' now honors advise.statusHints
* various updates, bug fixes and documentation updates

git 2.25.0:

* The branch description ('git branch --edit-description') has been
  used to fill the body of the cover letters by the format-patch
  command; this has been enhanced so that the subject can also be
  filled.
* A few commands learned to take the pathspec from the standard input
  or a named file, instead of taking it as the command line
  arguments, with the '--pathspec-from-file' option.
* Test updates to prepare for SHA-2 transition continues.
* Redo 'git name-rev' to avoid recursive calls.
* When all files from some subdirectory were renamed to the root
  directory, the directory rename heuristics would fail to detect that
  as a rename/merge of the subdirectory to the root directory, which has
  been corrected.
* HTTP transport had possible allocator/deallocator mismatch, which
  has been corrected.

git 2.24.1:

* CVE-2019-1348: The --export-marks option of fast-import is
  exposed also via the in-stream command feature export-marks=...
  and it allows overwriting arbitrary paths (bsc#1158785)
* CVE-2019-1349: on Windows, when submodules are cloned
  recursively, under certain circumstances Git could be fooled
  into using the same Git directory twice (bsc#1158787)
* CVE-2019-1350: Incorrect quoting of command-line arguments
  allowed remote code execution during a recursive clone in
  conjunction with SSH URLs (bsc#1158788)
* CVE-2019-1351: on Windows mistakes drive letters outside of
  the US-English alphabet as relative paths (bsc#1158789)
* CVE-2019-1352: on Windows was unaware of NTFS Alternate Data
  Streams (bsc#1158790)
* CVE-2019-1353: when run in the Windows Subsystem for Linux
  while accessing a working directory on a regular Windows
  drive, none of the NTFS protections were active (bsc#1158791)
* CVE-2019-1354: on Windows refuses to write tracked files with
  filenames that contain backslashes (bsc#1158792)
* CVE-2019-1387: Recursive clones vulnerability that is caused
  by too-lax validation of submodule names, allowing very
  targeted attacks via remote code execution in recursive
  clones (bsc#1158793)
* CVE-2019-19604: a recursive clone followed by a submodule
  update could execute code contained within the repository
  without the user explicitly having asked for that (bsc#1158795)

- Fix building with asciidoctor and without DocBook4 stylesheets.

git 2.24.0

* The command line parser learned '--end-of-options' notation.
* A mechanism to affect the default setting for a (related) group of
  configuration variables is introduced.
* 'git fetch' learned '--set-upstream' option to help those who first
  clone from their private fork they intend to push to, add the true
  upstream via 'git remote add' and then 'git fetch' from it.
* fixes and improvements to UI, workflow and features, bash completion fixes
* part of it merged upstream
* the Makefile attempted to download some documentation, banned

git 2.23.0:

* The '--base' option of 'format-patch' computed the patch-ids for
  prerequisite patches in an unstable way, which has been updated
  to compute in a way that is compatible with 'git patch-id
  --stable'.
* The 'git log' command by default behaves as if the --mailmap
  option was given.
* fixes and improvements to UI, workflow and features

git 2.22.1:

* A relative pathname given to 'git init --template=&lt;path&gt; &lt;repo&gt;'
  ought to be relative to the directory 'git init' gets invoked in,
  but it instead was made relative to the repository, which has been
  corrected.
* 'git worktree add' used to fail when another worktree connected to
  the same repository was corrupt, which has been corrected.
* 'git am -i --resolved' segfaulted after trying to see a commit as
  if it were a tree, which has been corrected.
* 'git merge --squash' is designed to update the working tree and the
  index without creating the commit, and this cannot be countermanded
  by adding the '--commit' option; the command now refuses to work
  when both options are given.
* Update to Unicode 12.1 width table.
* 'git request-pull' learned to warn when the ref we ask them to pull
  from in the local repository and in the published repository are
  different.
* 'git fetch' into a lazy clone forgot to fetch base objects that are
  necessary to complete delta in a thin packfile, which has been
  corrected.
* The URL decoding code has been updated to avoid going past the end
  of the string while parsing %-&lt;hex&gt;-&lt;hex&gt; sequence.
* 'git clean' silently skipped a path when it cannot lstat() it; now
  it gives a warning.
* 'git rm' to resolve a conflicted path leaked an internal message
  'needs merge' before actually removing the path, which was
  confusing. This has been corrected.
* Many more bugfixes and code cleanups.

- removal of SuSEfirewall2 service, since SuSEfirewall2 has been replaced by
  firewalld, see [1].
  [1]: https://lists.opensuse.org/opensuse-factory/2019-01/msg00490.html

git 2.22.0:

* The filter specification '--filter=sparse:path=&lt;path&gt;' used to
  create a lazy/partial clone has been removed. Using a blob that is
  part of the project as sparse specification is still supported with
  the '--filter=sparse:oid=&lt;blob&gt;' option
* 'git checkout --no-overlay' can be used to trigger a new mode of
  checking out paths out of the tree-ish, that allows paths that
  match the pathspec that are in the current index and working tree
  and are not in the tree-ish.
* Four new configuration variables {author,committer}.{name,email}
  have been introduced to override user.{name,email} in more specific
  cases.
* 'git branch' learned a new subcommand '--show-current'.
* The command line completion (in contrib/) has been taught to
  complete more subcommand parameters.
* The completion helper code now pays attention to repository-local
  configuration (when available), which allows --list-cmds to honour
  a repository specific setting of completion.commands, for example.
* The list of conflicted paths shown in the editor while concluding a
  conflicted merge was shown above the scissors line when the
  clean-up mode is set to 'scissors', even though it was commented
  out just like the list of updated paths and other information to
  help the user explain the merge better.
* 'git rebase' that was reimplemented in C did not set ORIG_HEAD
  correctly, which has been corrected.
* 'git worktree add' used to do a 'find an available name with stat
  and then mkdir', which is race-prone. This has been fixed by using
  mkdir and reacting to EEXIST in a loop. 

- update git-web AppArmor profile for bash and tar usrMerge (bsc#1132350)

git 2.21.0:

* Historically, the '-m' (mainline) option can only be used for 'git
  cherry-pick' and 'git revert' when working with a merge commit.
  This version of Git no longer warns or errors out when working with
  a single-parent commit, as long as the argument to the '-m' option
  is 1 (i.e. it has only one parent, and the request is to pick or
  revert relative to that first parent). Scripts that relied on the
  behaviour may get broken with this change.
* Small fixes and features for fast-export and fast-import.
* The 'http.version' configuration variable can be used with recent
  enough versions of cURL library to force the version of HTTP used
  to talk when fetching and pushing.
* 'git push $there $src:$dst' rejects when $dst is not a fully
  qualified refname and it is not clear what the end user meant.
* Update 'git multimail' from the upstream.
* A new date format '--date=human' that morphs its output depending
  on how far the time is from the current time has been introduced.
  '--date=auto:human' can be used to use this new format (or any
  existing format) when the output is going to the pager or to the
  terminal, and otherwise the default format.

- Fix worktree creation race (bsc#1114225).

git 2.20.1:

* portability fixes
* 'git help -a' did not work well when an overly long alias was
  defined
* no longer squelched an error message when the run_command API
  failed to run a missing command

git 2.20.0:

* 'git help -a' now gives verbose output (same as 'git help -av').
  Those who want the old output may say 'git help --no-verbose -a'..
* 'git send-email' learned to grab address-looking string on any
  trailer whose name ends with '-by'.
* 'git format-patch' learned new '--interdiff' and '--range-diff'
  options to explain the difference between this version and the
  previous attempt in the cover letter (or after the three-dashes as
  a comment).
* Developer builds now use -Wunused-function compilation option.
* Fix a bug in which the same path could be registered under multiple
  worktree entries if the path was missing (for instance, was removed
  manually).  Also, as a convenience, expand the number of cases in
  which --force is applicable.
* The overly large Documentation/config.txt file have been split into
  million little pieces.  This potentially allows each individual piece
  to be included into the manual page of the command it affects more easily.
* Malformed or crafted data in packstream can make our code attempt
  to read or write past the allocated buffer and abort, instead of
  reporting an error, which has been fixed.
* Fix for a long-standing bug that leaves the index file corrupt when
  it shrinks during a partial commit.
* 'git merge' and 'git pull' that merges into an unborn branch used
  to completely ignore '--verify-signatures', which has been
  corrected.
* ...and much more features and fixes

- fix CVE-2018-19486 (bsc#1117257)

git 2.19.2:

* various bug fixes for multiple subcommands and operations

git 2.19.1:

* CVE-2018-17456: Specially crafted .gitmodules files may have
  allowed arbitrary code execution when the repository is cloned
  with --recurse-submodules (bsc#1110949)

git 2.19.0:

* 'git diff' compares the index and the working tree.  For paths
   added with intent-to-add bit, the command shows the full contents
   of them as added, but the paths themselves were not marked as new
   files.  They are now shown as new by default.
* 'git apply' learned the '--intent-to-add' option so that an
   otherwise working-tree-only application of a patch will add new
   paths to the index marked with the 'intent-to-add' bit.
* 'git grep' learned the '--column' option that gives not just the
   line number but the column number of the hit.
* The '-l' option in 'git branch -l' is an unfortunate short-hand for
   '--create-reflog', but many users, both old and new, somehow expect
   it to be something else, perhaps '--list'.  This step warns when '-l'
   is used as a short-hand for '--create-reflog' and warns about the
   future repurposing of the it when it is used.
* The userdiff pattern for .php has been updated.
* The content-transfer-encoding of the message 'git send-email' sends
   out by default was 8bit, which can cause trouble when there is an
   overlong line to bust RFC 5322/2822 limit.  A new option 'auto' to
   automatically switch to quoted-printable when there is such a line
   in the payload has been introduced and is made the default.
* 'git checkout' and 'git worktree add' learned to honor
   checkout.defaultRemote when auto-vivifying a local branch out of a
   remote tracking branch in a repository with multiple remotes that
   have tracking branches that share the same names.
   (merge 8d7b558bae ab/checkout-default-remote later to maint).
* 'git grep' learned the '--only-matching' option.
* 'git rebase --rebase-merges' mode now handles octopus merges as
   well.
* Add a server-side knob to skip commits in exponential/fibbonacci
  stride in an attempt to cover wider swath of history with a smaller
  number of iterations, potentially accepting a larger packfile
  transfer, instead of going back one commit a time during common
  ancestor discovery during the 'git fetch' transaction.
  (merge 42cc7485a2 jt/fetch-negotiator-skipping later to maint).
* A new configuration variable core.usereplacerefs has been added,
  primarily to help server installations that want to ignore the
  replace mechanism altogether.
* Teach 'git tag -s' etc. a few configuration variables (gpg.format
  that can be set to 'openpgp' or 'x509', and gpg.&lt;format&gt;.program
  that is used to specify what program to use to deal with the format)
  to allow x.509 certs with CMS via 'gpgsm' to be used instead of
  openpgp via 'gnupg'.
* Many more strings are prepared for l10n.
* 'git p4 submit' learns to ask its own pre-submit hook if it should
  continue with submitting.
* The test performed at the receiving end of 'git push' to prevent
  bad objects from entering repository can be customized via
  receive.fsck.* configuration variables; we now have gained a
  counterpart to do the same on the 'git fetch' side, with
  fetch.fsck.* configuration variables.
* 'git pull --rebase=interactive' learned 'i' as a short-hand for
  'interactive'.
* 'git instaweb' has been adjusted to run better with newer Apache on
  RedHat based distros.
* 'git range-diff' is a reimplementation of 'git tbdiff' that lets us
  compare individual patches in two iterations of a topic.
* The sideband code learned to optionally paint selected keywords at
  the beginning of incoming lines on the receiving end.
* 'git branch --list' learned to take the default sort order from the
  'branch.sort' configuration variable, just like 'git tag --list'
  pays attention to 'tag.sort'.
* 'git worktree' command learned '--quiet' option to make it less
  verbose.

git 2.18.0:

* improvements to rename detection logic
* When built with more recent cURL, GIT_SSL_VERSION can now
  specify 'tlsv1.3' as its value.
* 'git mergetools' learned talking to guiffy.
* various other workflow improvements and fixes
* performance improvements and other developer visible fixes

Update to git 2.16.4: security fix release

git 2.17.1:

* Submodule 'names' come from the untrusted .gitmodules file, but
  we blindly append them to $GIT_DIR/modules to create our on-disk
  repo paths. This means you can do bad things by putting '../'
  into the name. We now enforce some rules for submodule names
  which will cause Git to ignore these malicious names
  (CVE-2018-11235, bsc#1095219)
* It was possible to trick the code that sanity-checks paths on
  NTFS into reading random piece of memory
  (CVE-2018-11233, bsc#1095218)
* Support on the server side to reject pushes to repositories
  that attempt to create such problematic .gitmodules file etc.
  as tracked contents, to help hosting sites protect their
  customers by preventing malicious contents from spreading.

git 2.17.0:

* 'diff' family of commands learned '--find-object=&lt;object-id&gt;' option
  to limit the findings to changes that involve the named object.
* 'git format-patch' learned to give 72-cols to diffstat, which is
  consistent with other line length limits the subcommand uses for
  its output meant for e-mails.
* The log from 'git daemon' can be redirected with a new option; one
  relevant use case is to send the log to standard error (instead of
  syslog) when running it from inetd.
* 'git rebase' learned to take '--allow-empty-message' option.
* 'git am' has learned the '--quit' option, in addition to the
  existing '--abort' option; having the pair mirrors a few other
  commands like 'rebase' and 'cherry-pick'.
* 'git worktree add' learned to run the post-checkout hook, just like
  'git clone' runs it upon the initial checkout.
* 'git tag' learned an explicit '--edit' option that allows the
  message given via '-m' and '-F' to be further edited.
* 'git fetch --prune-tags' may be used as a handy short-hand for
  getting rid of stale tags that are locally held.
* The new '--show-current-patch' option gives an end-user facing way
  to get the diff being applied when 'git rebase' (and 'git am')
  stops with a conflict.
* 'git add -p' used to offer '/' (look for a matching hunk) as a
  choice, even there was only one hunk, which has been corrected.
  Also the single-key help is now given only for keys that are
  enabled (e.g. help for '/' won't be shown when there is only one
  hunk).
* Since Git 1.7.9, 'git merge' defaulted to --no-ff (i.e. even when
  the side branch being merged is a descendant of the current commit,
  create a merge commit instead of fast-forwarding) when merging a
  tag object.  This was appropriate default for integrators who pull
  signed tags from their downstream contributors, but caused an
  unnecessary merges when used by downstream contributors who
  habitually 'catch up' their topic branches with tagged releases
  from the upstream.  Update 'git merge' to default to --no-ff only
  when merging a tag object that does *not* sit at its usual place in
  refs/tags/ hierarchy, and allow fast-forwarding otherwise, to
  mitigate the problem.
* 'git status' can spend a lot of cycles to compute the relation
  between the current branch and its upstream, which can now be
  disabled with '--no-ahead-behind' option.
* 'git diff' and friends learned funcname patterns for Go language
  source files.
* 'git send-email' learned '--reply-to=&lt;address&gt;' option.
* Funcname pattern used for C# now recognizes 'async' keyword.
* In a way similar to how 'git tag' learned to honor the pager
  setting only in the list mode, 'git config' learned to ignore the
  pager setting when it is used for setting values (i.e. when the
  purpose of the operation is not to 'show').
- Use %license instead of %doc [bsc#1082318]

git 2.16.3:

* 'git status' after moving a path in the working tree (hence
  making it appear 'removed') and then adding with the -N option
  (hence making that appear 'added') detected it as a rename, but
  did not report the  old and new pathnames correctly.
* 'git commit --fixup' did not allow '-m&lt;message&gt;' option to be
  used at the same time; allow it to annotate resulting commit
  with more text.
* When resetting the working tree files recursively, the working
  tree of submodules are now also reset to match.
* Fix for a commented-out code to adjust it to a rather old API
  change around object ID.
* When there are too many changed paths, 'git diff' showed a
  warning message but in the middle of a line.
* The http tracing code, often used to debug connection issues,
  learned to redact potentially sensitive information from its
  output so that it can be more safely sharable.
* Crash fix for a corner case where an error codepath tried to
  unlock what it did not acquire lock on.
* The split-index mode had a few corner case bugs fixed.
* Assorted fixes to 'git daemon'.
* Completion of 'git merge -s&lt;strategy&gt;' (in contrib/) did not
  work well in non-C locale.
* Workaround for segfault with more recent versions of SVN.
* Recently introduced leaks in fsck have been plugged.
* Travis CI integration now builds the executable in 'script'
  phase to follow the established practice, rather than during
  'before_script' phase.  This allows the CI categorize the
  failures better ('failed' is project's fault, 'errored' is
  build environment's).

- Drop superfluous xinetd snippet, no longer used (bsc#1084460)

- Build with asciidoctor for the recent distros (bsc#1075764)

- Move %{?systemd_requires} to daemon subpackage
- Create subpackage for libsecret credential helper.

git 2.16.2:

* An old regression in 'git describe --all $annotated_tag^0' has
  been fixed.
* 'git svn dcommit' did not take into account the fact that a
  svn+ssh:// URL with a username@ (typically used for pushing)
  refers to the same SVN repository without the username@ and
  failed when svn.pushmergeinfo option is set.
* 'git merge -Xours/-Xtheirs' learned to use our/their version
  when resolving a conflicting updates to a symbolic link.
* 'git clone $there $here' is allowed even when here directory
  exists as long as it is an empty directory, but the command
   incorrectly removed it upon a failure of the operation.
* 'git stash -- &lt;pathspec&gt;' incorrectly blew away untracked files
  in the directory that matched the pathspec, which has been
  corrected.
* 'git add -p' was taught to ignore local changes to submodules
  as they do not interfere with the partial addition of regular
  changes anyway.

git 2.16.1:

* 'git clone' segfaulted when cloning a project that happens to
  track two paths that differ only in case on a case insensitive
  filesystem

git 2.16.0 (CVE-2017-15298, bsc#1063412):

* See https://raw.github.com/git/git/master/Documentation/RelNotes/2.16.0.txt

git 2.15.1:

* fix 'auto' column output 
* fixes to moved lines diffing
* documentation updates
* fix use of repositories immediately under the root directory
* improve usage of libsecret
* fixes to various error conditions in git commands

- Rewrite from sysv init to systemd unit file for git-daemon
  (bsc#1069803)

- Replace references to /var/adm/fillup-templates with new 
  %_fillupdir macro (bsc#1069468)

- split off p4 to a subpackage (bsc#1067502)

- Build with the external libsha1detectcoll (bsc#1042644)

git 2.15.0:

* Use of an empty string as a pathspec element that is used for
 'everything matches' is still warned and Git asks users to use a
  more explicit '.' for that instead. Removal scheduled for 2.16
* Git now avoids blindly falling back to '.git' when the setup
  sequence said we are _not_ in Git repository (another corner
  case removed)
* 'branch --set-upstream' was retired, deprecated since 1.8
* many other improvements and updates

git 2.14.3:

* git send-email understands more cc: formats
* fixes so gitk --bisect
* git commit-tree fixed to handle -F file alike
* Prevent segfault in 'git cat-file --textconv'
* Fix function header parsing for HTML
* Various small fixes to user commands and and internal functions

git 2.14.2:

* fixes to color output
* http.{sslkey,sslCert} now interpret '~[username]/' prefix
* fixes to walking of reflogs via 'log -g' and friends
* various fixes to output correctness
* 'git push --recurse-submodules $there HEAD:$target' is now
  propagated down to the submodules
* 'git clone --recurse-submodules --quiet' c$how propagates quiet
  option down to submodules.
* 'git svn --localtime' correctness fixes
* 'git grep -L' and 'git grep --quiet -L' now report same exit code
* fixes to 'git apply' when converting line endings
* Various Perl scripts did not use safe_pipe_capture() instead 
  of backticks, leaving them susceptible to end-user input.
  CVE-2017-14867 bsc#1061041
* 'git cvsserver' no longer is invoked by 'git daemon' by
  default 

git 2.14.1 (bsc#1052481):
* Security fix for CVE-2017-1000117: A malicious third-party can
  give a crafted 'ssh://...' URL to an unsuspecting victim, and
  an attempt to visit the URL can result in any program that
  exists on the victim's machine being executed. Such a URL could
  be placed in the .gitmodules file of a malicious project, and
  an unsuspecting victim could be tricked into running
  'git clone --recurse-submodules' to trigger the vulnerability.
* A 'ssh://...' URL can result in a 'ssh' command line with a
  hostname that begins with a dash '-', which would cause the
  'ssh' command to instead (mis)treat it as an option. This is
  now prevented by forbidding such a hostname (which should not
  impact any real-world usage).
* Similarly, when GIT_PROXY_COMMAND is configured, the command
  is run with host and port that are parsed out from 'ssh://...'
  URL; a poorly written GIT_PROXY_COMMAND could be tricked into
  treating a string that begins with a dash '-' as an option.
  This is now prevented by forbidding such a hostname and port
  number (again, which should not impact any real-world usage).
* In the same spirit, a repository name that begins with a dash
  '-' is also forbidden now.

git 2.14.0:

* Use of an empty string as a pathspec element that is used for
  'everything matches' is deprecated, use '.'
* Avoid blindly falling back to '.git' when the setup sequence
  indicates operation not on a Git repository
* 'indent heuristics' are now the default.
* Builds with pcre2
* Many bug fixes, improvements and updates

git 2.13.4:

* Update the character width tables.
* Fix an alias that contained an uppercase letter
* Progress meter fixes
* git gc concurrency fixes

git 2.13.3:

* various internal bug fixes
* Fix a  regression to 'git rebase -i'
* Correct unaligned 32-bit access in pack-bitmap code
* Tighten error checks for invalid 'git apply' input
* The split index code did not honor core.sharedrepository setting
  correctly
* Fix 'git branch --list' handling of color.branch.local

git 2.13.2:

* 'collision detecting' SHA-1 update for platform fixes
* 'git checkout --recurse-submodules' did not quite work with a
  submodule that itself has submodules.
* The 'run-command' API implementation has been made more robust
  against dead-locking in a threaded environment.
* 'git clean -d' now only cleans ignored files with '-x'
* 'git status --ignored'  did not list ignored and untracked files
  without '-uall'
* 'git pull --rebase --autostash' didn't auto-stash when the local
  history fast-forwards to the upstream.
* 'git describe --contains' gives as much weight to lightweight
  tags as annotated tags
* Fix 'git stash push &lt;pathspec&gt;' from a subdirectory

git 2.13.1:

* Setting 'log.decorate=false' in the configuration file did not
  take effect in v2.13, which has been corrected.
* corrections to documentation and command help output
* garbage collection fixes
* memory leaks fixed
* receive-pack now makes sure that the push certificate records
  the same set of push options used for pushing
* shell completion corrections for git stash
* fix 'git clone --config var=val' with empty strings
* internal efficiency improvements
* Update sha1 collision detection code for big-endian platforms
  and platforms not supporting unaligned fetches

- Fix packaging of documentation

git 2.13.0:

* empty string as a pathspec element for 'everything matches'
  is still warned, for future removal.
* deprecated argument order 'git merge &lt;msg&gt; HEAD &lt;commit&gt;...'
  was removed
* default location '~/.git-credential-cache/socket' for the
  socket used to communicate with the credential-cache daemon 
  moved to '~/.cache/git/credential/socket'.
* now avoid blindly falling back to '.git' when the setup
  sequence indicated otherwise
* many workflow features, improvements and bug fixes
* add a hardened implementation of SHA1 in response to practical
  collision attacks (CVE-2005-4900, bsc#1042640)
* CVE-2017-8386: On a server running git-shell as login shell to
  restrict user to git commands, remote users may have been able
  to have git service programs spawn an interactive pager
  and thus escape the shell restrictions. (bsc#1038395)

Changes in pcre2:

- Include the libraries, development and tools packages.
  
  git uses only libpcre2-8 so far, but this allows further
  application usage of pcre2.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-14"/>
	<updated date="2020-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167890">SUSE bug 1167890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5260">CVE-2020-5260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531808" comment="git-core-2.26.0-27.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531810" comment="libpcre2-16-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531811" comment="libpcre2-32-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531812" comment="libpcre2-8-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531813" comment="libpcre2-posix2-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531814" comment="perl-CGI-4.38-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149020" version="1" class="patch">
	<metadata>
		<title>Security update for fwupdate (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008600.html" source="SUSE-SU"/>
		<description>
This update for fwupdate fixes the following issues:

- Add SBAT section to EFI images (bsc#1182057)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-08"/>
	<updated date="2021-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538834" comment="fwupdate-0.5-10.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538835" comment="fwupdate-efi-0.5-10.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538836" comment="libfwup0-0.5-10.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149021" version="1" class="patch">
	<metadata>
		<title>Security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1159133" ref_url="https://bugzilla.suse.com/1159133" source="BUGZILLA"/>
		<reference ref_id="1184221" ref_url="https://bugzilla.suse.com/1184221" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12420" ref_url="https://www.suse.com/security/cve/CVE-2019-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-1946" ref_url="https://www.suse.com/security/cve/CVE-2020-1946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008613.html" source="SUSE-SU"/>
		<description>
This update for spamassassin fixes the following issues:

- spamassassin was updated to version 3.4.5
- CVE-2019-12420: memory leak via crafted messages (bsc#1159133)
- CVE-2020-1946: security update (bsc#1184221)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-12"/>
	<updated date="2021-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159133">SUSE bug 1159133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184221">SUSE bug 1184221</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12420/">CVE-2019-12420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12420">CVE-2019-12420 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1946/">CVE-2020-1946 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1946">CVE-2020-1946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552206" comment="perl-Mail-SpamAssassin-3.4.5-44.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552207" comment="spamassassin-3.4.5-44.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149022" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionpack-4_2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1159548" ref_url="https://bugzilla.suse.com/1159548" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008616.html" source="SUSE-SU"/>
		<description>
This update for rubygem-actionpack-4_2 fixes the following issues:

- CVE-2019-16782: Possible Information Leak / Session Hijack Vulnerability in Rack (bsc#1159548)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-13"/>
	<updated date="2021-04-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159548">SUSE bug 1159548</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">CVE-2019-16782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597702" comment="ruby2.1-rubygem-actionpack-4_2-4.2.9-7.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149023" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1180128" ref_url="https://bugzilla.suse.com/1180128" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008639.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-3472: XChangeFeedbackControl Integer Underflow Privilege Escalation (bsc#1180128)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180128">SUSE bug 1180128</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3472">CVE-2021-3472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552208" comment="xorg-x11-server-7.6_1.18.3-76.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552209" comment="xorg-x11-server-extra-7.6_1.18.3-76.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149024" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1181256" ref_url="https://bugzilla.suse.com/1181256" source="BUGZILLA"/>
		<reference ref_id="1184532" ref_url="https://bugzilla.suse.com/1184532" source="BUGZILLA"/>
		<reference ref_id="1184533" ref_url="https://bugzilla.suse.com/1184533" source="BUGZILLA"/>
		<reference ref_id="1184534" ref_url="https://bugzilla.suse.com/1184534" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-1252" ref_url="https://www.suse.com/security/cve/CVE-2021-1252/" source="CVE"/>
		<reference ref_id="CVE-2021-1404" ref_url="https://www.suse.com/security/cve/CVE-2021-1404/" source="CVE"/>
		<reference ref_id="CVE-2021-1405" ref_url="https://www.suse.com/security/cve/CVE-2021-1405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008638.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2021-1252: Fix for Excel XLM parser infinite loop. (bsc#1184532)
- CVE-2021-1404: Fix for PDF parser buffer over-read; possible crash. (bsc#1184533)
- CVE-2021-1405: Fix for mail parser NULL-dereference crash. (bsc#1184534)
- Fix errors when scanning files &gt; 4G (bsc#1181256)
- Update clamav.keyring
- Update to 0.103.2
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181256">SUSE bug 1181256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184532">SUSE bug 1184532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184533">SUSE bug 1184533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184534">SUSE bug 1184534</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1252/">CVE-2021-1252 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1252">CVE-2021-1252 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1404/">CVE-2021-1404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1404">CVE-2021-1404 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1405/">CVE-2021-1405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1405">CVE-2021-1405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552210" comment="clamav-0.103.2-33.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149025" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1172383" ref_url="https://bugzilla.suse.com/1172383" source="BUGZILLA"/>
		<reference ref_id="1172384" ref_url="https://bugzilla.suse.com/1172384" source="BUGZILLA"/>
		<reference ref_id="1172385" ref_url="https://bugzilla.suse.com/1172385" source="BUGZILLA"/>
		<reference ref_id="1172386" ref_url="https://bugzilla.suse.com/1172386" source="BUGZILLA"/>
		<reference ref_id="1172478" ref_url="https://bugzilla.suse.com/1172478" source="BUGZILLA"/>
		<reference ref_id="1173612" ref_url="https://bugzilla.suse.com/1173612" source="BUGZILLA"/>
		<reference ref_id="1174386" ref_url="https://bugzilla.suse.com/1174386" source="BUGZILLA"/>
		<reference ref_id="1174641" ref_url="https://bugzilla.suse.com/1174641" source="BUGZILLA"/>
		<reference ref_id="1175441" ref_url="https://bugzilla.suse.com/1175441" source="BUGZILLA"/>
		<reference ref_id="1176673" ref_url="https://bugzilla.suse.com/1176673" source="BUGZILLA"/>
		<reference ref_id="1176682" ref_url="https://bugzilla.suse.com/1176682" source="BUGZILLA"/>
		<reference ref_id="1176684" ref_url="https://bugzilla.suse.com/1176684" source="BUGZILLA"/>
		<reference ref_id="1178174" ref_url="https://bugzilla.suse.com/1178174" source="BUGZILLA"/>
		<reference ref_id="1178934" ref_url="https://bugzilla.suse.com/1178934" source="BUGZILLA"/>
		<reference ref_id="1179467" ref_url="https://bugzilla.suse.com/1179467" source="BUGZILLA"/>
		<reference ref_id="1179468" ref_url="https://bugzilla.suse.com/1179468" source="BUGZILLA"/>
		<reference ref_id="1180523" ref_url="https://bugzilla.suse.com/1180523" source="BUGZILLA"/>
		<reference ref_id="1181108" ref_url="https://bugzilla.suse.com/1181108" source="BUGZILLA"/>
		<reference ref_id="1181639" ref_url="https://bugzilla.suse.com/1181639" source="BUGZILLA"/>
		<reference ref_id="1182137" ref_url="https://bugzilla.suse.com/1182137" source="BUGZILLA"/>
		<reference ref_id="1182425" ref_url="https://bugzilla.suse.com/1182425" source="BUGZILLA"/>
		<reference ref_id="1182577" ref_url="https://bugzilla.suse.com/1182577" source="BUGZILLA"/>
		<reference ref_id="1182968" ref_url="https://bugzilla.suse.com/1182968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11947" ref_url="https://www.suse.com/security/cve/CVE-2020-11947/" source="CVE"/>
		<reference ref_id="CVE-2020-12829" ref_url="https://www.suse.com/security/cve/CVE-2020-12829/" source="CVE"/>
		<reference ref_id="CVE-2020-13361" ref_url="https://www.suse.com/security/cve/CVE-2020-13361/" source="CVE"/>
		<reference ref_id="CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362/" source="CVE"/>
		<reference ref_id="CVE-2020-13659" ref_url="https://www.suse.com/security/cve/CVE-2020-13659/" source="CVE"/>
		<reference ref_id="CVE-2020-13765" ref_url="https://www.suse.com/security/cve/CVE-2020-13765/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-15469" ref_url="https://www.suse.com/security/cve/CVE-2020-15469/" source="CVE"/>
		<reference ref_id="CVE-2020-15863" ref_url="https://www.suse.com/security/cve/CVE-2020-15863/" source="CVE"/>
		<reference ref_id="CVE-2020-16092" ref_url="https://www.suse.com/security/cve/CVE-2020-16092/" source="CVE"/>
		<reference ref_id="CVE-2020-25084" ref_url="https://www.suse.com/security/cve/CVE-2020-25084/" source="CVE"/>
		<reference ref_id="CVE-2020-25624" ref_url="https://www.suse.com/security/cve/CVE-2020-25624/" source="CVE"/>
		<reference ref_id="CVE-2020-25625" ref_url="https://www.suse.com/security/cve/CVE-2020-25625/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-27617" ref_url="https://www.suse.com/security/cve/CVE-2020-27617/" source="CVE"/>
		<reference ref_id="CVE-2020-28916" ref_url="https://www.suse.com/security/cve/CVE-2020-28916/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29443" ref_url="https://www.suse.com/security/cve/CVE-2020-29443/" source="CVE"/>
		<reference ref_id="CVE-2021-20181" ref_url="https://www.suse.com/security/cve/CVE-2021-20181/" source="CVE"/>
		<reference ref_id="CVE-2021-20203" ref_url="https://www.suse.com/security/cve/CVE-2021-20203/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-3416" ref_url="https://www.suse.com/security/cve/CVE-2021-3416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- Fix OOB access in sm501 device emulation (CVE-2020-12829, bsc#1172385)
- Fix OOB access possibility in MegaRAID SAS 8708EM2 emulation (CVE-2020-13362 bsc#1172383)
- Fix use-after-free in usb xhci packet handling (CVE-2020-25723, bsc#1178934)
- Fix use-after-free in usb ehci packet handling (CVE-2020-25084, bsc#1176673)
- Fix OOB access in usb hcd-ohci emulation (CVE-2020-25624, bsc#1176682)
- Fix infinite loop (DoS) in usb hcd-ohci emulation (CVE-2020-25625, bsc#1176684)
- Fix guest triggerable assert in shared network handling code (CVE-2020-27617, bsc#1178174)
- Fix infinite loop (DoS) in e1000e device emulation (CVE-2020-28916, bsc#1179468)
- Fix OOB access in atapi emulation (CVE-2020-29443, bsc#1181108)
- Fix null pointer deref. (DoS) in mmio ops (CVE-2020-15469, bsc#1173612)
- Fix infinite loop (DoS) in e1000 device emulation (CVE-2021-20257, bsc#1182577)
- Fix OOB access (stack overflow) in rtl8139 NIC emulation (CVE-2021-3416, bsc#1182968)
- Fix OOB access (stack overflow) in other NIC emulations (CVE-2021-3416)
- Fix OOB access in SLIRP ARP packet processing (CVE-2020-29130, bsc#1179467)
- Fix null pointer dereference possibility (DoS) in MegaRAID SAS 8708EM2 emulation (CVE-2020-13659 bsc#1172386
- Fix OOB access in iscsi (CVE-2020-11947 bsc#1180523)
- Fix OOB access in vmxnet3 emulation (CVE-2021-20203 bsc#1181639)
- Fix buffer overflow in the XGMAC device (CVE-2020-15863, bsc#1174386)
- Fix DoS in packet processing of various emulated NICs (CVE-2020-16092 bsc#1174641)
- Fix OOB access while processing USB packets (CVE-2020-14364 bsc#1175441)
- Fix package scripts to not use hard coded paths for temporary working directories and log files (bsc#1182425)
- Fix potential privilege escalation in virtfs (CVE-2021-20181 bsc#1182137)
- Fix OOB access possibility in ES1370 audio device emulation (CVE-2020-13361 bsc#1172384)
- Fix OOB access in ROM loading (CVE-2020-13765 bsc#1172478)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-16"/>
	<updated date="2021-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172383">SUSE bug 1172383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172384">SUSE bug 1172384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172385">SUSE bug 1172385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172386">SUSE bug 1172386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172478">SUSE bug 1172478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173612">SUSE bug 1173612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174386">SUSE bug 1174386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174641">SUSE bug 1174641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175441">SUSE bug 1175441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176673">SUSE bug 1176673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176682">SUSE bug 1176682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176684">SUSE bug 1176684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178174">SUSE bug 1178174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178934">SUSE bug 1178934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179468">SUSE bug 1179468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180523">SUSE bug 1180523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181108">SUSE bug 1181108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181639">SUSE bug 1181639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182137">SUSE bug 1182137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182425">SUSE bug 1182425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182577">SUSE bug 1182577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182968">SUSE bug 1182968</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11947/">CVE-2020-11947 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11947">CVE-2020-11947 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12829/">CVE-2020-12829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12829">CVE-2020-12829 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13361/">CVE-2020-13361 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13361">CVE-2020-13361 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13362">CVE-2020-13362 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13659/">CVE-2020-13659 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13659">CVE-2020-13659 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13765/">CVE-2020-13765 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13765">CVE-2020-13765 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15469/">CVE-2020-15469 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15469">CVE-2020-15469 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15863/">CVE-2020-15863 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15863">CVE-2020-15863 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16092/">CVE-2020-16092 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16092">CVE-2020-16092 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25084/">CVE-2020-25084 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25084">CVE-2020-25084 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25624/">CVE-2020-25624 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25624">CVE-2020-25624 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25625/">CVE-2020-25625 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25625">CVE-2020-25625 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25723">CVE-2020-25723 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27617/">CVE-2020-27617 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27617">CVE-2020-27617 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28916/">CVE-2020-28916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28916">CVE-2020-28916 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29443/">CVE-2020-29443 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29443">CVE-2020-29443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20181/">CVE-2021-20181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20181">CVE-2021-20181 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20203/">CVE-2021-20203 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20203">CVE-2021-20203 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3416/">CVE-2021-3416 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3416">CVE-2021-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555875" comment="qemu-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555876" comment="qemu-block-curl-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555877" comment="qemu-block-iscsi-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538845" comment="qemu-block-rbd-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555878" comment="qemu-block-ssh-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555879" comment="qemu-guest-agent-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538848" comment="qemu-ipxe-1.0.0+-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538849" comment="qemu-kvm-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555880" comment="qemu-lang-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538852" comment="qemu-seabios-1.10.2_0_g5f4c7b1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538853" comment="qemu-sgabios-8-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555881" comment="qemu-tools-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538855" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538856" comment="qemu-x86-2.9.1-6.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149026" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1182431" ref_url="https://bugzilla.suse.com/1182431" source="BUGZILLA"/>
		<reference ref_id="1182846" ref_url="https://bugzilla.suse.com/1182846" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-27379" ref_url="https://www.suse.com/security/cve/CVE-2021-27379/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008654.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-20257: xen: infinite loop issue in the e1000 NIC emulator (bsc#1182846).
- CVE-2021-27379: Fixed an issue where entries in the IOMMU were not being updated 
  under certain circumstances due to improper backport of XSA-321 (XSA-366, bsc#1182431).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-19"/>
	<updated date="2021-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182431">SUSE bug 1182431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27379/">CVE-2021-27379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27379">CVE-2021-27379 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538857" comment="xen-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538858" comment="xen-doc-html-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538859" comment="xen-libs-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538860" comment="xen-libs-32bit-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538861" comment="xen-tools-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538862" comment="xen-tools-domU-4.9.4_16-3.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149027" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1183936" ref_url="https://bugzilla.suse.com/1183936" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008663.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- L3: Tenable Scan reports sudo is vulnerable to CVE-2021-3156 (bsc#1183936)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183936">SUSE bug 1183936</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3156">CVE-2021-3156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555882" comment="sudo-1.8.20p2-3.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149028" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1184960" ref_url="https://bugzilla.suse.com/1184960" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.10.0 ESR (bsc#1184960)
  * CVE-2021-23994: Out of bound write due to lazy initialization
  * CVE-2021-23995: Use-after-free in Responsive Design Mode
  * CVE-2021-23998: Secure Lock icon could have been spoofed
  * CVE-2021-23961: More internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23999: Blob URLs may have been granted additional privileges
  * CVE-2021-24002: Arbitrary FTP command execution on FTP servers using an encoded URL
  * CVE-2021-29945: Incorrect size computation in WebAssembly JIT could lead to null-reads
  * CVE-2021-29946: Port blocking could be bypassed
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-27"/>
	<updated date="2021-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23961">CVE-2021-23961 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23994">CVE-2021-23994 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23995">CVE-2021-23995 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23998">CVE-2021-23998 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23999">CVE-2021-23999 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24002">CVE-2021-24002 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29945">CVE-2021-29945 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29946">CVE-2021-29946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552225" comment="MozillaFirefox-78.10.0-112.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552226" comment="MozillaFirefox-devel-78.10.0-112.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552227" comment="MozillaFirefox-translations-common-78.10.0-112.57.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149029" version="1" class="patch">
	<metadata>
		<title>Security update for libnettle (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1183835" ref_url="https://bugzilla.suse.com/1183835" source="BUGZILLA"/>
		<reference ref_id="1184401" ref_url="https://bugzilla.suse.com/1184401" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20305" ref_url="https://www.suse.com/security/cve/CVE-2021-20305/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008682.html" source="SUSE-SU"/>
		<description>
This update for libnettle fixes the following issues:

- CVE-2021-20305: Fixed the multiply function which was being called with out-of-range scalars (bsc#1184401, bsc#1183835).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183835">SUSE bug 1183835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184401">SUSE bug 1184401</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20305/">CVE-2021-20305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20305">CVE-2021-20305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552228" comment="libhogweed2-2.7.1-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538876" comment="libhogweed2-32bit-2.7.1-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552229" comment="libnettle4-2.7.1-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538878" comment="libnettle4-32bit-2.7.1-13.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149030" version="1" class="patch">
	<metadata>
		<title>Security update for gdm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1184456" ref_url="https://bugzilla.suse.com/1184456" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008681.html" source="SUSE-SU"/>
		<description>
This update for gdm fixes the following issues:

-  Avoid the signal SIGTRAP when gdm exits (bsc#1184456).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184456">SUSE bug 1184456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552230" comment="gdm-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538880" comment="gdm-lang-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538881" comment="gdmflexiserver-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552231" comment="libgdm1-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552232" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149031" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1182909" ref_url="https://bugzilla.suse.com/1182909" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25329" ref_url="https://www.suse.com/security/cve/CVE-2021-25329/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008703.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2021-25329: Complete fix for CVE-2020-9484 (bsc#1182909)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182909">SUSE bug 1182909</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25329/">CVE-2021-25329 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25329">CVE-2021-25329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538884" comment="tomcat-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538885" comment="tomcat-admin-webapps-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538886" comment="tomcat-docs-webapp-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538887" comment="tomcat-el-3_0-api-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538888" comment="tomcat-javadoc-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538889" comment="tomcat-jsp-2_3-api-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538890" comment="tomcat-lib-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538891" comment="tomcat-servlet-3_1-api-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538892" comment="tomcat-webapps-8.0.53-29.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149032" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008701.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.25 - OpenJDK 7u291 (January 2021 CPU, bsc#1181239)
  * Security fixes
    + JDK-8247619: Improve Direct Buffering of Characters
  * Import of OpenJDK 7 u291 build 1
    + JDK-8254177: (tz) Upgrade time-zone data to tzdata2020b
    + JDK-8254982: (tz) Upgrade time-zone data to tzdata2020c
    + JDK-8255226: (tz) Upgrade time-zone data to tzdata2020d
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552233" comment="java-1_7_0-openjdk-1.7.0.291-43.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552234" comment="java-1_7_0-openjdk-demo-1.7.0.291-43.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552235" comment="java-1_7_0-openjdk-devel-1.7.0.291-43.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552236" comment="java-1_7_0-openjdk-headless-1.7.0.291-43.47.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149033" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1184161" ref_url="https://bugzilla.suse.com/1184161" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25317" ref_url="https://www.suse.com/security/cve/CVE-2021-25317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008713.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2021-25317: ownership of /var/log/cups could allow privilege escalation from lp user to root via symlink attacks (bsc#1184161)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184161">SUSE bug 1184161</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-25317/">CVE-2021-25317 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25317">CVE-2021-25317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552282" comment="cups-1.7.5-20.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552283" comment="cups-client-1.7.5-20.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552284" comment="cups-libs-1.7.5-20.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538900" comment="cups-libs-32bit-1.7.5-20.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149034" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1181495" ref_url="https://bugzilla.suse.com/1181495" source="BUGZILLA"/>
		<reference ref_id="1185345" ref_url="https://bugzilla.suse.com/1185345" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214/" source="CVE"/>
		<reference ref_id="CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215/" source="CVE"/>
		<reference ref_id="CVE-2021-25216" ref_url="https://www.suse.com/security/cve/CVE-2021-25216/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008723.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25214: Fixed a broken inbound incremental zone update (IXFR) which could have caused named to terminate unexpectedly (bsc#1185345).
- CVE-2021-25215: Fixed an assertion check which could have failed while answering queries for DNAME records that required the DNAME to be processed to resolve itself (bsc#1185345).
- CVE-2021-25216: Fixed an issue where policy negotiation can be targeted by a buffer overflow attack (bsc#1185345).
- MD5 warning message using host, dig, nslookup (bind-utils) with FIPS enabled (bsc#1181495).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181495">SUSE bug 1181495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25214">CVE-2021-25214 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25215">CVE-2021-25215 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25216/">CVE-2021-25216 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25216">CVE-2021-25216 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552285" comment="bind-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552286" comment="bind-chrootenv-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538903" comment="bind-doc-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552287" comment="bind-libs-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538905" comment="bind-libs-32bit-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552288" comment="bind-utils-9.9.9P1-63.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149035" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1178469" ref_url="https://bugzilla.suse.com/1178469" source="BUGZILLA"/>
		<reference ref_id="1179156" ref_url="https://bugzilla.suse.com/1179156" source="BUGZILLA"/>
		<reference ref_id="1184677" ref_url="https://bugzilla.suse.com/1184677" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008729.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-20254: Fixed a buffer overrun in sids_to_unixids() (bsc#1184677).
- Avoid free'ing our own pointer in memcache when memcache_trim attempts to reduce cache size (bsc#1179156).
- Adjust smbcacls '--propagate-inheritance' feature to align with upstream (bsc#1178469).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178469">SUSE bug 1178469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179156">SUSE bug 1179156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184677">SUSE bug 1184677</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20254">CVE-2021-20254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555883" comment="libdcerpc-binding0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538908" comment="libdcerpc-binding0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555884" comment="libdcerpc0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538910" comment="libdcerpc0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555885" comment="libndr-krb5pac0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538912" comment="libndr-krb5pac0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555886" comment="libndr-nbt0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538914" comment="libndr-nbt0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555887" comment="libndr-standard0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538916" comment="libndr-standard0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555888" comment="libndr0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538918" comment="libndr0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555889" comment="libnetapi0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538920" comment="libnetapi0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555890" comment="libsamba-credentials0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538922" comment="libsamba-credentials0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555891" comment="libsamba-errors0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538924" comment="libsamba-errors0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555892" comment="libsamba-hostconfig0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538926" comment="libsamba-hostconfig0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555893" comment="libsamba-passdb0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538928" comment="libsamba-passdb0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555894" comment="libsamba-util0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538930" comment="libsamba-util0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555895" comment="libsamdb0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538932" comment="libsamdb0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555896" comment="libsmbclient0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538934" comment="libsmbclient0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555897" comment="libsmbconf0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538936" comment="libsmbconf0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555898" comment="libsmbldap0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538938" comment="libsmbldap0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555899" comment="libtevent-util0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538940" comment="libtevent-util0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555900" comment="libwbclient0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538942" comment="libwbclient0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555901" comment="samba-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555902" comment="samba-client-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538945" comment="samba-client-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538946" comment="samba-doc-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555903" comment="samba-libs-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538948" comment="samba-libs-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555904" comment="samba-winbind-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538950" comment="samba-winbind-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149036" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1184521" ref_url="https://bugzilla.suse.com/1184521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1494-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008929.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2021-3468: avoid infinite loop by handling  HUP event in client_work (bsc#1184521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-03"/>
	<updated date="2021-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184521">SUSE bug 1184521</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3468">CVE-2021-3468 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552289" comment="avahi-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538952" comment="avahi-lang-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552290" comment="avahi-utils-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552291" comment="libavahi-client3-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538955" comment="libavahi-client3-32bit-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552292" comment="libavahi-common3-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538957" comment="libavahi-common3-32bit-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552293" comment="libavahi-core7-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552294" comment="libavahi-glib1-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538960" comment="libavahi-glib1-32bit-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552295" comment="libdns_sd-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538962" comment="libdns_sd-32bit-0.6.32-32.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149037" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="CVE-2020-27619" ref_url="https://www.suse.com/security/cve/CVE-2020-27619/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008779.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Security issues fixed:

- CVE-2020-27619: where Lib/test/multibytecodec_support calls eval() on content retrieved via HTTP. (bsc#1178009)

Other fixes:

- Make sure to close the 'import_failed.map' file after the exception
  has been raised in order to avoid ResourceWarnings when the
  failing import is part of a try...except block
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-17"/>
	<updated date="2021-05-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27619/">CVE-2020-27619 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27619">CVE-2020-27619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552303" comment="libpython3_4m1_0-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552304" comment="python3-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552305" comment="python3-base-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552306" comment="python3-curses-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597573" comment="python3-devel-3.4.10-25.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149038" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1120163" ref_url="https://bugzilla.suse.com/1120163" source="BUGZILLA"/>
		<reference ref_id="1152974" ref_url="https://bugzilla.suse.com/1152974" source="BUGZILLA"/>
		<reference ref_id="1152975" ref_url="https://bugzilla.suse.com/1152975" source="BUGZILLA"/>
		<reference ref_id="1155179" ref_url="https://bugzilla.suse.com/1155179" source="BUGZILLA"/>
		<reference ref_id="1155184" ref_url="https://bugzilla.suse.com/1155184" source="BUGZILLA"/>
		<reference ref_id="1155186" ref_url="https://bugzilla.suse.com/1155186" source="BUGZILLA"/>
		<reference ref_id="1159483" ref_url="https://bugzilla.suse.com/1159483" source="BUGZILLA"/>
		<reference ref_id="1165629" ref_url="https://bugzilla.suse.com/1165629" source="BUGZILLA"/>
		<reference ref_id="1165823" ref_url="https://bugzilla.suse.com/1165823" source="BUGZILLA"/>
		<reference ref_id="1172247" ref_url="https://bugzilla.suse.com/1172247" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1176720" ref_url="https://bugzilla.suse.com/1176720" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177855" ref_url="https://bugzilla.suse.com/1177855" source="BUGZILLA"/>
		<reference ref_id="1177856" ref_url="https://bugzilla.suse.com/1177856" source="BUGZILLA"/>
		<reference ref_id="1178181" ref_url="https://bugzilla.suse.com/1178181" source="BUGZILLA"/>
		<reference ref_id="1178634" ref_url="https://bugzilla.suse.com/1178634" source="BUGZILLA"/>
		<reference ref_id="1179575" ref_url="https://bugzilla.suse.com/1179575" source="BUGZILLA"/>
		<reference ref_id="1182047" ref_url="https://bugzilla.suse.com/1182047" source="BUGZILLA"/>
		<reference ref_id="1182261" ref_url="https://bugzilla.suse.com/1182261" source="BUGZILLA"/>
		<reference ref_id="1182715" ref_url="https://bugzilla.suse.com/1182715" source="BUGZILLA"/>
		<reference ref_id="1182716" ref_url="https://bugzilla.suse.com/1182716" source="BUGZILLA"/>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183022" ref_url="https://bugzilla.suse.com/1183022" source="BUGZILLA"/>
		<reference ref_id="1183069" ref_url="https://bugzilla.suse.com/1183069" source="BUGZILLA"/>
		<reference ref_id="1183593" ref_url="https://bugzilla.suse.com/1183593" source="BUGZILLA"/>
		<reference ref_id="1184120" ref_url="https://bugzilla.suse.com/1184120" source="BUGZILLA"/>
		<reference ref_id="1184167" ref_url="https://bugzilla.suse.com/1184167" source="BUGZILLA"/>
		<reference ref_id="1184168" ref_url="https://bugzilla.suse.com/1184168" source="BUGZILLA"/>
		<reference ref_id="1184194" ref_url="https://bugzilla.suse.com/1184194" source="BUGZILLA"/>
		<reference ref_id="1184198" ref_url="https://bugzilla.suse.com/1184198" source="BUGZILLA"/>
		<reference ref_id="1184208" ref_url="https://bugzilla.suse.com/1184208" source="BUGZILLA"/>
		<reference ref_id="1184211" ref_url="https://bugzilla.suse.com/1184211" source="BUGZILLA"/>
		<reference ref_id="1184391" ref_url="https://bugzilla.suse.com/1184391" source="BUGZILLA"/>
		<reference ref_id="1184393" ref_url="https://bugzilla.suse.com/1184393" source="BUGZILLA"/>
		<reference ref_id="1184397" ref_url="https://bugzilla.suse.com/1184397" source="BUGZILLA"/>
		<reference ref_id="1184509" ref_url="https://bugzilla.suse.com/1184509" source="BUGZILLA"/>
		<reference ref_id="1184583" ref_url="https://bugzilla.suse.com/1184583" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1185248" ref_url="https://bugzilla.suse.com/1185248" source="BUGZILLA"/>
		<reference ref_id="1185555" ref_url="https://bugzilla.suse.com/1185555" source="BUGZILLA"/>
		<reference ref_id="1185556" ref_url="https://bugzilla.suse.com/1185556" source="BUGZILLA"/>
		<reference ref_id="1185557" ref_url="https://bugzilla.suse.com/1185557" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0433" ref_url="https://www.suse.com/security/cve/CVE-2020-0433/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-27673" ref_url="https://www.suse.com/security/cve/CVE-2020-27673/" source="CVE"/>
		<reference ref_id="CVE-2020-36312" ref_url="https://www.suse.com/security/cve/CVE-2020-36312/" source="CVE"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-20219" ref_url="https://www.suse.com/security/cve/CVE-2021-20219/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28038" ref_url="https://www.suse.com/security/cve/CVE-2021-28038/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950/" source="CVE"/>
		<reference ref_id="CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-29264" ref_url="https://www.suse.com/security/cve/CVE-2021-29264/" source="CVE"/>
		<reference ref_id="CVE-2021-29265" ref_url="https://www.suse.com/security/cve/CVE-2021-29265/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-36312: Fixed an issue in virt/kvm/kvm_main.c that had a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure (bnc#1184509).
- CVE-2021-29650: Fixed an issue inside the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).
- CVE-2020-27673: Fixed an issue in Xen where a guest OS users could have caused a denial of service (host OS hang) via a high rate of events to dom0 (bnc#1177411, bnc#1184583).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bnc#1184391).
- CVE-2020-25673: Fixed NFC endless loops caused by repeated llcp_sock_connect() (bsc#1178181).
- CVE-2020-25672: Fixed NFC memory leak in llcp_sock_connect() (bsc#1178181).
- CVE-2020-25671: Fixed NFC refcount leak in llcp_sock_connect() (bsc#1178181).
- CVE-2020-25670: Fixed NFC refcount leak in llcp_sock_bind() (bsc#1178181).
- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h where a 'stall on CPU' could have occured because a retry loop continually finds the same bad inode (bnc#1184194, bnc#1184211).
- CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bnc#1184211).
- CVE-2021-30002: Fixed a memory leak issue when a webcam device exists (bnc#1184120).
- CVE-2021-3483: Fixed a use-after-free bug in nosy_ioctl() (bsc#1184393).
- CVE-2021-20219: Fixed a denial of service vulnerability in drivers/tty/n_tty.c of the Linux kernel. In this flaw a local attacker with a normal user privilege could have delayed the loop and cause a threat to the system availability (bnc#1184397).
- CVE-2021-29265: Fixed an issue in usbip_sockfd_store in drivers/usb/usbip/stub_dev.c that allowed attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status (bnc#1184167).
- CVE-2021-29264: Fixed an issue in drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver that allowed attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled (bnc#1184168).
- CVE-2021-28972: Fixed an issue in drivers/pci/hotplug/rpadlpar_sysfs.c where the RPA PCI Hotplug driver had a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\0' termination (bnc#1184198).
- CVE-2021-28660: Fixed rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c that allowed writing beyond the end of the ssid array (bnc#1183593).
- CVE-2020-0433: Fixed blk_mq_queue_tag_busy_iter of blk-mq-tag.c, where a possible use after free due to improper locking could have happened. This could have led to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1176720).
- CVE-2021-28038: Fixed an issue with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931 (bnc#1183022, bnc#1183069).
- CVE-2021-27365: Fixed an issue inside the iSCSI data structures that does not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bnc#1182715).
- CVE-2021-27363: Fixed an issue with a kernel pointer leak that could have been used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables (bnc#1182716).
- CVE-2021-27364: Fixed an issue in drivers/scsi/scsi_transport_iscsi.c where an unprivileged user can craft Netlink messages (bnc#1182717).
- CVE-2020-1749: Fixed a flaw inside of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality (bnc#1165629).

The following non-security bugs were fixed:

- bluetooth: eliminate the potential race condition when removing the HCI controller (bsc#1184611).
- Btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).
- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).
- btrfs: Cleanup try_flush_qgroup (bsc#1182047).
- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: drop unused parameter qgroup_reserved (bsc#1182261).
- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1182261).
- btrfs: fix qgroup_free wrong num_bytes in btrfs_subvolume_reserve_metadata (bsc#1182261).
- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).
- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).
- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).
- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).
- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).
- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).
- btrfs: qgroup: Do not hold qgroup_ioctl_lock in btrfs_qgroup_inherit() (bsc#1165823).
- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).
- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).
- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).
- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).
- btrfs: qgroup: Fix reserved data space leak if we have multiple reserve calls (bsc#1152975).
- btrfs: qgroup: Fix the wrong target io_tree when freeing reserved data space (bsc#1152974).
- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).
- btrfs: qgroup: mark qgroup inconsistent if we're inherting snapshot to a new qgroup (bsc#1165823).
- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).
- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).
- btrfs: remove unused parameter from btrfs_subvolume_release_metadata (bsc#1182261).
- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).
- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- hv_netvsc: remove ndo_poll_controller (bsc#1185248).
- KVM: Add proper lockdep assertion in I/O bus unregister (bsc#1185555).
- KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU (bsc#1185556).
- KVM: Stop looking for coalesced MMIO zones if the bus is destroyed (bsc#1185557).
- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).
- Xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-18"/>
	<updated date="2021-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120163">SUSE bug 1120163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152974">SUSE bug 1152974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152975">SUSE bug 1152975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155179">SUSE bug 1155179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155184">SUSE bug 1155184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155186">SUSE bug 1155186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159483">SUSE bug 1159483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165629">SUSE bug 1165629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165823">SUSE bug 1165823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172247">SUSE bug 1172247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176720">SUSE bug 1176720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177855">SUSE bug 1177855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177856">SUSE bug 1177856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178634">SUSE bug 1178634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179575">SUSE bug 1179575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182047">SUSE bug 1182047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182261">SUSE bug 1182261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183069">SUSE bug 1183069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183593">SUSE bug 1183593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184120">SUSE bug 1184120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184167">SUSE bug 1184167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184168">SUSE bug 1184168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184194">SUSE bug 1184194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184393">SUSE bug 1184393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184397">SUSE bug 1184397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184509">SUSE bug 1184509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184583">SUSE bug 1184583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185248">SUSE bug 1185248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185555">SUSE bug 1185555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185556">SUSE bug 1185556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185557">SUSE bug 1185557</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0433/">CVE-2020-0433 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0433">CVE-2020-0433 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25670">CVE-2020-25670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25671">CVE-2020-25671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25672">CVE-2020-25672 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25673">CVE-2020-25673 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27673/">CVE-2020-27673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27673">CVE-2020-27673 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36312/">CVE-2020-36312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36312">CVE-2020-36312 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20219/">CVE-2021-20219 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20219">CVE-2021-20219 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28038/">CVE-2021-28038 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28038">CVE-2021-28038 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28660">CVE-2021-28660 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28950">CVE-2021-28950 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28972">CVE-2021-28972 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29264/">CVE-2021-29264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29264">CVE-2021-29264 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29265/">CVE-2021-29265 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29265">CVE-2021-29265 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29650">CVE-2021-29650 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30002">CVE-2021-30002 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3483">CVE-2021-3483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555905" comment="kernel-default-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555906" comment="kernel-default-base-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555907" comment="kernel-default-devel-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556949" comment="kernel-default-kgraft-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538972" comment="kernel-devel-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538973" comment="kernel-macros-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538974" comment="kernel-source-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555908" comment="kernel-syms-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556951" comment="kgraft-patch-4_4_180-94_144-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149039" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1185900" ref_url="https://bugzilla.suse.com/1185900" source="BUGZILLA"/>
		<reference ref_id="1185904" ref_url="https://bugzilla.suse.com/1185904" source="BUGZILLA"/>
		<reference ref_id="1185905" ref_url="https://bugzilla.suse.com/1185905" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18804" ref_url="https://www.suse.com/security/cve/CVE-2019-18804/" source="CVE"/>
		<reference ref_id="CVE-2021-32491" ref_url="https://www.suse.com/security/cve/CVE-2021-32491/" source="CVE"/>
		<reference ref_id="CVE-2021-32492" ref_url="https://www.suse.com/security/cve/CVE-2021-32492/" source="CVE"/>
		<reference ref_id="CVE-2021-32493" ref_url="https://www.suse.com/security/cve/CVE-2021-32493/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008794.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

Security issues fixed:

- CVE-2021-32491 [bsc#1185900]: Integer overflow in function render() in tools/ddjvu via crafted djvu file
- CVE-2021-32492 [bsc#1185904]: Out of bounds read in function DJVU:DataPool:has_data() via crafted djvu file
- CVE-2021-32493 [bsc#1185905]: Heap buffer overflow in function DJVU:GBitmap:decode() via crafted djvu file
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185900">SUSE bug 1185900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185904">SUSE bug 1185904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185905">SUSE bug 1185905</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18804/">CVE-2019-18804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18804">CVE-2019-18804 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32491/">CVE-2021-32491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32491">CVE-2021-32491 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32492/">CVE-2021-32492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32492">CVE-2021-32492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32493/">CVE-2021-32493 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32493">CVE-2021-32493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552307" comment="libdjvulibre21-3.5.25.3-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149040" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1185833" ref_url="https://bugzilla.suse.com/1185833" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-18032" ref_url="https://www.suse.com/security/cve/CVE-2020-18032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008793.html" source="SUSE-SU"/>
		<description>
This update for graphviz fixes the following issues:

- CVE-2020-18032: Fixed possible remote code execution via buffer overflow (bsc#1185833).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185833">SUSE bug 1185833</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-18032/">CVE-2020-18032 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18032">CVE-2020-18032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552308" comment="graphviz-2.28.0-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552309" comment="graphviz-gd-2.28.0-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552310" comment="graphviz-gnome-2.28.0-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552311" comment="graphviz-tcl-2.28.0-29.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149041" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionpack-4_2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1185715" ref_url="https://bugzilla.suse.com/1185715" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22885" ref_url="https://www.suse.com/security/cve/CVE-2021-22885/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008791.html" source="SUSE-SU"/>
		<description>
This update for rubygem-actionpack-4_2 fixes the following issues:

- CVE-2021-22885: Fixed possible information disclosure / unintended method execution in Action Pack (bsc#1185715).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185715">SUSE bug 1185715</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22885/">CVE-2021-22885 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22885">CVE-2021-22885 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597703" comment="ruby2.1-rubygem-actionpack-4_2-4.2.9-7.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149042" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="1185698" ref_url="https://bugzilla.suse.com/1185698" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008798.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:

CVE-2021-3537: NULL pointer dereference in valid.c:xmlValidBuildAContentModel (bsc#1185698)
- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in entities.c:xmlEncodeEntitiesInternal (bsc#1185409).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185698">SUSE bug 1185698</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">CVE-2021-3537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552312" comment="libxml2-2-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538983" comment="libxml2-2-32bit-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538984" comment="libxml2-doc-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552313" comment="libxml2-tools-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552314" comment="python-libxml2-2.9.4-46.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149043" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1176076" ref_url="https://bugzilla.suse.com/1176076" source="BUGZILLA"/>
		<reference ref_id="1177077" ref_url="https://bugzilla.suse.com/1177077" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681/" source="CVE"/>
		<reference ref_id="CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682/" source="CVE"/>
		<reference ref_id="CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683/" source="CVE"/>
		<reference ref_id="CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684/" source="CVE"/>
		<reference ref_id="CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685/" source="CVE"/>
		<reference ref_id="CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686/" source="CVE"/>
		<reference ref_id="CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- bsc#1177077: Fixed DNSpooq vulnerabilities
- CVE-2020-25684, CVE-2020-25685, CVE-2020-25686:
  Fixed multiple Cache Poisoning attacks.
- CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687:
  Fixed multiple potential Heap-based overflows when DNSSEC is
  enabled.

- Retry query to other servers on receipt of SERVFAIL rcode
  (bsc#1176076)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-19"/>
	<updated date="2021-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176076">SUSE bug 1176076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25681">CVE-2020-25681 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25682">CVE-2020-25682 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25683">CVE-2020-25683 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25684">CVE-2020-25684 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25685">CVE-2020-25685 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25686">CVE-2020-25686 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25687">CVE-2020-25687 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531824" comment="dnsmasq-2.78-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597574" comment="dnsmasq-utils-2.78-18.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149044" version="1" class="patch">
	<metadata>
		<title>Security update for flac (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1180099" ref_url="https://bugzilla.suse.com/1180099" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0499" ref_url="https://www.suse.com/security/cve/CVE-2020-0499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008132.html" source="SUSE-SU"/>
		<description>
This update for flac fixes the following issues:

- CVE-2020-0499: Fixed an out-of-bounds access (bsc#1180099).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180099">SUSE bug 1180099</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0499/">CVE-2020-0499 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0499">CVE-2020-0499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531825" comment="libFLAC++6-1.3.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531826" comment="libFLAC8-1.3.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531827" comment="libFLAC8-32bit-1.3.0-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149045" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1180405" ref_url="https://bugzilla.suse.com/1180405" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24386" ref_url="https://www.suse.com/security/cve/CVE-2020-24386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008134.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2020-24386: Fixed an issue with IMAP hibernation that allowed users to access other users' emails (bsc#1180405).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180405">SUSE bug 1180405</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24386/">CVE-2020-24386 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24386">CVE-2020-24386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531828" comment="dovecot22-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531829" comment="dovecot22-backend-mysql-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531830" comment="dovecot22-backend-pgsql-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531831" comment="dovecot22-backend-sqlite-2.2.31-19.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149046" version="1" class="patch">
	<metadata>
		<title>Security update for python-httplib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1171998" ref_url="https://bugzilla.suse.com/1171998" source="BUGZILLA"/>
		<reference ref_id="1182053" ref_url="https://bugzilla.suse.com/1182053" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11078" ref_url="https://www.suse.com/security/cve/CVE-2020-11078/" source="CVE"/>
		<reference ref_id="CVE-2021-21240" ref_url="https://www.suse.com/security/cve/CVE-2021-21240/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019148.html" source="SUSE-SU"/>
		<description>
This update for python-httplib2 contains the following fixes:

Security fixes included in this update:
- CVE-2021-21240: Fixed a regular expression denial of service via malicious header (bsc#1182053).
- CVE-2020-11078: Fixed an issue where an attacker could change request headers and body (bsc#1171998).

Non security fixes included in this update:
- Update in SLE to 0.19.0 (bsc#1182053, CVE-2021-21240)

- update to 0.19.0:
  * auth: parse headers using pyparsing instead of regexp
  * auth: WSSE token needs to be string not bytes

- update to 0.18.1: (bsc#1171998, CVE-2020-11078)
  * explicit build-backend workaround for pip build isolation bug
  * IMPORTANT security vulnerability CWE-93 CRLF injection
  Force %xx quote of space, CR, LF characters in uri.
  * Ship test suite in source dist

- update to 0.17.3:
  * bugfixes

- Update to 0.17.1
  * python3: no_proxy was not checked with https
  * feature: Http().redirect_codes set, works after follow(_all)_redirects check
    This allows one line workaround for old gcloud library that uses 308
    response without redirect semantics.
  * IMPORTANT cache invalidation change, fix 307 keep method, add 308 Redirects
  * proxy: username/password as str compatible with pysocks
  * python2: regression in connect() error handling
  * add support for password protected certificate files
  * feature: Http.close() to clean persistent connections and sensitive data

- Update to 0.14.0:
  * Python3: PROXY_TYPE_SOCKS5 with str user/pass raised TypeError

- version update to 0.13.1
  0.13.1
   * Python3: Use no_proxy
     https://github.com/httplib2/httplib2/pull/140
  0.13.0
    * Allow setting TLS max/min versions
      https://github.com/httplib2/httplib2/pull/138
  0.12.3
    * No changes to library. Distribute py3 wheels.
  0.12.1
    * Catch socket timeouts and clear dead connection
      https://github.com/httplib2/httplib2/issues/18
      https://github.com/httplib2/httplib2/pull/111
    * Officially support Python 3.7 (package metadata)
      https://github.com/httplib2/httplib2/issues/123
  0.12.0
    * Drop support for Python 3.3
    * ca_certs from environment HTTPLIB2_CA_CERTS or certifi
      https://github.com/httplib2/httplib2/pull/117
    * PROXY_TYPE_HTTP with non-empty user/pass raised TypeError: bytes required
      https://github.com/httplib2/httplib2/pull/115
    * Revert http:443-&gt;https workaround
      https://github.com/httplib2/httplib2/issues/112
    * eliminate connection pool read race
      https://github.com/httplib2/httplib2/pull/110
    * cache: stronger safename
      https://github.com/httplib2/httplib2/pull/101
  0.11.3
    * No changes, just reupload of 0.11.2 after fixing automatic release conditions in Travis.
  0.11.2
    * proxy: py3 NameError basestring
      https://github.com/httplib2/httplib2/pull/100
  0.11.1
    * Fix HTTP(S)ConnectionWithTimeout AttributeError proxy_info
      https://github.com/httplib2/httplib2/pull/97
  0.11.0
    * Add DigiCert Global Root G2 serial 033af1e6a711a9a0bb2864b11d09fae5
      https://github.com/httplib2/httplib2/pull/91
    * python3 proxy support
      https://github.com/httplib2/httplib2/pull/90
    * If no_proxy environment value ends with comma then proxy is not used
      https://github.com/httplib2/httplib2/issues/11
    * fix UnicodeDecodeError using socks5 proxy
      https://github.com/httplib2/httplib2/pull/64
    * Respect NO_PROXY env var in proxy_info_from_url
      https://github.com/httplib2/httplib2/pull/58
    * NO_PROXY=bar was matching foobar (suffix without dot delimiter)
      New behavior matches curl/wget:
      - no_proxy=foo.bar will only skip proxy for exact hostname match
      - no_proxy=.wild.card will skip proxy for any.subdomains.wild.card
      https://github.com/httplib2/httplib2/issues/94
    * Bugfix for Content-Encoding: deflate
      https://stackoverflow.com/a/22311297
- deleted patches
  - httplib2 started to use certifi and this is already bent to
    use system certificate bundle
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-31"/>
	<updated date="2021-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171998">SUSE bug 1171998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182053">SUSE bug 1182053</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11078/">CVE-2020-11078 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11078">CVE-2020-11078 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21240/">CVE-2021-21240 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21240">CVE-2021-21240 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597575" comment="python-httplib2-0.19.0-7.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149047" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1186253" ref_url="https://bugzilla.suse.com/1186253" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3500" ref_url="https://www.suse.com/security/cve/CVE-2021-3500/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008888.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3500: Stack overflow in function DJVU:DjVuDocument:get_djvu_file() via crafted djvu file (bsc#1186253)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-31"/>
	<updated date="2021-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186253">SUSE bug 1186253</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3500/">CVE-2021-3500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3500">CVE-2021-3500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552315" comment="libdjvulibre21-3.5.25.3-5.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149048" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1186382" ref_url="https://bugzilla.suse.com/1186382" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008906.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

- CVE-2021-25217: A buffer overrun in lease file parsing code can be used to exploit a common vulnerability shared by dhcpd and dhclient (bsc#1186382)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-01"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186382">SUSE bug 1186382</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25217">CVE-2021-25217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552316" comment="dhcp-4.3.3-10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552317" comment="dhcp-client-4.3.3-10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552318" comment="dhcp-relay-4.3.3-10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552319" comment="dhcp-server-4.3.3-10.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149049" version="1" class="patch">
	<metadata>
		<title>Security update for libwebp (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1185652" ref_url="https://bugzilla.suse.com/1185652" source="BUGZILLA"/>
		<reference ref_id="1185654" ref_url="https://bugzilla.suse.com/1185654" source="BUGZILLA"/>
		<reference ref_id="1185673" ref_url="https://bugzilla.suse.com/1185673" source="BUGZILLA"/>
		<reference ref_id="1185674" ref_url="https://bugzilla.suse.com/1185674" source="BUGZILLA"/>
		<reference ref_id="1185685" ref_url="https://bugzilla.suse.com/1185685" source="BUGZILLA"/>
		<reference ref_id="1185686" ref_url="https://bugzilla.suse.com/1185686" source="BUGZILLA"/>
		<reference ref_id="1185690" ref_url="https://bugzilla.suse.com/1185690" source="BUGZILLA"/>
		<reference ref_id="1185691" ref_url="https://bugzilla.suse.com/1185691" source="BUGZILLA"/>
		<reference ref_id="1186247" ref_url="https://bugzilla.suse.com/1186247" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25009" ref_url="https://www.suse.com/security/cve/CVE-2018-25009/" source="CVE"/>
		<reference ref_id="CVE-2018-25010" ref_url="https://www.suse.com/security/cve/CVE-2018-25010/" source="CVE"/>
		<reference ref_id="CVE-2018-25011" ref_url="https://www.suse.com/security/cve/CVE-2018-25011/" source="CVE"/>
		<reference ref_id="CVE-2018-25012" ref_url="https://www.suse.com/security/cve/CVE-2018-25012/" source="CVE"/>
		<reference ref_id="CVE-2018-25013" ref_url="https://www.suse.com/security/cve/CVE-2018-25013/" source="CVE"/>
		<reference ref_id="CVE-2020-36329" ref_url="https://www.suse.com/security/cve/CVE-2020-36329/" source="CVE"/>
		<reference ref_id="CVE-2020-36330" ref_url="https://www.suse.com/security/cve/CVE-2020-36330/" source="CVE"/>
		<reference ref_id="CVE-2020-36331" ref_url="https://www.suse.com/security/cve/CVE-2020-36331/" source="CVE"/>
		<reference ref_id="CVE-2020-36332" ref_url="https://www.suse.com/security/cve/CVE-2020-36332/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008911.html" source="SUSE-SU"/>
		<description>
This update for libwebp fixes the following issues:

- CVE-2018-25010: Fixed heap-based buffer overflow in ApplyFilter() (bsc#1185685).
- CVE-2020-36330: Fixed heap-based buffer overflow in ChunkVerifyAndAssign() (bsc#1185691).
- CVE-2020-36332: Fixed extreme memory allocation when reading a file (bsc#1185674).
- CVE-2020-36329: Fixed use-after-free in EmitFancyRGB() (bsc#1185652).
- CVE-2018-25012: Fixed heap-based buffer overflow in GetLE24() (bsc#1185690).
- CVE-2018-25013: Fixed heap-based buffer overflow in ShiftBytes() (bsc#1185654).
- CVE-2020-36331: Fixed heap-based buffer overflow in ChunkAssignData() (bsc#1185686).
- CVE-2018-25009: Fixed heap-based buffer overflow in GetLE16() (bsc#1185673).
- CVE-2018-25011: Fixed fail on multiple image chunks (bsc#1186247).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-02"/>
	<updated date="2021-06-02"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185652">SUSE bug 1185652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185654">SUSE bug 1185654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185673">SUSE bug 1185673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185674">SUSE bug 1185674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185685">SUSE bug 1185685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185686">SUSE bug 1185686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185690">SUSE bug 1185690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185691">SUSE bug 1185691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186247">SUSE bug 1186247</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25009/">CVE-2018-25009 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25009">CVE-2018-25009 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25010/">CVE-2018-25010 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25010">CVE-2018-25010 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25011/">CVE-2018-25011 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25011">CVE-2018-25011 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25012/">CVE-2018-25012 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25012">CVE-2018-25012 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25013/">CVE-2018-25013 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25013">CVE-2018-25013 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36329/">CVE-2020-36329 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36329">CVE-2020-36329 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36330/">CVE-2020-36330 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36330">CVE-2020-36330 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36331/">CVE-2020-36331 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36331">CVE-2020-36331 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36332/">CVE-2020-36332 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36332">CVE-2020-36332 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552333" comment="libwebp5-0.4.3-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538993" comment="libwebp5-32bit-0.4.3-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552334" comment="libwebpdemux1-0.4.3-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597576" comment="libwebpmux1-0.4.3-4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149050" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1186497" ref_url="https://bugzilla.suse.com/1186497" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3560" ref_url="https://www.suse.com/security/cve/CVE-2021-3560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008927.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-3560: Fixed a local privilege escalation using polkit_system_bus_name_get_creds_sync() (bsc#1186497).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-03"/>
	<updated date="2021-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186497">SUSE bug 1186497</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3560/">CVE-2021-3560 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3560">CVE-2021-3560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552335" comment="libpolkit0-0.113-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552336" comment="polkit-0.113-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552337" comment="typelib-1_0-Polkit-1_0-0.113-5.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149051" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1181255" ref_url="https://bugzilla.suse.com/1181255" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008942.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-bad fixes the following issues:

- CVE-2021-3185: Fixed buffer overflow in gst_h264_slice_parse_dec_ref_pic_marking (bsc#1181255).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-07"/>
	<updated date="2021-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181255">SUSE bug 1181255</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3185">CVE-2021-3185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552339" comment="gstreamer-plugins-bad-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539006" comment="gstreamer-plugins-bad-lang-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552340" comment="libgstadaptivedemux-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552341" comment="libgstbadaudio-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552342" comment="libgstbadbase-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552343" comment="libgstbadvideo-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552344" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552345" comment="libgstcodecparsers-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552346" comment="libgstgl-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552347" comment="libgstmpegts-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552348" comment="libgstphotography-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552349" comment="libgsturidownloader-1_0-0-1.8.3-18.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149052" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1185633" ref_url="https://bugzilla.suse.com/1185633" source="BUGZILLA"/>
		<reference ref_id="1186696" ref_url="https://bugzilla.suse.com/1186696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29951" ref_url="https://www.suse.com/security/cve/CVE-2021-29951/" source="CVE"/>
		<reference ref_id="CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008953.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.11.0 ESR (bsc#1186696)

  * CVE-2021-29964: Out of bounds-read when parsing a `WM_COPYDATA` message
  * CVE-2021-29967: Memory safety bugs fixed in Firefox
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185633">SUSE bug 1185633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186696">SUSE bug 1186696</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29951/">CVE-2021-29951 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29951">CVE-2021-29951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29964">CVE-2021-29964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29967">CVE-2021-29967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552350" comment="MozillaFirefox-78.11.0-112.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552351" comment="MozillaFirefox-devel-78.11.0-112.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552352" comment="MozillaFirefox-translations-common-78.11.0-112.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149053" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1186643" ref_url="https://bugzilla.suse.com/1186643" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008951.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Regression in the fix for CVE-2021-31535, causing segfaults for xforms applications like fdesign (bsc#1186643)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186643">SUSE bug 1186643</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31535">CVE-2021-31535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552353" comment="libX11-6-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539021" comment="libX11-6-32bit-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539022" comment="libX11-data-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552354" comment="libX11-xcb1-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539024" comment="libX11-xcb1-32bit-1.6.2-12.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149054" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1094725" ref_url="https://bugzilla.suse.com/1094725" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1172380" ref_url="https://bugzilla.suse.com/1172380" source="BUGZILLA"/>
		<reference ref_id="1172382" ref_url="https://bugzilla.suse.com/1172382" source="BUGZILLA"/>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1178683" ref_url="https://bugzilla.suse.com/1178683" source="BUGZILLA"/>
		<reference ref_id="1178935" ref_url="https://bugzilla.suse.com/1178935" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1181933" ref_url="https://bugzilla.suse.com/1181933" source="BUGZILLA"/>
		<reference ref_id="1182846" ref_url="https://bugzilla.suse.com/1182846" source="BUGZILLA"/>
		<reference ref_id="1182975" ref_url="https://bugzilla.suse.com/1182975" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756/" source="CVE"/>
		<reference ref_id="CVE-2020-13754" ref_url="https://www.suse.com/security/cve/CVE-2020-13754/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-25707" ref_url="https://www.suse.com/security/cve/CVE-2020-25707/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="CVE-2021-20221" ref_url="https://www.suse.com/security/cve/CVE-2021-20221/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-3419" ref_url="https://www.suse.com/security/cve/CVE-2021-3419/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- Fix OOB access during mmio operations (CVE-2020-13754, bsc#1172382)
- Fix out-of-bounds read information disclosure in icmp6_send_echoreply (CVE-2020-10756, bsc#1172380)
- Fix out-of-bound heap buffer access via an interrupt ID field (CVE-2021-20221, bsc#1181933)
- For the record, these issues are fixed in this package already.
  Most are alternate references to previously mentioned issues:
  (CVE-2019-15890, bsc#1149813, CVE-2020-8608, bsc#1163019,
  CVE-2020-14364, bsc#1175534, CVE-2020-25707, bsc#1178683,
  CVE-2020-25723, bsc#1178935, CVE-2020-29130, bsc#1179477,
  CVE-2021-20257, bsc#1182846, CVE-2021-3419, bsc#1182975,
  bsc#1094725)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1094725">SUSE bug 1094725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172380">SUSE bug 1172380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172382">SUSE bug 1172382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178683">SUSE bug 1178683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178935">SUSE bug 1178935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181933">SUSE bug 1181933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182975">SUSE bug 1182975</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10756">CVE-2020-10756 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13754/">CVE-2020-13754 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13754">CVE-2020-13754 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25707/">CVE-2020-25707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-25707">CVE-2020-25707 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25723">CVE-2020-25723 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20221/">CVE-2021-20221 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20221">CVE-2021-20221 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3419/">CVE-2021-3419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3419">CVE-2021-3419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555909" comment="qemu-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555910" comment="qemu-block-curl-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555911" comment="qemu-block-iscsi-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539028" comment="qemu-block-rbd-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555912" comment="qemu-block-ssh-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555913" comment="qemu-guest-agent-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539031" comment="qemu-ipxe-1.0.0+-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539032" comment="qemu-kvm-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555914" comment="qemu-lang-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539035" comment="qemu-seabios-1.10.2_0_g5f4c7b1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539036" comment="qemu-sgabios-8-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555915" comment="qemu-tools-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539038" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539039" comment="qemu-x86-2.9.1-6.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149055" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 75 [bsc#1180063, bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14782 CVE-2020-14781
  CVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class Libraries:
    - Z/OS specific C function send_file is changing the file pointer position
  * Security:
    - Add the new oracle signer certificate
    - Certificate parsing error
    - JVM memory growth can be caused by the IBMPKCS11IMPL crypto provider
    - Remove check for websphere signed jars
    - sessionid.hashcode generates too many collisions
    - The Java 8 IBM certpath provider does not honor the user
      specified system property for CLR connect timeout
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531832" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531834" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531835" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149056" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1181686" ref_url="https://bugzilla.suse.com/1181686" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20201" ref_url="https://www.suse.com/security/cve/CVE-2021-20201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008964.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

- CVE-2021-20201: client initiated renegotiation causing denial of service (bsc#1181686)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181686">SUSE bug 1181686</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20201/">CVE-2021-20201 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20201">CVE-2021-20201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555916" comment="libspice-server1-0.12.8-18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149057" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1179833" ref_url="https://bugzilla.suse.com/1179833" source="BUGZILLA"/>
		<reference ref_id="1179836" ref_url="https://bugzilla.suse.com/1179836" source="BUGZILLA"/>
		<reference ref_id="1179837" ref_url="https://bugzilla.suse.com/1179837" source="BUGZILLA"/>
		<reference ref_id="1179839" ref_url="https://bugzilla.suse.com/1179839" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489/" source="CVE"/>
		<reference ref_id="CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511/" source="CVE"/>
		<reference ref_id="CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512/" source="CVE"/>
		<reference ref_id="CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019273.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20210608 release.

- CVE-2020-24513: A domain bypass transient execution vulnerability was discovered on some Intel Atom processors that use a micro-architectural incident channel. (INTEL-SA-00465 bsc#1179833)

  See also: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html

- CVE-2020-24511: The IBRS feature to mitigate Spectre variant 2 transient execution side channel vulnerabilities may not fully prevent non-root (guest) branches from controlling the branch predictions of the root (host) (INTEL-SA-00464 bsc#1179836)

  See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html)

- CVE-2020-24512: Fixed trivial data value cache-lines such as all-zero value cache-lines may lead to changes in cache-allocation or write-back behavior for such cache-lines (bsc#1179837 INTEL-SA-00464)

  See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html)

- CVE-2020-24489: Fixed Intel VT-d device pass through potential local privilege escalation (INTEL-SA-00442 bsc#1179839)

  See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html

Other fixes:

- Update for functional issues. Refer to [Third Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780)for details.
- Update for functional issues. Refer to [Second Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
- Update for functional issues. Refer to [Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
- Update for functional issues. Refer to [Intel Xeon Processor D-1500, D-1500 NS and D-1600 NS Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-d-1500-specification-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon E7-8800 and E7-4800 v3 Processor Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e7-v3-spec-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
- Update for functional issues. Refer to [10th Gen Intel Core Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
- Update for functional issues. Refer to [8th and 9th Gen Intel Core Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
- Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
- Update for functional issues. Refer to [6th Gen Intel Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
- Update for functional issues. Refer to [Intel Xeon E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

- New platforms:

| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| CLX-SP         | A0       | 06-55-05/b7 |          | 03000010 | Xeon Scalable Gen2
| ICX-SP         | C0       | 06-6a-05/87 |          | 0c0002f0 | Xeon Scalable Gen3
| ICX-SP         | D0       | 06-6a-06/87 |          | 0d0002a0 | Xeon Scalable Gen3
| SNR            | B0       | 06-86-04/01 |          | 0b00000f | Atom P59xxB
| SNR            | B1       | 06-86-05/01 |          | 0b00000f | Atom P59xxB
| TGL            | B1       | 06-8c-01/80 |          | 00000088 | Core Gen11 Mobile
| TGL-R          | C0       | 06-8c-02/c2 |          | 00000016 | Core Gen11 Mobile
| TGL-H          | R0       | 06-8d-01/c2 |          | 0000002c | Core Gen11 Mobile
| EHL            | B1       | 06-96-01/01 |          | 00000011 | Pentium J6426/N6415, Celeron J6412/J6413/N6210/N6211, Atom x6000E
| JSL            | A0/A1    | 06-9c-00/01 |          | 0000001d | Pentium N6000/N6005, Celeron N4500/N4505/N5100/N5105
| RKL-S          | B0       | 06-a7-01/02 |          | 00000040 | Core Gen11

- Updated platforms:

| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000044 | 00000046 | Core Gen4 X series; Xeon E5 v3
| HSX-EX         | E0       | 06-3f-04/80 | 00000016 | 00000019 | Xeon E7 v3
| SKL-U/Y        | D0       | 06-4e-03/c0 | 000000e2 | 000000ea | Core Gen6 Mobile
| SKL-U23e       | K1       | 06-4e-03/c0 | 000000e2 | 000000ea | Core Gen6 Mobile
| BDX-ML         | B0/M0/R0 | 06-4f-01/ef | 0b000038 | 0b00003e | Xeon E5/E7 v4; Core i7-69xx/68xx
| SKX-SP         | B1       | 06-55-03/97 | 01000159 | 0100015b | Xeon Scalable
| SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006a0a | 02006b06 | Xeon Scalable
| SKX-D          | M1       | 06-55-04/b7 | 02006a0a | 02006b06 | Xeon D-21xx
| CLX-SP         | B0       | 06-55-06/bf | 04003006 | 04003102 | Xeon Scalable Gen2
| CLX-SP         | B1       | 06-55-07/bf | 05003006 | 05003102 | Xeon Scalable Gen2
| CPX-SP         | A1       | 06-55-0b/bf | 0700001e | 07002302 | Xeon Scalable Gen3
| BDX-DE         | V2/V3    | 06-56-03/10 | 07000019 | 0700001b | Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
| BDX-DE         | Y0       | 06-56-04/10 | 0f000017 | 0f000019 | Xeon D-1557/59/67/71/77/81/87
| BDX-NS         | A0       | 06-56-05/10 | 0e00000f | 0e000012 | Xeon D-1513N/23/33/43/53
| APL            | D0       | 06-5c-09/03 | 00000040 | 00000044 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
| APL            | E0       | 06-5c-0a/03 | 0000001e | 00000020 | Atom x5-E39xx
| SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000e2 | 000000ea | Core Gen6; Xeon E3 v5
| DNV            | B0       | 06-5f-01/01 | 0000002e | 00000034 | Atom C Series
| GLK            | B0       | 06-7a-01/01 | 00000034 | 00000036 | Pentium Silver N/J5xxx, Celeron N/J4xxx
| GKL-R          | R0       | 06-7a-08/01 | 00000018 | 0000001a | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
| ICL-U/Y        | D1       | 06-7e-05/80 | 000000a0 | 000000a6 | Core Gen10 Mobile
| LKF            | B2/B3    | 06-8a-01/10 | 00000028 | 0000002a | Core w/Hybrid Technology
| AML-Y22        | H0       | 06-8e-09/10 | 000000de | 000000ea | Core Gen8 Mobile
| KBL-U/Y        | H0       | 06-8e-09/c0 | 000000de | 000000ea | Core Gen7 Mobile
| CFL-U43e       | D0       | 06-8e-0a/c0 | 000000e0 | 000000ea | Core Gen8 Mobile
| WHL-U          | W0       | 06-8e-0b/d0 | 000000de | 000000ea | Core Gen8 Mobile
| AML-Y42        | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen10 Mobile
| CML-Y42        | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen10 Mobile
| WHL-U          | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen8 Mobile
| KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000de | 000000ea | Core Gen7; Xeon E3 v6
| CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000de | 000000ea | Core Gen8 Desktop, Mobile, Xeon E
| CFL-S          | B0       | 06-9e-0b/02 | 000000de | 000000ea | Core Gen8
| CFL-H/S        | P0       | 06-9e-0c/22 | 000000de | 000000ea | Core Gen9
| CFL-H          | R0       | 06-9e-0d/22 | 000000de | 000000ea | Core Gen9 Mobile
| CML-H          | R1       | 06-a5-02/20 | 000000e0 | 000000ea | Core Gen10 Mobile
| CML-S62        | G1       | 06-a5-03/22 | 000000e0 | 000000ea | Core Gen10
| CML-S102       | Q0       | 06-a5-05/22 | 000000e0 | 000000ec | Core Gen10
| CML-U62        | A0       | 06-a6-00/80 | 000000e0 | 000000e8 | Core Gen10 Mobile
| CML-U62 V2     | K0       | 06-a6-01/80 | 000000e0 | 000000ea | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-10"/>
	<updated date="2021-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179833">SUSE bug 1179833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179836">SUSE bug 1179836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179837">SUSE bug 1179837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179839">SUSE bug 1179839</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24489">CVE-2020-24489 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24511">CVE-2020-24511 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24512">CVE-2020-24512 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24513">CVE-2020-24513 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539041" comment="ucode-intel-20210525-13.90.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149058" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1180834" ref_url="https://bugzilla.suse.com/1180834" source="BUGZILLA"/>
		<reference ref_id="1183101" ref_url="https://bugzilla.suse.com/1183101" source="BUGZILLA"/>
		<reference ref_id="1183105" ref_url="https://bugzilla.suse.com/1183105" source="BUGZILLA"/>
		<reference ref_id="1183107" ref_url="https://bugzilla.suse.com/1183107" source="BUGZILLA"/>
		<reference ref_id="1183108" ref_url="https://bugzilla.suse.com/1183108" source="BUGZILLA"/>
		<reference ref_id="1185785" ref_url="https://bugzilla.suse.com/1185785" source="BUGZILLA"/>
		<reference ref_id="1185786" ref_url="https://bugzilla.suse.com/1185786" source="BUGZILLA"/>
		<reference ref_id="1185803" ref_url="https://bugzilla.suse.com/1185803" source="BUGZILLA"/>
		<reference ref_id="1185804" ref_url="https://bugzilla.suse.com/1185804" source="BUGZILLA"/>
		<reference ref_id="1185805" ref_url="https://bugzilla.suse.com/1185805" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35653" ref_url="https://www.suse.com/security/cve/CVE-2020-35653/" source="CVE"/>
		<reference ref_id="CVE-2021-25287" ref_url="https://www.suse.com/security/cve/CVE-2021-25287/" source="CVE"/>
		<reference ref_id="CVE-2021-25288" ref_url="https://www.suse.com/security/cve/CVE-2021-25288/" source="CVE"/>
		<reference ref_id="CVE-2021-25290" ref_url="https://www.suse.com/security/cve/CVE-2021-25290/" source="CVE"/>
		<reference ref_id="CVE-2021-25292" ref_url="https://www.suse.com/security/cve/CVE-2021-25292/" source="CVE"/>
		<reference ref_id="CVE-2021-27922" ref_url="https://www.suse.com/security/cve/CVE-2021-27922/" source="CVE"/>
		<reference ref_id="CVE-2021-27923" ref_url="https://www.suse.com/security/cve/CVE-2021-27923/" source="CVE"/>
		<reference ref_id="CVE-2021-28675" ref_url="https://www.suse.com/security/cve/CVE-2021-28675/" source="CVE"/>
		<reference ref_id="CVE-2021-28676" ref_url="https://www.suse.com/security/cve/CVE-2021-28676/" source="CVE"/>
		<reference ref_id="CVE-2021-28677" ref_url="https://www.suse.com/security/cve/CVE-2021-28677/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008982.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2021-25292: Fixed a backtracking regex in PDF parser could be used as a DOS attack (bsc#1183101).
- CVE-2021-25290: Fixed a negative-offset memcpy with an invalid size in TiffDecode.c (bsc#1183105).
- CVE-2021-27922,CVE-2021-27923: Fixed improper reported size of a contained image (bsc#1183108,bsc#1183107)
- CVE-2020-35653: Fixed buffer over-read in PcxDecode when decoding a crafted PCX file (bsc#1180834).
- CVE-2021-25287: Fixed out-of-bounds read in J2kDecode in j2ku_graya_la (bsc#1185805).
- CVE-2021-25288: Fixed out-of-bounds read in J2kDecode in j2ku_gray_i (bsc#1185803).
- CVE-2021-28675: Fixed DoS in PsdImagePlugin (bsc#1185804).
- CVE-2021-28677: Fixed DoS in the open phase via a malicious EPS file (bsc#1185785).
- CVE-2021-28676: Fixed infinite loop in FliDecode.c (bsc#1185786).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-10"/>
	<updated date="2021-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180834">SUSE bug 1180834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183101">SUSE bug 1183101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183105">SUSE bug 1183105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183107">SUSE bug 1183107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183108">SUSE bug 1183108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185785">SUSE bug 1185785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185786">SUSE bug 1185786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185803">SUSE bug 1185803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185804">SUSE bug 1185804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185805">SUSE bug 1185805</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35653/">CVE-2020-35653 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35653">CVE-2020-35653 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25287/">CVE-2021-25287 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25287">CVE-2021-25287 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25288/">CVE-2021-25288 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25288">CVE-2021-25288 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25290/">CVE-2021-25290 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25290">CVE-2021-25290 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25292/">CVE-2021-25292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25292">CVE-2021-25292 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27922/">CVE-2021-27922 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27922">CVE-2021-27922 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27923/">CVE-2021-27923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27923">CVE-2021-27923 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28675/">CVE-2021-28675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28675">CVE-2021-28675 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28676/">CVE-2021-28676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28676">CVE-2021-28676 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28677/">CVE-2021-28677 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28677">CVE-2021-28677 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597577" comment="python-Pillow-4.2.1-3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149059" version="1" class="patch">
	<metadata>
		<title>Security update for caribou (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1186617" ref_url="https://bugzilla.suse.com/1186617" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3567" ref_url="https://www.suse.com/security/cve/CVE-2021-3567/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008985.html" source="SUSE-SU"/>
		<description>
This update for caribou fixes the following issues:

Security issue fixed:

- CVE-2021-3567: Fixed a segfault when attempting to use shifted characters (bsc#1186617).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-10"/>
	<updated date="2021-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186617">SUSE bug 1186617</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3567/">CVE-2021-3567 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3567">CVE-2021-3567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552363" comment="caribou-common-0.4.21-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552364" comment="libcaribou0-0.4.21-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552365" comment="typelib-1_0-Caribou-1_0-0.4.21-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149060" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1184016" ref_url="https://bugzilla.suse.com/1184016" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009000.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

- Do not log passwords in logfiles (bsc#1184016)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-11"/>
	<updated date="2021-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184016">SUSE bug 1184016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555917" comment="freeradius-server-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555918" comment="freeradius-server-doc-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555919" comment="freeradius-server-krb5-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555920" comment="freeradius-server-ldap-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555921" comment="freeradius-server-libs-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555922" comment="freeradius-server-mysql-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555923" comment="freeradius-server-perl-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555924" comment="freeradius-server-postgresql-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555925" comment="freeradius-server-python-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555926" comment="freeradius-server-sqlite-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555927" comment="freeradius-server-utils-3.0.15-2.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149061" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009020.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u292 (icedtea 3.19.0).
- CVE-2021-2161: Fixed incomplete enforcement of JAR signing disabled algorithms (bsc#1185055).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-15"/>
	<updated date="2021-06-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552366" comment="java-1_8_0-openjdk-1.8.0.292-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552367" comment="java-1_8_0-openjdk-demo-1.8.0.292-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552368" comment="java-1_8_0-openjdk-devel-1.8.0.292-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552369" comment="java-1_8_0-openjdk-headless-1.8.0.292-27.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149062" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1179103" ref_url="https://bugzilla.suse.com/1179103" source="BUGZILLA"/>
		<reference ref_id="1179202" ref_url="https://bugzilla.suse.com/1179202" source="BUGZILLA"/>
		<reference ref_id="1179208" ref_url="https://bugzilla.suse.com/1179208" source="BUGZILLA"/>
		<reference ref_id="1179212" ref_url="https://bugzilla.suse.com/1179212" source="BUGZILLA"/>
		<reference ref_id="1179223" ref_url="https://bugzilla.suse.com/1179223" source="BUGZILLA"/>
		<reference ref_id="1179240" ref_url="https://bugzilla.suse.com/1179240" source="BUGZILLA"/>
		<reference ref_id="1179244" ref_url="https://bugzilla.suse.com/1179244" source="BUGZILLA"/>
		<reference ref_id="1179260" ref_url="https://bugzilla.suse.com/1179260" source="BUGZILLA"/>
		<reference ref_id="1179268" ref_url="https://bugzilla.suse.com/1179268" source="BUGZILLA"/>
		<reference ref_id="1179269" ref_url="https://bugzilla.suse.com/1179269" source="BUGZILLA"/>
		<reference ref_id="1179278" ref_url="https://bugzilla.suse.com/1179278" source="BUGZILLA"/>
		<reference ref_id="1179281" ref_url="https://bugzilla.suse.com/1179281" source="BUGZILLA"/>
		<reference ref_id="1179285" ref_url="https://bugzilla.suse.com/1179285" source="BUGZILLA"/>
		<reference ref_id="1179311" ref_url="https://bugzilla.suse.com/1179311" source="BUGZILLA"/>
		<reference ref_id="1179312" ref_url="https://bugzilla.suse.com/1179312" source="BUGZILLA"/>
		<reference ref_id="1179313" ref_url="https://bugzilla.suse.com/1179313" source="BUGZILLA"/>
		<reference ref_id="1179315" ref_url="https://bugzilla.suse.com/1179315" source="BUGZILLA"/>
		<reference ref_id="1179317" ref_url="https://bugzilla.suse.com/1179317" source="BUGZILLA"/>
		<reference ref_id="1179321" ref_url="https://bugzilla.suse.com/1179321" source="BUGZILLA"/>
		<reference ref_id="1179322" ref_url="https://bugzilla.suse.com/1179322" source="BUGZILLA"/>
		<reference ref_id="1179327" ref_url="https://bugzilla.suse.com/1179327" source="BUGZILLA"/>
		<reference ref_id="1179333" ref_url="https://bugzilla.suse.com/1179333" source="BUGZILLA"/>
		<reference ref_id="1179336" ref_url="https://bugzilla.suse.com/1179336" source="BUGZILLA"/>
		<reference ref_id="1179338" ref_url="https://bugzilla.suse.com/1179338" source="BUGZILLA"/>
		<reference ref_id="1179339" ref_url="https://bugzilla.suse.com/1179339" source="BUGZILLA"/>
		<reference ref_id="1179343" ref_url="https://bugzilla.suse.com/1179343" source="BUGZILLA"/>
		<reference ref_id="1179345" ref_url="https://bugzilla.suse.com/1179345" source="BUGZILLA"/>
		<reference ref_id="1179346" ref_url="https://bugzilla.suse.com/1179346" source="BUGZILLA"/>
		<reference ref_id="1179347" ref_url="https://bugzilla.suse.com/1179347" source="BUGZILLA"/>
		<reference ref_id="1179361" ref_url="https://bugzilla.suse.com/1179361" source="BUGZILLA"/>
		<reference ref_id="1179362" ref_url="https://bugzilla.suse.com/1179362" source="BUGZILLA"/>
		<reference ref_id="1179397" ref_url="https://bugzilla.suse.com/1179397" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667/" source="CVE"/>
		<reference ref_id="CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664/" source="CVE"/>
		<reference ref_id="CVE-2020-25665" ref_url="https://www.suse.com/security/cve/CVE-2020-25665/" source="CVE"/>
		<reference ref_id="CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666/" source="CVE"/>
		<reference ref_id="CVE-2020-25674" ref_url="https://www.suse.com/security/cve/CVE-2020-25674/" source="CVE"/>
		<reference ref_id="CVE-2020-25675" ref_url="https://www.suse.com/security/cve/CVE-2020-25675/" source="CVE"/>
		<reference ref_id="CVE-2020-25676" ref_url="https://www.suse.com/security/cve/CVE-2020-25676/" source="CVE"/>
		<reference ref_id="CVE-2020-27750" ref_url="https://www.suse.com/security/cve/CVE-2020-27750/" source="CVE"/>
		<reference ref_id="CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751/" source="CVE"/>
		<reference ref_id="CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752/" source="CVE"/>
		<reference ref_id="CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753/" source="CVE"/>
		<reference ref_id="CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754/" source="CVE"/>
		<reference ref_id="CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755/" source="CVE"/>
		<reference ref_id="CVE-2020-27757" ref_url="https://www.suse.com/security/cve/CVE-2020-27757/" source="CVE"/>
		<reference ref_id="CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759/" source="CVE"/>
		<reference ref_id="CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760/" source="CVE"/>
		<reference ref_id="CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761/" source="CVE"/>
		<reference ref_id="CVE-2020-27762" ref_url="https://www.suse.com/security/cve/CVE-2020-27762/" source="CVE"/>
		<reference ref_id="CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763/" source="CVE"/>
		<reference ref_id="CVE-2020-27764" ref_url="https://www.suse.com/security/cve/CVE-2020-27764/" source="CVE"/>
		<reference ref_id="CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765/" source="CVE"/>
		<reference ref_id="CVE-2020-27766" ref_url="https://www.suse.com/security/cve/CVE-2020-27766/" source="CVE"/>
		<reference ref_id="CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767/" source="CVE"/>
		<reference ref_id="CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768/" source="CVE"/>
		<reference ref_id="CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769/" source="CVE"/>
		<reference ref_id="CVE-2020-27770" ref_url="https://www.suse.com/security/cve/CVE-2020-27770/" source="CVE"/>
		<reference ref_id="CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771/" source="CVE"/>
		<reference ref_id="CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772/" source="CVE"/>
		<reference ref_id="CVE-2020-27773" ref_url="https://www.suse.com/security/cve/CVE-2020-27773/" source="CVE"/>
		<reference ref_id="CVE-2020-27774" ref_url="https://www.suse.com/security/cve/CVE-2020-27774/" source="CVE"/>
		<reference ref_id="CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775/" source="CVE"/>
		<reference ref_id="CVE-2020-27776" ref_url="https://www.suse.com/security/cve/CVE-2020-27776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103).
- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202).
- CVE-2020-25665: Fixed a heap-based buffer overflow in WritePALMImage (bsc#1179208).
- CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212).
- CVE-2020-25674: Fixed a heap-based buffer overflow in WriteOnePNGImage (bsc#1179223).
- CVE-2020-25675: Fixed an outside the range of representable values of type 'long' and integer overflow (bsc#1179240).
- CVE-2020-25676: Fixed an outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c (bsc#1179244).
- CVE-2020-27750: Fixed an division by zero in MagickCore/colorspace-private.h (bsc#1179260).
- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397).
- CVE-2020-27754: Fixed an outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336).
- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345).
- CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
- CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313).
- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281).
- CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315).
- CVE-2020-27762: Fixed an outside the range of representable values of type 'unsigned char' (bsc#1179278).
- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312).
- CVE-2020-27764: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179317).
- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311).
- CVE-2020-27766: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179361).
- CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322).
- CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
- CVE-2020-27769: Fixed an outside the range of representable values of type 'float' at MagickCore/quantize.c (bsc#1179321).
- CVE-2020-27770: Fixed an unsigned offset overflowed at MagickCore/string.c (bsc#1179343).
- CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327).
- CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347).
- CVE-2020-27773: Fixed a division by zero at MagickCore/gem-private.h (bsc#1179285).
- CVE-2020-27774: Fixed an integer overflow at MagickCore/statistic.c (bsc#1179333).
- CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
- CVE-2020-27776: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179362).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-22"/>
	<updated date="2021-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179103">SUSE bug 1179103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179208">SUSE bug 1179208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179212">SUSE bug 1179212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179223">SUSE bug 1179223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179240">SUSE bug 1179240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179244">SUSE bug 1179244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179260">SUSE bug 1179260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179268">SUSE bug 1179268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179278">SUSE bug 1179278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179281">SUSE bug 1179281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179285">SUSE bug 1179285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179311">SUSE bug 1179311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179312">SUSE bug 1179312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179315">SUSE bug 1179315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179317">SUSE bug 1179317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179327">SUSE bug 1179327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179338">SUSE bug 1179338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179339">SUSE bug 1179339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179343">SUSE bug 1179343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179345">SUSE bug 1179345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179347">SUSE bug 1179347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179361">SUSE bug 1179361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179362">SUSE bug 1179362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179397">SUSE bug 1179397</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19667">CVE-2020-19667 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25664">CVE-2020-25664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25665/">CVE-2020-25665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25665">CVE-2020-25665 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25666">CVE-2020-25666 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25674/">CVE-2020-25674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25674">CVE-2020-25674 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25675/">CVE-2020-25675 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25675">CVE-2020-25675 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25676/">CVE-2020-25676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25676">CVE-2020-25676 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27750/">CVE-2020-27750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27750">CVE-2020-27750 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27751">CVE-2020-27751 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27752">CVE-2020-27752 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27753">CVE-2020-27753 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27754">CVE-2020-27754 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27755">CVE-2020-27755 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27757/">CVE-2020-27757 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27757">CVE-2020-27757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27759">CVE-2020-27759 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27760">CVE-2020-27760 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27761">CVE-2020-27761 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27762/">CVE-2020-27762 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27762">CVE-2020-27762 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27763">CVE-2020-27763 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27764/">CVE-2020-27764 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27764">CVE-2020-27764 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27765">CVE-2020-27765 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27766/">CVE-2020-27766 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27766">CVE-2020-27766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27767">CVE-2020-27767 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27768">CVE-2020-27768 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27769">CVE-2020-27769 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27770/">CVE-2020-27770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27770">CVE-2020-27770 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27771">CVE-2020-27771 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27772">CVE-2020-27772 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27773/">CVE-2020-27773 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27773">CVE-2020-27773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27774/">CVE-2020-27774 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27774">CVE-2020-27774 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27775">CVE-2020-27775 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27776/">CVE-2020-27776 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27776">CVE-2020-27776 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149063" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1177087" ref_url="https://bugzilla.suse.com/1177087" source="BUGZILLA"/>
		<reference ref_id="1179122" ref_url="https://bugzilla.suse.com/1179122" source="BUGZILLA"/>
		<reference ref_id="1179451" ref_url="https://bugzilla.suse.com/1179451" source="BUGZILLA"/>
		<reference ref_id="1182286" ref_url="https://bugzilla.suse.com/1182286" source="BUGZILLA"/>
		<reference ref_id="1184155" ref_url="https://bugzilla.suse.com/1184155" source="BUGZILLA"/>
		<reference ref_id="1184262" ref_url="https://bugzilla.suse.com/1184262" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13543" ref_url="https://www.suse.com/security/cve/CVE-2020-13543/" source="CVE"/>
		<reference ref_id="CVE-2020-13558" ref_url="https://www.suse.com/security/cve/CVE-2020-13558/" source="CVE"/>
		<reference ref_id="CVE-2020-13584" ref_url="https://www.suse.com/security/cve/CVE-2020-13584/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9983" ref_url="https://www.suse.com/security/cve/CVE-2020-9983/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1789" ref_url="https://www.suse.com/security/cve/CVE-2021-1789/" source="CVE"/>
		<reference ref_id="CVE-2021-1799" ref_url="https://www.suse.com/security/cve/CVE-2021-1799/" source="CVE"/>
		<reference ref_id="CVE-2021-1801" ref_url="https://www.suse.com/security/cve/CVE-2021-1801/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1870" ref_url="https://www.suse.com/security/cve/CVE-2021-1870/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.1:
  + Improve handling of Media Capture devices.
  + Improve WebAudio playback.
  + Improve video orientation handling.
  + Improve seeking support for MSE playback.
  + Improve flush support in EME decryptors.
  + Fix HTTP status codes for requests done through a custom URI handler.
  + Fix the Bubblewrap sandbox in certain 32-bit systems.
  + Fix inconsistencies between the WebKitWebView.is-muted property
    state and values returned by
    webkit_web_view_is_playing_audio().
  + Fix the build with ENABLE_VIDEO=OFF.
  + Fix wrong timestamps for long-lived cookies.
  + Fix UI process crash when failing to load favicons.
  + Fix several crashes and rendering issues.
- Including Security fixes for: CVE-2021-1788, CVE-2021-1844, CVE-2021-1871,
    CVE-2020-27918, CVE-2020-29623, CVE-2021-1765, CVE-2021-1789, CVE-2021-1799,
    CVE-2021-1801, CVE-2021-1870, CVE-2020-13558, CVE-2020-13584, CVE-2020-9983, 
    CVE-2020-13543, CVE-2020-9947, CVE-2020-9948, CVE-2020-9951.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177087">SUSE bug 1177087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179122">SUSE bug 1179122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179451">SUSE bug 1179451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182286">SUSE bug 1182286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184155">SUSE bug 1184155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13543/">CVE-2020-13543 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13543">CVE-2020-13543 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13558/">CVE-2020-13558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13558">CVE-2020-13558 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13584/">CVE-2020-13584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13584">CVE-2020-13584 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27918">CVE-2020-27918 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29623">CVE-2020-29623 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9947">CVE-2020-9947 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9948">CVE-2020-9948 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9951">CVE-2020-9951 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9983/">CVE-2020-9983 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9983">CVE-2020-9983 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1765">CVE-2021-1765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1788">CVE-2021-1788 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1789/">CVE-2021-1789 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1789">CVE-2021-1789 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1799/">CVE-2021-1799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1799">CVE-2021-1799 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1801/">CVE-2021-1801 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1801">CVE-2021-1801 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1844">CVE-2021-1844 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1870/">CVE-2021-1870 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1870">CVE-2021-1870 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1871">CVE-2021-1871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552370" comment="libjavascriptcoregtk-4_0-18-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552371" comment="libwebkit2gtk-4_0-37-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539068" comment="libwebkit2gtk3-lang-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552372" comment="typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552373" comment="typelib-1_0-WebKit2-4_0-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552374" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552375" comment="webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149064" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1186922" ref_url="https://bugzilla.suse.com/1186922" source="BUGZILLA"/>
		<reference ref_id="1186923" ref_url="https://bugzilla.suse.com/1186923" source="BUGZILLA"/>
		<reference ref_id="1186924" ref_url="https://bugzilla.suse.com/1186924" source="BUGZILLA"/>
		<reference ref_id="1187017" ref_url="https://bugzilla.suse.com/1187017" source="BUGZILLA"/>
		<reference ref_id="1187174" ref_url="https://bugzilla.suse.com/1187174" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35452" ref_url="https://www.suse.com/security/cve/CVE-2020-35452/" source="CVE"/>
		<reference ref_id="CVE-2021-26690" ref_url="https://www.suse.com/security/cve/CVE-2021-26690/" source="CVE"/>
		<reference ref_id="CVE-2021-26691" ref_url="https://www.suse.com/security/cve/CVE-2021-26691/" source="CVE"/>
		<reference ref_id="CVE-2021-30641" ref_url="https://www.suse.com/security/cve/CVE-2021-30641/" source="CVE"/>
		<reference ref_id="CVE-2021-31618" ref_url="https://www.suse.com/security/cve/CVE-2021-31618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009032.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- fixed CVE-2021-30641 [bsc#1187174]: MergeSlashes regression
- fixed CVE-2021-31618 [bsc#1186924]: NULL pointer dereference on specially crafted HTTP/2 request
- fixed CVE-2020-35452 [bsc#1186922]: Single zero byte stack overflow in mod_auth_digest 
- fixed CVE-2021-26690 [bsc#1186923]: mod_session NULL pointer dereference in parser
- fixed CVE-2021-26691 [bsc#1187017]: Heap overflow in mod_session
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186922">SUSE bug 1186922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186923">SUSE bug 1186923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186924">SUSE bug 1186924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187017">SUSE bug 1187017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187174">SUSE bug 1187174</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35452/">CVE-2020-35452 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35452">CVE-2020-35452 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26690/">CVE-2021-26690 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26690">CVE-2021-26690 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26691/">CVE-2021-26691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26691">CVE-2021-26691 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30641/">CVE-2021-30641 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30641">CVE-2021-30641 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31618/">CVE-2021-31618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31618">CVE-2021-31618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552377" comment="apache2-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539074" comment="apache2-doc-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552378" comment="apache2-example-pages-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552379" comment="apache2-prefork-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552380" comment="apache2-utils-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552381" comment="apache2-worker-2.4.23-29.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149065" version="1" class="patch">
	<metadata>
		<title>Security update for xterm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1182091" ref_url="https://bugzilla.suse.com/1182091" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009039.html" source="SUSE-SU"/>
		<description>
This update for xterm fixes the following issues:

- CVE-2021-27135: Fixed buffer-overflow when clicking on selected utf8 text. (bsc#1182091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182091">SUSE bug 1182091</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27135">CVE-2021-27135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552382" comment="xterm-308-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149066" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-nokogiri (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1146578" ref_url="https://bugzilla.suse.com/1146578" source="BUGZILLA"/>
		<reference ref_id="1180507" ref_url="https://bugzilla.suse.com/1180507" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5477" ref_url="https://www.suse.com/security/cve/CVE-2019-5477/" source="CVE"/>
		<reference ref_id="CVE-2020-26247" ref_url="https://www.suse.com/security/cve/CVE-2020-26247/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008244.html" source="SUSE-SU"/>
		<description>
This update for rubygem-nokogiri fixes the following issues:

- CVE-2019-5477: Fixed a command injection vulnerability (bsc#1146578).
- CVE-2020-26247: Fixed an XXE vulnerability in Nokogiri::XML::Schema (bsc#1180507).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-25"/>
	<updated date="2021-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146578">SUSE bug 1146578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180507">SUSE bug 1180507</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5477/">CVE-2019-5477 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5477">CVE-2019-5477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26247/">CVE-2020-26247 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26247">CVE-2020-26247 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597704" comment="ruby2.1-rubygem-nokogiri-1.6.1-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149067" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1186151" ref_url="https://bugzilla.suse.com/1186151" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009071.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

- Fixed a possible  buffer overflow in IScsiDxe (bsc#1186151)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-22"/>
	<updated date="2021-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186151">SUSE bug 1186151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009539087" comment="ovmf-2017+git1492060560.b6d11d7c46-4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539088" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539089" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149068" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1180816" ref_url="https://bugzilla.suse.com/1180816" source="BUGZILLA"/>
		<reference ref_id="1180942" ref_url="https://bugzilla.suse.com/1180942" source="BUGZILLA"/>
		<reference ref_id="1181119" ref_url="https://bugzilla.suse.com/1181119" source="BUGZILLA"/>
		<reference ref_id="1181935" ref_url="https://bugzilla.suse.com/1181935" source="BUGZILLA"/>
		<reference ref_id="1183684" ref_url="https://bugzilla.suse.com/1183684" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20178" ref_url="https://www.suse.com/security/cve/CVE-2021-20178/" source="CVE"/>
		<reference ref_id="CVE-2021-20180" ref_url="https://www.suse.com/security/cve/CVE-2021-20180/" source="CVE"/>
		<reference ref_id="CVE-2021-20191" ref_url="https://www.suse.com/security/cve/CVE-2021-20191/" source="CVE"/>
		<reference ref_id="CVE-2021-20228" ref_url="https://www.suse.com/security/cve/CVE-2021-20228/" source="CVE"/>
		<reference ref_id="CVE-2021-3447" ref_url="https://www.suse.com/security/cve/CVE-2021-3447/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009066.html" source="SUSE-SU"/>
		<description>
This update for ansible fixes the following issues:

- Update to 2.9.22:
- CVE-2021-3447: multiple modules expose secured values (bsc#1183684)
- CVE-2021-20228: basic.py no_log with fallback option (bsc#1181935)
- CVE-2021-20191: multiple collections exposes secured values (bsc#1181119)
- CVE-2021-20180: bitbucket_pipeline_variable exposes sensitive values (bsc#1180942)
- CVE-2021-20178: user data leak in snmp_facts module (bsc#1180816)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-22"/>
	<updated date="2021-06-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180816">SUSE bug 1180816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180942">SUSE bug 1180942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181119">SUSE bug 1181119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181935">SUSE bug 1181935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183684">SUSE bug 1183684</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20178/">CVE-2021-20178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20178">CVE-2021-20178 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20180/">CVE-2021-20180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20180">CVE-2021-20180 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20191/">CVE-2021-20191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20191">CVE-2021-20191 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20228/">CVE-2021-20228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20228">CVE-2021-20228 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3447/">CVE-2021-3447 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3447">CVE-2021-3447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597581" comment="ansible-2.9.22-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149069" version="1" class="patch">
	<metadata>
		<title>Security update for libnettle (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1187060" ref_url="https://bugzilla.suse.com/1187060" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3580" ref_url="https://www.suse.com/security/cve/CVE-2021-3580/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009077.html" source="SUSE-SU"/>
		<description>
This update for libnettle fixes the following issues:

- CVE-2021-3580: Fixed a remote denial of service in the RSA decryption via manipulated ciphertext (bsc#1187060).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-23"/>
	<updated date="2021-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187060">SUSE bug 1187060</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3580/">CVE-2021-3580 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3580">CVE-2021-3580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552386" comment="libhogweed2-2.7.1-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539091" comment="libhogweed2-32bit-2.7.1-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552387" comment="libnettle4-2.7.1-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539093" comment="libnettle4-32bit-2.7.1-13.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149070" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1187212" ref_url="https://bugzilla.suse.com/1187212" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009087.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2021-33560: Fixed a side-channel against ElGamal encryption, caused by missing exponent blinding (bsc#1187212).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-24"/>
	<updated date="2021-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187212">SUSE bug 1187212</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">CVE-2021-33560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552394" comment="libgcrypt20-1.6.1-16.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539096" comment="libgcrypt20-32bit-1.6.1-16.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552395" comment="libgcrypt20-hmac-1.6.1-16.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539098" comment="libgcrypt20-hmac-32bit-1.6.1-16.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149071" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1184354" ref_url="https://bugzilla.suse.com/1184354" source="BUGZILLA"/>
		<reference ref_id="1187310" ref_url="https://bugzilla.suse.com/1187310" source="BUGZILLA"/>
		<reference ref_id="1187395" ref_url="https://bugzilla.suse.com/1187395" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3479" ref_url="https://www.suse.com/security/cve/CVE-2021-3479/" source="CVE"/>
		<reference ref_id="CVE-2021-3598" ref_url="https://www.suse.com/security/cve/CVE-2021-3598/" source="CVE"/>
		<reference ref_id="CVE-2021-3605" ref_url="https://www.suse.com/security/cve/CVE-2021-3605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009088.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- Fixed CVE-2021-3479 [bsc#1184354]: Out-of-memory caused by allocation of a very large buffer
- Fixed CVE-2021-3605 [bsc#1187395]: Heap buffer overflow in the rleUncompress function
- Fixed CVE-2021-3598 [bsc#1187310]: Heap buffer overflow in Imf_3_1:CharPtrIO:readChars
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-24"/>
	<updated date="2021-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184354">SUSE bug 1184354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187310">SUSE bug 1187310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187395">SUSE bug 1187395</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3479/">CVE-2021-3479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3479">CVE-2021-3479 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3598/">CVE-2021-3598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3598">CVE-2021-3598 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3605/">CVE-2021-3605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3605">CVE-2021-3605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552396" comment="libIlmImf-Imf_2_1-21-2.1.0-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552397" comment="openexr-2.1.0-6.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149072" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql12, postgresql13 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="1178961" ref_url="https://bugzilla.suse.com/1178961" source="BUGZILLA"/>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008245.html" source="SUSE-SU"/>
		<description>
This update for postgresql, postgresql12, postgresql13 fixes the following issues:

Initial packaging of PostgreSQL 13:

* https://www.postgresql.org/about/news/2077/
* https://www.postgresql.org/docs/13/release-13.html

Changes in postgresql:

- Bump postgresql major version to 13.

Changes in postgresql12:

- %ghost the symlinks to pg_config and ecpg. (bsc#1178961)
- BuildRequire libpq5 and libecpg6 when not building them to avoid dangling symlinks in the devel package. (bsc#1179765)
- Fix a DST problem in the test suite.

Changes in postgresql13:

- Add postgresql-icu68.patch: fix build with ICU 68

- %ghost the symlinks to pg_config and ecpg. (bsc#1178961)
- BuildRequire libpq5 and libecpg6 when not building them to avoid dangling symlinks in the devel package. (bsc#1179765)

Upgrade to version 13.1:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/13/release-13-1.html

- Fix a DST problem in the test suite.

  		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-26"/>
	<updated date="2021-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178961">SUSE bug 1178961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531841" comment="libecpg6-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531842" comment="libpq5-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531843" comment="libpq5-32bit-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531844" comment="postgresql-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531845" comment="postgresql-contrib-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531846" comment="postgresql-docs-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531847" comment="postgresql-plperl-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531848" comment="postgresql-plpython-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531849" comment="postgresql-pltcl-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531850" comment="postgresql-server-13-4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149073" version="1" class="patch">
	<metadata>
		<title>Security update for arpwatch (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1186240" ref_url="https://bugzilla.suse.com/1186240" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25321" ref_url="https://www.suse.com/security/cve/CVE-2021-25321/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009095.html" source="SUSE-SU"/>
		<description>
This update for arpwatch fixes the following issues:

- CVE-2021-25321: Fixed local privilege escalation from runtime user to root (bsc#1186240).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186240">SUSE bug 1186240</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25321/">CVE-2021-25321 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25321">CVE-2021-25321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615943" comment="arpwatch-2.1a15-159.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149074" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1161510" ref_url="https://bugzilla.suse.com/1161510" source="BUGZILLA"/>
		<reference ref_id="1186229" ref_url="https://bugzilla.suse.com/1186229" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20387" ref_url="https://www.suse.com/security/cve/CVE-2019-20387/" source="CVE"/>
		<reference ref_id="CVE-2021-3200" ref_url="https://www.suse.com/security/cve/CVE-2021-3200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009094.html" source="SUSE-SU"/>
		<description>
This update for libsolv fixes the following issues:

Security issues fixed:

- CVE-2019-20387: Fixed heap-buffer-overflow in repodata_schema2id (bsc#1161510)
- CVE-2021-3200: testcase_read: error out if repos are added or the system is changed too late (bsc#1186229)

Other issues fixed:

- backport support for blacklisted packages to support ptf packages and retracted patches
- fix ruleinfo of complex dependencies returning the wrong origin
- fix SOLVER_FLAG_FOCUS_BEST updateing packages without reason
- fix add_complex_recommends() selecting conflicted packages in rare cases
- fix potential segfault in resolve_jobrules
- fix solv_zchunk decoding error if large chunks are used
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161510">SUSE bug 1161510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186229">SUSE bug 1186229</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20387/">CVE-2019-20387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20387">CVE-2019-20387 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3200/">CVE-2021-3200 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3200">CVE-2021-3200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555928" comment="libsolv-devel-0.6.37-2.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555929" comment="libsolv-tools-0.6.37-2.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555930" comment="libzypp-16.21.4-2.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555931" comment="libzypp-devel-16.21.4-2.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555932" comment="perl-solv-0.6.37-2.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555933" comment="python-solv-0.6.37-2.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149075" version="1" class="patch">
	<metadata>
		<title>Recommended update for the Azure and AWS SDKs (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1125671" ref_url="https://bugzilla.suse.com/1125671" source="BUGZILLA"/>
		<reference ref_id="1154393" ref_url="https://bugzilla.suse.com/1154393" source="BUGZILLA"/>
		<reference ref_id="1175289" ref_url="https://bugzilla.suse.com/1175289" source="BUGZILLA"/>
		<reference ref_id="1176784" ref_url="https://bugzilla.suse.com/1176784" source="BUGZILLA"/>
		<reference ref_id="1176785" ref_url="https://bugzilla.suse.com/1176785" source="BUGZILLA"/>
		<reference ref_id="1182421" ref_url="https://bugzilla.suse.com/1182421" source="BUGZILLA"/>
		<reference ref_id="1187045" ref_url="https://bugzilla.suse.com/1187045" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33503" ref_url="https://www.suse.com/security/cve/CVE-2021-33503/" source="CVE"/>
		<reference ref_id="SUSE-RU-2021:2194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019478.html" source="SUSE-SU"/>
		<description>
This update for the SLE Public Cloud module provides the following fixes:

Azure SDK update:
This update for the Azure SDK and CLI adds support for the AHB (Azure Hybrid Benefit).
(bsc#1176784, jsc#ECO-3105)

AWS SDK update:
This update for the AWS SDK updates python-boto3 to version 1.17.9 and aws-cli to 1.19.9.
(bsc#1182421, jsc#ECO-3352)

Security fix for python-urllib3:

- Improve performance of sub-authority splitting in URL. (bsc#1187045, CVE-2021-33503)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1125671">SUSE bug 1125671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154393">SUSE bug 1154393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175289">SUSE bug 1175289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176784">SUSE bug 1176784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176785">SUSE bug 1176785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182421">SUSE bug 1182421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187045">SUSE bug 1187045</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33503/">CVE-2021-33503 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33503">CVE-2021-33503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009615955" comment="aws-cli-1.19.9-22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616455" comment="python-PyYAML-5.3.1-28.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616162" comment="python-botocore-1.20.9-28.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616164" comment="python-colorama-0.4.4-4.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615952" comment="python-pexpect-4.3.1-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615953" comment="python-ptyprocess-0.5.2-2.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616195" comment="python-six-1.14.0-13.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616449" comment="python3-requests-2.24.0-8.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616438" comment="python3-six-1.14.0-13.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616441" comment="python3-urllib3-1.25.10-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149076" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3, python-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1176784" ref_url="https://bugzilla.suse.com/1176784" source="BUGZILLA"/>
		<reference ref_id="1182421" ref_url="https://bugzilla.suse.com/1182421" source="BUGZILLA"/>
		<reference ref_id="1187045" ref_url="https://bugzilla.suse.com/1187045" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33503" ref_url="https://www.suse.com/security/cve/CVE-2021-33503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009099.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 and python-requests fixes the following issues:

Security fix:

- Improve performance of sub-authority splitting in URL. (bsc#1187045, CVE-2021-33503)

Non-security changes:

- Update python-urllib3 to version 1.25.10 to stay compatible with changes needed in the
  Server and Public Cloud products. (bsc#1182421, jsc#ECO-3352)
- Update python-requests to version 2.24.0 to stay compatible with changes needed in the
  Server and Public Cloud products. (bsc#1176784, jsc#ECO-3105))
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176784">SUSE bug 1176784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182421">SUSE bug 1182421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187045">SUSE bug 1187045</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33503/">CVE-2021-33503 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33503">CVE-2021-33503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597579" comment="python-requests-2.24.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597580" comment="python-urllib3-1.25.10-5.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149077" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1173513" ref_url="https://bugzilla.suse.com/1173513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14145" ref_url="https://www.suse.com/security/cve/CVE-2020-14145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008149.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2020-14145: Fixed a potential information leak during host key exchange (bsc#1173513).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173513">SUSE bug 1173513</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14145/">CVE-2020-14145 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14145">CVE-2020-14145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531851" comment="openssh-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531852" comment="openssh-askpass-gnome-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531853" comment="openssh-fips-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531854" comment="openssh-helpers-7.2p2-74.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149078" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1180684" ref_url="https://bugzilla.suse.com/1180684" source="BUGZILLA"/>
		<reference ref_id="1180685" ref_url="https://bugzilla.suse.com/1180685" source="BUGZILLA"/>
		<reference ref_id="1180687" ref_url="https://bugzilla.suse.com/1180687" source="BUGZILLA"/>
		<reference ref_id="1181090" ref_url="https://bugzilla.suse.com/1181090" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23239" ref_url="https://www.suse.com/security/cve/CVE-2021-23239/" source="CVE"/>
		<reference ref_id="CVE-2021-23240" ref_url="https://www.suse.com/security/cve/CVE-2021-23240/" source="CVE"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008249.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- A Heap-based buffer overflow in sudo could be exploited to allow a user to gain root privileges 
  [bsc#1181090,CVE-2021-3156]
- It was possible for a user to test for the existence of a directory due to a Race Condition in `sudoedit`
  [bsc#1180684,CVE-2021-23239]
- A Possible Symlink Attack vector existed in `sudoedit` if SELinux was running in permissive mode [bsc#1180685,
  CVE-2021-23240]
- It was possible for a User to enable Debug Settings not Intended for them [bsc#1180687]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-26"/>
	<updated date="2021-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180684">SUSE bug 1180684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180685">SUSE bug 1180685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180687">SUSE bug 1180687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181090">SUSE bug 1181090</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23239/">CVE-2021-23239 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23239">CVE-2021-23239 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23240/">CVE-2021-23240 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23240">CVE-2021-23240 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3156">CVE-2021-3156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555934" comment="sudo-1.8.20p2-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149079" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1188275" ref_url="https://bugzilla.suse.com/1188275" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009155.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.12.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-29 (bsc#1188275)

* CVE-2021-29970: Use-after-free in accessibility features of a document
* CVE-2021-30547: Out of bounds write in ANGLE
* CVE-2021-29976: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29970">CVE-2021-29970 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29976">CVE-2021-29976 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30547">CVE-2021-30547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625232" comment="MozillaFirefox-78.12.0-112.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625233" comment="MozillaFirefox-devel-78.12.0-112.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625234" comment="MozillaFirefox-translations-common-78.12.0-112.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149080" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1181414" ref_url="https://bugzilla.suse.com/1181414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.7.0 ESR  (MFSA 2021-04, bsc#1181414)
  * CVE-2021-23953: Fixed a Cross-origin information leakage via redirected PDF requests
  * CVE-2021-23954: Fixed a type confusion when using logical assignment operators in JavaScript switch statements
  * CVE-2020-26976: Fixed an issue where HTTPS pages could have been intercepted by a registered service worker when they should not have been
  * CVE-2021-23960: Fixed a use-after-poison for incorrectly redeclared JavaScript variables during GC
  * CVE-2021-23964: Fixed Memory safety bugs 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-29"/>
	<updated date="2021-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26976">CVE-2020-26976 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23953">CVE-2021-23953 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23954">CVE-2021-23954 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23960">CVE-2021-23960 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23964">CVE-2021-23964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531856" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531857" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531858" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149081" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1178561" ref_url="https://bugzilla.suse.com/1178561" source="BUGZILLA"/>
		<reference ref_id="1184761" ref_url="https://bugzilla.suse.com/1184761" source="BUGZILLA"/>
		<reference ref_id="1184967" ref_url="https://bugzilla.suse.com/1184967" source="BUGZILLA"/>
		<reference ref_id="1185046" ref_url="https://bugzilla.suse.com/1185046" source="BUGZILLA"/>
		<reference ref_id="1185331" ref_url="https://bugzilla.suse.com/1185331" source="BUGZILLA"/>
		<reference ref_id="1185807" ref_url="https://bugzilla.suse.com/1185807" source="BUGZILLA"/>
		<reference ref_id="1188063" ref_url="https://bugzilla.suse.com/1188063" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33910" ref_url="https://www.suse.com/security/cve/CVE-2021-33910/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009184.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2021-33910: Fixed a denial of service (stack exhaustion) in systemd (PID 1) (bsc#1188063)

Other fixes:

- mount-util: shorten the loop a bit (#7545)
- mount-util: do not use the official MAX_HANDLE_SZ (#7523)
- mount-util: tape over name_to_handle_at() flakiness (#7517) (bsc#1184761)
- mount-util: fix bad indenting
- mount-util: EOVERFLOW might have other causes than buffer size issues
- mount-util: fix error propagation in fd_fdinfo_mnt_id()
- mount-util: drop exponential buffer growing in name_to_handle_at_loop()
- udev: port udev_has_devtmpfs() to use path_get_mnt_id()
- mount-util: add new path_get_mnt_id() call that queries the mnt ID of a path
- mount-util: add name_to_handle_at_loop() wrapper around name_to_handle_at()
- mount-util: accept that name_to_handle_at() might fail with EPERM (#5499)
- basic: fallback to the fstat if we don't have access to the /proc/self/fdinfo
- sysusers: use the usual comment style
- test/TEST-21-SYSUSERS: add tests for new functionality
- sysusers: allow admin/runtime overrides to command-line config
- basic/strv: add function to insert items at position
- sysusers: allow the shell to be specified
- sysusers: move various user credential validity checks to src/basic/
- man: reformat table in sysusers.d(5)
- sysusers: take configuration as positional arguments
- sysusers: emit a bit more info at debug level when locking fails
- sysusers: allow force reusing existing user/group IDs (#8037)
- sysusers: ensure GID in uid:gid syntax exists
- sysusers: make ADD_GROUP always create a group
- test: add TEST-21-SYSUSERS test
- sysuser: use OrderedHashmap
- sysusers: allow uid:gid in sysusers.conf files
- sysusers: fix memleak (#4430)
- These commits implement the option '--replace' for systemd-sysusers
  so %sysusers_create_package can be introduced in SLE and packages
  can rely on this rpm macro without wondering whether the macro is
  available on the different target the package is submitted to.
- Expect 644 permissions for /usr/lib/udev/compat-symlink-generation (bsc#1185807)
- systemctl: add --value option
- execute: make sure to call into PAM after initializing resource limits (bsc#1184967)
- rlimit-util: introduce setrlimit_closest_all()
- system-conf: drop reference to ShutdownWatchdogUsec=
- core: rename ShutdownWatchdogSec to RebootWatchdogSec (bsc#1185331)
- Return -EAGAIN instead of -EALREADY from unit_reload (bsc#1185046)
- rules: don't ignore Xen virtual interfaces anymore (bsc#1178561)
- write_net_rules: set execute bits (bsc#1178561)
- udev: rework network device renaming
- Revert 'Revert 'udev: network device renaming - immediately give up if the target name isn't available''
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178561">SUSE bug 1178561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184761">SUSE bug 1184761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184967">SUSE bug 1184967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185046">SUSE bug 1185046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185331">SUSE bug 1185331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185807">SUSE bug 1185807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33910/">CVE-2021-33910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33910">CVE-2021-33910 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625777" comment="libsystemd0-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625743" comment="libsystemd0-32bit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626176" comment="libudev-devel-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625778" comment="libudev1-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625746" comment="libudev1-32bit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625779" comment="systemd-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625748" comment="systemd-32bit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625749" comment="systemd-bash-completion-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625780" comment="systemd-devel-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625781" comment="systemd-sysvinit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625782" comment="udev-228-150.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149082" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1186819" ref_url="https://bugzilla.suse.com/1186819" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009198.html" source="SUSE-SU"/>
		<description>
This update for python-pip fixes the following issues:

- CVE-2021-3572: Fixed incorrect handling of unicode separators in git references (bsc#1186819).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186819">SUSE bug 1186819</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3572">CVE-2021-3572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597578" comment="python-pip-9.0.1-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149083" version="1" class="patch">
	<metadata>
		<title>Security update for linuxptp (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1187646" ref_url="https://bugzilla.suse.com/1187646" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3570" ref_url="https://www.suse.com/security/cve/CVE-2021-3570/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009196.html" source="SUSE-SU"/>
		<description>
This update for linuxptp fixes the following issues:

- CVE-2021-3570: Validate the messageLength field of incoming messages. (bsc#1187646)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187646">SUSE bug 1187646</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3570/">CVE-2021-3570 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3570">CVE-2021-3570 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626114" comment="linuxptp-1.4-15.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149084" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1115026" ref_url="https://bugzilla.suse.com/1115026" source="BUGZILLA"/>
		<reference ref_id="1175462" ref_url="https://bugzilla.suse.com/1175462" source="BUGZILLA"/>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1185724" ref_url="https://bugzilla.suse.com/1185724" source="BUGZILLA"/>
		<reference ref_id="1185859" ref_url="https://bugzilla.suse.com/1185859" source="BUGZILLA"/>
		<reference ref_id="1185860" ref_url="https://bugzilla.suse.com/1185860" source="BUGZILLA"/>
		<reference ref_id="1185861" ref_url="https://bugzilla.suse.com/1185861" source="BUGZILLA"/>
		<reference ref_id="1185862" ref_url="https://bugzilla.suse.com/1185862" source="BUGZILLA"/>
		<reference ref_id="1185863" ref_url="https://bugzilla.suse.com/1185863" source="BUGZILLA"/>
		<reference ref_id="1185898" ref_url="https://bugzilla.suse.com/1185898" source="BUGZILLA"/>
		<reference ref_id="1185987" ref_url="https://bugzilla.suse.com/1185987" source="BUGZILLA"/>
		<reference ref_id="1186060" ref_url="https://bugzilla.suse.com/1186060" source="BUGZILLA"/>
		<reference ref_id="1186062" ref_url="https://bugzilla.suse.com/1186062" source="BUGZILLA"/>
		<reference ref_id="1186111" ref_url="https://bugzilla.suse.com/1186111" source="BUGZILLA"/>
		<reference ref_id="1186235" ref_url="https://bugzilla.suse.com/1186235" source="BUGZILLA"/>
		<reference ref_id="1186390" ref_url="https://bugzilla.suse.com/1186390" source="BUGZILLA"/>
		<reference ref_id="1186463" ref_url="https://bugzilla.suse.com/1186463" source="BUGZILLA"/>
		<reference ref_id="1187038" ref_url="https://bugzilla.suse.com/1187038" source="BUGZILLA"/>
		<reference ref_id="1187050" ref_url="https://bugzilla.suse.com/1187050" source="BUGZILLA"/>
		<reference ref_id="1187193" ref_url="https://bugzilla.suse.com/1187193" source="BUGZILLA"/>
		<reference ref_id="1187215" ref_url="https://bugzilla.suse.com/1187215" source="BUGZILLA"/>
		<reference ref_id="1187388" ref_url="https://bugzilla.suse.com/1187388" source="BUGZILLA"/>
		<reference ref_id="1187452" ref_url="https://bugzilla.suse.com/1187452" source="BUGZILLA"/>
		<reference ref_id="1187595" ref_url="https://bugzilla.suse.com/1187595" source="BUGZILLA"/>
		<reference ref_id="1187601" ref_url="https://bugzilla.suse.com/1187601" source="BUGZILLA"/>
		<reference ref_id="1187934" ref_url="https://bugzilla.suse.com/1187934" source="BUGZILLA"/>
		<reference ref_id="1188062" ref_url="https://bugzilla.suse.com/1188062" source="BUGZILLA"/>
		<reference ref_id="1188063" ref_url="https://bugzilla.suse.com/1188063" source="BUGZILLA"/>
		<reference ref_id="1188116" ref_url="https://bugzilla.suse.com/1188116" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141/" source="CVE"/>
		<reference ref_id="CVE-2020-26145" ref_url="https://www.suse.com/security/cve/CVE-2020-26145/" source="CVE"/>
		<reference ref_id="CVE-2020-26147" ref_url="https://www.suse.com/security/cve/CVE-2020-26147/" source="CVE"/>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)
- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)
- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)
- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)
- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)
- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bsc#1186463)
- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bsc#1179610)
- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)
- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861)
- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)
- CVE-2021-33034: Fixed an issue in net/bluetooth/hci_event.c where a use-after-free leads to writing an arbitrary value. (bsc#1186111)
- CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1186062)
- CVE-2021-23134: Fixed a use After Free vulnerability in nfc sockets which allows local attackers to elevate their privileges. (bsc#1186060)
- CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859)
- CVE-2020-26141: Fixed a flaw that could allows an adversary to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bsc#1185987)
- CVE-2020-26145: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject arbitrary network packets. (bsc#1185860)
- CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862)
- CVE-2020-26147: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames. (bsc#1185987)

The following non-security bugs were fixed:

- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).
- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).
- hv_netvsc: Add handlers for ethtool get/set msg level (bsc#1175462).
- hv_netvsc: avoid retry on send during shutdown (bsc#1175462).
- hv_netvsc: avoid unnecessary wakeups on subchannel creation (bsc#1175462).
- hv_netvsc: cancel subchannel setup before halting device (bsc#1175462).
- hv_netvsc: change GPAD teardown order on older versions (bsc#1175462).
- hv_netvsc: common detach logic (bsc#1175462).
- hv_netvsc: delay setup of VF device (bsc#1175462).
- hv_netvsc: disable NAPI before channel close (bsc#1175462).
- hv_netvsc: Ensure correct teardown message sequence order (bsc#1175462).
- hv_netvsc: Fix a deadlock by getting rtnl lock earlier in netvsc_probe() (bsc#1175462).
- hv_netvsc: Fix a network regression after ifdown/ifup (bsc#1175462).
- hv_netvsc: fix deadlock on hotplug (bsc#1175462).
- hv_netvsc: Fix error handling in netvsc_attach() (bsc#1175462).
- hv_netvsc: fix error unwind handling if vmbus_open fails (bsc#1175462).
- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (bsc#1175462).
- hv_netvsc: fix handling of fallback to single queue mode (bsc#1175462).
- hv_netvsc: Fix hash key value reset after other ops (bsc#1175462).
- hv_netvsc: Fix IP header checksum for coalesced packets (bsc#1175462).
- hv_netvsc: Fix net device attach on older Windows hosts (bsc#1175462).
- hv_netvsc: fix network namespace issues with VF support (bsc#1175462).
- hv_netvsc: Fix NULL dereference at single queue mode fallback (bsc#1175462).
- hv_netvsc: fix race during initialization (bsc#1175462).
- hv_netvsc: fix race on sub channel creation (bsc#1175462).
- hv_netvsc: fix race that may miss tx queue wakeup (bsc#1175462).
- hv_netvsc: fix schedule in RCU context (bsc#1175462).
- hv_netvsc: Fix the variable sizes in ipsecv2 and rsc offload (bsc#1175462).
- hv_netvsc: Fix tx_table init in rndis_set_subchannel() (bsc#1175462).
- hv_netvsc: Fix unwanted wakeup after tx_disable (bsc#1175462).
- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (bsc#1175462).
- hv_netvsc: flag software created hash value (bsc#1175462).
- hv_netvsc: netvsc_teardown_gpadl() split (bsc#1175462).
- hv_netvsc: only wake transmit queue if link is up (bsc#1175462).
- hv_netvsc: pass netvsc_device to rndis halt (bsc#1175462).
- hv_netvsc: preserve hw_features on mtu/channels/ringparam changes (bsc#1175462).
- hv_netvsc: Refactor assignments of struct netvsc_device_info (bsc#1175462).
- hv_netvsc: set master device (bsc#1175462).
- hv_netvsc: Set tx_table to equal weight after subchannels open (bsc#1175462).
- hv_netvsc: Simplify num_chn checking in rndis_filter_device_add() (bsc#1175462).
- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() (bsc#1175462).
- hv_netvsc: split sub-channel setup into async and sync (bsc#1175462).
- hv_netvsc: typo in NDIS RSS parameters structure (bsc#1175462).
- hv_netvsc: use RCU to fix concurrent rx and queue changes (bsc#1175462).
- hv_netvsc: use reciprocal divide to speed up percent calculation (bsc#1175462).
- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown (bsc#1175462).
- kgraft: truncate the output from state_show() sysfs attr (bsc#1186235).
- mm, memory_hotplug: do not clear numa_node association after hot_remove (bsc#1115026).
- mm: consider __HW_POISON pages when allocating from pcp lists (bsc#1187388).
- scsi: storvsc: Enable scatterlist entry lengths &gt; 4Kbytes (bsc#1187193).
- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-22"/>
	<updated date="2021-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115026">SUSE bug 1115026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175462">SUSE bug 1175462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185724">SUSE bug 1185724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185860">SUSE bug 1185860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185861">SUSE bug 1185861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185862">SUSE bug 1185862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185863">SUSE bug 1185863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185898">SUSE bug 1185898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185987">SUSE bug 1185987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186060">SUSE bug 1186060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186062">SUSE bug 1186062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186111">SUSE bug 1186111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186235">SUSE bug 1186235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186390">SUSE bug 1186390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187193">SUSE bug 1187193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187388">SUSE bug 1187388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187601">SUSE bug 1187601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187934">SUSE bug 1187934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188116">SUSE bug 1188116</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24586">CVE-2020-24586 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24587">CVE-2020-24587 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24588">CVE-2020-24588 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26139">CVE-2020-26139 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26141">CVE-2020-26141 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26145/">CVE-2020-26145 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26145">CVE-2020-26145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26147/">CVE-2020-26147 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26147">CVE-2020-26147 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26558">CVE-2020-26558 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36386">CVE-2020-36386 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0129">CVE-2021-0129 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0605">CVE-2021-0605 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23134">CVE-2021-23134 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34693">CVE-2021-34693 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625812" comment="kernel-default-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625813" comment="kernel-default-base-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625814" comment="kernel-default-devel-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626312" comment="kernel-default-kgraft-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625761" comment="kernel-devel-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625762" comment="kernel-macros-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625763" comment="kernel-source-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625815" comment="kernel-syms-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626314" comment="kgraft-patch-4_4_180-94_147-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149085" version="1" class="patch">
	<metadata>
		<title>Security update for ardana-cobbler, cassandra, cassandra-kit, crowbar-core, crowbar-openstack, documentation-suse-openstack-cloud, grafana, kibana, openstack-heat-templates, openstack-monasca-installer, openstack-nova, python-Django, python-elementpath, python-eventlet, python-py, python-pysaml2, python-six, python-xmlschema  (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1019074" ref_url="https://bugzilla.suse.com/1019074" source="BUGZILLA"/>
		<reference ref_id="1044849" ref_url="https://bugzilla.suse.com/1044849" source="BUGZILLA"/>
		<reference ref_id="1057496" ref_url="https://bugzilla.suse.com/1057496" source="BUGZILLA"/>
		<reference ref_id="1073879" ref_url="https://bugzilla.suse.com/1073879" source="BUGZILLA"/>
		<reference ref_id="1113302" ref_url="https://bugzilla.suse.com/1113302" source="BUGZILLA"/>
		<reference ref_id="1123064" ref_url="https://bugzilla.suse.com/1123064" source="BUGZILLA"/>
		<reference ref_id="1143893" ref_url="https://bugzilla.suse.com/1143893" source="BUGZILLA"/>
		<reference ref_id="1166139" ref_url="https://bugzilla.suse.com/1166139" source="BUGZILLA"/>
		<reference ref_id="1176784" ref_url="https://bugzilla.suse.com/1176784" source="BUGZILLA"/>
		<reference ref_id="1179805" ref_url="https://bugzilla.suse.com/1179805" source="BUGZILLA"/>
		<reference ref_id="1180507" ref_url="https://bugzilla.suse.com/1180507" source="BUGZILLA"/>
		<reference ref_id="1181277" ref_url="https://bugzilla.suse.com/1181277" source="BUGZILLA"/>
		<reference ref_id="1181278" ref_url="https://bugzilla.suse.com/1181278" source="BUGZILLA"/>
		<reference ref_id="1181689" ref_url="https://bugzilla.suse.com/1181689" source="BUGZILLA"/>
		<reference ref_id="1181828" ref_url="https://bugzilla.suse.com/1181828" source="BUGZILLA"/>
		<reference ref_id="1182433" ref_url="https://bugzilla.suse.com/1182433" source="BUGZILLA"/>
		<reference ref_id="1183174" ref_url="https://bugzilla.suse.com/1183174" source="BUGZILLA"/>
		<reference ref_id="1183803" ref_url="https://bugzilla.suse.com/1183803" source="BUGZILLA"/>
		<reference ref_id="1184148" ref_url="https://bugzilla.suse.com/1184148" source="BUGZILLA"/>
		<reference ref_id="1185623" ref_url="https://bugzilla.suse.com/1185623" source="BUGZILLA"/>
		<reference ref_id="1185836" ref_url="https://bugzilla.suse.com/1185836" source="BUGZILLA"/>
		<reference ref_id="1186608" ref_url="https://bugzilla.suse.com/1186608" source="BUGZILLA"/>
		<reference ref_id="1186611" ref_url="https://bugzilla.suse.com/1186611" source="BUGZILLA"/>
		<reference ref_id="940812" ref_url="https://bugzilla.suse.com/940812" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11481" ref_url="https://www.suse.com/security/cve/CVE-2017-11481/" source="CVE"/>
		<reference ref_id="CVE-2017-11499" ref_url="https://www.suse.com/security/cve/CVE-2017-11499/" source="CVE"/>
		<reference ref_id="CVE-2017-5929" ref_url="https://www.suse.com/security/cve/CVE-2017-5929/" source="CVE"/>
		<reference ref_id="CVE-2019-25025" ref_url="https://www.suse.com/security/cve/CVE-2019-25025/" source="CVE"/>
		<reference ref_id="CVE-2020-17516" ref_url="https://www.suse.com/security/cve/CVE-2020-17516/" source="CVE"/>
		<reference ref_id="CVE-2020-26247" ref_url="https://www.suse.com/security/cve/CVE-2020-26247/" source="CVE"/>
		<reference ref_id="CVE-2020-29651" ref_url="https://www.suse.com/security/cve/CVE-2020-29651/" source="CVE"/>
		<reference ref_id="CVE-2021-21238" ref_url="https://www.suse.com/security/cve/CVE-2021-21238/" source="CVE"/>
		<reference ref_id="CVE-2021-21239" ref_url="https://www.suse.com/security/cve/CVE-2021-21239/" source="CVE"/>
		<reference ref_id="CVE-2021-21419" ref_url="https://www.suse.com/security/cve/CVE-2021-21419/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2021-27358" ref_url="https://www.suse.com/security/cve/CVE-2021-27358/" source="CVE"/>
		<reference ref_id="CVE-2021-28658" ref_url="https://www.suse.com/security/cve/CVE-2021-28658/" source="CVE"/>
		<reference ref_id="CVE-2021-31542" ref_url="https://www.suse.com/security/cve/CVE-2021-31542/" source="CVE"/>
		<reference ref_id="CVE-2021-33203" ref_url="https://www.suse.com/security/cve/CVE-2021-33203/" source="CVE"/>
		<reference ref_id="CVE-2021-33571" ref_url="https://www.suse.com/security/cve/CVE-2021-33571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009227.html" source="SUSE-SU"/>
		<description>
This update for ardana-cobbler, cassandra, cassandra-kit, crowbar-core, crowbar-openstack, documentation-suse-openstack-cloud, grafana, kibana, openstack-heat-templates, openstack-monasca-installer, openstack-nova, python-Django, python-elementpath, python-eventlet, python-py, python-pysaml2, python-six, python-xmlschema fixes the following issues:

Security fixes included on this update:

cassandra-kit:
- CVE-2020-17516: Internode encryption enforcement vulnerability

cassandra:
- CVE-2020-17516: Internode encryption enforcement vulnerability
- CVE-2017-5929 logback: Fixed a serialization vulnerability in SocketServer and ServerSocketReceiver

crowbar-core:
CVE-2020-26247: Potentially XXE or SSRF attacks by parsed Nokogiri::XML::Schema

grafana:
- CVE-2021-27358: Unauthenticated remote attackers to trigger a Denial of Service via a remote API call

kibana:
- CVE-2017-11481: Fixed an XSS via URL fields
- CVE-2017-11499: Fixed a constant hashtable seeds vulnerability

python-Django:
- CVE-2021-28658: Potential directory-traversal via uploaded files
- CVE-2021-31542: Potential directory-traversal via uploaded files
- CVE-2021-33203: Potential directory traversal via admindocs
- CVE-2021-33571: Possible indeterminate SSRF, RFI, and LFI attacks since validators accepted leading zeros in IPv4 addresses
- CVE-2021-23336: Fixed web cache poisoning via django.utils.http.limited_parse_qsl

python-eventlet:
- CVE-2021-21419: Improper handling of highly compressed data and memory allocation with excessive size value

python-pysaml2:
- CVE-2021-21238: Fixed an improper verification of cryptographic signatures for signed SAML documents
- CVE-2021-21239: Fixed an improper verification of cryptographic signatures when using CryptoBackendXmlSec1()_

python-py:
- CVE-2020-29651: Regular expression denial of service in svnwc.py

rubygem-activerecord-session_store:
- CVE-2019-25025: Fixed a hijack sessions by using timing attacks targeting the session id
CVE-2019-16782

Non-security fixes included on this update:

Changes in ardana-cobbler:
- Update to version 8.0+git.1614096566.e8c2b27:
  * Change install_recommended to true (bsc#1181828)

Changes in cassandra:
- update to 3.11.10 (bsc#1181689, CVE-2020-17516)
 * Fix digest computation for queries with fetched but non queried columns (CASSANDRA-15962)
 * Reduce amount of allocations during batch statement execution (CASSANDRA-16201)
 * Update jflex-1.6.0.jar to match upstream (CASSANDRA-16393)
 * Fix DecimalDeserializer#toString OOM (CASSANDRA-14925)
 * Rate limit validation compactions using compaction_throughput_mb_per_sec (CASSANDRA-16161)
 * SASI's `max_compaction_flush_memory_in_mb` settings over 100GB revert to default of 1GB (CASSANDRA-16071)
 * Prevent unbounded number of pending flushing tasks (CASSANDRA-16261)
 * Improve empty hint file handling during startup (CASSANDRA-16162)
 * Allow empty string in collections with COPY FROM in cqlsh (CASSANDRA-16372)
 * Fix skipping on pre-3.0 created compact storage sstables due to missing primary key liveness (CASSANDRA-16226)
 * Extend the exclusion of replica filtering protection to other indices instead of just SASI (CASSANDRA-16311)
 * Synchronize transaction logs for JBOD (CASSANDRA-16225)
 * Fix the counting of cells per partition (CASSANDRA-16259)
 * Fix serial read/non-applying CAS linearizability (CASSANDRA-12126)
 * Avoid potential NPE in JVMStabilityInspector (CASSANDRA-16294)
 * Improved check of num_tokens against the length of initial_token (CASSANDRA-14477)
 * Fix a race condition on ColumnFamilyStore and TableMetrics (CASSANDRA-16228)
 * Remove the SEPExecutor blocking behavior (CASSANDRA-16186)
 * Fix invalid cell value skipping when reading from disk (CASSANDRA-16223)
 * Prevent invoking enable/disable gossip when not in NORMAL (CASSANDRA-16146)
 * Wait for schema agreement when bootstrapping (CASSANDRA-15158)
 * Fix the histogram merge of the table metrics (CASSANDRA-16259)
 * Synchronize Keyspace instance store/clear (CASSANDRA-16210)
 * Fix ColumnFilter to avoid querying cells of unselected complex columns (CASSANDRA-15977)
 * Fix memory leak in CompressedChunkReader (CASSANDRA-15880)
 * Don't attempt value skipping with mixed version cluster (CASSANDRA-15833)
 * Avoid failing compactions with very large partitions (CASSANDRA-15164)
 * Make sure LCS handles duplicate sstable added/removed notifications correctly (CASSANDRA-14103)
 * Fix OOM when terminating repair session (CASSANDRA-15902)
 * Avoid marking shutting down nodes as up after receiving gossip shutdown message (CASSANDRA-16094)
 * Check SSTables for latest version before dropping compact storage (CASSANDRA-16063)
 * Handle unexpected columns due to schema races (CASSANDRA-15899)
 * Add flag to ignore unreplicated keyspaces during repair (CASSANDRA-15160)
 * Package tools/bin scripts as executable (CASSANDRA-16151)
 * Fixed a NullPointerException when calling nodetool enablethrift (CASSANDRA-16127)
 * Correctly interpret SASI's `max_compaction_flush_memory_in_mb` setting in megabytes not bytes (CASSANDRA-16071)
 * Fix short read protection for GROUP BY queries (CASSANDRA-15459)
 * Frozen RawTuple is not annotated with frozen in the toString method (CASSANDRA-15857)
Merged from 3.0:
 * Use IF NOT EXISTS for index and UDT create statements in snapshot schema files (CASSANDRA-13935)
 * Fix gossip shutdown order (CASSANDRA-15816)
 * Remove broken 'defrag-on-read' optimization (CASSANDRA-15432)
 * Check for endpoint collision with hibernating nodes (CASSANDRA-14599)
 * Operational improvements and hardening for replica filtering protection (CASSANDRA-15907)
 * stop_paranoid disk failure policy is ignored on CorruptSSTableException after node is up (CASSANDRA-15191)
 * Forbid altering UDTs used in partition keys (CASSANDRA-15933)
 * Fix empty/null json string representation (CASSANDRA-15896)
 * 3.x fails to start if commit log has range tombstones from a column which is also deleted (CASSANDRA-15970)
 * Handle difference in timestamp precision between java8 and java11 in LogFIle.java (CASSANDRA-16050)
Merged from 2.2:
 * Fix CQL parsing of collections when the column type is reversed (CASSANDRA-15814)
 * Only allow strings to be passed to JMX authentication (CASSANDRA-16077)
 * Fix cqlsh output when fetching all rows in batch mode (CASSANDRA-15905)
 * Upgrade Jackson to 2.9.10 (CASSANDRA-15867)
 * Fix CQL formatting of read command restrictions for slow query log (CASSANDRA-15503)
 * Allow sstableloader to use SSL on the native port (CASSANDRA-14904)
 * Backport CASSANDRA-12189: escape string literals (CASSANDRA-15948)
 * Avoid hinted handoff per-host throttle being arounded to 0 in large cluster (CASSANDRA-15859)
 * Avoid emitting empty range tombstones from RangeTombstoneList (CASSANDRA-15924)
 * Avoid thread starvation, and improve compare-and-swap performance, in the slab allocators (CASSANDRA-15922)
 * Add token to tombstone warning and error messages (CASSANDRA-15890)
 * Fixed range read concurrency factor computation and capped as 10 times tpc cores (CASSANDRA-15752)
 * Catch exception on bootstrap resume and init native transport (CASSANDRA-15863)
 * Fix replica-side filtering returning stale data with CL &gt; ONE (CASSANDRA-8272, CASSANDRA-8273)
 * Fix duplicated row on 2.x upgrades when multi-rows range tombstones interact with collection ones (CASSANDRA-15805)
 * Rely on snapshotted session infos on StreamResultFuture.maybeComplete to avoid race conditions (CASSANDRA-15667)
 * EmptyType doesn't override writeValue so could attempt to write bytes when expected not to (CASSANDRA-15790)
 * Fix index queries on partition key columns when some partitions contains only static data (CASSANDRA-13666)
 * Avoid creating duplicate rows during major upgrades (CASSANDRA-15789)
 * liveDiskSpaceUsed and totalDiskSpaceUsed get corrupted if IndexSummaryRedistribution gets interrupted (CASSANDRA-15674)
 * Fix Debian init start/stop (CASSANDRA-15770)
 * Fix infinite loop on index query paging in tables with clustering (CASSANDRA-14242)
 * Fix chunk index overflow due to large sstable with small chunk length (CASSANDRA-15595)
 * Allow selecting static column only when querying static index (CASSANDRA-14242)
 * cqlsh return non-zero status when STDIN CQL fails (CASSANDRA-15623)
 * Don't skip sstables in slice queries based only on local min/max/deletion timestamp (CASSANDRA-15690)
 * Memtable memory allocations may deadlock (CASSANDRA-15367)
 * Run evictFromMembership in GossipStage (CASSANDRA-15592)
 * Fix nomenclature of allow and deny lists (CASSANDRA-15862)
 * Remove generated files from source artifact (CASSANDRA-15849)
 * Remove duplicated tools binaries from tarballs (CASSANDRA-15768)
 * Duplicate results with DISTINCT queries in mixed mode (CASSANDRA-15501)
 * Disable JMX rebinding (CASSANDRA-15653)
 * Fix writing of snapshot manifest when the table has table-backed secondary indexes (CASSANDRA-10968)
 * Fix parse error in cqlsh COPY FROM and formatting for map of blobs (CASSANDRA-15679)
 * Fix Commit log replays when static column clustering keys are collections (CASSANDRA-14365)
 * Fix Red Hat init script on newer systemd versions (CASSANDRA-15273)
 * Allow EXTRA_CLASSPATH to work on tar/source installations (CASSANDRA-15567)
 * Fix bad UDT sstable metadata serialization headers written by C* 3.0 on upgrade and in sstablescrub (CASSANDRA-15035)
 * Fix nodetool compactionstats showing extra pending task for TWCS - patch implemented (CASSANDRA-15409)
 * Fix SELECT JSON formatting for the 'duration' type (CASSANDRA-15075)
 * Fix LegacyLayout to have same behavior as 2.x when handling unknown column names (CASSANDRA-15081)
 * Update nodetool help stop output (CASSANDRA-15401)
 * Run in-jvm upgrade dtests in circleci (CASSANDRA-15506)
 * Include updates to static column in mutation size calculations (CASSANDRA-15293)
 * Fix point-in-time recoevery ignoring timestamp of updates to static columns (CASSANDRA-15292)
 * GC logs are also put under $CASSANDRA_LOG_DIR (CASSANDRA-14306)
 * Fix sstabledump's position key value when partitions have multiple rows (CASSANDRA-14721)
 * Avoid over-scanning data directories in LogFile.verify() (CASSANDRA-15364)
 * Bump generations and document changes to system_distributed and system_traces in 3.0, 3.11
   (CASSANDRA-15441)
 * Fix system_traces creation timestamp; optimise system keyspace upgrades (CASSANDRA-15398)
 * Fix various data directory prefix matching issues (CASSANDRA-13974)
 * Minimize clustering values in metadata collector (CASSANDRA-15400)
 * Avoid over-trimming of results in mixed mode clusters (CASSANDRA-15405)
 * validate value sizes in LegacyLayout (CASSANDRA-15373)
 * Ensure that tracing doesn't break connections in 3.x/4.0 mixed mode by default (CASSANDRA-15385)
 * Make sure index summary redistribution does not start when compactions are paused (CASSANDRA-15265)
 * Ensure legacy rows have primary key livenessinfo when they contain illegal cells (CASSANDRA-15365)
 * Fix race condition when setting bootstrap flags (CASSANDRA-14878)
 * Fix NativeLibrary.tryOpenDirectory callers for Windows (CASSANDRA-15426)
 * Fix SELECT JSON output for empty blobs (CASSANDRA-15435)
 * In-JVM DTest: Set correct internode message version for upgrade test (CASSANDRA-15371)
 * In-JVM DTest: Support NodeTool in dtest (CASSANDRA-15429)
 * Fix NativeLibrary.tryOpenDirectory callers for Windows (CASSANDRA-15426)
 * Fix SASI non-literal string comparisons (range operators) (CASSANDRA-15169)
 * Make sure user defined compaction transactions are always closed (CASSANDRA-15123)
 * Fix cassandra-env.sh to use $CASSANDRA_CONF to find cassandra-jaas.config (CASSANDRA-14305)
 * Fixed nodetool cfstats printing index name twice (CASSANDRA-14903)
 * Add flag to disable SASI indexes, and warnings on creation (CASSANDRA-14866)
 * Add ability to cap max negotiable protocol version (CASSANDRA-15193)
 * Gossip tokens on startup if available (CASSANDRA-15335)
 * Fix resource leak in CompressedSequentialWriter (CASSANDRA-15340)
 * Fix bad merge that reverted CASSANDRA-14993 (CASSANDRA-15289)
 * Fix LegacyLayout RangeTombstoneList IndexOutOfBoundsException when upgrading and RangeTombstone bounds are asymmetric (CASSANDRA-15172)
 * Fix NPE when using allocate_tokens_for_keyspace on new DC/rack (CASSANDRA-14952)
 * Filter sstables earlier when running cleanup (CASSANDRA-15100)
 * Use mean row count instead of mean column count for index selectivity calculation (CASSANDRA-15259)
 * Avoid updating unchanged gossip states (CASSANDRA-15097)
 * Prevent recreation of previously dropped columns with a different kind (CASSANDRA-14948)
 * Prevent client requests from blocking on executor task queue (CASSANDRA-15013)
 * Toughen up column drop/recreate type validations (CASSANDRA-15204)
 * LegacyLayout should handle paging states that cross a collection column (CASSANDRA-15201)
 * Prevent RuntimeException when username or password is empty/null (CASSANDRA-15198)
 * Multiget thrift query returns null records after digest mismatch (CASSANDRA-14812)
 * Skipping illegal legacy cells can break reverse iteration of indexed partitions (CASSANDRA-15178)
 * Handle paging states serialized with a different version than the session's (CASSANDRA-15176)
 * Throw IOE instead of asserting on unsupporter peer versions (CASSANDRA-15066)
 * Update token metadata when handling MOVING/REMOVING_TOKEN events (CASSANDRA-15120)
 * Add ability to customize cassandra log directory using $CASSANDRA_LOG_DIR (CASSANDRA-15090)
 * Skip cells with illegal column names when reading legacy sstables (CASSANDRA-15086)
 * Fix assorted gossip races and add related runtime checks (CASSANDRA-15059)
 * Fix mixed mode partition range scans with limit (CASSANDRA-15072)
 * cassandra-stress works with frozen collections: list and set (CASSANDRA-14907)
 * Fix handling FS errors on writing and reading flat files - LogTransaction and hints (CASSANDRA-15053)
 * Avoid double closing the iterator to avoid overcounting the number of requests (CASSANDRA-15058)
 * Improve `nodetool status -r` speed (CASSANDRA-14847)
 * Improve merkle tree size and time on heap (CASSANDRA-14096)
 * Add missing commands to nodetool_completion (CASSANDRA-14916)
 * Anti-compaction temporarily corrupts sstable state for readers (CASSANDRA-15004)
 * Catch non-IOException in FileUtils.close to make sure that all resources are closed (CASSANDRA-15225)
 * Handle exceptions during authentication/authorization (CASSANDRA-15041)
 * Support cross version messaging in in-jvm upgrade dtests (CASSANDRA-15078)
 * Fix index summary redistribution cancellation (CASSANDRA-15045)
 * Fixing invalid CQL in security documentation (CASSANDRA-15020)
 * Allow instance class loaders to be garbage collected for inJVM dtest (CASSANDRA-15170)
 * Add support for network topology and query tracing for inJVM dtest (CASSANDRA-15319)
 * Correct sstable sorting for garbagecollect and levelled compaction (CASSANDRA-14870)
 * Severe concurrency issues in STCS,DTCS,TWCS,TMD.Topology,TypeParser
 * Add a script to make running the cqlsh tests in cassandra repo easier (CASSANDRA-14951)
 * If SizeEstimatesRecorder misses a 'onDropTable' notification, the size_estimates table will never be cleared for that table. (CASSANDRA-14905)
 * Counters fail to increment in 2.1/2.2 to 3.X mixed version clusters (CASSANDRA-14958)
 * Streaming needs to synchronise access to LifecycleTransaction (CASSANDRA-14554)
 * Fix cassandra-stress write hang with default options (CASSANDRA-14616)
 * Differentiate between slices and RTs when decoding legacy bounds (CASSANDRA-14919)
 * Netty epoll IOExceptions caused by unclean client disconnects being logged at INFO (CASSANDRA-14909)
 * Unfiltered.isEmpty conflicts with Row extends AbstractCollection.isEmpty (CASSANDRA-14588)
 * RangeTombstoneList doesn't properly clean up mergeable or superseded rts in some cases (CASSANDRA-14894)
 * Fix handling of collection tombstones for dropped columns from legacy sstables (CASSANDRA-14912)
 * Throw exception if Columns serialized subset encode more columns than possible (CASSANDRA-14591)
 * Drop/add column name with different Kind can result in corruption (CASSANDRA-14843)
 * Fix missing rows when reading 2.1 SSTables with static columns in 3.0 (CASSANDRA-14873)
 * Move TWCS message 'No compaction necessary for bucket size' to Trace level (CASSANDRA-14884)
 * Sstable min/max metadata can cause data loss (CASSANDRA-14861)
 * Dropped columns can cause reverse sstable iteration to return prematurely (CASSANDRA-14838)
 * Legacy sstables with  multi block range tombstones create invalid bound sequences (CASSANDRA-14823)
 * Expand range tombstone validation checks to multiple interim request stages (CASSANDRA-14824)
 * Reverse order reads can return incomplete results (CASSANDRA-14803)
 * Avoid calling iter.next() in a loop when notifying indexers about range tombstones (CASSANDRA-14794)
 * Fix purging semi-expired RT boundaries in reversed iterators (CASSANDRA-14672)
 * DESC order reads can fail to return the last Unfiltered in the partition (CASSANDRA-14766)
 * Fix corrupted collection deletions for dropped columns in 3.0  2.{1,2} messages (CASSANDRA-14568)
 * Fix corrupted static collection deletions in 3.0 2.{1,2} messages (CASSANDRA-14568)
 * Handle failures in parallelAllSSTableOperation (cleanup/upgradesstables/etc) (CASSANDRA-14657)
 * Improve TokenMetaData cache populating performance avoid long locking (CASSANDRA-14660)
 * Backport: Flush netty client messages immediately (not by default) (CASSANDRA-13651)
 * Fix static column order for SELECT * wildcard queries (CASSANDRA-14638)
 * sstableloader should use discovered broadcast address to connect intra-cluster (CASSANDRA-14522)
 * Fix reading columns with non-UTF names from schema (CASSANDRA-14468)
 * Don't enable client transports when bootstrap is pending (CASSANDRA-14525)
 * MigrationManager attempts to pull schema from different major version nodes (CASSANDRA-14928)
 * Fix incorrect cqlsh results when selecting same columns multiple times (CASSANDRA-13262)
 * Returns null instead of NaN or Infinity in JSON strings (CASSANDRA-14377)
 * Paged Range Slice queries with DISTINCT can drop rows from results (CASSANDRA-14956)
 * Validate supported column type with SASI analyzer (CASSANDRA-13669)
 * Remove BTree.Builder Recycler to reduce memory usage (CASSANDRA-13929)
 * Reduce nodetool GC thread count (CASSANDRA-14475)
 * Fix New SASI view creation during Index Redistribution (CASSANDRA-14055)
 * Remove string formatting lines from BufferPool hot path (CASSANDRA-14416)
 * Update metrics to 3.1.5 (CASSANDRA-12924)
 * Detect OpenJDK jvm type and architecture (CASSANDRA-12793)
 * Don't use guava collections in the non-system keyspace jmx attributes (CASSANDRA-12271)
 * Allow existing nodes to use all peers in shadow round (CASSANDRA-13851)
 * Fix cqlsh to read connection.ssl cqlshrc option again (CASSANDRA-14299)
 * Downgrade log level to trace for CommitLogSegmentManager (CASSANDRA-14370)
 * CQL fromJson(null) throws NullPointerException (CASSANDRA-13891)
 * Serialize empty buffer as empty string for json output format (CASSANDRA-14245)
 * Allow logging implementation to be interchanged for embedded testing (CASSANDRA-13396)
 * SASI tokenizer for simple delimiter based entries (CASSANDRA-14247)
 * Fix Loss of digits when doing CAST from varint/bigint to decimal (CASSANDRA-14170)
 * RateBasedBackPressure unnecessarily invokes a lock on the Guava RateLimiter (CASSANDRA-14163)
 * Fix wildcard GROUP BY queries (CASSANDRA-14209)
 * Fix corrupted static collection deletions in 3.0 -&gt; 2.{1,2} messages (CASSANDRA-14568)
 * Fix potential IndexOutOfBoundsException with counters (CASSANDRA-14167)
 * Always close RT markers returned by ReadCommand#executeLocally() (CASSANDRA-14515)
 * Reverse order queries with range tombstones can cause data loss (CASSANDRA-14513)
 * Fix regression of lagging commitlog flush log message (CASSANDRA-14451)
 * Add Missing dependencies in pom-all (CASSANDRA-14422)
 * Cleanup StartupClusterConnectivityChecker and PING Verb (CASSANDRA-14447)
 * Fix deprecated repair error notifications from 3.x clusters to legacy JMX clients (CASSANDRA-13121)
 * Cassandra not starting when using enhanced startup scripts in windows (CASSANDRA-14418)
 * Fix progress stats and units in compactionstats (CASSANDRA-12244)
 * Better handle missing partition columns in system_schema.columns (CASSANDRA-14379)
 * Delay hints store excise by write timeout to avoid race with decommission (CASSANDRA-13740)
 * Deprecate background repair and probablistic read_repair_chance table options
   (CASSANDRA-13910)
 * Add missed CQL keywords to documentation (CASSANDRA-14359)
 * Fix unbounded validation compactions on repair / revert CASSANDRA-13797 (CASSANDRA-14332)
 * Avoid deadlock when running nodetool refresh before node is fully up (CASSANDRA-14310)
 * Handle all exceptions when opening sstables (CASSANDRA-14202)
 * Handle incompletely written hint descriptors during startup (CASSANDRA-14080)
 * Handle repeat open bound from SRP in read repair (CASSANDRA-14330)
 * Respect max hint window when hinting for LWT (CASSANDRA-14215)
 * Adding missing WriteType enum values to v3, v4, and v5 spec (CASSANDRA-13697)
 * Don't regenerate bloomfilter and summaries on startup (CASSANDRA-11163)
 * Fix NPE when performing comparison against a null frozen in LWT (CASSANDRA-14087)
 * Log when SSTables are deleted (CASSANDRA-14302)
 * Fix batch commitlog sync regression (CASSANDRA-14292)
 * Write to pending endpoint when view replica is also base replica (CASSANDRA-14251)
 * Chain commit log marker potential performance regression in batch commit mode (CASSANDRA-14194)
 * Fully utilise specified compaction threads (CASSANDRA-14210)
 * Pre-create deletion log records to finish compactions quicker (CASSANDRA-12763)
 * Fix bug that prevented compaction of SSTables after full repairs (CASSANDRA-14423)
 * Incorrect counting of pending messages in OutboundTcpConnection (CASSANDRA-11551)
 * Fix compaction failure caused by reading un-flushed data (CASSANDRA-12743)
 * Use Bounds instead of Range for sstables in anticompaction (CASSANDRA-14411)
 * Fix JSON queries with IN restrictions and ORDER BY clause (CASSANDRA-14286)
 * Backport circleci yaml (CASSANDRA-14240)
 * Check checksum before decompressing data (CASSANDRA-14284)
 * CVE-2017-5929 Security vulnerability in Logback warning in NEWS.txt (CASSANDRA-14183)
- Use %license macro

Changes in cassandra-kit:
- Update to Cassandra 3.11.10 (bsc#1181689, CVE-2020-17516)

Changes in crowbar-core:
- Update to version 5.0+git.1622489449.a8e60e238:
  * avoid v4.1.5 of delayed_job_active_record (noref)
  * add CVE-2020-26247 to travis ignore list (bsc#1180507)

Changes in crowbar-openstack:
- Update to version 5.0+git.1616001417.67fd9c2a1:
  * monasca: restart Kibana on update (bsc#1044849)

- Update to version 5.0+git.1615542070.7841c34b7:
  * monasca: fix monasca-server reinstall state check (SOC-11471)

Changes in documentation-suse-openstack-cloud:
- Update to version 8.20210512:
  * Moved Monasca deployment to immediately after keystone (SOC-11525) (#1312)

- Update to version 8.20210511:
  * Update the correct SLES version to suse-12.3 (SOC-11521) (#1321)
  * Renamed the repo name from SLE12-SP3-HA to SLE-HA12-SP3 (SOC-11523) (#1320)

- Update to version 8.20210511:
  * Add bm-power-status playbook to add sles compute section (#1317)

- Update to version 8.20210507:
  * Add instructions for checking MySQL cert expiry (SOC-11422) (#1311)

- Update to version 8.20210304:
  * Add nova and heat db purge cron jobs to maintenance section (SOC-9876) (#1307)

Changes in grafana:
- Add CVE-2021-27358.patch (bsc#1183803, CVE-2021-27358)
  * Prevent unauthenticated remote attackers from causing a DoS through the
    snapshots API.

Changes in kibana:
- Ensure /etc/sysconfig/kibana is present

- Update to Kibana 4.6.6 (bsc#1044849, CVE-2017-11499, ESA-2017-14, 
  ESA-2017-16)
  * [4.6] ignore forked code for babel transpile build phase (#13483)
  * Allow more than match queries in custom filters (#8614) (#10857)
  * [state] don't make extra $location.replace() calls (#9954)
  * [optimizer] move to querystring-browser package for up-to-date api
  * [state/unhashUrl] use encode-uri-query to generate cleanly encoded urls
  * server: refactor log_interceptor to be more DRY (#9617)
  * server: downgrade ECANCELED logs to debug (#9616)
  * server: do not treat logged warnings as errors (#8746) (#9610)
  * [server/logger] downgrade EPIPE errors to debug level (#9023)
  * Add basepath when redirecting from a trailling slash (#9035)
  * [es/kibanaIndex] use unmapped_type rather than ignore_unmapped (#8968)
  * [server/shortUrl] validate urls before shortening them
- Add CVE-2017-11481.patch (bsc#1044849, CVE-2017-11481)
  * This fixes an XSS vulnerability in URL fields
- Remove %dir declaration from /opt/kibana/optimize to ensure
  no files owned by root end up in there
- Exclude /opt/kibana/optimize from %fdupes
- Restart service on upgrade
- Do not copy LICENSE.txt and README.txt to /opt/kibana
- Fix rpmlint warnings/errors
- Switch to explicit patch application
- Fix source URL
- Fix logic for systemd/systemv detection

Changes in openstack-heat-templates:
- Update to version 0.0.0+git.1623056900.7917e18:
  * Fix zuul config for heat-templates-check

- Update to version 0.0.0+git.1621405516.71a0f7a:
  * Remove testr

Changes in openstack-monasca-installer:
- Add 0001-fix-influxdb-stop-task.patch (SOC-11470)
- Add 0001-fix-cassandra-deployment.patch (SOC-11470)

Changes in openstack-nova:
- Update to version nova-16.1.9.dev92:
  * Lowercase ironic driver hash ring and ignore case in cache
  * Include only required fields in ironic node cache
  * Add resource\_class to fields in ironic node cache

- Update to version nova-16.1.9.dev86:
  * [stable-only] Move grenade jobs to experimental
  * Update resources once in update\_available\_resource
  * rt: Make resource tracker always invoking get\_inventory()

- Update to version nova-16.1.9.dev81:
  * [stable-only] gate: Pin CEPH\_RELEASE to nautilus in LM hook

- Update to version nova-16.1.9.dev80:
  * [placement] Add status and links fields to version document at /

Changes in openstack-nova:
- Update to version nova-16.1.9.dev92:
  * Lowercase ironic driver hash ring and ignore case in cache
  * Include only required fields in ironic node cache
  * Add resource\_class to fields in ironic node cache

- Update to version nova-16.1.9.dev86:
  * [stable-only] Move grenade jobs to experimental
  * Update resources once in update\_available\_resource
  * rt: Make resource tracker always invoking get\_inventory()

- Update to version nova-16.1.9.dev81:
  * [stable-only] gate: Pin CEPH\_RELEASE to nautilus in LM hook

- Update to version nova-16.1.9.dev80:
  * [placement] Add status and links fields to version document at /

Changes in python-Django:
- Add CVE-2021-33203.patch (bsc#1186608, CVE-2021-33203)
    * Fixed potential path-traversal via admindocs' TemplateDetailView.
- Add CVE-2021-33571.patch (bsc#1186611, CVE-2021-33571)
    * Prevented leading zeros in IPv4 addresses.

- Add CVE-2021-31542.patch (bsc#1185623, CVE-2021-31542)
    * Fixed CVE-2021-31542 -- Tightened path and file name sanitation in file
      uploads.

- Add CVE-2021-28658.patch (bsc#1184148, CVE-2021-28658)
  * Fixed potential directory-traversal via uploaded files

- Add CVE-2021-23336.patch (bsc#1182433, CVE-2021-23336)
  * Fixed web cache poisoning via django.utils.http.limited_parse_qsl()

Changes in python-eventlet:
- Add 0001-websocket-fd-leak-when-client-did-not-close-connecti.patch 
- Add 0002-websocket-Limit-maximum-uncompressed-frame-length-to.patch (bsc#1185836 CVE-2021-21419)
    * websocket: Limit maximum uncompressed frame length to 8MiB

Changes in python-py:
- Add CVE-2020-29651.patch ((bsc#1179805, CVE-2020-29651)
  * svnwc: fix regular expression vulnerable to DoS in blame
    functionality

Changes in python-pysaml2:
- Add %dir declaration for %{_licensedir}

- Fix CVE-2021-21238, bsc#1181277 with
  0004-Strengthen-XSW-tests.patch ,
  0005-Fix-the-parser-to-not-break-on-ePTID-AttributeValues.patch ,
  0006-Add-xsd-schemas.patch ,
  0007-Fix-CVE-2021-21238-SAML-XML-Signature-wrapping.patch .
  This adds a dependency on python-xmlschema, which depends on
  python-elementpath and build depends python-pathlib2, which depends on
  python-scandir, thus all these need to be added for this to work.
  The used python-xmlschema needs to support the sandbox argument
  which was added in 1.2.0 and refined in 1.2.1, but that version
  doesn't support python2, so a patched version that does both is
  needed.
  0009-Make-previous-commits-python2-compatible.patch to
  not add a dependency on reportlib_resources and make other
  changes python2 compatible.
- Fix CVE-2021-21239, bsc#1181278 with
  0008-Fix-CVE-2021-21239-Restrict-the-key-data-that-xmlsec.patch

Changes in venv-openstack-keystone:
- Add python-xmlschema and python-elementpath for new python-pysaml2 version.

Changes in python-xmlschema:

- Add missed BuildRequires on pathlib2

- Add 3 patches to backport sandbox argument, which is needed by a security fix
  in python-pysaml2 and one patch to make backport python2 compatible.
- Upstream url changed
- Add rpmlintrc to make it work on Leap 42.3
- Update to 1.0.18:
  * Fix for *ModelVisitor.iter_unordered_content()*
  * Fixed default converter, AbderaConverter and JsonMLConverter for xs:anyType decode
  * Fixed validation tests with all converters
  * Added UnorderedConverter to validation tests
- Update to 1.0.17:
  * Enhancement of validation-only speed (~15%)
  * Added *is_valid()* and *iter_errors()* to module API
- Update to 1.0.16:
  * Improved XMLResource class for working with compressed files
  * Fix for validation with XSD wildcards and 'lax' process content
  * Fix ambiguous items validation for xs:choice and xs:sequence models

- Handle UnicodeDecodeErrors during build process

- Update to 1.0.15:
  * Improved XPath 2.0 bindings
  * Added logging for schema initialization and building (handled with argument loglevel)
  * Update encoding of collapsed contents with a new model based reordering method
  * Removed XLink namespace from meta-schema (loaded from a fallback location like XHTML)
  * Fixed half of failed W3C instance tests (remain 255 over 15344 tests)

- Initial commit, needed by pytest 5.1.2

Changes in python-elementpath:

- Update to 1.3.1:
  * Improved schema proxy
  * Improved XSD type matching using paths
  * Cached parent path for XPathContext (only Python 3)
  * Improve typed selection with TypedAttribute and TypedElement named-tuples
  * Add iter_results to XPathContext
  * Remove XMLSchemaProxy from package
  * Fix descendant shortcut operator '//'
  * Fix text() function
  * Fix typed select of '(name)' token
  * Fix 24-hour time for DateTime

- Skip test_hashing to fix 32bit builds

- Initial commit needed by python-xmlschema

Changes in python-six:
- Update in SLE-12 (bsc#1176784, jsc#ECO-3105, jsc#PM-2352)

- Fix testsuite on SLE-12
  + Add python to BuildRequires for suse_version less 1500

- Fix dbm deps as the MU for provides: python-dbm was not released
  on sle12 yet
- Add requirement on pytest &gt; 4.0 to see the pytest module works
  with this MU

- Do not cause buildcycle with previous change but rather
  install the egg-info prepared metadata from the tarball

- use setuptools for building to support pip 10.x (bsc#1166139)

- update to 1.14.0
 * Add `six.assertNotRegex`
 * `six.moves._dummy_thread` now points to the `_thread` module on
    Python 3.9+. Python 3.7 and later requires threading and deprecated the
    `_dummy_thread` module
 * Remove support for Python 2.6 and Python 3.2
 * `six.wraps` now ignores missing attributes

- Pull in dbm/gdbm module from python for testing

- update to 0.13.0:
  - Issue #298, pull request #299: Add `six.moves.dbm_ndbm`.
  - Issue #155: Add `six.moves.collections_abc`, which aliases the `collections`
    module on Python 2-3.2 and the `collections.abc` on Python 3.3 and greater.
  - Pull request #304: Re-add distutils fallback in `setup.py`.
  - Pull request #305: On Python 3.7, `with_metaclass` supports classes using PEP

- Simplify the pytest call

- Fix pytest call
- Fixdocumentation package generating

- Change %pretrans back to %pre to fix bootstrap issue
  boo#1123064 bsc#1143893

- Require just base python module, even full python is too much
  and it is not required here

- Update to 0.12.0:
    * `six.add_metaclass` now preserves `__qualname__` from the
      original class.
    * Add `six.ensure_binary`, `six.ensure_text`, and
      `six.ensure_str`.
- Because of cyclical dependencies between six and Sphinx, we
  need to to do multibuild.

- Include in SLE-12 (FATE#326838, bsc#1113302)

- remove egg-info directory in %pretrans
- fix egg-info directory pattern
- match any version of egg-info for a certain python version

- Break the cycilical dependency on python-setuptools.

- Remove argparse dependency

- build python3 subpackage (FATE#324435, bsc#1073879)

- remove egg-info directory before installation if it exists,
  because setuptools produce directory and six switched to distutils
  that produce a file
  (and because rpm can't handle that by itself)
  fixes bsc#1057496

- Fix Source url

- README-&gt;README.rst, add CHANGES
- update to version 1.11.0:
  * Pull request #178: `with_metaclass` now properly proxies
    `__prepare__` to the underlying metaclass.
  * Pull request #191: Allow `with_metaclass` to work with metaclasses
    implemented in C.
  * Pull request #203: Add parse_http_list and parse_keqv_list to
    moved urllib.request.
  * Pull request #172 and issue #171: Add unquote_to_bytes to moved
    urllib.parse.
  * Pull request #167: Add `six.moves.getoutput`.
  * Pull request #80: Add `six.moves.urllib_parse.splitvalue`.
  * Pull request #75: Add `six.moves.email_mime_image`.
  * Pull request #72: Avoid creating reference cycles through
    tracebacks in `reraise`.

- Submit 1.9.0 to SLE-12 (fate#319030, fate#318838, bsc#940812)

- sanitize release line in specfile

Changes in rubygem-activerecord-session_store.SUSE_SLE-12-SP4_Update_Products_Cloud9_Update:
- added CVE-2019-25025.patch (CVE-2019-25025, bsc#1183174)
  * This requires CVE-2019-16782.patch to be included in rubygem-actionpack-4_2
  to work correctly.

Changes in venv-openstack-keystone:
- Add python-xmlschema and python-elementpath for new python-pysaml2 version.

- Add python-defusedxml (bsc#1019074)

- Inherit version number of venv from main component (SCRD-8523)

  		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-28"/>
	<updated date="2021-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019074">SUSE bug 1019074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044849">SUSE bug 1044849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057496">SUSE bug 1057496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073879">SUSE bug 1073879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113302">SUSE bug 1113302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123064">SUSE bug 1123064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143893">SUSE bug 1143893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166139">SUSE bug 1166139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176784">SUSE bug 1176784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179805">SUSE bug 1179805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180507">SUSE bug 1180507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181277">SUSE bug 1181277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181278">SUSE bug 1181278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181689">SUSE bug 1181689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181828">SUSE bug 1181828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182433">SUSE bug 1182433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183174">SUSE bug 1183174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183803">SUSE bug 1183803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184148">SUSE bug 1184148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185623">SUSE bug 1185623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185836">SUSE bug 1185836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186608">SUSE bug 1186608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186611">SUSE bug 1186611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940812">SUSE bug 940812</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-11481/">CVE-2017-11481 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11481">CVE-2017-11481 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11499/">CVE-2017-11499 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11499">CVE-2017-11499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5929/">CVE-2017-5929 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5929">CVE-2017-5929 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-25025/">CVE-2019-25025 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25025">CVE-2019-25025 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17516/">CVE-2020-17516 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17516">CVE-2020-17516 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26247/">CVE-2020-26247 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26247">CVE-2020-26247 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29651/">CVE-2020-29651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29651">CVE-2020-29651 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21238/">CVE-2021-21238 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21238">CVE-2021-21238 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21239/">CVE-2021-21239 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21239">CVE-2021-21239 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21419/">CVE-2021-21419 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21419">CVE-2021-21419 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27358/">CVE-2021-27358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27358">CVE-2021-27358 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28658/">CVE-2021-28658 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28658">CVE-2021-28658 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31542/">CVE-2021-31542 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31542">CVE-2021-31542 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33203/">CVE-2021-33203 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33203">CVE-2021-33203 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33571/">CVE-2021-33571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33571">CVE-2021-33571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626560" comment="cassandra-3.11.10-5.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626561" comment="cassandra-tools-3.11.10-5.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626607" comment="crowbar-core-5.0+git.1622489449.a8e60e238-3.50.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626608" comment="crowbar-core-branding-upstream-5.0+git.1622489449.a8e60e238-3.50.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626609" comment="crowbar-openstack-5.0+git.1616001417.67fd9c2a1-4.52.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626610" comment="documentation-suse-openstack-cloud-deployment-8.20210512-1.32.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626567" comment="documentation-suse-openstack-cloud-supplement-8.20210512-1.32.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626568" comment="documentation-suse-openstack-cloud-upstream-admin-8.20210512-1.32.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626569" comment="documentation-suse-openstack-cloud-upstream-user-8.20210512-1.32.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624420" comment="grafana-6.7.4-4.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624421" comment="kibana-4.6.6-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624422" comment="openstack-heat-templates-0.0.0+git.1623056900.7917e18-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624423" comment="openstack-monasca-installer-20190923_16.32-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626571" comment="openstack-nova-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626572" comment="openstack-nova-api-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626573" comment="openstack-nova-cells-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626574" comment="openstack-nova-compute-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626575" comment="openstack-nova-conductor-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626576" comment="openstack-nova-console-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626577" comment="openstack-nova-consoleauth-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626578" comment="openstack-nova-doc-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626579" comment="openstack-nova-novncproxy-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626580" comment="openstack-nova-placement-api-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626581" comment="openstack-nova-scheduler-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626582" comment="openstack-nova-serialproxy-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626583" comment="openstack-nova-vncproxy-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624437" comment="python-Django-1.11.29-3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009599115" comment="python-elementpath-1.3.1-1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624438" comment="python-eventlet-0.20.0-6.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626584" comment="python-nova-16.1.9~dev92-3.48.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624440" comment="python-py-1.4.34-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624441" comment="python-pysaml2-4.0.2-5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624442" comment="python-xmlschema-1.0.18-1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624469" comment="ruby2.1-rubygem-activerecord-session_store-0.1.2-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149086" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1187364" ref_url="https://bugzilla.suse.com/1187364" source="BUGZILLA"/>
		<reference ref_id="1187365" ref_url="https://bugzilla.suse.com/1187365" source="BUGZILLA"/>
		<reference ref_id="1187366" ref_url="https://bugzilla.suse.com/1187366" source="BUGZILLA"/>
		<reference ref_id="1187367" ref_url="https://bugzilla.suse.com/1187367" source="BUGZILLA"/>
		<reference ref_id="1187529" ref_url="https://bugzilla.suse.com/1187529" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3593" ref_url="https://www.suse.com/security/cve/CVE-2021-3593/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<reference ref_id="CVE-2021-3611" ref_url="https://www.suse.com/security/cve/CVE-2021-3611/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009229.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2021-3595: Fixed slirp: invalid pointer initialization may lead to information disclosure (tftp) (bsc#1187366)
- CVE-2021-3592: Fix for slirp: invalid pointer initialization may lead to information disclosure (bootp) (bsc#1187364)
- CVE-2021-3594: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp) (bsc#1187367)
- CVE-2021-3593: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp6) (bsc#1187365)
- CVE-2021-3611: Fix intel-hda segmentation fault due to stack overflow (bsc#1187529)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-29"/>
	<updated date="2021-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187365">SUSE bug 1187365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187366">SUSE bug 1187366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187529">SUSE bug 1187529</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3593/">CVE-2021-3593 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3593">CVE-2021-3593 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3595">CVE-2021-3595 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3611/">CVE-2021-3611 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3611">CVE-2021-3611 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625025" comment="qemu-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625026" comment="qemu-block-curl-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625027" comment="qemu-block-iscsi-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624976" comment="qemu-block-rbd-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625028" comment="qemu-block-ssh-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625029" comment="qemu-guest-agent-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624979" comment="qemu-ipxe-1.0.0+-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624980" comment="qemu-kvm-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625030" comment="qemu-lang-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624983" comment="qemu-seabios-1.10.2_0_g5f4c7b1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624984" comment="qemu-sgabios-8-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625031" comment="qemu-tools-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624986" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624987" comment="qemu-x86-2.9.1-6.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149087" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1172505" ref_url="https://bugzilla.suse.com/1172505" source="BUGZILLA"/>
		<reference ref_id="1187105" ref_url="https://bugzilla.suse.com/1187105" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12049" ref_url="https://www.suse.com/security/cve/CVE-2020-12049/" source="CVE"/>
		<reference ref_id="CVE-2020-35512" ref_url="https://www.suse.com/security/cve/CVE-2020-35512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009240.html" source="SUSE-SU"/>
		<description>
This update for dbus-1 fixes the following issues:

- CVE-2020-35512: Fixed a bug where users with the same numeric UID could lead to use-after-free and undefined behaviour. (bsc#1187105)
- CVE-2020-12049: Fixed a bug where a truncated messages lead to resource exhaustion. (bsc#1172505)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-02"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172505">SUSE bug 1172505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187105">SUSE bug 1187105</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12049/">CVE-2020-12049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12049">CVE-2020-12049 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35512/">CVE-2020-35512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35512">CVE-2020-35512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625809" comment="dbus-1-1.8.22-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625810" comment="dbus-1-x11-1.8.22-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625811" comment="libdbus-1-3-1.8.22-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625756" comment="libdbus-1-3-32bit-1.8.22-29.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149088" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1188697" ref_url="https://bugzilla.suse.com/1188697" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21775" ref_url="https://www.suse.com/security/cve/CVE-2021-21775/" source="CVE"/>
		<reference ref_id="CVE-2021-21779" ref_url="https://www.suse.com/security/cve/CVE-2021-21779/" source="CVE"/>
		<reference ref_id="CVE-2021-30663" ref_url="https://www.suse.com/security/cve/CVE-2021-30663/" source="CVE"/>
		<reference ref_id="CVE-2021-30665" ref_url="https://www.suse.com/security/cve/CVE-2021-30665/" source="CVE"/>
		<reference ref_id="CVE-2021-30689" ref_url="https://www.suse.com/security/cve/CVE-2021-30689/" source="CVE"/>
		<reference ref_id="CVE-2021-30720" ref_url="https://www.suse.com/security/cve/CVE-2021-30720/" source="CVE"/>
		<reference ref_id="CVE-2021-30734" ref_url="https://www.suse.com/security/cve/CVE-2021-30734/" source="CVE"/>
		<reference ref_id="CVE-2021-30744" ref_url="https://www.suse.com/security/cve/CVE-2021-30744/" source="CVE"/>
		<reference ref_id="CVE-2021-30749" ref_url="https://www.suse.com/security/cve/CVE-2021-30749/" source="CVE"/>
		<reference ref_id="CVE-2021-30758" ref_url="https://www.suse.com/security/cve/CVE-2021-30758/" source="CVE"/>
		<reference ref_id="CVE-2021-30795" ref_url="https://www.suse.com/security/cve/CVE-2021-30795/" source="CVE"/>
		<reference ref_id="CVE-2021-30797" ref_url="https://www.suse.com/security/cve/CVE-2021-30797/" source="CVE"/>
		<reference ref_id="CVE-2021-30799" ref_url="https://www.suse.com/security/cve/CVE-2021-30799/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.32.3:

- CVE-2021-21775: Fixed a use-after-free vulnerability in the way certain events are processed for ImageLoader objects. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. (bsc#1188697)
- CVE-2021-21779: Fixed a use-after-free vulnerability in the way that WebKit GraphicsContext handles certain events. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. (bsc#1188697)
- CVE-2021-30663: An integer overflow was addressed with improved input validation. (bsc#1188697)
- CVE-2021-30665: A memory corruption issue was addressed with improved state management. (bsc#1188697)
- CVE-2021-30689: A logic issue was addressed with improved state management. (bsc#1188697)
- CVE-2021-30720: A logic issue was addressed with improved restrictions. (bsc#1188697)
- CVE-2021-30734: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
- CVE-2021-30744: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. (bsc#1188697)
- CVE-2021-30749: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
- CVE-2021-30758: A type confusion issue was addressed with improved state handling. (bsc#1188697)
- CVE-2021-30795: A use after free issue was addressed with improved memory management. (bsc#1188697)
- CVE-2021-30797: This issue was addressed with improved checks. (bsc#1188697)
- CVE-2021-30799: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-03"/>
	<updated date="2021-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21775/">CVE-2021-21775 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21775">CVE-2021-21775 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21779/">CVE-2021-21779 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21779">CVE-2021-21779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30663/">CVE-2021-30663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30663">CVE-2021-30663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30665/">CVE-2021-30665 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30665">CVE-2021-30665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30689/">CVE-2021-30689 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30689">CVE-2021-30689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30720/">CVE-2021-30720 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30720">CVE-2021-30720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30734/">CVE-2021-30734 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30734">CVE-2021-30734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30744/">CVE-2021-30744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30744">CVE-2021-30744 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30749/">CVE-2021-30749 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30749">CVE-2021-30749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30758/">CVE-2021-30758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30758">CVE-2021-30758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30795/">CVE-2021-30795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30795">CVE-2021-30795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30797/">CVE-2021-30797 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30797">CVE-2021-30797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30799/">CVE-2021-30799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30799">CVE-2021-30799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627312" comment="libjavascriptcoregtk-4_0-18-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627313" comment="libwebkit2gtk-4_0-37-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627305" comment="libwebkit2gtk3-lang-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627314" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627315" comment="typelib-1_0-WebKit2-4_0-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627316" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627317" comment="webkit2gtk-4_0-injected-bundles-2.32.3-2.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149089" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009250.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3630: out-of-bounds write in DJVU:DjVuTXT:decode() in DjVuText.cpp (bsc#1187869)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3630">CVE-2021-3630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627946" comment="libdjvulibre21-3.5.25.3-5.19.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149090" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1188574" ref_url="https://bugzilla.suse.com/1188574" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34552" ref_url="https://www.suse.com/security/cve/CVE-2021-34552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009267.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2021-34552: Fixed a buffer overflow in Convert.c (bsc#1188574)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-06"/>
	<updated date="2021-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188574">SUSE bug 1188574</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34552/">CVE-2021-34552 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34552">CVE-2021-34552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627135" comment="python-Pillow-4.2.1-3.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149091" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1189206" ref_url="https://bugzilla.suse.com/1189206" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009291.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

  It was possible to trigger Remote code execution due to a integer overflow (CVE-2021-38185, bsc#1189206)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-14"/>
	<updated date="2021-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189206">SUSE bug 1189206</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630615" comment="cpio-2.11-36.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630610" comment="cpio-lang-2.11-36.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149092" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1188881" ref_url="https://bugzilla.suse.com/1188881" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009294.html" source="SUSE-SU"/>
		<description>
This update for libcares2 fixes the following issues:

- CVE-2021-3672: Fixed input validation on hostnames (bsc#1188881).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3672">CVE-2021-3672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630393" comment="libcares2-1.9.1-9.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149093" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.13.0 ESR (MFSA 2021-34, bsc#1188891):

- CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
- CVE-2021-29988: Memory corruption as a result of incorrect style treatment
- CVE-2021-29984: Incorrect instruction reordering during JIT optimization
- CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
- CVE-2021-29985: Use-after-free media channels
- CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630616" comment="MozillaFirefox-78.13.0-112.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630617" comment="MozillaFirefox-devel-78.13.0-112.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630618" comment="MozillaFirefox-translations-common-78.13.0-112.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149094" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-puma (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1188527" ref_url="https://bugzilla.suse.com/1188527" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29509" ref_url="https://www.suse.com/security/cve/CVE-2021-29509/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009303.html" source="SUSE-SU"/>
		<description>
This update for rubygem-puma fixes the following issues:

- CVE-2021-29509: Incomplete fix for CVE-2019-16770 allows Denial of Service (bsc#1188527)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188527">SUSE bug 1188527</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29509/">CVE-2021-29509 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29509">CVE-2021-29509 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628172" comment="ruby2.1-rubygem-puma-2.16.0-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149095" version="1" class="patch">
	<metadata>
		<title>Recommended update for cpio (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1189465" ref_url="https://bugzilla.suse.com/1189465" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<reference ref_id="SUSE-RU-2021:2779-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019895.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

- A regression in the previous update could lead to crashes (bsc#1189465)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-19"/>
	<updated date="2021-08-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1189465">SUSE bug 1189465</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631319" comment="cpio-2.11-36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631320" comment="cpio-lang-2.11-36.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149096" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1185056" ref_url="https://bugzilla.suse.com/1185056" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188566" ref_url="https://bugzilla.suse.com/1188566" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2161" ref_url="https://www.suse.com/security/cve/CVE-2021-2161/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009315.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u302 (icedtea 3.20.0)
- CVE-2021-2341: Improve file transfers. (bsc#1188564)
- CVE-2021-2369: Better jar file validation. (bsc#1188565)
- CVE-2021-2388: Enhance compiler validation. (bsc#1188566)
- CVE-2021-2161: Less ambiguous processing. (bsc#1185056)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185056">SUSE bug 1185056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188566">SUSE bug 1188566</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2161/">CVE-2021-2161 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2161">CVE-2021-2161 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2388">CVE-2021-2388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627215" comment="java-1_8_0-openjdk-1.8.0.302-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627216" comment="java-1_8_0-openjdk-demo-1.8.0.302-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627217" comment="java-1_8_0-openjdk-devel-1.8.0.302-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627218" comment="java-1_8_0-openjdk-headless-1.8.0.302-27.63.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149097" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1189465" ref_url="https://bugzilla.suse.com/1189465" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009333.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

- A patch previously applied to remedy CVE-2021-38185 introduced a regression
  that had the potential to cause a segmentation fault in cpio. [bsc#1189465]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189465">SUSE bug 1189465</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631542" comment="cpio-2.11-36.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631541" comment="cpio-lang-2.11-36.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149098" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyYAML (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1174514" ref_url="https://bugzilla.suse.com/1174514" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14343" ref_url="https://www.suse.com/security/cve/CVE-2020-14343/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009336.html" source="SUSE-SU"/>
		<description>

This update for python-PyYAML fixes the following issues:

- Update to 5.3.1.

- CVE-2020-14343: A vulnerability was discovered in the PyYAML library,
  where it was susceptible to arbitrary code execution when it processes
  untrusted YAML files through the full_load method or with the FullLoader
  loader. Applications that use the library to process untrusted input
  may be vulnerable to this flaw. This flaw allows an attacker to
  execute arbitrary code on the system by abusing the python/object/new
  constructor. This flaw is due to an incomplete fix for CVE-2020-1747.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174514">SUSE bug 1174514</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14343/">CVE-2020-14343 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14343">CVE-2020-14343 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628223" comment="python-PyYAML-5.3.1-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628224" comment="python3-PyYAML-5.3.1-28.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149099" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009342.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following security issue:

- CVE-2021-3712: a bug in the code for printing certificate details could lead
  to a buffer overrun that a malicious actor could exploit to crash the
  application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631696" comment="libopenssl-devel-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631697" comment="libopenssl1_0_0-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631678" comment="libopenssl1_0_0-32bit-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631698" comment="libopenssl1_0_0-hmac-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631680" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631699" comment="openssl-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631682" comment="openssl-doc-1.0.2j-60.69.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149100" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1117483" ref_url="https://bugzilla.suse.com/1117483" source="BUGZILLA"/>
		<reference ref_id="1181345" ref_url="https://bugzilla.suse.com/1181345" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27827" ref_url="https://www.suse.com/security/cve/CVE-2020-27827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008266.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:
	  
- openvswitch was updated to 2.7.12
- CVE-2020-27827: Fixed a memory leak when parsing lldp packets (bsc#1181345)	  
A lot more minor bugs have been fixed with this openvswitch version. Please refer to the changelog of
the openvswitch.rpm file in order to obtain a list of all changes.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-02"/>
	<updated date="2021-02-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1117483">SUSE bug 1117483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181345">SUSE bug 1181345</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27827/">CVE-2020-27827 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27827">CVE-2020-27827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555935" comment="openvswitch-2.7.12-3.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149101" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1188576" ref_url="https://bugzilla.suse.com/1188576" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25051" ref_url="https://www.suse.com/security/cve/CVE-2019-25051/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009356.html" source="SUSE-SU"/>
		<description>
This update for aspell fixes the following issues:

- CVE-2019-25051: Fixed heap-buffer-overflow in acommon:ObjStack:dup_top (bsc#1188576).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188576">SUSE bug 1188576</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25051/">CVE-2019-25051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25051">CVE-2019-25051 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627800" comment="aspell-0.60.6.1-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627801" comment="aspell-ispell-0.60.6.1-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627802" comment="libaspell15-0.60.6.1-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627791" comment="libaspell15-32bit-0.60.6.1-18.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149102" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1175443" ref_url="https://bugzilla.suse.com/1175443" source="BUGZILLA"/>
		<reference ref_id="1188888" ref_url="https://bugzilla.suse.com/1188888" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8622" ref_url="https://www.suse.com/security/cve/CVE-2020-8622/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009368.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8622: A truncated TSIG response can lead to an assertion failure (bsc#1175443).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-30"/>
	<updated date="2021-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188888">SUSE bug 1188888</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8622/">CVE-2020-8622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8622">CVE-2020-8622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627796" comment="bind-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627797" comment="bind-chrootenv-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627784" comment="bind-doc-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627798" comment="bind-libs-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627786" comment="bind-libs-32bit-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627799" comment="bind-utils-9.9.9P1-63.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149103" version="1" class="patch">
	<metadata>
		<title>Security update for mysql-connector-java (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1173600" ref_url="https://bugzilla.suse.com/1173600" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2875" ref_url="https://www.suse.com/security/cve/CVE-2020-2875/" source="CVE"/>
		<reference ref_id="CVE-2020-2933" ref_url="https://www.suse.com/security/cve/CVE-2020-2933/" source="CVE"/>
		<reference ref_id="CVE-2020-2934" ref_url="https://www.suse.com/security/cve/CVE-2020-2934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009371.html" source="SUSE-SU"/>
		<description>
This update for mysql-connector-java fixes the following issues:

- CVE-2020-2875: Unauthenticated attacker with network access via multiple protocols can compromise MySQL Connectors. (bsc#1173600)
- CVE-2020-2934: Fixed a vulnerability which could cause a partial denial of service of MySQL Connectors. (bsc#1173600)
- CVE-2020-2933: Fixed a vulnerability which could allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. (bsc#1173600)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-30"/>
	<updated date="2021-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173600">SUSE bug 1173600</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2875/">CVE-2020-2875 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2875">CVE-2020-2875 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2933/">CVE-2020-2933 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2933">CVE-2020-2933 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-2934/">CVE-2020-2934 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2934">CVE-2020-2934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627023" comment="mysql-connector-java-5.1.42-5.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149104" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1188457" ref_url="https://bugzilla.suse.com/1188457" source="BUGZILLA"/>
		<reference ref_id="1188458" ref_url="https://bugzilla.suse.com/1188458" source="BUGZILLA"/>
		<reference ref_id="1188459" ref_url="https://bugzilla.suse.com/1188459" source="BUGZILLA"/>
		<reference ref_id="1188460" ref_url="https://bugzilla.suse.com/1188460" source="BUGZILLA"/>
		<reference ref_id="1188461" ref_url="https://bugzilla.suse.com/1188461" source="BUGZILLA"/>
		<reference ref_id="1188462" ref_url="https://bugzilla.suse.com/1188462" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20298" ref_url="https://www.suse.com/security/cve/CVE-2021-20298/" source="CVE"/>
		<reference ref_id="CVE-2021-20299" ref_url="https://www.suse.com/security/cve/CVE-2021-20299/" source="CVE"/>
		<reference ref_id="CVE-2021-20300" ref_url="https://www.suse.com/security/cve/CVE-2021-20300/" source="CVE"/>
		<reference ref_id="CVE-2021-20302" ref_url="https://www.suse.com/security/cve/CVE-2021-20302/" source="CVE"/>
		<reference ref_id="CVE-2021-20303" ref_url="https://www.suse.com/security/cve/CVE-2021-20303/" source="CVE"/>
		<reference ref_id="CVE-2021-20304" ref_url="https://www.suse.com/security/cve/CVE-2021-20304/" source="CVE"/>
		<reference ref_id="CVE-2021-3476" ref_url="https://www.suse.com/security/cve/CVE-2021-3476/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009386.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- CVE-2021-20298 [bsc#1188460]: Fixed Out-of-memory in B44Compressor
- CVE-2021-20299 [bsc#1188459]: Fixed Null-dereference READ in Imf_2_5:Header:operator
- CVE-2021-20300 [bsc#1188458]: Fixed Integer-overflow in Imf_2_5:hufUncompress
- CVE-2021-20302 [bsc#1188462]: Fixed Floating-point-exception in Imf_2_5:precalculateTileInfot
- CVE-2021-20303 [bsc#1188457]: Fixed Heap-buffer-overflow in Imf_2_5::copyIntoFrameBuffer
- CVE-2021-20304 [bsc#1188461]: Fixed Undefined-shift in Imf_2_5:hufDecode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188457">SUSE bug 1188457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188458">SUSE bug 1188458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188459">SUSE bug 1188459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188460">SUSE bug 1188460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188461">SUSE bug 1188461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188462">SUSE bug 1188462</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20298/">CVE-2021-20298 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20298">CVE-2021-20298 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20299/">CVE-2021-20299 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20299">CVE-2021-20299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20300/">CVE-2021-20300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20300">CVE-2021-20300 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20302/">CVE-2021-20302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20302">CVE-2021-20302 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-20303/">CVE-2021-20303 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20303">CVE-2021-20303 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20304/">CVE-2021-20304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20304">CVE-2021-20304 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3476/">CVE-2021-3476 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3476">CVE-2021-3476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627947" comment="libIlmImf-Imf_2_1-21-2.1.0-6.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627948" comment="openexr-2.1.0-6.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149105" version="1" class="patch">
	<metadata>
		<title>Security update for libesmtp (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1160462" ref_url="https://bugzilla.suse.com/1160462" source="BUGZILLA"/>
		<reference ref_id="1189097" ref_url="https://bugzilla.suse.com/1189097" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19977" ref_url="https://www.suse.com/security/cve/CVE-2019-19977/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009380.html" source="SUSE-SU"/>
		<description>
This update for libesmtp fixes the following issues:

- CVE-2019-19977: Fix stack-based buffer over-read in ntlm/ntlmstruct.c (bsc#1160462).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160462">SUSE bug 1160462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189097">SUSE bug 1189097</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19977/">CVE-2019-19977 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19977">CVE-2019-19977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628213" comment="libesmtp-1.0.6-17.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149106" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-addressable (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1188207" ref_url="https://bugzilla.suse.com/1188207" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32740" ref_url="https://www.suse.com/security/cve/CVE-2021-32740/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009392.html" source="SUSE-SU"/>
		<description>
This update for rubygem-addressable fixes the following issues:

- CVE-2021-32740: Fixed denial of service via maliciously crafted templates (bsc#1188207).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188207">SUSE bug 1188207</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32740/">CVE-2021-32740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32740">CVE-2021-32740 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631285" comment="ruby2.1-rubygem-addressable-2.3.6-3.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149107" version="1" class="patch">
	<metadata>
		<title>Security update for file (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1154661" ref_url="https://bugzilla.suse.com/1154661" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18218" ref_url="https://www.suse.com/security/cve/CVE-2019-18218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009396.html" source="SUSE-SU"/>
		<description>
This update for file fixes the following issues:

- CVE-2019-18218: Fixed heap-based buffer overflow in cdf_read_property_info in cdf.c (bsc#1154661).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154661">SUSE bug 1154661</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18218/">CVE-2019-18218 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18218">CVE-2019-18218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628151" comment="file-5.22-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628152" comment="file-magic-5.22-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628153" comment="libmagic1-5.22-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628154" comment="libmagic1-32bit-5.22-10.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149108" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1182654" ref_url="https://bugzilla.suse.com/1182654" source="BUGZILLA"/>
		<reference ref_id="1186429" ref_url="https://bugzilla.suse.com/1186429" source="BUGZILLA"/>
		<reference ref_id="1186433" ref_url="https://bugzilla.suse.com/1186433" source="BUGZILLA"/>
		<reference ref_id="1186434" ref_url="https://bugzilla.suse.com/1186434" source="BUGZILLA"/>
		<reference ref_id="1187369" ref_url="https://bugzilla.suse.com/1187369" source="BUGZILLA"/>
		<reference ref_id="1187376" ref_url="https://bugzilla.suse.com/1187376" source="BUGZILLA"/>
		<reference ref_id="1187378" ref_url="https://bugzilla.suse.com/1187378" source="BUGZILLA"/>
		<reference ref_id="1189373" ref_url="https://bugzilla.suse.com/1189373" source="BUGZILLA"/>
		<reference ref_id="1189376" ref_url="https://bugzilla.suse.com/1189376" source="BUGZILLA"/>
		<reference ref_id="1189378" ref_url="https://bugzilla.suse.com/1189378" source="BUGZILLA"/>
		<reference ref_id="1189380" ref_url="https://bugzilla.suse.com/1189380" source="BUGZILLA"/>
		<reference ref_id="1189882" ref_url="https://bugzilla.suse.com/1189882" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0089" ref_url="https://www.suse.com/security/cve/CVE-2021-0089/" source="CVE"/>
		<reference ref_id="CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255/" source="CVE"/>
		<reference ref_id="CVE-2021-28690" ref_url="https://www.suse.com/security/cve/CVE-2021-28690/" source="CVE"/>
		<reference ref_id="CVE-2021-28692" ref_url="https://www.suse.com/security/cve/CVE-2021-28692/" source="CVE"/>
		<reference ref_id="CVE-2021-28694" ref_url="https://www.suse.com/security/cve/CVE-2021-28694/" source="CVE"/>
		<reference ref_id="CVE-2021-28695" ref_url="https://www.suse.com/security/cve/CVE-2021-28695/" source="CVE"/>
		<reference ref_id="CVE-2021-28696" ref_url="https://www.suse.com/security/cve/CVE-2021-28696/" source="CVE"/>
		<reference ref_id="CVE-2021-28697" ref_url="https://www.suse.com/security/cve/CVE-2021-28697/" source="CVE"/>
		<reference ref_id="CVE-2021-28698" ref_url="https://www.suse.com/security/cve/CVE-2021-28698/" source="CVE"/>
		<reference ref_id="CVE-2021-28699" ref_url="https://www.suse.com/security/cve/CVE-2021-28699/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-3594: slirp: invalid pointer initialization may lead to information disclosure (udp)(bsc#1187378).
- CVE-2021-3595: slirp: invalid pointer initialization may lead to information disclosure (tftp)(bsc#1187376).
- CVE-2021-28698: long running loops in grant table handling (XSA-380)(bsc#1189378).
- CVE-2021-28699: inadequate grant-v2 status frames array bounds check (XSA-382)(bsc#1189380).
- CVE-2021-20255: Fixed stack overflow via infinite recursion in eepro100 (bsc#1182654)
- CVE-2021-28690: xen: x86: TSX Async Abort protections not restored after S3 (bsc#1186434)
- CVE-2021-28692: xen: inappropriate x86 IOMMU timeout detection / handling (bsc#1186429)
- CVE-2021-28694,CVE-2021-28695,CVE-2021-28696: IOMMU page mapping issues on x86 (XSA-378)(bsc#1189373).
- CVE-2021-0089: xen: Speculative Code Store Bypass (bsc#1186433)
- CVE-2021-28697: grant table v2 status pages may remain accessible after de-allocation (XSA-379)(bsc#1189376).
- CVE-2021-3592: slirp: invalid pointer initialization may lead to information disclosure (bootp)(bsc#1187369).

- Prevent superpage allocation in the LAPIC and ACPI_INFO range (bsc#1189882).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-06"/>
	<updated date="2021-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182654">SUSE bug 1182654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186429">SUSE bug 1186429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186433">SUSE bug 1186433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186434">SUSE bug 1186434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187369">SUSE bug 1187369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187376">SUSE bug 1187376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187378">SUSE bug 1187378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189376">SUSE bug 1189376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189378">SUSE bug 1189378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189380">SUSE bug 1189380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189882">SUSE bug 1189882</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0089/">CVE-2021-0089 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0089">CVE-2021-0089 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20255">CVE-2021-20255 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28690/">CVE-2021-28690 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28690">CVE-2021-28690 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-28692/">CVE-2021-28692 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28692">CVE-2021-28692 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28694/">CVE-2021-28694 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28694">CVE-2021-28694 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28695/">CVE-2021-28695 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28695">CVE-2021-28695 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28696/">CVE-2021-28696 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28696">CVE-2021-28696 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28697/">CVE-2021-28697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28697">CVE-2021-28697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28698/">CVE-2021-28698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28698">CVE-2021-28698 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28699/">CVE-2021-28699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28699">CVE-2021-28699 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3595">CVE-2021-3595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632286" comment="xen-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632287" comment="xen-doc-html-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632288" comment="xen-libs-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632289" comment="xen-libs-32bit-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632290" comment="xen-tools-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632291" comment="xen-tools-domU-4.9.4_20-3.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149109" version="1" class="patch">
	<metadata>
		<title>Recommended update for mozilla-nspr, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1029961" ref_url="https://bugzilla.suse.com/1029961" source="BUGZILLA"/>
		<reference ref_id="1174697" ref_url="https://bugzilla.suse.com/1174697" source="BUGZILLA"/>
		<reference ref_id="1176206" ref_url="https://bugzilla.suse.com/1176206" source="BUGZILLA"/>
		<reference ref_id="1176934" ref_url="https://bugzilla.suse.com/1176934" source="BUGZILLA"/>
		<reference ref_id="1179382" ref_url="https://bugzilla.suse.com/1179382" source="BUGZILLA"/>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12400" ref_url="https://www.suse.com/security/cve/CVE-2020-12400/" source="CVE"/>
		<reference ref_id="CVE-2020-12401" ref_url="https://www.suse.com/security/cve/CVE-2020-12401/" source="CVE"/>
		<reference ref_id="CVE-2020-12403" ref_url="https://www.suse.com/security/cve/CVE-2020-12403/" source="CVE"/>
		<reference ref_id="CVE-2020-25648" ref_url="https://www.suse.com/security/cve/CVE-2020-25648/" source="CVE"/>
		<reference ref_id="CVE-2020-6829" ref_url="https://www.suse.com/security/cve/CVE-2020-6829/" source="CVE"/>
		<reference ref_id="SUSE-RU-2021:3116-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020178.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr fixes the following issues:

mozilla-nspr was updated to version 4.32:

* implement new socket option PR_SockOpt_DontFrag
* support larger DNS records by increasing the default buffer
  size for DNS queries 
* Lock access to PRCallOnceType members in PR_CallOnce* for
  thread safety bmo#1686138
* PR_GetSystemInfo supports a new flag PR_SI_RELEASE_BUILD to get
  information about the operating system build version.


Mozilla NSS was updated to version 3.68:

* bmo#1713562 - Fix test leak.
* bmo#1717452 - NSS 3.68 should depend on NSPR 4.32.
* bmo#1693206 - Implement PKCS8 export of ECDSA keys.
* bmo#1712883 - DTLS 1.3 draft-43.
* bmo#1655493 - Support SHA2 HW acceleration using Intel SHA Extension.
* bmo#1713562 - Validate ECH public names.
* bmo#1717610 - Add function to get seconds from epoch from pkix::Time.

update to NSS 3.67

* bmo#1683710 - Add a means to disable ALPN.
* bmo#1715720 - Fix nssckbi version number in NSS 3.67 (was supposed to be incremented in 3.66).
* bmo#1714719 - Set NSS_USE_64 on riscv64 target when using GYP/Ninja.
* bmo#1566124 - Fix counter increase in ppc-gcm-wrap.c.
* bmo#1566124 - Fix AES_GCM mode on ppc64le for messages of length more than 255-byte.

update to NSS 3.66

* bmo#1710716 - Remove Expired Sonera Class2 CA from NSS.
* bmo#1710716 - Remove Expired Root Certificates from NSS - QuoVadis Root Certification Authority.
* bmo#1708307 - Remove Trustis FPS Root CA from NSS.
* bmo#1707097 - Add Certum Trusted Root CA to NSS.
* bmo#1707097 - Add Certum EC-384 CA to NSS.
* bmo#1703942 - Add ANF Secure Server Root CA to NSS.
* bmo#1697071 - Add GLOBALTRUST 2020 root cert to NSS.
* bmo#1712184 - NSS tools manpages need to be updated to reflect that sqlite is the default database.
* bmo#1712230 - Don't build ppc-gcm.s with clang integrated assembler.
* bmo#1712211 - Strict prototype error when trying to compile nss code that includes blapi.h.
* bmo#1710773 - NSS needs FIPS 180-3 FIPS indicators.
* bmo#1709291 - Add VerifyCodeSigningCertificateChain.

update to NSS 3.65

* bmo#1709654 - Update for NetBSD configuration.
* bmo#1709750 - Disable HPKE test when fuzzing.
* bmo#1566124 - Optimize AES-GCM for ppc64le.
* bmo#1699021 - Add AES-256-GCM to HPKE.
* bmo#1698419 - ECH -10 updates.
* bmo#1692930 - Update HPKE to final version.
* bmo#1707130 - NSS should use modern algorithms in PKCS#12 files by default.
* bmo#1703936 - New coverity/cpp scanner errors.
* bmo#1697303 - NSS needs to update it's csp clearing to FIPS 180-3 standards.
* bmo#1702663 - Need to support RSA PSS with Hashing PKCS #11 Mechanisms.
* bmo#1705119 - Deadlock when using GCM and non-thread safe tokens.

update to NSS 3.64

* bmo#1705286 - Properly detect mips64.
* bmo#1687164 - Introduce NSS_DISABLE_CRYPTO_VSX and
		disable_crypto_vsx.
* bmo#1698320 - replace __builtin_cpu_supports('vsx') with
		ppc_crypto_support() for clang.
* bmo#1613235 - Add POWER ChaCha20 stream cipher vector
		acceleration.

Fixed in 3.63

* bmo#1697380 - Make a clang-format run on top of helpful contributions.
* bmo#1683520 - ECCKiila P384, change syntax of nested structs
		initialization to prevent build isses with GCC 4.8.
* bmo#1683520 - [lib/freebl/ecl] P-384: allow zero scalars in dual
		scalar multiplication.
* bmo#1683520 - ECCKiila P521, change syntax of nested structs
		initialization to prevent build isses with GCC 4.8.
* bmo#1683520 - [lib/freebl/ecl] P-521: allow zero scalars in dual
		scalar multiplication.
* bmo#1696800 - HACL* update March 2021 - c95ab70fcb2bc21025d8845281bc4bc8987ca683.
* bmo#1694214 - tstclnt can't enable middlebox compat mode.
* bmo#1694392 - NSS does not work with PKCS #11 modules not supporting
		profiles.
* bmo#1685880 - Minor fix to prevent unused variable on early return.
* bmo#1685880 - Fix for the gcc compiler version 7 to support setenv
		with nss build.
* bmo#1693217 - Increase nssckbi.h version number for March 2021 batch
		of root CA changes, CA list version 2.48.
* bmo#1692094 - Set email distrust after to 21-03-01 for Camerfirma's
		'Chambers of Commerce' and 'Global Chambersign' roots.
* bmo#1618407 - Symantec root certs - Set CKA_NSS_EMAIL_DISTRUST_AFTER.
* bmo#1693173 - Add GlobalSign R45, E45, R46, and E46 root certs to NSS.
* bmo#1683738 - Add AC RAIZ FNMT-RCM SERVIDORES SEGUROS root cert to NSS.
* bmo#1686854 - Remove GeoTrust PCA-G2 and VeriSign Universal root certs
		from NSS.
* bmo#1687822 - Turn off Websites trust bit for the “Staat der
		Nederlanden Root CA - G3” root cert in NSS.
* bmo#1692094 - Turn off Websites Trust Bit for 'Chambers of Commerce
		Root - 2008' and 'Global Chambersign Root - 2008’.
* bmo#1694291 - Tracing fixes for ECH.

update to NSS 3.62

* bmo#1688374 - Fix parallel build NSS-3.61 with make
* bmo#1682044 - pkix_Build_GatherCerts() + pkix_CacheCert_Add()
		can corrupt 'cachedCertTable'
* bmo#1690583 - Fix CH padding extension size calculation
* bmo#1690421 - Adjust 3.62 ABI report formatting for new libabigail
* bmo#1690421 - Install packaged libabigail in docker-builds image
* bmo#1689228 - Minor ECH -09 fixes for interop testing, fuzzing
* bmo#1674819 - Fixup a51fae403328, enum type may be signed
* bmo#1681585 - Add ECH support to selfserv
* bmo#1681585 - Update ECH to Draft-09
* bmo#1678398 - Add Export/Import functions for HPKE context
* bmo#1678398 - Update HPKE to draft-07

update to NSS 3.61

* bmo#1682071 - Fix issue with IKE Quick mode deriving incorrect key
		values under certain conditions.
* bmo#1684300 - Fix default PBE iteration count when NSS is compiled
		with NSS_DISABLE_DBM.
* bmo#1651411 - Improve constant-timeness in RSA operations.
* bmo#1677207 - Upgrade Google Test version to latest release.
* bmo#1654332 - Add aarch64-make target to nss-try.

Update to NSS 3.60.1:

Notable changes in NSS 3.60:
* TLS 1.3 Encrypted Client Hello (draft-ietf-tls-esni-08) support
  has been added, replacing the previous ESNI (draft-ietf-tls-esni-01)
  implementation. See bmo#1654332 for more information.
* December 2020 batch of Root CA changes, builtins library updated
  to version 2.46. See bmo#1678189, bmo#1678166, and bmo#1670769
  for more information.

Update to NSS 3.59.1:

* bmo#1679290 - Fix potential deadlock with certain third-party
		PKCS11 modules

Update to NSS 3.59:

Notable changes:

* Exported two existing functions from libnss:
  CERT_AddCertToListHeadWithData and CERT_AddCertToListTailWithData

Bugfixes

* bmo#1607449 - Lock cert-&gt;nssCertificate to prevent a potential data race
* bmo#1672823 - Add Wycheproof test cases for HMAC, HKDF, and DSA
* bmo#1663661 - Guard against NULL token in nssSlot_IsTokenPresent
* bmo#1670835 - Support enabling and disabling signatures via Crypto Policy
* bmo#1672291 - Resolve libpkix OCSP failures on SHA1 self-signed
		root certs when SHA1 signatures are disabled.
* bmo#1644209 - Fix broken SelectedCipherSuiteReplacer filter to
		solve some test intermittents
* bmo#1672703 - Tolerate the first CCS in TLS 1.3 to fix a regression in
		our CVE-2020-25648 fix that broke purple-discord
		(boo#1179382)
* bmo#1666891 - Support key wrap/unwrap with RSA-OAEP
* bmo#1667989 - Fix gyp linking on Solaris
* bmo#1668123 - Export CERT_AddCertToListHeadWithData and
		CERT_AddCertToListTailWithData from libnss
* bmo#1634584 - Set CKA_NSS_SERVER_DISTRUST_AFTER for Trustis FPS Root CA
* bmo#1663091 - Remove unnecessary assertions in the streaming
		ASN.1 decoder that affected decoding certain PKCS8
		private keys when using NSS debug builds
*  bmo#670839 - Use ARM crypto extension for AES, SHA1 and SHA2 on MacOS.

update to NSS 3.58

Bugs fixed:

* bmo#1641480 (CVE-2020-25648)
  Tighten CCS handling for middlebox compatibility mode.
* bmo#1631890 - Add support for Hybrid Public Key Encryption
  (draft-irtf-cfrg-hpke) support for TLS Encrypted Client Hello
  (draft-ietf-tls-esni).
* bmo#1657255 - Add CI tests that disable SHA1/SHA2 ARM crypto
  extensions.
* bmo#1668328 - Handle spaces in the Python path name when using
  gyp on Windows.
* bmo#1667153 - Add PK11_ImportDataKey for data object import.
* bmo#1665715 - Pass the embedded SCT list extension (if present)
  to TrustDomain::CheckRevocation instead of the notBefore value.

update to NSS 3.57

* The following CA certificates were Added:
  bmo#1663049 - CN=Trustwave Global Certification Authority
      SHA-256 Fingerprint: 97552015F5DDFC3C8788C006944555408894450084F100867086BC1A2BB58DC8
  bmo#1663049 - CN=Trustwave Global ECC P256 Certification Authority
      SHA-256 Fingerprint: 945BBC825EA554F489D1FD51A73DDF2EA624AC7019A05205225C22A78CCFA8B4
  bmo#1663049 - CN=Trustwave Global ECC P384 Certification Authority
      SHA-256 Fingerprint: 55903859C8C0C3EBB8759ECE4E2557225FF5758BBD38EBD48276601E1BD58097
* The following CA certificates were Removed:
  bmo#1651211 - CN=EE Certification Centre Root CA
      SHA-256 Fingerprint: 3E84BA4342908516E77573C0992F0979CA084E4685681FF195CCBA8A229B8A76
  bmo#1656077 - O=Government Root Certification Authority; C=TW
      SHA-256 Fingerprint: 7600295EEFE85B9E1FD624DB76062AAAAE59818A54D2774CD4C0B2C01131E1B3
* Trust settings for the following CA certificates were Modified:
  bmo#1653092 - CN=OISTE WISeKey Global Root GA CA
      Websites (server authentication) trust bit removed.
* https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.57_release_notes

update to NSS 3.56

Notable changes

* bmo#1650702 - Support SHA-1 HW acceleration on ARMv8
* bmo#1656981 - Use MPI comba and mulq optimizations on x86-64 MacOS.
* bmo#1654142 - Add CPU feature detection for Intel SHA extension.
* bmo#1648822 - Add stricter validation of DH keys in FIPS mode.
* bmo#1656986 - Properly detect arm64 during GYP build architecture
		detection.
* bmo#1652729 - Add build flag to disable RC2 and relocate to
		lib/freebl/deprecated.
* bmo#1656429 - Correct RTT estimate used in 0-RTT anti-replay.
* bmo#1588941 - Send empty certificate message when scheme selection
		fails.
* bmo#1652032 - Fix failure to build in Windows arm64 makefile
		cross-compilation.
* bmo#1625791 - Fix deadlock issue in nssSlot_IsTokenPresent.
* bmo#1653975 - Fix 3.53 regression by setting 'all' as the default
		makefile target.
* bmo#1659792 - Fix broken libpkix tests with unexpired PayPal cert.
* bmo#1659814 - Fix interop.sh failures with newer tls-interop
		commit and dependencies.
* bmo#1656519 - NSPR dependency updated to 4.28

update to NSS 3.55

Notable changes
* P384 and P521 elliptic curve implementations are replaced with
  verifiable implementations from Fiat-Crypto [0] and ECCKiila [1].
* PK11_FindCertInSlot is added. With this function, a given slot
  can be queried with a DER-Encoded certificate, providing performance
  and usability improvements over other mechanisms. (bmo#1649633)
* DTLS 1.3 implementation is updated to draft-38. (bmo#1647752)

Relevant Bugfixes

* bmo#1631583 (CVE-2020-6829, CVE-2020-12400) - Replace P384 and
  P521 with new, verifiable implementations from Fiat-Crypto and ECCKiila.
* bmo#1649487 - Move overzealous assertion in VFY_EndWithSignature.
* bmo#1631573 (CVE-2020-12401) - Remove unnecessary scalar padding.
* bmo#1636771 (CVE-2020-12403) - Explicitly disable multi-part
  ChaCha20 (which was not functioning correctly) and more strictly
  enforce tag length.
* bmo#1649648 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1649316 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1649322 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1653202 - Fix initialization bug in blapitest when compiled
  with NSS_DISABLE_DEPRECATED_SEED.
* bmo#1646594 - Fix AVX2 detection in makefile builds.
* bmo#1649633 - Add PK11_FindCertInSlot to search a given slot
  for a DER-encoded certificate.
* bmo#1651520 - Fix slotLock race in NSC_GetTokenInfo.
* bmo#1647752 - Update DTLS 1.3 implementation to draft-38.
* bmo#1649190 - Run cipher, sdr, and ocsp tests under standard test cycle in CI.
* bmo#1649226 - Add Wycheproof ECDSA tests.
* bmo#1637222 - Consistently enforce IV requirements for DES and 3DES.
* bmo#1067214 - Enforce minimum PKCS#1 v1.5 padding length in
  RSA_CheckSignRecover.
* bmo#1646324 - Advertise PKCS#1 schemes for certificates in the
  signature_algorithms extension.

update to NSS 3.54

Notable changes

* Support for TLS 1.3 external pre-shared keys (bmo#1603042).
* Use ARM Cryptography Extension for SHA256, when available
  (bmo#1528113)
* The following CA certificates were Added:
  bmo#1645186 - certSIGN Root CA G2.
  bmo#1645174 - e-Szigno Root CA 2017.
  bmo#1641716 - Microsoft ECC Root Certificate Authority 2017.
  bmo#1641716 - Microsoft RSA Root Certificate Authority 2017.
* The following CA certificates were Removed:
  bmo#1645199 - AddTrust Class 1 CA Root.
  bmo#1645199 - AddTrust External CA Root.
  bmo#1641718 - LuxTrust Global Root 2.
  bmo#1639987 - Staat der Nederlanden Root CA - G2.
  bmo#1618402 - Symantec Class 2 Public Primary Certification Authority - G4.
  bmo#1618402 - Symantec Class 1 Public Primary Certification Authority - G4.
  bmo#1618402 - VeriSign Class 3 Public Primary Certification Authority - G3.

* A number of certificates had their Email trust bit disabled.
  See bmo#1618402 for a complete list.

Bugs fixed

* bmo#1528113 - Use ARM Cryptography Extension for SHA256.
* bmo#1603042 - Add TLS 1.3 external PSK support.
* bmo#1642802 - Add uint128 support for HACL* curve25519 on Windows.
* bmo#1645186 - Add 'certSIGN Root CA G2' root certificate.
* bmo#1645174 - Add Microsec's 'e-Szigno Root CA 2017' root certificate.
* bmo#1641716 - Add Microsoft's non-EV root certificates.
* bmo1621151 - Disable email trust bit for 'O=Government
	       Root Certification Authority; C=TW' root.
* bmo#1645199 - Remove AddTrust root certificates.
* bmo#1641718 - Remove 'LuxTrust Global Root 2' root certificate.
* bmo#1639987 - Remove 'Staat der Nederlanden Root CA - G2' root
		certificate.
* bmo#1618402 - Remove Symantec root certificates and disable email trust
		bit.
* bmo#1640516 - NSS 3.54 should depend on NSPR 4.26.
* bmo#1642146 - Fix undefined reference to `PORT_ZAlloc_stub' in seed.c.
* bmo#1642153 - Fix infinite recursion building NSS.
* bmo#1642638 - Fix fuzzing assertion crash.
* bmo#1642871 - Enable SSL_SendSessionTicket after resumption.
* bmo#1643123 - Support SSL_ExportEarlyKeyingMaterial with External PSKs.
* bmo#1643557 - Fix numerous compile warnings in NSS.
* bmo#1644774 - SSL gtests to use ClearServerCache when resetting
		self-encrypt keys.
* bmo#1645479 - Don't use SECITEM_MakeItem in secutil.c.
* bmo#1646520 - Stricter enforcement of ASN.1 INTEGER encoding.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029961">SUSE bug 1029961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174697">SUSE bug 1174697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176206">SUSE bug 1176206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176934">SUSE bug 1176934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179382">SUSE bug 1179382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12400/">CVE-2020-12400 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12400">CVE-2020-12400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12401/">CVE-2020-12401 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12401">CVE-2020-12401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12403/">CVE-2020-12403 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12403">CVE-2020-12403 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25648/">CVE-2020-25648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25648">CVE-2020-25648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6829/">CVE-2020-6829 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6829">CVE-2020-6829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633044" comment="libfreebl3-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633045" comment="libfreebl3-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633046" comment="libfreebl3-hmac-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633047" comment="libfreebl3-hmac-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633048" comment="libsoftokn3-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633049" comment="libsoftokn3-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633050" comment="libsoftokn3-hmac-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633051" comment="libsoftokn3-hmac-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633052" comment="mozilla-nspr-4.32-19.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633053" comment="mozilla-nspr-32bit-4.32-19.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633102" comment="mozilla-nspr-devel-4.32-19.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633054" comment="mozilla-nss-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633055" comment="mozilla-nss-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633056" comment="mozilla-nss-certs-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633057" comment="mozilla-nss-certs-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633103" comment="mozilla-nss-devel-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633058" comment="mozilla-nss-sysinit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633059" comment="mozilla-nss-sysinit-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633060" comment="mozilla-nss-tools-3.68-58.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149110" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1136882" ref_url="https://bugzilla.suse.com/1136882" source="BUGZILLA"/>
		<reference ref_id="1159130" ref_url="https://bugzilla.suse.com/1159130" source="BUGZILLA"/>
		<reference ref_id="1159293" ref_url="https://bugzilla.suse.com/1159293" source="BUGZILLA"/>
		<reference ref_id="1161698" ref_url="https://bugzilla.suse.com/1161698" source="BUGZILLA"/>
		<reference ref_id="1186329" ref_url="https://bugzilla.suse.com/1186329" source="BUGZILLA"/>
		<reference ref_id="1189325" ref_url="https://bugzilla.suse.com/1189325" source="BUGZILLA"/>
		<reference ref_id="1189343" ref_url="https://bugzilla.suse.com/1189343" source="BUGZILLA"/>
		<reference ref_id="1189345" ref_url="https://bugzilla.suse.com/1189345" source="BUGZILLA"/>
		<reference ref_id="1189346" ref_url="https://bugzilla.suse.com/1189346" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19555" ref_url="https://www.suse.com/security/cve/CVE-2019-19555/" source="CVE"/>
		<reference ref_id="CVE-2019-19746" ref_url="https://www.suse.com/security/cve/CVE-2019-19746/" source="CVE"/>
		<reference ref_id="CVE-2019-19797" ref_url="https://www.suse.com/security/cve/CVE-2019-19797/" source="CVE"/>
		<reference ref_id="CVE-2020-21680" ref_url="https://www.suse.com/security/cve/CVE-2020-21680/" source="CVE"/>
		<reference ref_id="CVE-2020-21681" ref_url="https://www.suse.com/security/cve/CVE-2020-21681/" source="CVE"/>
		<reference ref_id="CVE-2020-21682" ref_url="https://www.suse.com/security/cve/CVE-2020-21682/" source="CVE"/>
		<reference ref_id="CVE-2020-21683" ref_url="https://www.suse.com/security/cve/CVE-2020-21683/" source="CVE"/>
		<reference ref_id="CVE-2021-3561" ref_url="https://www.suse.com/security/cve/CVE-2021-3561/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Update to version 3.2.8, including fixes for

- CVE-2021-3561: overflow in fig2dev/read.c in function read_colordef() (bsc#1186329).
- CVE-2020-21683: Fixed buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c (bsc#1189325).
- CVE-2020-21682: Fixed buffer overflow in the set_fill component in genge.c (bsc#1189346).
- CVE-2020-21681: Fixed buffer overflow in the set_color component in genge.c (bsc#1189345).
- CVE-2020-21680: Fixed stack-based buffer overflow in the put_arrow() component in genpict2e.c (bsc#1189343).
- CVE-2019-19797: out-of-bounds write in read_colordef in read.c (bsc#1159293).
- CVE-2019-19555: stack-based buffer overflow because of an incorrect sscanf (bsc#1161698).
- CVE-2019-19746: segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type (bsc#1159130).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1136882">SUSE bug 1136882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159130">SUSE bug 1159130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159293">SUSE bug 1159293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161698">SUSE bug 1161698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186329">SUSE bug 1186329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189325">SUSE bug 1189325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189343">SUSE bug 1189343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189345">SUSE bug 1189345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189346">SUSE bug 1189346</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19555/">CVE-2019-19555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19555">CVE-2019-19555 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19746/">CVE-2019-19746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19746">CVE-2019-19746 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19797/">CVE-2019-19797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19797">CVE-2019-19797 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21680/">CVE-2020-21680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21680">CVE-2020-21680 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21681/">CVE-2020-21681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21681">CVE-2020-21681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21682/">CVE-2020-21682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21682">CVE-2020-21682 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21683/">CVE-2020-21683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21683">CVE-2020-21683 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3561/">CVE-2021-3561 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3561">CVE-2021-3561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631268" comment="transfig-3.2.8a-2.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149111" version="1" class="patch">
	<metadata>
		<title>Security update for gtk-vnc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1024266" ref_url="https://bugzilla.suse.com/1024266" source="BUGZILLA"/>
		<reference ref_id="1024268" ref_url="https://bugzilla.suse.com/1024268" source="BUGZILLA"/>
		<reference ref_id="1046782" ref_url="https://bugzilla.suse.com/1046782" source="BUGZILLA"/>
		<reference ref_id="1188292" ref_url="https://bugzilla.suse.com/1188292" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5884" ref_url="https://www.suse.com/security/cve/CVE-2017-5884/" source="CVE"/>
		<reference ref_id="CVE-2017-5885" ref_url="https://www.suse.com/security/cve/CVE-2017-5885/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009456.html" source="SUSE-SU"/>
		<description>
This update for gtk-vnc fixes the following issues:

- CVE-2017-5885: Correctly validate color map range indexes (bsc#1024268).
- CVE-2017-5884: Fix bounds checking for RRE, hextile &amp; copyrect encodings (bsc#1024266).
- Fix crash when opening connection from a GSocketAddress (bsc#1046782).
- Fix possible crash on connection failure (bsc#1188292).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024266">SUSE bug 1024266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024268">SUSE bug 1024268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046782">SUSE bug 1046782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188292">SUSE bug 1188292</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5884/">CVE-2017-5884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5884">CVE-2017-5884 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5885/">CVE-2017-5885 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5885">CVE-2017-5885 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628130" comment="libgtk-vnc-1_0-0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628131" comment="libgtk-vnc-2_0-0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628132" comment="libgvnc-1_0-0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628133" comment="python-gtk-vnc-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628134" comment="typelib-1_0-GVnc-1_0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628135" comment="typelib-1_0-GtkVnc-2_0-0.6.0-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149112" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009467.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712. 
  Read buffer overruns processing ASN.1 strings (bsc#1189521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-20"/>
	<updated date="2021-09-20"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632419" comment="libopenssl-devel-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632420" comment="libopenssl1_0_0-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632401" comment="libopenssl1_0_0-32bit-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632421" comment="libopenssl1_0_0-hmac-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632403" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632422" comment="openssl-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632405" comment="openssl-doc-1.0.2j-60.72.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149113" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1190381" ref_url="https://bugzilla.suse.com/1190381" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3781" ref_url="https://www.suse.com/security/cve/CVE-2021-3781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009476.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2021-3781: Fixed a trivial -dSAFER bypass command injection (bsc#1190381)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-21"/>
	<updated date="2021-09-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1190381">SUSE bug 1190381</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3781/">CVE-2021-3781 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3781">CVE-2021-3781 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632780" comment="ghostscript-9.52-23.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632781" comment="ghostscript-devel-9.52-23.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632782" comment="ghostscript-x11-9.52-23.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632783" comment="libspectre-devel-0.2.7-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632784" comment="libspectre1-0.2.7-12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149114" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.1.0 ESR.

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-22"/>
	<updated date="2021-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29981">CVE-2021-29981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29982">CVE-2021-29982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29983">CVE-2021-29983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29987">CVE-2021-29987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29990">CVE-2021-29990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29991">CVE-2021-29991 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38492">CVE-2021-38492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38495">CVE-2021-38495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633610" comment="MozillaFirefox-91.1.0-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633611" comment="MozillaFirefox-branding-SLE-91-35.6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633612" comment="MozillaFirefox-devel-91.1.0-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633613" comment="MozillaFirefox-translations-common-91.1.0-112.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149115" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 20 [bsc#1180063,bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14781 CVE-2020-14779
  CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class libraries:
    - SOCKETADAPTOR$SOCKETINPUTSTREAM.READ is blocking for more time
      that the set timeout
    - Z/OS specific C function send_file is changing the file pointer
      position
  * Java Virtual Machine:
    - Crash on iterate java stack
    - Java process hang on SIGTERM
  * JIT Compiler:
    - JMS performance regression from JDK8 SR5 FP40 TO FP41

  * Class Libraries:
    - z15 high utilization following Z/VM and Linux migration from
      z14 To z15
  * Java Virtual Machine:
    - Assertion failed when trying to write a class file
    - Assertion failure at modronapi.cpp
    - Improve the performance of defining and finding classes
  * JIT Compiler:
    - An assert in ppcbinaryencoding.cpp may trigger when running
      with traps disabled on power
    - AOT field offset off by n bytes
    - Segmentation fault in jit module on ibm z platform		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531863" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531865" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149116" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1189373" ref_url="https://bugzilla.suse.com/1189373" source="BUGZILLA"/>
		<reference ref_id="1189378" ref_url="https://bugzilla.suse.com/1189378" source="BUGZILLA"/>
		<reference ref_id="1189632" ref_url="https://bugzilla.suse.com/1189632" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28701" ref_url="https://www.suse.com/security/cve/CVE-2021-28701/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009501.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-28701: Fixed race condition in XENMAPSPACE_grant_table handling (XSA-384) (bsc#1189632).

- Integrate bugfixes (bsc#1189373, bsc#1189378).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189378">SUSE bug 1189378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189632">SUSE bug 1189632</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28701/">CVE-2021-28701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28701">CVE-2021-28701 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633441" comment="xen-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633442" comment="xen-doc-html-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633443" comment="xen-libs-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633444" comment="xen-libs-32bit-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633445" comment="xen-tools-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633446" comment="xen-tools-domU-4.9.4_22-3.94.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149117" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1157818" ref_url="https://bugzilla.suse.com/1157818" source="BUGZILLA"/>
		<reference ref_id="1158812" ref_url="https://bugzilla.suse.com/1158812" source="BUGZILLA"/>
		<reference ref_id="1158958" ref_url="https://bugzilla.suse.com/1158958" source="BUGZILLA"/>
		<reference ref_id="1158959" ref_url="https://bugzilla.suse.com/1158959" source="BUGZILLA"/>
		<reference ref_id="1158960" ref_url="https://bugzilla.suse.com/1158960" source="BUGZILLA"/>
		<reference ref_id="1159491" ref_url="https://bugzilla.suse.com/1159491" source="BUGZILLA"/>
		<reference ref_id="1159715" ref_url="https://bugzilla.suse.com/1159715" source="BUGZILLA"/>
		<reference ref_id="1159847" ref_url="https://bugzilla.suse.com/1159847" source="BUGZILLA"/>
		<reference ref_id="1159850" ref_url="https://bugzilla.suse.com/1159850" source="BUGZILLA"/>
		<reference ref_id="1160309" ref_url="https://bugzilla.suse.com/1160309" source="BUGZILLA"/>
		<reference ref_id="1160438" ref_url="https://bugzilla.suse.com/1160438" source="BUGZILLA"/>
		<reference ref_id="1160439" ref_url="https://bugzilla.suse.com/1160439" source="BUGZILLA"/>
		<reference ref_id="1164719" ref_url="https://bugzilla.suse.com/1164719" source="BUGZILLA"/>
		<reference ref_id="1172091" ref_url="https://bugzilla.suse.com/1172091" source="BUGZILLA"/>
		<reference ref_id="1172115" ref_url="https://bugzilla.suse.com/1172115" source="BUGZILLA"/>
		<reference ref_id="1172234" ref_url="https://bugzilla.suse.com/1172234" source="BUGZILLA"/>
		<reference ref_id="1172236" ref_url="https://bugzilla.suse.com/1172236" source="BUGZILLA"/>
		<reference ref_id="1172240" ref_url="https://bugzilla.suse.com/1172240" source="BUGZILLA"/>
		<reference ref_id="1173641" ref_url="https://bugzilla.suse.com/1173641" source="BUGZILLA"/>
		<reference ref_id="928700" ref_url="https://bugzilla.suse.com/928700" source="BUGZILLA"/>
		<reference ref_id="928701" ref_url="https://bugzilla.suse.com/928701" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3414" ref_url="https://www.suse.com/security/cve/CVE-2015-3414/" source="CVE"/>
		<reference ref_id="CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415/" source="CVE"/>
		<reference ref_id="CVE-2016-6153" ref_url="https://www.suse.com/security/cve/CVE-2016-6153/" source="CVE"/>
		<reference ref_id="CVE-2017-10989" ref_url="https://www.suse.com/security/cve/CVE-2017-10989/" source="CVE"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<reference ref_id="CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740/" source="CVE"/>
		<reference ref_id="CVE-2019-16168" ref_url="https://www.suse.com/security/cve/CVE-2019-16168/" source="CVE"/>
		<reference ref_id="CVE-2019-19244" ref_url="https://www.suse.com/security/cve/CVE-2019-19244/" source="CVE"/>
		<reference ref_id="CVE-2019-19317" ref_url="https://www.suse.com/security/cve/CVE-2019-19317/" source="CVE"/>
		<reference ref_id="CVE-2019-19603" ref_url="https://www.suse.com/security/cve/CVE-2019-19603/" source="CVE"/>
		<reference ref_id="CVE-2019-19645" ref_url="https://www.suse.com/security/cve/CVE-2019-19645/" source="CVE"/>
		<reference ref_id="CVE-2019-19646" ref_url="https://www.suse.com/security/cve/CVE-2019-19646/" source="CVE"/>
		<reference ref_id="CVE-2019-19880" ref_url="https://www.suse.com/security/cve/CVE-2019-19880/" source="CVE"/>
		<reference ref_id="CVE-2019-19923" ref_url="https://www.suse.com/security/cve/CVE-2019-19923/" source="CVE"/>
		<reference ref_id="CVE-2019-19924" ref_url="https://www.suse.com/security/cve/CVE-2019-19924/" source="CVE"/>
		<reference ref_id="CVE-2019-19925" ref_url="https://www.suse.com/security/cve/CVE-2019-19925/" source="CVE"/>
		<reference ref_id="CVE-2019-19926" ref_url="https://www.suse.com/security/cve/CVE-2019-19926/" source="CVE"/>
		<reference ref_id="CVE-2019-19959" ref_url="https://www.suse.com/security/cve/CVE-2019-19959/" source="CVE"/>
		<reference ref_id="CVE-2019-20218" ref_url="https://www.suse.com/security/cve/CVE-2019-20218/" source="CVE"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<reference ref_id="CVE-2020-13434" ref_url="https://www.suse.com/security/cve/CVE-2020-13434/" source="CVE"/>
		<reference ref_id="CVE-2020-13435" ref_url="https://www.suse.com/security/cve/CVE-2020-13435/" source="CVE"/>
		<reference ref_id="CVE-2020-13630" ref_url="https://www.suse.com/security/cve/CVE-2020-13630/" source="CVE"/>
		<reference ref_id="CVE-2020-13631" ref_url="https://www.suse.com/security/cve/CVE-2020-13631/" source="CVE"/>
		<reference ref_id="CVE-2020-13632" ref_url="https://www.suse.com/security/cve/CVE-2020-13632/" source="CVE"/>
		<reference ref_id="CVE-2020-15358" ref_url="https://www.suse.com/security/cve/CVE-2020-15358/" source="CVE"/>
		<reference ref_id="CVE-2020-9327" ref_url="https://www.suse.com/security/cve/CVE-2020-9327/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

sqlite3 is sync version 3.36.0 from Factory (jsc#SLE-16032).

The following CVEs have been fixed in upstream releases up to
this point, but were not mentioned in the change log so far:

* bsc#1173641, CVE-2020-15358: heap-based buffer overflow in
  multiSelectOrderBy due to mishandling of query-flattener
  optimization
* bsc#1164719, CVE-2020-9327: NULL pointer dereference and
  segmentation fault because of generated column optimizations in
  isAuxiliaryVtabOperator
* bsc#1160439, CVE-2019-20218: selectExpander in select.c proceeds
  with WITH stack unwinding even after a parsing error
* bsc#1160438, CVE-2019-19959: memory-management error via
  ext/misc/zipfile.c involving embedded '\0' input
* bsc#1160309, CVE-2019-19923: improper handling  of  certain uses
  of SELECT DISTINCT in flattenSubquery may lead to null pointer
  dereference
* bsc#1159850, CVE-2019-19924: improper error handling in
  sqlite3WindowRewrite()
* bsc#1159847, CVE-2019-19925: improper handling of NULL pathname
  during an update of a ZIP archive
* bsc#1159715, CVE-2019-19926: improper handling  of certain
  errors during parsing  multiSelect in select.c
* bsc#1159491, CVE-2019-19880: exprListAppendList in window.c
  allows attackers to trigger an invalid pointer dereference
* bsc#1158960, CVE-2019-19603: during handling of CREATE TABLE
  and CREATE VIEW statements, does not consider confusion with
  a shadow table name
* bsc#1158959, CVE-2019-19646: pragma.c mishandles NOT NULL in an
  integrity_check PRAGMA command in certain cases of generated
  columns
* bsc#1158958, CVE-2019-19645: alter.c allows attackers to trigger
  infinite recursion via certain types of self-referential views
  in conjunction with ALTER TABLE statements
* bsc#1158812, CVE-2019-19317: lookupName in resolve.c omits bits
  from the colUsed bitmask in the case of a generated column,
  which allows attackers to cause a denial of service
* bsc#1157818, CVE-2019-19244: sqlite3,sqlite2,sqlite: The
  function sqlite3Select in select.c allows a crash if a
  sub-select uses both DISTINCT and window functions, and also
  has certain ORDER BY usage
* bsc#928701, CVE-2015-3415: sqlite3VdbeExec comparison operator
  vulnerability
* bsc#928700, CVE-2015-3414: sqlite3,sqlite2: dequoting of
  collation-sequence names
* CVE-2020-13434 bsc#1172115: integer overflow in
  sqlite3_str_vappendf
* CVE-2020-13630 bsc#1172234: use-after-free in fts3EvalNextRow
* CVE-2020-13631 bsc#1172236: virtual table allowed to be renamed
  to one of its shadow tables
* CVE-2020-13632 bsc#1172240: NULL pointer dereference via
  crafted matchinfo() query
* CVE-2020-13435: Malicious SQL statements could have crashed the
  process that is running SQLite (bsc#1172091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157818">SUSE bug 1157818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158812">SUSE bug 1158812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158958">SUSE bug 1158958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158959">SUSE bug 1158959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158960">SUSE bug 1158960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159491">SUSE bug 1159491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159715">SUSE bug 1159715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159847">SUSE bug 1159847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159850">SUSE bug 1159850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160309">SUSE bug 1160309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160438">SUSE bug 1160438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160439">SUSE bug 1160439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164719">SUSE bug 1164719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172091">SUSE bug 1172091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172115">SUSE bug 1172115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172234">SUSE bug 1172234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172236">SUSE bug 1172236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172240">SUSE bug 1172240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173641">SUSE bug 1173641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3414/">CVE-2015-3414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3414">CVE-2015-3414 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3415">CVE-2015-3415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6153/">CVE-2016-6153 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6153">CVE-2016-6153 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10989/">CVE-2017-10989 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10989">CVE-2017-10989 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2518">CVE-2017-2518 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20346">CVE-2018-20346 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8740">CVE-2018-8740 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16168/">CVE-2019-16168 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16168">CVE-2019-16168 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19244/">CVE-2019-19244 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19244">CVE-2019-19244 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19317/">CVE-2019-19317 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19317">CVE-2019-19317 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19603/">CVE-2019-19603 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19603">CVE-2019-19603 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19645/">CVE-2019-19645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19645">CVE-2019-19645 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19646/">CVE-2019-19646 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19646">CVE-2019-19646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19880/">CVE-2019-19880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19880">CVE-2019-19880 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19923/">CVE-2019-19923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19923">CVE-2019-19923 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19924/">CVE-2019-19924 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19924">CVE-2019-19924 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19925/">CVE-2019-19925 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19925">CVE-2019-19925 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19926/">CVE-2019-19926 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19926">CVE-2019-19926 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19959/">CVE-2019-19959 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19959">CVE-2019-19959 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20218/">CVE-2019-20218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20218">CVE-2019-20218 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8457">CVE-2019-8457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13434/">CVE-2020-13434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13434">CVE-2020-13434 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13435/">CVE-2020-13435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13435">CVE-2020-13435 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13630/">CVE-2020-13630 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13630">CVE-2020-13630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13631/">CVE-2020-13631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13631">CVE-2020-13631 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13632/">CVE-2020-13632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13632">CVE-2020-13632 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15358/">CVE-2020-15358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15358">CVE-2020-15358 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-9327/">CVE-2020-9327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9327">CVE-2020-9327 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149118" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1190229" ref_url="https://bugzilla.suse.com/1190229" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23437" ref_url="https://www.suse.com/security/cve/CVE-2021-23437/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009513.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2021-23437: Fixed regular expression denial of service (ReDoS) via the getrgb function (bsc#1190229).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-27"/>
	<updated date="2021-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190229">SUSE bug 1190229</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23437/">CVE-2021-23437 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23437">CVE-2021-23437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633651" comment="python-Pillow-4.2.1-3.20.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149119" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1177120" ref_url="https://bugzilla.suse.com/1177120" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009517.html" source="SUSE-SU"/>
		<description>

This update for python-urllib3 fixes the following security issue:

- CVE-2020-26137: A CRLF injection via HTTP request method was fixed (bsc#1177120)

Note that this was fixed in a previous version update to 1.25.9, this update just complements the tracking.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-29"/>
	<updated date="2021-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26137">CVE-2020-26137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631062" comment="python3-urllib3-1.25.10-3.31.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149120" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activerecord-4_2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1182169" ref_url="https://bugzilla.suse.com/1182169" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22880" ref_url="https://www.suse.com/security/cve/CVE-2021-22880/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009528.html" source="SUSE-SU"/>
		<description>
This update for rubygem-activerecord-4_2 fixes the following issues:

- CVE-2021-22880: Fixed possible DoS vector in PostgreSQL money type (bsc#1182169).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-30"/>
	<updated date="2021-09-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182169">SUSE bug 1182169</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22880/">CVE-2021-22880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22880">CVE-2021-22880 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633709" comment="ruby2.1-rubygem-activerecord-4_2-4.2.9-6.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149121" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1117993" ref_url="https://bugzilla.suse.com/1117993" source="BUGZILLA"/>
		<reference ref_id="1186489" ref_url="https://bugzilla.suse.com/1186489" source="BUGZILLA"/>
		<reference ref_id="1187911" ref_url="https://bugzilla.suse.com/1187911" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574/" source="CVE"/>
		<reference ref_id="CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009546.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2021-35942: wordexp: handle overflow in positional parameter number (bsc#1187911)
- CVE-2021-33574: Use __pthread_attr_copy in mq_notify (bsc#1186489)

Also the following bug was fixed:

- Avoid concurrency problem in ldconfig (bsc#1117993)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117993">SUSE bug 1117993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186489">SUSE bug 1186489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187911">SUSE bug 1187911</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">CVE-2021-33574 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">CVE-2021-35942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651126" comment="glibc-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651115" comment="glibc-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651127" comment="glibc-devel-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651117" comment="glibc-devel-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651118" comment="glibc-html-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651119" comment="glibc-i18ndata-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651120" comment="glibc-info-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651128" comment="glibc-locale-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651122" comment="glibc-locale-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651129" comment="glibc-profile-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651124" comment="glibc-profile-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651130" comment="nscd-2.22-116.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149122" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1188697" ref_url="https://bugzilla.suse.com/1188697" source="BUGZILLA"/>
		<reference ref_id="1190701" ref_url="https://bugzilla.suse.com/1190701" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21806" ref_url="https://www.suse.com/security/cve/CVE-2021-21806/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009534.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.4
- CVE-2021-30858: Fixed a security bug that could allow maliciously crafted web content to achieve arbitrary code execution. (bsc#1190701)
- CVE-2021-21806: Fixed an exploitable use-after-free vulnerability via specially crafted HTML web page. (bsc#1188697)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190701">SUSE bug 1190701</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21806/">CVE-2021-21806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21806">CVE-2021-21806 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30858">CVE-2021-30858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634387" comment="libjavascriptcoregtk-4_0-18-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634388" comment="libwebkit2gtk-4_0-37-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634365" comment="libwebkit2gtk3-lang-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634389" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634390" comment="typelib-1_0-WebKit2-4_0-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634391" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634392" comment="webkit2gtk-4_0-injected-bundles-2.32.4-2.71.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149123" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1190666" ref_url="https://bugzilla.suse.com/1190666" source="BUGZILLA"/>
		<reference ref_id="1190669" ref_url="https://bugzilla.suse.com/1190669" source="BUGZILLA"/>
		<reference ref_id="1190703" ref_url="https://bugzilla.suse.com/1190703" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34798" ref_url="https://www.suse.com/security/cve/CVE-2021-34798/" source="CVE"/>
		<reference ref_id="CVE-2021-39275" ref_url="https://www.suse.com/security/cve/CVE-2021-39275/" source="CVE"/>
		<reference ref_id="CVE-2021-40438" ref_url="https://www.suse.com/security/cve/CVE-2021-40438/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009537.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-40438: Fixed a SRF via a crafted request uri-path. (bsc#1190703)
- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)
- CVE-2021-34798: Fixed a NULL pointer dereference via malformed requests. (bsc#1190669)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190666">SUSE bug 1190666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190669">SUSE bug 1190669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190703">SUSE bug 1190703</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34798/">CVE-2021-34798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34798">CVE-2021-34798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39275/">CVE-2021-39275 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39275">CVE-2021-39275 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40438/">CVE-2021-40438 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40438">CVE-2021-40438 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633904" comment="apache2-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633898" comment="apache2-doc-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633905" comment="apache2-example-pages-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633906" comment="apache2-prefork-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633907" comment="apache2-utils-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633908" comment="apache2-worker-2.4.23-29.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149124" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008282.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-08"/>
	<updated date="2021-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531867" comment="libpython3_4m1_0-3.4.10-25.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531868" comment="python3-3.4.10-25.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531869" comment="python3-base-3.4.10-25.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531870" comment="python3-curses-3.4.10-25.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531871" comment="python3-devel-3.4.10-25.63.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149125" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1190710" ref_url="https://bugzilla.suse.com/1190710" source="BUGZILLA"/>
		<reference ref_id="1191332" ref_url="https://bugzilla.suse.com/1191332" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.2.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-45 (bsc#1191332)

* CVE-2021-38496: Use-after-free in MessageTask
* CVE-2021-38497: Validation message could have been overlaid on another origin
* CVE-2021-38498: Use-after-free of nsLanguageAtomService object
* CVE-2021-32810: Fixed Data race in crossbeam-deque
* CVE-2021-38500: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2
* CVE-2021-38501: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2

- Fixed crash in FIPS mode (bsc#1190710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-15"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190710">SUSE bug 1190710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32810">CVE-2021-32810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38496">CVE-2021-38496 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38497">CVE-2021-38497 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38498">CVE-2021-38498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38500">CVE-2021-38500 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38501">CVE-2021-38501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651862" comment="MozillaFirefox-91.2.0-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651863" comment="MozillaFirefox-devel-91.2.0-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651864" comment="MozillaFirefox-translations-common-91.2.0-112.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149126" version="1" class="patch">
	<metadata>
		<title>Security update for javapackages-tools, javassist, mysql-connector-java, protobuf, python-python-gflags (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1036025" ref_url="https://bugzilla.suse.com/1036025" source="BUGZILLA"/>
		<reference ref_id="1133277" ref_url="https://bugzilla.suse.com/1133277" source="BUGZILLA"/>
		<reference ref_id="1162343" ref_url="https://bugzilla.suse.com/1162343" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009599.html" source="SUSE-SU"/>
		<description>
This update for javapackages-tools, javassist, mysql-connector-java, protobuf, python-python-gflags contains the following fixes:

Changes in mysql-connector-java:
- Restrict license to GPL-2.0-only
- Fix README adjustments
- Depend on log4j rather than log4j-mini and adjust log4j dependencies to
  account for the lack of log4j12 Provides in some code streams.
- Add missing Group tag
- Update to 8.0.25 (SOC-11543)
  Changes in 8.0.25
    * No functional changes: version alignment with MySQL Server 8.0.25.
  Changes in 8.0.24
    * Bug#102188 (32526663), AccessControlException with AuthenticationLdapSaslClientPlugin.
    * Bug#22508715, SETSESSIONMAXROWS() CALL ON CLOSED CONNECTION RESULTS IN NPE.
    * Bug#102131 (32338451), UPDATABLERESULTSET NPE WHEN USING DERIVED QUERIES OR VIEWS.
    * Bug#101596 (32151143), GET THE 'HOST' PROPERTY ERROR AFTER CALLING TRANSFORMPROPERTIES() METHOD.
    * Bug#20391832, SETOBJECT() FOR TYPES.TIME RESULTS IN EXCEPTION WHEN VALUE HAS FRACTIONAL PART.
    * Bug#97730 (31699993), xdev api: ConcurrentModificationException at Session.close.
    * Bug#99708 (31510398), mysql-connector-java 8.0.20 ASSERTION FAILED: Unknown message type: 57 s.close.
    * Bug#32122553, EXTRA BYTE IN COM_STMT_EXECUTE.
    * Bug#101558 (32141210), NULLPOINTEREXCEPTION WHEN EXECUTING INVALID QUERY WITH USEUSAGEADVISOR ENABLED.
    * Bug#102076 (32329915), CONTRIBUTION: MYSQL JDBC DRIVER RESULTSET.GETLONG() THROWS NUMBEROUTOFRANGE.
    * Bug#31747910, BUG 30474158 FIX IMPROVES JDBC COMPLIANCE BUT CHANGES DEFAULT RESULTSETTYPE HANDLING.
    * Bug#102321 (32405590), CALLING RESULTSETMETADATA.GETCOLUMNCLASSNAME RETURNS WRONG VALUE FOR DATETIME.
    * WL#14453, Pluggable authentication: new default behavior &amp; user-less authentications.
    * WL#14392, Improve timeout error messages [classic].
    * WL#14202, XProtocol: Support connection close notification.
  Changes in 8.0.23
    * Bug#21789378, FORCED TO SET SERVER TIMEZONE IN CONNECT STRING.
    * Bug#95644 (30573281), JDBC GETDATE/GETTIME/GETTIMESTAMP INTERFACE BEHAVIOR CHANGE AFTER UPGRADE 8.0.
    * Bug#94457 (29402209), CONNECTOR/J RESULTSET.GETOBJECT( ..., OFFSETDATETIME.CLASS ) THROWS.
    * Bug#76775 (20959249), FRACTIONAL SECONDS IN TIME VALUES ARE NOT AVAILABLE VIA JDBC.
    * Bug#99013 (31074051), AN EXTRA HOUR GETS ADDED TO THE TIMESTAMP WHEN SUBTRACTING INTERVAL 'N' DAYS.
    * Bug#98695 (30962953), EXECUTION OF 'LOAD DATA LOCAL INFILE' COMMAND THROUGH JDBC FOR DATETIME COLUMN.
    * Bug#101413 (32099505), JAVA.TIME.LOCALDATETIME CANNOT BE CAST TO JAVA.SQL.TIMESTAMP.
    * Bug#101242 (32046007), CANNOT USE BYTEARRAYINPUTSTREAM AS ARGUMENTS IN PREPARED STATEMENTS AN MORE.
    * WL#14274, Support for authentication_ldap_sasl_client(SCRAM-SHA-256) authentication plugin.
    * WL#14206, Support for authentication_ldap_sasl_client(GSSAPI) authentication plugin.
    * WL#14207, Replace language in APIs and source code/docs.
  Changes in 8.0.22
    * Bug#98667 (31711961), 'All pipe instances are busy' exception on multiple connections to named Pipe.
    * Bug#96309 (31699357), MultiHost in loadbalance may lead to a TPS reduction during a quick switch.
    * Bug#99076 (31083755), Unclear exception/error when connecting with jdbc:mysql to a mysqlx port.
    * Bug#96870 (30304764), Contribution: Allow to disable AbandonedConnectionCleanupThread completely.
    * WL#14115, Support for authentication_ldap_sasl_client (SCRAM-SHA-1) authentication plugin.
    * WL#14096, Add option to specify LOAD DATA LOCAL allow list folder.
    * WL#13780, Skip system-wide trust and key stores (incl. X DevAPI client certs).
    * WL#14017, XProtocol -- support for configurable compression algorithms.
    * Bug#92903 (28834903), MySQL Connector/j should support wildcard names or alternative names.
    * Bug#99767 (31443178), Contribution: Check SubjectAlternativeName for TLS instead of commonName.
    * Bug#93444 (29015453), LOCALDATETIME PARAMETER VA UES ALTERED WHEN CLIENT AND SERVER TIMEZONES DIFFER.
    * WL#14052, Remove asynchronous variant of X Protocol.
    * Bug#99713 (31418928), NPE DURING COM.MYSQL.CJ.SERVERPREPAREDQUERYBINDVALUE.STOREDATE().
    * WL#14068, Remove legacy integration with JBoss.
  Changes in 8.0.21
    * WL#14051, Upgrade Protocol Buffers dependency to protobuf-java-3.11.4.
    * WL#14042, Upgrade testsuite to JUnit 5.
    * Bug#98237 (30911870),  PREPAREDSTATEMENT.SETOBJECT(I, 'FALSE', TYPES.BOOLEAN) ALWAYS SETS TRUE OR 1.
    * WL#13008, DevAPI: Add schema validation to create collection.
  Changes in 8.0.20
    * Bug#30805426, IN CASE OF ISAUTHMETHODSWITCHREQUESTPACKET , TOSERVERS &gt; 1 ARE IGNORED.
    * Bug#97714 (30570249), Contribution: Expose elapsed time for query interceptor
    * Bug#97724 (30570721), Contribution: Allow \'3.\' formatted numbers.
    * Bug#98536 (30877755), SIMPLEDATEFORMAT COULD CACHE A WRONG CALENDAR.
      Fix for Bug#91112 (28125069), AGAIN WRONG JAVA.SQL.DATE.
    * Bug#30474158, CONNECTOR/J 8 DOES NOT HONOR THE REQUESTED RESULTSETTYPE SCROLL_INSENSITIVE ETC.
    * Bug#98445 (30832513), Connection option clientInfoProvider=ClientInfoProviderSP causes NPE.
    * WL#12248, DevAPI: Connection compression.
    * Bug#30636056, ResultSetUtil.resultSetToMap() can be unsafe to use.
    * Bug#97757 (30584907), NULLPOINTEREXCEPTION WITH CACHERESULTSETMETADATA=TRUE AND EXECUTEQUERY OF 'SET'.
  Changes in 8.0.19
    * WL#13346, Support for mult-host and failover.
    * Bug#97413 (30477722), DATABASEMETADATA IS BROKEN AFTER SERVER WL#13528.
    * WL#13367, DNS SRV support.
    * WL#12736, DevAPI: Specify TLS ciphers to be used by a client or session.
    * Bug#96383 (30119545) RS.GETTIMESTAMP() HAS * DIFFERENT RESULTS FOR TIME FIELDS WITH USECURSORFETCH=TRUE.
    * Bug#96059 (29999318), ERROR STREAMING MULTI RESULTSETS WITH MYSQL-CONNECTOR-JAVA 8.0.X.
    * Bug#96442 (30151808), INCORRECT DATE ERROR WHEN CALLING GETMETADATA ON PREPARED STATEMENT.
  Changes in 8.0.18
    * WL#13347, Connectors should handle expired password sandbox without SET operations.
    * Bug#84098 (25223123), endless loop in LoadBalancedAutoCommitInterceptor.
    * Bug#23721537, MULTI-SELECT WITH EXECUTEASYNC() GIVES IMPROPER ERROR.
    * Bug#95741 (29898567), METADATA QUERY USES UPPER() AROUND NUMERIC EXPRESSION.
    * Bug#20913289, PSTMT.EXECUTEUPDATE() FAILS WHEN SQL MODE IS NO_BACKSLASH_ESCAPES.
    * Bug#80441 (22850444), SYNTAX ERROR ON RESULTSET.UPDATEROW() WITH SQL_MODE NO_BACKSLASH_ESCAPES.
  Changes in 8.0.17
    * WL#13210, Generate Javadocs via ant.
    * WL#12247, DevAPI: indexing array fields.
    * WL#12726, DevAPI: Add overlaps and not_overlaps as operator.
    * Bug#95503 (29821029), Operator IN not mapping consistently to the right X Plugin operation.
    * WL#12942, Update README.md and add new CONTRIBUTING.md.
    * WL#13125, Support fully qualified hostnames longer than 60 characters.
    * Bug#95210 (29807741), ClassCastException in BlobFromLocator when connecting as jdbc:mysql:replication.
    * Bug#29591275, THE JAR FILE NEEDS TO CONTAIN A README AND LICENSE FILE.
    * WL#13124, Support new utf8mb4 bin collation.
    * WL#13009, DevAPI: Deprecate methods.
    * WL#11101, Remove de-cache and close of SSPSs on double call to close().
    * Bug#89133 (27356869)  CONTRIBUTION: UPDATE DA ABASEMETADATA.JAVA.
    * Bug#11891000, DABATASEMETADATA.GETTABLES() IGNORES THE SCHEMA_PATTERN ARGUMENT.
    * Bug#94101 (29277648), SETTING LOGSLOWQUERIES SHOULD NOT AUTOMATICALLY ENABLE PROFILESQL FOR QUERIES.
    * Bug#74690 (20010454), PROFILEREVENT HOSTNAME HAS NO GETTER().
    * Bug#70677 (17640628), CONNECTOR J WITH PROFILESQL - LOG CONTAINS LOTS OF STACKTRACE DATA.
    * Bug#41172 (11750577), PROFILEREVENT.PACK() THROWS ARRAYINDEXOUTOFBOUNDSEXCEPTION.
    * Bug#27453692, CHARACTERS GET GARBLED IN CONCAT() IN PS WHEN USECURSORFETCH=TRUE.
    * Bug#94585 (29452669), GETTABLENAME() RETURNS NULL FOR A QUERY HAVING COUNT(*) WITH JDBC DRIVER V8.0.12.
    * Bug#94442 (29446059), RESULTSETIMPL.GETDOUBLE IS INEFFICIENT BECAUSE OF BIGDECIMAL (RE)CONSTRUCTIONS.
  Changes in 8.0.16
    * WL#12825, Remove third-party libraries from sources and bundles.
    * Bug#93590 (29054329), javax.net.ssl.SSLException: closing inbound before receiving peer's close_notify.
    * Bug#94414 (29384853), Connector/J RPM package have version number in path.
    * Bug#27786499, REDUNDANT FILES IN DEBIAN PACKAGE FOR DEBIAN9(COMMUNITY PACKAGE) FOR CJAVA.
    * WL#12246, DevAPI: Prepared statement support.
    * WL#10839, Adjust c/J tests to the new 'ON' default for explicit_defaults_for_timestamp.
    * Bug#29329326, PLEASE AVOID SHOW PROCESSLIST IF POSSIBLE.
    * WL#12460, DevAPI: Support new session reset functionality.
    * WL#12459, DevAPI: Support connection-attributes.
    * Bug#25650385, GETBYTE() RETURNS ERROR FOR BINARY() FLD.
    * Bug#27784363, MYSQL 8.0 JDBC DRIVER THROWS NUMBERFORMATEXCEPTION FOR TEXT DATA
    * Bug#93007 (28860051), LoadBalancedConnectionProxy.getGlobalBlacklist bug.
    * Bug#29186870, CONNECTOR/J REGRESSION: NOT RETURNING PRECISION GETPROCEDURECOLUMNS.
    * Bug#22038729, X DEVAPI: ANY API CALL AFTER A FAILED CALL PROC() RESULTS IN HANG.
    * Bug#29244101, ADD MAPPING FOR UTF8MB4_ZH_0900_AS_CS COLLATION.
    * Bug#92819 (28834959), EXPRPARSER THROWS WRONGARGUMENTEXCEPTION WHEN PARSING EMPTY JSON ARRAY.
    * Bug#21921956, X DEVAPI: EXPRESSION PARSE ERROR WITH UNARY OPERATOR.
    * Bug#94031 (29257922), WRONG JSON_UNQUOTE WORKAROUND.
    * Bug#22931700, BINDINGS.GETBOOLEAN() ALWAYS RETURNS FALSE.
    * Bug#25650912, ERROR MESSAGE NOT CLEAR WHEN WE PASS A CHAR DATA TO ANY TABLE API.
    * Bug#25642021, CHANGEUSER() FAILS WHEN ENABLEPACKETDEBUG=TRUE.
  Changes in 8.0.15
    * Bug#94051 (29261254), Not recommended default for 'allowLoadLocalInfile'.
  Changes in 8.0.14
    * WL#12298, Connectors: Expose metadata about source and binaries in unified way.
    * Bug#93111 (28894344), ConnectionUrl.java contains char U+00A7 (section sign).
    * WL#12621, DevAPI: Handling of Default Schema.
    * Bug#93340 (28970166), C/J BUILD SCRIPT IS TOO VERBOSE
    * WL#12462, DevAPI: Be prepared for initial notice on connection.
    * Bug#28924137, WL#12463:IF COLLECTION DOESN'T EXIST, COLL.COUNT() IS GIVING A WRONG ERROR MESSAGE.
    * WL#12463, DevAPI: Standardize count method.
    * Bug#92508 (28747636), mysql-connector in bootclasspath causing memory leak.
    * Bug#25650514, UPDATEROW() CALL FAILS WITH NPE WHEN SSPS=TRUE AND TABLE HAS MULTI-FLD KEY.
    * Bug#25650482, REFRESHROW() CALL AFTER UPDATEROW() API FAILS WHEN USESERVERPREPSTMTS=TRUE.
    * Bug#92536 (28692243), UPDATEING SERVER SIDE PREPSTMTS RESULTSET FAIL.
    * Bug#92625 (28731795), CONTRIBUTION: FIX OBSERVED NPE IN CLEARINPUTSTREAM.
    * Bug#23045642, ADDING NO-DOC (MYSQLCONNJ-696) RESULTS IN EXCEPTION.
    * Bug#91065 (28101003), ZERODATETIMEBEHAVIOR=CONVERT_TO_NULL SHOULD NOT APPLY TO 00:00:00 TIME COLUMNS.
    * Bug#92574 (28706219), WHEN CONVERTING FROM VARCHAR TO JAVA BOOLEAN, 'N' IS NOT SUPPORTED.
    * Bug#25642226, CHANGEUSER() NOT SETTING THE DATABASE PROPERLY WITH SHA USER.
    * Bug#28606708, NAMED PIPE CONNECTION FOR X PROTOCOL RETURNS NPE, EXPECTED PROPER ERROR MESSAGE.
  Changes in 8.0.13
    * Bug#91317 (28207422), Wrong defaults on collation mappings.
    * WL#12245, DevAPI: Implement connect timeout.
    * Bug#21774249, UNIT TEST FAILS WITH ERROR ' 'CEST' IS UNRECOGNIZED TIME ZONE'.
    * WL#11857, DevAPI: Implement connection pooling for xprotocol.
    * Bug#91873 (28444461), REMOVE USEOLDUTF8BEHAVIOR CONNECTION PROPERTY.
    * Bug#92264 (28594434), JSONPARSER PUTS UNNECESSARY MAXIMUM LIMIT ON JSONNUMBER TO 10 DIGITS.
    * WL#12110, Extend PropertyDefinitions.PropertyKey usage.
    * Bug#81063 (23098159), w/ rewriteBatchedStatements, when 2 tables involved, the rewriting not correct.
    * Bug#84813 (25501750), rewriteBatchedStatements fails in INSERT.
    * Bug#81196 (23227334), CONNECTOR/J NOT FOLLOWING DATABASE CHARACTER SET.
    * Bug#72609 (18749544), SETDATE() NOT USING A PROLEPTIC GREGORIAN CALENDAR.
    * Bug#87534 (26730196), UNION ALL query fails when useServerPrepStmts=true on database connection.
    * Bug#89948 (27658489), Batched statements are not committed for useLocalTransactionState=true.
    * BUG#22305979, WRONG RECORD UPDATED IF SENDFRACTIONALSECONDS=FALSE AND SMT IS SCROLLABLE.
    * Bug#27102307, CHANGE USESSL AND VERIFYSERVERCERTIFICATE TO SSLMODE OPTION.
    * Bug#28150662, CONNECTOR/J 8 MALFORMED DATABASE URL EXCEPTION WHIT CORRECT URL STRING.
    * Bug#91421 (28246270), ALLOWED VALUES FOR ZERODATETIMEBEHAVIOR ARE INCOMPATIBLE WITH NETBEANS.
    * Bug#23045604, XSESSION.GETURI() RETURNS NPE.
    * Bug#21914769, NPE WHEN TRY TO EXECUTE INVALID JSON STRING.
    * Bug#BUG#90887 (28034570), DATABASEMETADATAUSINGINFOSCHEMA#GETTABLES FAILS IF METHOD ARGUMENTS ARE NULL.
    * Bug#28207088, C/JAVA: UPDATECLOB(INT COLUMNLABEL, JAVA.SQL.CLOB CLOB) IS FAILING.
    * Bug#27629553, NPE FROM GETSESSION() FOR SSL CONNECTION WHEN NO PASSWORD PASSED.
  Changes in 8.0.12
    * Bug#28208000, MASTER : HANG IN ASYNCHRONOUS SELECT TEST.
    * WL#10544, Update MySQL 8.0 keywords list.
    * WL#11858, DevAPI: Core API v1 alignment.
    * Bug#27652379, NPE FROM GETSESSION(PROPERTIES) WHEN HOST PARAMETER IS GIVEN IN SMALL LETTER.
    * BUG#87600 (26724154), CONNECTOR THROWS 'MALFORMED DATABASE URL' ON NON MYSQL CONNECTION-URLS.
    * BUG#26089880, GETCONNECTION('MYSQLX://..') RETURNS NON-X PROTOCOL CONNECTION.
    * WL#11876, Improve connection properties design.
    * WL#11933, Connector/J 8.0 X DevAPI reference documentation update.
    * WL#11860, Ensure &gt;= 75% code coverage.
    * Bug#90753 (27977617), WAIT_TIMEOUT EXCEEDED MESSAGE NOT TRIGGERED.
    * Bug#85941 (25924324), WASNULL NOT SET AFTER GETBYTES IS CALLED.
    * Bug#28066709, COLLECTION.CREATEINDEX() TEST IS BROKEN AFTER WL#11808 IMPLEMENTATION.
    * Bug#90872 (28027459), FILTERPARAMS CLASS IS NOT NEEDED.
    * Bug#27522054, POSSIBLE ASYNC XPROTOCOL MESSAGE HANDLING PERF ISSUE.
      The 'xdevapi.useAsyncProtocol' connection property default value is changed to 'false'.
  Changes in 8.0.11
    * WL#11293, DevAPI: Support new locking modes : NOWAIT and SKIP LOCKED.
    * Bug#90029 (27678308), FAILURE WHEN GETTING GEOMCOLLECTION COLUMN TYPE.
    * BUG#90024 (27677574), SOME TESTS FAILED AGAINST MYSQL 8.0.5 BECAUSE OF DEPRECATED FEATURES REMOVAL.
    * Bug#86741 (26314325), Multi-Host connection with autocommit=0 getAutoCommit maybe wrong.
    * Bug#27231383, PROVIDE MAVEN-FRIENDLY COMMERCIAL PACKAGES WITHOUT '-BIN'.
    * Bug#26819691, SETTING PACKETDEBUGBUFFERSIZE=0 RESULTS IN CONNECTION FAILURE.
    * Bug#88227 (27029657), Connector/J 5.1.44 cannot be used against MySQL 5.7.20 without warnings.
    * Bug#27374581, CONNECTION FAILS WHEN GPL SERVER STARTED WITH TLS-VERSION=TLSV1.2.
    * WL#11419, DevAPI: New document _id generation support.
    * WL#11620, Change caching_sha2_password padding.
    * WL#11604, DevAPI: Add SHA256_MEMORY support.
    * BUG#86278 (26092824), SUPPORT CUSTOM CONSTRUCTION OF SSLSOCKET DURING CONNECTION ESTABLISHMENT.
    * BUG#27226293, JSONNUMBER.GETINTEGER() &amp; NUMBERFORMATEXCEPTION.
    * WL#10527, Clean up Protocol and Session interfaces.
  Changes in 8.0.9
    * WL#11469, Update license header in GPL packages.
    * BUG#27247349, WL#11208 : UNIQUE DOES NOT GIVE ERROR EVEN THOUGH IT IS NOT SUPPORTED.
    * WL#11208, DevAPI: Collection.createIndex.
    * WL#10156, Add setters/getters for connection properties to MysqlDataSource,
      MysqlXADataSource and MysqlConnectionPoolDataSource.
    * WL#11401, DevAPI: Remove configuration API.
    * WL#10619, Ensure compatibility with new data dictionary.
    * BUG#27217264, WL#10937: NULL POINTER EXCEPTION WHEN NULL IS PASSED AS _ID IN COLL.REPLACEONE.
    * WL#10937, DevAPI: ReplaceOne, AddOrReplaceOne, GetOne, RemoveOne.
    * Bug#26723646, JSON_MERGE() FUNCTION IS DEPRECATED IN MYSQL 8.0.
    * Bug#27185332, WL#11210:ERROR IS THROWN WHEN NESTED EMPTY DOCUMENTS ARE INSERTED TO COLLECTION.
    * Bug#27151601, WL#11210: DOCUMENT PATCH EXPRESSIONS ARE NOT SUPPORTED.
    * WL#11210, DevAPI: Modify/MergePatch.
    * Bug#79612 (22362474), CONNECTION ATTRIBUTES LOST WHEN CONNECTING WITHOUT DEFAULT DATABASE.
    * WL#10152, Enable TLSv1.2 on mysqlx.
    * Bug#27131768, NULL POINTER EXCEPTION IN CONNECTION.
    * Bug#88232 (27047676), c/J does not rollback transaction when autoReconnect=true.
    * Bug#88242 (27040063), autoReconnect and socketTimeout JDBC option makes wrong order of client packet.
    * Bug#88021 (26939943), High GC pressure when driver configured with serversideprepared statements.
    * Bug#26724085, CHARSET MAPPING TO BE UPDATED FOR MYSQL 8.0.3.
    * Bug#87704 (26771560), THE STREAM GETS THE RESULT SET ?THE DRIVER SIDE GET WRONG ABOUT GETLONG().
    * Bug#24924097, SERVER GREETING ERROR ISN'T RECOGNIZED DURING HANDSHAKE.
    * Bug#26748909, MASTER : ERROR - NO OPERATIONS ALLOWED AFTER STATEMENT CLOSED FOR TOSTRING().
    * Bug#26266731, CONCUR_UPDATABLE RESULTSET OPERATIONS FAIL AGAINST 8.0 FOR BOOLEAN COLUMN.
    * WL#11239, DevAPI: Remove create table implementation.
    * Bug#27131100, WL#11212 : SAVEPOINT CREATING WITH EMPTY STRING AND SPACE AS NAME.
    * WL#11212, DevAPI: transaction save-points.
    * WL#11060, Support new SHA-256 authentication system.
    * Bug#87826 (26846249), MYSQL JDBC CONNECTOR/J DATABASEMETADATA NULL PATTERN HANDLING IS NON-COMPLIANT.
    * WL#11163, Extract parameter setters, serverPrepare() and serverExecute() to core classes.
    * BUG#26995710, WL#11161 : NULL POINTER EXCEPTION IN EXECUTEBATCH() AND CLOSE().
    * WL#11161, Unify query bindings.
    * WL#8469, Don't extract query text from packets when possible.
  Changes in 8.0.8
    * BUG#26722030, TEST FAILING DUE TO BINARY LOGGING ENABLED BY DEFAULT IN MYSQL 8.0.3.
    * BUG#26722018, TESTS FAILING DUE TO CHANGE IN INFORMATION_SCHEMA.INNODB_SYS_* NAMING.
    * BUG#26750807, MASTER : NULL POINTER EXCEPTION IN SCHEMA.DROPVIEW(NULL).
    * BUG#26750705, MASTER : ERROR - UNSUPPORTED CONVERSION FROM TIME TO JAVA.SQL.DATE.
    * WL#10620, DevAPI: SHA256 Authentication support.
    * WL#10936, DevAPI: Row locking for Crud.Find.
    * WL#9868, DevAPI: Configuration handling interface.
    * WL#10935, DevAPI: Array or Object 'contains' operator.
    * WL#9875, Prepare c/J 8.0 for DEB and RPM builds.
    * BUG#26259384, CALLABLE STATEMENT GIVES ERROR IN C/JAVA WHEN RUN AGAINST MYSQL 8.0.
    * Bug#26393132, NULLPOINTEREXCEPTION IS THROWN WHEN TRIED TO DROP A NULL COLLECTION.
    * WL#10532, DevAPI: Cleanup Drop APIs.
    * Bug#87429 (26633984), repeated close of ServerPreparedStatement causes memory leak.
    * Bug#87379 (26646676), Perform actual TLS capabilities check when restricting TLSv1.2.
    * Bug#85601 (25777822), Unit notation is missing in the description of the property involved in the time.
    * Bug#87153 (26501245), INCORRECT RESULT OF DBMD.GETVERSIONCOLUMNS() AGAINST MYSQL 8.0.2+.
    * Bug#78313 (21931572), proxies not handling Object.equals(Object) calls correctly.
    * Bug#85885 (25874048), resultSetConcurrency and resultSetType are swapped in call to prepareStatement.
    * Bug#74932 (20066806), ConnectionImp Doesn't Close Server Prepared Statement (PreparedStatement Leak).
    * WL#10536, Deprecating COM_SHUTDOWN.
    * Bug#25946965, UPDATE THE TIME ZONE MAPPINGS WITH LATEST TZ DATABASES.
    * Bug#20182108, INCLUDE CUSTOM LOAD BALANCING STRATEGY USING PLUGIN API.
    * Bug#26440544, CONNECTOR/J SHOULD NOT USE TX_{READ_ONLY,ISOLATION} WHICH IS PLANNED FOR REMOVAL.
    * Bug#26399958, UNABLE TO CONNECT TO MYSQL 8.0.3.
    * Bug#25650305, GETDATE(),GETTIME() AND GETTIMESTAMP() CALL WITH NULL CALENDAR RETURNS NPE.
  Changes in 8.0.7
    * Bug#26227653, WL#10528 DIFF BEHAVIOUR WHEN SYSTEM PROP JAVAX.NET.SSL.TRUSTSTORETYPE IS SET.
    * WL#10528, DevAPI: Ensure all connectors are secure by default.
    * WL#8305, Remove internal dependency on connection objects.
    * Bug#22972057, X DEVAPI: CLIENT HANGS AFTER CONNECTION FAILURE.
    * Bug#26140577, GIS TESTS ARE FAILING WITH MYSQL 8.0.1.
    * WL#10765, DevAPI: Forbid modify() and remove() with no condition.
    * Bug#26090721, CONNECTION FAILING WHEN SERVER STARTED WITH COLLATION UTF8MB4_DE_PB_0900_AI_CI.
    * WL#10781, enum-based connection properties.
    * Bug#73775 (19531384), DBMD.getProcedureColumns()/.getFunctionColumns() fail to filter by columnPattern.
    * Bug#84324 (25321524), CallableStatement.extractProcedureName() not work when catalog name with dash.
    * Bug#79561 (22333996), NullPointerException when calling a fully qualified stored procedure.
    * Bug#84783 (25490163), query timeout is not working(thread hang).
    * Bug#70704 (17653733), Deadlock using UpdatableResultSet.
    * Bug#66430 (16714868), setCatalog on connection leaves ServerPreparedStatement cache for old catalog.
    * Bug#70808 (17757070), Set sessionVariables in a single query.
    * Bug#77192 (21170603), Description for the Property replicationConnetionGroup Missing from the Manual.
    * Bug#83834 (25101890), Typo in Connector/J error message.
    * WL#10531, Support utf8mb4 as default charset.
    * Bug#85555 (25757019), useConfigs Can't find configuration template named, in mysql-connector-java 6.x
    * WL#10529, Move version number to 8.0.
    * WL#10530, DevAPI: Remove XSession, rename NodeSession to Session.
    * Bug#23510958, CONCURRENT ASYNC OPERATIONS RESULT IN HANG.
    * Bug#23597281, GETNODESESSION() CALL WITH SSL PARAMETERS RETURNS CJCOMMUNICATIONSEXCEPTION.
    * Bug#25207784, C/J DOESN'T FOLLOW THE FINAL X DEVAPI MY-193 SPECIFICATION.
    * Bug#25494338, ENABLEDSSLCIPHERSUITES PARAMETER NOT WORKING AS EXPECTED WITH X-PLUGIN.
    * Bug#84084 (25215008), JAVA.LANG.ARRAYINDEXOUTOFBOUNDSEXCEPTION ON ATTEMPT TO GET VALUE FROM RESULTSET.
    * WL#10553, Add mapping for Japanese utf8mb4 collation.
    * Bug#25575103, NPE FROM CREATETABLE() WHEN SOME OF THE INPUTS ARE NULL.
    * Bug#25575156, NPE FROM CREATEVIEW() WHEN SOME OF THE INPUTS ARE NULL.
    * Bug#25636947, CONNECTION USING MYSQL CLIENT FAILS IF WE USE THE SSL CERTIFICATES FROM C/J SRC.
    * Bug#25687718, INCORRECT TIME ZONE IDENTIFIER IN STATEMENTREGRESSIONTEST.
    * Bug#25556597, RESULTSETTEST.TESTPADDING UNIT TEST IS FAILING IN 5.1.41 RELEASE PACKAGE.
    * Bug#25517837, CONNECT PERFORMNACE DEGRADED BY 10% IN 5.1.41.
    * Bug#25504578, CONNECT FAILS WHEN CONNECTIONCOLLATION=ISO-8859-13.
    * Bug#25438355, Improper automatic deserialization of binary data.
    * Bug#70785 (17756825), MySQL Connector/J inconsistent init state for autocommit.
    * Bug#66884: Property 'elideSetAutoCommits' temporarily  defaults to 'false' until this bug is fixed.
    * Bug#75615 (21181249), Incorrect implementation of Connection.setNetworkTimeout().
    * Bug#81706 (23535001), NullPointerException in driver.
    * Bug#83052 (25048543), static method in com.mysql.jdbc.Util relies on null object.
    * Bug#69526 (17035755), 'Abandoned connection cleanup thread' at mysql-connector-java-5.1.25.
    * Bug#82826 (24942672), Unneeded version requirement for javax.net.ssl Import-Package on OSGi MANIFEST.MF.
  Changes in 6.0.6
    * Added Core TLS/SSL options for the mysqlx URI scheme.
    * Updated collations map.
    * Bug#24350526, UNEXPECTED BEHAVIOUR OF IS_NUMBER_SIGNED API IN C/JAVA.
    * Bug#82707 (24512766), WRONG MILLI SECOND VALUE RETURNED FROM TIMESTAMP COLUMN.
    * Bug#82005 (23702040), JDBCDATEVALUEFACTORY FAILS TO PARSE SOME DATES.
    * Bug#83725 (25056803), NPE IN XPROTOCOL.GETPLUGINVERSION() WITH MYSQL 5.7.17.
    * Bug#24525461, UPDATABLE RESULTSET FEATURE FAILS WHEN USESERVERPREPSTMTS=TRUE.
    * Bug#24527173, QUERY EXECUTION USING PREPARED STMT FAILS WHEN USECURSORFETCH=TRUE.
    * Bug#82964 (24658016), JSR-310 DATA TYPES CREATED THROUGH JAVA.SQL TYPES.
    * Bug#81202 (23188159), RESULTSETIMPL.GETOBJECT THROWS NULLPOINTEREXCEPTION WHEN FIELD IS NULL.
    * Bug#22931277, COLUMN.GETTYPE() RETURNS ERROR FOR VALID DATATYPES.
    * BUG#24471057, UPDATE FAILS WHEN THE NEW VALUE IS OF TYPE DBDOC WHICH HAS ARRAY IN IT.
    * Bug#81691 (23519211), GETLASTDOCUMENTIDS() DOESN'T REPORT IDS PROVIDED BY USER.
    * Bug#82826 (24942672), Unneeded version requirement for javax.net.ssl Import-Package on OSGi MANIFEST.MF.
  Changes in 6.0.5
    * BUG#82896 (24613062), Unexpected behavior on attempt to connect to JDBC driver with unsupported URL.
    * Added client-side failover during XSession initialization for multi-router configuration.
    * Removed Extension interface. All extension classes now implement their specific interfaces.
    * Bug#22988922, GETLENGTH() RETURNS -1 FOR LONGBLOB AND LONGTEXT FIELDS.
    * Bug#24619829, NEW FAILURES IN C/JAVA UNITTESTS AGAINST MYSQL 8.0.
    * Bug#75209 (20212882), Set useLocalTransactionState may result in partially committed transaction.
    * Bug#48346 (11756431), Communications link failure when reading compressed data with compressed=true.
    * Bug#80631 (22891845), ResultSet.getString return garbled result with json type data.
    * Bug#64188 (13702433), MysqlXAConnection.MYSQL_ERROR_CODES_TO_XA_ERROR_CODES is missing XA error codes.
    * Bug#72632 (18759269), NullPointerException for invalid JDBC URL.
    * Bug#82115 (23743956), Some exceptions are intercepted twice or fail to set the init cause.
    * Bug#78685 (21938551), Wrong results when retrieving the value of a BIT column as an integer.
    * Bug#80615 (22954007), prepared statement leak when rewriteBatchedStatements=true and useServerPrepStmt.
    * Extended X DevAPI with flexible parameter lists.
    * Added a virtual NodeSession to X DevAPI. 
  Changes in 6.0.4
    * X DevAPI URL prefix changed from 'mysql:x:' to 'mysqlx:'.
    * Bug#24301468 X DEVAPI SSL CONNECTION FAILS ON WINDOWS
    * The X DevAPI Table object now represents both database tables and views.
    * Added support for matching against pattern for X DevAPI list_objects calls.
    * Added Schema.getCollections(String pattern) and Schema.getTables(String pattern) interface methods.
    * Switched to 'mysqlx' namespace for X DevAPI StmtExecute messages.
      This change is incompatible to MySQL server versions &lt; 5.7.14.
    * Bug#82046 (23743947), MYSQL CONNECTOR JAVA OSGI METADATA BROKEN.
    * Bug#21690043, CONNECT FAILS WHEN PASSWORD IS BLANK.
    * Bug#22931433, GETTING VALUE OF BIT COLUMN RESULTS IN EXCEPTION.
  Changes in 6.0.3
    * Bug#23535571, EXCESSIVE MEMORY USAGE WHEN ENABLEPACKETDEBUG=TRUE.
    * Bug#23212347, ALL API CALLS ON RESULTSET METADATA RESULTS IN NPE WHEN USESERVERPREPSTMTS=TRUE.
    * Bug#23201930, CLIENT HANG WHEN RSLT CUNCURRENCY=CONCUR_UPDATABLE AND RSLTSET TYPE=FORWARD_ONLY.
    * Bug#23188498, CLIENT HANG WHILE USING SERVERPREPSTMT WHEN PROFILESQL=TRUE AND USEIS=TRUE.
    * Bug#22678872, NPE DURING UPDATE WITH FABRIC.
    * Bug#71131 (18068303), Poor error message in CallableStatement.java.
    * Bug#59462 (16736619), ConcurrentModificationException inside ConnectionImpl.closeAllOpenStatements().
    * Bug#22848249, LOADBALANCECONNECTIONGROUPMANAGER.REMOVEHOST() NOT WORKING AS EXPECTED.
    * Bug#22730682, ARRAYINDEXOUTOFBOUNDSEXCEPTION FROM CONNECTIONGROUPMANAGER.REMOVEHOST().
    * Bug#77171 (21181466), On every connect getting sql_mode from server creates unnecessary exception.
    * Bug#79343 (22353759), NPE in TimeUtil.loadTimeZoneMappings causing server time zone value unrecognized.
    * Bug#22038729, X DevAPI: Any API call after a failed CALL PROC() results in hang
    * Replace Schema.drop(), Collection.drop() by X DevAPI's session.dropSchema() and session.dropCollection().
    * Added session.dropTable().
    * Bug#22932078, GETTIMESTAMP() RETURNS WRONG VALUE FOR FRACTIONAL PART
    * Extracted packet readers from MysqlaProtocol.
    * Bug#22972057, X protocol CLIENT HANGS AFTER CONNECTION FAILURE
    * Bug#23044312, NullPointerException in X protocol AsyncMessageReader due to race condition
    * Returned support for MySQL 5.5 and 5.6.
  Changes in 6.0.2
    * Deprecate the EOF packet.
    * Bug#75956, Inserting timestamps using a server PreparedStatement and useLegacyDatetimeCode=false
    * Bug#22385172, CONNECTOR/J MANIFEST DOES NOT EXPOSE FABRIC (OSGi).
    * Bug#22598938, FABRICMYSQLDATASOURCE.GETCONNECTION() NPE AFTER SWITCHOVER.
    * Bug#21286268, CONNECTOR/J REPLICATION USE MASTER IF SLAVE IS UNAVAILABLE.
    * Bug#21296840 &amp; Bug#17910835, Server information in a group from Fabric is not refreshed after expired TTL.
    * Bug#56122 (11763419), JDBC4 functionality failure when using replication connections.
    * Added support for TLSv1.1 and TLSv1.2
    * Bug#78961 (22096981), Can't call MySQL procedure with InOut parameters in Fabric environment.
    * Bug#56100 (11763401), Replication driver routes DML statements to read-only slaves.
    * StandardSSLSocketFactory implements SocketMetadata.
    * Bug#21978216, GETTYPEINFO REPORT MAXIMUM PRECISION OF 255 FOR VARBINARY.
    * Bug#78706 (21947042), Prefer TLS where supported by MySQL Server.
    * Bug#21934573, FABRIC CODE INVOLVED IN THREAD DEADLOCK.
    * Bug#21876798, CONNECTOR/J WITH MYSQL FABRIC AND SPRING PRODUCES PROXY ERROR.
  Changes in 6.0.1
    * Removed useJvmCharsetConverters connection property. JVM charset converters are now used in all cases.
    * Refactored value decoding and removed all date/time connection properties
    * Refactored connection properties
    * Assume existence of INFORMATION_SCHEMA.PARAMETERS (and thus MySQL 5.5) when preparing stored procedure calls.
    * Removed retainStatementAfterResultSetClose connection property.
    * Null-merge of Bug#54095 (11761585) fix.
    * Removed support code for MySQL server versions &lt; 5.7.
    * Bug#76859 (20969312), DBMD getColumns using I_S doesn't have column IS_GENERATEDCOLUMN as per JDBC 4.1.
    * Added support for GENERATED COLUMNS.
    * Update Time Zone mappings with IANA Time Zone database tsdata2015f and Unicode CLDR v.28.
    * Update DatabaseMetaData SQL keywords.
    * Added tests for Optimizer hints syntax introduced in MySQL 5.7.7.
    * Bug#21860833, JSON DATA TYPE DOESN'T WORK WITH SSPS.
    * Added support for JSON data type.
    * Added support for JDBC 4.2 new features.
    * Bug#16634180, LOCK WAIT TIMEOUT EXCEEDED CAUSES SQLEXCEPTION, SHOULD CAUSE SQLTRANSIENTEXCEPTION
    * Bug#75849 (20536592), NPE in abortInternal() method on line 1358 of ConnectionImpl.
    * Bug#78106 (21648826), Potential memory leak with inflater.
    * Bug#78225 (21697684), DEFAULT NO_AUTO_CREATE_USER SQL_MODE BEHAVIOR BROKE SOME TESTS
    * Bug#77665 (21415165), JDBC fails to connect with MySQL 5.0.
    * Bug#77681 (21429909), rewrite replace sql like insert when rewriteBatchedStatements=true (contribution).
    * Bug#77449 (21304726) Add 'truncateFractionalSeconds=true|false' property (contribution).
    * Bug#50348 (11758179), mysql connector/j 5.1.10 render the wrong value for dateTime column in GMT DB.
    * Bug#75670 (20433047), Connection fails with 'Public Key Retrieval is not allowed' for native auth.
    * Bug#76187 (20675539), getTypeInfo report maximum precision of 255 for varchar.
    * Add test for new syntax 'ALTER TABLE ... DISCARD|IMPORT PARTITION ...' introduced in MySQL 5.7.4.
    * Bug#20727196, GETPROCEDURECOLUMNS() RETURNS EXCEPTION FOR FUNCTION WHICH RETURNS ENUM/SET TYPE.
    * Bug#19803348, GETPROCEDURES() RETURNS INCORRECT OUTPUT WHEN USEINFORMATIONSCHEMA=FALSE.
    * Bug#21215151, DATABASEMETADATA.GETCATALOGS() FAILS TO SORT RESULTS.
    * Bug#72630 (18758686), NullPointerException during handshake in some situations
    * Bug#20825727, CONNECT FAILURE WHEN TRY TO CONNECT SHA USER WITH DIFFERENT CHARSET.
    * Flag RowDataDynamic.isInterrupted removed as it isn't needed.
    * Bug#20518653, XSL FILES IN PACKAGES
    * Bug#20804635, GETTIME() AND GETDATE() FUNCTIONS FAILS WHEN FRACTIONAL PART EXISTS
    * Bug#62452 (16444069), NPE thrown in JDBC4MySQLPooledException when statement is closed.
    * BUG#70927 (17810800), Connector/J COM_CHANGE_USER handling is broken
    * Bug#75335 (20283655), Maven artifact for Connector/J is missing source jar.
    * BUG#75592 (20408891), 'SHOW VARIABLES WHERE' is expensive.
    * Bug#75113 (20821888), Fail in failover of the connection in MySQL fabric
    * Bug#72077 (18425861), Fabric connection with username to a server with disabled auth throws NPE
    * Add test for already fixed Bug#72546 (18719760), C/J Fabric createGroup() throws ClassCastException
    * Bug#77217 (21184949), ClassCastException when executing a streaming PreparedStatement with Fabric
    * Bug#19536760, GETSTRING() CALL AFTER RS.RELATIVE() RETURNS NULLPOINTEREXCEPTION
    * BUG#20453712, CLOB.SETSTRING() WITH VALID INPUT RETURNS EXCEPTION
    * BUG#20453671, CLOB.POSITION() API CALL WITH CLOB INPUT RETURNS EXCEPTION
    * Bug#20685022, SSL CONNECTION TO MYSQL 5.7.6 COMMUNITY SERVER FAILS.
    * Bug#20606107, TEST FAILURES WHEN RUNNING AGAINST 5.7.6 SERVER VERSION
    * Bug#20533907, BUG#20204783 FIX EXPOSES WRONG BEAHAVIORS IN FAILOVER CONNECTIONS.
    * Bug#20504139, GETFUNCTIONCOLUMNS() AND GETPROCEDURECOLUMNS() RETURNS ERROR FOR VALID INPUTS.
    * Expose PreparedStatment.ParseInfo for external usage, with no capture of the connection
    * Bug#75309 (20272931), mysql connector/J driver in streaming mode will in the blocking state.
    * New property 'readOnlyPropagatesToServer' controls the implicit propagation of read only transaction access mode to server.
    * Bug#54095 (11761585), Unnecessary call in newSetTimestampInternal.
    * Bug#67760 (15936413), Deadlock when concurrently executing prepared statements with Timestamp objects.
    * Bug#71084 (18028319), Wrong java.sql.Date stored if client and server time zones differ.
    * Bug#75080 (20217686), NullPointerException during setTimestamp on Fabric connection.
    * Bug#75168 (20204783), loadBalanceExceptionChecker interface cannot work using JDBC4/JDK7.
    * Bug#73595 (19465516), Replace usage of StringBuffer in JDBC driver.
    * Bug#18925727, SQL INJECTION IN MYSQL JDBC DRIVER.
    * Bug#74998 (20112694), readRemainingMultiPackets not computed correctly for rows larger than 16 MB.
    * Bug#73012 (19219158), Precedence between timezone options is unclear.
    * Implement support for connecting through SOCKS proxies (WL#8105).
    * Ant buildfile reworked to fix incompatibilities with latest Eclipse
    * Bug#18474141, TESTSUITE.FABRIC TEST CASES FAIL IF NO FABRIC.TESTSUITE PROPERTIES PROVIDED
    * Bug#19383371, CONNECT USING MYSQL_OLD_PASSWORD USER FAILS WHEN PWD IS BLANK
    * Bug#17441747, C/J DOESN'T SUPPORT XA RECOVER OUTPUT FORMAT CHANGED IN MYSQL 5.7.
    * Bug#19145408, Error messages may not be interpreted according to the proper character set
    * Bug#19505524, UNIT TEST SUITE DOES NOT CONSIDER ALL THE PARAMETERS PASSED TO BUILD.XML.
    * Bug#73474 (19365473), Invalid empty line in MANIFEST.MF
    * Bug#70436 (17527948), Incorrect mapping of windows timezone to Olson timezone.
    * Bug73163 (19171665), IndexOutOfBoundsException thrown preparing statement.
    * Added support for gb18030 character set
    * Bug#73663 (19479242), utf8mb4 does not work for connector/j &gt;=5.1.13
    * Bug#73594 (19450418), ClassCastException in MysqlXADataSource if pinGlobalTxToPhysicalConnection=true
    * Bug#19354014, changeUser() call results in 'packets out of order' error when useCompression=true.
    * Bug#73577 (19443777), CHANGEUSER() CALL WITH USECOMPRESSION=TRUE COULD LEAD TO IO FREEZE
    * Bug#19172037, TEST FAILURES WHEN RUNNING AGAINST 5.6.20 SERVER VERSION
    * Bug#71923 (18344403), Incorrect generated keys if ON DUPLICATE KEY UPDATE not exact.
    * Bug#72502 (18691866), NullPointerException in isInterfaceJdbc() when using DynaTrace
    * Bug#72890 (18970520), Java jdbc driver returns incorrect return code when it's part of XA transaction.
    * Fabric client now supports Fabric 1.5. Older versions are no longer supported.
    * Bug#71672 (18232840), Every SQL statement is checked if it contains 'ON DUPLICATE KEY UPDATE' or not.
    * Bug#73070 (19034681), Preparing a stored procedure call with Fabric results in an exception
    * Bug#73053 (19022745), Endless loop in MysqlIO.clearInputStream due to Linux kernel bug.
    * Bug#18869381, CHANGEUSER() FOR SHA USER RESULTS IN NULLPOINTEREXCEPTION
    * Bug#62577 (16722757), XA connection fails with ClassCastException
    * Bug#18852587, CONNECT WITH A USER CREATED USING SHA256_PASSWORD PLUGIN FAILS WHEN PWD IS BLANK
    * Bug#18852682, TEST TESTSHA256PASSWORDPLUGIN FAILS WHEN EXECUTE AGAINST COMMERCIAL SERVER
    * failing tests when running test suite with Java 6+.
    * Bug#72712 (18836319), No way to configure Connector JDBC to not do extra queries on connection
- Adjust log4j/log4j-mini dependencies to account for the lack of
  log4j12/log4jmini12 Provides in some code streams.

Changes in javapackages-tools:
- Can't assume non-existence of python38 macros in Leap.
  gh#openSUSE/python-rpm-macros#107
  Test for suse_version instead. Only Tumbleweed has and needs the
  python_subpackage_only support.

- Fix typo in spec file sitearch -&gt; sitelib

- Fix the python subpackage generation
  gh#openSUSE/python-rpm-macros#79

- Support python subpackages for each flavor
  gh#openSUSE/python-rpm-macros#66
- Replace old nose with pytest gh#fedora-java/javapackages#86

- when building extra flavor, BuildRequire javapackages-filesystem:
  /etc/java is being cleaned out of the filesystems package.

- Upgrade to version 5.3.1
- Define _rpmmacrodir for distributions that don't have it

- Use %{_rpmmacrodir} instead of %{_libexecdir}/rpm/macros.d: this
  just happens to overlap in some distros.

- Rename gradle-local and ivy-local to javapackages-gradle and
  javapackages-ivy and let them depend only on javapackages-tools
  and javapackages-local. These packages only install files
  produced during the javapackages-tools build. The dependencies
  will be pulled by gradle-local, ivy-local and maven-local
  meta-packages built in a separate spec file.

- Split maven-local meta-package out of javapackages-tools spec
  file

- Make the ivy-local and maven-local sub-packages depend on the
  right stuff, so that they actually can be used for building

- Provide both com.sun:tools and sun.jdk:jconsole that are part of
  standard OpenJDK installation. These provides cannot be generated
  from metadata due to build sequence.

  + fix directories for eclipse.conf too

- Make the javapackages-local package depend on java-devel. It is
  used for package building and this avoids each package to require
  java-devel itself.

- Replace the occurences of /usr/lib by libdir in configuration
  files too

- Update to version 5.3.0
- Modified patch:
- Build the :extras flavour as noarch
    + we did not bump epoch of OpenJDK packages in SUSE
    + fix a potential generation of unresolvable requires
    + adapt the tests to not expect the epoch

- Switch to multibuild layout

- Update to version 5.2.0+git20180620.70fa2258:
  * Rename the async kwarg in call_script to wait (reverses the logic)
  * Actually bump version to 5.3.0 snapshot
  * Bump version in VERSION file
  * [man] s/Pacakge/Package/g
  * Fix typos in README
  * Fix configure-base.sh after filesystem macro split
  * Split filesystem macros to separate macro file
  * Introduce javapackages-filesystem package
  * [java-functions] extend ABRT Java agent options
  * change abrt-java-connector upstream URL
  * Remove resolverSettings/prefixes from XMvn config
  * Add macros to allow passing arbitrary options to XMvn
  * [spec] Bump package version to 5.1.0
  * Allow specifying custom repo when calling xmvn-install

- Update to version 5.0.0+git20180104.9367c8f6:
  * [java-functions] Avoid colons in jar names
  * Workaround for SCL enable scripts not working with -e
  * Second argument to pom_xpath_inject is mandatory
  * [mvn_artifact] Provide more helpful error messages
  * Fix traceback on corrupt zipfile
  * [test] Add reproducer for rhbz#1481005
  * [spec] Fix default JRE path
  * [readme] Fix typo
  * Add initial content to README.md (#21)
  * Decouple JAVA_HOME setting from java command alternatives

- Fix url to correct one https://github.com/fedora-java/javapackages

- Split to python and non-python edition for smaller depgraph
- Fix abs2rel shebang:
- Fix Requires on subpackages to point to javapackages-tools proper

- Update to version 4.7.0+git20170331.ef4057e7:
  * Reimplement abs2rel in Python
  * Don't expand {scl} in macro definitions
  * Install expanded rpmfc attr files
  * [spec] Avoid file conflicts between in SCL
  * Fix macros.d directory ownership
  * Make %ant macro enable SCL when needed
  * [spec] Fix file conflicts between SCL and non-SCL packages
  * Fix ownership of ivyxmldir
  * [test] Force locale for python processes
  * Don't include timestamp in generated pom.properties
  * We switch to /usr/lib/ location for macros
- Try to reduce some dependencies bsc#1036025

- python-lxml 3.5.0 introduces validation for xml comments, and 
  one of the comments created in this package were not valid.
  This patch fixes the problem.  It backported from upstream and
  should be in the next release.
  https://github.com/mizdebsk/javapackages/commit/84211c0ee761e93ee507f5d37e9fc80ec377e89d

- Version update to 4.6.0:
  * various bugfixes for maven tooling
  * introduction to gradle-local package for gradle packaging

- Drop dependency over source-highlight as it causes build cycle

- Try to break buildcycle detected on Factory

- Fix build on SLE11

- Use python-devel instead of pkgconfig to build on sle11

- Add python-javapackages as requirement for main package

- Update requires on python packages to properly have all the needed
  dependencies on runtime

- Install macros to /etc/rpm as we do in SUSE:
- Cleanup with spec-cleaner

- Fix rpmlint errors
- Enable maven-local
- Avoid unsatisfiable dependencies
- Enable unit tests
- Update to version 4.4.0

- create directories for java, so that ant build works
- Add virtual provide jpackage-utils-java9 to be able to
  distinguish the presence of java9 compatibility

- fix bashisms

- SLES patch for ZipFile, having no attribute '__exit__' which was causing 
  ecj build failures

- set correct libxslt package when building for SLES

Changes in javassist:
    + Add OSGi manifest to the javassist.jar
    - Allow building on systems that do not have java 9 or higher

- Install and package the maven pom and metadata files

- BuildRequire at least Java 9. This version uses APIs introduced
  in Java 9

- Replace old $RPM_* shell vars by macros.

- Version update to 3.23.1:
  * 3.23.1 Github PR #171
  * 3.23   Fix leaking file handlers in ClassPool and removed
           ClassPath.close(). Github issue #165
  * 3.22   Java 9 supports.
           JIRA JASSIST-261.

- Specify java target and source version 1.6 in order to allow
  building with jdk9
    - fix javadoc errors that are fatal with jdk9

- Version update to 3.21.0:
  * various compiler settings
  * Require java &gt;= 1.6

- Update to version 3.19.0
  * Including a number of bug fixes and Java 8 supports.
- Clean up specfile
- Remove redundant %clean section
- Build for java API 1.5
- Remove unzip requirement
- Update home page and download source Urls

Changes in protobuf:
- Update to 3.17.3:
  C++
  * Introduce FieldAccessListener.
  * Stop emitting boilerplate {Copy/Merge}From in each ProtoBuf class
  * Provide stable versions of SortAndUnique().
  * Make sure to cache proto3 optional message fields when they are cleared.
  * Expose UnsafeArena methods to Reflection.
  * Use std::string::empty() rather than std::string::size() &gt; 0.
  * [Protoc] C++ Resolved an issue where NO_DESTROY and CONSTINIT are in incorrect order (#8296)
  * Fix PROTOBUF_CONSTINIT macro redefinition (#8323)
  * Delete StringPiecePod (#8353)
  * Create a CMake option to control whether or not RTTI is enabled (#8347)
  * Make util::Status more similar to absl::Status (#8405)
  * The ::pb namespace is no longer exposed due to conflicts.
  * Allow MessageDifferencer::TreatAsSet() (and friends) to override previous
  calls instead of crashing.
  * Reduce the size of generated proto headers for protos with string or
  bytes fields.
  * Move arena() operation on uncommon path to out-of-line routine
  * For iterator-pair function parameter types, take both iterators by value.
  * Code-space savings and perhaps some modest performance improvements in
  * RepeatedPtrField.
  * Eliminate nullptr check from every tag parse.
  * Remove unused _$name$cached_byte_size fields.
  * Serialize extension ranges together when not broken by a proto field in the
  middle.
  * Do out-of-line allocation and deallocation of string object in ArenaString.
  * Streamline ParseContext::ParseMessage to avoid code bloat and improve
  performance.
  * New member functions RepeatedField::Assign, RepeatedPtrField::{Add, Assign}.
  on an error path.
  * util::DefaultFieldComparator will be final in a future version of protobuf.
  * Subclasses should inherit from SimpleFieldComparator instead.
  Kotlin
  * Introduce support for Kotlin protos (#8272)
  * Restrict extension setter and getter operators to non-nullable T.
  Java
  * Fixed parser to check that we are at a proper limit when a sub-message has
  finished parsing.
  * updating GSON and Guava to more recent versions (#8524)
  * Reduce the time spent evaluating isExtensionNumber by storing the extension
  ranges in a TreeMap for faster queries. This is particularly relevant for
  protos which define a large number of extension ranges, for example when
  each tag is defined as an extension.
  * Fix java bytecode estimation logic for optional fields.
  * Optimize Descriptor.isExtensionNumber.
  * deps: update JUnit and Truth (#8319)
  * Detect invalid overflow of byteLimit and return InvalidProtocolBufferException as documented.
  * Exceptions thrown while reading from an InputStream in parseFrom are now
  included as causes.
  * Support potentially more efficient proto parsing from RopeByteStrings.
  * Clarify runtime of ByteString.Output.toStringBuffer().
  * Added UnsafeByteOperations to protobuf-lite (#8426)
  Python
  * Add MethodDescriptor.CopyToProto() (#8327)
  * Remove unused python_protobuf.{cc,h} (#8513)
  * Start publishing python aarch64 manylinux wheels normally (#8530)
  * Fix constness issue detected by MSVC standard conforming mode (#8568)
  * Make JSON parsing match C++ and Java when multiple fields from the same
  oneof are present and all but one is null.
  * Fix some constness / char literal issues being found by MSVC standard conforming mode (#8344)
  * Switch on 'new' buffer API (#8339)
  * Enable crosscompiling aarch64 python wheels under dockcross manylinux docker image (#8280)
  * Fixed a bug in text format where a trailing colon was printed for repeated field.
  * When TextFormat encounters a duplicate message map key, replace the current
  one instead of merging.
  Ruby
  * Add support for proto3 json_name in compiler and field definitions (#8356)
  * Fixed memory leak of Ruby arena objects. (#8461)
  * Fix source gem compilation (#8471)
  * Fix various exceptions in Ruby on 64-bit Windows (#8563)
  * Fix crash when calculating Message hash values on 64-bit Windows (#8565)
  General
  * Support M1 (#8557)

- Update to 3.15.8:
  - Fixed memory leak of Ruby arena objects (#8461)

- update to 3.15.7:
  C++
  * Remove the ::pb namespace (alias) (#8423)
  Ruby
  * Fix unbounded memory growth for Ruby &lt;2.7 (#8429)
  * Fixed message equality in cases where the message type is different (#8434)

- Can't assume non-existence of python38 macros in Leap.
  gh#openSUSE/python-rpm-macros#107
  Test for suse_version instead. Only Tumbleweed has and needs the
  python_subpackage_only support.

- update to 3.15.6:
  Ruby
  * Fixed bug in string comparison logic (#8386)
  * Fixed quadratic memory use in array append (#8379)
  * Fixed SEGV when users pass nil messages (#8363)
  * Fixed quadratic memory usage when appending to arrays (#8364)
  * Ruby &lt;2.7 now uses WeakMap too, which prevents memory leaks. (#8341)
  * Fix for FieldDescriptor.get(msg) (#8330)
  * Bugfix for Message.[] for repeated or map fields (#8313)
  PHP
  * read_property() handler is not supposed to return NULL (#8362)
  Protocol Compiler
  * Optional fields for proto3 are enabled by default, and no longer require
    the --experimental_allow_proto3_optional flag.
  C++
  * Do not disable RTTI by default in the CMake build (#8377)
  * Create a CMake option to control whether or not RTTI is enabled (#8361)
  * Fix PROTOBUF_CONSTINIT macro redefinition (#8323)
  * MessageDifferencer: fixed bug when using custom ignore with multiple
    unknown fields
  * Use init_seg in MSVC to push initialization to an earlier phase.
  * Runtime no longer triggers -Wsign-compare warnings.
  * Fixed -Wtautological-constant-out-of-range-compare warning.
  * DynamicCastToGenerated works for nullptr input for even if RTTI is disabled
  * Arena is refactored and optimized.
  * Clarified/specified that the exact value of Arena::SpaceAllocated() is an
    implementation detail users must not rely on. It should not be used in
    unit tests.
  * Change the signature of Any::PackFrom() to return false on error.
  * Add fast reflection getter API for strings.
  * Constant initialize the global message instances
  * Avoid potential for missed wakeup in UnknownFieldSet
  * Now Proto3 Oneof fields have 'has' methods for checking their presence in
    C++.
  * Bugfix for NVCC
  * Return early in _InternalSerialize for empty maps.
  * Adding functionality for outputting map key values in proto path logging
    output (does not affect comparison logic) and stop printing 'value' in the
    path. The modified print functionality is in the
    MessageDifferencer::StreamReporter.
  * Fixed https://github.com/protocolbuffers/protobuf/issues/8129
  * Ensure that null char symbol, package and file names do not result in a
    crash.
  * Constant initialize the global message instances
  * Pretty print 'max' instead of numeric values in reserved ranges.
  * Removed remaining instances of std::is_pod, which is deprecated in C++20.
  * Changes to reduce code size for unknown field handling by making uncommon
    cases out of line.
  * Fix std::is_pod deprecated in C++20 (#7180)
  * Fix some -Wunused-parameter warnings (#8053)
  * Fix detecting file as directory on zOS issue #8051 (#8052)
  * Don't include sys/param.h for _BYTE_ORDER (#8106)
  * remove CMAKE_THREAD_LIBS_INIT from pkgconfig CFLAGS (#8154)
  * Fix TextFormatMapTest.DynamicMessage issue#5136 (#8159)
  * Fix for compiler warning issue#8145 (#8160)
  * fix: support deprecated enums for GCC &lt; 6 (#8164)
  * Fix some warning when compiling with Visual Studio 2019 on x64 target (#8125)
  Python
  * Provided an override for the reverse() method that will reverse the internal
    collection directly instead of using the other methods of the BaseContainer.
  * MessageFactory.CreateProtoype can be overridden to customize class creation.
  * Fix PyUnknownFields memory leak (#7928)
  * Add macOS big sur compatibility (#8126)
  JavaScript
  * Generate `getDescriptor` methods with `*` as their `this` type.
  * Enforce `let/const` for generated messages.
  * js/binary/utils.js: Fix jspb.utils.joinUnsignedDecimalString to work with
    negative bitsLow and low but non-zero bitsHigh parameter. (#8170)
  PHP
  * Added support for PHP 8. (#8105)
  * unregister INI entries and fix invalid read on shutdown (#8042)
  * Fix PhpDoc comments for message accessors to include '|null'. (#8136)
  * fix: convert native PHP floats to single precision (#8187)
  * Fixed PHP to support field numbers &gt;=2**28. (#8235)
  * feat: add support for deprecated fields to PHP compiler (#8223)
  * Protect against stack overflow if the user derives from Message. (#8248)
  * Fixed clone for Message, RepeatedField, and MapField. (#8245)
  * Updated upb to allow nonzero offset minutes in JSON timestamps. (#8258)
  Ruby
  * Added support for Ruby 3. (#8184)
  * Rewrote the data storage layer to be based on upb_msg objects from the
    upb library. This should lead to much better parsing performance,
    particularly for large messages. (#8184).
  * Fill out JRuby support (#7923)
  * [Ruby] Fix: (SIGSEGV) gRPC-Ruby issue on Windows. memory alloc infinite
    recursion/run out of memory (#8195)
  * Fix jruby support to handle messages nested more than 1 level deep (#8194)
  Java
  * Avoid possible UnsupportedOperationException when using CodedInputSteam
    with a direct ByteBuffer.
  * Make Durations.comparator() and Timestamps.comparator() Serializable.
  * Add more detailed error information for dynamic message field type
    validation failure
  * Removed declarations of functions declared in java_names.h from
    java_helpers.h.
  * Now Proto3 Oneof fields have 'has' methods for checking their presence in
    Java.
  * Annotates Java proto generated *_FIELD_NUMBER constants.
  * Add -assumevalues to remove JvmMemoryAccessor on Android.
  C#
  * Fix parsing negative Int32Value that crosses segment boundary (#8035)
  * Change ByteString to use memory and support unsafe create without copy (#7645)
  * Optimize MapField serialization by removing MessageAdapter (#8143)
  * Allow FileDescriptors to be parsed with extension registries (#8220)
  * Optimize writing small strings (#8149)

- Updated URL to https://github.com/protocolbuffers/protobuf
- Update to v3.14.0
  Protocol Compiler
  * The proto compiler no longer requires a .proto filename when it is not
    generating code.
  * Added flag `--deterministic_output` to `protoc --encode=...`.
  * Fixed deadlock when using google.protobuf.Any embedded in aggregate options.
  C++
  * Arenas are now unconditionally enabled. cc_enable_arenas no longer has
    any effect.
  * Removed inlined string support, which is incompatible with arenas.
  * Fix a memory corruption bug in reflection when mixing optional and
    non-optional fields.
  * Make SpaceUsed() calculation more thorough for map fields.
  * Add stack overflow protection for text format with unknown field values.
  * FieldPath::FollowAll() now returns a bool to signal if an out-of-bounds
    error was encountered.
  * Performance improvements for Map.
  * Minor formatting fix when dumping a descriptor to .proto format with
    DebugString.
  * UBSAN fix in RepeatedField
  * When running under ASAN, skip a test that makes huge allocations.
  * Fixed a crash that could happen when creating more than 256 extensions in
    a single message.
  * Fix a crash in BuildFile when passing in invalid descriptor proto.
  * Parser security fix when operating with CodedInputStream.
  * Warn against the use of AllowUnknownExtension.
  * Migrated to C++11 for-range loops instead of index-based loops where
    possible. This fixes a lot of warnings when compiling with -Wsign-compare.
  * Fix segment fault for proto3 optional
  * Adds a CMake option to build `libprotoc` separately
  Java
  * Bugfix in mergeFrom() when a oneof has multiple message fields.
  * Fix RopeByteString.RopeInputStream.read() returning -1 when told to read
    0 bytes when not at EOF.
  * Redefine remove(Object) on primitive repeated field Lists to avoid
    autoboxing.
  * Support '\u' escapes in textformat string literals.
  * Trailing empty spaces are no longer ignored for FieldMask.
  * Fix FieldMaskUtil.subtract to recursively remove mask.
  * Mark enums with `@java.lang.Deprecated` if the proto enum has option
    `deprecated = true;`.
  * Adding forgotten duration.proto to the lite library
  Python
  * Print google.protobuf.NullValue as null instead of 'NULL_VALUE' when it is
    used outside WKT Value/Struct.
  * Fix bug occurring when attempting to deep copy an enum type in python 3.
  * Add a setuptools extension for generating Python protobufs
  * Remove uses of pkg_resources in non-namespace packages
  * [bazel/py] Omit google/__init__.py from the Protobuf runtime
  * Removed the unnecessary setuptools package dependency for Python package
  * Fix PyUnknownFields memory leak
  PHP
  * Added support for '==' to the PHP C extension
  * Added `==` operators for Map and Array
  * Native C well-known types
  * Optimized away hex2bin() call in generated code
  * New version of upb, and a new hash function wyhash in third_party
  * add missing hasOneof method to check presence of oneof fields
  Go:
  * Update go_package options to reference google.golang.org/protobuf module.
  C#:
  * annotate ByteString.CopyFrom(ReadOnlySpan&lt;byte&gt;) as SecuritySafeCritical
  * Fix C# optional field reflection when there are regular fields too
  * Fix parsing negative Int32Value that crosses segment boundary
  Javascript:
  * JS: parse (un)packed fields conditionally
- from version 3.13.0
  PHP:
  * The C extension is completely rewritten. The new C extension has significantly
    better parsing performance and fixes a handful of conformance issues. It will
    also make it easier to add support for more features like proto2 and proto3 presence.
  * The new C extension does not support PHP 5.x. PHP 5.x users can still use pure-PHP.
  C++:
  * Removed deprecated unsafe arena string accessors
  * Enabled heterogeneous lookup for std::string keys in maps.
  * Removed implicit conversion from StringPiece to std::string
  * Fix use-after-destroy bug when the Map is allocated in the arena.
  * Improved the randomness of map ordering
  * Added stack overflow protection for text format with unknown fields
  * Use std::hash for proto maps to help with portability.
  * Added more Windows macros to proto whitelist.
  * Arena constructors for map entry messages are now marked 'explicit'
    (for regular messages they were already explicit).
  * Fix subtle aliasing bug in RepeatedField::Add
  * Fix mismatch between MapEntry ByteSize and Serialize with respect to unset
    fields.
  Python:
  * JSON format conformance fixes:
    * Reject lowercase t for Timestamp json format.
    * Print full_name directly for extensions (no camelCase).
    * Reject boolean values for integer fields.
    * Reject NaN, Infinity, -Infinity that is not quoted.
    * Base64 fixes for bytes fields: accept URL-safe base64 and missing padding.
  * Bugfix for fields/files named 'async' or 'await'.
  * Improved the error message when AttributeError is returned from __getattr__
    in EnumTypeWrapper.
  Java:
  * Fixed a bug where setting optional proto3 enums with setFooValue() would
    not mark the value as present.
  * Add Subtract function to FieldMaskUtil.
  C#:
  * Dropped support for netstandard1.0 (replaced by support for netstandard1.1).
    This was required to modernize the parsing stack to use the `Span&lt;byte&gt;`
    type internally
  * Add `ParseFrom(ReadOnlySequence&lt;byte&gt;)` method to enable GC friendly
    parsing with reduced allocations and buffer copies
  * Add support for serialization directly to a `IBufferWriter&lt;byte&gt;` or
    to a `Span&lt;byte&gt;` to enable GC friendly serialization.
    The new API is available as extension methods on the `IMessage` type
  * Add `GOOGLE_PROTOBUF_REFSTRUCT_COMPATIBILITY_MODE` define to make
    generated code compatible with old C# compilers (pre-roslyn compilers
    from .NET framework and old versions of mono) that do not support
    ref structs. Users that are still on a legacy stack that does
    not support C# 7.2 compiler might need to use the new define
    in their projects to be able to build the newly generated code
  * Due to the major overhaul of parsing and serialization internals,
    it is recommended to regenerate your generated code to achieve the best
    performance (the legacy generated code will still work, but might incur
    a slight performance penalty).

- Fix the python subpackage generation
  gh#openSUSE/python-rpm-macros#79

- Support multiple python3 flavors gh#openSUSE/python-rpm-macros#66

- Update to version 3.12.3; notable changes since 3.11.4:
  Protocol Compiler
  * [experimental] Singular, non-message typed fields in proto3 now support
    presence tracking. This is enabled by adding the 'optional' field label and
    passing the --experimental_allow_proto3_optional flag to protoc.
    * For usage info, see docs/field_presence.md.
    * During this experimental phase, code generators should update to support
      proto3 presence, see docs/implementing_proto3_presence.md for instructions.
  * Allow duplicate symbol names when multiple descriptor sets are passed on
    the command-line, to match the behavior when multiple .proto files are passed.
  * Deterministic `protoc --descriptor_set_out` (#7175)
  Objective-C
  * Tweak the union used for Extensions to support old generated code. #7573
  * Fix for the :protobuf_objc target in the Bazel BUILD file. (#7538)
    if p['result'] == 'FAIL': 
  * [experimental] ObjC Proto3 optional support (#7421)
  * Block subclassing of generated classes (#7124)
  * Use references to Obj C classes instead of names in descriptors. (#7026)
  * Revisit how the WKTs are bundled with ObjC. (#7173)
  C++
  * Simplified the template export macros to fix the build for mingw32. (#7539)
  * [experimental] Added proto3 presence support.
  * New descriptor APIs to support proto3 presence.
  * Enable Arenas by default on all .proto files.
  * Documented that users are not allowed to subclass Message or MessageLite.
  * Mark generated classes as final; inheriting from protos is strongly discouraged.
  * Add stack overflow protection for text format with unknown fields.
  * Add accessors for map key and value FieldDescriptors.
  * Add FieldMaskUtil::FromFieldNumbers().
  * MessageDifferencer: use ParsePartial() on Any fields so the diff does not
    fail when there are missing required fields.
  * ReflectionOps::Merge(): lookup messages in the right factory, if it can.
  * Added Descriptor::WellKnownTypes enum and Descriptor::well_known_type()
    accessor as an easier way of determining if a message is a Well-Known Type.
  * Optimized RepeatedField::Add() when it is used in a loop.
  * Made proto move/swap more efficient.
  * De-virtualize the GetArena() method in MessageLite.
  * Improves performance of json_stream_parser.cc by factor 1000 (#7230)
  * bug: #7076 undefine Windows OUT and OPTIONAL macros (#7087)
  * Fixed a bug in FieldDescriptor::DebugString() that would erroneously print
    an 'optional' label for a field in a oneof.
  * Fix bug in parsing bool extensions that assumed they are always 1 byte.
  * Fix off-by-one error in FieldOptions::ByteSize() when extensions are present.
  * Clarified the comments to show an example of the difference between
    Descriptor::extension and DescriptorPool::FindAllExtensions.
  * Add a compiler option 'code_size' to force optimize_for=code_size on all
    protos where this is possible.
  Ruby
  * Re-add binary gems for Ruby 2.3 and 2.4. These are EOL upstream, however
    many people still use them and dropping support will require more
    coordination.
  * [experimental] Implemented proto3 presence for Ruby. (#7406)
  * Stop building binary gems for ruby &lt;2.5 (#7453)
  * Fix for wrappers with a zero value (#7195)
  * Fix for JSON serialization of 0/empty-valued wrapper types (#7198)
  * Call 'Class#new' over rb_class_new_instance in decoding (#7352)
  * Build extensions for Ruby 2.7 (#7027)
  * assigning 'nil' to submessage should clear the field. (#7397)
  Java
  * [experimental] Added proto3 presence support.
  * Mark java enum _VALUE constants as @Deprecated if the enum field is deprecated
  * reduce &lt;clinit&gt; size for enums with allow_alias set to true.
  * Sort map fields alphabetically by the field's key when printing textproto.
  * Fixed a bug in map sorting that appeared in -rc1 and -rc2 (#7508).
  * TextFormat.merge() handles Any as top level type.
  * Throw a descriptive IllegalArgumentException when calling
    getValueDescriptor() on enum special value UNRECOGNIZED instead of
    ArrayIndexOutOfBoundsException.
  * Fixed an issue with JsonFormat.printer() where setting printingEnumsAsInts()
    would override the configuration passed into includingDefaultValueFields().
  * Implement overrides of indexOf() and contains() on primitive lists returned
    for repeated fields to avoid autoboxing the list contents.
  * Add overload to FieldMaskUtil.fromStringList that accepts a descriptor.
  * [bazel] Move Java runtime/toolchains into //java (#7190)
  Python
  * [experimental] Added proto3 presence support.
  * [experimental] fast import protobuf module, only works with cpp generated code linked in.
  * Truncate 'float' fields to 4 bytes of precision in setters for pure-Python
    implementation (C++ extension was already doing this).
  * Fixed a memory leak in C++ bindings.
  * Added a deprecation warning when code tries to create Descriptor objects
    directly.
  * Fix unintended comparison between bytes and string in descriptor.py.
  * Avoid printing excess digits for float fields in TextFormat.
  * Remove Python 2.5 syntax compatibility from the proto compiler generated _pb2.py module code.
  * Drop 3.3, 3.4 and use single version docker images for all python tests (#7396)
  JavaScript
  * Fix js message pivot selection (#6813)
  PHP
  * Persistent Descriptor Pool (#6899)
  * Implement lazy loading of php class for proto messages (#6911)
  * Correct @return in Any.unpack docblock (#7089)
  * Ignore unknown enum value when ignore_unknown specified (#7455)
  C#
  * [experimental] Add support for proto3 presence fields in C# (#7382)
  * Mark GetOption API as obsolete and expose the 'GetOptions()' method on descriptors instead (#7491)
  * Remove Has/Clear members for C# message fields in proto2 (#7429)
  * Enforce recursion depth checking for unknown fields (#7132)
  * Fix conformance test failures for Google.Protobuf (#6910)
  * Cleanup various bits of Google.Protobuf (#6674)
  * Fix latest ArgumentException for C# extensions (#6938)
  * Remove unnecessary branch from ReadTag (#7289)
  Other
  * Add a proto_lang_toolchain for javalite (#6882)
  * [bazel] Update gtest and deprecate //external:{gtest,gtest_main} (#7237)
  * Add application note for explicit presence tracking. (#7390)
  * Howto doc for implementing proto3 presence in a code generator. (#7407)

- Python: Add requirement on python-six

- Update to version 3.11.4; notable changes since 3.9.2:
  * C++: Make serialization method naming consistent
  * C++: Moved ShutdownProtobufLibrary() to message_lite.h. For
         backward compatibility a declaration is still available
         in stubs/common.h, but users should prefer message_lite.h
  * C++: Removed non-namespace macro EXPECT_OK()
  * C++: Removed mathlimits.h from stubs in favor of using
         std::numeric_limits from C++11
  * C++: Support direct pickling of nested messages
  * C++: Disable extension code gen for C#
  * C++: Switch the proto parser to the faster MOMI parser
  * C++: Unused imports of files defining descriptor extensions
         will now be reported
  * C++: Add proto2::util::RemoveSubranges to remove multiple
         subranges in linear time
  * C++: Support 32 bit values for ProtoStreamObjectWriter to Struct
  * C++: Removed the internal-only header coded_stream_inl.h and
         the internal-only methods defined there
  * C++: Enforced no SWIG wrapping of descriptor_database.h
         (other headers already had this restriction)
  * C++: Implementation of the equivalent of the MOMI parser for
         serialization. This removes one of the two serialization
         routines, by making the fast array serialization routine
         completely general. SerializeToCodedStream can now be
         implemented in terms of the much much faster array
         serialization. The array serialization regresses slightly,
         but when array serialization is not possible this wins big
  * C++: Add move constructor for Reflection's SetString
  * Java: Remove the usage of MethodHandle, so that Android users
          prior to API version 26 can use protobuf-java
  * Java: Publish ProGuard config for javalite
  * Java: Include unknown fields when merging proto3 messages in
          Java lite builders
  * Java: Have oneof enums implement a separate interface (other
          than EnumLite) for clarity
  * Java: Opensource Android Memory Accessors
  * Java: Change ProtobufArrayList to use Object[] instead of
          ArrayList for 5-10% faster parsing
  * Java: Make a copy of JsonFormat.TypeRegistry at the protobuf
          top level package. This will eventually replace
          JsonFormat.TypeRegistry
  * Java: Add Automatic-Module-Name entries to the Manifest
  * Python: Add float_precision option in json format printer
  * Python: Optionally print bytes fields as messages in unknown
            fields, if possible
  * Python: Experimental code gen (fast import protobuf module)
            which only work with cpp generated code linked in
  * Python: Add descriptor methods in descriptor_pool are deprecated
  * Python: Added delitem for Python extension dict
  * JavaScript: Remove guard for Symbol iterator for jspb.Map
  * JavaScript: Remove deprecated boolean option to getResultBase64String()
  * JavaScript: Change the parameter types of binaryReaderFn in
                ExtensionFieldBinaryInfo to (number, ?, ?)
  * JavaScript: Create dates.ts and time_of_days.ts to mirror Java
                versions. This is a near-identical conversion of
                c.g.type.util.{Dates,TimeOfDays} respectively
  * JavaScript: Migrate moneys to TypeScript
  * PHP: Increase php7.4 compatibility
  * PHP: Implement lazy loading of php class for proto messages
  * Ruby: Support hashes for struct initializers
  * C#: Experimental proto2 support is now officially available
  * C#: Change _Extensions property to normal body rather than expression
  * Objective C: Remove OSReadLittle* due to alignment requirements
  * Other: Override CocoaPods module to lowercase
  * further bugfixes and optimisations

- Use tarball provided by upstream
- Small package cleanup

- Updated to version 3.9.2 (bsc#1162343)
   (Objective-C)
  * Remove OSReadLittle* due to alignment requirements. (#6678)
  * Don't use unions and instead use memcpy for the type swaps. (#6672)

- Package also the protobuf-bom pom file

- Update to new upstream release 3.9.1
  * Optimized the implementation of RepeatedPtrFieldBase.
  * Added delimited parse and serialize util.
  * Added FieldDescriptor::PrintableNameForExtension() and
    DescriptorPool::FindExtensionByPrintableName(). The latter
    will replace Reflection::FindKnownExtensionByName().
  * Created a new Add method in repeated field that allows adding
    a range of elements all at once.
  * Drop building wheel for Python 3.4.

- Specify java source and target levels in order to build
  compatible protobuf-java binaries

- Update to new upstream release 3.8.0
  * Introduced new MOMI (maybe-outside-memory-interval) parser.
  * Added use of C++ override keyword where appropriate.
  * Always declare enums to be int-sized.
  * Append '_' to C++ reserved keywords for message, enum, extension.

- Disable LTO (boo#1133277).

- fixes build with Bazel 0.22.0.

- Add protobuf-source package - some programs using gRPC and
  protobuf need protobuf definitions which are included inside the
  source code, but are not included in the devel package.

- Add maven pom files to the protobuf-java package

- update to version v3.6.1:
  * PHP namespaces for nested messages and enums (#4536)
  * Allows the json marshaller to be passed json marshal options (#4252)
  * Make sure to delete temporary maps used by FileDescriptorTables
  * fix python cpp kokoro build
  * Change C# reflection to avoid using expression trees
  * Updated checked-in generated code
  * Removed unused variables in repeated_scalar_container.cc
  * Removed unused code pertaining to shared_ptr
  * Include no_package.proto in Python test
  * Only check filenames when end with .py in _CalledFromGeneratedFile() (#4262)
  * Convert descriptortype to type for upb_msgval_sizeof (#4357)
  * Removed duplicate using statement from ReflectionUtil.cs
  * Add support for power ppc64le
  * Cat the test-suite.log on errors for presubits
  * Address review comments
  * Add third-party RPC implementation: raster - a network framework supports pbrpc by 'service' keyword.
  * Delete javanano kokoro build configs.
  * Updated Ruby conformance test failure list
  * Removed use of some type traits
  * Adopt php_metadata_namespace in php code generator (#4622)
  * Move to Xcode 9.3 which also means a High Sierra image.
  * Add protoc release script for Linux build.
  * protoc-artifacts: Avoid storing temporary files and use fewer layers
  * Rewrite go_benchmark
  * Add files to build ruby artifact for mac on kokoro (#4814)
  * Remove javanano.
  * Comment out unused command from release script.
  * Avoid direct check of class name (#4601)
  * The JsonParseOptions::ignore_unknown_fields option behavior treats
  * Fix php memory leak test (#4692)
  * Fix benchmark build
  * Add VS2017 optional component dependency details to the C# readme (#4128)
  * Fix initialization with Visual Studio
  * For windows, all python version should use /MT (#4468)
  * use brew install instead of easy_install in OSX (#4537)
  * Sync upb change (#4373)
  * Always add -std=c++11 for mac (#4684)
  * Add kokoro build status badges.
  * Removed unrecognized option from no_package.proto
  * Fixed up proto3_lite_unittest.cc
  * Update Xcode settings
  * Cleanup LICENSE file.
  * Remove js_embed binary. (#4709)
  * Fixed JS parsing of unspecified map keys
  * Update version number to 3.6.0
  * Deliberately call simple code to avoid Unity linker pruning
  * Revert 'Move `compiler/plugin.pb.cc` to libprotobuf with the other WKT sources.'
  * protoc-artifacts: Use ENTRYPOINT to enable devtoolset-1.1
  * MinGW build failed
  * Support using MSVC intrinsics in Log2FloorNonZero
  * Fix array constructor in c extension for compatibility (#4667)
  * Add space between class name and concat message (#4577)
  * fix python
  * Add performance.md and add instruction for linking tcmalloc
  * Add script for run and upload the benchmark result to bq
  * Add test for failing write of raw pointer to output stream
  * [objectivec] Fix memory leak of exceptions raised by RaiseException() (#4556)
  * Remove stray indent on normal imports.
  * Fix python ext build on kokoro (#4527)
  * Add compile test sources for to test include order.
  * Fixed a Visual Studio 2017 build error. (#4488)
  * fix linux kokoro build in docker
  * Fixes MSVC compiler warning C4800 'Forcing value to bool 'true' or 'false'' (#4350)
  * Updated Docker setup to use GCC 4.8
  * Remove broken build status icons.
  * Run autogen.sh in release script.
  * Output *_pb2_grpc.py when use_grpc_plugin=True
  * Adopt ruby_package in ruby generated code. (#4627)
  * Cygwin build failed
  * Work around an 'old runtime' issue with reflection
  * Added Kokoro protoc release build for OS X (#4770)
  * Updated change log for 3.6.1 release
  * Move methods out of class (#4697)
  * Fix to allow AOT compilers to play nicely with reflection
  * Update Makefile.am for Java lite files.
  * Added map_lite_test.proto to fix LiteTest
  * Introduce a compatiblity shim to support .NET 3.5 delegate creation
  * Revert 'Removed mention of Buffer in byteSourceToUint8Array'
  * Add gogo benchmark
  * Set ext.no_native = true for non mac platform
  * Removed atomicops.h since it is no longer used
  * Rename a shadowed variable.
  * Add kokoro bazel configs for 3.6.x branch.
  * Deleted scoped_ptr.h
  * Check the message to be encoded is the wrong type. (#4885) (#4949)
  * protoc-artifacts: Avoid checking out protobuf code
  * Add conformance test for null value in list JSON
  * Build ruby gem on kokoro (#4819)
  * Try using a new version of Visual Studio on AppVeyor
  * Make ruby release configs consistent with protoc.
  * fix for API change in PHP 7.3 (#4898)
  * Add .proto files to extract_includes.bat
  * Update protoc build scripts.
  * Blacklist all WELL_KNOWN_PROTOS from Bazel C++ code generation.
  * Additional support for building and deploying ppcle_64 artifacts
  * Fix php tests
  * Cleanup + documentation for Java Lite runtime.
  * Added Kokoro Windows release build config for protoc (#4766)
  * typo
  * fix golang kokoro linux build
  * Fix spelling error of __GNUC_MINOR__
  * Update code to work for Xcode 10b1 (#4729)
  * Added pyext/thread_unsafe_shared_ptr.h
  * Added missing .inc files to BUILD
  * js message support for jstype string on integers (#4332)
  * Improve error message when googletest is missing.
  * Make assertEquals pass for message (#4947)
  * Sync internal benchmark changes
  * Removed some unused C++ source files
  * Fix missing LIBPROTOC_EXPORT.
  * Added new test source files to Makefile.am
  * Update php version to 3.6.0 (#4736)
  * Fix RepeatedField#delete_if (#4292)
  * Merge branch (#4466)
  * Implement array constructor in php c extension.
  * protoc-artifacts: Update centos base from 6.6 to 6.9
  * PHP array constructors for protobuf messages (#4530)
  * Fix problem: cmake build failed in c++11  by clang
  * Don't assume Windows builds use MSVC.
  * Use legacy name in php runtime (#4741)
  * Add file option php_metadata_namespace and ruby_package (#4609)
  * Fix cpp benchmark dependency on mac
  * Use the first enum value instead of 0 in DefaultValueObjectWriter::FindEnumDefault
  * Check return value on write of raw pointer
  * Delete unused directories.
  * Replace //:protoc and similar default macro arguments with
  * Add extra C# file to Makefile.am
  * includes the expected class in the exception, otherwise the error is harder to track down (#3371)
  * Update instructions about getting protobuf source.
  * Add cpp tests under release docker image.
  * fix java benchmark, fix dashboard build
  * `update_file_lists.sh` depends on Bash features, thus needs Bash sebang.
  * Rename build_artifacts.cfg to release.cfg (#4818)
  * Fix bug: whether always_print_enums_as_ints is true or false, it always print the default value of enums as strings
  * source code info for interpreted options; fix source code info for extension range options (#4342)
  * Updated version numbers to 3.6.1
  * Trim imports for bundled generated protos.
  * Require C++11 and pass -std=c++11
  * Remove the iOS Test App.
  * fix duplicate mkdir in update_file_lists.sh
  * Updated csharp/README.md to reflect testing changes
  * Fix bazel build of examples.
  * Add missing ruby/tests/test_ruby_package.proto
  * Fix cpp_distcheck
  * Updated the change log with changes for 3.6.0
  * some fix
  * CMake: Update CXX Standard management
  * Add the files added in #4485.
  * Change to deal all messages in one loop
  * Fix php conformance test.
  * Add __init__.py files to compiler and util subpackages (#4117)
  * Updated .gitignore to exclude downloaded gmock/ directory
  * Fix error in Clang UndefinedBehaviorSanitizer
  * Work around MSVC issue with std::atomic initialization (#4777)
  * Updated conformance failure lists
  * Add back GeneratedClassName to public (#4686)
  * Add continuous test for ruby 2.3, 2.4 and 2.5 (#4829)
  * Throw error if user want to access message properties (#4603)
  * fix json_decode call parameters (#4381)
  * Move `compiler/plugin.pb.cc` to libprotobuf with the other WKT sources.
  * PHP: fixed typo in message.c
  * Add go benchmark
  * Allow list values to be null when parsing
  * Added instruction for existing ZLIB configuration
  * Fix 32bit php tests
  * Removed javanano from post_process_dist.sh
  * Don't generate imports for the WKTs unless generating the WKTs.
  * For encoding upb needs descriptor type instead of type. (#4354)
  * Include googletest as a submodule (#3993)
  * Write messages to backing field in generated C# cloning code (#4440)
  * Integrated internal changes from Google
- bump soname version

update to version v3.5.2:
  * Update release date
  * Disable pip cache when testing uploaded packages
  * Replace private timelib_update_ts with public date_timestamp_get
  * Remove py2.6 support.
  * Cherrypick for csharp, including:
  * Update changelog
  * Update changelog for 3.5.1
  * Fix uploading binary wheel.
  * Fix memory leak when creating map field via array.
  * Update rake file to build of 2.1.6.
  * Avoid using php_date_get_date_ce() in case date extension is not
  * Update protoc-artfacts
  * Fix string::back() usage in googletest.cc
  * Fix memory leak in php7
  * Support ruby2.5
  * io_win32: support non-ASCII paths
  * Explicitly propagate the status of Flush().
  * Add discard unknown API in ruby. (#3990)
  * Update version for 3.5.0.post1
  * remove nullptr
  * Fix more memory leak for php c extension (#4211)
  * Bumping number to fix ruby 2.1 on mac
  * io_win32_unittest: remove incorrect error check
  * Fix memory leak when creating repeated field via array.
  * Update version number for php c extension (#3896)
  * Fix file permission for python package.
  * Create containing directory before generating well_known_types_embed.cc
  * Replace C++11 only method std::map::at
  * Recursively clear unknown fields in submessages. (#3982)
  * Update version number to 3.5.1
  * io_win32_unittest: fix condition in GetCwdAsUtf8
  * Add release log
  * io_win32_unittest: use CWD as last tempdir
  * Add PROTOBUF_ENABLE_TIMESTAMP to let user decide whether timestamp util
  * Add support for Windows ARM64 build
  * Add protobuf-all in post release
  * Use fully qualifed name for DescriptorPool in Any.php to avoid name (#3886)
  * Add _file_desc_by_toplevel_extension back
  * Fix setup.py for windows build.
  * io_win32_unittest: make //:win32_test run again
  * Provide discardUnknonwnFields API in php (#3976)
  * Update php c extension version number to 3.5.0.1
  * Fix ruby gc_test in ruby 2.4 (#4011)
  * Remove duplicate typedef. (#3975)
  * Accept DatetimeInterface in fromDatetime
  * io_win32: add more encoding-related tests
  * Bump version number to 3.5.2
  * Bump protoc-artifact version for a patch rebuild
  * Call php method via function name instead of calling directly.
  * Well known types are not initialized properly. (#4139)
  * Use matching enum type for IsPOD.
  * Fix several more memory leak
  * Fix for php5.5
  * Add backslach to make class explict in global namespace

  * Fix compile error undefined reference to
    `google::protobuf::internal::Release_CompareAndSwap(long volatile*, long, long)'
    on s390x https://github.com/google/protobuf/issues/3937

- Conditionalize python2 and python3 in order to be able to build
  without python2 present in distribution
  * Use singlespec macros to simplify the logic
- Run fdupes on python modules to avoid duplicates
- Remove shebangs from import-only code

- Update to new upstream release 3.5.0
  * Proto3 messages are now preserving unknown fields by default.
    If you rely on unknowns fields being dropped, use
    DiscardUnknownFields() explicitly.
  * Deprecated the unsafe_arena_release_* and
    unsafe_arena_add_allocated_* methods for string fields.
  * Added move constructor and move assignment to RepeatedField,
    RepeatedPtrField and google::protobuf::Any.
  * Added perfect forwarding in Arena::CreateMessage.
  * In-progress experimental support for implicit weak fields
    with lite protos. This feature allows the linker to strip out
    more unused messages and reduce binary size.
- Rename %soname to %sover to better reflect its use.

- Install LICENSE

- Update to 3.3.0 :
  * C++:
    * Fixed map fields serialization of DynamicMessage to correctly serialize
      both key and value regardless of their presence.
    * Parser now rejects field number 0 correctly.
    * New API Message::SpaceUsedLong() that’s equivalent to
      Message::SpaceUsed() but returns the value in size_t.
    * JSON support
      - New flag always_print_enums_as_ints in JsonPrintOptions.
      - New flag preserve_proto_field_names in JsonPrintOptions. It will instruct
        the JSON printer to use the original field name declared in the .proto
        file instead of converting them to lowerCamelCase when printing JSON.
      - JsonPrintOptions.always_print_primtive_fields now works for oneof message
        fields.
      - Fixed a bug that doesn’t allow different fields to set the same json_name
        value.
      - Fixed a performance bug that causes excessive memory copy when printing
        large messages.
    * Various performance optimizations.
  * Java:
    * Map field setters eagerly validate inputs and throw NullPointerExceptions
      as appropriate.
    * Added ByteBuffer overloads to the generated parsing methods and the Parser
      interface.
    * proto3 enum's getNumber() method now throws on UNRECOGNIZED values.
    * Output of JsonFormat is now locale independent.
  * Python:
    * Added FindServiceByName() in the pure-Python DescriptorPool. This works only
      for descriptors added with DescriptorPool.Add(). Generated descriptor_pool
      does not support this yet.
    * Added a descriptor_pool parameter for parsing Any in text_format.Parse().
    * descriptor_pool.FindFileContainingSymbol() now is able to find nested
      extensions.
    * Extending empty [] to repeated field now sets parent message presence.
- Update to 3.2.0 :
  * Added protoc version number to protoc plugin protocol. It can be used by
    protoc plugin to detect which version of protoc is used with the plugin and
    mitigate known problems in certain version of protoc.
  * C++:
    * The default parsing byte size limit has been raised from 64MB to 2GB.
    * Added rvalue setters for non-arena string fields.
    * Enabled debug logging for Android.
    * Fixed a double-free problem when using Reflection::SetAllocatedMessage()
      with extension fields.
    * Fixed several deterministic serialization bugs:
      * MessageLite::SerializeAsString() now respects the global deterministic
        serialization flag.
      * Extension fields are serialized deterministically as well.  Fixed protocol
        compiler to correctly report importing-self as an error.
    * Fixed FileDescriptor::DebugString() to print custom options correctly.
    * Various performance/codesize optimizations and cleanups.
  * Java:
    * The default parsing byte size limit has been raised from 64MB to 2GB.
    * Added recursion limit when parsing JSON.
    * Fixed a bug that enumType.getDescriptor().getOptions() doesn't have custom
      options.
    * Fixed generated code to support field numbers up to 2^29-1.
  * Python:
    * You can now assign NumPy scalars/arrays (np.int32, np.int64) to protobuf
      fields, and assigning other numeric types has been optimized for
      performance.
    * Pure-Python: message types are now garbage-collectable.
    * Python/C++: a lot of internal cleanup/refactoring.
- Increase soname to 13
- Generate python2-protobuf and python3-protobuf packages in Factory
- Make the python2-protobuf package provide and obsolete python-protobuf
  to make the transition smooth in Tumbleweed

- Fix an issue with setup.py where some files are built on the
  first invocation, but only copied on the second. This resulted
  in an incomplete protobuf-python package.

- Update to protobuf v3.1.0. Protobuf v3.0.0 introduceced a new
  version of the protocol buffer language, proto3, which supersedes
  proto2.
  The protoc compiler is able to read old proto2 protocol definitions,
  and defaults to the proto2 syntax if a syntax is not specified, thus
  packages can be recompiled to link to the new library. For backwards
  compatibility, the old library version is available from the
  protobuf2 package.
  As the API for proto2 is not compatible to the proto3 API, proto3
  should only be used for new Protocol Buffers, whereas current users
  are advised to keep using proto2. For a detailed list of changes,
  see https://github.com/google/protobuf/releases

- Use py_sitedir for library installation with setup.py install

- Drop protobuf-libs as it is just workaround for rpmlint issue

- Cleanup specfile:
  * remove any conditionals for versions predating SLES 12/Leap 42.x
  * add Provides: protobuf-libs to fix rpmlint warning

Changes in python-python-gflags:
- Don't provide python2-gflags, singlespec packages should use
  correct name.

- Provide python-gflags in the python2 package

- Fix URL.

- Update to version 3.1.1
  * Added PEP8 style method/function aliases.
- Update to version 3.1.0
  * Python3 compatibility
  * Removed UnrecognizedFlag exception.
  * Replaced flags.DuplicateFlag with flags.DuplicateFlagError.
  * Moved the validators.Error class to exceptions.ValidationError.
  * Renamed IllegalFlagValue to IllegalFlagValueError.
  * Removed MutualExclusionValidator class, in favor of flags.MarkFlagsAsMutualExclusive.
  * Removed FlagValues.AddValidator method.
  * Removed _helpers.GetMainModule.
  * Use xml.dom.minidom to create XML strings, instead of manual crafting.
  * Declared PEP8-style names.
  * Added examples.
- Update to version 3.0.7
  * Removed the unused method ShortestUniquePrefixes.
  * Removed _GetCallingModule function alias.
- Update to version 3.0.6
  * Declared pypi package classifiers.
  * Added support for CLIF flag processing (not included in python-gflags repo
    yet).
- Update to version 3.0.5
  * Added a warning when FLAGS.SetDefault is used after flags were parsed.
  * Added new function: MarkFlagsAsRequired.
- Update to version 3.0.4
  * One more fix for setup.py - this time about third_party package.
- Update to version 3.0.3
  * Fixed setup.py.
  * --noflag if argument is given is no longer allowed.
  * Python3 compatibility: removed need for cgi import.
  * Disallowed unparsed flag usage after FLAGS.Reset()
- Update to version 3.0.2
  * Fix MANIFEST.in to include all relevant files.
- Update to version 3.0.1
  * Some changes for python3 compatibility.
  * Automatically generate ordering operations for Flag.
  * Add optional comma compatibility to whitespace-separated list flags.
  * A lot of potentially backwards incompatible changes since 2.0.
  * This version is NOT recommended to use in production. Some of the files and
    documentation has been lost during export; this will be fixed in next
    versions.
- Fix source URL
- Implement single-spec version

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-15"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036025">SUSE bug 1036025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133277">SUSE bug 1133277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162343">SUSE bug 1162343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651303" comment="javapackages-filesystem-5.3.1-14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651257" comment="mysql-connector-java-8.0.25-5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149127" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1081947" ref_url="https://bugzilla.suse.com/1081947" source="BUGZILLA"/>
		<reference ref_id="1082293" ref_url="https://bugzilla.suse.com/1082293" source="BUGZILLA"/>
		<reference ref_id="1084671" ref_url="https://bugzilla.suse.com/1084671" source="BUGZILLA"/>
		<reference ref_id="1085196" ref_url="https://bugzilla.suse.com/1085196" source="BUGZILLA"/>
		<reference ref_id="1106214" ref_url="https://bugzilla.suse.com/1106214" source="BUGZILLA"/>
		<reference ref_id="1122417" ref_url="https://bugzilla.suse.com/1122417" source="BUGZILLA"/>
		<reference ref_id="1125886" ref_url="https://bugzilla.suse.com/1125886" source="BUGZILLA"/>
		<reference ref_id="1135534" ref_url="https://bugzilla.suse.com/1135534" source="BUGZILLA"/>
		<reference ref_id="1135708" ref_url="https://bugzilla.suse.com/1135708" source="BUGZILLA"/>
		<reference ref_id="1151708" ref_url="https://bugzilla.suse.com/1151708" source="BUGZILLA"/>
		<reference ref_id="1168235" ref_url="https://bugzilla.suse.com/1168235" source="BUGZILLA"/>
		<reference ref_id="1168389" ref_url="https://bugzilla.suse.com/1168389" source="BUGZILLA"/>
		<reference ref_id="1169006" ref_url="https://bugzilla.suse.com/1169006" source="BUGZILLA"/>
		<reference ref_id="1174942" ref_url="https://bugzilla.suse.com/1174942" source="BUGZILLA"/>
		<reference ref_id="1175514" ref_url="https://bugzilla.suse.com/1175514" source="BUGZILLA"/>
		<reference ref_id="1175623" ref_url="https://bugzilla.suse.com/1175623" source="BUGZILLA"/>
		<reference ref_id="1178236" ref_url="https://bugzilla.suse.com/1178236" source="BUGZILLA"/>
		<reference ref_id="1178554" ref_url="https://bugzilla.suse.com/1178554" source="BUGZILLA"/>
		<reference ref_id="1178825" ref_url="https://bugzilla.suse.com/1178825" source="BUGZILLA"/>
		<reference ref_id="1188921" ref_url="https://bugzilla.suse.com/1188921" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37600" ref_url="https://www.suse.com/security/cve/CVE-2021-37600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009610.html" source="SUSE-SU"/>
		<description>
This update for util-linux fixes the following issues:

- CVE-2021-37600: Fixed an integer overflow which could lead to buffer overflow in get_sem_elements. (bsc#1188921)
- Prevent outdated pam files (bsc#1082293, bsc#1081947#c68).
- Do not trim read-only volumes (bsc#1106214).
- libmount: To prevent incorrect behavior, recognize more pseudofs and netfs (bsc#1122417).
- raw.service: Add RemainAfterExit=yes (bsc#1135534).
- agetty: Reload issue only if it is really needed (bsc#1085196)
- agetty: Return previous response of agetty for special characters (bsc#1085196, bsc#1125886)
- blockdev: Do not fail --report on kpartx-style partitions on multipath. (bsc#1168235)
- nologin: Add support for -c to prevent error from su -c. (bsc#1151708)
- Avoid triggering autofs in lookup_umount_fs_by_statfs. (bsc#1168389)
- libblkid: Do not trigger CDROM autoclose. (bsc#1084671)
- Avoid sulogin failing on not existing or not functional console devices. (bsc#1175514)
- Build with libudev support to support non-root users. (bsc#1169006)
- lscpu: avoid segfault on PowerPC systems with valid hardware configurations. (bsc#1175623, bsc#1178554, bsc#1178825)
- Fix for warning on mounts to CIFS with mount. (SG#57988, bsc#1174942)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081947">SUSE bug 1081947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082293">SUSE bug 1082293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084671">SUSE bug 1084671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085196">SUSE bug 1085196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106214">SUSE bug 1106214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122417">SUSE bug 1122417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125886">SUSE bug 1125886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135534">SUSE bug 1135534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135708">SUSE bug 1135708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151708">SUSE bug 1151708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168235">SUSE bug 1168235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168389">SUSE bug 1168389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169006">SUSE bug 1169006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174942">SUSE bug 1174942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175514">SUSE bug 1175514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175623">SUSE bug 1175623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178236">SUSE bug 1178236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178554">SUSE bug 1178554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178825">SUSE bug 1178825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188921">SUSE bug 1188921</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37600/">CVE-2021-37600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">CVE-2021-37600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652523" comment="libblkid1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652487" comment="libblkid1-32bit-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652524" comment="libfdisk1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652525" comment="libmount1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652490" comment="libmount1-32bit-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652526" comment="libsmartcols1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652527" comment="libuuid1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652493" comment="libuuid1-32bit-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652528" comment="python-libmount-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652529" comment="util-linux-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652496" comment="util-linux-lang-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652530" comment="util-linux-systemd-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652531" comment="uuidd-2.29.2-3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149128" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1191435" ref_url="https://bugzilla.suse.com/1191435" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41991" ref_url="https://www.suse.com/security/cve/CVE-2021-41991/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009611.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191435">SUSE bug 1191435</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41991/">CVE-2021-41991 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41991">CVE-2021-41991 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652805" comment="strongswan-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652801" comment="strongswan-doc-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652806" comment="strongswan-hmac-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652807" comment="strongswan-ipsec-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652808" comment="strongswan-libs0-5.1.3-26.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149129" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1178961" ref_url="https://bugzilla.suse.com/1178961" source="BUGZILLA"/>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1183118" ref_url="https://bugzilla.suse.com/1183118" source="BUGZILLA"/>
		<reference ref_id="1183168" ref_url="https://bugzilla.suse.com/1183168" source="BUGZILLA"/>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="1185952" ref_url="https://bugzilla.suse.com/1185952" source="BUGZILLA"/>
		<reference ref_id="1187751" ref_url="https://bugzilla.suse.com/1187751" source="BUGZILLA"/>
		<reference ref_id="1190177" ref_url="https://bugzilla.suse.com/1190177" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009622.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

- Fix for build with llvm12 on s390x. (bsc#1185952)
- Re-enable 'icu' for PostgreSQL 10. (bsc#1179945)
- Add postgresqlXX-server-devel as a dependency for postgresql13-server-devel. (bsc#1187751)
- Upgrade to version 10.18. (bsc#1190177)

Upgrade to version 10.17 (already released for SUSE Linux Enterprise 12 SP5):

- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).

- Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).
- Re-enable build of the llvmjit subpackage on SLE, but it will only be delivered on PackageHub for now (bsc#1183118).
- Disable icu for PostgreSQL 10 (and older) on TW (bsc#1179945).
- Fixed an issue droping irregular warning messages by removing the package. (bsc#1178961)
- Fixed an issue when build does not build the requiements to avoid dangling symlinks in the devel package. (bsc#1179765)
- Fix recently-added timetz test case so it works when the USA is not observing daylight savings time.

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178961">SUSE bug 1178961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183118">SUSE bug 1183118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183168">SUSE bug 1183168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185952">SUSE bug 1185952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187751">SUSE bug 1187751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190177">SUSE bug 1190177</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652164" comment="postgresql10-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652165" comment="postgresql10-contrib-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652158" comment="postgresql10-docs-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652166" comment="postgresql10-plperl-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652167" comment="postgresql10-plpython-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652168" comment="postgresql10-pltcl-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652169" comment="postgresql10-server-10.18-4.19.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149130" version="1" class="patch">
	<metadata>
		<title>Recommended update for ardana-horizon, ardana-logging, ardana-monasca, ardana-mq, ardana-osconfig, crowbar-ha, crowbar-openstack, kibana, openstack-neutron, openstack-nova, python-Django, release-notes-suse-openstack-cloud, sleshammer, spark (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1048688" ref_url="https://bugzilla.suse.com/1048688" source="BUGZILLA"/>
		<reference ref_id="1164838" ref_url="https://bugzilla.suse.com/1164838" source="BUGZILLA"/>
		<reference ref_id="1177611" ref_url="https://bugzilla.suse.com/1177611" source="BUGZILLA"/>
		<reference ref_id="1179189" ref_url="https://bugzilla.suse.com/1179189" source="BUGZILLA"/>
		<reference ref_id="1179955" ref_url="https://bugzilla.suse.com/1179955" source="BUGZILLA"/>
		<reference ref_id="1180916" ref_url="https://bugzilla.suse.com/1180916" source="BUGZILLA"/>
		<reference ref_id="1181379" ref_url="https://bugzilla.suse.com/1181379" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8611" ref_url="https://www.suse.com/security/cve/CVE-2016-8611/" source="CVE"/>
		<reference ref_id="CVE-2020-10743" ref_url="https://www.suse.com/security/cve/CVE-2020-10743/" source="CVE"/>
		<reference ref_id="CVE-2021-3281" ref_url="https://www.suse.com/security/cve/CVE-2021-3281/" source="CVE"/>
		<reference ref_id="SUSE-RU-2021:0351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017922.html" source="SUSE-SU"/>
		<description>
This update for ardana-horizon, ardana-logging, ardana-monasca, ardana-mq, ardana-osconfig, crowbar-ha, crowbar-openstack, kibana, openstack-neutron, openstack-nova, python-Django, release-notes-suse-openstack-cloud, sleshammer, spark fixes the following issues:

Security fix from this update:
python-Django1
- CVE-2021-3281: Fixed a potential directory traversal when extracting
  archives (bsc#1181379).

Changes in ardana-horizon_Update:
- Update to version 8.0+git.1610733160.0f577f4:
  * Add Fix for logfile permissions (bsc#1179189)

Changes in ardana-logging_Update:
- Update to version 8.0+git.1610573640.452aed1:
  * Remove some files from upgrade.yml (bsc#1179189)

Changes in ardana-monasca_Update:
- Update to version 8.0+git.1610740501.5dca121:
  * Add Fix for logfile permissions (bsc#1179189)

Changes in ardana-mq_Update:
- Update to version 8.0+git.1605176800.52cccfa:
  * Re-enable mirroring of fanout and reply queues (bsc#1177611)

Changes in ardana-osconfig_Update:
- Update to version 8.0+git.1610643571.91b88d6:
  * Remove SLES-12-SP3-LTSS repos (bsc#1180916)

Changes in crowbar-ha:
- Update to version 5.0+git.1610564036.b75ee1b:
  * [5.0] crowbar-pacemaker: Cluster member SSH key improvements

Changes in crowbar-openstack:
- Update to version 5.0+git.1610402513.08dca931e:
  * neutron: Fix handling of networks with non-ascii names (SOC-11429)

- Update to version 5.0+git.1610372799.621afb999:
  * keystone: fix keystone node lookup (SOC-11333, bsc#1164838)

Changes in kibana:
- Add 0001-Configurable-custom-response-headers-for-server.patch
 (bsc#1171909, CVE-2020-10743)

- Added kibana.yml symlink (bsc#1048688, FATE#323204)


Changes in openstack-nova_Update:
- Update to version nova-16.1.9.dev78:
  * [stable-only] Cap bandit to 1.6.2

Changes in python-Django_Update:
- Add CVE-2021-3281.patch (bsc#1181379, CVE-2021-3281)
  * Fixes a potential directory traversal when extracting archives

Changes in release-notes-suse-openstack-cloud:
- Fix incorrect issue number for bsc#1179955
- Update to version 8.20201214:
  * Add workaround for secure boot issue when shim package is updated. (bsc#1179955)

Changes in spark_Update:
- Add _constraints to prevent build from running out of disk space.

Changes in sleshammer:
- Really drop etc/udev/rules.d/70-persistent-net.rules from the overlay
  it was still present in the tarball. (SOC-9288)

- added ruby2.1-rubygem-crowbar-client providing crowbarctl

		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-09"/>
	<updated date="2021-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1048688">SUSE bug 1048688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164838">SUSE bug 1164838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177611">SUSE bug 1177611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179189">SUSE bug 1179189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179955">SUSE bug 1179955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180916">SUSE bug 1180916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181379">SUSE bug 1181379</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8611/">CVE-2016-8611 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8611">CVE-2016-8611 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10743/">CVE-2020-10743 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10743">CVE-2020-10743 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3281/">CVE-2021-3281 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3281">CVE-2021-3281 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597763" comment="crowbar-ha-5.0+git.1610564036.b75ee1b-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597764" comment="crowbar-openstack-5.0+git.1610402513.08dca931e-4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597730" comment="kibana-4.6.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597731" comment="openstack-neutron-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597732" comment="openstack-neutron-dhcp-agent-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597733" comment="openstack-neutron-doc-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597734" comment="openstack-neutron-ha-tool-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597735" comment="openstack-neutron-l3-agent-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597736" comment="openstack-neutron-linuxbridge-agent-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597737" comment="openstack-neutron-macvtap-agent-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597738" comment="openstack-neutron-metadata-agent-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597739" comment="openstack-neutron-metering-agent-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597740" comment="openstack-neutron-openvswitch-agent-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597741" comment="openstack-neutron-server-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597742" comment="openstack-nova-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597743" comment="openstack-nova-api-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597744" comment="openstack-nova-cells-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597745" comment="openstack-nova-compute-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597746" comment="openstack-nova-conductor-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597747" comment="openstack-nova-console-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597748" comment="openstack-nova-consoleauth-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597749" comment="openstack-nova-doc-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597750" comment="openstack-nova-novncproxy-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597751" comment="openstack-nova-placement-api-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597752" comment="openstack-nova-scheduler-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597753" comment="openstack-nova-serialproxy-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597754" comment="openstack-nova-vncproxy-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597755" comment="python-Django-1.11.29-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597756" comment="python-neutron-11.0.9~dev69-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597757" comment="python-nova-16.1.9~dev78-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597758" comment="release-notes-suse-openstack-cloud-8.20201214-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597765" comment="sleshammer-aarch64-0.8.0-0.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597766" comment="sleshammer-ppc64le-0.8.0-0.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597767" comment="sleshammer-s390x-0.8.0-0.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597768" comment="sleshammer-x86_64-0.8.0-0.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597759" comment="spark-1.6.3-8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149131" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1191957" ref_url="https://bugzilla.suse.com/1191957" source="BUGZILLA"/>
		<reference ref_id="1191992" ref_url="https://bugzilla.suse.com/1191992" source="BUGZILLA"/>
		<reference ref_id="1192000" ref_url="https://bugzilla.suse.com/1192000" source="BUGZILLA"/>
		<reference ref_id="1192005" ref_url="https://bugzilla.suse.com/1192005" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42779" ref_url="https://www.suse.com/security/cve/CVE-2021-42779/" source="CVE"/>
		<reference ref_id="CVE-2021-42780" ref_url="https://www.suse.com/security/cve/CVE-2021-42780/" source="CVE"/>
		<reference ref_id="CVE-2021-42781" ref_url="https://www.suse.com/security/cve/CVE-2021-42781/" source="CVE"/>
		<reference ref_id="CVE-2021-42782" ref_url="https://www.suse.com/security/cve/CVE-2021-42782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009683.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2021-42780: Fixed use after return in insert_pin() (bsc#1192005).
- CVE-2021-42779: Fixed use after free in sc_file_valid() (bsc#1191992).
- CVE-2021-42781: Fixed multiple heap buffer overflows in pkcs15-oberthur.c (bsc#1192000).
- CVE-2021-42782: Stack buffer overflow issues in various places (bsc#1191957).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191957">SUSE bug 1191957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191992">SUSE bug 1191992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192000">SUSE bug 1192000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192005">SUSE bug 1192005</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42779/">CVE-2021-42779 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42779">CVE-2021-42779 at NVD</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-42780/">CVE-2021-42780 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42780">CVE-2021-42780 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42781/">CVE-2021-42781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42781">CVE-2021-42781 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42782/">CVE-2021-42782 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42782">CVE-2021-42782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653628" comment="opensc-0.13.0-3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149132" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1190607" ref_url="https://bugzilla.suse.com/1190607" source="BUGZILLA"/>
		<reference ref_id="1190611" ref_url="https://bugzilla.suse.com/1190611" source="BUGZILLA"/>
		<reference ref_id="1190612" ref_url="https://bugzilla.suse.com/1190612" source="BUGZILLA"/>
		<reference ref_id="1190615" ref_url="https://bugzilla.suse.com/1190615" source="BUGZILLA"/>
		<reference ref_id="1190616" ref_url="https://bugzilla.suse.com/1190616" source="BUGZILLA"/>
		<reference ref_id="1190617" ref_url="https://bugzilla.suse.com/1190617" source="BUGZILLA"/>
		<reference ref_id="1190618" ref_url="https://bugzilla.suse.com/1190618" source="BUGZILLA"/>
		<reference ref_id="1192019" ref_url="https://bugzilla.suse.com/1192019" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-21529" ref_url="https://www.suse.com/security/cve/CVE-2020-21529/" source="CVE"/>
		<reference ref_id="CVE-2020-21530" ref_url="https://www.suse.com/security/cve/CVE-2020-21530/" source="CVE"/>
		<reference ref_id="CVE-2020-21531" ref_url="https://www.suse.com/security/cve/CVE-2020-21531/" source="CVE"/>
		<reference ref_id="CVE-2020-21532" ref_url="https://www.suse.com/security/cve/CVE-2020-21532/" source="CVE"/>
		<reference ref_id="CVE-2020-21533" ref_url="https://www.suse.com/security/cve/CVE-2020-21533/" source="CVE"/>
		<reference ref_id="CVE-2020-21534" ref_url="https://www.suse.com/security/cve/CVE-2020-21534/" source="CVE"/>
		<reference ref_id="CVE-2020-21535" ref_url="https://www.suse.com/security/cve/CVE-2020-21535/" source="CVE"/>
		<reference ref_id="CVE-2021-32280" ref_url="https://www.suse.com/security/cve/CVE-2021-32280/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009685.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Update to fig2dev version 3.2.8 Patchlevel 8b (Aug 2021)

- bsc#1190618, CVE-2020-21529: stack buffer overflow in the bezier_spline function in genepic.c.
- bsc#1190615, CVE-2020-21530: segmentation fault in the read_objects function in read.c.
- bsc#1190617, CVE-2020-21531: global buffer overflow in the conv_pattern_index function in gencgm.c.
- bsc#1190616, CVE-2020-21532: global buffer overflow in the setfigfont function in genepic.c.
- bsc#1190612, CVE-2020-21533: stack buffer overflow in the read_textobject function in read.c.
- bsc#1190611, CVE-2020-21534: global buffer overflow in the get_line function in read.c.
- bsc#1190607, CVE-2020-21535: segmentation fault in the gencgm_start function in gencgm.c.
- bsc#1192019, CVE-2021-32280: NULL pointer dereference in compute_closed_spline() in trans_spline.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190607">SUSE bug 1190607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190611">SUSE bug 1190611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190612">SUSE bug 1190612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190615">SUSE bug 1190615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190616">SUSE bug 1190616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190617">SUSE bug 1190617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190618">SUSE bug 1190618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192019">SUSE bug 1192019</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21529/">CVE-2020-21529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21529">CVE-2020-21529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21530/">CVE-2020-21530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21530">CVE-2020-21530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21531/">CVE-2020-21531 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21531">CVE-2020-21531 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21532/">CVE-2020-21532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21532">CVE-2020-21532 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21533/">CVE-2020-21533 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21533">CVE-2020-21533 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21534/">CVE-2020-21534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21534">CVE-2020-21534 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21535/">CVE-2020-21535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21535">CVE-2020-21535 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32280/">CVE-2021-32280 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32280">CVE-2021-32280 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653544" comment="transfig-3.2.8b-2.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149133" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1126826" ref_url="https://bugzilla.suse.com/1126826" source="BUGZILLA"/>
		<reference ref_id="1126829" ref_url="https://bugzilla.suse.com/1126829" source="BUGZILLA"/>
		<reference ref_id="1126831" ref_url="https://bugzilla.suse.com/1126831" source="BUGZILLA"/>
		<reference ref_id="1140126" ref_url="https://bugzilla.suse.com/1140126" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1143609" ref_url="https://bugzilla.suse.com/1143609" source="BUGZILLA"/>
		<reference ref_id="1153768" ref_url="https://bugzilla.suse.com/1153768" source="BUGZILLA"/>
		<reference ref_id="1153770" ref_url="https://bugzilla.suse.com/1153770" source="BUGZILLA"/>
		<reference ref_id="1157755" ref_url="https://bugzilla.suse.com/1157755" source="BUGZILLA"/>
		<reference ref_id="1160254" ref_url="https://bugzilla.suse.com/1160254" source="BUGZILLA"/>
		<reference ref_id="1160590" ref_url="https://bugzilla.suse.com/1160590" source="BUGZILLA"/>
		<reference ref_id="1163333" ref_url="https://bugzilla.suse.com/1163333" source="BUGZILLA"/>
		<reference ref_id="1163744" ref_url="https://bugzilla.suse.com/1163744" source="BUGZILLA"/>
		<reference ref_id="1179036" ref_url="https://bugzilla.suse.com/1179036" source="BUGZILLA"/>
		<reference ref_id="1179341" ref_url="https://bugzilla.suse.com/1179341" source="BUGZILLA"/>
		<reference ref_id="1179898" ref_url="https://bugzilla.suse.com/1179898" source="BUGZILLA"/>
		<reference ref_id="1179899" ref_url="https://bugzilla.suse.com/1179899" source="BUGZILLA"/>
		<reference ref_id="1179900" ref_url="https://bugzilla.suse.com/1179900" source="BUGZILLA"/>
		<reference ref_id="1179901" ref_url="https://bugzilla.suse.com/1179901" source="BUGZILLA"/>
		<reference ref_id="1179902" ref_url="https://bugzilla.suse.com/1179902" source="BUGZILLA"/>
		<reference ref_id="1179903" ref_url="https://bugzilla.suse.com/1179903" source="BUGZILLA"/>
		<reference ref_id="1180451" ref_url="https://bugzilla.suse.com/1180451" source="BUGZILLA"/>
		<reference ref_id="1180454" ref_url="https://bugzilla.suse.com/1180454" source="BUGZILLA"/>
		<reference ref_id="1180461" ref_url="https://bugzilla.suse.com/1180461" source="BUGZILLA"/>
		<reference ref_id="1181452" ref_url="https://bugzilla.suse.com/1181452" source="BUGZILLA"/>
		<reference ref_id="1182252" ref_url="https://bugzilla.suse.com/1182252" source="BUGZILLA"/>
		<reference ref_id="1183511" ref_url="https://bugzilla.suse.com/1183511" source="BUGZILLA"/>
		<reference ref_id="1184620" ref_url="https://bugzilla.suse.com/1184620" source="BUGZILLA"/>
		<reference ref_id="1184794" ref_url="https://bugzilla.suse.com/1184794" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12972" ref_url="https://www.suse.com/security/cve/CVE-2019-12972/" source="CVE"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-14444" ref_url="https://www.suse.com/security/cve/CVE-2019-14444/" source="CVE"/>
		<reference ref_id="CVE-2019-17450" ref_url="https://www.suse.com/security/cve/CVE-2019-17450/" source="CVE"/>
		<reference ref_id="CVE-2019-17451" ref_url="https://www.suse.com/security/cve/CVE-2019-17451/" source="CVE"/>
		<reference ref_id="CVE-2019-9074" ref_url="https://www.suse.com/security/cve/CVE-2019-9074/" source="CVE"/>
		<reference ref_id="CVE-2019-9075" ref_url="https://www.suse.com/security/cve/CVE-2019-9075/" source="CVE"/>
		<reference ref_id="CVE-2019-9077" ref_url="https://www.suse.com/security/cve/CVE-2019-9077/" source="CVE"/>
		<reference ref_id="CVE-2020-16590" ref_url="https://www.suse.com/security/cve/CVE-2020-16590/" source="CVE"/>
		<reference ref_id="CVE-2020-16591" ref_url="https://www.suse.com/security/cve/CVE-2020-16591/" source="CVE"/>
		<reference ref_id="CVE-2020-16592" ref_url="https://www.suse.com/security/cve/CVE-2020-16592/" source="CVE"/>
		<reference ref_id="CVE-2020-16593" ref_url="https://www.suse.com/security/cve/CVE-2020-16593/" source="CVE"/>
		<reference ref_id="CVE-2020-16598" ref_url="https://www.suse.com/security/cve/CVE-2020-16598/" source="CVE"/>
		<reference ref_id="CVE-2020-16599" ref_url="https://www.suse.com/security/cve/CVE-2020-16599/" source="CVE"/>
		<reference ref_id="CVE-2020-35448" ref_url="https://www.suse.com/security/cve/CVE-2020-35448/" source="CVE"/>
		<reference ref_id="CVE-2020-35493" ref_url="https://www.suse.com/security/cve/CVE-2020-35493/" source="CVE"/>
		<reference ref_id="CVE-2020-35496" ref_url="https://www.suse.com/security/cve/CVE-2020-35496/" source="CVE"/>
		<reference ref_id="CVE-2020-35507" ref_url="https://www.suse.com/security/cve/CVE-2020-35507/" source="CVE"/>
		<reference ref_id="CVE-2021-20197" ref_url="https://www.suse.com/security/cve/CVE-2021-20197/" source="CVE"/>
		<reference ref_id="CVE-2021-20284" ref_url="https://www.suse.com/security/cve/CVE-2021-20284/" source="CVE"/>
		<reference ref_id="CVE-2021-3487" ref_url="https://www.suse.com/security/cve/CVE-2021-3487/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

Update to binutils 2.37:

* The GNU Binutils sources now requires a C99 compiler and library to
  build.
* Support for the arm-symbianelf format has been removed.
* Support for Realm Management Extension (RME) for AArch64 has been
  added.
* A new linker option '-z report-relative-reloc' for x86 ELF targets
  has been added to report dynamic relative relocations.
* A new linker option '-z start-stop-gc' has been added to disable
  special treatment of __start_*/__stop_* references when
  --gc-sections.
* A new linker options '-Bno-symbolic' has been added which will
  cancel the '-Bsymbolic' and '-Bsymbolic-functions' options.
* The readelf tool has a new command line option which can be used to
  specify how the numeric values of symbols are reported.
  --sym-base=0|8|10|16 tells readelf to display the values in base 8,
  base 10 or base 16.  A sym base of 0 represents the default action
  of displaying values under 10000 in base 10 and values above that in
  base 16.
* A new format has been added to the nm program.  Specifying
  '--format=just-symbols' (or just using -j) will tell the program to
  only display symbol names and nothing else.
* A new command line option '--keep-section-symbols' has been added to
  objcopy and strip.  This stops the removal of unused section symbols
  when the file is copied.  Removing these symbols saves space, but
  sometimes they are needed by other tools.
* The '--weaken', '--weaken-symbol' and '--weaken-symbols' options
  supported by objcopy now make undefined symbols weak on targets that
  support weak symbols. 
* Readelf and objdump can now display and use the contents of .debug_sup
  sections.
* Readelf and objdump will now follow links to separate debug info
  files by default.  This behaviour can be stopped via the use of the
  new '-wN' or '--debug-dump=no-follow-links' options for readelf and
  the '-WN' or '--dwarf=no-follow-links' options for objdump.  Also
  the old behaviour can be restored by the use of the
  '--enable-follow-debug-links=no' configure time option.

  The semantics of the =follow-links option have also been slightly
  changed.  When enabled, the option allows for the loading of symbol
  tables and string tables from the separate files which can be used
  to enhance the information displayed when dumping other sections,
  but it does not automatically imply that information from the
  separate files should be displayed.

  If other debug section display options are also enabled (eg
  '--debug-dump=info') then the contents of matching sections in both
  the main file and the separate debuginfo file *will* be displayed.
  This is because in most cases the debug section will only be present
  in one of the files.

  If however non-debug section display options are enabled (eg
  '--sections') then the contents of matching parts of the separate
  debuginfo file will *not* be displayed.  This is because in most
  cases the user probably only wanted to load the symbol information
  from the separate debuginfo file.  In order to change this behaviour
  a new command line option --process-links can be used.  This will
  allow di0pslay options to applied to both the main file and any
  separate debuginfo files.
* Nm has a new command line option: '--quiet'.  This suppresses 'no
  symbols' diagnostic.

Update to binutils 2.36:

 New features in the Assembler:

  General:

   * When setting the link order attribute of ELF sections, it is now
     possible to use a numeric section index instead of symbol name.
   * Added a .nop directive to generate a single no-op instruction in
     a target neutral manner.  This instruction does have an effect on
     DWARF line number generation, if that is active.
   * Removed --reduce-memory-overheads and --hash-size as gas now
     uses hash tables that can be expand and shrink automatically.

   X86/x86_64:

     * Add support for AVX VNNI, HRESET, UINTR, TDX, AMX and Key
       Locker instructions. 
     * Support non-absolute segment values for lcall and ljmp.
     * Add {disp16} pseudo prefix to x86 assembler.
     * Configure with --enable-x86-used-note by default for Linux/x86.

   ARM/AArch64:

     * Add support for Cortex-A78, Cortex-A78AE and Cortex-X1,
       Cortex-R82, Neoverse V1, and Neoverse N2 cores.
     * Add support for ETMv4 (Embedded Trace Macrocell), ETE (Embedded
       Trace Extension), TRBE (Trace Buffer Extension), CSRE (Call
       Stack Recorder Extension) and BRBE (Branch Record Buffer
       Extension) system registers.
     * Add support for Armv8-R and Armv8.7-A ISA extensions.
     * Add support for DSB memory nXS barrier, WFET and WFIT
       instruction for Armv8.7.
     * Add support for +csre feature for -march. Add CSR PDEC
       instruction for CSRE feature in AArch64.
     * Add support for +flagm feature for -march in Armv8.4 AArch64.
     * Add support for +ls64 feature for -march in Armv8.7
       AArch64. Add atomic 64-byte load/store instructions for this
       feature. 
     * Add support for +pauth (Pointer Authentication) feature for
       -march in AArch64.

  New features in the Linker:

    * Add --error-handling-script=&lt;NAME&gt; command line option to allow
      a helper script to be invoked when an undefined symbol or a
      missing library is encountered.  This option can be suppressed
      via the configure time switch: --enable-error-handling-script=no.
    * Add -z x86-64-{baseline|v[234]} to the x86 ELF linker to mark
      x86-64-{baseline|v[234]} ISA level as needed.
    * Add -z unique-symbol to avoid duplicated local symbol names.
    * The creation of PE format DLLs now defaults to using a more
      secure set of DLL characteristics.
    * The linker now deduplicates the types in .ctf sections.  The new 
       command-line option --ctf-share-types describes how to do this:
       its default value, share-unconflicted, produces the most compact
       output.
    * The linker now omits the 'variable section' from .ctf sections
      by default, saving space.  This is almost certainly what you
      want unless you are working on a project that has its own
      analogue of symbol tables that are not reflected in the ELF
      symtabs.

New features in other binary tools:

    * The ar tool's previously unused l modifier is now used for
      specifying dependencies of a static library. The arguments of
      this option (or --record-libdeps long form option) will be
      stored verbatim in the __.LIBDEP member of the archive, which
      the linker may read at link time.
    * Readelf can now display the contents of LTO symbol table
      sections when asked to do so via the --lto-syms command line
      option.
    * Readelf now accepts the -C command line option to enable the
      demangling of symbol names.  In addition the --demangle=&lt;style&gt;,
      --no-demangle, --recurse-limit and --no-recurse-limit options
      are also now availale.

Update to binutils 2.35.1:

* This is a point release over the previous 2.35 version, containing bug
  fixes, and as an exception to the usual rule, one new feature.  The
  new feature is the support for a new directive in the assembler:
  '.nop'.  This directive creates a single no-op instruction in whatever
  encoding is correct for the target architecture.  Unlike the .space or
  .fill this is a real instruction, and it does affect the generation of
  DWARF line number tables, should they be enabled.

Update to binutils 2.35:

* The assembler can now produce DWARF-5 format line number tables.
* Readelf now has a 'lint' mode to enable extra checks of the files it is processing.
* Readelf will now display '[...]' when it has to truncate a symbol name.  
  The old behaviour - of displaying as many characters as possible, up to
  the 80 column limit - can be restored by the use of the --silent-truncation
  option.
* The linker can now produce a dependency file listing the inputs that it
  has processed, much like the -M -MP option supported by the compiler.

Update to binutils 2.34:

* The disassembler (objdump --disassemble) now has an option to
  generate ascii art thats show the arcs between that start and end
  points of control flow instructions.
* The binutils tools now have support for debuginfod.  Debuginfod is a 
  HTTP service for distributing ELF/DWARF debugging information as
  well as source code.  The tools can now connect to debuginfod
  servers in order to download debug information about the files that
  they are processing.
* The assembler and linker now support the generation of ELF format
  files for the Z80 architecture.

Update to binutils 2.33.1:

* Adds support for the Arm Scalable Vector Extension version 2
  (SVE2) instructions, the Arm Transactional Memory Extension (TME)
  instructions and the Armv8.1-M Mainline and M-profile Vector
  Extension (MVE) instructions.
* Adds support for the Arm Cortex-A76AE, Cortex-A77 and Cortex-M35P
  processors and the AArch64 Cortex-A34, Cortex-A65, Cortex-A65AE,
  Cortex-A76AE, and Cortex-A77 processors.
* Adds a .float16 directive for both Arm and AArch64 to allow
  encoding of 16-bit floating point literals.
* For MIPS, Add -m[no-]fix-loongson3-llsc option to fix (or not)
  Loongson3 LLSC Errata.  Add a --enable-mips-fix-loongson3-llsc=[yes|no]
  configure time option to set the default behavior. Set the default
  if the configure option is not used to 'no'.
* The Cortex-A53 Erratum 843419 workaround now supports a choice of
  which workaround to use.  The option --fix-cortex-a53-843419 now
  takes an optional argument --fix-cortex-a53-843419[=full|adr|adrp]
  which can be used to force a particular workaround to be used.
  See --help for AArch64 for more details.
* Add support for GNU_PROPERTY_AARCH64_FEATURE_1_BTI and
  GNU_PROPERTY_AARCH64_FEATURE_1_PAC  in ELF GNU program properties
  in the AArch64 ELF linker. 
* Add -z force-bti for AArch64 to enable GNU_PROPERTY_AARCH64_FEATURE_1_BTI
  on output while warning about missing GNU_PROPERTY_AARCH64_FEATURE_1_BTI 
  on inputs and use PLTs protected with BTI.
* Add -z pac-plt for AArch64 to pick PAC enabled PLTs.
* Add --source-comment[=&lt;txt&gt;] option to objdump which if present,
  provides a prefix to source code lines displayed in a disassembly.
* Add --set-section-alignment &lt;section-name&gt;=&lt;power-of-2-align&gt;
  option to objcopy to allow the changing of section alignments.
* Add --verilog-data-width option to objcopy for verilog targets to
  control width of data elements in verilog hex format.
* The separate debug info file options of readelf (--debug-dump=links
  and --debug-dump=follow) and objdump (--dwarf=links and
  --dwarf=follow-links) will now display and/or follow multiple
  links if more than one are present in a file.  (This usually
  happens when gcc's -gsplit-dwarf option is used).
  In addition objdump's --dwarf=follow-links now also affects its
  other display options, so that for example, when combined with
  --syms it will cause the symbol tables in any linked debug info
  files to also be displayed.  In addition when combined with
  --disassemble the --dwarf= follow-links option will ensure that
  any symbol tables in the linked files are read and used when
  disassembling code in the main file.
* Add support for dumping types encoded in the Compact Type Format
  to objdump and readelf.

The following security fixes are addressed by the update:

- CVE-2021-20197: Fixed a race condition which allows users to own arbitrary files (bsc#1181452).
- CVE-2021-20284: Fixed a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c (bsc#1183511).
- CVE-2021-3487: Fixed a denial of service via excessive debug section size causing excessive memory consumption in bfd's dwarf2.c read_section() (bsc#1184620).
- CVE-2020-35448: Fixed a heap-based buffer over-read in bfd_getl_signed_32() in libbfd.c (bsc#1184794).
- CVE-2020-16590: Fixed a double free vulnerability in process_symbol_table() (bsc#1179898).
- CVE-2020-16591: Fixed an invalid read in process_symbol_table() (bsc#1179899).
- CVE-2020-16592: Fixed an use-after-free in bfd_hash_lookup() (bsc#1179900).
- CVE-2020-16593: Fixed a null pointer dereference in scan_unit_for_symbols() (bsc#1179901).
- CVE-2020-16598: Fixed a null pointer dereference in debug_get_real_type() (bsc#1179902).
- CVE-2020-16599: Fixed a null pointer dereference in _bfd_elf_get_symbol_version_string() (bsc#1179903)
- CVE-2020-35493: Fixed heap-based buffer overflow in bfd_pef_parse_function_stubs function in bfd/pef.c via crafted PEF file (bsc#1180451).
- CVE-2020-35496: Fixed multiple null pointer dereferences in bfd module due to not checking return value of bfd_malloc (bsc#1180454).
- CVE-2020-35507: Fixed a null pointer dereference in bfd_pef_parse_function_stubs() (bsc#1180461).
- CVE-2019-17451: Fixed an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line() in dwarf2.c (bsc#1153768).
- CVE-2019-17450: Fixed a potential denial of service in find_abstract_instance() in dwarf2.c (bsc#1153770).
- CVE-2019-9077: Fixed a heap-based buffer overflow in process_mips_specific() in readelf.c via a malformed MIPS option section (bsc#1126826).
- CVE-2019-9075: Fixed a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap() in archive64.c (bsc#1126829).
- CVE-2019-9074: Fixed a out-of-bounds read leading to a SEGV in bfd_getl32() in libbfd.c (bsc#1126831).
- CVE-2019-12972: Fixed a heap-based buffer over-read in _bfd_doprnt() in bfd.c (bsc#1140126).
- CVE-2019-14444: Fixed an integer overflow apply_relocations() in readelf.c (bsc#1143609).
- CVE-2019-14250: Fixed an integer overflow in simple_object_elf_match() in simple-object-elf.c (bsc#1142649).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-02"/>
	<updated date="2021-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126826">SUSE bug 1126826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126829">SUSE bug 1126829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126831">SUSE bug 1126831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140126">SUSE bug 1140126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143609">SUSE bug 1143609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153768">SUSE bug 1153768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153770">SUSE bug 1153770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157755">SUSE bug 1157755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160254">SUSE bug 1160254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160590">SUSE bug 1160590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163333">SUSE bug 1163333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163744">SUSE bug 1163744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179036">SUSE bug 1179036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179341">SUSE bug 1179341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179898">SUSE bug 1179898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179899">SUSE bug 1179899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179900">SUSE bug 1179900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179901">SUSE bug 1179901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179902">SUSE bug 1179902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179903">SUSE bug 1179903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180451">SUSE bug 1180451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180454">SUSE bug 1180454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180461">SUSE bug 1180461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181452">SUSE bug 1181452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182252">SUSE bug 1182252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183511">SUSE bug 1183511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184620">SUSE bug 1184620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184794">SUSE bug 1184794</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12972/">CVE-2019-12972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12972">CVE-2019-12972 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14250">CVE-2019-14250 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14444/">CVE-2019-14444 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14444">CVE-2019-14444 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17450/">CVE-2019-17450 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17450">CVE-2019-17450 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17451/">CVE-2019-17451 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17451">CVE-2019-17451 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9074/">CVE-2019-9074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9074">CVE-2019-9074 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9075/">CVE-2019-9075 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9075">CVE-2019-9075 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9077/">CVE-2019-9077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9077">CVE-2019-9077 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16590/">CVE-2020-16590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16590">CVE-2020-16590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16591/">CVE-2020-16591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16591">CVE-2020-16591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16592/">CVE-2020-16592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16592">CVE-2020-16592 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16593/">CVE-2020-16593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16593">CVE-2020-16593 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16598/">CVE-2020-16598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16598">CVE-2020-16598 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16599/">CVE-2020-16599 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16599">CVE-2020-16599 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-35448/">CVE-2020-35448 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35448">CVE-2020-35448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35493/">CVE-2020-35493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35493">CVE-2020-35493 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35496/">CVE-2020-35496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35496">CVE-2020-35496 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35507/">CVE-2020-35507 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35507">CVE-2020-35507 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20197/">CVE-2021-20197 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20197">CVE-2021-20197 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20284/">CVE-2021-20284 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20284">CVE-2021-20284 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3487/">CVE-2021-3487 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3487">CVE-2021-3487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149134" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1183909" ref_url="https://bugzilla.suse.com/1183909" source="BUGZILLA"/>
		<reference ref_id="1184519" ref_url="https://bugzilla.suse.com/1184519" source="BUGZILLA"/>
		<reference ref_id="1188941" ref_url="https://bugzilla.suse.com/1188941" source="BUGZILLA"/>
		<reference ref_id="1191473" ref_url="https://bugzilla.suse.com/1191473" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20294" ref_url="https://www.suse.com/security/cve/CVE-2021-20294/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009707.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

- For compatibility on old code stream that expect 'brcl 0,label' to
  not be disassembled as 'jgnop label' on s390x.  (bsc#1192267)
  This reverts IBM zSeries HLASM support for now.
- Fixed that ppc64 optflags did not enable LTO (bsc#1188941).
- Fix empty man-pages from broken release tarball
- Fixed a memory corruption with rpath option (bsc#1191473).

- Fixed slow performance of stripping some binaries (bsc#1183909).

Security issue fixed:

- CVE-2021-20294: Fixed out-of-bounds write in print_dynamic_symbol in readelf (bnc#1184519)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183909">SUSE bug 1183909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184519">SUSE bug 1184519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188941">SUSE bug 1188941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191473">SUSE bug 1191473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20294/">CVE-2021-20294 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20294">CVE-2021-20294 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654414" comment="binutils-2.37-9.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654415" comment="binutils-devel-2.37-9.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654416" comment="libctf-nobfd0-2.37-9.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654417" comment="libctf0-2.37-9.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149135" version="1" class="patch">
	<metadata>
		<title>Security update for pcre (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1025709" ref_url="https://bugzilla.suse.com/1025709" source="BUGZILLA"/>
		<reference ref_id="1030066" ref_url="https://bugzilla.suse.com/1030066" source="BUGZILLA"/>
		<reference ref_id="1030803" ref_url="https://bugzilla.suse.com/1030803" source="BUGZILLA"/>
		<reference ref_id="1030805" ref_url="https://bugzilla.suse.com/1030805" source="BUGZILLA"/>
		<reference ref_id="1030807" ref_url="https://bugzilla.suse.com/1030807" source="BUGZILLA"/>
		<reference ref_id="1172973" ref_url="https://bugzilla.suse.com/1172973" source="BUGZILLA"/>
		<reference ref_id="1172974" ref_url="https://bugzilla.suse.com/1172974" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6004" ref_url="https://www.suse.com/security/cve/CVE-2017-6004/" source="CVE"/>
		<reference ref_id="CVE-2017-7186" ref_url="https://www.suse.com/security/cve/CVE-2017-7186/" source="CVE"/>
		<reference ref_id="CVE-2017-7244" ref_url="https://www.suse.com/security/cve/CVE-2017-7244/" source="CVE"/>
		<reference ref_id="CVE-2017-7245" ref_url="https://www.suse.com/security/cve/CVE-2017-7245/" source="CVE"/>
		<reference ref_id="CVE-2017-7246" ref_url="https://www.suse.com/security/cve/CVE-2017-7246/" source="CVE"/>
		<reference ref_id="CVE-2019-20838" ref_url="https://www.suse.com/security/cve/CVE-2019-20838/" source="CVE"/>
		<reference ref_id="CVE-2020-14155" ref_url="https://www.suse.com/security/cve/CVE-2020-14155/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
		<description>
This update for pcre fixes the following issues:

Update pcre to version 8.45:

- CVE-2020-14155: Fixed integer overflow via a large number after a '(?C' substring (bsc#1172974).
- CVE-2019-20838: Fixed buffer over-read in JIT compiler (bsc#1172973).
- CVE-2017-7244: Fixed invalid read in _pcre32_xclass() (bsc#1030807).
- CVE-2017-7245: Fixed buffer overflow in the pcre32_copy_substring (bsc#1030805).
- CVE-2017-7246: Fixed another buffer overflow in the pcre32_copy_substring (bsc#1030803).
- CVE-2017-7186: Fixed denial of service caused by an invalid Unicode property lookup (bsc#1030066).
- CVE-2017-6004: Fixed denial of service via crafted regular expression (bsc#1025709).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-10"/>
	<updated date="2021-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025709">SUSE bug 1025709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030066">SUSE bug 1030066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030803">SUSE bug 1030803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030805">SUSE bug 1030805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030807">SUSE bug 1030807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172973">SUSE bug 1172973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172974">SUSE bug 1172974</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6004/">CVE-2017-6004 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6004">CVE-2017-6004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7186/">CVE-2017-7186 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7186">CVE-2017-7186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7244/">CVE-2017-7244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7244">CVE-2017-7244 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7245/">CVE-2017-7245 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7245">CVE-2017-7245 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7246/">CVE-2017-7246 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7246">CVE-2017-7246 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20838/">CVE-2019-20838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20838">CVE-2019-20838 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14155/">CVE-2020-14155 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">CVE-2020-14155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653038" comment="libpcre1-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653016" comment="libpcre1-32bit-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653039" comment="libpcre16-0-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653066" comment="libpcrecpp0-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653354" comment="libpcreposix0-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653191" comment="pcre-devel-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653349" comment="selinux-policy-20140730-36.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653350" comment="selinux-policy-devel-20140730-36.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653351" comment="selinux-policy-minimum-20140730-36.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149136" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1189702" ref_url="https://bugzilla.suse.com/1189702" source="BUGZILLA"/>
		<reference ref_id="1189938" ref_url="https://bugzilla.suse.com/1189938" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3713" ref_url="https://www.suse.com/security/cve/CVE-2021-3713/" source="CVE"/>
		<reference ref_id="CVE-2021-3748" ref_url="https://www.suse.com/security/cve/CVE-2021-3748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020738.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- Fix out-of-bounds write in UAS (USB Attached SCSI) device emulation (bsc#1189702, CVE-2021-3713)
- Fix heap use-after-free in virtio_net_receive_rcu (bsc#1189938, CVE-2021-3748)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-10"/>
	<updated date="2021-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189702">SUSE bug 1189702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189938">SUSE bug 1189938</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3713/">CVE-2021-3713 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3713">CVE-2021-3713 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3748/">CVE-2021-3748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3748">CVE-2021-3748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653192" comment="qemu-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653193" comment="qemu-block-curl-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653194" comment="qemu-block-iscsi-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653156" comment="qemu-block-rbd-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653195" comment="qemu-block-ssh-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653196" comment="qemu-guest-agent-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653159" comment="qemu-ipxe-1.0.0+-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653160" comment="qemu-kvm-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653197" comment="qemu-lang-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653163" comment="qemu-seabios-1.10.2_0_g5f4c7b1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653164" comment="qemu-sgabios-8-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653198" comment="qemu-tools-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653166" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653167" comment="qemu-x86-2.9.1-43.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149137" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1192250" ref_url="https://bugzilla.suse.com/1192250" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38505" ref_url="https://www.suse.com/security/cve/CVE-2021-38505/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<reference ref_id="CVE-2021-38510" ref_url="https://www.suse.com/security/cve/CVE-2021-38510/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to Extended Support Release 91.3.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-49 (bsc#1192250)

  * CVE-2021-38503: iframe sandbox rules did not apply to XSLT stylesheets
  * CVE-2021-38504: Use-after-free in file picker dialog
  * CVE-2021-38505: Windows 10 Cloud Clipboard may have recorded sensitive user data
  * CVE-2021-38506: Firefox could be coaxed into going into fullscreen mode without notification or warning
  * CVE-2021-38507: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports
  * CVE-2021-38508: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing
  * CVE-2021-38509: Javascript alert box could have been spoofed onto an arbitrary domain
  * CVE-2021-38510: Download Protections were bypassed by .inetloc files on Mac OS
  * MOZ-2021-0008: Use-after-free in HTTP2 Session object
  * MOZ-2021-0007: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38503">CVE-2021-38503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38504">CVE-2021-38504 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38505/">CVE-2021-38505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38505">CVE-2021-38505 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38506">CVE-2021-38506 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38507">CVE-2021-38507 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38508">CVE-2021-38508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38509">CVE-2021-38509 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38510/">CVE-2021-38510 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38510">CVE-2021-38510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655637" comment="MozillaFirefox-91.3.0-112.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655638" comment="MozillaFirefox-devel-91.3.0-112.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655639" comment="MozillaFirefox-translations-common-91.3.0-112.80.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149138" version="1" class="patch">
	<metadata>
		<title>Security update for ardana-ansible, ardana-monasca, documentation-suse-openstack-cloud, openstack-ec2-api, openstack-heat-templates, python-Django, python-monasca-common, rubygem-redcarpet, rubygem-puma (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1180837" ref_url="https://bugzilla.suse.com/1180837" source="BUGZILLA"/>
		<reference ref_id="1191681" ref_url="https://bugzilla.suse.com/1191681" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26298" ref_url="https://www.suse.com/security/cve/CVE-2020-26298/" source="CVE"/>
		<reference ref_id="CVE-2021-41136" ref_url="https://www.suse.com/security/cve/CVE-2021-41136/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009746.html" source="SUSE-SU"/>
		<description>
This update for ardana-ansible, ardana-monasca, documentation-suse-openstack-cloud, openstack-ec2-api, openstack-heat-templates, python-Django, python-monasca-common, rubygem-redcarpet, rubygem-puma contains the following fixes:

Security fixes included in this update:

rubygem-redcarpet:
CVE-2020-26298: Fixed XSS via HTML escaping when processing quotes. (bsc#1180837)

rubygem-puma:
CVE-2021-41136: Fixed build of the Java state machine for parsing HTTP. (bsc#1191681)

Non-security fixes included in this update:

Changes in ardana-ansible:
  * Patch service.py to skip blank lines.

Changes in ardana-monasca:
  * Use specific TLS versions for monasca-thresh DB connections. (SOC-11543)

Changes in documentation-suse-openstack-cloud:
  * CI: only run on DocBook/AsciiDoc paths, make upload fails nonfatal
  * DC files: Update to 2021 stylesheets (#1327)
  * CI: Use GitHub Actions

Changes in openstack-ec2-api:
  * Remove jobs corresponds to obselete featuresets
  * OpenDev Migration Patch

Changes in openstack-heat-templates:
  * [ussuri][goal] Update contributor documentation

Changes in python-Django:
- Add missing dependency for CVE-2021-31542

Changes in python-monasca-common:
- Remove renderspec source service.
- Retry publish once on failures. (SOC-11543)
  
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180837">SUSE bug 1180837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191681">SUSE bug 1191681</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26298/">CVE-2020-26298 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26298">CVE-2020-26298 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41136/">CVE-2021-41136 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41136">CVE-2021-41136 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656093" comment="documentation-suse-openstack-cloud-deployment-8.20210806-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656078" comment="documentation-suse-openstack-cloud-supplement-8.20210806-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656079" comment="documentation-suse-openstack-cloud-upstream-admin-8.20210806-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656080" comment="documentation-suse-openstack-cloud-upstream-user-8.20210806-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656082" comment="openstack-ec2-api-5.0.1~dev12-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656083" comment="openstack-ec2-api-api-5.0.1~dev12-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656084" comment="openstack-ec2-api-metadata-5.0.1~dev12-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656085" comment="openstack-ec2-api-s3-5.0.1~dev12-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656086" comment="openstack-heat-templates-0.0.0+git.1628179051.7d761bf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656087" comment="python-Django-1.11.29-3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656088" comment="python-ec2api-5.0.1~dev12-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656089" comment="python-monasca-common-2.3.1~dev4-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656094" comment="ruby2.1-rubygem-puma-2.16.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654647" comment="ruby2.1-rubygem-redcarpet-3.2.3-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149139" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1014440" ref_url="https://bugzilla.suse.com/1014440" source="BUGZILLA"/>
		<reference ref_id="1192284" ref_url="https://bugzilla.suse.com/1192284" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124/" source="CVE"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009750.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:
	  
- CVE-2016-2124: Fixed not to fallback to non spnego authentication if we require kerberos (bsc#1014440).
- CVE-2020-25717: Fixed privilege escalation inside an AD Domain where a user could become root on domain members (bsc#1192284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014440">SUSE bug 1014440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192284">SUSE bug 1192284</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2124">CVE-2016-2124 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25717">CVE-2020-25717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655686" comment="libdcerpc-binding0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655588" comment="libdcerpc-binding0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655687" comment="libdcerpc0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655590" comment="libdcerpc0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655688" comment="libndr-krb5pac0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655592" comment="libndr-krb5pac0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655689" comment="libndr-nbt0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655594" comment="libndr-nbt0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655690" comment="libndr-standard0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655596" comment="libndr-standard0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655691" comment="libndr0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655598" comment="libndr0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655692" comment="libnetapi0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655600" comment="libnetapi0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655693" comment="libsamba-credentials0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655602" comment="libsamba-credentials0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655694" comment="libsamba-errors0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655604" comment="libsamba-errors0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655695" comment="libsamba-hostconfig0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655606" comment="libsamba-hostconfig0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655696" comment="libsamba-passdb0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655608" comment="libsamba-passdb0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655697" comment="libsamba-util0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655610" comment="libsamba-util0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655698" comment="libsamdb0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655612" comment="libsamdb0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655699" comment="libsmbclient0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655614" comment="libsmbclient0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655700" comment="libsmbconf0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655616" comment="libsmbconf0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655701" comment="libsmbldap0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655618" comment="libsmbldap0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655702" comment="libtevent-util0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655620" comment="libtevent-util0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655703" comment="libwbclient0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655622" comment="libwbclient0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655704" comment="samba-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655705" comment="samba-client-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655625" comment="samba-client-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655626" comment="samba-doc-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655706" comment="samba-libs-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655628" comment="samba-libs-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655707" comment="samba-winbind-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655630" comment="samba-winbind-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149140" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql13, postgresql14  (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009760.html" source="SUSE-SU"/>
		<description>
This update for postgresql, postgresql13 and postgresql14 fixes the following issues:

Security issues fixed:

- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).

This update also ships postgresql14 to SUSE Linux Enterprise 12 SP5. (jsc#SLE-22673)
On older service packs only libpq5 and libecpg6 are being replaced by the postgresql14 variants.

Feature changes in postgresql14:

- https://www.postgresql.org/about/news/postgresql-14-released-2318/
- https://www.postgresql.org/docs/14/release-14.html

		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-20"/>
	<updated date="2021-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656243" comment="libecpg6-14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656244" comment="libpq5-14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656229" comment="libpq5-32bit-14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656230" comment="postgresql-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656231" comment="postgresql-contrib-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656232" comment="postgresql-docs-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656233" comment="postgresql-plperl-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656234" comment="postgresql-plpython-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656235" comment="postgresql-pltcl-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656236" comment="postgresql-server-14-4.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149141" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009763.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656863" comment="postgresql96-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656864" comment="postgresql96-contrib-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656857" comment="postgresql96-docs-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656865" comment="postgresql96-plperl-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656866" comment="postgresql96-plpython-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656867" comment="postgresql96-pltcl-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656868" comment="postgresql96-server-9.6.24-6.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149142" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009764.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:
          
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656548" comment="postgresql10-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656549" comment="postgresql10-contrib-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656534" comment="postgresql10-docs-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656550" comment="postgresql10-plperl-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656551" comment="postgresql10-plpython-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656552" comment="postgresql10-pltcl-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656553" comment="postgresql10-server-10.19-4.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149143" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1191937" ref_url="https://bugzilla.suse.com/1191937" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42762" ref_url="https://www.suse.com/security/cve/CVE-2021-42762/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009769.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2021-42762: Updated seccomp rules with latest changes from flatpak (bsc#1191937).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-23"/>
	<updated date="2021-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191937">SUSE bug 1191937</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42762/">CVE-2021-42762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42762">CVE-2021-42762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657339" comment="libjavascriptcoregtk-4_0-18-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657340" comment="libwebkit2gtk-4_0-37-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657332" comment="libwebkit2gtk3-lang-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657341" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657342" comment="typelib-1_0-WebKit2-4_0-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657343" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657344" comment="webkit2gtk-4_0-injected-bundles-2.32.4-2.74.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149144" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1191901" ref_url="https://bugzilla.suse.com/1191901" source="BUGZILLA"/>
		<reference ref_id="1191903" ref_url="https://bugzilla.suse.com/1191903" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191906" ref_url="https://bugzilla.suse.com/1191906" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version OpenJDK 8u312 (October 2021 CPU):
  
- CVE-2021-35550: Fixed weak ciphers preferred over stronger ones for TLS (bsc#1191901).
- CVE-2021-35556: Fixed excessive memory allocation in RTFParser (bsc#1191910).
- CVE-2021-35559: Fixed excessive memory allocation in RTFReader (bsc#1191911).
- CVE-2021-35561: Fixed excessive memory allocation in HashMap and HashSet (bsc#1191912).
- CVE-2021-35564: Fixed certificates with end dates too far in the future can corrupt keystore (bsc#1191913).
- CVE-2021-35565: Fixed loop in HttpsServer triggered during TLS session close (bsc#1191909).
- CVE-2021-35567: Fixed incorrect principal selection when using Kerberos Constrained Delegation (bsc#1191903).
- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake (bsc#1191904).
- CVE-2021-35586: Fixed excessive memory allocation in BMPImageReader (bsc#1191914).
- CVE-2021-35588: Fixed incomplete validation of inner class references in ClassFileParser (bsc#1191905)
- CVE-2021-35603: Fixed non-constant comparison during TLS handshakes (bsc#1191906).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-23"/>
	<updated date="2021-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191903">SUSE bug 1191903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35550">CVE-2021-35550 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35567">CVE-2021-35567 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657044" comment="java-1_8_0-openjdk-1.8.0.312-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657045" comment="java-1_8_0-openjdk-demo-1.8.0.312-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657046" comment="java-1_8_0-openjdk-devel-1.8.0.312-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657047" comment="java-1_8_0-openjdk-headless-1.8.0.312-27.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149145" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1191901" ref_url="https://bugzilla.suse.com/1191901" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191906" ref_url="https://bugzilla.suse.com/1191906" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:


Update to OpenJDK 7u321 (October 2021 CPU):

- CVE-2021-35550: Fixed weak ciphers preferred over stronger ones for TLS (bsc#1191901).
- CVE-2021-35556: Fixed excessive memory allocation in RTFParser (bsc#1191910).
- CVE-2021-35559: Fixed excessive memory allocation in RTFReader (bsc#1191911).
- CVE-2021-35561: Fixed excessive memory allocation in HashMap and HashSet (bsc#1191912).
- CVE-2021-35564: Fixed certificates with end dates too far in the future can corrupt keystore (bsc#1191913).
- CVE-2021-35565: Fixed loop in HttpsServer triggered during TLS session close (bsc#1191909).
- CVE-2021-35586: Fixed excessive memory allocation in BMPImageReader (bsc#1191914).
- CVE-2021-35588: Fixed incomplete validation of inner class references in ClassFileParser (bsc#1191905)
- CVE-2021-35603: Fixed non-constant comparison during TLS handshakes (bsc#1191906).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35550">CVE-2021-35550 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656897" comment="java-1_7_0-openjdk-1.7.0.321-43.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656898" comment="java-1_7_0-openjdk-demo-1.7.0.321-43.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656899" comment="java-1_7_0-openjdk-devel-1.7.0.321-43.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656900" comment="java-1_7_0-openjdk-headless-1.7.0.321-43.53.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149146" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1177125" ref_url="https://bugzilla.suse.com/1177125" source="BUGZILLA"/>
		<reference ref_id="1188160" ref_url="https://bugzilla.suse.com/1188160" source="BUGZILLA"/>
		<reference ref_id="1188161" ref_url="https://bugzilla.suse.com/1188161" source="BUGZILLA"/>
		<reference ref_id="1190375" ref_url="https://bugzilla.suse.com/1190375" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25613" ref_url="https://www.suse.com/security/cve/CVE-2020-25613/" source="CVE"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009790.html" source="SUSE-SU"/>
		<description>
This update for ruby2.1 fixes the following issues:

- CVE-2020-25613: Fixed potential HTTP request smuggling in WEBrick (bsc#1177125).
- CVE-2021-31799: Fixed Command injection vulnerability in RDoc (bsc#1190375).
- CVE-2021-31810: Fixed trusting FTP PASV responses vulnerability in Net:FTP (bsc#1188161).
- CVE-2021-32066: Fixed StartTLS stripping vulnerability in Net:IMAP (bsc#1188160).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177125">SUSE bug 1177125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188160">SUSE bug 1188160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188161">SUSE bug 1188161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190375">SUSE bug 1190375</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25613/">CVE-2020-25613 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25613">CVE-2020-25613 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31799">CVE-2021-31799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31810">CVE-2021-31810 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32066">CVE-2021-32066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657553" comment="libruby2_1-2_1-2.1.9-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657554" comment="ruby2.1-2.1.9-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657555" comment="ruby2.1-stdlib-2.1.9-19.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149147" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1192554" ref_url="https://bugzilla.suse.com/1192554" source="BUGZILLA"/>
		<reference ref_id="1192557" ref_url="https://bugzilla.suse.com/1192557" source="BUGZILLA"/>
		<reference ref_id="1192559" ref_url="https://bugzilla.suse.com/1192559" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28704" ref_url="https://www.suse.com/security/cve/CVE-2021-28704/" source="CVE"/>
		<reference ref_id="CVE-2021-28705" ref_url="https://www.suse.com/security/cve/CVE-2021-28705/" source="CVE"/>
		<reference ref_id="CVE-2021-28706" ref_url="https://www.suse.com/security/cve/CVE-2021-28706/" source="CVE"/>
		<reference ref_id="CVE-2021-28707" ref_url="https://www.suse.com/security/cve/CVE-2021-28707/" source="CVE"/>
		<reference ref_id="CVE-2021-28708" ref_url="https://www.suse.com/security/cve/CVE-2021-28708/" source="CVE"/>
		<reference ref_id="CVE-2021-28709" ref_url="https://www.suse.com/security/cve/CVE-2021-28709/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009783.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-28704, CVE-2021-28707, CVE-2021-28708: Fixed PoD operations on misaligned GFNs (XSA-388) (bsc#1192557).
- CVE-2021-28705, CVE-2021-28709: Fixed issues with partially successful P2M updates on x86 (XSA-389) (bsc#1192559).
- CVE-2021-28706: Fixed guests may exceed their designated memory limit (XSA-385) (bsc#1192554).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192554">SUSE bug 1192554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192557">SUSE bug 1192557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192559">SUSE bug 1192559</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28704/">CVE-2021-28704 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28704">CVE-2021-28704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28705/">CVE-2021-28705 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28705">CVE-2021-28705 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28706/">CVE-2021-28706 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28706">CVE-2021-28706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28707/">CVE-2021-28707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28707">CVE-2021-28707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28708/">CVE-2021-28708 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28708">CVE-2021-28708 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28709/">CVE-2021-28709 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28709">CVE-2021-28709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658666" comment="xen-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658667" comment="xen-doc-html-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658668" comment="xen-libs-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658669" comment="xen-libs-32bit-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658670" comment="xen-tools-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658671" comment="xen-tools-domU-4.9.4_24-3.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149148" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1103032" ref_url="https://bugzilla.suse.com/1103032" source="BUGZILLA"/>
		<reference ref_id="1188284" ref_url="https://bugzilla.suse.com/1188284" source="BUGZILLA"/>
		<reference ref_id="1192346" ref_url="https://bugzilla.suse.com/1192346" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009804.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2018-14679: Fixed off-by-one issue in embedded libmspack that could lead to denial of service (bsc#1103032). 
  
- Update to 0.103.4 (bsc#1192346).
- Update to 0.103.3 (bsc#1188284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188284">SUSE bug 1188284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192346">SUSE bug 1192346</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14679">CVE-2018-14679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656968" comment="clamav-0.103.4-33.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149149" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1192063" ref_url="https://bugzilla.suse.com/1192063" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009802.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2021-30846: Fixed memory corruption issue that could lead to arbitrary code execution when processing maliciously crafted web content (bsc#1192063).
- CVE-2021-30851: Fixed memory corruption vulnerability that could lead to arbitrary code execution when processing maliciously crafted web content (bsc#1192063).   
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192063">SUSE bug 1192063</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30846">CVE-2021-30846 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30851">CVE-2021-30851 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658205" comment="libjavascriptcoregtk-4_0-18-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658206" comment="libwebkit2gtk-4_0-37-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658196" comment="libwebkit2gtk3-lang-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658207" comment="typelib-1_0-JavaScriptCore-4_0-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658208" comment="typelib-1_0-WebKit2-4_0-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658209" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658210" comment="webkit2gtk-4_0-injected-bundles-2.34.1-2.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149150" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1073928" ref_url="https://bugzilla.suse.com/1073928" source="BUGZILLA"/>
		<reference ref_id="1098425" ref_url="https://bugzilla.suse.com/1098425" source="BUGZILLA"/>
		<reference ref_id="1100416" ref_url="https://bugzilla.suse.com/1100416" source="BUGZILLA"/>
		<reference ref_id="1119934" ref_url="https://bugzilla.suse.com/1119934" source="BUGZILLA"/>
		<reference ref_id="1129735" ref_url="https://bugzilla.suse.com/1129735" source="BUGZILLA"/>
		<reference ref_id="1171217" ref_url="https://bugzilla.suse.com/1171217" source="BUGZILLA"/>
		<reference ref_id="1171420" ref_url="https://bugzilla.suse.com/1171420" source="BUGZILLA"/>
		<reference ref_id="1173346" ref_url="https://bugzilla.suse.com/1173346" source="BUGZILLA"/>
		<reference ref_id="1176724" ref_url="https://bugzilla.suse.com/1176724" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1181158" ref_url="https://bugzilla.suse.com/1181158" source="BUGZILLA"/>
		<reference ref_id="1181854" ref_url="https://bugzilla.suse.com/1181854" source="BUGZILLA"/>
		<reference ref_id="1181855" ref_url="https://bugzilla.suse.com/1181855" source="BUGZILLA"/>
		<reference ref_id="1183089" ref_url="https://bugzilla.suse.com/1183089" source="BUGZILLA"/>
		<reference ref_id="1184673" ref_url="https://bugzilla.suse.com/1184673" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185727" ref_url="https://bugzilla.suse.com/1185727" source="BUGZILLA"/>
		<reference ref_id="1185758" ref_url="https://bugzilla.suse.com/1185758" source="BUGZILLA"/>
		<reference ref_id="1185973" ref_url="https://bugzilla.suse.com/1185973" source="BUGZILLA"/>
		<reference ref_id="1186109" ref_url="https://bugzilla.suse.com/1186109" source="BUGZILLA"/>
		<reference ref_id="1186390" ref_url="https://bugzilla.suse.com/1186390" source="BUGZILLA"/>
		<reference ref_id="1188172" ref_url="https://bugzilla.suse.com/1188172" source="BUGZILLA"/>
		<reference ref_id="1188563" ref_url="https://bugzilla.suse.com/1188563" source="BUGZILLA"/>
		<reference ref_id="1188601" ref_url="https://bugzilla.suse.com/1188601" source="BUGZILLA"/>
		<reference ref_id="1188838" ref_url="https://bugzilla.suse.com/1188838" source="BUGZILLA"/>
		<reference ref_id="1188876" ref_url="https://bugzilla.suse.com/1188876" source="BUGZILLA"/>
		<reference ref_id="1188983" ref_url="https://bugzilla.suse.com/1188983" source="BUGZILLA"/>
		<reference ref_id="1188985" ref_url="https://bugzilla.suse.com/1188985" source="BUGZILLA"/>
		<reference ref_id="1189057" ref_url="https://bugzilla.suse.com/1189057" source="BUGZILLA"/>
		<reference ref_id="1189262" ref_url="https://bugzilla.suse.com/1189262" source="BUGZILLA"/>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189291" ref_url="https://bugzilla.suse.com/1189291" source="BUGZILLA"/>
		<reference ref_id="1189399" ref_url="https://bugzilla.suse.com/1189399" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="1189706" ref_url="https://bugzilla.suse.com/1189706" source="BUGZILLA"/>
		<reference ref_id="1190022" ref_url="https://bugzilla.suse.com/1190022" source="BUGZILLA"/>
		<reference ref_id="1190023" ref_url="https://bugzilla.suse.com/1190023" source="BUGZILLA"/>
		<reference ref_id="1190025" ref_url="https://bugzilla.suse.com/1190025" source="BUGZILLA"/>
		<reference ref_id="1190067" ref_url="https://bugzilla.suse.com/1190067" source="BUGZILLA"/>
		<reference ref_id="1190117" ref_url="https://bugzilla.suse.com/1190117" source="BUGZILLA"/>
		<reference ref_id="1190159" ref_url="https://bugzilla.suse.com/1190159" source="BUGZILLA"/>
		<reference ref_id="1190194" ref_url="https://bugzilla.suse.com/1190194" source="BUGZILLA"/>
		<reference ref_id="1190349" ref_url="https://bugzilla.suse.com/1190349" source="BUGZILLA"/>
		<reference ref_id="1190351" ref_url="https://bugzilla.suse.com/1190351" source="BUGZILLA"/>
		<reference ref_id="1190601" ref_url="https://bugzilla.suse.com/1190601" source="BUGZILLA"/>
		<reference ref_id="1190717" ref_url="https://bugzilla.suse.com/1190717" source="BUGZILLA"/>
		<reference ref_id="1191193" ref_url="https://bugzilla.suse.com/1191193" source="BUGZILLA"/>
		<reference ref_id="1191315" ref_url="https://bugzilla.suse.com/1191315" source="BUGZILLA"/>
		<reference ref_id="1191790" ref_url="https://bugzilla.suse.com/1191790" source="BUGZILLA"/>
		<reference ref_id="1191801" ref_url="https://bugzilla.suse.com/1191801" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1191961" ref_url="https://bugzilla.suse.com/1191961" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192400" ref_url="https://bugzilla.suse.com/1192400" source="BUGZILLA"/>
		<reference ref_id="1192775" ref_url="https://bugzilla.suse.com/1192775" source="BUGZILLA"/>
		<reference ref_id="1192781" ref_url="https://bugzilla.suse.com/1192781" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17862" ref_url="https://www.suse.com/security/cve/CVE-2017-17862/" source="CVE"/>
		<reference ref_id="CVE-2017-17864" ref_url="https://www.suse.com/security/cve/CVE-2017-17864/" source="CVE"/>
		<reference ref_id="CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405/" source="CVE"/>
		<reference ref_id="CVE-2018-16882" ref_url="https://www.suse.com/security/cve/CVE-2018-16882/" source="CVE"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-12655" ref_url="https://www.suse.com/security/cve/CVE-2020-12655/" source="CVE"/>
		<reference ref_id="CVE-2020-14305" ref_url="https://www.suse.com/security/cve/CVE-2020-14305/" source="CVE"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<reference ref_id="CVE-2021-20265" ref_url="https://www.suse.com/security/cve/CVE-2021-20265/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="CVE-2021-31916" ref_url="https://www.suse.com/security/cve/CVE-2021-31916/" source="CVE"/>
		<reference ref_id="CVE-2021-33033" ref_url="https://www.suse.com/security/cve/CVE-2021-33033/" source="CVE"/>
		<reference ref_id="CVE-2021-34556" ref_url="https://www.suse.com/security/cve/CVE-2021-34556/" source="CVE"/>
		<reference ref_id="CVE-2021-34981" ref_url="https://www.suse.com/security/cve/CVE-2021-34981/" source="CVE"/>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<reference ref_id="CVE-2021-35477" ref_url="https://www.suse.com/security/cve/CVE-2021-35477/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655/" source="CVE"/>
		<reference ref_id="CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159/" source="CVE"/>
		<reference ref_id="CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="CVE-2021-3760" ref_url="https://www.suse.com/security/cve/CVE-2021-3760/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="CVE-2021-38204" ref_url="https://www.suse.com/security/cve/CVE-2021-38204/" source="CVE"/>
		<reference ref_id="CVE-2021-3896" ref_url="https://www.suse.com/security/cve/CVE-2021-3896/" source="CVE"/>
		<reference ref_id="CVE-2021-40490" ref_url="https://www.suse.com/security/cve/CVE-2021-40490/" source="CVE"/>
		<reference ref_id="CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)

  You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails  (bsc#1191961).
- CVE-2020-12655: An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767 (bnc#1171217).
- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).
- CVE-2021-34556: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack (bnc#1188983).
- CVE-2021-35477: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation did not necessarily occur before a store operation that has an attacker-controlled value (bnc#1188985).
- CVE-2017-17862: kernel/bpf/verifier.c in the Linux kernel ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service (bnc#1073928).
- CVE-2017-17864: kernel/bpf/verifier.c in the Linux kernel mishandled states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allowed local users to obtain potentially sensitive address information, aka a 'pointer leak (bnc#1073928).
- CVE-2021-20265: A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allowed an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability (bnc#1183089).
- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
- CVE-2021-3655: Missing size validations on inbound SCTP packets may have allowed the kernel to read uninitialized memory (bnc#1188563).
- CVE-2018-13405: The inode_init_owner function in fs/inode.c in the Linux kernel allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416 bnc#1129735).
- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-&gt;rf_conn_info object (bsc#1190067).
- CVE-2021-42739: The firewire subsystem in the Linux kernel has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bnc#1184673).
- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).
- CVE-2021-33033: The Linux kernel has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value (bnc#1186109 bnc#1186390 bnc#1188876).
- CVE-2020-14305: An out-of-bounds memory write flaw was found in how the Linux kernel&amp;#8217;s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allowed an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability (bnc#1173346).
- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).
- CVE-2021-3896: Fixed a array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (bsc#1191958).
- CVE-2021-42008: The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access (bnc#1191315).
- CVE-2020-3702: Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic (bnc#1191193).
- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel's bluetooth module. (bsc#1190023)
- CVE-2021-40490: A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel (bnc#1190159 bnc#1192775)
- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)
- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).
- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).
- CVE-2021-3653: A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the 'int_ctl' field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7 (bnc#1189399 bnc#1189420).
- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262 bnc#1189278).
- CVE-2021-38204: drivers/usb/host/max3421-hcd.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).
- CVE-2021-3679: A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).
- CVE-2018-16882: A use-after-free issue was found in the way the Linux kernel's KVM hypervisor processed posted interrupts when nested(=1) virtualization is enabled. In nested_get_vmcs12_pages(), in case of an error while processing posted interrupt address, it unmaps the 'pi_desc_page' without resetting 'pi_desc' descriptor address, which is later used in pi_test_and_clear_on(). A guest user/process could use this flaw to crash the host kernel resulting in DoS or potentially gain privileged access to a system. Kernel versions and are vulnerable (bnc#1119934).
- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1176724).
- CVE-2020-4788: IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296 (bnc#1177666 bnc#1181158).
- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).
- CVE-2021-37576: arch/powerpc/kvm/book3s_rtas.c in the Linux kernel on the powerpc platform allowed KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e (bnc#1188838).

The following non-security bugs were fixed:

- PCI: hv: Use expected affinity when unmasking IRQ (bsc#1185973).
- SUNRPC: improve error response to over-size gss credential (bsc#1190022).
- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
- blacklist.conf: Drop a line that was added by mistake
- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22918)
- bpf: Disallow unprivileged bpf by default (jsc#SLE-22918).
- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).
- config: disable unprivileged BPF by default (jsc#SLE-22918)
- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758,bsc#1192400).
- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).
- hv: mana: adjust mana_select_queue to old API (jsc#SLE-18779, bsc#1185727).
- hv: mana: declare vzalloc (jsc#SLE-18779, bsc#1185726).
- hv: mana: fake bitmap API (jsc#SLE-18779, bsc#1185726).
- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185727).
- kABI: protect struct bpf_map (kabi).
- mm: replace open coded page to virt conversion with page_to_virt() (jsc#SLE-18779, bsc#1185727).
- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854 bsc#1181855).
- net/mlx4_en: Handle TX error CQE (bsc#1181854 bsc#1181855).
- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185727).
- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185727).
- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185727).
- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185727).
- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191801).
- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185727).
- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185727).
- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185727).
- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185727).
- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (bsc#1190601).
- s390/bpf: Fix branch shortening during codegen pass (bsc#1190601).
- s390/bpf: Fix optimizing out zero-extensions (bsc#1190601).
- s390/bpf: Wrap JIT macro parameter usages in parentheses (bsc#1190601).
- s390: bpf: implement jitting of BPF_ALU | BPF_ARSH | BPF_* (bsc#1190601).
- scsi: sg: add sg_remove_request in sg_write (bsc#1171420 CVE2020-12770).
- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).
- sctp: fully initialize v4 addr in some functions (bsc#1188563).
- sctp: simplify addr copy (bsc#1188563).
- x86/CPU: Add more Icelake model numbers (bsc#1185758,bsc#1192400).
- x86/tlb: Flush global mappings when KAISER is disabled (bsc#1190194).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073928">SUSE bug 1073928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098425">SUSE bug 1098425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100416">SUSE bug 1100416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119934">SUSE bug 1119934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129735">SUSE bug 1129735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171217">SUSE bug 1171217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171420">SUSE bug 1171420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173346">SUSE bug 1173346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176724">SUSE bug 1176724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181854">SUSE bug 1181854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181855">SUSE bug 1181855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183089">SUSE bug 1183089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185727">SUSE bug 1185727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185758">SUSE bug 1185758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185973">SUSE bug 1185973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186109">SUSE bug 1186109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186390">SUSE bug 1186390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188838">SUSE bug 1188838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188983">SUSE bug 1188983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188985">SUSE bug 1188985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189291">SUSE bug 1189291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189706">SUSE bug 1189706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190022">SUSE bug 1190022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190023">SUSE bug 1190023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190067">SUSE bug 1190067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190159">SUSE bug 1190159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190194">SUSE bug 1190194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190349">SUSE bug 1190349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190601">SUSE bug 1190601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190717">SUSE bug 1190717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191193">SUSE bug 1191193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191801">SUSE bug 1191801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191961">SUSE bug 1191961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192400">SUSE bug 1192400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192775">SUSE bug 1192775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192781">SUSE bug 1192781</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17862/">CVE-2017-17862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17862">CVE-2017-17862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17864/">CVE-2017-17864 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17864">CVE-2017-17864 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13405">CVE-2018-13405 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16882/">CVE-2018-16882 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16882">CVE-2018-16882 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12655/">CVE-2020-12655 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12655">CVE-2020-12655 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14305/">CVE-2020-14305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14305">CVE-2020-14305 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3702">CVE-2020-3702 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4788">CVE-2020-4788 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20265/">CVE-2021-20265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20265">CVE-2021-20265 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20322">CVE-2021-20322 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31916/">CVE-2021-31916 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31916">CVE-2021-31916 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33033/">CVE-2021-33033 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33033">CVE-2021-33033 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34556/">CVE-2021-34556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34556">CVE-2021-34556 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34981/">CVE-2021-34981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-34981">CVE-2021-34981 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3542">CVE-2021-3542 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35477/">CVE-2021-35477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35477">CVE-2021-35477 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3655">CVE-2021-3655 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3659">CVE-2021-3659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3679">CVE-2021-3679 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3715">CVE-2021-3715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37159">CVE-2021-37159 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3732">CVE-2021-3732 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3752">CVE-2021-3752 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3753">CVE-2021-3753 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3760/">CVE-2021-3760 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3760">CVE-2021-3760 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3772">CVE-2021-3772 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160">CVE-2021-38160 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38204/">CVE-2021-38204 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38204">CVE-2021-38204 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3896/">CVE-2021-3896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3896">CVE-2021-3896 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40490/">CVE-2021-40490 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40490">CVE-2021-40490 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42008">CVE-2021-42008 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43389">CVE-2021-43389 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657875" comment="kernel-default-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657876" comment="kernel-default-base-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657877" comment="kernel-default-devel-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659139" comment="kernel-default-kgraft-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657858" comment="kernel-devel-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657859" comment="kernel-macros-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657860" comment="kernel-source-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657878" comment="kernel-syms-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659141" comment="kgraft-patch-4_4_180-94_150-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149151" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1193170" ref_url="https://bugzilla.suse.com/1193170" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009847.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Update to version 3.68.1:

- CVE-2021-43527: Fixed a Heap overflow in NSS when verifying DER-encoded DSA or RSA-PSS signatures (bsc#1193170).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659103" comment="libfreebl3-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659086" comment="libfreebl3-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659104" comment="libfreebl3-hmac-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659088" comment="libfreebl3-hmac-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659105" comment="libsoftokn3-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659090" comment="libsoftokn3-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659106" comment="libsoftokn3-hmac-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659092" comment="libsoftokn3-hmac-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659107" comment="mozilla-nss-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659094" comment="mozilla-nss-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659108" comment="mozilla-nss-certs-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659096" comment="mozilla-nss-certs-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659191" comment="mozilla-nss-devel-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659109" comment="mozilla-nss-sysinit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659099" comment="mozilla-nss-sysinit-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659110" comment="mozilla-nss-tools-3.68.1-58.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149152" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1190975" ref_url="https://bugzilla.suse.com/1190975" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009848.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:
  
- CVE-2021-41617: Fixed privilege escalation when AuthorizedKeysCommand/AuthorizedPrincipalsCommand are configured (bsc#1190975).  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190975">SUSE bug 1190975</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41617">CVE-2021-41617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658348" comment="openssh-7.2p2-74.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658349" comment="openssh-askpass-gnome-7.2p2-74.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658350" comment="openssh-fips-7.2p2-74.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658351" comment="openssh-helpers-7.2p2-74.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149153" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1193321" ref_url="https://bugzilla.suse.com/1193321" source="BUGZILLA"/>
		<reference ref_id="1193485" ref_url="https://bugzilla.suse.com/1193485" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:
                                                                                                                    
Update to Extended Support Release 91.4.0 (bsc#1193485):                                                            
                                                                                                                    
- CVE-2021-43536: URL leakage when navigating while executing asynchronous function
- CVE-2021-43537: Heap buffer overflow when using structured clone                         
- CVE-2021-43538: Missing fullscreen and pointer lock notification when requesting both
- CVE-2021-43539: GC rooting failure when calling wasm instance methods 
- CVE-2021-43541: External protocol handler parameters were unescaped                                                  
- CVE-2021-43542: XMLHttpRequest error codes could have leaked the existence of an external protocol handler           
- CVE-2021-43543: Bypass of CSP sandbox directive when embedding                                                       
- CVE-2021-43545: Denial of Service when using the Location API in a loop                                              
- CVE-2021-43546: Cursor spoofing could overlay user interface when native cursor is zoomed                         
- Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4                                                       
- Removed x-scheme-handler/ftp from MozillaFirefox.desktop (bsc#1193321)                                            
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-12"/>
	<updated date="2021-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193321">SUSE bug 1193321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43536">CVE-2021-43536 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43537">CVE-2021-43537 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43538">CVE-2021-43538 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43539">CVE-2021-43539 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43541">CVE-2021-43541 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43542">CVE-2021-43542 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43543">CVE-2021-43543 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43545">CVE-2021-43545 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43546">CVE-2021-43546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659444" comment="MozillaFirefox-91.4.0-112.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659445" comment="MozillaFirefox-devel-91.4.0-112.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659446" comment="MozillaFirefox-translations-common-91.4.0-112.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149154" version="1" class="patch">
	<metadata>
		<title>Security update for glib-networking (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1172460" ref_url="https://bugzilla.suse.com/1172460" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13645" ref_url="https://www.suse.com/security/cve/CVE-2020-13645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009886.html" source="SUSE-SU"/>
		<description>
This update for glib-networking fixes the following issues:

- CVE-2020-13645: Fixed a connection failure when the server identity is unset (bsc#1172460).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-13"/>
	<updated date="2021-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172460">SUSE bug 1172460</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13645/">CVE-2020-13645 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13645">CVE-2020-13645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659102" comment="glib-networking-2.48.2-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659084" comment="glib-networking-lang-2.48.2-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149155" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1193030" ref_url="https://bugzilla.suse.com/1193030" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009903.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:
 
- CVE-2021-4008: Fixed Privilege Escalation Vulnerability via Out-Of-Bounds Access in SProcRenderCompositeGlyphs (bsc#1193030).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193030">SUSE bug 1193030</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4008">CVE-2021-4008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659889" comment="xorg-x11-server-7.6_1.18.3-76.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659890" comment="xorg-x11-server-extra-7.6_1.18.3-76.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149156" version="1" class="patch">
	<metadata>
		<title>Security update for storm (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1193611" ref_url="https://bugzilla.suse.com/1193611" source="BUGZILLA"/>
		<reference ref_id="1193641" ref_url="https://bugzilla.suse.com/1193641" source="BUGZILLA"/>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="CVE-2021-44228" ref_url="https://www.suse.com/security/cve/CVE-2021-44228/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009911.html" source="SUSE-SU"/>
		<description>
This update for storm fixes the following issues:

- Remove JndiLookup from log4j 2.x jars during build to prevent 'log4shell' code injection. (bsc#1193641, bsc#1193611, CVE-2021-44228)
- Remove JMSAppender from log4j 1.2.x jars during build to prevent attacks when JMS is enabled (bsc#1193641, bsc#1193662, CVE-2021-4104)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-15"/>
	<updated date="2021-12-15"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1193611">SUSE bug 1193611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193641">SUSE bug 1193641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">CVE-2021-4104 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44228/">CVE-2021-44228 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228">CVE-2021-44228 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659918" comment="storm-1.2.3-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659919" comment="storm-nimbus-1.2.3-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659920" comment="storm-supervisor-1.2.3-3.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149157" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009918.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issue:

- CVE-2021-4104: Disable the JMSAppender class from log4j to protect against
  the log4jshell vulnerability. [bsc#1193662]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-17"/>
	<updated date="2021-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">CVE-2021-4104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660148" comment="log4j-1.2.15-126.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149158" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1190487" ref_url="https://bugzilla.suse.com/1190487" source="BUGZILLA"/>
		<reference ref_id="1190489" ref_url="https://bugzilla.suse.com/1190489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009/" source="CVE"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009920.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4009: The handler for the CreatePointerBarrier request of the XFixes 
  extension does not properly validate the request length leading to out of 
  bounds memory write. (bsc#1190487)
- CVE-2021-4011: The handlers for the RecordCreateContext and RecordRegisterClients
  requests of the Record extension do not properly validate the request
  length leading to out of bounds memory write. (bsc#1190489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-20"/>
	<updated date="2021-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190487">SUSE bug 1190487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4009">CVE-2021-4009 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4011">CVE-2021-4011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660798" comment="xorg-x11-server-7.6_1.18.3-76.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660799" comment="xorg-x11-server-extra-7.6_1.18.3-76.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149159" version="1" class="patch">
	<metadata>
		<title>Recommended update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1192849" ref_url="https://bugzilla.suse.com/1192849" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<reference ref_id="SUSE-RU-2021:4126-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021140.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

The username map advice from the CVE-2020-25717 advisory
note has undesired side effects for the local nt token. Fallback
to a SID/UID based mapping if the name based lookup fails (bsc#1192849).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-20"/>
	<updated date="2021-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192849">SUSE bug 1192849</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25717">CVE-2020-25717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660811" comment="libdcerpc-binding0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660812" comment="libdcerpc-binding0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660813" comment="libdcerpc0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660814" comment="libdcerpc0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660815" comment="libndr-krb5pac0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660816" comment="libndr-krb5pac0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660817" comment="libndr-nbt0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660818" comment="libndr-nbt0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660819" comment="libndr-standard0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660820" comment="libndr-standard0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660821" comment="libndr0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660822" comment="libndr0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660823" comment="libnetapi0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660824" comment="libnetapi0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660825" comment="libsamba-credentials0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660826" comment="libsamba-credentials0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660827" comment="libsamba-errors0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660828" comment="libsamba-errors0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660829" comment="libsamba-hostconfig0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660830" comment="libsamba-hostconfig0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660831" comment="libsamba-passdb0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660832" comment="libsamba-passdb0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660833" comment="libsamba-util0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660834" comment="libsamba-util0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660835" comment="libsamdb0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660836" comment="libsamdb0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660837" comment="libsmbclient0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660838" comment="libsmbclient0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660839" comment="libsmbconf0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660840" comment="libsmbconf0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660841" comment="libsmbldap0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660842" comment="libsmbldap0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660843" comment="libtevent-util0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660844" comment="libtevent-util0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660845" comment="libwbclient0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660846" comment="libwbclient0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660847" comment="samba-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660848" comment="samba-client-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660849" comment="samba-client-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660850" comment="samba-doc-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660851" comment="samba-libs-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660852" comment="samba-libs-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660853" comment="samba-winbind-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660854" comment="samba-winbind-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149160" version="1" class="patch">
	<metadata>
		<title>Security update for chrony (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1063704" ref_url="https://bugzilla.suse.com/1063704" source="BUGZILLA"/>
		<reference ref_id="1069468" ref_url="https://bugzilla.suse.com/1069468" source="BUGZILLA"/>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1083597" ref_url="https://bugzilla.suse.com/1083597" source="BUGZILLA"/>
		<reference ref_id="1099272" ref_url="https://bugzilla.suse.com/1099272" source="BUGZILLA"/>
		<reference ref_id="1115529" ref_url="https://bugzilla.suse.com/1115529" source="BUGZILLA"/>
		<reference ref_id="1128846" ref_url="https://bugzilla.suse.com/1128846" source="BUGZILLA"/>
		<reference ref_id="1156884" ref_url="https://bugzilla.suse.com/1156884" source="BUGZILLA"/>
		<reference ref_id="1159840" ref_url="https://bugzilla.suse.com/1159840" source="BUGZILLA"/>
		<reference ref_id="1161119" ref_url="https://bugzilla.suse.com/1161119" source="BUGZILLA"/>
		<reference ref_id="1162964" ref_url="https://bugzilla.suse.com/1162964" source="BUGZILLA"/>
		<reference ref_id="1171806" ref_url="https://bugzilla.suse.com/1171806" source="BUGZILLA"/>
		<reference ref_id="1172113" ref_url="https://bugzilla.suse.com/1172113" source="BUGZILLA"/>
		<reference ref_id="1173277" ref_url="https://bugzilla.suse.com/1173277" source="BUGZILLA"/>
		<reference ref_id="1173760" ref_url="https://bugzilla.suse.com/1173760" source="BUGZILLA"/>
		<reference ref_id="1174075" ref_url="https://bugzilla.suse.com/1174075" source="BUGZILLA"/>
		<reference ref_id="1174911" ref_url="https://bugzilla.suse.com/1174911" source="BUGZILLA"/>
		<reference ref_id="1180689" ref_url="https://bugzilla.suse.com/1180689" source="BUGZILLA"/>
		<reference ref_id="1181826" ref_url="https://bugzilla.suse.com/1181826" source="BUGZILLA"/>
		<reference ref_id="1183783" ref_url="https://bugzilla.suse.com/1183783" source="BUGZILLA"/>
		<reference ref_id="1184400" ref_url="https://bugzilla.suse.com/1184400" source="BUGZILLA"/>
		<reference ref_id="1187906" ref_url="https://bugzilla.suse.com/1187906" source="BUGZILLA"/>
		<reference ref_id="1190926" ref_url="https://bugzilla.suse.com/1190926" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14367" ref_url="https://www.suse.com/security/cve/CVE-2020-14367/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009931.html" source="SUSE-SU"/>
		<description>
This update for chrony fixes the following issues:

Chrony was updated to 4.1:

* Add support for NTS servers specified by IP address (matching
  Subject Alternative Name in server certificate)
* Add source-specific configuration of trusted certificates
* Allow multiple files and directories with trusted certificates
* Allow multiple pairs of server keys and certificates
* Add copy option to server/pool directive
* Increase PPS lock limit to 40% of pulse interval
* Perform source selection immediately after loading dump files
* Reload dump files for addresses negotiated by NTS-KE server
* Update seccomp filter and add less restrictive level
* Restart ongoing name resolution on online command
* Fix dump files to not include uncorrected offset
* Fix initstepslew to accept time from own NTP clients
* Reset NTP address and port when no longer negotiated by NTS-KE
  server
- Update clknetsim to snapshot f89702d.

- Ensure the correct pool packages are installed for openSUSE and SLE (bsc#1180689).

- Enable syscallfilter unconditionally (bsc#1181826).

Chrony was updated to 4.0:

Enhancements

- Add support for Network Time Security (NTS) authentication
- Add support for AES-CMAC keys (AES128, AES256) with Nettle
- Add authselectmode directive to control selection of
  unauthenticated sources
- Add binddevice, bindacqdevice, bindcmddevice directives
- Add confdir directive to better support fragmented
  configuration
- Add sourcedir directive and 'reload sources' command to
  support dynamic NTP sources specified in files
- Add clockprecision directive
- Add dscp directive to set Differentiated Services Code Point
  (DSCP)
- Add -L option to limit log messages by severity
- Add -p option to print whole configuration with included
  files
- Add -U option to allow start under non-root user
- Allow maxsamples to be set to 1 for faster update with -q/-Q
  option
- Avoid replacing NTP sources with sources that have
  unreachable address
- Improve pools to repeat name resolution to get 'maxsources'
  sources
- Improve source selection with trusted sources
- Improve NTP loop test to prevent synchronisation to itself
- Repeat iburst when NTP source is switched from offline state
  to online
- Update clock synchronisation status and leap status more
  frequently
- Update seccomp filter
- Add 'add pool' command
- Add 'reset sources' command to drop all measurements
- Add authdata command to print details about NTP
  authentication
- Add selectdata command to print details about source
  selection
- Add -N option and sourcename command to print original names
  of sources
- Add -a option to some commands to print also unresolved
  sources
- Add -k, -p, -r options to clients command to select, limit,
  reset data
- Bug fixes
- Don’t set interface for NTP responses to allow asymmetric
  routing
- Handle RTCs that don’t support interrupts
- Respond to command requests with correct address on
  multihomed hosts
- Removed features
- Drop support for RIPEMD keys (RMD128, RMD160, RMD256, RMD320)
- Drop support for long (non-standard) MACs in NTPv4 packets
  (chrony 2.x clients using non-MD5/SHA1 keys need to use
  option 'version 3')

- By default we don't write log files but log to journald, so
  only recommend logrotate.

- Adjust and rename the sysconfig file, so that it matches the
  expectations of chronyd.service (bsc#1173277).

Chrony was updated to 3.5.1:

* Create new file when writing pidfile (CVE-2020-14367, bsc#1174911)

- Add chrony-pool-suse and chrony-pool-openSUSE subpackages that
  preconfigure chrony to use NTP servers from the  respective
  pools for SUSE and openSUSE (bsc#1156884, SLE-11424).
- Add chrony-pool-empty to still allow installing chrony without
  preconfigured servers.
- Use iburst in the default pool statements to speed up initial
  synchronisation (bsc#1172113).

- Update clknetsim to version 79ffe44 (fixes bsc#1162964).

Update to 3.5:

+ Add support for more accurate reading of PHC on Linux 5.0
+ Add support for hardware timestamping on interfaces with read-only timestamping configuration
+ Add support for memory locking and real-time priority on FreeBSD, NetBSD, Solaris
+ Update seccomp filter to work on more architectures
+ Validate refclock driver options
+ Fix bindaddress directive on FreeBSD
+ Fix transposition of hardware RX timestamp on Linux 4.13 and later
+ Fix building on non-glibc systems

- Fix location of helper script in chrony-dnssrv@.service (bsc#1128846).

- Read runtime servers from /var/run/netconfig/chrony.servers (bsc#1099272)
- Move chrony-helper to /usr/lib/chrony/helper, because there should be no executables in /usr/share.
- Remove discrepancies between spec file and chrony-tmpfiles (bsc#1115529) 

Update to version 3.4

* Enhancements

  + Add filter option to server/pool/peer directive
  + Add minsamples and maxsamples options to hwtimestamp directive
  + Add support for faster frequency adjustments in Linux 4.19
  + Change default pidfile to /var/run/chrony/chronyd.pid to allow chronyd 
    without root privileges to remove it on exit
  + Disable sub-second polling intervals for distant NTP sources
  + Extend range of supported sub-second polling intervals
  + Get/set IPv4 destination/source address of NTP packets on FreeBSD
  + Make burst options and command useful with short polling intervals
  + Modify auto_offline option to activate when sending request failed
  + Respond from interface that received NTP request if possible
  + Add onoffline command to switch between online and offline state 
    according to current system network configuration
  + Improve example NetworkManager dispatcher script

* Bug fixes

  + Avoid waiting in Linux getrandom system call
  + Fix PPS support on FreeBSD and NetBSD

Update to version 3.3

* Enhancements:

  + Add burst option to server/pool directive
  + Add stratum and tai options to refclock directive
  + Add support for Nettle crypto library
  + Add workaround for missing kernel receive timestamps on Linux
  + Wait for late hardware transmit timestamps
  + Improve source selection with unreachable sources
  + Improve protection against replay attacks on symmetric mode
  + Allow PHC refclock to use socket in /var/run/chrony
  + Add shutdown command to stop chronyd
  + Simplify format of response to manual list command
  + Improve handling of unknown responses in chronyc

* Bug fixes:

  + Respond to NTPv1 client requests with zero mode
  + Fix -x option to not require CAP_SYS_TIME under non-root user
  + Fix acquisitionport directive to work with privilege separation
  + Fix handling of socket errors on Linux to avoid high CPU usage
  + Fix chronyc to not get stuck in infinite loop after clock step

- Added /etc/chrony.d/ directory to the package (bsc#1083597) Modifed default chrony.conf to add 'include /etc/chrony.d/*'

- Enable pps support

Upgraded to version 3.2:

Enhancements

* Improve stability with NTP sources and reference clocks
* Improve stability with hardware timestamping
* Improve support for NTP interleaved modes
* Control frequency of system clock on macOS 10.13 and later
* Set TAI-UTC offset of system clock with leapsectz directive
* Minimise data in client requests to improve privacy
* Allow transmit-only hardware timestamping
* Add support for new timestamping options introduced in Linux 4.13
* Add root delay, root dispersion and maximum error to tracking log
* Add mindelay and asymmetry options to server/peer/pool directive
* Add extpps option to PHC refclock to timestamp external PPS signal
* Add pps option to refclock directive to treat any refclock as PPS
* Add width option to refclock directive to filter wrong pulse edges
* Add rxfilter option to hwtimestamp directive
* Add -x option to disable control of system clock
* Add -l option to log to specified file instead of syslog
* Allow multiple command-line options to be specified together
* Allow starting without root privileges with -Q option
* Update seccomp filter for new glibc versions
* Dump history on exit by default with dumpdir directive
* Use hardening compiler options by default

Bug fixes

* Don't drop PHC samples with low-resolution system clock
* Ignore outliers in PHC tracking, RTC tracking, manual input
* Increase polling interval when peer is not responding
* Exit with error message when include directive fails
* Don't allow slash after hostname in allow/deny directive/command
* Try to connect to all addresses in chronyc before giving up

Upgraded to version 3.1:

- Enhancements

  - Add support for precise cross timestamping of PHC on Linux
  - Add minpoll, precision, nocrossts options to hwtimestamp directive
  - Add rawmeasurements option to log directive and modify measurements
    option to log only valid measurements from synchronised sources
  - Allow sub-second polling interval with NTP sources

- Bug fixes

  - Fix time smoothing in interleaved mode

Upgraded to version 3.0:

- Enhancements

  - Add support for software and hardware timestamping on Linux
  - Add support for client/server and symmetric interleaved modes
  - Add support for MS-SNTP authentication in Samba
  - Add support for truncated MACs in NTPv4 packets
  - Estimate and correct for asymmetric network jitter
  - Increase default minsamples and polltarget to improve stability with very low jitter
  - Add maxjitter directive to limit source selection by jitter
  - Add offset option to server/pool/peer directive
  - Add maxlockage option to refclock directive
  - Add -t option to chronyd to exit after specified time
  - Add partial protection against replay attacks on symmetric mode
  - Don't reset polling interval when switching sources to online state
  - Allow rate limiting with very short intervals
  - Improve maximum server throughput on Linux and NetBSD
  - Remove dump files after start
  - Add tab-completion to chronyc with libedit/readline
  - Add ntpdata command to print details about NTP measurements
  - Allow all source options to be set in add server/peer command
  - Indicate truncated addresses/hostnames in chronyc output
  - Print reference IDs as hexadecimal numbers to avoid confusion with IPv4 addresses

- Bug fixes

  - Fix crash with disabled asynchronous name resolving

Upgraded to version 2.4.1:

- Bug fixes

  - Fix processing of kernel timestamps on non-Linux systems
  - Fix crash with smoothtime directive
  - Fix validation of refclock sample times
  - Fix parsing of refclock directive

update to 2.4:

- Enhancements

  - Add orphan option to local directive for orphan mode
    compatible with ntpd
  - Add distance option to local directive to set activation
    threshold (1 second by default)
  - Add maxdrift directive to set maximum allowed drift of system
    clock
  - Try to replace NTP sources exceeding maximum distance
  - Randomise source replacement to avoid getting stuck with bad
    sources
  - Randomise selection of sources from pools on start
  - Ignore reference timestamp as ntpd doesn't always set it
    correctly
  - Modify tracking report to use same values as seen by NTP
    clients
  - Add -c option to chronyc to write reports in CSV format
  - Provide detailed manual pages

- Bug fixes

  - Fix SOCK refclock to work correctly when not specified as
    last refclock
  - Fix initstepslew and -q/-Q options to accept time from own
    NTP clients
  - Fix authentication with keys using 512-bit hash functions
  - Fix crash on exit when multiple signals are received
  - Fix conversion of very small floating-point numbers in
    command packets
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1063704">SUSE bug 1063704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069468">SUSE bug 1069468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083597">SUSE bug 1083597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099272">SUSE bug 1099272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115529">SUSE bug 1115529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128846">SUSE bug 1128846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156884">SUSE bug 1156884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159840">SUSE bug 1159840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161119">SUSE bug 1161119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162964">SUSE bug 1162964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171806">SUSE bug 1171806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172113">SUSE bug 1172113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173277">SUSE bug 1173277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173760">SUSE bug 1173760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174075">SUSE bug 1174075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174911">SUSE bug 1174911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180689">SUSE bug 1180689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181826">SUSE bug 1181826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183783">SUSE bug 1183783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184400">SUSE bug 1184400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187906">SUSE bug 1187906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190926">SUSE bug 1190926</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14367/">CVE-2020-14367 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14367">CVE-2020-14367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659981" comment="chrony-4.1-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149161" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1176460" ref_url="https://bugzilla.suse.com/1176460" source="BUGZILLA"/>
		<reference ref_id="1187725" ref_url="https://bugzilla.suse.com/1187725" source="BUGZILLA"/>
		<reference ref_id="1188061" ref_url="https://bugzilla.suse.com/1188061" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3583" ref_url="https://www.suse.com/security/cve/CVE-2021-3583/" source="CVE"/>
		<reference ref_id="CVE-2021-3620" ref_url="https://www.suse.com/security/cve/CVE-2021-3620/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009930.html" source="SUSE-SU"/>
		<description>
This update for ansible fixes the following issues:

Update to 2.9.27:

- CVE-2021-3620: ansible-connection module discloses sensitive info in traceback error message (bsc#1187725).
- CVE-2021-3583: Template Injection through yaml multi-line strings with ansible facts used in template (bsc#1188061).
- ansible module nmcli is broken in ansible 2.9.13 (bsc#1176460)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176460">SUSE bug 1176460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187725">SUSE bug 1187725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188061">SUSE bug 1188061</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3583/">CVE-2021-3583 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3583">CVE-2021-3583 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3620/">CVE-2021-3620 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3620">CVE-2021-3620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659371" comment="ansible-2.9.27-3.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149162" version="1" class="patch">
	<metadata>
		<title>Security update for logstash (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009943.html" source="SUSE-SU"/>
		<description>
This update for logstash fixes the following issues:

Fixed vulnerability related to log4j version 1.2.x

- CVE-2021-4104: Fixed remote code execution through the JMS API via the ldap JNDI parser (bsc#1193662)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-24"/>
	<updated date="2021-12-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">CVE-2021-4104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660953" comment="elasticsearch-2.4.2-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660954" comment="kafka-0.10.2.2-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660215" comment="logstash-2.4.1-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660955" comment="openstack-monasca-agent-2.2.6~dev4-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660956" comment="openstack-monasca-persister-java-1.7.1~a0~dev2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660957" comment="openstack-monasca-thresh-2.1.1-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660958" comment="python-monasca-agent-2.2.6~dev4-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660981" comment="zookeeper-server-3.4.10-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149163" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008310.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- buffer overflow in PyCArg_repr in _ctypes/callproc.c,
  which may lead to remote code execution (bsc#1181126, CVE-2021-3177).
- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-11"/>
	<updated date="2021-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531872" comment="libpython2_7-1_0-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531873" comment="libpython2_7-1_0-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531874" comment="python-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531875" comment="python-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531876" comment="python-base-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531877" comment="python-base-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531878" comment="python-curses-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531879" comment="python-demo-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531880" comment="python-devel-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531881" comment="python-doc-2.7.17-28.64.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531882" comment="python-doc-pdf-2.7.17-28.64.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531883" comment="python-gdbm-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531884" comment="python-idle-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531885" comment="python-tk-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531886" comment="python-xml-2.7.17-28.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149164" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1181742" ref_url="https://bugzilla.suse.com/1181742" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35498" ref_url="https://www.suse.com/security/cve/CVE-2020-35498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008320.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2020-35498: Fixed a denial of service related to the handling of Ethernet padding (bsc#1181742).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-12"/>
	<updated date="2021-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181742">SUSE bug 1181742</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35498/">CVE-2020-35498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35498">CVE-2020-35498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555936" comment="openvswitch-2.7.12-3.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149165" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1105322" ref_url="https://bugzilla.suse.com/1105322" source="BUGZILLA"/>
		<reference ref_id="1105323" ref_url="https://bugzilla.suse.com/1105323" source="BUGZILLA"/>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1168952" ref_url="https://bugzilla.suse.com/1168952" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1175306" ref_url="https://bugzilla.suse.com/1175306" source="BUGZILLA"/>
		<reference ref_id="1176395" ref_url="https://bugzilla.suse.com/1176395" source="BUGZILLA"/>
		<reference ref_id="1176485" ref_url="https://bugzilla.suse.com/1176485" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1178182" ref_url="https://bugzilla.suse.com/1178182" source="BUGZILLA"/>
		<reference ref_id="1178272" ref_url="https://bugzilla.suse.com/1178272" source="BUGZILLA"/>
		<reference ref_id="1178589" ref_url="https://bugzilla.suse.com/1178589" source="BUGZILLA"/>
		<reference ref_id="1178886" ref_url="https://bugzilla.suse.com/1178886" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179140" ref_url="https://bugzilla.suse.com/1179140" source="BUGZILLA"/>
		<reference ref_id="1179141" ref_url="https://bugzilla.suse.com/1179141" source="BUGZILLA"/>
		<reference ref_id="1179204" ref_url="https://bugzilla.suse.com/1179204" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179508" ref_url="https://bugzilla.suse.com/1179508" source="BUGZILLA"/>
		<reference ref_id="1179509" ref_url="https://bugzilla.suse.com/1179509" source="BUGZILLA"/>
		<reference ref_id="1179601" ref_url="https://bugzilla.suse.com/1179601" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1179663" ref_url="https://bugzilla.suse.com/1179663" source="BUGZILLA"/>
		<reference ref_id="1179666" ref_url="https://bugzilla.suse.com/1179666" source="BUGZILLA"/>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1179878" ref_url="https://bugzilla.suse.com/1179878" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1179961" ref_url="https://bugzilla.suse.com/1179961" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180027" ref_url="https://bugzilla.suse.com/1180027" source="BUGZILLA"/>
		<reference ref_id="1180028" ref_url="https://bugzilla.suse.com/1180028" source="BUGZILLA"/>
		<reference ref_id="1180029" ref_url="https://bugzilla.suse.com/1180029" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180031" ref_url="https://bugzilla.suse.com/1180031" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180052" ref_url="https://bugzilla.suse.com/1180052" source="BUGZILLA"/>
		<reference ref_id="1180086" ref_url="https://bugzilla.suse.com/1180086" source="BUGZILLA"/>
		<reference ref_id="1180559" ref_url="https://bugzilla.suse.com/1180559" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="1180815" ref_url="https://bugzilla.suse.com/1180815" source="BUGZILLA"/>
		<reference ref_id="1181096" ref_url="https://bugzilla.suse.com/1181096" source="BUGZILLA"/>
		<reference ref_id="1181158" ref_url="https://bugzilla.suse.com/1181158" source="BUGZILLA"/>
		<reference ref_id="1181349" ref_url="https://bugzilla.suse.com/1181349" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="969755" ref_url="https://bugzilla.suse.com/969755" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2019-20934" ref_url="https://www.suse.com/security/cve/CVE-2019-20934/" source="CVE"/>
		<reference ref_id="CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444/" source="CVE"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2020-27835" ref_url="https://www.suse.com/security/cve/CVE-2020-27835/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2020-25211: Fixed a buffer overflow in ctnetlink_parse_tuple_filter() which could be triggered by a local attackers by injecting conntrack netlink configuration (bnc#1176395).
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation (bnc#1105322).

The following non-security bugs were fixed:

- cifs: do not revalidate mountpoint dentries (bsc#1177440).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: ignore revalidate failures in case of process gets signaled (bsc#1177440).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- futex: Avoid freeing an active timer (bsc#969755).
- futex: Avoid violating the 10th rule of futex (bsc#969755).
- futex: Change locking rules (bsc#969755).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#969755).
- futex: Drop hb-&gt;lock before enqueueing on the rtmutex (bsc#969755).
- futex: Fix incorrect should_fail_futex() handling (bsc#969755).
- futex: Fix more put_pi_state() vs. exit_pi_state_list() races (bsc#969755).
- futex: Fix OWNER_DEAD fixup (bsc#969755).
- futex: Fix pi_state-&gt;owner serialization (bsc#969755).
- futex: Fix small (and harmless looking) inconsistencies (bsc#969755).
- futex: Futex_unlock_pi() determinism (bsc#969755).
- futex: Handle early deadlock return correctly (bsc#969755).
- futex: Handle transient 'ownerless' rtmutex state correctly (bsc#969755).
- futex: Pull rt_mutex_futex_unlock() out from under hb-&gt;lock (bsc#969755).
- futex: Rework futex_lock_pi() to use rt_mutex_*_proxy_lock() (bsc#969755).
- futex: Rework inconsistent rt_mutex/futex_q state (bsc#969755).
- futex,rt_mutex: Fix rt_mutex_cleanup_proxy_lock() (bsc#969755).
- futex,rt_mutex: Introduce rt_mutex_init_waiter() (bsc#969755).
- futex,rt_mutex: Provide futex specific rt_mutex API (bsc#969755).
- futex,rt_mutex: Restructure rt_mutex_finish_proxy_lock() (bsc#969755).
- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- IB/hfi1: Clean up hfi1_user_exp_rcv_setup function (bsc#1179878).
- IB/hfi1: Clean up pin_vector_pages() function (bsc#1179878).
- IB/hfi1: Fix the bail out code in pin_vector_pages() function (bsc#1179878).
- IB/hfi1: Move structure definitions from user_exp_rcv.c to user_exp_rcv.h (bsc#1179878).
- IB/hfi1: Name function prototype parameters (bsc#1179878).
- IB/hfi1: Use filedata rather than filepointer (bsc#1179878).
- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#969755).
- mm/userfaultfd: do not access vma-&gt;vm_mm after calling handle_userfault() (bsc#1179204).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1178272).
- Use r3 instead of r13 for l1d fallback flush in do_uaccess_fush (bsc#1181096 ltc#190883).
- video: hyperv_fb: include vmalloc.h (bsc#1175306).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-12"/>
	<updated date="2021-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175306">SUSE bug 1175306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178272">SUSE bug 1178272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179204">SUSE bug 1179204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179508">SUSE bug 1179508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179509">SUSE bug 1179509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179663">SUSE bug 1179663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179666">SUSE bug 1179666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179878">SUSE bug 1179878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179961">SUSE bug 1179961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180027">SUSE bug 1180027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180028">SUSE bug 1180028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180031">SUSE bug 1180031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180052">SUSE bug 1180052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180815">SUSE bug 1180815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181096">SUSE bug 1181096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969755">SUSE bug 969755</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10902">CVE-2018-10902 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20934/">CVE-2019-20934 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20934">CVE-2019-20934 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0444">CVE-2020-0444 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15436">CVE-2020-15436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15437">CVE-2020-15437 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25211">CVE-2020-25211 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25285">CVE-2020-25285 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25669">CVE-2020-25669 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27068">CVE-2020-27068 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27777">CVE-2020-27777 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27825">CVE-2020-27825 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27835/">CVE-2020-27835 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27835">CVE-2020-27835 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28915">CVE-2020-28915 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28974">CVE-2020-28974 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29568">CVE-2020-29568 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">CVE-2020-29569 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4788">CVE-2020-4788 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555937" comment="kernel-default-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555938" comment="kernel-default-base-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555939" comment="kernel-default-devel-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557097" comment="kernel-default-kgraft-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539114" comment="kernel-devel-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539115" comment="kernel-macros-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539116" comment="kernel-source-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555940" comment="kernel-syms-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557099" comment="kgraft-patch-4_4_180-94_138-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149166" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1150934" ref_url="https://bugzilla.suse.com/1150934" source="BUGZILLA"/>
		<reference ref_id="1181777" ref_url="https://bugzilla.suse.com/1181777" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16275" ref_url="https://www.suse.com/security/cve/CVE-2019-16275/" source="CVE"/>
		<reference ref_id="CVE-2021-0326" ref_url="https://www.suse.com/security/cve/CVE-2021-0326/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008327.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-0326: P2P group information processing vulnerability (bsc#1181777).
- CVE-2019-16275: AP mode PMF disconnection protection bypass (bsc#1150934)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-15"/>
	<updated date="2021-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150934">SUSE bug 1150934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181777">SUSE bug 1181777</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16275/">CVE-2019-16275 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16275">CVE-2019-16275 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0326/">CVE-2021-0326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0326">CVE-2021-0326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531899" comment="wpa_supplicant-2.6-15.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149167" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1179748" ref_url="https://bugzilla.suse.com/1179748" source="BUGZILLA"/>
		<reference ref_id="1181483" ref_url="https://bugzilla.suse.com/1181483" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008333.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

- bsc#1179748 CVE-2020-27828: Fix heap overflow by checking maxrlvls
- bsc#1181483 CVE-2021-3272: Fix buffer over-read in jp2_decode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179748">SUSE bug 1179748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181483">SUSE bug 1181483</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27828">CVE-2020-27828 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3272">CVE-2021-3272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531900" comment="libjasper1-1.900.14-195.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531901" comment="libjasper1-32bit-1.900.14-195.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149168" version="1" class="patch">
	<metadata>
		<title>Security update for screen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1182092" ref_url="https://bugzilla.suse.com/1182092" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26937" ref_url="https://www.suse.com/security/cve/CVE-2021-26937/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008336.html" source="SUSE-SU"/>
		<description>
This update for screen fixes the following issues:

- CVE-2021-26937: Fixed double width combining char handling that could lead to a denial of service or code execution (bsc#1182092).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-17"/>
	<updated date="2021-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182092">SUSE bug 1182092</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26937/">CVE-2021-26937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26937">CVE-2021-26937 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531902" comment="screen-4.0.4-23.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149169" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1182246" ref_url="https://bugzilla.suse.com/1182246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008342.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy
  negotiation can be targeted by a buffer overflow attack [bsc#1182246, CVE-2020-8625]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182246">SUSE bug 1182246</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8625">CVE-2020-8625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531903" comment="bind-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531904" comment="bind-chrootenv-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531905" comment="bind-doc-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531906" comment="bind-libs-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531907" comment="bind-libs-32bit-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531908" comment="bind-utils-9.9.9P1-63.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149170" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008344.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 80
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27221">CVE-2020-27221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531909" comment="java-1_7_1-ibm-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531910" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531911" comment="java-1_7_1-ibm-devel-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531912" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531913" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.80-38.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149171" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1177211" ref_url="https://bugzilla.suse.com/1177211" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008345.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2020-26116: Raise ValueError if method contains control characters and thus prevent CRLF injection into URLs (bsc#1177211).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26116">CVE-2020-26116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597582" comment="python-urllib3-1.22-5.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149172" version="1" class="patch">
	<metadata>
		<title>Security update for krb5-appl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1131109" ref_url="https://bugzilla.suse.com/1131109" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25017" ref_url="https://www.suse.com/security/cve/CVE-2019-25017/" source="CVE"/>
		<reference ref_id="CVE-2019-25018" ref_url="https://www.suse.com/security/cve/CVE-2019-25018/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008353.html" source="SUSE-SU"/>
		<description>
This update for krb5-appl fixes the following issues:

- CVE-2019-25017: Check the filenames sent by the server match those requested by the client (bsc#1131109).
- CVE-2019-25018: Disallow empty incoming filename or ones that refer to the current directory (bsc#1131109).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131109">SUSE bug 1131109</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25017/">CVE-2019-25017 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25017">CVE-2019-25017 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25018/">CVE-2019-25018 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25018">CVE-2019-25018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531914" comment="krb5-appl-clients-1.0.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531915" comment="krb5-appl-servers-1.0.3-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149173" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008355.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u282 (icedtea 3.18.0)
  * January 2021 CPU (bsc#1181239)
  * Security fixes
    + JDK-8247619: Improve Direct Buffering of Characters (CVE-2020-14803)
  * Import of OpenJDK 8 u282 build 01
    + JDK-6962725: Regtest javax/swing/JFileChooser/6738668/
      /bug6738668.java fails under Linux
    + JDK-8025936: Windows .pdb and .map files does not have proper
      dependencies setup
    + JDK-8030350: Enable additional compiler warnings for GCC
    + JDK-8031423: Test java/awt/dnd/DisposeFrameOnDragCrash/
      /DisposeFrameOnDragTest.java fails by Timeout on Windows
    + JDK-8036122: Fix warning 'format not a string literal'
    + JDK-8051853: new
      URI('x/').resolve('..').getSchemeSpecificPart() returns null!
    + JDK-8132664: closed/javax/swing/DataTransfer/DefaultNoDrop/
      /DefaultNoDrop.java locks on Windows
    + JDK-8134632: Mark javax/sound/midi/Devices/
      /InitializationHang.java as headful
    + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'
      treated by JVM as an equivalent
    + JDK-8148916: Mark bug6400879.java as intermittently failing
    + JDK-8148983: Fix extra comma in changes for JDK-8148916
    + JDK-8160438: javax/swing/plaf/nimbus/8057791/bug8057791.java
      fails
    + JDK-8165808: Add release barriers when allocating objects
      with concurrent collection
    + JDK-8185003: JMX: Add a version of
      ThreadMXBean.dumpAllThreads with a maxDepth argument
    + JDK-8202076: test/jdk/java/io/File/WinSpecialFiles.java on
      windows with VS2017
    + JDK-8207766: [testbug] Adapt tests for Aix.
    + JDK-8212070: Introduce diagnostic flag to abort VM on failed
      JIT compilation
    + JDK-8213448: [TESTBUG] enhance jfr/jvm/TestDumpOnCrash
    + JDK-8215727: Restore JFR thread sampler loop to old /
      previous behavior
    + JDK-8220657: JFR.dump does not work when filename is set
    + JDK-8221342: [TESTBUG] Generate Dockerfile for docker testing
    + JDK-8224502: [TESTBUG] JDK docker test TestSystemMetrics.java
      fails with access issues and OOM
    + JDK-8231209: [REDO] ThreadMXBean::getThreadAllocatedBytes()
      can be quicker for self thread
    + JDK-8231968: getCurrentThreadAllocatedBytes default
      implementation s/b getThreadAllocatedBytes
    + JDK-8232114: JVM crashed at imjpapi.dll in native code
    + JDK-8234270: [REDO] JDK-8204128 NMT might report incorrect
      numbers for Compiler area
    + JDK-8234339: replace JLI_StrTok in java_md_solinux.c
    + JDK-8238448: RSASSA-PSS signature verification fail when
      using certain odd key sizes
    + JDK-8242335: Additional Tests for RSASSA-PSS
    + JDK-8244225: stringop-overflow warning on strncpy call from
      compile_the_world_in
    + JDK-8245400: Upgrade to LittleCMS 2.11
    + JDK-8248214: Add paddings for TaskQueueSuper to reduce
      false-sharing cache contention
    + JDK-8249176: Update GlobalSignR6CA test certificates
    + JDK-8250665: Wrong translation for the month name of May in
      ar_JO,LB,SY
    + JDK-8250928: JFR: Improve hash algorithm for stack traces
    + JDK-8251469: Better cleanup for
      test/jdk/javax/imageio/SetOutput.java
    + JDK-8251840: Java_sun_awt_X11_XToolkit_getDefaultScreenData
      should not be in make/mapfiles/libawt_xawt/mapfile-vers
    + JDK-8252384: [TESTBUG] Some tests refer to COMPAT provider
      rather than JRE
    + JDK-8252395: [8u] --with-native-debug-symbols=external
      doesn't include debuginfo files for binaries
    + JDK-8252497: Incorrect numeric currency code for ROL
    + JDK-8252754: Hash code calculation of JfrStackTrace is
      inconsistent
    + JDK-8252904: VM crashes when JFR is used and JFR event class
      is transformed
    + JDK-8252975: [8u] JDK-8252395 breaks the build for
      --with-native-debug-symbols=internal
    + JDK-8253284: Zero OrderAccess barrier mappings are incorrect
    + JDK-8253550: [8u] JDK-8252395 breaks the build for make
      STRIP_POLICY=no_strip
    + JDK-8253752: test/sun/management/jmxremote/bootstrap/
      /RmiBootstrapTest.java fails randomly
    + JDK-8254081: java/security/cert/PolicyNode/
      /GetPolicyQualifiers.java fails due to an expired certificate
    + JDK-8254144: Non-x86 Zero builds fail with return-type
      warning in os_linux_zero.cpp
    + JDK-8254166: Zero: return-type warning in
       zeroInterpreter_zero.cpp
    + JDK-8254683: [TEST_BUG] jdk/test/sun/tools/jconsole/
      /WorkerDeadlockTest.java fails
    + JDK-8255003: Build failures on Solaris
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531916" comment="java-1_8_0-openjdk-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531917" comment="java-1_8_0-openjdk-demo-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531918" comment="java-1_8_0-openjdk-devel-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531919" comment="java-1_8_0-openjdk-headless-1.8.0.282-27.56.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149174" version="1" class="patch">
	<metadata>
		<title>Security update for crowbar-core, crowbar-openstack, grafana, influxdb, openstack-heat-templates, openstack-nova, python-Jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1117080" ref_url="https://bugzilla.suse.com/1117080" source="BUGZILLA"/>
		<reference ref_id="1125815" ref_url="https://bugzilla.suse.com/1125815" source="BUGZILLA"/>
		<reference ref_id="1132174" ref_url="https://bugzilla.suse.com/1132174" source="BUGZILLA"/>
		<reference ref_id="1132323" ref_url="https://bugzilla.suse.com/1132323" source="BUGZILLA"/>
		<reference ref_id="1178243" ref_url="https://bugzilla.suse.com/1178243" source="BUGZILLA"/>
		<reference ref_id="1178988" ref_url="https://bugzilla.suse.com/1178988" source="BUGZILLA"/>
		<reference ref_id="1179161" ref_url="https://bugzilla.suse.com/1179161" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10745" ref_url="https://www.suse.com/security/cve/CVE-2016-10745/" source="CVE"/>
		<reference ref_id="CVE-2018-17954" ref_url="https://www.suse.com/security/cve/CVE-2018-17954/" source="CVE"/>
		<reference ref_id="CVE-2019-10906" ref_url="https://www.suse.com/security/cve/CVE-2019-10906/" source="CVE"/>
		<reference ref_id="CVE-2019-20933" ref_url="https://www.suse.com/security/cve/CVE-2019-20933/" source="CVE"/>
		<reference ref_id="CVE-2019-8341" ref_url="https://www.suse.com/security/cve/CVE-2019-8341/" source="CVE"/>
		<reference ref_id="CVE-2020-24303" ref_url="https://www.suse.com/security/cve/CVE-2020-24303/" source="CVE"/>
		<description>
This update for crowbar-core, crowbar-openstack, grafana, influxdb, openstack-heat-templates, openstack-nova, python-Jinja2 fixes the following issues:

Security fixes included in this request:

grafana:
- CVE-2020-24303: Fixed an XXS with series overides. (bsc#1178243)

influxdb:
- CVE-2019-20933: Fixed an authentication bypass. (bsc#1178988)

python-Jinja2:
- CVE-2019-10906, CVE-2019-8341, CVE-2016-10745: 'SandboxedEnvironment' securely handles
   'str.format_map' in order to prevent code execution through untrusted format strings.
   (bsc#1132323, bsc#1125815, bsc#1132174)

Non-security fixes included in this request:

Changes in crowbar-core.SUSE_SLE-12-SP3_Update_Products_Cloud8:
- Update to version 5.0+git.1606840757.839a64745:
  * ntp: Do not use rate-limiting (bsc#1179161)

Changes in crowbar-openstack.SUSE_SLE-12-SP3_Update_Products_Cloud8:
- Update to version 5.0+git.1604938523.ded915845:
  * rabbitmq: Fix crm running check (SOC-11240)

Changes in grafana.SUSE_SLE-12-SP3_Update_Products_Cloud8_Update:
- Fix bsc#1178243 CVE-2020-24303 by adding
  25401-Fix-XSS-vulnerability-with-series-overrides.patch

Changes in influxdb.SUSE_SLE-12-SP3_Update_Products_Cloud8:
- Add CVE-2019-20933.patch (bsc#1178988, CVE-2019-20933) to
  fix authentication bypass 
- Declare license files correctly

Changes in openstack-heat-templates.SUSE_SLE-12-SP3_Update_Products_Cloud8_Update:
- Update to version 0.0.0+git.1605509190.64f020b:
  * Fix software config on rdo
  * optimize size and time using --no-cache-dir
  * add template for servers using Octavia

- Update to version 0.0.0+git.1604032742.c5733ee:
  * Move heat-templates-check job to zuul v3

Changes in openstack-nova-doc.SUSE_SLE-12-SP3_Update_Products_Cloud8_Update:
- Update to version nova-16.1.9.dev77:
  * Follow up for cherry-pick check for merge patch

Changes in openstack-nova.SUSE_SLE-12-SP3_Update_Products_Cloud8_Update:
- Update to version nova-16.1.9.dev77:
  * Follow up for cherry-pick check for merge patch

Changes in python-Jinja2.SUSE_SLE-12-SP3_Update_Products_Cloud8_Update:
- add 0001-sandbox-str.format_map.patch (bsc#1132323, CVE-2019-10906, bsc#1125815, CVE-2019-8341)
  * 'SandboxedEnvironment' securely handles 'str.format_map' in order
    to prevent code execution through untrusted format strings.  The
    sandbox already handled 'str.format'.
- add 0001-SECURITY-support-sandboxing-in-format-expressions.patch (bsc#1132174, CVE-2016-10745)

- Allows Recommends and Suggest in Fedora

- Recommends only for SUSE

Changes in rubygem-crowbar-client:

 - Update to 3.9.3
   - Enable restricted commands for Cloud 7 (bsc#1117080, CVE-2018-17954)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-11"/>
	<updated date="2021-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1117080">SUSE bug 1117080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125815">SUSE bug 1125815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132174">SUSE bug 1132174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132323">SUSE bug 1132323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178243">SUSE bug 1178243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178988">SUSE bug 1178988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179161">SUSE bug 1179161</bugzilla>
	<cve impact="high" cvss3="8.7/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2016-10745/">CVE-2016-10745 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10745">CVE-2016-10745 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17954/">CVE-2018-17954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17954">CVE-2018-17954 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-10906/">CVE-2019-10906 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10906">CVE-2019-10906 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-20933/">CVE-2019-20933 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20933">CVE-2019-20933 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8341/">CVE-2019-8341 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8341">CVE-2019-8341 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24303/">CVE-2020-24303 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24303">CVE-2020-24303 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597705" comment="crowbar-core-5.0+git.1606840757.839a64745-3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597706" comment="crowbar-core-branding-upstream-5.0+git.1606840757.839a64745-3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597707" comment="crowbar-openstack-5.0+git.1604938523.ded915845-4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597583" comment="grafana-6.7.4-4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597584" comment="influxdb-1.3.4-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597585" comment="openstack-heat-templates-0.0.0+git.1605509190.64f020b-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597586" comment="openstack-nova-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597587" comment="openstack-nova-api-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597588" comment="openstack-nova-cells-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597589" comment="openstack-nova-compute-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597590" comment="openstack-nova-conductor-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597591" comment="openstack-nova-console-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597592" comment="openstack-nova-consoleauth-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597593" comment="openstack-nova-doc-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597594" comment="openstack-nova-novncproxy-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597595" comment="openstack-nova-placement-api-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597596" comment="openstack-nova-scheduler-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597597" comment="openstack-nova-serialproxy-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597598" comment="openstack-nova-vncproxy-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597599" comment="python-Jinja2-2.9.6-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597600" comment="python-nova-16.1.9~dev77-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597708" comment="ruby2.1-rubygem-crowbar-client-3.9.3-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149175" version="1" class="patch">
	<metadata>
		<title>Security update for python-Jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1181944" ref_url="https://bugzilla.suse.com/1181944" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28493" ref_url="https://www.suse.com/security/cve/CVE-2020-28493/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008373.html" source="SUSE-SU"/>
		<description>
This update for python-Jinja2 fixes the following issues:

- CVE-2020-28493: Improve the speed of the 'urlize' filter by reducing regex
    backtracking. Email matching requires a word character at the start of the
    domain part, and only word characters in the TLD. (bsc#1181944)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181944">SUSE bug 1181944</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28493/">CVE-2020-28493 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28493">CVE-2020-28493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597621" comment="python-Jinja2-2.9.6-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149176" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008394.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 25
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27221">CVE-2020-27221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531920" comment="java-1_8_0-ibm-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531921" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531922" comment="java-1_8_0-ibm-devel-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531923" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.25-30.81.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149177" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-Twig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1008644" ref_url="https://bugzilla.suse.com/1008644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9180" ref_url="https://www.suse.com/security/cve/CVE-2016-9180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008410.html" source="SUSE-SU"/>
		<description>
This update for perl-XML-Twig fixes the following issues:

- Security fix [bsc#1008644, CVE-2016-9180]
  * Added: the no_xxe option to XML::Twig::new, which causes the
    parse to fail if external entities are used (to prevent
    malicious XML to access the filesystem).
  * Setting expand_external_ents to 0 or -1 currently doesn't work
    as expected; To completely turn off expanding external entities
    use no_xxe.
  * Update documentation for XML::Twig to mention problems with
    expand_external_ents and add information about new no_xxe argument
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008644">SUSE bug 1008644</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9180/">CVE-2016-9180 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9180">CVE-2016-9180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531924" comment="perl-XML-Twig-3.44-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149178" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1182357" ref_url="https://bugzilla.suse.com/1182357" source="BUGZILLA"/>
		<reference ref_id="1182614" ref_url="https://bugzilla.suse.com/1182614" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008404.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.8.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2021-08 (bsc#1182614)
  * CVE-2021-23969: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23968: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23973: MediaError message property could have leaked information about cross-origin resources
  * CVE-2021-23978: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182357">SUSE bug 1182357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23968">CVE-2021-23968 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23969">CVE-2021-23969 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23973">CVE-2021-23973 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23978">CVE-2021-23978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531925" comment="MozillaFirefox-78.8.0-112.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531926" comment="MozillaFirefox-devel-78.8.0-112.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531927" comment="MozillaFirefox-translations-common-78.8.0-112.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149179" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1182066" ref_url="https://bugzilla.suse.com/1182066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008412.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-36242: Using the Fernet class to symmetrically encrypt multi gigabyte
  values could result in an integer overflow and buffer overflow (bsc#1182066).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182066">SUSE bug 1182066</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36242">CVE-2020-36242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597622" comment="python-cryptography-2.0.3-3.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149180" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1182066" ref_url="https://bugzilla.suse.com/1182066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008413.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-36242: Using the Fernet class to symmetrically encrypt multi gigabyte
  values could result in an integer overflow and buffer overflow (bsc#1182066).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182066">SUSE bug 1182066</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36242">CVE-2020-36242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531928" comment="python-cryptography-2.1.4-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531929" comment="python3-cryptography-2.1.4-7.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149181" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1175970" ref_url="https://bugzilla.suse.com/1175970" source="BUGZILLA"/>
		<reference ref_id="1176711" ref_url="https://bugzilla.suse.com/1176711" source="BUGZILLA"/>
		<reference ref_id="1177883" ref_url="https://bugzilla.suse.com/1177883" source="BUGZILLA"/>
		<reference ref_id="1179264" ref_url="https://bugzilla.suse.com/1179264" source="BUGZILLA"/>
		<reference ref_id="1179265" ref_url="https://bugzilla.suse.com/1179265" source="BUGZILLA"/>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="1182262" ref_url="https://bugzilla.suse.com/1182262" source="BUGZILLA"/>
		<reference ref_id="1182263" ref_url="https://bugzilla.suse.com/1182263" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

grub2 now implements the new 'SBAT' method for SHIM based secure boot revocation. (bsc#1182057)

Following security issues are fixed that can violate secure boot constraints:

- CVE-2020-25632: Fixed a use-after-free in rmmod command (bsc#1176711)
- CVE-2020-25647: Fixed an out-of-bound write in grub_usb_device_initialize() (bsc#1177883)
- CVE-2020-27749: Fixed a stack buffer overflow in grub_parser_split_cmdline (bsc#1179264)
- CVE-2020-27779, CVE-2020-14372: Disallow cutmem and acpi commands in secure boot mode (bsc#1179265 bsc#1175970)
- CVE-2021-20225: Fixed a heap out-of-bounds write in short form option parser (bsc#1182262)
- CVE-2021-20233: Fixed a heap out-of-bound write due to mis-calculation of space required for quoting (bsc#1182263)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175970">SUSE bug 1175970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176711">SUSE bug 1176711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177883">SUSE bug 1177883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179264">SUSE bug 1179264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179265">SUSE bug 1179265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182262">SUSE bug 1182262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182263">SUSE bug 1182263</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14372">CVE-2020-14372 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25632">CVE-2020-25632 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25647">CVE-2020-25647 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27749">CVE-2020-27749 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27779">CVE-2020-27779 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20225">CVE-2021-20225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20233">CVE-2021-20233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555941" comment="grub2-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539120" comment="grub2-i386-pc-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539122" comment="grub2-snapper-plugin-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539123" comment="grub2-systemd-sleep-plugin-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539124" comment="grub2-x86_64-efi-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539125" comment="grub2-x86_64-xen-2.02-4.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149182" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1182279" ref_url="https://bugzilla.suse.com/1182279" source="BUGZILLA"/>
		<reference ref_id="1182408" ref_url="https://bugzilla.suse.com/1182408" source="BUGZILLA"/>
		<reference ref_id="1182411" ref_url="https://bugzilla.suse.com/1182411" source="BUGZILLA"/>
		<reference ref_id="1182412" ref_url="https://bugzilla.suse.com/1182412" source="BUGZILLA"/>
		<reference ref_id="1182413" ref_url="https://bugzilla.suse.com/1182413" source="BUGZILLA"/>
		<reference ref_id="1182415" ref_url="https://bugzilla.suse.com/1182415" source="BUGZILLA"/>
		<reference ref_id="1182416" ref_url="https://bugzilla.suse.com/1182416" source="BUGZILLA"/>
		<reference ref_id="1182417" ref_url="https://bugzilla.suse.com/1182417" source="BUGZILLA"/>
		<reference ref_id="1182418" ref_url="https://bugzilla.suse.com/1182418" source="BUGZILLA"/>
		<reference ref_id="1182419" ref_url="https://bugzilla.suse.com/1182419" source="BUGZILLA"/>
		<reference ref_id="1182420" ref_url="https://bugzilla.suse.com/1182420" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch-&gt;bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-03"/>
	<updated date="2021-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36221">CVE-2020-36221 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36222">CVE-2020-36222 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36223">CVE-2020-36223 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36224">CVE-2020-36224 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36225">CVE-2020-36225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36226">CVE-2020-36226 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36227">CVE-2020-36227 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36228">CVE-2020-36228 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36229">CVE-2020-36229 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36230">CVE-2020-36230 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27212">CVE-2021-27212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531942" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149183" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1178372" ref_url="https://bugzilla.suse.com/1178372" source="BUGZILLA"/>
		<reference ref_id="1181747" ref_url="https://bugzilla.suse.com/1181747" source="BUGZILLA"/>
		<reference ref_id="1181753" ref_url="https://bugzilla.suse.com/1181753" source="BUGZILLA"/>
		<reference ref_id="1181843" ref_url="https://bugzilla.suse.com/1181843" source="BUGZILLA"/>
		<reference ref_id="1182175" ref_url="https://bugzilla.suse.com/1182175" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008448.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used
  by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).

The following non-security bugs were fixed:

- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178372">SUSE bug 1178372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181747">SUSE bug 1181747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181753">SUSE bug 1181753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181843">SUSE bug 1181843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182175">SUSE bug 1182175</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26932">CVE-2021-26932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555942" comment="kernel-default-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555943" comment="kernel-default-base-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555944" comment="kernel-default-devel-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557127" comment="kernel-default-kgraft-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539130" comment="kernel-devel-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539131" comment="kernel-macros-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539132" comment="kernel-source-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555945" comment="kernel-syms-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557129" comment="kgraft-patch-4_4_180-94_141-default-1-4.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149184" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1182805" ref_url="https://bugzilla.suse.com/1182805" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27803" ref_url="https://www.suse.com/security/cve/CVE-2021-27803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008451.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-27803: P2P provision discovery processing vulnerability (bsc#1182805) 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182805">SUSE bug 1182805</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27803/">CVE-2021-27803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27803">CVE-2021-27803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531951" comment="wpa_supplicant-2.6-15.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149185" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1183026" ref_url="https://bugzilla.suse.com/1183026" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21300" ref_url="https://www.suse.com/security/cve/CVE-2021-21300/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008456.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- On case-insensitive filesystems, with support for symbolic links,
  if Git is configured globally to apply delay-capable clean/smudge
  filters (such as Git LFS), Git could be fooled into running
  remote code during a clone. (bsc#1183026, CVE-2021-21300)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183026">SUSE bug 1183026</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21300/">CVE-2021-21300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21300">CVE-2021-21300 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531952" comment="git-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531953" comment="git-core-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531954" comment="git-cvs-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531955" comment="git-daemon-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531957" comment="git-email-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531958" comment="git-gui-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531959" comment="git-svn-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531960" comment="git-web-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531961" comment="gitk-2.26.2-27.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149186" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008491.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- python27 was upgraded to 2.7.18
- CVE-2021-23336: Fixed a potential web cache poisoning by using a semicolon in query parameters use of semicolon as a query string separator (bsc#1182379).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-16"/>
	<updated date="2021-03-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531962" comment="libpython2_7-1_0-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531963" comment="libpython2_7-1_0-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531964" comment="python-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531965" comment="python-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531966" comment="python-base-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531967" comment="python-base-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531968" comment="python-curses-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531969" comment="python-demo-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531970" comment="python-devel-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531971" comment="python-doc-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531972" comment="python-doc-pdf-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531973" comment="python-gdbm-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531974" comment="python-idle-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531975" comment="python-tk-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531976" comment="python-xml-2.7.18-28.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149187" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1180623" ref_url="https://bugzilla.suse.com/1180623" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008173.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.1 ESR
  * Fixed: Critical security issue MFSA 2021-01 (bsc#1180623)
  * CVE-2020-16044
    Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180623">SUSE bug 1180623</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16044">CVE-2020-16044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531977" comment="MozillaFirefox-78.6.1-112.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531978" comment="MozillaFirefox-devel-78.6.1-112.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531979" comment="MozillaFirefox-translations-common-78.6.1-112.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149188" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1182328" ref_url="https://bugzilla.suse.com/1182328" source="BUGZILLA"/>
		<reference ref_id="1182362" ref_url="https://bugzilla.suse.com/1182362" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27218" ref_url="https://www.suse.com/security/cve/CVE-2021-27218/" source="CVE"/>
		<reference ref_id="CVE-2021-27219" ref_url="https://www.suse.com/security/cve/CVE-2021-27219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008493.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2021-27218: g_byte_array_new_take takes a gsize as length but stores in a guint, this patch will refuse if the length is larger than guint. (bsc#1182328)
- CVE-2021-27219: g_memdup takes a guint as parameter and sometimes leads into an integer overflow, so add a g_memdup2 function which uses gsize to replace it. (bsc#1182362)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-16"/>
	<updated date="2021-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182328">SUSE bug 1182328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182362">SUSE bug 1182362</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-27218/">CVE-2021-27218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27218">CVE-2021-27218 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27219/">CVE-2021-27219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27219">CVE-2021-27219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531980" comment="glib2-lang-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531981" comment="glib2-tools-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531982" comment="libgio-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531983" comment="libgio-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531984" comment="libglib-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531985" comment="libglib-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531986" comment="libgmodule-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531987" comment="libgmodule-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531988" comment="libgobject-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531989" comment="libgobject-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531990" comment="libgthread-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531991" comment="libgthread-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149189" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1180414" ref_url="https://bugzilla.suse.com/1180414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008537.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:
	
- CVE-2020-35738: Fixed an out-of-bounds write in WavpackPackSamples (bsc#1180414). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180414">SUSE bug 1180414</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35738">CVE-2020-35738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531994" comment="libwavpack1-4.60.99-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149190" version="1" class="patch">
	<metadata>
		<title>Security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1088639" ref_url="https://bugzilla.suse.com/1088639" source="BUGZILLA"/>
		<reference ref_id="1112438" ref_url="https://bugzilla.suse.com/1112438" source="BUGZILLA"/>
		<reference ref_id="1125689" ref_url="https://bugzilla.suse.com/1125689" source="BUGZILLA"/>
		<reference ref_id="1134616" ref_url="https://bugzilla.suse.com/1134616" source="BUGZILLA"/>
		<reference ref_id="1146182" ref_url="https://bugzilla.suse.com/1146182" source="BUGZILLA"/>
		<reference ref_id="1146184" ref_url="https://bugzilla.suse.com/1146184" source="BUGZILLA"/>
		<reference ref_id="1181358" ref_url="https://bugzilla.suse.com/1181358" source="BUGZILLA"/>
		<reference ref_id="962914" ref_url="https://bugzilla.suse.com/962914" source="BUGZILLA"/>
		<reference ref_id="964140" ref_url="https://bugzilla.suse.com/964140" source="BUGZILLA"/>
		<reference ref_id="966514" ref_url="https://bugzilla.suse.com/966514" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1544" ref_url="https://www.suse.com/security/cve/CVE-2016-1544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" source="SUSE-SU"/>
		<description>
This update for nghttp2 fixes the following issues:

Security issues fixed:

- CVE-2020-11080: HTTP/2 Large Settings Frame DoS (bsc#1181358).
- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service (bsc#1146184).
- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146182).
- CVE-2018-1000168: Fixed ALTSVC frame client side denial of service (bsc#1088639).
- CVE-2016-1544: Fixed out of memory due to unlimited incoming HTTP header fields (bsc#966514).

Bug fixes and enhancements:

- Packages must not mark license files as %doc (bsc#1082318)
- Typo in description of libnghttp2_asio1 (bsc#962914)
- Fixed mistake in spec file (bsc#1125689)
- Fixed build issue with boost 1.70.0 (bsc#1134616)
- Fixed build issue with GCC 6 (bsc#964140)
- Feature: Add W&amp;S module (FATE#326776, bsc#1112438)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088639">SUSE bug 1088639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112438">SUSE bug 1112438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125689">SUSE bug 1125689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134616">SUSE bug 1134616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146182">SUSE bug 1146182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146184">SUSE bug 1146184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181358">SUSE bug 1181358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962914">SUSE bug 962914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964140">SUSE bug 964140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966514">SUSE bug 966514</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1544/">CVE-2016-1544 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1544">CVE-2016-1544 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000168">CVE-2018-1000168 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9511">CVE-2019-9511 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9513">CVE-2019-9513 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11080">CVE-2020-11080 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531995" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149191" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008551.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841">CVE-2021-23841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531996" comment="libopenssl-devel-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531997" comment="libopenssl1_0_0-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531998" comment="libopenssl1_0_0-32bit-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531999" comment="libopenssl1_0_0-hmac-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532000" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532001" comment="openssl-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532002" comment="openssl-doc-1.0.2j-60.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149192" version="1" class="patch">
	<metadata>
		<title>Security update for openstack-dashboard, release-notes-suse-openstack-cloud (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1179955" ref_url="https://bugzilla.suse.com/1179955" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29565" ref_url="https://www.suse.com/security/cve/CVE-2020-29565/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008190.html" source="SUSE-SU"/>
		<description>
This update for openstack-dashboard, release-notes-suse-openstack-cloud fixes the following issues:

- Fix open redirect (OSSA-2020-008, CVE-2020-29565)
- Fix horizon-nodejs jobs.
- Add workaround for secure boot issue when shim package is updated. (bsc#1179955)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179955">SUSE bug 1179955</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29565/">CVE-2020-29565 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29565">CVE-2020-29565 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009597623" comment="openstack-dashboard-12.0.5~dev6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597624" comment="python-horizon-12.0.5~dev6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009597625" comment="release-notes-suse-openstack-cloud-8.20201214-3.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149193" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1183942" ref_url="https://bugzilla.suse.com/1183942" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.9.0 ESR  (MFSA 2021-11, bsc#1183942)
  * CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read
  * CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23984: Malicious extensions could have spoofed popup information
  * CVE-2021-23987: Memory safety bugs
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-31"/>
	<updated date="2021-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23981">CVE-2021-23981 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23982">CVE-2021-23982 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23984">CVE-2021-23984 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23987">CVE-2021-23987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009532003" comment="MozillaFirefox-78.9.0-112.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532004" comment="MozillaFirefox-devel-78.9.0-112.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532005" comment="MozillaFirefox-translations-common-78.9.0-112.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149194" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1194115" ref_url="https://bugzilla.suse.com/1194115" source="BUGZILLA"/>
		<reference ref_id="1194116" ref_url="https://bugzilla.suse.com/1194116" source="BUGZILLA"/>
		<reference ref_id="1194117" ref_url="https://bugzilla.suse.com/1194117" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45115" ref_url="https://www.suse.com/security/cve/CVE-2021-45115/" source="CVE"/>
		<reference ref_id="CVE-2021-45116" ref_url="https://www.suse.com/security/cve/CVE-2021-45116/" source="CVE"/>
		<reference ref_id="CVE-2021-45452" ref_url="https://www.suse.com/security/cve/CVE-2021-45452/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010010.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2021-45115: Fixed denial-of-service possibility in UserAttributeSimilarityValidator (bsc#1194115).
- CVE-2021-45116: Fixed potential information disclosure in dictsort template filter (bsc#1194117).
- CVE-2021-45452: Fixed potential directory-traversal via Storage.save() (bsc#1194116).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194115">SUSE bug 1194115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194116">SUSE bug 1194116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194117">SUSE bug 1194117</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45115/">CVE-2021-45115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45115">CVE-2021-45115 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45116/">CVE-2021-45116 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45116">CVE-2021-45116 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-45452/">CVE-2021-45452 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45452">CVE-2021-45452 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664016" comment="python-Django-1.11.29-3.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149195" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1197341" ref_url="https://bugzilla.suse.com/1197341" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0547" ref_url="https://www.suse.com/security/cve/CVE-2022-0547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010562.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2022-0547: Fixed possible authentication bypass in external authentication plug-in (bsc#1197341).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197341">SUSE bug 1197341</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0547/">CVE-2022-0547 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0547">CVE-2022-0547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009676877" comment="openvpn-2.3.8-16.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676878" comment="openvpn-auth-pam-plugin-2.3.8-16.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149196" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1196500" ref_url="https://bugzilla.suse.com/1196500" source="BUGZILLA"/>
		<reference ref_id="1197126" ref_url="https://bugzilla.suse.com/1197126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update Java 7.1 to Service Refresh 7 Fix Pack 5 (bsc#1197126).

Including fixes for the following vulnerabilities: 

  CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349,
  CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277,
  CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294,
  CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248,
  CVE-2022-21271.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21271">CVE-2022-21271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21349">CVE-2022-21349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149197" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1195146" ref_url="https://bugzilla.suse.com/1195146" source="BUGZILLA"/>
		<reference ref_id="1196500" ref_url="https://bugzilla.suse.com/1196500" source="BUGZILLA"/>
		<reference ref_id="1197126" ref_url="https://bugzilla.suse.com/1197126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update Java 8.0 to Service Refresh 7 Fix Pack 5 (bsc#1197126).

Including fixes for the following vulnerabilities: 

  CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349,
  CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277,
  CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294,
  CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248,
  CVE-2022-21271.

Non-securtiy fix:

- Fixed a broken symlink for javaws (bsc#1195146).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195146">SUSE bug 1195146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21271">CVE-2022-21271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21349">CVE-2022-21349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149198" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1197459" ref_url="https://bugzilla.suse.com/1197459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010583.html" source="SUSE-SU"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677126" comment="libz1-1.2.8-12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677109" comment="libz1-32bit-1.2.8-12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677127" comment="zlib-devel-1.2.8-12.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149199" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1191902" ref_url="https://bugzilla.suse.com/1191902" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35560" ref_url="https://www.suse.com/security/cve/CVE-2021-35560/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 7 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
- CVE-2021-35560: Fixed a vulnerability in the component Deployment. (bsc#1191902)
- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake. (bsc#1191904)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191902">SUSE bug 1191902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35560/">CVE-2021-35560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35560">CVE-2021-35560 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41035">CVE-2021-41035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662502" comment="java-1_8_0-ibm-1.8.0_sr7.0-30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662492" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662503" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662494" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-30.84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149200" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010659.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.3 (bsc#1197903):
  - CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11
    tokens are removed while in use.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-05"/>
	<updated date="2022-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678285" comment="libfreebl3-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678251" comment="libfreebl3-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678286" comment="libfreebl3-hmac-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678253" comment="libfreebl3-hmac-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678287" comment="libsoftokn3-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678255" comment="libsoftokn3-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678288" comment="libsoftokn3-hmac-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678257" comment="libsoftokn3-hmac-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678289" comment="mozilla-nss-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678259" comment="mozilla-nss-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678290" comment="mozilla-nss-certs-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678261" comment="mozilla-nss-certs-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678512" comment="mozilla-nss-devel-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678291" comment="mozilla-nss-sysinit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678264" comment="mozilla-nss-sysinit-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678292" comment="mozilla-nss-tools-3.68.3-58.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149201" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<reference ref_id="SUSE-RU-2022:1114-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022464.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.8.0 ESR (bsc#1197903):

MFSA 2022-14 (bsc#1197903)

* CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11 tokens are removed while in use
* CVE-2022-28281: Fixed an out of bounds write due to unexpected WebAuthN Extensions
* CVE-2022-1196: Fixed a use-after-free after VR Process destruction
* CVE-2022-28282: Fixed a use-after-free in DocumentL10n::TranslateDocument
* CVE-2022-28285: Fixed incorrect AliasSet used in JIT Codegen
* CVE-2022-28286: Fixed that iframe contents could be rendered outside the border
* CVE-2022-24713: Fixed a denial of service via complex regular expressions
* CVE-2022-28289: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1196">CVE-2022-1196 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28281">CVE-2022-28281 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28282">CVE-2022-28282 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28285">CVE-2022-28285 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28286">CVE-2022-28286 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28289">CVE-2022-28289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678497" comment="MozillaFirefox-91.8.0-112.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678498" comment="MozillaFirefox-devel-91.8.0-112.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678499" comment="MozillaFirefox-translations-common-91.8.0-112.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149202" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1167631" ref_url="https://bugzilla.suse.com/1167631" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1752" ref_url="https://www.suse.com/security/cve/CVE-2020-1752/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010664.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2020-1752: Fix use-after-free in glob when expanding ~user (bsc#1167631)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167631">SUSE bug 1167631</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1752/">CVE-2020-1752 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">CVE-2020-1752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677624" comment="glibc-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677550" comment="glibc-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677625" comment="glibc-devel-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677552" comment="glibc-devel-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677553" comment="glibc-html-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677554" comment="glibc-i18ndata-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677555" comment="glibc-info-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677626" comment="glibc-locale-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677557" comment="glibc-locale-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677627" comment="glibc-profile-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677559" comment="glibc-profile-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677628" comment="nscd-2.22-123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149203" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1102016" ref_url="https://bugzilla.suse.com/1102016" source="BUGZILLA"/>
		<reference ref_id="1106881" ref_url="https://bugzilla.suse.com/1106881" source="BUGZILLA"/>
		<reference ref_id="1106882" ref_url="https://bugzilla.suse.com/1106882" source="BUGZILLA"/>
		<reference ref_id="1140130" ref_url="https://bugzilla.suse.com/1140130" source="BUGZILLA"/>
		<reference ref_id="1140205" ref_url="https://bugzilla.suse.com/1140205" source="BUGZILLA"/>
		<reference ref_id="1162090" ref_url="https://bugzilla.suse.com/1162090" source="BUGZILLA"/>
		<reference ref_id="1173578" ref_url="https://bugzilla.suse.com/1173578" source="BUGZILLA"/>
		<reference ref_id="1180457" ref_url="https://bugzilla.suse.com/1180457" source="BUGZILLA"/>
		<reference ref_id="1184774" ref_url="https://bugzilla.suse.com/1184774" source="BUGZILLA"/>
		<reference ref_id="1197738" ref_url="https://bugzilla.suse.com/1197738" source="BUGZILLA"/>
		<reference ref_id="971617" ref_url="https://bugzilla.suse.com/971617" source="BUGZILLA"/>
		<reference ref_id="980504" ref_url="https://bugzilla.suse.com/980504" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1924" ref_url="https://www.suse.com/security/cve/CVE-2016-1924/" source="CVE"/>
		<reference ref_id="CVE-2016-3183" ref_url="https://www.suse.com/security/cve/CVE-2016-3183/" source="CVE"/>
		<reference ref_id="CVE-2016-4797" ref_url="https://www.suse.com/security/cve/CVE-2016-4797/" source="CVE"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16375" ref_url="https://www.suse.com/security/cve/CVE-2018-16375/" source="CVE"/>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2018-20845" ref_url="https://www.suse.com/security/cve/CVE-2018-20845/" source="CVE"/>
		<reference ref_id="CVE-2018-20846" ref_url="https://www.suse.com/security/cve/CVE-2018-20846/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="CVE-2022-1122" ref_url="https://www.suse.com/security/cve/CVE-2022-1122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes the following issues:

- CVE-2016-1924: Fixed heap buffer overflow (bsc#980504).
- CVE-2016-3183: Fixed out-of-bounds read in sycc422_to_rgb function (bsc#971617).
- CVE-2016-4797: Fixed heap buffer overflow (bsc#980504).
- CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016).
- CVE-2018-16375: Fixed missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c (bsc#1106882).
- CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881).
- CVE-2018-20845: Fixed division-by-zero in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c (bsc#1140130).
- CVE-2018-20846: Fixed out-of-bounds accesses in pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c (bsc#1140205).
- CVE-2020-8112: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090).
- CVE-2020-15389: Fixed use-after-free if t a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578).
- CVE-2020-27823: Fixed heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457).
- CVE-2021-29338: Fixed integer overflow that allows remote attackers to crash the application (bsc#1184774).
- CVE-2022-1122: Fixed segmentation fault in opj2_decompress due to uninitialized pointer (bsc#1197738).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-07"/>
	<updated date="2022-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102016">SUSE bug 1102016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106881">SUSE bug 1106881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106882">SUSE bug 1106882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140130">SUSE bug 1140130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140205">SUSE bug 1140205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180457">SUSE bug 1180457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184774">SUSE bug 1184774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197738">SUSE bug 1197738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971617">SUSE bug 971617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980504">SUSE bug 980504</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1924/">CVE-2016-1924 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1924">CVE-2016-1924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3183/">CVE-2016-3183 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3183">CVE-2016-3183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-4797/">CVE-2016-4797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4797">CVE-2016-4797 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14423">CVE-2018-14423 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16375/">CVE-2018-16375 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16375">CVE-2018-16375 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16376">CVE-2018-16376 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20845/">CVE-2018-20845 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20845">CVE-2018-20845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20846/">CVE-2018-20846 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20846">CVE-2018-20846 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15389">CVE-2020-15389 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27823">CVE-2020-27823 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8112">CVE-2020-8112 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29338">CVE-2021-29338 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1122/">CVE-2022-1122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1122">CVE-2022-1122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677943" comment="libopenjp2-7-2.1.0-4.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149204" version="1" class="patch">
	<metadata>
		<title>Security update for mysql-connector-java (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1195557" ref_url="https://bugzilla.suse.com/1195557" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2471" ref_url="https://www.suse.com/security/cve/CVE-2021-2471/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010675.html" source="SUSE-SU"/>
		<description>
This update for mysql-connector-java fixes the following issues:

- CVE-2021-2471: Fixed unauthorized access to critical data or complete access to all MySQL Connectors (bsc#1195557).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-11"/>
	<updated date="2022-04-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195557">SUSE bug 1195557</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2471/">CVE-2021-2471 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2471">CVE-2021-2471 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671018" comment="mysql-connector-java-8.0.25-5.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149205" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1194547" ref_url="https://bugzilla.suse.com/1194547" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- CVE-2021-4140: Fixed iframe sandbox bypass with XSLT (bsc#1194547).
- CVE-2022-22737: Fixed race condition when playing audio files (bsc#1194547).
- CVE-2022-22738: Fixed heap-buffer-overflow in blendGaussianBlur (bsc#1194547).
- CVE-2022-22739: Fixed missing throttling on external protocol launch dialog (bsc#1194547).
- CVE-2022-22740: Fixed use-after-free of ChannelEventQueue::mOwner (bsc#1194547).
- CVE-2022-22741: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22742: Fixed out-of-bounds memory access when inserting text in edit mode (bsc#1194547).
- CVE-2022-22743: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22744: Fixed possible command injection via the 'Copy as curl' feature in DevTools (bsc#1194547).
- CVE-2022-22745: Fixed leaking cross-origin URLs through securitypolicyviolation event (bsc#1194547).
- CVE-2022-22746: Fixed calling into reportValidity could have lead to fullscreen window spoof (bsc#1194547).
- CVE-2022-22747: Fixed crash when handling empty pkcs7 sequence(bsc#1194547).
- CVE-2022-22748: Fixed spoofed origin on external protocol launch dialog (bsc#1194547).
- CVE-2022-22751: Fixed memory safety bugs (bsc#1194547).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4140">CVE-2021-4140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22737">CVE-2022-22737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22738">CVE-2022-22738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22739">CVE-2022-22739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22740">CVE-2022-22740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22741">CVE-2022-22741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22742">CVE-2022-22742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22743">CVE-2022-22743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22744">CVE-2022-22744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22745">CVE-2022-22745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22746">CVE-2022-22746 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22747">CVE-2022-22747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22748">CVE-2022-22748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22751">CVE-2022-22751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663799" comment="MozillaFirefox-91.5.0-112.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663800" comment="MozillaFirefox-devel-91.5.0-112.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663801" comment="MozillaFirefox-translations-common-91.5.0-112.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149206" version="1" class="patch">
	<metadata>
		<title>Security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010685.html" source="SUSE-SU"/>
		<description>
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679302" comment="liblzma5-5.0.5-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679278" comment="liblzma5-32bit-5.0.5-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679303" comment="xz-5.0.5-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679280" comment="xz-lang-5.0.5-6.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149207" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1172768" ref_url="https://bugzilla.suse.com/1172768" source="BUGZILLA"/>
		<reference ref_id="1172802" ref_url="https://bugzilla.suse.com/1172802" source="BUGZILLA"/>
		<reference ref_id="1178479" ref_url="https://bugzilla.suse.com/1178479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0181" ref_url="https://www.suse.com/security/cve/CVE-2020-0181/" source="CVE"/>
		<reference ref_id="CVE-2020-0198" ref_url="https://www.suse.com/security/cve/CVE-2020-0198/" source="CVE"/>
		<reference ref_id="CVE-2020-0452" ref_url="https://www.suse.com/security/cve/CVE-2020-0452/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010691.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2020-0181: Fixed an integer overflow that could lead to denial of service
  (bsc#1172802).
- CVE-2020-0198: Fixed and unsigned integer overflow that could lead to denial
  of service (bsc#1172768).
- CVE-2020-0452: Fixed a buffer overflow check that could be optimized away
  by the compiler (bsc#1178479).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172768">SUSE bug 1172768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172802">SUSE bug 1172802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178479">SUSE bug 1178479</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0181/">CVE-2020-0181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0181">CVE-2020-0181 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0198/">CVE-2020-0198 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0198">CVE-2020-0198 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0452/">CVE-2020-0452 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0452">CVE-2020-0452 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677635" comment="libexif12-0.6.22-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677562" comment="libexif12-32bit-0.6.22-8.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149208" version="1" class="patch">
	<metadata>
		<title>Security update for openstack-monasca-agent, spark, spark-kit, zookeeper (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010026.html" source="SUSE-SU"/>
		<description>
This update for openstack-monasca-agent, spark, spark-kit, zookeeper fixes the following issues:

- CVE-2021-4104: Remove JMSAppender from log4j jars (bsc#1193662)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-19"/>
	<updated date="2022-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">CVE-2021-4104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663701" comment="openstack-monasca-agent-2.2.6~dev4-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663702" comment="python-monasca-agent-2.2.6~dev4-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663703" comment="spark-1.6.3-8.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663705" comment="zookeeper-server-3.4.10-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149209" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196488" ref_url="https://bugzilla.suse.com/1196488" source="BUGZILLA"/>
		<reference ref_id="1196761" ref_url="https://bugzilla.suse.com/1196761" source="BUGZILLA"/>
		<reference ref_id="1196830" ref_url="https://bugzilla.suse.com/1196830" source="BUGZILLA"/>
		<reference ref_id="1196836" ref_url="https://bugzilla.suse.com/1196836" source="BUGZILLA"/>
		<reference ref_id="1197227" ref_url="https://bugzilla.suse.com/1197227" source="BUGZILLA"/>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1197366" ref_url="https://bugzilla.suse.com/1197366" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868/" source="CVE"/>
		<reference ref_id="CVE-2022-0850" ref_url="https://www.suse.com/security/cve/CVE-2022-0850/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-23036" ref_url="https://www.suse.com/security/cve/CVE-2022-23036/" source="CVE"/>
		<reference ref_id="CVE-2022-23037" ref_url="https://www.suse.com/security/cve/CVE-2022-23037/" source="CVE"/>
		<reference ref_id="CVE-2022-23038" ref_url="https://www.suse.com/security/cve/CVE-2022-23038/" source="CVE"/>
		<reference ref_id="CVE-2022-23039" ref_url="https://www.suse.com/security/cve/CVE-2022-23039/" source="CVE"/>
		<reference ref_id="CVE-2022-23040" ref_url="https://www.suse.com/security/cve/CVE-2022-23040/" source="CVE"/>
		<reference ref_id="CVE-2022-23041" ref_url="https://www.suse.com/security/cve/CVE-2022-23041/" source="CVE"/>
		<reference ref_id="CVE-2022-23042" ref_url="https://www.suse.com/security/cve/CVE-2022-23042/" source="CVE"/>
		<reference ref_id="CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490/" source="CVE"/>
		<reference ref_id="CVE-2022-26966" ref_url="https://www.suse.com/security/cve/CVE-2022-26966/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated.

The following security bugs were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331)
- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)
- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device. (bsc#1196836)
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)

The following non-security bugs were fixed:

- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018).
- clocksource: Initialize cs-&gt;wd_list (git-fixes)
- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).
- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).
- net: usb: ax88179_178a: fix packet alignment padding (bsc#1196018).
- sched/autogroup: Fix possible Spectre-v1 indexing for (git-fixes)
- sr9700: sanity check for packet length (bsc#1196836).
- usb: host: xen-hcd: add missing unlock in error path (git-fixes).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196488">SUSE bug 1196488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196761">SUSE bug 1196761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196830">SUSE bug 1196830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196836">SUSE bug 1196836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197227">SUSE bug 1197227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197366">SUSE bug 1197366</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45868">CVE-2021-45868 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0850/">CVE-2022-0850 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0850">CVE-2022-0850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23036/">CVE-2022-23036 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23036">CVE-2022-23036 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23037/">CVE-2022-23037 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23037">CVE-2022-23037 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23038/">CVE-2022-23038 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23038">CVE-2022-23038 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23039/">CVE-2022-23039 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23039">CVE-2022-23039 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23040/">CVE-2022-23040 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23040">CVE-2022-23040 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23041/">CVE-2022-23041 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23041">CVE-2022-23041 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23042/">CVE-2022-23042 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23042">CVE-2022-23042 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26490">CVE-2022-26490 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26966/">CVE-2022-26966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26966">CVE-2022-26966 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679319" comment="kernel-default-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679320" comment="kernel-default-base-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679321" comment="kernel-default-devel-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680628" comment="kernel-default-kgraft-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679285" comment="kernel-devel-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679286" comment="kernel-macros-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679287" comment="kernel-source-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679322" comment="kernel-syms-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680630" comment="kgraft-patch-4_4_180-94_161-default-1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149210" version="1" class="patch">
	<metadata>
		<title>Security update for gzip (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010766.html" source="SUSE-SU"/>
		<description>
This update for gzip fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679548" comment="gzip-1.6-9.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149211" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1183709" ref_url="https://bugzilla.suse.com/1183709" source="BUGZILLA"/>
		<reference ref_id="1197872" ref_url="https://bugzilla.suse.com/1197872" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3448" ref_url="https://www.suse.com/security/cve/CVE-2021-3448/" source="CVE"/>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010784.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2021-3448: Fixed a potential DNS cache poisoning issue due to a constant
  outgoing port being used when for certain use cases of the --server option
  (bsc#1183709).
- CVE-2022-0934: Fixed an invalid memory access that could lead to remote denial
  of service via crafted packet (bsc#1197872).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183709">SUSE bug 1183709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197872">SUSE bug 1197872</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3448/">CVE-2021-3448 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3448">CVE-2021-3448 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0934">CVE-2022-0934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679550" comment="dnsmasq-2.78-18.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679572" comment="dnsmasq-utils-2.78-18.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149212" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1198234" ref_url="https://bugzilla.suse.com/1198234" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010798.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2022-24765: Fixed a potential command injection via git worktree (bsc#1198234).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198234">SUSE bug 1198234</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24765">CVE-2022-24765 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680006" comment="git-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680007" comment="git-core-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680008" comment="git-cvs-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680009" comment="git-daemon-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680010" comment="git-email-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680011" comment="git-gui-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680012" comment="git-svn-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680013" comment="git-web-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680014" comment="gitk-2.26.2-27.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149213" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1196490" ref_url="https://bugzilla.suse.com/1196490" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010799.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-23308: Fixed use-after-free of ID and IDREF attributes. (bsc#1196490)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680015" comment="libxml2-2-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679983" comment="libxml2-2-32bit-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679984" comment="libxml2-doc-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680016" comment="libxml2-tools-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680017" comment="python-libxml2-2.9.4-46.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149214" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010794.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:

- CVE-2020-14409: Fixed an integer overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c. (bsc#1181202)
- CVE-2020-14410: Fixed a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c. (bsc#1181201)
- CVE-2021-33657: Fixed a Heap overflow problem in video/SDL_pixels.c. (bsc#1198001)
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14409">CVE-2020-14409 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14410">CVE-2020-14410 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33657">CVE-2021-33657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679549" comment="libSDL-1_2-0-1.2.15-15.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679539" comment="libSDL-1_2-0-32bit-1.2.15-15.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149215" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1196915" ref_url="https://bugzilla.suse.com/1196915" source="BUGZILLA"/>
		<reference ref_id="1197423" ref_url="https://bugzilla.suse.com/1197423" source="BUGZILLA"/>
		<reference ref_id="1197425" ref_url="https://bugzilla.suse.com/1197425" source="BUGZILLA"/>
		<reference ref_id="1197426" ref_url="https://bugzilla.suse.com/1197426" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26401" ref_url="https://www.suse.com/security/cve/CVE-2021-26401/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-26356" ref_url="https://www.suse.com/security/cve/CVE-2022-26356/" source="CVE"/>
		<reference ref_id="CVE-2022-26357" ref_url="https://www.suse.com/security/cve/CVE-2022-26357/" source="CVE"/>
		<reference ref_id="CVE-2022-26358" ref_url="https://www.suse.com/security/cve/CVE-2022-26358/" source="CVE"/>
		<reference ref_id="CVE-2022-26359" ref_url="https://www.suse.com/security/cve/CVE-2022-26359/" source="CVE"/>
		<reference ref_id="CVE-2022-26360" ref_url="https://www.suse.com/security/cve/CVE-2022-26360/" source="CVE"/>
		<reference ref_id="CVE-2022-26361" ref_url="https://www.suse.com/security/cve/CVE-2022-26361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that
  could cause a denial of service in the host (bsc#1197423).
- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts
  using VT-d IOMMU hardware, which could lead to a denial of service in the host
  (bsc#1197425).
- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory
  corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be
  leveraged by an attacker to cause a denial of service in the host (bsc#1197426).
- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue
  mitigations (bsc#1196915).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-26"/>
	<updated date="2022-04-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196915">SUSE bug 1196915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197423">SUSE bug 1197423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197425">SUSE bug 1197425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26401/">CVE-2021-26401 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26401">CVE-2021-26401 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0002">CVE-2022-0002 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26356/">CVE-2022-26356 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26356">CVE-2022-26356 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26357/">CVE-2022-26357 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26357">CVE-2022-26357 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26358/">CVE-2022-26358 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26358">CVE-2022-26358 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26359/">CVE-2022-26359 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26359">CVE-2022-26359 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26360/">CVE-2022-26360 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26360">CVE-2022-26360 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26361/">CVE-2022-26361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26361">CVE-2022-26361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680580" comment="xen-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680581" comment="xen-doc-html-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680582" comment="xen-libs-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680583" comment="xen-libs-32bit-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680584" comment="xen-tools-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680585" comment="xen-tools-domU-4.9.4_28-3.103.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149216" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1194019" ref_url="https://bugzilla.suse.com/1194019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8518" ref_url="https://www.suse.com/security/cve/CVE-2018-8518/" source="CVE"/>
		<reference ref_id="CVE-2018-8523" ref_url="https://www.suse.com/security/cve/CVE-2018-8523/" source="CVE"/>
		<reference ref_id="CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551/" source="CVE"/>
		<reference ref_id="CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558/" source="CVE"/>
		<reference ref_id="CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559/" source="CVE"/>
		<reference ref_id="CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563/" source="CVE"/>
		<reference ref_id="CVE-2019-8674" ref_url="https://www.suse.com/security/cve/CVE-2019-8674/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<reference ref_id="CVE-2019-8707" ref_url="https://www.suse.com/security/cve/CVE-2019-8707/" source="CVE"/>
		<reference ref_id="CVE-2019-8719" ref_url="https://www.suse.com/security/cve/CVE-2019-8719/" source="CVE"/>
		<reference ref_id="CVE-2019-8726" ref_url="https://www.suse.com/security/cve/CVE-2019-8726/" source="CVE"/>
		<reference ref_id="CVE-2019-8733" ref_url="https://www.suse.com/security/cve/CVE-2019-8733/" source="CVE"/>
		<reference ref_id="CVE-2019-8763" ref_url="https://www.suse.com/security/cve/CVE-2019-8763/" source="CVE"/>
		<reference ref_id="CVE-2019-8765" ref_url="https://www.suse.com/security/cve/CVE-2019-8765/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8768" ref_url="https://www.suse.com/security/cve/CVE-2019-8768/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8821" ref_url="https://www.suse.com/security/cve/CVE-2019-8821/" source="CVE"/>
		<reference ref_id="CVE-2019-8822" ref_url="https://www.suse.com/security/cve/CVE-2019-8822/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-3885" ref_url="https://www.suse.com/security/cve/CVE-2020-3885/" source="CVE"/>
		<reference ref_id="CVE-2020-3894" ref_url="https://www.suse.com/security/cve/CVE-2020-3894/" source="CVE"/>
		<reference ref_id="CVE-2020-3895" ref_url="https://www.suse.com/security/cve/CVE-2020-3895/" source="CVE"/>
		<reference ref_id="CVE-2020-3897" ref_url="https://www.suse.com/security/cve/CVE-2020-3897/" source="CVE"/>
		<reference ref_id="CVE-2020-3900" ref_url="https://www.suse.com/security/cve/CVE-2020-3900/" source="CVE"/>
		<reference ref_id="CVE-2020-3901" ref_url="https://www.suse.com/security/cve/CVE-2020-3901/" source="CVE"/>
		<reference ref_id="CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9952" ref_url="https://www.suse.com/security/cve/CVE-2020-9952/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1817" ref_url="https://www.suse.com/security/cve/CVE-2021-1817/" source="CVE"/>
		<reference ref_id="CVE-2021-1820" ref_url="https://www.suse.com/security/cve/CVE-2021-1820/" source="CVE"/>
		<reference ref_id="CVE-2021-1825" ref_url="https://www.suse.com/security/cve/CVE-2021-1825/" source="CVE"/>
		<reference ref_id="CVE-2021-1826" ref_url="https://www.suse.com/security/cve/CVE-2021-1826/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="CVE-2021-30661" ref_url="https://www.suse.com/security/cve/CVE-2021-30661/" source="CVE"/>
		<reference ref_id="CVE-2021-30666" ref_url="https://www.suse.com/security/cve/CVE-2021-30666/" source="CVE"/>
		<reference ref_id="CVE-2021-30682" ref_url="https://www.suse.com/security/cve/CVE-2021-30682/" source="CVE"/>
		<reference ref_id="CVE-2021-30761" ref_url="https://www.suse.com/security/cve/CVE-2021-30761/" source="CVE"/>
		<reference ref_id="CVE-2021-30762" ref_url="https://www.suse.com/security/cve/CVE-2021-30762/" source="CVE"/>
		<reference ref_id="CVE-2021-30809" ref_url="https://www.suse.com/security/cve/CVE-2021-30809/" source="CVE"/>
		<reference ref_id="CVE-2021-30818" ref_url="https://www.suse.com/security/cve/CVE-2021-30818/" source="CVE"/>
		<reference ref_id="CVE-2021-30823" ref_url="https://www.suse.com/security/cve/CVE-2021-30823/" source="CVE"/>
		<reference ref_id="CVE-2021-30836" ref_url="https://www.suse.com/security/cve/CVE-2021-30836/" source="CVE"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30848" ref_url="https://www.suse.com/security/cve/CVE-2021-30848/" source="CVE"/>
		<reference ref_id="CVE-2021-30849" ref_url="https://www.suse.com/security/cve/CVE-2021-30849/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="CVE-2021-30884" ref_url="https://www.suse.com/security/cve/CVE-2021-30884/" source="CVE"/>
		<reference ref_id="CVE-2021-30887" ref_url="https://www.suse.com/security/cve/CVE-2021-30887/" source="CVE"/>
		<reference ref_id="CVE-2021-30888" ref_url="https://www.suse.com/security/cve/CVE-2021-30888/" source="CVE"/>
		<reference ref_id="CVE-2021-30889" ref_url="https://www.suse.com/security/cve/CVE-2021-30889/" source="CVE"/>
		<reference ref_id="CVE-2021-30890" ref_url="https://www.suse.com/security/cve/CVE-2021-30890/" source="CVE"/>
		<reference ref_id="CVE-2021-30897" ref_url="https://www.suse.com/security/cve/CVE-2021-30897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.34.3 (bsc#1194019).
- CVE-2021-30887: Fixed logic issue allowing unexpectedly unenforced Content Security Policy when processing maliciously crafted web content.
- CVE-2021-30890: Fixed logic issue allowing universal cross site scripting when processing maliciously crafted web content.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8518/">CVE-2018-8518 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8518">CVE-2018-8518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8523/">CVE-2018-8523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-8523">CVE-2018-8523 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8551">CVE-2019-8551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8558">CVE-2019-8558 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8559">CVE-2019-8559 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8563">CVE-2019-8563 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8674/">CVE-2019-8674 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8674">CVE-2019-8674 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8681">CVE-2019-8681 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8684">CVE-2019-8684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8687">CVE-2019-8687 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8688">CVE-2019-8688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8689">CVE-2019-8689 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8690">CVE-2019-8690 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8707/">CVE-2019-8707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8707">CVE-2019-8707 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8719/">CVE-2019-8719 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8719">CVE-2019-8719 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8726/">CVE-2019-8726 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8726">CVE-2019-8726 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8733/">CVE-2019-8733 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8733">CVE-2019-8733 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8763/">CVE-2019-8763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8763">CVE-2019-8763 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8765/">CVE-2019-8765 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8765">CVE-2019-8765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8766">CVE-2019-8766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8768/">CVE-2019-8768 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8768">CVE-2019-8768 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8782">CVE-2019-8782 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8808">CVE-2019-8808 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8815">CVE-2019-8815 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8821/">CVE-2019-8821 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8821">CVE-2019-8821 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8822/">CVE-2019-8822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8822">CVE-2019-8822 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10018">CVE-2020-10018 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13753">CVE-2020-13753 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27918">CVE-2020-27918 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29623">CVE-2020-29623 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3885/">CVE-2020-3885 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3885">CVE-2020-3885 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3894/">CVE-2020-3894 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3894">CVE-2020-3894 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3895/">CVE-2020-3895 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3895">CVE-2020-3895 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3897/">CVE-2020-3897 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3897">CVE-2020-3897 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3900/">CVE-2020-3900 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3900">CVE-2020-3900 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3901/">CVE-2020-3901 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3901">CVE-2020-3901 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3902">CVE-2020-3902 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9802">CVE-2020-9802 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9803">CVE-2020-9803 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9805">CVE-2020-9805 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9947">CVE-2020-9947 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9948">CVE-2020-9948 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9951">CVE-2020-9951 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-9952/">CVE-2020-9952 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9952">CVE-2020-9952 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1765">CVE-2021-1765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1788">CVE-2021-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1817/">CVE-2021-1817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1817">CVE-2021-1817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1820/">CVE-2021-1820 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1820">CVE-2021-1820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1825/">CVE-2021-1825 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1825">CVE-2021-1825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1826/">CVE-2021-1826 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1826">CVE-2021-1826 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1844">CVE-2021-1844 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1871">CVE-2021-1871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30661/">CVE-2021-30661 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30661">CVE-2021-30661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30666/">CVE-2021-30666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30666">CVE-2021-30666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30682/">CVE-2021-30682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30682">CVE-2021-30682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30761/">CVE-2021-30761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30761">CVE-2021-30761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30762/">CVE-2021-30762 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30762">CVE-2021-30762 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30809/">CVE-2021-30809 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30809">CVE-2021-30809 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30818/">CVE-2021-30818 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30818">CVE-2021-30818 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30823/">CVE-2021-30823 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30823">CVE-2021-30823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30836/">CVE-2021-30836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30836">CVE-2021-30836 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30846">CVE-2021-30846 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30848/">CVE-2021-30848 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30848">CVE-2021-30848 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30849/">CVE-2021-30849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30849">CVE-2021-30849 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30851">CVE-2021-30851 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30858">CVE-2021-30858 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30884/">CVE-2021-30884 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30884">CVE-2021-30884 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30887/">CVE-2021-30887 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30887">CVE-2021-30887 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30888/">CVE-2021-30888 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30888">CVE-2021-30888 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30889/">CVE-2021-30889 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30889">CVE-2021-30889 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30890/">CVE-2021-30890 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30890">CVE-2021-30890 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30897/">CVE-2021-30897 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30897">CVE-2021-30897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149217" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1197216" ref_url="https://bugzilla.suse.com/1197216" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010844.html" source="SUSE-SU"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2022-27239: Fixed a buffer overflow in the command line ip option (bsc#1197216).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197216">SUSE bug 1197216</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27239">CVE-2022-27239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681235" comment="cifs-utils-6.9-9.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149218" version="1" class="patch">
	<metadata>
		<title>Security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1194735" ref_url="https://bugzilla.suse.com/1194735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010044.html" source="SUSE-SU"/>
		<description>
This update for aide fixes the following issues:

- CVE-2021-45417: Fix a bufferoverflow in base64 functions (bsc#1194735)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45417">CVE-2021-45417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664239" comment="aide-0.16-20.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149219" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1198086" ref_url="https://bugzilla.suse.com/1198086" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24801" ref_url="https://www.suse.com/security/cve/CVE-2022-24801/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010948.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

- CVE-2022-24801: Fixed to not be as lenient as earlier HTTP/1.1 RFCs to prevent HTTP
  request smuggling. (bsc#1198086)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-05"/>
	<updated date="2022-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198086">SUSE bug 1198086</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24801/">CVE-2022-24801 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24801">CVE-2022-24801 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680674" comment="python-Twisted-15.2.1-9.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149220" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.1.0 ESR.

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-09"/>
	<updated date="2022-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29981">CVE-2021-29981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29982">CVE-2021-29982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29983">CVE-2021-29983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29987">CVE-2021-29987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29990">CVE-2021-29990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29991">CVE-2021-29991 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38492">CVE-2021-38492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38495">CVE-2021-38495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682635" comment="MozillaFirefox-91.9.0-112.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682636" comment="MozillaFirefox-devel-91.9.0-112.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682637" comment="MozillaFirefox-translations-common-91.9.0-112.104.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149221" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1107294" ref_url="https://bugzilla.suse.com/1107294" source="BUGZILLA"/>
		<reference ref_id="1107296" ref_url="https://bugzilla.suse.com/1107296" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0502" ref_url="https://www.suse.com/security/cve/CVE-2018-0502/" source="CVE"/>
		<reference ref_id="CVE-2018-13259" ref_url="https://www.suse.com/security/cve/CVE-2018-13259/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010048.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2018-0502: Fixed execve call vulnerability to program named on the second line when the beginning of a #! script file was mishandled. (bsc#1107296, bsc#1107294)
- CVE-2018-13259: Fixed execve call vulnerability to program name that is a substring of the intended one. (bsc#1107296, bsc#1107294)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-24"/>
	<updated date="2022-01-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107294">SUSE bug 1107294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107296">SUSE bug 1107296</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0502/">CVE-2018-0502 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0502">CVE-2018-0502 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13259/">CVE-2018-13259 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13259">CVE-2018-13259 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663987" comment="zsh-5.0.5-6.12.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149222" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1197135" ref_url="https://bugzilla.suse.com/1197135" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011206.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25220: Fixed potentially incorrect answers by cached forwarders (bsc#1197135).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197135">SUSE bug 1197135</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25220">CVE-2021-25220 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682675" comment="bind-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682676" comment="bind-chrootenv-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682677" comment="bind-doc-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682678" comment="bind-libs-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682679" comment="bind-libs-32bit-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682680" comment="bind-utils-9.9.9P1-63.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149223" version="1" class="patch">
	<metadata>
		<title>Security update for e2fsprogs (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1198446" ref_url="https://bugzilla.suse.com/1198446" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1304" ref_url="https://www.suse.com/security/cve/CVE-2022-1304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010997.html" source="SUSE-SU"/>
		<description>
This update for e2fsprogs fixes the following issues:

- CVE-2022-1304: Fixed out-of-bounds read/write leading to segmentation fault
  and possibly arbitrary code execution. (bsc#1198446)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-12"/>
	<updated date="2022-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198446">SUSE bug 1198446</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1304/">CVE-2022-1304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">CVE-2022-1304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682319" comment="e2fsprogs-1.42.11-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682320" comment="libcom_err2-1.42.11-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682310" comment="libcom_err2-32bit-1.42.11-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682321" comment="libext2fs2-1.42.11-16.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149224" version="1" class="patch">
	<metadata>
		<title>Security update for documentation-suse-openstack-cloud, kibana, openstack-keystone, openstack-monasca-notification (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1186868" ref_url="https://bugzilla.suse.com/1186868" source="BUGZILLA"/>
		<reference ref_id="1189390" ref_url="https://bugzilla.suse.com/1189390" source="BUGZILLA"/>
		<reference ref_id="1197204" ref_url="https://bugzilla.suse.com/1197204" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22141" ref_url="https://www.suse.com/security/cve/CVE-2021-22141/" source="CVE"/>
		<reference ref_id="CVE-2021-38155" ref_url="https://www.suse.com/security/cve/CVE-2021-38155/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010996.html" source="SUSE-SU"/>
		<description>
This update for documentation-suse-openstack-cloud, kibana, openstack-keystone, openstack-monasca-notification fixes the following issues:

- CVE-2021-22141: Fixed URL redirection flaw (bsc#1186868).
- CVE-2021-38155: Fixed information disclosure during account locking (bsc#1189390).

The following non-security bugs were fixed:

- Fix smtp server authentication (bsc#1197204)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-12"/>
	<updated date="2022-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186868">SUSE bug 1186868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189390">SUSE bug 1189390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197204">SUSE bug 1197204</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22141/">CVE-2021-22141 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22141">CVE-2021-22141 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38155/">CVE-2021-38155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38155">CVE-2021-38155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681145" comment="documentation-suse-openstack-cloud-deployment-8.20211112-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681133" comment="documentation-suse-openstack-cloud-supplement-8.20211112-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681134" comment="documentation-suse-openstack-cloud-upstream-admin-8.20211112-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681135" comment="documentation-suse-openstack-cloud-upstream-user-8.20211112-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681137" comment="kibana-4.6.6-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681138" comment="openstack-keystone-12.0.4~dev11-5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681139" comment="openstack-keystone-doc-12.0.4~dev11-5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681140" comment="openstack-monasca-notification-1.10.2~dev4-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681141" comment="python-keystone-12.0.4~dev11-5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681142" comment="python-monasca-notification-1.10.2~dev4-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149225" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188568" ref_url="https://bugzilla.suse.com/1188568" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2432" ref_url="https://www.suse.com/security/cve/CVE-2021-2432/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 5 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2432: Fixed a vulnerability in the omponent JNDI. (bsc#1188568)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-24"/>
	<updated date="2022-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188568">SUSE bug 1188568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-2432/">CVE-2021-2432 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2432">CVE-2021-2432 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41035">CVE-2021-41035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662499" comment="java-1_7_1-ibm-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662487" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662500" comment="java-1_7_1-ibm-devel-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662501" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662490" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.0-38.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149226" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1198383" ref_url="https://bugzilla.suse.com/1198383" source="BUGZILLA"/>
		<reference ref_id="1199240" ref_url="https://bugzilla.suse.com/1199240" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29155" ref_url="https://www.suse.com/security/cve/CVE-2022-29155/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011023.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2022-29155: Fixed SQL injection in back-sql (bsc#1199240).
- Fixed issue with SASL init that crashed slapd at startup under certain conditions (bsc#1198383).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198383">SUSE bug 1198383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199240">SUSE bug 1199240</bugzilla>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29155/">CVE-2022-29155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29155">CVE-2022-29155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682642" comment="libldap-2_4-2-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682621" comment="libldap-2_4-2-32bit-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682643" comment="openldap2-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682644" comment="openldap2-back-meta-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682645" comment="openldap2-client-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682625" comment="openldap2-doc-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682659" comment="openldap2-ppolicy-check-password-1.2-18.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149227" version="1" class="patch">
	<metadata>
		<title>Security update for gzip (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011029.html" source="SUSE-SU"/>
		<description>
This update for gzip fixes the following issues:

- CVE-2022-1271: Add hardening for zgrep. (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682638" comment="gzip-1.6-9.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149228" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="1198290" ref_url="https://bugzilla.suse.com/1198290" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<reference ref_id="CVE-2022-22624" ref_url="https://www.suse.com/security/cve/CVE-2022-22624/" source="CVE"/>
		<reference ref_id="CVE-2022-22628" ref_url="https://www.suse.com/security/cve/CVE-2022-22628/" source="CVE"/>
		<reference ref_id="CVE-2022-22629" ref_url="https://www.suse.com/security/cve/CVE-2022-22629/" source="CVE"/>
		<reference ref_id="CVE-2022-22637" ref_url="https://www.suse.com/security/cve/CVE-2022-22637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011016.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.0 (bsc#1198290):

- CVE-2022-22624: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22628: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22629: Fixed a buffer overflow that may lead to arbitrary code execution.
- CVE-2022-22637: Fixed an unexpected cross-origin behavior due to a logic error.

Missing CVE reference for the update to 2.34.6 (bsc#1196133):

- CVE-2022-22594: Fixed a cross-origin issue in the IndexDB API.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198290">SUSE bug 1198290</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22594">CVE-2022-22594 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22624/">CVE-2022-22624 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22624">CVE-2022-22624 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22628/">CVE-2022-22628 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22628">CVE-2022-22628 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22629/">CVE-2022-22629 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22629">CVE-2022-22629 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22637/">CVE-2022-22637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22637">CVE-2022-22637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681316" comment="libjavascriptcoregtk-4_0-18-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681317" comment="libwebkit2gtk-4_0-37-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681309" comment="libwebkit2gtk3-lang-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681318" comment="typelib-1_0-JavaScriptCore-4_0-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681319" comment="typelib-1_0-WebKit2-4_0-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681320" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681321" comment="webkit2gtk-4_0-injected-bundles-2.36.0-2.96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149229" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1199223" ref_url="https://bugzilla.suse.com/1199223" source="BUGZILLA"/>
		<reference ref_id="1199224" ref_url="https://bugzilla.suse.com/1199224" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27781" ref_url="https://www.suse.com/security/cve/CVE-2022-27781/" source="CVE"/>
		<reference ref_id="CVE-2022-27782" ref_url="https://www.suse.com/security/cve/CVE-2022-27782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011074.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-27781: Fixed CERTINFO never-ending busy-loop (bsc#1199223)
- CVE-2022-27782: Fixed TLS and SSH connection too eager reuse (bsc#1199224)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-18"/>
	<updated date="2022-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199223">SUSE bug 1199223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199224">SUSE bug 1199224</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-27781/">CVE-2022-27781 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27781">CVE-2022-27781 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27782/">CVE-2022-27782 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27782">CVE-2022-27782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684081" comment="curl-7.37.0-37.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684082" comment="libcurl4-7.37.0-37.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684074" comment="libcurl4-32bit-7.37.0-37.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149230" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1198717" ref_url="https://bugzilla.suse.com/1198717" source="BUGZILLA"/>
		<reference ref_id="1199423" ref_url="https://bugzilla.suse.com/1199423" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21151" ref_url="https://www.suse.com/security/cve/CVE-2022-21151/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011092.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220510 release. (bsc#1199423)
Updated to Intel CPU Microcode 20220419 release. (bsc#1198717)

- CVE-2022-21151: Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access (bsc#1199423).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198717">SUSE bug 1198717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199423">SUSE bug 1199423</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21151/">CVE-2022-21151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21151">CVE-2022-21151 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683677" comment="ucode-intel-20220510-13.97.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149231" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1198970" ref_url="https://bugzilla.suse.com/1198970" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909/" source="CVE"/>
		<reference ref_id="CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911/" source="CVE"/>
		<reference ref_id="CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912/" source="CVE"/>
		<reference ref_id="CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914/" source="CVE"/>
		<reference ref_id="CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916/" source="CVE"/>
		<reference ref_id="CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.9.0 ESR (MFSA 2022-17)(bsc#1198970):

- CVE-2022-29914: Fullscreen notification bypass using popups
- CVE-2022-29909: Bypassing permission prompt in nested browsing contexts
- CVE-2022-29916: Leaking browser history with CSS variables
- CVE-2022-29911: iframe Sandbox bypass
- CVE-2022-29912: Reader mode bypassed SameSite cookies
- CVE-2022-29917: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29909">CVE-2022-29909 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29911">CVE-2022-29911 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29912">CVE-2022-29912 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29914">CVE-2022-29914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29916">CVE-2022-29916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29917">CVE-2022-29917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684083" comment="MozillaFirefox-91.9.0-112.108.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684084" comment="MozillaFirefox-devel-91.9.0-112.108.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684085" comment="MozillaFirefox-translations-common-91.9.0-112.108.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149232" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1194251" ref_url="https://bugzilla.suse.com/1194251" source="BUGZILLA"/>
		<reference ref_id="1194362" ref_url="https://bugzilla.suse.com/1194362" source="BUGZILLA"/>
		<reference ref_id="1194474" ref_url="https://bugzilla.suse.com/1194474" source="BUGZILLA"/>
		<reference ref_id="1194476" ref_url="https://bugzilla.suse.com/1194476" source="BUGZILLA"/>
		<reference ref_id="1194477" ref_url="https://bugzilla.suse.com/1194477" source="BUGZILLA"/>
		<reference ref_id="1194478" ref_url="https://bugzilla.suse.com/1194478" source="BUGZILLA"/>
		<reference ref_id="1194479" ref_url="https://bugzilla.suse.com/1194479" source="BUGZILLA"/>
		<reference ref_id="1194480" ref_url="https://bugzilla.suse.com/1194480" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2021-45960: Fixed left shift in the storeAtts function in xmlparse.c that can lead to realloc misbehavior (bsc#1194251).
- CVE-2021-46143: Fixed integer overflow in m_groupSize in doProlog (bsc#1194362).
- CVE-2022-22822: Fixed integer overflow in addBinding in xmlparse.c (bsc#1194474).
- CVE-2022-22823: Fixed integer overflow in build_model in xmlparse.c (bsc#1194476).
- CVE-2022-22824: Fixed integer overflow in defineAttribute in xmlparse.c (bsc#1194477).
- CVE-2022-22825: Fixed integer overflow in lookup in xmlparse.c (bsc#1194478).
- CVE-2022-22826: Fixed integer overflow in nextScaffoldPart in xmlparse.c (bsc#1194479).
- CVE-2022-22827: Fixed integer overflow in storeAtts in xmlparse.c (bsc#1194480).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">CVE-2021-45960 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">CVE-2021-46143 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">CVE-2022-22825 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">CVE-2022-22826 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">CVE-2022-22827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664107" comment="expat-2.1.0-21.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664108" comment="libexpat1-2.1.0-21.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664105" comment="libexpat1-32bit-2.1.0-21.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149233" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1199475" ref_url="https://bugzilla.suse.com/1199475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011129.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:
 
- CVE-2022-1552: Confine additional operations within 'security restricted operation' sandboxes (bsc#1199475).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199475">SUSE bug 1199475</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696333" comment="postgresql10-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696334" comment="postgresql10-contrib-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696064" comment="postgresql10-docs-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696335" comment="postgresql10-plperl-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696336" comment="postgresql10-plpython-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696337" comment="postgresql10-pltcl-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696338" comment="postgresql10-server-10.21-4.28.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149234" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1199768" ref_url="https://bugzilla.suse.com/1199768" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1529" ref_url="https://www.suse.com/security/cve/CVE-2022-1529/" source="CVE"/>
		<reference ref_id="CVE-2022-1802" ref_url="https://www.suse.com/security/cve/CVE-2022-1802/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011131.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.9.1 ESR - MFSA 2022-19 (bsc#1199768):

- CVE-2022-1802: Prototype pollution in Top-Level Await implementation
- CVE-2022-1529: Untrusted input used in JavaScript object indexing, leading to prototype pollution
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199768">SUSE bug 1199768</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1529/">CVE-2022-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1529">CVE-2022-1529 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1802/">CVE-2022-1802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1802">CVE-2022-1802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696339" comment="MozillaFirefox-91.9.1-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696340" comment="MozillaFirefox-devel-91.9.1-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696341" comment="MozillaFirefox-translations-common-91.9.1-112.111.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149235" version="1" class="patch">
	<metadata>
		<title>Security update for python-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011137.html" source="SUSE-SU"/>
		<description>
This update for python-requests fixes the following issues:

- CVE-2018-18074: Fixed to prevent the package to send an HTTP Authorization header to an http URI
  upon receiving a same-hostname https-to-http redirect. (bsc#1111622) 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595040" comment="python-requests-2.11.1-6.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149236" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1069689" ref_url="https://bugzilla.suse.com/1069689" source="BUGZILLA"/>
		<reference ref_id="1199132" ref_url="https://bugzilla.suse.com/1199132" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16932" ref_url="https://www.suse.com/security/cve/CVE-2017-16932/" source="CVE"/>
		<reference ref_id="CVE-2022-29824" ref_url="https://www.suse.com/security/cve/CVE-2022-29824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011148.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-29824: Fixed integer overflow leading to out-of-bounds write in buf.c and tree.c (bsc#1199132).
- CVE-2017-16932: Prevent infinite recursion in parameter entities (bsc#1069689).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-24"/>
	<updated date="2022-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1069689">SUSE bug 1069689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199132">SUSE bug 1199132</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16932/">CVE-2017-16932 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16932">CVE-2017-16932 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29824/">CVE-2022-29824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824">CVE-2022-29824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696342" comment="libxml2-2-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696073" comment="libxml2-2-32bit-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696074" comment="libxml2-doc-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696343" comment="libxml2-tools-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696344" comment="python-libxml2-2.9.4-46.54.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149237" version="1" class="patch">
	<metadata>
		<title>Security update for pcre2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1199232" ref_url="https://bugzilla.suse.com/1199232" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1586" ref_url="https://www.suse.com/security/cve/CVE-2022-1586/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011157.html" source="SUSE-SU"/>
		<description>
This update for pcre2 fixes the following issues:

- CVE-2022-1586: Fixed out-of-bounds read via missing Unicode property matching issue in JIT compiled regular expressions (bsc#1199232).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-25"/>
	<updated date="2022-05-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199232">SUSE bug 1199232</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1586/">CVE-2022-1586 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">CVE-2022-1586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696345" comment="libpcre2-16-0-10.34-1.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696346" comment="libpcre2-32-0-10.34-1.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696347" comment="libpcre2-8-0-10.34-1.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696348" comment="libpcre2-posix2-10.34-1.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149238" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1131644" ref_url="https://bugzilla.suse.com/1131644" source="BUGZILLA"/>
		<reference ref_id="1131868" ref_url="https://bugzilla.suse.com/1131868" source="BUGZILLA"/>
		<reference ref_id="1131870" ref_url="https://bugzilla.suse.com/1131870" source="BUGZILLA"/>
		<reference ref_id="1131871" ref_url="https://bugzilla.suse.com/1131871" source="BUGZILLA"/>
		<reference ref_id="1131872" ref_url="https://bugzilla.suse.com/1131872" source="BUGZILLA"/>
		<reference ref_id="1131874" ref_url="https://bugzilla.suse.com/1131874" source="BUGZILLA"/>
		<reference ref_id="1133640" ref_url="https://bugzilla.suse.com/1133640" source="BUGZILLA"/>
		<reference ref_id="1144443" ref_url="https://bugzilla.suse.com/1144443" source="BUGZILLA"/>
		<reference ref_id="1156920" ref_url="https://bugzilla.suse.com/1156920" source="BUGZILLA"/>
		<reference ref_id="1165266" ref_url="https://bugzilla.suse.com/1165266" source="BUGZILLA"/>
		<reference ref_id="1166933" ref_url="https://bugzilla.suse.com/1166933" source="BUGZILLA"/>
		<reference ref_id="1167331" ref_url="https://bugzilla.suse.com/1167331" source="BUGZILLA"/>
		<reference ref_id="1182805" ref_url="https://bugzilla.suse.com/1182805" source="BUGZILLA"/>
		<reference ref_id="1194732" ref_url="https://bugzilla.suse.com/1194732" source="BUGZILLA"/>
		<reference ref_id="1194733" ref_url="https://bugzilla.suse.com/1194733" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8041" ref_url="https://www.suse.com/security/cve/CVE-2015-8041/" source="CVE"/>
		<reference ref_id="CVE-2017-13077" ref_url="https://www.suse.com/security/cve/CVE-2017-13077/" source="CVE"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-13082" ref_url="https://www.suse.com/security/cve/CVE-2017-13082/" source="CVE"/>
		<reference ref_id="CVE-2017-13086" ref_url="https://www.suse.com/security/cve/CVE-2017-13086/" source="CVE"/>
		<reference ref_id="CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087/" source="CVE"/>
		<reference ref_id="CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088/" source="CVE"/>
		<reference ref_id="CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526/" source="CVE"/>
		<reference ref_id="CVE-2019-11555" ref_url="https://www.suse.com/security/cve/CVE-2019-11555/" source="CVE"/>
		<reference ref_id="CVE-2019-13377" ref_url="https://www.suse.com/security/cve/CVE-2019-13377/" source="CVE"/>
		<reference ref_id="CVE-2019-9494" ref_url="https://www.suse.com/security/cve/CVE-2019-9494/" source="CVE"/>
		<reference ref_id="CVE-2019-9495" ref_url="https://www.suse.com/security/cve/CVE-2019-9495/" source="CVE"/>
		<reference ref_id="CVE-2019-9497" ref_url="https://www.suse.com/security/cve/CVE-2019-9497/" source="CVE"/>
		<reference ref_id="CVE-2019-9498" ref_url="https://www.suse.com/security/cve/CVE-2019-9498/" source="CVE"/>
		<reference ref_id="CVE-2019-9499" ref_url="https://www.suse.com/security/cve/CVE-2019-9499/" source="CVE"/>
		<reference ref_id="CVE-2022-23303" ref_url="https://www.suse.com/security/cve/CVE-2022-23303/" source="CVE"/>
		<reference ref_id="CVE-2022-23304" ref_url="https://www.suse.com/security/cve/CVE-2022-23304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2022-23303, CVE-2022-23304: Fixed SAE/EAP-pwd side-channel attacks (bsc#1194732, bsc#1194733)
- CVE-2021-0326: Fixed P2P group information processing vulnerability (bsc#1181777)

- Fix systemd device ready dependencies in wpa_supplicant@.service file. (bsc#1182805)

- Limit P2P_DEVICE name to appropriate ifname size
- Enable SAE support(jsc#SLE-14992).
- Fix wicked wlan (bsc#1156920)
- Change wpa_supplicant.service to ensure wpa_supplicant gets started before
  network. Fix WLAN config on boot with wicked. (bsc#1166933)

- Adjust the service to start after network.target wrt bsc#1165266

Update to 2.9 release:

* SAE changes
  - disable use of groups using Brainpool curves
  - improved protection against side channel attacks
  [https://w1.fi/security/2019-6/]
* EAP-pwd changes
  - disable use of groups using Brainpool curves
  - allow the set of groups to be configured (eap_pwd_groups)
  - improved protection against side channel attacks
  [https://w1.fi/security/2019-6/]
* fixed FT-EAP initial mobility domain association using PMKSA caching
  (disabled by default for backwards compatibility; can be enabled
  with ft_eap_pmksa_caching=1)
* fixed a regression in OpenSSL 1.1+ engine loading
* added validation of RSNE in (Re)Association Response frames
* fixed DPP bootstrapping URI parser of channel list
* extended EAP-SIM/AKA fast re-authentication to allow use with FILS
* extended ca_cert_blob to support PEM format
* improved robustness of P2P Action frame scheduling
* added support for EAP-SIM/AKA using anonymous@realm identity
* fixed Hotspot 2.0 credential selection based on roaming consortium
  to ignore credentials without a specific EAP method
* added experimental support for EAP-TEAP peer (RFC 7170)
* added experimental support for EAP-TLS peer with TLS v1.3
* fixed a regression in WMM parameter configuration for a TDLS peer
* fixed a regression in operation with drivers that offload 802.1X
  4-way handshake
* fixed an ECDH operation corner case with OpenSSL
* SAE changes
  - added support for SAE Password Identifier
  - changed default configuration to enable only groups 19, 20, 21
    (i.e., disable groups 25 and 26) and disable all unsuitable groups
    completely based on REVmd changes
  - do not regenerate PWE unnecessarily when the AP uses the
    anti-clogging token mechanisms
  - fixed some association cases where both SAE and FT-SAE were enabled
    on both the station and the selected AP
  - started to prefer FT-SAE over SAE AKM if both are enabled
  - started to prefer FT-SAE over FT-PSK if both are enabled
  - fixed FT-SAE when SAE PMKSA caching is used
  - reject use of unsuitable groups based on new implementation guidance
    in REVmd (allow only FFC groups with prime &gt;= 3072 bits and ECC
    groups with prime &gt;= 256)
  - minimize timing and memory use differences in PWE derivation
    [https://w1.fi/security/2019-1/] (CVE-2019-9494, bsc#1131868)
* EAP-pwd changes
  - minimize timing and memory use differences in PWE derivation
    [https://w1.fi/security/2019-2/] (CVE-2019-9495, bsc#1131870)
  - verify server scalar/element
    [https://w1.fi/security/2019-4/] (CVE-2019-9497, CVE-2019-9498,
    CVE-2019-9499, bsc#1131874, bsc#1131872, bsc#1131871, bsc#1131644)
  - fix message reassembly issue with unexpected fragment
    [https://w1.fi/security/2019-5/] (CVE-2019-11555, bsc#1133640)
  - enforce rand,mask generation rules more strictly
  - fix a memory leak in PWE derivation
  - disallow ECC groups with a prime under 256 bits (groups 25, 26, and
    27)
  - SAE/EAP-pwd side-channel attack update
    [https://w1.fi/security/2019-6/] (CVE-2019-13377, bsc#1144443)
* fixed CONFIG_IEEE80211R=y (FT) build without CONFIG_FILS=y
* Hotspot 2.0 changes
  - do not indicate release number that is higher than the one
    AP supports
  - added support for release number 3
  - enable PMF automatically for network profiles created from
    credentials
* fixed OWE network profile saving
* fixed DPP network profile saving
* added support for RSN operating channel validation
  (CONFIG_OCV=y and network profile parameter ocv=1)
* added Multi-AP backhaul STA support
* fixed build with LibreSSL
* number of MKA/MACsec fixes and extensions
* extended domain_match and domain_suffix_match to allow list of values
* fixed dNSName matching in domain_match and domain_suffix_match when
  using wolfSSL
* started to prefer FT-EAP-SHA384 over WPA-EAP-SUITE-B-192 AKM if both
  are enabled
* extended nl80211 Connect and external authentication to support
  SAE, FT-SAE, FT-EAP-SHA384
* fixed KEK2 derivation for FILS+FT
* extended client_cert file to allow loading of a chain of PEM
  encoded certificates
* extended beacon reporting functionality
* extended D-Bus interface with number of new properties
* fixed a regression in FT-over-DS with mac80211-based drivers
* OpenSSL: allow systemwide policies to be overridden
* extended driver flags indication for separate 802.1X and PSK
  4-way handshake offload capability
* added support for random P2P Device/Interface Address use
* extended PEAP to derive EMSK to enable use with ERP/FILS
* extended WPS to allow SAE configuration to be added automatically
  for PSK (wps_cred_add_sae=1)
* removed support for the old D-Bus interface (CONFIG_CTRL_IFACE_DBUS)
* extended domain_match and domain_suffix_match to allow list of values
* added a RSN workaround for misbehaving PMF APs that advertise
  IGTK/BIP KeyID using incorrect byte order
* fixed PTK rekeying with FILS and FT
* fixed WPA packet number reuse with replayed messages and key
  reinstallation
  [https://w1.fi/security/2017-1/] (CVE-2017-13077, CVE-2017-13078,
  CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082,
  CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)
* fixed unauthenticated EAPOL-Key decryption in wpa_supplicant
  [https://w1.fi/security/2018-1/] (CVE-2018-14526)
* added support for FILS (IEEE 802.11ai) shared key authentication
* added support for OWE (Opportunistic Wireless Encryption, RFC 8110;
  and transition mode defined by WFA)
* added support for DPP (Wi-Fi Device Provisioning Protocol)
* added support for RSA 3k key case with Suite B 192-bit level
* fixed Suite B PMKSA caching not to update PMKID during each 4-way
  handshake
* fixed EAP-pwd pre-processing with PasswordHashHash
* added EAP-pwd client support for salted passwords
* fixed a regression in TDLS prohibited bit validation
* started to use estimated throughput to avoid undesired signal
  strength based roaming decision
* MACsec/MKA:
  - new macsec_linux driver interface support for the Linux
    kernel macsec module
  - number of fixes and extensions
* added support for external persistent storage of PMKSA cache
  (PMKSA_GET/PMKSA_ADD control interface commands; and
   MESH_PMKSA_GET/MESH_PMKSA_SET for the mesh case)
* fixed mesh channel configuration pri/sec switch case
* added support for beacon report
* large number of other fixes, cleanup, and extensions
* added support for randomizing local address for GAS queries
  (gas_rand_mac_addr parameter)
* fixed EAP-SIM/AKA/AKA' ext auth cases within TLS tunnel
* added option for using random WPS UUID (auto_uuid=1)
* added SHA256-hash support for OCSP certificate matching
* fixed EAP-AKA' to add AT_KDF into Synchronization-Failure
* fixed a regression in RSN pre-authentication candidate selection
* added option to configure allowed group management cipher suites
  (group_mgmt network profile parameter)
* removed all PeerKey functionality
* fixed nl80211 AP and mesh mode configuration regression with
  Linux 4.15 and newer
* added ap_isolate configuration option for AP mode
* added support for nl80211 to offload 4-way handshake into the driver
* added support for using wolfSSL cryptographic library
* SAE
  - added support for configuring SAE password separately of the
    WPA2 PSK/passphrase
  - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection
    for SAE;
    note: this is not backwards compatible, i.e., both the AP and
    station side implementations will need to be update at the same
    time to maintain interoperability
  - added support for Password Identifier
  - fixed FT-SAE PMKID matching
* Hotspot 2.0
  - added support for fetching of Operator Icon Metadata ANQP-element
  - added support for Roaming Consortium Selection element
  - added support for Terms and Conditions
  - added support for OSEN connection in a shared RSN BSS
  - added support for fetching Venue URL information
* added support for using OpenSSL 1.1.1
* FT
  - disabled PMKSA caching with FT since it is not fully functional
  - added support for SHA384 based AKM
  - added support for BIP ciphers BIP-CMAC-256, BIP-GMAC-128,
    BIP-GMAC-256 in addition to previously supported BIP-CMAC-128
  - fixed additional IE inclusion in Reassociation Request frame when
    using FT protocol

- CVE-2015-8041: Using O_WRONLY flag [http://w1.fi/security/2015-5/]		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-26"/>
	<updated date="2022-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131644">SUSE bug 1131644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131868">SUSE bug 1131868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131870">SUSE bug 1131870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131871">SUSE bug 1131871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131872">SUSE bug 1131872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131874">SUSE bug 1131874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133640">SUSE bug 1133640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144443">SUSE bug 1144443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156920">SUSE bug 1156920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165266">SUSE bug 1165266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166933">SUSE bug 1166933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167331">SUSE bug 1167331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182805">SUSE bug 1182805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194732">SUSE bug 1194732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194733">SUSE bug 1194733</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8041/">CVE-2015-8041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8041">CVE-2015-8041 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13077/">CVE-2017-13077 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13077">CVE-2017-13077 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13078">CVE-2017-13078 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13079">CVE-2017-13079 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13081">CVE-2017-13081 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13082/">CVE-2017-13082 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13082">CVE-2017-13082 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13086/">CVE-2017-13086 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13086">CVE-2017-13086 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13087">CVE-2017-13087 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13088">CVE-2017-13088 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14526">CVE-2018-14526 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11555/">CVE-2019-11555 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11555">CVE-2019-11555 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13377/">CVE-2019-13377 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13377">CVE-2019-13377 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9494/">CVE-2019-9494 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9494">CVE-2019-9494 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9495/">CVE-2019-9495 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9495">CVE-2019-9495 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9497/">CVE-2019-9497 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9497">CVE-2019-9497 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9498/">CVE-2019-9498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9498">CVE-2019-9498 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9499/">CVE-2019-9499 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9499">CVE-2019-9499 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23303/">CVE-2022-23303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23303">CVE-2022-23303 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23304/">CVE-2022-23304 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23304">CVE-2022-23304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696349" comment="wpa_supplicant-2.9-15.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149239" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1199475" ref_url="https://bugzilla.suse.com/1199475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011173.html" source="SUSE-SU"/>
		<description>
This update for postgresql14 fixes the following issues:
 
- CVE-2022-1552: Confine additional operations within 'security restricted operation' sandboxes (bsc#1199475).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-27"/>
	<updated date="2022-05-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199475">SUSE bug 1199475</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696350" comment="libecpg6-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696351" comment="libpq5-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696084" comment="libpq5-32bit-14.3-3.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149240" version="1" class="patch">
	<metadata>
		<title>Security update for openstack-neutron (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1189794" ref_url="https://bugzilla.suse.com/1189794" source="BUGZILLA"/>
		<reference ref_id="1190339" ref_url="https://bugzilla.suse.com/1190339" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-40085" ref_url="https://www.suse.com/security/cve/CVE-2021-40085/" source="CVE"/>
		<reference ref_id="CVE-2021-40797" ref_url="https://www.suse.com/security/cve/CVE-2021-40797/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011199.html" source="SUSE-SU"/>
		<description>
This update for openstack-neutron fixes the following issues:

- CVE-2021-40797: Fixed routes middleware memory leak for nonexistent controllers (bsc#1190339).
- CVE-2021-40085: Fixed arbitrary dnsmasq reconfiguration via extra_dhcp_opts (bsc#1189794).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189794">SUSE bug 1189794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190339">SUSE bug 1190339</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40085/">CVE-2021-40085 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40085">CVE-2021-40085 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-40797/">CVE-2021-40797 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40797">CVE-2021-40797 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009697246" comment="openstack-neutron-11.0.9~dev69-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697247" comment="openstack-neutron-dhcp-agent-11.0.9~dev69-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697248" comment="openstack-neutron-doc-11.0.9~dev69-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697249" comment="openstack-neutron-ha-tool-11.0.9~dev69-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697250" comment="openstack-neutron-l3-agent-11.0.9~dev69-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697251" comment="openstack-neutron-linuxbridge-agent-11.0.9~dev69-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697252" comment="openstack-neutron-macvtap-agent-11.0.9~dev69-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697253" comment="openstack-neutron-metadata-agent-11.0.9~dev69-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697254" comment="openstack-neutron-metering-agent-11.0.9~dev69-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697255" comment="openstack-neutron-openvswitch-agent-11.0.9~dev69-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697256" comment="openstack-neutron-server-11.0.9~dev69-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697257" comment="python-neutron-11.0.9~dev69-3.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149241" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1198351" ref_url="https://bugzilla.suse.com/1198351" source="BUGZILLA"/>
		<reference ref_id="1199350" ref_url="https://bugzilla.suse.com/1199350" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1270" ref_url="https://www.suse.com/security/cve/CVE-2022-1270/" source="CVE"/>
		<reference ref_id="CVE-2022-28463" ref_url="https://www.suse.com/security/cve/CVE-2022-28463/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011200.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2022-1270: Fixed a memory corruption issue when parsing MIFF files (bsc#1198351).
- CVE-2022-28463: Fixed buffer overflow in coders/cin.c (bsc#1199350).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198351">SUSE bug 1198351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199350">SUSE bug 1199350</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-1270/">CVE-2022-1270 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1270">CVE-2022-1270 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28463/">CVE-2022-28463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28463">CVE-2022-28463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696352" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696353" comment="ImageMagick-config-6-upstream-6.8.8.1-71.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696354" comment="libMagickCore-6_Q16-1-6.8.8.1-71.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696355" comment="libMagickWand-6_Q16-1-6.8.8.1-71.172.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149242" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1191959" ref_url="https://bugzilla.suse.com/1191959" source="BUGZILLA"/>
		<reference ref_id="1192735" ref_url="https://bugzilla.suse.com/1192735" source="BUGZILLA"/>
		<reference ref_id="1192741" ref_url="https://bugzilla.suse.com/1192741" source="BUGZILLA"/>
		<reference ref_id="1193316" ref_url="https://bugzilla.suse.com/1193316" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42096" ref_url="https://www.suse.com/security/cve/CVE-2021-42096/" source="CVE"/>
		<reference ref_id="CVE-2021-43331" ref_url="https://www.suse.com/security/cve/CVE-2021-43331/" source="CVE"/>
		<reference ref_id="CVE-2021-43332" ref_url="https://www.suse.com/security/cve/CVE-2021-43332/" source="CVE"/>
		<reference ref_id="CVE-2021-44227" ref_url="https://www.suse.com/security/cve/CVE-2021-44227/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011201.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2021-44227: Preventing list moderator or list member accessing the admin UI (bsc#1193316).
- CVE-2021-43332: Preventing list moderator from cracking the list admin password encrypted in a CSRF token (bsc#1192741).
- CVE-2021-43331: Fixed XSS in Cgi/options.py (bsc#1192735).
- CVE-2021-42096: Add protection against remote privilege escalation via csrf_token derived from admin password (bsc#1191959).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191959">SUSE bug 1191959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192735">SUSE bug 1192735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192741">SUSE bug 1192741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193316">SUSE bug 1193316</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-42096/">CVE-2021-42096 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42096">CVE-2021-42096 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43331/">CVE-2021-43331 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43331">CVE-2021-43331 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43332/">CVE-2021-43332 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43332">CVE-2021-43332 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-44227/">CVE-2021-44227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44227">CVE-2021-44227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696356" comment="mailman-2.1.17-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149243" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1194568" ref_url="https://bugzilla.suse.com/1194568" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4034" ref_url="https://www.suse.com/security/cve/CVE-2021-4034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010074.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-4034: Fixed a local privilege escalation in pkexec (bsc#1194568).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194568">SUSE bug 1194568</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4034/">CVE-2021-4034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4034">CVE-2021-4034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664690" comment="libpolkit0-0.113-5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664691" comment="polkit-0.113-5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664692" comment="typelib-1_0-Polkit-1_0-0.113-5.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149244" version="1" class="patch">
	<metadata>
		<title>Security update for librelp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1086730" ref_url="https://bugzilla.suse.com/1086730" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000140" ref_url="https://www.suse.com/security/cve/CVE-2018-1000140/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011210.html" source="SUSE-SU"/>
		<description>
This update for librelp fixes the following issues:

- CVE-2018-1000140: Fixed remote attack via specially crafted x509 certificates when connecting to rsyslog to trigger a stack buffer overflow and run arbitrary code (bsc#1086730).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086730">SUSE bug 1086730</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000140/">CVE-2018-1000140 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000140">CVE-2018-1000140 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696535" comment="librelp0-1.2.15-3.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149245" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-yajl-ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1198405" ref_url="https://bugzilla.suse.com/1198405" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24795" ref_url="https://www.suse.com/security/cve/CVE-2022-24795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011222.html" source="SUSE-SU"/>
		<description>

This update for rubygem-yajl-ruby fixes the following issue:

-CVE-2022-24795: Fixed a heap-based buffer overflow when handling large inputs due to an integer overflow (bsc#1198405)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-02"/>
	<updated date="2022-06-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198405">SUSE bug 1198405</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24795/">CVE-2022-24795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24795">CVE-2022-24795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697261" comment="ruby2.1-rubygem-yajl-ruby-1.3.1-4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149246" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1200027" ref_url="https://bugzilla.suse.com/1200027" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31736" ref_url="https://www.suse.com/security/cve/CVE-2022-31736/" source="CVE"/>
		<reference ref_id="CVE-2022-31737" ref_url="https://www.suse.com/security/cve/CVE-2022-31737/" source="CVE"/>
		<reference ref_id="CVE-2022-31738" ref_url="https://www.suse.com/security/cve/CVE-2022-31738/" source="CVE"/>
		<reference ref_id="CVE-2022-31739" ref_url="https://www.suse.com/security/cve/CVE-2022-31739/" source="CVE"/>
		<reference ref_id="CVE-2022-31740" ref_url="https://www.suse.com/security/cve/CVE-2022-31740/" source="CVE"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="CVE-2022-31742" ref_url="https://www.suse.com/security/cve/CVE-2022-31742/" source="CVE"/>
		<reference ref_id="CVE-2022-31747" ref_url="https://www.suse.com/security/cve/CVE-2022-31747/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011223.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.10.0 ESR (MFSA 2022-21)(bsc#1200027)

- CVE-2022-31736: Cross-Origin resource's length leaked
- CVE-2022-31737: Heap buffer overflow in WebGL
- CVE-2022-31738: Browser window spoof using fullscreen mode
- CVE-2022-31739: Attacker-influenced path traversal when saving downloaded files
- CVE-2022-31740: Register allocation problem in WASM on arm64
- CVE-2022-31741: Uninitialized variable leads to invalid memory read
- CVE-2022-31742: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information
- CVE-2022-31747: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-02"/>
	<updated date="2022-06-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31736/">CVE-2022-31736 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31736">CVE-2022-31736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31737/">CVE-2022-31737 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31737">CVE-2022-31737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31738/">CVE-2022-31738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31738">CVE-2022-31738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31739/">CVE-2022-31739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31739">CVE-2022-31739 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31740/">CVE-2022-31740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31740">CVE-2022-31740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31742/">CVE-2022-31742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31742">CVE-2022-31742 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31747/">CVE-2022-31747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31747">CVE-2022-31747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696357" comment="MozillaFirefox-91.10.0-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696358" comment="MozillaFirefox-devel-91.10.0-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696359" comment="MozillaFirefox-translations-common-91.10.0-112.114.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149247" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1194471" ref_url="https://bugzilla.suse.com/1194471" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010084.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194471">SUSE bug 1194471</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45079">CVE-2021-45079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664933" comment="strongswan-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664929" comment="strongswan-doc-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664934" comment="strongswan-hmac-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664935" comment="strongswan-ipsec-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664936" comment="strongswan-libs0-5.1.3-26.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149248" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1200027" ref_url="https://bugzilla.suse.com/1200027" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011255.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.4 (bsc#1200027)

* CVE-2022-31741: Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple.  (bmo#1767590)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-09"/>
	<updated date="2022-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696360" comment="libfreebl3-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696100" comment="libfreebl3-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696361" comment="libfreebl3-hmac-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696102" comment="libfreebl3-hmac-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696362" comment="libsoftokn3-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696104" comment="libsoftokn3-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696363" comment="libsoftokn3-hmac-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696106" comment="libsoftokn3-hmac-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696364" comment="mozilla-nss-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696108" comment="mozilla-nss-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696365" comment="mozilla-nss-certs-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696110" comment="mozilla-nss-certs-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697258" comment="mozilla-nss-devel-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696366" comment="mozilla-nss-sysinit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696113" comment="mozilla-nss-sysinit-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696367" comment="mozilla-nss-tools-3.68.4-58.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149249" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1191184" ref_url="https://bugzilla.suse.com/1191184" source="BUGZILLA"/>
		<reference ref_id="1191185" ref_url="https://bugzilla.suse.com/1191185" source="BUGZILLA"/>
		<reference ref_id="1191186" ref_url="https://bugzilla.suse.com/1191186" source="BUGZILLA"/>
		<reference ref_id="1193282" ref_url="https://bugzilla.suse.com/1193282" source="BUGZILLA"/>
		<reference ref_id="1197948" ref_url="https://bugzilla.suse.com/1197948" source="BUGZILLA"/>
		<reference ref_id="1198460" ref_url="https://bugzilla.suse.com/1198460" source="BUGZILLA"/>
		<reference ref_id="1198493" ref_url="https://bugzilla.suse.com/1198493" source="BUGZILLA"/>
		<reference ref_id="1198496" ref_url="https://bugzilla.suse.com/1198496" source="BUGZILLA"/>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3695" ref_url="https://www.suse.com/security/cve/CVE-2021-3695/" source="CVE"/>
		<reference ref_id="CVE-2021-3696" ref_url="https://www.suse.com/security/cve/CVE-2021-3696/" source="CVE"/>
		<reference ref_id="CVE-2021-3697" ref_url="https://www.suse.com/security/cve/CVE-2021-3697/" source="CVE"/>
		<reference ref_id="CVE-2022-28733" ref_url="https://www.suse.com/security/cve/CVE-2022-28733/" source="CVE"/>
		<reference ref_id="CVE-2022-28734" ref_url="https://www.suse.com/security/cve/CVE-2022-28734/" source="CVE"/>
		<reference ref_id="CVE-2022-28736" ref_url="https://www.suse.com/security/cve/CVE-2022-28736/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011257.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

Security fixes and hardenings for boothole 3 / boothole 2022 (bsc#1198581)

- CVE-2021-3695: Fixed that a crafted PNG grayscale image could lead to out-of-bounds write in heap (bsc#1191184)
- CVE-2021-3696: Fixed that a crafted PNG image could lead to out-of-bound write during huffman table handling (bsc#1191185)
- CVE-2021-3697: Fixed that a crafted JPEG image could lead to buffer underflow write in the heap (bsc#1191186)
- CVE-2022-28733: Fixed fragmentation math in net/ip (bsc#1198460)
- CVE-2022-28734: Fixed an out-of-bound write for split http headers (bsc#1198493)
- CVE-2022-28736: Fixed a use-after-free in chainloader command (bsc#1198496)
- Update SBAT security contact (bsc#1193282)
- Bump grub's SBAT generation to 2

- Use boot disks in OpenFirmware, fixing regression caused when the root LV is completely in the boot LUN (bsc#1197948)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-10"/>
	<updated date="2022-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191184">SUSE bug 1191184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191185">SUSE bug 1191185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191186">SUSE bug 1191186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193282">SUSE bug 1193282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197948">SUSE bug 1197948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198460">SUSE bug 1198460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198493">SUSE bug 1198493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198496">SUSE bug 1198496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3695/">CVE-2021-3695 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3695">CVE-2021-3695 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3696/">CVE-2021-3696 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3696">CVE-2021-3696 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3697/">CVE-2021-3697 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3697">CVE-2021-3697 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28733/">CVE-2022-28733 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28733">CVE-2022-28733 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-28734/">CVE-2022-28734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28734">CVE-2022-28734 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28736/">CVE-2022-28736 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28736">CVE-2022-28736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696536" comment="grub2-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696116" comment="grub2-i386-pc-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696118" comment="grub2-snapper-plugin-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696119" comment="grub2-systemd-sleep-plugin-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696120" comment="grub2-x86_64-efi-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696121" comment="grub2-x86_64-xen-2.02-137.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149250" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-sinatra (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1199138" ref_url="https://bugzilla.suse.com/1199138" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29970" ref_url="https://www.suse.com/security/cve/CVE-2022-29970/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011265.html" source="SUSE-SU"/>
		<description>
This update for rubygem-sinatra fixes the following issues:

- CVE-2022-29970: Fixed possible path traversal outside of public_dir when serving static files (bsc#1199138).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-11"/>
	<updated date="2022-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199138">SUSE bug 1199138</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29970/">CVE-2022-29970 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29970">CVE-2022-29970 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697262" comment="ruby2.1-rubygem-sinatra-1.4.6-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149251" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1055710" ref_url="https://bugzilla.suse.com/1055710" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1084513" ref_url="https://bugzilla.suse.com/1084513" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1126703" ref_url="https://bugzilla.suse.com/1126703" source="BUGZILLA"/>
		<reference ref_id="1158266" ref_url="https://bugzilla.suse.com/1158266" source="BUGZILLA"/>
		<reference ref_id="1173265" ref_url="https://bugzilla.suse.com/1173265" source="BUGZILLA"/>
		<reference ref_id="1182171" ref_url="https://bugzilla.suse.com/1182171" source="BUGZILLA"/>
		<reference ref_id="1183646" ref_url="https://bugzilla.suse.com/1183646" source="BUGZILLA"/>
		<reference ref_id="1183723" ref_url="https://bugzilla.suse.com/1183723" source="BUGZILLA"/>
		<reference ref_id="1187055" ref_url="https://bugzilla.suse.com/1187055" source="BUGZILLA"/>
		<reference ref_id="1191647" ref_url="https://bugzilla.suse.com/1191647" source="BUGZILLA"/>
		<reference ref_id="1195651" ref_url="https://bugzilla.suse.com/1195651" source="BUGZILLA"/>
		<reference ref_id="1196426" ref_url="https://bugzilla.suse.com/1196426" source="BUGZILLA"/>
		<reference ref_id="1197343" ref_url="https://bugzilla.suse.com/1197343" source="BUGZILLA"/>
		<reference ref_id="1198031" ref_url="https://bugzilla.suse.com/1198031" source="BUGZILLA"/>
		<reference ref_id="1198032" ref_url="https://bugzilla.suse.com/1198032" source="BUGZILLA"/>
		<reference ref_id="1198516" ref_url="https://bugzilla.suse.com/1198516" source="BUGZILLA"/>
		<reference ref_id="1198577" ref_url="https://bugzilla.suse.com/1198577" source="BUGZILLA"/>
		<reference ref_id="1198660" ref_url="https://bugzilla.suse.com/1198660" source="BUGZILLA"/>
		<reference ref_id="1198687" ref_url="https://bugzilla.suse.com/1198687" source="BUGZILLA"/>
		<reference ref_id="1198742" ref_url="https://bugzilla.suse.com/1198742" source="BUGZILLA"/>
		<reference ref_id="1198962" ref_url="https://bugzilla.suse.com/1198962" source="BUGZILLA"/>
		<reference ref_id="1198997" ref_url="https://bugzilla.suse.com/1198997" source="BUGZILLA"/>
		<reference ref_id="1199012" ref_url="https://bugzilla.suse.com/1199012" source="BUGZILLA"/>
		<reference ref_id="1199063" ref_url="https://bugzilla.suse.com/1199063" source="BUGZILLA"/>
		<reference ref_id="1199314" ref_url="https://bugzilla.suse.com/1199314" source="BUGZILLA"/>
		<reference ref_id="1199426" ref_url="https://bugzilla.suse.com/1199426" source="BUGZILLA"/>
		<reference ref_id="1199505" ref_url="https://bugzilla.suse.com/1199505" source="BUGZILLA"/>
		<reference ref_id="1199507" ref_url="https://bugzilla.suse.com/1199507" source="BUGZILLA"/>
		<reference ref_id="1199605" ref_url="https://bugzilla.suse.com/1199605" source="BUGZILLA"/>
		<reference ref_id="1199650" ref_url="https://bugzilla.suse.com/1199650" source="BUGZILLA"/>
		<reference ref_id="1199785" ref_url="https://bugzilla.suse.com/1199785" source="BUGZILLA"/>
		<reference ref_id="1200143" ref_url="https://bugzilla.suse.com/1200143" source="BUGZILLA"/>
		<reference ref_id="1200144" ref_url="https://bugzilla.suse.com/1200144" source="BUGZILLA"/>
		<reference ref_id="1200249" ref_url="https://bugzilla.suse.com/1200249" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13695" ref_url="https://www.suse.com/security/cve/CVE-2017-13695/" source="CVE"/>
		<reference ref_id="CVE-2018-20784" ref_url="https://www.suse.com/security/cve/CVE-2018-20784/" source="CVE"/>
		<reference ref_id="CVE-2018-7755" ref_url="https://www.suse.com/security/cve/CVE-2018-7755/" source="CVE"/>
		<reference ref_id="CVE-2019-19377" ref_url="https://www.suse.com/security/cve/CVE-2019-19377/" source="CVE"/>
		<reference ref_id="CVE-2020-10769" ref_url="https://www.suse.com/security/cve/CVE-2020-10769/" source="CVE"/>
		<reference ref_id="CVE-2021-20292" ref_url="https://www.suse.com/security/cve/CVE-2021-20292/" source="CVE"/>
		<reference ref_id="CVE-2021-20321" ref_url="https://www.suse.com/security/cve/CVE-2021-20321/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-33061" ref_url="https://www.suse.com/security/cve/CVE-2021-33061/" source="CVE"/>
		<reference ref_id="CVE-2021-38208" ref_url="https://www.suse.com/security/cve/CVE-2021-38208/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1184" ref_url="https://www.suse.com/security/cve/CVE-2022-1184/" source="CVE"/>
		<reference ref_id="CVE-2022-1353" ref_url="https://www.suse.com/security/cve/CVE-2022-1353/" source="CVE"/>
		<reference ref_id="CVE-2022-1419" ref_url="https://www.suse.com/security/cve/CVE-2022-1419/" source="CVE"/>
		<reference ref_id="CVE-2022-1516" ref_url="https://www.suse.com/security/cve/CVE-2022-1516/" source="CVE"/>
		<reference ref_id="CVE-2022-1652" ref_url="https://www.suse.com/security/cve/CVE-2022-1652/" source="CVE"/>
		<reference ref_id="CVE-2022-1729" ref_url="https://www.suse.com/security/cve/CVE-2022-1729/" source="CVE"/>
		<reference ref_id="CVE-2022-1734" ref_url="https://www.suse.com/security/cve/CVE-2022-1734/" source="CVE"/>
		<reference ref_id="CVE-2022-1974" ref_url="https://www.suse.com/security/cve/CVE-2022-1974/" source="CVE"/>
		<reference ref_id="CVE-2022-1975" ref_url="https://www.suse.com/security/cve/CVE-2022-1975/" source="CVE"/>
		<reference ref_id="CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123/" source="CVE"/>
		<reference ref_id="CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125/" source="CVE"/>
		<reference ref_id="CVE-2022-21127" ref_url="https://www.suse.com/security/cve/CVE-2022-21127/" source="CVE"/>
		<reference ref_id="CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166/" source="CVE"/>
		<reference ref_id="CVE-2022-21180" ref_url="https://www.suse.com/security/cve/CVE-2022-21180/" source="CVE"/>
		<reference ref_id="CVE-2022-21499" ref_url="https://www.suse.com/security/cve/CVE-2022-21499/" source="CVE"/>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to 3.12.31 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-1975: Fixed a bug that allows an attacker to crash the linux kernel by simulating nfc device from user-space. (bsc#1200143)
- CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144)
- CVE-2019-19377: Fixed an user-after-free that could be triggered when an attacker mounts a crafted btrfs filesystem image. (bnc#1158266)
- CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).
- CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)
- CVE-2022-21499: Reinforce the kernel lockdown feature, until now it's been trivial to break out of it with kgdb or kdb. (bsc#1199426)
- CVE-2017-13695: Fixed a bug that caused a stack dump allowing local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted ACPI table. (bnc#1055710)
- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).
- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)
- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).
- CVE-2021-28688: Fixed XSA-365 that includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains (bnc#1183646).
- CVE-2020-10769: Fixed a buffer over-read flaw in the IPsec Cryptographic algorithm's module. This flaw allowed a local attacker with user privileges to cause a denial of service. (bnc#1173265)
- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).
- CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012).
- CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc#1191647).
- CVE-2018-7755: Fixed an issue in the fd_locked_ioctl function in drivers/block/floppy.c. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR (bnc#1084513).
- CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742).
- CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055).
- CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c. (bnc#1198516)
- CVE-2018-20784: Fixed a denial of service (infinite loop in update_blocked_averages) by mishandled leaf cfs_rq in kernel/sched/fair.c (bnc#1126703).
- CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc#1183723).
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel (bnc#1198032).
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bnc#1197343)

The following non-security bugs were fixed:

- btrfs: tree-checker: fix incorrect printk format (bsc#1200249).
- net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651).
- net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651).
- PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314).
- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900 bsc#1198660 ltc#197803).
- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729 bsc#1198660 ltc#197803).
- vmbus: do not return values for uninitalized channels (bsc#1051510 bsc#1198997).
- vt: vt_ioctl: fix race in VT_RESIZEX (bsc#1199785).
- x86/hyperv: Read TSC frequency from a synthetic MSR (bsc#1198962).
- x86/speculation: Fix redundant MDS mitigation message (bsc#1199650).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-14"/>
	<updated date="2022-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055710">SUSE bug 1055710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084513">SUSE bug 1084513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126703">SUSE bug 1126703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158266">SUSE bug 1158266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173265">SUSE bug 1173265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182171">SUSE bug 1182171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183646">SUSE bug 1183646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183723">SUSE bug 1183723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187055">SUSE bug 1187055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191647">SUSE bug 1191647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195651">SUSE bug 1195651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196426">SUSE bug 1196426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197343">SUSE bug 1197343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198031">SUSE bug 1198031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198032">SUSE bug 1198032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198516">SUSE bug 1198516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198577">SUSE bug 1198577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198660">SUSE bug 1198660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198687">SUSE bug 1198687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198742">SUSE bug 1198742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198962">SUSE bug 1198962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198997">SUSE bug 1198997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199012">SUSE bug 1199012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199063">SUSE bug 1199063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199314">SUSE bug 1199314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199426">SUSE bug 1199426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199505">SUSE bug 1199505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199507">SUSE bug 1199507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199605">SUSE bug 1199605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199650">SUSE bug 1199650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199785">SUSE bug 1199785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200143">SUSE bug 1200143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200144">SUSE bug 1200144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200249">SUSE bug 1200249</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13695/">CVE-2017-13695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13695">CVE-2017-13695 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20784/">CVE-2018-20784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20784">CVE-2018-20784 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7755/">CVE-2018-7755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7755">CVE-2018-7755 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19377/">CVE-2019-19377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19377">CVE-2019-19377 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10769/">CVE-2020-10769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10769">CVE-2020-10769 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20292/">CVE-2021-20292 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20292">CVE-2021-20292 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20321/">CVE-2021-20321 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20321">CVE-2021-20321 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33061/">CVE-2021-33061 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33061">CVE-2021-33061 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38208/">CVE-2021-38208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38208">CVE-2021-38208 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1184/">CVE-2022-1184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1184">CVE-2022-1184 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1353/">CVE-2022-1353 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1353">CVE-2022-1353 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1419/">CVE-2022-1419 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1419">CVE-2022-1419 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1516/">CVE-2022-1516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1516">CVE-2022-1516 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1652/">CVE-2022-1652 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1652">CVE-2022-1652 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1729/">CVE-2022-1729 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1729">CVE-2022-1729 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1734/">CVE-2022-1734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1974/">CVE-2022-1974 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1974">CVE-2022-1974 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1975/">CVE-2022-1975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1975">CVE-2022-1975 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123">CVE-2022-21123 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21125">CVE-2022-21125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21127/">CVE-2022-21127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21127">CVE-2022-21127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166">CVE-2022-21166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21180/">CVE-2022-21180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21180">CVE-2022-21180 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21499/">CVE-2022-21499 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21499">CVE-2022-21499 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28388">CVE-2022-28388 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28390">CVE-2022-28390 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696537" comment="kernel-default-4.4.180-94.164.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696538" comment="kernel-default-base-4.4.180-94.164.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696539" comment="kernel-default-devel-4.4.180-94.164.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696611" comment="kernel-default-kgraft-4.4.180-94.164.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696126" comment="kernel-devel-4.4.180-94.164.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696127" comment="kernel-macros-4.4.180-94.164.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696128" comment="kernel-source-4.4.180-94.164.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696540" comment="kernel-syms-4.4.180-94.164.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696613" comment="kgraft-patch-4_4_180-94_164-default-1-4.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149252" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1199287" ref_url="https://bugzilla.suse.com/1199287" source="BUGZILLA"/>
		<reference ref_id="1200106" ref_url="https://bugzilla.suse.com/1200106" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26700" ref_url="https://www.suse.com/security/cve/CVE-2022-26700/" source="CVE"/>
		<reference ref_id="CVE-2022-26709" ref_url="https://www.suse.com/security/cve/CVE-2022-26709/" source="CVE"/>
		<reference ref_id="CVE-2022-26716" ref_url="https://www.suse.com/security/cve/CVE-2022-26716/" source="CVE"/>
		<reference ref_id="CVE-2022-26717" ref_url="https://www.suse.com/security/cve/CVE-2022-26717/" source="CVE"/>
		<reference ref_id="CVE-2022-26719" ref_url="https://www.suse.com/security/cve/CVE-2022-26719/" source="CVE"/>
		<reference ref_id="CVE-2022-30293" ref_url="https://www.suse.com/security/cve/CVE-2022-30293/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011295.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.3 (bsc#1200106)

- CVE-2022-30293: Fixed heap-based buffer overflow in WebCore::TextureMapperLayer::setContentsLayer (bsc#1199287).
- CVE-2022-26700: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26709: Fixed use after free issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26716: Fixed use after free issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26717: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26719: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-15"/>
	<updated date="2022-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199287">SUSE bug 1199287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200106">SUSE bug 1200106</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26700/">CVE-2022-26700 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26700">CVE-2022-26700 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26709/">CVE-2022-26709 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26709">CVE-2022-26709 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26716/">CVE-2022-26716 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26716">CVE-2022-26716 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26717/">CVE-2022-26717 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26717">CVE-2022-26717 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26719/">CVE-2022-26719 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26719">CVE-2022-26719 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30293/">CVE-2022-30293 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30293">CVE-2022-30293 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696381" comment="libjavascriptcoregtk-4_0-18-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696382" comment="libwebkit2gtk-4_0-37-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696133" comment="libwebkit2gtk3-lang-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696383" comment="typelib-1_0-JavaScriptCore-4_0-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696384" comment="typelib-1_0-WebKit2-4_0-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696385" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696386" comment="webkit2gtk-4_0-injected-bundles-2.36.3-2.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149253" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1199166" ref_url="https://bugzilla.suse.com/1199166" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1292" ref_url="https://www.suse.com/security/cve/CVE-2022-1292/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011296.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:
	  
- CVE-2022-1292: Fixed command injection in c_rehash (bsc#1199166).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-16"/>
	<updated date="2022-06-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199166">SUSE bug 1199166</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1292/">CVE-2022-1292 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696388" comment="libopenssl-devel-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696389" comment="libopenssl1_0_0-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696140" comment="libopenssl1_0_0-32bit-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696390" comment="libopenssl1_0_0-hmac-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696142" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696391" comment="openssl-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696144" comment="openssl-doc-1.0.2j-60.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149254" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1200338" ref_url="https://bugzilla.suse.com/1200338" source="BUGZILLA"/>
		<reference ref_id="1200340" ref_url="https://bugzilla.suse.com/1200340" source="BUGZILLA"/>
		<reference ref_id="1200341" ref_url="https://bugzilla.suse.com/1200341" source="BUGZILLA"/>
		<reference ref_id="1200345" ref_url="https://bugzilla.suse.com/1200345" source="BUGZILLA"/>
		<reference ref_id="1200348" ref_url="https://bugzilla.suse.com/1200348" source="BUGZILLA"/>
		<reference ref_id="1200350" ref_url="https://bugzilla.suse.com/1200350" source="BUGZILLA"/>
		<reference ref_id="1200352" ref_url="https://bugzilla.suse.com/1200352" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26377" ref_url="https://www.suse.com/security/cve/CVE-2022-26377/" source="CVE"/>
		<reference ref_id="CVE-2022-28614" ref_url="https://www.suse.com/security/cve/CVE-2022-28614/" source="CVE"/>
		<reference ref_id="CVE-2022-28615" ref_url="https://www.suse.com/security/cve/CVE-2022-28615/" source="CVE"/>
		<reference ref_id="CVE-2022-29404" ref_url="https://www.suse.com/security/cve/CVE-2022-29404/" source="CVE"/>
		<reference ref_id="CVE-2022-30522" ref_url="https://www.suse.com/security/cve/CVE-2022-30522/" source="CVE"/>
		<reference ref_id="CVE-2022-30556" ref_url="https://www.suse.com/security/cve/CVE-2022-30556/" source="CVE"/>
		<reference ref_id="CVE-2022-31813" ref_url="https://www.suse.com/security/cve/CVE-2022-31813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011297.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-26377: Fixed possible request smuggling in mod_proxy_ajp (bsc#1200338)
- CVE-2022-28614: Fixed read beyond bounds via ap_rwrite() (bsc#1200340)
- CVE-2022-28615: Fixed read beyond bounds in ap_strcmp_match() (bsc#1200341)
- CVE-2022-29404: Fixed denial of service in mod_lua r:parsebody (bsc#1200345)
- CVE-2022-30556: Fixed information disclosure in mod_lua with websockets (bsc#1200350)
- CVE-2022-30522: Fixed mod_sed denial of service (bsc#1200352)
- CVE-2022-31813: Fixed mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism (bsc#1200348)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-16"/>
	<updated date="2022-06-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200338">SUSE bug 1200338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200340">SUSE bug 1200340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200341">SUSE bug 1200341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200345">SUSE bug 1200345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200348">SUSE bug 1200348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200350">SUSE bug 1200350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200352">SUSE bug 1200352</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-26377/">CVE-2022-26377 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26377">CVE-2022-26377 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28614/">CVE-2022-28614 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28614">CVE-2022-28614 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28615/">CVE-2022-28615 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28615">CVE-2022-28615 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29404/">CVE-2022-29404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29404">CVE-2022-29404 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30522/">CVE-2022-30522 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30522">CVE-2022-30522 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30556/">CVE-2022-30556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30556">CVE-2022-30556 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-31813/">CVE-2022-31813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31813">CVE-2022-31813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696392" comment="apache2-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696146" comment="apache2-doc-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696393" comment="apache2-example-pages-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696394" comment="apache2-prefork-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696395" comment="apache2-utils-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696396" comment="apache2-worker-2.4.23-29.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149255" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1196739" ref_url="https://bugzilla.suse.com/1196739" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21716" ref_url="https://www.suse.com/security/cve/CVE-2022-21716/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011312.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

- CVE-2022-21716: Fixed that ssh server accepts an infinite amount of data using all the available memory (bsc#1196739).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-20"/>
	<updated date="2022-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196739">SUSE bug 1196739</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21716/">CVE-2022-21716 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21716">CVE-2022-21716 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697259" comment="python-Twisted-15.2.1-9.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149256" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010124.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2022-23307: Fix deserialization issue by removing the chainsaw sub-package. (bsc#1194844)
- CVE-2022-23305: Fix SQL injection by removing src/main/java/org/apache/log4j/jdbc/JDBCAppender.java. (bsc#1194843)
- CVE-2022-23302: Fix remote code execution by removing src/main/java/org/apache/log4j/net/JMSSink.java. (bsc#1194842)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-27"/>
	<updated date="2022-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23302">CVE-2022-23302 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23305">CVE-2022-23305 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23307">CVE-2022-23307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664687" comment="log4j-1.2.15-126.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149257" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1181223" ref_url="https://bugzilla.suse.com/1181223" source="BUGZILLA"/>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1190462" ref_url="https://bugzilla.suse.com/1190462" source="BUGZILLA"/>
		<reference ref_id="1190535" ref_url="https://bugzilla.suse.com/1190535" source="BUGZILLA"/>
		<reference ref_id="1193600" ref_url="https://bugzilla.suse.com/1193600" source="BUGZILLA"/>
		<reference ref_id="1194873" ref_url="https://bugzilla.suse.com/1194873" source="BUGZILLA"/>
		<reference ref_id="1195726" ref_url="https://bugzilla.suse.com/1195726" source="BUGZILLA"/>
		<reference ref_id="1195727" ref_url="https://bugzilla.suse.com/1195727" source="BUGZILLA"/>
		<reference ref_id="1195728" ref_url="https://bugzilla.suse.com/1195728" source="BUGZILLA"/>
		<reference ref_id="1196338" ref_url="https://bugzilla.suse.com/1196338" source="BUGZILLA"/>
		<reference ref_id="1196704" ref_url="https://bugzilla.suse.com/1196704" source="BUGZILLA"/>
		<reference ref_id="1197507" ref_url="https://bugzilla.suse.com/1197507" source="BUGZILLA"/>
		<reference ref_id="1197689" ref_url="https://bugzilla.suse.com/1197689" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36222" ref_url="https://www.suse.com/security/cve/CVE-2021-36222/" source="CVE"/>
		<reference ref_id="CVE-2021-3711" ref_url="https://www.suse.com/security/cve/CVE-2021-3711/" source="CVE"/>
		<reference ref_id="CVE-2021-39226" ref_url="https://www.suse.com/security/cve/CVE-2021-39226/" source="CVE"/>
		<reference ref_id="CVE-2021-41174" ref_url="https://www.suse.com/security/cve/CVE-2021-41174/" source="CVE"/>
		<reference ref_id="CVE-2021-41244" ref_url="https://www.suse.com/security/cve/CVE-2021-41244/" source="CVE"/>
		<reference ref_id="CVE-2021-43798" ref_url="https://www.suse.com/security/cve/CVE-2021-43798/" source="CVE"/>
		<reference ref_id="CVE-2021-43813" ref_url="https://www.suse.com/security/cve/CVE-2021-43813/" source="CVE"/>
		<reference ref_id="CVE-2021-43815" ref_url="https://www.suse.com/security/cve/CVE-2021-43815/" source="CVE"/>
		<reference ref_id="CVE-2022-21673" ref_url="https://www.suse.com/security/cve/CVE-2022-21673/" source="CVE"/>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<reference ref_id="CVE-2022-21702" ref_url="https://www.suse.com/security/cve/CVE-2022-21702/" source="CVE"/>
		<reference ref_id="CVE-2022-21703" ref_url="https://www.suse.com/security/cve/CVE-2022-21703/" source="CVE"/>
		<reference ref_id="CVE-2022-21713" ref_url="https://www.suse.com/security/cve/CVE-2022-21713/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011316.html" source="SUSE-SU"/>
		<description>
This update fixes the following issues:

golang-github-QubitProducts-exporter_exporter:

- Adapted to build on Enterprise Linux.
- Fix build for RedHat 7
- Require Go &gt;= 1.14 also for CentOS
- Add support for CentOS
- Replace %{?systemd_requires} with %{?systemd_ordering}

golang-github-prometheus-alertmanager:

- CVE-2022-21698: Denial of service using InstrumentHandlerCounter.
  * Update vendor tarball with prometheus/client_golang 1.11.1  (bsc#1196338, jsc#SLE-24077)
- Update required Go version to 1.16
- Update to version 0.23.0:
  * amtool: Detect version drift and warn users (#2672)
  * Add ability to skip TLS verification for amtool (#2663)
  * Fix empty isEqual in amtool. (#2668)
  * Fix main tests (#2670)
  * cli: add new template render command (#2538)
  * OpsGenie: refer to alert instead of incident (#2609)
  * Docs: target_match and source_match are DEPRECATED (#2665)
  * Fix test not waiting for cluster member to be ready
- Added hardening to systemd service(s) (bsc#1181400)

golang-github-prometheus-node_exporter:

- CVE-2022-21698: Denial of service using InstrumentHandlerCounter.
  * Update vendor tarball with prometheus/client_golang 1.11.1
  (bsc#1196338, jsc#SLE-24238, jsc#SLE-24239)
- Update to 1.3.0
  * [CHANGE] Add path label to rapl collector #2146
  * [CHANGE] Exclude filesystems under /run/credentials #2157
  * [CHANGE] Add TCPTimeouts to netstat default filter #2189
  * [FEATURE] Add lnstat collector for metrics from /proc/net/stat/ #1771
  * [FEATURE] Add darwin powersupply collector #1777
  * [FEATURE] Add support for monitoring GPUs on Linux #1998
  * [FEATURE] Add Darwin thermal collector #2032
  * [FEATURE] Add os release collector #2094
  * [FEATURE] Add netdev.address-info collector #2105
  * [FEATURE] Add clocksource metrics to time collector #2197
  * [ENHANCEMENT] Support glob textfile collector directories #1985
  * [ENHANCEMENT] ethtool: Expose node_ethtool_info metric #2080
  * [ENHANCEMENT] Use include/exclude flags for ethtool filtering #2165
  * [ENHANCEMENT] Add flag to disable guest CPU metrics #2123
  * [ENHANCEMENT] Add DMI collector #2131
  * [ENHANCEMENT] Add threads metrics to processes collector #2164
  * [ENHANCMMENT] Reduce timer GC delays in the Linux filesystem collector #2169
  * [ENHANCMMENT] Add TCPTimeouts to netstat default filter #2189
  * [ENHANCMMENT] Use SysctlTimeval for boottime collector on BSD #2208
  * [BUGFIX] ethtool: Sanitize metric names #2093
  * [BUGFIX] Fix ethtool collector for multiple interfaces #2126
  * [BUGFIX] Fix possible panic on macOS #2133
  * [BUGFIX] Collect flag_info and bug_info only for one core #2156
  * [BUGFIX] Prevent duplicate ethtool metric names #2187
- Update to 1.2.2
  * Bug fixes
     Fix processes collector long int parsing #2112
- Update to 1.2.1
  * Removed
     Remove obsolete capture permission denied error patch that is already included upstream
     Fix zoneinfo parsing prometheus/procfs#386
     Fix nvme collector log noise #2091
     Fix rapl collector log noise #2092
- Update to 1.2.0
  * Changes
     Rename filesystem collector flags to match other collectors #2012
     Make node_exporter print usage to STDOUT #203
  * Features
     Add conntrack statistics metrics #1155
     Add ethtool stats collector #1832
     Add flag to ignore network speed if it is unknown #1989
     Add tapestats collector for Linux #2044
     Add nvme collector #2062
  * Enhancements
     Add ErrorLog plumbing to promhttp #1887
     Add more Infiniband counters #2019
     netclass: retrieve interface names and filter before parsing #2033
     Add time zone offset metric #2060
     Handle errors from disabled PSI subsystem #1983
     Fix panic when using backwards compatible flags #2000
     Fix wrong value for OpenBSD memory buffer cache #2015
     Only initiate collectors once #2048
     Handle small backwards jumps in CPU idle #2067
- Apply patch to capture permission denied error for 'energy_uj' file (bsc#1190535)

grafana:

- Update to version 8.3.5 (jsc#SLE-23439, jsc#SLE-23422)
  + Security:
    * Fixes XSS vulnerability in handling data sources
      (bsc#1195726, CVE-2022-21702)
    * Fixes cross-origin request forgery vulnerability
      (bsc#1195727, CVE-2022-21703)
    * Fixes Insecure Direct Object Reference vulnerability in Teams
      API (bsc#1195728, CVE-2022-21713)
- Update to Go 1.17.
- Add build-time dependency on `wire`.
- Update license to GNU Affero General Public License v3.0.
- Update to version 8.3.4
    * GetUserInfo: return an error if no user was found
      (bsc#1194873, CVE-2022-21673)
  + Features and enhancements:
    * Alerting: Allow configuration of non-ready alertmanagers.
    * Alerting: Allow customization of Google chat message.
    * AppPlugins: Support app plugins with only default nav.
    * InfluxDB: query editor: skip fields in metadata queries.
    * Postgres/MySQL/MSSQL: Cancel in-flight SQL query if user
      cancels query in grafana.
    * Prometheus: Forward oauth tokens after prometheus datasource
      migration.
  + Bug fixes:
    * Azure Monitor: Bug fix for variable interpolations in metrics
      dropdowns.
    * Azure Monitor: Improved error messages for variable queries.
    * CloudMonitoring: Fixes broken variable queries that use group
      bys.
    * Configuration: You can now see your expired API keys if you
      have no active ones.
    * Elasticsearch: Fix handling multiple datalinks for a single
      field.
    * Export: Fix error being thrown when exporting dashboards
      using query variables that reference the default datasource.
    * ImportDashboard: Fixes issue with importing dashboard and
      name ending up in uid.
    * Login: Page no longer overflows on mobile.
    * Plugins: Set backend metadata property for core plugins.
    * Prometheus: Fill missing steps with null values.
    * Prometheus: Fix interpolation of $__rate_interval variable.
    * Prometheus: Interpolate variables with curly brackets syntax.
    * Prometheus: Respect the http-method data source setting.
    * Table: Fixes issue with field config applied to wrong fields
      when hiding columns.
    * Toolkit: Fix bug with rootUrls not being properly parsed when
      signing a private plugin.
    * Variables: Fix so data source variables are added to adhoc
      configuration.
  + Plugin development fixes &amp; changes:
    * Toolkit: Revert build config so tslib is bundled with plugins
      to prevent plugins from crashing.
- Update to version 8.3.3:
    * BarChart: Use new data error view component to show actions
      in panel edit.
    * CloudMonitor: Iterate over pageToken for resources.
    * Macaron: Prevent WriteHeader invalid HTTP status code panic.
    * AnnoListPanel: Fix interpolation of variables in tags.
    * CloudWatch: Allow queries to have no dimensions specified.
    * CloudWatch: Fix broken queries for users migrating from
      8.2.4/8.2.5 to 8.3.0.
    * CloudWatch: Make sure MatchExact flag gets the right value.
    * Dashboards: Fix so that empty folders can be deleted from the
      manage dashboards/folders page.
    * InfluxDB: Improve handling of metadata query errors in
      InfluxQL.
    * Loki: Fix adding of ad hoc filters for queries with parser
      and line_format expressions.
    * Prometheus: Fix running of exemplar queries for non-histogram
      metrics.
    * Prometheus: Interpolate template variables in interval.
    * StateTimeline: Fix toolitp not showing when for frames with
      multiple fields.
    * TraceView: Fix virtualized scrolling when trace view is
      opened in right pane in Explore.
    * Variables: Fix repeating panels for on time range changed
      variables.
    * Variables: Fix so queryparam option works for scoped
- Update to version 8.3.2
  + Security: Fixes CVE-2021-43813 and CVE-2021-43815.
- Update to version 8.3.1
  + Security: Fixes CVE-2021-43798.
- Update to version 8.3.0
    * Alerting: Prevent folders from being deleted when they
      contain alerts.
    * Alerting: Show full preview value in tooltip.
    * BarGauge: Limit title width when name is really long.
    * CloudMonitoring: Avoid to escape regexps in filters.
    * CloudWatch: Add support for AWS Metric Insights.
    * TooltipPlugin: Remove other panels' shared tooltip in edit
      panel.
    * Visualizations: Limit y label width to 40% of visualization
      width.
    * Alerting: Clear alerting rule evaluation errors after
      intermittent failures.
    * Alerting: Fix refresh on legacy Alert List panel.
    * Dashboard: Fix queries for panels with non-integer widths.
    * Explore: Fix url update inconsistency.
    * Prometheus: Fix range variables interpolation for time ranges
      smaller than 1 second.
    * ValueMappings: Fixes issue with regex value mapping that only
      sets color.
- Update to version 8.3.0-beta2
  + Breaking changes:
    * Grafana 8 Alerting enabled by default for installations that
      do not use legacy alerting.
    * Keep Last State for 'If execution error or timeout' when
      upgrading to Grafana 8 alerting.
    * Alerting: Create DatasourceError alert if evaluation returns
      error.
    * Alerting: Make Unified Alerting enabled by default for those
      who do not use legacy alerting.
    * Alerting: Support mute timings configuration through the api
      for the embedded alert manager.
    * CloudWatch: Add missing AWS/Events metrics.
    * Docs: Add easier to find deprecation notices to certain data
      sources and to the changelog.
    * Plugins Catalog: Enable install controls based on the
      pluginAdminEnabled flag.
    * Table: Add space between values for the DefaultCell and
      JSONViewCell.
    * Tracing: Make query editors available in dashboard for Tempo
      and Zipkin.
    * AccessControl: Renamed orgs roles, removed fixed:orgs:reader
      introduced in beta1.
    * Azure Monitor: Add trap focus for modals in grafana/ui and
      other small a11y fixes for Azure Monitor.
    * CodeEditor: Prevent suggestions from being clipped.
    * Dashboard: Fix cache timeout persistence.
    * Datasource: Fix stable sort order of query responses.
    * Explore: Fix error in query history when removing last item.
    * Logs: Fix requesting of older logs when flipped order.
    * Prometheus: Fix running of health check query based on access
      mode.
    * TextPanel: Fix suggestions for existing panels.
    * Tracing: Fix incorrect indentations due to reoccurring
      spanIDs.
    * Tracing: Show start time of trace with milliseconds
      precision.
    * Variables: Make renamed or missing variable section
      expandable.
    * Select: Select menus now properly scroll during keyboard
      navigation.
- Update to version 8.3.0-beta1
    * Alerting: Add UI for contact point testing with custom
      annotations and labels.
    * Alerting: Make alert state indicator in panel header work
      with Grafana 8 alerts.
    * Alerting: Option for Discord notifier to use webhook name.
    * Annotations: Deprecate AnnotationsSrv.
    * Auth: Omit all base64 paddings in JWT tokens for the JWT
      auth.
    * Azure Monitor: Clean up fields when editing Metrics.
    * AzureMonitor: Add new starter dashboards.
    * AzureMonitor: Add starter dashboard for app monitoring with
      Application Insights.
    * Barchart/Time series: Allow x axis label.
    * CLI: Improve error handling for installing plugins.
    * CloudMonitoring: Migrate to use backend plugin SDK contracts.
    * CloudWatch Logs: Add retry strategy for hitting max
      concurrent queries.
    * CloudWatch: Add AWS RoboMaker metrics and dimension.
    * CloudWatch: Add AWS Transfer metrics and dimension.
    * Dashboard: replace datasource name with a reference object.
    * Dashboards: Show logs on time series when hovering.
    * Elasticsearch: Add support for Elasticsearch 8.0 (Beta).
    * Elasticsearch: Add time zone setting to Date Histogram
      aggregation.
    * Elasticsearch: Enable full range log volume histogram.
    * Elasticsearch: Full range logs volume.
    * Explore: Allow changing the graph type.
    * Explore: Show ANSI colors when highlighting matched words in
      the logs panel.
    * Graph(old) panel: Listen to events from Time series panel.
    * Import: Load gcom dashboards from URL.
    * LibraryPanels: Improves export and import of library panels
      between orgs.
    * OAuth: Support PKCE.
    * Panel edit: Overrides now highlight correctly when searching.
    * PanelEdit: Display drag indicators on draggable sections.
    * Plugins: Refactor Plugin Management.
    * Prometheus: Add custom query parameters when creating
      PromLink url.
    * Prometheus: Remove limits on metrics, labels, and values in
      Metrics Browser.
    * StateTimeline: Share cursor with rest of the panels.
    * Tempo: Add error details when json upload fails.
    * Tempo: Add filtering for service graph query.
    * Tempo: Add links to nodes in Service Graph pointing to
      Prometheus metrics.
    * Time series/Bar chart panel: Add ability to sort series via
      legend.
    * TimeSeries: Allow multiple axes for the same unit.
    * TraceView: Allow span links defined on dataFrame.
    * Transformations: Support a rows mode in labels to fields.
    * ValueMappings: Don't apply field config defaults to time
      fields.
    * Variables: Only update panels that are impacted by variable
      change.
    * API: Fix dashboard quota limit for imports.
    * Alerting: Fix rule editor issues with Azure Monitor data
      source.
    * Azure monitor: Make sure alert rule editor is not enabled
      when template variables are being used.
    * CloudMonitoring: Fix annotation queries.
    * CodeEditor: Trigger the latest getSuggestions() passed to
      CodeEditor.
    * Dashboard: Remove the current panel from the list of options
      in the Dashboard datasource.
    * Encryption: Fix decrypting secrets in alerting migration.
    * InfluxDB: Fix corner case where index is too large in ALIAS
    * NavBar: Order App plugins alphabetically.
    * NodeGraph: Fix zooming sensitivity on touchpads.
    * Plugins: Add OAuth pass-through logic to api/ds/query
      endpoint.
    * Snapshots: Fix panel inspector for snapshot data.
    * Tempo: Fix basic auth password reset on adding tag.
    * ValueMapping: Fixes issue with regex mappings.
    * grafana/ui: Enable slider marks display.
- Update to version 8.2.7
- Update to version 8.2.6
    * Security: Upgrade Docker base image to Alpine 3.14.3.
    * Security: Upgrade Go to 1.17.2.
    * TimeSeries: Fix fillBelowTo wrongly affecting fills of
      unrelated series.
- Update to version 8.2.5
    * Fix No Data behaviour in Legacy Alerting.
    * Alerting: Fix a bug where the metric in the evaluation string
      was not correctly populated.
    * Alerting: Fix no data behaviour in Legacy Alerting for alert
      rules using the AND operator.
    * CloudMonitoring: Ignore min and max aggregation in MQL
      queries.
    * Dashboards: 'Copy' is no longer added to new dashboard
      titles.
    * DataProxy: Fix overriding response body when response is a
      WebSocket upgrade.
    * Elasticsearch: Use field configured in query editor as field
      for date_histogram aggregations.
    * Explore: Fix running queries without a datasource property
      set.
    * InfluxDB: Fix numeric aliases in queries.
    * Plugins: Ensure consistent plugin settings list response.
    * Tempo: Fix validation of float durations.
    * Tracing: Correct tags for each span are shown.
- Update to version 8.2.4
  + Security: Fixes CVE-2021-41244.
- Update to version 8.2.3
  + Security: Fixes CVE-2021-41174.
- Update to version 8.2.2
    * Annotations: We have improved tag search performance.
    * Application: You can now configure an error-template title.
    * AzureMonitor: We removed a restriction from the resource
      filter query.
    * Packaging: We removed the ProcSubset option in systemd. This
      option prevented Grafana from starting in LXC environments.
    * Prometheus: We removed the autocomplete limit for metrics.
    * Table: We improved the styling of the type icons to make them
      more distinct from column / field name.
    * ValueMappings: You can now use value mapping in stat, gauge,
      bar gauge, and pie chart visualizations.
    * Alerting: Fix panic when Slack's API sends unexpected
      response.
    * Alerting: The Create Alert button now appears on the
      dashboard panel when you are working with a default
      datasource.
    * Explore: We fixed the problem where the Explore log panel
      disappears when an Elasticsearch logs query returns no
      results.
    * Graph: You can now see annotation descriptions on hover.
    * Logs: The system now uses the JSON parser only if the line is
      parsed to an object.
    * Prometheus: We fixed the issue where the system did not reuse
      TCP connections when querying from Grafana alerting.
    * Prometheus: We fixed the problem that resulted in an error
      when a user created a query with a $__interval min step.
    * RowsToFields: We fixed the issue where the system was not
      properly interpreting number values.
    * Scale: We fixed how the system handles NaN percent when data
      min = data max.
    * Table panel: You can now create a filter that includes
      special characters.
- Update to version 8.2.1
    * Dashboard: Fix rendering of repeating panels.
    * Datasources: Fix deletion of data source if plugin is not
      found.
    * Packaging: Remove systemcallfilters sections from systemd
      unit files.
    * Prometheus: Add Headers to HTTP client options.
- Update to version 8.2.0
    * AWS: Updated AWS authentication documentation.
    * Alerting: Added support Alertmanager data source for upstream
      Prometheus AM implementation.
    * Alerting: Allows more characters in label names so
      notifications are sent.
    * Alerting: Get alert rules for a dashboard or a panel using
      /api/v1/rules endpoints.
    * Annotations: Improved rendering performance of event markers.
    * CloudWatch Logs: Skip caching for log queries.
    * Explore: Added an opt-in configuration for Node Graph in
      Jaeger, Zipkin, and Tempo.
    * Packaging: Add stricter systemd unit options.
    * Prometheus: Metrics browser can now handle label values with
    * CodeEditor: Ensure that we trigger the latest onSave callback
      provided to the component.
    * DashboardList/AlertList: Fix for missing All folder value.
    * Plugins: Create a mock icon component to prevent console
      errors.
- Update to version 8.2.0-beta2
    * AccessControl: Document new permissions restricting data
      source access.
    * TimePicker: Add fiscal years and search to time picker.
    * Alerting: Added support for Unified Alerting with Grafana HA.
    * Alerting: Added support for tune rule evaluation using
      configuration options.
    * Alerting: Cleanups alertmanager namespace from key-value
      store when disabling Grafana 8 alerts.
    * Alerting: Remove ngalert feature toggle and introduce two new
      settings for enabling Grafana 8 alerts and disabling them for
      specific organisations.
    * CloudWatch: Introduced new math expression where it is
      necessary to specify the period field.
    * InfluxDB: Added support for $__interval and $__interval_ms in
      Flux queries for alerting.
    * InfluxDB: Flux queries can use more precise start and end
      timestamps with nanosecond-precision.
    * Plugins Catalog: Make the catalog the default way to interact
      with plugins.
    * Prometheus: Removed autocomplete limit for metrics.
    * Alerting: Fixed an issue where the edit page crashes if you
      tried to preview an alert without a condition set.
    * Alerting: Fixed rules migration to keep existing Grafana 8
      alert rules.
    * Alerting: Fixed the silence file content generated during
    * Analytics: Fixed an issue related to interaction event
      propagation in Azure Application Insights.
    * BarGauge: Fixed an issue where the cell color was lit even
      though there was no data.
    * BarGauge: Improved handling of streaming data.
    * CloudMonitoring: Fixed INT64 label unmarshal error.
    * ConfirmModal: Fixes confirm button focus on modal open.
    * Dashboard: Add option to generate short URL for variables
      with values containing spaces.
    * Explore: No longer hides errors containing refId property.
    * Fixed an issue that produced State timeline panel tooltip
      error when data was not in sync.
    * InfluxDB: InfluxQL query editor is set to always use
      resultFormat.
    * Loki: Fixed creating context query for logs with parsed
      labels.
    * PageToolbar: Fixed alignment of titles.
    * Plugins Catalog: Update to the list of available panels after
      an install, update or uninstall.
    * TimeSeries: Fixed an issue where the shared cursor was not
      showing when hovering over in old Graph panel.
    * Variables: Fixed issues related to change of focus or refresh
      pages when pressing enter in a text box variable input.
    * Variables: Panel no longer crash when using the adhoc
      variable in data links.
- Update to version 8.2.0-beta1
    * AccessControl: Introduce new permissions to restrict access
      for reloading provisioning configuration.
    * Alerting: Add UI to edit Cortex/Loki namespace, group names,
      and group evaluation interval.
    * Alerting: Add a Test button to test contact point.
    * Alerting: Allow creating/editing recording rules for Loki and
      Cortex.
    * Alerting: Metrics should have the label org instead of user.
    * Alerting: Sort notification channels by name to make them
      easier to locate.
    * Alerting: Support org level isolation of notification
    * AzureMonitor: Add data links to deep link to Azure Portal
      Azure Resource Graph.
    * AzureMonitor: Add support for annotations from Azure Monitor
      Metrics and Azure Resource Graph services.
    * AzureMonitor: Show error message when subscriptions request
      fails in ConfigEditor.
    * Chore: Update to Golang 1.16.7.
    * CloudWatch Logs: Add link to X-Ray data source for trace IDs
      in logs.
    * CloudWatch Logs: Disable query path using websockets (Live)
      feature.
    * CloudWatch/Logs: Don't group dataframes for non time series
    * Cloudwatch: Migrate queries that use multiple stats to one
      query per stat.
    * Dashboard: Keep live timeseries moving left (v2).
    * Datasources: Introduce response_limit for datasource
      responses.
    * Explore: Add filter by trace or span ID to trace to logs
    * Explore: Download traces as JSON in Explore Inspector.
    * Explore: Reuse Dashboard's QueryRows component.
    * Explore: Support custom display label for derived fields
      buttons for Loki datasource.
    * Grafana UI: Update monaco-related dependencies.
    * Graphite: Deprecate browser access mode.
    * InfluxDB: Improve handling of intervals in alerting.
    * InfluxDB: InfluxQL query editor: Handle unusual characters in
      tag values better.
    * Jaeger: Add ability to upload JSON file for trace data.
    * LibraryElements: Enable specifying UID for new and existing
      library elements.
    * LibraryPanels: Remove library panel icon from the panel
      header so you can no longer tell that a panel is a library
      panel from the dashboard view.
    * Logs panel: Scroll to the bottom on page refresh when sorting
      in ascending order.
    * Loki: Add fuzzy search to label browser.
    * Navigation: Implement active state for items in the Sidemenu.
    * Packaging: Update PID file location from /var/run to /run.
    * Plugins: Add Hide OAuth Forward config option.
    * Postgres/MySQL/MSSQL: Add setting to limit the maximum number
      of rows processed.
    * Prometheus: Add browser access mode deprecation warning.
    * Prometheus: Add interpolation for built-in-time variables to
      backend.
    * Tempo: Add ability to upload trace data in JSON format.
    * TimeSeries/XYChart: Allow grid lines visibility control in
      XYChart and TimeSeries panels.
    * Transformations: Convert field types to time string number or
      boolean.
    * Value mappings: Add regular-expression based value mapping.
    * Zipkin: Add ability to upload trace JSON.
    * Admin: Prevent user from deleting user's current/active
      organization.
    * LibraryPanels: Fix library panel getting saved in the
      dashboard's folder.
    * OAuth: Make generic teams URL and JMES path configurable.
    * QueryEditor: Fix broken copy-paste for mouse middle-click
    * Thresholds: Fix undefined color in 'Add threshold'.
    * Timeseries: Add wide-to-long, and fix multi-frame output.
    * TooltipPlugin: Fix behavior of Shared Crosshair when Tooltip
      is set to All.
    * Grafana UI: Fix TS error property css is missing in type.
- Update to version 8.1.8
- Update to version 8.1.7
    * Alerting: Fix alerts with evaluation interval more than 30
      seconds resolving before notification.
    * Elasticsearch/Prometheus: Fix usage of proper SigV4 service
      namespace.
- Update to version 8.1.6
  + Security: Fixes CVE-2021-39226.
- Update to version 8.1.5
    * BarChart: Fixes panel error that happens on second refresh.
- Update to version 8.1.4
  + Features and enhancements
    * Explore: Ensure logs volume bar colors match legend colors.
    * LDAP: Search all DNs for users.
    * Alerting: Fix notification channel migration.
    * Annotations: Fix blank panels for queries with unknown data
      sources.
    * BarChart: Fix stale values and x axis labels.
    * Graph: Make old graph panel thresholds work even if ngalert
      is enabled.
    * InfluxDB: Fix regex to identify / as separator.
    * LibraryPanels: Fix update issues related to library panels in
      rows.
    * Variables: Fix variables not updating inside a Panel when the
      preceding Row uses 'Repeat For'.
- Update to version 8.1.3
  + Bug fixes
    * Alerting: Fix alert flapping in the internal alertmanager.
    * Alerting: Fix request handler failed to convert dataframe
      'results' to plugins.DataTimeSeriesSlice: input frame is not
      recognized as a time series.
    * Dashboard: Fix UIDs are not preserved when importing/creating
      dashboards thru importing .json file.
    * Dashboard: Forces panel re-render when exiting panel edit.
    * Dashboard: Prevent folder from changing when navigating to
      general settings.
    * Docker: Force use of libcrypto1.1 and libssl1.1 versions to
      fix CVE-2021-3711.
    * Elasticsearch: Fix metric names for alert queries.
    * Elasticsearch: Limit Histogram field parameter to numeric
      values.
    * Elasticsearch: Prevent pipeline aggregations to show up in
      terms order by options.
    * LibraryPanels: Prevent duplicate repeated panels from being
      created.
    * Loki: Fix ad-hoc filter in dashboard when used with parser.
    * Plugins: Track signed files + add warn log for plugin assets
      which are not signed.
    * Postgres/MySQL/MSSQL: Fix region annotations not displayed
      correctly.
    * Prometheus: Fix validate selector in metrics browser.
    * Security: Fix stylesheet injection vulnerability.
    * Security: Fix short URL vulnerability.
- Update to version 8.1.2
    * AzureMonitor: Add support for PostgreSQL and MySQL Flexible
      Servers.
    * Datasource: Change HTTP status code for failed datasource
      health check to 400.
    * Explore: Add span duration to left panel in trace viewer.
    * Plugins: Use file extension allowlist when serving plugin
      assets instead of checking for UNIX executable.
    * Profiling: Add support for binding pprof server to custom
      network interfaces.
    * Search: Make search icon keyboard navigable.
    * Template variables: Keyboard navigation improvements.
    * Tooltip: Display ms within minute time range.
    * Alerting: Fix saving LINE contact point.
    * Annotations: Fix alerting annotation coloring.
    * Annotations: Alert annotations are now visible in the correct
      Panel.
    * Auth: Hide SigV4 config UI and disable middleware when its
      config flag is disabled.
    * Dashboard: Prevent incorrect panel layout by comparing window
      width against theme breakpoints.
    * Explore: Fix showing of full log context.
    * PanelEdit: Fix 'Actual' size by passing the correct panel
      size to Dashboard.
    * Plugins: Fix TLS datasource settings.
    * Variables: Fix issue with empty drop downs on navigation.
    * Variables: Fix URL util converting false into true.
    * Toolkit: Fix matchMedia not found error.
- Update to version 8.1.1
    * CloudWatch Logs: Fix crash when no region is selected.
- Update to version 8.1.0
    * Alerting: Deduplicate receivers during migration.
    * ColorPicker: Display colors as RGBA.
    * Select: Make portalling the menu opt-in, but opt-in
      everywhere.
    * TimeRangePicker: Improve accessibility.
    * Annotations: Correct annotations that are displayed upon page
      refresh.
    * Annotations: Fix Enabled button that disappeared from Grafana
      v8.0.6.
    * Annotations: Fix data source template variable that was not
      available for annotations.
    * AzureMonitor: Fix annotations query editor that does not
      load.
    * Geomap: Fix scale calculations.
    * GraphNG: Fix y-axis autosizing.
    * Live: Display stream rate and fix duplicate channels in list
    * Loki: Update labels in log browser when time range changes in
      dashboard.
    * NGAlert: Send resolve signal to alertmanager on alerting -&gt;
      Normal.
    * PasswordField: Prevent a password from being displayed when
      you click the Enter button.
    * Renderer: Remove debug.log file when Grafana is stopped.
    * Security: Update dependencies to fix CVE-2021-36222.
- Update to version 8.1.0-beta3
    * Alerting: Support label matcher syntax in alert rule list
      filter.
    * IconButton: Put tooltip text as aria-label.
    * Live: Experimental HA with Redis.
    * UI: FileDropzone component.
    * CloudWatch: Add AWS LookoutMetrics.
    * Docker: Fix builds by delaying go mod verify until all
      required files are copied over.
    * Exemplars: Fix disable exemplars only on the query that
      failed.
    * SQL: Fix SQL dataframe resampling (fill mode + time
      intervals).
- Update to version 8.1.0-beta2
    * Alerting: Expand the value string in alert annotations and
    * Auth: Add Azure HTTP authentication middleware.
    * Auth: Auth: Pass user role when using the authentication
      proxy.
    * Gazetteer: Update countries.json file to allow for linking to
      3-letter country codes.
    * Config: Fix Docker builds by correcting formatting in
      sample.ini.
    * Explore: Fix encoding of internal URLs.
- Update to version 8.1.0-beta1
    * Alerting: Add Alertmanager notifications tab.
    * Alerting: Add button to deactivate current Alertmanager
    * Alerting: Add toggle in Loki/Prometheus data source
      configuration to opt out of alerting UI.
    * Alerting: Allow any 'evaluate for' value &gt;=0 in the alert
      rule form.
    * Alerting: Load default configuration from status endpoint, if
      Cortex Alertmanager returns empty user configuration. 
    * Alerting: view to display alert rule and its underlying data.
    * Annotation panel: Release the annotation panel.
    * Annotations: Add typeahead support for tags in built-in
      annotations.
    * AzureMonitor: Add curated dashboards for Azure services.
    * AzureMonitor: Add support for deep links to Microsoft Azure
      portal for Metrics.
    * AzureMonitor: Remove support for different credentials for
      Azure Monitor Logs.
    * AzureMonitor: Support querying any Resource for Logs queries.
    * Elasticsearch: Add frozen indices search support.
    * Elasticsearch: Name fields after template variables values
      instead of their name.
    * Elasticsearch: add rate aggregation.
    * Email: Allow configuration of content types for email
      notifications.
    * Explore: Add more meta information when line limit is hit.
    * Explore: UI improvements to trace view.
    * FieldOverrides: Added support to change display name in an
      override field and have it be matched by a later rule.
    * HTTP Client: Introduce dataproxy_max_idle_connections config
      variable.
    * InfluxDB: InfluxQL: adds tags to timeseries data.
    * InfluxDB: InfluxQL: make measurement search case insensitive.
      Legacy Alerting: Replace simplejson with a struct in webhook
      notification channel.
    * Legend: Updates display name for Last (not null) to just
      Last*.
    * Logs panel: Add option to show common labels.
    * Loki: Add $__range variable.
    * Loki: Add support for 'label_values(log stream selector,
      label)' in templating.
    * Loki: Add support for ad-hoc filtering in dashboard.
    * MySQL Datasource: Add timezone parameter.
    * NodeGraph: Show gradient fields in legend.
    * PanelOptions: Don't mutate panel options/field config object
      when updating.
    * PieChart: Make pie gradient more subtle to match other
      charts.
    * Prometheus: Update PromQL typeahead and highlighting.
    * Prometheus: interpolate variable for step field.
    * Provisioning: Improve validation by validating across all
      dashboard providers.
    * SQL Datasources: Allow multiple string/labels columns with
      time series.
    * Select: Portal select menu to document.body.
    * Team Sync: Add group mapping to support team sync in the
      Generic OAuth provider.
    * Tooltip: Make active series more noticeable.
    * Tracing: Add support to configure trace to logs start and end
      time.
    * Transformations: Skip merge when there is only a single data
      frame.
    * ValueMapping: Added support for mapping text to color,
      boolean values, NaN and Null. Improved UI for value mapping.
    * Visualizations: Dynamically set any config (min, max, unit,
      color, thresholds) from query results.
    * live: Add support to handle origin without a value for the
      port when matching with root_url.
    * Alerting: Handle marshaling Inf values.
    * AzureMonitor: Fix macro resolution for template variables.
    * AzureMonitor: Fix queries with Microsoft.NetApp/../../volumes
      resources.
    * AzureMonitor: Request and concat subsequent resource pages.
    * Bug: Fix parse duration for day.
    * Datasources: Improve error handling for error messages.
    * Explore: Correct the functionality of shift-enter shortcut
      across all uses.
    * Explore: Show all dataFrames in data tab in Inspector.
    * GraphNG: Fix Tooltip mode 'All' for XYChart.
    * Loki: Fix highlight of logs when using filter expressions
      with backticks.
    * Modal: Force modal content to overflow with scroll.
    * Plugins: Ignore symlinked folders when verifying plugin
      signature.
    * Toolkit: Improve error messages when tasks fail.
- Update to version 8.0.7
- Update to version 8.0.6
    * Alerting: Add annotation upon alert state change.
    * Alerting: Allow space in label and annotation names.
    * InfluxDB: Improve legend labels for InfluxDB query results.
    * Alerting: Fix improper alert by changing the handling of
      empty labels.
    * CloudWatch/Logs: Reestablish Cloud Watch alert behavior.
    * Dashboard: Avoid migration breaking on fieldConfig without
      defaults field in folded panel.
    * DashboardList: Fix issue not re-fetching dashboard list after
      variable change.
    * Database: Fix incorrect format of isolation level
      configuration parameter for MySQL.
    * InfluxDB: Correct tag filtering on InfluxDB data.
    * Links: Fix links that caused a full page reload.
    * Live: Fix HTTP error when InfluxDB metrics have an incomplete
      or asymmetrical field set.
    * Postgres/MySQL/MSSQL: Change time field to 'Time' for time
      series queries.
    * Postgres: Fix the handling of a null return value in query
    * Tempo: Show hex strings instead of uints for IDs.
    * TimeSeries: Improve tooltip positioning when tooltip
      overflows.
    * Transformations: Add 'prepare time series' transformer.
- Update to version 8.0.5
    * Cloudwatch Logs: Send error down to client.
    * Folders: Return 409 Conflict status when folder already
      exists.
    * TimeSeries: Do not show series in tooltip if it's hidden in
      the viz.
    * AzureMonitor: Fix issue where resource group name is missing
      on the resource picker button.
    * Chore: Fix AWS auth assuming role with workspace IAM.
    * DashboardQueryRunner: Fixes unrestrained subscriptions being
    * DateFormats: Fix reading correct setting key for
      use_browser_locale.
    * Links: Fix links to other apps outside Grafana when under sub
      path.
    * Snapshots: Fix snapshot absolute time range issue.
    * Table: Fix data link color.
    * Time Series: Fix X-axis time format when tick increment is
      larger than a year.
    * Tooltip Plugin: Prevent tooltip render if field is undefined.
- Update to version 8.0.4
    * Live: Rely on app url for origin check.
    * PieChart: Sort legend descending, update placeholder.
    * TimeSeries panel: Do not reinitialize plot when thresholds
      mode change.
    * Elasticsearch: Allow case sensitive custom options in
      date_histogram interval.
    * Elasticsearch: Restore previous field naming strategy when
      using variables.
    * Explore: Fix import of queries between SQL data sources.
    * InfluxDB: InfluxQL query editor: fix retention policy
      handling.
    * Loki: Send correct time range in template variable queries.
    * TimeSeries: Preserve RegExp series overrides when migrating
      from old graph panel.
- Update to version 8.0.3
    * Alerting: Increase alertmanager_conf column if MySQL.
    * Time series/Bar chart panel: Handle infinite numbers as nulls
      when converting to plot array.
    * TimeSeries: Ensure series overrides that contain color are
      migrated, and migrate the previous fieldConfig when changing
      the panel type.
    * ValueMappings: Improve singlestat value mappings migration.
    * Annotations: Fix annotation line and marker colors.
    * AzureMonitor: Fix KQL template variable queries without
      default workspace.
    * CloudWatch/Logs: Fix missing response data for log queries.
    * LibraryPanels: Fix crash in library panels list when panel
      plugin is not found.
    * LogsPanel: Fix performance drop when moving logs panel in
    * Loki: Parse log levels when ANSI coloring is enabled.
    * MSSQL: Fix issue with hidden queries still being executed.
    * PanelEdit: Display the VisualizationPicker that was not
      displayed if a panel has an unknown panel plugin.
    * Plugins: Fix loading symbolically linked plugins.
    * Prometheus: Fix issue where legend name was replaced with
      name Value in stat and gauge panels.
    * State Timeline: Fix crash when hovering over panel.
- Update to version 8.0.2
    * Datasource: Add support for max_conns_per_host in dataproxy
      settings.
    * Configuration: Fix changing org preferences in FireFox.
    * PieChart: Fix legend dimension limits.
    * Postgres/MySQL/MSSQL: Fix panic in concurrent map writes.
    * Variables: Hide default data source if missing from regex.
- Update to version 8.0.1
    * Alerting/SSE: Fix 'count_non_null' reducer validation.
    * Cloudwatch: Fix duplicated time series.
    * Cloudwatch: Fix missing defaultRegion.
    * Dashboard: Fix Dashboard init failed error on dashboards with
      old singlestat panels in collapsed rows.
    * Datasource: Fix storing timeout option as numeric.
    * Postgres/MySQL/MSSQL: Fix annotation parsing for empty
    * Postgres/MySQL/MSSQL: Numeric/non-string values are now
      returned from query variables.
    * Postgres: Fix an error that was thrown when the annotation
      query did not return any results.
    * StatPanel: Fix an issue with the appearance of the graph when
      switching color mode.
    * Visualizations: Fix an issue in the
      Stat/BarGauge/Gauge/PieChart panels where all values mode
      were showing the same name if they had the same value.
    * Toolkit: Resolve external fonts when Grafana is served from a
      sub path.
- Update to version 8.0.0
    * The following endpoints were deprecated for Grafana v5.0 and
      support for them has now been removed:
      GET /dashboards/db/:slug
      GET /dashboard-solo/db/:slug
      GET /api/dashboard/db/:slug
      DELETE /api/dashboards/db/:slug
    * AzureMonitor: Require default subscription for workspaces()
      template variable query.
    * AzureMonitor: Use resource type display names in the UI.
    * Dashboard: Remove support for loading and deleting dashboard
      by slug.
    * InfluxDB: Deprecate direct browser access in data source.
    * VizLegend: Add a read-only property.
    * AzureMonitor: Fix Azure Resource Graph queries in Azure
      China.
    * Checkbox: Fix vertical layout issue with checkboxes due to
      fixed height.
    * Dashboard: Fix Table view when editing causes the panel data
      to not update.
    * Dashboard: Fix issues where unsaved-changes warning is not
      displayed.
    * Login: Fixes Unauthorized message showing when on login page
      or snapshot page.
    * NodeGraph: Fix sorting markers in grid view.
    * Short URL: Include orgId in generated short URLs.
    * Variables: Support raw values of boolean type.
- Update to version 8.0.0-beta3
    * The default HTTP method for Prometheus data source is now
      POST.
    * API: Support folder UID in dashboards API.
    * Alerting: Add support for configuring avatar URL for the
      Discord notifier.
    * Alerting: Clarify that Threema Gateway Alerts support only
      Basic IDs.
    * Azure: Expose Azure settings to external plugins.
    * AzureMonitor: Deprecate using separate credentials for Azure
      Monitor Logs.
    * AzureMonitor: Display variables in resource picker for Azure
    * AzureMonitor: Hide application insights for data sources not
      using it.
    * AzureMonitor: Support querying subscriptions and resource
      groups in Azure Monitor Logs.
    * AzureMonitor: remove requirement for default subscription.
    * CloudWatch: Add Lambda@Edge Amazon CloudFront metrics.
    * CloudWatch: Add missing AWS AppSync metrics.
    * ConfirmModal: Auto focus delete button.
    * Explore: Add caching for queries that are run from logs
    * Loki: Add formatting for annotations.
    * Loki: Bring back processed bytes as meta information.
    * NodeGraph: Display node graph collapsed by default with trace
      view.
    * Overrides: Include a manual override option to hide something
      from visualization.
    * PieChart: Support row data in pie charts.
    * Prometheus: Update default HTTP method to POST for existing
      data sources.
    * Time series panel: Position tooltip correctly when window is
      scrolled or resized.
    * Admin: Fix infinite loading edit on the profile page.
    * Color: Fix issues with random colors in string and date
    * Dashboard: Fix issue with title or folder change has no
      effect after exiting settings view.
    * DataLinks: Fix an issue __series.name is not working in data
      link.
    * Datasource: Fix dataproxy timeout should always be applied
      for outgoing data source HTTP requests.
    * Elasticsearch: Fix NewClient not passing httpClientProvider
      to client impl.
    * Explore: Fix Browser title not updated on Navigation to
      Explore.
    * GraphNG: Remove fieldName and hideInLegend properties from
      UPlotSeriesBuilder.
    * OAuth: Fix fallback to auto_assign_org_role setting for Azure
      AD OAuth when no role claims exists.
    * PanelChrome: Fix issue with empty panel after adding a non
      data panel and coming back from panel edit.
    * StatPanel: Fix data link tooltip not showing for single
      value.
    * Table: Fix sorting for number fields.
    * Table: Have text underline for datalink, and add support for
      image datalink.
    * Transformations: Prevent FilterByValue transform from
      crashing panel edit.
- Update to version 8.0.0-beta2
    * AppPlugins: Expose react-router to apps.
    * AzureMonitor: Add Azure Resource Graph.
    * AzureMonitor: Managed Identity configuration UI.
    * AzureMonitor: Token provider with support for Managed
      Identities.
    * AzureMonitor: Update Logs workspace() template variable query
      to return resource URIs.
    * BarChart: Value label sizing.
    * CloudMonitoring: Add support for preprocessing.
    * CloudWatch: Add AWS/EFS StorageBytes metric.
    * CloudWatch: Allow use of missing AWS namespaces using custom
    * Datasource: Shared HTTP client provider for core backend data
      sources and any data source using the data source proxy.
    * InfluxDB: InfluxQL: allow empty tag values in the query
      editor.
    * Instrumentation: Instrument incoming HTTP request with
      histograms by default.
    * Library Panels: Add name endpoint &amp; unique name validation to
      AddLibraryPanelModal.
    * Logs panel: Support details view.
    * PieChart: Always show the calculation options dropdown in the
    * PieChart: Remove beta flag.
    * Plugins: Enforce signing for all plugins.
    * Plugins: Remove support for deprecated backend plugin
      protocol version.
    * Tempo/Jaeger: Add better display name to legend.
    * Timeline: Add time range zoom.
    * Timeline: Adds opacity &amp; line width option.
    * Timeline: Value text alignment option.
    * ValueMappings: Add duplicate action, and disable dismiss on
      backdrop click.
    * Zipkin: Add node graph view to trace response.
    * Annotations panel: Remove subpath from dashboard links.
    * Content Security Policy: Allow all image sources by default.
    * Content Security Policy: Relax default template wrt. loading
      of scripts, due to nonces not working.
    * Datasource: Fix tracing propagation for alert execution by
      introducing HTTP client outgoing tracing middleware.
    * InfluxDB: InfluxQL always apply time interval end.
    * Library Panels: Fixes 'error while loading library panels'.
    * NewsPanel: Fixes rendering issue in Safari.
    * PanelChrome: Fix queries being issued again when scrolling in
      and out of view.
    * Plugins: Fix Azure token provider cache panic and auth param
      nil value.
    * Snapshots: Fix key and deleteKey being ignored when creating
      an external snapshot.
    * Table: Fix issue with cell border not showing with colored
      background cells.
    * Table: Makes tooltip scrollable for long JSON values.
    * TimeSeries: Fix for Connected null values threshold toggle
      during panel editing.
    * Variables: Fixes inconsistent selected states on dashboard
    * Variables: Refreshes all panels even if panel is full screen.
    * QueryField: Remove carriage return character from pasted text.
- Update to version 8.0.0-beta1
  + License update:
    * AGPL License: Update license from Apache 2.0 to the GNU
      Affero General Public License (AGPL).
    * Removes the never refresh option for Query variables.
    * Removes the experimental Tags feature for Variables.
  + Deprecations:
    * The InfoBox &amp; FeatureInfoBox are now deprecated please use
      the Alert component instead with severity info.
    * API: Add org users with pagination.
    * API: Return 404 when deleting nonexistent API key.
    * API: Return query results as JSON rather than base64 encoded
      Arrow.
    * Alerting: Allow sending notification tags to Opsgenie as
      extra properties.
    * Alerts: Replaces all uses of InfoBox &amp; FeatureInfoBox with
      Alert.
    * Auth: Add support for JWT Authentication.
    * AzureMonitor: Add support for
      Microsoft.SignalRService/SignalR metrics.
    * AzureMonitor: Azure settings in Grafana server config.
    * AzureMonitor: Migrate Metrics query editor to React.
    * BarChart panel: enable series toggling via legend.
    * BarChart panel: Adds support for Tooltip in BarChartPanel.
    * PieChart panel: Change look of highlighted pie slices.
    * CloudMonitoring: Migrate config editor from angular to react.
    * CloudWatch: Add Amplify Console metrics and dimensions.
    * CloudWatch: Add missing Redshift metrics to CloudWatch data
    * CloudWatch: Add metrics for managed RabbitMQ service.
    * DashboardList: Enable templating on search tag input.
    * Datasource config: correctly remove single custom http
      header.
    * Elasticsearch: Add generic support for template variables.
    * Elasticsearch: Allow omitting field when metric supports
      inline script.
    * Elasticsearch: Allow setting a custom limit for log queries.
    * Elasticsearch: Guess field type from first non-empty value.
    * Elasticsearch: Use application/x-ndjson content type for
      multisearch requests.
    * Elasticsearch: Use semver strings to identify ES version.
    * Explore: Add logs navigation to request more logs.
    * Explore: Map Graphite queries to Loki.
    * Explore: Scroll split panes in Explore independently.
    * Explore: Wrap each panel in separate error boundary.
    * FieldDisplay: Smarter naming of stat values when visualising
      row values (all values) in stat panels.
    * Graphite: Expand metric names for variables.
    * Graphite: Handle unknown Graphite functions without breaking
      the visual editor.
    * Graphite: Show graphite functions descriptions.
    * Graphite: Support request cancellation properly (Uses new
      backendSrv.fetch Observable request API).
    * InfluxDB: Flux: Improve handling of complex
      response-structures.
    * InfluxDB: Support region annotations.
    * Inspector: Download logs for manual processing.
    * Jaeger: Add node graph view for trace.
    * Jaeger: Search traces.
    * Loki: Use data source settings for alerting queries.
    * NodeGraph: Exploration mode.
    * OAuth: Add support for empty scopes.
    * PanelChrome: New logic-less emotion based component with no
      dependency on PanelModel or DashboardModel.
    * PanelEdit: Adds a table view toggle to quickly view data in
      table form.
    * PanelEdit: Highlight matched words when searching options.
    * PanelEdit: UX improvements.
    * Plugins: PanelRenderer and simplified QueryRunner to be used
      from plugins.
    * Plugins: AuthType in route configuration and params
      interpolation.
    * Plugins: Enable plugin runtime install/uninstall
      capabilities.
    * Plugins: Support set body content in plugin routes.
    * Plugins: Introduce marketplace app.
    * Plugins: Moving the DataSourcePicker to grafana/runtime so it
      can be reused in plugins.
    * Prometheus: Add custom query params for alert and exemplars
    * Prometheus: Use fuzzy string matching to autocomplete metric
      names and label.
    * Routing: Replace Angular routing with react-router.
    * Slack: Use chat.postMessage API by default.
    * Tempo: Search for Traces by querying Loki directly from
      Tempo.
    * Tempo: Show graph view of the trace.
    * Themes: Switch theme without reload using global shortcut.
    * TimeSeries panel: Add support for shared cursor.
    * TimeSeries panel: Do not crash the panel if there is no time
      series data in the response.
    * Variables: Do not save repeated panels, rows and scopedVars.
    * Variables: Removes experimental Tags feature.
    * Variables: Removes the never refresh option.
    * Visualizations: Unify tooltip options across visualizations.
    * Visualizations: Refactor and unify option creation between
      new visualizations.
    * Visualizations: Remove singlestat panel.
    * APIKeys: Fixes issue with adding first api key.
    * Alerting: Add checks for non supported units - disable
      defaulting to seconds.
    * Alerting: Fix issue where Slack notifications won't link to
      user IDs.
    * Alerting: Omit empty message in PagerDuty notifier.
    * AzureMonitor: Fix migration error from older versions of App
      Insights queries.
    * CloudWatch: Fix AWS/Connect dimensions.
    * CloudWatch: Fix broken AWS/MediaTailor dimension name.
    * Dashboards: Allow string manipulation as advanced variable
      format option.
    * DataLinks: Includes harmless extended characters like
      Cyrillic characters.
    * Drawer: Fixes title overflowing its container.
    * Explore: Fix issue when some query errors were not shown.
    * Generic OAuth: Prevent adding duplicated users.
    * Graphite: Handle invalid annotations.
    * Graphite: Fix autocomplete when tags are not available.
    * InfluxDB: Fix Cannot read property 'length' of undefined in
      when parsing response.
    * Instrumentation: Enable tracing when Jaeger host and port are
    * Instrumentation: Prefix metrics with grafana.
    * MSSQL: By default let driver choose port.
    * OAuth: Add optional strict parsing of role_attribute_path.
    * Panel: Fixes description markdown with inline code being
      rendered on newlines and full width.
    * PanelChrome: Ignore data updates &amp; errors for non data
      panels.
    * Permissions: Fix inherited folder permissions can prevent new
      permissions being added to a dashboard.
    * Plugins: Remove pre-existing plugin installs when installing
      with grafana-cli.
    * Plugins: Support installing to folders with whitespace and
      fix pluginUrl trailing and leading whitespace failures.
    * Postgres/MySQL/MSSQL: Don't return connection failure details
      to the client.
    * Postgres: Fix ms precision of interval in time group macro
      when TimescaleDB is enabled.
    * Provisioning: Use dashboard checksum field as change
      indicator.
    * SQL: Fix so that all captured errors are returned from sql
      engine.
    * Shortcuts: Fixes panel shortcuts so they always work.
    * Table: Fixes so border is visible for cells with links.
    * Variables: Clear query when data source type changes.
    * Variables: Filters out builtin variables from unknown list.
    * Button: Introduce buttonStyle prop.
    * DataQueryRequest: Remove deprecated props showingGraph and
      showingTabel and exploreMode.
    * grafana/ui: Update React Hook Form to v7.
    * IconButton: Introduce variant for red and blue icon buttons.
    * Plugins: Expose the getTimeZone function to be able to get
      the current selected timeZone.
    * TagsInput: Add className to TagsInput.
    * VizLegend: Move onSeriesColorChanged to PanelContext
      (breaking change).
- Update to version 7.5.13
    * Alerting: Fix NoDataFound for alert rules using AND operator.

mgr-cfg:

- Version 4.3.6-1
  * Corrected source URL in spec file
  * Fix installation problem for SLE15SP4 due missing python-selinux
  * Fix python selinux package name depending on build target (bsc#1193600)
  * Do not build python 2 package for SLE15SP4 and higher
  * Remove unused legacy code

mgr-custom-info:

- Version 4.3.3-1
  * Remove unused legacy code

mgr-daemon:

- Version 4.3.4-1
  * Corrected source URLs in spec file
  * Update translation strings

mgr-osad:

- Version 4.3.6-1
  * Corrected source URL in spec file.
  * Do not build python 2 package for SLE15SP4 and higher
  * Removed spacewalk-selinux dependencies.
  * Updated source url.

mgr-push:

- Version 4.3.4-1
  * Corrected source URLs in spec file

mgr-virtualization:

- Version 4.3.5-1
  * Corrected source URLs in spec file.
  * Do not build python 2 package for SLE15SP4 and higher

prometheus-blackbox_exporter:

- Enhanced to build on Enterprise Linux 8

prometheus-postgres_exporter:

- Updated for RHEL8.

python-hwdata:

- Require python macros for building

rhnlib:

- Version 4.3.4-1
  * Reorganize python files

spacecmd:

- Version 4.3.11-1
  * on full system update call schedulePackageUpdate API (bsc#1197507)
  * parse boolean paramaters correctly (bsc#1197689)
  * Add parameter to set containerized proxy SSH port
  * Add proxy config generation subcommand
  * Option 'org_createfirst' added to perform initial organization and user creation
  * Added gettext build requirement for RHEL.
  * Removed RHEL 5 references.
  * Include group formulas configuration in spacecmd group_backup and
    spacecmd group_restore. This changes backup format to json,
    previously used plain text is still supported for reading (bsc#1190462)
  * Update translation strings
  * Improved event history listing and added new system_eventdetails 
    command to retrieve the details of an event
  * Make schedule_deletearchived to get all actions without display limit
  * Allow passing a date limit for schedule_deletearchived on spacecmd (bsc#1181223)

spacewalk-client-tools:

- Version 4.3.9-1
  * Corrected source URLs in spec file.
  * do not build python 2 package for SLE15
  * Remove unused legacy code
  * Update translation strings

spacewalk-koan:

- Version 4.3.5-1
  * Corrected source URLs in spec file.

spacewalk-oscap:

- Version 4.3.5-1
  * Corrected source URLs in spec file.
  * Do not build python 2 package for SLE15SP4 and higher

spacewalk-remote-utils:

- Version 4.3.3-1
  * Adapt the package for changes in rhnlib

supportutils-plugin-susemanager-client:

- Version 4.3.2-1
  * Add proxy containers config and logs

suseRegisterInfo:

- Version 4.3.3-1
  * Bump version to 4.3.0

supportutils-plugin-salt:

- Add support for Salt Bundle

uyuni-common-libs:

- Version 4.3.4-1
  * implement more decompression algorithms for reposync (bsc#1196704)
  * Reorganize python files
  * Add decompression of zck files to fileutils

		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-20"/>
	<updated date="2022-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181223">SUSE bug 1181223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190462">SUSE bug 1190462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190535">SUSE bug 1190535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193600">SUSE bug 1193600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194873">SUSE bug 1194873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195726">SUSE bug 1195726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195727">SUSE bug 1195727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195728">SUSE bug 1195728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196338">SUSE bug 1196338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196704">SUSE bug 1196704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197507">SUSE bug 1197507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197689">SUSE bug 1197689</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36222/">CVE-2021-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">CVE-2021-36222 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3711/">CVE-2021-3711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3711">CVE-2021-3711 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-39226/">CVE-2021-39226 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39226">CVE-2021-39226 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-41174/">CVE-2021-41174 at SUSE</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41174">CVE-2021-41174 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41244/">CVE-2021-41244 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41244">CVE-2021-41244 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43798/">CVE-2021-43798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43798">CVE-2021-43798 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43813/">CVE-2021-43813 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43813">CVE-2021-43813 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43815/">CVE-2021-43815 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43815">CVE-2021-43815 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21673/">CVE-2022-21673 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21673">CVE-2022-21673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21698">CVE-2022-21698 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21702/">CVE-2022-21702 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21702">CVE-2022-21702 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21703/">CVE-2022-21703 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21703">CVE-2022-21703 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21713/">CVE-2022-21713 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21713">CVE-2022-21713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696541" comment="golang-github-prometheus-node_exporter-1.3.0-1.15.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149258" version="1" class="patch">
	<metadata>
		<title>Security update for fwupdate (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011330.html" source="SUSE-SU"/>
		<description>

This update of fwupdate fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-22"/>
	<updated date="2022-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696152" comment="fwupdate-0.5-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696153" comment="fwupdate-efi-0.5-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696154" comment="libfwup0-0.5-10.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149259" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1070738" ref_url="https://bugzilla.suse.com/1070738" source="BUGZILLA"/>
		<reference ref_id="1198511" ref_url="https://bugzilla.suse.com/1198511" source="BUGZILLA"/>
		<reference ref_id="1199441" ref_url="https://bugzilla.suse.com/1199441" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011339.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2015-20107: avoid command injection in the mailcap module (bsc#1198511).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-23"/>
	<updated date="2022-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070738">SUSE bug 1070738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198511">SUSE bug 1198511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199441">SUSE bug 1199441</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696400" comment="libpython3_4m1_0-3.4.10-25.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696401" comment="python3-3.4.10-25.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696402" comment="python3-base-3.4.10-25.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696403" comment="python3-curses-3.4.10-25.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697260" comment="python3-devel-3.4.10-25.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149260" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1200550" ref_url="https://bugzilla.suse.com/1200550" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2068" ref_url="https://www.suse.com/security/cve/CVE-2022-2068/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011354.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-2068: Fixed more shell code injection issues in c_rehash. (bsc#1200550)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-24"/>
	<updated date="2022-06-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1200550">SUSE bug 1200550</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2068/">CVE-2022-2068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">CVE-2022-2068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696404" comment="libopenssl-devel-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696405" comment="libopenssl1_0_0-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696162" comment="libopenssl1_0_0-32bit-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696406" comment="libopenssl1_0_0-hmac-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696164" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696407" comment="openssl-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696166" comment="openssl-doc-1.0.2j-60.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149261" version="1" class="patch">
	<metadata>
		<title>Security update for oracleasm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011369.html" source="SUSE-SU"/>
		<description>

This update of oracleasm fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-28"/>
	<updated date="2022-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696542" comment="oracleasm-kmp-default-2.0.8_k4.4.180_94.164-3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149262" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1198511" ref_url="https://bugzilla.suse.com/1198511" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011384.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2015-20107: avoid command injection in the mailcap module (bsc#1198511).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-04"/>
	<updated date="2022-07-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198511">SUSE bug 1198511</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696408" comment="libpython2_7-1_0-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696171" comment="libpython2_7-1_0-32bit-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696409" comment="python-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696173" comment="python-32bit-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696410" comment="python-base-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696175" comment="python-base-32bit-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696411" comment="python-curses-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696412" comment="python-demo-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696543" comment="python-devel-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696179" comment="python-doc-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696180" comment="python-doc-pdf-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696413" comment="python-gdbm-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696414" comment="python-idle-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696415" comment="python-tk-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696416" comment="python-xml-2.7.18-28.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149263" version="1" class="patch">
	<metadata>
		<title>Security update for sysstat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1144923" ref_url="https://bugzilla.suse.com/1144923" source="BUGZILLA"/>
		<reference ref_id="1159104" ref_url="https://bugzilla.suse.com/1159104" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19725" ref_url="https://www.suse.com/security/cve/CVE-2019-19725/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0026-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011392.html" source="SUSE-SU"/>
		<description>
This update for sysstat fixes the following issues:

Security issue fixed:                                                                                                                                                               
                                                                                                                                                                                   
- CVE-2019-19725: Fixed double free in check_file_actlst in sa_common.c (bsc#1159104).                                                                                    

Bug fixes:

- Enable log information of starting/stoping services. (bsc#1144923, jsc#SLE-5958)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-04"/>
	<updated date="2022-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144923">SUSE bug 1144923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159104">SUSE bug 1159104</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19725/">CVE-2019-19725 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19725">CVE-2019-19725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522597" comment="sysstat-12.0.2-10.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557523" comment="sysstat-isag-12.0.2-10.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149264" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011404.html" source="SUSE-SU"/>
		<description>

This update of dpdk fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-05"/>
	<updated date="2022-07-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696554" comment="dpdk-16.11.9-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696196" comment="dpdk-kmp-default-16.11.9_k4.4.180_94.164-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696555" comment="dpdk-tools-16.11.9-8.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149265" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1200793" ref_url="https://bugzilla.suse.com/1200793" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-31744" ref_url="https://www.suse.com/security/cve/CVE-2022-31744/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34478" ref_url="https://www.suse.com/security/cve/CVE-2022-34478/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011428.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 91.11.0 ESR (MFSA 2022-25) (bsc#1200793):

- CVE-2022-2200: Undesired attributes could be set as part of prototype pollution (bmo#1771381)
- CVE-2022-31744: CSP bypass enabling stylesheet injection (bmo#1757604)
- CVE-2022-34468: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI (bmo#1768537)
- CVE-2022-34470: Use-after-free in nsSHistory (bmo#1765951)
- CVE-2022-34472: Unavailable PAC file resulted in OCSP requests being blocked (bmo#1770123)
- CVE-2022-34478: Microsoft protocols can be attacked if a user accepts a prompt (bmo#1773717)
- CVE-2022-34479: A popup window could be resized in a way to overlay the address bar with web content (bmo#1745595)
- CVE-2022-34481: Potential integer overflow in ReplaceElementsAt (bmo#1497246)
- CVE-2022-34484: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 (bmo#1763634, bmo#1772651)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-06"/>
	<updated date="2022-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2200">CVE-2022-2200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31744/">CVE-2022-31744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31744">CVE-2022-31744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34468">CVE-2022-34468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34470">CVE-2022-34470 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34472">CVE-2022-34472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34478/">CVE-2022-34478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34478">CVE-2022-34478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34479">CVE-2022-34479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34481">CVE-2022-34481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34484">CVE-2022-34484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700049" comment="MozillaFirefox-91.11.0-112.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700050" comment="MozillaFirefox-devel-91.11.0-112.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700051" comment="MozillaFirefox-translations-common-91.11.0-112.119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149266" version="1" class="patch">
	<metadata>
		<title>Security update for rsyslog (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1199061" ref_url="https://bugzilla.suse.com/1199061" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24903" ref_url="https://www.suse.com/security/cve/CVE-2022-24903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011474.html" source="SUSE-SU"/>
		<description>
This update for rsyslog fixes the following issues:

- CVE-2022-24903: fix potential heap buffer overflow in modules for TCP syslog reception (bsc#1199061)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-07"/>
	<updated date="2022-07-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199061">SUSE bug 1199061</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24903/">CVE-2022-24903 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24903">CVE-2022-24903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696544" comment="rsyslog-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696545" comment="rsyslog-diag-tools-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696546" comment="rsyslog-doc-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696547" comment="rsyslog-module-gssapi-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696548" comment="rsyslog-module-gtls-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696549" comment="rsyslog-module-mysql-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696550" comment="rsyslog-module-pgsql-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696551" comment="rsyslog-module-relp-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696552" comment="rsyslog-module-snmp-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696553" comment="rsyslog-module-udpspoof-8.24.0-3.58.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149267" version="1" class="patch">
	<metadata>
		<title>Security update for pcre (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1199232" ref_url="https://bugzilla.suse.com/1199232" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1586" ref_url="https://www.suse.com/security/cve/CVE-2022-1586/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011480.html" source="SUSE-SU"/>
		<description>
This update for pcre fixes the following issues:
	  
- CVE-2022-1586: Fixed unicode property matching issue. (bsc#1199232)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-08"/>
	<updated date="2022-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199232">SUSE bug 1199232</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1586/">CVE-2022-1586 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">CVE-2022-1586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696418" comment="libpcre1-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696199" comment="libpcre1-32bit-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696419" comment="libpcre16-0-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696556" comment="libpcrecpp0-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696557" comment="libpcreposix0-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696558" comment="pcre-devel-8.45-8.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149268" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rack (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1200748" ref_url="https://bugzilla.suse.com/1200748" source="BUGZILLA"/>
		<reference ref_id="1200750" ref_url="https://bugzilla.suse.com/1200750" source="BUGZILLA"/>
		<reference ref_id="1201588" ref_url="https://bugzilla.suse.com/1201588" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-30122" ref_url="https://www.suse.com/security/cve/CVE-2022-30122/" source="CVE"/>
		<reference ref_id="CVE-2022-30123" ref_url="https://www.suse.com/security/cve/CVE-2022-30123/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011630.html" source="SUSE-SU"/>
		<description>
This update for rubygem-rack fixes the following issues:

- CVE-2022-30122: Fixed crafted multipart POST request may cause a DoS (bsc#1200748)
- CVE-2022-30123: Fixed crafted requests can cause shell escape sequences (bsc#1200750)

The following non-security bug was fixed:

- Fixed a regression in CVE-2022-30122 patch (bsc#1201588).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-22"/>
	<updated date="2022-07-22"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1200748">SUSE bug 1200748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200750">SUSE bug 1200750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201588">SUSE bug 1201588</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-30122/">CVE-2022-30122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30122">CVE-2022-30122 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30123/">CVE-2022-30123 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30123">CVE-2022-30123 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701250" comment="ruby2.1-rubygem-rack-1.6.13-3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149269" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1194859" ref_url="https://bugzilla.suse.com/1194859" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44142" ref_url="https://www.suse.com/security/cve/CVE-2021-44142/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010159.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-44142: Fixed out-of-Bound Read/Write on Samba vfs_fruit module. (bsc#1194859)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-01"/>
	<updated date="2022-02-01"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194859">SUSE bug 1194859</bugzilla>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44142/">CVE-2021-44142 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44142">CVE-2021-44142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666331" comment="libdcerpc-binding0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666161" comment="libdcerpc-binding0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666332" comment="libdcerpc0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666163" comment="libdcerpc0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666333" comment="libndr-krb5pac0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666165" comment="libndr-krb5pac0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666334" comment="libndr-nbt0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666167" comment="libndr-nbt0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666335" comment="libndr-standard0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666169" comment="libndr-standard0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666336" comment="libndr0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666171" comment="libndr0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666337" comment="libnetapi0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666173" comment="libnetapi0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666338" comment="libsamba-credentials0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666175" comment="libsamba-credentials0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666339" comment="libsamba-errors0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666177" comment="libsamba-errors0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666340" comment="libsamba-hostconfig0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666179" comment="libsamba-hostconfig0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666341" comment="libsamba-passdb0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666181" comment="libsamba-passdb0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666342" comment="libsamba-util0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666183" comment="libsamba-util0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666343" comment="libsamdb0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666185" comment="libsamdb0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666344" comment="libsmbclient0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666187" comment="libsmbclient0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666345" comment="libsmbconf0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666189" comment="libsmbconf0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666346" comment="libsmbldap0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666191" comment="libsmbldap0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666347" comment="libtevent-util0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666193" comment="libtevent-util0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666348" comment="libwbclient0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666195" comment="libwbclient0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666349" comment="samba-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666350" comment="samba-client-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666198" comment="samba-client-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666199" comment="samba-doc-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666351" comment="samba-libs-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666201" comment="samba-libs-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666352" comment="samba-winbind-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666203" comment="samba-winbind-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149270" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-tzinfo (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1201835" ref_url="https://bugzilla.suse.com/1201835" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31163" ref_url="https://www.suse.com/security/cve/CVE-2022-31163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011880.html" source="SUSE-SU"/>
		<description>
This update for rubygem-tzinfo fixes the following issues:

- CVE-2022-31163: Fixed relative path traversal vulnerability that allows TZInfo::Timezone.get to load arbitrary files (bsc#1201835).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-10"/>
	<updated date="2022-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201835">SUSE bug 1201835</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31163/">CVE-2022-31163 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31163">CVE-2022-31163 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702287" comment="ruby2.1-rubygem-tzinfo-1.2.2-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149271" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1166457" ref_url="https://bugzilla.suse.com/1166457" source="BUGZILLA"/>
		<reference ref_id="1166458" ref_url="https://bugzilla.suse.com/1166458" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10108" ref_url="https://www.suse.com/security/cve/CVE-2020-10108/" source="CVE"/>
		<reference ref_id="CVE-2020-10109" ref_url="https://www.suse.com/security/cve/CVE-2020-10109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011915.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

- CVE-2020-10108: Fixed an HTTP request smuggling issue (bsc#1166457).
- CVE-2020-10109: Fixed an HTTP request smuggling issue (bsc#1166458).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-16"/>
	<updated date="2022-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166457">SUSE bug 1166457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166458">SUSE bug 1166458</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10108/">CVE-2020-10108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10108">CVE-2020-10108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10109/">CVE-2020-10109 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10109">CVE-2020-10109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703864" comment="python-Twisted-15.2.1-9.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149272" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1194116" ref_url="https://bugzilla.suse.com/1194116" source="BUGZILLA"/>
		<reference ref_id="1195086" ref_url="https://bugzilla.suse.com/1195086" source="BUGZILLA"/>
		<reference ref_id="1195088" ref_url="https://bugzilla.suse.com/1195088" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45452" ref_url="https://www.suse.com/security/cve/CVE-2021-45452/" source="CVE"/>
		<reference ref_id="CVE-2022-22818" ref_url="https://www.suse.com/security/cve/CVE-2022-22818/" source="CVE"/>
		<reference ref_id="CVE-2022-23833" ref_url="https://www.suse.com/security/cve/CVE-2022-23833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010163.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2022-22818: Fixed possible XSS via {% debug %} template tag (bsc#1195086)
- CVE-2022-23833: Fixed denial-of-service possibility in file uploads. (bsc#1195088)

A regression in the fix for CVE-2021-45452 was fixed (bsc#1194116)

		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-01"/>
	<updated date="2022-02-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194116">SUSE bug 1194116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195086">SUSE bug 1195086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195088">SUSE bug 1195088</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-45452/">CVE-2021-45452 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45452">CVE-2021-45452 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22818/">CVE-2022-22818 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22818">CVE-2022-22818 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23833/">CVE-2022-23833 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23833">CVE-2022-23833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666751" comment="python-Django-1.11.29-3.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149273" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rails-html-sanitizer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1201183" ref_url="https://bugzilla.suse.com/1201183" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32209" ref_url="https://www.suse.com/security/cve/CVE-2022-32209/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011985.html" source="SUSE-SU"/>
		<description>
This update for rubygem-rails-html-sanitizer fixes the following issues:

- CVE-2022-32209: Fixed a potential content injection under specific
  configurations (bsc#1201183).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2022-08-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201183">SUSE bug 1201183</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32209/">CVE-2022-32209 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32209">CVE-2022-32209 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707378" comment="ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149274" version="1" class="patch">
	<metadata>
		<title>Security update for python-Babel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1185768" ref_url="https://bugzilla.suse.com/1185768" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42771" ref_url="https://www.suse.com/security/cve/CVE-2021-42771/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009967.html" source="SUSE-SU"/>
		<description>
This update for python-Babel fixes the following issues:


- CVE-2021-42771: Fixed relative path traversal leading to loading arbitrary
  locale files on disk and executing arbitrary code (bsc#1185768).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185768">SUSE bug 1185768</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42771/">CVE-2021-42771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42771">CVE-2021-42771 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660159" comment="python-Babel-2.3.4-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149275" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1100146" ref_url="https://bugzilla.suse.com/1100146" source="BUGZILLA"/>
		<reference ref_id="1145864" ref_url="https://bugzilla.suse.com/1145864" source="BUGZILLA"/>
		<reference ref_id="1152968" ref_url="https://bugzilla.suse.com/1152968" source="BUGZILLA"/>
		<reference ref_id="1174961" ref_url="https://bugzilla.suse.com/1174961" source="BUGZILLA"/>
		<reference ref_id="1178021" ref_url="https://bugzilla.suse.com/1178021" source="BUGZILLA"/>
		<reference ref_id="1178351" ref_url="https://bugzilla.suse.com/1178351" source="BUGZILLA"/>
		<reference ref_id="1179009" ref_url="https://bugzilla.suse.com/1179009" source="BUGZILLA"/>
		<reference ref_id="1179699" ref_url="https://bugzilla.suse.com/1179699" source="BUGZILLA"/>
		<reference ref_id="1184839" ref_url="https://bugzilla.suse.com/1184839" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15862" ref_url="https://www.suse.com/security/cve/CVE-2020-15862/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009966.html" source="SUSE-SU"/>
		<description>
This update for net-snmp fixes the following issues:

- CVE-2020-15862: Make extended MIB read-only (bsc#1174961)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1100146">SUSE bug 1100146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145864">SUSE bug 1145864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152968">SUSE bug 1152968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174961">SUSE bug 1174961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178021">SUSE bug 1178021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178351">SUSE bug 1178351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179009">SUSE bug 1179009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179699">SUSE bug 1179699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184839">SUSE bug 1184839</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15862/">CVE-2020-15862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15862">CVE-2020-15862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661606" comment="libsnmp30-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661599" comment="libsnmp30-32bit-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661607" comment="net-snmp-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661608" comment="perl-SNMP-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661609" comment="snmp-mibs-5.7.3-6.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149276" version="1" class="patch">
	<metadata>
		<title>Security update for keepalived (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1193115" ref_url="https://bugzilla.suse.com/1193115" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44225" ref_url="https://www.suse.com/security/cve/CVE-2021-44225/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012202.html" source="SUSE-SU"/>
		<description>
This update for keepalived fixes the following issues:

- CVE-2021-44225: Fix a potential privilege escalation due to
  insufficient control in the D-Bus policy (bsc#1193115).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-09"/>
	<updated date="2022-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193115">SUSE bug 1193115</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-44225/">CVE-2021-44225 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44225">CVE-2021-44225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707933" comment="keepalived-2.0.19-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149277" version="1" class="patch">
	<metadata>
		<title>Security update for python-rsa (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1172389" ref_url="https://bugzilla.suse.com/1172389" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13757" ref_url="https://www.suse.com/security/cve/CVE-2020-13757/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012269.html" source="SUSE-SU"/>
		<description>
This update for python-rsa fixes the following issues:

- CVE-2020-13757: Fixed an issue where leading null bytes in a
  ciphertext would be ignored during decryption, leading to a
  potential information leak (bsc#1172389).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-16"/>
	<updated date="2022-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172389">SUSE bug 1172389</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13757/">CVE-2020-13757 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13757">CVE-2020-13757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707934" comment="python-rsa-3.4.2-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149278" version="1" class="patch">
	<metadata>
		<title>Security update for ardana-ansible, ardana-cobbler, grafana, openstack-heat-templates, openstack-murano, python-Django, rabbitmq-server, rubygem-puma (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1157665" ref_url="https://bugzilla.suse.com/1157665" source="BUGZILLA"/>
		<reference ref_id="1191454" ref_url="https://bugzilla.suse.com/1191454" source="BUGZILLA"/>
		<reference ref_id="1193597" ref_url="https://bugzilla.suse.com/1193597" source="BUGZILLA"/>
		<reference ref_id="1197818" ref_url="https://bugzilla.suse.com/1197818" source="BUGZILLA"/>
		<reference ref_id="1198398" ref_url="https://bugzilla.suse.com/1198398" source="BUGZILLA"/>
		<reference ref_id="1201186" ref_url="https://bugzilla.suse.com/1201186" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11287" ref_url="https://www.suse.com/security/cve/CVE-2019-11287/" source="CVE"/>
		<reference ref_id="CVE-2020-1734" ref_url="https://www.suse.com/security/cve/CVE-2020-1734/" source="CVE"/>
		<reference ref_id="CVE-2021-39226" ref_url="https://www.suse.com/security/cve/CVE-2021-39226/" source="CVE"/>
		<reference ref_id="CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716/" source="CVE"/>
		<reference ref_id="CVE-2022-24790" ref_url="https://www.suse.com/security/cve/CVE-2022-24790/" source="CVE"/>
		<reference ref_id="CVE-2022-28346" ref_url="https://www.suse.com/security/cve/CVE-2022-28346/" source="CVE"/>
		<reference ref_id="CVE-2022-34265" ref_url="https://www.suse.com/security/cve/CVE-2022-34265/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012332.html" source="SUSE-SU"/>
		<description>
This update for ardana-ansible, ardana-cobbler, grafana, openstack-heat-templates, openstack-murano, python-Django, rabbitmq-server, rubygem-puma fixes the following issues:

Security updates included on this update:

ardana-ansible, ardana-cobbler, grafana, openstack-heat-templates, openstack-murano, rabbitmq-server:
- CVE-2020-1734: Fixed vulnerability where shell was enabled by default in a pipe lookup plugin subprocess. (SOC-11662, bnc#1164139)
- CVE-2021-44716: Fixed uncontrolled memory consumption in go's net/http. (bsc#1193597)
- CVE-2019-11287: Fixed DoS via 'X-Reason' HTTP Header in malicious Erlang format string. (bsc#1157665)

grafana:
- CVE-2021-39226: Fixed snapshot authentication bypass (bsc#1191454).
- CVE-2021-44716: Fixed uncontrolled memory consumption in go's net/http (bsc#1193597).

python-Django:
- CVE-2022-28346: Fixed vulnerability that could lead to SQL injection in QuerySet.annotate(),aggregate() and extra(). (bsc#1198398)
- CVE-2022-34265: Fixed vulnerability that could lead to SQL injection via Trunc(kind) and Extract(lookup_name) arguments. (bsc#1201186)

rubygem puma:
- CVE-2022-24790: Fixed HTTP request smuggling vulnerability. (bsc#1197818)

Additional information about the this update:

Changes in ardana-ansible:
- Update to version 8.0+git.1660773729.3789a6d:
  * Mitigate CVE-2020-1734 (SOC-11662)

Changes in ardana-cobbler:
- Update to version 8.0+git.1660773402.d845a45:
  * Mitigate CVE-2020-1734 (SOC-11662)

Changes in grafana:
- Add CVE-2021-39226 patch (bsc#1191454, CVE-2021-39226)
  * snapshot authentication bypass

- Bump Go to 1.16 (bsc#1193597, CVE-2021-44716)
  * Fix Go net/http: limit growth of header canonicalization cache.

Changes in openstack-heat-templates:
- Update to version 0.0.0+git.1654529662.75fa04a:
  * doc: Comment out language option

Changes in openstack-murano:
- Update to version murano-4.0.2.dev3:
  * [stable-only] Remove periodic-stable-jobs template

Changes in openstack-murano:
- Update to version murano-4.0.2.dev3:
  * [stable-only] Remove periodic-stable-jobs template

Changes in rabbitmq-server:
- add explanation-format patch to fix CVE-2019-11287 (bsc#1157665)

Changes in python-Django:
- Rename Django-1.11.29.tar.gz.asc to Django-1.11.29.tar.gz.checksums.txt
  to avoid source_validator incorrectly trying to use it as a detached
  signature file for the sources tarball.
- Remove unnecessary project.diff file.

- Add CVE-2022-28346 patch (bsc#1198398, CVE-2022-28346)
    * Potential SQL injection in QuerySet.annotate(),aggregate() and extra()
- Add CVE-2022-34265 patch (bsc#1201186, CVE-2022-34265)
    * SQL injection via Trunc(kind) and Extract(lookup_name) arguments

Changes in rubygem-puma:
- Add CVE-2022-24790: Fixed HTTP request smuggling vulnerability (bsc#1197818).

  		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-22"/>
	<updated date="2022-09-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1157665">SUSE bug 1157665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191454">SUSE bug 1191454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193597">SUSE bug 1193597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197818">SUSE bug 1197818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198398">SUSE bug 1198398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201186">SUSE bug 1201186</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11287/">CVE-2019-11287 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11287">CVE-2019-11287 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1734/">CVE-2020-1734 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1734">CVE-2020-1734 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-39226/">CVE-2021-39226 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39226">CVE-2021-39226 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44716">CVE-2021-44716 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-24790/">CVE-2022-24790 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24790">CVE-2022-24790 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28346/">CVE-2022-28346 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28346">CVE-2022-28346 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34265/">CVE-2022-34265 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34265">CVE-2022-34265 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009713937" comment="grafana-6.7.4-4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713938" comment="openstack-heat-templates-0.0.0+git.1654529662.75fa04a-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713939" comment="openstack-murano-4.0.2~dev3-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713940" comment="openstack-murano-api-4.0.2~dev3-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713941" comment="openstack-murano-doc-4.0.2~dev3-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713942" comment="openstack-murano-engine-4.0.2~dev3-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713943" comment="python-Django-1.11.29-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713944" comment="python-murano-4.0.2~dev3-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713945" comment="rabbitmq-server-3.6.16-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713946" comment="rabbitmq-server-plugins-3.6.16-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710628" comment="ruby2.1-rubygem-puma-2.16.0-3.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149279" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1194006" ref_url="https://bugzilla.suse.com/1194006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009971.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-4156: Fixed heap buffer overflow in flac_buffer_copy that 
could potentially lead to heap exploitation (bsc#1194006).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4156">CVE-2021-4156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662498" comment="libsndfile1-1.0.25-36.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662485" comment="libsndfile1-32bit-1.0.25-36.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149280" version="1" class="patch">
	<metadata>
		<title>Security update for elasticsearch, elasticsearch-kit, kafka, kafka-kit, logstash, openstack-monasca-agent, openstack-monasca-log-metrics, openstack-monasca-log-persister, openstack-monasca-log-transformer, openstack-monasca-persister-java, openstack-monasca-persister-java-kit, openstack-monasca-thresh, openstack-monasca-thresh-kit, spark, spark-kit, venv-openstack-monasca, zookeeper, zookeeper-kit (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010196.html" source="SUSE-SU"/>
		<description>
This update for elasticsearch, elasticsearch-kit, kafka, kafka-kit, logstash, openstack-monasca-agent, openstack-monasca-log-metrics, openstack-monasca-log-persister, openstack-monasca-log-transformer, openstack-monasca-persister-java, openstack-monasca-persister-java-kit, openstack-monasca-thresh, openstack-monasca-thresh-kit, spark, spark-kit, venv-openstack-monasca, zookeeper, zookeeper-kit fixes the following issues:

- CVE-2021-4104: Fixed remote code execution through JMS API via the ldap JNDI parser (bsc#1193662).
- CVE-2022-23302: Fixed remote code execution in Log4j 1.x when application is configured to use JMSSink (bsc#1194842).
- CVE-2022-23305: Fixed SQL injection in Log4j 1.x when application is configured to use JDBCAppender (bsc#1194843).
- CVE-2022-23307: Fixed deserialization flaw in the Chainsaw component of Log4j 1 that could lead to malicious code execution (bsc#1194844).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-09"/>
	<updated date="2022-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">CVE-2021-4104 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23302">CVE-2022-23302 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23305">CVE-2022-23305 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23307">CVE-2022-23307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666978" comment="elasticsearch-2.4.2-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666979" comment="kafka-0.10.2.2-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664953" comment="logstash-2.4.1-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664954" comment="openstack-monasca-agent-2.2.6~dev4-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666980" comment="openstack-monasca-log-metrics-0.0.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666981" comment="openstack-monasca-log-persister-0.0.1-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666982" comment="openstack-monasca-log-transformer-0.0.1-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666983" comment="openstack-monasca-persister-java-1.7.1~a0~dev2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666984" comment="openstack-monasca-thresh-2.1.1-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664960" comment="python-monasca-agent-2.2.6~dev4-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666985" comment="spark-1.6.3-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666986" comment="storm-1.2.3-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666987" comment="storm-nimbus-1.2.3-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666988" comment="storm-supervisor-1.2.3-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667011" comment="zookeeper-server-3.4.10-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149281" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010197.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-09"/>
	<updated date="2022-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20698">CVE-2022-20698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664693" comment="clamav-0.103.5-33.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149282" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1194581" ref_url="https://bugzilla.suse.com/1194581" source="BUGZILLA"/>
		<reference ref_id="1194588" ref_url="https://bugzilla.suse.com/1194588" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23034" ref_url="https://www.suse.com/security/cve/CVE-2022-23034/" source="CVE"/>
		<reference ref_id="CVE-2022-23035" ref_url="https://www.suse.com/security/cve/CVE-2022-23035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010198.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-23034: Fixed possible DoS by a PV guest Xen while unmapping a grant. (XSA-394) (bsc#1194581)
- CVE-2022-23035: Fixed insufficient cleanup of passed-through device IRQs. (XSA-395) (bsc#1194588)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-09"/>
	<updated date="2022-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194581">SUSE bug 1194581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194588">SUSE bug 1194588</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23034/">CVE-2022-23034 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23034">CVE-2022-23034 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23035/">CVE-2022-23035 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23035">CVE-2022-23035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666154" comment="xen-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666155" comment="xen-doc-html-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666156" comment="xen-libs-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666157" comment="xen-libs-32bit-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666158" comment="xen-tools-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666159" comment="xen-tools-domU-4.9.4_26-3.100.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149283" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1183696" ref_url="https://bugzilla.suse.com/1183696" source="BUGZILLA"/>
		<reference ref_id="1186207" ref_url="https://bugzilla.suse.com/1186207" source="BUGZILLA"/>
		<reference ref_id="1192032" ref_url="https://bugzilla.suse.com/1192032" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192847" ref_url="https://bugzilla.suse.com/1192847" source="BUGZILLA"/>
		<reference ref_id="1192877" ref_url="https://bugzilla.suse.com/1192877" source="BUGZILLA"/>
		<reference ref_id="1192946" ref_url="https://bugzilla.suse.com/1192946" source="BUGZILLA"/>
		<reference ref_id="1193157" ref_url="https://bugzilla.suse.com/1193157" source="BUGZILLA"/>
		<reference ref_id="1193440" ref_url="https://bugzilla.suse.com/1193440" source="BUGZILLA"/>
		<reference ref_id="1193442" ref_url="https://bugzilla.suse.com/1193442" source="BUGZILLA"/>
		<reference ref_id="1193507" ref_url="https://bugzilla.suse.com/1193507" source="BUGZILLA"/>
		<reference ref_id="1193575" ref_url="https://bugzilla.suse.com/1193575" source="BUGZILLA"/>
		<reference ref_id="1193669" ref_url="https://bugzilla.suse.com/1193669" source="BUGZILLA"/>
		<reference ref_id="1193727" ref_url="https://bugzilla.suse.com/1193727" source="BUGZILLA"/>
		<reference ref_id="1193861" ref_url="https://bugzilla.suse.com/1193861" source="BUGZILLA"/>
		<reference ref_id="1193864" ref_url="https://bugzilla.suse.com/1193864" source="BUGZILLA"/>
		<reference ref_id="1193867" ref_url="https://bugzilla.suse.com/1193867" source="BUGZILLA"/>
		<reference ref_id="1194001" ref_url="https://bugzilla.suse.com/1194001" source="BUGZILLA"/>
		<reference ref_id="1194087" ref_url="https://bugzilla.suse.com/1194087" source="BUGZILLA"/>
		<reference ref_id="1194094" ref_url="https://bugzilla.suse.com/1194094" source="BUGZILLA"/>
		<reference ref_id="1194272" ref_url="https://bugzilla.suse.com/1194272" source="BUGZILLA"/>
		<reference ref_id="1194302" ref_url="https://bugzilla.suse.com/1194302" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1194529" ref_url="https://bugzilla.suse.com/1194529" source="BUGZILLA"/>
		<reference ref_id="1194880" ref_url="https://bugzilla.suse.com/1194880" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25020" ref_url="https://www.suse.com/security/cve/CVE-2018-25020/" source="CVE"/>
		<reference ref_id="CVE-2019-0136" ref_url="https://www.suse.com/security/cve/CVE-2019-0136/" source="CVE"/>
		<reference ref_id="CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519/" source="CVE"/>
		<reference ref_id="CVE-2021-0935" ref_url="https://www.suse.com/security/cve/CVE-2021-0935/" source="CVE"/>
		<reference ref_id="CVE-2021-28711" ref_url="https://www.suse.com/security/cve/CVE-2021-28711/" source="CVE"/>
		<reference ref_id="CVE-2021-28712" ref_url="https://www.suse.com/security/cve/CVE-2021-28712/" source="CVE"/>
		<reference ref_id="CVE-2021-28713" ref_url="https://www.suse.com/security/cve/CVE-2021-28713/" source="CVE"/>
		<reference ref_id="CVE-2021-28715" ref_url="https://www.suse.com/security/cve/CVE-2021-28715/" source="CVE"/>
		<reference ref_id="CVE-2021-33098" ref_url="https://www.suse.com/security/cve/CVE-2021-33098/" source="CVE"/>
		<reference ref_id="CVE-2021-3564" ref_url="https://www.suse.com/security/cve/CVE-2021-3564/" source="CVE"/>
		<reference ref_id="CVE-2021-39648" ref_url="https://www.suse.com/security/cve/CVE-2021-39648/" source="CVE"/>
		<reference ref_id="CVE-2021-39657" ref_url="https://www.suse.com/security/cve/CVE-2021-39657/" source="CVE"/>
		<reference ref_id="CVE-2021-4002" ref_url="https://www.suse.com/security/cve/CVE-2021-4002/" source="CVE"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4149" ref_url="https://www.suse.com/security/cve/CVE-2021-4149/" source="CVE"/>
		<reference ref_id="CVE-2021-4155" ref_url="https://www.suse.com/security/cve/CVE-2021-4155/" source="CVE"/>
		<reference ref_id="CVE-2021-4197" ref_url="https://www.suse.com/security/cve/CVE-2021-4197/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2021-45485" ref_url="https://www.suse.com/security/cve/CVE-2021-45485/" source="CVE"/>
		<reference ref_id="CVE-2021-45486" ref_url="https://www.suse.com/security/cve/CVE-2021-45486/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 LTSS kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2018-25020: Fixed an overflow in the BPF subsystem due to a mishandling of a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions. This affects kernel/bpf/core.c and net/core/filter.c (bnc#1193575).
- CVE-2019-0136: Fixed insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver that may have allowed an unauthenticated user to potentially enable denial of service via adjacent access (bnc#1193157).
- CVE-2020-35519: Fixed out-of-bounds memory access in x25_bind in net/x25/af_x25.c. A bounds check failure allowed a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information (bnc#1183696).
- CVE-2021-0935: Fixed possible out of bounds write in ip6_xmit of ip6_output.c due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192032).
- CVE-2021-28711: Fixed issue with xen/blkfront to harden blkfront against event channel storms (XSA-391) (bsc#1193440).
- CVE-2021-28712: Fixed issue with xen/netfront to harden netfront against event channel storms (XSA-391) (bsc#1193440).
- CVE-2021-28713: Fixed issue with xen/console to harden hvc_xen against event channel storms (XSA-391) (bsc#1193440).
- CVE-2021-28715: Fixed issue with xen/netback to do not queue unlimited number of packages (XSA-392) (bsc#1193442).
- CVE-2021-33098: Fixed improper input validation in the Intel(R) Ethernet ixgbe driver that may have allowed an authenticated user to potentially cause denial of service via local access (bnc#1192877).
- CVE-2021-3564: Fixed double-free memory corruption in the Linux kernel HCI device initialization subsystem that could have been used by attaching malicious HCI TTY Bluetooth devices. A local user could use this flaw to crash the system (bnc#1186207).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-4002: Fixed incorrect TLBs flush in hugetlbfs after huge_pmd_unshare (bsc#1192946).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1193727).
- CVE-2021-4149: Fixed btrfs unlock newly allocated extent buffer after error (bsc#1194001).
- CVE-2021-4155: Fixed XFS map issue when unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate (bsc#1194272).
- CVE-2021-4197: Use cgroup open-time credentials for process migraton perm checks (bsc#1194302).
- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194529).
- CVE-2021-43976: Fixed insufficient access control in drivers/net/wireless/marvell/mwifiex/usb.c that allowed an attacker who connect a crafted USB device to cause denial of service (bnc#1192847).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2021-45485: Fixed information leak in the IPv6 implementation in net/ipv6/output_core.c (bnc#1194094).
- CVE-2021-45486: Fixed information leak inside the IPv4 implementation caused by very small hash table (bnc#1194087).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).


The following non-security bugs were fixed:

- fget: clarify and improve __fget_files() implementation (bsc#1193727).
- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (bsc#1193507).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193507).
- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- memstick: rtsx_usb_ms: fix UAF
- moxart: fix potential use-after-free on remove path (bsc1194516).
- net/x25: fix a race in x25_bind() (networking-stable-19_03_15).
- net: mana: Add RX fencing (bsc#1193507).
- net: mana: Allow setting the number of queues while the NIC is down (bsc#1193507).
- net: mana: Fix spelling mistake 'calledd' -&gt; 'called' (bsc#1193507).
- net: mana: Fix the netdev_err()'s vPort argument in mana_init_port() (bsc#1193507).
- net: mana: Improve the HWC error handling (bsc#1193507).
- net: mana: Support hibernation and kexec (bsc#1193507).
- net: mana: Use kcalloc() instead of kzalloc() (bsc#1193507).
- recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267).
- recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc#1192267).
- ring-buffer: Protect ring_buffer_reset() from reentrancy (bsc#1179960).
- tty: hvc: replace BUG_ON() with negative return value (git-fixes).
- xen-netfront: do not assume sk_buff_head list is empty in error handling (git-fixes).
- xen-netfront: do not use ~0U as error return value for xennet_fill_frags() (git-fixes).
- xen/blkfront: do not take local copy of a request from the ring page (git-fixes).
- xen/blkfront: do not trust the backend response data blindly (git-fixes).
- xen/blkfront: read response from backend only once (git-fixes).
- xen/netfront: disentangle tx_skb_freelist (git-fixes).
- xen/netfront: do not bug in case of too many frags (bnc#1012382).
- xen/netfront: do not cache skb_shinfo() (bnc#1012382).
- xen/netfront: do not read data from request on the ring page (git-fixes).
- xen/netfront: do not trust the backend response data blindly (git-fixes).
- xen/netfront: read response from backend only once (git-fixes).
- xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-10"/>
	<updated date="2022-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183696">SUSE bug 1183696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186207">SUSE bug 1186207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192032">SUSE bug 1192032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192847">SUSE bug 1192847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192877">SUSE bug 1192877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192946">SUSE bug 1192946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193157">SUSE bug 1193157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193440">SUSE bug 1193440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193442">SUSE bug 1193442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193507">SUSE bug 1193507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193575">SUSE bug 1193575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193669">SUSE bug 1193669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193727">SUSE bug 1193727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193861">SUSE bug 1193861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193864">SUSE bug 1193864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194001">SUSE bug 1194001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194087">SUSE bug 1194087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194094">SUSE bug 1194094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194272">SUSE bug 1194272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194302">SUSE bug 1194302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194529">SUSE bug 1194529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194880">SUSE bug 1194880</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25020/">CVE-2018-25020 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25020">CVE-2018-25020 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0136/">CVE-2019-0136 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0136">CVE-2019-0136 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35519">CVE-2020-35519 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0935/">CVE-2021-0935 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0935">CVE-2021-0935 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28711/">CVE-2021-28711 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28711">CVE-2021-28711 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28712/">CVE-2021-28712 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28712">CVE-2021-28712 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28713/">CVE-2021-28713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28713">CVE-2021-28713 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28715/">CVE-2021-28715 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28715">CVE-2021-28715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33098/">CVE-2021-33098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33098">CVE-2021-33098 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3564/">CVE-2021-3564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3564">CVE-2021-3564 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39648/">CVE-2021-39648 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39648">CVE-2021-39648 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39657/">CVE-2021-39657 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39657">CVE-2021-39657 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4002/">CVE-2021-4002 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4002">CVE-2021-4002 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">CVE-2021-4083 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4149/">CVE-2021-4149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4149">CVE-2021-4149 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4155/">CVE-2021-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4155">CVE-2021-4155 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4197/">CVE-2021-4197 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4197">CVE-2021-4197 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4202">CVE-2021-4202 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43976">CVE-2021-43976 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45095">CVE-2021-45095 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45485/">CVE-2021-45485 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45485">CVE-2021-45485 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45486/">CVE-2021-45486 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45486">CVE-2021-45486 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666922" comment="kernel-default-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666923" comment="kernel-default-base-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666924" comment="kernel-default-devel-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667641" comment="kernel-default-kgraft-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666898" comment="kernel-devel-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666899" comment="kernel-macros-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666900" comment="kernel-source-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666925" comment="kernel-syms-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667643" comment="kgraft-patch-4_4_180-94_153-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149284" version="1" class="patch">
	<metadata>
		<title>Security update for python-waitress (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1197255" ref_url="https://bugzilla.suse.com/1197255" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24761" ref_url="https://www.suse.com/security/cve/CVE-2022-24761/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012565.html" source="SUSE-SU"/>
		<description>
This update for python-waitress fixes the following issues:

- CVE-2022-24761: Fixed a bug to avoid inconsistent interpretation of HTTP requests leading to request smuggling. (bsc#1197255)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-18"/>
	<updated date="2022-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197255">SUSE bug 1197255</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-24761/">CVE-2022-24761 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24761">CVE-2022-24761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716729" comment="python-waitress-1.4.3-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149285" version="1" class="patch">
	<metadata>
		<title>Security update for python-Mako (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1203246" ref_url="https://bugzilla.suse.com/1203246" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40023" ref_url="https://www.suse.com/security/cve/CVE-2022-40023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012638.html" source="SUSE-SU"/>
		<description>
This update for python-Mako fixes the following issues:

  - CVE-2022-40023: Fixed regular expression Denial of Service when using the Lexer class to parse (bsc#1203246).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-24"/>
	<updated date="2022-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203246">SUSE bug 1203246</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40023/">CVE-2022-40023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40023">CVE-2022-40023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717342" comment="python-Mako-1.0.7-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149286" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionview-4_2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1199060" ref_url="https://bugzilla.suse.com/1199060" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27777" ref_url="https://www.suse.com/security/cve/CVE-2022-27777/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012803.html" source="SUSE-SU"/>
		<description>
This update for rubygem-actionview-4_2 fixes the following issues:

- CVE-2022-27777: Fixed cross-site scripting vulnerability in Action View tag helpers (bsc#1199060).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-03"/>
	<updated date="2022-11-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1199060">SUSE bug 1199060</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-27777/">CVE-2022-27777 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27777">CVE-2022-27777 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716331" comment="ruby2.1-rubygem-actionview-4_2-4.2.9-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721957" comment="ruby2.1-rubygem-activesupport-4_2-4.2.9-7.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149287" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-nokogiri (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1198408" ref_url="https://bugzilla.suse.com/1198408" source="BUGZILLA"/>
		<reference ref_id="1199782" ref_url="https://bugzilla.suse.com/1199782" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24836" ref_url="https://www.suse.com/security/cve/CVE-2022-24836/" source="CVE"/>
		<reference ref_id="CVE-2022-29181" ref_url="https://www.suse.com/security/cve/CVE-2022-29181/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012823.html" source="SUSE-SU"/>
		<description>
This update for rubygem-nokogiri fixes the following issues:

- CVE-2022-24836: Fixes possibility to DoS because of inefficient RE in HTML encoding. (bsc#1198408)
- CVE-2022-29181: Fixes Improper Handling of Unexpected Data Typesi. (bsc#1199782)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-07"/>
	<updated date="2022-11-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198408">SUSE bug 1198408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199782">SUSE bug 1199782</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24836/">CVE-2022-24836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24836">CVE-2022-24836 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29181/">CVE-2022-29181 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29181">CVE-2022-29181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722322" comment="ruby2.1-rubygem-nokogiri-1.6.1-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149288" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_wsgi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1201634" ref_url="https://bugzilla.suse.com/1201634" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2255" ref_url="https://www.suse.com/security/cve/CVE-2022-2255/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012943.html" source="SUSE-SU"/>
		<description>
This update for apache2-mod_wsgi fixes the following issues:

- CVE-2022-2255: Hardened the trusted proxy header filter to avoid bypass. (bsc#1201634)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-16"/>
	<updated date="2022-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201634">SUSE bug 1201634</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2255/">CVE-2022-2255 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2255">CVE-2022-2255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717341" comment="apache2-mod_wsgi-4.4.13-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149289" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1204781" ref_url="https://bugzilla.suse.com/1204781" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12387" ref_url="https://www.suse.com/security/cve/CVE-2019-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-10108" ref_url="https://www.suse.com/security/cve/CVE-2020-10108/" source="CVE"/>
		<reference ref_id="CVE-2022-21712" ref_url="https://www.suse.com/security/cve/CVE-2022-21712/" source="CVE"/>
		<reference ref_id="CVE-2022-39348" ref_url="https://www.suse.com/security/cve/CVE-2022-39348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026310.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

- CVE-2022-39348: Fixed NameVirtualHost Host header injection (bsc#1204781).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-18"/>
	<updated date="2022-11-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204781">SUSE bug 1204781</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12387/">CVE-2019-12387 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12387">CVE-2019-12387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10108/">CVE-2020-10108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10108">CVE-2020-10108 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21712/">CVE-2022-21712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21712">CVE-2022-21712 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39348/">CVE-2022-39348 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39348">CVE-2022-39348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723313" comment="python-Twisted-15.2.1-9.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149290" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-loofah (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1154751" ref_url="https://bugzilla.suse.com/1154751" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8048" ref_url="https://www.suse.com/security/cve/CVE-2018-8048/" source="CVE"/>
		<reference ref_id="CVE-2019-15587" ref_url="https://www.suse.com/security/cve/CVE-2019-15587/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012986.html" source="SUSE-SU"/>
		<description>
This update for rubygem-loofah fixes the following issues:

  - CVE-2019-15587: Fixed issue in sanitization of crafted SVG elements (bsc#1154751).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-18"/>
	<updated date="2022-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154751">SUSE bug 1154751</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8048/">CVE-2018-8048 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8048">CVE-2018-8048 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15587/">CVE-2019-15587 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15587">CVE-2019-15587 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721419" comment="ruby2.1-rubygem-loofah-2.0.2-3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149291" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1192876" ref_url="https://bugzilla.suse.com/1192876" source="BUGZILLA"/>
		<reference ref_id="1193981" ref_url="https://bugzilla.suse.com/1193981" source="BUGZILLA"/>
		<reference ref_id="1194041" ref_url="https://bugzilla.suse.com/1194041" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3975" ref_url="https://www.suse.com/security/cve/CVE-2021-3975/" source="CVE"/>
		<reference ref_id="CVE-2021-4147" ref_url="https://www.suse.com/security/cve/CVE-2021-4147/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009983.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2021-4147: libxl: Fix libvirtd deadlocks and segfaults. (bsc#1194041)
- CVE-2021-3975: Add missing lock in qemuProcessHandleMonitorEOF. (bsc#1192876)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-10"/>
	<updated date="2022-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192876">SUSE bug 1192876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193981">SUSE bug 1193981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194041">SUSE bug 1194041</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3975/">CVE-2021-3975 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3975">CVE-2021-3975 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4147/">CVE-2021-4147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4147">CVE-2021-4147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662251" comment="libvirt-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662252" comment="libvirt-admin-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662253" comment="libvirt-client-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662254" comment="libvirt-daemon-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662255" comment="libvirt-daemon-config-network-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662256" comment="libvirt-daemon-config-nwfilter-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662257" comment="libvirt-daemon-driver-interface-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662170" comment="libvirt-daemon-driver-libxl-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662258" comment="libvirt-daemon-driver-lxc-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662259" comment="libvirt-daemon-driver-network-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662260" comment="libvirt-daemon-driver-nodedev-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662261" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662262" comment="libvirt-daemon-driver-qemu-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662263" comment="libvirt-daemon-driver-secret-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662264" comment="libvirt-daemon-driver-storage-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662265" comment="libvirt-daemon-driver-storage-core-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662266" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662267" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662268" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662269" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662183" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662270" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662271" comment="libvirt-daemon-hooks-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662272" comment="libvirt-daemon-lxc-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662273" comment="libvirt-daemon-qemu-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662188" comment="libvirt-daemon-xen-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662274" comment="libvirt-doc-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662275" comment="libvirt-libs-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662276" comment="libvirt-lock-sanlock-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662277" comment="libvirt-nss-3.3.0-5.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149292" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1195389" ref_url="https://bugzilla.suse.com/1195389" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0135" ref_url="https://www.suse.com/security/cve/CVE-2022-0135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010244.html" source="SUSE-SU"/>
		<description>
This update for virglrenderer fixes the following issues:

- CVE-2022-0135: Fixed out-of-bonds write in read_transfer_data() (bsc#1195389).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195389">SUSE bug 1195389</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0135/">CVE-2022-0135 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0135">CVE-2022-0135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667335" comment="libvirglrenderer0-0.5.0-12.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149293" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1195054" ref_url="https://bugzilla.suse.com/1195054" source="BUGZILLA"/>
		<reference ref_id="1195217" ref_url="https://bugzilla.suse.com/1195217" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010253.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">CVE-2022-23852 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23990">CVE-2022-23990 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666236" comment="expat-2.1.0-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666237" comment="libexpat1-2.1.0-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666209" comment="libexpat1-32bit-2.1.0-21.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149294" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1071031" ref_url="https://bugzilla.suse.com/1071031" source="BUGZILLA"/>
		<reference ref_id="1154365" ref_url="https://bugzilla.suse.com/1154365" source="BUGZILLA"/>
		<reference ref_id="1182808" ref_url="https://bugzilla.suse.com/1182808" source="BUGZILLA"/>
		<reference ref_id="1182809" ref_url="https://bugzilla.suse.com/1182809" source="BUGZILLA"/>
		<reference ref_id="1182811" ref_url="https://bugzilla.suse.com/1182811" source="BUGZILLA"/>
		<reference ref_id="1182812" ref_url="https://bugzilla.suse.com/1182812" source="BUGZILLA"/>
		<reference ref_id="1190312" ref_url="https://bugzilla.suse.com/1190312" source="BUGZILLA"/>
		<reference ref_id="1194539" ref_url="https://bugzilla.suse.com/1194539" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17095" ref_url="https://www.suse.com/security/cve/CVE-2017-17095/" source="CVE"/>
		<reference ref_id="CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546/" source="CVE"/>
		<reference ref_id="CVE-2020-19131" ref_url="https://www.suse.com/security/cve/CVE-2020-19131/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<reference ref_id="CVE-2022-22844" ref_url="https://www.suse.com/security/cve/CVE-2022-22844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010261.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2017-17095: Fixed DoS in tools/pal2rgb.c in pal2rgb (bsc#1071031).
- CVE-2019-17546: Fixed integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image (bsc#1154365).
- CVE-2020-19131: Fixed buffer overflow in tiffcrop that may cause DoS via the invertImage() function (bsc#1190312).
- CVE-2020-35521: Fixed memory allocation failure in tif_read.c (bsc#1182808).
- CVE-2020-35522: Fixed memory allocation failure in tif_pixarlog.c (bsc#1182809).
- CVE-2020-35523: Fixed integer overflow in tif_getimage.c (bsc#1182811).
- CVE-2020-35524: Fixed heap-based buffer overflow in TIFF2PDF tool (bsc#1182812).
- CVE-2022-22844: Fixed out-of-bounds read in _TIFFmemcpy in tif_unix.c (bsc#1194539).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071031">SUSE bug 1071031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154365">SUSE bug 1154365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182808">SUSE bug 1182808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182809">SUSE bug 1182809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182811">SUSE bug 1182811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182812">SUSE bug 1182812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190312">SUSE bug 1190312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194539">SUSE bug 1194539</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17095/">CVE-2017-17095 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17095">CVE-2017-17095 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17546">CVE-2019-17546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-19131/">CVE-2020-19131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19131">CVE-2020-19131 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35521">CVE-2020-35521 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35522">CVE-2020-35522 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35523">CVE-2020-35523 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35524">CVE-2020-35524 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22844/">CVE-2022-22844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22844">CVE-2022-22844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666234" comment="libtiff5-4.0.9-44.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666205" comment="libtiff5-32bit-4.0.9-44.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666235" comment="tiff-4.0.9-44.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149295" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1195825" ref_url="https://bugzilla.suse.com/1195825" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010269.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2018-16301: Fixed segfault when handling large files (bsc#1195825).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668119" comment="tcpdump-4.9.2-14.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149296" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1195108" ref_url="https://bugzilla.suse.com/1195108" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010280.html" source="SUSE-SU"/>
		<description>
This update for xerces-j2 fixes the following issues:

- CVE-2022-23437: Fixed infinite loop within Apache XercesJ xml parser (bsc#1195108).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-21"/>
	<updated date="2022-02-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23437">CVE-2022-23437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667934" comment="xerces-j2-2.8.1-268.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667935" comment="xerces-j2-xml-apis-2.8.1-268.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667936" comment="xerces-j2-xml-resolver-2.8.1-268.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149297" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1195230" ref_url="https://bugzilla.suse.com/1195230" source="BUGZILLA"/>
		<reference ref_id="1195682" ref_url="https://bugzilla.suse.com/1195682" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010302.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682)

- CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via Maintenance Service
- CVE-2022-22754: Extensions could have bypassed permission confirmation during update
- CVE-2022-22756: Drag and dropping an image could have resulted in the dropped object being an executable
- CVE-2022-22759: Sandboxed iframes could have executed script if the parent appended elements
- CVE-2022-22760: Cross-Origin responses could be distinguished between script and non-script content-types
- CVE-2022-22761: frame-ancestors Content Security Policy directive was not enforced for framed extension pages
- CVE-2022-22763: Script Execution during invalid object state
- CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6


Firefox Extended Support Release 91.5.1 ESR (bsc#1195230)

- Fixed an issue that allowed unexpected data to be submitted in some of our search telemetry
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-24"/>
	<updated date="2022-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195230">SUSE bug 1195230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22753">CVE-2022-22753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22754">CVE-2022-22754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22756">CVE-2022-22756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22759">CVE-2022-22759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22760">CVE-2022-22760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22761">CVE-2022-22761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22763">CVE-2022-22763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22764">CVE-2022-22764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668887" comment="MozillaFirefox-91.6.0-112.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668888" comment="MozillaFirefox-devel-91.6.0-112.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668889" comment="MozillaFirefox-translations-common-91.6.0-112.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149298" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1192615" ref_url="https://bugzilla.suse.com/1192615" source="BUGZILLA"/>
		<reference ref_id="1195779" ref_url="https://bugzilla.suse.com/1195779" source="BUGZILLA"/>
		<reference ref_id="1195780" ref_url="https://bugzilla.suse.com/1195780" source="BUGZILLA"/>
		<reference ref_id="1195781" ref_url="https://bugzilla.suse.com/1195781" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0127" ref_url="https://www.suse.com/security/cve/CVE-2021-0127/" source="CVE"/>
		<reference ref_id="CVE-2021-0145" ref_url="https://www.suse.com/security/cve/CVE-2021-0145/" source="CVE"/>
		<reference ref_id="CVE-2021-0146" ref_url="https://www.suse.com/security/cve/CVE-2021-0146/" source="CVE"/>
		<reference ref_id="CVE-2021-33120" ref_url="https://www.suse.com/security/cve/CVE-2021-33120/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010308.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220207 release.

- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)
- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)
- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)
- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)

- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)
- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-25"/>
	<updated date="2022-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192615">SUSE bug 1192615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195779">SUSE bug 1195779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195780">SUSE bug 1195780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195781">SUSE bug 1195781</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0127/">CVE-2021-0127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0127">CVE-2021-0127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0145/">CVE-2021-0145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0145">CVE-2021-0145 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0146/">CVE-2021-0146 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0146">CVE-2021-0146 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33120/">CVE-2021-33120 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33120">CVE-2021-33120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667937" comment="ucode-intel-20220207-13.93.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149299" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1193942" ref_url="https://bugzilla.suse.com/1193942" source="BUGZILLA"/>
		<reference ref_id="1193943" ref_url="https://bugzilla.suse.com/1193943" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44224" ref_url="https://www.suse.com/security/cve/CVE-2021-44224/" source="CVE"/>
		<reference ref_id="CVE-2021-44790" ref_url="https://www.suse.com/security/cve/CVE-2021-44790/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010001.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-44224: Fixed NULL dereference or SSRF in forward proxy configurations. (bsc#1193943)
- CVE-2021-44790: Fixed buffer overflow when parsing multipart content in mod_lua. (bsc#1193942)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-12"/>
	<updated date="2022-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193942">SUSE bug 1193942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193943">SUSE bug 1193943</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44224/">CVE-2021-44224 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44224">CVE-2021-44224 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44790/">CVE-2021-44790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44790">CVE-2021-44790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663078" comment="apache2-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663071" comment="apache2-doc-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663079" comment="apache2-example-pages-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663080" comment="apache2-prefork-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663081" comment="apache2-utils-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663082" comment="apache2-worker-2.4.23-29.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149300" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010322.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

-  CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24407">CVE-2022-24407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669342" comment="cyrus-sasl-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669310" comment="cyrus-sasl-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669343" comment="cyrus-sasl-crammd5-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669312" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669344" comment="cyrus-sasl-digestmd5-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669345" comment="cyrus-sasl-gssapi-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669315" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669346" comment="cyrus-sasl-otp-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669317" comment="cyrus-sasl-otp-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669347" comment="cyrus-sasl-plain-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669319" comment="cyrus-sasl-plain-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669348" comment="libsasl2-3-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669321" comment="libsasl2-3-32bit-2.1.26-8.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149301" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1195064" ref_url="https://bugzilla.suse.com/1195064" source="BUGZILLA"/>
		<reference ref_id="1195735" ref_url="https://bugzilla.suse.com/1195735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30934" ref_url="https://www.suse.com/security/cve/CVE-2021-30934/" source="CVE"/>
		<reference ref_id="CVE-2021-30936" ref_url="https://www.suse.com/security/cve/CVE-2021-30936/" source="CVE"/>
		<reference ref_id="CVE-2021-30951" ref_url="https://www.suse.com/security/cve/CVE-2021-30951/" source="CVE"/>
		<reference ref_id="CVE-2021-30952" ref_url="https://www.suse.com/security/cve/CVE-2021-30952/" source="CVE"/>
		<reference ref_id="CVE-2021-30953" ref_url="https://www.suse.com/security/cve/CVE-2021-30953/" source="CVE"/>
		<reference ref_id="CVE-2021-30954" ref_url="https://www.suse.com/security/cve/CVE-2021-30954/" source="CVE"/>
		<reference ref_id="CVE-2021-30984" ref_url="https://www.suse.com/security/cve/CVE-2021-30984/" source="CVE"/>
		<reference ref_id="CVE-2021-45481" ref_url="https://www.suse.com/security/cve/CVE-2021-45481/" source="CVE"/>
		<reference ref_id="CVE-2021-45482" ref_url="https://www.suse.com/security/cve/CVE-2021-45482/" source="CVE"/>
		<reference ref_id="CVE-2021-45483" ref_url="https://www.suse.com/security/cve/CVE-2021-45483/" source="CVE"/>
		<reference ref_id="CVE-2022-22589" ref_url="https://www.suse.com/security/cve/CVE-2022-22589/" source="CVE"/>
		<reference ref_id="CVE-2022-22590" ref_url="https://www.suse.com/security/cve/CVE-2022-22590/" source="CVE"/>
		<reference ref_id="CVE-2022-22592" ref_url="https://www.suse.com/security/cve/CVE-2022-22592/" source="CVE"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010335.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.34.5 (bsc#1195735):

- CVE-2022-22589: A validation issue was addressed with improved input sanitization.
- CVE-2022-22590: A use after free issue was addressed with improved memory management.
- CVE-2022-22592: A logic issue was addressed with improved state management.

Update to version 2.34.4 (bsc#1195064):

- CVE-2021-30934: A buffer overflow issue was addressed with improved memory handling.
- CVE-2021-30936: A use after free issue was addressed with improved memory management.
- CVE-2021-30951: A use after free issue was addressed with improved memory management.
- CVE-2021-30952: An integer overflow was addressed with improved input validation.
- CVE-2021-30953: An out-of-bounds read was addressed with improved bounds checking.
- CVE-2021-30954: A type confusion issue was addressed with improved memory handling.
- CVE-2021-30984: A race condition was addressed with improved state handling.
- CVE-2022-22594: A cross-origin issue in the IndexDB API was addressed with improved input validation.

The following CVEs were addressed in a previous update:

- CVE-2021-45481: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create.
- CVE-2021-45482: A use-after-free in WebCore::ContainerNode::firstChild.
- CVE-2021-45483: A use-after-free in WebCore::Frame::page.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195735">SUSE bug 1195735</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30934/">CVE-2021-30934 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30934">CVE-2021-30934 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30936/">CVE-2021-30936 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30936">CVE-2021-30936 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30951/">CVE-2021-30951 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30951">CVE-2021-30951 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30952/">CVE-2021-30952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30952">CVE-2021-30952 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30953/">CVE-2021-30953 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30953">CVE-2021-30953 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30954/">CVE-2021-30954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30954">CVE-2021-30954 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30984/">CVE-2021-30984 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30984">CVE-2021-30984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45481/">CVE-2021-45481 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45481">CVE-2021-45481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45482/">CVE-2021-45482 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45482">CVE-2021-45482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45483/">CVE-2021-45483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45483">CVE-2021-45483 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-22589/">CVE-2022-22589 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22589">CVE-2022-22589 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22590/">CVE-2022-22590 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22590">CVE-2022-22590 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22592/">CVE-2022-22592 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22592">CVE-2022-22592 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22594">CVE-2022-22594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669696" comment="libjavascriptcoregtk-4_0-18-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669697" comment="libwebkit2gtk-4_0-37-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669688" comment="libwebkit2gtk3-lang-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669698" comment="typelib-1_0-JavaScriptCore-4_0-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669699" comment="typelib-1_0-WebKit2-4_0-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669700" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669701" comment="webkit2gtk-4_0-injected-bundles-2.34.5-2.85.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149302" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196026" ref_url="https://bugzilla.suse.com/1196026" source="BUGZILLA"/>
		<reference ref_id="1196168" ref_url="https://bugzilla.suse.com/1196168" source="BUGZILLA"/>
		<reference ref_id="1196169" ref_url="https://bugzilla.suse.com/1196169" source="BUGZILLA"/>
		<reference ref_id="1196171" ref_url="https://bugzilla.suse.com/1196171" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010336.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">CVE-2022-25313 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25314">CVE-2022-25314 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669382" comment="expat-2.1.0-21.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669383" comment="libexpat1-2.1.0-21.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669384" comment="libexpat1-32bit-2.1.0-21.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149303" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1089030" ref_url="https://bugzilla.suse.com/1089030" source="BUGZILLA"/>
		<reference ref_id="1163882" ref_url="https://bugzilla.suse.com/1163882" source="BUGZILLA"/>
		<reference ref_id="1196435" ref_url="https://bugzilla.suse.com/1196435" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1100" ref_url="https://www.suse.com/security/cve/CVE-2018-1100/" source="CVE"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<reference ref_id="CVE-2021-45444" ref_url="https://www.suse.com/security/cve/CVE-2021-45444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010368.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2021-45444: Fixed a vulnerability where arbitrary shell commands could be 
  executed related to prompt expansion (bsc#1196435).
- CVE-2019-20044: Fixed a vulnerability where shell privileges would not be
  properly dropped when unsetting the PRIVILEGED option (bsc#1163882).
- CVE-2018-1100: Fixed a potential code execution via a stack-based buffer
  overflow in utils.c:checkmailpath() (bsc#1089030).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1089030">SUSE bug 1089030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196435">SUSE bug 1196435</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1100/">CVE-2018-1100 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1100">CVE-2018-1100 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20044">CVE-2019-20044 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45444/">CVE-2021-45444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45444">CVE-2021-45444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670824" comment="zsh-5.0.5-6.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149304" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1195667" ref_url="https://bugzilla.suse.com/1195667" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21712" ref_url="https://www.suse.com/security/cve/CVE-2022-21712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010370.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

- CVE-2022-21712: Fixed secret exposure in cross-origin redirects (bsc#1195667, GHSA-92x2-jw7w-xvvx) from
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195667">SUSE bug 1195667</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21712/">CVE-2022-21712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21712">CVE-2022-21712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667847" comment="python-Twisted-15.2.1-9.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149305" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1146312" ref_url="https://bugzilla.suse.com/1146312" source="BUGZILLA"/>
		<reference ref_id="1185973" ref_url="https://bugzilla.suse.com/1185973" source="BUGZILLA"/>
		<reference ref_id="1191580" ref_url="https://bugzilla.suse.com/1191580" source="BUGZILLA"/>
		<reference ref_id="1193731" ref_url="https://bugzilla.suse.com/1193731" source="BUGZILLA"/>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="1195536" ref_url="https://bugzilla.suse.com/1195536" source="BUGZILLA"/>
		<reference ref_id="1195543" ref_url="https://bugzilla.suse.com/1195543" source="BUGZILLA"/>
		<reference ref_id="1195612" ref_url="https://bugzilla.suse.com/1195612" source="BUGZILLA"/>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195939" ref_url="https://bugzilla.suse.com/1195939" source="BUGZILLA"/>
		<reference ref_id="1196079" ref_url="https://bugzilla.suse.com/1196079" source="BUGZILLA"/>
		<reference ref_id="1196612" ref_url="https://bugzilla.suse.com/1196612" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10905" ref_url="https://www.suse.com/security/cve/CVE-2016-10905/" source="CVE"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.


Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc (bsc#1193731).
- CVE-2016-10905: Fixed a use-after-free is gfs2_clear_rgrpd() and read_rindex_entry() (bsc#1146312).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-08"/>
	<updated date="2022-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146312">SUSE bug 1146312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185973">SUSE bug 1185973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193731">SUSE bug 1193731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195536">SUSE bug 1195536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195612">SUSE bug 1195612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195939">SUSE bug 1195939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10905/">CVE-2016-10905 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10905">CVE-2016-10905 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0920">CVE-2021-0920 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0002">CVE-2022-0002 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0617">CVE-2022-0617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24448">CVE-2022-24448 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671801" comment="kernel-default-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671802" comment="kernel-default-base-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671803" comment="kernel-default-devel-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671811" comment="kernel-default-kgraft-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671768" comment="kernel-devel-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671769" comment="kernel-macros-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671770" comment="kernel-source-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671804" comment="kernel-syms-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671813" comment="kgraft-patch-4_4_180-94_156-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149306" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1196809" ref_url="https://bugzilla.suse.com/1196809" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010408.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):

- CVE-2022-26485: Use-after-free in XSLT parameter processing
- CVE-2022-26486: Use-after-free in WebGPU IPC Framework
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26485">CVE-2022-26485 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26486">CVE-2022-26486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671783" comment="MozillaFirefox-91.6.1-112.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671784" comment="MozillaFirefox-devel-91.6.1-112.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671785" comment="MozillaFirefox-translations-common-91.6.1-112.92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149307" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1195255" ref_url="https://bugzilla.suse.com/1195255" source="BUGZILLA"/>
		<reference ref_id="1196091" ref_url="https://bugzilla.suse.com/1196091" source="BUGZILLA"/>
		<reference ref_id="1196137" ref_url="https://bugzilla.suse.com/1196137" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23181" ref_url="https://www.suse.com/security/cve/CVE-2022-23181/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010411.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

Security issues fixed:

- CVE-2022-23181: Fixed time of check, time of use vulnerability that allowed local privilege escalation. (bsc#1195255)
- Remove log4j dependency, which is currently directly in use (bsc#1196137)

- Make the package RPM conflict even more specific to conflict with java-openjdk-headless &gt;= 9 (bsc#1196091)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195255">SUSE bug 1195255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196091">SUSE bug 1196091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196137">SUSE bug 1196137</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23181/">CVE-2022-23181 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23181">CVE-2022-23181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670264" comment="javapackages-filesystem-5.3.1-14.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149308" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22620" ref_url="https://www.suse.com/security/cve/CVE-2022-22620/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010419.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.34.6 (bsc#1196133):

- CVE-2022-22620: Processing maliciously crafted web content may have lead to arbitrary code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-11"/>
	<updated date="2022-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22620/">CVE-2022-22620 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22620">CVE-2022-22620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670816" comment="libjavascriptcoregtk-4_0-18-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670817" comment="libwebkit2gtk-4_0-37-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670802" comment="libwebkit2gtk3-lang-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670818" comment="typelib-1_0-JavaScriptCore-4_0-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670819" comment="typelib-1_0-WebKit2-4_0-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670820" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670821" comment="webkit2gtk-4_0-injected-bundles-2.34.6-2.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149309" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1184751" ref_url="https://bugzilla.suse.com/1184751" source="BUGZILLA"/>
		<reference ref_id="1184752" ref_url="https://bugzilla.suse.com/1184752" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010432.html" source="SUSE-SU"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-30498, CVE-2021-30499: If an image has a size of 0x0, when exporting, no 
  data is written and space is allocated for the header only, not taking into
  account that sprintf appends a NUL byte (bsc#1184751, bsc#1184752).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184751">SUSE bug 1184751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184752">SUSE bug 1184752</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30498">CVE-2021-30498 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30499">CVE-2021-30499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670823" comment="libcaca0-0.99.beta18-14.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149310" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1196900" ref_url="https://bugzilla.suse.com/1196900" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010434.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):

- CVE-2022-26383: Browser window spoof using fullscreen mode
- CVE-2022-26384: iframe allow-scripts sandbox bypass
- CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures
- CVE-2022-26381: Use-after-free in text reflows
- CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26381">CVE-2022-26381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26383">CVE-2022-26383 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26384">CVE-2022-26384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26386">CVE-2022-26386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26387">CVE-2022-26387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672571" comment="MozillaFirefox-91.7.0-112.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672572" comment="MozillaFirefox-devel-91.7.0-112.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672573" comment="MozillaFirefox-translations-common-91.7.0-112.95.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149311" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196784" ref_url="https://bugzilla.suse.com/1196784" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010442.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671277" comment="expat-2.1.0-21.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671278" comment="libexpat1-2.1.0-21.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671275" comment="libexpat1-32bit-2.1.0-21.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149312" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010449.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673055" comment="libopenssl-devel-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673056" comment="libopenssl1_0_0-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673023" comment="libopenssl1_0_0-32bit-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673057" comment="libopenssl1_0_0-hmac-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673025" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673058" comment="openssl-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673027" comment="openssl-doc-1.0.2j-60.75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149313" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1193314" ref_url="https://bugzilla.suse.com/1193314" source="BUGZILLA"/>
		<reference ref_id="1193444" ref_url="https://bugzilla.suse.com/1193444" source="BUGZILLA"/>
		<reference ref_id="1193491" ref_url="https://bugzilla.suse.com/1193491" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1195163" ref_url="https://bugzilla.suse.com/1195163" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u322 (icedtea-3.22.0)

Including the following security fixes:

- CVE-2022-21248, bsc#1194926: Enhance cross VM serialization
- CVE-2022-21283, bsc#1194937: Better String matching
- CVE-2022-21293, bsc#1194935: Improve String constructions
- CVE-2022-21294, bsc#1194934: Enhance construction of Identity maps
- CVE-2022-21282, bsc#1194933: Better resolution of URIs
- CVE-2022-21296, bsc#1194932: Improve SAX Parser configuration management
- CVE-2022-21299, bsc#1194931: Improved scanning of XML entities
- CVE-2022-21305, bsc#1194939: Better array indexing
- CVE-2022-21340, bsc#1194940: Verify Jar Verification
- CVE-2022-21341, bsc#1194941: Improve serial forms for transport
- CVE-2022-21349: Improve Solaris font rendering
- CVE-2022-21360, bsc#1194929: Enhance BMP image support
- CVE-2022-21365, bsc#1194928: Enhanced BMP processing
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193314">SUSE bug 1193314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193444">SUSE bug 1193444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193491">SUSE bug 1193491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195163">SUSE bug 1195163</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21349">CVE-2022-21349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672567" comment="java-1_8_0-openjdk-1.8.0.322-27.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672568" comment="java-1_8_0-openjdk-demo-1.8.0.322-27.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672569" comment="java-1_8_0-openjdk-devel-1.8.0.322-27.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672570" comment="java-1_8_0-openjdk-headless-1.8.0.322-27.72.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149314" version="1" class="patch">
	<metadata>
		<title>Security update for python-lxml (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1118088" ref_url="https://bugzilla.suse.com/1118088" source="BUGZILLA"/>
		<reference ref_id="1179534" ref_url="https://bugzilla.suse.com/1179534" source="BUGZILLA"/>
		<reference ref_id="1184177" ref_url="https://bugzilla.suse.com/1184177" source="BUGZILLA"/>
		<reference ref_id="1193752" ref_url="https://bugzilla.suse.com/1193752" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19787" ref_url="https://www.suse.com/security/cve/CVE-2018-19787/" source="CVE"/>
		<reference ref_id="CVE-2020-27783" ref_url="https://www.suse.com/security/cve/CVE-2020-27783/" source="CVE"/>
		<reference ref_id="CVE-2021-28957" ref_url="https://www.suse.com/security/cve/CVE-2021-28957/" source="CVE"/>
		<reference ref_id="CVE-2021-43818" ref_url="https://www.suse.com/security/cve/CVE-2021-43818/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010467.html" source="SUSE-SU"/>
		<description>
This update for python-lxml fixes the following issues:

- CVE-2021-43818: Removed SVG image data URLs since they can embed script
  content (bsc#1193752).
- CVE-2021-28957: Fixed a potential XSS due to improper input sanitization (bsc#1184177).
- CVE-2020-27783: Fixed a potential XSS due to improper HTML parsing (bsc#1179534).
- CVE-2018-19787: Fixed a potential XSS due to improper input sanitization (bsc#1118088).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-17"/>
	<updated date="2022-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118088">SUSE bug 1118088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179534">SUSE bug 1179534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184177">SUSE bug 1184177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193752">SUSE bug 1193752</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19787/">CVE-2018-19787 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19787">CVE-2018-19787 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-27783/">CVE-2020-27783 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27783">CVE-2020-27783 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28957/">CVE-2021-28957 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28957">CVE-2021-28957 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-43818/">CVE-2021-43818 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43818">CVE-2021-43818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670849" comment="python-lxml-3.6.1-8.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149315" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1194640" ref_url="https://bugzilla.suse.com/1194640" source="BUGZILLA"/>
		<reference ref_id="1194768" ref_url="https://bugzilla.suse.com/1194768" source="BUGZILLA"/>
		<reference ref_id="1194770" ref_url="https://bugzilla.suse.com/1194770" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010485.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2022-23219: Fixed buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768)
- CVE-2022-23218: Fixed buffer overflow in sunrpc svcunix_create (bsc#1194770)
- CVE-2021-3999: Fixed getcwd to set errno to ERANGE for size == 1 (bsc#1194640)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3999">CVE-2021-3999 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">CVE-2022-23218 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">CVE-2022-23219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673031" comment="glibc-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673010" comment="glibc-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673032" comment="glibc-devel-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673012" comment="glibc-devel-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673013" comment="glibc-html-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673014" comment="glibc-i18ndata-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673015" comment="glibc-info-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673033" comment="glibc-locale-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673017" comment="glibc-locale-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673034" comment="glibc-profile-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673019" comment="glibc-profile-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673035" comment="nscd-2.22-119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149316" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1197091" ref_url="https://bugzilla.suse.com/1197091" source="BUGZILLA"/>
		<reference ref_id="1197095" ref_url="https://bugzilla.suse.com/1197095" source="BUGZILLA"/>
		<reference ref_id="1197096" ref_url="https://bugzilla.suse.com/1197096" source="BUGZILLA"/>
		<reference ref_id="1197098" ref_url="https://bugzilla.suse.com/1197098" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22719" ref_url="https://www.suse.com/security/cve/CVE-2022-22719/" source="CVE"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<reference ref_id="CVE-2022-23943" ref_url="https://www.suse.com/security/cve/CVE-2022-23943/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010494.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-23943: heap out-of-bounds write in mod_sed (bsc#1197098).
- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22719: use of uninitialized value of in r:parsebody in mod_lua (bsc#1197091).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197091">SUSE bug 1197091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197098">SUSE bug 1197098</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22719/">CVE-2022-22719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22719">CVE-2022-22719 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22720">CVE-2022-22720 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22721">CVE-2022-22721 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23943/">CVE-2022-23943 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23943">CVE-2022-23943 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673758" comment="apache2-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673736" comment="apache2-doc-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673759" comment="apache2-example-pages-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673760" comment="apache2-prefork-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673761" comment="apache2-utils-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673762" comment="apache2-worker-2.4.23-29.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149317" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1209503" ref_url="https://bugzilla.suse.com/1209503" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-27539" ref_url="https://www.suse.com/security/cve/CVE-2023-27539/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014477.html" source="SUSE-SU"/>
		<description>
This update for rubygem-rack fixes the following issues:

- CVE-2023-27539: Fixed denial of service in header parsing (bsc#1209503).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-17"/>
	<updated date="2023-04-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209503">SUSE bug 1209503</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-27539/">CVE-2023-27539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-27539">CVE-2023-27539 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747989" comment="ruby2.1-rubygem-rack-1.6.13-3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149318" version="1" class="patch">
	<metadata>
		<title>Security update for openstack-cinder, openstack-nova, python-oslo.utils (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1207321" ref_url="https://bugzilla.suse.com/1207321" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-47951" ref_url="https://www.suse.com/security/cve/CVE-2022-47951/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014546.html" source="SUSE-SU"/>
		<description>
This update for openstack-cinder, openstack-nova, python-oslo.utils contains the following fixes:

Security fixes included on this update:

openstack-cinder, openstack-nova:

- CVE-2022-47951: Fixed file access control through custom VMDK flat descriptor. (bsc#1207321)

Non-security changes included on this update:

Changes in openstack-cinder:
-  Fixed file access control through custom VMDK flat descriptor. (bsc#1207321, CVE-2022-47951)

Changes in openstack-nova:
- Fixed file access control through custom VMDK flat descriptor. (bsc#1207321, CVE-2022-47951)

Changes in python-oslo.utils:
- Report format specific details when using JSON output format. (bsc#1207321)

  		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-21"/>
	<updated date="2023-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207321">SUSE bug 1207321</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47951/">CVE-2022-47951 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47951">CVE-2022-47951 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009750543" comment="openstack-cinder-11.2.3~dev29-3.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750544" comment="openstack-cinder-api-11.2.3~dev29-3.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750545" comment="openstack-cinder-backup-11.2.3~dev29-3.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750546" comment="openstack-cinder-doc-11.2.3~dev29-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750547" comment="openstack-cinder-scheduler-11.2.3~dev29-3.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750548" comment="openstack-cinder-volume-11.2.3~dev29-3.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750549" comment="openstack-nova-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750550" comment="openstack-nova-api-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750551" comment="openstack-nova-cells-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750552" comment="openstack-nova-compute-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750553" comment="openstack-nova-conductor-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750554" comment="openstack-nova-console-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750555" comment="openstack-nova-consoleauth-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750556" comment="openstack-nova-doc-16.1.9~dev92-3.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750557" comment="openstack-nova-novncproxy-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750558" comment="openstack-nova-placement-api-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750559" comment="openstack-nova-scheduler-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750560" comment="openstack-nova-serialproxy-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750561" comment="openstack-nova-vncproxy-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750562" comment="python-cinder-11.2.3~dev29-3.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750563" comment="python-nova-16.1.9~dev92-3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750564" comment="python-oslo.utils-3.28.4-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149319" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1209358" ref_url="https://bugzilla.suse.com/1209358" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28450" ref_url="https://www.suse.com/security/cve/CVE-2023-28450/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014781.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2023-28450: Fixed default maximum size for EDNS.0 UDP packets (bsc#1209358).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-08"/>
	<updated date="2023-05-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209358">SUSE bug 1209358</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28450/">CVE-2023-28450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28450">CVE-2023-28450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752243" comment="dnsmasq-utils-2.78-18.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149320" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1208036" ref_url="https://bugzilla.suse.com/1208036" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-23931" ref_url="https://www.suse.com/security/cve/CVE-2023-23931/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2144-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029303.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2023-23931: Fixed memory corruption in Cipher.update_into (bsc#1208036).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-09"/>
	<updated date="2023-05-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1208036">SUSE bug 1208036</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23931/">CVE-2023-23931 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23931">CVE-2023-23931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756575" comment="python-cryptography-2.0.3-3.14.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149321" version="1" class="patch">
	<metadata>
		<title>Security update for openstack-heat, python-Werkzeug (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1208283" ref_url="https://bugzilla.suse.com/1208283" source="BUGZILLA"/>
		<reference ref_id="1209774" ref_url="https://bugzilla.suse.com/1209774" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1625" ref_url="https://www.suse.com/security/cve/CVE-2023-1625/" source="CVE"/>
		<reference ref_id="CVE-2023-25577" ref_url="https://www.suse.com/security/cve/CVE-2023-25577/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2379-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029723.html" source="SUSE-SU"/>
		<description>
This update for openstack-heat, python-Werkzeug contains the following fixes:

Security fixes included on this update:

openstack-heat:
- CVE-2023-1625: Fixed an issue where parameter values marked as 'hidden' would be shown in the stack's environment. (bsc#1209774)

python-Werkzeug:
- CVE-2023-25577: Fixed an unbounded resource usage when parsing multipart forms with many fields. (bsc#1208283)
  		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-05"/>
	<updated date="2023-06-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208283">SUSE bug 1208283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209774">SUSE bug 1209774</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1625/">CVE-2023-1625 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1625">CVE-2023-1625 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25577/">CVE-2023-25577 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25577">CVE-2023-25577 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009757256" comment="openstack-heat-9.0.8~dev22-3.30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757257" comment="openstack-heat-api-9.0.8~dev22-3.30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757258" comment="openstack-heat-api-cfn-9.0.8~dev22-3.30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757259" comment="openstack-heat-api-cloudwatch-9.0.8~dev22-3.30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757260" comment="openstack-heat-doc-9.0.8~dev22-3.30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757261" comment="openstack-heat-engine-9.0.8~dev22-3.30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757262" comment="openstack-heat-plugin-heat_docker-9.0.8~dev22-3.30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757263" comment="openstack-heat-test-9.0.8~dev22-3.30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757264" comment="python-Werkzeug-0.12.2-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757265" comment="python-heat-9.0.8~dev22-3.30.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149322" version="1" class="patch">
	<metadata>
		<title>Security update for libwebp (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1210212" ref_url="https://bugzilla.suse.com/1210212" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1999" ref_url="https://www.suse.com/security/cve/CVE-2023-1999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015241.html" source="SUSE-SU"/>
		<description>
This update for libwebp fixes the following issues:

- CVE-2023-1999: Fixed double free (bsc#1210212).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-20"/>
	<updated date="2023-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1999/">CVE-2023-1999 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1999">CVE-2023-1999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764534" comment="libwebpmux1-0.4.3-4.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149323" version="1" class="patch">
	<metadata>
		<title>Security update for python-sqlparse (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1210617" ref_url="https://bugzilla.suse.com/1210617" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-30608" ref_url="https://www.suse.com/security/cve/CVE-2023-30608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2693-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030115.html" source="SUSE-SU"/>
		<description>
This update for python-sqlparse fixes the following issues:

- CVE-2023-30608: Fixed a regular rexpression that is vulnerable to ReDOS (bsc#1210617).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-28"/>
	<updated date="2023-06-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210617">SUSE bug 1210617</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-30608/">CVE-2023-30608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30608">CVE-2023-30608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767075" comment="python-sqlparse-0.2.3-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149324" version="1" class="patch">
	<metadata>
		<title>Security update for python-tornado (Low)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1211741" ref_url="https://bugzilla.suse.com/1211741" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28370" ref_url="https://www.suse.com/security/cve/CVE-2023-28370/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015409.html" source="SUSE-SU"/>
		<description>
This update for python-tornado fixes the following issues:

- CVE-2023-28370: Fixed an open redirect issue in the static file
  handler (bsc#1211741).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2023-07-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1211741">SUSE bug 1211741</bugzilla>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28370/">CVE-2023-28370 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28370">CVE-2023-28370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764069" comment="python-tornado-4.4.3-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149325" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1212742" ref_url="https://bugzilla.suse.com/1212742" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-36053" ref_url="https://www.suse.com/security/cve/CVE-2023-36053/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015764.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2023-36053: Fixed potential regular expression denial of service vulnerability in EmailValidator/URLValidator (bsc#1212742).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-02"/>
	<updated date="2023-08-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212742">SUSE bug 1212742</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-36053/">CVE-2023-36053 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36053">CVE-2023-36053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771825" comment="python-Django-1.11.29-3.48.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149326" version="1" class="patch">
	<metadata>
		<title>Security update for python-swift3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1207035" ref_url="https://bugzilla.suse.com/1207035" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-47950" ref_url="https://www.suse.com/security/cve/CVE-2022-47950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013703.html" source="SUSE-SU"/>
		<description>
This update for python-swift3 fixes the following issues:

- CVE-2022-47950: Fixed an issue that could allow a remote attacker to
  disclose local file contents via a crafted XML file (bsc#1207035).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-08"/>
	<updated date="2023-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207035">SUSE bug 1207035</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-47950/">CVE-2022-47950 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47950">CVE-2022-47950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738555" comment="python-swift3-1.7.0.dev372-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149327" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1196137" ref_url="https://bugzilla.suse.com/1196137" source="BUGZILLA"/>
		<reference ref_id="1198136" ref_url="https://bugzilla.suse.com/1198136" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:3232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015806.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- Remove the log4j dependency as it is not used by the tomcat package (bsc#1196137)
    
Security hardening, related to Spring Framework vulnerabilities:    
- Deprecate getResources() and always return null (bsc#1198136).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-08"/>
	<updated date="2023-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196137">SUSE bug 1196137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198136">SUSE bug 1198136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679547" comment="javapackages-filesystem-5.3.1-14.7.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149328" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionpack-4_2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1213312" ref_url="https://bugzilla.suse.com/1213312" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28362" ref_url="https://www.suse.com/security/cve/CVE-2023-28362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015832.html" source="SUSE-SU"/>
		<description>
This update for rubygem-actionpack-4_2 fixes the following issues:

  - CVE-2023-28362: Fixed XSS via User Supplied Values to redirect_to (bsc#1213312).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-09"/>
	<updated date="2023-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213312">SUSE bug 1213312</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28362/">CVE-2023-28362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28362">CVE-2023-28362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772456" comment="ruby2.1-rubygem-actionpack-4_2-4.2.9-7.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149329" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rails-html-sanitizer (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1206433" ref_url="https://bugzilla.suse.com/1206433" source="BUGZILLA"/>
		<reference ref_id="1206434" ref_url="https://bugzilla.suse.com/1206434" source="BUGZILLA"/>
		<reference ref_id="1206435" ref_url="https://bugzilla.suse.com/1206435" source="BUGZILLA"/>
		<reference ref_id="1206436" ref_url="https://bugzilla.suse.com/1206436" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23517" ref_url="https://www.suse.com/security/cve/CVE-2022-23517/" source="CVE"/>
		<reference ref_id="CVE-2022-23518" ref_url="https://www.suse.com/security/cve/CVE-2022-23518/" source="CVE"/>
		<reference ref_id="CVE-2022-23519" ref_url="https://www.suse.com/security/cve/CVE-2022-23519/" source="CVE"/>
		<reference ref_id="CVE-2022-23520" ref_url="https://www.suse.com/security/cve/CVE-2022-23520/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031347.html" source="SUSE-SU"/>
		<description>
This update for rubygem-rails-html-sanitizer fixes the following issues:
  
- CVE-2022-23517: Fixed inefficient regular expression that is susceptible to excessive backtracking (bsc#1206433).
- CVE-2022-23518: Fixed XSS via data URIs when used in combination with Loofah (bsc#1206434).
- CVE-2022-23519: Fixed XSS vulnerability with certain configurations of Rails::Html::Sanitizer (bsc#1206435).
- CVE-2022-23520: Fixed XSS vulnerability with certain configurations of Rails::Html::Sanitizer (bsc#1206436).
 		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-05"/>
	<updated date="2023-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206433">SUSE bug 1206433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206434">SUSE bug 1206434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206435">SUSE bug 1206435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206436">SUSE bug 1206436</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23517/">CVE-2022-23517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23517">CVE-2022-23517 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23518/">CVE-2022-23518 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23518">CVE-2022-23518 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23519/">CVE-2022-23519 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23519">CVE-2022-23519 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23520/">CVE-2022-23520 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23520">CVE-2022-23520 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781348" comment="ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149330" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1214667" ref_url="https://bugzilla.suse.com/1214667" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-41164" ref_url="https://www.suse.com/security/cve/CVE-2023-41164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016133.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2023-41164: Fixed a potential denial of service vulnerability in django.utils.encoding.uri_to_iri() (bsc#1214667).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-11"/>
	<updated date="2023-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214667">SUSE bug 1214667</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-41164/">CVE-2023-41164 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41164">CVE-2023-41164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781690" comment="python-Django-1.11.29-3.51.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149331" version="1" class="patch">
	<metadata>
		<title>Security update for libwebp (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1215231" ref_url="https://bugzilla.suse.com/1215231" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016334.html" source="SUSE-SU"/>
		<description>
This update for libwebp fixes the following issues:

 - CVE-2023-4863: Fixed a heap buffer overflow (bsc#1215231).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-26"/>
	<updated date="2023-09-26"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1215231">SUSE bug 1215231</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798108" comment="libwebpmux1-0.4.3-4.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149332" version="1" class="patch">
	<metadata>
		<title>Security update for python-gevent (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1215469" ref_url="https://bugzilla.suse.com/1215469" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-41419" ref_url="https://www.suse.com/security/cve/CVE-2023-41419/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016572.html" source="SUSE-SU"/>
		<description>
This update for python-gevent fixes the following issues:

- CVE-2023-41419: Fixed a http request smuggling (bsc#1215469).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-09"/>
	<updated date="2023-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215469">SUSE bug 1215469</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-41419/">CVE-2023-41419 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41419">CVE-2023-41419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799876" comment="python-gevent-1.1.2-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149333" version="1" class="patch">
	<metadata>
		<title>Security update for python-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1206667" ref_url="https://bugzilla.suse.com/1206667" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40897" ref_url="https://www.suse.com/security/cve/CVE-2022-40897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013754.html" source="SUSE-SU"/>
		<description>
This update for python-setuptools fixes the following issues:

- CVE-2022-40897: Fixed an excessive CPU usage that could be triggered
  by fetching a malicious HTML document (bsc#1206667).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-14"/>
	<updated date="2023-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206667">SUSE bug 1206667</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40897/">CVE-2022-40897 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40897">CVE-2022-40897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732000" comment="python-setuptools-36.5.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149334" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1215968" ref_url="https://bugzilla.suse.com/1215968" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43804" ref_url="https://www.suse.com/security/cve/CVE-2023-43804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016809.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2023-43804: Fixed a potential cookie leak via HTTP redirect if
  the user manually set the corresponding header (bsc#1215968).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-23"/>
	<updated date="2023-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215968">SUSE bug 1215968</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-43804/">CVE-2023-43804 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43804">CVE-2023-43804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800622" comment="python-urllib3-1.25.10-5.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149335" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1215978" ref_url="https://bugzilla.suse.com/1215978" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43665" ref_url="https://www.suse.com/security/cve/CVE-2023-43665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016894.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2023-43665: Fixed a Denial-of-service in django.utils.text.Truncator. (bsc#1215978)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-27"/>
	<updated date="2023-10-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215978">SUSE bug 1215978</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-43665/">CVE-2023-43665 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43665">CVE-2023-43665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802097" comment="python-Django-1.11.29-3.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149336" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1216377" ref_url="https://bugzilla.suse.com/1216377" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45803" ref_url="https://www.suse.com/security/cve/CVE-2023-45803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4356-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032594.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2023-45803: Fix a request body leak that could occur when
  receiving a 303 HTTP response (bsc#1216377).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2023-11-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216377">SUSE bug 1216377</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45803/">CVE-2023-45803 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45803">CVE-2023-45803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803605" comment="python-urllib3-1.25.10-5.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149337" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionpack-4_2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1207451" ref_url="https://bugzilla.suse.com/1207451" source="BUGZILLA"/>
		<reference ref_id="1207455" ref_url="https://bugzilla.suse.com/1207455" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22792" ref_url="https://www.suse.com/security/cve/CVE-2023-22792/" source="CVE"/>
		<reference ref_id="CVE-2023-22795" ref_url="https://www.suse.com/security/cve/CVE-2023-22795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013835.html" source="SUSE-SU"/>
		<description>
This update for rubygem-actionpack-4_2 fixes the following issues:

- CVE-2023-22795: Fixed possible ReDoS based DoS vulnerability in Action Dispatch via specially crafted HTTP header (bsc#1207451).
- CVE-2023-22792: Fixed possible ReDoS based DoS vulnerability in Action Dispatch via specially crafted cookies (bsc#1207455).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-17"/>
	<updated date="2023-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207451">SUSE bug 1207451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207455">SUSE bug 1207455</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22792/">CVE-2023-22792 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22792">CVE-2023-22792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22795/">CVE-2023-22795 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22795">CVE-2023-22795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738116" comment="ruby2.1-rubygem-actionpack-4_2-4.2.9-7.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149338" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1216894" ref_url="https://bugzilla.suse.com/1216894" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-44271" ref_url="https://www.suse.com/security/cve/CVE-2023-44271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017271.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2023-44271: Fixed uncontrolled resource consumption when textlength in an ImageDraw instance operates on a long text argument (bsc#1216894).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-01"/>
	<updated date="2023-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216894">SUSE bug 1216894</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44271/">CVE-2023-44271 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44271">CVE-2023-44271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810414" comment="python-Pillow-4.2.1-3.23.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149339" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activerecord-4_2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1207450" ref_url="https://bugzilla.suse.com/1207450" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-44566" ref_url="https://www.suse.com/security/cve/CVE-2022-44566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013881.html" source="SUSE-SU"/>
		<description>
This update for rubygem-activerecord-4_2 fixes the following issues:

- CVE-2022-44566: Fixed a potential denial of service due to an
  inefficient comparison between integer and numeric values
  (bsc#1207450).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-24"/>
	<updated date="2023-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1207450">SUSE bug 1207450</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44566/">CVE-2022-44566 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44566">CVE-2022-44566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736847" comment="ruby2.1-rubygem-activerecord-4_2-4.2.9-6.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149340" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activerecord-4_2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1207450" ref_url="https://bugzilla.suse.com/1207450" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-44566" ref_url="https://www.suse.com/security/cve/CVE-2022-44566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013954.html" source="SUSE-SU"/>
		<description>
This update for rubygem-activerecord-4_2 contains the following fixes:

- CVE-2022-44566: Fixed a potential denial of service due to an inefficient
  comparison between integer and numeric values. (bsc#1207450)

- fixed regression caused by fix for CVE-2022-44566. (bsc#1207450)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-01"/>
	<updated date="2023-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207450">SUSE bug 1207450</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44566/">CVE-2022-44566 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44566">CVE-2022-44566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742727" comment="ruby2.1-rubygem-activerecord-4_2-4.2.9-6.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149341" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activesupport-4_2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1207454" ref_url="https://bugzilla.suse.com/1207454" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22796" ref_url="https://www.suse.com/security/cve/CVE-2023-22796/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013967.html" source="SUSE-SU"/>
		<description>
This update for rubygem-activesupport-4_2 fixes the following issues:

- CVE-2023-22796: Fixed a potential denial of service when passing a
  crafted input to the underscore method due to an inefficient
  regular expression (bsc#1207454).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-03"/>
	<updated date="2023-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1207454">SUSE bug 1207454</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22796/">CVE-2023-22796 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22796">CVE-2023-22796 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736713" comment="ruby2.1-rubygem-activesupport-4_2-4.2.9-7.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149342" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1207597" ref_url="https://bugzilla.suse.com/1207597" source="BUGZILLA"/>
		<reference ref_id="1207599" ref_url="https://bugzilla.suse.com/1207599" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-44570" ref_url="https://www.suse.com/security/cve/CVE-2022-44570/" source="CVE"/>
		<reference ref_id="CVE-2022-44571" ref_url="https://www.suse.com/security/cve/CVE-2022-44571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013984.html" source="SUSE-SU"/>
		<description>
This update for rubygem-rack fixes the following issues:

- CVE-2022-44570: Fixed a potential denial of service when parsing a
  RFC2183 multipart boundary (bsc#1207597).
- CVE-2022-44571: Fixed a potential denial of service when parsing a
  Range header (bsc#1207599).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-08"/>
	<updated date="2023-03-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1207597">SUSE bug 1207597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207599">SUSE bug 1207599</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44570/">CVE-2022-44570 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44570">CVE-2022-44570 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44571/">CVE-2022-44571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44571">CVE-2022-44571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736848" comment="ruby2.1-rubygem-rack-1.6.13-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149343" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1208082" ref_url="https://bugzilla.suse.com/1208082" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-24580" ref_url="https://www.suse.com/security/cve/CVE-2023-24580/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014016.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

  - CVE-2023-24580: Fixed DOS in file uploads (bsc#1208082).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-10"/>
	<updated date="2023-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208082">SUSE bug 1208082</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24580/">CVE-2023-24580 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24580">CVE-2023-24580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744502" comment="python-Django-1.11.29-3.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149344" version="1" class="patch">
	<metadata>
		<title>Security update for openstack-barbican (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1203873" ref_url="https://bugzilla.suse.com/1203873" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3100" ref_url="https://www.suse.com/security/cve/CVE-2022-3100/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013455.html" source="SUSE-SU"/>
		<description>
This update for openstack-barbican contains the following fix:

Security fix included on this update:
openstack-barbican:

- CVE-2022-3100: Fixed an access policy bypass via query string injection (bsc#1203873).

Update for openstack-barbican:
- Add patch for CVE-2022-3100 to address access policy bypass via query string injection. (bsc#1203873, CVE-2022-3100)
  		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-11"/>
	<updated date="2023-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203873">SUSE bug 1203873</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3100/">CVE-2022-3100 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3100">CVE-2022-3100 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009729989" comment="openstack-barbican-5.0.2~dev3-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729990" comment="openstack-barbican-api-5.0.2~dev3-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729991" comment="openstack-barbican-doc-5.0.2~dev3-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729992" comment="openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729993" comment="openstack-barbican-retry-5.0.2~dev3-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729994" comment="openstack-barbican-worker-5.0.2~dev3-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729995" comment="python-barbican-5.0.2~dev3-3.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149345" version="1" class="patch">
	<metadata>
		<title>Security update for python-cffi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1208036" ref_url="https://bugzilla.suse.com/1208036" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-23931" ref_url="https://www.suse.com/security/cve/CVE-2023-23931/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014111.html" source="SUSE-SU"/>
		<description>
This update for python-cffi fixes the following issues:

  - CVE-2023-23931: Fixed memory corruption due to immutable python object being changed (bsc#1208036).

  Bugfixes:

  - Disabled broken tests related to Threads.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-21"/>
	<updated date="2023-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1208036">SUSE bug 1208036</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23931/">CVE-2023-23931 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23931">CVE-2023-23931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009741576" comment="python-cffi-1.10.0-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149346" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rack (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1220239" ref_url="https://bugzilla.suse.com/1220239" source="BUGZILLA"/>
		<reference ref_id="1220242" ref_url="https://bugzilla.suse.com/1220242" source="BUGZILLA"/>
		<reference ref_id="1220248" ref_url="https://bugzilla.suse.com/1220248" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-25126" ref_url="https://www.suse.com/security/cve/CVE-2024-25126/" source="CVE"/>
		<reference ref_id="CVE-2024-26141" ref_url="https://www.suse.com/security/cve/CVE-2024-26141/" source="CVE"/>
		<reference ref_id="CVE-2024-26146" ref_url="https://www.suse.com/security/cve/CVE-2024-26146/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034891.html" source="SUSE-SU"/>
		<description>
This update for rubygem-rack fixes the following issues:

- CVE-2024-25126: Fixed a denial-of-service vulnerability in Rack Content-Type parsing (bsc#1220239).
- CVE-2024-26141: Fixed a denial-of-service vulnerability in Range request header parsing (bsc#1220242).
- CVE-2024-26146: Fixed a denial-of-service vulnerability in Rack headers parsing routine (bsc#1220248).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220239">SUSE bug 1220239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220242">SUSE bug 1220242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220248">SUSE bug 1220248</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25126/">CVE-2024-25126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25126">CVE-2024-25126 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26141/">CVE-2024-26141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26141">CVE-2024-26141 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26146/">CVE-2024-26146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26146">CVE-2024-26146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853581" comment="ruby2.1-rubygem-rack-1.6.13-3.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149347" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1220358" ref_url="https://bugzilla.suse.com/1220358" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-27351" ref_url="https://www.suse.com/security/cve/CVE-2024-27351/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034881.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2024-27351: Align the patch with the upstream one and make it more robust. (bsc#1220358)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220358">SUSE bug 1220358</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27351/">CVE-2024-27351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27351">CVE-2024-27351 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853579" comment="python-Django-1.11.29-3.62.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149348" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1222262" ref_url="https://bugzilla.suse.com/1222262" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-28219" ref_url="https://www.suse.com/security/cve/CVE-2024-28219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034956.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2024-28219: Fixed buffer overflow in _imagingcms.c (bsc#1222262) 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2024-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222262">SUSE bug 1222262</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-28219/">CVE-2024-28219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28219">CVE-2024-28219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854664" comment="python-Pillow-4.2.1-3.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149349" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1194521" ref_url="https://bugzilla.suse.com/1194521" source="BUGZILLA"/>
		<reference ref_id="1219048" ref_url="https://bugzilla.suse.com/1219048" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22817" ref_url="https://www.suse.com/security/cve/CVE-2022-22817/" source="CVE"/>
		<reference ref_id="CVE-2023-50447" ref_url="https://www.suse.com/security/cve/CVE-2023-50447/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017823.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

 - CVE-2023-50447: Fixed arbitrary code execution via the environment parameter. (bsc#1219048)
 - CVE-2022-22817: Fixes evaluation of arbitrary expressions via PIL.ImageMath.eval. (bsc#1194521)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-31"/>
	<updated date="2024-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194521">SUSE bug 1194521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219048">SUSE bug 1219048</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22817/">CVE-2022-22817 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22817">CVE-2022-22817 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50447/">CVE-2023-50447 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50447">CVE-2023-50447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845117" comment="python-Pillow-4.2.1-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149350" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud Crowbar 8</platform>
		</affected>
		<reference ref_id="1219683" ref_url="https://bugzilla.suse.com/1219683" source="BUGZILLA"/>
		<reference ref_id="1220358" ref_url="https://bugzilla.suse.com/1220358" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24680" ref_url="https://www.suse.com/security/cve/CVE-2024-24680/" source="CVE"/>
		<reference ref_id="CVE-2024-27351" ref_url="https://www.suse.com/security/cve/CVE-2024-27351/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018161.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2024-24680: Fixed a denial-of-service in intcomma template filter (bsc#1219683).
- CVE-2024-27351: Fixed potential regular expression denial-of-service in ``django.utils.text.Truncator.words()`` (bsc#1220358).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-03-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219683">SUSE bug 1219683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220358">SUSE bug 1220358</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24680/">CVE-2024-24680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24680">CVE-2024-24680 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27351/">CVE-2024-27351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27351">CVE-2024-27351 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud-crowbar:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009178248" comment="SUSE OpenStack Cloud Crowbar 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851290" comment="python-Django-1.11.29-3.59.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149351" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1023616" ref_url="https://bugzilla.suse.com/1023616" source="BUGZILLA"/>
		<reference ref_id="1043055" ref_url="https://bugzilla.suse.com/1043055" source="BUGZILLA"/>
		<reference ref_id="1048576" ref_url="https://bugzilla.suse.com/1048576" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9788" ref_url="https://www.suse.com/security/cve/CVE-2017-9788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003068.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

Security issue fixed:

- CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest. (bsc#1048576)

Bug fixes:

- Include individual sysconfig.d files instead of the whole sysconfig.d directory.
- Include sysconfig.d/include.conf after httpd.conf is processed. (bsc#1023616, bsc#1043055)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-26"/>
	<updated date="2017-07-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023616">SUSE bug 1023616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043055">SUSE bug 1043055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048576">SUSE bug 1048576</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9788/">CVE-2017-9788 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9788">CVE-2017-9788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549489" comment="apache2-2.4.23-29.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532285" comment="apache2-doc-2.4.23-29.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549490" comment="apache2-example-pages-2.4.23-29.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549491" comment="apache2-prefork-2.4.23-29.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549492" comment="apache2-utils-2.4.23-29.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549493" comment="apache2-worker-2.4.23-29.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149352" version="1" class="patch">
	<metadata>
		<title>Security update for libquicktime (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1022805" ref_url="https://bugzilla.suse.com/1022805" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2399" ref_url="https://www.suse.com/security/cve/CVE-2016-2399/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003070.html" source="SUSE-SU"/>
		<description>
This update for libquicktime fixes the following issues:

Security issue fixed:
- CVE-2016-2399: Adjust patch to prevent endless loop when there are less than 256 bytes to read. (bsc#1022805)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-28"/>
	<updated date="2017-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022805">SUSE bug 1022805</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2399/">CVE-2016-2399 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2399">CVE-2016-2399 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549494" comment="libquicktime0-1.2.4-14.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149353" version="1" class="patch">
	<metadata>
		<title>Security update for libical (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1015964" ref_url="https://bugzilla.suse.com/1015964" source="BUGZILLA"/>
		<reference ref_id="1044995" ref_url="https://bugzilla.suse.com/1044995" source="BUGZILLA"/>
		<reference ref_id="986631" ref_url="https://bugzilla.suse.com/986631" source="BUGZILLA"/>
		<reference ref_id="986639" ref_url="https://bugzilla.suse.com/986639" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824/" source="CVE"/>
		<reference ref_id="CVE-2016-5827" ref_url="https://www.suse.com/security/cve/CVE-2016-5827/" source="CVE"/>
		<reference ref_id="CVE-2016-9584" ref_url="https://www.suse.com/security/cve/CVE-2016-9584/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003072.html" source="SUSE-SU"/>
		<description>
This update for libical fixes the following issues:

Security issues fixed:
- CVE-2016-5824: libical 1.0 allows remote attackers to cause a denial of service (use-after-free)
  via a crafted ics file. (bsc#986639)
- CVE-2016-5827: The icaltime_from_string function in libical 0.47 and 1.0 allows remote attackers
  to cause a denial of service (out-of-bounds heap read) via a crafted string to the
  icalparser_parse_string function. (bsc#986631)
- CVE-2016-9584: libical allows remote attackers to cause a denial of service (use-after-free) and
  possibly read heap memory via a crafted ics file. (bsc#1015964)

Bug fixes:
- libical crashes while parsing timezones (bsc#1044995)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-28"/>
	<updated date="2017-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015964">SUSE bug 1015964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044995">SUSE bug 1044995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986631">SUSE bug 986631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5824">CVE-2016-5824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5827/">CVE-2016-5827 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5827">CVE-2016-5827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9584/">CVE-2016-9584 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9584">CVE-2016-9584 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549495" comment="libical1-1.0.1-16.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549496" comment="libical1-32bit-1.0.1-16.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149354" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1041783" ref_url="https://bugzilla.suse.com/1041783" source="BUGZILLA"/>
		<reference ref_id="1042802" ref_url="https://bugzilla.suse.com/1042802" source="BUGZILLA"/>
		<reference ref_id="1042803" ref_url="https://bugzilla.suse.com/1042803" source="BUGZILLA"/>
		<reference ref_id="1043088" ref_url="https://bugzilla.suse.com/1043088" source="BUGZILLA"/>
		<reference ref_id="1045719" ref_url="https://bugzilla.suse.com/1045719" source="BUGZILLA"/>
		<reference ref_id="1045721" ref_url="https://bugzilla.suse.com/1045721" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7511" ref_url="https://www.suse.com/security/cve/CVE-2017-7511/" source="CVE"/>
		<reference ref_id="CVE-2017-7515" ref_url="https://www.suse.com/security/cve/CVE-2017-7515/" source="CVE"/>
		<reference ref_id="CVE-2017-9406" ref_url="https://www.suse.com/security/cve/CVE-2017-9406/" source="CVE"/>
		<reference ref_id="CVE-2017-9408" ref_url="https://www.suse.com/security/cve/CVE-2017-9408/" source="CVE"/>
		<reference ref_id="CVE-2017-9775" ref_url="https://www.suse.com/security/cve/CVE-2017-9775/" source="CVE"/>
		<reference ref_id="CVE-2017-9776" ref_url="https://www.suse.com/security/cve/CVE-2017-9776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003076.html" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

Security issues fixed:
- CVE-2017-9775: DoS stack buffer overflow in GfxState.cc in pdftocairo via a crafted PDF document (bsc#1045719)
- CVE-2017-9776: DoS integer overflow leading to heap buffer overflow in JBIG2Stream.cc via a crafted PDF document (bsc#1045721)
- CVE-2017-7515: Stack exhaustion due to infinite recursive call in pdfunite (bsc#1043088)
- CVE-2017-7511: Null pointer dereference in pdfunite via crafted documents (bsc#1041783)
- CVE-2017-9406: Memory leak in the gmalloc function in gmem.cc (bsc#1042803)
- CVE-2017-9408: Memory leak in the Object::initArray function (bsc#1042802)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-28"/>
	<updated date="2017-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041783">SUSE bug 1041783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042802">SUSE bug 1042802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042803">SUSE bug 1042803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043088">SUSE bug 1043088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045719">SUSE bug 1045719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045721">SUSE bug 1045721</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7511/">CVE-2017-7511 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7511">CVE-2017-7511 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7515/">CVE-2017-7515 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7515">CVE-2017-7515 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9406/">CVE-2017-9406 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9406">CVE-2017-9406 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9408/">CVE-2017-9408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9408">CVE-2017-9408 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9775/">CVE-2017-9775 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9775">CVE-2017-9775 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9776/">CVE-2017-9776 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9776">CVE-2017-9776 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549497" comment="libpoppler-glib8-0.43.0-16.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549498" comment="libpoppler-qt4-4-0.43.0-16.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549499" comment="libpoppler60-0.43.0-16.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549500" comment="poppler-tools-0.43.0-16.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149355" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1004995" ref_url="https://bugzilla.suse.com/1004995" source="BUGZILLA"/>
		<reference ref_id="1029102" ref_url="https://bugzilla.suse.com/1029102" source="BUGZILLA"/>
		<reference ref_id="1029516" ref_url="https://bugzilla.suse.com/1029516" source="BUGZILLA"/>
		<reference ref_id="1032029" ref_url="https://bugzilla.suse.com/1032029" source="BUGZILLA"/>
		<reference ref_id="1033238" ref_url="https://bugzilla.suse.com/1033238" source="BUGZILLA"/>
		<reference ref_id="1036873" ref_url="https://bugzilla.suse.com/1036873" source="BUGZILLA"/>
		<reference ref_id="1037120" ref_url="https://bugzilla.suse.com/1037120" source="BUGZILLA"/>
		<reference ref_id="1038865" ref_url="https://bugzilla.suse.com/1038865" source="BUGZILLA"/>
		<reference ref_id="1040153" ref_url="https://bugzilla.suse.com/1040153" source="BUGZILLA"/>
		<reference ref_id="1040258" ref_url="https://bugzilla.suse.com/1040258" source="BUGZILLA"/>
		<reference ref_id="1040614" ref_url="https://bugzilla.suse.com/1040614" source="BUGZILLA"/>
		<reference ref_id="1040942" ref_url="https://bugzilla.suse.com/1040942" source="BUGZILLA"/>
		<reference ref_id="1040968" ref_url="https://bugzilla.suse.com/1040968" source="BUGZILLA"/>
		<reference ref_id="1043758" ref_url="https://bugzilla.suse.com/1043758" source="BUGZILLA"/>
		<reference ref_id="1043900" ref_url="https://bugzilla.suse.com/1043900" source="BUGZILLA"/>
		<reference ref_id="1045290" ref_url="https://bugzilla.suse.com/1045290" source="BUGZILLA"/>
		<reference ref_id="1046750" ref_url="https://bugzilla.suse.com/1046750" source="BUGZILLA"/>
		<reference ref_id="982303" ref_url="https://bugzilla.suse.com/982303" source="BUGZILLA"/>
		<reference ref_id="986216" ref_url="https://bugzilla.suse.com/986216" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9217" ref_url="https://www.suse.com/security/cve/CVE-2017-9217/" source="CVE"/>
		<reference ref_id="CVE-2017-9445" ref_url="https://www.suse.com/security/cve/CVE-2017-9445/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003077.html" source="SUSE-SU"/>
		<description>
This update for systemd provides several fixes and enhancements.

Security issues fixed:

- CVE-2017-9217: Null pointer dereferencing that could lead to resolved aborting. (bsc#1040614)
- CVE-2017-9445: Possible out-of-bounds write triggered by a specially crafted TCP payload
  from a DNS server. (bsc#1045290)

The update also fixed several non-security bugs:

- core/mount: Use the '-c' flag to not canonicalize paths when calling /bin/umount
- automount: Handle expire_tokens when the mount unit changes its state (bsc#1040942)
- automount: Rework propagation between automount and mount units
- build: Make sure tmpfiles.d/systemd-remote.conf get installed when necessary
- build: Fix systemd-journal-upload installation
- basic: Detect XEN Dom0 as no virtualization (bsc#1036873)
- virt: Make sure some errors are not ignored
- fstab-generator: Do not skip Before= ordering for noauto mountpoints
- fstab-gen: Do not convert device timeout into seconds when initializing JobTimeoutSec
- core/device: Use JobRunningTimeoutSec= for device units (bsc#1004995)
- fstab-generator: Apply the _netdev option also to device units (bsc#1004995)
- job: Add JobRunningTimeoutSec for JOB_RUNNING state (bsc#1004995)
- job: Ensure JobRunningTimeoutSec= survives serialization (bsc#1004995)
- rules: Export NVMe WWID udev attribute (bsc#1038865)
- rules: Introduce disk/by-id (model_serial) symbolic links for NVMe drives
- rules: Add rules for NVMe devices
- sysusers: Make group shadow support configurable (bsc#1029516)
- core: When deserializing a unit, fully restore its cgroup state (bsc#1029102)
- core: Introduce cg_mask_from_string()/cg_mask_to_string()
- core:execute: Fix handling failures of calling fork() in exec_spawn() (bsc#1040258)
- Fix systemd-sysv-convert when a package starts shipping service units (bsc#982303)
  The database might be missing when upgrading a package which was
  shipping no sysv init scripts nor unit files (at the time --save was
  called) but the new version start shipping unit files.
- Disable group shadow support (bsc#1029516)
- Only check signature job error if signature job exists (bsc#1043758)
- Automounter issue in combination with NFS volumes (bsc#1040968)
- Missing symbolic link for SAS device in /dev/disk/by-path (bsc#1040153)
- Add minimal support for boot.d/* scripts in systemd-sysv-convert (bsc#1046750)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-03"/>
	<updated date="2017-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004995">SUSE bug 1004995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029102">SUSE bug 1029102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029516">SUSE bug 1029516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032029">SUSE bug 1032029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033238">SUSE bug 1033238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036873">SUSE bug 1036873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037120">SUSE bug 1037120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038865">SUSE bug 1038865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040153">SUSE bug 1040153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040258">SUSE bug 1040258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040614">SUSE bug 1040614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040942">SUSE bug 1040942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040968">SUSE bug 1040968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043758">SUSE bug 1043758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043900">SUSE bug 1043900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045290">SUSE bug 1045290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046750">SUSE bug 1046750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982303">SUSE bug 982303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986216">SUSE bug 986216</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9217/">CVE-2017-9217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9217">CVE-2017-9217 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9445/">CVE-2017-9445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9445">CVE-2017-9445 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552495" comment="libsystemd0-228-150.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552496" comment="libsystemd0-32bit-228-150.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552497" comment="libudev1-228-150.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552498" comment="libudev1-32bit-228-150.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552499" comment="systemd-228-150.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552500" comment="systemd-32bit-228-150.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519201" comment="systemd-bash-completion-228-150.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552501" comment="systemd-sysvinit-228-150.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552502" comment="udev-228-150.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149356" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1048715" ref_url="https://bugzilla.suse.com/1048715" source="BUGZILLA"/>
		<reference ref_id="963041" ref_url="https://bugzilla.suse.com/963041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3308" ref_url="https://www.suse.com/security/cve/CVE-2017-3308/" source="CVE"/>
		<reference ref_id="CVE-2017-3309" ref_url="https://www.suse.com/security/cve/CVE-2017-3309/" source="CVE"/>
		<reference ref_id="CVE-2017-3453" ref_url="https://www.suse.com/security/cve/CVE-2017-3453/" source="CVE"/>
		<reference ref_id="CVE-2017-3456" ref_url="https://www.suse.com/security/cve/CVE-2017-3456/" source="CVE"/>
		<reference ref_id="CVE-2017-3464" ref_url="https://www.suse.com/security/cve/CVE-2017-3464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003081.html" source="SUSE-SU"/>
		<description>
This MariaDB update to version 10.0.31 GA fixes the following issues:

Security issues fixed:
- CVE-2017-3308: Subcomponent: Server: DML: Easily 'exploitable' vulnerability allows low
  privileged attacker with network access via multiple protocols to compromise MariaDB Server.
  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS). (bsc#1048715)
- CVE-2017-3309: Subcomponent: Server: Optimizer: Easily 'exploitable' vulnerability allows low
  privileged attacker with network access via multiple protocols to compromise MariaDB Server.
  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS). (bsc#1048715)
- CVE-2017-3453: Subcomponent: Server: Optimizer: Easily 'exploitable' vulnerability allows low
  privileged attacker with network access via multiple protocols to compromise MariaDB Server.
  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS). (bsc#1048715)
- CVE-2017-3456: Subcomponent: Server: DML: Easily 'exploitable' vulnerability allows low
  privileged attacker with network access via multiple protocols to compromise MariaDB Server.
  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS). (bsc#1048715)
- CVE-2017-3464: Subcomponent: Server: DDL: Easily 'exploitable' vulnerability allows low
  privileged attacker with network access via multiple protocols to compromise MariaDB Server.
  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS). (bsc#1048715)

Bug fixes:
- switch from 'Restart=on-failure' to 'Restart=on-abort' in
  mysql.service in order to follow the upstream. It also fixes
  hanging mysql-systemd-helper when mariadb fails (e.g. because of
  the misconfiguration) (bsc#963041)
- XtraDB updated to 5.6.36-82.0
- TokuDB updated to 5.6.36-82.0
- Innodb updated to 5.6.36
- Performance Schema updated to 5.6.36

Release notes and changelog:
- https://kb.askmonty.org/en/mariadb-10031-release-notes
- https://kb.askmonty.org/en/mariadb-10031-changelog

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-03"/>
	<updated date="2017-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963041">SUSE bug 963041</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3308/">CVE-2017-3308 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3308">CVE-2017-3308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3309/">CVE-2017-3309 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3309">CVE-2017-3309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3453/">CVE-2017-3453 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3453">CVE-2017-3453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3456/">CVE-2017-3456 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3456">CVE-2017-3456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3464/">CVE-2017-3464 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3464">CVE-2017-3464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549504" comment="libmysqlclient18-10.0.31-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547567" comment="libmysqlclient18-32bit-10.0.31-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549505" comment="mariadb-10.0.31-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549506" comment="mariadb-client-10.0.31-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549507" comment="mariadb-errormessages-10.0.31-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549508" comment="mariadb-tools-10.0.31-29.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149357" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1049255" ref_url="https://bugzilla.suse.com/1049255" source="BUGZILLA"/>
		<reference ref_id="1049621" ref_url="https://bugzilla.suse.com/1049621" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11406" ref_url="https://www.suse.com/security/cve/CVE-2017-11406/" source="CVE"/>
		<reference ref_id="CVE-2017-11407" ref_url="https://www.suse.com/security/cve/CVE-2017-11407/" source="CVE"/>
		<reference ref_id="CVE-2017-11408" ref_url="https://www.suse.com/security/cve/CVE-2017-11408/" source="CVE"/>
		<reference ref_id="CVE-2017-11410" ref_url="https://www.suse.com/security/cve/CVE-2017-11410/" source="CVE"/>
		<reference ref_id="CVE-2017-11411" ref_url="https://www.suse.com/security/cve/CVE-2017-11411/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003079.html" source="SUSE-SU"/>
		<description>
This wireshark update to version 2.2.8 fixes the following issues:

Security issues fixed:
- CVE-2017-11411: The openSAFETY dissectorcould crash or exhaust system memory because of missing
  length validation. (bsc#1049621)
- CVE-2017-11410: The WBXML dissector could go into an infinite loop. (bsc#1049255)
- CVE-2017-11408: The AMQP dissector could crash. (bsc#1049255)
- CVE-2017-11407: The MQ dissector could crash. (bsc#1049255)
- CVE-2017-11406: The DOCSIS dissector could go into an infinite loop. (bsc#1049255)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-03"/>
	<updated date="2017-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049621">SUSE bug 1049621</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11406/">CVE-2017-11406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11406">CVE-2017-11406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11407/">CVE-2017-11407 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11407">CVE-2017-11407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11408/">CVE-2017-11408 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11408">CVE-2017-11408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11410/">CVE-2017-11410 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11410">CVE-2017-11410 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11411/">CVE-2017-11411 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11411">CVE-2017-11411 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549509" comment="libwireshark8-2.2.8-48.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549510" comment="libwiretap6-2.2.8-48.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549511" comment="libwscodecs1-2.2.8-48.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549512" comment="libwsutil7-2.2.8-48.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549513" comment="wireshark-2.2.8-48.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549514" comment="wireshark-gtk-2.2.8-48.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149358" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1046853" ref_url="https://bugzilla.suse.com/1046853" source="BUGZILLA"/>
		<reference ref_id="1046858" ref_url="https://bugzilla.suse.com/1046858" source="BUGZILLA"/>
		<reference ref_id="1047964" ref_url="https://bugzilla.suse.com/1047964" source="BUGZILLA"/>
		<reference ref_id="1047965" ref_url="https://bugzilla.suse.com/1047965" source="BUGZILLA"/>
		<reference ref_id="1049344" ref_url="https://bugzilla.suse.com/1049344" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684/" source="CVE"/>
		<reference ref_id="CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685/" source="CVE"/>
		<reference ref_id="CVE-2017-11112" ref_url="https://www.suse.com/security/cve/CVE-2017-11112/" source="CVE"/>
		<reference ref_id="CVE-2017-11113" ref_url="https://www.suse.com/security/cve/CVE-2017-11113/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003105.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:
- CVE-2017-11112: Illegal address access in append_acs. (bsc#1047964)
- CVE-2017-11113: Dereferencing NULL pointer in _nc_parse_entry. (bsc#1047965)
- CVE-2017-10684, CVE-2017-10685: Add modified upstream fix from ncurses 6.0 to avoid broken
  termcap format (bsc#1046853, bsc#1046858, bsc#1049344)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-07"/>
	<updated date="2017-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047964">SUSE bug 1047964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047965">SUSE bug 1047965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049344">SUSE bug 1049344</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10684">CVE-2017-10684 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10685">CVE-2017-10685 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11112/">CVE-2017-11112 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11112">CVE-2017-11112 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11113/">CVE-2017-11113 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11113">CVE-2017-11113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549522" comment="libncurses5-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549523" comment="libncurses5-32bit-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549524" comment="libncurses6-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549525" comment="libncurses6-32bit-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009540903" comment="ncurses-devel-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549526" comment="ncurses-devel-32bit-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549527" comment="ncurses-utils-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549528" comment="tack-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549529" comment="terminfo-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549530" comment="terminfo-base-5.9-50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149359" version="1" class="patch">
	<metadata>
		<title>Security update for tcmu-runner (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1049485" ref_url="https://bugzilla.suse.com/1049485" source="BUGZILLA"/>
		<reference ref_id="1049488" ref_url="https://bugzilla.suse.com/1049488" source="BUGZILLA"/>
		<reference ref_id="1049489" ref_url="https://bugzilla.suse.com/1049489" source="BUGZILLA"/>
		<reference ref_id="1049490" ref_url="https://bugzilla.suse.com/1049490" source="BUGZILLA"/>
		<reference ref_id="1049491" ref_url="https://bugzilla.suse.com/1049491" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003122.html" source="SUSE-SU"/>
		<description>
This update for tcmu-runner fixes the following issues:

-  qcow handler opens up an information leak via the CheckConfig D-Bus method (bsc#1049491) 
-  glfs handler allows local DoS via crafted CheckConfig strings (bsc#1049485) 
-  UnregisterHandler dbus method in tcmu-runner daemon for non-existing handler causes denial of service (bsc#1049488) 
-  UnregisterHandler D-Bus method in tcmu-runner daemon for internal handler causes denial of service (bsc#1049489) 
-  Memory leaks can be triggered in tcmu-runner daemon by calling D-Bus method for (Un)RegisterHandler (bsc#1049490)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-09"/>
	<updated date="2017-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1049485">SUSE bug 1049485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049488">SUSE bug 1049488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049489">SUSE bug 1049489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049490">SUSE bug 1049490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049491">SUSE bug 1049491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552503" comment="libtcmu1-1.2.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552504" comment="tcmu-runner-1.2.0-2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149360" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1049607" ref_url="https://bugzilla.suse.com/1049607" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11464" ref_url="https://www.suse.com/security/cve/CVE-2017-11464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003126.html" source="SUSE-SU"/>
		<description>
This update librsvg to version 2.40.18 fixes the following issues:

Security issue fixed:
- CVE-2017-11464: A SIGFPE is raised in the function box_blur_line of rsvg-filter.c. (bsc#1049607)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-09"/>
	<updated date="2017-08-09"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1049607">SUSE bug 1049607</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11464/">CVE-2017-11464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11464">CVE-2017-11464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549531" comment="gdk-pixbuf-loader-rsvg-2.40.18-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549532" comment="librsvg-2-2-2.40.18-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549533" comment="librsvg-2-2-32bit-2.40.18-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549534" comment="rsvg-view-2.40.18-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149361" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1052916" ref_url="https://bugzilla.suse.com/1052916" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2885" ref_url="https://www.suse.com/security/cve/CVE-2017-2885/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003127.html" source="SUSE-SU"/>
		<description>
This update for libsoup fixes the following issues:

- A bug in the HTTP Chunked Encoding code has been fixed that could have been
  exploited by attackers to cause a stack-based buffer overflow in client or
  server code running libsoup (bsc#1052916, CVE-2017-2885).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-10"/>
	<updated date="2017-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1052916">SUSE bug 1052916</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2885/">CVE-2017-2885 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2885">CVE-2017-2885 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549535" comment="libsoup-2_4-1-2.54.1-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549536" comment="libsoup-2_4-1-32bit-2.54.1-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518003" comment="libsoup-lang-2.54.1-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549537" comment="typelib-1_0-Soup-2_4-2.54.1-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149362" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1051222" ref_url="https://bugzilla.suse.com/1051222" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11185" ref_url="https://www.suse.com/security/cve/CVE-2017-11185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003132.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:


CVE-2017-11185: Specific RSA signatures passed to the gmp plugin for verification can
cause a null-pointer dereference and it may lead to a denial of service (bsc#1051222) 

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-11"/>
	<updated date="2017-08-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1051222">SUSE bug 1051222</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11185/">CVE-2017-11185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11185">CVE-2017-11185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549543" comment="strongswan-5.1.3-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518013" comment="strongswan-doc-5.1.3-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549544" comment="strongswan-hmac-5.1.3-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549545" comment="strongswan-ipsec-5.1.3-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549546" comment="strongswan-libs0-5.1.3-26.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149363" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="979907" ref_url="https://bugzilla.suse.com/979907" source="BUGZILLA"/>
		<reference ref_id="997857" ref_url="https://bugzilla.suse.com/997857" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8871" ref_url="https://www.suse.com/security/cve/CVE-2015-8871/" source="CVE"/>
		<reference ref_id="CVE-2016-7163" ref_url="https://www.suse.com/security/cve/CVE-2016-7163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003133.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes the following issues:

- CVE 2016-7163: Integer Overflow could lead to remote code execution (bsc#997857).

- CVE 2015-8871: Use-after-free in opj_j2k_write_mco function could lead to denial of service (bsc#979907).


		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-11"/>
	<updated date="2017-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979907">SUSE bug 979907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997857">SUSE bug 997857</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-8871/">CVE-2015-8871 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8871">CVE-2015-8871 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7163/">CVE-2016-7163 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7163">CVE-2016-7163 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549547" comment="libopenjp2-7-2.1.0-4.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149364" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1038444" ref_url="https://bugzilla.suse.com/1038444" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8872" ref_url="https://www.suse.com/security/cve/CVE-2017-8872/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003130.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:
- CVE-2017-8872: Out-of-bounds read in htmlParseTryOrFinish. (bsc#1038444)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-11"/>
	<updated date="2017-08-11"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1038444">SUSE bug 1038444</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8872/">CVE-2017-8872 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8872">CVE-2017-8872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549548" comment="libxml2-2-2.9.4-46.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549549" comment="libxml2-2-32bit-2.9.4-46.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532336" comment="libxml2-doc-2.9.4-46.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549550" comment="libxml2-tools-2.9.4-46.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549551" comment="python-libxml2-2.9.4-46.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149365" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1051643" ref_url="https://bugzilla.suse.com/1051643" source="BUGZILLA"/>
		<reference ref_id="1051644" ref_url="https://bugzilla.suse.com/1051644" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000100" ref_url="https://www.suse.com/security/cve/CVE-2017-1000100/" source="CVE"/>
		<reference ref_id="CVE-2017-1000101" ref_url="https://www.suse.com/security/cve/CVE-2017-1000101/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003138.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2017-1000100: TFP sends more than buffer size and it could lead to a denial of service (bsc#1051644)
- CVE-2017-1000101: URL globbing out of bounds read could lead to a denial of service (bsc#1051643)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-16"/>
	<updated date="2017-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1051643">SUSE bug 1051643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051644">SUSE bug 1051644</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000100/">CVE-2017-1000100 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000100">CVE-2017-1000100 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000101/">CVE-2017-1000101 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000101">CVE-2017-1000101 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549552" comment="curl-7.37.0-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549553" comment="libcurl4-7.37.0-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549554" comment="libcurl4-32bit-7.37.0-37.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149366" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1049302" ref_url="https://bugzilla.suse.com/1049302" source="BUGZILLA"/>
		<reference ref_id="1049305" ref_url="https://bugzilla.suse.com/1049305" source="BUGZILLA"/>
		<reference ref_id="1049306" ref_url="https://bugzilla.suse.com/1049306" source="BUGZILLA"/>
		<reference ref_id="1049307" ref_url="https://bugzilla.suse.com/1049307" source="BUGZILLA"/>
		<reference ref_id="1049308" ref_url="https://bugzilla.suse.com/1049308" source="BUGZILLA"/>
		<reference ref_id="1049309" ref_url="https://bugzilla.suse.com/1049309" source="BUGZILLA"/>
		<reference ref_id="1049310" ref_url="https://bugzilla.suse.com/1049310" source="BUGZILLA"/>
		<reference ref_id="1049311" ref_url="https://bugzilla.suse.com/1049311" source="BUGZILLA"/>
		<reference ref_id="1049312" ref_url="https://bugzilla.suse.com/1049312" source="BUGZILLA"/>
		<reference ref_id="1049313" ref_url="https://bugzilla.suse.com/1049313" source="BUGZILLA"/>
		<reference ref_id="1049314" ref_url="https://bugzilla.suse.com/1049314" source="BUGZILLA"/>
		<reference ref_id="1049315" ref_url="https://bugzilla.suse.com/1049315" source="BUGZILLA"/>
		<reference ref_id="1049316" ref_url="https://bugzilla.suse.com/1049316" source="BUGZILLA"/>
		<reference ref_id="1049317" ref_url="https://bugzilla.suse.com/1049317" source="BUGZILLA"/>
		<reference ref_id="1049318" ref_url="https://bugzilla.suse.com/1049318" source="BUGZILLA"/>
		<reference ref_id="1049319" ref_url="https://bugzilla.suse.com/1049319" source="BUGZILLA"/>
		<reference ref_id="1049320" ref_url="https://bugzilla.suse.com/1049320" source="BUGZILLA"/>
		<reference ref_id="1049321" ref_url="https://bugzilla.suse.com/1049321" source="BUGZILLA"/>
		<reference ref_id="1049322" ref_url="https://bugzilla.suse.com/1049322" source="BUGZILLA"/>
		<reference ref_id="1049323" ref_url="https://bugzilla.suse.com/1049323" source="BUGZILLA"/>
		<reference ref_id="1049324" ref_url="https://bugzilla.suse.com/1049324" source="BUGZILLA"/>
		<reference ref_id="1049325" ref_url="https://bugzilla.suse.com/1049325" source="BUGZILLA"/>
		<reference ref_id="1049326" ref_url="https://bugzilla.suse.com/1049326" source="BUGZILLA"/>
		<reference ref_id="1049327" ref_url="https://bugzilla.suse.com/1049327" source="BUGZILLA"/>
		<reference ref_id="1049328" ref_url="https://bugzilla.suse.com/1049328" source="BUGZILLA"/>
		<reference ref_id="1049329" ref_url="https://bugzilla.suse.com/1049329" source="BUGZILLA"/>
		<reference ref_id="1049330" ref_url="https://bugzilla.suse.com/1049330" source="BUGZILLA"/>
		<reference ref_id="1049331" ref_url="https://bugzilla.suse.com/1049331" source="BUGZILLA"/>
		<reference ref_id="1049332" ref_url="https://bugzilla.suse.com/1049332" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10078" ref_url="https://www.suse.com/security/cve/CVE-2017-10078/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10086" ref_url="https://www.suse.com/security/cve/CVE-2017-10086/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10114" ref_url="https://www.suse.com/security/cve/CVE-2017-10114/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10118" ref_url="https://www.suse.com/security/cve/CVE-2017-10118/" source="CVE"/>
		<reference ref_id="CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125/" source="CVE"/>
		<reference ref_id="CVE-2017-10135" ref_url="https://www.suse.com/security/cve/CVE-2017-10135/" source="CVE"/>
		<reference ref_id="CVE-2017-10176" ref_url="https://www.suse.com/security/cve/CVE-2017-10176/" source="CVE"/>
		<reference ref_id="CVE-2017-10193" ref_url="https://www.suse.com/security/cve/CVE-2017-10193/" source="CVE"/>
		<reference ref_id="CVE-2017-10198" ref_url="https://www.suse.com/security/cve/CVE-2017-10198/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<description>
This java-1_8_0-openjdk update to version jdk8u141 (icedtea 3.5.0) fixes the following issues:

Security issues fixed:
- CVE-2017-10053: Improved image post-processing steps (bsc#1049305)
- CVE-2017-10067: Additional jar validation steps (bsc#1049306)
- CVE-2017-10074: Image conversion improvements (bsc#1049307)
- CVE-2017-10078: Better script accessibility for JavaScript (bsc#1049308)
- CVE-2017-10081: Right parenthesis issue (bsc#1049309)
- CVE-2017-10086: Unspecified vulnerability in subcomponent JavaFX (bsc#1049310)
- CVE-2017-10087: Better Thread Pool execution (bsc#1049311)
- CVE-2017-10089: Service Registration Lifecycle (bsc#1049312)
- CVE-2017-10090: Better handling of channel groups (bsc#1049313)
- CVE-2017-10096: Transform Transformer Exceptions (bsc#1049314)
- CVE-2017-10101: Better reading of text catalogs (bsc#1049315)
- CVE-2017-10102: Improved garbage collection (bsc#1049316)
- CVE-2017-10105: Unspecified vulnerability in subcomponent deployment (bsc#1049317)
- CVE-2017-10107: Less Active Activations (bsc#1049318)
- CVE-2017-10108: Better naming attribution (bsc#1049319)
- CVE-2017-10109: Better sourcing of code (bsc#1049320)
- CVE-2017-10110: Better image fetching (bsc#1049321)
- CVE-2017-10111: Rearrange MethodHandle arrangements (bsc#1049322)
- CVE-2017-10114: Unspecified vulnerability in subcomponent JavaFX (bsc#1049323)
- CVE-2017-10115: Higher quality DSA operations (bsc#1049324)
- CVE-2017-10116: Proper directory lookup processing (bsc#1049325)
- CVE-2017-10118: Higher quality ECDSA operations (bsc#1049326)
- CVE-2017-10125: Unspecified vulnerability in subcomponent deployment (bsc#1049327)
- CVE-2017-10135: Better handling of PKCS8 material (bsc#1049328)
- CVE-2017-10176: Additional elliptic curve support (bsc#1049329)
- CVE-2017-10193: Improve algorithm constraints implementation (bsc#1049330)
- CVE-2017-10198: Clear certificate chain connections (bsc#1049331)
- CVE-2017-10243: Unspecified vulnerability in subcomponent JAX-WS (bsc#1049332)

Bug fixes:
- Check registry registration location
- Improved certificate processing
- JMX diagnostic improvements
- Update to libpng 1.6.28
- Import of OpenJDK 8 u141 build 15 (bsc#1049302)

New features:
- Support using RSAandMGF1 with the SHA hash algorithms in the PKCS11 provider

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-16"/>
	<updated date="2017-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1049302">SUSE bug 1049302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049305">SUSE bug 1049305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049306">SUSE bug 1049306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049307">SUSE bug 1049307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049308">SUSE bug 1049308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049309">SUSE bug 1049309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049310">SUSE bug 1049310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049311">SUSE bug 1049311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049312">SUSE bug 1049312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049313">SUSE bug 1049313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049314">SUSE bug 1049314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049315">SUSE bug 1049315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049316">SUSE bug 1049316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049317">SUSE bug 1049317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049318">SUSE bug 1049318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049319">SUSE bug 1049319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049320">SUSE bug 1049320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049321">SUSE bug 1049321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049322">SUSE bug 1049322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049323">SUSE bug 1049323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049324">SUSE bug 1049324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049325">SUSE bug 1049325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049326">SUSE bug 1049326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049327">SUSE bug 1049327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049328">SUSE bug 1049328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049329">SUSE bug 1049329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049330">SUSE bug 1049330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049331">SUSE bug 1049331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049332">SUSE bug 1049332</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10053">CVE-2017-10053 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10067">CVE-2017-10067 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10074">CVE-2017-10074 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10078/">CVE-2017-10078 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10078">CVE-2017-10078 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10081">CVE-2017-10081 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10086/">CVE-2017-10086 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10086">CVE-2017-10086 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10087">CVE-2017-10087 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10089">CVE-2017-10089 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10090">CVE-2017-10090 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10096">CVE-2017-10096 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10101">CVE-2017-10101 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10102">CVE-2017-10102 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10105">CVE-2017-10105 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10107">CVE-2017-10107 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10108">CVE-2017-10108 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10109">CVE-2017-10109 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10110">CVE-2017-10110 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10111">CVE-2017-10111 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10114/">CVE-2017-10114 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10114">CVE-2017-10114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10115">CVE-2017-10115 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10116">CVE-2017-10116 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10118/">CVE-2017-10118 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10118">CVE-2017-10118 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10125">CVE-2017-10125 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10135/">CVE-2017-10135 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10135">CVE-2017-10135 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10176/">CVE-2017-10176 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10176">CVE-2017-10176 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10193/">CVE-2017-10193 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10193">CVE-2017-10193 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10198/">CVE-2017-10198 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10198">CVE-2017-10198 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10243">CVE-2017-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149367" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1049086" ref_url="https://bugzilla.suse.com/1049086" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10978" ref_url="https://www.suse.com/security/cve/CVE-2017-10978/" source="CVE"/>
		<reference ref_id="CVE-2017-10983" ref_url="https://www.suse.com/security/cve/CVE-2017-10983/" source="CVE"/>
		<reference ref_id="CVE-2017-10984" ref_url="https://www.suse.com/security/cve/CVE-2017-10984/" source="CVE"/>
		<reference ref_id="CVE-2017-10985" ref_url="https://www.suse.com/security/cve/CVE-2017-10985/" source="CVE"/>
		<reference ref_id="CVE-2017-10986" ref_url="https://www.suse.com/security/cve/CVE-2017-10986/" source="CVE"/>
		<reference ref_id="CVE-2017-10987" ref_url="https://www.suse.com/security/cve/CVE-2017-10987/" source="CVE"/>
		<reference ref_id="CVE-2017-10988" ref_url="https://www.suse.com/security/cve/CVE-2017-10988/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003144.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

- update to 3.0.15 (bsc#1049086)
  * Bind the lifetime of program name and python path to the module
  * CVE-2017-10978: FR-GV-201: Check input / output length in make_secret() (bsc#1049086)
  * CVE-2017-10983: FR-GV-206: Fix read overflow when decoding DHCP option 63 (bsc#1049086)
  * CVE-2017-10984: FR-GV-301: Fix write overflow in data2vp_wimax() (bsc#1049086) 
  * CVE-2017-10985: FR-GV-302: Fix infinite loop and memory exhaustion with 'concat' attributes (bsc#1049086)
  * CVE-2017-10986: FR-GV-303: Fix infinite read in dhcp_attr2vp() (bsc#1049086)
  * CVE-2017-10987: FR-GV-304: Fix buffer over-read in fr_dhcp_decode_suboptions() (bsc#1049086)
  * CVE-2017-10988: FR-GV-305: Decode 'signed' attributes correctly. (bsc#1049086) 
  * FR-AD-001: use strncmp() instead of memcmp() for bounded data
  * Print messages when we see deprecated configuration items
  * Show reasons why we couldn't parse a certificate expiry time
  * Be more accepting about truncated ASN1 times.
  * Fix OpenSSL API issue which could leak small amounts of memory.
  * For Access-Reject, call rad_authlog() after running the
    post-auth section, just like for Access-Accept.
  * Don't crash when reading corrupted data from session resumption
    cache.
  * Parse port in dhcpclient.
  * Don't leak memory for OpenSSL.
  * Portability fixes taken from OpenBSD port collection.
  * run rad_authlog after post-auth for Access-Reject.
  * Don't process VMPS packets twice.
  * Fix attribute truncation in rlm_perl
  * Fix bug when processing huntgroups.
  * FR-AD-002 - Bind the lifetime of program name and python path to the module
  * FR-AD-003 - Pass correct statement length into sqlite3_prepare[_v2]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-17"/>
	<updated date="2017-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10978/">CVE-2017-10978 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10978">CVE-2017-10978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10983/">CVE-2017-10983 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10983">CVE-2017-10983 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10984/">CVE-2017-10984 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10984">CVE-2017-10984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10985/">CVE-2017-10985 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10985">CVE-2017-10985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10986/">CVE-2017-10986 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10986">CVE-2017-10986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10987/">CVE-2017-10987 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10987">CVE-2017-10987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10988/">CVE-2017-10988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-10988">CVE-2017-10988 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552505" comment="freeradius-server-3.0.15-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552506" comment="freeradius-server-doc-3.0.15-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552507" comment="freeradius-server-krb5-3.0.15-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552508" comment="freeradius-server-ldap-3.0.15-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552509" comment="freeradius-server-libs-3.0.15-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552510" comment="freeradius-server-mysql-3.0.15-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552511" comment="freeradius-server-perl-3.0.15-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552512" comment="freeradius-server-postgresql-3.0.15-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552513" comment="freeradius-server-python-3.0.15-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552514" comment="freeradius-server-sqlite-3.0.15-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552515" comment="freeradius-server-utils-3.0.15-2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149368" version="1" class="patch">
	<metadata>
		<title>Security update for libplist (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1029638" ref_url="https://bugzilla.suse.com/1029638" source="BUGZILLA"/>
		<reference ref_id="1029639" ref_url="https://bugzilla.suse.com/1029639" source="BUGZILLA"/>
		<reference ref_id="1029706" ref_url="https://bugzilla.suse.com/1029706" source="BUGZILLA"/>
		<reference ref_id="1029707" ref_url="https://bugzilla.suse.com/1029707" source="BUGZILLA"/>
		<reference ref_id="1029751" ref_url="https://bugzilla.suse.com/1029751" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6435" ref_url="https://www.suse.com/security/cve/CVE-2017-6435/" source="CVE"/>
		<reference ref_id="CVE-2017-6436" ref_url="https://www.suse.com/security/cve/CVE-2017-6436/" source="CVE"/>
		<reference ref_id="CVE-2017-6437" ref_url="https://www.suse.com/security/cve/CVE-2017-6437/" source="CVE"/>
		<reference ref_id="CVE-2017-6438" ref_url="https://www.suse.com/security/cve/CVE-2017-6438/" source="CVE"/>
		<reference ref_id="CVE-2017-6439" ref_url="https://www.suse.com/security/cve/CVE-2017-6439/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003143.html" source="SUSE-SU"/>
		<description>
This update for libplist fixes the following issues:

Security issues fixed:

- CVE-2017-6439: Heap-based buffer overflow in the parse_string_node function. (bsc#1029638)
- CVE-2017-6438: Heap-based buffer overflow in the parse_unicode_node function. (bsc#1029706)
- CVE-2017-6437: The base64encode function in base64.c allows local users to cause denial of service
  (out-of-bounds read) via a crafted plist file. (bsc#1029707)
- CVE-2017-6436: Integer overflow in parse_string_node. (bsc#1029751)
- CVE-2017-6435: Crafted plist file could lead to Heap-buffer overflow. (bsc#1029639)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-17"/>
	<updated date="2017-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029638">SUSE bug 1029638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029639">SUSE bug 1029639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029706">SUSE bug 1029706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029707">SUSE bug 1029707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029751">SUSE bug 1029751</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6435/">CVE-2017-6435 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6435">CVE-2017-6435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6436/">CVE-2017-6436 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6436">CVE-2017-6436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6437/">CVE-2017-6437 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6437">CVE-2017-6437 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6438/">CVE-2017-6438 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6438">CVE-2017-6438 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6439/">CVE-2017-6439 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6439">CVE-2017-6439 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549559" comment="libplist3-1.12-20.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149369" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1042812" ref_url="https://bugzilla.suse.com/1042812" source="BUGZILLA"/>
		<reference ref_id="1042826" ref_url="https://bugzilla.suse.com/1042826" source="BUGZILLA"/>
		<reference ref_id="1043289" ref_url="https://bugzilla.suse.com/1043289" source="BUGZILLA"/>
		<reference ref_id="1049072" ref_url="https://bugzilla.suse.com/1049072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11403" ref_url="https://www.suse.com/security/cve/CVE-2017-11403/" source="CVE"/>
		<reference ref_id="CVE-2017-9439" ref_url="https://www.suse.com/security/cve/CVE-2017-9439/" source="CVE"/>
		<reference ref_id="CVE-2017-9440" ref_url="https://www.suse.com/security/cve/CVE-2017-9440/" source="CVE"/>
		<reference ref_id="CVE-2017-9501" ref_url="https://www.suse.com/security/cve/CVE-2017-9501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003141.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:
- CVE-2017-9439: A memory leak was found in the function ReadPDBImage incoders/pdb.c (bsc#1042826)
- CVE-2017-9440: A memory leak was found in the function ReadPSDChannelin coders/psd.c (bsc#1042812)
- CVE-2017-9501: An assertion failure could cause a denial of service via a crafted file (bsc#1043289)
- CVE-2017-11403: ReadMNGImage function in coders/png.c has an out-of-order CloseBlob call, resulting
  in a use-after-free via acrafted file (bsc#1049072)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-17"/>
	<updated date="2017-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1042812">SUSE bug 1042812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042826">SUSE bug 1042826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043289">SUSE bug 1043289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049072">SUSE bug 1049072</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11403/">CVE-2017-11403 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11403">CVE-2017-11403 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9439/">CVE-2017-9439 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9439">CVE-2017-9439 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9440/">CVE-2017-9440 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9440">CVE-2017-9440 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9501/">CVE-2017-9501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9501">CVE-2017-9501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549560" comment="libMagickCore-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549561" comment="libMagickWand-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149370" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1002734" ref_url="https://bugzilla.suse.com/1002734" source="BUGZILLA"/>
		<reference ref_id="1041447" ref_url="https://bugzilla.suse.com/1041447" source="BUGZILLA"/>
		<reference ref_id="1041470" ref_url="https://bugzilla.suse.com/1041470" source="BUGZILLA"/>
		<reference ref_id="1050896" ref_url="https://bugzilla.suse.com/1050896" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9263" ref_url="https://www.suse.com/security/cve/CVE-2017-9263/" source="CVE"/>
		<reference ref_id="CVE-2017-9265" ref_url="https://www.suse.com/security/cve/CVE-2017-9265/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003145.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:


- CVE-2017-9263: OpenFlow role status message can cause a call to abort() leading to application crash (bsc#1041470)

- CVE-2017-9265: Buffer over-read while parsing message could lead to crash or maybe arbitrary code execution (bsc#1041447)

- Do not restart the ovs-vswitchd and ovsdb-server services
  on package updates (bsc#1002734)

- Do not restart the ovs-vswitchd, ovsdb-server and openvswitch
  services on package removals. This facilitates potential future
  package moves but also preserves connectivity when the package is
  removed (bsc#1050896)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-18"/>
	<updated date="2017-08-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1002734">SUSE bug 1002734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041447">SUSE bug 1041447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041470">SUSE bug 1041470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050896">SUSE bug 1050896</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9263/">CVE-2017-9263 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9263">CVE-2017-9263 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9265/">CVE-2017-9265 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9265">CVE-2017-9265 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552516" comment="openvswitch-2.7.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149371" version="1" class="patch">
	<metadata>
		<title>Security update for gnome-shell (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1008539" ref_url="https://bugzilla.suse.com/1008539" source="BUGZILLA"/>
		<reference ref_id="1034584" ref_url="https://bugzilla.suse.com/1034584" source="BUGZILLA"/>
		<reference ref_id="1034827" ref_url="https://bugzilla.suse.com/1034827" source="BUGZILLA"/>
		<reference ref_id="1036494" ref_url="https://bugzilla.suse.com/1036494" source="BUGZILLA"/>
		<reference ref_id="1047262" ref_url="https://bugzilla.suse.com/1047262" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8288" ref_url="https://www.suse.com/security/cve/CVE-2017-8288/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003146.html" source="SUSE-SU"/>
		<description>

This update for gnome-shell provides the following fixes:

- Fix not intuitive login screen for root user (bsc#1047262)
- Disable session selection button when it's hidden in user switch dialog (bsc#1034584, bsc#1034827)
- Fix app windows overlay app list in overview screen (bsc#1008539)
- Properly handle failures when loading extensions (bsc#1036494, CVE-2017-8288)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-18"/>
	<updated date="2017-08-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1008539">SUSE bug 1008539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034584">SUSE bug 1034584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034827">SUSE bug 1034827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036494">SUSE bug 1036494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047262">SUSE bug 1047262</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8288/">CVE-2017-8288 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8288">CVE-2017-8288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549562" comment="gnome-shell-3.20.4-77.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549563" comment="gnome-shell-browser-plugin-3.20.4-77.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518036" comment="gnome-shell-lang-3.20.4-77.7.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149372" version="1" class="patch">
	<metadata>
		<title>Security update for samba and resource-agents (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1048278" ref_url="https://bugzilla.suse.com/1048278" source="BUGZILLA"/>
		<reference ref_id="1048339" ref_url="https://bugzilla.suse.com/1048339" source="BUGZILLA"/>
		<reference ref_id="1048352" ref_url="https://bugzilla.suse.com/1048352" source="BUGZILLA"/>
		<reference ref_id="1048387" ref_url="https://bugzilla.suse.com/1048387" source="BUGZILLA"/>
		<reference ref_id="1048790" ref_url="https://bugzilla.suse.com/1048790" source="BUGZILLA"/>
		<reference ref_id="1052577" ref_url="https://bugzilla.suse.com/1052577" source="BUGZILLA"/>
		<reference ref_id="1054017" ref_url="https://bugzilla.suse.com/1054017" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11103" ref_url="https://www.suse.com/security/cve/CVE-2017-11103/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003152.html" source="SUSE-SU"/>
		<description>
This update provides Samba 4.6.7, which fixes the following issues:

- CVE-2017-11103: Metadata were being taken from the unauthenticated plaintext (the Ticket)
  rather than the authenticated and encrypted KDC response. (bsc#1048278)
- Fix cephwrap_chdir(). (bsc#1048790)
- Fix ctdb logs to /var/log/log.ctdb instead of /var/log/ctdb. (bsc#1048339)
- Fix inconsistent ctdb socket path. (bsc#1048352)
- Fix non-admin cephx authentication. (bsc#1048387)
- CTDB cannot start when there is no persistent database. (bsc#1052577)

The CTDB resource agent was also fixed to not fail when the database is empty.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-22"/>
	<updated date="2017-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1048278">SUSE bug 1048278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048339">SUSE bug 1048339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048352">SUSE bug 1048352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048387">SUSE bug 1048387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048790">SUSE bug 1048790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052577">SUSE bug 1052577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054017">SUSE bug 1054017</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11103/">CVE-2017-11103 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11103">CVE-2017-11103 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552517" comment="libdcerpc-binding0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552518" comment="libdcerpc-binding0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552519" comment="libdcerpc0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552520" comment="libdcerpc0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552521" comment="libndr-krb5pac0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552522" comment="libndr-krb5pac0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552523" comment="libndr-nbt0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552524" comment="libndr-nbt0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552525" comment="libndr-standard0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552526" comment="libndr-standard0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552527" comment="libndr0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552528" comment="libndr0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552529" comment="libnetapi0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552530" comment="libnetapi0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552531" comment="libsamba-credentials0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552532" comment="libsamba-credentials0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552533" comment="libsamba-errors0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552534" comment="libsamba-errors0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552535" comment="libsamba-hostconfig0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552536" comment="libsamba-hostconfig0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552537" comment="libsamba-passdb0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552538" comment="libsamba-passdb0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552539" comment="libsamba-util0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552540" comment="libsamba-util0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552541" comment="libsamdb0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552542" comment="libsamdb0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552543" comment="libsmbclient0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552544" comment="libsmbclient0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552545" comment="libsmbconf0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552546" comment="libsmbconf0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552547" comment="libsmbldap0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552548" comment="libsmbldap0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552549" comment="libtevent-util0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552550" comment="libtevent-util0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552551" comment="libwbclient0-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552552" comment="libwbclient0-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552553" comment="samba-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552554" comment="samba-client-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552555" comment="samba-client-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519243" comment="samba-doc-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552556" comment="samba-libs-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552557" comment="samba-libs-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552558" comment="samba-winbind-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552559" comment="samba-winbind-32bit-4.6.7+git.38.90b2cdb4f22-3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149373" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1053431" ref_url="https://bugzilla.suse.com/1053431" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10078" ref_url="https://www.suse.com/security/cve/CVE-2017-10078/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003159.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Version update to 8.0-4.10 [bsc#1053431]
  CVE-2017-10111, CVE-2017-10110, CVE-2017-10107, CVE-2017-10101, CVE-2017-10096, CVE-2017-10090, CVE-2017-10089, 
  CVE-2017-10087, CVE-2017-10102, CVE-2017-10116, CVE-2017-10074, CVE-2017-10078, CVE-2017-10115, CVE-2017-10067, 
  CVE-2017-10125, CVE-2017-10243, CVE-2017-10109, CVE-2017-10108, CVE-2017-10053, CVE-2017-10105, CVE-2017-10081:
    Multiple unspecified vulnerabilities in multiple Java components could lead to code execution or sandbox escape
 
 More information can be found here: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#Oracle_July_18_2017_CPU
    
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-25"/>
	<updated date="2017-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1053431">SUSE bug 1053431</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10053">CVE-2017-10053 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10067">CVE-2017-10067 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10074">CVE-2017-10074 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10078/">CVE-2017-10078 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10078">CVE-2017-10078 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10081">CVE-2017-10081 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10087">CVE-2017-10087 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10089">CVE-2017-10089 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10090">CVE-2017-10090 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10096">CVE-2017-10096 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10101">CVE-2017-10101 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10102">CVE-2017-10102 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10105">CVE-2017-10105 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10107">CVE-2017-10107 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10108">CVE-2017-10108 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10109">CVE-2017-10109 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10110">CVE-2017-10110 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10111">CVE-2017-10111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10115">CVE-2017-10115 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10116">CVE-2017-10116 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10125">CVE-2017-10125 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10243">CVE-2017-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149374" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1009745" ref_url="https://bugzilla.suse.com/1009745" source="BUGZILLA"/>
		<reference ref_id="1036659" ref_url="https://bugzilla.suse.com/1036659" source="BUGZILLA"/>
		<reference ref_id="1038984" ref_url="https://bugzilla.suse.com/1038984" source="BUGZILLA"/>
		<reference ref_id="1043218" ref_url="https://bugzilla.suse.com/1043218" source="BUGZILLA"/>
		<reference ref_id="1045735" ref_url="https://bugzilla.suse.com/1045735" source="BUGZILLA"/>
		<reference ref_id="1046417" ref_url="https://bugzilla.suse.com/1046417" source="BUGZILLA"/>
		<reference ref_id="1047785" ref_url="https://bugzilla.suse.com/1047785" source="BUGZILLA"/>
		<reference ref_id="1048315" ref_url="https://bugzilla.suse.com/1048315" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7435" ref_url="https://www.suse.com/security/cve/CVE-2017-7435/" source="CVE"/>
		<reference ref_id="CVE-2017-7436" ref_url="https://www.suse.com/security/cve/CVE-2017-7436/" source="CVE"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003160.html" source="SUSE-SU"/>
		<description>
The Software Update Stack was updated to receive fixes and enhancements.


libzypp:

- CVE-2017-7435, CVE-2017-7436, CVE-2017-9269: Fix GPG check workflows, mainly for unsigned
  repositories and packages. (bsc#1045735, bsc#1038984)
- Fix gpg-pubkey release (creation time) computation. (bsc#1036659)
- Update lsof blacklist. (bsc#1046417)
- Re-probe on refresh if the repository type changes. (bsc#1048315)
- Propagate proper error code to DownloadProgressReport. (bsc#1047785)
- Allow to trigger an appdata refresh unconditionally. (bsc#1009745)
- Support custom repo variables defined in /etc/zypp/vars.d.

yast2-pkg-bindings:

- Do not crash when the repository URL is not defined. (bsc#1043218)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-25"/>
	<updated date="2017-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009745">SUSE bug 1009745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036659">SUSE bug 1036659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038984">SUSE bug 1038984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043218">SUSE bug 1043218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046417">SUSE bug 1046417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047785">SUSE bug 1047785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048315">SUSE bug 1048315</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7435/">CVE-2017-7435 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7435">CVE-2017-7435 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7436/">CVE-2017-7436 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7436">CVE-2017-7436 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9269">CVE-2017-9269 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552560" comment="libzypp-16.15.3-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552561" comment="yast2-pkg-bindings-3.2.4-2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149375" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1053431" ref_url="https://bugzilla.suse.com/1053431" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003163.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Version update to 7.1-4.10 [bsc#1053431]
  * CVE-2017-10111 CVE-2017-10110 CVE-2017-10107 CVE-2017-10101
    CVE-2017-10096 CVE-2017-10090 CVE-2017-10089 CVE-2017-10087
    CVE-2017-10102 CVE-2017-10116 CVE-2017-10074 CVE-2017-10115
    CVE-2017-10067 CVE-2017-10125 CVE-2017-10243 CVE-2017-10109
    CVE-2017-10108 CVE-2017-10053 CVE-2017-10105 CVE-2017-10081: Multiple unspecified vulnerabilities 
in multiple Java components could lead to code execution or sandbox escape
 
 More information can be found here: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#Oracle_July_18_2017_CPU

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1053431">SUSE bug 1053431</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10053">CVE-2017-10053 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10067">CVE-2017-10067 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10074">CVE-2017-10074 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10081">CVE-2017-10081 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10087">CVE-2017-10087 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10089">CVE-2017-10089 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10090">CVE-2017-10090 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10096">CVE-2017-10096 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10101">CVE-2017-10101 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10102">CVE-2017-10102 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10105">CVE-2017-10105 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10107">CVE-2017-10107 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10108">CVE-2017-10108 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10109">CVE-2017-10109 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10110">CVE-2017-10110 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10111">CVE-2017-10111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10115">CVE-2017-10115 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10116">CVE-2017-10116 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10125">CVE-2017-10125 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10243">CVE-2017-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009544971" comment="java-1_7_1-ibm-1.7.1_sr4.10-38.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009534249" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-38.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009544972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-38.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009534252" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-38.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149376" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1005778" ref_url="https://bugzilla.suse.com/1005778" source="BUGZILLA"/>
		<reference ref_id="1006180" ref_url="https://bugzilla.suse.com/1006180" source="BUGZILLA"/>
		<reference ref_id="1011913" ref_url="https://bugzilla.suse.com/1011913" source="BUGZILLA"/>
		<reference ref_id="1012829" ref_url="https://bugzilla.suse.com/1012829" source="BUGZILLA"/>
		<reference ref_id="1013887" ref_url="https://bugzilla.suse.com/1013887" source="BUGZILLA"/>
		<reference ref_id="1015337" ref_url="https://bugzilla.suse.com/1015337" source="BUGZILLA"/>
		<reference ref_id="1015342" ref_url="https://bugzilla.suse.com/1015342" source="BUGZILLA"/>
		<reference ref_id="1016119" ref_url="https://bugzilla.suse.com/1016119" source="BUGZILLA"/>
		<reference ref_id="1019151" ref_url="https://bugzilla.suse.com/1019151" source="BUGZILLA"/>
		<reference ref_id="1019695" ref_url="https://bugzilla.suse.com/1019695" source="BUGZILLA"/>
		<reference ref_id="1020645" ref_url="https://bugzilla.suse.com/1020645" source="BUGZILLA"/>
		<reference ref_id="1022476" ref_url="https://bugzilla.suse.com/1022476" source="BUGZILLA"/>
		<reference ref_id="1022600" ref_url="https://bugzilla.suse.com/1022600" source="BUGZILLA"/>
		<reference ref_id="1022604" ref_url="https://bugzilla.suse.com/1022604" source="BUGZILLA"/>
		<reference ref_id="1023175" ref_url="https://bugzilla.suse.com/1023175" source="BUGZILLA"/>
		<reference ref_id="1024346" ref_url="https://bugzilla.suse.com/1024346" source="BUGZILLA"/>
		<reference ref_id="1024373" ref_url="https://bugzilla.suse.com/1024373" source="BUGZILLA"/>
		<reference ref_id="1025461" ref_url="https://bugzilla.suse.com/1025461" source="BUGZILLA"/>
		<reference ref_id="1026570" ref_url="https://bugzilla.suse.com/1026570" source="BUGZILLA"/>
		<reference ref_id="1028173" ref_url="https://bugzilla.suse.com/1028173" source="BUGZILLA"/>
		<reference ref_id="1028286" ref_url="https://bugzilla.suse.com/1028286" source="BUGZILLA"/>
		<reference ref_id="1029693" ref_url="https://bugzilla.suse.com/1029693" source="BUGZILLA"/>
		<reference ref_id="1030552" ref_url="https://bugzilla.suse.com/1030552" source="BUGZILLA"/>
		<reference ref_id="1031515" ref_url="https://bugzilla.suse.com/1031515" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1031784" ref_url="https://bugzilla.suse.com/1031784" source="BUGZILLA"/>
		<reference ref_id="1033587" ref_url="https://bugzilla.suse.com/1033587" source="BUGZILLA"/>
		<reference ref_id="1034075" ref_url="https://bugzilla.suse.com/1034075" source="BUGZILLA"/>
		<reference ref_id="1034113" ref_url="https://bugzilla.suse.com/1034113" source="BUGZILLA"/>
		<reference ref_id="1034762" ref_url="https://bugzilla.suse.com/1034762" source="BUGZILLA"/>
		<reference ref_id="1036215" ref_url="https://bugzilla.suse.com/1036215" source="BUGZILLA"/>
		<reference ref_id="1036632" ref_url="https://bugzilla.suse.com/1036632" source="BUGZILLA"/>
		<reference ref_id="1037344" ref_url="https://bugzilla.suse.com/1037344" source="BUGZILLA"/>
		<reference ref_id="1037404" ref_url="https://bugzilla.suse.com/1037404" source="BUGZILLA"/>
		<reference ref_id="1037838" ref_url="https://bugzilla.suse.com/1037838" source="BUGZILLA"/>
		<reference ref_id="1037994" ref_url="https://bugzilla.suse.com/1037994" source="BUGZILLA"/>
		<reference ref_id="1038078" ref_url="https://bugzilla.suse.com/1038078" source="BUGZILLA"/>
		<reference ref_id="1038616" ref_url="https://bugzilla.suse.com/1038616" source="BUGZILLA"/>
		<reference ref_id="1038792" ref_url="https://bugzilla.suse.com/1038792" source="BUGZILLA"/>
		<reference ref_id="1039153" ref_url="https://bugzilla.suse.com/1039153" source="BUGZILLA"/>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="1039915" ref_url="https://bugzilla.suse.com/1039915" source="BUGZILLA"/>
		<reference ref_id="1040307" ref_url="https://bugzilla.suse.com/1040307" source="BUGZILLA"/>
		<reference ref_id="1040347" ref_url="https://bugzilla.suse.com/1040347" source="BUGZILLA"/>
		<reference ref_id="1040351" ref_url="https://bugzilla.suse.com/1040351" source="BUGZILLA"/>
		<reference ref_id="1041958" ref_url="https://bugzilla.suse.com/1041958" source="BUGZILLA"/>
		<reference ref_id="1042257" ref_url="https://bugzilla.suse.com/1042257" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1042314" ref_url="https://bugzilla.suse.com/1042314" source="BUGZILLA"/>
		<reference ref_id="1042422" ref_url="https://bugzilla.suse.com/1042422" source="BUGZILLA"/>
		<reference ref_id="1042778" ref_url="https://bugzilla.suse.com/1042778" source="BUGZILLA"/>
		<reference ref_id="1043261" ref_url="https://bugzilla.suse.com/1043261" source="BUGZILLA"/>
		<reference ref_id="1043347" ref_url="https://bugzilla.suse.com/1043347" source="BUGZILLA"/>
		<reference ref_id="1043520" ref_url="https://bugzilla.suse.com/1043520" source="BUGZILLA"/>
		<reference ref_id="1043598" ref_url="https://bugzilla.suse.com/1043598" source="BUGZILLA"/>
		<reference ref_id="1043652" ref_url="https://bugzilla.suse.com/1043652" source="BUGZILLA"/>
		<reference ref_id="1043805" ref_url="https://bugzilla.suse.com/1043805" source="BUGZILLA"/>
		<reference ref_id="1043912" ref_url="https://bugzilla.suse.com/1043912" source="BUGZILLA"/>
		<reference ref_id="1044112" ref_url="https://bugzilla.suse.com/1044112" source="BUGZILLA"/>
		<reference ref_id="1044443" ref_url="https://bugzilla.suse.com/1044443" source="BUGZILLA"/>
		<reference ref_id="1044623" ref_url="https://bugzilla.suse.com/1044623" source="BUGZILLA"/>
		<reference ref_id="1044636" ref_url="https://bugzilla.suse.com/1044636" source="BUGZILLA"/>
		<reference ref_id="1045154" ref_url="https://bugzilla.suse.com/1045154" source="BUGZILLA"/>
		<reference ref_id="1045293" ref_url="https://bugzilla.suse.com/1045293" source="BUGZILLA"/>
		<reference ref_id="1045330" ref_url="https://bugzilla.suse.com/1045330" source="BUGZILLA"/>
		<reference ref_id="1045404" ref_url="https://bugzilla.suse.com/1045404" source="BUGZILLA"/>
		<reference ref_id="1045563" ref_url="https://bugzilla.suse.com/1045563" source="BUGZILLA"/>
		<reference ref_id="1045596" ref_url="https://bugzilla.suse.com/1045596" source="BUGZILLA"/>
		<reference ref_id="1045709" ref_url="https://bugzilla.suse.com/1045709" source="BUGZILLA"/>
		<reference ref_id="1045715" ref_url="https://bugzilla.suse.com/1045715" source="BUGZILLA"/>
		<reference ref_id="1045866" ref_url="https://bugzilla.suse.com/1045866" source="BUGZILLA"/>
		<reference ref_id="1045922" ref_url="https://bugzilla.suse.com/1045922" source="BUGZILLA"/>
		<reference ref_id="1045937" ref_url="https://bugzilla.suse.com/1045937" source="BUGZILLA"/>
		<reference ref_id="1046105" ref_url="https://bugzilla.suse.com/1046105" source="BUGZILLA"/>
		<reference ref_id="1046170" ref_url="https://bugzilla.suse.com/1046170" source="BUGZILLA"/>
		<reference ref_id="1046434" ref_url="https://bugzilla.suse.com/1046434" source="BUGZILLA"/>
		<reference ref_id="1046651" ref_url="https://bugzilla.suse.com/1046651" source="BUGZILLA"/>
		<reference ref_id="1046655" ref_url="https://bugzilla.suse.com/1046655" source="BUGZILLA"/>
		<reference ref_id="1046682" ref_url="https://bugzilla.suse.com/1046682" source="BUGZILLA"/>
		<reference ref_id="1046821" ref_url="https://bugzilla.suse.com/1046821" source="BUGZILLA"/>
		<reference ref_id="1046985" ref_url="https://bugzilla.suse.com/1046985" source="BUGZILLA"/>
		<reference ref_id="1047027" ref_url="https://bugzilla.suse.com/1047027" source="BUGZILLA"/>
		<reference ref_id="1047048" ref_url="https://bugzilla.suse.com/1047048" source="BUGZILLA"/>
		<reference ref_id="1047096" ref_url="https://bugzilla.suse.com/1047096" source="BUGZILLA"/>
		<reference ref_id="1047118" ref_url="https://bugzilla.suse.com/1047118" source="BUGZILLA"/>
		<reference ref_id="1047121" ref_url="https://bugzilla.suse.com/1047121" source="BUGZILLA"/>
		<reference ref_id="1047152" ref_url="https://bugzilla.suse.com/1047152" source="BUGZILLA"/>
		<reference ref_id="1047174" ref_url="https://bugzilla.suse.com/1047174" source="BUGZILLA"/>
		<reference ref_id="1047277" ref_url="https://bugzilla.suse.com/1047277" source="BUGZILLA"/>
		<reference ref_id="1047343" ref_url="https://bugzilla.suse.com/1047343" source="BUGZILLA"/>
		<reference ref_id="1047354" ref_url="https://bugzilla.suse.com/1047354" source="BUGZILLA"/>
		<reference ref_id="1047418" ref_url="https://bugzilla.suse.com/1047418" source="BUGZILLA"/>
		<reference ref_id="1047506" ref_url="https://bugzilla.suse.com/1047506" source="BUGZILLA"/>
		<reference ref_id="1047595" ref_url="https://bugzilla.suse.com/1047595" source="BUGZILLA"/>
		<reference ref_id="1047651" ref_url="https://bugzilla.suse.com/1047651" source="BUGZILLA"/>
		<reference ref_id="1047653" ref_url="https://bugzilla.suse.com/1047653" source="BUGZILLA"/>
		<reference ref_id="1047670" ref_url="https://bugzilla.suse.com/1047670" source="BUGZILLA"/>
		<reference ref_id="1047802" ref_url="https://bugzilla.suse.com/1047802" source="BUGZILLA"/>
		<reference ref_id="1048146" ref_url="https://bugzilla.suse.com/1048146" source="BUGZILLA"/>
		<reference ref_id="1048155" ref_url="https://bugzilla.suse.com/1048155" source="BUGZILLA"/>
		<reference ref_id="1048221" ref_url="https://bugzilla.suse.com/1048221" source="BUGZILLA"/>
		<reference ref_id="1048317" ref_url="https://bugzilla.suse.com/1048317" source="BUGZILLA"/>
		<reference ref_id="1048348" ref_url="https://bugzilla.suse.com/1048348" source="BUGZILLA"/>
		<reference ref_id="1048356" ref_url="https://bugzilla.suse.com/1048356" source="BUGZILLA"/>
		<reference ref_id="1048421" ref_url="https://bugzilla.suse.com/1048421" source="BUGZILLA"/>
		<reference ref_id="1048451" ref_url="https://bugzilla.suse.com/1048451" source="BUGZILLA"/>
		<reference ref_id="1048501" ref_url="https://bugzilla.suse.com/1048501" source="BUGZILLA"/>
		<reference ref_id="1048891" ref_url="https://bugzilla.suse.com/1048891" source="BUGZILLA"/>
		<reference ref_id="1048912" ref_url="https://bugzilla.suse.com/1048912" source="BUGZILLA"/>
		<reference ref_id="1048914" ref_url="https://bugzilla.suse.com/1048914" source="BUGZILLA"/>
		<reference ref_id="1048916" ref_url="https://bugzilla.suse.com/1048916" source="BUGZILLA"/>
		<reference ref_id="1048919" ref_url="https://bugzilla.suse.com/1048919" source="BUGZILLA"/>
		<reference ref_id="1049231" ref_url="https://bugzilla.suse.com/1049231" source="BUGZILLA"/>
		<reference ref_id="1049289" ref_url="https://bugzilla.suse.com/1049289" source="BUGZILLA"/>
		<reference ref_id="1049298" ref_url="https://bugzilla.suse.com/1049298" source="BUGZILLA"/>
		<reference ref_id="1049361" ref_url="https://bugzilla.suse.com/1049361" source="BUGZILLA"/>
		<reference ref_id="1049483" ref_url="https://bugzilla.suse.com/1049483" source="BUGZILLA"/>
		<reference ref_id="1049486" ref_url="https://bugzilla.suse.com/1049486" source="BUGZILLA"/>
		<reference ref_id="1049603" ref_url="https://bugzilla.suse.com/1049603" source="BUGZILLA"/>
		<reference ref_id="1049619" ref_url="https://bugzilla.suse.com/1049619" source="BUGZILLA"/>
		<reference ref_id="1049645" ref_url="https://bugzilla.suse.com/1049645" source="BUGZILLA"/>
		<reference ref_id="1049706" ref_url="https://bugzilla.suse.com/1049706" source="BUGZILLA"/>
		<reference ref_id="1049882" ref_url="https://bugzilla.suse.com/1049882" source="BUGZILLA"/>
		<reference ref_id="1050061" ref_url="https://bugzilla.suse.com/1050061" source="BUGZILLA"/>
		<reference ref_id="1050188" ref_url="https://bugzilla.suse.com/1050188" source="BUGZILLA"/>
		<reference ref_id="1050211" ref_url="https://bugzilla.suse.com/1050211" source="BUGZILLA"/>
		<reference ref_id="1050320" ref_url="https://bugzilla.suse.com/1050320" source="BUGZILLA"/>
		<reference ref_id="1050322" ref_url="https://bugzilla.suse.com/1050322" source="BUGZILLA"/>
		<reference ref_id="1050677" ref_url="https://bugzilla.suse.com/1050677" source="BUGZILLA"/>
		<reference ref_id="1051022" ref_url="https://bugzilla.suse.com/1051022" source="BUGZILLA"/>
		<reference ref_id="1051048" ref_url="https://bugzilla.suse.com/1051048" source="BUGZILLA"/>
		<reference ref_id="1051059" ref_url="https://bugzilla.suse.com/1051059" source="BUGZILLA"/>
		<reference ref_id="1051239" ref_url="https://bugzilla.suse.com/1051239" source="BUGZILLA"/>
		<reference ref_id="1051399" ref_url="https://bugzilla.suse.com/1051399" source="BUGZILLA"/>
		<reference ref_id="1051471" ref_url="https://bugzilla.suse.com/1051471" source="BUGZILLA"/>
		<reference ref_id="1051478" ref_url="https://bugzilla.suse.com/1051478" source="BUGZILLA"/>
		<reference ref_id="1051479" ref_url="https://bugzilla.suse.com/1051479" source="BUGZILLA"/>
		<reference ref_id="1051556" ref_url="https://bugzilla.suse.com/1051556" source="BUGZILLA"/>
		<reference ref_id="1051663" ref_url="https://bugzilla.suse.com/1051663" source="BUGZILLA"/>
		<reference ref_id="1051689" ref_url="https://bugzilla.suse.com/1051689" source="BUGZILLA"/>
		<reference ref_id="1051979" ref_url="https://bugzilla.suse.com/1051979" source="BUGZILLA"/>
		<reference ref_id="1052049" ref_url="https://bugzilla.suse.com/1052049" source="BUGZILLA"/>
		<reference ref_id="1052223" ref_url="https://bugzilla.suse.com/1052223" source="BUGZILLA"/>
		<reference ref_id="1052311" ref_url="https://bugzilla.suse.com/1052311" source="BUGZILLA"/>
		<reference ref_id="1052325" ref_url="https://bugzilla.suse.com/1052325" source="BUGZILLA"/>
		<reference ref_id="1052365" ref_url="https://bugzilla.suse.com/1052365" source="BUGZILLA"/>
		<reference ref_id="1052442" ref_url="https://bugzilla.suse.com/1052442" source="BUGZILLA"/>
		<reference ref_id="1052533" ref_url="https://bugzilla.suse.com/1052533" source="BUGZILLA"/>
		<reference ref_id="1052709" ref_url="https://bugzilla.suse.com/1052709" source="BUGZILLA"/>
		<reference ref_id="1052773" ref_url="https://bugzilla.suse.com/1052773" source="BUGZILLA"/>
		<reference ref_id="1052794" ref_url="https://bugzilla.suse.com/1052794" source="BUGZILLA"/>
		<reference ref_id="1052899" ref_url="https://bugzilla.suse.com/1052899" source="BUGZILLA"/>
		<reference ref_id="1052925" ref_url="https://bugzilla.suse.com/1052925" source="BUGZILLA"/>
		<reference ref_id="1053043" ref_url="https://bugzilla.suse.com/1053043" source="BUGZILLA"/>
		<reference ref_id="1053117" ref_url="https://bugzilla.suse.com/1053117" source="BUGZILLA"/>
		<reference ref_id="964063" ref_url="https://bugzilla.suse.com/964063" source="BUGZILLA"/>
		<reference ref_id="974215" ref_url="https://bugzilla.suse.com/974215" source="BUGZILLA"/>
		<reference ref_id="998664" ref_url="https://bugzilla.suse.com/998664" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000111" ref_url="https://www.suse.com/security/cve/CVE-2017-1000111/" source="CVE"/>
		<reference ref_id="CVE-2017-1000112" ref_url="https://www.suse.com/security/cve/CVE-2017-1000112/" source="CVE"/>
		<reference ref_id="CVE-2017-10810" ref_url="https://www.suse.com/security/cve/CVE-2017-10810/" source="CVE"/>
		<reference ref_id="CVE-2017-11473" ref_url="https://www.suse.com/security/cve/CVE-2017-11473/" source="CVE"/>
		<reference ref_id="CVE-2017-7533" ref_url="https://www.suse.com/security/cve/CVE-2017-7533/" source="CVE"/>
		<reference ref_id="CVE-2017-7541" ref_url="https://www.suse.com/security/cve/CVE-2017-7541/" source="CVE"/>
		<reference ref_id="CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542/" source="CVE"/>
		<reference ref_id="CVE-2017-8831" ref_url="https://www.suse.com/security/cve/CVE-2017-8831/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003165.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.82 to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2017-1000111: Fixed a race condition in net-packet code that could be exploited to cause out-of-bounds memory access (bsc#1052365).
- CVE-2017-1000112: Fixed a race condition in net-packet code that could have been exploited by unprivileged users to gain root access. (bsc#1052311).
- CVE-2017-8831: The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a 'double fetch' vulnerability (bnc#1037994).
- CVE-2017-7542: The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket (bnc#1049882).
- CVE-2017-11473: Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel allowed local users to gain privileges via a crafted ACPI table (bnc#1049603).
- CVE-2017-7533: Race condition in the fsnotify implementation in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions (bnc#1049483 bnc#1050677).
- CVE-2017-7541: The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet (bnc#1049645).
- CVE-2017-10810: Memory leak in the virtio_gpu_object_create function in drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering object-initialization failures (bnc#1047277).

The following non-security bugs were fixed:

- acpi/nfit: Add support of NVDIMM memory error notification in ACPI 6.2 (bsc#1052325).
- acpi/nfit: Issue Start ARS to retrieve existing records (bsc#1052325).
- acpi / processor: Avoid reserving IO regions too early (bsc#1051478).
- acpi / scan: Prefer devices without _HID for _ADR matching (git-fixes).
- Add 'shutdown' to 'struct class' (bsc#1053117).
- af_key: Add lock to key dump (bsc#1047653).
- af_key: Fix slab-out-of-bounds in pfkey_compile_policy (bsc#1047354).
- alsa: fm801: Initialize chip after IRQ handler is registered (bsc#1031717).
- alsa: hda - add more ML register definitions (bsc#1048356).
- alsa: hda - add sanity check to force the separate stream tags (bsc#1048356).
- alsa: hda: Add support for parsing new HDA capabilities (bsc#1048356).
- alsa: hdac: Add support for hda DMA Resume capability (bsc#1048356).
- alsa: hdac_regmap - fix the register access for runtime PM (bsc#1048356).
- alsa: hda: Fix cpu lockup when stopping the cmd dmas (bsc#1048356).
- alsa: hda - Fix endless loop of codec configure (bsc#1031717).
- alsa: hda: fix to wait for RIRB &amp; CORB DMA to set (bsc#1048356).
- alsa: hda - Loop interrupt handling until really cleared (bsc#1048356).
- alsa: hda - move bus_parse_capabilities to core (bsc#1048356).
- alsa: hda - set input_path bitmap to zero after moving it to new place (bsc#1031717).
- alsa: hda - set intel audio clock to a proper value (bsc#1048356).
- arm64: kernel: restrict /dev/mem read() calls to linear region (bsc#1046651).
- arm64: mm: remove page_mapping check in __sync_icache_dcache (bsc#1040347).
- arm64: Update config files. Disable DEVKMEM
- b43: Add missing MODULE_FIRMWARE() (bsc#1037344).
- bcache: force trigger gc (bsc#1038078).
- bcache: only recovery I/O error for writethrough mode (bsc#1043652).
- bcache: only recovery I/O error for writethrough mode (bsc#1043652).
- bdi: Fix use-after-free in wb_congested_put() (bsc#1040307).
- blacklist.conf: 9eeacd3a2f17 not a bug fix (bnc#1050061)
- blacklist.conf: add inapplicable commits for wifi (bsc#1031717)
- blacklist.conf: add non-applicable fixes for iwlwifi (FATE#323335)
- blacklist.conf: add unapplicable/cosmetic iwlwifi fixes (bsc#1031717).
- blacklist.conf: add unapplicable drm fixes (bsc#1031717).
- blacklist.conf: Blacklist aa2369f11ff7 ('mm/gup.c: fix access_ok() argument type') (bsc#1051478) Fixes only a compile-warning.
- blacklist.conf: Blacklist c133c7615751 ('x86/nmi: Fix timeout test in test_nmi_ipi()') It only fixes a self-test (bsc#1051478).
- blacklist.conf: Blacklist c9525a3fab63 ('x86/watchdog: Fix Kconfig help text file path reference to lockup watchdog documentation') Updates only kconfig help-text (bsc#1051478).
- blkfront: add uevent for size change (bnc#1036632).
- blk-mq: map all HWQ also in hyperthreaded system (bsc#1045866).
- block: add kblock_mod_delayed_work_on() (bsc#1050211).
- block: Allow bdi re-registration (bsc#1040307).
- block: do not allow updates through sysfs until registration completes (bsc#1047027).
- block: Fix front merge check (bsc#1051239).
- block: Make blk_mq_delay_kick_requeue_list() rerun the queue at a quiet time (bsc#1050211).
- block: Make del_gendisk() safer for disks without queues (bsc#1040307).
- block: Move bdi_unregister() to del_gendisk() (bsc#1040307).
- block: provide bio_uninit() free freeing integrity/task associations (bsc#1050211).
- bluetooth: hidp: fix possible might sleep error in hidp_session_thread (bsc#1031784).
- brcmfmac: Fix glom_skb leak in brcmf_sdiod_recv_chain (bsc#1031717).
- btrfs: add cond_resched to btrfs_qgroup_trace_leaf_items (bsc#1028286).
- btrfs: Add WARN_ON for qgroup reserved underflow (bsc#1031515).
- btrfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- btrfs: fix lockup in find_free_extent with read-only block groups (bsc#1046682).
- btrfs: incremental send, fix invalid path for link commands (bsc#1051479).
- btrfs: incremental send, fix invalid path for unlink commands (bsc#1051479).
- btrfs: Manually implement device_total_bytes getter/setter (bsc#1043912).
- btrfs: resume qgroup rescan on rw remount (bsc#1047152).
- btrfs: Round down values which are written for total_bytes_size (bsc#1043912).
- btrfs: send, fix invalid path after renaming and linking file (bsc#1051479).
- cifs: Fix some return values in case of error in 'crypt_message' (bnc#1047802).
- clocksource/drivers/arm_arch_timer: Fix read and iounmap of incorrect variable (bsc#1045937).
- cpuidle: dt: Add missing 'of_node_put()' (bnc#1022476).
- crypto: s5p-sss - fix incorrect usage of scatterlists api (bsc#1048317).
- cx82310_eth: use skb_cow_head() to deal with cloned skbs (bsc# 1045154).
- cxgb4: fix a NULL dereference (bsc#1005778).
- cxgb4: fix BUG() on interrupt deallocating path of ULD (bsc#1005778).
- cxgb4: fix memory leak in init_one() (bsc#1005778).
- cxl: Unlock on error in probe (bsc#1034762, Pending SUSE Kernel Fixes).
- dentry name snapshots (bsc#1049483).
- device-dax: fix sysfs attribute deadlock (bsc#1048919).
- dm: fix second blk_delay_queue() parameter to be in msec units not (bsc#1047670).
- dm: make flush bios explicitly sync (bsc#1050211).
- dm raid1: fixes two crash cases if mirror leg failed (bsc#1043520)
- drivers/char: kmem: disable on arm64 (bsc#1046655).
- drivers: hv: As a bandaid, increase HV_UTIL_TIMEOUT from 30 to 60 seconds (bnc#1039153)
- drivers: hv: Fix a typo (fate#320485).
- drivers: hv: Fix the bug in generating the guest ID (fate#320485).
- drivers: hv: util: Fix a typo (fate#320485).
- drivers: hv: util: Make hv_poll_channel() a little more efficient (fate#320485).
- drivers: hv: vmbus: Close timing hole that can corrupt per-cpu page (fate#320485).
- drivers: hv: vmbus: Fix error code returned by vmbus_post_msg() (fate#320485).
- drivers: hv: vmbus: Get the current time from the current clocksource (fate#320485, bnc#1044112).
- drivers: hv: vmbus: Get the current time from the current clocksource (fate#320485, bnc#1044112, bnc#1042778, bnc#1029693).
- drivers: hv: vmbus: Increase the time between retries in vmbus_post_msg() (fate#320485, bnc#1044112).
- drivers: hv: vmbus: Increase the time between retries in vmbus_post_msg() (fate#320485, bnc#1044112).
- drivers: hv: vmbus: Move the code to signal end of message (fate#320485).
- drivers: hv: vmbus: Move the definition of generate_guest_id() (fate#320485).
- drivers: hv: vmbus: Move the definition of hv_x64_msr_hypercall_contents (fate#320485).
- drivers: hv: vmbus: Restructure the clockevents code (fate#320485).
- drm/amdgpu: Fix overflow of watermark calcs at &gt; 4k resolutions (bsc#1031717).
- drm/bochs: Implement nomodeset (bsc#1047096).
- drm/i915/fbdev: Stop repeating tile configuration on stagnation (bsc#1031717).
- drm/i915: Fix scaler init during CRTC HW state readout (bsc#1031717).
- drm/i915: Serialize GTT/Aperture accesses on BXT (bsc#1046821).
- drm/virtio: do not leak bo on drm_gem_object_init failure (bsc#1047277).
- drm/vmwgfx: Fix large topology crash (bsc#1048155).
- drm/vmwgfx: Support topology greater than texture size (bsc#1048155).
- Drop patches; obsoleted by 'scsi: Add STARGET_CREATE_REMOVE state'
- efi/libstub: Skip GOP with PIXEL_BLT_ONLY format (bnc#974215).
- ext2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: avoid unnecessary stalls in ext4_evict_inode() (bsc#1049486).
- ext4: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: handle the rest of ext4_mb_load_buddy() ENOMEM errors (bsc#1012829).
- Fix kABI breakage by HD-audio bus caps extensions (bsc#1048356).
- Fix kABI breakage by KVM CVE fix (bsc#1045922).
- fs/fcntl: f_setown, avoid undefined behaviour (bnc#1006180).
- fs: pass on flags in compat_writev (bsc#1050211).
- fuse: initialize the flock flag in fuse_file on allocation (git-fixes).
- gcov: add support for gcc version &gt;= 6 (bsc#1051663).
- gcov: support GCC 7.1 (bsc#1051663).
- gfs2: fix flock panic issue (bsc#1012829).
- hpsa: limit transfer length to 1MB (bsc#1025461).
- hrtimer: Catch invalid clockids again (bsc#1047651).
- hrtimer: Revert CLOCK_MONOTONIC_RAW support (bsc#1047651).
- hv_netvsc: change netvsc device default duplex to FULL (fate#320485).
- hv_netvsc: Exclude non-TCP port numbers from vRSS hashing (bsc#1048421).
- hv_netvsc: Fix the carrier state error when data path is off (fate#320485).
- hv_netvsc: Fix the queue index computation in forwarding case (bsc#1048421).
- hv_netvsc: Remove unnecessary var link_state from struct netvsc_device_info (fate#320485).
- hv: print extra debug in kvp_on_msg in error paths (bnc#1039153).
- hv_utils: drop .getcrosststamp() support from PTP driver (fate#320485, bnc#1044112).
- hv_utils: drop .getcrosststamp() support from PTP driver (fate#320485, bnc#1044112, bnc#1042778, bnc#1029693).
- hv_utils: fix TimeSync work on pre-TimeSync-v4 hosts (fate#320485, bnc#1044112).
- hv_utils: fix TimeSync work on pre-TimeSync-v4 hosts (fate#320485, bnc#1044112, bnc#1042778, bnc#1029693).
- hv_util: switch to using timespec64 (fate#320485).
- hwpoison, memcg: forcibly uncharge LRU pages (bnc#1046105).
- hyperv: fix warning about missing prototype (fate#320485).
- hyperv: netvsc: Neaten netvsc_send_pkt by using a temporary (fate#320485).
- hyperv: remove unnecessary return variable (fate#320485).
- i2c: designware-baytrail: fix potential null pointer dereference on dev (bsc#1011913).
- i40e: add hw struct local variable (bsc#1039915).
- i40e: add private flag to control source pruning (bsc#1034075).
- i40e: add VSI info to macaddr messages (bsc#1039915).
- i40e: avoid looping to check whether we're in VLAN mode (bsc#1039915).
- i40e: avoid O(n^2) loop when deleting all filters (bsc#1039915).
- i40e: delete filter after adding its replacement when converting (bsc#1039915).
- i40e: do not add broadcast filter for VFs (bsc#1039915).
- i40e: do not allow i40e_vsi_(add|kill)_vlan to operate when VID&lt;1 (bsc#1039915).
- i40e: drop is_vf and is_netdev fields in struct i40e_mac_filter (bsc#1039915).
- i40e: enable VSI broadcast promiscuous mode instead of adding broadcast filter (bsc#1039915).
- i40e: factor out addition/deletion of VLAN per each MAC address (bsc#1039915).
- i40e: fix ethtool to get EEPROM data from X722 interface (bsc#1047418).
- i40e: fix MAC filters when removing VLANs (bsc#1039915).
- i40e: fold the i40e_is_vsi_in_vlan check into i40e_put_mac_in_vlan (bsc#1039915).
- i40e/i40evf: Fix use after free in Rx cleanup path (bsc#1051689).
- i40e: implement __i40e_del_filter and use where applicable (bsc#1039915).
- i40e: make use of __dev_uc_sync and __dev_mc_sync (bsc#1039915).
- i40e: move all updates for VLAN mode into i40e_sync_vsi_filters (bsc#1039915).
- i40e: move i40e_put_mac_in_vlan and i40e_del_mac_all_vlan (bsc#1039915).
- i40e: no need to check is_vsi_in_vlan before calling i40e_del_mac_all_vlan (bsc#1039915).
- i40e: properly cleanup on allocation failure in i40e_sync_vsi_filters (bsc#1039915).
- i40e: recalculate vsi-&gt;active_filters from hash contents (bsc#1039915).
- i40e: refactor i40e_put_mac_in_vlan to avoid changing f-&gt;vlan (bsc#1039915).
- i40e: refactor i40e_update_filter_state to avoid passing aq_err (bsc#1039915).
- i40e: refactor Rx filter handling (bsc#1039915).
- i40e: Removal of workaround for simple MAC address filter deletion (bsc#1039915).
- i40e: remove code to handle dev_addr specially (bsc#1039915).
- i40e: removed unreachable code (bsc#1039915).
- i40e: remove duplicate add/delete adminq command code for filters (bsc#1039915).
- i40e: remove second check of VLAN_N_VID in i40e_vlan_rx_add_vid (bsc#1039915).
- i40e: rename i40e_put_mac_in_vlan and i40e_del_mac_all_vlan (bsc#1039915).
- i40e: restore workaround for removing default MAC filter (bsc#1039915).
- i40e: set broadcast promiscuous mode for each active VLAN (bsc#1039915).
- i40e: store MAC/VLAN filters in a hash with the MAC Address as key (bsc#1039915).
- i40e: use (add|rm)_vlan_all_mac helper functions when changing PVID (bsc#1039915).
- i40evf: fix merge error in older patch (bsc#1024346 FATE#321239 bsc#1024373 FATE#321247).
- i40e: when adding or removing MAC filters, correctly handle VLANs (bsc#1039915).
- i40e: When searching all MAC/VLAN filters, ignore removed filters (bsc#1039915).
- i40e: write HENA for VFs (bsc#1039915).
- IB/hfi1: Wait for QSFP modules to initialize (bsc#1019151).
- IB/iser: Fix connection teardown race condition (bsc#1050211).
- ibmvnic: Check for transport event on driver resume (bsc#1051556, bsc#1052709).
- ibmvnic: Initialize SCRQ's during login renegotiation (bsc#1052223).
- ibmvnic: Report rx buffer return codes as netdev_dbg (bsc#1052794).
- IB/rxe: Fix kernel panic from skb destructor (bsc#1049361).
- iio: hid-sensor: fix return of -EINVAL on invalid values in ret or value (bsc#1031717).
- include/linux/mmzone.h: simplify zone_intersects() (bnc#1047506).
- input: gpio-keys - fix check for disabling unsupported keys (bsc#1031717).
- introduce the walk_process_tree() helper (bnc#1022476).
- iommu/amd: Add flush counters to struct dma_ops_domain (bsc#1045709).
- iommu/amd: Add locking to per-domain flush-queue (bsc#1045709).
- iommu/amd: Add new init-state IOMMU_CMDLINE_DISABLED (bsc#1045715).
- iommu/amd: Add per-domain flush-queue data structures (bsc#1045709).
- iommu/amd: Add per-domain timer to flush per-cpu queues (bsc#1045709).
- iommu/amd: Check for error states first in iommu_go_to_state() (bsc#1045715).
- iommu/amd: Constify irq_domain_ops (bsc#1045709).
- iommu/amd: Disable IOMMUs at boot if they are enabled (bsc#1045715).
- iommu/amd: Enable ga_log_intr when enabling guest_mode (bsc1052533).
- iommu/amd: Fix interrupt remapping when disable guest_mode (bsc#1051471).
- iommu/amd: Fix schedule-while-atomic BUG in initialization code (bsc1052533).
- iommu/amd: Free already flushed ring-buffer entries before full-check (bsc#1045709).
- iommu/amd: Free IOMMU resources when disabled on command line (bsc#1045715).
- iommu/amd: Make use of the per-domain flush queue (bsc#1045709).
- iommu/amd: Ratelimit io-page-faults per device (bsc#1045709).
- iommu/amd: Reduce amount of MMIO when submitting commands (bsc#1045709).
- iommu/amd: Reduce delay waiting for command buffer space (bsc#1045709).
- iommu/amd: Remove amd_iommu_disabled check from amd_iommu_detect() (bsc#1045715).
- iommu/amd: Remove queue_release() function (bsc#1045709).
- iommu/amd: Rename free_on_init_error() (bsc#1045715).
- iommu/amd: Rip out old queue flushing code (bsc#1045709).
- iommu/amd: Set global pointers to NULL after freeing them (bsc#1045715).
- iommu/amd: Suppress IO_PAGE_FAULTs in kdump kernel (bsc#1045715 bsc#1043261).
- iommu: Remove a patch because it caused problems for users. See bsc#1048348.
- ipv4: Should use consistent conditional judgement for ip fragment in __ip_append_data and ip_finish_output (bsc#1041958).
- ipv6: Should use consistent conditional judgement for ip6 fragment between __ip6_append_data and ip6_finish_output (bsc#1041958).
- iw_cxgb4: Fix error return code in c4iw_rdev_open() (bsc#1026570).
- iwlwifi: 8000: fix MODULE_FIRMWARE input (FATE#321353, FATE#323335).
- iwlwifi: 9000: increase the number of queues (FATE#321353, FATE#323335).
- iwlwifi: add device ID for 8265 (FATE#321353, FATE#323335).
- iwlwifi: add device IDs for the 8265 device (FATE#321353, FATE#323335).
- iwlwifi: add disable_11ac module param (FATE#321353, FATE#323335).
- iwlwifi: add new 3168 series devices support (FATE#321353, FATE#323335).
- iwlwifi: add new 8260 PCI IDs (FATE#321353, FATE#323335).
- iwlwifi: add new 8265 (FATE#321353, FATE#323335).
- iwlwifi: add new 8265 series PCI ID (FATE#321353, FATE#323335).
- iwlwifi: Add new PCI IDs for 9260 and 5165 series (FATE#321353, FATE#323335).
- iwlwifi: Add PCI IDs for the new 3168 series (FATE#321353, FATE#323335).
- iwlwifi: Add PCI IDs for the new series 8165 (FATE#321353, FATE#323335).
- iwlwifi: add support for 12K Receive Buffers (FATE#321353, FATE#323335).
- iwlwifi: add support for getting HW address from CSR (FATE#321353, FATE#323335).
- iwlwifi: avoid d0i3 commands when no/init ucode is loaded (FATE#321353, FATE#323335).
- iwlwifi: bail out in case of bad trans state (FATE#321353, FATE#323335).
- iwlwifi: block the queues when we send ADD_STA for uAPSD (FATE#321353, FATE#323335).
- iwlwifi: change the Intel Wireless email address (FATE#321353, FATE#323335).
- iwlwifi: change the Intel Wireless email address (FATE#321353, FATE#323335).
- iwlwifi: check for valid ethernet address provided by OEM (FATE#321353, FATE#323335).
- iwlwifi: clean up transport debugfs handling (FATE#321353, FATE#323335).
- iwlwifi: clear ieee80211_tx_info-&gt;driver_data in the op_mode (FATE#321353, FATE#323335).
- iwlwifi: Document missing module options (FATE#321353, FATE#323335).
- iwlwifi: dump prph registers in a common place for all transports (FATE#321353, FATE#323335).
- iwlwifi: dvm: advertise NETIF_F_SG (FATE#321353, FATE#323335).
- iwlwifi: dvm: fix compare_const_fl.cocci warnings (FATE#321353, FATE#323335).
- iwlwifi: dvm: handle zero brightness for wifi LED (FATE#321353, FATE#323335).
- iwlwifi: dvm: remove a wrong dependency on m (FATE#321353, FATE#323335).
- iwlwifi: dvm: remove Kconfig default (FATE#321353, FATE#323335).
- iwlwifi: dvm: remove stray debug code (FATE#321353, FATE#323335).
- iwlwifi: export the _no_grab version of PRPH IO functions (FATE#321353, FATE#323335).
- iwlwifi: expose fw usniffer mode to more utilities (FATE#321353, FATE#323335).
- iwlwifi: fix double hyphen in MODULE_FIRMWARE for 8000 (FATE#321353, FATE#323335).
- iwlwifi: Fix firmware name maximum length definition (FATE#321353, FATE#323335).
- iwlwifi: fix name of ucode loaded for 8265 series (FATE#321353, FATE#323335).
- iwlwifi: fix printf specifier (FATE#321353, FATE#323335).
- iwlwifi: generalize d0i3_entry_timeout module parameter (FATE#321353, FATE#323335).
- iwlwifi: missing error code in iwl_trans_pcie_alloc() (bsc#1031717).
- iwlwifi: mvm: adapt the firmware assert log to new firmware (FATE#321353, FATE#323335).
- iwlwifi: mvm: add 9000-series RX API (FATE#321353, FATE#323335).
- iwlwifi: mvm: add 9000 series RX processing (FATE#321353, FATE#323335).
- iwlwifi: mvm: add a non-trigger window to fw dbg triggers (FATE#321353, FATE#323335).
- iwlwifi: mvm: add an option to start rs from HT/VHT rates (FATE#321353, FATE#323335).
- iwlwifi: mvm: Add a station in monitor mode (FATE#321353, FATE#323335).
- iwlwifi: mvm: add bt rrc and ttc to debugfs (FATE#321353, FATE#323335).
- iwlwifi: mvm: add bt settings to debugfs (FATE#321353, FATE#323335).
- iwlwifi: mvm: add ctdp operations to debugfs (FATE#321353, FATE#323335).
- iwlwifi: mvm: add CT-KILL notification (FATE#321353, FATE#323335).
- iwlwifi: mvm: add debug print if scan config is ignored (FATE#321353, FATE#323335).
- iwlwifi: mvm: add extended dwell time (FATE#321353, FATE#323335).
- iwlwifi: mvm: add new ADD_STA command version (FATE#321353, FATE#323335).
- iwlwifi: mvm: Add P2P client snoozing (FATE#321353, FATE#323335).
- iwlwifi: mvm: add registration to cooling device (FATE#321353, FATE#323335).
- iwlwifi: mvm: add registration to thermal zone (FATE#321353, FATE#323335).
- iwlwifi: mvm: add support for negative temperatures (FATE#321353, FATE#323335).
- iwlwifi: mvm: add tlv for multi queue rx support (FATE#321353, FATE#323335).
- iwlwifi: mvm: add trigger for firmware dump upon TDLS events (FATE#321353, FATE#323335).
- iwlwifi: mvm: add trigger for firmware dump upon TX response status (FATE#321353, FATE#323335).
- iwlwifi: mvm: advertise NETIF_F_SG (FATE#321353, FATE#323335).
- iwlwifi: mvm: Align bt-coex priority with requirements (FATE#321353, FATE#323335).
- iwlwifi: mvm: allow to disable beacon filtering for AP/GO interface (FATE#321353, FATE#323335).
- iwlwifi: mvm: avoid harmless -Wmaybe-uninialized warning (FATE#321353, FATE#323335).
- iwlwifi: mvm: avoid panics with thermal device usage (FATE#321353, FATE#323335).
- iwlwifi: mvm: avoid to WARN about gscan capabilities (FATE#321353, FATE#323335).
- iwlwifi: mvm: bail out if CTDP start operation fails (FATE#321353, FATE#323335).
- iwlwifi: mvm: bump firmware API to 21 (FATE#321353, FATE#323335).
- iwlwifi: mvm: bump max API to 20 (FATE#321353, FATE#323335).
- iwlwifi: mvm: change access to ieee80211_hdr (FATE#321353, FATE#323335).
- iwlwifi: mvm: change iwl_mvm_get_key_sta_id() to return the station (FATE#321353, FATE#323335).
- iwlwifi: mvm: change mcc update API (FATE#321353, FATE#323335).
- iwlwifi: mvm: change name of iwl_mvm_d3_update_gtk (FATE#321353, FATE#323335).
- iwlwifi: mvm: Change number of associated stations when station becomes associated (FATE#321353, FATE#323335).
- iwlwifi: mvm: change protocol offload flows (FATE#321353, FATE#323335).
- iwlwifi: mvm: change the check for ADD_STA status (FATE#321353, FATE#323335).
- iwlwifi: mvm: check FW's response for nvm access write cmd (FATE#321353, FATE#323335).
- iwlwifi: mvm: check iwl_mvm_wowlan_config_key_params() return value (FATE#321353, FATE#323335).
- iwlwifi: mvm: check minimum temperature notification length (FATE#321353, FATE#323335).
- iwlwifi: mvm: cleanup roc te on restart cleanup (FATE#321353, FATE#323335).
- iwlwifi: mvm: compare full command ID (FATE#321353, FATE#323335).
- iwlwifi: mvm: Configure fragmented scan for scheduled scan (FATE#321353, FATE#323335).
- iwlwifi: mvm: configure scheduled scan according to traffic conditions (FATE#321353, FATE#323335).
- iwlwifi: mvm: constify the parameters of a few functions in fw-dbg.c (FATE#321353, FATE#323335).
- iwlwifi: mvm: Disable beacon storing in D3 when WOWLAN configured (FATE#321353, FATE#323335).
- iwlwifi: mvm: disable DQA support (FATE#321353, FATE#323335).
- iwlwifi: mvm: do not ask beacons when P2P GO vif and no assoc sta (FATE#321353, FATE#323335).
- iwlwifi: mvm: do not keep an mvm ref when the interface is down (FATE#321353, FATE#323335).
- iwlwifi: mvm: do not let NDPs mess the packet tracking (FATE#321353, FATE#323335).
- iwlwifi: mvm: do not restart HW if suspend fails with unified image (FATE#321353, FATE#323335).
- iwlwifi: mvm: Do not switch to D3 image on suspend (FATE#321353, FATE#323335).
- iwlwifi: mvm: do not try to offload AES-CMAC in AP/IBSS modes (FATE#321353, FATE#323335).
- iwlwifi: mvm: drop low_latency_agg_frame_cnt_limit (FATE#321353, FATE#323335).
- iwlwifi: mvm: dump more registers upon error (FATE#321353, FATE#323335).
- iwlwifi: mvm: dump the radio registers when the firmware crashes (FATE#321353, FATE#323335).
- iwlwifi: mvm: enable L3 filtering (FATE#321353, FATE#323335).
- iwlwifi: mvm: Enable MPLUT only on supported hw (FATE#321353, FATE#323335).
- iwlwifi: mvm: enable VHT MU-MIMO for supported hardware (FATE#321353, FATE#323335).
- iwlwifi: mvm: extend time event duration (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix accessing Null pointer during fw dump collection (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix d3_test with unified D0/D3 images (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix debugfs signedness warning (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix extended dwell time (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix incorrect fallthrough in iwl_mvm_check_running_scans() (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix memory leaks in error paths upon fw error dump (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix netdetect starting/stopping for unified images (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix RSS key sizing (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix unregistration of thermal in some error flows (FATE#321353, FATE#323335).
- iwlwifi: mvm: flush all used TX queues before suspending (FATE#321353, FATE#323335).
- iwlwifi: mvm: forbid U-APSD for P2P Client if the firmware does not support it (FATE#321353, FATE#323335).
- iwlwifi: mvm: handle pass all scan reporting (FATE#321353, FATE#323335).
- iwlwifi: mvm: ignore LMAC scan notifications when running UMAC scans (FATE#321353, FATE#323335).
- iwlwifi: mvm: infrastructure for frame-release message (FATE#321353, FATE#323335).
- iwlwifi: mvm: kill iwl_mvm_enable_agg_txq (FATE#321353, FATE#323335).
- iwlwifi: mvm: let the firmware choose the antenna for beacons (FATE#321353, FATE#323335).
- iwlwifi: mvm: make collecting fw debug data optional (FATE#321353, FATE#323335).
- iwlwifi: mvm: move fw-dbg code to separate file (FATE#321353, FATE#323335).
- iwlwifi: mvm: only release the trans ref if d0i3 is supported in fw (FATE#321353, FATE#323335).
- iwlwifi: mvm: prepare the code towards TSO implementation (FATE#321353, FATE#323335).
- iwlwifi: mvm: refactor d3 key update functions (FATE#321353, FATE#323335).
- iwlwifi: mvm: refactor the way fw_key_table is handled (FATE#321353, FATE#323335).
- iwlwifi: mvm: remove an extra tab (FATE#321353, FATE#323335).
- iwlwifi: mvm: Remove bf_vif from iwl_power_vifs (FATE#321353, FATE#323335).
- iwlwifi: mvm: Remove iwl_mvm_update_beacon_abort (FATE#321353, FATE#323335).
- iwlwifi: mvm: remove redundant d0i3 flag from the config struct (FATE#321353, FATE#323335).
- iwlwifi: mvm: remove shadowing variable (FATE#321353, FATE#323335).
- iwlwifi: mvm: remove stray nd_config element (FATE#321353, FATE#323335).
- iwlwifi: mvm: remove the vif parameter of iwl_mvm_configure_bcast_filter() (FATE#321353, FATE#323335).
- iwlwifi: mvm: remove unnecessary check in iwl_mvm_is_d0i3_supported() (FATE#321353, FATE#323335).
- iwlwifi: mvm: remove useless WARN_ON and rely on cfg80211's combination (FATE#321353, FATE#323335).
- iwlwifi: mvm: report wakeup for wowlan (FATE#321353, FATE#323335).
- iwlwifi: mvm: reset mvm-&gt;scan_type when firmware is started (FATE#321353, FATE#323335).
- iwlwifi: mvm: reset the fw_dump_desc pointer after ASSERT (bsc#1031717).
- iwlwifi: mvm: return the cooling state index instead of the budget (FATE#321353, FATE#323335).
- iwlwifi: mvm: ROC: cleanup time event info on FW failure (FATE#321353, FATE#323335).
- iwlwifi: mvm: ROC: Extend the ROC max delay duration &amp; limit ROC duration (FATE#321353, FATE#323335).
- iwlwifi: mvm: rs: fix a potential out of bounds access (FATE#321353, FATE#323335).
- iwlwifi: mvm: rs: fix a theoretical access to uninitialized array elements (FATE#321353, FATE#323335).
- iwlwifi: mvm: rs: fix a warning message (FATE#321353, FATE#323335).
- iwlwifi: mvm: rs: fix TPC action decision algorithm (FATE#321353, FATE#323335).
- iwlwifi: mvm: rs: fix TPC statistics handling (FATE#321353, FATE#323335).
- iwlwifi: mvm: Send power command on BSS_CHANGED_BEACON_INFO if needed (FATE#321353, FATE#323335).
- iwlwifi: mvm: set default new STA as non-aggregated (FATE#321353, FATE#323335).
- iwlwifi: mvm: set the correct amsdu enum values (FATE#321353, FATE#323335).
- iwlwifi: mvm: set the correct descriptor size for tracing (FATE#321353, FATE#323335).
- iwlwifi: mvm: small update in the firmware API (FATE#321353, FATE#323335).
- iwlwifi: mvm: support A-MSDU in A-MPDU (FATE#321353, FATE#323335).
- iwlwifi: mvm: support beacon storing (FATE#321353, FATE#323335).
- iwlwifi: mvm: support description for user triggered fw dbg collection (FATE#321353, FATE#323335).
- iwlwifi: mvm: support rss queues configuration command (FATE#321353, FATE#323335).
- iwlwifi: mvm: Support setting continuous recording debug mode (FATE#321353, FATE#323335).
- iwlwifi: mvm: support setting minimum quota from debugfs (FATE#321353, FATE#323335).
- iwlwifi: mvm: support sw queue start/stop from mvm (FATE#321353, FATE#323335).
- iwlwifi: mvm: synchronize firmware DMA paging memory (FATE#321353, FATE#323335).
- iwlwifi: mvm: take care of padded packets (FATE#321353, FATE#323335).
- iwlwifi: mvm: take the transport ref back when leaving (FATE#321353, FATE#323335).
- iwlwifi: mvm: track low-latency sources separately (FATE#321353, FATE#323335).
- iwlwifi: mvm: unconditionally stop device after init (bsc#1031717).
- iwlwifi: mvm: unmap the paging memory before freeing it (FATE#321353, FATE#323335).
- iwlwifi: mvm: update GSCAN capabilities (FATE#321353, FATE#323335).
- iwlwifi: mvm: update ucode status before stopping device (FATE#321353, FATE#323335).
- iwlwifi: mvm: use build-time assertion for fw trigger ID (FATE#321353, FATE#323335).
- iwlwifi: mvm: use firmware station lookup, combine code (FATE#321353, FATE#323335).
- iwlwifi: mvm: various trivial cleanups (FATE#321353, FATE#323335).
- iwlwifi: mvm: writing zero bytes to debugfs causes a crash (FATE#321353, FATE#323335).
- iwlwifi: nvm: fix loading default NVM file (FATE#321353, FATE#323335).
- iwlwifi: nvm: fix up phy section when reading it (FATE#321353, FATE#323335).
- iwlwifi: pcie: add 9000 series multi queue rx DMA support (FATE#321353, FATE#323335).
- iwlwifi: pcie: add infrastructure for multi-queue rx (FATE#321353, FATE#323335).
- iwlwifi: pcie: add initial RTPM support for PCI (FATE#321353, FATE#323335).
- iwlwifi: pcie: Add new configuration to enable MSIX (FATE#321353, FATE#323335).
- iwlwifi: pcie: add pm_prepare and pm_complete ops (FATE#321353, FATE#323335).
- iwlwifi: pcie: add RTPM support when wifi is enabled (FATE#321353, FATE#323335).
- iwlwifi: pcie: aggregate Flow Handler configuration writes (FATE#321353, FATE#323335).
- iwlwifi: pcie: allow the op_mode to block the tx queues (FATE#321353, FATE#323335).
- iwlwifi: pcie: allow to pretend to have Tx CSUM for debug (FATE#321353, FATE#323335).
- iwlwifi: pcie: avoid restocks inside rx loop if not emergency (FATE#321353, FATE#323335).
- iwlwifi: pcie: buffer packets to avoid overflowing Tx queues (FATE#321353, FATE#323335).
- iwlwifi: pcie: build an A-MSDU using TSO core (FATE#321353, FATE#323335).
- iwlwifi: pcie: configure more RFH settings (FATE#321353, FATE#323335).
- iwlwifi: pcie: detect and workaround invalid write ptr behavior (FATE#321353, FATE#323335).
- iwlwifi: pcie: do not increment / decrement a bool (FATE#321353, FATE#323335).
- iwlwifi: pcie: enable interrupts before releasing the NIC's CPU (FATE#321353, FATE#323335).
- iwlwifi: pcie: enable multi-queue rx path (FATE#321353, FATE#323335).
- iwlwifi: pcie: extend device reset delay (FATE#321353, FATE#323335).
- iwlwifi: pcie: fine tune number of rxbs (FATE#321353, FATE#323335).
- iwlwifi: pcie: fix a race in firmware loading flow (FATE#321353, FATE#323335).
- iwlwifi: pcie: fix command completion name debug (bsc#1031717).
- iwlwifi: pcie: fix erroneous return value (FATE#321353, FATE#323335).
- iwlwifi: pcie: fix global table size (FATE#321353, FATE#323335).
- iwlwifi: pcie: fix identation in trans.c (FATE#321353, FATE#323335).
- iwlwifi: pcie: fix RF-Kill vs. firmware load race (FATE#321353, FATE#323335).
- iwlwifi: pcie: forbid RTPM on device removal (FATE#321353, FATE#323335).
- iwlwifi: pcie: mark command queue lock with separate lockdep class (FATE#321353, FATE#323335).
- iwlwifi: pcie: prevent skbs shadowing in iwl_trans_pcie_reclaim (FATE#321353, FATE#323335).
- iwlwifi: pcie: refactor RXBs reclaiming code (FATE#321353, FATE#323335).
- iwlwifi: pcie: remove ICT allocation message (FATE#321353, FATE#323335).
- iwlwifi: pcie: remove pointer from debug message (FATE#321353, FATE#323335).
- iwlwifi: pcie: re-organize code towards TSO (FATE#321353, FATE#323335).
- iwlwifi: pcie: set RB chunk size back to 64 (FATE#321353, FATE#323335).
- iwlwifi: pcie: update iwl_mpdu_desc fields (FATE#321353, FATE#323335).
- iwlwifi: print index in api/capa flags parsing message (FATE#321353, FATE#323335).
- iwlwifi: refactor the code that reads the MAC address from the NVM (FATE#321353, FATE#323335).
- iwlwifi: remove IWL_DL_LED (FATE#321353, FATE#323335).
- iwlwifi: remove unused parameter from grab_nic_access (FATE#321353, FATE#323335).
- iwlwifi: replace d0i3_mode and wowlan_d0i3 with more generic variables (FATE#321353, FATE#323335).
- iwlwifi: set max firmware version of 7265 to 17 (FATE#321353, FATE#323335).
- iwlwifi: support ucode with d0 unified image - regular and usniffer (FATE#321353, FATE#323335).
- iwlwifi: trans: make various conversion macros inlines (FATE#321353, FATE#323335).
- iwlwifi: trans: support a callback for ASYNC commands (FATE#321353, FATE#323335).
- iwlwifi: treat iwl_parse_nvm_data() MAC addr as little endian (FATE#321353, FATE#323335).
- iwlwifi: tt: move ucode_loaded check under mutex (FATE#321353, FATE#323335).
- iwlwifi: uninline iwl_trans_send_cmd (FATE#321353, FATE#323335).
- iwlwifi: update host command messages to new format (FATE#321353, FATE#323335).
- iwlwifi: Update PCI IDs for 8000 and 9000 series (FATE#321353, FATE#323335).
- iwlwifi: update support for 3168 series firmware and NVM (FATE#321353, FATE#323335).
- iwlwifi: various comments and code cleanups (FATE#321353, FATE#323335).
- kABI-fix for 'x86/panic: replace smp_send_stop() with kdump friendly version in panic path' (bsc#1051478).
- kABI: protect lwtunnel include in ip6_route.h (kabi).
- KABI protect struct acpi_nfit_desc (bsc#1052325).
- kABI: protect struct iscsi_tpg_attrib (kabi).
- kABI: protect struct se_lun (kabi).
- kABI: protect struct tpm_chip (kabi).
- kABI: protect struct xfrm_dst (kabi).
- kABI: protect struct xfrm_dst (kabi).
- kabi/severities: add drivers/scsi/hisi_sas to kabi severities
- kabi/severities: ignore kABi changes in iwlwifi stuff itself
- kvm: nVMX: fix msr bitmaps to prevent L2 from accessing L0 x2APIC (bsc#1051478).
- kvm: nVMX: Fix nested_vmx_check_msr_bitmap_controls (bsc#1051478).
- kvm: nVMX: Fix nested VPID vmx exec control (bsc#1051478).
- kvm: x86: avoid simultaneous queueing of both IRQ and SMI (bsc#1051478).
- libnvdimm: fix badblock range handling of ARS range (bsc#1023175).
- libnvdimm: fix badblock range handling of ARS range (bsc#1051048).
- libnvdimm, pmem: fix a NULL pointer BUG in nd_pmem_notify (bsc#1023175).
- libnvdimm, pmem: fix a NULL pointer BUG in nd_pmem_notify (bsc#1048919).
- libnvdimm, region: fix flush hint detection crash (bsc#1048919).
- lightnvm: fix 'warning: ‘ret’ may be used uninitialized' (FATE#319466).
- mac80211_hwsim: Replace bogus hrtimer clockid (bsc#1047651).
- md-cluster: Fix a memleak in an error handling path (bsc#1049289).
- md: do not return -EAGAIN in md_allow_write for external metadata arrays (bsc#1047174).
- md: fix sleep in atomic (bsc#1040351).
- mm: call page_ext_init() after all struct pages are initialized (VM Debugging Functionality, bsc#1047048).
- mm: fix classzone_idx underflow in shrink_zones() (VM Functionality, bsc#1042314).
- mm: make PR_SET_THP_DISABLE immediately active (bnc#1048891).
- mm, memory_hotplug: get rid of is_zone_device_section fix (bnc#1047595).
- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348).
- mwifiex: do not update MCS set from hostapd (bsc#1031717).
- net: account for current skb length when deciding about UFO (bsc#1041958).
- net: add netdev_lockdep_set_classes() helper (fate#320485).
- net: ena: add hardware hints capability to the driver (bsc#1047121).
- net: ena: add hardware hints capability to the driver (bsc#1047121).
- net: ena: add missing return when ena_com_get_io_handlers() fails (bsc#1047121).
- net: ena: add missing return when ena_com_get_io_handlers() fails (bsc#1047121).
- net: ena: add missing unmap bars on device removal (bsc#1047121).
- net: ena: add missing unmap bars on device removal (bsc#1047121).
- net: ena: add reset reason for each device FLR (bsc#1047121).
- net: ena: add reset reason for each device FLR (bsc#1047121).
- net: ena: add support for out of order rx buffers refill (bsc#1047121).
- net: ena: add support for out of order rx buffers refill (bsc#1047121).
- net: ena: allow the driver to work with small number of msix vectors (bsc#1047121).
- net: ena: allow the driver to work with small number of msix vectors (bsc#1047121).
- net: ena: bug fix in lost tx packets detection mechanism (bsc#1047121).
- net: ena: bug fix in lost tx packets detection mechanism (bsc#1047121).
- net: ena: change return value for unsupported features unsupported return value (bsc#1047121).
- net: ena: change return value for unsupported features unsupported return value (bsc#1047121).
- net: ena: change sizeof() argument to be the type pointer (bsc#1047121).
- net: ena: change sizeof() argument to be the type pointer (bsc#1047121).
- net: ena: disable admin msix while working in polling mode (bsc#1047121).
- net: ena: disable admin msix while working in polling mode (bsc#1047121).
- net: ena: fix bug that might cause hang after consecutive open/close interface (bsc#1047121).
- net: ena: fix bug that might cause hang after consecutive open/close interface (bsc#1047121).
- net: ena: fix race condition between submit and completion admin command (bsc#1047121).
- net: ena: fix race condition between submit and completion admin command (bsc#1047121).
- net: ena: fix rare uncompleted admin command false alarm (bsc#1047121).
- net: ena: fix rare uncompleted admin command false alarm (bsc#1047121).
- net: ena: fix theoretical Rx hang on low memory systems (bsc#1047121).
- net: ena: fix theoretical Rx hang on low memory systems (bsc#1047121).
- net: ena: separate skb allocation to dedicated function (bsc#1047121).
- net: ena: separate skb allocation to dedicated function (bsc#1047121).
- net/ena: switch to pci_alloc_irq_vectors (bsc#1047121).
- net: ena: update driver's rx drop statistics (bsc#1047121).
- net: ena: update driver's rx drop statistics (bsc#1047121).
- net: ena: update ena driver to version 1.1.7 (bsc#1047121).
- net: ena: update ena driver to version 1.1.7 (bsc#1047121).
- net: ena: update ena driver to version 1.2.0 (bsc#1047121).
- net: ena: update ena driver to version 1.2.0 (bsc#1047121).
- net: ena: use lower_32_bits()/upper_32_bits() to split dma address (bsc#1047121).
- net: ena: use lower_32_bits()/upper_32_bits() to split dma address (bsc#1047121).
- net: ena: use napi_schedule_irqoff when possible (bsc#1047121).
- net: ena: use napi_schedule_irqoff when possible (bsc#1047121).
- net: handle NAPI_GRO_FREE_STOLEN_HEAD case also in napi_frags_finish() (bsc#1042286).
- net: hns: Bugfix for Tx timeout handling in hns driver (bsc#1048451).
- net: hyperv: use new api ethtool_{get|set}_link_ksettings (fate#320485).
- net/mlx4_core: Fixes missing capability bit in flags2 capability dump (bsc#1015337).
- net/mlx4_core: Fix namespace misalignment in QinQ VST support commit (bsc#1015337).
- net/mlx4_core: Fix sl_to_vl_change bit offset in flags2 dump (bsc#1015337).
- net/mlx5: Cancel delayed recovery work when unloading the driver (bsc#1015342).
- net/mlx5: Clean SRIOV eswitch resources upon VF creation failure (bsc#1015342).
- net/mlx5: Consider tx_enabled in all modes on remap (bsc#1015342).
- net/mlx5e: Add field select to MTPPS register (bsc#1015342).
- net/mlx5e: Add missing support for PTP_CLK_REQ_PPS request (bsc#1015342).
- net/mlx5e: Change 1PPS out scheme (bsc#1015342).
- net/mlx5e: Fix broken disable 1PPS flow (bsc#1015342).
- net/mlx5e: Fix outer_header_zero() check size (bsc#1015342).
- net/mlx5e: Fix TX carrier errors report in get stats ndo (bsc#1015342).
- net/mlx5e: Initialize CEE's getpermhwaddr address buffer to 0xff (bsc#1015342).
- net/mlx5e: Rename physical symbol errors counter (bsc#1015342).
- net/mlx5: Fix driver load error flow when firmware is stuck (git-fixes).
- net/mlx5: Fix mlx5_add_flow_rules call with correct num of dests (bsc#1015342).
- net/mlx5: Fix mlx5_ifc_mtpps_reg_bits structure size (bsc#1015342).
- net/mlx5: Fix offset of hca cap reserved field (bsc#1015342).
- net: phy: Do not perform software reset for Generic PHY (bsc#1042286).
- netvsc: add comments about callback's and NAPI (fate#320485).
- netvsc: Add #include's for csum_* function declarations (fate#320485).
- netvsc: add rtnl annotations in rndis (fate#320485).
- netvsc: add some rtnl_dereference annotations (fate#320485).
- netvsc: avoid race with callback (fate#320485).
- netvsc: change logic for change mtu and set_queues (fate#320485).
- netvsc: change max channel calculation (fate#320485).
- netvsc: change order of steps in setting queues (fate#320485).
- netvsc: Deal with rescinded channels correctly (fate#320485).
- netvsc: do not access netdev-&gt;num_rx_queues directly (fate#320485).
- netvsc: do not overload variable in same function (fate#320485).
- netvsc: do not print pointer value in error message (fate#320485).
- netvsc: eliminate unnecessary skb == NULL checks (fate#320485).
- netvsc: enable GRO (fate#320485).
- netvsc: Fix a bug in sub-channel handling (fate#320485).
- netvsc: fix and cleanup rndis_filter_set_packet_filter (fate#320485).
- netvsc: fix calculation of available send sections (fate#320485).
- netvsc: fix dereference before null check errors (fate#320485).
- netvsc: fix error unwind on device setup failure (fate#320485).
- netvsc: fix hang on netvsc module removal (fate#320485).
- netvsc: fix NAPI performance regression (fate#320485).
- netvsc: fix net poll mode (fate#320485).
- netvsc: fix netvsc_set_channels (fate#320485).
- netvsc: fix ptr_ret.cocci warnings (fate#320485).
- netvsc: fix rcu dereference warning from ethtool (fate#320485).
- netvsc: fix RCU warning in get_stats (fate#320485).
- netvsc: fix return value for set_channels (fate#320485).
- netvsc: fix rtnl deadlock on unregister of vf (fate#320485, bsc#1052442).
- netvsc: fix use after free on module removal (fate#320485).
- netvsc: fix warnings reported by lockdep (fate#320485).
- netvsc: fold in get_outbound_net_device (fate#320485).
- netvsc: force link update after MTU change (fate#320485).
- netvsc: handle offline mtu and channel change (fate#320485).
- netvsc: implement NAPI (fate#320485).
- netvsc: include rtnetlink.h (fate#320485).
- netvsc: Initialize all channel related state prior to opening the channel (fate#320485).
- netvsc: make sure and unregister datapath (fate#320485, bsc#1052899).
- netvsc: make sure napi enabled before vmbus_open (fate#320485).
- netvsc: mark error cases as unlikely (fate#320485).
- netvsc: move filter setting to rndis_device (fate#320485).
- netvsc: need napi scheduled during removal (fate#320485).
- netvsc: need rcu_derefence when accessing internal device info (fate#320485).
- netvsc: optimize calculation of number of slots (fate#320485).
- netvsc: optimize receive completions (fate#320485).
- netvsc: pass net_device to netvsc_init_buf and netvsc_connect_vsp (fate#320485).
- netvsc: prefetch the first incoming ring element (fate#320485).
- netvsc: Properly initialize the return value (fate#320485).
- netvsc: remove bogus rtnl_unlock (fate#320485).
- netvsc: remove no longer used max_num_rss queues (fate#320485).
- netvsc: Remove redundant use of ipv6_hdr() (fate#320485).
- netvsc: remove unnecessary indirection of page_buffer (fate#320485).
- netvsc: remove unnecessary lock on shutdown (fate#320485).
- netvsc: remove unused #define (fate#320485).
- netvsc: replace netdev_alloc_skb_ip_align with napi_alloc_skb (fate#320485).
- netvsc: save pointer to parent netvsc_device in channel table (fate#320485).
- netvsc: signal host if receive ring is emptied (fate#320485).
- netvsc: transparent VF management (fate#320485, bsc#1051979).
- netvsc: use ERR_PTR to avoid dereference issues (fate#320485).
- netvsc: use hv_get_bytes_to_read (fate#320485).
- netvsc: use napi_consume_skb (fate#320485).
- netvsc: use RCU to protect inner device structure (fate#320485).
- netvsc: uses RCU instead of removal flag (fate#320485).
- netvsc: use typed pointer for internal state (fate#320485).
- nfs: Cache aggressively when file is open for writing (bsc#1033587).
- nfs: Do not flush caches for a getattr that races with writeback (bsc#1033587).
- nfs: invalidate file size when taking a lock (git-fixes).
- nfs: only invalidate dentrys that are clearly invalid (bsc#1047118).
- nfs: Optimize fallocate by refreshing mapping when needed (git-fixes).
- nvme: add hostid token to fabric options (bsc#1045293).
- nvme: also provide a UUID in the WWID sysfs attribute (bsc#1048146).
- nvme: fabrics commands should use the fctype field for data direction (bsc#1043805).
- nvme-pci: fix CMB sysfs file removal in reset path (bsc#1050211).
- nvme/pci: Fix stuck nvme reset (bsc#1043805).
- nvmet: identify controller: improve standard compliance (bsc#1048146).
- nvme: wwid_show: strip trailing 0-bytes (bsc#1048146).
- ocfs2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ocfs2: fix deadlock caused by recursive locking in xattr (bsc#1012829).
- ocfs2: Make ocfs2_set_acl() static (bsc#1030552).
- pci: Add Mellanox device IDs (bsc#1051478).
- pci: Convert Mellanox broken INTx quirks to be for listed devices only (bsc#1051478).
- pci: Correct PCI_STD_RESOURCE_END usage (bsc#1051478).
- pci: dwc: dra7xx: Use RW1C for IRQSTATUS_MSI and IRQSTATUS_MAIN (bsc#1051478).
- pci: dwc: Fix uninitialized variable in dw_handle_msi_irq() (bsc#1051478).
- pci: Enable ECRC only if device supports it (bsc#1051478).
- pci: hv: Allocate interrupt descriptors with GFP_ATOMIC (fate#320295, bnc#1034113).
- pci: hv: Lock PCI bus on device eject (fate#320295, bnc#1034113). Replaces a change for (bnc#998664)
- pci/msi: fix the pci_alloc_irq_vectors_affinity stub (bsc#1050211).
- pci/msi: Ignore affinity if pre/post vector count is more than min_vecs (1050211).
- pci/pm: Fix native PME handling during system suspend/resume (bsc#1051478).
- pci: Support INTx masking on ConnectX-4 with firmware x.14.1100+ (bsc#1051478).
- perf/x86: Fix spurious NMI with PEBS Load Latency event (bsc#1051478).
- perf/x86/intel: Cure bogus unwind from PEBS entries (bsc#1051478).
- perf/x86/intel: Fix PEBSv3 record drain (bsc#1051478).
- pipe: cap initial pipe capacity according to pipe-max-size limit (bsc#1045330).
- platform/x86: ideapad-laptop: Add IdeaPad 310-15IKB to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add IdeaPad V310-15ISK to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add IdeaPad V510-15IKB to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add Lenovo Yoga 910-13IKB to no_hw_rfkill dmi list (bsc#1051022).
- platform/x86: ideapad-laptop: Add several models to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add Y520-15IKBN to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add Y700 15-ACZ to no_hw_rfkill DMI list (bsc#1051022).
- platform/x86: ideapad-laptop: Add Y720-15IKBN to no_hw_rfkill (bsc#1051022).
- pm / Hibernate: Fix scheduling while atomic during hibernation (bsc#1051059).
- powerpc: Add POWER9 architected mode to cputable (bsc#1048916, fate#321439).
- powerpc/fadump: Add a warning when 'fadump_reserve_mem=' is used (bsc#1049231).
- powerpc/ftrace: Pass the correct stack pointer for DYNAMIC_FTRACE_WITH_REGS (FATE#322421).
- powerpc/perf: Fix branch event code for power9 (fate#321438,  Pending SUSE Kernel Fixes).
- powerpc/perf: Fix oops when kthread execs user process
- powerpc/perf: Fix SDAR_MODE value for continous sampling on Power9 (bsc#1053043 (git-fixes)).
- powerpc: Support POWER9 in architected mode (bsc#1048916, fate#321439).
- powerpc/tm: Fix saving of TM SPRs in core dump (fate#318470, git-fixes 08e1c01d6aed).
- prctl: propagate has_child_subreaper flag to every descendant (bnc#1022476).
- printk: Correctly handle preemption in console_unlock() (bsc#1046434).
- printk/xen: Force printk sync mode when migrating Xen guest (bsc#1043347).
- qed: Add missing static/local dcbx info (bsc#1019695).
- qed: Correct print in iscsi error-flow (bsc#1019695).
- qeth: fix L3 next-hop im xmit qeth hdr (bnc#1052773, LTC#157374).
- rbd: drop extra rbd_img_request_get (bsc#1045596).
- rbd: make sure pages are freed by libceph (bsc#1045596).
- rdma/bnxt_re: checking for NULL instead of IS_ERR() (bsc#1052925).
- rdma/iw_cxgb4: Always wake up waiter in c4iw_peer_abort_intr() (bsc#1026570).
- rdma/mlx5: Fix existence check for extended address vector (bsc#1015342).
- rdma/qedr: Prevent memory overrun in verbs' user responses (bsc#1022604 FATE#321747).
- reiserfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- Remove upstream commit e14b4db7a567 netvsc: fix race during initialization will be replaced by following changes
- reorder upstream commit d0c2c9973ecd net: use core MTU range checking in virt drivers
- Revert 'ACPI / video: Add force_native quirk for HP Pavilion dv6' (bsc#1031717).
- Revert 'Add 'shutdown' to 'struct class'.' (kabi).
- Revert 'KVM: x86: fix emulation of RSM and IRET instructions' (kabi).
- Revert 'Make file credentials available to the seqfile interfaces' (kabi).
- Revert 'mm/list_lru.c: fix list_lru_count_node() to be race free' (kabi).
- Revert 'netvsc: optimize calculation of number of slots' (fate#320485).
- Revert 'powerpc/numa: Fix percpu allocations to be NUMA aware' (bsc#1048914).
- Revert 'powerpc/numa: Fix percpu allocations to be NUMA aware' (bsc#1048914).
- Revert '/proc/iomem: only expose physical resource addresses to privileged users' (kabi).
- Revert 'tpm: Issue a TPM2_Shutdown for TPM2 devices.' (kabi).
- rpm/kernel-binary.spec.in: find-debuginfo.sh should not touch build-id This needs rpm-4.14+ (bsc#964063).
- s390/crash: Remove unused KEXEC_NOTE_BYTES (bsc#1049706).
- s390/kdump: remove code to create ELF notes in the crashed system (bsc#1049706).
- sched/core: Allow __sched_setscheduler() in interrupts when PI is not used (bnc#1022476).
- sched/debug: Print the scheduler topology group mask (bnc#1022476).
- sched/fair, cpumask: Export for_each_cpu_wrap() (bnc#1022476).
- sched/fair: Fix O(nr_cgroups) in load balance path (bnc#1022476).
- sched/fair: Use task_groups instead of leaf_cfs_rq_list to walk all cfs_rqs (bnc#1022476).
- sched/topology: Add sched_group_capacity debugging (bnc#1022476).
- sched/topology: Fix building of overlapping sched-groups (bnc#1022476).
- sched/topology: Fix overlapping sched_group_capacity (bnc#1022476).
- sched/topology: Move comment about asymmetric node setups (bnc#1022476).
- sched/topology: Refactor function build_overlap_sched_groups() (bnc#1022476).
- sched/topology: Remove FORCE_SD_OVERLAP (bnc#1022476).
- sched/topology: Simplify build_overlap_sched_groups() (bnc#1022476).
- sched/topology: Small cleanup (bnc#1022476).
- sched/topology: Verify the first group matches the child domain (bnc#1022476).
- scsi: aacraid: Do not copy uninitialized stack memory to userspace (bsc#1048912).
- scsi: aacraid: fix leak of data from stack back to userspace (bsc#1048912).
- scsi: aacraid: fix PCI error recovery path (bsc#1048912).
- scsi: Add STARGET_CREATE_REMOVE state to scsi_target_state (bsc#1013887).
- scsi: bnx2i: missing error code in bnx2i_ep_connect() (bsc#1048221).
- scsi: bnx2i: missing error code in bnx2i_ep_connect() (bsc#1048221).
- scsi_devinfo: fixup string compare (bsc#1037404).
- scsi_dh_alua: suppress errors from unsupported devices (bsc#1038792).
- scsi: hisi_sas: add pci_dev in hisi_hba struct (bsc#1049298).
- scsi: hisi_sas: add v2 hw internal abort timeout workaround (bsc#1049298).
- scsi: hisi_sas: controller reset for multi-bits ECC and AXI fatal errors (bsc#1049298).
- scsi: hisi_sas: fix NULL deference when TMF timeouts (bsc#1049298).
- scsi: hisi_sas: fix timeout check in hisi_sas_internal_task_abort() (bsc#1049298).
- scsi: hisi_sas: optimise DMA slot memory (bsc#1049298).
- scsi: hisi_sas: optimise the usage of hisi_hba.lock (bsc#1049298).
- scsi: hisi_sas: relocate get_ata_protocol() (bsc#1049298).
- scsi: hisi_sas: workaround a SoC SATA IO processing bug (bsc#1049298).
- scsi: hisi_sas: workaround SoC about abort timeout bug (bsc#1049298).
- scsi: hisi_sas: workaround STP link SoC bug (bsc#1049298).
- scsi: kABI fix for new state STARGET_CREATED_REMOVE (bsc#1013887).
- scsi: lpfc: Add auto EQ delay logic (bsc#1042257).
- scsi: lpfc: Added recovery logic for running out of NVMET IO context resources (bsc#1037838).
- scsi: lpfc: Adding additional stats counters for nvme (bsc#1037838).
- scsi: lpfc: Add MDS Diagnostic support (bsc#1037838).
- scsi: lpfc: Cleanup entry_repost settings on SLI4 queues (bsc#1037838).
- scsi: lpfc: do not double count abort errors (bsc#1048912).
- scsi: lpfc: Driver responds LS_RJT to Beacon Off ELS - Linux (bsc#1044623).
- scsi: lpfc: Fix crash after firmware flash when IO is running (bsc#1044623).
- scsi: lpfc: Fix crash doing IO with resets (bsc#1044623).
- scsi: lpfc: Fix crash in lpfc_sli_ringtxcmpl_put when nvmet gets an abort request (bsc#1044623).
- scsi: lpfc: Fix debugfs root inode 'lpfc' not getting deleted on driver unload (bsc#1037838).
- scsi: lpfc: Fix defects reported by Coverity Scan (bsc#1042257).
- scsi: lpfc: fix linking against modular NVMe support (bsc#1048912).
- scsi: lpfc: Fix NMI watchdog assertions when running nvmet IOPS tests (bsc#1037838).
- scsi: lpfc: Fix NVMEI driver not decrementing counter causing bad rport state (bsc#1037838).
- scsi: lpfc: Fix nvme io stoppage after link bounce (bsc#1045404).
- scsi: lpfc: Fix NVMEI's handling of NVMET's PRLI response attributes (bsc#1037838).
- scsi: lpfc: Fix NVME I+T not registering NVME as a supported FC4 type (bsc#1037838).
- scsi: lpfc: Fix nvmet RQ resource needs for large block writes (bsc#1037838).
- scsi: lpfc: fix refcount error on node list (bsc#1045404).
- scsi: lpfc: Fix SLI3 drivers attempting NVME ELS commands (bsc#1044623).
- scsi: lpfc: Fix system crash when port is reset (bsc#1037838).
- scsi: lpfc: Fix system panic when express lane enabled (bsc#1044623).
- scsi: lpfc: Fix used-RPI accounting problem (bsc#1037838).
- scsi: lpfc: Reduce time spent in IRQ for received NVME commands (bsc#1044623).
- scsi: lpfc: Separate NVMET data buffer pool fir ELS/CT (bsc#1037838).
- scsi: lpfc: Separate NVMET RQ buffer posting from IO resources SGL/iocbq/context (bsc#1037838).
- scsi: lpfc: update to revision to 11.4.0.1 (bsc#1044623).
- scsi: lpfc: update version to 11.2.0.14 (bsc#1037838).
- scsi: lpfc: Vport creation is failing with 'Link Down' error (bsc#1044623).
- scsi: qedf: Fix a return value in case of error in 'qedf_alloc_global_queues' (bsc#1048912).
- scsi: qedi: Fix return code in qedi_ep_connect() (bsc#1048912).
- scsi: qedi: Remove WARN_ON for untracked cleanup (bsc#1044443).
- scsi: qedi: Remove WARN_ON from clear task context (bsc#1044443).
- scsi: storvsc: Prefer kcalloc over kzalloc with multiply (fate#320485).
- scsi: storvsc: remove return at end of void function (fate#320485).
- scsi: storvsc: Workaround for virtual DVD SCSI version (fate#320485, bnc#1044636).
- sfc: Add ethtool -m support for QSFP modules (bsc#1049619).
- smartpqi: limit transfer length to 1MB (bsc#1025461).
- smsc75xx: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- sr9700: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- string.h: add memcpy_and_pad() (bsc#1048146).
- sysctl: do not print negative flag for proc_douintvec (bnc#1046985).
- Temporarily disable iwlwifi-expose-default-fallback-ucode-api ... for updating iwlwifi stack
- timers: Plug locking race vs. timer migration (bnc#1022476).
- tools: hv: Add clean up for included files in Ubuntu net config (fate#320485).
- tools: hv: Add clean up function for Ubuntu config (fate#320485).
- tools: hv: properly handle long paths (fate#320485).
- tools: hv: set allow-hotplug for VF on Ubuntu (fate#320485).
- tools: hv: set hotplug for VF on Suse (fate#320485).
- Tools: hv: vss: Thaw the filesystem and continue if freeze call has timed out (fate#320485).
- tpm: Issue a TPM2_Shutdown for TPM2 devices (bsc#1053117).
- tpm: KABI fix (bsc#1053117).
- tpm_tis: Fix IRQ autoprobing when using platform_device (bsc#1020645, fate#321435, fate#321507, fate#321600, Pending fixes 2017-07-06).
- tpm_tis: Use platform_get_irq (bsc#1020645, fate#321435, fate#321507, fate#321600, Pending fixes 2017-07-06).
- tpm/tpm_crb: fix priv-&gt;cmd_size initialisation (bsc#1020645, fate#321435, fate#321507, fate#321600, Pending SUSE Kernel Fixes).
- udf: Fix deadlock between writeback and udf_setsize() (bsc#1012829).
- udf: Fix races with i_size changes during readpage (bsc#1012829).
- Update config files: add CONFIG_IWLWIFI_PCIE_RTPM=y (FATE#323335)
- vfs: fix missing inode_get_dev sites (bsc#1052049).
- vmbus: cleanup header file style (fate#320485).
- vmbus: expose debug info for drivers (fate#320485).
- vmbus: fix spelling errors (fate#320485).
- vmbus: introduce in-place packet iterator (fate#320485).
- vmbus: only reschedule tasklet if time limit exceeded (fate#320485).
- vmbus: re-enable channel tasklet (fate#320485).
- vmbus: remove unnecessary initialization (fate#320485).
- vmbus: remove useless return's (fate#320485).
- x86/dmi: Switch dmi_remap() from ioremap() to ioremap_cache() (bsc#1051399).
- x86/hyperv: Check frequency MSRs presence according to the specification (fate#320485).
- x86/LDT: Print the real LDT base address (bsc#1051478).
- x86/mce: Make timer handling more robust (bsc#1042422).
- x86/panic: replace smp_send_stop() with kdump friendly version in panic path (bsc#1051478).
- x86/platform/uv/BAU: Disable BAU on single hub configurations (bsc#1050320).
- x86/platform/uv/BAU: Fix congested_response_us not taking effect (bsc#1050322).
- xen: allocate page for shared info page from low memory (bnc#1038616).
- xen/balloon: do not online new memory initially (bnc#1028173).
- xen: hold lock_device_hotplug throughout vcpu hotplug operations (bsc#1042422).
- xen-netfront: Rework the fix for Rx stall during OOM and network stress (git-fixes).
- xen/pvh*: Support &gt; 32 VCPUs at domain restore (bnc#1045563).
- xfrm: NULL dereference on allocation failure (bsc#1047343).
- xfrm: Oops on error in pfkey_msg2xfrm_state() (bsc#1047653).
- xfs: detect and handle invalid iclog size set by mkfs (bsc#1043598).
- xfs: detect and trim torn writes during log recovery (bsc#1036215).
- xfs: do not BUG() on mixed direct and mapped I/O (bsc#1050188).
- xfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- xfs: refactor and open code log record crc check (bsc#1036215).
- xfs: refactor log record start detection into a new helper (bsc#1036215).
- xfs: return start block of first bad log record during recovery (bsc#1036215).
- xfs: support a crc verification only log record pass (bsc#1036215).
- xgene: Do not fail probe, if there is no clk resource for SGMII interfaces (bsc#1048501).
- xilinx network drivers: disable (bsc#1046170).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005778">SUSE bug 1005778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006180">SUSE bug 1006180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011913">SUSE bug 1011913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012829">SUSE bug 1012829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013887">SUSE bug 1013887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015337">SUSE bug 1015337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015342">SUSE bug 1015342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016119">SUSE bug 1016119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019151">SUSE bug 1019151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019695">SUSE bug 1019695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020645">SUSE bug 1020645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022476">SUSE bug 1022476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022600">SUSE bug 1022600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022604">SUSE bug 1022604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023175">SUSE bug 1023175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024346">SUSE bug 1024346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024373">SUSE bug 1024373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025461">SUSE bug 1025461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026570">SUSE bug 1026570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028173">SUSE bug 1028173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028286">SUSE bug 1028286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029693">SUSE bug 1029693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030552">SUSE bug 1030552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031515">SUSE bug 1031515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031784">SUSE bug 1031784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033587">SUSE bug 1033587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034075">SUSE bug 1034075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034113">SUSE bug 1034113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034762">SUSE bug 1034762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036215">SUSE bug 1036215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036632">SUSE bug 1036632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037344">SUSE bug 1037344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037404">SUSE bug 1037404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037838">SUSE bug 1037838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037994">SUSE bug 1037994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038078">SUSE bug 1038078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038616">SUSE bug 1038616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038792">SUSE bug 1038792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039153">SUSE bug 1039153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039915">SUSE bug 1039915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040307">SUSE bug 1040307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040347">SUSE bug 1040347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040351">SUSE bug 1040351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041958">SUSE bug 1041958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042257">SUSE bug 1042257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042314">SUSE bug 1042314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042422">SUSE bug 1042422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042778">SUSE bug 1042778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043261">SUSE bug 1043261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043347">SUSE bug 1043347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043520">SUSE bug 1043520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043598">SUSE bug 1043598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043652">SUSE bug 1043652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043805">SUSE bug 1043805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043912">SUSE bug 1043912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044112">SUSE bug 1044112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044443">SUSE bug 1044443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044623">SUSE bug 1044623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044636">SUSE bug 1044636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045154">SUSE bug 1045154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045293">SUSE bug 1045293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045330">SUSE bug 1045330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045404">SUSE bug 1045404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045563">SUSE bug 1045563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045596">SUSE bug 1045596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045709">SUSE bug 1045709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045715">SUSE bug 1045715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045866">SUSE bug 1045866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045922">SUSE bug 1045922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045937">SUSE bug 1045937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046105">SUSE bug 1046105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046170">SUSE bug 1046170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046434">SUSE bug 1046434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046651">SUSE bug 1046651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046655">SUSE bug 1046655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046682">SUSE bug 1046682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046821">SUSE bug 1046821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046985">SUSE bug 1046985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047027">SUSE bug 1047027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047048">SUSE bug 1047048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047096">SUSE bug 1047096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047118">SUSE bug 1047118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047121">SUSE bug 1047121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047152">SUSE bug 1047152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047174">SUSE bug 1047174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047277">SUSE bug 1047277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047343">SUSE bug 1047343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047354">SUSE bug 1047354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047418">SUSE bug 1047418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047506">SUSE bug 1047506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047595">SUSE bug 1047595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047651">SUSE bug 1047651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047653">SUSE bug 1047653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047670">SUSE bug 1047670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047802">SUSE bug 1047802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048146">SUSE bug 1048146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048155">SUSE bug 1048155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048221">SUSE bug 1048221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048317">SUSE bug 1048317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048348">SUSE bug 1048348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048356">SUSE bug 1048356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048421">SUSE bug 1048421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048451">SUSE bug 1048451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048501">SUSE bug 1048501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048891">SUSE bug 1048891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048912">SUSE bug 1048912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048914">SUSE bug 1048914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048916">SUSE bug 1048916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048919">SUSE bug 1048919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049231">SUSE bug 1049231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049289">SUSE bug 1049289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049298">SUSE bug 1049298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049361">SUSE bug 1049361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049483">SUSE bug 1049483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049486">SUSE bug 1049486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049603">SUSE bug 1049603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049619">SUSE bug 1049619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049645">SUSE bug 1049645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049706">SUSE bug 1049706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049882">SUSE bug 1049882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050061">SUSE bug 1050061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050188">SUSE bug 1050188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050211">SUSE bug 1050211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050320">SUSE bug 1050320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050322">SUSE bug 1050322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050677">SUSE bug 1050677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051022">SUSE bug 1051022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051048">SUSE bug 1051048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051059">SUSE bug 1051059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051239">SUSE bug 1051239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051399">SUSE bug 1051399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051471">SUSE bug 1051471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051478">SUSE bug 1051478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051479">SUSE bug 1051479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051556">SUSE bug 1051556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051663">SUSE bug 1051663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051689">SUSE bug 1051689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051979">SUSE bug 1051979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052049">SUSE bug 1052049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052223">SUSE bug 1052223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052311">SUSE bug 1052311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052325">SUSE bug 1052325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052365">SUSE bug 1052365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052442">SUSE bug 1052442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052533">SUSE bug 1052533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052709">SUSE bug 1052709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052773">SUSE bug 1052773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052794">SUSE bug 1052794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052899">SUSE bug 1052899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052925">SUSE bug 1052925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053043">SUSE bug 1053043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053117">SUSE bug 1053117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964063">SUSE bug 964063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974215">SUSE bug 974215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998664">SUSE bug 998664</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000111/">CVE-2017-1000111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000111">CVE-2017-1000111 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000112/">CVE-2017-1000112 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000112">CVE-2017-1000112 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10810/">CVE-2017-10810 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10810">CVE-2017-10810 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11473/">CVE-2017-11473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11473">CVE-2017-11473 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7533/">CVE-2017-7533 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7533">CVE-2017-7533 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7541/">CVE-2017-7541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7541">CVE-2017-7541 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7542">CVE-2017-7542 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8831/">CVE-2017-8831 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8831">CVE-2017-8831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552562" comment="kernel-default-4.4.82-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552563" comment="kernel-default-base-4.4.82-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552564" comment="kernel-default-devel-4.4.82-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552565" comment="kernel-default-man-4.4.82-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519253" comment="kernel-devel-4.4.82-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519254" comment="kernel-macros-4.4.82-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519255" comment="kernel-source-4.4.82-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552566" comment="kernel-syms-4.4.82-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149377" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1005258" ref_url="https://bugzilla.suse.com/1005258" source="BUGZILLA"/>
		<reference ref_id="1021669" ref_url="https://bugzilla.suse.com/1021669" source="BUGZILLA"/>
		<reference ref_id="1034273" ref_url="https://bugzilla.suse.com/1034273" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1245" ref_url="https://www.suse.com/security/cve/CVE-2016-1245/" source="CVE"/>
		<reference ref_id="CVE-2017-5495" ref_url="https://www.suse.com/security/cve/CVE-2017-5495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003168.html" source="SUSE-SU"/>
		<description>
This update provides Quagga 1.1.1, which brings several fixes and enhancements.

Security issues fixed:

- CVE-2017-5495: Telnet 'vty' interface DoS due to unbounded memory allocation. (bsc#1021669)
- CVE-2016-1245: Stack overrun in IPv6 RA receive code. (bsc#1005258)

Bug fixes:

- Do not enable zebra's TCP interface (port 2600) to use default UNIX socket for communication
  between the daemons. (fate#323170)

Between 0.99.22.1 and 1.1.1 the following improvements have been implemented:

- Changed the default of 'link-detect' state, controlling whether zebra will respond to
  link-state events and consider an interface to be down when link is down. To retain the
  current behavior save your config before updating, otherwise remove the 'link-detect'
  flag from your config prior to updating. There is also a new global 'default link-detect
  (on|off)' flag to configure the global default.
- Greatly improved nexthop resolution for recursive routes.
- Event driven nexthop resolution for BGP.
- Route tags support.
- Transport of TE related metrics over OSPF, IS-IS.
- IPv6 Multipath for zebra and BGP.
- Multicast RIB support has been extended. It still is IPv4 only.
- RIP for IPv4 now supports equal-cost multipath (ECMP).
- route-maps have a new action 'set ipv6 next-hop peer-address'.
- route-maps have a new action 'set as-path prepend last-as'.
- 'next-hop-self all' to override nexthop on iBGP route reflector setups.
- New pimd daemon provides IPv4 PIM-SSM multicast routing.
- IPv6 address management has been improved regarding tentative addresses. This is visible in
  that a freshly configured address will not immediately be marked as usable.
- Recursive route support has been overhauled. Scripts parsing 'show ip route' output may need
  adaptation.
- A large amount of changes has been merged for ospf6d. Careful evaluation prior to deployment
  is recommended.
- Multiprotocol peerings over IPv6 now try to find a more appropriate IPv4 nexthop by looking at
  the interface.
- Relaxed bestpath criteria for multipath and improved display of multipath routes in 'show ip bgp'.
  Scripts parsing this output may need to be updated.
- Support for iBGP TTL security.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005258">SUSE bug 1005258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021669">SUSE bug 1021669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034273">SUSE bug 1034273</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1245/">CVE-2016-1245 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1245">CVE-2016-1245 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5495/">CVE-2017-5495 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5495">CVE-2017-5495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549579" comment="libfpm_pb0-1.1.1-17.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549580" comment="libospf0-1.1.1-17.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549581" comment="libospfapiclient0-1.1.1-17.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549582" comment="libquagga_pb0-1.1.1-17.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549583" comment="libzebra1-1.1.1-17.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549584" comment="quagga-1.1.1-17.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149378" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1047236" ref_url="https://bugzilla.suse.com/1047236" source="BUGZILLA"/>
		<reference ref_id="1047240" ref_url="https://bugzilla.suse.com/1047240" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003169.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2016-9063: Possible integer overflow to fix inside XML_Parse leading to unexpected behaviour (bsc#1047240)
- CVE-2017-9233: External Entity Vulnerability could lead to denial of service (bsc#1047236)


		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-30"/>
	<updated date="2017-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047236">SUSE bug 1047236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047240">SUSE bug 1047240</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9233">CVE-2017-9233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549585" comment="expat-2.1.0-21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549586" comment="libexpat1-2.1.0-21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549587" comment="libexpat1-32bit-2.1.0-21.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149379" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1052481" ref_url="https://bugzilla.suse.com/1052481" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000117" ref_url="https://www.suse.com/security/cve/CVE-2017-1000117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003178.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2017-1000117: A client side code execution via shell injection when receiving special submodule strings from a malicious server was fixed (bsc#1052481)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-31"/>
	<updated date="2017-08-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1052481">SUSE bug 1052481</bugzilla>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000117/">CVE-2017-1000117 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000117">CVE-2017-1000117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009540949" comment="git-core-2.12.3-27.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149380" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="929629" ref_url="https://bugzilla.suse.com/929629" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003176.html" source="SUSE-SU"/>
		<description>
icu was updated to fix two security issues.

These security issues were fixed:
- CVE-2014-8147: The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional
  Algorithm implementation in ICU4C in International Components for Unicode (ICU) used an integer
  data type that is inconsistent with a header file, which allowed remote attackers to cause a
  denial of service (incorrect malloc followed by invalid free) or possibly execute arbitrary code
  via crafted text (bsc#929629).
- CVE-2014-8146: The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional
  Algorithm implementation in ICU4C in International Components for Unicode (ICU) did not properly
  track directionally isolated pieces of text, which allowed remote attackers to cause a denial of
  service (heap-based buffer overflow) or possibly execute arbitrary code via crafted text
  (bsc#929629).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-31"/>
	<updated date="2017-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/929629">SUSE bug 929629</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8146">CVE-2014-8146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8147">CVE-2014-8147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549588" comment="libicu-doc-52.1-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549589" comment="libicu52_1-52.1-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549590" comment="libicu52_1-32bit-52.1-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549591" comment="libicu52_1-data-52.1-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149381" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1002573" ref_url="https://bugzilla.suse.com/1002573" source="BUGZILLA"/>
		<reference ref_id="1026236" ref_url="https://bugzilla.suse.com/1026236" source="BUGZILLA"/>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1035231" ref_url="https://bugzilla.suse.com/1035231" source="BUGZILLA"/>
		<reference ref_id="1046637" ref_url="https://bugzilla.suse.com/1046637" source="BUGZILLA"/>
		<reference ref_id="1049578" ref_url="https://bugzilla.suse.com/1049578" source="BUGZILLA"/>
		<reference ref_id="1051787" ref_url="https://bugzilla.suse.com/1051787" source="BUGZILLA"/>
		<reference ref_id="1051788" ref_url="https://bugzilla.suse.com/1051788" source="BUGZILLA"/>
		<reference ref_id="1051789" ref_url="https://bugzilla.suse.com/1051789" source="BUGZILLA"/>
		<reference ref_id="1052686" ref_url="https://bugzilla.suse.com/1052686" source="BUGZILLA"/>
		<reference ref_id="1055695" ref_url="https://bugzilla.suse.com/1055695" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135/" source="CVE"/>
		<reference ref_id="CVE-2017-12136" ref_url="https://www.suse.com/security/cve/CVE-2017-12136/" source="CVE"/>
		<reference ref_id="CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137/" source="CVE"/>
		<reference ref_id="CVE-2017-12855" ref_url="https://www.suse.com/security/cve/CVE-2017-12855/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2327-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003397.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-12135: Unbounded recursion in grant table code allowed a malicious
  guest to crash the host or potentially escalate privileges/leak information
  (XSA-226, bsc#1051787).
- CVE-2017-12137: Incorrectly-aligned updates to pagetables allowed for
  privilege escalation (XSA-227, bsc#1051788).
- CVE-2017-12136: Race conditions with maptrack free list handling allows a
  malicious guest administrator to crash the host or escalate their privilege to
  that of the host (XSA-228, bsc#1051789).
- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest
  OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP
  options string (bsc#1049578).
- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote
  attackers to cause a denial of service (daemon crash) by disconnecting during a
  server-to-client reply attempt (bsc#1046637).
- CVE-2017-12855: Premature clearing of GTF_writing / GTF_reading lead to
  potentially leaking sensitive information (XSA-230 bsc#1052686.

These non-security issues were fixed:

- bsc#1055695: XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack
- bsc#1035231: Migration of HVM domU did not use superpages on destination dom0
- bsc#1002573: Optimized LVM functions in block-dmmd block-dmmd
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-16"/>
	<updated date="2017-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1002573">SUSE bug 1002573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026236">SUSE bug 1026236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035231">SUSE bug 1035231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046637">SUSE bug 1046637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049578">SUSE bug 1049578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051787">SUSE bug 1051787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051788">SUSE bug 1051788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051789">SUSE bug 1051789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052686">SUSE bug 1052686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055695">SUSE bug 1055695</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10664">CVE-2017-10664 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11434">CVE-2017-11434 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12135">CVE-2017-12135 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12136/">CVE-2017-12136 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12136">CVE-2017-12136 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12137">CVE-2017-12137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12855/">CVE-2017-12855 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12855">CVE-2017-12855 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519438" comment="xen-4.9.0_11-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552567" comment="xen-doc-html-4.9.0_11-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519439" comment="xen-libs-4.9.0_11-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519440" comment="xen-libs-32bit-4.9.0_11-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552568" comment="xen-tools-4.9.0_11-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552569" comment="xen-tools-domU-4.9.0_11-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149382" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp, zypper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1008325" ref_url="https://bugzilla.suse.com/1008325" source="BUGZILLA"/>
		<reference ref_id="1038984" ref_url="https://bugzilla.suse.com/1038984" source="BUGZILLA"/>
		<reference ref_id="1045735" ref_url="https://bugzilla.suse.com/1045735" source="BUGZILLA"/>
		<reference ref_id="1047785" ref_url="https://bugzilla.suse.com/1047785" source="BUGZILLA"/>
		<reference ref_id="1054088" ref_url="https://bugzilla.suse.com/1054088" source="BUGZILLA"/>
		<reference ref_id="1054671" ref_url="https://bugzilla.suse.com/1054671" source="BUGZILLA"/>
		<reference ref_id="1055920" ref_url="https://bugzilla.suse.com/1055920" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7436" ref_url="https://www.suse.com/security/cve/CVE-2017-7436/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003183.html" source="SUSE-SU"/>
		<description>
The Software Update Stack was updated to receive fixes and enhancements.

libzypp:

- Adapt to work with GnuPG 2.1.23. (bsc#1054088)
- Support signing with subkeys. (bsc#1008325)
- Enhance sort order for media.1/products. (bsc#1054671)

zypper:

- Also show a gpg key's subkeys. (bsc#1008325)
- Improve signature check callback messages. (bsc#1045735)
- Add options to tune the GPG check settings. (bsc#1045735)
- Adapt download callback to report and handle unsigned packages. (bsc#1038984, CVE-2017-7436)
- Report missing/optional files as 'not found' rather than 'error'. (bsc#1047785)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-04"/>
	<updated date="2017-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1008325">SUSE bug 1008325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038984">SUSE bug 1038984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047785">SUSE bug 1047785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054088">SUSE bug 1054088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054671">SUSE bug 1054671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055920">SUSE bug 1055920</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7436/">CVE-2017-7436 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7436">CVE-2017-7436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552570" comment="libzypp-16.15.6-2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552571" comment="zypper-1.13.32-21.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519443" comment="zypper-log-1.13.32-21.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149383" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1051684" ref_url="https://bugzilla.suse.com/1051684" source="BUGZILLA"/>
		<reference ref_id="1051685" ref_url="https://bugzilla.suse.com/1051685" source="BUGZILLA"/>
		<reference ref_id="1053259" ref_url="https://bugzilla.suse.com/1053259" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7546" ref_url="https://www.suse.com/security/cve/CVE-2017-7546/" source="CVE"/>
		<reference ref_id="CVE-2017-7547" ref_url="https://www.suse.com/security/cve/CVE-2017-7547/" source="CVE"/>
		<reference ref_id="CVE-2017-7548" ref_url="https://www.suse.com/security/cve/CVE-2017-7548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003188.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

* CVE-2017-7547: Further restrict visibility of pg_user_mappings.umoptions, to protect passwords stored as user mapping options. (bsc#1051685)
* CVE-2017-7546: Disallow empty passwords in all password-based authentication methods. (bsc#1051684)
* CVE-2017-7548: lo_put() function ignores ACLs. (bsc#1053259)

The changelog for this release is here:
	https://www.postgresql.org/docs/9.6/static/release-9-6-4.html

		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-05"/>
	<updated date="2017-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051684">SUSE bug 1051684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051685">SUSE bug 1051685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053259">SUSE bug 1053259</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7546/">CVE-2017-7546 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7546">CVE-2017-7546 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7547/">CVE-2017-7547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7547">CVE-2017-7547 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7548/">CVE-2017-7548 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7548">CVE-2017-7548 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549598" comment="libecpg6-9.6.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549599" comment="libpq5-9.6.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009544979" comment="libpq5-32bit-9.6.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549600" comment="postgresql96-9.6.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549601" comment="postgresql96-contrib-9.6.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532386" comment="postgresql96-docs-9.6.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549602" comment="postgresql96-server-9.6.4-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149384" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1027024" ref_url="https://bugzilla.suse.com/1027024" source="BUGZILLA"/>
		<reference ref_id="1027025" ref_url="https://bugzilla.suse.com/1027025" source="BUGZILLA"/>
		<reference ref_id="1027026" ref_url="https://bugzilla.suse.com/1027026" source="BUGZILLA"/>
		<reference ref_id="1048289" ref_url="https://bugzilla.suse.com/1048289" source="BUGZILLA"/>
		<reference ref_id="1048544" ref_url="https://bugzilla.suse.com/1048544" source="BUGZILLA"/>
		<reference ref_id="1049877" ref_url="https://bugzilla.suse.com/1049877" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2862" ref_url="https://www.suse.com/security/cve/CVE-2017-2862/" source="CVE"/>
		<reference ref_id="CVE-2017-2870" ref_url="https://www.suse.com/security/cve/CVE-2017-2870/" source="CVE"/>
		<reference ref_id="CVE-2017-6312" ref_url="https://www.suse.com/security/cve/CVE-2017-6312/" source="CVE"/>
		<reference ref_id="CVE-2017-6313" ref_url="https://www.suse.com/security/cve/CVE-2017-6313/" source="CVE"/>
		<reference ref_id="CVE-2017-6314" ref_url="https://www.suse.com/security/cve/CVE-2017-6314/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003191.html" source="SUSE-SU"/>
		<description>
This update for gdk-pixbuf fixes the following issues:

- CVE-2017-2862: JPEG gdk_pixbuf__jpeg_image_load_increment Code Execution Vulnerability (bsc#1048289)
- CVE-2017-2870: tiff_image_parse Code Execution Vulnerability (bsc#1048544)
- CVE-2017-6313: A dangerous integer underflow in io-icns.c (bsc#1027024)
- CVE-2017-6314: Infinite loop in io-tiff.c (bsc#1027025)
- CVE-2017-6312: Out-of-bounds read on io-ico.c (bsc#1027026)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-06"/>
	<updated date="2017-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027025">SUSE bug 1027025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027026">SUSE bug 1027026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048289">SUSE bug 1048289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048544">SUSE bug 1048544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049877">SUSE bug 1049877</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2862/">CVE-2017-2862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2862">CVE-2017-2862 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2870/">CVE-2017-2870 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2870">CVE-2017-2870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6312/">CVE-2017-6312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6312">CVE-2017-6312 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6313/">CVE-2017-6313 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6313">CVE-2017-6313 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6314/">CVE-2017-6314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6314">CVE-2017-6314 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518058" comment="gdk-pixbuf-lang-2.34.0-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549603" comment="gdk-pixbuf-query-loaders-2.34.0-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549604" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549605" comment="libgdk_pixbuf-2_0-0-2.34.0-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549606" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549607" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149385" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1046856" ref_url="https://bugzilla.suse.com/1046856" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000083" ref_url="https://www.suse.com/security/cve/CVE-2017-1000083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003194.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issue:

- CVE-2017-1000083: Remote attackers could have used the comicbook mode of evince to inject shell code (bsc#1046856).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-08"/>
	<updated date="2017-09-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046856">SUSE bug 1046856</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000083/">CVE-2017-1000083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000083">CVE-2017-1000083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549608" comment="evince-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549609" comment="evince-browser-plugin-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518066" comment="evince-lang-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549610" comment="evince-plugin-djvudocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549611" comment="evince-plugin-dvidocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549612" comment="evince-plugin-pdfdocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549613" comment="evince-plugin-psdocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549614" comment="evince-plugin-tiffdocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549615" comment="evince-plugin-xpsdocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549616" comment="libevdocument3-4-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549617" comment="libevview3-3-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549618" comment="nautilus-evince-3.20.1-6.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149386" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1011144" ref_url="https://bugzilla.suse.com/1011144" source="BUGZILLA"/>
		<reference ref_id="1031692" ref_url="https://bugzilla.suse.com/1031692" source="BUGZILLA"/>
		<reference ref_id="1046636" ref_url="https://bugzilla.suse.com/1046636" source="BUGZILLA"/>
		<reference ref_id="1047674" ref_url="https://bugzilla.suse.com/1047674" source="BUGZILLA"/>
		<reference ref_id="1048296" ref_url="https://bugzilla.suse.com/1048296" source="BUGZILLA"/>
		<reference ref_id="1048902" ref_url="https://bugzilla.suse.com/1048902" source="BUGZILLA"/>
		<reference ref_id="1049381" ref_url="https://bugzilla.suse.com/1049381" source="BUGZILLA"/>
		<reference ref_id="1050268" ref_url="https://bugzilla.suse.com/1050268" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003195.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

* CVE-2017-10664: Fix DOS vulnerability in qemu-nbd (bsc#1046636)
* CVE-2017-10806: Fix DOS from stack overflow in debug messages of usb redirection
  support (bsc#1047674) 
* CVE-2017-11334: Fix OOB access during DMA operation (bsc#1048902) 
* CVE-2017-11434: Fix OOB access parsing dhcp slirp options (bsc#1049381) 

Following non-security issues were fixed:

- Postrequire acl for setfacl
- Prerequire shadow for groupadd
- The recent security fix for CVE-2017-11334 adversely affects Xen.
  Include two additional patches to make sure Xen is going to be OK.
- Pre-add group kvm for qemu-tools (bsc#1011144)
- Fixed a few more inaccuracies in the support docs.
- Fix support docs to indicate ARM64 is now fully L3 supported in
  SLES 12 SP3. Apply a few additional clarifications in the support
  docs. (bsc#1050268)
- Adjust to libvdeplug-devel package naming changes.
- Fix migration with xhci (bsc#1048296)
- Increase VNC delay to fix missing keyboard input events (bsc#1031692)
- Remove build dependency package iasl used for seabios

		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-11"/>
	<updated date="2017-09-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1011144">SUSE bug 1011144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031692">SUSE bug 1031692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046636">SUSE bug 1046636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047674">SUSE bug 1047674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048296">SUSE bug 1048296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048902">SUSE bug 1048902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049381">SUSE bug 1049381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050268">SUSE bug 1050268</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10664">CVE-2017-10664 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10806">CVE-2017-10806 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11334">CVE-2017-11334 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11434">CVE-2017-11434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552572" comment="qemu-2.9.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552573" comment="qemu-arm-2.9.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552574" comment="qemu-block-curl-2.9.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552575" comment="qemu-block-rbd-2.9.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552576" comment="qemu-block-ssh-2.9.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552577" comment="qemu-guest-agent-2.9.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519446" comment="qemu-ipxe-1.0.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552578" comment="qemu-kvm-2.9.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552579" comment="qemu-lang-2.9.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552580" comment="qemu-ppc-2.9.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552581" comment="qemu-s390-2.9.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519448" comment="qemu-seabios-1.10.2-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519449" comment="qemu-sgabios-8-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552582" comment="qemu-tools-2.9.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519451" comment="qemu-vgabios-1.10.2-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519452" comment="qemu-x86-2.9.0-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149387" version="1" class="patch">
	<metadata>
		<title>Security update for cvs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1053364" ref_url="https://bugzilla.suse.com/1053364" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12836" ref_url="https://www.suse.com/security/cve/CVE-2017-12836/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003196.html" source="SUSE-SU"/>
		<description>
This update for cvs fixes the following issues:

  - CVE-2017-12836: A leading dash in the argument of the '-d' option could lead to argument injection (bsc#1053364)

  		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-12"/>
	<updated date="2017-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1053364">SUSE bug 1053364</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12836/">CVE-2017-12836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12836">CVE-2017-12836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549627" comment="cvs-1.12.12-182.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532408" comment="cvs-doc-1.12.12-182.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149388" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1055695" ref_url="https://bugzilla.suse.com/1055695" source="BUGZILLA"/>
		<reference ref_id="1056278" ref_url="https://bugzilla.suse.com/1056278" source="BUGZILLA"/>
		<reference ref_id="1056280" ref_url="https://bugzilla.suse.com/1056280" source="BUGZILLA"/>
		<reference ref_id="1056281" ref_url="https://bugzilla.suse.com/1056281" source="BUGZILLA"/>
		<reference ref_id="1056282" ref_url="https://bugzilla.suse.com/1056282" source="BUGZILLA"/>
		<reference ref_id="1057358" ref_url="https://bugzilla.suse.com/1057358" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14316" ref_url="https://www.suse.com/security/cve/CVE-2017-14316/" source="CVE"/>
		<reference ref_id="CVE-2017-14317" ref_url="https://www.suse.com/security/cve/CVE-2017-14317/" source="CVE"/>
		<reference ref_id="CVE-2017-14318" ref_url="https://www.suse.com/security/cve/CVE-2017-14318/" source="CVE"/>
		<reference ref_id="CVE-2017-14319" ref_url="https://www.suse.com/security/cve/CVE-2017-14319/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003197.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-14316: Missing bound check in function `alloc_heap_pages` for an
  internal array allowed attackers using crafted hypercalls to execute
  arbitrary code within Xen (XSA-231, bsc#1056278)
- CVE-2017-14318: The function __gnttab_cache_flush missed a check for grant
  tables, allowing a malicious guest to crash the host or for x86 PV guests to
  potentially escalate privileges (XSA-232, bsc#1056280)
- CVE-2017-14317: A race in cxenstored may have cause a double-free allowind for
  DoS of the xenstored daemon (XSA-233, bsc#1056281).
- CVE-2017-14319: An error while handling grant mappings allowed malicious or
  buggy x86 PV guest to escalate its privileges or crash the hypervisor (XSA-234,
  bsc#1056282).

These non-security issues were fixed:

- bsc#1057358: Fixed boot into SUSE Linux Enterprise 12.3 with secure boot
- bsc#1055695: Fixed restoring updates for HVM guests for ballooned domUs
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-12"/>
	<updated date="2017-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055695">SUSE bug 1055695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056278">SUSE bug 1056278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056280">SUSE bug 1056280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056281">SUSE bug 1056281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056282">SUSE bug 1056282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057358">SUSE bug 1057358</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14316/">CVE-2017-14316 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14316">CVE-2017-14316 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14317/">CVE-2017-14317 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14317">CVE-2017-14317 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14318/">CVE-2017-14318 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14318">CVE-2017-14318 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14319/">CVE-2017-14319 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14319">CVE-2017-14319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519453" comment="xen-4.9.0_12-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552583" comment="xen-doc-html-4.9.0_12-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519454" comment="xen-libs-4.9.0_12-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519455" comment="xen-libs-32bit-4.9.0_12-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552584" comment="xen-tools-4.9.0_12-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552585" comment="xen-tools-domU-4.9.0_12-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149389" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1057389" ref_url="https://bugzilla.suse.com/1057389" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003247.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to receive the following security fixes:

- CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel was
  vulnerable to a stack overflow while processing L2CAP configuration
  responses, resulting in a potential remote denial-of-service vulnerability
  but no remote code execution due to use of CONFIG_CC_STACKPROTECTOR.
  [bnc#1057389]
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-18"/>
	<updated date="2017-09-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057389">SUSE bug 1057389</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000251">CVE-2017-1000251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552586" comment="kernel-default-4.4.82-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552587" comment="kernel-default-base-4.4.82-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552588" comment="kernel-default-devel-4.4.82-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552589" comment="kernel-default-man-4.4.82-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519459" comment="kernel-devel-4.4.82-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519460" comment="kernel-macros-4.4.82-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519461" comment="kernel-source-4.4.82-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552590" comment="kernel-syms-4.4.82-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149390" version="1" class="patch">
	<metadata>
		<title>Security update for gcc48 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1011348" ref_url="https://bugzilla.suse.com/1011348" source="BUGZILLA"/>
		<reference ref_id="1022062" ref_url="https://bugzilla.suse.com/1022062" source="BUGZILLA"/>
		<reference ref_id="1028744" ref_url="https://bugzilla.suse.com/1028744" source="BUGZILLA"/>
		<reference ref_id="1039513" ref_url="https://bugzilla.suse.com/1039513" source="BUGZILLA"/>
		<reference ref_id="1044016" ref_url="https://bugzilla.suse.com/1044016" source="BUGZILLA"/>
		<reference ref_id="1050947" ref_url="https://bugzilla.suse.com/1050947" source="BUGZILLA"/>
		<reference ref_id="988274" ref_url="https://bugzilla.suse.com/988274" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11671" ref_url="https://www.suse.com/security/cve/CVE-2017-11671/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003249.html" source="SUSE-SU"/>
		<description>
This update for gcc48 fixes the following issues:

Security issues fixed:

- A new option -fstack-clash-protection is now offered, which mitigates the stack clash type of attacks. [bnc#1039513]
  Future maintenance releases of packages will be built with this option.
- CVE-2017-11671: Fixed rdrand/rdseed code generation issue [bsc#1050947]

Bugs fixed:

- Enable LFS support in 32bit libgcov.a.  [bsc#1044016]
- Bump libffi version in libffi.pc to 3.0.11.
- Fix libffi issue for armv7l.  [bsc#988274]
- Properly diagnose missing -fsanitize=address support on ppc64le.  [bnc#1028744]
- Backport patch for PR65612.  [bnc#1022062]
- Fixed DR#1288.  [bnc#1011348]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-19"/>
	<updated date="2017-09-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011348">SUSE bug 1011348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022062">SUSE bug 1022062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028744">SUSE bug 1028744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039513">SUSE bug 1039513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044016">SUSE bug 1044016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050947">SUSE bug 1050947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988274">SUSE bug 988274</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-11671/">CVE-2017-11671 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11671">CVE-2017-11671 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549642" comment="cpp48-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545006" comment="gcc48-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545007" comment="gcc48-32bit-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545008" comment="gcc48-c++-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518111" comment="gcc48-info-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545009" comment="gcc48-locale-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518112" comment="libasan0-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518113" comment="libasan0-32bit-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545010" comment="libstdc++48-devel-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545011" comment="libstdc++48-devel-32bit-4.8.5-31.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149391" version="1" class="patch">
	<metadata>
		<title>Security update for emacs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1058425" ref_url="https://bugzilla.suse.com/1058425" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14482" ref_url="https://www.suse.com/security/cve/CVE-2017-14482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003250.html" source="SUSE-SU"/>
		<description>
This update for emacs fixes one issues.

This security issue was fixed:

- CVE-2017-14482: Remote code execution via mails with 'Content-Type: text/enriched' (bsc#1058425)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-20"/>
	<updated date="2017-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058425">SUSE bug 1058425</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14482/">CVE-2017-14482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14482">CVE-2017-14482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549643" comment="emacs-24.3-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532420" comment="emacs-el-24.3-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518121" comment="emacs-info-24.3-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549644" comment="emacs-nox-24.3-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549645" comment="emacs-x11-24.3-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549646" comment="etags-24.3-25.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149392" version="1" class="patch">
	<metadata>
		<title>Security update for libzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1056996" ref_url="https://bugzilla.suse.com/1056996" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14107" ref_url="https://www.suse.com/security/cve/CVE-2017-14107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003255.html" source="SUSE-SU"/>
		<description>
This update for libzip fixes one issues.

This security issue was fixed:

- CVE-2017-14107: The _zip_read_eocd64 function mishandled EOCD records, which
  allowed remote attackers to cause a denial of service (memory allocation
  failure in _zip_cdir_grow in zip_dirent.c) via a crafted ZIP archive (bsc#1056996).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-21"/>
	<updated date="2017-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056996">SUSE bug 1056996</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14107/">CVE-2017-14107 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14107">CVE-2017-14107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549647" comment="libzip2-0.11.1-13.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149393" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1058058" ref_url="https://bugzilla.suse.com/1058058" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9798" ref_url="https://www.suse.com/security/cve/CVE-2017-9798/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003254.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following security issue:

- CVE-2017-9798: Prevent use-after-free use of memory that allowed for an
  information leak via OPTIONS (bsc#1058058).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-21"/>
	<updated date="2017-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1058058">SUSE bug 1058058</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9798/">CVE-2017-9798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9798">CVE-2017-9798 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549648" comment="apache2-2.4.23-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532426" comment="apache2-doc-2.4.23-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549649" comment="apache2-example-pages-2.4.23-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549650" comment="apache2-prefork-2.4.23-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549651" comment="apache2-utils-2.4.23-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549652" comment="apache2-worker-2.4.23-29.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149394" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1046779" ref_url="https://bugzilla.suse.com/1046779" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7506" ref_url="https://www.suse.com/security/cve/CVE-2017-7506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003257.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following security issues:

- CVE-2017-7506: Fixed an out-of-bounds memory access when processing specially
  crafted messages from authenticated attacker to the spice server resulting into
  crash and/or server memory leak (bsc#1046779).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-22"/>
	<updated date="2017-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046779">SUSE bug 1046779</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7506/">CVE-2017-7506 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7506">CVE-2017-7506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552591" comment="libspice-server1-0.12.8-3.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149395" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1044417" ref_url="https://bugzilla.suse.com/1044417" source="BUGZILLA"/>
		<reference ref_id="1045341" ref_url="https://bugzilla.suse.com/1045341" source="BUGZILLA"/>
		<reference ref_id="1056248" ref_url="https://bugzilla.suse.com/1056248" source="BUGZILLA"/>
		<reference ref_id="1056249" ref_url="https://bugzilla.suse.com/1056249" source="BUGZILLA"/>
		<reference ref_id="1056251" ref_url="https://bugzilla.suse.com/1056251" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13765" ref_url="https://www.suse.com/security/cve/CVE-2017-13765/" source="CVE"/>
		<reference ref_id="CVE-2017-13766" ref_url="https://www.suse.com/security/cve/CVE-2017-13766/" source="CVE"/>
		<reference ref_id="CVE-2017-13767" ref_url="https://www.suse.com/security/cve/CVE-2017-13767/" source="CVE"/>
		<reference ref_id="CVE-2017-9617" ref_url="https://www.suse.com/security/cve/CVE-2017-9617/" source="CVE"/>
		<reference ref_id="CVE-2017-9766" ref_url="https://www.suse.com/security/cve/CVE-2017-9766/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003258.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.2.9 fixes several issues.

These security issues were fixed:

- CVE-2017-13767: The MSDP dissector could have gone into an infinite loop.
  This was addressed by adding length validation (bsc#1056248).
- CVE-2017-13766: The Profinet I/O dissector could have crash with an
  out-of-bounds write. This was addressed by adding string validation
  (bsc#1056249).
- CVE-2017-13765: The IrCOMM dissector had a buffer over-read and application
  crash. This was addressed by adding length validation (bsc#1056251).
- CVE-2017-9766: PROFINET IO data with a high recursion depth allowed remote
  attackers to cause a denial of service (stack exhaustion) in the
  dissect_IODWriteReq function (bsc#1045341).
- CVE-2017-9617: Deeply nested DAAP data may have cause stack exhaustion
  (uncontrolled recursion) in the dissect_daap_one_tag function in the DAAP
  dissector (bsc#1044417).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-22"/>
	<updated date="2017-09-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044417">SUSE bug 1044417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045341">SUSE bug 1045341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056248">SUSE bug 1056248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056249">SUSE bug 1056249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056251">SUSE bug 1056251</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13765/">CVE-2017-13765 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13765">CVE-2017-13765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13766/">CVE-2017-13766 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13766">CVE-2017-13766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13767/">CVE-2017-13767 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13767">CVE-2017-13767 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9617/">CVE-2017-9617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9617">CVE-2017-9617 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9766/">CVE-2017-9766 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9766">CVE-2017-9766 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549653" comment="libwireshark8-2.2.9-48.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549654" comment="libwiretap6-2.2.9-48.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549655" comment="libwscodecs1-2.2.9-48.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549656" comment="libwsutil7-2.2.9-48.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549657" comment="wireshark-2.2.9-48.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549658" comment="wireshark-gtk-2.2.9-48.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149396" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1033109" ref_url="https://bugzilla.suse.com/1033109" source="BUGZILLA"/>
		<reference ref_id="1033111" ref_url="https://bugzilla.suse.com/1033111" source="BUGZILLA"/>
		<reference ref_id="1033112" ref_url="https://bugzilla.suse.com/1033112" source="BUGZILLA"/>
		<reference ref_id="1033113" ref_url="https://bugzilla.suse.com/1033113" source="BUGZILLA"/>
		<reference ref_id="1033118" ref_url="https://bugzilla.suse.com/1033118" source="BUGZILLA"/>
		<reference ref_id="1033120" ref_url="https://bugzilla.suse.com/1033120" source="BUGZILLA"/>
		<reference ref_id="1033126" ref_url="https://bugzilla.suse.com/1033126" source="BUGZILLA"/>
		<reference ref_id="1033127" ref_url="https://bugzilla.suse.com/1033127" source="BUGZILLA"/>
		<reference ref_id="1033128" ref_url="https://bugzilla.suse.com/1033128" source="BUGZILLA"/>
		<reference ref_id="1033129" ref_url="https://bugzilla.suse.com/1033129" source="BUGZILLA"/>
		<reference ref_id="1033131" ref_url="https://bugzilla.suse.com/1033131" source="BUGZILLA"/>
		<reference ref_id="1038438" ref_url="https://bugzilla.suse.com/1038438" source="BUGZILLA"/>
		<reference ref_id="1042804" ref_url="https://bugzilla.suse.com/1042804" source="BUGZILLA"/>
		<reference ref_id="1042805" ref_url="https://bugzilla.suse.com/1042805" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10371" ref_url="https://www.suse.com/security/cve/CVE-2016-10371/" source="CVE"/>
		<reference ref_id="CVE-2017-7592" ref_url="https://www.suse.com/security/cve/CVE-2017-7592/" source="CVE"/>
		<reference ref_id="CVE-2017-7593" ref_url="https://www.suse.com/security/cve/CVE-2017-7593/" source="CVE"/>
		<reference ref_id="CVE-2017-7594" ref_url="https://www.suse.com/security/cve/CVE-2017-7594/" source="CVE"/>
		<reference ref_id="CVE-2017-7595" ref_url="https://www.suse.com/security/cve/CVE-2017-7595/" source="CVE"/>
		<reference ref_id="CVE-2017-7596" ref_url="https://www.suse.com/security/cve/CVE-2017-7596/" source="CVE"/>
		<reference ref_id="CVE-2017-7597" ref_url="https://www.suse.com/security/cve/CVE-2017-7597/" source="CVE"/>
		<reference ref_id="CVE-2017-7598" ref_url="https://www.suse.com/security/cve/CVE-2017-7598/" source="CVE"/>
		<reference ref_id="CVE-2017-7599" ref_url="https://www.suse.com/security/cve/CVE-2017-7599/" source="CVE"/>
		<reference ref_id="CVE-2017-7600" ref_url="https://www.suse.com/security/cve/CVE-2017-7600/" source="CVE"/>
		<reference ref_id="CVE-2017-7601" ref_url="https://www.suse.com/security/cve/CVE-2017-7601/" source="CVE"/>
		<reference ref_id="CVE-2017-7602" ref_url="https://www.suse.com/security/cve/CVE-2017-7602/" source="CVE"/>
		<reference ref_id="CVE-2017-9403" ref_url="https://www.suse.com/security/cve/CVE-2017-9403/" source="CVE"/>
		<reference ref_id="CVE-2017-9404" ref_url="https://www.suse.com/security/cve/CVE-2017-9404/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<description>
This update for tiff to version 4.0.8 fixes a several bugs and security issues:

These security issues were fixed:

- CVE-2017-7595: The JPEGSetupEncode function allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image (bsc#1033127).
- CVE-2016-10371: The TIFFWriteDirectoryTagCheckedRational function allowed remote attackers to cause a denial of service (assertion failure and application exit) via a crafted TIFF file (bsc#1038438).
- CVE-2017-7598: Error in tif_dirread.c allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image (bsc#1033118).
- CVE-2017-7596: Undefined behavior because of floats outside their expected value range, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033126).
- CVE-2017-7597: Undefined behavior because of floats outside their expected value range, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033120).
- CVE-2017-7599: Undefined behavior because of shorts outside their expected value range, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033113).
- CVE-2017-7600: Undefined behavior because of chars outside their expected value range, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033112).
- CVE-2017-7601: Because of a shift exponent too large for 64-bit type long undefined behavior was caused, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033111).
- CVE-2017-7602: Prevent signed integer overflow, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033109).
- CVE-2017-7592: The putagreytile function had a left-shift undefined behavior issue, which might allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033131).
- CVE-2017-7593: Ensure that tif_rawdata is properly initialized, to prevent remote attackers to obtain sensitive information from process memory via a crafted image (bsc#1033129).
- CVE-2017-7594: The OJPEGReadHeaderInfoSecTablesDcTable function allowed remote attackers to cause a denial of service (memory leak) via a crafted image (bsc#1033128).
- CVE-2017-9403: Prevent memory leak in function TIFFReadDirEntryLong8Array, which allowed attackers to cause a denial of service via a crafted file (bsc#1042805).
- CVE-2017-9404: Fixed memory leak vulnerability in function OJPEGReadHeaderInfoSecTablesQTable, which allowed attackers to cause a denial of service via a crafted file (bsc#1042804).

These various other issues were fixed:

- Fix uint32 overflow in TIFFReadEncodedStrip() that caused an
  integer division by zero. Reported by Agostino Sarubbo.
- fix heap-based buffer overflow on generation of PixarLog / LUV
  compressed files, with ColorMap, TransferFunction attached and
  nasty plays with bitspersample. The fix for LUV has not been
  tested, but suffers from the same kind of issue of PixarLog.
- modify ChopUpSingleUncompressedStrip() to instanciate compute
  ntrips as TIFFhowmany_32(td-&gt;td_imagelength, rowsperstrip),
  instead of a logic based on the total size of data. Which is
  faulty is the total size of data is not sufficient to fill the
  whole image, and thus results in reading outside of the
  StripByCounts/StripOffsets arrays when using
  TIFFReadScanline()
- make OJPEGDecode() early exit in case of failure in
  OJPEGPreDecode(). This will avoid a divide by zero, and
  potential other issues.
- fix misleading indentation as warned by GCC.
- revert change done on 2016-01-09 that made Param member of
  TIFFFaxTabEnt structure a uint16 to reduce size of the
  binary. It happens that the Hylafax software uses the tables
  that follow this typedef (TIFFFaxMainTable, TIFFFaxWhiteTable,
  TIFFFaxBlackTable), although they are not in a public libtiff
  header.
- add TIFFReadRGBAStripExt() and TIFFReadRGBATileExt() variants
  of the functions without ext, with an extra argument to control
  the stop_on_error behaviour.
- fix potential memory leaks in error code path of
  TIFFRGBAImageBegin().
- increase libjpeg max memory usable to 10 MB instead of libjpeg
  1MB default. This helps when creating files with 'big' tile,
  without using libjpeg temporary files.
- add _TIFFcalloc()
- return 0 in Encode functions instead of -1 when
  TIFFFlushData1() fails.
- only run JPEGFixupTagsSubsampling() if the YCbCrSubsampling
  tag is not explicitly present. This helps a bit to reduce the
  I/O amount when the tag is present (especially on cloud hosted
  files).
- in LZWPostEncode(), increase, if necessary, the code bit-width
  after flushing the remaining code and before emitting the EOI
  code.
- fix memory leak in error code path of PixarLogSetupDecode().
- fix potential memory leak in
  OJPEGReadHeaderInfoSecTablesQTable,
  OJPEGReadHeaderInfoSecTablesDcTable and
  OJPEGReadHeaderInfoSecTablesAcTable
- avoid crash in Fax3Close() on empty file.
- TIFFFillStrip(): add limitation to the number of bytes read
  in case td_stripbytecount[strip] is bigger than reasonable,
  so as to avoid excessive memory allocation.
- fix memory leak when the underlying codec (ZIP, PixarLog)
  succeeds its setupdecode() method, but PredictorSetup fails.
- TIFFFillStrip() and TIFFFillTile(): avoid excessive memory
  allocation in case of shorten files. Only effective on 64 bit
  builds and non-mapped cases.
- TIFFFillStripPartial() / TIFFSeek(), avoid potential integer
  overflows with read_ahead in CHUNKY_STRIP_READ_SUPPORT mode.
- avoid excessive memory allocation in case of shorten files.
  Only effective on 64 bit builds.
- update tif_rawcc in CHUNKY_STRIP_READ_SUPPORT mode with
  tif_rawdataloaded when calling TIFFStartStrip() or
  TIFFFillStripPartial(). 
- avoid potential int32 overflow in TIFFYCbCrToRGBInit() Fixes
- avoid potential int32 overflows in multiply_ms() and add_ms().
- fix out-of-buffer read in PackBitsDecode() Fixes
- LogL16InitState(): avoid excessive memory allocation when
  RowsPerStrip tag is missing.
- update dec_bitsleft at beginning of LZWDecode(), and update
  tif_rawcc at end of LZWDecode(). This is needed to properly
  work with the latest chnges in tif_read.c in
  CHUNKY_STRIP_READ_SUPPORT mode.
- PixarLogDecode(): resync tif_rawcp with next_in and tif_rawcc
  with avail_in at beginning and end of function, similarly to
  what is done in LZWDecode(). Likely needed so that it works
  properly with latest chnges in tif_read.c in
  CHUNKY_STRIP_READ_SUPPORT mode.
- initYCbCrConversion(): add basic validation of luma and
  refBlackWhite coefficients (just check they are not NaN for
  now), to avoid potential float to int overflows.
- _TIFFVSetField(): fix outside range cast of double to float.
- initYCbCrConversion(): check luma[1] is not zero to avoid division by zero
- _TIFFVSetField(): fix outside range cast of double to float.
- initYCbCrConversion(): check luma[1] is not zero to avoid
  division by zero.
- initYCbCrConversion(): stricter validation for refBlackWhite
  coefficients values.
- avoid uint32 underflow in cpDecodedStrips that can cause
  various issues, such as buffer overflows in the library.
- fix readContigStripsIntoBuffer() in -i (ignore) mode so that
  the output buffer is correctly incremented to avoid write
  outside bounds.
- add 3 extra bytes at end of strip buffer in
  readSeparateStripsIntoBuffer() to avoid read outside of heap
  allocated buffer.
- fix integer division by zero when BitsPerSample is missing.
- fix null pointer dereference in -r mode when the image has no
  StripByteCount tag.
- avoid potential division by zero is BitsPerSamples tag is
  missing.
- when TIFFGetField(, TIFFTAG_NUMBEROFINKS, ) is called, limit
  the return number of inks to SamplesPerPixel, so that code
  that parses ink names doesn't go past the end of the buffer.
- avoid potential division by zero is BitsPerSamples tag is
  missing.
- fix uint32 underflow/overflow that can cause heap-based buffer
  overflow.
- replace assert( (bps % 8) == 0 ) by a non assert check.
- fix 2 heap-based buffer overflows (in PSDataBW and
  PSDataColorContig).
- prevent heap-based buffer overflow in -j mode on a paletted
  image.
- fix wrong usage of memcpy() that can trigger unspecified behaviour.
- avoid potential invalid memory read in t2p_writeproc.
- avoid potential heap-based overflow in t2p_readwrite_pdf_image_tile().
- remove extraneous TIFFClose() in error code path, that caused
  double free.
- error out cleanly in cpContig2SeparateByRow and
  cpSeparate2ContigByRow if BitsPerSample != 8 to avoid heap
  based overflow.
- avoid integer division by zero.
- call TIFFClose() in error code paths.
- emit appropriate message if the input file is empty.
- close TIFF handle in error code path.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-26"/>
	<updated date="2017-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033109">SUSE bug 1033109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033111">SUSE bug 1033111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033118">SUSE bug 1033118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033127">SUSE bug 1033127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033128">SUSE bug 1033128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033129">SUSE bug 1033129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033131">SUSE bug 1033131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038438">SUSE bug 1038438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042804">SUSE bug 1042804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042805">SUSE bug 1042805</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10371/">CVE-2016-10371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10371">CVE-2016-10371 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7592/">CVE-2017-7592 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7592">CVE-2017-7592 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7593/">CVE-2017-7593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7593">CVE-2017-7593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7594/">CVE-2017-7594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7594">CVE-2017-7594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7595/">CVE-2017-7595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7595">CVE-2017-7595 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7596/">CVE-2017-7596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7596">CVE-2017-7596 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7597/">CVE-2017-7597 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7597">CVE-2017-7597 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7598/">CVE-2017-7598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7598">CVE-2017-7598 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7599/">CVE-2017-7599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7599">CVE-2017-7599 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7600/">CVE-2017-7600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7600">CVE-2017-7600 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7601/">CVE-2017-7601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7601">CVE-2017-7601 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7602/">CVE-2017-7602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7602">CVE-2017-7602 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9403/">CVE-2017-9403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9403">CVE-2017-9403 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9404/">CVE-2017-9404 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9404">CVE-2017-9404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549659" comment="libtiff5-4.0.8-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549660" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549661" comment="tiff-4.0.8-44.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149397" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1056088" ref_url="https://bugzilla.suse.com/1056088" source="BUGZILLA"/>
		<reference ref_id="1056090" ref_url="https://bugzilla.suse.com/1056090" source="BUGZILLA"/>
		<reference ref_id="1056093" ref_url="https://bugzilla.suse.com/1056093" source="BUGZILLA"/>
		<reference ref_id="1056095" ref_url="https://bugzilla.suse.com/1056095" source="BUGZILLA"/>
		<reference ref_id="1056097" ref_url="https://bugzilla.suse.com/1056097" source="BUGZILLA"/>
		<reference ref_id="1056101" ref_url="https://bugzilla.suse.com/1056101" source="BUGZILLA"/>
		<reference ref_id="1056105" ref_url="https://bugzilla.suse.com/1056105" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13738" ref_url="https://www.suse.com/security/cve/CVE-2017-13738/" source="CVE"/>
		<reference ref_id="CVE-2017-13739" ref_url="https://www.suse.com/security/cve/CVE-2017-13739/" source="CVE"/>
		<reference ref_id="CVE-2017-13740" ref_url="https://www.suse.com/security/cve/CVE-2017-13740/" source="CVE"/>
		<reference ref_id="CVE-2017-13741" ref_url="https://www.suse.com/security/cve/CVE-2017-13741/" source="CVE"/>
		<reference ref_id="CVE-2017-13743" ref_url="https://www.suse.com/security/cve/CVE-2017-13743/" source="CVE"/>
		<reference ref_id="CVE-2017-13744" ref_url="https://www.suse.com/security/cve/CVE-2017-13744/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003260.html" source="SUSE-SU"/>
		<description>
This update for liblouis fixes several issues.

These security issues were fixed:

- CVE-2017-13738: Prevent illegal address access in the _lou_getALine function that allowed to cause remote DoS (bsc#1056105).
- CVE-2017-13739: Prevent heap-based buffer overflow in the function resolveSubtable() that could have caused DoS or remote code execution (bsc#1056101).
- CVE-2017-13740: Prevent stack-based buffer overflow in the function parseChars() that could have caused DoS or possibly unspecified other impact (bsc#1056097) 
- CVE-2017-13741: Prevent use-after-free in function compileBrailleIndicator() that allowed to cause remote DoS (bsc#1056095).
- CVE_2017-13742: Prevent stack-based buffer overflow in function includeFile that allowed to cause remote DoS (bsc#1056093).
- CVE-2017-13743: Prevent buffer overflow triggered in the function _lou_showString() that allowed to cause remote DoS (bsc#1056090).
- CVE-2017-13744: Prevent illegal address access in the function _lou_getALine() that allowed to cause remote DoS (bsc#1056088).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-26"/>
	<updated date="2017-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056088">SUSE bug 1056088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056090">SUSE bug 1056090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056093">SUSE bug 1056093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056095">SUSE bug 1056095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056097">SUSE bug 1056097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056101">SUSE bug 1056101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056105">SUSE bug 1056105</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13738/">CVE-2017-13738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13738">CVE-2017-13738 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13739/">CVE-2017-13739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13739">CVE-2017-13739 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13740/">CVE-2017-13740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13740">CVE-2017-13740 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13741/">CVE-2017-13741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13741">CVE-2017-13741 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13743/">CVE-2017-13743 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13743">CVE-2017-13743 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13744/">CVE-2017-13744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13744">CVE-2017-13744 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549662" comment="liblouis-data-2.6.4-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549663" comment="liblouis9-2.6.4-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549664" comment="python-louis-2.6.4-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549665" comment="python3-louis-2.6.4-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149398" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1052829" ref_url="https://bugzilla.suse.com/1052829" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003261.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to ESR 52.3 fixes several issues.

These security issues were fixed: 

- CVE-2017-7807 Domain hijacking through AppCache fallback (bsc#1052829)
- CVE-2017-7791 Spoofing following page navigation with data: protocol and modal alerts (bsc#1052829)
- CVE-2017-7792 Buffer overflow viewing certificates with an extremely long OID (bsc#1052829)
- CVE-2017-7782 WindowsDllDetourPatcher allocates memory without DEP protections (bsc#1052829)
- CVE-2017-7787 Same-origin policy bypass with iframes through page reloads (bsc#1052829)
- CVE-2017-7786 Buffer overflow while painting non-displayable SVG (bsc#1052829)
- CVE-2017-7785 Buffer overflow manipulating ARIA attributes in DOM (bsc#1052829)
- CVE-2017-7784 Use-after-free with image observers (bsc#1052829)
- CVE-2017-7753 Out-of-bounds read with cached style data and pseudo-elements (bsc#1052829)
- CVE-2017-7798 XUL injection in the style editor in devtools (bsc#1052829)
- CVE-2017-7804 Memory protection bypass through WindowsDllDetourPatcher (bsc#1052829)
- CVE-2017-7779 Memory safety bugs fixed in Firefox 55 and Firefox ESR 52.3 (bsc#1052829)
- CVE-2017-7800 Use-after-free in WebSockets during disconnection (bsc#1052829)
- CVE-2017-7801 Use-after-free with marquee during window resizing (bsc#1052829)
- CVE-2017-7802 Use-after-free resizing image elements (bsc#1052829)
- CVE-2017-7803 CSP containing 'sandbox' improperly applied (bsc#1052829)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-28"/>
	<updated date="2017-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7753">CVE-2017-7753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7779">CVE-2017-7779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7782">CVE-2017-7782 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7784">CVE-2017-7784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7785">CVE-2017-7785 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7786">CVE-2017-7786 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7787">CVE-2017-7787 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7791">CVE-2017-7791 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7792">CVE-2017-7792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7798">CVE-2017-7798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7800">CVE-2017-7800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7801">CVE-2017-7801 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7802">CVE-2017-7802 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7803">CVE-2017-7803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7804">CVE-2017-7804 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7807">CVE-2017-7807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549666" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549667" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149399" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1045693" ref_url="https://bugzilla.suse.com/1045693" source="BUGZILLA"/>
		<reference ref_id="1049505" ref_url="https://bugzilla.suse.com/1049505" source="BUGZILLA"/>
		<reference ref_id="1051017" ref_url="https://bugzilla.suse.com/1051017" source="BUGZILLA"/>
		<reference ref_id="1053600" ref_url="https://bugzilla.suse.com/1053600" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003264.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes several issues.

This security issue was fixed:

- bsc#1053600: Escape ssh commed line to prevent interpreting malicious
  hostname as arguments, allowing for command execution

These non-security issues were fixed:

- bsc#1049505, bsc#1051017: Security manager: Don't autogenerate seclabels of
  type 'none' when AppArmor is inactive
- bsc#1045693: Support chardevs with ARM machines 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-29"/>
	<updated date="2017-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1045693">SUSE bug 1045693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049505">SUSE bug 1049505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051017">SUSE bug 1051017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053600">SUSE bug 1053600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552592" comment="libvirt-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552593" comment="libvirt-admin-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552594" comment="libvirt-client-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552595" comment="libvirt-daemon-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552596" comment="libvirt-daemon-config-network-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552597" comment="libvirt-daemon-config-nwfilter-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552598" comment="libvirt-daemon-driver-interface-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519471" comment="libvirt-daemon-driver-libxl-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552599" comment="libvirt-daemon-driver-lxc-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552600" comment="libvirt-daemon-driver-network-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552601" comment="libvirt-daemon-driver-nodedev-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552602" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552603" comment="libvirt-daemon-driver-qemu-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552604" comment="libvirt-daemon-driver-secret-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552605" comment="libvirt-daemon-driver-storage-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552606" comment="libvirt-daemon-driver-storage-core-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552607" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552608" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552609" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552610" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552611" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552612" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552613" comment="libvirt-daemon-lxc-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552614" comment="libvirt-daemon-qemu-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519488" comment="libvirt-daemon-xen-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552615" comment="libvirt-doc-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552616" comment="libvirt-libs-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552617" comment="libvirt-lock-sanlock-3.3.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552618" comment="libvirt-nss-3.3.0-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149400" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1060354" ref_url="https://bugzilla.suse.com/1060354" source="BUGZILLA"/>
		<reference ref_id="1060355" ref_url="https://bugzilla.suse.com/1060355" source="BUGZILLA"/>
		<reference ref_id="1060360" ref_url="https://bugzilla.suse.com/1060360" source="BUGZILLA"/>
		<reference ref_id="1060361" ref_url="https://bugzilla.suse.com/1060361" source="BUGZILLA"/>
		<reference ref_id="1060362" ref_url="https://bugzilla.suse.com/1060362" source="BUGZILLA"/>
		<reference ref_id="1060364" ref_url="https://bugzilla.suse.com/1060364" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14491" ref_url="https://www.suse.com/security/cve/CVE-2017-14491/" source="CVE"/>
		<reference ref_id="CVE-2017-14492" ref_url="https://www.suse.com/security/cve/CVE-2017-14492/" source="CVE"/>
		<reference ref_id="CVE-2017-14493" ref_url="https://www.suse.com/security/cve/CVE-2017-14493/" source="CVE"/>
		<reference ref_id="CVE-2017-14494" ref_url="https://www.suse.com/security/cve/CVE-2017-14494/" source="CVE"/>
		<reference ref_id="CVE-2017-14495" ref_url="https://www.suse.com/security/cve/CVE-2017-14495/" source="CVE"/>
		<reference ref_id="CVE-2017-14496" ref_url="https://www.suse.com/security/cve/CVE-2017-14496/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following security issues:

- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]
- CVE-2017-14492: heap based overflow. [bsc#1060355]
- CVE-2017-14493: stack based overflow. [bsc#1060360]
- CVE-2017-14494: DHCP - info leak. [bsc#1060361]
- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]
- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-02"/>
	<updated date="2017-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060354">SUSE bug 1060354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060355">SUSE bug 1060355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14491/">CVE-2017-14491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14491">CVE-2017-14491 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14492/">CVE-2017-14492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14492">CVE-2017-14492 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14493/">CVE-2017-14493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14493">CVE-2017-14493 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14494/">CVE-2017-14494 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14494">CVE-2017-14494 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14495/">CVE-2017-14495 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14495">CVE-2017-14495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14496/">CVE-2017-14496 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14496">CVE-2017-14496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549669" comment="dnsmasq-2.78-18.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149401" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1056421" ref_url="https://bugzilla.suse.com/1056421" source="BUGZILLA"/>
		<reference ref_id="1056562" ref_url="https://bugzilla.suse.com/1056562" source="BUGZILLA"/>
		<reference ref_id="1056621" ref_url="https://bugzilla.suse.com/1056621" source="BUGZILLA"/>
		<reference ref_id="1056622" ref_url="https://bugzilla.suse.com/1056622" source="BUGZILLA"/>
		<reference ref_id="1057511" ref_url="https://bugzilla.suse.com/1057511" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10507" ref_url="https://www.suse.com/security/cve/CVE-2016-10507/" source="CVE"/>
		<reference ref_id="CVE-2017-14039" ref_url="https://www.suse.com/security/cve/CVE-2017-14039/" source="CVE"/>
		<reference ref_id="CVE-2017-14040" ref_url="https://www.suse.com/security/cve/CVE-2017-14040/" source="CVE"/>
		<reference ref_id="CVE-2017-14041" ref_url="https://www.suse.com/security/cve/CVE-2017-14041/" source="CVE"/>
		<reference ref_id="CVE-2017-14164" ref_url="https://www.suse.com/security/cve/CVE-2017-14164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003274.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes several issues.

These security issues were fixed:

- CVE-2016-10507: Integer overflow vulnerability in the bmp24toimage function
  allowed remote attackers to cause a denial of service (heap-based buffer
  over-read and application crash) via a crafted bmp file (bsc#1056421).
- CVE-2017-14039: A heap-based buffer overflow was discovered in the
  opj_t2_encode_packet function. The vulnerability caused an out-of-bounds write,
  which may have lead to remote denial of service or possibly unspecified other
  impact (bsc#1056622).
- CVE-2017-14164: A size-validation issue was discovered in opj_j2k_write_sot.
  The vulnerability caused an out-of-bounds write, which may have lead to remote
  DoS or possibly remote code execution (bsc#1057511).
- CVE-2017-14040: An invalid write access was discovered in bin/jp2/convert.c,
  triggering a crash in the tgatoimage function. The vulnerability may have lead
  to remote denial of service or possibly unspecified other impact (bsc#1056621).
- CVE-2017-14041: A stack-based buffer overflow was discovered in the
  pgxtoimage function. The vulnerability caused an out-of-bounds write, which may
  have lead to remote denial of service or possibly remote code execution
  (bsc#1056562).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-05"/>
	<updated date="2017-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056421">SUSE bug 1056421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056562">SUSE bug 1056562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056621">SUSE bug 1056621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056622">SUSE bug 1056622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057511">SUSE bug 1057511</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10507/">CVE-2016-10507 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10507">CVE-2016-10507 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14039/">CVE-2017-14039 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14039">CVE-2017-14039 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14040/">CVE-2017-14040 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14040">CVE-2017-14040 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14041/">CVE-2017-14041 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14041">CVE-2017-14041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14164/">CVE-2017-14164 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14164">CVE-2017-14164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549670" comment="libopenjp2-7-2.1.0-4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149402" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1032680" ref_url="https://bugzilla.suse.com/1032680" source="BUGZILLA"/>
		<reference ref_id="1054028" ref_url="https://bugzilla.suse.com/1054028" source="BUGZILLA"/>
		<reference ref_id="1056995" ref_url="https://bugzilla.suse.com/1056995" source="BUGZILLA"/>
		<reference ref_id="903543" ref_url="https://bugzilla.suse.com/903543" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11462" ref_url="https://www.suse.com/security/cve/CVE-2017-11462/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003277.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes several issues.

This security issue was fixed:

- CVE-2017-11462: Prevent automatic security context deletion to prevent
  double-free (bsc#1056995)

These non-security issues were fixed:

- Set 'rdns' and 'dns_canonicalize_hostname' to false in krb5.conf
  in order to improve client security in handling service principle
  names. (bsc#1054028)
- Prevent kadmind.service startup failure caused by absence of
  LDAP service. (bsc#903543)
- Remove main package's dependency on systemd (bsc#1032680)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-09"/>
	<updated date="2017-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1032680">SUSE bug 1032680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054028">SUSE bug 1054028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056995">SUSE bug 1056995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903543">SUSE bug 903543</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11462/">CVE-2017-11462 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11462">CVE-2017-11462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549714" comment="krb5-1.12.5-40.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549715" comment="krb5-32bit-1.12.5-40.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549716" comment="krb5-client-1.12.5-40.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549717" comment="krb5-doc-1.12.5-40.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549718" comment="krb5-plugin-kdb-ldap-1.12.5-40.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549719" comment="krb5-plugin-preauth-otp-1.12.5-40.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549720" comment="krb5-plugin-preauth-pkinit-1.12.5-40.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549721" comment="krb5-server-1.12.5-40.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149403" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1060445" ref_url="https://bugzilla.suse.com/1060445" source="BUGZILLA"/>
		<reference ref_id="1061005" ref_url="https://bugzilla.suse.com/1061005" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<reference ref_id="CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003282.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to ESR 52.4, mozilla-nss fixes the following issues:

This security issue was fixed for mozilla-nss:

- CVE-2017-7805: Prevent use-after-free in TLS 1.2 when generating handshake hashes (bsc#1061005)

These security issues were fixed for Firefox 

- CVE-2017-7825: Fixed some Tibetan and Arabic unicode characters rendering (bsc#1060445).
- CVE-2017-7805: Prevent Use-after-free in TLS 1.2 generating handshake hashes (bsc#1060445).
- CVE-2017-7819: Prevent Use-after-free while resizing images in design mode (bsc#1060445).
- CVE-2017-7818: Prevent Use-after-free during ARIA array manipulation (bsc#1060445).
- CVE-2017-7793: Prevent Use-after-free with Fetch API (bsc#1060445).
- CVE-2017-7824: Prevent Buffer overflow when drawing and validating elements with ANGLE (bsc#1060445).
- CVE-2017-7810: Fixed several memory safety bugs (bsc#1060445).
- CVE-2017-7823: CSP sandbox directive did not create a unique origin (bsc#1060445).
- CVE-2017-7814: Blob and data URLs bypassed phishing and malware protection warnings (bsc#1060445).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-10"/>
	<updated date="2017-10-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061005">SUSE bug 1061005</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7793">CVE-2017-7793 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7805">CVE-2017-7805 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7810">CVE-2017-7810 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7814">CVE-2017-7814 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7818">CVE-2017-7818 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7819">CVE-2017-7819 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7823">CVE-2017-7823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7824">CVE-2017-7824 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7825">CVE-2017-7825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549722" comment="MozillaFirefox-52.4.0esr-109.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549723" comment="MozillaFirefox-translations-52.4.0esr-109.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549724" comment="libfreebl3-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545037" comment="libfreebl3-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549725" comment="libfreebl3-hmac-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545039" comment="libfreebl3-hmac-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549726" comment="libsoftokn3-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545041" comment="libsoftokn3-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549727" comment="libsoftokn3-hmac-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545043" comment="libsoftokn3-hmac-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549728" comment="mozilla-nss-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545045" comment="mozilla-nss-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549729" comment="mozilla-nss-certs-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545047" comment="mozilla-nss-certs-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549730" comment="mozilla-nss-sysinit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545050" comment="mozilla-nss-sysinit-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549731" comment="mozilla-nss-tools-3.29.5-58.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149404" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1050707" ref_url="https://bugzilla.suse.com/1050707" source="BUGZILLA"/>
		<reference ref_id="1058565" ref_url="https://bugzilla.suse.com/1058565" source="BUGZILLA"/>
		<reference ref_id="1058622" ref_url="https://bugzilla.suse.com/1058622" source="BUGZILLA"/>
		<reference ref_id="1058624" ref_url="https://bugzilla.suse.com/1058624" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12151" ref_url="https://www.suse.com/security/cve/CVE-2017-12151/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003285.html" source="SUSE-SU"/>
		<description>
This update for samba fixes several issues.

These security issues were fixed:

- CVE-2017-12163: Prevent client short SMB1 write from writing server memory to
  file, leaking information from the server to the client (bsc#1058624)
- CVE-2017-12150: Always enforce smb signing when it is configured (bsc#1058622)
- CVE-2017-12151: Keep required encryption across SMB3 dfs redirects (bsc#1058565)

The following non-security issue was fixed:

- Fix GUID string format on GetPrinter info request. (bsc#1050707)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-10"/>
	<updated date="2017-10-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050707">SUSE bug 1050707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058565">SUSE bug 1058565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12150">CVE-2017-12150 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12151/">CVE-2017-12151 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12151">CVE-2017-12151 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12163">CVE-2017-12163 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552619" comment="libdcerpc-binding0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552620" comment="libdcerpc-binding0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552621" comment="libdcerpc0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552622" comment="libdcerpc0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552623" comment="libndr-krb5pac0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552624" comment="libndr-krb5pac0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552625" comment="libndr-nbt0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552626" comment="libndr-nbt0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552627" comment="libndr-standard0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552628" comment="libndr-standard0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552629" comment="libndr0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552630" comment="libndr0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552631" comment="libnetapi0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552632" comment="libnetapi0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552633" comment="libsamba-credentials0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552634" comment="libsamba-credentials0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552635" comment="libsamba-errors0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552636" comment="libsamba-errors0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552637" comment="libsamba-hostconfig0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552638" comment="libsamba-hostconfig0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552639" comment="libsamba-passdb0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552640" comment="libsamba-passdb0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552641" comment="libsamba-util0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552642" comment="libsamba-util0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552643" comment="libsamdb0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552644" comment="libsamdb0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552645" comment="libsmbclient0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552646" comment="libsmbclient0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552647" comment="libsmbconf0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552648" comment="libsmbconf0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552649" comment="libsmbldap0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552650" comment="libsmbldap0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552651" comment="libtevent-util0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552652" comment="libtevent-util0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552653" comment="libwbclient0-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552654" comment="libwbclient0-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552655" comment="samba-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552656" comment="samba-client-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552657" comment="samba-client-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519530" comment="samba-doc-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552658" comment="samba-libs-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552659" comment="samba-libs-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552660" comment="samba-winbind-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552661" comment="samba-winbind-32bit-4.6.7+git.51.327af8d0a11-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149405" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1047536" ref_url="https://bugzilla.suse.com/1047536" source="BUGZILLA"/>
		<reference ref_id="814241" ref_url="https://bugzilla.suse.com/814241" source="BUGZILLA"/>
		<reference ref_id="879138" ref_url="https://bugzilla.suse.com/879138" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:2744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003299.html" source="SUSE-SU"/>
		<description>
xerces-j2 was updated to fix several issues.

This security issue was fixed:

- bsc#814241: Prevent possible DoS through very long attribute names

This non-security issue was fixed:

- Prevent StackOverflowError when applying a pattern restriction on long strings
  while trying to validate an XML file against a schema (bsc#1047536, bsc#879138)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047536">SUSE bug 1047536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814241">SUSE bug 814241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879138">SUSE bug 879138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518232" comment="xerces-j2-2.8.1-268.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532505" comment="xerces-j2-xml-apis-2.8.1-268.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532506" comment="xerces-j2-xml-resolver-2.8.1-268.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149406" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1055321" ref_url="https://bugzilla.suse.com/1055321" source="BUGZILLA"/>
		<reference ref_id="1059777" ref_url="https://bugzilla.suse.com/1059777" source="BUGZILLA"/>
		<reference ref_id="1061076" ref_url="https://bugzilla.suse.com/1061076" source="BUGZILLA"/>
		<reference ref_id="1061077" ref_url="https://bugzilla.suse.com/1061077" source="BUGZILLA"/>
		<reference ref_id="1061080" ref_url="https://bugzilla.suse.com/1061080" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061082" ref_url="https://bugzilla.suse.com/1061082" source="BUGZILLA"/>
		<reference ref_id="1061084" ref_url="https://bugzilla.suse.com/1061084" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1061087" ref_url="https://bugzilla.suse.com/1061087" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003303.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues:

These security issues were fixed:

- CVE-2017-5526: The ES1370 audio device emulation support was vulnerable to a
  memory leakage issue allowing a privileged user inside the guest to cause a DoS
  and/or potentially crash the Qemu process on the host (bsc#1059777)
- bsc#1061084: Missing cleanup in the page type system allowed a malicious or
  buggy PV guest to cause DoS (XSA-242)
- bsc#1061086: A problem in the shadow pagetable code allowed a malicious or
  buggy HVM guest to cause DoS or cause hypervisor memory corruption potentially
  allowing the guest to escalate its privilege (XSA-243)
- bsc#1061087: Problematic handling of the selector fields in the Interrupt
  Descriptor Table (IDT) allowed a malicious or buggy x86 PV guest to escalate
  its privileges or cause DoS (XSA-244)
- bsc#1061077 Missing checks in the handling of DMOPs allowed malicious or
  buggy stub domain kernels or tool stacks otherwise living outside of Domain0 to
  cause a DoS (XSA-238)
- bsc#1061080: Intercepted I/O write operations with less than a full machine
  word's worth of data were not properly handled, which allowed a malicious
  unprivileged x86 HVM guest to obtain sensitive information from the host or
  other guests (XSA-239)
- bsc#1061081: In certain configurations of linear page tables a stack overflow
  might have occured that allowed a malicious or buggy PV guest to cause DoS and
  potentially privilege escalation and information leaks (XSA-240)
- bsc#1061082: Under certain conditions x86 PV guests could have caused the
  hypervisor to miss a necessary TLB flush for a page. This allowed a malicious
  x86 PV guest to access all of system memory, allowing for privilege escalation,
  DoS, and information leaks (XSA-241)
- bsc#1061076: Multiple issues existed with the setup of PCI MSI interrupts
  that allowed a malicious or buggy guest to cause DoS and potentially privilege
  escalation and information leaks (XSA-237)
- bsc#1055321: When dealing with the grant map space of add-to-physmap
  operations, ARM specific code failed to release a lock. This allowed a
  malicious guest administrator to cause DoS (XSA-235)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055321">SUSE bug 1055321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059777">SUSE bug 1059777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061076">SUSE bug 1061076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061077">SUSE bug 1061077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061080">SUSE bug 1061080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061082">SUSE bug 1061082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061084">SUSE bug 1061084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061087">SUSE bug 1061087</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5526">CVE-2017-5526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519535" comment="xen-4.9.0_14-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552662" comment="xen-doc-html-4.9.0_14-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519536" comment="xen-libs-4.9.0_14-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519537" comment="xen-libs-32bit-4.9.0_14-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552663" comment="xen-tools-4.9.0_14-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552664" comment="xen-tools-domU-4.9.0_14-3.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149407" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1061041" ref_url="https://bugzilla.suse.com/1061041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14867" ref_url="https://www.suse.com/security/cve/CVE-2017-14867/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003301.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

This security issue was fixed:

- CVE-2017-14867: Git used unsafe Perl scripts to support subcommands such as
  cvsserver, which allowed attackers to execute arbitrary OS commands via shell
  metacharacters in a module name (bsc#1061041).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1061041">SUSE bug 1061041</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14867/">CVE-2017-14867 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14867">CVE-2017-14867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541021" comment="git-core-2.12.3-27.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149408" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1056061" ref_url="https://bugzilla.suse.com/1056061" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087/" source="CVE"/>
		<reference ref_id="CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003300.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the security issues:

- Several vulnerabilities in standard conforming implementations of the WPA2
  protocol have been discovered and published under the code name KRACK. This
  update remedies those issues in a backwards compatible manner, i.e. the
  updated wpa_supplicant can interface properly with both vulnerable and
  patched implementations of WPA2, but an attacker won't be able to exploit the
  KRACK weaknesses in those connections anymore even if the other party is
  still vulnerable. [bsc#1056061, CVE-2017-13078, CVE-2017-13079,
  CVE-2017-13080, CVE-2017-13081, CVE-2017-13087, CVE-2017-13088]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13078">CVE-2017-13078 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13079">CVE-2017-13079 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13081">CVE-2017-13081 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13087">CVE-2017-13087 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13088">CVE-2017-13088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549750" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149409" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1060653" ref_url="https://bugzilla.suse.com/1060653" source="BUGZILLA"/>
		<reference ref_id="1061876" ref_url="https://bugzilla.suse.com/1061876" source="BUGZILLA"/>
		<reference ref_id="1063824" ref_url="https://bugzilla.suse.com/1063824" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000254" ref_url="https://www.suse.com/security/cve/CVE-2017-1000254/" source="CVE"/>
		<reference ref_id="CVE-2017-1000257" ref_url="https://www.suse.com/security/cve/CVE-2017-1000257/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003350.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2017-1000254: FTP PWD response parser out of bounds read (bsc#1061876)
- CVE-2017-1000257: IMAP FETCH response out of bounds read (bsc#1063824)

Bugs fixed:

- Fixed error 'error:1408F10B:SSL routines' when connecting to ftps via proxy (bsc#1060653)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-23"/>
	<updated date="2017-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1060653">SUSE bug 1060653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061876">SUSE bug 1061876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063824">SUSE bug 1063824</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000254/">CVE-2017-1000254 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000254">CVE-2017-1000254 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000257/">CVE-2017-1000257 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000257">CVE-2017-1000257 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549753" comment="curl-7.37.0-37.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549754" comment="libcurl4-7.37.0-37.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549755" comment="libcurl4-32bit-7.37.0-37.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149410" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1060877" ref_url="https://bugzilla.suse.com/1060877" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003352.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2017-12166: Lack of bound check in read_key in old legacy key handling before using values could be used for a remote buffer overflow (bsc#1060877).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-24"/>
	<updated date="2017-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060877">SUSE bug 1060877</bugzilla>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12166">CVE-2017-12166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549760" comment="openvpn-2.3.8-16.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549761" comment="openvpn-auth-pam-plugin-2.3.8-16.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149411" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1004527" ref_url="https://bugzilla.suse.com/1004527" source="BUGZILLA"/>
		<reference ref_id="1005776" ref_url="https://bugzilla.suse.com/1005776" source="BUGZILLA"/>
		<reference ref_id="1005778" ref_url="https://bugzilla.suse.com/1005778" source="BUGZILLA"/>
		<reference ref_id="1005780" ref_url="https://bugzilla.suse.com/1005780" source="BUGZILLA"/>
		<reference ref_id="1005781" ref_url="https://bugzilla.suse.com/1005781" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012829" ref_url="https://bugzilla.suse.com/1012829" source="BUGZILLA"/>
		<reference ref_id="1015342" ref_url="https://bugzilla.suse.com/1015342" source="BUGZILLA"/>
		<reference ref_id="1015343" ref_url="https://bugzilla.suse.com/1015343" source="BUGZILLA"/>
		<reference ref_id="1019675" ref_url="https://bugzilla.suse.com/1019675" source="BUGZILLA"/>
		<reference ref_id="1019680" ref_url="https://bugzilla.suse.com/1019680" source="BUGZILLA"/>
		<reference ref_id="1019695" ref_url="https://bugzilla.suse.com/1019695" source="BUGZILLA"/>
		<reference ref_id="1019699" ref_url="https://bugzilla.suse.com/1019699" source="BUGZILLA"/>
		<reference ref_id="1020412" ref_url="https://bugzilla.suse.com/1020412" source="BUGZILLA"/>
		<reference ref_id="1020645" ref_url="https://bugzilla.suse.com/1020645" source="BUGZILLA"/>
		<reference ref_id="1020657" ref_url="https://bugzilla.suse.com/1020657" source="BUGZILLA"/>
		<reference ref_id="1020989" ref_url="https://bugzilla.suse.com/1020989" source="BUGZILLA"/>
		<reference ref_id="1021424" ref_url="https://bugzilla.suse.com/1021424" source="BUGZILLA"/>
		<reference ref_id="1022595" ref_url="https://bugzilla.suse.com/1022595" source="BUGZILLA"/>
		<reference ref_id="1022604" ref_url="https://bugzilla.suse.com/1022604" source="BUGZILLA"/>
		<reference ref_id="1022743" ref_url="https://bugzilla.suse.com/1022743" source="BUGZILLA"/>
		<reference ref_id="1022912" ref_url="https://bugzilla.suse.com/1022912" source="BUGZILLA"/>
		<reference ref_id="1022967" ref_url="https://bugzilla.suse.com/1022967" source="BUGZILLA"/>
		<reference ref_id="1024346" ref_url="https://bugzilla.suse.com/1024346" source="BUGZILLA"/>
		<reference ref_id="1024373" ref_url="https://bugzilla.suse.com/1024373" source="BUGZILLA"/>
		<reference ref_id="1024405" ref_url="https://bugzilla.suse.com/1024405" source="BUGZILLA"/>
		<reference ref_id="1025461" ref_url="https://bugzilla.suse.com/1025461" source="BUGZILLA"/>
		<reference ref_id="1030850" ref_url="https://bugzilla.suse.com/1030850" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1031784" ref_url="https://bugzilla.suse.com/1031784" source="BUGZILLA"/>
		<reference ref_id="1032150" ref_url="https://bugzilla.suse.com/1032150" source="BUGZILLA"/>
		<reference ref_id="1034048" ref_url="https://bugzilla.suse.com/1034048" source="BUGZILLA"/>
		<reference ref_id="1034075" ref_url="https://bugzilla.suse.com/1034075" source="BUGZILLA"/>
		<reference ref_id="1035479" ref_url="https://bugzilla.suse.com/1035479" source="BUGZILLA"/>
		<reference ref_id="1036060" ref_url="https://bugzilla.suse.com/1036060" source="BUGZILLA"/>
		<reference ref_id="1036215" ref_url="https://bugzilla.suse.com/1036215" source="BUGZILLA"/>
		<reference ref_id="1036737" ref_url="https://bugzilla.suse.com/1036737" source="BUGZILLA"/>
		<reference ref_id="1037579" ref_url="https://bugzilla.suse.com/1037579" source="BUGZILLA"/>
		<reference ref_id="1037838" ref_url="https://bugzilla.suse.com/1037838" source="BUGZILLA"/>
		<reference ref_id="1037890" ref_url="https://bugzilla.suse.com/1037890" source="BUGZILLA"/>
		<reference ref_id="1038583" ref_url="https://bugzilla.suse.com/1038583" source="BUGZILLA"/>
		<reference ref_id="1040813" ref_url="https://bugzilla.suse.com/1040813" source="BUGZILLA"/>
		<reference ref_id="1042847" ref_url="https://bugzilla.suse.com/1042847" source="BUGZILLA"/>
		<reference ref_id="1043598" ref_url="https://bugzilla.suse.com/1043598" source="BUGZILLA"/>
		<reference ref_id="1044503" ref_url="https://bugzilla.suse.com/1044503" source="BUGZILLA"/>
		<reference ref_id="1046529" ref_url="https://bugzilla.suse.com/1046529" source="BUGZILLA"/>
		<reference ref_id="1047238" ref_url="https://bugzilla.suse.com/1047238" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1047989" ref_url="https://bugzilla.suse.com/1047989" source="BUGZILLA"/>
		<reference ref_id="1048155" ref_url="https://bugzilla.suse.com/1048155" source="BUGZILLA"/>
		<reference ref_id="1048228" ref_url="https://bugzilla.suse.com/1048228" source="BUGZILLA"/>
		<reference ref_id="1048325" ref_url="https://bugzilla.suse.com/1048325" source="BUGZILLA"/>
		<reference ref_id="1048327" ref_url="https://bugzilla.suse.com/1048327" source="BUGZILLA"/>
		<reference ref_id="1048356" ref_url="https://bugzilla.suse.com/1048356" source="BUGZILLA"/>
		<reference ref_id="1048501" ref_url="https://bugzilla.suse.com/1048501" source="BUGZILLA"/>
		<reference ref_id="1048893" ref_url="https://bugzilla.suse.com/1048893" source="BUGZILLA"/>
		<reference ref_id="1048912" ref_url="https://bugzilla.suse.com/1048912" source="BUGZILLA"/>
		<reference ref_id="1048934" ref_url="https://bugzilla.suse.com/1048934" source="BUGZILLA"/>
		<reference ref_id="1049226" ref_url="https://bugzilla.suse.com/1049226" source="BUGZILLA"/>
		<reference ref_id="1049272" ref_url="https://bugzilla.suse.com/1049272" source="BUGZILLA"/>
		<reference ref_id="1049291" ref_url="https://bugzilla.suse.com/1049291" source="BUGZILLA"/>
		<reference ref_id="1049336" ref_url="https://bugzilla.suse.com/1049336" source="BUGZILLA"/>
		<reference ref_id="1049361" ref_url="https://bugzilla.suse.com/1049361" source="BUGZILLA"/>
		<reference ref_id="1049580" ref_url="https://bugzilla.suse.com/1049580" source="BUGZILLA"/>
		<reference ref_id="1050471" ref_url="https://bugzilla.suse.com/1050471" source="BUGZILLA"/>
		<reference ref_id="1050742" ref_url="https://bugzilla.suse.com/1050742" source="BUGZILLA"/>
		<reference ref_id="1051790" ref_url="https://bugzilla.suse.com/1051790" source="BUGZILLA"/>
		<reference ref_id="1051987" ref_url="https://bugzilla.suse.com/1051987" source="BUGZILLA"/>
		<reference ref_id="1052093" ref_url="https://bugzilla.suse.com/1052093" source="BUGZILLA"/>
		<reference ref_id="1052094" ref_url="https://bugzilla.suse.com/1052094" source="BUGZILLA"/>
		<reference ref_id="1052095" ref_url="https://bugzilla.suse.com/1052095" source="BUGZILLA"/>
		<reference ref_id="1052360" ref_url="https://bugzilla.suse.com/1052360" source="BUGZILLA"/>
		<reference ref_id="1052384" ref_url="https://bugzilla.suse.com/1052384" source="BUGZILLA"/>
		<reference ref_id="1052580" ref_url="https://bugzilla.suse.com/1052580" source="BUGZILLA"/>
		<reference ref_id="1052593" ref_url="https://bugzilla.suse.com/1052593" source="BUGZILLA"/>
		<reference ref_id="1052888" ref_url="https://bugzilla.suse.com/1052888" source="BUGZILLA"/>
		<reference ref_id="1053043" ref_url="https://bugzilla.suse.com/1053043" source="BUGZILLA"/>
		<reference ref_id="1053309" ref_url="https://bugzilla.suse.com/1053309" source="BUGZILLA"/>
		<reference ref_id="1053472" ref_url="https://bugzilla.suse.com/1053472" source="BUGZILLA"/>
		<reference ref_id="1053627" ref_url="https://bugzilla.suse.com/1053627" source="BUGZILLA"/>
		<reference ref_id="1053629" ref_url="https://bugzilla.suse.com/1053629" source="BUGZILLA"/>
		<reference ref_id="1053633" ref_url="https://bugzilla.suse.com/1053633" source="BUGZILLA"/>
		<reference ref_id="1053681" ref_url="https://bugzilla.suse.com/1053681" source="BUGZILLA"/>
		<reference ref_id="1053685" ref_url="https://bugzilla.suse.com/1053685" source="BUGZILLA"/>
		<reference ref_id="1053802" ref_url="https://bugzilla.suse.com/1053802" source="BUGZILLA"/>
		<reference ref_id="1053915" ref_url="https://bugzilla.suse.com/1053915" source="BUGZILLA"/>
		<reference ref_id="1053919" ref_url="https://bugzilla.suse.com/1053919" source="BUGZILLA"/>
		<reference ref_id="1054082" ref_url="https://bugzilla.suse.com/1054082" source="BUGZILLA"/>
		<reference ref_id="1054084" ref_url="https://bugzilla.suse.com/1054084" source="BUGZILLA"/>
		<reference ref_id="1054654" ref_url="https://bugzilla.suse.com/1054654" source="BUGZILLA"/>
		<reference ref_id="1055013" ref_url="https://bugzilla.suse.com/1055013" source="BUGZILLA"/>
		<reference ref_id="1055096" ref_url="https://bugzilla.suse.com/1055096" source="BUGZILLA"/>
		<reference ref_id="1055272" ref_url="https://bugzilla.suse.com/1055272" source="BUGZILLA"/>
		<reference ref_id="1055290" ref_url="https://bugzilla.suse.com/1055290" source="BUGZILLA"/>
		<reference ref_id="1055359" ref_url="https://bugzilla.suse.com/1055359" source="BUGZILLA"/>
		<reference ref_id="1055493" ref_url="https://bugzilla.suse.com/1055493" source="BUGZILLA"/>
		<reference ref_id="1055567" ref_url="https://bugzilla.suse.com/1055567" source="BUGZILLA"/>
		<reference ref_id="1055709" ref_url="https://bugzilla.suse.com/1055709" source="BUGZILLA"/>
		<reference ref_id="1055755" ref_url="https://bugzilla.suse.com/1055755" source="BUGZILLA"/>
		<reference ref_id="1055896" ref_url="https://bugzilla.suse.com/1055896" source="BUGZILLA"/>
		<reference ref_id="1055935" ref_url="https://bugzilla.suse.com/1055935" source="BUGZILLA"/>
		<reference ref_id="1055963" ref_url="https://bugzilla.suse.com/1055963" source="BUGZILLA"/>
		<reference ref_id="1056061" ref_url="https://bugzilla.suse.com/1056061" source="BUGZILLA"/>
		<reference ref_id="1056185" ref_url="https://bugzilla.suse.com/1056185" source="BUGZILLA"/>
		<reference ref_id="1056230" ref_url="https://bugzilla.suse.com/1056230" source="BUGZILLA"/>
		<reference ref_id="1056261" ref_url="https://bugzilla.suse.com/1056261" source="BUGZILLA"/>
		<reference ref_id="1056427" ref_url="https://bugzilla.suse.com/1056427" source="BUGZILLA"/>
		<reference ref_id="1056587" ref_url="https://bugzilla.suse.com/1056587" source="BUGZILLA"/>
		<reference ref_id="1056588" ref_url="https://bugzilla.suse.com/1056588" source="BUGZILLA"/>
		<reference ref_id="1056596" ref_url="https://bugzilla.suse.com/1056596" source="BUGZILLA"/>
		<reference ref_id="1056686" ref_url="https://bugzilla.suse.com/1056686" source="BUGZILLA"/>
		<reference ref_id="1056827" ref_url="https://bugzilla.suse.com/1056827" source="BUGZILLA"/>
		<reference ref_id="1056849" ref_url="https://bugzilla.suse.com/1056849" source="BUGZILLA"/>
		<reference ref_id="1056982" ref_url="https://bugzilla.suse.com/1056982" source="BUGZILLA"/>
		<reference ref_id="1057015" ref_url="https://bugzilla.suse.com/1057015" source="BUGZILLA"/>
		<reference ref_id="1057031" ref_url="https://bugzilla.suse.com/1057031" source="BUGZILLA"/>
		<reference ref_id="1057035" ref_url="https://bugzilla.suse.com/1057035" source="BUGZILLA"/>
		<reference ref_id="1057038" ref_url="https://bugzilla.suse.com/1057038" source="BUGZILLA"/>
		<reference ref_id="1057047" ref_url="https://bugzilla.suse.com/1057047" source="BUGZILLA"/>
		<reference ref_id="1057067" ref_url="https://bugzilla.suse.com/1057067" source="BUGZILLA"/>
		<reference ref_id="1057383" ref_url="https://bugzilla.suse.com/1057383" source="BUGZILLA"/>
		<reference ref_id="1057498" ref_url="https://bugzilla.suse.com/1057498" source="BUGZILLA"/>
		<reference ref_id="1057849" ref_url="https://bugzilla.suse.com/1057849" source="BUGZILLA"/>
		<reference ref_id="1058038" ref_url="https://bugzilla.suse.com/1058038" source="BUGZILLA"/>
		<reference ref_id="1058116" ref_url="https://bugzilla.suse.com/1058116" source="BUGZILLA"/>
		<reference ref_id="1058135" ref_url="https://bugzilla.suse.com/1058135" source="BUGZILLA"/>
		<reference ref_id="1058410" ref_url="https://bugzilla.suse.com/1058410" source="BUGZILLA"/>
		<reference ref_id="1058507" ref_url="https://bugzilla.suse.com/1058507" source="BUGZILLA"/>
		<reference ref_id="1058512" ref_url="https://bugzilla.suse.com/1058512" source="BUGZILLA"/>
		<reference ref_id="1058550" ref_url="https://bugzilla.suse.com/1058550" source="BUGZILLA"/>
		<reference ref_id="1059051" ref_url="https://bugzilla.suse.com/1059051" source="BUGZILLA"/>
		<reference ref_id="1059465" ref_url="https://bugzilla.suse.com/1059465" source="BUGZILLA"/>
		<reference ref_id="1059500" ref_url="https://bugzilla.suse.com/1059500" source="BUGZILLA"/>
		<reference ref_id="1059863" ref_url="https://bugzilla.suse.com/1059863" source="BUGZILLA"/>
		<reference ref_id="1060197" ref_url="https://bugzilla.suse.com/1060197" source="BUGZILLA"/>
		<reference ref_id="1060229" ref_url="https://bugzilla.suse.com/1060229" source="BUGZILLA"/>
		<reference ref_id="1060249" ref_url="https://bugzilla.suse.com/1060249" source="BUGZILLA"/>
		<reference ref_id="1060400" ref_url="https://bugzilla.suse.com/1060400" source="BUGZILLA"/>
		<reference ref_id="1060985" ref_url="https://bugzilla.suse.com/1060985" source="BUGZILLA"/>
		<reference ref_id="1061017" ref_url="https://bugzilla.suse.com/1061017" source="BUGZILLA"/>
		<reference ref_id="1061046" ref_url="https://bugzilla.suse.com/1061046" source="BUGZILLA"/>
		<reference ref_id="1061064" ref_url="https://bugzilla.suse.com/1061064" source="BUGZILLA"/>
		<reference ref_id="1061067" ref_url="https://bugzilla.suse.com/1061067" source="BUGZILLA"/>
		<reference ref_id="1061172" ref_url="https://bugzilla.suse.com/1061172" source="BUGZILLA"/>
		<reference ref_id="1061451" ref_url="https://bugzilla.suse.com/1061451" source="BUGZILLA"/>
		<reference ref_id="1061721" ref_url="https://bugzilla.suse.com/1061721" source="BUGZILLA"/>
		<reference ref_id="1061775" ref_url="https://bugzilla.suse.com/1061775" source="BUGZILLA"/>
		<reference ref_id="1061831" ref_url="https://bugzilla.suse.com/1061831" source="BUGZILLA"/>
		<reference ref_id="1061872" ref_url="https://bugzilla.suse.com/1061872" source="BUGZILLA"/>
		<reference ref_id="1062279" ref_url="https://bugzilla.suse.com/1062279" source="BUGZILLA"/>
		<reference ref_id="1062520" ref_url="https://bugzilla.suse.com/1062520" source="BUGZILLA"/>
		<reference ref_id="1062962" ref_url="https://bugzilla.suse.com/1062962" source="BUGZILLA"/>
		<reference ref_id="1063102" ref_url="https://bugzilla.suse.com/1063102" source="BUGZILLA"/>
		<reference ref_id="1063349" ref_url="https://bugzilla.suse.com/1063349" source="BUGZILLA"/>
		<reference ref_id="1063460" ref_url="https://bugzilla.suse.com/1063460" source="BUGZILLA"/>
		<reference ref_id="1063475" ref_url="https://bugzilla.suse.com/1063475" source="BUGZILLA"/>
		<reference ref_id="1063479" ref_url="https://bugzilla.suse.com/1063479" source="BUGZILLA"/>
		<reference ref_id="1063501" ref_url="https://bugzilla.suse.com/1063501" source="BUGZILLA"/>
		<reference ref_id="1063509" ref_url="https://bugzilla.suse.com/1063509" source="BUGZILLA"/>
		<reference ref_id="1063520" ref_url="https://bugzilla.suse.com/1063520" source="BUGZILLA"/>
		<reference ref_id="1063570" ref_url="https://bugzilla.suse.com/1063570" source="BUGZILLA"/>
		<reference ref_id="1063667" ref_url="https://bugzilla.suse.com/1063667" source="BUGZILLA"/>
		<reference ref_id="1063671" ref_url="https://bugzilla.suse.com/1063671" source="BUGZILLA"/>
		<reference ref_id="1063695" ref_url="https://bugzilla.suse.com/1063695" source="BUGZILLA"/>
		<reference ref_id="1064064" ref_url="https://bugzilla.suse.com/1064064" source="BUGZILLA"/>
		<reference ref_id="1064206" ref_url="https://bugzilla.suse.com/1064206" source="BUGZILLA"/>
		<reference ref_id="1064388" ref_url="https://bugzilla.suse.com/1064388" source="BUGZILLA"/>
		<reference ref_id="1064436" ref_url="https://bugzilla.suse.com/1064436" source="BUGZILLA"/>
		<reference ref_id="963575" ref_url="https://bugzilla.suse.com/963575" source="BUGZILLA"/>
		<reference ref_id="964944" ref_url="https://bugzilla.suse.com/964944" source="BUGZILLA"/>
		<reference ref_id="966170" ref_url="https://bugzilla.suse.com/966170" source="BUGZILLA"/>
		<reference ref_id="966172" ref_url="https://bugzilla.suse.com/966172" source="BUGZILLA"/>
		<reference ref_id="966186" ref_url="https://bugzilla.suse.com/966186" source="BUGZILLA"/>
		<reference ref_id="966191" ref_url="https://bugzilla.suse.com/966191" source="BUGZILLA"/>
		<reference ref_id="966316" ref_url="https://bugzilla.suse.com/966316" source="BUGZILLA"/>
		<reference ref_id="966318" ref_url="https://bugzilla.suse.com/966318" source="BUGZILLA"/>
		<reference ref_id="969476" ref_url="https://bugzilla.suse.com/969476" source="BUGZILLA"/>
		<reference ref_id="969477" ref_url="https://bugzilla.suse.com/969477" source="BUGZILLA"/>
		<reference ref_id="969756" ref_url="https://bugzilla.suse.com/969756" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="981309" ref_url="https://bugzilla.suse.com/981309" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000252" ref_url="https://www.suse.com/security/cve/CVE-2017-1000252/" source="CVE"/>
		<reference ref_id="CVE-2017-11472" ref_url="https://www.suse.com/security/cve/CVE-2017-11472/" source="CVE"/>
		<reference ref_id="CVE-2017-12134" ref_url="https://www.suse.com/security/cve/CVE-2017-12134/" source="CVE"/>
		<reference ref_id="CVE-2017-12153" ref_url="https://www.suse.com/security/cve/CVE-2017-12153/" source="CVE"/>
		<reference ref_id="CVE-2017-12154" ref_url="https://www.suse.com/security/cve/CVE-2017-12154/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-14106" ref_url="https://www.suse.com/security/cve/CVE-2017-14106/" source="CVE"/>
		<reference ref_id="CVE-2017-14489" ref_url="https://www.suse.com/security/cve/CVE-2017-14489/" source="CVE"/>
		<reference ref_id="CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265/" source="CVE"/>
		<reference ref_id="CVE-2017-15649" ref_url="https://www.suse.com/security/cve/CVE-2017-15649/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003353.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.92 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-1000252: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (assertion failure, and hypervisor hang or crash) via an out-of bounds guest_irq value, related to arch/x86/kvm/vmx.c and virt/kvm/eventfd.c (bnc#1058038).
- CVE-2017-11472: The acpi_ns_terminate() function in drivers/acpi/acpica/nsutils.c in the Linux kernel did not flush the operand cache and causes a kernel stack dump, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table (bnc#1049580).
- CVE-2017-12134: The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation (bnc#1051790 bsc#1053919).
- CVE-2017-12153: A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel This function did not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash (bnc#1058410).
- CVE-2017-12154: The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel did not ensure that the 'CR8-load exiting' and 'CR8-store exiting' L0 vmcs02 controls exist in cases where L1 omits the 'use TPR shadow' vmcs12 control, which allowed KVM L2 guest OS users to obtain read and write access to the hardware CR8 register (bnc#1058507).
- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients (bnc#1056061 1063479 1063667 1063671).
- CVE-2017-14051: An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash) by leveraging root access (bnc#1056588).
- CVE-2017-14106: The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel allowed local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path (bnc#1056982).
- CVE-2017-14489: The iscsi_if_rx function in drivers/scsi/scsi_transport_iscsi.c in the Linux kernel allowed local users to cause a denial of service (panic) by leveraging incorrect length validation (bnc#1059051).
- CVE-2017-15265: Use-after-free vulnerability in the Linux kernel before 4.14-rc5 allowed local users to have unspecified impact via vectors related to /dev/snd/seq (bnc#1062520).
- CVE-2017-15649: net/packet/af_packet.c in the Linux kernel allowed local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free, a different vulnerability than CVE-2017-6346 (bnc#1064388).

The following non-security bugs were fixed:

- acpi: apd: Add clock frequency for Hisilicon Hip07/08 I2C controller (bsc#1049291).
- acpi: apd: Fix HID for Hisilicon Hip07/08 (bsc#1049291).
- acpi: apei: Enable APEI multiple GHES source to share a single external IRQ (bsc#1053627).
- acpica: iort: Update SMMU models for revision C (bsc#1036060).
- acpi: irq: Fix return code of acpi_gsi_to_irq() (bsc#1053627).
- acpi/nfit: Fix memory corruption/Unregister mce decoder on failure (bsc#1057047).
- acpi: pci: fix GIC irq model default PCI IRQ polarity (bsc#1053629).
- acpi/processor: Check for duplicate processor ids at hotplug time (bnc#1056230).
- acpi/processor: Implement DEVICE operator for processor enumeration (bnc#1056230).
- ahci: do not use MSI for devices with the silly Intel NVMe remapping scheme (bsc#1048912).
- ahci: thunderx2: stop engine fix update (bsc#1057031).
- alsa: au88x0: avoid theoretical uninitialized access (bnc#1012382).
- alsa: compress: Remove unused variable (bnc#1012382).
- alsa: hda - Add stereo mic quirk for Lenovo G50-70 (17aa:3978) (bsc#1020657).
- alsa: hda - Implement mic-mute LED mode enum (bsc#1055013).
- alsa: hda/realtek - Add support headphone Mic for ALC221 of HP platform (bsc#1024405).
- alsa: hda - Workaround for i915 KBL breakage (bsc#1048356,bsc#1047989,bsc#1055272).
- alsa: ice1712: Add support for STAudio ADCIII (bsc#1048934).
- alsa: usb-audio: Apply sample rate quirk to Sennheiser headset (bsc#1052580).
- alsa: usb-audio: Check out-of-bounds access by corrupted buffer descriptor (bnc#1012382).
- alsa: usx2y: Suppress kernel warning at page allocation failures (bnc#1012382).
- arc: Re-enable MMU upon Machine Check exception (bnc#1012382).
- arm64: add function to get a cpu's MADT GICC table (bsc#1062279).
- arm64: do not trace atomic operations (bsc#1055290).
- arm64: dts: Add Broadcom Vulcan PMU in dts (fate#319481).
- arm64: fault: Route pte translation faults via do_translation_fault (bnc#1012382).
- arm64: Make sure SPsel is always set (bnc#1012382).
- arm64: mm: select CONFIG_ARCH_PROC_KCORE_TEXT (bsc#1046529).
- arm64: pci: Fix struct acpi_pci_root_ops allocation failure path (bsc#1056849).
- arm64/perf: Access pmu register using &lt;read/write&gt;_sys_reg (bsc#1062279).
- arm64/perf: Add Broadcom Vulcan PMU support (fate#319481).
- arm64/perf: Changed events naming as per the ARM ARM (fate#319481).
- arm64/perf: Define complete ARMv8 recommended implementation defined events (fate#319481).
- arm64: perf: do not expose CHAIN event in sysfs (bsc#1062279).
- arm64: perf: Extend event config for ARMv8.1 (bsc#1062279).
- arm64/perf: Filter common events based on PMCEIDn_EL0 (fate#319481).
- arm64: perf: Ignore exclude_hv when kernel is running in HYP (bsc#1062279).
- arm64: perf: move to common attr_group fields (bsc#1062279).
- arm64: perf: Use the builtin_platform_driver (bsc#1062279).
- arm64: pmu: add fallback probe table (bsc#1062279).
- arm64: pmu: Hoist pmu platform device name (bsc#1062279).
- arm64: pmu: Probe default hw/cache counters (bsc#1062279).
- arm64: pmuv3: handle pmuv3+ (bsc#1062279).
- arm64: pmuv3: handle !PMUv3 when probing (bsc#1062279).
- arm64: pmuv3: use arm_pmu ACPI framework (bsc#1062279).
- arm64: pmu: Wire-up Cortex A53 L2 cache events and DTLB refills (bsc#1062279).
- arm: 8635/1: nommu: allow enabling REMAP_VECTORS_TO_RAM (bnc#1012382).
- arm: dts: r8a7790: Use R-Car Gen 2 fallback binding for msiof nodes (bnc#1012382).
- arm/perf: Convert to hotplug state machine (bsc#1062279).
- arm/perf: Fix hotplug state machine conversion (bsc#1062279).
- arm/perf: Use multi instance instead of custom list (bsc#1062279).
- arm: pxa: add the number of DMA requestor lines (bnc#1012382).
- arm: pxa: fix the number of DMA requestor lines (bnc#1012382).
- arm: remove duplicate 'const' annotations' (bnc#1012382).
- asoc: dapm: fix some pointer error handling (bnc#1012382).
- asoc: dapm: handle probe deferrals (bnc#1012382).
- audit: log 32-bit socketcalls (bnc#1012382).
- bcache: correct cache_dirty_target in __update_writeback_rate() (bnc#1012382).
- bcache: Correct return value for sysfs attach errors (bnc#1012382).
- bcache: do not subtract sectors_to_gc for bypassed IO (bnc#1012382).
- bcache: fix bch_hprint crash and improve output (bnc#1012382).
- bcache: fix for gc and write-back race (bnc#1012382).
- bcache: Fix leak of bdev reference (bnc#1012382).
- bcache: initialize dirty stripes in flash_dev_run() (bnc#1012382).
- blacklist.conf: a7b8829d242b1a58107e9c02b09e93aec446d55c is not applicable
- blacklist.conf: Add commit b5accbb0dfae
- blacklist.conf: add one more
- blacklist.conf: Blacklist d12fe87e62d7 signal/testing: Do not look for __SI_FAULT in userspace It just fixes a self-test.
- blacklist.conf: e859afe1ee0c5ae981c55387ccd45eba258a7842 is not applicable
- blacklist.conf: fixes on relevant for MIPS/driver not in our tree
- blacklist.conf: gcc7 compiler warning (bsc#1056849)
- block: genhd: add device_add_disk_with_groups (bsc#1060400).
- block: Relax a check in blk_start_queue() (bnc#1012382).
- block: return on congested block device (FATE#321994).
- bluetooth: bnep: fix possible might sleep error in bnep_session (bsc#1031784).
- bluetooth: cmtp: fix possible might sleep error in cmtp_session (bsc#1031784).
- bnx2x: Do not log mc removal needlessly (bsc#1019680 FATE#321692).
- bnxt: add a missing rcu synchronization (bnc#1038583).
- bnxt: do not busy-poll when link is down (bnc#1038583).
- bnxt_en: Add a callback to inform RDMA driver during PCI shutdown (bsc#1053309).
- bnxt_en: Add additional chip ID definitions (bsc#1053309).
- bnxt_en: Add bnxt_get_num_stats() to centrally get the number of ethtool stats (bsc#1053309).
- bnxt_en: Add missing logic to handle TPA end error conditions (bsc#1053309).
- bnxt_en: Add PCI IDs for BCM57454 VF devices (bsc#1053309).
- bnxt_en: Allow the user to set ethtool stats-block-usecs to 0 (bsc#1053309).
- bnxt_en: Call bnxt_dcb_init() after getting firmware DCBX configuration (bsc#1053309).
- bnxt_en: Check status of firmware DCBX agent before setting DCB_CAP_DCBX_HOST (bsc#1053309).
- bnxt_en: Do not setup MAC address in bnxt_hwrm_func_qcaps() (bsc#963575 FATE#320144).
- bnxt_en: Enable MRU enables bit when configuring VNIC MRU (bnc#1038583).
- bnxt_en: Fix and clarify link_info-&gt;advertising (bnc#1038583).
- bnxt_en: Fix a VXLAN vs GENEVE issue (bnc#1038583).
- bnxt_en: Fix bug in ethtool -L (bsc#1053309).
- bnxt_en: Fix netpoll handling (bsc#1053309).
- bnxt_en: Fix NULL pointer dereference in a failure path during open (bnc#1038583).
- bnxt_en: Fix NULL pointer dereference in reopen failure path (bnc#1038583).
- bnxt_en: fix pci cleanup in bnxt_init_one() failure path (bnc#1038583).
- bnxt_en: Fix race conditions in .ndo_get_stats64() (bsc#1053309).
- bnxt_en: Fix ring arithmetic in bnxt_setup_tc() (bnc#1038583).
- bnxt_en: Fix SRIOV on big-endian architecture (bsc#1053309).
- bnxt_en: Fix TX push operation on ARM64 (bnc#1038583).
- bnxt_en: Fix 'uninitialized variable' bug in TPA code path (bnc#1038583).
- bnxt_en: Fix VF virtual link state (bnc#1038583).
- bnxt_en: Fix xmit_more with BQL (bsc#1053309).
- bnxt_en: Free MSIX vectors when unregistering the device from bnxt_re (bsc#1020412 FATE#321671).
- bnxt_en: Implement ndo_bridge_{get|set}link methods (bsc#1053309).
- bnxt_en: Implement xmit_more (bsc#1053309).
- bnxt_en: initialize rc to zero to avoid returning garbage (bnc#1038583).
- bnxt_en: Optimize doorbell write operations for newer chips (bsc#1053309).
- bnxt_en: Pad TX packets below 52 bytes (bnc#1038583).
- bnxt_en: Pass in sh parameter to bnxt_set_dflt_rings() (bsc#1053309).
- bnxt_en: Refactor TPA code path (bnc#1038583).
- bnxt_en: Report firmware DCBX agent (bsc#1053309).
- bnxt_en: Retrieve the hardware bridge mode from the firmware (bsc#1053309).
- bnxt_en: Set ETS min_bw parameter for older firmware (bsc#1053309).
- bnxt_en: Support for Short Firmware Message (bsc#1053309).
- bnxt_en: Update firmware interface spec to 1.8.0 (bsc#1053309).
- bnxt: fix unsigned comparsion with 0 (bsc#1053309).
- bnxt: fix unused variable warnings (bsc#1053309).
- bnxt_re: Do not issue cmd to delete GID for QP1 GID entry before the QP is destroyed (bsc#1056596).
- bnxt_re: Fix compare and swap atomic operands (bsc#1056596).
- bnxt_re: Fix memory leak in FRMR path (bsc#1056596).
- bnxt_re: Fix race between the netdev register and unregister events (bsc#1037579).
- bnxt_re: Fix update of qplib_qp.mtu when modified (bsc#1056596).
- bnxt_re: Free up devices in module_exit path (bsc#1056596).
- bnxt_re: Remove RTNL lock dependency in bnxt_re_query_port (bsc#1056596).
- bnxt_re: Stop issuing further cmds to FW once a cmd times out (bsc#1056596).
- brcmfmac: setup passive scan if requested by user-space (bnc#1012382).
- bridge: netlink: register netdevice before executing changelink (bnc#1012382).
- bsg-lib: do not free job in bsg_prepare_job (bnc#1012382).
- btrfs: change how we decide to commit transactions during flushing (bsc#1060197).
- btrfs: fix early ENOSPC due to delalloc (bsc#1049226).
- btrfs: fix NULL pointer dereference from free_reloc_roots() (bnc#1012382).
- btrfs: nowait aio: Correct assignment of pos (FATE#321994).
- btrfs: nowait aio support (FATE#321994).
- btrfs: prevent to set invalid default subvolid (bnc#1012382).
- btrfs: propagate error to btrfs_cmp_data_prepare caller (bnc#1012382).
- btrfs: qgroup: move noisy underflow warning to debugging build (bsc#1055755).
- ceph: avoid accessing freeing inode in ceph_check_delayed_caps() (bsc#1048228).
- ceph: avoid invalid memory dereference in the middle of umount (bsc#1048228).
- ceph: avoid panic in create_session_open_msg() if utsname() returns NULL (bsc#1061451).
- ceph: check negative offsets in ceph_llseek() (bsc#1061451).
- ceph: cleanup writepage_nounlock() (bsc#1048228).
- ceph: do not re-send interrupted flock request (bsc#1048228).
- ceph: fix message order check in handle_cap_export() (bsc#1061451).
- ceph: fix NULL pointer dereference in ceph_flush_snaps() (bsc#1061451).
- ceph: fix readpage from fscache (bsc#1057015).
- ceph: getattr before read on ceph.* xattrs (bsc#1048228).
- ceph: handle epoch barriers in cap messages (bsc#1048228).
- ceph: limit osd read size to CEPH_MSG_MAX_DATA_LEN (bsc#1061451).
- ceph: limit osd write size (bsc#1061451).
- ceph: new mount option that specifies fscache uniquifier (bsc#1048228).
- ceph: redirty page when writepage_nounlock() skips unwritable page (bsc#1048228).
- ceph: remove special ack vs commit behavior (bsc#1048228).
- ceph: remove useless page-&gt;mapping check in writepage_nounlock() (bsc#1048228).
- ceph: re-request max size after importing caps (bsc#1048228).
- ceph: stop on-going cached readdir if mds revokes FILE_SHARED cap (bsc#1061451).
- ceph: update ceph_dentry_info::lease_session when necessary (bsc#1048228).
- ceph: update the 'approaching max_size' code (bsc#1048228).
- ceph: validate correctness of some mount options (bsc#1061451).
- ceph: when seeing write errors on an inode, switch to sync writes (bsc#1048228).
- cifs: add build_path_from_dentry_optional_prefix() (fate#323482).
- cifs: add use_ipc flag to SMB2_ioctl() (fate#323482).
- cifs: Fix maximum SMB2 header size (bsc#1056185).
- cifs: Fix SMB3.1.1 guest authentication to Samba (bnc#1012382).
- cifs: Fix sparse warnings (fate#323482).
- cifs: implement get_dfs_refer for SMB2+ (fate#323482).
- cifs: let ses-&gt;ipc_tid hold smb2 TreeIds (fate#323482).
- cifs: move DFS response parsing out of SMB1 code (fate#323482).
- cifs: release auth_key.response for reconnect (bnc#1012382).
- cifs: remove any preceding delimiter from prefix_path (fate#323482).
- cifs: set signing flag in SMB2+ TreeConnect if needed (fate#323482).
- cifs: use DFS pathnames in SMB2+ Create requests (fate#323482).
- clocksource/drivers/arm_arch_timer: Fix mem frame loop initialization (bsc#1055709).
- cpufreq: intel_pstate: Disable energy efficiency optimization (bsc#1054654).
- crush: assume weight_set != null imples weight_set_size &gt; 0 (bsc#1048228).
- crush: crush_init_workspace starts with struct crush_work (bsc#1048228).
- crush: implement weight and id overrides for straw2 (bsc#1048228).
- crush: remove an obsolete comment (bsc#1048228).
- crypto: AF_ALG - remove SGL terminator indicator when chaining (bnc#1012382).
- crypto: chcr - Add ctr mode and process large sg entries for cipher (bsc#1048325).
- crypto: chcr - Avoid changing request structure (bsc#1048325).
- crypto: chcr - Ensure Destination sg entry size less than 2k (bsc#1048325).
- crypto: chcr - Fix fallback key setting (bsc#1048325).
- crypto: chcr - Pass lcb bit setting to firmware (bsc#1048325).
- crypto: chcr - Return correct error code (bsc#1048325).
- crypto: talitos - Do not provide setkey for non hmac hashing algs (bnc#1012382).
- crypto: talitos - fix sha224 (bnc#1012382).
- cxgb4: Fix stack out-of-bounds read due to wrong size to t4_record_mbox() (bsc#1021424 bsc#1022743).
- cxgb4: update latest firmware version supported (bsc#1048327).
- cxgbit: add missing __kfree_skb() (bsc#1052095).
- cxgbit: fix sg_nents calculation (bsc#1052095).
- cxl: Fix driver use count (bnc#1012382).
- device-dax: fix cdev leak (bsc#1057047).
- dmaengine: mmp-pdma: add number of requestors (bnc#1012382).
- dmaengine: mv_xor_v2: do not use descriptors not acked by async_tx (bsc#1056849).
- dmaengine: mv_xor_v2: enable XOR engine after its configuration (bsc#1056849).
- dmaengine: mv_xor_v2: fix tx_submit() implementation (bsc#1056849).
- dmaengine: mv_xor_v2: handle mv_xor_v2_prep_sw_desc() error properly (bsc#1056849).
- dmaengine: mv_xor_v2: properly handle wrapping in the array of HW descriptors (bsc#1056849).
- dmaengine: mv_xor_v2: remove interrupt coalescing (bsc#1056849).
- dmaengine: mv_xor_v2: set DMA mask to 40 bits (bsc#1056849).
- dm mpath: do not lock up a CPU with requeuing activity (bsc#1048912).
- documentation: arm64: pmu: Add Broadcom Vulcan PMU binding (fate#319481).
- driver-core: platform: Add platform_irq_count() (bsc#1062279).
- driver core: platform: Do not read past the end of 'driver_override' buffer (bnc#1012382).
- drivers: base: cacheinfo: fix boot error message when acpi is enabled (bsc#1057849).
- drivers: firmware: psci: drop duplicate const from psci_of_match (FATE#319482 bnc#1012382).
- drivers: hv: fcopy: restore correct transfer length (bnc#1012382).
- drivers: net: phy: xgene: Fix mdio write (bsc#1057383).
- drivers: net: xgene: Fix wrong logical operation (bsc#1056827).
- drivers/perf: arm_pmu_acpi: avoid perf IRQ init when guest PMU is off (bsc#1062279).
- drivers/perf: arm_pmu_acpi: Release memory obtained by kasprintf (bsc#1062279).
- drivers/perf: arm_pmu: add ACPI framework (bsc#1062279).
- drivers/perf: arm_pmu: add common attr group fields (bsc#1062279).
- drivers/perf: arm_pmu: Always consider IRQ0 as an error (bsc#1062279).
- drivers/perf: arm_pmu: Avoid leaking pmu-&gt;irq_affinity on error (bsc#1062279).
- drivers/perf: arm_pmu: avoid NULL dereference when not using devicetree (bsc#1062279).
- drivers/perf: arm-pmu: convert arm_pmu_mutex to spinlock (bsc#1062279).
- drivers/perf: arm_pmu: Defer the setting of __oprofile_cpu_pmu (bsc#1062279).
- drivers/perf: arm_pmu: define armpmu_init_fn (bsc#1062279).
- drivers/perf: arm_pmu: expose a cpumask in sysfs (bsc#1062279).
- drivers/perf: arm_pmu: factor out pmu registration (bsc#1062279).
- drivers/perf: arm-pmu: Fix handling of SPI lacking 'interrupt-affinity' property (bsc#1062279).
- drivers/perf: arm_pmu: Fix NULL pointer dereference during probe (bsc#1062279).
- drivers/perf: arm-pmu: fix RCU usage on pmu resume from low-power (bsc#1062279).
- drivers/perf: arm_pmu: Fix reference count of a device_node in of_pmu_irq_cfg (bsc#1062279).
- drivers/perf: arm_pmu: fold init into alloc (bsc#1062279).
- drivers/perf: arm_pmu: handle no platform_device (bsc#1062279).
- drivers/perf: arm-pmu: Handle per-interrupt affinity mask (bsc#1062279).
- drivers/perf: arm_pmu: implement CPU_PM notifier (bsc#1062279).
- drivers/perf: arm_pmu: make info messages more verbose (bsc#1062279).
- drivers/perf: arm_pmu: manage interrupts per-cpu (bsc#1062279).
- drivers/perf: arm_pmu: move irq request/free into probe (bsc#1062279).
- drivers/perf: arm_pmu: only use common attr_groups (bsc#1062279).
- drivers/perf: arm_pmu: remove pointless PMU disabling (bsc#1062279).
- drivers/perf: arm_pmu: rename irq request/free functions (bsc#1062279).
- drivers/perf: arm_pmu: Request PMU SPIs with IRQF_PER_CPU (bsc#1062279).
- drivers/perf: arm_pmu: rework per-cpu allocation (bsc#1062279).
- drivers/perf: arm_pmu: simplify cpu_pmu_request_irqs() (bsc#1062279).
- drivers/perf: arm_pmu: split cpu-local irq request/free (bsc#1062279).
- drivers/perf: arm_pmu: split irq request from enable (bsc#1062279).
- drivers/perf: arm_pmu: split out platform device probe logic (bsc#1062279).
- drivers/perf: kill armpmu_register (bsc#1062279).
- drm: Add driver-private objects to atomic state (bsc#1055493).
- drm/amdkfd: fix improper return value on error (bnc#1012382).
- drm: bridge: add DT bindings for TI ths8135 (bnc#1012382).
- drm/dp: Introduce MST topology state to track available link bandwidth (bsc#1055493).
- drm_fourcc: Fix DRM_FORMAT_MOD_LINEAR #define (bnc#1012382).
- drm/i915/bios: ignore HDMI on port A (bnc#1012382).
- drm/vmwgfx: Limit max desktop dimensions to 8Kx8K (bsc#1048155).
- e1000e: use disable_hardirq() also for MSIX vectors in e1000_netpoll() (bsc#1022912 FATE#321246).
- edac, sb_edac: Assign EDAC memory controller per h/w controller (bsc#1061721).
- edac, sb_edac: Avoid creating SOCK memory controller (bsc#1061721).
- edac, sb_edac: Bump driver version and do some cleanups (bsc#1061721).
- edac, sb_edac: Carve out dimm-populating loop (bsc#1061721).
- edac, sb_edac: Check if ECC enabled when at least one DIMM is present (bsc#1061721).
- edac, sb_edac: Classify memory mirroring modes (bsc#1061721).
- edac, sb_edac: Classify PCI-IDs by topology (bsc#1061721).
- edac, sb_edac: Do not create a second memory controller if HA1 is not present (bsc#1061721).
- edac, sb_edac: Do not use 'Socket#' in the memory controller name (bsc#1061721).
- edac, sb_edac: Drop NUM_CHANNELS from 8 back to 4 (bsc#1061721).
- edac, sb_edac: Fix mod_name (bsc#1061721).
- edac, sb_edac: Get rid of -&gt;show_interleave_mode() (bsc#1061721).
- edac, sb_edac: Remove double buffering of error records (bsc#1061721).
- edac, sb_edac: Remove NULL pointer check on array pci_tad (bsc#1061721).
- edac, skx_edac: Handle systems with segmented PCI busses (bsc#1063102).
- edac, thunderx: Fix a warning during l2c debugfs node creation (bsc#1057038).
- edac, thunderx: Fix error handling path in thunderx_lmc_probe() (bsc#1057038).
- efi/fb: Avoid reconfiguration of BAR that covers the framebuffer (bsc#1051987).
- efi/fb: Correct PCI_STD_RESOURCE_END usage (bsc#1051987).
- ext4: do not allow encrypted operations without keys (bnc#1012382).
- ext4: fix incorrect quotaoff if the quota feature is enabled (bnc#1012382).
- ext4: fix quota inconsistency during orphan cleanup for read-only mounts (bnc#1012382).
- ext4: nowait aio support (FATE#321994).
- extcon: axp288: Use vbus-valid instead of -present to determine cable presence (bnc#1012382).
- exynos-gsc: Do not swap cb/cr for semi planar formats (bnc#1012382).
- f2fs: check hot_data for roll-forward recovery (bnc#1012382).
- fix flags ordering (bsc#1034075 comment 131)
- Fix mpage_writepage() for pages with buffers (bsc#1050471).
- fix whitespace according to upstream commit
- fix xen_swiotlb_dma_mmap prototype (bnc#1012382).
- fs/epoll: cache leftmost node (bsc#1056427).
- fs: Introduce filemap_range_has_page() (FATE#321994).
- fs: Introduce RWF_NOWAIT and FMODE_AIO_NOWAIT (FATE#321994).
- fs/mpage.c: fix mpage_writepage() for pages with buffers (bsc#1050471). Update to version in mainline
- fs/proc: kcore: use kcore_list type to check for vmalloc/module address (bsc#1046529).
- fs: return if direct I/O will trigger writeback (FATE#321994).
- fs: Separate out kiocb flags setup based on RWF_* flags (FATE#321994).
- fs: Use RWF_* flags for AIO operations (FATE#321994).
- ftrace: Fix kmemleak in unregister_ftrace_graph (bnc#1012382).
- ftrace: Fix memleak when unregistering dynamic ops when tracing disabled (bnc#1012382).
- ftrace: Fix selftest goto location on error (bnc#1012382).
- genirq: Fix for_each_action_of_desc() macro (bsc#1061064).
- getcwd: Close race with d_move called by lustre (bsc#1052593).
- gfs2: Do not clear SGID when inheriting ACLs (bsc#1012829).
- gfs2: Fix debugfs glocks dump (bnc#1012382).
- gfs2: Fix reference to ERR_PTR in gfs2_glock_iter_next (bnc#1012382).
- gianfar: Fix Tx flow control deactivation (bnc#1012382).
- hid: i2c-hid: allocate hid buffers for real worst case (bnc#1012382).
- Hid: usbhid: Add HID_QUIRK_NOGET for Aten CS-1758 KVM switch (bnc#1022967).
- hwmon: (gl520sm) Fix overflows and crash seen when writing into limit attributes (bnc#1012382).
- i2c: designware: Add ACPI HID for Hisilicon Hip07/08 I2C controller (bsc#1049291).
- i2c: designware: Convert to use unified device property API (bsc#1049291).
- i2c: meson: fix wrong variable usage in meson_i2c_put_data (bnc#1012382).
- i2c: xgene: Set ACPI_COMPANION_I2C (bsc#1053633).
- i2c: xgene-slimpro: Add ACPI support by using PCC mailbox (bsc#1053633).
- i2c: xgene-slimpro: include linux/io.h for memremap (bsc#1053633).
- i2c: xgene-slimpro: Use a single function to send command message (bsc#1053633).
- i40e/i40evf: fix out-of-bounds read of cpumask (bsc#1053685).
- i40e: Initialize 64-bit statistics TX ring seqcount (bsc#1024346 FATE#321239 bsc#1024373 FATE#321247).
- i40iw: Add missing memory barriers (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- i40iw: Fix port number for query QP (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- ib/core: Add generic function to extract IB speed from netdev (bsc#1056596).
- ib/core: Add ordered workqueue for RoCE GID management (bsc#1056596).
- ib/core: Fix for core panic (bsc#1022595 FATE#322350).
- ib/core: Fix the validations of a multicast LID in attach or detach operations (bsc#1022595 FATE#322350).
- ib/hns: checking for IS_ERR() instead of NULL (bsc#1056849).
- ib/i40iw: Fix error code in i40iw_create_cq() (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- ib/ipoib: Fix deadlock over vlan_mutex (bnc#1012382 bsc#1022595 FATE#322350).
- ib/ipoib: Replace list_del of the neigh-&gt;list with list_del_init (FATE#322350 bnc#1012382 bsc#1022595).
- ib/ipoib: rtnl_unlock can not come after free_netdev (FATE#322350 bnc#1012382 bsc#1022595).
- ib/mlx5: Change logic for dispatching IB events for port state (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- ib/mlx5: Fix cached MR allocation flow (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- ib/mlx5: Fix Raw Packet QP event handler assignment (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ibmvnic: Clean up resources on probe failure (fate#323285, bsc#1058116).
- ibmvnic: Set state UP (bsc#1062962).
- ib/qib: fix false-postive maybe-uninitialized warning (FATE#321231 FATE#321473 FATE#322149 FATE#322153 bnc#1012382).
- ib/rxe: Add dst_clone() in prepare_ipv6_hdr() (bsc#1049361).
- ib/rxe: Avoid ICRC errors by copying into the skb first (bsc#1049361).
- ib/rxe: Disable completion upcalls when a CQ is destroyed (bsc#1049361).
- ib/rxe: Fix destination cache for IPv6 (bsc#1049361).
- ib/rxe: Fix up rxe_qp_cleanup() (bsc#1049361).
- ib/rxe: Fix up the responder's find_resources() function (bsc#1049361).
- ib/rxe: Handle NETDEV_CHANGE events (bsc#1049361).
- ib/rxe: Move refcounting earlier in rxe_send() (bsc#1049361).
- ib/rxe: Remove dangling prototype (bsc#1049361).
- ib/rxe: Remove unneeded initialization in prepare6() (bsc#1049361).
- ib/rxe: Set dma_mask and coherent_dma_mask (bsc#1049361).
- igb: re-assign hw address pointer on reset after PCI error (bnc#1012382).
- iio: ad7793: Fix the serial interface reset (bnc#1012382).
- iio: adc: axp288: Drop bogus AXP288_ADC_TS_PIN_CTRL register modifications (bnc#1012382).
- iio: adc: hx711: Add DT binding for avia,hx711 (bnc#1012382).
- iio: adc: mcp320x: Fix oops on module unload (bnc#1012382).
- iio: adc: mcp320x: Fix readout of negative voltages (bnc#1012382).
- iio: adc: twl4030: Disable the vusb3v1 rugulator in the error handling path of 'twl4030_madc_probe()' (bnc#1012382).
- iio: adc: twl4030: Fix an error handling path in 'twl4030_madc_probe()' (bnc#1012382).
- iio: ad_sigma_delta: Implement a dedicated reset function (bnc#1012382).
- iio: core: Return error for failed read_reg (bnc#1012382).
- input: i8042 - add Gigabyte P57 to the keyboard reset table (bnc#1012382).
- iommu/arm-smmu-v3, acpi: Add temporary Cavium SMMU-V3 IORT model number definitions (bsc#1036060).
- iommu/arm-smmu-v3: Increase CMDQ drain timeout value (bsc#1035479). Refresh patch to mainline version
- iommu/io-pgtable-arm: Check for leaf entry before dereferencing it (bnc#1012382).
- iommu/vt-d: Avoid calling virt_to_phys() on null pointer (bsc#1061067).
- ipv6: accept 64k - 1 packet length in ip6_find_1stfragopt() (bnc#1012382).
- ipv6: add rcu grace period before freeing fib6_node (bnc#1012382).
- ipv6: fix memory leak with multiple tables during netns destruction (bnc#1012382).
- ipv6: fix sparse warning on rt6i_node (bnc#1012382).
- ipv6: fix typo in fib6_net_exit() (bnc#1012382).
- irqchip/gic-v3-its: Fix command buffer allocation (bsc#1057067).
- iscsi-target: fix invalid flags in text response (bsc#1052095).
- iw_cxgb4: put ep reference in pass_accept_req() (FATE#321658 bsc#1005778 FATE#321660 bsc#1005780 FATE#321661 bsc#1005781).
- iwlwifi: add workaround to disable wide channels in 5GHz (bnc#1012382).
- iwlwifi: mvm: do not send CTDP commands via debugfs if not supported (bsc#1031717).
- kabi: arm64: compatibility workaround for lse atomics (bsc#1055290).
- kabi fix drivers/nvme/target/nvmet.h (bsc#1058550).
- KABI fixup struct nvmet_sq (bsc#1063349).
- kABI: protect enum fs_flow_table_type (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- kABI: protect enum pid_type (kabi).
- kABI: protect struct iscsi_np (kabi).
- kABI: protect struct mlx5_priv (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- kABI: protect struct rm_data_op (kabi).
- kABI: protect struct sdio_func (kabi).
- kabi/severities: add fs/ceph to kabi severities (bsc#1048228).
- kabi/severities: Ignore drivers/scsi/cxgbi (bsc#1052094)
- kabi/severities: Ignore kABI changes due to last patchset (bnc#1053472)
- kabi/severities: ignore nfs_pgio_data_destroy
- kABI: uninline task_tgid_nr_nr (kabi).
- kABI: Workaround kABI breakage of AMD-AVIC fixes (bsc#1044503).
- kernel/*: switch to memdup_user_nul() (bsc#1048893).
- kernel/sysctl_binary.c: check name array length in deprecated_sysctl_warning() (FATE#323821).
- keys: fix writing past end of user-supplied buffer in keyring_read() (bnc#1012382).
- keys: prevent creating a different user's keyrings (bnc#1012382).
- keys: prevent KEYCTL_READ on negative key (bnc#1012382).
- kvm: Add struct kvm_vcpu pointer parameter to get_enable_apicv() (bsc#1044503).
- kvm: arm64: Restore host physical timer access on hyp_panic() (bsc#1054082).
- kvm: arm/arm64: Fix bug in advertising KVM_CAP_MSI_DEVID capability (bsc#1054082).
- kvm: async_pf: Fix #DF due to inject 'Page not Present' and 'Page Ready' exceptions simultaneously (bsc#1061017).
- kvm, pkeys: do not use PKRU value in vcpu-&gt;arch.guest_fpu.state (bsc#1055935).
- kvm: PPC: Book3S: Fix race and leak in kvm_vm_ioctl_create_spapr_tce() (bnc#1012382).
- kvm: SVM: Add a missing 'break' statement (bsc#1061017).
- kvm: SVM: Add irqchip_split() checks before enabling AVIC (bsc#1044503).
- kvm: SVM: delete avic_vm_id_bitmap (2 megabyte static array) (bsc#1059500).
- kvm: SVM: Refactor AVIC vcpu initialization into avic_init_vcpu() (bsc#1044503).
- kvm: VMX: do not change SN bit in vmx_update_pi_irte() (bsc#1061017).
- kvm: VMX: remove WARN_ON_ONCE in kvm_vcpu_trigger_posted_interrupt (bsc#1061017).
- kvm: VMX: use cmpxchg64 (bnc#1012382).
- kvm: x86: block guest protection keys unless the host has them enabled (bsc#1055935).
- kvm: x86: kABI workaround for PKRU fixes (bsc#1055935).
- kvm: x86: simplify handling of PKRU (bsc#1055935).
- libata: transport: Remove circular dependency at free time (bnc#1012382).
- libceph: abort already submitted but abortable requests when map or pool goes full (bsc#1048228).
- libceph: add an epoch_barrier field to struct ceph_osd_client (bsc#1048228).
- libceph: advertise support for NEW_OSDOP_ENCODING and SERVER_LUMINOUS (bsc#1048228).
- libceph: advertise support for OSD_POOLRESEND (bsc#1048228).
- libceph: allow requests to return immediately on full conditions if caller wishes (bsc#1048228).
- libceph: always populate t-&gt;target_{oid,oloc} in calc_target() (bsc#1048228).
- libceph: always signal completion when done (bsc#1048228).
- libceph: apply_upmap() (bsc#1048228).
- libceph: avoid unnecessary pi lookups in calc_target() (bsc#1048228).
- libceph: ceph_connection_operations::reencode_message() method (bsc#1048228).
- libceph: ceph_decode_skip_* helpers (bsc#1048228).
- libceph: compute actual pgid in ceph_pg_to_up_acting_osds() (bsc#1048228).
- libceph, crush: per-pool crush_choose_arg_map for crush_do_rule() (bsc#1048228).
- libceph: delete from need_resend_linger before check_linger_pool_dne() (bsc#1048228).
- libceph: do not allow bidirectional swap of pg-upmap-items (bsc#1061451).
- libceph: do not call encode_request_finish() on MOSDBackoff messages (bsc#1048228).
- libceph: do not call -&gt;reencode_message() more than once per message (bsc#1048228).
- libceph: do not pass pgid by value (bsc#1048228).
- libceph: drop need_resend from calc_target() (bsc#1048228).
- libceph: encode_{pgid,oloc}() helpers (bsc#1048228).
- libceph: fallback for when there isn't a pool-specific choose_arg (bsc#1048228).
- libceph: fix old style declaration warnings (bsc#1048228).
- libceph: foldreq-&gt;last_force_resend into ceph_osd_request_target (bsc#1048228).
- libceph: get rid of ack vs commit (bsc#1048228).
- libceph: handle non-empty dest in ceph_{oloc,oid}_copy() (bsc#1048228).
- libceph: initialize last_linger_id with a large integer (bsc#1048228).
- libceph: introduce and switch to decode_pg_mapping() (bsc#1048228).
- libceph: introduce ceph_spg, ceph_pg_to_primary_shard() (bsc#1048228).
- libceph: kill __{insert,lookup,remove}_pg_mapping() (bsc#1048228).
- libceph: make DEFINE_RB_* helpers more general (bsc#1048228).
- libceph: make encode_request_*() work with r_mempool requests (bsc#1048228).
- libceph: make RECOVERY_DELETES feature create a new interval (bsc#1048228).
- libceph: make sure need_resend targets reflect latest map (bsc#1048228).
- libceph: MOSDOp v8 encoding (actual spgid + full hash) (bsc#1048228).
- libceph: new features macros (bsc#1048228).
- libceph: new pi-&gt;last_force_request_resend (bsc#1048228).
- libceph: NULL deref on osdmap_apply_incremental() error path (bsc#1048228).
- libceph: osd_request_timeout option (bsc#1048228).
- libceph: osd_state is 32 bits wide in luminous (bsc#1048228).
- libceph: pg_upmap[_items] infrastructure (bsc#1048228).
- libceph: pool deletion detection (bsc#1048228).
- libceph: potential NULL dereference in ceph_msg_data_create() (bsc#1048228).
- libceph: remove ceph_sanitize_features() workaround (bsc#1048228).
- libceph: remove now unused finish_request() wrapper (bsc#1048228).
- libceph: remove req-&gt;r_replay_version (bsc#1048228).
- libceph: resend on PG splits if OSD has RESEND_ON_SPLIT (bsc#1048228).
- libceph: respect RADOS_BACKOFF backoffs (bsc#1048228).
- libceph: set -EINVAL in one place in crush_decode() (bsc#1048228).
- libceph: support SERVER_JEWEL feature bits (bsc#1048228).
- libceph: take osdc-&gt;lock in osdmap_show() and dump flags in hex (bsc#1048228).
- libceph: upmap semantic changes (bsc#1048228).
- libceph: use alloc_pg_mapping() in __decode_pg_upmap_items() (bsc#1048228).
- libceph: use target pi for calc_target() calculations (bsc#1048228).
- lib: test_rhashtable: fix for large entry counts (bsc#1055359).
- lib: test_rhashtable: Fix KASAN warning (bsc#1055359).
- lightnvm: remove unused rq parameter of nvme_nvm_rqtocmd() to kill warning (FATE#319466).
- locking/rwsem: Fix down_write_killable() for CONFIG_RWSEM_GENERIC_SPINLOCK=y (bsc#969756).
- locking/rwsem-spinlock: Fix EINTR branch in __down_write_common() (bsc#969756).
- lpfc: Add Buffer to Buffer credit recovery support (bsc#1052384).
- lpfc: convert info messages to standard messages (bsc#1052384).
- lpfc: Correct issues with FAWWN and FDISCs (bsc#1052384).
- lpfc: Correct return error codes to align with nvme_fc transport (bsc#1052384).
- lpfc: Fix bad sgl reposting after 2nd adapter reset (bsc#1052384).
- lpfc: Fix crash in lpfc nvmet when fc port is reset (bsc#1052384).
- lpfc: Fix duplicate NVME rport entries and namespaces (bsc#1052384).
- lpfc: Fix handling of FCP and NVME FC4 types in Pt2Pt topology (bsc#1052384).
- lpfc: fix 'integer constant too large' error on 32bit archs (bsc#1052384).
- lpfc: Fix loop mode target discovery (bsc#1052384).
- lpfc: Fix MRQ &gt; 1 context list handling (bsc#1052384).
- lpfc: Fix NVME PRLI handling during RSCN (bsc#1052384).
- lpfc: Fix nvme target failure after 2nd adapter reset (bsc#1052384).
- lpfc: Fix oops when NVME Target is discovered in a nonNVME environment (bsc#1052384).
- lpfc: Fix plogi collision that causes illegal state transition (bsc#1052384).
- lpfc: Fix rediscovery on switch blade pull (bsc#1052384).
- lpfc: Fix relative offset error on large nvmet target ios (bsc#1052384).
- lpfc: fixup crash during storage failover operations (bsc#1042847).
- lpfc: Limit amount of work processed in IRQ (bsc#1052384).
- lpfc: lpfc version bump 11.4.0.3 (bsc#1052384).
- lpfc: remove console log clutter (bsc#1052384).
- lpfc: support nvmet_fc defer_rcv callback (bsc#1052384).
- lsm: fix smack_inode_removexattr and xattr_getsecurity memleak (bnc#1012382).
- mac80211: flush hw_roc_start work before cancelling the ROC (bnc#1012382).
- md/bitmap: disable bitmap_resize for file-backed bitmaps (bsc#1061172).
- md/raid10: submit bio directly to replacement disk (bnc#1012382).
- md/raid5: fix a race condition in stripe batch (linux-stable).
- md/raid5: preserve STRIPE_ON_UNPLUG_LIST in break_stripe_batch_list (bnc#1012382).
- md/raid5: release/flush io in raid5_do_work() (bnc#1012382).
- media: uvcvideo: Prevent heap overflow when accessing mapped controls (bnc#1012382).
- media: v4l2-compat-ioctl32: Fix timespec conversion (bnc#1012382).
- megaraid_sas: Fix probing cards without io port (bsc#1053681).
- mips: Ensure bss section ends on a long-aligned address (bnc#1012382).
- mips: Fix minimum alignment requirement of IRQ stack (git-fixes).
- mips: IRQ Stack: Unwind IRQ stack onto task stack (bnc#1012382).
- mips: Lantiq: Fix another request_mem_region() return code check (bnc#1012382).
- mips: math-emu: &lt;MAXA|MINA&gt;.&lt;D|S&gt;: Fix cases of both infinite inputs (bnc#1012382).
- mips: math-emu: &lt;MAXA|MINA&gt;.&lt;D|S&gt;: Fix cases of input values with opposite signs (bnc#1012382).
- mips: math-emu: &lt;MAX|MAXA|MIN|MINA&gt;.&lt;D|S&gt;: Fix cases of both inputs zero (bnc#1012382).
- mips: math-emu: &lt;MAX|MAXA|MIN|MINA&gt;.&lt;D|S&gt;: Fix quiet NaN propagation (bnc#1012382).
- mips: math-emu: &lt;MAX|MIN&gt;.&lt;D|S&gt;: Fix cases of both inputs negative (bnc#1012382).
- mips: math-emu: MINA.&lt;D|S&gt;: Fix some cases of infinity and zero inputs (bnc#1012382).
- mips: ralink: Fix incorrect assignment on ralink_soc (bnc#1012382).
- mlx5: Avoid that mlx5_ib_sg_to_klms() overflows the klms array (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- mm: avoid marking swap cached page as lazyfree (VM Functionality, bsc#1061775).
- mm/backing-dev.c: fix an error handling path in 'cgwb_create()' (bnc#1063475).
- mmc: mmc: correct the logic for setting HS400ES signal voltage (bsc#1054082).
- mm,compaction: serialize waitqueue_active() checks (for real) (bsc#971975).
- mmc: sdhci-xenon: add set_power callback (bsc#1057035).
- mmc: sdhci-xenon: Fix the work flow in xenon_remove() (bsc#1057035).
- mmc: sdio: fix alignment issue in struct sdio_func (bnc#1012382).
- mm: discard memblock data later (bnc#1063460).
- mm: fix data corruption caused by lazyfree page (VM Functionality, bsc#1061775).
- mm, madvise: ensure poisoned pages are removed from per-cpu lists (VM hw poison -- git fixes).
- mm/memblock.c: reversed logic in memblock_discard() (bnc#1063460).
- mm: meminit: mark init_reserved_page as __meminit (bnc#1063509).
- mm/memory_hotplug: change pfn_to_section_nr/section_nr_to_pfn macro to inline function (bnc#1063501).
- mm/memory_hotplug: define find_{smallest|biggest}_section_pfn as unsigned long (bnc#1063520).
- mm/page_alloc.c: apply gfp_allowed_mask before the first allocation attempt (bnc#971975 VM -- git fixes).
- mm: prevent double decrease of nr_reserved_highatomic (bnc#1012382).
- mm/vmalloc.c: huge-vmap: fail gracefully on unexpected huge vmap mappings (bsc#1046529).
- mptsas: Fixup device hotplug for VMWare ESXi (bsc#1030850).
- net: core: Prevent from dereferencing null pointer when releasing SKB (bnc#1012382).
- net: ethernet: hip04: Call SET_NETDEV_DEV() (bsc#1049336).
- netfilter: fix IS_ERR_VALUE usage (bsc#1052888).
- netfilter: invoke synchronize_rcu after set the _hook_ to NULL (bnc#1012382).
- netfilter: nfnl_cthelper: fix incorrect helper-&gt;expect_class_max (bnc#1012382).
- netfilter: x_tables: pack percpu counter allocations (bsc#1052888).
- netfilter: x_tables: pass xt_counters struct instead of packet counter (bsc#1052888).
- netfilter: x_tables: pass xt_counters struct to counter allocator (bsc#1052888).
- net: hns: add acpi function of xge led control (bsc#1049336).
- net: hns: Fix a skb used after free bug (bsc#1049336).
- net/mlx4_core: Enable 4K UAR if SRIOV module parameter is not enabled (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- net/mlx5: Check device capability for maximum flow counters (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Delay events till ib registration ends (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Check for qos capability in dcbnl_initialize (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Do not add/remove 802.1ad rules when changing 802.1Q VLAN filter (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Fix calculated checksum offloads counters (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Fix dangling page pointer on DMA mapping error (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Fix DCB_CAP_ATTR_DCBX capability for DCBNL getcap (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Fix inline header size for small packets (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Print netdev features correctly in error message (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Schedule overflow check work to mlx5e workqueue (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5: E-Switch, Unload the representors in the correct order (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Fix arm SRQ command for ISSI version 0 (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Fix command completion after timeout access invalid structure (bsc#966318 FATE#320158 bsc#966316 FATE#320159).
- net/mlx5: Fix counter list hardware structure (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Remove the flag MLX5_INTERFACE_STATE_SHUTDOWN (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5: Skip mlx5_unload_one if mlx5_load_one fails (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net: mvpp2: fix the mac address used when using PPv2.2 (bsc#1032150).
- net: mvpp2: use {get, put}_cpu() instead of smp_processor_id() (bsc#1032150).
- net/packet: check length in getsockopt() called with PACKET_HDRLEN (bnc#1012382).
- net: phy: Fix lack of reference count on PHY driver (bsc#1049336).
- net: phy: Fix PHY module checks and NULL deref in phy_attach_direct() (bsc#1049336).
- netvsc: Initialize 64-bit stats seqcount (fate#320485).
- new helper: memdup_user_nul() (bsc#1048893).
- nfsd: Fix general protection fault in release_lock_stateid() (bnc#1012382).
- nfs: flush data when locking a file to ensure cache coherence for mmap (bsc#981309).
- nvme: allow timed-out ios to retry (bsc#1063349).
- nvme-fabrics: generate spec-compliant UUID NQNs (bsc#1057498).
- nvme-fc: address target disconnect race conditions in fcp io submit (bsc#1052384).
- nvme-fc: do not override opts-&gt;nr_io_queues (bsc#1052384).
- nvme-fc: kABI fix for defer_rcv() callback (bsc#1052384).
- nvme_fc/nvmet_fc: revise Create Association descriptor length (bsc#1052384).
- nvme_fc: Reattach to localports on re-registration (bsc#1052384).
- nvme-fc: revise TRADDR parsing (bsc#1052384).
- nvme-fc: update tagset nr_hw_queues after queues reinit (bsc#1052384).
- nvme-fc: use blk_mq_delay_run_hw_queue instead of open-coding it (bsc#1052384).
- nvme: fix hostid parsing (bsc#1049272).
- nvme: fix sqhd reference when admin queue connect fails (bsc#1063349).
- nvme: fix visibility of 'uuid' ns attribute (bsc#1060400).
- nvme-loop: update tagset nr_hw_queues after reconnecting/resetting (bsc#1052384).
- nvme: protect against simultaneous shutdown invocations (FATE#319965 bnc#1012382 bsc#964944).
- nvme-rdma: update tagset nr_hw_queues after reconnecting/resetting (bsc#1052384).
- nvme: stop aer posting if controller state not live (bsc#1063349).
- nvmet: avoid unneeded assignment of submit_bio return value (bsc#1052384).
- nvmet_fc: Accept variable pad lengths on Create Association LS (bsc#1052384).
- nvmet_fc: add defer_req callback for deferment of cmd buffer return (bsc#1052384).
- nvmet-fc: correct use after free on list teardown (bsc#1052384).
- nvmet-fc: eliminate incorrect static markers on local variables (bsc#1052384).
- nvmet-fc: fix byte swapping in nvmet_fc_ls_create_association (bsc#1052384).
- nvmet_fc: Simplify sg list handling (bsc#1052384).
- nvmet: implement valid sqhd values in completions (bsc#1063349).
- nvmet: Move serial number from controller to subsystem (bsc#1058550).
- nvmet: prefix version configfs file with attr (bsc#1052384).
- nvmet: preserve controller serial number between reboots (bsc#1058550).
- nvmet: synchronize sqhd update (bsc#1063349).
- nvme: use device_add_disk_with_groups() (bsc#1060400).
- of: fix '/cpus' reference leak in of_numa_parse_cpu_nodes() (bsc#1056827).
- ovl: fix dentry leak for default_permissions (bsc#1054084).
- parisc: perf: Fix potential NULL pointer dereference (bnc#1012382).
- partitions/efi: Fix integer overflow in GPT size calculation (FATE#322379 bnc#1012382 bsc#1020989).
- pci: Allow PCI express root ports to find themselves (bsc#1061046).
- pci: fix oops when try to find Root Port for a PCI device (bsc#1061046).
- pci: Fix race condition with driver_override (bnc#1012382).
- pci: Mark AMD Stoney GPU ATS as broken (bsc#1061046).
- pci: rockchip: Handle regulator_get_current_limit() failure correctly (bsc#1056849).
- pci: rockchip: Use normal register bank for config accessors (bsc#1056849).
- pci: shpchp: Enable bridge bus mastering if MSI is enabled (bnc#1012382).
- percpu_ref: allow operation mode switching operations to be called concurrently (bsc#1055096).
- percpu_ref: remove unnecessary RCU grace period for staggered atomic switching confirmation (bsc#1055096).
- percpu_ref: reorganize __percpu_ref_switch_to_atomic() and relocate percpu_ref_switch_to_atomic() (bsc#1055096).
- percpu_ref: restructure operation mode switching (bsc#1055096).
- percpu_ref: unify staggered atomic switching wait behavior (bsc#1055096).
- perf: arm: acpi: remove cpu hotplug statemachine dependency (bsc#1062279).
- perf: arm: platform: remove cpu hotplug statemachine dependency (bsc#1062279).
- perf: arm: replace irq_get_percpu_devid_partition call (bsc#1062279).
- perf: arm: temporary workaround for build errors (bsc#1062279).
- perf: Convert to using %pOF instead of full_name (bsc#1062279).
- perf/x86: Fix RDPMC vs. mm_struct tracking (bsc#1061831).
- perf/x86: kABI Workaround for 'perf/x86: Fix RDPMC vs. mm_struct tracking' (bsc#1061831).
- perf: xgene: Add APM X-Gene SoC Performance Monitoring Unit driver (bsc#1036737).
- perf: xgene: Include module.h (bsc#1036737).
- perf: xgene: Move PMU leaf functions into function pointer structure (bsc#1036737).
- perf: xgene: Parse PMU subnode from the match table (bsc#1036737).
- phy: Do not increment MDIO bus refcount unless it's a different owner (bsc#1049336).
- phy: fix error case of phy_led_triggers_(un)register (bsc#1049336).
- pm / Domains: Fix unsafe iteration over modified list of domains (bsc#1056849).
- powerpc: Fix DAR reporting when alignment handler faults (bnc#1012382).
- powerpc: Fix unused function warning 'lmb_to_memblock' (FATE#322022).
- powerpc/perf: Cleanup of PM_BR_CMPL vs. PM_BRU_CMPL in Power9 event list (bsc#1056686, fate#321438, bsc#1047238, git-fixes 34922527a2bc).
- powerpc/perf: Factor out PPMU_ONLY_COUNT_RUN check code from power8 (fate#321438, bsc#1053043, git-fixes efe881afdd999).
- powerpc/pseries: Add pseries hotplug workqueue (FATE#322022).
- powerpc/pseries: Auto-online hotplugged memory (FATE#322022).
- powerpc/pseries: Check memory device state before onlining/offlining (FATE#322022).
- powerpc/pseries: Correct possible read beyond dlpar sysfs buffer (FATE#322022).
- powerpc/pseries: Do not attempt to acquire drc during memory hot add for assigned lmbs (FATE#322022).
- powerpc/pseries: Fix build break when MEMORY_HOTREMOVE=n (FATE#322022).
- powerpc/pseries: fix memory leak in queue_hotplug_event() error path (FATE#322022).
- powerpc/pseries: Fix parent_dn reference leak in add_dt_node() (bnc#1012382).
- powerpc/pseries: Implement indexed-count hotplug memory add (FATE#322022).
- powerpc/pseries: Implement indexed-count hotplug memory remove (FATE#322022).
- powerpc/pseries: Introduce memory hotplug READD operation (FATE#322022).
- powerpc/pseries: Make the acquire/release of the drc for memory a seperate step (FATE#322022).
- powerpc/pseries: Remove call to memblock_add() (FATE#322022).
- powerpc/pseries: Revert 'Auto-online hotplugged memory' (FATE#322022).
- powerpc/pseries: Update affinity for memory and cpus specified in a PRRN event (FATE#322022).
- powerpc/pseries: Use kernel hotplug queue for PowerVM hotplug events (FATE#322022).
- powerpc/pseries: Use lmb_is_removable() to check removability (FATE#322022).
- powerpc/pseries: Verify CPU does not exist before adding (FATE#322022).
- qeth: add network device features for VLAN devices (bnc#1053472, LTC#157385).
- qlge: avoid memcpy buffer overflow (bnc#1012382).
- r8169: Add support for restarting auto-negotiation (bsc#1050742).
- r8169:Correct the way of setting RTL8168DP ephy (bsc#1050742).
- r8169:fix system hange problem (bsc#1050742).
- r8169:Fix typo in setting RTL8168H PHY parameter (bsc#1050742).
- r8169:Fix typo in setting RTL8168H PHY PFM mode (bsc#1050742).
- r8169:Remove unnecessary phy reset for pcie nic when setting link spped (bsc#1050742).
- r8169:Update the way of reading RTL8168H PHY register 'rg_saw_cnt' (bsc#1050742).
- rda=sRDMA: Fix the composite message user notification (bnc#1012382).
- rdma/bnxt_re: Allocate multiple notification queues (bsc#1037579).
- rdma/bnxt_re: Implement the alloc/get_hw_stats callback (bsc#1037579).
- rdma: Fix return value check for ib_get_eth_speed() (bsc#1056596).
- rdma/qedr: Parse VLAN ID correctly and ignore the value of zero (bsc#1019695 FATE#321703 bsc#1019699 FATE#321702 bsc#1022604 FATE#321747).
- rdma/qedr: Parse vlan priority as sl (bsc#1019695 FATE#321703 bsc#1019699 FATE#321702 bsc#1022604 FATE#321747).
- rds: ib: add error handle (bnc#1012382).
- Remove patch 0407-nvme_fc-change-failure-code-on-remoteport-connectivi.patch (bsc#1037838)
- Remove superfluous hunk in bigmem backport (bsc#1064436).
- Revert 'ceph: SetPageError() for writeback pages if writepages fails' (bsc#1048228).
- Revert 'ipv6: add rcu grace period before freeing fib6_node' (kabi).
- Revert 'ipv6: fix sparse warning on rt6i_node' (kabi).
- Revert 'net: fix percpu memory leaks' (bnc#1012382).
- Revert 'net: phy: Correctly process PHY_HALTED in phy_stop_machine()' (bnc#1012382).
- Revert 'net: use lib/percpu_counter API for fragmentation mem accounting' (bnc#1012382).
- Revert 'Update patches.fixes/xfs-refactor-log-record-unpack-and-data-processing.patch (bsc#1043598, bsc#1036215).' This reverts commit 54e17b011580b532415d2aee5e875c8cf0460df4.
- Revert 'x86/acpi: Enable MADT APIs to return disabled apicids' (bnc#1056230).
- Revert 'x86/acpi: Set persistent cpuid &amp;lt;-&amp;gt; nodeid mapping when booting' (bnc#1056230).
- Revert 'xfs: detect and handle invalid iclog size set by mkfs (bsc#1043598).' This reverts commit caf0b124b172568b3e39544cb9abfdaa7fb3d852.
- Revert 'xfs: detect and trim torn writes during log recovery (bsc#1036215).' This reverts commit a7a591776e8628a33f0223ca9a3f46c1e79bd908.
- Revert 'xfs: refactor and open code log record crc check (bsc#1036215).' This reverts commit 6aef5e1fee21246222618f2337c84d6093281561.
- Revert 'xfs: refactor log record start detection into a new helper (bsc#1036215).' This reverts commit a424c875bdc05dcf3bb0d1af740b644773091cf0.
- Revert 'xfs: return start block of first bad log record during recovery (bsc#1036215).' This reverts commit cb0ce8b2f1435d7ac9aaeb5d5709e73946d55bed.
- Revert 'xfs: support a crc verification only log record pass (bsc#1036215).' This reverts commit f5c0c41b1f3626750f1f0d76b6d71fac673854d2.
- Rewrote KVM kABI fix patches for addressing regressions (bsc#1063570)
- rtnetlink: fix rtnl_vfinfo_size (bsc#1056261).
- s390/cpcmd,vmcp: avoid GFP_DMA allocations (bnc#1060249, LTC#159112).
- s390/diag: add diag26c support (bnc#1053472, LTC#156729).
- s390: export symbols for crash-kmp (bsc#1053915).
- s390: Include uapi/linux/if_ether.h instead of linux/if_ether.h (bsc#1053472).
- s390/pci: do not cleanup in arch_setup_msi_irqs (bnc#1053472, LTC#157731).
- s390/pci: fix handling of PEC 306 (bnc#1053472, LTC#157731).
- s390/pci: improve error handling during fmb (de)registration (bnc#1053472, LTC#157731).
- s390/pci: improve error handling during interrupt deregistration (bnc#1053472, LTC#157731).
- s390/pci: improve pci hotplug (bnc#1053472, LTC#157731).
- s390/pci: improve unreg_ioat error handling (bnc#1053472, LTC#157731).
- s390/pci: introduce clp_get_state (bnc#1053472, LTC#157731).
- s390/pci: provide more debug information (bnc#1053472, LTC#157731).
- s390/pci: recognize name clashes with uids (bnc#1053472, LTC#157731).
- s390/qdio: avoid reschedule of outbound tasklet once killed (bnc#1060249, LTC#159885).
- s390/qeth: no ETH header for outbound AF_IUCV (bnc#1053472, LTC#156276).
- s390/qeth: size calculation outbound buffers (bnc#1053472, LTC#156276).
- s390/qeth: use diag26c to get MAC address on L2 (bnc#1053472, LTC#156729).
- s390/topology: alternative topology for topology-less machines (bnc#1060249, LTC#159177).
- s390/topology: always use s390 specific sched_domain_topology_level (bnc#1060249, LTC#159177).
- s390/topology: enable / disable topology dynamically (bnc#1060249, LTC#159177).
- sched/cpuset/pm: Fix cpuset vs. suspend-resume bugs (bnc#1012382).
- scsi: csiostor: add check for supported fw version (bsc#1005776).
- scsi: csiostor: add support for Chelsio T6 adapters (bsc#1005776).
- scsi: csiostor: fix use after free in csio_hw_use_fwconfig() (bsc#1005776).
- scsi: csiostor: switch to pci_alloc_irq_vectors (bsc#1005776).
- scsi: csiostor: update module version (bsc#1052093).
- scsi: cxgb4i: assign rxqs in round robin mode (bsc#1052094).
- scsi: fixup kernel warning during rmmod() (bsc#1052360).
- scsi: hisi_sas: add missing break in switch statement (bsc#1056849).
- scsi: ILLEGAL REQUEST + ASC==27 =&gt; target failure (bsc#1059465).
- scsi: libfc: fix a deadlock in fc_rport_work (bsc#1063695).
- scsi: lpfc: Ensure io aborts interlocked with the target (bsc#1056587).
- scsi: megaraid_sas: Check valid aen class range to avoid kernel panic (bnc#1012382).
- scsi: megaraid_sas: Return pended IOCTLs with cmd_status MFI_STAT_WRONG_STATE in case adapter is dead (bnc#1012382).
- scsi: qedf: Fix a potential NULL pointer dereference (bsc#1048912).
- scsi: qedf: Limit number of CQs (bsc#1040813).
- scsi: qedi: off by one in qedi_get_cmd_from_tid() (bsc#1004527, FATE#321744).
- scsi: qla2xxx: Fix uninitialized work element (bsc#1019675,FATE#321701).
- scsi: scsi_transport_fc: Also check for NOTPRESENT in fc_remote_port_add() (bsc#1037890).
- scsi: scsi_transport_fc: set scsi_target_id upon rescan (bsc#1058135).
- scsi: sd: Do not override max_sectors_kb sysfs setting (bsc#1025461).
- scsi: sd: Remove LBPRZ dependency for discards (bsc#1060985). This patch is originally part of a larger series which can't be easily backported to SLE-12. For a reasoning why we think it's safe to apply, see bsc#1060985, comment 20.
- scsi: sg: close race condition in sg_remove_sfp_usercontext() (bsc#1064206).
- scsi: sg: do not return bogus Sg_requests (bsc#1064206).
- scsi: sg: factor out sg_fill_request_table() (bnc#1012382).
- scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE (bnc#1012382).
- scsi: sg: off by one in sg_ioctl() (bnc#1012382).
- scsi: sg: only check for dxfer_len greater than 256M (bsc#1064206).
- scsi: sg: remove 'save_scat_len' (bnc#1012382).
- scsi: sg: use standard lists for sg_requests (bnc#1012382).
- scsi: storvsc: fix memory leak on ring buffer busy (bnc#1012382).
- scsi_transport_fc: Also check for NOTPRESENT in fc_remote_port_add() (bsc#1037890).
- scsi: zfcp: add handling for FCP_RESID_OVER to the fcp ingress path (bnc#1012382).
- scsi: zfcp: fix capping of unsuccessful GPN_FT SAN response trace records (bnc#1012382).
- scsi: zfcp: fix missing trace records for early returns in TMF eh handlers (bnc#1012382).
- scsi: zfcp: fix passing fsf_req to SCSI trace on TMF to correlate with HBA (bnc#1012382).
- scsi: zfcp: fix payload with full FCP_RSP IU in SCSI trace records (bnc#1012382).
- scsi: zfcp: fix queuecommand for scsi_eh commands when DIX enabled (bnc#1012382).
- scsi: zfcp: trace HBA FSF response by default on dismiss or timedout late response (bnc#1012382).
- scsi: zfcp: trace high part of 'new' 64 bit SCSI LUN (bnc#1012382).
- seccomp: fix the usage of get/put_seccomp_filter() in seccomp_get_filter() (bnc#1012382).
- sh_eth: use correct name for ECMR_MPDE bit (bnc#1012382).
- skd: Avoid that module unloading triggers a use-after-free (bnc#1012382).
- skd: Submit requests to firmware before triggering the doorbell (bnc#1012382).
- SMB3: Do not ignore O_SYNC/O_DSYNC and O_DIRECT flags (bnc#1012382).
- SMB: Validate negotiate (to protect against downgrade) even if signing off (bnc#1012382).
- staging: iio: ad7192: Fix - use the dedicated reset function avoiding dma from stack (bnc#1012382).
- stm class: Fix a use-after-free (bnc#1012382).
- supported.conf: clear mistaken external support flag for cifs.ko (bsc#1053802).
- supported.conf: enable dw_mmc-rockchip driver References: bsc#1064064
- swiotlb-xen: implement xen_swiotlb_dma_mmap callback (bnc#1012382).
- sysctl: fix lax sysctl_check_table() sanity check (bsc#1048893).
- sysctl: fold sysctl_writes_strict checks into helper (bsc#1048893).
- sysctl: kdoc'ify sysctl_writes_strict (bsc#1048893).
- sysctl: simplify unsigned int support (bsc#1048893).
- team: call netdev_change_features out of team lock (bsc#1055567).
- team: fix memory leaks (bnc#1012382).
- timer/sysclt: Restrict timer migration sysctl values to 0 and 1 (bnc#1012382).
- tpm: fix: return rc when devm_add_action() fails (bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048, git-fixes 8e0ee3c9faed).
- tpm: read burstcount from TPM_STS in one 32-bit transaction (bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048, git-fixes 27084efee0c3).
- tpm_tis_core: Choose appropriate timeout for reading burstcount (bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048, git-fixes aec04cbdf723).
- tpm_tis_core: convert max timeouts from msec to jiffies (bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048, git-fixes aec04cbdf723).
- tracing: Apply trace_clock changes to instance max buffer (bnc#1012382).
- tracing: Erase irqsoff trace with empty write (bnc#1012382).
- tracing: Fix trace_pipe behavior for instance traces (bnc#1012382).
- ttpci: address stringop overflow warning (bnc#1012382).
- tty: fix __tty_insert_flip_char regression (bnc#1012382).
- tty: goldfish: Fix a parameter of a call to free_irq (bnc#1012382).
- tty: improve tty_insert_flip_char() fast path (bnc#1012382).
- tty: improve tty_insert_flip_char() slow path (bnc#1012382).
- tty: pl011: fix initialization order of QDF2400 E44 (bsc#1054082).
- tty: serial: msm: Support more bauds (git-fixes).
- ubifs: Correctly evict xattr inodes (bsc#1012829).
- ubifs: Do not leak kernel memory to the MTD (bsc#1012829).
- Update patches.drivers/0029-perf-xgene-Remove-bogus-IS_ERR-check.patch (bsc#1036737).
- Update patches.drivers/tpm-141-fix-RC-value-check-in-tpm2_seal_trusted.patch (bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048, git-fixes 5ca4c20cfd37).
- usb: chipidea: vbus event may exist before starting gadget (bnc#1012382).
- usb: core: fix device node leak (bsc#1047487).
- usb: core: harden cdc_parse_cdc_header (bnc#1012382).
- usb: devio: Do not corrupt user memory (bnc#1012382).
- usb: dummy-hcd: fix connection failures (wrong speed) (bnc#1012382).
- usb: dummy-hcd: Fix erroneous synchronization change (bnc#1012382).
- usb: dummy-hcd: fix infinite-loop resubmission bug (bnc#1012382).
- usb: fix out-of-bounds in usb_set_configuration (bnc#1012382).
- usb: gadgetfs: fix copy_to_user while holding spinlock (bnc#1012382).
- usb: gadgetfs: Fix crash caused by inadequate synchronization (bnc#1012382).
- usb: gadget: inode.c: fix unbalanced spin_lock in ep0_write (bnc#1012382).
- usb: gadget: mass_storage: set msg_registered after msg registered (bnc#1012382).
- usb: gadget: udc: atmel: set vbus irqflags explicitly (bnc#1012382).
- usb: g_mass_storage: Fix deadlock when driver is unbound (bnc#1012382).
- usb: Increase quirk delay for USB devices (bnc#1012382).
- usb: pci-quirks.c: Corrected timeout values used in handshake (bnc#1012382).
- usb: plusb: Add support for PL-27A1 (bnc#1012382).
- usb: renesas_usbhs: fix the BCLR setting condition for non-DCP pipe (bnc#1012382).
- usb: renesas_usbhs: fix usbhsf_fifo_clear() for RX direction (bnc#1012382).
- usb: serial: mos7720: fix control-message error handling (bnc#1012382).
- usb: serial: mos7840: fix control-message error handling (bnc#1012382).
- usb-storage: unusual_devs entry to fix write-access regression for Seagate external drives (bnc#1012382).
- usb: uas: fix bug in handling of alternate settings (bnc#1012382).
- uwb: ensure that endpoint is interrupt (bnc#1012382).
- uwb: properly check kthread_run return value (bnc#1012382).
- vfs: Return -ENXIO for negative SEEK_HOLE / SEEK_DATA offsets (bnc#1012382).
- video: fbdev: aty: do not leak uninitialized padding in clk to userspace (bnc#1012382).
- Workaround for kABI compatibility with DP-MST patches (bsc#1055493).
- x86/acpi: Restore the order of CPU IDs (bnc#1056230).
- x86/cpu/amd: Hide unused legacy_fixup_core_id() function (bsc#1060229).
- x86/cpu/amd: Limit cpu_core_id fixup to families older than F17h (bsc#1060229).
- x86/cpu: Remove unused and undefined __generic_processor_info() declaration (bnc#1056230).
- x86 edac, sb_edac.c: Take account of channel hashing when needed (bsc#1061721).
- x86/fpu: Do not let userspace set bogus xcomp_bv (bnc#1012382).
- x86/fsgsbase/64: Report FSBASE and GSBASE correctly in core dumps (bnc#1012382).
- x86/ldt: Fix off by one in get_segment_base() (bsc#1061872).
- x86/mm: Fix boot crash caused by incorrect loop count calculation in sync_global_pgds() (bsc#1058512).
- x86/mm: Fix fault error path using unsafe vma pointer (fate#321300).
- x86/mm: Fix use-after-free of ldt_struct (bsc#1055963).
- x86/mshyperv: Remove excess #includes from mshyperv.h (fate#320485).
- xfs/dmapi: fix incorrect file-&gt;f_path.dentry-&gt;d_inode usage (bsc#1055896).
- xfs: fix inobt inode allocation search optimization (bsc#1012829).
- xfs: handle error if xfs_btree_get_bufs fails (bsc#1059863).
- xfs: nowait aio support (FATE#321994).
- xfs: remove kmem_zalloc_greedy (bnc#1012382).
- xgene: Always get clk source, but ignore if it's missing for SGMII ports (bsc#1048501).
- xgene: Do not fail probe, if there is no clk resource for SGMII interfaces (bsc#1048501).
- xhci: fix finding correct bus_state structure for USB 3.1 hosts (bnc#1012382).

		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-25"/>
	<updated date="2017-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1004527">SUSE bug 1004527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005776">SUSE bug 1005776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005778">SUSE bug 1005778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005780">SUSE bug 1005780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005781">SUSE bug 1005781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012829">SUSE bug 1012829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015342">SUSE bug 1015342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015343">SUSE bug 1015343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019675">SUSE bug 1019675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019680">SUSE bug 1019680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019695">SUSE bug 1019695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019699">SUSE bug 1019699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020412">SUSE bug 1020412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020645">SUSE bug 1020645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020657">SUSE bug 1020657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020989">SUSE bug 1020989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021424">SUSE bug 1021424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022595">SUSE bug 1022595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022604">SUSE bug 1022604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022743">SUSE bug 1022743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022912">SUSE bug 1022912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022967">SUSE bug 1022967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024346">SUSE bug 1024346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024373">SUSE bug 1024373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024405">SUSE bug 1024405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025461">SUSE bug 1025461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030850">SUSE bug 1030850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031784">SUSE bug 1031784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032150">SUSE bug 1032150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034048">SUSE bug 1034048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034075">SUSE bug 1034075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035479">SUSE bug 1035479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036060">SUSE bug 1036060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036215">SUSE bug 1036215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036737">SUSE bug 1036737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037579">SUSE bug 1037579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037838">SUSE bug 1037838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037890">SUSE bug 1037890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038583">SUSE bug 1038583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040813">SUSE bug 1040813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042847">SUSE bug 1042847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043598">SUSE bug 1043598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044503">SUSE bug 1044503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046529">SUSE bug 1046529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047238">SUSE bug 1047238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047989">SUSE bug 1047989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048155">SUSE bug 1048155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048228">SUSE bug 1048228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048325">SUSE bug 1048325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048327">SUSE bug 1048327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048356">SUSE bug 1048356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048501">SUSE bug 1048501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048893">SUSE bug 1048893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048912">SUSE bug 1048912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048934">SUSE bug 1048934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049226">SUSE bug 1049226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049272">SUSE bug 1049272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049291">SUSE bug 1049291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049336">SUSE bug 1049336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049361">SUSE bug 1049361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049580">SUSE bug 1049580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050471">SUSE bug 1050471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050742">SUSE bug 1050742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051790">SUSE bug 1051790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051987">SUSE bug 1051987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052093">SUSE bug 1052093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052094">SUSE bug 1052094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052095">SUSE bug 1052095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052360">SUSE bug 1052360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052384">SUSE bug 1052384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052580">SUSE bug 1052580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052593">SUSE bug 1052593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052888">SUSE bug 1052888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053043">SUSE bug 1053043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053309">SUSE bug 1053309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053472">SUSE bug 1053472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053627">SUSE bug 1053627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053629">SUSE bug 1053629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053633">SUSE bug 1053633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053681">SUSE bug 1053681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053685">SUSE bug 1053685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053802">SUSE bug 1053802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053915">SUSE bug 1053915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054082">SUSE bug 1054082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054084">SUSE bug 1054084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054654">SUSE bug 1054654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055013">SUSE bug 1055013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055096">SUSE bug 1055096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055272">SUSE bug 1055272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055290">SUSE bug 1055290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055359">SUSE bug 1055359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055493">SUSE bug 1055493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055567">SUSE bug 1055567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055709">SUSE bug 1055709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055755">SUSE bug 1055755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055896">SUSE bug 1055896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055935">SUSE bug 1055935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055963">SUSE bug 1055963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056185">SUSE bug 1056185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056230">SUSE bug 1056230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056261">SUSE bug 1056261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056427">SUSE bug 1056427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056587">SUSE bug 1056587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056588">SUSE bug 1056588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056596">SUSE bug 1056596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056686">SUSE bug 1056686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056827">SUSE bug 1056827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056849">SUSE bug 1056849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056982">SUSE bug 1056982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057015">SUSE bug 1057015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057031">SUSE bug 1057031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057035">SUSE bug 1057035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057038">SUSE bug 1057038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057047">SUSE bug 1057047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057067">SUSE bug 1057067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057383">SUSE bug 1057383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057498">SUSE bug 1057498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057849">SUSE bug 1057849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058038">SUSE bug 1058038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058116">SUSE bug 1058116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058135">SUSE bug 1058135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058410">SUSE bug 1058410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058507">SUSE bug 1058507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058512">SUSE bug 1058512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058550">SUSE bug 1058550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059051">SUSE bug 1059051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059465">SUSE bug 1059465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059500">SUSE bug 1059500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059863">SUSE bug 1059863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060197">SUSE bug 1060197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060229">SUSE bug 1060229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060249">SUSE bug 1060249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060400">SUSE bug 1060400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060985">SUSE bug 1060985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061017">SUSE bug 1061017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061046">SUSE bug 1061046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061064">SUSE bug 1061064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061067">SUSE bug 1061067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061172">SUSE bug 1061172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061451">SUSE bug 1061451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061721">SUSE bug 1061721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061775">SUSE bug 1061775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061831">SUSE bug 1061831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061872">SUSE bug 1061872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062279">SUSE bug 1062279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062520">SUSE bug 1062520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062962">SUSE bug 1062962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063102">SUSE bug 1063102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063349">SUSE bug 1063349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063460">SUSE bug 1063460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063475">SUSE bug 1063475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063501">SUSE bug 1063501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063509">SUSE bug 1063509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063520">SUSE bug 1063520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063570">SUSE bug 1063570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063671">SUSE bug 1063671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063695">SUSE bug 1063695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064064">SUSE bug 1064064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064206">SUSE bug 1064206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064388">SUSE bug 1064388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064436">SUSE bug 1064436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963575">SUSE bug 963575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964944">SUSE bug 964944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966170">SUSE bug 966170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966172">SUSE bug 966172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966186">SUSE bug 966186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966191">SUSE bug 966191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966316">SUSE bug 966316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966318">SUSE bug 966318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969476">SUSE bug 969476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969477">SUSE bug 969477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969756">SUSE bug 969756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981309">SUSE bug 981309</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000252/">CVE-2017-1000252 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000252">CVE-2017-1000252 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-11472/">CVE-2017-11472 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11472">CVE-2017-11472 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12134/">CVE-2017-12134 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12134">CVE-2017-12134 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12153/">CVE-2017-12153 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12153">CVE-2017-12153 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12154/">CVE-2017-12154 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12154">CVE-2017-12154 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14051">CVE-2017-14051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14106/">CVE-2017-14106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14106">CVE-2017-14106 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14489/">CVE-2017-14489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14489">CVE-2017-14489 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15265">CVE-2017-15265 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15649/">CVE-2017-15649 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15649">CVE-2017-15649 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552665" comment="kernel-default-4.4.92-6.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552666" comment="kernel-default-base-4.4.92-6.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552667" comment="kernel-default-devel-4.4.92-6.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552668" comment="kernel-default-man-4.4.92-6.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519541" comment="kernel-devel-4.4.92-6.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519542" comment="kernel-macros-4.4.92-6.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519543" comment="kernel-source-4.4.92-6.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552669" comment="kernel-syms-4.4.92-6.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149412" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1062563" ref_url="https://bugzilla.suse.com/1062563" source="BUGZILLA"/>
		<reference ref_id="1062620" ref_url="https://bugzilla.suse.com/1062620" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000256" ref_url="https://www.suse.com/security/cve/CVE-2017-1000256/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003354.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issue fixed:

- CVE-2017-1000256: Ensure TLS clients always verify the server certificate in the serial/TLS support. (bsc#1062563)

Non security issue fixed:

- libvirt-daemon-qemu requires libvirt-daemon-driver-storage (bsc#1062620)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-25"/>
	<updated date="2017-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062563">SUSE bug 1062563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062620">SUSE bug 1062620</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000256/">CVE-2017-1000256 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000256">CVE-2017-1000256 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552670" comment="libvirt-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552671" comment="libvirt-admin-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552672" comment="libvirt-client-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552673" comment="libvirt-daemon-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552674" comment="libvirt-daemon-config-network-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552675" comment="libvirt-daemon-config-nwfilter-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552676" comment="libvirt-daemon-driver-interface-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519552" comment="libvirt-daemon-driver-libxl-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552677" comment="libvirt-daemon-driver-lxc-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552678" comment="libvirt-daemon-driver-network-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552679" comment="libvirt-daemon-driver-nodedev-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552680" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552681" comment="libvirt-daemon-driver-qemu-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552682" comment="libvirt-daemon-driver-secret-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552683" comment="libvirt-daemon-driver-storage-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552684" comment="libvirt-daemon-driver-storage-core-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552685" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552686" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552687" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552688" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552689" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552690" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552691" comment="libvirt-daemon-lxc-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552692" comment="libvirt-daemon-qemu-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519569" comment="libvirt-daemon-xen-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552693" comment="libvirt-doc-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552694" comment="libvirt-libs-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552695" comment="libvirt-lock-sanlock-3.3.0-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552696" comment="libvirt-nss-3.3.0-5.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149413" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1047873" ref_url="https://bugzilla.suse.com/1047873" source="BUGZILLA"/>
		<reference ref_id="1057247" ref_url="https://bugzilla.suse.com/1057247" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11108" ref_url="https://www.suse.com/security/cve/CVE-2017-11108/" source="CVE"/>
		<reference ref_id="CVE-2017-11541" ref_url="https://www.suse.com/security/cve/CVE-2017-11541/" source="CVE"/>
		<reference ref_id="CVE-2017-11542" ref_url="https://www.suse.com/security/cve/CVE-2017-11542/" source="CVE"/>
		<reference ref_id="CVE-2017-11543" ref_url="https://www.suse.com/security/cve/CVE-2017-11543/" source="CVE"/>
		<reference ref_id="CVE-2017-12893" ref_url="https://www.suse.com/security/cve/CVE-2017-12893/" source="CVE"/>
		<reference ref_id="CVE-2017-12894" ref_url="https://www.suse.com/security/cve/CVE-2017-12894/" source="CVE"/>
		<reference ref_id="CVE-2017-12895" ref_url="https://www.suse.com/security/cve/CVE-2017-12895/" source="CVE"/>
		<reference ref_id="CVE-2017-12896" ref_url="https://www.suse.com/security/cve/CVE-2017-12896/" source="CVE"/>
		<reference ref_id="CVE-2017-12897" ref_url="https://www.suse.com/security/cve/CVE-2017-12897/" source="CVE"/>
		<reference ref_id="CVE-2017-12898" ref_url="https://www.suse.com/security/cve/CVE-2017-12898/" source="CVE"/>
		<reference ref_id="CVE-2017-12899" ref_url="https://www.suse.com/security/cve/CVE-2017-12899/" source="CVE"/>
		<reference ref_id="CVE-2017-12900" ref_url="https://www.suse.com/security/cve/CVE-2017-12900/" source="CVE"/>
		<reference ref_id="CVE-2017-12901" ref_url="https://www.suse.com/security/cve/CVE-2017-12901/" source="CVE"/>
		<reference ref_id="CVE-2017-12902" ref_url="https://www.suse.com/security/cve/CVE-2017-12902/" source="CVE"/>
		<reference ref_id="CVE-2017-12985" ref_url="https://www.suse.com/security/cve/CVE-2017-12985/" source="CVE"/>
		<reference ref_id="CVE-2017-12986" ref_url="https://www.suse.com/security/cve/CVE-2017-12986/" source="CVE"/>
		<reference ref_id="CVE-2017-12987" ref_url="https://www.suse.com/security/cve/CVE-2017-12987/" source="CVE"/>
		<reference ref_id="CVE-2017-12988" ref_url="https://www.suse.com/security/cve/CVE-2017-12988/" source="CVE"/>
		<reference ref_id="CVE-2017-12989" ref_url="https://www.suse.com/security/cve/CVE-2017-12989/" source="CVE"/>
		<reference ref_id="CVE-2017-12990" ref_url="https://www.suse.com/security/cve/CVE-2017-12990/" source="CVE"/>
		<reference ref_id="CVE-2017-12991" ref_url="https://www.suse.com/security/cve/CVE-2017-12991/" source="CVE"/>
		<reference ref_id="CVE-2017-12992" ref_url="https://www.suse.com/security/cve/CVE-2017-12992/" source="CVE"/>
		<reference ref_id="CVE-2017-12993" ref_url="https://www.suse.com/security/cve/CVE-2017-12993/" source="CVE"/>
		<reference ref_id="CVE-2017-12994" ref_url="https://www.suse.com/security/cve/CVE-2017-12994/" source="CVE"/>
		<reference ref_id="CVE-2017-12995" ref_url="https://www.suse.com/security/cve/CVE-2017-12995/" source="CVE"/>
		<reference ref_id="CVE-2017-12996" ref_url="https://www.suse.com/security/cve/CVE-2017-12996/" source="CVE"/>
		<reference ref_id="CVE-2017-12997" ref_url="https://www.suse.com/security/cve/CVE-2017-12997/" source="CVE"/>
		<reference ref_id="CVE-2017-12998" ref_url="https://www.suse.com/security/cve/CVE-2017-12998/" source="CVE"/>
		<reference ref_id="CVE-2017-12999" ref_url="https://www.suse.com/security/cve/CVE-2017-12999/" source="CVE"/>
		<reference ref_id="CVE-2017-13000" ref_url="https://www.suse.com/security/cve/CVE-2017-13000/" source="CVE"/>
		<reference ref_id="CVE-2017-13001" ref_url="https://www.suse.com/security/cve/CVE-2017-13001/" source="CVE"/>
		<reference ref_id="CVE-2017-13002" ref_url="https://www.suse.com/security/cve/CVE-2017-13002/" source="CVE"/>
		<reference ref_id="CVE-2017-13003" ref_url="https://www.suse.com/security/cve/CVE-2017-13003/" source="CVE"/>
		<reference ref_id="CVE-2017-13004" ref_url="https://www.suse.com/security/cve/CVE-2017-13004/" source="CVE"/>
		<reference ref_id="CVE-2017-13005" ref_url="https://www.suse.com/security/cve/CVE-2017-13005/" source="CVE"/>
		<reference ref_id="CVE-2017-13006" ref_url="https://www.suse.com/security/cve/CVE-2017-13006/" source="CVE"/>
		<reference ref_id="CVE-2017-13007" ref_url="https://www.suse.com/security/cve/CVE-2017-13007/" source="CVE"/>
		<reference ref_id="CVE-2017-13008" ref_url="https://www.suse.com/security/cve/CVE-2017-13008/" source="CVE"/>
		<reference ref_id="CVE-2017-13009" ref_url="https://www.suse.com/security/cve/CVE-2017-13009/" source="CVE"/>
		<reference ref_id="CVE-2017-13010" ref_url="https://www.suse.com/security/cve/CVE-2017-13010/" source="CVE"/>
		<reference ref_id="CVE-2017-13011" ref_url="https://www.suse.com/security/cve/CVE-2017-13011/" source="CVE"/>
		<reference ref_id="CVE-2017-13012" ref_url="https://www.suse.com/security/cve/CVE-2017-13012/" source="CVE"/>
		<reference ref_id="CVE-2017-13013" ref_url="https://www.suse.com/security/cve/CVE-2017-13013/" source="CVE"/>
		<reference ref_id="CVE-2017-13014" ref_url="https://www.suse.com/security/cve/CVE-2017-13014/" source="CVE"/>
		<reference ref_id="CVE-2017-13015" ref_url="https://www.suse.com/security/cve/CVE-2017-13015/" source="CVE"/>
		<reference ref_id="CVE-2017-13016" ref_url="https://www.suse.com/security/cve/CVE-2017-13016/" source="CVE"/>
		<reference ref_id="CVE-2017-13017" ref_url="https://www.suse.com/security/cve/CVE-2017-13017/" source="CVE"/>
		<reference ref_id="CVE-2017-13018" ref_url="https://www.suse.com/security/cve/CVE-2017-13018/" source="CVE"/>
		<reference ref_id="CVE-2017-13019" ref_url="https://www.suse.com/security/cve/CVE-2017-13019/" source="CVE"/>
		<reference ref_id="CVE-2017-13020" ref_url="https://www.suse.com/security/cve/CVE-2017-13020/" source="CVE"/>
		<reference ref_id="CVE-2017-13021" ref_url="https://www.suse.com/security/cve/CVE-2017-13021/" source="CVE"/>
		<reference ref_id="CVE-2017-13022" ref_url="https://www.suse.com/security/cve/CVE-2017-13022/" source="CVE"/>
		<reference ref_id="CVE-2017-13023" ref_url="https://www.suse.com/security/cve/CVE-2017-13023/" source="CVE"/>
		<reference ref_id="CVE-2017-13024" ref_url="https://www.suse.com/security/cve/CVE-2017-13024/" source="CVE"/>
		<reference ref_id="CVE-2017-13025" ref_url="https://www.suse.com/security/cve/CVE-2017-13025/" source="CVE"/>
		<reference ref_id="CVE-2017-13026" ref_url="https://www.suse.com/security/cve/CVE-2017-13026/" source="CVE"/>
		<reference ref_id="CVE-2017-13027" ref_url="https://www.suse.com/security/cve/CVE-2017-13027/" source="CVE"/>
		<reference ref_id="CVE-2017-13028" ref_url="https://www.suse.com/security/cve/CVE-2017-13028/" source="CVE"/>
		<reference ref_id="CVE-2017-13029" ref_url="https://www.suse.com/security/cve/CVE-2017-13029/" source="CVE"/>
		<reference ref_id="CVE-2017-13030" ref_url="https://www.suse.com/security/cve/CVE-2017-13030/" source="CVE"/>
		<reference ref_id="CVE-2017-13031" ref_url="https://www.suse.com/security/cve/CVE-2017-13031/" source="CVE"/>
		<reference ref_id="CVE-2017-13032" ref_url="https://www.suse.com/security/cve/CVE-2017-13032/" source="CVE"/>
		<reference ref_id="CVE-2017-13033" ref_url="https://www.suse.com/security/cve/CVE-2017-13033/" source="CVE"/>
		<reference ref_id="CVE-2017-13034" ref_url="https://www.suse.com/security/cve/CVE-2017-13034/" source="CVE"/>
		<reference ref_id="CVE-2017-13035" ref_url="https://www.suse.com/security/cve/CVE-2017-13035/" source="CVE"/>
		<reference ref_id="CVE-2017-13036" ref_url="https://www.suse.com/security/cve/CVE-2017-13036/" source="CVE"/>
		<reference ref_id="CVE-2017-13037" ref_url="https://www.suse.com/security/cve/CVE-2017-13037/" source="CVE"/>
		<reference ref_id="CVE-2017-13038" ref_url="https://www.suse.com/security/cve/CVE-2017-13038/" source="CVE"/>
		<reference ref_id="CVE-2017-13039" ref_url="https://www.suse.com/security/cve/CVE-2017-13039/" source="CVE"/>
		<reference ref_id="CVE-2017-13040" ref_url="https://www.suse.com/security/cve/CVE-2017-13040/" source="CVE"/>
		<reference ref_id="CVE-2017-13041" ref_url="https://www.suse.com/security/cve/CVE-2017-13041/" source="CVE"/>
		<reference ref_id="CVE-2017-13042" ref_url="https://www.suse.com/security/cve/CVE-2017-13042/" source="CVE"/>
		<reference ref_id="CVE-2017-13043" ref_url="https://www.suse.com/security/cve/CVE-2017-13043/" source="CVE"/>
		<reference ref_id="CVE-2017-13044" ref_url="https://www.suse.com/security/cve/CVE-2017-13044/" source="CVE"/>
		<reference ref_id="CVE-2017-13045" ref_url="https://www.suse.com/security/cve/CVE-2017-13045/" source="CVE"/>
		<reference ref_id="CVE-2017-13046" ref_url="https://www.suse.com/security/cve/CVE-2017-13046/" source="CVE"/>
		<reference ref_id="CVE-2017-13047" ref_url="https://www.suse.com/security/cve/CVE-2017-13047/" source="CVE"/>
		<reference ref_id="CVE-2017-13048" ref_url="https://www.suse.com/security/cve/CVE-2017-13048/" source="CVE"/>
		<reference ref_id="CVE-2017-13049" ref_url="https://www.suse.com/security/cve/CVE-2017-13049/" source="CVE"/>
		<reference ref_id="CVE-2017-13050" ref_url="https://www.suse.com/security/cve/CVE-2017-13050/" source="CVE"/>
		<reference ref_id="CVE-2017-13051" ref_url="https://www.suse.com/security/cve/CVE-2017-13051/" source="CVE"/>
		<reference ref_id="CVE-2017-13052" ref_url="https://www.suse.com/security/cve/CVE-2017-13052/" source="CVE"/>
		<reference ref_id="CVE-2017-13053" ref_url="https://www.suse.com/security/cve/CVE-2017-13053/" source="CVE"/>
		<reference ref_id="CVE-2017-13054" ref_url="https://www.suse.com/security/cve/CVE-2017-13054/" source="CVE"/>
		<reference ref_id="CVE-2017-13055" ref_url="https://www.suse.com/security/cve/CVE-2017-13055/" source="CVE"/>
		<reference ref_id="CVE-2017-13687" ref_url="https://www.suse.com/security/cve/CVE-2017-13687/" source="CVE"/>
		<reference ref_id="CVE-2017-13688" ref_url="https://www.suse.com/security/cve/CVE-2017-13688/" source="CVE"/>
		<reference ref_id="CVE-2017-13689" ref_url="https://www.suse.com/security/cve/CVE-2017-13689/" source="CVE"/>
		<reference ref_id="CVE-2017-13690" ref_url="https://www.suse.com/security/cve/CVE-2017-13690/" source="CVE"/>
		<reference ref_id="CVE-2017-13725" ref_url="https://www.suse.com/security/cve/CVE-2017-13725/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<description>
This update for tcpdump to version 4.9.2 fixes several issues.

These security issues were fixed:

- CVE-2017-11108: Prevent remote attackers to cause DoS (heap-based buffer over-read and application crash) via crafted packet data. The crash occured in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol (bsc#1047873, bsc#1057247).
- CVE-2017-11543: Prevent buffer overflow in the sliplink_print function in print-sl.c that allowed remote DoS (bsc#1057247).
- CVE-2017-13011: Prevent buffer overflow in bittok2str_internal() that allowed remote DoS (bsc#1057247)
- CVE-2017-12989: Prevent infinite loop in the RESP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12990: Prevent infinite loop in the ISAKMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12995: Prevent infinite loop in the DNS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12997: Prevent infinite loop in the LLDP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-11541: Prevent heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c that allowed remote DoS (bsc#1057247).
- CVE-2017-11542: Prevent heap-based buffer over-read in the pimv1_print function in print-pim.c that allowed remote DoS (bsc#1057247).
- CVE-2017-12893: Prevent buffer over-read in the SMB/CIFS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12894: Prevent buffer over-read in several protocol parsers that allowed remote DoS (bsc#1057247)
- CVE-2017-12895: Prevent buffer over-read in the ICMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12896: Prevent buffer over-read in the ISAKMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12897: Prevent buffer over-read in the ISO CLNS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12898: Prevent buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12899: Prevent buffer over-read in the DECnet parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12900: Prevent buffer over-read in the in several protocol parsers that allowed remote DoS (bsc#1057247)
- CVE-2017-12901: Prevent buffer over-read in the EIGRP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12902: Prevent buffer over-read in the Zephyr parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12985: Prevent buffer over-read in the IPv6 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12986: Prevent buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12987: Prevent buffer over-read in the 802.11 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12988: Prevent buffer over-read in the telnet parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12991: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12992: Prevent buffer over-read in the RIPng parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12993: Prevent buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12994: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12996: Prevent buffer over-read in the PIMv2 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12998: Prevent buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12999: Prevent buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13000: Prevent buffer over-read in the IEEE 802.15.4 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13001: Prevent buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13002: Prevent buffer over-read in the AODV parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13003: Prevent buffer over-read in the LMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13004: Prevent buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13005: Prevent buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13006: Prevent buffer over-read in the L2TP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13007: Prevent buffer over-read in the Apple PKTAP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13008: Prevent buffer over-read in the IEEE 802.11 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13009: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13010: Prevent buffer over-read in the BEEP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13012: Prevent buffer over-read in the ICMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13013: Prevent buffer over-read in the ARP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13014: Prevent buffer over-read in the White Board protocol parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13015: Prevent buffer over-read in the EAP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13016: Prevent buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13017: Prevent buffer over-read in the DHCPv6 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13018: Prevent buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13019: Prevent buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13020: Prevent buffer over-read in the VTP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13021: Prevent buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13022: Prevent buffer over-read in the IP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13023: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13024: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13025: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13026: Prevent buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13027: Prevent buffer over-read in the LLDP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13028: Prevent buffer over-read in the BOOTP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13029: Prevent buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13030: Prevent buffer over-read in the PIM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13031: Prevent buffer over-read in the IPv6 fragmentation header parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13032: Prevent buffer over-read in the RADIUS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13033: Prevent buffer over-read in the VTP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13034: Prevent buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13035: Prevent buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13036: Prevent buffer over-read in the OSPFv3 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13037: Prevent buffer over-read in the IP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13038: Prevent buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13039: Prevent buffer over-read in the ISAKMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13040: Prevent buffer over-read in the MPTCP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13041: Prevent buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13042: Prevent buffer over-read in the HNCP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13043: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13044: Prevent buffer over-read in the HNCP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13045: Prevent buffer over-read in the VQP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13046: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13047: Prevent buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13048: Prevent buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13049: Prevent buffer over-read in the Rx protocol parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13050: Prevent buffer over-read in the RPKI-Router parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13051: Prevent buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13052: Prevent buffer over-read in the CFM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13053: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13054: Prevent buffer over-read in the LLDP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13055: Prevent buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13687: Prevent buffer over-read in the Cisco HDLC parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13688: Prevent buffer over-read in the OLSR parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13689: Prevent buffer over-read in the IKEv1 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13690: Prevent buffer over-read in the IKEv2 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13725: Prevent buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247)
- Prevent segmentation fault in ESP decoder with OpenSSL 1.1 (bsc#1057247)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-26"/>
	<updated date="2017-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047873">SUSE bug 1047873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11108/">CVE-2017-11108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11108">CVE-2017-11108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11541/">CVE-2017-11541 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11541">CVE-2017-11541 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11542/">CVE-2017-11542 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11542">CVE-2017-11542 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11543/">CVE-2017-11543 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11543">CVE-2017-11543 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12893/">CVE-2017-12893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12893">CVE-2017-12893 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12894/">CVE-2017-12894 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12894">CVE-2017-12894 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12895/">CVE-2017-12895 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12895">CVE-2017-12895 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12896/">CVE-2017-12896 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12896">CVE-2017-12896 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12897/">CVE-2017-12897 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12897">CVE-2017-12897 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12898/">CVE-2017-12898 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12898">CVE-2017-12898 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12899/">CVE-2017-12899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12899">CVE-2017-12899 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12900/">CVE-2017-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12900">CVE-2017-12900 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12901/">CVE-2017-12901 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12901">CVE-2017-12901 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12902/">CVE-2017-12902 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12902">CVE-2017-12902 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12985/">CVE-2017-12985 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12985">CVE-2017-12985 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12986/">CVE-2017-12986 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12986">CVE-2017-12986 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12987/">CVE-2017-12987 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12987">CVE-2017-12987 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12988/">CVE-2017-12988 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12988">CVE-2017-12988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12989/">CVE-2017-12989 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12989">CVE-2017-12989 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12990/">CVE-2017-12990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12990">CVE-2017-12990 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12991/">CVE-2017-12991 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12991">CVE-2017-12991 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12992/">CVE-2017-12992 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12992">CVE-2017-12992 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12993/">CVE-2017-12993 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12993">CVE-2017-12993 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12994/">CVE-2017-12994 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12994">CVE-2017-12994 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12995/">CVE-2017-12995 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12995">CVE-2017-12995 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12996/">CVE-2017-12996 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12996">CVE-2017-12996 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12997/">CVE-2017-12997 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12997">CVE-2017-12997 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12998/">CVE-2017-12998 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12998">CVE-2017-12998 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12999/">CVE-2017-12999 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12999">CVE-2017-12999 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13000/">CVE-2017-13000 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13000">CVE-2017-13000 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13001/">CVE-2017-13001 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13001">CVE-2017-13001 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13002/">CVE-2017-13002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13002">CVE-2017-13002 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13003/">CVE-2017-13003 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13003">CVE-2017-13003 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13004/">CVE-2017-13004 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13004">CVE-2017-13004 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13005/">CVE-2017-13005 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13005">CVE-2017-13005 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13006/">CVE-2017-13006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13006">CVE-2017-13006 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13007/">CVE-2017-13007 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13007">CVE-2017-13007 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13008/">CVE-2017-13008 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13008">CVE-2017-13008 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13009/">CVE-2017-13009 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13009">CVE-2017-13009 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13010/">CVE-2017-13010 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13010">CVE-2017-13010 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13011/">CVE-2017-13011 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13011">CVE-2017-13011 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13012/">CVE-2017-13012 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13012">CVE-2017-13012 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13013/">CVE-2017-13013 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13013">CVE-2017-13013 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13014/">CVE-2017-13014 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13014">CVE-2017-13014 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13015/">CVE-2017-13015 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13015">CVE-2017-13015 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13016/">CVE-2017-13016 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13016">CVE-2017-13016 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13017/">CVE-2017-13017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13017">CVE-2017-13017 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13018/">CVE-2017-13018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13018">CVE-2017-13018 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13019/">CVE-2017-13019 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13019">CVE-2017-13019 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13020/">CVE-2017-13020 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13020">CVE-2017-13020 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13021/">CVE-2017-13021 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13021">CVE-2017-13021 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13022/">CVE-2017-13022 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13022">CVE-2017-13022 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13023/">CVE-2017-13023 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13023">CVE-2017-13023 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13024/">CVE-2017-13024 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13024">CVE-2017-13024 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13025/">CVE-2017-13025 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13025">CVE-2017-13025 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13026/">CVE-2017-13026 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13026">CVE-2017-13026 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13027/">CVE-2017-13027 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13027">CVE-2017-13027 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13028/">CVE-2017-13028 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13028">CVE-2017-13028 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13029/">CVE-2017-13029 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13029">CVE-2017-13029 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13030/">CVE-2017-13030 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13030">CVE-2017-13030 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13031/">CVE-2017-13031 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13031">CVE-2017-13031 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13032/">CVE-2017-13032 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13032">CVE-2017-13032 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13033/">CVE-2017-13033 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13033">CVE-2017-13033 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13034/">CVE-2017-13034 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13034">CVE-2017-13034 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13035/">CVE-2017-13035 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13035">CVE-2017-13035 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13036/">CVE-2017-13036 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13036">CVE-2017-13036 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13037/">CVE-2017-13037 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13037">CVE-2017-13037 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13038/">CVE-2017-13038 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13038">CVE-2017-13038 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13039/">CVE-2017-13039 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13039">CVE-2017-13039 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13040/">CVE-2017-13040 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13040">CVE-2017-13040 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13041/">CVE-2017-13041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13041">CVE-2017-13041 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13042/">CVE-2017-13042 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13042">CVE-2017-13042 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13043/">CVE-2017-13043 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13043">CVE-2017-13043 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13044/">CVE-2017-13044 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13044">CVE-2017-13044 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13045/">CVE-2017-13045 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13045">CVE-2017-13045 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13046/">CVE-2017-13046 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13046">CVE-2017-13046 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13047/">CVE-2017-13047 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13047">CVE-2017-13047 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13048/">CVE-2017-13048 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13048">CVE-2017-13048 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13049/">CVE-2017-13049 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13049">CVE-2017-13049 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13050/">CVE-2017-13050 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13050">CVE-2017-13050 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13051/">CVE-2017-13051 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13051">CVE-2017-13051 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13052/">CVE-2017-13052 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13052">CVE-2017-13052 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13053/">CVE-2017-13053 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13053">CVE-2017-13053 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13054/">CVE-2017-13054 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13054">CVE-2017-13054 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13055/">CVE-2017-13055 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13055">CVE-2017-13055 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13687/">CVE-2017-13687 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13687">CVE-2017-13687 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13688/">CVE-2017-13688 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13688">CVE-2017-13688 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13689/">CVE-2017-13689 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13689">CVE-2017-13689 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13690/">CVE-2017-13690 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13690">CVE-2017-13690 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13725/">CVE-2017-13725 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13725">CVE-2017-13725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149414" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1062645" ref_url="https://bugzilla.suse.com/1062645" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15191" ref_url="https://www.suse.com/security/cve/CVE-2017-15191/" source="CVE"/>
		<reference ref_id="CVE-2017-15192" ref_url="https://www.suse.com/security/cve/CVE-2017-15192/" source="CVE"/>
		<reference ref_id="CVE-2017-15193" ref_url="https://www.suse.com/security/cve/CVE-2017-15193/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003358.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Wireshark was updated to 2.2.10, fixing security issues and bugs:

* CVE-2017-15191: DMP dissector crash (wnpa-sec-2017-44)
* CVE-2017-15192: BT ATT dissector crash (wnpa-sec-2017-42)
* CVE-2017-15193: MBIM dissector crash (wnpa-sec-2017-43)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-26"/>
	<updated date="2017-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062645">SUSE bug 1062645</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15191/">CVE-2017-15191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15191">CVE-2017-15191 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15192/">CVE-2017-15192 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15192">CVE-2017-15192 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15193/">CVE-2017-15193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15193">CVE-2017-15193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549766" comment="libwireshark8-2.2.10-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549767" comment="libwiretap6-2.2.10-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549768" comment="libwscodecs1-2.2.10-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549769" comment="libwsutil7-2.2.10-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549770" comment="wireshark-2.2.10-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549771" comment="wireshark-gtk-2.2.10-48.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149415" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1064715" ref_url="https://bugzilla.suse.com/1064715" source="BUGZILLA"/>
		<reference ref_id="1064716" ref_url="https://bugzilla.suse.com/1064716" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13089" ref_url="https://www.suse.com/security/cve/CVE-2017-13089/" source="CVE"/>
		<reference ref_id="CVE-2017-13090" ref_url="https://www.suse.com/security/cve/CVE-2017-13090/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2871-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003398.html" source="SUSE-SU"/>
		<description>


This update for wget fixes the following security issues:

- CVE-2017-13089,CVE-2017-13090: Missing checks for negative remaining_chunk_size in skip_short_body and fd_read_body could
  cause stack buffer overflows, which could have been exploited by malicious servers. (bsc#1064715,bsc#1064716)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-16"/>
	<updated date="2017-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064715">SUSE bug 1064715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064716">SUSE bug 1064716</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13089/">CVE-2017-13089 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13089">CVE-2017-13089 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13090/">CVE-2017-13090 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13090">CVE-2017-13090 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549780" comment="wget-1.14-21.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149416" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1054724" ref_url="https://bugzilla.suse.com/1054724" source="BUGZILLA"/>
		<reference ref_id="1055587" ref_url="https://bugzilla.suse.com/1055587" source="BUGZILLA"/>
		<reference ref_id="1056291" ref_url="https://bugzilla.suse.com/1056291" source="BUGZILLA"/>
		<reference ref_id="1056334" ref_url="https://bugzilla.suse.com/1056334" source="BUGZILLA"/>
		<reference ref_id="1057378" ref_url="https://bugzilla.suse.com/1057378" source="BUGZILLA"/>
		<reference ref_id="1057585" ref_url="https://bugzilla.suse.com/1057585" source="BUGZILLA"/>
		<reference ref_id="1057966" ref_url="https://bugzilla.suse.com/1057966" source="BUGZILLA"/>
		<reference ref_id="1062069" ref_url="https://bugzilla.suse.com/1062069" source="BUGZILLA"/>
		<reference ref_id="1062942" ref_url="https://bugzilla.suse.com/1062942" source="BUGZILLA"/>
		<reference ref_id="1063122" ref_url="https://bugzilla.suse.com/1063122" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10911" ref_url="https://www.suse.com/security/cve/CVE-2017-10911/" source="CVE"/>
		<reference ref_id="CVE-2017-12809" ref_url="https://www.suse.com/security/cve/CVE-2017-12809/" source="CVE"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-13711" ref_url="https://www.suse.com/security/cve/CVE-2017-13711/" source="CVE"/>
		<reference ref_id="CVE-2017-14167" ref_url="https://www.suse.com/security/cve/CVE-2017-14167/" source="CVE"/>
		<reference ref_id="CVE-2017-15038" ref_url="https://www.suse.com/security/cve/CVE-2017-15038/" source="CVE"/>
		<reference ref_id="CVE-2017-15268" ref_url="https://www.suse.com/security/cve/CVE-2017-15268/" source="CVE"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003371.html" source="SUSE-SU"/>
		<description>
This update for qemu to version 2.9.1 fixes several issues.

It also announces that the qed storage format will be no longer supported in SLE 15 (fate#324200).

These security issues were fixed:

- CVE-2017-15268: Qemu allowed remote attackers to cause a memory leak by triggering slow data-channel read operations, related to io/channel-websock.c (bsc#1062942)
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation (bsc#1063122)
- CVE-2017-15038: Race condition in the v9fs_xattrwalk function local guest OS users to obtain sensitive information from host heap memory via vectors related to reading extended attributes (bsc#1062069)
- CVE-2017-10911: The make_response function in the Linux kernel allowed guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures (bsc#1057378)
- CVE-2017-12809: The IDE disk and CD/DVD-ROM Emulator support allowed local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by flushing an empty CDROM device drive (bsc#1054724)
- CVE-2017-14167: Integer overflow in the load_multiboot function allowed local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write (bsc#1057585)
- CVE-2017-13672: The VGA display emulator support allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update (bsc#1056334)
- CVE-2017-13711: Use-after-free vulnerability allowed attackers to cause a denial of service (QEMU instance crash) by leveraging failure to properly clear ifq_so from pending packets (bsc#1056291).

These non-security issues were fixed:

- Fixed not being able to build from rpm sources due to undefined macro (bsc#1057966)
- Fiedx package build failure against new glibc (bsc#1055587)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-02"/>
	<updated date="2017-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1054724">SUSE bug 1054724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055587">SUSE bug 1055587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056291">SUSE bug 1056291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056334">SUSE bug 1056334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057378">SUSE bug 1057378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057585">SUSE bug 1057585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057966">SUSE bug 1057966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062069">SUSE bug 1062069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062942">SUSE bug 1062942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063122">SUSE bug 1063122</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10911/">CVE-2017-10911 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10911">CVE-2017-10911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12809/">CVE-2017-12809 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12809">CVE-2017-12809 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13672">CVE-2017-13672 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13711/">CVE-2017-13711 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13711">CVE-2017-13711 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14167/">CVE-2017-14167 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14167">CVE-2017-14167 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15038/">CVE-2017-15038 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15038">CVE-2017-15038 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15268/">CVE-2017-15268 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15268">CVE-2017-15268 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15289">CVE-2017-15289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552697" comment="qemu-2.9.1-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552698" comment="qemu-arm-2.9.1-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552699" comment="qemu-block-curl-2.9.1-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552700" comment="qemu-block-iscsi-2.9.1-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552701" comment="qemu-block-rbd-2.9.1-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552702" comment="qemu-block-ssh-2.9.1-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552703" comment="qemu-guest-agent-2.9.1-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519574" comment="qemu-ipxe-1.0.0-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552704" comment="qemu-kvm-2.9.1-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552705" comment="qemu-lang-2.9.1-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552706" comment="qemu-ppc-2.9.1-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552707" comment="qemu-s390-2.9.1-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519576" comment="qemu-seabios-1.10.2-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519577" comment="qemu-sgabios-8-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552708" comment="qemu-tools-2.9.1-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519579" comment="qemu-vgabios-1.10.2-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519580" comment="qemu-x86-2.9.1-6.6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149417" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1020950" ref_url="https://bugzilla.suse.com/1020950" source="BUGZILLA"/>
		<reference ref_id="1024749" ref_url="https://bugzilla.suse.com/1024749" source="BUGZILLA"/>
		<reference ref_id="1045460" ref_url="https://bugzilla.suse.com/1045460" source="BUGZILLA"/>
		<reference ref_id="1050469" ref_url="https://bugzilla.suse.com/1050469" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7586" ref_url="https://www.suse.com/security/cve/CVE-2016-7586/" source="CVE"/>
		<reference ref_id="CVE-2016-7589" ref_url="https://www.suse.com/security/cve/CVE-2016-7589/" source="CVE"/>
		<reference ref_id="CVE-2016-7592" ref_url="https://www.suse.com/security/cve/CVE-2016-7592/" source="CVE"/>
		<reference ref_id="CVE-2016-7599" ref_url="https://www.suse.com/security/cve/CVE-2016-7599/" source="CVE"/>
		<reference ref_id="CVE-2016-7623" ref_url="https://www.suse.com/security/cve/CVE-2016-7623/" source="CVE"/>
		<reference ref_id="CVE-2016-7632" ref_url="https://www.suse.com/security/cve/CVE-2016-7632/" source="CVE"/>
		<reference ref_id="CVE-2016-7635" ref_url="https://www.suse.com/security/cve/CVE-2016-7635/" source="CVE"/>
		<reference ref_id="CVE-2016-7639" ref_url="https://www.suse.com/security/cve/CVE-2016-7639/" source="CVE"/>
		<reference ref_id="CVE-2016-7641" ref_url="https://www.suse.com/security/cve/CVE-2016-7641/" source="CVE"/>
		<reference ref_id="CVE-2016-7645" ref_url="https://www.suse.com/security/cve/CVE-2016-7645/" source="CVE"/>
		<reference ref_id="CVE-2016-7652" ref_url="https://www.suse.com/security/cve/CVE-2016-7652/" source="CVE"/>
		<reference ref_id="CVE-2016-7654" ref_url="https://www.suse.com/security/cve/CVE-2016-7654/" source="CVE"/>
		<reference ref_id="CVE-2016-7656" ref_url="https://www.suse.com/security/cve/CVE-2016-7656/" source="CVE"/>
		<reference ref_id="CVE-2017-2350" ref_url="https://www.suse.com/security/cve/CVE-2017-2350/" source="CVE"/>
		<reference ref_id="CVE-2017-2354" ref_url="https://www.suse.com/security/cve/CVE-2017-2354/" source="CVE"/>
		<reference ref_id="CVE-2017-2355" ref_url="https://www.suse.com/security/cve/CVE-2017-2355/" source="CVE"/>
		<reference ref_id="CVE-2017-2356" ref_url="https://www.suse.com/security/cve/CVE-2017-2356/" source="CVE"/>
		<reference ref_id="CVE-2017-2362" ref_url="https://www.suse.com/security/cve/CVE-2017-2362/" source="CVE"/>
		<reference ref_id="CVE-2017-2363" ref_url="https://www.suse.com/security/cve/CVE-2017-2363/" source="CVE"/>
		<reference ref_id="CVE-2017-2364" ref_url="https://www.suse.com/security/cve/CVE-2017-2364/" source="CVE"/>
		<reference ref_id="CVE-2017-2365" ref_url="https://www.suse.com/security/cve/CVE-2017-2365/" source="CVE"/>
		<reference ref_id="CVE-2017-2366" ref_url="https://www.suse.com/security/cve/CVE-2017-2366/" source="CVE"/>
		<reference ref_id="CVE-2017-2369" ref_url="https://www.suse.com/security/cve/CVE-2017-2369/" source="CVE"/>
		<reference ref_id="CVE-2017-2371" ref_url="https://www.suse.com/security/cve/CVE-2017-2371/" source="CVE"/>
		<reference ref_id="CVE-2017-2373" ref_url="https://www.suse.com/security/cve/CVE-2017-2373/" source="CVE"/>
		<reference ref_id="CVE-2017-2496" ref_url="https://www.suse.com/security/cve/CVE-2017-2496/" source="CVE"/>
		<reference ref_id="CVE-2017-2510" ref_url="https://www.suse.com/security/cve/CVE-2017-2510/" source="CVE"/>
		<reference ref_id="CVE-2017-2538" ref_url="https://www.suse.com/security/cve/CVE-2017-2538/" source="CVE"/>
		<reference ref_id="CVE-2017-2539" ref_url="https://www.suse.com/security/cve/CVE-2017-2539/" source="CVE"/>
		<reference ref_id="CVE-2017-7018" ref_url="https://www.suse.com/security/cve/CVE-2017-7018/" source="CVE"/>
		<reference ref_id="CVE-2017-7030" ref_url="https://www.suse.com/security/cve/CVE-2017-7030/" source="CVE"/>
		<reference ref_id="CVE-2017-7034" ref_url="https://www.suse.com/security/cve/CVE-2017-7034/" source="CVE"/>
		<reference ref_id="CVE-2017-7037" ref_url="https://www.suse.com/security/cve/CVE-2017-7037/" source="CVE"/>
		<reference ref_id="CVE-2017-7039" ref_url="https://www.suse.com/security/cve/CVE-2017-7039/" source="CVE"/>
		<reference ref_id="CVE-2017-7046" ref_url="https://www.suse.com/security/cve/CVE-2017-7046/" source="CVE"/>
		<reference ref_id="CVE-2017-7048" ref_url="https://www.suse.com/security/cve/CVE-2017-7048/" source="CVE"/>
		<reference ref_id="CVE-2017-7055" ref_url="https://www.suse.com/security/cve/CVE-2017-7055/" source="CVE"/>
		<reference ref_id="CVE-2017-7056" ref_url="https://www.suse.com/security/cve/CVE-2017-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-7061" ref_url="https://www.suse.com/security/cve/CVE-2017-7061/" source="CVE"/>
		<reference ref_id="CVE-2017-7064" ref_url="https://www.suse.com/security/cve/CVE-2017-7064/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003374.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.18.0 fixes the following issues:

These security issues were fixed:

- CVE-2017-7039: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7018: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7030: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7037: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7034: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7055: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7056: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7064: An issue was fixed that allowed remote attackers to bypass
  intended memory-read restrictions via a crafted app (bsc#1050469).
- CVE-2017-7061: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7048: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7046: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1050469).
- CVE-2017-2538: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1045460)
- CVE-2017-2496: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site.
- CVE-2017-2539: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site.
- CVE-2017-2510: An issue was fixed that allowed remote attackers to conduct
  Universal XSS (UXSS) attacks via a crafted web site that improperly
  interacts with pageshow events.
- CVE-2017-2365: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web
  site (bsc#1024749)
- CVE-2017-2366: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749)
- CVE-2017-2373: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749)
- CVE-2017-2363: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web
  site (bsc#1024749)
- CVE-2017-2362: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749)
- CVE-2017-2350: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web
  site (bsc#1024749)
- CVE-2017-2350: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web site
  (bsc#1024749)
- CVE-2017-2354: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749).
- CVE-2017-2355: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (uninitialized memory
  access and application crash) via a crafted web site (bsc#1024749)
- CVE-2017-2356: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749)
- CVE-2017-2371: An issue was fixed that allowed remote attackers to launch
  popups via a crafted web site (bsc#1024749)
- CVE-2017-2364: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web
  site (bsc#1024749)
- CVE-2017-2369: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749)
- CVE-2016-7656: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7635: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7654: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7639: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7645: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7652: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7641: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7632: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7599: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web
  site that used HTTP redirects (bsc#1020950)
- CVE-2016-7592: An issue was fixed that allowed remote attackers to obtain
  sensitive information via crafted JavaScript prompts on a web site (bsc#1020950)
- CVE-2016-7589: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7623: An issue was fixed that allowed remote attackers to obtain
  sensitive information via a blob URL on a web site (bsc#1020950)
- CVE-2016-7586: An issue was fixed that allowed remote attackers to obtain
  sensitive information via a crafted web site (bsc#1020950)

For other non-security fixes please check the changelog.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-06"/>
	<updated date="2017-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045460">SUSE bug 1045460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7586/">CVE-2016-7586 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7586">CVE-2016-7586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7589/">CVE-2016-7589 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7589">CVE-2016-7589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7592/">CVE-2016-7592 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7592">CVE-2016-7592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7599/">CVE-2016-7599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7599">CVE-2016-7599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7623/">CVE-2016-7623 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7623">CVE-2016-7623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7632/">CVE-2016-7632 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7632">CVE-2016-7632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7635/">CVE-2016-7635 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7635">CVE-2016-7635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7639/">CVE-2016-7639 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7639">CVE-2016-7639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7641/">CVE-2016-7641 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7641">CVE-2016-7641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7645/">CVE-2016-7645 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7645">CVE-2016-7645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7652/">CVE-2016-7652 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7652">CVE-2016-7652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7654/">CVE-2016-7654 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7654">CVE-2016-7654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7656/">CVE-2016-7656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7656">CVE-2016-7656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2350/">CVE-2017-2350 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2350">CVE-2017-2350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2354/">CVE-2017-2354 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2354">CVE-2017-2354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2355/">CVE-2017-2355 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2355">CVE-2017-2355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2356/">CVE-2017-2356 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2356">CVE-2017-2356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2362/">CVE-2017-2362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2362">CVE-2017-2362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2363/">CVE-2017-2363 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2363">CVE-2017-2363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2364/">CVE-2017-2364 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2364">CVE-2017-2364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2365/">CVE-2017-2365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2365">CVE-2017-2365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2366/">CVE-2017-2366 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2366">CVE-2017-2366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2369/">CVE-2017-2369 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2369">CVE-2017-2369 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2371/">CVE-2017-2371 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2371">CVE-2017-2371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2373/">CVE-2017-2373 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2373">CVE-2017-2373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2496/">CVE-2017-2496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2496">CVE-2017-2496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2510/">CVE-2017-2510 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2510">CVE-2017-2510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2538/">CVE-2017-2538 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2538">CVE-2017-2538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2539/">CVE-2017-2539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2539">CVE-2017-2539 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7018/">CVE-2017-7018 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7018">CVE-2017-7018 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7030/">CVE-2017-7030 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7030">CVE-2017-7030 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7034/">CVE-2017-7034 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7034">CVE-2017-7034 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7037/">CVE-2017-7037 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7037">CVE-2017-7037 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7039/">CVE-2017-7039 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7039">CVE-2017-7039 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7046/">CVE-2017-7046 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7046">CVE-2017-7046 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7048/">CVE-2017-7048 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7048">CVE-2017-7048 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7055/">CVE-2017-7055 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7055">CVE-2017-7055 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7056/">CVE-2017-7056 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7056">CVE-2017-7056 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7061/">CVE-2017-7061 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7061">CVE-2017-7061 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7064/">CVE-2017-7064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7064">CVE-2017-7064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549781" comment="libjavascriptcoregtk-4_0-18-2.18.0-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549782" comment="libwebkit2gtk-4_0-37-2.18.0-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549783" comment="typelib-1_0-JavaScriptCore-4_0-2.18.0-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549784" comment="typelib-1_0-WebKit2-4_0-2.18.0-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549785" comment="webkit2gtk-4_0-injected-bundles-2.18.0-2.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149418" version="1" class="patch">
	<metadata>
		<title>Security update for SuSEfirewall2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1064127" ref_url="https://bugzilla.suse.com/1064127" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15638" ref_url="https://www.suse.com/security/cve/CVE-2017-15638/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003375.html" source="SUSE-SU"/>
		<description>
This update for SuSEfirewall2 fixes the following issues:

- CVE-2017-15638: Fixed security issue with too open implicit portmapper rules
  (bsc#1064127): A source net restriction for _rpc_ services
  was not taken into account for the implicitly added rules for port 111,
  making the portmap service accessible to everyone in the affected zone when
  the 'rpc' matching was used.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-06"/>
	<updated date="2017-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064127">SUSE bug 1064127</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15638/">CVE-2017-15638 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15638">CVE-2017-15638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519581" comment="SuSEfirewall2-3.6.312.333-3.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149419" version="1" class="patch">
	<metadata>
		<title>Security update for sssd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1039567" ref_url="https://bugzilla.suse.com/1039567" source="BUGZILLA"/>
		<reference ref_id="1055123" ref_url="https://bugzilla.suse.com/1055123" source="BUGZILLA"/>
		<reference ref_id="1061832" ref_url="https://bugzilla.suse.com/1061832" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12173" ref_url="https://www.suse.com/security/cve/CVE-2017-12173/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003377.html" source="SUSE-SU"/>
		<description>
This update for sssd provides the following fixes:

Security issues fixed:

- CVE-2017-12173: Fixed unsanitized input when searching in local cache database (bsc#1061832).

Non security issues fixed:

- Fixed a segfault issue in ldap_rfc_2307_fallback_to_local_users. (bsc#1055123)
- Install /var/lib/sss/mc directory to correct sssd cache invalidation behaviour. (bsc#1039567)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-06"/>
	<updated date="2017-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039567">SUSE bug 1039567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055123">SUSE bug 1055123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061832">SUSE bug 1061832</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12173/">CVE-2017-12173 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12173">CVE-2017-12173 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549796" comment="libipa_hbac0-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549797" comment="libsss_idmap0-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541047" comment="libsss_nss_idmap0-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549798" comment="libsss_sudo-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549799" comment="python-sssd-config-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549800" comment="sssd-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549801" comment="sssd-32bit-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549802" comment="sssd-ad-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549803" comment="sssd-ipa-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549804" comment="sssd-krb5-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549805" comment="sssd-krb5-common-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549806" comment="sssd-ldap-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549807" comment="sssd-proxy-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549808" comment="sssd-tools-1.13.4-34.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149420" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1065274" ref_url="https://bugzilla.suse.com/1065274" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15088" ref_url="https://www.suse.com/security/cve/CVE-2017-15088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003380.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

Security issues fixed:

- CVE-2017-15088: A buffer overflow in get_matching_data() was fixed that could under specific circumstances be used to execute code (bsc#1065274)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-08"/>
	<updated date="2017-11-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065274">SUSE bug 1065274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15088/">CVE-2017-15088 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15088">CVE-2017-15088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549809" comment="krb5-1.12.5-40.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549810" comment="krb5-32bit-1.12.5-40.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549811" comment="krb5-client-1.12.5-40.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549812" comment="krb5-doc-1.12.5-40.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549813" comment="krb5-plugin-kdb-ldap-1.12.5-40.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549814" comment="krb5-plugin-preauth-otp-1.12.5-40.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549815" comment="krb5-plugin-preauth-pkinit-1.12.5-40.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549816" comment="krb5-server-1.12.5-40.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149421" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1049379" ref_url="https://bugzilla.suse.com/1049379" source="BUGZILLA"/>
		<reference ref_id="1050135" ref_url="https://bugzilla.suse.com/1050135" source="BUGZILLA"/>
		<reference ref_id="1052249" ref_url="https://bugzilla.suse.com/1052249" source="BUGZILLA"/>
		<reference ref_id="1052253" ref_url="https://bugzilla.suse.com/1052253" source="BUGZILLA"/>
		<reference ref_id="1052545" ref_url="https://bugzilla.suse.com/1052545" source="BUGZILLA"/>
		<reference ref_id="1054924" ref_url="https://bugzilla.suse.com/1054924" source="BUGZILLA"/>
		<reference ref_id="1055219" ref_url="https://bugzilla.suse.com/1055219" source="BUGZILLA"/>
		<reference ref_id="1055430" ref_url="https://bugzilla.suse.com/1055430" source="BUGZILLA"/>
		<reference ref_id="1061873" ref_url="https://bugzilla.suse.com/1061873" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530/" source="CVE"/>
		<reference ref_id="CVE-2017-11446" ref_url="https://www.suse.com/security/cve/CVE-2017-11446/" source="CVE"/>
		<reference ref_id="CVE-2017-11534" ref_url="https://www.suse.com/security/cve/CVE-2017-11534/" source="CVE"/>
		<reference ref_id="CVE-2017-12428" ref_url="https://www.suse.com/security/cve/CVE-2017-12428/" source="CVE"/>
		<reference ref_id="CVE-2017-12431" ref_url="https://www.suse.com/security/cve/CVE-2017-12431/" source="CVE"/>
		<reference ref_id="CVE-2017-12433" ref_url="https://www.suse.com/security/cve/CVE-2017-12433/" source="CVE"/>
		<reference ref_id="CVE-2017-13133" ref_url="https://www.suse.com/security/cve/CVE-2017-13133/" source="CVE"/>
		<reference ref_id="CVE-2017-13139" ref_url="https://www.suse.com/security/cve/CVE-2017-13139/" source="CVE"/>
		<reference ref_id="CVE-2017-15033" ref_url="https://www.suse.com/security/cve/CVE-2017-15033/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003381.html" source="SUSE-SU"/>
		<description>


This update for ImageMagick fixes the following issues:

Security issues fixed:

* CVE-2017-15033: A denial of service attack (memory leak) was fixed in ReadYUVImage in coders/yuv.c [bsc#1061873]
* CVE-2017-11446: An infinite loop in ReadPESImage was fixed. (bsc#1049379)
* CVE-2017-12433: A memory leak in ReadPESImage in coders/pes.c was fixed. (bsc#1052545)
* CVE-2017-12428: A memory leak in ReadWMFImage in coders/wmf.c was fixed. (bsc#1052249)
* CVE-2017-12431: A use-after-free in ReadWMFImage was fixed. (bsc#1052253)
* CVE-2017-11534: A memory leak in the lite_font_map() in coders/wmf.c was fixed. (bsc#1050135)
* CVE-2017-13133: A memory exhaustion in load_level function in coders/xcf.c was fixed. (bsc#1055219)
* CVE-2017-13139: A out-of-bounds read in the ReadOneMNGImage was fixed. (bsc#1055430)

This update also reverts an incorrect fix for CVE-2016-7530 [bsc#1054924].
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-08"/>
	<updated date="2017-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049379">SUSE bug 1049379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050135">SUSE bug 1050135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052249">SUSE bug 1052249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052253">SUSE bug 1052253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052545">SUSE bug 1052545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054924">SUSE bug 1054924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055219">SUSE bug 1055219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055430">SUSE bug 1055430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061873">SUSE bug 1061873</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7530">CVE-2016-7530 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11446/">CVE-2017-11446 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11446">CVE-2017-11446 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11534/">CVE-2017-11534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11534">CVE-2017-11534 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12428/">CVE-2017-12428 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12428">CVE-2017-12428 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12431/">CVE-2017-12431 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12431">CVE-2017-12431 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12433/">CVE-2017-12433 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12433">CVE-2017-12433 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13133/">CVE-2017-13133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13133">CVE-2017-13133 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13139/">CVE-2017-13139 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13139">CVE-2017-13139 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15033/">CVE-2017-15033 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15033">CVE-2017-15033 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549817" comment="libMagickCore-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549818" comment="libMagickWand-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149422" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1023895" ref_url="https://bugzilla.suse.com/1023895" source="BUGZILLA"/>
		<reference ref_id="1052261" ref_url="https://bugzilla.suse.com/1052261" source="BUGZILLA"/>
		<reference ref_id="980486" ref_url="https://bugzilla.suse.com/980486" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12424" ref_url="https://www.suse.com/security/cve/CVE-2017-12424/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003379.html" source="SUSE-SU"/>
		<description>
This update for shadow fixes several issues.

This security issue was fixed:

- CVE-2017-12424: The newusers tool could have been forced to manipulate
  internal data structures in ways unintended by the authors. Malformed input may
  have lead to crashes (with a buffer overflow or other memory corruption) or
  other unspecified behaviors (bsc#1052261).

These non-security issues were fixed:

- bsc#1023895: Fixed man page to not contain invalid options and also prevent
  warnings when using these options in certain settings
- bsc#980486: Reset user in /var/log/tallylog because of the usage of pam_tally2
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-08"/>
	<updated date="2017-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023895">SUSE bug 1023895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052261">SUSE bug 1052261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980486">SUSE bug 980486</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12424/">CVE-2017-12424 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12424">CVE-2017-12424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549819" comment="shadow-4.2.1-27.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149423" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1032647" ref_url="https://bugzilla.suse.com/1032647" source="BUGZILLA"/>
		<reference ref_id="1052009" ref_url="https://bugzilla.suse.com/1052009" source="BUGZILLA"/>
		<reference ref_id="1064069" ref_url="https://bugzilla.suse.com/1064069" source="BUGZILLA"/>
		<reference ref_id="1064070" ref_url="https://bugzilla.suse.com/1064070" source="BUGZILLA"/>
		<reference ref_id="1064071" ref_url="https://bugzilla.suse.com/1064071" source="BUGZILLA"/>
		<reference ref_id="1064072" ref_url="https://bugzilla.suse.com/1064072" source="BUGZILLA"/>
		<reference ref_id="1064073" ref_url="https://bugzilla.suse.com/1064073" source="BUGZILLA"/>
		<reference ref_id="1064075" ref_url="https://bugzilla.suse.com/1064075" source="BUGZILLA"/>
		<reference ref_id="1064077" ref_url="https://bugzilla.suse.com/1064077" source="BUGZILLA"/>
		<reference ref_id="1064078" ref_url="https://bugzilla.suse.com/1064078" source="BUGZILLA"/>
		<reference ref_id="1064079" ref_url="https://bugzilla.suse.com/1064079" source="BUGZILLA"/>
		<reference ref_id="1064080" ref_url="https://bugzilla.suse.com/1064080" source="BUGZILLA"/>
		<reference ref_id="1064081" ref_url="https://bugzilla.suse.com/1064081" source="BUGZILLA"/>
		<reference ref_id="1064082" ref_url="https://bugzilla.suse.com/1064082" source="BUGZILLA"/>
		<reference ref_id="1064083" ref_url="https://bugzilla.suse.com/1064083" source="BUGZILLA"/>
		<reference ref_id="1064084" ref_url="https://bugzilla.suse.com/1064084" source="BUGZILLA"/>
		<reference ref_id="1064085" ref_url="https://bugzilla.suse.com/1064085" source="BUGZILLA"/>
		<reference ref_id="1064086" ref_url="https://bugzilla.suse.com/1064086" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-10274" ref_url="https://www.suse.com/security/cve/CVE-2017-10274/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003392.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u151 (icedtea 3.6.0)

Security issues fixed:

- CVE-2017-10274: Handle smartcard clean up better (bsc#1064071)
- CVE-2017-10281: Better queuing priorities (bsc#1064072)
- CVE-2017-10285: Unreferenced references (bsc#1064073)
- CVE-2017-10295: Better URL connections (bsc#1064075)
- CVE-2017-10388: Correct Kerberos ticket grants (bsc#1064086)
- CVE-2017-10346: Better invokespecial checks (bsc#1064078)
- CVE-2017-10350: Better Base Exceptions (bsc#1064082)
- CVE-2017-10347: Better timezone processing (bsc#1064079)
- CVE-2017-10349: Better X processing (bsc#1064081)
- CVE-2017-10345: Better keystore handling (bsc#1064077)
- CVE-2017-10348: Better processing of unresolved permissions (bsc#1064080)
- CVE-2017-10357: Process Proxy presentation (bsc#1064085)
- CVE-2017-10355: More stable connection processing (bsc#1064083)
- CVE-2017-10356: Update storage implementations (bsc#1064084)
- CVE-2016-10165: Improve CMS header processing (bsc#1064069)
- CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843: Upgrade compression library (bsc#1064070)

Bug fixes:

- Fix bsc#1032647, bsc#1052009 with btrfs subvolumes and overlayfs
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-10"/>
	<updated date="2017-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1032647">SUSE bug 1032647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052009">SUSE bug 1052009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064069">SUSE bug 1064069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064070">SUSE bug 1064070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064071">SUSE bug 1064071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064072">SUSE bug 1064072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064073">SUSE bug 1064073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064075">SUSE bug 1064075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064077">SUSE bug 1064077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064078">SUSE bug 1064078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064079">SUSE bug 1064079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064080">SUSE bug 1064080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064081">SUSE bug 1064081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064082">SUSE bug 1064082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064083">SUSE bug 1064083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064084">SUSE bug 1064084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064085">SUSE bug 1064085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064086">SUSE bug 1064086</bugzilla>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10165">CVE-2016-10165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9840">CVE-2016-9840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9841">CVE-2016-9841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9842">CVE-2016-9842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10274/">CVE-2017-10274 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10274">CVE-2017-10274 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10281">CVE-2017-10281 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10285">CVE-2017-10285 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10295">CVE-2017-10295 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10345">CVE-2017-10345 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10346">CVE-2017-10346 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10347">CVE-2017-10347 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10348">CVE-2017-10348 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10349">CVE-2017-10349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10350">CVE-2017-10350 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10355">CVE-2017-10355 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10356">CVE-2017-10356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10357">CVE-2017-10357 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10388">CVE-2017-10388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549821" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549822" comment="java-1_8_0-openjdk-demo-1.8.0.151-27.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549823" comment="java-1_8_0-openjdk-devel-1.8.0.151-27.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549824" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149424" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1019016" ref_url="https://bugzilla.suse.com/1019016" source="BUGZILLA"/>
		<reference ref_id="1042910" ref_url="https://bugzilla.suse.com/1042910" source="BUGZILLA"/>
		<reference ref_id="1053352" ref_url="https://bugzilla.suse.com/1053352" source="BUGZILLA"/>
		<reference ref_id="1059554" ref_url="https://bugzilla.suse.com/1059554" source="BUGZILLA"/>
		<reference ref_id="977410" ref_url="https://bugzilla.suse.com/977410" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12617" ref_url="https://www.suse.com/security/cve/CVE-2017-12617/" source="CVE"/>
		<reference ref_id="CVE-2017-5664" ref_url="https://www.suse.com/security/cve/CVE-2017-5664/" source="CVE"/>
		<reference ref_id="CVE-2017-7674" ref_url="https://www.suse.com/security/cve/CVE-2017-7674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003401.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

Security issues fixed:

- CVE-2017-5664: A problem in handling error pages was fixed, to avoid potential file overwrites during error page handling. (bsc#1042910).
- CVE-2017-7674: A CORS Filter issue could lead to client and server side cache poisoning (bsc#1053352)
- CVE-2017-12617: A remote code execution possibility via JSP Upload was fixed (bsc#1059554)


Non security bugs fixed:

- Fix tomcat-digest classpath error (bsc#977410) 
- Fix packaged /etc/alternatives symlinks for api libs that caused
  rpm -V to report link mismatch (bsc#1019016)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-22"/>
	<updated date="2017-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1019016">SUSE bug 1019016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042910">SUSE bug 1042910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053352">SUSE bug 1053352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059554">SUSE bug 1059554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977410">SUSE bug 977410</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12617/">CVE-2017-12617 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12617">CVE-2017-12617 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5664/">CVE-2017-5664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5664">CVE-2017-5664 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7674/">CVE-2017-7674 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7674">CVE-2017-7674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009532585" comment="tomcat-8.0.43-29.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532586" comment="tomcat-admin-webapps-8.0.43-29.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532587" comment="tomcat-docs-webapp-8.0.43-29.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532588" comment="tomcat-el-3_0-api-8.0.43-29.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532589" comment="tomcat-javadoc-8.0.43-29.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532590" comment="tomcat-jsp-2_3-api-8.0.43-29.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532591" comment="tomcat-lib-8.0.43-29.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532592" comment="tomcat-servlet-3_1-api-8.0.43-29.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532593" comment="tomcat-webapps-8.0.43-29.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149425" version="1" class="patch">
	<metadata>
		<title>Security update for file (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1009966" ref_url="https://bugzilla.suse.com/1009966" source="BUGZILLA"/>
		<reference ref_id="1063269" ref_url="https://bugzilla.suse.com/1063269" source="BUGZILLA"/>
		<reference ref_id="910252" ref_url="https://bugzilla.suse.com/910252" source="BUGZILLA"/>
		<reference ref_id="910253" ref_url="https://bugzilla.suse.com/910253" source="BUGZILLA"/>
		<reference ref_id="913650" ref_url="https://bugzilla.suse.com/913650" source="BUGZILLA"/>
		<reference ref_id="913651" ref_url="https://bugzilla.suse.com/913651" source="BUGZILLA"/>
		<reference ref_id="917152" ref_url="https://bugzilla.suse.com/917152" source="BUGZILLA"/>
		<reference ref_id="996511" ref_url="https://bugzilla.suse.com/996511" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8116" ref_url="https://www.suse.com/security/cve/CVE-2014-8116/" source="CVE"/>
		<reference ref_id="CVE-2014-8117" ref_url="https://www.suse.com/security/cve/CVE-2014-8117/" source="CVE"/>
		<reference ref_id="CVE-2014-9620" ref_url="https://www.suse.com/security/cve/CVE-2014-9620/" source="CVE"/>
		<reference ref_id="CVE-2014-9621" ref_url="https://www.suse.com/security/cve/CVE-2014-9621/" source="CVE"/>
		<reference ref_id="CVE-2014-9653" ref_url="https://www.suse.com/security/cve/CVE-2014-9653/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<description>


The GNU file utility was updated to version 5.22.

Security issues fixed:

- CVE-2014-9621: The ELF parser in file allowed remote attackers to cause a denial of service via a long string. (bsc#913650)
- CVE-2014-9620: The ELF parser in file allowed remote attackers to cause a denial of service via a large number of notes. (bsc#913651)
- CVE-2014-9653: readelf.c in file did not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file. (bsc#917152)
- CVE-2014-8116: The ELF parser (readelf.c) in file allowed remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities. (bsc#910253)
- CVE-2014-8117: softmagic.c in file did not properly limit recursion, which allowed remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors. (bsc#910253)

Version update to file version 5.22

* add indirect relative for TIFF/Exif
* restructure elf note printing to avoid repeated messages
* add note limit, suggested by Alexander Cherepanov
* Bail out on partial pread()'s (Alexander Cherepanov)
* Fix incorrect bounds check in file_printable (Alexander Cherepanov)
* PR/405: ignore SIGPIPE from uncompress programs
* change printable -&gt; file_printable and use it in more places for safety
* in ELF, instead of '(uses dynamic libraries)' when PT_INTERP is present print the interpreter name.

Version update to file version 5.21

* there was an incorrect free in magic_load_buffers()
* there was an out of bounds read for some pascal strings
* there was a memory leak in magic lists
* don't interpret strings printed from files using the current
  locale, convert them to ascii format first.
* there was an out of bounds read in elf note reads

Update to file version 5.20

* recognize encrypted CDF documents
* add magic_load_buffers from Brooks Davis
* add thumbs.db support

Additional non-security bug fixes:

* Fixed a memory corruption during rpmbuild (bsc#1063269)
* Backport of a fix for an increased printable string length as found in file 5.30 (bsc#996511)
* file command throws 'Composite Document File V2 Document, corrupt: Can't read SSAT' error against excel 97/2003 file format. (bsc#1009966)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-22"/>
	<updated date="2017-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009966">SUSE bug 1009966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063269">SUSE bug 1063269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910252">SUSE bug 910252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910253">SUSE bug 910253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913650">SUSE bug 913650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913651">SUSE bug 913651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996511">SUSE bug 996511</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8116/">CVE-2014-8116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8116">CVE-2014-8116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8117/">CVE-2014-8117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8117">CVE-2014-8117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9620/">CVE-2014-9620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9620">CVE-2014-9620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9621/">CVE-2014-9621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9621">CVE-2014-9621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9653/">CVE-2014-9653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9653">CVE-2014-9653 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549834" comment="file-5.22-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549835" comment="file-magic-5.22-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549836" comment="libmagic1-5.22-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549837" comment="libmagic1-32bit-5.22-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149426" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1022727" ref_url="https://bugzilla.suse.com/1022727" source="BUGZILLA"/>
		<reference ref_id="1051150" ref_url="https://bugzilla.suse.com/1051150" source="BUGZILLA"/>
		<reference ref_id="1052984" ref_url="https://bugzilla.suse.com/1052984" source="BUGZILLA"/>
		<reference ref_id="1061107" ref_url="https://bugzilla.suse.com/1061107" source="BUGZILLA"/>
		<reference ref_id="1063034" ref_url="https://bugzilla.suse.com/1063034" source="BUGZILLA"/>
		<reference ref_id="1063035" ref_url="https://bugzilla.suse.com/1063035" source="BUGZILLA"/>
		<reference ref_id="1063037" ref_url="https://bugzilla.suse.com/1063037" source="BUGZILLA"/>
		<reference ref_id="1063038" ref_url="https://bugzilla.suse.com/1063038" source="BUGZILLA"/>
		<reference ref_id="1063039" ref_url="https://bugzilla.suse.com/1063039" source="BUGZILLA"/>
		<reference ref_id="1063040" ref_url="https://bugzilla.suse.com/1063040" source="BUGZILLA"/>
		<reference ref_id="1063041" ref_url="https://bugzilla.suse.com/1063041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12176" ref_url="https://www.suse.com/security/cve/CVE-2017-12176/" source="CVE"/>
		<reference ref_id="CVE-2017-12177" ref_url="https://www.suse.com/security/cve/CVE-2017-12177/" source="CVE"/>
		<reference ref_id="CVE-2017-12178" ref_url="https://www.suse.com/security/cve/CVE-2017-12178/" source="CVE"/>
		<reference ref_id="CVE-2017-12179" ref_url="https://www.suse.com/security/cve/CVE-2017-12179/" source="CVE"/>
		<reference ref_id="CVE-2017-12180" ref_url="https://www.suse.com/security/cve/CVE-2017-12180/" source="CVE"/>
		<reference ref_id="CVE-2017-12181" ref_url="https://www.suse.com/security/cve/CVE-2017-12181/" source="CVE"/>
		<reference ref_id="CVE-2017-12182" ref_url="https://www.suse.com/security/cve/CVE-2017-12182/" source="CVE"/>
		<reference ref_id="CVE-2017-12183" ref_url="https://www.suse.com/security/cve/CVE-2017-12183/" source="CVE"/>
		<reference ref_id="CVE-2017-12184" ref_url="https://www.suse.com/security/cve/CVE-2017-12184/" source="CVE"/>
		<reference ref_id="CVE-2017-12185" ref_url="https://www.suse.com/security/cve/CVE-2017-12185/" source="CVE"/>
		<reference ref_id="CVE-2017-12186" ref_url="https://www.suse.com/security/cve/CVE-2017-12186/" source="CVE"/>
		<reference ref_id="CVE-2017-12187" ref_url="https://www.suse.com/security/cve/CVE-2017-12187/" source="CVE"/>
		<reference ref_id="CVE-2017-13721" ref_url="https://www.suse.com/security/cve/CVE-2017-13721/" source="CVE"/>
		<reference ref_id="CVE-2017-13723" ref_url="https://www.suse.com/security/cve/CVE-2017-13723/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<description>


This update for xorg-x11-server fixes several issues.

These security issues were fixed:

- CVE-2017-13721: Missing validation of shmseg resource id in Xext/XShm
  could lead to shared memory segments of other users beeing freed
  (bnc#1052984)
- CVE-2017-13723: A local denial of service via unusual characters in XkbAtomText and XkbStringText was fixed (bnc#1051150)
- CVE-2017-12184,CVE-2017-12185,CVE-2017-12186,CVE-2017-12187: Fixed
  unvalidated lengths in multiple extensions (bsc#1063034)
- CVE-2017-12183: Fixed some unvalidated lengths in the XFIXES
  extension. (bsc#1063035)
- CVE-2017-12180,CVE-2017-12181,CVE-2017-12182: Fixed various unvalidated
  lengths in the XFree86-VidMode/XFree86-DGA/XFree86-DRI extensions
  (bsc#1063037)
- CVE-2017-12179: Fixed an integer overflow and unvalidated length in
  (S)ProcXIBarrierReleasePointer in Xi (bsc#1063038)
- CVE-2017-12178: Fixed a wrong extra length check in
  ProcXIChangeHierarchy in Xi (bsc#1063039)
- CVE-2017-12177: Fixed an unvalidated variable-length request in
  ProcDbeGetVisualInfo (bsc#1063040)
- CVE-2017-12176: Fixed an unvalidated extra length in
  ProcEstablishConnection (bsc#1063041)


These non-security issues were fixed:

- Make colormap/gamma glue code work with the RandR extension disabled. This prevents it
  from crashing and showing wrong colors. (bsc#1061107)
- Recognize ssh as a remote client to fix launching applications remotely when using DRI3.
  (bsc#1022727)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-22"/>
	<updated date="2017-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022727">SUSE bug 1022727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051150">SUSE bug 1051150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052984">SUSE bug 1052984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061107">SUSE bug 1061107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063035">SUSE bug 1063035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063037">SUSE bug 1063037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063038">SUSE bug 1063038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063039">SUSE bug 1063039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063040">SUSE bug 1063040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063041">SUSE bug 1063041</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12176/">CVE-2017-12176 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12176">CVE-2017-12176 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12177/">CVE-2017-12177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12177">CVE-2017-12177 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12178/">CVE-2017-12178 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12178">CVE-2017-12178 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12179/">CVE-2017-12179 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12179">CVE-2017-12179 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12180/">CVE-2017-12180 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12180">CVE-2017-12180 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12181/">CVE-2017-12181 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12181">CVE-2017-12181 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12182/">CVE-2017-12182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12182">CVE-2017-12182 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12183/">CVE-2017-12183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12183">CVE-2017-12183 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12184/">CVE-2017-12184 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12184">CVE-2017-12184 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12185/">CVE-2017-12185 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12185">CVE-2017-12185 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12186/">CVE-2017-12186 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12186">CVE-2017-12186 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12187/">CVE-2017-12187 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12187">CVE-2017-12187 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-13721/">CVE-2017-13721 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13721">CVE-2017-13721 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13723/">CVE-2017-13723 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13723">CVE-2017-13723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549838" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549839" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149427" version="1" class="patch">
	<metadata>
		<title>Recommended update for tboot (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1057555" ref_url="https://bugzilla.suse.com/1057555" source="BUGZILLA"/>
		<reference ref_id="1068390" ref_url="https://bugzilla.suse.com/1068390" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16837" ref_url="https://www.suse.com/security/cve/CVE-2017-16837/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003415.html" source="SUSE-SU"/>
		<description>
This update for tboot fixes the following issues:

Security issue fixed:

- CVE-2017-16837: Certain function pointers in Trusted Boot (tboot) through 1.9.6 are
  notvalidated and can cause arbitrary code execution, which allows local users
  tooverwrite dynamic PCRs of Trusted Platform Module (TPM) by h (bsc#1068390)

Bug fixes:

- Fixed failed trusted boot on some systems like Intel Xeon 'Purley 8s' processors. The
  following error message showed: 'TBOOT: wait-for-sipi loop timed-out'. Booting continued
  but 'TXT measured launch' was wrongly reported as FALSE. (bsc#1057555)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-24"/>
	<updated date="2017-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1057555">SUSE bug 1057555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068390">SUSE bug 1068390</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16837/">CVE-2017-16837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16837">CVE-2017-16837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549840" comment="tboot-20160518_1.9.4-7.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149428" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1047178" ref_url="https://bugzilla.suse.com/1047178" source="BUGZILLA"/>
		<reference ref_id="1057721" ref_url="https://bugzilla.suse.com/1057721" source="BUGZILLA"/>
		<reference ref_id="1057724" ref_url="https://bugzilla.suse.com/1057724" source="BUGZILLA"/>
		<reference ref_id="999735" ref_url="https://bugzilla.suse.com/999735" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12837" ref_url="https://www.suse.com/security/cve/CVE-2017-12837/" source="CVE"/>
		<reference ref_id="CVE-2017-12883" ref_url="https://www.suse.com/security/cve/CVE-2017-12883/" source="CVE"/>
		<reference ref_id="CVE-2017-6512" ref_url="https://www.suse.com/security/cve/CVE-2017-6512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003416.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

Security issues fixed:
- CVE-2017-12837: Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 before
  5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to cause a denial of service
  (out-of-bounds write) via a regular expression with a '\N{}' escape and the case-insensitive
  modifier. (bnc#1057724)
- CVE-2017-12883: Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before
  5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information
  or cause a denial of service (application crash) via a crafted regular expression with an invalid
  '\N{U+...}' escape. (bnc#1057721)
- CVE-2017-6512: Race condition in the rmtree and remove_tree functions in the File-Path module
  before 2.13 for Perl allows attackers to set the mode on arbitrary files via vectors involving
  directory-permission loosening logic. (bnc#1047178)

Bug fixes:
- backport set_capture_string changes from upstream (bsc#999735)
- reformat baselibs.conf as source validator workaround
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-24"/>
	<updated date="2017-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047178">SUSE bug 1047178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057721">SUSE bug 1057721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057724">SUSE bug 1057724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999735">SUSE bug 999735</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12837/">CVE-2017-12837 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12837">CVE-2017-12837 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12883/">CVE-2017-12883 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12883">CVE-2017-12883 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-6512/">CVE-2017-6512 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6512">CVE-2017-6512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549842" comment="perl-5.18.2-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549843" comment="perl-32bit-5.18.2-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549844" comment="perl-base-5.18.2-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518322" comment="perl-doc-5.18.2-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149429" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1066295" ref_url="https://bugzilla.suse.com/1066295" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003419.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- Update Intel WiFi firmwares for the 3160, 7260 and 7265 adapters.

Security issues fixed are part of the 'KRACK' attacks affecting the firmware:

- CVE-2017-13080: The reinstallation of the Group Temporal key could be used for replay attacks (bsc#1066295):
- CVE-2017-13081: The reinstallation of the Integrity Group Temporal key could be used for replay attacks (bsc#1066295):
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-27"/>
	<updated date="2017-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1066295">SUSE bug 1066295</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13081">CVE-2017-13081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518323" comment="kernel-firmware-20170530-21.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518324" comment="ucode-amd-20170530-21.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149430" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1055047" ref_url="https://bugzilla.suse.com/1055047" source="BUGZILLA"/>
		<reference ref_id="1061075" ref_url="https://bugzilla.suse.com/1061075" source="BUGZILLA"/>
		<reference ref_id="1063123" ref_url="https://bugzilla.suse.com/1063123" source="BUGZILLA"/>
		<reference ref_id="1068187" ref_url="https://bugzilla.suse.com/1068187" source="BUGZILLA"/>
		<reference ref_id="1068191" ref_url="https://bugzilla.suse.com/1068191" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-15597" ref_url="https://www.suse.com/security/cve/CVE-2017-15597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003422.html" source="SUSE-SU"/>
		<description>
This update for xen to version 4.9.1 (bsc#1027519) fixes several issues.

This new feature was added:

- Support migration of HVM domains larger than 1 TB

These security issues were fixed:

- bsc#1068187: Failure to recognize errors in the Populate on Demand (PoD) code
  allowed for DoS (XSA-246)
- bsc#1068191: Missing p2m error checking in PoD code allowed unprivileged guests
  to retain a writable mapping of freed memory leading to information leaks,
  privilege escalation or DoS (XSA-247).
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds write access and Qemu process
  crash) via vectors related to dst calculation (bsc#1063123)
- CVE-2017-15597: A grant copy operation being done on a grant of a dying domain
  allowed a malicious guest administrator to corrupt hypervisor memory, allowing
  for DoS or potentially privilege escalation and information leaks (bsc#1061075).

This non-security issue was fixed:

- bsc#1055047: Fixed --initrd-inject option in virt-install 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-29"/>
	<updated date="2017-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055047">SUSE bug 1055047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061075">SUSE bug 1061075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063123">SUSE bug 1063123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068187">SUSE bug 1068187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068191">SUSE bug 1068191</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15289">CVE-2017-15289 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15597/">CVE-2017-15597 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15597">CVE-2017-15597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519583" comment="xen-4.9.1_02-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552709" comment="xen-doc-html-4.9.1_02-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519584" comment="xen-libs-4.9.1_02-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519585" comment="xen-libs-32bit-4.9.1_02-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552710" comment="xen-tools-4.9.1_02-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552711" comment="xen-tools-domU-4.9.1_02-3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149431" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1058565" ref_url="https://bugzilla.suse.com/1058565" source="BUGZILLA"/>
		<reference ref_id="1058622" ref_url="https://bugzilla.suse.com/1058622" source="BUGZILLA"/>
		<reference ref_id="1058624" ref_url="https://bugzilla.suse.com/1058624" source="BUGZILLA"/>
		<reference ref_id="1060427" ref_url="https://bugzilla.suse.com/1060427" source="BUGZILLA"/>
		<reference ref_id="1063008" ref_url="https://bugzilla.suse.com/1063008" source="BUGZILLA"/>
		<reference ref_id="1065066" ref_url="https://bugzilla.suse.com/1065066" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12151" ref_url="https://www.suse.com/security/cve/CVE-2017-12151/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<reference ref_id="CVE-2017-14746" ref_url="https://www.suse.com/security/cve/CVE-2017-14746/" source="CVE"/>
		<reference ref_id="CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003453.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

Security issues fixed:

- CVE-2017-14746: Use-after-free vulnerability (bsc#1060427).
- CVE-2017-15275: Server heap memory information leak (bsc#1063008).
- CVE-2017-12163: Prevent client short SMB1 write from writing server memory to file (bsc#1058624).
- CVE-2017-12151: Keep required encryption across SMB3 dfs redirects (bsc#1058565).
- CVE-2017-12150: Some code path don't enforce smb signing when they should (bsc#1058565).

Bug fixes:
- Samba was updated to 4.6.9 (bsc#1065066) see release notes for details.
  * https://www.samba.org/samba/history/samba-4.6.9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-30"/>
	<updated date="2017-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1058565">SUSE bug 1058565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060427">SUSE bug 1060427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063008">SUSE bug 1063008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065066">SUSE bug 1065066</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12150">CVE-2017-12150 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12151/">CVE-2017-12151 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12151">CVE-2017-12151 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12163">CVE-2017-12163 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14746/">CVE-2017-14746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14746">CVE-2017-14746 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15275">CVE-2017-15275 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552712" comment="libdcerpc-binding0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552713" comment="libdcerpc-binding0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552714" comment="libdcerpc0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552715" comment="libdcerpc0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552716" comment="libndr-krb5pac0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552717" comment="libndr-krb5pac0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552718" comment="libndr-nbt0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552719" comment="libndr-nbt0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552720" comment="libndr-standard0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552721" comment="libndr-standard0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552722" comment="libndr0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552723" comment="libndr0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552724" comment="libnetapi0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552725" comment="libnetapi0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552726" comment="libsamba-credentials0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552727" comment="libsamba-credentials0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552728" comment="libsamba-errors0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552729" comment="libsamba-errors0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552730" comment="libsamba-hostconfig0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552731" comment="libsamba-hostconfig0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552732" comment="libsamba-passdb0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552733" comment="libsamba-passdb0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552734" comment="libsamba-util0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552735" comment="libsamba-util0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552736" comment="libsamdb0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552737" comment="libsamdb0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552738" comment="libsmbclient0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552739" comment="libsmbclient0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552740" comment="libsmbconf0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552741" comment="libsmbconf0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552742" comment="libsmbldap0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552743" comment="libsmbldap0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552744" comment="libtevent-util0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552745" comment="libtevent-util0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552746" comment="libwbclient0-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552747" comment="libwbclient0-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552748" comment="samba-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552749" comment="samba-client-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552750" comment="samba-client-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519625" comment="samba-doc-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552751" comment="samba-libs-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552752" comment="samba-libs-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552753" comment="samba-winbind-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552754" comment="samba-winbind-32bit-4.6.9+git.59.c2cff9cea4c-3.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149432" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1055825" ref_url="https://bugzilla.suse.com/1055825" source="BUGZILLA"/>
		<reference ref_id="1056058" ref_url="https://bugzilla.suse.com/1056058" source="BUGZILLA"/>
		<reference ref_id="1065363" ref_url="https://bugzilla.suse.com/1065363" source="BUGZILLA"/>
		<reference ref_id="1066242" ref_url="https://bugzilla.suse.com/1066242" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003461.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2017-3735: openssl1,openssl: Malformed X.509 IPAdressFamily could cause OOB read (bsc#1056058)
- CVE-2017-3736: openssl: bn_sqrx8x_internal carry bug on x86_64 (bsc#1066242)
- Out of bounds read+crash in DES_fcrypt (bsc#1065363)
- openssl DEFAULT_SUSE cipher list is missing ECDHE-ECDSA ciphers (bsc#1055825)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-30"/>
	<updated date="2017-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055825">SUSE bug 1055825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056058">SUSE bug 1056058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065363">SUSE bug 1065363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066242">SUSE bug 1066242</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3735">CVE-2017-3735 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3736">CVE-2017-3736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009541071" comment="libopenssl-devel-1.0.2j-60.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549895" comment="libopenssl1_0_0-1.0.2j-60.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549896" comment="libopenssl1_0_0-32bit-1.0.2j-60.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549897" comment="libopenssl1_0_0-hmac-1.0.2j-60.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549898" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549899" comment="openssl-1.0.2j-60.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532635" comment="openssl-doc-1.0.2j-60.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149433" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1003846" ref_url="https://bugzilla.suse.com/1003846" source="BUGZILLA"/>
		<reference ref_id="1025282" ref_url="https://bugzilla.suse.com/1025282" source="BUGZILLA"/>
		<reference ref_id="1029907" ref_url="https://bugzilla.suse.com/1029907" source="BUGZILLA"/>
		<reference ref_id="1029908" ref_url="https://bugzilla.suse.com/1029908" source="BUGZILLA"/>
		<reference ref_id="1029909" ref_url="https://bugzilla.suse.com/1029909" source="BUGZILLA"/>
		<reference ref_id="1029995" ref_url="https://bugzilla.suse.com/1029995" source="BUGZILLA"/>
		<reference ref_id="1030296" ref_url="https://bugzilla.suse.com/1030296" source="BUGZILLA"/>
		<reference ref_id="1030297" ref_url="https://bugzilla.suse.com/1030297" source="BUGZILLA"/>
		<reference ref_id="1030298" ref_url="https://bugzilla.suse.com/1030298" source="BUGZILLA"/>
		<reference ref_id="1030583" ref_url="https://bugzilla.suse.com/1030583" source="BUGZILLA"/>
		<reference ref_id="1030584" ref_url="https://bugzilla.suse.com/1030584" source="BUGZILLA"/>
		<reference ref_id="1030585" ref_url="https://bugzilla.suse.com/1030585" source="BUGZILLA"/>
		<reference ref_id="1030588" ref_url="https://bugzilla.suse.com/1030588" source="BUGZILLA"/>
		<reference ref_id="1030589" ref_url="https://bugzilla.suse.com/1030589" source="BUGZILLA"/>
		<reference ref_id="1031590" ref_url="https://bugzilla.suse.com/1031590" source="BUGZILLA"/>
		<reference ref_id="1031593" ref_url="https://bugzilla.suse.com/1031593" source="BUGZILLA"/>
		<reference ref_id="1031595" ref_url="https://bugzilla.suse.com/1031595" source="BUGZILLA"/>
		<reference ref_id="1031638" ref_url="https://bugzilla.suse.com/1031638" source="BUGZILLA"/>
		<reference ref_id="1031644" ref_url="https://bugzilla.suse.com/1031644" source="BUGZILLA"/>
		<reference ref_id="1031656" ref_url="https://bugzilla.suse.com/1031656" source="BUGZILLA"/>
		<reference ref_id="1033122" ref_url="https://bugzilla.suse.com/1033122" source="BUGZILLA"/>
		<reference ref_id="1037052" ref_url="https://bugzilla.suse.com/1037052" source="BUGZILLA"/>
		<reference ref_id="1037057" ref_url="https://bugzilla.suse.com/1037057" source="BUGZILLA"/>
		<reference ref_id="1037061" ref_url="https://bugzilla.suse.com/1037061" source="BUGZILLA"/>
		<reference ref_id="1037062" ref_url="https://bugzilla.suse.com/1037062" source="BUGZILLA"/>
		<reference ref_id="1037066" ref_url="https://bugzilla.suse.com/1037066" source="BUGZILLA"/>
		<reference ref_id="1037070" ref_url="https://bugzilla.suse.com/1037070" source="BUGZILLA"/>
		<reference ref_id="1037072" ref_url="https://bugzilla.suse.com/1037072" source="BUGZILLA"/>
		<reference ref_id="1037273" ref_url="https://bugzilla.suse.com/1037273" source="BUGZILLA"/>
		<reference ref_id="1038874" ref_url="https://bugzilla.suse.com/1038874" source="BUGZILLA"/>
		<reference ref_id="1038875" ref_url="https://bugzilla.suse.com/1038875" source="BUGZILLA"/>
		<reference ref_id="1038876" ref_url="https://bugzilla.suse.com/1038876" source="BUGZILLA"/>
		<reference ref_id="1038877" ref_url="https://bugzilla.suse.com/1038877" source="BUGZILLA"/>
		<reference ref_id="1038878" ref_url="https://bugzilla.suse.com/1038878" source="BUGZILLA"/>
		<reference ref_id="1038880" ref_url="https://bugzilla.suse.com/1038880" source="BUGZILLA"/>
		<reference ref_id="1038881" ref_url="https://bugzilla.suse.com/1038881" source="BUGZILLA"/>
		<reference ref_id="1044891" ref_url="https://bugzilla.suse.com/1044891" source="BUGZILLA"/>
		<reference ref_id="1044897" ref_url="https://bugzilla.suse.com/1044897" source="BUGZILLA"/>
		<reference ref_id="1044901" ref_url="https://bugzilla.suse.com/1044901" source="BUGZILLA"/>
		<reference ref_id="1044909" ref_url="https://bugzilla.suse.com/1044909" source="BUGZILLA"/>
		<reference ref_id="1044925" ref_url="https://bugzilla.suse.com/1044925" source="BUGZILLA"/>
		<reference ref_id="1044927" ref_url="https://bugzilla.suse.com/1044927" source="BUGZILLA"/>
		<reference ref_id="1046094" ref_url="https://bugzilla.suse.com/1046094" source="BUGZILLA"/>
		<reference ref_id="1052061" ref_url="https://bugzilla.suse.com/1052061" source="BUGZILLA"/>
		<reference ref_id="1052496" ref_url="https://bugzilla.suse.com/1052496" source="BUGZILLA"/>
		<reference ref_id="1052503" ref_url="https://bugzilla.suse.com/1052503" source="BUGZILLA"/>
		<reference ref_id="1052507" ref_url="https://bugzilla.suse.com/1052507" source="BUGZILLA"/>
		<reference ref_id="1052509" ref_url="https://bugzilla.suse.com/1052509" source="BUGZILLA"/>
		<reference ref_id="1052511" ref_url="https://bugzilla.suse.com/1052511" source="BUGZILLA"/>
		<reference ref_id="1052514" ref_url="https://bugzilla.suse.com/1052514" source="BUGZILLA"/>
		<reference ref_id="1052518" ref_url="https://bugzilla.suse.com/1052518" source="BUGZILLA"/>
		<reference ref_id="1053347" ref_url="https://bugzilla.suse.com/1053347" source="BUGZILLA"/>
		<reference ref_id="1056312" ref_url="https://bugzilla.suse.com/1056312" source="BUGZILLA"/>
		<reference ref_id="1056437" ref_url="https://bugzilla.suse.com/1056437" source="BUGZILLA"/>
		<reference ref_id="1057139" ref_url="https://bugzilla.suse.com/1057139" source="BUGZILLA"/>
		<reference ref_id="1057144" ref_url="https://bugzilla.suse.com/1057144" source="BUGZILLA"/>
		<reference ref_id="1057149" ref_url="https://bugzilla.suse.com/1057149" source="BUGZILLA"/>
		<reference ref_id="1058480" ref_url="https://bugzilla.suse.com/1058480" source="BUGZILLA"/>
		<reference ref_id="1059050" ref_url="https://bugzilla.suse.com/1059050" source="BUGZILLA"/>
		<reference ref_id="1060599" ref_url="https://bugzilla.suse.com/1060599" source="BUGZILLA"/>
		<reference ref_id="1060621" ref_url="https://bugzilla.suse.com/1060621" source="BUGZILLA"/>
		<reference ref_id="1061241" ref_url="https://bugzilla.suse.com/1061241" source="BUGZILLA"/>
		<reference ref_id="437293" ref_url="https://bugzilla.suse.com/437293" source="BUGZILLA"/>
		<reference ref_id="445037" ref_url="https://bugzilla.suse.com/445037" source="BUGZILLA"/>
		<reference ref_id="546106" ref_url="https://bugzilla.suse.com/546106" source="BUGZILLA"/>
		<reference ref_id="561142" ref_url="https://bugzilla.suse.com/561142" source="BUGZILLA"/>
		<reference ref_id="578249" ref_url="https://bugzilla.suse.com/578249" source="BUGZILLA"/>
		<reference ref_id="590820" ref_url="https://bugzilla.suse.com/590820" source="BUGZILLA"/>
		<reference ref_id="691290" ref_url="https://bugzilla.suse.com/691290" source="BUGZILLA"/>
		<reference ref_id="698346" ref_url="https://bugzilla.suse.com/698346" source="BUGZILLA"/>
		<reference ref_id="713504" ref_url="https://bugzilla.suse.com/713504" source="BUGZILLA"/>
		<reference ref_id="776968" ref_url="https://bugzilla.suse.com/776968" source="BUGZILLA"/>
		<reference ref_id="863764" ref_url="https://bugzilla.suse.com/863764" source="BUGZILLA"/>
		<reference ref_id="938658" ref_url="https://bugzilla.suse.com/938658" source="BUGZILLA"/>
		<reference ref_id="970239" ref_url="https://bugzilla.suse.com/970239" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9939" ref_url="https://www.suse.com/security/cve/CVE-2014-9939/" source="CVE"/>
		<reference ref_id="CVE-2017-12448" ref_url="https://www.suse.com/security/cve/CVE-2017-12448/" source="CVE"/>
		<reference ref_id="CVE-2017-12450" ref_url="https://www.suse.com/security/cve/CVE-2017-12450/" source="CVE"/>
		<reference ref_id="CVE-2017-12452" ref_url="https://www.suse.com/security/cve/CVE-2017-12452/" source="CVE"/>
		<reference ref_id="CVE-2017-12453" ref_url="https://www.suse.com/security/cve/CVE-2017-12453/" source="CVE"/>
		<reference ref_id="CVE-2017-12454" ref_url="https://www.suse.com/security/cve/CVE-2017-12454/" source="CVE"/>
		<reference ref_id="CVE-2017-12456" ref_url="https://www.suse.com/security/cve/CVE-2017-12456/" source="CVE"/>
		<reference ref_id="CVE-2017-12799" ref_url="https://www.suse.com/security/cve/CVE-2017-12799/" source="CVE"/>
		<reference ref_id="CVE-2017-13757" ref_url="https://www.suse.com/security/cve/CVE-2017-13757/" source="CVE"/>
		<reference ref_id="CVE-2017-14128" ref_url="https://www.suse.com/security/cve/CVE-2017-14128/" source="CVE"/>
		<reference ref_id="CVE-2017-14129" ref_url="https://www.suse.com/security/cve/CVE-2017-14129/" source="CVE"/>
		<reference ref_id="CVE-2017-14130" ref_url="https://www.suse.com/security/cve/CVE-2017-14130/" source="CVE"/>
		<reference ref_id="CVE-2017-14333" ref_url="https://www.suse.com/security/cve/CVE-2017-14333/" source="CVE"/>
		<reference ref_id="CVE-2017-14529" ref_url="https://www.suse.com/security/cve/CVE-2017-14529/" source="CVE"/>
		<reference ref_id="CVE-2017-14729" ref_url="https://www.suse.com/security/cve/CVE-2017-14729/" source="CVE"/>
		<reference ref_id="CVE-2017-14745" ref_url="https://www.suse.com/security/cve/CVE-2017-14745/" source="CVE"/>
		<reference ref_id="CVE-2017-14974" ref_url="https://www.suse.com/security/cve/CVE-2017-14974/" source="CVE"/>
		<reference ref_id="CVE-2017-6965" ref_url="https://www.suse.com/security/cve/CVE-2017-6965/" source="CVE"/>
		<reference ref_id="CVE-2017-6966" ref_url="https://www.suse.com/security/cve/CVE-2017-6966/" source="CVE"/>
		<reference ref_id="CVE-2017-6969" ref_url="https://www.suse.com/security/cve/CVE-2017-6969/" source="CVE"/>
		<reference ref_id="CVE-2017-7209" ref_url="https://www.suse.com/security/cve/CVE-2017-7209/" source="CVE"/>
		<reference ref_id="CVE-2017-7210" ref_url="https://www.suse.com/security/cve/CVE-2017-7210/" source="CVE"/>
		<reference ref_id="CVE-2017-7223" ref_url="https://www.suse.com/security/cve/CVE-2017-7223/" source="CVE"/>
		<reference ref_id="CVE-2017-7224" ref_url="https://www.suse.com/security/cve/CVE-2017-7224/" source="CVE"/>
		<reference ref_id="CVE-2017-7225" ref_url="https://www.suse.com/security/cve/CVE-2017-7225/" source="CVE"/>
		<reference ref_id="CVE-2017-7226" ref_url="https://www.suse.com/security/cve/CVE-2017-7226/" source="CVE"/>
		<reference ref_id="CVE-2017-7227" ref_url="https://www.suse.com/security/cve/CVE-2017-7227/" source="CVE"/>
		<reference ref_id="CVE-2017-7299" ref_url="https://www.suse.com/security/cve/CVE-2017-7299/" source="CVE"/>
		<reference ref_id="CVE-2017-7300" ref_url="https://www.suse.com/security/cve/CVE-2017-7300/" source="CVE"/>
		<reference ref_id="CVE-2017-7301" ref_url="https://www.suse.com/security/cve/CVE-2017-7301/" source="CVE"/>
		<reference ref_id="CVE-2017-7302" ref_url="https://www.suse.com/security/cve/CVE-2017-7302/" source="CVE"/>
		<reference ref_id="CVE-2017-7303" ref_url="https://www.suse.com/security/cve/CVE-2017-7303/" source="CVE"/>
		<reference ref_id="CVE-2017-7304" ref_url="https://www.suse.com/security/cve/CVE-2017-7304/" source="CVE"/>
		<reference ref_id="CVE-2017-7614" ref_url="https://www.suse.com/security/cve/CVE-2017-7614/" source="CVE"/>
		<reference ref_id="CVE-2017-8392" ref_url="https://www.suse.com/security/cve/CVE-2017-8392/" source="CVE"/>
		<reference ref_id="CVE-2017-8393" ref_url="https://www.suse.com/security/cve/CVE-2017-8393/" source="CVE"/>
		<reference ref_id="CVE-2017-8394" ref_url="https://www.suse.com/security/cve/CVE-2017-8394/" source="CVE"/>
		<reference ref_id="CVE-2017-8395" ref_url="https://www.suse.com/security/cve/CVE-2017-8395/" source="CVE"/>
		<reference ref_id="CVE-2017-8396" ref_url="https://www.suse.com/security/cve/CVE-2017-8396/" source="CVE"/>
		<reference ref_id="CVE-2017-8397" ref_url="https://www.suse.com/security/cve/CVE-2017-8397/" source="CVE"/>
		<reference ref_id="CVE-2017-8398" ref_url="https://www.suse.com/security/cve/CVE-2017-8398/" source="CVE"/>
		<reference ref_id="CVE-2017-8421" ref_url="https://www.suse.com/security/cve/CVE-2017-8421/" source="CVE"/>
		<reference ref_id="CVE-2017-9038" ref_url="https://www.suse.com/security/cve/CVE-2017-9038/" source="CVE"/>
		<reference ref_id="CVE-2017-9039" ref_url="https://www.suse.com/security/cve/CVE-2017-9039/" source="CVE"/>
		<reference ref_id="CVE-2017-9040" ref_url="https://www.suse.com/security/cve/CVE-2017-9040/" source="CVE"/>
		<reference ref_id="CVE-2017-9041" ref_url="https://www.suse.com/security/cve/CVE-2017-9041/" source="CVE"/>
		<reference ref_id="CVE-2017-9042" ref_url="https://www.suse.com/security/cve/CVE-2017-9042/" source="CVE"/>
		<reference ref_id="CVE-2017-9043" ref_url="https://www.suse.com/security/cve/CVE-2017-9043/" source="CVE"/>
		<reference ref_id="CVE-2017-9044" ref_url="https://www.suse.com/security/cve/CVE-2017-9044/" source="CVE"/>
		<reference ref_id="CVE-2017-9746" ref_url="https://www.suse.com/security/cve/CVE-2017-9746/" source="CVE"/>
		<reference ref_id="CVE-2017-9747" ref_url="https://www.suse.com/security/cve/CVE-2017-9747/" source="CVE"/>
		<reference ref_id="CVE-2017-9748" ref_url="https://www.suse.com/security/cve/CVE-2017-9748/" source="CVE"/>
		<reference ref_id="CVE-2017-9750" ref_url="https://www.suse.com/security/cve/CVE-2017-9750/" source="CVE"/>
		<reference ref_id="CVE-2017-9755" ref_url="https://www.suse.com/security/cve/CVE-2017-9755/" source="CVE"/>
		<reference ref_id="CVE-2017-9756" ref_url="https://www.suse.com/security/cve/CVE-2017-9756/" source="CVE"/>
		<reference ref_id="CVE-2017-9954" ref_url="https://www.suse.com/security/cve/CVE-2017-9954/" source="CVE"/>
		<reference ref_id="CVE-2017-9955" ref_url="https://www.suse.com/security/cve/CVE-2017-9955/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<description>


GNU binutil was updated to the 2.29.1 release, bringing various new features, fixing a lot of bugs and security issues.

Following security issues are being addressed by this release:

  * 18750 bsc#1030296 CVE-2014-9939
  * 20891 bsc#1030585 CVE-2017-7225
  * 20892 bsc#1030588 CVE-2017-7224
  * 20898 bsc#1030589 CVE-2017-7223
  * 20905 bsc#1030584 CVE-2017-7226
  * 20908 bsc#1031644 CVE-2017-7299
  * 20909 bsc#1031656 CVE-2017-7300
  * 20921 bsc#1031595 CVE-2017-7302
  * 20922 bsc#1031593 CVE-2017-7303
  * 20924 bsc#1031638 CVE-2017-7301
  * 20931 bsc#1031590 CVE-2017-7304
  * 21135 bsc#1030298 CVE-2017-7209 
  * 21137 bsc#1029909 CVE-2017-6965
  * 21139 bsc#1029908 CVE-2017-6966
  * 21156 bsc#1029907 CVE-2017-6969
  * 21157 bsc#1030297 CVE-2017-7210
  * 21409 bsc#1037052 CVE-2017-8392
  * 21412 bsc#1037057 CVE-2017-8393
  * 21414 bsc#1037061 CVE-2017-8394
  * 21432 bsc#1037066 CVE-2017-8396
  * 21440 bsc#1037273 CVE-2017-8421
  * 21580 bsc#1044891 CVE-2017-9746
  * 21581 bsc#1044897 CVE-2017-9747
  * 21582 bsc#1044901 CVE-2017-9748
  * 21587 bsc#1044909 CVE-2017-9750
  * 21594 bsc#1044925 CVE-2017-9755
  * 21595 bsc#1044927 CVE-2017-9756
  * 21787 bsc#1052518 CVE-2017-12448
  * 21813 bsc#1052503, CVE-2017-12456, bsc#1052507, CVE-2017-12454, bsc#1052509, CVE-2017-12453, bsc#1052511, CVE-2017-12452, bsc#1052514, CVE-2017-12450, bsc#1052503, CVE-2017-12456, bsc#1052507, CVE-2017-12454, bsc#1052509, CVE-2017-12453, bsc#1052511, CVE-2017-12452, bsc#1052514, CVE-2017-12450
  * 21933 bsc#1053347 CVE-2017-12799
  * 21990 bsc#1058480 CVE-2017-14333
  * 22018 bsc#1056312 CVE-2017-13757
  * 22047 bsc#1057144 CVE-2017-14129
  * 22058 bsc#1057149 CVE-2017-14130
  * 22059 bsc#1057139 CVE-2017-14128
  * 22113 bsc#1059050 CVE-2017-14529
  * 22148 bsc#1060599 CVE-2017-14745
  * 22163 bsc#1061241 CVE-2017-14974
  * 22170 bsc#1060621 CVE-2017-14729

Update to binutils 2.29. [fate#321454, fate#321494, fate#323293]:

  * The MIPS port now supports microMIPS eXtended Physical Addressing (XPA)
    instructions for assembly and disassembly.
  * The MIPS port now supports the microMIPS Release 5 ISA for assembly and
    disassembly.
  * The MIPS port now supports the Imagination interAptiv MR2 processor,
    which implements the MIPS32r3 ISA, the MIPS16e2 ASE as well as a couple
    of implementation-specific regular MIPS and MIPS16e2 ASE instructions.
  * The SPARC port now supports the SPARC M8 processor, which implements the
    Oracle SPARC Architecture 2017.
  * The MIPS port now supports the MIPS16e2 ASE for assembly and disassembly.
  * Add support for ELF SHF_GNU_MBIND and PT_GNU_MBIND_XXX.
  * Add support for the wasm32 ELF conversion of the WebAssembly file format.
  * Add --inlines option to objdump, which extends the --line-numbers option
    so that inlined functions will display their nesting information.
  * Add --merge-notes options to objcopy to reduce the size of notes in
    a binary file by merging and deleting redundant notes.
  * Add support for locating separate debug info files using the build-id
    method, where the separate file has a name based upon the build-id of
    the original file.

- GAS specific:

  * Add support for ELF SHF_GNU_MBIND.
  * Add support for the WebAssembly file format and wasm32 ELF conversion.
  * PowerPC gas now checks that the correct register class is used in
    instructions.  For instance, 'addi %f4,%cr3,%r31' warns three times
    that the registers are invalid.
  * Add support for the Texas Instruments PRU processor.
  * Support for the ARMv8-R architecture and Cortex-R52 processor has been
    added to the ARM port.

- GNU ld specific:

  * Support for -z shstk in the x86 ELF linker to generate
    GNU_PROPERTY_X86_FEATURE_1_SHSTK in ELF GNU program properties.
  * Add support for GNU_PROPERTY_X86_FEATURE_1_SHSTK in ELF GNU program
    properties in the x86 ELF linker.
  * Add support for GNU_PROPERTY_X86_FEATURE_1_IBT in ELF GNU program
    properties in the x86 ELF linker.
  * Support for -z ibtplt in the x86 ELF linker to generate IBT-enabled
    PLT.
  * Support for -z ibt in the x86 ELF linker to generate IBT-enabled
    PLT as well as GNU_PROPERTY_X86_FEATURE_1_IBT in ELF GNU program
    properties.
  * Add support for ELF SHF_GNU_MBIND and PT_GNU_MBIND_XXX.
  * Add support for ELF GNU program properties.
  * Add support for the Texas Instruments PRU processor.
  * When configuring for arc*-*-linux* targets the default linker emulation will
    change if --with-cpu=nps400 is used at configure time.
  * Improve assignment of LMAs to orphan sections in some edge cases where a
    mixture of both AT&gt;LMA_REGION and AT(LMA) are used.
  * Orphan sections placed after an empty section that has an AT(LMA) will now
    take an load memory address starting from LMA.
  * Section groups can now be resolved (the group deleted and the group members
    placed like normal sections) at partial link time either using the new
    linker option --force-group-allocation or by placing FORCE_GROUP_ALLOCATION
    into the linker script.

- Add riscv64 target, tested with gcc7 and downstream newlib 2.4.0
- Prepare riscv32 target (gh#riscv/riscv-newlib#8)
- Make compressed debug section handling explicit, disable for
  old products and enable for gas on all architectures otherwise. [bsc#1029995]
- Remove empty rpath component removal optimization from to workaround
  CMake rpath handling.  [bsc#1025282]


  Minor security bugs fixed:
  PR 21147, PR 21148, PR 21149, PR 21150, PR 21151, PR 21155, PR 21158, PR 21159

- Update to binutils 2.28.

  * Add support for locating separate debug info files using the build-id
    method, where the separate file has a name based upon the build-id of
    the original file.
  * This version of binutils fixes a problem with PowerPC VLE 16A and 16D
    relocations which were functionally swapped, for example,
    R_PPC_VLE_HA16A performed like R_PPC_VLE_HA16D while R_PPC_VLE_HA16D
    performed like R_PPC_VLE_HA16A.  This could have been fixed by
    renumbering relocations, which would keep object files created by an
    older version of gas compatible with a newer ld.  However, that would
    require an ABI update, affecting other assemblers and linkers that
    create and process the relocations correctly.  It is recommended that
    all VLE object files be recompiled, but ld can modify the relocations
    if --vle-reloc-fixup is passed to ld.  If the new ld command line
    option is not used, ld will ld warn on finding relocations inconsistent
    with the instructions being relocated.
  * The nm program has a new command line option (--with-version-strings)
    which will display a symbol's version information, if any, after the
    symbol's name.
  * The ARC port of objdump now accepts a -M option to specify the extra
    instruction class(es) that should be disassembled.
  * The --remove-section option for objcopy and strip now accepts section
    patterns starting with an exclamation point to indicate a non-matching
    section.  A non-matching section is removed from the set of sections
    matched by an earlier --remove-section pattern.
  * The --only-section option for objcopy now accepts section patterns
    starting with an exclamation point to indicate a non-matching section.
    A non-matching section is removed from the set of sections matched by
    an earlier --only-section pattern.
  * New --remove-relocations=SECTIONPATTERN option for objcopy and strip.
    This option can be used to remove sections containing relocations.
    The SECTIONPATTERN is the section to which the relocations apply, not
    the relocation section itself.

- GAS specific:

  * Add support for the RISC-V architecture.
  * Add support for the ARM Cortex-M23 and Cortex-M33 processors.

- GNU ld specific:

  * The EXCLUDE_FILE linker script construct can now be applied outside of the
    section list in order for the exclusions to apply over all input sections
    in the list.
  * Add support for the RISC-V architecture.
  * The command line option --no-eh-frame-hdr can now be used in ELF based
    linkers to disable the automatic generation of .eh_frame_hdr sections.
  * Add --in-implib=&lt;infile&gt; to the ARM linker to enable specifying a set of
    Secure Gateway veneers that must exist in the output import library
    specified by --out-implib=&lt;outfile&gt; and the address they must have.
    As such, --in-implib is only supported in combination with --cmse-implib.
  * Extended the --out-implib=&lt;file&gt; option, previously restricted to x86 PE
    targets, to any ELF based target.  This allows the generation of an import
    library for an ELF executable, which can then be used by another application
    to link against the executable.

- GOLD specific:

  * Add -z bndplt option (x86-64 only) to support Intel MPX.
  * Add --orphan-handling option.
  * Add --stub-group-multi option (PowerPC only).
  * Add --target1-rel, --target1-abs, --target2 options (Arm only).
  * Add -z stack-size option.
  * Add --be8 option (Arm only).
  * Add HIDDEN support in linker scripts.
  * Add SORT_BY_INIT_PRIORITY support in linker scripts.

- Other fixes:

  * Fix section alignment on .gnu_debuglink. [bso#21193]
  * Add s390x to gold_archs.
  * Fix alignment frags for aarch64 (bsc#1003846)
  * Call ldconfig for libbfd
  * Fix an assembler problem with clang on ARM.
  * Restore monotonically increasing section offsets.


- Update to binutils 2.27.

  * Add a configure option, --enable-64-bit-archive, to force use of a
    64-bit format when creating an archive symbol index.
  * Add --elf-stt-common= option to objcopy for ELF targets to control
    whether to convert common symbols to the STT_COMMON type.

- GAS specific:

  * Default to --enable-compressed-debug-sections=gas for Linux/x86 targets.
  * Add --no-pad-sections to stop the assembler from padding the end of output
    sections up to their alignment boundary.
  * Support for the ARMv8-M architecture has been added to the ARM port.
    Support for the ARMv8-M Security and DSP Extensions has also been added
    to the ARM port.
  * ARC backend accepts .extInstruction, .extCondCode, .extAuxRegister, and
    .extCoreRegister pseudo-ops that allow an user to define custom
    instructions, conditional codes, auxiliary and core registers.
  * Add a configure option --enable-elf-stt-common to decide whether ELF
    assembler should generate common symbols with the STT_COMMON type by
    default.  Default to no.
  * New command line option --elf-stt-common= for ELF targets to control
    whether to generate common symbols with the STT_COMMON type.
  * Add ability to set section flags and types via numeric values for ELF
    based targets.
  * Add a configure option --enable-x86-relax-relocations to decide whether
    x86 assembler should generate relax relocations by default.  Default to
    yes, except for x86 Solaris targets older than Solaris 12.
  * New command line option -mrelax-relocations= for x86 target to control
    whether to generate relax relocations.
  * New command line option -mfence-as-lock-add=yes for x86 target to encode
    lfence, mfence and sfence as 'lock addl $0x0, (%[re]sp)'.
  * Add assembly-time relaxation option for ARC cpus.
  * Add --with-cpu=TYPE configure option for ARC gas.  This allows the default
    cpu type to be adjusted at configure time.

- GOLD specific:

  * Add a configure option --enable-relro to decide whether -z relro should
    be enabled by default.  Default to yes.
  * Add support for s390, MIPS, AArch64, and TILE-Gx architectures.
  * Add support for STT_GNU_IFUNC symbols.
  * Add support for incremental linking (--incremental).

- GNU ld specific:

  * Add a configure option --enable-relro to decide whether -z relro should
    be enabled in ELF linker by default.  Default to yes for all Linux
    targets except FRV, HPPA, IA64 and MIPS.
  * Support for -z noreloc-overflow in the x86-64 ELF linker to disable
    relocation overflow check.
  * Add -z common/-z nocommon options for ELF targets to control whether to
    convert common symbols to the STT_COMMON type during a relocatable link.
  * Support for -z nodynamic-undefined-weak in the x86 ELF linker, which
    avoids dynamic relocations against undefined weak symbols in executable.
  * The NOCROSSREFSTO command was added to the linker script language.
  * Add --no-apply-dynamic-relocs to the AArch64 linker to do not apply
    link-time values for dynamic relocations.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-30"/>
	<updated date="2017-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003846">SUSE bug 1003846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025282">SUSE bug 1025282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029907">SUSE bug 1029907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029908">SUSE bug 1029908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029909">SUSE bug 1029909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029995">SUSE bug 1029995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030297">SUSE bug 1030297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030298">SUSE bug 1030298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030583">SUSE bug 1030583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030584">SUSE bug 1030584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030585">SUSE bug 1030585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030588">SUSE bug 1030588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030589">SUSE bug 1030589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031590">SUSE bug 1031590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031593">SUSE bug 1031593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031595">SUSE bug 1031595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031638">SUSE bug 1031638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031644">SUSE bug 1031644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031656">SUSE bug 1031656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033122">SUSE bug 1033122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037052">SUSE bug 1037052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037057">SUSE bug 1037057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037061">SUSE bug 1037061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037062">SUSE bug 1037062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037066">SUSE bug 1037066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037070">SUSE bug 1037070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037072">SUSE bug 1037072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037273">SUSE bug 1037273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038874">SUSE bug 1038874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038875">SUSE bug 1038875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038876">SUSE bug 1038876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038877">SUSE bug 1038877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038878">SUSE bug 1038878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038880">SUSE bug 1038880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038881">SUSE bug 1038881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044891">SUSE bug 1044891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044897">SUSE bug 1044897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044901">SUSE bug 1044901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044909">SUSE bug 1044909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044925">SUSE bug 1044925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044927">SUSE bug 1044927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046094">SUSE bug 1046094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052061">SUSE bug 1052061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052496">SUSE bug 1052496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052503">SUSE bug 1052503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052507">SUSE bug 1052507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052509">SUSE bug 1052509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052511">SUSE bug 1052511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052514">SUSE bug 1052514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052518">SUSE bug 1052518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053347">SUSE bug 1053347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056312">SUSE bug 1056312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056437">SUSE bug 1056437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057139">SUSE bug 1057139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057144">SUSE bug 1057144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057149">SUSE bug 1057149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058480">SUSE bug 1058480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059050">SUSE bug 1059050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060599">SUSE bug 1060599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060621">SUSE bug 1060621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061241">SUSE bug 1061241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/437293">SUSE bug 437293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/445037">SUSE bug 445037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/546106">SUSE bug 546106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/561142">SUSE bug 561142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/578249">SUSE bug 578249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590820">SUSE bug 590820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691290">SUSE bug 691290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698346">SUSE bug 698346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/713504">SUSE bug 713504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776968">SUSE bug 776968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863764">SUSE bug 863764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938658">SUSE bug 938658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970239">SUSE bug 970239</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9939/">CVE-2014-9939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9939">CVE-2014-9939 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12448/">CVE-2017-12448 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12448">CVE-2017-12448 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12450/">CVE-2017-12450 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12450">CVE-2017-12450 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12452/">CVE-2017-12452 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12452">CVE-2017-12452 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12453/">CVE-2017-12453 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12453">CVE-2017-12453 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12454/">CVE-2017-12454 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12454">CVE-2017-12454 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12456/">CVE-2017-12456 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12456">CVE-2017-12456 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12799/">CVE-2017-12799 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12799">CVE-2017-12799 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13757/">CVE-2017-13757 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13757">CVE-2017-13757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14128/">CVE-2017-14128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14128">CVE-2017-14128 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14129/">CVE-2017-14129 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14129">CVE-2017-14129 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14130/">CVE-2017-14130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14130">CVE-2017-14130 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14333/">CVE-2017-14333 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14333">CVE-2017-14333 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14529/">CVE-2017-14529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14529">CVE-2017-14529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14729/">CVE-2017-14729 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14729">CVE-2017-14729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14745/">CVE-2017-14745 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14745">CVE-2017-14745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14974/">CVE-2017-14974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14974">CVE-2017-14974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6965/">CVE-2017-6965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6965">CVE-2017-6965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6966/">CVE-2017-6966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6966">CVE-2017-6966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6969/">CVE-2017-6969 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6969">CVE-2017-6969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7209/">CVE-2017-7209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7209">CVE-2017-7209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7210/">CVE-2017-7210 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7210">CVE-2017-7210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7223/">CVE-2017-7223 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7223">CVE-2017-7223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7224/">CVE-2017-7224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7224">CVE-2017-7224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7225/">CVE-2017-7225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7225">CVE-2017-7225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7226/">CVE-2017-7226 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7226">CVE-2017-7226 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7227/">CVE-2017-7227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7227">CVE-2017-7227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7299/">CVE-2017-7299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7299">CVE-2017-7299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7300/">CVE-2017-7300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7300">CVE-2017-7300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7301/">CVE-2017-7301 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7301">CVE-2017-7301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7302/">CVE-2017-7302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7302">CVE-2017-7302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7303/">CVE-2017-7303 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7303">CVE-2017-7303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7304/">CVE-2017-7304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7304">CVE-2017-7304 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7614/">CVE-2017-7614 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7614">CVE-2017-7614 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8392/">CVE-2017-8392 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8392">CVE-2017-8392 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8393/">CVE-2017-8393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8393">CVE-2017-8393 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8394/">CVE-2017-8394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8394">CVE-2017-8394 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8395/">CVE-2017-8395 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8395">CVE-2017-8395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8396/">CVE-2017-8396 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8396">CVE-2017-8396 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8397/">CVE-2017-8397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8397">CVE-2017-8397 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8398/">CVE-2017-8398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8398">CVE-2017-8398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8421/">CVE-2017-8421 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8421">CVE-2017-8421 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9038/">CVE-2017-9038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9038">CVE-2017-9038 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9039/">CVE-2017-9039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9039">CVE-2017-9039 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9040/">CVE-2017-9040 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9040">CVE-2017-9040 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9041/">CVE-2017-9041 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9041">CVE-2017-9041 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9042/">CVE-2017-9042 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9042">CVE-2017-9042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9043/">CVE-2017-9043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9043">CVE-2017-9043 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9044/">CVE-2017-9044 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9044">CVE-2017-9044 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9746/">CVE-2017-9746 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9746">CVE-2017-9746 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9747/">CVE-2017-9747 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9747">CVE-2017-9747 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9748/">CVE-2017-9748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9748">CVE-2017-9748 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9750/">CVE-2017-9750 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9750">CVE-2017-9750 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9755/">CVE-2017-9755 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9755">CVE-2017-9755 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9756/">CVE-2017-9756 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9756">CVE-2017-9756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9954/">CVE-2017-9954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9954">CVE-2017-9954 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9955/">CVE-2017-9955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9955">CVE-2017-9955 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149434" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1068101" ref_url="https://bugzilla.suse.com/1068101" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003471.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox ESR 52.5 fixes the following issues:

Security issues fixed:
- CVE-2017-7826: Memory safety bugs fixed (bsc#1068101).
- CVE-2017-7828: Use-after-free of PressShell while restyling layout (bsc#1068101).
- CVE-2017-7830: Cross-origin URL information leak through Resource Timing API (bsc#1068101).

Mozilla Foundation Security Advisory (MFSA 2017-25):
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-25/
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-05"/>
	<updated date="2017-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7826">CVE-2017-7826 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7828">CVE-2017-7828 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7830">CVE-2017-7830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549904" comment="MozillaFirefox-52.5.0esr-109.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549905" comment="MozillaFirefox-translations-52.5.0esr-109.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149435" version="1" class="patch">
	<metadata>
		<title>Security update for libXcursor (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1065386" ref_url="https://bugzilla.suse.com/1065386" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16612" ref_url="https://www.suse.com/security/cve/CVE-2017-16612/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003472.html" source="SUSE-SU"/>
		<description>
This update for libXcursor fixes the following issues:

Security issue fixed:

- CVE-2017-16612: Fix integeroverflow while parsing images and a signedness issue while parsing comments (bsc#1065386).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-05"/>
	<updated date="2017-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1065386">SUSE bug 1065386</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16612/">CVE-2017-16612 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16612">CVE-2017-16612 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549908" comment="libXcursor1-1.1.14-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549909" comment="libXcursor1-32bit-1.1.14-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149436" version="1" class="patch">
	<metadata>
		<title>Security update for shibboleth-sp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1068689" ref_url="https://bugzilla.suse.com/1068689" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16852" ref_url="https://www.suse.com/security/cve/CVE-2017-16852/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003473.html" source="SUSE-SU"/>
		<description>
This update for shibboleth-sp fixes the following issues:

Security issue fixed:

- CVE-2017-16852: Fix critical security checks in the Dynamic MetadataProvider plugin in Shibboleth Service (bsc#1068689).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-05"/>
	<updated date="2017-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068689">SUSE bug 1068689</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-16852/">CVE-2017-16852 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16852">CVE-2017-16852 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549910" comment="libshibsp-lite6-2.5.5-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549911" comment="libshibsp6-2.5.5-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549912" comment="shibboleth-sp-2.5.5-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149437" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1069496" ref_url="https://bugzilla.suse.com/1069496" source="BUGZILLA"/>
		<reference ref_id="1069702" ref_url="https://bugzilla.suse.com/1069702" source="BUGZILLA"/>
		<reference ref_id="1070805" ref_url="https://bugzilla.suse.com/1070805" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000405" ref_url="https://www.suse.com/security/cve/CVE-2017-1000405/" source="CVE"/>
		<reference ref_id="CVE-2017-16939" ref_url="https://www.suse.com/security/cve/CVE-2017-16939/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003474.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-1000405: A bug in the THP CoW support could be used by local attackers to corrupt memory of other processes and cause them to crash (bnc#1069496).
- CVE-2017-16939: The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages (bnc#1069702).

The following non-security bugs were fixed:

Fix a build issue on ppc64le systems (bsc#1070805)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-06"/>
	<updated date="2017-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1069496">SUSE bug 1069496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069702">SUSE bug 1069702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070805">SUSE bug 1070805</bugzilla>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000405/">CVE-2017-1000405 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000405">CVE-2017-1000405 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16939/">CVE-2017-16939 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16939">CVE-2017-16939 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552755" comment="kernel-default-4.4.92-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552756" comment="kernel-default-base-4.4.92-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552757" comment="kernel-default-devel-4.4.92-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552758" comment="kernel-default-man-4.4.92-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519633" comment="kernel-devel-4.4.92-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519634" comment="kernel-macros-4.4.92-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519635" comment="kernel-source-4.4.92-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552759" comment="kernel-syms-4.4.92-6.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149438" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1006166" ref_url="https://bugzilla.suse.com/1006166" source="BUGZILLA"/>
		<reference ref_id="1048367" ref_url="https://bugzilla.suse.com/1048367" source="BUGZILLA"/>
		<reference ref_id="1065000" ref_url="https://bugzilla.suse.com/1065000" source="BUGZILLA"/>
		<reference ref_id="1068310" ref_url="https://bugzilla.suse.com/1068310" source="BUGZILLA"/>
		<reference ref_id="1069509" ref_url="https://bugzilla.suse.com/1069509" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<reference ref_id="CVE-2017-15906" ref_url="https://www.suse.com/security/cve/CVE-2017-15906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003476.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security issue fixed:

- CVE-2017-15906: Stricter checking of operations in read-only mode in sftp server (bsc#1065000).

Bug fixes:

- FIPS: Startup selfchecks (bsc#1068310).
- FIPS: Silent complaints about unsupported key exchange methods (bsc#1006166).
- Refine handling of sockets for X11 forwarding to remove reintroduced CVE-2008-1483 (bsc#1069509).
- Test configuration before running daemon to prevent looping resulting in service shutdown (bsc#1048367)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1006166">SUSE bug 1006166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048367">SUSE bug 1048367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065000">SUSE bug 1065000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068310">SUSE bug 1068310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069509">SUSE bug 1069509</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1483">CVE-2008-1483 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15906/">CVE-2017-15906 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15906">CVE-2017-15906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549918" comment="openssh-7.2p2-74.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549919" comment="openssh-askpass-gnome-7.2p2-74.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549920" comment="openssh-fips-7.2p2-74.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549921" comment="openssh-helpers-7.2p2-74.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149439" version="1" class="patch">
	<metadata>
		<title>Security update for opensaml (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1068685" ref_url="https://bugzilla.suse.com/1068685" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16853" ref_url="https://www.suse.com/security/cve/CVE-2017-16853/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003480.html" source="SUSE-SU"/>
		<description>
This update for opensaml fixes the following issues:

Security issue fixed:

- CVE-2017-16853: Fix the DynamicMetadataProvider class to properly configure itself with the MetadataFilter plugins, to avoid possible MITM attacks (bsc#1068685).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068685">SUSE bug 1068685</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-16853/">CVE-2017-16853 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16853">CVE-2017-16853 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549922" comment="libsaml8-2.5.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549923" comment="opensaml-bin-2.5.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549924" comment="opensaml-schemas-2.5.5-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149440" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1054094" ref_url="https://bugzilla.suse.com/1054094" source="BUGZILLA"/>
		<reference ref_id="1057357" ref_url="https://bugzilla.suse.com/1057357" source="BUGZILLA"/>
		<reference ref_id="1061310" ref_url="https://bugzilla.suse.com/1061310" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14970" ref_url="https://www.suse.com/security/cve/CVE-2017-14970/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003478.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:

Security issue fixed:

- CVE-2017-14970: Add upstream patches to fix memory leaks (bsc#1061310).

Bug fixes:

- Fix rpmlint warnings (bsc#1057357).
- Add missing post/postun scriptlets for the ovn-common sub-package (bsc#1054094).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054094">SUSE bug 1054094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057357">SUSE bug 1057357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061310">SUSE bug 1061310</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14970/">CVE-2017-14970 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14970">CVE-2017-14970 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552760" comment="openvswitch-2.7.0-3.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149441" version="1" class="patch">
	<metadata>
		<title>Security update for libapr-util1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1064990" ref_url="https://bugzilla.suse.com/1064990" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12618" ref_url="https://www.suse.com/security/cve/CVE-2017-12618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003492.html" source="SUSE-SU"/>
		<description>
This update for libapr-util1 fixes the following issues:

Security issue fixed:

- CVE-2017-12618: DoS via crafted SDBM database files in apr_sdbm*() functions (bsc#1064990)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-13"/>
	<updated date="2017-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064990">SUSE bug 1064990</bugzilla>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12618/">CVE-2017-12618 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12618">CVE-2017-12618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009541094" comment="libapr-util1-1.5.3-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549925" comment="libapr-util1-dbd-sqlite3-1.5.3-2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149442" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1071905" ref_url="https://bugzilla.suse.com/1071905" source="BUGZILLA"/>
		<reference ref_id="1071906" ref_url="https://bugzilla.suse.com/1071906" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3737" ref_url="https://www.suse.com/security/cve/CVE-2017-3737/" source="CVE"/>
		<reference ref_id="CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003538.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- OpenSSL Security Advisory [07 Dec 2017]
  * CVE-2017-3737: OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an \'error state\' mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected. (bsc#1071905)
  * CVE-2017-3738: There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. (bsc#1071906)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-16"/>
	<updated date="2017-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071905">SUSE bug 1071905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071906">SUSE bug 1071906</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3737/">CVE-2017-3737 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3737">CVE-2017-3737 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3738">CVE-2017-3738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009541101" comment="libopenssl-devel-1.0.2j-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549931" comment="libopenssl1_0_0-1.0.2j-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549932" comment="libopenssl1_0_0-32bit-1.0.2j-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549933" comment="libopenssl1_0_0-hmac-1.0.2j-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549934" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549935" comment="openssl-1.0.2j-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532667" comment="openssl-doc-1.0.2j-60.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149443" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1048457" ref_url="https://bugzilla.suse.com/1048457" source="BUGZILLA"/>
		<reference ref_id="1049796" ref_url="https://bugzilla.suse.com/1049796" source="BUGZILLA"/>
		<reference ref_id="1050083" ref_url="https://bugzilla.suse.com/1050083" source="BUGZILLA"/>
		<reference ref_id="1050116" ref_url="https://bugzilla.suse.com/1050116" source="BUGZILLA"/>
		<reference ref_id="1050139" ref_url="https://bugzilla.suse.com/1050139" source="BUGZILLA"/>
		<reference ref_id="1050632" ref_url="https://bugzilla.suse.com/1050632" source="BUGZILLA"/>
		<reference ref_id="1051441" ref_url="https://bugzilla.suse.com/1051441" source="BUGZILLA"/>
		<reference ref_id="1051847" ref_url="https://bugzilla.suse.com/1051847" source="BUGZILLA"/>
		<reference ref_id="1052450" ref_url="https://bugzilla.suse.com/1052450" source="BUGZILLA"/>
		<reference ref_id="1052553" ref_url="https://bugzilla.suse.com/1052553" source="BUGZILLA"/>
		<reference ref_id="1052689" ref_url="https://bugzilla.suse.com/1052689" source="BUGZILLA"/>
		<reference ref_id="1052744" ref_url="https://bugzilla.suse.com/1052744" source="BUGZILLA"/>
		<reference ref_id="1052758" ref_url="https://bugzilla.suse.com/1052758" source="BUGZILLA"/>
		<reference ref_id="1052764" ref_url="https://bugzilla.suse.com/1052764" source="BUGZILLA"/>
		<reference ref_id="1054757" ref_url="https://bugzilla.suse.com/1054757" source="BUGZILLA"/>
		<reference ref_id="1055214" ref_url="https://bugzilla.suse.com/1055214" source="BUGZILLA"/>
		<reference ref_id="1056432" ref_url="https://bugzilla.suse.com/1056432" source="BUGZILLA"/>
		<reference ref_id="1057157" ref_url="https://bugzilla.suse.com/1057157" source="BUGZILLA"/>
		<reference ref_id="1057719" ref_url="https://bugzilla.suse.com/1057719" source="BUGZILLA"/>
		<reference ref_id="1057729" ref_url="https://bugzilla.suse.com/1057729" source="BUGZILLA"/>
		<reference ref_id="1057730" ref_url="https://bugzilla.suse.com/1057730" source="BUGZILLA"/>
		<reference ref_id="1058485" ref_url="https://bugzilla.suse.com/1058485" source="BUGZILLA"/>
		<reference ref_id="1058637" ref_url="https://bugzilla.suse.com/1058637" source="BUGZILLA"/>
		<reference ref_id="1059666" ref_url="https://bugzilla.suse.com/1059666" source="BUGZILLA"/>
		<reference ref_id="1059778" ref_url="https://bugzilla.suse.com/1059778" source="BUGZILLA"/>
		<reference ref_id="1060176" ref_url="https://bugzilla.suse.com/1060176" source="BUGZILLA"/>
		<reference ref_id="1060577" ref_url="https://bugzilla.suse.com/1060577" source="BUGZILLA"/>
		<reference ref_id="1061254" ref_url="https://bugzilla.suse.com/1061254" source="BUGZILLA"/>
		<reference ref_id="1062750" ref_url="https://bugzilla.suse.com/1062750" source="BUGZILLA"/>
		<reference ref_id="1066003" ref_url="https://bugzilla.suse.com/1066003" source="BUGZILLA"/>
		<reference ref_id="1067181" ref_url="https://bugzilla.suse.com/1067181" source="BUGZILLA"/>
		<reference ref_id="1067184" ref_url="https://bugzilla.suse.com/1067184" source="BUGZILLA"/>
		<reference ref_id="1067409" ref_url="https://bugzilla.suse.com/1067409" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11188" ref_url="https://www.suse.com/security/cve/CVE-2017-11188/" source="CVE"/>
		<reference ref_id="CVE-2017-11478" ref_url="https://www.suse.com/security/cve/CVE-2017-11478/" source="CVE"/>
		<reference ref_id="CVE-2017-11523" ref_url="https://www.suse.com/security/cve/CVE-2017-11523/" source="CVE"/>
		<reference ref_id="CVE-2017-11527" ref_url="https://www.suse.com/security/cve/CVE-2017-11527/" source="CVE"/>
		<reference ref_id="CVE-2017-11535" ref_url="https://www.suse.com/security/cve/CVE-2017-11535/" source="CVE"/>
		<reference ref_id="CVE-2017-11640" ref_url="https://www.suse.com/security/cve/CVE-2017-11640/" source="CVE"/>
		<reference ref_id="CVE-2017-11752" ref_url="https://www.suse.com/security/cve/CVE-2017-11752/" source="CVE"/>
		<reference ref_id="CVE-2017-12140" ref_url="https://www.suse.com/security/cve/CVE-2017-12140/" source="CVE"/>
		<reference ref_id="CVE-2017-12435" ref_url="https://www.suse.com/security/cve/CVE-2017-12435/" source="CVE"/>
		<reference ref_id="CVE-2017-12587" ref_url="https://www.suse.com/security/cve/CVE-2017-12587/" source="CVE"/>
		<reference ref_id="CVE-2017-12644" ref_url="https://www.suse.com/security/cve/CVE-2017-12644/" source="CVE"/>
		<reference ref_id="CVE-2017-12662" ref_url="https://www.suse.com/security/cve/CVE-2017-12662/" source="CVE"/>
		<reference ref_id="CVE-2017-12669" ref_url="https://www.suse.com/security/cve/CVE-2017-12669/" source="CVE"/>
		<reference ref_id="CVE-2017-12983" ref_url="https://www.suse.com/security/cve/CVE-2017-12983/" source="CVE"/>
		<reference ref_id="CVE-2017-13134" ref_url="https://www.suse.com/security/cve/CVE-2017-13134/" source="CVE"/>
		<reference ref_id="CVE-2017-13769" ref_url="https://www.suse.com/security/cve/CVE-2017-13769/" source="CVE"/>
		<reference ref_id="CVE-2017-14138" ref_url="https://www.suse.com/security/cve/CVE-2017-14138/" source="CVE"/>
		<reference ref_id="CVE-2017-14172" ref_url="https://www.suse.com/security/cve/CVE-2017-14172/" source="CVE"/>
		<reference ref_id="CVE-2017-14173" ref_url="https://www.suse.com/security/cve/CVE-2017-14173/" source="CVE"/>
		<reference ref_id="CVE-2017-14175" ref_url="https://www.suse.com/security/cve/CVE-2017-14175/" source="CVE"/>
		<reference ref_id="CVE-2017-14341" ref_url="https://www.suse.com/security/cve/CVE-2017-14341/" source="CVE"/>
		<reference ref_id="CVE-2017-14342" ref_url="https://www.suse.com/security/cve/CVE-2017-14342/" source="CVE"/>
		<reference ref_id="CVE-2017-14531" ref_url="https://www.suse.com/security/cve/CVE-2017-14531/" source="CVE"/>
		<reference ref_id="CVE-2017-14607" ref_url="https://www.suse.com/security/cve/CVE-2017-14607/" source="CVE"/>
		<reference ref_id="CVE-2017-14682" ref_url="https://www.suse.com/security/cve/CVE-2017-14682/" source="CVE"/>
		<reference ref_id="CVE-2017-14733" ref_url="https://www.suse.com/security/cve/CVE-2017-14733/" source="CVE"/>
		<reference ref_id="CVE-2017-14989" ref_url="https://www.suse.com/security/cve/CVE-2017-14989/" source="CVE"/>
		<reference ref_id="CVE-2017-15217" ref_url="https://www.suse.com/security/cve/CVE-2017-15217/" source="CVE"/>
		<reference ref_id="CVE-2017-15930" ref_url="https://www.suse.com/security/cve/CVE-2017-15930/" source="CVE"/>
		<reference ref_id="CVE-2017-16545" ref_url="https://www.suse.com/security/cve/CVE-2017-16545/" source="CVE"/>
		<reference ref_id="CVE-2017-16546" ref_url="https://www.suse.com/security/cve/CVE-2017-16546/" source="CVE"/>
		<reference ref_id="CVE-2017-16669" ref_url="https://www.suse.com/security/cve/CVE-2017-16669/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003544.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

  * CVE-2017-14989: use-after-free in RenderFreetype in MagickCore/annotate.c could lead to denial of service [bsc#1061254]
  * CVE-2017-14682: GetNextToken in MagickCore/token.c heap buffer overflow could lead to denial of service [bsc#1060176]
  * Memory leak in WriteINLINEImage in coders/inline.c could lead to denial of service [bsc#1052744]
  * CVE-2017-14607: out of bounds read flaw related to ReadTIFFImagehas  could possibly disclose potentially sensitive memory [bsc#1059778]
  * CVE-2017-11640: NULL pointer deref in WritePTIFImage() in coders/tiff.c [bsc#1050632]
  * CVE-2017-14342: a memory exhaustion vulnerability in ReadWPGImage in coders/wpg.c could lead to denial of service [bsc#1058485]
  * CVE-2017-14341: Infinite loop in the ReadWPGImage function [bsc#1058637]
  * CVE-2017-16546: problem in the function ReadWPGImage in coders/wpg.c could lead to denial of service [bsc#1067181]
  * CVE-2017-16545: The ReadWPGImage function in coders/wpg.c in  validation problems could lead to denial of service [bsc#1067184]
  * CVE-2017-16669: problem in coders/wpg.c could allow remote attackers to cause a denial of service via crafted file [bsc#1067409]
  * CVE-2017-14175: Lack of End of File check could lead to denial of service [bsc#1057719]
  * CVE-2017-14138: memory leak vulnerability in ReadWEBPImage in coders/webp.c could lead to denial of service [bsc#1057157]
  * CVE-2017-13769: denial of service issue in function WriteTHUMBNAILImage in coders/thumbnail.c [bsc#1056432]
  * CVE-2017-13134: a heap-based buffer over-read was found in thefunction SFWScan in coders/sfw.c, which allows attackers to cause adenial of service via a crafted file. [bsc#1055214]
  * CVE-2017-15217: memory leak in ReadSGIImage in coders/sgi.c [bsc#1062750]
  * CVE-2017-11478: ReadOneDJVUImage in coders/djvu.c in ImageMagick allows remote attackers to cause a DoS [bsc#1049796]
  * CVE-2017-15930: Null Pointer dereference  while transfering JPEG scanlines could lead to denial of service [bsc#1066003]
  * CVE-2017-12983: Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c inImageMagick 7.0.6-8 allows remote attackers to cause a denial of service [bsc#1054757]
  * CVE-2017-14531: memory exhaustion issue in ReadSUNImage incoders/sun.c. [bsc#1059666]
  * CVE-2017-12435: Memory exhaustion in ReadSUNImage in coders/sun.c, which allows attackers to cause denial of service [bsc#1052553]
  * CVE-2017-12587: User controlable large loop in the ReadPWPImage in coders\pwp.c could lead to denial of service [bsc#1052450]
  * CVE-2017-11523: ReadTXTImage in coders/txt.c allows remote attackers to cause a denial of service [bsc#1050083]
  * CVE-2017-14173: unction ReadTXTImage is vulnerable to a integer overflow that could lead to denial of service [bsc#1057729]
  * CVE-2017-11188: ImageMagick: The ReadDPXImage function in codersdpx.c in ImageMagick 7.0.6-0 has a largeloop vulnerability that can cause CPU exhaustion via a crafted DPX file, relatedto lack of an EOF check. [bnc#1048457]
  * CVE-2017-11527: ImageMagick: ReadDPXImage in coders/dpx.c allows remote attackers to cause DoS [bnc#1050116] 
  * CVE-2017-11535: GraphicsMagick, ImageMagick: Heap-based buffer over-read in WritePSImage() in coders/ps.c [bnc#1050139]
  * CVE-2017-11752: ImageMagick: ReadMAGICKImage in coders/magick.c allows to cause DoS  [bnc#1051441] 
  * CVE-2017-12140: ImageMagick: ReadDCMImage in codersdcm.c has a ninteger signedness error leading to excessive memory consumption [bnc#1051847] 
  * CVE-2017-12669: ImageMagick: Memory leak in WriteCALSImage in coders/cals.c [bnc#1052689]
  * CVE-2017-12662: GraphicsMagick, ImageMagick: Memory leak in WritePDFImage in coders/pdf.c [bnc#1052758]
  * CVE-2017-12644: ImageMagick: Memory leak in ReadDCMImage in codersdcm.c [bnc#1052764]
  * CVE-2017-14172: ImageMagick: Lack of end of file check in ReadPSImage() could lead to a denial of service [bnc#1057730]
  * CVE-2017-14733: GraphicsMagick: Heap overflow on ReadRLEImage in coders/rle.c could lead to denial of service [bnc#1060577]

		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-20"/>
	<updated date="2017-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1048457">SUSE bug 1048457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049796">SUSE bug 1049796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050083">SUSE bug 1050083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050116">SUSE bug 1050116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050139">SUSE bug 1050139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050632">SUSE bug 1050632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051441">SUSE bug 1051441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051847">SUSE bug 1051847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052450">SUSE bug 1052450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052553">SUSE bug 1052553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052689">SUSE bug 1052689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052744">SUSE bug 1052744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052758">SUSE bug 1052758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052764">SUSE bug 1052764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054757">SUSE bug 1054757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055214">SUSE bug 1055214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056432">SUSE bug 1056432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057157">SUSE bug 1057157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057719">SUSE bug 1057719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057729">SUSE bug 1057729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057730">SUSE bug 1057730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058485">SUSE bug 1058485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058637">SUSE bug 1058637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059666">SUSE bug 1059666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059778">SUSE bug 1059778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060176">SUSE bug 1060176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060577">SUSE bug 1060577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061254">SUSE bug 1061254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062750">SUSE bug 1062750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066003">SUSE bug 1066003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067181">SUSE bug 1067181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067184">SUSE bug 1067184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067409">SUSE bug 1067409</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11188/">CVE-2017-11188 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11188">CVE-2017-11188 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11478/">CVE-2017-11478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11478">CVE-2017-11478 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11523/">CVE-2017-11523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11523">CVE-2017-11523 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11527/">CVE-2017-11527 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11527">CVE-2017-11527 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11535/">CVE-2017-11535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11535">CVE-2017-11535 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11640/">CVE-2017-11640 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11640">CVE-2017-11640 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11752/">CVE-2017-11752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11752">CVE-2017-11752 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12140/">CVE-2017-12140 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12140">CVE-2017-12140 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12435/">CVE-2017-12435 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12435">CVE-2017-12435 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12587/">CVE-2017-12587 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12587">CVE-2017-12587 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12644/">CVE-2017-12644 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12644">CVE-2017-12644 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12662/">CVE-2017-12662 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12662">CVE-2017-12662 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12669/">CVE-2017-12669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12669">CVE-2017-12669 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12983/">CVE-2017-12983 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12983">CVE-2017-12983 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13134/">CVE-2017-13134 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13134">CVE-2017-13134 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13769/">CVE-2017-13769 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13769">CVE-2017-13769 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14138/">CVE-2017-14138 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14138">CVE-2017-14138 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14172/">CVE-2017-14172 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14172">CVE-2017-14172 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14173/">CVE-2017-14173 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14173">CVE-2017-14173 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14175/">CVE-2017-14175 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14175">CVE-2017-14175 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14341/">CVE-2017-14341 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14341">CVE-2017-14341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14342/">CVE-2017-14342 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14342">CVE-2017-14342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14531/">CVE-2017-14531 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14531">CVE-2017-14531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14607/">CVE-2017-14607 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14607">CVE-2017-14607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14682/">CVE-2017-14682 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14682">CVE-2017-14682 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14733/">CVE-2017-14733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14733">CVE-2017-14733 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14989/">CVE-2017-14989 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14989">CVE-2017-14989 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15217/">CVE-2017-15217 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15217">CVE-2017-15217 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15930/">CVE-2017-15930 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15930">CVE-2017-15930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16545/">CVE-2017-16545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16545">CVE-2017-16545 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16546/">CVE-2017-16546 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16546">CVE-2017-16546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16669/">CVE-2017-16669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16669">CVE-2017-16669 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149444" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1067841" ref_url="https://bugzilla.suse.com/1067841" source="BUGZILLA"/>
		<reference ref_id="1067844" ref_url="https://bugzilla.suse.com/1067844" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15098" ref_url="https://www.suse.com/security/cve/CVE-2017-15098/" source="CVE"/>
		<reference ref_id="CVE-2017-15099" ref_url="https://www.suse.com/security/cve/CVE-2017-15099/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003547.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

Security issues fixed:

- CVE-2017-15098: Fix crash due to rowtype mismatch in json{b}_populate_recordset() (bsc#1067844).
- CVE-2017-15099: Ensure that INSERT ... ON CONFLICT DO UPDATE checks table permissions and RLS policies in all cases (bsc#1067841).

Bug fixes:

- Update to version 9.6.6:
  * https://www.postgresql.org/docs/9.6/static/release-9-6-6.html
  * https://www.postgresql.org/docs/9.6/static/release-9-6-5.html
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-21"/>
	<updated date="2017-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1067841">SUSE bug 1067841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067844">SUSE bug 1067844</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15098/">CVE-2017-15098 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15098">CVE-2017-15098 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15099/">CVE-2017-15099 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15099">CVE-2017-15099 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549940" comment="libecpg6-9.6.6-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549941" comment="libpq5-9.6.6-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549942" comment="libpq5-32bit-9.6.6-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549943" comment="postgresql96-9.6.6-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549944" comment="postgresql96-contrib-9.6.6-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532676" comment="postgresql96-docs-9.6.6-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549945" comment="postgresql96-server-9.6.6-3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149445" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1010201" ref_url="https://bugzilla.suse.com/1010201" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012523" ref_url="https://bugzilla.suse.com/1012523" source="BUGZILLA"/>
		<reference ref_id="1015336" ref_url="https://bugzilla.suse.com/1015336" source="BUGZILLA"/>
		<reference ref_id="1015337" ref_url="https://bugzilla.suse.com/1015337" source="BUGZILLA"/>
		<reference ref_id="1015340" ref_url="https://bugzilla.suse.com/1015340" source="BUGZILLA"/>
		<reference ref_id="1015342" ref_url="https://bugzilla.suse.com/1015342" source="BUGZILLA"/>
		<reference ref_id="1015343" ref_url="https://bugzilla.suse.com/1015343" source="BUGZILLA"/>
		<reference ref_id="1019675" ref_url="https://bugzilla.suse.com/1019675" source="BUGZILLA"/>
		<reference ref_id="1020412" ref_url="https://bugzilla.suse.com/1020412" source="BUGZILLA"/>
		<reference ref_id="1020645" ref_url="https://bugzilla.suse.com/1020645" source="BUGZILLA"/>
		<reference ref_id="1022595" ref_url="https://bugzilla.suse.com/1022595" source="BUGZILLA"/>
		<reference ref_id="1022607" ref_url="https://bugzilla.suse.com/1022607" source="BUGZILLA"/>
		<reference ref_id="1024346" ref_url="https://bugzilla.suse.com/1024346" source="BUGZILLA"/>
		<reference ref_id="1024373" ref_url="https://bugzilla.suse.com/1024373" source="BUGZILLA"/>
		<reference ref_id="1024376" ref_url="https://bugzilla.suse.com/1024376" source="BUGZILLA"/>
		<reference ref_id="1024412" ref_url="https://bugzilla.suse.com/1024412" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1032150" ref_url="https://bugzilla.suse.com/1032150" source="BUGZILLA"/>
		<reference ref_id="1036489" ref_url="https://bugzilla.suse.com/1036489" source="BUGZILLA"/>
		<reference ref_id="1036800" ref_url="https://bugzilla.suse.com/1036800" source="BUGZILLA"/>
		<reference ref_id="1037404" ref_url="https://bugzilla.suse.com/1037404" source="BUGZILLA"/>
		<reference ref_id="1037838" ref_url="https://bugzilla.suse.com/1037838" source="BUGZILLA"/>
		<reference ref_id="1038299" ref_url="https://bugzilla.suse.com/1038299" source="BUGZILLA"/>
		<reference ref_id="1039542" ref_url="https://bugzilla.suse.com/1039542" source="BUGZILLA"/>
		<reference ref_id="1040073" ref_url="https://bugzilla.suse.com/1040073" source="BUGZILLA"/>
		<reference ref_id="1041873" ref_url="https://bugzilla.suse.com/1041873" source="BUGZILLA"/>
		<reference ref_id="1042268" ref_url="https://bugzilla.suse.com/1042268" source="BUGZILLA"/>
		<reference ref_id="1042957" ref_url="https://bugzilla.suse.com/1042957" source="BUGZILLA"/>
		<reference ref_id="1042977" ref_url="https://bugzilla.suse.com/1042977" source="BUGZILLA"/>
		<reference ref_id="1042978" ref_url="https://bugzilla.suse.com/1042978" source="BUGZILLA"/>
		<reference ref_id="1043017" ref_url="https://bugzilla.suse.com/1043017" source="BUGZILLA"/>
		<reference ref_id="1045404" ref_url="https://bugzilla.suse.com/1045404" source="BUGZILLA"/>
		<reference ref_id="1046054" ref_url="https://bugzilla.suse.com/1046054" source="BUGZILLA"/>
		<reference ref_id="1046107" ref_url="https://bugzilla.suse.com/1046107" source="BUGZILLA"/>
		<reference ref_id="1047901" ref_url="https://bugzilla.suse.com/1047901" source="BUGZILLA"/>
		<reference ref_id="1047989" ref_url="https://bugzilla.suse.com/1047989" source="BUGZILLA"/>
		<reference ref_id="1048317" ref_url="https://bugzilla.suse.com/1048317" source="BUGZILLA"/>
		<reference ref_id="1048327" ref_url="https://bugzilla.suse.com/1048327" source="BUGZILLA"/>
		<reference ref_id="1048356" ref_url="https://bugzilla.suse.com/1048356" source="BUGZILLA"/>
		<reference ref_id="1050060" ref_url="https://bugzilla.suse.com/1050060" source="BUGZILLA"/>
		<reference ref_id="1050231" ref_url="https://bugzilla.suse.com/1050231" source="BUGZILLA"/>
		<reference ref_id="1051406" ref_url="https://bugzilla.suse.com/1051406" source="BUGZILLA"/>
		<reference ref_id="1051635" ref_url="https://bugzilla.suse.com/1051635" source="BUGZILLA"/>
		<reference ref_id="1051987" ref_url="https://bugzilla.suse.com/1051987" source="BUGZILLA"/>
		<reference ref_id="1052384" ref_url="https://bugzilla.suse.com/1052384" source="BUGZILLA"/>
		<reference ref_id="1053309" ref_url="https://bugzilla.suse.com/1053309" source="BUGZILLA"/>
		<reference ref_id="1053919" ref_url="https://bugzilla.suse.com/1053919" source="BUGZILLA"/>
		<reference ref_id="1055272" ref_url="https://bugzilla.suse.com/1055272" source="BUGZILLA"/>
		<reference ref_id="1056003" ref_url="https://bugzilla.suse.com/1056003" source="BUGZILLA"/>
		<reference ref_id="1056365" ref_url="https://bugzilla.suse.com/1056365" source="BUGZILLA"/>
		<reference ref_id="1056427" ref_url="https://bugzilla.suse.com/1056427" source="BUGZILLA"/>
		<reference ref_id="1056587" ref_url="https://bugzilla.suse.com/1056587" source="BUGZILLA"/>
		<reference ref_id="1056596" ref_url="https://bugzilla.suse.com/1056596" source="BUGZILLA"/>
		<reference ref_id="1056652" ref_url="https://bugzilla.suse.com/1056652" source="BUGZILLA"/>
		<reference ref_id="1056979" ref_url="https://bugzilla.suse.com/1056979" source="BUGZILLA"/>
		<reference ref_id="1057079" ref_url="https://bugzilla.suse.com/1057079" source="BUGZILLA"/>
		<reference ref_id="1057199" ref_url="https://bugzilla.suse.com/1057199" source="BUGZILLA"/>
		<reference ref_id="1057820" ref_url="https://bugzilla.suse.com/1057820" source="BUGZILLA"/>
		<reference ref_id="1058413" ref_url="https://bugzilla.suse.com/1058413" source="BUGZILLA"/>
		<reference ref_id="1059639" ref_url="https://bugzilla.suse.com/1059639" source="BUGZILLA"/>
		<reference ref_id="1060333" ref_url="https://bugzilla.suse.com/1060333" source="BUGZILLA"/>
		<reference ref_id="1061756" ref_url="https://bugzilla.suse.com/1061756" source="BUGZILLA"/>
		<reference ref_id="1062496" ref_url="https://bugzilla.suse.com/1062496" source="BUGZILLA"/>
		<reference ref_id="1062835" ref_url="https://bugzilla.suse.com/1062835" source="BUGZILLA"/>
		<reference ref_id="1062941" ref_url="https://bugzilla.suse.com/1062941" source="BUGZILLA"/>
		<reference ref_id="1063026" ref_url="https://bugzilla.suse.com/1063026" source="BUGZILLA"/>
		<reference ref_id="1063349" ref_url="https://bugzilla.suse.com/1063349" source="BUGZILLA"/>
		<reference ref_id="1063516" ref_url="https://bugzilla.suse.com/1063516" source="BUGZILLA"/>
		<reference ref_id="1064206" ref_url="https://bugzilla.suse.com/1064206" source="BUGZILLA"/>
		<reference ref_id="1064320" ref_url="https://bugzilla.suse.com/1064320" source="BUGZILLA"/>
		<reference ref_id="1064591" ref_url="https://bugzilla.suse.com/1064591" source="BUGZILLA"/>
		<reference ref_id="1064597" ref_url="https://bugzilla.suse.com/1064597" source="BUGZILLA"/>
		<reference ref_id="1064606" ref_url="https://bugzilla.suse.com/1064606" source="BUGZILLA"/>
		<reference ref_id="1064701" ref_url="https://bugzilla.suse.com/1064701" source="BUGZILLA"/>
		<reference ref_id="1064926" ref_url="https://bugzilla.suse.com/1064926" source="BUGZILLA"/>
		<reference ref_id="1065101" ref_url="https://bugzilla.suse.com/1065101" source="BUGZILLA"/>
		<reference ref_id="1065180" ref_url="https://bugzilla.suse.com/1065180" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065639" ref_url="https://bugzilla.suse.com/1065639" source="BUGZILLA"/>
		<reference ref_id="1065692" ref_url="https://bugzilla.suse.com/1065692" source="BUGZILLA"/>
		<reference ref_id="1065717" ref_url="https://bugzilla.suse.com/1065717" source="BUGZILLA"/>
		<reference ref_id="1065866" ref_url="https://bugzilla.suse.com/1065866" source="BUGZILLA"/>
		<reference ref_id="1065959" ref_url="https://bugzilla.suse.com/1065959" source="BUGZILLA"/>
		<reference ref_id="1066045" ref_url="https://bugzilla.suse.com/1066045" source="BUGZILLA"/>
		<reference ref_id="1066175" ref_url="https://bugzilla.suse.com/1066175" source="BUGZILLA"/>
		<reference ref_id="1066192" ref_url="https://bugzilla.suse.com/1066192" source="BUGZILLA"/>
		<reference ref_id="1066213" ref_url="https://bugzilla.suse.com/1066213" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1066285" ref_url="https://bugzilla.suse.com/1066285" source="BUGZILLA"/>
		<reference ref_id="1066382" ref_url="https://bugzilla.suse.com/1066382" source="BUGZILLA"/>
		<reference ref_id="1066470" ref_url="https://bugzilla.suse.com/1066470" source="BUGZILLA"/>
		<reference ref_id="1066471" ref_url="https://bugzilla.suse.com/1066471" source="BUGZILLA"/>
		<reference ref_id="1066472" ref_url="https://bugzilla.suse.com/1066472" source="BUGZILLA"/>
		<reference ref_id="1066573" ref_url="https://bugzilla.suse.com/1066573" source="BUGZILLA"/>
		<reference ref_id="1066606" ref_url="https://bugzilla.suse.com/1066606" source="BUGZILLA"/>
		<reference ref_id="1066629" ref_url="https://bugzilla.suse.com/1066629" source="BUGZILLA"/>
		<reference ref_id="1066660" ref_url="https://bugzilla.suse.com/1066660" source="BUGZILLA"/>
		<reference ref_id="1066696" ref_url="https://bugzilla.suse.com/1066696" source="BUGZILLA"/>
		<reference ref_id="1066767" ref_url="https://bugzilla.suse.com/1066767" source="BUGZILLA"/>
		<reference ref_id="1066812" ref_url="https://bugzilla.suse.com/1066812" source="BUGZILLA"/>
		<reference ref_id="1066974" ref_url="https://bugzilla.suse.com/1066974" source="BUGZILLA"/>
		<reference ref_id="1067105" ref_url="https://bugzilla.suse.com/1067105" source="BUGZILLA"/>
		<reference ref_id="1067132" ref_url="https://bugzilla.suse.com/1067132" source="BUGZILLA"/>
		<reference ref_id="1067225" ref_url="https://bugzilla.suse.com/1067225" source="BUGZILLA"/>
		<reference ref_id="1067494" ref_url="https://bugzilla.suse.com/1067494" source="BUGZILLA"/>
		<reference ref_id="1067734" ref_url="https://bugzilla.suse.com/1067734" source="BUGZILLA"/>
		<reference ref_id="1067735" ref_url="https://bugzilla.suse.com/1067735" source="BUGZILLA"/>
		<reference ref_id="1067888" ref_url="https://bugzilla.suse.com/1067888" source="BUGZILLA"/>
		<reference ref_id="1067906" ref_url="https://bugzilla.suse.com/1067906" source="BUGZILLA"/>
		<reference ref_id="1068671" ref_url="https://bugzilla.suse.com/1068671" source="BUGZILLA"/>
		<reference ref_id="1068978" ref_url="https://bugzilla.suse.com/1068978" source="BUGZILLA"/>
		<reference ref_id="1068980" ref_url="https://bugzilla.suse.com/1068980" source="BUGZILLA"/>
		<reference ref_id="1068982" ref_url="https://bugzilla.suse.com/1068982" source="BUGZILLA"/>
		<reference ref_id="1069152" ref_url="https://bugzilla.suse.com/1069152" source="BUGZILLA"/>
		<reference ref_id="1069250" ref_url="https://bugzilla.suse.com/1069250" source="BUGZILLA"/>
		<reference ref_id="1069270" ref_url="https://bugzilla.suse.com/1069270" source="BUGZILLA"/>
		<reference ref_id="1069277" ref_url="https://bugzilla.suse.com/1069277" source="BUGZILLA"/>
		<reference ref_id="1069484" ref_url="https://bugzilla.suse.com/1069484" source="BUGZILLA"/>
		<reference ref_id="1069583" ref_url="https://bugzilla.suse.com/1069583" source="BUGZILLA"/>
		<reference ref_id="1069721" ref_url="https://bugzilla.suse.com/1069721" source="BUGZILLA"/>
		<reference ref_id="1069793" ref_url="https://bugzilla.suse.com/1069793" source="BUGZILLA"/>
		<reference ref_id="1069879" ref_url="https://bugzilla.suse.com/1069879" source="BUGZILLA"/>
		<reference ref_id="1069916" ref_url="https://bugzilla.suse.com/1069916" source="BUGZILLA"/>
		<reference ref_id="1069942" ref_url="https://bugzilla.suse.com/1069942" source="BUGZILLA"/>
		<reference ref_id="1069996" ref_url="https://bugzilla.suse.com/1069996" source="BUGZILLA"/>
		<reference ref_id="1070001" ref_url="https://bugzilla.suse.com/1070001" source="BUGZILLA"/>
		<reference ref_id="1070006" ref_url="https://bugzilla.suse.com/1070006" source="BUGZILLA"/>
		<reference ref_id="1070145" ref_url="https://bugzilla.suse.com/1070145" source="BUGZILLA"/>
		<reference ref_id="1070169" ref_url="https://bugzilla.suse.com/1070169" source="BUGZILLA"/>
		<reference ref_id="1070404" ref_url="https://bugzilla.suse.com/1070404" source="BUGZILLA"/>
		<reference ref_id="1070535" ref_url="https://bugzilla.suse.com/1070535" source="BUGZILLA"/>
		<reference ref_id="1070767" ref_url="https://bugzilla.suse.com/1070767" source="BUGZILLA"/>
		<reference ref_id="1070771" ref_url="https://bugzilla.suse.com/1070771" source="BUGZILLA"/>
		<reference ref_id="1070805" ref_url="https://bugzilla.suse.com/1070805" source="BUGZILLA"/>
		<reference ref_id="1070825" ref_url="https://bugzilla.suse.com/1070825" source="BUGZILLA"/>
		<reference ref_id="1070964" ref_url="https://bugzilla.suse.com/1070964" source="BUGZILLA"/>
		<reference ref_id="1071693" ref_url="https://bugzilla.suse.com/1071693" source="BUGZILLA"/>
		<reference ref_id="1071694" ref_url="https://bugzilla.suse.com/1071694" source="BUGZILLA"/>
		<reference ref_id="1071695" ref_url="https://bugzilla.suse.com/1071695" source="BUGZILLA"/>
		<reference ref_id="1071833" ref_url="https://bugzilla.suse.com/1071833" source="BUGZILLA"/>
		<reference ref_id="1072589" ref_url="https://bugzilla.suse.com/1072589" source="BUGZILLA"/>
		<reference ref_id="744692" ref_url="https://bugzilla.suse.com/744692" source="BUGZILLA"/>
		<reference ref_id="789311" ref_url="https://bugzilla.suse.com/789311" source="BUGZILLA"/>
		<reference ref_id="964944" ref_url="https://bugzilla.suse.com/964944" source="BUGZILLA"/>
		<reference ref_id="966170" ref_url="https://bugzilla.suse.com/966170" source="BUGZILLA"/>
		<reference ref_id="966172" ref_url="https://bugzilla.suse.com/966172" source="BUGZILLA"/>
		<reference ref_id="969470" ref_url="https://bugzilla.suse.com/969470" source="BUGZILLA"/>
		<reference ref_id="979928" ref_url="https://bugzilla.suse.com/979928" source="BUGZILLA"/>
		<reference ref_id="989261" ref_url="https://bugzilla.suse.com/989261" source="BUGZILLA"/>
		<reference ref_id="996376" ref_url="https://bugzilla.suse.com/996376" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000410" ref_url="https://www.suse.com/security/cve/CVE-2017-1000410/" source="CVE"/>
		<reference ref_id="CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600/" source="CVE"/>
		<reference ref_id="CVE-2017-12193" ref_url="https://www.suse.com/security/cve/CVE-2017-12193/" source="CVE"/>
		<reference ref_id="CVE-2017-15115" ref_url="https://www.suse.com/security/cve/CVE-2017-15115/" source="CVE"/>
		<reference ref_id="CVE-2017-16528" ref_url="https://www.suse.com/security/cve/CVE-2017-16528/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16645" ref_url="https://www.suse.com/security/cve/CVE-2017-16645/" source="CVE"/>
		<reference ref_id="CVE-2017-16646" ref_url="https://www.suse.com/security/cve/CVE-2017-16646/" source="CVE"/>
		<reference ref_id="CVE-2017-16994" ref_url="https://www.suse.com/security/cve/CVE-2017-16994/" source="CVE"/>
		<reference ref_id="CVE-2017-17448" ref_url="https://www.suse.com/security/cve/CVE-2017-17448/" source="CVE"/>
		<reference ref_id="CVE-2017-17449" ref_url="https://www.suse.com/security/cve/CVE-2017-17449/" source="CVE"/>
		<reference ref_id="CVE-2017-17450" ref_url="https://www.suse.com/security/cve/CVE-2017-17450/" source="CVE"/>
		<reference ref_id="CVE-2017-7482" ref_url="https://www.suse.com/security/cve/CVE-2017-7482/" source="CVE"/>
		<reference ref_id="CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003549.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.103 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-1000410: The Linux kernel was affected by an information lea that lies in the processing of incoming L2CAP commands - ConfigRequest, and ConfigResponse messages. (bnc#1070535).
- CVE-2017-11600: net/xfrm/xfrm_policy.c in the Linux kernel did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bnc#1050231).
- CVE-2017-12193: The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel mishandled node splitting, which allowed local users to cause a denial of service (NULL pointer dereference and panic) via a crafted application, as demonstrated by the keyring key type, and key addition and link creation operations (bnc#1066192).
- CVE-2017-15115: The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel did not check whether the intended netns is used in a peel-off action, which allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls (bnc#1068671).
- CVE-2017-16528: sound/core/seq_device.c in the Linux kernel allowed local users to cause a denial of service (snd_rawmidi_dev_seq_free use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066629).
- CVE-2017-16536: The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066606).
- CVE-2017-16537: The imon_probe function in drivers/media/rc/imon.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066573).
- CVE-2017-16645: The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel allowed local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067132).
- CVE-2017-16646: drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel allowed local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067105).
- CVE-2017-16994: The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel mishandled holes in hugetlb ranges, which allowed local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call (bnc#1069996).
- CVE-2017-17448: net/netfilter/nfnetlink_cthelper.c in the Linux kernel did not require the CAP_NET_ADMIN capability for new, get, and del operations, which allowed local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces (bnc#1071693).
- CVE-2017-17449: The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel did not restrict observations of Netlink messages to a single net namespace, which allowed local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system (bnc#1071694).
- CVE-2017-17450: net/netfilter/xt_osf.c in the Linux kernel did not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allowed local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces (bnc#1071695).
- CVE-2017-7482: Fixed an overflow when decoding a krb5 principal. (bnc#1046107).
- CVE-2017-8824: The dccp_disconnect function in net/dccp/proto.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state (bnc#1070771).

The following non-security bugs were fixed:

- acpi / APD: Add clock frequency for ThunderX2 I2C controller (bsc#1067225).
- Add references (bsc#1062941, bsc#1037404, bsc#1012523, bsc#1038299) The scsi_devinfo patches are relevant for all bugs related to HITACHI OPEN-V:
- adm80211: return an error if adm8211_alloc_rings() fails (bsc#1031717).
- adv7604: Initialize drive strength to default when using DT (bnc#1012382).
- af_netlink: ensure that NLMSG_DONE never fails in dumps (bnc#1012382).
- alsa: caiaq: Fix stray URB at probe error path (bnc#1012382).
- alsa: hda: Abort capability probe at invalid register read (bsc#1048356).
- alsa: hda: Add Raven PCI ID (bnc#1012382).
- alsa: hda - Apply ALC269_FIXUP_NO_SHUTUP on HDA_FIXUP_ACT_PROBE (bnc#1012382).
- alsa: hda/ca0132 - Fix memory leak at error path (bsc#1031717).
- alsa: hda - fix headset mic problem for Dell machines with alc236 (bnc#1012382).
- alsa: hda - No loopback on ALC299 codec (git-fixes).
- alsa: hda/realtek: Add headset mic support for Intel NUC Skull Canyon (bsc#1031717).
- alsa: hda/realtek - Add new codec ID ALC299 (bnc#1012382).
- alsa: hda/realtek - Add support for ALC236/ALC3204 (bnc#1012382).
- alsa: hda/realtek - Fix ALC700 family no sound issue (bsc#1031717).
- alsa: hda: Remove superfluous '-' added by printk conversion (bnc#1012382).
- alsa: hda: Workaround for KBL codec power control (bsc#1048356,bsc#1047989,bsc#1055272,bsc#1058413).
- alsa: line6: Fix leftover URB at error-path during probe (bnc#1012382).
- alsa: pcm: update tstamp only if audio_tstamp changed (bsc#1031717).
- alsa: seq: Avoid invalid lockdep class warning (bsc#1031717).
- alsa: seq: Enable 'use' locking in all configurations (bnc#1012382).
- alsa: seq: Fix copy_from_user() call inside lock (bnc#1012382).
- alsa: seq: Fix nested rwsem annotation for lockdep splat (bnc#1012382).
- alsa: seq: Fix OSS sysex delivery in OSS emulation (bnc#1012382).
- alsa: timer: Add missing mutex lock for compat ioctls (bnc#1012382).
- alsa: timer: Remove kernel warning at compat ioctl error paths (bsc#1031717).
- alsa: usb-audio: Add native DSD support for Pro-Ject Pre Box S2 Digital (bnc#1012382).
- alsa: usb-audio: Add sanity checks in v2 clock parsers (bsc#1031717).
- alsa: usb-audio: Add sanity checks to FE parser (bsc#1031717).
- alsa: usb-audio: Fix potential out-of-bound access at parsing SU (bsc#1031717).
- alsa: usb-audio: Kill stray URB at exiting (bnc#1012382).
- alsa: usb-audio: uac1: Invalidate ctl on interrupt (bsc#1031717).
- alsa: vx: Do not try to update capture stream before running (bnc#1012382).
- alsa: vx: Fix possible transfer overflow (bnc#1012382).
- Apply generic ppc build fixes to vanilla (bsc#1070805)
- arm64: dts: NS2: reserve memory for Nitro firmware (bnc#1012382).
- arm64: ensure __dump_instr() checks addr_limit (bnc#1012382).
- arm: 8715/1: add a private asm/unaligned.h (bnc#1012382).
- arm: 8720/1: ensure dump_instr() checks addr_limit (bnc#1012382).
- arm: 8721/1: mm: dump: check hardware RO bit for LPAE (bnc#1012382).
- arm: 8722/1: mm: make STRICT_KERNEL_RWX effective for LPAE (bnc#1012382).
- arm: crypto: reduce priority of bit-sliced AES cipher (bnc#1012382).
- arm: dts: Fix am335x and dm814x scm syscon to probe children (bnc#1012382).
- arm: dts: Fix compatible for ti81xx uarts for 8250 (bnc#1012382).
- arm: dts: Fix omap3 off mode pull defines (bnc#1012382).
- arm: dts: mvebu: pl310-cache disable double-linefill (bnc#1012382).
- arm: OMAP2+: Fix init for multiple quirks for the same SoC (bnc#1012382).
- arm: omap2plus_defconfig: Fix probe errors on UARTs 5 and 6 (bnc#1012382).
- arm: pxa: Do not rely on public mmc header to include leds.h (bnc#1012382).
- asm/sections: add helpers to check for section data (bsc#1063026).
- asoc: adau17x1: Workaround for noise bug in ADC (bnc#1012382).
- asoc: cs42l56: Fix reset GPIO name in example DT binding (bsc#1031717).
- asoc: davinci-mcasp: Fix an error handling path in 'davinci_mcasp_probe()' (bsc#1031717).
- asoc: rsnd: do not double free kctrl (bnc#1012382).
- asoc: samsung: Fix possible double iounmap on s3c24xx driver probe failure (bsc#1031717).
- asoc: wm_adsp: Do not overrun firmware file buffer when reading region data (bnc#1012382).
- ata: ATA_BMDMA should depend on HAS_DMA (bnc#1012382).
- ata: fixes kernel crash while tracing ata_eh_link_autopsy event (bnc#1012382).
- ata: SATA_HIGHBANK should depend on HAS_DMA (bnc#1012382).
- ata: SATA_MV should depend on HAS_DMA (bnc#1012382).
- ath10k: convert warning about non-existent OTP board id to debug message (git-fixes).
- ath10k: fix a warning during channel switch with multiple vaps (bsc#1031717).
- ath10k: fix board data fetch error message (bsc#1031717).
- ath10k: fix diag_read to collect data for larger memory (bsc#1031717).
- ath10k: fix incorrect txpower set by P2P_DEVICE interface (bnc#1012382).
- ath10k: fix potential memory leak in ath10k_wmi_tlv_op_pull_fw_stats() (bnc#1012382).
- ath10k: free cached fw bin contents when get board id fails (bsc#1031717).
- ath10k: ignore configuring the incorrect board_id (bnc#1012382).
- ath10k: set CTS protection VDEV param only if VDEV is up (bnc#1012382).
- ath9k_htc: check for underflow in ath9k_htc_rx_msg() (bsc#1031717).
- ath9k: off by one in ath9k_hw_nvram_read_array() (bsc#1031717).
- autofs: do not fail mount for transient error (bsc#1065180).
- backlight: adp5520: Fix error handling in adp5520_bl_probe() (bnc#1012382).
- backlight: lcd: Fix race condition during register (bnc#1012382).
- bcache: check ca-&gt;alloc_thread initialized before wake up it (bnc#1012382).
- bio-integrity: bio_integrity_advance must update integrity seed (bsc#1046054).
- bio-integrity: bio_trim should truncate integrity vector accordingly (bsc#1046054).
- bio-integrity: Do not allocate integrity context for bio w/o data (bsc#1046054).
- bio-integrity: fix interface for bio_integrity_trim (bsc#1046054).
- bio: partially revert 'fix interface for bio_integrity_trim' (bsc#1046054).
- blacklist.conf: Add ath10k, mmc and rtl8192u commits (bsc#1031717)
- blacklist.conf: Add drm/i915 blacklist (bsc#1031717)
- blacklist.conf: added misc commits (bsc#1031717)
- blacklist.conf: Add misc entries (bsc#1031717)
- blacklist.conf: Add non-applicable commit ID (bsc#1066812)
- blacklist.conf: Add non-applicable commits (bsc#1066812)
- blacklist.conf: blacklisted 16af97dc5a89 (bnc#1053919)
- blacklist.conf: Blacklist two commits (bbb3be170ac2 and ccf1e0045eea).
- blacklist.conf: Update blacklist (bsc#1031717)
- blacklist.conf: Update iwlwifi blacklist (bsc#1031717)
- blacklist.conf: yet another serial entry (bsc#1031717)
- block: Fix a race between blk_cleanup_queue() and timeout handling (FATE#319965, bsc#964944).
- block: Make q_usage_counter also track legacy requests (bsc#1057820).
- bluetooth: btusb: fix QCA Rome suspend/resume (bnc#1012382).
- bnxt_en: Do not use rtnl lock to protect link change logic in workqueue (bsc#1020412 FATE#321671).
- bnxt_en: Fix a variable scoping in bnxt_hwrm_do_send_msg() (bsc#1053309).
- bnxt_en: Fix possible corrupted NVRAM parameters from firmware response (bsc#1020412 FATE#321671).
- bnxt_en: Fix possible corruption in DCB parameters from firmware (bsc#1020412 FATE#321671).
- bnxt_en: Fix VF PCIe link speed and width logic (bsc#1020412 FATE#321671).
- bnxt_en: Need to unconditionally shut down RoCE in bnxt_shutdown (bsc#1053309).
- bnxt_re: Make room for mapping beyond 32 entries (bsc#1056596).
- bonding: discard lowest hash bit for 802.3ad layer3+4 (bnc#1012382).
- bpf: one perf event close won't free bpf program attached by another perf event (bnc#1012382).
- bpf/verifier: reject BPF_ALU64|BPF_END (bnc#1012382).
- brcmfmac: add length check in brcmf_cfg80211_escan_handler() (bnc#1012382).
- brcmfmac: remove setting IBSS mode when stopping AP (bnc#1012382).
- brcmsmac: make some local variables 'static const' to reduce stack size (bnc#1012382).
- bt8xx: fix memory leak (bnc#1012382).
- btrfs: return the actual error value from from btrfs_uuid_tree_iterate (bnc#1012382).
- bus: mbus: fix window size calculation for 4GB windows (bnc#1012382).
- can: c_can: do not indicate triple sampling support for D_CAN (bnc#1012382).
- can: esd_usb2: Fix can_dlc value for received RTR, frames (bnc#1012382).
- can: gs_usb: fix busy loop if no more TX context is available (bnc#1012382).
- can: kvaser_usb: Correct return value in printout (bnc#1012382).
- can: kvaser_usb: Ignore CMD_FLUSH_QUEUE_REPLY messages (bnc#1012382).
- can: sun4i: fix loopback mode (bnc#1012382).
- can: sun4i: handle overrun in RX FIFO (bnc#1012382).
- cdc_ncm: Set NTB format again after altsetting switch for Huawei devices (bnc#1012382).
- ceph: clean up unsafe d_parent accesses in build_dentry_path (FATE#322288 bnc#1012382).
- ceph: disable cached readdir after dropping positive dentry (bsc#1069277).
- ceph: -EINVAL on decoding failure in ceph_mdsc_handle_fsmap() (bsc#1069277).
- ceph: present consistent fsid, regardless of arch endianness (bsc#1069277).
- ceph: unlock dangling spinlock in try_flush_caps() (bsc#1065639).
- cgroup, net_cls: iterate the fds of only the tasks which are being migrated (bnc#1064926).
- cifs: check MaxPathNameComponentLength != 0 before using it (bnc#1012382).
- cifs: fix circular locking dependency (bsc#1064701).
- cifs: Reconnect expired SMB sessions (bnc#1012382).
- clk: ti: dra7-atl-clock: fix child-node lookups (bnc#1012382).
- clk: ti: dra7-atl-clock: Fix of_node reference counting (bnc#1012382).
- clockevents/drivers/cs5535: Improve resilience to spurious interrupts (bnc#1012382).
- cma: fix calculation of aligned offset (VM Functionality, bsc#1050060).
- coda: fix 'kernel memory exposure attempt' in fsync (bnc#1012382).
- cpufreq: CPPC: add acpi_PROCESSOR dependency (bnc#1012382).
- crypto: dh - Do not permit 'key' or 'g' size longer than 'p' (bsc#1048317).
- crypto: dh - Do not permit 'p' to be 0 (bsc#1048317).
- crypto: dh - Fix double free of ctx-&gt;p (bsc#1048317).
- crypto: dh - fix memleak in setkey (bsc#1048317).
- crypto: rsa - fix buffer overread when stripping leading zeroes (bsc#1048317).
- crypto: shash - Fix zero-length shash ahash digest crash (bnc#1012382).
- crypto: vmx - disable preemption to enable vsx in aes_ctr.c (bnc#1012382).
- crypto: x86/sha1-mb - fix panic due to unaligned access (bnc#1012382).
- crypto: xts - Add ECB dependency (bnc#1012382).
- cx231xx: Fix I2C on Internal Master 3 Bus (bnc#1012382).
- cxgb4: Fix error codes in c4iw_create_cq() (bsc#1048327).
- cxl: Fix DAR check &amp; use REGION_ID instead of opencoding (bsc#1066223).
- cxl: Fix leaking pid refs in some error paths (bsc#1066223).
- cxl: Force context lock during EEH flow (bsc#1066223).
- cxl: Prevent adapter reset if an active context exists (bsc#1066223).
- cxl: Route eeh events to all drivers in cxl_pci_error_detected() (bsc#1066223).
- direct-io: Prevent NULL pointer access in submit_page_section (bnc#1012382).
- Disable IPMI fix patches due to regression (bsc#1071833)
- Disable patches.kernel.org/4.4.93-022-fix-unbalanced-page-refcounting-in-bio_map_use.patch (bsc#1070767)
- dmaengine: dmatest: warn user when dma test times out (bnc#1012382).
- dmaengine: edma: Align the memcpy acnt array size with the transfer (bnc#1012382).
- dmaengine: zx: set DMA_CYCLIC cap_mask bit (bnc#1012382).
- dm bufio: fix integer overflow when limiting maximum cache size (bnc#1012382).
- dm: fix race between dm_get_from_kobject() and __dm_destroy() (bnc#1012382).
- dm mpath: remove annoying message of 'blk_get_request() returned -11' (bsc#1066812).
- dm raid: fix NULL pointer dereference for raid1 without bitmap (bsc#1042957, FATE#321488).
- dm rq: Avoid that request processing stalls sporadically (bsc#1042978).
- drivers: base: cacheinfo: fix x86 with CONFIG_OF enabled (bsc#1070001).
- drivers: dma-mapping: Do not leave an invalid area-&gt;pages pointer in dma_common_contiguous_remap() (Git-fixes, bsc#1065692).
- drivers/fbdev/efifb: Allow BAR to be moved instead of claiming it (bsc#1051987).
- drivers: of: Fix of_pci.h header guard (bsc#1065959).
- drm/amdgpu: when dpm disabled, also need to stop/start vce (bnc#1012382).
- drm/amdkfd: NULL dereference involving create_process() (bsc#1031717).
- drm: Apply range restriction after color adjustment when allocation (bnc#1012382).
- drm/armada: Fix compile fail (bnc#1012382).
- drm: drm_minor_register(): Clean up debugfs on failure (bnc#1012382).
- drm: gma500: fix logic error (bsc#1031717).
- drm/i915/bxt: set min brightness from VBT (bsc#1031717).
- drm/i915: Do not try indexed reads to alternate slave addresses (bsc#1031717).
- drm/i915: fix backlight invert for non-zero minimum brightness (bsc#1031717).
- drm/i915: Prevent zero length 'index' write (bsc#1031717).
- drm/i915: Read timings from the correct transcoder in intel_crtc_mode_get() (bsc#1031717).
- drm/msm: fix an integer overflow test (bnc#1012382).
- drm/msm: Fix potential buffer overflow issue (bnc#1012382).
- drm/nouveau/bsp/g92: disable by default (bnc#1012382).
- drm/nouveau/gr: fallback to legacy paths during firmware lookup (bsc#1031717).
- drm/nouveau/mmu: flush tlbs before deleting page tables (bnc#1012382).
- drm/omap: Fix error handling path in 'omap_dmm_probe()' (bsc#1031717).
- drm/panel: simple: Add missing panel_simple_unprepare() calls (bsc#1031717).
- drm/radeon: Avoid double gpu reset by adding a timeout on IB ring tests (bsc#1066175).
- drm/sti: sti_vtg: Handle return NULL error from devm_ioremap_nocache (bnc#1012382).
- drm/vc4: Fix leak of HDMI EDID (bsc#1031717).
- drm/vmwgfx: Fix Ubuntu 17.10 Wayland black screen issue (bnc#1012382).
- Drop obsolete patch (bsc#1067734)
- e1000e: Avoid receiver overrun interrupt bursts (bsc#969470 FATE#319819).
- e1000e: Fix error path in link detection (bnc#1012382).
- e1000e: Fix return value test (bnc#1012382).
- e1000e: Separate signaling for link check/link up (bnc#1012382).
- ecryptfs: fix dereference of NULL user_key_payload (bnc#1012382).
- eCryptfs: use after free in ecryptfs_release_messaging() (bsc#1070404).
- epoll: avoid calling ep_call_nested() from ep_poll_safewake() (bsc#1056427).
- epoll: remove ep_call_nested() from ep_eventpoll_poll() (bsc#1056427).
- ext4: cleanup goto next group (bsc#1066285).
- ext4: do not use stripe_width if it is not set (bnc#1012382).
- ext4: fix fault handling when mounted with -o dax,ro (bsc#1069484).
- ext4: fix interaction between i_size, fallocate, and delalloc after a crash (bnc#1012382).
- ext4: fix stripe-unaligned allocations (bnc#1012382).
- ext4: in ext4_seek_{hole,data}, return -ENXIO for negative offsets (bnc#1012382).
- ext4: prevent data corruption with inline data + DAX (bsc#1064591).
- ext4: prevent data corruption with journaling + DAX (bsc#1064591).
- ext4: reduce lock contention in __ext4_new_inode (bsc#1066285).
- extcon: palmas: Check the parent instance to prevent the NULL (bnc#1012382).
- exynos4-is: fimc-is: Unmap region obtained by of_iomap() (bnc#1012382).
- f2fs crypto: add missing locking for keyring_key access (bnc#1012382).
- f2fs crypto: replace some BUG_ON()'s with error checks (bnc#1012382).
- f2fs: do not wait for writeback in write_begin (bnc#1012382).
- fealnx: Fix building error on MIPS (bnc#1012382).
- fix a page leak in vhost_scsi_iov_to_sgl() error recovery (bnc#1012382).
- Fix tracing sample code warning (bnc#1012382).
- fix unbalanced page refcounting in bio_map_user_iov (bnc#1012382).
- Fixup patches.fixes/block-Make-q_usage_counter-also-track-legacy-request.patch. (bsc#1062496)
- fm10k: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- fs/9p: Compare qid.path in v9fs_test_inode (bsc#1070404).
- fs-cache: fix dereference of NULL user_key_payload (bnc#1012382).
- fscrypt: fix dereference of NULL user_key_payload (bnc#1012382).
- fscrypt: lock mutex before checking for bounce page pool (bnc#1012382).
- fscrypto: require write access to mount to set encryption policy (bnc#1012382).
- fuse: fix READDIRPLUS skipping an entry (bnc#1012382).
- gpu: drm: mgag200: mgag200_main:- Handle error from pci_iomap (bnc#1012382).
- hid: elo: clear BTN_LEFT mapping (bsc#1065866).
- hid: usbhid: fix out-of-bounds bug (bnc#1012382).
- hsi: ssi_protocol: double free in ssip_pn_xmit() (bsc#1031717).
- hwmon: (xgene) Fix up error handling path mixup in 'xgene_hwmon_probe()' (bsc#).
- i2c: at91: ensure state is restored after suspending (bnc#1012382).
- i2c: bcm2835: Add support for dynamic clock (bsc#1066660).
- i2c: bcm2835: Add support for Repeated Start Condition (bsc#1066660).
- i2c: bcm2835: Avoid possible NULL ptr dereference (bsc#1066660).
- i2c: bcm2835: Can't support I2C_M_IGNORE_NAK (bsc#1066660).
- i2c: bcm2835: Do not complain on -EPROBE_DEFER from getting our clock (bsc#1066660).
- i2c: bcm2835: Fix hang for writing messages larger than 16 bytes (bsc#1066660).
- i2c: bcm2835: Protect against unexpected TXW/RXR interrupts (bsc#1066660).
- i2c: bcm2835: Support i2c-dev ioctl I2C_TIMEOUT (bsc#1066660).
- i2c: bcm2835: Use dev_dbg logging on transfer errors (bsc#1066660).
- i2c: cadance: fix ctrl/addr reg write order (bsc#1031717).
- i2c: imx: Use correct function to write to register (bsc#1031717).
- i2c: ismt: Separate I2C block read from SMBus block read (bnc#1012382).
- i2c: riic: correctly finish transfers (bnc#1012382).
- i2c: riic: fix restart condition (git-fixes).
- i2c: xlp9xx: Enable HWMON class probing for xlp9xx (bsc#1067225).
- i2c: xlp9xx: Get clock frequency with clk API (bsc#1067225).
- i2c: xlp9xx: Handle I2C_M_RECV_LEN in msg-&gt;flags (bsc#1067225).
- i40e: Fix incorrect use of tx_itr_setting when checking for Rx ITR setup (bsc#1024346 FATE#321239 bsc#1024373 FATE#321247).
- i40e: fix the calculation of VFs mac addresses (bsc#1024346 FATE#321239 bsc#1024373 FATE#321247).
- i40e: only redistribute MSI-X vectors when needed (bsc#1024346 FATE#321239 bsc#1024373 FATE#321247).
- i40e: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- i40evf: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- i40iw: Remove UDA QP from QoS list if creation fails (bsc#1024376 FATE#321249).
- ib/core: Fix calculation of maximum RoCE MTU (bsc#1022595 FATE#322350).
- ib/core: Fix unable to change lifespan entry for hw_counters (FATE#321231 FATE#321473).
- ib/core: Namespace is mandatory input for address resolution (bsc#1022595 FATE#322350).
- ib/hfi1: Add MODULE_FIRMWARE statements (bsc#1036800).
- ib/ipoib: Clean error paths in add port (bsc#1022595 FATE#322350).
- ib/ipoib: Prevent setting negative values to max_nonsrq_conn_qp (bsc#1022595 FATE#322350).
- ib/ipoib: Remove double pointer assigning (bsc#1022595 FATE#322350).
- ib/ipoib: Set IPOIB_NEIGH_TBL_FLUSH after flushed completion initialization (bsc#1022595 FATE#322350).
- ib/mlx5: Fix RoCE Address Path fields (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ibmvnic: Add netdev_dbg output for debugging (fate#323285).
- ibmvnic: Add vnic client data to login buffer (bsc#1069942).
- ibmvnic: Convert vnic server reported statistics to cpu endian (fate#323285).
- ibmvnic: Enable scatter-gather support (bsc#1066382).
- ibmvnic: Enable TSO support (bsc#1066382).
- ibmvnic: Feature implementation of Vital Product Data (VPD) for the ibmvnic driver (bsc#1069942).
- ibmvnic: Fix calculation of number of TX header descriptors (bsc#1066382).
- ibmvnic: fix dma_mapping_error call (bsc#1069942).
- ibmvnic: Fix failover error path for non-fatal resets (bsc#1066382).
- ibmvnic: Implement .get_channels (fate#323285).
- ibmvnic: Implement .get_ringparam (fate#323285).
- ibmvnic: Implement per-queue statistics reporting (fate#323285).
- ibmvnic: Let users change net device features (bsc#1066382).
- ibmvnic: Update reset infrastructure to support tunable parameters (bsc#1066382).
- ib/rxe: check for allocation failure on elem (FATE#322149).
- ib/rxe: do not crash, if allocation of crc algorithm failed (bsc#1051635).
- ib/rxe: put the pool on allocation failure (FATE#322149).
- ib/srp: Avoid that a cable pull can trigger a kernel crash (bsc#1022595 FATE#322350).
- ib/srpt: Do not accept invalid initiator port names (bnc#1012382).
- ib/uverbs: Fix device cleanup (bsc#1022595 FATE#322350).
- ib/uverbs: Fix NULL pointer dereference during device removal (bsc#1022595 FATE#322350).
- igb: close/suspend race in netif_device_detach (bnc#1012382).
- igb: Fix hw_dbg logging in igb_update_flash_i210 (bnc#1012382).
- igb: reset the PHY before reading the PHY ID (bnc#1012382).
- igb: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- igbvf: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- iio: adc: xilinx: Fix error handling (bnc#1012382).
- iio: dummy: events: Add missing break (bsc#1031717).
- iio: light: fix improper return value (bnc#1012382).
- iio: trigger: free trigger resource correctly (bnc#1012382).
- ima: do not update security.ima if appraisal status is not INTEGRITY_PASS (bnc#1012382).
- input: ar1021_i2c - fix too long name in driver's device table (bsc#1031717).
- input: edt-ft5x06 - fix setting gain, offset, and threshold via device tree (bsc#1031717).
- input: elan_i2c - add ELAN060C to the acpi table (bnc#1012382).
- input: elan_i2c - add ELAN0611 to the acpi table (bnc#1012382).
- input: gtco - fix potential out-of-bound access (bnc#1012382).
- input: mpr121 - handle multiple bits change of status register (bnc#1012382).
- input: mpr121 - set missing event capability (bnc#1012382).
- input: ti_am335x_tsc - fix incorrect step config for 5 wire touchscreen (bsc#1031717).
- input: twl4030-pwrbutton - use correct device for irq request (bsc#1031717).
- input: ucb1400_ts - fix suspend and resume handling (bsc#1031717).
- input: uinput - avoid crash when sending FF request to device going away (bsc#1031717).
- iommu/amd: Finish TLB flush in amd_iommu_unmap() (bnc#1012382).
- iommu/vt-d: Do not register bus-notifier under dmar_global_lock (bsc#1069793).
- ip6_gre: only increase err_count for some certain type icmpv6 in ip6gre_err (bnc#1012382).
- ip6_gre: skb_push ipv6hdr before packing the header in ip6gre_header (bnc#1012382).
- ipip: only increase err_count for some certain type icmp in ipip_err (bnc#1012382).
- ipmi: fix unsigned long underflow (bnc#1012382).
- ipmi: Pick up slave address from SMBIOS on an acpi device (bsc#1070006).
- ipmi: Prefer acpi system interfaces over SMBIOS ones (bsc#1070006).
- ipmi_si: Clean up printks (bsc#1070006).
- ipmi_si: fix memory leak on new_smi (bsc#1070006).
- ipsec: do not ignore crypto err in ah4 input (bnc#1012382).
- ipv6: flowlabel: do not leave opt-&gt;tot_len with garbage (bnc#1012382).
- ipv6: only call ip6_route_dev_notify() once for NETDEV_UNREGISTER (bnc#1012382).
- ipvs: make drop_entry protection effective for SIP-pe (bsc#1056365).
- irqchip/crossbar: Fix incorrect type of local variables (bnc#1012382).
- isa: Prevent NULL dereference in isa_bus driver callbacks (bsc#1031717).
- iscsi-target: Fix non-immediate TMR reference leak (bnc#1012382).
- isdn/i4l: fetch the ppp_write buffer in one shot (bnc#1012382).
- isofs: fix timestamps beyond 2027 (bnc#1012382).
- iwlwifi: mvm: fix the coex firmware API (bsc#1031717).
- iwlwifi: mvm: return -ENODATA when reading the temperature with the FW down (bsc#1031717).
- iwlwifi: mvm: set the RTS_MIMO_PROT bit in flag mask when sending sta to fw (bsc#1031717).
- iwlwifi: mvm: use IWL_HCMD_NOCOPY for MCAST_FILTER_CMD (bnc#1012382).
- iwlwifi: split the regulatory rules when the bandwidth flags require it (bsc#1031717).
- ixgbe: add mask for 64 RSS queues (bnc#1012382).
- ixgbe: do not disable FEC from the driver (bnc#1012382).
- ixgbe: fix AER error handling (bnc#1012382).
- ixgbe: Fix skb list corruption on Power systems (bnc#1012382).
- ixgbe: handle close/suspend race with netif_device_detach/present (bnc#1012382).
- ixgbe: Reduce I2C retry count on X550 devices (bnc#1012382).
- ixgbevf: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- kABI: protect struct l2tp_tunnel (kabi).
- kABI: protect struct regulator_dev (kabi).
- kABI: protect structs rt_rq+root_domain (kabi).
- kABI: protect typedef rds_rdma_cookie_t (kabi).
- kabi/severities: Ignore drivers/nvme/target (bsc#1063349)
- kabi/severities: Ignore kABI changes for qla2xxx (bsc#1043017)
- kernel-docs: unpack the source instead of using kernel-source (bsc#1057199).
- kernel/sysctl_binary.c: check name array length in deprecated_sysctl_warning() (FATE#323821).
- kernel/sysctl.c: remove duplicate UINT_MAX check on do_proc_douintvec_conv() (bsc#1066470).
- kernel/watchdog: Prevent false positives with turbo modes (bnc#1063516).
- keys: do not let add_key() update an uninstantiated key (bnc#1012382).
- keys: do not revoke uninstantiated key in request_key_auth_new() (bsc#1031717).
- keys: encrypted: fix dereference of NULL user_key_payload (bnc#1012382).
- keys: fix cred refcount leak in request_key_auth_new() (bsc#1031717).
- keys: fix key refcount leak in keyctl_assume_authority() (bsc#1031717).
- keys: fix key refcount leak in keyctl_read_key() (bsc#1031717).
- keys: fix NULL pointer dereference during ASN.1 parsing [ver #2] (bnc#1012382).
- keys: fix out-of-bounds read during ASN.1 parsing (bnc#1012382).
- keys: Fix race between updating and finding a negative key (bnc#1012382).
- keys: return full count in keyring_read() if buffer is too small (bnc#1012382).
- keys: trusted: fix writing past end of buffer in trusted_read() (bnc#1012382).
- keys: trusted: sanitize all key material (bnc#1012382).
- kvm: nVMX: fix guest CR4 loading when emulating L2 to L1 exit (bnc#1012382).
- kvm: nVMX: set IDTR and GDTR limits when loading L1 host state (bnc#1012382).
- kvm: PPC: Book 3S: XICS: correct the real mode ICP rejecting counter (bnc#1012382).
- kvm: SVM: obey guest PAT (bnc#1012382).
- l2tp: Avoid schedule while atomic in exit_net (bnc#1012382).
- l2tp: check ps-&gt;sock before running pppol2tp_session_ioctl() (bnc#1012382).
- l2tp: fix race condition in l2tp_tunnel_delete (bnc#1012382).
- libceph: do not WARN() if user tries to add invalid key (bsc#1069277).
- lib/digsig: fix dereference of NULL user_key_payload (bnc#1012382).
- libertas: Fix lbs_prb_rsp_limit_set() (bsc#1031717).
- lib/mpi: call cond_resched() from mpi_powm() loop (bnc#1012382).
- libnvdimm, namespace: fix label initialization to use valid seq numbers (bnc#1012382).
- libnvdimm, namespace: make 'resource' attribute only readable by root (bnc#1012382).
- libnvdimm, pfn: make 'resource' attribute only readable by root (FATE#319858).
- lib/ratelimit.c: use deferred printk() version (bsc#979928).
- locking/lockdep: Add nest_lock integrity test (bnc#1012382).
- lpfc: tie in to new dev_loss_tmo interface in nvme transport (bsc#1041873).
- mac80211: agg-tx: call drv_wake_tx_queue in proper context (bsc#1031717).
- mac80211: do not compare TKIP TX MIC key in reinstall prevention (bsc#1066472).
- mac80211: do not send SMPS action frame in AP mode when not needed (bsc#1031717).
- mac80211: Fix addition of mesh configuration element (git-fixes).
- mac80211: Fix BW upgrade for TDLS peers (bsc#1031717).
- mac80211: fix mgmt-tx abort cookie and leak (bsc#1031717).
- mac80211: fix power saving clients handling in iwlwifi (bnc#1012382).
- mac80211_hwsim: check HWSIM_ATTR_RADIO_NAME length (bnc#1012382).
- mac80211_hwsim: Fix memory leak in hwsim_new_radio_nl() (bsc#1031717).
- mac80211: Remove invalid flag operations in mesh TSF synchronization (bnc#1012382).
- mac80211: Remove unused 'beaconint_us' variable (bsc#1031717).
- mac80211: Remove unused 'i' variable (bsc#1031717).
- mac80211: Remove unused 'len' variable (bsc#1031717).
- mac80211: Remove unused 'rates_idx' variable (bsc#1031717).
- mac80211: Remove unused 'sband' and 'local' variables (bsc#1031717).
- mac80211: Remove unused 'struct ieee80211_rx_status' ptr (bsc#1031717).
- mac80211: Suppress NEW_PEER_CANDIDATE event if no room (bnc#1012382).
- mac80211: TDLS: always downgrade invalid chandefs (bsc#1031717).
- mac80211: TDLS: change BW calculation for WIDER_BW peers (bsc#1031717).
- mac80211: use constant time comparison with keys (bsc#1066471).
- md/linear: shutup lockdep warnning (FATE#321488 bnc#1012382 bsc#1042977).
- media: au0828: fix RC_CORE dependency (bsc#1031717).
- media: Do not do DMA on stack for firmware upload in the AS102 driver (bnc#1012382).
- media: em28xx: calculate left volume level correctly (bsc#1031717).
- media: mceusb: fix memory leaks in error path (bsc#1031717).
- media: rc: check for integer overflow (bnc#1012382).
- media: v4l2-ctrl: Fix flags field on Control events (bnc#1012382).
- mei: return error on notification request to a disconnected client (bnc#1012382).
- memremap: add scheduling point to devm_memremap_pages (bnc#1057079).
- mfd: ab8500-sysctrl: Handle probe deferral (bnc#1012382).
- mfd: axp20x: Fix axp288 PEK_DBR and PEK_DBF irqs being swapped (bnc#1012382).
- misc: panel: properly restore atomic counter on error path (bnc#1012382).
- mmc: block: return error on failed mmc_blk_get() (bsc#1031717).
- mmc: core: add driver strength selection when selecting hs400es (bsc#1069721).
- mmc: core: Fix access to HS400-ES devices (bsc#1031717).
- mmc: core/mmci: restore pre/post_req behaviour (bsc#1031717).
- mmc: dw_mmc: Fix the DTO timeout calculation (bsc#1069721).
- mm: check the return value of lookup_page_ext for all call sites (bnc#1068982).
- mmc: host: omap_hsmmc: avoid possible overflow of timeout value (bsc#1031717).
- mmc: host: omap_hsmmc: checking for NULL instead of IS_ERR() (bsc#1031717).
- mmc: mediatek: Fixed size in dma_free_coherent (bsc#1031717).
- mmc: s3cmci: include linux/interrupt.h for tasklet_struct (bnc#1012382).
- mmc: sd: limit SD card power limit according to cards capabilities (bsc#1031717).
- mm: distinguish CMA and MOVABLE isolation in has_unmovable_pages (bnc#1051406).
- mm: drop migrate type checks from has_unmovable_pages (bnc#1051406).
- mm, hwpoison: fixup 'mm: check the return value of lookup_page_ext for all call sites' (bnc#1012382).
- mm/madvise.c: fix freeing of locked page with MADV_FREE (bnc#1069152).
- mm/madvise.c: fix madvise() infinite loop under special circumstances (bnc#1070964).
- mm, memory_hotplug: add scheduling point to __add_pages (bnc#1057079).
- mm, memory_hotplug: do not fail offlining too early (bnc#1051406).
- mm, memory_hotplug: remove timeout from __offline_memory (bnc#1051406).
- mm, page_alloc: add scheduling point to memmap_init_zone (bnc#1057079).
- mm/page_alloc.c: broken deferred calculation (bnc#1068980).
- mm, page_alloc: fix potential false positive in __zone_watermark_ok (Git-fixes, bsc#1068978).
- mm/page_ext.c: check if page_ext is not prepared (bnc#1068982).
- mm/page_owner: avoid null pointer dereference (bnc#1068982).
- mm/pagewalk.c: report holes in hugetlb ranges (bnc#1012382).
- mm, sparse: do not swamp log with huge vmemmap allocation failures (bnc#1047901).
- net: 3com: typhoon: typhoon_init_one: fix incorrect return values (bnc#1012382).
- net: 3com: typhoon: typhoon_init_one: make return values more specific (bnc#1012382).
- net/9p: Switch to wait_event_killable() (bnc#1012382).
- net: Allow IP_MULTICAST_IF to set index to L3 slave (bnc#1012382).
- net: cdc_ether: fix divide by 0 on bad descriptors (bnc#1012382).
- net: cdc_ncm: GetNtbFormat endian fix (git-fixes).
- net: dsa: select NET_SWITCHDEV (bnc#1012382).
- net: emac: Fix napi poll list corruption (bnc#1012382).
- netfilter/ipvs: clear ipvs_property flag when SKB net namespace changed (bnc#1012382).
- netfilter: nf_ct_expect: Change __nf_ct_expect_check() return value (bnc#1012382).
- netfilter: nf_tables: fix oob access (bnc#1012382).
- netfilter: nft_meta: deal with PACKET_LOOPBACK in netdev family (bnc#1012382).
- netfilter: nft_queue: use raw_smp_processor_id() (bnc#1012382).
- net: ibm: ibmvnic: constify vio_device_id (fate#323285).
- net: ixgbe: Use new IXGBE_FLAG2_ROOT_RELAXED_ORDERING flag (bsc#1056652).
- net/mlx4_core: Fix VF overwrite of module param which disables DMFS on new probed PFs (FATE#321685 FATE#321686 FATE#321687 bnc#1012382 bsc#1015336 bsc#1015337 bsc#1015340).
- net/mlx4_en: fix overflow in mlx4_en_init_timestamp() (FATE#321685 FATE#321686 FATE#321687 bnc#1012382 bsc#1015336 bsc#1015337 bsc#1015340).
- net/mlx5: Delay events till mlx5 interface's add complete for pci resume (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Increase Striding RQ minimum size limit to 4 multi-packet WQEs (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Fix health work queue spin lock to IRQ safe (bsc#1015342).
- net/mlx5: Loop over temp list to release delay events (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net: mvneta: fix handling of the Tx descriptor counter (fate#319899).
- net: mvpp2: release reference to txq_cpu[] entry after unmapping (bnc#1012382 bsc#1032150).
- net: qmi_wwan: fix divide by 0 on bad descriptors (bnc#1012382).
- net/sctp: Always set scope_id in sctp_inet6_skb_msgname (bnc#1012382).
- net: Set sk_prot_creator when cloning sockets to the right proto (bnc#1012382).
- net/smc: dev_put for netdev after usage of ib_query_gid() (bsc#1066812).
- net: thunderx: Fix TCP/UDP checksum offload for IPv4 pkts (bsc#1069583).
- net: thunderx: Fix TCP/UDP checksum offload for IPv6 pkts (bsc#1069583).
- net/unix: do not show information about sockets from other namespaces (bnc#1012382).
- netvsc: use refcount_t for keeping track of sub channels (bsc#1062835).
- nfc: fix device-allocation error return (bnc#1012382).
- nfsd/callback: Cleanup callback cred on shutdown (bnc#1012382).
- nfsd: deal with revoked delegations appropriately (bnc#1012382).
- nfs: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).
- nfs: Fix typo in nomigration mount option (bnc#1012382).
- nfs: Fix ugly referral attributes (bnc#1012382).
- nilfs2: fix race condition that causes file system corruption (bnc#1012382).
- nl80211: Define policy for packet pattern attributes (bnc#1012382).
- nvme: add duplicate_connect option (bsc#1067734).
- nvme: add helper to compare options to controller (bsc#1067734).
- nvme: add transport SGL definitions (bsc#1057820).
- nvme: allow controller RESETTING to RECONNECTING transition (bsc#1037838).
- nvme-fabrics: Allow 0 as KATO value (bsc#1067734).
- nvme-fabrics: kABI fix for duplicate_connect option (bsc#1067734).
- nvme-fc: add a dev_loss_tmo field to the remoteport (bsc#1037838).
- nvme-fc: add dev_loss_tmo timeout and remoteport resume support (bsc#1037838).
- nvme-fc: add support for duplicate_connect option (bsc#1067734).
- nvme-fc: add uevent for auto-connect (bsc#1037838).
- nvme-fc: change ctlr state assignments during reset/reconnect (bsc#1037838).
- nvme-fc: check connectivity before initiating reconnects (bsc#1037838).
- nvme-fc: correct io termination handling (bsc#1067734).
- nvme-fc: correct io timeout behavior (bsc#1067734).
- nvme-fc: create fc class and transport device (bsc#1037838).
- nvme-fc: decouple ns references from lldd references (bsc#1067734).
- nvme-fc: fix iowait hang (bsc#1052384).
- nvme-fc: fix localport resume using stale values (bsc#1067734).
- nvme-fcloop: fix port deletes and callbacks (bsc#1037838).
- nvme-fc: move remote port get/put/free location (bsc#1037838).
- nvme-fc: on lldd/transport io error, terminate association (bsc#1042268).
- nvme-fc: Reattach to localports on re-registration (bsc#1052384).
- nvme-fc: remove NVME_FC_MAX_SEGMENTS (bsc#1067734).
- nvme-fc: remove unused 'queue_size' field (bsc#1042268).
- nvme-fc: retry initial controller connections 3 times (bsc#1067734).
- nvme-fc: use transport-specific sgl format (bsc#1057820).
- nvme: Fix memory order on async queue deletion (bnc#1012382).
- nvme: fix the definition of the doorbell buffer config support bit (bsc#1066812).
- nvme-rdma: add support for duplicate_connect option (bsc#1067734).
- nvme/rdma: Kick admin queue when a connection is going down (bsc#1059639).
- nvmet-fc: correct ref counting error when deferred rcv used (bsc#1067734).
- nvmet-fc: fix failing max io queue connections (bsc#1067734).
- nvmet-fc: on port remove call put outside lock (bsc#1067734).
- nvmet-fc: simplify sg list handling (bsc#1052384).
- nvmet: Fix fatal_err_work deadlock (bsc#1063349).
- ocfs2: fstrim: Fix start offset of first cluster group during fstrim (bnc#1012382).
- ocfs2: should wait dio before inode lock in ocfs2_setattr() (bnc#1012382).
- packet: avoid panic in packet_getsockopt() (bnc#1012382).
- packet: only test po-&gt;has_vnet_hdr once in packet_snd (bnc#1012382).
- parisc: Avoid trashing sr2 and sr3 in LWS code (bnc#1012382).
- parisc: Fix double-word compare and exchange in LWS code on 32-bit kernels (bnc#1012382).
- parisc: Fix validity check of pointer size argument in new CAS implementation (bnc#1012382).
- pci: Apply Cavium ThunderX ACS quirk to more Root Ports (bsc#1069250).
- pci: Apply _HPX settings only to relevant devices (bnc#1012382).
- pci: Enable Relaxed Ordering for Hisilicon Hip07 chip (bsc#1056652).
- pci: Mark Cavium CN8xxx to avoid bus reset (bsc#1069250).
- pci: Set Cavium ACS capability quirk flags to assert RR/CR/SV/UF (bsc#1069250).
- percpu: make this_cpu_generic_read() atomic w.r.t. interrupts (bnc#1012382).
- perf tools: Fix build failure on perl script context (bnc#1012382).
- perf tools: Only increase index if perf_evsel__new_idx() succeeds (bnc#1012382).
- perf/x86/intel/bts: Fix exclusive event reference leak (git-fixes d2878d642a4ed).
- phy: increase size of MII_BUS_ID_SIZE and bus_id (bnc#1012382).
- pkcs#7: fix unitialized boolean 'want' (bnc#1012382).
- pkcs7: Prevent NULL pointer dereference, since sinfo is not always set (bnc#1012382).
- platform/x86: acer-wmi: setup accelerometer when acpi device was found (bsc#1031717).
- platform/x86: hp-wmi: Do not shadow error values (bnc#1012382).
- platform/x86: hp-wmi: Fix detection for dock and tablet mode (bnc#1012382).
- platform/x86: hp-wmi: Fix error value for hp_wmi_tablet_state (bnc#1012382).
- platform/x86: intel_mid_thermal: Fix module autoload (bnc#1012382).
- platform/x86: sony-laptop: Fix error handling in sony_nc_setup_rfkill() (bsc#1031717).
- pm / OPP: Add missing of_node_put(np) (bnc#1012382).
- power: bq27xxx_battery: Fix bq27541 AveragePower register address (bsc#1031717).
- power: bq27xxx: fix reading for bq27000 and bq27010 (bsc#1031717).
- powerCap: Fix an error code in powercap_register_zone() (bsc#1031717).
- power: ipaq-micro-battery: freeing the wrong variable (bsc#1031717).
- powerpc/64: Fix race condition in setting lock bit in idle/wakeup code (bsc#1066223).
- powerpc/64s/hash: Allow MAP_FIXED allocations to cross 128TB boundary (bsc#1070169).
- powerpc/64s/hash: Fix 128TB-512TB virtual address boundary case allocation (bsc#1070169).
- powerpc/64s/hash: Fix 512T hint detection to use &gt;= 128T (bsc#1070169).
- powerpc/64s/hash: Fix fork() with 512TB process address space (bsc#1070169).
- powerpc/64s/slice: Use addr limit when computing slice mask (bsc#1070169).
- powerpc/bpf/jit: Disable classic BPF JIT on ppc64le (bsc#1066223).
- powerpc/corenet: explicitly disable the SDHC controller on kmcoge4 (bnc#1012382).
- powerpc: Correct instruction code for xxlor instruction (bsc#1066223).
- powerpc: Fix VSX enabling/flushing to also test MSR_FP and MSR_VEC (bsc#1066223).
- powerpc/hotplug: Improve responsiveness of hotplug change (FATE#322022, bsc#1067906).
- powerpc/mm: Fix check of multiple 16G pages from device tree (bsc#1066223).
- powerpc/mm: Fix virt_addr_valid() etc. on 64-bit hash (bsc#1066223).
- powerpc/mm/hash64: Fix subpage protection with 4K HPTE config (bsc#1010201, bsc#1066223).
- powerpc/mm/hash: Free the subpage_prot_table correctly (bsc#1066223).
- powerpc/numa: Fix multiple bugs in memory_hotplug_max() (bsc#1066223).
- powerpc/numa: Fix whitespace in hot_add_drconf_memory_max() (bsc#1066223).
- powerpc/opal: Fix EBUSY bug in acquiring tokens (bsc#1066223).
- powerpc/powernv/ioda: Fix endianness when reading TCEs (bsc#1066223).
- powerpc/powernv: Make opal_event_shutdown() callable from IRQ context (bsc#1066223).
- powerpc/pseries/vio: Dispose of virq mapping on vdevice unregister (bsc#1067888).
- powerpc/signal: Properly handle return value from uprobe_deny_signal() (bsc#1066223).
- powerpc/sysrq: Fix oops whem ppmu is not registered (bsc#1066223).
- powerpc/vphn: Fix numa update end-loop bug (FATE#322022, bsc#1067906).
- powerpc/vphn: Improve recognition of PRRN/VPHN (FATE#322022, bsc#1067906).
- powerpc/vphn: Update CPU topology when VPHN enabled (FATE#322022, bsc#1067906).
- power: supply: bq27xxx_battery: Fix register map for BQ27510 and BQ27520 ('bsc#1069270').
- power: supply: isp1704: Fix unchecked return value of devm_kzalloc (bsc#1031717).
- power: supply: lp8788: prevent out of bounds array access (bsc#1031717).
- power_supply: tps65217-charger: Fix NULL deref during property export (bsc#1031717).
- ppp: fix race in ppp device destruction (bnc#1012382).
- printk/console: Always disable boot consoles that use init memory before it is freed (bsc#1063026).
- printk/console: Enhance the check for consoles using init memory (bsc#1063026).
- printk: include &lt;asm/sections.h&gt; instead of &lt;asm-generic/sections.h&gt; (bsc#1063026).
- printk: Make sure to wake up printk kthread from irq work for pending output (bnc#744692, bnc#789311).
- printk: only unregister boot consoles when necessary (bsc#1063026).
- qla2xxx: Fix cable swap (bsc#1043017).
- qla2xxx: Fix notify ack without timeout handling (bsc#1043017).
- qla2xxx: Fix re-login for Nport Handle in use (bsc#1043017).
- qla2xxx: fix stale memory access (bsc#1043017).
- qla2xxx: Login state machine stuck at GPDB (bsc#1043017).
- qla2xxx: Recheck session state after RSCN (bsc#1043017).
- qla2xxx: relogin is being triggered too fast (bsc#1043017).
- qla2xxx: Retry switch command on timed out (bsc#1043017).
- qla2xxx: Serialize gpnid (bsc#1043017).
- quota: Check for register_shrinker() failure (bsc#1070404).
- r8169: Do not increment tx_dropped in TX ring cleaning (bsc#1031717).
- rbd: set discard_alignment to zero (bsc#1064320).
- rbd: use GFP_NOIO for parent stat and data requests (bnc#1012382).
- rcu: Allow for page faults in NMI handlers (bnc#1012382).
- rdma/uverbs: Prevent leak of reserved field (bsc#1022595 FATE#322350).
- rds: rdma: return appropriate error on rdma map failures (bnc#1012382).
- Refresh patches with upstream commit ID (bsc#1067734)
- regulator: core: Limit propagation of parent voltage count and list (bsc#1070145).
- regulator: fan53555: fix I2C device ids (bnc#1012382).
- Revert 'crypto: xts - Add ECB dependency' (bnc#1012382).
- Revert 'drm: bridge: add DT bindings for TI ths8135' (bnc#1012382).
- Revert 'phy: increase size of MII_BUS_ID_SIZE and bus_id' (kabi).
- Revert 'sctp: do not peel off an assoc from one netns to another one' (bnc#1012382).
- Revert 'tty: goldfish: Fix a parameter of a call to free_irq' (bnc#1012382).
- Revert 'uapi: fix linux/rds.h userspace compilation errors' (bnc#1012382).
- rpm/kernel-binary.spec.in: add the kernel-binary dependencies to kernel-binary-base (bsc#1060333).
- rpm/kernel-binary.spec.in: Correct supplements for recent SLE products (bsc#1067494)
- rpm/kernel-binary.spec.in: only rewrite modules.dep if non-zero in size (bsc#1056979).
- rpm/package-descriptions:
- rtc: ds1307: Fix relying on reset value for weekday (bsc#1031717).
- rtc: ds1374: wdt: Fix issue with timeout scaling from secs to wdt ticks (bsc#1031717).
- rtc: ds1374: wdt: Fix stop/start ioctl always returning -EINVAL (bsc#1031717).
- rtc: rtc-nuc900: fix loop timeout test (bsc#1031717).
- rtc: sa1100: fix unbalanced clk_prepare_enable/clk_disable_unprepare (bsc#1031717).
- rtlwifi: fix uninitialized rtlhal-&gt;last_suspend_sec time (bnc#1012382).
- rtlwifi: rtl8192ee: Fix memory leak when loading firmware (bnc#1012382).
- rtlwifi: rtl8821ae: Fix connection lost problem (bnc#1012382).
- rtlwifi: rtl8821ae: Fix HW_VAR_NAV_UPPER operation (bsc#1031717).
- s390/dasd: check for device error pointer within state change interrupts (bnc#1012382).
- s390/disassembler: add missing end marker for e7 table (bnc#1012382).
- s390/disassembler: correct disassembly lines alignment (bsc#1070825).
- s390/disassembler: increase show_code buffer size (bnc#1070825, LTC#161577).
- s390/disassembler: increase show_code buffer size (LTC#161577 bnc#1012382 bnc#1070825).
- s390: fix transactional execution control register handling (bnc#1012382).
- s390/kbuild: enable modversions for symbols exported from asm (bnc#1012382).
- s390/mm: fix write access check in gup_huge_pmd() (bnc#1066974, LTC#160551).
- s390/qeth: allow hsuid configuration in DOWN state (bnc#1070825, LTC#161871).
- s390/qeth: issue STARTLAN as first IPA command (bnc#1012382).
- s390/qeth: use ip_lock for hsuid configuration (bnc#1070825, LTC#161871).
- s390/runtime instrumention: fix possible memory corruption (bnc#1012382).
- sched/autogroup: Fix autogroup_move_group() to never skip sched_move_task() (bnc#1012382).
- sched: Make resched_cpu() unconditional (bnc#1012382).
- sched/rt: Simplify the IPI based RT balancing logic (bnc#1012382).
- scsi: aacraid: Check for PCI state of device in a generic way (bsc#1022607, FATE#321673).
- scsi: aacraid: Fix controller initialization failure (FATE#320140).
- scsi: bfa: fix access to bfad_im_port_s (bsc#1065101).
- scsi: check for device state in __scsi_remove_target() (bsc#1072589).
- scsi_devinfo: cleanly zero-pad devinfo strings (bsc#1062941).
- scsi: fcoe: move fcoe_interface_remove() out of fcoe_interface_cleanup() (bsc#1039542).
- scsi: fcoe: open-code fcoe_destroy_work() for NETDEV_UNREGISTER (bsc#1039542).
- scsi: fcoe: separate out fcoe_vport_remove() (bsc#1039542).
- scsi: ipr: Fix scsi-mq lockdep issue (bsc#1066213).
- scsi: ipr: Set no_report_opcodes for RAID arrays (bsc#1066213).
- scsi: libiscsi: fix shifting of DID_REQUEUE host byte (bsc#1056003).
- scsi: lpfc: Add Buffer to Buffer credit recovery support (bsc#1052384).
- scsi: lpfc: Add changes to assist in NVMET debugging (bsc#1041873).
- scsi: lpfc: Add nvme initiator devloss support (bsc#1041873).
- scsi: lpfc: Adjust default value of lpfc_nvmet_mrq (bsc#1067735).
- scsi: lpfc: Break up IO ctx list into a separate get and put list (bsc#1045404).
- scsi: lpfc: change version to 11.4.0.4 (bsc#1067735).
- scsi: lpfc: convert info messages to standard messages (bsc#1052384).
- scsi: lpfc: Correct driver deregistrations with host nvme transport (bsc#1067735).
- scsi: lpfc: Correct issues with FAWWN and FDISCs (bsc#1052384).
- scsi: lpfc: correct nvme sg segment count check (bsc#1067735).
- scsi: lpfc: correct port registrations with nvme_fc (bsc#1067735).
- scsi: lpfc: Correct return error codes to align with nvme_fc transport (bsc#1052384).
- scsi: lpfc: Disable NPIV support if NVME is enabled (bsc#1067735).
- scsi: lpfc: Driver fails to detect direct attach storage array (bsc#1067735).
- scsi: lpfc: Expand WQE capability of every NVME hardware queue (bsc#1067735).
- scsi: lpfc: Extend RDP support (bsc#1067735).
- scsi: lpfc: Fix a precedence bug in lpfc_nvme_io_cmd_wqe_cmpl() (bsc#1056587).
- scsi: lpfc: Fix bad sgl reposting after 2nd adapter reset (bsc#1052384).
- scsi: lpfc: fix build issue if NVME_FC_TARGET is not defined (bsc#1040073).
- scsi: lpfc: Fix counters so outstandng NVME IO count is accurate (bsc#1041873).
- scsi: lpfc: Fix crash after bad bar setup on driver attachment (bsc#1067735).
- scsi: lpfc: Fix crash during driver unload with running nvme traffic (bsc#1067735).
- scsi: lpfc: Fix crash in lpfc_nvme_fcp_io_submit during LIP (bsc#1067735).
- scsi: lpfc: Fix crash in lpfc nvmet when fc port is reset (bsc#1052384).
- scsi: lpfc: Fix crash receiving ELS while detaching driver (bsc#1067735).
- scsi: lpfc: Fix display for debugfs queInfo (bsc#1067735).
- scsi: lpfc: Fix driver handling of nvme resources during unload (bsc#1067735).
- scsi: lpfc: Fix duplicate NVME rport entries and namespaces (bsc#1052384).
- scsi: lpfc: Fix FCP hba_wqidx assignment (bsc#1067735).
- scsi: lpfc: Fix handling of FCP and NVME FC4 types in Pt2Pt topology (bsc#1052384).
- scsi: lpfc: Fix hard lock up NMI in els timeout handling (bsc#1067735).
- scsi: lpfc: fix 'integer constant too large' error on 32bit archs (bsc#1052384).
- scsi: lpfc: Fix loop mode target discovery (bsc#1052384).
- scsi: lpfc: Fix lpfc nvme host rejecting IO with Not Ready message (bsc#1067735).
- scsi: lpfc: Fix Lun Priority level shown as NA (bsc#1041873).
- scsi: lpfc: Fix ndlp ref count for pt2pt mode issue RSCN (bsc#1067735).
- scsi: lpfc: Fix NVME LS abort_xri (bsc#1067735).
- scsi: lpfc: Fix nvme port role handling in sysfs and debugfs handlers (bsc#1041873).
- scsi: lpfc: Fix NVME PRLI handling during RSCN (bsc#1052384).
- scsi: lpfc: Fix nvme target failure after 2nd adapter reset (bsc#1052384).
- scsi: lpfc: Fix nvmet node ref count handling (bsc#1041873).
- scsi: lpfc: Fix oops if nvmet_fc_register_targetport fails (bsc#1067735).
- scsi: lpfc: Fix oops of nvme host during driver unload (bsc#1067735).
- scsi: lpfc: Fix oops when NVME Target is discovered in a nonNVME environment.
- scsi: lpfc: fix pci hot plug crash in list_add call (bsc#1067735).
- scsi: lpfc: fix pci hot plug crash in timer management routines (bsc#1067735).
- scsi: lpfc: Fix plogi collision that causes illegal state transition (bsc#1052384).
- scsi: lpfc: Fix Port going offline after multiple resets (bsc#1041873).
- scsi: lpfc: Fix PRLI retry handling when target rejects it (bsc#1041873).
- scsi: lpfc: Fix rediscovery on switch blade pull (bsc#1052384).
- scsi: lpfc: Fix relative offset error on large nvmet target ios (bsc#1052384).
- scsi: lpfc: Fix return value of board_mode store routine in case of online failure (bsc#1041873).
- scsi: lpfc: Fix secure firmware updates (bsc#1067735).
- scsi: lpfc: Fix System panic after loading the driver (bsc#1041873).
- scsi: lpfc: Fix transition nvme-i rport handling to nport only (bsc#1041873).
- scsi: lpfc: Fix vports not logging into target (bsc#1041873).
- scsi: lpfc: Fix warning messages when NVME_TARGET_FC not defined (bsc#1067735).
- scsi: lpfc: FLOGI failures are reported when connected to a private loop (bsc#1067735).
- scsi: lpfc: Handle XRI_ABORTED_CQE in soft IRQ (bsc#1067735).
- scsi: lpfc: Limit amount of work processed in IRQ (bsc#1052384).
- scsi: lpfc: Linux LPFC driver does not process all RSCNs (bsc#1067735).
- scsi: lpfc: lpfc version bump 11.4.0.3 (bsc#1052384).
- scsi: lpfc: Make ktime sampling more accurate (bsc#1067735).
- scsi: lpfc: Move CQ processing to a soft IRQ (bsc#1067735).
- scsi: lpfc: Null pointer dereference when log_verbose is set to 0xffffffff (bsc#1041873).
- scsi: lpfc: PLOGI failures during NPIV testing (bsc#1067735).
- scsi: lpfc: Raise maximum NVME sg list size for 256 elements (bsc#1067735).
- scsi: lpfc: Reduce log spew on controller reconnects (bsc#1067735).
- scsi: lpfc: remove console log clutter (bsc#1052384).
- scsi: lpfc: Revise NVME module parameter descriptions for better clarity (bsc#1067735).
- scsi: lpfc: Set missing abort context (bsc#1067735).
- scsi: lpfc: small sg cnt cleanup (bsc#1067735).
- scsi: lpfc: spin_lock_irq() is not nestable (bsc#1045404).
- scsi: lpfc: update driver version to 11.4.0.5 (bsc#1067735).
- scsi: lpfc: update to revision to 11.4.0.0 (bsc#1041873).
- scsi: megaraid_sas: mismatch of allocated MFI frame size and length exposed in MFI MPT pass through command (bsc#1066767).
- scsi: qla2xxx: Cleanup debug message IDs (bsc#1043017).
- scsi: qla2xxx: Correction to vha-&gt;vref_count timeout (bsc#1066812).
- scsi: qla2xxx: Fix name server relogin (bsc#1043017).
- scsi: qla2xxx: Fix path recovery (bsc#1043017).
- scsi: qla2xxx: Initialize Work element before requesting IRQs (bsc#1019675,FATE#321701).
- scsi: qla2xxx: Replace usage of spin_lock with spin_lock_irqsave (bsc#1043017).
- scsi: qla2xxx: Retain loop test for fwdump length exceeding buffer length (bsc#1043017).
- scsi: qla2xxx: Turn on FW option for exchange check (bsc#1043017).
- scsi: qla2xxx: Use BIT_6 to acquire FAWWPN from switch (bsc#1066812).
- scsi: qla2xxx: Use fabric name for Get Port Speed command (bsc#1066812).
- scsi: qla2xxx: Use flag PFLG_DISCONNECTED (bsc#1043017).
- scsi: reset wait for IO completion (bsc#996376).
- scsi: scsi_devinfo: fixup string compare (bsc#1062941). updated patches.fixes/scsi_devinfo-fixup-string-compare.patch to the version merged upstream.
- scsi: scsi_devinfo: handle non-terminated strings (bsc#1062941).
- scsi: scsi_dh_emc: return success in clariion_std_inquiry() (bnc#1012382).
- scsi: sd_zbc: Fix sd_zbc_read_zoned_characteristics() (bsc#1066812).
- scsi: sg: close race condition in sg_remove_sfp_usercontext() (bsc#1064206).
- scsi: sg: do not return bogus Sg_requests (bsc#1064206).
- scsi: sg: only check for dxfer_len greater than 256M (bsc#1064206).
- scsi: sg: Re-fix off by one in sg_fill_request_table() (bnc#1012382).
- scsi: ufs: add capability to keep auto bkops always enabled (bnc#1012382).
- scsi: ufs-qcom: Fix module autoload (bnc#1012382).
- scsi: zfcp: fix erp_action use-before-initialize in REC action trace (bnc#1012382).
- sctp: add the missing sock_owned_by_user check in sctp_icmp_redirect (bnc#1012382).
- sctp: do not peel off an assoc from one netns to another one (bnc#1012382).
- sctp: do not peel off an assoc from one netns to another one (bnc#1012382).
- sctp: potential read out of bounds in sctp_ulpevent_type_enabled() (bnc#1012382).
- sctp: reset owner sk for data chunks on out queues when migrating a sock (bnc#1012382).
- security/keys: add CONFIG_KEYS_COMPAT to Kconfig (bnc#1012382).
- selftests: firmware: add empty string and async tests (bnc#1012382).
- selftests: firmware: send expected errors to /dev/null (bnc#1012382).
- serial: 8250_fintek: Fix rs485 disablement on invalid ioctl() (bsc#1031717).
- serial: 8250_uniphier: fix serial port index in private data (bsc#1031717).
- serial: Fix serial console on SNI RM400 machines (bsc#1031717).
- serial: omap: Fix EFR write on RTS deassertion (bnc#1012382).
- serial: Remove unused port type (bsc#1066045).
- serial: sh-sci: Fix register offsets for the IRDA serial port (bnc#1012382).
- slub: do not merge cache if slub_debug contains a never-merge flag (bnc#1012382).
- smb3: Validate negotiate request must always be signed (bsc#1064597).
- smb: fix leak of validate negotiate info response buffer (bsc#1064597).
- smb: fix validate negotiate info uninitialised memory use (bsc#1064597).
- sparc64: Migrate hvcons irq to panicked cpu (bnc#1012382).
- spi: SPI_FSL_DSPI should depend on HAS_DMA (bnc#1012382).
- spi: uapi: spidev: add missing ioctl header (bnc#1012382).
- staging: iio: cdc: fix improper return value (bnc#1012382).
- staging: lustre: hsm: stack overrun in hai_dump_data_field (bnc#1012382).
- staging: lustre: llite: do not invoke direct_IO for the EOF case (bnc#1012382).
- staging: lustre: ptlrpc: skip lock if export failed (bnc#1012382).
- staging: r8712u: Fix Sparse warning in rtl871x_xmit.c (bnc#1012382).
- staging: rtl8188eu: fix incorrect ERROR tags from logs (bnc#1012382).
- staging: rtl8712: fixed little endian problem (bnc#1012382).
- staging: rtl8712u: Fix endian settings for structs describing network packets (bnc#1012382).
- sunrpc: Fix tracepoint storage issues with svc_recv and svc_rqst_status (bnc#1012382).
- supported.conf:
- supported.conf: add test_syctl to new kselftests-kmp package FATE#323821 As per FATE#323821 we will require new FATE requests per each new selftest driver. We do not want to support these module on production runs but we do want to support them for QA / testing uses. The compromise is to package them into its own package, this will be the kselftests-kmp package. Selftests can also be used as proof of concept vehicle for issues by customers or ourselves. Vanilla kernels do not get test_sysctl given that driver was using built-in defaults, this also means we cannot run sefltests on config/s390x/zfcpdump which does not enable modules. Likeweise, since we had to *change* the kernel for test_syctl, it it also means we can't test test_syctl with vanilla kernels. It should be possible with other selftests drivers if they are present in vanilla kernels though.
- supported.conf: Support spidev (bsc#1066696)
- sysctl: add unsigned int range support (FATE#323821)
- target: fix ALUA state file path truncation (bsc#1064606).
- target: Fix node_acl demo-mode + uncached dynamic shutdown regression (bnc#1012382).
- target: fix PR state file path truncation (bsc#1064606).
- target: Fix QUEUE_FULL + SCSI task attribute handling (bnc#1012382).
- target/iscsi: Fix unsolicited data seq_end_offset calculation (bnc#1012382 bsc#1036489).
- target/rbd: handle zero length UNMAP requests early (bsc#1064320).
- target/rbd: use target_configure_unmap_from_queue() helper (bsc#1064320).
- tcp/dccp: fix ireq-&gt;opt races (bnc#1012382).
- tcp/dccp: fix lockdep splat in inet_csk_route_req() (bnc#1012382).
- tcp/dccp: fix other lockdep splats accessing ireq_opt (bnc#1012382).
- tcp: do not mangle skb-&gt;cb[] in tcp_make_synack() (bnc#1012382).
- tcp: fix tcp_mtu_probe() vs highest_sack (bnc#1012382).
- test: firmware_class: report errors properly on failure (bnc#1012382).
- test_sysctl: add dedicated proc sysctl test driver (FATE#323821)
- test_sysctl: add generic script to expand on tests (FATE#323821)
- test_sysctl: add simple proc_dointvec() case (FATE#323821).
- test_sysctl: add simple proc_douintvec() case (bsc#323821).
- test_sysctl: fix sysctl.sh by making it executable (FATE#323821).
- test_sysctl: test against int proc_dointvec() array support (FATE#323821).
- test_sysctl: test against PAGE_SIZE for int (FATE#323821)
- timer: Prevent timer value 0 for MWAITX (bsc#1065717).
- tipc: fix link attribute propagation bug (bnc#1012382).
- tipc: use only positive error codes in messages (bnc#1012382).
- tools: firmware: check for distro fallback udev cancel rule (bnc#1012382).
- tpm: constify transmit data pointers (bsc#1020645, git-fixes).
- tpm: kabi: do not bother with added const (bsc#1020645, git-fixes).
- tpm_tis_spi: Use DMA-safe memory for SPI transfers (bsc#1020645, git-fixes).
- tracing/samples: Fix creation and deletion of simple_thread_fn creation (bnc#1012382).
- tun: allow positive return values on dev_get_valid_name() call (bnc#1012382).
- tun: bail out from tun_get_user() if the skb is empty (bnc#1012382).
- tun: call dev_get_valid_name() before register_netdevice() (bnc#1012382).
- tun/tap: sanitize TUNSETSNDBUF input (bnc#1012382).
- uapi: fix linux/mroute6.h userspace compilation errors (bnc#1012382).
- uapi: fix linux/rds.h userspace compilation error (bnc#1012382).
- uapi: fix linux/rds.h userspace compilation errors (bnc#1012382).
- uapi: fix linux/rds.h userspace compilation errors (bnc#1012382).
- udpv6: Fix the checksum computation when HW checksum does not apply (bnc#1012382).
- Update config files to enable spidev on arm64. (bsc#1066696)
- Update preliminary FC-NVMe patches to mainline status (bsc#1067734)
- usb: Add delay-init quirk for Corsair K70 LUX keyboards (bnc#1012382).
- usb: cdc_acm: Add quirk for Elatec TWN3 (bnc#1012382).
- usb: core: fix out-of-bounds access bug in usb_get_bos_descriptor() (bnc#1012382).
- usb: devio: Revert 'USB: devio: Do not corrupt user memory' (bnc#1012382).
- usb: dummy-hcd: Fix deadlock caused by disconnect detection (bnc#1012382).
- usb: gadget: composite: Fix use-after-free in usb_composite_overwrite_options (bnc#1012382).
- usb: hcd: initialize hcd-&gt;flags to 0 when rm hcd (bnc#1012382).
- usb: hub: Allow reset retry for USB2 devices on connect bounce (bnc#1012382).
- usb: musb: Check for host-mode using is_host_active() on reset interrupt (bnc#1012382).
- usb: musb: sunxi: Explicitly release USB PHY on exit (bnc#1012382).
- usb: quirks: add quirk for WORLDE MINI MIDI keyboard (bnc#1012382).
- usb: renesas_usbhs: Fix DMAC sequence for receiving zero-length packet (bnc#1012382).
- usb: serial: console: fix use-after-free after failed setup (bnc#1012382).
- usb: serial: cp210x: add support for ELV TFD500 (bnc#1012382).
- usb: serial: ftdi_sio: add id for Cypress WICED dev board (bnc#1012382).
- usb: serial: garmin_gps: fix I/O after failed probe and remove (bnc#1012382).
- usb: serial: garmin_gps: fix memory leak on probe errors (bnc#1012382).
- usb: serial: metro-usb: add MS7820 device id (bnc#1012382).
- usb: serial: option: add support for TP-Link LTE module (bnc#1012382).
- usb: serial: qcserial: add Dell DW5818, DW5819 (bnc#1012382).
- usb: serial: qcserial: add pid/vid for Sierra Wireless EM7355 fw update (bnc#1012382).
- usb: usbfs: compute urb-&gt;actual_length for isochronous (bnc#1012382).
- usb: usbtest: fix NULL pointer dereference (bnc#1012382).
- usb: xhci: Handle error condition in xhci_stop_device() (bnc#1012382).
- vfs: expedite unmount (bsc#1024412).
- video: fbdev: pmag-ba-fb: Remove bad `__init' annotation (bnc#1012382).
- video: udlfb: Fix read EDID timeout (bsc#1031717).
- vlan: fix a use-after-free in vlan_device_event() (bnc#1012382).
- vsock: use new wait API for vsock_stream_sendmsg() (bnc#1012382).
- vti: fix use after free in vti_tunnel_xmit/vti6_tnl_xmit (bnc#1012382).
- watchdog: kempld: fix gcc-4.3 build (bnc#1012382).
- workqueue: Fix NULL pointer dereference (bnc#1012382).
- workqueue: replace pool-&gt;manager_arb mutex with a flag (bnc#1012382).
- x86/acpi/cstate: Allow ACPI C1 FFH MWAIT use on AMD systems (bsc#1069879).
- x86/alternatives: Fix alt_max_short macro to really be a max() (bnc#1012382).
- x86/decoder: Add new TEST instruction pattern (bnc#1012382).
- x86/MCE/AMD: Always give panic severity for UC errors in kernel context (git-fixes bf80bbd7dcf5).
- x86/microcode/AMD: Add support for fam17h microcode loading (bsc#1068032).
- x86/microcode/intel: Disable late loading on model 79 (bnc#1012382).
- x86/mm: fix use-after-free of vma during userfaultfd fault (Git-fixes, bsc#1069916).
- x86/oprofile/ppro: Do not use __this_cpu*() in preemptible context (bnc#1012382).
- x86/uaccess, sched/preempt: Verify access_ok() context (bnc#1012382).
- xen: do not print error message in case of missing Xenstore entry (bnc#1012382).
- xen/events: events_fifo: Do not use {get,put}_cpu() in xen_evtchn_fifo_init() (bnc#1065600).
- xen: fix booting ballooned down hvm guest (bnc#1065600).
- xen/gntdev: avoid out of bounds access in case of partial gntdev_mmap() (bnc#1012382).
- xen/manage: correct return value check on xenbus_scanf() (bnc#1012382).
- xen-netback: fix error handling output (bnc#1065600).
- xen: x86: mark xen_find_pt_base as __init (bnc#1065600).
- xen: xenbus driver must not accept invalid transaction ids (bnc#1012382).
- zd1211rw: fix NULL-deref at probe (bsc#1031717).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-21"/>
	<updated date="2017-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010201">SUSE bug 1010201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012523">SUSE bug 1012523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015336">SUSE bug 1015336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015337">SUSE bug 1015337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015340">SUSE bug 1015340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015342">SUSE bug 1015342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015343">SUSE bug 1015343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019675">SUSE bug 1019675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020412">SUSE bug 1020412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020645">SUSE bug 1020645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022595">SUSE bug 1022595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022607">SUSE bug 1022607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024346">SUSE bug 1024346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024373">SUSE bug 1024373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024376">SUSE bug 1024376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024412">SUSE bug 1024412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032150">SUSE bug 1032150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036489">SUSE bug 1036489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036800">SUSE bug 1036800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037404">SUSE bug 1037404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037838">SUSE bug 1037838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038299">SUSE bug 1038299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039542">SUSE bug 1039542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040073">SUSE bug 1040073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041873">SUSE bug 1041873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042268">SUSE bug 1042268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042957">SUSE bug 1042957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042977">SUSE bug 1042977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042978">SUSE bug 1042978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043017">SUSE bug 1043017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045404">SUSE bug 1045404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046054">SUSE bug 1046054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046107">SUSE bug 1046107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047901">SUSE bug 1047901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047989">SUSE bug 1047989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048317">SUSE bug 1048317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048327">SUSE bug 1048327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048356">SUSE bug 1048356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050060">SUSE bug 1050060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050231">SUSE bug 1050231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051406">SUSE bug 1051406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051635">SUSE bug 1051635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051987">SUSE bug 1051987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052384">SUSE bug 1052384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053309">SUSE bug 1053309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055272">SUSE bug 1055272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056003">SUSE bug 1056003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056365">SUSE bug 1056365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056427">SUSE bug 1056427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056587">SUSE bug 1056587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056596">SUSE bug 1056596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056652">SUSE bug 1056652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056979">SUSE bug 1056979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057079">SUSE bug 1057079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057199">SUSE bug 1057199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057820">SUSE bug 1057820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058413">SUSE bug 1058413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059639">SUSE bug 1059639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060333">SUSE bug 1060333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061756">SUSE bug 1061756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062496">SUSE bug 1062496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062835">SUSE bug 1062835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062941">SUSE bug 1062941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063026">SUSE bug 1063026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063349">SUSE bug 1063349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063516">SUSE bug 1063516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064206">SUSE bug 1064206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064320">SUSE bug 1064320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064591">SUSE bug 1064591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064597">SUSE bug 1064597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064606">SUSE bug 1064606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064701">SUSE bug 1064701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064926">SUSE bug 1064926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065101">SUSE bug 1065101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065180">SUSE bug 1065180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065639">SUSE bug 1065639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065692">SUSE bug 1065692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065717">SUSE bug 1065717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065866">SUSE bug 1065866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065959">SUSE bug 1065959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066045">SUSE bug 1066045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066175">SUSE bug 1066175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066192">SUSE bug 1066192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066213">SUSE bug 1066213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066285">SUSE bug 1066285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066382">SUSE bug 1066382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066470">SUSE bug 1066470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066471">SUSE bug 1066471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066472">SUSE bug 1066472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066573">SUSE bug 1066573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066606">SUSE bug 1066606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066629">SUSE bug 1066629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066660">SUSE bug 1066660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066696">SUSE bug 1066696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066767">SUSE bug 1066767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066812">SUSE bug 1066812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066974">SUSE bug 1066974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067105">SUSE bug 1067105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067132">SUSE bug 1067132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067225">SUSE bug 1067225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067494">SUSE bug 1067494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067734">SUSE bug 1067734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067735">SUSE bug 1067735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067888">SUSE bug 1067888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067906">SUSE bug 1067906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068671">SUSE bug 1068671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068978">SUSE bug 1068978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068980">SUSE bug 1068980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068982">SUSE bug 1068982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069152">SUSE bug 1069152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069250">SUSE bug 1069250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069270">SUSE bug 1069270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069277">SUSE bug 1069277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069484">SUSE bug 1069484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069583">SUSE bug 1069583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069721">SUSE bug 1069721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069793">SUSE bug 1069793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069879">SUSE bug 1069879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069916">SUSE bug 1069916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069942">SUSE bug 1069942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069996">SUSE bug 1069996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070001">SUSE bug 1070001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070006">SUSE bug 1070006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070145">SUSE bug 1070145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070169">SUSE bug 1070169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070404">SUSE bug 1070404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070535">SUSE bug 1070535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070767">SUSE bug 1070767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070771">SUSE bug 1070771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070805">SUSE bug 1070805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070825">SUSE bug 1070825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070964">SUSE bug 1070964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071693">SUSE bug 1071693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071694">SUSE bug 1071694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071695">SUSE bug 1071695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071833">SUSE bug 1071833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072589">SUSE bug 1072589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744692">SUSE bug 744692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789311">SUSE bug 789311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964944">SUSE bug 964944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966170">SUSE bug 966170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966172">SUSE bug 966172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969470">SUSE bug 969470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979928">SUSE bug 979928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989261">SUSE bug 989261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996376">SUSE bug 996376</bugzilla>
	<cve impact="low" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000410/">CVE-2017-1000410 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000410">CVE-2017-1000410 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11600">CVE-2017-11600 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12193/">CVE-2017-12193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12193">CVE-2017-12193 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15115/">CVE-2017-15115 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15115">CVE-2017-15115 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16528/">CVE-2017-16528 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16528">CVE-2017-16528 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16536">CVE-2017-16536 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16537">CVE-2017-16537 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16645/">CVE-2017-16645 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16645">CVE-2017-16645 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16646/">CVE-2017-16646 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16646">CVE-2017-16646 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16994/">CVE-2017-16994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16994">CVE-2017-16994 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17448/">CVE-2017-17448 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17448">CVE-2017-17448 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17449/">CVE-2017-17449 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17449">CVE-2017-17449 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17450/">CVE-2017-17450 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17450">CVE-2017-17450 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7482/">CVE-2017-7482 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7482">CVE-2017-7482 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8824">CVE-2017-8824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552761" comment="kernel-default-4.4.103-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552762" comment="kernel-default-base-4.4.103-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552763" comment="kernel-default-devel-4.4.103-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552764" comment="kernel-default-man-4.4.103-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519640" comment="kernel-devel-4.4.103-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519641" comment="kernel-macros-4.4.103-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519642" comment="kernel-source-4.4.103-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552765" comment="kernel-syms-4.4.103-6.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149446" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1070162" ref_url="https://bugzilla.suse.com/1070162" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10293" ref_url="https://www.suse.com/security/cve/CVE-2017-10293/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10309" ref_url="https://www.suse.com/security/cve/CVE-2017-10309/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003551.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Security issues fixed:

- Security update to version 8.0.5.5 (bsc#1070162)
  * CVE-2017-10346 CVE-2017-10285 CVE-2017-10388 CVE-2017-10309
    CVE-2017-10356 CVE-2017-10293 CVE-2016-9841  CVE-2016-10165
    CVE-2017-10355 CVE-2017-10357 CVE-2017-10348 CVE-2017-10349
    CVE-2017-10347 CVE-2017-10350 CVE-2017-10281 CVE-2017-10295
    CVE-2017-10345
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-22"/>
	<updated date="2017-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10165">CVE-2016-10165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9841">CVE-2016-9841 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10281">CVE-2017-10281 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10285">CVE-2017-10285 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10293/">CVE-2017-10293 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10293">CVE-2017-10293 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10295">CVE-2017-10295 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10309/">CVE-2017-10309 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10309">CVE-2017-10309 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10345">CVE-2017-10345 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10346">CVE-2017-10346 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10347">CVE-2017-10347 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10348">CVE-2017-10348 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10349">CVE-2017-10349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10350">CVE-2017-10350 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10355">CVE-2017-10355 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10356">CVE-2017-10356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10357">CVE-2017-10357 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10388">CVE-2017-10388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009547803" comment="java-1_8_0-ibm-1.8.0_sr5.5-30.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009535147" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.5-30.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009535149" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.5-30.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149447" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1046856" ref_url="https://bugzilla.suse.com/1046856" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000083" ref_url="https://www.suse.com/security/cve/CVE-2017-1000083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003552.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issues:

Security issue fixed:

- CVE-2017-1000083: Remove support for tar and tar-like commands in comics backend (bsc#1046856).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-22"/>
	<updated date="2017-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046856">SUSE bug 1046856</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000083/">CVE-2017-1000083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000083">CVE-2017-1000083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549951" comment="evince-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549952" comment="evince-browser-plugin-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518422" comment="evince-lang-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549953" comment="evince-plugin-djvudocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549954" comment="evince-plugin-dvidocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549955" comment="evince-plugin-pdfdocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549956" comment="evince-plugin-psdocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549957" comment="evince-plugin-tiffdocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549958" comment="evince-plugin-xpsdocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549959" comment="libevdocument3-4-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549960" comment="libevview3-3-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549961" comment="nautilus-evince-3.20.2-6.19.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149448" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1070727" ref_url="https://bugzilla.suse.com/1070727" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17083" ref_url="https://www.suse.com/security/cve/CVE-2017-17083/" source="CVE"/>
		<reference ref_id="CVE-2017-17084" ref_url="https://www.suse.com/security/cve/CVE-2017-17084/" source="CVE"/>
		<reference ref_id="CVE-2017-17085" ref_url="https://www.suse.com/security/cve/CVE-2017-17085/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003554.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:
 
 - CVE-2017-17083: NetBIOS dissector could crash. This was addressed in 
   epan/dissectors/packet-netbios.c by ensuring that write operations are bounded by the beginning of a buffer. (bsc#1070727)
 - CVE-2017-17084: IWARP_MPA dissector could crash. This was addressed in epan/dissectors/packet-iwarp-mpa.c by 
   validating a ULPDU length. (bsc#1070727)
 - CVE-2017-17085: the CIP Safety dissector could crash. This was addressed in epan/dissectors/packet-cipsafety.c 
   by validating the packet length. (bsc#1070727)

 		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-27"/>
	<updated date="2017-12-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1070727">SUSE bug 1070727</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17083/">CVE-2017-17083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17083">CVE-2017-17083 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17084/">CVE-2017-17084 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17084">CVE-2017-17084 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17085/">CVE-2017-17085 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17085">CVE-2017-17085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549962" comment="libwireshark8-2.2.11-48.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549963" comment="libwiretap6-2.2.11-48.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549964" comment="libwscodecs1-2.2.11-48.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549965" comment="libwsutil7-2.2.11-48.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549966" comment="wireshark-2.2.11-48.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549967" comment="wireshark-gtk-2.2.11-48.15.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149449" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1053417" ref_url="https://bugzilla.suse.com/1053417" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003556.html" source="SUSE-SU"/>
		<description>

This update for gdk-pixbuf provides the following fixes:

- Add overflow checks when creating pixbuf structures in general
- Fix arithmetic overflow in the BMP loader (bsc#1053417) 
- Adds support for BMPv3 with bitmasks (bsc#1053417) 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-27"/>
	<updated date="2017-12-27"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1053417">SUSE bug 1053417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518440" comment="gdk-pixbuf-lang-2.34.0-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549968" comment="gdk-pixbuf-query-loaders-2.34.0-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549969" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549970" comment="libgdk_pixbuf-2_0-0-2.34.0-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549971" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549972" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149450" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1070162" ref_url="https://bugzilla.suse.com/1070162" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10293" ref_url="https://www.suse.com/security/cve/CVE-2017-10293/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003557.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Security update to version 7.1.4.15 [bsc#1070162]
  
  * CVE-2017-10349: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10348: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10388: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2016-9841:  'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10293: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10345: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10350: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10356: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10357: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10347: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10355: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10285: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10281: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10295: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10346: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2016-10165: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'
  
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-29"/>
	<updated date="2017-12-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10165">CVE-2016-10165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9841">CVE-2016-9841 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10281">CVE-2017-10281 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10285">CVE-2017-10285 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10293/">CVE-2017-10293 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10293">CVE-2017-10293 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10295">CVE-2017-10295 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10345">CVE-2017-10345 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10346">CVE-2017-10346 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10347">CVE-2017-10347 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10348">CVE-2017-10348 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10349">CVE-2017-10349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10350">CVE-2017-10350 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10355">CVE-2017-10355 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10356">CVE-2017-10356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10357">CVE-2017-10357 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10388">CVE-2017-10388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545271" comment="java-1_7_1-ibm-1.7.1_sr4.15-38.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009535151" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.15-38.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545272" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.15-38.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009535154" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.15-38.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149451" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1056993" ref_url="https://bugzilla.suse.com/1056993" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6362" ref_url="https://www.suse.com/security/cve/CVE-2017-6362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003613.html" source="SUSE-SU"/>
		<description>
This update for gd fixes one issues.

This security issue was fixed:

- CVE-2017-6362: Prevent double-free in gdImagePngPtr() that potentially allowed for DoS or remote code execution (bsc#1056993).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-18"/>
	<updated date="2018-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056993">SUSE bug 1056993</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6362/">CVE-2017-6362 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6362">CVE-2017-6362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550380" comment="gd-2.1.0-24.3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149452" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk-thunderxdpdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1089638" ref_url="https://bugzilla.suse.com/1089638" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1059" ref_url="https://www.suse.com/security/cve/CVE-2018-1059/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004108.html" source="SUSE-SU"/>
		<description>

  This update fixes the following issues:
  
  - CVE-2018-1059: The DPDK vhost-user interface does not check to verify that all the requested guest 
    physical range is mapped and contiguous when performing Guest Physical Addresses to Host Virtual Addresses 
    translations. This may lead to a malicious guest exposing vhost-user backend process memory. 
    All versions before 18.02.1 are vulnerable. (bsc#1089638).

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-03"/>
	<updated date="2018-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089638">SUSE bug 1089638</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1059/">CVE-2018-1059 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1059">CVE-2018-1059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552766" comment="dpdk-16.11.6-8.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552767" comment="dpdk-kmp-default-16.11.6_k4.4.126_94.22-8.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552768" comment="dpdk-thunderx-16.11.6-8.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552769" comment="dpdk-thunderx-kmp-default-16.11.6_k4.4.126_94.22-8.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552770" comment="dpdk-tools-16.11.6-8.4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149453" version="1" class="patch">
	<metadata>
		<title>Security update for xdg-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1093086" ref_url="https://bugzilla.suse.com/1093086" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18266" ref_url="https://www.suse.com/security/cve/CVE-2017-18266/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004111.html" source="SUSE-SU"/>
		<description>
This update for xdg-utils fixes the following issues:

Security issue:

- CVE-2017-18266: Fix an argument injection when BROWSER contains %s (bsc#1093086).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-04"/>
	<updated date="2018-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1093086">SUSE bug 1093086</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18266/">CVE-2017-18266 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18266">CVE-2017-18266 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519644" comment="xdg-utils-20140630-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149454" version="1" class="patch">
	<metadata>
		<title>Security update for oracleasm kmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004113.html" source="SUSE-SU"/>
		<description>

This update provides rebuilt kernel modules for SUSE Linux Enterprise 12 SP3 products
with retpoline enablement to address Spectre Variant 2 (CVE-2017-5715 bsc#1068032).

Following modules have been rebuilt:

- drbd
- oracleasm
- crash
- lttng-modules

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552771" comment="crash-7.1.8-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552772" comment="crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552773" comment="lttng-modules-2.7.1-8.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552774" comment="lttng-modules-kmp-default-2.7.1_k4.4.131_94.29-8.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552775" comment="oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149455" version="1" class="patch">
	<metadata>
		<title>Security update for xmltooling (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1075975" ref_url="https://bugzilla.suse.com/1075975" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0486" ref_url="https://www.suse.com/security/cve/CVE-2018-0486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003614.html" source="SUSE-SU"/>
		<description>
This update for xmltooling fixes the following issues:

- CVE-2018-0486: Fixed a security bug when xmltooling mishandles digital
  signatures of user attribute data, which allows remote attackers to obtain
  sensitive information or conduct impersonation attacks via a crafted DTD
  (bsc#1075975)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-19"/>
	<updated date="2018-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1075975">SUSE bug 1075975</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0486/">CVE-2018-0486 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0486">CVE-2018-0486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550381" comment="libxmltooling6-1.5.6-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550382" comment="xmltooling-schemas-1.5.6-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149456" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1086690" ref_url="https://bugzilla.suse.com/1086690" source="BUGZILLA"/>
		<reference ref_id="1094150" ref_url="https://bugzilla.suse.com/1094150" source="BUGZILLA"/>
		<reference ref_id="1094154" ref_url="https://bugzilla.suse.com/1094154" source="BUGZILLA"/>
		<reference ref_id="1094161" ref_url="https://bugzilla.suse.com/1094161" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18269" ref_url="https://www.suse.com/security/cve/CVE-2017-18269/" source="CVE"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<reference ref_id="CVE-2018-11237" ref_url="https://www.suse.com/security/cve/CVE-2018-11237/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004156.html" source="SUSE-SU"/>
		<description>

  
This update for glibc fixes the following issues:

- CVE-2017-18269: Fix SSE2 memmove issue when crossing 2GB boundary (bsc#1094150)
- CVE-2018-11236: Fix overflow in path length computation (bsc#1094161)
- CVE-2018-11237: Don't write beyond buffer destination in __mempcpy_avx512_no_vzeroupper (bsc#1094154)

Non security bugs fixed:

- Fix crash in resolver on memory allocation failure (bsc#1086690)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-06"/>
	<updated date="2018-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1086690">SUSE bug 1086690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094150">SUSE bug 1094150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094154">SUSE bug 1094154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094161">SUSE bug 1094161</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18269/">CVE-2017-18269 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18269">CVE-2017-18269 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11236">CVE-2018-11236 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11237/">CVE-2018-11237 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11237">CVE-2018-11237 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552776" comment="glibc-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550384" comment="glibc-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552777" comment="glibc-devel-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550386" comment="glibc-devel-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530084" comment="glibc-html-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519650" comment="glibc-i18ndata-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530085" comment="glibc-info-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552778" comment="glibc-locale-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550388" comment="glibc-locale-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552779" comment="glibc-profile-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550390" comment="glibc-profile-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552780" comment="nscd-2.22-62.13.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149457" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1095218" ref_url="https://bugzilla.suse.com/1095218" source="BUGZILLA"/>
		<reference ref_id="1095219" ref_url="https://bugzilla.suse.com/1095219" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11233" ref_url="https://www.suse.com/security/cve/CVE-2018-11233/" source="CVE"/>
		<reference ref_id="CVE-2018-11235" ref_url="https://www.suse.com/security/cve/CVE-2018-11235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004159.html" source="SUSE-SU"/>
		<description>
This update for git fixes several issues.

These security issues were fixed:

- CVE-2018-11233: Path sanity-checks on NTFS allowed attackers to read arbitrary memory (bsc#1095218)
- CVE-2018-11235: Arbitrary code execution when recursively cloning a malicious repository (bsc#1095219)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-07"/>
	<updated date="2018-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1095218">SUSE bug 1095218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095219">SUSE bug 1095219</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11233/">CVE-2018-11233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11233">CVE-2018-11233 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11235/">CVE-2018-11235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11235">CVE-2018-11235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541492" comment="git-core-2.12.3-27.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149458" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1091070" ref_url="https://bugzilla.suse.com/1091070" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10392" ref_url="https://www.suse.com/security/cve/CVE-2018-10392/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004158.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:
  
The following security issue was fixed:
  
- Fixed the validation of channels in mapping0_forward(), which previously
  allowed remote attackers to cause a denial of service via specially crafted
  files (CVE-2018-10392, bsc#1091070)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-07"/>
	<updated date="2018-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091070">SUSE bug 1091070</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10392/">CVE-2018-10392 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10392">CVE-2018-10392 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552781" comment="libvorbis-doc-1.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552782" comment="libvorbis0-1.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552783" comment="libvorbis0-32bit-1.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552784" comment="libvorbisenc2-1.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552785" comment="libvorbisenc2-32bit-1.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552786" comment="libvorbisfile3-1.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552787" comment="libvorbisfile3-32bit-1.3.3-10.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149459" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1095735" ref_url="https://bugzilla.suse.com/1095735" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004162.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

This security issue was fixed:

- CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker
  with local user access caused by speculative execution and indirect branch
  prediction (bsc#1095735)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-07"/>
	<updated date="2018-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095735">SUSE bug 1095735</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519660" comment="kernel-firmware-20170530-21.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519661" comment="ucode-amd-20170530-21.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149460" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1045939" ref_url="https://bugzilla.suse.com/1045939" source="BUGZILLA"/>
		<reference ref_id="1059066" ref_url="https://bugzilla.suse.com/1059066" source="BUGZILLA"/>
		<reference ref_id="1059101" ref_url="https://bugzilla.suse.com/1059101" source="BUGZILLA"/>
		<reference ref_id="1059155" ref_url="https://bugzilla.suse.com/1059155" source="BUGZILLA"/>
		<reference ref_id="1060220" ref_url="https://bugzilla.suse.com/1060220" source="BUGZILLA"/>
		<reference ref_id="1061092" ref_url="https://bugzilla.suse.com/1061092" source="BUGZILLA"/>
		<reference ref_id="1061263" ref_url="https://bugzilla.suse.com/1061263" source="BUGZILLA"/>
		<reference ref_id="1061264" ref_url="https://bugzilla.suse.com/1061264" source="BUGZILLA"/>
		<reference ref_id="1061265" ref_url="https://bugzilla.suse.com/1061265" source="BUGZILLA"/>
		<reference ref_id="1064593" ref_url="https://bugzilla.suse.com/1064593" source="BUGZILLA"/>
		<reference ref_id="1074453" ref_url="https://bugzilla.suse.com/1074453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000456" ref_url="https://www.suse.com/security/cve/CVE-2017-1000456/" source="CVE"/>
		<reference ref_id="CVE-2017-14517" ref_url="https://www.suse.com/security/cve/CVE-2017-14517/" source="CVE"/>
		<reference ref_id="CVE-2017-14518" ref_url="https://www.suse.com/security/cve/CVE-2017-14518/" source="CVE"/>
		<reference ref_id="CVE-2017-14520" ref_url="https://www.suse.com/security/cve/CVE-2017-14520/" source="CVE"/>
		<reference ref_id="CVE-2017-14617" ref_url="https://www.suse.com/security/cve/CVE-2017-14617/" source="CVE"/>
		<reference ref_id="CVE-2017-14928" ref_url="https://www.suse.com/security/cve/CVE-2017-14928/" source="CVE"/>
		<reference ref_id="CVE-2017-14975" ref_url="https://www.suse.com/security/cve/CVE-2017-14975/" source="CVE"/>
		<reference ref_id="CVE-2017-14976" ref_url="https://www.suse.com/security/cve/CVE-2017-14976/" source="CVE"/>
		<reference ref_id="CVE-2017-14977" ref_url="https://www.suse.com/security/cve/CVE-2017-14977/" source="CVE"/>
		<reference ref_id="CVE-2017-15565" ref_url="https://www.suse.com/security/cve/CVE-2017-15565/" source="CVE"/>
		<reference ref_id="CVE-2017-9865" ref_url="https://www.suse.com/security/cve/CVE-2017-9865/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004186.html" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

These security issues were fixed:

- CVE-2017-14517: Prevent NULL Pointer dereference in the XRef::parseEntry()
  function via a crafted PDF document (bsc#1059066).
- CVE-2017-9865: Fixed a stack-based buffer overflow vulnerability
  in GfxState.cc that would have allowed attackers to facilitate
  a denial-of-service attack via specially crafted PDF
  documents. (bsc#1045939)
- CVE-2017-14518: Remedy a floating point exception in
  isImageInterpolationRequired() that could have been exploited using a
  specially crafted PDF document. (bsc#1059101)
- CVE-2017-14520: Remedy a floating point exception in
  Splash::scaleImageYuXd() that could have been exploited using a specially
  crafted PDF document. (bsc#1059155)
- CVE-2017-14617: Fixed a floating point exception in Stream.cc,
  which may lead to a potential attack when handling malicious PDF
  files. (bsc#1060220)
- CVE-2017-14928: Fixed a NULL Pointer dereference in
  AnnotRichMedia::Configuration::Configuration() in Annot.cc, which may
  lead to a potential attack when handling malicious PDF
  files. (bsc#1061092)
- CVE-2017-14975: Fixed a NULL pointer dereference vulnerability,
  that existed because a data structure in FoFiType1C.cc was not
  initialized, which allowed an attacker to launch a denial of service
  attack. (bsc#1061263)
- CVE-2017-14976: Fixed a heap-based buffer over-read vulnerability in
  FoFiType1C.cc that occurred when an out-of-bounds font dictionary index
  was encountered, which allowed an attacker to launch a denial of service
  attack. (bsc#1061264)
- CVE-2017-14977: Fixed a NULL pointer dereference vulnerability in the
  FoFiTrueType::getCFFBlock() function in FoFiTrueType.cc that occurred
  due to lack of validation of a table pointer, which allows an attacker
  to launch a denial of service attack. (bsc#1061265)
- CVE-2017-15565: Prevent NULL Pointer dereference in the
  GfxImageColorMap::getGrayLine() function via a crafted PDF document
  (bsc#1064593).
- CVE-2017-1000456: Validate boundaries in TextPool::addWord to prevent
  overflows in subsequent calculations (bsc#1074453).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-12"/>
	<updated date="2018-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1045939">SUSE bug 1045939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059066">SUSE bug 1059066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059101">SUSE bug 1059101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059155">SUSE bug 1059155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060220">SUSE bug 1060220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061092">SUSE bug 1061092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061263">SUSE bug 1061263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061264">SUSE bug 1061264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061265">SUSE bug 1061265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064593">SUSE bug 1064593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074453">SUSE bug 1074453</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000456/">CVE-2017-1000456 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000456">CVE-2017-1000456 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14517/">CVE-2017-14517 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14517">CVE-2017-14517 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14518/">CVE-2017-14518 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14518">CVE-2017-14518 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14520/">CVE-2017-14520 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14520">CVE-2017-14520 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14617/">CVE-2017-14617 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14617">CVE-2017-14617 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14928/">CVE-2017-14928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14928">CVE-2017-14928 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14975/">CVE-2017-14975 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14975">CVE-2017-14975 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14976/">CVE-2017-14976 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14976">CVE-2017-14976 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14977/">CVE-2017-14977 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14977">CVE-2017-14977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15565/">CVE-2017-15565 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15565">CVE-2017-15565 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9865/">CVE-2017-9865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9865">CVE-2017-9865 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552788" comment="libpoppler-glib8-0.43.0-16.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552789" comment="libpoppler-qt4-4-0.43.0-16.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552790" comment="libpoppler60-0.43.0-16.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552791" comment="poppler-tools-0.43.0-16.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149461" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1091836" ref_url="https://bugzilla.suse.com/1091836" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:1661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004185.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Update to version 20180425 (bsc#1091836)

Fix provided for:

- GLK          B0       6-7a-1/01 0000001e-&gt;00000022 Pentium Silver N/J5xxx, Celeron N/J4xxx

- Name microcodes which are not allowed to load late
  with a *.early suffix
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-12"/>
	<updated date="2018-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091836">SUSE bug 1091836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519666" comment="ucode-intel-20180425-13.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149462" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1081024" ref_url="https://bugzilla.suse.com/1081024" source="BUGZILLA"/>
		<reference ref_id="1093664" ref_url="https://bugzilla.suse.com/1093664" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1057" ref_url="https://www.suse.com/security/cve/CVE-2018-1057/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004187.html" source="SUSE-SU"/>
		<description>

  
Samba was updated to 4.6.14, fixing bugs and security issues:

Version update to 4.6.14 (bsc#1093664):

+ vfs_ceph: add fake async pwrite/pread send/recv hooks; (bso#13425).
+ Fix memory leak in vfs_ceph; (bso#13424).
+ winbind: avoid using fstrcpy(dcname,...) in _dual_init_connection;
  (bso#13294).
+ s3:smb2_server: correctly maintain request counters for compound
  requests; (bso#13215).
+ s3: smbd: Unix extensions attempts to change wrong field in fchown
  call; (bso#13375).
+ s3:smbd: map nterror on smb2_flush errorpath; (bso#13338).
+ vfs_glusterfs: Fix the wrong pointer being sent in glfs_fsync_async;
  (bso#13297).
+ s3: smbd: Fix possible directory fd leak if the underlying OS doesn't
  support fdopendir(); (bso#13270).
+ s3: ldap: Ensure the ADS_STRUCT pointer doesn't get freed on error, we
  don't own it here; (bso#13244).
+ s3:libsmb: allow -U'\\administrator' to work; (bso#13206).
+ CVE-2018-1057: s4:dsdb: fix unprivileged password changes;
  (bso#13272); (bsc#1081024).
+ s3:smbd: Do not crash if we fail to init the session table;
  (bso#13315).
+ libsmb: Use smb2 tcon if conn_protocol &gt;= SMB2_02; (bso#13310).
+ smbXcli: Add 'force_channel_sequence'; (bso#13215).
+ smbd: Fix channel sequence number checks for long-running requests;
  (bso#13215).
+ s3:smb2_server: allow logoff, close, unlock, cancel and echo on
  expired sessions; (bso#13197).
+ s3:smbd: return the correct error for cancelled SMB2 notifies on
  expired sessions; (bso#13197).
+ samba: Only use async signal-safe functions in signal handler;
  (bso#13240).
+ subnet: Avoid a segfault when renaming subnet objects; (bso#13031).

- Fix vfs_ceph with 'aio read size' or 'aio write size' &gt; 0;
  (bsc#1093664).
  + vfs_ceph: add fake async pwrite/pread send/recv hooks; (bso#13425).
  + Fix memory leak in vfs_ceph; (bso#13424).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-13"/>
	<updated date="2018-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081024">SUSE bug 1081024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093664">SUSE bug 1093664</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1057/">CVE-2018-1057 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1057">CVE-2018-1057 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552792" comment="libdcerpc-binding0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552793" comment="libdcerpc-binding0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552794" comment="libdcerpc0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552795" comment="libdcerpc0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552796" comment="libndr-krb5pac0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552797" comment="libndr-krb5pac0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552798" comment="libndr-nbt0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552799" comment="libndr-nbt0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552800" comment="libndr-standard0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552801" comment="libndr-standard0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552802" comment="libndr0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552803" comment="libndr0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552804" comment="libnetapi0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552805" comment="libnetapi0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552806" comment="libsamba-credentials0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552807" comment="libsamba-credentials0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552808" comment="libsamba-errors0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552809" comment="libsamba-errors0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552810" comment="libsamba-hostconfig0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552811" comment="libsamba-hostconfig0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552812" comment="libsamba-passdb0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552813" comment="libsamba-passdb0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552814" comment="libsamba-util0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552815" comment="libsamba-util0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552816" comment="libsamdb0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552817" comment="libsamdb0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552818" comment="libsmbclient0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552819" comment="libsmbclient0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552820" comment="libsmbconf0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552821" comment="libsmbconf0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552822" comment="libsmbldap0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552823" comment="libsmbldap0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552824" comment="libtevent-util0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552825" comment="libtevent-util0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552826" comment="libwbclient0-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552827" comment="libwbclient0-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552828" comment="samba-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552829" comment="samba-client-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552830" comment="samba-client-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519706" comment="samba-doc-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552831" comment="samba-libs-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552832" comment="samba-libs-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552833" comment="samba-winbind-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552834" comment="samba-winbind-32bit-4.6.14+git.150.1540e575faf-3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149463" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1087066" ref_url="https://bugzilla.suse.com/1087066" source="BUGZILLA"/>
		<reference ref_id="1090023" ref_url="https://bugzilla.suse.com/1090023" source="BUGZILLA"/>
		<reference ref_id="1090024" ref_url="https://bugzilla.suse.com/1090024" source="BUGZILLA"/>
		<reference ref_id="1090025" ref_url="https://bugzilla.suse.com/1090025" source="BUGZILLA"/>
		<reference ref_id="1090026" ref_url="https://bugzilla.suse.com/1090026" source="BUGZILLA"/>
		<reference ref_id="1090027" ref_url="https://bugzilla.suse.com/1090027" source="BUGZILLA"/>
		<reference ref_id="1090028" ref_url="https://bugzilla.suse.com/1090028" source="BUGZILLA"/>
		<reference ref_id="1090029" ref_url="https://bugzilla.suse.com/1090029" source="BUGZILLA"/>
		<reference ref_id="1090030" ref_url="https://bugzilla.suse.com/1090030" source="BUGZILLA"/>
		<reference ref_id="1090032" ref_url="https://bugzilla.suse.com/1090032" source="BUGZILLA"/>
		<reference ref_id="1090033" ref_url="https://bugzilla.suse.com/1090033" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2815" ref_url="https://www.suse.com/security/cve/CVE-2018-2815/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u171 fixes the following issues:

These security issues were fixed:

- S8180881: Better packaging of deserialization
- S8182362: Update CipherOutputStream Usage
- S8183032: Upgrade to LittleCMS 2.9
- S8189123: More consistent classloading
- S8189969, CVE-2018-2790, bsc#1090023: Manifest better manifest entries
- S8189977, CVE-2018-2795, bsc#1090025: Improve permission portability
- S8189981, CVE-2018-2796, bsc#1090026: Improve queuing portability
- S8189985, CVE-2018-2797, bsc#1090027: Improve tabular data portability
- S8189989, CVE-2018-2798, bsc#1090028: Improve container portability
- S8189993, CVE-2018-2799, bsc#1090029: Improve document portability
- S8189997, CVE-2018-2794, bsc#1090024: Enhance keystore mechanisms
- S8190478: Improved interface method selection
- S8190877: Better handling of abstract classes
- S8191696: Better mouse positioning
- S8192025, CVE-2018-2814, bsc#1090032: Less referential references
- S8192030: Better MTSchema support
- S8192757, CVE-2018-2815, bsc#1090033: Improve stub classes implementation
- S8193409: Improve AES supporting classes
- S8193414: Improvements in MethodType lookups
- S8193833, CVE-2018-2800, bsc#1090030: Better RMI connection support

For other changes please consult the changelog.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087066">SUSE bug 1087066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090023">SUSE bug 1090023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090024">SUSE bug 1090024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090025">SUSE bug 1090025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090026">SUSE bug 1090026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090027">SUSE bug 1090027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090028">SUSE bug 1090028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090029">SUSE bug 1090029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090030">SUSE bug 1090030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090032">SUSE bug 1090032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090033">SUSE bug 1090033</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2790">CVE-2018-2790 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2794">CVE-2018-2794 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2795">CVE-2018-2795 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2796">CVE-2018-2796 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2797">CVE-2018-2797 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2798">CVE-2018-2798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2799">CVE-2018-2799 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2800">CVE-2018-2800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2814">CVE-2018-2814 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2815/">CVE-2018-2815 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2815">CVE-2018-2815 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552835" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552836" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552837" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552838" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149464" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1090023" ref_url="https://bugzilla.suse.com/1090023" source="BUGZILLA"/>
		<reference ref_id="1090024" ref_url="https://bugzilla.suse.com/1090024" source="BUGZILLA"/>
		<reference ref_id="1090025" ref_url="https://bugzilla.suse.com/1090025" source="BUGZILLA"/>
		<reference ref_id="1090026" ref_url="https://bugzilla.suse.com/1090026" source="BUGZILLA"/>
		<reference ref_id="1090027" ref_url="https://bugzilla.suse.com/1090027" source="BUGZILLA"/>
		<reference ref_id="1090028" ref_url="https://bugzilla.suse.com/1090028" source="BUGZILLA"/>
		<reference ref_id="1090029" ref_url="https://bugzilla.suse.com/1090029" source="BUGZILLA"/>
		<reference ref_id="1090030" ref_url="https://bugzilla.suse.com/1090030" source="BUGZILLA"/>
		<reference ref_id="1090032" ref_url="https://bugzilla.suse.com/1090032" source="BUGZILLA"/>
		<reference ref_id="1090033" ref_url="https://bugzilla.suse.com/1090033" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2815" ref_url="https://www.suse.com/security/cve/CVE-2018-2815/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk to version 7u181 fixes the following issues:

+ S8162488: JDK should be updated to use LittleCMS 2.8
+ S8180881: Better packaging of deserialization
+ S8182362: Update CipherOutputStream Usage
+ S8183032: Upgrade to LittleCMS 2.9
+ S8189123: More consistent classloading
+ S8190478: Improved interface method selection
+ S8190877: Better handling of abstract classes
+ S8191696: Better mouse positioning
+ S8192030: Better MTSchema support
+ S8193409: Improve AES supporting classes
+ S8193414: Improvements in MethodType lookups
+ S8189969, CVE-2018-2790, bsc#1090023: Manifest better manifest entries
+ S8189977, CVE-2018-2795, bsc#1090025: Improve permission portability
+ S8189981, CVE-2018-2796, bsc#1090026: Improve queuing portability
+ S8189985, CVE-2018-2797, bsc#1090027: Improve tabular data portability
+ S8189989, CVE-2018-2798, bsc#1090028: Improve container portability
+ S8189993, CVE-2018-2799, bsc#1090029: Improve document portability
+ S8189997, CVE-2018-2794, bsc#1090024: Enhance keystore mechanisms
+ S8192025, CVE-2018-2814, bsc#1090032: Less referential references
+ S8192757, CVE-2018-2815, bsc#1090033: Improve stub classes implementation
+ S8193833, CVE-2018-2800, bsc#1090030: Better RMI connection support

For additional changes please consult the changelog.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090023">SUSE bug 1090023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090024">SUSE bug 1090024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090025">SUSE bug 1090025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090026">SUSE bug 1090026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090027">SUSE bug 1090027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090028">SUSE bug 1090028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090029">SUSE bug 1090029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090030">SUSE bug 1090030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090032">SUSE bug 1090032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090033">SUSE bug 1090033</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2790">CVE-2018-2790 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2794">CVE-2018-2794 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2795">CVE-2018-2795 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2796">CVE-2018-2796 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2797">CVE-2018-2797 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2798">CVE-2018-2798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2799">CVE-2018-2799 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2800">CVE-2018-2800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2814">CVE-2018-2814 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2815/">CVE-2018-2815 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2815">CVE-2018-2815 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552839" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552840" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552841" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552842" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149465" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1091610" ref_url="https://bugzilla.suse.com/1091610" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1115" ref_url="https://www.suse.com/security/cve/CVE-2018-1115/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004192.html" source="SUSE-SU"/>
		<description>

  
PostgreSQL was updated to 9.6.9 fixing bugs and security issues:

Release notes:

- https://www.postgresql.org/about/news/1851/
- https://www.postgresql.org/docs/current/static/release-9-6-9.html

  A dump/restore is not required for those running 9.6.X.
  However, if you use the adminpack extension, you should update
  it as per the first changelog entry below.
  Also, if the function marking mistakes mentioned in the second
  and third changelog entries below affect you, you will want to
  take steps to correct your database catalogs.

Security issue fixed:

- CVE-2018-1115: Remove public execute privilege
  from contrib/adminpack's pg_logfile_rotate() function
  pg_logfile_rotate() is a deprecated wrapper for the core
  function pg_rotate_logfile(). When that function was changed
  to rely on SQL privileges for access control rather than a
  hard-coded superuser check, pg_logfile_rotate() should have
  been updated as well, but the need for this was missed. Hence,
  if adminpack is installed, any user could request a logfile
  rotation, creating a minor security issue.
  After installing this update, administrators should update
  adminpack by performing ALTER EXTENSION adminpack UPDATE in
  each database in which adminpack is installed. (bsc#1091610)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091610">SUSE bug 1091610</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1115/">CVE-2018-1115 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1115">CVE-2018-1115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552843" comment="libecpg6-9.6.9-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552844" comment="libpq5-9.6.9-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552845" comment="libpq5-32bit-9.6.9-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552846" comment="postgresql96-9.6.9-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552847" comment="postgresql96-contrib-9.6.9-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552848" comment="postgresql96-docs-9.6.9-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552849" comment="postgresql96-server-9.6.9-3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149466" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1096745" ref_url="https://bugzilla.suse.com/1096745" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004194.html" source="SUSE-SU"/>
		<description>
This update for gpg2 fixes the following security issue:

- CVE-2018-12020: GnuPG mishandled the original filename during decryption and
  verification actions, which allowed remote attackers to spoof the output that
  GnuPG sends on file descriptor 2 to other programs that use the '--status-fd 2'
  option (bsc#1096745)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-15"/>
	<updated date="2018-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096745">SUSE bug 1096745</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12020">CVE-2018-12020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552850" comment="gpg2-2.0.24-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519720" comment="gpg2-lang-2.0.24-9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149467" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1076503" ref_url="https://bugzilla.suse.com/1076503" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5764" ref_url="https://www.suse.com/security/cve/CVE-2018-5764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003619.html" source="SUSE-SU"/>
		<description>
This update for rsync fixes one issues.

This security issue was fixed:

- CVE-2018-5764: The parse_arguments function in options.c did not prevent
  multiple --protect-args uses, which allowed remote attackers to bypass an
  argument-sanitization protection mechanism (bsc#1076503).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-22"/>
	<updated date="2018-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076503">SUSE bug 1076503</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5764/">CVE-2018-5764 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5764">CVE-2018-5764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550416" comment="rsync-3.1.0-13.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149468" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1085449" ref_url="https://bugzilla.suse.com/1085449" source="BUGZILLA"/>
		<reference ref_id="1093311" ref_url="https://bugzilla.suse.com/1093311" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1417" ref_url="https://www.suse.com/security/cve/CVE-2018-1417/" source="CVE"/>
		<reference ref_id="CVE-2018-2783" ref_url="https://www.suse.com/security/cve/CVE-2018-2783/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2825" ref_url="https://www.suse.com/security/cve/CVE-2018-2825/" source="CVE"/>
		<reference ref_id="CVE-2018-2826" ref_url="https://www.suse.com/security/cve/CVE-2018-2826/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<description>


IBM Java was updated to version 8.0.5.15 [bsc#1093311, bsc#1085449]

Security fixes:

- CVE-2018-2826 CVE-2018-2825 CVE-2018-2814 CVE-2018-2794
  CVE-2018-2783 CVE-2018-2799 CVE-2018-2798 CVE-2018-2797
  CVE-2018-2796 CVE-2018-2795 CVE-2018-2800 CVE-2018-2790
  CVE-2018-1417

- Removed translations in the java-1_8_0-ibm-devel-32bit package
  as they conflict with those in java-1_8_0-ibm-devel.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-19"/>
	<updated date="2018-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085449">SUSE bug 1085449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1417/">CVE-2018-1417 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1417">CVE-2018-1417 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2783/">CVE-2018-2783 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2783">CVE-2018-2783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2790">CVE-2018-2790 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2794">CVE-2018-2794 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2795">CVE-2018-2795 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2796">CVE-2018-2796 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2797">CVE-2018-2797 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2798">CVE-2018-2798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2799">CVE-2018-2799 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2800">CVE-2018-2800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2814">CVE-2018-2814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2825/">CVE-2018-2825 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2825">CVE-2018-2825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2826/">CVE-2018-2826 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2826">CVE-2018-2826 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548180" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149469" version="1" class="patch">
	<metadata>
		<title>Security update for procmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1068648" ref_url="https://bugzilla.suse.com/1068648" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16844" ref_url="https://www.suse.com/security/cve/CVE-2017-16844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003618.html" source="SUSE-SU"/>
		<description>
This update for procmail fixes the following issues:

- CVE-2017-16844: Heap-based buffer overflow in loadbuf function could lead to remote denial of service (bsc#1068648)
  
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-22"/>
	<updated date="2018-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068648">SUSE bug 1068648</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16844/">CVE-2017-16844 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16844">CVE-2017-16844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550417" comment="procmail-3.22-269.3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149470" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1085449" ref_url="https://bugzilla.suse.com/1085449" source="BUGZILLA"/>
		<reference ref_id="1093311" ref_url="https://bugzilla.suse.com/1093311" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1417" ref_url="https://www.suse.com/security/cve/CVE-2018-1417/" source="CVE"/>
		<reference ref_id="CVE-2018-2783" ref_url="https://www.suse.com/security/cve/CVE-2018-2783/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<description>


IBM Java was updated to 7.1.4.25 [bsc#1093311, bsc#1085449]:

Security fixes:

- CVE-2018-2814 CVE-2018-2794 CVE-2018-2783 CVE-2018-2799
  CVE-2018-2798 CVE-2018-2797 CVE-2018-2796 CVE-2018-2795
  CVE-2018-2800 CVE-2018-2790 CVE-2018-1417
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-20"/>
	<updated date="2018-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085449">SUSE bug 1085449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1417/">CVE-2018-1417 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1417">CVE-2018-1417 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2783/">CVE-2018-2783 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2783">CVE-2018-2783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2790">CVE-2018-2790 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2794">CVE-2018-2794 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2795">CVE-2018-2795 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2796">CVE-2018-2796 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2797">CVE-2018-2797 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2798">CVE-2018-2798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2799">CVE-2018-2799 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2800">CVE-2018-2800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2814">CVE-2018-2814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545536" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545537" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149471" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1077445" ref_url="https://bugzilla.suse.com/1077445" source="BUGZILLA"/>
		<reference ref_id="1082063" ref_url="https://bugzilla.suse.com/1082063" source="BUGZILLA"/>
		<reference ref_id="1082210" ref_url="https://bugzilla.suse.com/1082210" source="BUGZILLA"/>
		<reference ref_id="1083417" ref_url="https://bugzilla.suse.com/1083417" source="BUGZILLA"/>
		<reference ref_id="1083420" ref_url="https://bugzilla.suse.com/1083420" source="BUGZILLA"/>
		<reference ref_id="1083422" ref_url="https://bugzilla.suse.com/1083422" source="BUGZILLA"/>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1083426" ref_url="https://bugzilla.suse.com/1083426" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="CVE-2018-7182" ref_url="https://www.suse.com/security/cve/CVE-2018-7182/" source="CVE"/>
		<reference ref_id="CVE-2018-7183" ref_url="https://www.suse.com/security/cve/CVE-2018-7183/" source="CVE"/>
		<reference ref_id="CVE-2018-7184" ref_url="https://www.suse.com/security/cve/CVE-2018-7184/" source="CVE"/>
		<reference ref_id="CVE-2018-7185" ref_url="https://www.suse.com/security/cve/CVE-2018-7185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004208.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

- Update to 4.2.8p11 (bsc#1082210):
  * CVE-2016-1549: Sybil vulnerability: ephemeral association
    attack. While fixed in ntp-4.2.8p7, there are significant
    additional protections for this issue in 4.2.8p11.
  * CVE-2018-7182: ctl_getitem(): buffer read overrun
    leads to undefined behavior and information leak. (bsc#1083426)
  * CVE-2018-7170: Multiple authenticated ephemeral
    associations. (bsc#1083424)
  * CVE-2018-7184: Interleaved symmetric mode cannot
    recover from bad state. (bsc#1083422)
  * CVE-2018-7185: Unauthenticated packet can reset
    authenticated interleaved association. (bsc#1083420)
  * CVE-2018-7183: ntpq:decodearr() can write beyond its
    buffer limit.(bsc#1083417)
- Don't use libevent's cached time stamps in sntp. (bsc#1077445)

This update is a reissue of the previous update with LTSS channels included.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-20"/>
	<updated date="2018-06-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077445">SUSE bug 1077445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082063">SUSE bug 1082063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083417">SUSE bug 1083417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083420">SUSE bug 1083420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083422">SUSE bug 1083422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083426">SUSE bug 1083426</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1549">CVE-2016-1549 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7170">CVE-2018-7170 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7182/">CVE-2018-7182 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7182">CVE-2018-7182 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-7183/">CVE-2018-7183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7183">CVE-2018-7183 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7184/">CVE-2018-7184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7184">CVE-2018-7184 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7185/">CVE-2018-7185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7185">CVE-2018-7185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552851" comment="ntp-4.2.8p11-64.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552852" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149472" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1013721" ref_url="https://bugzilla.suse.com/1013721" source="BUGZILLA"/>
		<reference ref_id="1013877" ref_url="https://bugzilla.suse.com/1013877" source="BUGZILLA"/>
		<reference ref_id="1026652" ref_url="https://bugzilla.suse.com/1026652" source="BUGZILLA"/>
		<reference ref_id="1057342" ref_url="https://bugzilla.suse.com/1057342" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7837" ref_url="https://www.suse.com/security/cve/CVE-2016-7837/" source="CVE"/>
		<reference ref_id="CVE-2016-9800" ref_url="https://www.suse.com/security/cve/CVE-2016-9800/" source="CVE"/>
		<reference ref_id="CVE-2016-9804" ref_url="https://www.suse.com/security/cve/CVE-2016-9804/" source="CVE"/>
		<reference ref_id="CVE-2017-1000250" ref_url="https://www.suse.com/security/cve/CVE-2017-1000250/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004212.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

Security issues fixed:

- CVE-2016-9800: Fix hcidump memory leak in pin_code_reply_dump() (bsc#1013721).
- CVE-2016-9804: Fix hcidump buffer overflow in commands_dump() (bsc#1013877).
- CVE-2016-7837: Fix possible buffer overflow, make sure we don't write past the end of the array (bsc#1026652).
- CVE-2017-1000250: Fix information disclosure vulnerability in service_search_attr_req (bsc#1057342).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-21"/>
	<updated date="2018-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013721">SUSE bug 1013721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013877">SUSE bug 1013877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026652">SUSE bug 1026652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057342">SUSE bug 1057342</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7837/">CVE-2016-7837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7837">CVE-2016-7837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9800/">CVE-2016-9800 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9800">CVE-2016-9800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9804/">CVE-2016-9804 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9804">CVE-2016-9804 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000250/">CVE-2017-1000250 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000250">CVE-2017-1000250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552853" comment="bluez-5.13-5.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552854" comment="libbluetooth3-5.13-5.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149473" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1024718" ref_url="https://bugzilla.suse.com/1024718" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1035432" ref_url="https://bugzilla.suse.com/1035432" source="BUGZILLA"/>
		<reference ref_id="1041740" ref_url="https://bugzilla.suse.com/1041740" source="BUGZILLA"/>
		<reference ref_id="1045330" ref_url="https://bugzilla.suse.com/1045330" source="BUGZILLA"/>
		<reference ref_id="1056415" ref_url="https://bugzilla.suse.com/1056415" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068054" ref_url="https://bugzilla.suse.com/1068054" source="BUGZILLA"/>
		<reference ref_id="1068951" ref_url="https://bugzilla.suse.com/1068951" source="BUGZILLA"/>
		<reference ref_id="1070404" ref_url="https://bugzilla.suse.com/1070404" source="BUGZILLA"/>
		<reference ref_id="1073311" ref_url="https://bugzilla.suse.com/1073311" source="BUGZILLA"/>
		<reference ref_id="1075428" ref_url="https://bugzilla.suse.com/1075428" source="BUGZILLA"/>
		<reference ref_id="1076049" ref_url="https://bugzilla.suse.com/1076049" source="BUGZILLA"/>
		<reference ref_id="1078583" ref_url="https://bugzilla.suse.com/1078583" source="BUGZILLA"/>
		<reference ref_id="1079152" ref_url="https://bugzilla.suse.com/1079152" source="BUGZILLA"/>
		<reference ref_id="1080542" ref_url="https://bugzilla.suse.com/1080542" source="BUGZILLA"/>
		<reference ref_id="1080656" ref_url="https://bugzilla.suse.com/1080656" source="BUGZILLA"/>
		<reference ref_id="1081500" ref_url="https://bugzilla.suse.com/1081500" source="BUGZILLA"/>
		<reference ref_id="1081514" ref_url="https://bugzilla.suse.com/1081514" source="BUGZILLA"/>
		<reference ref_id="1082153" ref_url="https://bugzilla.suse.com/1082153" source="BUGZILLA"/>
		<reference ref_id="1082504" ref_url="https://bugzilla.suse.com/1082504" source="BUGZILLA"/>
		<reference ref_id="1082979" ref_url="https://bugzilla.suse.com/1082979" source="BUGZILLA"/>
		<reference ref_id="1085185" ref_url="https://bugzilla.suse.com/1085185" source="BUGZILLA"/>
		<reference ref_id="1085308" ref_url="https://bugzilla.suse.com/1085308" source="BUGZILLA"/>
		<reference ref_id="1086400" ref_url="https://bugzilla.suse.com/1086400" source="BUGZILLA"/>
		<reference ref_id="1086716" ref_url="https://bugzilla.suse.com/1086716" source="BUGZILLA"/>
		<reference ref_id="1087036" ref_url="https://bugzilla.suse.com/1087036" source="BUGZILLA"/>
		<reference ref_id="1087086" ref_url="https://bugzilla.suse.com/1087086" source="BUGZILLA"/>
		<reference ref_id="1088871" ref_url="https://bugzilla.suse.com/1088871" source="BUGZILLA"/>
		<reference ref_id="1090435" ref_url="https://bugzilla.suse.com/1090435" source="BUGZILLA"/>
		<reference ref_id="1090534" ref_url="https://bugzilla.suse.com/1090534" source="BUGZILLA"/>
		<reference ref_id="1090734" ref_url="https://bugzilla.suse.com/1090734" source="BUGZILLA"/>
		<reference ref_id="1090955" ref_url="https://bugzilla.suse.com/1090955" source="BUGZILLA"/>
		<reference ref_id="1091594" ref_url="https://bugzilla.suse.com/1091594" source="BUGZILLA"/>
		<reference ref_id="1094532" ref_url="https://bugzilla.suse.com/1094532" source="BUGZILLA"/>
		<reference ref_id="1095042" ref_url="https://bugzilla.suse.com/1095042" source="BUGZILLA"/>
		<reference ref_id="1095147" ref_url="https://bugzilla.suse.com/1095147" source="BUGZILLA"/>
		<reference ref_id="1096037" ref_url="https://bugzilla.suse.com/1096037" source="BUGZILLA"/>
		<reference ref_id="1096140" ref_url="https://bugzilla.suse.com/1096140" source="BUGZILLA"/>
		<reference ref_id="1096214" ref_url="https://bugzilla.suse.com/1096214" source="BUGZILLA"/>
		<reference ref_id="1096242" ref_url="https://bugzilla.suse.com/1096242" source="BUGZILLA"/>
		<reference ref_id="1096281" ref_url="https://bugzilla.suse.com/1096281" source="BUGZILLA"/>
		<reference ref_id="1096751" ref_url="https://bugzilla.suse.com/1096751" source="BUGZILLA"/>
		<reference ref_id="1096982" ref_url="https://bugzilla.suse.com/1096982" source="BUGZILLA"/>
		<reference ref_id="1097234" ref_url="https://bugzilla.suse.com/1097234" source="BUGZILLA"/>
		<reference ref_id="1097356" ref_url="https://bugzilla.suse.com/1097356" source="BUGZILLA"/>
		<reference ref_id="1098009" ref_url="https://bugzilla.suse.com/1098009" source="BUGZILLA"/>
		<reference ref_id="1098012" ref_url="https://bugzilla.suse.com/1098012" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="973378" ref_url="https://bugzilla.suse.com/973378" source="BUGZILLA"/>
		<reference ref_id="978907" ref_url="https://bugzilla.suse.com/978907" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17741" ref_url="https://www.suse.com/security/cve/CVE-2017-17741/" source="CVE"/>
		<reference ref_id="CVE-2017-18241" ref_url="https://www.suse.com/security/cve/CVE-2017-18241/" source="CVE"/>
		<reference ref_id="CVE-2017-18249" ref_url="https://www.suse.com/security/cve/CVE-2017-18249/" source="CVE"/>
		<reference ref_id="CVE-2018-12233" ref_url="https://www.suse.com/security/cve/CVE-2018-12233/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004211.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.136  to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did
  not handle unsigned integer overflow properly. As a result, a large value of
  the 'ie_len' argument could have caused a buffer overflow (bnc#1097356).
- CVE-2017-18249: The add_free_nid function did not properly track an allocated
  nid, which allowed local users to cause a denial of service (race condition) or
  possibly have unspecified other impact via concurrent threads (bnc#1087036).
- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX
  registers) between processes. These registers might contain encryption keys
  when doing SSE accelerated AES enc/decryption (bsc#1087086).
- CVE-2017-18241: Prevent a NULL pointer dereference by using a noflush_merge
  option that triggers a NULL value for a flush_cmd_control data structure
  (bnc#1086400).
- CVE-2017-17741: The KVM implementation in the Linux kernel allowed attackers
  to obtain potentially sensitive information from kernel memory, aka a
  write_mmio stack-based out-of-bounds read (bnc#1073311).
- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c, a memory
  corruption bug in JFS can be triggered by calling setxattr twice with two
  different extended attribute names on the same file. This vulnerability
  can be triggered by an unprivileged user with the ability to create
  files and execute programs. A kmalloc call is incorrect, leading to
  slab-out-of-bounds in jfs_xattr (bnc#1097234).

The following non-security bugs were fixed:

- 8139too: Use disable_irq_nosync() in rtl8139_poll_controller() (bnc#1012382).
- ACPI: acpi_pad: Fix memory leak in power saving threads (bnc#1012382).
- ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c (bnc#1012382).
- ACPICA: Events: add a return on failure from acpi_hw_register_read (bnc#1012382).
- ACPI: processor_perflib: Do not send _PPC change notification if not ready (bnc#1012382).
- affs_lookup(): close a race with affs_remove_link() (bnc#1012382).
- af_key: Always verify length of provided sadb_key (bnc#1012382).
- aio: fix io_destroy(2) vs. lookup_ioctx() race (bnc#1012382).
- alsa: control: fix a redundant-copy issue (bnc#1012382).
- alsa: hda: Add Lenovo C50 All in one to the power_save blacklist (bnc#1012382).
- alsa: hda - Use IS_REACHABLE() for dependency on input (bnc#1012382 bsc#1031717).
- alsa: timer: Call notifier in the same spinlock (bnc#1012382 bsc#973378).
- alsa: timer: Fix pause event notification (bnc#1012382 bsc#973378).
- alsa: usb: mixer: volume quirk for CM102-A+/102S+ (bnc#1012382).
- alsa: vmaster: Propagate slave error (bnc#1012382).
- arc: Fix malformed ARC_EMUL_UNALIGNED default (bnc#1012382).
- arm64: Add ARCH_WORKAROUND_2 probing (bsc#1085308).
- arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2 (bsc#1085308).
- arm64: Add 'ssbd' command-line option (bsc#1085308).
- arm64: Add this_cpu_ptr() assembler macro for use in entry.S (bsc#1085308).
- arm64: Add work around for Arm Cortex-A55 Erratum 1024718 (bnc#1012382).
- arm64: alternatives: Add dynamic patching feature (bsc#1085308).
- arm64: assembler: introduce ldr_this_cpu (bsc#1085308).
- arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1 (bsc#1085308).
- arm64: do not call C code with el0's fp register (bsc#1085308).
- arm64: fix endianness annotation for __apply_alternatives()/get_alt_insn() (bsc#1085308).
- arm64: introduce mov_q macro to move a constant into a 64-bit register (bnc#1012382 bsc#1068032).
- arm64: lse: Add early clobbers to some input/output asm operands (bnc#1012382).
- arm64: spinlock: Fix theoretical trylock() A-B-A with LSE atomics (bnc#1012382).
- arm64: ssbd: Add global mitigation state accessor (bsc#1085308).
- arm64: ssbd: Add prctl interface for per-thread mitigation (bsc#1085308).
- arm64: ssbd: Introduce thread flag to control userspace mitigation (bsc#1085308).
- arm64: ssbd: Restore mitigation status on CPU resume (bsc#1085308).
- arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation (bsc#1085308).
- arm: 8748/1: mm: Define vdso_start, vdso_end as array (bnc#1012382).
- arm: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed (bnc#1012382).
- arm: 8770/1: kprobes: Prohibit probing on optimized_callback (bnc#1012382).
- arm: 8771/1: kprobes: Prohibit kprobes on do_undefinstr (bnc#1012382).
- arm: 8772/1: kprobes: Prohibit kprobes on get_user functions (bnc#1012382).
- arm/arm64: smccc: Add SMCCC-specific return codes (bsc#1085308).
- arm: dts: socfpga: fix GIC PPI warning (bnc#1012382).
- arm: OMAP1: clock: Fix debugfs_create_*() usage (bnc#1012382).
- arm: OMAP2+: timer: fix a kmemleak caused in omap_get_timer_dt (bnc#1012382).
- arm: OMAP3: Fix prm wake interrupt for resume (bnc#1012382).
- arm: OMAP: Fix dmtimer init for omap1 (bnc#1012382).
- asm-generic: provide generic_pmdp_establish() (bnc#1012382).
- ASoC: au1x: Fix timeout tests in au1xac97c_ac97_read() (bnc#1012382 bsc#1031717).
- ASoC: Intel: sst: remove redundant variable dma_dev_name (bnc#1012382).
- ASoC: samsung: i2s: Ensure the RCLK rate is properly determined (bnc#1012382).
- ASoC: topology: create TLV data for dapm widgets (bnc#1012382).
- ath10k: Fix kernel panic while using worker (ath10k_sta_rc_update_wk) (bnc#1012382).
- audit: move calcs after alloc and check when logging set loginuid (bnc#1012382).
- audit: return on memory error to avoid null pointer dereference (bnc#1012382).
- autofs: change autofs4_expire_wait()/do_expire_wait() to take struct path (bsc#1086716).
- autofs: change autofs4_wait() to take struct path (bsc#1086716).
- autofs: use path_has_submounts() to fix unreliable have_submount() checks (bsc#1086716).
- autofs: use path_is_mountpoint() to fix unreliable d_mountpoint() checks (bsc#1086716).
- batman-adv: fix header size check in batadv_dbg_arp() (bnc#1012382).
- batman-adv: fix multicast-via-unicast transmission with AP isolation (bnc#1012382).
- batman-adv: fix packet checksum in receive path (bnc#1012382).
- batman-adv: fix packet loss for broadcasted DHCP packets to a server (bnc#1012382).
- batman-adv: invalidate checksum on fragment reassembly (bnc#1012382).
- bcache: fix for allocator and register thread race (bnc#1012382).
- bcache: fix for data collapse after re-attaching an attached device (bnc#1012382).
- bcache: fix kcrashes with fio in RAID5 backend dev (bnc#1012382).
- bcache: properly set task state in bch_writeback_thread() (bnc#1012382).
- bcache: quit dc-&gt;writeback_thread when BCACHE_DEV_DETACHING is set (bnc#1012382).
- bcache: return attach error when no cache set exist (bnc#1012382).
- block: cancel workqueue entries on blk_mq_freeze_queue() (bsc#1090435).
- Bluetooth: Apply QCA Rome patches for some ATH3012 models (bsc#1082504, bsc#1095147).
- Bluetooth: btusb: Add device ID for RTL8822BE (bnc#1012382).
- Bluetooth: btusb: Add USB ID 7392:a611 for Edimax EW-7611ULB (bnc#1012382).
- bnx2x: use the right constant (bnc#1012382).
- bnxt_en: Check valid VNIC ID in bnxt_hwrm_vnic_set_tpa() (bnc#1012382).
- bonding: do not allow rlb updates to invalid mac (bnc#1012382).
- bpf: fix selftests/bpf test_kmod.sh failure when CONFIG_BPF_JIT_ALWAYS_ON=y (bnc#1012382).
- brcmfmac: Fix check for ISO3166 code (bnc#1012382).
- bridge: check iface upper dev when setting master via ioctl (bnc#1012382).
- Btrfs: bail out on error during replay_dir_deletes (bnc#1012382).
- Btrfs: fix copy_items() return value when logging an inode (bnc#1012382).
- Btrfs: fix crash when trying to resume balance without the resume flag (bnc#1012382).
- Btrfs: fix lockdep splat in btrfs_alloc_subvolume_writers (bnc#1012382).
- Btrfs: fix NULL pointer dereference in log_dir_items (bnc#1012382).
- Btrfs: Fix out of bounds access in btrfs_search_slot (bnc#1012382).
- Btrfs: Fix possible softlock on single core machines (bnc#1012382).
- Btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bnc#1012382).
- Btrfs: fix scrub to repair raid6 corruption (bnc#1012382).
- Btrfs: fix xattr loss after power failure (bnc#1012382).
- Btrfs: send, fix issuing write op when processing hole in no data mode (bnc#1012382).
- Btrfs: set plug for fsync (bnc#1012382).
- Btrfs: tests/qgroup: Fix wrong tree backref level (bnc#1012382).
- cdrom: do not call check_disk_change() inside cdrom_open() (bnc#1012382).
- ceph: delete unreachable code in ceph_check_caps() (bsc#1096214).
- ceph: fix race of queuing delayed caps (bsc#1096214).
- cfg80211: further limit wiphy names to 64 bytes (bnc#1012382 git-fixes).
- cfg80211: further limit wiphy names to 64 bytes (git-fixes).
- cfg80211: limit wiphy names to 128 bytes (bnc#1012382).
- cifs: silence compiler warnings showing up with gcc-8.0.0 (bnc#1012382 bsc#1090734).
- Clarify (and fix) MAX_LFS_FILESIZE macros (bnc#1012382).
- clk: Do not show the incorrect clock phase (bnc#1012382).
- clk: rockchip: Prevent calculating mmc phase if clock rate is zero (bnc#1012382).
- clk: samsung: exynos3250: Fix PLL rates (bnc#1012382).
- clk: samsung: exynos5250: Fix PLL rates (bnc#1012382).
- clk: samsung: exynos5260: Fix PLL rates (bnc#1012382).
- clk: samsung: exynos5433: Fix PLL rates (bnc#1012382).
- clk: samsung: s3c2410: Fix PLL rates (bnc#1012382).
- clocksource/drivers/fsl_ftm_timer: Fix error return checking (bnc#1012382).
- config: arm64: enable Spectre-v4 per-thread mitigation
- Correct the prefix in references tag in previous patches (bsc#1041740).
- cpufreq: cppc_cpufreq: Fix cppc_cpufreq_init() failure path (bnc#1012382).
- cpufreq: CPPC: Initialize shared perf capabilities of CPUs (bnc#1012382).
- cpufreq: intel_pstate: Enable HWP by default (bnc#1012382).
- cpuidle: coupled: remove unused define cpuidle_coupled_lock (bnc#1012382).
- crypto: sunxi-ss - Add MODULE_ALIAS to sun4i-ss (bnc#1012382).
- crypto: vmx - Remove overly verbose printk from AES init routines (bnc#1012382).
- dccp: do not free ccid2_hc_tx_sock struct in dccp_disconnect() (bnc#1012382).
- dccp: fix tasklet usage (bnc#1012382).
- dlm: fix a clerical error when set SCTP_NODELAY (bsc#1091594).
- dlm: make sctp_connect_to_sock() return in specified time (bsc#1080542).
- dlm: remove O_NONBLOCK flag in sctp_connect_to_sock (bsc#1080542).
- dmaengine: ensure dmaengine helpers check valid callback (bnc#1012382).
- dmaengine: pl330: fix a race condition in case of threaded irqs (bnc#1012382).
- dmaengine: rcar-dmac: fix max_chunk_size for R-Car Gen3 (bnc#1012382).
- dmaengine: usb-dmac: fix endless loop in usb_dmac_chan_terminate_all() (bnc#1012382).
- dm thin: fix documentation relative to low water mark threshold (bnc#1012382).
- do d_instantiate/unlock_new_inode combinations safely (bnc#1012382).
- dp83640: Ensure against premature access to PHY registers after reset (bnc#1012382).
- drm/exynos: fix comparison to bitshift when dealing with a mask (bnc#1012382).
- drm/i915: Disable LVDS on Radiant P845 (bnc#1012382).
- drm/rockchip: Respect page offset for PRIME mmap calls (bnc#1012382).
- drm: set FMODE_UNSIGNED_OFFSET for drm files (bnc#1012382).
- e1000e: allocate ring descriptors with dma_zalloc_coherent (bnc#1012382).
- e1000e: Fix check_for_link return value with autoneg off (bnc#1012382 bsc#1075428).
- efi: Avoid potential crashes, fix the 'struct efi_pci_io_protocol_32' definition for mixed mode (bnc#1012382).
- enic: enable rq before updating rq descriptors (bnc#1012382).
- enic: set DMA mask to 47 bit (bnc#1012382).
- ext2: fix a block leak (bnc#1012382).
- fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper() (bnc#1012382).
- firewire-ohci: work around oversized DMA reads on JMicron controllers (bnc#1012382).
- firmware: dmi: handle missing DMI data gracefully (bsc#1096037).
- firmware: dmi_scan: Fix handling of empty DMI strings (bnc#1012382).
- fix io_destroy()/aio_complete() race (bnc#1012382).
- Force log to disk before reading the AGF during a fstrim (bnc#1012382).
- fscache: Fix hanging wait on page discarded by writeback (bnc#1012382).
- fs/proc/proc_sysctl.c: fix potential page fault while unregistering sysctl table (bnc#1012382).
- futex: futex_wake_op, do not fail on invalid op (git-fixes).
- futex: futex_wake_op, fix sign_extend32 sign bits (bnc#1012382).
- futex: Remove duplicated code and fix undefined behaviour (bnc#1012382).
- futex: Remove unnecessary warning from get_futex_key (bnc#1012382).
- gfs2: Fix fallocate chunk size (bnc#1012382).
- gianfar: Fix Rx byte accounting for ndev stats (bnc#1012382).
- gpio: No NULL owner (bnc#1012382).
- gpio: rcar: Add Runtime PM handling for interrupts (bnc#1012382).
- hfsplus: stop workqueue when fill_super() failed (bnc#1012382).
- HID: roccat: prevent an out of bounds read in kovaplus_profile_activated() (bnc#1012382).
- hwmon: (nct6775) Fix writing pwmX_mode (bnc#1012382).
- hwmon: (pmbus/adm1275) Accept negative page register values (bnc#1012382).
- hwmon: (pmbus/max8688) Accept negative page register values (bnc#1012382).
- hwrng: stm32 - add reset during probe (bnc#1012382).
- hwtracing: stm: fix build error on some arches (bnc#1012382).
- i2c: mv64xxx: Apply errata delay only in standard mode (bnc#1012382).
- i2c: rcar: check master irqs before slave irqs (bnc#1012382).
- i2c: rcar: do not issue stop when HW does it automatically (bnc#1012382).
- i2c: rcar: init new messages in irq (bnc#1012382).
- i2c: rcar: make sure clocks are on when doing clock calculation (bnc#1012382).
- i2c: rcar: refactor setup of a msg (bnc#1012382).
- i2c: rcar: remove spinlock (bnc#1012382).
- i2c: rcar: remove unused IOERROR state (bnc#1012382).
- i2c: rcar: revoke START request early (bnc#1012382).
- i2c: rcar: rework hw init (bnc#1012382).
- IB/ipoib: Fix for potential no-carrier state (bnc#1012382).
- iio:kfifo_buf: check for uint overflow (bnc#1012382).
- ima: Fallback to the builtin hash algorithm (bnc#1012382).
- ima: Fix Kconfig to select TPM 2.0 CRB interface (bnc#1012382).
- init: fix false positives in W+X checking (bsc#1096982).
- input: elan_i2c - add ELAN0612 (Lenovo v330 14IKB) ACPI ID (bnc#1012382).
- Input: elan_i2c_smbus - fix corrupted stack (bnc#1012382).
- input: goodix - add new ACPI id for GPD Win 2 touch screen (bnc#1012382).
- ip6mr: only set ip6mr_table from setsockopt when ip6mr_new_table succeeds (bnc#1012382).
- ipc/shm: fix shmat() nil address after round-down when remapping (bnc#1012382).
- ipmi/powernv: Fix error return code in ipmi_powernv_probe() (bnc#1012382).
- ipmi_ssif: Fix kernel panic at msg_done_handler (bnc#1012382 bsc#1088871).
- ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg (bnc#1012382).
- ipv4: lock mtu in fnhe when received PMTU lower than net.ipv4.route.min_pmtu (bnc#1012382).
- ipv4: remove warning in ip_recv_error (bnc#1012382).
- ipv6: omit traffic class when calculating flow hash (bsc#1095042).
- irda: fix overly long udelay() (bnc#1012382).
- irqchip/gic-v3: Change pr_debug message to pr_devel (bnc#1012382).
- isdn: eicon: fix a missing-check bug (bnc#1012382).
- jffs2: Fix use-after-free bug in jffs2_iget()'s error handling path (bnc#1012382 git-fixes).
- kabi: vfs: Restore dentry_operations-&gt;d_manage (bsc#1086716).
- kasan: fix memory hotplug during boot (bnc#1012382).
- Kbuild: change CC_OPTIMIZE_FOR_SIZE definition (bnc#1012382).
- kconfig: Avoid format overflow warning from GCC 8.1 (bnc#1012382).
- kconfig: Do not leak main menus during parsing (bnc#1012382).
- kconfig: Fix automatic menu creation mem leak (bnc#1012382).
- kconfig: Fix expr_free() E_NOT leak (bnc#1012382).
- kdb: make 'mdr' command repeat (bnc#1012382).
- kernel: Fix memory leak on EP11 target list processing (bnc#1096751, LTC#168596).
- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (bnc#1012382).
- kernel/sys.c: fix potential Spectre v1 issue (bnc#1012382).
- kvm: Fix spelling mistake: 'cop_unsuable' -&gt; 'cop_unusable' (bnc#1012382).
- kvm: lapic: stop advertising DIRECTED_EOI when in-kernel IOAPIC is in use (bnc#1012382).
- kvm: PPC: Book3S HV: Fix VRMA initialization with 2MB or 1GB memory backing (bnc#1012382).
- kvm: VMX: raise internal error for exception during invalid protected mode state (bnc#1012382).
- kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl (bnc#1012382).
- kvm: x86: introduce linear_{read,write}_system (bnc#1012382).
- kvm: x86: pass kvm_vcpu to kvm_read_guest_virt and kvm_write_guest_virt_system (bnc#1012382).
- kvm: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).
- kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access (bnc#1012382).
- l2tp: revert 'l2tp: fix missing print session offset info' (bnc#1012382).
- libata: blacklist Micron 500IT SSD with MU01 firmware (bnc#1012382).
- libata: Blacklist some Sandisk SSDs for NCQ (bnc#1012382).
- llc: better deal with too small mtu (bnc#1012382).
- llc: properly handle dev_queue_xmit() return value (bnc#1012382).
- lockd: lost rollback of set_grace_period() in lockd_down_net() (bnc#1012382 git-fixes).
- locking/qspinlock: Ensure node-&gt;count is updated before initialising node (bnc#1012382).
- locking/xchg/alpha: Add unconditional memory barrier to cmpxchg() (bnc#1012382).
- locking/xchg/alpha: Fix xchg() and cmpxchg() memory ordering bugs (bnc#1012382).
- m68k: set dma and coherent masks for platform FEC ethernets (bnc#1012382).
- mac80211: round IEEE80211_TX_STATUS_HEADROOM up to multiple of 4 (bnc#1012382).
- md raid10: fix NULL deference in handle_write_completed() (bnc#1012382 bsc#1056415).
- md/raid1: fix NULL pointer dereference (bnc#1012382).
- md: raid5: avoid string overflow warning (bnc#1012382).
- media: cx23885: Override 888 ImpactVCBe crystal frequency (bnc#1012382).
- media: cx23885: Set subdev host data to clk_freq pointer (bnc#1012382).
- media: cx25821: prevent out-of-bounds read on array card (bnc#1012382 bsc#1031717).
- media: dmxdev: fix error code for invalid ioctls (bnc#1012382).
- media: em28xx: USB bulk packet size fix (bnc#1012382).
- media: s3c-camif: fix out-of-bounds array access (bnc#1012382 bsc#1031717).
- mmap: introduce sane default mmap limits (bnc#1012382).
- mmap: relax file size limit for regular files (bnc#1012382).
- mmc: sdhci-iproc: fix 32bit writes for TRANSFER_MODE register (bnc#1012382).
- mm: do not allow deferred pages with NEED_PER_CPU_KM (bnc#1012382).
- mm: filemap: avoid unnecessary calls to lock_page when waiting for IO to complete during a read (bnc#1012382 bnc#971975).
- mm: filemap: remove redundant code in do_read_cache_page (bnc#1012382 bnc#971975).
- mm: fix races between address_space dereference and free in page_evicatable (bnc#1012382).
- mm: fix the NULL mapping case in __isolate_lru_page() (bnc#1012382).
- mm/kmemleak.c: wait for scan completion before disabling free (bnc#1012382).
- mm/ksm: fix interaction with THP (bnc#1012382).
- mm/mempolicy: add nodes_empty check in SYSC_migrate_pages (bnc#1012382).
- mm/mempolicy.c: avoid use uninitialized preferred_node (bnc#1012382).
- mm/mempolicy: fix the check of nodemask from user (bnc#1012382).
- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).
- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1012382 bnc#1081500).
- net: bgmac: Fix endian access in bgmac_dma_tx_ring_free() (bnc#1012382).
- netdev-FAQ: clarify DaveM's position for stable backports (bnc#1012382).
- net: ethernet: sun: niu set correct packet size in skb (bnc#1012382).
- netfilter: ebtables: convert BUG_ONs to WARN_ONs (bnc#1012382).
- net: Fix untag for vlan packets without ethernet header (bnc#1012382).
- net: Fix vlan untag for bridge and vlan_dev with reorder_hdr off (bnc#1012382).
- netlabel: If PF_INET6, check sk_buff ip header version (bnc#1012382).
- net: metrics: add proper netlink validation (bnc#1012382).
- net/mlx4_en: Verify coalescing parameters are in range (bnc#1012382).
- net/mlx4: Fix irq-unsafe spinlock usage (bnc#1012382).
- net/mlx5: Protect from command bit overflow (bnc#1012382).
- net: mvneta: fix enable of all initialized RXQs (bnc#1012382).
- net/packet: refine check for priv area size (bnc#1012382).
- net: phy: broadcom: Fix bcm_write_exp() (bnc#1012382).
- net: qmi_wwan: add BroadMobi BM806U 2020:2033 (bnc#1012382).
- net_sched: fq: take care of throttled flows before reuse (bnc#1012382).
- net: support compat 64-bit time in {s,g}etsockopt (bnc#1012382).
- net/tcp/illinois: replace broken algorithm reference link (bnc#1012382).
- net: test tailroom before appending to linear skb (bnc#1012382).
- net-usb: add qmi_wwan if on lte modem wistron neweb d18q1 (bnc#1012382).
- net: usb: cdc_mbim: add flag FLAG_SEND_ZLP (bnc#1012382).
- net/usb/qmi_wwan.c: Add USB id for lt4120 modem (bnc#1012382).
- nfc: llcp: Limit size of SDP URI (bnc#1012382).
- nfs: Do not convert nfs_idmap_cache_timeout to jiffies (bnc#1012382 git-fixes).
- nfsv4: always set NFS_LOCK_LOST when a lock is lost (bnc#1012382 bsc#1068951).
- ntb_transport: Fix bug with max_mw_size parameter (bnc#1012382).
- nvme-pci: Fix nvme queue cleanup if IRQ setup fails (bnc#1012382).
- ocfs2/acl: use 'ip_xattr_sem' to protect getting extended attribute (bnc#1012382).
- ocfs2/dlm: do not handle migrate lockres if already in shutdown (bnc#1012382).
- ocfs2: return -EROFS to mount.ocfs2 if inode block is invalid (bnc#1012382).
- ocfs2: return error when we attempt to access a dirty bh in jbd2 (bnc#1012382 bsc#1070404).
- openvswitch: Do not swap table in nlattr_set() after OVS_ATTR_NESTED is found (bnc#1012382).
- packet: fix reserve calculation (bnc#1012382 git-fixes).
- packet: fix reserve calculation (git-fixes).
- packet: in packet_snd start writing at link layer allocation (bnc#1012382).
- parisc/pci: Switch LBA PCI bus from Hard Fail to Soft Fail mode (bnc#1012382).
- pci: Add function 1 DMA alias quirk for Marvell 88SE9220 (bnc#1012382).
- pci: Add function 1 DMA alias quirk for Marvell 9128 (bnc#1012382).
- pci: Restore config space on runtime resume despite being unbound (bnc#1012382).
- perf callchain: Fix attr.sample_max_stack setting (bnc#1012382).
- perf/cgroup: Fix child event counting bug (bnc#1012382).
- perf/core: Fix perf_output_read_group() (bnc#1012382).
- perf report: Fix memory corruption in --branch-history mode --branch-history (bnc#1012382).
- perf tests: Use arch__compare_symbol_names to compare symbols (bnc#1012382).
- pipe: cap initial pipe capacity according to pipe-max-size limit (bnc#1012382 bsc#1045330).
- powerpc/64s: Clear PCR on boot (bnc#1012382).
- powerpc: Add missing prototype for arch_irq_work_raise() (bnc#1012382).
- powerpc/bpf/jit: Fix 32-bit JIT for seccomp_data access (bnc#1012382).
- powerpc: Do not preempt_disable() in show_cpuinfo() (bnc#1012382 bsc#1066223).
- powerpc/mpic: Check if cpu_possible() in mpic_physmask() (bnc#1012382).
- powerpc/numa: Ensure nodes initialized for hotplug (bnc#1012382 bsc#1081514).
- powerpc/numa: Use ibm,max-associativity-domains to discover possible nodes (bnc#1012382 bsc#1081514).
- powerpc/perf: Fix kernel address leak via sampling registers (bnc#1012382).
- powerpc/perf: Prevent kernel address leak to userspace via BHRB buffer (bnc#1012382).
- powerpc/powernv: Fix NVRAM sleep in invalid context when crashing (bnc#1012382).
- powerpc/powernv: panic() on OPAL lower than V3 (bnc#1012382).
- powerpc/powernv: remove FW_FEATURE_OPALv3 and just use FW_FEATURE_OPAL (bnc#1012382).
- powerpc/powernv: Remove OPALv2 firmware define and references (bnc#1012382).
- proc: fix /proc/*/map_files lookup (bnc#1012382).
- procfs: fix pthread cross-thread naming if !PR_DUMPABLE (bnc#1012382).
- proc: meminfo: estimate available memory more conservatively (bnc#1012382).
- proc read mm's {arg,env}_{start,end} with mmap semaphore taken (bnc#1012382).
- qed: Fix mask for physical address in ILT entry (bnc#1012382).
- qla2xxx: Mask off Scope bits in retry delay (bsc#1068054).
- qmi_wwan: do not steal interfaces from class drivers (bnc#1012382).
- r8152: fix tx packets accounting (bnc#1012382).
- r8169: fix powering up RTL8168h (bnc#1012382).
- RDMA/mlx5: Avoid memory leak in case of XRCD dealloc failure (bnc#1012382).
- RDMA/ucma: Correct option size check using optlen (bnc#1012382).
- RDS: IB: Fix null pointer issue (bnc#1012382).
- Refreshed contents of patches (bsc#1085185)
- regulator: of: Add a missing 'of_node_put()' in an error handling path of 'of_regulator_match()' (bnc#1012382).
- regulatory: add NUL to request alpha2 (bnc#1012382).
- Revert 'arm: dts: imx6qdl-wandboard: Fix audio channel swap' (bnc#1012382).
- Revert 'ima: limit file hash setting by user to fix and log modes' (bnc#1012382).
- Revert 'ipc/shm: Fix shmat mmap nil-page protection' (bnc#1012382).
- Revert 'regulatory: add NUL to request alpha2' (kabi).
- Revert 'vti4: Do not override MTU passed on link creation via IFLA_MTU' (bnc#1012382).
- rtc: hctosys: Ensure system time does not overflow time_t (bnc#1012382).
- rtc: snvs: Fix usage of snvs_rtc_enable (bnc#1012382).
- rtc: tx4939: avoid unintended sign extension on a 24 bit shift (bnc#1012382).
- rtlwifi: rtl8192cu: Remove variable self-assignment in rf.c (bnc#1012382).
- rtnetlink: validate attributes in do_setlink() (bnc#1012382).
- s390: add assembler macros for CPU alternatives (bnc#1012382).
- s390/cio: clear timer when terminating driver I/O (bnc#1012382).
- s390/cio: fix return code after missing interrupt (bnc#1012382).
- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero (LTC#168035 bnc#1012382 bnc#1094532).
- s390: extend expoline to BC instructions (bnc#1012382).
- s390/ftrace: use expoline for indirect branches (bnc#1012382).
- s390/kernel: use expoline for indirect branches (bnc#1012382).
- s390/lib: use expoline for indirect branches (bnc#1012382).
- s390: move expoline assembler macros to a header (bnc#1012382).
- s390: move spectre sysfs attribute code (bnc#1012382).
- s390/qdio: do not release memory in qdio_setup_irq() (bnc#1012382).
- s390/qdio: fix access to uninitialized qdio_q fields (LTC#168037 bnc#1012382 bnc#1094532).
- s390: remove indirect branch from do_softirq_own_stack (bnc#1012382).
- s390: use expoline thunks in the BPF JIT (bnc#1012382).
- sched/rt: Fix rq-&gt;clock_update_flags lower than RQCF_ACT_SKIP warning (bnc#1012382).
- scripts/git-pre-commit:
- scsi: aacraid: fix shutdown crash when init fails (bnc#1012382).
- scsi: aacraid: Insure command thread is not recursively stopped (bnc#1012382).
- scsi: bnx2fc: Fix check in SCSI completion handler for timed out request (bnc#1012382).
- scsi: fas216: fix sense buffer initialization (bnc#1012382 bsc#1082979).
- scsi: libsas: defer ata device eh commands to libata (bnc#1012382).
- scsi: lpfc: Fix frequency of Release WQE CQEs (bnc#1012382).
- scsi: lpfc: Fix issue_lip if link is disabled (bnc#1012382 bsc#1080656).
- scsi: lpfc: Fix soft lockup in lpfc worker thread during LIP testing (bnc#1012382 bsc#1080656).
- scsi: mpt3sas: Do not mark fw_event workqueue as WQ_MEM_RECLAIM (bnc#1012382 bsc#1078583).
- scsi: mptfusion: Add bounds check in mptctl_hp_targetinfo() (bnc#1012382).
- scsi: qla2xxx: Avoid triggering undefined behavior in qla2x00_mbx_completion() (bnc#1012382).
- scsi: qla4xxx: skip error recovery in case of register disconnect (bnc#1012382).
- scsi: scsi_transport_srp: Fix shost to rport translation (bnc#1012382).
- scsi: sd: Keep disk read-only when re-reading partition (bnc#1012382).
- scsi: sg: allocate with __GFP_ZERO in sg_build_indirect() (bnc#1012382).
- scsi: storvsc: Increase cmd_per_lun for higher speed devices (bnc#1012382).
- scsi: sym53c8xx_2: iterator underflow in sym_getsync() (bnc#1012382).
- scsi: ufs: Enable quirk to ignore sending WRITE_SAME command (bnc#1012382).
- scsi: zfcp: fix infinite iteration on ERP ready list (LTC#168038 bnc#1012382 bnc#1094532).
- sctp: delay the authentication for the duplicated cookie-echo chunk (bnc#1012382).
- sctp: fix the issue that the cookie-ack with auth can't get processed (bnc#1012382).
- sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr (bnc#1012382).
- sctp: use the old asoc when making the cookie-ack chunk in dupcook_d (bnc#1012382).
- selftests: ftrace: Add a testcase for probepoint (bnc#1012382).
- selftests: ftrace: Add a testcase for string type with kprobe_event (bnc#1012382).
- selftests: ftrace: Add probe event argument syntax testcase (bnc#1012382).
- selftests: memfd: add config fragment for fuse (bnc#1012382).
- selftests/net: fixes psock_fanout eBPF test case (bnc#1012382).
- selftests/powerpc: Skip the subpage_prot tests if the syscall is unavailable (bnc#1012382).
- selftests: Print the test we're running to /dev/kmsg (bnc#1012382).
- selinux: KASAN: slab-out-of-bounds in xattr_getsecurity (bnc#1012382).
- serial: arc_uart: Fix out-of-bounds access through DT alias (bnc#1012382).
- serial: fsl_lpuart: Fix out-of-bounds access through DT alias (bnc#1012382).
- serial: imx: Fix out-of-bounds access through serial port index (bnc#1012382).
- serial: mxs-auart: Fix out-of-bounds access through serial port index (bnc#1012382).
- serial: samsung: fix maxburst parameter for DMA transactions (bnc#1012382).
- serial: samsung: Fix out-of-bounds access through serial port index (bnc#1012382).
- serial: xuartps: Fix out-of-bounds access through DT alias (bnc#1012382).
- sh: fix debug trap failure to process signals before return to user (bnc#1012382).
- sh: New gcc support (bnc#1012382).
- signals: avoid unnecessary taking of sighand-&gt;siglock (bnc#1012382 bnc#978907).
- sit: fix IFLA_MTU ignored on NEWLINK (bnc#1012382).
- smsc75xx: fix smsc75xx_set_features() (bnc#1012382).
- sock_diag: fix use-after-free read in __sk_free (bnc#1012382).
- sparc64: Fix build warnings with gcc 7 (bnc#1012382).
- sparc64: Make atomic_xchg() an inline function rather than a macro (bnc#1012382).
- spi: pxa2xx: Allow 64-bit DMA (bnc#1012382).
- sr: get/drop reference to device in revalidate and check_events (bnc#1012382).
- staging: rtl8192u: return -ENOMEM on failed allocation of priv-&gt;oldaddr (bnc#1012382).
- stm class: Use vmalloc for the master map (bnc#1012382).
- sunvnet: does not support GSO for sctp (bnc#1012382).
- swap: divide-by-zero when zero length swap file on ssd (bnc#1012382 bsc#1082153).
- tcp: avoid integer overflows in tcp_rcv_space_adjust() (bnc#1012382).
- tcp: ignore Fast Open on repair mode (bnc#1012382).
- tcp: purge write queue in tcp_connect_init() (bnc#1012382).
- team: use netdev_features_t instead of u32 (bnc#1012382).
- test_bpf: Fix testing with CONFIG_BPF_JIT_ALWAYS_ON=y on other arches (git-fixes).
- tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent() (bnc#1012382).
- tick/broadcast: Use for_each_cpu() specially on UP kernels (bnc#1012382).
- time: Fix CLOCK_MONOTONIC_RAW sub-nanosecond accounting (bnc#1012382).
- tools/libbpf: handle issues with bpf ELF objects containing .eh_frames (bnc#1012382).
- tools lib traceevent: Fix get_field_str() for dynamic strings (bnc#1012382).
- tools lib traceevent: Simplify pointer print logic and fix %pF (bnc#1012382).
- tools/thermal: tmon: fix for segfault (bnc#1012382).
- tpm: do not suspend/resume if power stays on (bnc#1012382).
- tpm: self test failure should not cause suspend to fail (bnc#1012382).
- tracing: Fix crash when freeing instances with event triggers (bnc#1012382).
- tracing/hrtimer: Fix tracing bugs by taking all clock bases and modes into account (bnc#1012382).
- tracing/x86/xen: Remove zero data size trace events trace_xen_mmu_flush_tlb{_all} (bnc#1012382).
- udf: Provide saner default for invalid uid / gid (bnc#1012382).
- usb: dwc2: Fix dwc2_hsotg_core_init_disconnected() (bnc#1012382).
- usb: dwc2: Fix interval type issue (bnc#1012382).
- usb: dwc3: Update DWC_usb31 GTXFIFOSIZ reg fields (bnc#1012382).
- usb: gadget: composite: fix incorrect handling of OS desc requests (bnc#1012382).
- usb: gadget: ffs: Execute copy_to_user() with USER_DS set (bnc#1012382).
- usb: gadget: ffs: Let setup() return USB_GADGET_DELAYED_STATUS (bnc#1012382).
- usb: gadget: fsl_udc_core: fix ep valid checks (bnc#1012382).
- usb: gadget: f_uac2: fix bFirstInterface in composite gadget (bnc#1012382).
- usb: gadget: udc: change comparison to bitshift when dealing with a mask (bnc#1012382).
- usbip: usbip_host: delete device from busid_table after rebind (bnc#1012382).
- usbip: usbip_host: fix bad unlock balance during stub_probe() (bnc#1012382).
- usbip: usbip_host: fix NULL-ptr deref and use-after-free errors (bnc#1012382).
- usbip: usbip_host: refine probe and disconnect debug msgs to be useful (bnc#1012382).
- usbip: usbip_host: run rebind from exit when module is removed (bnc#1012382).
- usb: musb: call pm_runtime_{get,put}_sync before reading vbus registers (bnc#1012382).
- usb: musb: fix enumeration after resume (bnc#1012382).
- USB: OHCI: Fix NULL dereference in HCDs using HCD_LOCAL_MEM (bnc#1012382).
- USB: serial: cp210x: use tcflag_t to fix incompatible pointer type (bnc#1012382).
- vfs: add path_has_submounts() (bsc#1086716).
- vfs: add path_is_mountpoint() helper (bsc#1086716).
- vfs: change d_manage() to take a struct path (bsc#1086716).
- virtio-gpu: fix ioctl and expose the fixed status to userspace (bnc#1012382).
- virtio-net: Fix operstate for virtio when no VIRTIO_NET_F_STATUS (bnc#1012382).
- vmscan: do not force-scan file lru if its absolute size is small (bnc#1012382).
- vmw_balloon: fixing double free when batching mode is off (bnc#1012382).
- vti4: Do not count header length twice on tunnel setup (bnc#1012382).
- vti4: Do not override MTU passed on link creation via IFLA_MTU (bnc#1012382).
- watchdog: f71808e_wdt: Fix magic close handling (bnc#1012382).
- watchdog: sp5100_tco: Fix watchdog disable bit (bnc#1012382).
- workqueue: use put_device() instead of kfree() (bnc#1012382).
- x86/apic: Set up through-local-APIC mode on the boot CPU if 'noapic' specified (bnc#1012382).
- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).
- x86/bugs: IBRS: make runtime disabling fully dynamic (bsc#1068032).
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).
- x86/cpufeature: Remove unused and seldomly used cpu_has_xx macros (bnc#1012382).
- x86/crypto, x86/fpu: Remove X86_FEATURE_EAGER_FPU #ifdef from the crc32c code (bnc#1012382).
- x86/devicetree: Fix device IRQ settings in DT (bnc#1012382).
- x86/devicetree: Initialize device tree before using it (bnc#1012382).
- x86: ENABLE_IBRS is sometimes called early during boot while it should not. Let's drop the uoptimization for now. Fixes bsc#1098009 and bsc#1098012
- x86/fpu: Disable AVX when eagerfpu is off (bnc#1012382).
- x86/fpu: Hard-disable lazy FPU mode (bnc#1012382).
- x86/fpu: Revert ('x86/fpu: Disable AVX when eagerfpu is off') (bnc#1012382).
- x86/kexec: Avoid double free_page() upon do_kexec_load() failure (bnc#1012382).
- x86/pgtable: Do not set huge PUD/PMD on non-leaf entries (bnc#1012382).
- x86/pkeys: Do not special case protection key 0 (1041740).
- x86/pkeys: Override pkey when moving away from PROT_EXEC (1041740).
- x86/power: Fix swsusp_arch_resume prototype (bnc#1012382).
- x86: Remove unused function cpu_has_ht_siblings() (bnc#1012382).
- x86/topology: Update the 'cpu cores' field in /proc/cpuinfo correctly across CPU hotplug operations (bnc#1012382).
- xen/acpi: off by one in read_acpi_id() (bnc#1012382).
- xen/grant-table: Use put_page instead of free_page (bnc#1012382).
- xen-netfront: Fix race between device setup and open (bnc#1012382).
- xen/netfront: raise max number of slots in xennet_get_responses() (bnc#1076049).
- xen/pirq: fix error path cleanup when binding MSIs (bnc#1012382).
- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1012382).
- xen: xenbus: use put_device() instead of kfree() (bnc#1012382).
- xfrm: fix xfrm_do_migrate() with AEAD e.g(AES-GCM) (bnc#1012382).
- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).
- xfs: detect agfl count corruption and reset agfl (bnc#1012382 bsc#1090534 bsc#1090955).
- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).
- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).
- xfs: remove racy hasattr check from attr ops (bnc#1012382 bsc#1035432).
- xhci: Fix USB3 NULL pointer dereference at logical disconnect (git-fixes).
- xhci: Fix use-after-free in xhci_free_virt_device (git-fixes).
- xhci: zero usb device slot_id member when disabling and freeing a xhci slot (bnc#1012382).
- zorro: Set up z-&gt;dev.dma_mask for the DMA API (bnc#1012382).
- xfs: fix incorrect log_flushed on fsync (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-21"/>
	<updated date="2018-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024718">SUSE bug 1024718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035432">SUSE bug 1035432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041740">SUSE bug 1041740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045330">SUSE bug 1045330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056415">SUSE bug 1056415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068054">SUSE bug 1068054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068951">SUSE bug 1068951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070404">SUSE bug 1070404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073311">SUSE bug 1073311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075428">SUSE bug 1075428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076049">SUSE bug 1076049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078583">SUSE bug 1078583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079152">SUSE bug 1079152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080542">SUSE bug 1080542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080656">SUSE bug 1080656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081500">SUSE bug 1081500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081514">SUSE bug 1081514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082153">SUSE bug 1082153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082504">SUSE bug 1082504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082979">SUSE bug 1082979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085185">SUSE bug 1085185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085308">SUSE bug 1085308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086400">SUSE bug 1086400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086716">SUSE bug 1086716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087036">SUSE bug 1087036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088871">SUSE bug 1088871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090435">SUSE bug 1090435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090534">SUSE bug 1090534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090734">SUSE bug 1090734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090955">SUSE bug 1090955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091594">SUSE bug 1091594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094532">SUSE bug 1094532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095042">SUSE bug 1095042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095147">SUSE bug 1095147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096037">SUSE bug 1096037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096140">SUSE bug 1096140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096214">SUSE bug 1096214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096242">SUSE bug 1096242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096281">SUSE bug 1096281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096751">SUSE bug 1096751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096982">SUSE bug 1096982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097234">SUSE bug 1097234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098009">SUSE bug 1098009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098012">SUSE bug 1098012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973378">SUSE bug 973378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978907">SUSE bug 978907</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17741/">CVE-2017-17741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17741">CVE-2017-17741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-18241/">CVE-2017-18241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18241">CVE-2017-18241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-18249/">CVE-2017-18249 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18249">CVE-2017-18249 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12233/">CVE-2018-12233 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12233">CVE-2018-12233 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3665">CVE-2018-3665 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5848">CVE-2018-5848 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552855" comment="kernel-default-4.4.138-94.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552856" comment="kernel-default-base-4.4.138-94.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552857" comment="kernel-default-devel-4.4.138-94.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552858" comment="kernel-default-man-4.4.138-94.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519729" comment="kernel-devel-4.4.138-94.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519730" comment="kernel-macros-4.4.138-94.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519731" comment="kernel-source-4.4.138-94.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552859" comment="kernel-syms-4.4.138-94.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149474" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1005778" ref_url="https://bugzilla.suse.com/1005778" source="BUGZILLA"/>
		<reference ref_id="1005780" ref_url="https://bugzilla.suse.com/1005780" source="BUGZILLA"/>
		<reference ref_id="1005781" ref_url="https://bugzilla.suse.com/1005781" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1017967" ref_url="https://bugzilla.suse.com/1017967" source="BUGZILLA"/>
		<reference ref_id="1039616" ref_url="https://bugzilla.suse.com/1039616" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1063043" ref_url="https://bugzilla.suse.com/1063043" source="BUGZILLA"/>
		<reference ref_id="1064311" ref_url="https://bugzilla.suse.com/1064311" source="BUGZILLA"/>
		<reference ref_id="1065180" ref_url="https://bugzilla.suse.com/1065180" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068951" ref_url="https://bugzilla.suse.com/1068951" source="BUGZILLA"/>
		<reference ref_id="1070116" ref_url="https://bugzilla.suse.com/1070116" source="BUGZILLA"/>
		<reference ref_id="1071009" ref_url="https://bugzilla.suse.com/1071009" source="BUGZILLA"/>
		<reference ref_id="1072166" ref_url="https://bugzilla.suse.com/1072166" source="BUGZILLA"/>
		<reference ref_id="1072216" ref_url="https://bugzilla.suse.com/1072216" source="BUGZILLA"/>
		<reference ref_id="1072556" ref_url="https://bugzilla.suse.com/1072556" source="BUGZILLA"/>
		<reference ref_id="1072866" ref_url="https://bugzilla.suse.com/1072866" source="BUGZILLA"/>
		<reference ref_id="1072890" ref_url="https://bugzilla.suse.com/1072890" source="BUGZILLA"/>
		<reference ref_id="1072962" ref_url="https://bugzilla.suse.com/1072962" source="BUGZILLA"/>
		<reference ref_id="1073090" ref_url="https://bugzilla.suse.com/1073090" source="BUGZILLA"/>
		<reference ref_id="1073525" ref_url="https://bugzilla.suse.com/1073525" source="BUGZILLA"/>
		<reference ref_id="1073792" ref_url="https://bugzilla.suse.com/1073792" source="BUGZILLA"/>
		<reference ref_id="1073809" ref_url="https://bugzilla.suse.com/1073809" source="BUGZILLA"/>
		<reference ref_id="1073868" ref_url="https://bugzilla.suse.com/1073868" source="BUGZILLA"/>
		<reference ref_id="1073874" ref_url="https://bugzilla.suse.com/1073874" source="BUGZILLA"/>
		<reference ref_id="1073912" ref_url="https://bugzilla.suse.com/1073912" source="BUGZILLA"/>
		<reference ref_id="963897" ref_url="https://bugzilla.suse.com/963897" source="BUGZILLA"/>
		<reference ref_id="964063" ref_url="https://bugzilla.suse.com/964063" source="BUGZILLA"/>
		<reference ref_id="966170" ref_url="https://bugzilla.suse.com/966170" source="BUGZILLA"/>
		<reference ref_id="966172" ref_url="https://bugzilla.suse.com/966172" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17805" ref_url="https://www.suse.com/security/cve/CVE-2017-17805/" source="CVE"/>
		<reference ref_id="CVE-2017-17806" ref_url="https://www.suse.com/security/cve/CVE-2017-17806/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003564.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

This update adds mitigations for various side channel attacks against modern CPUs that could disclose
content of otherwise unreadable memory (bnc#1068032).

- CVE-2017-5753 / 'SpectreAttack': Local attackers on systems with modern CPUs featuring
  deep instruction pipelining could use attacker controllable speculative
  execution over code patterns in the Linux Kernel to leak content from
  otherwise not readable memory in the same address space, allowing
  retrieval of passwords, cryptographic keys and other secrets.

  This problem is mitigated by adding speculative fencing on affected
  code paths throughout the Linux kernel.


- CVE-2017-5715 / 'SpectreAttack': Local attackers on systems with modern CPUs featuring
  branch prediction could use mispredicted branches to speculatively execute
  code patterns that in turn could be made to leak other non-readable
  content in the same address space, an attack similar to CVE-2017-5753.

  This problem is mitigated by disabling predictive branches, depending
  on CPU architecture either by firmware updates and/or fixes in the
  user-kernel privilege boundaries.

  Please also check with your CPU / Hardware vendor for available
  firmware or BIOS updates.

  As this feature can have a performance impact, it can be disabled
  using the 'nospec' kernel commandline option.


- CVE-2017-5754 / 'MeltdownAttack': Local attackers on systems with
  modern CPUs featuring deep instruction pipelining could use code
  patterns in userspace to speculative executive code that would read
  otherwise read protected memory.

  This problem is mitigated by unmapping the Linux Kernel from the user
  address space during user code execution, following a approach called
  'KAISER'. The terms used here are 'KAISER' / 'Kernel Address Isolation'
  and 'PTI' / 'Page Table Isolation'.

  This is only enabled by default on affected architectures.

  This feature can be enabled / disabled by the 'pti=[on|off|auto]' or 'nopti' commandline options.


The following security bugs were fixed:

- CVE-2017-17806: The HMAC implementation (crypto/hmac.c) in the Linux
  kernel did not validate that the underlying cryptographic hash algorithm
  is unkeyed, allowing a local attacker able to use the AF_ALG-based hash
  interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm
  (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing
  a crafted sequence of system calls that encounter a missing SHA-3
  initialization (bnc#1073874).
- CVE-2017-17805: The Salsa20 encryption algorithm in the Linux kernel did
  not correctly handle zero-length inputs, allowing a local attacker able to
  use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER)
  to cause a denial of service (uninitialized-memory free and kernel
  crash) or have unspecified other impact by executing a crafted sequence
  of system calls that use the blkcipher_walk API. Both the generic
  implementation (crypto/salsa20_generic.c) and x86 implementation
  (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable (bnc#1073792).


The following non-security bugs were fixed:

- Add undefine _unique_build_ids (bsc#964063)
- apei / ERST: Fix missing error handling in erst_reader() (bsc#1072556).
- arm: Hide finish_arch_post_lock_switch() from modules (bsc#1068032).
- autofs: fix careless error in recent commit (bnc#1012382 bsc#1065180).
- bnxt_en: Do not print 'Link speed -1 no longer supported' messages (bsc#1070116).
- bpf: prevent speculative execution in eBPF interpreter (bnc#1068032).
- carl9170: prevent speculative execution (bnc#1068032).
- ceph: drop negative child dentries before try pruning inode's alias (bsc#1073525).
- Check cmdline_find_option() retval properly and use boot_cpu_has().
- cifs: Fix NULL pointer deref on SMB2_tcon() failure (bsc#1071009).
- cw1200: prevent speculative execution (bnc#1068032).
- e1000e: Fix e1000_check_for_copper_link_ich8lan return value (bsc#1073809).
- Fix unsed variable warning in has_unmovable_pages (bsc#1073868).
- fs: prevent speculative execution (bnc#1068032).
- genwqe: Take R/W permissions into account when dealing with memory pages (bsc#1073090).
- ibmvnic: Include header descriptor support for ARP packets (bsc#1073912).
- ibmvnic: Increase maximum number of RX/TX queues (bsc#1073912).
- ibmvnic: Rename IBMVNIC_MAX_TX_QUEUES to IBMVNIC_MAX_QUEUES (bsc#1073912).
- ipv6: prevent speculative execution (bnc#1068032).
- iw_cxgb4: fix misuse of integer variable (bsc#963897,FATE#320114).
- iw_cxgb4: only insert drain cqes if wq is flushed (bsc#321658 FATE#1005778 bsc#321660 FATE#1005780 bsc#321661 FATE#1005781).
- kaiser: add 'nokaiser' boot option, using ALTERNATIVE.
- kaiser: align addition to x86/mm/Makefile.
- kaiser: asm/tlbflush.h handle noPGE at lower level.
- kaiser: cleanups while trying for gold link.
- kaiser: disabled on Xen PV.
- kaiser: do not set _PAGE_NX on pgd_none.
- kaiser: drop is_atomic arg to kaiser_pagetable_walk().
- kaiser: enhanced by kernel and user PCIDs.
- kaiser: ENOMEM if kaiser_pagetable_walk() NULL.
- kaiser: fix build and FIXME in alloc_ldt_struct().
- kaiser: fix perf crashes.
- kaiser: fix regs to do_nmi() ifndef CONFIG_KAISER.
- kaiser: fix unlikely error in alloc_ldt_struct().
- kaiser: KAISER depends on SMP.
- kaiser: kaiser_flush_tlb_on_return_to_user() check PCID.
- kaiser: kaiser_remove_mapping() move along the pgd.
- kaiser: Kernel Address Isolation.
- kaiser: load_new_mm_cr3() let SWITCH_USER_CR3 flush.
- kaiser: load_new_mm_cr3() let SWITCH_USER_CR3 flush user.
- kaiser: name that 0x1000 KAISER_SHADOW_PGD_OFFSET.
- kaiser: paranoid_entry pass cr3 need to paranoid_exit.
- kaiser: PCID 0 for kernel and 128 for user.
- kaiser: _pgd_alloc() without __GFP_REPEAT to avoid stalls.
- kaiser: stack map PAGE_SIZE at THREAD_SIZE-PAGE_SIZE.
- kaiser: tidied up asm/kaiser.h somewhat.
- kaiser: tidied up kaiser_add/remove_mapping slightly.
- kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.
- kaiser: vmstat show NR_KAISERTABLE as nr_overhead.
- kaiser: x86_cr3_pcid_noflush and x86_cr3_pcid_user.
- kvm: svm: Do not intercept new speculative control MSRs (bsc#1068032).
- kvm: x86: Add speculative control CPUID support for guests (bsc#1068032).
- locking/barriers: introduce new memory barrier gmb() (bnc#1068032).
- mm/mmu_context, sched/core: Fix mmu_context.h assumption (bsc#1068032).
- net/mlx5e: DCBNL, Implement tc with ets type and zero bandwidth (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net: mpls: prevent speculative execution (bnc#1068032).
- nfs: revalidate '.' etc correctly on 'open' (bsc#1068951).
- nfs: revalidate '.' etc correctly on 'open' (git-fixes). Fix References: tag.
- nfsv4: always set NFS_LOCK_LOST when a lock is lost (bsc#1068951).
- nvme-fabrics: introduce init command check for a queue that is not alive (bsc#1072890).
- nvme-fc: check if queue is ready in queue_rq (bsc#1072890).
- nvme-fc: do not use bit masks for set/test_bit() numbers (bsc#1072890).
- nvme-loop: check if queue is ready in queue_rq (bsc#1072890).
- nvmet-fc: cleanup nvmet add_port/remove_port (bsc#1072890).
- nvmet_fc: correct broken add_port (bsc#1072890).
- p54: prevent speculative execution (bnc#1068032).
- powerpc/barrier: add gmb.
- powerpc: Secure memory rfi flush (bsc#1068032).
- ptrace: Add a new thread access check (bsc#1068032).
- qla2xxx: prevent speculative execution (bnc#1068032).
- s390: add ppa to system call and program check path (bsc#1068032).
- s390: introduce CPU alternatives (bsc#1068032).
- s390/qeth: add missing hash table initializations (bnc#1072216, LTC#162173).
- s390/qeth: fix early exit from error path (bnc#1072216, LTC#162173).
- s390/qeth: fix thinko in IPv4 multicast address tracking (bnc#1072216, LTC#162173).
- s390/spinlock: add gmb memory barrier (bsc#1068032).
- sched/core: Add switch_mm_irqs_off() and use it in the scheduler (bsc#1068032).
- sched/core: Idle_task_exit() shouldn't use switch_mm_irqs_off() (bsc#1068032).
- scsi_dh_alua: skip RTPG for devices only supporting active/optimized (bsc#1064311).
- scsi: lpfc: correct sg_seg_cnt attribute min vs default (bsc#1072166).
- scsi: qedi: Limit number for CQ queues (bsc#1072866).
- scsi_scan: Exit loop if TUR to LUN0 fails with 0x05/0x25 (bsc#1063043). This is specific to FUJITSU ETERNUS_DX* targets. They can return 'Illegal Request - Logical unit not supported' and processing should leave the timeout loop in this case.
- scsi: ses: check return code from ses_recv_diag() (bsc#1039616).
- scsi: ses: Fixup error message 'failed to get diagnostic page 0xffffffea' (bsc#1039616).
- scsi: ses: Fix wrong page error (bsc#1039616).
- scsi: ses: make page2 support optional (bsc#1039616).
- sfc: pass valid pointers from efx_enqueue_unwind (bsc#1017967 FATE#321663).
- thermal/int340x: prevent speculative execution (bnc#1068032).
- udf: prevent speculative execution (bnc#1068032).
- Update config files: enable KAISER.
- usb: host: fix incorrect updating of offset (bsc#1047487).
- userns: prevent speculative execution (bnc#1068032).
- uvcvideo: prevent speculative execution (bnc#1068032).
- vxlan: correctly handle ipv6.disable module parameter (bsc#1072962).
- x86/boot: Add early cmdline parsing for options with arguments.
- x86/CPU/AMD: Add speculative control support for AMD (bsc#1068032).
- x86/CPU/AMD: Make the LFENCE instruction serialized (bsc#1068032).
- x86/CPU/AMD: Remove now unused definition of MFENCE_RDTSC feature (bsc#1068032).
- x86/CPU: Check speculation control CPUID bit (bsc#1068032).
- x86/enter: Add macros to set/clear IBRS and set IBPB (bsc#1068032).
- x86/entry: Add a function to overwrite the RSB (bsc#1068032).
- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).
- x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- x86/feature: Enable the x86 feature to control Speculation (bsc#1068032).
- x86/idle: Disable IBRS when offlining a CPU and re-enable on wakeup (bsc#1068032).
- x86/idle: Toggle IBRS when going idle (bsc#1068032).
- x86/kaiser: Check boottime cmdline params.
- x86/kaiser: Move feature detection up (bsc#1068032).
- x86/kaiser: Reenable PARAVIRT.
- x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.
- x86/kvm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).
- x86/kvm: Add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).
- x86/kvm: Flush IBP when switching VMs (bsc#1068032).
- x86/kvm: Pad RSB on VM transition (bsc#1068032).
- x86/kvm: Toggle IBRS on VM entry and exit (bsc#1068032).
- x86/mm/64: Fix reboot interaction with CR4.PCIDE (bsc#1068032).
- x86/mm: Add a 'noinvpcid' boot option to turn off INVPCID (bsc#1068032).
- x86/mm: Add INVPCID helpers (bsc#1068032).
- x86/mm: Add the 'nopcid' boot option to turn off PCID (bsc#1068032).
- x86/mm: Build arch/x86/mm/tlb.c even on !SMP (bsc#1068032).
- x86/mm: Enable CR4.PCIDE on supported systems (bsc#1068032).
- x86/mm: Fix INVPCID asm constraint (bsc#1068032).
- x86/mm: If INVPCID is available, use it to flush global mappings (bsc#1068032).
- x86/mm: Make flush_tlb_mm_range() more predictable (bsc#1068032).
- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (bsc#1068032).
- x86/mm: Reimplement flush_tlb_page() using flush_tlb_mm_range() (bsc#1068032).
- x86/mm: Remove flush_tlb() and flush_tlb_current_task() (bsc#1068032).
- x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code (bsc#1068032).
- x86/mm, sched/core: Turn off IRQs in switch_mm() (bsc#1068032).
- x86/mm, sched/core: Uninline switch_mm() (bsc#1068032).
- x86/mm: Set IBPB upon context switch (bsc#1068032).
- x86/MSR: Move native_*msr(.. u64) to msr.h (bsc#1068032).
- x86/paravirt: Dont patch flush_tlb_single (bsc#1068032).
- x86/spec: Add IBRS control functions (bsc#1068032).
- x86/spec: Add 'nospec' chicken bit (bsc#1068032).
- x86/spec: Check CPUID direclty post microcode reload to support IBPB feature (bsc#1068032).
- x86/spec_ctrl: Add an Indirect Branch Predictor barrier (bsc#1068032).
- x86/spec_ctrl: Check whether IBPB is enabled before using it (bsc#1068032).
- x86/spec_ctrl: Check whether IBRS is enabled before using it (bsc#1068032).
- x86/svm: Add code to clear registers on VM exit (bsc#1068032).
- x86/svm: Clobber the RSB on VM exit (bsc#1068032).
- x86/svm: Set IBPB when running a different VCPU (bsc#1068032).
- x86/svm: Set IBRS value on VM entry and exit (bsc#1068032).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005778">SUSE bug 1005778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005780">SUSE bug 1005780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005781">SUSE bug 1005781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017967">SUSE bug 1017967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039616">SUSE bug 1039616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063043">SUSE bug 1063043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064311">SUSE bug 1064311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065180">SUSE bug 1065180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068951">SUSE bug 1068951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070116">SUSE bug 1070116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071009">SUSE bug 1071009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072166">SUSE bug 1072166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072216">SUSE bug 1072216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072556">SUSE bug 1072556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072866">SUSE bug 1072866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072890">SUSE bug 1072890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072962">SUSE bug 1072962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073090">SUSE bug 1073090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073525">SUSE bug 1073525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073792">SUSE bug 1073792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073809">SUSE bug 1073809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073868">SUSE bug 1073868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073874">SUSE bug 1073874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073912">SUSE bug 1073912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963897">SUSE bug 963897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964063">SUSE bug 964063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966170">SUSE bug 966170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966172">SUSE bug 966172</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17805/">CVE-2017-17805 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17805">CVE-2017-17805 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17806/">CVE-2017-17806 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17806">CVE-2017-17806 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552860" comment="kernel-default-4.4.103-6.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552861" comment="kernel-default-base-4.4.103-6.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552862" comment="kernel-default-devel-4.4.103-6.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552863" comment="kernel-default-man-4.4.103-6.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519736" comment="kernel-devel-4.4.103-6.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519737" comment="kernel-macros-4.4.103-6.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519738" comment="kernel-source-4.4.103-6.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552864" comment="kernel-syms-4.4.103-6.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149475" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1088681" ref_url="https://bugzilla.suse.com/1088681" source="BUGZILLA"/>
		<reference ref_id="1090518" ref_url="https://bugzilla.suse.com/1090518" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755/" source="CVE"/>
		<reference ref_id="CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761/" source="CVE"/>
		<reference ref_id="CVE-2018-2766" ref_url="https://www.suse.com/security/cve/CVE-2018-2766/" source="CVE"/>
		<reference ref_id="CVE-2018-2767" ref_url="https://www.suse.com/security/cve/CVE-2018-2767/" source="CVE"/>
		<reference ref_id="CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771/" source="CVE"/>
		<reference ref_id="CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781/" source="CVE"/>
		<reference ref_id="CVE-2018-2782" ref_url="https://www.suse.com/security/cve/CVE-2018-2782/" source="CVE"/>
		<reference ref_id="CVE-2018-2784" ref_url="https://www.suse.com/security/cve/CVE-2018-2784/" source="CVE"/>
		<reference ref_id="CVE-2018-2787" ref_url="https://www.suse.com/security/cve/CVE-2018-2787/" source="CVE"/>
		<reference ref_id="CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813/" source="CVE"/>
		<reference ref_id="CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817/" source="CVE"/>
		<reference ref_id="CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<description>


MariaDB was updated to 10.0.35 (bsc#1090518)

Notable changes:

* PCRE updated to 8.42
* XtraDB updated to 5.6.39-83.1
* TokuDB updated to 5.6.39-83.1
* InnoDB updated to 5.6.40
* The embedded server library now supports SSL when connecting
  to remote servers [bsc#1088681], [CVE-2018-2767]
* MDEV-15249 - Crash in MVCC read after IMPORT TABLESPACE
* MDEV-14988 - innodb_read_only tries to modify files if
  transactions were recovered in COMMITTED state
* MDEV-14773 - DROP TABLE hangs for InnoDB table with FULLTEXT index
* MDEV-15723 - Crash in INFORMATION_SCHEMA.INNODB_SYS_TABLES when
  accessing corrupted record
* fixes for the following security vulnerabilities:
  CVE-2018-2782, CVE-2018-2784, CVE-2018-2787, CVE-2018-2766,
  CVE-2018-2755, CVE-2018-2819, CVE-2018-2817, CVE-2018-2761,
  CVE-2018-2781, CVE-2018-2771, CVE-2018-2813
* Release notes and changelog:

    * https://kb.askmonty.org/en/mariadb-10035-release-notes
    * https://kb.askmonty.org/en/mariadb-10035-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-22"/>
	<updated date="2018-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088681">SUSE bug 1088681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2755">CVE-2018-2755 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2761">CVE-2018-2761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2766/">CVE-2018-2766 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2766">CVE-2018-2766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2767/">CVE-2018-2767 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2767">CVE-2018-2767 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2771">CVE-2018-2771 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2781">CVE-2018-2781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2782/">CVE-2018-2782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2782">CVE-2018-2782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2784/">CVE-2018-2784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2784">CVE-2018-2784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2787/">CVE-2018-2787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2787">CVE-2018-2787 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2813">CVE-2018-2813 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2817">CVE-2018-2817 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2819">CVE-2018-2819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552865" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548190" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552866" comment="mariadb-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552867" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552868" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552869" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149476" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1096449" ref_url="https://bugzilla.suse.com/1096449" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004214.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following security issue:

- CVE-2018-6126: Prevent heap buffer overflow in rasterizing paths in SVG with Skia (bsc#1096449).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-22"/>
	<updated date="2018-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096449">SUSE bug 1096449</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6126">CVE-2018-6126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552870" comment="MozillaFirefox-52.8.1esr-109.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552871" comment="MozillaFirefox-translations-52.8.1esr-109.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149477" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1007276" ref_url="https://bugzilla.suse.com/1007276" source="BUGZILLA"/>
		<reference ref_id="1074317" ref_url="https://bugzilla.suse.com/1074317" source="BUGZILLA"/>
		<reference ref_id="1082332" ref_url="https://bugzilla.suse.com/1082332" source="BUGZILLA"/>
		<reference ref_id="1082825" ref_url="https://bugzilla.suse.com/1082825" source="BUGZILLA"/>
		<reference ref_id="1086408" ref_url="https://bugzilla.suse.com/1086408" source="BUGZILLA"/>
		<reference ref_id="1092949" ref_url="https://bugzilla.suse.com/1092949" source="BUGZILLA"/>
		<reference ref_id="974621" ref_url="https://bugzilla.suse.com/974621" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3632" ref_url="https://www.suse.com/security/cve/CVE-2016-3632/" source="CVE"/>
		<reference ref_id="CVE-2016-8331" ref_url="https://www.suse.com/security/cve/CVE-2016-8331/" source="CVE"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-13726" ref_url="https://www.suse.com/security/cve/CVE-2017-13726/" source="CVE"/>
		<reference ref_id="CVE-2017-18013" ref_url="https://www.suse.com/security/cve/CVE-2017-18013/" source="CVE"/>
		<reference ref_id="CVE-2018-10963" ref_url="https://www.suse.com/security/cve/CVE-2018-10963/" source="CVE"/>
		<reference ref_id="CVE-2018-7456" ref_url="https://www.suse.com/security/cve/CVE-2018-7456/" source="CVE"/>
		<reference ref_id="CVE-2018-8905" ref_url="https://www.suse.com/security/cve/CVE-2018-8905/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004224.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

These security issues were fixed:

- CVE-2017-18013: There was a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash.  (bsc#1074317)
- CVE-2018-10963: The TIFFWriteDirectorySec() function in tif_dirwrite.c allowed remote attackers to cause a denial of service (assertion failure and application crash) via a crafted file, a different vulnerability than CVE-2017-13726.  (bsc#1092949)
- CVE-2018-7456: Prevent a NULL Pointer dereference in the function TIFFPrintDirectory when using the tiffinfo tool to print crafted TIFF information, a different vulnerability than CVE-2017-18013 (bsc#1082825)
- CVE-2017-11613: Prevent denial of service in the TIFFOpen function. During the TIFFOpen process, td_imagelength is not checked. The value of td_imagelength can be directly controlled by an input file. In the ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called based on td_imagelength. If the value of td_imagelength is set close to the amount of system memory, it will hang the system or trigger the OOM killer (bsc#1082332)
- CVE-2018-8905: Prevent heap-based buffer overflow in the function LZWDecodeCompat via a crafted TIFF file (bsc#1086408)
- CVE-2016-8331: Prevent remote code execution because of incorrect handling of TIFF images. A crafted TIFF document could have lead to a type confusion vulnerability resulting in remote code execution. This vulnerability could have been be triggered via a TIFF file delivered to the application using LibTIFF's tag extension functionality (bsc#1007276)
- CVE-2016-3632: The _TIFFVGetField function allowed remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image (bsc#974621)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-27"/>
	<updated date="2018-06-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074317">SUSE bug 1074317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082332">SUSE bug 1082332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082825">SUSE bug 1082825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086408">SUSE bug 1086408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092949">SUSE bug 1092949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3632/">CVE-2016-3632 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3632">CVE-2016-3632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8331/">CVE-2016-8331 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8331">CVE-2016-8331 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11613">CVE-2017-11613 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13726/">CVE-2017-13726 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13726">CVE-2017-13726 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18013/">CVE-2017-18013 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18013">CVE-2017-18013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10963/">CVE-2018-10963 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10963">CVE-2018-10963 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7456/">CVE-2018-7456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7456">CVE-2018-7456 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8905/">CVE-2018-8905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8905">CVE-2018-8905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552872" comment="libtiff5-4.0.9-44.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552873" comment="libtiff5-32bit-4.0.9-44.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552874" comment="tiff-4.0.9-44.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149478" version="1" class="patch">
	<metadata>
		<title>Security update for unixODBC (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1044970" ref_url="https://bugzilla.suse.com/1044970" source="BUGZILLA"/>
		<reference ref_id="1082060" ref_url="https://bugzilla.suse.com/1082060" source="BUGZILLA"/>
		<reference ref_id="1082290" ref_url="https://bugzilla.suse.com/1082290" source="BUGZILLA"/>
		<reference ref_id="1082484" ref_url="https://bugzilla.suse.com/1082484" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7409" ref_url="https://www.suse.com/security/cve/CVE-2018-7409/" source="CVE"/>
		<reference ref_id="CVE-2018-7485" ref_url="https://www.suse.com/security/cve/CVE-2018-7485/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004227.html" source="SUSE-SU"/>
		<description>


This update for unixODBC to version 2.3.6 fixes the following issues:

- CVE-2018-7409: Buffer overflow in unicode_to_ansi_copy() was fixed in 2.3.5 (bsc#1082290)
- CVE-2018-7485: Swapped arguments in SQLWriteFileDSN() in odbcinst/SQLWriteFileDSN.c (bsc#1082484)

Other fixes:

- Enabled --enable-fastvalidate option in configure (bsc#1044970)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-27"/>
	<updated date="2018-06-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044970">SUSE bug 1044970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082060">SUSE bug 1082060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082290">SUSE bug 1082290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082484">SUSE bug 1082484</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7409/">CVE-2018-7409 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7409">CVE-2018-7409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7485/">CVE-2018-7485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7485">CVE-2018-7485 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552875" comment="unixODBC-2.3.6-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552876" comment="unixODBC-32bit-2.3.6-7.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149479" version="1" class="patch">
	<metadata>
		<title>Security update for procps (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1092100" ref_url="https://bugzilla.suse.com/1092100" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<description>
This update for procps fixes the following security issues:

- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top
  with HOME unset in an attacker-controlled directory, the attacker could have
  achieved privilege escalation by exploiting one of several vulnerabilities in
  the config_file() function (bsc#1092100).
- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.
  Inbuilt protection in ps maped a guard page at the end of the overflowed
  buffer, ensuring that the impact of this flaw is limited to a crash (temporary
  denial of service) (bsc#1092100).
- CVE-2018-1124: Prevent multiple integer overflows leading to a heap
  corruption in file2strvec function. This allowed a privilege escalation for a
  local attacker who can create entries in procfs by starting processes, which
  could result in crashes or arbitrary code execution in proc utilities run by
  other users (bsc#1092100).
- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was
  mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent
  truncation/integer overflow issues (bsc#1092100).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-28"/>
	<updated date="2018-06-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1122">CVE-2018-1122 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1123">CVE-2018-1123 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1124">CVE-2018-1124 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1125">CVE-2018-1125 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1126">CVE-2018-1126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552877" comment="libprocps3-3.3.9-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552878" comment="procps-3.3.9-11.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149480" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1047356" ref_url="https://bugzilla.suse.com/1047356" source="BUGZILLA"/>
		<reference ref_id="1056277" ref_url="https://bugzilla.suse.com/1056277" source="BUGZILLA"/>
		<reference ref_id="1087820" ref_url="https://bugzilla.suse.com/1087820" source="BUGZILLA"/>
		<reference ref_id="1094204" ref_url="https://bugzilla.suse.com/1094204" source="BUGZILLA"/>
		<reference ref_id="1094237" ref_url="https://bugzilla.suse.com/1094237" source="BUGZILLA"/>
		<reference ref_id="1095730" ref_url="https://bugzilla.suse.com/1095730" source="BUGZILLA"/>
		<reference ref_id="1095812" ref_url="https://bugzilla.suse.com/1095812" source="BUGZILLA"/>
		<reference ref_id="1095813" ref_url="https://bugzilla.suse.com/1095813" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10928" ref_url="https://www.suse.com/security/cve/CVE-2017-10928/" source="CVE"/>
		<reference ref_id="CVE-2017-13758" ref_url="https://www.suse.com/security/cve/CVE-2017-13758/" source="CVE"/>
		<reference ref_id="CVE-2017-18271" ref_url="https://www.suse.com/security/cve/CVE-2017-18271/" source="CVE"/>
		<reference ref_id="CVE-2018-10804" ref_url="https://www.suse.com/security/cve/CVE-2018-10804/" source="CVE"/>
		<reference ref_id="CVE-2018-10805" ref_url="https://www.suse.com/security/cve/CVE-2018-10805/" source="CVE"/>
		<reference ref_id="CVE-2018-11251" ref_url="https://www.suse.com/security/cve/CVE-2018-11251/" source="CVE"/>
		<reference ref_id="CVE-2018-11655" ref_url="https://www.suse.com/security/cve/CVE-2018-11655/" source="CVE"/>
		<reference ref_id="CVE-2018-9133" ref_url="https://www.suse.com/security/cve/CVE-2018-9133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004234.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

These security issues were fixed:

- CVE-2017-13758: Prevent heap-based buffer overflow in the TracePoint()
  function (bsc#1056277).
- CVE-2017-10928: Prevent heap-based buffer over-read in the GetNextToken
  function that allowed remote attackers to obtain sensitive information from
  process memory or possibly have unspecified other impact via a crafted SVG
  document (bsc#1047356).
- CVE-2018-9133: Long compute times in the tiff decoder have been fixed (bsc#1087820).
- CVE-2018-11251: Heap-based buffer over-read in ReadSUNImage in coders/sun.c, which allows attackers to cause denial of service (bsc#1094237).
- CVE-2017-18271: Infinite loop in the function ReadMIFFImage in coders/miff.c, which allows attackers to cause a denial of service (bsc#1094204).
- CVE-2018-11655: Memory leak in the GetImagePixelCache in MagickCore/cache.c was fixed (bsc#1095730)
- CVE-2018-10804: Memory leak in WriteTIFFImage in coders/tiff.c was fixed (bsc#1095813)
- CVE-2018-10805: Fixed memory leaks in bgr.c, rgb.c, cmyk.c, gray.c, ycbcr.c (bsc#1095812)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-29"/>
	<updated date="2018-06-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047356">SUSE bug 1047356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056277">SUSE bug 1056277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087820">SUSE bug 1087820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094204">SUSE bug 1094204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094237">SUSE bug 1094237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095730">SUSE bug 1095730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095812">SUSE bug 1095812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095813">SUSE bug 1095813</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10928/">CVE-2017-10928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10928">CVE-2017-10928 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13758/">CVE-2017-13758 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13758">CVE-2017-13758 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18271/">CVE-2017-18271 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18271">CVE-2017-18271 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10804/">CVE-2018-10804 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10804">CVE-2018-10804 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10805/">CVE-2018-10805 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10805">CVE-2018-10805 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11251/">CVE-2018-11251 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11251">CVE-2018-11251 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11655/">CVE-2018-11655 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11655">CVE-2018-11655 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-9133/">CVE-2018-9133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9133">CVE-2018-9133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552879" comment="libMagickCore-6_Q16-1-6.8.8.1-71.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552880" comment="libMagickWand-6_Q16-1-6.8.8.1-71.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149481" version="1" class="patch">
	<metadata>
		<title>Security update for libvpx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1075992" ref_url="https://bugzilla.suse.com/1075992" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13194" ref_url="https://www.suse.com/security/cve/CVE-2017-13194/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003623.html" source="SUSE-SU"/>
		<description>
This update for libvpx fixes one issues.

This security issue was fixed: 

- CVE-2017-13194: Fixed incorrect memory allocation related to odd frame width (bsc#1075992).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-23"/>
	<updated date="2018-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1075992">SUSE bug 1075992</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13194/">CVE-2017-13194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13194">CVE-2017-13194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550423" comment="libvpx1-1.3.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149482" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097624" ref_url="https://bugzilla.suse.com/1097624" source="BUGZILLA"/>
		<reference ref_id="1098592" ref_url="https://bugzilla.suse.com/1098592" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004245.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158).
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-05"/>
	<updated date="2018-07-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097624">SUSE bug 1097624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098592">SUSE bug 1098592</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0732">CVE-2018-0732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009541536" comment="libopenssl-devel-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552881" comment="libopenssl1_0_0-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550426" comment="libopenssl1_0_0-32bit-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552882" comment="libopenssl1_0_0-hmac-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550428" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552883" comment="openssl-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530142" comment="openssl-doc-1.0.2j-60.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149483" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1039291" ref_url="https://bugzilla.suse.com/1039291" source="BUGZILLA"/>
		<reference ref_id="1042657" ref_url="https://bugzilla.suse.com/1042657" source="BUGZILLA"/>
		<reference ref_id="956357" ref_url="https://bugzilla.suse.com/956357" source="BUGZILLA"/>
		<reference ref_id="964458" ref_url="https://bugzilla.suse.com/964458" source="BUGZILLA"/>
		<reference ref_id="982826" ref_url="https://bugzilla.suse.com/982826" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10040" ref_url="https://www.suse.com/security/cve/CVE-2016-10040/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004250.html" source="SUSE-SU"/>
		<description>

This update for libqt4 fixes the following issues:

LibQt4 was updated to 4.8.7 (bsc#1039291, CVE-2016-10040):

See
	http://download.qt.io/official_releases/qt/4.8/4.8.7/changes-4.8.7
for more details.

Also libQtWebkit4 was updated to 2.3.4 to match libqt4.

Also following bugs were fixed:

- Enable libqt4-devel-32bit (bsc#982826)
- Fixed bolder font in Qt4 apps (boo#956357)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-06"/>
	<updated date="2018-07-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039291">SUSE bug 1039291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042657">SUSE bug 1042657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956357">SUSE bug 956357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964458">SUSE bug 964458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982826">SUSE bug 982826</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10040/">CVE-2016-10040 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10040">CVE-2016-10040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552884" comment="libQtWebKit4-4.8.7+2.3.4-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552885" comment="libQtWebKit4-32bit-4.8.7+2.3.4-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552886" comment="libqca2-2.0.3-17.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552887" comment="libqca2-32bit-2.0.3-17.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552888" comment="libqt4-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552889" comment="libqt4-32bit-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552890" comment="libqt4-qt3support-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552891" comment="libqt4-qt3support-32bit-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552892" comment="libqt4-sql-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552893" comment="libqt4-sql-32bit-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552894" comment="libqt4-sql-mysql-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552895" comment="libqt4-sql-sqlite-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552896" comment="libqt4-x11-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552897" comment="libqt4-x11-32bit-4.8.7-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552898" comment="qt4-x11-tools-4.8.7-8.6.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149484" version="1" class="patch">
	<metadata>
		<title>Recommended update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1096141" ref_url="https://bugzilla.suse.com/1096141" source="BUGZILLA"/>
		<reference ref_id="1100147" ref_url="https://bugzilla.suse.com/1100147" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004257.html" source="SUSE-SU"/>
		<description>


The Intel CPU microcode bundle was updated to the 20180703 release.

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a)
and helps mitigating CVE-2018-3639 (Spectre v4)  (bsc#1100147 bsc#1087082 bsc#1087083).

More information on:
  https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File

Following chipsets are fixed in this round:

Model        Stepping F-MO-S/PI      Old-&gt;New

---- updated platforms ------------------------------------

SNB-EP       C1       6-2d-6/6d 0000061c-&gt;0000061d Xeon E5
SNB-EP       C2       6-2d-7/6d 00000713-&gt;00000714 Xeon E5
IVT          C0       6-3e-4/ed 0000042c-&gt;0000042d Xeon E5 v2; Core i7-4960X/4930K/4820K
IVT          D1       6-3e-7/ed 00000713-&gt;00000714 Xeon E5 v2
HSX-E/EP/4S  C0       6-3f-2/6f 0000003c-&gt;0000003d Xeon E5 v3
HSX-EX       E0       6-3f-4/80 00000011-&gt;00000012 Xeon E7 v3
SKX-SP/D/W/X H0       6-55-4/b7 02000043-&gt;0200004d Xeon Bronze 31xx, Silver 41xx, Gold 51xx/61xx Platinum 81xx, D/W-21xx; Core i9-7xxxX
BDX-DE       A1       6-56-5/10 0e000009-&gt;0e00000a Xeon D-15x3N
BDX-ML       B/M/R0   6-4f-1/ef 0b00002c-&gt;0b00002e Xeon E5/E7 v4; Core i7-69xx/68xx

- Add a new style supplements for the recent kernels. (bsc#1096141)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-12"/>
	<updated date="2018-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096141">SUSE bug 1096141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100147">SUSE bug 1100147</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3640">CVE-2018-3640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519785" comment="ucode-intel-20180703-13.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149485" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1074462" ref_url="https://bugzilla.suse.com/1074462" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000422" ref_url="https://www.suse.com/security/cve/CVE-2017-1000422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004273.html" source="SUSE-SU"/>
		<description>
This update for gdk-pixbuf fixes the following security issue:

- CVE-2017-1000422: Prevent several integer overflow in the gif_get_lzw
  function resulting in memory corruption and potential code execution
  (bsc#1074462).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-13"/>
	<updated date="2018-07-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074462">SUSE bug 1074462</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000422/">CVE-2017-1000422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000422">CVE-2017-1000422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519786" comment="gdk-pixbuf-lang-2.34.0-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552899" comment="gdk-pixbuf-query-loaders-2.34.0-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552900" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552901" comment="libgdk_pixbuf-2_0-0-2.34.0-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552902" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552903" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149486" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1068565" ref_url="https://bugzilla.suse.com/1068565" source="BUGZILLA"/>
		<reference ref_id="1082216" ref_url="https://bugzilla.suse.com/1082216" source="BUGZILLA"/>
		<reference ref_id="1082233" ref_url="https://bugzilla.suse.com/1082233" source="BUGZILLA"/>
		<reference ref_id="1082234" ref_url="https://bugzilla.suse.com/1082234" source="BUGZILLA"/>
		<reference ref_id="1096718" ref_url="https://bugzilla.suse.com/1096718" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015/" source="CVE"/>
		<reference ref_id="CVE-2018-6797" ref_url="https://www.suse.com/security/cve/CVE-2018-6797/" source="CVE"/>
		<reference ref_id="CVE-2018-6798" ref_url="https://www.suse.com/security/cve/CVE-2018-6798/" source="CVE"/>
		<reference ref_id="CVE-2018-6913" ref_url="https://www.suse.com/security/cve/CVE-2018-6913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004278.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

These security issue were fixed: 

- CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216).
- CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233).
- CVE-2018-6797: Fixed sharp-s regexp overflow (bsc#1082234).
- CVE-2018-12015: The Archive::Tar module allowed remote attackers to bypass a
  directory-traversal protection mechanism and overwrite arbitrary files
  (bsc#1096718)

This non-security issue was fixed: 

- fix debugger crash in tab completion with Term::ReadLine::Gnu [bsc#1068565]

		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-17"/>
	<updated date="2018-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068565">SUSE bug 1068565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082216">SUSE bug 1082216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082233">SUSE bug 1082233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082234">SUSE bug 1082234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096718">SUSE bug 1096718</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12015">CVE-2018-12015 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6797/">CVE-2018-6797 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6797">CVE-2018-6797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6798/">CVE-2018-6798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6798">CVE-2018-6798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6913/">CVE-2018-6913 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6913">CVE-2018-6913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552904" comment="perl-5.18.2-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545542" comment="perl-32bit-5.18.2-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552905" comment="perl-base-5.18.2-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519795" comment="perl-doc-5.18.2-12.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149487" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1074171" ref_url="https://bugzilla.suse.com/1074171" source="BUGZILLA"/>
		<reference ref_id="1075737" ref_url="https://bugzilla.suse.com/1075737" source="BUGZILLA"/>
		<reference ref_id="1075738" ref_url="https://bugzilla.suse.com/1075738" source="BUGZILLA"/>
		<reference ref_id="1075739" ref_url="https://bugzilla.suse.com/1075739" source="BUGZILLA"/>
		<reference ref_id="1075748" ref_url="https://bugzilla.suse.com/1075748" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17935" ref_url="https://www.suse.com/security/cve/CVE-2017-17935/" source="CVE"/>
		<reference ref_id="CVE-2018-5334" ref_url="https://www.suse.com/security/cve/CVE-2018-5334/" source="CVE"/>
		<reference ref_id="CVE-2018-5335" ref_url="https://www.suse.com/security/cve/CVE-2018-5335/" source="CVE"/>
		<reference ref_id="CVE-2018-5336" ref_url="https://www.suse.com/security/cve/CVE-2018-5336/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003624.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.2.12 fixes the following issues:

- CVE-2018-5334: IxVeriWave file could crash (bsc#1075737)
- CVE-2018-5335: WCP dissector could crash (bsc#1075738)
- CVE-2018-5336: Multiple dissector crashes (bsc#1075739)
- CVE-2017-17935: Incorrect handling of '\n' in file_read_line function could
  have lead to denial of service (bsc#1074171)

This release no longer enables the Linux kernel BPF JIT compiler via the
net.core.bpf_jit_enable sysctl, as this would make systems more vulnerable
to Spectre variant 1 CVE-2017-5753 - (bsc#1075748)

Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-2.2.12.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-24"/>
	<updated date="2018-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074171">SUSE bug 1074171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075737">SUSE bug 1075737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075738">SUSE bug 1075738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075739">SUSE bug 1075739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075748">SUSE bug 1075748</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17935/">CVE-2017-17935 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17935">CVE-2017-17935 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5334/">CVE-2018-5334 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5334">CVE-2018-5334 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5335/">CVE-2018-5335 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5335">CVE-2018-5335 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5336/">CVE-2018-5336 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5336">CVE-2018-5336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550430" comment="libwireshark8-2.2.12-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550431" comment="libwiretap6-2.2.12-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550432" comment="libwscodecs1-2.2.12-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550433" comment="libwsutil7-2.2.12-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550434" comment="wireshark-2.2.12-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550435" comment="wireshark-gtk-2.2.12-48.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149488" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1099310" ref_url="https://bugzilla.suse.com/1099310" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6252" ref_url="https://www.suse.com/security/cve/CVE-2016-6252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004291.html" source="SUSE-SU"/>
		<description>
This update for shadow fixes the following issues:

- CVE-2016-6252: Incorrect integer handling could results in local privilege escalation (bsc#1099310)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-19"/>
	<updated date="2018-07-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1099310">SUSE bug 1099310</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6252/">CVE-2016-6252 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6252">CVE-2016-6252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552906" comment="shadow-4.2.1-27.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149489" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1076957" ref_url="https://bugzilla.suse.com/1076957" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10708" ref_url="https://www.suse.com/security/cve/CVE-2016-10708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004283.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security issue fixed:

- CVE-2016-10708: Prevent DoS due to crashes caused by out-of-sequence NEWKEYS message (bsc#1076957).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-19"/>
	<updated date="2018-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076957">SUSE bug 1076957</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10708/">CVE-2016-10708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10708">CVE-2016-10708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552907" comment="openssh-7.2p2-74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552908" comment="openssh-askpass-gnome-7.2p2-74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552909" comment="openssh-fips-7.2p2-74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552910" comment="openssh-helpers-7.2p2-74.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149490" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1055857" ref_url="https://bugzilla.suse.com/1055857" source="BUGZILLA"/>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328/" source="CVE"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003625.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes several issues.

These security issues were fixed:

- CVE-2016-6328: Fixed integer overflow in parsing MNOTE entry data of the input
  file (bsc#1055857)
- CVE-2017-7544: Fixed out-of-bounds heap read vulnerability in
  exif_data_save_data_entry function in libexif/exif-data.c caused by improper
  length computation of the allocated data of an ExifMnote entry which can cause
  denial-of-service or possibly information disclosure (bsc#1059893)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-24"/>
	<updated date="2018-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055857">SUSE bug 1055857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6328">CVE-2016-6328 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7544">CVE-2017-7544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550437" comment="libexif12-0.6.21-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550438" comment="libexif12-32bit-0.6.21-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149491" version="1" class="patch">
	<metadata>
		<title>Security update for rsyslog (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="935393" ref_url="https://bugzilla.suse.com/935393" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3243" ref_url="https://www.suse.com/security/cve/CVE-2015-3243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004295.html" source="SUSE-SU"/>
		<description>
This update for rsyslog fixes the following issues:

The following security vulnerability was addressed:

CVE-2015-3243: Make sure that log files are not created world-readable (bsc#935393)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-23"/>
	<updated date="2018-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935393">SUSE bug 935393</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-3243/">CVE-2015-3243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3243">CVE-2015-3243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552911" comment="rsyslog-8.24.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552912" comment="rsyslog-diag-tools-8.24.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552913" comment="rsyslog-doc-8.24.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552914" comment="rsyslog-module-gssapi-8.24.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552915" comment="rsyslog-module-gtls-8.24.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552916" comment="rsyslog-module-mysql-8.24.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552917" comment="rsyslog-module-pgsql-8.24.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552918" comment="rsyslog-module-relp-8.24.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552919" comment="rsyslog-module-snmp-8.24.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552920" comment="rsyslog-module-udpspoof-8.24.0-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149492" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1083507" ref_url="https://bugzilla.suse.com/1083507" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004297.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

The following security vulnerabilities were addressed:

- Add a check to Lib/wave.py that verifies that at least one channel is
  provided. Prior to this, attackers could cause a denial of service via a
  crafted wav format audio file. [bsc#1083507, CVE-2017-18207]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-23"/>
	<updated date="2018-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083507">SUSE bug 1083507</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18207">CVE-2017-18207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552921" comment="libpython2_7-1_0-2.7.13-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552922" comment="libpython2_7-1_0-32bit-2.7.13-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552923" comment="python-2.7.13-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552924" comment="python-32bit-2.7.13-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552925" comment="python-base-2.7.13-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552926" comment="python-base-32bit-2.7.13-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552927" comment="python-curses-2.7.13-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552928" comment="python-demo-2.7.13-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552929" comment="python-doc-2.7.13-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552930" comment="python-doc-pdf-2.7.13-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552931" comment="python-gdbm-2.7.13-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552932" comment="python-idle-2.7.13-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552933" comment="python-tk-2.7.13-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552934" comment="python-xml-2.7.13-28.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149493" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1064232" ref_url="https://bugzilla.suse.com/1064232" source="BUGZILLA"/>
		<reference ref_id="1075876" ref_url="https://bugzilla.suse.com/1075876" source="BUGZILLA"/>
		<reference ref_id="1076110" ref_url="https://bugzilla.suse.com/1076110" source="BUGZILLA"/>
		<reference ref_id="1085185" ref_url="https://bugzilla.suse.com/1085185" source="BUGZILLA"/>
		<reference ref_id="1085657" ref_url="https://bugzilla.suse.com/1085657" source="BUGZILLA"/>
		<reference ref_id="1089525" ref_url="https://bugzilla.suse.com/1089525" source="BUGZILLA"/>
		<reference ref_id="1090435" ref_url="https://bugzilla.suse.com/1090435" source="BUGZILLA"/>
		<reference ref_id="1090888" ref_url="https://bugzilla.suse.com/1090888" source="BUGZILLA"/>
		<reference ref_id="1091171" ref_url="https://bugzilla.suse.com/1091171" source="BUGZILLA"/>
		<reference ref_id="1092207" ref_url="https://bugzilla.suse.com/1092207" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1094248" ref_url="https://bugzilla.suse.com/1094248" source="BUGZILLA"/>
		<reference ref_id="1094643" ref_url="https://bugzilla.suse.com/1094643" source="BUGZILLA"/>
		<reference ref_id="1095453" ref_url="https://bugzilla.suse.com/1095453" source="BUGZILLA"/>
		<reference ref_id="1096790" ref_url="https://bugzilla.suse.com/1096790" source="BUGZILLA"/>
		<reference ref_id="1097034" ref_url="https://bugzilla.suse.com/1097034" source="BUGZILLA"/>
		<reference ref_id="1097140" ref_url="https://bugzilla.suse.com/1097140" source="BUGZILLA"/>
		<reference ref_id="1097492" ref_url="https://bugzilla.suse.com/1097492" source="BUGZILLA"/>
		<reference ref_id="1097501" ref_url="https://bugzilla.suse.com/1097501" source="BUGZILLA"/>
		<reference ref_id="1097551" ref_url="https://bugzilla.suse.com/1097551" source="BUGZILLA"/>
		<reference ref_id="1097808" ref_url="https://bugzilla.suse.com/1097808" source="BUGZILLA"/>
		<reference ref_id="1097931" ref_url="https://bugzilla.suse.com/1097931" source="BUGZILLA"/>
		<reference ref_id="1097961" ref_url="https://bugzilla.suse.com/1097961" source="BUGZILLA"/>
		<reference ref_id="1098016" ref_url="https://bugzilla.suse.com/1098016" source="BUGZILLA"/>
		<reference ref_id="1098236" ref_url="https://bugzilla.suse.com/1098236" source="BUGZILLA"/>
		<reference ref_id="1098425" ref_url="https://bugzilla.suse.com/1098425" source="BUGZILLA"/>
		<reference ref_id="1098435" ref_url="https://bugzilla.suse.com/1098435" source="BUGZILLA"/>
		<reference ref_id="1098527" ref_url="https://bugzilla.suse.com/1098527" source="BUGZILLA"/>
		<reference ref_id="1098599" ref_url="https://bugzilla.suse.com/1098599" source="BUGZILLA"/>
		<reference ref_id="1099042" ref_url="https://bugzilla.suse.com/1099042" source="BUGZILLA"/>
		<reference ref_id="1099183" ref_url="https://bugzilla.suse.com/1099183" source="BUGZILLA"/>
		<reference ref_id="1099279" ref_url="https://bugzilla.suse.com/1099279" source="BUGZILLA"/>
		<reference ref_id="1099713" ref_url="https://bugzilla.suse.com/1099713" source="BUGZILLA"/>
		<reference ref_id="1099732" ref_url="https://bugzilla.suse.com/1099732" source="BUGZILLA"/>
		<reference ref_id="1099792" ref_url="https://bugzilla.suse.com/1099792" source="BUGZILLA"/>
		<reference ref_id="1099810" ref_url="https://bugzilla.suse.com/1099810" source="BUGZILLA"/>
		<reference ref_id="1099918" ref_url="https://bugzilla.suse.com/1099918" source="BUGZILLA"/>
		<reference ref_id="1099924" ref_url="https://bugzilla.suse.com/1099924" source="BUGZILLA"/>
		<reference ref_id="1099966" ref_url="https://bugzilla.suse.com/1099966" source="BUGZILLA"/>
		<reference ref_id="1099993" ref_url="https://bugzilla.suse.com/1099993" source="BUGZILLA"/>
		<reference ref_id="1100089" ref_url="https://bugzilla.suse.com/1100089" source="BUGZILLA"/>
		<reference ref_id="1100340" ref_url="https://bugzilla.suse.com/1100340" source="BUGZILLA"/>
		<reference ref_id="1100416" ref_url="https://bugzilla.suse.com/1100416" source="BUGZILLA"/>
		<reference ref_id="1100418" ref_url="https://bugzilla.suse.com/1100418" source="BUGZILLA"/>
		<reference ref_id="1100491" ref_url="https://bugzilla.suse.com/1100491" source="BUGZILLA"/>
		<reference ref_id="1100843" ref_url="https://bugzilla.suse.com/1100843" source="BUGZILLA"/>
		<reference ref_id="1101296" ref_url="https://bugzilla.suse.com/1101296" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405/" source="CVE"/>
		<reference ref_id="CVE-2018-13406" ref_url="https://www.suse.com/security/cve/CVE-2018-13406/" source="CVE"/>
		<reference ref_id="CVE-2018-9385" ref_url="https://www.suse.com/security/cve/CVE-2018-9385/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004305.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.140 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-13053: The alarm_timer_nsleep function had an integer overflow via a
  large relative timeout because ktime_add_safe was not used (bnc#1099924)
- CVE-2018-9385: Prevent overread of the 'driver_override' buffer (bsc#1100491)
- CVE-2018-13405: The inode_init_owner function allowed local users to create
  files with an unintended group ownership allowing attackers to escalate
  privileges by making a plain file executable and SGID (bnc#1100416)
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function could
  have result in local attackers being able to crash the kernel or potentially
  elevate privileges because kmalloc_array is not used (bnc#1100418)

The following non-security bugs were fixed:

- 1wire: family module autoload fails because of upper/lower case mismatch (bnc#1012382).
- ALSA: hda - Clean up ALC299 init code (bsc#1099810).
- ALSA: hda - Enable power_save_node for CX20722 (bsc#1099810).
- ALSA: hda - Fix a wrong FIXUP for alc289 on Dell machines (bsc#1099810).
- ALSA: hda - Fix incorrect usage of IS_REACHABLE() (bsc#1099810).
- ALSA: hda - Fix pincfg at resume on Lenovo T470 dock (bsc#1099810).
- ALSA: hda - Handle kzalloc() failure in snd_hda_attach_pcm_stream() (bnc#1012382).
- ALSA: hda - Use acpi_dev_present() (bsc#1099810).
- ALSA: hda - add a new condition to check if it is thinkpad (bsc#1099810).
- ALSA: hda - silence uninitialized variable warning in activate_amp_in() (bsc#1099810).
- ALSA: hda/patch_sigmatel: Add AmigaOne X1000 pinconfigs (bsc#1099810).
- ALSA: hda/realtek - Add a quirk for FSC ESPRIMO U9210 (bsc#1099810).
- ALSA: hda/realtek - Add headset mode support for Dell laptop (bsc#1099810).
- ALSA: hda/realtek - Add support headset mode for DELL WYSE (bsc#1099810).
- ALSA: hda/realtek - Clevo P950ER ALC1220 Fixup (bsc#1099810).
- ALSA: hda/realtek - Enable Thinkpad Dock device for ALC298 platform (bsc#1099810).
- ALSA: hda/realtek - Enable mic-mute hotkey for several Lenovo AIOs (bsc#1099810).
- ALSA: hda/realtek - Fix Dell headset Mic can't record (bsc#1099810).
- ALSA: hda/realtek - Fix pop noise on Lenovo P50 and co (bsc#1099810).
- ALSA: hda/realtek - Fix the problem of two front mics on more machines (bsc#1099810).
- ALSA: hda/realtek - Fixup for HP x360 laptops with BandO speakers (bsc#1099810).
- ALSA: hda/realtek - Fixup mute led on HP Spectre x360 (bsc#1099810).
- ALSA: hda/realtek - Make dock sound work on ThinkPad L570 (bsc#1099810).
- ALSA: hda/realtek - Refactor alc269_fixup_hp_mute_led_mic*() (bsc#1099810).
- ALSA: hda/realtek - Reorder ALC269 ASUS quirk entries (bsc#1099810).
- ALSA: hda/realtek - Support headset mode for ALC215/ALC285/ALC289 (bsc#1099810).
- ALSA: hda/realtek - Update ALC255 depop optimize (bsc#1099810).
- ALSA: hda/realtek - adjust the location of one mic (bsc#1099810).
- ALSA: hda/realtek - change the location for one of two front mics (bsc#1099810).
- ALSA: hda/realtek - set PINCFG_HEADSET_MIC to parse_flags (bsc#1099810).
- ALSA: hda/realtek - update ALC215 depop optimize (bsc#1099810).
- ALSA: hda/realtek - update ALC225 depop optimize (bsc#1099810).
- ALSA: hda/realtek: Fix mic and headset jack sense on Asus X705UD (bsc#1099810).
- ALSA: hda/realtek: Limit mic boost on T480 (bsc#1099810).
- ALSA: hda: Fix forget to free resource in error handling code path in hda_codec_driver_probe (bsc#1099810).
- ALSA: hda: add dock and led support for HP EliteBook 830 G5 (bsc#1099810).
- ALSA: hda: add dock and led support for HP ProBook 640 G4 (bsc#1099810).
- ALSA: hda: fix some klockwork scan warnings (bsc#1099810).
- ARM: 8764/1: kgdb: fix NUMREGBYTES so that gdb_regs[] is the correct size (bnc#1012382).
- ARM: dts: imx6q: Use correct SDMA script for SPI5 core (bnc#1012382).
- ASoC: cirrus: i2s: Fix LRCLK configuration (bnc#1012382).
- ASoC: cirrus: i2s: Fix {TX|RX}LinCtrlData setup (bnc#1012382).
- ASoC: dapm: delete dapm_kcontrol_data paths list before freeing it (bnc#1012382).
- Bluetooth: Fix connection if directed advertising and privacy is used (bnc#1012382).
- Bluetooth: hci_qca: Avoid missing rampatch failure with userspace fw loader (bnc#1012382).
- Btrfs: fix clone vs chattr NODATASUM race (bnc#1012382).
- Btrfs: fix unexpected cow in run_delalloc_nocow (bnc#1012382).
- Btrfs: make raid6 rebuild retry more (bnc#1012382).
- Correct the arguments to verbose() (bsc#1098425)
- HID: debug: check length before copy_to_user() (bnc#1012382).
- HID: hiddev: fix potential Spectre v1 (bnc#1012382).
- HID: i2c-hid: Fix 'incomplete report' noise (bnc#1012382).
- Hang/soft lockup in d_invalidate with simultaneous calls (bsc#1094248, bsc@1097140).
- IB/qib: Fix DMA api warning with debug kernel (bnc#1012382).
- Input: elan_i2c - add ELAN0618 (Lenovo v330 15IKB) ACPI ID (bnc#1012382).
- Input: elan_i2c_smbus - fix more potential stack buffer overflows (bnc#1012382).
- Input: elantech - enable middle button of touchpads on ThinkPad P52 (bnc#1012382).
- Input: elantech - fix V4 report decoding for module with middle key (bnc#1012382).
- MIPS: BCM47XX: Enable 74K Core ExternalSync for PCIe erratum (bnc#1012382).
- MIPS: io: Add barrier after register read in inX() (bnc#1012382).
- NFSv4: Fix possible 1-byte stack overflow in nfs_idmap_read_and_verify_message (bnc#1012382).
- PCI: pciehp: Clear Presence Detect and Data Link Layer Status Changed on resume (bnc#1012382).
- RDMA/mlx4: Discard unknown SQP work requests (bnc#1012382).
- Refresh with upstream commit:62290a5c194b since the typo fix has been merged in upstream. (bsc#1085185)
- Remove broken patches for dac9063 watchdog (bsc#1100843)
- Remove sorted section marker This branch contains a small sorted section with an old format that fails the current checker. Updating the section and scripts to the new format might make merges with other branches more difficult. Instead, simply remove the section marker.
- Revert 'Btrfs: fix scrub to repair raid6 corruption' (bnc#1012382).
- Revert 'kvm: nVMX: Enforce cpl=0 for VMX instructions (bsc#1099183).' This turned out to be superfluous for 4.4.x kernels.
- Revert 'scsi: lpfc: Fix 16gb hbas failing cq create (bsc#1089525).' This reverts commit b054499f7615e2ffa7571ac0d05c7d5c9a8c0327.
- UBIFS: Fix potential integer overflow in allocation (bnc#1012382).
- USB: serial: cp210x: add CESINEL device ids (bnc#1012382).
- USB: serial: cp210x: add Silicon Labs IDs for Windows Update (bnc#1012382).
- Update patches.fixes/nvme-expand-nvmf_check_if_ready-checks.patch (bsc#1098527).
- ath10k: fix rfc1042 header retrieval in QCA4019 with eth decap mode (bnc#1012382).
- atm: zatm: fix memcmp casting (bnc#1012382).
- backlight: as3711_bl: Fix Device Tree node lookup (bnc#1012382).
- backlight: max8925_bl: Fix Device Tree node lookup (bnc#1012382).
- backlight: tps65217_bl: Fix Device Tree node lookup (bnc#1012382).
- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).
- bcache: Annotate switch fall-through (bsc#1064232).
- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).
- bcache: Fix indentation (bsc#1064232).
- bcache: Fix kernel-doc warnings (bsc#1064232).
- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).
- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).
- bcache: Remove an unused variable (bsc#1064232).
- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).
- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).
- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).
- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).
- bcache: add io_disable to struct cached_dev (bsc#1064232).
- bcache: add journal statistic (bsc#1076110).
- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).
- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).
- bcache: closures: move control bits one bit right (bsc#1076110).
- bcache: correct flash only vols (check all uuids) (bsc#1064232).
- bcache: count backing device I/O error for writeback I/O (bsc#1064232).
- bcache: fix cached_dev-&gt;count usage for bch_cache_set_error() (bsc#1064232).
- bcache: fix crashes in duplicate cache device register (bsc#1076110).
- bcache: fix error return value in memory shrink (bsc#1064232).
- bcache: fix high CPU occupancy during journal (bsc#1076110).
- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).
- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).
- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).
- bcache: fix using of loop variable in memory shrink (bsc#1064232).
- bcache: fix writeback target calc on large devices (bsc#1076110).
- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).
- bcache: mark closure_sync() __sched (bsc#1076110).
- bcache: move closure debug file into debug directory (bsc#1064232).
- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).
- bcache: ret IOERR when read meets metadata error (bsc#1076110).
- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).
- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).
- bcache: set dc-&gt;io_disable to true in conditional_stop_bcache_device() (bsc#1064232).
- bcache: set error_limit correctly (bsc#1064232).
- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).
- bcache: stop bcache device when backing device is offline (bsc#1064232).
- bcache: stop dc-&gt;writeback_rate_update properly (bsc#1064232).
- bcache: stop writeback thread after detaching (bsc#1076110).
- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).
- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).
- block: Fix transfer when chunk sectors exceeds max (bnc#1012382).
- bonding: re-evaluate force_primary when the primary slave name changes (bnc#1012382).
- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).
- branch-check: fix long-&gt;int truncation when profiling branches (bnc#1012382).
- btrfs: scrub: Do not use inode pages for device replace (bnc#1012382).
- cdc_ncm: avoid padding beyond end of skb (bnc#1012382).
- ceph: fix dentry leak in splice_dentry() (bsc#1098236).
- ceph: fix use-after-free in ceph_statfs() (bsc#1098236).
- ceph: fix wrong check for the case of updating link count (bsc#1098236).
- ceph: prevent i_version from going back (bsc#1098236).
- ceph: support file lock on directory (bsc#1098236).
- cifs: Check for timeout on Negotiate stage (bsc#1091171).
- cifs: Fix infinite loop when using hard mount option (bnc#1012382).
- cpufreq: Fix new policy initialization during limits updates via sysfs (bnc#1012382).
- cpuidle: powernv: Fix promotion from snooze if next state disabled (bnc#1012382).
- dm thin: handle running out of data space vs concurrent discard (bnc#1012382).
- dm: convert DM printk macros to pr level macros (bsc#1099918).
- dm: fix printk() rate limiting code (bsc#1099918).
- drbd: fix access after free (bnc#1012382).
- driver core: Do not ignore class_dir_create_and_add() failure (bnc#1012382).
- e1000e: Ignore TSYNCRXCTL when getting I219 clock attributes (bsc#1075876).
- ext4: add more inode number paranoia checks (bnc#1012382).
- ext4: add more mount time checks of the superblock (bnc#1012382).
- ext4: always check block group bounds in ext4_init_block_bitmap() (bnc#1012382).
- ext4: check superblock mapped prior to committing (bnc#1012382).
- ext4: clear i_data in ext4_inode_info when removing inline data (bnc#1012382).
- ext4: fix fencepost error in check for inode count overflow during resize (bnc#1012382).
- ext4: fix unsupported feature message formatting (bsc#1098435).
- ext4: include the illegal physical block in the bad map ext4_error msg (bnc#1012382).
- ext4: make sure bitmaps and the inode table do not overlap with bg descriptors (bnc#1012382).
- ext4: only look at the bg_flags field if it is valid (bnc#1012382).
- ext4: update mtime in ext4_punch_hole even if no blocks are released (bnc#1012382).
- ext4: verify the depth of extent tree in ext4_find_extent() (bnc#1012382).
- fs/binfmt_misc.c: do not allow offset overflow (bsc#1099279).
- fuse: atomic_o_trunc should truncate pagecache (bnc#1012382).
- fuse: do not keep dead fuse_conn at fuse_fill_super() (bnc#1012382).
- fuse: fix control dir setup and teardown (bnc#1012382).
- hv_netvsc: avoid repeated updates of packet filter (bsc#1097492).
- hv_netvsc: defer queue selection to VF (bsc#1097492).
- hv_netvsc: enable multicast if necessary (bsc#1097492).
- hv_netvsc: filter multicast/broadcast (bsc#1097492).
- hv_netvsc: fix filter flags (bsc#1097492).
- hv_netvsc: fix locking during VF setup (bsc#1097492).
- hv_netvsc: fix locking for rx_mode (bsc#1097492).
- hv_netvsc: propagate rx filters to VF (bsc#1097492).
- i2c: rcar: fix resume by always initializing registers before transfer (bnc#1012382).
- iio:buffer: make length types match kfifo types (bnc#1012382).
- iommu/vt-d: Fix race condition in add_unmap() (bsc#1096790, bsc#1097034).
- ipmi:bt: Set the timeout before doing a capabilities check (bnc#1012382).
- ipv4: Fix error return value in fib_convert_metrics() (bnc#1012382).
- ipvs: fix buffer overflow with sync daemon and service (bnc#1012382).
- iwlmvm: tdls: Check TDLS channel switch support (bsc#1099810).
- iwlwifi: fix non_shared_ant for 9000 devices (bsc#1099810).
- jbd2: do not mark block as modified if the handle is out of credits (bnc#1012382).
- kabi/severities: add 'drivers/md/bcache/* PASS' since no one uses symboles expoted by bcache.
- kmod: fix wait on recursive loop (bsc#1099792).
- kmod: reduce atomic operations on kmod_concurrent and simplify (bsc#1099792).
- kmod: throttle kmod thread limit (bsc#1099792).
- kprobes/x86: Do not modify singlestep buffer while resuming (bnc#1012382).
- kvm: nVMX: Enforce cpl=0 for VMX instructions (bsc#1099183).
- lib/vsprintf: Remove atomic-unsafe support for %pCr (bnc#1012382).
- libata: Drop SanDisk SD7UB3Q*G1001 NOLPM quirk (bnc#1012382).
- libata: zpodd: make arrays cdb static, reduces object code size (bnc#1012382).
- libata: zpodd: small read overflow in eject_tray() (bnc#1012382).
- linvdimm, pmem: Preserve read-only setting for pmem devices (bnc#1012382).
- m68k/mm: Adjust VM area to be unmapped by gap size for __iounmap() (bnc#1012382).
- mac80211: Fix condition validating WMM IE (bsc#1099810,bsc#1099732).
- media: cx231xx: Add support for AverMedia DVD EZMaker 7 (bnc#1012382).
- media: cx25840: Use subdev host data for PLL override (bnc#1012382).
- media: dvb_frontend: fix locking issues at dvb_frontend_get_event() (bnc#1012382).
- media: smiapp: fix timeout checking in smiapp_read_nvm (bsc#1099918).
- media: v4l2-compat-ioctl32: prevent go past max size (bnc#1012382).
- mfd: intel-lpss: Program REMAP register in PIO mode (bnc#1012382).
- mips: ftrace: fix static function graph tracing (bnc#1012382).
- mm: hugetlb: yield when prepping struct pages (bnc#1012382).
- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bnc#1012382).
- mtd: cfi_cmdset_0002: Change definition naming to retry write operation (bnc#1012382).
- mtd: cfi_cmdset_0002: Change erase functions to check chip good only (bnc#1012382).
- mtd: cfi_cmdset_0002: Change erase functions to retry for error (bnc#1012382).
- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bnc#1012382).
- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bnc#1012382).
- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bnc#1012382).
- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bnc#1012382).
- mtd: cmdlinepart: Update comment for introduction of OFFSET_CONTINUOUS (bsc#1099918).
- mtd: partitions: add helper for deleting partition (bsc#1099918).
- mtd: partitions: remove sysfs files when deleting all master's partitions (bsc#1099918).
- mtd: rawnand: mxc: set spare area size register explicitly (bnc#1012382).
- n_tty: Access echo_* variables carefully (bnc#1012382).
- n_tty: Fix stall at n_tty_receive_char_special() (bnc#1012382).
- net/sonic: Use dma_mapping_error() (bnc#1012382).
- net: qmi_wwan: Add Netgear Aircard 779S (bnc#1012382).
- netfilter: ebtables: handle string from userspace with care (bnc#1012382).
- netfilter: nf_log: do not hold nf_log_mutex during user access (bnc#1012382).
- netfilter: nf_tables: use WARN_ON_ONCE instead of BUG_ON in nft_do_chain() (bnc#1012382).
- nfsd: restrict rd_maxcount to svc_max_payload in nfsd_encode_readdir (bnc#1012382).
- nvme-fabrics: allow duplicate connections to the discovery controller (bsc#1098527).
- nvme-fabrics: allow internal passthrough command on deleting controllers (bsc#1098527).
- nvme-fabrics: centralize discovery controller defaults (bsc#1098527).
- nvme-fabrics: fix and refine state checks in __nvmf_check_ready (bsc#1098527).
- nvme-fabrics: refactor queue ready check (bsc#1098527).
- nvme-fc: change controllers first connect to use reconnect path (bsc#1098527).
- nvme-fc: fix nulling of queue data on reconnect (bsc#1098527).
- nvme-fc: remove reinit_request routine (bsc#1098527).
- nvme-fc: remove setting DNR on exception conditions (bsc#1098527).
- nvme-pci: initialize queue memory before interrupts (bnc#1012382).
- nvme: allow duplicate controller if prior controller being deleted (bsc#1098527).
- nvme: move init of keep_alive work item to controller initialization (bsc#1098527).
- nvme: reimplement nvmf_check_if_ready() to avoid kabi breakage (bsc#1098527).
- nvmet-fc: increase LS buffer count per fc port (bsc#1098527).
- nvmet: switch loopback target state to connecting when resetting (bsc#1098527).
- of: unittest: for strings, account for trailing \0 in property length field (bnc#1012382).
- ovl: fix random return value on mount (bsc#1099993).
- ovl: fix uid/gid when creating over whiteout (bsc#1099993).
- ovl: override creds with the ones from the superblock mounter (bsc#1099993).
- perf intel-pt: Fix 'Unexpected indirect branch' error (bnc#1012382).
- perf intel-pt: Fix MTC timing after overflow (bnc#1012382).
- perf intel-pt: Fix decoding to accept CBR between FUP and corresponding TIP (bnc#1012382).
- perf intel-pt: Fix packet decoding of CYC packets (bnc#1012382).
- perf intel-pt: Fix sync_switch INTEL_PT_SS_NOT_TRACING (bnc#1012382).
- perf tools: Fix symbol and object code resolution for vdso32 and vdsox32 (bnc#1012382).
- platform/x86: thinkpad_acpi: Adding new hotkey ID for Lenovo thinkpad (bsc#1099810).
- powerpc/64s: Exception macro for stack frame and initial register save (bsc#1094244).
- powerpc/64s: Fix mce accounting for powernv (bsc#1094244).
- powerpc/fadump: Unregister fadump on kexec down path (bnc#1012382).
- powerpc/mm/hash: Add missing isync prior to kernel stack SLB switch (bnc#1012382).
- powerpc/ptrace: Fix enforcement of DAWR constraints (bnc#1012382).
- powerpc/ptrace: Fix setting 512B aligned breakpoints with PTRACE_SET_DEBUGREG (bnc#1012382).
- powerpc: Machine check interrupt is a non-maskable interrupt (bsc#1094244).
- procfs: add tunable for fd/fdinfo dentry retention (bsc#10866542).
- qla2xxx: Fix NULL pointer derefrence for fcport search (bsc#1085657).
- qla2xxx: Fix inconsistent DMA mem alloc/free (bsc#1085657).
- qla2xxx: Fix kernel crash due to late workqueue allocation (bsc#1085657).
- regulator: Do not return or expect -errno from of_map_mode() (bsc#1099042).
- restore cond_resched() in shrink_dcache_parent() (bsc#1098599).
- rmdir(),rename(): do shrink_dcache_parent() only on success (bsc#1100340).
- s390/dasd: configurable IFCC handling (bsc#1097808).
- s390: Correct register corruption in critical section cleanup (bnc#1012382).
- sbitmap: check for valid bitmap in sbitmap_for_each (bsc#1090435).
- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).
- scsi: ipr: Format HCAM overlay ID 0x41 (bsc#1097961).
- scsi: ipr: new IOASC update (bsc#1097961).
- scsi: lpfc: Change IO submit return to EBUSY if remote port is recovering (bsc#1092207).
- scsi: lpfc: Driver NVME load fails when CPU cnt &gt; WQ resource cnt (bsc#1092207).
- scsi: lpfc: Fix 16gb hbas failing cq create (bsc#1089525).
- scsi: lpfc: Fix 16gb hbas failing cq create (bsc#1095453).
- scsi: lpfc: Fix MDS diagnostics failure (Rx lower than Tx) (bsc#1095453).
- scsi: lpfc: Fix crash in blk_mq layer when executing modprobe -r lpfc (bsc#1095453).
- scsi: lpfc: Fix port initialization failure (bsc#1095453).
- scsi: lpfc: Fix up log messages and stats counters in IO submit code path (bsc#1092207).
- scsi: lpfc: Handle new link fault code returned by adapter firmware (bsc#1092207).
- scsi: lpfc: correct oversubscription of nvme io requests for an adapter (bsc#1095453).
- scsi: lpfc: update driver version to 11.4.0.7-3 (bsc#1092207).
- scsi: lpfc: update driver version to 11.4.0.7-4 (bsc#1095453).
- scsi: qedi: Fix truncation of CHAP name and secret (bsc#1097931)
- scsi: qla2xxx: Fix setting lower transfer speed if GPSC fails (bnc#1012382).
- scsi: qla2xxx: Spinlock recursion in qla_target (bsc#1097501)
- scsi: sg: mitigate read/write abuse (bsc#1101296).
- scsi: zfcp: fix misleading REC trigger trace where erp_action setup failed (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix misleading REC trigger trace where erp_action setup failed (bnc#1099713, LTC#168765).
- scsi: zfcp: fix missing REC trigger trace for all objects in ERP_FAILED (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing REC trigger trace for all objects in ERP_FAILED (bnc#1099713, LTC#168765).
- scsi: zfcp: fix missing REC trigger trace on enqueue without ERP thread (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing REC trigger trace on enqueue without ERP thread (bnc#1099713, LTC#168765).
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io early return (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io early return (bnc#1099713, LTC#168765).
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io for ERP_FAILED (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io for ERP_FAILED (bnc#1099713, LTC#168765).
- scsi: zfcp: fix missing SCSI trace for result of eh_host_reset_handler (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing SCSI trace for result of eh_host_reset_handler (bnc#1099713, LTC#168765).
- scsi: zfcp: fix missing SCSI trace for retry of abort / scsi_eh TMF (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing SCSI trace for retry of abort / scsi_eh TMF (bnc#1099713, LTC#168765).
- serial: sh-sci: Use spin_{try}lock_irqsave instead of open coding version (bnc#1012382).
- signal/xtensa: Consistenly use SIGBUS in do_unaligned_user (bnc#1012382).
- sort and rename various hyperv patches
- spi: Fix scatterlist elements size in spi_map_buf (bnc#1012382).
- staging: android: ion: Return an ERR_PTR in ion_map_kernel (bnc#1012382).
- staging: comedi: quatech_daqp_cs: fix no-op loop daqp_ao_insn_write() (bnc#1012382).
- tcp: do not overshoot window_clamp in tcp_rcv_space_adjust() (bnc#1012382).
- tcp: verify the checksum of the first data segment in a new connection (bnc#1012382).
- thinkpad_acpi: Add support for HKEY version 0x200 (bsc#1099810).
- time: Make sure jiffies_to_msecs() preserves non-zero time periods (bnc#1012382).
- tracing: Fix missing return symbol in function_graph output (bnc#1012382).
- ubi: fastmap: Cancel work upon detach (bnc#1012382).
- ubi: fastmap: Correctly handle interrupted erasures in EBA (bnc#1012382).
- udf: Detect incorrect directory size (bnc#1012382).
- usb: cdc_acm: Add quirk for Uniden UBC125 scanner (bnc#1012382).
- usb: do not reset if a low-speed or full-speed device timed out (bnc#1012382).
- usb: musb: fix remote wakeup racing with suspend (bnc#1012382).
- video/fbdev/stifb: Return -ENOMEM after a failed kzalloc() in stifb_init_fb() (bsc#1090888 bsc#1099966).
- video: uvesafb: Fix integer overflow in allocation (bnc#1012382).
- w1: mxc_w1: Enable clock before calling clk_get_rate() on it (bnc#1012382).
- wait: add wait_event_killable_timeout() (bsc#1099792).
- watchdog: da9063: Fix setting/changing timeout (bsc#1100843).
- watchdog: da9063: Fix timeout handling during probe (bsc#1100843).
- watchdog: da9063: Fix updating timeout value (bsc#1100843).
- x86/cpu/amd: Derive L3 shared_cpu_map from cpu_llc_shared_mask (bsc#1094643).
- x86/mce: Fix incorrect 'Machine check from unknown source' message (bnc#1012382).
- x86/mce: Improve error message when kernel cannot recover (git-fixes b2f9d678e28c).
- x86/pti: do not report XenPV as vulnerable (bsc#1097551).
- xen: Remove unnecessary BUG_ON from __unbind_from_irq() (bnc#1012382).
- xfrm6: avoid potential infinite loop in _decode_session6() (bnc#1012382).
- xfrm: Ignore socket policies when rebuilding hash tables (bnc#1012382).
- xfrm: skip policies marked as dead while rehashing (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-24"/>
	<updated date="2018-07-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064232">SUSE bug 1064232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075876">SUSE bug 1075876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076110">SUSE bug 1076110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085185">SUSE bug 1085185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085657">SUSE bug 1085657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089525">SUSE bug 1089525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090435">SUSE bug 1090435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090888">SUSE bug 1090888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091171">SUSE bug 1091171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092207">SUSE bug 1092207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094248">SUSE bug 1094248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094643">SUSE bug 1094643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095453">SUSE bug 1095453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096790">SUSE bug 1096790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097034">SUSE bug 1097034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097140">SUSE bug 1097140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097492">SUSE bug 1097492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097501">SUSE bug 1097501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097551">SUSE bug 1097551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097808">SUSE bug 1097808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097931">SUSE bug 1097931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097961">SUSE bug 1097961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098016">SUSE bug 1098016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098236">SUSE bug 1098236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098425">SUSE bug 1098425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098435">SUSE bug 1098435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098527">SUSE bug 1098527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098599">SUSE bug 1098599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099042">SUSE bug 1099042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099183">SUSE bug 1099183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099279">SUSE bug 1099279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099713">SUSE bug 1099713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099732">SUSE bug 1099732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099792">SUSE bug 1099792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099810">SUSE bug 1099810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099918">SUSE bug 1099918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099924">SUSE bug 1099924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099966">SUSE bug 1099966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099993">SUSE bug 1099993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100089">SUSE bug 1100089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100340">SUSE bug 1100340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100416">SUSE bug 1100416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100418">SUSE bug 1100418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100491">SUSE bug 1100491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100843">SUSE bug 1100843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101296">SUSE bug 1101296</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13053">CVE-2018-13053 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13405">CVE-2018-13405 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13406/">CVE-2018-13406 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13406">CVE-2018-13406 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9385/">CVE-2018-9385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9385">CVE-2018-9385 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552935" comment="kernel-default-4.4.140-94.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552936" comment="kernel-default-base-4.4.140-94.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552937" comment="kernel-default-devel-4.4.140-94.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552938" comment="kernel-default-man-4.4.140-94.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519812" comment="kernel-devel-4.4.140-94.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519813" comment="kernel-macros-4.4.140-94.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519814" comment="kernel-source-4.4.140-94.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552939" comment="kernel-syms-4.4.140-94.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149494" version="1" class="patch">
	<metadata>
		<title>Security update for nautilus (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1060031" ref_url="https://bugzilla.suse.com/1060031" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14604" ref_url="https://www.suse.com/security/cve/CVE-2017-14604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004307.html" source="SUSE-SU"/>
		<description>
This update for nautilus fixes the following issues:

Security issue fixed:

- CVE-2017-14604: Add a metadata::trusted metadata to the file once the user
  acknowledges the file as trusted, and also remove the 'trusted' content in the
  desktop file (bsc#1060031).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-25"/>
	<updated date="2018-07-25"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1060031">SUSE bug 1060031</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14604/">CVE-2017-14604 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14604">CVE-2017-14604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552940" comment="gnome-shell-search-provider-nautilus-3.20.3-23.3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552941" comment="libnautilus-extension1-3.20.3-23.3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552942" comment="nautilus-3.20.3-23.3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519820" comment="nautilus-lang-3.20.3-23.3.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149495" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1087289" ref_url="https://bugzilla.suse.com/1087289" source="BUGZILLA"/>
		<reference ref_id="1095242" ref_url="https://bugzilla.suse.com/1095242" source="BUGZILLA"/>
		<reference ref_id="1096224" ref_url="https://bugzilla.suse.com/1096224" source="BUGZILLA"/>
		<reference ref_id="1097521" ref_url="https://bugzilla.suse.com/1097521" source="BUGZILLA"/>
		<reference ref_id="1097522" ref_url="https://bugzilla.suse.com/1097522" source="BUGZILLA"/>
		<reference ref_id="1097523" ref_url="https://bugzilla.suse.com/1097523" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891/" source="CVE"/>
		<reference ref_id="CVE-2018-12892" ref_url="https://www.suse.com/security/cve/CVE-2018-12892/" source="CVE"/>
		<reference ref_id="CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004308.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed:

- CVE-2018-3665: Fix Lazy FP Save/Restore issue (XSA-267) (bsc#1095242).
- CVE-2018-12891: Fix possible Denial of Service (DoS) via certain PV MMU operations that affect the entire host (XSA-264) (bsc#1097521).
- CVE-2018-12892: Fix libxl to honour the readonly flag on HVM emulated SCSI disks (XSA-266) (bsc#1097523).
- CVE-2018-12893: Fix crash/Denial of Service (DoS) via safety check (XSA-265) (bsc#1097522).
- CVE-2018-11806: Fix heap buffer overflow while reassembling fragmented datagrams (bsc#1096224).

Bug fixes:

- bsc#1027519: Add upstream patches from January.
- bsc#1087289: Fix xen scheduler crash.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-25"/>
	<updated date="2018-07-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087289">SUSE bug 1087289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095242">SUSE bug 1095242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096224">SUSE bug 1096224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097521">SUSE bug 1097521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097522">SUSE bug 1097522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097523">SUSE bug 1097523</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11806">CVE-2018-11806 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12891">CVE-2018-12891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12892/">CVE-2018-12892 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12892">CVE-2018-12892 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12893">CVE-2018-12893 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3665">CVE-2018-3665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519821" comment="xen-4.9.2_08-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552943" comment="xen-doc-html-4.9.2_08-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519822" comment="xen-libs-4.9.2_08-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519823" comment="xen-libs-32bit-4.9.2_08-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552944" comment="xen-tools-4.9.2_08-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552945" comment="xen-tools-domU-4.9.2_08-3.35.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149496" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1052460" ref_url="https://bugzilla.suse.com/1052460" source="BUGZILLA"/>
		<reference ref_id="1055053" ref_url="https://bugzilla.suse.com/1055053" source="BUGZILLA"/>
		<reference ref_id="1055063" ref_url="https://bugzilla.suse.com/1055063" source="BUGZILLA"/>
		<reference ref_id="1056550" ref_url="https://bugzilla.suse.com/1056550" source="BUGZILLA"/>
		<reference ref_id="1057723" ref_url="https://bugzilla.suse.com/1057723" source="BUGZILLA"/>
		<reference ref_id="1058422" ref_url="https://bugzilla.suse.com/1058422" source="BUGZILLA"/>
		<reference ref_id="1063049" ref_url="https://bugzilla.suse.com/1063049" source="BUGZILLA"/>
		<reference ref_id="1063050" ref_url="https://bugzilla.suse.com/1063050" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12563" ref_url="https://www.suse.com/security/cve/CVE-2017-12563/" source="CVE"/>
		<reference ref_id="CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691/" source="CVE"/>
		<reference ref_id="CVE-2017-13061" ref_url="https://www.suse.com/security/cve/CVE-2017-13061/" source="CVE"/>
		<reference ref_id="CVE-2017-13062" ref_url="https://www.suse.com/security/cve/CVE-2017-13062/" source="CVE"/>
		<reference ref_id="CVE-2017-14042" ref_url="https://www.suse.com/security/cve/CVE-2017-14042/" source="CVE"/>
		<reference ref_id="CVE-2017-14174" ref_url="https://www.suse.com/security/cve/CVE-2017-14174/" source="CVE"/>
		<reference ref_id="CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343/" source="CVE"/>
		<reference ref_id="CVE-2017-15277" ref_url="https://www.suse.com/security/cve/CVE-2017-15277/" source="CVE"/>
		<reference ref_id="CVE-2017-15281" ref_url="https://www.suse.com/security/cve/CVE-2017-15281/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003569.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- security update (xcf.c):
  * CVE-2017-14343: Memory leak vulnerability in ReadXCFImage could lead to denial of service via a crafted file.
    CVE-2017-12691: The ReadOneLayer function in coders/xcf.c allows remote attackers to cause a denial of service 
    (memory consumption) via a crafted file.
    [bsc#1058422]

- security update (pnm.c):
  * CVE-2017-14042: A memory allocation failure was discovered in the ReadPNMImage function in coders/pnm.c and 
    could lead to remote denial of service [bsc#1056550]

- security update (psd.c):
  * CVE-2017-15281: ReadPSDImage allows remote attackers to cause a denial of service (application crash) or 
    possibly have unspecified other impact via a crafted file [bsc#1063049]
  * CVE-2017-13061: A length-validation vulnerability was found in the function ReadPSDLayersInternal in coders/psd.c, 
    which allows attackers to cause a denial of service (ReadPSDImage memory exhaustion) via a crafted file. [bsc#1055063]
  * CVE-2017-12563: A Memory exhaustion vulnerability was found in the function ReadPSDImage in coders/psd.c, 
    which allows attackers to cause a denial of service. [bsc#1052460]
  * CVE-2017-14174: Due to a lack of an EOF check (End of File) in ReadPSDLayersInternal could cause huge CPU consumption, 
    when a crafted PSD file, which claims a large 'length' field in the header but does not contain sufficient backing data, 
    is provided, the loop over \'length\' would consume huge CPU resources, since there is no EOF check inside the loop.[bsc#1057723]

- security update (meta.c):
  * CVE-2017-13062: Amemory leak vulnerability was found in the function formatIPTC in coders/meta.c, 
    which allows attackers to cause a denial of service (WriteMETAImage memory consumption) via a crafted file [bsc#1055053]

- security update (gif.c):
  * CVE-2017-15277: ReadGIFImage in coders/gif.c leaves the palette uninitialized when processing a GIF file that has neither 
    a global nor local palette. If the affected product is used as a library loaded into a process that operates on interesting 
    data, this data sometimes can be leaked via the uninitialized palette.[bsc#1063050]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1052460">SUSE bug 1052460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055053">SUSE bug 1055053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055063">SUSE bug 1055063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056550">SUSE bug 1056550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057723">SUSE bug 1057723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058422">SUSE bug 1058422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063049">SUSE bug 1063049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063050">SUSE bug 1063050</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12563/">CVE-2017-12563 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12563">CVE-2017-12563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12691">CVE-2017-12691 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13061/">CVE-2017-13061 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13061">CVE-2017-13061 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13062/">CVE-2017-13062 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13062">CVE-2017-13062 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14042/">CVE-2017-14042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14042">CVE-2017-14042 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14174/">CVE-2017-14174 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14174">CVE-2017-14174 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14343">CVE-2017-14343 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15277/">CVE-2017-15277 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15277">CVE-2017-15277 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15281/">CVE-2017-15281 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15281">CVE-2017-15281 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550439" comment="libMagickCore-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550440" comment="libMagickWand-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149497" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1072947" ref_url="https://bugzilla.suse.com/1072947" source="BUGZILLA"/>
		<reference ref_id="1078662" ref_url="https://bugzilla.suse.com/1078662" source="BUGZILLA"/>
		<reference ref_id="1080740" ref_url="https://bugzilla.suse.com/1080740" source="BUGZILLA"/>
		<reference ref_id="1084300" ref_url="https://bugzilla.suse.com/1084300" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7738" ref_url="https://www.suse.com/security/cve/CVE-2018-7738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004317.html" source="SUSE-SU"/>
		<description>
This update for util-linux fixes the following issues:

This non-security issue was fixed:

- CVE-2018-7738: bash-completion/umount allowed local users to gain privileges
  by embedding shell commands in a mountpoint name, which was mishandled during a
  umount command by a different user (bsc#1084300).

These non-security issues were fixed:

- Fixed crash loop in lscpu (bsc#1072947).
- Fixed possible segfault of umount -a
- Fixed mount -a on NFS bind mounts (bsc#1080740).
- Fixed lsblk on NVMe (bsc#1078662).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-26"/>
	<updated date="2018-07-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1072947">SUSE bug 1072947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078662">SUSE bug 1078662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080740">SUSE bug 1080740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084300">SUSE bug 1084300</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7738/">CVE-2018-7738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7738">CVE-2018-7738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552946" comment="libblkid1-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552947" comment="libblkid1-32bit-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552948" comment="libfdisk1-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552949" comment="libmount1-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552950" comment="libmount1-32bit-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552951" comment="libsmartcols1-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552952" comment="libuuid1-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552953" comment="libuuid1-32bit-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552954" comment="python-libmount-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552955" comment="util-linux-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519835" comment="util-linux-lang-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552956" comment="util-linux-systemd-2.29.2-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552957" comment="uuidd-2.29.2-3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149498" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1071767" ref_url="https://bugzilla.suse.com/1071767" source="BUGZILLA"/>
		<reference ref_id="1071777" ref_url="https://bugzilla.suse.com/1071777" source="BUGZILLA"/>
		<reference ref_id="1100167" ref_url="https://bugzilla.suse.com/1100167" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17456" ref_url="https://www.suse.com/security/cve/CVE-2017-17456/" source="CVE"/>
		<reference ref_id="CVE-2017-17457" ref_url="https://www.suse.com/security/cve/CVE-2017-17457/" source="CVE"/>
		<reference ref_id="CVE-2018-13139" ref_url="https://www.suse.com/security/cve/CVE-2018-13139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004311.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

Security issues fixed:

- CVE-2018-13139: Fix a stack-based buffer overflow in psf_memset in common.c that allows remote attackers to cause a denial of service (bsc#1100167).
- CVE-2017-17456: Prevent segmentation fault in the function d2alaw_array() that may have lead to a remote DoS (bsc#1071777)
- CVE-2017-17457: Prevent segmentation fault in the function d2ulaw_array() that may have lead to a remote DoS, a different vulnerability than CVE-2017-14246 (bsc#1071767)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-26"/>
	<updated date="2018-07-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1071767">SUSE bug 1071767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071777">SUSE bug 1071777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100167">SUSE bug 1100167</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17456/">CVE-2017-17456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17456">CVE-2017-17456 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17457/">CVE-2017-17457 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17457">CVE-2017-17457 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13139/">CVE-2018-13139 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13139">CVE-2018-13139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552958" comment="libsndfile1-1.0.25-36.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552959" comment="libsndfile1-32bit-1.0.25-36.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149499" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1064455" ref_url="https://bugzilla.suse.com/1064455" source="BUGZILLA"/>
		<reference ref_id="1090766" ref_url="https://bugzilla.suse.com/1090766" source="BUGZILLA"/>
		<reference ref_id="1097410" ref_url="https://bugzilla.suse.com/1097410" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004331.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

The following security vulnerability was addressed:

- CVE-2018-0495: Mitigate a novel side-channel attack by enabling blinding for
  ECDSA signatures (bsc#1097410).

The following other issues were fixed:

- Extended the fipsdrv dsa-sign and dsa-verify commands with the
  --algo parameter for the FIPS testing of DSA SigVer and SigGen (bsc#1064455).
- Ensure libgcrypt20-hmac and libgcrypt20 are installed in the correct order. (bsc#1090766)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-27"/>
	<updated date="2018-07-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064455">SUSE bug 1064455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090766">SUSE bug 1090766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097410">SUSE bug 1097410</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0495">CVE-2018-0495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552960" comment="libgcrypt20-1.6.1-16.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552961" comment="libgcrypt20-32bit-1.6.1-16.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552962" comment="libgcrypt20-hmac-1.6.1-16.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552963" comment="libgcrypt20-hmac-32bit-1.6.1-16.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149500" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1061343" ref_url="https://bugzilla.suse.com/1061343" source="BUGZILLA"/>
		<reference ref_id="1094717" ref_url="https://bugzilla.suse.com/1094717" source="BUGZILLA"/>
		<reference ref_id="1101428" ref_url="https://bugzilla.suse.com/1101428" source="BUGZILLA"/>
		<reference ref_id="1101566" ref_url="https://bugzilla.suse.com/1101566" source="BUGZILLA"/>
		<reference ref_id="1101567" ref_url="https://bugzilla.suse.com/1101567" source="BUGZILLA"/>
		<reference ref_id="1101568" ref_url="https://bugzilla.suse.com/1101568" source="BUGZILLA"/>
		<reference ref_id="1101569" ref_url="https://bugzilla.suse.com/1101569" source="BUGZILLA"/>
		<reference ref_id="1101570" ref_url="https://bugzilla.suse.com/1101570" source="BUGZILLA"/>
		<reference ref_id="1101571" ref_url="https://bugzilla.suse.com/1101571" source="BUGZILLA"/>
		<reference ref_id="1101573" ref_url="https://bugzilla.suse.com/1101573" source="BUGZILLA"/>
		<reference ref_id="1101576" ref_url="https://bugzilla.suse.com/1101576" source="BUGZILLA"/>
		<reference ref_id="1101577" ref_url="https://bugzilla.suse.com/1101577" source="BUGZILLA"/>
		<reference ref_id="1101578" ref_url="https://bugzilla.suse.com/1101578" source="BUGZILLA"/>
		<reference ref_id="1101581" ref_url="https://bugzilla.suse.com/1101581" source="BUGZILLA"/>
		<reference ref_id="1101582" ref_url="https://bugzilla.suse.com/1101582" source="BUGZILLA"/>
		<reference ref_id="1101583" ref_url="https://bugzilla.suse.com/1101583" source="BUGZILLA"/>
		<reference ref_id="1101588" ref_url="https://bugzilla.suse.com/1101588" source="BUGZILLA"/>
		<reference ref_id="1101589" ref_url="https://bugzilla.suse.com/1101589" source="BUGZILLA"/>
		<reference ref_id="980830" ref_url="https://bugzilla.suse.com/980830" source="BUGZILLA"/>
		<reference ref_id="982129" ref_url="https://bugzilla.suse.com/982129" source="BUGZILLA"/>
		<reference ref_id="986534" ref_url="https://bugzilla.suse.com/986534" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9116" ref_url="https://www.suse.com/security/cve/CVE-2014-9116/" source="CVE"/>
		<reference ref_id="CVE-2018-14349" ref_url="https://www.suse.com/security/cve/CVE-2018-14349/" source="CVE"/>
		<reference ref_id="CVE-2018-14350" ref_url="https://www.suse.com/security/cve/CVE-2018-14350/" source="CVE"/>
		<reference ref_id="CVE-2018-14351" ref_url="https://www.suse.com/security/cve/CVE-2018-14351/" source="CVE"/>
		<reference ref_id="CVE-2018-14352" ref_url="https://www.suse.com/security/cve/CVE-2018-14352/" source="CVE"/>
		<reference ref_id="CVE-2018-14353" ref_url="https://www.suse.com/security/cve/CVE-2018-14353/" source="CVE"/>
		<reference ref_id="CVE-2018-14354" ref_url="https://www.suse.com/security/cve/CVE-2018-14354/" source="CVE"/>
		<reference ref_id="CVE-2018-14355" ref_url="https://www.suse.com/security/cve/CVE-2018-14355/" source="CVE"/>
		<reference ref_id="CVE-2018-14356" ref_url="https://www.suse.com/security/cve/CVE-2018-14356/" source="CVE"/>
		<reference ref_id="CVE-2018-14357" ref_url="https://www.suse.com/security/cve/CVE-2018-14357/" source="CVE"/>
		<reference ref_id="CVE-2018-14358" ref_url="https://www.suse.com/security/cve/CVE-2018-14358/" source="CVE"/>
		<reference ref_id="CVE-2018-14359" ref_url="https://www.suse.com/security/cve/CVE-2018-14359/" source="CVE"/>
		<reference ref_id="CVE-2018-14360" ref_url="https://www.suse.com/security/cve/CVE-2018-14360/" source="CVE"/>
		<reference ref_id="CVE-2018-14361" ref_url="https://www.suse.com/security/cve/CVE-2018-14361/" source="CVE"/>
		<reference ref_id="CVE-2018-14362" ref_url="https://www.suse.com/security/cve/CVE-2018-14362/" source="CVE"/>
		<reference ref_id="CVE-2018-14363" ref_url="https://www.suse.com/security/cve/CVE-2018-14363/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

Security issues fixed:

- bsc#1101428: Mutt 1.10.1 security release update.
- CVE-2018-14351: Fix imap/command.c that mishandles long IMAP status mailbox literal count size (bsc#1101583).
- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).
- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).
- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).
- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).
- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).
- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).
- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).
- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).
- CVE-2018-14363: Fix newsrc.c that does not properlyrestrict '/' characters that may have unsafe interaction with cache pathnames (bsc#1101566).
- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).
- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).
- CVE-2018-14360: Fix nntp_add_group in newsrc.c that has a stack-based buffer overflow because of incorrect sscanf usage (bsc#1101569).
- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).
- CVE-2018-14361: Fix that nntp.c proceeds even if memory allocation fails for messages data (bsc#1101568).

Bug fixes:

- mutt reports as neomutt and incorrect version (bsc#1094717)
- No sidebar available in mutt 1.6.1 from Tumbleweed snapshot 20160517 (bsc#980830)
- mutt-1.6.1 unusable when built with --enable-sidebar (bsc#982129)
- (neo)mutt displaying times in Zulu time (bsc#1061343)
- mutt unconditionally segfaults when displaying a message (bsc#986534)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-27"/>
	<updated date="2018-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1061343">SUSE bug 1061343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094717">SUSE bug 1094717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101566">SUSE bug 1101566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101567">SUSE bug 1101567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101568">SUSE bug 1101568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101569">SUSE bug 1101569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101570">SUSE bug 1101570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101571">SUSE bug 1101571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101573">SUSE bug 1101573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101576">SUSE bug 1101576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101577">SUSE bug 1101577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101578">SUSE bug 1101578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101581">SUSE bug 1101581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101582">SUSE bug 1101582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101583">SUSE bug 1101583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101588">SUSE bug 1101588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980830">SUSE bug 980830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982129">SUSE bug 982129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986534">SUSE bug 986534</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9116/">CVE-2014-9116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9116">CVE-2014-9116 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14349/">CVE-2018-14349 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14349">CVE-2018-14349 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14350/">CVE-2018-14350 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14350">CVE-2018-14350 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14351/">CVE-2018-14351 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14351">CVE-2018-14351 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14352/">CVE-2018-14352 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14352">CVE-2018-14352 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14353/">CVE-2018-14353 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14353">CVE-2018-14353 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14354/">CVE-2018-14354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14354">CVE-2018-14354 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14355/">CVE-2018-14355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14355">CVE-2018-14355 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14356/">CVE-2018-14356 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14356">CVE-2018-14356 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14357/">CVE-2018-14357 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14357">CVE-2018-14357 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14358/">CVE-2018-14358 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14358">CVE-2018-14358 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14359/">CVE-2018-14359 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14359">CVE-2018-14359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14360/">CVE-2018-14360 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14360">CVE-2018-14360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14361/">CVE-2018-14361 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14361">CVE-2018-14361 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14362/">CVE-2018-14362 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14362">CVE-2018-14362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14363/">CVE-2018-14363 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14363">CVE-2018-14363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552964" comment="mutt-1.10.1-55.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149501" version="1" class="patch">
	<metadata>
		<title>Security update for libevent (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1022917" ref_url="https://bugzilla.suse.com/1022917" source="BUGZILLA"/>
		<reference ref_id="1022918" ref_url="https://bugzilla.suse.com/1022918" source="BUGZILLA"/>
		<reference ref_id="1022919" ref_url="https://bugzilla.suse.com/1022919" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10195" ref_url="https://www.suse.com/security/cve/CVE-2016-10195/" source="CVE"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2016-10197" ref_url="https://www.suse.com/security/cve/CVE-2016-10197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003628.html" source="SUSE-SU"/>
		<description>
This update for libevent fixes the following security issues:

- CVE-2016-10195: DNS remote stack overread vulnerability (bsc#1022917) 
- CVE-2016-10196: stack/buffer overflow in evutil_parse_sockaddr_port() (bsc#1022918) 
- CVE-2016-10197: out-of-bounds read in search_make_new() (bsc#1022919) 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-24"/>
	<updated date="2018-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022917">SUSE bug 1022917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022918">SUSE bug 1022918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022919">SUSE bug 1022919</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10195/">CVE-2016-10195 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10195">CVE-2016-10195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10196">CVE-2016-10196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10197/">CVE-2016-10197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10197">CVE-2016-10197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550441" comment="libevent-2_0-5-2.0.21-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149502" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1053417" ref_url="https://bugzilla.suse.com/1053417" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004361.html" source="SUSE-SU"/>
		<description>
This update for gdk-pixbuf fixes the following issues:

Security issue fixed:

- CVE-2015-4491: Fix integer multiplication overflow that allows for DoS or potentially RCE (bsc#1053417).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-30"/>
	<updated date="2018-07-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1053417">SUSE bug 1053417</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4491">CVE-2015-4491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519845" comment="gdk-pixbuf-lang-2.34.0-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552965" comment="gdk-pixbuf-query-loaders-2.34.0-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552966" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552967" comment="libgdk_pixbuf-2_0-0-2.34.0-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552968" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552969" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149503" version="1" class="patch">
	<metadata>
		<title>Security update for libcgroup (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1100365" ref_url="https://bugzilla.suse.com/1100365" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14348" ref_url="https://www.suse.com/security/cve/CVE-2018-14348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004359.html" source="SUSE-SU"/>
		<description>
This update for libcgroup fixes the following issues:

Security issue fixed:

- CVE-2018-14348: Fix daemon that creates /var/log/cgred with mode 0666 (bsc#1100365).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-30"/>
	<updated date="2018-07-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100365">SUSE bug 1100365</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14348/">CVE-2018-14348 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14348">CVE-2018-14348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552970" comment="libcgroup-tools-0.41.rc1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552971" comment="libcgroup1-0.41.rc1-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149504" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1099031" ref_url="https://bugzilla.suse.com/1099031" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1116" ref_url="https://www.suse.com/security/cve/CVE-2018-1116/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004365.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2018-1116: Fix uid comparison lacking in polkit_backend_interactive_authority_check_authorization (bsc#1099031).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-01"/>
	<updated date="2018-08-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099031">SUSE bug 1099031</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1116/">CVE-2018-1116 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1116">CVE-2018-1116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552972" comment="libpolkit0-0.113-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552973" comment="polkit-0.113-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552974" comment="typelib-1_0-Polkit-1_0-0.113-5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149505" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1077330" ref_url="https://bugzilla.suse.com/1077330" source="BUGZILLA"/>
		<reference ref_id="1094290" ref_url="https://bugzilla.suse.com/1094290" source="BUGZILLA"/>
		<reference ref_id="1094291" ref_url="https://bugzilla.suse.com/1094291" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004363.html" source="SUSE-SU"/>
		<description>
This update for ovmf provide the following fix:

Security issues fixed:

- CVE-2018-0739: Update openssl to 1.0.2o to limit ASN.1 constructed types
  recursive definition depth (bsc#1094290, bsc#1094291).

Bug fixes:

- Only use SLES-UEFI-CA-Certificate-2048.crt for the SUSE flavor to provide the
  better compatibility. (bsc#1077330)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-01"/>
	<updated date="2018-08-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077330">SUSE bug 1077330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094290">SUSE bug 1094290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094291">SUSE bug 1094291</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739">CVE-2018-0739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552975" comment="ovmf-2017+git1492060560.b6d11d7c46-4.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552976" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552977" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552978" comment="qemu-uefi-aarch64-2017+git1492060560.b6d11d7c46-4.9.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149506" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1050082" ref_url="https://bugzilla.suse.com/1050082" source="BUGZILLA"/>
		<reference ref_id="1061066" ref_url="https://bugzilla.suse.com/1061066" source="BUGZILLA"/>
		<reference ref_id="1087018" ref_url="https://bugzilla.suse.com/1087018" source="BUGZILLA"/>
		<reference ref_id="1096405" ref_url="https://bugzilla.suse.com/1096405" source="BUGZILLA"/>
		<reference ref_id="1096406" ref_url="https://bugzilla.suse.com/1096406" source="BUGZILLA"/>
		<reference ref_id="1096407" ref_url="https://bugzilla.suse.com/1096407" source="BUGZILLA"/>
		<reference ref_id="1096408" ref_url="https://bugzilla.suse.com/1096408" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18248" ref_url="https://www.suse.com/security/cve/CVE-2017-18248/" source="CVE"/>
		<reference ref_id="CVE-2018-4180" ref_url="https://www.suse.com/security/cve/CVE-2018-4180/" source="CVE"/>
		<reference ref_id="CVE-2018-4181" ref_url="https://www.suse.com/security/cve/CVE-2018-4181/" source="CVE"/>
		<reference ref_id="CVE-2018-4182" ref_url="https://www.suse.com/security/cve/CVE-2018-4182/" source="CVE"/>
		<reference ref_id="CVE-2018-4183" ref_url="https://www.suse.com/security/cve/CVE-2018-4183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004364.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

The following security vulnerabilities were fixed:

- CVE-2017-18248: Handle invalid characters properly in printing jobs. This fixes a problem that
  was causing the DBUS library to abort the calling process. (bsc#1061066 bsc#1087018)
- Fixed a local privilege escalation to root and sandbox bypasses in the
  scheduler
- CVE-2018-4180: Fixed a local privilege escalation to root in dnssd backend
  (bsc#1096405)
- CVE-2018-4181: Limited local file reads as root via cupsd.conf include
  directive (bsc#1096406)
- CVE-2018-4182: Fixed a sandbox bypass due to insecure error handling
  (bsc#1096407)
- CVE-2018-4183: Fixed a sandbox bypass due to profile misconfiguration
  (bsc#1096408)

The following other issue was fixed:

- Fixed authorization check for clients (like samba) connected through the
  local socket when Kerberos authentication is enabled (bsc#1050082)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-01"/>
	<updated date="2018-08-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050082">SUSE bug 1050082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061066">SUSE bug 1061066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087018">SUSE bug 1087018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096405">SUSE bug 1096405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096406">SUSE bug 1096406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096407">SUSE bug 1096407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096408">SUSE bug 1096408</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18248/">CVE-2017-18248 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18248">CVE-2017-18248 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4180/">CVE-2018-4180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4180">CVE-2018-4180 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4181/">CVE-2018-4181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4181">CVE-2018-4181 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4182/">CVE-2018-4182 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4182">CVE-2018-4182 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4183/">CVE-2018-4183 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4183">CVE-2018-4183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552979" comment="cups-1.7.5-20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552980" comment="cups-client-1.7.5-20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552981" comment="cups-libs-1.7.5-20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552982" comment="cups-libs-32bit-1.7.5-20.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149507" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1072183" ref_url="https://bugzilla.suse.com/1072183" source="BUGZILLA"/>
		<reference ref_id="968175" ref_url="https://bugzilla.suse.com/968175" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:2171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004367.html" source="SUSE-SU"/>
		<description>
This update for libtirpc fixes the following issues:

Security issue fixed:

- bsc#968175: Fix remote crash of RPC services.

Bug fixes:

- bsc#1072183: Send RPC getport call as specified via parameter.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-02"/>
	<updated date="2018-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1072183">SUSE bug 1072183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968175">SUSE bug 968175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552983" comment="libtirpc-netconfig-1.0.1-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552984" comment="libtirpc3-1.0.1-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552985" comment="libtirpc3-32bit-1.0.1-17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149508" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1077001" ref_url="https://bugzilla.suse.com/1077001" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003632.html" source="SUSE-SU"/>
		<description>
This update for curl fixes one issues.

This security issue was fixed:

- CVE-2018-1000007: Prevent leaking authentication data to third parties when following redirects (bsc#1077001)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-25"/>
	<updated date="2018-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077001">SUSE bug 1077001</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000007">CVE-2018-1000007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550442" comment="curl-7.37.0-37.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550443" comment="libcurl4-7.37.0-37.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550444" comment="libcurl4-32bit-7.37.0-37.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149509" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1092874" ref_url="https://bugzilla.suse.com/1092874" source="BUGZILLA"/>
		<reference ref_id="1094932" ref_url="https://bugzilla.suse.com/1094932" source="BUGZILLA"/>
		<reference ref_id="1096748" ref_url="https://bugzilla.suse.com/1096748" source="BUGZILLA"/>
		<reference ref_id="1099162" ref_url="https://bugzilla.suse.com/1099162" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10861" ref_url="https://www.suse.com/security/cve/CVE-2018-10861/" source="CVE"/>
		<reference ref_id="CVE-2018-1128" ref_url="https://www.suse.com/security/cve/CVE-2018-1128/" source="CVE"/>
		<reference ref_id="CVE-2018-1129" ref_url="https://www.suse.com/security/cve/CVE-2018-1129/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004489.html" source="SUSE-SU"/>
		<description>
This update for ceph fixes the following issues:

- Update to version 12.2.7-420-gc0ef85b854:
    * https://ceph.com/releases/12-2-7-luminous-released/
    * luminous: osd: eternal stuck PG in 'unfound_recovery' (bsc#1094932)
    * bluestore: db.slow used when db is not full (bsc#1092874)

    * CVE-2018-10861: Ensure that ceph-mon does perform authorization on all OSD pool ops (bsc#1099162).
    * CVE-2018-1129: cephx signature check bypass (bsc#1096748).
    * CVE-2018-1128: cephx protocol was vulnerable to replay attack (bsc#1096748).

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-03"/>
	<updated date="2018-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092874">SUSE bug 1092874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094932">SUSE bug 1094932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096748">SUSE bug 1096748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099162">SUSE bug 1099162</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10861/">CVE-2018-10861 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10861">CVE-2018-10861 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-1128/">CVE-2018-1128 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1128">CVE-2018-1128 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1129/">CVE-2018-1129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1129">CVE-2018-1129 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552986" comment="ceph-common-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552987" comment="libcephfs2-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552988" comment="librados2-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552989" comment="libradosstriper1-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552990" comment="librbd1-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552991" comment="librgw2-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552992" comment="python-cephfs-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552993" comment="python-rados-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552994" comment="python-rbd-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552995" comment="python-rgw-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149510" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1052916" ref_url="https://bugzilla.suse.com/1052916" source="BUGZILLA"/>
		<reference ref_id="1086036" ref_url="https://bugzilla.suse.com/1086036" source="BUGZILLA"/>
		<reference ref_id="1100097" ref_url="https://bugzilla.suse.com/1100097" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2885" ref_url="https://www.suse.com/security/cve/CVE-2017-2885/" source="CVE"/>
		<reference ref_id="CVE-2018-12910" ref_url="https://www.suse.com/security/cve/CVE-2018-12910/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004374.html" source="SUSE-SU"/>
		<description>
This update for libsoup fixes the following issues:

Security issue fixed:

- CVE-2018-12910: Fix crash when handling empty hostnames (bsc#1100097).
- CVE-2017-2885: Fix chunk decoding buffer overrun that could be exploited against either clients or servers (bsc#1052916).

Bug fixes:

- bsc#1086036: translation-update-upstream commented out for Leap
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-06"/>
	<updated date="2018-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1052916">SUSE bug 1052916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086036">SUSE bug 1086036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100097">SUSE bug 1100097</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2885/">CVE-2017-2885 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2885">CVE-2017-2885 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12910/">CVE-2018-12910 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12910">CVE-2018-12910 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552996" comment="libsoup-2_4-1-2.62.2-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551268" comment="libsoup-2_4-1-32bit-2.62.2-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519875" comment="libsoup-lang-2.62.2-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552997" comment="typelib-1_0-Soup-2_4-2.62.2-5.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149511" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1059809" ref_url="https://bugzilla.suse.com/1059809" source="BUGZILLA"/>
		<reference ref_id="1059811" ref_url="https://bugzilla.suse.com/1059811" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14632" ref_url="https://www.suse.com/security/cve/CVE-2017-14632/" source="CVE"/>
		<reference ref_id="CVE-2017-14633" ref_url="https://www.suse.com/security/cve/CVE-2017-14633/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003567.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:

- CVE-2017-14633: out-of-bounds array read vulnerability exists in
  function mapping0_forward() could lead to remote denial of service (bsc#1059811)
- CVE-2017-14632: Remote Code Execution upon freeing uninitialized
  memory in function vorbis_analysis_headerout(bsc#1059809)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059809">SUSE bug 1059809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059811">SUSE bug 1059811</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14632/">CVE-2017-14632 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14632">CVE-2017-14632 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14633/">CVE-2017-14633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14633">CVE-2017-14633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009533069" comment="libvorbis-doc-1.3.3-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550445" comment="libvorbis0-1.3.3-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550446" comment="libvorbis0-32bit-1.3.3-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550447" comment="libvorbisenc2-1.3.3-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550448" comment="libvorbisenc2-32bit-1.3.3-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550449" comment="libvorbisfile3-1.3.3-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550450" comment="libvorbisfile3-32bit-1.3.3-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149512" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1020950" ref_url="https://bugzilla.suse.com/1020950" source="BUGZILLA"/>
		<reference ref_id="1024749" ref_url="https://bugzilla.suse.com/1024749" source="BUGZILLA"/>
		<reference ref_id="1050469" ref_url="https://bugzilla.suse.com/1050469" source="BUGZILLA"/>
		<reference ref_id="1066892" ref_url="https://bugzilla.suse.com/1066892" source="BUGZILLA"/>
		<reference ref_id="1069925" ref_url="https://bugzilla.suse.com/1069925" source="BUGZILLA"/>
		<reference ref_id="1073654" ref_url="https://bugzilla.suse.com/1073654" source="BUGZILLA"/>
		<reference ref_id="1075419" ref_url="https://bugzilla.suse.com/1075419" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4692" ref_url="https://www.suse.com/security/cve/CVE-2016-4692/" source="CVE"/>
		<reference ref_id="CVE-2016-4743" ref_url="https://www.suse.com/security/cve/CVE-2016-4743/" source="CVE"/>
		<reference ref_id="CVE-2016-7586" ref_url="https://www.suse.com/security/cve/CVE-2016-7586/" source="CVE"/>
		<reference ref_id="CVE-2016-7587" ref_url="https://www.suse.com/security/cve/CVE-2016-7587/" source="CVE"/>
		<reference ref_id="CVE-2016-7589" ref_url="https://www.suse.com/security/cve/CVE-2016-7589/" source="CVE"/>
		<reference ref_id="CVE-2016-7592" ref_url="https://www.suse.com/security/cve/CVE-2016-7592/" source="CVE"/>
		<reference ref_id="CVE-2016-7598" ref_url="https://www.suse.com/security/cve/CVE-2016-7598/" source="CVE"/>
		<reference ref_id="CVE-2016-7599" ref_url="https://www.suse.com/security/cve/CVE-2016-7599/" source="CVE"/>
		<reference ref_id="CVE-2016-7610" ref_url="https://www.suse.com/security/cve/CVE-2016-7610/" source="CVE"/>
		<reference ref_id="CVE-2016-7623" ref_url="https://www.suse.com/security/cve/CVE-2016-7623/" source="CVE"/>
		<reference ref_id="CVE-2016-7632" ref_url="https://www.suse.com/security/cve/CVE-2016-7632/" source="CVE"/>
		<reference ref_id="CVE-2016-7635" ref_url="https://www.suse.com/security/cve/CVE-2016-7635/" source="CVE"/>
		<reference ref_id="CVE-2016-7639" ref_url="https://www.suse.com/security/cve/CVE-2016-7639/" source="CVE"/>
		<reference ref_id="CVE-2016-7641" ref_url="https://www.suse.com/security/cve/CVE-2016-7641/" source="CVE"/>
		<reference ref_id="CVE-2016-7645" ref_url="https://www.suse.com/security/cve/CVE-2016-7645/" source="CVE"/>
		<reference ref_id="CVE-2016-7652" ref_url="https://www.suse.com/security/cve/CVE-2016-7652/" source="CVE"/>
		<reference ref_id="CVE-2016-7654" ref_url="https://www.suse.com/security/cve/CVE-2016-7654/" source="CVE"/>
		<reference ref_id="CVE-2016-7656" ref_url="https://www.suse.com/security/cve/CVE-2016-7656/" source="CVE"/>
		<reference ref_id="CVE-2017-13788" ref_url="https://www.suse.com/security/cve/CVE-2017-13788/" source="CVE"/>
		<reference ref_id="CVE-2017-13798" ref_url="https://www.suse.com/security/cve/CVE-2017-13798/" source="CVE"/>
		<reference ref_id="CVE-2017-13803" ref_url="https://www.suse.com/security/cve/CVE-2017-13803/" source="CVE"/>
		<reference ref_id="CVE-2017-13856" ref_url="https://www.suse.com/security/cve/CVE-2017-13856/" source="CVE"/>
		<reference ref_id="CVE-2017-13866" ref_url="https://www.suse.com/security/cve/CVE-2017-13866/" source="CVE"/>
		<reference ref_id="CVE-2017-13870" ref_url="https://www.suse.com/security/cve/CVE-2017-13870/" source="CVE"/>
		<reference ref_id="CVE-2017-2350" ref_url="https://www.suse.com/security/cve/CVE-2017-2350/" source="CVE"/>
		<reference ref_id="CVE-2017-2354" ref_url="https://www.suse.com/security/cve/CVE-2017-2354/" source="CVE"/>
		<reference ref_id="CVE-2017-2355" ref_url="https://www.suse.com/security/cve/CVE-2017-2355/" source="CVE"/>
		<reference ref_id="CVE-2017-2356" ref_url="https://www.suse.com/security/cve/CVE-2017-2356/" source="CVE"/>
		<reference ref_id="CVE-2017-2362" ref_url="https://www.suse.com/security/cve/CVE-2017-2362/" source="CVE"/>
		<reference ref_id="CVE-2017-2363" ref_url="https://www.suse.com/security/cve/CVE-2017-2363/" source="CVE"/>
		<reference ref_id="CVE-2017-2364" ref_url="https://www.suse.com/security/cve/CVE-2017-2364/" source="CVE"/>
		<reference ref_id="CVE-2017-2365" ref_url="https://www.suse.com/security/cve/CVE-2017-2365/" source="CVE"/>
		<reference ref_id="CVE-2017-2366" ref_url="https://www.suse.com/security/cve/CVE-2017-2366/" source="CVE"/>
		<reference ref_id="CVE-2017-2369" ref_url="https://www.suse.com/security/cve/CVE-2017-2369/" source="CVE"/>
		<reference ref_id="CVE-2017-2371" ref_url="https://www.suse.com/security/cve/CVE-2017-2371/" source="CVE"/>
		<reference ref_id="CVE-2017-2373" ref_url="https://www.suse.com/security/cve/CVE-2017-2373/" source="CVE"/>
		<reference ref_id="CVE-2017-2496" ref_url="https://www.suse.com/security/cve/CVE-2017-2496/" source="CVE"/>
		<reference ref_id="CVE-2017-2510" ref_url="https://www.suse.com/security/cve/CVE-2017-2510/" source="CVE"/>
		<reference ref_id="CVE-2017-2539" ref_url="https://www.suse.com/security/cve/CVE-2017-2539/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-7006" ref_url="https://www.suse.com/security/cve/CVE-2017-7006/" source="CVE"/>
		<reference ref_id="CVE-2017-7011" ref_url="https://www.suse.com/security/cve/CVE-2017-7011/" source="CVE"/>
		<reference ref_id="CVE-2017-7012" ref_url="https://www.suse.com/security/cve/CVE-2017-7012/" source="CVE"/>
		<reference ref_id="CVE-2017-7018" ref_url="https://www.suse.com/security/cve/CVE-2017-7018/" source="CVE"/>
		<reference ref_id="CVE-2017-7019" ref_url="https://www.suse.com/security/cve/CVE-2017-7019/" source="CVE"/>
		<reference ref_id="CVE-2017-7020" ref_url="https://www.suse.com/security/cve/CVE-2017-7020/" source="CVE"/>
		<reference ref_id="CVE-2017-7030" ref_url="https://www.suse.com/security/cve/CVE-2017-7030/" source="CVE"/>
		<reference ref_id="CVE-2017-7034" ref_url="https://www.suse.com/security/cve/CVE-2017-7034/" source="CVE"/>
		<reference ref_id="CVE-2017-7037" ref_url="https://www.suse.com/security/cve/CVE-2017-7037/" source="CVE"/>
		<reference ref_id="CVE-2017-7038" ref_url="https://www.suse.com/security/cve/CVE-2017-7038/" source="CVE"/>
		<reference ref_id="CVE-2017-7039" ref_url="https://www.suse.com/security/cve/CVE-2017-7039/" source="CVE"/>
		<reference ref_id="CVE-2017-7040" ref_url="https://www.suse.com/security/cve/CVE-2017-7040/" source="CVE"/>
		<reference ref_id="CVE-2017-7041" ref_url="https://www.suse.com/security/cve/CVE-2017-7041/" source="CVE"/>
		<reference ref_id="CVE-2017-7042" ref_url="https://www.suse.com/security/cve/CVE-2017-7042/" source="CVE"/>
		<reference ref_id="CVE-2017-7043" ref_url="https://www.suse.com/security/cve/CVE-2017-7043/" source="CVE"/>
		<reference ref_id="CVE-2017-7046" ref_url="https://www.suse.com/security/cve/CVE-2017-7046/" source="CVE"/>
		<reference ref_id="CVE-2017-7048" ref_url="https://www.suse.com/security/cve/CVE-2017-7048/" source="CVE"/>
		<reference ref_id="CVE-2017-7049" ref_url="https://www.suse.com/security/cve/CVE-2017-7049/" source="CVE"/>
		<reference ref_id="CVE-2017-7052" ref_url="https://www.suse.com/security/cve/CVE-2017-7052/" source="CVE"/>
		<reference ref_id="CVE-2017-7055" ref_url="https://www.suse.com/security/cve/CVE-2017-7055/" source="CVE"/>
		<reference ref_id="CVE-2017-7056" ref_url="https://www.suse.com/security/cve/CVE-2017-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-7059" ref_url="https://www.suse.com/security/cve/CVE-2017-7059/" source="CVE"/>
		<reference ref_id="CVE-2017-7061" ref_url="https://www.suse.com/security/cve/CVE-2017-7061/" source="CVE"/>
		<reference ref_id="CVE-2017-7064" ref_url="https://www.suse.com/security/cve/CVE-2017-7064/" source="CVE"/>
		<reference ref_id="CVE-2017-7081" ref_url="https://www.suse.com/security/cve/CVE-2017-7081/" source="CVE"/>
		<reference ref_id="CVE-2017-7087" ref_url="https://www.suse.com/security/cve/CVE-2017-7087/" source="CVE"/>
		<reference ref_id="CVE-2017-7089" ref_url="https://www.suse.com/security/cve/CVE-2017-7089/" source="CVE"/>
		<reference ref_id="CVE-2017-7090" ref_url="https://www.suse.com/security/cve/CVE-2017-7090/" source="CVE"/>
		<reference ref_id="CVE-2017-7091" ref_url="https://www.suse.com/security/cve/CVE-2017-7091/" source="CVE"/>
		<reference ref_id="CVE-2017-7092" ref_url="https://www.suse.com/security/cve/CVE-2017-7092/" source="CVE"/>
		<reference ref_id="CVE-2017-7093" ref_url="https://www.suse.com/security/cve/CVE-2017-7093/" source="CVE"/>
		<reference ref_id="CVE-2017-7094" ref_url="https://www.suse.com/security/cve/CVE-2017-7094/" source="CVE"/>
		<reference ref_id="CVE-2017-7095" ref_url="https://www.suse.com/security/cve/CVE-2017-7095/" source="CVE"/>
		<reference ref_id="CVE-2017-7096" ref_url="https://www.suse.com/security/cve/CVE-2017-7096/" source="CVE"/>
		<reference ref_id="CVE-2017-7098" ref_url="https://www.suse.com/security/cve/CVE-2017-7098/" source="CVE"/>
		<reference ref_id="CVE-2017-7099" ref_url="https://www.suse.com/security/cve/CVE-2017-7099/" source="CVE"/>
		<reference ref_id="CVE-2017-7100" ref_url="https://www.suse.com/security/cve/CVE-2017-7100/" source="CVE"/>
		<reference ref_id="CVE-2017-7102" ref_url="https://www.suse.com/security/cve/CVE-2017-7102/" source="CVE"/>
		<reference ref_id="CVE-2017-7104" ref_url="https://www.suse.com/security/cve/CVE-2017-7104/" source="CVE"/>
		<reference ref_id="CVE-2017-7107" ref_url="https://www.suse.com/security/cve/CVE-2017-7107/" source="CVE"/>
		<reference ref_id="CVE-2017-7109" ref_url="https://www.suse.com/security/cve/CVE-2017-7109/" source="CVE"/>
		<reference ref_id="CVE-2017-7111" ref_url="https://www.suse.com/security/cve/CVE-2017-7111/" source="CVE"/>
		<reference ref_id="CVE-2017-7117" ref_url="https://www.suse.com/security/cve/CVE-2017-7117/" source="CVE"/>
		<reference ref_id="CVE-2017-7120" ref_url="https://www.suse.com/security/cve/CVE-2017-7120/" source="CVE"/>
		<reference ref_id="CVE-2017-7142" ref_url="https://www.suse.com/security/cve/CVE-2017-7142/" source="CVE"/>
		<reference ref_id="CVE-2017-7156" ref_url="https://www.suse.com/security/cve/CVE-2017-7156/" source="CVE"/>
		<reference ref_id="CVE-2017-7157" ref_url="https://www.suse.com/security/cve/CVE-2017-7157/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003633.html" source="SUSE-SU"/>
		<description>


This update for webkit2gtk3 fixes the following issues:

Update to version 2.18.5:

  + Disable SharedArrayBuffers from Web API.
  + Reduce the precision of 'high' resolution time to 1ms.
  + bsc#1075419 - Security fixes: includes improvements to mitigate
    the effects of Spectre and Meltdown (CVE-2017-5753 and CVE-2017-5715).

Update to version 2.18.4:

  + Make WebDriver implementation more spec compliant.
  + Fix a bug when trying to remove cookies before a web process is
    spawned.
  + WebKitWebDriver process no longer links to
    libjavascriptcoregtk.
  + Fix several memory leaks in GStreamer media backend.
  + bsc#1073654 - Security fixes: CVE-2017-13866, CVE-2017-13870,
    CVE-2017-7156, CVE-2017-13856.

Update to version 2.18.3:

  + Improve calculation of font metrics to prevent scrollbars from
    being shown unnecessarily in some cases.
  + Fix handling of null capabilities in WebDriver implementation.
  + Security fixes: CVE-2017-13798, CVE-2017-13788, CVE-2017-13803.

Update to version 2.18.2:

  + Fix rendering of arabic text.
  + Fix a crash in the web process when decoding GIF images.
  + Fix rendering of wind in Windy.com.
  + Fix several crashes and rendering issues.

Update to version 2.18.1:

  + Improve performance of GIF animations.
  + Fix garbled display in GMail.
  + Fix rendering of several material design icons when using the
    web font.
  + Fix flickering when resizing the window in Wayland.
  + Prevent default kerberos authentication credentials from being
    used in ephemeral sessions.
  + Fix a crash when webkit_web_resource_get_data() is cancelled.
  + Correctly handle touchmove and touchend events in
    WebKitWebView.
  + Fix the build with enchant 2.1.1.
  + Fix the build in HPPA and Alpha.
  + Fix several crashes and rendering issues.
  + Security fixes: CVE-2017-7081, CVE-2017-7087, CVE-2017-7089,
    CVE-2017-7090, CVE-2017-7091, CVE-2017-7092, CVE-2017-7093,
    CVE-2017-7094, CVE-2017-7095, CVE-2017-7096, CVE-2017-7098,
    CVE-2017-7099, CVE-2017-7100, CVE-2017-7102, CVE-2017-7104,
    CVE-2017-7107, CVE-2017-7109, CVE-2017-7111, CVE-2017-7117,
    CVE-2017-7120, CVE-2017-7142.

- Enable gold linker on s390/s390x on SLE15/Tumbleweed.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-25"/>
	<updated date="2018-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069925">SUSE bug 1069925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073654">SUSE bug 1073654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075419">SUSE bug 1075419</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4692/">CVE-2016-4692 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4692">CVE-2016-4692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4743/">CVE-2016-4743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4743">CVE-2016-4743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7586/">CVE-2016-7586 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7586">CVE-2016-7586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7587/">CVE-2016-7587 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7587">CVE-2016-7587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7589/">CVE-2016-7589 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7589">CVE-2016-7589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7592/">CVE-2016-7592 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7592">CVE-2016-7592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7598/">CVE-2016-7598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7598">CVE-2016-7598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7599/">CVE-2016-7599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7599">CVE-2016-7599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7610/">CVE-2016-7610 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7610">CVE-2016-7610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7623/">CVE-2016-7623 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7623">CVE-2016-7623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7632/">CVE-2016-7632 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7632">CVE-2016-7632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7635/">CVE-2016-7635 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7635">CVE-2016-7635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7639/">CVE-2016-7639 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7639">CVE-2016-7639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7641/">CVE-2016-7641 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7641">CVE-2016-7641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7645/">CVE-2016-7645 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7645">CVE-2016-7645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7652/">CVE-2016-7652 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7652">CVE-2016-7652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7654/">CVE-2016-7654 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7654">CVE-2016-7654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7656/">CVE-2016-7656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7656">CVE-2016-7656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13788/">CVE-2017-13788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13788">CVE-2017-13788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13798/">CVE-2017-13798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13798">CVE-2017-13798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-13803/">CVE-2017-13803 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13803">CVE-2017-13803 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13856/">CVE-2017-13856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13856">CVE-2017-13856 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13866/">CVE-2017-13866 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13866">CVE-2017-13866 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13870/">CVE-2017-13870 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13870">CVE-2017-13870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2350/">CVE-2017-2350 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2350">CVE-2017-2350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2354/">CVE-2017-2354 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2354">CVE-2017-2354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2355/">CVE-2017-2355 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2355">CVE-2017-2355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2356/">CVE-2017-2356 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2356">CVE-2017-2356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2362/">CVE-2017-2362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2362">CVE-2017-2362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2363/">CVE-2017-2363 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2363">CVE-2017-2363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2364/">CVE-2017-2364 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2364">CVE-2017-2364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2365/">CVE-2017-2365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2365">CVE-2017-2365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2366/">CVE-2017-2366 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2366">CVE-2017-2366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2369/">CVE-2017-2369 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2369">CVE-2017-2369 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2371/">CVE-2017-2371 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2371">CVE-2017-2371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2373/">CVE-2017-2373 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2373">CVE-2017-2373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2496/">CVE-2017-2496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2496">CVE-2017-2496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2510/">CVE-2017-2510 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2510">CVE-2017-2510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2539/">CVE-2017-2539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2539">CVE-2017-2539 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7006/">CVE-2017-7006 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7006">CVE-2017-7006 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7011/">CVE-2017-7011 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7011">CVE-2017-7011 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7012/">CVE-2017-7012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7012">CVE-2017-7012 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7018/">CVE-2017-7018 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7018">CVE-2017-7018 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7019/">CVE-2017-7019 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7019">CVE-2017-7019 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7020/">CVE-2017-7020 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7020">CVE-2017-7020 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7030/">CVE-2017-7030 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7030">CVE-2017-7030 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7034/">CVE-2017-7034 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7034">CVE-2017-7034 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7037/">CVE-2017-7037 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7037">CVE-2017-7037 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7038/">CVE-2017-7038 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7038">CVE-2017-7038 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7039/">CVE-2017-7039 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7039">CVE-2017-7039 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7040/">CVE-2017-7040 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7040">CVE-2017-7040 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7041/">CVE-2017-7041 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7041">CVE-2017-7041 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7042/">CVE-2017-7042 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7042">CVE-2017-7042 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7043/">CVE-2017-7043 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7043">CVE-2017-7043 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7046/">CVE-2017-7046 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7046">CVE-2017-7046 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7048/">CVE-2017-7048 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7048">CVE-2017-7048 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7049/">CVE-2017-7049 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7049">CVE-2017-7049 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7052/">CVE-2017-7052 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7052">CVE-2017-7052 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7055/">CVE-2017-7055 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7055">CVE-2017-7055 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7056/">CVE-2017-7056 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7056">CVE-2017-7056 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7059/">CVE-2017-7059 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7059">CVE-2017-7059 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7061/">CVE-2017-7061 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7061">CVE-2017-7061 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7064/">CVE-2017-7064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7064">CVE-2017-7064 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7081/">CVE-2017-7081 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7081">CVE-2017-7081 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7087/">CVE-2017-7087 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7087">CVE-2017-7087 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7089/">CVE-2017-7089 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7089">CVE-2017-7089 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7090/">CVE-2017-7090 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7090">CVE-2017-7090 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7091/">CVE-2017-7091 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7091">CVE-2017-7091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7092/">CVE-2017-7092 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7092">CVE-2017-7092 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7093/">CVE-2017-7093 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7093">CVE-2017-7093 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7094/">CVE-2017-7094 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7094">CVE-2017-7094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7095/">CVE-2017-7095 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7095">CVE-2017-7095 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7096/">CVE-2017-7096 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7096">CVE-2017-7096 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7098/">CVE-2017-7098 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7098">CVE-2017-7098 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7099/">CVE-2017-7099 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7099">CVE-2017-7099 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7100/">CVE-2017-7100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7100">CVE-2017-7100 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7102/">CVE-2017-7102 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7102">CVE-2017-7102 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7104/">CVE-2017-7104 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7104">CVE-2017-7104 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7107/">CVE-2017-7107 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7107">CVE-2017-7107 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7109/">CVE-2017-7109 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7109">CVE-2017-7109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7111/">CVE-2017-7111 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7111">CVE-2017-7111 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7117/">CVE-2017-7117 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7117">CVE-2017-7117 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7120/">CVE-2017-7120 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7120">CVE-2017-7120 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7142/">CVE-2017-7142 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7142">CVE-2017-7142 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7156/">CVE-2017-7156 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7156">CVE-2017-7156 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7157/">CVE-2017-7157 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7157">CVE-2017-7157 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149513" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1069257" ref_url="https://bugzilla.suse.com/1069257" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16899" ref_url="https://www.suse.com/security/cve/CVE-2017-16899/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003635.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Security issue fixed:

- CVE-2017-16899: Fix array index error in the fig2dev program (bsc#1069257).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069257">SUSE bug 1069257</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16899/">CVE-2017-16899 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16899">CVE-2017-16899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550456" comment="transfig-3.2.5e-2.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149514" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1074014" ref_url="https://bugzilla.suse.com/1074014" source="BUGZILLA"/>
		<reference ref_id="1076861" ref_url="https://bugzilla.suse.com/1076861" source="BUGZILLA"/>
		<reference ref_id="1079150" ref_url="https://bugzilla.suse.com/1079150" source="BUGZILLA"/>
		<reference ref_id="1087416" ref_url="https://bugzilla.suse.com/1087416" source="BUGZILLA"/>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="1094325" ref_url="https://bugzilla.suse.com/1094325" source="BUGZILLA"/>
		<reference ref_id="1094480" ref_url="https://bugzilla.suse.com/1094480" source="BUGZILLA"/>
		<reference ref_id="1094725" ref_url="https://bugzilla.suse.com/1094725" source="BUGZILLA"/>
		<reference ref_id="1095556" ref_url="https://bugzilla.suse.com/1095556" source="BUGZILLA"/>
		<reference ref_id="959329" ref_url="https://bugzilla.suse.com/959329" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004404.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issue fixed:

- CVE-2018-3639: Add support for 'ssbd' and 'virt-ssbd' CPUID feature bits to address V4 Speculative Store Bypass aka 'Memory Disambiguation' (bsc#1092885).

Bug fixes:

- bsc#1094325: Enable virsh blockresize for XEN guests (FATE#325467).
- bsc#1095556: Fix qemu VM creating with --boot uefi due to missing AppArmor profile.
- bsc#1094725: Fix `virsh blockresize` to work with Xen qdisks.
- bsc#1094480: Fix `virsh list` to list domains with `xl list`.
- bsc#1087416: Fix missing video device within guest with default installation by virt-mamanger.
- bsc#1079150: Fix libvirt-guests start dependency.
- bsc#1076861: Fix locking of lockspace resource '/devcfs/disks/uatidmsvn1-xvda'.
- bsc#1074014: Fix KVM live migration when shutting down cluster node.
- bsc#959329: Fix wrong state of VMs in virtual manager.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-10"/>
	<updated date="2018-08-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074014">SUSE bug 1074014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076861">SUSE bug 1076861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079150">SUSE bug 1079150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087416">SUSE bug 1087416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094325">SUSE bug 1094325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094480">SUSE bug 1094480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094725">SUSE bug 1094725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095556">SUSE bug 1095556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959329">SUSE bug 959329</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552998" comment="libvirt-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552999" comment="libvirt-admin-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553000" comment="libvirt-client-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553001" comment="libvirt-daemon-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553002" comment="libvirt-daemon-config-network-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553003" comment="libvirt-daemon-config-nwfilter-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553004" comment="libvirt-daemon-driver-interface-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519887" comment="libvirt-daemon-driver-libxl-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553005" comment="libvirt-daemon-driver-lxc-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553006" comment="libvirt-daemon-driver-network-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553007" comment="libvirt-daemon-driver-nodedev-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553008" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553009" comment="libvirt-daemon-driver-qemu-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553010" comment="libvirt-daemon-driver-secret-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553011" comment="libvirt-daemon-driver-storage-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553012" comment="libvirt-daemon-driver-storage-core-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553013" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553014" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553015" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553016" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553017" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553018" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553019" comment="libvirt-daemon-hooks-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553020" comment="libvirt-daemon-lxc-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553021" comment="libvirt-daemon-qemu-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519904" comment="libvirt-daemon-xen-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553022" comment="libvirt-doc-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553023" comment="libvirt-libs-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553024" comment="libvirt-lock-sanlock-3.3.0-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553025" comment="libvirt-nss-3.3.0-5.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149515" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1067700" ref_url="https://bugzilla.suse.com/1067700" source="BUGZILLA"/>
		<reference ref_id="1068059" ref_url="https://bugzilla.suse.com/1068059" source="BUGZILLA"/>
		<reference ref_id="1087303" ref_url="https://bugzilla.suse.com/1087303" source="BUGZILLA"/>
		<reference ref_id="1103411" ref_url="https://bugzilla.suse.com/1103411" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004408.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

The following security vulnerability was fixed:

- CVE-2018-10858: Fixed insufficient input validation on client directory
  listing in libsmbclient; (bsc#1103411);

The following other change was made:

- s3: winbind: Fix 'winbind normalize names' in wb_getpwsid();
- winbind: honor 'winbind use default domain' with empty domain (bsc#1087303)
- winbind: do not modify credentials in NTLM passthru (bsc#1068059)
- net: fix net ads keytab handling (bsc#1067700)
- fix vfs_ceph flock stub
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1067700">SUSE bug 1067700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068059">SUSE bug 1068059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087303">SUSE bug 1087303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10858">CVE-2018-10858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553026" comment="libdcerpc-binding0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553027" comment="libdcerpc-binding0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553028" comment="libdcerpc0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553029" comment="libdcerpc0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553030" comment="libndr-krb5pac0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553031" comment="libndr-krb5pac0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553032" comment="libndr-nbt0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553033" comment="libndr-nbt0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553034" comment="libndr-standard0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553035" comment="libndr-standard0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553036" comment="libndr0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553037" comment="libndr0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553038" comment="libnetapi0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553039" comment="libnetapi0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553040" comment="libsamba-credentials0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553041" comment="libsamba-credentials0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553042" comment="libsamba-errors0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553043" comment="libsamba-errors0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553044" comment="libsamba-hostconfig0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553045" comment="libsamba-hostconfig0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553046" comment="libsamba-passdb0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553047" comment="libsamba-passdb0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553048" comment="libsamba-util0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553049" comment="libsamba-util0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553050" comment="libsamdb0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553051" comment="libsamdb0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553052" comment="libsmbclient0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553053" comment="libsmbclient0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553054" comment="libsmbconf0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553055" comment="libsmbconf0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553056" comment="libsmbldap0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553057" comment="libsmbldap0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553058" comment="libtevent-util0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553059" comment="libtevent-util0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553060" comment="libwbclient0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553061" comment="libwbclient0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553062" comment="samba-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553063" comment="samba-client-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553064" comment="samba-client-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519946" comment="samba-doc-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553065" comment="samba-libs-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553066" comment="samba-libs-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553067" comment="samba-winbind-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553068" comment="samba-winbind-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149516" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1098998" ref_url="https://bugzilla.suse.com/1098998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12368" ref_url="https://www.suse.com/security/cve/CVE-2018-12368/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version ESR 52.9 fixes the following issues:

- CVE-2018-5188: Various memory safety bugs (bsc#1098998)
- CVE-2018-12368: No warning when opening executable SettingContent-ms files
- CVE-2018-12366: Invalid data handling during QCMS transformations
- CVE-2018-12365: Compromised IPC child process can list local filenames
- CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins
- CVE-2018-12363: Use-after-free when appending DOM nodes
- CVE-2018-12362: Integer overflow in SSSE3 scaler
- CVE-2018-12360: Use-after-free when using focus()
- CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture
- CVE-2018-12359: Buffer overflow using computed size of canvas element
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12359">CVE-2018-12359 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12360">CVE-2018-12360 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12362">CVE-2018-12362 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12363">CVE-2018-12363 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12364">CVE-2018-12364 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12365">CVE-2018-12365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12366">CVE-2018-12366 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12368/">CVE-2018-12368 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12368">CVE-2018-12368 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5156">CVE-2018-5156 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5188">CVE-2018-5188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553069" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553070" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149517" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1082858" ref_url="https://bugzilla.suse.com/1082858" source="BUGZILLA"/>
		<reference ref_id="1101410" ref_url="https://bugzilla.suse.com/1101410" source="BUGZILLA"/>
		<reference ref_id="1101412" ref_url="https://bugzilla.suse.com/1101412" source="BUGZILLA"/>
		<reference ref_id="1101654" ref_url="https://bugzilla.suse.com/1101654" source="BUGZILLA"/>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0360" ref_url="https://www.suse.com/security/cve/CVE-2018-0360/" source="CVE"/>
		<reference ref_id="CVE-2018-0361" ref_url="https://www.suse.com/security/cve/CVE-2018-0361/" source="CVE"/>
		<reference ref_id="CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085/" source="CVE"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004412.html" source="SUSE-SU"/>
		<description>
This update for clamav to version 0.100.1 fixes the following issues:
  
The following security vulnerabilities were addressed:
  
- CVE-2018-0360: HWP integer overflow, infinite loop vulnerability (bsc#1101410)
- CVE-2018-0361: PDF object length check, unreasonably long time to parse relatively small file (bsc#1101412)
- CVE-2018-1000085: Fixed a out-of-bounds heap read in XAR parser (bsc#1082858)
- CVE-2018-14679: Libmspack heap buffer over-read in CHM parser (bsc#1103040)
- Buffer over-read in unRAR code due to missing max value checks in table initialization
- PDF parser bugs

The following other changes were made:

- Disable YARA support for licensing reasons (bsc#1101654).
- Add HTTPS support for clamsubmit
- Fix for DNS resolution for users on IPv4-only machines where IPv6 is not
  available or is link-local only
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082858">SUSE bug 1082858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101410">SUSE bug 1101410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101412">SUSE bug 1101412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101654">SUSE bug 1101654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0360/">CVE-2018-0360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0360">CVE-2018-0360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0361/">CVE-2018-0361 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0361">CVE-2018-0361 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000085">CVE-2018-1000085 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14679">CVE-2018-14679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553071" comment="clamav-0.100.1-33.15.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149518" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1082653" ref_url="https://bugzilla.suse.com/1082653" source="BUGZILLA"/>
		<reference ref_id="1085042" ref_url="https://bugzilla.suse.com/1085042" source="BUGZILLA"/>
		<reference ref_id="1085536" ref_url="https://bugzilla.suse.com/1085536" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1090123" ref_url="https://bugzilla.suse.com/1090123" source="BUGZILLA"/>
		<reference ref_id="1090435" ref_url="https://bugzilla.suse.com/1090435" source="BUGZILLA"/>
		<reference ref_id="1092001" ref_url="https://bugzilla.suse.com/1092001" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1095643" ref_url="https://bugzilla.suse.com/1095643" source="BUGZILLA"/>
		<reference ref_id="1096978" ref_url="https://bugzilla.suse.com/1096978" source="BUGZILLA"/>
		<reference ref_id="1097771" ref_url="https://bugzilla.suse.com/1097771" source="BUGZILLA"/>
		<reference ref_id="1099858" ref_url="https://bugzilla.suse.com/1099858" source="BUGZILLA"/>
		<reference ref_id="1100132" ref_url="https://bugzilla.suse.com/1100132" source="BUGZILLA"/>
		<reference ref_id="1100930" ref_url="https://bugzilla.suse.com/1100930" source="BUGZILLA"/>
		<reference ref_id="1101658" ref_url="https://bugzilla.suse.com/1101658" source="BUGZILLA"/>
		<reference ref_id="1101789" ref_url="https://bugzilla.suse.com/1101789" source="BUGZILLA"/>
		<reference ref_id="1102188" ref_url="https://bugzilla.suse.com/1102188" source="BUGZILLA"/>
		<reference ref_id="1102197" ref_url="https://bugzilla.suse.com/1102197" source="BUGZILLA"/>
		<reference ref_id="1102203" ref_url="https://bugzilla.suse.com/1102203" source="BUGZILLA"/>
		<reference ref_id="1102205" ref_url="https://bugzilla.suse.com/1102205" source="BUGZILLA"/>
		<reference ref_id="1102207" ref_url="https://bugzilla.suse.com/1102207" source="BUGZILLA"/>
		<reference ref_id="1102211" ref_url="https://bugzilla.suse.com/1102211" source="BUGZILLA"/>
		<reference ref_id="1102214" ref_url="https://bugzilla.suse.com/1102214" source="BUGZILLA"/>
		<reference ref_id="1102215" ref_url="https://bugzilla.suse.com/1102215" source="BUGZILLA"/>
		<reference ref_id="1102340" ref_url="https://bugzilla.suse.com/1102340" source="BUGZILLA"/>
		<reference ref_id="1102394" ref_url="https://bugzilla.suse.com/1102394" source="BUGZILLA"/>
		<reference ref_id="1102683" ref_url="https://bugzilla.suse.com/1102683" source="BUGZILLA"/>
		<reference ref_id="1102851" ref_url="https://bugzilla.suse.com/1102851" source="BUGZILLA"/>
		<reference ref_id="1103119" ref_url="https://bugzilla.suse.com/1103119" source="BUGZILLA"/>
		<reference ref_id="1103580" ref_url="https://bugzilla.suse.com/1103580" source="BUGZILLA"/>
		<reference ref_id="1103745" ref_url="https://bugzilla.suse.com/1103745" source="BUGZILLA"/>
		<reference ref_id="1103884" ref_url="https://bugzilla.suse.com/1103884" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344/" source="CVE"/>
		<reference ref_id="CVE-2018-14734" ref_url="https://www.suse.com/security/cve/CVE-2018-14734/" source="CVE"/>
		<reference ref_id="CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004414.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.143 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-5390 aka 'SegmentSmack': Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).
- CVE-2018-14734: drivers/infiniband/core/ucma.c in the Linux kernel allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent-&gt;sigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bnc#1103580).
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).

The following non-security bugs were fixed:

- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)
- ahci: Disable LPM on Lenovo 50 series laptops with a too old BIOS (bnc#1012382).
- arm64: do not open code page table entry creation (bsc#1102197).
- arm64: kpti: Use early_param for kpti= command-line option (bsc#1102188).
- arm64: Make sure permission updates happen for pmd/pud (bsc#1102197).
- atm: zatm: Fix potential Spectre v1 (bnc#1012382).
- bcm63xx_enet: correct clock usage (bnc#1012382).
- bcm63xx_enet: do not write to random DMA channel on BCM6345 (bnc#1012382).
- blacklist 9fb8d5dc4b64 ('stop_machine: Disable preemption when waking two stopper threads') Preemption is already disabled inside cpu_stop_queue_two_works() in SLE12-SP3 because it does not have commit 6a19005157c4 ('stop_machine: Do not disable preemption in stop_two_cpus()')
- block: copy ioprio in __bio_clone_fast() (bsc#1082653).
- bpf: fix loading of BPF_MAXINSNS sized programs (bsc#1012382).
- bpf, x64: fix memleak when not converging after image (bsc#1012382).
- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).
- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).
- cachefiles: Wait rather than BUG'ing on 'Unexpected object collision' (bsc#1099858).
- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).
- compiler, clang: always inline when CONFIG_OPTIMIZE_INLINING is disabled (bnc#1012382).
- compiler, clang: properly override 'inline' for clang (bnc#1012382).
- compiler, clang: suppress warning for unused static inline functions (bnc#1012382).
- compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations (bnc#1012382).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak (bnc#1012382).
- crypto: crypto4xx - remove bad list_del (bnc#1012382).
- drm/msm: Fix possible null dereference on failure of get_pages() (bsc#1102394).
- drm: re-enable error handling (bsc#1103884).
- fscache: Allow cancelled operations to be enqueued (bsc#1099858).
- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).
- hid: usbhid: add quirk for innomedia INNEX GENESIS/ATARI adapter (bnc#1012382).
- ibmasm: do not write out of bounds in read handler (bnc#1012382).
- ibmvnic: Fix error recovery on login failure (bsc#1101789).
- iw_cxgb4: correctly enforce the max reg_mr depth (bnc#1012382).
- kabi protect includes in include/linux/inet.h (bsc#1095643).
- KABI protect net/core/utils.c includes (bsc#1095643).
- kABI: protect struct loop_device (kabi).
- kABI: reintroduce __static_cpu_has_safe (kabi).
- kbuild: fix # escaping in .cmd files for future Make (bnc#1012382).
- keys: DNS: fix parsing multiple options (bnc#1012382).
- kvm: arm/arm64: Drop resource size check for GICV window (bsc#1102215).
- kvm: arm/arm64: Set dist-&gt;spis to NULL after kfree (bsc#1102214).
- loop: add recursion validation to LOOP_CHANGE_FD (bnc#1012382).
- loop: remember whether sysfs_create_group() was done (bnc#1012382).
- mmc: dw_mmc: fix card threshold control configuration (bsc#1102203).
- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1097771).
- net: cxgb3_main: fix potential Spectre v1 (bnc#1012382).
- net: dccp: avoid crash in ccid3_hc_rx_send_feedback() (bnc#1012382).
- net: dccp: switch rx_tstamp_last_feedback to monotonic clock (bnc#1012382).
- netfilter: ebtables: reject non-bridge targets (bnc#1012382).
- netfilter: nf_queue: augment nfqa_cfg_policy (bnc#1012382).
- netfilter: x_tables: initialise match/target check parameter struct (bnc#1012382).
- net/mlx5: Fix command interface race in polling mode (bnc#1012382).
- net/mlx5: Fix incorrect raw command length parsing (bnc#1012382).
- net: mvneta: fix the Rx desc DMA address in the Rx path (bsc#1102207).
- net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL (bnc#1012382).
- net: off by one in inet6_pton() (bsc#1095643).
- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1102205).
- net_sched: blackhole: tell upper qdisc about dropped packets (bnc#1012382).
- net: sungem: fix rx checksum support (bnc#1012382).
- net/utils: generic inet_pton_with_scope helper (bsc#1095643).
- nvme-rdma: Check remotely invalidated rkey matches our expected rkey (bsc#1092001).
- nvme-rdma: default MR page size to 4k (bsc#1092001).
- nvme-rdma: do not complete requests before a send work request has completed (bsc#1092001).
- nvme-rdma: do not suppress send completions (bsc#1092001).
- nvme-rdma: Fix command completion race at error recovery (bsc#1090435).
- nvme-rdma: make nvme_rdma_[create|destroy]_queue_ib symmetrical (bsc#1092001).
- nvme-rdma: use inet_pton_with_scope helper (bsc#1095643).
- nvme-rdma: Use mr pool (bsc#1092001).
- nvme-rdma: wait for local invalidation before completing a request (bsc#1092001).
- ocfs2: subsystem.su_mutex is required while accessing the item-&gt;ci_parent (bnc#1012382).
- pci: ibmphp: Fix use-before-set in get_max_bus_speed() (bsc#1100132).
- perf tools: Move syscall number fallbacks from perf-sys.h to tools/arch/x86/include/asm/ (bnc#1012382).
- pm / hibernate: Fix oops at snapshot_write() (bnc#1012382).
- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244, bsc#1100930, bsc#1102683).
- qed: Limit msix vectors in kdump kernel to the minimum required count (bnc#1012382).
- r8152: napi hangup fix after disconnect (bnc#1012382).
- rdma/ucm: Mark UCM interface as BROKEN (bnc#1012382).
- rds: avoid unenecessary cong_update in loop transport (bnc#1012382).
- Revert 'sit: reload iphdr in ipip6_rcv' (bnc#1012382).
- Revert 'x86/cpufeature: Move some of the scattered feature bits to x86_capability' (kabi).
- Revert 'x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6' (kabi).
- rtlwifi: rtl8821ae: fix firmware is not ready to run (bnc#1012382).
- s390/qeth: fix error handling in adapter command callbacks (bnc#1103745, LTC#169699).
- sched/smt: Update sched_smt_present at runtime (bsc#1089343).
- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).
- smsc95xx: Configure pause time to 0xffff when tx flow control enabled (bsc#1085536).
- tcp: fix Fast Open key endianness (bnc#1012382).
- tcp: prevent bogus FRTO undos with non-SACK flows (bnc#1012382).
- tools build: fix # escaping in .cmd files for future Make (bnc#1012382).
- uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn() (bnc#1012382).
- usb: core: handle hub C_PORT_OVER_CURRENT condition (bsc#1100132).
- usb: quirks: add delay quirks for Corsair Strafe (bnc#1012382).
- usb: serial: ch341: fix type promotion bug in ch341_control_in() (bnc#1012382).
- usb: serial: cp210x: add another USB ID for Qivicon ZigBee stick (bnc#1012382).
- usb: serial: keyspan_pda: fix modem-status error handling (bnc#1012382).
- usb: serial: mos7840: fix status-register error handling (bnc#1012382).
- usb: yurex: fix out-of-bounds uaccess in read handler (bnc#1012382).
- vfio: platform: Fix reset module leak in error path (bsc#1102211).
- vhost_net: validate sock before trying to put its fd (bnc#1012382).
- vmw_balloon: fix inflation with batching (bnc#1012382).
- x86/alternatives: Add an auxilary section (bnc#1012382).
- x86/alternatives: Discard dynamic check after init (bnc#1012382).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/asm: Add _ASM_ARG* constants for argument registers to &lt;asm/asm.h&gt; (bnc#1012382).
- x86/boot: Simplify kernel load address alignment check (bnc#1012382).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpufeature: Add helper macro for mask check macros (bnc#1012382).
- x86/cpufeature: Carve out X86_FEATURE_* (bnc#1012382).
- x86/cpufeature: Get rid of the non-asm goto variant (bnc#1012382).
- x86/cpufeature: Make sure DISABLED/REQUIRED macros are updated (bnc#1012382).
- x86/cpufeature: Move some of the scattered feature bits to x86_capability (bnc#1012382).
- x86/cpufeature: Replace the old static_cpu_has() with safe variant (bnc#1012382).
- x86/cpufeature: Speed up cpu_feature_enabled() (bnc#1012382).
- x86/cpufeature: Update cpufeaure macros (bnc#1012382).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 (bnc#1012382).
- x86/cpu: Provide a config option to disable static_cpu_has (bnc#1012382).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/fpu: Add an XSTATE_OP() macro (bnc#1012382).
- x86/fpu: Get rid of xstate_fault() (bnc#1012382).
- x86/headers: Do not include asm/processor.h in asm/atomic.h (bnc#1012382).
- x86/mm/pkeys: Fix mismerge of protection keys CPUID bits (bnc#1012382).
- x86/mm: Simplify p[g4um]d_page() macros (1087081).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- x86/vdso: Use static_cpu_has() (bnc#1012382).
- xen/grant-table: log the lack of grants (bnc#1085042).
- xen-netfront: Fix mismatched rtnl_unlock (bnc#1101658).
- xen-netfront: Update features after registering netdev (bnc#1101658).
- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082653">SUSE bug 1082653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085042">SUSE bug 1085042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085536">SUSE bug 1085536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090123">SUSE bug 1090123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090435">SUSE bug 1090435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092001">SUSE bug 1092001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095643">SUSE bug 1095643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096978">SUSE bug 1096978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097771">SUSE bug 1097771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099858">SUSE bug 1099858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100132">SUSE bug 1100132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100930">SUSE bug 1100930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101658">SUSE bug 1101658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101789">SUSE bug 1101789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102188">SUSE bug 1102188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102197">SUSE bug 1102197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102203">SUSE bug 1102203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102205">SUSE bug 1102205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102207">SUSE bug 1102207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102211">SUSE bug 1102211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102214">SUSE bug 1102214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102215">SUSE bug 1102215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102340">SUSE bug 1102340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102394">SUSE bug 1102394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102683">SUSE bug 1102683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102851">SUSE bug 1102851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103119">SUSE bug 1103119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103580">SUSE bug 1103580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103745">SUSE bug 1103745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103884">SUSE bug 1103884</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18344">CVE-2017-18344 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14734/">CVE-2018-14734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14734">CVE-2018-14734 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3620">CVE-2018-3620 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5390">CVE-2018-5390 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553072" comment="dpdk-16.11.6-8.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553073" comment="dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553074" comment="dpdk-thunderx-16.11.6-8.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553075" comment="dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553076" comment="dpdk-tools-16.11.6-8.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553077" comment="kernel-default-4.4.143-94.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553078" comment="kernel-default-base-4.4.143-94.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553079" comment="kernel-default-devel-4.4.143-94.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553080" comment="kernel-default-man-4.4.143-94.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519957" comment="kernel-devel-4.4.143-94.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519958" comment="kernel-macros-4.4.143-94.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519959" comment="kernel-source-4.4.143-94.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553081" comment="kernel-syms-4.4.143-94.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553082" comment="lttng-modules-2.7.1-8.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553083" comment="lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149519" version="1" class="patch">
	<metadata>
		<title>Security update to ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1104134" ref_url="https://bugzilla.suse.com/1104134" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004416.html" source="SUSE-SU"/>
		<description>

ucode-intel was updated to the 20180807 release.

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and is
part of the mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646
(L1 Terminal fault).
(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)

 Processor             Identifier     Version       Products

 Model        Stepping F-MO-S/PI      Old-&gt;New

 ---- new platforms ----------------------------------------
 WSM-EP/WS    U1       6-2c-2/03           0000001f Xeon E/L/X56xx, W36xx
 NHM-EX       D0       6-2e-6/04           0000000d Xeon E/L/X65xx/75xx
 BXT          C0       6-5c-2/01           00000014 Atom T5500/5700
 APL          E0       6-5c-a/03           0000000c Atom x5-E39xx
 DVN          B0       6-5f-1/01           00000024 Atom C3xxx
 ---- updated platforms ------------------------------------
 NHM-EP/WS    D0       6-1a-5/03 00000019-&gt;0000001d Xeon E/L/X/W55xx
 NHM          B1       6-1e-5/13 00000007-&gt;0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx
 WSM          B1       6-25-2/12 0000000e-&gt;00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406
 WSM          K0       6-25-5/92 00000004-&gt;00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx
 SNB          D2       6-2a-7/12 0000002d-&gt;0000002e Core Gen2; Xeon E3
 WSM-EX       A2       6-2f-2/05 00000037-&gt;0000003b Xeon E7
 IVB          E2       6-3a-9/12 0000001f-&gt;00000020 Core Gen3 Mobile
 HSW-H/S/E3   Cx/Dx    6-3c-3/32 00000024-&gt;00000025 Core Gen4 Desktop; Xeon E3 v3
 BDW-U/Y      E/F      6-3d-4/c0 0000002a-&gt;0000002b Core Gen5 Mobile
 HSW-ULT      Cx/Dx    6-45-1/72 00000023-&gt;00000024 Core Gen4 Mobile and derived Pentium/Celeron
 HSW-H        Cx       6-46-1/32 00000019-&gt;0000001a Core Extreme i7-5xxxX
 BDW-H/E3     E/G      6-47-1/22 0000001d-&gt;0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4
 SKL-U/Y      D0       6-4e-3/c0 000000c2-&gt;000000c6 Core Gen6 Mobile
 BDX-DE       V1       6-56-2/10 00000015-&gt;00000017 Xeon D-1520/40
 BDX-DE       V2/3     6-56-3/10 07000012-&gt;07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
 BDX-DE       Y0       6-56-4/10 0f000011-&gt;0f000012 Xeon D-1557/59/67/71/77/81/87
 APL          D0       6-5c-9/03 0000002c-&gt;00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
 SKL-H/S/E3   R0       6-5e-3/36 000000c2-&gt;000000c6 Core Gen6; Xeon E3 v5
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-15"/>
	<updated date="2018-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104134">SUSE bug 1104134</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3640">CVE-2018-3640 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519961" comment="ucode-intel-20180807-13.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149520" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1101689" ref_url="https://bugzilla.suse.com/1101689" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1333" ref_url="https://www.suse.com/security/cve/CVE-2018-1333/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004420.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

The following security vulnerability were fixed:

- CVE-2018-1333: Fixed a worker exhaustion that could have lead to a denial
  of service via specially crafted HTTP/2 requests (bsc#1101689).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-15"/>
	<updated date="2018-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101689">SUSE bug 1101689</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1333/">CVE-2018-1333 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1333">CVE-2018-1333 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553084" comment="apache2-2.4.23-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553085" comment="apache2-doc-2.4.23-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553086" comment="apache2-example-pages-2.4.23-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553087" comment="apache2-prefork-2.4.23-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553088" comment="apache2-utils-2.4.23-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553089" comment="apache2-worker-2.4.23-29.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149521" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1023711" ref_url="https://bugzilla.suse.com/1023711" source="BUGZILLA"/>
		<reference ref_id="1064232" ref_url="https://bugzilla.suse.com/1064232" source="BUGZILLA"/>
		<reference ref_id="1076110" ref_url="https://bugzilla.suse.com/1076110" source="BUGZILLA"/>
		<reference ref_id="1078216" ref_url="https://bugzilla.suse.com/1078216" source="BUGZILLA"/>
		<reference ref_id="1082653" ref_url="https://bugzilla.suse.com/1082653" source="BUGZILLA"/>
		<reference ref_id="1082979" ref_url="https://bugzilla.suse.com/1082979" source="BUGZILLA"/>
		<reference ref_id="1085042" ref_url="https://bugzilla.suse.com/1085042" source="BUGZILLA"/>
		<reference ref_id="1085536" ref_url="https://bugzilla.suse.com/1085536" source="BUGZILLA"/>
		<reference ref_id="1085657" ref_url="https://bugzilla.suse.com/1085657" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1087659" ref_url="https://bugzilla.suse.com/1087659" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1089525" ref_url="https://bugzilla.suse.com/1089525" source="BUGZILLA"/>
		<reference ref_id="1090123" ref_url="https://bugzilla.suse.com/1090123" source="BUGZILLA"/>
		<reference ref_id="1090340" ref_url="https://bugzilla.suse.com/1090340" source="BUGZILLA"/>
		<reference ref_id="1090435" ref_url="https://bugzilla.suse.com/1090435" source="BUGZILLA"/>
		<reference ref_id="1090888" ref_url="https://bugzilla.suse.com/1090888" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1092001" ref_url="https://bugzilla.suse.com/1092001" source="BUGZILLA"/>
		<reference ref_id="1092207" ref_url="https://bugzilla.suse.com/1092207" source="BUGZILLA"/>
		<reference ref_id="1093777" ref_url="https://bugzilla.suse.com/1093777" source="BUGZILLA"/>
		<reference ref_id="1094120" ref_url="https://bugzilla.suse.com/1094120" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1095453" ref_url="https://bugzilla.suse.com/1095453" source="BUGZILLA"/>
		<reference ref_id="1095643" ref_url="https://bugzilla.suse.com/1095643" source="BUGZILLA"/>
		<reference ref_id="1096790" ref_url="https://bugzilla.suse.com/1096790" source="BUGZILLA"/>
		<reference ref_id="1096978" ref_url="https://bugzilla.suse.com/1096978" source="BUGZILLA"/>
		<reference ref_id="1097034" ref_url="https://bugzilla.suse.com/1097034" source="BUGZILLA"/>
		<reference ref_id="1097501" ref_url="https://bugzilla.suse.com/1097501" source="BUGZILLA"/>
		<reference ref_id="1097771" ref_url="https://bugzilla.suse.com/1097771" source="BUGZILLA"/>
		<reference ref_id="1098599" ref_url="https://bugzilla.suse.com/1098599" source="BUGZILLA"/>
		<reference ref_id="1099306" ref_url="https://bugzilla.suse.com/1099306" source="BUGZILLA"/>
		<reference ref_id="1099713" ref_url="https://bugzilla.suse.com/1099713" source="BUGZILLA"/>
		<reference ref_id="1099792" ref_url="https://bugzilla.suse.com/1099792" source="BUGZILLA"/>
		<reference ref_id="1099810" ref_url="https://bugzilla.suse.com/1099810" source="BUGZILLA"/>
		<reference ref_id="1099858" ref_url="https://bugzilla.suse.com/1099858" source="BUGZILLA"/>
		<reference ref_id="1099918" ref_url="https://bugzilla.suse.com/1099918" source="BUGZILLA"/>
		<reference ref_id="1099966" ref_url="https://bugzilla.suse.com/1099966" source="BUGZILLA"/>
		<reference ref_id="1099993" ref_url="https://bugzilla.suse.com/1099993" source="BUGZILLA"/>
		<reference ref_id="1100089" ref_url="https://bugzilla.suse.com/1100089" source="BUGZILLA"/>
		<reference ref_id="1100132" ref_url="https://bugzilla.suse.com/1100132" source="BUGZILLA"/>
		<reference ref_id="1100340" ref_url="https://bugzilla.suse.com/1100340" source="BUGZILLA"/>
		<reference ref_id="1100843" ref_url="https://bugzilla.suse.com/1100843" source="BUGZILLA"/>
		<reference ref_id="1100930" ref_url="https://bugzilla.suse.com/1100930" source="BUGZILLA"/>
		<reference ref_id="1101296" ref_url="https://bugzilla.suse.com/1101296" source="BUGZILLA"/>
		<reference ref_id="1101331" ref_url="https://bugzilla.suse.com/1101331" source="BUGZILLA"/>
		<reference ref_id="1101658" ref_url="https://bugzilla.suse.com/1101658" source="BUGZILLA"/>
		<reference ref_id="1101789" ref_url="https://bugzilla.suse.com/1101789" source="BUGZILLA"/>
		<reference ref_id="1102188" ref_url="https://bugzilla.suse.com/1102188" source="BUGZILLA"/>
		<reference ref_id="1102197" ref_url="https://bugzilla.suse.com/1102197" source="BUGZILLA"/>
		<reference ref_id="1102203" ref_url="https://bugzilla.suse.com/1102203" source="BUGZILLA"/>
		<reference ref_id="1102205" ref_url="https://bugzilla.suse.com/1102205" source="BUGZILLA"/>
		<reference ref_id="1102207" ref_url="https://bugzilla.suse.com/1102207" source="BUGZILLA"/>
		<reference ref_id="1102211" ref_url="https://bugzilla.suse.com/1102211" source="BUGZILLA"/>
		<reference ref_id="1102214" ref_url="https://bugzilla.suse.com/1102214" source="BUGZILLA"/>
		<reference ref_id="1102215" ref_url="https://bugzilla.suse.com/1102215" source="BUGZILLA"/>
		<reference ref_id="1102340" ref_url="https://bugzilla.suse.com/1102340" source="BUGZILLA"/>
		<reference ref_id="1102394" ref_url="https://bugzilla.suse.com/1102394" source="BUGZILLA"/>
		<reference ref_id="1102683" ref_url="https://bugzilla.suse.com/1102683" source="BUGZILLA"/>
		<reference ref_id="1102851" ref_url="https://bugzilla.suse.com/1102851" source="BUGZILLA"/>
		<reference ref_id="1103097" ref_url="https://bugzilla.suse.com/1103097" source="BUGZILLA"/>
		<reference ref_id="1103119" ref_url="https://bugzilla.suse.com/1103119" source="BUGZILLA"/>
		<reference ref_id="1103580" ref_url="https://bugzilla.suse.com/1103580" source="BUGZILLA"/>
		<reference ref_id="1103717" ref_url="https://bugzilla.suse.com/1103717" source="BUGZILLA"/>
		<reference ref_id="1103745" ref_url="https://bugzilla.suse.com/1103745" source="BUGZILLA"/>
		<reference ref_id="1103884" ref_url="https://bugzilla.suse.com/1103884" source="BUGZILLA"/>
		<reference ref_id="1104174" ref_url="https://bugzilla.suse.com/1104174" source="BUGZILLA"/>
		<reference ref_id="997935" ref_url="https://bugzilla.suse.com/997935" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344/" source="CVE"/>
		<reference ref_id="CVE-2018-14734" ref_url="https://www.suse.com/security/cve/CVE-2018-14734/" source="CVE"/>
		<reference ref_id="CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004449.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 Azure kernel was updated to 4.4.143 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on 
the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-5391: A flaw in the IP packet reassembly could be used by remote attackers to consume CPU time (bnc#1103097).
- CVE-2018-5390: Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).
- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent-&gt;sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 1103580).

The following non-security bugs were fixed:

- 1wire: family module autoload fails because of upper/lower case mismatch (bnc#1012382).
- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)
- ahci: Disable LPM on Lenovo 50 series laptops with a too old BIOS (bnc#1012382).
- alsa: hda - Fix pincfg at resume on Lenovo T470 dock (bsc#1099810).
- alsa: hda - Handle kzalloc() failure in snd_hda_attach_pcm_stream() (bnc#1012382).
- alsa: hda/realtek - set PINCFG_HEADSET_MIC to parse_flags (bsc#1099810).
- arm64: do not open code page table entry creation (bsc#1102197).
- arm64: kpti: Use early_param for kpti= command-line option (bsc#1102188).
- arm64: Make sure permission updates happen for pmd/pud (bsc#1102197).
- arm: 8764/1: kgdb: fix NUMREGBYTES so that gdb_regs[] is the correct size (bnc#1012382).
- arm: dts: imx6q: Use correct SDMA script for SPI5 core (bnc#1012382).
- ASoC: cirrus: i2s: Fix LRCLK configuration (bnc#1012382).
- ASoC: cirrus: i2s: Fix {TX|RX}LinCtrlData setup (bnc#1012382).
- ASoC: dapm: delete dapm_kcontrol_data paths list before freeing it (bnc#1012382).
- ath10k: fix rfc1042 header retrieval in QCA4019 with eth decap mode (bnc#1012382).
- atm: zatm: fix memcmp casting (bnc#1012382).
- atm: zatm: Fix potential Spectre v1 (bnc#1012382).
- backlight: as3711_bl: Fix Device Tree node lookup (bnc#1012382).
- backlight: max8925_bl: Fix Device Tree node lookup (bnc#1012382).
- backlight: tps65217_bl: Fix Device Tree node lookup (bnc#1012382).
- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).
- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).
- bcache: add io_disable to struct cached_dev (bsc#1064232).
- bcache: add journal statistic (bsc#1076110).
- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).
- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).
- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).
- bcache: Annotate switch fall-through (bsc#1064232).
- bcache: closures: move control bits one bit right (bsc#1076110).
- bcache: correct flash only vols (check all uuids) (bsc#1064232).
- bcache: count backing device I/O error for writeback I/O (bsc#1064232).
- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).
- bcache: fix cached_dev-&gt;count usage for bch_cache_set_error() (bsc#1064232).
- bcache: fix crashes in duplicate cache device register (bsc#1076110).
- bcache: fix error return value in memory shrink (bsc#1064232).
- bcache: fix high CPU occupancy during journal (bsc#1076110).
- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).
- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).
- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).
- bcache: Fix indentation (bsc#1064232).
- bcache: Fix kernel-doc warnings (bsc#1064232).
- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).
- bcache: fix using of loop variable in memory shrink (bsc#1064232).
- bcache: fix writeback target calc on large devices (bsc#1076110).
- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).
- bcache: mark closure_sync() __sched (bsc#1076110).
- bcache: move closure debug file into debug directory (bsc#1064232).
- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).
- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).
- bcache: Remove an unused variable (bsc#1064232).
- bcache: ret IOERR when read meets metadata error (bsc#1076110).
- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).
- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).
- bcache: set dc-&gt;io_disable to true in conditional_stop_bcache_device() (bsc#1064232).
- bcache: set error_limit correctly (bsc#1064232).
- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).
- bcache: stop bcache device when backing device is offline (bsc#1064232).
- bcache: stop dc-&gt;writeback_rate_update properly (bsc#1064232).
- bcache: stop writeback thread after detaching (bsc#1076110).
- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).
- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).
- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).
- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).
- bcm63xx_enet: correct clock usage (bnc#1012382).
- bcm63xx_enet: do not write to random DMA channel on BCM6345 (bnc#1012382).
- blkcg: simplify statistic accumulation code (bsc#1082979).
- block: copy ioprio in __bio_clone_fast() (bsc#1082653).
- block: Fix transfer when chunk sectors exceeds max (bnc#1012382).
- block/swim: Fix array bounds check (bsc#1082979).
- bluetooth: Fix connection if directed advertising and privacy is used (bnc#1012382).
- bluetooth: hci_qca: Avoid missing rampatch failure with userspace fw loader (bnc#1012382).
- bonding: re-evaluate force_primary when the primary slave name changes (bnc#1012382).
- bpf: fix loading of BPF_MAXINSNS sized programs (bsc#1012382).
- bpf, x64: fix memleak when not converging after image (bsc#1012382).
- btrfs: fix clone vs chattr NODATASUM race (bnc#1012382).
- btrfs: fix unexpected cow in run_delalloc_nocow (bnc#1012382).
- btrfs: make raid6 rebuild retry more (bnc#1012382).
- btrfs: scrub: Do not use inode pages for device replace (bnc#1012382).
- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).
- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).
- cachefiles: Wait rather than BUG'ing on 'Unexpected object collision' (bsc#1099858).
- cdc_ncm: avoid padding beyond end of skb (bnc#1012382).
- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).
- cifs: Fix infinite loop when using hard mount option (bnc#1012382).
- compiler, clang: always inline when CONFIG_OPTIMIZE_INLINING is disabled (bnc#1012382).
- compiler, clang: properly override 'inline' for clang (bnc#1012382).
- compiler, clang: suppress warning for unused static inline functions (bnc#1012382).
- compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations (bnc#1012382).
- CONFIG_HOTPLUG_SMT=y
- cpufreq: Fix new policy initialization during limits updates via sysfs (bnc#1012382).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- cpuidle: powernv: Fix promotion from snooze if next state disabled (bnc#1012382).
- crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak (bnc#1012382).
- crypto: crypto4xx - remove bad list_del (bnc#1012382).
- dm: convert DM printk macros to pr_&lt;level&gt; macros (bsc#1099918).
- dm: fix printk() rate limiting code (bsc#1099918).
- dm thin: handle running out of data space vs concurrent discard (bnc#1012382).
- dm thin metadata: remove needless work from __commit_transaction (bsc#1082979).
- drbd: fix access after free (bnc#1012382).
- driver core: Do not ignore class_dir_create_and_add() failure (bnc#1012382).
- drm/msm: Fix possible null dereference on failure of get_pages() (bsc#1102394).
- drm: re-enable error handling (bsc#1103884).
- esp6: fix memleak on error path in esp6_input (git-fixes).
- ext4: add more inode number paranoia checks (bnc#1012382).
- ext4: add more mount time checks of the superblock (bnc#1012382).
- ext4: always check block group bounds in ext4_init_block_bitmap() (bnc#1012382).
- ext4: check superblock mapped prior to committing (bnc#1012382).
- ext4: clear i_data in ext4_inode_info when removing inline data (bnc#1012382).
- ext4: fix fencepost error in check for inode count overflow during resize (bnc#1012382).
- ext4: include the illegal physical block in the bad map ext4_error msg (bnc#1012382).
- ext4: make sure bitmaps and the inode table do not overlap with bg descriptors (bnc#1012382).
- ext4: only look at the bg_flags field if it is valid (bnc#1012382).
- ext4: update mtime in ext4_punch_hole even if no blocks are released (bnc#1012382).
- ext4: verify the depth of extent tree in ext4_find_extent() (bnc#1012382).
- fscache: Allow cancelled operations to be enqueued (bsc#1099858).
- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).
- fuse: atomic_o_trunc should truncate pagecache (bnc#1012382).
- fuse: do not keep dead fuse_conn at fuse_fill_super() (bnc#1012382).
- fuse: fix control dir setup and teardown (bnc#1012382).
- genirq: Make force irq threading setup more robust (bsc#1082979).
- hid: debug: check length before copy_to_user() (bnc#1012382).
- hid: hiddev: fix potential Spectre v1 (bnc#1012382).
- hid: i2c-hid: Fix 'incomplete report' noise (bnc#1012382).
- hid: usbhid: add quirk for innomedia INNEX GENESIS/ATARI adapter (bnc#1012382).
- i2c: rcar: fix resume by always initializing registers before transfer (bnc#1012382).
- ib/isert: fix T10-pi check mask setting (bsc#1082979).
- ibmasm: do not write out of bounds in read handler (bnc#1012382).
- ibmvnic: Fix error recovery on login failure (bsc#1101789).
- ibmvnic: Remove code to request error information (bsc#1104174).
- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).
- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).
- ib/qib: Fix DMA api warning with debug kernel (bnc#1012382).
- iio:buffer: make length types match kfifo types (bnc#1012382).
- input: elan_i2c - add ELAN0618 (Lenovo v330 15IKB) ACPI ID (bnc#1012382).
- input: elan_i2c_smbus - fix more potential stack buffer overflows (bnc#1012382).
- input: elantech - enable middle button of touchpads on ThinkPad P52 (bnc#1012382).
- input: elantech - fix V4 report decoding for module with middle key (bnc#1012382).
- iommu/vt-d: Fix race condition in add_unmap() (bsc#1096790, bsc#1097034).
- ipmi:bt: Set the timeout before doing a capabilities check (bnc#1012382).
- ipv4: Fix error return value in fib_convert_metrics() (bnc#1012382).
- ipvs: fix buffer overflow with sync daemon and service (bnc#1012382).
- iw_cxgb4: correctly enforce the max reg_mr depth (bnc#1012382).
- jbd2: do not mark block as modified if the handle is out of credits (bnc#1012382).
- kabi protect net/core/utils.c includes (bsc#1095643).
- kABI: protect struct loop_device (kabi).
- kABI: reintroduce __static_cpu_has_safe (kabi).
- kabi/severities: add 'drivers/md/bcache/* PASS' since no one uses symboles expoted by bcache.
- kbuild: fix # escaping in .cmd files for future Make (bnc#1012382).
- keys: DNS: fix parsing multiple options (bnc#1012382).
- kmod: fix wait on recursive loop (bsc#1099792).
- kmod: reduce atomic operations on kmod_concurrent and simplify (bsc#1099792).
- kmod: throttle kmod thread limit (bsc#1099792).
- kprobes/x86: Do not modify singlestep buffer while resuming (bnc#1012382).
- kvm: arm/arm64: Drop resource size check for GICV window (bsc#1102215).
- kvm: arm/arm64: Set dist-&gt;spis to NULL after kfree (bsc#1102214).
- libata: do not try to pass through NCQ commands to non-NCQ devices (bsc#1082979).
- libata: Drop SanDisk SD7UB3Q*G1001 NOLPM quirk (bnc#1012382).
- libata: zpodd: make arrays cdb static, reduces object code size (bnc#1012382).
- libata: zpodd: small read overflow in eject_tray() (bnc#1012382).
- lib/vsprintf: Remove atomic-unsafe support for %pCr (bnc#1012382).
- linvdimm, pmem: Preserve read-only setting for pmem devices (bnc#1012382).
- loop: add recursion validation to LOOP_CHANGE_FD (bnc#1012382).
- loop: remember whether sysfs_create_group() was done (bnc#1012382).
- m68k/mm: Adjust VM area to be unmapped by gap size for __iounmap() (bnc#1012382).
- media: cx231xx: Add support for AverMedia DVD EZMaker 7 (bnc#1012382).
- media: cx25840: Use subdev host data for PLL override (bnc#1012382).
- media: dvb_frontend: fix locking issues at dvb_frontend_get_event() (bnc#1012382).
- media: smiapp: fix timeout checking in smiapp_read_nvm (bsc#1099918).
- media: v4l2-compat-ioctl32: prevent go past max size (bnc#1012382).
- mfd: intel-lpss: Program REMAP register in PIO mode (bnc#1012382).
- mips: ftrace: fix static function graph tracing (bnc#1012382).
- mmc: dw_mmc: fix card threshold control configuration (bsc#1102203).
- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1097771).
- mm: hugetlb: yield when prepping struct pages (bnc#1012382).
- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bnc#1012382).
- mtd: cfi_cmdset_0002: Change definition naming to retry write operation (bnc#1012382).
- mtd: cfi_cmdset_0002: Change erase functions to check chip good only (bnc#1012382).
- mtd: cfi_cmdset_0002: Change erase functions to retry for error (bnc#1012382).
- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bnc#1012382).
- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bnc#1012382).
- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bnc#1012382).
- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bnc#1012382).
- mtd: cmdlinepart: Update comment for introduction of OFFSET_CONTINUOUS (bsc#1099918).
- mtd: partitions: add helper for deleting partition (bsc#1099918).
- mtd: partitions: remove sysfs files when deleting all master's partitions (bsc#1099918).
- mtd: rawnand: mxc: set spare area size register explicitly (bnc#1012382).
- net: cxgb3_main: fix potential Spectre v1 (bnc#1012382).
- net: dccp: avoid crash in ccid3_hc_rx_send_feedback() (bnc#1012382).
- net: dccp: switch rx_tstamp_last_feedback to monotonic clock (bnc#1012382).
- netfilter: ebtables: handle string from userspace with care (bnc#1012382).
- netfilter: ebtables: reject non-bridge targets (bnc#1012382).
- netfilter: nf_log: do not hold nf_log_mutex during user access (bnc#1012382).
- netfilter: nf_queue: augment nfqa_cfg_policy (bnc#1012382).
- netfilter: nf_tables: use WARN_ON_ONCE instead of BUG_ON in nft_do_chain() (bnc#1012382).
- netfilter: x_tables: initialise match/target check parameter struct (bnc#1012382).
- net/mlx5: Fix command interface race in polling mode (bnc#1012382).
- net/mlx5: Fix incorrect raw command length parsing (bnc#1012382).
- net: mvneta: fix the Rx desc DMA address in the Rx path (bsc#1102207).
- net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL (bnc#1012382).
- net: off by one in inet6_pton() (bsc#1095643).
- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1102205).
- net: qmi_wwan: Add Netgear Aircard 779S (bnc#1012382).
- net_sched: blackhole: tell upper qdisc about dropped packets (bnc#1012382).
- net/sonic: Use dma_mapping_error() (bnc#1012382).
- net: sungem: fix rx checksum support (bnc#1012382).
- net/utils: generic inet_pton_with_scope helper (bsc#1095643).
- nfsd: restrict rd_maxcount to svc_max_payload in nfsd_encode_readdir (bnc#1012382).
- NFSv4: Fix possible 1-byte stack overflow in nfs_idmap_read_and_verify_message (bnc#1012382).
- n_tty: Access echo_* variables carefully (bnc#1012382).
- n_tty: Fix stall at n_tty_receive_char_special() (bnc#1012382).
- null_blk: use sector_div instead of do_div (bsc#1082979).
- nvme-pci: initialize queue memory before interrupts (bnc#1012382).
- nvme-rdma: Check remotely invalidated rkey matches our expected rkey (bsc#1092001).
- nvme-rdma: default MR page size to 4k (bsc#1092001).
- nvme-rdma: do not complete requests before a send work request has completed (bsc#1092001).
- nvme-rdma: do not suppress send completions (bsc#1092001).
- nvme-rdma: Fix command completion race at error recovery (bsc#1090435).
- nvme-rdma: make nvme_rdma_[create|destroy]_queue_ib symmetrical (bsc#1092001).
- nvme-rdma: use inet_pton_with_scope helper (bsc#1095643).
- nvme-rdma: Use mr pool (bsc#1092001).
- nvme-rdma: wait for local invalidation before completing a request (bsc#1092001).
- ocfs2: subsystem.su_mutex is required while accessing the item-&gt;ci_parent (bnc#1012382).
- of: unittest: for strings, account for trailing \0 in property length field (bnc#1012382).
- ovl: fix random return value on mount (bsc#1099993).
- ovl: fix uid/gid when creating over whiteout (bsc#1099993).
- ovl: override creds with the ones from the superblock mounter (bsc#1099993).
- pci: ibmphp: Fix use-before-set in get_max_bus_speed() (bsc#1100132).
- pci: pciehp: Clear Presence Detect and Data Link Layer Status Changed on resume (bnc#1012382).
- perf intel-pt: Fix decoding to accept CBR between FUP and corresponding TIP (bnc#1012382).
- perf intel-pt: Fix MTC timing after overflow (bnc#1012382).
- perf intel-pt: Fix packet decoding of CYC packets (bnc#1012382).
- perf intel-pt: Fix sync_switch INTEL_PT_SS_NOT_TRACING (bnc#1012382).
- perf intel-pt: Fix 'Unexpected indirect branch' error (bnc#1012382).
- perf tools: Fix symbol and object code resolution for vdso32 and vdsox32 (bnc#1012382).
- perf tools: Move syscall number fallbacks from perf-sys.h to tools/arch/x86/include/asm/ (bnc#1012382).
- PM / hibernate: Fix oops at snapshot_write() (bnc#1012382).
- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244, bsc#1100930, bsc#1102683).
- powerpc/64s: Exception macro for stack frame and initial register save (bsc#1094244).
- powerpc/64s: Fix mce accounting for powernv (bsc#1094244).
- powerpc/fadump: Unregister fadump on kexec down path (bnc#1012382).
- powerpc: Machine check interrupt is a non-maskable interrupt (bsc#1094244).
- powerpc/mm/hash: Add missing isync prior to kernel stack SLB switch (bnc#1012382).
- powerpc/ptrace: Fix enforcement of DAWR constraints (bnc#1012382).
- powerpc/ptrace: Fix setting 512B aligned breakpoints with PTRACE_SET_DEBUGREG (bnc#1012382).
- qed: Limit msix vectors in kdump kernel to the minimum required count (bnc#1012382).
- qla2xxx: Fix inconsistent DMA mem alloc/free (bsc#1085657).
- qla2xxx: Fix kernel crash due to late workqueue allocation (bsc#1085657).
- qla2xxx: Fix NULL pointer derefrence for fcport search (bsc#1085657).
- r8152: napi hangup fix after disconnect (bnc#1012382).
- RDMA/mlx4: Discard unknown SQP work requests (bnc#1012382).
- RDMA/ocrdma: Fix an error code in ocrdma_alloc_pd() (bsc#1082979).
- RDMA/ocrdma: Fix error codes in ocrdma_create_srq() (bsc#1082979).
- RDMA/ucm: Mark UCM interface as BROKEN (bnc#1012382).
- rds: avoid unenecessary cong_update in loop transport (bnc#1012382).
- restore cond_resched() in shrink_dcache_parent() (bsc#1098599).
- Revert 'block-cancel-workqueue-entries-on-blk_mq_freeze_queue' (bsc#1103717
- Revert 'Btrfs: fix scrub to repair raid6 corruption' (bnc#1012382).
- Revert 'sit: reload iphdr in ipip6_rcv' (bnc#1012382).
- Revert 'x86/cpufeature: Move some of the scattered feature bits to x86_capability' (kabi).
- Revert 'x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6' (kabi).
- rmdir(),rename(): do shrink_dcache_parent() only on success (bsc#1100340).
- rpm/config.sh: Add support for non-default upstream URL Currently the scripts assume Linus' tree as the upstream URL where to pull things from. One may want to package test kernels from other upstream repos. Add support to add an URL to config.sh.
- rtlwifi: rtl8821ae: fix firmware is not ready to run (bnc#1012382).
- run_oldconfig.sh: Add --olddefconfig as an alias to --yes On later kernels there is the make target 'olddefconfig'. This is equvalent to what the '--yes' option does. Therefore, add the option '--olddefconfig' as an alias.
- s390: Correct register corruption in critical section cleanup (bnc#1012382).
- s390/qeth: fix error handling in adapter command callbacks (bnc#1103745, LTC#169699).
- sched/smt: Update sched_smt_present at runtime (bsc#1089343).
- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).
- scsi: lpfc: Change IO submit return to EBUSY if remote port is recovering (bsc#1092207).
- scsi: lpfc: correct oversubscription of nvme io requests for an adapter (bsc#1095453).
- scsi: lpfc: Driver NVME load fails when CPU cnt &gt; WQ resource cnt (bsc#1092207).
- scsi: lpfc: Fix 16gb hbas failing cq create (bsc#1089525).
- scsi: lpfc: Fix 16gb hbas failing cq create (bsc#1095453).
- scsi: lpfc: Fix crash in blk_mq layer when executing modprobe -r lpfc (bsc#1095453).
- scsi: lpfc: Fix MDS diagnostics failure (Rx &lt; Tx) (bsc#1095453).
- scsi: lpfc: Fix port initialization failure (bsc#1095453).
- scsi: lpfc: Fix up log messages and stats counters in IO submit code path (bsc#1092207).
- scsi: lpfc: Handle new link fault code returned by adapter firmware (bsc#1092207).
- scsi: lpfc: update driver version to 11.4.0.7-3 (bsc#1092207).
- scsi: lpfc: update driver version to 11.4.0.7-4 (bsc#1095453).
- scsi: qla2xxx: Fix setting lower transfer speed if GPSC fails (bnc#1012382).
- scsi: qla2xxx: Spinlock recursion in qla_target (bsc#1097501)
- scsi: qlogicpti: Fix an error handling path in 'qpti_sbus_probe()' (bsc#1082979).
- scsi: sg: fix minor memory leak in error path (bsc#1082979).
- scsi: sg: mitigate read/write abuse (bsc#1101296).
- scsi: target: fix crash with iscsi target and dvd (bsc#1082979).
- scsi: zfcp: fix misleading REC trigger trace where erp_action setup failed (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing REC trigger trace for all objects in ERP_FAILED (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing REC trigger trace on enqueue without ERP thread (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io early return (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io for ERP_FAILED (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing SCSI trace for result of eh_host_reset_handler (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing SCSI trace for retry of abort / scsi_eh TMF (LTC#168765 bnc#1012382 bnc#1099713).
- serial: sh-sci: Use spin_{try}lock_irqsave instead of open coding version (bnc#1012382).
- signal/xtensa: Consistenly use SIGBUS in do_unaligned_user (bnc#1012382).
- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).
- smsc95xx: Configure pause time to 0xffff when tx flow control enabled (bsc#1085536).
- spi: Fix scatterlist elements size in spi_map_buf (bnc#1012382).
- staging: android: ion: Return an ERR_PTR in ion_map_kernel (bnc#1012382).
- staging: comedi: quatech_daqp_cs: fix no-op loop daqp_ao_insn_write() (bnc#1012382).
- tcp: do not overshoot window_clamp in tcp_rcv_space_adjust() (bnc#1012382).
- tcp: fix Fast Open key endianness (bnc#1012382).
- tcp: prevent bogus FRTO undos with non-SACK flows (bnc#1012382).
- tcp: verify the checksum of the first data segment in a new connection (bnc#1012382).
- time: Make sure jiffies_to_msecs() preserves non-zero time periods (bnc#1012382).
- tracing: Fix missing return symbol in function_graph output (bnc#1012382).
- ubi: fastmap: Cancel work upon detach (bnc#1012382).
- ubi: fastmap: Correctly handle interrupted erasures in EBA (bnc#1012382).
- ubifs: Fix potential integer overflow in allocation (bnc#1012382).
- udf: Detect incorrect directory size (bnc#1012382).
- Update config files. CONFIG_X86_FAST_FEATURE_TESTS=y
- uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn() (bnc#1012382).
- usb: cdc_acm: Add quirk for Uniden UBC125 scanner (bnc#1012382).
- usb: core: handle hub C_PORT_OVER_CURRENT condition (bsc#1100132).
- usb: do not reset if a low-speed or full-speed device timed out (bnc#1012382).
- usb: musb: fix remote wakeup racing with suspend (bnc#1012382).
- usb: quirks: add delay quirks for Corsair Strafe (bnc#1012382).
- usb: serial: ch341: fix type promotion bug in ch341_control_in() (bnc#1012382).
- usb: serial: cp210x: add another USB ID for Qivicon ZigBee stick (bnc#1012382).
- usb: serial: cp210x: add CESINEL device ids (bnc#1012382).
- usb: serial: cp210x: add Silicon Labs IDs for Windows Update (bnc#1012382).
- usb: serial: keyspan_pda: fix modem-status error handling (bnc#1012382).
- usb: serial: mos7840: fix status-register error handling (bnc#1012382).
- usb: yurex: fix out-of-bounds uaccess in read handler (bnc#1012382).
- vfio: platform: Fix reset module leak in error path (bsc#1102211).
- vhost_net: validate sock before trying to put its fd (bnc#1012382).
- video/fbdev/stifb: Return -ENOMEM after a failed kzalloc() in stifb_init_fb() (bsc#1090888 bsc#1099966).
- video: uvesafb: Fix integer overflow in allocation (bnc#1012382).
- vmw_balloon: fix inflation with batching (bnc#1012382).
- w1: mxc_w1: Enable clock before calling clk_get_rate() on it (bnc#1012382).
- wait: add wait_event_killable_timeout() (bsc#1099792).
- watchdog: da9063: Fix setting/changing timeout (bsc#1100843).
- watchdog: da9063: Fix timeout handling during probe (bsc#1100843).
- watchdog: da9063: Fix updating timeout value (bsc#1100843).
- x86/alternatives: Add an auxilary section (bnc#1012382).
- x86/alternatives: Discard dynamic check after init (bnc#1012382).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/asm: Add _ASM_ARG* constants for argument registers to &lt;asm/asm.h&gt; (bnc#1012382).
- x86/boot: Simplify kernel load address alignment check (bnc#1012382).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpufeature: Add helper macro for mask check macros (bnc#1012382).
- x86/cpufeature: Carve out X86_FEATURE_* (bnc#1012382).
- x86/cpufeature: Get rid of the non-asm goto variant (bnc#1012382).
- x86/cpufeature: Make sure DISABLED/REQUIRED macros are updated (bnc#1012382).
- x86/cpufeature: Move some of the scattered feature bits to x86_capability (bnc#1012382).
- x86/cpufeature: Replace the old static_cpu_has() with safe variant (bnc#1012382).
- x86/cpufeature: Speed up cpu_feature_enabled() (bnc#1012382).
- x86/cpufeature: Update cpufeaure macros (bnc#1012382).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 (bnc#1012382).
- x86/cpu: Provide a config option to disable static_cpu_has (bnc#1012382).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/fpu: Add an XSTATE_OP() macro (bnc#1012382).
- x86/fpu: Get rid of xstate_fault() (bnc#1012382).
- x86/headers: Do not include asm/processor.h in asm/atomic.h (bnc#1012382).
- x86/mce: Fix incorrect 'Machine check from unknown source' message (bnc#1012382).
- x86/mm/pkeys: Fix mismerge of protection keys CPUID bits (bnc#1012382).
- x86/mm: Simplify p[g4um]d_page() macros (1087081).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- x86/vdso: Use static_cpu_has() (bnc#1012382).
- xen/grant-table: log the lack of grants (bnc#1085042).
- xen-netfront: Fix mismatched rtnl_unlock (bnc#1101658).
- xen-netfront: Update features after registering netdev (bnc#1101658).
- xen: Remove unnecessary BUG_ON from __unbind_from_irq() (bnc#1012382).
- xfrm6: avoid potential infinite loop in _decode_session6() (bnc#1012382).
- xfrm: Ignore socket policies when rebuilding hash tables (bnc#1012382).
- xfrm: skip policies marked as dead while rehashing (bnc#1012382).
- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023711">SUSE bug 1023711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064232">SUSE bug 1064232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076110">SUSE bug 1076110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078216">SUSE bug 1078216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082653">SUSE bug 1082653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082979">SUSE bug 1082979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085042">SUSE bug 1085042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085536">SUSE bug 1085536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085657">SUSE bug 1085657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087659">SUSE bug 1087659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089525">SUSE bug 1089525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090123">SUSE bug 1090123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090340">SUSE bug 1090340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090435">SUSE bug 1090435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090888">SUSE bug 1090888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092001">SUSE bug 1092001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092207">SUSE bug 1092207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093777">SUSE bug 1093777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094120">SUSE bug 1094120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095453">SUSE bug 1095453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095643">SUSE bug 1095643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096790">SUSE bug 1096790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096978">SUSE bug 1096978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097034">SUSE bug 1097034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097501">SUSE bug 1097501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097771">SUSE bug 1097771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098599">SUSE bug 1098599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099306">SUSE bug 1099306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099713">SUSE bug 1099713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099792">SUSE bug 1099792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099810">SUSE bug 1099810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099858">SUSE bug 1099858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099918">SUSE bug 1099918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099966">SUSE bug 1099966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099993">SUSE bug 1099993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100089">SUSE bug 1100089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100132">SUSE bug 1100132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100340">SUSE bug 1100340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100843">SUSE bug 1100843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100930">SUSE bug 1100930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101296">SUSE bug 1101296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101331">SUSE bug 1101331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101658">SUSE bug 1101658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101789">SUSE bug 1101789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102188">SUSE bug 1102188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102197">SUSE bug 1102197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102203">SUSE bug 1102203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102205">SUSE bug 1102205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102207">SUSE bug 1102207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102211">SUSE bug 1102211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102214">SUSE bug 1102214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102215">SUSE bug 1102215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102340">SUSE bug 1102340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102394">SUSE bug 1102394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102683">SUSE bug 1102683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102851">SUSE bug 1102851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103097">SUSE bug 1103097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103119">SUSE bug 1103119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103580">SUSE bug 1103580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103717">SUSE bug 1103717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103745">SUSE bug 1103745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103884">SUSE bug 1103884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104174">SUSE bug 1104174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997935">SUSE bug 997935</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18344">CVE-2017-18344 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14734/">CVE-2018-14734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14734">CVE-2018-14734 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3620">CVE-2018-3620 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5390">CVE-2018-5390 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5391">CVE-2018-5391 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553090" comment="kernel-azure-4.4.143-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553091" comment="kernel-azure-base-4.4.143-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553092" comment="kernel-azure-devel-4.4.143-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553093" comment="kernel-devel-azure-4.4.143-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553094" comment="kernel-source-azure-4.4.143-4.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149522" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1072947" ref_url="https://bugzilla.suse.com/1072947" source="BUGZILLA"/>
		<reference ref_id="1078662" ref_url="https://bugzilla.suse.com/1078662" source="BUGZILLA"/>
		<reference ref_id="1080740" ref_url="https://bugzilla.suse.com/1080740" source="BUGZILLA"/>
		<reference ref_id="1084300" ref_url="https://bugzilla.suse.com/1084300" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7738" ref_url="https://www.suse.com/security/cve/CVE-2018-7738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004898.html" source="SUSE-SU"/>
		<description>
This update for util-linux fixes the following issues:

This non-security issue was fixed:

- CVE-2018-7738: bash-completion/umount allowed local users to gain privileges
  by embedding shell commands in a mountpoint name, which was mishandled during a
  umount command by a different user (bsc#1084300).

These non-security issues were fixed:

- Fixed crash loop in lscpu (bsc#1072947).
- Fixed possible segfault of umount -a
- Fixed mount -a on NFS bind mounts (bsc#1080740).
- Fixed lsblk on NVMe (bsc#1078662).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-27"/>
	<updated date="2018-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1072947">SUSE bug 1072947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078662">SUSE bug 1078662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080740">SUSE bug 1080740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084300">SUSE bug 1084300</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7738/">CVE-2018-7738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7738">CVE-2018-7738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553095" comment="libblkid1-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553096" comment="libblkid1-32bit-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553097" comment="libfdisk1-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553098" comment="libmount1-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553099" comment="libmount1-32bit-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553100" comment="libsmartcols1-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553101" comment="libuuid1-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553102" comment="libuuid1-32bit-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553103" comment="python-libmount-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553104" comment="util-linux-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519973" comment="util-linux-lang-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553105" comment="util-linux-systemd-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553106" comment="uuidd-2.29.2-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149523" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Archive-Zip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1099497" ref_url="https://bugzilla.suse.com/1099497" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10860" ref_url="https://www.suse.com/security/cve/CVE-2018-10860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004453.html" source="SUSE-SU"/>
		<description>
This update for perl-Archive-Zip fixes the following security issue:

- CVE-2018-10860: Prevent directory traversal caused by not properly sanitizing
  paths while extracting zip files. An attacker able to provide a specially
  crafted archive for processing could have used this flaw to write or overwrite
  arbitrary files in the context of the perl interpreter (bsc#1099497)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099497">SUSE bug 1099497</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10860/">CVE-2018-10860 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10860">CVE-2018-10860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519976" comment="perl-Archive-Zip-1.34-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149524" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1103276" ref_url="https://bugzilla.suse.com/1103276" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004461.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following security issues:

- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
  and address translations may have allowed unauthorized disclosure of
  information residing in the L1 data cache to an attacker with local user access
  with guest OS privilege via a terminal page fault and a side-channel analysis
  (bsc#1091107, bsc#1027519).
- Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a malicious or
  buggy guest administrator can lock up the entire host (bsc#1103276)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103276">SUSE bug 1103276</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519977" comment="xen-4.9.2_10-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553107" comment="xen-doc-html-4.9.2_10-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519978" comment="xen-libs-4.9.2_10-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519979" comment="xen-libs-32bit-4.9.2_10-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553108" comment="xen-tools-4.9.2_10-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553109" comment="xen-tools-domU-4.9.2_10-3.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149525" version="1" class="patch">
	<metadata>
		<title>Security update for procps (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1092100" ref_url="https://bugzilla.suse.com/1092100" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<description>
This update for procps fixes the following security issues:

- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top
  with HOME unset in an attacker-controlled directory, the attacker could have
  achieved privilege escalation by exploiting one of several vulnerabilities in
  the config_file() function (bsc#1092100).
- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.
  Inbuilt protection in ps maped a guard page at the end of the overflowed
  buffer, ensuring that the impact of this flaw is limited to a crash (temporary
  denial of service) (bsc#1092100).
- CVE-2018-1124: Prevent multiple integer overflows leading to a heap
  corruption in file2strvec function. This allowed a privilege escalation for a
  local attacker who can create entries in procfs by starting processes, which
  could result in crashes or arbitrary code execution in proc utilities run by
  other users (bsc#1092100).
- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was
  mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent
  truncation/integer overflow issues (bsc#1092100).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-26"/>
	<updated date="2018-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1122">CVE-2018-1122 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1123">CVE-2018-1123 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1124">CVE-2018-1124 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1125">CVE-2018-1125 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1126">CVE-2018-1126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553110" comment="libprocps3-3.3.9-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553111" comment="procps-3.3.9-11.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149526" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1064455" ref_url="https://bugzilla.suse.com/1064455" source="BUGZILLA"/>
		<reference ref_id="1090766" ref_url="https://bugzilla.suse.com/1090766" source="BUGZILLA"/>
		<reference ref_id="1097410" ref_url="https://bugzilla.suse.com/1097410" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2452-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004883.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

The following security vulnerability was addressed:

- CVE-2018-0495: Mitigate a novel side-channel attack by enabling blinding for
  ECDSA signatures (bsc#1097410).

The following other issues were fixed:

- Extended the fipsdrv dsa-sign and dsa-verify commands with the
  --algo parameter for the FIPS testing of DSA SigVer and SigGen (bsc#1064455).
- Ensure libgcrypt20-hmac and libgcrypt20 are installed in the correct order. (bsc#1090766)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-23"/>
	<updated date="2018-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064455">SUSE bug 1064455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090766">SUSE bug 1090766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097410">SUSE bug 1097410</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0495">CVE-2018-0495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553112" comment="libgcrypt20-1.6.1-16.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553113" comment="libgcrypt20-32bit-1.6.1-16.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553114" comment="libgcrypt20-hmac-1.6.1-16.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553115" comment="libgcrypt20-hmac-32bit-1.6.1-16.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149527" version="1" class="patch">
	<metadata>
		<title>Security update for libcgroup (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1100365" ref_url="https://bugzilla.suse.com/1100365" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14348" ref_url="https://www.suse.com/security/cve/CVE-2018-14348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004482.html" source="SUSE-SU"/>
		<description>
This update for libcgroup fixes the following issues:

Security issue fixed:

- CVE-2018-14348: Fix daemon that creates /var/log/cgred with mode 0666 (bsc#1100365).

This updates also sets the permissions of already existing log files to proper values.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-21"/>
	<updated date="2018-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100365">SUSE bug 1100365</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14348/">CVE-2018-14348 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14348">CVE-2018-14348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553116" comment="libcgroup-tools-0.41.rc1-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553117" comment="libcgroup1-0.41.rc1-10.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149528" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1040662" ref_url="https://bugzilla.suse.com/1040662" source="BUGZILLA"/>
		<reference ref_id="1049423" ref_url="https://bugzilla.suse.com/1049423" source="BUGZILLA"/>
		<reference ref_id="1052448" ref_url="https://bugzilla.suse.com/1052448" source="BUGZILLA"/>
		<reference ref_id="1052449" ref_url="https://bugzilla.suse.com/1052449" source="BUGZILLA"/>
		<reference ref_id="1052466" ref_url="https://bugzilla.suse.com/1052466" source="BUGZILLA"/>
		<reference ref_id="1077732" ref_url="https://bugzilla.suse.com/1077732" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-12374" ref_url="https://www.suse.com/security/cve/CVE-2017-12374/" source="CVE"/>
		<reference ref_id="CVE-2017-12375" ref_url="https://www.suse.com/security/cve/CVE-2017-12375/" source="CVE"/>
		<reference ref_id="CVE-2017-12376" ref_url="https://www.suse.com/security/cve/CVE-2017-12376/" source="CVE"/>
		<reference ref_id="CVE-2017-12377" ref_url="https://www.suse.com/security/cve/CVE-2017-12377/" source="CVE"/>
		<reference ref_id="CVE-2017-12378" ref_url="https://www.suse.com/security/cve/CVE-2017-12378/" source="CVE"/>
		<reference ref_id="CVE-2017-12379" ref_url="https://www.suse.com/security/cve/CVE-2017-12379/" source="CVE"/>
		<reference ref_id="CVE-2017-12380" ref_url="https://www.suse.com/security/cve/CVE-2017-12380/" source="CVE"/>
		<reference ref_id="CVE-2017-6418" ref_url="https://www.suse.com/security/cve/CVE-2017-6418/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2017-6420" ref_url="https://www.suse.com/security/cve/CVE-2017-6420/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003655.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- Update to security release 0.99.3 (bsc#1077732)
  * CVE-2017-12376 (ClamAV Buffer Overflow in handle_pdfname Vulnerability)
  * CVE-2017-12377 (ClamAV Mew Packet Heap Overflow Vulnerability)
  * CVE-2017-12379 (ClamAV Buffer Overflow in messageAddArgument Vulnerability)
    - these vulnerabilities could have allowed an unauthenticated,
      remote attacker to cause a denial of service (DoS) condition
      or potentially execute arbitrary code on an affected device.
  * CVE-2017-12374 (ClamAV use-after-free Vulnerabilities)
  * CVE-2017-12375 (ClamAV Buffer Overflow Vulnerability)
  * CVE-2017-12378 (ClamAV Buffer Over Read Vulnerability)
  * CVE-2017-12380 (ClamAV Null Dereference Vulnerability)
    - these vulnerabilities could have allowed an unauthenticated,
      remote attacker to cause a denial of service (DoS) condition on an affected device.
  * CVE-2017-6420 (bsc#1052448)
    - this vulnerability could have allowed remote attackers to cause a denial of service
      (use-after-free) via a crafted PE file with WWPack compression.
  * CVE-2017-6419 (bsc#1052449)
    - ClamAV could have allowed remote attackers to cause a denial of service
      (heap-based buffer overflow and application crash) or possibly
      have unspecified other impact via a crafted CHM file.
  * CVE-2017-11423 (bsc#1049423)
    - ClamAV could have allowed remote attackers to cause a denial of service
      (stack-based buffer over-read and application crash) via a crafted CAB file.
  * CVE-2017-6418 (bsc#1052466)
    - ClamAV could have allowed remote attackers to cause a denial
      of service (out-of-bounds read) via a crafted e-mail message.
- update upstream keys in the keyring

- provide and obsolete clamav-nodb to trigger it's removal in Leap
  bsc#1040662
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-27"/>
	<updated date="2018-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052448">SUSE bug 1052448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052466">SUSE bug 1052466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11423">CVE-2017-11423 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12374/">CVE-2017-12374 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12374">CVE-2017-12374 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12375/">CVE-2017-12375 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12375">CVE-2017-12375 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12376/">CVE-2017-12376 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12376">CVE-2017-12376 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12377/">CVE-2017-12377 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12377">CVE-2017-12377 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12378/">CVE-2017-12378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12378">CVE-2017-12378 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12379/">CVE-2017-12379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12379">CVE-2017-12379 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12380/">CVE-2017-12380 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12380">CVE-2017-12380 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6418/">CVE-2017-6418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6418">CVE-2017-6418 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6419">CVE-2017-6419 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6420/">CVE-2017-6420 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6420">CVE-2017-6420 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550506" comment="clamav-0.99.3-33.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149529" version="1" class="patch">
	<metadata>
		<title>Security update for gdm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1103737" ref_url="https://bugzilla.suse.com/1103737" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14424" ref_url="https://www.suse.com/security/cve/CVE-2018-14424/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004498.html" source="SUSE-SU"/>
		<description>
This update for gdm fixes the following security issue:

- CVE-2018-14424: The daemon in GDM did not properly unexport display objects
  from its D-Bus interface when they are destroyed, which allowed a local
  attacker to trigger a use-after-free via a specially crafted sequence of D-Bus
  method calls, resulting in a denial of service or potential code execution
  (bsc#1103737).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-27"/>
	<updated date="2018-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103737">SUSE bug 1103737</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14424/">CVE-2018-14424 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14424">CVE-2018-14424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553118" comment="gdm-3.10.0.1-54.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520036" comment="gdm-lang-3.10.0.1-54.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520037" comment="gdmflexiserver-3.10.0.1-54.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553119" comment="libgdm1-3.10.0.1-54.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553120" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149530" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1076391" ref_url="https://bugzilla.suse.com/1076391" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003656.html" source="SUSE-SU"/>
		<description>
This update for gd fixes one issues.

This security issue was fixed:

- CVE-2018-5711: Prevent integer signedness error that could have lead to an
  infinite loop via a crafted GIF file allowing for DoS (bsc#1076391)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-29"/>
	<updated date="2018-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5711">CVE-2018-5711 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550511" comment="gd-2.1.0-24.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149531" version="1" class="patch">
	<metadata>
		<title>Recommended update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1042037" ref_url="https://bugzilla.suse.com/1042037" source="BUGZILLA"/>
		<reference ref_id="1045160" ref_url="https://bugzilla.suse.com/1045160" source="BUGZILLA"/>
		<reference ref_id="1048575" ref_url="https://bugzilla.suse.com/1048575" source="BUGZILLA"/>
		<reference ref_id="1057406" ref_url="https://bugzilla.suse.com/1057406" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7659" ref_url="https://www.suse.com/security/cve/CVE-2017-7659/" source="CVE"/>
		<reference ref_id="CVE-2017-9789" ref_url="https://www.suse.com/security/cve/CVE-2017-9789/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003657.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes several issues.

These security issues were fixed:

- CVE-2017-9789: When under stress (closing many connections) the HTTP/2
  handling code would sometimes access memory after it has been freed, resulting
  in potentially erratic behaviour (bsc#1048575).
- CVE-2017-7659: A maliciously constructed HTTP/2 request could cause mod_http2
  to dereference a NULL pointer and crash the server process (bsc#1045160).

These non-security issues were fixed:

- Use the full path to a2enmod and a2dismod in the apache-22-24-upgrade script (bsc#1042037)
- Fall back to 'localhost' as hostname in gensslcert (bsc#1057406)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-29"/>
	<updated date="2018-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042037">SUSE bug 1042037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045160">SUSE bug 1045160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048575">SUSE bug 1048575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057406">SUSE bug 1057406</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7659/">CVE-2017-7659 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7659">CVE-2017-7659 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9789/">CVE-2017-9789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9789">CVE-2017-9789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550512" comment="apache2-2.4.23-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533082" comment="apache2-doc-2.4.23-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550513" comment="apache2-example-pages-2.4.23-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550514" comment="apache2-prefork-2.4.23-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550515" comment="apache2-utils-2.4.23-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550516" comment="apache2-worker-2.4.23-29.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149532" version="1" class="patch">
	<metadata>
		<title>Security update for spice-gtk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1101295" ref_url="https://bugzilla.suse.com/1101295" source="BUGZILLA"/>
		<reference ref_id="1104448" ref_url="https://bugzilla.suse.com/1104448" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004527.html" source="SUSE-SU"/>
		<description>
This update for spice-gtk fixes the following issues:

Security issues fixed:

- CVE-2018-10873: Fix potential heap corruption when demarshalling (bsc#1104448)
- CVE-2018-10893: Avoid buffer overflow on image lz checks (bsc#1101295)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-03"/>
	<updated date="2018-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101295">SUSE bug 1101295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104448">SUSE bug 1104448</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10873">CVE-2018-10873 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10893">CVE-2018-10893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553121" comment="libspice-client-glib-2_0-8-0.33-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553122" comment="libspice-client-glib-helper-0.33-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553123" comment="libspice-client-gtk-3_0-5-0.33-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553124" comment="libspice-controller0-0.33-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553125" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541605" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149533" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1101295" ref_url="https://bugzilla.suse.com/1101295" source="BUGZILLA"/>
		<reference ref_id="1104448" ref_url="https://bugzilla.suse.com/1104448" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004528.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

Security issues fixed:

- CVE-2018-10873: Fix potential heap corruption when demarshalling (bsc#1104448)
- CVE-2018-10893: Avoid buffer overflow on image lz checks (bsc#1101295)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-03"/>
	<updated date="2018-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101295">SUSE bug 1101295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104448">SUSE bug 1104448</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10873">CVE-2018-10873 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10893">CVE-2018-10893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553126" comment="libspice-server1-0.12.8-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149534" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1082828" ref_url="https://bugzilla.suse.com/1082828" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15130" ref_url="https://www.suse.com/security/cve/CVE-2017-15130/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004536.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

Security issue fixed:

- CVE-2017-15130: Fixed a potential denial of service via TLS SNI config
  lookups, which would slow the process down and could have led to exhaustive
  memory allocation and/or process restarts (bsc#1082828)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-06"/>
	<updated date="2018-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082828">SUSE bug 1082828</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15130/">CVE-2017-15130 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15130">CVE-2017-15130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553127" comment="dovecot22-2.2.31-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553128" comment="dovecot22-backend-mysql-2.2.31-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553129" comment="dovecot22-backend-pgsql-2.2.31-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553130" comment="dovecot22-backend-sqlite-2.2.31-19.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149535" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1104668" ref_url="https://bugzilla.suse.com/1104668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12539" ref_url="https://www.suse.com/security/cve/CVE-2018-12539/" source="CVE"/>
		<reference ref_id="CVE-2018-1517" ref_url="https://www.suse.com/security/cve/CVE-2018-1517/" source="CVE"/>
		<reference ref_id="CVE-2018-1656" ref_url="https://www.suse.com/security/cve/CVE-2018-1656/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004541.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Security issues fixed:
  
- CVE-2018-1517: Fixed a flaw in the java.math component in IBM SDK, which may
  allow an attacker to inflict a denial-of-service attack with specially
  crafted String data.
- CVE-2018-1656: Protect against path traversal attacks when extracting
  compressed dump files.
- CVE-2018-2940: Fixed an easily exploitable vulnerability in the libraries
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to
  unauthorized read access.
- CVE-2018-2952: Fixed an easily exploitable vulnerability in the concurrency
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to denial of
  service.
- CVE-2018-2973: Fixed a difficult to exploit vulnerability in the JSSE
  subcomponent, which allowed unauthenticated attackers with network access
  via SSL/TLS to compromise the Java SE, leading to unauthorized creation,
  deletion or modification access to critical data.
- CVE-2018-12539: Fixed a vulnerability in which users other than the process
  owner may be able to use Java Attach API to connect to the IBM JVM on the
  same machine and use Attach API operations, including the ability to execute
  untrusted arbitrary code.

Other changes made:

- Various JIT/JVM crash fixes
- Version update to 7.1.4.30 (bsc#1104668)

You can find detailed information about this update [here](https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_August_2018).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-07"/>
	<updated date="2018-09-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104668">SUSE bug 1104668</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12539/">CVE-2018-12539 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12539">CVE-2018-12539 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1517/">CVE-2018-1517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1517">CVE-2018-1517 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1656/">CVE-2018-1656 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1656">CVE-2018-1656 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2940">CVE-2018-2940 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2952">CVE-2018-2952 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2973">CVE-2018-2973 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545756" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545757" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149536" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="1107030" ref_url="https://bugzilla.suse.com/1107030" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004556.html" source="SUSE-SU"/>
		<description>
This update for python3 provides the following fixes:

These security issues were fixed:

- CVE-2018-1061: Prevent catastrophic backtracking in the difflib.IS_LINE_JUNK
  method. An attacker could have used this flaw to cause denial of service
  (bsc#1088004).
- CVE-2018-1060: Prevent catastrophic backtracking in pop3lib's apop() method.
  An attacker could have used this flaw to cause denial of service (bsc#1088009).

These non-security issues were fixed:

- Sort files and directories when creating tarfile archives so that they are created in a
  more predictable way. (bsc#1086001)
- Add -fwrapv to OPTS (bsc#1107030)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-12"/>
	<updated date="2018-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107030">SUSE bug 1107030</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1060">CVE-2018-1060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1061">CVE-2018-1061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009527445" comment="libpython3_4m1_0-3.4.6-25.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009527446" comment="python3-3.4.6-25.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009527447" comment="python3-base-3.4.6-25.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553131" comment="python3-curses-3.4.6-25.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149537" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1067720" ref_url="https://bugzilla.suse.com/1067720" source="BUGZILLA"/>
		<reference ref_id="1093697" ref_url="https://bugzilla.suse.com/1093697" source="BUGZILLA"/>
		<reference ref_id="1095472" ref_url="https://bugzilla.suse.com/1095472" source="BUGZILLA"/>
		<reference ref_id="1102379" ref_url="https://bugzilla.suse.com/1102379" source="BUGZILLA"/>
		<reference ref_id="1102400" ref_url="https://bugzilla.suse.com/1102400" source="BUGZILLA"/>
		<reference ref_id="1102410" ref_url="https://bugzilla.suse.com/1102410" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1336" ref_url="https://www.suse.com/security/cve/CVE-2018-1336/" source="CVE"/>
		<reference ref_id="CVE-2018-8014" ref_url="https://www.suse.com/security/cve/CVE-2018-8014/" source="CVE"/>
		<reference ref_id="CVE-2018-8034" ref_url="https://www.suse.com/security/cve/CVE-2018-8034/" source="CVE"/>
		<reference ref_id="CVE-2018-8037" ref_url="https://www.suse.com/security/cve/CVE-2018-8037/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004557.html" source="SUSE-SU"/>
		<description>
This update for tomcat to 8.0.53 fixes the following issues:

Security issue fixed:

- CVE-2018-1336: An improper handing of overflow in the UTF-8 decoder with
  supplementary characters could have lead to an infinite loop in the decoder
  causing a Denial of Service (bsc#1102400).
- CVE-2018-8034: The host name verification when using TLS with the WebSocket
  client was missing. It is now enabled by default (bsc#1102379).
- CVE-2018-8037: If an async request was completed by the application at the
  same time as the container triggered the async timeout, a race condition
  existed that could have resulted in a user seeing a response intended for a
  different user. An additional issue was present in the NIO and NIO2 connectors
  that did not correctly track the closure of the connection when an async
  request was completed by the application and timed out by the container at the
  same time. This could also have resulted in a user seeing a response intended
  for another user (bsc#1102410).
- CVE-2018-8014: Fix insecure default CORS filter settings (bsc#1093697).

Bug fixes:

- bsc#1067720: Avoid overwriting of customer's configuration during update.
- bsc#1095472: Add Obsoletes for tomcat6 packages.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-13"/>
	<updated date="2018-09-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1067720">SUSE bug 1067720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093697">SUSE bug 1093697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095472">SUSE bug 1095472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102379">SUSE bug 1102379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102400">SUSE bug 1102400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102410">SUSE bug 1102410</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1336/">CVE-2018-1336 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1336">CVE-2018-1336 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8014/">CVE-2018-8014 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8014">CVE-2018-8014 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8034/">CVE-2018-8034 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8034">CVE-2018-8034 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-8037/">CVE-2018-8037 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8037">CVE-2018-8037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553132" comment="tomcat-8.0.53-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553133" comment="tomcat-admin-webapps-8.0.53-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553134" comment="tomcat-docs-webapp-8.0.53-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553135" comment="tomcat-el-3_0-api-8.0.53-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553136" comment="tomcat-javadoc-8.0.53-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553137" comment="tomcat-jsp-2_3-api-8.0.53-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553138" comment="tomcat-lib-8.0.53-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553139" comment="tomcat-servlet-3_1-api-8.0.53-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553140" comment="tomcat-webapps-8.0.53-29.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149538" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1089533" ref_url="https://bugzilla.suse.com/1089533" source="BUGZILLA"/>
		<reference ref_id="1106019" ref_url="https://bugzilla.suse.com/1106019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14618" ref_url="https://www.suse.com/security/cve/CVE-2018-14618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004561.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

This security issue was fixed:

- CVE-2018-14618: Prevent integer overflow in the NTLM authentication code (bsc#1106019)

This non-security issue was fixed:

- Fixed erroneous debug message when paired with OpenSSL (bsc#1089533)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-14"/>
	<updated date="2018-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089533">SUSE bug 1089533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106019">SUSE bug 1106019</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14618/">CVE-2018-14618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14618">CVE-2018-14618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553141" comment="curl-7.37.0-37.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553142" comment="libcurl4-7.37.0-37.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553143" comment="libcurl4-32bit-7.37.0-37.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149539" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1015342" ref_url="https://bugzilla.suse.com/1015342" source="BUGZILLA"/>
		<reference ref_id="1015343" ref_url="https://bugzilla.suse.com/1015343" source="BUGZILLA"/>
		<reference ref_id="1017967" ref_url="https://bugzilla.suse.com/1017967" source="BUGZILLA"/>
		<reference ref_id="1019695" ref_url="https://bugzilla.suse.com/1019695" source="BUGZILLA"/>
		<reference ref_id="1019699" ref_url="https://bugzilla.suse.com/1019699" source="BUGZILLA"/>
		<reference ref_id="1020412" ref_url="https://bugzilla.suse.com/1020412" source="BUGZILLA"/>
		<reference ref_id="1021121" ref_url="https://bugzilla.suse.com/1021121" source="BUGZILLA"/>
		<reference ref_id="1022604" ref_url="https://bugzilla.suse.com/1022604" source="BUGZILLA"/>
		<reference ref_id="1024361" ref_url="https://bugzilla.suse.com/1024361" source="BUGZILLA"/>
		<reference ref_id="1024365" ref_url="https://bugzilla.suse.com/1024365" source="BUGZILLA"/>
		<reference ref_id="1024376" ref_url="https://bugzilla.suse.com/1024376" source="BUGZILLA"/>
		<reference ref_id="1027968" ref_url="https://bugzilla.suse.com/1027968" source="BUGZILLA"/>
		<reference ref_id="1030552" ref_url="https://bugzilla.suse.com/1030552" source="BUGZILLA"/>
		<reference ref_id="1031492" ref_url="https://bugzilla.suse.com/1031492" source="BUGZILLA"/>
		<reference ref_id="1033962" ref_url="https://bugzilla.suse.com/1033962" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1048317" ref_url="https://bugzilla.suse.com/1048317" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1053685" ref_url="https://bugzilla.suse.com/1053685" source="BUGZILLA"/>
		<reference ref_id="1055014" ref_url="https://bugzilla.suse.com/1055014" source="BUGZILLA"/>
		<reference ref_id="1056596" ref_url="https://bugzilla.suse.com/1056596" source="BUGZILLA"/>
		<reference ref_id="1062604" ref_url="https://bugzilla.suse.com/1062604" source="BUGZILLA"/>
		<reference ref_id="1063646" ref_url="https://bugzilla.suse.com/1063646" source="BUGZILLA"/>
		<reference ref_id="1064232" ref_url="https://bugzilla.suse.com/1064232" source="BUGZILLA"/>
		<reference ref_id="1065364" ref_url="https://bugzilla.suse.com/1065364" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068075" ref_url="https://bugzilla.suse.com/1068075" source="BUGZILLA"/>
		<reference ref_id="1069138" ref_url="https://bugzilla.suse.com/1069138" source="BUGZILLA"/>
		<reference ref_id="1078921" ref_url="https://bugzilla.suse.com/1078921" source="BUGZILLA"/>
		<reference ref_id="1080157" ref_url="https://bugzilla.suse.com/1080157" source="BUGZILLA"/>
		<reference ref_id="1083663" ref_url="https://bugzilla.suse.com/1083663" source="BUGZILLA"/>
		<reference ref_id="1085042" ref_url="https://bugzilla.suse.com/1085042" source="BUGZILLA"/>
		<reference ref_id="1085536" ref_url="https://bugzilla.suse.com/1085536" source="BUGZILLA"/>
		<reference ref_id="1085539" ref_url="https://bugzilla.suse.com/1085539" source="BUGZILLA"/>
		<reference ref_id="1086457" ref_url="https://bugzilla.suse.com/1086457" source="BUGZILLA"/>
		<reference ref_id="1087092" ref_url="https://bugzilla.suse.com/1087092" source="BUGZILLA"/>
		<reference ref_id="1089066" ref_url="https://bugzilla.suse.com/1089066" source="BUGZILLA"/>
		<reference ref_id="1090888" ref_url="https://bugzilla.suse.com/1090888" source="BUGZILLA"/>
		<reference ref_id="1091171" ref_url="https://bugzilla.suse.com/1091171" source="BUGZILLA"/>
		<reference ref_id="1091860" ref_url="https://bugzilla.suse.com/1091860" source="BUGZILLA"/>
		<reference ref_id="1096254" ref_url="https://bugzilla.suse.com/1096254" source="BUGZILLA"/>
		<reference ref_id="1096748" ref_url="https://bugzilla.suse.com/1096748" source="BUGZILLA"/>
		<reference ref_id="1097105" ref_url="https://bugzilla.suse.com/1097105" source="BUGZILLA"/>
		<reference ref_id="1098253" ref_url="https://bugzilla.suse.com/1098253" source="BUGZILLA"/>
		<reference ref_id="1098822" ref_url="https://bugzilla.suse.com/1098822" source="BUGZILLA"/>
		<reference ref_id="1099597" ref_url="https://bugzilla.suse.com/1099597" source="BUGZILLA"/>
		<reference ref_id="1099810" ref_url="https://bugzilla.suse.com/1099810" source="BUGZILLA"/>
		<reference ref_id="1099811" ref_url="https://bugzilla.suse.com/1099811" source="BUGZILLA"/>
		<reference ref_id="1099813" ref_url="https://bugzilla.suse.com/1099813" source="BUGZILLA"/>
		<reference ref_id="1099832" ref_url="https://bugzilla.suse.com/1099832" source="BUGZILLA"/>
		<reference ref_id="1099844" ref_url="https://bugzilla.suse.com/1099844" source="BUGZILLA"/>
		<reference ref_id="1099845" ref_url="https://bugzilla.suse.com/1099845" source="BUGZILLA"/>
		<reference ref_id="1099846" ref_url="https://bugzilla.suse.com/1099846" source="BUGZILLA"/>
		<reference ref_id="1099849" ref_url="https://bugzilla.suse.com/1099849" source="BUGZILLA"/>
		<reference ref_id="1099863" ref_url="https://bugzilla.suse.com/1099863" source="BUGZILLA"/>
		<reference ref_id="1099864" ref_url="https://bugzilla.suse.com/1099864" source="BUGZILLA"/>
		<reference ref_id="1099922" ref_url="https://bugzilla.suse.com/1099922" source="BUGZILLA"/>
		<reference ref_id="1099999" ref_url="https://bugzilla.suse.com/1099999" source="BUGZILLA"/>
		<reference ref_id="1100000" ref_url="https://bugzilla.suse.com/1100000" source="BUGZILLA"/>
		<reference ref_id="1100001" ref_url="https://bugzilla.suse.com/1100001" source="BUGZILLA"/>
		<reference ref_id="1100132" ref_url="https://bugzilla.suse.com/1100132" source="BUGZILLA"/>
		<reference ref_id="1101822" ref_url="https://bugzilla.suse.com/1101822" source="BUGZILLA"/>
		<reference ref_id="1101841" ref_url="https://bugzilla.suse.com/1101841" source="BUGZILLA"/>
		<reference ref_id="1102346" ref_url="https://bugzilla.suse.com/1102346" source="BUGZILLA"/>
		<reference ref_id="1102486" ref_url="https://bugzilla.suse.com/1102486" source="BUGZILLA"/>
		<reference ref_id="1102517" ref_url="https://bugzilla.suse.com/1102517" source="BUGZILLA"/>
		<reference ref_id="1102715" ref_url="https://bugzilla.suse.com/1102715" source="BUGZILLA"/>
		<reference ref_id="1102797" ref_url="https://bugzilla.suse.com/1102797" source="BUGZILLA"/>
		<reference ref_id="1103269" ref_url="https://bugzilla.suse.com/1103269" source="BUGZILLA"/>
		<reference ref_id="1103445" ref_url="https://bugzilla.suse.com/1103445" source="BUGZILLA"/>
		<reference ref_id="1103717" ref_url="https://bugzilla.suse.com/1103717" source="BUGZILLA"/>
		<reference ref_id="1104319" ref_url="https://bugzilla.suse.com/1104319" source="BUGZILLA"/>
		<reference ref_id="1104485" ref_url="https://bugzilla.suse.com/1104485" source="BUGZILLA"/>
		<reference ref_id="1104494" ref_url="https://bugzilla.suse.com/1104494" source="BUGZILLA"/>
		<reference ref_id="1104495" ref_url="https://bugzilla.suse.com/1104495" source="BUGZILLA"/>
		<reference ref_id="1104683" ref_url="https://bugzilla.suse.com/1104683" source="BUGZILLA"/>
		<reference ref_id="1104897" ref_url="https://bugzilla.suse.com/1104897" source="BUGZILLA"/>
		<reference ref_id="1105271" ref_url="https://bugzilla.suse.com/1105271" source="BUGZILLA"/>
		<reference ref_id="1105292" ref_url="https://bugzilla.suse.com/1105292" source="BUGZILLA"/>
		<reference ref_id="1105322" ref_url="https://bugzilla.suse.com/1105322" source="BUGZILLA"/>
		<reference ref_id="1105323" ref_url="https://bugzilla.suse.com/1105323" source="BUGZILLA"/>
		<reference ref_id="1105392" ref_url="https://bugzilla.suse.com/1105392" source="BUGZILLA"/>
		<reference ref_id="1105396" ref_url="https://bugzilla.suse.com/1105396" source="BUGZILLA"/>
		<reference ref_id="1105524" ref_url="https://bugzilla.suse.com/1105524" source="BUGZILLA"/>
		<reference ref_id="1105536" ref_url="https://bugzilla.suse.com/1105536" source="BUGZILLA"/>
		<reference ref_id="1105769" ref_url="https://bugzilla.suse.com/1105769" source="BUGZILLA"/>
		<reference ref_id="1106016" ref_url="https://bugzilla.suse.com/1106016" source="BUGZILLA"/>
		<reference ref_id="1106105" ref_url="https://bugzilla.suse.com/1106105" source="BUGZILLA"/>
		<reference ref_id="1106185" ref_url="https://bugzilla.suse.com/1106185" source="BUGZILLA"/>
		<reference ref_id="1106229" ref_url="https://bugzilla.suse.com/1106229" source="BUGZILLA"/>
		<reference ref_id="1106271" ref_url="https://bugzilla.suse.com/1106271" source="BUGZILLA"/>
		<reference ref_id="1106275" ref_url="https://bugzilla.suse.com/1106275" source="BUGZILLA"/>
		<reference ref_id="1106276" ref_url="https://bugzilla.suse.com/1106276" source="BUGZILLA"/>
		<reference ref_id="1106278" ref_url="https://bugzilla.suse.com/1106278" source="BUGZILLA"/>
		<reference ref_id="1106281" ref_url="https://bugzilla.suse.com/1106281" source="BUGZILLA"/>
		<reference ref_id="1106283" ref_url="https://bugzilla.suse.com/1106283" source="BUGZILLA"/>
		<reference ref_id="1106369" ref_url="https://bugzilla.suse.com/1106369" source="BUGZILLA"/>
		<reference ref_id="1106509" ref_url="https://bugzilla.suse.com/1106509" source="BUGZILLA"/>
		<reference ref_id="1106511" ref_url="https://bugzilla.suse.com/1106511" source="BUGZILLA"/>
		<reference ref_id="1106697" ref_url="https://bugzilla.suse.com/1106697" source="BUGZILLA"/>
		<reference ref_id="1106929" ref_url="https://bugzilla.suse.com/1106929" source="BUGZILLA"/>
		<reference ref_id="1106934" ref_url="https://bugzilla.suse.com/1106934" source="BUGZILLA"/>
		<reference ref_id="1106995" ref_url="https://bugzilla.suse.com/1106995" source="BUGZILLA"/>
		<reference ref_id="1107060" ref_url="https://bugzilla.suse.com/1107060" source="BUGZILLA"/>
		<reference ref_id="1107078" ref_url="https://bugzilla.suse.com/1107078" source="BUGZILLA"/>
		<reference ref_id="1107319" ref_url="https://bugzilla.suse.com/1107319" source="BUGZILLA"/>
		<reference ref_id="1107320" ref_url="https://bugzilla.suse.com/1107320" source="BUGZILLA"/>
		<reference ref_id="1107689" ref_url="https://bugzilla.suse.com/1107689" source="BUGZILLA"/>
		<reference ref_id="1107735" ref_url="https://bugzilla.suse.com/1107735" source="BUGZILLA"/>
		<reference ref_id="1107966" ref_url="https://bugzilla.suse.com/1107966" source="BUGZILLA"/>
		<reference ref_id="963575" ref_url="https://bugzilla.suse.com/963575" source="BUGZILLA"/>
		<reference ref_id="966170" ref_url="https://bugzilla.suse.com/966170" source="BUGZILLA"/>
		<reference ref_id="966172" ref_url="https://bugzilla.suse.com/966172" source="BUGZILLA"/>
		<reference ref_id="969470" ref_url="https://bugzilla.suse.com/969470" source="BUGZILLA"/>
		<reference ref_id="969476" ref_url="https://bugzilla.suse.com/969476" source="BUGZILLA"/>
		<reference ref_id="969477" ref_url="https://bugzilla.suse.com/969477" source="BUGZILLA"/>
		<reference ref_id="970506" ref_url="https://bugzilla.suse.com/970506" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10876" ref_url="https://www.suse.com/security/cve/CVE-2018-10876/" source="CVE"/>
		<reference ref_id="CVE-2018-10877" ref_url="https://www.suse.com/security/cve/CVE-2018-10877/" source="CVE"/>
		<reference ref_id="CVE-2018-10878" ref_url="https://www.suse.com/security/cve/CVE-2018-10878/" source="CVE"/>
		<reference ref_id="CVE-2018-10879" ref_url="https://www.suse.com/security/cve/CVE-2018-10879/" source="CVE"/>
		<reference ref_id="CVE-2018-10880" ref_url="https://www.suse.com/security/cve/CVE-2018-10880/" source="CVE"/>
		<reference ref_id="CVE-2018-10881" ref_url="https://www.suse.com/security/cve/CVE-2018-10881/" source="CVE"/>
		<reference ref_id="CVE-2018-10882" ref_url="https://www.suse.com/security/cve/CVE-2018-10882/" source="CVE"/>
		<reference ref_id="CVE-2018-10883" ref_url="https://www.suse.com/security/cve/CVE-2018-10883/" source="CVE"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-1128" ref_url="https://www.suse.com/security/cve/CVE-2018-1128/" source="CVE"/>
		<reference ref_id="CVE-2018-1129" ref_url="https://www.suse.com/security/cve/CVE-2018-1129/" source="CVE"/>
		<reference ref_id="CVE-2018-12896" ref_url="https://www.suse.com/security/cve/CVE-2018-12896/" source="CVE"/>
		<reference ref_id="CVE-2018-13093" ref_url="https://www.suse.com/security/cve/CVE-2018-13093/" source="CVE"/>
		<reference ref_id="CVE-2018-13094" ref_url="https://www.suse.com/security/cve/CVE-2018-13094/" source="CVE"/>
		<reference ref_id="CVE-2018-13095" ref_url="https://www.suse.com/security/cve/CVE-2018-13095/" source="CVE"/>
		<reference ref_id="CVE-2018-15572" ref_url="https://www.suse.com/security/cve/CVE-2018-15572/" source="CVE"/>
		<reference ref_id="CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658/" source="CVE"/>
		<reference ref_id="CVE-2018-6554" ref_url="https://www.suse.com/security/cve/CVE-2018-6554/" source="CVE"/>
		<reference ref_id="CVE-2018-6555" ref_url="https://www.suse.com/security/cve/CVE-2018-6555/" source="CVE"/>
		<reference ref_id="CVE-2018-9363" ref_url="https://www.suse.com/security/cve/CVE-2018-9363/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.155 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-13093: Prevent NULL pointer dereference and panic in lookup_slow()
  on a NULL inode-&gt;i_ops pointer when doing pathwalks on a corrupted xfs image.
  This occured because of a lack of proper validation that cached inodes are free
  during allocation (bnc#1100001).
- CVE-2018-13095: Prevent denial of service (memory corruption and BUG) that
  could have occurred for a corrupted xfs image upon encountering an inode that
  is in extent format, but has more extents than fit in the inode fork
  (bnc#1099999).
- CVE-2018-13094: Prevent OOPS that may have occured for a corrupted xfs image
  after xfs_da_shrink_inode() is called with a NULL bp (bnc#1100000).
- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was
  caused by the way the overrun accounting works. Depending on interval and
  expiry time values, the overrun can be larger than INT_MAX, but the accounting
  is int based. This basically made the accounting values, which are visible to
  user space via timer_getoverrun(2) and siginfo::si_overrun, random. This
  allowed a local user to cause a denial of service (signed integer overflow) via
  crafted mmap, futex, timer_create, and timer_settime system calls
  (bnc#1099922).
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
  could have been used by local attackers to read kernel memory (bnc#1107689).
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
  denial of service (ias_object use-after-free and system crash) or possibly have
  unspecified other impact via an AF_IRDA socket (bnc#1106511).
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
  local users to cause a denial of service (memory consumption) by repeatedly
  binding an AF_IRDA socket (bnc#1106509).
- CVE-2018-1129: A flaw was found in the way signature calculation was handled
  by cephx authentication protocol. An attacker having access to ceph cluster
  network who is able to alter the message payload was able to bypass signature
  checks done by cephx protocol (bnc#1096748).
- CVE-2018-1128: It was found that cephx authentication protocol did not verify
  ceph clients correctly and was vulnerable to replay attack. Any attacker having
  access to ceph cluster network who is able to sniff packets on network can use
  this vulnerability to authenticate with ceph service and perform actions
  allowed by ceph service (bnc#1096748).
- CVE-2018-10938: A crafted network packet sent remotely by an attacker forced
  the kernel to enter an infinite loop in the cipso_v4_optptr() function leading
  to a denial-of-service (bnc#1106016).
- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill
  RSB upon a context switch, which made it easier for attackers to conduct
  userspace-userspace spectreRSB attacks (bnc#1102517).
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
  (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
  malicious local attacker could have used this for privilege escalation
  (bnc#1105322 1105323).
- CVE-2018-9363: Prevent buffer overflow in hidp_process_report (bsc#1105292)
- CVE-2018-10883: A local user could have caused an out-of-bounds write in
  jbd2_journal_dirty_metadata(), a denial of service, and a system crash by
  mounting and operating on a crafted ext4 filesystem image (bsc#1099863).
- CVE-2018-10879: A local user could have caused a use-after-free in
  ext4_xattr_set_entry function and a denial of service or unspecified other
  impact by renaming a file in a crafted ext4 filesystem image (bsc#1099844).
- CVE-2018-10878: A local user could have caused an out-of-bounds write and a
  denial of service or unspecified other impact by mounting and operating a
  crafted ext4 filesystem image (bsc#1099813).
- CVE-2018-10876: A use-after-free was possible in ext4_ext_remove_space()
  function when mounting and operating a crafted ext4 image (bsc#1099811).
- CVE-2018-10877: Prevent out-of-bound access in the ext4_ext_drop_refs()
  function when operating on a crafted ext4 filesystem image (bsc#1099846).
- CVE-2018-10881: A local user could have caused an out-of-bound access in
  ext4_get_group_info function, a denial of service, and a system crash by
  mounting and operating on a crafted ext4 filesystem image (bsc#1099864).
- CVE-2018-10882: A local user could have caused an out-of-bound write, a
  denial of service, and a system crash by unmounting a crafted ext4 filesystem
  image (bsc#1099849).
- CVE-2018-10880: Prevent stack-out-of-bounds write in the ext4 filesystem code
  when mounting and writing to a crafted ext4 image in ext4_update_inline_data().
  An attacker could have used this to cause a system crash and a denial of
  service (bsc#1099845).

The following non-security bugs were fixed:

- 9p/net: Fix zero-copy path in the 9p virtio transport (bnc#1012382).
- 9p/virtio: fix off-by-one error in sg list bounds check (bnc#1012382).
- 9p: fix multiple NULL-pointer-dereferences (bnc#1012382).
- ACPI / LPSS: Add missing prv_offset setting for byt/cht PWM devices (bnc#1012382).
- ACPI / PCI: Bail early in acpi_pci_add_bus() if there is no ACPI handle (bnc#1012382).
- ACPI / PM: save NVS memory for ASUS 1025C laptop (bnc#1012382).
- ACPI: save NVS memory for Lenovo G50-45 (bnc#1012382).
- ALSA: cs5535audio: Fix invalid endian conversion (bnc#1012382).
- ALSA: emu10k1: Rate-limit error messages about page errors (bnc#1012382).
- ALSA: emu10k1: add error handling for snd_ctl_add (bnc#1012382).
- ALSA: fm801: add error handling for snd_ctl_add (bnc#1012382).
- ALSA: hda - Sleep for 10ms after entering D3 on Conexant codecs (bnc#1012382).
- ALSA: hda - Turn CX8200 into D3 as well upon reboot (bnc#1012382).
- ALSA: hda/ca0132: fix build failure when a local macro is defined (bnc#1012382).
- ALSA: hda: Correct Asrock B85M-ITX power_save blacklist entry (bnc#1012382).
- ALSA: memalloc: Do not exceed over the requested size (bnc#1012382).
- ALSA: rawmidi: Change resized buffers atomically (bnc#1012382).
- ALSA: snd-aoa: add of_node_put() in error path (bsc#1099810).
- ALSA: usb-audio: Apply rate limit to warning messages in URB complete callback (bnc#1012382).
- ALSA: virmidi: Fix too long output trigger loop (bnc#1012382).
- ALSA: vx222: Fix invalid endian conversions (bnc#1012382).
- ALSA: vxpocket: Fix invalid endian conversions (bnc#1012382).
- ARC: Enable machine_desc-&gt;init_per_cpu for !CONFIG_SMP (bnc#1012382).
- ARC: Explicitly add -mmedium-calls to CFLAGS (bnc#1012382).
- ARC: Fix CONFIG_SWAP (bnc#1012382).
- ARC: mm: allow mprotect to make stack mappings executable (bnc#1012382).
- ARM: 8780/1: ftrace: Only set kernel memory back to read-only after boot (bnc#1012382).
- ARM: dts: Cygnus: Fix I2C controller interrupt type (bnc#1012382).
- ARM: dts: am3517.dtsi: Disable reference to OMAP3 OTG controller (bnc#1012382).
- ARM: dts: am437x: make edt-ft5x06 a wakeup source (bnc#1012382).
- ARM: dts: da850: Fix interrups property for gpio (bnc#1012382).
- ARM: dts: imx6sx: fix irq for pcie bridge (bnc#1012382).
- ARM: fix put_user() for gcc-8 (bnc#1012382).
- ARM: imx_v4_v5_defconfig: Select ULPI support (bnc#1012382).
- ARM: imx_v6_v7_defconfig: Select ULPI support (bnc#1012382).
- ARM: pxa: irq: fix handling of ICMR registers in suspend/resume (bnc#1012382).
- ARM: tegra: Fix Tegra30 Cardhu PCA954x reset (bnc#1012382).
- ASoC: Intel: cht_bsw_max98090: remove useless code, align with ChromeOS driver.
- ASoC: Intel: cht_bsw_max98090_ti: Fix jack initialization (bnc#1012382).
- ASoC: dpcm: do not merge format from invalid codec dai (bnc#1012382).
- ASoC: dpcm: fix BE dai not hw_free and shutdown (bnc#1012382).
- ASoC: pxa: Fix module autoload for platform drivers (bnc#1012382).
- ASoC: sirf: Fix potential NULL pointer dereference (bnc#1012382).
- Add reference to bsc#1091171 (bnc#1012382; bsc#1091171).
- Bluetooth: avoid killing an already killed socket (bnc#1012382).
- Bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bnc#1012382).
- Bluetooth: btusb: Remove Yoga 920 from the btusb_needs_reset_resume_table (bsc#1087092).
- Bluetooth: btusb: Use DMI matching for QCA reset_resume quirking (bsc#1087092).
- Bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bnc#1012382).
- Documentation/spec_ctrl: Do some minor cleanups (bnc#1012382).
- HID: hid-plantronics: Re-resend Update to map button for PTT products (bnc#1012382).
- HID: i2c-hid: check if device is there before really probing (bnc#1012382).
- HID: wacom: Correct touch maximum XY of 2nd-gen Intuos (bnc#1012382).
- IB/core: Make testing MR flags for writability a static inline function (bnc#1012382).
- IB/core: Remove duplicate declaration of gid_cache_wq (bsc#1056596).
- IB/iser: Do not reduce max_sectors (bsc#1063646).
- IB/mlx4: Fix an error handling path in 'mlx4_ib_rereg_user_mr()'.
- IB/mlx4: Mark user MR as writable if actual virtual memory is writable (bnc#1012382).
- IB/mlx5: Fetch soft WQE's on fatal error state (bsc#1015342 bsc#1015343).
- IB/mlx5: Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1015342 bsc#1015343).
- IB/ocrdma: fix out of bounds access to local buffer (bnc#1012382).
- Input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bnc#1012382).
- Input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bnc#1012382).
- Input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bnc#1012382).
- KVM/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel (bnc#1012382).
- KVM: MMU: always terminate page walks at level 1 (bsc#1062604).
- KVM: MMU: simplify last_pte_bitmap (bsc#1062604).
- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- KVM: arm/arm64: Skip updating PMD entry if no change (bnc#1012382).
- KVM: arm/arm64: Skip updating PTE entry if no change (bnc#1012382).
- KVM: irqfd: fix race between EPOLLHUP and irq_bypass_register_consumer (bnc#1012382).
- KVM: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).
- MIPS: Correct the 64-bit DSP accumulator register size (bnc#1012382).
- MIPS: Fix off-by-one in pci_resource_to_user() (bnc#1012382).
- MIPS: ath79: fix register address in ath79_ddr_wb_flush() (bnc#1012382).
- MIPS: lib: Provide MIPS64r6 __multi3() for GCC lower than &lt; 7 (bnc#1012382).
- NET: stmmac: align DMA stuff to largest cache line length (bnc#1012382).
- PCI: Prevent sysfs disable of device while driver is attached (bnc#1012382).
- PCI: Skip MPS logic for Virtual Functions (VFs) (bnc#1012382).
- PCI: hotplug: Do not leak pci_slot on registration failure (bnc#1012382).
- PCI: pciehp: Fix use-after-free on unplug (bnc#1012382).
- PCI: pciehp: Request control of native hotplug only if supported (bnc#1012382).
- PM / sleep: wakeup: Fix build error caused by missing SRCU support (bnc#1012382).
- RDMA/i40iw: Avoid panic when objects are being created and destroyed (bsc#969476 bsc#969477).
- RDMA/i40iw: Avoid panic when reading back the IRQ affinity hint (bsc#969476 bsc#969477).
- RDMA/i40iw: Avoid reference leaks when processing the AEQ (bsc#969476 bsc#969477).
- RDMA/i40w: Hold read semaphore while looking after VMA (bsc#1024376).
- RDMA/mad: Convert BUG_ONs to error flows (bnc#1012382).
- RDMA/mlx5: Use proper spec flow label type (bsc#1015342 bsc#1015343).
- Revert 'MIPS: BCM47XX: Enable 74K Core ExternalSync for PCIe erratum' (bnc#1012382).
- Revert 'UBIFS: Fix potential integer overflow in allocation' (bnc#1012382).
- Revert 'f2fs: handle dirty segments inside refresh_sit_entry' (bsc#1106281).
- Revert 'mm: page_alloc: skip over regions of invalid pfns where possible' (bnc#1107078).
- Revert 'block-cancel-workqueue-entries-on-blk_mq_freeze_queue' (bsc#1103717).
- Smack: Mark inode instant in smack_task_to_inode (bnc#1012382).
- USB: musb: fix external abort on suspend (bsc#1085536).
- USB: option: add support for DW5821e (bnc#1012382).
- USB: serial: metro-usb: stop I/O after failed open (bsc#1085539).
- USB: serial: sierra: fix potential deadlock at close (bnc#1012382).
- Workaround kABI breakage by __must_check drop of strscpy() (bsc#1107319).
- afs: Fix directory permissions check (bsc#1106283).
- arc: fix build errors in arc/include/asm/delay.h (bnc#1012382).
- arc: fix type warnings in arc/mm/cache.c (bnc#1012382).
- arm64: make secondary_start_kernel() notrace (bnc#1012382).
- arm64: mm: check for upper PAGE_SHIFT bits in pfn_valid() (bnc#1012382).
- ath: Add regulatory mapping for APL13_WORLD (bnc#1012382).
- ath: Add regulatory mapping for APL2_FCCA (bnc#1012382).
- ath: Add regulatory mapping for Bahamas (bnc#1012382).
- ath: Add regulatory mapping for Bermuda (bnc#1012382).
- ath: Add regulatory mapping for ETSI8_WORLD (bnc#1012382).
- ath: Add regulatory mapping for FCC3_ETSIC (bnc#1012382).
- ath: Add regulatory mapping for Serbia (bnc#1012382).
- ath: Add regulatory mapping for Tanzania (bnc#1012382).
- ath: Add regulatory mapping for Uganda (bnc#1012382).
- atl1c: reserve min skb headroom (bnc#1012382).
- atm: Preserve value of skb-&gt;truesize when accounting to vcc (bsc#1089066).
- audit: allow not equal op for audit by executable (bnc#1012382).
- backlight: as3711_bl: Fix Device Tree node leaks (bsc#1106929).
- backlight: lm3630a: Bump REG_MAX value to 0x50 instead of 0x1F (bsc#1106929).
- bcache: avoid unncessary cache prefetch bch_btree_node_get() (bsc#1064232).
- bcache: calculate the number of incremental GC nodes according to the total of btree nodes (bsc#1064232).
- bcache: display rate debug parameters to 0 when writeback is not running (bsc#1064232).
- bcache: do not check return value of debugfs_create_dir() (bsc#1064232).
- bcache: finish incremental GC (bsc#1064232).
- bcache: fix I/O significant decline while backend devices registering (bsc#1064232).
- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064232).
- bcache: free heap cache_set-&gt;flush_btree in bch_journal_free (bsc#1064232).
- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section (bsc#1064232).
- bcache: release dc-&gt;writeback_lock properly in bch_writeback_thread() (bsc#1064232).
- bcache: set max writeback rate when I/O request is idle (bsc#1064232).
- bcache: simplify the calculation of the total amount of flash dirty data (bsc#1064232).
- be2net: remove unused old custom busy-poll fields (bsc#1021121 ).
- blkdev: __blkdev_direct_IO_simple: fix leak in error case (bsc#1083663).
- block: bio_iov_iter_get_pages: fix size of last iovec (bsc#1083663).
- block: bio_iov_iter_get_pages: pin more pages for multi-segment IOs (bsc#1083663).
- block: do not use interruptible wait anywhere (bnc#1012382).
- bnx2x: Fix invalid memory access in rss hash config path (bnc#1012382).
- bnx2x: Fix receiving tx-timeout in error or recovery state (bnc#1012382).
- bnxt_en: Always set output parameters in bnxt_get_max_rings() (bsc#963575).
- bnxt_en: Fix for system hang if request_irq fails (bnc#1012382).
- bnxt_en: Fix inconsistent BNXT_FLAG_AGG_RINGS logic (bsc#1020412 ).
- bpf: fix references to free_bpf_prog_info() in comments (bnc#1012382).
- brcmfmac: Add support for bcm43364 wireless chipset (bnc#1012382).
- brcmfmac: stop watchdog before detach and free everything (bnc#1012382).
- bridge: Propagate vlan add failure to user (bnc#1012382).
- btrfs: Do not remove block group still has pinned down bytes (bsc#1086457).
- btrfs: add barriers to btrfs_sync_log before log_commit_wait wakeups (bnc#1012382).
- btrfs: do not leak ret from do_chunk_alloc (bnc#1012382).
- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bnc#1012382).
- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf.
- btrfs: round down size diff when shrinking/growing device (bsc#1097105).
- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bnc#1012382).
- can: mpc5xxx_can: check of_iomap return before use (bnc#1012382).
- can: xilinx_can: fix RX loop if RXNEMP is asserted without RXOK (bnc#1012382).
- can: xilinx_can: fix RX overflow interrupt not being enabled (bnc#1012382).
- can: xilinx_can: fix device dropping off bus on RX overrun (bnc#1012382).
- can: xilinx_can: fix incorrect clear of non-processed interrupts (bnc#1012382).
- can: xilinx_can: fix recovery from error states not being propagated (bnc#1012382).
- can: xilinx_can: keep only 1-2 frames in TX FIFO to fix TX accounting (bnc#1012382).
- cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status (bnc#1012382).
- ceph: fix incorrect use of strncpy (bsc#1107319).
- ceph: return errors from posix_acl_equiv_mode() correctly (bsc#1107320).
- cifs: Fix stack out-of-bounds in smb{2,3}_create_lease_buf() (bsc#1012382).
- cifs: add missing debug entries for kconfig options (bnc#1012382).
- cifs: check kmalloc before use (bsc#1012382).
- cifs: store the leaseKey in the fid on SMB2_open (bsc#1012382).
- clk: tegra: Fix PLL_U post divider and initial rate on Tegra30 (bnc#1012382).
- crypto: ablkcipher - fix crash flushing dcache in error path (bnc#1012382).
- crypto: authenc - do not leak pointers to authenc keys (bnc#1012382).
- crypto: authencesn - do not leak pointers to authenc keys (bnc#1012382).
- crypto: blkcipher - fix crash flushing dcache in error path (bnc#1012382).
- crypto: padlock-aes - Fix Nano workaround data corruption (bnc#1012382).
- crypto: vmac - require a block cipher with 128-bit block size (bnc#1012382).
- crypto: vmac - separate tfm and request context (bnc#1012382).
- crypto: vmx - Fix sleep-in-atomic bugs (bsc#1048317).
- cxgb4: when disabling dcb set txq dcb priority to 0 (bnc#1012382).
- cxl: Fix wrong comparison in cxl_adapter_context_get() (bsc#1055014).
- dccp: fix undefined behavior with 'cwnd' shift in ccid2_cwnd_restart() (bnc#1012382).
- disable loading f2fs module on PAGE_SIZE &gt; 4KB (bnc#1012382).
- dm cache metadata: save in-core policy_hint_size to on-disk superblock (bnc#1012382).
- dma-iommu: Fix compilation when !CONFIG_IOMMU_DMA (bnc#1012382).
- dmaengine: k3dma: Off by one in k3_of_dma_simple_xlate() (bnc#1012382).
- dmaengine: pxa_dma: remove duplicate const qualifier (bnc#1012382).
- driver core: Partially revert 'driver core: correct device's shutdown order' (bnc#1012382).
- drivers: net: lmc: fix case value for target abort error (bnc#1012382).
- drm/armada: fix colorkey mode property (bnc#1012382).
- drm/atmel-hlcdc: check stride values in the first plane (bsc#1106929).
- drm/atomic: Handling the case when setting old crtc for plane (bnc#1012382).
- drm/bridge: adv7511: Reset registers on hotplug (bnc#1012382).
- drm/cirrus: Use drm_framebuffer_put to avoid kernel oops in clean-up (bsc#1101822).
- drm/drivers: add support for using the arch wc mapping API.
- drm/exynos/dsi: mask frame-done interrupt (bsc#1106929).
- drm/exynos: decon5433: Fix WINCONx reset value (bnc#1012382).
- drm/exynos: decon5433: Fix per-plane global alpha for XRGB modes (bnc#1012382).
- drm/exynos: gsc: Fix support for NV16/61, YUV420/YVU420 and YUV422 modes (bnc#1012382).
- drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bnc#1012382).
- drm/i915/userptr: reject zero user_size (bsc#1090888).
- drm/i915: Correctly handle limited range YCbCr data on VLV/CHV (bsc#1087092).
- drm/imx: fix typo in ipu_plane_formats (bsc#1106929).
- drm/imx: imx-ldb: check if channel is enabled before printing warning (bnc#1012382).
- drm/imx: imx-ldb: disable LDB on driver bind (bnc#1012382).
- drm/msm/hdmi: Use bitwise operators when building register values (bsc#1106929).
- drm/nouveau/gem: off by one bugs in nouveau_gem_pushbuf_reloc_apply() (bnc#1012382).
- drm/panel: type promotion bug in s6e8aa0_read_mtp_id() (bsc#1105769).
- drm/radeon: fix mode_valid's return type (bnc#1012382).
- drm: Add DP PSR2 sink enable bit (bnc#1012382).
- drm: Reject getfb for multi-plane framebuffers (bsc#1106929).
- enic: do not call enic_change_mtu in enic_probe
- enic: handle mtu change for vf properly (bnc#1012382).
- enic: initialize enic-&gt;rfs_h.lock in enic_probe (bnc#1012382).
- esp6: fix memleak on error path in esp6_input
- ext4: check for NUL characters in extended attribute's name (bnc#1012382).
- ext4: check for allocation block validity with block group locked (bsc#1104495).
- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).
- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).
- ext4: fix inline data updates with checksums enabled (bsc#1104494).
- ext4: fix spectre gadget in ext4_mb_regular_allocator() (bnc#1012382).
- ext4: reset error code in ext4_find_entry in fallback (bnc#1012382).
- ext4: sysfs: print ext4_super_block fields as little-endian (bsc#1106229).
- f2fs: fix to do not trigger writeback during recovery (bnc#1012382).
- fat: fix memory allocation failure handling of match_strdup() (bnc#1012382).
- fb: fix lost console when the user unplugs a USB adapter (bnc#1012382).
- fbdev: omapfb: off by one in omapfb_register_client() (bsc#1106929).
- fix __legitimize_mnt()/mntput() race (bnc#1012382).
- fix mntput/mntput race (bnc#1012382).
- fork: unconditionally clear stack on fork (bnc#1012382).
- fs/9p/xattr.c: catch the error of p9_client_clunk when setting xattr failed (bnc#1012382).
- fs/dax.c: fix inefficiency in dax_writeback_mapping_range() (bsc#1106185).
- fs/quota: Fix spectre gadget in do_quotactl (bnc#1012382).
- fs: aio: fix the increment of aio-nr and counting against aio-max-nr (bsc#1068075, bsc#1078921).
- fuse: Add missed unlock_page() to fuse_readpages_fill() (bnc#1012382).
- fuse: Do not access pipe-&gt;buffers without pipe_lock() (bnc#1012382).
- fuse: Fix oops at process_init_reply() (bnc#1012382).
- fuse: fix double request_end() (bnc#1012382).
- fuse: fix unlocked access to processing queue (bnc#1012382).
- fuse: umount should wait for all requests (bnc#1012382).
- genirq/proc: Return proper error code when irq_set_affinity() fails (bnc#1105392).
- getxattr: use correct xattr length (bnc#1012382).
- hfsplus: Do not clear SGID when inheriting ACLs (bsc#1030552).
- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bnc#1012382).
- hwrng: exynos - Disable runtime PM on driver unbind.
- i2c: davinci: Avoid zero value of CLKH (bnc#1012382).
- i2c: imx: Fix race condition in dma read (bnc#1012382).
- i2c: imx: Fix reinit_completion() use (bnc#1012382).
- i2c: ismt: fix wrong device address when unmap the data buffer (bnc#1012382).
- i40e: use cpumask_copy instead of direct assignment (bsc#1053685).
- i40iw: Fix memory leak in error path of create QP (bsc#969476 bsc#969477).
- i40iw: Use correct address in dst_neigh_lookup for IPv6 (bsc#969476 bsc#969477).
- ibmvnic: Include missing return code checks in reset function (bnc#1107966).
- ieee802154: at86rf230: switch from BUG_ON() to WARN_ON() on problem (bnc#1012382).
- ieee802154: at86rf230: use __func__ macro for debug messages (bnc#1012382).
- ieee802154: fakelb: switch from BUG_ON() to WARN_ON() on problem (bnc#1012382).
- igb: Fix not adding filter elements to the list (bsc#1024361 bsc#1024365).
- iio: ad9523: Fix displayed phase (bnc#1012382).
- iio: ad9523: Fix return value for ad952x_store() (bnc#1012382).
- inet: frag: enforce memory limits earlier (bnc#1012382 bsc#970506).
- iommu/amd: make sure TLB to be flushed before IOVA freed (bsc#1106105).
- iommu/vt-d: Add definitions for PFSID (bnc#1012382).
- iommu/vt-d: Fix dev iotlb pfsid use (bnc#1012382).
- iommu/vt-d: Ratelimit each dmar fault printing (bsc#1106105).
- ioremap: Update pgtable free interfaces with addr (bnc#1012382).
- ip: hash fragments consistently (bnc#1012382).
- ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull (bnc#1012382).
- ipconfig: Correctly initialise ic_nameservers (bnc#1012382).
- ipv4+ipv6: Make INET*_ESP select CRYPTO_ECHAINIV (bnc#1012382).
- ipv4: Return EINVAL when ping_group_range sysctl does not map to user ns (bnc#1012382).
- ipv4: remove BUG_ON() from fib_compute_spec_dst (bnc#1012382).
- ipv6: fix useless rol32 call on hash (bnc#1012382).
- ipv6: mcast: fix unsolicited report interval after receiving querys (bnc#1012382).
- ipvlan: use ETH_MAX_MTU as max mtu (bsc#1033962).
- iscsi target: fix session creation failure handling (bnc#1012382).
- isdn: Disable IIOCDBGVAR (bnc#1012382).
- iw_cxgb4: remove duplicate memcpy() in c4iw_create_listen() (bsc#969476 bsc#969477).
- iwlwifi: pcie: fix race in Rx buffer allocator (bnc#1012382).
- ixgbe: Be more careful when modifying MAC filters (bnc#1012382).
- jfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- jump_label: Add RELEASE barrier after text changes (bsc#1105271).
- jump_label: Fix concurrent static_key_enable/disable() (bsc#1105271).
- jump_label: Move CPU hotplug locking (bsc#1105271).
- jump_label: Provide hotplug context variants (bsc#1105271).
- jump_label: Reduce the size of struct static_key (bsc#1105271).
- jump_label: Reorder hotplug lock and jump_label_lock (bsc#1105271).
- jump_label: Split out code under the hotplug lock (bsc#1105271).
- jump_label: remove bug.h, atomic.h dependencies for HAVE_JUMP_LABEL (bsc#1105271).
- kABI: protect enum tcp_ca_event (kabi).
- kABI: reexport tcp_send_ack (kabi).
- kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kasan: do not emit builtin calls when sanitization is off (bnc#1012382).
- kasan: fix shadow_size calculation error in kasan_module_alloc (bnc#1012382).
- kbuild: verify that $DEPMOD is installed (bnc#1012382).
- kernel: improve spectre mitigation (bnc#1106934, LTC#171029).
- kprobes/x86: Fix %p uses in error messages (bnc#1012382).
- kprobes: Make list and blacklist root user read only (bnc#1012382).
- kthread, tracing: Do not expose half-written comm when creating kthreads (bsc#1104897).
- kvm: x86: vmx: fix vpid leak (bnc#1012382).
- l2tp: use sk_dst_check() to avoid race on sk-&gt;sk_dst_cache (bnc#1012382).
- lib/rhashtable: consider param-&gt;min_size when setting initial table size (bnc#1012382).
- libata: Fix command retry decision (bnc#1012382).
- libceph: check authorizer reply/challenge length before reading (bsc#1096748).
- libceph: factor out __ceph_x_decrypt() (bsc#1096748).
- libceph: factor out __prepare_write_connect() (bsc#1096748).
- libceph: factor out encrypt_authorizer() (bsc#1096748).
- libceph: store ceph_auth_handshake pointer in ceph_connection (bsc#1096748).
- libceph: weaken sizeof check in ceph_x_verify_authorizer_reply() (bsc#1096748).
- llc: use refcount_inc_not_zero() for llc_sap_find() (bnc#1012382).
- locking/lockdep: Do not record IRQ state within lockdep code (bnc#1012382).
- locks: pass inode pointer to locks_free_lock_context (bsc@1099832).
- locks: prink more detail when there are leaked locks (bsc#1099832).
- locks: restore a warn for leaked locks on close (bsc#1099832).
- m68k: fix 'bad page state' oops on ColdFire boot (bnc#1012382).
- mac80211: add stations tied to AP_VLANs during hw reconfig (bnc#1012382).
- md/raid10: fix that replacement cannot complete recovery after reassemble (bnc#1012382).
- md: fix NULL dereference of mddev-&gt;pers in remove_and_add_spares() (bnc#1012382).
- media: omap3isp: fix unbalanced dma_iommu_mapping (bnc#1012382).
- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bnc#1012382).
- media: rtl28xxu: be sure that it won't go past the array size (bsc#1050431).
- media: s5p-jpeg: fix number of components macro (bsc#1050431).
- media: saa7164: Fix driver name in debug output (bnc#1012382).
- media: si470x: fix __be16 annotations (bnc#1012382).
- media: siano: get rid of __le32/__le16 cast warnings (bnc#1012382).
- media: staging: omap4iss: Include asm/cacheflush.h after generic includes (bnc#1012382).
- media: videobuf2-core: do not call memop 'finish' when queueing (bnc#1012382).
- memory: tegra: Apply interrupts mask per SoC (bnc#1012382).
- memory: tegra: Do not handle spurious interrupts (bnc#1012382).
- mfd: cros_ec: Fail early if we cannot identify the EC (bnc#1012382).
- microblaze: Fix simpleImage format generation (bnc#1012382).
- mm/hugetlb: filter out hugetlb pages if HUGEPAGE migration is not supported (bnc#1106697).
- mm/memory.c: check return value of ioremap_prot (bnc#1012382).
- mm/slub.c: add __printf verification to slab_err() (bnc#1012382).
- mm/tlb: Remove tlb_remove_table() non-concurrent condition (bnc#1012382).
- mm: Add vm_insert_pfn_prot() (bnc#1012382).
- mm: fix cache mode tracking in vm_insert_mixed() (bnc#1012382).
- mm: memcg: fix use after free in mem_cgroup_iter() (bnc#1012382).
- mm: vmalloc: avoid racy handling of debugobjects in vunmap (bnc#1012382).
- mm: x86: move _PAGE_SWP_SOFT_DIRTY from bit 7 to bit 1 (bnc#1012382).
- mtd: rawnand: fsl_ifc: fix FSL NAND driver to read all ONFI parameter pages (bnc#1012382).
- mtd: ubi: wl: Fix error return code in ubi_wl_init().
- mwifiex: correct histogram data with appropriate index (bnc#1012382).
- mwifiex: handle race during mwifiex_usb_disconnect (bnc#1012382).
- net/9p/client.c: version pointer uninitialized (bnc#1012382).
- net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree() (bnc#1012382).
- net/ethernet/freescale/fman: fix cross-build error (bnc#1012382).
- net/ipv4: Set oif in fib_compute_spec_dst (bnc#1012382).
- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bnc#1012382).
- net/mlx5: Add missing SET_DRIVER_VERSION command translation (bsc#1015342 bsc#1015343).
- net/mlx5: E-Switch, Include VF RDMA stats in vport statistics (bsc#966170 bsc#966172).
- net/mlx5: Eswitch, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1015342 bsc#1015343).
- net/mlx5: Fix wrong size allocation for QoS ETC TC regitster (bsc#966170 bsc#966172).
- net/mlx5: Vport, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#966170 bsc#966172).
- net/mlx5e: Do not allow aRFS for encapsulated packets (bsc#1015342 bsc#1015343).
- net/mlx5e: Err if asked to offload TC match on frag being first (bsc#1015342 bsc#1015343).
- net/mlx5e: Fix quota counting in aRFS expire flow (bsc#1015342 bsc#1015343).
- net/mlx5e: Refine ets validation function (bsc#966170 bsc#966172).
- net: 6lowpan: fix reserved space for single frames (bnc#1012382).
- net: Do not copy pfmemalloc flag in __copy_skb_header() (bnc#1012382).
- net: add skb_condense() helper (bsc#1089066).
- net: adjust skb-&gt;truesize in ___pskb_trim() (bsc#1089066).
- net: adjust skb-&gt;truesize in pskb_expand_head() (bsc#1089066).
- net: axienet: Fix double deregister of mdio (bnc#1012382).
- net: caif: Add a missing rcu_read_unlock() in caif_flow_cb (bnc#1012382).
- net: davinci_emac: match the mdio device against its compatible if possible (bnc#1012382).
- net: dsa: Do not suspend/resume closed slave_dev (bnc#1012382).
- net: ena: Fix use of uninitialized DMA address bits field (bsc#1027968).
- net: fix amd-xgbe flow-control issue (bnc#1012382).
- net: hamradio: use eth_broadcast_addr (bnc#1012382).
- net: lan78xx: Fix misplaced tasklet_schedule() call (bnc#1012382).
- net: lan78xx: fix rx handling before first packet is send (bnc#1012382).
- net: mac802154: tx: expand tailroom if necessary (bnc#1012382).
- net: phy: fix flag masking in __set_phy_supported (bnc#1012382).
- net: prevent ISA drivers from building on PPC32 (bnc#1012382).
- net: propagate dev_get_valid_name return code (bnc#1012382).
- net: qca_spi: Avoid packet drop during initial sync (bnc#1012382).
- net: qca_spi: Fix log level if probe fails (bnc#1012382).
- net: qca_spi: Make sure the QCA7000 reset is triggered (bnc#1012382).
- net: socket: fix potential spectre v1 gadget in socketcall (bnc#1012382).
- net: usb: rtl8150: demote allmulti message to dev_dbg() (bnc#1012382).
- net: vmxnet3: use new api ethtool_{get|set}_link_ksettings (bsc#1091860 bsc#1098253).
- net_sched: Fix missing res info when create new tc_index filter (bnc#1012382).
- net_sched: fix NULL pointer dereference when delete tcindex filter (bnc#1012382).
- netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state (bnc#1012382).
- netfilter: ipset: List timing out entries with 'timeout 1' instead of zero (bnc#1012382).
- netfilter: ipv6: nf_defrag: reduce struct net memory waste (bnc#1012382).
- netfilter: ipvs: do not create conn for ABORT packet in sctp_conn_schedule (bsc#1102797).
- netfilter: ipvs: fix the issue that sctp_conn_schedule drops non-INIT packet (bsc#1102797).
- netfilter: x_tables: set module owner for icmp(6) matches (bnc#1012382).
- netlink: Do not shift on 64 for ngroups (bnc#1012382).
- netlink: Do not shift with UB on nlk-&gt;ngroups (bnc#1012382).
- netlink: Do not subscribe to non-existent groups (bnc#1012382).
- netlink: Fix spectre v1 gadget in netlink_create() (bnc#1012382).
- netlink: do not enter direct reclaim from netlink_trim() (bsc#1042286).
- nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (bnc#1012382).
- nl80211: Add a missing break in parse_station_flags (bnc#1012382).
- nohz: Fix local_timer_softirq_pending() (bnc#1012382).
- nvme-fc: release io queues to allow fast fail (bsc#1102486).
- nvme: if_ready checks to fail io to deleting controller (bsc#1102486).
- nvme: kABI-compliant version of nvmf_fail_nonready_command() (bsc#1102486).
- nvmet-fc: fix target sgl list on large transfers (bsc#1102486).
- osf_getdomainname(): use copy_to_user() (bnc#1012382).
- ovl: Do d_type check only if work dir creation was successful (bnc#1012382).
- ovl: Ensure upper filesystem supports d_type (bnc#1012382).
- ovl: warn instead of error if d_type is not supported (bnc#1012382).
- packet: refine ring v3 block size test to hold one frame (bnc#1012382).
- packet: reset network header if packet shorter than ll reserved space (bnc#1012382).
- parisc: Define mb() and add memory barriers to assembler unlock sequences (bnc#1012382).
- parisc: Enable CONFIG_MLONGCALLS by default (bnc#1012382).
- parisc: Remove ordered stores from syscall.S (bnc#1012382).
- parisc: Remove unnecessary barriers from spinlock.h (bnc#1012382).
- perf auxtrace: Fix queue resize (bnc#1012382).
- perf llvm-utils: Remove bashism from kernel include fetch script (bnc#1012382).
- perf report powerpc: Fix crash if callchain is empty (bnc#1012382).
- perf test session topology: Fix test on s390 (bnc#1012382).
- perf/x86/intel/uncore: Correct fixed counter index check for NHM (bnc#1012382).
- perf/x86/intel/uncore: Correct fixed counter index check in generic code (bnc#1012382).
- perf: fix invalid bit in diagnostic entry (bnc#1012382).
- pinctrl: at91-pio4: add missing of_node_put (bnc#1012382).
- pinctrl: freescale: off by one in imx1_pinconf_group_dbg_show() (bnc#1012382).
- pnfs/blocklayout: off by one in bl_map_stripe() (bnc#1012382).
- powerpc/32: Add a missing include header (bnc#1012382).
- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032).
- powerpc/64s: Fix compiler store ordering to SLB shadow area (bnc#1012382).
- powerpc/8xx: fix invalid register expression in head_8xx.S (bnc#1012382).
- powerpc/chrp/time: Make some functions static, add missing header include (bnc#1012382).
- powerpc/embedded6xx/hlwd-pic: Prevent interrupts from being handled by Starlet (bnc#1012382).
- powerpc/fadump: handle crash memory ranges array index overflow (bsc#1103269).
- powerpc/fadump: merge adjacent memory ranges to reduce PT_LOAD segements (bsc#1103269).
- powerpc/lib: Fix the feature fixup tests to actually work (bsc#1066223).
- powerpc/powermac: Add missing prototype for note_bootable_part() (bnc#1012382).
- powerpc/powermac: Mark variable x as unused (bnc#1012382).
- powerpc/pseries: Fix endianness while restoring of r3 in MCE handler (bnc#1012382).
- powerpc/topology: Get topology for shared processors at boot (bsc#1104683).
- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157).
- powerpc: Avoid code patching freed init sections (bnc#1107735).
- powerpc: make feature-fixup tests fortify-safe (bsc#1066223).
- provide special timeout module parameters for EC2 (bsc#1065364).
- ptp: fix missing break in switch (bnc#1012382).
- pwm: tiehrpwm: Fix disabling of output of PWMs (bnc#1012382).
- qed: Add sanity check for SIMD fastpath handler (bnc#1012382).
- qed: Correct Multicast API to reflect existence of 256 approximate buckets (bsc#1019695 bsc#1019699 bsc#1022604).
- qed: Do not advertise DCBX_LLD_MANAGED capability (bsc#1019695 bsc#1019699 bsc#1022604).
- qed: Fix possible memory leak in Rx error path handling (bsc#1019695 bsc#1019699 bsc#1022604 ).
- qed: Fix possible race for the link state value (bnc#1012382).
- qed: Fix setting of incorrect eswitch mode (bsc#1019695 bsc#1019699 bsc#1022604).
- qed: Fix use of incorrect size in memcpy call (bsc#1019695 bsc#1019699 bsc#1022604).
- qede: Adverstise software timestamp caps when PHC is not available (bsc#1019695 bsc#1019699 bsc#1022604).
- qlge: Fix netdev features configuration (bsc#1098822).
- qlogic: check kstrtoul() for errors (bnc#1012382).
- random: mix rdrand with entropy sent in from userspace (bnc#1012382).
- readahead: stricter check for bdi io_pages (VM Functionality).
- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bnc#1012382).
- reiserfs: fix broken xattr handling (heap corruption, bad retval) (bnc#1012382).
- ring_buffer: tracing: Inherit the tracing setting to next ring buffer (bnc#1012382).
- root dentries need RCU-delayed freeing (bnc#1012382).
- rsi: Fix 'invalid vdd' warning in mmc (bnc#1012382).
- rtc: ensure rtc_set_alarm fails when alarms are not supported (bnc#1012382).
- rtnetlink: add rtnl_link_state check in rtnl_configure_link (bnc#1012382).
- s390/cpum_sf: Add data entry sizes to sampling trailer entry (bnc#1012382).
- s390/kvm: fix deadlock when killed by oom (bnc#1012382).
- s390/lib: use expoline for all bcr instructions (bnc#1106934, LTC#171029).
- s390/pci: fix out of bounds access during irq setup (bnc#1012382).
- s390/qdio: reset old sbal_state flags (bnc#1012382).
- s390/qeth: do not clobber buffer on async TX completion (bnc#1104485, LTC#170349).
- s390/qeth: fix race when setting MAC address (bnc#1104485, LTC#170726).
- s390: add explicit &lt;linux/stringify.h&gt; for jump label (bsc#1105271).
- s390: detect etoken facility (bnc#1106934, LTC#171029).
- s390: fix br_r1_trampoline for machines without exrl (bnc#1012382 bnc#1106934 LTC#171029).
- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).
- scripts/tar-up.sh: Do not package gitlog-excludes file Also fix the evaluation of gitlog-excludes file, too
- scsi: 3w-xxxx: fix a missing-check bug (bnc#1012382).
- scsi: core: Avoid that SCSI device removal through sysfs triggers a deadlock (bnc#1012382).
- scsi: fcoe: drop frames in ELS LOGO error path (bnc#1012382).
- scsi: hpsa: limit transfer length to 1MB, not 512kB (bsc#1102346).
- scsi: libiscsi: fix possible NULL pointer dereference in case of TMF (bnc#1012382).
- scsi: megaraid: silence a static checker bug (bnc#1012382).
- scsi: megaraid_sas: Increase timeout by 1 sec for non-RAID fastpath IOs (bnc#1012382).
- scsi: qla2xxx: Fix ISP recovery on unload (bnc#1012382).
- scsi: qla2xxx: Return error when TMF returns (bnc#1012382).
- scsi: scsi_dh: replace too broad 'TP9' string with the exact models (bnc#1012382).
- scsi: sr: Avoid that opening a CD-ROM hangs with runtime power management enabled (bnc#1012382).
- scsi: sysfs: Introduce sysfs_{un,}break_active_protection() (bnc#1012382).
- scsi: ufs: fix exception event handling (bnc#1012382).
- scsi: vmw_pvscsi: Return DID_RESET for status SAM_STAT_COMMAND_TERMINATED (bnc#1012382).
- scsi: xen-scsifront: add error handling for xenbus_printf (bnc#1012382).
- scsi_debug: call resp_XXX function after setting host_scribble (bsc#1069138).
- scsi_debug: reset injection flags for every_nth &gt; 0 (bsc#1069138).
- selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC (bnc#1012382).
- selftest/seccomp: Fix the seccomp(2) signature (bnc#1012382).
- selftests/ftrace: Add snapshot and tracing_on test case (bnc#1012382).
- selftests/x86/sigreturn/64: Fix spurious failures on AMD CPUs (bnc#1012382).
- selftests: pstore: return Kselftest Skip code for skipped tests (bnc#1012382).
- selftests: static_keys: return Kselftest Skip code for skipped tests (bnc#1012382).
- selftests: sync: add config fragment for testing sync framework (bnc#1012382).
- selftests: user: return Kselftest Skip code for skipped tests (bnc#1012382).
- selftests: zram: return Kselftest Skip code for skipped tests (bnc#1012382).
- serial: 8250_dw: always set baud rate in dw8250_set_termios (bnc#1012382).
- sfc: stop the TX queue before pushing new buffers (bsc#1017967 ).
- skbuff: Unconditionally copy pfmemalloc in __skb_clone() (bnc#1012382).
- slab: __GFP_ZERO is incompatible with a constructor (bnc#1107060).
- smb3: Do not send SMB3 SET_INFO if nothing changed (bnc#1012382).
- smb3: do not request leases in symlink creation and query (bnc#1012382).
- spi: davinci: fix a NULL pointer dereference (bnc#1012382).
- squashfs: be more careful about metadata corruption (bnc#1012382).
- squashfs: more metadata hardening (bnc#1012382).
- squashfs: more metadata hardenings (bnc#1012382).
- staging: android: ion: check for kref overflow (bnc#1012382).
- string: drop __must_check from strscpy() and restore strscpy() usages in cgroup (bsc#1107319).
- sys: do not hold uts_sem while accessing userspace memory (bnc#1106995).
- target_core_rbd: use RCU in free_device (bsc#1105524).
- tcp: Fix missing range_truesize enlargement in the backport (bnc#1012382).
- tcp: add max_quickacks param to tcp_incr_quickack and tcp_enter_quickack_mode (bnc#1012382).
- tcp: add one more quick ack after after ECN events (bnc#1012382).
- tcp: do not aggressively quick ack after ECN events (bnc#1012382).
- tcp: do not cancel delay-AcK on DCTCP special ACK (bnc#1012382).
- tcp: do not delay ACK in DCTCP upon CE status change (bnc#1012382).
- tcp: do not force quickack when receiving out-of-order packets (bnc#1012382).
- tcp: fix dctcp delayed ACK schedule (bnc#1012382).
- tcp: helpers to send special DCTCP ack (bnc#1012382).
- tcp: identify cryptic messages as TCP seq # bugs (bnc#1012382).
- tcp: refactor tcp_ecn_check_ce to remove sk type cast (bnc#1012382).
- tcp: remove DELAYED ACK events in DCTCP (bnc#1012382).
- tg3: Add higher cpu clock for 5762 (bnc#1012382).
- thermal: exynos: fix setting rising_threshold for Exynos5433 (bnc#1012382).
- timekeeping: Eliminate the stale declaration of ktime_get_raw_and_real_ts64() (bsc#969470).
- tools/power turbostat: Read extended processor family from CPUID (bnc#1012382).
- tools/power turbostat: fix -S on UP systems (bnc#1012382).
- tools: usb: ffs-test: Fix build on big endian systems (bnc#1012382).
- tpm: fix race condition in tpm_common_write() (bnc#1012382).
- tracing/blktrace: Fix to allow setting same value (bnc#1012382).
- tracing/kprobes: Fix trace_probe flags on enable_trace_kprobe() failure (bnc#1012382).
- tracing: Do not call start/stop() functions when tracing_on does not change (bnc#1012382).
- tracing: Fix double free of event_trigger_data (bnc#1012382).
- tracing: Fix possible double free in event_enable_trigger_func() (bnc#1012382).
- tracing: Quiet gcc warning about maybe unused link variable (bnc#1012382).
- tracing: Use __printf markup to silence compiler (bnc#1012382).
- tty: Fix data race in tty_insert_flip_string_fixed_flag (bnc#1012382).
- turn off -Wattribute-alias (bnc#1012382).
- ubi: Be more paranoid while seaching for the most recent Fastmap (bnc#1012382).
- ubi: Fix Fastmap's update_vol() (bnc#1012382).
- ubi: Fix races around ubi_refill_pools() (bnc#1012382).
- ubi: Introduce vol_ignored() (bnc#1012382).
- ubi: Rework Fastmap attach base code (bnc#1012382).
- ubi: fastmap: Erase outdated anchor PEBs during attach (bnc#1012382).
- ubifs: Check data node size before truncate (bsc#1106276).
- ubifs: Fix memory leak in lprobs self-check (bsc#1106278).
- ubifs: Fix synced_i_size calculation for xattr inodes (bsc#1106275).
- ubifs: xattr: Do not operate on deleted inodes (bsc#1106271).
- udl-kms: change down_interruptible to down (bnc#1012382).
- udl-kms: fix crash due to uninitialized memory (bnc#1012382).
- udl-kms: handle allocation failure (bnc#1012382).
- udlfb: set optimal write delay (bnc#1012382).
- uprobes: Use synchronize_rcu() not synchronize_sched() (bnc#1012382).
- usb/phy: fix PPC64 build errors in phy-fsl-usb.c (bnc#1012382).
- usb: audio-v2: Correct the comment for struct uac_clock_selector_descriptor (bsc#1099810).
- usb: cdc_acm: Add quirk for Castles VEGA3000 (bnc#1012382).
- usb: dwc2: debugfs: Do not touch RX FIFO during register dump (bsc#1100132).
- usb: dwc2: fix isoc split in transfer with no data (bnc#1012382).
- usb: gadget: composite: fix delayed_status race condition when set_interface (bnc#1012382).
- usb: gadget: dwc2: fix memory leak in gadget_init() (bnc#1012382).
- usb: gadget: f_fs: Only return delayed status when len is 0 (bnc#1012382).
- usb: gadget: f_uac2: fix endianness of 'struct cntrl_*_lay3' (bnc#1012382).
- usb: gadget: r8a66597: Fix a possible sleep-in-atomic-context bugs in r8a66597_queue() (bnc#1012382).
- usb: gadget: r8a66597: Fix two possible sleep-in-atomic-context bugs in init_controller() (bnc#1012382).
- usb: hub: Do not wait for connect state at resume for powered-off ports (bnc#1012382).
- usb: renesas_usbhs: gadget: fix spin_lock_init() for &amp;uep-&gt;lock (bsc#1085536).
- usb: xhci: increase CRS timeout value (bnc#1012382).
- usbip: usbip_detach: Fix memory, udev context and udev leak (bnc#1012382).
- userns: move user access out of the mutex (bnc#1012382).
- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).
- virtio_balloon: fix another race between migration and ballooning (bnc#1012382).
- vmw_balloon: VMCI_DOORBELL_SET does not check status (bnc#1012382).
- vmw_balloon: do not use 2MB without batching (bnc#1012382).
- vmw_balloon: fix VMCI use when balloon built into kernel (bnc#1012382).
- vmw_balloon: fix inflation of 64-bit GFNs (bnc#1012382).
- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1091860 bsc#1098253).
- vmxnet3: add receive data ring support (bsc#1091860 bsc#1098253).
- vmxnet3: add support for get_coalesce, set_coalesce ethtool operations (bsc#1091860 bsc#1098253).
- vmxnet3: allow variable length transmit data ring buffer (bsc#1091860 bsc#1098253).
- vmxnet3: avoid assumption about invalid dma_pa in vmxnet3_set_mc() (bsc#1091860 bsc#1098253).
- vmxnet3: avoid format strint overflow warning (bsc#1091860 bsc#1098253).
- vmxnet3: avoid xmit reset due to a race in vmxnet3 (bsc#1091860 bsc#1098253).
- vmxnet3: fix incorrect dereference when rxvlan is disabled (bsc#1091860 bsc#1098253).
- vmxnet3: fix non static symbol warning (bsc#1091860 bsc#1098253).
- vmxnet3: fix tx data ring copy for variable size (bsc#1091860 bsc#1098253).
- vmxnet3: increase default rx ring sizes (bsc#1091860 bsc#1098253).
- vmxnet3: introduce command to register memory region (bsc#1091860 bsc#1098253).
- vmxnet3: introduce generalized command interface to configure the device (bsc#1091860 bsc#1098253).
- vmxnet3: prepare for version 3 changes (bsc#1091860 bsc#1098253).
- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1091860 bsc#1098253).
- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1091860 bsc#1098253).
- vmxnet3: set the DMA mask before the first DMA map operation (bsc#1091860 bsc#1098253).
- vmxnet3: update to version 3 (bsc#1091860 bsc#1098253).
- vmxnet3: use DMA memory barriers where required (bsc#1091860 bsc#1098253).
- vmxnet3: use correct flag to indicate LRO feature (bsc#1091860 bsc#1098253).
- vsock: split dwork to avoid reinitializations (bnc#1012382).
- vti6: Fix dev-&gt;max_mtu setting (bsc#1033962).
- vti6: fix PMTU caching and reporting on xmit (bnc#1012382).
- wlcore: sdio: check for valid platform device data before suspend (bnc#1012382).
- x86/MCE: Remove min interval polling limitation (bnc#1012382).
- x86/amd: do not set X86_BUG_SYSRET_SS_ATTRS when running under Xen (bnc#1012382).
- x86/asm/entry/32: Simplify pushes of zeroed pt_regs-&gt;REGs (bnc#1012382).
- x86/bugs: Move the l1tf function and define pr_fmt properly (bnc#1012382).
- x86/bugs: Respect nospec command line option (bsc#1068032).
- x86/cpu/AMD: Fix erratum 1076 (CPB bit) (bnc#1012382).
- x86/cpu: Make alternative_msr_write work for 32-bit code (bnc#1012382).
- x86/cpu: Re-apply forced caps every time CPU caps are re-read (bnc#1012382).
- x86/cpufeatures: Add CPUID_7_EDX CPUID leaf (bnc#1012382).
- x86/cpufeatures: Clean up Spectre v2 related CPUID flags (bnc#1012382).
- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bnc#1012382).
- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).
- x86/init: fix build with CONFIG_SWAP=n (bnc#1012382).
- x86/irqflags: Mark native_restore_fl extern inline (bnc#1012382).
- x86/irqflags: Provide a declaration for native_save_fl.
- x86/mm/kmmio: Make the tracer robust against L1TF (bnc#1012382).
- x86/mm/pat: Fix L1TF stable backport for CPA (bnc#1012382).
- x86/mm/pat: Fix L1TF stable backport for CPA, 2nd call (bnc#1012382).
- x86/mm/pat: Make set_memory_np() L1TF safe (bnc#1012382).
- x86/mm: Add TLB purge to free pmd/pte page interfaces (bnc#1012382).
- x86/mm: Disable ioremap free page handling on x86-PAE (bnc#1012382).
- x86/mm: Give each mm TLB flush generation a unique ID (bnc#1012382).
- x86/paravirt: Fix spectre-v2 mitigations for paravirt guests (bnc#1012382).
- x86/paravirt: Make native_save_fl() extern inline (bnc#1012382).
- x86/process: Correct and optimize TIF_BLOCKSTEP switch (bnc#1012382).
- x86/process: Optimize TIF checks in __switch_to_xtra() (bnc#1012382).
- x86/process: Optimize TIF_NOTSC switch (bnc#1012382).
- x86/process: Re-export start_thread() (bnc#1012382).
- x86/spectre: Add missing family 6 check to microcode check (bnc#1012382).
- x86/spectre_v2: Do not check microcode versions when running under hypervisors (bnc#1012382).
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion (bnc#1012382).
- x86/speculation/l1tf: Extend 64bit swap file size limit (bnc#1012382).
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1012382).
- x86/speculation/l1tf: Fix up CPU feature flags (bnc#1012382).
- x86/speculation/l1tf: Fix up pte-&gt;pfn conversion for PAE (bnc#1012382).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- x86/speculation/l1tf: Invert all not present mappings (bnc#1012382).
- x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert (bnc#1012382).
- x86/speculation/l1tf: Protect PAE swap entries against L1TF (bnc#1012382).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).
- x86/speculation/l1tf: Unbreak !__HAVE_ARCH_PFN_MODIFY_ALLOWED architectures (bnc#1012382).
- x86/speculation: Add &lt;asm/msr-index.h&gt; dependency (bnc#1012382).
- x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support (bnc#1012382).
- x86/speculation: Clean up various Spectre related details (bnc#1012382).
- x86/speculation: Correct Speculation Control microcode blacklist again (bnc#1012382).
- x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP (bnc#1012382).
- x86/speculation: Update Speculation Control microcode blacklist (bnc#1012382).
- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).
- x86/speculation: Use IBRS if available before calling into firmware (bnc#1012382).
- x86/speculation: Use Indirect Branch Prediction Barrier in context switch (bnc#1012382).
- x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths (bnc#1012382).
- xen-netfront: wait xenbus state change when load module manually (bnc#1012382).
- xen/blkback: do not keep persistent grants too long (bsc#1085042).
- xen/blkback: move persistent grants flags to bool (bsc#1085042).
- xen/blkfront: cleanup stale persistent grants (bsc#1085042).
- xen/blkfront: reorder tests in xlblk_init() (bsc#1085042).
- xen/netfront: do not cache skb_shinfo() (bnc#1012382).
- xen: set cpu capabilities from xen_start_kernel() (bnc#1012382).
- xfrm: fix missing dst_release() after policy blocking lbcast and multicast (bnc#1012382).
- xfrm: free skb if nlsk pointer is NULL (bnc#1012382).
- xfrm_user: prevent leaking 2 bytes of kernel memory (bnc#1012382).
- xfs: Remove dead code from inode recover function (bsc#1105396).
- xfs: repair malformed inode items during log recovery (bsc#1105396).
- xhci: Fix perceived dead host due to runtime suspend race with event handler (bnc#1012382).
- zswap: re-check zswap_is_full() after do zswap_shrink() (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-20"/>
	<updated date="2018-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015342">SUSE bug 1015342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015343">SUSE bug 1015343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017967">SUSE bug 1017967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019695">SUSE bug 1019695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019699">SUSE bug 1019699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020412">SUSE bug 1020412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021121">SUSE bug 1021121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022604">SUSE bug 1022604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024361">SUSE bug 1024361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024365">SUSE bug 1024365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024376">SUSE bug 1024376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027968">SUSE bug 1027968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030552">SUSE bug 1030552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031492">SUSE bug 1031492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033962">SUSE bug 1033962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048317">SUSE bug 1048317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053685">SUSE bug 1053685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055014">SUSE bug 1055014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056596">SUSE bug 1056596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062604">SUSE bug 1062604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063646">SUSE bug 1063646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064232">SUSE bug 1064232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065364">SUSE bug 1065364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068075">SUSE bug 1068075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069138">SUSE bug 1069138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078921">SUSE bug 1078921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080157">SUSE bug 1080157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083663">SUSE bug 1083663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085042">SUSE bug 1085042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085536">SUSE bug 1085536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085539">SUSE bug 1085539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086457">SUSE bug 1086457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087092">SUSE bug 1087092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089066">SUSE bug 1089066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090888">SUSE bug 1090888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091171">SUSE bug 1091171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091860">SUSE bug 1091860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096254">SUSE bug 1096254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096748">SUSE bug 1096748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097105">SUSE bug 1097105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098253">SUSE bug 1098253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098822">SUSE bug 1098822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099597">SUSE bug 1099597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099810">SUSE bug 1099810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099811">SUSE bug 1099811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099813">SUSE bug 1099813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099832">SUSE bug 1099832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099844">SUSE bug 1099844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099845">SUSE bug 1099845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099846">SUSE bug 1099846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099849">SUSE bug 1099849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099863">SUSE bug 1099863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099864">SUSE bug 1099864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099922">SUSE bug 1099922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099999">SUSE bug 1099999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100000">SUSE bug 1100000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100001">SUSE bug 1100001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100132">SUSE bug 1100132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101822">SUSE bug 1101822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101841">SUSE bug 1101841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102346">SUSE bug 1102346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102486">SUSE bug 1102486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102715">SUSE bug 1102715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102797">SUSE bug 1102797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103269">SUSE bug 1103269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103445">SUSE bug 1103445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103717">SUSE bug 1103717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104319">SUSE bug 1104319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104485">SUSE bug 1104485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104494">SUSE bug 1104494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104495">SUSE bug 1104495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104683">SUSE bug 1104683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104897">SUSE bug 1104897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105271">SUSE bug 1105271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105292">SUSE bug 1105292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105392">SUSE bug 1105392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105396">SUSE bug 1105396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105524">SUSE bug 1105524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105536">SUSE bug 1105536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105769">SUSE bug 1105769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106016">SUSE bug 1106016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106105">SUSE bug 1106105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106185">SUSE bug 1106185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106229">SUSE bug 1106229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106271">SUSE bug 1106271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106275">SUSE bug 1106275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106276">SUSE bug 1106276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106278">SUSE bug 1106278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106281">SUSE bug 1106281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106283">SUSE bug 1106283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106369">SUSE bug 1106369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106509">SUSE bug 1106509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106511">SUSE bug 1106511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106697">SUSE bug 1106697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106929">SUSE bug 1106929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106934">SUSE bug 1106934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106995">SUSE bug 1106995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107060">SUSE bug 1107060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107078">SUSE bug 1107078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107319">SUSE bug 1107319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107320">SUSE bug 1107320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107735">SUSE bug 1107735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107966">SUSE bug 1107966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963575">SUSE bug 963575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966170">SUSE bug 966170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966172">SUSE bug 966172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969470">SUSE bug 969470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969476">SUSE bug 969476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969477">SUSE bug 969477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970506">SUSE bug 970506</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10876/">CVE-2018-10876 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10876">CVE-2018-10876 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10877/">CVE-2018-10877 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10877">CVE-2018-10877 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10878/">CVE-2018-10878 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10878">CVE-2018-10878 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10879/">CVE-2018-10879 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10879">CVE-2018-10879 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10880/">CVE-2018-10880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10880">CVE-2018-10880 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10881/">CVE-2018-10881 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10881">CVE-2018-10881 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10882/">CVE-2018-10882 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10882">CVE-2018-10882 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10883/">CVE-2018-10883 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10883">CVE-2018-10883 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10902">CVE-2018-10902 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10938">CVE-2018-10938 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-1128/">CVE-2018-1128 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1128">CVE-2018-1128 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1129/">CVE-2018-1129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1129">CVE-2018-1129 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12896/">CVE-2018-12896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12896">CVE-2018-12896 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13093/">CVE-2018-13093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13093">CVE-2018-13093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13094/">CVE-2018-13094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13094">CVE-2018-13094 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13095/">CVE-2018-13095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13095">CVE-2018-13095 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15572/">CVE-2018-15572 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15572">CVE-2018-15572 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16658">CVE-2018-16658 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6554/">CVE-2018-6554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6554">CVE-2018-6554 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6555/">CVE-2018-6555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6555">CVE-2018-6555 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9363/">CVE-2018-9363 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9363">CVE-2018-9363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553144" comment="kernel-default-4.4.155-94.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553145" comment="kernel-default-base-4.4.155-94.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553146" comment="kernel-default-devel-4.4.155-94.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553147" comment="kernel-default-man-4.4.155-94.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520059" comment="kernel-devel-4.4.155-94.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520060" comment="kernel-macros-4.4.155-94.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520061" comment="kernel-source-4.4.155-94.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553148" comment="kernel-syms-4.4.155-94.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149540" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004575.html" source="SUSE-SU"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638)
- Prevent out of bounds reads in message parsing
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17833">CVE-2017-17833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553149" comment="openslp-2.0.0-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545782" comment="openslp-32bit-2.0.0-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553150" comment="openslp-server-2.0.0-18.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149541" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1102003" ref_url="https://bugzilla.suse.com/1102003" source="BUGZILLA"/>
		<reference ref_id="1102004" ref_url="https://bugzilla.suse.com/1102004" source="BUGZILLA"/>
		<reference ref_id="1102005" ref_url="https://bugzilla.suse.com/1102005" source="BUGZILLA"/>
		<reference ref_id="1102007" ref_url="https://bugzilla.suse.com/1102007" source="BUGZILLA"/>
		<reference ref_id="1105592" ref_url="https://bugzilla.suse.com/1105592" source="BUGZILLA"/>
		<reference ref_id="1106855" ref_url="https://bugzilla.suse.com/1106855" source="BUGZILLA"/>
		<reference ref_id="1106858" ref_url="https://bugzilla.suse.com/1106858" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14434" ref_url="https://www.suse.com/security/cve/CVE-2018-14434/" source="CVE"/>
		<reference ref_id="CVE-2018-14435" ref_url="https://www.suse.com/security/cve/CVE-2018-14435/" source="CVE"/>
		<reference ref_id="CVE-2018-14436" ref_url="https://www.suse.com/security/cve/CVE-2018-14436/" source="CVE"/>
		<reference ref_id="CVE-2018-14437" ref_url="https://www.suse.com/security/cve/CVE-2018-14437/" source="CVE"/>
		<reference ref_id="CVE-2018-16323" ref_url="https://www.suse.com/security/cve/CVE-2018-16323/" source="CVE"/>
		<reference ref_id="CVE-2018-16329" ref_url="https://www.suse.com/security/cve/CVE-2018-16329/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004574.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

The following security vulnerabilities were fixed:

- CVE-2018-16329: Prevent NULL pointer dereference in the GetMagickProperty
  function leading to DoS (bsc#1106858)
- CVE-2018-16323: ReadXBMImage left data uninitialized when processing an XBM
  file that has a negative pixel value. If the affected code was used as a
  library loaded into a process that includes sensitive information, that
  information sometimes can be leaked via the image data (bsc#1106855)
- CVE-2018-14434: Fixed a memory leak for a colormap in WriteMPCImage 
  (bsc#1102003)
- CVE-2018-14435: Fixed a memory leak in DecodeImage in coders/pcd.c
  (bsc#1102007)
- CVE-2018-14436: Fixed a memory leak in ReadMIFFImage in coders/miff.c
  (bsc#1102005)
- CVE-2018-14437: Fixed a memory leak in parse8BIM in coders/meta.c
  (bsc#1102004)
- Disable PS, PS2, PS3, XPS and PDF coders in default policy.xml (bsc#1105592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1102003">SUSE bug 1102003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102004">SUSE bug 1102004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102005">SUSE bug 1102005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102007">SUSE bug 1102007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106855">SUSE bug 1106855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106858">SUSE bug 1106858</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14434/">CVE-2018-14434 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14434">CVE-2018-14434 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14435/">CVE-2018-14435 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14435">CVE-2018-14435 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14436/">CVE-2018-14436 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14436">CVE-2018-14436 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14437/">CVE-2018-14437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14437">CVE-2018-14437 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16323/">CVE-2018-16323 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16323">CVE-2018-16323 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16329/">CVE-2018-16329 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16329">CVE-2018-16329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553151" comment="libMagickCore-6_Q16-1-6.8.8.1-71.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553152" comment="libMagickWand-6_Q16-1-6.8.8.1-71.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149542" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1095189" ref_url="https://bugzilla.suse.com/1095189" source="BUGZILLA"/>
		<reference ref_id="1095825" ref_url="https://bugzilla.suse.com/1095825" source="BUGZILLA"/>
		<reference ref_id="1095826" ref_url="https://bugzilla.suse.com/1095826" source="BUGZILLA"/>
		<reference ref_id="1095827" ref_url="https://bugzilla.suse.com/1095827" source="BUGZILLA"/>
		<reference ref_id="1095945" ref_url="https://bugzilla.suse.com/1095945" source="BUGZILLA"/>
		<reference ref_id="1097103" ref_url="https://bugzilla.suse.com/1097103" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11440" ref_url="https://www.suse.com/security/cve/CVE-2018-11440/" source="CVE"/>
		<reference ref_id="CVE-2018-11577" ref_url="https://www.suse.com/security/cve/CVE-2018-11577/" source="CVE"/>
		<reference ref_id="CVE-2018-11683" ref_url="https://www.suse.com/security/cve/CVE-2018-11683/" source="CVE"/>
		<reference ref_id="CVE-2018-11684" ref_url="https://www.suse.com/security/cve/CVE-2018-11684/" source="CVE"/>
		<reference ref_id="CVE-2018-11685" ref_url="https://www.suse.com/security/cve/CVE-2018-11685/" source="CVE"/>
		<reference ref_id="CVE-2018-12085" ref_url="https://www.suse.com/security/cve/CVE-2018-12085/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004576.html" source="SUSE-SU"/>
		<description>
This update for liblouis, python-louis, python3-louis fixes the
following issues:

Security issues fixed:

- CVE-2018-11440: Fixed a stack-based buffer overflow in the function
  parseChars() in compileTranslationTable.c (bsc#1095189)
- CVE-2018-11577: Fixed a segmentation fault in lou_logPrint in logging.c
  (bsc#1095945)
- CVE-2018-11683: Fixed a stack-based buffer overflow in the function
  parseChars() in compileTranslationTable.c (different vulnerability than
  CVE-2018-11440) (bsc#1095827)
- CVE-2018-11684: Fixed stack-based buffer overflow in the function
  includeFile() in compileTranslationTable.c (bsc#1095826)
- CVE-2018-11685: Fixed a stack-based buffer overflow in the function
  compileHyphenation() in compileTranslationTable.c (bsc#1095825)
- CVE-2018-12085: Fixed a stack-based buffer overflow in the function
  parseChars() in compileTranslationTable.c (different vulnerability than
  CVE-2018-11440) (bsc#1097103)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095189">SUSE bug 1095189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095825">SUSE bug 1095825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095826">SUSE bug 1095826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095827">SUSE bug 1095827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095945">SUSE bug 1095945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097103">SUSE bug 1097103</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11440/">CVE-2018-11440 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11440">CVE-2018-11440 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11577/">CVE-2018-11577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11577">CVE-2018-11577 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11683/">CVE-2018-11683 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11683">CVE-2018-11683 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11684/">CVE-2018-11684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11684">CVE-2018-11684 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11685/">CVE-2018-11685 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11685">CVE-2018-11685 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12085/">CVE-2018-12085 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12085">CVE-2018-12085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553153" comment="liblouis-data-2.6.4-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553154" comment="liblouis9-2.6.4-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553155" comment="python-louis-2.6.4-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553156" comment="python3-louis-2.6.4-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149543" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp, zypper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1036304" ref_url="https://bugzilla.suse.com/1036304" source="BUGZILLA"/>
		<reference ref_id="1045735" ref_url="https://bugzilla.suse.com/1045735" source="BUGZILLA"/>
		<reference ref_id="1049825" ref_url="https://bugzilla.suse.com/1049825" source="BUGZILLA"/>
		<reference ref_id="1070851" ref_url="https://bugzilla.suse.com/1070851" source="BUGZILLA"/>
		<reference ref_id="1076192" ref_url="https://bugzilla.suse.com/1076192" source="BUGZILLA"/>
		<reference ref_id="1088705" ref_url="https://bugzilla.suse.com/1088705" source="BUGZILLA"/>
		<reference ref_id="1091624" ref_url="https://bugzilla.suse.com/1091624" source="BUGZILLA"/>
		<reference ref_id="1092413" ref_url="https://bugzilla.suse.com/1092413" source="BUGZILLA"/>
		<reference ref_id="1096803" ref_url="https://bugzilla.suse.com/1096803" source="BUGZILLA"/>
		<reference ref_id="1099847" ref_url="https://bugzilla.suse.com/1099847" source="BUGZILLA"/>
		<reference ref_id="1100028" ref_url="https://bugzilla.suse.com/1100028" source="BUGZILLA"/>
		<reference ref_id="1101349" ref_url="https://bugzilla.suse.com/1101349" source="BUGZILLA"/>
		<reference ref_id="1102429" ref_url="https://bugzilla.suse.com/1102429" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-7685" ref_url="https://www.suse.com/security/cve/CVE-2018-7685/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004582.html" source="SUSE-SU"/>
		<description>
This update for libzypp, zypper fixes the following issues:

Update libzypp to version 16.17.20:

Security issues fixed:

- PackageProvider: Validate deta rpms before caching (bsc#1091624,
  bsc#1088705, CVE-2018-7685)
- PackageProvider: Validate downloaded rpm package signatures before
  caching (bsc#1091624, bsc#1088705, CVE-2018-7685)

Other bugs fixed:

- lsof: use '-K i' if lsof supports it (bsc#1099847, bsc#1036304)
- Handle http error 502 Bad Gateway in curl backend (bsc#1070851)
- RepoManager: Explicitly request repo2solv to generate application
  pseudo packages.
- libzypp-devel should not require cmake (bsc#1101349)
- HardLocksFile: Prevent against empty commit without Target having
  been been loaded (bsc#1096803)
- Avoid zombie tar processes (bsc#1076192)

Update to zypper to version 1.13.45:

Security issues fixed:

- Improve signature check callback messages (bsc#1045735, CVE-2017-9269)
- add/modify repo: Add options to tune the GPG check settings
  (bsc#1045735, CVE-2017-9269)

Other bugs fixed:

- XML &lt;install-summary&gt; attribute `packages-to-change` added (bsc#1102429)
- man: Strengthen that `--config FILE' affects zypper.conf,
  not zypp.conf (bsc#1100028)
- Prevent nested calls to exit() if aborted by a signal (bsc#1092413)
- ansi.h: Prevent ESC sequence strings from going out of scope (bsc#1092413)
- Fix: zypper bash completion expands non-existing options (bsc#1049825)
- Improve signature check callback messages (bsc#1045735)
- add/modify repo: Add options to tune the GPG check settings (bsc#1045735)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036304">SUSE bug 1036304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049825">SUSE bug 1049825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070851">SUSE bug 1070851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076192">SUSE bug 1076192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088705">SUSE bug 1088705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091624">SUSE bug 1091624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092413">SUSE bug 1092413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096803">SUSE bug 1096803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099847">SUSE bug 1099847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100028">SUSE bug 1100028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101349">SUSE bug 1101349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102429">SUSE bug 1102429</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9269">CVE-2017-9269 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7685/">CVE-2018-7685 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7685">CVE-2018-7685 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553157" comment="libzypp-16.17.20-2.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553158" comment="zypper-1.13.45-21.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520075" comment="zypper-log-1.13.45-21.21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149544" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1016715" ref_url="https://bugzilla.suse.com/1016715" source="BUGZILLA"/>
		<reference ref_id="1104826" ref_url="https://bugzilla.suse.com/1104826" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4975" ref_url="https://www.suse.com/security/cve/CVE-2016-4975/" source="CVE"/>
		<reference ref_id="CVE-2016-8743" ref_url="https://www.suse.com/security/cve/CVE-2016-8743/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004583.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

Security issues fixed:

- CVE-2016-8743: Fixed liberal whitespace interpretation accepted from requests
  and sent in response lines and headers. Accepting these different behaviors
  represented a security concern when httpd participates in any chain of
  proxies or interacts with back-end application servers, either through
  mod_proxy or using conventional CGI mechanisms, and may result in request
  smuggling, response splitting and cache pollution. (bsc#1016715)
- CVE-2016-4975: Fixed possible CRLF injection allowing HTTP response splitting
  attacks for sites which use mod_userdir. This issue was mitigated by changes
  which prohibit CR or LF injection into the 'Location' or other outbound
  header key or value. (bsc#1104826)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016715">SUSE bug 1016715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104826">SUSE bug 1104826</bugzilla>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-4975/">CVE-2016-4975 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4975">CVE-2016-4975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8743/">CVE-2016-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8743">CVE-2016-8743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553159" comment="apache2-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530250" comment="apache2-doc-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553160" comment="apache2-example-pages-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553161" comment="apache2-prefork-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553162" comment="apache2-utils-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553163" comment="apache2-worker-2.4.23-29.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149545" version="1" class="patch">
	<metadata>
		<title>Security update for libXcursor (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1103511" ref_url="https://bugzilla.suse.com/1103511" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9262" ref_url="https://www.suse.com/security/cve/CVE-2015-9262/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004592.html" source="SUSE-SU"/>
		<description>
This update for libXcursor fixes the following security issue:

- CVE-2015-9262: _XcursorThemeInherits allowed remote attackers to cause denial
  of service or potentially code execution via a one-byte heap overflow
  (bsc#1103511).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103511">SUSE bug 1103511</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-9262/">CVE-2015-9262 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9262">CVE-2015-9262 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553164" comment="libXcursor1-1.1.14-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553165" comment="libXcursor1-32bit-1.1.14-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149546" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1104668" ref_url="https://bugzilla.suse.com/1104668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2018-12539" ref_url="https://www.suse.com/security/cve/CVE-2018-12539/" source="CVE"/>
		<reference ref_id="CVE-2018-1517" ref_url="https://www.suse.com/security/cve/CVE-2018-1517/" source="CVE"/>
		<reference ref_id="CVE-2018-1656" ref_url="https://www.suse.com/security/cve/CVE-2018-1656/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2964" ref_url="https://www.suse.com/security/cve/CVE-2018-2964/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm to 8.0.5.20 fixes the following security issues:

- CVE-2018-2952: Vulnerability in subcomponent: Concurrency. Difficult to
  exploit vulnerability allowed unauthenticated attacker with network access via
  multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful
  attacks of this vulnerability can result in unauthorized ability to cause a
  partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit
  (bsc#1104668)
- CVE-2018-2940: Vulnerability in subcomponent: Libraries. Easily exploitable
  vulnerability allowed unauthenticated attacker with network access via multiple
  protocols to compromise Java SE, Java SE Embedded. Successful attacks require
  human interaction from a person other than the attacker. Successful attacks of
  this vulnerability can result in unauthorized read access to a subset of Java
  SE, Java SE Embedded accessible data (bsc#1104668)
- CVE-2018-2973: Vulnerability in subcomponent: JSSE. Difficult to exploit
  vulnerability allowed unauthenticated attacker with network access via SSL/TLS
  to compromise Java SE, Java SE Embedded. Successful attacks of this
  vulnerability can result in unauthorized creation, deletion or modification
  access to critical data or all Java SE, Java SE Embedded accessible data
  (bsc#1104668)
- CVE-2018-2964: Vulnerability in subcomponent: Deployment. Difficult to
  exploit vulnerability allowed unauthenticated attacker with network access via
  multiple protocols to compromise Java SE. Successful attacks require human
  interaction from a person other than the attacker. Successful attacks of this
  vulnerability can result in takeover of Java SE. (bsc#1104668)
- CVE-2016-0705: Prevent double free in the dsa_priv_decode function that
  allowed remote attackers to cause a denial of service (memory corruption) or
  possibly have unspecified other impact via a malformed DSA private key
  (bsc#1104668)
- CVE-2017-3732: Prevent carry propagating bug in the x86_64 Montgomery
  squaring procedure (bsc#1104668)
- CVE-2017-3736: Prevent carry propagating bug in the x86_64 Montgomery
  squaring procedure (bsc#1104668)
- CVE-2018-1517: Unspecified vulnerability (bsc#1104668)
- CVE-2018-1656: Unspecified vulnerability (bsc#1104668)
- CVE-2018-12539: Users other than the process owner might have been able to
  use Java Attach API to connect to an IBM JVM on the same machine and use Attach
  API operations, which includes the ability to execute untrusted native code
  (bsc#1104668)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104668">SUSE bug 1104668</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0705">CVE-2016-0705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3732">CVE-2017-3732 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3736">CVE-2017-3736 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12539/">CVE-2018-12539 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12539">CVE-2018-12539 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1517/">CVE-2018-1517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1517">CVE-2018-1517 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1656/">CVE-2018-1656 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1656">CVE-2018-1656 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2940">CVE-2018-2940 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2952">CVE-2018-2952 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2964/">CVE-2018-2964 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2964">CVE-2018-2964 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2973">CVE-2018-2973 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548300" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149547" version="1" class="patch">
	<metadata>
		<title>Security update for ant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1100053" ref_url="https://bugzilla.suse.com/1100053" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10886" ref_url="https://www.suse.com/security/cve/CVE-2018-10886/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004589.html" source="SUSE-SU"/>
		<description>
This update for ant fixes the following issues:

Security issue fixed:

- CVE-2018-10886: Fixed a path traversal vulnerability in malformed zip file
  paths, which allowed arbitrary file writes and could potentially lead to
  code execution (bsc#1100053)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100053">SUSE bug 1100053</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10886/">CVE-2018-10886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-10886">CVE-2018-10886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541627" comment="ant-1.9.4-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149548" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1074186" ref_url="https://bugzilla.suse.com/1074186" source="BUGZILLA"/>
		<reference ref_id="1092480" ref_url="https://bugzilla.suse.com/1092480" source="BUGZILLA"/>
		<reference ref_id="983440" ref_url="https://bugzilla.suse.com/983440" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5319" ref_url="https://www.suse.com/security/cve/CVE-2016-5319/" source="CVE"/>
		<reference ref_id="CVE-2017-17942" ref_url="https://www.suse.com/security/cve/CVE-2017-17942/" source="CVE"/>
		<reference ref_id="CVE-2018-10779" ref_url="https://www.suse.com/security/cve/CVE-2018-10779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004587.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2018-10779: Fixed a heap-based buffer overflow in TIFFWriteScanline()
  in tif_write.c (bsc#1092480)
- CVE-2017-17942: Fixed a heap-based buffer overflow in the function
  PackBitsEncode in tif_packbits.c. (bsc#1074186)
- CVE-2016-5319: Fixed a beap-based buffer overflow in bmp2tiff (bsc#983440)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074186">SUSE bug 1074186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092480">SUSE bug 1092480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983440">SUSE bug 983440</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5319/">CVE-2016-5319 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5319">CVE-2016-5319 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17942/">CVE-2017-17942 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17942">CVE-2017-17942 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10779/">CVE-2018-10779 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10779">CVE-2018-10779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553166" comment="libtiff5-4.0.9-44.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553167" comment="libtiff5-32bit-4.0.9-44.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553168" comment="tiff-4.0.9-44.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149549" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1047002" ref_url="https://bugzilla.suse.com/1047002" source="BUGZILLA"/>
		<reference ref_id="1105437" ref_url="https://bugzilla.suse.com/1105437" source="BUGZILLA"/>
		<reference ref_id="1105459" ref_url="https://bugzilla.suse.com/1105459" source="BUGZILLA"/>
		<reference ref_id="1105460" ref_url="https://bugzilla.suse.com/1105460" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10790" ref_url="https://www.suse.com/security/cve/CVE-2017-10790/" source="CVE"/>
		<reference ref_id="CVE-2018-10844" ref_url="https://www.suse.com/security/cve/CVE-2018-10844/" source="CVE"/>
		<reference ref_id="CVE-2018-10845" ref_url="https://www.suse.com/security/cve/CVE-2018-10845/" source="CVE"/>
		<reference ref_id="CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004593.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

Security issues fixed:

- Improved mitigations against Lucky 13 class of attacks
  - 'Just in Time' PRIME + PROBE cache-based side channel attack can lead to plaintext recovery (CVE-2018-10846, bsc#1105460)
  - HMAC-SHA-384 vulnerable to Lucky thirteen attack due to use of wrong constant (CVE-2018-10845, bsc#1105459)
  - HMAC-SHA-256 vulnerable to Lucky thirteen attack due to not enough dummy function calls (CVE-2018-10844, bsc#1105437)
- The _asn1_check_identifier function in Libtasn1 caused a NULL pointer dereference and crash (CVE-2017-10790, bsc#1047002)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047002">SUSE bug 1047002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105437">SUSE bug 1105437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105459">SUSE bug 1105459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105460">SUSE bug 1105460</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10790/">CVE-2017-10790 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10790">CVE-2017-10790 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10844/">CVE-2018-10844 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10844">CVE-2018-10844 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10845/">CVE-2018-10845 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10845">CVE-2018-10845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10846">CVE-2018-10846 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553169" comment="gnutls-3.3.27-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553170" comment="libgnutls-openssl27-3.3.27-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553171" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553172" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149550" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1105434" ref_url="https://bugzilla.suse.com/1105434" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000222" ref_url="https://www.suse.com/security/cve/CVE-2018-1000222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004588.html" source="SUSE-SU"/>
		<description>
This update for gd fixes the following issues:

Security issue fixed:

- CVE-2018-1000222: Fixed a double free vulnerability in gdImageBmpPtr() that
  could result in remote code execution. This could have been exploited via a
  specially crafted JPEG image files. (bsc#1105434)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1105434">SUSE bug 1105434</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000222/">CVE-2018-1000222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000222">CVE-2018-1000222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553173" comment="gd-2.1.0-24.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149551" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1106914" ref_url="https://bugzilla.suse.com/1106914" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:2835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004586.html" source="SUSE-SU"/>
		<description>
This update for shadow fixes the following security issue:

- Prevent useradd from creating intermediate directories with mode 0777 (bsc#1106914)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106914">SUSE bug 1106914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553174" comment="shadow-4.2.1-27.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149552" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1015342" ref_url="https://bugzilla.suse.com/1015342" source="BUGZILLA"/>
		<reference ref_id="1015343" ref_url="https://bugzilla.suse.com/1015343" source="BUGZILLA"/>
		<reference ref_id="1017967" ref_url="https://bugzilla.suse.com/1017967" source="BUGZILLA"/>
		<reference ref_id="1019695" ref_url="https://bugzilla.suse.com/1019695" source="BUGZILLA"/>
		<reference ref_id="1019699" ref_url="https://bugzilla.suse.com/1019699" source="BUGZILLA"/>
		<reference ref_id="1020412" ref_url="https://bugzilla.suse.com/1020412" source="BUGZILLA"/>
		<reference ref_id="1021121" ref_url="https://bugzilla.suse.com/1021121" source="BUGZILLA"/>
		<reference ref_id="1022604" ref_url="https://bugzilla.suse.com/1022604" source="BUGZILLA"/>
		<reference ref_id="1024361" ref_url="https://bugzilla.suse.com/1024361" source="BUGZILLA"/>
		<reference ref_id="1024365" ref_url="https://bugzilla.suse.com/1024365" source="BUGZILLA"/>
		<reference ref_id="1024376" ref_url="https://bugzilla.suse.com/1024376" source="BUGZILLA"/>
		<reference ref_id="1027968" ref_url="https://bugzilla.suse.com/1027968" source="BUGZILLA"/>
		<reference ref_id="1030552" ref_url="https://bugzilla.suse.com/1030552" source="BUGZILLA"/>
		<reference ref_id="1033962" ref_url="https://bugzilla.suse.com/1033962" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1048317" ref_url="https://bugzilla.suse.com/1048317" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1053685" ref_url="https://bugzilla.suse.com/1053685" source="BUGZILLA"/>
		<reference ref_id="1055014" ref_url="https://bugzilla.suse.com/1055014" source="BUGZILLA"/>
		<reference ref_id="1056596" ref_url="https://bugzilla.suse.com/1056596" source="BUGZILLA"/>
		<reference ref_id="1062604" ref_url="https://bugzilla.suse.com/1062604" source="BUGZILLA"/>
		<reference ref_id="1063646" ref_url="https://bugzilla.suse.com/1063646" source="BUGZILLA"/>
		<reference ref_id="1064232" ref_url="https://bugzilla.suse.com/1064232" source="BUGZILLA"/>
		<reference ref_id="1065364" ref_url="https://bugzilla.suse.com/1065364" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068075" ref_url="https://bugzilla.suse.com/1068075" source="BUGZILLA"/>
		<reference ref_id="1069138" ref_url="https://bugzilla.suse.com/1069138" source="BUGZILLA"/>
		<reference ref_id="1078921" ref_url="https://bugzilla.suse.com/1078921" source="BUGZILLA"/>
		<reference ref_id="1080157" ref_url="https://bugzilla.suse.com/1080157" source="BUGZILLA"/>
		<reference ref_id="1083663" ref_url="https://bugzilla.suse.com/1083663" source="BUGZILLA"/>
		<reference ref_id="1085042" ref_url="https://bugzilla.suse.com/1085042" source="BUGZILLA"/>
		<reference ref_id="1085536" ref_url="https://bugzilla.suse.com/1085536" source="BUGZILLA"/>
		<reference ref_id="1085539" ref_url="https://bugzilla.suse.com/1085539" source="BUGZILLA"/>
		<reference ref_id="1086457" ref_url="https://bugzilla.suse.com/1086457" source="BUGZILLA"/>
		<reference ref_id="1087092" ref_url="https://bugzilla.suse.com/1087092" source="BUGZILLA"/>
		<reference ref_id="1089066" ref_url="https://bugzilla.suse.com/1089066" source="BUGZILLA"/>
		<reference ref_id="1090888" ref_url="https://bugzilla.suse.com/1090888" source="BUGZILLA"/>
		<reference ref_id="1091171" ref_url="https://bugzilla.suse.com/1091171" source="BUGZILLA"/>
		<reference ref_id="1091860" ref_url="https://bugzilla.suse.com/1091860" source="BUGZILLA"/>
		<reference ref_id="1092903" ref_url="https://bugzilla.suse.com/1092903" source="BUGZILLA"/>
		<reference ref_id="1096254" ref_url="https://bugzilla.suse.com/1096254" source="BUGZILLA"/>
		<reference ref_id="1096748" ref_url="https://bugzilla.suse.com/1096748" source="BUGZILLA"/>
		<reference ref_id="1097105" ref_url="https://bugzilla.suse.com/1097105" source="BUGZILLA"/>
		<reference ref_id="1098253" ref_url="https://bugzilla.suse.com/1098253" source="BUGZILLA"/>
		<reference ref_id="1098822" ref_url="https://bugzilla.suse.com/1098822" source="BUGZILLA"/>
		<reference ref_id="1099597" ref_url="https://bugzilla.suse.com/1099597" source="BUGZILLA"/>
		<reference ref_id="1099810" ref_url="https://bugzilla.suse.com/1099810" source="BUGZILLA"/>
		<reference ref_id="1099811" ref_url="https://bugzilla.suse.com/1099811" source="BUGZILLA"/>
		<reference ref_id="1099813" ref_url="https://bugzilla.suse.com/1099813" source="BUGZILLA"/>
		<reference ref_id="1099832" ref_url="https://bugzilla.suse.com/1099832" source="BUGZILLA"/>
		<reference ref_id="1099844" ref_url="https://bugzilla.suse.com/1099844" source="BUGZILLA"/>
		<reference ref_id="1099845" ref_url="https://bugzilla.suse.com/1099845" source="BUGZILLA"/>
		<reference ref_id="1099846" ref_url="https://bugzilla.suse.com/1099846" source="BUGZILLA"/>
		<reference ref_id="1099849" ref_url="https://bugzilla.suse.com/1099849" source="BUGZILLA"/>
		<reference ref_id="1099863" ref_url="https://bugzilla.suse.com/1099863" source="BUGZILLA"/>
		<reference ref_id="1099864" ref_url="https://bugzilla.suse.com/1099864" source="BUGZILLA"/>
		<reference ref_id="1099922" ref_url="https://bugzilla.suse.com/1099922" source="BUGZILLA"/>
		<reference ref_id="1099999" ref_url="https://bugzilla.suse.com/1099999" source="BUGZILLA"/>
		<reference ref_id="1100000" ref_url="https://bugzilla.suse.com/1100000" source="BUGZILLA"/>
		<reference ref_id="1100001" ref_url="https://bugzilla.suse.com/1100001" source="BUGZILLA"/>
		<reference ref_id="1100132" ref_url="https://bugzilla.suse.com/1100132" source="BUGZILLA"/>
		<reference ref_id="1101822" ref_url="https://bugzilla.suse.com/1101822" source="BUGZILLA"/>
		<reference ref_id="1101841" ref_url="https://bugzilla.suse.com/1101841" source="BUGZILLA"/>
		<reference ref_id="1102346" ref_url="https://bugzilla.suse.com/1102346" source="BUGZILLA"/>
		<reference ref_id="1102486" ref_url="https://bugzilla.suse.com/1102486" source="BUGZILLA"/>
		<reference ref_id="1102517" ref_url="https://bugzilla.suse.com/1102517" source="BUGZILLA"/>
		<reference ref_id="1102715" ref_url="https://bugzilla.suse.com/1102715" source="BUGZILLA"/>
		<reference ref_id="1102797" ref_url="https://bugzilla.suse.com/1102797" source="BUGZILLA"/>
		<reference ref_id="1103269" ref_url="https://bugzilla.suse.com/1103269" source="BUGZILLA"/>
		<reference ref_id="1103445" ref_url="https://bugzilla.suse.com/1103445" source="BUGZILLA"/>
		<reference ref_id="1104319" ref_url="https://bugzilla.suse.com/1104319" source="BUGZILLA"/>
		<reference ref_id="1104485" ref_url="https://bugzilla.suse.com/1104485" source="BUGZILLA"/>
		<reference ref_id="1104494" ref_url="https://bugzilla.suse.com/1104494" source="BUGZILLA"/>
		<reference ref_id="1104495" ref_url="https://bugzilla.suse.com/1104495" source="BUGZILLA"/>
		<reference ref_id="1104683" ref_url="https://bugzilla.suse.com/1104683" source="BUGZILLA"/>
		<reference ref_id="1104897" ref_url="https://bugzilla.suse.com/1104897" source="BUGZILLA"/>
		<reference ref_id="1105271" ref_url="https://bugzilla.suse.com/1105271" source="BUGZILLA"/>
		<reference ref_id="1105292" ref_url="https://bugzilla.suse.com/1105292" source="BUGZILLA"/>
		<reference ref_id="1105322" ref_url="https://bugzilla.suse.com/1105322" source="BUGZILLA"/>
		<reference ref_id="1105392" ref_url="https://bugzilla.suse.com/1105392" source="BUGZILLA"/>
		<reference ref_id="1105396" ref_url="https://bugzilla.suse.com/1105396" source="BUGZILLA"/>
		<reference ref_id="1105524" ref_url="https://bugzilla.suse.com/1105524" source="BUGZILLA"/>
		<reference ref_id="1105536" ref_url="https://bugzilla.suse.com/1105536" source="BUGZILLA"/>
		<reference ref_id="1105769" ref_url="https://bugzilla.suse.com/1105769" source="BUGZILLA"/>
		<reference ref_id="1106016" ref_url="https://bugzilla.suse.com/1106016" source="BUGZILLA"/>
		<reference ref_id="1106105" ref_url="https://bugzilla.suse.com/1106105" source="BUGZILLA"/>
		<reference ref_id="1106185" ref_url="https://bugzilla.suse.com/1106185" source="BUGZILLA"/>
		<reference ref_id="1106229" ref_url="https://bugzilla.suse.com/1106229" source="BUGZILLA"/>
		<reference ref_id="1106271" ref_url="https://bugzilla.suse.com/1106271" source="BUGZILLA"/>
		<reference ref_id="1106275" ref_url="https://bugzilla.suse.com/1106275" source="BUGZILLA"/>
		<reference ref_id="1106276" ref_url="https://bugzilla.suse.com/1106276" source="BUGZILLA"/>
		<reference ref_id="1106278" ref_url="https://bugzilla.suse.com/1106278" source="BUGZILLA"/>
		<reference ref_id="1106281" ref_url="https://bugzilla.suse.com/1106281" source="BUGZILLA"/>
		<reference ref_id="1106283" ref_url="https://bugzilla.suse.com/1106283" source="BUGZILLA"/>
		<reference ref_id="1106369" ref_url="https://bugzilla.suse.com/1106369" source="BUGZILLA"/>
		<reference ref_id="1106509" ref_url="https://bugzilla.suse.com/1106509" source="BUGZILLA"/>
		<reference ref_id="1106511" ref_url="https://bugzilla.suse.com/1106511" source="BUGZILLA"/>
		<reference ref_id="1106594" ref_url="https://bugzilla.suse.com/1106594" source="BUGZILLA"/>
		<reference ref_id="1106697" ref_url="https://bugzilla.suse.com/1106697" source="BUGZILLA"/>
		<reference ref_id="1106929" ref_url="https://bugzilla.suse.com/1106929" source="BUGZILLA"/>
		<reference ref_id="1106934" ref_url="https://bugzilla.suse.com/1106934" source="BUGZILLA"/>
		<reference ref_id="1106995" ref_url="https://bugzilla.suse.com/1106995" source="BUGZILLA"/>
		<reference ref_id="1107060" ref_url="https://bugzilla.suse.com/1107060" source="BUGZILLA"/>
		<reference ref_id="1107078" ref_url="https://bugzilla.suse.com/1107078" source="BUGZILLA"/>
		<reference ref_id="1107319" ref_url="https://bugzilla.suse.com/1107319" source="BUGZILLA"/>
		<reference ref_id="1107320" ref_url="https://bugzilla.suse.com/1107320" source="BUGZILLA"/>
		<reference ref_id="1107689" ref_url="https://bugzilla.suse.com/1107689" source="BUGZILLA"/>
		<reference ref_id="1107735" ref_url="https://bugzilla.suse.com/1107735" source="BUGZILLA"/>
		<reference ref_id="1107966" ref_url="https://bugzilla.suse.com/1107966" source="BUGZILLA"/>
		<reference ref_id="963575" ref_url="https://bugzilla.suse.com/963575" source="BUGZILLA"/>
		<reference ref_id="966170" ref_url="https://bugzilla.suse.com/966170" source="BUGZILLA"/>
		<reference ref_id="966172" ref_url="https://bugzilla.suse.com/966172" source="BUGZILLA"/>
		<reference ref_id="969470" ref_url="https://bugzilla.suse.com/969470" source="BUGZILLA"/>
		<reference ref_id="969476" ref_url="https://bugzilla.suse.com/969476" source="BUGZILLA"/>
		<reference ref_id="969477" ref_url="https://bugzilla.suse.com/969477" source="BUGZILLA"/>
		<reference ref_id="970506" ref_url="https://bugzilla.suse.com/970506" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10876" ref_url="https://www.suse.com/security/cve/CVE-2018-10876/" source="CVE"/>
		<reference ref_id="CVE-2018-10877" ref_url="https://www.suse.com/security/cve/CVE-2018-10877/" source="CVE"/>
		<reference ref_id="CVE-2018-10878" ref_url="https://www.suse.com/security/cve/CVE-2018-10878/" source="CVE"/>
		<reference ref_id="CVE-2018-10879" ref_url="https://www.suse.com/security/cve/CVE-2018-10879/" source="CVE"/>
		<reference ref_id="CVE-2018-10880" ref_url="https://www.suse.com/security/cve/CVE-2018-10880/" source="CVE"/>
		<reference ref_id="CVE-2018-10881" ref_url="https://www.suse.com/security/cve/CVE-2018-10881/" source="CVE"/>
		<reference ref_id="CVE-2018-10882" ref_url="https://www.suse.com/security/cve/CVE-2018-10882/" source="CVE"/>
		<reference ref_id="CVE-2018-10883" ref_url="https://www.suse.com/security/cve/CVE-2018-10883/" source="CVE"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-10940" ref_url="https://www.suse.com/security/cve/CVE-2018-10940/" source="CVE"/>
		<reference ref_id="CVE-2018-1128" ref_url="https://www.suse.com/security/cve/CVE-2018-1128/" source="CVE"/>
		<reference ref_id="CVE-2018-1129" ref_url="https://www.suse.com/security/cve/CVE-2018-1129/" source="CVE"/>
		<reference ref_id="CVE-2018-12896" ref_url="https://www.suse.com/security/cve/CVE-2018-12896/" source="CVE"/>
		<reference ref_id="CVE-2018-13093" ref_url="https://www.suse.com/security/cve/CVE-2018-13093/" source="CVE"/>
		<reference ref_id="CVE-2018-13094" ref_url="https://www.suse.com/security/cve/CVE-2018-13094/" source="CVE"/>
		<reference ref_id="CVE-2018-13095" ref_url="https://www.suse.com/security/cve/CVE-2018-13095/" source="CVE"/>
		<reference ref_id="CVE-2018-15572" ref_url="https://www.suse.com/security/cve/CVE-2018-15572/" source="CVE"/>
		<reference ref_id="CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658/" source="CVE"/>
		<reference ref_id="CVE-2018-6554" ref_url="https://www.suse.com/security/cve/CVE-2018-6554/" source="CVE"/>
		<reference ref_id="CVE-2018-6555" ref_url="https://www.suse.com/security/cve/CVE-2018-6555/" source="CVE"/>
		<reference ref_id="CVE-2018-9363" ref_url="https://www.suse.com/security/cve/CVE-2018-9363/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 azure kernel was updated to 4.4.155 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-13093: Prevent NULL pointer dereference and panic in lookup_slow()
  on a NULL inode-&gt;i_ops pointer when doing pathwalks on a corrupted xfs image.
  This occured because of a lack of proper validation that cached inodes are free
  during allocation (bnc#1100001)
- CVE-2018-13095: Prevent denial of service (memory corruption and BUG) that
  could have occurred for a corrupted xfs image upon encountering an inode that
  is in extent format, but has more extents than fit in the inode fork
  (bnc#1099999)
- CVE-2018-13094: Prevent OOPS that may have occured for a corrupted xfs image
  after xfs_da_shrink_inode() is called with a NULL bp (bnc#1100000)
- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was
  caused by the way the overrun accounting works. Depending on interval and
  expiry time values, the overrun can be larger than INT_MAX, but the accounting
  is int based. This basically made the accounting values, which are visible to
  user space via timer_getoverrun(2) and siginfo::si_overrun, random. This
  allowed a local user to cause a denial of service (signed integer overflow) via
  crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
  could have been used by local attackers to read kernel memory (bnc#1107689)
- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local
  attackers to use a incorrect bounds check in the CDROM driver
  CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
  denial of service (ias_object use-after-free and system crash) or possibly have
  unspecified other impact via an AF_IRDA socket (bnc#1106511)
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
  local users to cause a denial of service (memory consumption) by repeatedly
  binding an AF_IRDA socket (bnc#1106509)
- CVE-2018-1129: A flaw was found in the way signature calculation was handled
  by cephx authentication protocol. An attacker having access to ceph cluster
  network who is able to alter the message payload was able to bypass signature
  checks done by cephx protocol (bnc#1096748)
- CVE-2018-1128: It was found that cephx authentication protocol did not verify
  ceph clients correctly and was vulnerable to replay attack. Any attacker having
  access to ceph cluster network who is able to sniff packets on network can use
  this vulnerability to authenticate with ceph service and perform actions
  allowed by ceph service (bnc#1096748)
- CVE-2018-10938: A crafted network packet sent remotely by an attacker forced
  the kernel to enter an infinite loop in the cipso_v4_optptr() function leading
  to a denial-of-service (bnc#1106016)
- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill
  RSB upon a context switch, which made it easier for attackers to conduct
  userspace-userspace spectreRSB attacks (bnc#1102517)
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
  (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
  malicious local attacker could have used this for privilege escalation
  (bnc#1105322).
- CVE-2018-9363: Prevent buffer overflow in hidp_process_report (bsc#1105292)
- CVE-2018-10883: A local user could have caused an out-of-bounds write in
  jbd2_journal_dirty_metadata(), a denial of service, and a system crash by
  mounting and operating on a crafted ext4 filesystem image (bsc#1099863)
- CVE-2018-10879: A local user could have caused a use-after-free in
  ext4_xattr_set_entry function and a denial of service or unspecified other
  impact by renaming a file in a crafted ext4 filesystem image (bsc#1099844)
- CVE-2018-10878: A local user could have caused an out-of-bounds write and a
  denial of service or unspecified other impact by mounting and operating a
  crafted ext4 filesystem image (bsc#1099813)
- CVE-2018-10876: A use-after-free was possible in ext4_ext_remove_space()
  function when mounting and operating a crafted ext4 image (bsc#1099811)
- CVE-2018-10877: Prevent out-of-bound access in the ext4_ext_drop_refs()
  function when operating on a crafted ext4 filesystem image (bsc#1099846)
- CVE-2018-10881: A local user could have caused an out-of-bound access in
  ext4_get_group_info function, a denial of service, and a system crash by
  mounting and operating on a crafted ext4 filesystem image (bsc#1099864)
- CVE-2018-10882: A local user could have caused an out-of-bound write, a
  denial of service, and a system crash by unmounting a crafted ext4 filesystem
  image (bsc#1099849)
- CVE-2018-10880: Prevent stack-out-of-bounds write in the ext4 filesystem code
  when mounting and writing to a crafted ext4 image in ext4_update_inline_data().
  An attacker could have used this to cause a system crash and a denial of
  service (bsc#1099845)

The following non-security bugs were fixed:

- 9p/net: Fix zero-copy path in the 9p virtio transport (bnc#1012382).
- 9p/virtio: fix off-by-one error in sg list bounds check (bnc#1012382).
- 9p: fix multiple NULL-pointer-dereferences (bnc#1012382).
- ACPI / LPSS: Add missing prv_offset setting for byt/cht PWM devices (bnc#1012382).
- ACPI / PCI: Bail early in acpi_pci_add_bus() if there is no ACPI handle (bnc#1012382).
- ACPI / PM: save NVS memory for ASUS 1025C laptop (bnc#1012382).
- ACPI: save NVS memory for Lenovo G50-45 (bnc#1012382).
- ALSA: cs5535audio: Fix invalid endian conversion (bnc#1012382).
- ALSA: emu10k1: Rate-limit error messages about page errors (bnc#1012382).
- ALSA: emu10k1: add error handling for snd_ctl_add (bnc#1012382).
- ALSA: fm801: add error handling for snd_ctl_add (bnc#1012382).
- ALSA: hda - Sleep for 10ms after entering D3 on Conexant codecs (bnc#1012382).
- ALSA: hda - Turn CX8200 into D3 as well upon reboot (bnc#1012382).
- ALSA: hda/ca0132: fix build failure when a local macro is defined (bnc#1012382).
- ALSA: hda: Correct Asrock B85M-ITX power_save blacklist entry (bnc#1012382).
- ALSA: memalloc: Do not exceed over the requested size (bnc#1012382).
- ALSA: rawmidi: Change resized buffers atomically (bnc#1012382).
- ALSA: snd-aoa: add of_node_put() in error path (bsc#1099810).
- ALSA: usb-audio: Apply rate limit to warning messages in URB complete callback (bnc#1012382).
- ALSA: virmidi: Fix too long output trigger loop (bnc#1012382).
- ALSA: vx222: Fix invalid endian conversions (bnc#1012382).
- ALSA: vxpocket: Fix invalid endian conversions (bnc#1012382).
- ARC: Enable machine_desc-&gt;init_per_cpu for !CONFIG_SMP (bnc#1012382).
- ARC: Explicitly add -mmedium-calls to CFLAGS (bnc#1012382).
- ARC: Fix CONFIG_SWAP (bnc#1012382).
- ARC: mm: allow mprotect to make stack mappings executable (bnc#1012382).
- ARM: 8780/1: ftrace: Only set kernel memory back to read-only after boot (bnc#1012382).
- ARM: dts: Cygnus: Fix I2C controller interrupt type (bnc#1012382).
- ARM: dts: am3517.dtsi: Disable reference to OMAP3 OTG controller (bnc#1012382).
- ARM: dts: am437x: make edt-ft5x06 a wakeup source (bnc#1012382).
- ARM: dts: da850: Fix interrups property for gpio (bnc#1012382).
- ARM: dts: imx6sx: fix irq for pcie bridge (bnc#1012382).
- ARM: fix put_user() for gcc-8 (bnc#1012382).
- ARM: imx_v4_v5_defconfig: Select ULPI support (bnc#1012382).
- ARM: imx_v6_v7_defconfig: Select ULPI support (bnc#1012382).
- ARM: pxa: irq: fix handling of ICMR registers in suspend/resume (bnc#1012382).
- ARM: tegra: Fix Tegra30 Cardhu PCA954x reset (bnc#1012382).
- ASoC: Intel: cht_bsw_max98090: remove useless code, align with ChromeOS driver.
- ASoC: Intel: cht_bsw_max98090_ti: Fix jack initialization (bnc#1012382).
- ASoC: dpcm: do not merge format from invalid codec dai (bnc#1012382).
- ASoC: dpcm: fix BE dai not hw_free and shutdown (bnc#1012382).
- ASoC: pxa: Fix module autoload for platform drivers (bnc#1012382).
- ASoC: sirf: Fix potential NULL pointer dereference (bnc#1012382).
- Add reference to bsc#1091171 (bnc#1012382; bsc#1091171).
- Bluetooth: avoid killing an already killed socket (bnc#1012382).
- Bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bnc#1012382).
- Bluetooth: btusb: Remove Yoga 920 from the btusb_needs_reset_resume_table (bsc#1087092).
- Bluetooth: btusb: Use DMI matching for QCA reset_resume quirking (bsc#1087092).
- Bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bnc#1012382).
- Documentation/spec_ctrl: Do some minor cleanups (bnc#1012382).
- HID: hid-plantronics: Re-resend Update to map button for PTT products (bnc#1012382).
- HID: i2c-hid: check if device is there before really probing (bnc#1012382).
- HID: wacom: Correct touch maximum XY of 2nd-gen Intuos (bnc#1012382).
- IB/core: Make testing MR flags for writability a static inline function (bnc#1012382).
- IB/core: Remove duplicate declaration of gid_cache_wq (bsc#1056596).
- IB/iser: Do not reduce max_sectors (bsc#1063646).
- IB/mlx4: Fix an error handling path in 'mlx4_ib_rereg_user_mr()'.
- IB/mlx4: Mark user MR as writable if actual virtual memory is writable (bnc#1012382).
- IB/mlx5: Fetch soft WQE's on fatal error state (bsc#1015342 bsc#1015343).
- IB/mlx5: Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1015342 bsc#1015343).
- IB/ocrdma: fix out of bounds access to local buffer (bnc#1012382).
- Input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bnc#1012382).
- Input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bnc#1012382).
- Input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bnc#1012382).
- KVM/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel (bnc#1012382).
- KVM: MMU: always terminate page walks at level 1 (bsc#1062604).
- KVM: MMU: simplify last_pte_bitmap (bsc#1062604).
- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- KVM: arm/arm64: Skip updating PMD entry if no change (bnc#1012382).
- KVM: arm/arm64: Skip updating PTE entry if no change (bnc#1012382).
- KVM: irqfd: fix race between EPOLLHUP and irq_bypass_register_consumer (bnc#1012382).
- KVM: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).
- MIPS: Correct the 64-bit DSP accumulator register size (bnc#1012382).
- MIPS: Fix off-by-one in pci_resource_to_user() (bnc#1012382).
- MIPS: ath79: fix register address in ath79_ddr_wb_flush() (bnc#1012382).
- MIPS: lib: Provide MIPS64r6 __multi3() for GCC &lt; 7 (bnc#1012382).
- NET: stmmac: align DMA stuff to largest cache line length (bnc#1012382).
- PCI: Prevent sysfs disable of device while driver is attached (bnc#1012382).
- PCI: Skip MPS logic for Virtual Functions (VFs) (bnc#1012382).
- PCI: hotplug: Do not leak pci_slot on registration failure (bnc#1012382).
- PCI: pciehp: Fix use-after-free on unplug (bnc#1012382).
- PCI: pciehp: Request control of native hotplug only if supported (bnc#1012382).
- PM / sleep: wakeup: Fix build error caused by missing SRCU support (bnc#1012382).
- RDMA/i40iw: Avoid panic when objects are being created and destroyed (bsc#969476 bsc#969477).
- RDMA/i40iw: Avoid panic when reading back the IRQ affinity hint (bsc#969476 bsc#969477).
- RDMA/i40iw: Avoid reference leaks when processing the AEQ (bsc#969476 bsc#969477).
- RDMA/i40w: Hold read semaphore while looking after VMA (bsc#1024376).
- RDMA/mad: Convert BUG_ONs to error flows (bnc#1012382).
- RDMA/mlx5: Use proper spec flow label type (bsc#1015342 bsc#1015343).
- Revert 'MIPS: BCM47XX: Enable 74K Core ExternalSync for PCIe erratum' (bnc#1012382).
- Revert 'UBIFS: Fix potential integer overflow in allocation' (bnc#1012382).
- Revert 'f2fs: handle dirty segments inside refresh_sit_entry' (bsc#1106281).
- Revert 'mm: page_alloc: skip over regions of invalid pfns where possible' (bnc#1107078).
- Revert 'net: Do not copy pfmemalloc flag in __copy_skb_header()' (kabi).
- Revert 'netfilter: ipv6: nf_defrag: reduce struct net memory waste' (kabi).
- Revert 'skbuff: Unconditionally copy pfmemalloc in __skb_clone()' (kabi).
- Revert 'vsock: split dwork to avoid reinitializations' (kabi).
- Revert 'x86/mm: Give each mm TLB flush generation a unique ID' (kabi).
- Revert 'x86/speculation/l1tf: Fix up CPU feature flags' (kabi).
- Revert 'x86/speculation: Use Indirect Branch Prediction Barrier in context switch' (kabi).
- Smack: Mark inode instant in smack_task_to_inode (bnc#1012382).
- USB: musb: fix external abort on suspend (bsc#1085536).
- USB: option: add support for DW5821e (bnc#1012382).
- USB: serial: metro-usb: stop I/O after failed open (bsc#1085539).
- USB: serial: sierra: fix potential deadlock at close (bnc#1012382).
- Workaround kABI breakage by __must_check drop of strscpy() (bsc#1107319).
- afs: Fix directory permissions check (bsc#1106283).
- arc: fix build errors in arc/include/asm/delay.h (bnc#1012382).
- arc: fix type warnings in arc/mm/cache.c (bnc#1012382).
- arm64: make secondary_start_kernel() notrace (bnc#1012382).
- arm64: mm: check for upper PAGE_SHIFT bits in pfn_valid() (bnc#1012382).
- ath: Add regulatory mapping for APL13_WORLD (bnc#1012382).
- ath: Add regulatory mapping for APL2_FCCA (bnc#1012382).
- ath: Add regulatory mapping for Bahamas (bnc#1012382).
- ath: Add regulatory mapping for Bermuda (bnc#1012382).
- ath: Add regulatory mapping for ETSI8_WORLD (bnc#1012382).
- ath: Add regulatory mapping for FCC3_ETSIC (bnc#1012382).
- ath: Add regulatory mapping for Serbia (bnc#1012382).
- ath: Add regulatory mapping for Tanzania (bnc#1012382).
- ath: Add regulatory mapping for Uganda (bnc#1012382).
- atl1c: reserve min skb headroom (bnc#1012382).
- atm: Preserve value of skb-&gt;truesize when accounting to vcc (bsc#1089066).
- audit: allow not equal op for audit by executable (bnc#1012382).
- backlight: as3711_bl: Fix Device Tree node leaks (bsc#1106929).
- backlight: lm3630a: Bump REG_MAX value to 0x50 instead of 0x1F (bsc#1106929).
- bcache: avoid unncessary cache prefetch bch_btree_node_get() (bsc#1064232).
- bcache: calculate the number of incremental GC nodes according to the total of btree nodes (bsc#1064232).
- bcache: display rate debug parameters to 0 when writeback is not running (bsc#1064232).
- bcache: do not check return value of debugfs_create_dir() (bsc#1064232).
- bcache: finish incremental GC (bsc#1064232).
- bcache: fix I/O significant decline while backend devices registering (bsc#1064232).
- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064232).
- bcache: free heap cache_set-&gt;flush_btree in bch_journal_free (bsc#1064232).
- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section (bsc#1064232).
- bcache: release dc-&gt;writeback_lock properly in bch_writeback_thread() (bsc#1064232).
- bcache: set max writeback rate when I/O request is idle (bsc#1064232).
- bcache: simplify the calculation of the total amount of flash dirty data (bsc#1064232).
- be2net: remove unused old custom busy-poll fields (bsc#1021121 ).
- blkdev: __blkdev_direct_IO_simple: fix leak in error case (bsc#1083663).
- block: bio_iov_iter_get_pages: fix size of last iovec (bsc#1083663).
- block: bio_iov_iter_get_pages: pin more pages for multi-segment IOs (bsc#1083663).
- block: do not use interruptible wait anywhere (bnc#1012382).
- bnx2x: Fix invalid memory access in rss hash config path (bnc#1012382).
- bnx2x: Fix receiving tx-timeout in error or recovery state (bnc#1012382).
- bnxt_en: Always set output parameters in bnxt_get_max_rings() (bsc#963575).
- bnxt_en: Fix for system hang if request_irq fails (bnc#1012382).
- bnxt_en: Fix inconsistent BNXT_FLAG_AGG_RINGS logic (bsc#1020412 ).
- bpf: fix references to free_bpf_prog_info() in comments (bnc#1012382).
- brcmfmac: Add support for bcm43364 wireless chipset (bnc#1012382).
- brcmfmac: stop watchdog before detach and free everything (bnc#1012382).
- bridge: Propagate vlan add failure to user (bnc#1012382).
- btrfs: Do not remove block group still has pinned down bytes (bsc#1086457).
- btrfs: add barriers to btrfs_sync_log before log_commit_wait wakeups (bnc#1012382).
- btrfs: do not leak ret from do_chunk_alloc (bnc#1012382).
- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bnc#1012382).
- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf.
- btrfs: round down size diff when shrinking/growing device (bsc#1097105).
- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bnc#1012382).
- can: mpc5xxx_can: check of_iomap return before use (bnc#1012382).
- can: xilinx_can: fix RX loop if RXNEMP is asserted without RXOK (bnc#1012382).
- can: xilinx_can: fix RX overflow interrupt not being enabled (bnc#1012382).
- can: xilinx_can: fix device dropping off bus on RX overrun (bnc#1012382).
- can: xilinx_can: fix incorrect clear of non-processed interrupts (bnc#1012382).
- can: xilinx_can: fix recovery from error states not being propagated (bnc#1012382).
- can: xilinx_can: keep only 1-2 frames in TX FIFO to fix TX accounting (bnc#1012382).
- cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status (bnc#1012382).
- ceph: fix incorrect use of strncpy (bsc#1107319).
- ceph: return errors from posix_acl_equiv_mode() correctly (bsc#1107320).
- cifs: Fix stack out-of-bounds in smb{2,3}_create_lease_buf() (bsc#1012382).
- cifs: add missing debug entries for kconfig options (bnc#1012382).
- cifs: check kmalloc before use (bsc#1012382).
- cifs: store the leaseKey in the fid on SMB2_open (bsc#1012382).
- clk: tegra: Fix PLL_U post divider and initial rate on Tegra30 (bnc#1012382).
- crypto: ablkcipher - fix crash flushing dcache in error path (bnc#1012382).
- crypto: authenc - do not leak pointers to authenc keys (bnc#1012382).
- crypto: authencesn - do not leak pointers to authenc keys (bnc#1012382).
- crypto: blkcipher - fix crash flushing dcache in error path (bnc#1012382).
- crypto: padlock-aes - Fix Nano workaround data corruption (bnc#1012382).
- crypto: vmac - require a block cipher with 128-bit block size (bnc#1012382).
- crypto: vmac - separate tfm and request context (bnc#1012382).
- crypto: vmx - Fix sleep-in-atomic bugs (bsc#1048317).
- cxgb4: when disabling dcb set txq dcb priority to 0 (bnc#1012382).
- cxl: Fix wrong comparison in cxl_adapter_context_get() (bsc#1055014).
- dccp: fix undefined behavior with 'cwnd' shift in ccid2_cwnd_restart() (bnc#1012382).
- disable loading f2fs module on PAGE_SIZE &gt; 4KB (bnc#1012382).
- dm cache metadata: save in-core policy_hint_size to on-disk superblock (bnc#1012382).
- dma-iommu: Fix compilation when !CONFIG_IOMMU_DMA (bnc#1012382).
- dmaengine: k3dma: Off by one in k3_of_dma_simple_xlate() (bnc#1012382).
- dmaengine: pxa_dma: remove duplicate const qualifier (bnc#1012382).
- driver core: Partially revert 'driver core: correct device's shutdown order' (bnc#1012382).
- drivers: net: lmc: fix case value for target abort error (bnc#1012382).
- drm/armada: fix colorkey mode property (bnc#1012382).
- drm/atmel-hlcdc: check stride values in the first plane (bsc#1106929).
- drm/atomic: Handling the case when setting old crtc for plane (bnc#1012382).
- drm/bridge: adv7511: Reset registers on hotplug (bnc#1012382).
- drm/cirrus: Use drm_framebuffer_put to avoid kernel oops in clean-up (bsc#1101822).
- drm/drivers: add support for using the arch wc mapping API.
- drm/exynos/dsi: mask frame-done interrupt (bsc#1106929).
- drm/exynos: decon5433: Fix WINCONx reset value (bnc#1012382).
- drm/exynos: decon5433: Fix per-plane global alpha for XRGB modes (bnc#1012382).
- drm/exynos: gsc: Fix support for NV16/61, YUV420/YVU420 and YUV422 modes (bnc#1012382).
- drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bnc#1012382).
- drm/i915/userptr: reject zero user_size (bsc#1090888).
- drm/i915: Correctly handle limited range YCbCr data on VLV/CHV (bsc#1087092).
- drm/imx: fix typo in ipu_plane_formats (bsc#1106929).
- drm/imx: imx-ldb: check if channel is enabled before printing warning (bnc#1012382).
- drm/imx: imx-ldb: disable LDB on driver bind (bnc#1012382).
- drm/msm/hdmi: Use bitwise operators when building register values (bsc#1106929).
- drm/nouveau/gem: off by one bugs in nouveau_gem_pushbuf_reloc_apply() (bnc#1012382).
- drm/panel: type promotion bug in s6e8aa0_read_mtp_id() (bsc#1105769).
- drm/radeon: fix mode_valid's return type (bnc#1012382).
- drm: Add DP PSR2 sink enable bit (bnc#1012382).
- drm: Reject getfb for multi-plane framebuffers (bsc#1106929).
- enic: do not call enic_change_mtu in enic_probe.
- enic: handle mtu change for vf properly (bnc#1012382).
- enic: initialize enic-&gt;rfs_h.lock in enic_probe (bnc#1012382).
- ext4: check for NUL characters in extended attribute's name (bnc#1012382).
- ext4: check for allocation block validity with block group locked (bsc#1104495).
- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).
- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).
- ext4: fix inline data updates with checksums enabled (bsc#1104494).
- ext4: fix spectre gadget in ext4_mb_regular_allocator() (bnc#1012382).
- ext4: reset error code in ext4_find_entry in fallback (bnc#1012382).
- ext4: sysfs: print ext4_super_block fields as little-endian (bsc#1106229).
- f2fs: fix to do not trigger writeback during recovery (bnc#1012382).
- fat: fix memory allocation failure handling of match_strdup() (bnc#1012382).
- fb: fix lost console when the user unplugs a USB adapter (bnc#1012382).
- fbdev: omapfb: off by one in omapfb_register_client() (bsc#1106929).
- fix __legitimize_mnt()/mntput() race (bnc#1012382).
- fix mntput/mntput race (bnc#1012382).
- fork: unconditionally clear stack on fork (bnc#1012382).
- fs/9p/xattr.c: catch the error of p9_client_clunk when setting xattr failed (bnc#1012382).
- fs/dax.c: fix inefficiency in dax_writeback_mapping_range() (bsc#1106185).
- fs/quota: Fix spectre gadget in do_quotactl (bnc#1012382).
- fs: aio: fix the increment of aio-nr and counting against aio-max-nr (bsc#1068075, bsc#1078921).
- fuse: Add missed unlock_page() to fuse_readpages_fill() (bnc#1012382).
- fuse: Do not access pipe-&gt;buffers without pipe_lock() (bnc#1012382).
- fuse: Fix oops at process_init_reply() (bnc#1012382).
- fuse: fix double request_end() (bnc#1012382).
- fuse: fix unlocked access to processing queue (bnc#1012382).
- fuse: umount should wait for all requests (bnc#1012382).
- genirq/proc: Return proper error code when irq_set_affinity() fails (bnc#1105392).
- getxattr: use correct xattr length (bnc#1012382).
- hfsplus: Do not clear SGID when inheriting ACLs (bsc#1030552).
- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bnc#1012382).
- hwrng: exynos - Disable runtime PM on driver unbind.
- i2c: davinci: Avoid zero value of CLKH (bnc#1012382).
- i2c: imx: Fix race condition in dma read (bnc#1012382).
- i2c: imx: Fix reinit_completion() use (bnc#1012382).
- i2c: ismt: fix wrong device address when unmap the data buffer (bnc#1012382).
- i40e: use cpumask_copy instead of direct assignment (bsc#1053685).
- i40iw: Fix memory leak in error path of create QP (bsc#969476 bsc#969477).
- i40iw: Use correct address in dst_neigh_lookup for IPv6 (bsc#969476 bsc#969477).
- ibmvnic: Include missing return code checks in reset function (bnc#1107966).
- ieee802154: at86rf230: switch from BUG_ON() to WARN_ON() on problem (bnc#1012382).
- ieee802154: at86rf230: use __func__ macro for debug messages (bnc#1012382).
- ieee802154: fakelb: switch from BUG_ON() to WARN_ON() on problem (bnc#1012382).
- igb: Fix not adding filter elements to the list (bsc#1024361 bsc#1024365).
- iio: ad9523: Fix displayed phase (bnc#1012382).
- iio: ad9523: Fix return value for ad952x_store() (bnc#1012382).
- inet: frag: enforce memory limits earlier (bnc#1012382 bsc#970506).
- iommu/amd: make sure TLB to be flushed before IOVA freed (bsc#1106105).
- iommu/vt-d: Add definitions for PFSID (bnc#1012382).
- iommu/vt-d: Fix dev iotlb pfsid use (bnc#1012382).
- iommu/vt-d: Ratelimit each dmar fault printing (bsc#1106105).
- ioremap: Update pgtable free interfaces with addr (bnc#1012382).
- ip: hash fragments consistently (bnc#1012382).
- ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull (bnc#1012382).
- ipconfig: Correctly initialise ic_nameservers (bnc#1012382).
- ipv4+ipv6: Make INET*_ESP select CRYPTO_ECHAINIV (bnc#1012382).
- ipv4: Return EINVAL when ping_group_range sysctl does not map to user ns (bnc#1012382).
- ipv4: remove BUG_ON() from fib_compute_spec_dst (bnc#1012382).
- ipv6: fix useless rol32 call on hash (bnc#1012382).
- ipv6: mcast: fix unsolicited report interval after receiving querys (bnc#1012382).
- ipvlan: use ETH_MAX_MTU as max mtu (bsc#1033962).
- iscsi target: fix session creation failure handling (bnc#1012382).
- isdn: Disable IIOCDBGVAR (bnc#1012382).
- iw_cxgb4: remove duplicate memcpy() in c4iw_create_listen() (bsc#969476 bsc#969477).
- iwlwifi: pcie: fix race in Rx buffer allocator (bnc#1012382).
- ixgbe: Be more careful when modifying MAC filters (bnc#1012382).
- jfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- jump_label: Add RELEASE barrier after text changes (bsc#1105271).
- jump_label: Fix concurrent static_key_enable/disable() (bsc#1105271).
- jump_label: Move CPU hotplug locking (bsc#1105271).
- jump_label: Provide hotplug context variants (bsc#1105271).
- jump_label: Reduce the size of struct static_key (bsc#1105271).
- jump_label: Reorder hotplug lock and jump_label_lock (bsc#1105271).
- jump_label: Split out code under the hotplug lock (bsc#1105271).
- jump_label: remove bug.h, atomic.h dependencies for HAVE_JUMP_LABEL (bsc#1105271).
- kABI: protect enum tcp_ca_event (kabi).
- kABI: reexport tcp_send_ack (kabi).
- kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kasan: do not emit builtin calls when sanitization is off (bnc#1012382).
- kasan: fix shadow_size calculation error in kasan_module_alloc (bnc#1012382).
- kbuild: verify that $DEPMOD is installed (bnc#1012382).
- kernel: improve spectre mitigation (bnc#1106934, LTC#171029).
- kprobes/x86: Fix %p uses in error messages (bnc#1012382).
- kprobes: Make list and blacklist root user read only (bnc#1012382).
- kthread, tracing: Do not expose half-written comm when creating kthreads (bsc#1104897).
- kvm: x86: vmx: fix vpid leak (bnc#1012382).
- l2tp: use sk_dst_check() to avoid race on sk-&gt;sk_dst_cache (bnc#1012382).
- lib/rhashtable: consider param-&gt;min_size when setting initial table size (bnc#1012382).
- libata: Fix command retry decision (bnc#1012382).
- libceph: check authorizer reply/challenge length before reading (bsc#1096748).
- libceph: factor out __ceph_x_decrypt() (bsc#1096748).
- libceph: factor out __prepare_write_connect() (bsc#1096748).
- libceph: factor out encrypt_authorizer() (bsc#1096748).
- libceph: store ceph_auth_handshake pointer in ceph_connection (bsc#1096748).
- libceph: weaken sizeof check in ceph_x_verify_authorizer_reply() (bsc#1096748).
- llc: use refcount_inc_not_zero() for llc_sap_find() (bnc#1012382).
- locking/lockdep: Do not record IRQ state within lockdep code (bnc#1012382).
- locks: pass inode pointer to locks_free_lock_context (bsc@1099832).
- locks: prink more detail when there are leaked locks (bsc#1099832).
- locks: restore a warn for leaked locks on close (bsc#1099832).
- m68k: fix 'bad page state' oops on ColdFire boot (bnc#1012382).
- mac80211: add stations tied to AP_VLANs during hw reconfig (bnc#1012382).
- md/raid10: fix that replacement cannot complete recovery after reassemble (bnc#1012382).
- md: fix NULL dereference of mddev-&gt;pers in remove_and_add_spares() (bnc#1012382).
- media: omap3isp: fix unbalanced dma_iommu_mapping (bnc#1012382).
- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bnc#1012382).
- media: rtl28xxu: be sure that it won't go past the array size (bsc#1050431).
- media: s5p-jpeg: fix number of components macro (bsc#1050431).
- media: saa7164: Fix driver name in debug output (bnc#1012382).
- media: si470x: fix __be16 annotations (bnc#1012382).
- media: siano: get rid of __le32/__le16 cast warnings (bnc#1012382).
- media: staging: omap4iss: Include asm/cacheflush.h after generic includes (bnc#1012382).
- media: videobuf2-core: do not call memop 'finish' when queueing (bnc#1012382).
- memory: tegra: Apply interrupts mask per SoC (bnc#1012382).
- memory: tegra: Do not handle spurious interrupts (bnc#1012382).
- mfd: cros_ec: Fail early if we cannot identify the EC (bnc#1012382).
- microblaze: Fix simpleImage format generation (bnc#1012382).
- mm/hugetlb: filter out hugetlb pages if HUGEPAGE migration is not supported (bnc#1106697).
- mm/memory.c: check return value of ioremap_prot (bnc#1012382).
- mm/slub.c: add __printf verification to slab_err() (bnc#1012382).
- mm/tlb: Remove tlb_remove_table() non-concurrent condition (bnc#1012382).
- mm: Add vm_insert_pfn_prot() (bnc#1012382).
- mm: fix cache mode tracking in vm_insert_mixed() (bnc#1012382).
- mm: memcg: fix use after free in mem_cgroup_iter() (bnc#1012382).
- mm: vmalloc: avoid racy handling of debugobjects in vunmap (bnc#1012382).
- mm: x86: move _PAGE_SWP_SOFT_DIRTY from bit 7 to bit 1 (bnc#1012382).
- mtd: rawnand: fsl_ifc: fix FSL NAND driver to read all ONFI parameter pages (bnc#1012382).
- mtd: ubi: wl: Fix error return code in ubi_wl_init().
- mwifiex: correct histogram data with appropriate index (bnc#1012382).
- mwifiex: handle race during mwifiex_usb_disconnect (bnc#1012382).
- net/9p/client.c: version pointer uninitialized (bnc#1012382).
- net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree() (bnc#1012382).
- net/ethernet/freescale/fman: fix cross-build error (bnc#1012382).
- net/ipv4: Set oif in fib_compute_spec_dst (bnc#1012382).
- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bnc#1012382).
- net/mlx5: Add missing SET_DRIVER_VERSION command translation (bsc#1015342 bsc#1015343).
- net/mlx5: E-Switch, Include VF RDMA stats in vport statistics (bsc#966170 bsc#966172).
- net/mlx5: Eswitch, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1015342 bsc#1015343).
- net/mlx5: Fix wrong size allocation for QoS ETC TC regitster (bsc#966170 bsc#966172).
- net/mlx5: Vport, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#966170 bsc#966172).
- net/mlx5e: Do not allow aRFS for encapsulated packets (bsc#1015342 bsc#1015343).
- net/mlx5e: Err if asked to offload TC match on frag being first (bsc#1015342 bsc#1015343).
- net/mlx5e: Fix quota counting in aRFS expire flow (bsc#1015342 bsc#1015343).
- net/mlx5e: Refine ets validation function (bsc#966170 bsc#966172).
- net: 6lowpan: fix reserved space for single frames (bnc#1012382).
- net: Do not copy pfmemalloc flag in __copy_skb_header() (bnc#1012382).
- net: add skb_condense() helper (bsc#1089066).
- net: adjust skb-&gt;truesize in ___pskb_trim() (bsc#1089066).
- net: adjust skb-&gt;truesize in pskb_expand_head() (bsc#1089066).
- net: axienet: Fix double deregister of mdio (bnc#1012382).
- net: caif: Add a missing rcu_read_unlock() in caif_flow_cb (bnc#1012382).
- net: davinci_emac: match the mdio device against its compatible if possible (bnc#1012382).
- net: dsa: Do not suspend/resume closed slave_dev (bnc#1012382).
- net: ena: Fix use of uninitialized DMA address bits field (bsc#1027968).
- net: fix amd-xgbe flow-control issue (bnc#1012382).
- net: hamradio: use eth_broadcast_addr (bnc#1012382).
- net: lan78xx: Fix misplaced tasklet_schedule() call (bnc#1012382).
- net: lan78xx: fix rx handling before first packet is send (bnc#1012382).
- net: mac802154: tx: expand tailroom if necessary (bnc#1012382).
- net: phy: fix flag masking in __set_phy_supported (bnc#1012382).
- net: prevent ISA drivers from building on PPC32 (bnc#1012382).
- net: propagate dev_get_valid_name return code (bnc#1012382).
- net: qca_spi: Avoid packet drop during initial sync (bnc#1012382).
- net: qca_spi: Fix log level if probe fails (bnc#1012382).
- net: qca_spi: Make sure the QCA7000 reset is triggered (bnc#1012382).
- net: socket: fix potential spectre v1 gadget in socketcall (bnc#1012382).
- net: usb: rtl8150: demote allmulti message to dev_dbg() (bnc#1012382).
- net: vmxnet3: use new api ethtool_{get|set}_link_ksettings (bsc#1091860 bsc#1098253).
- net_sched: Fix missing res info when create new tc_index filter (bnc#1012382).
- net_sched: fix NULL pointer dereference when delete tcindex filter (bnc#1012382).
- netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state (bnc#1012382).
- netfilter: ipset: List timing out entries with 'timeout 1' instead of zero (bnc#1012382).
- netfilter: ipv6: nf_defrag: reduce struct net memory waste (bnc#1012382).
- netfilter: ipvs: do not create conn for ABORT packet in sctp_conn_schedule (bsc#1102797).
- netfilter: ipvs: fix the issue that sctp_conn_schedule drops non-INIT packet (bsc#1102797).
- netfilter: x_tables: set module owner for icmp(6) matches (bnc#1012382).
- netlink: Do not shift on 64 for ngroups (bnc#1012382).
- netlink: Do not shift with UB on nlk-&gt;ngroups (bnc#1012382).
- netlink: Do not subscribe to non-existent groups (bnc#1012382).
- netlink: Fix spectre v1 gadget in netlink_create() (bnc#1012382).
- netlink: do not enter direct reclaim from netlink_trim() (bsc#1042286).
- nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (bnc#1012382).
- nl80211: Add a missing break in parse_station_flags (bnc#1012382).
- nohz: Fix local_timer_softirq_pending() (bnc#1012382).
- nvme-fc: release io queues to allow fast fail (bsc#1102486).
- nvme: if_ready checks to fail io to deleting controller (bsc#1102486).
- nvme: kABI-compliant version of nvmf_fail_nonready_command() (bsc#1102486).
- nvmet-fc: fix target sgl list on large transfers (bsc#1102486).
- osf_getdomainname(): use copy_to_user() (bnc#1012382).
- ovl: Do d_type check only if work dir creation was successful (bnc#1012382).
- ovl: Ensure upper filesystem supports d_type (bnc#1012382).
- ovl: warn instead of error if d_type is not supported (bnc#1012382).
- packet: refine ring v3 block size test to hold one frame (bnc#1012382).
- packet: reset network header if packet shorter than ll reserved space (bnc#1012382).
- parisc: Define mb() and add memory barriers to assembler unlock sequences (bnc#1012382).
- parisc: Enable CONFIG_MLONGCALLS by default (bnc#1012382).
- parisc: Remove ordered stores from syscall.S (bnc#1012382).
- parisc: Remove unnecessary barriers from spinlock.h (bnc#1012382).
- perf auxtrace: Fix queue resize (bnc#1012382).
- perf llvm-utils: Remove bashism from kernel include fetch script (bnc#1012382).
- perf report powerpc: Fix crash if callchain is empty (bnc#1012382).
- perf test session topology: Fix test on s390 (bnc#1012382).
- perf/x86/intel/uncore: Correct fixed counter index check for NHM (bnc#1012382).
- perf/x86/intel/uncore: Correct fixed counter index check in generic code (bnc#1012382).
- perf: fix invalid bit in diagnostic entry (bnc#1012382).
- pinctrl: at91-pio4: add missing of_node_put (bnc#1012382).
- pinctrl: freescale: off by one in imx1_pinconf_group_dbg_show() (bnc#1012382).
- pnfs/blocklayout: off by one in bl_map_stripe() (bnc#1012382).
- powerpc/32: Add a missing include header (bnc#1012382).
- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032).
- powerpc/64s: Fix compiler store ordering to SLB shadow area (bnc#1012382).
- powerpc/8xx: fix invalid register expression in head_8xx.S (bnc#1012382).
- powerpc/chrp/time: Make some functions static, add missing header include (bnc#1012382).
- powerpc/embedded6xx/hlwd-pic: Prevent interrupts from being handled by Starlet (bnc#1012382).
- powerpc/fadump: handle crash memory ranges array index overflow (bsc#1103269).
- powerpc/fadump: merge adjacent memory ranges to reduce PT_LOAD segements (bsc#1103269).
- powerpc/lib: Fix the feature fixup tests to actually work (bsc#1066223).
- powerpc/powermac: Add missing prototype for note_bootable_part() (bnc#1012382).
- powerpc/powermac: Mark variable x as unused (bnc#1012382).
- powerpc/pseries: Fix endianness while restoring of r3 in MCE handler (bnc#1012382).
- powerpc/topology: Get topology for shared processors at boot (bsc#1104683).
- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157).
- powerpc: Avoid code patching freed init sections (bnc#1107735).
- powerpc: make feature-fixup tests fortify-safe (bsc#1066223).
- provide special timeout module parameters for EC2 (bsc#1065364).
- ptp: fix missing break in switch (bnc#1012382).
- pwm: tiehrpwm: Fix disabling of output of PWMs (bnc#1012382).
- qed: Add sanity check for SIMD fastpath handler (bnc#1012382).
- qed: Correct Multicast API to reflect existence of 256 approximate buckets (bsc#1019695 bsc#1019699 bsc#1022604).
- qed: Do not advertise DCBX_LLD_MANAGED capability (bsc#1019695 bsc#1019699 bsc#1022604).
- qed: Fix possible memory leak in Rx error path handling (bsc#1019695 bsc#1019699 bsc#1022604 ).
- qed: Fix possible race for the link state value (bnc#1012382).
- qed: Fix setting of incorrect eswitch mode (bsc#1019695 bsc#1019699 bsc#1022604).
- qed: Fix use of incorrect size in memcpy call (bsc#1019695 bsc#1019699 bsc#1022604).
- qede: Adverstise software timestamp caps when PHC is not available (bsc#1019695 bsc#1019699 bsc#1022604).
- qlge: Fix netdev features configuration (bsc#1098822).
- qlogic: check kstrtoul() for errors (bnc#1012382).
- random: mix rdrand with entropy sent in from userspace (bnc#1012382).
- readahead: stricter check for bdi io_pages (VM Functionality).
- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bnc#1012382).
- reiserfs: fix broken xattr handling (heap corruption, bad retval) (bnc#1012382).
- ring_buffer: tracing: Inherit the tracing setting to next ring buffer (bnc#1012382).
- root dentries need RCU-delayed freeing (bnc#1012382).
- rsi: Fix 'invalid vdd' warning in mmc (bnc#1012382).
- rtc: ensure rtc_set_alarm fails when alarms are not supported (bnc#1012382).
- rtnetlink: add rtnl_link_state check in rtnl_configure_link (bnc#1012382).
- s390/cpum_sf: Add data entry sizes to sampling trailer entry (bnc#1012382).
- s390/kvm: fix deadlock when killed by oom (bnc#1012382).
- s390/lib: use expoline for all bcr instructions (bnc#1106934, LTC#171029).
- s390/pci: fix out of bounds access during irq setup (bnc#1012382).
- s390/qdio: reset old sbal_state flags (bnc#1012382).
- s390/qeth: do not clobber buffer on async TX completion (bnc#1104485, LTC#170349).
- s390/qeth: fix race when setting MAC address (bnc#1104485, LTC#170726).
- s390: add explicit &lt;linux/stringify.h&gt; for jump label (bsc#1105271).
- s390: detect etoken facility (bnc#1106934, LTC#171029).
- s390: fix br_r1_trampoline for machines without exrl (bnc#1012382 bnc#1106934 LTC#171029).
- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).
- scsi: 3w-9xxx: fix a missing-check bug (bnc#1012382).
- scsi: 3w-xxxx: fix a missing-check bug (bnc#1012382).
- scsi: core: Avoid that SCSI device removal through sysfs triggers a deadlock (bnc#1012382).
- scsi: fcoe: drop frames in ELS LOGO error path (bnc#1012382).
- scsi: hpsa: limit transfer length to 1MB, not 512kB (bsc#1102346).
- scsi: libiscsi: fix possible NULL pointer dereference in case of TMF (bnc#1012382).
- scsi: megaraid: silence a static checker bug (bnc#1012382).
- scsi: megaraid_sas: Increase timeout by 1 sec for non-RAID fastpath IOs (bnc#1012382).
- scsi: qla2xxx: Fix ISP recovery on unload (bnc#1012382).
- scsi: qla2xxx: Return error when TMF returns (bnc#1012382).
- scsi: scsi_dh: replace too broad 'TP9' string with the exact models (bnc#1012382).
- scsi: sr: Avoid that opening a CD-ROM hangs with runtime power management enabled (bnc#1012382).
- scsi: sysfs: Introduce sysfs_{un,}break_active_protection() (bnc#1012382).
- scsi: ufs: fix exception event handling (bnc#1012382).
- scsi: vmw_pvscsi: Return DID_RESET for status SAM_STAT_COMMAND_TERMINATED (bnc#1012382).
- scsi: xen-scsifront: add error handling for xenbus_printf (bnc#1012382).
- scsi_debug: call resp_XXX function after setting host_scribble (bsc#1069138).
- scsi_debug: reset injection flags for every_nth &gt; 0 (bsc#1069138).
- selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC (bnc#1012382).
- selftest/seccomp: Fix the seccomp(2) signature (bnc#1012382).
- selftests/ftrace: Add snapshot and tracing_on test case (bnc#1012382).
- selftests/x86/sigreturn/64: Fix spurious failures on AMD CPUs (bnc#1012382).
- selftests: pstore: return Kselftest Skip code for skipped tests (bnc#1012382).
- selftests: static_keys: return Kselftest Skip code for skipped tests (bnc#1012382).
- selftests: sync: add config fragment for testing sync framework (bnc#1012382).
- selftests: user: return Kselftest Skip code for skipped tests (bnc#1012382).
- selftests: zram: return Kselftest Skip code for skipped tests (bnc#1012382).
- serial: 8250_dw: always set baud rate in dw8250_set_termios (bnc#1012382).
- sfc: stop the TX queue before pushing new buffers (bsc#1017967 ).
- skbuff: Unconditionally copy pfmemalloc in __skb_clone() (bnc#1012382).
- slab: __GFP_ZERO is incompatible with a constructor (bnc#1107060).
- smb3: Do not send SMB3 SET_INFO if nothing changed (bnc#1012382).
- smb3: do not request leases in symlink creation and query (bnc#1012382).
- spi: davinci: fix a NULL pointer dereference (bnc#1012382).
- squashfs: be more careful about metadata corruption (bnc#1012382).
- squashfs: more metadata hardening (bnc#1012382).
- squashfs: more metadata hardenings (bnc#1012382).
- staging: android: ion: check for kref overflow (bnc#1012382).
- string: drop __must_check from strscpy() and restore strscpy() usages in cgroup (bsc#1107319).
- sys: do not hold uts_sem while accessing userspace memory (bnc#1106995).
- target_core_rbd: use RCU in free_device (bsc#1105524).
- tcp: Fix missing range_truesize enlargement in the backport (bnc#1012382).
- tcp: add max_quickacks param to tcp_incr_quickack and tcp_enter_quickack_mode (bnc#1012382).
- tcp: add one more quick ack after after ECN events (bnc#1012382).
- tcp: do not aggressively quick ack after ECN events (bnc#1012382).
- tcp: do not cancel delay-AcK on DCTCP special ACK (bnc#1012382).
- tcp: do not delay ACK in DCTCP upon CE status change (bnc#1012382).
- tcp: do not force quickack when receiving out-of-order packets (bnc#1012382).
- tcp: fix dctcp delayed ACK schedule (bnc#1012382).
- tcp: helpers to send special DCTCP ack (bnc#1012382).
- tcp: identify cryptic messages as TCP seq # bugs (bnc#1012382).
- tcp: refactor tcp_ecn_check_ce to remove sk type cast (bnc#1012382).
- tcp: remove DELAYED ACK events in DCTCP (bnc#1012382).
- tg3: Add higher cpu clock for 5762 (bnc#1012382).
- thermal: exynos: fix setting rising_threshold for Exynos5433 (bnc#1012382).
- timekeeping: Eliminate the stale declaration of ktime_get_raw_and_real_ts64() (bsc#969470).
- tools/power turbostat: Read extended processor family from CPUID (bnc#1012382).
- tools/power turbostat: fix -S on UP systems (bnc#1012382).
- tools: usb: ffs-test: Fix build on big endian systems (bnc#1012382).
- tpm: fix race condition in tpm_common_write() (bnc#1012382).
- tracing/blktrace: Fix to allow setting same value (bnc#1012382).
- tracing/kprobes: Fix trace_probe flags on enable_trace_kprobe() failure (bnc#1012382).
- tracing: Do not call start/stop() functions when tracing_on does not change (bnc#1012382).
- tracing: Fix double free of event_trigger_data (bnc#1012382).
- tracing: Fix possible double free in event_enable_trigger_func() (bnc#1012382).
- tracing: Quiet gcc warning about maybe unused link variable (bnc#1012382).
- tracing: Use __printf markup to silence compiler (bnc#1012382).
- tty: Fix data race in tty_insert_flip_string_fixed_flag (bnc#1012382).
- turn off -Wattribute-alias (bnc#1012382).
- ubi: Be more paranoid while seaching for the most recent Fastmap (bnc#1012382).
- ubi: Fix Fastmap's update_vol() (bnc#1012382).
- ubi: Fix races around ubi_refill_pools() (bnc#1012382).
- ubi: Introduce vol_ignored() (bnc#1012382).
- ubi: Rework Fastmap attach base code (bnc#1012382).
- ubi: fastmap: Erase outdated anchor PEBs during attach (bnc#1012382).
- ubifs: Check data node size before truncate (bsc#1106276).
- ubifs: Fix memory leak in lprobs self-check (bsc#1106278).
- ubifs: Fix synced_i_size calculation for xattr inodes (bsc#1106275).
- ubifs: xattr: Do not operate on deleted inodes (bsc#1106271).
- udl-kms: change down_interruptible to down (bnc#1012382).
- udl-kms: fix crash due to uninitialized memory (bnc#1012382).
- udl-kms: handle allocation failure (bnc#1012382).
- udlfb: set optimal write delay (bnc#1012382).
- uprobes: Use synchronize_rcu() not synchronize_sched() (bnc#1012382).
- usb/phy: fix PPC64 build errors in phy-fsl-usb.c (bnc#1012382).
- usb: audio-v2: Correct the comment for struct uac_clock_selector_descriptor (bsc#1099810).
- usb: cdc_acm: Add quirk for Castles VEGA3000 (bnc#1012382).
- usb: dwc2: debugfs: Do not touch RX FIFO during register dump (bsc#1100132).
- usb: dwc2: fix isoc split in transfer with no data (bnc#1012382).
- usb: gadget: composite: fix delayed_status race condition when set_interface (bnc#1012382).
- usb: gadget: dwc2: fix memory leak in gadget_init() (bnc#1012382).
- usb: gadget: f_fs: Only return delayed status when len is 0 (bnc#1012382).
- usb: gadget: f_uac2: fix endianness of 'struct cntrl_*_lay3' (bnc#1012382).
- usb: gadget: r8a66597: Fix a possible sleep-in-atomic-context bugs in r8a66597_queue() (bnc#1012382).
- usb: gadget: r8a66597: Fix two possible sleep-in-atomic-context bugs in init_controller() (bnc#1012382).
- usb: hub: Do not wait for connect state at resume for powered-off ports (bnc#1012382).
- usb: renesas_usbhs: gadget: fix spin_lock_init() for &amp;uep-&gt;lock (bsc#1085536).
- usb: xhci: increase CRS timeout value (bnc#1012382).
- usbip: usbip_detach: Fix memory, udev context and udev leak (bnc#1012382).
- userns: move user access out of the mutex (bnc#1012382).
- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).
- virtio_balloon: fix another race between migration and ballooning (bnc#1012382).
- virtio_console: fix uninitialized variable use.
- vmw_balloon: VMCI_DOORBELL_SET does not check status (bnc#1012382).
- vmw_balloon: do not use 2MB without batching (bnc#1012382).
- vmw_balloon: fix VMCI use when balloon built into kernel (bnc#1012382).
- vmw_balloon: fix inflation of 64-bit GFNs (bnc#1012382).
- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1091860 bsc#1098253).
- vmxnet3: add receive data ring support (bsc#1091860 bsc#1098253).
- vmxnet3: add support for get_coalesce, set_coalesce ethtool operations (bsc#1091860 bsc#1098253).
- vmxnet3: allow variable length transmit data ring buffer (bsc#1091860 bsc#1098253).
- vmxnet3: avoid assumption about invalid dma_pa in vmxnet3_set_mc() (bsc#1091860 bsc#1098253).
- vmxnet3: avoid format strint overflow warning (bsc#1091860 bsc#1098253).
- vmxnet3: avoid xmit reset due to a race in vmxnet3 (bsc#1091860 bsc#1098253).
- vmxnet3: fix incorrect dereference when rxvlan is disabled (bsc#1091860 bsc#1098253).
- vmxnet3: fix non static symbol warning (bsc#1091860 bsc#1098253).
- vmxnet3: fix tx data ring copy for variable size (bsc#1091860 bsc#1098253).
- vmxnet3: increase default rx ring sizes (bsc#1091860 bsc#1098253).
- vmxnet3: introduce command to register memory region (bsc#1091860 bsc#1098253).
- vmxnet3: introduce generalized command interface to configure the device (bsc#1091860 bsc#1098253).
- vmxnet3: prepare for version 3 changes (bsc#1091860 bsc#1098253).
- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1091860 bsc#1098253).
- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1091860 bsc#1098253).
- vmxnet3: set the DMA mask before the first DMA map operation (bsc#1091860 bsc#1098253).
- vmxnet3: update to version 3 (bsc#1091860 bsc#1098253).
- vmxnet3: use DMA memory barriers where required (bsc#1091860 bsc#1098253).
- vmxnet3: use correct flag to indicate LRO feature (bsc#1091860 bsc#1098253).
- vsock: split dwork to avoid reinitializations (bnc#1012382).
- vti6: Fix dev-&gt;max_mtu setting (bsc#1033962).
- vti6: fix PMTU caching and reporting on xmit (bnc#1012382).
- wlcore: sdio: check for valid platform device data before suspend (bnc#1012382).
- x86/MCE: Remove min interval polling limitation (bnc#1012382).
- x86/amd: do not set X86_BUG_SYSRET_SS_ATTRS when running under Xen (bnc#1012382).
- x86/asm/entry/32: Simplify pushes of zeroed pt_regs-&gt;REGs (bnc#1012382).
- x86/bugs: Move the l1tf function and define pr_fmt properly (bnc#1012382).
- x86/bugs: Respect nospec command line option (bsc#1068032).
- x86/cpu/AMD: Fix erratum 1076 (CPB bit) (bnc#1012382).
- x86/cpu: Make alternative_msr_write work for 32-bit code (bnc#1012382).
- x86/cpu: Re-apply forced caps every time CPU caps are re-read (bnc#1012382).
- x86/cpufeature: preserve numbers (kabi).
- x86/cpufeatures: Add CPUID_7_EDX CPUID leaf (bnc#1012382).
- x86/cpufeatures: Clean up Spectre v2 related CPUID flags (bnc#1012382).
- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bnc#1012382).
- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).
- x86/init: fix build with CONFIG_SWAP=n (bnc#1012382).
- x86/irqflags: Mark native_restore_fl extern inline (bnc#1012382).
- x86/irqflags: Provide a declaration for native_save_fl.
- x86/mm/kmmio: Make the tracer robust against L1TF (bnc#1012382).
- x86/mm/pat: Fix L1TF stable backport for CPA (bnc#1012382).
- x86/mm/pat: Fix L1TF stable backport for CPA, 2nd call (bnc#1012382).
- x86/mm/pat: Make set_memory_np() L1TF safe (bnc#1012382).
- x86/mm: Add TLB purge to free pmd/pte page interfaces (bnc#1012382).
- x86/mm: Disable ioremap free page handling on x86-PAE (bnc#1012382).
- x86/mm: Give each mm TLB flush generation a unique ID (bnc#1012382).
- x86/paravirt: Fix spectre-v2 mitigations for paravirt guests (bnc#1012382).
- x86/paravirt: Make native_save_fl() extern inline (bnc#1012382).
- x86/process: Correct and optimize TIF_BLOCKSTEP switch (bnc#1012382).
- x86/process: Optimize TIF checks in __switch_to_xtra() (bnc#1012382).
- x86/process: Optimize TIF_NOTSC switch (bnc#1012382).
- x86/process: Re-export start_thread() (bnc#1012382).
- x86/spectre: Add missing family 6 check to microcode check (bnc#1012382).
- x86/spectre_v2: Do not check microcode versions when running under hypervisors (bnc#1012382).
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion (bnc#1012382).
- x86/speculation/l1tf: Extend 64bit swap file size limit (bnc#1012382).
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1012382).
- x86/speculation/l1tf: Fix up CPU feature flags (bnc#1012382).
- x86/speculation/l1tf: Fix up pte-&gt;pfn conversion for PAE (bnc#1012382).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- x86/speculation/l1tf: Invert all not present mappings (bnc#1012382).
- x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert (bnc#1012382).
- x86/speculation/l1tf: Protect PAE swap entries against L1TF (bnc#1012382).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).
- x86/speculation/l1tf: Unbreak !__HAVE_ARCH_PFN_MODIFY_ALLOWED architectures (bnc#1012382).
- x86/speculation: Add &lt;asm/msr-index.h&gt; dependency (bnc#1012382).
- x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support (bnc#1012382).
- x86/speculation: Clean up various Spectre related details (bnc#1012382).
- x86/speculation: Correct Speculation Control microcode blacklist again (bnc#1012382).
- x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP (bnc#1012382).
- x86/speculation: Update Speculation Control microcode blacklist (bnc#1012382).
- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).
- x86/speculation: Use IBRS if available before calling into firmware (bnc#1012382).
- x86/speculation: Use Indirect Branch Prediction Barrier in context switch (bnc#1012382).
- x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths (bnc#1012382).
- xen-netfront: wait xenbus state change when load module manually (bnc#1012382).
- xen/blkback: do not keep persistent grants too long (bsc#1085042).
- xen/blkback: move persistent grants flags to bool (bsc#1085042).
- xen/blkfront: cleanup stale persistent grants (bsc#1085042).
- xen/blkfront: reorder tests in xlblk_init() (bsc#1085042).
- xen/netfront: do not cache skb_shinfo() (bnc#1012382).
- xen: avoid crash in disable_hotplug_cpu (bsc#1106594).
- xen: set cpu capabilities from xen_start_kernel() (bnc#1012382).
- xfrm: fix missing dst_release() after policy blocking lbcast and multicast (bnc#1012382).
- xfrm: free skb if nlsk pointer is NULL (bnc#1012382).
- xfrm_user: prevent leaking 2 bytes of kernel memory (bnc#1012382).
- xfs: Remove dead code from inode recover function (bsc#1105396).
- xfs: repair malformed inode items during log recovery (bsc#1105396).
- xhci: Fix perceived dead host due to runtime suspend race with event handler (bnc#1012382).
- zswap: re-check zswap_is_full() after do zswap_shrink() (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-25"/>
	<updated date="2018-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015342">SUSE bug 1015342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015343">SUSE bug 1015343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017967">SUSE bug 1017967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019695">SUSE bug 1019695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019699">SUSE bug 1019699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020412">SUSE bug 1020412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021121">SUSE bug 1021121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022604">SUSE bug 1022604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024361">SUSE bug 1024361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024365">SUSE bug 1024365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024376">SUSE bug 1024376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027968">SUSE bug 1027968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030552">SUSE bug 1030552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033962">SUSE bug 1033962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048317">SUSE bug 1048317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053685">SUSE bug 1053685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055014">SUSE bug 1055014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056596">SUSE bug 1056596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062604">SUSE bug 1062604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063646">SUSE bug 1063646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064232">SUSE bug 1064232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065364">SUSE bug 1065364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068075">SUSE bug 1068075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069138">SUSE bug 1069138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078921">SUSE bug 1078921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080157">SUSE bug 1080157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083663">SUSE bug 1083663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085042">SUSE bug 1085042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085536">SUSE bug 1085536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085539">SUSE bug 1085539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086457">SUSE bug 1086457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087092">SUSE bug 1087092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089066">SUSE bug 1089066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090888">SUSE bug 1090888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091171">SUSE bug 1091171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091860">SUSE bug 1091860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092903">SUSE bug 1092903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096254">SUSE bug 1096254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096748">SUSE bug 1096748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097105">SUSE bug 1097105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098253">SUSE bug 1098253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098822">SUSE bug 1098822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099597">SUSE bug 1099597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099810">SUSE bug 1099810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099811">SUSE bug 1099811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099813">SUSE bug 1099813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099832">SUSE bug 1099832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099844">SUSE bug 1099844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099845">SUSE bug 1099845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099846">SUSE bug 1099846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099849">SUSE bug 1099849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099863">SUSE bug 1099863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099864">SUSE bug 1099864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099922">SUSE bug 1099922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099999">SUSE bug 1099999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100000">SUSE bug 1100000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100001">SUSE bug 1100001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100132">SUSE bug 1100132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101822">SUSE bug 1101822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101841">SUSE bug 1101841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102346">SUSE bug 1102346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102486">SUSE bug 1102486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102715">SUSE bug 1102715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102797">SUSE bug 1102797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103269">SUSE bug 1103269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103445">SUSE bug 1103445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104319">SUSE bug 1104319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104485">SUSE bug 1104485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104494">SUSE bug 1104494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104495">SUSE bug 1104495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104683">SUSE bug 1104683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104897">SUSE bug 1104897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105271">SUSE bug 1105271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105292">SUSE bug 1105292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105392">SUSE bug 1105392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105396">SUSE bug 1105396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105524">SUSE bug 1105524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105536">SUSE bug 1105536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105769">SUSE bug 1105769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106016">SUSE bug 1106016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106105">SUSE bug 1106105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106185">SUSE bug 1106185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106229">SUSE bug 1106229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106271">SUSE bug 1106271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106275">SUSE bug 1106275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106276">SUSE bug 1106276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106278">SUSE bug 1106278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106281">SUSE bug 1106281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106283">SUSE bug 1106283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106369">SUSE bug 1106369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106509">SUSE bug 1106509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106511">SUSE bug 1106511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106594">SUSE bug 1106594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106697">SUSE bug 1106697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106929">SUSE bug 1106929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106934">SUSE bug 1106934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106995">SUSE bug 1106995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107060">SUSE bug 1107060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107078">SUSE bug 1107078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107319">SUSE bug 1107319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107320">SUSE bug 1107320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107735">SUSE bug 1107735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107966">SUSE bug 1107966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963575">SUSE bug 963575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966170">SUSE bug 966170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966172">SUSE bug 966172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969470">SUSE bug 969470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969476">SUSE bug 969476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969477">SUSE bug 969477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970506">SUSE bug 970506</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10876/">CVE-2018-10876 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10876">CVE-2018-10876 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10877/">CVE-2018-10877 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10877">CVE-2018-10877 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10878/">CVE-2018-10878 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10878">CVE-2018-10878 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10879/">CVE-2018-10879 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10879">CVE-2018-10879 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10880/">CVE-2018-10880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10880">CVE-2018-10880 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10881/">CVE-2018-10881 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10881">CVE-2018-10881 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10882/">CVE-2018-10882 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10882">CVE-2018-10882 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10883/">CVE-2018-10883 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10883">CVE-2018-10883 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10902">CVE-2018-10902 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10938">CVE-2018-10938 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10940/">CVE-2018-10940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10940">CVE-2018-10940 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-1128/">CVE-2018-1128 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1128">CVE-2018-1128 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1129/">CVE-2018-1129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1129">CVE-2018-1129 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12896/">CVE-2018-12896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12896">CVE-2018-12896 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13093/">CVE-2018-13093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13093">CVE-2018-13093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13094/">CVE-2018-13094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13094">CVE-2018-13094 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13095/">CVE-2018-13095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13095">CVE-2018-13095 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15572/">CVE-2018-15572 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15572">CVE-2018-15572 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16658">CVE-2018-16658 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6554/">CVE-2018-6554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6554">CVE-2018-6554 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6555/">CVE-2018-6555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6555">CVE-2018-6555 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9363/">CVE-2018-9363 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9363">CVE-2018-9363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553175" comment="kernel-azure-4.4.155-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553176" comment="kernel-azure-base-4.4.155-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553177" comment="kernel-azure-devel-4.4.155-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553178" comment="kernel-devel-azure-4.4.155-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553179" comment="kernel-source-azure-4.4.155-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553180" comment="kernel-syms-azure-4.4.155-4.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149553" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1035442" ref_url="https://bugzilla.suse.com/1035442" source="BUGZILLA"/>
		<reference ref_id="1052825" ref_url="https://bugzilla.suse.com/1052825" source="BUGZILLA"/>
		<reference ref_id="1062571" ref_url="https://bugzilla.suse.com/1062571" source="BUGZILLA"/>
		<reference ref_id="1062760" ref_url="https://bugzilla.suse.com/1062760" source="BUGZILLA"/>
		<reference ref_id="1064947" ref_url="https://bugzilla.suse.com/1064947" source="BUGZILLA"/>
		<reference ref_id="1065766" ref_url="https://bugzilla.suse.com/1065766" source="BUGZILLA"/>
		<reference ref_id="1070130" ref_url="https://bugzilla.suse.com/1070130" source="BUGZILLA"/>
		<reference ref_id="1072887" ref_url="https://bugzilla.suse.com/1072887" source="BUGZILLA"/>
		<reference ref_id="1073973" ref_url="https://bugzilla.suse.com/1073973" source="BUGZILLA"/>
		<reference ref_id="1076500" ref_url="https://bugzilla.suse.com/1076500" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5748" ref_url="https://www.suse.com/security/cve/CVE-2018-5748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003674.html" source="SUSE-SU"/>
		<description>
This update for libvirt provides several fixes.

This security issue was fixed:

- CVE-2018-5748: Prevent resource exhaustion via qemuMonitorIORead() method which allowed to cause DoS (bsc#1076500).

These security issues were fixed:

- Add a qemu hook script providing functionality similar to Xen's block-dmmd script.
  (fate#324177)
- schema: Make disk driver name attribute optional. (bsc#1073973)
- virt-create-rootfs: Handle all SLE 12 versions. (bsc#1072887)
- libvirt-guests: Fix the 'stop' operation when action is 'suspend'. (bsc#1070130)
- s390: Fix missing host cpu model info. (bsc#1065766)
- cpu: Add new EPYC CPU model. (bsc#1052825, fate#324038)
- pci: Fix the detection of the link's maximum speed. (bsc#1064947)
- nodedev: Increase the netlink socket buffer size. (bsc#1035442)
- storage: Fix a race between the volume creation and the pool refresh. (bsc#1062571)
- daemon: Drop the minsize directive from hypervisor logrotate files. (bsc#1062760)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1035442">SUSE bug 1035442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052825">SUSE bug 1052825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062571">SUSE bug 1062571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062760">SUSE bug 1062760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064947">SUSE bug 1064947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065766">SUSE bug 1065766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070130">SUSE bug 1070130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072887">SUSE bug 1072887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073973">SUSE bug 1073973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076500">SUSE bug 1076500</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5748/">CVE-2018-5748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5748">CVE-2018-5748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553181" comment="libvirt-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553182" comment="libvirt-admin-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553183" comment="libvirt-client-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553184" comment="libvirt-daemon-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553185" comment="libvirt-daemon-config-network-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553186" comment="libvirt-daemon-config-nwfilter-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553187" comment="libvirt-daemon-driver-interface-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520093" comment="libvirt-daemon-driver-libxl-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553188" comment="libvirt-daemon-driver-lxc-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553189" comment="libvirt-daemon-driver-network-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553190" comment="libvirt-daemon-driver-nodedev-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553191" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553192" comment="libvirt-daemon-driver-qemu-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553193" comment="libvirt-daemon-driver-secret-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553194" comment="libvirt-daemon-driver-storage-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553195" comment="libvirt-daemon-driver-storage-core-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553196" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553197" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553198" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553199" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553200" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553201" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553202" comment="libvirt-daemon-lxc-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553203" comment="libvirt-daemon-qemu-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520110" comment="libvirt-daemon-xen-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553204" comment="libvirt-doc-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553205" comment="libvirt-libs-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553206" comment="libvirt-lock-sanlock-3.3.0-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553207" comment="libvirt-nss-3.3.0-5.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149554" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1094301" ref_url="https://bugzilla.suse.com/1094301" source="BUGZILLA"/>
		<reference ref_id="1101776" ref_url="https://bugzilla.suse.com/1101776" source="BUGZILLA"/>
		<reference ref_id="1101777" ref_url="https://bugzilla.suse.com/1101777" source="BUGZILLA"/>
		<reference ref_id="1101786" ref_url="https://bugzilla.suse.com/1101786" source="BUGZILLA"/>
		<reference ref_id="1101788" ref_url="https://bugzilla.suse.com/1101788" source="BUGZILLA"/>
		<reference ref_id="1101791" ref_url="https://bugzilla.suse.com/1101791" source="BUGZILLA"/>
		<reference ref_id="1101794" ref_url="https://bugzilla.suse.com/1101794" source="BUGZILLA"/>
		<reference ref_id="1101800" ref_url="https://bugzilla.suse.com/1101800" source="BUGZILLA"/>
		<reference ref_id="1101802" ref_url="https://bugzilla.suse.com/1101802" source="BUGZILLA"/>
		<reference ref_id="1101804" ref_url="https://bugzilla.suse.com/1101804" source="BUGZILLA"/>
		<reference ref_id="1101810" ref_url="https://bugzilla.suse.com/1101810" source="BUGZILLA"/>
		<reference ref_id="1106514" ref_url="https://bugzilla.suse.com/1106514" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11354" ref_url="https://www.suse.com/security/cve/CVE-2018-11354/" source="CVE"/>
		<reference ref_id="CVE-2018-11355" ref_url="https://www.suse.com/security/cve/CVE-2018-11355/" source="CVE"/>
		<reference ref_id="CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356/" source="CVE"/>
		<reference ref_id="CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357/" source="CVE"/>
		<reference ref_id="CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358/" source="CVE"/>
		<reference ref_id="CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359/" source="CVE"/>
		<reference ref_id="CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360/" source="CVE"/>
		<reference ref_id="CVE-2018-11361" ref_url="https://www.suse.com/security/cve/CVE-2018-11361/" source="CVE"/>
		<reference ref_id="CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362/" source="CVE"/>
		<reference ref_id="CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339/" source="CVE"/>
		<reference ref_id="CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340/" source="CVE"/>
		<reference ref_id="CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341/" source="CVE"/>
		<reference ref_id="CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342/" source="CVE"/>
		<reference ref_id="CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343/" source="CVE"/>
		<reference ref_id="CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344/" source="CVE"/>
		<reference ref_id="CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367/" source="CVE"/>
		<reference ref_id="CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368/" source="CVE"/>
		<reference ref_id="CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369/" source="CVE"/>
		<reference ref_id="CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370/" source="CVE"/>
		<reference ref_id="CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056/" source="CVE"/>
		<reference ref_id="CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057/" source="CVE"/>
		<reference ref_id="CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.4.9 fixes the following issues:

Wireshark was updated to 2.4.9 (bsc#1094301, bsc#1106514).

Security issues fixed:

- CVE-2018-16058: Bluetooth AVDTP dissector crash (wnpa-sec-2018-44)
- CVE-2018-16056: Bluetooth Attribute Protocol dissector crash (wnpa-sec-2018-45)
- CVE-2018-16057: Radiotap dissector crash (wnpa-sec-2018-46)
- CVE-2018-11355: Fix RTCP dissector crash (bsc#1094301).
- CVE-2018-14370: IEEE 802.11 dissector crash (wnpa-sec-2018-43, bsc#1101802)
- CVE-2018-14368: Bazaar dissector infinite loop (wnpa-sec-2018-40, bsc#1101794)
- CVE-2018-11362: Fix LDSS dissector crash (bsc#1094301).
- CVE-2018-11361: Fix IEEE 802.11 dissector crash (bsc#1094301).
- CVE-2018-11360: Fix GSM A DTAP dissector crash (bsc#1094301).
- CVE-2018-14342: BGP dissector large loop (wnpa-sec-2018-34, bsc#1101777)
- CVE-2018-14343: ASN.1 BER dissector crash (wnpa-sec-2018-37, bsc#1101786)
- CVE-2018-14340: Multiple dissectors could crash (wnpa-sec-2018-36, bsc#1101804)
- CVE-2018-14341: DICOM dissector crash (wnpa-sec-2018-39, bsc#1101776)
- CVE-2018-11358: Fix Q.931 dissector crash (bsc#1094301).
- CVE-2018-14344: ISMP dissector crash (wnpa-sec-2018-35, bsc#1101788)
- CVE-2018-11359: Fix multiple dissectors crashs (bsc#1094301).
- CVE-2018-11356: Fix DNS dissector crash (bsc#1094301).
- CVE-2018-14339: MMSE dissector infinite loop (wnpa-sec-2018-38, bsc#1101810)
- CVE-2018-11357: Fix multiple dissectors that could consume excessive memory (bsc#1094301).
- CVE-2018-14367: CoAP dissector crash (wnpa-sec-2018-42, bsc#1101791)
- CVE-2018-11354: Fix IEEE 1905.1a dissector crash (bsc#1094301).
- CVE-2018-14369: HTTP2 dissector crash (wnpa-sec-2018-41, bsc#1101800)

Further bug fixes and updated protocol support as listed in:
  https://www.wireshark.org/docs/relnotes/wireshark-2.4.9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-27"/>
	<updated date="2018-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101776">SUSE bug 1101776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101777">SUSE bug 1101777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101786">SUSE bug 1101786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101788">SUSE bug 1101788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101791">SUSE bug 1101791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101794">SUSE bug 1101794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101800">SUSE bug 1101800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101802">SUSE bug 1101802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101804">SUSE bug 1101804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101810">SUSE bug 1101810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11354/">CVE-2018-11354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11354">CVE-2018-11354 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11355/">CVE-2018-11355 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11355">CVE-2018-11355 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11356">CVE-2018-11356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11357">CVE-2018-11357 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11358">CVE-2018-11358 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11359">CVE-2018-11359 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11360">CVE-2018-11360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11361/">CVE-2018-11361 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11361">CVE-2018-11361 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11362">CVE-2018-11362 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14339">CVE-2018-14339 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14340">CVE-2018-14340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14341">CVE-2018-14341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14342">CVE-2018-14342 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14343">CVE-2018-14343 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14344">CVE-2018-14344 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14367">CVE-2018-14367 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14368">CVE-2018-14368 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14369">CVE-2018-14369 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14370">CVE-2018-14370 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16056">CVE-2018-16056 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16057">CVE-2018-16057 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16058">CVE-2018-16058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553208" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553209" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553210" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553211" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553212" comment="wireshark-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553213" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149555" version="1" class="patch">
	<metadata>
		<title>Security update for smt, yast2-smt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1006984" ref_url="https://bugzilla.suse.com/1006984" source="BUGZILLA"/>
		<reference ref_id="1006989" ref_url="https://bugzilla.suse.com/1006989" source="BUGZILLA"/>
		<reference ref_id="1037811" ref_url="https://bugzilla.suse.com/1037811" source="BUGZILLA"/>
		<reference ref_id="1097560" ref_url="https://bugzilla.suse.com/1097560" source="BUGZILLA"/>
		<reference ref_id="1097824" ref_url="https://bugzilla.suse.com/1097824" source="BUGZILLA"/>
		<reference ref_id="1103809" ref_url="https://bugzilla.suse.com/1103809" source="BUGZILLA"/>
		<reference ref_id="1103810" ref_url="https://bugzilla.suse.com/1103810" source="BUGZILLA"/>
		<reference ref_id="1104076" ref_url="https://bugzilla.suse.com/1104076" source="BUGZILLA"/>
		<reference ref_id="977043" ref_url="https://bugzilla.suse.com/977043" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12470" ref_url="https://www.suse.com/security/cve/CVE-2018-12470/" source="CVE"/>
		<reference ref_id="CVE-2018-12471" ref_url="https://www.suse.com/security/cve/CVE-2018-12471/" source="CVE"/>
		<reference ref_id="CVE-2018-12472" ref_url="https://www.suse.com/security/cve/CVE-2018-12472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004613.html" source="SUSE-SU"/>
		<description>
This update for yast2-smt to 3.0.14 and smt to 3.0.37 fixes the following issues:

These security issues were fixed in SMT:

- CVE-2018-12471: Xml External Entity processing in the RegistrationSharing
  modules allowed to read arbitrary file read (bsc#1103809).
- CVE-2018-12470: SQL injection in RegistrationSharing module allows remote
  attackers to run arbitrary SQL statements (bsc#1103810).
- CVE-2018-12472: Authentication bypass in sibling check facilitated further
  attacks on SMT (bsc#1104076).

SUSE would like to thank Jake Miller for reporting these issues to us.

These non-security issues were fixed in SMT:

- Fix cron jobs randomization (bsc#1097560)
- Fix duplicate migration paths (bsc#1097824)

This non-security issue was fixed in yast2-smt:

- Remove cron job rescheduling (bsc#1097560)
- Added missing translation marks (bsc#1037811)
- Explicitly mention 'Organization Credentials' (fate#321759)
- Rearrange the SMT set-up dialog (bsc#977043)
- Make the Filter button default (bsc#1006984)
- Prevent exiting the repo selection dialog via hitting Enter in
  the repository filter (bsc#1006984)
- report when error occurs during repo mirroring (bsc#1006989)
- Use TextEntry-based filter for repos (fate#319777)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-27"/>
	<updated date="2018-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1006984">SUSE bug 1006984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006989">SUSE bug 1006989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037811">SUSE bug 1037811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097560">SUSE bug 1097560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097824">SUSE bug 1097824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103809">SUSE bug 1103809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103810">SUSE bug 1103810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104076">SUSE bug 1104076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977043">SUSE bug 977043</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12470/">CVE-2018-12470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12470">CVE-2018-12470 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12471/">CVE-2018-12471 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12471">CVE-2018-12471 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12472/">CVE-2018-12472 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12472">CVE-2018-12472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553214" comment="res-signingkeys-3.0.37-52.23.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553215" comment="smt-3.0.37-52.23.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553216" comment="smt-support-3.0.37-52.23.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149556" version="1" class="patch">
	<metadata>
		<title>Security update for yast2-smt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1097560" ref_url="https://bugzilla.suse.com/1097560" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004616.html" source="SUSE-SU"/>
		<description>
This update fixes the following issue in yast2-smt:

- Remove cron job rescheduling (bsc#1097560)

This update is a requirement for the security update for SMT. Because of that it is
tagged as security to ensure that all users, even those that only install security updates,
install it.
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-27"/>
	<updated date="2018-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097560">SUSE bug 1097560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553217" comment="yast2-smt-3.0.14-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149557" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1089039" ref_url="https://bugzilla.suse.com/1089039" source="BUGZILLA"/>
		<reference ref_id="1101246" ref_url="https://bugzilla.suse.com/1101246" source="BUGZILLA"/>
		<reference ref_id="1101470" ref_url="https://bugzilla.suse.com/1101470" source="BUGZILLA"/>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1106197" ref_url="https://bugzilla.suse.com/1106197" source="BUGZILLA"/>
		<reference ref_id="997043" ref_url="https://bugzilla.suse.com/997043" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004619.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

These security issues were fixed:

- Prevent One&amp;Done side-channel attack on RSA that allowed physically near
  attackers to use EM emanations to recover information (bsc#1104789)
- CVE-2018-0737: The RSA Key generation algorithm has been shown to be
  vulnerable to a cache timing side channel attack. An attacker with sufficient
  access to mount cache timing attacks during the RSA key generation process
  could have recovered the private key (bsc#1089039)

These non-security issues were fixed:

- Add openssl(cli) Provide so the packages that require the openssl
  binary can require this instead of the new openssl meta package
  (bsc#1101470)
- Fixed path to the engines which are under /lib64 on SLE-12 (bsc#1101246,
  bsc#997043)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-28"/>
	<updated date="2018-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101246">SUSE bug 1101246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101470">SUSE bug 1101470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106197">SUSE bug 1106197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997043">SUSE bug 997043</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0737">CVE-2018-0737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009541654" comment="libopenssl-devel-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553218" comment="libopenssl1_0_0-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550545" comment="libopenssl1_0_0-32bit-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553219" comment="libopenssl1_0_0-hmac-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550547" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553220" comment="openssl-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530269" comment="openssl-doc-1.0.2j-60.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149558" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1056126" ref_url="https://bugzilla.suse.com/1056126" source="BUGZILLA"/>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="1056128" ref_url="https://bugzilla.suse.com/1056128" source="BUGZILLA"/>
		<reference ref_id="1056129" ref_url="https://bugzilla.suse.com/1056129" source="BUGZILLA"/>
		<reference ref_id="1056131" ref_url="https://bugzilla.suse.com/1056131" source="BUGZILLA"/>
		<reference ref_id="1056132" ref_url="https://bugzilla.suse.com/1056132" source="BUGZILLA"/>
		<reference ref_id="1056136" ref_url="https://bugzilla.suse.com/1056136" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13728" ref_url="https://www.suse.com/security/cve/CVE-2017-13728/" source="CVE"/>
		<reference ref_id="CVE-2017-13729" ref_url="https://www.suse.com/security/cve/CVE-2017-13729/" source="CVE"/>
		<reference ref_id="CVE-2017-13730" ref_url="https://www.suse.com/security/cve/CVE-2017-13730/" source="CVE"/>
		<reference ref_id="CVE-2017-13731" ref_url="https://www.suse.com/security/cve/CVE-2017-13731/" source="CVE"/>
		<reference ref_id="CVE-2017-13732" ref_url="https://www.suse.com/security/cve/CVE-2017-13732/" source="CVE"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="CVE-2017-13734" ref_url="https://www.suse.com/security/cve/CVE-2017-13734/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003678.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes several issues.

These security issues were fixed:

- CVE-2017-13734: Prevent illegal address access in the _nc_safe_strcat
  function in strings.c that might have lead to a remote denial of service attack
  (bsc#1056126).
- CVE-2017-13733: Prevent illegal address access in the fmt_entry function in
  progs/dump_entry.c that might have lead to a remote denial of service attack
  (bsc#1056127).
- CVE-2017-13732: Prevent illegal address access in the function dump_uses() in
  progs/dump_entry.c that might have lead to a remote denial of service attack
  (bsc#1056128).
- CVE-2017-13731: Prevent illegal address access in the function
  postprocess_termcap() in parse_entry.c that might have lead to a remote denial
  of service attack (bsc#1056129).
- CVE-2017-13730: Prevent illegal address access in the function
  _nc_read_entry_source() in progs/tic.c that might have lead to a remote denial
  of service attack (bsc#1056131).
- CVE-2017-13729: Prevent illegal address access in the _nc_save_str function
  in alloc_entry.c that might have lead to a remote denial of service attack
  (bsc#1056132).
- CVE-2017-13728: Prevent infinite loop in the next_char function in
  comp_scan.c that might have lead to a remote denial of service attack
  (bsc#1056136).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056126">SUSE bug 1056126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056128">SUSE bug 1056128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056129">SUSE bug 1056129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056131">SUSE bug 1056131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056132">SUSE bug 1056132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056136">SUSE bug 1056136</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13728/">CVE-2017-13728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13728">CVE-2017-13728 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13729/">CVE-2017-13729 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13729">CVE-2017-13729 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13730/">CVE-2017-13730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13730">CVE-2017-13730 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13731/">CVE-2017-13731 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13731">CVE-2017-13731 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13732/">CVE-2017-13732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13732">CVE-2017-13732 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13733">CVE-2017-13733 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13734/">CVE-2017-13734 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13734">CVE-2017-13734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550549" comment="libncurses5-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550550" comment="libncurses5-32bit-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550551" comment="libncurses6-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550552" comment="libncurses6-32bit-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541322" comment="ncurses-devel-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550553" comment="ncurses-devel-32bit-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550554" comment="ncurses-utils-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550555" comment="tack-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550556" comment="terminfo-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550557" comment="terminfo-base-5.9-58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149559" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1013992" ref_url="https://bugzilla.suse.com/1013992" source="BUGZILLA"/>
		<reference ref_id="1013993" ref_url="https://bugzilla.suse.com/1013993" source="BUGZILLA"/>
		<reference ref_id="1080074" ref_url="https://bugzilla.suse.com/1080074" source="BUGZILLA"/>
		<reference ref_id="910683" ref_url="https://bugzilla.suse.com/910683" source="BUGZILLA"/>
		<reference ref_id="914442" ref_url="https://bugzilla.suse.com/914442" source="BUGZILLA"/>
		<reference ref_id="950110" ref_url="https://bugzilla.suse.com/950110" source="BUGZILLA"/>
		<reference ref_id="950111" ref_url="https://bugzilla.suse.com/950111" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<reference ref_id="CVE-2014-9913" ref_url="https://www.suse.com/security/cve/CVE-2014-9913/" source="CVE"/>
		<reference ref_id="CVE-2015-7696" ref_url="https://www.suse.com/security/cve/CVE-2015-7696/" source="CVE"/>
		<reference ref_id="CVE-2015-7697" ref_url="https://www.suse.com/security/cve/CVE-2015-7697/" source="CVE"/>
		<reference ref_id="CVE-2016-9844" ref_url="https://www.suse.com/security/cve/CVE-2016-9844/" source="CVE"/>
		<reference ref_id="CVE-2018-1000035" ref_url="https://www.suse.com/security/cve/CVE-2018-1000035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004635.html" source="SUSE-SU"/>
		<description>
This update for unzip fixes the following security issues:

- CVE-2014-9913: Specially crafted zip files could trigger invalid memory
  writes possibly resulting in DoS or corruption (bsc#1013993)
- CVE-2015-7696: Specially crafted zip files with password protection could
  trigger a crash and lead to denial of service (bsc#950110)
- CVE-2015-7697: Specially crafted zip files could trigger an endless loop and
  lead to denial of service (bsc#950111)
- CVE-2016-9844: Specially crafted zip files could trigger invalid memory
  writes possibly resulting in DoS or corruption (bsc#1013992)
- CVE-2018-1000035: Prevent heap-based buffer overflow in the processing of
  password-protected archives that allowed an attacker to perform a denial of
  service or to possibly achieve code execution (bsc#1080074).
- CVE-2014-9636: Prevent denial of service (out-of-bounds read or write and
  crash) via an extra field with an uncompressed size smaller than the compressed
  field size in a zip archive that advertises STORED method compression
  (bsc#914442).

This non-security issue was fixed:

+- Allow processing of Windows zip64 archives (Windows archivers set
  total_disks field to 0 but per standard, valid values are 1 and higher)
  (bnc#910683)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-02"/>
	<updated date="2018-10-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013992">SUSE bug 1013992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013993">SUSE bug 1013993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080074">SUSE bug 1080074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910683">SUSE bug 910683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914442">SUSE bug 914442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950110">SUSE bug 950110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950111">SUSE bug 950111</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9636">CVE-2014-9636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9913/">CVE-2014-9913 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9913">CVE-2014-9913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7696/">CVE-2015-7696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7696">CVE-2015-7696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7697/">CVE-2015-7697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7697">CVE-2015-7697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9844/">CVE-2016-9844 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9844">CVE-2016-9844 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000035/">CVE-2018-1000035 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000035">CVE-2018-1000035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553221" comment="unzip-6.00-33.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149560" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1106171" ref_url="https://bugzilla.suse.com/1106171" source="BUGZILLA"/>
		<reference ref_id="1106172" ref_url="https://bugzilla.suse.com/1106172" source="BUGZILLA"/>
		<reference ref_id="1106173" ref_url="https://bugzilla.suse.com/1106173" source="BUGZILLA"/>
		<reference ref_id="1106195" ref_url="https://bugzilla.suse.com/1106195" source="BUGZILLA"/>
		<reference ref_id="1107410" ref_url="https://bugzilla.suse.com/1107410" source="BUGZILLA"/>
		<reference ref_id="1107411" ref_url="https://bugzilla.suse.com/1107411" source="BUGZILLA"/>
		<reference ref_id="1107412" ref_url="https://bugzilla.suse.com/1107412" source="BUGZILLA"/>
		<reference ref_id="1107413" ref_url="https://bugzilla.suse.com/1107413" source="BUGZILLA"/>
		<reference ref_id="1107420" ref_url="https://bugzilla.suse.com/1107420" source="BUGZILLA"/>
		<reference ref_id="1107421" ref_url="https://bugzilla.suse.com/1107421" source="BUGZILLA"/>
		<reference ref_id="1107422" ref_url="https://bugzilla.suse.com/1107422" source="BUGZILLA"/>
		<reference ref_id="1107423" ref_url="https://bugzilla.suse.com/1107423" source="BUGZILLA"/>
		<reference ref_id="1107426" ref_url="https://bugzilla.suse.com/1107426" source="BUGZILLA"/>
		<reference ref_id="1107581" ref_url="https://bugzilla.suse.com/1107581" source="BUGZILLA"/>
		<reference ref_id="1108027" ref_url="https://bugzilla.suse.com/1108027" source="BUGZILLA"/>
		<reference ref_id="1109105" ref_url="https://bugzilla.suse.com/1109105" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15908" ref_url="https://www.suse.com/security/cve/CVE-2018-15908/" source="CVE"/>
		<reference ref_id="CVE-2018-15909" ref_url="https://www.suse.com/security/cve/CVE-2018-15909/" source="CVE"/>
		<reference ref_id="CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910/" source="CVE"/>
		<reference ref_id="CVE-2018-15911" ref_url="https://www.suse.com/security/cve/CVE-2018-15911/" source="CVE"/>
		<reference ref_id="CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509/" source="CVE"/>
		<reference ref_id="CVE-2018-16510" ref_url="https://www.suse.com/security/cve/CVE-2018-16510/" source="CVE"/>
		<reference ref_id="CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511/" source="CVE"/>
		<reference ref_id="CVE-2018-16513" ref_url="https://www.suse.com/security/cve/CVE-2018-16513/" source="CVE"/>
		<reference ref_id="CVE-2018-16539" ref_url="https://www.suse.com/security/cve/CVE-2018-16539/" source="CVE"/>
		<reference ref_id="CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540/" source="CVE"/>
		<reference ref_id="CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542/" source="CVE"/>
		<reference ref_id="CVE-2018-16543" ref_url="https://www.suse.com/security/cve/CVE-2018-16543/" source="CVE"/>
		<reference ref_id="CVE-2018-16585" ref_url="https://www.suse.com/security/cve/CVE-2018-16585/" source="CVE"/>
		<reference ref_id="CVE-2018-16802" ref_url="https://www.suse.com/security/cve/CVE-2018-16802/" source="CVE"/>
		<reference ref_id="CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.25 fixes the following issues:

These security issues were fixed:

- CVE-2018-17183: Remote attackers were be able to supply crafted PostScript to
  potentially overwrite or replace error handlers to inject code (bsc#1109105)
- CVE-2018-15909: Prevent type confusion using the .shfill operator that could
  have been used by attackers able to supply crafted PostScript files to crash
  the interpreter or potentially execute code (bsc#1106172).
- CVE-2018-15908: Prevent attackers that are able to supply malicious
  PostScript files to bypass .tempfile restrictions and write files
  (bsc#1106171).
- CVE-2018-15910: Prevent a type confusion in the LockDistillerParams parameter
  that could have been used to crash the interpreter or execute code
  (bsc#1106173).
- CVE-2018-15911: Prevent use uninitialized memory access in the aesdecode
  operator that could have been used to crash the interpreter or potentially
  execute code (bsc#1106195).
- CVE-2018-16513: Prevent a type confusion in the setcolor function that could
  have been used to crash the interpreter or possibly have unspecified other
  impact (bsc#1107412).
- CVE-2018-16509: Incorrect 'restoration of privilege' checking during handling
  of /invalidaccess exceptions could be have been used by attackers able to
  supply crafted PostScript to execute code using the 'pipe' instruction
  (bsc#1107410).
- CVE-2018-16510: Incorrect exec stack handling in the 'CS' and 'SC' PDF
  primitives could have been used by remote attackers able to supply crafted PDFs
  to crash the interpreter or possibly have unspecified other impact
  (bsc#1107411).
- CVE-2018-16542: Prevent attackers able to supply crafted PostScript files
  from using insufficient interpreter stack-size checking during error handling
  to crash the interpreter (bsc#1107413).
- CVE-2018-16541: Prevent attackers able to supply crafted PostScript files
  from using incorrect free logic in pagedevice replacement to crash the
  interpreter (bsc#1107421).
- CVE-2018-16540: Prevent use-after-free in copydevice handling that could have
  been used to crash the interpreter or possibly have unspecified other impact
  (bsc#1107420).
- CVE-2018-16539: Prevent attackers able to supply crafted PostScript files
  from using incorrect access checking in temp file handling to disclose contents
  of files on the system otherwise not readable (bsc#1107422).
- CVE-2018-16543: gssetresolution and gsgetresolution allowed attackers to have
  an unspecified impact (bsc#1107423).
- CVE-2018-16511: A type confusion in 'ztype' could have been used by remote
  attackers able to supply crafted PostScript to crash the interpreter or
  possibly have unspecified other impact (bsc#1107426).
- CVE-2018-16585: The .setdistillerkeys PostScript command was accepted even
  though it is not intended for use during document processing (e.g., after the
  startup phase). This lead to memory corruption, allowing remote attackers able
  to supply crafted PostScript to crash the interpreter or possibly have
  unspecified other impact (bsc#1107581).
- CVE-2018-16802: Incorrect 'restoration of privilege' checking when running
  out of stack during exception handling could have been used by attackers able
  to supply crafted PostScript to execute code using the 'pipe' instruction. This
  is due to an incomplete fix for CVE-2018-16509 (bsc#1108027).

These non-security issues were fixed:

* Fixes problems with argument handling, some unintended results of the
  security fixes to the SAFER file access restrictions (specifically accessing
  ICC profile files).
* Avoid that ps2epsi fails with 'Error: /undefined in --setpagedevice--'

For additional changes please check http://www.ghostscript.com/doc/9.25/News.htm
and the changes file of the package.
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-02"/>
	<updated date="2018-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106171">SUSE bug 1106171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106172">SUSE bug 1106172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106173">SUSE bug 1106173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106195">SUSE bug 1106195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107410">SUSE bug 1107410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107411">SUSE bug 1107411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107412">SUSE bug 1107412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107413">SUSE bug 1107413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107420">SUSE bug 1107420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107421">SUSE bug 1107421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107422">SUSE bug 1107422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107423">SUSE bug 1107423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107426">SUSE bug 1107426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107581">SUSE bug 1107581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15908/">CVE-2018-15908 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15908">CVE-2018-15908 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15909/">CVE-2018-15909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15909">CVE-2018-15909 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15910">CVE-2018-15910 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15911/">CVE-2018-15911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15911">CVE-2018-15911 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16509">CVE-2018-16509 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16510/">CVE-2018-16510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16510">CVE-2018-16510 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16511">CVE-2018-16511 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16513/">CVE-2018-16513 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16513">CVE-2018-16513 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16539/">CVE-2018-16539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16539">CVE-2018-16539 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16540">CVE-2018-16540 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16541">CVE-2018-16541 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16542">CVE-2018-16542 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16543/">CVE-2018-16543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16543">CVE-2018-16543 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16585/">CVE-2018-16585 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16585">CVE-2018-16585 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16802/">CVE-2018-16802 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16802">CVE-2018-16802 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17183">CVE-2018-17183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553222" comment="ghostscript-9.25-23.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553223" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149561" version="1" class="patch">
	<metadata>
		<title>Security update for mgetty (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1108752" ref_url="https://bugzilla.suse.com/1108752" source="BUGZILLA"/>
		<reference ref_id="1108756" ref_url="https://bugzilla.suse.com/1108756" source="BUGZILLA"/>
		<reference ref_id="1108757" ref_url="https://bugzilla.suse.com/1108757" source="BUGZILLA"/>
		<reference ref_id="1108761" ref_url="https://bugzilla.suse.com/1108761" source="BUGZILLA"/>
		<reference ref_id="1108762" ref_url="https://bugzilla.suse.com/1108762" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16741" ref_url="https://www.suse.com/security/cve/CVE-2018-16741/" source="CVE"/>
		<reference ref_id="CVE-2018-16742" ref_url="https://www.suse.com/security/cve/CVE-2018-16742/" source="CVE"/>
		<reference ref_id="CVE-2018-16743" ref_url="https://www.suse.com/security/cve/CVE-2018-16743/" source="CVE"/>
		<reference ref_id="CVE-2018-16744" ref_url="https://www.suse.com/security/cve/CVE-2018-16744/" source="CVE"/>
		<reference ref_id="CVE-2018-16745" ref_url="https://www.suse.com/security/cve/CVE-2018-16745/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004636.html" source="SUSE-SU"/>
		<description>
This update for mgetty fixes the following security issues:

- CVE-2018-16741: The function do_activate() did not properly sanitize shell
  metacharacters to prevent command injection (bsc#1108752)
- CVE-2018-16745: The mail_to parameter was not sanitized, leading to a buffer
  overflow if long untrusted input reached it (bsc#1108756)
- CVE-2018-16744: The mail_to parameter was not sanitized, leading to command
  injection if untrusted input reached reach it (bsc#1108757)
- CVE-2018-16742: Prevent stack-based buffer overflow that could have been
  triggered via a command-line parameter (bsc#1108762)
- CVE-2018-16743: The command-line parameter username wsa passed unsanitized to
  strcpy(), which could have caused a stack-based buffer overflow (bsc#1108761)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-02"/>
	<updated date="2018-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1108752">SUSE bug 1108752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108756">SUSE bug 1108756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108757">SUSE bug 1108757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108761">SUSE bug 1108761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108762">SUSE bug 1108762</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16741/">CVE-2018-16741 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16741">CVE-2018-16741 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16742/">CVE-2018-16742 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16742">CVE-2018-16742 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16743/">CVE-2018-16743 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16743">CVE-2018-16743 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16744/">CVE-2018-16744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16744">CVE-2018-16744 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16745/">CVE-2018-16745 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16745">CVE-2018-16745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553224" comment="g3utils-1.1.36-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553225" comment="mgetty-1.1.36-58.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149562" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1048510" ref_url="https://bugzilla.suse.com/1048510" source="BUGZILLA"/>
		<reference ref_id="1065276" ref_url="https://bugzilla.suse.com/1065276" source="BUGZILLA"/>
		<reference ref_id="1066156" ref_url="https://bugzilla.suse.com/1066156" source="BUGZILLA"/>
		<reference ref_id="1068251" ref_url="https://bugzilla.suse.com/1068251" source="BUGZILLA"/>
		<reference ref_id="1070428" ref_url="https://bugzilla.suse.com/1070428" source="BUGZILLA"/>
		<reference ref_id="1071558" ref_url="https://bugzilla.suse.com/1071558" source="BUGZILLA"/>
		<reference ref_id="1074254" ref_url="https://bugzilla.suse.com/1074254" source="BUGZILLA"/>
		<reference ref_id="1075724" ref_url="https://bugzilla.suse.com/1075724" source="BUGZILLA"/>
		<reference ref_id="1076308" ref_url="https://bugzilla.suse.com/1076308" source="BUGZILLA"/>
		<reference ref_id="897422" ref_url="https://bugzilla.suse.com/897422" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15908" ref_url="https://www.suse.com/security/cve/CVE-2017-15908/" source="CVE"/>
		<reference ref_id="CVE-2018-1049" ref_url="https://www.suse.com/security/cve/CVE-2018-1049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003686.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes several issues.

This security issue was fixed:

- CVE-2018-1049: Prevent race that can lead to DoS when using automounts (bsc#1076308).

These non-security issues were fixed:

- core: don't choke if a unit another unit triggers vanishes during reload
- delta: don't ignore PREFIX when the given argument is PREFIX/SUFFIX
- delta: extend skip logic to work on full directory paths (prefix+suffix) (bsc#1070428)
- delta: check if a prefix needs to be skipped only once
- delta: skip symlink paths when split-usr is enabled (#4591)
- sysctl: use raw file descriptor in sysctl_write (#7753)
- sd-netlink: don't take possesion of netlink fd from caller on failure (bsc#1074254)
- Fix the regexp used to detect broken by-id symlinks in /etc/crypttab
  It was missing the following case: '/dev/disk/by-id/cr_-xxx'.
- sysctl: disable buffer while writing to /proc (bsc#1071558)
- Use read_line() and LONG_LINE_MAX to read values configuration files. (bsc#1071558)
- sysctl: no need to check for eof twice
- def: add new constant LONG_LINE_MAX
- fileio: add new helper call read_line() as bounded getline() replacement
- service: Don't stop unneeded units needed by restarted service (#7526) (bsc#1066156)
- gpt-auto-generator: fix the handling of the value returned by fstab_has_fstype() in add_swap() (#6280)
- gpt-auto-generator: disable gpt auto logic for swaps if at least one is defined in fstab (bsc#897422)
- fstab-util: introduce fstab_has_fstype() helper
- fstab-generator: ignore root=/dev/nfs (#3591)
- fstab-generator: don't process root= if it happens to be 'gpt-auto' (#3452)
- virt: use XENFEAT_dom0 to detect the hardware domain (#6442, #6662) (#7581) (bsc#1048510)
- analyze: replace --no-man with --man=no in the man page (bsc#1068251)
- udev: net_setup_link: don't error out when we couldn't apply link config (#7328)
- Add missing /etc/systemd/network directory
- Fix parsing of features in detect_vm_xen_dom0 (#7890) (bsc#1048510)
- sd-bus: use -- when passing arguments to ssh (#6706)
- systemctl: make sure we terminate the bus connection first, and then close the pager (#3550)
- sd-bus: bump message queue size (bsc#1075724)
- tmpfiles: downgrade warning about duplicate line
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1048510">SUSE bug 1048510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065276">SUSE bug 1065276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066156">SUSE bug 1066156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068251">SUSE bug 1068251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070428">SUSE bug 1070428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071558">SUSE bug 1071558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074254">SUSE bug 1074254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075724">SUSE bug 1075724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076308">SUSE bug 1076308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897422">SUSE bug 897422</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15908/">CVE-2017-15908 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15908">CVE-2017-15908 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1049/">CVE-2018-1049 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1049">CVE-2018-1049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550566" comment="libsystemd0-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550567" comment="libsystemd0-32bit-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550568" comment="libudev1-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550569" comment="libudev1-32bit-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550570" comment="systemd-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550571" comment="systemd-32bit-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518816" comment="systemd-bash-completion-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550572" comment="systemd-sysvinit-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550573" comment="udev-228-150.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149563" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004639.html" source="SUSE-SU"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638)
- Prevent out of bounds reads in message parsing
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-04"/>
	<updated date="2018-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17833">CVE-2017-17833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553226" comment="openslp-2.0.0-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545819" comment="openslp-32bit-2.0.0-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553227" comment="openslp-server-2.0.0-18.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149564" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1044189" ref_url="https://bugzilla.suse.com/1044189" source="BUGZILLA"/>
		<reference ref_id="1063026" ref_url="https://bugzilla.suse.com/1063026" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1082863" ref_url="https://bugzilla.suse.com/1082863" source="BUGZILLA"/>
		<reference ref_id="1082979" ref_url="https://bugzilla.suse.com/1082979" source="BUGZILLA"/>
		<reference ref_id="1084427" ref_url="https://bugzilla.suse.com/1084427" source="BUGZILLA"/>
		<reference ref_id="1084536" ref_url="https://bugzilla.suse.com/1084536" source="BUGZILLA"/>
		<reference ref_id="1087209" ref_url="https://bugzilla.suse.com/1087209" source="BUGZILLA"/>
		<reference ref_id="1088087" ref_url="https://bugzilla.suse.com/1088087" source="BUGZILLA"/>
		<reference ref_id="1090535" ref_url="https://bugzilla.suse.com/1090535" source="BUGZILLA"/>
		<reference ref_id="1091815" ref_url="https://bugzilla.suse.com/1091815" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1094555" ref_url="https://bugzilla.suse.com/1094555" source="BUGZILLA"/>
		<reference ref_id="1094562" ref_url="https://bugzilla.suse.com/1094562" source="BUGZILLA"/>
		<reference ref_id="1095344" ref_url="https://bugzilla.suse.com/1095344" source="BUGZILLA"/>
		<reference ref_id="1095753" ref_url="https://bugzilla.suse.com/1095753" source="BUGZILLA"/>
		<reference ref_id="1096547" ref_url="https://bugzilla.suse.com/1096547" source="BUGZILLA"/>
		<reference ref_id="1099810" ref_url="https://bugzilla.suse.com/1099810" source="BUGZILLA"/>
		<reference ref_id="1102495" ref_url="https://bugzilla.suse.com/1102495" source="BUGZILLA"/>
		<reference ref_id="1102715" ref_url="https://bugzilla.suse.com/1102715" source="BUGZILLA"/>
		<reference ref_id="1102870" ref_url="https://bugzilla.suse.com/1102870" source="BUGZILLA"/>
		<reference ref_id="1102875" ref_url="https://bugzilla.suse.com/1102875" source="BUGZILLA"/>
		<reference ref_id="1102877" ref_url="https://bugzilla.suse.com/1102877" source="BUGZILLA"/>
		<reference ref_id="1102879" ref_url="https://bugzilla.suse.com/1102879" source="BUGZILLA"/>
		<reference ref_id="1102882" ref_url="https://bugzilla.suse.com/1102882" source="BUGZILLA"/>
		<reference ref_id="1102896" ref_url="https://bugzilla.suse.com/1102896" source="BUGZILLA"/>
		<reference ref_id="1103156" ref_url="https://bugzilla.suse.com/1103156" source="BUGZILLA"/>
		<reference ref_id="1103269" ref_url="https://bugzilla.suse.com/1103269" source="BUGZILLA"/>
		<reference ref_id="1106095" ref_url="https://bugzilla.suse.com/1106095" source="BUGZILLA"/>
		<reference ref_id="1106434" ref_url="https://bugzilla.suse.com/1106434" source="BUGZILLA"/>
		<reference ref_id="1106512" ref_url="https://bugzilla.suse.com/1106512" source="BUGZILLA"/>
		<reference ref_id="1106594" ref_url="https://bugzilla.suse.com/1106594" source="BUGZILLA"/>
		<reference ref_id="1106934" ref_url="https://bugzilla.suse.com/1106934" source="BUGZILLA"/>
		<reference ref_id="1107924" ref_url="https://bugzilla.suse.com/1107924" source="BUGZILLA"/>
		<reference ref_id="1108096" ref_url="https://bugzilla.suse.com/1108096" source="BUGZILLA"/>
		<reference ref_id="1108170" ref_url="https://bugzilla.suse.com/1108170" source="BUGZILLA"/>
		<reference ref_id="1108240" ref_url="https://bugzilla.suse.com/1108240" source="BUGZILLA"/>
		<reference ref_id="1108399" ref_url="https://bugzilla.suse.com/1108399" source="BUGZILLA"/>
		<reference ref_id="1108803" ref_url="https://bugzilla.suse.com/1108803" source="BUGZILLA"/>
		<reference ref_id="1108823" ref_url="https://bugzilla.suse.com/1108823" source="BUGZILLA"/>
		<reference ref_id="1109333" ref_url="https://bugzilla.suse.com/1109333" source="BUGZILLA"/>
		<reference ref_id="1109336" ref_url="https://bugzilla.suse.com/1109336" source="BUGZILLA"/>
		<reference ref_id="1109337" ref_url="https://bugzilla.suse.com/1109337" source="BUGZILLA"/>
		<reference ref_id="1109441" ref_url="https://bugzilla.suse.com/1109441" source="BUGZILLA"/>
		<reference ref_id="1110297" ref_url="https://bugzilla.suse.com/1110297" source="BUGZILLA"/>
		<reference ref_id="1110337" ref_url="https://bugzilla.suse.com/1110337" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14613" ref_url="https://www.suse.com/security/cve/CVE-2018-14613/" source="CVE"/>
		<reference ref_id="CVE-2018-14617" ref_url="https://www.suse.com/security/cve/CVE-2018-14617/" source="CVE"/>
		<reference ref_id="CVE-2018-16276" ref_url="https://www.suse.com/security/cve/CVE-2018-16276/" source="CVE"/>
		<reference ref_id="CVE-2018-16597" ref_url="https://www.suse.com/security/cve/CVE-2018-16597/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<reference ref_id="CVE-2018-7480" ref_url="https://www.suse.com/security/cve/CVE-2018-7480/" source="CVE"/>
		<reference ref_id="CVE-2018-7757" ref_url="https://www.suse.com/security/cve/CVE-2018-7757/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3003-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.156 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-16597: Incorrect access checking in overlayfs mounts could have been
  used by local attackers to modify or truncate files in the underlying
  filesystem (bnc#1106512).
- CVE-2018-14613: Prevent invalid pointer dereference in io_ctl_map_page() when
  mounting and operating a crafted btrfs image, caused by a lack of block group
  item validation in check_leaf_item (bsc#1102896)
- CVE-2018-14617: Prevent NULL pointer dereference and panic in
  hfsplus_lookup() when opening a file (that is purportedly a hard link) in an
  hfs+ filesystem that has malformed catalog data, and is mounted read-only
  without a metadata directory (bsc#1102870)
- CVE-2018-16276: Incorrect bounds checking in the yurex USB driver in
  yurex_read allowed local attackers to use user access read/writes to crash the
  kernel or potentially escalate privileges (bsc#1106095)
- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in
  drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of
  service (memory consumption) via many read accesses to files in the
  /sys/class/sas_phy directory, as demonstrated by the
  /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536)
- CVE-2018-7480: The blkcg_init_queue function allowed local users to cause a
  denial of service (double free) or possibly have unspecified other impact by
  triggering a creation failure (bsc#1082863).
- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c
  mishandled sequence number overflows. An attacker can trigger a
  use-after-free (and possibly gain privileges) via certain thread creation,
  map, unmap, invalidation, and dereference operations (bnc#1108399).

The following non-security bugs were fixed:

- asm/sections: add helpers to check for section data (bsc#1063026).
- ASoC: wm8994: Fix missing break in switch (bnc#1012382).
- block: bvec_nr_vecs() returns value for wrong slab (bsc#1082979).
- bpf: fix overflow in prog accounting (bsc#1012382).
- btrfs: Add checker for EXTENT_CSUM (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: Add sanity check for EXTENT_DATA when reading out leaf (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: Check if item pointer overlaps with the item itself (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: Check that each block group has corresponding chunk at mount time (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: Introduce mount time chunk &lt;-&gt; dev extent mapping check (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: Move leaf and node validation checker to tree-checker.c (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized (bnc#1012382).
- btrfs: replace: Reset on-disk dev stats value after replace (bnc#1012382).
- btrfs: scrub: Do not use inode page cache in scrub_handle_errored_block() (bsc#1108096).
- btrfs: tree-checker: Add checker for dir item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Detect invalid and empty essential trees (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Enhance btrfs_check_node output (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Enhance output for btrfs_check_leaf (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Enhance output for check_csum_item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Enhance output for check_extent_data_item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Fix false panic for sanity test (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Replace root parameter with fs_info (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: use %zu format string for size_t (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: use %zu format string for size_t (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Verify block_group_item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: use correct compare function of dirty_metadata_bytes (bnc#1012382).
- btrfs: Verify that every chunk has corresponding block group at mount time (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- cifs: check if SMB2 PDU size has been padded and suppress the warning (bnc#1012382).
- crypto: clarify licensing of OpenSSL asm code ().
- crypto: vmx - Remove overly verbose printk from AES XTS init (git-fixes).
- debugobjects: Make stack check warning more informative (bnc#1012382).
- dm kcopyd: avoid softlockup in run_complete_job (bnc#1012382).
- dm-mpath: do not try to access NULL rq (bsc#1110337).
- EDAC: Fix memleak in module init error path (bsc#1109441).
- EDAC, i7core: Fix memleaks and use-after-free on probe and remove (1109441).
- fat: validate -&gt;i_start before using (bnc#1012382).
- Fixes: Commit cdbf92675fad ('mm: numa: avoid waiting on freed migrated pages') (bnc#1012382).
- Follow-up fix for patches.arch/01-jump_label-reduce-the-size-of-struct-static_key-kabi.patch (bsc#1108803).
- fork: do not copy inconsistent signal handler state to child (bnc#1012382).
- fs/dcache.c: fix kmemcheck splat at take_dentry_name_snapshot() (bnc#1012382).
- genirq: Delay incrementing interrupt count if it's disabled/pending (bnc#1012382).
- grow_cache: we still have a code which uses both __GFP_ZERO and constructors. The code seems to be correct and the warning does more harm than good so revert for the the meantime until we catch offenders. (bnc#1110297) 
- hfsplus: do not return 0 when fill_super() failed (bnc#1012382).
- hfs: prevent crash on exit from failed search (bnc#1012382).
- ib_srp: Remove WARN_ON in srp_terminate_io() (bsc#1094562).
- ipvs: fix race between ip_vs_conn_new() and ip_vs_del_dest() (bnc#1012382).
- irqchip/bcm7038-l1: Hide cpu offline callback when building for !SMP (bnc#1012382).
- irqchip/gic-v3: Add missing barrier to 32bit version of gic_read_iar() (bnc#1012382).
- kabi protect hnae_ae_ops (bsc#1107924).
- kbuild: make missing $DEPMOD a Warning instead of an Error (bnc#1012382).
- l2tp: cast l2tp traffic counter to unsigned (bsc#1099810).
- mei: me: allow runtime pm for platform with D0i3 (bnc#1012382).
- mfd: sm501: Set coherent_dma_mask when creating subdevices (bnc#1012382).
- mm/fadvise.c: fix signed overflow UBSAN complaint (bnc#1012382).
- net/9p: fix error path of p9_virtio_probe (bnc#1012382).
- net: bcmgenet: use MAC link status for fixed phy (bnc#1012382).
- net: ena: Eliminate duplicate barriers on weakly-ordered archs (bsc#1108240).
- net: ena: fix device destruction to gracefully free resources (bsc#1108240).
- net: ena: fix driver when PAGE_SIZE == 64kB (bsc#1108240).
- net: ena: fix incorrect usage of memory barriers (bsc#1108240).
- net: ena: fix missing calls to READ_ONCE (bsc#1108240).
- net: ena: fix missing lock during device destruction (bsc#1108240).
- net: ena: fix potential double ena_destroy_device() (bsc#1108240).
- net: ena: fix surprise unplug NULL dereference kernel crash (bsc#1108240).
- net: hns: add netif_carrier_off before change speed and duplex (bsc#1107924).
- net: hns: add the code for cleaning pkt in chip (bsc#1107924).
- nvme_fc: add 'nvme_discovery' sysfs attribute to fc transport device (bsc#1044189).
- nvmet: fixup crash on NULL device path (bsc#1082979).
- ovl: modify ovl_permission() to do checks on two inodes (bsc#1106512)
- ovl: proper cleanup of workdir (bnc#1012382).
- ovl: rename is_merge to is_lowest (bnc#1012382).
- PCI: mvebu: Fix I/O space end address calculation (bnc#1012382).
- platform/x86: asus-nb-wmi: Add keymap entry for lid flip action on UX360 (bnc#1012382).
- powerpc/64: Do load of PACAKBASE in LOAD_HANDLER (bsc#1094244).
- powerpc/book3s: Fix MCE console messages for unrecoverable MCE (bsc#1094244).
- powerpc/fadump: cleanup crash memory ranges support (bsc#1103269).
- powerpc/fadump: re-register firmware-assisted dump if already registered (bsc#1108170, bsc#1108823).
- powerpc: Fix size calculation using resource_size() (bnc#1012382).
- powerpc/mce: Move 64-bit machine check code into mce.c (bsc#1094244).
- powerpc/perf/hv-24x7: Fix off-by-one error in request_buffer check (git-fixes).
- powerpc/powernv/ioda2: Reduce upper limit for DMA window size (bsc#1066223).
- powerpc/powernv: Rename machine_check_pSeries_early() to powernv (bsc#1094244).
- powerpc/pseries: Avoid using the size greater than RTAS_ERROR_LOG_MAX (bnc#1012382).
- powerpc/pseries: Disable CPU hotplug across migrations (bsc#1066223).
- powerpc/pseries: Remove prrn_work workqueue (bsc#1102495, bsc#1109337).
- powerpc/pseries: Remove unneeded uses of dlpar work queue (bsc#1102495, bsc#1109337).
- powerpc/tm: Fix userspace r13 corruption (bsc#1109333).
- RDMA/rw: Fix rdma_rw_ctx_signature_init() kernel-doc header (bsc#1082979).
- reiserfs: change j_timestamp type to time64_t (bnc#1012382).
- Revert 'ARM: imx_v6_v7_defconfig: Select ULPI support' (bnc#1012382).
- s390/dasd: fix hanging offline processing due to canceled worker (bnc#1012382).
- s390/lib: use expoline for all bcr instructions (LTC#171029 bnc#1012382 bnc#1106934).
- sch_hhf: fix null pointer dereference on init failure (bnc#1012382).
- sch_htb: fix crash on init failure (bnc#1012382).
- sch_multiq: fix double free on init failure (bnc#1012382).
- sch_netem: avoid null pointer deref on init failure (bnc#1012382).
- sch_tbf: fix two null pointer dereferences on init failure (bnc#1012382).
- scripts: modpost: check memory allocation results (bnc#1012382).
- scsi: aic94xx: fix an error code in aic94xx_init() (bnc#1012382).
- scsi: ipr: System hung while dlpar adding primary ipr adapter back (bsc#1109336).
- scsi: qla2xxx: Add changes for devloss timeout in driver (bsc#1084427).
- scsi: qla2xxx: Add FC-NVMe abort processing (bsc#1084427).
- scsi: qla2xxx: Add longer window for chip reset (bsc#1094555).
- scsi: qla2xxx: Avoid double completion of abort command (bsc#1094555).
- scsi: qla2xxx: Cleanup code to improve FC-NVMe error handling (bsc#1084427).
- scsi: qla2xxx: Cleanup for N2N code (bsc#1094555).
- scsi: qla2xxx: correctly shift host byte (bsc#1094555).
- scsi: qla2xxx: Correct setting of SAM_STAT_CHECK_CONDITION (bsc#1094555).
- scsi: qla2xxx: Delete session for nport id change (bsc#1094555).
- scsi: qla2xxx: Fix Async GPN_FT for FCP and FC-NVMe scan (bsc#1084427).
- scsi: qla2xxx: Fix crash on qla2x00_mailbox_command (bsc#1094555).
- scsi: qla2xxx: Fix double free bug after firmware timeout (bsc#1094555).
- scsi: qla2xxx: Fix driver unload by shutting down chip (bsc#1094555).
- scsi: qla2xxx: fix error message on &lt;qla2400 (bsc#1094555).
- scsi: qla2xxx: Fix FC-NVMe IO abort during driver reset (bsc#1084427).
- scsi: qla2xxx: Fix function argument descriptions (bsc#1094555).
- scsi: qla2xxx: Fix Inquiry command being dropped in Target mode (bsc#1094555).
- scsi: qla2xxx: Fix issue reported by static checker for qla2x00_els_dcmd2_sp_done() (bsc#1094555).
- scsi: qla2xxx: Fix login retry count (bsc#1094555).
- scsi: qla2xxx: Fix Management Server NPort handle reservation logic (bsc#1094555).
- scsi: qla2xxx: Fix memory leak for allocating abort IOCB (bsc#1094555).
- scsi: qla2xxx: Fix n2n_ae flag to prevent dev_loss on PDB change (bsc#1084427).
- scsi: qla2xxx: Fix N2N link re-connect (bsc#1094555).
- scsi: qla2xxx: Fix NPIV deletion by calling wait_for_sess_deletion (bsc#1094555).
- scsi: qla2xxx: Fix race between switch cmd completion and timeout (bsc#1094555).
- scsi: qla2xxx: Fix race condition between iocb timeout and initialisation (bsc#1094555).
- scsi: qla2xxx: Fix redundant fc_rport registration (bsc#1094555).
- scsi: qla2xxx: Fix retry for PRLI RJT with reason of BUSY (bsc#1084427).
- scsi: qla2xxx: Fix Rport and session state getting out of sync (bsc#1094555).
- scsi: qla2xxx: Fix sending ADISC command for login (bsc#1094555).
- scsi: qla2xxx: Fix session state stuck in Get Port DB (bsc#1094555).
- scsi: qla2xxx: Fix stalled relogin (bsc#1094555).
- scsi: qla2xxx: Fix TMF and Multi-Queue config (bsc#1094555).
- scsi: qla2xxx: Fix unintended Logout (bsc#1094555).
- scsi: qla2xxx: Fix unintialized List head crash (bsc#1094555).
- scsi: qla2xxx: Flush mailbox commands on chip reset (bsc#1094555).
- scsi: qla2xxx: fx00 copypaste typo (bsc#1094555).
- scsi: qla2xxx: Migrate NVME N2N handling into state machine (bsc#1094555).
- scsi: qla2xxx: Move GPSC and GFPNID out of session management (bsc#1094555).
- scsi: qla2xxx: Prevent relogin loop by removing stale code (bsc#1094555).
- scsi: qla2xxx: Prevent sysfs access when chip is down (bsc#1094555).
- scsi: qla2xxx: Reduce redundant ADISC command for RSCNs (bsc#1094555).
- scsi: qla2xxx: remove irq save in qla2x00_poll() (bsc#1094555).
- scsi: qla2xxx: Remove nvme_done_list (bsc#1084427).
- scsi: qla2xxx: Remove stale debug value for login_retry flag (bsc#1094555).
- scsi: qla2xxx: Remove unneeded message and minor cleanup for FC-NVMe (bsc#1084427).
- scsi: qla2xxx: Restore ZIO threshold setting (bsc#1084427).
- scsi: qla2xxx: Return busy if rport going away (bsc#1084427).
- scsi: qla2xxx: Save frame payload size from ICB (bsc#1094555).
- scsi: qla2xxx: Set IIDMA and fcport state before qla_nvme_register_remote() (bsc#1084427).
- scsi: qla2xxx: Silent erroneous message (bsc#1094555).
- scsi: qla2xxx: Update driver version to 10.00.00.06-k (bsc#1084427).
- scsi: qla2xxx: Update driver version to 10.00.00.07-k (bsc#1094555).
- scsi: qla2xxx: Update driver version to 10.00.00.08-k (bsc#1094555).
- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1094555).
- scsi: qla2xxx: Use predefined get_datalen_for_atio() inline function (bsc#1094555).
- selftests/powerpc: Kill child processes on SIGINT (bnc#1012382).
- smb3: fix reset of bytes read and written stats (bnc#1012382).
- SMB3: Number of requests sent should be displayed for SMB3 not just CIFS (bnc#1012382).
- staging: android: ion: fix ION_IOC_{MAP,SHARE} use-after-free (bnc#1012382).
- staging: comedi: ni_mio_common: fix subdevice flags for PFI subdevice (bnc#1012382).
- tcp: do not restart timewait timer on rst reception (bnc#1012382).
- Update patches.suse/dm-Always-copy-cmd_flags-when-cloning-a-request.patch (bsc#1088087, bsc#1103156).
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).
- vti6: remove !skb-&gt;ignore_df check from vti6_xmit() (bnc#1012382).
- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).
- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).
- x86/pae: use 64 bit atomic xchg function in native_ptep_get_and_clear (bnc#1012382).
- x86/speculation/l1tf: Fix up pte-&gt;pfn conversion for PAE (bnc#1012382).
- xen: avoid crash in disable_hotplug_cpu (bsc#1106594).
- xfs: add a new xfs_iext_lookup_extent_before helper (bsc#1095344).
- xfs: add asserts for the mmap lock in xfs_{insert,collapse}_file_space (bsc#1095344).
- xfs: add a xfs_bmap_fork_to_state helper (bsc#1095344).
- xfs: add a xfs_iext_update_extent helper (bsc#1095344).
- xfs: add comments documenting the rebalance algorithm (bsc#1095344).
- xfs: add some comments to xfs_iext_insert/xfs_iext_insert_node (bsc#1095344).
- xfs: add xfs_trim_extent (bsc#1095344).
- xfs: allow unaligned extent records in xfs_bmbt_disk_set_all (bsc#1095344).
- xfs: borrow indirect blocks from freed extent when available (bsc#1095344).
- xfs: cleanup xfs_bmap_last_before (bsc#1095344).
- xfs: do not create overlapping extents in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: do not rely on extent indices in xfs_bmap_collapse_extents (bsc#1095344).
- xfs: do not rely on extent indices in xfs_bmap_insert_extents (bsc#1095344).
- xfs: do not set XFS_BTCUR_BPRV_WASDEL in xfs_bunmapi (bsc#1095344).
- xfs: during btree split, save new block key and ptr for future insertion (bsc#1095344).
- xfs: factor out a helper to initialize a local format inode fork (bsc#1095344).
- xfs: fix memory leak in xfs_iext_free_last_leaf (bsc#1095344).
- xfs: fix number of records handling in xfs_iext_split_leaf (bsc#1095344).
- xfs: fix transaction allocation deadlock in IO path (bsc#1090535).
- xfs: handle indlen shortage on delalloc extent merge (bsc#1095344).
- xfs: handle zero entries case in xfs_iext_rebalance_leaf (bsc#1095344).
- xfs: improve kmem_realloc (bsc#1095344).
- xfs: inline xfs_shift_file_space into callers (bsc#1095344).
- xfs: introduce the xfs_iext_cursor abstraction (bsc#1095344).
- xfs: iterate over extents in xfs_bmap_extents_to_btree (bsc#1095344).
- xfs: iterate over extents in xfs_iextents_copy (bsc#1095344).
- xfs: make better use of the 'state' variable in xfs_bmap_del_extent_real (bsc#1095344).
- xfs: merge xfs_bmap_read_extents into xfs_iread_extents (bsc#1095344).
- xfs: move pre/post-bmap tracing into xfs_iext_update_extent (bsc#1095344).
- xfs: move some code around inside xfs_bmap_shift_extents (bsc#1095344).
- xfs: move some more code into xfs_bmap_del_extent_real (bsc#1095344).
- xfs: move xfs_bmbt_irec and xfs_exntst_t to xfs_types.h (bsc#1095344).
- xfs: move xfs_iext_insert tracepoint to report useful information (bsc#1095344).
- xfs: new inode extent list lookup helpers (bsc#1095344).
- xfs: only run torn log write detection on dirty logs (bsc#1095753).
- xfs: pass an on-disk extent to xfs_bmbt_validate_extent (bsc#1095344).
- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_lookup_eq (bsc#1095344).
- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_update (bsc#1095344).
- xfs: pass struct xfs_bmbt_irec to xfs_bmbt_validate_extent (bsc#1095344).
- xfs: provide helper for counting extents from if_bytes (bsc#1095344).
- xfs: refactor delalloc accounting in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: refactor delalloc indlen reservation split into helper (bsc#1095344).
- xfs: refactor dir2 leaf readahead shadow buffer cleverness (bsc#1095344).
- xfs: refactor in-core log state update to helper (bsc#1095753).
- xfs: refactor unmount record detection into helper (bsc#1095753).
- xfs: refactor xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_hole_delay (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_hole_real (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_unwritten_real (bsc#1095344).
- xfs: refactor xfs_bunmapi_cow (bsc#1095344).
- xfs: refactor xfs_del_extent_real (bsc#1095344).
- xfs: remove a duplicate assignment in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: remove all xfs_bmbt_set_* helpers except for xfs_bmbt_set_all (bsc#1095344).
- xfs: remove a superflous assignment in xfs_iext_remove_node (bsc#1095344).
- xfs: remove if_rdev (bsc#1095344).
- xfs: remove prev argument to xfs_bmapi_reserve_delalloc (bsc#1095344).
- xfs: remove support for inlining data/extents into the inode fork (bsc#1095344).
- xfs: remove the never fully implemented UUID fork format (bsc#1095344).
- xfs: remove the nr_extents argument to xfs_iext_insert (bsc#1095344).
- xfs: remove the nr_extents argument to xfs_iext_remove (bsc#1095344).
- xfs: remove XFS_BMAP_MAX_SHIFT_EXTENTS (bsc#1095344).
- xfs: remove XFS_BMAP_TRACE_EXLIST (bsc#1095344).
- xfs: remove xfs_bmbt_get_state (bsc#1095344).
- xfs: remove xfs_bmse_shift_one (bsc#1095344).
- xfs: rename bno to end in __xfs_bunmapi (bsc#1095344).
- xfs: replace xfs_bmbt_lookup_ge with xfs_bmbt_lookup_first (bsc#1095344).
- xfs: replace xfs_qm_get_rtblks with a direct call to xfs_bmap_count_leaves (bsc#1095344).
- xfs: rewrite getbmap using the xfs_iext_* helpers (bsc#1095344).
- xfs: rewrite xfs_bmap_count_leaves using xfs_iext_get_extent (bsc#1095344).
- xfs: rewrite xfs_bmap_first_unused to make better use of xfs_iext_get_extent (bsc#1095344).
- xfs: separate log head record discovery from verification (bsc#1095753).
- xfs: simplify the xfs_getbmap interface (bsc#1095344).
- xfs: simplify validation of the unwritten extent bit (bsc#1095344).
- xfs: split indlen reservations fairly when under reserved (bsc#1095344).
- xfs: split xfs_bmap_shift_extents (bsc#1095344).
- xfs: switch xfs_bmap_local_to_extents to use xfs_iext_insert (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_delay (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_unwritten_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_collapse_extents (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_del_extent_* (bsc#1095344).
- xfs: update freeblocks counter after extent deletion (bsc#1095344).
- xfs: update got in xfs_bmap_shift_update_extent (bsc#1095344).
- xfs: use a b+tree for the in-core extent list (bsc#1095344).
- xfs: use correct state defines in xfs_bmap_del_extent_{cow,delay} (bsc#1095344).
- xfs: use new extent lookup helpers in xfs_bmapi_read (bsc#1095344).
- xfs: use new extent lookup helpers in xfs_bmapi_write (bsc#1095344).
- xfs: use new extent lookup helpers in __xfs_bunmapi (bsc#1095344).
- xfs: use the state defines in xfs_bmap_del_extent_real (bsc#1095344).
- xfs: use xfs_bmap_del_extent_delay for the data fork as well (bsc#1095344).
- xfs: use xfs_iext_*_extent helpers in xfs_bmap_shift_extents (bsc#1095344).
- xfs: use xfs_iext_*_extent helpers in xfs_bmap_split_extent_at (bsc#1095344).
- xfs: use xfs_iext_get_extent instead of open coding it (bsc#1095344).
- xfs: use xfs_iext_get_extent in xfs_bmap_first_unused (bsc#1095344).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-04"/>
	<updated date="2018-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044189">SUSE bug 1044189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063026">SUSE bug 1063026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082863">SUSE bug 1082863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082979">SUSE bug 1082979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084427">SUSE bug 1084427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087209">SUSE bug 1087209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088087">SUSE bug 1088087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090535">SUSE bug 1090535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094555">SUSE bug 1094555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094562">SUSE bug 1094562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095344">SUSE bug 1095344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095753">SUSE bug 1095753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096547">SUSE bug 1096547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099810">SUSE bug 1099810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102495">SUSE bug 1102495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102715">SUSE bug 1102715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102870">SUSE bug 1102870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102875">SUSE bug 1102875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102877">SUSE bug 1102877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102879">SUSE bug 1102879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102882">SUSE bug 1102882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102896">SUSE bug 1102896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103156">SUSE bug 1103156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103269">SUSE bug 1103269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106095">SUSE bug 1106095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106434">SUSE bug 1106434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106512">SUSE bug 1106512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106594">SUSE bug 1106594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106934">SUSE bug 1106934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107924">SUSE bug 1107924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108096">SUSE bug 1108096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108170">SUSE bug 1108170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108240">SUSE bug 1108240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108399">SUSE bug 1108399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108803">SUSE bug 1108803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108823">SUSE bug 1108823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109333">SUSE bug 1109333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109336">SUSE bug 1109336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109337">SUSE bug 1109337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109441">SUSE bug 1109441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110297">SUSE bug 1110297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110337">SUSE bug 1110337</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14613/">CVE-2018-14613 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14613">CVE-2018-14613 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14617/">CVE-2018-14617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14617">CVE-2018-14617 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16276/">CVE-2018-16276 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16276">CVE-2018-16276 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16597/">CVE-2018-16597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16597">CVE-2018-16597 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17182">CVE-2018-17182 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7480/">CVE-2018-7480 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7480">CVE-2018-7480 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7757/">CVE-2018-7757 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7757">CVE-2018-7757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553228" comment="kernel-default-4.4.156-94.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553229" comment="kernel-default-base-4.4.156-94.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553230" comment="kernel-default-devel-4.4.156-94.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553231" comment="kernel-default-man-4.4.156-94.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520133" comment="kernel-devel-4.4.156-94.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520134" comment="kernel-macros-4.4.156-94.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520135" comment="kernel-source-4.4.156-94.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553232" comment="kernel-syms-4.4.156-94.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149565" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1076832" ref_url="https://bugzilla.suse.com/1076832" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6003" ref_url="https://www.suse.com/security/cve/CVE-2018-6003/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003682.html" source="SUSE-SU"/>
		<description>
This update for libtasn1 fixes one issue.

This security issue was fixed:

- CVE-2018-6003: Prevent a stack exhaustion in  _asn1_decode_simple_ber
  (lib/decoding.c) when decoding BER encoded structure allowed for DoS
  (bsc#1076832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076832">SUSE bug 1076832</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6003/">CVE-2018-6003 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6003">CVE-2018-6003 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553233" comment="libtasn1-4.9-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553234" comment="libtasn1-6-4.9-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553235" comment="libtasn1-6-32bit-4.9-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149566" version="1" class="patch">
	<metadata>
		<title>Security update for texlive (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1109673" ref_url="https://bugzilla.suse.com/1109673" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17407" ref_url="https://www.suse.com/security/cve/CVE-2018-17407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004647.html" source="SUSE-SU"/>
		<description>
This update for texlive fixes the following issue:

- CVE-2018-17407: Prevent buffer overflow when handling of Type 1 fonts allowed
  arbitrary code execution when a malicious font was loaded by one of the
  vulnerable tools: pdflatex, pdftex, dvips, or luatex (bsc#1109673)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-05"/>
	<updated date="2018-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109673">SUSE bug 1109673</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17407/">CVE-2018-17407 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17407">CVE-2018-17407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553236" comment="libkpathsea6-6.2.0dev-22.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149567" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1101644" ref_url="https://bugzilla.suse.com/1101644" source="BUGZILLA"/>
		<reference ref_id="1101645" ref_url="https://bugzilla.suse.com/1101645" source="BUGZILLA"/>
		<reference ref_id="1101651" ref_url="https://bugzilla.suse.com/1101651" source="BUGZILLA"/>
		<reference ref_id="1101656" ref_url="https://bugzilla.suse.com/1101656" source="BUGZILLA"/>
		<reference ref_id="1106812" ref_url="https://bugzilla.suse.com/1106812" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2938" ref_url="https://www.suse.com/security/cve/CVE-2018-2938/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004649.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to the jdk8u181 (icedtea 3.9.0) release fixes the following issues:

These security issues were fixed:

- CVE-2018-2938: Difficult to exploit vulnerability allowed unauthenticated
  attacker with network access via multiple protocols to compromise Java SE.
  Successful attacks of this vulnerability can result in takeover of Java SE
  (bsc#1101644).
- CVE-2018-2940: Vulnerability in subcomponent: Libraries. Easily exploitable
  vulnerability allowed unauthenticated attacker with network access via multiple
  protocols to compromise Java SE, Java SE Embedded. Successful attacks require
  human interaction from a person other than the attacker. Successful attacks of
  this vulnerability can result in unauthorized read access to a subset of Java
  SE, Java SE Embedded accessible data (bsc#1101645)
- CVE-2018-2952: Vulnerability in subcomponent: Concurrency. Difficult to
  exploit vulnerability allowed unauthenticated attacker with network access via
  multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful
  attacks of this vulnerability can result in unauthorized ability to cause a
  partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit
  (bsc#1101651)
- CVE-2018-2973: Vulnerability in subcomponent: JSSE. Difficult to exploit
  vulnerability allowed unauthenticated attacker with network access via SSL/TLS
  to compromise Java SE, Java SE Embedded. Successful attacks of this
  vulnerability can result in unauthorized creation, deletion or modification
  access to critical data or all Java SE, Java SE Embedded accessible data
  (bsc#1101656)

These non-security issues were fixed:

- Improve desktop file usage
- Better Internet address support
- speculative traps break when classes are redefined
- sun/security/pkcs11/ec/ReadCertificates.java fails intermittently
- Clean up code that saves the previous versions of redefined classes
- Prevent SIGSEGV in ReceiverTypeData::clean_weak_klass_links
- RedefineClasses() tests fail assert(((Metadata*)obj)-&gt;is_valid()) failed: obj is valid
- NMT is not enabled if NMT option is specified after class path specifiers
- EndEntityChecker should not process custom extensions after PKIX validation
- SupportedDSAParamGen.java failed with timeout
- Montgomery multiply intrinsic should use correct name
- When determining the ciphersuite lists, there is no debug output for disabled suites.
- sun/security/mscapi/SignedObjectChain.java fails on Windows
- On Windows Swing changes keyboard layout on a window activation
- IfNode::range_check_trap_proj() should handler dying subgraph with single if proj
- Even better Internet address support
- Newlines in JAXB string values of SOAP-requests are escaped to '&amp;#xa;'
- TestFlushableGZIPOutputStream failing with IndexOutOfBoundsException
- Unable to use JDWP API in JDK 8 to debug JDK 9 VM
- Hotspot crash on Cassandra 3.11.1 startup with libnuma 2.0.3
- Performance drop with Java JDK 1.8.0_162-b32
- Upgrade time-zone data to tzdata2018d
- Fix potential crash in BufImg_SetupICM
- JDK 8u181 l10n resource file update
- Remove debug print statements from RMI fix
- (tz) Upgrade time-zone data to tzdata2018e
- ObjectInputStream filterCheck method throws NullPointerException
- adjust reflective access checks
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-08"/>
	<updated date="2018-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101644">SUSE bug 1101644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101651">SUSE bug 1101651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106812">SUSE bug 1106812</bugzilla>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2938/">CVE-2018-2938 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2938">CVE-2018-2938 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2940">CVE-2018-2940 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2952">CVE-2018-2952 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2973">CVE-2018-2973 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553237" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553238" comment="java-1_8_0-openjdk-demo-1.8.0.181-27.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553239" comment="java-1_8_0-openjdk-devel-1.8.0.181-27.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553240" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149568" version="1" class="patch">
	<metadata>
		<title>Security update for qpdf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1040311" ref_url="https://bugzilla.suse.com/1040311" source="BUGZILLA"/>
		<reference ref_id="1040312" ref_url="https://bugzilla.suse.com/1040312" source="BUGZILLA"/>
		<reference ref_id="1040313" ref_url="https://bugzilla.suse.com/1040313" source="BUGZILLA"/>
		<reference ref_id="1050577" ref_url="https://bugzilla.suse.com/1050577" source="BUGZILLA"/>
		<reference ref_id="1050578" ref_url="https://bugzilla.suse.com/1050578" source="BUGZILLA"/>
		<reference ref_id="1050579" ref_url="https://bugzilla.suse.com/1050579" source="BUGZILLA"/>
		<reference ref_id="1050581" ref_url="https://bugzilla.suse.com/1050581" source="BUGZILLA"/>
		<reference ref_id="1055960" ref_url="https://bugzilla.suse.com/1055960" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11624" ref_url="https://www.suse.com/security/cve/CVE-2017-11624/" source="CVE"/>
		<reference ref_id="CVE-2017-11625" ref_url="https://www.suse.com/security/cve/CVE-2017-11625/" source="CVE"/>
		<reference ref_id="CVE-2017-11626" ref_url="https://www.suse.com/security/cve/CVE-2017-11626/" source="CVE"/>
		<reference ref_id="CVE-2017-11627" ref_url="https://www.suse.com/security/cve/CVE-2017-11627/" source="CVE"/>
		<reference ref_id="CVE-2017-12595" ref_url="https://www.suse.com/security/cve/CVE-2017-12595/" source="CVE"/>
		<reference ref_id="CVE-2017-9208" ref_url="https://www.suse.com/security/cve/CVE-2017-9208/" source="CVE"/>
		<reference ref_id="CVE-2017-9209" ref_url="https://www.suse.com/security/cve/CVE-2017-9209/" source="CVE"/>
		<reference ref_id="CVE-2017-9210" ref_url="https://www.suse.com/security/cve/CVE-2017-9210/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004650.html" source="SUSE-SU"/>
		<description>

  
This update for qpdf fixes the following issues:

qpdf was updated to 7.1.1.

Security issues fixed:

- CVE-2017-11627: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050577).
- CVE-2017-11625: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050579).
- CVE-2017-11626: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050578).
- CVE-2017-11624: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050581).
- CVE-2017-12595: Stack overflow when processing deeply nested arrays and dictionaries (bsc#1055960).
- CVE-2017-9209: Remote attackers can cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document (bsc#1040312).
- CVE-2017-9210: Remote attackers can cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document (bsc#1040313).
- CVE-2017-9208: Remote attackers can cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document (bsc#1040311).

  * Check release notes for detailed bug fixes.
  * http://qpdf.sourceforge.net/files/qpdf-manual.html#ref.release-notes

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-08"/>
	<updated date="2018-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040311">SUSE bug 1040311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040312">SUSE bug 1040312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040313">SUSE bug 1040313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050577">SUSE bug 1050577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050578">SUSE bug 1050578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050579">SUSE bug 1050579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050581">SUSE bug 1050581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055960">SUSE bug 1055960</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11624/">CVE-2017-11624 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11624">CVE-2017-11624 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11625/">CVE-2017-11625 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11625">CVE-2017-11625 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11626/">CVE-2017-11626 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11626">CVE-2017-11626 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11627/">CVE-2017-11627 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11627">CVE-2017-11627 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12595/">CVE-2017-12595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12595">CVE-2017-12595 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9208/">CVE-2017-9208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9208">CVE-2017-9208 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9209/">CVE-2017-9209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9209">CVE-2017-9209 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9210/">CVE-2017-9210 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9210">CVE-2017-9210 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553241" comment="cups-filters-1.0.58-19.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553242" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553243" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553244" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553245" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553246" comment="qpdf-7.1.1-3.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149569" version="1" class="patch">
	<metadata>
		<title>Security update for soundtouch (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1103676" ref_url="https://bugzilla.suse.com/1103676" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000223" ref_url="https://www.suse.com/security/cve/CVE-2018-1000223/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004652.html" source="SUSE-SU"/>
		<description>
This update for soundtouch fixes the following security issue:

- CVE-2018-1000223: Prevent buffer overflow in WavInFile::readHeaderBlock()
  that could have resulted in arbitrary code execution when opening maliocius
  file in soundstretch utility (bsc#1103676)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-08"/>
	<updated date="2018-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103676">SUSE bug 1103676</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000223/">CVE-2018-1000223 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000223">CVE-2018-1000223 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553247" comment="libSoundTouch0-1.7.1-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149570" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1108308" ref_url="https://bugzilla.suse.com/1108308" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004655.html" source="SUSE-SU"/>
		<description>

This update for brings postgresql10 version 10.5 to SUSE Linux Enterprise 12 SP3. (FATE#325659 bnc#1108308)

This release marks the change of the versioning scheme for PostgreSQL
to a 'x.y' format. This means the next minor releases of PostgreSQL
will be 10.1, 10.2, ... and the next major release will be 11.

* Logical Replication

Logical replication extends the current replication features of
PostgreSQL with the ability to send modifications on a per-database
and per-table level to different PostgreSQL databases. Users can now
fine-tune the data replicated to various database clusters and will
have the ability to perform zero-downtime upgrades to future major
PostgreSQL versions.

* Declarative Table Partitioning

Table partitioning has existed for years in PostgreSQL but required a
user to maintain a nontrivial set of rules and triggers for the
partitioning to work. PostgreSQL 10 introduces a table partitioning
syntax that lets users easily create and maintain range and list
partitioned tables.

* Improved Query Parallelism

PostgreSQL 10 provides better support for parallelized queries by
allowing more parts of the query execution process to be
parallelized. Improvements include additional types of data scans that
are parallelized as well as optimizations when the data is recombined,
such as pre-sorting. These enhancements allow results to be returned
more quickly.

* Quorum Commit for Synchronous Replication

PostgreSQL 10 introduces quorum commit for synchronous replication,
which allows for flexibility in how a primary database receives
acknowledgement that changes were successfully written to remote
replicas.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-08"/>
	<updated date="2018-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108308">SUSE bug 1108308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553248" comment="libecpg6-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553249" comment="libpq5-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545829" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530291" comment="postgresql-init-10-17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553250" comment="postgresql10-10.5-1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553251" comment="postgresql10-contrib-10.5-1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530293" comment="postgresql10-docs-10.5-1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553252" comment="postgresql10-server-10.5-1.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149571" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1088279" ref_url="https://bugzilla.suse.com/1088279" source="BUGZILLA"/>
		<reference ref_id="1088601" ref_url="https://bugzilla.suse.com/1088601" source="BUGZILLA"/>
		<reference ref_id="1102046" ref_url="https://bugzilla.suse.com/1102046" source="BUGZILLA"/>
		<reference ref_id="1105166" ref_url="https://bugzilla.suse.com/1105166" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18258" ref_url="https://www.suse.com/security/cve/CVE-2017-18258/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="CVE-2018-14567" ref_url="https://www.suse.com/security/cve/CVE-2018-14567/" source="CVE"/>
		<reference ref_id="CVE-2018-9251" ref_url="https://www.suse.com/security/cve/CVE-2018-9251/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004657.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following security issues:

- CVE-2018-9251: The xz_decomp function allowed remote attackers to cause a
  denial of service (infinite loop) via a crafted XML file that triggers
  LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint (bsc#1088279).
- CVE-2018-14567: Prevent denial of service (infinite loop) via a crafted XML
  file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint
  (bsc#1105166).
- CVE-2018-14404: Prevent NULL pointer dereference in the xmlXPathCompOpEval()
  function when parsing an invalid XPath expression in the XPATH_OP_AND or
  XPATH_OP_OR case leading to a denial of service attack (bsc#1102046).
- CVE-2017-18258: The xz_head function allowed remote attackers to cause a
  denial of service (memory consumption) via a crafted LZMA file, because the
  decoder functionality did not restrict memory usage to what is required for a
  legitimate file (bsc#1088601).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-09"/>
	<updated date="2018-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1088279">SUSE bug 1088279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088601">SUSE bug 1088601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102046">SUSE bug 1102046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105166">SUSE bug 1105166</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18258/">CVE-2017-18258 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18258">CVE-2017-18258 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14404">CVE-2018-14404 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14567/">CVE-2018-14567 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14567">CVE-2018-14567 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9251/">CVE-2018-9251 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9251">CVE-2018-9251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553253" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553254" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553255" comment="libxml2-doc-2.9.4-46.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553256" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553257" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149572" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1050129" ref_url="https://bugzilla.suse.com/1050129" source="BUGZILLA"/>
		<reference ref_id="1105592" ref_url="https://bugzilla.suse.com/1105592" source="BUGZILLA"/>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1107604" ref_url="https://bugzilla.suse.com/1107604" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1107612" ref_url="https://bugzilla.suse.com/1107612" source="BUGZILLA"/>
		<reference ref_id="1107616" ref_url="https://bugzilla.suse.com/1107616" source="BUGZILLA"/>
		<reference ref_id="1107619" ref_url="https://bugzilla.suse.com/1107619" source="BUGZILLA"/>
		<reference ref_id="1108282" ref_url="https://bugzilla.suse.com/1108282" source="BUGZILLA"/>
		<reference ref_id="1108283" ref_url="https://bugzilla.suse.com/1108283" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11532" ref_url="https://www.suse.com/security/cve/CVE-2017-11532/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16640" ref_url="https://www.suse.com/security/cve/CVE-2018-16640/" source="CVE"/>
		<reference ref_id="CVE-2018-16642" ref_url="https://www.suse.com/security/cve/CVE-2018-16642/" source="CVE"/>
		<reference ref_id="CVE-2018-16643" ref_url="https://www.suse.com/security/cve/CVE-2018-16643/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-16645" ref_url="https://www.suse.com/security/cve/CVE-2018-16645/" source="CVE"/>
		<reference ref_id="CVE-2018-16749" ref_url="https://www.suse.com/security/cve/CVE-2018-16749/" source="CVE"/>
		<reference ref_id="CVE-2018-16750" ref_url="https://www.suse.com/security/cve/CVE-2018-16750/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004662.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following security issues:

- CVE-2017-11532: Prevent a memory leak vulnerability in the WriteMPCImage()
  function in coders/mpc.c via a crafted file allowing for DoS (bsc#1050129)
- CVE-2018-16750: Prevent memory leak in the formatIPTCfromBuffer function
  (bsc#1108283)
- CVE-2018-16749: Added missing NULL check in ReadOneJNGImage that allowed an
  attacker to cause a denial of service (WriteBlob assertion failure and
  application exit) via a crafted file (bsc#1108282)
- CVE-2018-16642: The function InsertRow allowed remote attackers to cause a
  denial of service via a crafted image file due to an out-of-bounds write
  (bsc#1107616)
- CVE-2018-16640: Prevent memory leak in the function ReadOneJNGImage
  (bsc#1107619)
- CVE-2018-16643: The functions ReadDCMImage, ReadPWPImage, ReadCALSImage, and
  ReadPICTImage did check the return value of the fputc function, which allowed
  remote attackers to cause a denial of service via a crafted image file
  (bsc#1107612)
- CVE-2018-16644: Added missing check for length in the functions ReadDCMImage
  and ReadPICTImage, which allowed remote attackers to cause a denial of service
  via a crafted image (bsc#1107609)
- CVE-2018-16645: Prevent excessive memory allocation issue in the functions
  ReadBMPImage and ReadDIBImage, which allowed remote attackers to cause a denial
  of service via a crafted image file (bsc#1107604)
- CVE-2018-16413: Prevent heap-based buffer over-read in the PushShortPixel
  function leading to DoS (bsc#1106989)

This update also relaxes the restrictions of use of Postscript like formats to
'write' only. (bsc#1105592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-10"/>
	<updated date="2018-10-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050129">SUSE bug 1050129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107604">SUSE bug 1107604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107612">SUSE bug 1107612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107616">SUSE bug 1107616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107619">SUSE bug 1107619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108282">SUSE bug 1108282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108283">SUSE bug 1108283</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11532/">CVE-2017-11532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11532">CVE-2017-11532 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16413">CVE-2018-16413 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16640/">CVE-2018-16640 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16640">CVE-2018-16640 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16642/">CVE-2018-16642 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16642">CVE-2018-16642 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16643/">CVE-2018-16643 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16643">CVE-2018-16643 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16644">CVE-2018-16644 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16645/">CVE-2018-16645 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16645">CVE-2018-16645 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16749/">CVE-2018-16749 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16749">CVE-2018-16749 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16750/">CVE-2018-16750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16750">CVE-2018-16750 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553258" comment="libMagickCore-6_Q16-1-6.8.8.1-71.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553259" comment="libMagickWand-6_Q16-1-6.8.8.1-71.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149573" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1040039" ref_url="https://bugzilla.suse.com/1040039" source="BUGZILLA"/>
		<reference ref_id="1047184" ref_url="https://bugzilla.suse.com/1047184" source="BUGZILLA"/>
		<reference ref_id="1076118" ref_url="https://bugzilla.suse.com/1076118" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3145" ref_url="https://www.suse.com/security/cve/CVE-2017-3145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003688.html" source="SUSE-SU"/>
		<description>
This update for bind fixes several issues.

This security issue was fixed:

- CVE-2017-3145: Improper sequencing during cleanup could have lead to a
  use-after-free error that triggered an assertion failure and crash in named
  (bsc#1076118).

These non-security issues were fixed:

- Updated named.root file (bsc#1040039)
- Update bind.keys for DNSSEC root KSK rollover (bsc#1047184)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040039">SUSE bug 1040039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047184">SUSE bug 1047184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3145/">CVE-2017-3145 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3145">CVE-2017-3145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550579" comment="bind-9.9.9P1-63.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550580" comment="bind-chrootenv-9.9.9P1-63.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533101" comment="bind-doc-9.9.9P1-63.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550581" comment="bind-libs-9.9.9P1-63.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548322" comment="bind-libs-32bit-9.9.9P1-63.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550582" comment="bind-utils-9.9.9P1-63.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149574" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 and libxcb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1094327" ref_url="https://bugzilla.suse.com/1094327" source="BUGZILLA"/>
		<reference ref_id="1102062" ref_url="https://bugzilla.suse.com/1102062" source="BUGZILLA"/>
		<reference ref_id="1102068" ref_url="https://bugzilla.suse.com/1102068" source="BUGZILLA"/>
		<reference ref_id="1102073" ref_url="https://bugzilla.suse.com/1102073" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14598" ref_url="https://www.suse.com/security/cve/CVE-2018-14598/" source="CVE"/>
		<reference ref_id="CVE-2018-14599" ref_url="https://www.suse.com/security/cve/CVE-2018-14599/" source="CVE"/>
		<reference ref_id="CVE-2018-14600" ref_url="https://www.suse.com/security/cve/CVE-2018-14600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004665.html" source="SUSE-SU"/>
		<description>
This update for libX11 and libxcb fixes the following issue:

libX11:

These security issues were fixed:

- CVE-2018-14599: The function XListExtensions was vulnerable to an off-by-one
  error caused by malicious server responses, leading to DoS or possibly
  unspecified other impact (bsc#1102062).
- CVE-2018-14600: The function XListExtensions interpreted a variable as signed
  instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes),
  leading to DoS or remote code execution (bsc#1102068).
- CVE-2018-14598: A malicious server could have sent a reply in which the first
  string overflows, causing a variable to be set to NULL that will be freed later
  on, leading to DoS (segmentation fault) (bsc#1102073).

This non-security issue was fixed:

- Make use of the new 64-bit sequence number API in XCB 1.11.1 to avoid the 32-bit
  sequence number wrap in libX11 (bsc#1094327).

libxcb:

- Expose 64-bit sequence number from XCB API so that Xlib and others can use it even
  on 32-bit environment. (bsc#1094327)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-11"/>
	<updated date="2018-10-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094327">SUSE bug 1094327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102062">SUSE bug 1102062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102068">SUSE bug 1102068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102073">SUSE bug 1102073</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14598/">CVE-2018-14598 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14598">CVE-2018-14598 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14599/">CVE-2018-14599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14599">CVE-2018-14599 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14600/">CVE-2018-14600 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14600">CVE-2018-14600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553260" comment="libX11-6-1.6.2-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553261" comment="libX11-6-32bit-1.6.2-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520166" comment="libX11-data-1.6.2-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553262" comment="libX11-xcb1-1.6.2-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553263" comment="libX11-xcb1-32bit-1.6.2-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553264" comment="libxcb-dri2-0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553265" comment="libxcb-dri2-0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541720" comment="libxcb-dri3-0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553266" comment="libxcb-dri3-0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553267" comment="libxcb-glx0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553268" comment="libxcb-glx0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541721" comment="libxcb-present0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553269" comment="libxcb-present0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553270" comment="libxcb-randr0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553271" comment="libxcb-render0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553272" comment="libxcb-render0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553273" comment="libxcb-shape0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553274" comment="libxcb-shm0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553275" comment="libxcb-shm0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553276" comment="libxcb-sync1-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553277" comment="libxcb-sync1-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553278" comment="libxcb-xf86dri0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553279" comment="libxcb-xfixes0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553280" comment="libxcb-xfixes0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541726" comment="libxcb-xinerama0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553281" comment="libxcb-xkb1-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553282" comment="libxcb-xkb1-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553283" comment="libxcb-xv0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553284" comment="libxcb1-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553285" comment="libxcb1-32bit-1.10-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149575" version="1" class="patch">
	<metadata>
		<title>Security update for axis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1103658" ref_url="https://bugzilla.suse.com/1103658" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8032" ref_url="https://www.suse.com/security/cve/CVE-2018-8032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004666.html" source="SUSE-SU"/>
		<description>
This update for axis fixes the following security issue:

- CVE-2018-8032: Prevent cross-site scripting (XSS) attack in the default
  servlet/services (bsc#1103658).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-12"/>
	<updated date="2018-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103658">SUSE bug 1103658</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8032/">CVE-2018-8032 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8032">CVE-2018-8032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553286" comment="axis-1.4-290.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149576" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1068059" ref_url="https://bugzilla.suse.com/1068059" source="BUGZILLA"/>
		<reference ref_id="1087931" ref_url="https://bugzilla.suse.com/1087931" source="BUGZILLA"/>
		<reference ref_id="1095057" ref_url="https://bugzilla.suse.com/1095057" source="BUGZILLA"/>
		<reference ref_id="1102230" ref_url="https://bugzilla.suse.com/1102230" source="BUGZILLA"/>
		<reference ref_id="1110943" ref_url="https://bugzilla.suse.com/1110943" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10919" ref_url="https://www.suse.com/security/cve/CVE-2018-10919/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004675.html" source="SUSE-SU"/>
		<description>


Samba was updated to 4.6.15, bringing bug and security fixes. (bsc#1110943)

Following security issues were fixed:

- CVE-2018-10919: Fix unauthorized attribute access via searches. (bsc#1095057);

Non-security bugs fixed:

- Fix ctdb_mutex_ceph_rados_helper deadlock (bsc#1102230).
- Allow idmap_rid to have primary group other than 'Domain Users' (bsc#1087931).
- winbind: avoid using fstrcpy in _dual_init_connection.
- Fix ntlm authentications with 'winbind use default domain = yes' (bsc#1068059).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068059">SUSE bug 1068059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087931">SUSE bug 1087931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095057">SUSE bug 1095057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102230">SUSE bug 1102230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110943">SUSE bug 1110943</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10919/">CVE-2018-10919 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10919">CVE-2018-10919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553287" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553288" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553289" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553290" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553291" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553292" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553293" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553294" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553295" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553296" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553297" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553298" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553299" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553300" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553301" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553302" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553303" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553304" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553305" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553306" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553307" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553308" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553309" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553310" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553311" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553312" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553313" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553314" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553315" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553316" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553317" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553318" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553319" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553320" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553321" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553322" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553323" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553324" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553325" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520233" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553326" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553327" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553328" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553329" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149577" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1098545" ref_url="https://bugzilla.suse.com/1098545" source="BUGZILLA"/>
		<reference ref_id="1098546" ref_url="https://bugzilla.suse.com/1098546" source="BUGZILLA"/>
		<reference ref_id="1110746" ref_url="https://bugzilla.suse.com/1110746" source="BUGZILLA"/>
		<reference ref_id="1110747" ref_url="https://bugzilla.suse.com/1110747" source="BUGZILLA"/>
		<reference ref_id="1111069" ref_url="https://bugzilla.suse.com/1111069" source="BUGZILLA"/>
		<reference ref_id="1111072" ref_url="https://bugzilla.suse.com/1111072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13058" ref_url="https://www.suse.com/security/cve/CVE-2017-13058/" source="CVE"/>
		<reference ref_id="CVE-2018-12599" ref_url="https://www.suse.com/security/cve/CVE-2018-12599/" source="CVE"/>
		<reference ref_id="CVE-2018-12600" ref_url="https://www.suse.com/security/cve/CVE-2018-12600/" source="CVE"/>
		<reference ref_id="CVE-2018-17965" ref_url="https://www.suse.com/security/cve/CVE-2018-17965/" source="CVE"/>
		<reference ref_id="CVE-2018-17966" ref_url="https://www.suse.com/security/cve/CVE-2018-17966/" source="CVE"/>
		<reference ref_id="CVE-2018-18016" ref_url="https://www.suse.com/security/cve/CVE-2018-18016/" source="CVE"/>
		<reference ref_id="CVE-2018-18024" ref_url="https://www.suse.com/security/cve/CVE-2018-18024/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004682.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2018-18024: Fixed an infinite loop in the ReadBMPImage function of
  the coders/bmp.c file. Remote attackers could leverage this vulnerability
  to cause a denial of service via a crafted bmp file. (bsc#1111069)
- CVE-2018-18016: Fixed a memory leak in WritePCXImage (bsc#1111072).
- CVE-2018-17965: Fixed a memory leak in WriteSGIImage (bsc#1110747).
- CVE-2018-17966: Fixed a memory leak in WritePDBImage (bsc#1110746).
- CVE-2018-12600: ReadDIBImage and WriteDIBImage allowed attackers to
  cause an out of bounds write via a crafted file. (bsc#1098545)
- CVE-2018-12599: ReadBMPImage and WriteBMPImage allowed attackers to
  cause an out of bounds write via a crafted file. (bsc#1098546)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-17"/>
	<updated date="2018-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1098545">SUSE bug 1098545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098546">SUSE bug 1098546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110746">SUSE bug 1110746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110747">SUSE bug 1110747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111069">SUSE bug 1111069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111072">SUSE bug 1111072</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13058/">CVE-2017-13058 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13058">CVE-2017-13058 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12599/">CVE-2018-12599 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12599">CVE-2018-12599 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12600/">CVE-2018-12600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12600">CVE-2018-12600 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17965/">CVE-2018-17965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17965">CVE-2018-17965 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17966/">CVE-2018-17966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17966">CVE-2018-17966 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18016/">CVE-2018-18016 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18016">CVE-2018-18016 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18024/">CVE-2018-18024 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18024">CVE-2018-18024 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553330" comment="libMagickCore-6_Q16-1-6.8.8.1-71.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553331" comment="libMagickWand-6_Q16-1-6.8.8.1-71.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149578" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1029907" ref_url="https://bugzilla.suse.com/1029907" source="BUGZILLA"/>
		<reference ref_id="1029908" ref_url="https://bugzilla.suse.com/1029908" source="BUGZILLA"/>
		<reference ref_id="1029909" ref_url="https://bugzilla.suse.com/1029909" source="BUGZILLA"/>
		<reference ref_id="1030296" ref_url="https://bugzilla.suse.com/1030296" source="BUGZILLA"/>
		<reference ref_id="1030297" ref_url="https://bugzilla.suse.com/1030297" source="BUGZILLA"/>
		<reference ref_id="1030298" ref_url="https://bugzilla.suse.com/1030298" source="BUGZILLA"/>
		<reference ref_id="1030584" ref_url="https://bugzilla.suse.com/1030584" source="BUGZILLA"/>
		<reference ref_id="1030585" ref_url="https://bugzilla.suse.com/1030585" source="BUGZILLA"/>
		<reference ref_id="1030588" ref_url="https://bugzilla.suse.com/1030588" source="BUGZILLA"/>
		<reference ref_id="1030589" ref_url="https://bugzilla.suse.com/1030589" source="BUGZILLA"/>
		<reference ref_id="1031590" ref_url="https://bugzilla.suse.com/1031590" source="BUGZILLA"/>
		<reference ref_id="1031593" ref_url="https://bugzilla.suse.com/1031593" source="BUGZILLA"/>
		<reference ref_id="1031595" ref_url="https://bugzilla.suse.com/1031595" source="BUGZILLA"/>
		<reference ref_id="1031638" ref_url="https://bugzilla.suse.com/1031638" source="BUGZILLA"/>
		<reference ref_id="1031644" ref_url="https://bugzilla.suse.com/1031644" source="BUGZILLA"/>
		<reference ref_id="1031656" ref_url="https://bugzilla.suse.com/1031656" source="BUGZILLA"/>
		<reference ref_id="1037052" ref_url="https://bugzilla.suse.com/1037052" source="BUGZILLA"/>
		<reference ref_id="1037057" ref_url="https://bugzilla.suse.com/1037057" source="BUGZILLA"/>
		<reference ref_id="1037061" ref_url="https://bugzilla.suse.com/1037061" source="BUGZILLA"/>
		<reference ref_id="1037066" ref_url="https://bugzilla.suse.com/1037066" source="BUGZILLA"/>
		<reference ref_id="1037273" ref_url="https://bugzilla.suse.com/1037273" source="BUGZILLA"/>
		<reference ref_id="1044891" ref_url="https://bugzilla.suse.com/1044891" source="BUGZILLA"/>
		<reference ref_id="1044897" ref_url="https://bugzilla.suse.com/1044897" source="BUGZILLA"/>
		<reference ref_id="1044901" ref_url="https://bugzilla.suse.com/1044901" source="BUGZILLA"/>
		<reference ref_id="1044909" ref_url="https://bugzilla.suse.com/1044909" source="BUGZILLA"/>
		<reference ref_id="1044925" ref_url="https://bugzilla.suse.com/1044925" source="BUGZILLA"/>
		<reference ref_id="1044927" ref_url="https://bugzilla.suse.com/1044927" source="BUGZILLA"/>
		<reference ref_id="1065643" ref_url="https://bugzilla.suse.com/1065643" source="BUGZILLA"/>
		<reference ref_id="1065689" ref_url="https://bugzilla.suse.com/1065689" source="BUGZILLA"/>
		<reference ref_id="1065693" ref_url="https://bugzilla.suse.com/1065693" source="BUGZILLA"/>
		<reference ref_id="1068640" ref_url="https://bugzilla.suse.com/1068640" source="BUGZILLA"/>
		<reference ref_id="1068643" ref_url="https://bugzilla.suse.com/1068643" source="BUGZILLA"/>
		<reference ref_id="1068887" ref_url="https://bugzilla.suse.com/1068887" source="BUGZILLA"/>
		<reference ref_id="1068888" ref_url="https://bugzilla.suse.com/1068888" source="BUGZILLA"/>
		<reference ref_id="1068950" ref_url="https://bugzilla.suse.com/1068950" source="BUGZILLA"/>
		<reference ref_id="1069176" ref_url="https://bugzilla.suse.com/1069176" source="BUGZILLA"/>
		<reference ref_id="1069202" ref_url="https://bugzilla.suse.com/1069202" source="BUGZILLA"/>
		<reference ref_id="1074741" ref_url="https://bugzilla.suse.com/1074741" source="BUGZILLA"/>
		<reference ref_id="1077745" ref_url="https://bugzilla.suse.com/1077745" source="BUGZILLA"/>
		<reference ref_id="1079103" ref_url="https://bugzilla.suse.com/1079103" source="BUGZILLA"/>
		<reference ref_id="1079741" ref_url="https://bugzilla.suse.com/1079741" source="BUGZILLA"/>
		<reference ref_id="1080556" ref_url="https://bugzilla.suse.com/1080556" source="BUGZILLA"/>
		<reference ref_id="1081527" ref_url="https://bugzilla.suse.com/1081527" source="BUGZILLA"/>
		<reference ref_id="1083528" ref_url="https://bugzilla.suse.com/1083528" source="BUGZILLA"/>
		<reference ref_id="1083532" ref_url="https://bugzilla.suse.com/1083532" source="BUGZILLA"/>
		<reference ref_id="1085784" ref_url="https://bugzilla.suse.com/1085784" source="BUGZILLA"/>
		<reference ref_id="1086608" ref_url="https://bugzilla.suse.com/1086608" source="BUGZILLA"/>
		<reference ref_id="1086784" ref_url="https://bugzilla.suse.com/1086784" source="BUGZILLA"/>
		<reference ref_id="1086786" ref_url="https://bugzilla.suse.com/1086786" source="BUGZILLA"/>
		<reference ref_id="1086788" ref_url="https://bugzilla.suse.com/1086788" source="BUGZILLA"/>
		<reference ref_id="1090997" ref_url="https://bugzilla.suse.com/1090997" source="BUGZILLA"/>
		<reference ref_id="1091015" ref_url="https://bugzilla.suse.com/1091015" source="BUGZILLA"/>
		<reference ref_id="1091365" ref_url="https://bugzilla.suse.com/1091365" source="BUGZILLA"/>
		<reference ref_id="1091368" ref_url="https://bugzilla.suse.com/1091368" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9939" ref_url="https://www.suse.com/security/cve/CVE-2014-9939/" source="CVE"/>
		<reference ref_id="CVE-2017-15938" ref_url="https://www.suse.com/security/cve/CVE-2017-15938/" source="CVE"/>
		<reference ref_id="CVE-2017-15939" ref_url="https://www.suse.com/security/cve/CVE-2017-15939/" source="CVE"/>
		<reference ref_id="CVE-2017-15996" ref_url="https://www.suse.com/security/cve/CVE-2017-15996/" source="CVE"/>
		<reference ref_id="CVE-2017-16826" ref_url="https://www.suse.com/security/cve/CVE-2017-16826/" source="CVE"/>
		<reference ref_id="CVE-2017-16827" ref_url="https://www.suse.com/security/cve/CVE-2017-16827/" source="CVE"/>
		<reference ref_id="CVE-2017-16828" ref_url="https://www.suse.com/security/cve/CVE-2017-16828/" source="CVE"/>
		<reference ref_id="CVE-2017-16829" ref_url="https://www.suse.com/security/cve/CVE-2017-16829/" source="CVE"/>
		<reference ref_id="CVE-2017-16830" ref_url="https://www.suse.com/security/cve/CVE-2017-16830/" source="CVE"/>
		<reference ref_id="CVE-2017-16831" ref_url="https://www.suse.com/security/cve/CVE-2017-16831/" source="CVE"/>
		<reference ref_id="CVE-2017-16832" ref_url="https://www.suse.com/security/cve/CVE-2017-16832/" source="CVE"/>
		<reference ref_id="CVE-2017-6965" ref_url="https://www.suse.com/security/cve/CVE-2017-6965/" source="CVE"/>
		<reference ref_id="CVE-2017-6966" ref_url="https://www.suse.com/security/cve/CVE-2017-6966/" source="CVE"/>
		<reference ref_id="CVE-2017-6969" ref_url="https://www.suse.com/security/cve/CVE-2017-6969/" source="CVE"/>
		<reference ref_id="CVE-2017-7209" ref_url="https://www.suse.com/security/cve/CVE-2017-7209/" source="CVE"/>
		<reference ref_id="CVE-2017-7210" ref_url="https://www.suse.com/security/cve/CVE-2017-7210/" source="CVE"/>
		<reference ref_id="CVE-2017-7223" ref_url="https://www.suse.com/security/cve/CVE-2017-7223/" source="CVE"/>
		<reference ref_id="CVE-2017-7224" ref_url="https://www.suse.com/security/cve/CVE-2017-7224/" source="CVE"/>
		<reference ref_id="CVE-2017-7225" ref_url="https://www.suse.com/security/cve/CVE-2017-7225/" source="CVE"/>
		<reference ref_id="CVE-2017-7226" ref_url="https://www.suse.com/security/cve/CVE-2017-7226/" source="CVE"/>
		<reference ref_id="CVE-2017-7299" ref_url="https://www.suse.com/security/cve/CVE-2017-7299/" source="CVE"/>
		<reference ref_id="CVE-2017-7300" ref_url="https://www.suse.com/security/cve/CVE-2017-7300/" source="CVE"/>
		<reference ref_id="CVE-2017-7301" ref_url="https://www.suse.com/security/cve/CVE-2017-7301/" source="CVE"/>
		<reference ref_id="CVE-2017-7302" ref_url="https://www.suse.com/security/cve/CVE-2017-7302/" source="CVE"/>
		<reference ref_id="CVE-2017-7303" ref_url="https://www.suse.com/security/cve/CVE-2017-7303/" source="CVE"/>
		<reference ref_id="CVE-2017-7304" ref_url="https://www.suse.com/security/cve/CVE-2017-7304/" source="CVE"/>
		<reference ref_id="CVE-2017-8392" ref_url="https://www.suse.com/security/cve/CVE-2017-8392/" source="CVE"/>
		<reference ref_id="CVE-2017-8393" ref_url="https://www.suse.com/security/cve/CVE-2017-8393/" source="CVE"/>
		<reference ref_id="CVE-2017-8394" ref_url="https://www.suse.com/security/cve/CVE-2017-8394/" source="CVE"/>
		<reference ref_id="CVE-2017-8396" ref_url="https://www.suse.com/security/cve/CVE-2017-8396/" source="CVE"/>
		<reference ref_id="CVE-2017-8421" ref_url="https://www.suse.com/security/cve/CVE-2017-8421/" source="CVE"/>
		<reference ref_id="CVE-2017-9746" ref_url="https://www.suse.com/security/cve/CVE-2017-9746/" source="CVE"/>
		<reference ref_id="CVE-2017-9747" ref_url="https://www.suse.com/security/cve/CVE-2017-9747/" source="CVE"/>
		<reference ref_id="CVE-2017-9748" ref_url="https://www.suse.com/security/cve/CVE-2017-9748/" source="CVE"/>
		<reference ref_id="CVE-2017-9750" ref_url="https://www.suse.com/security/cve/CVE-2017-9750/" source="CVE"/>
		<reference ref_id="CVE-2017-9755" ref_url="https://www.suse.com/security/cve/CVE-2017-9755/" source="CVE"/>
		<reference ref_id="CVE-2017-9756" ref_url="https://www.suse.com/security/cve/CVE-2017-9756/" source="CVE"/>
		<reference ref_id="CVE-2018-10372" ref_url="https://www.suse.com/security/cve/CVE-2018-10372/" source="CVE"/>
		<reference ref_id="CVE-2018-10373" ref_url="https://www.suse.com/security/cve/CVE-2018-10373/" source="CVE"/>
		<reference ref_id="CVE-2018-10534" ref_url="https://www.suse.com/security/cve/CVE-2018-10534/" source="CVE"/>
		<reference ref_id="CVE-2018-10535" ref_url="https://www.suse.com/security/cve/CVE-2018-10535/" source="CVE"/>
		<reference ref_id="CVE-2018-6323" ref_url="https://www.suse.com/security/cve/CVE-2018-6323/" source="CVE"/>
		<reference ref_id="CVE-2018-6543" ref_url="https://www.suse.com/security/cve/CVE-2018-6543/" source="CVE"/>
		<reference ref_id="CVE-2018-6759" ref_url="https://www.suse.com/security/cve/CVE-2018-6759/" source="CVE"/>
		<reference ref_id="CVE-2018-6872" ref_url="https://www.suse.com/security/cve/CVE-2018-6872/" source="CVE"/>
		<reference ref_id="CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208/" source="CVE"/>
		<reference ref_id="CVE-2018-7568" ref_url="https://www.suse.com/security/cve/CVE-2018-7568/" source="CVE"/>
		<reference ref_id="CVE-2018-7569" ref_url="https://www.suse.com/security/cve/CVE-2018-7569/" source="CVE"/>
		<reference ref_id="CVE-2018-7570" ref_url="https://www.suse.com/security/cve/CVE-2018-7570/" source="CVE"/>
		<reference ref_id="CVE-2018-7642" ref_url="https://www.suse.com/security/cve/CVE-2018-7642/" source="CVE"/>
		<reference ref_id="CVE-2018-7643" ref_url="https://www.suse.com/security/cve/CVE-2018-7643/" source="CVE"/>
		<reference ref_id="CVE-2018-8945" ref_url="https://www.suse.com/security/cve/CVE-2018-8945/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<description>
This update for binutils to 2.31 fixes the following issues:

These security issues were fixed:

- CVE-2017-15996: readelf allowed remote attackers to cause a denial of service
  (excessive memory allocation) or possibly have unspecified other impact via a
  crafted ELF file that triggered a buffer overflow on fuzzed archive header
  (bsc#1065643).
- CVE-2017-15939: Binary File Descriptor (BFD) library (aka libbfd) mishandled
  NULL files in a .debug_line file table, which allowed remote attackers to cause
  a denial of service (NULL pointer dereference and application crash) via a
  crafted ELF file, related to concat_filename (bsc#1065689).
- CVE-2017-15938: the Binary File Descriptor (BFD) library (aka libbfd)
  miscalculated DW_FORM_ref_addr die refs in the case of a relocatable object
  file, which allowed remote attackers to cause a denial of service
  (find_abstract_instance_name invalid memory read, segmentation fault, and
  application crash) (bsc#1065693).
- CVE-2017-16826: The coff_slurp_line_table function the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (invalid memory access and application crash) or possibly have
  unspecified other impact via a crafted PE file (bsc#1068640).
- CVE-2017-16832: The pe_bfd_read_buildid function in the Binary File
  Descriptor (BFD) library (aka libbfd) did not validate size and offset values
  in the data dictionary, which allowed remote attackers to cause a denial of
  service (segmentation violation and application crash) or possibly have
  unspecified other impact via a crafted PE file (bsc#1068643).
- CVE-2017-16831: Binary File Descriptor (BFD) library (aka libbfd) did not
  validate the symbol count, which allowed remote attackers to cause a denial of
  service (integer overflow and application crash, or excessive memory
  allocation) or possibly have unspecified other impact via a crafted PE file
  (bsc#1068887).
- CVE-2017-16830: The print_gnu_property_note function did not have
  integer-overflow protection on 32-bit platforms, which allowed remote attackers
  to cause a denial of service (segmentation violation and application crash) or
  possibly have unspecified other impact via a crafted ELF file (bsc#1068888).
- CVE-2017-16829: The _bfd_elf_parse_gnu_properties function in the Binary File
  Descriptor (BFD) library (aka libbfd) did not prevent negative pointers, which
  allowed remote attackers to cause a denial of service (out-of-bounds read and
  application crash) or possibly have unspecified other impact via a crafted ELF
  file (bsc#1068950).
- CVE-2017-16828: The display_debug_frames function allowed remote attackers to
  cause a denial of service (integer overflow and heap-based buffer over-read,
  and application crash) or possibly have unspecified other impact via a crafted
  ELF file (bsc#1069176).
- CVE-2017-16827: The aout_get_external_symbols function in the Binary File
  Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a
  denial of service (slurp_symtab invalid free and application crash) or possibly
  have unspecified other impact via a crafted ELF file (bsc#1069202).
- CVE-2018-6323: The elf_object_p function in the Binary File Descriptor (BFD)
  library (aka libbfd) had an unsigned integer overflow because bfd_size_type
  multiplication is not used. A crafted ELF file allowed remote attackers to
  cause a denial of service (application crash) or possibly have unspecified
  other impact (bsc#1077745).
- CVE-2018-6543: Prevent integer overflow in the function
  load_specific_debug_section() which resulted in `malloc()` with 0 size. A
  crafted ELF file allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact (bsc#1079103).
- CVE-2018-6759: The bfd_get_debug_link_info_1 function in the Binary File
  Descriptor (BFD) library (aka libbfd) had an unchecked strnlen operation.
  Remote attackers could have leveraged this vulnerability to cause a denial of
  service (segmentation fault) via a crafted ELF file (bsc#1079741).
- CVE-2018-6872: The elf_parse_notes function in the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (out-of-bounds read and segmentation violation) via a note with a large
  alignment (bsc#1080556).
- CVE-2018-7208: In the coff_pointerize_aux function in the Binary File
  Descriptor (BFD) library (aka libbfd) an index was not validated, which allowed
  remote attackers to cause a denial of service (segmentation fault) or possibly
  have unspecified other impact via a crafted file, as demonstrated by objcopy of
  a COFF object (bsc#1081527).
- CVE-2018-7570: The assign_file_positions_for_non_load_sections function in
  the Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers
  to cause a denial of service (NULL pointer dereference and application crash)
  via an ELF file with a RELRO segment that lacks a matching LOAD segment, as
  demonstrated by objcopy (bsc#1083528).
- CVE-2018-7569: The Binary File Descriptor (BFD) library (aka libbfd) allowed
  remote attackers to cause a denial of service (integer underflow or overflow,
  and application crash) via an ELF file with a corrupt DWARF FORM block, as
  demonstrated by nm (bsc#1083532).
- CVE-2018-8945: The bfd_section_from_shdr function in the Binary File
  Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a
  denial of service (segmentation fault) via a large attribute section
  (bsc#1086608).
- CVE-2018-7643: The display_debug_ranges function allowed remote attackers to
  cause a denial of service (integer overflow and application crash) or possibly
  have unspecified other impact via a crafted ELF file, as demonstrated by
  objdump (bsc#1086784).
- CVE-2018-7642: The swap_std_reloc_in function in the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (aout_32_swap_std_reloc_out NULL pointer dereference and application
  crash) via a crafted ELF file, as demonstrated by objcopy (bsc#1086786).
- CVE-2018-7568: The parse_die function in the Binary File Descriptor (BFD)
  library (aka libbfd) allowed remote attackers to cause a denial of service
  (integer overflow and application crash) via an ELF file with corrupt dwarf1
  debug information, as demonstrated by nm (bsc#1086788).
- CVE-2018-10373: concat_filename in the Binary File Descriptor (BFD) library
  (aka libbfd) allowed remote attackers to cause a denial of service (NULL
  pointer dereference and application crash) via a crafted binary file, as
  demonstrated by nm-new (bsc#1090997).
- CVE-2018-10372: process_cu_tu_index allowed remote attackers to cause a
  denial of service (heap-based buffer over-read and application crash) via a
  crafted binary file, as demonstrated by readelf (bsc#1091015).
- CVE-2018-10535: The ignore_section_sym function in the Binary File Descriptor
  (BFD) library (aka libbfd) did not validate the output_section pointer in the
  case of a symtab entry with a 'SECTION' type that has a '0' value, which
  allowed remote attackers to cause a denial of service (NULL pointer dereference
  and application crash) via a crafted file, as demonstrated by objcopy
  (bsc#1091365).
- CVE-2018-10534: The _bfd_XX_bfd_copy_private_bfd_data_common function in the
  Binary File Descriptor (BFD) library (aka libbfd) processesed a negative Data
  Directory size with an unbounded loop that increased the value of
  (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeded its own
  memory region, resulting in an out-of-bounds memory write, as demonstrated by
  objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common
  in pex64igen.c (bsc#1091368).

These non-security issues were fixed:

- The AArch64 port now supports showing disassembly notes which are emitted
  when inconsistencies are found with the instruction that may result in the
  instruction being invalid. These can be turned on with the option -M notes
  to objdump.
- The AArch64 port now emits warnings when a combination of an instruction and
  a named register could be invalid.
- Added O modifier to ar to display member offsets inside an archive
- The ADR and ADRL pseudo-instructions supported by the ARM assembler
  now only set the bottom bit of the address of thumb function symbols
  if the -mthumb-interwork command line option is active.
- Add --generate-missing-build-notes=[yes|no] option to create (or not) GNU
  Build Attribute notes if none are present in the input sources.  Add a
  --enable-generate-build-notes=[yes|no] configure time option to set the
  default behaviour.  Set the default if the configure option is not used
  to 'no'.
- Remove -mold-gcc command-line option for x86 targets.
- Add -O[2|s] command-line options to x86 assembler to enable alternate
  shorter instruction encoding.
- Add support for .nops directive.  It is currently supported only for
  x86 targets.
- Speed up direct linking with DLLs for Cygwin and Mingw targets.
- Add a configure option --enable-separate-code to decide whether
  -z separate-code should be enabled in ELF linker by default.  Default
  to yes for Linux/x86 targets. Note that -z separate-code can increase
  disk and memory size.
- RISC-V: Fix symbol address problem with versioned symbols 
- Restore riscv64-elf cross prefix via symlinks
- RISC-V: Don't enable relaxation in relocatable link
- Prevent linking faiures on i386 with assertion (bsc#1085784)
- Fix symbol size bug when relaxation deletes bytes
- Add --debug-dump=links option to readelf and --dwarf=links option to objdump
  which displays the contents of any .gnu_debuglink or .gnu_debugaltlink
  sections.
  Add a --debug-dump=follow-links option to readelf and a --dwarf=follow-links
  option to objdump which causes indirect links into separate debug info files
  to be followed when dumping other DWARF sections.
- Add support for loaction views in DWARF debug line information.
- Add -z separate-code to generate separate code PT_LOAD segment.
- Add '-z undefs' command line option as the inverse of the '-z defs' option.
- Add -z globalaudit command line option to force audit libraries to be run
  for every dynamic object loaded by an executable - provided that the loader
  supports this functionality.
- Tighten linker script grammar around file name specifiers to prevent the use
  of SORT_BY_ALIGNMENT and SORT_BY_INIT_PRIORITY on filenames.  These would
  previously be accepted but had no effect.
- The EXCLUDE_FILE directive can now be placed within any SORT_* directive
  within input section lists.
- Fix linker relaxation with --wrap
- Add arm-none-eabi symlinks (bsc#1074741)

Former updates of binutils also fixed the following security issues, for which
there was not CVE assigned at the time the update was released or no mapping
between code change and CVE existed:

- CVE-2014-9939: Prevent stack buffer overflow when printing bad bytes in Intel
  Hex objects (bsc#1030296).
- CVE-2017-7225: The find_nearest_line function in addr2line did not handle the
  case where the main file name and the directory name are both empty, triggering
  a NULL pointer dereference and an invalid write, and leading to a program crash
  (bsc#1030585).
- CVE-2017-7224: The find_nearest_line function in objdump was vulnerable to an
  invalid write (of size 1) while disassembling a corrupt binary that contains an
  empty function name, leading to a program crash (bsc#1030588).
- CVE-2017-7223: GNU assembler in was vulnerable to a global buffer overflow
  (of size 1) while attempting to unget an EOF character from the input stream,
  potentially leading to a program crash (bsc#1030589).
- CVE-2017-7226: The pe_ILF_object_p function in the Binary File Descriptor
  (BFD) library (aka libbfd) was vulnerable to a heap-based buffer over-read of
  size 4049 because it used the strlen function instead of strnlen, leading to
  program crashes in several utilities such as addr2line, size, and strings. It
  could lead to information disclosure as well (bsc#1030584).
- CVE-2017-7299: The Binary File Descriptor (BFD) library (aka libbfd) had an
  invalid read (of size 8) because the code to emit relocs (bfd_elf_final_link
  function in bfd/elflink.c) did not check the format of the input file trying to
  read the ELF reloc section header. The vulnerability leads to a GNU linker (ld)
  program crash (bsc#1031644).
- CVE-2017-7300: The Binary File Descriptor (BFD) library (aka libbfd) had an
  aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a
  heap-based buffer over-read (off-by-one) because of an incomplete check for
  invalid string offsets while loading symbols, leading to a GNU linker (ld)
  program crash (bsc#1031656).
- CVE-2017-7302: The Binary File Descriptor (BFD) library (aka libbfd) had a
  swap_std_reloc_out function in bfd/aoutx.h that is vulnerable to an invalid
  read (of size 4) because of missing checks for relocs that could not be
  recognised. This vulnerability caused Binutils utilities like strip to crash
  (bsc#1031595).
- CVE-2017-7303: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read (of size 4) because of missing a check (in the
  find_link function) for null headers attempting to match them. This
  vulnerability caused Binutils utilities like strip to crash (bsc#1031593).
- CVE-2017-7301: The Binary File Descriptor (BFD) library (aka libbfd) had an
  aout_link_add_symbols function in bfd/aoutx.h that has an off-by-one
  vulnerability because it did not carefully check the string offset. The
  vulnerability could lead to a GNU linker (ld) program crash (bsc#1031638).
- CVE-2017-7304: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read (of size 8) because of missing a check (in the
  copy_special_section_fields function) for an invalid sh_link field attempting
  to follow it. This vulnerability caused Binutils utilities like strip to crash
  (bsc#1031590).
- CVE-2017-8392: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read of size 8 because of missing a check to determine
  whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This
  vulnerability caused programs that conduct an analysis of binary programs using
  the libbfd library, such as objdump, to crash (bsc#1037052).
- CVE-2017-8393: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to a global buffer over-read error because of an assumption made by
  code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always
  named starting with a .rel/.rela prefix. This vulnerability caused programs
  that conduct an analysis of binary programs using the libbfd library, such as
  objcopy and strip, to crash (bsc#1037057).
- CVE-2017-8394: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of
  _bfd_elf_large_com_section. This vulnerability caused programs that conduct an
  analysis of binary programs using the libbfd library, such as objcopy, to crash
  (bsc#1037061).
- CVE-2017-8396: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read of size 1 because the existing reloc offset range
  tests didn't catch small negative offsets less than the size of the reloc
  field. This vulnerability caused programs that conduct an analysis of binary
  programs using the libbfd library, such as objdump, to crash (bsc#1037066).
- CVE-2017-8421: The function coff_set_alignment_hook in Binary File Descriptor
  (BFD) library (aka libbfd) had a memory leak vulnerability which can cause
  memory exhaustion in objdump via a crafted PE file (bsc#1037273).
- CVE-2017-9746: The disassemble_bytes function in objdump.c allowed remote
  attackers to cause a denial of service (buffer overflow and application crash)
  or possibly have unspecified other impact via a crafted binary file, as
  demonstrated by mishandling of rae insns printing for this file during 'objdump
  -D' execution (bsc#1044891).
- CVE-2017-9747: The ieee_archive_p function in the Binary File Descriptor
  (BFD) library (aka libbfd) might have allowed remote attackers to cause a
  denial of service (buffer overflow and application crash) or possibly have
  unspecified other impact via a crafted binary file, as demonstrated by
  mishandling of this file during 'objdump -D' execution (bsc#1044897).
- CVE-2017-9748: The ieee_object_p function in the Binary File Descriptor (BFD)
  library (aka libbfd) might have allowed remote attackers to cause a denial of
  service (buffer overflow and application crash) or possibly have unspecified
  other impact via a crafted binary file, as demonstrated by mishandling of this
  file during 'objdump -D' execution (bsc#1044901).
- CVE-2017-9750: opcodes/rx-decode.opc lacked bounds checks for certain scale
  arrays, which allowed remote attackers to cause a denial of service (buffer
  overflow and application crash) or possibly have unspecified other impact via a
  crafted binary file, as demonstrated by mishandling of this file during
  'objdump -D' execution (bsc#1044909).
- CVE-2017-9755: Not considering the the number of registers for bnd mode
  allowed remote attackers to cause a denial of service (buffer overflow and
  application crash) or possibly have unspecified other impact via a crafted
  binary file, as demonstrated by mishandling of this file during 'objdump -D'
  execution (bsc#1044925).
- CVE-2017-9756: The aarch64_ext_ldst_reglist function allowed remote attackers
  to cause a denial of service (buffer overflow and application crash) or
  possibly have unspecified other impact via a crafted binary file, as
  demonstrated by mishandling of this file during 'objdump -D' execution
  (bsc#1044927).
- CVE-2017-7209: The dump_section_as_bytes function in readelf accessed a NULL
  pointer while reading section contents in a corrupt binary, leading to a
  program crash (bsc#1030298).
- CVE-2017-6965: readelf wrote to illegal addresses while processing corrupt
  input files containing symbol-difference relocations, leading to a heap-based
  buffer overflow (bsc#1029909).
- CVE-2017-6966: readelf had a use-after-free (specifically read-after-free)
  error while processing multiple, relocated sections in an MSP430 binary. This
  is caused by mishandling of an invalid symbol index, and mishandling of state
  across invocations (bsc#1029908).
- CVE-2017-6969: readelf was vulnerable to a heap-based buffer over-read while
  processing corrupt RL78 binaries. The vulnerability can trigger program
  crashes. It may lead to an information leak as well (bsc#1029907).
- CVE-2017-7210: objdump was vulnerable to multiple heap-based buffer
  over-reads (of size 1 and size 8) while handling corrupt STABS enum type
  strings in a crafted object file, leading to program crash (bsc#1030297).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-17"/>
	<updated date="2018-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029907">SUSE bug 1029907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029908">SUSE bug 1029908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029909">SUSE bug 1029909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030297">SUSE bug 1030297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030298">SUSE bug 1030298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030584">SUSE bug 1030584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030585">SUSE bug 1030585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030588">SUSE bug 1030588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030589">SUSE bug 1030589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031590">SUSE bug 1031590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031593">SUSE bug 1031593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031595">SUSE bug 1031595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031638">SUSE bug 1031638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031644">SUSE bug 1031644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031656">SUSE bug 1031656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037052">SUSE bug 1037052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037057">SUSE bug 1037057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037061">SUSE bug 1037061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037066">SUSE bug 1037066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037273">SUSE bug 1037273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044891">SUSE bug 1044891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044897">SUSE bug 1044897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044901">SUSE bug 1044901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044909">SUSE bug 1044909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044925">SUSE bug 1044925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044927">SUSE bug 1044927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065643">SUSE bug 1065643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065689">SUSE bug 1065689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065693">SUSE bug 1065693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068640">SUSE bug 1068640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068643">SUSE bug 1068643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068887">SUSE bug 1068887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068888">SUSE bug 1068888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068950">SUSE bug 1068950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069176">SUSE bug 1069176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069202">SUSE bug 1069202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074741">SUSE bug 1074741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077745">SUSE bug 1077745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079103">SUSE bug 1079103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079741">SUSE bug 1079741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080556">SUSE bug 1080556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081527">SUSE bug 1081527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083528">SUSE bug 1083528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083532">SUSE bug 1083532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085784">SUSE bug 1085784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086608">SUSE bug 1086608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086784">SUSE bug 1086784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086786">SUSE bug 1086786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086788">SUSE bug 1086788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090997">SUSE bug 1090997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091015">SUSE bug 1091015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091365">SUSE bug 1091365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091368">SUSE bug 1091368</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9939/">CVE-2014-9939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9939">CVE-2014-9939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15938/">CVE-2017-15938 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15938">CVE-2017-15938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15939/">CVE-2017-15939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15939">CVE-2017-15939 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15996/">CVE-2017-15996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15996">CVE-2017-15996 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16826/">CVE-2017-16826 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16826">CVE-2017-16826 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16827/">CVE-2017-16827 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16827">CVE-2017-16827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16828/">CVE-2017-16828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16828">CVE-2017-16828 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16829/">CVE-2017-16829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16829">CVE-2017-16829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16830/">CVE-2017-16830 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16830">CVE-2017-16830 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16831/">CVE-2017-16831 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16831">CVE-2017-16831 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16832/">CVE-2017-16832 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16832">CVE-2017-16832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6965/">CVE-2017-6965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6965">CVE-2017-6965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6966/">CVE-2017-6966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6966">CVE-2017-6966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6969/">CVE-2017-6969 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6969">CVE-2017-6969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7209/">CVE-2017-7209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7209">CVE-2017-7209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7210/">CVE-2017-7210 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7210">CVE-2017-7210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7223/">CVE-2017-7223 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7223">CVE-2017-7223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7224/">CVE-2017-7224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7224">CVE-2017-7224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7225/">CVE-2017-7225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7225">CVE-2017-7225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7226/">CVE-2017-7226 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7226">CVE-2017-7226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7299/">CVE-2017-7299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7299">CVE-2017-7299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7300/">CVE-2017-7300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7300">CVE-2017-7300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7301/">CVE-2017-7301 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7301">CVE-2017-7301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7302/">CVE-2017-7302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7302">CVE-2017-7302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7303/">CVE-2017-7303 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7303">CVE-2017-7303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7304/">CVE-2017-7304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7304">CVE-2017-7304 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8392/">CVE-2017-8392 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8392">CVE-2017-8392 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8393/">CVE-2017-8393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8393">CVE-2017-8393 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8394/">CVE-2017-8394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8394">CVE-2017-8394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8396/">CVE-2017-8396 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8396">CVE-2017-8396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8421/">CVE-2017-8421 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8421">CVE-2017-8421 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9746/">CVE-2017-9746 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9746">CVE-2017-9746 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9747/">CVE-2017-9747 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9747">CVE-2017-9747 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9748/">CVE-2017-9748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9748">CVE-2017-9748 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9750/">CVE-2017-9750 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9750">CVE-2017-9750 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9755/">CVE-2017-9755 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9755">CVE-2017-9755 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9756/">CVE-2017-9756 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9756">CVE-2017-9756 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10372/">CVE-2018-10372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10372">CVE-2018-10372 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10373/">CVE-2018-10373 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10373">CVE-2018-10373 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10534/">CVE-2018-10534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10534">CVE-2018-10534 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10535/">CVE-2018-10535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10535">CVE-2018-10535 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6323/">CVE-2018-6323 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6323">CVE-2018-6323 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6543/">CVE-2018-6543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6543">CVE-2018-6543 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6759/">CVE-2018-6759 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6759">CVE-2018-6759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6872/">CVE-2018-6872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6872">CVE-2018-6872 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7208">CVE-2018-7208 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7568/">CVE-2018-7568 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7568">CVE-2018-7568 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7569/">CVE-2018-7569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7569">CVE-2018-7569 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7570/">CVE-2018-7570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7570">CVE-2018-7570 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7642/">CVE-2018-7642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7642">CVE-2018-7642 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7643/">CVE-2018-7643 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7643">CVE-2018-7643 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8945/">CVE-2018-8945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8945">CVE-2018-8945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553332" comment="binutils-2.31-9.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149579" version="1" class="patch">
	<metadata>
		<title>Security update for fuse (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1101797" ref_url="https://bugzilla.suse.com/1101797" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10906" ref_url="https://www.suse.com/security/cve/CVE-2018-10906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004684.html" source="SUSE-SU"/>
		<description>
This update for fuse fixes the following security issue:

- CVE-2018-10906: fusermount was vulnerable to a restriction bypass when
  SELinux is active. This allowed non-root users to mount a FUSE file system with
  the 'allow_other' mount option regardless of whether 'user_allow_other' is set
  in the fuse configuration. An attacker may use this flaw to mount a FUSE file
  system, accessible by other users, and trick them into accessing files on that
  file system, possibly causing Denial of Service or other unspecified effects
  (bsc#1101797)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101797">SUSE bug 1101797</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10906/">CVE-2018-10906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10906">CVE-2018-10906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553333" comment="fuse-2.9.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553334" comment="libfuse2-2.9.3-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149580" version="1" class="patch">
	<metadata>
		<title>Security update for libXfont (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1049692" ref_url="https://bugzilla.suse.com/1049692" source="BUGZILLA"/>
		<reference ref_id="1050459" ref_url="https://bugzilla.suse.com/1050459" source="BUGZILLA"/>
		<reference ref_id="1054285" ref_url="https://bugzilla.suse.com/1054285" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13720" ref_url="https://www.suse.com/security/cve/CVE-2017-13720/" source="CVE"/>
		<reference ref_id="CVE-2017-13722" ref_url="https://www.suse.com/security/cve/CVE-2017-13722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003693.html" source="SUSE-SU"/>
		<description>
This update for libXfont fixes several issues.

These security issues were fixed:

- CVE-2017-13720: Improper check for end of string in PatterMatch caused invalid reads (bsc#1054285)
- CVE-2017-13722: Malformed PCF file could have caused DoS or leak information (bsc#1049692)
- Prevent the X server from accessing arbitrary files as root. It is not possible to leak information, but special files can be touched allowing for causing side effects (bsc#1050459)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-01"/>
	<updated date="2018-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049692">SUSE bug 1049692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050459">SUSE bug 1050459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054285">SUSE bug 1054285</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-13720/">CVE-2017-13720 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13720">CVE-2017-13720 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13722/">CVE-2017-13722 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13722">CVE-2017-13722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550587" comment="libXfont1-1.5.1-11.3.12 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149581" version="1" class="patch">
	<metadata>
		<title>Security update for ecryptfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="989121" ref_url="https://bugzilla.suse.com/989121" source="BUGZILLA"/>
		<reference ref_id="989122" ref_url="https://bugzilla.suse.com/989122" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8946" ref_url="https://www.suse.com/security/cve/CVE-2015-8946/" source="CVE"/>
		<reference ref_id="CVE-2016-6224" ref_url="https://www.suse.com/security/cve/CVE-2016-6224/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003694.html" source="SUSE-SU"/>
		<description>
This update for ecryptfs-utils fixes the following issues:

- CVE-2015-8946: ecryptfs-setup-swap improperly configures encrypted swap when using GPT partitioning (bsc#989121)
- CVE-2016-6224: ecryptfs-setup-swap improperly configures encrypted swap when using GPT partitioning on a NVMe or MMC drive (bsc#989122)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-01"/>
	<updated date="2018-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/989121">SUSE bug 989121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989122">SUSE bug 989122</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8946/">CVE-2015-8946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8946">CVE-2015-8946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6224/">CVE-2016-6224 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6224">CVE-2016-6224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550588" comment="ecryptfs-utils-103-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550589" comment="ecryptfs-utils-32bit-103-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149582" version="1" class="patch">
	<metadata>
		<title>Security update for libXdmcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1025046" ref_url="https://bugzilla.suse.com/1025046" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2625" ref_url="https://www.suse.com/security/cve/CVE-2017-2625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003696.html" source="SUSE-SU"/>
		<description>
This update for libXdmcp fixes the following issues:

- CVE-2017-2625: The generation of session key in XDM using libXdmcp might have used weak entropy, making
  the session keys predictable (bsc#1025046)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-01"/>
	<updated date="2018-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025046">SUSE bug 1025046</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2625/">CVE-2017-2625 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2625">CVE-2017-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553335" comment="libXdmcp6-1.1.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553336" comment="libXdmcp6-32bit-1.1.1-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149583" version="1" class="patch">
	<metadata>
		<title>Security update for libICE (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1025068" ref_url="https://bugzilla.suse.com/1025068" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2626" ref_url="https://www.suse.com/security/cve/CVE-2017-2626/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003695.html" source="SUSE-SU"/>
		<description>
This update for libICE fixes the following issues:

- CVE-2017-2626: Creation of the ICE auth session cookies used insufficient randomness, making these cookies
  predictable. A more random generation method has been implemented. (boo#1025068)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-01"/>
	<updated date="2018-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025068">SUSE bug 1025068</bugzilla>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-2626/">CVE-2017-2626 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2626">CVE-2017-2626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553337" comment="libICE6-1.0.8-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553338" comment="libICE6-32bit-1.0.8-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149584" version="1" class="patch">
	<metadata>
		<title>Security update for rpm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1077692" ref_url="https://bugzilla.suse.com/1077692" source="BUGZILLA"/>
		<reference ref_id="943457" ref_url="https://bugzilla.suse.com/943457" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7500" ref_url="https://www.suse.com/security/cve/CVE-2017-7500/" source="CVE"/>
		<reference ref_id="CVE-2017-7501" ref_url="https://www.suse.com/security/cve/CVE-2017-7501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004757.html" source="SUSE-SU"/>
		<description>
This update for rpm fixes the following issues:

These security issues were fixed:

- CVE-2017-7500: rpm did not properly handle RPM installations when a
  destination path was a symbolic link to a directory, possibly changing
  ownership and permissions of an arbitrary directory, and RPM files being placed
  in an arbitrary destination (bsc#943457).
- CVE-2017-7501: rpm used temporary files with predictable names when
  installing an RPM. An attacker with ability to write in a directory where files
  will be installed could create symbolic links to an arbitrary location and
  modify content, and possibly permissions to arbitrary files, which could be
  used for denial of service or possibly privilege escalation (bsc#943457)

This non-security issue was fixed:

- Use ksym-provides tool [bsc#1077692]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-22"/>
	<updated date="2018-10-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077692">SUSE bug 1077692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943457">SUSE bug 943457</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7500/">CVE-2017-7500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7500">CVE-2017-7500 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7501/">CVE-2017-7501 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7501">CVE-2017-7501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553339" comment="python3-rpm-4.11.2-16.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553340" comment="rpm-4.11.2-16.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553341" comment="rpm-32bit-4.11.2-16.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553342" comment="rpm-build-4.11.2-16.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553343" comment="rpm-python-4.11.2-16.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149585" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1106853" ref_url="https://bugzilla.suse.com/1106853" source="BUGZILLA"/>
		<reference ref_id="1108627" ref_url="https://bugzilla.suse.com/1108627" source="BUGZILLA"/>
		<reference ref_id="1108637" ref_url="https://bugzilla.suse.com/1108637" source="BUGZILLA"/>
		<reference ref_id="1110358" ref_url="https://bugzilla.suse.com/1110358" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<reference ref_id="CVE-2018-16335" ref_url="https://www.suse.com/security/cve/CVE-2018-16335/" source="CVE"/>
		<reference ref_id="CVE-2018-17100" ref_url="https://www.suse.com/security/cve/CVE-2018-17100/" source="CVE"/>
		<reference ref_id="CVE-2018-17101" ref_url="https://www.suse.com/security/cve/CVE-2018-17101/" source="CVE"/>
		<reference ref_id="CVE-2018-17795" ref_url="https://www.suse.com/security/cve/CVE-2018-17795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004759.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2018-17100: There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file. (bsc#1108637)
- CVE-2018-17101: There are two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c, which can cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file. (bsc#1108627)
- CVE-2018-17795: The function t2p_write_pdf in tiff2pdf.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, a similar issue to CVE-2017-9935. (bsc#1110358)
- CVE-2018-16335: newoffsets handling in ChopUpSingleUncompressedStrip in tif_dirread.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf. This is a different vulnerability than CVE-2018-15209. (bsc#1106853)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-22"/>
	<updated date="2018-10-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106853">SUSE bug 1106853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108627">SUSE bug 1108627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108637">SUSE bug 1108637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110358">SUSE bug 1110358</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11613">CVE-2017-11613 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9935">CVE-2017-9935 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16335/">CVE-2018-16335 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16335">CVE-2018-16335 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17100/">CVE-2018-17100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17100">CVE-2018-17100 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17101/">CVE-2018-17101 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17101">CVE-2018-17101 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17795/">CVE-2018-17795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17795">CVE-2018-17795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553344" comment="libtiff5-4.0.9-44.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553345" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553346" comment="tiff-4.0.9-44.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149586" version="1" class="patch">
	<metadata>
		<title>Security update for pam_pkcs11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1049219" ref_url="https://bugzilla.suse.com/1049219" source="BUGZILLA"/>
		<reference ref_id="1105012" ref_url="https://bugzilla.suse.com/1105012" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004761.html" source="SUSE-SU"/>
		<description>
This update for pam_pkcs11 provides the following fixes:

Security issues fixed (bsc#1105012):

- Fixed a logic bug in pampkcs11.c, leading to an authentication replay vulnerability
- Fixed a stack-based buffer overflow in opensshmapper.c
- Make sure memory is properly cleaned before invoking free()

Other changes:

- Add a systemd service file. (bsc#1049219)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049219">SUSE bug 1049219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105012">SUSE bug 1105012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553347" comment="pam_pkcs11-0.6.8-7.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553348" comment="pam_pkcs11-32bit-0.6.8-7.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149587" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1009994" ref_url="https://bugzilla.suse.com/1009994" source="BUGZILLA"/>
		<reference ref_id="1010756" ref_url="https://bugzilla.suse.com/1010756" source="BUGZILLA"/>
		<reference ref_id="1010757" ref_url="https://bugzilla.suse.com/1010757" source="BUGZILLA"/>
		<reference ref_id="1010766" ref_url="https://bugzilla.suse.com/1010766" source="BUGZILLA"/>
		<reference ref_id="1010774" ref_url="https://bugzilla.suse.com/1010774" source="BUGZILLA"/>
		<reference ref_id="1010782" ref_url="https://bugzilla.suse.com/1010782" source="BUGZILLA"/>
		<reference ref_id="1010968" ref_url="https://bugzilla.suse.com/1010968" source="BUGZILLA"/>
		<reference ref_id="1010975" ref_url="https://bugzilla.suse.com/1010975" source="BUGZILLA"/>
		<reference ref_id="1047958" ref_url="https://bugzilla.suse.com/1047958" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9262" ref_url="https://www.suse.com/security/cve/CVE-2016-9262/" source="CVE"/>
		<reference ref_id="CVE-2016-9388" ref_url="https://www.suse.com/security/cve/CVE-2016-9388/" source="CVE"/>
		<reference ref_id="CVE-2016-9389" ref_url="https://www.suse.com/security/cve/CVE-2016-9389/" source="CVE"/>
		<reference ref_id="CVE-2016-9390" ref_url="https://www.suse.com/security/cve/CVE-2016-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-9391" ref_url="https://www.suse.com/security/cve/CVE-2016-9391/" source="CVE"/>
		<reference ref_id="CVE-2016-9392" ref_url="https://www.suse.com/security/cve/CVE-2016-9392/" source="CVE"/>
		<reference ref_id="CVE-2016-9393" ref_url="https://www.suse.com/security/cve/CVE-2016-9393/" source="CVE"/>
		<reference ref_id="CVE-2016-9394" ref_url="https://www.suse.com/security/cve/CVE-2016-9394/" source="CVE"/>
		<reference ref_id="CVE-2017-1000050" ref_url="https://www.suse.com/security/cve/CVE-2017-1000050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

Security issues fixed:
- CVE-2016-9262: Multiple integer overflows in the jas_realloc function in base/jas_malloc.c and
  mem_resize function in base/jas_stream.c allow remote attackers to cause a denial of service via
  a crafted image, which triggers use after free vulnerabilities. (bsc#1009994)
- CVE-2016-9388: The ras_getcmap function in ras_dec.c allows remote attackers to cause a denial
  of service (assertion failure) via a crafted image file. (bsc#1010975)
- CVE-2016-9389: The jpc_irct and jpc_iict functions in jpc_mct.c allow remote attackers to cause a
  denial of service (assertion failure). (bsc#1010968)
- CVE-2016-9390: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted image file. (bsc#1010774)
- CVE-2016-9391: The jpc_bitstream_getbits function in jpc_bs.c allows remote attackers to cause a
  denial of service (assertion failure) via a very large integer. (bsc#1010782)
- CVE-2017-1000050: The jp2_encode function in jp2_enc.c allows remote attackers to cause a denial
  of service. (bsc#1047958)

CVEs already fixed with previous update:
- CVE-2016-9392: The calcstepsizes function in jpc_dec.c allows remote attackers to cause a denial
  of service (assertion failure) via a crafted file. (bsc#1010757)
- CVE-2016-9393: The jpc_pi_nextrpcl function in jpc_t2cod.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted file. (bsc#1010766)
- CVE-2016-9394: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted file. (bsc#1010756)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-01"/>
	<updated date="2018-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009994">SUSE bug 1009994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010756">SUSE bug 1010756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010766">SUSE bug 1010766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010774">SUSE bug 1010774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010782">SUSE bug 1010782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010968">SUSE bug 1010968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010975">SUSE bug 1010975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047958">SUSE bug 1047958</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9262/">CVE-2016-9262 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9262">CVE-2016-9262 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9388/">CVE-2016-9388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9388">CVE-2016-9388 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9389/">CVE-2016-9389 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9389">CVE-2016-9389 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9390/">CVE-2016-9390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9390">CVE-2016-9390 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9391/">CVE-2016-9391 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9391">CVE-2016-9391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9392/">CVE-2016-9392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9392">CVE-2016-9392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9393/">CVE-2016-9393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9393">CVE-2016-9393 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9394/">CVE-2016-9394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9394">CVE-2016-9394 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000050/">CVE-2017-1000050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000050">CVE-2017-1000050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553349" comment="libjasper1-1.900.14-195.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553350" comment="libjasper1-32bit-1.900.14-195.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149588" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1098531" ref_url="https://bugzilla.suse.com/1098531" source="BUGZILLA"/>
		<reference ref_id="1111853" ref_url="https://bugzilla.suse.com/1111853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12327" ref_url="https://www.suse.com/security/cve/CVE-2018-12327/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004771.html" source="SUSE-SU"/>
		<description>

  
NTP was updated to 4.2.8p12 (bsc#1111853):

- CVE-2018-12327: Fixed stack buffer overflow in the openhost() command-line call of NTPQ/NTPDC. (bsc#1098531)
- CVE-2018-7170: Add further tweaks to improve the fix for the ephemeral association time spoofing additional protection (bsc#1083424)

Please also see https://www.nwtime.org/network-time-foundation-publishes-ntp-4-2-8p12/ for more information.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098531">SUSE bug 1098531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111853">SUSE bug 1111853</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12327/">CVE-2018-12327 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12327">CVE-2018-12327 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7170">CVE-2018-7170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553351" comment="ntp-4.2.8p12-64.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553352" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149589" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1104199" ref_url="https://bugzilla.suse.com/1104199" source="BUGZILLA"/>
		<reference ref_id="1104202" ref_url="https://bugzilla.suse.com/1104202" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915/" source="CVE"/>
		<reference ref_id="CVE-2018-10925" ref_url="https://www.suse.com/security/cve/CVE-2018-10925/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004778.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 to 9.6.10 fixes the following issues:

These security issues were fixed:

- CVE-2018-10915: libpq failed to properly reset its internal state between
  connections. If an affected version of libpq was used with 'host' or 'hostaddr'
  connection parameters from untrusted input, attackers could have bypassed
  client-side connection security features, obtain access to higher privileged
  connections or potentially cause other impact SQL injection, by causing the
  PQescape() functions to malfunction (bsc#1104199)
- CVE-2018-10925: Add missing authorization check on certain statements
  involved with 'INSERT ... ON CONFLICT DO UPDATE'. An attacker with 'CREATE
  TABLE' privileges could have exploited this to read arbitrary bytes server
  memory. If the attacker also had certain 'INSERT' and limited 'UPDATE'
  privileges to a particular table, they could have exploited this to update
  other columns in the same table (bsc#1104202)

For addition details please see
https://www.postgresql.org/docs/current/static/release-9-6-10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-24"/>
	<updated date="2018-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104199">SUSE bug 1104199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104202">SUSE bug 1104202</bugzilla>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10915">CVE-2018-10915 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10925/">CVE-2018-10925 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10925">CVE-2018-10925 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553353" comment="postgresql96-9.6.10-3.22.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553354" comment="postgresql96-contrib-9.6.10-3.22.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530312" comment="postgresql96-docs-9.6.10-3.22.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553355" comment="postgresql96-server-9.6.10-3.22.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149590" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1110850" ref_url="https://bugzilla.suse.com/1110850" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11784" ref_url="https://www.suse.com/security/cve/CVE-2018-11784/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004786.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2018-11784: When the default servlet in Apache Tomcat returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice. (bsc#1110850)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-24"/>
	<updated date="2018-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1110850">SUSE bug 1110850</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-11784/">CVE-2018-11784 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11784">CVE-2018-11784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553356" comment="tomcat-8.0.53-29.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553357" comment="tomcat-admin-webapps-8.0.53-29.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553358" comment="tomcat-docs-webapp-8.0.53-29.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553359" comment="tomcat-el-3_0-api-8.0.53-29.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553360" comment="tomcat-javadoc-8.0.53-29.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553361" comment="tomcat-jsp-2_3-api-8.0.53-29.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553362" comment="tomcat-lib-8.0.53-29.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553363" comment="tomcat-servlet-3_1-api-8.0.53-29.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553364" comment="tomcat-webapps-8.0.53-29.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149591" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1075775" ref_url="https://bugzilla.suse.com/1075775" source="BUGZILLA"/>
		<reference ref_id="1077535" ref_url="https://bugzilla.suse.com/1077535" source="BUGZILLA"/>
		<reference ref_id="1079512" ref_url="https://bugzilla.suse.com/1079512" source="BUGZILLA"/>
		<reference ref_id="1088182" ref_url="https://bugzilla.suse.com/1088182" source="BUGZILLA"/>
		<reference ref_id="1088932" ref_url="https://bugzilla.suse.com/1088932" source="BUGZILLA"/>
		<reference ref_id="1092278" ref_url="https://bugzilla.suse.com/1092278" source="BUGZILLA"/>
		<reference ref_id="1092279" ref_url="https://bugzilla.suse.com/1092279" source="BUGZILLA"/>
		<reference ref_id="1092280" ref_url="https://bugzilla.suse.com/1092280" source="BUGZILLA"/>
		<reference ref_id="1095611" ref_url="https://bugzilla.suse.com/1095611" source="BUGZILLA"/>
		<reference ref_id="1096060" ref_url="https://bugzilla.suse.com/1096060" source="BUGZILLA"/>
		<reference ref_id="1096061" ref_url="https://bugzilla.suse.com/1096061" source="BUGZILLA"/>
		<reference ref_id="1097693" ref_url="https://bugzilla.suse.com/1097693" source="BUGZILLA"/>
		<reference ref_id="1101999" ref_url="https://bugzilla.suse.com/1101999" source="BUGZILLA"/>
		<reference ref_id="1102530" ref_url="https://bugzilla.suse.com/1102530" source="BUGZILLA"/>
		<reference ref_id="1104169" ref_url="https://bugzilla.suse.com/1104169" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13884" ref_url="https://www.suse.com/security/cve/CVE-2017-13884/" source="CVE"/>
		<reference ref_id="CVE-2017-13885" ref_url="https://www.suse.com/security/cve/CVE-2017-13885/" source="CVE"/>
		<reference ref_id="CVE-2017-7153" ref_url="https://www.suse.com/security/cve/CVE-2017-7153/" source="CVE"/>
		<reference ref_id="CVE-2017-7160" ref_url="https://www.suse.com/security/cve/CVE-2017-7160/" source="CVE"/>
		<reference ref_id="CVE-2017-7161" ref_url="https://www.suse.com/security/cve/CVE-2017-7161/" source="CVE"/>
		<reference ref_id="CVE-2017-7165" ref_url="https://www.suse.com/security/cve/CVE-2017-7165/" source="CVE"/>
		<reference ref_id="CVE-2018-11646" ref_url="https://www.suse.com/security/cve/CVE-2018-11646/" source="CVE"/>
		<reference ref_id="CVE-2018-11712" ref_url="https://www.suse.com/security/cve/CVE-2018-11712/" source="CVE"/>
		<reference ref_id="CVE-2018-11713" ref_url="https://www.suse.com/security/cve/CVE-2018-11713/" source="CVE"/>
		<reference ref_id="CVE-2018-12911" ref_url="https://www.suse.com/security/cve/CVE-2018-12911/" source="CVE"/>
		<reference ref_id="CVE-2018-4088" ref_url="https://www.suse.com/security/cve/CVE-2018-4088/" source="CVE"/>
		<reference ref_id="CVE-2018-4096" ref_url="https://www.suse.com/security/cve/CVE-2018-4096/" source="CVE"/>
		<reference ref_id="CVE-2018-4101" ref_url="https://www.suse.com/security/cve/CVE-2018-4101/" source="CVE"/>
		<reference ref_id="CVE-2018-4113" ref_url="https://www.suse.com/security/cve/CVE-2018-4113/" source="CVE"/>
		<reference ref_id="CVE-2018-4114" ref_url="https://www.suse.com/security/cve/CVE-2018-4114/" source="CVE"/>
		<reference ref_id="CVE-2018-4117" ref_url="https://www.suse.com/security/cve/CVE-2018-4117/" source="CVE"/>
		<reference ref_id="CVE-2018-4118" ref_url="https://www.suse.com/security/cve/CVE-2018-4118/" source="CVE"/>
		<reference ref_id="CVE-2018-4119" ref_url="https://www.suse.com/security/cve/CVE-2018-4119/" source="CVE"/>
		<reference ref_id="CVE-2018-4120" ref_url="https://www.suse.com/security/cve/CVE-2018-4120/" source="CVE"/>
		<reference ref_id="CVE-2018-4121" ref_url="https://www.suse.com/security/cve/CVE-2018-4121/" source="CVE"/>
		<reference ref_id="CVE-2018-4122" ref_url="https://www.suse.com/security/cve/CVE-2018-4122/" source="CVE"/>
		<reference ref_id="CVE-2018-4125" ref_url="https://www.suse.com/security/cve/CVE-2018-4125/" source="CVE"/>
		<reference ref_id="CVE-2018-4127" ref_url="https://www.suse.com/security/cve/CVE-2018-4127/" source="CVE"/>
		<reference ref_id="CVE-2018-4128" ref_url="https://www.suse.com/security/cve/CVE-2018-4128/" source="CVE"/>
		<reference ref_id="CVE-2018-4129" ref_url="https://www.suse.com/security/cve/CVE-2018-4129/" source="CVE"/>
		<reference ref_id="CVE-2018-4133" ref_url="https://www.suse.com/security/cve/CVE-2018-4133/" source="CVE"/>
		<reference ref_id="CVE-2018-4146" ref_url="https://www.suse.com/security/cve/CVE-2018-4146/" source="CVE"/>
		<reference ref_id="CVE-2018-4161" ref_url="https://www.suse.com/security/cve/CVE-2018-4161/" source="CVE"/>
		<reference ref_id="CVE-2018-4162" ref_url="https://www.suse.com/security/cve/CVE-2018-4162/" source="CVE"/>
		<reference ref_id="CVE-2018-4163" ref_url="https://www.suse.com/security/cve/CVE-2018-4163/" source="CVE"/>
		<reference ref_id="CVE-2018-4165" ref_url="https://www.suse.com/security/cve/CVE-2018-4165/" source="CVE"/>
		<reference ref_id="CVE-2018-4190" ref_url="https://www.suse.com/security/cve/CVE-2018-4190/" source="CVE"/>
		<reference ref_id="CVE-2018-4199" ref_url="https://www.suse.com/security/cve/CVE-2018-4199/" source="CVE"/>
		<reference ref_id="CVE-2018-4200" ref_url="https://www.suse.com/security/cve/CVE-2018-4200/" source="CVE"/>
		<reference ref_id="CVE-2018-4204" ref_url="https://www.suse.com/security/cve/CVE-2018-4204/" source="CVE"/>
		<reference ref_id="CVE-2018-4218" ref_url="https://www.suse.com/security/cve/CVE-2018-4218/" source="CVE"/>
		<reference ref_id="CVE-2018-4222" ref_url="https://www.suse.com/security/cve/CVE-2018-4222/" source="CVE"/>
		<reference ref_id="CVE-2018-4232" ref_url="https://www.suse.com/security/cve/CVE-2018-4232/" source="CVE"/>
		<reference ref_id="CVE-2018-4233" ref_url="https://www.suse.com/security/cve/CVE-2018-4233/" source="CVE"/>
		<reference ref_id="CVE-2018-4246" ref_url="https://www.suse.com/security/cve/CVE-2018-4246/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.20.3 fixes the issues:

The following security vulnerabilities were addressed:

- CVE-2018-12911: Fixed an off-by-one error in xdg_mime_get_simple_globs
  (boo#1101999)
- CVE-2017-13884: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1075775).
- CVE-2017-13885: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1075775).
- CVE-2017-7153: An unspecified issue allowed remote attackers to spoof
  user-interface information (about whether the entire content is derived from a
  valid TLS session) via a crafted web site that sends a 401 Unauthorized
  redirect (bsc#1077535).
- CVE-2017-7160: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1075775).
- CVE-2017-7161: An unspecified issue allowed remote attackers to execute
  arbitrary code via special characters that trigger command injection
  (bsc#1075775, bsc#1077535).
- CVE-2017-7165: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1075775).
- CVE-2018-4088: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1075775).
- CVE-2018-4096: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1075775).
- CVE-2018-4200: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site that triggers a
  WebCore::jsElementScrollHeightGetter use-after-free (bsc#1092280).
- CVE-2018-4204: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1092279).
- CVE-2018-4101: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4113: An issue in the JavaScriptCore function in the 'WebKit'
  component allowed attackers to trigger an assertion failure by leveraging
  improper array indexing (bsc#1088182)
- CVE-2018-4114: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182) 
- CVE-2018-4117: An unspecified issue allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web site
  (bsc#1088182, bsc#1102530).
- CVE-2018-4118: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182) 
- CVE-2018-4119: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182) 
- CVE-2018-4120: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4121: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1092278).
- CVE-2018-4122: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4125: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4127: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4128: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4129: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4146: An unspecified issue allowed attackers to cause a denial of
  service (memory corruption) via a crafted web site (bsc#1088182).
- CVE-2018-4161: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4162: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4163: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4165: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4190: An unspecified issue allowed remote attackers to obtain
  sensitive credential information that is transmitted during a CSS mask-image
  fetch (bsc#1097693)
- CVE-2018-4199: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (buffer overflow and application
  crash) via a crafted web site (bsc#1097693)
- CVE-2018-4218: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site that triggers an @generatorState use-after-free
  (bsc#1097693)
- CVE-2018-4222: An unspecified issue allowed remote attackers to execute
  arbitrary code via a crafted web site that leverages a getWasmBufferFromValue
  out-of-bounds read during WebAssembly compilation (bsc#1097693) 
- CVE-2018-4232: An unspecified issue allowed remote attackers to overwrite
  cookies via a crafted web site (bsc#1097693) 
- CVE-2018-4233: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1097693) 
- CVE-2018-4246: An unspecified issue allowed remote attackers to execute
  arbitrary code via a crafted web site that leverages type confusion
  (bsc#1104169) 
- CVE-2018-11646: webkitFaviconDatabaseSetIconForPageURL and
  webkitFaviconDatabaseSetIconURLForPageURL mishandled an unset pageURL, leading
  to an application crash (bsc#1095611)
- CVE-2018-4133: A Safari cross-site scripting (XSS) vulnerability allowed
  remote attackers to inject arbitrary web script or HTML via a crafted URL
  (bsc#1088182).
- CVE-2018-11713: The libsoup network backend of WebKit unexpectedly failed to
  use system proxy settings for WebSocket connections. As a result, users could
  be deanonymized by crafted web sites via a WebSocket connection (bsc#1096060).
- CVE-2018-11712: The libsoup network backend of WebKit failed to perform TLS
  certificate verification for WebSocket connections (bsc#1096061).


This update for webkit2gtk3 fixes the following issues:

- Fixed a crash when atk_object_ref_state_set is called on an AtkObject that's
  being destroyed (bsc#1088932).
- Fixed crash when using Wayland with QXL/virtio (bsc#1079512)
- Disable Gigacage if mmap fails to allocate in Linux.
- Add user agent quirk for paypal website.
- Properly detect compiler flags, needed libs, and fallbacks for
  usage of 64-bit atomic operations.
- Fix a network process crash when trying to get cookies of
  about:blank page.
- Fix UI process crash when closing the window under Wayland.
- Fix several crashes and rendering issues.
- Do TLS error checking on GTlsConnection::accept-certificate to
  finish the load earlier in case of errors.
- Properly close the connection to the nested wayland compositor
  in the Web Process.
- Avoid painting backing stores for zero-opacity layers.
- Fix downloads started by context menu failing in some websites
  due to missing user agent HTTP header.
- Fix video unpause when GStreamerGL is disabled.
- Fix several GObject introspection annotations.
- Update user agent quiks to fix Outlook.com and Chase.com.
- Fix several crashes and rendering issues.
- Improve error message when Gigacage cannot allocate virtual memory.
- Add missing WebKitWebProcessEnumTypes.h to webkit-web-extension.h.
- Improve web process memory monitor thresholds.
- Fix a web process crash when the web view is created and destroyed quickly.
- Fix a network process crash when load is cancelled while searching for
  stored HTTP auth credentials.
- Fix the build when ENABLE_VIDEO, ENABLE_WEB_AUDIO and
  ENABLE_XSLT are disabled.
- New API to retrieve and delete cookies with WebKitCookieManager.
- New web process API to detect when form is submitted via JavaScript.
- Several improvements and fixes in the touch/gestures support.
- Support for the “system” CSS font family.
- Complex text rendering improvements and fixes.
- More complete and spec compliant WebDriver implementation.
- Ensure DNS prefetching cannot be re-enabled if disabled by settings.
- Fix seek sometimes not working.
- Fix rendering of emojis that were using the wrong scale factor
  in some cases.
- Fix rendering of combining enclosed keycap.
- Fix rendering scale of some layers in HiDPI.
- Fix a crash in Wayland when closing the web view.
- Fix crashes upower crashes when running inside a chroot or on
  systems with broken dbus/upower.
- Fix memory leaks in GStreamer media backend when using
  GStreamer 1.14.
- Fix several crashes and rendering issues.
- Add ENABLE_ADDRESS_SANITIZER to make it easier to build with
  asan support.
- Fix a crash a under Wayland when using mesa software
  rasterization.
- Make fullscreen video work again.
- Fix handling of missing GStreamer elements.
- Fix rendering when webm video is played twice.
- Fix kinetic scrolling sometimes jumping around.
- Fix build with ICU configured without collation support.
- WebSockets use system proxy settings now (requires libsoup 2.61.90).
- Show the context menu on long-press gesture.
- Add support for Shift + mouse scroll to scroll horizontally.
- Fix zoom gesture to actually zoom instead of changing the page
  scale.
- Implement support for Graphics ARIA roles.
- Make sleep inhibitors work under Flatpak.
- Add get element CSS value command to WebDriver.
- Fix a crash aftter a swipe gesture.
- Fix several crashes and rendering issues.
- Fix crashes due to duplicated symbols in libjavascriptcoregtk
  and libwebkit2gtk.
- Fix parsing of timeout values in WebDriver.
- Implement get timeouts command in WebDriver.
- Fix deadlock in GStreamer video sink during shutdown when
  accelerated compositing is disabled.
- Fix several crashes and rendering issues.
- Add web process API to detect when form is submitted via
  JavaScript.
- Add new API to replace
  webkit_form_submission_request_get_text_fields() that is now
  deprecated.
- Add WebKitWebView::web-process-terminated signal and deprecate
  web-process-crashed.
- Fix rendering issues when editing text areas.
- Use FastMalloc based GstAllocator for GStreamer.
- Fix web process crash at startup in bmalloc.
- Fix several memory leaks in GStreamer media backend.
- WebKitWebDriver process no longer links to
  libjavascriptcoregtk.
- Fix several crashes and rendering issues.
- Add new API to add, retrieve and delete cookies via
  WebKitCookieManager.
- Add functions to WebSettings to convert font sizes between
  points and pixels.
- Ensure cookie operations take effect when they happen before a
  web process has been spawned.
- Automatically adjust font size when GtkSettings:gtk-xft-dpi
  changes.
- Add initial resource load statistics support.
- Add API to expose availability of certain editing commands in
  WebKitEditorState.
- Add API to query whether a WebKitNavigationAction is a redirect
  or not.
- Improve complex text rendering.
- Add support for the 'system' CSS font family.
- Disable USE_GSTREAMER_GL
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-24"/>
	<updated date="2018-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1075775">SUSE bug 1075775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077535">SUSE bug 1077535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079512">SUSE bug 1079512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088182">SUSE bug 1088182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088932">SUSE bug 1088932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092278">SUSE bug 1092278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092279">SUSE bug 1092279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092280">SUSE bug 1092280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095611">SUSE bug 1095611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096060">SUSE bug 1096060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096061">SUSE bug 1096061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097693">SUSE bug 1097693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101999">SUSE bug 1101999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102530">SUSE bug 1102530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13884/">CVE-2017-13884 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13884">CVE-2017-13884 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13885/">CVE-2017-13885 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13885">CVE-2017-13885 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7153/">CVE-2017-7153 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7153">CVE-2017-7153 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7160/">CVE-2017-7160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7160">CVE-2017-7160 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7161/">CVE-2017-7161 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7161">CVE-2017-7161 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7165/">CVE-2017-7165 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7165">CVE-2017-7165 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11646/">CVE-2018-11646 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11646">CVE-2018-11646 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11712/">CVE-2018-11712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11712">CVE-2018-11712 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11713/">CVE-2018-11713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11713">CVE-2018-11713 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12911/">CVE-2018-12911 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12911">CVE-2018-12911 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4088/">CVE-2018-4088 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4088">CVE-2018-4088 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4096/">CVE-2018-4096 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4096">CVE-2018-4096 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4101/">CVE-2018-4101 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4101">CVE-2018-4101 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4113/">CVE-2018-4113 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4113">CVE-2018-4113 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4114/">CVE-2018-4114 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4114">CVE-2018-4114 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4117/">CVE-2018-4117 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4117">CVE-2018-4117 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4118/">CVE-2018-4118 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4118">CVE-2018-4118 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4119/">CVE-2018-4119 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4119">CVE-2018-4119 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4120/">CVE-2018-4120 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4120">CVE-2018-4120 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4121/">CVE-2018-4121 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4121">CVE-2018-4121 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4122/">CVE-2018-4122 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4122">CVE-2018-4122 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4125/">CVE-2018-4125 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4125">CVE-2018-4125 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4127/">CVE-2018-4127 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4127">CVE-2018-4127 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4128/">CVE-2018-4128 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4128">CVE-2018-4128 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4129/">CVE-2018-4129 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4129">CVE-2018-4129 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4133/">CVE-2018-4133 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4133">CVE-2018-4133 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-4146/">CVE-2018-4146 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4146">CVE-2018-4146 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4161/">CVE-2018-4161 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4161">CVE-2018-4161 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4162/">CVE-2018-4162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4162">CVE-2018-4162 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4163/">CVE-2018-4163 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4163">CVE-2018-4163 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4165/">CVE-2018-4165 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4165">CVE-2018-4165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4190/">CVE-2018-4190 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4190">CVE-2018-4190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4199/">CVE-2018-4199 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4199">CVE-2018-4199 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4200/">CVE-2018-4200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4200">CVE-2018-4200 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4204/">CVE-2018-4204 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4204">CVE-2018-4204 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4218/">CVE-2018-4218 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4218">CVE-2018-4218 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4222/">CVE-2018-4222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4222">CVE-2018-4222 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4232/">CVE-2018-4232 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4232">CVE-2018-4232 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4233/">CVE-2018-4233 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4233">CVE-2018-4233 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4246/">CVE-2018-4246 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4246">CVE-2018-4246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553365" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553366" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553367" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553368" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553369" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149592" version="1" class="patch">
	<metadata>
		<title>Security update for exempi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1085295" ref_url="https://bugzilla.suse.com/1085295" source="BUGZILLA"/>
		<reference ref_id="1085297" ref_url="https://bugzilla.suse.com/1085297" source="BUGZILLA"/>
		<reference ref_id="1085583" ref_url="https://bugzilla.suse.com/1085583" source="BUGZILLA"/>
		<reference ref_id="1085584" ref_url="https://bugzilla.suse.com/1085584" source="BUGZILLA"/>
		<reference ref_id="1085585" ref_url="https://bugzilla.suse.com/1085585" source="BUGZILLA"/>
		<reference ref_id="1085589" ref_url="https://bugzilla.suse.com/1085589" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18233" ref_url="https://www.suse.com/security/cve/CVE-2017-18233/" source="CVE"/>
		<reference ref_id="CVE-2017-18234" ref_url="https://www.suse.com/security/cve/CVE-2017-18234/" source="CVE"/>
		<reference ref_id="CVE-2017-18236" ref_url="https://www.suse.com/security/cve/CVE-2017-18236/" source="CVE"/>
		<reference ref_id="CVE-2017-18238" ref_url="https://www.suse.com/security/cve/CVE-2017-18238/" source="CVE"/>
		<reference ref_id="CVE-2018-7728" ref_url="https://www.suse.com/security/cve/CVE-2018-7728/" source="CVE"/>
		<reference ref_id="CVE-2018-7730" ref_url="https://www.suse.com/security/cve/CVE-2018-7730/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004783.html" source="SUSE-SU"/>
		<description>
This update for exempi fixes the following security issues:

- CVE-2017-18233: Prevent integer overflow in the Chunk class that allowed
  remote attackers to cause a denial of service (infinite loop) via crafted XMP
  data in a .avi file (bsc#1085584).
- CVE-2017-18238: The TradQT_Manager::ParseCachedBoxes function allowed remote
  attackers to cause a denial of service (infinite loop) via crafted XMP data in
  a .qt file (bsc#1085583).
- CVE-2018-7728: Fixed heap-based buffer overflow, which allowed denial of
  service via crafted TIFF image (bsc#1085297).
- CVE-2018-7730: Fixed heap-based buffer overflow in
  XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp (bsc#1085295).
- CVE-2017-18236: The ASF_Support::ReadHeaderObject function allowed remote
  attackers to cause a denial of service (infinite loop) via a crafted .asf file
  (bsc#1085589).
- CVE-2017-18234: Prevent use-after-free that allowed remote attackers to cause
  a denial of service or possibly have unspecified other impact via a .pdf file
  containing JPEG data (bsc#1085585).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-24"/>
	<updated date="2018-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085295">SUSE bug 1085295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085297">SUSE bug 1085297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085583">SUSE bug 1085583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085584">SUSE bug 1085584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085589">SUSE bug 1085589</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18233/">CVE-2017-18233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18233">CVE-2017-18233 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18234/">CVE-2017-18234 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18234">CVE-2017-18234 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18236/">CVE-2017-18236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18236">CVE-2017-18236 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18238/">CVE-2017-18238 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18238">CVE-2017-18238 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7728/">CVE-2018-7728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7728">CVE-2018-7728 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7730/">CVE-2018-7730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7730">CVE-2018-7730 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553370" comment="libexempi3-2.2.1-5.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149593" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1043353" ref_url="https://bugzilla.suse.com/1043353" source="BUGZILLA"/>
		<reference ref_id="1043354" ref_url="https://bugzilla.suse.com/1043354" source="BUGZILLA"/>
		<reference ref_id="1047908" ref_url="https://bugzilla.suse.com/1047908" source="BUGZILLA"/>
		<reference ref_id="1050037" ref_url="https://bugzilla.suse.com/1050037" source="BUGZILLA"/>
		<reference ref_id="1050072" ref_url="https://bugzilla.suse.com/1050072" source="BUGZILLA"/>
		<reference ref_id="1050098" ref_url="https://bugzilla.suse.com/1050098" source="BUGZILLA"/>
		<reference ref_id="1050100" ref_url="https://bugzilla.suse.com/1050100" source="BUGZILLA"/>
		<reference ref_id="1050635" ref_url="https://bugzilla.suse.com/1050635" source="BUGZILLA"/>
		<reference ref_id="1051442" ref_url="https://bugzilla.suse.com/1051442" source="BUGZILLA"/>
		<reference ref_id="1052470" ref_url="https://bugzilla.suse.com/1052470" source="BUGZILLA"/>
		<reference ref_id="1052708" ref_url="https://bugzilla.suse.com/1052708" source="BUGZILLA"/>
		<reference ref_id="1052717" ref_url="https://bugzilla.suse.com/1052717" source="BUGZILLA"/>
		<reference ref_id="1052721" ref_url="https://bugzilla.suse.com/1052721" source="BUGZILLA"/>
		<reference ref_id="1052768" ref_url="https://bugzilla.suse.com/1052768" source="BUGZILLA"/>
		<reference ref_id="1052777" ref_url="https://bugzilla.suse.com/1052777" source="BUGZILLA"/>
		<reference ref_id="1052781" ref_url="https://bugzilla.suse.com/1052781" source="BUGZILLA"/>
		<reference ref_id="1054600" ref_url="https://bugzilla.suse.com/1054600" source="BUGZILLA"/>
		<reference ref_id="1055068" ref_url="https://bugzilla.suse.com/1055068" source="BUGZILLA"/>
		<reference ref_id="1055374" ref_url="https://bugzilla.suse.com/1055374" source="BUGZILLA"/>
		<reference ref_id="1055455" ref_url="https://bugzilla.suse.com/1055455" source="BUGZILLA"/>
		<reference ref_id="1055456" ref_url="https://bugzilla.suse.com/1055456" source="BUGZILLA"/>
		<reference ref_id="1057000" ref_url="https://bugzilla.suse.com/1057000" source="BUGZILLA"/>
		<reference ref_id="1060162" ref_url="https://bugzilla.suse.com/1060162" source="BUGZILLA"/>
		<reference ref_id="1062752" ref_url="https://bugzilla.suse.com/1062752" source="BUGZILLA"/>
		<reference ref_id="1072362" ref_url="https://bugzilla.suse.com/1072362" source="BUGZILLA"/>
		<reference ref_id="1072901" ref_url="https://bugzilla.suse.com/1072901" source="BUGZILLA"/>
		<reference ref_id="1074120" ref_url="https://bugzilla.suse.com/1074120" source="BUGZILLA"/>
		<reference ref_id="1074125" ref_url="https://bugzilla.suse.com/1074125" source="BUGZILLA"/>
		<reference ref_id="1074185" ref_url="https://bugzilla.suse.com/1074185" source="BUGZILLA"/>
		<reference ref_id="1074309" ref_url="https://bugzilla.suse.com/1074309" source="BUGZILLA"/>
		<reference ref_id="1075939" ref_url="https://bugzilla.suse.com/1075939" source="BUGZILLA"/>
		<reference ref_id="1076021" ref_url="https://bugzilla.suse.com/1076021" source="BUGZILLA"/>
		<reference ref_id="1076051" ref_url="https://bugzilla.suse.com/1076051" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10995" ref_url="https://www.suse.com/security/cve/CVE-2017-10995/" source="CVE"/>
		<reference ref_id="CVE-2017-11505" ref_url="https://www.suse.com/security/cve/CVE-2017-11505/" source="CVE"/>
		<reference ref_id="CVE-2017-11525" ref_url="https://www.suse.com/security/cve/CVE-2017-11525/" source="CVE"/>
		<reference ref_id="CVE-2017-11526" ref_url="https://www.suse.com/security/cve/CVE-2017-11526/" source="CVE"/>
		<reference ref_id="CVE-2017-11539" ref_url="https://www.suse.com/security/cve/CVE-2017-11539/" source="CVE"/>
		<reference ref_id="CVE-2017-11639" ref_url="https://www.suse.com/security/cve/CVE-2017-11639/" source="CVE"/>
		<reference ref_id="CVE-2017-11750" ref_url="https://www.suse.com/security/cve/CVE-2017-11750/" source="CVE"/>
		<reference ref_id="CVE-2017-12565" ref_url="https://www.suse.com/security/cve/CVE-2017-12565/" source="CVE"/>
		<reference ref_id="CVE-2017-12640" ref_url="https://www.suse.com/security/cve/CVE-2017-12640/" source="CVE"/>
		<reference ref_id="CVE-2017-12641" ref_url="https://www.suse.com/security/cve/CVE-2017-12641/" source="CVE"/>
		<reference ref_id="CVE-2017-12643" ref_url="https://www.suse.com/security/cve/CVE-2017-12643/" source="CVE"/>
		<reference ref_id="CVE-2017-12671" ref_url="https://www.suse.com/security/cve/CVE-2017-12671/" source="CVE"/>
		<reference ref_id="CVE-2017-12673" ref_url="https://www.suse.com/security/cve/CVE-2017-12673/" source="CVE"/>
		<reference ref_id="CVE-2017-12676" ref_url="https://www.suse.com/security/cve/CVE-2017-12676/" source="CVE"/>
		<reference ref_id="CVE-2017-12935" ref_url="https://www.suse.com/security/cve/CVE-2017-12935/" source="CVE"/>
		<reference ref_id="CVE-2017-13059" ref_url="https://www.suse.com/security/cve/CVE-2017-13059/" source="CVE"/>
		<reference ref_id="CVE-2017-13141" ref_url="https://www.suse.com/security/cve/CVE-2017-13141/" source="CVE"/>
		<reference ref_id="CVE-2017-13142" ref_url="https://www.suse.com/security/cve/CVE-2017-13142/" source="CVE"/>
		<reference ref_id="CVE-2017-13147" ref_url="https://www.suse.com/security/cve/CVE-2017-13147/" source="CVE"/>
		<reference ref_id="CVE-2017-14103" ref_url="https://www.suse.com/security/cve/CVE-2017-14103/" source="CVE"/>
		<reference ref_id="CVE-2017-14649" ref_url="https://www.suse.com/security/cve/CVE-2017-14649/" source="CVE"/>
		<reference ref_id="CVE-2017-15218" ref_url="https://www.suse.com/security/cve/CVE-2017-15218/" source="CVE"/>
		<reference ref_id="CVE-2017-17504" ref_url="https://www.suse.com/security/cve/CVE-2017-17504/" source="CVE"/>
		<reference ref_id="CVE-2017-17681" ref_url="https://www.suse.com/security/cve/CVE-2017-17681/" source="CVE"/>
		<reference ref_id="CVE-2017-17879" ref_url="https://www.suse.com/security/cve/CVE-2017-17879/" source="CVE"/>
		<reference ref_id="CVE-2017-17884" ref_url="https://www.suse.com/security/cve/CVE-2017-17884/" source="CVE"/>
		<reference ref_id="CVE-2017-17914" ref_url="https://www.suse.com/security/cve/CVE-2017-17914/" source="CVE"/>
		<reference ref_id="CVE-2017-18008" ref_url="https://www.suse.com/security/cve/CVE-2017-18008/" source="CVE"/>
		<reference ref_id="CVE-2017-18027" ref_url="https://www.suse.com/security/cve/CVE-2017-18027/" source="CVE"/>
		<reference ref_id="CVE-2017-18029" ref_url="https://www.suse.com/security/cve/CVE-2017-18029/" source="CVE"/>
		<reference ref_id="CVE-2017-9261" ref_url="https://www.suse.com/security/cve/CVE-2017-9261/" source="CVE"/>
		<reference ref_id="CVE-2017-9262" ref_url="https://www.suse.com/security/cve/CVE-2017-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-5246" ref_url="https://www.suse.com/security/cve/CVE-2018-5246/" source="CVE"/>
		<reference ref_id="CVE-2018-5685" ref_url="https://www.suse.com/security/cve/CVE-2018-5685/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2017-18027: Prevent memory leak vulnerability in the function
  ReadMATImage which allowed remote attackers to cause a denial of service via a
  crafted file (bsc#1076051)
- CVE-2017-18029: Prevent memory leak in the function ReadMATImage which
  allowed remote attackers to cause a denial of service via a crafted file
  (bsc#1076021)
- CVE-2017-17681: Prevent infinite loop in the function ReadPSDChannelZip in
  coders/psd.c, which allowed attackers to cause a denial of service (CPU
  exhaustion) via a crafted psd image file (bsc#1072901).
- CVE-2017-18008: Prevent memory Leak in ReadPWPImage which allowed attackers
  to cause a denial of service via a PWP file (bsc#1074309).
- CVE-2018-5685: Prevent infinite loop and application hang in the ReadBMPImage
  function. Remote attackers could leverage this vulnerability to cause a denial
  of service via an image file with a crafted bit-field mask value (bsc#1075939)
- CVE-2017-11639: Prevent heap-based buffer over-read in the WriteCIPImage()
  function, related to the GetPixelLuma function in MagickCore/pixel-accessor.h
  (bsc#1050635)
- CVE-2017-11525: Prevent memory consumption in the ReadCINImage function that
  allowed remote attackers to cause a denial of service (bsc#1050098)
- CVE-2017-9262: The ReadJNGImage function in coders/png.c allowed attackers to
  cause a denial of service (memory leak) via a crafted file (bsc#1043353).
- CVE-2017-9261: The ReadMNGImage function in coders/png.c allowed attackers to
  cause a denial of service (memory leak) via a crafted file (bsc#1043354).
- CVE-2017-10995: The mng_get_long function in coders/png.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) via a crafted MNG image (bsc#1047908).
- CVE-2017-11539: Prevent memory leak in the ReadOnePNGImage() function in
  coders/png.c (bsc#1050037).
- CVE-2017-11505: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via a
  crafted file (bsc#1050072).
- CVE-2017-11526: The ReadOneMNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via a
  crafted file (bsc#1050100).
- CVE-2017-11750: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (NULL pointer dereference) via a crafted
  file (bsc#1051442).
- CVE-2017-12565: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service
  (bsc#1052470).
- CVE-2017-12676: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service
  (bsc#1052708).
- CVE-2017-12673: Prevent memory leak in the function ReadOneMNGImage in
  coders/png.c, which allowed attackers to cause a denial of service
  (bsc#1052717).
- CVE-2017-12671: Added NULL assignment in coders/png.c to prevent an invalid
  free in the function RelinquishMagickMemory in MagickCore/memory.c, which
  allowed attackers to cause a denial of service (bsc#1052721).
- CVE-2017-12643: Prevent a memory exhaustion vulnerability in ReadOneJNGImage
  in coders\png.c (bsc#1052768).
- CVE-2017-12641: Prevent a memory leak vulnerability in ReadOneJNGImage in
  coders\png.c (bsc#1052777).
- CVE-2017-12640: Prevent an out-of-bounds read vulnerability in
  ReadOneMNGImage in coders/png.c (bsc#1052781).
- CVE-2017-12935: The ReadMNGImage function in coders/png.c mishandled large
  MNG images, leading to an invalid memory read in the SetImageColorCallBack
  function in magick/image.c (bsc#1054600).
- CVE-2017-13059: Prevent memory leak in the function WriteOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service
  (WriteJNGImage memory consumption) via a crafted file (bsc#1055068).
- CVE-2017-13147: Prevent allocation failure in the function ReadMNGImage in
  coders/png.c when a small MNG file has a MEND chunk with a large length value
  (bsc#1055374).
- CVE-2017-13142: Added additional checks for short files to prevent a crafted
  PNG file from triggering a crash (bsc#1055455).
- CVE-2017-13141: Prevent memory leak in ReadOnePNGImage in coders/png.c
  (bsc#1055456).
- CVE-2017-14103: The ReadJNGImage and ReadOneJNGImage functions in
  coders/png.c did not properly manage image pointers after certain error
  conditions, which allowed remote attackers to conduct use-after-free attacks
  via a crafted file, related to a ReadMNGImage out-of-order CloseBlob call
  (bsc#1057000).
- CVE-2017-14649: ReadOneJNGImage in coders/png.c did not properly validate JNG
  data, leading to a denial of service (assertion failure in
  magick/pixel_cache.c, and application crash) (bsc#1060162).
- CVE-2017-15218: Prevent memory leak in ReadOneJNGImage in coders/png.c
  (bsc#1062752).
- CVE-2017-17504: Prevent heap-based buffer over-read via a crafted file in
  Magick_png_read_raw_profile, related to ReadOneMNGImage (bsc#1072362).
- CVE-2017-17884: Prevent memory leak in the function WriteOnePNGImage in
  coders/png.c, which allowed attackers to cause a denial of service via a
  crafted PNG image file (bsc#1074120).
- CVE-2017-17879: Prevent heap-based buffer over-read in ReadOneMNGImage in
  coders/png.c, related to length calculation and caused by an off-by-one error
  (bsc#1074125).
- CVE-2017-17914: Prevent crafted files to cause a large loop in
  ReadOneMNGImage (bsc#1074185).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-02"/>
	<updated date="2018-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043353">SUSE bug 1043353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043354">SUSE bug 1043354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047908">SUSE bug 1047908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050037">SUSE bug 1050037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050072">SUSE bug 1050072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050098">SUSE bug 1050098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050100">SUSE bug 1050100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050635">SUSE bug 1050635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051442">SUSE bug 1051442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052470">SUSE bug 1052470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052708">SUSE bug 1052708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052717">SUSE bug 1052717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052721">SUSE bug 1052721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052768">SUSE bug 1052768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052777">SUSE bug 1052777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052781">SUSE bug 1052781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055068">SUSE bug 1055068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055374">SUSE bug 1055374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055455">SUSE bug 1055455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055456">SUSE bug 1055456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057000">SUSE bug 1057000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060162">SUSE bug 1060162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062752">SUSE bug 1062752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072362">SUSE bug 1072362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072901">SUSE bug 1072901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074120">SUSE bug 1074120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074125">SUSE bug 1074125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074185">SUSE bug 1074185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074309">SUSE bug 1074309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075939">SUSE bug 1075939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076021">SUSE bug 1076021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076051">SUSE bug 1076051</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10995/">CVE-2017-10995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10995">CVE-2017-10995 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11505/">CVE-2017-11505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11505">CVE-2017-11505 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11525/">CVE-2017-11525 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11525">CVE-2017-11525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11526/">CVE-2017-11526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11526">CVE-2017-11526 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11539/">CVE-2017-11539 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11539">CVE-2017-11539 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11639/">CVE-2017-11639 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11639">CVE-2017-11639 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11750/">CVE-2017-11750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11750">CVE-2017-11750 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12565/">CVE-2017-12565 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12565">CVE-2017-12565 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12640/">CVE-2017-12640 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12640">CVE-2017-12640 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12641/">CVE-2017-12641 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12641">CVE-2017-12641 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12643/">CVE-2017-12643 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12643">CVE-2017-12643 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12671/">CVE-2017-12671 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12671">CVE-2017-12671 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12673/">CVE-2017-12673 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12673">CVE-2017-12673 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12676/">CVE-2017-12676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12676">CVE-2017-12676 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12935/">CVE-2017-12935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12935">CVE-2017-12935 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13059/">CVE-2017-13059 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13059">CVE-2017-13059 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13141/">CVE-2017-13141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13141">CVE-2017-13141 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13142/">CVE-2017-13142 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13142">CVE-2017-13142 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13147/">CVE-2017-13147 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13147">CVE-2017-13147 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14103/">CVE-2017-14103 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14103">CVE-2017-14103 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14649/">CVE-2017-14649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14649">CVE-2017-14649 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15218/">CVE-2017-15218 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15218">CVE-2017-15218 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17504/">CVE-2017-17504 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17504">CVE-2017-17504 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17681/">CVE-2017-17681 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17681">CVE-2017-17681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17879/">CVE-2017-17879 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17879">CVE-2017-17879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17884/">CVE-2017-17884 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17884">CVE-2017-17884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17914/">CVE-2017-17914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17914">CVE-2017-17914 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18008/">CVE-2017-18008 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18008">CVE-2017-18008 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18027/">CVE-2017-18027 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18027">CVE-2017-18027 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18029/">CVE-2017-18029 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18029">CVE-2017-18029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9261/">CVE-2017-9261 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9261">CVE-2017-9261 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9262/">CVE-2017-9262 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9262">CVE-2017-9262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5246/">CVE-2018-5246 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5246">CVE-2018-5246 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5685/">CVE-2018-5685 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5685">CVE-2018-5685 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149594" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="1104457" ref_url="https://bugzilla.suse.com/1104457" source="BUGZILLA"/>
		<reference ref_id="1110723" ref_url="https://bugzilla.suse.com/1110723" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<reference ref_id="CVE-2018-15378" ref_url="https://www.suse.com/security/cve/CVE-2018-15378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004789.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

clamav was updated to version 0.100.2:

- CVE-2018-15378: Vulnerability in ClamAV's MEW unpacking feature that
  could allow an unauthenticated, remote attacker to cause a denial of
  service (DoS) condition on an affected device. (bsc#1110723)
- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682: more fixes for embedded
  libmspack. (bsc#1103040)

- Make freshclam more robust against lagging signature mirrors.
- On-Access 'Extra Scanning', an opt-in minor feature of
  OnAccess scanning on Linux systems, has been disabled due to a
  known issue with resource cleanup OnAccessExtraScanning will
  be re-enabled in a future release when the issue is
  resolved. In the mean-time, users who enabled the feature in
  clamd.conf will see a warning informing them that the feature
  is not active. For details, see:
  https://bugzilla.clamav.net/show_bug.cgi?id=12048

- Restore exit code compatibility of freshclam with versions before
  0.100.0 when the virus database is already up to date
  (bsc#1104457).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104457">SUSE bug 1104457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110723">SUSE bug 1110723</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14680">CVE-2018-14680 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14681">CVE-2018-14681 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14682">CVE-2018-14682 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15378/">CVE-2018-15378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15378">CVE-2018-15378 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553371" comment="clamav-0.100.2-33.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149595" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1027353" ref_url="https://bugzilla.suse.com/1027353" source="BUGZILLA"/>
		<reference ref_id="1081164" ref_url="https://bugzilla.suse.com/1081164" source="BUGZILLA"/>
		<reference ref_id="1102775" ref_url="https://bugzilla.suse.com/1102775" source="BUGZILLA"/>
		<reference ref_id="1111122" ref_url="https://bugzilla.suse.com/1111122" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18065" ref_url="https://www.suse.com/security/cve/CVE-2018-18065/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004792.html" source="SUSE-SU"/>
		<description>
This update for net-snmp fixes the following issues:

Security issues fixed:

- CVE-2018-18065: _set_key in agent/helpers/table_container.c had a NULL Pointer Exception bug that can be used by an authenticated attacker to remotely cause the instance to crash via a crafted UDP packet, resulting in Denial of Service. (bsc#1111122)

Non-security issues fixed:

- swintst_rpm: Protect against unspecified Group name (bsc#1102775)
- Add tsm and tlstm MIBs and the USM security module. (bsc#1081164)
- Fix agentx freezing on timeout (bsc#1027353)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027353">SUSE bug 1027353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081164">SUSE bug 1081164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102775">SUSE bug 1102775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111122">SUSE bug 1111122</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18065/">CVE-2018-18065 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18065">CVE-2018-18065 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553372" comment="libsnmp30-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548354" comment="libsnmp30-32bit-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553373" comment="net-snmp-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553374" comment="perl-SNMP-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553375" comment="snmp-mibs-5.7.3-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149596" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1043978" ref_url="https://bugzilla.suse.com/1043978" source="BUGZILLA"/>
		<reference ref_id="1059911" ref_url="https://bugzilla.suse.com/1059911" source="BUGZILLA"/>
		<reference ref_id="1059912" ref_url="https://bugzilla.suse.com/1059912" source="BUGZILLA"/>
		<reference ref_id="1059913" ref_url="https://bugzilla.suse.com/1059913" source="BUGZILLA"/>
		<reference ref_id="1069874" ref_url="https://bugzilla.suse.com/1069874" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14245" ref_url="https://www.suse.com/security/cve/CVE-2017-14245/" source="CVE"/>
		<reference ref_id="CVE-2017-14246" ref_url="https://www.suse.com/security/cve/CVE-2017-14246/" source="CVE"/>
		<reference ref_id="CVE-2017-14634" ref_url="https://www.suse.com/security/cve/CVE-2017-14634/" source="CVE"/>
		<reference ref_id="CVE-2017-16942" ref_url="https://www.suse.com/security/cve/CVE-2017-16942/" source="CVE"/>
		<reference ref_id="CVE-2017-6892" ref_url="https://www.suse.com/security/cve/CVE-2017-6892/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003705.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2017-16942: Divide-by-zero in the function wav_w64_read_fmt_chunk(), which may lead to Denial of service (bsc#1069874). 
- CVE-2017-6892:  Fixed an out-of-bounds read memory access in the aiff_read_chanmap() (bsc#1043978).
- CVE-2017-14634: In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file. (bsc#1059911)
- CVE-2017-14245: An out of bounds read in the function d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of 
                  the NAN and INFINITY floating-point values. (bsc#1059912)
- CVE-2017-14246: An out of bounds read in the function d2ulaw_array() in ulaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of 
                  the NAN and INFINITY floating-point values.(bsc#1059913)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-02"/>
	<updated date="2018-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043978">SUSE bug 1043978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059911">SUSE bug 1059911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059912">SUSE bug 1059912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059913">SUSE bug 1059913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069874">SUSE bug 1069874</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14245/">CVE-2017-14245 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14245">CVE-2017-14245 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14246/">CVE-2017-14246 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14246">CVE-2017-14246 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14634/">CVE-2017-14634 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14634">CVE-2017-14634 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16942/">CVE-2017-16942 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16942">CVE-2017-16942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6892/">CVE-2017-6892 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6892">CVE-2017-6892 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550592" comment="libsndfile1-1.0.25-36.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550593" comment="libsndfile1-32bit-1.0.25-36.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149597" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1112399" ref_url="https://bugzilla.suse.com/1112399" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14997" ref_url="https://www.suse.com/security/cve/CVE-2017-14997/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004794.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2017-14997: GraphicsMagick allowed remote attackers to cause a denial of service (excessive memory allocation) because of an integer underflow in ReadPICTImage in coders/pict.c.  [bsc#1112399]
- CVE-2018-16644: An regression in the security fix for the pict coder was fixed (bsc#1107609)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112399">SUSE bug 1112399</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14997/">CVE-2017-14997 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14997">CVE-2017-14997 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16644">CVE-2018-16644 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553376" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553377" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149598" version="1" class="patch">
	<metadata>
		<title>Security update for smt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1104076" ref_url="https://bugzilla.suse.com/1104076" source="BUGZILLA"/>
		<reference ref_id="1111056" ref_url="https://bugzilla.suse.com/1111056" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12472" ref_url="https://www.suse.com/security/cve/CVE-2018-12472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004795.html" source="SUSE-SU"/>
		<description>


SMT was updated to version 3.0.38.

Following security issue was fixed:

- CVE-2018-12472: Harden hostname check during sibling check by forcing double
  reverse lookup (bsc#1104076)

Following non security issues were fixed:

- Add migration path check when registration sharing is enabled
- Fix sibling sync errors (bsc#1111056):
  - Synchronize all registered products
  - Handle duplicate registrations when syncing
  - Force resync to the sibling instance in `upgrade` and
    `synchronize` API calls
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104076">SUSE bug 1104076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111056">SUSE bug 1111056</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12472/">CVE-2018-12472 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12472">CVE-2018-12472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553378" comment="res-signingkeys-3.0.38-52.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553379" comment="smt-3.0.38-52.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553380" comment="smt-support-3.0.38-52.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149599" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1078292" ref_url="https://bugzilla.suse.com/1078292" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1094508" ref_url="https://bugzilla.suse.com/1094508" source="BUGZILLA"/>
		<reference ref_id="1103275" ref_url="https://bugzilla.suse.com/1103275" source="BUGZILLA"/>
		<reference ref_id="1103276" ref_url="https://bugzilla.suse.com/1103276" source="BUGZILLA"/>
		<reference ref_id="1103279" ref_url="https://bugzilla.suse.com/1103279" source="BUGZILLA"/>
		<reference ref_id="1106263" ref_url="https://bugzilla.suse.com/1106263" source="BUGZILLA"/>
		<reference ref_id="1111014" ref_url="https://bugzilla.suse.com/1111014" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15468" ref_url="https://www.suse.com/security/cve/CVE-2018-15468/" source="CVE"/>
		<reference ref_id="CVE-2018-15469" ref_url="https://www.suse.com/security/cve/CVE-2018-15469/" source="CVE"/>
		<reference ref_id="CVE-2018-15470" ref_url="https://www.suse.com/security/cve/CVE-2018-15470/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004800.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

XEN was updated to the Xen 4.9.3 bug fix only release (bsc#1027519)

- CVE-2018-17963: qemu_deliver_packet_iov accepted packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111014)
- CVE-2018-15470: oxenstored might not have enforced the configured quota-maxentity. This allowed a malicious or buggy guest to write as many xenstore entries as it wishes, causing unbounded memory usage in oxenstored. This can lead to a system-wide DoS.  (XSA-272) (bsc#1103279)
- CVE-2018-15469: ARM never properly implemented grant table v2, either in the hypervisor or in Linux. Unfortunately, an ARM guest can still request v2 grant tables; they will simply not be properly set up, resulting in subsequent grant-related hypercalls hitting BUG() checks. An unprivileged guest can cause a BUG() check in the hypervisor, resulting in a denial-of-service (crash). (XSA-268) (bsc#1103275)
  Note that SUSE does not ship ARM Xen, so we are not affected.
- CVE-2018-15468: The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service. (XSA-269) (bsc#1103276)
- CVE-2018-3646: Systems with microprocessors utilizing speculative execution and address translations may have allowed unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis. (XSA-273) (bsc#1091107)

Non security issues fixed:

- The affinity reporting via 'xl vcpu-list' was broken (bsc#1106263)
- Kernel oops in fs/dcache.c called by d_materialise_unique() (bsc#1094508)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-26"/>
	<updated date="2018-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078292">SUSE bug 1078292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094508">SUSE bug 1094508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103275">SUSE bug 1103275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103276">SUSE bug 1103276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103279">SUSE bug 1103279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106263">SUSE bug 1106263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111014">SUSE bug 1111014</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15468/">CVE-2018-15468 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15468">CVE-2018-15468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-15469/">CVE-2018-15469 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15469">CVE-2018-15469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-15470/">CVE-2018-15470 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15470">CVE-2018-15470 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17963">CVE-2018-17963 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520284" comment="xen-4.9.3_03-3.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553381" comment="xen-doc-html-4.9.3_03-3.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520285" comment="xen-libs-4.9.3_03-3.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520286" comment="xen-libs-32bit-4.9.3_03-3.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553382" comment="xen-tools-4.9.3_03-3.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553383" comment="xen-tools-domU-4.9.3_03-3.44.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149600" version="1" class="patch">
	<metadata>
		<title>Security update for lcms2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1021364" ref_url="https://bugzilla.suse.com/1021364" source="BUGZILLA"/>
		<reference ref_id="1026649" ref_url="https://bugzilla.suse.com/1026649" source="BUGZILLA"/>
		<reference ref_id="1026650" ref_url="https://bugzilla.suse.com/1026650" source="BUGZILLA"/>
		<reference ref_id="1108813" ref_url="https://bugzilla.suse.com/1108813" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004806.html" source="SUSE-SU"/>
		<description>
This update for lcms2 fixes the following security issues:

- CVE-2016-10165: The Type_MLU_Read function allowed remote attackers to obtain
  sensitive information or cause a denial of service via an image with a crafted
  ICC profile, which triggered an out-of-bounds heap read (bsc#1021364).
- CVE-2018-16435: A integer overflow was fixed in the AllocateDataSet
  function in cmscgats.c, that could lead to a heap-based buffer overflow
  in the SetData function via a crafted file in the second argument to
  cmsIT8LoadFromFile. (bsc#1108813)
- Ensure that LUT stages match channel count (bsc#1026649).
- sanitize input and output channels on MPE profiles (bsc#1026650).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-29"/>
	<updated date="2018-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021364">SUSE bug 1021364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026649">SUSE bug 1026649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026650">SUSE bug 1026650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108813">SUSE bug 1108813</bugzilla>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10165">CVE-2016-10165 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16435">CVE-2018-16435 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553384" comment="lcms2-2.7-9.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553385" comment="liblcms2-2-2.7-9.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553386" comment="liblcms2-2-32bit-2.7-9.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149601" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="1094725" ref_url="https://bugzilla.suse.com/1094725" source="BUGZILLA"/>
		<reference ref_id="1096223" ref_url="https://bugzilla.suse.com/1096223" source="BUGZILLA"/>
		<reference ref_id="1098735" ref_url="https://bugzilla.suse.com/1098735" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004810.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

These security issues were fixed:

- CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have
  been exploited by sending a crafted QMP command (including guest-file-read with
  a large count value) to the agent via the listening socket causing DoS
  (bsc#1098735).
- CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented
  datagrams (bsc#1096223).

With this release the mitigations for Spectre v4 are moved the the patches from
upstream (CVE-2018-3639, bsc#1092885).

This feature was added:

- Add support for block resize support for disks through the monitor (bsc#1094725).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-29"/>
	<updated date="2018-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094725">SUSE bug 1094725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096223">SUSE bug 1096223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098735">SUSE bug 1098735</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11806">CVE-2018-11806 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12617">CVE-2018-12617 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553387" comment="qemu-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553388" comment="qemu-arm-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553389" comment="qemu-block-curl-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553390" comment="qemu-block-iscsi-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553391" comment="qemu-block-rbd-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553392" comment="qemu-block-ssh-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553393" comment="qemu-guest-agent-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520292" comment="qemu-ipxe-1.0.0-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553394" comment="qemu-kvm-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553395" comment="qemu-lang-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553396" comment="qemu-ppc-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553397" comment="qemu-s390-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520294" comment="qemu-seabios-1.10.2-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520295" comment="qemu-sgabios-8-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553398" comment="qemu-tools-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520297" comment="qemu-vgabios-1.10.2-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520298" comment="qemu-x86-2.9.1-6.19.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149602" version="1" class="patch">
	<metadata>
		<title>Security update for python, python-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="1109663" ref_url="https://bugzilla.suse.com/1109663" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004809.html" source="SUSE-SU"/>
		<description>
This update for python, python-base fixes the following issues:

Security issues fixed:

- CVE-2018-1000802: Prevent command injection in shutil module (make_archive
  function) via passage of unfiltered user input (bsc#1109663).
- CVE-2018-1061: Fixed DoS via regular expression backtracking in
  difflib.IS_LINE_JUNK method in difflib (bsc#1088004).
- CVE-2018-1060: Fixed DoS via regular expression catastrophic backtracking in
  apop() method in pop3lib (bsc#1088009).

Bug fixes:

- bsc#1086001: python tarfile uses random order.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-29"/>
	<updated date="2018-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000802">CVE-2018-1000802 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1060">CVE-2018-1060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1061">CVE-2018-1061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553399" comment="libpython2_7-1_0-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553400" comment="libpython2_7-1_0-32bit-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553401" comment="python-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553402" comment="python-32bit-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553403" comment="python-base-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553404" comment="python-base-32bit-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553405" comment="python-curses-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553406" comment="python-demo-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553407" comment="python-doc-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553408" comment="python-doc-pdf-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553409" comment="python-gdbm-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553410" comment="python-idle-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553411" comment="python-tk-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553412" comment="python-xml-2.7.13-28.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149603" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1109961" ref_url="https://bugzilla.suse.com/1109961" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11763" ref_url="https://www.suse.com/security/cve/CVE-2018-11763/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004815.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

Security issues fixed:

- CVE-2018-11763: In Apache HTTP Server by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. (bsc#1109961)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-30"/>
	<updated date="2018-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109961">SUSE bug 1109961</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11763/">CVE-2018-11763 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11763">CVE-2018-11763 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553413" comment="apache2-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530318" comment="apache2-doc-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553414" comment="apache2-example-pages-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553415" comment="apache2-prefork-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553416" comment="apache2-utils-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553417" comment="apache2-worker-2.4.23-29.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149604" version="1" class="patch">
	<metadata>
		<title>Security update for audiofile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1111586" ref_url="https://bugzilla.suse.com/1111586" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17095" ref_url="https://www.suse.com/security/cve/CVE-2018-17095/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004817.html" source="SUSE-SU"/>
		<description>
This update for audiofile fixes the following issues:

- CVE-2018-17095: A heap-based buffer overflow in Expand3To4Module::run could occurred when running sfconvert leading to crashes or code execution when handling untrusted soundfiles (bsc#1111586).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-31"/>
	<updated date="2018-10-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111586">SUSE bug 1111586</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17095/">CVE-2018-17095 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17095">CVE-2018-17095 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553418" comment="audiofile-0.3.6-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553419" comment="libaudiofile1-0.3.6-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553420" comment="libaudiofile1-32bit-0.3.6-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149605" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1111647" ref_url="https://bugzilla.suse.com/1111647" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12086" ref_url="https://www.suse.com/security/cve/CVE-2018-12086/" source="CVE"/>
		<reference ref_id="CVE-2018-18227" ref_url="https://www.suse.com/security/cve/CVE-2018-18227/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004819.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Wireshark was updated to 2.4.10 (bsc#1111647).

Following security issues were fixed:

- CVE-2018-18227: MS-WSP dissector crash (wnpa-sec-2018-47)
- CVE-2018-12086: OpcUA dissector crash (wnpa-sec-2018-50)

Further bug fixes and updated protocol support that were done are listed in:

  https://www.wireshark.org/docs/relnotes/wireshark-2.4.10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-31"/>
	<updated date="2018-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111647">SUSE bug 1111647</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12086/">CVE-2018-12086 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12086">CVE-2018-12086 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18227/">CVE-2018-18227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18227">CVE-2018-18227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553421" comment="libwireshark9-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553422" comment="libwiretap7-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553423" comment="libwscodecs1-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553424" comment="libwsutil8-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553425" comment="wireshark-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553426" comment="wireshark-gtk-2.4.10-48.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149606" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1012260" ref_url="https://bugzilla.suse.com/1012260" source="BUGZILLA"/>
		<reference ref_id="1021577" ref_url="https://bugzilla.suse.com/1021577" source="BUGZILLA"/>
		<reference ref_id="1026191" ref_url="https://bugzilla.suse.com/1026191" source="BUGZILLA"/>
		<reference ref_id="1041469" ref_url="https://bugzilla.suse.com/1041469" source="BUGZILLA"/>
		<reference ref_id="1041894" ref_url="https://bugzilla.suse.com/1041894" source="BUGZILLA"/>
		<reference ref_id="1049703" ref_url="https://bugzilla.suse.com/1049703" source="BUGZILLA"/>
		<reference ref_id="1061204" ref_url="https://bugzilla.suse.com/1061204" source="BUGZILLA"/>
		<reference ref_id="1064786" ref_url="https://bugzilla.suse.com/1064786" source="BUGZILLA"/>
		<reference ref_id="1065464" ref_url="https://bugzilla.suse.com/1065464" source="BUGZILLA"/>
		<reference ref_id="1066489" ref_url="https://bugzilla.suse.com/1066489" source="BUGZILLA"/>
		<reference ref_id="1073210" ref_url="https://bugzilla.suse.com/1073210" source="BUGZILLA"/>
		<reference ref_id="1078436" ref_url="https://bugzilla.suse.com/1078436" source="BUGZILLA"/>
		<reference ref_id="1091551" ref_url="https://bugzilla.suse.com/1091551" source="BUGZILLA"/>
		<reference ref_id="1092697" ref_url="https://bugzilla.suse.com/1092697" source="BUGZILLA"/>
		<reference ref_id="1094767" ref_url="https://bugzilla.suse.com/1094767" source="BUGZILLA"/>
		<reference ref_id="1096515" ref_url="https://bugzilla.suse.com/1096515" source="BUGZILLA"/>
		<reference ref_id="1107343" ref_url="https://bugzilla.suse.com/1107343" source="BUGZILLA"/>
		<reference ref_id="1108771" ref_url="https://bugzilla.suse.com/1108771" source="BUGZILLA"/>
		<reference ref_id="1108986" ref_url="https://bugzilla.suse.com/1108986" source="BUGZILLA"/>
		<reference ref_id="1109363" ref_url="https://bugzilla.suse.com/1109363" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1110506" ref_url="https://bugzilla.suse.com/1110506" source="BUGZILLA"/>
		<reference ref_id="1110507" ref_url="https://bugzilla.suse.com/1110507" source="BUGZILLA"/>
		<reference ref_id="703591" ref_url="https://bugzilla.suse.com/703591" source="BUGZILLA"/>
		<reference ref_id="839074" ref_url="https://bugzilla.suse.com/839074" source="BUGZILLA"/>
		<reference ref_id="857131" ref_url="https://bugzilla.suse.com/857131" source="BUGZILLA"/>
		<reference ref_id="893359" ref_url="https://bugzilla.suse.com/893359" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16541" ref_url="https://www.suse.com/security/cve/CVE-2017-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-12376" ref_url="https://www.suse.com/security/cve/CVE-2018-12376/" source="CVE"/>
		<reference ref_id="CVE-2018-12377" ref_url="https://www.suse.com/security/cve/CVE-2018-12377/" source="CVE"/>
		<reference ref_id="CVE-2018-12378" ref_url="https://www.suse.com/security/cve/CVE-2018-12378/" source="CVE"/>
		<reference ref_id="CVE-2018-12379" ref_url="https://www.suse.com/security/cve/CVE-2018-12379/" source="CVE"/>
		<reference ref_id="CVE-2018-12381" ref_url="https://www.suse.com/security/cve/CVE-2018-12381/" source="CVE"/>
		<reference ref_id="CVE-2018-12383" ref_url="https://www.suse.com/security/cve/CVE-2018-12383/" source="CVE"/>
		<reference ref_id="CVE-2018-12385" ref_url="https://www.suse.com/security/cve/CVE-2018-12385/" source="CVE"/>
		<reference ref_id="CVE-2018-12386" ref_url="https://www.suse.com/security/cve/CVE-2018-12386/" source="CVE"/>
		<reference ref_id="CVE-2018-12387" ref_url="https://www.suse.com/security/cve/CVE-2018-12387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to ESR 60.2.2 fixes several issues.

These general changes are part of the version 60 release.

- New browser engine with speed improvements
- Redesigned graphical user interface elements
- Unified address and search bar for new installations
- New tab page listing top visited, recently visited and recommended pages
- Support for configuration policies in enterprise deployments via JSON files
- Support for Web Authentication, allowing the use of USB tokens for
  authentication to web sites

The following changes affect compatibility:
    
- Now exclusively supports extensions built using the WebExtension API.
- Unsupported legacy extensions will no longer work in Firefox 60 ESR
- TLS certificates issued by Symantec before June 1st, 2016 are no longer trusted 
  The 'security.pki.distrust_ca_policy' preference can be set to 0 to reinstate
  trust in those certificates

The following issues affect performance:

- new format for storing private keys, certificates and certificate trust
  If the user home or data directory is on a network file system, it is
  recommended that users set the following environment variable to avoid
  slowdowns: NSS_SDB_USE_CACHE=yes
  This setting is not recommended for local, fast file systems. 

These security issues were fixed:

- CVE-2018-12381: Dragging and dropping Outlook email message results in page navigation (bsc#1107343).
- CVE-2017-16541: Proxy bypass using automount and autofs (bsc#1107343).
- CVE-2018-12376: Various memory safety bugs (bsc#1107343).
- CVE-2018-12377: Use-after-free in refresh driver timers (bsc#1107343).
- CVE-2018-12378: Use-after-free in IndexedDB (bsc#1107343).
- CVE-2018-12379: Out-of-bounds write with malicious MAR file (bsc#1107343).
- CVE-2018-12386: Type confusion in JavaScript allowed remote code execution (bsc#1110506)
- CVE-2018-12387: Array.prototype.push stack pointer vulnerability may enable exploits in the sandboxed content process (bsc#1110507)
- CVE-2018-12385: Crash in TransportSecurityInfo due to cached data  (bsc#1109363)
- CVE-2018-12383: Setting a master password did not delete unencrypted previously stored passwords  (bsc#1107343)

This update for mozilla-nspr to version 4.19 fixes the follwing issues

- Added TCP Fast Open functionality
- A socket without PR_NSPR_IO_LAYER will no longer trigger
  an assertion when polling

This update for mozilla-nss to version 3.36.4 fixes the follwing issues

- Connecting to a server that was recently upgraded to TLS 1.3
  would result in a SSL_RX_MALFORMED_SERVER_HELLO error.
- Fix a rare bug with PKCS#12 files.
- Replaces existing vectorized ChaCha20 code with verified
  HACL* implementation.
- TLS 1.3 support has been updated to draft -23.
- Added formally verified implementations of non-vectorized Chacha20
  and non-vectorized Poly1305 64-bit.
- The following CA certificates were Removed:
  OU = Security Communication EV RootCA1
  CN = CA Disig Root R1
  CN = DST ACES CA X6
  Certum CA, O=Unizeto Sp. z o.o.
  StartCom Certification Authority
  StartCom Certification Authority G2
  T?BİTAK UEKAE K?k Sertifika Hizmet Sağlayıcısı - S?r?m 3
  ACEDICOM Root
  Certinomis - Autorit? Racine
  T?RKTRUST Elektronik Sertifika Hizmet Sağlayıcısı
  PSCProcert
  CA 沃通根证书, O=WoSign CA Limited
  Certification Authority of WoSign
  Certification Authority of WoSign G2
  CA WoSign ECC Root
  Subject CN = VeriSign Class 3 Secure Server CA - G2
  O = Japanese Government, OU = ApplicationCA
  CN = WellsSecure Public Root Certificate Authority
  CN = T?RKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6
  CN = Microsec e-Szigno Root
* The following CA certificates were Removed:
  AddTrust Public CA Root
  AddTrust Qualified CA Root
  China Internet Network Information Center EV Certificates Root
  CNNIC ROOT
  ComSign Secured CA
  GeoTrust Global CA 2
  Secure Certificate Services
  Swisscom Root CA 1
  Swisscom Root EV CA 2
  Trusted Certificate Services
  UTN-USERFirst-Hardware
  UTN-USERFirst-Object
* The following CA certificates were Added
  CN = D-TRUST Root CA 3 2013
  CN = TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1
  GDCA TrustAUTH R5 ROOT
  SSL.com Root Certification Authority RSA
  SSL.com Root Certification Authority ECC
  SSL.com EV Root Certification Authority RSA R2
  SSL.com EV Root Certification Authority ECC
  TrustCor RootCert CA-1
  TrustCor RootCert CA-2
  TrustCor ECA-1
* The Websites (TLS/SSL) trust bit was turned off for the following
  CA certificates:
  CN = Chambers of Commerce Root
  CN = Global Chambersign Root
* TLS servers are able to handle a ClientHello statelessly, if the
  client supports TLS 1.3.  If the server sends a HelloRetryRequest,
  it is possible to discard the server socket, and make a new socket
  to handle any subsequent ClientHello. This better enables stateless
  server operation. (This feature is added in support of QUIC, but it
  also has utility for DTLS 1.3 servers.)

Due to the update of mozilla-nss apache2-mod_nss needs to be updated to 
change to the SQLite certificate database, which is now the default (bsc#1108771)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-31"/>
	<updated date="2018-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012260">SUSE bug 1012260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021577">SUSE bug 1021577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026191">SUSE bug 1026191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041469">SUSE bug 1041469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041894">SUSE bug 1041894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049703">SUSE bug 1049703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061204">SUSE bug 1061204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064786">SUSE bug 1064786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065464">SUSE bug 1065464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066489">SUSE bug 1066489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073210">SUSE bug 1073210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078436">SUSE bug 1078436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091551">SUSE bug 1091551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092697">SUSE bug 1092697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094767">SUSE bug 1094767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096515">SUSE bug 1096515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108771">SUSE bug 1108771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108986">SUSE bug 1108986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109363">SUSE bug 1109363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110506">SUSE bug 1110506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110507">SUSE bug 1110507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703591">SUSE bug 703591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839074">SUSE bug 839074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857131">SUSE bug 857131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893359">SUSE bug 893359</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16541/">CVE-2017-16541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16541">CVE-2017-16541 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-12376/">CVE-2018-12376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12376">CVE-2018-12376 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12377/">CVE-2018-12377 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12377">CVE-2018-12377 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12378/">CVE-2018-12378 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12378">CVE-2018-12378 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12379/">CVE-2018-12379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12379">CVE-2018-12379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12381/">CVE-2018-12381 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12381">CVE-2018-12381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12383/">CVE-2018-12383 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12383">CVE-2018-12383 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12385/">CVE-2018-12385 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12385">CVE-2018-12385 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12386/">CVE-2018-12386 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12386">CVE-2018-12386 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12387/">CVE-2018-12387 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12387">CVE-2018-12387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553427" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553428" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553429" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553430" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553431" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553432" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553433" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553434" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553435" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553436" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553437" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553438" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553439" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149607" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1112758" ref_url="https://bugzilla.suse.com/1112758" source="BUGZILLA"/>
		<reference ref_id="1113660" ref_url="https://bugzilla.suse.com/1113660" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16840" ref_url="https://www.suse.com/security/cve/CVE-2018-16840/" source="CVE"/>
		<reference ref_id="CVE-2018-16842" ref_url="https://www.suse.com/security/cve/CVE-2018-16842/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004824.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-16840: A use after free in closing SASL handles was fixed (bsc#1112758)
- CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which could lead to crashes (bsc#1113660)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-02"/>
	<updated date="2018-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113660">SUSE bug 1113660</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16840/">CVE-2018-16840 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16840">CVE-2018-16840 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16842/">CVE-2018-16842 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16842">CVE-2018-16842 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553440" comment="curl-7.37.0-37.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553441" comment="libcurl4-7.37.0-37.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553442" comment="libcurl4-32bit-7.37.0-37.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149608" version="1" class="patch">
	<metadata>
		<title>Security update for soundtouch (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1108630" ref_url="https://bugzilla.suse.com/1108630" source="BUGZILLA"/>
		<reference ref_id="1108631" ref_url="https://bugzilla.suse.com/1108631" source="BUGZILLA"/>
		<reference ref_id="1108632" ref_url="https://bugzilla.suse.com/1108632" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17096" ref_url="https://www.suse.com/security/cve/CVE-2018-17096/" source="CVE"/>
		<reference ref_id="CVE-2018-17097" ref_url="https://www.suse.com/security/cve/CVE-2018-17097/" source="CVE"/>
		<reference ref_id="CVE-2018-17098" ref_url="https://www.suse.com/security/cve/CVE-2018-17098/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004822.html" source="SUSE-SU"/>
		<description>
This update for soundtouch fixes the following issues:

- CVE-2018-17098: The WavFileBase class allowed remote attackers to cause a denial of service (heap corruption from size inconsistency) or possibly have unspecified other impact, as demonstrated by SoundStretch. (bsc#1108632)
- CVE-2018-17097: The WavFileBase class allowed remote attackers to cause a denial of service (double free) or possibly have unspecified other impact, as demonstrated by SoundStretch. (double free) (bsc#1108631)
- CVE-2018-17096: The BPMDetect class allowed remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch. (bsc#1108630)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-02"/>
	<updated date="2018-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108630">SUSE bug 1108630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108631">SUSE bug 1108631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108632">SUSE bug 1108632</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17096/">CVE-2018-17096 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17096">CVE-2018-17096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17097/">CVE-2018-17097 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17097">CVE-2018-17097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17098/">CVE-2018-17098 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17098">CVE-2018-17098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553443" comment="libSoundTouch0-1.7.1-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149609" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1104812" ref_url="https://bugzilla.suse.com/1104812" source="BUGZILLA"/>
		<reference ref_id="1106998" ref_url="https://bugzilla.suse.com/1106998" source="BUGZILLA"/>
		<reference ref_id="1106999" ref_url="https://bugzilla.suse.com/1106999" source="BUGZILLA"/>
		<reference ref_id="1107033" ref_url="https://bugzilla.suse.com/1107033" source="BUGZILLA"/>
		<reference ref_id="1107034" ref_url="https://bugzilla.suse.com/1107034" source="BUGZILLA"/>
		<reference ref_id="1107037" ref_url="https://bugzilla.suse.com/1107037" source="BUGZILLA"/>
		<reference ref_id="1107038" ref_url="https://bugzilla.suse.com/1107038" source="BUGZILLA"/>
		<reference ref_id="1107039" ref_url="https://bugzilla.suse.com/1107039" source="BUGZILLA"/>
		<reference ref_id="1107097" ref_url="https://bugzilla.suse.com/1107097" source="BUGZILLA"/>
		<reference ref_id="1107107" ref_url="https://bugzilla.suse.com/1107107" source="BUGZILLA"/>
		<reference ref_id="1108318" ref_url="https://bugzilla.suse.com/1108318" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16391" ref_url="https://www.suse.com/security/cve/CVE-2018-16391/" source="CVE"/>
		<reference ref_id="CVE-2018-16392" ref_url="https://www.suse.com/security/cve/CVE-2018-16392/" source="CVE"/>
		<reference ref_id="CVE-2018-16393" ref_url="https://www.suse.com/security/cve/CVE-2018-16393/" source="CVE"/>
		<reference ref_id="CVE-2018-16418" ref_url="https://www.suse.com/security/cve/CVE-2018-16418/" source="CVE"/>
		<reference ref_id="CVE-2018-16419" ref_url="https://www.suse.com/security/cve/CVE-2018-16419/" source="CVE"/>
		<reference ref_id="CVE-2018-16420" ref_url="https://www.suse.com/security/cve/CVE-2018-16420/" source="CVE"/>
		<reference ref_id="CVE-2018-16422" ref_url="https://www.suse.com/security/cve/CVE-2018-16422/" source="CVE"/>
		<reference ref_id="CVE-2018-16423" ref_url="https://www.suse.com/security/cve/CVE-2018-16423/" source="CVE"/>
		<reference ref_id="CVE-2018-16426" ref_url="https://www.suse.com/security/cve/CVE-2018-16426/" source="CVE"/>
		<reference ref_id="CVE-2018-16427" ref_url="https://www.suse.com/security/cve/CVE-2018-16427/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004830.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2018-16391: Fixed a denial of service when handling responses from a Muscle Card (bsc#1106998)
- CVE-2018-16392: Fixed a denial of service when handling responses from a TCOS Card (bsc#1106999)
- CVE-2018-16393: Fixed buffer overflows when handling responses from Gemsafe V1 Smartcards (bsc#1108318)
- CVE-2018-16418: Fixed buffer overflow when handling string concatenation in util_acl_to_str (bsc#1107039)
- CVE-2018-16419: Fixed several buffer overflows when handling responses from a Cryptoflex card (bsc#1107107)
- CVE-2018-16420: Fixed buffer overflows when handling responses from an ePass 2003 Card (bsc#1107097)
- CVE-2018-16422: Fixed single byte buffer overflow when handling responses from an esteid Card (bsc#1107038)
- CVE-2018-16423: Fixed double free when handling responses from a smartcard (bsc#1107037)
- CVE-2018-16426: Fixed endless recursion when handling responses from an IAS-ECC card (bsc#1107034)
- CVE-2018-16427: Fixed out of bounds reads when handling responses in OpenSC (bsc#1107033)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-05"/>
	<updated date="2018-11-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104812">SUSE bug 1104812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106998">SUSE bug 1106998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106999">SUSE bug 1106999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107033">SUSE bug 1107033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107034">SUSE bug 1107034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107037">SUSE bug 1107037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107038">SUSE bug 1107038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107039">SUSE bug 1107039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107097">SUSE bug 1107097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107107">SUSE bug 1107107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108318">SUSE bug 1108318</bugzilla>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16391/">CVE-2018-16391 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16391">CVE-2018-16391 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16392/">CVE-2018-16392 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16392">CVE-2018-16392 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16393/">CVE-2018-16393 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16393">CVE-2018-16393 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16418/">CVE-2018-16418 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16418">CVE-2018-16418 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16419/">CVE-2018-16419 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16419">CVE-2018-16419 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16420/">CVE-2018-16420 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16420">CVE-2018-16420 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16422/">CVE-2018-16422 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16422">CVE-2018-16422 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16423/">CVE-2018-16423 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16423">CVE-2018-16423 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16426/">CVE-2018-16426 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16426">CVE-2018-16426 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16427/">CVE-2018-16427 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16427">CVE-2018-16427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553444" comment="opensc-0.13.0-3.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149610" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1032089" ref_url="https://bugzilla.suse.com/1032089" source="BUGZILLA"/>
		<reference ref_id="1037008" ref_url="https://bugzilla.suse.com/1037008" source="BUGZILLA"/>
		<reference ref_id="1037009" ref_url="https://bugzilla.suse.com/1037009" source="BUGZILLA"/>
		<reference ref_id="1057514" ref_url="https://bugzilla.suse.com/1057514" source="BUGZILLA"/>
		<reference ref_id="1059100" ref_url="https://bugzilla.suse.com/1059100" source="BUGZILLA"/>
		<reference ref_id="1059134" ref_url="https://bugzilla.suse.com/1059134" source="BUGZILLA"/>
		<reference ref_id="1059139" ref_url="https://bugzilla.suse.com/1059139" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10209" ref_url="https://www.suse.com/security/cve/CVE-2016-10209/" source="CVE"/>
		<reference ref_id="CVE-2016-10349" ref_url="https://www.suse.com/security/cve/CVE-2016-10349/" source="CVE"/>
		<reference ref_id="CVE-2016-10350" ref_url="https://www.suse.com/security/cve/CVE-2016-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-14166" ref_url="https://www.suse.com/security/cve/CVE-2017-14166/" source="CVE"/>
		<reference ref_id="CVE-2017-14501" ref_url="https://www.suse.com/security/cve/CVE-2017-14501/" source="CVE"/>
		<reference ref_id="CVE-2017-14502" ref_url="https://www.suse.com/security/cve/CVE-2017-14502/" source="CVE"/>
		<reference ref_id="CVE-2017-14503" ref_url="https://www.suse.com/security/cve/CVE-2017-14503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004833.html" source="SUSE-SU"/>
		<description>
This update for libarchive fixes the following issues:

- CVE-2016-10209: The archive_wstring_append_from_mbs function in archive_string.c allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted archive file. (bsc#1032089)
- CVE-2016-10349: The archive_le32dec function in archive_endian.h allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. (bsc#1037008)
- CVE-2016-10350: The archive_read_format_cab_read_header function in archive_read_support_format_cab.c allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. (bsc#1037009)
- CVE-2017-14166: libarchive allowed remote attackers to cause a denial of service (xml_data heap-based buffer over-read and application crash) via a crafted xar archive, related to the mishandling of empty strings in the atol8 function in archive_read_support_format_xar.c. (bsc#1057514)
- CVE-2017-14501: An out-of-bounds read flaw existed in parse_file_info in archive_read_support_format_iso9660.c when extracting a specially crafted iso9660 iso file, related to archive_read_format_iso9660_read_header. (bsc#1059139)
- CVE-2017-14502: read_header in archive_read_support_format_rar.c suffered from an off-by-one error for UTF-16 names in RAR archives, leading to an out-of-bounds read in archive_read_format_rar_read_header. (bsc#1059134)
- CVE-2017-14503: libarchive suffered from an out-of-bounds read within lha_read_data_none() in archive_read_support_format_lha.c when extracting a specially crafted lha archive, related to lha_crc16. (bsc#1059100)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-07"/>
	<updated date="2018-11-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1032089">SUSE bug 1032089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037008">SUSE bug 1037008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037009">SUSE bug 1037009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057514">SUSE bug 1057514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059100">SUSE bug 1059100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059134">SUSE bug 1059134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059139">SUSE bug 1059139</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10209/">CVE-2016-10209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10209">CVE-2016-10209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10349/">CVE-2016-10349 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10349">CVE-2016-10349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10350/">CVE-2016-10350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10350">CVE-2016-10350 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14166/">CVE-2017-14166 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14166">CVE-2017-14166 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14501/">CVE-2017-14501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14501">CVE-2017-14501 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14502/">CVE-2017-14502 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14502">CVE-2017-14502 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14503/">CVE-2017-14503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14503">CVE-2017-14503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553445" comment="libarchive13-3.1.2-26.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149611" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1062937" ref_url="https://bugzilla.suse.com/1062937" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15232" ref_url="https://www.suse.com/security/cve/CVE-2017-15232/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003709.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

Feature update:

- Update from version 1.3.1 to version 1.5.2 (fate#324061).
  
Security issue fixed:

- CVE-2017-15232: Fix NULL pointer dereference in jdpostct.c and jquant1.c (bsc#1062937).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-06"/>
	<updated date="2018-02-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062937">SUSE bug 1062937</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15232/">CVE-2017-15232 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15232">CVE-2017-15232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550599" comment="libjpeg-turbo-1.5.3-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550600" comment="libjpeg62-62.2.0-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550601" comment="libjpeg62-32bit-62.2.0-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550602" comment="libjpeg62-turbo-1.5.3-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550603" comment="libjpeg8-8.1.2-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550604" comment="libjpeg8-32bit-8.1.2-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550605" comment="libturbojpeg0-8.1.2-31.7.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149612" version="1" class="patch">
	<metadata>
		<title>security update for spice-vdagent (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1012215" ref_url="https://bugzilla.suse.com/1012215" source="BUGZILLA"/>
		<reference ref_id="1070724" ref_url="https://bugzilla.suse.com/1070724" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15108" ref_url="https://www.suse.com/security/cve/CVE-2017-15108/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003708.html" source="SUSE-SU"/>
		<description>
This update for spice-vdagent provides the following fixes:

This security issue was fixed:

- CVE-2017-15108: Properly escape save directory that is passed to the shell to
  prevent local attacker with access to the session the agent runs from injecting
  arbitrary commands to be executed (bsc#1070724).

This non-security issue was fixed:

- Implement endian swapping, required for big-endian guests to connect to the spice client
  successfully. (bsc#1012215)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-06"/>
	<updated date="2018-02-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012215">SUSE bug 1012215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070724">SUSE bug 1070724</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15108/">CVE-2017-15108 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15108">CVE-2017-15108 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550606" comment="spice-vdagent-0.16.0-8.5.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149613" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1011920" ref_url="https://bugzilla.suse.com/1011920" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1020645" ref_url="https://bugzilla.suse.com/1020645" source="BUGZILLA"/>
		<reference ref_id="1031392" ref_url="https://bugzilla.suse.com/1031392" source="BUGZILLA"/>
		<reference ref_id="1035053" ref_url="https://bugzilla.suse.com/1035053" source="BUGZILLA"/>
		<reference ref_id="1042422" ref_url="https://bugzilla.suse.com/1042422" source="BUGZILLA"/>
		<reference ref_id="1043591" ref_url="https://bugzilla.suse.com/1043591" source="BUGZILLA"/>
		<reference ref_id="1048129" ref_url="https://bugzilla.suse.com/1048129" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1050549" ref_url="https://bugzilla.suse.com/1050549" source="BUGZILLA"/>
		<reference ref_id="1053043" ref_url="https://bugzilla.suse.com/1053043" source="BUGZILLA"/>
		<reference ref_id="1054239" ref_url="https://bugzilla.suse.com/1054239" source="BUGZILLA"/>
		<reference ref_id="1057199" ref_url="https://bugzilla.suse.com/1057199" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065726" ref_url="https://bugzilla.suse.com/1065726" source="BUGZILLA"/>
		<reference ref_id="1067906" ref_url="https://bugzilla.suse.com/1067906" source="BUGZILLA"/>
		<reference ref_id="1073579" ref_url="https://bugzilla.suse.com/1073579" source="BUGZILLA"/>
		<reference ref_id="1076393" ref_url="https://bugzilla.suse.com/1076393" source="BUGZILLA"/>
		<reference ref_id="1078788" ref_url="https://bugzilla.suse.com/1078788" source="BUGZILLA"/>
		<reference ref_id="1079524" ref_url="https://bugzilla.suse.com/1079524" source="BUGZILLA"/>
		<reference ref_id="1082519" ref_url="https://bugzilla.suse.com/1082519" source="BUGZILLA"/>
		<reference ref_id="1083215" ref_url="https://bugzilla.suse.com/1083215" source="BUGZILLA"/>
		<reference ref_id="1083527" ref_url="https://bugzilla.suse.com/1083527" source="BUGZILLA"/>
		<reference ref_id="1084760" ref_url="https://bugzilla.suse.com/1084760" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1091158" ref_url="https://bugzilla.suse.com/1091158" source="BUGZILLA"/>
		<reference ref_id="1093118" ref_url="https://bugzilla.suse.com/1093118" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1094825" ref_url="https://bugzilla.suse.com/1094825" source="BUGZILLA"/>
		<reference ref_id="1095805" ref_url="https://bugzilla.suse.com/1095805" source="BUGZILLA"/>
		<reference ref_id="1096052" ref_url="https://bugzilla.suse.com/1096052" source="BUGZILLA"/>
		<reference ref_id="1098050" ref_url="https://bugzilla.suse.com/1098050" source="BUGZILLA"/>
		<reference ref_id="1098996" ref_url="https://bugzilla.suse.com/1098996" source="BUGZILLA"/>
		<reference ref_id="1099597" ref_url="https://bugzilla.suse.com/1099597" source="BUGZILLA"/>
		<reference ref_id="1101555" ref_url="https://bugzilla.suse.com/1101555" source="BUGZILLA"/>
		<reference ref_id="1103308" ref_url="https://bugzilla.suse.com/1103308" source="BUGZILLA"/>
		<reference ref_id="1103405" ref_url="https://bugzilla.suse.com/1103405" source="BUGZILLA"/>
		<reference ref_id="1104124" ref_url="https://bugzilla.suse.com/1104124" source="BUGZILLA"/>
		<reference ref_id="1105025" ref_url="https://bugzilla.suse.com/1105025" source="BUGZILLA"/>
		<reference ref_id="1105428" ref_url="https://bugzilla.suse.com/1105428" source="BUGZILLA"/>
		<reference ref_id="1105795" ref_url="https://bugzilla.suse.com/1105795" source="BUGZILLA"/>
		<reference ref_id="1105931" ref_url="https://bugzilla.suse.com/1105931" source="BUGZILLA"/>
		<reference ref_id="1106105" ref_url="https://bugzilla.suse.com/1106105" source="BUGZILLA"/>
		<reference ref_id="1106110" ref_url="https://bugzilla.suse.com/1106110" source="BUGZILLA"/>
		<reference ref_id="1106240" ref_url="https://bugzilla.suse.com/1106240" source="BUGZILLA"/>
		<reference ref_id="1106293" ref_url="https://bugzilla.suse.com/1106293" source="BUGZILLA"/>
		<reference ref_id="1106359" ref_url="https://bugzilla.suse.com/1106359" source="BUGZILLA"/>
		<reference ref_id="1106434" ref_url="https://bugzilla.suse.com/1106434" source="BUGZILLA"/>
		<reference ref_id="1106594" ref_url="https://bugzilla.suse.com/1106594" source="BUGZILLA"/>
		<reference ref_id="1106913" ref_url="https://bugzilla.suse.com/1106913" source="BUGZILLA"/>
		<reference ref_id="1106929" ref_url="https://bugzilla.suse.com/1106929" source="BUGZILLA"/>
		<reference ref_id="1107060" ref_url="https://bugzilla.suse.com/1107060" source="BUGZILLA"/>
		<reference ref_id="1107299" ref_url="https://bugzilla.suse.com/1107299" source="BUGZILLA"/>
		<reference ref_id="1107318" ref_url="https://bugzilla.suse.com/1107318" source="BUGZILLA"/>
		<reference ref_id="1107535" ref_url="https://bugzilla.suse.com/1107535" source="BUGZILLA"/>
		<reference ref_id="1107829" ref_url="https://bugzilla.suse.com/1107829" source="BUGZILLA"/>
		<reference ref_id="1107870" ref_url="https://bugzilla.suse.com/1107870" source="BUGZILLA"/>
		<reference ref_id="1108315" ref_url="https://bugzilla.suse.com/1108315" source="BUGZILLA"/>
		<reference ref_id="1108377" ref_url="https://bugzilla.suse.com/1108377" source="BUGZILLA"/>
		<reference ref_id="1108498" ref_url="https://bugzilla.suse.com/1108498" source="BUGZILLA"/>
		<reference ref_id="1109158" ref_url="https://bugzilla.suse.com/1109158" source="BUGZILLA"/>
		<reference ref_id="1109333" ref_url="https://bugzilla.suse.com/1109333" source="BUGZILLA"/>
		<reference ref_id="1109772" ref_url="https://bugzilla.suse.com/1109772" source="BUGZILLA"/>
		<reference ref_id="1109784" ref_url="https://bugzilla.suse.com/1109784" source="BUGZILLA"/>
		<reference ref_id="1109806" ref_url="https://bugzilla.suse.com/1109806" source="BUGZILLA"/>
		<reference ref_id="1109818" ref_url="https://bugzilla.suse.com/1109818" source="BUGZILLA"/>
		<reference ref_id="1109907" ref_url="https://bugzilla.suse.com/1109907" source="BUGZILLA"/>
		<reference ref_id="1109919" ref_url="https://bugzilla.suse.com/1109919" source="BUGZILLA"/>
		<reference ref_id="1109923" ref_url="https://bugzilla.suse.com/1109923" source="BUGZILLA"/>
		<reference ref_id="1110006" ref_url="https://bugzilla.suse.com/1110006" source="BUGZILLA"/>
		<reference ref_id="1110363" ref_url="https://bugzilla.suse.com/1110363" source="BUGZILLA"/>
		<reference ref_id="1110468" ref_url="https://bugzilla.suse.com/1110468" source="BUGZILLA"/>
		<reference ref_id="1110600" ref_url="https://bugzilla.suse.com/1110600" source="BUGZILLA"/>
		<reference ref_id="1110601" ref_url="https://bugzilla.suse.com/1110601" source="BUGZILLA"/>
		<reference ref_id="1110602" ref_url="https://bugzilla.suse.com/1110602" source="BUGZILLA"/>
		<reference ref_id="1110603" ref_url="https://bugzilla.suse.com/1110603" source="BUGZILLA"/>
		<reference ref_id="1110604" ref_url="https://bugzilla.suse.com/1110604" source="BUGZILLA"/>
		<reference ref_id="1110605" ref_url="https://bugzilla.suse.com/1110605" source="BUGZILLA"/>
		<reference ref_id="1110606" ref_url="https://bugzilla.suse.com/1110606" source="BUGZILLA"/>
		<reference ref_id="1110611" ref_url="https://bugzilla.suse.com/1110611" source="BUGZILLA"/>
		<reference ref_id="1110612" ref_url="https://bugzilla.suse.com/1110612" source="BUGZILLA"/>
		<reference ref_id="1110613" ref_url="https://bugzilla.suse.com/1110613" source="BUGZILLA"/>
		<reference ref_id="1110614" ref_url="https://bugzilla.suse.com/1110614" source="BUGZILLA"/>
		<reference ref_id="1110615" ref_url="https://bugzilla.suse.com/1110615" source="BUGZILLA"/>
		<reference ref_id="1110616" ref_url="https://bugzilla.suse.com/1110616" source="BUGZILLA"/>
		<reference ref_id="1110618" ref_url="https://bugzilla.suse.com/1110618" source="BUGZILLA"/>
		<reference ref_id="1110619" ref_url="https://bugzilla.suse.com/1110619" source="BUGZILLA"/>
		<reference ref_id="1111363" ref_url="https://bugzilla.suse.com/1111363" source="BUGZILLA"/>
		<reference ref_id="1111516" ref_url="https://bugzilla.suse.com/1111516" source="BUGZILLA"/>
		<reference ref_id="1111870" ref_url="https://bugzilla.suse.com/1111870" source="BUGZILLA"/>
		<reference ref_id="1112007" ref_url="https://bugzilla.suse.com/1112007" source="BUGZILLA"/>
		<reference ref_id="1112262" ref_url="https://bugzilla.suse.com/1112262" source="BUGZILLA"/>
		<reference ref_id="1112263" ref_url="https://bugzilla.suse.com/1112263" source="BUGZILLA"/>
		<reference ref_id="1112894" ref_url="https://bugzilla.suse.com/1112894" source="BUGZILLA"/>
		<reference ref_id="1112902" ref_url="https://bugzilla.suse.com/1112902" source="BUGZILLA"/>
		<reference ref_id="1112903" ref_url="https://bugzilla.suse.com/1112903" source="BUGZILLA"/>
		<reference ref_id="1112905" ref_url="https://bugzilla.suse.com/1112905" source="BUGZILLA"/>
		<reference ref_id="1113667" ref_url="https://bugzilla.suse.com/1113667" source="BUGZILLA"/>
		<reference ref_id="1113751" ref_url="https://bugzilla.suse.com/1113751" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="1114178" ref_url="https://bugzilla.suse.com/1114178" source="BUGZILLA"/>
		<reference ref_id="1114229" ref_url="https://bugzilla.suse.com/1114229" source="BUGZILLA"/>
		<reference ref_id="1114648" ref_url="https://bugzilla.suse.com/1114648" source="BUGZILLA"/>
		<reference ref_id="981083" ref_url="https://bugzilla.suse.com/981083" source="BUGZILLA"/>
		<reference ref_id="997172" ref_url="https://bugzilla.suse.com/997172" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281/" source="CVE"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-18690" ref_url="https://www.suse.com/security/cve/CVE-2018-18690/" source="CVE"/>
		<reference ref_id="CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710/" source="CVE"/>
		<reference ref_id="CVE-2018-9516" ref_url="https://www.suse.com/security/cve/CVE-2018-9516/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004844.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.162 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bnc#1107829).
- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).
- CVE-2018-18710: An issue was discovered in the Linux kernel An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-9516: A lack of certain checks in the hid_debug_events_read() function in the drivers/hid/hid-debug.c file might have resulted in receiving userspace buffer overflow and an out-of-bounds write or to the infinite loop. (bnc#1108498).

The following non-security bugs were fixed:

- 6lowpan: iphc: reset mac_header after decompress to fix panic (bnc#1012382).
- alsa: bebob: use address returned by kmalloc() instead of kernel stack for streaming DMA mapping (bnc#1012382).
- alsa: emu10k1: fix possible info leak to userspace on SNDRV_EMU10K1_IOCTL_INFO (bnc#1012382).
- alsa: hda: Add AZX_DCAPS_PM_RUNTIME for AMD Raven Ridge (bnc#1012382).
- alsa: hda - Fix cancel_work_sync() stall from jackpoll work (bnc#1012382).
- alsa: hda/realtek - Cannot adjust speaker's volume on Dell XPS 27 7760 (bnc#1012382).
- alsa: msnd: Fix the default sample sizes (bnc#1012382).
- alsa: pcm: Fix snd_interval_refine first/last with open min/max (bnc#1012382).
- alsa: usb-audio: Fix multiple definitions in AU0828_DEVICE() macro (bnc#1012382).
- apparmor: remove no-op permission check in policy_unpack (git-fixes).
- arc: build: Get rid of toolchain check (bnc#1012382).
- arc: clone syscall to setp r25 as thread pointer (bnc#1012382).
- arch/hexagon: fix kernel/dma.c build warning (bnc#1012382).
- arc: [plat-axs*]: Enable SWAP (bnc#1012382).
- arm64: bpf: jit JMP_JSET_{X,K} (bsc#1110613).
- arm64: Correct type for PUD macros (bsc#1110600).
- arm64: cpufeature: Track 32bit EL0 support (bnc#1012382).
- arm64: dts: qcom: db410c: Fix Bluetooth LED trigger (bnc#1012382).
- arm64: fix erroneous __raw_read_system_reg() cases (bsc#1110606).
- arm64: Fix potential race with hardware DBM in ptep_set_access_flags() (bsc#1110605).
- arm64: fpsimd: Avoid FPSIMD context leakage for the init task (bsc#1110603).
- arm64: jump_label.h: use asm_volatile_goto macro instead of 'asm goto' (bnc#1012382).
- arm64: kasan: avoid bad virt_to_pfn() (bsc#1110612).
- arm64: kasan: avoid pfn_to_nid() before page array is initialized (bsc#1110619).
- arm64/kasan: do not allocate extra shadow memory (bsc#1110611).
- arm64: kernel: Update kerneldoc for cpu_suspend() rename (bsc#1110602).
- arm64: kgdb: handle read-only text / modules (bsc#1110604).
- arm64: kvm: Sanitize PSTATE.M when being set from userspace (bnc#1012382).
- arm64: kvm: Tighten guest core register access from userspace (bnc#1012382).
- arm64/mm/kasan: do not use vmemmap_populate() to initialize shadow (bsc#1110618).
- arm64: ptrace: Avoid setting compat FP[SC]R to garbage if get_user fails (bsc#1110601).
- arm64: supported.conf: mark armmmci as not supported
- arm64 Update config files. (bsc#1110468) Set MMC_QCOM_DML to build-in and delete driver from supported.conf
- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1110614).
- arm: dts: at91: add new compatibility string for macb on sama5d3 (bnc#1012382).
- arm: dts: dra7: fix DCAN node addresses (bnc#1012382).
- arm: exynos: Clear global variable on init error path (bnc#1012382).
- arm: hisi: check of_iomap and fix missing of_node_put (bnc#1012382).
- arm: hisi: fix error handling and missing of_node_put (bnc#1012382).
- arm: hisi: handle of_iomap and fix missing of_node_put (bnc#1012382).
- arm: mvebu: declare asm symbols as character arrays in pmsu.c (bnc#1012382).
- ASoC: cs4265: fix MMTLR Data switch control (bnc#1012382).
- ASoC: dapm: Fix potential DAI widget pointer deref when linking DAIs (bnc#1012382).
- ASoC: sigmadsp: safeload should not have lower byte limit (bnc#1012382).
- ASoC: wm8804: Add ACPI support (bnc#1012382).
- ata: libahci: Correct setting of DEVSLP register (bnc#1012382).
- ath10k: disable bundle mgmt tx completion event support (bnc#1012382).
- ath10k: fix scan crash due to incorrect length calculation (bnc#1012382).
- ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bnc#1012382).
- ath10k: prevent active scans on potential unusable channels (bnc#1012382).
- ath10k: protect ath10k_htt_rx_ring_free with rx_ring.lock (bnc#1012382).
- audit: fix use-after-free in audit_add_watch (bnc#1012382).
- autofs: fix autofs_sbi() does not check super block type (bnc#1012382).
- binfmt_elf: Respect error return from `regset-&gt;active' (bnc#1012382).
- bluetooth: Add a new Realtek 8723DE ID 0bda:b009 (bnc#1012382).
- bluetooth: h5: Fix missing dependency on BT_HCIUART_SERDEV (bnc#1012382).
- bluetooth: hidp: Fix handling of strncpy for hid-&gt;name information (bnc#1012382).
- bnxt_en: Fix TX timeout during netpoll (bnc#1012382).
- bonding: avoid possible dead-lock (bnc#1012382).
- bpf: fix cb access in socket filter programs on tail calls (bsc#1012382).
- bpf: fix map not being uncharged during map creation failure (bsc#1012382).
- bpf, s390: fix potential memleak when later bpf_jit_prog fails (git-fixes).
- bpf, s390x: do not reload skb pointers in non-skb context (git-fixes).
- bsc#1106913: Replace with upstream variants
- btrfs: add a comp_refs() helper (dependency for bsc#1031392).
- btrfs: add missing initialization in btrfs_check_shared (Git-fixes bsc#1112262).
- btrfs: add tracepoints for outstanding extents mods (dependency for bsc#1031392).
- btrfs: add wrapper for counting BTRFS_MAX_EXTENT_SIZE (dependency for bsc#1031392).
- btrfs: cleanup extent locking sequence (dependency for bsc#1031392).
- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (Follow up fixes for bsc#1031392).
- btrfs: delayed-inode: Remove wrong qgroup meta reservation calls (bsc#1031392).
- btrfs: delayed-inode: Use new qgroup meta rsv for delayed inode and item (bsc#1031392).
- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).
- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).
- btrfs: fix error handling in btrfs_dev_replace_start (bsc#1107535).
- btrfs: fix invalid attempt to free reserved space on failure to cow range (dependency for bsc#1031392).
- btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).
- btrfs: Fix race condition between delayed refs and blockgroup removal (Git-fixes bsc#1112263).
- btrfs: Fix wrong btrfs_delalloc_release_extents parameter (bsc#1031392).
- btrfs: kill trans in run_delalloc_nocow and btrfs_cross_ref_exist (dependency for bsc#1031392).
- btrfs: make the delalloc block rsv per inode (dependency for bsc#1031392).
- btrfs: pass delayed_refs directly to btrfs_find_delayed_ref_head (dependency for bsc#1031392).
- btrfs: qgroup: Add quick exit for non-fs extents (dependency for bsc#1031392).
- btrfs: qgroup: Cleanup btrfs_qgroup_prepare_account_extents function (dependency for bsc#1031392).
- btrfs: qgroup: Cleanup the remaining old reservation counters (bsc#1031392).
- btrfs: qgroup: Commit transaction in advance to reduce early EDQUOT (bsc#1031392).
- btrfs: qgroup: Do not use root-&gt;qgroup_meta_rsv for qgroup (bsc#1031392).
- btrfs: qgroup: Fix wrong qgroup reservation update for relationship modification (bsc#1031392).
- btrfs: qgroup: Introduce function to convert META_PREALLOC into META_PERTRANS (bsc#1031392).
- btrfs: qgroup: Introduce helpers to update and access new qgroup rsv (bsc#1031392).
- btrfs: qgroup: Make qgroup_reserve and its callers to use separate reservation type (bsc#1031392).
- btrfs: qgroup: Skeleton to support separate qgroup reservation type (bsc#1031392).
- btrfs: qgroups: opencode qgroup_free helper (dependency for bsc#1031392).
- btrfs: qgroup: Split meta rsv type into meta_prealloc and meta_pertrans (bsc#1031392).
- btrfs: qgroup: Update trace events for metadata reservation (bsc#1031392).
- btrfs: qgroup: Update trace events to use new separate rsv types (bsc#1031392).
- btrfs: qgroup: Use independent and accurate per inode qgroup rsv (bsc#1031392).
- btrfs: qgroup: Use root::qgroup_meta_rsv_* to record qgroup meta reserved space (bsc#1031392).
- btrfs: qgroup: Use separate meta reservation type for delalloc (bsc#1031392).
- btrfs: remove type argument from comp_tree_refs (dependency for bsc#1031392).
- btrfs: rework outstanding_extents (dependency for bsc#1031392).
- btrfs: switch args for comp_*_refs (dependency for bsc#1031392).
- btrfs: Take trans lock before access running trans in check_delayed_ref (Follow up fixes for bsc#1031392).
- ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1112007).
- cfg80211: fix a type issue in ieee80211_chandef_to_operating_class() (bnc#1012382).
- cfg80211: nl80211_update_ft_ies() to validate NL80211_ATTR_IE (bnc#1012382).
- cfq: Give a chance for arming slice idle timer in case of group_idle (bnc#1012382).
- cgroup: Fix deadlock in cpu hotplug path (bnc#1012382).
- cgroup, netclassid: add a preemption point to write_classid (bnc#1098996).
- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).
- cifs: connect to servername instead of IP for IPC$ share (bsc#1106359).
- cifs: fix memory leak in SMB2_open() (bsc#1112894).
- cifs: Fix use after free of a mid_q_entry (bsc#1112903).
- cifs: fix wrapping bugs in num_entries() (bnc#1012382).
- cifs: integer overflow in in SMB2_ioctl() (bsc#1012382).
- cifs: prevent integer overflow in nxt_dir_entry() (bnc#1012382).
- cifs: read overflow in is_valid_oplock_break() (bnc#1012382).
- clk: imx6ul: fix missing of_node_put() (bnc#1012382).
- clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bnc#1012382).
- config.sh: set BUGZILLA_PRODUCT for SLE12-SP3
- coresight: Handle errors in finding input/output ports (bnc#1012382).
- coresight: tpiu: Fix disabling timeouts (bnc#1012382).
- cpu/hotplug: Fix SMT supported evaluation (bsc#1089343).
- crypto: mxs-dcp - Fix wait logic on chan threads (bnc#1012382).
- crypto: sharah - Unregister correct algorithms for SAHARA 3 (bnc#1012382).
- crypto: skcipher - Fix -Wstringop-truncation warnings (bnc#1012382).
- Define dependencies of in-kernel KMPs statically This allows us to use rpm's internal dependency generator (bsc#981083).
- Define early_radix_enabled() (bsc#1094244).
- dmaengine: pl330: fix irq race with terminate_all (bnc#1012382).
- dm cache: fix resize crash if user does not reload cache table (bnc#1012382).
- dm thin metadata: fix __udivdi3 undefined on 32-bit (bnc#1012382).
- dm thin metadata: try to avoid ever aborting transactions (bnc#1012382).
- Do not ship firmware (bsc#1054239). Pull firmware from kernel-firmware instead.
- drivers: net: cpsw: fix parsing of phy-handle DT property in dual_emac config (bnc#1012382).
- drivers: net: cpsw: fix segfault in case of bad phy-handle (bnc#1012382).
- drivers/tty: add error handling for pcmcia_loop_config (bnc#1012382).
- drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bnc#1012382).
- drm/amdkfd: Fix error codes in kfd_get_process (bnc#1012382).
- drm/nouveau/drm/nouveau: Use pm_runtime_get_noresume() in connector_detect() (bnc#1012382).
- drm/nouveau/TBDdevinit: do not fail when PMU/PRE_OS is missing from VBIOS (bnc#1012382).
- drm/nouveau: tegra: Detach from ARM DMA/IOMMU mapping (bnc#1012382).
- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1106929)
- Drop dtb-source.spec and move the sources to kernel-source (bsc#1011920)
- e1000: check on netif_running() before calling e1000_up() (bnc#1012382).
- e1000: ensure to free old tx/rx rings in set_ringparam() (bnc#1012382).
- ebtables: arpreply: Add the standard target sanity check (bnc#1012382).
- edac, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114648).
- ethernet: ti: davinci_emac: add missing of_node_put after calling of_parse_phandle (bnc#1012382).
- ethtool: Remove trailing semicolon for static inline (bnc#1012382).
- ethtool: restore erroneously removed break in dev_ethtool (bsc#1114229).
- ext4: avoid divide by zero fault when deleting corrupted inline directories (bnc#1012382).
- ext4: do not mark mmp buffer head dirty (bnc#1012382).
- ext4: fix online resize's handling of a too-small final block group (bnc#1012382).
- ext4: fix online resizing for bigalloc file systems with a 1k block size (bnc#1012382).
- ext4: recalucate superblock checksum after updating free blocks/inodes (bnc#1012382).
- f2fs: do not set free of current section (bnc#1012382).
- f2fs: fix to do sanity check with {sit,nat}_ver_bitmap_bytesize (bnc#1012382).
- fbdev: Distinguish between interlaced and progressive modes (bnc#1012382).
- fbdev: fix broken menu dependencies (bsc#1106929)
- fbdev/omapfb: fix omapfb_memory_read infoleak (bnc#1012382).
- fbdev/via: fix defined but not used warning (bnc#1012382).
- floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (bnc#1012382).
- fs/cifs: do not translate SFM_SLASH (U+F026) to backslash (bnc#1012382).
- fs/cifs: suppress a string overflow warning (bnc#1012382).
- fs/eventpoll: loosen irq-safety when possible (bsc#1096052).
- gfs2: Special-case rindex for gfs2_grow (bnc#1012382).
- gpio: adp5588: Fix sleep-in-atomic-context bug (bnc#1012382).
- gpiolib: Mark gpio_suffixes array with __maybe_unused (bnc#1012382).
- gpio: ml-ioh: Fix buffer underwrite on probe error path (bnc#1012382).
- gpio: tegra: Move driver registration to subsys_init level (bnc#1012382).
- gso_segment: Reset skb-&gt;mac_len after modifying network header (bnc#1012382).
- hexagon: modify ffs() and fls() to return int (bnc#1012382).
- hid: hid-ntrig: add error handling for sysfs_create_group (bnc#1012382).
- hid: sony: Support DS4 dongle (bnc#1012382).
- hid: sony: Update device ids (bnc#1012382).
- hv: avoid crash in vmbus sysfs files (bnc#1108377).
- hwmon: (adt7475) Make adt7475_read_word() return errors (bnc#1012382).
- hwmon: (ina2xx) fix sysfs shunt resistor read access (bnc#1012382).
- i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bnc#1012382).
- i2c: i801: Allow ACPI AML access I/O ports not reserved for SMBus (bnc#1012382).
- i2c: i801: fix DNV's SMBCTRL register offset (bnc#1012382).
- i2c: uniphier-f: issue STOP only for last message or I2C_M_STOP (bnc#1012382).
- i2c: uniphier: issue STOP only for last message or I2C_M_STOP (bnc#1012382).
- i2c: xiic: Make the start and the byte count write atomic (bnc#1012382).
- i2c: xlp9xx: Add support for SMBAlert (bsc#1103308).
- i2c: xlp9xx: Fix case where SSIF read transaction completes early (bsc#1103308).
- i2c: xlp9xx: Fix issue seen when updating receive length (bsc#1103308).
- i2c: xlp9xx: Make sure the transfer size is not more than I2C_SMBUS_BLOCK_SIZE (bsc#1103308).
- ib/ipoib: Avoid a race condition between start_xmit and cm_rep_handler (bnc#1012382).
- ib/srp: Avoid that sg_reset -d ${srp_device} triggers an infinite loop (bnc#1012382).
- input: atakbd - fix Atari CapsLock behaviour (bnc#1012382).
- input: atakbd - fix Atari keymap (bnc#1012382).
- input: atmel_mxt_ts - only use first T9 instance (bnc#1012382).
- input: elantech - enable middle button of touchpad on ThinkPad P72 (bnc#1012382).
- iommu/amd: Return devid as alias for ACPI HID devices (bsc#1106105).
- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bnc#1012382).
- iommu/ipmmu-vmsa: Fix allocation in atomic context (bnc#1012382).
- ip6_tunnel: be careful when accessing the inner header (bnc#1012382).
- ipmi:ssif: Add support for multi-part transmit messages &gt; 2 parts (bsc#1103308).
- ip_tunnel: be careful when accessing the inner header (bnc#1012382).
- ipv4: fix use-after-free in ip_cmsg_recv_dstaddr() (bnc#1012382).
- ipv6: fix possible use-after-free in ip6_xmit() (bnc#1012382).
- iw_cxgb4: only allow 1 flush on user qps (bnc#1012382).
- ixgbe: pci_set_drvdata must be called before register_netdev (Git-fixes bsc#1109923).
- jffs2: return -ERANGE when xattr buffer is too small (bnc#1012382).
- KABI: move the new handler to end of machdep_calls and hide it from genksyms (bsc#1094244).
- kABI: protect struct hnae_desc_cb (kabi).
- kbuild: add .DELETE_ON_ERROR special target (bnc#1012382).
- kernel-obs-build.spec.in: add --no-hostonly-cmdline to dracut invocation (boo#1062303). call dracut with --no-hostonly-cmdline to avoid the random rootfs UUID being added into the initrd's /etc/cmdline.d/95root-dev.conf
- kernel-obs-build: use pae and lpae kernels where available (bsc#1073579).
- kernel/params.c: downgrade warning for unsafe parameters (bsc#1050549).
- kprobes/x86: Release insn_slot in failure path (bsc#1110006).
- kthread: fix boot hang (regression) on MIPS/OpenRISC (bnc#1012382).
- kthread: Fix use-after-free if kthread fork fails (bnc#1012382).
- kvm: nVMX: Do not expose MPX VMX controls when guest MPX disabled (bsc#1106240).
- kvm: nVMX: Do not flush TLB when vmcs12 uses VPID (bsc#1106240).
- kvm: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bnc#1012382).
- kvm: x86: Do not re-{try,execute} after failed emulation in L2 (bsc#1106240).
- kvm: x86: Do not use kvm_x86_ops-&gt;mpx_supported() directly (bsc#1106240).
- kvm: x86: fix APIC page invalidation (bsc#1106240).
- kvm: x86: remove eager_fpu field of struct kvm_vcpu_arch (bnc#1012382).
- kvm/x86: remove WARN_ON() for when vm_munmap() fails (bsc#1106240).
- kvm: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabled (bsc#1106240).
- lib/test_hexdump.c: fix failure on big endian cpu (bsc#1106110).
- locking/osq_lock: Fix osq_lock queue corruption (bnc#1012382).
- locking/rwsem-xadd: Fix missed wakeup due to reordering of load (bnc#1012382).
- lpfc: fixup crash in lpfc_els_unsol_buffer() (bsc#1107318).
- mac80211: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).
- mac80211: fix a race between restart and CSA flows (bnc#1012382).
- mac80211: fix setting IEEE80211_KEY_FLAG_RX_MGMT for AP mode keys (bnc#1012382).
- mac80211: Fix station bandwidth setting after channel switch (bnc#1012382).
- mac80211_hwsim: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).
- mac80211: mesh: fix HWMP sequence numbering to follow standard (bnc#1012382).
- mac80211: restrict delayed tailroom needed decrement (bnc#1012382).
- mac80211: shorten the IBSS debug messages (bnc#1012382).
- mach64: detect the dot clock divider correctly on sparc (bnc#1012382).
- macintosh/via-pmu: Add missing mmio accessors (bnc#1012382).
- macros.kernel-source: define linux_arch for KMPs (boo#1098050). CONFIG_64BIT is no longer defined so KMP spec files need to include %{?linux_make_arch} in any make call to build modules or descent into the kernel directory for any reason.
- macros.kernel-source: pass -b properly in kernel module package (bsc#1107870).
- macros.kernel-source: pass -f properly in module subpackage (boo#1076393).
- md-cluster: clear another node's suspend_area after the copy is finished (bnc#1012382).
- md/raid1: exit sync request if MD_RECOVERY_INTR is set (git-fixes).
- md/raid5: fix data corruption of replacements after originals dropped (bnc#1012382).
- media: af9035: prevent buffer overflow on write (bnc#1012382).
- media: exynos4-is: Prevent NULL pointer dereference in __isp_video_try_fmt() (bnc#1012382).
- media: fsl-viu: fix error handling in viu_of_probe() (bnc#1012382).
- media: omap3isp: zero-initialize the isp cam_xclk{a,b} initial data (bnc#1012382).
- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).
- media: s3c-camif: ignore -ENOIOCTLCMD from v4l2_subdev_call for s_power (bnc#1012382).
- media: soc_camera: ov772x: correct setting of banding filter (bnc#1012382).
- media: tm6000: add error handling for dvb_register_adapter (bnc#1012382).
- media: uvcvideo: Support realtek's UVC 1.5 device (bnc#1012382).
- media: v4l: event: Prevent freeing event subscriptions while accessed (bnc#1012382).
- media: videobuf2-core: check for q-&gt;error in vb2_core_qbuf() (bnc#1012382).
- media: videobuf-dma-sg: Fix dma_{sync,unmap}_sg() calls (bsc#1050431).
- mei: bus: type promotion bug in mei_nfc_if_version() (bnc#1012382).
- memory_hotplug: cond_resched in __remove_pages (bnc#1114178).
- mfd: omap-usb-host: Fix dts probe of children (bnc#1012382).
- mfd: ti_am335x_tscadc: Fix struct clk memory leak (bnc#1012382).
- misc: hmc6352: fix potential Spectre v1 (bnc#1012382).
- misc: mic: SCIF Fix scif_get_new_port() error handling (bnc#1012382).
- misc: ti-st: Fix memory leak in the error path of probe() (bnc#1012382).
- mmc: mmci: stop building qcom dml as module (bsc#1110468).
- mm: fix devmem_is_allowed() for sub-page System RAM intersections (bsc#1110006).
- mm: get rid of vmacache_flush_all() entirely (bnc#1012382).
- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (bnc#1012382).
- mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).
- mm: shmem.c: Correctly annotate new inodes for lockdep (bnc#1012382).
- mm/vmstat.c: fix outdated vmstat_text (bnc#1012382).
- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (bnc#1012382).
- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (git fixes).
- module: exclude SHN_UNDEF symbols from kallsyms api (bnc#1012382).
- mtdchar: fix overflows in adjustment of `count` (bnc#1012382).
- mtd/maps: fix solutionengine.c printk format warnings (bnc#1012382).
- neighbour: confirm neigh entries when ARP packet is received (bnc#1012382).
- net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT (bnc#1012382).
- net: cadence: Fix a sleep-in-atomic-context bug in macb_halt_tx() (bnc#1012382).
- net: dcb: For wild-card lookups, use priority -1, not 0 (bnc#1012382).
- net: ethernet: mvneta: Fix napi structure mixup on armada 3700 (bsc#1110616).
- net: ethernet: ti: cpsw: fix mdio device reference leak (bnc#1012382).
- netfilter: x_tables: avoid stack-out-of-bounds read in xt_copy_counters_from_user (bnc#1012382).
- net: hns: fix length and page_offset overflow when CONFIG_ARM64_64K_PAGES (bnc#1012382).
- net: hp100: fix always-true check for link up state (bnc#1012382).
- net: ipv4: update fnhe_pmtu when first hop's MTU changes (bnc#1012382).
- net/ipv6: Display all addresses in output of /proc/net/if_inet6 (bnc#1012382).
- netlabel: check for IPV4MASK in addrinfo_get (bnc#1012382).
- net: macb: disable scatter-gather for macb on sama5d3 (bnc#1012382).
- net/mlx4: Use cpumask_available for eq-&gt;affinity_mask (bnc#1012382).
- net: mvneta: fix mtu change on port without link (bnc#1012382).
- net: mvneta: fix mvneta_config_rss on armada 3700 (bsc#1110615).
- net: mvpp2: Extract the correct ethtype from the skb for tx csum offload (bnc#1012382).
- net: systemport: Fix wake-up interrupt race during resume (bnc#1012382).
- net/usb: cancel pending work when unbinding smsc75xx (bnc#1012382).
- nfc: Fix possible memory corruption when handling SHDLC I-Frame commands (bnc#1012382).
- nfc: Fix the number of pipes (bnc#1012382).
- nfs: add nostatflush mount option (bsc#1065726).
- nfs: Avoid quadratic search when freeing delegations (bsc#1084760).
- nfsd: fix corrupted reply to badly ordered compound (bnc#1012382).
- nfs: Use an appropriate work queue for direct-write completion (bsc#1082519).
- nfsv4.0 fix client reference leak in callback (bnc#1012382).
- ocfs2: fix locking for res-&gt;tracking and dlm-&gt;tracking_list (bnc#1012382).
- ocfs2: fix ocfs2 read block panic (bnc#1012382).
- of: unittest: Disable interrupt node tests for old world MAC systems (bnc#1012382).
- ovl: Copy inode attributes after setting xattr (bsc#1107299).
- parport: sunbpp: fix error return code (bnc#1012382).
- partitions/aix: append null character to print data from disk (bnc#1012382).
- partitions/aix: fix usage of uninitialized lv_info and lvname structures (bnc#1012382).
- Pass x86 as architecture on x86_64 and i386 (bsc#1093118).
- pci: altera: Fix bool initialization in tlp_read_packet() (bsc#1109806).
- pci: designware: Fix I/O space page leak (bsc#1109806).
- pci: designware: Fix pci_remap_iospace() failure path (bsc#1109806).
- pci: hv: Use effective affinity mask (bsc#1109772).
- pci: OF: Fix I/O space page leak (bsc#1109806).
- pci: pciehp: Fix unprotected list iteration in IRQ handler (bsc#1109806).
- pci: Reprogram bridge prefetch registers on resume (bnc#1012382).
- pci: shpchp: Fix AMD POGO identification (bsc#1109806).
- pci: Supply CPU physical address (not bus address) to iomem_is_exclusive() (bsc#1109806).
- pci: versatile: Fix I/O space page leak (bsc#1109806).
- pci: versatile: Fix pci_remap_iospace() failure path (bsc#1109806).
- pci: xgene: Fix I/O space page leak (bsc#1109806).
- pci: xilinx: Add missing of_node_put() (bsc#1109806).
- perf powerpc: Fix callchain ip filtering (bnc#1012382).
- perf powerpc: Fix callchain ip filtering when return address is in a register (bnc#1012382).
- perf probe powerpc: Ignore SyS symbols irrespective of endianness (bnc#1012382).
- perf script python: Fix export-to-postgresql.py occasional failure (bnc#1012382).
- perf tools: Allow overriding MAX_NR_CPUS at compile time (bnc#1012382).
- phy: qcom-ufs: add MODULE_LICENSE tag (bsc#1110468).
- pinctrl: qcom: spmi-gpio: Fix pmic_gpio_config_get() to be compliant (bnc#1012382).
- pipe: actually allow root to exceed the pipe buffer limit (git-fixes).
- platform/x86: alienware-wmi: Correct a memory leak (bnc#1012382).
- platform/x86: toshiba_acpi: Fix defined but not used build warnings (bnc#1012382).
- pm / core: Clear the direct_complete flag on errors (bnc#1012382).
- powerpc/64s: move machine check SLB flushing to mm/slb.c (bsc#1094244).
- powerpc/kdump: Handle crashkernel memory reservation failure (bnc#1012382).
- powerpc/mce: Fix SLB rebolting during MCE recovery path (bsc#1094244).
- powerpc/numa: Skip onlining a offline node in kdump path (bsc#1109784).
- powerpc/numa: Use associativity if VPHN hcall is successful (bsc#1110363).
- powerpc/perf/hv-24x7: Fix passing of catalog version number (bsc#1053043).
- powerpc/powernv: opal_put_chars partial write fix (bnc#1012382).
- powerpc/pseries: Defer the logging of rtas error to irq work queue (bsc#1094244).
- powerpc/pseries: Define MCE error event section (bsc#1094244).
- powerpc/pseries: Display machine check error details (bsc#1094244).
- powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).
- powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).
- powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries/mm: call H_BLOCK_REMOVE (bsc#1109158).
- powerpc/pseries/mm: factorize PTE slot computation (bsc#1109158).
- powerpc/pseries/mm: Introducing FW_FEATURE_BLOCK_REMOVE (bsc#1109158).
- powerpc/rtas: Fix a potential race between CPU-Offline &amp; Migration (bsc#1111870).
- powerpc/tm: Avoid possible userspace r1 corruption on reclaim (bsc#1109333).
- power: vexpress: fix corruption in notifier registration (bnc#1012382).
- printk: do not spin in printk when in nmi (bsc#1094244).
- proc: restrict kernel stack dumps to root (bnc#1012382).
- pstore: Fix incorrect persistent ram buffer mapping (bnc#1012382).
- qlcnic: fix Tx descriptor corruption on 82xx devices (bnc#1012382).
- r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bnc#1012382).
- raid10 BUG_ON in raise_barrier when force is true and conf-&gt;barrier is 0 (bnc#1012382).
- rculist: add list_for_each_entry_from_rcu() (bsc#1084760).
- rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).
- rdma/cma: Do not ignore net namespace for unbound cm_id (bnc#1012382).
- rdma/cma: Protect cma dev list with lock (bnc#1012382).
- rdma/ucma: check fd type in ucma_migrate_id() (bnc#1012382).
- reiserfs: add check to detect corrupted directory entry (bsc#1109818).
- reiserfs: do not panic on bad directory entries (bsc#1109818).
- resource: Include resource end in walk_*() interfaces (bsc#1114648).
- Revert 'btrfs: qgroups: Retry after commit on getting EDQUOT' (bsc#1031392).
- Revert 'dma-buf/sync-file: Avoid enable fence signaling if poll(.timeout=0)' (bsc#1111363).
- Revert 'drm: Do not pass negative delta to ktime_sub_ns()' (bsc#1106929)
- Revert 'drm/i915: Initialize HWS page address after GPU reset' (bsc#1106929)
- Revert 'Drop kernel trampoline stack.' This reverts commit 85dead31706c1c1755adff90405ff9861c39c704.
- Revert 'kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)' This reverts commit edde1f21880e3bfe244c6f98a3733b05b13533dc.
- Revert 'kvm: x86: remove eager_fpu field of struct kvm_vcpu_arch' (kabi).
- Revert 'media: v4l: event: Prevent freeing event subscriptions while accessed' (kabi).
- Revert 'mm: get rid of vmacache_flush_all() entirely' (kabi).
- Revert 'NFC: Fix the number of pipes' (kabi).
- Revert 'proc: restrict kernel stack dumps to root' (kabi).
- Revert 'Skip intel_crt_init for Dell XPS 8700' (bsc#1106929)
- Revert 'tcp: add tcp_ooo_try_coalesce() helper' (kabi).
- Revert 'tcp: call tcp_drop() from tcp_data_queue_ofo()' (kabi).
- Revert 'tcp: fix a stale ooo_last_skb after a replace' (kabi).
- Revert 'tcp: free batches of packets in tcp_prune_ofo_queue()' (kabi).
- Revert 'tcp: use an RB tree for ooo receive queue' (kabi).
- Revert 'usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt()' (bnc#1012382).
- Revert 'x86/fpu: Finish excising 'eagerfpu'' (kabi).
- Revert 'x86/fpu: Remove struct fpu::counter' (kabi).
- Revert 'x86/fpu: Remove use_eager_fpu()' (kabi).
- ring-buffer: Allow for rescheduling when removing pages (bnc#1012382).
- rndis_wlan: potential buffer overflow in rndis_wlan_auth_indication() (bnc#1012382).
- rpm/kernel-binary.spec.in: Check module licenses (bsc#1083215,bsc#1083527)
- rpm/kernel-binary.spec.in: Do not sign modules if CONFIG_MODULE_SIG=n (bsc#1035053)
- rpm/kernel-binary.spec.in: Obsolete ftsteutates KMP (boo#997172)
- rpm/kernel-binary.spec.in: Only kernel-syzkaller needs gcc-devel (boo#1043591).
- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)
- rpm/kernel-docs.spec.in: Fix and cleanup for 4.13 doc build (bsc#1048129) The whole DocBook stuff has been deleted. The PDF build still non-working thus the sub-packaging disabled so far.
- rpm/kernel-docs.spec.in: refresh dependencies for PDF build (bsc#1048129) But it still does not work with Tex Live 2017, thus disabled yet. Also add texlive-anyfontsize for HTML math handling.
- rpm/kernel-module-subpackage: Generate proper supplements in the template ... instead of relying on find-provides.ksyms to do it (bsc#981083).
- rpm/kernel-source.spec.in: Do not list deleted depdendency helpers (bsc#981083).
- rpm/kernel-spec-macros: Try harder to detect Build Service environment (bsc#1078788)
- rtc: bq4802: add error handling for devm_ioremap (bnc#1012382).
- rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096 (bnc#1012382).
- s390/chsc: Add exception handler for CHSC instruction (git-fixes).
- s390/extmem: fix gcc 8 stringop-overflow warning (bnc#1012382).
- s390/facilites: use stfle_fac_list array size for MAX_FACILITY_BIT (bnc#1108315, LTC#171326).
- s390/kdump: Fix elfcorehdr size calculation (git-fixes).
- s390/kdump: Make elfcorehdr size calculation ABI compliant (git-fixes).
- s390/mm: correct allocate_pgste proc_handler callback (git-fixes).
- s390/qeth: do not dump past end of unknown HW header (bnc#1012382).
- s390/qeth: fix race in used-buffer accounting (bnc#1012382).
- s390/qeth: handle failure on workqueue creation (git-fixes).
- s390/qeth: reset layer2 attribute on layer switch (bnc#1012382).
- s390/qeth: use vzalloc for QUERY OAT buffer (bnc#1108315, LTC#171527).
- s390: revert ELF_ET_DYN_BASE base changes (git-fixes).
- s390/stacktrace: fix address ranges for asynchronous and panic stack (git-fixes).
- sched/fair: Fix bandwidth timer clock drift condition (Git-fixes).
- sched/fair: Fix vruntime_normalized() for remote non-migration wakeup (Git-fixes).
- scsi: 3ware: fix return 0 on the error path of probe (bnc#1012382).
- scsi: bnx2i: add error handling for ioremap_nocache (bnc#1012382).
- scsi: ibmvscsi: Improve strings handling (bnc#1012382).
- scsi: klist: Make it safe to use klists in atomic context (bnc#1012382).
- scsi: target: fix __transport_register_session locking (bnc#1012382).
- scsi: target/iscsi: Make iscsit_ta_authentication() respect the output buffer size (bnc#1012382).
- selftests/efivarfs: add required kernel configs (bnc#1012382).
- selftest: timers: Tweak raw_skew to SKIP when ADJ_OFFSET/other clock adjustments are in progress (bnc#1012382).
- selinux: use GFP_NOWAIT in the AVC kmem_caches (bnc#1012382).
- serial: cpm_uart: return immediately from console poll (bnc#1012382).
- serial: imx: restore handshaking irq for imx1 (bnc#1012382).
- signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).
- slub: make -&gt;cpu_partial unsigned int (bnc#1012382).
- smb2: fix missing files in root share directory listing (bnc#1012382).
- smb3: fill in statfs fsid and correct namelen (bsc#1112905).
- sound: enable interrupt after dma buffer initialization (bnc#1012382).
- spi: rspi: Fix interrupted DMA transfers (bnc#1012382).
- spi: rspi: Fix invalid SPI use during system suspend (bnc#1012382).
- spi: sh-msiof: Fix handling of write value for SISTR register (bnc#1012382).
- spi: sh-msiof: Fix invalid SPI use during system suspend (bnc#1012382).
- spi: tegra20-slink: explicitly enable/disable clock (bnc#1012382).
- srcu: Allow use of Tiny/Tree SRCU from both process and interrupt context (bsc#1050549).
- staging: android: ashmem: Fix mmap size validation (bnc#1012382).
- staging: rt5208: Fix a sleep-in-atomic bug in xd_copy_page (bnc#1012382).
- staging: rts5208: fix missing error check on call to rtsx_write_register (bnc#1012382).
- staging/rts5208: Fix read overflow in memcpy (bnc#1012382).
- stmmac: fix valid numbers of unicast filter entries (bnc#1012382).
- stop_machine: Atomically queue and wake stopper threads (git-fixes).
- target: log Data-Out timeouts as errors (bsc#1095805).
- target: log NOP ping timeouts as errors (bsc#1095805).
- target: split out helper for cxn timeout error stashing (bsc#1095805).
- target: stash sess_err_stats on Data-Out timeout (bsc#1095805).
- target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).
- tcp: add tcp_ooo_try_coalesce() helper (bnc#1012382).
- tcp: call tcp_drop() from tcp_data_queue_ofo() (bnc#1012382).
- tcp: fix a stale ooo_last_skb after a replace (bnc#1012382).
- tcp: free batches of packets in tcp_prune_ofo_queue() (bnc#1012382).
- tcp: increment sk_drops for dropped rx packets (bnc#1012382).
- tcp: use an RB tree for ooo receive queue (bnc#1012382).
- team: Forbid enslaving team device to itself (bnc#1012382).
- thermal: of-thermal: disable passive polling when thermal zone is disabled (bnc#1012382).
- Tools: hv: Fix a bug in the key delete code (bnc#1012382).
- tools/vm/page-types.c: fix 'defined but not used' warning (bnc#1012382).
- tools/vm/slabinfo.c: fix sign-compare warning (bnc#1012382).
- tpm: Restore functionality to xen vtpm driver (bsc#1020645, git-fixes).
- tsl2550: fix lux1_input error in low light (bnc#1012382).
- tty: Drop tty-&gt;count on tty_reopen() failure (bnc#1105428).
- tty: rocket: Fix possible buffer overwrite on register_PCI (bnc#1012382).
- tty: vt_ioctl: fix potential Spectre v1 (bnc#1012382).
- ubifs: Check for name being NULL while mounting (bnc#1012382).
- ucma: fix a use-after-free in ucma_resolve_ip() (bnc#1012382).
- uio: potential double frees if __uio_register_device() fails (bnc#1012382).
- usb: add quirk for WORLDE Controller KS49 or Prodipe MIDI 49C USB controller (bnc#1012382).
- usb: Add quirk to support DJI CineSSD (bnc#1012382).
- usb: Avoid use-after-free by flushing endpoints early in usb_set_interface() (bnc#1012382).
- usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt() (bnc#1012382).
- usb: Do not die twice if PCI xhci host is not responding in resume (bnc#1012382).
- usb: fix error handling in usb_driver_claim_interface() (bnc#1012382).
- usb: gadget: fotg210-udc: Fix memory leak of fotg210-&gt;ep[i] (bnc#1012382).
- usb: gadget: serial: fix oops when data rx'd after close (bnc#1012382).
- usb: handle NULL config in usb_find_alt_setting() (bnc#1012382).
- usb: host: u132-hcd: Fix a sleep-in-atomic-context bug in u132_get_frame() (bnc#1012382).
- usb: misc: uss720: Fix two sleep-in-atomic-context bugs (bnc#1012382).
- usb: net2280: Fix erroneous synchronization change (bnc#1012382).
- usb: remove LPM management from usb_driver_claim_interface() (bnc#1012382).
- usb: serial: io_ti: fix array underflow in completion handler (bnc#1012382).
- usb: serial: kobil_sct: fix modem-status error handling (bnc#1012382).
- usb: serial: simple: add Motorola Tetra MTP6550 id (bnc#1012382).
- usb: serial: ti_usb_3410_5052: fix array underflow in completion handler (bnc#1012382).
- usb: usbdevfs: restore warning for nonsensical flags (bnc#1012382).
- usb: usbdevfs: sanitize flags more (bnc#1012382).
- usb: wusbcore: security: cast sizeof to int for comparison (bnc#1012382).
- usb: yurex: Check for truncation in yurex_read() (bnc#1012382).
- usb: yurex: Fix buffer over-read in yurex_write() (bnc#1012382).
- Use upstream version of pci-hyperv change 35a88a18d7
- uwb: hwa-rc: fix memory leak at probe (bnc#1012382).
- vfs: do not test owner for NFS in set_posix_acl() (bsc#1103405).
- video: goldfishfb: fix memory leak on driver remove (bnc#1012382).
- vmci: type promotion bug in qp_host_get_user_memory() (bnc#1012382).
- vmw_balloon: include asm/io.h (bnc#1012382).
- watchdog: w83627hf: Added NCT6102D support (bsc#1106434).
- wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout() (bnc#1012382).
- wlcore: Fix memory leak in wlcore_cmd_wait_for_event_or_timeout (git-fixes).
- x86/apic: Fix restoring boot IRQ mode in reboot and kexec/kdump (bsc#1110006).
- x86/apic: Split disable_IO_APIC() into two functions to fix CONFIG_KEXEC_JUMP=y (bsc#1110006).
- x86/apic: Split out restore_boot_irq_mode() from disable_IO_APIC() (bsc#1110006).
- x86/boot: Fix 'run_size' calculation (bsc#1110006).
- x86/cpufeature: deduplicate X86_FEATURE_L1TF_PTEINV (kabi).
- x86/entry/64: Add two more instruction suffixes (bnc#1012382).
- x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculation attack surface (bsc#1105931).
- x86/entry/64: sanitize extra registers on syscall entry (bsc#1105931).
- x86/fpu: Finish excising 'eagerfpu' (bnc#1012382).
- x86/fpu: Remove second definition of fpu in __fpu__restore_sig() (bsc#1110006).
- x86/fpu: Remove struct fpu::counter (bnc#1012382).
- x86/fpu: Remove use_eager_fpu() (bnc#1012382).
- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).
- x86/kaiser: Avoid loosing NMIs when using trampoline stack (bsc#1106293 bsc#1099597).
- x86/mm: Remove in_nmi() warning from vmalloc_fault() (bnc#1012382).
- x86: msr-index.h: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1110006).
- x86/numa_emulation: Fix emulated-to-physical node mapping (bnc#1012382).
- x86/paravirt: Fix some warning messages (bnc#1065600).
- x86/percpu: Fix this_cpu_read() (bsc#1110006).
- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158, bsc#1101555).
- x86/spec_ctrl: Fix spec_ctrl reporting (bsc#1106913, bsc#1111516).
- x86/speculation: Apply IBPB more strictly to avoid cross-process data leak (bsc#1106913).
- x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1106913).
- x86/speculation: Propagate information about RSB filling mitigation to sysfs (bsc#1106913).
- x86/time: Correct the attribute on jiffies' definition (bsc#1110006).
- x86/tsc: Add missing header to tsc_msr.c (bnc#1012382).
- x86/vdso: Fix asm constraints on vDSO syscall fallbacks (bsc#1110006).
- x86/vdso: Fix vDSO build if a retpoline is emitted (bsc#1110006).
- x86/vdso: Fix vDSO syscall fallback asm constraint regression (bsc#1110006).
- x86/vdso: Only enable vDSO retpolines when enabled and supported (bsc#1110006).
- xen: avoid crash in disable_hotplug_cpu (bnc#1012382 bsc#1106594 bsc#1042422).
- xen: fix GCC warning and remove duplicate EVTCHN_ROW/EVTCHN_COL usage (bnc#1012382).
- xen: issue warning message when out of grant maptrack entries (bsc#1105795).
- xen/manage: do not complain about an empty value in control/sysrq node (bnc#1012382).
- xen/netfront: do not bug in case of too many frags (bnc#1012382).
- xen-netfront: fix queue name setting (bnc#1012382).
- xen/netfront: fix waiting for xenbus state change (bnc#1012382).
- xen-netfront: fix warn message as irq device name has '/' (bnc#1012382).
- xen/x86/vpmu: Zero struct pt_regs before calling into sample handling code (bnc#1012382).
- xfrm: fix 'passing zero to ERR_PTR()' warning (bnc#1012382).
- xhci: Add missing CAS workaround for Intel Sunrise Point xHCI (bnc#1012382).
- xhci: Do not print a warning when setting link state for disabled ports (bnc#1012382).
- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114648).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-09"/>
	<updated date="2018-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1011920">SUSE bug 1011920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020645">SUSE bug 1020645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031392">SUSE bug 1031392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035053">SUSE bug 1035053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042422">SUSE bug 1042422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043591">SUSE bug 1043591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048129">SUSE bug 1048129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050549">SUSE bug 1050549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053043">SUSE bug 1053043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054239">SUSE bug 1054239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057199">SUSE bug 1057199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065726">SUSE bug 1065726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067906">SUSE bug 1067906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073579">SUSE bug 1073579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076393">SUSE bug 1076393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078788">SUSE bug 1078788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079524">SUSE bug 1079524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082519">SUSE bug 1082519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083215">SUSE bug 1083215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083527">SUSE bug 1083527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084760">SUSE bug 1084760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091158">SUSE bug 1091158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093118">SUSE bug 1093118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094825">SUSE bug 1094825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095805">SUSE bug 1095805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096052">SUSE bug 1096052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098050">SUSE bug 1098050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098996">SUSE bug 1098996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099597">SUSE bug 1099597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101555">SUSE bug 1101555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103308">SUSE bug 1103308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103405">SUSE bug 1103405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104124">SUSE bug 1104124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105025">SUSE bug 1105025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105428">SUSE bug 1105428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105795">SUSE bug 1105795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105931">SUSE bug 1105931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106105">SUSE bug 1106105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106110">SUSE bug 1106110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106240">SUSE bug 1106240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106293">SUSE bug 1106293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106359">SUSE bug 1106359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106434">SUSE bug 1106434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106594">SUSE bug 1106594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106913">SUSE bug 1106913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106929">SUSE bug 1106929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107060">SUSE bug 1107060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107299">SUSE bug 1107299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107318">SUSE bug 1107318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107535">SUSE bug 1107535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107829">SUSE bug 1107829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107870">SUSE bug 1107870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108315">SUSE bug 1108315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108377">SUSE bug 1108377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108498">SUSE bug 1108498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109158">SUSE bug 1109158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109333">SUSE bug 1109333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109772">SUSE bug 1109772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109784">SUSE bug 1109784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109806">SUSE bug 1109806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109818">SUSE bug 1109818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109907">SUSE bug 1109907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109919">SUSE bug 1109919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109923">SUSE bug 1109923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110006">SUSE bug 1110006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110363">SUSE bug 1110363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110468">SUSE bug 1110468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110600">SUSE bug 1110600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110601">SUSE bug 1110601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110602">SUSE bug 1110602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110603">SUSE bug 1110603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110604">SUSE bug 1110604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110605">SUSE bug 1110605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110606">SUSE bug 1110606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110611">SUSE bug 1110611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110612">SUSE bug 1110612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110613">SUSE bug 1110613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110614">SUSE bug 1110614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110615">SUSE bug 1110615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110616">SUSE bug 1110616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110618">SUSE bug 1110618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110619">SUSE bug 1110619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111363">SUSE bug 1111363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111516">SUSE bug 1111516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111870">SUSE bug 1111870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112007">SUSE bug 1112007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112262">SUSE bug 1112262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112263">SUSE bug 1112263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112894">SUSE bug 1112894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112902">SUSE bug 1112902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112903">SUSE bug 1112903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112905">SUSE bug 1112905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113667">SUSE bug 1113667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114178">SUSE bug 1114178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114229">SUSE bug 1114229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114648">SUSE bug 1114648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981083">SUSE bug 981083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997172">SUSE bug 997172</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14633">CVE-2018-14633 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18281">CVE-2018-18281 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18386">CVE-2018-18386 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18690/">CVE-2018-18690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18690">CVE-2018-18690 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18710">CVE-2018-18710 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9516/">CVE-2018-9516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9516">CVE-2018-9516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553446" comment="kernel-default-4.4.162-94.69.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553447" comment="kernel-default-base-4.4.162-94.69.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553448" comment="kernel-default-devel-4.4.162-94.69.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553449" comment="kernel-default-man-4.4.162-94.69.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520346" comment="kernel-devel-4.4.162-94.69.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520347" comment="kernel-macros-4.4.162-94.69.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520348" comment="kernel-source-4.4.162-94.69.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553450" comment="kernel-syms-4.4.162-94.69.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553451" comment="lttng-modules-2.7.1-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553452" comment="lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149614" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1077291" ref_url="https://bugzilla.suse.com/1077291" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5091" ref_url="https://www.suse.com/security/cve/CVE-2018-5091/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003710.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 52.6 several issues.

These security issues were fixed:

- CVE-2018-5091: Use-after-free with DTMF timers (bsc#1077291).
- CVE-2018-5095: Integer overflow in Skia library during edge builder allocation (bsc#1077291).
- CVE-2018-5096: Use-after-free while editing form elements (bsc#1077291).
- CVE-2018-5097: Use-after-free when source document is manipulated during XSLT (bsc#1077291).
- CVE-2018-5098: Use-after-free while manipulating form input elements (bsc#1077291).
- CVE-2018-5099: Use-after-free with widget listener (bsc#1077291).
- CVE-2018-5104: Use-after-free during font face manipulation (bsc#1077291).
- CVE-2018-5089: Fixed several memory safety bugs (bsc#1077291).
- CVE-2018-5117: URL spoofing with right-to-left text aligned left-to-right (bsc#1077291).
- CVE-2018-5102: Use-after-free in HTML media elements (bsc#1077291).
- CVE-2018-5103: Use-after-free during mouse event handling (bsc#1077291).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-06"/>
	<updated date="2018-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5089">CVE-2018-5089 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5091/">CVE-2018-5091 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5091">CVE-2018-5091 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5095">CVE-2018-5095 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5096">CVE-2018-5096 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5097">CVE-2018-5097 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5098">CVE-2018-5098 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5099">CVE-2018-5099 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5102">CVE-2018-5102 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5103">CVE-2018-5103 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5104">CVE-2018-5104 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5117">CVE-2018-5117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550607" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550608" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149615" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1112852" ref_url="https://bugzilla.suse.com/1112852" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12389" ref_url="https://www.suse.com/security/cve/CVE-2018-12389/" source="CVE"/>
		<reference ref_id="CVE-2018-12390" ref_url="https://www.suse.com/security/cve/CVE-2018-12390/" source="CVE"/>
		<reference ref_id="CVE-2018-12392" ref_url="https://www.suse.com/security/cve/CVE-2018-12392/" source="CVE"/>
		<reference ref_id="CVE-2018-12393" ref_url="https://www.suse.com/security/cve/CVE-2018-12393/" source="CVE"/>
		<reference ref_id="CVE-2018-12395" ref_url="https://www.suse.com/security/cve/CVE-2018-12395/" source="CVE"/>
		<reference ref_id="CVE-2018-12396" ref_url="https://www.suse.com/security/cve/CVE-2018-12396/" source="CVE"/>
		<reference ref_id="CVE-2018-12397" ref_url="https://www.suse.com/security/cve/CVE-2018-12397/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

- Update to Mozilla Firefox 60.3.0esr: MFSA 2018-27 (bsc#1112852)
- CVE-2018-12392: Crash with nested event loops.
- CVE-2018-12393: Integer overflow during Unicode conversion while loading JavaScript.
- CVE-2018-12395: WebExtension bypass of domain restrictions through header rewriting.
- CVE-2018-12396: WebExtension content scripts can execute in disallowed contexts.
- CVE-2018-12397: WebExtension local file access vulnerability.
- CVE-2018-12389: Memory safety bugs fixed in Firefox ESR 60.3.
- CVE-2018-12390: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-13"/>
	<updated date="2018-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12389/">CVE-2018-12389 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12389">CVE-2018-12389 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12390/">CVE-2018-12390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12390">CVE-2018-12390 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12392/">CVE-2018-12392 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12392">CVE-2018-12392 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12393/">CVE-2018-12393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12393">CVE-2018-12393 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12395/">CVE-2018-12395 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12395">CVE-2018-12395 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12396/">CVE-2018-12396 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12396">CVE-2018-12396 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12397/">CVE-2018-12397 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12397">CVE-2018-12397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553453" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553454" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149616" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1106923" ref_url="https://bugzilla.suse.com/1106923" source="BUGZILLA"/>
		<reference ref_id="1108835" ref_url="https://bugzilla.suse.com/1108835" source="BUGZILLA"/>
		<reference ref_id="1109252" ref_url="https://bugzilla.suse.com/1109252" source="BUGZILLA"/>
		<reference ref_id="1110445" ref_url="https://bugzilla.suse.com/1110445" source="BUGZILLA"/>
		<reference ref_id="1111278" ref_url="https://bugzilla.suse.com/1111278" source="BUGZILLA"/>
		<reference ref_id="1112024" ref_url="https://bugzilla.suse.com/1112024" source="BUGZILLA"/>
		<reference ref_id="1113083" ref_url="https://bugzilla.suse.com/1113083" source="BUGZILLA"/>
		<reference ref_id="1113632" ref_url="https://bugzilla.suse.com/1113632" source="BUGZILLA"/>
		<reference ref_id="1113665" ref_url="https://bugzilla.suse.com/1113665" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15686" ref_url="https://www.suse.com/security/cve/CVE-2018-15686/" source="CVE"/>
		<reference ref_id="CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004849.html" source="SUSE-SU"/>
		<description>

This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2018-15688: A buffer overflow vulnerability in the dhcp6 client of systemd allowed a malicious dhcp6 server to overwrite heap memory in systemd-networkd. (bsc#1113632)
- CVE-2018-15686: A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. (bsc#1113665)

Non-security issues fixed:

- dhcp6: split assert_return() to be more debuggable when hit
- core: skip unit deserialization and move to the next one when unit_deserialize() fails
- core: properly handle deserialization of unknown unit types (#6476)
- core: don't create Requires for workdir if 'missing ok' (bsc#1113083)
- logind: use manager_get_user_by_pid() where appropriate
- logind: rework manager_get_{user|session}_by_pid() a bit
- login: fix user@.service case, so we don't allow nested sessions (#8051) (bsc#1112024)
- core: be more defensive if we can't determine per-connection socket peer (#7329)
- socket-util: introduce port argument in sockaddr_port()
- service: fixup ExecStop for socket-activated shutdown (#4120)
- service: Continue shutdown on socket activated unit on termination (#4108) (bsc#1106923)
- cryptsetup: build fixes for 'add support for sector-size= option'
- udev-rules: IMPORT cmdline does not recognize keys with similar names (bsc#1111278)
- core: keep the kernel coredump defaults when systemd-coredump is disabled
- core: shorten main() a bit, split out coredump initialization
- core: set RLIMIT_CORE to unlimited by default (bsc#1108835)
- core/mount: fstype may be NULL
- journald: don't ship systemd-journald-audit.socket (bsc#1109252)
- core: make 'tmpfs' dependencies on swapfs a 'default' dep, not an 'implicit' (bsc#1110445)
- mount: make sure we unmount tmpfs mounts before we deactivate swaps (#7076)
- tmp.mount.hm4: After swap.target (#3087)

- Ship systemd-sysv-install helper via the main package
  This script was part of systemd-sysvinit sub-package but it was
  wrong since systemd-sysv-install is a script used to redirect
  enable/disable operations to chkconfig when the unit targets are
  sysv init scripts. Therefore it's never been a SySV init tool.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-14"/>
	<updated date="2018-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106923">SUSE bug 1106923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108835">SUSE bug 1108835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109252">SUSE bug 1109252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110445">SUSE bug 1110445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111278">SUSE bug 1111278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112024">SUSE bug 1112024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113083">SUSE bug 1113083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113632">SUSE bug 1113632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113665">SUSE bug 1113665</bugzilla>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15686/">CVE-2018-15686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15686">CVE-2018-15686 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15688">CVE-2018-15688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553455" comment="libsystemd0-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550610" comment="libsystemd0-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553456" comment="libudev1-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550612" comment="libudev1-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553457" comment="systemd-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550614" comment="systemd-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520358" comment="systemd-bash-completion-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553458" comment="systemd-sysvinit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553459" comment="udev-228-150.53.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149617" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1114837" ref_url="https://bugzilla.suse.com/1114837" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16850" ref_url="https://www.suse.com/security/cve/CVE-2018-16850/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004852.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

Security issue fixed:

- CVE-2018-16850: Fixed improper quoting of transition table names when pg_dump emits CREATE TRIGGER could have caused privilege escalation (bsc#1114837).

Non-security issues fixed:

- Update to release 10.6:
  * https://www.postgresql.org/docs/current/static/release-10-6.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-15"/>
	<updated date="2018-11-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114837">SUSE bug 1114837</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16850/">CVE-2018-16850 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16850">CVE-2018-16850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553460" comment="libecpg6-10.6-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553461" comment="libpq5-10.6-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553462" comment="libpq5-32bit-10.6-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553463" comment="postgresql10-10.6-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553464" comment="postgresql10-contrib-10.6-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553465" comment="postgresql10-docs-10.6-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553466" comment="postgresql10-server-10.6-1.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149618" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1112066" ref_url="https://bugzilla.suse.com/1112066" source="BUGZILLA"/>
		<reference ref_id="1112695" ref_url="https://bugzilla.suse.com/1112695" source="BUGZILLA"/>
		<reference ref_id="1113668" ref_url="https://bugzilla.suse.com/1113668" source="BUGZILLA"/>
		<reference ref_id="1113669" ref_url="https://bugzilla.suse.com/1113669" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19131" ref_url="https://www.suse.com/security/cve/CVE-2018-19131/" source="CVE"/>
		<reference ref_id="CVE-2018-19132" ref_url="https://www.suse.com/security/cve/CVE-2018-19132/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004853.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

Security issues fixed:

- CVE-2018-19131: Fixed Cross-Site-Scripting vulnerability in the TLS error handling (bsc#1113668).
- CVE-2018-19132: Fixed small memory leak in processing of SNMP packets (bsc#1113669).

Non-security issues fixed:

- Create runtime directories needed when SMP mode is enabled (bsc#1112695, bsc#1112066).
- Install license correctly (bsc#1082318).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-15"/>
	<updated date="2018-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112066">SUSE bug 1112066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112695">SUSE bug 1112695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113668">SUSE bug 1113668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113669">SUSE bug 1113669</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19131/">CVE-2018-19131 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19131">CVE-2018-19131 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19132/">CVE-2018-19132 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19132">CVE-2018-19132 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553467" comment="squid-3.5.21-26.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149619" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1058722" ref_url="https://bugzilla.suse.com/1058722" source="BUGZILLA"/>
		<reference ref_id="1064101" ref_url="https://bugzilla.suse.com/1064101" source="BUGZILLA"/>
		<reference ref_id="1064115" ref_url="https://bugzilla.suse.com/1064115" source="BUGZILLA"/>
		<reference ref_id="1076505" ref_url="https://bugzilla.suse.com/1076505" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10268" ref_url="https://www.suse.com/security/cve/CVE-2017-10268/" source="CVE"/>
		<reference ref_id="CVE-2017-10378" ref_url="https://www.suse.com/security/cve/CVE-2017-10378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003712.html" source="SUSE-SU"/>
		<description>
This update for mariadb to version 10.0.33 fixes several issues.

These security issues were fixed:

- CVE-2017-10378: Vulnerability in subcomponent: Server: Optimizer. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1064115).
- CVE-2017-10268: Vulnerability in subcomponent: Server: Replication. Difficult
  to exploit vulnerability allowed high privileged attacker with logon to the
  infrastructure where MySQL Server executes to compromise MySQL Server.
  Successful attacks of this vulnerability can result in unauthorized access to
  critical data or complete access to all MySQL Server accessible data
  (bsc#1064101).

These non-security issues were fixed:

- CHECK TABLE no longer returns an error when run on a CONNECT table
- 'Undo log record is too big.' error occurring in very narrow range of string
  lengths
- Race condition between INFORMATION_SCHEMA.INNODB_SYS_TABLESTATS and
  ALTER/DROP/TRUNCATE TABLE
- Wrong result after altering a partitioned table fixed bugs in InnoDB FULLTEXT
  INDEX
- InnoDB FTS duplicate key error
- InnoDB crash after failed ADD INDEX and table_definition_cache eviction
- fts_create_doc_id() unnecessarily allocates 8 bytes for every inserted row
- IMPORT TABLESPACE may corrupt ROW_FORMAT=REDUNDANT tables

For additional details please see https://kb.askmonty.org/en/mariadb-10033-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-07"/>
	<updated date="2018-02-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1058722">SUSE bug 1058722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064101">SUSE bug 1064101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064115">SUSE bug 1064115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076505">SUSE bug 1076505</bugzilla>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10268/">CVE-2017-10268 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10268">CVE-2017-10268 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10378/">CVE-2017-10378 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10378">CVE-2017-10378 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550627" comment="libmysqlclient18-10.0.33-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550628" comment="libmysqlclient18-32bit-10.0.33-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550629" comment="mariadb-10.0.33-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550630" comment="mariadb-client-10.0.33-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550631" comment="mariadb-errormessages-10.0.33-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550632" comment="mariadb-tools-10.0.33-29.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149620" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1005778" ref_url="https://bugzilla.suse.com/1005778" source="BUGZILLA"/>
		<reference ref_id="1005780" ref_url="https://bugzilla.suse.com/1005780" source="BUGZILLA"/>
		<reference ref_id="1005781" ref_url="https://bugzilla.suse.com/1005781" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012917" ref_url="https://bugzilla.suse.com/1012917" source="BUGZILLA"/>
		<reference ref_id="1015342" ref_url="https://bugzilla.suse.com/1015342" source="BUGZILLA"/>
		<reference ref_id="1015343" ref_url="https://bugzilla.suse.com/1015343" source="BUGZILLA"/>
		<reference ref_id="1019784" ref_url="https://bugzilla.suse.com/1019784" source="BUGZILLA"/>
		<reference ref_id="1022476" ref_url="https://bugzilla.suse.com/1022476" source="BUGZILLA"/>
		<reference ref_id="1022595" ref_url="https://bugzilla.suse.com/1022595" source="BUGZILLA"/>
		<reference ref_id="1022912" ref_url="https://bugzilla.suse.com/1022912" source="BUGZILLA"/>
		<reference ref_id="1024296" ref_url="https://bugzilla.suse.com/1024296" source="BUGZILLA"/>
		<reference ref_id="1024376" ref_url="https://bugzilla.suse.com/1024376" source="BUGZILLA"/>
		<reference ref_id="1031395" ref_url="https://bugzilla.suse.com/1031395" source="BUGZILLA"/>
		<reference ref_id="1031492" ref_url="https://bugzilla.suse.com/1031492" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1037838" ref_url="https://bugzilla.suse.com/1037838" source="BUGZILLA"/>
		<reference ref_id="1038078" ref_url="https://bugzilla.suse.com/1038078" source="BUGZILLA"/>
		<reference ref_id="1038085" ref_url="https://bugzilla.suse.com/1038085" source="BUGZILLA"/>
		<reference ref_id="1040182" ref_url="https://bugzilla.suse.com/1040182" source="BUGZILLA"/>
		<reference ref_id="1043652" ref_url="https://bugzilla.suse.com/1043652" source="BUGZILLA"/>
		<reference ref_id="1048325" ref_url="https://bugzilla.suse.com/1048325" source="BUGZILLA"/>
		<reference ref_id="1048585" ref_url="https://bugzilla.suse.com/1048585" source="BUGZILLA"/>
		<reference ref_id="1053472" ref_url="https://bugzilla.suse.com/1053472" source="BUGZILLA"/>
		<reference ref_id="1060279" ref_url="https://bugzilla.suse.com/1060279" source="BUGZILLA"/>
		<reference ref_id="1062129" ref_url="https://bugzilla.suse.com/1062129" source="BUGZILLA"/>
		<reference ref_id="1066163" ref_url="https://bugzilla.suse.com/1066163" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068038" ref_url="https://bugzilla.suse.com/1068038" source="BUGZILLA"/>
		<reference ref_id="1068569" ref_url="https://bugzilla.suse.com/1068569" source="BUGZILLA"/>
		<reference ref_id="1068984" ref_url="https://bugzilla.suse.com/1068984" source="BUGZILLA"/>
		<reference ref_id="1069138" ref_url="https://bugzilla.suse.com/1069138" source="BUGZILLA"/>
		<reference ref_id="1069160" ref_url="https://bugzilla.suse.com/1069160" source="BUGZILLA"/>
		<reference ref_id="1070052" ref_url="https://bugzilla.suse.com/1070052" source="BUGZILLA"/>
		<reference ref_id="1070799" ref_url="https://bugzilla.suse.com/1070799" source="BUGZILLA"/>
		<reference ref_id="1072163" ref_url="https://bugzilla.suse.com/1072163" source="BUGZILLA"/>
		<reference ref_id="1072484" ref_url="https://bugzilla.suse.com/1072484" source="BUGZILLA"/>
		<reference ref_id="1073229" ref_url="https://bugzilla.suse.com/1073229" source="BUGZILLA"/>
		<reference ref_id="1073928" ref_url="https://bugzilla.suse.com/1073928" source="BUGZILLA"/>
		<reference ref_id="1074134" ref_url="https://bugzilla.suse.com/1074134" source="BUGZILLA"/>
		<reference ref_id="1074488" ref_url="https://bugzilla.suse.com/1074488" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="1074709" ref_url="https://bugzilla.suse.com/1074709" source="BUGZILLA"/>
		<reference ref_id="1074839" ref_url="https://bugzilla.suse.com/1074839" source="BUGZILLA"/>
		<reference ref_id="1074847" ref_url="https://bugzilla.suse.com/1074847" source="BUGZILLA"/>
		<reference ref_id="1075066" ref_url="https://bugzilla.suse.com/1075066" source="BUGZILLA"/>
		<reference ref_id="1075078" ref_url="https://bugzilla.suse.com/1075078" source="BUGZILLA"/>
		<reference ref_id="1075087" ref_url="https://bugzilla.suse.com/1075087" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075397" ref_url="https://bugzilla.suse.com/1075397" source="BUGZILLA"/>
		<reference ref_id="1075428" ref_url="https://bugzilla.suse.com/1075428" source="BUGZILLA"/>
		<reference ref_id="1075617" ref_url="https://bugzilla.suse.com/1075617" source="BUGZILLA"/>
		<reference ref_id="1075621" ref_url="https://bugzilla.suse.com/1075621" source="BUGZILLA"/>
		<reference ref_id="1075627" ref_url="https://bugzilla.suse.com/1075627" source="BUGZILLA"/>
		<reference ref_id="1075811" ref_url="https://bugzilla.suse.com/1075811" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1076110" ref_url="https://bugzilla.suse.com/1076110" source="BUGZILLA"/>
		<reference ref_id="1076187" ref_url="https://bugzilla.suse.com/1076187" source="BUGZILLA"/>
		<reference ref_id="1076232" ref_url="https://bugzilla.suse.com/1076232" source="BUGZILLA"/>
		<reference ref_id="1076805" ref_url="https://bugzilla.suse.com/1076805" source="BUGZILLA"/>
		<reference ref_id="1076847" ref_url="https://bugzilla.suse.com/1076847" source="BUGZILLA"/>
		<reference ref_id="1076872" ref_url="https://bugzilla.suse.com/1076872" source="BUGZILLA"/>
		<reference ref_id="1076899" ref_url="https://bugzilla.suse.com/1076899" source="BUGZILLA"/>
		<reference ref_id="1077068" ref_url="https://bugzilla.suse.com/1077068" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1077592" ref_url="https://bugzilla.suse.com/1077592" source="BUGZILLA"/>
		<reference ref_id="1077704" ref_url="https://bugzilla.suse.com/1077704" source="BUGZILLA"/>
		<reference ref_id="1077871" ref_url="https://bugzilla.suse.com/1077871" source="BUGZILLA"/>
		<reference ref_id="1078002" ref_url="https://bugzilla.suse.com/1078002" source="BUGZILLA"/>
		<reference ref_id="1078681" ref_url="https://bugzilla.suse.com/1078681" source="BUGZILLA"/>
		<reference ref_id="963844" ref_url="https://bugzilla.suse.com/963844" source="BUGZILLA"/>
		<reference ref_id="966170" ref_url="https://bugzilla.suse.com/966170" source="BUGZILLA"/>
		<reference ref_id="966172" ref_url="https://bugzilla.suse.com/966172" source="BUGZILLA"/>
		<reference ref_id="973818" ref_url="https://bugzilla.suse.com/973818" source="BUGZILLA"/>
		<reference ref_id="985025" ref_url="https://bugzilla.suse.com/985025" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15129" ref_url="https://www.suse.com/security/cve/CVE-2017-15129/" source="CVE"/>
		<reference ref_id="CVE-2017-17712" ref_url="https://www.suse.com/security/cve/CVE-2017-17712/" source="CVE"/>
		<reference ref_id="CVE-2017-17862" ref_url="https://www.suse.com/security/cve/CVE-2017-17862/" source="CVE"/>
		<reference ref_id="CVE-2017-17864" ref_url="https://www.suse.com/security/cve/CVE-2017-17864/" source="CVE"/>
		<reference ref_id="CVE-2017-18017" ref_url="https://www.suse.com/security/cve/CVE-2017-18017/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332/" source="CVE"/>
		<reference ref_id="CVE-2018-5333" ref_url="https://www.suse.com/security/cve/CVE-2018-5333/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003711.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.114 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).

  The previous fix using CPU Microcode has been complemented by building the Linux Kernel with return trampolines aka 'retpolines'.

- CVE-2017-15129: A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel in the function get_net_ns_by_id() in net/core/net_namespace.c did not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely (bnc#1074839).
- CVE-2017-17712: The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel has a race condition in inet-&gt;hdrincl that leads to uninitialized stack pointer usage; this allowed a local user to execute code and gain privileges (bnc#1073229).
- CVE-2017-17862: kernel/bpf/verifier.c in the Linux kernel ignored unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service (bnc#1073928).
- CVE-2017-17864: kernel/bpf/verifier.c in the Linux kernel mishandled states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allowed local users to obtain potentially sensitive address information, aka a 'pointer leak (bnc#1073928).
- CVE-2017-18017: The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action (bnc#1074488).
- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function did not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621).
- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in net/rds/rdma.c mishandled cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference (bnc#1075617).
- CVE-2018-1000004: In the Linux kernel a race condition vulnerability existed in the sound system, this can lead to a deadlock and denial of service condition (bnc#1076017).

The following non-security bugs were fixed:

- 8021q: fix a memory leak for VLAN 0 device (bnc#1012382).
- acpi / scan: Prefer devices without _HID/_CID for _ADR matching (bnc#1012382).
- af_key: fix buffer overread in parse_exthdrs() (bnc#1012382).
- af_key: fix buffer overread in verify_address_len() (bnc#1012382).
- afs: Adjust mode bits processing (bnc#1012382).
- afs: Connect up the CB.ProbeUuid (bnc#1012382).
- afs: Fix afs_kill_pages() (bnc#1012382).
- afs: Fix missing put_page() (bnc#1012382).
- afs: Fix page leak in afs_write_begin() (bnc#1012382).
- afs: Fix the maths in afs_fs_store_data() (bnc#1012382).
- afs: Flush outstanding writes when an fd is closed (bnc#1012382).
- afs: Migrate vlocation fields to 64-bit (bnc#1012382).
- afs: Populate and use client modification time (bnc#1012382).
- afs: Populate group ID from vnode status (bnc#1012382).
- afs: Prevent callback expiry timer overflow (bnc#1012382).
- alpha: fix build failures (bnc#1012382).
- alsa: aloop: Fix inconsistent format due to incomplete rule (bsc#1031717).
- alsa: aloop: Fix racy hw constraints adjustment (bsc#1031717).
- alsa: aloop: Release cable upon open error path (bsc#1031717).
- alsa: hda - Add HP ZBook 15u G3 Conexant CX20724 GPIO mute leds (bsc#1031717).
- alsa: hda - Add MIC_NO_PRESENCE fixup for 2 HP machines (bsc#1031717).
- alsa: hda - Add mute led support for HP EliteBook 840 G3 (bsc#1031717).
- alsa: hda - Add mute led support for HP ProBook 440 G4 (bsc#1031717).
- alsa: hda - add support for docking station for HP 820 G2 (bsc#1031717).
- alsa: hda - add support for docking station for HP 840 G3 (bsc#1031717).
- alsa: hda - Apply headphone noise quirk for another Dell XPS 13 variant (bsc#1031717).
- alsa: hda - Apply the existing quirk to iMac 14,1 (bsc#1031717).
- alsa: hda - change the location for one mic on a Lenovo machine (bsc#1031717).
- alsa: hda: Drop useless WARN_ON() (bsc#1031717).
- alsa: hda - Fix click noises on Samsung Ativ Book 8 (bsc#1031717).
- alsa: hda - fix headset mic detection issue on a Dell machine (bsc#1031717).
- alsa: hda - fix headset mic problem for Dell machines with alc274 (bsc#1031717).
- alsa: hda - Fix headset microphone detection for ASUS N551 and N751 (bsc#1031717).
- alsa: hda - Fix mic regression by ASRock mobo fixup (bsc#1031717).
- alsa: hda - Fix missing COEF init for ALC225/295/299 (bsc#1031717).
- alsa: hda - Fix surround output pins for ASRock B150M mobo (bsc#1031717).
- alsa: hda - On-board speaker fixup on ACER Veriton (bsc#1031717).
- alsa: hda/realtek - Add ALC256 HP depop function (bsc#1031717).
- alsa: hda/realtek - Add default procedure for suspend and resume state (bsc#1031717).
- alsa: hda/realtek - Add support for Acer Aspire E5-475 headset mic (bsc#1031717).
- alsa: hda/realtek - Add support for ALC1220 (bsc#1031717).
- alsa: hda/realtek - Add support for headset MIC for ALC622 (bsc#1031717).
- alsa: hda/realtek - ALC891 headset mode for Dell (bsc#1031717).
- alsa: hda/realtek - change the location for one of two front microphones (bsc#1031717).
- alsa: hda/realtek - Enable jack detection function for Intel ALC700 (bsc#1031717).
- alsa: hda/realtek - Fix ALC275 no sound issue (bsc#1031717).
- alsa: hda/realtek - Fix Dell AIO LineOut issue (bsc#1031717).
- alsa: hda/realtek - Fix headset and mic on several Asus laptops with ALC256 (bsc#1031717).
- alsa: hda/realtek - Fix headset mic and speaker on Asus X441SA/X441UV (bsc#1031717).
- alsa: hda/realtek - fix headset mic detection for MSI MS-B120 (bsc#1031717).
- alsa: hda/realtek - Fix headset mic on several Asus laptops with ALC255 (bsc#1031717).
- alsa: hda/realtek - Fix pincfg for Dell XPS 13 9370 (bsc#1031717).
- alsa: hda/realtek - Fix speaker support for Asus AiO ZN270IE (bsc#1031717).
- alsa: hda/realtek - Fix typo of pincfg for Dell quirk (bsc#1031717).
- alsa: hda/realtek - New codec device ID for ALC1220 (bsc#1031717).
- alsa: hda/realtek - New codecs support for ALC215/ALC285/ALC289 (bsc#1031717).
- alsa: hda/realtek - New codec support for ALC257 (bsc#1031717).
- alsa: hda/realtek - New codec support of ALC1220 (bsc#1031717).
- alsa: hda/realtek - No loopback on ALC225/ALC295 codec (bsc#1031717).
- alsa: hda/realtek - Remove ALC285 device ID (bsc#1031717).
- alsa: hda/realtek - Support Dell headset mode for ALC3271 (bsc#1031717).
- alsa: hda/realtek - Support headset mode for ALC234/ALC274/ALC294 (bsc#1031717).
- alsa: hda/realtek - There is no loopback mixer in the ALC234/274/294 (bsc#1031717).
- alsa: hda/realtek - Update headset mode for ALC225 (bsc#1031717).
- alsa: hda/realtek - Update headset mode for ALC298 (bsc#1031717).
- alsa: hda - Skip Realtek SKU check for Lenovo machines (bsc#1031717).
- alsa: pcm: Abort properly at pending signal in OSS read/write loops (bsc#1031717).
- alsa: pcm: Add missing error checks in OSS emulation plugin builder (bsc#1031717).
- alsa: pcm: Allow aborting mutex lock at OSS read/write loops (bsc#1031717).
- alsa: pcm: prevent UAF in snd_pcm_info (bsc#1031717).
- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1031717).
- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1031717).
- alsa: rawmidi: Avoid racy info ioctl via ctl device (bsc#1031717).
- alsa: seq: Remove spurious WARN_ON() at timer check (bsc#1031717).
- alsa: usb-audio: Add check return value for usb_string() (bsc#1031717).
- alsa: usb-audio: Fix out-of-bound error (bsc#1031717).
- alsa: usb-audio: Fix the missing ctl name suffix at parsing SU (bsc#1031717).
- arc: uaccess: dont use 'l' gcc inline asm constraint modifier (bnc#1012382).
- arm64: Add skeleton to harden the branch predictor against aliasing attacks (bsc#1068032).
- arm64: Add trace_hardirqs_off annotation in ret_to_user (bsc#1068032).
- arm64: Branch predictor hardening for Cavium ThunderX2 (bsc#1068032).
- arm64/cpufeature: do not use mutex in bringup path (bsc#1068032).
- arm64: cpufeature: Pass capability structure to -&gt;enable callback (bsc#1068032).
- arm64: cputype: Add MIDR values for Cavium ThunderX2 CPUs (bsc#1068032).
- arm64: cputype: Add missing MIDR values for Cortex-A72 and Cortex-A75 (bsc#1068032).
- arm64: debug: remove unused local_dbg_{enable, disable} macros (bsc#1068032).
- arm64: Define cputype macros for Falkor CPU (bsc#1068032).
- arm64: Disable TTBR0_EL1 during normal kernel execution (bsc#1068032).
- arm64: Do not force KPTI for CPUs that are not vulnerable (bsc#1076187).
- arm64: do not pull uaccess.h into *.S (bsc#1068032).
- arm64: Enable CONFIG_ARM64_SW_TTBR0_PAN (bsc#1068032).
- arm64: entry: Add exception trampoline page for exceptions from EL0 (bsc#1068032).
- arm64: entry: Add fake CPU feature for unmapping the kernel at EL0 (bsc#1068032).
- arm64: entry: Explicitly pass exception level to kernel_ventry macro (bsc#1068032).
- arm64: entry: Hook up entry trampoline to exception vectors (bsc#1068032).
- arm64: entry: remove pointless SPSR mode check (bsc#1068032).
- arm64: entry.S convert el0_sync (bsc#1068032).
- arm64: entry.S: convert el1_sync (bsc#1068032).
- arm64: entry.S: convert elX_irq (bsc#1068032).
- arm64: entry.S: move SError handling into a C function for future expansion (bsc#1068032).
- arm64: entry.S: Remove disable_dbg (bsc#1068032).
- arm64: erratum: Work around Falkor erratum #E1003 in trampoline code (bsc#1068032).
- arm64: explicitly mask all exceptions (bsc#1068032).
- arm64: factor out entry stack manipulation (bsc#1068032).
- arm64: factor out PAGE_* and CONT_* definitions (bsc#1068032).
- arm64: Factor out PAN enabling/disabling into separate uaccess_* macros (bsc#1068032).
- arm64: Factor out TTBR0_EL1 post-update workaround into a specific asm macro (bsc#1068032).
- arm64: factor work_pending state machine to C (bsc#1068032).
- arm64: fpsimd: Prevent registers leaking from dead tasks (bnc#1012382).
- arm64: Handle el1 synchronous instruction aborts cleanly (bsc#1068032).
- arm64: Handle faults caused by inadvertent user access with PAN enabled (bsc#1068032).
- arm64: head.S: get rid of x25 and x26 with 'global' scope (bsc#1068032).
- arm64: Implement branch predictor hardening for affected Cortex-A CPUs (bsc#1068032).
- arm64: Implement branch predictor hardening for Falkor (bsc#1068032).
- arm64: Initialise high_memory global variable earlier (bnc#1012382).
- arm64: introduce an order for exceptions (bsc#1068032).
- arm64: introduce mov_q macro to move a constant into a 64-bit register (bsc#1068032).
- arm64: Introduce uaccess_{disable,enable} functionality based on TTBR0_EL1 (bsc#1068032).
- arm64: kaslr: Put kernel vectors address in separate data page (bsc#1068032).
- arm64: Kconfig: Add CONFIG_UNMAP_KERNEL_AT_EL0 (bsc#1068032).
- arm64: Kconfig: Reword UNMAP_KERNEL_AT_EL0 kconfig entry (bsc#1068032).
- arm64: kill ESR_LNX_EXEC (bsc#1068032).
- arm64: kpti: Fix the interaction between ASID switching and software PAN (bsc#1068032).
- arm64: kvm: Fix SMCCC handling of unimplemented SMC/HVC calls (bsc#1076232).
- arm64: kvm: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).
- arm64: kvm: Make PSCI_VERSION a fast path (bsc#1068032).
- arm64: kvm: Use per-CPU vector when BP hardening is enabled (bsc#1068032).
- arm64: Mask all exceptions during kernel_exit (bsc#1068032).
- arm64: mm: Add arm64_kernel_unmapped_at_el0 helper (bsc#1068032).
- arm64: mm: Allocate ASIDs in pairs (bsc#1068032).
- arm64: mm: Fix and re-enable ARM64_SW_TTBR0_PAN (bsc#1068032).
- arm64: mm: hardcode rodata=true (bsc#1068032).
- arm64: mm: Introduce TTBR_ASID_MASK for getting at the ASID in the TTBR (bsc#1068032).
- arm64: mm: Invalidate both kernel and user ASIDs when performing TLBI (bsc#1068032).
- arm64: mm: Map entry trampoline into trampoline and kernel page tables (bsc#1068032).
- arm64: mm: Move ASID from TTBR0 to TTBR1 (bsc#1068032).
- arm64: mm: Remove pre_ttbr0_update_workaround for Falkor erratum #E1003 (bsc#1068032).
- arm64: mm: Rename post_ttbr0_update_workaround (bsc#1068032).
- arm64: mm: Temporarily disable ARM64_SW_TTBR0_PAN (bsc#1068032).
- arm64: mm: Use non-global mappings for kernel space (bsc#1068032).
- arm64: Move BP hardening to check_and_switch_context (bsc#1068032).
- arm64: Move post_ttbr_update_workaround to C code (bsc#1068032).
- arm64: Move the async/fiq helpers to explicitly set process context flags (bsc#1068032).
- arm64: SW PAN: Point saved ttbr0 at the zero page when switching to init_mm (bsc#1068032).
- arm64: SW PAN: Update saved ttbr0 value on enter_lazy_tlb (bsc#1068032).
- arm64: swp emulation: bound LL/SC retries before rescheduling (bsc#1068032).
- arm64: sysreg: Fix unprotected macro argmuent in write_sysreg (bsc#1068032).
- arm64: Take into account ID_AA64PFR0_EL1.CSV3 (bsc#1068032).
- arm64: thunderx2: remove branch predictor hardening References: bsc#1076232 This causes undefined instruction abort on the smc call from guest kernel. Disable until kvm is fixed.
- arm64: tls: Avoid unconditional zeroing of tpidrro_el0 for native tasks (bsc#1068032).
- arm64: Turn on KPTI only on CPUs that need it (bsc#1076187).
- arm64: use alternative auto-nop (bsc#1068032).
- arm64: use RET instruction for exiting the trampoline (bsc#1068032).
- arm64: xen: Enable user access before a privcmd hvc call (bsc#1068032).
- arm/arm64: kvm: Make default HYP mappings non-excutable (bsc#1068032).
- arm: avoid faulting on qemu (bnc#1012382).
- arm: BUG if jumping to usermode address in kernel mode (bnc#1012382).
- arm-ccn: perf: Prevent module unload while PMU is in use (bnc#1012382).
- arm: dma-mapping: disallow dma_get_sgtable() for non-kernel managed memory (bnc#1012382).
- arm: dts: am335x-evmsk: adjust mmc2 param to allow suspend (bnc#1012382).
- arm: dts: kirkwood: fix pin-muxing of MPP7 on OpenBlocks A7 (bnc#1012382).
- arm: dts: omap3: logicpd-torpedo-37xx-devkit: Fix MMC1 cd-gpio (bnc#1012382).
- arm: dts: ti: fix PCI bus dtc warnings (bnc#1012382).
- arm: kprobes: Align stack to 8-bytes in test code (bnc#1012382).
- arm: kprobes: Fix the return address of multiple kretprobes (bnc#1012382).
- arm: kvm: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).
- arm: OMAP1: DMA: Correct the number of logical channels (bnc#1012382).
- arm: OMAP2+: Fix device node reference counts (bnc#1012382).
- arm: OMAP2+: gpmc-onenand: propagate error on initialization failure (bnc#1012382).
- arm: OMAP2+: Release device node after it is no longer needed (bnc#1012382).
- asm-prototypes: Clear any CPP defines before declaring the functions (git-fixes).
- asn.1: check for error from ASN1_OP_END__ACT actions (bnc#1012382).
- asn.1: fix out-of-bounds read when parsing indefinite length item (bnc#1012382).
- asoc: fsl_ssi: AC'97 ops need regmap, clock and cleaning up on failure (bsc#1031717).
- asoc: twl4030: fix child-node lookup (bsc#1031717).
- asoc: wm_adsp: Fix validation of firmware and coeff lengths (bsc#1031717).
- ath9k: fix tx99 potential info leak (bnc#1012382).
- atm: horizon: Fix irq release error (bnc#1012382).
- audit: ensure that 'audit=1' actually enables audit for PID 1 (bnc#1012382).
- axonram: Fix gendisk handling (bnc#1012382).
- backlight: pwm_bl: Fix overflow condition (bnc#1012382).
- bcache: add a comment in journal bucket reading (bsc#1076110).
- bcache: Avoid nested function definition (bsc#1076110).
- bcache: bch_allocator_thread() is not freezable (bsc#1076110).
- bcache: bch_writeback_thread() is not freezable (bsc#1076110).
- bcache: check return value of register_shrinker (bsc#1076110).
- bcache: documentation formatting, edited for clarity, stripe alignment notes (bsc#1076110).
- bcache: documentation updates and corrections (bsc#1076110).
- bcache: Do not reinvent the wheel but use existing llist API (bsc#1076110).
- bcache: do not write back data if reading it failed (bsc#1076110).
- bcache: explicitly destroy mutex while exiting (bnc#1012382).
- bcache: fix a comments typo in bch_alloc_sectors() (bsc#1076110).
- bcache: Fix building error on MIPS (bnc#1012382).
- bcache: fix sequential large write IO bypass (bsc#1076110).
- bcache: fix wrong cache_misses statistics (bnc#1012382).
- bcache: gc does not work when triggering by manual command (bsc#1076110, bsc#1038078).
- bcache: implement PI controller for writeback rate (bsc#1076110).
- bcache: increase the number of open buckets (bsc#1076110).
- bcache: only permit to recovery read error when cache device is clean (bnc#1012382 bsc#1043652).
- bcache: partition support: add 16 minors per bcacheN device (bsc#1076110, bsc#1019784).
- bcache: rearrange writeback main thread ratelimit (bsc#1076110).
- bcache: recover data from backing when data is clean (bnc#1012382 bsc#1043652).
- bcache: Remove redundant set_capacity (bsc#1076110).
- bcache: remove unused parameter (bsc#1076110).
- bcache: rewrite multiple partitions support (bsc#1076110, bsc#1038085).
- bcache: safeguard a dangerous addressing in closure_queue (bsc#1076110).
- bcache: silence static checker warning (bsc#1076110).
- bcache: smooth writeback rate control (bsc#1076110).
- bcache.txt: standardize document format (bsc#1076110).
- bcache: update bio-&gt;bi_opf bypass/writeback REQ_ flag hints (bsc#1076110).
- bcache: update bucket_in_use in real time (bsc#1076110).
- bcache: Update continue_at() documentation (bsc#1076110).
- bcache: use kmalloc to allocate bio in bch_data_verify() (bsc#1076110).
- bcache: use llist_for_each_entry_safe() in __closure_wake_up() (bsc#1076110).
- bcache: writeback rate clamping: make 32 bit safe (bsc#1076110).
- bcache: writeback rate shouldn't artifically clamp (bsc#1076110).
- be2net: restore properly promisc mode after queues reconfiguration (bsc#963844 FATE#320192).
- block: wake up all tasks blocked in get_request() (bnc#1012382).
- bluetooth: btusb: driver to enable the usb-wakeup feature (bnc#1012382).
- bnx2x: do not rollback VF MAC/VLAN filters we did not configure (bnc#1012382).
- bnx2x: fix possible overrun of VFPF multicast addresses array (bnc#1012382).
- bnx2x: prevent crash when accessing PTP with interface down (bnc#1012382).
- btrfs: add missing memset while reading compressed inline extents (bnc#1012382).
- btrfs: clear space cache inode generation always (bnc#1012382).
- btrfs: embed extent_changeset::range_changed to the structure (dependent patch, bsc#1031395).
- btrfs: qgroup: Fix qgroup reserved space underflow by only freeing reserved ranges (bsc#1031395).
- btrfs: qgroup: Fix qgroup reserved space underflow caused by buffered write and quotas being enabled (bsc#1031395).
- btrfs: qgroup: Introduce extent changeset for qgroup reserve functions (dependent patch, bsc#1031395).
- btrfs: qgroup: Return actually freed bytes for qgroup release or free data (bsc#1031395).
- btrfs: qgroup-test: Fix backport error in qgroup selftest (just to make CONFIG_BTRFS_FS_RUN_SANITY_TESTS pass compile).
- btrfs: ulist: make the finalization function public (dependent patch, bsc#1031395).
- btrfs: ulist: rename ulist_fini to ulist_release (dependent patch, bsc#1031395).
- can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382).
- can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382).
- can: ems_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- can: esd_usb2: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- can: gs_usb: fix return value of the 'set_bittiming' callback (bnc#1012382).
- can: kvaser_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- can: kvaser_usb: Fix comparison bug in kvaser_usb_read_bulk_callback() (bnc#1012382).
- can: kvaser_usb: free buf in error paths (bnc#1012382).
- can: kvaser_usb: ratelimit errors if incomplete messages are received (bnc#1012382).
- can: peak: fix potential bug in packet fragmentation (bnc#1012382).
- can: ti_hecc: Fix napi poll return value for repoll (bnc#1012382).
- can: usb_8dev: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- cdc-acm: apply quirk for card reader (bsc#1060279).
- cdrom: factor out common open_for_* code (bsc#1048585).
- cdrom: wait for tray to close (bsc#1048585).
- ceph: more accurate statfs (bsc#1077068).
- clk: imx6: refine hdmi_isfr's parent to make HDMI work on i.MX6 SoCs w/o VPU (bnc#1012382).
- clk: mediatek: add the option for determining PLL source clock (bnc#1012382).
- clk: tegra: Fix cclk_lp divisor register (bnc#1012382).
- config: arm64: enable HARDEN_BRANCH_PREDICTOR
- config: arm64: enable UNMAP_KERNEL_AT_EL0
- cpuidle: fix broadcast control when broadcast can not be entered (bnc#1012382).
- cpuidle: powernv: Pass correct drv-&gt;cpumask for registration (bnc#1012382).
- cpuidle: Validate cpu_dev in cpuidle_add_sysfs() (bnc#1012382).
- crypto: algapi - fix NULL dereference in crypto_remove_spawns() (bnc#1012382).
- crypto: chacha20poly1305 - validate the digest size (bnc#1012382).
- crypto: chelsio - select CRYPTO_GF128MUL (bsc#1048325).
- crypto: crypto4xx - increase context and scatter ring buffer elements (bnc#1012382).
- crypto: deadlock between crypto_alg_sem/rtnl_mutex/genl_mutex (bnc#1012382).
- crypto: mcryptd - protect the per-CPU queue with a lock (bnc#1012382).
- crypto: n2 - cure use after free (bnc#1012382).
- crypto: pcrypt - fix freeing pcrypt instances (bnc#1012382).
- crypto: s5p-sss - Fix completing crypto request in IRQ handler (bnc#1012382).
- crypto: tcrypt - fix buffer lengths in test_aead_speed() (bnc#1012382).
- cxl: Check if vphb exists before iterating over AFU devices (bsc#1066223).
- dax: Pass detailed error code from __dax_fault() (bsc#1072484).
- dccp: do not restart ccid2_hc_tx_rto_expire() if sk in closed state (bnc#1012382).
- delay: add poll_event_interruptible (bsc#1048585).
- dlm: fix malfunction of dlm_tool caused by debugfs changes (bsc#1077704).
- dmaengine: dmatest: move callback wait queue to thread context (bnc#1012382).
- dmaengine: Fix array index out of bounds warning in __get_unmap_pool() (bnc#1012382).
- dmaengine: pl330: fix double lock (bnc#1012382).
- dmaengine: ti-dma-crossbar: Correct am335x/am43xx mux value type (bnc#1012382).
- dm btree: fix serious bug in btree_split_beneath() (bnc#1012382).
- dm bufio: fix shrinker scans when (nr_to_scan &lt; retain_target) (bnc#1012382).
- dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6 (bnc#1012382).
- drivers/firmware: Expose psci_get_version through psci_ops structure (bsc#1068032).
- drm/amd/amdgpu: fix console deadlock if late init failed (bnc#1012382).
- drm: extra printk() wrapper macros (bnc#1012382).
- drm/exynos/decon5433: set STANDALONE_UPDATE_F on output enablement (bnc#1012382).
- drm/exynos: gem: Drop NONCONTIG flag for buffers allocated without IOMMU (bnc#1012382).
- drm/omap: fix dmabuf mmap for dma_alloc'ed buffers (bnc#1012382).
- drm/radeon: fix atombios on big endian (bnc#1012382).
- drm/radeon: reinstate oland workaround for sclk (bnc#1012382).
- drm/radeon/si: add dpm quirk for Oland (bnc#1012382).
- drm/vmwgfx: Potential off by one in vmw_view_add() (bnc#1012382).
- dynamic-debug-howto: fix optional/omitted ending line number to be LARGE instead of 0 (bnc#1012382).
- edac, i5000, i5400: Fix definition of NRECMEMB register (bnc#1012382).
- edac, i5000, i5400: Fix use of MTR_DRAM_WIDTH macro (bnc#1012382).
- edac, sb_edac: Fix missing break in switch (bnc#1012382).
- eeprom: at24: check at24_read/write arguments (bnc#1012382).
- efi/esrt: Cleanup bad memory map log messages (bnc#1012382).
- efi: Move some sysfs files to be read-only by root (bnc#1012382).
- eventpoll.h: add missing epoll event masks (bnc#1012382).
- ext4: fix crash when a directory's i_size is too small (bnc#1012382).
- ext4: Fix ENOSPC handling in DAX page fault handle (bsc#1072484).
- ext4: fix fdatasync(2) after fallocate(2) operation (bnc#1012382).
- fbdev: controlfb: Add missing modes to fix out of bounds access (bnc#1012382).
- Fix EX_SIZE. We do not have the patches that shave off parts of the exception data.
- Fix mishandling of cases with MSR not being present (writing to MSR even though _state == -1).
- Fix return value from ib[rs|pb]_enabled()
- Fixup hang when calling 'nvme list' on all paths down (bsc#1070052).
- fjes: Fix wrong netdevice feature flags (bnc#1012382).
- flow_dissector: properly cap thoff field (bnc#1012382).
- fm10k: ensure we process SM mbx when processing VF mbx (bnc#1012382).
- fork: clear thread stack upon allocation (bsc#1077560).
- fscache: Fix the default for fscache_maybe_release_page() (bnc#1012382).
- futex: Prevent overflow by strengthen input validation (bnc#1012382).
- gcov: disable for COMPILE_TEST (bnc#1012382).
- gfs2: Take inode off order_write list when setting jdata flag (bnc#1012382).
- gpio: altera: Use handle_level_irq when configured as a level_high (bnc#1012382).
- hid: chicony: Add support for another ASUS Zen AiO keyboard (bnc#1012382).
- hid: xinmo: fix for out of range for THT 2P arcade controller (bnc#1012382).
- hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1012382).
- hv: kvp: Avoid reading past allocated blocks from KVP file (bnc#1012382).
- hwmon: (asus_atk0110) fix uninitialized data access (bnc#1012382).
- i40iw: Account for IPv6 header when setting MSS (bsc#1024376 FATE#321249).
- i40iw: Allocate a sdbuf per CQP WQE (bsc#1024376 FATE#321249).
- i40iw: Cleanup AE processing (bsc#1024376 FATE#321249).
- i40iw: Clear CQP Head/Tail during initialization (bsc#1024376 FATE#321249).
- i40iw: Correct ARP index mask (bsc#1024376 FATE#321249).
- i40iw: Do not allow posting WR after QP is flushed (bsc#1024376 FATE#321249).
- i40iw: Do not free sqbuf when event is I40IW_TIMER_TYPE_CLOSE (bsc#1024376 FATE#321249).
- i40iw: Do not generate CQE for RTR on QP flush (bsc#1024376 FATE#321249).
- i40iw: Do not retransmit MPA request after it is ACKed (bsc#1024376 FATE#321249).
- i40iw: Fixes for static checker warnings (bsc#1024376 FATE#321249).
- i40iw: Ignore AE source field in AEQE for some AEs (bsc#1024376 FATE#321249).
- i40iw: Move cqp_cmd_head init to CQP initialization (bsc#1024376 FATE#321249).
- i40iw: Move exception_lan_queue to VSI structure (bsc#1024376 FATE#321249).
- i40iw: Move MPA request event for loopback after connect (bsc#1024376 FATE#321249).
- i40iw: Notify user of established connection after QP in RTS (bsc#1024376 FATE#321249).
- i40iw: Reinitialize IEQ on MTU change (bsc#1024376 FATE#321249).
- ib/hfi1: Fix misspelling in comment (bsc#973818, fate#319242).
- ib/hfi1: Prevent kernel QP post send hard lockups (bsc#973818 FATE#319242).
- ib/ipoib: Fix lockdep issue found on ipoib_ib_dev_heavy_flush (git-fixes).
- ib/ipoib: Fix race condition in neigh creation (bsc#1022595 FATE#322350).
- ib/ipoib: Grab rtnl lock on heavy flush when calling ndo_open/stop (bnc#1012382).
- ib/mlx4: Increase maximal message size under UD QP (bnc#1012382).
- ib/mlx5: Assign send CQ and recv CQ of UMR QP (bnc#1012382).
- ib/mlx5: Serialize access to the VMA list (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- ibmvnic: Allocate and request vpd in init_resources (bsc#1076872).
- ibmvnic: Do not handle RX interrupts when not up (bsc#1075066).
- ibmvnic: Fix IP offload control buffer (bsc#1076899).
- ibmvnic: Fix IPv6 packet descriptors (bsc#1076899).
- ibmvnic: Fix pending MAC address changes (bsc#1075627).
- ibmvnic: Modify buffer size and number of queues on failover (bsc#1076872).
- ibmvnic: Revert to previous mtu when unsupported value requested (bsc#1076872).
- ibmvnic: Wait for device response when changing MAC (bsc#1078681).
- ib/rdmavt: restore IRQs on error path in rvt_create_ah() (bsc#973818, fate#319242).
- ib/srpt: Disable RDMA access by the initiator (bnc#1012382).
- ib/srpt: Fix ACL lookup during login (bsc#1024296 FATE#321265).
- ib/uverbs: Fix command checking as part of ib_uverbs_ex_modify_qp() (FATE#321231 FATE#321473 FATE#322153 FATE#322149).
- igb: check memory allocation failure (bnc#1012382).
- ima: fix hash algorithm initialization (bnc#1012382).
- inet: frag: release spinlock before calling icmp_send() (bnc#1012382).
- input: 88pm860x-ts - fix child-node lookup (bnc#1012382).
- input: elantech - add new icbody type 15 (bnc#1012382).
- input: i8042 - add TUXEDO BU1406 (N24_25BU) to the nomux list (bnc#1012382).
- input: trackpoint - force 3 buttons if 0 button is reported (bnc#1012382).
- input: twl4030-vibra - fix sibling-node lookup (bnc#1012382).
- input: twl6040-vibra - fix child-node lookup (bnc#1012382).
- input: twl6040-vibra - fix DT node memory management (bnc#1012382).
- intel_th: pci: Add Gemini Lake support (bnc#1012382).
- iommu/arm-smmu-v3: Do not free page table ops twice (bnc#1012382).
- iommu/vt-d: Fix scatterlist offset handling (bnc#1012382).
- ip6_gre: remove the incorrect mtu limit for ipgre tap (bsc#1022912 FATE#321246).
- ip6_tunnel: disable dst caching if tunnel is dual-stack (bnc#1012382).
- ip_gre: remove the incorrect mtu limit for ipgre tap (bsc#1022912 FATE#321246).
- ipmi: Stop timers before cleaning up the module (bnc#1012382).
- ipv4: Fix use-after-free when flushing FIB tables (bnc#1012382).
- ipv4: igmp: guard against silly MTU values (bnc#1012382).
- ipv4: Make neigh lookup keys for loopback/point-to-point devices be INADDR_ANY (bnc#1012382).
- ipv6: Fix getsockopt() for sockets with default IPV6_AUTOFLOWLABEL (bnc#1012382).
- ipv6: fix possible mem leaks in ipv6_make_skb() (bnc#1012382).
- ipv6: fix udpv6 sendmsg crash caused by too small MTU (bnc#1012382).
- ipv6: ip6_make_skb() needs to clear cork.base.dst (git-fixes).
- ipv6: mcast: better catch silly mtu values (bnc#1012382).
- ipv6: reorder icmpv6_init() and ip6_mr_init() (bnc#1012382).
- ipvlan: fix ipv6 outbound device (bnc#1012382).
- ipvlan: remove excessive packet scrubbing (bsc#1070799).
- irda: vlsi_ir: fix check for DMA mapping errors (bnc#1012382).
- irqchip/crossbar: Fix incorrect type of register size (bnc#1012382).
- iscsi_iser: Re-enable 'iser_pi_guard' module parameter (bsc#1062129).
- iscsi-target: fix memory leak in lio_target_tiqn_addtpg() (bnc#1012382).
- iscsi-target: Make TASK_REASSIGN use proper se_cmd-&gt;cmd_kref (bnc#1012382).
- isdn: kcapi: avoid uninitialized data (bnc#1012382).
- iser-target: Fix possible use-after-free in connection establishment error (FATE#321732).
- iw_cxgb4: Only validate the MSN for successful completions (bnc#1012382).
- iw_cxgb4: reflect the original WR opcode in drain cqes (bsc#321658 FATE#1005778 bsc#321660 FATE#1005780 bsc#321661 FATE#1005781).
- iw_cxgb4: when flushing, complete all wrs in a chain (bsc#321658 FATE#1005778 bsc#321660 FATE#1005780 bsc#321661 FATE#1005781).
- ixgbe: fix use of uninitialized padding (bnc#1012382).
- jump_label: Invoke jump_label_test() via early_initcall() (bnc#1012382).
- kabi fix for new hash_cred function (bsc#1012917).
- kabi: Keep KVM stable after enable s390 wire up bpb feature (bsc#1076805).
- kABI: protect struct bpf_map (kabi).
- kABI: protect struct ipv6_pinfo (kabi).
- kABI: protect struct t10_alua_tg_pt_gp (kabi).
- kABI: protect struct usbip_device (kabi).
- kabi/severities: arm64: ignore cpu capability array
- kabi/severities: do not care about stuff_RSB
- kaiser: Set _PAGE_NX only if supported (bnc#1012382).
- kaiser: Set _PAGE_NX only if supported (bnc#1012382).
- kbuild: add '-fno-stack-check' to kernel build options (bnc#1012382).
- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).
- kbuild: pkg: use --transform option to prefix paths in tar (bnc#1012382).
- kdb: Fix handling of kallsyms_symbol_next() return value (bnc#1012382).
- kernel/acct.c: fix the acct-&gt;needcheck check in check_free_space() (bnc#1012382).
- kernel: make groups_sort calling a responsibility group_info allocators (bnc#1012382).
- kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from !sig_kernel_only() signals (bnc#1012382).
- kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL (bnc#1012382).
- kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal() (bnc#1012382).
- keys: add missing permission check for request_key() destination (bnc#1012382).
- kprobes/x86: Disable preemption in ftrace-based jprobes (bnc#1012382).
- kpti: Rename to PAGE_TABLE_ISOLATION (bnc#1012382).
- kpti: Report when enabled (bnc#1012382).
- kvm: Fix stack-out-of-bounds read in write_mmio (bnc#1012382).
- kvm: nVMX: reset nested_run_pending if the vCPU is going to be reset (bnc#1012382).
- kvm: nVMX: VMCLEAR should not cause the vCPU to shut down (bnc#1012382).
- kvm: pci-assign: do not map smm memory slot pages in vt-d page tables (bnc#1012382).
- kvm: s390: Enable all facility bits that are known good for passthrough (bsc#1076805).
- kvm: s390: wire up bpb feature (bsc#1076805).
- kvm: VMX: Fix enable VPID conditions (bnc#1012382).
- kvm: VMX: remove I/O port 0x80 bypass on Intel hosts (bnc#1012382).
- kvm: vmx: Scrub hardware GPRs at VM-exit (bnc#1012382 bsc#1068032).
- kvm: x86: Add memory barrier on vmcs field lookup (bnc#1012382).
- kvm: x86: correct async page present tracepoint (bnc#1012382).
- kvm: x86: Exit to user-mode on #UD intercept when emulator requires (bnc#1012382).
- kvm: X86: Fix load RFLAGS w/o the fixed bit (bnc#1012382).
- kvm: x86: fix RSM when PCID is non-zero (bnc#1012382).
- kvm: x86: inject exceptions produced by x86_decode_insn (bnc#1012382).
- kvm: x86: pvclock: Handle first-time write to pvclock-page contains random junk (bnc#1012382).
- l2tp: cleanup l2tp_tunnel_delete calls (bnc#1012382).
- lan78xx: Fix failure in USB Full Speed (bnc#1012382).
- libata: apply MAX_SEC_1024 to all LITEON EP1 series devices (bnc#1012382).
- libata: drop WARN from protocol error in ata_sff_qc_issue() (bnc#1012382).
- lib/genalloc.c: make the avail variable an atomic_long_t (bnc#1012382).
- macvlan: Only deliver one copy of the frame to the macvlan interface (bnc#1012382).
- md: more open-coded offset_in_page() (bsc#1076110).
- media: dvb: i2c transfers over usb cannot be done from stack (bnc#1012382).
- mfd: cros ec: spi: Do not send first message too soon (bnc#1012382).
- mfd: twl4030-audio: Fix sibling-node lookup (bnc#1012382).
- mfd: twl6040: Fix child-node lookup (bnc#1012382).
- mlxsw: reg: Fix SPVMLR max record count (bnc#1012382).
- mlxsw: reg: Fix SPVM max record count (bnc#1012382).
- mm: avoid returning VM_FAULT_RETRY from -&gt;page_mkwrite handlers (bnc#1012382).
- mmc: core: Do not leave the block driver in a suspended state (bnc#1012382).
- mmc: mediatek: Fixed bug where clock frequency could be set wrong (bnc#1012382).
- mm: drop unused pmdp_huge_get_and_clear_notify() (bnc#1012382).
- mm: Handle 0 flags in _calc_vm_trans() macro (bnc#1012382).
- mm/mprotect: add a cond_resched() inside change_pmd_range() (bnc#1077871, bnc#1078002).
- mm/vmstat: Make NR_TLB_REMOTE_FLUSH_RECEIVED available even on UP (bnc#1012382).
- module: Add retpoline tag to VERMAGIC (bnc#1012382).
- module: set __jump_table alignment to 8 (bnc#1012382).
- more bio_map_user_iov() leak fixes (bnc#1012382).
- mtd: nand: Fix writing mtdoops to nand flash (bnc#1012382).
- net: Allow neigh contructor functions ability to modify the primary_key (bnc#1012382).
- net/appletalk: Fix kernel memory disclosure (bnc#1012382).
- net: bcmgenet: correct MIB access of UniMAC RUNT counters (bnc#1012382).
- net: bcmgenet: correct the RBUF_OVFL_CNT and RBUF_ERR_CNT MIB values (bnc#1012382).
- net: bcmgenet: power down internal phy if open or resume fails (bnc#1012382).
- net: bcmgenet: Power up the internal PHY before probing the MII (bnc#1012382).
- net: bcmgenet: reserved phy revisions must be checked first (bnc#1012382).
- net: bridge: fix early call to br_stp_change_bridge_id and plug newlink leaks (bnc#1012382).
- net: core: fix module type in sock_diag_bind (bnc#1012382).
- net: Do not allow negative values for busy_read and busy_poll sysctl interfaces (bnc#1012382).
- net: fec: fix multicast filtering hardware setup (bnc#1012382).
- netfilter: bridge: honor frag_max_size when refragmenting (bnc#1012382).
- netfilter: do not track fragmented packets (bnc#1012382).
- netfilter: ipvs: Fix inappropriate output of procfs (bnc#1012382).
- netfilter: nfnetlink_queue: fix secctx memory leak (bnc#1012382).
- netfilter: nfnetlink_queue: fix timestamp attribute (bsc#1074134).
- netfilter: nfnl_cthelper: fix a race when walk the nf_ct_helper_hash table (bnc#1012382).
- netfilter: nfnl_cthelper: Fix memory leak (bnc#1012382).
- netfilter: nfnl_cthelper: fix runtime expectation policy updates (bnc#1012382).
- net: Fix double free and memory corruption in get_net_ns_by_id() (bnc#1012382).
- net: igmp: fix source address check for IGMPv3 reports (bnc#1012382).
- net: igmp: Use correct source address on IGMPv3 reports (bnc#1012382).
- net: initialize msg.msg_flags in recvfrom (bnc#1012382).
- net: ipv4: fix for a race condition in raw_sendmsg (bnc#1012382).
- netlink: add a start callback for starting a netlink dump (bnc#1012382).
- net/mac80211/debugfs.c: prevent build failure with CONFIG_UBSAN=y (bnc#1012382).
- net/mlx5: Avoid NULL pointer dereference on steering cleanup (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Cleanup IRQs in case of unload failure (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: Add refcount to VXLAN structure (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: Fix ETS BW check (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: Fix features check of IPv6 traffic (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: Fix fixpoint divide exception in mlx5e_am_stats_compare (bsc#1015342).
- net/mlx5e: Fix possible deadlock of VXLAN lock (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: Prevent possible races in VXLAN control flow (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5: Fix error flow in CREATE_QP command (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Fix rate limit packet pacing naming and struct (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Stay in polling mode when command EQ destroy fails (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net: mvmdio: disable/unprepare clocks in EPROBE_DEFER case (bnc#1012382).
- net: mvneta: clear interface link status on port disable (bnc#1012382).
- net: mvneta: eliminate wrong call to handle rx descriptor error (fate#319899).
- net: mvneta: use proper rxq_number in loop on rx queues (fate#319899).
- net/packet: fix a race in packet_bind() and packet_notifier() (bnc#1012382).
- net: phy: at803x: Change error to EINVAL for invalid MAC (bnc#1012382).
- net: phy: micrel: ksz9031: reconfigure autoneg after phy autoneg workaround (bnc#1012382).
- net: qdisc_pkt_len_init() should be more robust (bnc#1012382).
- net: qmi_wwan: add Sierra EM7565 1199:9091 (bnc#1012382).
- net: qmi_wwan: Add USB IDs for MDM6600 modem on Motorola Droid 4 (bnc#1012382).
- net: reevalulate autoflowlabel setting after sysctl setting (bnc#1012382).
- net: Resend IGMP memberships upon peer notification (bnc#1012382).
- net: sctp: fix array overrun read on sctp_timer_tbl (bnc#1012382).
- net: stmmac: enable EEE in MII, GMII or RGMII only (bnc#1012382).
- net: systemport: Pad packet before inserting TSB (bnc#1012382).
- net: systemport: Utilize skb_put_padto() (bnc#1012382).
- net: tcp: close sock if net namespace is exiting (bnc#1012382).
- net: wimax/i2400m: fix NULL-deref at probe (bnc#1012382).
- nfsd: auth: Fix gid sorting when rootsquash enabled (bnc#1012382).
- nfsd: Fix another OPEN stateid race (bnc#1012382).
- nfsd: fix nfsd_minorversion(.., NFSD_AVAIL) (bnc#1012382).
- nfsd: fix nfsd_reset_versions for NFSv4 (bnc#1012382).
- nfsd: Fix stateid races between OPEN and CLOSE (bnc#1012382).
- nfsd: Make init_open_stateid() a bit more whole (bnc#1012382).
- nfs: Do not take a reference on fl-&gt;fl_file for LOCK operation (bnc#1012382).
- nfs: Fix a typo in nfs_rename() (bnc#1012382).
- nfs: improve shinking of access cache (bsc#1012917).
- nfsv4.1 respect server's max size in CREATE_SESSION (bnc#1012382).
- nfsv4: Fix client recovery when server reboots multiple times (bnc#1012382).
- nohz: Prevent a timer interrupt storm in tick_nohz_stop_sched_tick() (bnc#1012382).
- n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD) (bnc#1012382).
- nvme_fc: correct hang in nvme_ns_remove() (bsc#1075811).
- nvme_fc: fix rogue admin cmds stalling teardown (bsc#1075811).
- nvme-pci: Remove watchdog timer (bsc#1066163).
- openrisc: fix issue handling 8 byte get_user calls (bnc#1012382).
- packet: fix crash in fanout_demux_rollover() (bnc#1012382).
- parisc: Fix alignment of pa_tlb_lock in assembly on 32-bit SMP kernel (bnc#1012382).
- parisc: Hide Diva-built-in serial aux and graphics card (bnc#1012382).
- partially revert tipc improve link resiliency when rps is activated (bsc#1068038).
- pci/AER: Report non-fatal errors only to the affected endpoint (bnc#1012382).
- pci: Avoid bus reset if bridge itself is broken (bnc#1012382).
- pci: Create SR-IOV virtfn/physfn links before attaching driver (bnc#1012382).
- pci: Detach driver before procfs &amp; sysfs teardown on device remove (bnc#1012382).
- pci/PME: Handle invalid data when reading Root Status (bnc#1012382).
- pci / PM: Force devices to D0 in pci_pm_thaw_noirq() (bnc#1012382).
- perf symbols: Fix symbols__fixup_end heuristic for corner cases (bnc#1012382).
- perf test attr: Fix ignored test case result (bnc#1012382).
- phy: work around 'phys' references to usb-nop-xceiv devices (bnc#1012382).
- pinctrl: adi2: Fix Kconfig build problem (bnc#1012382).
- pinctrl: st: add irq_request/release_resources callbacks (bnc#1012382).
- pipe: avoid round_pipe_size() nr_pages overflow on 32-bit (bnc#1012382).
- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1075087).
- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).
- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).
- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1075087).
- powerpc/64s: Add support for RFI flush of L1-D cache (bsc#1068032,  bsc#1075087).
- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032, bsc#1075087).
- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).
- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075087).
- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1075087).
- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).
- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1075087).
- powerpc/ipic: Fix status get and status clear (bnc#1012382).
- powerpc/perf: Dereference BHRB entries safely (bsc#1066223).
- powerpc/perf/hv-24x7: Fix incorrect comparison in memord (bnc#1012382).
- powerpc/powernv: Check device-tree for RFI flush settings (bsc#1068032,  bsc#1075087).
- powerpc/powernv/cpufreq: Fix the frequency read by /proc/cpuinfo (bnc#1012382).
- powerpc/powernv/ioda2: Gracefully fail if too many TCE levels requested (bnc#1012382).
- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1075087).
- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032, bsc#1075087).
- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032,  bsc#1075087).
- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: prevent crash when changing flush type to fallback after system boot (bsc#1068032, bsc#1075087).
- ppp: Destroy the mutex when cleanup (bnc#1012382).
- pppoe: take -&gt;needed_headroom of lower device into account on xmit (bnc#1012382).
- pti: unbreak EFI (bsc#1074709).
- r8152: fix the list rx_done may be used without initialization (bnc#1012382).
- r8152: prevent the driver from transmitting packets with carrier off (bnc#1012382).
- r8169: fix memory corruption on retrieval of hardware statistics (bnc#1012382).
- raid5: Set R5_Expanded on parity devices as well as data (bnc#1012382).
- ravb: Remove Rx overflow log messages (bnc#1012382).
- rbd: set max_segments to USHRT_MAX (bnc#1012382).
- rdma/cma: Avoid triggering undefined behavior (bnc#1012382).
- rdma/i40iw: Remove MSS change support (bsc#1024376 FATE#321249).
- rds: Fix NULL pointer dereference in __rds_rdma_map (bnc#1012382).
- rds: Heap OOB write in rds_message_alloc_sgs() (bnc#1012382).
- rds: null pointer dereference in rds_atomic_free_op (bnc#1012382).
- Re-enable fixup detection by CPU type in case hypervisor call fails.
- regulator: core: Rely on regulator_dev_release to free constraints (bsc#1074847).
- regulator: da9063: Return an error code on probe failure (bsc#1074847).
- regulator: pwm: Fix regulator ramp delay for continuous mode (bsc#1074847).
- regulator: Try to resolve regulators supplies on registration (bsc#1074847).
- Revert 'Bluetooth: btusb: driver to enable the usb-wakeup feature' (bnc#1012382).
- Revert 'drm/armada: Fix compile fail' (bnc#1012382).
- Revert 'drm/radeon: dont switch vt on suspend' (bnc#1012382).
- Revert 'ipsec: Fix aborted xfrm policy dump crash' (kabi).
- Revert 'kaiser: vmstat show NR_KAISERTABLE as nr_overhead' (kabi).
- Revert 'lib/genalloc.c: make the avail variable an atomic_long_t' (kabi).
- Revert 'module: Add retpoline tag to VERMAGIC' (bnc#1012382 kabi).
- Revert 'module: Add retpoline tag to VERMAGIC' (kabi).
- Revert 'netlink: add a start callback for starting a netlink dump' (kabi).
- Revert 'ocfs2: should wait dio before inode lock in ocfs2_setattr()' (bnc#1012382).
- Revert 'Re-enable fixup detection by CPU type in case hypervisor call fails.' The firmware update is required for the existing instructions to also do the cache flush.
- Revert 's390/kbuild: enable modversions for symbols exported from asm' (bnc#1012382).
- Revert 'sched/deadline: Use the revised wakeup rule for suspending constrained dl tasks' (kabi).
- Revert 'scsi: libsas: align sata_device's rps_resp on a cacheline' (kabi).
- Revert 'spi: SPI_FSL_DSPI should depend on HAS_DMA' (bnc#1012382).
- Revert 'userfaultfd: selftest: vm: allow to build in vm/ directory' (bnc#1012382).
- Revert 'x86/efi: Build our own page table structures' (bnc#1012382).
- Revert 'x86/efi: Hoist page table switching code into efi_call_virt()' (bnc#1012382).
- Revert 'x86/mm/pat: Ensure cpa-&gt;pfn only contains page frame numbers' (bnc#1012382).
- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075087).
- ring-buffer: Mask out the info bits when returning buffer page length (bnc#1012382).
- route: also update fnhe_genid when updating a route cache (bnc#1012382).
- route: update fnhe_expires for redirect when the fnhe exists (bnc#1012382).
- rtc: cmos: Initialize hpet timer before irq is registered (bsc#1077592).
- rtc: pcf8563: fix output clock rate (bnc#1012382).
- rtc: pl031: make interrupt optional (bnc#1012382).
- rtc: set the alarm to the next expiring timer (bnc#1012382).
- s390: always save and restore all registers on context switch (bnc#1012382).
- s390/cpuinfo: show facilities as reported by stfle (bnc#1076847, LTC#163740).
- s390: fix compat system call table (bnc#1012382).
- s390/pci: do not require AIS facility (bnc#1012382).
- s390/qeth: no ETH header for outbound AF_IUCV (LTC#156276 bnc#1012382 bnc#1053472).
- s390/runtime instrumentation: simplify task exit handling (bnc#1012382).
- sch_dsmark: fix invalid skb_cow() usage (bnc#1012382).
- sched/deadline: Make sure the replenishment timer fires in the next period (bnc#1012382).
- sched/deadline: Throttle a constrained deadline task activated after the deadline (bnc#1012382).
- sched/deadline: Use deadline instead of period when calculating overflow (bnc#1012382).
- sched/deadline: Use the revised wakeup rule for suspending constrained dl tasks (bnc#1012382).
- sched/deadline: Zero out positive runtime after throttling constrained tasks (git-fixes).
- sched/rt: Do not pull from current CPU if only one CPU to pull (bnc#1022476).
- scsi: bfa: integer overflow in debugfs (bnc#1012382).
- scsi: cxgb4i: fix Tx skb leak (bnc#1012382).
- scsi: handle ABORTED_COMMAND on Fujitsu ETERNUS (bsc#1069138).
- scsi: hpsa: cleanup sas_phy structures in sysfs when unloading (bnc#1012382).
- scsi: hpsa: destroy sas transport properties before scsi_host (bnc#1012382).
- scsi: libsas: align sata_device's rps_resp on a cacheline (bnc#1012382).
- scsi: lpfc: Use after free in lpfc_rq_buf_free() (bsc#1037838).
- scsi: mpt3sas: Fix IO error occurs on pulling out a drive from RAID1 volume created on two SATA drive (bnc#1012382).
- scsi: sd: change allow_restart to bool in sysfs interface (bnc#1012382).
- scsi: sd: change manage_start_stop to bool in sysfs interface (bnc#1012382).
- scsi: sg: disable SET_FORCE_LOW_DMA (bnc#1012382).
- scsi: sr: wait for the medium to become ready (bsc#1048585).
- sctp: do not allow the v4 socket to bind a v4mapped v6 address (bnc#1012382).
- sctp: do not free asoc when it is already dead in sctp_sendmsg (bnc#1012382).
- sctp: Replace use of sockets_allocated with specified macro (bnc#1012382).
- sctp: return error if the asoc has been peeled off in sctp_wait_for_sndbuf (bnc#1012382).
- sctp: use the right sk after waking up from wait_buf sleep (bnc#1012382).
- selftest/powerpc: Fix false failures for skipped tests (bnc#1012382).
- selftests/x86: Add test_vsyscall (bnc#1012382).
- selftests/x86/ldt_get: Add a few additional tests for limits (bnc#1012382).
- serial: 8250_pci: Add Amazon PCI serial device ID (bnc#1012382).
- serial: 8250: Preserve DLD[7:4] for PORT_XR17V35X (bnc#1012382).
- series.conf: move core networking (including netfilter) into sorted section
- series.conf: whitespace cleanup
- Set supported_modules_check 1 (bsc#1072163).
- sfc: do not warn on successful change of MAC (bnc#1012382).
- sh_eth: fix SH7757 GEther initialization (bnc#1012382).
- sh_eth: fix TSU resource handling (bnc#1012382).
- sit: update frag_off info (bnc#1012382).
- sock: free skb in skb_complete_tx_timestamp on error (bnc#1012382).
- sparc64/mm: set fields in deferred pages (bnc#1012382).
- spi_ks8995: fix 'BUG: key accdaa28 not in .data!' (bnc#1012382).
- spi: sh-msiof: Fix DMA transfer size check (bnc#1012382).
- spi: xilinx: Detect stall with Unknown commands (bnc#1012382).
- staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl (bnc#1012382).
- sunrpc: add auth_unix hash_cred() function (bsc#1012917).
- sunrpc: add generic_auth hash_cred() function (bsc#1012917).
- sunrpc: add hash_cred() function to rpc_authops struct (bsc#1012917).
- sunrpc: add RPCSEC_GSS hash_cred() function (bsc#1012917).
- sunrpc: Fix rpc_task_begin trace point (bnc#1012382).
- sunrpc: replace generic auth_cred hash with auth-specific function (bsc#1012917).
- sunrpc: use supplimental groups in auth hash (bsc#1012917).
- sunxi-rsb: Include OF based modalias in device uevent (bnc#1012382).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- sysrq : fix Show Regs call trace on ARM (bnc#1012382).
- target: Avoid early CMD_T_PRE_EXECUTE failures during ABORT_TASK (bnc#1012382).
- target/file: Do not return error for UNMAP if length is zero (bnc#1012382).
- target: fix ALUA transition timeout handling (bnc#1012382).
- target:fix condition return in core_pr_dump_initiator_port() (bnc#1012382).
- target: fix race during implicit transition work flushes (bnc#1012382).
- target/iscsi: Fix a race condition in iscsit_add_reject_from_cmd() (bnc#1012382).
- target: Use system workqueue for ALUA transitions (bnc#1012382).
- tcp: correct memory barrier usage in tcp_check_space() (bnc#1012382).
- tcp: fix under-evaluated ssthresh in TCP Vegas (bnc#1012382).
- tcp md5sig: Use skb's saddr when replying to an incoming segment (bnc#1012382).
- tcp: __tcp_hdrlen() helper (bnc#1012382).
- tg3: Fix rx hang on MTU change with 5717/5719 (bnc#1012382).
- thermal/drivers/step_wise: Fix temperature regulation misbehavior (bnc#1012382).
- thermal: hisilicon: Handle return value of clk_prepare_enable (bnc#1012382).
- tipc: fix cleanup at module unload (bnc#1012382).
- tipc: fix memory leak in tipc_accept_from_sock() (bnc#1012382).
- tipc: improve link resiliency when rps is activated (bsc#1068038).
- tracing: Allocate mask_str buffer dynamically (bnc#1012382).
- tracing: Fix converting enum's from the map in trace_event_eval_update() (bnc#1012382).
- tracing: Fix crash when it fails to alloc ring buffer (bnc#1012382).
- tracing: Fix possible double free on failure of allocating trace buffer (bnc#1012382).
- tracing: Remove extra zeroing out of the ring buffer page (bnc#1012382).
- tty fix oops when rmmod 8250 (bnc#1012382).
- uas: Always apply US_FL_NO_ATA_1X quirk to Seagate devices (bnc#1012382).
- uas: ignore UAS for Norelsys NS1068(X) chips (bnc#1012382).
- udf: Avoid overflow when session starts at large offset (bnc#1012382).
- um: link vmlinux with -no-pie (bnc#1012382).
- usb: Add device quirk for Logitech HD Pro Webcam C925e (bnc#1012382).
- usb: add RESET_RESUME for ELSA MicroLink 56K (bnc#1012382).
- usb: core: Add type-specific length check of BOS descriptors (bnc#1012382).
- usb: core: prevent malicious bNumInterfaces overflow (bnc#1012382).
- usb: devio: Prevent integer overflow in proc_do_submiturb() (bnc#1012382).
- usb: Fix off by one in type-specific length check of BOS SSP capability (git-fixes).
- usb: fix usbmon BUG trigger (bnc#1012382).
- usb: gadget: configs: plug memory leak (bnc#1012382).
- usb: gadget: ffs: Forbid usb_ep_alloc_request from sleeping (bnc#1012382).
- usb: gadgetfs: Fix a potential memory leak in 'dev_config()' (bnc#1012382).
- usb: gadget: f_uvc: Sanity check wMaxPacketSize for SuperSpeed (bnc#1012382).
- usb: gadget: udc: remove pointer dereference after free (bnc#1012382).
- usb: hub: Cycle HUB power when initialization fails (bnc#1012382).
- usb: Increase usbfs transfer limit (bnc#1012382).
- usbip: Fix implicit fallthrough warning (bnc#1012382).
- usbip: Fix potential format overflow in userspace tools (bnc#1012382).
- usbip: fix stub_rx: get_pipe() to validate endpoint number (bnc#1012382).
- usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input (bnc#1012382).
- usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer (bnc#1012382).
- usbip: fix usbip bind writing random string after command in match_busid (bnc#1012382).
- usbip: prevent leaking socket pointer address in messages (bnc#1012382).
- usbip: prevent vhci_hcd driver from leaking a socket pointer address (bnc#1012382).
- usbip: remove kernel addresses from usb device and urb debug msgs (bnc#1012382).
- usbip: stub: stop printing kernel pointer addresses in messages (bnc#1012382).
- usbip: vhci: stop printing kernel pointer addresses in messages (bnc#1012382).
- usb: misc: usb3503: make sure reset is low for at least 100us (bnc#1012382).
- usb: musb: da8xx: fix babble condition handling (bnc#1012382).
- usb: phy: isp1301: Add OF device ID table (bnc#1012382).
- usb: phy: isp1301: Fix build warning when CONFIG_OF is disabled (git-fixes).
- usb: phy: tahvo: fix error handling in tahvo_usb_probe() (bnc#1012382).
- usb: quirks: Add no-lpm quirk for KY-688 USB 3.1 Type-C Hub (bnc#1012382).
- usb: serial: cp210x: add IDs for LifeScan OneTouch Verio IQ (bnc#1012382).
- usb: serial: cp210x: add new device ID ELV ALC 8xxx (bnc#1012382).
- usb: serial: ftdi_sio: add id for Airbus DS P8GR (bnc#1012382).
- usb: serial: option: adding support for YUGA CLM920-NC5 (bnc#1012382).
- usb: serial: option: add Quectel BG96 id (bnc#1012382).
- usb: serial: option: add support for Telit ME910 PID 0x1101 (bnc#1012382).
- usb: serial: qcserial: add Sierra Wireless EM7565 (bnc#1012382).
- usb: uas and storage: Add US_FL_BROKEN_FUA for another JMicron JMS567 ID (bnc#1012382).
- usb: usbfs: Filter flags passed in from user space (bnc#1012382).
- usb: usbip: Fix possible deadlocks reported by lockdep (bnc#1012382).
- usb: xhci: Add XHCI_TRUST_TX_LENGTH for Renesas uPD720201 (bnc#1012382).
- usb: xhci: fix panic in xhci_free_virt_devices_depth_first (bnc#1012382).
- userfaultfd: selftest: vm: allow to build in vm/ directory (bnc#1012382).
- userfaultfd: shmem: __do_fault requires VM_FAULT_NOPAGE (bnc#1012382).
- video: fbdev: au1200fb: Release some resources if a memory allocation fails (bnc#1012382).
- video: fbdev: au1200fb: Return an error code if a memory allocation fails (bnc#1012382).
- virtio: release virtio index when fail to device_register (bnc#1012382).
- vmxnet3: repair memory leak (bnc#1012382).
- vsyscall: Fix permissions for emulate mode with KAISER/PTI (bnc#1012382).
- vt6655: Fix a possible sleep-in-atomic bug in vt6655_suspend (bnc#1012382).
- vti6: Do not report path MTU below IPV6_MIN_MTU (bnc#1012382).
- vti6: fix device register to report IFLA_INFO_KIND (bnc#1012382).
- workqueue: trigger WARN if queue_delayed_work() is called with NULL @wq (bnc#1012382).
- writeback: fix memory leak in wb_queue_work() (bnc#1012382).
- x.509: fix buffer overflow detection in sprint_oid() (bsc#1075078).
- x509: fix printing uninitialized stack memory when OID is empty (bsc#1075078).
- x.509: reject invalid BIT STRING for subjectPublicKey (bnc#1012382).
- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).
- x86/alternatives: Add missing '\n' at end of ALTERNATIVE inline asm (bnc#1012382).
- x86/alternatives: Fix optimize_nops() checking (bnc#1012382).
- x86/apic/vector: Fix off by one in error path (bnc#1012382).
- x86/asm/32: Make sync_core() handle missing CPUID on all 32-bit kernels (bnc#1012382).
- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).
- x86/cpu: Factor out application of forced CPU caps (bnc#1012382).
- x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).
- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).
- x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).
- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- x86/cpu: Merge bugs.c and bugs_64.c (bnc#1012382).
- x86/cpu: Rename Merrifield2 to Moorefield (bsc#985025).
- x86/cpu: Rename 'WESTMERE2' family to 'NEHALEM_G' (bsc#985025).
- x86/cpu, x86/pti: Do not enable PTI on AMD processors (bnc#1012382).
- x86/Documentation: Add PTI description (bnc#1012382).
- x86/efi-bgrt: Replace early_memremap() with memremap() (bnc#1012382).
- x86/efi: Build our own page table structures (fate#320512).
- x86/efi: Hoist page table switching code into efi_call_virt() (fate#320512).
- x86/entry: Use SYSCALL_DEFINE() macros for sys_modify_ldt() (bnc#1012382).
- x86/hpet: Prevent might sleep splat on resume (bnc#1012382).
- x86/kasan: Clear kasan_zero_page after TLB flush (bnc#1012382).
- x86/kasan: Write protect kasan zero shadow (bnc#1012382).
- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bnc#1012382).
- x86/microcode/intel: Extend BDW late-loading with a revision check (bnc#1012382).
- x86/mm/32: Move setup_clear_cpu_cap(X86_FEATURE_PCID) earlier (git-fixes).
- x86/mm: Disable PCID on 32-bit kernels (bnc#1012382).
- x86/mm/pat: Ensure cpa-&gt;pfn only contains page frame numbers (fate#320588).
- x86/PCI: Make broadcom_postcore_init() check acpi_disabled (bnc#1012382).
- x86/pti: Document fix wrong index (bnc#1012382).
- x86/pti/efi: broken conversion from efi to kernel page table (bnc#1012382).
- x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).
- x86/smpboot: Remove stale TLB flush invocations (bnc#1012382).
- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
- x86/tlb: Drop the _GPL from the cpu_tlbstate export (bnc#1012382).
- x86/vm86/32: Switch to flush_tlb_mm_range() in mark_screen_rdonly() (bnc#1012382).
- xen-netfront: avoid crashing on resume after a failure in talk_to_netback() (bnc#1012382).
- xen-netfront: Improve error handling during initialization (bnc#1012382).
- xfrm: Copy policy family in clone_policy (bnc#1012382).
- xfs: add configurable error support to metadata buffers (bsc#1068569).
- xfs: add configuration handlers for specific errors (bsc#1068569).
- xfs: add configuration of error failure speed (bsc#1068569).
- xfs: add 'fail at unmount' error handling configuration (bsc#1068569).
- xfs: Add infrastructure needed for error propagation during buffer IO failure (bsc#1068569).
- xfs: address kabi for xfs buffer retry infrastructure (kabi).
- xfs: configurable error behavior via sysfs (bsc#1068569).
- xfs: fix incorrect extent state in xfs_bmap_add_extent_unwritten_real (bnc#1012382).
- xfs: fix log block underflow during recovery cycle verification (bnc#1012382).
- xfs: fix up inode32/64 (re)mount handling (bsc#1069160).
- xfs: introduce metadata IO error class (bsc#1068569).
- xfs: introduce table-based init for error behaviors (bsc#1068569).
- xfs: Properly retry failed inode items in case of error during buffer writeback (bsc#1068569).
- xfs: remove xfs_trans_ail_delete_bulk (bsc#1068569).
- xhci: Do not add a virt_dev to the devs array before it's fully allocated (bnc#1012382).
- xhci: Fix ring leak in failure path of xhci_alloc_virt_device() (bnc#1012382).
- xhci: plat: Register shutdown for xhci_plat (bnc#1012382).
- zram: set physical queue limits to avoid array out of bounds accesses (bnc#1012382).
- x86/microcode/intel: Fix BDW late-loading revision check (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-07"/>
	<updated date="2018-02-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005778">SUSE bug 1005778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005780">SUSE bug 1005780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005781">SUSE bug 1005781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012917">SUSE bug 1012917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015342">SUSE bug 1015342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015343">SUSE bug 1015343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019784">SUSE bug 1019784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022476">SUSE bug 1022476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022595">SUSE bug 1022595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022912">SUSE bug 1022912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024296">SUSE bug 1024296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024376">SUSE bug 1024376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031395">SUSE bug 1031395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031492">SUSE bug 1031492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037838">SUSE bug 1037838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038078">SUSE bug 1038078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038085">SUSE bug 1038085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040182">SUSE bug 1040182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043652">SUSE bug 1043652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048325">SUSE bug 1048325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048585">SUSE bug 1048585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053472">SUSE bug 1053472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060279">SUSE bug 1060279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062129">SUSE bug 1062129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066163">SUSE bug 1066163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068038">SUSE bug 1068038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068569">SUSE bug 1068569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068984">SUSE bug 1068984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069138">SUSE bug 1069138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069160">SUSE bug 1069160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070052">SUSE bug 1070052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070799">SUSE bug 1070799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072163">SUSE bug 1072163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072484">SUSE bug 1072484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073229">SUSE bug 1073229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073928">SUSE bug 1073928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074134">SUSE bug 1074134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074488">SUSE bug 1074488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074709">SUSE bug 1074709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074839">SUSE bug 1074839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074847">SUSE bug 1074847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075066">SUSE bug 1075066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075078">SUSE bug 1075078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075087">SUSE bug 1075087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075397">SUSE bug 1075397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075428">SUSE bug 1075428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075617">SUSE bug 1075617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075621">SUSE bug 1075621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075627">SUSE bug 1075627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075811">SUSE bug 1075811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076110">SUSE bug 1076110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076187">SUSE bug 1076187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076232">SUSE bug 1076232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076805">SUSE bug 1076805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076847">SUSE bug 1076847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076872">SUSE bug 1076872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076899">SUSE bug 1076899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077068">SUSE bug 1077068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077592">SUSE bug 1077592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077704">SUSE bug 1077704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077871">SUSE bug 1077871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078002">SUSE bug 1078002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078681">SUSE bug 1078681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963844">SUSE bug 963844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966170">SUSE bug 966170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966172">SUSE bug 966172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973818">SUSE bug 973818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985025">SUSE bug 985025</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-15129/">CVE-2017-15129 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15129">CVE-2017-15129 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17712/">CVE-2017-17712 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17712">CVE-2017-17712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17862/">CVE-2017-17862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17862">CVE-2017-17862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17864/">CVE-2017-17864 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17864">CVE-2017-17864 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18017/">CVE-2017-18017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18017">CVE-2017-18017 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000004">CVE-2018-1000004 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5332">CVE-2018-5332 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5333/">CVE-2018-5333 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5333">CVE-2018-5333 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553468" comment="kernel-default-4.4.114-94.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553469" comment="kernel-default-base-4.4.114-94.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553470" comment="kernel-default-devel-4.4.114-94.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553471" comment="kernel-default-man-4.4.114-94.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520369" comment="kernel-devel-4.4.114-94.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520370" comment="kernel-macros-4.4.114-94.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520371" comment="kernel-source-4.4.114-94.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553472" comment="kernel-syms-4.4.114-94.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149621" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1077993" ref_url="https://bugzilla.suse.com/1077993" source="BUGZILLA"/>
		<reference ref_id="1078806" ref_url="https://bugzilla.suse.com/1078806" source="BUGZILLA"/>
		<reference ref_id="1078813" ref_url="https://bugzilla.suse.com/1078813" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-5130" ref_url="https://www.suse.com/security/cve/CVE-2017-5130/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003716.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes one issue.

This security issue was fixed:

- CVE-2017-15412: Prevent use after free when calling XPath extension functions
  that allowed remote attackers to cause DoS or potentially RCE (bsc#1077993)
- CVE-2016-5131: Use-after-free vulnerability in libxml2 allowed
  remote attackers to cause a denial of service or possibly have
  unspecified other impact via vectors related to the XPointer range-to
  function. (bsc#1078813)
- CVE-2017-5130: Fixed a potential remote buffer overflow in function
  xmlMemoryStrdup() (bsc#1078806)

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-08"/>
	<updated date="2018-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077993">SUSE bug 1077993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078806">SUSE bug 1078806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078813">SUSE bug 1078813</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5131">CVE-2016-5131 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15412">CVE-2017-15412 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5130/">CVE-2017-5130 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5130">CVE-2017-5130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550651" comment="libxml2-2-2.9.4-46.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550652" comment="libxml2-2-32bit-2.9.4-46.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533151" comment="libxml2-doc-2.9.4-46.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550653" comment="libxml2-tools-2.9.4-46.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550654" comment="python-libxml2-2.9.4-46.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149622" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1112209" ref_url="https://bugzilla.suse.com/1112209" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="1113742" ref_url="https://bugzilla.suse.com/1113742" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004875.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- Add missing timing side channel patch for DSA signature generation (bsc#1113742).

Non-security issues fixed:

- Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-22"/>
	<updated date="2018-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112209">SUSE bug 1112209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113742">SUSE bug 1113742</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0734">CVE-2018-0734 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5407">CVE-2018-5407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009541801" comment="libopenssl-devel-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553473" comment="libopenssl1_0_0-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550657" comment="libopenssl1_0_0-32bit-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553474" comment="libopenssl1_0_0-hmac-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550659" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553475" comment="openssl-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530332" comment="openssl-doc-1.0.2j-60.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149623" version="1" class="patch">
	<metadata>
		<title>Security update for rpm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="943457" ref_url="https://bugzilla.suse.com/943457" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7500" ref_url="https://www.suse.com/security/cve/CVE-2017-7500/" source="CVE"/>
		<reference ref_id="CVE-2017-7501" ref_url="https://www.suse.com/security/cve/CVE-2017-7501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004885.html" source="SUSE-SU"/>
		<description>
This update for rpm fixes the following issues:

These security issues were fixed:

- CVE-2017-7500: rpm did not properly handle RPM installations when a
  destination path was a symbolic link to a directory, possibly changing
  ownership and permissions of an arbitrary directory, and RPM files being placed
  in an arbitrary destination (bsc#943457).
- CVE-2017-7501: rpm used temporary files with predictable names when
  installing an RPM. An attacker with ability to write in a directory where files
  will be installed could create symbolic links to an arbitrary location and
  modify content, and possibly permissions to arbitrary files, which could be
  used for denial of service or possibly privilege escalation (bsc#943457)

This is a reissue of the above security fixes for SUSE Linux Enterprise 12 GA, SP1 and SP2 LTSS,
they have already been released for SUSE Linux Enterprise Server 12 SP3.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-23"/>
	<updated date="2018-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/943457">SUSE bug 943457</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7500/">CVE-2017-7500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7500">CVE-2017-7500 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7501/">CVE-2017-7501 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7501">CVE-2017-7501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553476" comment="python3-rpm-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553477" comment="rpm-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545951" comment="rpm-32bit-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553478" comment="rpm-build-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553479" comment="rpm-python-4.11.2-16.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149624" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1032138" ref_url="https://bugzilla.suse.com/1032138" source="BUGZILLA"/>
		<reference ref_id="1032230" ref_url="https://bugzilla.suse.com/1032230" source="BUGZILLA"/>
		<reference ref_id="1040643" ref_url="https://bugzilla.suse.com/1040643" source="BUGZILLA"/>
		<reference ref_id="1050879" ref_url="https://bugzilla.suse.com/1050879" source="BUGZILLA"/>
		<reference ref_id="1050887" ref_url="https://bugzilla.suse.com/1050887" source="BUGZILLA"/>
		<reference ref_id="1050888" ref_url="https://bugzilla.suse.com/1050888" source="BUGZILLA"/>
		<reference ref_id="1050889" ref_url="https://bugzilla.suse.com/1050889" source="BUGZILLA"/>
		<reference ref_id="1050891" ref_url="https://bugzilla.suse.com/1050891" source="BUGZILLA"/>
		<reference ref_id="1051184" ref_url="https://bugzilla.suse.com/1051184" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10219" ref_url="https://www.suse.com/security/cve/CVE-2016-10219/" source="CVE"/>
		<reference ref_id="CVE-2016-10317" ref_url="https://www.suse.com/security/cve/CVE-2016-10317/" source="CVE"/>
		<reference ref_id="CVE-2017-11714" ref_url="https://www.suse.com/security/cve/CVE-2017-11714/" source="CVE"/>
		<reference ref_id="CVE-2017-9216" ref_url="https://www.suse.com/security/cve/CVE-2017-9216/" source="CVE"/>
		<reference ref_id="CVE-2017-9612" ref_url="https://www.suse.com/security/cve/CVE-2017-9612/" source="CVE"/>
		<reference ref_id="CVE-2017-9726" ref_url="https://www.suse.com/security/cve/CVE-2017-9726/" source="CVE"/>
		<reference ref_id="CVE-2017-9727" ref_url="https://www.suse.com/security/cve/CVE-2017-9727/" source="CVE"/>
		<reference ref_id="CVE-2017-9739" ref_url="https://www.suse.com/security/cve/CVE-2017-9739/" source="CVE"/>
		<reference ref_id="CVE-2017-9835" ref_url="https://www.suse.com/security/cve/CVE-2017-9835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003717.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes several issues.



These security issues were fixed: 

- CVE-2017-9835: The gs_alloc_ref_array function allowed remote attackers to
  cause a denial of service (heap-based buffer overflow and application crash) or
  possibly have unspecified other impact via a crafted PostScript document
  (bsc#1050879).
- CVE-2017-9216: Prevent NULL pointer dereference in the jbig2_huffman_get
  function in jbig2_huffman.c which allowed for DoS (bsc#1040643).
- CVE-2016-10317: The fill_threshhold_buffer function in base/gxht_thresh.c
  allowed remote attackers to cause a denial of service (heap-based buffer
  overflow and application crash) or possibly have unspecified other impact via a
  crafted PostScript document (bsc#1032230).
- CVE-2017-9612: The Ins_IP function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (use-after-free and application crash)
  or possibly have unspecified other impact via a crafted document (bsc#1050891).
- CVE-2017-9726: The Ins_MDRP function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050889).
- CVE-2017-9727: The gx_ttfReader__Read function in base/gxttfb.c allowed
  remote attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050888).
- CVE-2017-9739: The Ins_JMPR function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050887).
- CVE-2017-11714: psi/ztoken.c mishandled references to the scanner state
  structure, which allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact via a crafted
  PostScript document, related to an out-of-bounds read in the
  igc_reloc_struct_ptr function in psi/igc.c (bsc#1051184).
- CVE-2016-10219: The intersect function in base/gxfill.c allowed remote
  attackers to cause a denial of service (divide-by-zero error and application
  crash) via a crafted file (bsc#1032138).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-09"/>
	<updated date="2018-02-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1032138">SUSE bug 1032138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032230">SUSE bug 1032230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040643">SUSE bug 1040643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050879">SUSE bug 1050879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050887">SUSE bug 1050887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050888">SUSE bug 1050888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050889">SUSE bug 1050889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050891">SUSE bug 1050891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051184">SUSE bug 1051184</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10219/">CVE-2016-10219 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10219">CVE-2016-10219 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10317/">CVE-2016-10317 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10317">CVE-2016-10317 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11714/">CVE-2017-11714 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11714">CVE-2017-11714 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9216/">CVE-2017-9216 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9216">CVE-2017-9216 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9612/">CVE-2017-9612 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9612">CVE-2017-9612 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9726/">CVE-2017-9726 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9726">CVE-2017-9726 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9727/">CVE-2017-9727 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9727">CVE-2017-9727 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9739/">CVE-2017-9739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9739">CVE-2017-9739 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9835/">CVE-2017-9835 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9835">CVE-2017-9835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550661" comment="ghostscript-9.15-23.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550662" comment="ghostscript-x11-9.15-23.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149625" version="1" class="patch">
	<metadata>
		<title>Security update for exiv2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1050257" ref_url="https://bugzilla.suse.com/1050257" source="BUGZILLA"/>
		<reference ref_id="1051188" ref_url="https://bugzilla.suse.com/1051188" source="BUGZILLA"/>
		<reference ref_id="1060995" ref_url="https://bugzilla.suse.com/1060995" source="BUGZILLA"/>
		<reference ref_id="1060996" ref_url="https://bugzilla.suse.com/1060996" source="BUGZILLA"/>
		<reference ref_id="1061000" ref_url="https://bugzilla.suse.com/1061000" source="BUGZILLA"/>
		<reference ref_id="1072928" ref_url="https://bugzilla.suse.com/1072928" source="BUGZILLA"/>
		<reference ref_id="1092952" ref_url="https://bugzilla.suse.com/1092952" source="BUGZILLA"/>
		<reference ref_id="1093095" ref_url="https://bugzilla.suse.com/1093095" source="BUGZILLA"/>
		<reference ref_id="1095070" ref_url="https://bugzilla.suse.com/1095070" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11591" ref_url="https://www.suse.com/security/cve/CVE-2017-11591/" source="CVE"/>
		<reference ref_id="CVE-2017-11683" ref_url="https://www.suse.com/security/cve/CVE-2017-11683/" source="CVE"/>
		<reference ref_id="CVE-2017-14859" ref_url="https://www.suse.com/security/cve/CVE-2017-14859/" source="CVE"/>
		<reference ref_id="CVE-2017-14862" ref_url="https://www.suse.com/security/cve/CVE-2017-14862/" source="CVE"/>
		<reference ref_id="CVE-2017-14864" ref_url="https://www.suse.com/security/cve/CVE-2017-14864/" source="CVE"/>
		<reference ref_id="CVE-2017-17669" ref_url="https://www.suse.com/security/cve/CVE-2017-17669/" source="CVE"/>
		<reference ref_id="CVE-2018-10958" ref_url="https://www.suse.com/security/cve/CVE-2018-10958/" source="CVE"/>
		<reference ref_id="CVE-2018-10998" ref_url="https://www.suse.com/security/cve/CVE-2018-10998/" source="CVE"/>
		<reference ref_id="CVE-2018-11531" ref_url="https://www.suse.com/security/cve/CVE-2018-11531/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004884.html" source="SUSE-SU"/>
		<description>
This update for exiv2 fixes the following issues:

- CVE-2017-11591: A floating point exception in the Exiv2::ValueType function could lead to a remote denial of service attack via crafted input. (bsc#1050257)
- CVE-2017-14864: An invalid memory address dereference was discovered in Exiv2::getULong in types.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1060995)
- CVE-2017-14862: An invalid memory address dereference was discovered in Exiv2::DataValue::read in value.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1060996)
- CVE-2017-14859: An invalid memory address dereference was discovered in Exiv2::StringValueBase::read in value.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1061000)
- CVE-2017-11683: There is a reachable assertion in the Internal::TiffReader::visitDirectory function in tiffvisitor.cpp that could lead to a remote denial of service attack via crafted input. (bsc#1051188)
- CVE-2017-17669: There is a heap-based buffer over-read in the Exiv2::Internal::PngChunk::keyTXTChunk function of pngchunk_int.cpp. A crafted PNG file would lead to a remote denial of service attack. (bsc#1072928)
- CVE-2018-10958: In types.cpp a large size value might have lead to a SIGABRT during an attempt at memory allocation for an Exiv2::Internal::PngChunk::zlibUncompress call. (bsc#1092952)
- CVE-2018-10998: readMetadata in jp2image.cpp allowed remote attackers to cause a denial of service (SIGABRT) by triggering an incorrect Safe::add call. (bsc#1093095)
- CVE-2018-11531: Exiv2 had a heap-based buffer overflow in getData in preview.cpp. (bsc#1095070)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-23"/>
	<updated date="2018-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050257">SUSE bug 1050257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051188">SUSE bug 1051188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060995">SUSE bug 1060995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060996">SUSE bug 1060996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061000">SUSE bug 1061000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072928">SUSE bug 1072928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092952">SUSE bug 1092952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093095">SUSE bug 1093095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095070">SUSE bug 1095070</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11591/">CVE-2017-11591 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11591">CVE-2017-11591 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11683/">CVE-2017-11683 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11683">CVE-2017-11683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14859/">CVE-2017-14859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14859">CVE-2017-14859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14862/">CVE-2017-14862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14862">CVE-2017-14862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14864/">CVE-2017-14864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14864">CVE-2017-14864 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17669/">CVE-2017-17669 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17669">CVE-2017-17669 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10958/">CVE-2018-10958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10958">CVE-2018-10958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10998/">CVE-2018-10998 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10998">CVE-2018-10998 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11531/">CVE-2018-11531 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11531">CVE-2018-11531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553480" comment="libexiv2-12-0.23-12.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149626" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1099257" ref_url="https://bugzilla.suse.com/1099257" source="BUGZILLA"/>
		<reference ref_id="1113094" ref_url="https://bugzilla.suse.com/1113094" source="BUGZILLA"/>
		<reference ref_id="1113672" ref_url="https://bugzilla.suse.com/1113672" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12900" ref_url="https://www.suse.com/security/cve/CVE-2018-12900/" source="CVE"/>
		<reference ref_id="CVE-2018-18557" ref_url="https://www.suse.com/security/cve/CVE-2018-18557/" source="CVE"/>
		<reference ref_id="CVE-2018-18661" ref_url="https://www.suse.com/security/cve/CVE-2018-18661/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004890.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2018-12900: Fixed heap-based buffer overflow in the cpSeparateBufToContigBuf (bsc#1099257).                                                                                             
- CVE-2018-18661: Fixed NULL pointer dereference in the function LZWDecode in the file tif_lzw.c (bsc#1113672).                                                                               
- CVE-2018-18557: Fixed JBIG decode can lead to out-of-bounds write (bsc#1113094).

Non-security issues fixed:

- asan_build: build ASAN included
- debug_build: build more suitable for debugging
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-26"/>
	<updated date="2018-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099257">SUSE bug 1099257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113094">SUSE bug 1113094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113672">SUSE bug 1113672</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12900/">CVE-2018-12900 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12900">CVE-2018-12900 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18557/">CVE-2018-18557 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18557">CVE-2018-18557 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18661/">CVE-2018-18661 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18661">CVE-2018-18661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553481" comment="libtiff5-4.0.9-44.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553482" comment="libtiff5-32bit-4.0.9-44.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553483" comment="tiff-4.0.9-44.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149627" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1091396" ref_url="https://bugzilla.suse.com/1091396" source="BUGZILLA"/>
		<reference ref_id="1105010" ref_url="https://bugzilla.suse.com/1105010" source="BUGZILLA"/>
		<reference ref_id="964336" ref_url="https://bugzilla.suse.com/964336" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004888.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Following security issues have been fixed:

- CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. (bsc#1105010)

The following non-security issues were fixed:

- Stop leaking File descriptors (bsc#964336)
- sftp-client.c returns wrong error code upon failure [bsc#1091396]

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-26"/>
	<updated date="2018-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091396">SUSE bug 1091396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964336">SUSE bug 964336</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15473">CVE-2018-15473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553484" comment="openssh-7.2p2-74.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553485" comment="openssh-askpass-gnome-7.2p2-74.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553486" comment="openssh-fips-7.2p2-74.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553487" comment="openssh-helpers-7.2p2-74.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149628" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1069601" ref_url="https://bugzilla.suse.com/1069601" source="BUGZILLA"/>
		<reference ref_id="1073363" ref_url="https://bugzilla.suse.com/1073363" source="BUGZILLA"/>
		<reference ref_id="1089638" ref_url="https://bugzilla.suse.com/1089638" source="BUGZILLA"/>
		<reference ref_id="1102310" ref_url="https://bugzilla.suse.com/1102310" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1059" ref_url="https://www.suse.com/security/cve/CVE-2018-1059/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004895.html" source="SUSE-SU"/>
		<description>

  
This update for dpdk to version 16.11.8 provides the following security fix:

- CVE-2018-1059: restrict untrusted guest to misuse virtio to corrupt host application (ovs-dpdk) memory which could have lead all VM to lose connectivity (bsc#1089638)

and following non-security fixes:

- Enable the broadcom chipset family Broadcom NetXtreme II BCM57810 (bsc#1073363)
- Fix a latency problem by using cond_resched rather than schedule_timeout_interruptible (bsc#1069601)
- Fix a syntax error affecting csh environment configuration (bsc#1102310)
- Fixes in net/bnxt:
    * Fix HW Tx checksum offload check
    * Fix incorrect IO address handling in Tx
    * Fix Rx ring count limitation
    * Check access denied for HWRM commands
    * Fix RETA size
    * Fix close operation
- Fixes in eal/linux:
    * Fix an invalid syntax in interrupts
    * Fix return codes on thread naming failure
- Fixes in kni:
    * Fix crash with null name
    * Fix build with gcc 8.1
- Fixes in net/thunderx:
    * Fix build with gcc optimization on
    * Avoid sq door bell write on zero packet
- net/bonding: Fix MAC address reset
- vhost: Fix missing increment of log cache count
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-27"/>
	<updated date="2018-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069601">SUSE bug 1069601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073363">SUSE bug 1073363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089638">SUSE bug 1089638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102310">SUSE bug 1102310</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1059/">CVE-2018-1059 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1059">CVE-2018-1059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553488" comment="dpdk-16.11.8-8.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553489" comment="dpdk-kmp-default-16.11.8_k4.4.156_94.64-8.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553490" comment="dpdk-thunderx-16.11.8-8.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553491" comment="dpdk-thunderx-kmp-default-16.11.8_k4.4.156_94.64-8.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553492" comment="dpdk-tools-16.11.8-8.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149629" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1116574" ref_url="https://bugzilla.suse.com/1116574" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<description>

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 35 (bsc#1116574):

* Consumability

  - IJ10515 AIX JAVA 7.1.3.10 GENERAL PROTECTION FAULT WHEN ATTEMPTING TO USE HEALTH CENTER API

* Class Libraries

  - IJ10934 CVE-2018-13785
  - IJ10935 CVE-2018-3136
  - IJ10895 CVE-2018-3139
  - IJ10932 CVE-2018-3149
  - IJ10894 CVE-2018-3180
  - IJ10933 CVE-2018-3214
  - IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
  - IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS NOT IDENTIFYING TRT
  - IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN 2GB ON AIX PLATFORM
  - IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS.

* Java Virtual Machine

  - IJ10931 CVE-2018-3169
  - IV91132 SOME CORE PATTERN SPECIFIERS ARE NOT HANDLED BY THE JVM ON LINUX

* JIT Compiler

  - IJ08205 CRASH WHILE COMPILING
  - IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND BIGDECIMAL.{FLOAT/DOUBLE }VALUE()

* ORB

  - IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION

* Security

  - IJ10492 'EC KEYSIZE &lt; 384' IS NOT HONORED USING THE 'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
  - IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER DOFINAL( ) AND INIT( )
  - IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO JKS KEYSTORE
  - IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH SECP521R1 SIGNATURE ON Z/OS
  - IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON Z/OS AND Z/LINUX
  - IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR THE RSA/ECB/PKCS1PADDING CIPHER
  - IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
  - IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’ IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS

* z/OS Extentions

  - PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING IBMJCEHYBRID
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-28"/>
	<updated date="2018-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13785">CVE-2018-13785 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3136">CVE-2018-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3139">CVE-2018-3139 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3149">CVE-2018-3149 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3169">CVE-2018-3169 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3180">CVE-2018-3180 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3214">CVE-2018-3214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545971" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149630" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1115929" ref_url="https://bugzilla.suse.com/1115929" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19211" ref_url="https://www.suse.com/security/cve/CVE-2018-19211/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3967-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183967-1.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issue:

Security issue fixed:

- CVE-2018-19211: Fixed denial of service issue that was triggered by a NULL pointer dereference at function _nc_parse_entry (bsc#1115929).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115929">SUSE bug 1115929</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19211/">CVE-2018-19211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19211">CVE-2018-19211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553493" comment="libncurses5-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553494" comment="libncurses5-32bit-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553495" comment="libncurses6-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553496" comment="libncurses6-32bit-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541808" comment="ncurses-devel-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553497" comment="ncurses-devel-32bit-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553498" comment="ncurses-utils-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553499" comment="tack-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553500" comment="terminfo-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553501" comment="terminfo-base-5.9-61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149631" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1028103" ref_url="https://bugzilla.suse.com/1028103" source="BUGZILLA"/>
		<reference ref_id="1035807" ref_url="https://bugzilla.suse.com/1035807" source="BUGZILLA"/>
		<reference ref_id="1036457" ref_url="https://bugzilla.suse.com/1036457" source="BUGZILLA"/>
		<reference ref_id="1079600" ref_url="https://bugzilla.suse.com/1079600" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10244" ref_url="https://www.suse.com/security/cve/CVE-2016-10244/" source="CVE"/>
		<reference ref_id="CVE-2017-7864" ref_url="https://www.suse.com/security/cve/CVE-2017-7864/" source="CVE"/>
		<reference ref_id="CVE-2017-8105" ref_url="https://www.suse.com/security/cve/CVE-2017-8105/" source="CVE"/>
		<reference ref_id="CVE-2017-8287" ref_url="https://www.suse.com/security/cve/CVE-2017-8287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003720.html" source="SUSE-SU"/>
		<description>

  
This update for freetype2 fixes the following security issues:

- CVE-2016-10244: Make sure that the parse_charstrings function in
  type1/t1load.c does ensure that a font contains a glyph name to prevent a DoS
  through a heap-based buffer over-read or possibly have unspecified other
  impact via a crafted file (bsc#1028103)
- CVE-2017-8105: Fix an out-of-bounds write caused by a heap-based
  buffer overflow related to the t1_decoder_parse_charstrings function in
  psaux/t1decode.ca (bsc#1035807)
- CVE-2017-8287: an out-of-bounds write caused by a heap-based buffer
  overflow related to the t1_builder_close_contour function in psaux/psobjs.c
  (bsc#1036457)
- Fix several integer overflow issues in truetype/ttinterp.c (bsc#1079600)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-09"/>
	<updated date="2018-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1028103">SUSE bug 1028103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035807">SUSE bug 1035807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036457">SUSE bug 1036457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079600">SUSE bug 1079600</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10244/">CVE-2016-10244 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10244">CVE-2016-10244 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7864/">CVE-2017-7864 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7864">CVE-2017-7864 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8105/">CVE-2017-8105 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8105">CVE-2017-8105 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8287/">CVE-2017-8287 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8287">CVE-2017-8287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550672" comment="ft2demos-2.6.3-7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550673" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550674" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149632" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1057246" ref_url="https://bugzilla.suse.com/1057246" source="BUGZILLA"/>
		<reference ref_id="1113064" ref_url="https://bugzilla.suse.com/1113064" source="BUGZILLA"/>
		<reference ref_id="1117463" ref_url="https://bugzilla.suse.com/1117463" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18544" ref_url="https://www.suse.com/security/cve/CVE-2018-18544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004938.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2018-18544: Fixed memory leak in the function WriteMSLImage (bsc#1113064).


Non-security issues fixed:

- Improve import documentation (bsc#1057246).
- Allow override system security policy (bsc#1117463).
- asan_build: build ASAN included
- debug_build: build more suitable for debugging
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-07"/>
	<updated date="2018-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1057246">SUSE bug 1057246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113064">SUSE bug 1113064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18544/">CVE-2018-18544 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18544">CVE-2018-18544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553502" comment="libMagickCore-6_Q16-1-6.8.8.1-71.93.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553503" comment="libMagickWand-6_Q16-1-6.8.8.1-71.93.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149633" version="1" class="patch">
	<metadata>
		<title>Security update for ipsec-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1047443" ref_url="https://bugzilla.suse.com/1047443" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10396" ref_url="https://www.suse.com/security/cve/CVE-2016-10396/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003724.html" source="SUSE-SU"/>
		<description>
This update for ipsec-tools fixes one issue.

This security issue was fixed:

- CVE-2016-10396: The racoon daemon contained a remotely exploitable
  computational-complexity attack when parsing and storing ISAKMP fragments that
  allowed a remote attacker to exhaust computational resources on the remote
  endpoint by repeatedly sending ISAKMP fragment packets in a particular order
  (bsc#1047443).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-12"/>
	<updated date="2018-02-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047443">SUSE bug 1047443</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10396/">CVE-2016-10396 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10396">CVE-2016-10396 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550675" comment="ipsec-tools-0.8.0-19.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149634" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography, python-pyOpenSSL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1021578" ref_url="https://bugzilla.suse.com/1021578" source="BUGZILLA"/>
		<reference ref_id="1111634" ref_url="https://bugzilla.suse.com/1111634" source="BUGZILLA"/>
		<reference ref_id="1111635" ref_url="https://bugzilla.suse.com/1111635" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000807" ref_url="https://www.suse.com/security/cve/CVE-2018-1000807/" source="CVE"/>
		<reference ref_id="CVE-2018-1000808" ref_url="https://www.suse.com/security/cve/CVE-2018-1000808/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004944.html" source="SUSE-SU"/>
		<description>

This update for python-cryptography, python-pyOpenSSL fixes the following issues:

Security issues fixed:

- CVE-2018-1000808: A memory leak due to missing reference checking in PKCS#12 store handling was fixed (bsc#1111634)
- CVE-2018-1000807: A use-after-free in X509 object handling was fixed (bsc#1111635)

- avoid bad interaction with python-cryptography package. (bsc#1021578)

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021578">SUSE bug 1021578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111634">SUSE bug 1111634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111635">SUSE bug 1111635</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000807/">CVE-2018-1000807 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000807">CVE-2018-1000807 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000808/">CVE-2018-1000808 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000808">CVE-2018-1000808 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553504" comment="python-cryptography-1.3.1-7.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520402" comment="python-pyOpenSSL-16.0.0-4.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520403" comment="python-setuptools-18.0.1-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553505" comment="python3-cryptography-1.3.1-7.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521792" comment="python3-pyOpenSSL-16.0.0-4.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520404" comment="python3-setuptools-18.0.1-4.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149635" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1116574" ref_url="https://bugzilla.suse.com/1116574" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<description>

java-1_8_0-ibm was updated to Java 8.0 Service Refresh 5 Fix Pack 25 (bsc#1116574)

* Class Libraries:

  - IJ10934 CVE-2018-13785
  - IJ10935 CVE-2018-3136
  - IJ10895 CVE-2018-3139
  - IJ10932 CVE-2018-3149
  - IJ10894 CVE-2018-3180
  - IJ10930 CVE-2018-3183
  - IJ10933 CVE-2018-3214
  - IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
  - IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS NOT IDENTIFYING TRT
  - IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS.
  - IJ10566 SUPPORT EBCDIC CODE PAGE IBM-274 – BELGIUM EBCDIC

* Java Virtual Machine

  - IJ08730 APPLICATION SIGNAL HANDLER NOT INVOKED FOR SIGABRT
  - IJ10453 ASSERTION FAILURE AT CLASSPATHITEM.CPP
  - IJ09574 CLASSLOADER DEFINED THROUGH SYSTEM PROPERTY ‘JAVA.SYSTEM.CLASS.LOADE R’ IS NOT HONORED.
  - IJ10931 CVE-2018-3169
  - IJ10618 GPU SORT: UNSPECIFIED LAUNCH FAILURE
  - IJ10619 INCORRECT ILLEGALARGUMENTEXCEPTION BECAUSE OBJECT IS NOT AN INSTANCE OF DECLARING CLASS ON REFLECTIVE INVOCATION
  - IJ10135 JVM HUNG IN GARBAGECOLLECTORMXBEAN.G ETLASTGCINFO() API
  - IJ10680 RECURRENT ABORTED SCAVENGE

* ORB

  - IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION

* Reliability and Serviceability

  - IJ09600 DTFJ AND JDMPVIEW FAIL TO PARSE WIDE REGISTER VALUES

* Security

  - IJ10492 'EC KEYSIZE &lt; 384' IS NOT HONORED USING THE 'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
  - IJ10310 ADD NULL CHECKING ON THE ENCRYPTION TYPES LIST TO CREDENTIALS.GETDEFAULTNA TIVECREDS() METHOD
  - IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER DOFINAL( ) AND INIT( )
  - IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO JKS KEYSTORE
  - IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH SECP521R1 SIGNATURE ON Z/OS
  - IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON Z/OS AND Z/LINUX
  - IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR THE RSA/ECB/PKCS1PADDING CIPHER
  - IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
  - IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’ IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS

* z/OS Extentions

  - PH03889 ADD SUPPORT FOR TRY-WITH-RESOURCES TO COM.IBM.JZOS.ENQUEUE
  - PH03414 ROLLOVER FROM SYE TO SAE FOR ICSF REASON CODE 3059
  - PH04008 ZERTJSSE – Z SYSTEMS ENCRYPTION READINESS TOOL (ZERT) NEW SUPPORT IN THE Z/OS JAVA SDK

This includes the update to Java 8.0 Service Refresh 5 Fix Pack 22:

* Java Virtual Machine

  - IJ09139 CUDA4J NOT AVAILABLE ON ALL PLATFORMS

* JIT Compiler

  - IJ09089 CRASH DURING COMPILATION IN USEREGISTER ON X86-32
  - IJ08655 FLOATING POINT ERROR (SIGFPE) IN ZJ9SYM1 OR ANY VM/JIT MODULE ON AN INSTRUCTION FOLLOWING A VECTOR INSTRUCTION
  - IJ08850 CRASH IN ARRAYLIST$ITR.NEXT()
  - IJ09601 JVM CRASHES ON A SIGBUS SIGNAL WHEN ACCESSING A DIRECTBYTEBUFFER

* z/OS Extentions

  - PH02999 JZOS data management classes accept dataset names in code pages supported by z/OS system services
  - PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING IBMJCEHYBRID

Also the update to Java 8.0 Service Refresh 5 Fix Pack 21

* Class Libraries

  - IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN 2GB ON AIX PLATFORM
  - IJ08570 JAVA.LANG.UNSATISFIEDLIN KERROR WITH JAVA OPTION -DSUN.JAVA2D.CMM=SUN.JAV A2D.CMM.KCMS.KCMSSERVICE PROVIDER ON AIX PLATFORM

* Java Virtual Machine

  - IJ08001 30% THROUGHPUT DROP FOR CERTAIN SYNCHRONIZATION WORKLOADS
  - IJ07997 TRACEASSERT IN GARBAGE COLLECTOR(MEMORYSUBSPACE)

* JIT Compiler

  - IJ08503 ASSERTION IS HIT DUE TO UNEXPECTED STACK HEIGHT IN DEBUGGING MODE
  - IJ08375 CRASH DURING HARDWARE GENERATED GUARDED STORAGE EVENT WITHIN A TRANSACTIONAL EXECUTION REGION WHEN RUNNING WITH -XGC:CONCURRENTS
  - IJ08205 CRASH WHILE COMPILING
  - IJ09575 INCORRECT RESULT WHEN USING JAVA.LANG.MATH.MIN OR MAX ON 31-BIT JVM
  - IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND BIGDECIMAL.{FLOAT/DOUBLE }VALUE()
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13785">CVE-2018-13785 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3136">CVE-2018-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3139">CVE-2018-3139 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3149">CVE-2018-3149 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3169">CVE-2018-3169 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3180">CVE-2018-3180 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3183">CVE-2018-3183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3214">CVE-2018-3214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548395" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149636" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1108940" ref_url="https://bugzilla.suse.com/1108940" source="BUGZILLA"/>
		<reference ref_id="1114405" ref_url="https://bugzilla.suse.com/1114405" source="BUGZILLA"/>
		<reference ref_id="1114423" ref_url="https://bugzilla.suse.com/1114423" source="BUGZILLA"/>
		<reference ref_id="1115040" ref_url="https://bugzilla.suse.com/1115040" source="BUGZILLA"/>
		<reference ref_id="1115045" ref_url="https://bugzilla.suse.com/1115045" source="BUGZILLA"/>
		<reference ref_id="1115047" ref_url="https://bugzilla.suse.com/1115047" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="CVE-2018-18883" ref_url="https://www.suse.com/security/cve/CVE-2018-18883/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004952.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed:

- CVE-2018-18849: Fixed an out of bounds memory access issue was found in the LSI53C895A SCSI Host Bus Adapter emulation while writing a message in lsi_do_msgin (bsc#1114423).
- CVE-2018-18883: Fixed a NULL pointer dereference that could have been triggered by nested VT-x that where not properly restricted (XSA-278)(bsc#1114405).
- CVE-2018-19965: Fixed denial of service issue from attempting to use INVPCID with a non-canonical addresses (XSA-279)(bsc#1115045).
- CVE-2018-19966: Fixed issue introduced by XSA-240 that could have caused conflicts with shadow paging (XSA-280)(bsc#1115047).
- CVE-2018-19961 CVE-2018-19962: Fixed insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275)(bsc#1115040).

Non-security issues fixed:

- Added upstream bug fixes (bsc#1027519).
- Fixed XEN SLE12-SP1 domU hang on SLE12-SP3 HV (bsc#1108940).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-11"/>
	<updated date="2018-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108940">SUSE bug 1108940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114405">SUSE bug 1114405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114423">SUSE bug 1114423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18849">CVE-2018-18849 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18883/">CVE-2018-18883 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18883">CVE-2018-18883 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19961">CVE-2018-19961 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19962">CVE-2018-19962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19965">CVE-2018-19965 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19966">CVE-2018-19966 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520407" comment="xen-4.9.3_03-3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553506" comment="xen-doc-html-4.9.3_03-3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520408" comment="xen-libs-4.9.3_03-3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520409" comment="xen-libs-32bit-4.9.3_03-3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553507" comment="xen-tools-4.9.3_03-3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553508" comment="xen-tools-domU-4.9.3_03-3.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149637" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1109105" ref_url="https://bugzilla.suse.com/1109105" source="BUGZILLA"/>
		<reference ref_id="1111479" ref_url="https://bugzilla.suse.com/1111479" source="BUGZILLA"/>
		<reference ref_id="1111480" ref_url="https://bugzilla.suse.com/1111480" source="BUGZILLA"/>
		<reference ref_id="1112229" ref_url="https://bugzilla.suse.com/1112229" source="BUGZILLA"/>
		<reference ref_id="1117022" ref_url="https://bugzilla.suse.com/1117022" source="BUGZILLA"/>
		<reference ref_id="1117274" ref_url="https://bugzilla.suse.com/1117274" source="BUGZILLA"/>
		<reference ref_id="1117313" ref_url="https://bugzilla.suse.com/1117313" source="BUGZILLA"/>
		<reference ref_id="1117327" ref_url="https://bugzilla.suse.com/1117327" source="BUGZILLA"/>
		<reference ref_id="1117331" ref_url="https://bugzilla.suse.com/1117331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183/" source="CVE"/>
		<reference ref_id="CVE-2018-17961" ref_url="https://www.suse.com/security/cve/CVE-2018-17961/" source="CVE"/>
		<reference ref_id="CVE-2018-18073" ref_url="https://www.suse.com/security/cve/CVE-2018-18073/" source="CVE"/>
		<reference ref_id="CVE-2018-18284" ref_url="https://www.suse.com/security/cve/CVE-2018-18284/" source="CVE"/>
		<reference ref_id="CVE-2018-19409" ref_url="https://www.suse.com/security/cve/CVE-2018-19409/" source="CVE"/>
		<reference ref_id="CVE-2018-19475" ref_url="https://www.suse.com/security/cve/CVE-2018-19475/" source="CVE"/>
		<reference ref_id="CVE-2018-19476" ref_url="https://www.suse.com/security/cve/CVE-2018-19476/" source="CVE"/>
		<reference ref_id="CVE-2018-19477" ref_url="https://www.suse.com/security/cve/CVE-2018-19477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.26 fixes the following issues:

Security issues fixed:

- CVE-2018-19475: Fixed bypass of an intended access restriction in psi/zdevice2.c (bsc#1117327)
- CVE-2018-19476: Fixed bypass of an intended access restriction in psi/zicc.c (bsc#1117313)
- CVE-2018-19477: Fixed bypass of an intended access restriction in psi/zfjbig2.c (bsc#1117274)
- CVE-2018-19409: Check if another device is used correctly in LockSafetyParams (bsc#1117022)
- CVE-2018-18284: Fixed potential sandbox escape through 1Policy operator (bsc#1112229)
- CVE-2018-18073: Fixed leaks through operator in saved execution stacks (bsc#1111480)
- CVE-2018-17961: Fixed a -dSAFER sandbox escape by bypassing executeonly (bsc#1111479)
- CVE-2018-17183: Fixed a potential code injection by specially crafted PostScript files (bsc#1109105)

Version update to 9.26 (bsc#1117331):

- Security issues have been the primary focus
- Minor bug fixes and improvements
- For release summary see: http://www.ghostscript.com/doc/9.26/News.htm
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117274">SUSE bug 1117274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117313">SUSE bug 1117313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117327">SUSE bug 1117327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17183">CVE-2018-17183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-17961/">CVE-2018-17961 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17961">CVE-2018-17961 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18073/">CVE-2018-18073 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18073">CVE-2018-18073 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18284/">CVE-2018-18284 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18284">CVE-2018-18284 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19409/">CVE-2018-19409 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19409">CVE-2018-19409 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19475/">CVE-2018-19475 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19475">CVE-2018-19475 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19476/">CVE-2018-19476 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19476">CVE-2018-19476 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19477/">CVE-2018-19477 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19477">CVE-2018-19477 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553509" comment="ghostscript-9.26-23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553510" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553511" comment="libspectre1-0.2.7-12.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149638" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1115750" ref_url="https://bugzilla.suse.com/1115750" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4700" ref_url="https://www.suse.com/security/cve/CVE-2018-4700/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004958.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

Security issue fixed:

- CVE-2018-4700: Fixed extremely predictable cookie generation that is effectively breaking the CSRF protection of the CUPS web interface (bsc#1115750).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115750">SUSE bug 1115750</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4700/">CVE-2018-4700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-4700">CVE-2018-4700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553512" comment="cups-1.7.5-20.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553513" comment="cups-client-1.7.5-20.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553514" comment="cups-libs-1.7.5-20.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553515" comment="cups-libs-32bit-1.7.5-20.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149639" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1110949" ref_url="https://bugzilla.suse.com/1110949" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17456" ref_url="https://www.suse.com/security/cve/CVE-2018-17456/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004957.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issue:

- CVE-2018-17456: Git allowed remote code execution during processing of a recursive 'git clone' of a superproject if a .gitmodules file has a URL field beginning with a '-' character. (boo#1110949).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1110949">SUSE bug 1110949</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17456/">CVE-2018-17456 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17456">CVE-2018-17456 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541824" comment="git-core-2.12.3-27.17.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149640" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1104467" ref_url="https://bugzilla.suse.com/1104467" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17204" ref_url="https://www.suse.com/security/cve/CVE-2018-17204/" source="CVE"/>
		<reference ref_id="CVE-2018-17205" ref_url="https://www.suse.com/security/cve/CVE-2018-17205/" source="CVE"/>
		<reference ref_id="CVE-2018-17206" ref_url="https://www.suse.com/security/cve/CVE-2018-17206/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004965.html" source="SUSE-SU"/>
		<description>
This update for openvswitch to version 2.7.6 fixes the following issues:

These security issues were fixed:

- CVE-2018-17205: Prevent OVS crash when reverting old flows in bundle commit
  (bsc#1104467).
- CVE-2018-17206: Avoid buffer overread in BUNDLE action decoding
  (bsc#1104467).
- CVE-2018-17204:When decoding a group mod, it validated the group type and
  command after the whole group mod has been decoded. The OF1.5 decoder, however,
  tried to use the type and command earlier, when it might still be invalid. This
  caused an assertion failure (via OVS_NOT_REACHED) (bsc#1104467).

These non-security issues were fixed:

- ofproto/bond: Fix bond reconfiguration race condition.
- ofproto/bond: Fix bond post recirc rule leak.
- ofproto/bond: fix interal flow leak of tcp-balance bond
- systemd: Restart openvswitch service if a daemon crashes
- conntrack: Fix checks for TCP, UDP, and IPv6 header sizes.
- ofp-actions: Fix translation of set_field for nw_ecn
- netdev-dpdk: Fix mempool segfault.
- ofproto-dpif-upcall: Fix flow setup/delete race.
- learn: Fix memory leak in learn_parse_sepc()
- netdev-dpdk: fix mempool_configure error state
- vswitchd: Add --cleanup option to the 'appctl exit' command
- ofp-parse: Fix memory leak on error path in parse_ofp_group_mod_file().
- actions: Fix memory leak on error path in parse_ct_lb_action().
- dpif-netdev: Fix use-after-free error in reconfigure_datapath().
- bridge: Fix memory leak in bridge_aa_update_trunks().
- dpif-netlink: Fix multiple-free and fd leak on error path.
- ofp-print: Avoid array overread in print_table_instruction_features().
- flow: Fix buffer overread in flow_hash_symmetric_l3l4().
- systemd: start vswitchd after udev
- ofp-util: Check length of buckets in ofputil_pull_ofp15_group_mod().
- ovsdb-types: Fix memory leak on error path.
- tnl-ports: Fix loss of tunneling upon removal of a single tunnel port.
- netdev: check for NULL fields in netdev_get_addrs
- netdev-dpdk: vhost get stats fix.
- netdev-dpdk: use 64-bit arithmetic when converting rates.
- ofp-util: Fix buffer overread in ofputil_decode_bundle_add().
- ofp-util: Fix memory leaks on error cases in ofputil_decode_group_mod().
- ofp-util: Fix memory leaks when parsing OF1.5 group properties.
- ofp-actions: Fix buffer overread in decode_LEARN_specs().
- flow: Fix buffer overread for crafted IPv6 packets.
- ofp-actions: Properly interpret 'output:in_port'.
- ovs-ofctl: Avoid read overrun in ofperr_decode_msg().
- odp-util: Avoid misaligned references to ip6_hdr.
- ofproto-dpif-upcall: Fix action attr iteration.
- ofproto-dpif-upcall: Fix key attr iteration.
- netdev-dpdk: vhost get stats fix.
- netdev-dpdk: use 64-bit arithmetic when converting rates.
- ofp-util: Fix buffer overread in ofputil_decode_bundle_add().
- ofp-util: Fix memory leaks on error cases in ofputil_decode_group_mod().
- ofp-util: Fix memory leaks when parsing OF1.5 group properties.
- odp-util: Fix buffer overread in parsing string form of ODP flows.
- ovs-vsctl: Fix segfault when attempting to del-port from parent bridge.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104467">SUSE bug 1104467</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17204/">CVE-2018-17204 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17204">CVE-2018-17204 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17205/">CVE-2018-17205 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17205">CVE-2018-17205 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17206/">CVE-2018-17206 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17206">CVE-2018-17206 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553516" comment="openvswitch-2.7.6-3.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149641" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1100408" ref_url="https://bugzilla.suse.com/1100408" source="BUGZILLA"/>
		<reference ref_id="1106222" ref_url="https://bugzilla.suse.com/1106222" source="BUGZILLA"/>
		<reference ref_id="1110910" ref_url="https://bugzilla.suse.com/1110910" source="BUGZILLA"/>
		<reference ref_id="1111006" ref_url="https://bugzilla.suse.com/1111006" source="BUGZILLA"/>
		<reference ref_id="1111010" ref_url="https://bugzilla.suse.com/1111010" source="BUGZILLA"/>
		<reference ref_id="1111013" ref_url="https://bugzilla.suse.com/1111013" source="BUGZILLA"/>
		<reference ref_id="1114422" ref_url="https://bugzilla.suse.com/1114422" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004966.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2018-10839: Fixed NE2000 NIC emulation support that is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS (bsc#1110910).
- CVE-2018-15746: Fixed qemu-seccomp.c that might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread (bsc#1106222).
- CVE-2018-17958: Fixed a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used (bsc#1111006).
- CVE-2018-17962: Fixed a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used (bsc#1111010).
- CVE-2018-17963: Fixed qemu_deliver_packet_iov in net/net.c that accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111013)
- CVE-2018-18849: Fixed an out of bounds memory access issue that was found in the LSI53C895A SCSI Host Bus Adapter emulation while writing a message in lsi_do_msgin. It could occur during migration if the 'msg_len' field has an invalid value. A user/process could use this flaw to crash the Qemu process resulting in DoS (bsc#1114422).

Non-security issues fixed:

- Improving disk performance for qemu on xen (bsc#1100408)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100408">SUSE bug 1100408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106222">SUSE bug 1106222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110910">SUSE bug 1110910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111006">SUSE bug 1111006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111010">SUSE bug 1111010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111013">SUSE bug 1111013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114422">SUSE bug 1114422</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10839">CVE-2018-10839 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15746">CVE-2018-15746 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17958">CVE-2018-17958 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17962">CVE-2018-17962 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17963">CVE-2018-17963 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18849">CVE-2018-18849 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553517" comment="qemu-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553518" comment="qemu-arm-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553519" comment="qemu-block-curl-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553520" comment="qemu-block-iscsi-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553521" comment="qemu-block-rbd-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553522" comment="qemu-block-ssh-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553523" comment="qemu-guest-agent-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520419" comment="qemu-ipxe-1.0.0+-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553524" comment="qemu-kvm-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553525" comment="qemu-lang-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553526" comment="qemu-ppc-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553527" comment="qemu-s390-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520421" comment="qemu-seabios-1.10.2-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520422" comment="qemu-sgabios-8-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553528" comment="qemu-tools-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520424" comment="qemu-vgabios-1.10.2-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520425" comment="qemu-x86-2.9.1-6.22.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149642" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1117267" ref_url="https://bugzilla.suse.com/1117267" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19519" ref_url="https://www.suse.com/security/cve/CVE-2018-19519/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004969.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

Security issues fixed:

- CVE-2018-19519: Fixed a stack-based buffer over-read in the print_prefix function (bsc#1117267)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-17"/>
	<updated date="2018-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117267">SUSE bug 1117267</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19519/">CVE-2018-19519 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19519">CVE-2018-19519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553529" comment="tcpdump-4.9.2-14.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149643" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1073313" ref_url="https://bugzilla.suse.com/1073313" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17740" ref_url="https://www.suse.com/security/cve/CVE-2017-17740/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004970.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

Security issue fixed:

- CVE-2017-17740: When both the nops module and the memberof overlay
  are enabled, attempts to free a buffer that was allocated on the stack,
  which allows remote attackers to cause a denial of service (slapd crash)
  via a member MODDN operation.  (bsc#1073313)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-17"/>
	<updated date="2018-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1073313">SUSE bug 1073313</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17740/">CVE-2017-17740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17740">CVE-2017-17740 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553530" comment="libldap-2_4-2-2.4.41-18.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553531" comment="libldap-2_4-2-32bit-2.4.41-18.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553532" comment="openldap2-2.4.41-18.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553533" comment="openldap2-back-meta-2.4.41-18.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553534" comment="openldap2-client-2.4.41-18.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149644" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1118595" ref_url="https://bugzilla.suse.com/1118595" source="BUGZILLA"/>
		<reference ref_id="1118596" ref_url="https://bugzilla.suse.com/1118596" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15518" ref_url="https://www.suse.com/security/cve/CVE-2018-15518/" source="CVE"/>
		<reference ref_id="CVE-2018-19873" ref_url="https://www.suse.com/security/cve/CVE-2018-19873/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004976.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

Security issues fixed:

- CVE-2018-15518: Fixed double free in QXmlStreamReader (bsc#1118595)
- CVE-2018-19873: Fixed Denial of Service on malformed BMP file in QBmpHandler (bsc#1118596)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-18"/>
	<updated date="2018-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118595">SUSE bug 1118595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118596">SUSE bug 1118596</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15518/">CVE-2018-15518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15518">CVE-2018-15518 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19873/">CVE-2018-19873 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19873">CVE-2018-19873 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553535" comment="libQt5Concurrent5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553536" comment="libQt5Core5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553537" comment="libQt5DBus5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553538" comment="libQt5Gui5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553539" comment="libQt5Network5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553540" comment="libQt5OpenGL5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553541" comment="libQt5PrintSupport5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553542" comment="libQt5Sql5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553543" comment="libQt5Sql5-mysql-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553544" comment="libQt5Sql5-postgresql-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553545" comment="libQt5Sql5-sqlite-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553546" comment="libQt5Sql5-unixODBC-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553547" comment="libQt5Test5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553548" comment="libQt5Widgets5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553549" comment="libQt5Xml5-5.6.2-6.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149645" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1013721" ref_url="https://bugzilla.suse.com/1013721" source="BUGZILLA"/>
		<reference ref_id="1013732" ref_url="https://bugzilla.suse.com/1013732" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9800" ref_url="https://www.suse.com/security/cve/CVE-2016-9800/" source="CVE"/>
		<reference ref_id="CVE-2016-9801" ref_url="https://www.suse.com/security/cve/CVE-2016-9801/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004981.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

Security issues fixed:

- CVE-2016-9800: Fixed a buffer overflow in the pin_code_reply_dump function (bsc#1013721)
- CVE-2016-9801: Fixed a buffer overflow in the set_ext_ctrl function (bsc#1013732)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-19"/>
	<updated date="2018-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013721">SUSE bug 1013721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013732">SUSE bug 1013732</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9800/">CVE-2016-9800 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9800">CVE-2016-9800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9801/">CVE-2016-9801 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9801">CVE-2016-9801 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553550" comment="bluez-5.13-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553551" comment="libbluetooth3-5.13-5.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149646" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1017693" ref_url="https://bugzilla.suse.com/1017693" source="BUGZILLA"/>
		<reference ref_id="1054594" ref_url="https://bugzilla.suse.com/1054594" source="BUGZILLA"/>
		<reference ref_id="1115717" ref_url="https://bugzilla.suse.com/1115717" source="BUGZILLA"/>
		<reference ref_id="990460" ref_url="https://bugzilla.suse.com/990460" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10092" ref_url="https://www.suse.com/security/cve/CVE-2016-10092/" source="CVE"/>
		<reference ref_id="CVE-2016-10093" ref_url="https://www.suse.com/security/cve/CVE-2016-10093/" source="CVE"/>
		<reference ref_id="CVE-2016-10094" ref_url="https://www.suse.com/security/cve/CVE-2016-10094/" source="CVE"/>
		<reference ref_id="CVE-2016-6223" ref_url="https://www.suse.com/security/cve/CVE-2016-6223/" source="CVE"/>
		<reference ref_id="CVE-2017-12944" ref_url="https://www.suse.com/security/cve/CVE-2017-12944/" source="CVE"/>
		<reference ref_id="CVE-2018-19210" ref_url="https://www.suse.com/security/cve/CVE-2018-19210/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004984.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:                                   
    
- CVE-2018-19210: Fixed NULL pointer dereference in the TIFFWriteDirectorySec function (bsc#1115717).
- CVE-2017-12944: Fixed denial of service issue in the TIFFReadDirEntryArray function (bsc#1054594).
- CVE-2016-10094: Fixed heap-based buffer overflow in the _tiffWriteProc function (bsc#1017693).
- CVE-2016-10093: Fixed heap-based buffer overflow in the _TIFFmemcpy function (bsc#1017693).
- CVE-2016-10092: Fixed heap-based buffer overflow in the TIFFReverseBits function (bsc#1017693).
- CVE-2016-6223: Fixed out-of-bounds read on memory-mapped files in TIFFReadRawStrip1() and TIFFReadRawTile1() (bsc#990460).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-19"/>
	<updated date="2018-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054594">SUSE bug 1054594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115717">SUSE bug 1115717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990460">SUSE bug 990460</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10092/">CVE-2016-10092 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10092">CVE-2016-10092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10093/">CVE-2016-10093 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10093">CVE-2016-10093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10094/">CVE-2016-10094 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10094">CVE-2016-10094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6223/">CVE-2016-6223 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6223">CVE-2016-6223 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12944/">CVE-2017-12944 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12944">CVE-2017-12944 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19210/">CVE-2018-19210 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19210">CVE-2018-19210 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553552" comment="libtiff5-4.0.9-44.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553553" comment="libtiff5-32bit-4.0.9-44.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553554" comment="tiff-4.0.9-44.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149647" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1115916" ref_url="https://bugzilla.suse.com/1115916" source="BUGZILLA"/>
		<reference ref_id="1115917" ref_url="https://bugzilla.suse.com/1115917" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5731" ref_url="https://www.suse.com/security/cve/CVE-2017-5731/" source="CVE"/>
		<reference ref_id="CVE-2017-5732" ref_url="https://www.suse.com/security/cve/CVE-2017-5732/" source="CVE"/>
		<reference ref_id="CVE-2017-5733" ref_url="https://www.suse.com/security/cve/CVE-2017-5733/" source="CVE"/>
		<reference ref_id="CVE-2017-5734" ref_url="https://www.suse.com/security/cve/CVE-2017-5734/" source="CVE"/>
		<reference ref_id="CVE-2017-5735" ref_url="https://www.suse.com/security/cve/CVE-2017-5735/" source="CVE"/>
		<reference ref_id="CVE-2018-3613" ref_url="https://www.suse.com/security/cve/CVE-2018-3613/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004989.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

Security issues fixed:

- CVE-2018-3613: Fixed AuthVariable Timestamp zeroing issue on APPEND_WRITE (bsc#1115916).
- CVE-2017-5731: Fixed privilege escalation via processing of malformed files in TianoCompress.c (bsc#1115917).
- CVE-2017-5732: Fixed privilege escalation via processing of malformed files in BaseUefiDecompressLib.c (bsc#1115917).
- CVE-2017-5733: Fixed privilege escalation via heap-based buffer overflow in MakeTable() function (bsc#1115917).
- CVE-2017-5734: Fixed privilege escalation via stack-based buffer overflow in MakeTable() function (bsc#1115917).
- CVE-2017-5735: Fixed privilege escalation via heap-based buffer overflow in Decode() function (bsc#1115917).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-20"/>
	<updated date="2018-12-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1115916">SUSE bug 1115916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115917">SUSE bug 1115917</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5731/">CVE-2017-5731 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5731">CVE-2017-5731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5732/">CVE-2017-5732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5732">CVE-2017-5732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5733/">CVE-2017-5733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5733">CVE-2017-5733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5734/">CVE-2017-5734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5734">CVE-2017-5734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5735/">CVE-2017-5735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5735">CVE-2017-5735 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3613/">CVE-2018-3613 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3613">CVE-2018-3613 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553555" comment="ovmf-2017+git1492060560.b6d11d7c46-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553556" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553557" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553558" comment="qemu-uefi-aarch64-2017+git1492060560.b6d11d7c46-4.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149648" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1035442" ref_url="https://bugzilla.suse.com/1035442" source="BUGZILLA"/>
		<reference ref_id="1051729" ref_url="https://bugzilla.suse.com/1051729" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1067317" ref_url="https://bugzilla.suse.com/1067317" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1070158" ref_url="https://bugzilla.suse.com/1070158" source="BUGZILLA"/>
		<reference ref_id="1070159" ref_url="https://bugzilla.suse.com/1070159" source="BUGZILLA"/>
		<reference ref_id="1070160" ref_url="https://bugzilla.suse.com/1070160" source="BUGZILLA"/>
		<reference ref_id="1070163" ref_url="https://bugzilla.suse.com/1070163" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1076116" ref_url="https://bugzilla.suse.com/1076116" source="BUGZILLA"/>
		<reference ref_id="1076180" ref_url="https://bugzilla.suse.com/1076180" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-17563" ref_url="https://www.suse.com/security/cve/CVE-2017-17563/" source="CVE"/>
		<reference ref_id="CVE-2017-17564" ref_url="https://www.suse.com/security/cve/CVE-2017-17564/" source="CVE"/>
		<reference ref_id="CVE-2017-17565" ref_url="https://www.suse.com/security/cve/CVE-2017-17565/" source="CVE"/>
		<reference ref_id="CVE-2017-17566" ref_url="https://www.suse.com/security/cve/CVE-2017-17566/" source="CVE"/>
		<reference ref_id="CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003729.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-5753, CVE-2017-5715, CVE-2017-5754: Prevent information leaks via
  side effects of speculative execution, aka 'Spectre' and 'Meltdown' attacks
  (bsc#1074562, bsc#1068032)
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded
  recursion, stack consumption, and hypervisor crash) or possibly gain privileges
  via crafted page-table stacking (bsc#1061081)
- CVE-2017-17566: Prevent PV guest OS users to cause a denial of service (host
  OS crash) or gain host OS privileges in shadow mode by mapping a certain
  auxiliary page (bsc#1070158).
- CVE-2017-17563: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging an incorrect mask for
  reference-count overflow checking in shadow mode (bsc#1070159).
- CVE-2017-17564: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging incorrect error handling for
  reference counting in shadow mode (bsc#1070160).
- CVE-2017-17565: Prevent PV guest OS users to cause a denial of service (host
  OS crash) if shadow mode and log-dirty mode are in place, because of an
  incorrect assertion related to M2P (bsc#1070163).
- CVE-2018-5683: The vga_draw_text function allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds read and QEMU process crash)
  by leveraging improper memory address validation (bsc#1076116).
- CVE-2017-18030: The cirrus_invalidate_region function allowed local OS guest
  privileged users to cause a denial of service (out-of-bounds array access and
  QEMU process crash) via vectors related to negative pitch (bsc#1076180).

These non-security issues were fixed:

- bsc#1067317: pass cache=writeback|unsafe|directsync to qemu depending on the
  libxl disk settings
- bsc#1051729: Prevent invalid symlinks after install of SLES 12 SP2
- bsc#1035442: Increased the value of LIBXL_DESTROY_TIMEOUT from 10 to 100
  seconds. If many domUs shutdown in parallel the backends couldn't keep up 
- bsc#1027519: Added several upstream patches
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-14"/>
	<updated date="2018-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035442">SUSE bug 1035442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051729">SUSE bug 1051729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067317">SUSE bug 1067317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070158">SUSE bug 1070158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070159">SUSE bug 1070159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070160">SUSE bug 1070160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070163">SUSE bug 1070163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076116">SUSE bug 1076116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076180">SUSE bug 1076180</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15595">CVE-2017-15595 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17563/">CVE-2017-17563 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17563">CVE-2017-17563 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17564/">CVE-2017-17564 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17564">CVE-2017-17564 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17565/">CVE-2017-17565 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17565">CVE-2017-17565 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17566/">CVE-2017-17566 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17566">CVE-2017-17566 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18030">CVE-2017-18030 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5683">CVE-2018-5683 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520450" comment="xen-4.9.1_08-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553559" comment="xen-doc-html-4.9.1_08-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520451" comment="xen-libs-4.9.1_08-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520452" comment="xen-libs-32bit-4.9.1_08-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553560" comment="xen-tools-4.9.1_08-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553561" comment="xen-tools-domU-4.9.1_08-3.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149649" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr and mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1097410" ref_url="https://bugzilla.suse.com/1097410" source="BUGZILLA"/>
		<reference ref_id="1106873" ref_url="https://bugzilla.suse.com/1106873" source="BUGZILLA"/>
		<reference ref_id="1119069" ref_url="https://bugzilla.suse.com/1119069" source="BUGZILLA"/>
		<reference ref_id="1119105" ref_url="https://bugzilla.suse.com/1119105" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="CVE-2018-12384" ref_url="https://www.suse.com/security/cve/CVE-2018-12384/" source="CVE"/>
		<reference ref_id="CVE-2018-12404" ref_url="https://www.suse.com/security/cve/CVE-2018-12404/" source="CVE"/>
		<reference ref_id="CVE-2018-12405" ref_url="https://www.suse.com/security/cve/CVE-2018-12405/" source="CVE"/>
		<reference ref_id="CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466/" source="CVE"/>
		<reference ref_id="CVE-2018-18492" ref_url="https://www.suse.com/security/cve/CVE-2018-18492/" source="CVE"/>
		<reference ref_id="CVE-2018-18493" ref_url="https://www.suse.com/security/cve/CVE-2018-18493/" source="CVE"/>
		<reference ref_id="CVE-2018-18494" ref_url="https://www.suse.com/security/cve/CVE-2018-18494/" source="CVE"/>
		<reference ref_id="CVE-2018-18498" ref_url="https://www.suse.com/security/cve/CVE-2018-18498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss and mozilla-nspr fixes the following issues:

Issues fixed in MozillaFirefox:

- Update to Firefox ESR 60.4 (bsc#1119105)
- CVE-2018-17466: Fixed a buffer overflow and out-of-bounds read in ANGLE library with TextureStorage11
- CVE-2018-18492: Fixed a use-after-free with select element
- CVE-2018-18493: Fixed a buffer overflow in accelerated 2D canvas with Skia
- CVE-2018-18494: Fixed a Same-origin policy violation using location attribute and performance.getEntries
  to steal cross-origin URLs
- CVE-2018-18498: Fixed a integer overflow when calculating buffer sizes for images
- CVE-2018-12405: Fixed a few memory safety bugs

Issues fixed in mozilla-nss:

- Update to NSS 3.40.1 (bsc#1119105)
- CVE-2018-12404: Fixed a cache side-channel variant of the Bleichenbacher attack (bsc#1119069)
- CVE-2018-12384: Fixed an issue in the SSL handshake. NSS responded to an
  SSLv2-compatible ClientHello with a ServerHello that had an all-zero random. (bsc#1106873)
- CVE-2018-0495: Fixed a memory-cache side-channel attack with ECDSA signatures (bsc#1097410)
- Fixed a decryption failure during FFDHE key exchange
- Various security fixes in the ASN.1 code

Issues fixed in mozilla-nspr:

- Update mozilla-nspr to 4.20 (bsc#1119105)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-21"/>
	<updated date="2018-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097410">SUSE bug 1097410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106873">SUSE bug 1106873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119069">SUSE bug 1119069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0495">CVE-2018-0495 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12384/">CVE-2018-12384 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12384">CVE-2018-12384 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12404/">CVE-2018-12404 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12404">CVE-2018-12404 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12405/">CVE-2018-12405 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12405">CVE-2018-12405 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17466">CVE-2018-17466 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18492/">CVE-2018-18492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18492">CVE-2018-18492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18493/">CVE-2018-18493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18493">CVE-2018-18493 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18494/">CVE-2018-18494 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18494">CVE-2018-18494 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18498/">CVE-2018-18498 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18498">CVE-2018-18498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553562" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553563" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553564" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546022" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553565" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546024" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553566" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546026" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553567" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546029" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553568" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546031" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553569" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546034" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553570" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149650" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1077358" ref_url="https://bugzilla.suse.com/1077358" source="BUGZILLA"/>
		<reference ref_id="1099510" ref_url="https://bugzilla.suse.com/1099510" source="BUGZILLA"/>
		<reference ref_id="1101288" ref_url="https://bugzilla.suse.com/1101288" source="BUGZILLA"/>
		<reference ref_id="925502" ref_url="https://bugzilla.suse.com/925502" source="BUGZILLA"/>
		<reference ref_id="995352" ref_url="https://bugzilla.suse.com/995352" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2775" ref_url="https://www.suse.com/security/cve/CVE-2015-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<reference ref_id="CVE-2018-0618" ref_url="https://www.suse.com/security/cve/CVE-2018-0618/" source="CVE"/>
		<reference ref_id="CVE-2018-13796" ref_url="https://www.suse.com/security/cve/CVE-2018-13796/" source="CVE"/>
		<reference ref_id="CVE-2018-5950" ref_url="https://www.suse.com/security/cve/CVE-2018-5950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005005.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following security vulnerabilities:

- Fixed a XSS vulnerability and information leak in user options CGI, which
  could be used to execute arbitrary scripts in the user's browser via
  specially encoded URLs (bsc#1077358 CVE-2018-5950)
- Fixed a directory traversal vulnerability in MTA transports when using the
  recommended Mailman Transport for Exim (bsc#925502 CVE-2015-2775)
- Fixed a XSS vulnerability, which allowed malicious listowners to inject
  scripts into the listinfo pages (bsc#1099510 CVE-2018-0618)
- Fixed arbitrary text injection vulnerability in several mailman CGIs
  (CVE-2018-13796 bsc#1101288)
- Fixed a CSRF vulnerability on the user options page (CVE-2016-6893 bsc#995352)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-28"/>
	<updated date="2018-12-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077358">SUSE bug 1077358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099510">SUSE bug 1099510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101288">SUSE bug 1101288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925502">SUSE bug 925502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995352">SUSE bug 995352</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-2775/">CVE-2015-2775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2775">CVE-2015-2775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6893">CVE-2016-6893 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0618/">CVE-2018-0618 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0618">CVE-2018-0618 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13796/">CVE-2018-13796 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13796">CVE-2018-13796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5950/">CVE-2018-5950 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5950">CVE-2018-5950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546036" comment="mailman-2.1.17-3.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149651" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1117740" ref_url="https://bugzilla.suse.com/1117740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19622" ref_url="https://www.suse.com/security/cve/CVE-2018-19622/" source="CVE"/>
		<reference ref_id="CVE-2018-19623" ref_url="https://www.suse.com/security/cve/CVE-2018-19623/" source="CVE"/>
		<reference ref_id="CVE-2018-19624" ref_url="https://www.suse.com/security/cve/CVE-2018-19624/" source="CVE"/>
		<reference ref_id="CVE-2018-19625" ref_url="https://www.suse.com/security/cve/CVE-2018-19625/" source="CVE"/>
		<reference ref_id="CVE-2018-19626" ref_url="https://www.suse.com/security/cve/CVE-2018-19626/" source="CVE"/>
		<reference ref_id="CVE-2018-19627" ref_url="https://www.suse.com/security/cve/CVE-2018-19627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005007.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update to Wireshark 2.4.11 (bsc#1117740).

Security issues fixed:

- CVE-2018-19625: The Wireshark dissection engine could crash (wnpa-sec-2018-51)
- CVE-2018-19626: The DCOM dissector could crash (wnpa-sec-2018-52)
- CVE-2018-19623: The LBMPDM dissector could crash (wnpa-sec-2018-53) 
- CVE-2018-19622: The MMSE dissector could go into an infinite loop (wnpa-sec-2018-54)
- CVE-2018-19627: The IxVeriWave file parser could crash (wnpa-sec-2018-55) 
- CVE-2018-19624: The PVFS dissector could crash (wnpa-sec-2018-56)

Further bug fixes and updated protocol support as listed in:

- https://www.wireshark.org/docs/relnotes/wireshark-2.4.11.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-28"/>
	<updated date="2018-12-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117740">SUSE bug 1117740</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19622/">CVE-2018-19622 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19622">CVE-2018-19622 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19623/">CVE-2018-19623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19623">CVE-2018-19623 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19624/">CVE-2018-19624 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19624">CVE-2018-19624 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19625/">CVE-2018-19625 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19625">CVE-2018-19625 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19626/">CVE-2018-19626 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19626">CVE-2018-19626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19627/">CVE-2018-19627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19627">CVE-2018-19627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553571" comment="libwireshark9-2.4.11-48.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553572" comment="libwiretap7-2.4.11-48.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553573" comment="libwscodecs1-2.4.11-48.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553574" comment="libwsutil8-2.4.11-48.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553575" comment="wireshark-2.4.11-48.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553576" comment="wireshark-gtk-2.4.11-48.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149652" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1037930" ref_url="https://bugzilla.suse.com/1037930" source="BUGZILLA"/>
		<reference ref_id="1051791" ref_url="https://bugzilla.suse.com/1051791" source="BUGZILLA"/>
		<reference ref_id="1073990" ref_url="https://bugzilla.suse.com/1073990" source="BUGZILLA"/>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="1079036" ref_url="https://bugzilla.suse.com/1079036" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-8804" ref_url="https://www.suse.com/security/cve/CVE-2017-8804/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003732.html" source="SUSE-SU"/>
		<description>

  
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2017-8804: Fix memory leak after deserialization failure in xdr_bytes, xdr_string (bsc#1037930)
- CVE-2017-12132: Reduce EDNS payload size to 1200 bytes (bsc#1051791)
- CVE-2018-6485,CVE-2018-6551: Fix integer overflows in internal memalign and malloc functions (bsc#1079036)
- CVE-2018-1000001: Avoid underflow of malloced area (bsc#1074293)

Non security bugs fixed:

- Release read lock after resetting timeout (bsc#1073990)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-15"/>
	<updated date="2018-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037930">SUSE bug 1037930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051791">SUSE bug 1051791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073990">SUSE bug 1073990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079036">SUSE bug 1079036</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12132">CVE-2017-12132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8804/">CVE-2017-8804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8804">CVE-2017-8804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000001">CVE-2018-1000001 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6485">CVE-2018-6485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6551">CVE-2018-6551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550701" comment="glibc-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550702" comment="glibc-32bit-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550703" comment="glibc-devel-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550704" comment="glibc-devel-32bit-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533165" comment="glibc-html-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518946" comment="glibc-i18ndata-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533166" comment="glibc-info-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550705" comment="glibc-locale-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550706" comment="glibc-locale-32bit-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550707" comment="glibc-profile-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550708" comment="glibc-profile-32bit-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550709" comment="nscd-2.22-62.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149653" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1065641" ref_url="https://bugzilla.suse.com/1065641" source="BUGZILLA"/>
		<reference ref_id="1079798" ref_url="https://bugzilla.suse.com/1079798" source="BUGZILLA"/>
		<reference ref_id="1079799" ref_url="https://bugzilla.suse.com/1079799" source="BUGZILLA"/>
		<reference ref_id="1079800" ref_url="https://bugzilla.suse.com/1079800" source="BUGZILLA"/>
		<reference ref_id="1079801" ref_url="https://bugzilla.suse.com/1079801" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16227" ref_url="https://www.suse.com/security/cve/CVE-2017-16227/" source="CVE"/>
		<reference ref_id="CVE-2018-5378" ref_url="https://www.suse.com/security/cve/CVE-2018-5378/" source="CVE"/>
		<reference ref_id="CVE-2018-5379" ref_url="https://www.suse.com/security/cve/CVE-2018-5379/" source="CVE"/>
		<reference ref_id="CVE-2018-5380" ref_url="https://www.suse.com/security/cve/CVE-2018-5380/" source="CVE"/>
		<reference ref_id="CVE-2018-5381" ref_url="https://www.suse.com/security/cve/CVE-2018-5381/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003734.html" source="SUSE-SU"/>
		<description>
This update for quagga fixes the security following issues:

- The Quagga BGP daemon contained a bug in the AS_PATH size calculation that
  could have been exploited to facilitate a remote denial-of-service attack via
  specially crafted BGP UPDATE messages. [CVE-2017-16227, bsc#1065641]

- The Quagga BGP daemon did not check whether data sent to peers via NOTIFY had
  an invalid attribute length. It was possible to exploit this issue and cause
  the bgpd process to leak sensitive information over the network to a
  configured peer. [CVE-2018-5378, bsc#1079798]

- The Quagga BGP daemon used to double-free memory when processing certain
  forms of UPDATE messages. This issue could be exploited by sending an
  optional/transitive UPDATE attribute that all conforming eBGP speakers should
  pass along. Consequently, a single UPDATE message could have affected many
  bgpd processes across a wide area of a network. Through this vulnerability,
  attackers could potentially have taken over control of affected bgpd
  processes remotely. [CVE-2018-5379, bsc#1079799]

- It was possible to overrun internal BGP code-to-string conversion tables in
  the Quagga BGP daemon. Configured peers could have exploited this issue and
  cause bgpd to emit debug and warning messages into the logs that would
  contained arbitrary bytes. [CVE-2018-5380, bsc#1079800]

- The Quagga BGP daemon could have entered an infinite loop if sent an invalid
  OPEN message by a configured peer. If this issue was exploited, then bgpd
  would cease to respond to any other events. BGP sessions would have been
  dropped and not be reestablished. The CLI interface would have been
  unresponsive. The bgpd daemon would have stayed in this state until
  restarted. [CVE-2018-5381, bsc#1079801]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065641">SUSE bug 1065641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079798">SUSE bug 1079798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079799">SUSE bug 1079799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079800">SUSE bug 1079800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079801">SUSE bug 1079801</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16227/">CVE-2017-16227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16227">CVE-2017-16227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5378/">CVE-2018-5378 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5378">CVE-2018-5378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5379/">CVE-2018-5379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5379">CVE-2018-5379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5380/">CVE-2018-5380 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5380">CVE-2018-5380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5381/">CVE-2018-5381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5381">CVE-2018-5381 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550710" comment="libfpm_pb0-1.1.1-17.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550711" comment="libospf0-1.1.1-17.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550712" comment="libospfapiclient0-1.1.1-17.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550713" comment="libquagga_pb0-1.1.1-17.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550714" comment="libzebra1-1.1.1-17.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550715" comment="quagga-1.1.1-17.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149654" version="1" class="patch">
	<metadata>
		<title>Security update for p7zip (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1077724" ref_url="https://bugzilla.suse.com/1077724" source="BUGZILLA"/>
		<reference ref_id="1077725" ref_url="https://bugzilla.suse.com/1077725" source="BUGZILLA"/>
		<reference ref_id="1077978" ref_url="https://bugzilla.suse.com/1077978" source="BUGZILLA"/>
		<reference ref_id="984650" ref_url="https://bugzilla.suse.com/984650" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1372" ref_url="https://www.suse.com/security/cve/CVE-2016-1372/" source="CVE"/>
		<reference ref_id="CVE-2017-17969" ref_url="https://www.suse.com/security/cve/CVE-2017-17969/" source="CVE"/>
		<reference ref_id="CVE-2018-5996" ref_url="https://www.suse.com/security/cve/CVE-2018-5996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003737.html" source="SUSE-SU"/>
		<description>

  
This update for p7zip fixes the following issues:

Security issues fixed:

- CVE-2016-1372: Fixed multiple vulnerabilities when processing crafted 7z files (bsc#984650)
- CVE-2017-17969: Fixed a heap-based buffer overflow in a shrink decoder (bsc#1077725)
- CVE-2018-5996: Fixed memory corruption in RAR decompression. The complete RAR decoder was removed as it also has license issues (bsc#1077724 bsc#1077978)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077724">SUSE bug 1077724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077725">SUSE bug 1077725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077978">SUSE bug 1077978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984650">SUSE bug 984650</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1372/">CVE-2016-1372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1372">CVE-2016-1372 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17969/">CVE-2017-17969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17969">CVE-2017-17969 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5996/">CVE-2018-5996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5996">CVE-2018-5996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550716" comment="p7zip-9.20.1-7.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149655" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1075608" ref_url="https://bugzilla.suse.com/1075608" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15132" ref_url="https://www.suse.com/security/cve/CVE-2017-15132/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003739.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes one issue.

This security issue was fixed:

- CVE-2017-15132: An abort of SASL authentication resulted in a memory leak in
  dovecot's auth client used by login processes. The leak has impact in high
  performance configuration where same login processes are reused and can cause
  the process to crash due to memory exhaustion (bsc#1075608).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1075608">SUSE bug 1075608</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15132/">CVE-2017-15132 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15132">CVE-2017-15132 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550717" comment="dovecot22-2.2.31-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550718" comment="dovecot22-backend-mysql-2.2.31-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550719" comment="dovecot22-backend-pgsql-2.2.31-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550720" comment="dovecot22-backend-sqlite-2.2.31-19.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149656" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1077983" ref_url="https://bugzilla.suse.com/1077983" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1053" ref_url="https://www.suse.com/security/cve/CVE-2018-1053/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003746.html" source="SUSE-SU"/>
		<description>

  
This update for postgresql96 to version 9.6.7 fixes the following issues:

- CVE-2018-1053: Ensure that all temporary files made by pg_upgrade are non-world-readable. (bsc#1077983)

A full changelog is available here:

	https://www.postgresql.org/docs/9.6/static/release-9-6-7.html

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-21"/>
	<updated date="2018-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077983">SUSE bug 1077983</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1053/">CVE-2018-1053 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1053">CVE-2018-1053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550724" comment="libecpg6-9.6.7-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550725" comment="libpq5-9.6.7-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550726" comment="libpq5-32bit-9.6.7-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550727" comment="postgresql96-9.6.7-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550728" comment="postgresql96-contrib-9.6.7-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533185" comment="postgresql96-docs-9.6.7-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550729" comment="postgresql96-server-9.6.7-3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149657" version="1" class="patch">
	<metadata>
		<title>Security update for libdb-4_8 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1043886" ref_url="https://bugzilla.suse.com/1043886" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003748.html" source="SUSE-SU"/>
		<description>
This update for libdb-4_8 fixes the following issues:

- A DB_CONFIG file in the current working directory allowed local
  users to obtain sensitive information via a symlink attack
  involving a setgid or setuid application using libdb-4_8. (bsc#1043886)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-21"/>
	<updated date="2018-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043886">SUSE bug 1043886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550730" comment="db48-utils-4.8.30-29.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550731" comment="libdb-4_8-4.8.30-29.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550732" comment="libdb-4_8-32bit-4.8.30-29.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149658" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1023415" ref_url="https://bugzilla.suse.com/1023415" source="BUGZILLA"/>
		<reference ref_id="1059061" ref_url="https://bugzilla.suse.com/1059061" source="BUGZILLA"/>
		<reference ref_id="1073935" ref_url="https://bugzilla.suse.com/1073935" source="BUGZILLA"/>
		<reference ref_id="1076119" ref_url="https://bugzilla.suse.com/1076119" source="BUGZILLA"/>
		<reference ref_id="987170" ref_url="https://bugzilla.suse.com/987170" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3144" ref_url="https://www.suse.com/security/cve/CVE-2017-3144/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003752.html" source="SUSE-SU"/>
		<description>
 This update for dhcp fixes several issues.

This security issue was fixed:

- CVE-2017-3144: OMAPI code didn't free socket descriptors when empty message
  is received allowing DoS (bsc#1076119).

These non-security issues were fixed:

- Optimized if and when DNS client context and ports are initted (bsc#1073935)
- Relax permission of dhclient-script for libguestfs (bsc#987170)
- Modify dhclient-script to handle static route updates (bsc#1023415).
- Use only the 12 least significant bits of an inbound packet's TCI value as the VLAN ID
  to fix some packages being wrongly discarded by the Linux packet filter. (bsc#1059061)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-23"/>
	<updated date="2018-02-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023415">SUSE bug 1023415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059061">SUSE bug 1059061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073935">SUSE bug 1073935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076119">SUSE bug 1076119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987170">SUSE bug 987170</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3144/">CVE-2017-3144 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3144">CVE-2017-3144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550733" comment="dhcp-4.3.3-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550734" comment="dhcp-client-4.3.3-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550735" comment="dhcp-relay-4.3.3-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550736" comment="dhcp-server-4.3.3-10.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149659" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1057974" ref_url="https://bugzilla.suse.com/1057974" source="BUGZILLA"/>
		<reference ref_id="1068588" ref_url="https://bugzilla.suse.com/1068588" source="BUGZILLA"/>
		<reference ref_id="1071224" ref_url="https://bugzilla.suse.com/1071224" source="BUGZILLA"/>
		<reference ref_id="1071311" ref_url="https://bugzilla.suse.com/1071311" source="BUGZILLA"/>
		<reference ref_id="1075801" ref_url="https://bugzilla.suse.com/1075801" source="BUGZILLA"/>
		<reference ref_id="1077925" ref_url="https://bugzilla.suse.com/1077925" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18078" ref_url="https://www.suse.com/security/cve/CVE-2017-18078/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003753.html" source="SUSE-SU"/>
		<description>

  
This update for systemd fixes the following issues:

Security issue fixed:

- CVE-2017-18078: tmpfiles: refuse to chown()/chmod() files which are
  hardlinked, unless protected_hardlinks sysctl is on. This could be used
  by local attackers to gain privileges (bsc#1077925)

Non Security issues fixed:

- core: use id unit when retrieving unit file state (#8038) (bsc#1075801)
- cryptsetup-generator: run cryptsetup service before swap unit (#5480)
- udev-rules: all values can contain escaped double quotes now (#6890)
- strv: fix buffer size calculation in strv_join_quoted()
- tmpfiles: change ownership of symlinks too
- stdio-bridge: Correctly propagate error
- stdio-bridge: remove dead code
- remove bus-proxyd (bsc#1057974)
- core/timer: Prevent timer looping when unit cannot start (bsc#1068588)

- Make systemd-timesyncd use the openSUSE NTP servers by default
  Previously systemd-timesyncd used the Google Public NTP servers
  time{1..4}.google.com

- Don't ship /usr/lib/systemd/system/tmp.mnt at all (bsc#1071224)
  But we still ship a copy in /var.
  Users who want to use tmpfs on /tmp are supposed to add a symlink in
  /etc/ pointing to the copy shipped in /var.
  To support the update path we automatically create the symlink if
  tmp.mount in use is located in /usr.

- Enable systemd-networkd on Leap distros only (bsc#1071311)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-26"/>
	<updated date="2018-02-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1057974">SUSE bug 1057974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068588">SUSE bug 1068588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071224">SUSE bug 1071224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071311">SUSE bug 1071311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075801">SUSE bug 1075801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077925">SUSE bug 1077925</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18078/">CVE-2017-18078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18078">CVE-2017-18078 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550737" comment="libsystemd0-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550738" comment="libsystemd0-32bit-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550739" comment="libudev1-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550740" comment="libudev1-32bit-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550741" comment="systemd-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550742" comment="systemd-32bit-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518969" comment="systemd-bash-completion-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550743" comment="systemd-sysvinit-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550744" comment="udev-228-150.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149660" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1042824" ref_url="https://bugzilla.suse.com/1042824" source="BUGZILLA"/>
		<reference ref_id="1042911" ref_url="https://bugzilla.suse.com/1042911" source="BUGZILLA"/>
		<reference ref_id="1048110" ref_url="https://bugzilla.suse.com/1048110" source="BUGZILLA"/>
		<reference ref_id="1048272" ref_url="https://bugzilla.suse.com/1048272" source="BUGZILLA"/>
		<reference ref_id="1049374" ref_url="https://bugzilla.suse.com/1049374" source="BUGZILLA"/>
		<reference ref_id="1049375" ref_url="https://bugzilla.suse.com/1049375" source="BUGZILLA"/>
		<reference ref_id="1050048" ref_url="https://bugzilla.suse.com/1050048" source="BUGZILLA"/>
		<reference ref_id="1050119" ref_url="https://bugzilla.suse.com/1050119" source="BUGZILLA"/>
		<reference ref_id="1050122" ref_url="https://bugzilla.suse.com/1050122" source="BUGZILLA"/>
		<reference ref_id="1050126" ref_url="https://bugzilla.suse.com/1050126" source="BUGZILLA"/>
		<reference ref_id="1050132" ref_url="https://bugzilla.suse.com/1050132" source="BUGZILLA"/>
		<reference ref_id="1050617" ref_url="https://bugzilla.suse.com/1050617" source="BUGZILLA"/>
		<reference ref_id="1052207" ref_url="https://bugzilla.suse.com/1052207" source="BUGZILLA"/>
		<reference ref_id="1052248" ref_url="https://bugzilla.suse.com/1052248" source="BUGZILLA"/>
		<reference ref_id="1052251" ref_url="https://bugzilla.suse.com/1052251" source="BUGZILLA"/>
		<reference ref_id="1052254" ref_url="https://bugzilla.suse.com/1052254" source="BUGZILLA"/>
		<reference ref_id="1052472" ref_url="https://bugzilla.suse.com/1052472" source="BUGZILLA"/>
		<reference ref_id="1052688" ref_url="https://bugzilla.suse.com/1052688" source="BUGZILLA"/>
		<reference ref_id="1052711" ref_url="https://bugzilla.suse.com/1052711" source="BUGZILLA"/>
		<reference ref_id="1052747" ref_url="https://bugzilla.suse.com/1052747" source="BUGZILLA"/>
		<reference ref_id="1052750" ref_url="https://bugzilla.suse.com/1052750" source="BUGZILLA"/>
		<reference ref_id="1052754" ref_url="https://bugzilla.suse.com/1052754" source="BUGZILLA"/>
		<reference ref_id="1052761" ref_url="https://bugzilla.suse.com/1052761" source="BUGZILLA"/>
		<reference ref_id="1055069" ref_url="https://bugzilla.suse.com/1055069" source="BUGZILLA"/>
		<reference ref_id="1055229" ref_url="https://bugzilla.suse.com/1055229" source="BUGZILLA"/>
		<reference ref_id="1056768" ref_url="https://bugzilla.suse.com/1056768" source="BUGZILLA"/>
		<reference ref_id="1057163" ref_url="https://bugzilla.suse.com/1057163" source="BUGZILLA"/>
		<reference ref_id="1058009" ref_url="https://bugzilla.suse.com/1058009" source="BUGZILLA"/>
		<reference ref_id="1072898" ref_url="https://bugzilla.suse.com/1072898" source="BUGZILLA"/>
		<reference ref_id="1074119" ref_url="https://bugzilla.suse.com/1074119" source="BUGZILLA"/>
		<reference ref_id="1074170" ref_url="https://bugzilla.suse.com/1074170" source="BUGZILLA"/>
		<reference ref_id="1075821" ref_url="https://bugzilla.suse.com/1075821" source="BUGZILLA"/>
		<reference ref_id="1076182" ref_url="https://bugzilla.suse.com/1076182" source="BUGZILLA"/>
		<reference ref_id="1078433" ref_url="https://bugzilla.suse.com/1078433" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11166" ref_url="https://www.suse.com/security/cve/CVE-2017-11166/" source="CVE"/>
		<reference ref_id="CVE-2017-11170" ref_url="https://www.suse.com/security/cve/CVE-2017-11170/" source="CVE"/>
		<reference ref_id="CVE-2017-11448" ref_url="https://www.suse.com/security/cve/CVE-2017-11448/" source="CVE"/>
		<reference ref_id="CVE-2017-11450" ref_url="https://www.suse.com/security/cve/CVE-2017-11450/" source="CVE"/>
		<reference ref_id="CVE-2017-11528" ref_url="https://www.suse.com/security/cve/CVE-2017-11528/" source="CVE"/>
		<reference ref_id="CVE-2017-11530" ref_url="https://www.suse.com/security/cve/CVE-2017-11530/" source="CVE"/>
		<reference ref_id="CVE-2017-11531" ref_url="https://www.suse.com/security/cve/CVE-2017-11531/" source="CVE"/>
		<reference ref_id="CVE-2017-11533" ref_url="https://www.suse.com/security/cve/CVE-2017-11533/" source="CVE"/>
		<reference ref_id="CVE-2017-11537" ref_url="https://www.suse.com/security/cve/CVE-2017-11537/" source="CVE"/>
		<reference ref_id="CVE-2017-11638" ref_url="https://www.suse.com/security/cve/CVE-2017-11638/" source="CVE"/>
		<reference ref_id="CVE-2017-11642" ref_url="https://www.suse.com/security/cve/CVE-2017-11642/" source="CVE"/>
		<reference ref_id="CVE-2017-12418" ref_url="https://www.suse.com/security/cve/CVE-2017-12418/" source="CVE"/>
		<reference ref_id="CVE-2017-12427" ref_url="https://www.suse.com/security/cve/CVE-2017-12427/" source="CVE"/>
		<reference ref_id="CVE-2017-12429" ref_url="https://www.suse.com/security/cve/CVE-2017-12429/" source="CVE"/>
		<reference ref_id="CVE-2017-12432" ref_url="https://www.suse.com/security/cve/CVE-2017-12432/" source="CVE"/>
		<reference ref_id="CVE-2017-12566" ref_url="https://www.suse.com/security/cve/CVE-2017-12566/" source="CVE"/>
		<reference ref_id="CVE-2017-12654" ref_url="https://www.suse.com/security/cve/CVE-2017-12654/" source="CVE"/>
		<reference ref_id="CVE-2017-12663" ref_url="https://www.suse.com/security/cve/CVE-2017-12663/" source="CVE"/>
		<reference ref_id="CVE-2017-12664" ref_url="https://www.suse.com/security/cve/CVE-2017-12664/" source="CVE"/>
		<reference ref_id="CVE-2017-12665" ref_url="https://www.suse.com/security/cve/CVE-2017-12665/" source="CVE"/>
		<reference ref_id="CVE-2017-12668" ref_url="https://www.suse.com/security/cve/CVE-2017-12668/" source="CVE"/>
		<reference ref_id="CVE-2017-12674" ref_url="https://www.suse.com/security/cve/CVE-2017-12674/" source="CVE"/>
		<reference ref_id="CVE-2017-13058" ref_url="https://www.suse.com/security/cve/CVE-2017-13058/" source="CVE"/>
		<reference ref_id="CVE-2017-13131" ref_url="https://www.suse.com/security/cve/CVE-2017-13131/" source="CVE"/>
		<reference ref_id="CVE-2017-14060" ref_url="https://www.suse.com/security/cve/CVE-2017-14060/" source="CVE"/>
		<reference ref_id="CVE-2017-14139" ref_url="https://www.suse.com/security/cve/CVE-2017-14139/" source="CVE"/>
		<reference ref_id="CVE-2017-14224" ref_url="https://www.suse.com/security/cve/CVE-2017-14224/" source="CVE"/>
		<reference ref_id="CVE-2017-17682" ref_url="https://www.suse.com/security/cve/CVE-2017-17682/" source="CVE"/>
		<reference ref_id="CVE-2017-17885" ref_url="https://www.suse.com/security/cve/CVE-2017-17885/" source="CVE"/>
		<reference ref_id="CVE-2017-17934" ref_url="https://www.suse.com/security/cve/CVE-2017-17934/" source="CVE"/>
		<reference ref_id="CVE-2017-18028" ref_url="https://www.suse.com/security/cve/CVE-2017-18028/" source="CVE"/>
		<reference ref_id="CVE-2017-9405" ref_url="https://www.suse.com/security/cve/CVE-2017-9405/" source="CVE"/>
		<reference ref_id="CVE-2017-9407" ref_url="https://www.suse.com/security/cve/CVE-2017-9407/" source="CVE"/>
		<reference ref_id="CVE-2018-5357" ref_url="https://www.suse.com/security/cve/CVE-2018-5357/" source="CVE"/>
		<reference ref_id="CVE-2018-6405" ref_url="https://www.suse.com/security/cve/CVE-2018-6405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2017-9405: A memory leak in the ReadICONImage function was fixed that could lead to DoS via memory exhaustion (bsc#1042911)
- CVE-2017-9407: In ImageMagick, the ReadPALMImage function in palm.c allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1042824)
- CVE-2017-11166: In ReadXWDImage in coders\xwd.c a memoryleak could have caused memory exhaustion via a crafted length (bsc#1048110)
- CVE-2017-11170: ReadTGAImage in coders\tga.c allowed for memory exhaustion via invalid colors data in the header of a TGA or VST file (bsc#1048272)
- CVE-2017-11448: The ReadJPEGImage function in coders/jpeg.c in ImageMagick allowed remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.  (bsc#1049375)
- CVE-2017-11450: A remote denial of service in coders/jpeg.c was fixed (bsc#1049374)
- CVE-2017-11528: ReadDIBImage in coders/dib.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050119)
- CVE-2017-11530: ReadEPTImage in coders/ept.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050122)
- CVE-2017-11531: When ImageMagick processed a crafted file in convert, it could lead to a Memory Leak in the WriteHISTOGRAMImage() function in coders/histogram.c.  (bsc#1050126)
- CVE-2017-11533: A information leak by 1 byte due to heap-based buffer over-read in the WriteUILImage() in coders/uil.c was fixed (bsc#1050132)
- CVE-2017-11537: When ImageMagick processed a crafted file in convert, it can lead to a Floating Point Exception (FPE) in the WritePALMImage() function in coders/palm.c, related to an incorrect bits-per-pixel calculation.  (bsc#1050048)
- CVE-2017-11638, CVE-2017-11642: A NULL pointer dereference in theWriteMAPImage() in coders/map.c was fixed which could lead to a crash (bsc#1050617)
- CVE-2017-12418: ImageMagick had memory leaks in the parse8BIMW and format8BIM functions in coders/meta.c, related to the WriteImage function in MagickCore/constitute.c.  (bsc#1052207)
- CVE-2017-12427: ProcessMSLScript coders/msl.c allowed remote attackers to cause a DoS (bsc#1052248)
- CVE-2017-12429: A memory exhaustion flaw in ReadMIFFImage in coders/miff.c was fixed, which allowed attackers to cause DoS (bsc#1052251)
- CVE-2017-12432: In ImageMagick, a memory exhaustion vulnerability was found in the function ReadPCXImage in coders/pcx.c, which allowed attackers to cause a denial of service.  (bsc#1052254)
- CVE-2017-12566: A memory leak in ReadMVGImage in coders/mvg.c, could have allowed attackers to cause DoS (bsc#1052472)
- CVE-2017-12654: The ReadPICTImage function in coders/pict.c in ImageMagick allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1052761)
- CVE-2017-12663: A memory leak in WriteMAPImage in coders/map.c was fixed that could lead to a DoS via memory exhaustion (bsc#1052754)
- CVE-2017-12664: ImageMagick had a memory leak vulnerability in WritePALMImage in coders/palm.c.  (bsc#1052750)
- CVE-2017-12665: ImageMagick had a memory leak vulnerability in WritePICTImage in coders/pict.c.  (bsc#1052747)
- CVE-2017-12668: ImageMagick had a memory leak vulnerability in WritePCXImage in coders/pcx.c. (bsc#1052688)
- CVE-2017-12674: A CPU exhaustion in ReadPDBImage in coders/pdb.c was fixed, which allowed attackers to cause DoS (bsc#1052711)
- CVE-2017-13058: In ImageMagick, a memory leak vulnerability was found in the function WritePCXImage in coders/pcx.c, which allowed attackers to cause a denial of service via a crafted file.  (bsc#1055069)
- CVE-2017-13131: A memory leak vulnerability was found in thefunction ReadMIFFImage in coders/miff.c, which allowed attackers tocause a denial of service (memory consumption in NewL (bsc#1055229)
- CVE-2017-14060: A NULL Pointer Dereference issue in the ReadCUTImage function in coders/cut.c was fixed that could have caused a Denial of Service (bsc#1056768)
- CVE-2017-14139: A memory leak vulnerability in WriteMSLImage in coders/msl.c was fixed. (bsc#1057163)
- CVE-2017-14224: A heap-based buffer overflow in WritePCXImage in coders/pcx.c  could lead to  denial of service or code execution. (bsc#1058009)
- CVE-2017-17682: A large loop vulnerability was fixed in ExtractPostscript in coders/wpg.c, which allowed attackers to cause a denial of service (CPU exhaustion) (bsc#1072898)
- CVE-2017-17885: In ImageMagick, a memory leak vulnerability was found in the function ReadPICTImage in coders/pict.c, which allowed attackers to cause a denial of service via a crafted PICT image file. (bsc#1074119)
- CVE-2017-17934: A memory leak in the function MSLPopImage and ProcessMSLScript could have lead to a denial of service (bsc#1074170)
- CVE-2017-18028: A memory exhaustion in the function ReadTIFFImage in coders/tiff.c was fixed. (bsc#1076182)
- CVE-2018-5357: ImageMagick had memory leaks in the ReadDCMImage function in coders/dcm.c.  (bsc#1075821)
- CVE-2018-6405: In the ReadDCMImage function in coders/dcm.c in ImageMagick, each redmap, greenmap, and bluemap variable can be overwritten by a new pointer. The previous pointer is lost, which leads to a memory leak. This allowed remote attackers to cause a denial of service. (bsc#1078433)


		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-01"/>
	<updated date="2018-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042824">SUSE bug 1042824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042911">SUSE bug 1042911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048110">SUSE bug 1048110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048272">SUSE bug 1048272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049374">SUSE bug 1049374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049375">SUSE bug 1049375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050048">SUSE bug 1050048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050119">SUSE bug 1050119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050122">SUSE bug 1050122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050126">SUSE bug 1050126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050132">SUSE bug 1050132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050617">SUSE bug 1050617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052207">SUSE bug 1052207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052248">SUSE bug 1052248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052251">SUSE bug 1052251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052254">SUSE bug 1052254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052472">SUSE bug 1052472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052688">SUSE bug 1052688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052711">SUSE bug 1052711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052747">SUSE bug 1052747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052750">SUSE bug 1052750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052754">SUSE bug 1052754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052761">SUSE bug 1052761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055069">SUSE bug 1055069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055229">SUSE bug 1055229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056768">SUSE bug 1056768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058009">SUSE bug 1058009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072898">SUSE bug 1072898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074119">SUSE bug 1074119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074170">SUSE bug 1074170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075821">SUSE bug 1075821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076182">SUSE bug 1076182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078433">SUSE bug 1078433</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11166/">CVE-2017-11166 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11166">CVE-2017-11166 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11170/">CVE-2017-11170 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11170">CVE-2017-11170 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-11448/">CVE-2017-11448 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11448">CVE-2017-11448 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11450/">CVE-2017-11450 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11450">CVE-2017-11450 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11528/">CVE-2017-11528 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11528">CVE-2017-11528 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11530/">CVE-2017-11530 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11530">CVE-2017-11530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11531/">CVE-2017-11531 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11531">CVE-2017-11531 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11533/">CVE-2017-11533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11533">CVE-2017-11533 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11537/">CVE-2017-11537 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11537">CVE-2017-11537 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11638/">CVE-2017-11638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11638">CVE-2017-11638 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11642/">CVE-2017-11642 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11642">CVE-2017-11642 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12418/">CVE-2017-12418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12418">CVE-2017-12418 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12427/">CVE-2017-12427 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12427">CVE-2017-12427 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12429/">CVE-2017-12429 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12429">CVE-2017-12429 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12432/">CVE-2017-12432 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12432">CVE-2017-12432 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12566/">CVE-2017-12566 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12566">CVE-2017-12566 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12654/">CVE-2017-12654 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12654">CVE-2017-12654 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12663/">CVE-2017-12663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12663">CVE-2017-12663 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12664/">CVE-2017-12664 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12664">CVE-2017-12664 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12665/">CVE-2017-12665 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12665">CVE-2017-12665 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12668/">CVE-2017-12668 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12668">CVE-2017-12668 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12674/">CVE-2017-12674 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12674">CVE-2017-12674 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13058/">CVE-2017-13058 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13058">CVE-2017-13058 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13131/">CVE-2017-13131 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13131">CVE-2017-13131 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14060/">CVE-2017-14060 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14060">CVE-2017-14060 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14139/">CVE-2017-14139 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14139">CVE-2017-14139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14224/">CVE-2017-14224 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14224">CVE-2017-14224 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17682/">CVE-2017-17682 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17682">CVE-2017-17682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17885/">CVE-2017-17885 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17885">CVE-2017-17885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17934/">CVE-2017-17934 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17934">CVE-2017-17934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-18028/">CVE-2017-18028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18028">CVE-2017-18028 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9405/">CVE-2017-9405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9405">CVE-2017-9405 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9407/">CVE-2017-9407 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9407">CVE-2017-9407 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5357/">CVE-2018-5357 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5357">CVE-2018-5357 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6405/">CVE-2018-6405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6405">CVE-2018-6405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149661" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1040107" ref_url="https://bugzilla.suse.com/1040107" source="BUGZILLA"/>
		<reference ref_id="1040114" ref_url="https://bugzilla.suse.com/1040114" source="BUGZILLA"/>
		<reference ref_id="1052522" ref_url="https://bugzilla.suse.com/1052522" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12596" ref_url="https://www.suse.com/security/cve/CVE-2017-12596/" source="CVE"/>
		<reference ref_id="CVE-2017-9110" ref_url="https://www.suse.com/security/cve/CVE-2017-9110/" source="CVE"/>
		<reference ref_id="CVE-2017-9114" ref_url="https://www.suse.com/security/cve/CVE-2017-9114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003772.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

* CVE-2017-9110: In OpenEXR, an invalid read of size 2 in the hufDecode function in ImfHuf.cpp could cause the application to crash. (bsc#1040107)
* CVE-2017-9114: In OpenEXR, an invalid read of size 1 in the refill function in ImfFastHuf.cpp could cause the application to crash.  (bsc#1040114)
* CVE-2017-12596: In OpenEXR, a crafted image causes a heap-based buffer over-read in the hufDecode function in IlmImf/ImfHuf.cpp during exrmaketiled execution; it could have resulted in denial of service or possibly unspecified other impact.  (bsc#1052522)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-02"/>
	<updated date="2018-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040107">SUSE bug 1040107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040114">SUSE bug 1040114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052522">SUSE bug 1052522</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12596/">CVE-2017-12596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12596">CVE-2017-12596 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9110/">CVE-2017-9110 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9110">CVE-2017-9110 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9114/">CVE-2017-9114 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9114">CVE-2017-9114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550747" comment="libIlmImf-Imf_2_1-21-2.1.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550748" comment="openexr-2.1.0-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149662" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1042948" ref_url="https://bugzilla.suse.com/1042948" source="BUGZILLA"/>
		<reference ref_id="1049373" ref_url="https://bugzilla.suse.com/1049373" source="BUGZILLA"/>
		<reference ref_id="1051412" ref_url="https://bugzilla.suse.com/1051412" source="BUGZILLA"/>
		<reference ref_id="1052252" ref_url="https://bugzilla.suse.com/1052252" source="BUGZILLA"/>
		<reference ref_id="1052771" ref_url="https://bugzilla.suse.com/1052771" source="BUGZILLA"/>
		<reference ref_id="1058082" ref_url="https://bugzilla.suse.com/1058082" source="BUGZILLA"/>
		<reference ref_id="1072902" ref_url="https://bugzilla.suse.com/1072902" source="BUGZILLA"/>
		<reference ref_id="1074122" ref_url="https://bugzilla.suse.com/1074122" source="BUGZILLA"/>
		<reference ref_id="1074425" ref_url="https://bugzilla.suse.com/1074425" source="BUGZILLA"/>
		<reference ref_id="1074610" ref_url="https://bugzilla.suse.com/1074610" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000445" ref_url="https://www.suse.com/security/cve/CVE-2017-1000445/" source="CVE"/>
		<reference ref_id="CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476/" source="CVE"/>
		<reference ref_id="CVE-2017-11449" ref_url="https://www.suse.com/security/cve/CVE-2017-11449/" source="CVE"/>
		<reference ref_id="CVE-2017-11751" ref_url="https://www.suse.com/security/cve/CVE-2017-11751/" source="CVE"/>
		<reference ref_id="CVE-2017-12430" ref_url="https://www.suse.com/security/cve/CVE-2017-12430/" source="CVE"/>
		<reference ref_id="CVE-2017-12642" ref_url="https://www.suse.com/security/cve/CVE-2017-12642/" source="CVE"/>
		<reference ref_id="CVE-2017-14249" ref_url="https://www.suse.com/security/cve/CVE-2017-14249/" source="CVE"/>
		<reference ref_id="CVE-2017-17680" ref_url="https://www.suse.com/security/cve/CVE-2017-17680/" source="CVE"/>
		<reference ref_id="CVE-2017-17882" ref_url="https://www.suse.com/security/cve/CVE-2017-17882/" source="CVE"/>
		<reference ref_id="CVE-2017-9409" ref_url="https://www.suse.com/security/cve/CVE-2017-9409/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2017-1000476: A CPU exhaustion vulnerability was found in the function
  ReadDDSInfo in coders/dds.c, which allowed attackers to cause a denial of
  service (bsc#1074610).
- CVE-2017-9409: The ReadMPCImage function in mpc.c allowed attackers to cause
  a denial of service (memory leak) via a crafted file (bsc#1042948).
- CVE-2017-1000445: A NULL pointer dereference in the MagickCore component
  might have lead to denial of service (bsc#1074425).
- CVE-2017-17680: Prevent a memory leak in the function ReadXPMImage in
  coders/xpm.c, which allowed attackers to cause a denial of service via a
  crafted XPM image file (a different vulnerability than CVE-2017-17882)
  (bsc#1072902).
- CVE-2017-17882: Prevent a memory leak in the function ReadXPMImage in
  coders/xpm.c, which allowed attackers to cause a denial of service via a
  crafted XPM image file (a different vulnerability than CVE-2017-17680)
  (bsc#1074122).
- CVE-2017-11449: coders/mpc did not enable seekable streams and thus could not
  validate blob sizes, which allowed remote attackers to cause a denial of
  service (application crash) or possibly have unspecified other impact via an
  image received from stdin (bsc#1049373).
- CVE-2017-12430: A memory exhaustion in the function ReadMPCImage in
  coders/mpc.c allowed attackers to cause DoS (bsc#1052252).
- CVE-2017-12642: Prevent a memory leak vulnerability in ReadMPCImage in
  coders\mpc.c via crafted file allowing for DoS (bsc#1052771).
- CVE-2017-14249: A mishandled EOF check in ReadMPCImage in coders/mpc.c that
  lead to a division by zero in GetPixelCacheTileSize in MagickCore/cache.c
  allowed remote attackers to cause a denial of service via a crafted file
  (bsc#1058082).
- Prevent memory leak via crafted file in pwp.c allowing for DoS (bsc#1051412)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-09"/>
	<updated date="2018-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042948">SUSE bug 1042948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049373">SUSE bug 1049373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051412">SUSE bug 1051412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052252">SUSE bug 1052252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052771">SUSE bug 1052771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058082">SUSE bug 1058082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072902">SUSE bug 1072902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074122">SUSE bug 1074122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074425">SUSE bug 1074425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074610">SUSE bug 1074610</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000445/">CVE-2017-1000445 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000445">CVE-2017-1000445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000476">CVE-2017-1000476 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11449/">CVE-2017-11449 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11449">CVE-2017-11449 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11751/">CVE-2017-11751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11751">CVE-2017-11751 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12430/">CVE-2017-12430 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12430">CVE-2017-12430 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12642/">CVE-2017-12642 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12642">CVE-2017-12642 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14249/">CVE-2017-14249 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14249">CVE-2017-14249 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17680/">CVE-2017-17680 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17680">CVE-2017-17680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17882/">CVE-2017-17882 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17882">CVE-2017-17882 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9409/">CVE-2017-9409 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9409">CVE-2017-9409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550749" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550750" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149663" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1081557" ref_url="https://bugzilla.suse.com/1081557" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18190" ref_url="https://www.suse.com/security/cve/CVE-2017-18190/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003786.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2017-18190: Removed localhost.localdomain from list
  of trustworthy hosts in scheduler/client.c to avoid arbitrary IPP
  command execution in conjunction with DNS rebinding.
  (bsc#1081557)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-05"/>
	<updated date="2018-03-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1081557">SUSE bug 1081557</bugzilla>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18190/">CVE-2017-18190 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18190">CVE-2017-18190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550751" comment="cups-1.7.5-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550752" comment="cups-client-1.7.5-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550753" comment="cups-libs-1.7.5-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546056" comment="cups-libs-32bit-1.7.5-20.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149664" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1021483" ref_url="https://bugzilla.suse.com/1021483" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10169" ref_url="https://www.suse.com/security/cve/CVE-2016-10169/" source="CVE"/>
		<reference ref_id="CVE-2016-10170" ref_url="https://www.suse.com/security/cve/CVE-2016-10170/" source="CVE"/>
		<reference ref_id="CVE-2016-10171" ref_url="https://www.suse.com/security/cve/CVE-2016-10171/" source="CVE"/>
		<reference ref_id="CVE-2016-10172" ref_url="https://www.suse.com/security/cve/CVE-2016-10172/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003788.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2016-10169 CVE-2016-10170 CVE-2016-10171 CVE-2016-10172: Make sure upper and lower boundaries make sense, to avoid out of bounds memory reads that could lead to crashes or disclosing memory. (bsc#1021483)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-05"/>
	<updated date="2018-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10169/">CVE-2016-10169 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10169">CVE-2016-10169 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10170/">CVE-2016-10170 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10170">CVE-2016-10170 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10171/">CVE-2016-10171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10171">CVE-2016-10171 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10172/">CVE-2016-10172 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10172">CVE-2016-10172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550754" comment="libwavpack1-4.60.99-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149665" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1077003" ref_url="https://bugzilla.suse.com/1077003" source="BUGZILLA"/>
		<reference ref_id="1077006" ref_url="https://bugzilla.suse.com/1077006" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000024" ref_url="https://www.suse.com/security/cve/CVE-2018-1000024/" source="CVE"/>
		<reference ref_id="CVE-2018-1000027" ref_url="https://www.suse.com/security/cve/CVE-2018-1000027/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003793.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

Security issues fixed:

- CVE-2018-1000024: DoS fix caused by incorrect pointer handling when processing ESI
  responses. This affects the default custom esi_parser (bsc#1077003).
- CVE-2018-1000027: DoS fix caused by incorrect pointer handing whien processing ESI
  responses or downloading intermediate CA certificates (bsc#1077006).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-08"/>
	<updated date="2018-03-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077003">SUSE bug 1077003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077006">SUSE bug 1077006</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000024/">CVE-2018-1000024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000024">CVE-2018-1000024 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000027/">CVE-2018-1000027 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000027">CVE-2018-1000027 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550755" comment="squid-3.5.21-26.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149666" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1054171" ref_url="https://bugzilla.suse.com/1054171" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7555" ref_url="https://www.suse.com/security/cve/CVE-2017-7555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003799.html" source="SUSE-SU"/>
		<description>
This update for augeas fixes the following issues:

Security issue fixed:

- CVE-2017-7555: Fix a memory corruption bug could have lead to arbitrary code execution
  by passing crafted strings that would be mis-handled by parse_name() (bsc#1054171).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-09"/>
	<updated date="2018-03-09"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1054171">SUSE bug 1054171</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7555/">CVE-2017-7555 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7555">CVE-2017-7555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553577" comment="augeas-1.2.0-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553578" comment="augeas-lenses-1.2.0-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553579" comment="libaugeas0-1.2.0-17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149667" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1081556" ref_url="https://bugzilla.suse.com/1081556" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003802.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2017-12133: Avoid use-after-free read access in clntudp_call (bsc#1081556)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-09"/>
	<updated date="2018-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081556">SUSE bug 1081556</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12133">CVE-2017-12133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550759" comment="glibc-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550760" comment="glibc-32bit-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550761" comment="glibc-devel-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550762" comment="glibc-devel-32bit-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533214" comment="glibc-html-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519002" comment="glibc-i18ndata-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533215" comment="glibc-info-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550763" comment="glibc-locale-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550764" comment="glibc-locale-32bit-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550765" comment="glibc-profile-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550766" comment="glibc-profile-32bit-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550767" comment="nscd-2.22-62.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149668" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1081294" ref_url="https://bugzilla.suse.com/1081294" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7169" ref_url="https://www.suse.com/security/cve/CVE-2018-7169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003805.html" source="SUSE-SU"/>
		<description>
This update for shadow fixes the following issues:

- CVE-2018-7169: Fixed an privilege escalation in newgidmap,
  which allowed an unprivileged user to be placed in a user namespace where
  setgroups(2) is allowed. (bsc#1081294)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-12"/>
	<updated date="2018-03-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081294">SUSE bug 1081294</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7169/">CVE-2018-7169 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7169">CVE-2018-7169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550768" comment="shadow-4.2.1-27.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149669" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1076390" ref_url="https://bugzilla.suse.com/1076390" source="BUGZILLA"/>
		<reference ref_id="1082810" ref_url="https://bugzilla.suse.com/1082810" source="BUGZILLA"/>
		<reference ref_id="929900" ref_url="https://bugzilla.suse.com/929900" source="BUGZILLA"/>
		<reference ref_id="955131" ref_url="https://bugzilla.suse.com/955131" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2638" ref_url="https://www.suse.com/security/cve/CVE-2018-2638/" source="CVE"/>
		<reference ref_id="CVE-2018-2639" ref_url="https://www.suse.com/security/cve/CVE-2018-2639/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003808.html" source="SUSE-SU"/>
		<description>

  
This update for java-1_8_0-ibm fixes the following issues:

- Removed java-1_8_0-ibm-alsa and java-1_8_0-ibm-plugin entries in
  baselibs.conf due to errors in osc source_validator

Version update to 8.0.5.10 [bsc#1082810]

* Security fixes:

    CVE-2018-2639 CVE-2018-2638 CVE-2018-2633 CVE-2018-2637
    CVE-2018-2634 CVE-2018-2582 CVE-2018-2641 CVE-2018-2618
    CVE-2018-2603 CVE-2018-2599 CVE-2018-2602 CVE-2018-2678
    CVE-2018-2677 CVE-2018-2663 CVE-2018-2588 CVE-2018-2579

* Defect fixes:

    - IJ02608 Class Libraries: Change of namespace definitions with
      	      handlers that implement javax.xml.ws.handler.soap.soaphandler
    - IJ04280 Class Libraries: Deploy Upgrade to Oracle level 8u161-b12
    - IJ03390 Class Libraries: JCL Upgrade to Oracle level 8u161-b12
    - IJ04001 Class Libraries: Performance improvement with child
      	      process on AIX
    - IJ04281 Class Libraries: Startup time increase after applying
      	      apar IV96905
    - IJ03822 Class Libraries: Update timezone information to tzdata2017c
    - IJ03440 Java Virtual Machine: Assertion failure during class creation
    - IJ03717 Java Virtual Machine: Assertion for gencon with concurrent
      	      scavenger on ZOS64
    - IJ03513 Java Virtual Machine: Assertion in concurrent scavenger if
      	      initial heap memory size -Xms is set too low
    - IJ03994 Java Virtual Machine: Class.getmethods() does not return
      	      all methods
    - IJ03413 Java Virtual Machine: Hang creating thread after redefining
      	      classes
    - IJ03852 Java Virtual Machine: ICH408I message when groupaccess is
      	      specified with -xshareclasses
    - IJ03716 Java Virtual Machine: java/lang/linkageerror from
      	      sun/misc/unsafe.definean onymousclass()
    - IJ03116 Java Virtual Machine: java.fullversion string contains an
      	      extra space
    - IJ03347 Java Virtual Machine: java.lang.IllegalStateException in
      	      related class MemoryMXBean
    - IJ03878 Java Virtual Machine: java.lang.StackOverflowError is thrown
      	      when custom security manager in place
    - IJ03605 Java Virtual Machine: Legacy security for com.ibm.jvm.dump,
      	      trace, log was not enabled by default
    - IJ04248 JIT Compiler: ArrayIndexOutOfBoundsException is thrown when
      	      converting BigDecimal to String
    - IJ04250 JIT Compiler: Assertion failure with concurrentScavenge on Z14
    - IJ03606 JIT Compiler: Java crashes with -version
    - IJ04251 JIT Compiler: JIT compiled method that takes advantage of
      	      AutoSIMD produces an incorrect result on x86
    - IJ03854 JIT Compiler: JVM info message appears in stdout
    - IJ03607 JIT Compiler: Result String contains a redundant dot when
      	      converted from BigDecimal with 0 on all platforms
    - IX90185 ORB: Upgrade ibmcfw.jar to version O1800.01
    - IJ03715 Security: Add additional support for the IBMJCEPlus provider,
      	      add support for new IBMJCEPlusFIPS provider
    - IJ03800 Security: A fix in CMS provider for KDB integrity
    - IJ04282 Security: Change in location and default of jurisdiction
      	      policy files
    - IJ03853 Security: IBMCAC provider does not support SHA224
    - IJ02679 Security: IBMPKCS11Impl – Bad sessions are being allocated
      	      internally
    - IJ02706 Security: IBMPKCS11Impl – Bad sessions are being allocated
      	      internally
    - IJ03552 Security: IBMPKCS11Impl - Config file problem with the slot
      	      specification attribute
    - IJ01901 Security: IBMPKCS11Impl – SecureRandom.setSeed() exception
    - IJ03801 Security: Issue with same DN certs, iKeyman GUI error with
      	      stash, JKS Chain issue and JVM argument parse issue with iKeyman
    - IJ03256 Security: javax.security.auth.Subject.toString() throws NPE
    - PI93233 z/OS Extentions: Cipher.doFinal() fails when using
      	      AES/GCM/nopadding with AAD data of 13 bytes and a block size
	      of 4081 to 4096

* Fixes in 8.0.5.7:

    - IJ02605 Class Libraries: Update IBM-1371 charset with new specification
      	      support
    - IJ02541 Java Virtual Machine: Assertions in GC when jvmti runs with
      	      Concurrent Scavenger
    - IJ02443 Java Virtual Machine: Committed eden region size is bigger than
      	      maximum eden region size
    - IJ02378 Java Virtual Machine: Existing signal action for SIG_IGN/SIG_DFL
      	      is not detected properly
    - IJ02758 JIT Compiler: Crash in JIT module during method compilation
    - IJ02733 JIT Compiler: Crash in jit module when compiling in non-default
      	      configuration

* Fixes in 8.0.5.6:

    - IJ02283 Java Virtual Machine: IllegalAccessException due to a missing
      	      access check for the same class in MethodHandle apis
    - IJ02082 Java Virtual Machine: The default value for class unloading kick
      	      off threshold is not set
    - IJ02018 JIT Compiler: Crash or assertion while attempting to acquire
      	      VM access
    - IJ02284 JIT Compiler: Division by zero in JIT compiler
    - IV88941 JIT Compiler: JIT compiler takes far too long to compile a
      	      method
    - IJ02285 JIT Compiler: Performance degradation during class unloading in
      	      Java 8 SR5

- Support Java jnlp files run from Firefox. [bsc#1076390]

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-12"/>
	<updated date="2018-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076390">SUSE bug 1076390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929900">SUSE bug 929900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2579">CVE-2018-2579 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2582">CVE-2018-2582 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2588">CVE-2018-2588 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2599">CVE-2018-2599 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2602">CVE-2018-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2603">CVE-2018-2603 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2618">CVE-2018-2618 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2633">CVE-2018-2633 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2634">CVE-2018-2634 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2637">CVE-2018-2637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2638/">CVE-2018-2638 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2638">CVE-2018-2638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2639/">CVE-2018-2639 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2639">CVE-2018-2639 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2641">CVE-2018-2641 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2663">CVE-2018-2663 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2677">CVE-2018-2677 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2678">CVE-2018-2678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548431" comment="java-1_8_0-ibm-1.8.0_sr5.10-30.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009535629" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009535631" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149670" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1076366" ref_url="https://bugzilla.suse.com/1076366" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2629" ref_url="https://www.suse.com/security/cve/CVE-2018-2629/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003804.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Security issues fixed in OpenJDK 7u171 (January 2018 CPU)(bsc#1076366):

- CVE-2018-2579: Improve key keying case
- CVE-2018-2588: Improve LDAP logins
- CVE-2018-2599: Improve reliability of DNS lookups
- CVE-2018-2602: Improve usage messages
- CVE-2018-2603: Improve PKCS usage
- CVE-2018-2618: Stricter key generation
- CVE-2018-2629: Improve GSS handling
- CVE-2018-2633: Improve LDAP lookup robustness
- CVE-2018-2634: Improve property negotiations
- CVE-2018-2637: Improve JMX supportive features
- CVE-2018-2641: Improve GTK initialization
- CVE-2018-2663: More refactoring for deserialization cases
- CVE-2018-2677: More refactoring for client deserialization cases
- CVE-2018-2678: More refactoring for naming
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-12"/>
	<updated date="2018-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2579">CVE-2018-2579 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2588">CVE-2018-2588 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2599">CVE-2018-2599 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2602">CVE-2018-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2603">CVE-2018-2603 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2618">CVE-2018-2618 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2629/">CVE-2018-2629 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2629">CVE-2018-2629 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2633">CVE-2018-2633 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2634">CVE-2018-2634 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2637">CVE-2018-2637 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2641">CVE-2018-2641 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2663">CVE-2018-2663 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2677">CVE-2018-2677 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2678">CVE-2018-2678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550769" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550770" comment="java-1_7_0-openjdk-demo-1.7.0.171-43.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550771" comment="java-1_7_0-openjdk-devel-1.7.0.171-43.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550772" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149671" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1076366" ref_url="https://bugzilla.suse.com/1076366" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2629" ref_url="https://www.suse.com/security/cve/CVE-2018-2629/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003806.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Security issues fix in jdk8u161 (icedtea 3.7.0)(bsc#1076366):

- CVE-2018-2579: Improve key keying case
- CVE-2018-2582: Better interface invocations
- CVE-2018-2588: Improve LDAP logins
- CVE-2018-2599: Improve reliability of DNS lookups
- CVE-2018-2602: Improve usage messages
- CVE-2018-2603: Improve PKCS usage
- CVE-2018-2618: Stricter key generation
- CVE-2018-2629: Improve GSS handling
- CVE-2018-2633: Improve LDAP lookup robustness
- CVE-2018-2634: Improve property negotiations
- CVE-2018-2637: Improve JMX supportive features
- CVE-2018-2641: Improve GTK initialization
- CVE-2018-2663: More refactoring for deserialization cases
- CVE-2018-2677: More refactoring for client deserialization cases
- CVE-2018-2678: More refactoring for naming deserialization cases
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-12"/>
	<updated date="2018-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2579">CVE-2018-2579 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2582">CVE-2018-2582 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2588">CVE-2018-2588 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2599">CVE-2018-2599 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2602">CVE-2018-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2603">CVE-2018-2603 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2618">CVE-2018-2618 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2629/">CVE-2018-2629 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2629">CVE-2018-2629 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2633">CVE-2018-2633 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2634">CVE-2018-2634 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2637">CVE-2018-2637 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2641">CVE-2018-2641 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2663">CVE-2018-2663 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2677">CVE-2018-2677 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2678">CVE-2018-2678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550773" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550774" comment="java-1_8_0-openjdk-demo-1.8.0.161-27.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550775" comment="java-1_8_0-openjdk-devel-1.8.0.161-27.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550776" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149672" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1077355" ref_url="https://bugzilla.suse.com/1077355" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1142857" ref_url="https://www.suse.com/security/cve/CVE-2015-1142857/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003812.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- CVE-2015-1142857: Add 7.13.1.0 bnx2x firmware files to fix a ethernet flow control
  vulnerability in SRIOV devices (bsc#1077355)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-14"/>
	<updated date="2018-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077355">SUSE bug 1077355</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1142857/">CVE-2015-1142857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1142857">CVE-2015-1142857 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519012" comment="kernel-firmware-20170530-21.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519013" comment="ucode-amd-20170530-21.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149673" version="1" class="patch">
	<metadata>
		<title>Security update for libcdio (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1082877" ref_url="https://bugzilla.suse.com/1082877" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18201" ref_url="https://www.suse.com/security/cve/CVE-2017-18201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003811.html" source="SUSE-SU"/>
		<description>
This update for libcdio fixes the following issues:

- CVE-2017-18201: Fixed a double free vulnerability (bsc#1082877).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-14"/>
	<updated date="2018-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082877">SUSE bug 1082877</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18201/">CVE-2017-18201 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18201">CVE-2017-18201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550780" comment="libcdio14-0.90-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550781" comment="libcdio14-32bit-0.90-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149674" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1057460" ref_url="https://bugzilla.suse.com/1057460" source="BUGZILLA"/>
		<reference ref_id="1076390" ref_url="https://bugzilla.suse.com/1076390" source="BUGZILLA"/>
		<reference ref_id="1082810" ref_url="https://bugzilla.suse.com/1082810" source="BUGZILLA"/>
		<reference ref_id="1085018" ref_url="https://bugzilla.suse.com/1085018" source="BUGZILLA"/>
		<reference ref_id="929900" ref_url="https://bugzilla.suse.com/929900" source="BUGZILLA"/>
		<reference ref_id="955131" ref_url="https://bugzilla.suse.com/955131" source="BUGZILLA"/>
		<reference ref_id="966304" ref_url="https://bugzilla.suse.com/966304" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2657" ref_url="https://www.suse.com/security/cve/CVE-2018-2657/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003815.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

The version was updated to 7.1.4.20 [bsc#1082810]

* Security fixes:

  - CVE-2018-2633 CVE-2018-2637 CVE-2018-2634 CVE-2018-2582
    CVE-2018-2641 CVE-2018-2618 CVE-2018-2657 CVE-2018-2603
    CVE-2018-2599 CVE-2018-2602 CVE-2018-2678 CVE-2018-2677
    CVE-2018-2663 CVE-2018-2588 CVE-2018-2579

* Defect fixes:

  - IJ04281 Class Libraries: Startup time increase after applying
              apar IV96905
  - IJ03822 Class Libraries: Update timezone information to tzdata2017c
  - IJ03605 Java Virtual Machine: Legacy security for com.ibm.jvm.dump,
              trace, log was not enabled by default
  - IJ03607 JIT Compiler: Result String contains a redundant dot when
              converted from BigDecimal with 0 on all platforms
  - IX90185 ORB: Upgrade ibmcfw.jar to version O1800.01
  - IJ04282 Security: Change in location and default of jurisdiction
              policy files
  - IJ03853 Security: IBMCAC provider does not support SHA224
  - IJ02679 Security: IBMPKCS11Impl -- Bad sessions are being allocated
              internally
  - IJ02706 Security: IBMPKCS11Impl -- Bad sessions are being allocated
              internally
  - IJ03552 Security: IBMPKCS11Impl -- Config file problem with the slot
              specification attribute
  - IJ01901 Security: IBMPKCS11Impl -- SecureRandom.setSeed() exception
  - IJ03801 Security: Issue with same DN certs, iKeyman GUI error with
              stash, JKS Chain issue and JVM argument parse issue with iKeyman
  - IJ03256 Security: javax.security.auth.Subject.toString() throws NPE
  - IJ02284 JIT Compiler: Division by zero in JIT compiler

* SUSE fixes:

  - Make it possible to run Java jnlp files from Firefox. (bsc#1057460)

  - Fixed symlinks to policy files on update [bsc#1085018]

  - Fixed jpackage-java-1_7_1-ibm-webstart.desktop file to allow
    Java jnlp files run from Firefox. [bsc#1057460, bsc#1076390]

  - Fix javaws segfaults when java expiration timer has elapsed. [bsc#929900]

  - Provide IBM Java updates for IBMs PMR 55931,671,760 and for SUSEs
    SR 110991601735. [bsc#966304]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-15"/>
	<updated date="2018-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057460">SUSE bug 1057460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076390">SUSE bug 1076390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085018">SUSE bug 1085018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929900">SUSE bug 929900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966304">SUSE bug 966304</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2579">CVE-2018-2579 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2582">CVE-2018-2582 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2588">CVE-2018-2588 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2599">CVE-2018-2599 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2602">CVE-2018-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2603">CVE-2018-2603 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2618">CVE-2018-2618 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2633">CVE-2018-2633 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2634">CVE-2018-2634 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2637">CVE-2018-2637 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2641">CVE-2018-2641 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2657/">CVE-2018-2657 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2657">CVE-2018-2657 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2663">CVE-2018-2663 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2677">CVE-2018-2677 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2678">CVE-2018-2678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550782" comment="java-1_7_1-ibm-1.7.1_sr4.20-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550783" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550784" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550785" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149675" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1078431" ref_url="https://bugzilla.suse.com/1078431" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2562" ref_url="https://www.suse.com/security/cve/CVE-2018-2562/" source="CVE"/>
		<reference ref_id="CVE-2018-2612" ref_url="https://www.suse.com/security/cve/CVE-2018-2612/" source="CVE"/>
		<reference ref_id="CVE-2018-2622" ref_url="https://www.suse.com/security/cve/CVE-2018-2622/" source="CVE"/>
		<reference ref_id="CVE-2018-2640" ref_url="https://www.suse.com/security/cve/CVE-2018-2640/" source="CVE"/>
		<reference ref_id="CVE-2018-2665" ref_url="https://www.suse.com/security/cve/CVE-2018-2665/" source="CVE"/>
		<reference ref_id="CVE-2018-2668" ref_url="https://www.suse.com/security/cve/CVE-2018-2668/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003816.html" source="SUSE-SU"/>
		<description>

  
This update for mariadb fixes the following issues:

MariaDB was updated to 10.0.34 (bsc#1078431)

The following security vulnerabilities are fixed:

- CVE-2018-2562: Vulnerability in the MySQL Server subcomponent: Server : Partition. Easily exploitable vulnerability allowed low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data.
- CVE-2018-2622: Vulnerability in the MySQL Server subcomponent: Server: DDL. Easily exploitable vulnerability allowed low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
- CVE-2018-2640: Vulnerability in the MySQL Server subcomponent: Server: Optimizer. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
- CVE-2018-2665: Vulnerability in the MySQL Server subcomponent: Server: Optimizer. Easily exploitable vulnerability allowed low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
- CVE-2018-2668: Vulnerability in the MySQL Server subcomponent: Server: Optimizer. Easily exploitable vulnerability allowed low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
- CVE-2018-2612: Vulnerability in the MySQL Server subcomponent: InnoDB. Easily exploitable vulnerability allowed high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.


The MariaDB external release notes and changelog for this release:

* https://kb.askmonty.org/en/mariadb-10034-release-notes
* https://kb.askmonty.org/en/mariadb-10034-changelog

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-15"/>
	<updated date="2018-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2562/">CVE-2018-2562 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2562">CVE-2018-2562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2612/">CVE-2018-2612 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2612">CVE-2018-2612 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2622/">CVE-2018-2622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2622">CVE-2018-2622 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2640/">CVE-2018-2640 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2640">CVE-2018-2640 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2665/">CVE-2018-2665 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2665">CVE-2018-2665 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2668/">CVE-2018-2668 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2668">CVE-2018-2668 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550786" comment="libmysqlclient18-10.0.34-29.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548438" comment="libmysqlclient18-32bit-10.0.34-29.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550787" comment="mariadb-10.0.34-29.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550788" comment="mariadb-client-10.0.34-29.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550789" comment="mariadb-errormessages-10.0.34-29.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550790" comment="mariadb-tools-10.0.34-29.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149676" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1085207" ref_url="https://bugzilla.suse.com/1085207" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003819.html" source="SUSE-SU"/>
		<description>

This update for ucode-intel fixes the following issues:

The Intel CPU microcode version was updated to version 20180312.

This update enables the IBPB+IBRS based mitigations of the Spectre v2 flaws (boo#1085207 CVE-2017-5715)

- New Platforms

  - BDX-DE EGW A0 6-56-5:10 e000009
  - SKX B1 6-55-3:97 1000140

- Updates

  - SNB D2 6-2a-7:12 29-&gt;2d
  - JKT C1 6-2d-6:6d 619-&gt;61c
  - JKT C2 6-2d-7:6d 710-&gt;713
  - IVB E2 6-3a-9:12 1c-&gt;1f
  - IVT C0 6-3e-4:ed 428-&gt;42c
  - IVT D1 6-3e-7:ed 70d-&gt;713
  - HSW Cx/Dx 6-3c-3:32 22-&gt;24
  - HSW-ULT Cx/Dx 6-45-1:72 20-&gt;23
  - CRW Cx 6-46-1:32 17-&gt;19
  - HSX C0 6-3f-2:6f 3a-&gt;3c
  - HSX-EX E0 6-3f-4:80 0f-&gt;11
  - BDW-U/Y E/F 6-3d-4:c0 25-&gt;2a
  - BDW-H E/G 6-47-1:22 17-&gt;1d
  - BDX-DE V0/V1 6-56-2:10 0f-&gt;15
  - BDW-DE V2 6-56-3:10 700000d-&gt;7000012
  - BDW-DE Y0 6-56-4:10 f00000a-&gt;f000011
  - SKL-U/Y D0 6-4e-3:c0 ba-&gt;c2
  - SKL R0 6-5e-3:36 ba-&gt;c2
  - KBL-U/Y H0 6-8e-9:c0 62-&gt;84
  - KBL B0 6-9e-9:2a 5e-&gt;84
  - CFL D0 6-8e-a:c0 70-&gt;84
  - CFL U0 6-9e-a:22 70-&gt;84
  - CFL B0 6-9e-b:02 72-&gt;84
  - SKX H0 6-55-4:b7 2000035-&gt;2000043
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-16"/>
	<updated date="2018-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085207">SUSE bug 1085207</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519024" comment="ucode-intel-20180312-13.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149677" version="1" class="patch">
	<metadata>
		<title>Security update for xmltooling (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1083247" ref_url="https://bugzilla.suse.com/1083247" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0486" ref_url="https://www.suse.com/security/cve/CVE-2018-0486/" source="CVE"/>
		<reference ref_id="CVE-2018-0489" ref_url="https://www.suse.com/security/cve/CVE-2018-0489/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003822.html" source="SUSE-SU"/>
		<description>
This update for xmltooling fixes the following issues:

- CVE-2018-0489: Fixed a security bug when xmltooling mishandled digital
  signatures of user data, which allows remote attackers to obtain
  sensitive information or conduct impersonation attacks via crafted
  XML data. NOTE: this issue exists because of an incomplete fix for
  CVE-2018-0486. (bsc#1083247)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-16"/>
	<updated date="2018-03-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083247">SUSE bug 1083247</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0486/">CVE-2018-0486 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0486">CVE-2018-0486 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0489/">CVE-2018-0489 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0489">CVE-2018-0489 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550799" comment="libxmltooling6-1.5.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550800" comment="xmltooling-schemas-1.5.6-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149678" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1057460" ref_url="https://bugzilla.suse.com/1057460" source="BUGZILLA"/>
		<reference ref_id="1076390" ref_url="https://bugzilla.suse.com/1076390" source="BUGZILLA"/>
		<reference ref_id="1082810" ref_url="https://bugzilla.suse.com/1082810" source="BUGZILLA"/>
		<reference ref_id="1085018" ref_url="https://bugzilla.suse.com/1085018" source="BUGZILLA"/>
		<reference ref_id="929900" ref_url="https://bugzilla.suse.com/929900" source="BUGZILLA"/>
		<reference ref_id="955131" ref_url="https://bugzilla.suse.com/955131" source="BUGZILLA"/>
		<reference ref_id="966304" ref_url="https://bugzilla.suse.com/966304" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2657" ref_url="https://www.suse.com/security/cve/CVE-2018-2657/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003824.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issue:

The version was updated to 7.1.4.20 [bsc#1082810]

* Security fixes:

  - CVE-2018-2633 CVE-2018-2637 CVE-2018-2634 CVE-2018-2582
    CVE-2018-2641 CVE-2018-2618 CVE-2018-2657 CVE-2018-2603
    CVE-2018-2599 CVE-2018-2602 CVE-2018-2678 CVE-2018-2677
    CVE-2018-2663 CVE-2018-2588 CVE-2018-2579

* Defect fixes:

  - IJ04281 Class Libraries: Startup time increase after applying
              apar IV96905
  - IJ03822 Class Libraries: Update timezone information to tzdata2017c
  - IJ03605 Java Virtual Machine: Legacy security for com.ibm.jvm.dump,
              trace, log was not enabled by default
  - IJ03607 JIT Compiler: Result String contains a redundant dot when
              converted from BigDecimal with 0 on all platforms
  - IX90185 ORB: Upgrade ibmcfw.jar to version O1800.01
  - IJ04282 Security: Change in location and default of jurisdiction
              policy files
  - IJ03853 Security: IBMCAC provider does not support SHA224
  - IJ02679 Security: IBMPKCS11Impl -- Bad sessions are being allocated
              internally
  - IJ02706 Security: IBMPKCS11Impl -- Bad sessions are being allocated
              internally
  - IJ03552 Security: IBMPKCS11Impl -- Config file problem with the slot
              specification attribute
  - IJ01901 Security: IBMPKCS11Impl -- SecureRandom.setSeed() exception
  - IJ03801 Security: Issue with same DN certs, iKeyman GUI error with
              stash, JKS Chain issue and JVM argument parse issue with iKeyman
  - IJ03256 Security: javax.security.auth.Subject.toString() throws NPE
  - IJ02284 JIT Compiler: Division by zero in JIT compiler

* SUSE fixes:

  - Make it possible to run Java jnlp files from Firefox. (bsc#1057460)

  - Fixed jpackage-java-1_7_1-ibm-webstart.desktop file to allow
    Java jnlp files run from Firefox. [bsc#1057460, bsc#1076390]

  - Fix javaws segfaults when java expiration timer has elapsed. [bsc#929900]

  - Provide IBM Java updates for IBMs PMR 55931,671,760 and for SUSEs
    SR 110991601735. [bsc#966304]

  - Ensure that all Java policy files are symlinked into the proper file system
    locations. Without those symlinks, several OES iManager plugins did not
    function properly. [bsc#1085018]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-19"/>
	<updated date="2018-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057460">SUSE bug 1057460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076390">SUSE bug 1076390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085018">SUSE bug 1085018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929900">SUSE bug 929900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966304">SUSE bug 966304</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2579">CVE-2018-2579 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2582">CVE-2018-2582 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2588">CVE-2018-2588 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2599">CVE-2018-2599 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2602">CVE-2018-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2603">CVE-2018-2603 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2618">CVE-2018-2618 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2633">CVE-2018-2633 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2634">CVE-2018-2634 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2637">CVE-2018-2637 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2641">CVE-2018-2641 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2657/">CVE-2018-2657 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2657">CVE-2018-2657 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2663">CVE-2018-2663 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2677">CVE-2018-2677 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2678">CVE-2018-2678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546069" comment="java-1_7_1-ibm-1.7.1_sr4.20-38.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009535646" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546070" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009535649" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149679" version="1" class="patch">
	<metadata>
		<title>Security update for samba, talloc, tevent (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1069666" ref_url="https://bugzilla.suse.com/1069666" source="BUGZILLA"/>
		<reference ref_id="1081741" ref_url="https://bugzilla.suse.com/1081741" source="BUGZILLA"/>
		<reference ref_id="1084191" ref_url="https://bugzilla.suse.com/1084191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003827.html" source="SUSE-SU"/>
		<description>


Samba was updated to version 4.6.13 to fix several bugs. (bsc#1084191)

Security issue fixed:

- CVE-2018-1050: DOS vulnerability when SPOOLSS is run externally (bsc#1081741).

The library talloc was updated to version 2.1.10:

- build, documentation and python3 improvements

The library tevent was updated to version 0.9.34 (bsc#1069666);

- Remove unused select backend
- Fix a race condition in tevent_threaded_schedule_immediate(); (bso#13130);
- make tevent_req_print() more robust against crashes
- Fix mutex locking in tevent_threaded_context_destructor().
- Re-init threading in tevent_re_initialise().
- Include the finish location in tevent_req_default_print().

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-21"/>
	<updated date="2018-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069666">SUSE bug 1069666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081741">SUSE bug 1081741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084191">SUSE bug 1084191</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1050">CVE-2018-1050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553580" comment="libdcerpc-binding0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553581" comment="libdcerpc-binding0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553582" comment="libdcerpc0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553583" comment="libdcerpc0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553584" comment="libndr-krb5pac0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553585" comment="libndr-krb5pac0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553586" comment="libndr-nbt0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553587" comment="libndr-nbt0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553588" comment="libndr-standard0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553589" comment="libndr-standard0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553590" comment="libndr0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553591" comment="libndr0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553592" comment="libnetapi0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553593" comment="libnetapi0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553594" comment="libsamba-credentials0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553595" comment="libsamba-credentials0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553596" comment="libsamba-errors0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553597" comment="libsamba-errors0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553598" comment="libsamba-hostconfig0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553599" comment="libsamba-hostconfig0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553600" comment="libsamba-passdb0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553601" comment="libsamba-passdb0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553602" comment="libsamba-util0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553603" comment="libsamba-util0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553604" comment="libsamdb0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553605" comment="libsamdb0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553606" comment="libsmbclient0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553607" comment="libsmbclient0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553608" comment="libsmbconf0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553609" comment="libsmbconf0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553610" comment="libsmbldap0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553611" comment="libsmbldap0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553612" comment="libtalloc2-2.1.10-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553613" comment="libtalloc2-32bit-2.1.10-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553614" comment="libtevent-util0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553615" comment="libtevent-util0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553616" comment="libtevent0-0.9.34-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553617" comment="libtevent0-32bit-0.9.34-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553618" comment="libwbclient0-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553619" comment="libwbclient0-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553620" comment="python-talloc-2.1.10-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553621" comment="python-talloc-32bit-2.1.10-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553622" comment="samba-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553623" comment="samba-client-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553624" comment="samba-client-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520574" comment="samba-doc-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553625" comment="samba-libs-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553626" comment="samba-libs-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553627" comment="samba-winbind-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553628" comment="samba-winbind-32bit-4.6.13+git.72.2a684235f41-3.21.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149680" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1081925" ref_url="https://bugzilla.suse.com/1081925" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1058" ref_url="https://www.suse.com/security/cve/CVE-2018-1058/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003829.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

Security issues fixed:

- CVE-2018-1058: Fixed uncontrolled search path element in pg_dump and other client applications (bsc#1081925).


Bug fixes:

- See release notes for details:
  * https://www.postgresql.org/docs/9.6/static/release-9-6-8.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-21"/>
	<updated date="2018-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081925">SUSE bug 1081925</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1058/">CVE-2018-1058 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1058">CVE-2018-1058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550803" comment="libecpg6-9.6.8-3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550804" comment="libpq5-9.6.8-3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550805" comment="libpq5-32bit-9.6.8-3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550806" comment="postgresql96-9.6.8-3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550807" comment="postgresql96-contrib-9.6.8-3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533246" comment="postgresql96-docs-9.6.8-3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550808" comment="postgresql96-server-9.6.8-3.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149681" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1040202" ref_url="https://bugzilla.suse.com/1040202" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068613" ref_url="https://bugzilla.suse.com/1068613" source="BUGZILLA"/>
		<reference ref_id="1070144" ref_url="https://bugzilla.suse.com/1070144" source="BUGZILLA"/>
		<reference ref_id="1071228" ref_url="https://bugzilla.suse.com/1071228" source="BUGZILLA"/>
		<reference ref_id="1073489" ref_url="https://bugzilla.suse.com/1073489" source="BUGZILLA"/>
		<reference ref_id="1074572" ref_url="https://bugzilla.suse.com/1074572" source="BUGZILLA"/>
		<reference ref_id="1076114" ref_url="https://bugzilla.suse.com/1076114" source="BUGZILLA"/>
		<reference ref_id="1076775" ref_url="https://bugzilla.suse.com/1076775" source="BUGZILLA"/>
		<reference ref_id="1076813" ref_url="https://bugzilla.suse.com/1076813" source="BUGZILLA"/>
		<reference ref_id="1082276" ref_url="https://bugzilla.suse.com/1082276" source="BUGZILLA"/>
		<reference ref_id="1083291" ref_url="https://bugzilla.suse.com/1083291" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15119" ref_url="https://www.suse.com/security/cve/CVE-2017-15119/" source="CVE"/>
		<reference ref_id="CVE-2017-15124" ref_url="https://www.suse.com/security/cve/CVE-2017-15124/" source="CVE"/>
		<reference ref_id="CVE-2017-16845" ref_url="https://www.suse.com/security/cve/CVE-2017-16845/" source="CVE"/>
		<reference ref_id="CVE-2017-17381" ref_url="https://www.suse.com/security/cve/CVE-2017-17381/" source="CVE"/>
		<reference ref_id="CVE-2017-18043" ref_url="https://www.suse.com/security/cve/CVE-2017-18043/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003831.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

This update has the next round of Spectre v2 related patches, which
now integrate with corresponding changes in libvirt. (CVE-2017-5715
bsc#1068032)

The January 2018 release of qemu initially addressed the Spectre v2
vulnerability for KVM guests by exposing the spec-ctrl feature
for all x86 vcpu types, which was the quick and dirty approach,
but not the proper solution.

We replaced our initial patch by the patches from upstream.

This update defines spec_ctrl and ibpb cpu feature flags as well as new
cpu models which are clones of existing models with either -IBRS or -IBPB
added to the end of the model name. These new vcpu models explicitly
include the new feature(s), whereas the feature flags can be added
to the cpu parameter as with other features. In short, for continued
Spectre v2 protection, ensure that either the appropriate cpu feature
flag is added to the QEMU command-line, or one of the new cpu models is
used.

Although migration from older versions is supported, the new cpu
features won't be properly exposed to the guest until it is restarted
with the cpu features explicitly added. A reboot is insufficient.

A warning patch is added which attempts to detect a migration
from a qemu version which had the quick and dirty fix (it only
detects certain cases, but hopefully is helpful.)
For additional information on Spectre v2 as it relates to QEMU,
see:
        https://www.qemu.org/2018/02/14/qemu-2-11-1-and-spectre-update/

A patch is added to continue to detect Spectre v2 mitigation
features (as shown by cpuid), and if found provide that feature
to guests, even if running on older KVM (kernel) versions which
do not yet expose that feature to QEMU. (bsc#1082276)

These two patches will be removed when we can reasonably assume
everyone is running with the appropriate updates.

Spectre fixes for IBM Z Series were included by providing more hw features
to guests (bsc#1076813)

Also security fixes for the following CVE issues are included:

- CVE-2017-17381: The Virtio Vring implementation in QEMU allowed local OS guest users to cause a denial of service (divide-by-zero error and QEMU process crash) by unsetting vring alignment while updating Virtio rings. (bsc#1071228)
- CVE-2017-16845: The PS2 driver in Qemu did not validate 'rptr' and 'count' values during guest migration, leading to out-of-bounds access. (bsc#1068613)
- CVE-2017-15119: The Network Block Device (NBD) server in Quick Emulator (QEMU), was vulnerable to a denial of service issue. It could occur if a client sent large option requests, making the server waste CPU time on reading up to 4GB per request. A client could use this flaw to keep the NBD server from serving other requests, resulting in DoS. (bsc#1070144)
- CVE-2017-18043: Integer overflow in the macro ROUND_UP (n, d) in Quick Emulator (Qemu) allowed a user to cause a denial of service (Qemu process crash). (bsc#1076775)
- CVE-2018-5683: The VGA driver in Qemu allowed local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation. (bsc#1076114)
- CVE-2018-7550: The multiboot functionality in Quick Emulator (aka QEMU) allowed local guest OS users to execute arbitrary code on the QEMU host via an out-of-bounds read or write memory access. (bsc#1083291)
- CVE-2017-15124: VNC server implementation in Quick Emulator (QEMU) was found to be vulnerable to an unbounded memory allocation issue, as it did not throttle the framebuffer updates sent to its client. If the client did not consume these updates, VNC server allocates growing memory to hold onto this data. A malicious remote VNC client could use this flaw to cause DoS to the server host. (bsc#1073489)

Additional bugs fixed:

- Fix pcihp for 1.6 and older machine types (bsc#1074572)
- Fix packaging dependencies (coreutils) for qemu-ksm package (bsc#1040202)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-21"/>
	<updated date="2018-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040202">SUSE bug 1040202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068613">SUSE bug 1068613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070144">SUSE bug 1070144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071228">SUSE bug 1071228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073489">SUSE bug 1073489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074572">SUSE bug 1074572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076114">SUSE bug 1076114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076775">SUSE bug 1076775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076813">SUSE bug 1076813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082276">SUSE bug 1082276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083291">SUSE bug 1083291</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15119/">CVE-2017-15119 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15119">CVE-2017-15119 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15124/">CVE-2017-15124 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15124">CVE-2017-15124 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16845/">CVE-2017-16845 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16845">CVE-2017-16845 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17381/">CVE-2017-17381 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17381">CVE-2017-17381 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18043/">CVE-2017-18043 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18043">CVE-2017-18043 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5683">CVE-2018-5683 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7550">CVE-2018-7550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553629" comment="qemu-2.9.1-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553630" comment="qemu-arm-2.9.1-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553631" comment="qemu-block-curl-2.9.1-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553632" comment="qemu-block-iscsi-2.9.1-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553633" comment="qemu-block-rbd-2.9.1-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553634" comment="qemu-block-ssh-2.9.1-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553635" comment="qemu-guest-agent-2.9.1-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520581" comment="qemu-ipxe-1.0.0-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553636" comment="qemu-kvm-2.9.1-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553637" comment="qemu-lang-2.9.1-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553638" comment="qemu-ppc-2.9.1-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553639" comment="qemu-s390-2.9.1-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520583" comment="qemu-seabios-1.10.2-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520584" comment="qemu-sgabios-8-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553640" comment="qemu-tools-2.9.1-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520586" comment="qemu-vgabios-1.10.2-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520587" comment="qemu-x86-2.9.1-6.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149682" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1084521" ref_url="https://bugzilla.suse.com/1084521" source="BUGZILLA"/>
		<reference ref_id="1084524" ref_url="https://bugzilla.suse.com/1084524" source="BUGZILLA"/>
		<reference ref_id="1084532" ref_url="https://bugzilla.suse.com/1084532" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121/" source="CVE"/>
		<reference ref_id="CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0769-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180769-1.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Following security issues were fixed:

- CVE-2018-1000120: A buffer overflow exists in the FTP URL handling that allowed an attacker to cause a denial of service or possible code execution (bsc#1084521).
- CVE-2018-1000121: A NULL pointer dereference exists in the LDAP code that allowed an attacker to cause a denial of service (bsc#1084524).
- CVE-2018-1000122: A buffer over-read exists in the RTSP+RTP handling code that allowed an attacker to cause a denial of service or information leakage (bsc#1084532).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1084521">SUSE bug 1084521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084524">SUSE bug 1084524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084532">SUSE bug 1084532</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000120">CVE-2018-1000120 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000121">CVE-2018-1000121 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000122">CVE-2018-1000122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550809" comment="curl-7.37.0-37.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550810" comment="libcurl4-7.37.0-37.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550811" comment="libcurl4-32bit-7.37.0-37.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149683" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1085687" ref_url="https://bugzilla.suse.com/1085687" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003834.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:

- CVE-2018-5146: Fixed out of bounds memory write while processing Vorbis audio data (bsc#1085687).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-23"/>
	<updated date="2018-03-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085687">SUSE bug 1085687</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5146">CVE-2018-5146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009533250" comment="libvorbis-doc-1.3.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550812" comment="libvorbis0-1.3.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550813" comment="libvorbis0-32bit-1.3.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550814" comment="libvorbisenc2-1.3.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550815" comment="libvorbisenc2-32bit-1.3.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550816" comment="libvorbisfile3-1.3.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550817" comment="libvorbisfile3-32bit-1.3.3-10.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149684" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1006867" ref_url="https://bugzilla.suse.com/1006867" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1015342" ref_url="https://bugzilla.suse.com/1015342" source="BUGZILLA"/>
		<reference ref_id="1015343" ref_url="https://bugzilla.suse.com/1015343" source="BUGZILLA"/>
		<reference ref_id="1020645" ref_url="https://bugzilla.suse.com/1020645" source="BUGZILLA"/>
		<reference ref_id="1022607" ref_url="https://bugzilla.suse.com/1022607" source="BUGZILLA"/>
		<reference ref_id="1024376" ref_url="https://bugzilla.suse.com/1024376" source="BUGZILLA"/>
		<reference ref_id="1027054" ref_url="https://bugzilla.suse.com/1027054" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1033587" ref_url="https://bugzilla.suse.com/1033587" source="BUGZILLA"/>
		<reference ref_id="1034503" ref_url="https://bugzilla.suse.com/1034503" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1043441" ref_url="https://bugzilla.suse.com/1043441" source="BUGZILLA"/>
		<reference ref_id="1043725" ref_url="https://bugzilla.suse.com/1043725" source="BUGZILLA"/>
		<reference ref_id="1043726" ref_url="https://bugzilla.suse.com/1043726" source="BUGZILLA"/>
		<reference ref_id="1062840" ref_url="https://bugzilla.suse.com/1062840" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065615" ref_url="https://bugzilla.suse.com/1065615" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1067118" ref_url="https://bugzilla.suse.com/1067118" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068569" ref_url="https://bugzilla.suse.com/1068569" source="BUGZILLA"/>
		<reference ref_id="1069135" ref_url="https://bugzilla.suse.com/1069135" source="BUGZILLA"/>
		<reference ref_id="1070404" ref_url="https://bugzilla.suse.com/1070404" source="BUGZILLA"/>
		<reference ref_id="1071306" ref_url="https://bugzilla.suse.com/1071306" source="BUGZILLA"/>
		<reference ref_id="1071892" ref_url="https://bugzilla.suse.com/1071892" source="BUGZILLA"/>
		<reference ref_id="1072363" ref_url="https://bugzilla.suse.com/1072363" source="BUGZILLA"/>
		<reference ref_id="1072689" ref_url="https://bugzilla.suse.com/1072689" source="BUGZILLA"/>
		<reference ref_id="1072739" ref_url="https://bugzilla.suse.com/1072739" source="BUGZILLA"/>
		<reference ref_id="1072865" ref_url="https://bugzilla.suse.com/1072865" source="BUGZILLA"/>
		<reference ref_id="1073401" ref_url="https://bugzilla.suse.com/1073401" source="BUGZILLA"/>
		<reference ref_id="1073407" ref_url="https://bugzilla.suse.com/1073407" source="BUGZILLA"/>
		<reference ref_id="1074198" ref_url="https://bugzilla.suse.com/1074198" source="BUGZILLA"/>
		<reference ref_id="1074426" ref_url="https://bugzilla.suse.com/1074426" source="BUGZILLA"/>
		<reference ref_id="1075087" ref_url="https://bugzilla.suse.com/1075087" source="BUGZILLA"/>
		<reference ref_id="1076282" ref_url="https://bugzilla.suse.com/1076282" source="BUGZILLA"/>
		<reference ref_id="1076693" ref_url="https://bugzilla.suse.com/1076693" source="BUGZILLA"/>
		<reference ref_id="1076760" ref_url="https://bugzilla.suse.com/1076760" source="BUGZILLA"/>
		<reference ref_id="1076982" ref_url="https://bugzilla.suse.com/1076982" source="BUGZILLA"/>
		<reference ref_id="1077241" ref_url="https://bugzilla.suse.com/1077241" source="BUGZILLA"/>
		<reference ref_id="1077285" ref_url="https://bugzilla.suse.com/1077285" source="BUGZILLA"/>
		<reference ref_id="1077513" ref_url="https://bugzilla.suse.com/1077513" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1077779" ref_url="https://bugzilla.suse.com/1077779" source="BUGZILLA"/>
		<reference ref_id="1078583" ref_url="https://bugzilla.suse.com/1078583" source="BUGZILLA"/>
		<reference ref_id="1078672" ref_url="https://bugzilla.suse.com/1078672" source="BUGZILLA"/>
		<reference ref_id="1078673" ref_url="https://bugzilla.suse.com/1078673" source="BUGZILLA"/>
		<reference ref_id="1078787" ref_url="https://bugzilla.suse.com/1078787" source="BUGZILLA"/>
		<reference ref_id="1079029" ref_url="https://bugzilla.suse.com/1079029" source="BUGZILLA"/>
		<reference ref_id="1079038" ref_url="https://bugzilla.suse.com/1079038" source="BUGZILLA"/>
		<reference ref_id="1079195" ref_url="https://bugzilla.suse.com/1079195" source="BUGZILLA"/>
		<reference ref_id="1079313" ref_url="https://bugzilla.suse.com/1079313" source="BUGZILLA"/>
		<reference ref_id="1079384" ref_url="https://bugzilla.suse.com/1079384" source="BUGZILLA"/>
		<reference ref_id="1079609" ref_url="https://bugzilla.suse.com/1079609" source="BUGZILLA"/>
		<reference ref_id="1079886" ref_url="https://bugzilla.suse.com/1079886" source="BUGZILLA"/>
		<reference ref_id="1079989" ref_url="https://bugzilla.suse.com/1079989" source="BUGZILLA"/>
		<reference ref_id="1080014" ref_url="https://bugzilla.suse.com/1080014" source="BUGZILLA"/>
		<reference ref_id="1080263" ref_url="https://bugzilla.suse.com/1080263" source="BUGZILLA"/>
		<reference ref_id="1080321" ref_url="https://bugzilla.suse.com/1080321" source="BUGZILLA"/>
		<reference ref_id="1080344" ref_url="https://bugzilla.suse.com/1080344" source="BUGZILLA"/>
		<reference ref_id="1080364" ref_url="https://bugzilla.suse.com/1080364" source="BUGZILLA"/>
		<reference ref_id="1080384" ref_url="https://bugzilla.suse.com/1080384" source="BUGZILLA"/>
		<reference ref_id="1080464" ref_url="https://bugzilla.suse.com/1080464" source="BUGZILLA"/>
		<reference ref_id="1080533" ref_url="https://bugzilla.suse.com/1080533" source="BUGZILLA"/>
		<reference ref_id="1080656" ref_url="https://bugzilla.suse.com/1080656" source="BUGZILLA"/>
		<reference ref_id="1080774" ref_url="https://bugzilla.suse.com/1080774" source="BUGZILLA"/>
		<reference ref_id="1080813" ref_url="https://bugzilla.suse.com/1080813" source="BUGZILLA"/>
		<reference ref_id="1080851" ref_url="https://bugzilla.suse.com/1080851" source="BUGZILLA"/>
		<reference ref_id="1081134" ref_url="https://bugzilla.suse.com/1081134" source="BUGZILLA"/>
		<reference ref_id="1081431" ref_url="https://bugzilla.suse.com/1081431" source="BUGZILLA"/>
		<reference ref_id="1081436" ref_url="https://bugzilla.suse.com/1081436" source="BUGZILLA"/>
		<reference ref_id="1081437" ref_url="https://bugzilla.suse.com/1081437" source="BUGZILLA"/>
		<reference ref_id="1081491" ref_url="https://bugzilla.suse.com/1081491" source="BUGZILLA"/>
		<reference ref_id="1081498" ref_url="https://bugzilla.suse.com/1081498" source="BUGZILLA"/>
		<reference ref_id="1081500" ref_url="https://bugzilla.suse.com/1081500" source="BUGZILLA"/>
		<reference ref_id="1081512" ref_url="https://bugzilla.suse.com/1081512" source="BUGZILLA"/>
		<reference ref_id="1081514" ref_url="https://bugzilla.suse.com/1081514" source="BUGZILLA"/>
		<reference ref_id="1081681" ref_url="https://bugzilla.suse.com/1081681" source="BUGZILLA"/>
		<reference ref_id="1081735" ref_url="https://bugzilla.suse.com/1081735" source="BUGZILLA"/>
		<reference ref_id="1082089" ref_url="https://bugzilla.suse.com/1082089" source="BUGZILLA"/>
		<reference ref_id="1082223" ref_url="https://bugzilla.suse.com/1082223" source="BUGZILLA"/>
		<reference ref_id="1082299" ref_url="https://bugzilla.suse.com/1082299" source="BUGZILLA"/>
		<reference ref_id="1082373" ref_url="https://bugzilla.suse.com/1082373" source="BUGZILLA"/>
		<reference ref_id="1082478" ref_url="https://bugzilla.suse.com/1082478" source="BUGZILLA"/>
		<reference ref_id="1082632" ref_url="https://bugzilla.suse.com/1082632" source="BUGZILLA"/>
		<reference ref_id="1082795" ref_url="https://bugzilla.suse.com/1082795" source="BUGZILLA"/>
		<reference ref_id="1082864" ref_url="https://bugzilla.suse.com/1082864" source="BUGZILLA"/>
		<reference ref_id="1082897" ref_url="https://bugzilla.suse.com/1082897" source="BUGZILLA"/>
		<reference ref_id="1082979" ref_url="https://bugzilla.suse.com/1082979" source="BUGZILLA"/>
		<reference ref_id="1082993" ref_url="https://bugzilla.suse.com/1082993" source="BUGZILLA"/>
		<reference ref_id="1083048" ref_url="https://bugzilla.suse.com/1083048" source="BUGZILLA"/>
		<reference ref_id="1083086" ref_url="https://bugzilla.suse.com/1083086" source="BUGZILLA"/>
		<reference ref_id="1083223" ref_url="https://bugzilla.suse.com/1083223" source="BUGZILLA"/>
		<reference ref_id="1083387" ref_url="https://bugzilla.suse.com/1083387" source="BUGZILLA"/>
		<reference ref_id="1083409" ref_url="https://bugzilla.suse.com/1083409" source="BUGZILLA"/>
		<reference ref_id="1083494" ref_url="https://bugzilla.suse.com/1083494" source="BUGZILLA"/>
		<reference ref_id="1083548" ref_url="https://bugzilla.suse.com/1083548" source="BUGZILLA"/>
		<reference ref_id="1083750" ref_url="https://bugzilla.suse.com/1083750" source="BUGZILLA"/>
		<reference ref_id="1083770" ref_url="https://bugzilla.suse.com/1083770" source="BUGZILLA"/>
		<reference ref_id="1084041" ref_url="https://bugzilla.suse.com/1084041" source="BUGZILLA"/>
		<reference ref_id="1084397" ref_url="https://bugzilla.suse.com/1084397" source="BUGZILLA"/>
		<reference ref_id="1084427" ref_url="https://bugzilla.suse.com/1084427" source="BUGZILLA"/>
		<reference ref_id="1084610" ref_url="https://bugzilla.suse.com/1084610" source="BUGZILLA"/>
		<reference ref_id="1084772" ref_url="https://bugzilla.suse.com/1084772" source="BUGZILLA"/>
		<reference ref_id="1084888" ref_url="https://bugzilla.suse.com/1084888" source="BUGZILLA"/>
		<reference ref_id="1084926" ref_url="https://bugzilla.suse.com/1084926" source="BUGZILLA"/>
		<reference ref_id="1084928" ref_url="https://bugzilla.suse.com/1084928" source="BUGZILLA"/>
		<reference ref_id="1084967" ref_url="https://bugzilla.suse.com/1084967" source="BUGZILLA"/>
		<reference ref_id="1085011" ref_url="https://bugzilla.suse.com/1085011" source="BUGZILLA"/>
		<reference ref_id="1085015" ref_url="https://bugzilla.suse.com/1085015" source="BUGZILLA"/>
		<reference ref_id="1085045" ref_url="https://bugzilla.suse.com/1085045" source="BUGZILLA"/>
		<reference ref_id="1085047" ref_url="https://bugzilla.suse.com/1085047" source="BUGZILLA"/>
		<reference ref_id="1085050" ref_url="https://bugzilla.suse.com/1085050" source="BUGZILLA"/>
		<reference ref_id="1085053" ref_url="https://bugzilla.suse.com/1085053" source="BUGZILLA"/>
		<reference ref_id="1085054" ref_url="https://bugzilla.suse.com/1085054" source="BUGZILLA"/>
		<reference ref_id="1085056" ref_url="https://bugzilla.suse.com/1085056" source="BUGZILLA"/>
		<reference ref_id="1085107" ref_url="https://bugzilla.suse.com/1085107" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1085239" ref_url="https://bugzilla.suse.com/1085239" source="BUGZILLA"/>
		<reference ref_id="863764" ref_url="https://bugzilla.suse.com/863764" source="BUGZILLA"/>
		<reference ref_id="966170" ref_url="https://bugzilla.suse.com/966170" source="BUGZILLA"/>
		<reference ref_id="966172" ref_url="https://bugzilla.suse.com/966172" source="BUGZILLA"/>
		<reference ref_id="966328" ref_url="https://bugzilla.suse.com/966328" source="BUGZILLA"/>
		<reference ref_id="969476" ref_url="https://bugzilla.suse.com/969476" source="BUGZILLA"/>
		<reference ref_id="969477" ref_url="https://bugzilla.suse.com/969477" source="BUGZILLA"/>
		<reference ref_id="975772" ref_url="https://bugzilla.suse.com/975772" source="BUGZILLA"/>
		<reference ref_id="983145" ref_url="https://bugzilla.suse.com/983145" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2017-15951" ref_url="https://www.suse.com/security/cve/CVE-2017-15951/" source="CVE"/>
		<reference ref_id="CVE-2017-16644" ref_url="https://www.suse.com/security/cve/CVE-2017-16644/" source="CVE"/>
		<reference ref_id="CVE-2017-16912" ref_url="https://www.suse.com/security/cve/CVE-2017-16912/" source="CVE"/>
		<reference ref_id="CVE-2017-16913" ref_url="https://www.suse.com/security/cve/CVE-2017-16913/" source="CVE"/>
		<reference ref_id="CVE-2017-17975" ref_url="https://www.suse.com/security/cve/CVE-2017-17975/" source="CVE"/>
		<reference ref_id="CVE-2017-18174" ref_url="https://www.suse.com/security/cve/CVE-2017-18174/" source="CVE"/>
		<reference ref_id="CVE-2017-18208" ref_url="https://www.suse.com/security/cve/CVE-2017-18208/" source="CVE"/>
		<reference ref_id="CVE-2018-1000026" ref_url="https://www.suse.com/security/cve/CVE-2018-1000026/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-8087" ref_url="https://www.suse.com/security/cve/CVE-2018-8087/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003836.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.120 to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2017-13166: An elevation of privilege vulnerability in the v4l2 video driver. (bnc#1072865).
- CVE-2017-15951: The KEYS subsystem did not correctly synchronize the actions of updating versus finding a key in the 'negative' state to avoid a race condition, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls (bnc#1062840 bnc#1065615).
- CVE-2017-16644: The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c allowed local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067118).
- CVE-2017-16912: The 'get_pipe()' function (drivers/usb/usbip/stub_rx.c) allowed attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet (bnc#1078673).
- CVE-2017-16913: The 'stub_recv_cmd_submit()' function (drivers/usb/usbip/stub_rx.c) when handling CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet (bnc#1078672).
- CVE-2017-17975: Use-after-free in the usbtv_probe function in drivers/media/usb/usbtv/usbtv-core.c allowed attackers to cause a denial of service (system crash) or possibly have unspecified other impact by triggering failure of audio registration, because a kfree of the usbtv data structure occurs during a usbtv_video_free call, but the usbtv_video_fail label's code attempts to both access and free this data structure (bnc#1074426).
- CVE-2017-18174: The amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free (bnc#1080533).
- CVE-2017-18208: The madvise_willneed function in mm/madvise.c allowed local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping (bnc#1083494).
- CVE-2018-1000026: A insufficient input validation vulnerability in bnx2x network card driver could result in DoS: Network card firmware assertion takes card off-line. This attack appear to be exploitable via An attacker on a must pass a very large, specially crafted packet to the bnx2x card. This can be done from an untrusted guest VM. (bnc#1079384).
- CVE-2018-8087: Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c allowed local users to cause a denial of service (memory consumption) by triggering an out-of-array error case (bnc#1085053).
- CVE-2018-1068: Insufficient user provided offset checking in the ebtables compat code allowed local attackers to overwrite kernel memory and potentially execute code. (bsc#1085107)

The following non-security bugs were fixed:

- acpi / bus: Leave modalias empty for devices which are not present (bnc#1012382).
- acpi, nfit: fix health event notification (FATE#321135, FATE#321217, FATE#321256, FATE#321391, FATE#321393).
- acpi, nfit: fix register dimm error handling (FATE#321135, FATE#321217, FATE#321256, FATE#321391, FATE#321393).
- acpi: sbshc: remove raw pointer from printk() message (bnc#1012382).
- Add delay-init quirk for Corsair K70 RGB keyboards (bnc#1012382).
- add ip6_make_flowinfo helper (bsc#1042286).
- ahci: Add Intel Cannon Lake PCH-H PCI ID (bnc#1012382).
- ahci: Add PCI ids for Intel Bay Trail, Cherry Trail and Apollo Lake AHCI (bnc#1012382).
- ahci: Annotate PCI ids for mobile Intel chipsets as such (bnc#1012382).
- alpha: fix crash if pthread_create races with signal delivery (bnc#1012382).
- alpha: fix reboot on Avanti platform (bnc#1012382).
- alsa: hda/ca0132 - fix possible NULL pointer use (bnc#1012382).
- alsa: hda - Fix headset mic detection problem for two Dell machines (bnc#1012382).
- alsa: hda/realtek - Add headset mode support for Dell laptop (bsc#1031717).
- alsa: hda/realtek: PCI quirk for Fujitsu U7x7 (bnc#1012382).
- alsa: hda - Reduce the suspend time consumption for ALC256 (bsc#1031717).
- alsa: hda - Use IS_REACHABLE() for dependency on input (bsc#1031717).
- alsa: seq: Fix racy pool initializations (bnc#1012382).
- alsa: seq: Fix regression by incorrect ioctl_mutex usages (bnc#1012382).
- alsa: usb-audio: add implicit fb quirk for Behringer UFX1204 (bnc#1012382).
- alsa: usb-audio: Fix UAC2 get_ctl request with a RANGE attribute (bnc#1012382).
- amd-xgbe: Fix unused suspend handlers build warning (bnc#1012382).
- arm64: add PTE_ADDR_MASK (bsc#1068032).
- arm64: barrier: Add CSDB macros to control data-value prediction (bsc#1068032).
- arm64: define BUG() instruction without CONFIG_BUG (bnc#1012382).
- arm64: Disable unhandled signal log messages by default (bnc#1012382).
- arm64: dts: add #cooling-cells to CPU nodes (bnc#1012382).
- arm64: entry: Apply BP hardening for high-priority synchronous exceptions (bsc#1068032).
- arm64: entry: Apply BP hardening for suspicious interrupts from EL0 (bsc#1068032).
- arm64: entry: Ensure branch through syscall table is bounded under speculation (bsc#1068032).
- arm64: entry: Reword comment about post_ttbr_update_workaround (bsc#1068032).
- arm64: Force KPTI to be disabled on Cavium ThunderX (bsc#1068032).
- arm64: futex: Mask __user pointers prior to dereference (bsc#1068032).
- arm64: idmap: Use 'awx' flags for .idmap.text .pushsection directives (bsc#1068032).
- arm64: Implement array_index_mask_nospec() (bsc#1068032).
- arm64: Kconfig: select COMPAT_BINFMT_ELF only when BINFMT_ELF is set (bnc#1012382).
- arm64: kpti: Add -&amp;gt;enable callback to remap swapper using nG mappings (bsc#1068032).
- arm64: kpti: Make use of nG dependent on arm64_kernel_unmapped_at_el0() (bsc#1068032).
- arm64: Make USER_DS an inclusive limit (bsc#1068032).
- arm64: mm: Permit transitioning from Global to Non-Global without BBM (bsc#1068032).
- arm64: move TASK_* definitions to &amp;lt;asm/processor.h&amp;gt; (bsc#1068032).
- arm64: Run enable method for errata work arounds on late CPUs (bsc#1085045).
- arm64: uaccess: Do not bother eliding access_ok checks in __{get, put}_user (bsc#1068032).
- arm64: uaccess: Mask __user pointers for __arch_{clear, copy_*}_user (bsc#1068032).
- arm64: uaccess: Prevent speculative use of the current addr_limit (bsc#1068032).
- arm64: Use pointer masking to limit uaccess speculation (bsc#1068032).
- arm: 8731/1: Fix csum_partial_copy_from_user() stack mismatch (bnc#1012382).
- arm: AM33xx: PRM: Remove am33xx_pwrdm_read_prev_pwrst function (bnc#1012382).
- arm: dts: am4372: Correct the interrupts_properties of McASP (bnc#1012382).
- arm: dts: Fix omap4 hang with GPS connected to USB by using wakeupgen (bnc#1012382).
- arm: dts: ls1021a: fix incorrect clock references (bnc#1012382).
- arm: dts: s5pv210: add interrupt-parent for ohci (bnc#1012382).
- arm: dts: STi: Add gpio polarity for 'hdmi,hpd-gpio' property (bnc#1012382).
- arm: kvm: Fix SMCCC handling of unimplemented SMC/HVC calls (bnc#1012382).
- arm: OMAP2+: Fix SRAM virt to phys translation for save_secure_ram_context (bnc#1012382).
- arm: omap2: hide omap3_save_secure_ram on non-OMAP3 builds (git-fixes).
- arm: pxa/tosa-bt: add MODULE_LICENSE tag (bnc#1012382).
- arm: spear13xx: Fix dmas cells (bnc#1012382).
- arm: spear13xx: Fix spics gpio controller's warning (bnc#1012382).
- arm: spear600: Add missing interrupt-parent of rtc (bnc#1012382).
- arm: tegra: select USB_ULPI from EHCI rather than platform (bnc#1012382).
- asoc: au1x: Fix timeout tests in au1xac97c_ac97_read() (bsc#1031717).
- asoc: Intel: Kconfig: fix build when ACPI is not enabled (bnc#1012382).
- asoc: Intel: sst: Fix the return value of 'sst_send_byte_stream_mrfld()' (bsc#1031717).
- asoc: mediatek: add i2c dependency (bnc#1012382).
- asoc: nuc900: Fix a loop timeout test (bsc#1031717).
- asoc: pcm512x: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).
- asoc: rockchip: disable clock on error (bnc#1012382).
- asoc: rsnd: avoid duplicate free_irq() (bnc#1012382).
- asoc: rsnd: do not call free_irq() on Parent SSI (bnc#1012382).
- asoc: simple-card: Fix misleading error message (bnc#1012382).
- asoc: ux500: add MODULE_LICENSE tag (bnc#1012382).
- ata: ahci_xgene: free structure returned by acpi_get_object_info() (bsc#1082979).
- ata: pata_artop: remove redundant initialization of pio (bsc#1082979).
- ata: sata_dwc_460ex: remove incorrect locking (bsc#1082979).
- b2c2: flexcop: avoid unused function warnings (bnc#1012382).
- binder: add missing binder_unlock() (bnc#1012382).
- binder: check for binder_thread allocation failure in binder_poll() (bnc#1012382).
- binfmt_elf: compat: avoid unused function warning (bnc#1012382).
- blk-mq: add warning to __blk_mq_run_hw_queue() for ints disabled (bsc#1084772).
- blk-mq: stop 'delayed_run_work' in blk_mq_stop_hw_queue() (bsc#1084967).
- blk-mq: turn WARN_ON in __blk_mq_run_hw_queue into printk (bsc#1084772).
- blktrace: fix unlocked registration of tracepoints (bnc#1012382).
- block: fix an error code in add_partition() (bsc#1082979).
- block: Fix __bio_integrity_endio() documentation (bsc#1082979).
- bluetooth: btsdio: Do not bind to non-removable BCM43341 (bnc#1012382).
- bluetooth: btusb: Restore QCA Rome suspend/resume fix with a 'rewritten' version (bnc#1012382).
- bnx2x: Improve reliability in case of nested PCI errors (bnc#1012382).
- bnxt_en: Fix the 'Invalid VF' id check in bnxt_vf_ndo_prep routine (bnc#1012382).
- bpf: arsh is not supported in 32 bit alu thus reject it (bnc#1012382).
- bpf: avoid false sharing of map refcount with max_entries (bnc#1012382).
- bpf: fix 32-bit divide by zero (bnc#1012382).
- bpf: fix bpf_tail_call() x64 JIT (bnc#1012382).
- bpf: fix divides by zero (bnc#1012382).
- bpf: introduce BPF_JIT_ALWAYS_ON config (bnc#1012382).
- bpf: reject stores into ctx via st and xadd (bnc#1012382).
- bridge: implement missing ndo_uninit() (bsc#1042286).
- bridge: move bridge multicast cleanup to ndo_uninit (bsc#1042286).
- btrfs: copy fsid to super_block s_uuid (bsc#1080774).
- btrfs: fix crash due to not cleaning up tree log block's dirty bits (bnc#1012382).
- btrfs: fix deadlock in run_delalloc_nocow (bnc#1012382).
- btrfs: fix deadlock when writing out space cache (bnc#1012382).
- btrfs: Fix possible off-by-one in btrfs_search_path_in_tree (bnc#1012382).
- btrfs: Fix quota reservation leak on preallocated files (bsc#1079989).
- btrfs: fix unexpected -EEXIST when creating new inode (bnc#1012382).
- btrfs: Handle btrfs_set_extent_delalloc failure in fixup worker (bnc#1012382).
- can: flex_can: Correct the checking for frame length in flexcan_start_xmit() (bnc#1012382).
- cdrom: turn off autoclose by default (bsc#1080813).
- ceph: fix incorrect snaprealm when adding caps (bsc#1081735).
- ceph: fix un-balanced fsc-&amp;gt;writeback_count update (bsc#1081735).
- cfg80211: check dev_set_name() return value (bnc#1012382).
- cfg80211: fix cfg80211_beacon_dup (bnc#1012382).
- cifs: dump IPC tcon in debug proc file (bsc#1071306).
- cifs: Fix autonegotiate security settings mismatch (bnc#1012382).
- cifs: Fix missing put_xid in cifs_file_strict_mmap (bnc#1012382).
- cifs: make IPC a regular tcon (bsc#1071306).
- cifs: use tcon_ipc instead of use_ipc parameter of SMB2_ioctl (bsc#1071306).
- cifs: zero sensitive data when freeing (bnc#1012382).
- clk: fix a panic error caused by accessing NULL pointer (bnc#1012382).
- console/dummy: leave .con_font_get set to NULL (bnc#1012382).
- cpufreq: Add Loongson machine dependencies (bnc#1012382).
- crypto: aesni - handle zero length dst buffer (bnc#1012382).
- crypto: af_alg - whitelist mask and type (bnc#1012382).
- crypto: caam - fix endless loop when DECO acquire fails (bnc#1012382).
- crypto: cryptd - pass through absence of -&amp;gt;setkey() (bnc#1012382).
- crypto: hash - introduce crypto_hash_alg_has_setkey() (bnc#1012382).
- crypto: poly1305 - remove -&amp;gt;setkey() method (bnc#1012382).
- crypto: s5p-sss - Fix kernel Oops in AES-ECB mode (bnc#1012382).
- crypto: tcrypt - fix S/G table for test_aead_speed() (bnc#1012382). (bnc#1012382).
- crypto: x86/twofish-3way - Fix %rbp usage (bnc#1012382).
- cw1200: fix bogus maybe-uninitialized warning (bnc#1012382).
- dccp: limit sk_filter trim to payload (bsc#1042286).
- dell-wmi, dell-laptop: depends DMI (bnc#1012382).
- direct-io: Fix sleep in atomic due to sync AIO (bsc#1084888).
- dlm: fix double list_del() (bsc#1082795).
- dlm: fix NULL pointer dereference in send_to_sock() (bsc#1082795).
- dmaengine: at_hdmac: fix potential NULL pointer dereference in atc_prep_dma_interleaved (bnc#1012382).
- dmaengine: dmatest: fix container_of member in dmatest_callback (bnc#1012382).
- dmaengine: ioat: Fix error handling path (bnc#1012382).
- dmaengine: jz4740: disable/unprepare clk if probe fails (bnc#1012382).
- dmaengine: zx: fix build warning (bnc#1012382).
- dm: correctly handle chained bios in dec_pending() (bnc#1012382).
- dn_getsockoptdecnet: move nf_{get/set}sockopt outside sock lock (bnc#1012382).
- do not put symlink bodies in pagecache into highmem (bnc#1012382).
- dpt_i2o: fix build warning (bnc#1012382).
- driver-core: use 'dev' argument in dev_dbg_ratelimited stub (bnc#1012382).
- drivers: hv: balloon: Correctly update onlined page count (fate#315887, bsc#1082632).
- drivers: hv: balloon: Initialize last_post_time on startup (fate#315887, bsc#1082632).
- drivers: hv: balloon: Show the max dynamic memory assigned (fate#315887, bsc#1082632).
- drivers: hv: kvp: Use MAX_ADAPTER_ID_SIZE for translating adapter id (fate#315887, bsc#1082632).
- drivers: hv: Turn off write permission on the hypercall page (fate#315887, bsc#1082632).
- drivers: hv: vmbus: Fix rescind handling (fate#315887, bsc#1082632).
- drivers: hv: vmbus: Fix rescind handling issues (fate#315887, bsc#1082632).
- drivers/net: fix eisa_driver probe section mismatch (bnc#1012382).
- drm/amdgpu: Avoid leaking PM domain on driver unbind (v2) (bnc#1012382).
- drm/amdgpu: Fix SDMA load/unload sequence on HWS disabled mode (bnc#1012382).
- drm/amdkfd: Fix SDMA oversubsription handling (bnc#1012382).
- drm/amdkfd: Fix SDMA ring buffer size calculation (bnc#1012382).
- drm/armada: fix leak of crtc structure (bnc#1012382).
- drm/edid: Add 6 bpc quirk for CPT panel in Asus UX303LA (bnc#1012382).
- drm/gma500: remove helper function (bnc#1012382).
- drm/gma500: Sanity-check pipe index (bnc#1012382).
- drm/nouveau: hide gcc-4.9 -Wmaybe-uninitialized (bnc#1012382).
- drm/nouveau/pci: do a msi rearm on init (bnc#1012382).
- drm/radeon: adjust tested variable (bnc#1012382).
- drm: rcar-du: Fix race condition when disabling planes at CRTC stop (bnc#1012382).
- drm: rcar-du: Use the VBK interrupt for vblank events (bnc#1012382).
- drm: Require __GFP_NOFAIL for the legacy drm_modeset_lock_all (bnc#1012382).
- drm/ttm: check the return value of kzalloc (bnc#1012382).
- drm/vmwgfx: use *_32_bits() macros (bnc#1012382).
- Drop SUSE-specific qla2xxx patches (bsc#1043726)
- e1000: fix disabling already-disabled warning (bnc#1012382).
- edac, octeon: Fix an uninitialized variable warning (bnc#1012382).
- em28xx: only use mt9v011 if camera support is enabled (bnc#1012382).
- enable DST_CACHE in non-vanilla configs except s390x/zfcpdump
- ext4: correct documentation for grpid mount option (bnc#1012382).
- ext4: do not unnecessarily allocate buffer in recently_deleted() (bsc#1080344).
- ext4: Fix data exposure after failed AIO DIO (bsc#1069135 bsc#1082864).
- ext4: save error to disk in __ext4_grp_locked_error() (bnc#1012382).
- f2fs: fix a bug caused by NULL extent tree (bsc#1082478). Does not affect SLE release but should be merged into leap updates
- fbdev: auo_k190x: avoid unused function warnings (bnc#1012382).
- fbdev: s6e8ax0: avoid unused function warnings (bnc#1012382).
- fbdev: sis: enforce selection of at least one backend (bnc#1012382).
- fbdev: sm712fb: avoid unused function warnings (bnc#1012382).
- fs: Avoid invalidation in interrupt context in dio_complete() (bsc#1073407 bsc#1069135).
- fs: Fix page cache inconsistency when mixing buffered and AIO DIO (bsc#1073407 bsc#1069135).
- fs: invalidate page cache after end_io() in dio completion (bsc#1073407 bsc#1069135).
- ftrace: Remove incorrect setting of glob search field (bnc#1012382).
- geneve: fix populating tclass in geneve_get_v6_dst (bsc#1042286).
- genirq/msi: Add stubs for get_cached_msi_msg/pci_write_msi_msg (bnc#1012382).
- genirq/msi: Fix populating multiple interrupts (bsc#1085047).
- genirq: Restore trigger settings in irq_modify_status() (bsc#1085056).
- genksyms: Fix segfault with invalid declarations (bnc#1012382).
- gianfar: fix a flooded alignment reports because of padding issue (bnc#1012382).
- go7007: add MEDIA_CAMERA_SUPPORT dependency (bnc#1012382).
- gpio: ath79: add missing MODULE_DESCRIPTION/LICENSE (bnc#1012382).
- gpio: intel-mid: Fix build warning when !CONFIG_PM (bnc#1012382).
- gpio: iop: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).
- gpio: xgene: mark PM functions as __maybe_unused (bnc#1012382).
- grace: replace BUG_ON by WARN_ONCE in exit_net hook (bnc#1012382).
- gre: build header correctly for collect metadata tunnels (bsc#1042286).
- gre: do not assign header_ops in collect metadata mode (bsc#1042286).
- gre: do not keep the GRE header around in collect medata mode (bsc#1042286).
- gre: reject GUE and FOU in collect metadata mode (bsc#1042286).
- hdpvr: hide unused variable (bnc#1012382).
- hid: quirks: Fix keyboard + touchpad on Toshiba Click Mini not working (bnc#1012382).
- hippi: Fix a Fix a possible sleep-in-atomic bug in rr_close (bnc#1012382).
- hrtimer: Ensure POSIX compliance (relative CLOCK_REALTIME hrtimers) (bnc#1012382).
- hv_netvsc: Add ethtool handler to set and get TCP hash levels (fate#315887, bsc#1082632).
- hv_netvsc: Add ethtool handler to set and get UDP hash levels (fate#315887, bsc#1082632).
- hv_netvsc: Add initialization of tx_table in netvsc_device_add() (fate#315887, bsc#1082632).
- hv_netvsc: Change the hash level variable to bit flags (fate#315887, bsc#1082632).
- hv_netvsc: Clean up an unused parameter in rndis_filter_set_rss_param() (fate#315887, bsc#1082632).
- hv_netvsc: Clean up unused parameter from netvsc_get_hash() (fate#315887, bsc#1082632).
- hv_netvsc: Clean up unused parameter from netvsc_get_rss_hash_opts() (fate#315887, bsc#1082632).
- hv_netvsc: copy_to_send buf can be void (fate#315887, bsc#1082632).
- hv_netvsc: do not need local xmit_more (fate#315887, bsc#1082632).
- hv_netvsc: drop unused macros (fate#315887, bsc#1082632).
- hv_netvsc: empty current transmit aggregation if flow blocked (fate#315887, bsc#1082632).
- hv_netvsc: Fix rndis_filter_close error during netvsc_remove (fate#315887, bsc#1082632).
- hv_netvsc: fix send buffer failure on MTU change (fate#315887, bsc#1082632).
- hv_netvsc: Fix the channel limit in netvsc_set_rxfh() (fate#315887, bsc#1082632).
- hv_netvsc: Fix the real number of queues of non-vRSS cases (fate#315887, bsc#1082632).
- hv_netvsc: Fix the receive buffer size limit (fate#315887, bsc#1082632).
- hv_netvsc: Fix the TX/RX buffer default sizes (fate#315887, bsc#1082632).
- hv_netvsc: hide warnings about uninitialized/missing rndis device (fate#315887, bsc#1082632).
- hv_netvsc: make const array ver_list static, reduces object code size (fate#315887, bsc#1082632).
- hv_netvsc: optimize initialization of RNDIS header (fate#315887, bsc#1082632).
- hv_netvsc: pass netvsc_device to receive callback (fate#315887, bsc#1082632).
- hv_netvsc: remove open_cnt reference count (fate#315887, bsc#1082632).
- hv_netvsc: Rename ind_table to rx_table (fate#315887, bsc#1082632).
- hv_netvsc: Rename tx_send_table to tx_table (fate#315887, bsc#1082632).
- hv_netvsc: replace divide with mask when computing padding (fate#315887, bsc#1082632).
- hv_netvsc: report stop_queue and wake_queue (fate#315887, bsc#1082632).
- hv_netvsc: simplify function args in receive status path (fate#315887, bsc#1082632).
- hv_netvsc: Simplify the limit check in netvsc_set_channels() (fate#315887, bsc#1082632).
- hv_netvsc: track memory allocation failures in ethtool stats (fate#315887, bsc#1082632).
- hv: preserve kabi by keeping hv_do_hypercall (bnc#1082632).
- hwmon: (pmbus) Use 64bit math for DIRECT format values (bnc#1012382).
- hwrng: exynos - use __maybe_unused to hide pm functions (bnc#1012382).
- hyper-v: trace vmbus_ongpadl_created() (fate#315887, bsc#1082632).
- hyper-v: trace vmbus_ongpadl_torndown() (fate#315887, bsc#1082632).
- hyper-v: trace vmbus_on_message() (fate#315887, bsc#1082632).
- hyper-v: trace vmbus_on_msg_dpc() (fate#315887, bsc#1082632).
- hyper-v: trace vmbus_onoffer() (fate#315887, bsc#1082632).
- hyper-v: trace vmbus_onoffer_rescind() (fate#315887, bsc#1082632).
- hyper-v: trace vmbus_onopen_result() (fate#315887, bsc#1082632).
- hyper-v: trace vmbus_onversion_response() (fate#315887, bsc#1082632).
- hyper-v: Use fast hypercall for HVCALL_SIGNAL_EVENT (fate#315887, bsc#1082632).
- i2c: remove __init from i2c_register_board_info() (bnc#1012382).
- i40iw: Correct Q1/XF object count equation (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- i40iw: Fix sequence number for the first partial FPDU (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- i40iw: Fix the connection ORD value for loopback (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- i40iw: Remove limit on re-posting AEQ entries to HW (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- i40iw: Selectively teardown QPs on IP addr change event (bsc#1024376 FATE#321249).
- i40iw: Validate correct IRD/ORD connection parameters (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- ib/hfi1: Fix for potential refcount leak in hfi1_open_file() (FATE#321231 FATE#321473).
- ib/iser: Handle lack of memory management extentions correctly (bsc#1082979).
- ib/mlx4: Fix incorrectly releasing steerable UD QPs when have only ETH ports (bnc#1012382).
- ib/mlx4: Fix mlx4_ib_alloc_mr error flow (bnc#1012382).
- ibmvnic: Account for VLAN header length in TX buffers (bsc#1085239).
- ibmvnic: Account for VLAN tag in L2 Header descriptor (bsc#1085239).
- ibmvnic: Allocate max queues stats buffers (bsc#1081498).
- ibmvnic: Allocate statistics buffers during probe (bsc#1082993).
- ibmvnic: Check for NULL skb's in NAPI poll routine (bsc#1081134, git-fixes).
- ibmvnic: Clean RX pool buffers during device close (bsc#1081134).
- ibmvnic: Clean up device close (bsc#1084610).
- ibmvnic: Correct goto target for tx irq initialization failure (bsc#1082223).
- ibmvnic: Do not attempt to login if RX or TX queues are not allocated (bsc#1082993).
- ibmvnic: Do not disable device during failover or partition migration (bsc#1084610).
- ibmvnic: Ensure that buffers are NULL after free (bsc#1080014).
- ibmvnic: Fix early release of login buffer (bsc#1081134, git-fixes).
- ibmvnic: fix empty firmware version and errors cleanup (bsc#1079038).
- ibmvnic: fix firmware version when no firmware level has been provided by the VIOS server (bsc#1079038).
- ibmvnic: Fix login buffer memory leaks (bsc#1081134).
- ibmvnic: Fix NAPI structures memory leak (bsc#1081134).
- ibmvnic: Fix recent errata commit (bsc#1085239).
- ibmvnic: Fix rx queue cleanup for non-fatal resets (bsc#1080014).
- ibmvnic: Fix TX descriptor tracking again (bsc#1082993).
- ibmvnic: Fix TX descriptor tracking (bsc#1081491).
- ibmvnic: Free and re-allocate scrqs when tx/rx scrqs change (bsc#1081498).
- ibmvnic: Free RX socket buffer in case of adapter error (bsc#1081134).
- ibmvnic: Generalize TX pool structure (bsc#1085224).
- ibmvnic: Handle TSO backing device errata (bsc#1085239).
- ibmvnic: Harden TX/RX pool cleaning (bsc#1082993).
- ibmvnic: Improve TX buffer accounting (bsc#1085224).
- ibmvnic: Keep track of supplementary TX descriptors (bsc#1081491).
- ibmvnic: Make napi usage dynamic (bsc#1081498).
- ibmvnic: Move active sub-crq count settings (bsc#1081498).
- ibmvnic: Pad small packets to minimum MTU size (bsc#1085239).
- ibmvnic: queue reset when CRQ gets closed during reset (bsc#1080263).
- ibmvnic: Remove skb-&gt;protocol checks in ibmvnic_xmit (bsc#1080384).
- ibmvnic: Rename active queue count variables (bsc#1081498).
- ibmvnic: Reorganize device close (bsc#1084610).
- ibmvnic: Report queue stops and restarts as debug output (bsc#1082993).
- ibmvnic: Reset long term map ID counter (bsc#1080364).
- ibmvnic: Split counters for scrq/pools/napi (bsc#1082223).
- ibmvnic: Update and clean up reset TX pool routine (bsc#1085224).
- ibmvnic: Update release RX pool routine (bsc#1085224).
- ibmvnic: Update TX and TX completion routines (bsc#1085224).
- ibmvnic: Update TX pool initialization routine (bsc#1085224).
- ibmvnic: Wait until reset is complete to set carrier on (bsc#1081134).
- ib/qib: Fix comparison error with qperf compare/swap test (FATE#321231 FATE#321473).
- ib/srpt: Remove an unused structure member (bsc#1082979).
- idle: i7300: add PCI dependency (bnc#1012382).
- igb: Free IRQs when device is hotplugged (bnc#1012382).
- iio: adc: axp288: remove redundant duplicate const on axp288_adc_channels (bnc#1012382).
- iio: adis_lib: Initialize trigger before requesting interrupt (bnc#1012382).
- iio: buffer: check if a buffer has been set up when poll is called (bnc#1012382).
- input: tca8418_keypad - hide gcc-4.9 -Wmaybe-uninitialized warning (bnc#1012382).
- input: tca8418_keypad - remove double read of key event register (git-fixes).
- iommu/amd: Add align parameter to alloc_irq_index() (bsc#975772).
- iommu/amd: Enforce alignment for MSI IRQs (bsc#975772).
- iommu/amd: Fix alloc_irq_index() increment (bsc#975772).
- iommu/amd: Limit the IOVA page range to the specified addresses (fate#321026).
- iommu/arm-smmu-v3: Cope with duplicated Stream IDs (bsc#1084926).
- iommu/iova: Fix underflow bug in __alloc_and_insert_iova_range (bsc#1084928).
- iommu/vt-d: Use domain instead of cache fetching (bsc#975772).
- ip6mr: fix stale iterator (bnc#1012382).
- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).
- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).
- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).
- ip_tunnel: fix preempt warning in ip tunnel creation/updating (bnc#1012382).
- ip_tunnel: replace dst_cache with generic implementation (bnc#1012382).
- ipv4: allow local fragmentation in ip_finish_output_gso() (bsc#1042286).
- ipv4: fix checksum annotation in udp4_csum_init (bsc#1042286).
- ipv4: ipconfig: avoid unused ic_proto_used symbol (bnc#1012382).
- ipv4: update comment to document GSO fragmentation cases (bsc#1042286).
- ipv6: datagram: Refactor dst lookup and update codes to a new function (bsc#1042286).
- ipv6: datagram: Refactor flowi6 init codes to a new function (bsc#1042286).
- ipv6: datagram: Update dst cache of a connected datagram sk during pmtu update (bsc#1042286).
- ipv6: fix checksum annotation in udp6_csum_init (bsc#1042286).
- ipv6: icmp6: Allow icmp messages to be looped back (bnc#1012382).
- ipv6/ila: fix nlsize calculation for lwtunnel (bsc#1042286).
- ipv6: remove unused in6_addr struct (bsc#1042286).
- ipv6: tcp: fix endianness annotation in tcp_v6_send_response (bsc#1042286).
- ipv6: udp: Do a route lookup and update during release_cb (bsc#1042286).
- ipvlan: Add the skb-&gt;mark as flow4's member to lookup route (bnc#1012382).
- ipvlan: fix multicast processing (bsc#1042286).
- ipvlan: fix various issues in ipvlan_process_multicast() (bsc#1042286).
- irqchip/gic-v3: Use wmb() instead of smb_wmb() in gic_raise_softirq() (bnc#1012382).
- isdn: eicon: reduce stack size of sig_ind function (bnc#1012382).
- isdn: icn: remove a #warning (bnc#1012382).
- isdn: sc: work around type mismatch warning (bnc#1012382).
- jffs2: Fix use-after-free bug in jffs2_iget()'s error handling path (git-fixes).
- kABI: protect struct cpuinfo_x86 (kabi).
- kABI: protect struct ethtool_link_settings (bsc#1085050).
- kABI: protect struct ip_tunnel and reintroduce ip_tunnel_dst_reset_all (kabi).
- kABI: reintroduce crypto_poly1305_setkey (kabi).
- kabi: restore kabi after 'net: replace dst_cache ip6_tunnel implementation with the generic one' (bsc#1082897).
- kabi: restore nft_set_elem_destroy() signature (bsc#1042286).
- kabi: restore rhashtable_insert_slow() signature (bsc#1042286).
- kabi/severities: add sclp to KABI ignore list
- kabi/severities: add __x86_indirect_thunk_rsp
- kabi/severities: as per bsc#1068569 we can ignore XFS kabi The gods have spoken, let there be light.
- kabi/severities: Ignore kvm for KABI severities
- kabi: uninline sk_receive_skb() (bsc#1042286).
- kaiser: fix compile error without vsyscall (bnc#1012382).
- kaiser: fix intel_bts perf crashes (bnc#1012382).
- kasan: rework Kconfig settings (bnc#1012382).
- kernel/async.c: revert 'async: simplify lowest_in_progress()' (bnc#1012382).
- kernel: fix rwlock implementation (bnc#1079886, LTC#164371).
- kernfs: fix regression in kernfs_fop_write caused by wrong type (bnc#1012382).
- keys: encrypted: fix buffer overread in valid_master_desc() (bnc#1012382).
- kmemleak: add scheduling point to kmemleak_scan() (bnc#1012382).
- kvm: add X86_LOCAL_APIC dependency (bnc#1012382).
- kvm: ARM64: fix phy counter access failure in guest (bsc#1085015).
- kvm: arm/arm64: Check pagesize when allocating a hugepage at Stage 2 (bsc#1079029).
- kvm: nVMX: Fix kernel panics induced by illegal INVEPT/INVVPID types (bnc#1012382).
- kvm: nVMX: Fix races when sending nested PI while dest enters/leaves L2 (bnc#1012382).
- kvm: nVMX: invvpid handling improvements (bnc#1012382).
- kvm: nVMX: kmap() can't fail (bnc#1012382).
- kvm: nVMX: vmx_complete_nested_posted_interrupt() can't fail (bnc#1012382).
- kvm: PPC: Book3S PR: Fix svcpu copying with preemption enabled (bsc#1066223).
- kvm: s390: Add operation exception interception handler (FATE#324070, LTC#158959).
- kvm: s390: Add sthyi emulation (FATE#324070, LTC#158959).
- kvm: s390: Enable all facility bits that are known good for passthrough (FATE#324071, LTC#158956).
- kvm: s390: Extend diag 204 fields (FATE#324070, LTC#158959).
- kvm: s390: Fix STHYI buffer alignment for diag224 (FATE#324070, LTC#158959).
- kvm: s390: instruction-execution-protection support (LTC#162428).
- kvm: s390: Introduce BCD Vector Instructions to the guest (FATE#324072, LTC#158953).
- kvm: s390: Introduce Vector Enhancements facility 1 to the guest (FATE#324072, LTC#158953).
- kvm: s390: Limit sthyi execution (FATE#324070, LTC#158959).
- kvm: s390: Populate mask of non-hypervisor managed facility bits (FATE#324071, LTC#158956).
- kvm: VMX: clean up declaration of VPID/EPT invalidation types (bnc#1012382).
- kvm: VMX: Fix rflags cache during vCPU reset (bnc#1012382).
- kvm: VMX: Make indirect call speculation safe (bnc#1012382).
- kvm: x86: Do not re-execute instruction when not passing CR2 value (bnc#1012382).
- kvm: x86: emulator: Return to user-mode on L1 CPL=0 emulation failure (bnc#1012382).
- kvm: x86: fix escape of guest dr6 to the host (bnc#1012382).
- kvm: X86: Fix operand/address-size during instruction decoding (bnc#1012382).
- kvm: x86: ioapic: Clear Remote IRR when entry is switched to edge-triggered (bnc#1012382).
- kvm: x86: ioapic: Fix level-triggered EOI and IOAPIC reconfigure race (bnc#1012382).
- kvm: x86: ioapic: Preserve read-only values in the redirection table (bnc#1012382).
- kvm: x86: Make indirect calls in emulator speculation safe (bnc#1012382).
- kvm/x86: Reduce retpoline performance impact in slot_handle_level_range(), by always inlining iterator helper methods (bnc#1012382).
- l2tp: fix use-after-free during module unload (bsc#1042286).
- led: core: Fix brightness setting when setting delay_off=0 (bnc#1012382).
- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).
- libceph: check kstrndup() return value (bsc#1081735).
- lib/mpi: Fix umul_ppmm() for MIPS64r6 (bnc#1012382).
- lib/uuid.c: introduce a few more generic helpers (fate#315887, bsc#1082632).
- lib/uuid.c: use correct offset in uuid parser (fate#315887, bsc#1082632).
- livepatch: introduce shadow variable API (bsc#1082299 fate#313296). Shadow variables support.
- livepatch: __kgr_shadow_get_or_alloc() is local to shadow.c (bsc#1082299 fate#313296). Shadow variables support.
- lockd: fix 'list_add double add' caused by legacy signal interface (bnc#1012382).
- loop: fix concurrent lo_open/lo_release (bnc#1012382).
- mac80211: fix the update of path metric for RANN frame (bnc#1012382).
- mac80211: mesh: drop frames appearing to be from us (bnc#1012382).
- Make DST_CACHE a silent config option (bnc#1012382).
- mdio-sun4i: Fix a memory leak (bnc#1012382).
- md/raid1: Use a new variable to count flighting sync requests(bsc#1083048)
- media: cxusb, dib0700: ignore XC2028_I2C_FLUSH (bnc#1012382).
- media: dvb-usb-v2: lmedm04: Improve logic checking of warm start (bnc#1012382).
- media: dvb-usb-v2: lmedm04: move ts2020 attach to dm04_lme2510_tuner (bnc#1012382).
- media: r820t: fix r820t_write_reg for KASAN (bnc#1012382).
- media: s5k6aa: describe some function parameters (bnc#1012382).
- media: soc_camera: soc_scale_crop: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).
- media: ts2020: avoid integer overflows on 32 bit machines (bnc#1012382).
- media: usbtv: add a new usbid (bnc#1012382).
- media: v4l2-compat-ioctl32.c: add missing VIDIOC_PREPARE_BUF (bnc#1012382).
- media: v4l2-compat-ioctl32.c: avoid sizeof(type) (bnc#1012382).
- media: v4l2-compat-ioctl32.c: copy clip list in put_v4l2_window32 (bnc#1012382).
- media: v4l2-compat-ioctl32.c: copy m.userptr in put_v4l2_plane32 (bnc#1012382).
- media: v4l2-compat-ioctl32.c: do not copy back the result for certain errors (bnc#1012382).
- media: v4l2-compat-ioctl32.c: drop pr_info for unknown buffer type (bnc#1012382).
- media: v4l2-compat-ioctl32.c: fix ctrl_is_pointer (bnc#1012382).
- media: v4l2-compat-ioctl32.c: fix the indentation (bnc#1012382).
- media: v4l2-compat-ioctl32.c: make ctrl_is_pointer work for subdevs (bnc#1012382).
- media: v4l2-compat-ioctl32.c: move 'helper' functions to __get/put_v4l2_format32 (bnc#1012382).
- media: v4l2-compat-ioctl32: Copy v4l2_window-&gt;global_alpha (bnc#1012382).
- media: v4l2-compat-ioctl32.c: refactor compat ioctl32 logic (bnc#1012382).
- media: v4l2-ioctl.c: do not copy back the result for -ENOTTY (bnc#1012382).
- mmc: bcm2835: Do not overwrite max frequency unconditionally (bsc#983145, git-fixes).
- mm/early_ioremap: Fix boot hang with earlyprintk=efi,keep (bnc#1012382).
- mm: hide a #warning for COMPILE_TEST (bnc#1012382).
- mm/kmemleak.c: make cond_resched() rate-limiting more efficient (git-fixes).
- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1081500).
- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (bnc#1012382).
- mn10300/misalignment: Use SIGSEGV SEGV_MAPERR to report a failed user copy (bnc#1012382).
- modsign: hide openssl output in silent builds (bnc#1012382).
- module/retpoline: Warn about missing retpoline in module (bnc#1012382).
- mpt3sas: Do not mark fw_event workqueue as WQ_MEM_RECLAIM (bsc#1078583).
- mptfusion: hide unused seq_mpt_print_ioc_summary function (bnc#1012382).
- mtd: cfi: convert inline functions to macros (bnc#1012382).
- mtd: cfi: enforce valid geometry configuration (bnc#1012382).
- mtd: ichxrom: maybe-uninitialized with gcc-4.9 (bnc#1012382).
- mtd: maps: add __init attribute (bnc#1012382).
- mtd: nand: brcmnand: Disable prefetch by default (bnc#1012382).
- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).
- mtd: nand: Fix nand_do_read_oob() return value (bnc#1012382).
- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bnc#1012382).
- mtd: nand: sunxi: Fix ECC strength choice (bnc#1012382).
- mtd: sh_flctl: pass FIFO as physical address (bnc#1012382).
- mvpp2: fix multicast address filter (bnc#1012382).
- ncpfs: fix unused variable warning (bnc#1012382).
- ncr5380: shut up gcc indentation warning (bnc#1012382).
- net: add dst_cache support (bnc#1012382).
- net: arc_emac: fix arc_emac_rx() error paths (bnc#1012382).
- net: avoid skb_warn_bad_offload on IS_ERR (bnc#1012382).
- net: cdc_ncm: initialize drvflags before usage (bnc#1012382).
- net: dst_cache_per_cpu_dst_set() can be static (bnc#1012382).
- net: ena: add detection and recovery mechanism for handling missed/misrouted MSI-X (bsc#1083548).
- net: ena: add new admin define for future support of IPv6 RSS (bsc#1083548).
- net: ena: add power management ops to the ENA driver (bsc#1083548).
- net: ena: add statistics for missed tx packets (bsc#1083548).
- net: ena: fix error handling in ena_down() sequence (bsc#1083548).
- net: ena: fix race condition between device reset and link up setup (bsc#1083548).
- net: ena: fix rare kernel crash when bar memory remap fails (bsc#1083548).
- net: ena: fix wrong max Tx/Rx queues on ethtool (bsc#1083548).
- net: ena: improve ENA driver boot time (bsc#1083548).
- net: ena: increase ena driver version to 1.3.0 (bsc#1083548).
- net: ena: increase ena driver version to 1.5.0 (bsc#1083548).
- net: ena: reduce the severity of some printouts (bsc#1083548).
- net: ena: remove legacy suspend suspend/resume support (bsc#1083548).
- net: ena: Remove redundant unlikely() (bsc#1083548).
- net: ena: unmask MSI-X only after device initialization is completed (bsc#1083548).
- net: ethernet: cavium: Correct Cavium Thunderx NIC driver names accordingly to module name (bsc#1085011).
- net: ethernet: xilinx: Mark XILINX_LL_TEMAC broken on 64-bit (bnc#1012382).
- net: ethtool: Add back transceiver type (bsc#1085050).
- net: ethtool: remove error check for legacy setting transceiver type (bsc#1085050).
- netfilter: drop outermost socket lock in getsockopt() (bnc#1012382).
- netfilter: ebtables: CONFIG_COMPAT: do not trust userland offsets (bsc#1085107).
- netfilter: ebtables: fix erroneous reject of last rule (bsc#1085107).
- netfilter: ipt_CLUSTERIP: fix out-of-bounds accesses in clusterip_tg_check() (bnc#1012382).
- netfilter: ipvs: avoid unused variable warnings (bnc#1012382).
- netfilter: nf_queue: Make the queue_handler pernet (bnc#1012382).
- netfilter: nf_tables: fix a wrong check to skip the inactive rules (bsc#1042286).
- netfilter: nf_tables: fix inconsistent element expiration calculation (bsc#1042286).
- netfilter: nf_tables: fix *leak* when expr clone fail (bsc#1042286).
- netfilter: nf_tables: fix race when create new element in dynset (bsc#1042286).
- netfilter: on sockopt() acquire sock lock only in the required scope (bnc#1012382).
- netfilter: tee: select NF_DUP_IPV6 unconditionally (bsc#1042286).
- netfilter: x_tables: avoid out-of-bounds reads in xt_request_find_{match|target} (bnc#1012382).
- netfilter: x_tables: fix int overflow in xt_alloc_table_info() (bnc#1012382).
- netfilter: xt_RATEEST: acquire xt_rateest_mutex for hash insert (bnc#1012382).
- netfilter: xt_socket: fix transparent match for IPv6 request sockets (bsc#1042286).
- net: gianfar_ptp: move set_fipers() to spinlock protecting area (bnc#1012382).
- net: hns: add ACPI mode support for ethtool -p (bsc#1084041).
- net: hp100: remove unnecessary #ifdefs (bnc#1012382).
- net: igmp: add a missing rcu locking section (bnc#1012382).
- net/ipv4: Introduce IPSKB_FRAG_SEGS bit to inet_skb_parm.flags (bsc#1042286).
- netlink: fix nla_put_{u8,u16,u32} for KASAN (bnc#1012382).
- net/mlx5e: Fix loopback self test when GRO is off (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Fix wrong delay calculation for overflow check scheduling (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: Verify inline header size do not exceed SKB linear size (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Use 128B cacheline size for 128B or larger cachelines (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net: phy: Keep reporting transceiver type (bsc#1085050).
- net: replace dst_cache ip6_tunnel implementation with the generic one (bnc#1012382).
- net_sched: red: Avoid devision by zero (bnc#1012382).
- net_sched: red: Avoid illegal values (bnc#1012382).
- net/smc: fix NULL pointer dereference on sock_create_kern() error path (bsc#1082979).
- netvsc: allow controlling send/recv buffer size (fate#315887, bsc#1082632).
- netvsc: allow driver to be removed even if VF is present (fate#315887, bsc#1082632).
- netvsc: check error return when restoring channels and mtu (fate#315887, bsc#1082632).
- netvsc: cleanup datapath switch (fate#315887, bsc#1082632).
- netvsc: do not signal host twice if empty (fate#315887, bsc#1082632).
- netvsc: fix deadlock betwen link status and removal (fate#315887, bsc#1082632).
- netvsc: increase default receive buffer size (fate#315887, bsc#1082632).
- netvsc: keep track of some non-fatal overload conditions (fate#315887, bsc#1082632).
- netvsc: no need to allocate send/receive on numa node (fate#315887, bsc#1082632).
- netvsc: propagate MAC address change to VF slave (fate#315887, bsc#1082632).
- netvsc: remove unnecessary cast of void pointer (fate#315887, bsc#1082632).
- netvsc: remove unnecessary check for NULL hdr (fate#315887, bsc#1082632).
- netvsc: whitespace cleanup (fate#315887, bsc#1082632).
- net: vxlan: lwt: Fix vxlan local traffic (bsc#1042286).
- net: vxlan: lwt: Use source ip address during route lookup (bsc#1042286).
- nfs: Add a cond_resched() to nfs_commit_release_pages() (bsc#1077779).
- nfs: commit direct writes even if they fail partially (bnc#1012382).
- nfsd: check for use of the closed special stateid (bnc#1012382).
- nfsd: CLOSE SHOULD return the invalid special stateid for NFSv4.x (x&gt;0) (bnc#1012382).
- nfsd: Ensure we check stateid validity in the seqid operation checks (bnc#1012382).
- nfs: Do not convert nfs_idmap_cache_timeout to jiffies (git-fixes).
- nfs: fix a deadlock in nfs client initialization (bsc#1074198).
- nfs/pnfs: fix nfs_direct_req ref leak when i/o falls back to the mds (bnc#1012382).
- nfs: reject request for id_legacy key without auxdata (bnc#1012382).
- nfs: Trunking detection should handle ERESTARTSYS/EINTR (bsc#1074198).
- nvme_fc: cleanup io completion (bsc#1079609).
- nvme_fc: correct abort race condition on resets (bsc#1079609).
- nvme_fc: fix abort race on teardown with lld reject (bsc#1083750).
- nvme_fc: fix ctrl create failures racing with workq items (bsc#1076982).
- nvme_fc: io timeout should defer abort to ctrl reset (bsc#1085054).
- nvme-fc: kick admin requeue list on disconnect (bsc#1077241).
- nvme-fc: merge error on sles12sp3 for reset_work (bsc#1079195).
- nvme_fc: minor fixes on sqsize (bsc#1076760).
- nvme_fc: on remoteport reuse, set new nport_id and role (bsc#1076760).
- nvme_fc: rework sqsize handling (bsc#1076760).
- nvme: Fix managing degraded controllers (bnc#1012382).
- nvme: Fix setting logical block format when revalidating (bsc#1079313).
- nvme: only start KATO if the controller is live (bsc#1083387).
- nvme-pci: clean up CMB initialization (bsc#1082979).
- nvme-pci: clean up SMBSZ bit definitions (bsc#1082979).
- nvme-pci: consistencly use ctrl-&gt;device for logging (bsc#1082979).
- nvme-pci: fix typos in comments (bsc#1082979).
- nvme-pci: Remap CMB SQ entries on every controller reset (bsc#1082979).
- nvme-pci: Use PCI bus address for data/queues in CMB (bsc#1082979).
- nvme: Quirks for PM1725 controllers (bsc#1082979).
- nvme_rdma: clear NVME_RDMA_Q_LIVE bit if reconnect fails (bsc#1083770).
- nvme-rdma: fix concurrent reset and reconnect (bsc#1082979).
- nvme: remove nvme_revalidate_ns (bsc#1079313).
- ocfs2: return error when we attempt to access a dirty bh in jbd2 (bsc#1070404).
- openvswitch: fix the incorrect flow action alloc size (bnc#1012382).
- ovl: fix failure to fsync lower dir (bnc#1012382).
- ovs/geneve: fix rtnl notifications on iface deletion (bsc#1042286).
- ovs/gre: fix rtnl notifications on iface deletion (bsc#1042286).
- ovs/gre,geneve: fix error path when creating an iface (bsc#1042286).
- ovs/vxlan: fix rtnl notifications on iface deletion (bsc#1042286).
- pci/ASPM: Do not retrain link if ASPM not possible (bnc#1071892).
- pci: hv: Do not sleep in compose_msi_msg() (fate#315887, bsc#1082632).
- pci: keystone: Fix interrupt-controller-node lookup (bnc#1012382).
- pci/MSI: Fix msi_desc-&gt;affinity memory leak when freeing MSI IRQs (bsc#1082979).
- perf bench numa: Fixup discontiguous/sparse numa nodes (bnc#1012382).
- perf top: Fix window dimensions change handling (bnc#1012382).
- perf/x86: Shut up false-positive -Wmaybe-uninitialized warning (bnc#1012382).
- pinctrl: sunxi: Fix A80 interrupt pin bank (bnc#1012382).
- pktcdvd: Fix pkt_setup_dev() error path (bnc#1012382).
- platform/x86: intel_mid_thermal: Fix suspend handlers unused warning (bnc#1012382).
- pm / devfreq: Propagate error from devfreq_add_device() (bnc#1012382).
- pm / wakeirq: Fix unbalanced IRQ enable for wakeirq (bsc#1031717).
- posix-timer: Properly check sigevent-&gt;sigev_notify (bnc#1012382).
- power: bq27xxx_battery: mark some symbols __maybe_unused (bnc#1012382).
- powerpc/64: Fix flush_(d|i)cache_range() called from modules (FATE#315275 LTC#103998 bnc#1012382 bnc#863764).
- powerpc/64s: Fix RFI flush dependency on HARDLOCKUP_DETECTOR (bnc#1012382).
- powerpc/64s: Improve RFI L1-D cache flush fallback (bsc#1068032, bsc#1075087).
- powerpc: Do not preempt_disable() in show_cpuinfo() (bsc#1066223).
- powerpc/numa: Ensure nodes initialized for hotplug (FATE#322022, bsc#1081514).
- powerpc/numa: Invalidate numa_cpu_lookup_table on cpu remove (bsc#1081512).
- powerpc/numa: Use ibm,max-associativity-domains to discover possible nodes (FATE#322022, bsc#1081514).
- powerpc/perf: Fix oops when grouping different pmu events (bnc#1012382).
- powerpc/powernv: Fix MCE handler to avoid trashing CR0/CR1 registers (bsc#1066223).
- powerpc/powernv: Move IDLE_STATE_ENTER_SEQ macro to cpuidle.h (bsc#1066223).
- powerpc/powernv: Support firmware disable of RFI flush (bsc#1068032, bsc#1075087).
- powerpc/pseries: Fix cpu hotplug crash with memoryless nodes (FATE#322022, bsc#1081514).
- powerpc/pseries: Support firmware disable of RFI flush (bsc#1068032, bsc#1075087).
- powerpc: Simplify module TOC handling (bnc#1012382).
- power: reset: zx-reboot: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).
- profile: hide unused functions when !CONFIG_PROC_FS (bnc#1012382).
- Provide a function to create a NUL-terminated string from unterminated data (bnc#1012382).
- pwc: hide unused label (bnc#1012382).
- qla2xxx: Add changes for devloss timeout in driver (bsc#1084427).
- qla2xxx: Add FC-NVMe abort processing (bsc#1084427).
- qla2xxx: asynchronous pci probing (bsc#1034503).
- qla2xxx: Cleanup code to improve FC-NVMe error handling (bsc#1084427).
- qla2xxx: Convert QLA_TGT_ABTS to TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1043726,FATE#324770).
- qla2xxx: do not check login_state if no loop id is assigned (bsc#1081681).
- qla2xxx: ensure async flags are reset correctly (bsc#1081681).
- qla2xxx: Fix Async GPN_FT for FCP and FC-NVMe scan (bsc#1084427).
- qla2xxx: Fix FC-NVMe IO abort during driver reset (bsc#1084427).
- qla2xxx: Fix incorrect tcm_qla2xxx_free_cmd use during TMR ABORT (v2) (bsc#1043726,FATE#324770).
- qla2xxx: Fix n2n_ae flag to prevent dev_loss on PDB change (bsc#1084427).
- qla2xxx: Fix NVMe entry_type for iocb packet on BE system (bsc#1043726,FATE#324770).
- qla2xxx: Fix retry for PRLI RJT with reason of BUSY (bsc#1084427).
- qla2xxx: Fixup locking for session deletion (bsc#1081681).
- qla2xxx: Remove nvme_done_list (bsc#1084427).
- qla2xxx: Remove unneeded message and minor cleanup for FC-NVMe (bsc#1084427).
- qla2xxx: remove use of FC-specific error codes (bsc#1043726,FATE#324770).
- qla2xxx: Restore ZIO threshold setting (bsc#1084427).
- qla2xxx: Return busy if rport going away (bsc#1084427).
- qla2xxx: Set IIDMA and fcport state before qla_nvme_register_remote() (bsc#1084427).
- qla2xxx: Update driver version to 10.00.00.06-k (bsc#1084427).
- qlcnic: fix deadlock bug (bnc#1012382).
- r8169: fix RTL8168EP take too long to complete driver initialization (bnc#1012382).
- rdma/cma: Make sure that PSN is not over max allowed (bnc#1012382).
- rdma/uverbs: Protect from command mask overflow (bsc#1082979).
- reiserfs: avoid a -Wmaybe-uninitialized warning (bnc#1012382).
- Revert 'Bluetooth: btusb: fix QCA Rome suspend/resume' (bnc#1012382).
- Revert 'bpf: avoid false sharing of map refcount with max_entries' (kabi).
- Revert 'netfilter: nf_queue: Make the queue_handler pernet' (kabi).
- Revert 'net: replace dst_cache ip6_tunnel implementation with the generic one' (kabi bnc#1082897).
- Revert 'power: bq27xxx_battery: Remove unneeded dependency in Kconfig' (bnc#1012382).
- Revert 'powerpc: Simplify module TOC handling' (kabi).
- Revert SUSE-specific qla2xxx patch 'Add module parameter for interrupt mode' (bsc#1043726)
- Revert 'x86/entry/64: Separate cpu_current_top_of_stack from TSS.sp0'
- Revert 'x86/entry/64: Use a per-CPU trampoline stack for IDT entries'
- rfi-flush: Move the logic to avoid a redo into the debugfs code (bsc#1068032, bsc#1075087).
- rfi-flush: Switch to new linear fallback flush (bsc#1068032, bsc#1075087).
- rhashtable: add rhashtable_lookup_get_insert_key() (bsc#1042286).
- rtc-opal: Fix handling of firmware error codes, prevent busy loops (bnc#1012382).
- rtlwifi: fix gcc-6 indentation warning (bnc#1012382).
- rtlwifi: rtl8821ae: Fix connection lost problem correctly (bnc#1012382).
- s390: add no-execute support (FATE#324087, LTC#158827).
- s390/dasd: fix handling of internal requests (bsc#1080321).
- s390/dasd: fix wrongly assigned configuration data (bnc#1012382).
- s390/dasd: prevent prefix I/O error (bnc#1012382).
- s390: fix handling of -1 in set{,fs}[gu]id16 syscalls (bnc#1012382).
- s390: hypfs: Move diag implementation and data definitions (FATE#324070, LTC#158959).
- s390: kvm: Cpu model support for msa6, msa7 and msa8 (FATE#324069, LTC#159031).
- s390: Make cpc_name accessible (FATE#324070, LTC#158959).
- s390: Make diag224 public (FATE#324070, LTC#158959).
- s390/mem_detect: use unsigned longs (FATE#324071, LTC#158956).
- s390/mm: align swapper_pg_dir to 16k (FATE#324087, LTC#158827).
- s390/mm: always use PAGE_KERNEL when mapping pages (FATE#324087, LTC#158827).
- s390/noexec: execute kexec datamover without DAT (FATE#324087, LTC#158827).
- s390/oprofile: fix address range for asynchronous stack (bsc#1082979).
- s390/pageattr: allow kernel page table splitting (FATE#324087, LTC#158827).
- s390/pageattr: avoid unnecessary page table splitting (FATE#324087, LTC#158827).
- s390/pageattr: handle numpages parameter correctly (FATE#324087, LTC#158827).
- s390/pci_dma: improve lazy flush for unmap (bnc#1079886, LTC#163393).
- s390/pci_dma: improve map_sg (bnc#1079886, LTC#163393).
- s390/pci_dma: make lazy flush independent from the tlb_refresh bit (bnc#1079886, LTC#163393).
- s390/pci_dma: remove dma address range check (bnc#1079886, LTC#163393).
- s390/pci_dma: simplify dma address calculation (bnc#1079886, LTC#163393).
- s390/pci_dma: split dma_update_trans (bnc#1079886, LTC#163393).
- s390/pci: fix dma address calculation in map_sg (bnc#1079886, LTC#163393).
- s390/pci: handle insufficient resources during dma tlb flush (bnc#1079886, LTC#163393).
- s390/pgtable: introduce and use generic csp inline asm (FATE#324087, LTC#158827).
- s390/pgtable: make pmd and pud helper functions available (FATE#324087, LTC#158827).
- s390/qeth: fix underestimated count of buffer elements (bnc#1082089, LTC#164529).
- s390: report new vector facilities (FATE#324088, LTC#158828).
- s390/sclp: Add hmfai field (FATE#324071, LTC#158956).
- s390/vmem: align segment and region tables to 16k (FATE#324087, LTC#158827).
- s390/vmem: introduce and use SEGMENT_KERNEL and REGION3_KERNEL (FATE#324087, LTC#158827).
- s390/vmem: simplify vmem code for read-only mappings (FATE#324087, LTC#158827).
- sched/rt: Up the root domain ref count when passing it around via IPIs (bnc#1012382).
- sched/rt: Use container_of() to get root domain in rto_push_irq_work_func() (bnc#1012382).
- scripts/kernel-doc: Do not fail with status != 0 if error encountered with -none (bnc#1012382).
- scsi: aacraid: Fix hang in kdump (bsc#1022607, FATE#321673).
- scsi: aacraid: Prevent crash in case of free interrupt during scsi EH path (bnc#1012382).
- scsi: advansys: fix build warning for PCI=n (bnc#1012382).
- scsi: advansys: fix uninitialized data access (bnc#1012382).
- scsi: do not look for NULL devices handlers by name (bsc#1082373).
- scsi: fas216: fix sense buffer initialization (bsc#1082979).
- scsi: fdomain: drop fdomain_pci_tbl when built-in (bnc#1012382).
- scsi: hisi_sas: directly attached disk LED feature for v2 hw (bsc#1083409).
- scsi: ibmvfc: fix misdefined reserved field in ibmvfc_fcp_rsp_info (bnc#1012382).
- scsi: initio: remove duplicate module device table (bnc#1012382 bsc#1082979).
- scsi: initio: remove duplicate module device table (bsc#1082979).
- scsi: libsas: fix error when getting phy events (bsc#1082979).
- scsi: libsas: fix memory leak in sas_smp_get_phy_events() (bsc#1082979).
- scsi: lpfc: Add WQ Full Logic for NVME Target (bsc#1080656).
- scsi: lpfc: Allow set of maximum outstanding SCSI cmd limit for a target (bsc#1080656).
- scsi: lpfc: Beef up stat counters for debug (bsc#1076693).
- scsi: lpfc: correct debug counters for abort (bsc#1080656).
- scsi: lpfc: do not dereference localport before it has been null checked (bsc#1076693).
- scsi: lpfc: Do not return internal MBXERR_ERROR code from probe function (bsc#1082979).
- scsi: lpfc: fix a couple of minor indentation issues (bsc#1076693).
- scsi: lpfc: Fix -EOVERFLOW behavior for NVMET and defer_rcv (bsc#1076693).
- scsi: lpfc: Fix header inclusion in lpfc_nvmet (bsc#1080656).
- scsi: lpfc: Fix infinite wait when driver unregisters a remote NVME port (bsc#1076693).
- scsi: lpfc: Fix IO failure during hba reset testing with nvme io (bsc#1080656).
- scsi: lpfc: Fix issue_lip if link is disabled (bsc#1080656).
- scsi: lpfc: Fix issues connecting with nvme initiator (bsc#1076693).
- scsi: lpfc: Fix nonrecovery of NVME controller after cable swap (bsc#1080656).
- scsi: lpfc: Fix PRLI handling when topology type changes (bsc#1080656).
- scsi: lpfc: Fix receive PRLI handling (bsc#1076693).
- scsi: lpfc: Fix RQ empty firmware trap (bsc#1080656).
- scsi: lpfc: Fix SCSI io host reset causing kernel crash (bsc#1080656).
- scsi: lpfc: Fix SCSI LUN discovery when SCSI and NVME enabled (bsc#1076693).
- scsi: lpfc: Fix soft lockup in lpfc worker thread during LIP testing (bsc#1080656).
- scsi: lpfc: Increase CQ and WQ sizes for SCSI (bsc#1080656).
- scsi: lpfc: Increase SCSI CQ and WQ sizes (bsc#1076693).
- scsi: lpfc: Indicate CONF support in NVMe PRLI (bsc#1080656).
- scsi: lpfc: move placement of target destroy on driver detach (bsc#1080656).
- scsi: lpfc: Treat SCSI Write operation Underruns as an error (bsc#1080656).
- scsi: lpfc: Update 11.4.0.7 modified files for 2018 Copyright (bsc#1080656).
- scsi: lpfc: update driver version to 11.4.0.6 (bsc#1076693).
- scsi: lpfc: update driver version to 11.4.0.7 (bsc#1080656).
- scsi: lpfc: Validate adapter support for SRIU option (bsc#1080656).
- scsi: mvumi: use __maybe_unused to hide pm functions (bnc#1012382).
- scsi: qla2xxx: Ability to process multiple SGEs in Command SGL for CT passthrough commands (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Accelerate SCSI BUSY status generation in target mode (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Add ability to autodetect SFP type (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add ability to send PRLO (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add ability to use GPNFT/GNNFT for RSCN handling (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add ATIO-Q processing for INTx mode (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add boundary checks for exchanges to be offloaded (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add command completion for error path (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add debug knob for user control workload (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Add debug logging routine for qpair (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Added change to enable ZIO for FC-NVMe devices (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add FC-NVMe command handling (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add FC-NVMe F/W initialization and transport registration (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add FC-NVMe port discovery and PRLI handling (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add function call to qpair for door bell (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Add fw_started flags to qpair (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Add lock protection around host lookup (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add LR distance support from nvram bit (bsc#1043726,FATE#324770).
- scsi: qla2xxx: add missing includes for qla_isr (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add option for use reserve exch for ELS (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add ql2xiniexchg parameter (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Add retry limit for fabric scan logic (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add support for minimum link speed (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add switch command to simplify fabric discovery (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add timeout ability to wait_for_sess_deletion() (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Add XCB counters to debugfs (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Allow ABTS, PURX, RIDA on ATIOQ for ISP83XX/27XX (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Allow MBC_GET_PORT_DATABASE to query and save the port states (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Allow relogin and session creation after reset (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Allow SNS fabric login to be retried (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Allow target mode to accept PRLI in dual mode (bsc#1043726,FATE#324770).
- scsi: qla2xxx: avoid unused-function warning (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Change ha-&gt;wq max_active value to default (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Changes to support N2N logins (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Chip reset uses wrong lock during IO flush (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Cleanup FC-NVMe code (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Cleanup NPIV host in target mode during config teardown (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Clear fc4f_nvme flag (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Clear loop id after delete (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Combine Active command arrays (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Convert 32-bit LUN usage to 64-bit (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Defer processing of GS IOCB calls (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Delay loop id allocation at login (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Do not call abort handler function during chip reset (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Do not call dma_free_coherent with IRQ disabled (bsc#1043726,FATE#324770).
- scsi: qla2xxx: do not include &lt;generated/utsrelease.h&gt; (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Enable Async TMF processing (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Enable ATIO interrupt handshake for ISP27XX (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Enable Target Multi Queue (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Fix abort command deadlock due to spinlock (FATE#320146, bsc#966328).
- scsi: qla2xxx: fix a bunch of typos and spelling mistakes (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix a locking imbalance in qlt_24xx_handle_els() (bsc#1082979).
- scsi: qla2xxx: Fix compile warning (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Fix FC-NVMe LUN discovery (bsc#1083223).
- scsi: qla2xxx: Fix Firmware dump size for Extended login and Exchange Offload (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix GPNFT/GNNFT error handling (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix gpnid error processing (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix incorrect handle for abort IOCB (bsc#1082979).
- scsi: qla2xxx: Fix login state machine freeze (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix login state machine stuck at GPDB (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix logo flag for qlt_free_session_done() (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix mailbox failure while deleting Queue pairs (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Fix memory leak in dual/target mode (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix NPIV host cleanup in target mode (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix NPIV host enable after chip reset (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix NULL pointer access for fcport structure (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix NULL pointer crash due to active timer for ABTS (bsc#1082979).
- scsi: qla2xxx: Fix NULL pointer crash due to probe failure (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix oops in qla2x00_probe_one error path (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix PRLI state check (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix queue ID for async abort with Multiqueue (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix recursion while sending terminate exchange (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix Relogin being triggered too fast (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix re-login for Nport Handle in use (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix remoteport disconnect for FC-NVMe (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix scan state field for fcport (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix session cleanup for N2N (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix slow mem alloc behind lock (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix smatch warning in qla25xx_delete_{rsp|req}_que (bsc#1043726,FATE#324770).
- scsi: qla2xxx: fix spelling mistake of variable sfp_additonal_info (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix system crash for Notify ack timeout handling (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix system crash in qlt_plogi_ack_unref (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix system crash while triggering FW dump (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix system panic due to pointer access problem (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix target multiqueue configuration (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix task mgmt handling for NPIV (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix warning during port_name debug print (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix warning for code intentation in __qla24xx_handle_gpdb_event() (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix warning in qla2x00_async_iocb_timeout() (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Fix WWPN/WWNN in debug message (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Handle PCIe error for driver (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Include Exchange offload/Extended Login into FW dump (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Increase ql2xmaxqdepth to 64 (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Increase verbosity of debug messages logged (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Migrate switch registration commands away from mailbox interface (bsc#1043726,FATE#324770).
- scsi: qla2xxx: move fields from qla_hw_data to qla_qpair (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Move function prototype to correct header (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Move logging default mask to execute once only (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Move session delete to driver work queue (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Move target stat counters from vha to qpair (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Move work element processing out of DPC thread (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Off by one in qlt_ctio_to_cmd() (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Preparation for Target MQ (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Prevent multiple active discovery commands per session (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Prevent relogin trigger from sending too many commands (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Prevent sp-&gt;free null/uninitialized pointer dereference (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Print correct mailbox registers in failed summary (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Properly extract ADISC error codes (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Protect access to qpair members with qpair-&gt;qp_lock (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Query FC4 type during RSCN processing (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Recheck session state after RSCN (bsc#1043726,FATE#324770)
- scsi: qla2xxx: Reduce the use of terminate exchange (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Reduce trace noise for Async Events (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Reinstate module parameter ql2xenablemsix (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Relogin to target port on a cable swap (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Remove aborting ELS IOCB call issued as part of timeout (FATE#320146, bsc#966328).
- scsi: qla2xxx: Remove an unused structure member (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Remove datasegs_per_cmd and datasegs_per_cont field (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Remove extra register read (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Remove extra register read (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Remove FC_NO_LOOP_ID for FCP and FC-NVMe Discovery (bsc#1084397).
- scsi: qla2xxx: Remove potential macro parameter side-effect in ql_dump_regs() (bsc#1043726,FATE#324770).
- scsi: qla2xxx: remove redundant assignment of d (bsc#1043726,FATE#324770).
- scsi: qla2xxx: remove redundant null check on tgt (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Remove redundant wait when target is stopped (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Remove session creation redundant code (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Remove unused argument from qlt_schedule_sess_for_deletion() (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Remove unused irq_cmd_count field (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Remove unused tgt_enable_64bit_addr flag (bsc#1043725,FATE#324770).
- scsi: qla2xxx: remove writeq/readq function definitions (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Replace fcport alloc with qla2x00_alloc_fcport (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Replace GPDB with async ADISC command (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Reset the logo flag, after target re-login (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Retry switch command on time out (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Send FC4 type NVMe to the management server (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Serialize GPNID for multiple RSCN (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Serialize session deletion by using work_lock (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Serialize session free in qlt_free_session_done (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Simpify unregistration of FC-NVMe local/remote ports (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Skip IRQ affinity for Target QPairs (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Skip zero queue count entry during FW dump capture (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Suppress a kernel complaint in qla_init_base_qpair() (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Tweak resource count dump (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Update Driver version to 10.00.00.00-k (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Update driver version to 10.00.00.01-k (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Update driver version to 10.00.00.02-k (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Update driver version to 10.00.00.03-k (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Update driver version to 10.00.00.04-k (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Update driver version to 10.00.00.05-k (bsc#1081681).
- scsi: qla2xxx: Update driver version to 9.01.00.00-k (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Update fw_started flags at qpair creation (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Use BIT_6 to acquire FAWWPN from switch (bsc#1043726,FATE#324770)
- scsi: qla2xxx: Use chip reset to bring down laser on unload (bsc#1043726,FATE#324770).
- scsi: qla2xxx: use dma_mapping_error to check map errors (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Use FC-NVMe FC4 type for FDMI registration (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Use IOCB path to submit Control VP MBX command (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Use known NPort ID for Management Server login (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Use ql2xnvmeenable to enable Q-Pair for FC-NVMe (bsc#1043726,FATE#324770).
- scsi: qla2xxx: use shadow register for ISP27XX (bsc#1043725,FATE#324770).
- scsi: qla2xxx: Use shadow register for ISP27XX (bsc#1043726,FATE#324770).
- scsi: qla2xxx: Use sp-&gt;free instead of hard coded call (bsc#1043726,FATE#324770).
- scsi: ses: do not get power status of SES device slot on probe (bsc#1082979).
- scsi: sim710: fix build warning (bnc#1012382).
- scsi: sr: workaround VMware ESXi cdrom emulation bug (bsc#1080813).
- scsi: storvsc: Fix scsi_cmd error assignments in storvsc_handle_error (bnc#1012382).
- scsi: storvsc: remove unnecessary channel inbound lock (fate#315887, bsc#1082632).
- scsi: sun_esp: fix device reference leaks (bsc#1082979).
- scsi: tcm_qla2xxx: Do not allow aborted cmd to advance (bsc#1043725,FATE#324770).
- scsi: ufs: ufshcd: fix potential NULL pointer dereference in ufshcd_config_vreg (bnc#1012382).
- sctp: make use of pre-calculated len (bnc#1012382).
- selinux: ensure the context is NUL terminated in security_context_to_sid_core() (bnc#1012382).
- selinux: general protection fault in sock_has_perm (bnc#1012382).
- selinux: skip bounded transition processing if the policy isn't loaded (bnc#1012382).
- serial: 8250_mid: fix broken DMA dependency (bnc#1012382).
- serial: 8250_uniphier: fix error return code in uniphier_uart_probe() (bsc#1031717).
- serial: imx: Only wakeup via RTSDEN bit if the system has RTS/CTS (bnc#1012382).
- series.conf: disable qla2xxx patches (bsc#1043725)
- sget(): handle failures of register_shrinker() (bnc#1012382).
- signal/openrisc: Fix do_unaligned_access to send the proper signal (bnc#1012382).
- signal/sh: Ensure si_signo is initialized in do_divide_error (bnc#1012382).
- SolutionEngine771x: fix Ether platform data (bnc#1012382).
- spi: atmel: fixed spin_lock usage inside atmel_spi_remove (bnc#1012382).
- spi: imx: do not access registers while clocks disabled (bnc#1012382).
- spi: sun4i: disable clocks in the remove function (bnc#1012382).
- ssb: mark ssb_bus_register as __maybe_unused (bnc#1012382).
- staging: android: ashmem: Fix a race condition in pin ioctls (bnc#1012382).
- staging: iio: adc: ad7192: fix external frequency setting (bnc#1012382).
- staging: rtl8188eu: Fix incorrect response to SIOCGIWESSID (bnc#1012382).
- staging: ste_rmi4: avoid unused function warnings (bnc#1012382).
- staging: unisys: visorinput depends on INPUT (bnc#1012382).
- staging: wilc1000: fix kbuild test robot error (bnc#1012382).
- sunrpc: Allow connect to return EHOSTUNREACH (bnc#1012382).
- target: Add support for TMR percpu reference counting (bsc#1043726,FATE#324770).
- target: Add TARGET_SCF_LOOKUP_LUN_FROM_TAG support for ABORT_TASK (bsc#1043726,FATE#324770).
- tc1100-wmi: fix build warning when CONFIG_PM not enabled (bnc#1012382).
- tc358743: fix register i2c_rd/wr function fix (git-fixes).
- tc358743: fix register i2c_rd/wr functions (bnc#1012382).
- tcp: do not set rtt_min to 1 (bsc#1042286).
- tcp: release sk_frag.page in tcp_disconnect (bnc#1012382).
- test_bpf: fix the dummy skb after dissector changes (bsc#1042286).
- tg3: Add workaround to restrict 5762 MRRS to 2048 (bnc#1012382).
- tg3: Enable PHY reset in MTU change path for 5720 (bnc#1012382).
- thermal: fix INTEL_SOC_DTS_IOSF_CORE dependencies (bnc#1012382).
- thermal: spear: use __maybe_unused for PM functions (bnc#1012382).
- tlan: avoid unused label with PCI=n (bnc#1012382).
- tools build: Add tools tree support for 'make -s' (bnc#1012382).
- tpm-dev-common: Reject too short writes (bsc#1020645, git-fixes).
- tpm: fix potential buffer overruns caused by bit glitches on the bus (bsc#1020645, git-fixes).
- tpm_i2c_infineon: fix potential buffer overruns caused by bit glitches on the bus (bsc#1020645, git-fixes).
- tpm_i2c_nuvoton: fix potential buffer overruns caused by bit glitches on the bus (bsc#1020645, git-fixes).
- tpm: st33zp24: fix potential buffer overruns caused by bit glitches on the bus (bsc#1020645, git-fixes).
- tpm_tis: fix potential buffer overruns caused by bit glitches on the bus (bsc#1020645, git-fixes).
- tty: cyclades: cyz_interrupt is only used for PCI (bnc#1012382).
- tty: hvc_xen: hide xen_console_remove when unused (bnc#1012382).
- tty: mxser: Remove ASYNC_CLOSING (bnc#1072363).
- ubi: block: Fix locking for idr_alloc/idr_remove (bnc#1012382).
- udp: restore UDPlite many-cast delivery (bsc#1042286).
- usb: build drivers/usb/common/ when USB_SUPPORT is set (bnc#1012382).
- usb: cdc-acm: Do not log urb submission errors on disconnect (bnc#1012382).
- usb: cdc_subset: only build when one driver is enabled (bnc#1012382).
- usb: dwc3: gadget: Set maxpacket size for ep0 IN (bnc#1012382).
- usb: f_fs: Prevent gadget unbind if it is already unbound (bnc#1012382).
- usb: gadget: do not dereference g until after it has been null checked (bnc#1012382).
- usb: gadget: f_fs: Process all descriptors during bind (bnc#1012382).
- usb: gadget: uvc: Missing files for configfs interface (bnc#1012382).
- usbip: fix 3eee23c3ec14 tcp_socket address still in the status file (bnc#1012382).
- usbip: keep usbip_device sockfd state in sync with tcp_socket (bnc#1012382).
- usbip: list: do not list devices attached to vhci_hcd (bnc#1012382).
- usbip: prevent bind loops on devices attached to vhci_hcd (bnc#1012382).
- usbip: vhci_hcd: clear just the USB_PORT_STAT_POWER bit (bnc#1012382).
- usb: ldusb: add PIDs for new CASSY devices supported by this driver (bnc#1012382).
- usb: musb/ux500: remove duplicate check for dma_is_compatible (bnc#1012382).
- usb: ohci: Proper handling of ed_rm_list to handle race condition between usb_kill_urb() and finish_unlinks() (bnc#1012382).
- usb: option: Add support for FS040U modem (bnc#1012382).
- usb: phy: msm add regulator dependency (bnc#1012382).
- usb: renesas_usbhs: missed the 'running' flag in usb_dmac with rx path (bnc#1012382).
- usb: serial: io_edgeport: fix possible sleep-in-atomic (bnc#1012382).
- usb: serial: pl2303: new device id for Chilitag (bnc#1012382).
- usb: serial: simple: add Motorola Tetra driver (bnc#1012382).
- usb: uas: unconditionally bring back host after reset (bnc#1012382).
- v4l: remove MEDIA_TUNER dependency for VIDEO_TUNER (bnc#1012382).
- vb2: V4L2_BUF_FLAG_DONE is set after DQBUF (bnc#1012382).
- vfs: do not do RCU lookup of empty pathnames (bnc#1012382).
- vhost_net: stop device during reset owner (bnc#1012382).
- video: fbdev: atmel_lcdfb: fix display-timings lookup (bnc#1012382).
- video: fbdev/mmp: add MODULE_LICENSE (bnc#1012382).
- video: fbdev: sis: remove unused variable (bnc#1012382).
- video: fbdev: via: remove possibly unused variables (bnc#1012382).
- video: Use bool instead int pointer for get_opt_bool() argument (bnc#1012382).
- virtio_balloon: prevent uninitialized variable use (bnc#1012382).
- vmbus: add per-channel sysfs info (fate#315887, bsc#1082632).
- vmbus: add prefetch to ring buffer iterator (fate#315887, bsc#1082632).
- vmbus: do not acquire the mutex in vmbus_hvsock_device_unregister() (fate#315887, bsc#1082632).
- vmbus: drop unused ring_buffer_info elements (fate#315887, bsc#1082632).
- vmbus: eliminate duplicate cached index (fate#315887, bsc#1082632).
- vmbus: hvsock: add proper sync for vmbus_hvsock_device_unregister() (fate#315887, bsc#1082632).
- vmbus: initialize reserved fields in messages (fate#315887, bsc#1082632).
- vmbus: make channel_message table constant (fate#315887, bsc#1082632).
- vmbus: more host signalling avoidance (fate#315887, bsc#1082632).
- vmbus: refactor hv_signal_on_read (fate#315887, bsc#1082632).
- vmbus: remove unused vmbus_sendpacket_ctl (fate#315887, bsc#1082632).
- vmbus: remove unused vmbus_sendpacket_multipagebuffer (fate#315887, bsc#1082632).
- vmbus: remove unused vmubs_sendpacket_pagebuffer_ctl (fate#315887, bsc#1082632).
- vmbus: Reuse uuid_le_to_bin() helper (fate#315887, bsc#1082632).
- vmbus: simplify hv_ringbuffer_read (fate#315887, bsc#1082632).
- vmbus: unregister device_obj-&gt;channels_kset (fate#315887, bsc#1082632).
- vmxnet3: prevent building with 64K pages (bnc#1012382).
- vxlan: consolidate csum flag handling (bsc#1042286).
- vxlan: consolidate output route calculation (bsc#1042286).
- vxlan: consolidate vxlan_xmit_skb and vxlan6_xmit_skb (bsc#1042286).
- vxlan: do not allow overwrite of config src addr (bsc#1042286).
- watchdog: imx2_wdt: restore previous timeout after suspend+resume (bnc#1012382).
- wireless: cw1200: use __maybe_unused to hide pm functions_ (bnc#1012382).
- x86: add MULTIUSER dependency for KVM (bnc#1012382).
- x86/asm: Fix inline asm call constraints for GCC 4.4 (bnc#1012382).
- x86/boot: Avoid warning for zero-filling .bss (bnc#1012382).
- x86: bpf_jit: small optimization in emit_bpf_tail_call() (bnc#1012382).
- x86/bugs: Drop one 'mitigation' from dmesg (bnc#1012382).
- x86/build: Silence the build with 'make -s' (bnc#1012382).
- x86/cpu/bugs: Make retpoline module warning conditional (bnc#1012382).
- x86/cpu: Change type of x86_cache_size variable to unsigned int (bnc#1012382).
- x86/entry/64: Separate cpu_current_top_of_stack from TSS.sp0 (bsc#1077560).
- x86/entry/64: Use a per-CPU trampoline stack for IDT entries (bsc#1077560).
- x86: fix build warnign with 32-bit PAE (bnc#1012382).
- x86/fpu/math-emu: Fix possible uninitialized variable use (bnc#1012382).
- x86/hyperv: Implement hv_get_tsc_page() (fate#315887, bsc#1082632).
- x86/hyper-v: include hyperv/ only when CONFIG_HYPERV is set (fate#315887, bsc#1082632).
- x86/hyper-v: Introduce fast hypercall implementation (fate#315887, bsc#1082632).
- x86/hyper-v: Make hv_do_hypercall() inline (fate#315887, bsc#1082632).
- x86/hyperv: Move TSC reading method to asm/mshyperv.h (fate#315887, bsc#1082632).
- x86/kaiser: fix build error with KASAN &amp;&amp; !FUNCTION_GRAPH_TRACER (bnc#1012382).
- x86/kvm/vmx: do not use vm-exit instruction length for fast MMIO when running nested (bsc#1081431).
- x86/mce: Pin the timer when modifying (bsc#1080851,1076282).
- x86/microcode/AMD: Change load_microcode_amd()'s param to bool to fix preemptibility bug (bnc#1012382).
- x86/microcode/AMD: Do not load when running on a hypervisor (bsc#1081436 bsc#1081437).
- x86/microcode: Do the family check first (bnc#1012382).
- x86/microcode: Do the family check first (bsc#1081436 bsc#1081437).
- x86/mm/kmmio: Fix mmiotrace for page unaligned addresses (bnc#1012382).
- x86/mm/pkeys: Fix fill_sig_info_pkey (fate#321300).
- x86/nospec: Fix header guards names (bnc#1012382).
- x86/oprofile: Fix bogus GCC-8 warning in nmi_setup() (bnc#1012382).
- x86/paravirt: Remove 'noreplace-paravirt' cmdline option (bnc#1012382).
- x86/platform: Add PCI dependency for PUNIT_ATOM_DEBUG (bnc#1012382).
- x86/platform/olpc: Fix resume handler build warning (bnc#1012382).
- x86/pti: Make unpoison of pgd for trusted boot work for real (bnc#1012382).
- x86/ras/inject: Make it depend on X86_LOCAL_APIC=y (bnc#1012382).
- x86/retpoline: Avoid retpolines for built-in __init functions (bnc#1012382).
- x86/retpoline/hyperv: Convert assembler indirect jumps (fate#315887, bsc#1082632).
- x86/retpoline: Remove the esp/rsp thunk (bnc#1012382).
- x86/spectre: Check CONFIG_RETPOLINE in command line parser (bnc#1012382).
- x86/spectre: Fix an error message (git-fixes).
- x86/spectre: Fix spelling mistake: 'vunerable'-&gt; 'vulnerable' (bnc#1012382).
- x86/spectre: Remove the out-of-tree RSB stuffing
- x86/spectre: Simplify spectre_v2 command line parsing (bnc#1012382).
- x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL (bnc#1012382).
- x86/xen: Zero MSR_IA32_SPEC_CTRL before suspend (bnc#1065600).
- xen/gntdev: Fix off-by-one error when unmapping with holes (bnc#1012382).
- xen/gntdev: Fix partial gntdev_mmap() cleanup (bnc#1012382).
- xen-netfront: enable device after manual module load (bnc#1012382).
- xen-netfront: remove warning when unloading module (bnc#1012382).
- xen: XEN_ACPI_PROCESSOR is Dom0-only (bnc#1012382).
- xfrm: check id proto in validate_tmpl() (bnc#1012382).
- xfrm: Fix stack-out-of-bounds read on socket policy lookup (bnc#1012382).
- xfrm: Fix stack-out-of-bounds with misconfigured transport mode policies (bnc#1012382).
- xfrm_user: propagate sec ctx allocation errors (bsc#1042286).
- xfs: do not chain ioends during writepage submission (bsc#1077285 bsc#1043441).
- xfs: factor mapping out of xfs_do_writepage (bsc#1077285 bsc#1043441).
- xfs: Introduce writeback context for writepages (bsc#1077285 bsc#1043441).
- xfs: ioends require logically contiguous file offsets (bsc#1077285 bsc#1043441).
- xfs: quota: check result of register_shrinker() (bnc#1012382).
- xfs: quota: fix missed destroy of qi_tree_lock (bnc#1012382).
- xfs: reinit btree pointer on attr tree inactivation walk (bsc#1078787).
- xfs: remove nonblocking mode from xfs_vm_writepage (bsc#1077285 bsc#1043441).
- xfs: remove xfs_cancel_ioend (bsc#1077285 bsc#1043441).
- xfs: stop searching for free slots in an inode chunk when there are none (bsc#1072739).
- xfs: toggle readonly state around xfs_log_mount_finish (bsc#1073401).
- xfs: ubsan fixes (bnc#1012382).
- xfs: validate sb_logsunit is a multiple of the fs blocksize (bsc#1077513).
- xfs: write unmount record for ro mounts (bsc#1073401).
- xfs: xfs_cluster_write is redundant (bsc#1077285 bsc#1043441).
- xtensa: fix futex_atomic_cmpxchg_inatomic (bnc#1012382).
- zram: fix operator precedence to get offset (bsc#1082979).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-23"/>
	<updated date="2018-03-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1006867">SUSE bug 1006867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015342">SUSE bug 1015342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015343">SUSE bug 1015343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020645">SUSE bug 1020645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022607">SUSE bug 1022607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024376">SUSE bug 1024376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027054">SUSE bug 1027054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033587">SUSE bug 1033587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034503">SUSE bug 1034503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043441">SUSE bug 1043441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043725">SUSE bug 1043725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043726">SUSE bug 1043726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062840">SUSE bug 1062840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065615">SUSE bug 1065615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067118">SUSE bug 1067118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068569">SUSE bug 1068569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069135">SUSE bug 1069135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070404">SUSE bug 1070404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071306">SUSE bug 1071306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071892">SUSE bug 1071892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072363">SUSE bug 1072363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072689">SUSE bug 1072689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072739">SUSE bug 1072739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072865">SUSE bug 1072865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073401">SUSE bug 1073401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073407">SUSE bug 1073407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074198">SUSE bug 1074198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074426">SUSE bug 1074426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075087">SUSE bug 1075087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076282">SUSE bug 1076282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076693">SUSE bug 1076693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076760">SUSE bug 1076760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076982">SUSE bug 1076982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077241">SUSE bug 1077241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077285">SUSE bug 1077285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077513">SUSE bug 1077513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077779">SUSE bug 1077779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078583">SUSE bug 1078583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078672">SUSE bug 1078672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078673">SUSE bug 1078673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078787">SUSE bug 1078787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079029">SUSE bug 1079029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079038">SUSE bug 1079038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079195">SUSE bug 1079195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079313">SUSE bug 1079313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079384">SUSE bug 1079384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079609">SUSE bug 1079609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079886">SUSE bug 1079886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079989">SUSE bug 1079989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080014">SUSE bug 1080014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080263">SUSE bug 1080263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080321">SUSE bug 1080321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080344">SUSE bug 1080344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080364">SUSE bug 1080364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080384">SUSE bug 1080384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080464">SUSE bug 1080464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080533">SUSE bug 1080533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080656">SUSE bug 1080656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080774">SUSE bug 1080774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080813">SUSE bug 1080813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080851">SUSE bug 1080851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081134">SUSE bug 1081134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081431">SUSE bug 1081431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081436">SUSE bug 1081436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081437">SUSE bug 1081437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081491">SUSE bug 1081491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081498">SUSE bug 1081498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081500">SUSE bug 1081500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081512">SUSE bug 1081512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081514">SUSE bug 1081514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081681">SUSE bug 1081681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081735">SUSE bug 1081735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082089">SUSE bug 1082089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082223">SUSE bug 1082223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082299">SUSE bug 1082299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082373">SUSE bug 1082373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082478">SUSE bug 1082478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082632">SUSE bug 1082632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082795">SUSE bug 1082795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082864">SUSE bug 1082864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082897">SUSE bug 1082897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082979">SUSE bug 1082979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082993">SUSE bug 1082993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083048">SUSE bug 1083048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083086">SUSE bug 1083086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083223">SUSE bug 1083223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083387">SUSE bug 1083387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083409">SUSE bug 1083409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083494">SUSE bug 1083494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083548">SUSE bug 1083548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083750">SUSE bug 1083750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083770">SUSE bug 1083770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084041">SUSE bug 1084041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084397">SUSE bug 1084397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084427">SUSE bug 1084427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084610">SUSE bug 1084610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084772">SUSE bug 1084772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084888">SUSE bug 1084888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084926">SUSE bug 1084926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084928">SUSE bug 1084928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084967">SUSE bug 1084967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085011">SUSE bug 1085011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085015">SUSE bug 1085015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085045">SUSE bug 1085045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085047">SUSE bug 1085047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085050">SUSE bug 1085050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085053">SUSE bug 1085053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085054">SUSE bug 1085054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085056">SUSE bug 1085056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085107">SUSE bug 1085107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085239">SUSE bug 1085239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863764">SUSE bug 863764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966170">SUSE bug 966170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966172">SUSE bug 966172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966328">SUSE bug 966328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969476">SUSE bug 969476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969477">SUSE bug 969477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975772">SUSE bug 975772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983145">SUSE bug 983145</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13166">CVE-2017-13166 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15951/">CVE-2017-15951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15951">CVE-2017-15951 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16644/">CVE-2017-16644 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16644">CVE-2017-16644 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16912/">CVE-2017-16912 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16912">CVE-2017-16912 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16913/">CVE-2017-16913 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16913">CVE-2017-16913 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17975/">CVE-2017-17975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17975">CVE-2017-17975 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18174/">CVE-2017-18174 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18174">CVE-2017-18174 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18208/">CVE-2017-18208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18208">CVE-2017-18208 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000026/">CVE-2018-1000026 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000026">CVE-2018-1000026 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1068">CVE-2018-1068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8087/">CVE-2018-8087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8087">CVE-2018-8087 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553641" comment="kernel-default-4.4.120-94.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553642" comment="kernel-default-base-4.4.120-94.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553643" comment="kernel-default-devel-4.4.120-94.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553644" comment="kernel-default-man-4.4.120-94.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520591" comment="kernel-devel-4.4.120-94.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520592" comment="kernel-macros-4.4.120-94.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520593" comment="kernel-source-4.4.120-94.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553645" comment="kernel-syms-4.4.120-94.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149685" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1045315" ref_url="https://bugzilla.suse.com/1045315" source="BUGZILLA"/>
		<reference ref_id="1049423" ref_url="https://bugzilla.suse.com/1049423" source="BUGZILLA"/>
		<reference ref_id="1052449" ref_url="https://bugzilla.suse.com/1052449" source="BUGZILLA"/>
		<reference ref_id="1082858" ref_url="https://bugzilla.suse.com/1082858" source="BUGZILLA"/>
		<reference ref_id="1083915" ref_url="https://bugzilla.suse.com/1083915" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2018-0202" ref_url="https://www.suse.com/security/cve/CVE-2018-0202/" source="CVE"/>
		<reference ref_id="CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003840.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Security issues fixed:

- CVE-2012-6706: VMSF_DELTA filter inside the unrar implementation allows an arbitrary memory write (bsc#1045315).
- CVE-2017-6419: A heap-based buffer overflow that can lead to a denial of service in libmspack via a crafted CHM file (bsc#1052449).
- CVE-2017-11423: A stack-based buffer over-read that can lead to a denial of service in mspack via a crafted CAB file (bsc#1049423).
- CVE-2018-1000085: An out-of-bounds heap read vulnerability was found in XAR parser that can lead to a denial of service (bsc#1082858).
- CVE-2018-0202: Fixed two vulnerabilities in the PDF parsing code (bsc#1083915).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082858">SUSE bug 1082858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6706">CVE-2012-6706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11423">CVE-2017-11423 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6419">CVE-2017-6419 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0202/">CVE-2018-0202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0202">CVE-2018-0202 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000085">CVE-2018-1000085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550823" comment="clamav-0.99.4-33.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149686" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1083302" ref_url="https://bugzilla.suse.com/1083302" source="BUGZILLA"/>
		<reference ref_id="1083303" ref_url="https://bugzilla.suse.com/1083303" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5732" ref_url="https://www.suse.com/security/cve/CVE-2018-5732/" source="CVE"/>
		<reference ref_id="CVE-2018-5733" ref_url="https://www.suse.com/security/cve/CVE-2018-5733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003843.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

Security issues fixed:

- CVE-2018-5733: reference count overflow in dhcpd (bsc#1083303).
- CVE-2018-5732: buffer overflow in dhclient (bsc#1083302).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083302">SUSE bug 1083302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083303">SUSE bug 1083303</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5732/">CVE-2018-5732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5732">CVE-2018-5732 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5733/">CVE-2018-5733 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5733">CVE-2018-5733 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550824" comment="dhcp-4.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550825" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550826" comment="dhcp-relay-4.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550827" comment="dhcp-server-4.3.3-10.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149687" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1078677" ref_url="https://bugzilla.suse.com/1078677" source="BUGZILLA"/>
		<reference ref_id="1082480" ref_url="https://bugzilla.suse.com/1082480" source="BUGZILLA"/>
		<reference ref_id="1082481" ref_url="https://bugzilla.suse.com/1082481" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15706" ref_url="https://www.suse.com/security/cve/CVE-2017-15706/" source="CVE"/>
		<reference ref_id="CVE-2018-1304" ref_url="https://www.suse.com/security/cve/CVE-2018-1304/" source="CVE"/>
		<reference ref_id="CVE-2018-1305" ref_url="https://www.suse.com/security/cve/CVE-2018-1305/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003844.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

Security issues fixed:

- CVE-2018-1305: Fixed late application of security constraints that can lead to resource exposure for unauthorised users (bsc#1082481).
- CVE-2018-1304: Fixed incorrect handling of empty string URL in security constraints that can lead to unitended exposure of resources (bsc#1082480).
- CVE-2017-15706: Fixed incorrect documentation of CGI Servlet search algorithm that may lead to misconfiguration (bsc#1078677).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1078677">SUSE bug 1078677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082480">SUSE bug 1082480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082481">SUSE bug 1082481</bugzilla>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15706/">CVE-2017-15706 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15706">CVE-2017-15706 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1304/">CVE-2018-1304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1304">CVE-2018-1304 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1305/">CVE-2018-1305 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1305">CVE-2018-1305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009533263" comment="tomcat-8.0.50-29.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533264" comment="tomcat-admin-webapps-8.0.50-29.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533265" comment="tomcat-docs-webapp-8.0.50-29.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533266" comment="tomcat-el-3_0-api-8.0.50-29.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533267" comment="tomcat-javadoc-8.0.50-29.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533268" comment="tomcat-jsp-2_3-api-8.0.50-29.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533269" comment="tomcat-lib-8.0.50-29.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533270" comment="tomcat-servlet-3_1-api-8.0.50-29.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533271" comment="tomcat-webapps-8.0.50-29.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149688" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1077080" ref_url="https://bugzilla.suse.com/1077080" source="BUGZILLA"/>
		<reference ref_id="1082692" ref_url="https://bugzilla.suse.com/1082692" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17997" ref_url="https://www.suse.com/security/cve/CVE-2017-17997/" source="CVE"/>
		<reference ref_id="CVE-2018-7320" ref_url="https://www.suse.com/security/cve/CVE-2018-7320/" source="CVE"/>
		<reference ref_id="CVE-2018-7321" ref_url="https://www.suse.com/security/cve/CVE-2018-7321/" source="CVE"/>
		<reference ref_id="CVE-2018-7322" ref_url="https://www.suse.com/security/cve/CVE-2018-7322/" source="CVE"/>
		<reference ref_id="CVE-2018-7323" ref_url="https://www.suse.com/security/cve/CVE-2018-7323/" source="CVE"/>
		<reference ref_id="CVE-2018-7324" ref_url="https://www.suse.com/security/cve/CVE-2018-7324/" source="CVE"/>
		<reference ref_id="CVE-2018-7325" ref_url="https://www.suse.com/security/cve/CVE-2018-7325/" source="CVE"/>
		<reference ref_id="CVE-2018-7326" ref_url="https://www.suse.com/security/cve/CVE-2018-7326/" source="CVE"/>
		<reference ref_id="CVE-2018-7327" ref_url="https://www.suse.com/security/cve/CVE-2018-7327/" source="CVE"/>
		<reference ref_id="CVE-2018-7328" ref_url="https://www.suse.com/security/cve/CVE-2018-7328/" source="CVE"/>
		<reference ref_id="CVE-2018-7329" ref_url="https://www.suse.com/security/cve/CVE-2018-7329/" source="CVE"/>
		<reference ref_id="CVE-2018-7330" ref_url="https://www.suse.com/security/cve/CVE-2018-7330/" source="CVE"/>
		<reference ref_id="CVE-2018-7331" ref_url="https://www.suse.com/security/cve/CVE-2018-7331/" source="CVE"/>
		<reference ref_id="CVE-2018-7332" ref_url="https://www.suse.com/security/cve/CVE-2018-7332/" source="CVE"/>
		<reference ref_id="CVE-2018-7333" ref_url="https://www.suse.com/security/cve/CVE-2018-7333/" source="CVE"/>
		<reference ref_id="CVE-2018-7334" ref_url="https://www.suse.com/security/cve/CVE-2018-7334/" source="CVE"/>
		<reference ref_id="CVE-2018-7335" ref_url="https://www.suse.com/security/cve/CVE-2018-7335/" source="CVE"/>
		<reference ref_id="CVE-2018-7336" ref_url="https://www.suse.com/security/cve/CVE-2018-7336/" source="CVE"/>
		<reference ref_id="CVE-2018-7337" ref_url="https://www.suse.com/security/cve/CVE-2018-7337/" source="CVE"/>
		<reference ref_id="CVE-2018-7417" ref_url="https://www.suse.com/security/cve/CVE-2018-7417/" source="CVE"/>
		<reference ref_id="CVE-2018-7418" ref_url="https://www.suse.com/security/cve/CVE-2018-7418/" source="CVE"/>
		<reference ref_id="CVE-2018-7419" ref_url="https://www.suse.com/security/cve/CVE-2018-7419/" source="CVE"/>
		<reference ref_id="CVE-2018-7420" ref_url="https://www.suse.com/security/cve/CVE-2018-7420/" source="CVE"/>
		<reference ref_id="CVE-2018-7421" ref_url="https://www.suse.com/security/cve/CVE-2018-7421/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Security issue fixed (bsc#1082692):

- CVE-2018-7335: The IEEE 802.11 dissector could crash (wnpa-sec-2018-05)
- CVE-2018-7321: thrift long dissector loop (dissect_thrift_map)
- CVE-2018-7322: DICOM: inifinite loop (dissect_dcm_tag)
- CVE-2018-7323: WCCP: very long loop (dissect_wccp2_alternate_mask_value_set_element)
- CVE-2018-7324: SCCP: infinite loop (dissect_sccp_optional_parameters)
- CVE-2018-7325: RPKI-Router Protocol: infinite loop (dissect_rpkirtr_pdu)
- CVE-2018-7326: LLTD: infinite loop (dissect_lltd_tlv)
- CVE-2018-7327: openflow_v6: infinite loop (dissect_openflow_bundle_control_v6)
- CVE-2018-7328: USB-DARWIN: long loop (dissect_darwin_usb_iso_transfer)
- CVE-2018-7329: S7COMM: infinite loop (s7comm_decode_ud_cpu_alarm_main)
- CVE-2018-7330: thread_meshcop: infinite loop (get_chancount)
- CVE-2018-7331: GTP: infinite loop (dissect_gprscdr_GGSNPDPRecord, dissect_ber_set)
- CVE-2018-7332: RELOAD: infinite loop (dissect_statans)
- CVE-2018-7333: RPCoRDMA: infinite loop in get_write_list_chunk_count
- CVE-2018-7421: Multiple dissectors could go into large infinite loops (wnpa-sec-2018-06)
- CVE-2018-7334: The UMTS MAC dissector could crash (wnpa-sec-2018-07)
- CVE-2018-7337: The DOCSIS dissector could crash (wnpa-sec-2018-08)
- CVE-2018-7336: The FCP dissector could crash (wnpa-sec-2018-09)
- CVE-2018-7320: The SIGCOMP dissector could crash (wnpa-sec-2018-10)
- CVE-2018-7420: The pcapng file parser could crash (wnpa-sec-2018-11)
- CVE-2018-7417: The IPMI dissector could crash (wnpa-sec-2018-12)
- CVE-2018-7418: The SIGCOMP dissector could crash (wnpa-sec-2018-13)
- CVE-2018-7419: The NBAP disssector could crash (wnpa-sec-2018-14)
- CVE-2017-17997: Misuse of NULL pointer in MRDISC dissector (bsc#1077080).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077080">SUSE bug 1077080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17997/">CVE-2017-17997 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17997">CVE-2017-17997 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7320/">CVE-2018-7320 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7320">CVE-2018-7320 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7321/">CVE-2018-7321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7321">CVE-2018-7321 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7322/">CVE-2018-7322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7322">CVE-2018-7322 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7323/">CVE-2018-7323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7323">CVE-2018-7323 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7324/">CVE-2018-7324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7324">CVE-2018-7324 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7325/">CVE-2018-7325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7325">CVE-2018-7325 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7326/">CVE-2018-7326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7326">CVE-2018-7326 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7327/">CVE-2018-7327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7327">CVE-2018-7327 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7328/">CVE-2018-7328 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7328">CVE-2018-7328 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7329/">CVE-2018-7329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7329">CVE-2018-7329 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7330/">CVE-2018-7330 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7330">CVE-2018-7330 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7331/">CVE-2018-7331 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7331">CVE-2018-7331 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7332/">CVE-2018-7332 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7332">CVE-2018-7332 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7333/">CVE-2018-7333 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7333">CVE-2018-7333 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7334/">CVE-2018-7334 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7334">CVE-2018-7334 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7335/">CVE-2018-7335 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7335">CVE-2018-7335 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7336/">CVE-2018-7336 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7336">CVE-2018-7336 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7337/">CVE-2018-7337 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7337">CVE-2018-7337 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7417/">CVE-2018-7417 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7417">CVE-2018-7417 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7418/">CVE-2018-7418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7418">CVE-2018-7418 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7419/">CVE-2018-7419 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7419">CVE-2018-7419 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7420/">CVE-2018-7420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7420">CVE-2018-7420 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7421/">CVE-2018-7421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7421">CVE-2018-7421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149689" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1051042" ref_url="https://bugzilla.suse.com/1051042" source="BUGZILLA"/>
		<reference ref_id="1053188" ref_url="https://bugzilla.suse.com/1053188" source="BUGZILLA"/>
		<reference ref_id="1063675" ref_url="https://bugzilla.suse.com/1063675" source="BUGZILLA"/>
		<reference ref_id="1064569" ref_url="https://bugzilla.suse.com/1064569" source="BUGZILLA"/>
		<reference ref_id="1064580" ref_url="https://bugzilla.suse.com/1064580" source="BUGZILLA"/>
		<reference ref_id="1064583" ref_url="https://bugzilla.suse.com/1064583" source="BUGZILLA"/>
		<reference ref_id="1070905" ref_url="https://bugzilla.suse.com/1070905" source="BUGZILLA"/>
		<reference ref_id="1071319" ref_url="https://bugzilla.suse.com/1071319" source="BUGZILLA"/>
		<reference ref_id="1073231" ref_url="https://bugzilla.suse.com/1073231" source="BUGZILLA"/>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000408" ref_url="https://www.suse.com/security/cve/CVE-2017-1000408/" source="CVE"/>
		<reference ref_id="CVE-2017-1000409" ref_url="https://www.suse.com/security/cve/CVE-2017-1000409/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<reference ref_id="CVE-2017-16997" ref_url="https://www.suse.com/security/cve/CVE-2017-16997/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003592.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- A privilege escalation bug in the realpath() function has been fixed.
  [CVE-2018-1000001, bsc#1074293]

- A memory leak and a buffer overflow in the dynamic ELF loader has been fixed.
  [CVE-2017-1000408, CVE-2017-1000409, bsc#1071319]

- An issue in the code handling RPATHs was fixed that could have been exploited
  by an attacker to execute code loaded from arbitrary libraries.
  [CVE-2017-16997, bsc#1073231]

- A potential crash caused by a use-after-free bug in pthread_create() has been
  fixed. [bsc#1053188]

- A bug that prevented users to build shared objects which use the optimized
  libmvec.so API has been fixed. [bsc#1070905]

- A memory leak in the glob() function has been fixed. [CVE-2017-15670,
  CVE-2017-15671, CVE-2017-15804, bsc#1064569, bsc#1064580, bsc#1064583]

- A bug that would lose the syscall error code value in case of crashes has
  been fixed. [bsc#1063675]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051042">SUSE bug 1051042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053188">SUSE bug 1053188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063675">SUSE bug 1063675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064569">SUSE bug 1064569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064580">SUSE bug 1064580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064583">SUSE bug 1064583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070905">SUSE bug 1070905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071319">SUSE bug 1071319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073231">SUSE bug 1073231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000408/">CVE-2017-1000408 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000408">CVE-2017-1000408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000409/">CVE-2017-1000409 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000409">CVE-2017-1000409 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15670">CVE-2017-15670 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15671">CVE-2017-15671 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15804">CVE-2017-15804 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16997/">CVE-2017-16997 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16997">CVE-2017-16997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000001">CVE-2018-1000001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550834" comment="glibc-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550835" comment="glibc-32bit-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550836" comment="glibc-devel-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550837" comment="glibc-devel-32bit-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533280" comment="glibc-html-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519059" comment="glibc-i18ndata-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533281" comment="glibc-info-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550838" comment="glibc-locale-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550839" comment="glibc-locale-32bit-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550840" comment="glibc-profile-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550841" comment="glibc-profile-32bit-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550842" comment="nscd-2.22-62.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149690" version="1" class="patch">
	<metadata>
		<title>Security update for librelp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1086730" ref_url="https://bugzilla.suse.com/1086730" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000140" ref_url="https://www.suse.com/security/cve/CVE-2018-1000140/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003845.html" source="SUSE-SU"/>
		<description>
This update for librelp fixes the following issues:
  CVE-2018-1000140 (bsc#1086730):
  librelp contained a stack-based buffer overflow in the checking of x509 certificates.
  A remote attacker with an access to the rsyslog logging facility could have exploited
  it by sending a specially crafted x509 certificate.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-27"/>
	<updated date="2018-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1086730">SUSE bug 1086730</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000140/">CVE-2018-1000140 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000140">CVE-2018-1000140 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553646" comment="librelp0-1.2.12-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149691" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1017711" ref_url="https://bugzilla.suse.com/1017711" source="BUGZILLA"/>
		<reference ref_id="1017712" ref_url="https://bugzilla.suse.com/1017712" source="BUGZILLA"/>
		<reference ref_id="1081493" ref_url="https://bugzilla.suse.com/1081493" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9941" ref_url="https://www.suse.com/security/cve/CVE-2016-9941/" source="CVE"/>
		<reference ref_id="CVE-2016-9942" ref_url="https://www.suse.com/security/cve/CVE-2016-9942/" source="CVE"/>
		<reference ref_id="CVE-2018-7225" ref_url="https://www.suse.com/security/cve/CVE-2018-7225/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003847.html" source="SUSE-SU"/>
		<description>

LibVNCServer was updated to fix two security issues.

These security issues were fixed:

- CVE-2018-7225: Missing input sanitization inside rfbserver.c rfbProcessClientNormalMessage() (bsc#1081493).
- CVE-2016-9942: Heap-based buffer overflow in ultra.c allowed remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message with the Ultra type tile, such that the LZO payload decompressed length exceeds what is specified by the tile dimensions (bsc#1017712).
- CVE-2016-9941: Heap-based buffer overflow in rfbproto.c allowed remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message containing a subrectangle outside of the client drawing area (bsc#1017711).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-27"/>
	<updated date="2018-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1017711">SUSE bug 1017711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017712">SUSE bug 1017712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081493">SUSE bug 1081493</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9941/">CVE-2016-9941 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9941">CVE-2016-9941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9942/">CVE-2016-9942 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9942">CVE-2016-9942 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7225/">CVE-2018-7225 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7225">CVE-2018-7225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550844" comment="libvncclient0-0.9.9-17.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550845" comment="libvncserver0-0.9.9-17.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149692" version="1" class="patch">
	<metadata>
		<title>Security update for memcached (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1056865" ref_url="https://bugzilla.suse.com/1056865" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9951" ref_url="https://www.suse.com/security/cve/CVE-2017-9951/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003853.html" source="SUSE-SU"/>
		<description>
This update for memcached fixes the following issues:

- CVE-2017-9951: Fixed heap-based buffer over-read in try_read_command function which allowed remote attackers to cause a denial of service attack (bsc#1056865).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056865">SUSE bug 1056865</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9951/">CVE-2017-9951 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9951">CVE-2017-9951 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550899" comment="memcached-1.4.39-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149693" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1057662" ref_url="https://bugzilla.suse.com/1057662" source="BUGZILLA"/>
		<reference ref_id="1081725" ref_url="https://bugzilla.suse.com/1081725" source="BUGZILLA"/>
		<reference ref_id="1083926" ref_url="https://bugzilla.suse.com/1083926" source="BUGZILLA"/>
		<reference ref_id="1083927" ref_url="https://bugzilla.suse.com/1083927" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729/" source="CVE"/>
		<reference ref_id="CVE-2018-5730" ref_url="https://www.suse.com/security/cve/CVE-2018-5730/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003856.html" source="SUSE-SU"/>
		<description>
This update for krb5 provides the following fixes:

Security issues fixed:

- CVE-2018-5730: DN container check bypass by supplying special crafted data (bsc#1083927).
- CVE-2018-5729: Null pointer dereference in kadmind or DN container check bypass by supplying special crafted data (bsc#1083926).

Non-security issues fixed:

- Make it possible for legacy applications (e.g. SAP Netweaver) to remain compatible with
  newer Kerberos. System administrators who are experiencing this kind of compatibility
  issues may set the environment variable GSSAPI_ASSUME_MECH_MATCH to a non-empty value,
  and make sure the environment variable is visible and effective to the application
  startup script. (bsc#1057662)
- Fix a GSS failure in legacy applications by not indicating deprecated GSS mechanisms in
  gss_indicate_mech() list. (bsc#1081725)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1057662">SUSE bug 1057662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081725">SUSE bug 1081725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083926">SUSE bug 1083926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083927">SUSE bug 1083927</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5729">CVE-2018-5729 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5730/">CVE-2018-5730 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5730">CVE-2018-5730 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550900" comment="krb5-1.12.5-40.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550901" comment="krb5-32bit-1.12.5-40.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550902" comment="krb5-client-1.12.5-40.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550903" comment="krb5-doc-1.12.5-40.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550904" comment="krb5-plugin-kdb-ldap-1.12.5-40.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550905" comment="krb5-plugin-preauth-otp-1.12.5-40.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550906" comment="krb5-plugin-preauth-pkinit-1.12.5-40.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550907" comment="krb5-server-1.12.5-40.23.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149694" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1085130" ref_url="https://bugzilla.suse.com/1085130" source="BUGZILLA"/>
		<reference ref_id="1085671" ref_url="https://bugzilla.suse.com/1085671" source="BUGZILLA"/>
		<reference ref_id="1087059" ref_url="https://bugzilla.suse.com/1087059" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5130" ref_url="https://www.suse.com/security/cve/CVE-2018-5130/" source="CVE"/>
		<reference ref_id="CVE-2018-5131" ref_url="https://www.suse.com/security/cve/CVE-2018-5131/" source="CVE"/>
		<reference ref_id="CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144/" source="CVE"/>
		<reference ref_id="CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="CVE-2018-5147" ref_url="https://www.suse.com/security/cve/CVE-2018-5147/" source="CVE"/>
		<reference ref_id="CVE-2018-5148" ref_url="https://www.suse.com/security/cve/CVE-2018-5148/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed in Firefox ESR 52.7.3 (bsc#1085130):

- CVE-2018-5125: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7
- CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList
- CVE-2018-5129: Out-of-bounds write with malformed IPC messages
- CVE-2018-5130: Mismatched RTP payload type can trigger memory corruption
- CVE-2018-5131: Fetch API improperly returns cached copies of no-store/no-cache resources
- CVE-2018-5144: Integer overflow during Unicode conversion
- CVE-2018-5145: Memory safety bugs fixed in Firefox ESR 52.7
- CVE-2018-5146: Out of bounds memory write in libvorbis (bsc#1085671)
- CVE-2018-5147: Out of bounds memory write in libtremor (bsc#1085671)
- CVE-2018-5148: Use-after-free in compositor (MFSA 2018-10) (bsc#1087059)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085671">SUSE bug 1085671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087059">SUSE bug 1087059</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5125">CVE-2018-5125 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5127">CVE-2018-5127 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5129">CVE-2018-5129 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5130/">CVE-2018-5130 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5130">CVE-2018-5130 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5131/">CVE-2018-5131 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5131">CVE-2018-5131 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5144">CVE-2018-5144 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5145">CVE-2018-5145 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5146">CVE-2018-5146 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5147/">CVE-2018-5147 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5147">CVE-2018-5147 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5148/">CVE-2018-5148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5148">CVE-2018-5148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550908" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550909" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149695" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1043290" ref_url="https://bugzilla.suse.com/1043290" source="BUGZILLA"/>
		<reference ref_id="1050087" ref_url="https://bugzilla.suse.com/1050087" source="BUGZILLA"/>
		<reference ref_id="1056434" ref_url="https://bugzilla.suse.com/1056434" source="BUGZILLA"/>
		<reference ref_id="1058630" ref_url="https://bugzilla.suse.com/1058630" source="BUGZILLA"/>
		<reference ref_id="1059735" ref_url="https://bugzilla.suse.com/1059735" source="BUGZILLA"/>
		<reference ref_id="1060382" ref_url="https://bugzilla.suse.com/1060382" source="BUGZILLA"/>
		<reference ref_id="1066168" ref_url="https://bugzilla.suse.com/1066168" source="BUGZILLA"/>
		<reference ref_id="1066170" ref_url="https://bugzilla.suse.com/1066170" source="BUGZILLA"/>
		<reference ref_id="1082283" ref_url="https://bugzilla.suse.com/1082283" source="BUGZILLA"/>
		<reference ref_id="1082291" ref_url="https://bugzilla.suse.com/1082291" source="BUGZILLA"/>
		<reference ref_id="1082348" ref_url="https://bugzilla.suse.com/1082348" source="BUGZILLA"/>
		<reference ref_id="1082362" ref_url="https://bugzilla.suse.com/1082362" source="BUGZILLA"/>
		<reference ref_id="1082792" ref_url="https://bugzilla.suse.com/1082792" source="BUGZILLA"/>
		<reference ref_id="1082837" ref_url="https://bugzilla.suse.com/1082837" source="BUGZILLA"/>
		<reference ref_id="1083628" ref_url="https://bugzilla.suse.com/1083628" source="BUGZILLA"/>
		<reference ref_id="1083634" ref_url="https://bugzilla.suse.com/1083634" source="BUGZILLA"/>
		<reference ref_id="1086011" ref_url="https://bugzilla.suse.com/1086011" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11524" ref_url="https://www.suse.com/security/cve/CVE-2017-11524/" source="CVE"/>
		<reference ref_id="CVE-2017-12692" ref_url="https://www.suse.com/security/cve/CVE-2017-12692/" source="CVE"/>
		<reference ref_id="CVE-2017-12693" ref_url="https://www.suse.com/security/cve/CVE-2017-12693/" source="CVE"/>
		<reference ref_id="CVE-2017-13768" ref_url="https://www.suse.com/security/cve/CVE-2017-13768/" source="CVE"/>
		<reference ref_id="CVE-2017-14314" ref_url="https://www.suse.com/security/cve/CVE-2017-14314/" source="CVE"/>
		<reference ref_id="CVE-2017-14505" ref_url="https://www.suse.com/security/cve/CVE-2017-14505/" source="CVE"/>
		<reference ref_id="CVE-2017-14739" ref_url="https://www.suse.com/security/cve/CVE-2017-14739/" source="CVE"/>
		<reference ref_id="CVE-2017-15016" ref_url="https://www.suse.com/security/cve/CVE-2017-15016/" source="CVE"/>
		<reference ref_id="CVE-2017-15017" ref_url="https://www.suse.com/security/cve/CVE-2017-15017/" source="CVE"/>
		<reference ref_id="CVE-2017-16352" ref_url="https://www.suse.com/security/cve/CVE-2017-16352/" source="CVE"/>
		<reference ref_id="CVE-2017-16353" ref_url="https://www.suse.com/security/cve/CVE-2017-16353/" source="CVE"/>
		<reference ref_id="CVE-2017-18209" ref_url="https://www.suse.com/security/cve/CVE-2017-18209/" source="CVE"/>
		<reference ref_id="CVE-2017-18211" ref_url="https://www.suse.com/security/cve/CVE-2017-18211/" source="CVE"/>
		<reference ref_id="CVE-2017-9500" ref_url="https://www.suse.com/security/cve/CVE-2017-9500/" source="CVE"/>
		<reference ref_id="CVE-2018-7443" ref_url="https://www.suse.com/security/cve/CVE-2018-7443/" source="CVE"/>
		<reference ref_id="CVE-2018-7470" ref_url="https://www.suse.com/security/cve/CVE-2018-7470/" source="CVE"/>
		<reference ref_id="CVE-2018-8804" ref_url="https://www.suse.com/security/cve/CVE-2018-8804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2018-8804: The WriteEPTImage function allowed remote attackers to cause a
  denial of service (double free and application crash) or possibly have
  unspecified other impact via a crafted file (bsc#1086011).
- CVE-2017-11524: The WriteBlob function allowed remote attackers to cause a
  denial of service (assertion failure and application exit) via a crafted file
  (bsc#1050087).
- CVE-2017-18209: Prevent NULL pointer dereference in the
  GetOpenCLCachedFilesDirectory function caused by a memory allocation result
  that was not checked, related to GetOpenCLCacheDirectory (bsc#1083628).
- CVE-2017-18211: Prevent NULL pointer dereference in the function
  saveBinaryCLProgram caused by a program-lookup result not being checked,
  related to CacheOpenCLKernel (bsc#1083634).
- CVE-2017-9500: Prevent assertion failure in the function
  ResetImageProfileIterator, which allowed attackers to cause a denial of service
  via a crafted file (bsc#1043290).
- CVE-2017-14739: The AcquireResampleFilterThreadSet function mishandled failed
  memory allocation, which allowed remote attackers to cause a denial of service
  (NULL Pointer Dereference in DistortImage in MagickCore/distort.c, and
  application crash) via unspecified vectors (bsc#1060382).
- CVE-2017-16353: Prevent memory information disclosure in the DescribeImage
  function caused by a heap-based buffer over-read. The portion of the code
  containing the vulnerability is responsible for printing the IPTC Profile
  information contained in the image. This vulnerability can be triggered with a
  specially crafted MIFF file. There is an out-of-bounds buffer dereference
  because certain increments were never checked (bsc#1066170).
- CVE-2017-16352: Prevent a heap-based buffer overflow in the 'Display visual
  image directory' feature of the DescribeImage() function. One possible way to
  trigger the vulnerability is to run the identify command on a specially crafted
  MIFF format file with the verbose flag (bsc#1066168).
- CVE-2017-14314: Prevent off-by-one error in the DrawImage function that
  allowed remote attackers to cause a denial of service (DrawDashPolygon
  heap-based buffer over-read and application crash) via a crafted file
  (bsc#1058630).
- CVE-2017-13768: Prevent NULL pointer dereference in the IdentifyImage
  function that allowed an attacker to perform denial of service by sending a
  crafted image file (bsc#1056434).
- CVE-2017-14505: Fixed handling of NULL arrays, which allowed attackers to
  perform Denial of Service (NULL pointer dereference and application crash in
  AcquireQuantumMemory within MagickCore/memory.c) by providing a crafted Image
  File as input (bsc#1059735).
- CVE-2018-7470: The IsWEBPImageLossless function allowed attackers to cause a
  denial of service (segmentation violation) via a crafted file (bsc#1082837).
- CVE-2018-7443: The ReadTIFFImage function did not properly validate the
  amount of image data in a file, which allowed remote attackers to cause a
  denial of service (memory allocation failure in the AcquireMagickMemory
  function in MagickCore/memory.c) (bsc#1082792).
- CVE-2017-15016: Prevent NULL pointer dereference vulnerability in
  ReadEnhMetaFile allowing for denial of service (bsc#1082291).
- CVE-2017-15017: Prevent NULL pointer dereference vulnerability in
  ReadOneMNGImage allowing for denial of service (bsc#1082283).
- CVE-2017-12692: The ReadVIFFImage function allowed remote attackers to cause
  a denial of service (memory consumption) via a crafted VIFF file (bsc#1082362).
- CVE-2017-12693: The ReadBMPImage function allowed remote attackers to cause a
  denial of service (memory consumption) via a crafted BMP file (bsc#1082348).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043290">SUSE bug 1043290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050087">SUSE bug 1050087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056434">SUSE bug 1056434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058630">SUSE bug 1058630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059735">SUSE bug 1059735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060382">SUSE bug 1060382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066168">SUSE bug 1066168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066170">SUSE bug 1066170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082283">SUSE bug 1082283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082291">SUSE bug 1082291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082348">SUSE bug 1082348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082362">SUSE bug 1082362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082792">SUSE bug 1082792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082837">SUSE bug 1082837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083628">SUSE bug 1083628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083634">SUSE bug 1083634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086011">SUSE bug 1086011</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11524/">CVE-2017-11524 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11524">CVE-2017-11524 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12692/">CVE-2017-12692 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12692">CVE-2017-12692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12693/">CVE-2017-12693 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12693">CVE-2017-12693 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13768/">CVE-2017-13768 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13768">CVE-2017-13768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14314/">CVE-2017-14314 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14314">CVE-2017-14314 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14505/">CVE-2017-14505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14505">CVE-2017-14505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14739/">CVE-2017-14739 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14739">CVE-2017-14739 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15016/">CVE-2017-15016 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15016">CVE-2017-15016 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15017/">CVE-2017-15017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15017">CVE-2017-15017 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16352/">CVE-2017-16352 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16352">CVE-2017-16352 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16353/">CVE-2017-16353 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16353">CVE-2017-16353 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18209/">CVE-2017-18209 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18209">CVE-2017-18209 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18211/">CVE-2017-18211 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18211">CVE-2017-18211 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9500/">CVE-2017-9500 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9500">CVE-2017-9500 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7443/">CVE-2018-7443 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7443">CVE-2018-7443 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7470/">CVE-2018-7470 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7470">CVE-2018-7470 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8804/">CVE-2018-8804 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8804">CVE-2018-8804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550910" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550911" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149696" version="1" class="patch">
	<metadata>
		<title>Security update for graphite2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1084850" ref_url="https://bugzilla.suse.com/1084850" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7999" ref_url="https://www.suse.com/security/cve/CVE-2018-7999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003860.html" source="SUSE-SU"/>
		<description>
This update for graphite2 fixes the following issues:

- CVE-2018-7999: Fixed a NULL pointer dereference vulnerability in Segment.cpp that may cause a denial of serivce (bsc#1084850).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1084850">SUSE bug 1084850</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7999/">CVE-2018-7999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7999">CVE-2018-7999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550912" comment="libgraphite2-3-1.3.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550913" comment="libgraphite2-3-32bit-1.3.1-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149697" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1017690" ref_url="https://bugzilla.suse.com/1017690" source="BUGZILLA"/>
		<reference ref_id="1069213" ref_url="https://bugzilla.suse.com/1069213" source="BUGZILLA"/>
		<reference ref_id="960341" ref_url="https://bugzilla.suse.com/960341" source="BUGZILLA"/>
		<reference ref_id="969783" ref_url="https://bugzilla.suse.com/969783" source="BUGZILLA"/>
		<reference ref_id="983436" ref_url="https://bugzilla.suse.com/983436" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2017-16232" ref_url="https://www.suse.com/security/cve/CVE-2017-16232/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003591.html" source="SUSE-SU"/>
		<description>
This update for tiff to version 4.0.9 fixes the following issues:

Security issues fixed:

- CVE-2014-8128: Fix out-of-bounds read with malformed TIFF image in multiple tools (bsc#969783).
- CVE-2015-7554: Fix invalid write in tiffsplit / _TIFFVGetField (bsc#960341).
- CVE-2016-10095: Fix stack-based buffer overflow in _TIFFVGetField (tif_dir.c) (bsc#1017690).
- CVE-2016-5318: Fix stackoverflow in thumbnail (bsc#983436).
- CVE-2017-16232: Fix memory-based DoS in tiff2bw (bsc#1069213).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069213">SUSE bug 1069213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969783">SUSE bug 969783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8128">CVE-2014-8128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7554">CVE-2015-7554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10095">CVE-2016-10095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5318">CVE-2016-5318 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16232/">CVE-2017-16232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16232">CVE-2017-16232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550933" comment="libtiff5-4.0.9-44.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550934" comment="libtiff5-32bit-4.0.9-44.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550935" comment="tiff-4.0.9-44.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149698" version="1" class="patch">
	<metadata>
		<title>Security update for spice-gtk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1085415" ref_url="https://bugzilla.suse.com/1085415" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12194" ref_url="https://www.suse.com/security/cve/CVE-2017-12194/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003873.html" source="SUSE-SU"/>
		<description>
This update for spice-gtk fixes the following issues:

- CVE-2017-12194: A flaw was found in the way spice-client processed certain messages sent from the server. An attacker, having control of malicious spice-server, could use this flaw to crash the client or execute arbitrary code with permissions of the user running the client. spice-gtk versions through 0.34 are believed to be vulnerable. (bsc#1085415)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085415">SUSE bug 1085415</bugzilla>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12194/">CVE-2017-12194 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12194">CVE-2017-12194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553647" comment="libspice-client-glib-2_0-8-0.33-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553648" comment="libspice-client-glib-helper-0.33-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553649" comment="libspice-client-gtk-3_0-5-0.33-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553650" comment="libspice-controller0-0.33-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553651" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541885" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149699" version="1" class="patch">
	<metadata>
		<title>Security update for libidn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1056450" ref_url="https://bugzilla.suse.com/1056450" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14062" ref_url="https://www.suse.com/security/cve/CVE-2017-14062/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003874.html" source="SUSE-SU"/>
		<description>
This update for libidn fixes one issues.

This security issue was fixed:

- CVE-2017-14062: Prevent integer overflow in the decode_digit function that
  allowed remote attackers to cause a denial of service or possibly have
  unspecified other impact (bsc#1056450).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056450">SUSE bug 1056450</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14062/">CVE-2017-14062 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14062">CVE-2017-14062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553652" comment="libidn-tools-1.28-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553653" comment="libidn11-1.28-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553654" comment="libidn11-32bit-1.28-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149700" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1049305" ref_url="https://bugzilla.suse.com/1049305" source="BUGZILLA"/>
		<reference ref_id="1049306" ref_url="https://bugzilla.suse.com/1049306" source="BUGZILLA"/>
		<reference ref_id="1049307" ref_url="https://bugzilla.suse.com/1049307" source="BUGZILLA"/>
		<reference ref_id="1049309" ref_url="https://bugzilla.suse.com/1049309" source="BUGZILLA"/>
		<reference ref_id="1049310" ref_url="https://bugzilla.suse.com/1049310" source="BUGZILLA"/>
		<reference ref_id="1049311" ref_url="https://bugzilla.suse.com/1049311" source="BUGZILLA"/>
		<reference ref_id="1049312" ref_url="https://bugzilla.suse.com/1049312" source="BUGZILLA"/>
		<reference ref_id="1049313" ref_url="https://bugzilla.suse.com/1049313" source="BUGZILLA"/>
		<reference ref_id="1049314" ref_url="https://bugzilla.suse.com/1049314" source="BUGZILLA"/>
		<reference ref_id="1049315" ref_url="https://bugzilla.suse.com/1049315" source="BUGZILLA"/>
		<reference ref_id="1049316" ref_url="https://bugzilla.suse.com/1049316" source="BUGZILLA"/>
		<reference ref_id="1049317" ref_url="https://bugzilla.suse.com/1049317" source="BUGZILLA"/>
		<reference ref_id="1049318" ref_url="https://bugzilla.suse.com/1049318" source="BUGZILLA"/>
		<reference ref_id="1049319" ref_url="https://bugzilla.suse.com/1049319" source="BUGZILLA"/>
		<reference ref_id="1049320" ref_url="https://bugzilla.suse.com/1049320" source="BUGZILLA"/>
		<reference ref_id="1049321" ref_url="https://bugzilla.suse.com/1049321" source="BUGZILLA"/>
		<reference ref_id="1049322" ref_url="https://bugzilla.suse.com/1049322" source="BUGZILLA"/>
		<reference ref_id="1049323" ref_url="https://bugzilla.suse.com/1049323" source="BUGZILLA"/>
		<reference ref_id="1049324" ref_url="https://bugzilla.suse.com/1049324" source="BUGZILLA"/>
		<reference ref_id="1049325" ref_url="https://bugzilla.suse.com/1049325" source="BUGZILLA"/>
		<reference ref_id="1049326" ref_url="https://bugzilla.suse.com/1049326" source="BUGZILLA"/>
		<reference ref_id="1049327" ref_url="https://bugzilla.suse.com/1049327" source="BUGZILLA"/>
		<reference ref_id="1049328" ref_url="https://bugzilla.suse.com/1049328" source="BUGZILLA"/>
		<reference ref_id="1049329" ref_url="https://bugzilla.suse.com/1049329" source="BUGZILLA"/>
		<reference ref_id="1049330" ref_url="https://bugzilla.suse.com/1049330" source="BUGZILLA"/>
		<reference ref_id="1049331" ref_url="https://bugzilla.suse.com/1049331" source="BUGZILLA"/>
		<reference ref_id="1049332" ref_url="https://bugzilla.suse.com/1049332" source="BUGZILLA"/>
		<reference ref_id="1052318" ref_url="https://bugzilla.suse.com/1052318" source="BUGZILLA"/>
		<reference ref_id="1064071" ref_url="https://bugzilla.suse.com/1064071" source="BUGZILLA"/>
		<reference ref_id="1064072" ref_url="https://bugzilla.suse.com/1064072" source="BUGZILLA"/>
		<reference ref_id="1064073" ref_url="https://bugzilla.suse.com/1064073" source="BUGZILLA"/>
		<reference ref_id="1064075" ref_url="https://bugzilla.suse.com/1064075" source="BUGZILLA"/>
		<reference ref_id="1064077" ref_url="https://bugzilla.suse.com/1064077" source="BUGZILLA"/>
		<reference ref_id="1064078" ref_url="https://bugzilla.suse.com/1064078" source="BUGZILLA"/>
		<reference ref_id="1064079" ref_url="https://bugzilla.suse.com/1064079" source="BUGZILLA"/>
		<reference ref_id="1064080" ref_url="https://bugzilla.suse.com/1064080" source="BUGZILLA"/>
		<reference ref_id="1064081" ref_url="https://bugzilla.suse.com/1064081" source="BUGZILLA"/>
		<reference ref_id="1064082" ref_url="https://bugzilla.suse.com/1064082" source="BUGZILLA"/>
		<reference ref_id="1064083" ref_url="https://bugzilla.suse.com/1064083" source="BUGZILLA"/>
		<reference ref_id="1064084" ref_url="https://bugzilla.suse.com/1064084" source="BUGZILLA"/>
		<reference ref_id="1064085" ref_url="https://bugzilla.suse.com/1064085" source="BUGZILLA"/>
		<reference ref_id="1064086" ref_url="https://bugzilla.suse.com/1064086" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10086" ref_url="https://www.suse.com/security/cve/CVE-2017-10086/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10114" ref_url="https://www.suse.com/security/cve/CVE-2017-10114/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10118" ref_url="https://www.suse.com/security/cve/CVE-2017-10118/" source="CVE"/>
		<reference ref_id="CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125/" source="CVE"/>
		<reference ref_id="CVE-2017-10135" ref_url="https://www.suse.com/security/cve/CVE-2017-10135/" source="CVE"/>
		<reference ref_id="CVE-2017-10176" ref_url="https://www.suse.com/security/cve/CVE-2017-10176/" source="CVE"/>
		<reference ref_id="CVE-2017-10193" ref_url="https://www.suse.com/security/cve/CVE-2017-10193/" source="CVE"/>
		<reference ref_id="CVE-2017-10198" ref_url="https://www.suse.com/security/cve/CVE-2017-10198/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<reference ref_id="CVE-2017-10274" ref_url="https://www.suse.com/security/cve/CVE-2017-10274/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Security issues fixed:

- CVE-2017-10356: Fix issue inside subcomponent Security (bsc#1064084).
- CVE-2017-10274: Fix issue inside subcomponent Smart Card IO (bsc#1064071).
- CVE-2017-10281: Fix issue inside subcomponent Serialization (bsc#1064072).
- CVE-2017-10285: Fix issue inside subcomponent RMI (bsc#1064073).
- CVE-2017-10295: Fix issue inside subcomponent Networking (bsc#1064075).
- CVE-2017-10388: Fix issue inside subcomponent Libraries (bsc#1064086).
- CVE-2017-10346: Fix issue inside subcomponent Hotspot (bsc#1064078).
- CVE-2017-10350: Fix issue inside subcomponent JAX-WS (bsc#1064082).
- CVE-2017-10347: Fix issue inside subcomponent Serialization (bsc#1064079).
- CVE-2017-10349: Fix issue inside subcomponent JAXP (bsc#1064081).
- CVE-2017-10345: Fix issue inside subcomponent Serialization (bsc#1064077).
- CVE-2017-10348: Fix issue inside subcomponent Libraries (bsc#1064080).
- CVE-2017-10357: Fix issue inside subcomponent Serialization (bsc#1064085).
- CVE-2017-10355: Fix issue inside subcomponent Networking (bsc#1064083).
- CVE-2017-10102: Fix incorrect handling of references in DGC (bsc#1049316).
- CVE-2017-10053: Fix reading of unprocessed image data in JPEGImageReader (bsc#1049305).
- CVE-2017-10067: Fix JAR verifier incorrect handling of missing digest (bsc#1049306).
- CVE-2017-10081: Fix incorrect bracket processing in function signature handling (bsc#1049309).
- CVE-2017-10087: Fix insufficient access control checks in ThreadPoolExecutor (bsc#1049311).
- CVE-2017-10089: Fix insufficient access control checks in ServiceRegistry (bsc#1049312).
- CVE-2017-10090: Fix insufficient access control checks in AsynchronousChannelGroupImpl (bsc#1049313).
- CVE-2017-10096: Fix insufficient access control checks in XML transformations (bsc#1049314).
- CVE-2017-10101: Fix unrestricted access to com.sun.org.apache.xml.internal.resolver (bsc#1049315).
- CVE-2017-10107: Fix insufficient access control checks in ActivationID (bsc#1049318).
- CVE-2017-10074: Fix integer overflows in range check loop predicates (bsc#1049307).
- CVE-2017-10110: Fix insufficient access control checks in ImageWatched (bsc#1049321).
- CVE-2017-10108: Fix unbounded memory allocation in BasicAttribute deserialization (bsc#1049319).
- CVE-2017-10109: Fix unbounded memory allocation in CodeSource deserialization (bsc#1049320).
- CVE-2017-10115: Fix unspecified vulnerability in subcomponent JCE (bsc#1049324).
- CVE-2017-10118: Fix ECDSA implementation timing attack (bsc#1049326).
- CVE-2017-10116: Fix LDAPCertStore following referrals to non-LDAP URL (bsc#1049325).
- CVE-2017-10135: Fix PKCS#8 implementation timing attack (bsc#1049328).
- CVE-2017-10176: Fix incorrect handling of certain EC points (bsc#1049329).
- CVE-2017-10074: Fix integer overflows in range check loop predicates (bsc#1049307).
- CVE-2017-10074: Fix integer overflows in range check loop predicates (bsc#1049307).
- CVE-2017-10111: Fix checks in LambdaFormEditor (bsc#1049322).
- CVE-2017-10243: Fix unspecified vulnerability in subcomponent JAX-WS (bsc#1049332).
- CVE-2017-10125: Fix unspecified vulnerability in subcomponent deployment (bsc#1049327).
- CVE-2017-10114: Fix unspecified vulnerability in subcomponent JavaFX (bsc#1049323).
- CVE-2017-10105: Fix unspecified vulnerability in subcomponent deployment (bsc#1049317).
- CVE-2017-10086: Fix unspecified in subcomponent JavaFX (bsc#1049310).
- CVE-2017-10198: Fix incorrect enforcement of certificate path restrictions (bsc#1049331).
- CVE-2017-10193: Fix incorrect key size constraint check (bsc#1049330).

Bug fixes:

- Drop Exec Shield workaround to fix crashes on recent kernels, where Exec Shield is gone (bsc#1052318).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-03"/>
	<updated date="2018-01-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1049305">SUSE bug 1049305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049306">SUSE bug 1049306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049307">SUSE bug 1049307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049309">SUSE bug 1049309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049310">SUSE bug 1049310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049311">SUSE bug 1049311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049312">SUSE bug 1049312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049313">SUSE bug 1049313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049314">SUSE bug 1049314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049315">SUSE bug 1049315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049316">SUSE bug 1049316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049317">SUSE bug 1049317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049318">SUSE bug 1049318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049319">SUSE bug 1049319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049320">SUSE bug 1049320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049321">SUSE bug 1049321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049322">SUSE bug 1049322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049323">SUSE bug 1049323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049324">SUSE bug 1049324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049325">SUSE bug 1049325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049326">SUSE bug 1049326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049327">SUSE bug 1049327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049328">SUSE bug 1049328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049329">SUSE bug 1049329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049330">SUSE bug 1049330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049331">SUSE bug 1049331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049332">SUSE bug 1049332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052318">SUSE bug 1052318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064071">SUSE bug 1064071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064072">SUSE bug 1064072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064073">SUSE bug 1064073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064075">SUSE bug 1064075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064077">SUSE bug 1064077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064078">SUSE bug 1064078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064079">SUSE bug 1064079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064080">SUSE bug 1064080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064081">SUSE bug 1064081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064082">SUSE bug 1064082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064083">SUSE bug 1064083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064084">SUSE bug 1064084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064085">SUSE bug 1064085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064086">SUSE bug 1064086</bugzilla>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10165">CVE-2016-10165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9840">CVE-2016-9840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9841">CVE-2016-9841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9842">CVE-2016-9842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10053">CVE-2017-10053 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10067">CVE-2017-10067 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10074">CVE-2017-10074 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10081">CVE-2017-10081 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10086/">CVE-2017-10086 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10086">CVE-2017-10086 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10087">CVE-2017-10087 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10089">CVE-2017-10089 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10090">CVE-2017-10090 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10096">CVE-2017-10096 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10101">CVE-2017-10101 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10102">CVE-2017-10102 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10105">CVE-2017-10105 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10107">CVE-2017-10107 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10108">CVE-2017-10108 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10109">CVE-2017-10109 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10110">CVE-2017-10110 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10111">CVE-2017-10111 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10114/">CVE-2017-10114 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10114">CVE-2017-10114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10115">CVE-2017-10115 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10116">CVE-2017-10116 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10118/">CVE-2017-10118 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10118">CVE-2017-10118 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10125">CVE-2017-10125 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10135/">CVE-2017-10135 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10135">CVE-2017-10135 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10176/">CVE-2017-10176 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10176">CVE-2017-10176 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10193/">CVE-2017-10193 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10193">CVE-2017-10193 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10198/">CVE-2017-10198 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10198">CVE-2017-10198 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10243">CVE-2017-10243 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10274/">CVE-2017-10274 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10274">CVE-2017-10274 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10281">CVE-2017-10281 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10285">CVE-2017-10285 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10295">CVE-2017-10295 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10345">CVE-2017-10345 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10346">CVE-2017-10346 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10347">CVE-2017-10347 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10348">CVE-2017-10348 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10349">CVE-2017-10349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10350">CVE-2017-10350 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10355">CVE-2017-10355 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10356">CVE-2017-10356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10357">CVE-2017-10357 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10388">CVE-2017-10388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149701" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1054986" ref_url="https://bugzilla.suse.com/1054986" source="BUGZILLA"/>
		<reference ref_id="1067018" ref_url="https://bugzilla.suse.com/1067018" source="BUGZILLA"/>
		<reference ref_id="1070615" ref_url="https://bugzilla.suse.com/1070615" source="BUGZILLA"/>
		<reference ref_id="1079869" ref_url="https://bugzilla.suse.com/1079869" source="BUGZILLA"/>
		<reference ref_id="1080042" ref_url="https://bugzilla.suse.com/1080042" source="BUGZILLA"/>
		<reference ref_id="1082041" ref_url="https://bugzilla.suse.com/1082041" source="BUGZILLA"/>
		<reference ref_id="1082161" ref_url="https://bugzilla.suse.com/1082161" source="BUGZILLA"/>
		<reference ref_id="1083625" ref_url="https://bugzilla.suse.com/1083625" source="BUGZILLA"/>
		<reference ref_id="1085757" ref_url="https://bugzilla.suse.com/1085757" source="BUGZILLA"/>
		<reference ref_id="1086038" ref_url="https://bugzilla.suse.com/1086038" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1064" ref_url="https://www.suse.com/security/cve/CVE-2018-1064/" source="CVE"/>
		<reference ref_id="CVE-2018-6764" ref_url="https://www.suse.com/security/cve/CVE-2018-6764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003885.html" source="SUSE-SU"/>
		<description>
This update for libvirt and virt-manager fixes the following issues:

Security issues fixed:

- CVE-2017-5715: Fixes for speculative side channel attacks aka 'SpectreAttack' (var2) (bsc#1079869).
- CVE-2018-6764: Fixed guest executable code injection via libnss_dns.so loaded by libvirt_lxc before init (bsc#1080042).
- CVE-2018-1064: Fixed denial of service when reading from guest agent (bsc#1083625).


Non-security issues fixed in libvirt:

- bsc#1070615: Fixed TPM device passthrough failure on kernels &gt;= 4.0.
- bsc#1082041: SUSE Linux Enterprise 11 SP4 hvm converted to pvhvm. Unless vm memory is on gig boundary, vm won't boot.
- bsc#1082161: Unable to change RTC basis or adjustment for Xen HVM guests using libvirt.

Non-security issues fixed in virt-manager:

- bsc#1086038: VM guests cannot be properly installed with virt-install
- bsc#1067018: KVM Guest creation failed - Property .cmt not found
- bsc#1054986: Fix openSUSE 15.0 detection. It has no content file or .treeinfo file
- bsc#1085757: Fallback to latest version of openSUSE when opensuse-unknown is detected for the ISO

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-11"/>
	<updated date="2018-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1054986">SUSE bug 1054986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067018">SUSE bug 1067018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070615">SUSE bug 1070615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079869">SUSE bug 1079869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080042">SUSE bug 1080042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082041">SUSE bug 1082041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082161">SUSE bug 1082161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083625">SUSE bug 1083625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085757">SUSE bug 1085757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086038">SUSE bug 1086038</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1064/">CVE-2018-1064 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1064">CVE-2018-1064 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6764/">CVE-2018-6764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6764">CVE-2018-6764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553655" comment="libvirt-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553656" comment="libvirt-admin-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553657" comment="libvirt-client-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553658" comment="libvirt-daemon-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553659" comment="libvirt-daemon-config-network-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553660" comment="libvirt-daemon-config-nwfilter-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553661" comment="libvirt-daemon-driver-interface-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520610" comment="libvirt-daemon-driver-libxl-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553662" comment="libvirt-daemon-driver-lxc-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553663" comment="libvirt-daemon-driver-network-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553664" comment="libvirt-daemon-driver-nodedev-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553665" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553666" comment="libvirt-daemon-driver-qemu-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553667" comment="libvirt-daemon-driver-secret-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553668" comment="libvirt-daemon-driver-storage-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553669" comment="libvirt-daemon-driver-storage-core-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553670" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553671" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553672" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553673" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553674" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553675" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553676" comment="libvirt-daemon-hooks-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553677" comment="libvirt-daemon-lxc-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553678" comment="libvirt-daemon-qemu-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520627" comment="libvirt-daemon-xen-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553679" comment="libvirt-doc-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553680" comment="libvirt-libs-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553681" comment="libvirt-lock-sanlock-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553682" comment="libvirt-nss-3.3.0-5.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520630" comment="virt-install-1.4.1-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520631" comment="virt-manager-1.4.1-5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520632" comment="virt-manager-common-1.4.1-5.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149702" version="1" class="patch">
	<metadata>
		<title>Security update for policycoreutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1083624" ref_url="https://bugzilla.suse.com/1083624" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1063" ref_url="https://www.suse.com/security/cve/CVE-2018-1063/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003887.html" source="SUSE-SU"/>
		<description>
This update for policycoreutils fixes the following issues:

- CVE-2018-1063: Fixed problem to prevent chcon from following symlinks in /tmp, /var/tmp, /var/run and /var/lib/debug (bsc#1083624).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-11"/>
	<updated date="2018-04-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083624">SUSE bug 1083624</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1063/">CVE-2018-1063 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1063">CVE-2018-1063 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550946" comment="policycoreutils-2.5-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550947" comment="policycoreutils-python-2.5-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149703" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1087102" ref_url="https://bugzilla.suse.com/1087102" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003886.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

    - CVE-2018-0739: Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) 
    could eventually exceed the stack given malicious input with excessive recursion. This could result 
    in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from 
    untrusted sources so this is considered safe. (bsc#1087102).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-11"/>
	<updated date="2018-04-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739">CVE-2018-0739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009541426" comment="libopenssl-devel-1.0.2j-60.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550948" comment="libopenssl1_0_0-1.0.2j-60.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550949" comment="libopenssl1_0_0-32bit-1.0.2j-60.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550950" comment="libopenssl1_0_0-hmac-1.0.2j-60.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550951" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550952" comment="openssl-1.0.2j-60.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533365" comment="openssl-doc-1.0.2j-60.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149704" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1083507" ref_url="https://bugzilla.suse.com/1083507" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003890.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Security issue fixed:

- CVE-2017-18207: Fixed possible denial of service vulnerability by adding a check to Lib/wave.py that verifies that at least one channel is provided (bsc#1083507).

Bug fixes:

- Require python-Sphinx-latex for building on Leap 42.3 or newer.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-12"/>
	<updated date="2018-04-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083507">SUSE bug 1083507</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18207">CVE-2017-18207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009527884" comment="libpython3_4m1_0-3.4.6-25.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009527885" comment="python3-3.4.6-25.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009527886" comment="python3-base-3.4.6-25.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553683" comment="python3-curses-3.4.6-25.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149705" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1070046" ref_url="https://bugzilla.suse.com/1070046" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000159" ref_url="https://www.suse.com/security/cve/CVE-2017-1000159/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003891.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issues:

- CVE-2017-1000159: Command injection in evince via filename when printing to PDF could lead to command execution (bsc#1070046)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-16"/>
	<updated date="2018-04-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1070046">SUSE bug 1070046</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000159/">CVE-2017-1000159 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000159">CVE-2017-1000159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553684" comment="evince-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553685" comment="evince-browser-plugin-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520640" comment="evince-lang-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553686" comment="evince-plugin-djvudocument-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553687" comment="evince-plugin-dvidocument-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553688" comment="evince-plugin-pdfdocument-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553689" comment="evince-plugin-psdocument-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553690" comment="evince-plugin-tiffdocument-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553691" comment="evince-plugin-xpsdocument-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553692" comment="libevdocument3-4-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553693" comment="libevview3-3-3.20.2-6.22.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553694" comment="nautilus-evince-3.20.2-6.22.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149706" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1039034" ref_url="https://bugzilla.suse.com/1039034" source="BUGZILLA"/>
		<reference ref_id="1049399" ref_url="https://bugzilla.suse.com/1049399" source="BUGZILLA"/>
		<reference ref_id="1049404" ref_url="https://bugzilla.suse.com/1049404" source="BUGZILLA"/>
		<reference ref_id="1049417" ref_url="https://bugzilla.suse.com/1049417" source="BUGZILLA"/>
		<reference ref_id="1054591" ref_url="https://bugzilla.suse.com/1054591" source="BUGZILLA"/>
		<reference ref_id="1072665" ref_url="https://bugzilla.suse.com/1072665" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3636" ref_url="https://www.suse.com/security/cve/CVE-2017-3636/" source="CVE"/>
		<reference ref_id="CVE-2017-3641" ref_url="https://www.suse.com/security/cve/CVE-2017-3641/" source="CVE"/>
		<reference ref_id="CVE-2017-3653" ref_url="https://www.suse.com/security/cve/CVE-2017-3653/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003596.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes several issues.

These security issues were fixed:

- CVE-2017-3636: Client programs had an unspecified vulnerability that could
  lead to unauthorized access and denial of service (bsc#1049399)
- CVE-2017-3641: DDL unspecified vulnerability could lead to denial of service
  (bsc#1049404)
- CVE-2017-3653: DML Unspecified vulnerability could lead to unauthorized
  database access (bsc#1049417)

This non-security issues was fixed:

- Add ODBC support for Connect engine (bsc#1039034)
- Relax required version for mariadb-errormessages (bsc#1072665)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039034">SUSE bug 1039034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049399">SUSE bug 1049399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049404">SUSE bug 1049404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049417">SUSE bug 1049417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054591">SUSE bug 1054591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072665">SUSE bug 1072665</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-3636/">CVE-2017-3636 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3636">CVE-2017-3636 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3641/">CVE-2017-3641 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3641">CVE-2017-3641 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3653/">CVE-2017-3653 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3653">CVE-2017-3653 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550956" comment="libmysqlclient18-10.0.32-29.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550957" comment="libmysqlclient18-32bit-10.0.32-29.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550958" comment="mariadb-10.0.32-29.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550959" comment="mariadb-client-10.0.32-29.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550960" comment="mariadb-errormessages-10.0.32-29.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550961" comment="mariadb-tools-10.0.32-29.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149707" version="1" class="patch">
	<metadata>
		<title>Security update for memcached (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1077718" ref_url="https://bugzilla.suse.com/1077718" source="BUGZILLA"/>
		<reference ref_id="1083903" ref_url="https://bugzilla.suse.com/1083903" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000115" ref_url="https://www.suse.com/security/cve/CVE-2018-1000115/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003893.html" source="SUSE-SU"/>
		<description>
This update for memcached fixes the following issues:

- CVE-2018-1000115: Insufficient Control of Network Message Volume (Network Amplification, CWE-406) vulnerability 
in the UDP support of the memcached server could result in denial of service via network flood 
(traffic amplification of 1:50,000 has been reported by reliable sources). (bsc#1083903)

- Home directory shouldn't be world readable bsc#1077718
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-16"/>
	<updated date="2018-04-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077718">SUSE bug 1077718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083903">SUSE bug 1083903</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000115/">CVE-2018-1000115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000115">CVE-2018-1000115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553695" comment="memcached-1.4.39-4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149708" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1077445" ref_url="https://bugzilla.suse.com/1077445" source="BUGZILLA"/>
		<reference ref_id="1082063" ref_url="https://bugzilla.suse.com/1082063" source="BUGZILLA"/>
		<reference ref_id="1082210" ref_url="https://bugzilla.suse.com/1082210" source="BUGZILLA"/>
		<reference ref_id="1083417" ref_url="https://bugzilla.suse.com/1083417" source="BUGZILLA"/>
		<reference ref_id="1083420" ref_url="https://bugzilla.suse.com/1083420" source="BUGZILLA"/>
		<reference ref_id="1083422" ref_url="https://bugzilla.suse.com/1083422" source="BUGZILLA"/>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1083426" ref_url="https://bugzilla.suse.com/1083426" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="CVE-2018-7182" ref_url="https://www.suse.com/security/cve/CVE-2018-7182/" source="CVE"/>
		<reference ref_id="CVE-2018-7183" ref_url="https://www.suse.com/security/cve/CVE-2018-7183/" source="CVE"/>
		<reference ref_id="CVE-2018-7184" ref_url="https://www.suse.com/security/cve/CVE-2018-7184/" source="CVE"/>
		<reference ref_id="CVE-2018-7185" ref_url="https://www.suse.com/security/cve/CVE-2018-7185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003894.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

- Update to 4.2.8p11 (bsc#1082210):
  * CVE-2016-1549: Sybil vulnerability: ephemeral association
    attack. While fixed in ntp-4.2.8p7, there are significant
    additional protections for this issue in 4.2.8p11.
  * CVE-2018-7182: ctl_getitem(): buffer read overrun
    leads to undefined behavior and information leak. (bsc#1083426)
  * CVE-2018-7170: Multiple authenticated ephemeral
    associations. (bsc#1083424)
  * CVE-2018-7184: Interleaved symmetric mode cannot
    recover from bad state. (bsc#1083422)
  * CVE-2018-7185: Unauthenticated packet can reset
    authenticated interleaved association. (bsc#1083420)
  * CVE-2018-7183: ntpq:decodearr() can write beyond its
    buffer limit.(bsc#1083417)
- Don't use libevent's cached time stamps in sntp. (bsc#1077445)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-16"/>
	<updated date="2018-04-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077445">SUSE bug 1077445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082063">SUSE bug 1082063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083417">SUSE bug 1083417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083420">SUSE bug 1083420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083422">SUSE bug 1083422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083426">SUSE bug 1083426</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1549">CVE-2016-1549 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7170">CVE-2018-7170 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7182/">CVE-2018-7182 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7182">CVE-2018-7182 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-7183/">CVE-2018-7183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7183">CVE-2018-7183 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7184/">CVE-2018-7184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7184">CVE-2018-7184 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7185/">CVE-2018-7185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7185">CVE-2018-7185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553696" comment="ntp-4.2.8p11-64.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553697" comment="ntp-doc-4.2.8p11-64.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149709" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1088200" ref_url="https://bugzilla.suse.com/1088200" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-9256" ref_url="https://www.suse.com/security/cve/CVE-2018-9256/" source="CVE"/>
		<reference ref_id="CVE-2018-9259" ref_url="https://www.suse.com/security/cve/CVE-2018-9259/" source="CVE"/>
		<reference ref_id="CVE-2018-9260" ref_url="https://www.suse.com/security/cve/CVE-2018-9260/" source="CVE"/>
		<reference ref_id="CVE-2018-9261" ref_url="https://www.suse.com/security/cve/CVE-2018-9261/" source="CVE"/>
		<reference ref_id="CVE-2018-9262" ref_url="https://www.suse.com/security/cve/CVE-2018-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-9263" ref_url="https://www.suse.com/security/cve/CVE-2018-9263/" source="CVE"/>
		<reference ref_id="CVE-2018-9264" ref_url="https://www.suse.com/security/cve/CVE-2018-9264/" source="CVE"/>
		<reference ref_id="CVE-2018-9265" ref_url="https://www.suse.com/security/cve/CVE-2018-9265/" source="CVE"/>
		<reference ref_id="CVE-2018-9266" ref_url="https://www.suse.com/security/cve/CVE-2018-9266/" source="CVE"/>
		<reference ref_id="CVE-2018-9267" ref_url="https://www.suse.com/security/cve/CVE-2018-9267/" source="CVE"/>
		<reference ref_id="CVE-2018-9268" ref_url="https://www.suse.com/security/cve/CVE-2018-9268/" source="CVE"/>
		<reference ref_id="CVE-2018-9269" ref_url="https://www.suse.com/security/cve/CVE-2018-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-9270" ref_url="https://www.suse.com/security/cve/CVE-2018-9270/" source="CVE"/>
		<reference ref_id="CVE-2018-9271" ref_url="https://www.suse.com/security/cve/CVE-2018-9271/" source="CVE"/>
		<reference ref_id="CVE-2018-9272" ref_url="https://www.suse.com/security/cve/CVE-2018-9272/" source="CVE"/>
		<reference ref_id="CVE-2018-9273" ref_url="https://www.suse.com/security/cve/CVE-2018-9273/" source="CVE"/>
		<reference ref_id="CVE-2018-9274" ref_url="https://www.suse.com/security/cve/CVE-2018-9274/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003900.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

- Update to wireshark 2.2.14, fix such issues:
  * bsc#1088200 VUL-0: wireshark: multiple vulnerabilities
    fixed in 2.2.14, 2.4.6
  * CVE-2018-9256: LWAPP dissector crash
  * CVE-2018-9260: IEEE 802.15.4 dissector crash
  * CVE-2018-9261: NBAP dissector crash
  * CVE-2018-9262: VLAN dissector crash
  * CVE-2018-9263: Kerberos dissector crash
  * CVE-2018-9264: ADB dissector crash
  * CVE-2018-9265: tn3270 dissector has a memory leak
  * CVE-2018-9266: ISUP dissector memory leak
  * CVE-2018-9267: LAPD dissector memory leak
  * CVE-2018-9268: SMB2 dissector memory leak
  * CVE-2018-9269: GIOP dissector memory leak
  * CVE-2018-9270: OIDS dissector memory leak
  * CVE-2018-9271: multipart dissector memory leak
  * CVE-2018-9272: h223 dissector memory leak
  * CVE-2018-9273: pcp dissector memory leak
  * CVE-2018-9274: failure message memory leak
  * CVE-2018-9259: MP4 dissector crash
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-19"/>
	<updated date="2018-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9256/">CVE-2018-9256 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9256">CVE-2018-9256 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9259/">CVE-2018-9259 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9259">CVE-2018-9259 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9260/">CVE-2018-9260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9260">CVE-2018-9260 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9261/">CVE-2018-9261 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9261">CVE-2018-9261 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9262/">CVE-2018-9262 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9262">CVE-2018-9262 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9263/">CVE-2018-9263 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9263">CVE-2018-9263 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9264/">CVE-2018-9264 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9264">CVE-2018-9264 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9265/">CVE-2018-9265 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9265">CVE-2018-9265 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9266/">CVE-2018-9266 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9266">CVE-2018-9266 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9267/">CVE-2018-9267 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9267">CVE-2018-9267 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9268/">CVE-2018-9268 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9268">CVE-2018-9268 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9269/">CVE-2018-9269 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9269">CVE-2018-9269 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9270/">CVE-2018-9270 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9270">CVE-2018-9270 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9271/">CVE-2018-9271 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9271">CVE-2018-9271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9272/">CVE-2018-9272 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9272">CVE-2018-9272 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9273/">CVE-2018-9273 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9273">CVE-2018-9273 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9274/">CVE-2018-9274 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9274">CVE-2018-9274 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553698" comment="libwireshark8-2.2.14-48.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553699" comment="libwiretap6-2.2.14-48.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553700" comment="libwscodecs1-2.2.14-48.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553701" comment="libwsutil7-2.2.14-48.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553702" comment="wireshark-2.2.14-48.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553703" comment="wireshark-gtk-2.2.14-48.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149710" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1019695" ref_url="https://bugzilla.suse.com/1019695" source="BUGZILLA"/>
		<reference ref_id="1019699" ref_url="https://bugzilla.suse.com/1019699" source="BUGZILLA"/>
		<reference ref_id="1022604" ref_url="https://bugzilla.suse.com/1022604" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1046610" ref_url="https://bugzilla.suse.com/1046610" source="BUGZILLA"/>
		<reference ref_id="1060799" ref_url="https://bugzilla.suse.com/1060799" source="BUGZILLA"/>
		<reference ref_id="1064206" ref_url="https://bugzilla.suse.com/1064206" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1073059" ref_url="https://bugzilla.suse.com/1073059" source="BUGZILLA"/>
		<reference ref_id="1073069" ref_url="https://bugzilla.suse.com/1073069" source="BUGZILLA"/>
		<reference ref_id="1075428" ref_url="https://bugzilla.suse.com/1075428" source="BUGZILLA"/>
		<reference ref_id="1076033" ref_url="https://bugzilla.suse.com/1076033" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1083574" ref_url="https://bugzilla.suse.com/1083574" source="BUGZILLA"/>
		<reference ref_id="1083745" ref_url="https://bugzilla.suse.com/1083745" source="BUGZILLA"/>
		<reference ref_id="1083836" ref_url="https://bugzilla.suse.com/1083836" source="BUGZILLA"/>
		<reference ref_id="1084223" ref_url="https://bugzilla.suse.com/1084223" source="BUGZILLA"/>
		<reference ref_id="1084310" ref_url="https://bugzilla.suse.com/1084310" source="BUGZILLA"/>
		<reference ref_id="1084328" ref_url="https://bugzilla.suse.com/1084328" source="BUGZILLA"/>
		<reference ref_id="1084353" ref_url="https://bugzilla.suse.com/1084353" source="BUGZILLA"/>
		<reference ref_id="1084452" ref_url="https://bugzilla.suse.com/1084452" source="BUGZILLA"/>
		<reference ref_id="1084610" ref_url="https://bugzilla.suse.com/1084610" source="BUGZILLA"/>
		<reference ref_id="1084699" ref_url="https://bugzilla.suse.com/1084699" source="BUGZILLA"/>
		<reference ref_id="1084829" ref_url="https://bugzilla.suse.com/1084829" source="BUGZILLA"/>
		<reference ref_id="1084889" ref_url="https://bugzilla.suse.com/1084889" source="BUGZILLA"/>
		<reference ref_id="1084898" ref_url="https://bugzilla.suse.com/1084898" source="BUGZILLA"/>
		<reference ref_id="1084914" ref_url="https://bugzilla.suse.com/1084914" source="BUGZILLA"/>
		<reference ref_id="1084918" ref_url="https://bugzilla.suse.com/1084918" source="BUGZILLA"/>
		<reference ref_id="1084967" ref_url="https://bugzilla.suse.com/1084967" source="BUGZILLA"/>
		<reference ref_id="1085042" ref_url="https://bugzilla.suse.com/1085042" source="BUGZILLA"/>
		<reference ref_id="1085058" ref_url="https://bugzilla.suse.com/1085058" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1085383" ref_url="https://bugzilla.suse.com/1085383" source="BUGZILLA"/>
		<reference ref_id="1085402" ref_url="https://bugzilla.suse.com/1085402" source="BUGZILLA"/>
		<reference ref_id="1085404" ref_url="https://bugzilla.suse.com/1085404" source="BUGZILLA"/>
		<reference ref_id="1085487" ref_url="https://bugzilla.suse.com/1085487" source="BUGZILLA"/>
		<reference ref_id="1085507" ref_url="https://bugzilla.suse.com/1085507" source="BUGZILLA"/>
		<reference ref_id="1085511" ref_url="https://bugzilla.suse.com/1085511" source="BUGZILLA"/>
		<reference ref_id="1085679" ref_url="https://bugzilla.suse.com/1085679" source="BUGZILLA"/>
		<reference ref_id="1085981" ref_url="https://bugzilla.suse.com/1085981" source="BUGZILLA"/>
		<reference ref_id="1086015" ref_url="https://bugzilla.suse.com/1086015" source="BUGZILLA"/>
		<reference ref_id="1086162" ref_url="https://bugzilla.suse.com/1086162" source="BUGZILLA"/>
		<reference ref_id="1086194" ref_url="https://bugzilla.suse.com/1086194" source="BUGZILLA"/>
		<reference ref_id="1086357" ref_url="https://bugzilla.suse.com/1086357" source="BUGZILLA"/>
		<reference ref_id="1086499" ref_url="https://bugzilla.suse.com/1086499" source="BUGZILLA"/>
		<reference ref_id="1086518" ref_url="https://bugzilla.suse.com/1086518" source="BUGZILLA"/>
		<reference ref_id="1086607" ref_url="https://bugzilla.suse.com/1086607" source="BUGZILLA"/>
		<reference ref_id="1087088" ref_url="https://bugzilla.suse.com/1087088" source="BUGZILLA"/>
		<reference ref_id="1087211" ref_url="https://bugzilla.suse.com/1087211" source="BUGZILLA"/>
		<reference ref_id="1087231" ref_url="https://bugzilla.suse.com/1087231" source="BUGZILLA"/>
		<reference ref_id="1087260" ref_url="https://bugzilla.suse.com/1087260" source="BUGZILLA"/>
		<reference ref_id="1087274" ref_url="https://bugzilla.suse.com/1087274" source="BUGZILLA"/>
		<reference ref_id="1087659" ref_url="https://bugzilla.suse.com/1087659" source="BUGZILLA"/>
		<reference ref_id="1087845" ref_url="https://bugzilla.suse.com/1087845" source="BUGZILLA"/>
		<reference ref_id="1087906" ref_url="https://bugzilla.suse.com/1087906" source="BUGZILLA"/>
		<reference ref_id="1087999" ref_url="https://bugzilla.suse.com/1087999" source="BUGZILLA"/>
		<reference ref_id="1088050" ref_url="https://bugzilla.suse.com/1088050" source="BUGZILLA"/>
		<reference ref_id="1088087" ref_url="https://bugzilla.suse.com/1088087" source="BUGZILLA"/>
		<reference ref_id="1088241" ref_url="https://bugzilla.suse.com/1088241" source="BUGZILLA"/>
		<reference ref_id="1088267" ref_url="https://bugzilla.suse.com/1088267" source="BUGZILLA"/>
		<reference ref_id="1088313" ref_url="https://bugzilla.suse.com/1088313" source="BUGZILLA"/>
		<reference ref_id="1088324" ref_url="https://bugzilla.suse.com/1088324" source="BUGZILLA"/>
		<reference ref_id="1088600" ref_url="https://bugzilla.suse.com/1088600" source="BUGZILLA"/>
		<reference ref_id="1088684" ref_url="https://bugzilla.suse.com/1088684" source="BUGZILLA"/>
		<reference ref_id="1088871" ref_url="https://bugzilla.suse.com/1088871" source="BUGZILLA"/>
		<reference ref_id="802154" ref_url="https://bugzilla.suse.com/802154" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18257" ref_url="https://www.suse.com/security/cve/CVE-2017-18257/" source="CVE"/>
		<reference ref_id="CVE-2018-1091" ref_url="https://www.suse.com/security/cve/CVE-2018-1091/" source="CVE"/>
		<reference ref_id="CVE-2018-7740" ref_url="https://www.suse.com/security/cve/CVE-2018-7740/" source="CVE"/>
		<reference ref_id="CVE-2018-8043" ref_url="https://www.suse.com/security/cve/CVE-2018-8043/" source="CVE"/>
		<reference ref_id="CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003954.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.126 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-1091: In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service (bnc#1087231).
- CVE-2018-7740: The resv_map_release function in mm/hugetlb.c allowed local users to cause a denial of service (BUG) via a crafted application that made mmap system calls and has a large pgoff argument to the remap_file_pages system call (bnc#1084353).
- CVE-2018-8043: The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c did not validate certain resource availability, which allowed local users to cause a denial of service (NULL pointer dereference) (bnc#1084829).
- CVE-2017-18257: The __get_data_block function in fs/f2fs/data.c allowed local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl. (bnc#1088241)
- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).


The following non-security bugs were fixed:

- acpica: Add header support for TPM2 table changes (bsc#1084452).
- acpica: Add support for new SRAT subtable (bsc#1085981).
- acpica: iasl: Update to IORT SMMUv3 disassembling (bsc#1085981).
- acpi/iort: numa: Add numa node mapping for smmuv3 devices (bsc#1085981).
- acpi, numa: fix pxm to online numa node associations (bnc#1012382).
- acpi / pmic: xpower: Fix power_table addresses (bnc#1012382).
- acpi/processor: Fix error handling in __acpi_processor_start() (bnc#1012382).
- acpi/processor: Replace racy task affinity logic (bnc#1012382).
- add mainline tag to various patches to be able to get further work done
- af_iucv: enable control sends in case of SEND_SHUTDOWN (bnc#1085507, LTC#165135).
- agp/intel: Flush all chipset writes after updating the GGTT (bnc#1012382).
- ahci: Add PCI-id for the Highpoint Rocketraid 644L card (bnc#1012382).
- alsa: aloop: Fix access to not-yet-ready substream via cable (bnc#1012382).
- alsa: aloop: Sync stale timer before release (bnc#1012382).
- alsa: firewire-digi00x: handle all MIDI messages on streaming packets (bnc#1012382).
- alsa: hda: Add a power_save blacklist (bnc#1012382).
- alsa: hda: add dock and led support for HP EliteBook 820 G3 (bnc#1012382).
- alsa: hda: add dock and led support for HP ProBook 640 G2 (bnc#1012382).
- alsa: hda/realtek - Always immediately update mute LED with pin VREF (bnc#1012382).
- alsa: hda/realtek - Fix dock line-out volume on Dell Precision 7520 (bnc#1012382).
- alsa: hda/realtek - Fix speaker no sound after system resume (bsc#1031717).
- alsa: hda - Revert power_save option default value (git-fixes).
- alsa: pcm: Fix UAF in snd_pcm_oss_get_formats() (bnc#1012382).
- alsa: usb-audio: Add a quirck for B&amp;W PX headphones (bnc#1012382).
- alsa: usb-audio: Fix parsing descriptor of UAC2 processing unit (bnc#1012382).
- apparmor: Make path_max parameter readonly (bnc#1012382).
- arm64: Add ARM_SMCCC_ARCH_WORKAROUND_1 BP hardening support (bsc#1068032).
- arm64: Add missing Falkor part number for branch predictor hardening (bsc#1068032).
- arm64: capabilities: Handle duplicate entries for a capability (bsc#1068032).
- arm64: cpufeature: __this_cpu_has_cap() shouldn't stop early (bsc#1068032).
- arm64 / cpuidle: Use new cpuidle macro for entering retention state (bsc#1084328).
- arm64: Enforce BBM for huge IO/VMAP mappings (bsc#1088313).
- arm64: fix smccc compilation (bsc#1068032).
- arm64: Kill PSCI_GET_VERSION as a variant-2 workaround (bsc#1068032).
- arm64: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling (bsc#1068032).
- arm64: KVM: Increment PC after handling an SMC trap (bsc#1068032).
- arm64: KVM: Report SMCCC_ARCH_WORKAROUND_1 BP hardening support (bsc#1068032).
- arm64: mm: do not write garbage into TTBR1_EL1 register (bsc#1085487).
- arm64: mm: fix thinko in non-global page table attribute check (bsc#1088050).
- arm64: Relax ARM_SMCCC_ARCH_WORKAROUND_1 discovery (bsc#1068032).
- arm: 8668/1: ftrace: Fix dynamic ftrace with DEBUG_RODATA and !FRAME_POINTER (bnc#1012382).
- arm/arm64: KVM: Add PSCI_VERSION helper (bsc#1068032).
- arm/arm64: KVM: Add smccc accessors to PSCI code (bsc#1068032).
- arm/arm64: KVM: Advertise SMCCC v1.1 (bsc#1068032).
- arm/arm64: KVM: Consolidate the PSCI include files (bsc#1068032).
- arm/arm64: KVM: Implement PSCI 1.0 support (bsc#1068032).
- arm/arm64: KVM: Turn kvm_psci_version into a static inline (bsc#1068032).
- arm/arm64: smccc: Implement SMCCC v1.1 inline primitive (bsc#1068032).
- arm/arm64: smccc: Make function identifiers an unsigned quantity (bsc#1068032).
- arm: DRA7: clockdomain: Change the CLKTRCTRL of CM_PCIE_CLKSTCTRL to SW_WKUP (bnc#1012382).
- arm: dts: Adjust moxart IRQ controller and flags (bnc#1012382).
- arm: dts: am335x-pepper: Fix the audio CODEC's reset pin (bnc#1012382).
- arm: dts: exynos: Correct Trats2 panel reset line (bnc#1012382).
- arm: dts: koelsch: Correct clock frequency of X2 DU clock input (bnc#1012382).
- arm: dts: LogicPD Torpedo: Fix I2C1 pinmux (bnc#1012382).
- arm: dts: LogicPD Torpedo: Fix I2C1 pinmux (bnc#1012382).
- arm: dts: omap3-n900: Fix the audio CODEC's reset pin (bnc#1012382).
- arm: dts: r8a7790: Correct parent of SSI[0-9] clocks (bnc#1012382).
- arm: dts: r8a7791: Correct parent of SSI[0-9] clocks (bnc#1012382).
- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bnc#1012382).
- asoc: rcar: ssi: do not set SSICR.CKDV = 000 with SSIWSR.CONT (bnc#1012382).
- ath10k: disallow DFS simulation if DFS channel is not enabled (bnc#1012382).
- ath10k: fix invalid STS_CAP_OFFSET_MASK (bnc#1012382).
- ath10k: update tdls teardown state to target (bnc#1012382).
- ath: Fix updating radar flags for coutry code India (bnc#1012382).
- batman-adv: handle race condition for claims between gateways (bnc#1012382).
- bcache: do not attach backing with duplicate UUID (bnc#1012382).
- blkcg: fix double free of new_blkg in blkcg_init_queue (bnc#1012382).
- blk-throttle: make sure expire time isn't too big (bnc#1012382).
- block: do not assign cmd_flags in __blk_rq_prep_clone (bsc#1088087).
- block-mq: stop workqueue items in blk_mq_stop_hw_queue() (bsc#1084967).
- bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174 (bnc#1012382).
- bluetooth: hci_qca: Avoid setup failure on missing rampatch (bnc#1012382).
- bnx2x: Align RX buffers (bnc#1012382).
- bonding: refine bond_fold_stats() wrap detection (bnc#1012382).
- bpf: fix incorrect sign extension in check_alu_op() (bnc#1012382).
- bpf: skip unnecessary capability check (bnc#1012382).
- bpf, x64: implement retpoline for tail call (bnc#1012382).
- bpf, x64: increase number of passes (bnc#1012382).
- braille-console: Fix value returned by _braille_console_setup (bnc#1012382).
- brcmfmac: fix P2P_DEVICE ethernet address generation (bnc#1012382).
- bridge: check brport attr show in brport_show (bnc#1012382).
- btrfs: alloc_chunk: fix DUP stripe size handling (bnc#1012382).
- btrfs: Fix use-after-free when cleaning up fs_devs with a single stale device (bnc#1012382).
- btrfs: improve delayed refs iterations (bsc#1076033).
- btrfs: incremental send, fix invalid memory access (git-fixes).
- btrfs: preserve i_mode if __btrfs_set_acl() fails (bnc#1012382).
- btrfs: send, fix file hole not being preserved due to inline extent (bnc#1012382).
- can: cc770: Fix queue stall &amp; dropped RTR reply (bnc#1012382).
- can: cc770: Fix stalls on rt-linux, remove redundant IRQ ack (bnc#1012382).
- can: cc770: Fix use after free in cc770_tx_interrupt() (bnc#1012382).
- ceph: only dirty ITER_IOVEC pages for direct read (bsc#1084898).
- ch9200: use skb_cow_head() to deal with cloned skbs (bsc#1088684).
- clk: bcm2835: Protect sections updating shared registers (bnc#1012382).
- clk: ns2: Correct SDIO bits (bnc#1012382).
- clk: qcom: msm8916: fix mnd_width for codec_digcodec (bnc#1012382).
- clk: si5351: Rename internal plls to avoid name collisions (bnc#1012382).
- coresight: Fix disabling of CoreSight TPIU (bnc#1012382).
- coresight: Fixes coresight DT parse to get correct output port ID (bnc#1012382).
- cpufreq: Fix governor module removal race (bnc#1012382).
- cpufreq: s3c24xx: Fix broken s3c_cpufreq_init() (bnc#1012382).
- cpufreq/sh: Replace racy task affinity logic (bnc#1012382).
- cpuidle: Add new macro to enter a retention idle state (bsc#1084328).
- cros_ec: fix nul-termination for firmware build info (bnc#1012382).
- crypto: cavium - fix memory leak on info (bsc#1086518).
- dcache: Add cond_resched in shrink_dentry_list (bsc#1086194).
- dccp: check sk for closed state in dccp_sendmsg() (bnc#1012382).
- dmaengine: imx-sdma: add 1ms delay to ensure SDMA channel is stopped (bnc#1012382).
- dmaengine: ti-dma-crossbar: Fix event mapping for TPCC_EVT_MUX_60_63 (bnc#1012382).
- dm: Always copy cmd_flags when cloning a request (bsc#1088087).
- driver: (adm1275) set the m,b and R coefficients correctly for power (bnc#1012382).
- drm: Allow determining if current task is output poll worker (bnc#1012382).
- drm/amdgpu/dce: Do not turn off DP sink when disconnected (bnc#1012382).
- drm/amdgpu: Fail fb creation from imported dma-bufs. (v2) (bnc#1012382).
- drm/amdgpu: Fix deadlock on runtime suspend (bnc#1012382).
- drm/amdgpu: fix KV harvesting (bnc#1012382).
- drm/amdgpu: Notify sbios device ready before send request (bnc#1012382).
- drm/amdkfd: Fix memory leaks in kfd topology (bnc#1012382).
- drm: Defer disabling the vblank IRQ until the next interrupt (for instant-off) (bnc#1012382).
- drm/edid: set ELD connector type in drm_edid_to_eld() (bnc#1012382).
- drm/i915/cmdparser: Do not check past the cmd length (bsc#1031717).
- drm/i915/psr: Check for the specific AUX_FRAME_SYNC cap bit (bsc#1031717).
- drm/msm: fix leak in failed get_pages (bnc#1012382).
- drm/nouveau: Fix deadlock on runtime suspend (bnc#1012382).
- drm/nouveau/kms: Increase max retries in scanout position queries (bnc#1012382).
- drm/omap: DMM: Check for DMM readiness after successful transaction commit (bnc#1012382).
- drm: qxl: Do not alloc fbdev if emulation is not supported (bnc#1012382).
- drm/radeon: Do not turn off DP sink when disconnected (bnc#1012382).
- drm/radeon: Fail fb creation from imported dma-bufs (bnc#1012382).
- drm/radeon: Fix deadlock on runtime suspend (bnc#1012382).
- drm/radeon: fix KV harvesting (bnc#1012382).
- drm: udl: Properly check framebuffer mmap offsets (bnc#1012382).
- drm/vmwgfx: Fix a destoy-while-held mutex problem (bnc#1012382).
- drm/vmwgfx: Fixes to vmwgfx_fb (bnc#1012382).
- e1000e: Avoid missed interrupts following ICR read (bsc#1075428).
- e1000e: Avoid receiver overrun interrupt bursts (bsc#1075428).
- e1000e: Fix check_for_link return value with autoneg off (bsc#1075428).
- e1000e: Fix link check race condition (bsc#1075428).
- e1000e: Fix queue interrupt re-raising in Other interrupt (bsc#1075428).
- e1000e: fix timing for 82579 Gigabit Ethernet controller (bnc#1012382).
- e1000e: Remove Other from EIAC (bsc#1075428).
- edac, sb_edac: Fix out of bound writes during DIMM configuration on KNL (git-fixes 3286d3eb906c).
- ext4: inplace xattr block update fails to deduplicate blocks (bnc#1012382).
- f2fs: relax node version check for victim data in gc (bnc#1012382).
- fib_semantics: Do not match route with mismatching tclassid (bnc#1012382).
- firmware/psci: Expose PSCI conduit (bsc#1068032).
- firmware/psci: Expose SMCCC version through psci_ops (bsc#1068032).
- fixup: sctp: verify size of a new chunk in _sctp_make_chunk() (bnc#1012382).
- fs/aio: Add explicit RCU grace period when freeing kioctx (bnc#1012382).
- fs/aio: Use RCU accessors for kioctx_table-&gt;table[] (bnc#1012382).
- fs/hugetlbfs/inode.c: change put_page/unlock_page order in hugetlbfs_fallocate() (git-fixes, bsc#1083745).
- fs: Teach path_connected to handle nfs filesystems with multiple roots (bnc#1012382).
- genirq: Track whether the trigger type has been set (git-fixes).
- genirq: Use irqd_get_trigger_type to compare the trigger type for shared IRQs (bnc#1012382).
- hdlc_ppp: carrier detect ok, do not turn off negotiation (bnc#1012382).
- hid: clamp input to logical range if no null state (bnc#1012382).
- hid: reject input outside logical range only if null state is set (bnc#1012382).
- hugetlbfs: fix offset overflow in hugetlbfs mmap (bnc#1084353).
- hv_balloon: fix bugs in num_pages_onlined accounting (fate#323887).
- hv_balloon: fix printk loglevel (fate#323887).
- hv_balloon: simplify hv_online_page()/hv_page_online_one() (fate#323887).
- i2c: i2c-scmi: add a MS HID (bnc#1012382).
- i2c: xlp9xx: Check for Bus state before every transfer (bsc#1084310).
- i2c: xlp9xx: Handle NACK on DATA properly (bsc#1084310).
- i2c: xlp9xx: Handle transactions with I2C_M_RECV_LEN properly (bsc#1060799).
- i2c: xlp9xx: return ENXIO on slave address NACK (bsc#1060799).
- i40e: Acquire NVM lock before reads on all devices (bnc#1012382).
- i40e: avoid NVM acquire deadlock during NVM update (git-fixes).
- ia64: fix module loading for gcc-5.4 (bnc#1012382).
- ib/ipoib: Avoid memory leak if the SA returns a different DGID (bnc#1012382).
- ib/ipoib: Update broadcast object if PKey value was changed in index 0 (bnc#1012382).
- ib/mlx4: Change vma from shared to private (bnc#1012382).
- ib/mlx4: Take write semaphore when changing the vma struct (bnc#1012382).
- ibmvfc: Avoid unnecessary port relogin (bsc#1085404).
- ibmvnic: Disable irqs before exiting reset from closed state (bsc#1084610).
- ibmvnic: Do not reset CRQ for Mobility driver resets (bsc#1088600).
- ibmvnic: Fix DMA mapping mistakes (bsc#1088600).
- ibmvnic: Fix failover case for non-redundant configuration (bsc#1088600).
- ibmvnic: Fix reset return from closed state (bsc#1084610).
- ibmvnic: Fix reset scheduler error handling (bsc#1088600).
- ibmvnic: Potential NULL dereference in clean_one_tx_pool() (bsc#1085224, git-fixes).
- ibmvnic: Remove unused TSO resources in TX pool structure (bsc#1085224).
- ibmvnic: Update TX pool cleaning routine (bsc#1085224).
- ibmvnic: Zero used TX descriptor counter on reset (bsc#1088600).
- ib/umem: Fix use of npages/nmap fields (bnc#1012382).
- ieee802154: 6lowpan: fix possible NULL deref in lowpan_device_event() (bnc#1012382).
- iio: st_pressure: st_accel: Initialise sensor platform data properly (bnc#1012382).
- iio: st_pressure: st_accel: pass correct platform data to init (git-fixes).
- ima: relax requiring a file signature for new files with zero length (bnc#1012382).
- infiniband/uverbs: Fix integer overflows (bnc#1012382).
- input: matrix_keypad - fix race when disabling interrupts (bnc#1012382).
- input: qt1070 - add OF device ID table (bnc#1012382).
- input: tsc2007 - check for presence and power down tsc2007 during probe (bnc#1012382).
- iommu/omap: Register driver before setting IOMMU ops (bnc#1012382).
- iommu/vt-d: clean up pr_irq if request_threaded_irq fails (bnc#1012382).
- ip6_vti: adjust vti mtu according to mtu of lower device (bnc#1012382).
- ipmi: do not probe ACPI devices if si_tryacpi is unset (bsc#1060799).
- ipmi: Fix the I2C address extraction from SPMI tables (bsc#1060799).
- ipmi_ssif: Fix kernel panic at msg_done_handler (bsc#1088871).
- ipmi_ssif: Fix logic around alert handling (bsc#1060799).
- ipmi_ssif: remove redundant null check on array client-&gt;adapter-&gt;name (bsc#1060799).
- ipmi_ssif: unlock on allocation failure (bsc#1060799).
- ipmi:ssif: Use i2c_adapter_id instead of adapter-&gt;nr (bsc#1060799).
- ipmi: Use the proper default value for register size in ACPI (bsc#1060799).
- ipmi/watchdog: fix wdog hang on panic waiting for ipmi response (bnc#1012382).
- ipv6: fix access to non-linear packet in ndisc_fill_redirect_hdr_option() (bnc#1012382).
- ipv6 sit: work around bogus gcc-8 -Wrestrict warning (bnc#1012382).
- ipvlan: add L2 check for packets arriving via virtual devices (bnc#1012382).
- irqchip/gic-v3-its: Add ACPI NUMA node mapping (bsc#1085981).
- irqchip/gic-v3-its: Allow GIC ITS number more than MAX_NUMNODES (bsc#1085981).
- irqchip/gic-v3-its: Ensure nr_ites &gt;= nr_lpis (bnc#1012382).
- irqchip/gic-v3-its: Remove ACPICA version check for ACPI NUMA (bsc#1085981).
- kbuild: disable clang's default use of -fmerge-all-constants (bnc#1012382).
- kbuild: Handle builtin dtb file names containing hyphens (bnc#1012382).
- kprobes/x86: Fix kprobe-booster not to boost far call instructions (bnc#1012382).
- kprobes/x86: Fix to set RWX bits correctly before releasing trampoline (git-fixes).
- kprobes/x86: Set kprobes pages read-only (bnc#1012382).
- kvm: arm/arm64: Handle CPU_PM_ENTER_FAILED (bsc#1086499).
- kvm: arm/arm64: vgic: Add missing irq_lock to vgic_mmio_read_pending (bsc#1086499).
- kvm: arm/arm64: vgic: Do not populate multiple LRs with the same vintid (bsc#1086499).
- kvm: arm/arm64: vgic-its: Check result of allocation before use (bsc#).
- kvm: arm/arm64: vgic-its: Preserve the revious read from the pending table (bsc#1086499).
- kvm: arm/arm64: vgic-v3: Tighten synchronization for guests using v2 on v3 (bsc#1086499).
- kvm: mmu: Fix overlap between public and private memslots (bnc#1012382).
- kvm: nVMX: fix nested tsc scaling (bsc1087999).
- kvm: PPC: Book3S PR: Exit KVM on failed mapping (bnc#1012382).
- kvm/x86: fix icebp instruction handling (bnc#1012382).
- l2tp: do not accept arbitrary sockets (bnc#1012382).
- libata: Apply NOLPM quirk to Crucial M500 480 and 960GB SSDs (bnc#1012382).
- libata: Apply NOLPM quirk to Crucial MX100 512GB SSDs (bnc#1012382).
- libata: disable LPM for Crucial BX100 SSD 500GB drive (bnc#1012382).
- libata: Enable queued TRIM for Samsung SSD 860 (bnc#1012382).
- libata: fix length validation of ATAPI-relayed SCSI commands (bnc#1012382).
- libata: Make Crucial BX100 500GB LPM quirk apply to all firmware versions (bnc#1012382).
- libata: Modify quirks for MX100 to limit NCQ_TRIM quirk to MU01 version (bnc#1012382).
- libata: remove WARN() for DMA or PIO command without data (bnc#1012382).
- lock_parent() needs to recheck if dentry got __dentry_kill'ed under it (bnc#1012382).
- loop: Fix lost writes caused by missing flag (bnc#1012382).
- lpfc: update version to 11.4.0.7-1 (bsc#1085383).
- mac80211: do not parse encrypted management frames in ieee80211_frame_acked (bnc#1012382).
- mac80211: do not WARN on bad WMM parameters from buggy APs (bsc#1031717).
- mac80211_hwsim: enforce PS_MANUAL_POLL to be set after PS_ENABLED (bnc#1012382).
- mac80211: remove BUG() when interface type is invalid (bnc#1012382).
- md-cluster: fix wrong condition check in raid1_write_request (bsc#1085402).
- md/raid10: skip spare disk as 'first' disk (bnc#1012382).
- md/raid10: wait up frozen array in handle_write_completed (bnc#1012382).
- md/raid6: Fix anomily when recovering a single device in RAID6 (bnc#1012382).
- media: au0828: fix VIDEO_V4L2 dependency (bsc#1031717).
- media: bt8xx: Fix err 'bt878_probe()' (bnc#1012382).
- media: c8sectpfe: fix potential NULL pointer dereference in c8sectpfe_timer_interrupt (bnc#1012382).
- media: cpia2: Fix a couple off by one bugs (bnc#1012382).
- media: cx25821: prevent out-of-bounds read on array card (bsc#1031717).
- media/dvb-core: Race condition when writing to CAM (bnc#1012382).
- media: i2c/soc_camera: fix ov6650 sensor getting wrong clock (bnc#1012382).
- media: m88ds3103: do not call a non-initalized function (bnc#1012382).
- media: [RESEND] media: dvb-frontends: Add delay to Si2168 restart (bnc#1012382).
- media: s3c-camif: fix out-of-bounds array access (bsc#1031717).
- mfd: palmas: Reset the POWERHOLD mux during power off (bnc#1012382).
- mmc: avoid removing non-removable hosts during suspend (bnc#1012382).
- mmc: dw_mmc: fix falling from idmac to PIO mode when dw_mci_reset occurs (bnc#1012382).
- mmc: dw_mmc: Fix the DTO/CTO timeout overflow calculation for 32-bit systems (bsc#1088267).
- mmc: sdhci-of-esdhc: limit SD clock for ls1012a/ls1046a (bnc#1012382).
- mm: Fix false-positive VM_BUG_ON() in page_cache_{get,add}_speculative() (bnc#1012382).
- mm/hugetlb.c: do not call region_abort if region_chg fails (bnc#1084353).
- mm/vmalloc: add interfaces to free unmapped page table (bnc#1012382).
- mpls, nospec: Sanitize array index in mpls_label_ok() (bnc#1012382).
- mt7601u: check return value of alloc_skb (bnc#1012382).
- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bnc#1012382).
- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bnc#1012382).
- mtip32xx: use runtime tag to initialize command header (bnc#1012382).
- net/8021q: create device with all possible features in wanted_features (bnc#1012382).
- net: ethernet: arc: Fix a potential memory leak if an optional regulator is deferred (bnc#1012382).
- net: ethernet: ti: cpsw: add check for in-band mode setting with RGMII PHY interface (bnc#1012382).
- net/faraday: Add missing include of of.h (bnc#1012382).
- net: fec: Fix unbalanced PM runtime calls (bnc#1012382).
- netfilter: add back stackpointer size checks (bnc#1012382).
- netfilter: bridge: ebt_among: add missing match size checks (bnc#1012382).
- netfilter: IDLETIMER: be syzkaller friendly (bnc#1012382).
- netfilter: ipv6: fix use-after-free Write in nf_nat_ipv6_manip_pkt (bnc#1012382).
- netfilter: nat: cope with negative port range (bnc#1012382).
- netfilter: use skb_to_full_sk in ip_route_me_harder (bnc#1012382).
- netfilter: x_tables: fix missing timer initialization in xt_LED (bnc#1012382).
- netfilter: xt_CT: fix refcnt leak on error path (bnc#1012382).
- net: Fix hlist corruptions in inet_evict_bucket() (bnc#1012382).
- net: fix race on decreasing number of TX queues (bnc#1012382).
- net: hns: Fix ethtool private flags (bsc#1085511).
- net: ipv4: avoid unused variable warning for sysctl (git-fixes).
- net: ipv4: do not allow setting net.ipv4.route.min_pmtu below 68 (bnc#1012382).
- net: ipv6: send unsolicited NA after DAD (git-fixes).
- net: ipv6: send unsolicited NA on admin up (bnc#1012382).
- net/iucv: Free memory obtained by kzalloc (bnc#1012382).
- netlink: avoid a double skb free in genlmsg_mcast() (bnc#1012382).
- netlink: ensure to loop over all netns in genlmsg_multicast_allns() (bnc#1012382).
- net: mpls: Pull common label check into helper (bnc#1012382).
- net: Only honor ifindex in IP_PKTINFO if non-0 (bnc#1012382).
- net: systemport: Rewrite __bcm_sysport_tx_reclaim() (bnc#1012382).
- net: xfrm: allow clearing socket xfrm policies (bnc#1012382).
- nfc: nfcmrvl: double free on error path (bnc#1012382).
- nfc: nfcmrvl: Include unaligned.h instead of access_ok.h (bnc#1012382).
- nfsd4: permit layoutget of executable-only files (bnc#1012382).
- nfs: Fix an incorrect type in struct nfs_direct_req (bnc#1012382).
- nospec: Allow index argument to have const-qualified type (bnc#1012382).
- nospec: Include &lt;asm/barrier.h&gt; dependency (bnc#1012382).
- nvme: do not send keep-alive frames during reset (bsc#1084223).
- nvme: do not send keep-alives to the discovery controller (bsc#1086607).
- nvme: expand nvmf_check_if_ready checks (bsc#1085058).
- nvme/rdma: do no start error recovery twice (bsc#1084967).
- nvmet_fc: prevent new io rqsts in possible isr completions (bsc#1083574).
- of: fix of_device_get_modalias returned length when truncating buffers (bnc#1012382).
- openvswitch: Delete conntrack entry clashing with an expectation (bnc#1012382).
- Partial revert 'e1000e: Avoid receiver overrun interrupt bursts' (bsc#1075428).
- pci/ACPI: Fix bus range comparison in pci_mcfg_lookup() (bsc#1084699).
- pci: Add function 1 DMA alias quirk for Highpoint RocketRAID 644L (bnc#1012382).
- pci: Add pci_reset_function_locked() (bsc#1084889).
- pci: Apply Cavium ACS quirk only to CN81xx/CN83xx/CN88xx devices (bsc#1084914).
- pci: Avoid FLR for Intel 82579 NICs (bsc#1084889).
- pci: Avoid slot reset if bridge itself is broken (bsc#1084918).
- pci: Export pcie_flr() (bsc#1084889).
- pci: hv: Fix 2 hang issues in hv_compose_msi_msg() (fate#323887, bsc#1087659, bsc#1087906).
- pci: hv: Fix a comment typo in _hv_pcifront_read_config() (fate#323887, bsc#1087659).
- pci: hv: Only queue new work items in hv_pci_devices_present() if necessary (fate#323887, bsc#1087659).
- pci: hv: Remove the bogus test in hv_eject_device_work() (fate#323887, bsc#1087659).
- pci: hv: Serialize the present and eject work items (fate#323887, bsc#1087659).
- pci: Mark Haswell Power Control Unit as having non-compliant BARs (bsc#1086015).
- pci/MSI: Stop disabling MSI/MSI-X in pci_device_shutdown() (bnc#1012382).
- pci: Probe for device reset support during enumeration (bsc#1084889).
- pci: Protect pci_error_handlers-&gt;reset_notify() usage with device_lock() (bsc#1084889).
- pci: Protect restore with device lock to be consistent (bsc#1084889).
- pci: Remove __pci_dev_reset() and pci_dev_reset() (bsc#1084889).
- pci: Remove redundant probes for device reset support (bsc#1084889).
- pci: Wait for up to 1000ms after FLR reset (bsc#1084889).
- perf inject: Copy events when reordering events in pipe mode (bnc#1012382).
- perf probe: Return errno when not hitting any event (bnc#1012382).
- perf session: Do not rely on evlist in pipe mode (bnc#1012382).
- perf sort: Fix segfault with basic block 'cycles' sort dimension (bnc#1012382).
- perf tests kmod-path: Do not fail if compressed modules are not supported (bnc#1012382).
- perf tools: Make perf_event__synthesize_mmap_events() scale (bnc#1012382).
- perf/x86/intel: Do not accidentally clear high bits in bdw_limit_period() (bnc#1012382).
- perf/x86/intel/uncore: Fix multi-domain PCI CHA enumeration bug on Skylake servers (bsc#1086357).
- pinctrl: Really force states during suspend/resume (bnc#1012382).
- platform/chrome: Use proper protocol transfer function (bnc#1012382).
- platform/x86: asus-nb-wmi: Add wapf4 quirk for the X302UA (bnc#1012382).
- power: supply: pda_power: move from timer to delayed_work (bnc#1012382).
- ppp: prevent unregistered channels from connecting to PPP units (bnc#1012382).
- pty: cancel pty slave port buf's work in tty_release (bnc#1012382).
- pwm: tegra: Increase precision in PWM rate calculation (bnc#1012382).
- qed: Free RoCE ILT Memory on rmmod qedr (bsc#1019695 FATE#321703 bsc#1019699 FATE#321702 bsc#1022604 FATE#321747).
- qed: Use after free in qed_rdma_free() (bsc#1019695 FATE#321703 bsc#1019699 FATE#321702 bsc#1022604 FATE#321747).
- qeth: repair SBAL elements calculation (bnc#1085507, LTC#165484).
- qlcnic: fix unchecked return value (bnc#1012382).
- rcutorture/configinit: Fix build directory error message (bnc#1012382).
- rdma/cma: Use correct size when writing netlink stats (bnc#1012382).
- rdma/core: Do not use invalid destination in determining port reuse (FATE#321231 FATE#321473 FATE#322153 FATE#322149).
- rdma/iwpm: Fix uninitialized error code in iwpm_send_mapinfo() (bnc#1012382).
- rdma/mlx5: Fix integer overflow while resizing CQ (bnc#1012382).
- rdma/ocrdma: Fix permissions for OCRDMA_RESET_STATS (bnc#1012382).
- rdma/ucma: Check that user does not overflow QP state (bnc#1012382).
- rdma/ucma: Fix access to non-initialized CM_ID object (bnc#1012382).
- rdma/ucma: Limit possible option size (bnc#1012382).
- regmap: Do not use format_val in regmap_bulk_read (bsc#1031717).
- regmap: Fix reversed bounds check in regmap_raw_write() (bsc#1031717).
- regmap: Format data for raw write in regmap_bulk_write (bsc#1031717).
- regmap-i2c: Off by one in regmap_i2c_smbus_i2c_read/write() (bsc#1031717).
- regulator: anatop: set default voltage selector for pcie (bnc#1012382).
- reiserfs: Make cancel_old_flush() reliable (bnc#1012382).
- Revert 'ARM: dts: LogicPD Torpedo: Fix I2C1 pinmux' (bnc#1012382).
- Revert 'e1000e: Separate signaling for link check/link up' (bsc#1075428).
- Revert 'genirq: Use irqd_get_trigger_type to compare the trigger type for shared IRQs' (bnc#1012382).
- Revert 'ipvlan: add L2 check for packets arriving via virtual devices' (reverted in upstream).
- Revert 'led: core: Fix brightness setting when setting delay_off=0' (bnc#1012382).
- rndis_wlan: add return value validation (bnc#1012382).
- rtc: cmos: Do not assume irq 8 for rtc when there are no legacy irqs (bnc#1012382).
- rtlwifi: rtl8723be: Fix loss of signal (bnc#1012382).
- rtlwifi: rtl_pci: Fix the bug when inactiveps is enabled (bnc#1012382).
- s390/mm: fix local TLB flushing vs. detach of an mm address space (bnc#1088324, LTC#166470).
- s390/mm: fix race on mm-&gt;context.flush_mm (bnc#1088324, LTC#166470).
- s390/mm: no local TLB flush for clearing-by-ASCE IDTE (bnc#1088324, LTC#166470).
- s390/qeth: apply takeover changes when mode is toggled (bnc#1085507, LTC#165490).
- s390/qeth: do not apply takeover changes to RXIP (bnc#1085507, LTC#165490).
- s390/qeth: fix double-free on IP add/remove race (bnc#1085507, LTC#165491).
- s390/qeth: fix IPA command submission race (bnc#1012382).
- s390/qeth: fix IP address lookup for L3 devices (bnc#1085507, LTC#165491).
- s390/qeth: fix IP removal on offline cards (bnc#1085507, LTC#165491).
- s390/qeth: fix SETIP command handling (bnc#1012382).
- s390/qeth: free netdevice when removing a card (bnc#1012382).
- s390/qeth: improve error reporting on IP add/removal (bnc#1085507, LTC#165491).
- s390/qeth: lock IP table while applying takeover changes (bnc#1085507, LTC#165490).
- s390/qeth: lock read device while queueing next buffer (bnc#1012382).
- s390/qeth: on channel error, reject further cmd requests (bnc#1012382).
- s390/qeth: update takeover IPs after configuration change (bnc#1085507, LTC#165490).
- s390/qeth: when thread completes, wake up all waiters (bnc#1012382).
- sched: act_csum: do not mangle TCP and UDP GSO packets (bnc#1012382).
- sched: Stop resched_cpu() from sending IPIs to offline CPUs (bnc#1012382).
- sched: Stop switched_to_rt() from sending IPIs to offline CPUs (bnc#1012382).
- scsi: core: scsi_get_device_flags_keyed(): Always return device flags (bnc#1012382).
- scsi: devinfo: apply to HP XP the same flags as Hitachi VSP (bnc#1012382).
- scsi: dh: add new rdac devices (bnc#1012382).
- scsi: lpfc: Add missing unlock in WQ full logic (bsc#1085383).
- scsi: lpfc: Code cleanup for 128byte wqe data type (bsc#1085383).
- scsi: lpfc: Fix mailbox wait for POST_SGL mbox command (bsc#1085383).
- scsi: lpfc: Fix NVME Initiator FirstBurst (bsc#1085383).
- scsi: lpfc: Fix SCSI lun discovery when port configured for both SCSI and NVME (bsc#1085383).
- scsi: lpfc: Memory allocation error during driver start-up on power8 (bsc#1085383).
- scsi: mac_esp: Replace bogus memory barrier with spinlock (bnc#1012382).
- scsi: sg: check for valid direction before starting the request (bnc#1012382).
- scsi: sg: fix SG_DXFER_FROM_DEV transfers (bnc#1012382).
- scsi: sg: fix static checker warning in sg_is_valid_dxfer (bnc#1012382).
- scsi: sg: only check for dxfer_len greater than 256M (bnc#1012382 bsc#1064206).
- scsi: virtio_scsi: always read VPD pages for multiqueue too (git-fixes).
- scsi: virtio_scsi: Always try to read VPD pages (bnc#1012382).
- sctp: fix dst refcnt leak in sctp_v4_get_dst (bnc#1012382).
- sctp: fix dst refcnt leak in sctp_v6_get_dst() (bnc#1012382).
- sctp: verify size of a new chunk in _sctp_make_chunk() (bnc#1012382).
- selftests/x86: Add tests for the STR and SLDT instructions (bnc#1012382).
- selftests/x86: Add tests for User-Mode Instruction Prevention (bnc#1012382).
- selftests/x86/entry_from_vm86: Add test cases for POPF (bnc#1012382).
- selftests/x86/entry_from_vm86: Exit with 1 if we fail (bnc#1012382).
- selinux: check for address length in selinux_socket_bind() (bnc#1012382).
- serial: 8250_pci: Add Brainboxes UC-260 4 port serial device (bnc#1012382).
- serial: sh-sci: prevent lockup on full TTY buffers (bnc#1012382).
- skbuff: Fix not waking applications when errors are enqueued (bnc#1012382).
- sm501fb: do not return zero on failure path in sm501fb_start() (bnc#1012382).
- solo6x10: release vb2 buffers in solo_stop_streaming() (bnc#1012382).
- spi: dw: Disable clock after unregistering the host (bnc#1012382).
- spi: omap2-mcspi: poll OMAP2_MCSPI_CHSTAT_RXS for PIO transfer (bnc#1012382).
- spi: sun6i: disable/unprepare clocks on remove (bnc#1012382).
- staging: android: ashmem: Fix lockdep issue during llseek (bnc#1012382).
- staging: android: ashmem: Fix possible deadlock in ashmem_ioctl (bnc#1012382).
- staging: comedi: fix comedi_nsamples_left (bnc#1012382).
- staging: lustre: ptlrpc: kfree used instead of kvfree (bnc#1012382).
- staging: ncpfs: memory corruption in ncp_read_kernel() (bnc#1012382).
- staging: speakup: Replace BUG_ON() with WARN_ON() (bnc#1012382).
- staging: unisys: visorhba: fix s-Par to boot with option CONFIG_VMAP_STACK set to y (bnc#1012382).
- staging: wilc1000: add check for kmalloc allocation failure (bnc#1012382).
- staging: wilc1000: fix unchecked return value (bnc#1012382).
- sysrq: Reset the watchdog timers while displaying high-resolution timers (bnc#1012382).
- target: prefer dbroot of /etc/target over /var/target (bsc#1087274).
- tcm_fileio: Prevent information leak for short reads (bnc#1012382).
- tcp: remove poll() flakes with FastOpen (bnc#1012382).
- tcp: sysctl: Fix a race to avoid unexpected 0 window from space (bnc#1012382).
- team: Fix double free in error path (bnc#1012382).
- test_firmware: fix setting old custom fw path back on exit (bnc#1012382).
- time: Change posix clocks ops interfaces to use timespec64 (bnc#1012382).
- timers, sched_clock: Update timeout for clock wrap (bnc#1012382).
- tools/usbip: fixes build with musl libc toolchain (bnc#1012382).
- tpm_i2c_infineon: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).
- tpm_i2c_nuvoton: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).
- tpm: st33zp24: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).
- tpm/tpm_crb: Use start method value from ACPI table directly (bsc#1084452).
- tracing: probeevent: Fix to support minus offset from symbol (bnc#1012382).
- tty/serial: atmel: add new version check for usart (bnc#1012382).
- tty: vt: fix up tabstops properly (bnc#1012382).
- uas: fix comparison for error code (bnc#1012382).
- ubi: Fix race condition between ubi volume creation and udev (bnc#1012382).
- udplite: fix partial checksum initialization (bnc#1012382).
- usb: Do not print a warning if interface driver rebind is deferred at resume (bsc#1087211).
- usb: dwc2: Make sure we disconnect the gadget state (bnc#1012382).
- usb: gadget: bdc: 64-bit pointer capability check (bnc#1012382).
- usb: gadget: dummy_hcd: Fix wrong power status bit clear/reset in dummy_hub_control() (bnc#1012382).
- usb: gadget: f_fs: Fix use-after-free in ffs_fs_kill_sb() (bnc#1012382).
- usb: gadget: udc: Add missing platform_device_put() on error in bdc_pci_probe() (bnc#1012382).
- usb: quirks: add control message delay for 1b1c:1b20 (bnc#1012382).
- usb: storage: Add JMicron bridge 152d:2567 to unusual_devs.h (bnc#1012382).
- usb: usbmon: Read text within supplied buffer size (bnc#1012382).
- usb: usbmon: remove assignment from IS_ERR argument (bnc#1012382).
- veth: set peer GSO values (bnc#1012382).
- vgacon: Set VGA struct resource types (bnc#1012382).
- video: ARM CLCD: fix dma allocation size (bnc#1012382).
- video: fbdev: udlfb: Fix buffer on stack (bnc#1012382).
- video/hdmi: Allow 'empty' HDMI infoframes (bnc#1012382).
- vxlan: vxlan dev should inherit lowerdev's gso_max_size (bnc#1012382).
- wan: pc300too: abort path on failure (bnc#1012382).
- watchdog: hpwdt: Check source of NMI (bnc#1012382).
- watchdog: hpwdt: fix unused variable warning (bnc#1012382).
- watchdog: hpwdt: SMBIOS check (bnc#1012382).
- watchdog: sbsa: use 32-bit read for WCV (bsc#1085679).
- wil6210: fix memory access violation in wil_memcpy_from/toio_32 (bnc#1012382).
- workqueue: Allow retrieval of current task's work struct (bnc#1012382).
- x86/apic/vector: Handle legacy irq data correctly (bnc#1012382).
- x86/boot/64: Verify alignment of the LOAD segment (bnc#1012382).
- x86/build/64: Force the linker to use 2MB page size (bnc#1012382).
- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
- x86: i8259: export legacy_pic symbol (bnc#1012382).
- x86/kaiser: Duplicate cpu_tss for an entry trampoline usage (bsc#1077560 bsc#1083836).
- x86/kaiser: enforce trampoline stack alignment (bsc#1087260).
- x86/kaiser: Remove a user mapping of cpu_tss structure (bsc#1077560 bsc#1083836).
- x86/kaiser: Use a per-CPU trampoline stack for kernel entry (bsc#1077560).
- x86/MCE: Serialize sysfs changes (bnc#1012382).
- x86/mm: Fix vmalloc_fault to use pXd_large (bnc#1012382).
- x86/mm: implement free pmd/pte page interfaces (bnc#1012382).
- x86/module: Detect and skip invalid relocations (bnc#1012382).
- x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist (bsc#1087845).
- x86: Treat R_X86_64_PLT32 as R_X86_64_PC32 (bnc#1012382).
- x86/vm86/32: Fix POPF emulation (bnc#1012382).
- xen-blkfront: fix mq start/stop race (bsc#1085042).
- xen-netback: use skb to determine number of required guest Rx requests (bsc#1046610).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-23"/>
	<updated date="2018-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019695">SUSE bug 1019695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019699">SUSE bug 1019699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022604">SUSE bug 1022604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046610">SUSE bug 1046610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060799">SUSE bug 1060799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064206">SUSE bug 1064206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073059">SUSE bug 1073059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073069">SUSE bug 1073069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075428">SUSE bug 1075428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076033">SUSE bug 1076033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083574">SUSE bug 1083574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083745">SUSE bug 1083745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083836">SUSE bug 1083836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084223">SUSE bug 1084223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084310">SUSE bug 1084310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084328">SUSE bug 1084328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084353">SUSE bug 1084353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084452">SUSE bug 1084452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084610">SUSE bug 1084610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084699">SUSE bug 1084699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084829">SUSE bug 1084829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084889">SUSE bug 1084889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084898">SUSE bug 1084898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084914">SUSE bug 1084914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084918">SUSE bug 1084918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084967">SUSE bug 1084967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085042">SUSE bug 1085042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085058">SUSE bug 1085058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085383">SUSE bug 1085383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085402">SUSE bug 1085402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085404">SUSE bug 1085404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085487">SUSE bug 1085487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085507">SUSE bug 1085507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085511">SUSE bug 1085511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085679">SUSE bug 1085679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085981">SUSE bug 1085981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086015">SUSE bug 1086015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086162">SUSE bug 1086162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086194">SUSE bug 1086194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086357">SUSE bug 1086357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086499">SUSE bug 1086499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086518">SUSE bug 1086518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086607">SUSE bug 1086607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087211">SUSE bug 1087211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087231">SUSE bug 1087231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087260">SUSE bug 1087260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087274">SUSE bug 1087274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087659">SUSE bug 1087659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087845">SUSE bug 1087845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087906">SUSE bug 1087906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087999">SUSE bug 1087999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088050">SUSE bug 1088050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088087">SUSE bug 1088087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088241">SUSE bug 1088241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088267">SUSE bug 1088267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088313">SUSE bug 1088313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088324">SUSE bug 1088324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088600">SUSE bug 1088600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088684">SUSE bug 1088684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088871">SUSE bug 1088871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802154">SUSE bug 802154</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-18257/">CVE-2017-18257 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18257">CVE-2017-18257 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1091/">CVE-2018-1091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1091">CVE-2018-1091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7740/">CVE-2018-7740 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7740">CVE-2018-7740 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8043/">CVE-2018-8043 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8043">CVE-2018-8043 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8822">CVE-2018-8822 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553704" comment="kernel-default-4.4.126-94.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553705" comment="kernel-default-base-4.4.126-94.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553706" comment="kernel-default-devel-4.4.126-94.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553707" comment="kernel-default-man-4.4.126-94.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520663" comment="kernel-devel-4.4.126-94.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520664" comment="kernel-macros-4.4.126-94.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520665" comment="kernel-source-4.4.126-94.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553708" comment="kernel-syms-4.4.126-94.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149711" version="1" class="patch">
	<metadata>
		<title>Security update for PackageKit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1086936" ref_url="https://bugzilla.suse.com/1086936" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1106" ref_url="https://www.suse.com/security/cve/CVE-2018-1106/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003953.html" source="SUSE-SU"/>
		<description>

    
- CVE-2018-1106: Drop the polkit rule which could allow users in wheel group to install 
                 packages without root password (bsc#1086936).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-23"/>
	<updated date="2018-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1086936">SUSE bug 1086936</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1106/">CVE-2018-1106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1106">CVE-2018-1106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553709" comment="PackageKit-1.1.3-24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553710" comment="PackageKit-backend-zypp-1.1.3-24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520671" comment="PackageKit-lang-1.1.3-24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553711" comment="libpackagekit-glib2-18-1.1.3-24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553712" comment="typelib-1_0-PackageKitGlib-1_0-1.1.3-24.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149712" version="1" class="patch">
	<metadata>
		<title>Security update for rzsz (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1076576" ref_url="https://bugzilla.suse.com/1076576" source="BUGZILLA"/>
		<reference ref_id="1086416" ref_url="https://bugzilla.suse.com/1086416" source="BUGZILLA"/>
		<reference ref_id="1090051" ref_url="https://bugzilla.suse.com/1090051" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10195" ref_url="https://www.suse.com/security/cve/CVE-2018-10195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003955.html" source="SUSE-SU"/>
		<description>
This update for rzsz fixes the following issues:

- Update to 0.12.21~rc to fix bsc#1086416 and bsc#1090051 

- CVE-2018-10195: segmentation fault in zsdata function could lead to denial of service (bsc#1090051)

 		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-24"/>
	<updated date="2018-04-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076576">SUSE bug 1076576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086416">SUSE bug 1086416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090051">SUSE bug 1090051</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10195/">CVE-2018-10195 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10195">CVE-2018-10195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553713" comment="rzsz-0.12.21~rc-1001.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149713" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1082216" ref_url="https://bugzilla.suse.com/1082216" source="BUGZILLA"/>
		<reference ref_id="1082233" ref_url="https://bugzilla.suse.com/1082233" source="BUGZILLA"/>
		<reference ref_id="1082234" ref_url="https://bugzilla.suse.com/1082234" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6797" ref_url="https://www.suse.com/security/cve/CVE-2018-6797/" source="CVE"/>
		<reference ref_id="CVE-2018-6798" ref_url="https://www.suse.com/security/cve/CVE-2018-6798/" source="CVE"/>
		<reference ref_id="CVE-2018-6913" ref_url="https://www.suse.com/security/cve/CVE-2018-6913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003958.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

Security issues fixed:

- CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216).
- CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233).
- CVE-2018-6797: Fixed sharp-s regexp overflow (bsc#1082234).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-25"/>
	<updated date="2018-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082216">SUSE bug 1082216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082233">SUSE bug 1082233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082234">SUSE bug 1082234</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6797/">CVE-2018-6797 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6797">CVE-2018-6797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6798/">CVE-2018-6798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6798">CVE-2018-6798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6913/">CVE-2018-6913 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6913">CVE-2018-6913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553714" comment="perl-5.18.2-12.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553715" comment="perl-32bit-5.18.2-12.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553716" comment="perl-base-5.18.2-12.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520678" comment="perl-doc-5.18.2-12.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149714" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1082885" ref_url="https://bugzilla.suse.com/1082885" source="BUGZILLA"/>
		<reference ref_id="1082975" ref_url="https://bugzilla.suse.com/1082975" source="BUGZILLA"/>
		<reference ref_id="1082977" ref_url="https://bugzilla.suse.com/1082977" source="BUGZILLA"/>
		<reference ref_id="1082991" ref_url="https://bugzilla.suse.com/1082991" source="BUGZILLA"/>
		<reference ref_id="1082998" ref_url="https://bugzilla.suse.com/1082998" source="BUGZILLA"/>
		<reference ref_id="1083002" ref_url="https://bugzilla.suse.com/1083002" source="BUGZILLA"/>
		<reference ref_id="1083250" ref_url="https://bugzilla.suse.com/1083250" source="BUGZILLA"/>
		<reference ref_id="1084656" ref_url="https://bugzilla.suse.com/1084656" source="BUGZILLA"/>
		<reference ref_id="1087026" ref_url="https://bugzilla.suse.com/1087026" source="BUGZILLA"/>
		<reference ref_id="896914" ref_url="https://bugzilla.suse.com/896914" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-10070" ref_url="https://www.suse.com/security/cve/CVE-2014-10070/" source="CVE"/>
		<reference ref_id="CVE-2014-10071" ref_url="https://www.suse.com/security/cve/CVE-2014-10071/" source="CVE"/>
		<reference ref_id="CVE-2014-10072" ref_url="https://www.suse.com/security/cve/CVE-2014-10072/" source="CVE"/>
		<reference ref_id="CVE-2016-10714" ref_url="https://www.suse.com/security/cve/CVE-2016-10714/" source="CVE"/>
		<reference ref_id="CVE-2017-18205" ref_url="https://www.suse.com/security/cve/CVE-2017-18205/" source="CVE"/>
		<reference ref_id="CVE-2017-18206" ref_url="https://www.suse.com/security/cve/CVE-2017-18206/" source="CVE"/>
		<reference ref_id="CVE-2018-1071" ref_url="https://www.suse.com/security/cve/CVE-2018-1071/" source="CVE"/>
		<reference ref_id="CVE-2018-1083" ref_url="https://www.suse.com/security/cve/CVE-2018-1083/" source="CVE"/>
		<reference ref_id="CVE-2018-7549" ref_url="https://www.suse.com/security/cve/CVE-2018-7549/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003957.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

  - CVE-2014-10070: environment variable injection could lead to local privilege escalation (bnc#1082885)

  - CVE-2014-10071: buffer overflow in exec.c could lead to denial of service. (bnc#1082977)

  - CVE-2014-10072: buffer overflow In utils.c when scanning 
very long directory paths for symbolic links. (bnc#1082975)

  - CVE-2016-10714: In zsh before 5.3, an off-by-one error resulted in 
undersized buffers that were intended to support PATH_MAX characters. (bnc#1083250)

  - CVE-2017-18205: In builtin.c when sh compatibility mode is used, a NULL pointer dereference 
could lead to denial of service (bnc#1082998)

  - CVE-2018-1071: exec.c:hashcmd() function vulnerability could lead to denial of service. (bnc#1084656)
 
  - CVE-2018-1083: Autocomplete vulnerability could lead to privilege escalation. (bnc#1087026)

  - CVE-2018-7549: In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, 
as demonstrated by typeset -p. (bnc#1082991)
  
  - CVE-2017-18206: buffer overrun in xsymlinks could lead to denial of service (bnc#1083002)
    
  - Autocomplete and REPORTTIME broken (bsc#896914)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-25"/>
	<updated date="2018-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082885">SUSE bug 1082885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082975">SUSE bug 1082975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082977">SUSE bug 1082977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082991">SUSE bug 1082991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082998">SUSE bug 1082998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083002">SUSE bug 1083002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083250">SUSE bug 1083250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084656">SUSE bug 1084656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087026">SUSE bug 1087026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896914">SUSE bug 896914</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-10070/">CVE-2014-10070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-10070">CVE-2014-10070 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10071/">CVE-2014-10071 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-10071">CVE-2014-10071 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10072/">CVE-2014-10072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-10072">CVE-2014-10072 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10714/">CVE-2016-10714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10714">CVE-2016-10714 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18205/">CVE-2017-18205 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18205">CVE-2017-18205 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18206/">CVE-2017-18206 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18206">CVE-2017-18206 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1071/">CVE-2018-1071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1071">CVE-2018-1071 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1083/">CVE-2018-1083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1083">CVE-2018-1083 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7549/">CVE-2018-7549 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7549">CVE-2018-7549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553717" comment="zsh-5.0.5-6.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149715" version="1" class="patch">
	<metadata>
		<title>Recommended update for LibreOffice (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1042829" ref_url="https://bugzilla.suse.com/1042829" source="BUGZILLA"/>
		<reference ref_id="1077375" ref_url="https://bugzilla.suse.com/1077375" source="BUGZILLA"/>
		<reference ref_id="1080249" ref_url="https://bugzilla.suse.com/1080249" source="BUGZILLA"/>
		<reference ref_id="1083213" ref_url="https://bugzilla.suse.com/1083213" source="BUGZILLA"/>
		<reference ref_id="1083993" ref_url="https://bugzilla.suse.com/1083993" source="BUGZILLA"/>
		<reference ref_id="1088662" ref_url="https://bugzilla.suse.com/1088662" source="BUGZILLA"/>
		<reference ref_id="1089124" ref_url="https://bugzilla.suse.com/1089124" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9432" ref_url="https://www.suse.com/security/cve/CVE-2017-9432/" source="CVE"/>
		<reference ref_id="CVE-2017-9433" ref_url="https://www.suse.com/security/cve/CVE-2017-9433/" source="CVE"/>
		<reference ref_id="CVE-2018-1055" ref_url="https://www.suse.com/security/cve/CVE-2018-1055/" source="CVE"/>
		<reference ref_id="CVE-2018-6871" ref_url="https://www.suse.com/security/cve/CVE-2018-6871/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003960.html" source="SUSE-SU"/>
		<description>

LibreOffice was updated to version 6.0.3.

Following new features were added:

- The Notebookbar, although still an experimental feature, has been
  enriched with two new variants: Grouped Bar Full for Writer, Calc and
  Impress, and Tabbed Compact for Writer. The Special Characters dialog
  has been reworked, with the addition of lists for Recent and Favorite
  characters, along with a Search field. The Customize dialog has also
  been redesigned, and is now more modern and intuitive.
- In Writer, a Form menu has been added, making it easier to access one
  of the most powerful – and often unknown – LibreOffice features: the
  ability to design forms, and create standards-compliant PDF forms. The
  Find toolbar has been enhanced with a drop-down list of search types, to
  speed up navigation. A new default table style has been added, together
  with a new collection of table styles to reflect evolving visual trends.
- The Mail Merge function has been improved, and it is now possible to
  use either a Writer document or an XLSX file as data source.
- In Calc, ODF 1.2-compliant functions SEARCHB, FINDB and REPLACEB have
  been added, to improve support for the ISO standard format. Also, a
  cell range selection or a selected group of shapes (images) can be now
  exported in PNG or JPG format.
- In Impress, the default slide size has been switched to 16:9, to support
  the most recent form factors of screens and projectors. As a consequence,
  10 new Impress templates have been added, and a couple of old templates
  have been updated.

Changes in components:

- The old WikiHelp has been replaced by the new Help Online system, with
  attractive web pages that can also be displayed on mobile devices. In
  general, LibreOffice Help has been updated both in terms of contents and
  code, with other improvements due all along the life of the LibreOffice
  6 family.
- User dictionaries now allow automatic affixation or compounding. This
  is a general spell checking improvement in LibreOffice which can speed
  up work for Writer users. Instead of manually handling several forms of a
  new word in a language with rich morphology or compounding, the Hunspell
  spell checker can automatically recognize a new word with affixes or
  compounds, based on a “Grammar By” model.

Security features and changes:

- OpenPGP keys can be used to sign ODF documents on all desktop operating
  systems, with experimental support for OpenPGP-based encryption. To enable
  this feature, users will have to install the specific GPG software for
  their operating systems.

- Document classification has also been improved, and allows multiple
  policies (which are now exported to OOXML files). In Writer, marking
  and signing are now supported at paragraph level.

Interoperability changes:

- OOXML interoperability has been improved in several areas: import of
  SmartArt and import/export of ActiveX controls, support of embedded text
  documents and spreadsheets, export of embedded videos to PPTX, export
  of cross-references to DOCX, export of MailMerge fields to DOCX, and
  improvements to the PPTX filter to prevent the creation of broken files.
- New filters for exporting Writer documents to ePub and importing
  QuarkXPress files have also been added, together with an improved filter
  for importing EMF+ (Enhanced Metafile Format Plus) files as used by
  Microsoft Office documents. Some improvements have also been added
  to the ODF export filter, making it easier for other ODF readers to
  display visuals.

The full blog entry for the 6.0 release can be found here:

	https://blog.documentfoundation.org/blog/2018/01/31/libreoffice-6/

The full release notes can be found here:

	https://wiki.documentfoundation.org/ReleaseNotes/6.0

The libraries that LibreOffice depends on also have been udpated to their current versions.
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-25"/>
	<updated date="2018-04-25"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1042829">SUSE bug 1042829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077375">SUSE bug 1077375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080249">SUSE bug 1080249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083213">SUSE bug 1083213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083993">SUSE bug 1083993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088662">SUSE bug 1088662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089124">SUSE bug 1089124</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9432/">CVE-2017-9432 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9432">CVE-2017-9432 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9433/">CVE-2017-9433 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9433">CVE-2017-9433 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1055/">CVE-2018-1055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-1055">CVE-2018-1055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6871/">CVE-2018-6871 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6871">CVE-2018-6871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520680" comment="boost-license1_54_0-1.54.0-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553718" comment="libboost_atomic1_54_0-1.54.0-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553719" comment="libboost_date_time1_54_0-1.54.0-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553720" comment="libboost_iostreams1_54_0-1.54.0-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553721" comment="libboost_program_options1_54_0-1.54.0-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553722" comment="libboost_random1_54_0-1.54.0-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553723" comment="libboost_regex1_54_0-1.54.0-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553724" comment="libboost_signals1_54_0-1.54.0-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553725" comment="libboost_system1_54_0-1.54.0-26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553726" comment="libboost_thread1_54_0-1.54.0-26.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149716" version="1" class="patch">
	<metadata>
		<title>security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1090089" ref_url="https://bugzilla.suse.com/1090089" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1172" ref_url="https://www.suse.com/security/cve/CVE-2018-1172/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003968.html" source="SUSE-SU"/>
		<description>

  This update fixes the following issues:
  
  -  CVE-2018-1172: Squid Proxy Cache Denial of Service vulnerability (bsc#1090089).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-02"/>
	<updated date="2018-05-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1090089">SUSE bug 1090089</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1172/">CVE-2018-1172 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1172">CVE-2018-1172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553727" comment="squid-3.5.21-26.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149717" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1082826" ref_url="https://bugzilla.suse.com/1082826" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14461" ref_url="https://www.suse.com/security/cve/CVE-2017-14461/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003969.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2017-14461: dovecot22: rfc822_parse_domain (bsc#1082826)
  Information Leak Vulnerability  

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-02"/>
	<updated date="2018-05-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082826">SUSE bug 1082826</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14461/">CVE-2017-14461 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14461">CVE-2017-14461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553728" comment="dovecot22-2.2.31-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553729" comment="dovecot22-backend-mysql-2.2.31-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553730" comment="dovecot22-backend-pgsql-2.2.31-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553731" comment="dovecot22-backend-sqlite-2.2.31-19.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149718" version="1" class="patch">
	<metadata>
		<title>Security update for patch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1080918" ref_url="https://bugzilla.suse.com/1080918" source="BUGZILLA"/>
		<reference ref_id="1080951" ref_url="https://bugzilla.suse.com/1080951" source="BUGZILLA"/>
		<reference ref_id="1088420" ref_url="https://bugzilla.suse.com/1088420" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10713" ref_url="https://www.suse.com/security/cve/CVE-2016-10713/" source="CVE"/>
		<reference ref_id="CVE-2018-1000156" ref_url="https://www.suse.com/security/cve/CVE-2018-1000156/" source="CVE"/>
		<reference ref_id="CVE-2018-6951" ref_url="https://www.suse.com/security/cve/CVE-2018-6951/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003970.html" source="SUSE-SU"/>
		<description>
This update for patch fixes the following issues:

Security issues fixed:

- CVE-2018-1000156: Malicious patch files cause ed to execute arbitrary commands (bsc#1088420).
- CVE-2018-6951: Fixed NULL pointer dereference in the intuit_diff_type function in pch.c (bsc#1080918).
- CVE-2016-10713: Fixed out-of-bounds access within pch_write_line() in pch.c (bsc#1080918).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-02"/>
	<updated date="2018-05-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1080918">SUSE bug 1080918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080951">SUSE bug 1080951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088420">SUSE bug 1088420</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10713/">CVE-2016-10713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10713">CVE-2016-10713 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000156/">CVE-2018-1000156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000156">CVE-2018-1000156 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6951/">CVE-2018-6951 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6951">CVE-2018-6951 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553732" comment="patch-2.7.5-8.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149719" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003562.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- Add microcode_amd_fam17h.bin (bsc#1068032 CVE-2017-5715)

This new firmware disables branch prediction on AMD family 17h
processor to mitigate a attack on the branch predictor that could
lead to information disclosure from e.g. kernel memory (bsc#1068032
CVE-2017-5715).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519174" comment="kernel-firmware-20170530-21.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519175" comment="ucode-amd-20170530-21.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149720" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003600.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

This update is only provided as a fix update for IBM Z platform.

- CVE-2017-5753 / 'Spectre Attack': IBM Z fixes were included but not enabled in the previous update. This update enables those fixes.
- CVE-2017-5715 / 'Spectre Attack': IBM Z fixes were already included in the previous update. A bugfix for the patches has been applied on top.
- CVE-2017-5754: The IBM Z architecture is not affected by the 'Meltdown' attack.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-16"/>
	<updated date="2018-01-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553733" comment="kernel-default-4.4.103-94.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553734" comment="kernel-default-base-4.4.103-94.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553735" comment="kernel-default-devel-4.4.103-94.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553736" comment="kernel-default-man-4.4.103-94.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553737" comment="kernel-devel-4.4.103-94.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553738" comment="kernel-macros-4.4.103-94.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553739" comment="kernel-source-4.4.103-94.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553740" comment="kernel-syms-4.4.103-94.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149721" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1086774" ref_url="https://bugzilla.suse.com/1086774" source="BUGZILLA"/>
		<reference ref_id="1086775" ref_url="https://bugzilla.suse.com/1086775" source="BUGZILLA"/>
		<reference ref_id="1086813" ref_url="https://bugzilla.suse.com/1086813" source="BUGZILLA"/>
		<reference ref_id="1086814" ref_url="https://bugzilla.suse.com/1086814" source="BUGZILLA"/>
		<reference ref_id="1086817" ref_url="https://bugzilla.suse.com/1086817" source="BUGZILLA"/>
		<reference ref_id="1086820" ref_url="https://bugzilla.suse.com/1086820" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15710" ref_url="https://www.suse.com/security/cve/CVE-2017-15710/" source="CVE"/>
		<reference ref_id="CVE-2017-15715" ref_url="https://www.suse.com/security/cve/CVE-2017-15715/" source="CVE"/>
		<reference ref_id="CVE-2018-1283" ref_url="https://www.suse.com/security/cve/CVE-2018-1283/" source="CVE"/>
		<reference ref_id="CVE-2018-1301" ref_url="https://www.suse.com/security/cve/CVE-2018-1301/" source="CVE"/>
		<reference ref_id="CVE-2018-1302" ref_url="https://www.suse.com/security/cve/CVE-2018-1302/" source="CVE"/>
		<reference ref_id="CVE-2018-1303" ref_url="https://www.suse.com/security/cve/CVE-2018-1303/" source="CVE"/>
		<reference ref_id="CVE-2018-1312" ref_url="https://www.suse.com/security/cve/CVE-2018-1312/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003974.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

  * CVE-2018-1283:  when mod_session is configured to forward its session data to CGI applications 
                    (SessionEnv on, not the default), a remote user may influence their content by 
                    using a \'Session\' header leading to unexpected behavior [bsc#1086814].

  * CVE-2018-1301: due to an out of bound access after a size limit being reached by reading the HTTP header, 
                   a specially crafted request could lead to remote denial of service. [bsc#1086817]
  
  * CVE-2018-1303: a specially crafted HTTP request header could lead to crash due to an out of bound read 
                   while preparing data to be cached in shared memory.[bsc#1086813]
  
  * CVE-2017-15715: a regular expression could match '$' to a newline character in a malicious filename, 
                    rather than matching only the end of the filename. leading to corruption of uploaded files.[bsc#1086774]
  
  * CVE-2018-1312: when generating an HTTP Digest authentication challenge, the nonce sent to prevent 
                   reply attacks was not correctly generated using a pseudo-random seed. 
                   In a cluster of servers using a common Digest authentication configuration, 
                   HTTP requests could be replayed across servers by an attacker without detection. [bsc#1086775]
  
  * CVE-2017-15710: mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, 
                    uses the Accept-Language header value to lookup the right charset encoding when verifying the 
                    user's credentials. If the header value is not present in the charset conversion table, 
                    a fallback mechanism is used to truncate it to a two characters value to allow a quick retry 
                    (for example, 'en-US' is truncated to 'en'). 
                    A header value of less than two characters forces an out of bound write of one NUL byte to a 
                   memory location that is not part of the string. In the worst case, quite unlikely, the process 
                   would crash which could be used as a Denial of Service attack. In the more likely case, this memory 
                   is already reserved for future use and the issue has no effect at all. [bsc#1086820]
  
  * CVE-2018-1302: when an HTTP/2 stream was destroyed after being handled, it 
                   could have written a NULL pointer potentially to an already freed memory. 
                   The memory pools maintained by the server make this vulnerability hard to trigger in usual configurations, 
                   the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk. 
                   [bsc#1086820]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-07"/>
	<updated date="2018-05-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086774">SUSE bug 1086774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086775">SUSE bug 1086775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086813">SUSE bug 1086813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086814">SUSE bug 1086814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086817">SUSE bug 1086817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086820">SUSE bug 1086820</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15710/">CVE-2017-15710 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15710">CVE-2017-15710 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15715/">CVE-2017-15715 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15715">CVE-2017-15715 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1283/">CVE-2018-1283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1283">CVE-2018-1283 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1301/">CVE-2018-1301 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1301">CVE-2018-1301 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1302/">CVE-2018-1302 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1302">CVE-2018-1302 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1303/">CVE-2018-1303 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1303">CVE-2018-1303 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1312/">CVE-2018-1312 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1312">CVE-2018-1312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553741" comment="apache2-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536748" comment="apache2-doc-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553742" comment="apache2-example-pages-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553743" comment="apache2-prefork-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553744" comment="apache2-utils-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553745" comment="apache2-worker-2.4.23-29.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149722" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1047356" ref_url="https://bugzilla.suse.com/1047356" source="BUGZILLA"/>
		<reference ref_id="1058635" ref_url="https://bugzilla.suse.com/1058635" source="BUGZILLA"/>
		<reference ref_id="1074117" ref_url="https://bugzilla.suse.com/1074117" source="BUGZILLA"/>
		<reference ref_id="1086773" ref_url="https://bugzilla.suse.com/1086773" source="BUGZILLA"/>
		<reference ref_id="1086782" ref_url="https://bugzilla.suse.com/1086782" source="BUGZILLA"/>
		<reference ref_id="1087027" ref_url="https://bugzilla.suse.com/1087027" source="BUGZILLA"/>
		<reference ref_id="1087033" ref_url="https://bugzilla.suse.com/1087033" source="BUGZILLA"/>
		<reference ref_id="1087037" ref_url="https://bugzilla.suse.com/1087037" source="BUGZILLA"/>
		<reference ref_id="1087039" ref_url="https://bugzilla.suse.com/1087039" source="BUGZILLA"/>
		<reference ref_id="1087825" ref_url="https://bugzilla.suse.com/1087825" source="BUGZILLA"/>
		<reference ref_id="1089781" ref_url="https://bugzilla.suse.com/1089781" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476/" source="CVE"/>
		<reference ref_id="CVE-2017-10928" ref_url="https://www.suse.com/security/cve/CVE-2017-10928/" source="CVE"/>
		<reference ref_id="CVE-2017-11450" ref_url="https://www.suse.com/security/cve/CVE-2017-11450/" source="CVE"/>
		<reference ref_id="CVE-2017-14325" ref_url="https://www.suse.com/security/cve/CVE-2017-14325/" source="CVE"/>
		<reference ref_id="CVE-2017-17887" ref_url="https://www.suse.com/security/cve/CVE-2017-17887/" source="CVE"/>
		<reference ref_id="CVE-2017-18250" ref_url="https://www.suse.com/security/cve/CVE-2017-18250/" source="CVE"/>
		<reference ref_id="CVE-2017-18251" ref_url="https://www.suse.com/security/cve/CVE-2017-18251/" source="CVE"/>
		<reference ref_id="CVE-2017-18252" ref_url="https://www.suse.com/security/cve/CVE-2017-18252/" source="CVE"/>
		<reference ref_id="CVE-2017-18254" ref_url="https://www.suse.com/security/cve/CVE-2017-18254/" source="CVE"/>
		<reference ref_id="CVE-2018-10177" ref_url="https://www.suse.com/security/cve/CVE-2018-10177/" source="CVE"/>
		<reference ref_id="CVE-2018-8960" ref_url="https://www.suse.com/security/cve/CVE-2018-8960/" source="CVE"/>
		<reference ref_id="CVE-2018-9018" ref_url="https://www.suse.com/security/cve/CVE-2018-9018/" source="CVE"/>
		<reference ref_id="CVE-2018-9135" ref_url="https://www.suse.com/security/cve/CVE-2018-9135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2017-14325: In ImageMagick, a memory leak vulnerability was found in
  the function PersistPixelCache in magick/cache.c, which allowed attackers
  to cause a denial of service (memory consumption in ReadMPCImage in
  coders/mpc.c) via a crafted file.  [bsc#1058635]
- CVE-2017-17887: In ImageMagick, a memory leak vulnerability was found
  in the function GetImagePixelCache in magick/cache.c, which allowed
  attackers to cause a denial of service via a crafted MNG image file that
  is processed by ReadOneMNGImage.  [bsc#1074117]
- CVE-2017-18250: A NULL pointer dereference vulnerability was found in the function 
  LogOpenCLBuildFailure in MagickCore/opencl.c, which could lead to a denial of service 
  via a crafted file. [bsc#1087039]
- CVE-2017-18251: A memory leak vulnerability was found in the function ReadPCDImage in coders/pcd.c, 
  which could lead to a denial of service via a crafted file. [bsc#1087037]
- CVE-2017-18252: The MogrifyImageList function in MagickWand/mogrify.c could allow 
  attackers to cause a denial of service via a crafted file. [bsc#1087033]
- CVE-2017-18254: A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, 
  which could lead to  denial of service via a crafted file. [bsc#1087027]
- CVE-2018-8960: The ReadTIFFImage function in coders/tiff.c in
  ImageMagick did not properly restrict memory allocation, leading to a
  heap-based buffer over-read.  [bsc#1086782]
- CVE-2018-9018: divide-by-zero in the ReadMNGImage function of coders/png.c. 
  Attackers could leverage this vulnerability to cause a crash and denial of service 
  via a crafted mng file. [bsc#1086773]
- CVE-2018-9135: heap-based buffer over-read in IsWEBPImageLossless in coders/webp.c 
  could lead to denial of service. [bsc#1087825]
- CVE-2018-10177: In ImageMagick, there was an infinite loop in the
  ReadOneMNGImage function of the coders/png.c file. Remote attackers
  could leverage this vulnerability to cause a denial of service via a
  crafted mng file.  [bsc#1089781]
- CVE-2017-10928: a heap-based buffer over-read in the GetNextToken function in token.c 
  could allow attackers to obtain sensitive information from process memory or possibly have 
  unspecified other impact via a crafted SVG document that is mishandled in the 
  GetUserSpaceCoordinateValue function in coders/svg.c. [bsc#1047356]

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-09"/>
	<updated date="2018-05-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047356">SUSE bug 1047356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058635">SUSE bug 1058635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074117">SUSE bug 1074117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086773">SUSE bug 1086773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086782">SUSE bug 1086782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087027">SUSE bug 1087027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087033">SUSE bug 1087033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087037">SUSE bug 1087037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087039">SUSE bug 1087039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087825">SUSE bug 1087825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089781">SUSE bug 1089781</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000476">CVE-2017-1000476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10928/">CVE-2017-10928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10928">CVE-2017-10928 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11450/">CVE-2017-11450 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11450">CVE-2017-11450 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14325/">CVE-2017-14325 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14325">CVE-2017-14325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17887/">CVE-2017-17887 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17887">CVE-2017-17887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18250/">CVE-2017-18250 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18250">CVE-2017-18250 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18251/">CVE-2017-18251 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18251">CVE-2017-18251 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18252/">CVE-2017-18252 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18252">CVE-2017-18252 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18254/">CVE-2017-18254 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18254">CVE-2017-18254 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10177/">CVE-2018-10177 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10177">CVE-2018-10177 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8960/">CVE-2018-8960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8960">CVE-2018-8960 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9018/">CVE-2018-9018 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9018">CVE-2018-9018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-9135/">CVE-2018-9135 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9135">CVE-2018-9135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553746" comment="libMagickCore-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553747" comment="libMagickWand-6_Q16-1-6.8.8.1-71.54.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149723" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1046077" ref_url="https://bugzilla.suse.com/1046077" source="BUGZILLA"/>
		<reference ref_id="1074318" ref_url="https://bugzilla.suse.com/1074318" source="BUGZILLA"/>
		<reference ref_id="1081690" ref_url="https://bugzilla.suse.com/1081690" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17973" ref_url="https://www.suse.com/security/cve/CVE-2017-17973/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<reference ref_id="CVE-2018-5784" ref_url="https://www.suse.com/security/cve/CVE-2018-5784/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003985.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2017-9935: There was a heap-based buffer overflow in the t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could lead to different damages. For example, a crafted TIFF document can lead to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free in t2p_free. Given these possibilities, it probably could cause arbitrary code execution (bsc#1046077)
- CVE-2017-17973: There is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. (bsc#1074318)
- CVE-2018-5784: There is an uncontrolled resource consumption in the TIFFSetDirectory function of tif_dir.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tif file. This occurs because the declared number of directory entries is not validated against the actual number of directory entries (bsc#1081690)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-09"/>
	<updated date="2018-05-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046077">SUSE bug 1046077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074318">SUSE bug 1074318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081690">SUSE bug 1081690</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17973/">CVE-2017-17973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17973">CVE-2017-17973 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9935">CVE-2017-9935 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5784/">CVE-2018-5784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5784">CVE-2018-5784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553748" comment="libtiff5-4.0.9-44.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553749" comment="libtiff5-32bit-4.0.9-44.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553750" comment="tiff-4.0.9-44.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149724" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1072834" ref_url="https://bugzilla.suse.com/1072834" source="BUGZILLA"/>
		<reference ref_id="1080634" ref_url="https://bugzilla.suse.com/1080634" source="BUGZILLA"/>
		<reference ref_id="1080635" ref_url="https://bugzilla.suse.com/1080635" source="BUGZILLA"/>
		<reference ref_id="1080662" ref_url="https://bugzilla.suse.com/1080662" source="BUGZILLA"/>
		<reference ref_id="1087251" ref_url="https://bugzilla.suse.com/1087251" source="BUGZILLA"/>
		<reference ref_id="1087252" ref_url="https://bugzilla.suse.com/1087252" source="BUGZILLA"/>
		<reference ref_id="1089152" ref_url="https://bugzilla.suse.com/1089152" source="BUGZILLA"/>
		<reference ref_id="1089635" ref_url="https://bugzilla.suse.com/1089635" source="BUGZILLA"/>
		<reference ref_id="1090820" ref_url="https://bugzilla.suse.com/1090820" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471/" source="CVE"/>
		<reference ref_id="CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472/" source="CVE"/>
		<reference ref_id="CVE-2018-7540" ref_url="https://www.suse.com/security/cve/CVE-2018-7540/" source="CVE"/>
		<reference ref_id="CVE-2018-7541" ref_url="https://www.suse.com/security/cve/CVE-2018-7541/" source="CVE"/>
		<reference ref_id="CVE-2018-7542" ref_url="https://www.suse.com/security/cve/CVE-2018-7542/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003988.html" source="SUSE-SU"/>
		<description>
This update for xen to version 4.9.2 fixes several issues.

This feature was added:

- Added script, udev rule and systemd service to watch for vcpu online/offline
  events in a HVM domU. They are triggered via 'xl vcpu-set domU N'

These security issues were fixed:

- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)
- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy
  HVM guests from causing a hypervisor crash or potentially privilege
  escalation/information leaks (XSA-261, bsc#1090822)
- Prevent unbounded loop, induced by qemu allowing an attacker to permanently
  keep a physical CPU core busy (XSA-262, bsc#1090823)
- CVE-2018-10472: x86 HVM guest OS users (in certain configurations) were able
  to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction
  with specifying the target file as the backing file of a snapshot
  (bsc#1089152).
- CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service
  (out-of-bounds zero write and hypervisor crash) via unexpected INT 80
  processing, because of an incorrect fix for CVE-2017-5754 (bsc#1089635).
- CVE-2018-7540: x86 PV guest OS users were able to cause a denial of service
  (host OS CPU hang) via non-preemptable L3/L4 pagetable freeing (bsc#1080635).
- CVE-2018-7541: Guest OS users were able to cause a denial of service
  (hypervisor crash) or gain privileges by triggering a grant-table transition
  from v2 to v1 (bsc#1080662).
- CVE-2018-7542: x86 PVH guest OS users were able to cause a denial of service
  (NULL pointer dereference and hypervisor crash) by leveraging the mishandling
  of configurations that lack a Local APIC (bsc#1080634).

These non-security issues were fixed:

- bsc#1087252: Update built-in defaults for xenstored in stubdom, keep default
  to run xenstored as daemon in dom0
- bsc#1087251: Preserve xen-syms from xen-dbg.gz to allow processing vmcores
  with crash(1) 
- bsc#1072834: Prevent unchecked MSR access error
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-09"/>
	<updated date="2018-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072834">SUSE bug 1072834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080634">SUSE bug 1080634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080635">SUSE bug 1080635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080662">SUSE bug 1080662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087251">SUSE bug 1087251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087252">SUSE bug 1087252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089152">SUSE bug 1089152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089635">SUSE bug 1089635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090820">SUSE bug 1090820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10471">CVE-2018-10471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10472">CVE-2018-10472 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7540/">CVE-2018-7540 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7540">CVE-2018-7540 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7541/">CVE-2018-7541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7541">CVE-2018-7541 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7542/">CVE-2018-7542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7542">CVE-2018-7542 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8897">CVE-2018-8897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520889" comment="xen-4.9.2_04-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553751" comment="xen-doc-html-4.9.2_04-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520890" comment="xen-libs-4.9.2_04-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520891" comment="xen-libs-32bit-4.9.2_04-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553752" comment="xen-tools-4.9.2_04-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553753" comment="xen-tools-domU-4.9.2_04-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149725" version="1" class="patch">
	<metadata>
		<title>Security update for libapr1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1064982" ref_url="https://bugzilla.suse.com/1064982" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12613" ref_url="https://www.suse.com/security/cve/CVE-2017-12613/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003992.html" source="SUSE-SU"/>
		<description>

  This update fixes the following issues:
  
  -  CVE-2017-12613: DoS or information disclosure in pr_exp_time*() or apr_os_exp_time*() functions (bsc#1064982).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-09"/>
	<updated date="2018-05-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064982">SUSE bug 1064982</bugzilla>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12613/">CVE-2017-12613 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12613">CVE-2017-12613 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541942" comment="libapr1-1.5.1-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149726" version="1" class="patch">
	<metadata>
		<title>Security update for cairo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1049092" ref_url="https://bugzilla.suse.com/1049092" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9814" ref_url="https://www.suse.com/security/cve/CVE-2017-9814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003991.html" source="SUSE-SU"/>
		<description>
This update for cairo fixes the following issues:

  - CVE-2017-9814: out-of-bounds read in cairo-truetype-subset.c could lead to denial of service (bsc#1049092).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-09"/>
	<updated date="2018-05-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049092">SUSE bug 1049092</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9814/">CVE-2017-9814 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9814">CVE-2017-9814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553754" comment="libcairo-gobject2-1.15.2-25.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553755" comment="libcairo-gobject2-32bit-1.15.2-25.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553756" comment="libcairo-script-interpreter2-1.15.2-25.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553757" comment="libcairo2-1.15.2-25.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553758" comment="libcairo2-32bit-1.15.2-25.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149727" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1028842" ref_url="https://bugzilla.suse.com/1028842" source="BUGZILLA"/>
		<reference ref_id="1062063" ref_url="https://bugzilla.suse.com/1062063" source="BUGZILLA"/>
		<reference ref_id="1066644" ref_url="https://bugzilla.suse.com/1066644" source="BUGZILLA"/>
		<reference ref_id="1071459" ref_url="https://bugzilla.suse.com/1071459" source="BUGZILLA"/>
		<reference ref_id="1071460" ref_url="https://bugzilla.suse.com/1071460" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16548" ref_url="https://www.suse.com/security/cve/CVE-2017-16548/" source="CVE"/>
		<reference ref_id="CVE-2017-17433" ref_url="https://www.suse.com/security/cve/CVE-2017-17433/" source="CVE"/>
		<reference ref_id="CVE-2017-17434" ref_url="https://www.suse.com/security/cve/CVE-2017-17434/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003604.html" source="SUSE-SU"/>
		<description>
This update for rsync fixes several issues.

These security issues were fixed:

- CVE-2017-17434: The daemon in rsync did not check for fnamecmp filenames in
  the daemon_filter_list data structure (in the recv_files function in
  receiver.c) and also did not apply the sanitize_paths protection mechanism to
  pathnames found in 'xname follows' strings (in the read_ndx_and_attrs function
  in rsync.c), which allowed remote attackers to bypass intended access
  restrictions' (bsc#1071460).
- CVE-2017-17433: The recv_files function in receiver.c in the daemon in rsync,
  proceeded with certain file metadata updates before checking for a filename in
  the daemon_filter_list data structure, which allowed remote attackers to bypass
  intended access restrictions (bsc#1071459).
- CVE-2017-16548: The receive_xattr function in xattrs.c in rsync did not check
  for a trailing '\\0' character in an xattr name, which allowed remote attackers
  to cause a denial of service (heap-based buffer over-read and application
  crash) or possibly have unspecified other impact by sending crafted data to the
  daemon (bsc#1066644).

This non-security issue was fixed:

- Stop file upload after errors like a full disk (bsc#1062063)
- Ensure -X flag works even when setting owner/group (bsc#1028842)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028842">SUSE bug 1028842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062063">SUSE bug 1062063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066644">SUSE bug 1066644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071459">SUSE bug 1071459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071460">SUSE bug 1071460</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16548/">CVE-2017-16548 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16548">CVE-2017-16548 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17433/">CVE-2017-17433 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17433">CVE-2017-17433 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17434/">CVE-2017-17434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17434">CVE-2017-17434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550975" comment="rsync-3.1.0-13.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149728" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="1056128" ref_url="https://bugzilla.suse.com/1056128" source="BUGZILLA"/>
		<reference ref_id="1056129" ref_url="https://bugzilla.suse.com/1056129" source="BUGZILLA"/>
		<reference ref_id="1056131" ref_url="https://bugzilla.suse.com/1056131" source="BUGZILLA"/>
		<reference ref_id="1056132" ref_url="https://bugzilla.suse.com/1056132" source="BUGZILLA"/>
		<reference ref_id="1056136" ref_url="https://bugzilla.suse.com/1056136" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13728" ref_url="https://www.suse.com/security/cve/CVE-2017-13728/" source="CVE"/>
		<reference ref_id="CVE-2017-13729" ref_url="https://www.suse.com/security/cve/CVE-2017-13729/" source="CVE"/>
		<reference ref_id="CVE-2017-13730" ref_url="https://www.suse.com/security/cve/CVE-2017-13730/" source="CVE"/>
		<reference ref_id="CVE-2017-13731" ref_url="https://www.suse.com/security/cve/CVE-2017-13731/" source="CVE"/>
		<reference ref_id="CVE-2017-13732" ref_url="https://www.suse.com/security/cve/CVE-2017-13732/" source="CVE"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003606.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:

- CVE-2017-13728: Fix infinite loop in the next_char function in comp_scan.c (bsc#1056136).
- CVE-2017-13730: Fix illegal address access in the function _nc_read_entry_source() (bsc#1056131).
- CVE-2017-13733: Fix illegal address access in the fmt_entry function (bsc#1056127).
- CVE-2017-13729: Fix illegal address access in the _nc_save_str (bsc#1056132).
- CVE-2017-13732: Fix illegal address access in the function dump_uses() (bsc#1056128).
- CVE-2017-13731: Fix illegal address access in the function postprocess_termcap() (bsc#1056129).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056128">SUSE bug 1056128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056129">SUSE bug 1056129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056131">SUSE bug 1056131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056132">SUSE bug 1056132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056136">SUSE bug 1056136</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13728/">CVE-2017-13728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13728">CVE-2017-13728 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13729/">CVE-2017-13729 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13729">CVE-2017-13729 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13730/">CVE-2017-13730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13730">CVE-2017-13730 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13731/">CVE-2017-13731 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13731">CVE-2017-13731 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13732/">CVE-2017-13732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13732">CVE-2017-13732 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13733">CVE-2017-13733 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550976" comment="libncurses5-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550977" comment="libncurses5-32bit-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550978" comment="libncurses6-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550979" comment="libncurses6-32bit-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541433" comment="ncurses-devel-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550980" comment="ncurses-devel-32bit-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550981" comment="ncurses-utils-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550982" comment="tack-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550983" comment="terminfo-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550984" comment="terminfo-base-5.9-55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149729" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1069222" ref_url="https://bugzilla.suse.com/1069222" source="BUGZILLA"/>
		<reference ref_id="1069226" ref_url="https://bugzilla.suse.com/1069226" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8816" ref_url="https://www.suse.com/security/cve/CVE-2017-8816/" source="CVE"/>
		<reference ref_id="CVE-2017-8817" ref_url="https://www.suse.com/security/cve/CVE-2017-8817/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003607.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2017-8816: Buffer overrun flaw in the NTLM authentication code (bsc#1069226).
- CVE-2017-8817: Read out of bounds flaw in the FTP wildcard function (bsc#1069222).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069222">SUSE bug 1069222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069226">SUSE bug 1069226</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8816/">CVE-2017-8816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8816">CVE-2017-8816 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-8817/">CVE-2017-8817 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8817">CVE-2017-8817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550985" comment="curl-7.37.0-37.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550986" comment="libcurl4-7.37.0-37.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550987" comment="libcurl4-32bit-7.37.0-37.11.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149730" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-LibXML (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1046848" ref_url="https://bugzilla.suse.com/1046848" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10672" ref_url="https://www.suse.com/security/cve/CVE-2017-10672/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003608.html" source="SUSE-SU"/>
		<description>
This update for perl-XML-LibXML fixes the following issues:

Security issue fixed:

- CVE-2017-10672: Fix use-after-free that allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call (bsc#1046848).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046848">SUSE bug 1046848</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-10672/">CVE-2017-10672 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10672">CVE-2017-10672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550988" comment="perl-XML-LibXML-2.0019-6.3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149731" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1052825" ref_url="https://bugzilla.suse.com/1052825" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003561.html" source="SUSE-SU"/>
		<description>

  
This update for qemu fixes the following issues:

A new feature was added:

- Support EPYC vCPU type (bsc#1052825 fate#324038)

Also a mitigation for a security problem has been applied:

- CVE-2017-5715: QEMU was updated to allow passing through new MSR and CPUID flags from 
  the host VM to the CPU, to allow enabling/disabling branch prediction features in the
  Intel CPU. (bsc#1068032)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1052825">SUSE bug 1052825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553759" comment="qemu-2.9.1-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553760" comment="qemu-arm-2.9.1-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553761" comment="qemu-block-curl-2.9.1-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553762" comment="qemu-block-iscsi-2.9.1-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553763" comment="qemu-block-rbd-2.9.1-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553764" comment="qemu-block-ssh-2.9.1-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553765" comment="qemu-guest-agent-2.9.1-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520899" comment="qemu-ipxe-1.0.0-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553766" comment="qemu-kvm-2.9.1-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553767" comment="qemu-lang-2.9.1-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553768" comment="qemu-ppc-2.9.1-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553769" comment="qemu-s390-2.9.1-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520901" comment="qemu-seabios-1.10.2-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520902" comment="qemu-sgabios-8-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553770" comment="qemu-tools-2.9.1-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520904" comment="qemu-vgabios-1.10.2-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520905" comment="qemu-x86-2.9.1-6.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149732" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1083232" ref_url="https://bugzilla.suse.com/1083232" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000041" ref_url="https://www.suse.com/security/cve/CVE-2018-1000041/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004049.html" source="SUSE-SU"/>
		<description>
This update for librsvg fixes the following issues:

- CVE-2018-1000041: Input validation issue could lead to credentials leak. (bsc#1083232)

Update to version 2.40.20:

  + Except for emergencies, this will be the LAST RELEASE of the
    librsvg-2.40.x series.  We are moving to 2.41, which is vastly
    improved over the 2.40 series.  The API/ABI there remain unchaged,
    so we strongly encourage you to upgrade your sources and binaries to
    librsvg-2.41.x.
  + bgo#761175 - Allow masks and clips to reuse a node being drawn.
  + Don't access the file system when deciding whether to load a remote
    file with a UNC path for a paint server (i.e. don't try to load it at all).
  + Vistual Studio: fixed and integrated introspection builds, so
    introspection data is built directly from the Visual Studio project
    (Chun-wei Fan).
  + Visual Studio: We now use HIGHENTROPYVA linker option on x64 builds,
    to enhance the security of built binaries (Chun-wei Fan).
  + Fix generation of Vala bindings when compiling in read-only source
    directories (Emmanuele Bassi).

Update to version 2.40.19:

  + bgo#621088: Using text objects as clipping paths is now supported.
  + bgo#587721: Fix rendering of text elements with transformations (Massimo).
  + bgo#777833 - Fix memory leaks when an RsvgHandle is disposed before
    being closed (Philip Withnall).
  + bgo#782098 - Don't pass deprecated options to gtk-doc (Ting-Wei Lan).
  + bgo#786372 - Fix the default for the 'type' attribute of the &lt;style&gt; element.
  + bgo#785276 - Don't crash on single-byte files.
  + bgo#634514: Don't render unknown elements and their sub-elements.
  + bgo#777155 - Ignore patterns that have close-to-zero dimensions.
  + bgo#634324 - Fix Gaussian blurs with negative scaling.
  + Fix the &lt;switch&gt; element; it wasn't working at all.
  + Fix loading when rsvg_handle_write() is called one byte at a time.
  + bgo#787895 - Fix incorrect usage of libxml2.  Thanks to Nick Wellnhofer
    for advice on this.
  + Backported the test suite machinery from the master branch (Chun-wei Fan,
    Federico Mena).
  + We now require Pango 1.38.0 or later (released in 2015).
  + We now require libxml2 2.9.0 or later (released in 2012).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-15"/>
	<updated date="2018-05-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083232">SUSE bug 1083232</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000041/">CVE-2018-1000041 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000041">CVE-2018-1000041 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553771" comment="gdk-pixbuf-loader-rsvg-2.40.20-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553772" comment="librsvg-2-2-2.40.20-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553773" comment="librsvg-2-2-32bit-2.40.20-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553774" comment="rsvg-view-2.40.20-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149733" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1059812" ref_url="https://bugzilla.suse.com/1059812" source="BUGZILLA"/>
		<reference ref_id="1091072" ref_url="https://bugzilla.suse.com/1091072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14160" ref_url="https://www.suse.com/security/cve/CVE-2017-14160/" source="CVE"/>
		<reference ref_id="CVE-2018-10393" ref_url="https://www.suse.com/security/cve/CVE-2018-10393/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004060.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:

Security issues fixed:

- CVE-2018-10393: Fixed stack-based buffer over-read in bark_noise_hybridm (bsc#1091072).
- CVE-2017-14160: Fixed out-of-bounds access inside bark_noise_hybridmp function (bsc#1059812).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059812">SUSE bug 1059812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091072">SUSE bug 1091072</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14160/">CVE-2017-14160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14160">CVE-2017-14160 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10393/">CVE-2018-10393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10393">CVE-2018-10393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553775" comment="libvorbis-doc-1.3.3-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553776" comment="libvorbis0-1.3.3-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553777" comment="libvorbis0-32bit-1.3.3-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553778" comment="libvorbisenc2-1.3.3-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553779" comment="libvorbisenc2-32bit-1.3.3-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553780" comment="libvorbisfile3-1.3.3-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553781" comment="libvorbisfile3-32bit-1.3.3-10.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149734" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1086825" ref_url="https://bugzilla.suse.com/1086825" source="BUGZILLA"/>
		<reference ref_id="1092098" ref_url="https://bugzilla.suse.com/1092098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004062.html" source="SUSE-SU"/>
		<description>
This update for curl fixes several issues:

Security issues fixed:

- CVE-2018-1000301: Fixed a RTSP bad headers buffer over-read could crash the curl client (bsc#1092098)

Non security issues fixed:

- If the DEFAULT_SUSE cipher list is not available use the HIGH cipher alias before failing.
  (bsc#1086825)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-17"/>
	<updated date="2018-05-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086825">SUSE bug 1086825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092098">SUSE bug 1092098</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000301">CVE-2018-1000301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553782" comment="curl-7.37.0-37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553783" comment="libcurl4-7.37.0-37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546204" comment="libcurl4-32bit-7.37.0-37.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149735" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1090099" ref_url="https://bugzilla.suse.com/1090099" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10194" ref_url="https://www.suse.com/security/cve/CVE-2018-10194/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004063.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2018-10194: A stack-based buffer overflow was fixed in gdevpdts.c (bsc#1090099)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-18"/>
	<updated date="2018-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1090099">SUSE bug 1090099</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10194/">CVE-2018-10194 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10194">CVE-2018-10194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553784" comment="ghostscript-9.15-23.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553785" comment="ghostscript-x11-9.15-23.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149736" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1092548" ref_url="https://bugzilla.suse.com/1092548" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to the ESR 52.8 release fixes the following issues:

Mozil to Firefox ESR 52.8 (bsc#1092548)

Security issues fixed:

- MFSA 2018-12/CVE-2018-5159: Integer overflow and out-of-bounds write in Skia
- MFSA 2018-12/CVE-2018-5158: Malicious PDF can inject JavaScript into PDF Viewer
- MFSA 2018-12/CVE-2018-5168: Lightweight themes can be installed without user interaction
- MFSA 2018-12/CVE-2018-5150: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8
- MFSA 2018-12/CVE-2018-5155: Use-after-free with SVG animations and text paths
- MFSA 2018-12/CVE-2018-5183: Backport critical security fixes in Skia
- MFSA 2018-12/CVE-2018-5157: Same-origin bypass of PDF Viewer to view protected PDF files
- MFSA 2018-12/CVE-2018-5154: Use-after-free with SVG animations and clip paths
- MFSA 2018-12/CVE-2018-5178: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-18"/>
	<updated date="2018-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5150">CVE-2018-5150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5154">CVE-2018-5154 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5155">CVE-2018-5155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5157">CVE-2018-5157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5158">CVE-2018-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5159">CVE-2018-5159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5168">CVE-2018-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5174">CVE-2018-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5178">CVE-2018-5178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5183">CVE-2018-5183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553786" comment="MozillaFirefox-52.8.0esr-109.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553787" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149737" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1066713" ref_url="https://bugzilla.suse.com/1066713" source="BUGZILLA"/>
		<reference ref_id="1072124" ref_url="https://bugzilla.suse.com/1072124" source="BUGZILLA"/>
		<reference ref_id="1072125" ref_url="https://bugzilla.suse.com/1072125" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1239" ref_url="https://www.suse.com/security/cve/CVE-2015-1239/" source="CVE"/>
		<reference ref_id="CVE-2017-17479" ref_url="https://www.suse.com/security/cve/CVE-2017-17479/" source="CVE"/>
		<reference ref_id="CVE-2017-17480" ref_url="https://www.suse.com/security/cve/CVE-2017-17480/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004068.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes the following security issues:

- CVE-2015-1239: A double free vulnerability in the j2k_read_ppm_v3 function allowed remote attackers to cause a denial of service (crash) (bsc#1066713)
- CVE-2017-17479: A stack-based buffer overflow in the pgxtoimage function in jpwl/convert.c could crash the converter. (bsc#1072125)
- CVE-2017-17480: A stack-based buffer overflow in the pgxtovolume function in jp3d/convert.c could crash the converter. (bsc#1072124)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1066713">SUSE bug 1066713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072124">SUSE bug 1072124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072125">SUSE bug 1072125</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-1239/">CVE-2015-1239 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1239">CVE-2015-1239 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17479/">CVE-2017-17479 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17479">CVE-2017-17479 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17480/">CVE-2017-17480 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17480">CVE-2017-17480 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553788" comment="libopenjp2-7-2.1.0-4.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149738" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1070615" ref_url="https://bugzilla.suse.com/1070615" source="BUGZILLA"/>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004080.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes several issues.

This security issue was fixed:

- CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).

  Systems with microprocessors utilizing speculative execution and speculative
  execution of memory reads before the addresses of all prior memory writes are
  known may allow unauthorized disclosure of information to an attacker with
  local user access via a side-channel analysis.

  This patch permits the new x86 cpu feature flag named 'ssbd' to be
  presented to the guest, given that the host has this feature, and
  KVM exposes it to the guest as well.

  For this feature to be enabled please use the qemu commandline
  -cpu $MODEL,+spec-ctrl,+ssbd
  so the guest OS can take advantage of the feature.

  spec-ctrl and ssbd support is also required in the host.

This non-security issue was fixed:

- bsc#1070615: Add new look up path 'sys/class/tpm' for tpm cancel path
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070615">SUSE bug 1070615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553789" comment="qemu-2.9.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553790" comment="qemu-arm-2.9.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553791" comment="qemu-block-curl-2.9.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553792" comment="qemu-block-iscsi-2.9.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553793" comment="qemu-block-rbd-2.9.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553794" comment="qemu-block-ssh-2.9.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553795" comment="qemu-guest-agent-2.9.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520975" comment="qemu-ipxe-1.0.0-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553796" comment="qemu-kvm-2.9.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553797" comment="qemu-lang-2.9.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553798" comment="qemu-ppc-2.9.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553799" comment="qemu-s390-2.9.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520977" comment="qemu-seabios-1.10.2-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520978" comment="qemu-sgabios-8-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553800" comment="qemu-tools-2.9.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520980" comment="qemu-vgabios-1.10.2-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520981" comment="qemu-x86-2.9.1-6.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149739" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1005778" ref_url="https://bugzilla.suse.com/1005778" source="BUGZILLA"/>
		<reference ref_id="1005780" ref_url="https://bugzilla.suse.com/1005780" source="BUGZILLA"/>
		<reference ref_id="1005781" ref_url="https://bugzilla.suse.com/1005781" source="BUGZILLA"/>
		<reference ref_id="1009062" ref_url="https://bugzilla.suse.com/1009062" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1015336" ref_url="https://bugzilla.suse.com/1015336" source="BUGZILLA"/>
		<reference ref_id="1015337" ref_url="https://bugzilla.suse.com/1015337" source="BUGZILLA"/>
		<reference ref_id="1015340" ref_url="https://bugzilla.suse.com/1015340" source="BUGZILLA"/>
		<reference ref_id="1015342" ref_url="https://bugzilla.suse.com/1015342" source="BUGZILLA"/>
		<reference ref_id="1015343" ref_url="https://bugzilla.suse.com/1015343" source="BUGZILLA"/>
		<reference ref_id="1022604" ref_url="https://bugzilla.suse.com/1022604" source="BUGZILLA"/>
		<reference ref_id="1022743" ref_url="https://bugzilla.suse.com/1022743" source="BUGZILLA"/>
		<reference ref_id="1024296" ref_url="https://bugzilla.suse.com/1024296" source="BUGZILLA"/>
		<reference ref_id="1031492" ref_url="https://bugzilla.suse.com/1031492" source="BUGZILLA"/>
		<reference ref_id="1036215" ref_url="https://bugzilla.suse.com/1036215" source="BUGZILLA"/>
		<reference ref_id="1043598" ref_url="https://bugzilla.suse.com/1043598" source="BUGZILLA"/>
		<reference ref_id="1044596" ref_url="https://bugzilla.suse.com/1044596" source="BUGZILLA"/>
		<reference ref_id="1056415" ref_url="https://bugzilla.suse.com/1056415" source="BUGZILLA"/>
		<reference ref_id="1056427" ref_url="https://bugzilla.suse.com/1056427" source="BUGZILLA"/>
		<reference ref_id="1060799" ref_url="https://bugzilla.suse.com/1060799" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1075087" ref_url="https://bugzilla.suse.com/1075087" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1076263" ref_url="https://bugzilla.suse.com/1076263" source="BUGZILLA"/>
		<reference ref_id="1080157" ref_url="https://bugzilla.suse.com/1080157" source="BUGZILLA"/>
		<reference ref_id="1082153" ref_url="https://bugzilla.suse.com/1082153" source="BUGZILLA"/>
		<reference ref_id="1082299" ref_url="https://bugzilla.suse.com/1082299" source="BUGZILLA"/>
		<reference ref_id="1082485" ref_url="https://bugzilla.suse.com/1082485" source="BUGZILLA"/>
		<reference ref_id="1082962" ref_url="https://bugzilla.suse.com/1082962" source="BUGZILLA"/>
		<reference ref_id="1083125" ref_url="https://bugzilla.suse.com/1083125" source="BUGZILLA"/>
		<reference ref_id="1083635" ref_url="https://bugzilla.suse.com/1083635" source="BUGZILLA"/>
		<reference ref_id="1083650" ref_url="https://bugzilla.suse.com/1083650" source="BUGZILLA"/>
		<reference ref_id="1083900" ref_url="https://bugzilla.suse.com/1083900" source="BUGZILLA"/>
		<reference ref_id="1084721" ref_url="https://bugzilla.suse.com/1084721" source="BUGZILLA"/>
		<reference ref_id="1085058" ref_url="https://bugzilla.suse.com/1085058" source="BUGZILLA"/>
		<reference ref_id="1085185" ref_url="https://bugzilla.suse.com/1085185" source="BUGZILLA"/>
		<reference ref_id="1085511" ref_url="https://bugzilla.suse.com/1085511" source="BUGZILLA"/>
		<reference ref_id="1085958" ref_url="https://bugzilla.suse.com/1085958" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1088242" ref_url="https://bugzilla.suse.com/1088242" source="BUGZILLA"/>
		<reference ref_id="1088865" ref_url="https://bugzilla.suse.com/1088865" source="BUGZILLA"/>
		<reference ref_id="1089023" ref_url="https://bugzilla.suse.com/1089023" source="BUGZILLA"/>
		<reference ref_id="1089115" ref_url="https://bugzilla.suse.com/1089115" source="BUGZILLA"/>
		<reference ref_id="1089198" ref_url="https://bugzilla.suse.com/1089198" source="BUGZILLA"/>
		<reference ref_id="1089393" ref_url="https://bugzilla.suse.com/1089393" source="BUGZILLA"/>
		<reference ref_id="1089608" ref_url="https://bugzilla.suse.com/1089608" source="BUGZILLA"/>
		<reference ref_id="1089644" ref_url="https://bugzilla.suse.com/1089644" source="BUGZILLA"/>
		<reference ref_id="1089752" ref_url="https://bugzilla.suse.com/1089752" source="BUGZILLA"/>
		<reference ref_id="1089895" ref_url="https://bugzilla.suse.com/1089895" source="BUGZILLA"/>
		<reference ref_id="1089925" ref_url="https://bugzilla.suse.com/1089925" source="BUGZILLA"/>
		<reference ref_id="1090225" ref_url="https://bugzilla.suse.com/1090225" source="BUGZILLA"/>
		<reference ref_id="1090643" ref_url="https://bugzilla.suse.com/1090643" source="BUGZILLA"/>
		<reference ref_id="1090658" ref_url="https://bugzilla.suse.com/1090658" source="BUGZILLA"/>
		<reference ref_id="1090663" ref_url="https://bugzilla.suse.com/1090663" source="BUGZILLA"/>
		<reference ref_id="1090708" ref_url="https://bugzilla.suse.com/1090708" source="BUGZILLA"/>
		<reference ref_id="1090718" ref_url="https://bugzilla.suse.com/1090718" source="BUGZILLA"/>
		<reference ref_id="1090734" ref_url="https://bugzilla.suse.com/1090734" source="BUGZILLA"/>
		<reference ref_id="1090953" ref_url="https://bugzilla.suse.com/1090953" source="BUGZILLA"/>
		<reference ref_id="1091041" ref_url="https://bugzilla.suse.com/1091041" source="BUGZILLA"/>
		<reference ref_id="1091325" ref_url="https://bugzilla.suse.com/1091325" source="BUGZILLA"/>
		<reference ref_id="1091728" ref_url="https://bugzilla.suse.com/1091728" source="BUGZILLA"/>
		<reference ref_id="1091925" ref_url="https://bugzilla.suse.com/1091925" source="BUGZILLA"/>
		<reference ref_id="1091960" ref_url="https://bugzilla.suse.com/1091960" source="BUGZILLA"/>
		<reference ref_id="1092289" ref_url="https://bugzilla.suse.com/1092289" source="BUGZILLA"/>
		<reference ref_id="1092497" ref_url="https://bugzilla.suse.com/1092497" source="BUGZILLA"/>
		<reference ref_id="1092566" ref_url="https://bugzilla.suse.com/1092566" source="BUGZILLA"/>
		<reference ref_id="1092904" ref_url="https://bugzilla.suse.com/1092904" source="BUGZILLA"/>
		<reference ref_id="1093008" ref_url="https://bugzilla.suse.com/1093008" source="BUGZILLA"/>
		<reference ref_id="1093144" ref_url="https://bugzilla.suse.com/1093144" source="BUGZILLA"/>
		<reference ref_id="1093215" ref_url="https://bugzilla.suse.com/1093215" source="BUGZILLA"/>
		<reference ref_id="1094019" ref_url="https://bugzilla.suse.com/1094019" source="BUGZILLA"/>
		<reference ref_id="802154" ref_url="https://bugzilla.suse.com/802154" source="BUGZILLA"/>
		<reference ref_id="966170" ref_url="https://bugzilla.suse.com/966170" source="BUGZILLA"/>
		<reference ref_id="966172" ref_url="https://bugzilla.suse.com/966172" source="BUGZILLA"/>
		<reference ref_id="966186" ref_url="https://bugzilla.suse.com/966186" source="BUGZILLA"/>
		<reference ref_id="966191" ref_url="https://bugzilla.suse.com/966191" source="BUGZILLA"/>
		<reference ref_id="969476" ref_url="https://bugzilla.suse.com/969476" source="BUGZILLA"/>
		<reference ref_id="969477" ref_url="https://bugzilla.suse.com/969477" source="BUGZILLA"/>
		<reference ref_id="981348" ref_url="https://bugzilla.suse.com/981348" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="CVE-2018-10087" ref_url="https://www.suse.com/security/cve/CVE-2018-10087/" source="CVE"/>
		<reference ref_id="CVE-2018-10124" ref_url="https://www.suse.com/security/cve/CVE-2018-10124/" source="CVE"/>
		<reference ref_id="CVE-2018-1065" ref_url="https://www.suse.com/security/cve/CVE-2018-1065/" source="CVE"/>
		<reference ref_id="CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803/" source="CVE"/>
		<reference ref_id="CVE-2018-7492" ref_url="https://www.suse.com/security/cve/CVE-2018-7492/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.131 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-3639: Information leaks using 'Memory Disambiguation' feature
  in modern CPUs were mitigated, aka 'Spectre Variant 4' (bnc#1087082).

  A new boot commandline option was introduced,
  'spec_store_bypass_disable', which can have following values:

  - auto: Kernel detects whether your CPU model contains an implementation
    of Speculative Store Bypass and picks the most appropriate mitigation.
  - on: disable Speculative Store Bypass
  - off: enable Speculative Store Bypass
  - prctl: Control Speculative Store Bypass per thread via
    prctl. Speculative Store Bypass is enabled for a process by default. The
    state of the control is inherited on fork.
  - seccomp: Same as 'prctl' above, but all seccomp threads will disable
    SSB unless they explicitly opt out.

  The default is 'seccomp', meaning programs need explicit opt-in into the mitigation.

  Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:

  - 'Vulnerable'
  - 'Mitigation: Speculative Store Bypass disabled'
  - 'Mitigation: Speculative Store Bypass disabled via prctl'
  - 'Mitigation: Speculative Store Bypass disabled via prctl and seccomp'


- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c
  had an integer-overflow vulnerability allowing local users with access
  to the udldrmfb driver to obtain full read and write permissions on
  kernel physical pages, resulting in a code execution in kernel space
  (bnc#1090643).
- CVE-2018-10124: The kill_something_info function in kernel/signal.c
  might have allowed local users to cause a denial of service via an
  INT_MIN argument (bnc#1089752).
- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might
  have allowed local users to cause a denial of service by triggering an
  attempted use of the -INT_MIN value (bnc#1089608).
- CVE-2018-1000199: An address corruption flaw was discovered while
  modifying a h/w breakpoint via 'modify_user_hw_breakpoint' routine, an
  unprivileged user/process could use this flaw to crash the system kernel
  resulting in DoS OR to potentially escalate privileges on a the system. (bsc#1089895)
- CVE-2018-1130: The Linux kernel was vulnerable to a null pointer
  dereference in dccp_write_xmit() function in net/dccp/output.c in that
  allowed a local user to cause a denial of service by a number of certain
  crafted system calls (bnc#1092904).
- CVE-2018-5803: An error in the _sctp_make_chunk() function when handling
  SCTP, packet length could have been exploited by a malicious local user
  to cause a kernel crash and a DoS. (bnc#1083900).
- CVE-2018-1065: The netfilter subsystem mishandled the case of
  a rule blob that contains a jump but lacks a user-defined chain,
  which allowed local users to cause a denial of service (NULL
  pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN
  capability, related to arpt_do_table in net/ipv4/netfilter/arp_tables.c,
  ipt_do_table in net/ipv4/netfilter/ip_tables.c, and ip6t_do_table in
  net/ipv6/netfilter/ip6_tables.c (bnc#1083650 1091925).
- CVE-2018-7492: A NULL pointer dereference was found in the
  net/rds/rdma.c __rds_rdma_map() function allowing local attackers to
  cause a system panic and a denial-of-service, related to RDS_GET_MR and
  RDS_GET_MR_FOR_DEST (bnc#1082962).

The following non-security bugs were fixed:

- acpica: Disassembler: Abort on an invalid/unknown AML opcode (bnc#1012382).
- acpica: Events: Add runtime stub support for event APIs (bnc#1012382).
- acpi / hotplug / PCI: Check presence of slot itself in get_slot_status() (bnc#1012382).
- acpi, PCI, irq: remove redundant check for null string pointer (bnc#1012382).
- acpi / scan: Send change uevent with offine environmental data (bsc#1082485).
- acpi / video: Add quirk to force acpi-video backlight on Samsung 670Z5E (bnc#1012382).
- alsa: asihpi: Hardening for potential Spectre v1 (bnc#1012382).
- alsa: control: Hardening for potential Spectre v1 (bnc#1012382).
- alsa: core: Report audio_tstamp in snd_pcm_sync_ptr (bnc#1012382).
- alsa: hda: Hardening for potential Spectre v1 (bnc#1012382).
- alsa: hda - New VIA controller suppor no-snoop path (bnc#1012382).
- alsa: hda/realtek - Add some fixes for ALC233 (bnc#1012382).
- alsa: hdspm: Hardening for potential Spectre v1 (bnc#1012382).
- alsa: line6: Use correct endpoint type for midi output (bnc#1012382).
- alsa: opl3: Hardening for potential Spectre v1 (bnc#1012382).
- alsa: oss: consolidate kmalloc/memset 0 call to kzalloc (bnc#1012382).
- alsa: pcm: Avoid potential races between OSS ioctls and read/write (bnc#1012382).
- alsa: pcm: Fix endless loop for XRUN recovery in OSS emulation (bnc#1012382).
- alsa: pcm: Fix mutex unbalance in OSS emulation ioctls (bnc#1012382).
- alsa: pcm: Fix UAF at PCM release via PCM timer access (bnc#1012382).
- alsa: pcm: potential uninitialized return values (bnc#1012382).
- alsa: pcm: Return -EBUSY for OSS ioctls changing busy streams (bnc#1012382).
- alsa: pcm: Use dma_bytes as size parameter in dma_mmap_coherent() (bnc#1012382).
- alsa: pcm: Use ERESTARTSYS instead of EINTR in OSS emulation (bnc#1012382).
- alsa: rawmidi: Fix missing input substream checks in compat ioctls (bnc#1012382).
- alsa: rme9652: Hardening for potential Spectre v1 (bnc#1012382).
- alsa: seq: oss: Fix unbalanced use lock for synth MIDI device (bnc#1012382).
- alsa: seq: oss: Hardening for potential Spectre v1 (bnc#1012382).
- alsa: usb-audio: Skip broken EU on Dell dock USB-audio (bsc#1090658).
- arm64: avoid overflow in VA_START and PAGE_OFFSET (bnc#1012382).
- arm64: futex: Fix undefined behaviour with FUTEX_OP_OPARG_SHIFT usage (bnc#1012382).
- arm: amba: Do not read past the end of sysfs 'driver_override' buffer (bnc#1012382).
- arm: amba: Fix race condition with driver_override (bnc#1012382).
- arm: amba: Make driver_override output consistent with other buses (bnc#1012382).
- arm: davinci: da8xx: Create DSP device only when assigned memory (bnc#1012382).
- arm: dts: am57xx-beagle-x15-common: Add overide powerhold property (bnc#1012382).
- arm: dts: at91: at91sam9g25: fix mux-mask pinctrl property (bnc#1012382).
- arm: dts: at91: sama5d4: fix pinctrl compatible string (bnc#1012382).
- arm: dts: dra7: Add power hold and power controller properties to palmas (bnc#1012382).
- arm: dts: imx53-qsrb: Pulldown PMIC IRQ pin (bnc#1012382).
- arm: dts: imx6qdl-wandboard: Fix audio channel swap (bnc#1012382).
- arm: dts: ls1021a: add 'fsl,ls1021a-esdhc' compatible string to esdhc node (bnc#1012382).
- arm: imx: Add MXC_CPU_IMX6ULL and cpu_is_imx6ull (bnc#1012382).
- arp: fix arp_filter on l3slave devices (bnc#1012382).
- arp: honour gratuitous ARP _replies_ (bnc#1012382).
- asoc: fsl_esai: Fix divisor calculation failure at lower ratio (bnc#1012382).
- asoc: Intel: cht_bsw_rt5645: Analog Mic support (bnc#1012382).
- asoc: rsnd: SSI PIO adjust to 24bit mode (bnc#1012382).
- asoc: ssm2602: Replace reg_default_raw with reg_default (bnc#1012382).
- async_tx: Fix DMA_PREP_FENCE usage in do_async_gen_syndrome() (bnc#1012382).
- ata: libahci: properly propagate return value of platform_get_irq() (bnc#1012382).
- ath5k: fix memory leak on buf on failed eeprom read (bnc#1012382).
- ath9k_hw: check if the chip failed to wake up (bnc#1012382).
- audit: add tty field to LOGIN event (bnc#1012382).
- autofs: mount point create should honour passed in mode (bnc#1012382).
- bcache: segregate flash only volume write streams (bnc#1012382).
- bcache: stop writeback thread after detaching (bnc#1012382).
- blacklist.conf: Add an omapdrm entry (bsc#1090708, bsc#1090718)
- blk-mq: fix bad clear of RQF_MQ_INFLIGHT in blk_mq_ct_ctx_init() (bsc#1085058).
- blk-mq: fix kernel oops in blk_mq_tag_idle() (bnc#1012382).
- block: correctly mask out flags in blk_rq_append_bio() (bsc#1085058).
- block/loop: fix deadlock after loop_set_status (bnc#1012382).
- block: sanity check for integrity intervals (bsc#1091728).
- bluetooth: Fix missing encryption refresh on Security Request (bnc#1012382).
- bluetooth: Send HCI Set Event Mask Page 2 command only when needed (bnc#1012382).
- bna: Avoid reading past end of buffer (bnc#1012382).
- bnx2x: Allow vfs to disable txvlan offload (bnc#1012382).
- bonding: do not set slave_dev npinfo before slave_enable_netpoll in bond_enslave (bnc#1012382).
- bonding: Do not update slave-&gt;link until ready to commit (bnc#1012382).
- bonding: fix the err path for dev hwaddr sync in bond_enslave (bnc#1012382).
- bonding: move dev_mc_sync after master_upper_dev_link in bond_enslave (bnc#1012382).
- bonding: process the err returned by dev_set_allmulti properly in bond_enslave (bnc#1012382).
- btrfs: fix incorrect error return ret being passed to mapping_set_error (bnc#1012382).
- btrfs: Fix wrong first_key parameter in replace_path (Followup fix for bsc#1084721).
- btrfs: Only check first key for committed tree blocks (bsc#1084721).
- btrfs: Validate child tree block's level and first key (bsc#1084721).
- bus: brcmstb_gisb: correct support for 64-bit address output (bnc#1012382).
- bus: brcmstb_gisb: Use register offsets with writes too (bnc#1012382).
- cdc_ether: flag the Cinterion AHS8 modem by gemalto as WWAN (bnc#1012382).
- cdrom: information leak in cdrom_ioctl_media_changed() (bnc#1012382).
- ceph: adding protection for showing cap reservation info (bsc#1089115).
- ceph: always update atime/mtime/ctime for new inode (bsc#1089115).
- ceph: check if mds create snaprealm when setting quota (fate#324665 bsc#1089115).
- ceph: do not check quota for snap inode (fate#324665 bsc#1089115).
- ceph: fix invalid point dereference for error case in mdsc destroy (bsc#1089115).
- ceph: fix root quota realm check (fate#324665 bsc#1089115).
- ceph: fix rsize/wsize capping in ceph_direct_read_write() (bsc#1089115).
- ceph: quota: add counter for snaprealms with quota (fate#324665 bsc#1089115).
- ceph: quota: add initial infrastructure to support cephfs quotas (fate#324665 bsc#1089115).
- ceph: quota: cache inode pointer in ceph_snap_realm (fate#324665 bsc#1089115).
- ceph: quota: do not allow cross-quota renames (fate#324665 bsc#1089115).
- ceph: quota: report root dir quota usage in statfs (fate#324665 bsc#1089115).
- ceph: quota: support for ceph.quota.max_bytes (fate#324665 bsc#1089115).
- ceph: quota: support for ceph.quota.max_files (fate#324665 bsc#1089115).
- ceph: quota: update MDS when max_bytes is approaching (fate#324665 bsc#1089115).
- cfg80211: make RATE_INFO_BW_20 the default (bnc#1012382).
- cifs: do not allow creating sockets except with SMB1 posix exensions (bnc#1012382).
- cifs: silence compiler warnings showing up with gcc-8.0.0 (bsc#1090734).
- cifs: silence lockdep splat in cifs_relock_file() (bnc#1012382).
- cifs: Use file_dentry() (bsc#1093008).
- clk: bcm2835: De-assert/assert PLL reset signal when appropriate (bnc#1012382).
- clk: Fix __set_clk_rates error print-string (bnc#1012382).
- clk: mvebu: armada-38x: add support for 1866MHz variants (bnc#1012382).
- clk: mvebu: armada-38x: add support for missing clocks (bnc#1012382).
- clk: scpi: fix return type of __scpi_dvfs_round_rate (bnc#1012382).
- clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled (bsc#1090225).
- cpumask: Add helper cpumask_available() (bnc#1012382).
- crypto: ahash - Fix early termination in hash walk (bnc#1012382).
- crypto: x86/cast5-avx - fix ECB encryption when long sg follows short one (bnc#1012382).
- cx25840: fix unchecked return values (bnc#1012382).
- cxgb4: fix incorrect cim_la output for T6 (bnc#1012382).
- cxgb4: Fix queue free path of ULD drivers (bsc#1022743 FATE#322540).
- cxgb4: FW upgrade fixes (bnc#1012382).
- cxgb4vf: Fix SGE FL buffer initialization logic for 64K pages (bnc#1012382).
- dmaengine: at_xdmac: fix rare residue corruption (bnc#1012382).
- dmaengine: imx-sdma: Handle return value of clk_prepare_enable (bnc#1012382).
- dm ioctl: remove double parentheses (bnc#1012382).
- Documentation: pinctrl: palmas: Add ti,palmas-powerhold-override property definition (bnc#1012382).
- Do not leak MNT_INTERNAL away from internal mounts (bnc#1012382).
- drivers/infiniband/core/verbs.c: fix build with gcc-4.4.4 (FATE#321732).
- drivers/infiniband/ulp/srpt/ib_srpt.c: fix build with gcc-4.4.4 (bnc#1024296,FATE#321265).
- drivers/misc/vmw_vmci/vmci_queue_pair.c: fix a couple integer overflow tests (bnc#1012382).
- drm/omap: fix tiled buffer stride calculations (bnc#1012382).
- drm/radeon: Fix PCIe lane width calculation (bnc#1012382).
- drm/virtio: fix vq wait_event condition (bnc#1012382).
- e1000e: fix race condition around skb_tstamp_tx() (bnc#1012382).
- e1000e: Undo e1000e_pm_freeze if __e1000_shutdown fails (bnc#1012382).
- edac, mv64x60: Fix an error handling path (bnc#1012382).
- Enable uinput driver (bsc#1092566).
- esp: Fix memleaks on error paths (git-fixes).
- ext4: add validity checks for bitmap block numbers (bnc#1012382).
- ext4: bugfix for mmaped pages in mpage_release_unused_pages() (bnc#1012382).
- ext4: do not allow r/w mounts if metadata blocks overlap the superblock (bnc#1012382).
- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).
- ext4: fail ext4_iget for root directory if unallocated (bnc#1012382).
- ext4: fix bitmap position validation (bnc#1012382).
- ext4: fix deadlock between inline_data and ext4_expand_extra_isize_ea() (bnc#1012382).
- ext4: Fix hole length detection in ext4_ind_map_blocks() (bsc#1090953).
- ext4: fix off-by-one on max nr_pages in ext4_find_unwritten_pgoff() (bnc#1012382).
- ext4: prevent right-shifting extents beyond EXT_MAX_BLOCKS (bnc#1012382).
- ext4: set h_journal if there is a failure starting a reserved handle (bnc#1012382).
- fanotify: fix logic of events on child (bnc#1012382).
- fix race in drivers/char/random.c:get_reg() (bnc#1012382).
- frv: declare jiffies to be located in the .data section (bnc#1012382).
- fs: compat: Remove warning from COMPATIBLE_IOCTL (bnc#1012382).
- fs/proc: Stop trying to report thread stacks (bnc#1012382).
- fs/reiserfs/journal.c: add missing resierfs_warning() arg (bnc#1012382).
- genirq: Use cpumask_available() for check of cpumask variable (bnc#1012382).
- getname_kernel() needs to make sure that -&gt;name != -&gt;iname in long case (bnc#1012382).
- gpio: label descriptors using the device name (bnc#1012382).
- hdlcdrv: Fix divide by zero in hdlcdrv_ioctl (bnc#1012382).
- hid: core: Fix size as type u32 (bnc#1012382).
- hid: Fix hid_report_len usage (bnc#1012382).
- hid: hidraw: Fix crash on HIDIOCGFEATURE with a destroyed device (bnc#1012382).
- hid: i2c-hid: fix size check and type usage (bnc#1012382).
- hwmon: (ina2xx) Fix access to uninitialized mutex (git-fixes).
- hwmon: (ina2xx) Make calibration register value fixed (bnc#1012382).
- hypfs_kill_super(): deal with failed allocations (bnc#1012382).
- i40iw: Free IEQ resources (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- ib/core: Fix possible crash to access NULL netdev (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- ib/core: Generate GID change event regardless of RoCE GID table property (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- ib/mlx4: Fix corruption of RoCEv2 IPv4 GIDs (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- ib/mlx4: Include GID type when deleting GIDs from HW table under RoCE (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- ib/mlx5: Avoid passing an invalid QP type to firmware (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- ib/mlx5: Fix an error code in __mlx5_ib_modify_qp() (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ib/mlx5: Fix incorrect size of klms in the memory region (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ib/mlx5: Fix out-of-bounds read in create_raw_packet_qp_rq (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ib/mlx5: revisit -Wmaybe-uninitialized warning (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- ib/mlx5: Set the default active rate and width to QDR and 4X (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- ibmvnic: Clean actual number of RX or TX pools (bsc#1092289).
- ibmvnic: Clear pending interrupt after device reset (bsc#1089644).
- ibmvnic: Define vnic_login_client_data name field as unsized array (bsc#1089198).
- ibmvnic: Do not notify peers on parameter change resets (bsc#1089198).
- ibmvnic: Handle all login error conditions (bsc#1089198).
- ib/srp: Fix completion vector assignment algorithm (bnc#1012382).
- ib/srp: Fix srp_abort() (bnc#1012382).
- ib/srpt: Fix abort handling (bnc#1012382).
- ib/srpt: Fix an out-of-bounds stack access in srpt_zerolength_write() (bnc#1024296,FATE#321265).
- iio: hi8435: avoid garbage event at first enable (bnc#1012382).
- iio: hi8435: cleanup reset gpio (bnc#1012382).
- iio: magnetometer: st_magn_spi: fix spi_device_id table (bnc#1012382).
- input: ALPS - fix multi-touch decoding on SS4 plus touchpads (git-fixes).
- input: ALPS - fix trackstick button handling on V8 devices (git-fixes).
- input: ALPS - fix TrackStick support for SS5 hardware (git-fixes).
- input: ALPS - fix two-finger scroll breakage in right side on ALPS touchpad (git-fixes).
- input: drv260x - fix initializing overdrive voltage (bnc#1012382).
- input: elan_i2c - check if device is there before really probing (bnc#1012382).
- input: elan_i2c - clear INT before resetting controller (bnc#1012382).
- input: elantech - force relative mode on a certain module (bnc#1012382).
- input: i8042 - add Lenovo ThinkPad L460 to i8042 reset list (bnc#1012382).
- input: i8042 - enable MUX on Sony VAIO VGN-CS series to fix touchpad (bnc#1012382).
- input: mousedev - fix implicit conversion warning (bnc#1012382).
- iommu/vt-d: Fix a potential memory leak (bnc#1012382).
- ip6_gre: better validate user provided tunnel names (bnc#1012382).
- ip6_tunnel: better validate user provided tunnel names (bnc#1012382).
- ipc/shm: fix use-after-free of shm file via remap_file_pages() (bnc#1012382).
- ipmi: create hardware-independent softdep for ipmi_devintf (bsc#1009062, bsc#1060799). Refresh patch to mainline version.
- ipsec: check return value of skb_to_sgvec always (bnc#1012382).
- ip_tunnel: better validate user provided tunnel names (bnc#1012382).
- ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy (bnc#1012382).
- ipv6: avoid dad-failures for addresses with NODAD (bnc#1012382).
- ipv6: sit: better validate user provided tunnel names (bnc#1012382).
- ipv6: the entire IPv6 header chain must fit the first fragment (bnc#1012382).
- iw_cxgb4: print mapped ports correctly (bsc#321658 FATE#1005778 bsc#321660 FATE#1005780 bsc#321661 FATE#1005781).
- jbd2: fix use after free in kjournald2() (bnc#1012382).
- jbd2: if the journal is aborted then do not allow update of the log tail (bnc#1012382).
- jffs2_kill_sb(): deal with failed allocations (bnc#1012382).
- jiffies.h: declare jiffies and jiffies_64 with ____cacheline_aligned_in_smp (bnc#1012382).
- kABI: add tty include to audit.c (kabi).
- kABI: protect hid report functions (kabi).
- kABI: protect jiffies types (kabi).
- kABI: protect skb_to_sgvec* (kabi).
- kABI: protect sound/timer.h include in sound pcm.c (kabi).
- kABI: protect struct cstate (kabi).
- kABI: protect struct _lowcore (kabi).
- kABI: protect tty include in audit.h (kabi).
- kabi/severities: Ignore kgr_shadow_* kABI changes
- kbuild: provide a __UNIQUE_ID for clang (bnc#1012382).
- kexec_file: do not add extra alignment to efi memmap (bsc#1044596).
- keys: DNS: limit the length of option strings (bnc#1012382).
- kGraft: fix small race in reversion code (bsc#1083125).
- kobject: do not use WARN for registration failures (bnc#1012382).
- kvm: Fix nopvspin static branch init usage (bsc#1056427).
- kvm: Introduce nopvspin kernel parameter (bsc#1056427).
- kvm: nVMX: Fix handling of lmsw instruction (bnc#1012382).
- kvm: PPC: Book3S PR: Check copy_to/from_user return values (bnc#1012382).
- kvm: SVM: do not zero out segment attributes if segment is unusable or not present (bnc#1012382).
- l2tp: check sockaddr length in pppol2tp_connect() (bnc#1012382).
- l2tp: fix missing print session offset info (bnc#1012382).
- lan78xx: Correctly indicate invalid OTP (bnc#1012382).
- leds: pca955x: Correct I2C Functionality (bnc#1012382).
- libceph, ceph: change permission for readonly debugfs entries (bsc#1089115).
- libceph: fix misjudgement of maximum monitor number (bsc#1089115).
- libceph: reschedule a tick in finish_hunting() (bsc#1089115).
- libceph: un-backoff on tick when we have a authenticated session (bsc#1089115).
- libceph: validate con-&gt;state at the top of try_write() (bsc#1089115).
- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299 fate#313296).
- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299 fate#313296).
- llc: delete timers synchronously in llc_sk_free() (bnc#1012382).
- llc: fix NULL pointer deref for SOCK_ZAPPED (bnc#1012382).
- llc: hold llc_sap before release_sock() (bnc#1012382).
- llist: clang: introduce member_address_is_nonnull() (bnc#1012382).
- lockd: fix lockd shutdown race (bnc#1012382).
- lockd: lost rollback of set_grace_period() in lockd_down_net() (git-fixes).
- mac80211: bail out from prep_connection() if a reconfig is ongoing (bnc#1012382).
- mceusb: sporadic RX truncation corruption fix (bnc#1012382).
- md: document lifetime of internal rdev pointer (bsc#1056415).
- md: fix two problems with setting the 're-add' device state (bsc#1089023).
- md: only allow remove_and_add_spares when no sync_thread running (bsc#1056415).
- md raid10: fix NULL deference in handle_write_completed() (git-fixes).
- md/raid10: reset the 'first' at the end of loop (bnc#1012382).
- md/raid5: make use of spin_lock_irq over local_irq_disable + spin_lock (bnc#1012382).
- media: v4l2-compat-ioctl32: do not oops on overlay (bnc#1012382).
- media: videobuf2-core: do not go out of the buffer range (bnc#1012382).
- mei: remove dev_err message on an unsupported ioctl (bnc#1012382).
- mISDN: Fix a sleep-in-atomic bug (bnc#1012382).
- mlx5: fix bug reading rss_hash_type from CQE (bnc#1012382).
- mmc: jz4740: Fix race condition in IRQ mask update (bnc#1012382).
- mm/filemap.c: fix NULL pointer in page_cache_tree_insert() (bnc#1012382).
- mm, slab: reschedule cache_reap() on the same CPU (bnc#1012382).
- mtd: cfi: cmdset_0001: Do not allow read/write to suspend erase block (bnc#1012382).
- mtd: cfi: cmdset_0001: Workaround Micron Erase suspend bug (bnc#1012382).
- mtd: cfi: cmdset_0002: Do not allow read/write to suspend erase block (bnc#1012382).
- mtd: jedec_probe: Fix crash in jedec_read_mfr() (bnc#1012382).
- neighbour: update neigh timestamps iff update is effective (bnc#1012382).
- net: af_packet: fix race in PACKET_{R|T}X_RING (bnc#1012382).
- net: cavium: liquidio: fix up 'Avoid dma_unmap_single on uninitialized ndata' (bnc#1012382).
- net: cdc_ncm: Fix TX zero padding (bnc#1012382).
- net: emac: fix reset timeout with AR8035 phy (bnc#1012382).
- net: ethernet: ti: cpsw: adjust cpsw fifos depth for fullduplex flow control (bnc#1012382).
- netfilter: bridge: ebt_among: add more missing match size checks (bnc#1012382).
- netfilter: ctnetlink: fix incorrect nf_ct_put during hash resize (bnc#1012382).
- netfilter: ctnetlink: Make some parameters integer to avoid enum mismatch (bnc#1012382).
- netfilter: nf_nat_h323: fix logical-not-parentheses warning (bnc#1012382).
- netfilter: x_tables: add and use xt_check_proc_name (bnc#1012382).
- net: fix deadlock while clearing neighbor proxy table (bnc#1012382).
- net: fix possible out-of-bound read in skb_network_protocol() (bnc#1012382).
- net: fool proof dev_valid_name() (bnc#1012382).
- net: freescale: fix potential null pointer dereference (bnc#1012382).
- net: hns: Fix ethtool private flags (bnc#1012382 bsc#1085511).
- net: ieee802154: fix net_device reference release too early (bnc#1012382).
- net/ipv6: Fix route leaking between VRFs (bnc#1012382).
- net/ipv6: Increment OUTxxx counters after netfilter hook (bnc#1012382).
- netlink: make sure nladdr has correct size in netlink_connect() (bnc#1012382).
- net: llc: add lock_sock in llc_ui_bind to avoid a race condition (bnc#1012382).
- net/mlx4: Check if Granular QoS per VF has been enabled before updating QP qos_vport (bnc#1012382).
- net/mlx4_core: Fix memory leak while delete slave's resources (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- net/mlx4_en: Avoid adding steering rules with invalid ring (bnc#1012382).
- net/mlx4_en: Fix mixed PFC and Global pause user control requests (bsc#1015336 FATE#321685 bsc#1015337 FATE#321686 bsc#1015340 FATE#321687).
- net/mlx4: Fix the check in attaching steering rules (bnc#1012382).
- net/mlx5: avoid build warning for uniprocessor (bnc#1012382).
- net/mlx5e: Add error print in ETS init (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: Check support before TC swap in ETS init (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: E-Switch, Use the name of static array instead of its address (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Remove unused define MLX5_MPWRQ_STRIDES_PER_PAGE (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Fix error handling in load one (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Fix ingress/egress naming mistake (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Tolerate irq_set_affinity_hint() failures (bnc#1012382).
- net: move somaxconn init from sysctl code (bnc#1012382).
- net: phy: avoid genphy_aneg_done() for PHYs without clause 22 support (bnc#1012382).
- net: qca_spi: Fix alignment issues in rx path (bnc#1012382).
- net sched actions: fix dumping which requires several messages to user space (bnc#1012382).
- net/sched: fix NULL dereference in the error path of tcf_bpf_init() (bnc#1012382).
- net: validate attribute sizes in neigh_dump_table() (bnc#1012382).
- net: x25: fix one potential use-after-free issue (bnc#1012382).
- net: xfrm: use preempt-safe this_cpu_read() in ipcomp_alloc_tfms() (bnc#1012382).
- nfsv4.1: RECLAIM_COMPLETE must handle NFS4ERR_CONN_NOT_BOUND_TO_SESSION (bnc#1012382).
- nfsv4.1: Work around a Linux server bug.. (bnc#1012382).
- nospec: Kill array_index_nospec_mask_check() (bnc#1012382).
- nospec: Move array_index_nospec() parameter checking into separate macro (bnc#1012382).
- ovl: filter trusted xattr for non-admin (bnc#1012382).
- packet: fix bitfield update race (bnc#1012382).
- parisc: Fix out of array access in match_pci_device() (bnc#1012382).
- parport_pc: Add support for WCH CH382L PCI-E single parallel port card (bnc#1012382).
- partitions/msdos: Unable to mount UFS 44bsd partitions (bnc#1012382).
- pci/cxgb4: Extend T3 PCI quirk to T4+ devices (bsc#981348).
- pci: Make PCI_ROM_ADDRESS_MASK a 32-bit constant (bnc#1012382).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (bnc#1012382).
- perf/core: Fix locking for children siblings group read (git-fixes).
- perf header: Set proper module name when build-id event found (bnc#1012382).
- perf/hwbp: Simplify the perf-hwbp code, fix documentation (bnc#1012382).
- perf intel-pt: Fix error recovery from missing TIP packet (bnc#1012382).
- perf intel-pt: Fix overlap detection to identify consecutive buffers correctly (bnc#1012382).
- perf intel-pt: Fix sync_switch (bnc#1012382).
- perf intel-pt: Fix timestamp following overflow (bnc#1012382).
- perf probe: Add warning message if there is unexpected event name (bnc#1012382).
- perf report: Ensure the perf DSO mapping matches what libdw sees (bnc#1012382).
- perf: Return proper values for user stack errors (bnc#1012382).
- perf tests: Decompress kernel module before objdump (bnc#1012382).
- perf tools: Fix copyfile_offset update of output offset (bnc#1012382).
- perf trace: Add mmap alias for s390 (bnc#1012382).
- pidns: disable pid allocation if pid_ns_prepare_proc() is failed in alloc_pid() (bnc#1012382).
- pNFS/flexfiles: missing error code in ff_layout_alloc_lseg() (bnc#1012382).
- powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bnc#1012382).
- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).
- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).
- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).
- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).
- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).
- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).
- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/[booke|4xx]: Do not clobber TCR[WP] when setting TCR[DIE] (bnc#1012382).
- powerpc/crash: Remove the test for cpu_online in the IPI callback (bsc#1088242).
- powerpc: Do not send system reset request through the oops path (bsc#1088242).
- powerpc/eeh: Fix enabling bridge MMIO windows (bnc#1012382).
- powerpc/lib: Fix off-by-one in alternate feature patching (bnc#1012382).
- powerpc/mm: allow memory hotplug into a memoryless node (bsc#1090663).
- powerpc/mm: Allow memory hotplug into an offline node (bsc#1090663).
- powerpc: Move default security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/powernv: define a standard delay for OPAL_BUSY type retry loops (bnc#1012382).
- powerpc/powernv: Fix OPAL NVRAM driver OPAL_BUSY loops (bnc#1012382).
- powerpc/powernv: Handle unknown OPAL errors in opal_nvram_write() (bnc#1012382).
- powerpc/powernv: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075087, bsc#1091041). Update patches.suse/powerpc-pseries-rfi-flush-Call-setup_rfi_flush-after.patch (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/spufs: Fix coredump of SPU contexts (bnc#1012382).
- powerpc: System reset avoid interleaving oops using die synchronisation (bsc#1088242).
- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).
- pppoe: check sockaddr length in pppoe_connect() (bnc#1012382).
- pptp: remove a buggy dst release in pptp_connect() (bnc#1012382).
- qlge: Avoid reading past end of buffer (bnc#1012382).
- r8152: add Linksys USB3GIGV1 id (bnc#1012382).
- r8169: fix setting driver_data after register_netdev (bnc#1012382).
- radeon: hide pointless #warning when compile testing (bnc#1012382).
- random: use a tighter cap in credit_entropy_bits_safe() (bnc#1012382).
- random: use lockless method of accessing and updating f-&gt;reg_idx (bnc#1012382).
- ray_cs: Avoid reading past end of buffer (bnc#1012382).
- rdma/core: Avoid that ib_drain_qp() triggers an out-of-bounds stack access (FATE#321732).
- rdma/mlx5: Protect from NULL pointer derefence (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- rdma/qedr: fix QP's ack timeout configuration (bsc#1022604 FATE#321747).
- rdma/qedr: Fix QP state initialization race (bsc#1022604 FATE#321747).
- rdma/qedr: Fix rc initialization on CNQ allocation failure (bsc#1022604 FATE#321747).
- rdma/rxe: Fix an out-of-bounds read (FATE#322149).
- rdma/ucma: Check AF family prior resolving address (bnc#1012382).
- rdma/ucma: Check that device exists prior to accessing it (bnc#1012382).
- rdma/ucma: Check that device is connected prior to access it (bnc#1012382).
- rdma/ucma: Do not allow join attempts for unsupported AF family (bnc#1012382).
- rdma/ucma: Do not allow setting RDMA_OPTION_IB_PATH without an RDMA device (bnc#1012382).
- rdma/ucma: Ensure that CM_ID exists prior to access it (bnc#1012382).
- rdma/ucma: Fix use-after-free access in ucma_close (bnc#1012382).
- rdma/ucma: Introduce safer rdma_addr_size() variants (bnc#1012382).
- rds; Reset rs-&gt;rs_bound_addr in rds_add_bound() failure path (bnc#1012382).
- regulator: gpio: Fix some error handling paths in 'gpio_regulator_probe()' (bsc#1091960).
- resource: fix integer overflow at reallocation (bnc#1012382).
- Revert 'alsa: pcm: Fix mutex unbalance in OSS emulation ioctls' (kabi).
- Revert 'alsa: pcm: Return -EBUSY for OSS ioctls changing busy streams' (kabi).
- Revert 'arm: dts: am335x-pepper: Fix the audio CODEC's reset pin' (bnc#1012382).
- Revert 'arm: dts: omap3-n900: Fix the audio CODEC's reset pin' (bnc#1012382).
- Revert 'ath10k: send (re)assoc peer command when NSS changed' (bnc#1012382).
- Revert 'cpufreq: Fix governor module removal race' (bnc#1012382).
- Revert 'ip6_vti: adjust vti mtu according to mtu of lower device' (bnc#1012382).
- Revert 'KVM: Fix stack-out-of-bounds read in write_mmio' (bnc#1083635).
- Revert 'mtd: cfi: cmdset_0001: Do not allow read/write to suspend erase block.' (kabi).
- Revert 'mtd: cfi: cmdset_0001: Workaround Micron Erase suspend bug.' (kabi).
- Revert 'mtd: cfi: cmdset_0002: Do not allow read/write to suspend erase block.' (kabi).
- Revert 'mtip32xx: use runtime tag to initialize command header' (bnc#1012382).
- Revert 'PCI/MSI: Stop disabling MSI/MSI-X in pci_device_shutdown()' (bnc#1012382).
- Revert 'perf tests: Decompress kernel module before objdump' (bnc#1012382).
- Revert 'xhci: plat: Register shutdown for xhci_plat' (bnc#1012382).
- rpc_pipefs: fix double-dput() (bnc#1012382).
- rpm/config.sh: build against SP3 in OBS as well.
- rpm/config.sh: ensure sorted patches.
- rtc: interface: Validate alarm-time before handling rollover (bnc#1012382).
- rtc: opal: Handle disabled TPO in opal_get_tpo_time() (bnc#1012382).
- rtc: snvs: fix an incorrect check of return value (bnc#1012382).
- rtl8187: Fix NULL pointer dereference in priv-&gt;conf_mutex (bnc#1012382).
- rxrpc: check return value of skb_to_sgvec always (bnc#1012382).
- s390: add automatic detection of the spectre defense (bnc#1012382).
- s390: add optimized array_index_mask_nospec (bnc#1012382).
- s390: add options to change branch prediction behaviour for the kernel (bnc#1012382 bsc#1068032).
- s390: add sysfs attributes for spectre (bnc#1012382).
- s390/alternative: use a copy of the facility bit mask (bnc#1012382).
- s390/cio: update chpid descriptor after resource accessibility event (bnc#1012382).
- s390: correct module section names for expoline code revert (bnc#1012382).
- s390: correct nospec auto detection init order (bnc#1012382).
- s390/dasd: fix hanging safe offline (bnc#1012382).
- s390/dasd: fix IO error for newly defined devices (bnc#1093144, LTC#167398).
- s390: do not bypass BPENTER for interrupt system calls (bnc#1012382).
- s390: enable CPU alternatives unconditionally (bnc#1012382).
- s390/entry.S: fix spurious zeroing of r0 (bnc#1012382).
- s390: introduce execute-trampolines for branches (bnc#1012382).
- s390/ipl: ensure loadparm valid flag is set (bnc#1012382).
- s390: move nobp parameter functions to nospec-branch.c (bnc#1012382).
- s390: move _text symbol to address higher than zero (bnc#1012382).
- s390/qdio: do not merge ERROR output buffers (bnc#1012382).
- s390/qdio: do not retry EQBS after CCQ 96 (bnc#1012382).
- s390/qeth: consolidate errno translation (bnc#1093144, LTC#167507).
- s390/qeth: fix MAC address update sequence (bnc#1093144, LTC#167609).
- s390/qeth: translate SETVLAN/DELVLAN errors (bnc#1093144, LTC#167507).
- s390: Replace IS_ENABLED(EXPOLINE_*) with IS_ENABLED(CONFIG_EXPOLINE_*) (bnc#1012382).
- s390: report spectre mitigation via syslog (bnc#1012382).
- s390: run user space and KVM guests with modified branch prediction (bnc#1012382).
- s390: scrub registers on kernel entry and KVM exit (bnc#1012382).
- s390/uprobes: implement arch_uretprobe_is_alive() (bnc#1012382).
- sched/numa: Use down_read_trylock() for the mmap_sem (bnc#1012382).
- scsi: bnx2fc: fix race condition in bnx2fc_get_host_stats() (bnc#1012382).
- scsi: libiscsi: Allow sd_shutdown on bad transport (bnc#1012382).
- scsi: libsas: initialize sas_phy status according to response of DISCOVER (bnc#1012382).
- scsi: lpfc: Add per io channel NVME IO statistics (bsc#1088865).
- scsi: lpfc: Correct missing remoteport registration during link bounces (bsc#1088865).
- scsi: lpfc: Correct target queue depth application changes (bsc#1088865).
- scsi: lpfc: Enlarge nvmet asynchronous receive buffer counts (bsc#1088865).
- scsi: lpfc: Fix Abort request WQ selection (bsc#1088865).
- scsi: lpfc: Fix driver not recovering NVME rports during target link faults (bsc#1088865).
- scsi: lpfc: Fix lingering lpfc_wq resource after driver unload (bsc#1088865).
- scsi: lpfc: Fix multiple PRLI completion error path (bsc#1088865).
- scsi: lpfc: Fix NULL pointer access in lpfc_nvme_info_show (bsc#1088865).
- scsi: lpfc: Fix NULL pointer reference when resetting adapter (bsc#1088865).
- scsi: lpfc: Fix nvme remoteport registration race conditions (bsc#1088865).
- scsi: lpfc: Fix WQ/CQ creation for older asic's (bsc#1088865).
- scsi: lpfc: update driver version to 11.4.0.7-2 (bsc#1088865).
- scsi: mpt3sas: Proper handling of set/clear of 'ATA command pending' flag (bnc#1012382).
- scsi: mptsas: Disable WRITE SAME (bnc#1012382).
- scsi: sd: Defer spinning up drive while SANITIZE is in progress (bnc#1012382).
- sctp: do not check port in sctp_inet6_cmp_addr (bnc#1012382).
- sctp: do not leak kernel memory to user space (bnc#1012382).
- sctp: fix recursive locking warning in sctp_do_peeloff (bnc#1012382).
- sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6 (bnc#1012382).
- selftests/powerpc: Fix TM resched DSCR test with some compilers (bnc#1012382).
- selinux: do not check open permission on sockets (bnc#1012382).
- selinux: Remove redundant check for unknown labeling behavior (bnc#1012382).
- selinux: Remove unnecessary check of array base in selinux_set_mapping() (bnc#1012382).
- serial: 8250: omap: Disable DMA for console UART (bnc#1012382).
- serial: mctrl_gpio: Add missing module license (bnc#1012382).
- serial: mctrl_gpio: export mctrl_gpio_disable_ms and mctrl_gpio_init (bnc#1012382).
- serial: sh-sci: Fix race condition causing garbage during shutdown (bnc#1012382).
- sh_eth: Use platform device for printing before register_netdev() (bnc#1012382).
- sit: reload iphdr in ipip6_rcv (bnc#1012382).
- skbuff: only inherit relevant tx_flags (bnc#1012382).
- skbuff: return -EMSGSIZE in skb_to_sgvec to prevent overflow (bnc#1012382).
- sky2: Increase D3 delay to sky2 stops working after suspend (bnc#1012382).
- slip: Check if rstate is initialized before uncompressing (bnc#1012382).
- sparc64: ldc abort during vds iso boot (bnc#1012382).
- spi: davinci: fix up dma_mapping_error() incorrect patch (bnc#1012382).
- staging: comedi: ni_mio_common: ack ai fifo error interrupts (bnc#1012382).
- staging: ion : Donnot wakeup kswapd in ion system alloc (bnc#1012382).
- staging: wlan-ng: prism2mgmt.c: fixed a double endian conversion before calling hfa384x_drvr_setconfig16, also fixes relative sparse warning (bnc#1012382).
- swap: divide-by-zero when zero length swap file on ssd (bsc#1082153).
- tags: honor COMPILED_SOURCE with apart output directory (bnc#1012382).
- tcp: better validation of received ack sequences (bnc#1012382).
- tcp: do not read out-of-bounds opsize (bnc#1012382).
- tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets (bnc#1012382).
- team: avoid adding twice the same option to the event list (bnc#1012382).
- team: fix netconsole setup over team (bnc#1012382).
- thermal: imx: Fix race condition in imx_thermal_probe() (bnc#1012382).
- thermal: power_allocator: fix one race condition issue for thermal_instances list (bnc#1012382).
- thunderbolt: Resume control channel after hibernation image is created (bnc#1012382).
- tipc: add policy for TIPC_NLA_NET_ADDR (bnc#1012382).
- tty: Do not call panic() at tty_ldisc_init() (bnc#1012382).
- tty: make n_tty_read() always abort if hangup is in progress (bnc#1012382).
- tty: n_gsm: Allow ADM response in addition to UA for control dlci (bnc#1012382).
- tty: n_gsm: Fix DLCI handling for ADM mode if debug &amp; 2 is not set (bnc#1012382).
- tty: n_gsm: Fix long delays with control frame timeouts in ADM mode (bnc#1012382).
- tty: provide tty_name() even without CONFIG_TTY (bnc#1012382).
- tty: Use __GFP_NOFAIL for tty_ldisc_get() (bnc#1012382).
- ubi: fastmap: Do not flush fastmap work on detach (bnc#1012382).
- ubi: Fix error for write access (bnc#1012382).
- ubifs: Check ubifs_wbuf_sync() return code (bnc#1012382).
- ubi: Reject MLC NAND (bnc#1012382).
- um: Use POSIX ucontext_t instead of struct ucontext (bnc#1012382).
- Update config files, add expoline for s390x (bsc#1089393).
- Update patches.suse/x86-nospectre_v2-means-nospec-too.patch (bsc#1075994 bsc#1075091 bnc#1085958).
- usb: chipidea: properly handle host or gadget initialization failure (bnc#1012382).
- usb: core: Add quirk for HP v222w 16GB Mini (bnc#1012382).
- usb: dwc2: Improve gadget state disconnection handling (bnc#1012382).
- usb: dwc3: keystone: check return value (bnc#1012382).
- usb: dwc3: pci: Properly cleanup resource (bnc#1012382).
- usb: ene_usb6250: fix first command execution (bnc#1012382).
- usb: ene_usb6250: fix SCSI residue overwriting (bnc#1012382).
- usb:fix USB3 devices behind USB3 hubs not resuming at hibernate thaw (bnc#1012382).
- usb: gadget: align buffer size when allocating for OUT endpoint (bnc#1012382).
- usb: gadget: change len to size_t on alloc_ep_req() (bnc#1012382).
- usb: gadget: define free_ep_req as universal function (bnc#1012382).
- usb: gadget: f_hid: fix: Prevent accessing released memory (bnc#1012382).
- usb: gadget: fix request length error for isoc transfer (git-fixes).
- usb: gadget: fix usb_ep_align_maybe endianness and new usb_ep_align (bnc#1012382).
- usb: Increment wakeup count on remote wakeup (bnc#1012382).
- usbip: usbip_host: fix to hold parent lock for device_attach() calls (bnc#1012382).
- usbip: vhci_hcd: Fix usb device and sockfd leaks (bnc#1012382).
- usb: musb: gadget: misplaced out of bounds check (bnc#1012382).
- usb: serial: cp210x: add ELDAT Easywave RX09 id (bnc#1012382).
- usb: serial: cp210x: add ID for NI USB serial console (bnc#1012382).
- usb: serial: ftdi_sio: add RT Systems VX-8 cable (bnc#1012382).
- usb: serial: ftdi_sio: add support for Harman FirmwareHubEmulator (bnc#1012382).
- usb: serial: ftdi_sio: use jtag quirk for Arrow USB Blaster (bnc#1012382).
- usb: serial: simple: add libtransistor console (bnc#1012382).
- vfb: fix video mode and line_length being set when loaded (bnc#1012382).
- vfio/pci: Virtualize Maximum Payload Size (bnc#1012382).
- vfio/pci: Virtualize Maximum Read Request Size (bnc#1012382).
- vfio-pci: Virtualize PCIe &amp; AF FLR (bnc#1012382).
- vhost: correctly remove wait queue during poll failure (bnc#1012382).
- virtio: add ability to iterate over vqs (bnc#1012382).
- virtio_console: free buffers after reset (bnc#1012382).
- virtio_net: check return value of skb_to_sgvec always (bnc#1012382).
- virtio_net: check return value of skb_to_sgvec in one more location (bnc#1012382).
- vlan: also check phy_driver ts_info for vlan's real device (bnc#1012382).
- vlan: Fix reading memory beyond skb-&gt;tail in skb_vlan_tagged_multi (bnc#1012382).
- vmxnet3: ensure that adapter is in proper state during force_close (bnc#1012382).
- vrf: Fix use after free and double free in vrf_finish_output (bnc#1012382).
- vt: change SGR 21 to follow the standards (bnc#1012382).
- vti6: better validate user provided tunnel names (bnc#1012382).
- vxlan: dont migrate permanent fdb entries during learn (bnc#1012382).
- watchdog: f71808e_wdt: Fix WD_EN register read (bnc#1012382).
- watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).
- wl1251: check return from call to wl1251_acx_arp_ip_filter (bnc#1012382).
- writeback: fix the wrong congested state variable definition (bnc#1012382).
- writeback: safer lock nesting (bnc#1012382).
- x86/asm: Do not use RBP as a temporary register in csum_partial_copy_generic() (bnc#1012382).
- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).
- x86/bugs: Make sure that _TIF_SSBD does not end up in _TIF_ALLWORK_MASK (bsc#1093215).
- x86/hweight: Do not clobber %rdi (bnc#1012382).
- x86/hweight: Get rid of the special calling convention (bnc#1012382).
- x86/ipc: Fix x32 version of shmid64_ds and msqid64_ds (bnc#1012382).
- x86/platform/UV: Add references to access fixed UV4A HUB MMRs (bsc#1076263 #fate#322814).
- x86/platform/uv/BAU: Replace hard-coded values with MMR definitions (bsc#1076263 #fate#322814).
- x86/platform/UV: Fix critical UV MMR address error (bsc#1076263
- x86/platform/UV: Fix GAM MMR changes in UV4A (bsc#1076263 #fate#322814).
- x86/platform/UV: Fix GAM MMR references in the UV x2apic code (bsc#1076263 #fate#322814).
- x86/platform/UV: Fix GAM Range Table entries less than 1GB (bsc#1091325).
- x86/platform/UV: Fix UV4A BAU MMRs (bsc#1076263 #fate#322814).
- x86/platform/UV: Fix UV4A support on new Intel Processors (bsc#1076263 #fate#322814).
- x86/platform/uv: Skip UV runtime services mapping in the efi_runtime_disabled case (bsc#1089925).
- x86/platform/UV: Update uv_mmrs.h to prepare for UV4A fixes (bsc#1076263 #fate#322814).
- x86/smpboot: Do not use mwait_play_dead() on AMD systems (bnc#1012382).
- x86/tsc: Prevent 32bit truncation in calc_hpet_ref() (bnc#1012382).
- x86/tsc: Provide 'tsc=unstable' boot parameter (bnc#1012382).
- xen: avoid type warning in xchg_xen_ulong (bnc#1012382).
- xen-netfront: Fix hang on device removal (bnc#1012382).
- xfrm: fix state migration copy replay sequence numbers (bnc#1012382).
- xfrm: Refuse to insert 32 bit userspace socket policies on 64 bit systems (bnc#1012382).
- xfrm_user: uncoditionally validate esn replay attribute struct (bnc#1012382).
- xfs: always verify the log tail during recovery (bsc#1036215).
- xfs: detect and handle invalid iclog size set by mkfs (bsc#1043598).
- xfs: detect and trim torn writes during log recovery (bsc#1036215).
- xfs: fix log recovery corruption error due to tail overwrite (bsc#1036215).
- xfs: fix recovery failure when log record header wraps log end (bsc#1036215).
- xfs: handle -EFSCORRUPTED during head/tail verification (bsc#1036215).
- xfs: refactor and open code log record crc check (bsc#1036215).
- xfs: refactor log record start detection into a new helper (bsc#1036215).
- xfs: return start block of first bad log record during recovery (bsc#1036215).
- xfs: support a crc verification only log record pass (bsc#1036215).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005778">SUSE bug 1005778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005780">SUSE bug 1005780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005781">SUSE bug 1005781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009062">SUSE bug 1009062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015336">SUSE bug 1015336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015337">SUSE bug 1015337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015340">SUSE bug 1015340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015342">SUSE bug 1015342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015343">SUSE bug 1015343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022604">SUSE bug 1022604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022743">SUSE bug 1022743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024296">SUSE bug 1024296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031492">SUSE bug 1031492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036215">SUSE bug 1036215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043598">SUSE bug 1043598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044596">SUSE bug 1044596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056415">SUSE bug 1056415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056427">SUSE bug 1056427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060799">SUSE bug 1060799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075087">SUSE bug 1075087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076263">SUSE bug 1076263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080157">SUSE bug 1080157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082153">SUSE bug 1082153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082299">SUSE bug 1082299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082485">SUSE bug 1082485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082962">SUSE bug 1082962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083125">SUSE bug 1083125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083635">SUSE bug 1083635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083650">SUSE bug 1083650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083900">SUSE bug 1083900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084721">SUSE bug 1084721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085058">SUSE bug 1085058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085185">SUSE bug 1085185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085511">SUSE bug 1085511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085958">SUSE bug 1085958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088242">SUSE bug 1088242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088865">SUSE bug 1088865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089023">SUSE bug 1089023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089115">SUSE bug 1089115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089198">SUSE bug 1089198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089393">SUSE bug 1089393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089608">SUSE bug 1089608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089644">SUSE bug 1089644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089752">SUSE bug 1089752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089895">SUSE bug 1089895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089925">SUSE bug 1089925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090225">SUSE bug 1090225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090643">SUSE bug 1090643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090658">SUSE bug 1090658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090663">SUSE bug 1090663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090708">SUSE bug 1090708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090718">SUSE bug 1090718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090734">SUSE bug 1090734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090953">SUSE bug 1090953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091041">SUSE bug 1091041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091325">SUSE bug 1091325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091728">SUSE bug 1091728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091925">SUSE bug 1091925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091960">SUSE bug 1091960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092289">SUSE bug 1092289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092566">SUSE bug 1092566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093008">SUSE bug 1093008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093144">SUSE bug 1093144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093215">SUSE bug 1093215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094019">SUSE bug 1094019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802154">SUSE bug 802154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966170">SUSE bug 966170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966172">SUSE bug 966172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966186">SUSE bug 966186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966191">SUSE bug 966191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969476">SUSE bug 969476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969477">SUSE bug 969477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981348">SUSE bug 981348</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000199">CVE-2018-1000199 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10087/">CVE-2018-10087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10087">CVE-2018-10087 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10124/">CVE-2018-10124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10124">CVE-2018-10124 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1065/">CVE-2018-1065 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1065">CVE-2018-1065 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1130">CVE-2018-1130 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5803">CVE-2018-5803 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7492/">CVE-2018-7492 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7492">CVE-2018-7492 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8781">CVE-2018-8781 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553801" comment="kernel-default-4.4.131-94.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553802" comment="kernel-default-base-4.4.131-94.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553803" comment="kernel-default-devel-4.4.131-94.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553804" comment="kernel-default-man-4.4.131-94.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520985" comment="kernel-devel-4.4.131-94.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520986" comment="kernel-macros-4.4.131-94.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520987" comment="kernel-source-4.4.131-94.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553805" comment="kernel-syms-4.4.131-94.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149740" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1092061" ref_url="https://bugzilla.suse.com/1092061" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0494" ref_url="https://www.suse.com/security/cve/CVE-2018-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004075.html" source="SUSE-SU"/>
		<description>
This update for wget fixes the following issues:

- CVE-2018-0494: Fixed a cookie injection vulnerability by checking for
  and joining continuation lines. (bsc#1092061)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092061">SUSE bug 1092061</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0494/">CVE-2018-0494 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0494">CVE-2018-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553806" comment="wget-1.14-21.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149741" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="1079300" ref_url="https://bugzilla.suse.com/1079300" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2018-1000030" ref_url="https://www.suse.com/security/cve/CVE-2018-1000030/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004074.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2017-1000158: Fixed integer overflows in PyString_DecodeEscape that could have resulted in
  heap-based buffer overflow attacks and possible arbitrary code execution (bsc#1068664).
- CVE-2018-1000030: Fixed crash inside the Python interpreter when multiple threads used the same
  I/O stream concurrently (bsc#1079300).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079300">SUSE bug 1079300</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000158">CVE-2017-1000158 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000030/">CVE-2018-1000030 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000030">CVE-2018-1000030 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553807" comment="libpython2_7-1_0-2.7.13-28.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553808" comment="libpython2_7-1_0-32bit-2.7.13-28.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553809" comment="python-2.7.13-28.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553810" comment="python-32bit-2.7.13-28.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553811" comment="python-base-2.7.13-28.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553812" comment="python-base-32bit-2.7.13-28.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553813" comment="python-curses-2.7.13-28.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553814" comment="python-demo-2.7.13-28.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553815" comment="python-doc-2.7.13-28.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553816" comment="python-doc-pdf-2.7.13-28.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553817" comment="python-gdbm-2.7.13-28.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553818" comment="python-idle-2.7.13-28.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553819" comment="python-tk-2.7.13-28.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553820" comment="python-xml-2.7.13-28.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149742" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1047044" ref_url="https://bugzilla.suse.com/1047044" source="BUGZILLA"/>
		<reference ref_id="1047898" ref_url="https://bugzilla.suse.com/1047898" source="BUGZILLA"/>
		<reference ref_id="1050120" ref_url="https://bugzilla.suse.com/1050120" source="BUGZILLA"/>
		<reference ref_id="1050606" ref_url="https://bugzilla.suse.com/1050606" source="BUGZILLA"/>
		<reference ref_id="1051446" ref_url="https://bugzilla.suse.com/1051446" source="BUGZILLA"/>
		<reference ref_id="1052468" ref_url="https://bugzilla.suse.com/1052468" source="BUGZILLA"/>
		<reference ref_id="1052550" ref_url="https://bugzilla.suse.com/1052550" source="BUGZILLA"/>
		<reference ref_id="1052710" ref_url="https://bugzilla.suse.com/1052710" source="BUGZILLA"/>
		<reference ref_id="1052720" ref_url="https://bugzilla.suse.com/1052720" source="BUGZILLA"/>
		<reference ref_id="1052731" ref_url="https://bugzilla.suse.com/1052731" source="BUGZILLA"/>
		<reference ref_id="1052732" ref_url="https://bugzilla.suse.com/1052732" source="BUGZILLA"/>
		<reference ref_id="1055065" ref_url="https://bugzilla.suse.com/1055065" source="BUGZILLA"/>
		<reference ref_id="1055323" ref_url="https://bugzilla.suse.com/1055323" source="BUGZILLA"/>
		<reference ref_id="1055434" ref_url="https://bugzilla.suse.com/1055434" source="BUGZILLA"/>
		<reference ref_id="1055855" ref_url="https://bugzilla.suse.com/1055855" source="BUGZILLA"/>
		<reference ref_id="1058640" ref_url="https://bugzilla.suse.com/1058640" source="BUGZILLA"/>
		<reference ref_id="1059751" ref_url="https://bugzilla.suse.com/1059751" source="BUGZILLA"/>
		<reference ref_id="1074123" ref_url="https://bugzilla.suse.com/1074123" source="BUGZILLA"/>
		<reference ref_id="1074969" ref_url="https://bugzilla.suse.com/1074969" source="BUGZILLA"/>
		<reference ref_id="1074973" ref_url="https://bugzilla.suse.com/1074973" source="BUGZILLA"/>
		<reference ref_id="1074975" ref_url="https://bugzilla.suse.com/1074975" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10800" ref_url="https://www.suse.com/security/cve/CVE-2017-10800/" source="CVE"/>
		<reference ref_id="CVE-2017-11141" ref_url="https://www.suse.com/security/cve/CVE-2017-11141/" source="CVE"/>
		<reference ref_id="CVE-2017-11529" ref_url="https://www.suse.com/security/cve/CVE-2017-11529/" source="CVE"/>
		<reference ref_id="CVE-2017-11644" ref_url="https://www.suse.com/security/cve/CVE-2017-11644/" source="CVE"/>
		<reference ref_id="CVE-2017-11724" ref_url="https://www.suse.com/security/cve/CVE-2017-11724/" source="CVE"/>
		<reference ref_id="CVE-2017-12434" ref_url="https://www.suse.com/security/cve/CVE-2017-12434/" source="CVE"/>
		<reference ref_id="CVE-2017-12564" ref_url="https://www.suse.com/security/cve/CVE-2017-12564/" source="CVE"/>
		<reference ref_id="CVE-2017-12667" ref_url="https://www.suse.com/security/cve/CVE-2017-12667/" source="CVE"/>
		<reference ref_id="CVE-2017-12670" ref_url="https://www.suse.com/security/cve/CVE-2017-12670/" source="CVE"/>
		<reference ref_id="CVE-2017-12672" ref_url="https://www.suse.com/security/cve/CVE-2017-12672/" source="CVE"/>
		<reference ref_id="CVE-2017-12675" ref_url="https://www.suse.com/security/cve/CVE-2017-12675/" source="CVE"/>
		<reference ref_id="CVE-2017-13060" ref_url="https://www.suse.com/security/cve/CVE-2017-13060/" source="CVE"/>
		<reference ref_id="CVE-2017-13146" ref_url="https://www.suse.com/security/cve/CVE-2017-13146/" source="CVE"/>
		<reference ref_id="CVE-2017-13648" ref_url="https://www.suse.com/security/cve/CVE-2017-13648/" source="CVE"/>
		<reference ref_id="CVE-2017-13658" ref_url="https://www.suse.com/security/cve/CVE-2017-13658/" source="CVE"/>
		<reference ref_id="CVE-2017-14326" ref_url="https://www.suse.com/security/cve/CVE-2017-14326/" source="CVE"/>
		<reference ref_id="CVE-2017-14533" ref_url="https://www.suse.com/security/cve/CVE-2017-14533/" source="CVE"/>
		<reference ref_id="CVE-2017-17881" ref_url="https://www.suse.com/security/cve/CVE-2017-17881/" source="CVE"/>
		<reference ref_id="CVE-2017-18022" ref_url="https://www.suse.com/security/cve/CVE-2017-18022/" source="CVE"/>
		<reference ref_id="CVE-2018-5246" ref_url="https://www.suse.com/security/cve/CVE-2018-5246/" source="CVE"/>
		<reference ref_id="CVE-2018-5247" ref_url="https://www.suse.com/security/cve/CVE-2018-5247/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2018-5246: Fixed memory leak vulnerability in ReadPATTERNImage in
  coders/pattern.c (bsc#1074973)
- CVE-2017-18022: Fixed memory leak vulnerability in MontageImageCommand in
  MagickWand/montage.c (bsc#1074975)
- CVE-2018-5247: Fixed memory leak vulnerability in ReadRLAImage in
  coders/rla.c (bsc#1074969)
- CVE-2017-12672: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial
  of service (bsc#1052720)
- CVE-2017-13060: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial
  of service via a crafted file (bsc#1055065)
- CVE-2017-11724: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c involving the quantum_info and clone_info
  data structures (bsc#1051446)
- CVE-2017-12670: Added validation in coders/mat.c to prevent an assertion
  failure in the function DestroyImage in MagickCore/image.c, which
  allowed attackers to cause a denial of service (bsc#1052731)
- CVE-2017-12667: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1052732)
- CVE-2017-13146: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1055323)
- CVE-2017-10800: Processing MATLAB images in coders/mat.c could have lead to a
  denial of service (OOM) in ReadMATImage() if the size specified for a
  MAT Object was larger than the actual amount of data (bsc#1047044)
- CVE-2017-13648: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1055434)
- CVE-2017-11141: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders\mat.c that could have caused memory exhaustion
  via a crafted MAT file, related to incorrect ordering of a
  SetImageExtent call (bsc#1047898)
- CVE-2017-11529: The ReadMATImage function in coders/mat.c allowed remote
  attackers to cause a denial of service (memory leak) via a crafted file
  (bsc#1050120)
- CVE-2017-12564: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial
  of service (bsc#1052468)
- CVE-2017-12434: Added a missing NULL check in the function ReadMATImage in
  coders/mat.c, which allowed attackers to cause a denial of service
  (assertion failure) in DestroyImageInfo in image.c (bsc#1052550)
- CVE-2017-12675: Added a missing check for multidimensional data coders/mat.c,
  that could have lead to a memory leak in the function ReadImage in
  MagickCore/constitute.c, which allowed attackers to cause a denial of
  service (bsc#1052710)
- CVE-2017-14326: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial
  of service via a crafted file (bsc#1058640)
- CVE-2017-11644: Processesing a crafted file in convert could have lead to a
  memory leak in the ReadMATImage() function in coders/mat.c
  (bsc#1050606)
- CVE-2017-13658: Added a missing NULL check in the ReadMATImage function in
  coders/mat.c, which could have lead to a denial of service (assertion
  failure and application exit) in the DestroyImageInfo function in
  MagickCore/image.c (bsc#1055855)
- CVE-2017-14533: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1059751)
- CVE-2017-17881: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted MAT image file (bsc#1074123)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-18"/>
	<updated date="2018-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047044">SUSE bug 1047044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047898">SUSE bug 1047898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050120">SUSE bug 1050120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050606">SUSE bug 1050606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051446">SUSE bug 1051446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052468">SUSE bug 1052468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052550">SUSE bug 1052550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052710">SUSE bug 1052710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052720">SUSE bug 1052720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052731">SUSE bug 1052731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052732">SUSE bug 1052732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055065">SUSE bug 1055065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055323">SUSE bug 1055323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055434">SUSE bug 1055434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055855">SUSE bug 1055855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058640">SUSE bug 1058640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059751">SUSE bug 1059751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074123">SUSE bug 1074123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074969">SUSE bug 1074969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074973">SUSE bug 1074973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074975">SUSE bug 1074975</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10800/">CVE-2017-10800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10800">CVE-2017-10800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11141/">CVE-2017-11141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11141">CVE-2017-11141 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11529/">CVE-2017-11529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11529">CVE-2017-11529 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11644/">CVE-2017-11644 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11644">CVE-2017-11644 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11724/">CVE-2017-11724 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11724">CVE-2017-11724 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12434/">CVE-2017-12434 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12434">CVE-2017-12434 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12564/">CVE-2017-12564 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12564">CVE-2017-12564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12667/">CVE-2017-12667 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12667">CVE-2017-12667 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12670/">CVE-2017-12670 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12670">CVE-2017-12670 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12672/">CVE-2017-12672 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12672">CVE-2017-12672 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12675/">CVE-2017-12675 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12675">CVE-2017-12675 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13060/">CVE-2017-13060 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13060">CVE-2017-13060 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13146/">CVE-2017-13146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13146">CVE-2017-13146 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13648/">CVE-2017-13648 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13648">CVE-2017-13648 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13658/">CVE-2017-13658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13658">CVE-2017-13658 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14326/">CVE-2017-14326 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14326">CVE-2017-14326 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14533/">CVE-2017-14533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14533">CVE-2017-14533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17881/">CVE-2017-17881 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17881">CVE-2017-17881 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18022/">CVE-2017-18022 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18022">CVE-2017-18022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5246/">CVE-2018-5246 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5246">CVE-2018-5246 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5247/">CVE-2018-5247 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5247">CVE-2018-5247 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551002" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551003" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149743" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1000396" ref_url="https://bugzilla.suse.com/1000396" source="BUGZILLA"/>
		<reference ref_id="1001299" ref_url="https://bugzilla.suse.com/1001299" source="BUGZILLA"/>
		<reference ref_id="1086247" ref_url="https://bugzilla.suse.com/1086247" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0634" ref_url="https://www.suse.com/security/cve/CVE-2016-0634/" source="CVE"/>
		<reference ref_id="CVE-2016-7543" ref_url="https://www.suse.com/security/cve/CVE-2016-7543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004084.html" source="SUSE-SU"/>
		<description>
This update for bash fixes the following issues:

Security issues fixed:

- CVE-2016-7543: A code execution possibility via SHELLOPTS+PS4 variable was fixed (bsc#1001299)
- CVE-2016-0634: Arbitrary code execution via malicious hostname was fixed (bsc#1000396)

Non-security issues fixed:

- Fix repeating self-calling of traps due the combination of a non-interactive shell, a trap handler for SIGINT, an
  external process in the trap handler, and a SIGINT within the trap after the external process runs. (bsc#1086247)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-23"/>
	<updated date="2018-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000396">SUSE bug 1000396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001299">SUSE bug 1001299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086247">SUSE bug 1086247</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0634/">CVE-2016-0634 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0634">CVE-2016-0634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7543/">CVE-2016-7543 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7543">CVE-2016-7543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553821" comment="bash-4.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520999" comment="bash-doc-4.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553822" comment="libreadline6-6.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551006" comment="libreadline6-32bit-6.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521003" comment="readline-doc-6.3-83.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149744" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1034674" ref_url="https://bugzilla.suse.com/1034674" source="BUGZILLA"/>
		<reference ref_id="1034678" ref_url="https://bugzilla.suse.com/1034678" source="BUGZILLA"/>
		<reference ref_id="1067203" ref_url="https://bugzilla.suse.com/1067203" source="BUGZILLA"/>
		<reference ref_id="1072193" ref_url="https://bugzilla.suse.com/1072193" source="BUGZILLA"/>
		<reference ref_id="1077999" ref_url="https://bugzilla.suse.com/1077999" source="BUGZILLA"/>
		<reference ref_id="1087932" ref_url="https://bugzilla.suse.com/1087932" source="BUGZILLA"/>
		<reference ref_id="929629" ref_url="https://bugzilla.suse.com/929629" source="BUGZILLA"/>
		<reference ref_id="990636" ref_url="https://bugzilla.suse.com/990636" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="CVE-2016-6293" ref_url="https://www.suse.com/security/cve/CVE-2016-6293/" source="CVE"/>
		<reference ref_id="CVE-2017-14952" ref_url="https://www.suse.com/security/cve/CVE-2017-14952/" source="CVE"/>
		<reference ref_id="CVE-2017-15422" ref_url="https://www.suse.com/security/cve/CVE-2017-15422/" source="CVE"/>
		<reference ref_id="CVE-2017-17484" ref_url="https://www.suse.com/security/cve/CVE-2017-17484/" source="CVE"/>
		<reference ref_id="CVE-2017-7867" ref_url="https://www.suse.com/security/cve/CVE-2017-7867/" source="CVE"/>
		<reference ref_id="CVE-2017-7868" ref_url="https://www.suse.com/security/cve/CVE-2017-7868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004085.html" source="SUSE-SU"/>
		<description>
icu was updated to fix two security issues.

These security issues were fixed:
- CVE-2014-8147: The resolveImplicitLevels function in common/ubidi.c
  in the Unicode Bidirectional Algorithm implementation in ICU4C in
  International Components for Unicode (ICU) used an integer data type
  that is inconsistent with a header file, which allowed remote attackers
  to cause a denial of service (incorrect malloc followed by invalid free)
  or possibly execute arbitrary code via crafted text (bsc#929629).
- CVE-2014-8146: The resolveImplicitLevels function in common/ubidi.c
  in the Unicode Bidirectional Algorithm implementation in ICU4C in
  International Components for Unicode (ICU) did not properly track
  directionally isolated pieces of text, which allowed remote attackers
  to cause a denial of service (heap-based buffer overflow) or possibly
  execute arbitrary code via crafted text (bsc#929629).
- CVE-2016-6293: The uloc_acceptLanguageFromHTTP function in
  common/uloc.cpp in International Components for Unicode (ICU) for C/C++
  did not ensure that there is a '\0' character at the end of a certain
  temporary array, which allowed remote attackers to cause a denial of
  service (out-of-bounds read) or possibly have unspecified other impact
  via a call with a long httpAcceptLanguage argument (bsc#990636).
- CVE-2017-7868: International Components for Unicode (ICU) for C/C++
  2017-02-13 has an out-of-bounds write caused by a heap-based buffer
  overflow related to the utf8TextAccess function in common/utext.cpp and
  the utext_moveIndex32* function (bsc#1034674)
- CVE-2017-7867: International Components for Unicode (ICU) for C/C++
  2017-02-13 has an out-of-bounds write caused by a heap-based buffer
  overflow related to the utf8TextAccess function in common/utext.cpp and
  the utext_setNativeIndex* function (bsc#1034678)
- CVE-2017-14952: Double free in i18n/zonemeta.cpp in International
  Components for Unicode (ICU) for C/C++ allowed remote attackers to
  execute arbitrary code via a crafted string, aka a 'redundant UVector
  entry clean up function call' issue (bnc#1067203)
- CVE-2017-17484: The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp
  in International Components for Unicode (ICU) for C/C++ mishandled
  ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allowed remote
  attackers to cause a denial of service (stack-based buffer overflow
  and application crash) or possibly have unspecified other impact via a
  crafted string, as demonstrated by ZNC  (bnc#1072193)
- CVE-2017-15422: An integer overflow in icu during persian calendar
  date processing could lead to incorrect years shown (bnc#1077999)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-23"/>
	<updated date="2018-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034674">SUSE bug 1034674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034678">SUSE bug 1034678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067203">SUSE bug 1067203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072193">SUSE bug 1072193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077999">SUSE bug 1077999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087932">SUSE bug 1087932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929629">SUSE bug 929629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990636">SUSE bug 990636</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8146">CVE-2014-8146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8147">CVE-2014-8147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6293/">CVE-2016-6293 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6293">CVE-2016-6293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14952/">CVE-2017-14952 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14952">CVE-2017-14952 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15422/">CVE-2017-15422 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15422">CVE-2017-15422 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17484/">CVE-2017-17484 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17484">CVE-2017-17484 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7867/">CVE-2017-7867 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7867">CVE-2017-7867 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7868/">CVE-2017-7868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7868">CVE-2017-7868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553823" comment="libicu-doc-52.1-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553824" comment="libicu52_1-52.1-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546247" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553825" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149745" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1051598" ref_url="https://bugzilla.suse.com/1051598" source="BUGZILLA"/>
		<reference ref_id="1054061" ref_url="https://bugzilla.suse.com/1054061" source="BUGZILLA"/>
		<reference ref_id="1056125" ref_url="https://bugzilla.suse.com/1056125" source="BUGZILLA"/>
		<reference ref_id="1056967" ref_url="https://bugzilla.suse.com/1056967" source="BUGZILLA"/>
		<reference ref_id="1059458" ref_url="https://bugzilla.suse.com/1059458" source="BUGZILLA"/>
		<reference ref_id="1060904" ref_url="https://bugzilla.suse.com/1060904" source="BUGZILLA"/>
		<reference ref_id="1061461" ref_url="https://bugzilla.suse.com/1061461" source="BUGZILLA"/>
		<reference ref_id="1063014" ref_url="https://bugzilla.suse.com/1063014" source="BUGZILLA"/>
		<reference ref_id="1066182" ref_url="https://bugzilla.suse.com/1066182" source="BUGZILLA"/>
		<reference ref_id="1066502" ref_url="https://bugzilla.suse.com/1066502" source="BUGZILLA"/>
		<reference ref_id="1067088" ref_url="https://bugzilla.suse.com/1067088" source="BUGZILLA"/>
		<reference ref_id="1067119" ref_url="https://bugzilla.suse.com/1067119" source="BUGZILLA"/>
		<reference ref_id="1067705" ref_url="https://bugzilla.suse.com/1067705" source="BUGZILLA"/>
		<reference ref_id="1070357" ref_url="https://bugzilla.suse.com/1070357" source="BUGZILLA"/>
		<reference ref_id="1071386" ref_url="https://bugzilla.suse.com/1071386" source="BUGZILLA"/>
		<reference ref_id="1074301" ref_url="https://bugzilla.suse.com/1074301" source="BUGZILLA"/>
		<reference ref_id="1079076" ref_url="https://bugzilla.suse.com/1079076" source="BUGZILLA"/>
		<reference ref_id="1080788" ref_url="https://bugzilla.suse.com/1080788" source="BUGZILLA"/>
		<reference ref_id="1081379" ref_url="https://bugzilla.suse.com/1081379" source="BUGZILLA"/>
		<reference ref_id="1081600" ref_url="https://bugzilla.suse.com/1081600" source="BUGZILLA"/>
		<reference ref_id="1086340" ref_url="https://bugzilla.suse.com/1086340" source="BUGZILLA"/>
		<reference ref_id="1087269" ref_url="https://bugzilla.suse.com/1087269" source="BUGZILLA"/>
		<reference ref_id="1087493" ref_url="https://bugzilla.suse.com/1087493" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16818" ref_url="https://www.suse.com/security/cve/CVE-2017-16818/" source="CVE"/>
		<reference ref_id="CVE-2018-7262" ref_url="https://www.suse.com/security/cve/CVE-2018-7262/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004086.html" source="SUSE-SU"/>
		<description>
This update for ceph fixes the following issues:

Security issues fixed:

- CVE-2018-7262: rgw: malformed http headers can crash rgw (bsc#1081379).
- CVE-2017-16818: User reachable asserts allow for DoS (bsc#1063014).

Bug fixes:

- bsc#1061461: OSDs keep generating coredumps after adding new OSD node to cluster.
- bsc#1079076: RGW openssl fixes.
- bsc#1067088: Upgrade to SES5 restarted all nodes, majority of OSDs aborts during start.
- bsc#1056125: Some OSDs are down when doing performance testing on rbd image in EC Pool.
- bsc#1087269: allow_ec_overwrites option not in command options list.
- bsc#1051598: Fix mountpoint check for systemctl enable --runtime.
- bsc#1070357: Zabbix mgr module doesn't recover from HEALTH_ERR.
- bsc#1066502: After upgrading a single OSD from SES 4 to SES 5 the OSDs do not rejoin the cluster.
- bsc#1067119: Crushtool decompile creates wrong device entries (device 20 device20) for not existing / deleted OSDs.
- bsc#1060904: Loglevel misleading during keystone authentication.
- bsc#1056967: Monitors goes down after pool creation on cluster with 120 OSDs.
- bsc#1067705: Issues with RGW Multi-Site Federation between SES5 and RH Ceph Storage 2.
- bsc#1059458: Stopping / restarting rados gateway as part of deepsea stage.4 executions causes core-dump of radosgw.
- bsc#1087493: Commvault cannot reconnect to storage after restarting haproxy.
- bsc#1066182: Container synchronization between two Ceph clusters failed.
- bsc#1081600: Crash in civetweb/RGW.
- bsc#1054061: NFS-GANESHA service failing while trying to list mountpoint on client.
- bsc#1074301: OSDs keep aborting: SnapMapper failed asserts.
- bsc#1086340: XFS metadata corruption on rbd-nbd mapped image with journaling feature enabled.
- bsc#1080788: fsid mismatch when creating additional OSDs.
- bsc#1071386: Metadata spill onto block.slow.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-07"/>
	<updated date="2018-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051598">SUSE bug 1051598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054061">SUSE bug 1054061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056125">SUSE bug 1056125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056967">SUSE bug 1056967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059458">SUSE bug 1059458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060904">SUSE bug 1060904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061461">SUSE bug 1061461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063014">SUSE bug 1063014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066182">SUSE bug 1066182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066502">SUSE bug 1066502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067088">SUSE bug 1067088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067119">SUSE bug 1067119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067705">SUSE bug 1067705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070357">SUSE bug 1070357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071386">SUSE bug 1071386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074301">SUSE bug 1074301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079076">SUSE bug 1079076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080788">SUSE bug 1080788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081379">SUSE bug 1081379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081600">SUSE bug 1081600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086340">SUSE bug 1086340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087269">SUSE bug 1087269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087493">SUSE bug 1087493</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16818/">CVE-2017-16818 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16818">CVE-2017-16818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7262/">CVE-2018-7262 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7262">CVE-2018-7262 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553826" comment="ceph-common-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553827" comment="libcephfs2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553828" comment="librados2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553829" comment="libradosstriper1-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553830" comment="librbd1-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553831" comment="librgw2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553832" comment="python-cephfs-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553833" comment="python-rados-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553834" comment="python-rbd-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553835" comment="python-rgw-12.2.5+git.1524775272.5e7ea8cf03-2.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149746" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1087020" ref_url="https://bugzilla.suse.com/1087020" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-9055" ref_url="https://www.suse.com/security/cve/CVE-2018-9055/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004087.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

   - CVE-2018-9055: denial of service via
      a reachable assertion in the function jpc_firstone in
      libjasper/jpc/jpc_math.c could lead to denial of service. (bsc#1087020)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-25"/>
	<updated date="2018-05-25"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1087020">SUSE bug 1087020</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9055/">CVE-2018-9055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9055">CVE-2018-9055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553836" comment="libjasper1-1.900.14-195.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553837" comment="libjasper1-32bit-1.900.14-195.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149747" version="1" class="patch">
	<metadata>
		<title>Security update for libmodplug (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1022032" ref_url="https://bugzilla.suse.com/1022032" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4233" ref_url="https://www.suse.com/security/cve/CVE-2013-4233/" source="CVE"/>
		<reference ref_id="CVE-2013-4234" ref_url="https://www.suse.com/security/cve/CVE-2013-4234/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004089.html" source="SUSE-SU"/>
		<description>
This update for libmodplug fixes the following issues:

- Update to version 0.8.9.0+git20170610.f6dd59a bsc#1022032:
  * PSM: add missing line to commit
  * ABC: prevent possible increment of p past end
  * ABC: ensure read pointer is valid before incrementing
  * ABC: terminate early when things don't work in substitute
  * OKT: add one more bound check
  * FAR: out by one on check
  * ABC: 10 digit ints require null termination
  * PSM: make sure reads occur of only valid ins
  * ABC: cleanup tracks correctly.
  * WAV: check that there is space for both headers
  * OKT: ensure file size is enough to contain data
  * ABC: initialize earlier
  * ABC: ensure array access is bounded correctly.
  * ABC: clean up loop exiting code
  * ABC: avoid possibility of incrementing *p
  * ABC: abort early if macro would be blank
  * ABC: Use blankline more often
  * ABC: Ensure for loop does not increment past end of loop
  * Initialize nPatterns to 0 earlier
  * Check memory position isn't over the memory length
  * ABC: transpose only needs to look at notes (&lt;26)

- Update to version 0.8.9.0+git20171024.e9fc46e:
  * Spelling fixes
  * Bump version number to 0.8.9.0
  * MMCMP: Check that end pointer is within the file size
  * WAV: ensure integer doesn't overflow
  * XM: additional mempos check
  * sndmix: Don't process row if its empty.
  * snd_fx: dont include patterns of zero size in length calc
  * MT2,AMF: prevent OOB reads

- Add patch for broken pc file where quite some upstream refer to
  modplug directly without specifying the subdir it is in.

- Update to version 0.8.8.5
  * Some security issues: CVE-2013-4233, CVE-2013-4234, as well as
    many fixes suggested by static analyzers: clang build-scan, and coverity.
- Stop using dos2unix
- Run through spec-cleaner
- Use full URL in Source tag
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022032">SUSE bug 1022032</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4233/">CVE-2013-4233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4233">CVE-2013-4233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4234/">CVE-2013-4234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4234">CVE-2013-4234 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553838" comment="libmodplug1-0.8.9.0+git20170610.f6dd59a-15.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149748" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1047059" ref_url="https://bugzilla.suse.com/1047059" source="BUGZILLA"/>
		<reference ref_id="1047095" ref_url="https://bugzilla.suse.com/1047095" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10788" ref_url="https://www.suse.com/security/cve/CVE-2017-10788/" source="CVE"/>
		<reference ref_id="CVE-2017-10789" ref_url="https://www.suse.com/security/cve/CVE-2017-10789/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004093.html" source="SUSE-SU"/>
		<description>
This update for perl-DBD-mysql fixes the following issues:

- CVE-2017-10789: The DBD::mysql module when with mysql_ssl=1 setting enabled, means that SSL is optional (even though this setting's documentation has a \'your communication with the server will be encrypted\' statement), which could lead man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152. (bsc#1047059)
- CVE-2017-10788: The DBD::mysql module through 4.043 for Perl allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by triggering (1) certain error responses from a MySQL server or (2) a loss of a network connection to a MySQL server. The use-after-free defect was introduced by relying on incorrect Oracle mysql_stmt_close documentation and code examples. (bsc#1047095)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047059">SUSE bug 1047059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047095">SUSE bug 1047095</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10788/">CVE-2017-10788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10788">CVE-2017-10788 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10789/">CVE-2017-10789 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10789">CVE-2017-10789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553839" comment="perl-DBD-mysql-4.021-12.5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149749" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1090296" ref_url="https://bugzilla.suse.com/1090296" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="1092631" ref_url="https://bugzilla.suse.com/1092631" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10981" ref_url="https://www.suse.com/security/cve/CVE-2018-10981/" source="CVE"/>
		<reference ref_id="CVE-2018-10982" ref_url="https://www.suse.com/security/cve/CVE-2018-10982/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004096.html" source="SUSE-SU"/>
		<description>

This update for xen fixes the following issues:

Security issues fixed:

- CVE-2018-3639: Spectre V4 – Speculative Store Bypass aka 'Memory Disambiguation' (bsc#1092631)

  This feature can be controlled by the 'ssbd=on/off' commandline flag for the XEN hypervisor.
- CVE-2018-10982: x86 vHPET interrupt injection errors (XSA-261 bsc#1090822)
- CVE-2018-10981: qemu may drive Xen into unbounded loop (XSA-262 bsc#1090823) 

Other bugfixes:

- Upstream patches from Jan (bsc#1027519)
- additional fixes related to Page Table Isolation (XPTI). (bsc#1074562 XSA-254)
- qemu-system-i386 cannot handle more than 4 HW NICs (bsc#1090296)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-29"/>
	<updated date="2018-05-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090296">SUSE bug 1090296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10981/">CVE-2018-10981 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10981">CVE-2018-10981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10982/">CVE-2018-10982 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10982">CVE-2018-10982 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521021" comment="xen-4.9.2_06-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553840" comment="xen-doc-html-4.9.2_06-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521022" comment="xen-libs-4.9.2_06-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521023" comment="xen-libs-32bit-4.9.2_06-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553841" comment="xen-tools-4.9.2_06-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553842" comment="xen-tools-domU-4.9.2_06-3.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149750" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1126768" ref_url="https://bugzilla.suse.com/1126768" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8375" ref_url="https://www.suse.com/security/cve/CVE-2019-8375/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005360.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Security issue fixed: 

- CVE-2019-8375: Fixed an issue in UIProcess subsystem which could allow the script dialog
  size to exceed the web view size leading to Buffer Overflow or other unspecified impact (bsc#1126768).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126768">SUSE bug 1126768</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8375/">CVE-2019-8375 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8375">CVE-2019-8375 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553843" comment="libjavascriptcoregtk-4_0-18-2.24.0-2.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553844" comment="libwebkit2gtk-4_0-37-2.24.0-2.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553845" comment="typelib-1_0-JavaScriptCore-4_0-2.24.0-2.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553846" comment="typelib-1_0-WebKit2-4_0-2.24.0-2.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553847" comment="webkit2gtk-4_0-injected-bundles-2.24.0-2.38.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149751" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1106996" ref_url="https://bugzilla.suse.com/1106996" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1120381" ref_url="https://bugzilla.suse.com/1120381" source="BUGZILLA"/>
		<reference ref_id="1122033" ref_url="https://bugzilla.suse.com/1122033" source="BUGZILLA"/>
		<reference ref_id="1124365" ref_url="https://bugzilla.suse.com/1124365" source="BUGZILLA"/>
		<reference ref_id="1124366" ref_url="https://bugzilla.suse.com/1124366" source="BUGZILLA"/>
		<reference ref_id="1124368" ref_url="https://bugzilla.suse.com/1124368" source="BUGZILLA"/>
		<reference ref_id="1128649" ref_url="https://bugzilla.suse.com/1128649" source="BUGZILLA"/>
		<reference ref_id="1130330" ref_url="https://bugzilla.suse.com/1130330" source="BUGZILLA"/>
		<reference ref_id="1131317" ref_url="https://bugzilla.suse.com/1131317" source="BUGZILLA"/>
		<reference ref_id="1132053" ref_url="https://bugzilla.suse.com/1132053" source="BUGZILLA"/>
		<reference ref_id="1132054" ref_url="https://bugzilla.suse.com/1132054" source="BUGZILLA"/>
		<reference ref_id="1132060" ref_url="https://bugzilla.suse.com/1132060" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16412" ref_url="https://www.suse.com/security/cve/CVE-2018-16412/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467/" source="CVE"/>
		<reference ref_id="CVE-2019-10650" ref_url="https://www.suse.com/security/cve/CVE-2019-10650/" source="CVE"/>
		<reference ref_id="CVE-2019-11007" ref_url="https://www.suse.com/security/cve/CVE-2019-11007/" source="CVE"/>
		<reference ref_id="CVE-2019-11008" ref_url="https://www.suse.com/security/cve/CVE-2019-11008/" source="CVE"/>
		<reference ref_id="CVE-2019-11009" ref_url="https://www.suse.com/security/cve/CVE-2019-11009/" source="CVE"/>
		<reference ref_id="CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175/" source="CVE"/>
		<reference ref_id="CVE-2019-7395" ref_url="https://www.suse.com/security/cve/CVE-2019-7395/" source="CVE"/>
		<reference ref_id="CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<reference ref_id="CVE-2019-9956" ref_url="https://www.suse.com/security/cve/CVE-2019-9956/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-9956: Fixed a stack-based buffer overflow in PopHexPixel() (bsc#1130330).
- CVE-2019-10650: Fixed a heap-based buffer over-read in WriteTIFFImage() (bsc#1131317).
- CVE-2019-7175: Fixed multiple memory leaks in DecodeImage function (bsc#1128649).
- CVE-2018-20467: Fixed infinite loop in coders/bmp.c (bsc#1120381).
- CVE-2019-7398: Fixed a memory leak in the function WriteDIBImage (bsc#1124365).
- CVE-2019-7397: Fixed a memory leak in the function WritePDFImage (bsc#1124366).
- CVE-2019-7395: Fixed a memory leak in the function WritePSDChannel (bsc#1124368).
- CVE-2018-16413: Fixed a heap-based buffer over-read in PushShortPixel() (bsc#1106989).
- CVE-2018-16412: Fixed a heap-based buffer over-read in ParseImageResourceBlocks() (bsc#1106996).
- CVE-2018-16644: Fixed a regression in dcm coder (bsc#1107609).
- CVE-2019-11007: Fixed a heap-based buffer overflow in ReadMNGImage() (bsc#1132060).
- CVE-2019-11008: Fixed a heap-based buffer overflow in WriteXWDImage() (bsc#1132054).
- CVE-2019-11009: Fixed a heap-based buffer over-read in ReadXWDImage() (bsc#1132053).

- Added extra -config- packages with Postscript/EPS/PDF readers still enabled.

  Removing the PS decoders is used to harden ImageMagick against security issues within
  ghostscript. Enabling them might impact security. (bsc#1122033)

  These are two packages that can be selected:

  - ImageMagick-config-6-SUSE: This has the PS decoders disabled.
  - ImageMagick-config-6-upstream: This has the PS decoders enabled.

  Depending on your local needs install either one of them. The default is the -SUSE configuration.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120381">SUSE bug 1120381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122033">SUSE bug 1122033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124365">SUSE bug 1124365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124366">SUSE bug 1124366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124368">SUSE bug 1124368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128649">SUSE bug 1128649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130330">SUSE bug 1130330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131317">SUSE bug 1131317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132053">SUSE bug 1132053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132054">SUSE bug 1132054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132060">SUSE bug 1132060</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16412/">CVE-2018-16412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16412">CVE-2018-16412 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16413">CVE-2018-16413 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16644">CVE-2018-16644 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20467">CVE-2018-20467 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10650/">CVE-2019-10650 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10650">CVE-2019-10650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11007/">CVE-2019-11007 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11007">CVE-2019-11007 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11008/">CVE-2019-11008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11008">CVE-2019-11008 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11009/">CVE-2019-11009 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11009">CVE-2019-11009 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7175">CVE-2019-7175 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7395/">CVE-2019-7395 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7395">CVE-2019-7395 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7397">CVE-2019-7397 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7398">CVE-2019-7398 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9956/">CVE-2019-9956 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9956">CVE-2019-9956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553848" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553849" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553850" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553851" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149752" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1099590" ref_url="https://bugzilla.suse.com/1099590" source="BUGZILLA"/>
		<reference ref_id="1123755" ref_url="https://bugzilla.suse.com/1123755" source="BUGZILLA"/>
		<reference ref_id="1124223" ref_url="https://bugzilla.suse.com/1124223" source="BUGZILLA"/>
		<reference ref_id="1127153" ref_url="https://bugzilla.suse.com/1127153" source="BUGZILLA"/>
		<reference ref_id="1131060" ref_url="https://bugzilla.suse.com/1131060" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005365.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

Security issue fixed:

- CVE-2019-3880: Fixed a path/symlink traversal vulnerability, which allowed an unprivileged user to save registry files outside a share (bsc#1131060).

Non-security issues fixed:

- Fix vfs_ceph ftruncate and fallocate handling (bsc#1127153).
- Abide by load_printers smb.conf parameter (bsc#1124223).
- s3:winbindd: let normalize_name_map() call find_domain_from_name_noinit() (bsc#1123755).
- s3:passdb: Do not return OK if we don't have pinfo set up (bsc#1099590).
- s3:winbind: Fix regression (bsc#1123755).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099590">SUSE bug 1099590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123755">SUSE bug 1123755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124223">SUSE bug 1124223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127153">SUSE bug 1127153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3880">CVE-2019-3880 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553852" comment="libdcerpc-binding0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553853" comment="libdcerpc-binding0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553854" comment="libdcerpc0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553855" comment="libdcerpc0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553856" comment="libndr-krb5pac0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553857" comment="libndr-krb5pac0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553858" comment="libndr-nbt0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553859" comment="libndr-nbt0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553860" comment="libndr-standard0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553861" comment="libndr-standard0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553862" comment="libndr0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553863" comment="libndr0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553864" comment="libnetapi0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553865" comment="libnetapi0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553866" comment="libsamba-credentials0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553867" comment="libsamba-credentials0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553868" comment="libsamba-errors0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553869" comment="libsamba-errors0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553870" comment="libsamba-hostconfig0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553871" comment="libsamba-hostconfig0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553872" comment="libsamba-passdb0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553873" comment="libsamba-passdb0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553874" comment="libsamba-util0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553875" comment="libsamba-util0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553876" comment="libsamdb0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553877" comment="libsamdb0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553878" comment="libsmbclient0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553879" comment="libsmbclient0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553880" comment="libsmbconf0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553881" comment="libsmbconf0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553882" comment="libsmbldap0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553883" comment="libsmbldap0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553884" comment="libtevent-util0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553885" comment="libtevent-util0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553886" comment="libwbclient0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553887" comment="libwbclient0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553888" comment="samba-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553889" comment="samba-client-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553890" comment="samba-client-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521079" comment="samba-doc-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553891" comment="samba-libs-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553892" comment="samba-libs-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553893" comment="samba-winbind-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553894" comment="samba-winbind-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149753" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1131945" ref_url="https://bugzilla.suse.com/1131945" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10894" ref_url="https://www.suse.com/security/cve/CVE-2019-10894/" source="CVE"/>
		<reference ref_id="CVE-2019-10895" ref_url="https://www.suse.com/security/cve/CVE-2019-10895/" source="CVE"/>
		<reference ref_id="CVE-2019-10896" ref_url="https://www.suse.com/security/cve/CVE-2019-10896/" source="CVE"/>
		<reference ref_id="CVE-2019-10899" ref_url="https://www.suse.com/security/cve/CVE-2019-10899/" source="CVE"/>
		<reference ref_id="CVE-2019-10901" ref_url="https://www.suse.com/security/cve/CVE-2019-10901/" source="CVE"/>
		<reference ref_id="CVE-2019-10903" ref_url="https://www.suse.com/security/cve/CVE-2019-10903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005364.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.4.14 fixes the following issues:

Security issues fixed:

- CVE-2019-10895: NetScaler file parser crash.
- CVE-2019-10899: SRVLOC dissector crash.
- CVE-2019-10894: GSS-API dissector crash.
- CVE-2019-10896: DOF dissector crash.
- CVE-2019-10901: LDSS dissector crash.
- CVE-2019-10903: DCERPC SPOOLSS dissector crash.

Non-security issue fixed:

- Update to version 2.4.14 (bsc#1131945).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1131945">SUSE bug 1131945</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10894/">CVE-2019-10894 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10894">CVE-2019-10894 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10895/">CVE-2019-10895 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10895">CVE-2019-10895 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10896/">CVE-2019-10896 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10896">CVE-2019-10896 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10899/">CVE-2019-10899 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10899">CVE-2019-10899 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10901/">CVE-2019-10901 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10901">CVE-2019-10901 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10903/">CVE-2019-10903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10903">CVE-2019-10903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553895" comment="libwireshark9-2.4.14-48.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553896" comment="libwiretap7-2.4.14-48.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553897" comment="libwscodecs1-2.4.14-48.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553898" comment="libwsutil8-2.4.14-48.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553899" comment="wireshark-2.4.14-48.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553900" comment="wireshark-gtk-2.4.14-48.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149754" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1120813" ref_url="https://bugzilla.suse.com/1120813" source="BUGZILLA"/>
		<reference ref_id="1126325" ref_url="https://bugzilla.suse.com/1126325" source="BUGZILLA"/>
		<reference ref_id="1127458" ref_url="https://bugzilla.suse.com/1127458" source="BUGZILLA"/>
		<reference ref_id="1131595" ref_url="https://bugzilla.suse.com/1131595" source="BUGZILLA"/>
		<reference ref_id="1131955" ref_url="https://bugzilla.suse.com/1131955" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3840" ref_url="https://www.suse.com/security/cve/CVE-2019-3840/" source="CVE"/>
		<reference ref_id="CVE-2019-3886" ref_url="https://www.suse.com/security/cve/CVE-2019-3886/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005368.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed: 

- CVE-2019-3840: Fixed a null pointer dereference vulnerability in virJSONValueObjectHasKey function which could 
  have resulted in a remote denial of service via the guest agent (bsc#1127458).  
- CVE-2019-3886: Fixed an information leak which allowed to retrieve the guest
  hostname under readonly mode (bsc#1131595).

Other issue addressed: 

- cpu: add Skylake-Server and Skylake-Server-IBRS CPU models (FATE#327261, bsc#1131955)
- libxl: save current memory value after successful balloon (bsc#1120813).
- libxl: support Xen's max_grant_frames setting with maxGrantFrames attribute on the xenbus controller (bsc#1126325).
- conf: add new 'xenbus' controller type
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-26"/>
	<updated date="2019-04-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120813">SUSE bug 1120813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126325">SUSE bug 1126325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127458">SUSE bug 1127458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131595">SUSE bug 1131595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131955">SUSE bug 1131955</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3840/">CVE-2019-3840 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3840">CVE-2019-3840 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3886/">CVE-2019-3886 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3886">CVE-2019-3886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553901" comment="libvirt-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553902" comment="libvirt-admin-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553903" comment="libvirt-client-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553904" comment="libvirt-daemon-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553905" comment="libvirt-daemon-config-network-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553906" comment="libvirt-daemon-config-nwfilter-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553907" comment="libvirt-daemon-driver-interface-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521097" comment="libvirt-daemon-driver-libxl-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553908" comment="libvirt-daemon-driver-lxc-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553909" comment="libvirt-daemon-driver-network-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553910" comment="libvirt-daemon-driver-nodedev-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553911" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553912" comment="libvirt-daemon-driver-qemu-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553913" comment="libvirt-daemon-driver-secret-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553914" comment="libvirt-daemon-driver-storage-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553915" comment="libvirt-daemon-driver-storage-core-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553916" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553917" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553918" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553919" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553920" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553921" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553922" comment="libvirt-daemon-hooks-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553923" comment="libvirt-daemon-lxc-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553924" comment="libvirt-daemon-qemu-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521114" comment="libvirt-daemon-xen-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553925" comment="libvirt-doc-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553926" comment="libvirt-libs-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553927" comment="libvirt-lock-sanlock-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553928" comment="libvirt-nss-3.3.0-5.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149755" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1130103" ref_url="https://bugzilla.suse.com/1130103" source="BUGZILLA"/>
		<reference ref_id="1133528" ref_url="https://bugzilla.suse.com/1133528" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005377.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

 - Incorrect upstream fix for CVE-2019-3859 broke public key authentication [bsc#1133528, bsc#1130103]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-27"/>
	<updated date="2019-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133528">SUSE bug 1133528</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3859">CVE-2019-3859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553929" comment="libssh2-1-1.4.3-20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546273" comment="libssh2-1-32bit-1.4.3-20.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149756" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1104205" ref_url="https://bugzilla.suse.com/1104205" source="BUGZILLA"/>
		<reference ref_id="1109209" ref_url="https://bugzilla.suse.com/1109209" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005409.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

This security issue was fixed:

- CVE-2018-14526: Under certain conditions, the integrity of EAPOL-Key messages
  was not checked, leading to a decryption oracle. An attacker within range of
  the Access Point and client could have abused the vulnerability to recover
  sensitive information (bsc#1104205).

This non-security issue was fixed:

- Enabled PWD as EAP method. This allows for password-based authentication,
  which is easier to setup than most of the other methods, and is used by the
  Eduroam network (bsc#1109209).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-29"/>
	<updated date="2019-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104205">SUSE bug 1104205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109209">SUSE bug 1109209</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14526">CVE-2018-14526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553930" comment="wpa_supplicant-2.6-15.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149757" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1133114" ref_url="https://bugzilla.suse.com/1133114" source="BUGZILLA"/>
		<reference ref_id="1133145" ref_url="https://bugzilla.suse.com/1133145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11365" ref_url="https://www.suse.com/security/cve/CVE-2019-11365/" source="CVE"/>
		<reference ref_id="CVE-2019-11366" ref_url="https://www.suse.com/security/cve/CVE-2019-11366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005408.html" source="SUSE-SU"/>
		<description>
This update for atftp fixes the following issues:

Security issues fixed:

- CVE-2019-11366: Fixed a denial of service caused by a NULL pointer dereference because thread_list_mutex was not locked (bsc#1133145).
- CVE-2019-11365: Fixed a buffer overflow which could lead to remote code execution caused by an insecure use of strncpy() (bsc#1133114).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-29"/>
	<updated date="2019-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133114">SUSE bug 1133114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133145">SUSE bug 1133145</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11365/">CVE-2019-11365 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11365">CVE-2019-11365 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11366/">CVE-2019-11366 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11366">CVE-2019-11366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553931" comment="atftp-0.7.0-160.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149758" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1120489" ref_url="https://bugzilla.suse.com/1120489" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20217" ref_url="https://www.suse.com/security/cve/CVE-2018-20217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005038.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

Security issue fixed:

- CVE-2018-20217: Fixed an assertion issue with older encryption types (bsc#1120489)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-17"/>
	<updated date="2019-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120489">SUSE bug 1120489</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20217/">CVE-2018-20217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20217">CVE-2018-20217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553932" comment="krb5-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551008" comment="krb5-32bit-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553933" comment="krb5-client-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553934" comment="krb5-doc-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553935" comment="krb5-plugin-kdb-ldap-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553936" comment="krb5-plugin-preauth-otp-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553937" comment="krb5-plugin-preauth-pkinit-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553938" comment="krb5-server-1.12.5-40.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149759" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1096209" ref_url="https://bugzilla.suse.com/1096209" source="BUGZILLA"/>
		<reference ref_id="1098155" ref_url="https://bugzilla.suse.com/1098155" source="BUGZILLA"/>
		<reference ref_id="1128712" ref_url="https://bugzilla.suse.com/1128712" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1152" ref_url="https://www.suse.com/security/cve/CVE-2018-1152/" source="CVE"/>
		<reference ref_id="CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813/" source="CVE"/>
		<reference ref_id="CVE-2018-14498" ref_url="https://www.suse.com/security/cve/CVE-2018-14498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005415.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2018-14498: Fixed a heap-based buffer over read in get_8bit_row function
  which could allow to an attacker to cause denial of service (bsc#1128712).
- CVE-2018-11813: Fixed the end-of-file mishandling in read_pixel in rdtarga.c,
  which allowed remote attackers to cause a denial-of-service via crafted JPG
  files due to a large loop (bsc#1096209)
- CVE-2018-1152: Fixed a denial of service in start_input_bmp() rdbmp.c caused
  by a divide by zero when processing a crafted BMP image (bsc#1098155)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-30"/>
	<updated date="2019-04-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096209">SUSE bug 1096209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098155">SUSE bug 1098155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128712">SUSE bug 1128712</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1152/">CVE-2018-1152 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1152">CVE-2018-1152 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11813">CVE-2018-11813 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14498/">CVE-2018-14498 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14498">CVE-2018-14498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553939" comment="libjpeg-turbo-1.5.3-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553940" comment="libjpeg62-62.2.0-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553941" comment="libjpeg62-32bit-62.2.0-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553942" comment="libjpeg62-turbo-1.5.3-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553943" comment="libjpeg8-8.1.2-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553944" comment="libjpeg8-32bit-8.1.2-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553945" comment="libturbojpeg0-8.1.2-31.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149760" version="1" class="patch">
	<metadata>
		<title>Security update for hostinfo, supportutils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1054979" ref_url="https://bugzilla.suse.com/1054979" source="BUGZILLA"/>
		<reference ref_id="1099498" ref_url="https://bugzilla.suse.com/1099498" source="BUGZILLA"/>
		<reference ref_id="1115245" ref_url="https://bugzilla.suse.com/1115245" source="BUGZILLA"/>
		<reference ref_id="1117751" ref_url="https://bugzilla.suse.com/1117751" source="BUGZILLA"/>
		<reference ref_id="1117776" ref_url="https://bugzilla.suse.com/1117776" source="BUGZILLA"/>
		<reference ref_id="1118460" ref_url="https://bugzilla.suse.com/1118460" source="BUGZILLA"/>
		<reference ref_id="1118462" ref_url="https://bugzilla.suse.com/1118462" source="BUGZILLA"/>
		<reference ref_id="1118463" ref_url="https://bugzilla.suse.com/1118463" source="BUGZILLA"/>
		<reference ref_id="1125623" ref_url="https://bugzilla.suse.com/1125623" source="BUGZILLA"/>
		<reference ref_id="1125666" ref_url="https://bugzilla.suse.com/1125666" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19636" ref_url="https://www.suse.com/security/cve/CVE-2018-19636/" source="CVE"/>
		<reference ref_id="CVE-2018-19637" ref_url="https://www.suse.com/security/cve/CVE-2018-19637/" source="CVE"/>
		<reference ref_id="CVE-2018-19638" ref_url="https://www.suse.com/security/cve/CVE-2018-19638/" source="CVE"/>
		<reference ref_id="CVE-2018-19639" ref_url="https://www.suse.com/security/cve/CVE-2018-19639/" source="CVE"/>
		<reference ref_id="CVE-2018-19640" ref_url="https://www.suse.com/security/cve/CVE-2018-19640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005417.html" source="SUSE-SU"/>
		<description>
This update for hostinfo, supportutils fixes the following issues:
	  
Security issues fixed for supportutils:

- CVE-2018-19640: Fixed an issue where  users could kill arbitrary processes (bsc#1118463).
- CVE-2018-19638: Fixed an issue where users could overwrite arbitrary log files (bsc#1118460).
- CVE-2018-19639: Fixed a code execution if run with -v (bsc#1118462).
- CVE-2018-19637: Fixed an issue where static temporary filename could allow overwriting of files (bsc#1117776).
- CVE-2018-19636: Fixed a local root exploit via inclusion of attacker controlled shell script (bsc#1117751).

Other issues fixed for supportutils:

- Fixed invalid exit code commands (bsc#1125666)
- SUSE separation in supportconfig (bsc#1125623)
- Clarified supportconfig(8) -x option (bsc#1115245)
- supportconfig: 3.0.127
- btrfs filesystem usage
- List products.d
- Dump lsof errors
- Added ha commands for corosync
- Dumped find errors in ib_info

Issues fixed in hostinfo:
- Removed extra kernel install dates (bsc#1099498)
- Resolved network bond issue (bsc#1054979)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-30"/>
	<updated date="2019-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1054979">SUSE bug 1054979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099498">SUSE bug 1099498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115245">SUSE bug 1115245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117751">SUSE bug 1117751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117776">SUSE bug 1117776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118460">SUSE bug 1118460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118462">SUSE bug 1118462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118463">SUSE bug 1118463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125623">SUSE bug 1125623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125666">SUSE bug 1125666</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19636/">CVE-2018-19636 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19636">CVE-2018-19636 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19637/">CVE-2018-19637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19637">CVE-2018-19637 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19638/">CVE-2018-19638 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19638">CVE-2018-19638 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19639/">CVE-2018-19639 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19639">CVE-2018-19639 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19640/">CVE-2018-19640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19640">CVE-2018-19640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530432" comment="hostinfo-1.0.1-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521131" comment="supportutils-3.0-95.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149761" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:1136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005421.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- Reject invalid EC point coordinates (bsc#1131291)

  This helps openssl using services that do not do this verification on their own.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-03"/>
	<updated date="2019-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009541991" comment="libopenssl-devel-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553946" comment="libopenssl1_0_0-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551017" comment="libopenssl1_0_0-32bit-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553947" comment="libopenssl1_0_0-hmac-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551019" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553948" comment="openssl-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530435" comment="openssl-doc-1.0.2j-60.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149762" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1132256" ref_url="https://bugzilla.suse.com/1132256" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11070" ref_url="https://www.suse.com/security/cve/CVE-2019-11070/" source="CVE"/>
		<reference ref_id="CVE-2019-6201" ref_url="https://www.suse.com/security/cve/CVE-2019-6201/" source="CVE"/>
		<reference ref_id="CVE-2019-6251" ref_url="https://www.suse.com/security/cve/CVE-2019-6251/" source="CVE"/>
		<reference ref_id="CVE-2019-7285" ref_url="https://www.suse.com/security/cve/CVE-2019-7285/" source="CVE"/>
		<reference ref_id="CVE-2019-7292" ref_url="https://www.suse.com/security/cve/CVE-2019-7292/" source="CVE"/>
		<reference ref_id="CVE-2019-8503" ref_url="https://www.suse.com/security/cve/CVE-2019-8503/" source="CVE"/>
		<reference ref_id="CVE-2019-8506" ref_url="https://www.suse.com/security/cve/CVE-2019-8506/" source="CVE"/>
		<reference ref_id="CVE-2019-8515" ref_url="https://www.suse.com/security/cve/CVE-2019-8515/" source="CVE"/>
		<reference ref_id="CVE-2019-8524" ref_url="https://www.suse.com/security/cve/CVE-2019-8524/" source="CVE"/>
		<reference ref_id="CVE-2019-8535" ref_url="https://www.suse.com/security/cve/CVE-2019-8535/" source="CVE"/>
		<reference ref_id="CVE-2019-8536" ref_url="https://www.suse.com/security/cve/CVE-2019-8536/" source="CVE"/>
		<reference ref_id="CVE-2019-8544" ref_url="https://www.suse.com/security/cve/CVE-2019-8544/" source="CVE"/>
		<reference ref_id="CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551/" source="CVE"/>
		<reference ref_id="CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558/" source="CVE"/>
		<reference ref_id="CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559/" source="CVE"/>
		<reference ref_id="CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.24.1 fixes the following issues:

Security issues fixed:

- CVE-2019-6201, CVE-2019-6251, CVE-2019-7285, CVE-2019-7292, CVE-2019-8503, CVE-2019-8506,
  CVE-2019-8515, CVE-2019-8524, CVE-2019-8535, CVE-2019-8536, CVE-2019-8544, CVE-2019-8551,
  CVE-2019-8558, CVE-2019-8559, CVE-2019-8563, CVE-2019-11070 (bsc#1132256).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-06"/>
	<updated date="2019-05-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11070/">CVE-2019-11070 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11070">CVE-2019-11070 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6201/">CVE-2019-6201 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6201">CVE-2019-6201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6251/">CVE-2019-6251 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6251">CVE-2019-6251 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7285/">CVE-2019-7285 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7285">CVE-2019-7285 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7292/">CVE-2019-7292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7292">CVE-2019-7292 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8503/">CVE-2019-8503 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8503">CVE-2019-8503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8506/">CVE-2019-8506 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8506">CVE-2019-8506 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8515/">CVE-2019-8515 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8515">CVE-2019-8515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8524/">CVE-2019-8524 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8524">CVE-2019-8524 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8535/">CVE-2019-8535 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8535">CVE-2019-8535 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8536/">CVE-2019-8536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8536">CVE-2019-8536 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8544/">CVE-2019-8544 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8544">CVE-2019-8544 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8551">CVE-2019-8551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8558">CVE-2019-8558 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8559">CVE-2019-8559 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8563">CVE-2019-8563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553949" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553950" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553951" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553952" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553953" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149763" version="1" class="patch">
	<metadata>
		<title>Security update for audit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1042781" ref_url="https://bugzilla.suse.com/1042781" source="BUGZILLA"/>
		<reference ref_id="1085003" ref_url="https://bugzilla.suse.com/1085003" source="BUGZILLA"/>
		<reference ref_id="1125535" ref_url="https://bugzilla.suse.com/1125535" source="BUGZILLA"/>
		<reference ref_id="941922" ref_url="https://bugzilla.suse.com/941922" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5186" ref_url="https://www.suse.com/security/cve/CVE-2015-5186/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005428.html" source="SUSE-SU"/>
		<description>

This update for audit fixes the following issues:

Audit on SUSE Linux Enterprise 12 SP3 was updated to 2.8.1 to bring
new features and bugfixes.  (bsc#1125535 FATE#326346)

* Many features were added to auparse_normalize
* cli option added to auditd and audispd for setting config dir
* In auditd, restore the umask after creating a log file
* Option added to auditd for skipping email verification

The full changelog can be found here: http://people.redhat.com/sgrubb/audit/ChangeLog


- Change openldap dependency to client only (bsc#1085003)

Minor security issue fixed:

- CVE-2015-5186: Audit: log terminal emulator escape sequences handling (bsc#941922)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-07"/>
	<updated date="2019-05-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042781">SUSE bug 1042781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085003">SUSE bug 1085003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125535">SUSE bug 1125535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941922">SUSE bug 941922</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5186/">CVE-2015-5186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5186">CVE-2015-5186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553954" comment="audit-2.8.1-8.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553955" comment="audit-audispd-plugins-2.8.1-8.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553956" comment="libaudit1-2.8.1-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553957" comment="libaudit1-32bit-2.8.1-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553958" comment="libauparse0-2.8.1-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149764" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1132549" ref_url="https://bugzilla.suse.com/1132549" source="BUGZILLA"/>
		<reference ref_id="1132664" ref_url="https://bugzilla.suse.com/1132664" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11234" ref_url="https://www.suse.com/security/cve/CVE-2019-11234/" source="CVE"/>
		<reference ref_id="CVE-2019-11235" ref_url="https://www.suse.com/security/cve/CVE-2019-11235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005429.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

Security issues fixed:

- CVE-2019-11235: Fixed an authentication bypass related to the EAP-PWD Commit frame and insufficent validation of elliptic curve points (bsc#1132549).
- CVE-2019-11234: Fixed an authentication bypass caused by reflecting privous values back to the server (bsc#1132664).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-07"/>
	<updated date="2019-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132549">SUSE bug 1132549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132664">SUSE bug 1132664</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11234/">CVE-2019-11234 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11234">CVE-2019-11234 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11235/">CVE-2019-11235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11235">CVE-2019-11235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553959" comment="freeradius-server-3.0.15-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553960" comment="freeradius-server-doc-3.0.15-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553961" comment="freeradius-server-krb5-3.0.15-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553962" comment="freeradius-server-ldap-3.0.15-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553963" comment="freeradius-server-libs-3.0.15-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553964" comment="freeradius-server-mysql-3.0.15-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553965" comment="freeradius-server-perl-3.0.15-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553966" comment="freeradius-server-postgresql-3.0.15-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553967" comment="freeradius-server-python-3.0.15-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553968" comment="freeradius-server-sqlite-3.0.15-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553969" comment="freeradius-server-utils-3.0.15-2.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149765" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1061343" ref_url="https://bugzilla.suse.com/1061343" source="BUGZILLA"/>
		<reference ref_id="1094717" ref_url="https://bugzilla.suse.com/1094717" source="BUGZILLA"/>
		<reference ref_id="1101428" ref_url="https://bugzilla.suse.com/1101428" source="BUGZILLA"/>
		<reference ref_id="1101566" ref_url="https://bugzilla.suse.com/1101566" source="BUGZILLA"/>
		<reference ref_id="1101567" ref_url="https://bugzilla.suse.com/1101567" source="BUGZILLA"/>
		<reference ref_id="1101568" ref_url="https://bugzilla.suse.com/1101568" source="BUGZILLA"/>
		<reference ref_id="1101569" ref_url="https://bugzilla.suse.com/1101569" source="BUGZILLA"/>
		<reference ref_id="1101570" ref_url="https://bugzilla.suse.com/1101570" source="BUGZILLA"/>
		<reference ref_id="1101571" ref_url="https://bugzilla.suse.com/1101571" source="BUGZILLA"/>
		<reference ref_id="1101573" ref_url="https://bugzilla.suse.com/1101573" source="BUGZILLA"/>
		<reference ref_id="1101576" ref_url="https://bugzilla.suse.com/1101576" source="BUGZILLA"/>
		<reference ref_id="1101577" ref_url="https://bugzilla.suse.com/1101577" source="BUGZILLA"/>
		<reference ref_id="1101578" ref_url="https://bugzilla.suse.com/1101578" source="BUGZILLA"/>
		<reference ref_id="1101581" ref_url="https://bugzilla.suse.com/1101581" source="BUGZILLA"/>
		<reference ref_id="1101582" ref_url="https://bugzilla.suse.com/1101582" source="BUGZILLA"/>
		<reference ref_id="1101583" ref_url="https://bugzilla.suse.com/1101583" source="BUGZILLA"/>
		<reference ref_id="1101588" ref_url="https://bugzilla.suse.com/1101588" source="BUGZILLA"/>
		<reference ref_id="1101589" ref_url="https://bugzilla.suse.com/1101589" source="BUGZILLA"/>
		<reference ref_id="980830" ref_url="https://bugzilla.suse.com/980830" source="BUGZILLA"/>
		<reference ref_id="982129" ref_url="https://bugzilla.suse.com/982129" source="BUGZILLA"/>
		<reference ref_id="986534" ref_url="https://bugzilla.suse.com/986534" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9116" ref_url="https://www.suse.com/security/cve/CVE-2014-9116/" source="CVE"/>
		<reference ref_id="CVE-2018-14349" ref_url="https://www.suse.com/security/cve/CVE-2018-14349/" source="CVE"/>
		<reference ref_id="CVE-2018-14350" ref_url="https://www.suse.com/security/cve/CVE-2018-14350/" source="CVE"/>
		<reference ref_id="CVE-2018-14351" ref_url="https://www.suse.com/security/cve/CVE-2018-14351/" source="CVE"/>
		<reference ref_id="CVE-2018-14352" ref_url="https://www.suse.com/security/cve/CVE-2018-14352/" source="CVE"/>
		<reference ref_id="CVE-2018-14353" ref_url="https://www.suse.com/security/cve/CVE-2018-14353/" source="CVE"/>
		<reference ref_id="CVE-2018-14354" ref_url="https://www.suse.com/security/cve/CVE-2018-14354/" source="CVE"/>
		<reference ref_id="CVE-2018-14355" ref_url="https://www.suse.com/security/cve/CVE-2018-14355/" source="CVE"/>
		<reference ref_id="CVE-2018-14356" ref_url="https://www.suse.com/security/cve/CVE-2018-14356/" source="CVE"/>
		<reference ref_id="CVE-2018-14357" ref_url="https://www.suse.com/security/cve/CVE-2018-14357/" source="CVE"/>
		<reference ref_id="CVE-2018-14358" ref_url="https://www.suse.com/security/cve/CVE-2018-14358/" source="CVE"/>
		<reference ref_id="CVE-2018-14359" ref_url="https://www.suse.com/security/cve/CVE-2018-14359/" source="CVE"/>
		<reference ref_id="CVE-2018-14360" ref_url="https://www.suse.com/security/cve/CVE-2018-14360/" source="CVE"/>
		<reference ref_id="CVE-2018-14361" ref_url="https://www.suse.com/security/cve/CVE-2018-14361/" source="CVE"/>
		<reference ref_id="CVE-2018-14362" ref_url="https://www.suse.com/security/cve/CVE-2018-14362/" source="CVE"/>
		<reference ref_id="CVE-2018-14363" ref_url="https://www.suse.com/security/cve/CVE-2018-14363/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

Security issues fixed:

- bsc#1101428: Mutt 1.10.1 security release update.
- CVE-2018-14351: Fix imap/command.c that mishandles long IMAP status mailbox literal count size (bsc#1101583).
- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).
- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).
- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).
- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).
- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).
- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).
- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).
- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).
- CVE-2018-14363: Fix newsrc.c that does not properlyrestrict '/' characters that may have unsafe interaction with cache pathnames (bsc#1101566).
- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).
- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).
- CVE-2018-14360: Fix nntp_add_group in newsrc.c that has a stack-based buffer overflow because of incorrect sscanf usage (bsc#1101569).
- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).
- CVE-2018-14361: Fix that nntp.c proceeds even if memory allocation fails for messages data (bsc#1101568).

Bug fixes:

- mutt reports as neomutt and incorrect version (bsc#1094717)
- No sidebar available in mutt 1.6.1 from Tumbleweed snapshot 20160517 (bsc#980830)
- mutt-1.6.1 unusable when built with --enable-sidebar (bsc#982129)
- (neo)mutt displaying times in Zulu time (bsc#1061343)
- mutt unconditionally segfaults when displaying a message (bsc#986534)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-09"/>
	<updated date="2019-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1061343">SUSE bug 1061343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094717">SUSE bug 1094717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101566">SUSE bug 1101566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101567">SUSE bug 1101567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101568">SUSE bug 1101568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101569">SUSE bug 1101569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101570">SUSE bug 1101570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101571">SUSE bug 1101571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101573">SUSE bug 1101573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101576">SUSE bug 1101576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101577">SUSE bug 1101577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101578">SUSE bug 1101578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101581">SUSE bug 1101581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101582">SUSE bug 1101582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101583">SUSE bug 1101583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101588">SUSE bug 1101588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980830">SUSE bug 980830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982129">SUSE bug 982129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986534">SUSE bug 986534</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9116/">CVE-2014-9116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9116">CVE-2014-9116 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14349/">CVE-2018-14349 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14349">CVE-2018-14349 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14350/">CVE-2018-14350 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14350">CVE-2018-14350 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14351/">CVE-2018-14351 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14351">CVE-2018-14351 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14352/">CVE-2018-14352 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14352">CVE-2018-14352 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14353/">CVE-2018-14353 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14353">CVE-2018-14353 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14354/">CVE-2018-14354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14354">CVE-2018-14354 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14355/">CVE-2018-14355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14355">CVE-2018-14355 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14356/">CVE-2018-14356 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14356">CVE-2018-14356 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14357/">CVE-2018-14357 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14357">CVE-2018-14357 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14358/">CVE-2018-14358 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14358">CVE-2018-14358 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14359/">CVE-2018-14359 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14359">CVE-2018-14359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14360/">CVE-2018-14360 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14360">CVE-2018-14360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14361/">CVE-2018-14361 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14361">CVE-2018-14361 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14362/">CVE-2018-14362 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14362">CVE-2018-14362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14363/">CVE-2018-14363 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14363">CVE-2018-14363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553970" comment="mutt-1.10.1-55.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149766" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1131361" ref_url="https://bugzilla.suse.com/1131361" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0161" ref_url="https://www.suse.com/security/cve/CVE-2019-0161/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1204-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191204-1.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

Security issue fixed:

- CVE-2019-0161: Fixed a stack overflow in UsbBusDxe and UsbBusPei, which could 
  potentially be triggered by a local unauthenticated user (bsc#1131361).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1131361">SUSE bug 1131361</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0161/">CVE-2019-0161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0161">CVE-2019-0161 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553971" comment="ovmf-2017+git1492060560.b6d11d7c46-4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553972" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553973" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553974" comment="qemu-uefi-aarch64-2017+git1492060560.b6d11d7c46-4.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149767" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1085790" ref_url="https://bugzilla.suse.com/1085790" source="BUGZILLA"/>
		<reference ref_id="1132045" ref_url="https://bugzilla.suse.com/1132045" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10989" ref_url="https://www.suse.com/security/cve/CVE-2017-10989/" source="CVE"/>
		<reference ref_id="CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005442.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issue fixed:

- CVE-2018-8740: Fixed a NULL pointer dereference related to corrupted databases schemas (bsc#1085790).
- CVE-2017-10989: Fixed a heap-based buffer over-read in getNodeSize() (bsc#1132045).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085790">SUSE bug 1085790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132045">SUSE bug 1132045</bugzilla>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10989/">CVE-2017-10989 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10989">CVE-2017-10989 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8740">CVE-2018-8740 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553975" comment="libsqlite3-0-3.8.10.2-9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553976" comment="libsqlite3-0-32bit-3.8.10.2-9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553977" comment="sqlite3-3.8.10.2-9.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149768" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-fileupload (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1128829" ref_url="https://bugzilla.suse.com/1128829" source="BUGZILLA"/>
		<reference ref_id="1128963" ref_url="https://bugzilla.suse.com/1128963" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1000031" ref_url="https://www.suse.com/security/cve/CVE-2016-1000031/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005433.html" source="SUSE-SU"/>
		<description>
This update for jakarta-commons-fileupload fixes the following issue:

Security issue fixed:

- CVE-2016-1000031: Fixed remote execution (bsc#1128963, bsc#1128829).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1128829">SUSE bug 1128829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128963">SUSE bug 1128963</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1000031/">CVE-2016-1000031 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000031">CVE-2016-1000031 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530483" comment="jakarta-commons-fileupload-1.1.1-122.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530484" comment="jakarta-commons-fileupload-javadoc-1.1.1-122.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149769" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1133135" ref_url="https://bugzilla.suse.com/1133135" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u212 fixes the following issues:

Security issues fixed:

- CVE-2019-2602: Better String parsing (bsc#1132728).
- CVE-2019-2684: More dynamic RMI interactions (bsc#1132732).
- CVE-2019-2698: Fuzzing TrueType fonts - setCurrGlyphID() (bsc#1132729).
- CVE-2019-2422: Better FileChannel (bsc#1122293).
- CVE-2018-11212: Improve JPEG (bsc#1122299).

Non-Security issue fixed:

- Disable LTO (bsc#1133135).
- Added Japanese new era name.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-13"/>
	<updated date="2019-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133135">SUSE bug 1133135</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2422">CVE-2019-2422 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2426">CVE-2019-2426 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2602">CVE-2019-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2684">CVE-2019-2684 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2698">CVE-2019-2698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553978" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553979" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553980" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553981" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149770" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1132160" ref_url="https://bugzilla.suse.com/1132160" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005448.html" source="SUSE-SU"/>
		<description>
This update for libxslt fixes the following issues:

- CVE-2019-11068: Fixed a protection mechanism bypass where callers of 
  xsltCheckRead() and xsltCheckWrite() would permit access upon receiving an
  error (bsc#1132160).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1132160">SUSE bug 1132160</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553982" comment="libxslt-tools-1.1.28-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553983" comment="libxslt1-1.1.28-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553984" comment="libxslt1-32bit-1.1.28-17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149771" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

- Processor             Identifier     Version       Products
- Model        Stepping F-MO-S/PI      Old-&gt;New
- ---- new platforms ----------------------------------------
- CLX-SP       B1       6-55-7/bf           05000021 Xeon Scalable Gen2
- ---- updated platforms ------------------------------------
- SNB          D2/G1/Q0 6-2a-7/12 0000002e-&gt;0000002f Core Gen2
- IVB          E1/L1    6-3a-9/12 00000020-&gt;00000021 Core Gen3
- HSW          C0       6-3c-3/32 00000025-&gt;00000027 Core Gen4
- BDW-U/Y      E0/F0    6-3d-4/c0 0000002b-&gt;0000002d Core Gen5
- IVB-E/EP     C1/M1/S1 6-3e-4/ed 0000042e-&gt;0000042f Core Gen3 X Series; Xeon E5 v2
- IVB-EX       D1       6-3e-7/ed 00000714-&gt;00000715 Xeon E7 v2
- HSX-E/EP     Cx/M1    6-3f-2/6f 00000041-&gt;00000043 Core Gen4 X series; Xeon E5 v3
- HSX-EX       E0       6-3f-4/80 00000013-&gt;00000014 Xeon E7 v3
- HSW-U        C0/D0    6-45-1/72 00000024-&gt;00000025 Core Gen4
- HSW-H        C0       6-46-1/32 0000001a-&gt;0000001b Core Gen4
- BDW-H/E3     E0/G0    6-47-1/22 0000001e-&gt;00000020 Core Gen5
- SKL-U/Y      D0/K1    6-4e-3/c0 000000c6-&gt;000000cc Core Gen6      
- SKX-SP       H0/M0/U0 6-55-4/b7 0200005a-&gt;0000005e Xeon Scalable
- SKX-D        M1       6-55-4/b7 0200005a-&gt;0000005e Xeon D-21xx
- BDX-DE       V1       6-56-2/10 00000019-&gt;0000001a Xeon D-1520/40
- BDX-DE       V2/3     6-56-3/10 07000016-&gt;07000017 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
- BDX-DE       Y0       6-56-4/10 0f000014-&gt;0f000015 Xeon D-1557/59/67/71/77/81/87
- BDX-NS       A0       6-56-5/10 0e00000c-&gt;0e00000d Xeon D-1513N/23/33/43/53
- APL          D0       6-5c-9/03 00000036-&gt;00000038 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
- SKL-H/S      R0/N0    6-5e-3/36 000000c6-&gt;000000cc Core Gen6; Xeon E3 v5
- DNV          B0       6-5f-1/01 00000024-&gt;0000002e Atom Processor C Series
- GLK          B0       6-7a-1/01 0000002c-&gt;0000002e Pentium Silver N/J5xxx, Celeron N/J4xxx
- AML-Y22      H0       6-8e-9/10 0000009e-&gt;000000b4 Core Gen8 Mobile
- KBL-U/Y      H0       6-8e-9/c0 0000009a-&gt;000000b4 Core Gen7 Mobile
- CFL-U43e     D0       6-8e-a/c0 0000009e-&gt;000000b4 Core Gen8 Mobile
- WHL-U        W0       6-8e-b/d0 000000a4-&gt;000000b8 Core Gen8 Mobile
- WHL-U        V0       6-8e-d/94 000000b2-&gt;000000b8 Core Gen8 Mobile
- KBL-G/H/S/E3 B0       6-9e-9/2a 0000009a-&gt;000000b4 Core Gen7; Xeon E3 v6
- CFL-H/S/E3   U0       6-9e-a/22 000000aa-&gt;000000b4 Core Gen8 Desktop, Mobile, Xeon E
- CFL-S        B0       6-9e-b/02 000000aa-&gt;000000b4 Core Gen8
- CFL-H/S      P0       6-9e-c/22 000000a2-&gt;000000ae Core Gen9
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521155" comment="ucode-intel-20190507-13.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149772" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005461.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature 'md-clear' (bsc#1111331)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553985" comment="qemu-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553986" comment="qemu-arm-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553987" comment="qemu-block-curl-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553988" comment="qemu-block-iscsi-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553989" comment="qemu-block-rbd-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553990" comment="qemu-block-ssh-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553991" comment="qemu-guest-agent-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521158" comment="qemu-ipxe-1.0.0+-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553992" comment="qemu-kvm-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553993" comment="qemu-lang-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553994" comment="qemu-ppc-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553995" comment="qemu-s390-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521160" comment="qemu-seabios-1.10.2-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521161" comment="qemu-sgabios-8-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553996" comment="qemu-tools-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521163" comment="qemu-vgabios-1.10.2-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521164" comment="qemu-x86-2.9.1-6.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149773" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1020645" ref_url="https://bugzilla.suse.com/1020645" source="BUGZILLA"/>
		<reference ref_id="1020989" ref_url="https://bugzilla.suse.com/1020989" source="BUGZILLA"/>
		<reference ref_id="1031492" ref_url="https://bugzilla.suse.com/1031492" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1053043" ref_url="https://bugzilla.suse.com/1053043" source="BUGZILLA"/>
		<reference ref_id="1062056" ref_url="https://bugzilla.suse.com/1062056" source="BUGZILLA"/>
		<reference ref_id="1063638" ref_url="https://bugzilla.suse.com/1063638" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1070872" ref_url="https://bugzilla.suse.com/1070872" source="BUGZILLA"/>
		<reference ref_id="1085539" ref_url="https://bugzilla.suse.com/1085539" source="BUGZILLA"/>
		<reference ref_id="1087092" ref_url="https://bugzilla.suse.com/1087092" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1096480" ref_url="https://bugzilla.suse.com/1096480" source="BUGZILLA"/>
		<reference ref_id="1096728" ref_url="https://bugzilla.suse.com/1096728" source="BUGZILLA"/>
		<reference ref_id="1097104" ref_url="https://bugzilla.suse.com/1097104" source="BUGZILLA"/>
		<reference ref_id="1100132" ref_url="https://bugzilla.suse.com/1100132" source="BUGZILLA"/>
		<reference ref_id="1105348" ref_url="https://bugzilla.suse.com/1105348" source="BUGZILLA"/>
		<reference ref_id="1106110" ref_url="https://bugzilla.suse.com/1106110" source="BUGZILLA"/>
		<reference ref_id="1106913" ref_url="https://bugzilla.suse.com/1106913" source="BUGZILLA"/>
		<reference ref_id="1106929" ref_url="https://bugzilla.suse.com/1106929" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1112178" ref_url="https://bugzilla.suse.com/1112178" source="BUGZILLA"/>
		<reference ref_id="1113399" ref_url="https://bugzilla.suse.com/1113399" source="BUGZILLA"/>
		<reference ref_id="1114542" ref_url="https://bugzilla.suse.com/1114542" source="BUGZILLA"/>
		<reference ref_id="1114638" ref_url="https://bugzilla.suse.com/1114638" source="BUGZILLA"/>
		<reference ref_id="1114648" ref_url="https://bugzilla.suse.com/1114648" source="BUGZILLA"/>
		<reference ref_id="1114893" ref_url="https://bugzilla.suse.com/1114893" source="BUGZILLA"/>
		<reference ref_id="1118338" ref_url="https://bugzilla.suse.com/1118338" source="BUGZILLA"/>
		<reference ref_id="1118506" ref_url="https://bugzilla.suse.com/1118506" source="BUGZILLA"/>
		<reference ref_id="1119086" ref_url="https://bugzilla.suse.com/1119086" source="BUGZILLA"/>
		<reference ref_id="1120902" ref_url="https://bugzilla.suse.com/1120902" source="BUGZILLA"/>
		<reference ref_id="1122822" ref_url="https://bugzilla.suse.com/1122822" source="BUGZILLA"/>
		<reference ref_id="1125580" ref_url="https://bugzilla.suse.com/1125580" source="BUGZILLA"/>
		<reference ref_id="1126356" ref_url="https://bugzilla.suse.com/1126356" source="BUGZILLA"/>
		<reference ref_id="1127445" ref_url="https://bugzilla.suse.com/1127445" source="BUGZILLA"/>
		<reference ref_id="1129278" ref_url="https://bugzilla.suse.com/1129278" source="BUGZILLA"/>
		<reference ref_id="1129326" ref_url="https://bugzilla.suse.com/1129326" source="BUGZILLA"/>
		<reference ref_id="1129770" ref_url="https://bugzilla.suse.com/1129770" source="BUGZILLA"/>
		<reference ref_id="1130130" ref_url="https://bugzilla.suse.com/1130130" source="BUGZILLA"/>
		<reference ref_id="1130343" ref_url="https://bugzilla.suse.com/1130343" source="BUGZILLA"/>
		<reference ref_id="1130344" ref_url="https://bugzilla.suse.com/1130344" source="BUGZILLA"/>
		<reference ref_id="1130345" ref_url="https://bugzilla.suse.com/1130345" source="BUGZILLA"/>
		<reference ref_id="1130346" ref_url="https://bugzilla.suse.com/1130346" source="BUGZILLA"/>
		<reference ref_id="1130347" ref_url="https://bugzilla.suse.com/1130347" source="BUGZILLA"/>
		<reference ref_id="1130356" ref_url="https://bugzilla.suse.com/1130356" source="BUGZILLA"/>
		<reference ref_id="1130425" ref_url="https://bugzilla.suse.com/1130425" source="BUGZILLA"/>
		<reference ref_id="1130567" ref_url="https://bugzilla.suse.com/1130567" source="BUGZILLA"/>
		<reference ref_id="1130737" ref_url="https://bugzilla.suse.com/1130737" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1131416" ref_url="https://bugzilla.suse.com/1131416" source="BUGZILLA"/>
		<reference ref_id="1131427" ref_url="https://bugzilla.suse.com/1131427" source="BUGZILLA"/>
		<reference ref_id="1131587" ref_url="https://bugzilla.suse.com/1131587" source="BUGZILLA"/>
		<reference ref_id="1131659" ref_url="https://bugzilla.suse.com/1131659" source="BUGZILLA"/>
		<reference ref_id="1131857" ref_url="https://bugzilla.suse.com/1131857" source="BUGZILLA"/>
		<reference ref_id="1131900" ref_url="https://bugzilla.suse.com/1131900" source="BUGZILLA"/>
		<reference ref_id="1131934" ref_url="https://bugzilla.suse.com/1131934" source="BUGZILLA"/>
		<reference ref_id="1131935" ref_url="https://bugzilla.suse.com/1131935" source="BUGZILLA"/>
		<reference ref_id="1131980" ref_url="https://bugzilla.suse.com/1131980" source="BUGZILLA"/>
		<reference ref_id="1132227" ref_url="https://bugzilla.suse.com/1132227" source="BUGZILLA"/>
		<reference ref_id="1132534" ref_url="https://bugzilla.suse.com/1132534" source="BUGZILLA"/>
		<reference ref_id="1132589" ref_url="https://bugzilla.suse.com/1132589" source="BUGZILLA"/>
		<reference ref_id="1132618" ref_url="https://bugzilla.suse.com/1132618" source="BUGZILLA"/>
		<reference ref_id="1132619" ref_url="https://bugzilla.suse.com/1132619" source="BUGZILLA"/>
		<reference ref_id="1132634" ref_url="https://bugzilla.suse.com/1132634" source="BUGZILLA"/>
		<reference ref_id="1132635" ref_url="https://bugzilla.suse.com/1132635" source="BUGZILLA"/>
		<reference ref_id="1132636" ref_url="https://bugzilla.suse.com/1132636" source="BUGZILLA"/>
		<reference ref_id="1132637" ref_url="https://bugzilla.suse.com/1132637" source="BUGZILLA"/>
		<reference ref_id="1132638" ref_url="https://bugzilla.suse.com/1132638" source="BUGZILLA"/>
		<reference ref_id="1132727" ref_url="https://bugzilla.suse.com/1132727" source="BUGZILLA"/>
		<reference ref_id="1132828" ref_url="https://bugzilla.suse.com/1132828" source="BUGZILLA"/>
		<reference ref_id="1133308" ref_url="https://bugzilla.suse.com/1133308" source="BUGZILLA"/>
		<reference ref_id="1133584" ref_url="https://bugzilla.suse.com/1133584" source="BUGZILLA"/>
		<reference ref_id="994770" ref_url="https://bugzilla.suse.com/994770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204/" source="CVE"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-15594" ref_url="https://www.suse.com/security/cve/CVE-2018-15594/" source="CVE"/>
		<reference ref_id="CVE-2018-5814" ref_url="https://www.suse.com/security/cve/CVE-2018-5814/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-3882" ref_url="https://www.suse.com/security/cve/CVE-2019-3882/" source="CVE"/>
		<reference ref_id="CVE-2019-9503" ref_url="https://www.suse.com/security/cve/CVE-2019-9503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.178 to receive various security and bugfixes.

Four new speculative execution issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

This kernel update contains software mitigations, utilizing CPU microcode updates shipped in parallel.

For more information on this set of information leaks, check out https://www.suse.com/support/kb/doc/?id=7023736

The following security issues fixed:

- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).
- CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO ioctl (bsc#1096728)
- CVE-2018-10853: A flaw was found in the way the KVM hypervisor emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest (bnc#1097104).
- CVE-2018-15594: arch/x86/kernel/paravirt.c mishandled certain indirect calls, which made it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests (bnc#1105348).
- CVE-2019-9503: A brcmfmac frame validation bypass was fixed (bnc#1132828).
- CVE-2019-3882: A flaw was fixed in the vfio interface implementation that permitted violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable (bnc#1131416 bnc#1131427).

The following non-security bugs were fixed:

- 9p/net: fix memory leak in p9_client_create (bnc#1012382).
- 9p: use inode-&gt;i_lock to protect i_size_write() under 32-bit (bnc#1012382).
- acpi: acpi_pad: Do not launch acpi_pad threads on idle cpus (bsc#1113399).
- acpi / bus: Only call dmi_check_system() on X86 (git-fixes).
- acpi / button: make module loadable when booted in non-ACPI mode (bsc#1051510).
- acpi / device_sysfs: Avoid OF modalias creation for removed device (bnc#1012382).
- acpi: include ACPI button driver in base kernel (bsc#1062056).
- Add hlist_add_tail_rcu() (Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net) (bnc#1012382).
- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bnc#1012382).
- alsa: compress: add support for 32bit calls in a 64bit kernel (bnc#1012382).
- alsa: compress: prevent potential divide by zero bugs (bnc#1012382).
- alsa: hda - Enforces runtime_resume after S3 and S4 for each codec (bnc#1012382).
- alsa: hda - Record the current power state before suspend/resume calls (bnc#1012382).
- alsa: pcm: Do not suspend stream in unrecoverable PCM state (bnc#1012382).
- alsa: pcm: Fix possible OOB access in PCM oss plugins (bnc#1012382).
- alsa: rawmidi: Fix potential Spectre v1 vulnerability (bnc#1012382).
- alsa: seq: oss: Fix Spectre v1 vulnerability (bnc#1012382).
- applicom: Fix potential Spectre v1 vulnerabilities (bnc#1012382).
- arc: fix __ffs return value to avoid build warnings (bnc#1012382).
- arc: uacces: remove lp_start, lp_end from clobber list (bnc#1012382).
- arcv2: Enable unaligned access in early ASM code (bnc#1012382).
- arm64: fix COMPAT_SHMLBA definition for large pages (bnc#1012382).
- arm64: Fix NUMA build error when !CONFIG_ACPI (fate#319981,  git-fixes).
- arm64: Fix NUMA build error when !CONFIG_ACPI (git-fixes).
- arm64: hide __efistub_ aliases from kallsyms (bnc#1012382).
- arm64: kconfig: drop CONFIG_RTC_LIB dependency (bnc#1012382).
- arm64/kernel: fix incorrect EL0 check in inv_entry macro (bnc#1012382).
- arm64: mm: Add trace_irqflags annotations to do_debug_exception() (bnc#1012382).
- arm64: Relax GIC version check during early boot (bnc#1012382).
- arm64: support keyctl() system call in 32-bit mode (bnc#1012382).
- arm64: traps: disable irq in die() (bnc#1012382).
- arm: 8458/1: bL_switcher: add GIC dependency (bnc#1012382).
- arm: 8494/1: mm: Enable PXN when running non-LPAE kernel on LPAE processor (bnc#1012382).
- arm: 8510/1: rework ARM_CPU_SUSPEND dependencies (bnc#1012382).
- arm: 8824/1: fix a migrating irq bug when hotplug cpu (bnc#1012382).
- arm: dts: exynos: Add minimal clkout parameters to Exynos3250 PMU (bnc#1012382).
- arm: dts: exynos: Do not ignore real-world fuse values for thermal zone 0 on Exynos5420 (bnc#1012382).
- arm: imx6q: cpuidle: fix bug that CPU might not wake up at expected time (bnc#1012382).
- arm: OMAP2+: Variable 'reg' in function omap4_dsi_mux_pads() could be uninitialized (bnc#1012382).
- arm: pxa: ssp: unneeded to free devm_ allocated data (bnc#1012382).
- arm: s3c24xx: Fix boolean expressions in osiris_dvs_notify (bnc#1012382).
- ASoC: dapm: change snprintf to scnprintf for possible overflow (bnc#1012382).
- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bnc#1012382).
- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bnc#1012382).
- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bnc#1012382).
- ASoC: topology: free created components in tplg load error (bnc#1012382).
- assoc_array: Fix shortcut creation (bnc#1012382).
- ath10k: avoid possible string overflow (bnc#1012382).
- ath9k_htc: Add a sanity check in ath9k_htc_ampdu_action() (bsc#1087092).
- atm: he: fix sign-extension overflow on large shift (bnc#1012382).
- autofs: drop dentry reference only when it is never used (bnc#1012382).
- autofs: fix error return in autofs_fill_super() (bnc#1012382).
- batman-adv: Avoid endless loop in bat-on-bat netdevice check (git-fixes).
- batman-adv: Fix lockdep annotation of batadv_tlv_container_remove (git-fixes).
- batman-adv: fix uninit-value in batadv_interface_tx() (bnc#1012382).
- batman-adv: Only put gw_node list reference when removed (git-fixes).
- batman-adv: Only put orig_node_vlan list reference when removed (git-fixes).
- bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt (bnc#1012382).
- bnxt_en: Drop oversize TX packets to prevent errors (bnc#1012382).
- btrfs: Avoid possible qgroup_rsv_size overflow in btrfs_calculate_inode_block_rsv_size (git-fixes).
- btrfs: Fix bound checking in qgroup_trace_new_subtree_blocks (pending fix for bsc#1063638).
- btrfs: fix corruption reading shared and compressed extents after hole punching (bnc#1012382).
- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).
- btrfs: qgroup: Do not trace subtree if we're dropping reloc tree (bsc#1063638).
- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).
- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).
- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).
- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).
- btrfs: qgroup: Only trace data extents in leaves if we're relocating data block group (bsc#1063638).
- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).
- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).
- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).
- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).
- btrfs: raid56: properly unmap parity page in finish_parity_scrub() (bnc#1012382).
- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).
- btrfs: remove WARN_ON in log_dir_items (bnc#1012382).
- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1129770).
- cfg80211: extend range deviation for DMG (bnc#1012382).
- cfg80211: size various nl80211 messages correctly (bnc#1012382).
- cifs: fix computation for MAX_SMB2_HDR_SIZE (bnc#1012382).
- cifs: fix POSIX lock leak and invalid ptr deref (bsc#1114542).
- cifs: Fix read after write for files with read caching (bnc#1012382).
- clk: ingenic: Fix round_rate misbehaving with non-integer dividers (bnc#1012382).
- clocksource/drivers/exynos_mct: Clear timer interrupt when shutdown (bnc#1012382).
- clocksource/drivers/exynos_mct: Move one-shot check from tick clear to ISR (bnc#1012382).
- cls_bpf: reset class and reuse major in da (git-fixes).
- coresight: coresight_unregister() function cleanup (bnc#1012382).
- coresight: 'DEVICE_ATTR_RO' should defined as static (bnc#1012382).
- coresight: etm4x: Check every parameter used by dma_xx_coherent (bnc#1012382).
- coresight: fixing lockdep error (bnc#1012382).
- coresight: release reference taken by 'bus_find_device()' (bnc#1012382).
- coresight: remove csdev's link from topology (bnc#1012382).
- coresight: removing bind/unbind options from sysfs (bnc#1012382).
- cpufreq: pxa2xx: remove incorrect __init annotation (bnc#1012382).
- cpufreq: tegra124: add missing of_node_put() (bnc#1012382).
- cpufreq: Use struct kobj_attribute instead of struct global_attr (bnc#1012382).
- cpu/hotplug: Handle unbalanced hotplug enable/disable (bnc#1012382).
- cpu/speculation: Add 'mitigations=' cmdline option (bsc#1112178).
- crypto: ahash - fix another early termination in hash walk (bnc#1012382).
- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bnc#1012382).
- crypto: caam - fixed handling of sg list (bnc#1012382).
- crypto: pcbc - remove bogus memcpy()s with src == dest (bnc#1012382).
- crypto: qat - remove unused and redundant pointer vf_info (bsc#1085539).
- crypto: tgr192 - fix unaligned memory access (bsc#1129770).
- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1129770).
- dccp: do not use ipv6 header for ipv4 flow (bnc#1012382).
- disable kgdboc failed by echo space to /sys/module/kgdboc/parameters/kgdboc (bnc#1012382).
- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bnc#1012382).
- dmaengine: dmatest: Abort test in case of mapping error (bnc#1012382).
- dmaengine: usb-dmac: Make DMAC system sleep callbacks explicit (bnc#1012382).
- dm: disable DISCARD if the underlying storage no longer supports it (bsc#1114638).
- dm: fix to_sector() for 32bit (bnc#1012382).
- drivers: hv: vmbus: Fix bugs in rescind handling (bsc#1130567).
- drivers: hv: vmbus: Fix ring buffer signaling (bsc#1118506).
- drivers: hv: vmbus: Fix the offer_in_progress in vmbus_process_offer() (bsc#1130567).
- drivers: hv: vmbus: Offload the handling of channels to two workqueues (bsc#1130567).
- drivers: hv: vmbus: Reset the channel callback in vmbus_onoffer_rescind() (bsc#1130567).
- drm/msm: Unblock writer if reader closes file (bnc#1012382).
- drm/vmwgfx: Do not double-free the mode stored in par-&gt;set_mode (bsc#1106929)
- efi: stub: define DISABLE_BRANCH_PROFILING for all architectures (bnc#1012382).
- ext2: Fix underflow in ext2_max_size() (bnc#1012382).
- ext4: Avoid panic during forced reboot (bsc#1126356).
- ext4: brelse all indirect buffer in ext4_ind_remove_space() (bnc#1012382).
- ext4: fix data corruption caused by unaligned direct AIO (bnc#1012382).
- ext4: fix NULL pointer dereference while journal is aborted (bnc#1012382).
- extcon: usb-gpio: Do not miss event during suspend/resume (bnc#1012382).
- firmware: dmi: Optimize dmi_matches (git-fixes).
- floppy: check_events callback should not return a negative number (git-fixes).
- flow_dissector: Check for IP fragmentation even if not using IPv4 address (git-fixes).
- fs/9p: use fscache mutex rather than spinlock (bnc#1012382).
- fs/nfs: Fix nfs_parse_devname to not modify it's argument (git-fixes).
- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bnc#1012382).
- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (git-fixes).
- fuse: fix possibly missed wake-up after abort (git-fixes).
- futex: Ensure that futex address is aligned in handle_futex_death() (bnc#1012382).
- futex,rt_mutex: Fix rt_mutex_cleanup_proxy_lock() (git-fixes).
- futex,rt_mutex: Restructure rt_mutex_finish_proxy_lock() (bnc#1012382).
- gpio: adnp: Fix testing wrong value in adnp_gpio_direction_input (bnc#1012382).
- gpio: vf610: Mask all GPIO interrupts (bnc#1012382).
- gro_cells: make sure device is up in gro_cells_receive() (bnc#1012382).
- hid-sensor-hub.c: fix wrong do_div() usage (bnc#1012382).
- hpet: Fix missing '=' character in the __setup() code of hpet_mmap_enable (bsc#1129770).
- hugetlbfs: fix races and page leaks during migration (bnc#1012382).
- hv_netvsc: Fix napi reschedule while receive completion is busy (bsc#1118506).
- hv_netvsc: fix race in napi poll when rescheduling (bsc#1118506).
- hv_netvsc: Fix the return status in RX path (bsc#1118506).
- hv_netvsc: use napi_schedule_irqoff (bsc#1118506).
- hv: v4.12 API for hyperv-iommu (bsc#1122822).
- hv: v4.12 API for hyperv-iommu (fate#327171, bsc#1122822).
- i2c: cadence: Fix the hold bit setting (bnc#1012382).
- i2c: tegra: fix maximum transfer size (bnc#1012382).
- ib/{hfi1, qib}: Fix WC.byte_len calculation for UD_SEND_WITH_IMM (bnc#1012382).
- ibmvnic: Enable GRO (bsc#1132227).
- ibmvnic: Fix completion structure initialization (bsc#1131659).
- ibmvnic: Fix netdev feature clobbering during a reset (bsc#1132227).
- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bnc#1012382).
- input: matrix_keypad - use flush_delayed_work() (bnc#1012382).
- input: st-keyscan - fix potential zalloc NULL dereference (bnc#1012382).
- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bnc#1012382).
- intel_th: Do not reference unassigned outputs (bnc#1012382).
- intel_th: gth: Fix an off-by-one in output unassigning (git-fixes).
- iommu/amd: Fix NULL dereference bug in match_hid_uid (bsc#1130345).
- iommu/amd: fix sg-&gt;dma_address for sg-&gt;offset bigger than PAGE_SIZE (bsc#1130346).
- iommu/amd: Reserve exclusion range in iova-domain (bsc#1130425).
- iommu/amd: Set exclusion range correctly (bsc#1130425).
- iommu: Do not print warning when IOMMU driver only supports unmanaged domains (bsc#1130130).
- iommu/hyper-v: Add Hyper-V stub IOMMU driver (bsc#1122822).
- iommu/hyper-v: Add Hyper-V stub IOMMU driver (fate#327171,  bsc#1122822).
- iommu/vt-d: Check capability before disabling protected memory (bsc#1130347).
- ip6: fix PMTU discovery when using /127 subnets (git-fixes).
- ip6mr: Do not call __IP6_INC_STATS() from preemptible context (bnc#1012382).
- ip_tunnel: fix ip tunnel lookup in collect_md mode (git-fixes).
- ipvlan: disallow userns cap_net_admin to change global mode/flags (bnc#1012382).
- ipvs: Fix signed integer overflow when setsockopt timeout (bnc#1012382).
- irqchip/mmp: Only touch the PJ4 IRQ &amp; FIQ bits on enable/disable (bnc#1012382).
- iscsi_ibft: Fix missing break in switch statement (bnc#1012382).
- isdn: avm: Fix string plus integer warning from Clang (bnc#1012382).
- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bnc#1012382).
- isdn: isdn_tty: fix build warning of strncpy (bnc#1012382).
- iwlwifi: dbg: do not crash if the firmware crashes in the middle of a debug dump (bsc#1119086).
- jbd2: clear dirty flag when revoking a buffer from an older transaction (bnc#1012382).
- jbd2: fix compile warning when using JBUFFER_TRACE (bnc#1012382).
- kabi fixup gendisk disk_devt revert (bsc#1020989).
- kbuild: setlocalversion: print error to STDERR (bnc#1012382).
- kernel/sysctl.c: add missing range check in do_proc_dointvec_minmax_conv (bnc#1012382).
- keys: allow reaching the keys quotas exactly (bnc#1012382).
- keys: always initialize keyring_index_key::desc_len (bnc#1012382).
- keys: restrict /proc/keys by credentials at open time (bnc#1012382).
- keys: user: Align the payload buffer (bnc#1012382).
- kvm: Call kvm_arch_memslots_updated() before updating memslots (bsc#1132634).
- kvm: nSVM: clear events pending from svm_complete_interrupts() when exiting to L1 (bnc#1012382).
- kvm: nVMX: Apply addr size mask to effective address for VMX instructions (bsc#1132635).
- kvm: nVMX: Ignore limit checks on VMX instructions using flat segments (bnc#1012382).
- kvm: nVMX: Sign extend displacements of VMX instr's mem operands (bnc#1012382).
- kvm: Reject device ioctls from processes other than the VM's creator (bnc#1012382).
- kvm: VMX: Compare only a single byte for VMCS' 'launched' in vCPU-run (bsc#1132636).
- kvm: VMX: Zero out *all* general purpose registers after VM-Exit (bsc#1132637).
- kvm: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hosts (bsc#1132534).
- kvm: X86: Fix residual mmio emulation request to userspace (bnc#1012382).
- kvm: x86/mmu: Do not cache MMIO accesses while memslots are in flux (bsc#1132638).
- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).
- leds: lp5523: fix a missing check of return value of lp55xx_read (bnc#1012382).
- libertas: call into generic suspend code before turning off power (bsc#1106110).
- libertas: fix suspend and resume for SDIO connected cards (bsc#1106110).
- lib/int_sqrt: optimize small argument (bnc#1012382).
- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1131857).
- locking/lockdep: Add debug_locks check in __lock_downgrade() (bnc#1012382).
- locking/static_keys: Improve uninitialized key warning (bsc#1106913).
- m68k: Add -ffreestanding to CFLAGS (bnc#1012382).
- mac80211: do not initiate TDLS connection if station is not associated to AP (bnc#1012382).
- mac80211: fix miscounting of ttl-dropped frames (bnc#1012382).
- mac80211: fix 'warning: target metric may be used uninitialized' (bnc#1012382).
- mac80211_hwsim: propagate genlmsg_reply return code (bnc#1012382).
- mac8390: Fix mmio access size probe (bnc#1012382).
- md: Fix failed allocation of md_register_thread (bnc#1012382).
- mdio_bus: Fix use-after-free on device_register fails (bnc#1012382 git-fixes).
- md/raid1: do not clear bitmap bits on interrupted recovery (git-fixes).
- media: cx88: Get rid of spurious call to cx8800_start_vbi_dma() (bsc#1100132).
- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bnc#1012382).
- media: uvcvideo: Fix 'type' check leading to overflow (bnc#1012382).
- media: uvcvideo: Fix uvc_alloc_entity() allocation alignment (bsc#1119086).
- media: v4l2-ctrls.c/uvc: zero v4l2_event (bnc#1012382).
- media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused() (bnc#1012382).
- media: vivid: potential integer overflow in vidioc_g_edid() (bsc#11001132).
- mfd: ab8500-core: Return zero in get_register_interruptible() (bnc#1012382).
- mfd: db8500-prcmu: Fix some section annotations (bnc#1012382).
- mfd: mc13xxx: Fix a missing check of a register-read failure (bnc#1012382).
- mfd: qcom_rpm: write fw_version to CTRL_REG (bnc#1012382).
- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bnc#1012382).
- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bnc#1012382).
- mfd: wm5110: Add missing ASRC rate register (bnc#1012382).
- mips: loongson64: lemote-2f: Add IRQF_NO_SUSPEND to 'cascade' irqaction (bnc#1012382).
- mISDN: hfcpci: Test both vendor &amp; device ID for Digium HFC4S (bnc#1012382).
- missing barriers in some of unix_sock -&gt;addr and -&gt;path accesses (bnc#1012382).
- mmc: bcm2835: reset host on timeout (bsc#1070872).
- mmc: block: Allow more than 8 partitions per card (bnc#1012382).
- mmc: core: fix using wrong io voltage if mmc_select_hs200 fails (bnc#1012382).
- mmc: core: shut up 'voltage-ranges unspecified' pr_info() (bnc#1012382).
- mmc: debugfs: Add a restriction to mmc debugfs clock setting (bnc#1012382).
- mmc: make MAN_BKOPS_EN message a debug (bnc#1012382).
- mmc: mmc: fix switch timeout issue caused by jiffies precision (bnc#1012382).
- mmc: pwrseq_simple: Make reset-gpios optional to match doc (bnc#1012382).
- mmc: pxamci: fix enum type confusion (bnc#1012382).
- mmc: sanitize 'bus width' in debug output (bnc#1012382).
- mmc: spi: Fix card detection during probe (bnc#1012382).
- mmc: tmio_mmc_core: do not claim spurious interrupts (bnc#1012382).
- mm/debug.c: fix __dump_page when mapping-&gt;host is not set (bsc#1131934).
- mm, memory_hotplug: fix off-by-one in is_pageblock_removable (git-fixes).
- mm, memory_hotplug: is_mem_section_removable do not pass the end of a zone (bnc#1012382).
- mm, memory_hotplug: test_pages_in_a_zone do not pass the end of zone (bnc#1012382).
- mm: move is_pageblock_removable_nolock() to mm/memory_hotplug.c (git-fixes prerequisity).
- mm/page_isolation.c: fix a wrong flag in set_migratetype_isolate() (bsc#1131935)
- mm/rmap: replace BUG_ON(anon_vma-&gt;degree) with VM_WARN_ON (bnc#1012382).
- mm/vmalloc: fix size check for remap_vmalloc_range_partial() (bnc#1012382).
- move power_up_on_resume flag to end of structure for kABI (bsc#1106110).
- mwifiex: pcie: tighten a check in mwifiex_pcie_process_event_ready() (bsc#1100132).
- ncpfs: fix build warning of strncpy (bnc#1012382).
- net: add description for len argument of dev_get_phys_port_name (git-fixes).
- net: Add __icmp_send helper (bnc#1012382).
- net: altera_tse: fix connect_local_phy error path (bnc#1012382).
- net: altera_tse: fix msgdma_tx_completion on non-zero fill_level case (bnc#1012382).
- net: avoid use IPCB in cipso_v4_error (bnc#1012382).
- net: diag: support v4mapped sockets in inet_diag_find_one_icsk() (bnc#1012382).
- net: do not decrement kobj reference count on init failure (git-fixes).
- net: dsa: mv88e6xxx: Fix u64 statistics (bnc#1012382).
- net: ena: fix race between link up and device initalization (bsc#1129278).
- net: ena: update driver version from 2.0.2 to 2.0.3 (bsc#1129278).
- netfilter: ipt_CLUSTERIP: fix use-after-free of proc entry (git-fixes).
- netfilter: nf_conntrack_tcp: Fix stack out of bounds when parsing TCP options (bnc#1012382).
- netfilter: nfnetlink_acct: validate NFACCT_FILTER parameters (bnc#1012382).
- netfilter: nfnetlink_log: just returns error for unknown command (bnc#1012382).
- netfilter: nfnetlink: use original skbuff when acking batches (git-fixes).
- netfilter: x_tables: enforce nul-terminated table name from getsockopt GET_ENTRIES (bnc#1012382).
- net: hns: Fix use after free identified by SLUB debug (bnc#1012382).
- net: hns: Fix wrong read accesses via Clause 45 MDIO protocol (bnc#1012382).
- net: hsr: fix memory leak in hsr_dev_finalize() (bnc#1012382).
- net/hsr: fix possible crash in add_timer() (bnc#1012382).
- netlabel: fix out-of-bounds memory accesses (bnc#1012382).
- net/mlx4_en: Force CHECKSUM_NONE for short ethernet frames (bnc#1012382).
- net: mv643xx_eth: disable clk on error path in mv643xx_eth_shared_probe() (bnc#1012382).
- net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails (bnc#1012382).
- net/packet: fix 4gb buffer limit due to overflow check (bnc#1012382).
- net/packet: Set __GFP_NOWARN upon allocation in alloc_pg_vec (bnc#1012382).
- net: phy: Micrel KSZ8061: link failure after cable connect (bnc#1012382).
- net: rose: fix a possible stack overflow (bnc#1012382).
- net: Set rtm_table to RT_TABLE_COMPAT for ipv6 for tables &gt; 255 (bnc#1012382).
- net: set static variable an initial value in atl2_probe() (bnc#1012382).
- net: sit: fix UBSAN Undefined behaviour in check_6rd (bnc#1012382).
- net: stmmac: dwmac-rk: fix error handling in rk_gmac_powerup() (bnc#1012382).
- net-sysfs: call dev_hold if kobject_init_and_add success (git-fixes).
- net-sysfs: Fix mem leak in netdev_register_kobject (bnc#1012382).
- net: systemport: Fix reception of BPDUs (bnc#1012382).
- net: tcp_memcontrol: properly detect ancestor socket pressure (git-fixes).
- net/x25: fix a race in x25_bind() (bnc#1012382).
- net/x25: fix use-after-free in x25_device_event() (bnc#1012382).
- net/x25: reset state in x25_connect() (bnc#1012382).
- nfc: nci: memory leak in nci_core_conn_create() (git-fixes).
- nfs41: pop some layoutget errors to application (bnc#1012382).
- nfsd: fix memory corruption caused by readdir (bsc#1127445).
- nfsd: fix wrong check in write_v4_end_grace() (git-fixes).
- nfs: Do not recoalesce on error in nfs_pageio_complete_mirror() (git-fixes).
- nfs: Fix an I/O request leakage in nfs_do_recoalesce (git-fixes).
- nfs: Fix dentry revalidation on NFSv4 lookup (bsc#1132618).
- nfs: fix mount/umount race in nlmclnt (git-fixes).
- nfs: Fix NULL pointer dereference of dev_name (bnc#1012382).
- nfsv4.x: always serialize open/close operations (bsc#1114893).
- numa: change get_mempolicy() to use nr_node_ids instead of MAX_NUMNODES (bnc#1012382).
- packets: Always register packet sk in the same order (bnc#1012382).
- parport_pc: fix find_superio io compare code, should use equal test (bnc#1012382).
- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).
- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792  vcpus (fate#327171, bsc#1122822).
- perf auxtrace: Define auxtrace record alignment (bnc#1012382).
- perf bench: Copy kernel files needed to build mem{cpy,set} x86_64 benchmarks (bnc#1012382).
- perf intel-pt: Fix CYC timestamp calculation after OVF (bnc#1012382).
- perf intel-pt: Fix overlap calculation for padding (bnc#1012382).
- perf intel-pt: Fix TSC slip (bnc#1012382).
- perf/ring_buffer: Refuse to begin AUX transaction after rb-&gt;aux_mmap_count drops (bnc#1012382).
- perf symbols: Filter out hidden symbols from labels (bnc#1012382).
- perf: Synchronously free aux pages in case of allocation failure (bnc#1012382).
- perf tools: Handle TOPOLOGY headers with no CPU (bnc#1012382).
- perf/x86/amd: Add event map for AMD Family 17h (bsc#1114648).
- phonet: fix building with clang (bnc#1012382).
- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bnc#1012382).
- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bnc#1012382).
- pm / Hibernate: Call flush_icache_range() on pages restored in-place (bnc#1012382).
- pm / wakeup: Rework wakeup source timer cancellation (bnc#1012382).
- powerpc/32: Clear on-stack exception marker upon exception return (bnc#1012382).
- powerpc/64: Call setup_barrier_nospec() from setup_arch() (bsc#1131107).
- powerpc/64: Disable the speculation barrier from the command line (bsc#1131107).
- powerpc/64: Make stf barrier PPC_BOOK3S_64 specific (bsc#1131107).
- powerpc/64s: Add new security feature flags for count cache flush (bsc#1131107).
- powerpc/64s: Add support for software count cache flush (bsc#1131107).
- powerpc/83xx: Also save/restore SPRG4-7 during suspend (bnc#1012382).
- powerpc: Always initialize input array when calling epapr_hypercall() (bnc#1012382).
- powerpc/asm: Add a patch_site macro &amp; helpers for patching instructions (bsc#1131107).
- powerpc/fsl: Fix spectre_v2 mitigations reporting (bsc#1131107).
- powerpc/mm/hash: Handle mmap_min_addr correctly in get_unmapped_area topdown search (bsc#1131900).
- powerpc/numa: document topology_updates_enabled, disable by default (bsc#1133584).
- powerpc/numa: improve control of topology updates (bsc#1133584).
- powerpc/perf: Fix unit_sel/cache_sel checks (bsc#1053043).
- powerpc/perf: Remove l2 bus events from HW cache event array (bsc#1053043).
- powerpc/perf: Update raw-event code encoding comment for power8 (bsc#1053043, git-fixes).
- powerpc/powernv/cpuidle: Init all present cpus for deep states (bsc#1066223).
- powerpc/powernv: Make opal log only readable by root (bnc#1012382).
- powerpc/powernv: Query firmware for count cache flush settings (bsc#1131107).
- powerpc/pseries/mce: Fix misleading print for TLB mutlihit (bsc#1094244, git-fixes).
- powerpc/pseries: Query hypervisor for count cache flush settings (bsc#1131107).
- powerpc/security: Fix spectre_v2 reporting (bsc#1131107).
- powerpc/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- powerpc/tm: Add commandline option to disable hardware transactional memory (bsc#1118338).
- powerpc/tm: Add TM Unavailable Exception (bsc#1118338).
- powerpc/tm: Flip the HTM switch default to disabled (bsc#1125580).
- powerpc/vdso32: fix CLOCK_MONOTONIC on PPC64 (bsc#1131587).
- powerpc/vdso64: Fix CLOCK_MONOTONIC inconsistencies across Y2038 (bsc#1131587).
- powerpc/wii: properly disable use of BATs when requested (bnc#1012382).
- raid10: It's wrong to add len to sector_nr in raid10 reshape twice (bnc#1012382).
- ravb: Decrease TxFIFO depth of Q3 and Q2 to one (bnc#1012382).
- rcu: Do RCU GP kthread self-wakeup from softirq and interrupt (bnc#1012382).
- rdma/core: Do not expose unsupported counters (bsc#994770).
- rdma/srp: Rework SCSI device reset handling (bnc#1012382).
- Refresh patches.fixes/0001-net-mlx4-Fix-endianness-issue-in-qp-context-params.patch. (bsc#1132619)
- regulator: s2mpa01: Fix step values for some LDOs (bnc#1012382).
- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bnc#1012382).
- Revert 'bridge: do not add port to router list when receives query with source 0.0.0.0' (bnc#1012382).
- Revert 'mmc: block: do not use parameter prefix if built as module' (bnc#1012382).
- Revert 'scsi, block: fix duplicate bdi name registration crashes' (bsc#1020989).
- Revert 'USB: core: only clean up what we allocated' (bnc#1012382).
- route: set the deleted fnhe fnhe_daddr to 0 in ip_del_fnhe to fix a race (bnc#1012382).
- rsi: fix a dereference on adapter before it has been null checked (bsc#1085539).
- rtc: Fix overflow when converting time64_t to rtc_time (bnc#1012382).
- rtl8xxxu: Fix missing break in switch (bsc#1120902).
- s390/dasd: fix panic for failed online processing (bsc#1132589).
- s390/dasd: fix using offset into zero size array error (bnc#1012382).
- s390: Prevent hotplug rwsem recursion (bsc#1131980).
- s390/qeth: fix use-after-free in error path (bnc#1012382).
- s390/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- s390/virtio: handle find on invalid queue gracefully (bnc#1012382).
- sched/core: Fix cpu.max vs. cpuhotplug deadlock (bsc#1106913).
- sched/smt: Expose sched_smt_present static key (bsc#1106913).
- sched/smt: Make sched_smt_present track topology (bsc#1106913).
- scripts/git_sort/git_sort.py: Add fixes branch from mkp/scsi.git.
- scsi: csiostor: fix NULL pointer dereference in csio_vport_set_state() (bnc#1012382).
- scsi: isci: initialize shost fully before calling scsi_add_host() (bnc#1012382).
- scsi: libfc: free skb when receiving invalid flogi resp (bnc#1012382).
- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bnc#1012382).
- scsi: libsas: Fix rphy phy_identifier for PHYs with end devices attached (bnc#1012382).
- scsi: qla4xxx: check return code of qla4xxx_copy_from_fwddb_param (bnc#1012382).
- scsi: sd: Fix a race between closing an sd device and sd I/O (bnc#1012382).
- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().
- scsi: storvsc: Fix a race in sub-channel creation that can  cause panic (fate#323887).
- scsi: storvsc: Reduce default ring buffer size to 128 Kbytes ().
- scsi: storvsc: Reduce default ring buffer size to 128 Kbytes  (fate#323887).
- scsi: target/iscsi: Avoid iscsit_release_commands_from_conn() deadlock (bnc#1012382).
- scsi: virtio_scsi: do not send sc payload with tmfs (bnc#1012382).
- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bnc#1012382).
- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bnc#1012382).
- sctp: fix the transports round robin issue when init is retransmitted (git-fixes).
- sctp: get sctphdr by offset in sctp_compute_cksum (bnc#1012382).
- serial: 8250_pci: Fix number of ports for ACCES serial cards (bnc#1012382).
- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bnc#1012382).
- serial: fsl_lpuart: fix maximum acceptable baud rate with over-sampling (bnc#1012382).
- serial: max310x: Fix to avoid potential NULL pointer dereference (bnc#1012382).
- serial: sh-sci: Fix setting SCSCR_TIE while transferring data (bnc#1012382).
- serial: sprd: adjust TIMEOUT to a big value (bnc#1012382).
- serial: sprd: clear timeout interrupt only rather than all interrupts (bnc#1012382).
- sit: check if IPv6 enabled before calling ip6_err_gen_icmpv6_unreach() (bnc#1012382).
- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bnc#1012382).
- sockfs: getxattr: Fail with -EOPNOTSUPP for invalid attribute names (bnc#1012382).
- staging: ashmem: Add missing include (bnc#1012382).
- staging: ashmem: Avoid deadlock with mmap/shrink (bnc#1012382).
- staging: goldfish: audio: fix compiliation on arm (bnc#1012382).
- staging: ion: Set minimum carveout heap allocation order to PAGE_SHIFT (bnc#1012382).
- staging: lustre: fix buffer overflow of string buffer (bnc#1012382).
- staging: rtl8188eu: avoid a null dereference on pmlmepriv (bsc#1085539).
- staging: vt6655: Fix interrupt race condition on device start up (bnc#1012382).
- staging: vt6655: Remove vif check from vnt_interrupt (bnc#1012382).
- stm class: Do not leak the chrdev in error path (bnc#1012382).
- stm class: Fix an endless loop in channel allocation (bnc#1012382).
- stm class: Fix a race in unlinking (bnc#1012382).
- stm class: Fix link list locking (bnc#1012382).
- stm class: Fix locking in unbinding policy path (bnc#1012382).
- stm class: Fix stm device initialization order (bnc#1012382).
- stm class: Fix unbalanced module/device refcounting (bnc#1012382).
- stm class: Fix unlocking braino in the error path (bnc#1012382).
- stm class: Guard output assignment against concurrency (bnc#1012382).
- stm class: Hide STM-specific options if STM is disabled (bnc#1012382).
- stm class: Prevent division by zero (bnc#1012382).
- stm class: Prevent user-controllable allocations (bnc#1012382).
- stm class: Support devices with multiple instances (bnc#1012382).
- stmmac: copy unicast mac address to MAC registers (bnc#1012382).
- stop_machine: Provide stop_machine_cpuslocked() (bsc#1131980).
- sunrpc: do not mark uninitialised items as VALID (bsc#1130737).
- sunrpc: init xdr_stream for zero iov_len, page_len (bsc#11303356).
- svm/avic: Fix invalidate logical APIC id entry (bsc#1132727).
- svm: Fix AVIC DFR and LDR handling (bsc#1130343).
- svm: Fix improper check when deactivate AVIC (bsc#1130344).
- tcp/dccp: drop SYN packets if accept queue is full (bnc#1012382).
- tcp/dccp: remove reqsk_put() from inet_child_forget() (git-fixes).
- tcp: do not use ipv6 header for ipv4 flow (bnc#1012382).
- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).
- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bnc#1012382).
- time: Introduce jiffies64_to_nsecs() (bsc#1113399).
- tmpfs: fix link accounting when a tmpfile is linked in (bnc#1012382).
- tmpfs: fix uninitialized return value in shmem_link (bnc#1012382).
- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1020645).
- tpm: Fix the type of the return value in calc_tpm2_event_size() (bsc#1020645, git-fixes).
- tpm: tpm-interface.c drop unused macros (bsc#1020645).
- tty: atmel_serial: fix a potential NULL pointer dereference (bnc#1012382).
- udf: Fix crash on IO error during truncate (bnc#1012382).
- Update patches.fixes/SUNRPC-init-xdr_stream-for-zero-iov_len-page_len.patch (bsc#1130356).
- usb: core: only clean up what we allocated (bnc#1012382).
- usb: dwc2: Fix DMA alignment to start at allocated boundary (bsc#1100132).
- usb: dwc2: fix the incorrect bitmaps for the ports of multi_tt hub (bsc#1100132).
- usb: dwc3: gadget: Fix suspend/resume during device mode (bnc#1012382).
- usb: dwc3: gadget: Fix the uninitialized link_state when udc starts (bnc#1012382).
- usb: gadget: Add the gserial port checking in gs_start_tx() (bnc#1012382).
- usb: gadget: composite: fix dereference after null check coverify warning (bnc#1012382).
- usb: gadget: configfs: add mutex lock before unregister gadget (bnc#1012382).
- usb: gadget: Potential NULL dereference on allocation error (bnc#1012382).
- usb: gadget: rndis: free response queue during REMOTE_NDIS_RESET_MSG (bnc#1012382).
- usb: renesas_usbhs: gadget: fix unused-but-set-variable warning (bnc#1012382).
- usb: serial: cp210x: add ID for Ingenico 3070 (bnc#1012382).
- usb: serial: cp210x: add new device id (bnc#1012382).
- usb: serial: cypress_m8: fix interrupt-out transfer length (bsc#1119086).
- usb: serial: ftdi_sio: add additional NovaTech products (bnc#1012382).
- usb: serial: ftdi_sio: add ID for Hjelmslund Electronics USB485 (bnc#1012382).
- usb: serial: mos7720: fix mos_parport refcount imbalance on error path (bsc#1129770).
- usb: serial: option: add Olicard 600 (bnc#1012382).
- usb: serial: option: add Telit ME910 ECM composition (bnc#1012382).
- usb: serial: option: set driver_info for SIM5218 and compatibles (bsc#1129770).
- video: fbdev: Set pixclock = 0 in goldfishfb (bnc#1012382).
- vti4: Fix a ipip packet processing bug in 'IPCOMP' virtual tunnel (bnc#1012382).
- vxlan: Do not call gro_cells_destroy() before device is unregistered (bnc#1012382).
- vxlan: Fix GRO cells race condition between receive and link delete (bnc#1012382).
- vxlan: test dev-&gt;flags &amp; IFF_UP before calling gro_cells_receive() (bnc#1012382).
- wlcore: Fix the return value in case of error in 'wlcore_vendor_cmd_smart_config_start()' (bsc#1120902).
- x86_64: increase stack size for KASAN_EXTRA (bnc#1012382).
- x86/apic: Provide apic_ack_irq() (bsc#1122822).
- x86/apic: Provide apic_ack_irq() (fate#327171, bsc#1122822).
- x86/CPU/AMD: Set the CPB bit unconditionally on F17h (bnc#1012382).
- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).
- x86/Hyper-V: Set x2apic destination mode to physical when  x2apic is available (fate#327171, bsc#1122822).
- x86/kexec: Do not setup EFI info if EFI runtime is not enabled (bnc#1012382).
- x86/mce: Improve error message when kernel cannot recover, p2 (bsc#1114648).
- x86/smp: Enforce CONFIG_HOTPLUG_CPU when SMP=y (bnc#1012382).
- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1111331).
- x86/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- x86/uaccess: Do not leak the AC flag into __put_user() value evaluation (bsc#1114648).
- x86/vdso: Add VCLOCK_HVCLOCK vDSO clock read method (bsc#1133308).
- xen-netback: fix occasional leak of grant ref mappings under memory pressure (bnc#1012382).
- xfrm_user: fix info leak in build_aevent() (git-fixes).
- xfrm_user: fix info leak in xfrm_notify_sa() (git-fixes).
- xhci: Do not let USB3 ports stuck in polling state prevent suspend (bsc#1047487).
- xhci: Fix port resume done detection for SS ports with LPM enabled (bnc#1012382).
- xtensa: SMP: fix ccount_timer_shutdown (bnc#1012382).
- xtensa: SMP: fix secondary CPU initialization (bnc#1012382).
- xtensa: SMP: limit number of possible CPUs by NR_CPUS (bnc#1012382).
- xtensa: smp_lx200_defconfig: fix vectors clash (bnc#1012382).
- xtensa: SMP: mark each possible CPU as present (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020645">SUSE bug 1020645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020989">SUSE bug 1020989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031492">SUSE bug 1031492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053043">SUSE bug 1053043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062056">SUSE bug 1062056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063638">SUSE bug 1063638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070872">SUSE bug 1070872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085539">SUSE bug 1085539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087092">SUSE bug 1087092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096480">SUSE bug 1096480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096728">SUSE bug 1096728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097104">SUSE bug 1097104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100132">SUSE bug 1100132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105348">SUSE bug 1105348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106110">SUSE bug 1106110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106913">SUSE bug 1106913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106929">SUSE bug 1106929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112178">SUSE bug 1112178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113399">SUSE bug 1113399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114542">SUSE bug 1114542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114638">SUSE bug 1114638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114648">SUSE bug 1114648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114893">SUSE bug 1114893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118338">SUSE bug 1118338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118506">SUSE bug 1118506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119086">SUSE bug 1119086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120902">SUSE bug 1120902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122822">SUSE bug 1122822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125580">SUSE bug 1125580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126356">SUSE bug 1126356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127445">SUSE bug 1127445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129278">SUSE bug 1129278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129326">SUSE bug 1129326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129770">SUSE bug 1129770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130130">SUSE bug 1130130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130343">SUSE bug 1130343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130344">SUSE bug 1130344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130345">SUSE bug 1130345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130346">SUSE bug 1130346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130347">SUSE bug 1130347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130356">SUSE bug 1130356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130425">SUSE bug 1130425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130567">SUSE bug 1130567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130737">SUSE bug 1130737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131416">SUSE bug 1131416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131427">SUSE bug 1131427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131587">SUSE bug 1131587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131659">SUSE bug 1131659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131857">SUSE bug 1131857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131900">SUSE bug 1131900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131934">SUSE bug 1131934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131935">SUSE bug 1131935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131980">SUSE bug 1131980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132227">SUSE bug 1132227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132534">SUSE bug 1132534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132589">SUSE bug 1132589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132618">SUSE bug 1132618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132619">SUSE bug 1132619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132634">SUSE bug 1132634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132635">SUSE bug 1132635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132636">SUSE bug 1132636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132637">SUSE bug 1132637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132638">SUSE bug 1132638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132727">SUSE bug 1132727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132828">SUSE bug 1132828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133308">SUSE bug 1133308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133584">SUSE bug 1133584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994770">SUSE bug 994770</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000204">CVE-2018-1000204 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10853">CVE-2018-10853 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15594/">CVE-2018-15594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15594">CVE-2018-15594 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5814/">CVE-2018-5814 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5814">CVE-2018-5814 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3882/">CVE-2019-3882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3882">CVE-2019-3882 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9503/">CVE-2019-9503 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9503">CVE-2019-9503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553997" comment="kernel-default-4.4.178-94.91.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553998" comment="kernel-default-base-4.4.178-94.91.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553999" comment="kernel-default-devel-4.4.178-94.91.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554000" comment="kernel-default-man-4.4.178-94.91.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521168" comment="kernel-devel-4.4.178-94.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521169" comment="kernel-macros-4.4.178-94.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521170" comment="kernel-source-4.4.178-94.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554001" comment="kernel-syms-4.4.178-94.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149774" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1020645" ref_url="https://bugzilla.suse.com/1020645" source="BUGZILLA"/>
		<reference ref_id="1020989" ref_url="https://bugzilla.suse.com/1020989" source="BUGZILLA"/>
		<reference ref_id="1023711" ref_url="https://bugzilla.suse.com/1023711" source="BUGZILLA"/>
		<reference ref_id="1031492" ref_url="https://bugzilla.suse.com/1031492" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1053043" ref_url="https://bugzilla.suse.com/1053043" source="BUGZILLA"/>
		<reference ref_id="1062056" ref_url="https://bugzilla.suse.com/1062056" source="BUGZILLA"/>
		<reference ref_id="1063638" ref_url="https://bugzilla.suse.com/1063638" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1070872" ref_url="https://bugzilla.suse.com/1070872" source="BUGZILLA"/>
		<reference ref_id="1078216" ref_url="https://bugzilla.suse.com/1078216" source="BUGZILLA"/>
		<reference ref_id="1085539" ref_url="https://bugzilla.suse.com/1085539" source="BUGZILLA"/>
		<reference ref_id="1086162" ref_url="https://bugzilla.suse.com/1086162" source="BUGZILLA"/>
		<reference ref_id="1087092" ref_url="https://bugzilla.suse.com/1087092" source="BUGZILLA"/>
		<reference ref_id="1087659" ref_url="https://bugzilla.suse.com/1087659" source="BUGZILLA"/>
		<reference ref_id="1093777" ref_url="https://bugzilla.suse.com/1093777" source="BUGZILLA"/>
		<reference ref_id="1094120" ref_url="https://bugzilla.suse.com/1094120" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1096480" ref_url="https://bugzilla.suse.com/1096480" source="BUGZILLA"/>
		<reference ref_id="1096728" ref_url="https://bugzilla.suse.com/1096728" source="BUGZILLA"/>
		<reference ref_id="1097104" ref_url="https://bugzilla.suse.com/1097104" source="BUGZILLA"/>
		<reference ref_id="1100132" ref_url="https://bugzilla.suse.com/1100132" source="BUGZILLA"/>
		<reference ref_id="1103186" ref_url="https://bugzilla.suse.com/1103186" source="BUGZILLA"/>
		<reference ref_id="1105348" ref_url="https://bugzilla.suse.com/1105348" source="BUGZILLA"/>
		<reference ref_id="1106110" ref_url="https://bugzilla.suse.com/1106110" source="BUGZILLA"/>
		<reference ref_id="1106913" ref_url="https://bugzilla.suse.com/1106913" source="BUGZILLA"/>
		<reference ref_id="1106929" ref_url="https://bugzilla.suse.com/1106929" source="BUGZILLA"/>
		<reference ref_id="1107937" ref_url="https://bugzilla.suse.com/1107937" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1112178" ref_url="https://bugzilla.suse.com/1112178" source="BUGZILLA"/>
		<reference ref_id="1113399" ref_url="https://bugzilla.suse.com/1113399" source="BUGZILLA"/>
		<reference ref_id="1114542" ref_url="https://bugzilla.suse.com/1114542" source="BUGZILLA"/>
		<reference ref_id="1114638" ref_url="https://bugzilla.suse.com/1114638" source="BUGZILLA"/>
		<reference ref_id="1114648" ref_url="https://bugzilla.suse.com/1114648" source="BUGZILLA"/>
		<reference ref_id="1114893" ref_url="https://bugzilla.suse.com/1114893" source="BUGZILLA"/>
		<reference ref_id="1118338" ref_url="https://bugzilla.suse.com/1118338" source="BUGZILLA"/>
		<reference ref_id="1118506" ref_url="https://bugzilla.suse.com/1118506" source="BUGZILLA"/>
		<reference ref_id="1119086" ref_url="https://bugzilla.suse.com/1119086" source="BUGZILLA"/>
		<reference ref_id="1120902" ref_url="https://bugzilla.suse.com/1120902" source="BUGZILLA"/>
		<reference ref_id="1122822" ref_url="https://bugzilla.suse.com/1122822" source="BUGZILLA"/>
		<reference ref_id="1125580" ref_url="https://bugzilla.suse.com/1125580" source="BUGZILLA"/>
		<reference ref_id="1126356" ref_url="https://bugzilla.suse.com/1126356" source="BUGZILLA"/>
		<reference ref_id="1127445" ref_url="https://bugzilla.suse.com/1127445" source="BUGZILLA"/>
		<reference ref_id="1129278" ref_url="https://bugzilla.suse.com/1129278" source="BUGZILLA"/>
		<reference ref_id="1129326" ref_url="https://bugzilla.suse.com/1129326" source="BUGZILLA"/>
		<reference ref_id="1129770" ref_url="https://bugzilla.suse.com/1129770" source="BUGZILLA"/>
		<reference ref_id="1130130" ref_url="https://bugzilla.suse.com/1130130" source="BUGZILLA"/>
		<reference ref_id="1130343" ref_url="https://bugzilla.suse.com/1130343" source="BUGZILLA"/>
		<reference ref_id="1130344" ref_url="https://bugzilla.suse.com/1130344" source="BUGZILLA"/>
		<reference ref_id="1130345" ref_url="https://bugzilla.suse.com/1130345" source="BUGZILLA"/>
		<reference ref_id="1130346" ref_url="https://bugzilla.suse.com/1130346" source="BUGZILLA"/>
		<reference ref_id="1130347" ref_url="https://bugzilla.suse.com/1130347" source="BUGZILLA"/>
		<reference ref_id="1130356" ref_url="https://bugzilla.suse.com/1130356" source="BUGZILLA"/>
		<reference ref_id="1130425" ref_url="https://bugzilla.suse.com/1130425" source="BUGZILLA"/>
		<reference ref_id="1130567" ref_url="https://bugzilla.suse.com/1130567" source="BUGZILLA"/>
		<reference ref_id="1130737" ref_url="https://bugzilla.suse.com/1130737" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1131416" ref_url="https://bugzilla.suse.com/1131416" source="BUGZILLA"/>
		<reference ref_id="1131427" ref_url="https://bugzilla.suse.com/1131427" source="BUGZILLA"/>
		<reference ref_id="1131587" ref_url="https://bugzilla.suse.com/1131587" source="BUGZILLA"/>
		<reference ref_id="1131659" ref_url="https://bugzilla.suse.com/1131659" source="BUGZILLA"/>
		<reference ref_id="1131857" ref_url="https://bugzilla.suse.com/1131857" source="BUGZILLA"/>
		<reference ref_id="1131900" ref_url="https://bugzilla.suse.com/1131900" source="BUGZILLA"/>
		<reference ref_id="1131934" ref_url="https://bugzilla.suse.com/1131934" source="BUGZILLA"/>
		<reference ref_id="1131935" ref_url="https://bugzilla.suse.com/1131935" source="BUGZILLA"/>
		<reference ref_id="1131980" ref_url="https://bugzilla.suse.com/1131980" source="BUGZILLA"/>
		<reference ref_id="1132227" ref_url="https://bugzilla.suse.com/1132227" source="BUGZILLA"/>
		<reference ref_id="1132534" ref_url="https://bugzilla.suse.com/1132534" source="BUGZILLA"/>
		<reference ref_id="1132589" ref_url="https://bugzilla.suse.com/1132589" source="BUGZILLA"/>
		<reference ref_id="1132618" ref_url="https://bugzilla.suse.com/1132618" source="BUGZILLA"/>
		<reference ref_id="1132619" ref_url="https://bugzilla.suse.com/1132619" source="BUGZILLA"/>
		<reference ref_id="1132634" ref_url="https://bugzilla.suse.com/1132634" source="BUGZILLA"/>
		<reference ref_id="1132635" ref_url="https://bugzilla.suse.com/1132635" source="BUGZILLA"/>
		<reference ref_id="1132636" ref_url="https://bugzilla.suse.com/1132636" source="BUGZILLA"/>
		<reference ref_id="1132637" ref_url="https://bugzilla.suse.com/1132637" source="BUGZILLA"/>
		<reference ref_id="1132638" ref_url="https://bugzilla.suse.com/1132638" source="BUGZILLA"/>
		<reference ref_id="1132727" ref_url="https://bugzilla.suse.com/1132727" source="BUGZILLA"/>
		<reference ref_id="1132828" ref_url="https://bugzilla.suse.com/1132828" source="BUGZILLA"/>
		<reference ref_id="1133308" ref_url="https://bugzilla.suse.com/1133308" source="BUGZILLA"/>
		<reference ref_id="1133584" ref_url="https://bugzilla.suse.com/1133584" source="BUGZILLA"/>
		<reference ref_id="994770" ref_url="https://bugzilla.suse.com/994770" source="BUGZILLA"/>
		<reference ref_id="997935" ref_url="https://bugzilla.suse.com/997935" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204/" source="CVE"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-15594" ref_url="https://www.suse.com/security/cve/CVE-2018-15594/" source="CVE"/>
		<reference ref_id="CVE-2018-5814" ref_url="https://www.suse.com/security/cve/CVE-2018-5814/" source="CVE"/>
		<reference ref_id="CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-3882" ref_url="https://www.suse.com/security/cve/CVE-2019-3882/" source="CVE"/>
		<reference ref_id="CVE-2019-9503" ref_url="https://www.suse.com/security/cve/CVE-2019-9503/" source="CVE"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel for Azure was updated to 4.4.178 to receive various security and bugfixes.

Four new speculative execution issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

This kernel update contains software mitigations, utilizing CPU microcode updates shipped in parallel.

For more information on this set of information leaks, check out https://www.suse.com/support/kb/doc/?id=7023736

The following security bugs were fixed:

- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).
- CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO ioctl (bsc#1096728)
- CVE-2018-10853: A flaw was found in the way the KVM hypervisor emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest (bnc#1097104).
- CVE-2018-15594: arch/x86/kernel/paravirt.c kernel mishandled certain indirect calls, which made it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests (bnc#1105348).
- CVE-2019-9503: A brcmfmac frame validation bypass was fixed (bnc#1132828).
- CVE-2019-3882: A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). (bnc#1131416 bnc#1131427).
- CVE-2017-5753: Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).
  This update disables IBRS on Skylake systems (the retpoline methods stay effective).
  Additional performance improvements on the retpoline support were done by tuning compiler defaults.

The following non-security bugs were fixed:

- 9p/net: fix memory leak in p9_client_create (bnc#1012382).
- 9p: use inode-&gt;i_lock to protect i_size_write() under 32-bit (bnc#1012382).
- acpi: acpi_pad: Do not launch acpi_pad threads on idle cpus (bsc#1113399).
- acpi / bus: Only call dmi_check_system() on X86 (git-fixes).
- acpi / button: make module loadable when booted in non-ACPI mode (bsc#1051510).
- acpi / device_sysfs: Avoid OF modalias creation for removed device (bnc#1012382).
- Add hlist_add_tail_rcu() (Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net) (bnc#1012382).
- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bnc#1012382).
- alsa: compress: add support for 32bit calls in a 64bit kernel (bnc#1012382).
- alsa: compress: prevent potential divide by zero bugs (bnc#1012382).
- alsa: hda - Enforces runtime_resume after S3 and S4 for each codec (bnc#1012382).
- alsa: hda - Record the current power state before suspend/resume calls (bnc#1012382).
- alsa: pcm: Do not suspend stream in unrecoverable PCM state (bnc#1012382).
- alsa: pcm: Fix possible OOB access in PCM oss plugins (bnc#1012382).
- alsa: rawmidi: Fix potential Spectre v1 vulnerability (bnc#1012382).
- alsa: seq: oss: Fix Spectre v1 vulnerability (bnc#1012382).
- applicom: Fix potential Spectre v1 vulnerabilities (bnc#1012382).
- arc: fix __ffs return value to avoid build warnings (bnc#1012382).
- arc: uacces: remove lp_start, lp_end from clobber list (bnc#1012382).
- arcv2: Enable unaligned access in early ASM code (bnc#1012382).
- arm64: fix COMPAT_SHMLBA definition for large pages (bnc#1012382).
- arm64: Fix NUMA build error when !CONFIG_ACPI (fate#319981,  git-fixes).
- arm64: Fix NUMA build error when !CONFIG_ACPI (git-fixes).
- arm64: hide __efistub_ aliases from kallsyms (bnc#1012382).
- arm64: kconfig: drop CONFIG_RTC_LIB dependency (bnc#1012382).
- arm64/kernel: fix incorrect EL0 check in inv_entry macro (bnc#1012382).
- arm64: mm: Add trace_irqflags annotations to do_debug_exception() (bnc#1012382).
- arm64: Relax GIC version check during early boot (bnc#1012382).
- arm64: support keyctl() system call in 32-bit mode (bnc#1012382).
- arm64: traps: disable irq in die() (bnc#1012382).
- arm: 8458/1: bL_switcher: add GIC dependency (bnc#1012382).
- arm: 8494/1: mm: Enable PXN when running non-LPAE kernel on LPAE processor (bnc#1012382).
- arm: 8510/1: rework ARM_CPU_SUSPEND dependencies (bnc#1012382).
- arm: 8824/1: fix a migrating irq bug when hotplug cpu (bnc#1012382).
- arm: dts: exynos: Add minimal clkout parameters to Exynos3250 PMU (bnc#1012382).
- arm: dts: exynos: Do not ignore real-world fuse values for thermal zone 0 on Exynos5420 (bnc#1012382).
- arm: imx6q: cpuidle: fix bug that CPU might not wake up at expected time (bnc#1012382).
- arm: OMAP2+: Variable 'reg' in function omap4_dsi_mux_pads() could be uninitialized (bnc#1012382).
- arm: pxa: ssp: unneeded to free devm_ allocated data (bnc#1012382).
- arm: s3c24xx: Fix boolean expressions in osiris_dvs_notify (bnc#1012382).
- ASoC: dapm: change snprintf to scnprintf for possible overflow (bnc#1012382).
- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bnc#1012382).
- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bnc#1012382).
- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bnc#1012382).
- ASoC: topology: free created components in tplg load error (bnc#1012382).
- assoc_array: Fix shortcut creation (bnc#1012382).
- ath10k: avoid possible string overflow (bnc#1012382).
- ath9k_htc: Add a sanity check in ath9k_htc_ampdu_action() (bsc#1087092).
- atm: he: fix sign-extension overflow on large shift (bnc#1012382).
- autofs: drop dentry reference only when it is never used (bnc#1012382).
- autofs: fix error return in autofs_fill_super() (bnc#1012382).
- batman-adv: Avoid endless loop in bat-on-bat netdevice check (git-fixes).
- batman-adv: Fix lockdep annotation of batadv_tlv_container_remove (git-fixes).
- batman-adv: fix uninit-value in batadv_interface_tx() (bnc#1012382).
- batman-adv: Only put gw_node list reference when removed (git-fixes).
- batman-adv: Only put orig_node_vlan list reference when removed (git-fixes).
- bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt (bnc#1012382).
- bnxt_en: Drop oversize TX packets to prevent errors (bnc#1012382).
- btrfs: Avoid possible qgroup_rsv_size overflow in btrfs_calculate_inode_block_rsv_size (git-fixes).
- btrfs: Fix bound checking in qgroup_trace_new_subtree_blocks (pending fix for bsc#1063638).
- btrfs: fix corruption reading shared and compressed extents after hole punching (bnc#1012382).
- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).
- btrfs: qgroup: Do not trace subtree if we're dropping reloc tree (bsc#1063638).
- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).
- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).
- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).
- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).
- btrfs: qgroup: Only trace data extents in leaves if we're relocating data block group (bsc#1063638).
- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).
- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).
- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).
- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).
- btrfs: raid56: properly unmap parity page in finish_parity_scrub() (bnc#1012382).
- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).
- btrfs: remove WARN_ON in log_dir_items (bnc#1012382).
- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1129770).
- cfg80211: extend range deviation for DMG (bnc#1012382).
- cfg80211: size various nl80211 messages correctly (bnc#1012382).
- cifs: fix computation for MAX_SMB2_HDR_SIZE (bnc#1012382).
- cifs: fix POSIX lock leak and invalid ptr deref (bsc#1114542).
- cifs: Fix read after write for files with read caching (bnc#1012382).
- clk: ingenic: Fix round_rate misbehaving with non-integer dividers (bnc#1012382).
- clocksource/drivers/exynos_mct: Clear timer interrupt when shutdown (bnc#1012382).
- clocksource/drivers/exynos_mct: Move one-shot check from tick clear to ISR (bnc#1012382).
- cls_bpf: reset class and reuse major in da (git-fixes).
- coresight: coresight_unregister() function cleanup (bnc#1012382).
- coresight: 'DEVICE_ATTR_RO' should defined as static (bnc#1012382).
- coresight: etm4x: Check every parameter used by dma_xx_coherent (bnc#1012382).
- coresight: fixing lockdep error (bnc#1012382).
- coresight: release reference taken by 'bus_find_device()' (bnc#1012382).
- coresight: remove csdev's link from topology (bnc#1012382).
- coresight: removing bind/unbind options from sysfs (bnc#1012382).
- cpufreq: pxa2xx: remove incorrect __init annotation (bnc#1012382).
- cpufreq: tegra124: add missing of_node_put() (bnc#1012382).
- cpufreq: Use struct kobj_attribute instead of struct global_attr (bnc#1012382).
- cpu/hotplug: Handle unbalanced hotplug enable/disable (bnc#1012382).
- cpu/speculation: Add 'mitigations=' cmdline option (bsc#1112178).
- crypto: ahash - fix another early termination in hash walk (bnc#1012382).
- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bnc#1012382).
- crypto: caam - fixed handling of sg list (bnc#1012382).
- crypto: pcbc - remove bogus memcpy()s with src == dest (bnc#1012382).
- crypto: qat - remove unused and redundant pointer vf_info (bsc#1085539).
- crypto: tgr192 - fix unaligned memory access (bsc#1129770).
- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1129770).
- dccp: do not use ipv6 header for ipv4 flow (bnc#1012382).
- Disable kgdboc failed by echo space to /sys/module/kgdboc/parameters/kgdboc (bnc#1012382).
- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bnc#1012382).
- dmaengine: dmatest: Abort test in case of mapping error (bnc#1012382).
- dmaengine: usb-dmac: Make DMAC system sleep callbacks explicit (bnc#1012382).
- dm: disable DISCARD if the underlying storage no longer supports it (bsc#1114638).
- dm: fix to_sector() for 32bit (bnc#1012382).
- drivers: hv: vmbus: Fix bugs in rescind handling (bsc#1130567).
- drivers: hv: vmbus: Fix ring buffer signaling (bsc#1118506).
- drivers: hv: vmbus: Fix the offer_in_progress in vmbus_process_offer() (bsc#1130567).
- drivers: hv: vmbus: Offload the handling of channels to two workqueues (bsc#1130567).
- drivers: hv: vmbus: Offload the handling of channels to two workqueues (bsc#1130567).
- drivers: hv: vmbus: Reset the channel callback in vmbus_onoffer_rescind() (bsc#1130567).
- drm/msm: Unblock writer if reader closes file (bnc#1012382).
- drm/vmwgfx: Do not double-free the mode stored in par-&gt;set_mode (bsc#1106929)
- efi: stub: define DISABLE_BRANCH_PROFILING for all architectures (bnc#1012382).
- ext2: Fix underflow in ext2_max_size() (bnc#1012382).
- ext4: Avoid panic during forced reboot (bsc#1126356).
- ext4: brelse all indirect buffer in ext4_ind_remove_space() (bnc#1012382).
- ext4: fix data corruption caused by unaligned direct AIO (bnc#1012382).
- ext4: fix NULL pointer dereference while journal is aborted (bnc#1012382).
- extcon: usb-gpio: Do not miss event during suspend/resume (bnc#1012382).
- firmware: dmi: Optimize dmi_matches (git-fixes).
- floppy: check_events callback should not return a negative number (git-fixes).
- flow_dissector: Check for IP fragmentation even if not using IPv4 address (git-fixes).
- fs/9p: use fscache mutex rather than spinlock (bnc#1012382).
- fs/nfs: Fix nfs_parse_devname to not modify it's argument (git-fixes).
- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bnc#1012382).
- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (git-fixes).
- fuse: fix possibly missed wake-up after abort (git-fixes).
- futex: Ensure that futex address is aligned in handle_futex_death() (bnc#1012382).
- futex,rt_mutex: Fix rt_mutex_cleanup_proxy_lock() (git-fixes).
- futex,rt_mutex: Restructure rt_mutex_finish_proxy_lock() (bnc#1012382).
- gpio: adnp: Fix testing wrong value in adnp_gpio_direction_input (bnc#1012382).
- gpio: vf610: Mask all GPIO interrupts (bnc#1012382).
- gro_cells: make sure device is up in gro_cells_receive() (bnc#1012382).
- hid-sensor-hub.c: fix wrong do_div() usage (bnc#1012382).
- hpet: Fix missing '=' character in the __setup() code of hpet_mmap_enable (bsc#1129770).
- hugetlbfs: fix races and page leaks during migration (bnc#1012382).
- hv_netvsc: Fix napi reschedule while receive completion is busy (bsc#1118506).
- hv_netvsc: fix race in napi poll when rescheduling (bsc#1118506).
- hv_netvsc: Fix the return status in RX path (bsc#1118506).
- hv_netvsc: use napi_schedule_irqoff (bsc#1118506).
- hv: v4.12 API for hyperv-iommu (bsc#1122822).
- hv: v4.12 API for hyperv-iommu (fate#327171, bsc#1122822).
- i2c: cadence: Fix the hold bit setting (bnc#1012382).
- i2c: tegra: fix maximum transfer size (bnc#1012382).
- IB/{hfi1, qib}: Fix WC.byte_len calculation for UD_SEND_WITH_IMM (bnc#1012382).
- ibmvnic: Enable GRO (bsc#1132227).
- ibmvnic: Fix completion structure initialization (bsc#1131659).
- ibmvnic: Fix netdev feature clobbering during a reset (bsc#1132227).
- Include ACPI button driver in base kernel (bsc#1062056).
- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bnc#1012382).
- input: matrix_keypad - use flush_delayed_work() (bnc#1012382).
- input: st-keyscan - fix potential zalloc NULL dereference (bnc#1012382).
- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bnc#1012382).
- intel_th: Do not reference unassigned outputs (bnc#1012382).
- intel_th: gth: Fix an off-by-one in output unassigning (git-fixes).
- iommu/amd: Fix NULL dereference bug in match_hid_uid (bsc#1130345).
- iommu/amd: fix sg-&gt;dma_address for sg-&gt;offset bigger than PAGE_SIZE (bsc#1130346).
- iommu/amd: Reserve exclusion range in iova-domain (bsc#1130425).
- iommu/amd: Set exclusion range correctly (bsc#1130425).
- iommu: Do not print warning when IOMMU driver only supports unmanaged domains (bsc#1130130).
- iommu/hyper-v: Add Hyper-V stub IOMMU driver (bsc#1122822).
- iommu/hyper-v: Add Hyper-V stub IOMMU driver (fate#327171,  bsc#1122822).
- iommu/vt-d: Check capability before disabling protected memory (bsc#1130347).
- ip6: fix PMTU discovery when using /127 subnets (git-fixes).
- ip6mr: Do not call __IP6_INC_STATS() from preemptible context (bnc#1012382).
- ip_tunnel: fix ip tunnel lookup in collect_md mode (git-fixes).
- ipvlan: disallow userns cap_net_admin to change global mode/flags (bnc#1012382).
- ipvs: Fix signed integer overflow when setsockopt timeout (bnc#1012382).
- irqchip/mmp: Only touch the PJ4 IRQ &amp; FIQ bits on enable/disable (bnc#1012382).
- iscsi_ibft: Fix missing break in switch statement (bnc#1012382).
- isdn: avm: Fix string plus integer warning from Clang (bnc#1012382).
- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bnc#1012382).
- isdn: isdn_tty: fix build warning of strncpy (bnc#1012382).
- It's wrong to add len to sector_nr in raid10 reshape twice (bnc#1012382).
- iwlwifi: dbg: do not crash if the firmware crashes in the middle of a debug dump (bsc#1119086).
- jbd2: clear dirty flag when revoking a buffer from an older transaction (bnc#1012382).
- jbd2: fix compile warning when using JBUFFER_TRACE (bnc#1012382).
- kabi fixup gendisk disk_devt revert (bsc#1020989).
- kbuild: setlocalversion: print error to STDERR (bnc#1012382).
- kernel/sysctl.c: add missing range check in do_proc_dointvec_minmax_conv (bnc#1012382).
- keys: allow reaching the keys quotas exactly (bnc#1012382).
- keys: always initialize keyring_index_key::desc_len (bnc#1012382).
- keys: restrict /proc/keys by credentials at open time (bnc#1012382).
- keys: user: Align the payload buffer (bnc#1012382).
- kvm: Call kvm_arch_memslots_updated() before updating memslots (bsc#1132634).
- kvm: nSVM: clear events pending from svm_complete_interrupts() when exiting to L1 (bnc#1012382).
- kvm: nVMX: Apply addr size mask to effective address for VMX instructions (bsc#1132635).
- kvm: nVMX: Ignore limit checks on VMX instructions using flat segments (bnc#1012382).
- kvm: nVMX: Sign extend displacements of VMX instr's mem operands (bnc#1012382).
- kvm: Reject device ioctls from processes other than the VM's creator (bnc#1012382).
- kvm: VMX: Compare only a single byte for VMCS' 'launched' in vCPU-run (bsc#1132636).
- kvm: VMX: Zero out *all* general purpose registers after VM-Exit (bsc#1132637).
- kvm: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hosts (bsc#1132534).
- kvm: X86: Fix residual mmio emulation request to userspace (bnc#1012382).
- kvm: x86/mmu: Do not cache MMIO accesses while memslots are in flux (bsc#1132638).
- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).
- leds: lp5523: fix a missing check of return value of lp55xx_read (bnc#1012382).
- libertas: call into generic suspend code before turning off power (bsc#1106110).
- libertas: fix suspend and resume for SDIO connected cards (bsc#1106110).
- lib/int_sqrt: optimize small argument (bnc#1012382).
- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1131857).
- locking/lockdep: Add debug_locks check in __lock_downgrade() (bnc#1012382).
- locking/static_keys: Improve uninitialized key warning (bsc#1106913).
- m68k: Add -ffreestanding to CFLAGS (bnc#1012382).
- mac80211: do not initiate TDLS connection if station is not associated to AP (bnc#1012382).
- mac80211: fix miscounting of ttl-dropped frames (bnc#1012382).
- mac80211: fix 'warning: target metric may used uninitialized' (bnc#1012382).
- mac80211_hwsim: propagate genlmsg_reply return code (bnc#1012382).
- mac8390: Fix mmio access size probe (bnc#1012382).
- md: Fix failed allocation of md_register_thread (bnc#1012382).
- mdio_bus: Fix use-after-free on device_register fails (bnc#1012382 git-fixes).
- md/raid1: do not clear bitmap bits on interrupted recovery (git-fixes).
- media: cx88: Get rid of spurious call to cx8800_start_vbi_dma() (bsc#1100132).
- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bnc#1012382).
- media: uvcvideo: Fix 'type' check leading to overflow (bnc#1012382).
- media: uvcvideo: Fix uvc_alloc_entity() allocation alignment (bsc#1119086).
- media: v4l2-ctrls.c/uvc: zero v4l2_event (bnc#1012382).
- media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused() (bnc#1012382).
- media: vivid: potential integer overflow in vidioc_g_edid() (bsc#11001132).
- mfd: ab8500-core: Return zero in get_register_interruptible() (bnc#1012382).
- mfd: db8500-prcmu: Fix some section annotations (bnc#1012382).
- mfd: mc13xxx: Fix a missing check of a register-read failure (bnc#1012382).
- mfd: qcom_rpm: write fw_version to CTRL_REG (bnc#1012382).
- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bnc#1012382).
- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bnc#1012382).
- mfd: wm5110: Add missing ASRC rate register (bnc#1012382).
- mISDN: hfcpci: Test both vendor &amp; device ID for Digium HFC4S (bnc#1012382).
- missing barriers in some of unix_sock -&gt;addr and -&gt;path accesses (bnc#1012382).
- mmc: bcm2835: reset host on timeout (bsc#1070872).
- mmc: block: Allow more than 8 partitions per card (bnc#1012382).
- mmc: core: fix using wrong io voltage if mmc_select_hs200 fails (bnc#1012382).
- mmc: core: shut up 'voltage-ranges unspecified' pr_info() (bnc#1012382).
- mmc: debugfs: Add a restriction to mmc debugfs clock setting (bnc#1012382).
- mmc: make MAN_BKOPS_EN message a debug (bnc#1012382).
- mmc: mmc: fix switch timeout issue caused by jiffies precision (bnc#1012382).
- mmc: pwrseq_simple: Make reset-gpios optional to match doc (bnc#1012382).
- mmc: pxamci: fix enum type confusion (bnc#1012382).
- mmc: sanitize 'bus width' in debug output (bnc#1012382).
- mmc: spi: Fix card detection during probe (bnc#1012382).
- mmc: tmio_mmc_core: do not claim spurious interrupts (bnc#1012382).
- mm/debug.c: fix __dump_page when mapping-&gt;host is not set (bsc#1131934).
- mm, memory_hotplug: fix off-by-one in is_pageblock_removable (git-fixes).
- mm, memory_hotplug: is_mem_section_removable do not pass the end of a zone (bnc#1012382).
- mm, memory_hotplug: test_pages_in_a_zone do not pass the end of zone (bnc#1012382).
- mm: move is_pageblock_removable_nolock() to mm/memory_hotplug.c (git-fixes prerequisity).
- mm/page_isolation.c: fix a wrong flag in set_migratetype_isolate() (bsc#1131935)
- mm/rmap: replace BUG_ON(anon_vma-&gt;degree) with VM_WARN_ON (bnc#1012382).
- mm/vmalloc: fix size check for remap_vmalloc_range_partial() (bnc#1012382).
- move power_up_on_resume flag to end of structure for kABI (bsc#1106110).
- mwifiex: pcie: tighten a check in mwifiex_pcie_process_event_ready() (bsc#1100132).
- ncpfs: fix build warning of strncpy (bnc#1012382).
- net: add description for len argument of dev_get_phys_port_name (git-fixes).
- net: Add __icmp_send helper (bnc#1012382).
- net: altera_tse: fix connect_local_phy error path (bnc#1012382).
- net: altera_tse: fix msgdma_tx_completion on non-zero fill_level case (bnc#1012382).
- net: avoid use IPCB in cipso_v4_error (bnc#1012382).
- net: diag: support v4mapped sockets in inet_diag_find_one_icsk() (bnc#1012382).
- net: do not decrement kobj reference count on init failure (git-fixes).
- net: dsa: mv88e6xxx: Fix u64 statistics (bnc#1012382).
- net: ena: fix race between link up and device initalization (bsc#1129278).
- net: ena: update driver version from 2.0.2 to 2.0.3 (bsc#1129278).
- netfilter: ipt_CLUSTERIP: fix use-after-free of proc entry (git-fixes).
- netfilter: nf_conntrack_tcp: Fix stack out of bounds when parsing TCP options (bnc#1012382).
- netfilter: nfnetlink_acct: validate NFACCT_FILTER parameters (bnc#1012382).
- netfilter: nfnetlink_log: just returns error for unknown command (bnc#1012382).
- netfilter: nfnetlink: use original skbuff when acking batches (git-fixes).
- netfilter: x_tables: enforce nul-terminated table name from getsockopt GET_ENTRIES (bnc#1012382).
- net: hns: Fix use after free identified by SLUB debug (bnc#1012382).
- net: hns: Fix wrong read accesses via Clause 45 MDIO protocol (bnc#1012382).
- net: hsr: fix memory leak in hsr_dev_finalize() (bnc#1012382).
- net/hsr: fix possible crash in add_timer() (bnc#1012382).
- netlabel: fix out-of-bounds memory accesses (bnc#1012382).
- net/mlx4_en: Force CHECKSUM_NONE for short ethernet frames (bnc#1012382).
- net: mv643xx_eth: disable clk on error path in mv643xx_eth_shared_probe() (bnc#1012382).
- net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails (bnc#1012382).
- net/packet: fix 4gb buffer limit due to overflow check (bnc#1012382).
- net/packet: Set __GFP_NOWARN upon allocation in alloc_pg_vec (bnc#1012382).
- net: phy: Micrel KSZ8061: link failure after cable connect (bnc#1012382).
- net: rose: fix a possible stack overflow (bnc#1012382).
- net: Set rtm_table to RT_TABLE_COMPAT for ipv6 for tables &gt; 255 (bnc#1012382).
- net: set static variable an initial value in atl2_probe() (bnc#1012382).
- net: sit: fix UBSAN Undefined behaviour in check_6rd (bnc#1012382).
- net: stmmac: dwmac-rk: fix error handling in rk_gmac_powerup() (bnc#1012382).
- net-sysfs: call dev_hold if kobject_init_and_add success (git-fixes).
- net-sysfs: Fix mem leak in netdev_register_kobject (bnc#1012382).
- net: systemport: Fix reception of BPDUs (bnc#1012382).
- net: tcp_memcontrol: properly detect ancestor socket pressure (git-fixes).
- net/x25: fix a race in x25_bind() (bnc#1012382).
- net/x25: fix use-after-free in x25_device_event() (bnc#1012382).
- net/x25: reset state in x25_connect() (bnc#1012382).
- NFC: nci: memory leak in nci_core_conn_create() (git-fixes).
- nfs41: pop some layoutget errors to application (bnc#1012382).
- nfsd: fix memory corruption caused by readdir (bsc#1127445).
- nfsd: fix wrong check in write_v4_end_grace() (git-fixes).
- nfs: Do not recoalesce on error in nfs_pageio_complete_mirror() (git-fixes).
- nfs: Fix an I/O request leakage in nfs_do_recoalesce (git-fixes).
- nfs: Fix dentry revalidation on NFSv4 lookup (bsc#1132618).
- nfs: fix mount/umount race in nlmclnt (git-fixes).
- nfs: Fix NULL pointer dereference of dev_name (bnc#1012382).
- nfsv4.x: always serialize open/close operations (bsc#1114893).
- numa: change get_mempolicy() to use nr_node_ids instead of MAX_NUMNODES (bnc#1012382).
- packets: Always register packet sk in the same order (bnc#1012382).
- parport_pc: fix find_superio io compare code, should use equal test (bnc#1012382).
- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).
- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792  vcpus (fate#327171, bsc#1122822).
- perf auxtrace: Define auxtrace record alignment (bnc#1012382).
- perf bench: Copy kernel files needed to build mem{cpy,set} x86_64 benchmarks (bnc#1012382).
- perf intel-pt: Fix CYC timestamp calculation after OVF (bnc#1012382).
- perf intel-pt: Fix overlap calculation for padding (bnc#1012382).
- perf intel-pt: Fix TSC slip (bnc#1012382).
- perf/ring_buffer: Refuse to begin AUX transaction after rb-&gt;aux_mmap_count drops (bnc#1012382).
- perf symbols: Filter out hidden symbols from labels (bnc#1012382).
- perf: Synchronously free aux pages in case of allocation failure (bnc#1012382).
- perf tools: Handle TOPOLOGY headers with no CPU (bnc#1012382).
- perf/x86/amd: Add event map for AMD Family 17h (bsc#1114648).
- phonet: fix building with clang (bnc#1012382).
- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bnc#1012382).
- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bnc#1012382).
- pm / Hibernate: Call flush_icache_range() on pages restored in-place (bnc#1012382).
- pm / wakeup: Rework wakeup source timer cancellation (bnc#1012382).
- powerpc/32: Clear on-stack exception marker upon exception return (bnc#1012382).
- powerpc/64: Call setup_barrier_nospec() from setup_arch() (bsc#1131107).
- powerpc/64: Disable the speculation barrier from the command line (bsc#1131107).
- powerpc/64: Make stf barrier PPC_BOOK3S_64 specific (bsc#1131107).
- powerpc/64s: Add new security feature flags for count cache flush (bsc#1131107).
- powerpc/64s: Add support for software count cache flush (bsc#1131107).
- powerpc/83xx: Also save/restore SPRG4-7 during suspend (bnc#1012382).
- powerpc: Always initialize input array when calling epapr_hypercall() (bnc#1012382).
- powerpc/asm: Add a patch_site macro &amp; helpers for patching instructions (bsc#1131107).
- powerpc/fsl: Fix spectre_v2 mitigations reporting (bsc#1131107).
- powerpc/mm/hash: Handle mmap_min_addr correctly in get_unmapped_area topdown search (bsc#1131900).
- powerpc/numa: document topology_updates_enabled, disable by default (bsc#1133584).
- powerpc/numa: improve control of topology updates (bsc#1133584).
- powerpc/perf: Fix unit_sel/cache_sel checks (bsc#1053043).
- powerpc/perf: Remove l2 bus events from HW cache event array (bsc#1053043).
- powerpc/perf: Update raw-event code encoding comment for power8 (bsc#1053043, git-fixes).
- powerpc/powernv/cpuidle: Init all present cpus for deep states (bsc#1066223).
- powerpc/powernv: Make opal log only readable by root (bnc#1012382).
- powerpc/powernv: Query firmware for count cache flush settings (bsc#1131107).
- powerpc/pseries/mce: Fix misleading print for TLB mutlihit (bsc#1094244, git-fixes).
- powerpc/pseries: Query hypervisor for count cache flush settings (bsc#1131107).
- powerpc/security: Fix spectre_v2 reporting (bsc#1131107).
- powerpc/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- powerpc/tm: Add commandline option to disable hardware transactional memory (bsc#1118338).
- powerpc/tm: Add TM Unavailable Exception (bsc#1118338).
- powerpc/tm: Flip the HTM switch default to disabled (bsc#1125580).
- powerpc/vdso32: fix CLOCK_MONOTONIC on PPC64 (bsc#1131587).
- powerpc/vdso64: Fix CLOCK_MONOTONIC inconsistencies across Y2038 (bsc#1131587).
- powerpc/wii: properly disable use of BATs when requested (bnc#1012382).
- ravb: Decrease TxFIFO depth of Q3 and Q2 to one (bnc#1012382).
- rcu: Do RCU GP kthread self-wakeup from softirq and interrupt (bnc#1012382).
- rdma/core: Do not expose unsupported counters (bsc#994770).
- rdma/srp: Rework SCSI device reset handling (bnc#1012382).
- Refresh patches.fixes/0001-net-mlx4-Fix-endianness-issue-in-qp-context-params.patch. (bsc#1132619)
- regulator: s2mpa01: Fix step values for some LDOs (bnc#1012382).
- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bnc#1012382).
- Revert 'bridge: do not add port to router list when receives query with source 0.0.0.0' (bnc#1012382).
- Revert 'mmc: block: do not use parameter prefix if built as module' (bnc#1012382).
- Revert 'scsi, block: fix duplicate bdi name registration crashes' (bsc#1020989).
- Revert 'USB: core: only clean up what we allocated' (bnc#1012382).
- route: set the deleted fnhe fnhe_daddr to 0 in ip_del_fnhe to fix a race (bnc#1012382).
- rsi: fix a dereference on adapter before it has been null checked (bsc#1085539).
- rtc: Fix overflow when converting time64_t to rtc_time (bnc#1012382).
- rtl8xxxu: Fix missing break in switch (bsc#1120902).
- s390/dasd: fix panic for failed online processing (bsc#1132589).
- s390/dasd: fix using offset into zero size array error (bnc#1012382).
- s390: Prevent hotplug rwsem recursion (bsc#1131980).
- s390/qeth: fix use-after-free in error path (bnc#1012382).
- s390/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- s390/virtio: handle find on invalid queue gracefully (bnc#1012382).
- sched/core: Fix cpu.max vs. cpuhotplug deadlock (bsc#1106913).
- sched/smt: Expose sched_smt_present static key (bsc#1106913).
- sched/smt: Make sched_smt_present track topology (bsc#1106913).
- scsi: csiostor: fix NULL pointer dereference in csio_vport_set_state() (bnc#1012382).
- scsi: isci: initialize shost fully before calling scsi_add_host() (bnc#1012382).
- scsi: libfc: free skb when receiving invalid flogi resp (bnc#1012382).
- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bnc#1012382).
- scsi: libsas: Fix rphy phy_identifier for PHYs with end devices attached (bnc#1012382).
- scsi: qla4xxx: check return code of qla4xxx_copy_from_fwddb_param (bnc#1012382).
- scsi: sd: Fix a race between closing an sd device and sd I/O (bnc#1012382).
- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().
- scsi: storvsc: Fix a race in sub-channel creation that can  cause panic (fate#323887).
- scsi: storvsc: Reduce default ring buffer size to 128 Kbytes ().
- scsi: storvsc: Reduce default ring buffer size to 128 Kbytes  (fate#323887).
- scsi: target/iscsi: Avoid iscsit_release_commands_from_conn() deadlock (bnc#1012382).
- scsi: virtio_scsi: do not send sc payload with tmfs (bnc#1012382).
- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bnc#1012382).
- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bnc#1012382).
- sctp: fix the transports round robin issue when init is retransmitted (git-fixes).
- sctp: get sctphdr by offset in sctp_compute_cksum (bnc#1012382).
- serial: 8250_pci: Fix number of ports for ACCES serial cards (bnc#1012382).
- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bnc#1012382).
- serial: fsl_lpuart: fix maximum acceptable baud rate with over-sampling (bnc#1012382).
- serial: max310x: Fix to avoid potential NULL pointer dereference (bnc#1012382).
- serial: sh-sci: Fix setting SCSCR_TIE while transferring data (bnc#1012382).
- serial: sprd: adjust TIMEOUT to a big value (bnc#1012382).
- serial: sprd: clear timeout interrupt only rather than all interrupts (bnc#1012382).
- sit: check if IPv6 enabled before calling ip6_err_gen_icmpv6_unreach() (bnc#1012382).
- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bnc#1012382).
- sockfs: getxattr: Fail with -EOPNOTSUPP for invalid attribute names (bnc#1012382).
- staging: ashmem: Add missing include (bnc#1012382).
- staging: ashmem: Avoid deadlock with mmap/shrink (bnc#1012382).
- staging: goldfish: audio: fix compiliation on arm (bnc#1012382).
- staging: ion: Set minimum carveout heap allocation order to PAGE_SHIFT (bnc#1012382).
- staging: lustre: fix buffer overflow of string buffer (bnc#1012382).
- staging: rtl8188eu: avoid a null dereference on pmlmepriv (bsc#1085539).
- staging: vt6655: Fix interrupt race condition on device start up (bnc#1012382).
- staging: vt6655: Remove vif check from vnt_interrupt (bnc#1012382).
- stm class: Do not leak the chrdev in error path (bnc#1012382).
- stm class: Fix an endless loop in channel allocation (bnc#1012382).
- stm class: Fix a race in unlinking (bnc#1012382).
- stm class: Fix link list locking (bnc#1012382).
- stm class: Fix locking in unbinding policy path (bnc#1012382).
- stm class: Fix stm device initialization order (bnc#1012382).
- stm class: Fix unbalanced module/device refcounting (bnc#1012382).
- stm class: Fix unlocking braino in the error path (bnc#1012382).
- stm class: Guard output assignment against concurrency (bnc#1012382).
- stm class: Hide STM-specific options if STM is disabled (bnc#1012382).
- stm class: Prevent division by zero (bnc#1012382).
- stm class: Prevent user-controllable allocations (bnc#1012382).
- stm class: Support devices with multiple instances (bnc#1012382).
- stmmac: copy unicast mac address to MAC registers (bnc#1012382).
- stop_machine: Provide stop_machine_cpuslocked() (bsc#1131980).
- sunrpc: do not mark uninitialised items as VALID (bsc#1130737).
- sunrpc: init xdr_stream for zero iov_len, page_len (bsc#11303356).
- svm/avic: Fix invalidate logical APIC id entry (bsc#1132727).
- svm: Fix AVIC DFR and LDR handling (bsc#1130343).
- svm: Fix improper check when deactivate AVIC (bsc#1130344).
- tcp/dccp: drop SYN packets if accept queue is full (bnc#1012382).
- tcp/dccp: remove reqsk_put() from inet_child_forget() (git-fixes).
- tcp: do not use ipv6 header for ipv4 flow (bnc#1012382).
- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).
- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bnc#1012382).
- time: Introduce jiffies64_to_nsecs() (bsc#1113399).
- tmpfs: fix link accounting when a tmpfile is linked in (bnc#1012382).
- tmpfs: fix uninitialized return value in shmem_link (bnc#1012382).
- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1020645).
- tpm: Fix the type of the return value in calc_tpm2_event_size() (bsc#1020645, git-fixes).
- tpm: tpm-interface.c drop unused macros (bsc#1020645).
- tty: atmel_serial: fix a potential NULL pointer dereference (bnc#1012382).
- udf: Fix crash on IO error during truncate (bnc#1012382).
- Update patches.fixes/SUNRPC-init-xdr_stream-for-zero-iov_len-page_len.patch (bsc#1130356).
- usb: core: only clean up what we allocated (bnc#1012382).
- usb: dwc2: Fix DMA alignment to start at allocated boundary (bsc#1100132).
- usb: dwc2: fix the incorrect bitmaps for the ports of multi_tt hub (bsc#1100132).
- usb: dwc3: gadget: Fix suspend/resume during device mode (bnc#1012382).
- usb: dwc3: gadget: Fix the uninitialized link_state when udc starts (bnc#1012382).
- usb: gadget: Add the gserial port checking in gs_start_tx() (bnc#1012382).
- usb: gadget: composite: fix dereference after null check coverify warning (bnc#1012382).
- usb: gadget: configfs: add mutex lock before unregister gadget (bnc#1012382).
- usb: gadget: Potential NULL dereference on allocation error (bnc#1012382).
- usb: gadget: rndis: free response queue during REMOTE_NDIS_RESET_MSG (bnc#1012382).
- usb: renesas_usbhs: gadget: fix unused-but-set-variable warning (bnc#1012382).
- usb: serial: cp210x: add ID for Ingenico 3070 (bnc#1012382).
- usb: serial: cp210x: add new device id (bnc#1012382).
- usb: serial: cypress_m8: fix interrupt-out transfer length (bsc#1119086).
- usb: serial: ftdi_sio: add additional NovaTech products (bnc#1012382).
- usb: serial: ftdi_sio: add ID for Hjelmslund Electronics USB485 (bnc#1012382).
- usb: serial: mos7720: fix mos_parport refcount imbalance on error path (bsc#1129770).
- usb: serial: option: add Olicard 600 (bnc#1012382).
- usb: serial: option: add Telit ME910 ECM composition (bnc#1012382).
- usb: serial: option: set driver_info for SIM5218 and compatibles (bsc#1129770).
- video: fbdev: Set pixclock = 0 in goldfishfb (bnc#1012382).
- vti4: Fix a ipip packet processing bug in 'IPCOMP' virtual tunnel (bnc#1012382).
- vxlan: Do not call gro_cells_destroy() before device is unregistered (bnc#1012382).
- vxlan: Fix GRO cells race condition between receive and link delete (bnc#1012382).
- vxlan: test dev-&gt;flags &amp; IFF_UP before calling gro_cells_receive() (bnc#1012382).
- wlcore: Fix the return value in case of error in 'wlcore_vendor_cmd_smart_config_start()' (bsc#1120902).
- x86_64: increase stack size for KASAN_EXTRA (bnc#1012382).
- x86/apic: Provide apic_ack_irq() (bsc#1122822).
- x86/apic: Provide apic_ack_irq() (fate#327171, bsc#1122822).
- x86/CPU/AMD: Set the CPB bit unconditionally on F17h (bnc#1012382).
- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).
- x86/Hyper-V: Set x2apic destination mode to physical when  x2apic is available (fate#327171, bsc#1122822).
- x86/kexec: Do not setup EFI info if EFI runtime is not enabled (bnc#1012382).
- x86/mce: Improve error message when kernel cannot recover, p2 (bsc#1114648).
- x86/smp: Enforce CONFIG_HOTPLUG_CPU when SMP=y (bnc#1012382).
- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1111331).
- x86/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- x86/uaccess: Do not leak the AC flag into __put_user() value evaluation (bsc#1114648).
- x86/vdso: Add VCLOCK_HVCLOCK vDSO clock read method (bsc#1133308).
- xen-netback: fix occasional leak of grant ref mappings under memory pressure (bnc#1012382).
- xfrm_user: fix info leak in build_aevent() (git-fixes).
- xfrm_user: fix info leak in xfrm_notify_sa() (git-fixes).
- xhci: Do not let USB3 ports stuck in polling state prevent suspend (bsc#1047487).
- xhci: Fix port resume done detection for SS ports with LPM enabled (bnc#1012382).
- xtensa: SMP: fix ccount_timer_shutdown (bnc#1012382).
- xtensa: SMP: fix secondary CPU initialization (bnc#1012382).
- xtensa: SMP: limit number of possible CPUs by NR_CPUS (bnc#1012382).
- xtensa: smp_lx200_defconfig: fix vectors clash (bnc#1012382).
- xtensa: SMP: mark each possible CPU as present (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020645">SUSE bug 1020645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020989">SUSE bug 1020989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023711">SUSE bug 1023711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031492">SUSE bug 1031492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053043">SUSE bug 1053043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062056">SUSE bug 1062056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063638">SUSE bug 1063638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070872">SUSE bug 1070872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078216">SUSE bug 1078216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085539">SUSE bug 1085539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086162">SUSE bug 1086162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087092">SUSE bug 1087092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087659">SUSE bug 1087659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093777">SUSE bug 1093777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094120">SUSE bug 1094120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096480">SUSE bug 1096480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096728">SUSE bug 1096728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097104">SUSE bug 1097104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100132">SUSE bug 1100132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105348">SUSE bug 1105348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106110">SUSE bug 1106110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106913">SUSE bug 1106913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106929">SUSE bug 1106929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107937">SUSE bug 1107937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112178">SUSE bug 1112178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113399">SUSE bug 1113399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114542">SUSE bug 1114542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114638">SUSE bug 1114638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114648">SUSE bug 1114648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114893">SUSE bug 1114893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118338">SUSE bug 1118338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118506">SUSE bug 1118506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119086">SUSE bug 1119086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120902">SUSE bug 1120902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122822">SUSE bug 1122822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125580">SUSE bug 1125580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126356">SUSE bug 1126356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127445">SUSE bug 1127445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129278">SUSE bug 1129278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129326">SUSE bug 1129326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129770">SUSE bug 1129770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130130">SUSE bug 1130130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130343">SUSE bug 1130343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130344">SUSE bug 1130344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130345">SUSE bug 1130345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130346">SUSE bug 1130346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130347">SUSE bug 1130347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130356">SUSE bug 1130356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130425">SUSE bug 1130425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130567">SUSE bug 1130567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130737">SUSE bug 1130737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131416">SUSE bug 1131416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131427">SUSE bug 1131427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131587">SUSE bug 1131587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131659">SUSE bug 1131659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131857">SUSE bug 1131857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131900">SUSE bug 1131900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131934">SUSE bug 1131934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131935">SUSE bug 1131935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131980">SUSE bug 1131980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132227">SUSE bug 1132227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132534">SUSE bug 1132534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132589">SUSE bug 1132589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132618">SUSE bug 1132618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132619">SUSE bug 1132619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132634">SUSE bug 1132634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132635">SUSE bug 1132635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132636">SUSE bug 1132636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132637">SUSE bug 1132637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132638">SUSE bug 1132638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132727">SUSE bug 1132727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132828">SUSE bug 1132828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133308">SUSE bug 1133308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133584">SUSE bug 1133584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994770">SUSE bug 994770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997935">SUSE bug 997935</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000204">CVE-2018-1000204 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10853">CVE-2018-10853 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15594/">CVE-2018-15594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15594">CVE-2018-15594 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5814/">CVE-2018-5814 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5814">CVE-2018-5814 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8822">CVE-2018-8822 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3882/">CVE-2019-3882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3882">CVE-2019-3882 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9503/">CVE-2019-9503 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9503">CVE-2019-9503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554002" comment="kernel-azure-4.4.178-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554003" comment="kernel-azure-base-4.4.178-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554004" comment="kernel-azure-devel-4.4.178-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554005" comment="kernel-devel-azure-4.4.178-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554006" comment="kernel-source-azure-4.4.178-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554007" comment="kernel-syms-azure-4.4.178-4.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149775" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1120095" ref_url="https://bugzilla.suse.com/1120095" source="BUGZILLA"/>
		<reference ref_id="1130680" ref_url="https://bugzilla.suse.com/1130680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the XEN Hypervisor adjustments, that additionaly also use CPU Microcode updates.

The mitigation can be controlled via the 'mds' commandline option, see the documentation.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Security issue fixed:

- CVE-2018-20815: Fixed a heap buffer overflow while loading device tree blob (bsc#1130680)

Other fixes:

- Added code to change LIBXL_HOTPLUG_TIMEOUT at runtime.

  The included README has details about the impact of this change (bsc#1120095)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120095">SUSE bug 1120095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130680">SUSE bug 1130680</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20815">CVE-2018-20815 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521172" comment="xen-4.9.4_04-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554008" comment="xen-doc-html-4.9.4_04-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521173" comment="xen-libs-4.9.4_04-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521174" comment="xen-libs-32bit-4.9.4_04-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554009" comment="xen-tools-4.9.4_04-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554010" comment="xen-tools-domU-4.9.4_04-3.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149776" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1080919" ref_url="https://bugzilla.suse.com/1080919" source="BUGZILLA"/>
		<reference ref_id="1121563" ref_url="https://bugzilla.suse.com/1121563" source="BUGZILLA"/>
		<reference ref_id="1125352" ref_url="https://bugzilla.suse.com/1125352" source="BUGZILLA"/>
		<reference ref_id="1126056" ref_url="https://bugzilla.suse.com/1126056" source="BUGZILLA"/>
		<reference ref_id="1127557" ref_url="https://bugzilla.suse.com/1127557" source="BUGZILLA"/>
		<reference ref_id="1128657" ref_url="https://bugzilla.suse.com/1128657" source="BUGZILLA"/>
		<reference ref_id="1130230" ref_url="https://bugzilla.suse.com/1130230" source="BUGZILLA"/>
		<reference ref_id="1132348" ref_url="https://bugzilla.suse.com/1132348" source="BUGZILLA"/>
		<reference ref_id="1132400" ref_url="https://bugzilla.suse.com/1132400" source="BUGZILLA"/>
		<reference ref_id="1132721" ref_url="https://bugzilla.suse.com/1132721" source="BUGZILLA"/>
		<reference ref_id="955942" ref_url="https://bugzilla.suse.com/955942" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6954" ref_url="https://www.suse.com/security/cve/CVE-2018-6954/" source="CVE"/>
		<reference ref_id="CVE-2019-3842" ref_url="https://www.suse.com/security/cve/CVE-2019-3842/" source="CVE"/>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005467.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2018-6954: Fixed a vulnerability in the symlink handling of systemd-tmpfiles 
  which allowed a local user to obtain ownership of arbitrary files (bsc#1080919).
- CVE-2019-3842: Fixed a vulnerability in pam_systemd which allowed a local user to escalate privileges (bsc#1132348).
- CVE-2019-6454: Fixed a denial of service caused by long dbus messages (bsc#1125352).

Non-security issues fixed:

- systemd-coredump: generate a stack trace of all core dumps (jsc#SLE-5933)
- udevd: notify when max number value of children is reached only once per batch of events (bsc#1132400)
- sd-bus: bump message queue size again (bsc#1132721)
- core: only watch processes when it's really necessary (bsc#955942 bsc#1128657)
- rules: load drivers only on 'add' events (bsc#1126056)
- sysctl: Don't pass null directive argument to '%s' (bsc#1121563)
- Do not automatically online memory on s390x (bsc#1127557)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-16"/>
	<updated date="2019-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1080919">SUSE bug 1080919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121563">SUSE bug 1121563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125352">SUSE bug 1125352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126056">SUSE bug 1126056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127557">SUSE bug 1127557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128657">SUSE bug 1128657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130230">SUSE bug 1130230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132348">SUSE bug 1132348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132400">SUSE bug 1132400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132721">SUSE bug 1132721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955942">SUSE bug 955942</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6954/">CVE-2018-6954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6954">CVE-2018-6954 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3842/">CVE-2019-3842 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3842">CVE-2019-3842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6454">CVE-2019-6454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554011" comment="libsystemd0-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551073" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554012" comment="libudev1-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551076" comment="libudev1-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554013" comment="systemd-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551078" comment="systemd-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554014" comment="systemd-sysvinit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554015" comment="udev-228-150.66.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149777" version="1" class="patch">
	<metadata>
		<title>Security update for PackageKit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1038425" ref_url="https://bugzilla.suse.com/1038425" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:0128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005047.html" source="SUSE-SU"/>
		<description>
This update for PackageKit fixes the following issues:

- Fixed displaying the license agreement pop up window during package update (bsc#1038425).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-18"/>
	<updated date="2019-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038425">SUSE bug 1038425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554016" comment="PackageKit-1.1.3-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554017" comment="PackageKit-backend-zypp-1.1.3-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521189" comment="PackageKit-lang-1.1.3-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554018" comment="libpackagekit-glib2-18-1.1.3-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554019" comment="typelib-1_0-PackageKitGlib-1_0-1.1.3-24.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149778" version="1" class="patch">
	<metadata>
		<title>Security update for nmap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1104139" ref_url="https://bugzilla.suse.com/1104139" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15173" ref_url="https://www.suse.com/security/cve/CVE-2018-15173/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005475.html" source="SUSE-SU"/>
		<description>
This update for nmap fixes the following issues:

Security issue fixed:

- CVE-2018-15173: Fixed a remote denial of service attack via a crafted TCP-based service (bsc#1104139).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-17"/>
	<updated date="2019-05-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104139">SUSE bug 1104139</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15173/">CVE-2018-15173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15173">CVE-2018-15173 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554020" comment="nmap-6.46-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149779" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

ucode-intel was updated to official QSR 2019.1 microcode release (bsc#1111331
  CVE-2018-12126 CVE-2018-12130 CVE-2018-12127 CVE-2019-11091)

---- new platforms ----------------------------------------
VLV          C0       6-37-8/02           00000838 Atom Z series
VLV          C0       6-37-8/0C           00000838 Celeron N2xxx, Pentium N35xx
VLV          D0       6-37-9/0F           0000090c Atom E38xx
CHV          C0       6-4c-3/01           00000368 Atom X series
CHV          D0       6-4c-4/01           00000411 Atom X series

Readded Broadwell CPU ucode that was missing in last update:

BDX-ML       B0/M0/R0 6-4f-1/ef 0b00002e-&gt;00000036 Xeon E5/E7 v4; Core i7-69xx/68xx
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-21"/>
	<updated date="2019-05-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521192" comment="ucode-intel-20190514-13.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149780" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1121571" ref_url="https://bugzilla.suse.com/1121571" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121818" ref_url="https://bugzilla.suse.com/1121818" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685/" source="CVE"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6110" ref_url="https://www.suse.com/security/cve/CVE-2019-6110/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security issue fixed:

- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)
- CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)
- CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)
- CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-21"/>
	<updated date="2019-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20685">CVE-2018-20685 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6109">CVE-2019-6109 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6110/">CVE-2019-6110 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6110">CVE-2019-6110 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6111">CVE-2019-6111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554021" comment="openssh-7.2p2-74.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554022" comment="openssh-askpass-gnome-7.2p2-74.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554023" comment="openssh-fips-7.2p2-74.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554024" comment="openssh-helpers-7.2p2-74.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149781" version="1" class="patch">
	<metadata>
		<title>Security update for sysstat (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1117001" ref_url="https://bugzilla.suse.com/1117001" source="BUGZILLA"/>
		<reference ref_id="1117260" ref_url="https://bugzilla.suse.com/1117260" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19416" ref_url="https://www.suse.com/security/cve/CVE-2018-19416/" source="CVE"/>
		<reference ref_id="CVE-2018-19517" ref_url="https://www.suse.com/security/cve/CVE-2018-19517/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005490.html" source="SUSE-SU"/>
		<description>
This update for sysstat fixes the following issues:

Security issues fixed:

- CVE-2018-19416: Fixed out-of-bounds read during a memmove call inside the remap_struct function (bsc#1117001).
- CVE-2018-19517: Fixed out-of-bounds read during a memset call inside the remap_struct function (bsc#1117260).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-23"/>
	<updated date="2019-05-23"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1117001">SUSE bug 1117001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117260">SUSE bug 1117260</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19416/">CVE-2018-19416 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19416">CVE-2018-19416 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19517/">CVE-2018-19517 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19517">CVE-2018-19517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554025" comment="sysstat-12.0.2-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554026" comment="sysstat-isag-12.0.2-10.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149782" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1013708" ref_url="https://bugzilla.suse.com/1013708" source="BUGZILLA"/>
		<reference ref_id="1013712" ref_url="https://bugzilla.suse.com/1013712" source="BUGZILLA"/>
		<reference ref_id="1013893" ref_url="https://bugzilla.suse.com/1013893" source="BUGZILLA"/>
		<reference ref_id="1015171" ref_url="https://bugzilla.suse.com/1015171" source="BUGZILLA"/>
		<reference ref_id="1015173" ref_url="https://bugzilla.suse.com/1015173" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9797" ref_url="https://www.suse.com/security/cve/CVE-2016-9797/" source="CVE"/>
		<reference ref_id="CVE-2016-9798" ref_url="https://www.suse.com/security/cve/CVE-2016-9798/" source="CVE"/>
		<reference ref_id="CVE-2016-9802" ref_url="https://www.suse.com/security/cve/CVE-2016-9802/" source="CVE"/>
		<reference ref_id="CVE-2016-9917" ref_url="https://www.suse.com/security/cve/CVE-2016-9917/" source="CVE"/>
		<reference ref_id="CVE-2016-9918" ref_url="https://www.suse.com/security/cve/CVE-2016-9918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005494.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

Security vulnerability addressed:

- CVE-2016-9797: Fixed a buffer over-read in l2cap_dump() (bsc#1013708).
- CVE-2016-9798: Fixed a use-after-free in conf_opt() (bsc#1013712).
- CVE-2016-9917: Fixed a heap-based buffer overflow in read_n() (bsc#1015171).
- CVE-2016-9802: Fixed a buffer over-read in l2cap_packet() (bsc#1013893).
- CVE-2016-9918: Fixed an out-of-bounds stack read in packet_hexdump(),
  which could be triggered by processing a corrupted dump file and will result
  in a crash of the hcidump tool (bsc#1015173)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013708">SUSE bug 1013708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013712">SUSE bug 1013712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013893">SUSE bug 1013893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015171">SUSE bug 1015171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015173">SUSE bug 1015173</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9797/">CVE-2016-9797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9797">CVE-2016-9797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9798/">CVE-2016-9798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9798">CVE-2016-9798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9802/">CVE-2016-9802 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9802">CVE-2016-9802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9917/">CVE-2016-9917 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9917">CVE-2016-9917 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-9918/">CVE-2016-9918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9918">CVE-2016-9918 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554027" comment="bluez-5.13-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554028" comment="libbluetooth3-5.13-5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149783" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1132734" ref_url="https://bugzilla.suse.com/1132734" source="BUGZILLA"/>
		<reference ref_id="1134718" ref_url="https://bugzilla.suse.com/1134718" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10245" ref_url="https://www.suse.com/security/cve/CVE-2019-10245/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2697" ref_url="https://www.suse.com/security/cve/CVE-2019-2697/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005493.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update to Java 7.1 Service Refresh 4 Fix Pack 45.

Security issues fixed:

- CVE-2019-10245: Fixed Java bytecode verifier issue causing crashes (bsc#1134718).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2697: Fixed flaw inside the 2D component (bsc#1132734).
- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw was found in the RMI registry implementation (bsc#1132732).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132734">SUSE bug 1132734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10245/">CVE-2019-10245 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10245">CVE-2019-10245 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2602">CVE-2019-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2684">CVE-2019-2684 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2697/">CVE-2019-2697 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2697">CVE-2019-2697 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2698">CVE-2019-2698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546364" comment="java-1_7_1-ibm-1.7.1_sr4.45-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530511" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546365" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530514" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-38.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149784" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1005023" ref_url="https://bugzilla.suse.com/1005023" source="BUGZILLA"/>
		<reference ref_id="1076696" ref_url="https://bugzilla.suse.com/1076696" source="BUGZILLA"/>
		<reference ref_id="1101591" ref_url="https://bugzilla.suse.com/1101591" source="BUGZILLA"/>
		<reference ref_id="1114981" ref_url="https://bugzilla.suse.com/1114981" source="BUGZILLA"/>
		<reference ref_id="1115518" ref_url="https://bugzilla.suse.com/1115518" source="BUGZILLA"/>
		<reference ref_id="1119971" ref_url="https://bugzilla.suse.com/1119971" source="BUGZILLA"/>
		<reference ref_id="1120323" ref_url="https://bugzilla.suse.com/1120323" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16864" ref_url="https://www.suse.com/security/cve/CVE-2018-16864/" source="CVE"/>
		<reference ref_id="CVE-2018-16865" ref_url="https://www.suse.com/security/cve/CVE-2018-16865/" source="CVE"/>
		<reference ref_id="CVE-2018-16866" ref_url="https://www.suse.com/security/cve/CVE-2018-16866/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005052.html" source="SUSE-SU"/>
		<description>
This update for systemd provides the following fixes:

Security issues fixed:

- CVE-2018-16864, CVE-2018-16865: Fixed two memory corruptions through attacker-controlled alloca()s (bsc#1120323)
- CVE-2018-16866: Fixed an information leak in journald (bsc#1120323)
- Fixed an issue during system startup in relation to encrypted swap disks (bsc#1119971)

Non-security issues fixed:

- core: Queue loading transient units after setting their properties. (bsc#1115518)
- logind: Stop managing VT switches if no sessions are registered on that VT. (bsc#1101591)
- terminal-util: introduce vt_release() and vt_restore() helpers.
- terminal: Unify code for resetting kbd utf8 mode a bit.
- terminal Reset should honour default_utf8 kernel setting.
- logind: Make session_restore_vt() static.
- udev: Downgrade message when settting inotify watch up fails. (bsc#1005023)
- log: Never log into foreign fd #2 in PID 1 or its pre-execve() children. (bsc#1114981)
- udev: Ignore the exit code of systemd-detect-virt for memory hot-add.  In SLE-12-SP3,
  80-hotplug-cpu-mem.rules has a memory hot-add rule that uses systemd-detect-virt to
  detect non-zvm environment. The systemd-detect-virt returns exit failure code when it
  detected _none_ state.  The exit failure code causes that the hot-add memory block can
  not be set to online. (bsc#1076696)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-21"/>
	<updated date="2019-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005023">SUSE bug 1005023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076696">SUSE bug 1076696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101591">SUSE bug 1101591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114981">SUSE bug 1114981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115518">SUSE bug 1115518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119971">SUSE bug 1119971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16864/">CVE-2018-16864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16864">CVE-2018-16864 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16865/">CVE-2018-16865 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16865">CVE-2018-16865 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16866/">CVE-2018-16866 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16866">CVE-2018-16866 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554029" comment="libsystemd0-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551099" comment="libsystemd0-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554030" comment="libudev1-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551101" comment="libudev1-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554031" comment="systemd-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551103" comment="systemd-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521208" comment="systemd-bash-completion-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554032" comment="systemd-sysvinit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554033" comment="udev-228-150.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149785" version="1" class="patch">
	<metadata>
		<title>Security update for screen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1130831" ref_url="https://bugzilla.suse.com/1130831" source="BUGZILLA"/>
		<reference ref_id="944458" ref_url="https://bugzilla.suse.com/944458" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6806" ref_url="https://www.suse.com/security/cve/CVE-2015-6806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005502.html" source="SUSE-SU"/>
		<description>
This update for screen fixes the following issues:

Security issue fixed:

- CVE-2015-6806: Fixed a stack overflow due to deep recursion (bsc#944458).

Non-security issue fixed:

- Fixed segmentation faults related to altscreen and resizing screen (bsc#1130831).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1130831">SUSE bug 1130831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944458">SUSE bug 944458</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-6806/">CVE-2015-6806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6806">CVE-2015-6806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554034" comment="screen-4.0.4-23.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149786" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1135170" ref_url="https://bugzilla.suse.com/1135170" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005506.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5436: Fixed a heap buffer overflow exists in tftp_receive_packet that receives data from a TFTP server (bsc#1135170).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-28"/>
	<updated date="2019-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5436">CVE-2019-5436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554035" comment="curl-7.37.0-37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554036" comment="libcurl4-7.37.0-37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546375" comment="libcurl4-32bit-7.37.0-37.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149787" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1040621" ref_url="https://bugzilla.suse.com/1040621" source="BUGZILLA"/>
		<reference ref_id="1105435" ref_url="https://bugzilla.suse.com/1105435" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6891" ref_url="https://www.suse.com/security/cve/CVE-2017-6891/" source="CVE"/>
		<reference ref_id="CVE-2018-1000654" ref_url="https://www.suse.com/security/cve/CVE-2018-1000654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005515.html" source="SUSE-SU"/>
		<description>
This update for libtasn1 fixes the following issues:

Security issues fixed:

- CVE-2018-1000654: Fixed a denial of service in the asn1 parser (bsc#1105435).
- CVE-2017-6891: Fixed a stack overflow in asn1_find_node() (bsc#1040621).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-29"/>
	<updated date="2019-05-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040621">SUSE bug 1040621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105435">SUSE bug 1105435</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6891/">CVE-2017-6891 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6891">CVE-2017-6891 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000654/">CVE-2018-1000654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000654">CVE-2018-1000654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554037" comment="libtasn1-4.9-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554038" comment="libtasn1-6-4.9-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554039" comment="libtasn1-6-32bit-4.9-3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149788" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1121232" ref_url="https://bugzilla.suse.com/1121232" source="BUGZILLA"/>
		<reference ref_id="1121233" ref_url="https://bugzilla.suse.com/1121233" source="BUGZILLA"/>
		<reference ref_id="1121234" ref_url="https://bugzilla.suse.com/1121234" source="BUGZILLA"/>
		<reference ref_id="1121235" ref_url="https://bugzilla.suse.com/1121235" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5717" ref_url="https://www.suse.com/security/cve/CVE-2019-5717/" source="CVE"/>
		<reference ref_id="CVE-2019-5718" ref_url="https://www.suse.com/security/cve/CVE-2019-5718/" source="CVE"/>
		<reference ref_id="CVE-2019-5719" ref_url="https://www.suse.com/security/cve/CVE-2019-5719/" source="CVE"/>
		<reference ref_id="CVE-2019-5721" ref_url="https://www.suse.com/security/cve/CVE-2019-5721/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005055.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.4.12 fixes the following issues:

Security issues fixed:

- CVE-2019-5717: Fixed a denial of service in the P_MUL dissector (bsc#1121232)
- CVE-2019-5718: Fixed a denial of service in the RTSE dissector and other dissectors (bsc#1121233)
- CVE-2019-5719: Fixed a denial of service in the ISAKMP dissector (bsc#1121234)
- CVE-2019-5721: Fixed a denial of service in the ISAKMP dissector (bsc#1121235)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-21"/>
	<updated date="2019-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1121232">SUSE bug 1121232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121233">SUSE bug 1121233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121234">SUSE bug 1121234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121235">SUSE bug 1121235</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5717/">CVE-2019-5717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5717">CVE-2019-5717 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5718/">CVE-2019-5718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5718">CVE-2019-5718 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5719/">CVE-2019-5719 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5719">CVE-2019-5719 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5721/">CVE-2019-5721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5721">CVE-2019-5721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554040" comment="libwireshark9-2.4.12-48.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554041" comment="libwiretap7-2.4.12-48.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554042" comment="libwscodecs1-2.4.12-48.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554043" comment="libwsutil8-2.4.12-48.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554044" comment="wireshark-2.4.12-48.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554045" comment="wireshark-gtk-2.4.12-48.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149789" version="1" class="patch">
	<metadata>
		<title>Security update for axis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1134598" ref_url="https://bugzilla.suse.com/1134598" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5784" ref_url="https://www.suse.com/security/cve/CVE-2012-5784/" source="CVE"/>
		<reference ref_id="CVE-2014-3596" ref_url="https://www.suse.com/security/cve/CVE-2014-3596/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005517.html" source="SUSE-SU"/>
		<description>
This update for axis fixes the following issues:

Security issue fixed:

- CVE-2012-5784, CVE-2014-3596: Fixed missing connection hostname check against X.509 certificate name (bsc#1134598).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-30"/>
	<updated date="2019-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1134598">SUSE bug 1134598</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2012-5784/">CVE-2012-5784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5784">CVE-2012-5784 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3596/">CVE-2014-3596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3596">CVE-2014-3596 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554046" comment="axis-1.4-290.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149790" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1135824" ref_url="https://bugzilla.suse.com/1135824" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691/" source="CVE"/>
		<reference ref_id="CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692/" source="CVE"/>
		<reference ref_id="CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693/" source="CVE"/>
		<reference ref_id="CVE-2019-11694" ref_url="https://www.suse.com/security/cve/CVE-2019-11694/" source="CVE"/>
		<reference ref_id="CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800/" source="CVE"/>
		<reference ref_id="CVE-2019-9815" ref_url="https://www.suse.com/security/cve/CVE-2019-9815/" source="CVE"/>
		<reference ref_id="CVE-2019-9816" ref_url="https://www.suse.com/security/cve/CVE-2019-9816/" source="CVE"/>
		<reference ref_id="CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817/" source="CVE"/>
		<reference ref_id="CVE-2019-9818" ref_url="https://www.suse.com/security/cve/CVE-2019-9818/" source="CVE"/>
		<reference ref_id="CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819/" source="CVE"/>
		<reference ref_id="CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

- CVE-2019-11691: Use-after-free in XMLHttpRequest
- CVE-2019-11692: Use-after-free removing listeners in the event listener manager
- CVE-2019-11693: Buffer overflow in WebGL bufferdata on Linux
- CVE-2019-11694: Uninitialized memory memory leakage in Windows sandbox
- CVE-2019-11698: Theft of user history data through drag and drop of hyperlinks to and from bookmarks
- CVE-2019-7317: Use-after-free in png_image_free of libpng library
- CVE-2019-9800: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7
- CVE-2019-9815: Disable hyperthreading on content JavaScript threads on macOS
- CVE-2019-9816: Type confusion with object groups and UnboxedObjects
- CVE-2019-9817: Stealing of cross-domain images using canvas
- CVE-2019-9818: Use-after-free in crash generation server
- CVE-2019-9819: Compartment mismatch with fetch API
- CVE-2019-9820: Use-after-free of ChromeEventHandler by DocShell

Non-security issues fixed:

- Font and date adjustments to accommodate the new Reiwa era in Japan
- Update to Firefox ESR 60.7 (bsc#1135824)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11691">CVE-2019-11691 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11692">CVE-2019-11692 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11693">CVE-2019-11693 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11694/">CVE-2019-11694 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11694">CVE-2019-11694 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11698">CVE-2019-11698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9800">CVE-2019-9800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9815/">CVE-2019-9815 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9815">CVE-2019-9815 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9816/">CVE-2019-9816 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9816">CVE-2019-9816 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9817">CVE-2019-9817 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9818/">CVE-2019-9818 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9818">CVE-2019-9818 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9819">CVE-2019-9819 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9820">CVE-2019-9820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554047" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554048" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149791" version="1" class="patch">
	<metadata>
		<title>Security update for gnome-shell (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1124493" ref_url="https://bugzilla.suse.com/1124493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3820" ref_url="https://www.suse.com/security/cve/CVE-2019-3820/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005523.html" source="SUSE-SU"/>
		<description>
This update for gnome-shell fixes the following issues:

Security issue fixed:

- CVE-2019-3820: Fixed a partial lock screen bypass (bsc#1124493).

Fixed bugs:

- Remove sessionList of endSessionDialog for security reasons (jsc#SLE-6660).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124493">SUSE bug 1124493</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3820/">CVE-2019-3820 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3820">CVE-2019-3820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554049" comment="gnome-shell-3.20.4-77.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554050" comment="gnome-shell-browser-plugin-3.20.4-77.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521229" comment="gnome-shell-lang-3.20.4-77.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149792" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1134297" ref_url="https://bugzilla.suse.com/1134297" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Update to 2.6.18 - OpenJDK 7u221 (April 2019 CPU)

Security issues fixed:

- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw inside the RMI registry implementation (bsc#1132732).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2422: Fixed memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed a Divide By Zero in alloc_sarray function in jmemmgr.c (bsc#1122299).
- CVE-2019-2426: Improve web server connections (bsc#1134297).

Bug fixes:

- Please check the package Changelog for detailed information.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134297">SUSE bug 1134297</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2422">CVE-2019-2422 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2426">CVE-2019-2426 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2602">CVE-2019-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2684">CVE-2019-2684 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2698">CVE-2019-2698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554051" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554052" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554053" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554054" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149793" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_jk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1114612" ref_url="https://bugzilla.suse.com/1114612" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11759" ref_url="https://www.suse.com/security/cve/CVE-2018-11759/" source="CVE"/>
		<description>
This update for apache2-mod_jk fixes the following issue:

Security issue fixed:

- CVE-2018-11759: Fixed connector path traversal due to mishandled HTTP requests in httpd (bsc#1114612).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1114612">SUSE bug 1114612</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11759/">CVE-2018-11759 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11759">CVE-2018-11759 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554055" comment="apache2-mod_jk-1.2.40-7.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149794" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1104129" ref_url="https://bugzilla.suse.com/1104129" source="BUGZILLA"/>
		<reference ref_id="1126068" ref_url="https://bugzilla.suse.com/1126068" source="BUGZILLA"/>
		<reference ref_id="1126069" ref_url="https://bugzilla.suse.com/1126069" source="BUGZILLA"/>
		<reference ref_id="1133185" ref_url="https://bugzilla.suse.com/1133185" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5740" ref_url="https://www.suse.com/security/cve/CVE-2018-5740/" source="CVE"/>
		<reference ref_id="CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743/" source="CVE"/>
		<reference ref_id="CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745/" source="CVE"/>
		<reference ref_id="CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

Security issues fixed:

- CVE-2018-5740: Fixed a denial of service vulnerability in the 'deny-answer-aliases' feature (bsc#1104129).
- CVE-2019-6465: Fixed an issue where controls for zone transfers may not be properly applied to Dynamically Loadable Zones (bsc#1126069).
- CVE-2018-5745: An assertion failure can occur if a trust anchor rolls over to an unsupported key algorithm when using managed-keys. (bsc#1126068)
- CVE-2018-5743: Limiting simultaneous TCP clients is ineffective. (bsc#1133185)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-03"/>
	<updated date="2019-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104129">SUSE bug 1104129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126068">SUSE bug 1126068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126069">SUSE bug 1126069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133185">SUSE bug 1133185</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5740/">CVE-2018-5740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5740">CVE-2018-5740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5743">CVE-2018-5743 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-5745">CVE-2018-5745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6465">CVE-2019-6465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554056" comment="bind-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554057" comment="bind-chrootenv-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530526" comment="bind-doc-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554058" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554059" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149795" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130847" ref_url="https://bugzilla.suse.com/1130847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005534.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-9948: Fixed a 'file:' blacklist bypass in URIs by using the 'local-file:' scheme instead (bsc#1130847).
- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-06"/>
	<updated date="2019-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636">CVE-2019-9636 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9948">CVE-2019-9948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554060" comment="libpython2_7-1_0-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548575" comment="libpython2_7-1_0-32bit-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554061" comment="python-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548577" comment="python-32bit-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554062" comment="python-base-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548579" comment="python-base-32bit-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554063" comment="python-curses-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554064" comment="python-demo-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530551" comment="python-doc-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530552" comment="python-doc-pdf-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554065" comment="python-gdbm-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554066" comment="python-idle-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554067" comment="python-tk-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554068" comment="python-xml-2.7.13-28.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149796" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1122319" ref_url="https://bugzilla.suse.com/1122319" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6116" ref_url="https://www.suse.com/security/cve/CVE-2019-6116/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005061.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.26a fixes the following issues:

Security issue fixed:

- CVE-2019-6116: subroutines within pseudo-operators must themselves be pseudo-operators (bsc#1122319)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-23"/>
	<updated date="2019-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122319">SUSE bug 1122319</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6116/">CVE-2019-6116 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6116">CVE-2019-6116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554069" comment="ghostscript-9.26a-23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554070" comment="ghostscript-x11-9.26a-23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554071" comment="libspectre1-0.2.7-12.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149797" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1137443" ref_url="https://bugzilla.suse.com/1137443" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005543.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issue:

Security issue fixed: 

- CVE-2019-12735: Fixed a potential arbitrary code execution vulnerability in getchar.c (bsc#1137443).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137443">SUSE bug 1137443</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12735">CVE-2019-12735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554072" comment="gvim-7.4.326-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554073" comment="vim-7.4.326-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521429" comment="vim-data-7.4.326-17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149798" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1119553" ref_url="https://bugzilla.suse.com/1119553" source="BUGZILLA"/>
		<reference ref_id="1119554" ref_url="https://bugzilla.suse.com/1119554" source="BUGZILLA"/>
		<reference ref_id="1119555" ref_url="https://bugzilla.suse.com/1119555" source="BUGZILLA"/>
		<reference ref_id="1119556" ref_url="https://bugzilla.suse.com/1119556" source="BUGZILLA"/>
		<reference ref_id="1119557" ref_url="https://bugzilla.suse.com/1119557" source="BUGZILLA"/>
		<reference ref_id="1119558" ref_url="https://bugzilla.suse.com/1119558" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4437" ref_url="https://www.suse.com/security/cve/CVE-2018-4437/" source="CVE"/>
		<reference ref_id="CVE-2018-4438" ref_url="https://www.suse.com/security/cve/CVE-2018-4438/" source="CVE"/>
		<reference ref_id="CVE-2018-4441" ref_url="https://www.suse.com/security/cve/CVE-2018-4441/" source="CVE"/>
		<reference ref_id="CVE-2018-4442" ref_url="https://www.suse.com/security/cve/CVE-2018-4442/" source="CVE"/>
		<reference ref_id="CVE-2018-4443" ref_url="https://www.suse.com/security/cve/CVE-2018-4443/" source="CVE"/>
		<reference ref_id="CVE-2018-4464" ref_url="https://www.suse.com/security/cve/CVE-2018-4464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005058.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.22.5 fixes the following issues:

Security issues fixed:

- CVE-2018-4438: Fixed a logic issue which lead to memory corruption (bsc#1119554)
- CVE-2018-4437, CVE-2018-4441, CVE-2018-4442, CVE-2018-4443, CVE-2018-4464: 
  Fixed multiple memory corruption issues with improved memory handling 
  (bsc#1119553, bsc#1119555, bsc#1119556, bsc#1119557, bsc#1119558)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-23"/>
	<updated date="2019-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119553">SUSE bug 1119553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119554">SUSE bug 1119554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119555">SUSE bug 1119555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119556">SUSE bug 1119556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119557">SUSE bug 1119557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119558">SUSE bug 1119558</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4437/">CVE-2018-4437 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4437">CVE-2018-4437 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4438/">CVE-2018-4438 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4438">CVE-2018-4438 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4441/">CVE-2018-4441 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4441">CVE-2018-4441 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4442/">CVE-2018-4442 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4442">CVE-2018-4442 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4443/">CVE-2018-4443 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4443">CVE-2018-4443 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4464/">CVE-2018-4464 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4464">CVE-2018-4464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554074" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554075" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554076" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554077" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554078" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149799" version="1" class="patch">
	<metadata>
		<title>Security update for libcroco (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1034481" ref_url="https://bugzilla.suse.com/1034481" source="BUGZILLA"/>
		<reference ref_id="1034482" ref_url="https://bugzilla.suse.com/1034482" source="BUGZILLA"/>
		<reference ref_id="1043898" ref_url="https://bugzilla.suse.com/1043898" source="BUGZILLA"/>
		<reference ref_id="1043899" ref_url="https://bugzilla.suse.com/1043899" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7960" ref_url="https://www.suse.com/security/cve/CVE-2017-7960/" source="CVE"/>
		<reference ref_id="CVE-2017-7961" ref_url="https://www.suse.com/security/cve/CVE-2017-7961/" source="CVE"/>
		<reference ref_id="CVE-2017-8834" ref_url="https://www.suse.com/security/cve/CVE-2017-8834/" source="CVE"/>
		<reference ref_id="CVE-2017-8871" ref_url="https://www.suse.com/security/cve/CVE-2017-8871/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005549.html" source="SUSE-SU"/>
		<description>
This update for libcroco fixes the following issues:

Security issues fixed:

- CVE-2017-7960: Fixed heap overflow (input: check end of input before reading a byte) (bsc#1034481).                                                                    
- CVE-2017-7961: Fixed undefined behavior (tknzr: support only max long rgb values) (bsc#1034482).                                                                       
- CVE-2017-8834: Fixed denial of service (memory allocation error) via a crafted CSS file (bsc#1043898).
- CVE-2017-8871: Fixed denial of service (infinite loop and CPU consumption) via a crafted CSS file (bsc#1043899).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-12"/>
	<updated date="2019-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034481">SUSE bug 1034481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034482">SUSE bug 1034482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043898">SUSE bug 1043898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043899">SUSE bug 1043899</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7960/">CVE-2017-7960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7960">CVE-2017-7960 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7961/">CVE-2017-7961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7961">CVE-2017-7961 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8834/">CVE-2017-8834 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8834">CVE-2017-8834 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8871/">CVE-2017-8871 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8871">CVE-2017-8871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554079" comment="libcroco-0_6-3-0.6.11-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554080" comment="libcroco-0_6-3-32bit-0.6.11-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149800" version="1" class="patch">
	<metadata>
		<title>Security update for sssd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1124194" ref_url="https://bugzilla.suse.com/1124194" source="BUGZILLA"/>
		<reference ref_id="1132879" ref_url="https://bugzilla.suse.com/1132879" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16838" ref_url="https://www.suse.com/security/cve/CVE-2018-16838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005550.html" source="SUSE-SU"/>
		<description>
This update for sssd fixes the following issues:

Security issue fixed:

- CVE-2018-16838: Fixed an authentication bypass related to the Group Policy Objects implementation (bsc#1124194).

Non-security issue fixed:

- Create directory to download and cache GPOs (bsc#1132879)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-12"/>
	<updated date="2019-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124194">SUSE bug 1124194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132879">SUSE bug 1132879</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16838/">CVE-2018-16838 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16838">CVE-2018-16838 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554081" comment="libipa_hbac0-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554082" comment="libsss_idmap0-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554083" comment="libsss_nss_idmap0-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554084" comment="libsss_sudo-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554085" comment="python-sssd-config-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554086" comment="sssd-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554087" comment="sssd-ad-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554088" comment="sssd-ipa-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554089" comment="sssd-krb5-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554090" comment="sssd-krb5-common-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554091" comment="sssd-ldap-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554092" comment="sssd-proxy-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554093" comment="sssd-tools-1.13.4-34.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149801" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1015336" ref_url="https://bugzilla.suse.com/1015336" source="BUGZILLA"/>
		<reference ref_id="1015337" ref_url="https://bugzilla.suse.com/1015337" source="BUGZILLA"/>
		<reference ref_id="1015340" ref_url="https://bugzilla.suse.com/1015340" source="BUGZILLA"/>
		<reference ref_id="1019683" ref_url="https://bugzilla.suse.com/1019683" source="BUGZILLA"/>
		<reference ref_id="1019695" ref_url="https://bugzilla.suse.com/1019695" source="BUGZILLA"/>
		<reference ref_id="1020645" ref_url="https://bugzilla.suse.com/1020645" source="BUGZILLA"/>
		<reference ref_id="1027260" ref_url="https://bugzilla.suse.com/1027260" source="BUGZILLA"/>
		<reference ref_id="1027457" ref_url="https://bugzilla.suse.com/1027457" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1043083" ref_url="https://bugzilla.suse.com/1043083" source="BUGZILLA"/>
		<reference ref_id="1046264" ref_url="https://bugzilla.suse.com/1046264" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1048916" ref_url="https://bugzilla.suse.com/1048916" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1069702" ref_url="https://bugzilla.suse.com/1069702" source="BUGZILLA"/>
		<reference ref_id="1070805" ref_url="https://bugzilla.suse.com/1070805" source="BUGZILLA"/>
		<reference ref_id="1079935" ref_url="https://bugzilla.suse.com/1079935" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1091405" ref_url="https://bugzilla.suse.com/1091405" source="BUGZILLA"/>
		<reference ref_id="1093158" ref_url="https://bugzilla.suse.com/1093158" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1094973" ref_url="https://bugzilla.suse.com/1094973" source="BUGZILLA"/>
		<reference ref_id="1096242" ref_url="https://bugzilla.suse.com/1096242" source="BUGZILLA"/>
		<reference ref_id="1096281" ref_url="https://bugzilla.suse.com/1096281" source="BUGZILLA"/>
		<reference ref_id="1099523" ref_url="https://bugzilla.suse.com/1099523" source="BUGZILLA"/>
		<reference ref_id="1100105" ref_url="https://bugzilla.suse.com/1100105" source="BUGZILLA"/>
		<reference ref_id="1101557" ref_url="https://bugzilla.suse.com/1101557" source="BUGZILLA"/>
		<reference ref_id="1102439" ref_url="https://bugzilla.suse.com/1102439" source="BUGZILLA"/>
		<reference ref_id="1102660" ref_url="https://bugzilla.suse.com/1102660" source="BUGZILLA"/>
		<reference ref_id="1103156" ref_url="https://bugzilla.suse.com/1103156" source="BUGZILLA"/>
		<reference ref_id="1103257" ref_url="https://bugzilla.suse.com/1103257" source="BUGZILLA"/>
		<reference ref_id="1103624" ref_url="https://bugzilla.suse.com/1103624" source="BUGZILLA"/>
		<reference ref_id="1104098" ref_url="https://bugzilla.suse.com/1104098" source="BUGZILLA"/>
		<reference ref_id="1104731" ref_url="https://bugzilla.suse.com/1104731" source="BUGZILLA"/>
		<reference ref_id="1105412" ref_url="https://bugzilla.suse.com/1105412" source="BUGZILLA"/>
		<reference ref_id="1106105" ref_url="https://bugzilla.suse.com/1106105" source="BUGZILLA"/>
		<reference ref_id="1106237" ref_url="https://bugzilla.suse.com/1106237" source="BUGZILLA"/>
		<reference ref_id="1106240" ref_url="https://bugzilla.suse.com/1106240" source="BUGZILLA"/>
		<reference ref_id="1106929" ref_url="https://bugzilla.suse.com/1106929" source="BUGZILLA"/>
		<reference ref_id="1107385" ref_url="https://bugzilla.suse.com/1107385" source="BUGZILLA"/>
		<reference ref_id="1108145" ref_url="https://bugzilla.suse.com/1108145" source="BUGZILLA"/>
		<reference ref_id="1108240" ref_url="https://bugzilla.suse.com/1108240" source="BUGZILLA"/>
		<reference ref_id="1109272" ref_url="https://bugzilla.suse.com/1109272" source="BUGZILLA"/>
		<reference ref_id="1109330" ref_url="https://bugzilla.suse.com/1109330" source="BUGZILLA"/>
		<reference ref_id="1109806" ref_url="https://bugzilla.suse.com/1109806" source="BUGZILLA"/>
		<reference ref_id="1110286" ref_url="https://bugzilla.suse.com/1110286" source="BUGZILLA"/>
		<reference ref_id="1111062" ref_url="https://bugzilla.suse.com/1111062" source="BUGZILLA"/>
		<reference ref_id="1111809" ref_url="https://bugzilla.suse.com/1111809" source="BUGZILLA"/>
		<reference ref_id="1112246" ref_url="https://bugzilla.suse.com/1112246" source="BUGZILLA"/>
		<reference ref_id="1112963" ref_url="https://bugzilla.suse.com/1112963" source="BUGZILLA"/>
		<reference ref_id="1113412" ref_url="https://bugzilla.suse.com/1113412" source="BUGZILLA"/>
		<reference ref_id="1114190" ref_url="https://bugzilla.suse.com/1114190" source="BUGZILLA"/>
		<reference ref_id="1114417" ref_url="https://bugzilla.suse.com/1114417" source="BUGZILLA"/>
		<reference ref_id="1114475" ref_url="https://bugzilla.suse.com/1114475" source="BUGZILLA"/>
		<reference ref_id="1114648" ref_url="https://bugzilla.suse.com/1114648" source="BUGZILLA"/>
		<reference ref_id="1114763" ref_url="https://bugzilla.suse.com/1114763" source="BUGZILLA"/>
		<reference ref_id="1114839" ref_url="https://bugzilla.suse.com/1114839" source="BUGZILLA"/>
		<reference ref_id="1114871" ref_url="https://bugzilla.suse.com/1114871" source="BUGZILLA"/>
		<reference ref_id="1115431" ref_url="https://bugzilla.suse.com/1115431" source="BUGZILLA"/>
		<reference ref_id="1115433" ref_url="https://bugzilla.suse.com/1115433" source="BUGZILLA"/>
		<reference ref_id="1115440" ref_url="https://bugzilla.suse.com/1115440" source="BUGZILLA"/>
		<reference ref_id="1115587" ref_url="https://bugzilla.suse.com/1115587" source="BUGZILLA"/>
		<reference ref_id="1115709" ref_url="https://bugzilla.suse.com/1115709" source="BUGZILLA"/>
		<reference ref_id="1116027" ref_url="https://bugzilla.suse.com/1116027" source="BUGZILLA"/>
		<reference ref_id="1116183" ref_url="https://bugzilla.suse.com/1116183" source="BUGZILLA"/>
		<reference ref_id="1116285" ref_url="https://bugzilla.suse.com/1116285" source="BUGZILLA"/>
		<reference ref_id="1116336" ref_url="https://bugzilla.suse.com/1116336" source="BUGZILLA"/>
		<reference ref_id="1116345" ref_url="https://bugzilla.suse.com/1116345" source="BUGZILLA"/>
		<reference ref_id="1116497" ref_url="https://bugzilla.suse.com/1116497" source="BUGZILLA"/>
		<reference ref_id="1116841" ref_url="https://bugzilla.suse.com/1116841" source="BUGZILLA"/>
		<reference ref_id="1116924" ref_url="https://bugzilla.suse.com/1116924" source="BUGZILLA"/>
		<reference ref_id="1116950" ref_url="https://bugzilla.suse.com/1116950" source="BUGZILLA"/>
		<reference ref_id="1117162" ref_url="https://bugzilla.suse.com/1117162" source="BUGZILLA"/>
		<reference ref_id="1117165" ref_url="https://bugzilla.suse.com/1117165" source="BUGZILLA"/>
		<reference ref_id="1117186" ref_url="https://bugzilla.suse.com/1117186" source="BUGZILLA"/>
		<reference ref_id="1117562" ref_url="https://bugzilla.suse.com/1117562" source="BUGZILLA"/>
		<reference ref_id="1118152" ref_url="https://bugzilla.suse.com/1118152" source="BUGZILLA"/>
		<reference ref_id="1118316" ref_url="https://bugzilla.suse.com/1118316" source="BUGZILLA"/>
		<reference ref_id="1118319" ref_url="https://bugzilla.suse.com/1118319" source="BUGZILLA"/>
		<reference ref_id="1118505" ref_url="https://bugzilla.suse.com/1118505" source="BUGZILLA"/>
		<reference ref_id="1118790" ref_url="https://bugzilla.suse.com/1118790" source="BUGZILLA"/>
		<reference ref_id="1118798" ref_url="https://bugzilla.suse.com/1118798" source="BUGZILLA"/>
		<reference ref_id="1118915" ref_url="https://bugzilla.suse.com/1118915" source="BUGZILLA"/>
		<reference ref_id="1118922" ref_url="https://bugzilla.suse.com/1118922" source="BUGZILLA"/>
		<reference ref_id="1118926" ref_url="https://bugzilla.suse.com/1118926" source="BUGZILLA"/>
		<reference ref_id="1118930" ref_url="https://bugzilla.suse.com/1118930" source="BUGZILLA"/>
		<reference ref_id="1118936" ref_url="https://bugzilla.suse.com/1118936" source="BUGZILLA"/>
		<reference ref_id="1119204" ref_url="https://bugzilla.suse.com/1119204" source="BUGZILLA"/>
		<reference ref_id="1119714" ref_url="https://bugzilla.suse.com/1119714" source="BUGZILLA"/>
		<reference ref_id="1119877" ref_url="https://bugzilla.suse.com/1119877" source="BUGZILLA"/>
		<reference ref_id="1119946" ref_url="https://bugzilla.suse.com/1119946" source="BUGZILLA"/>
		<reference ref_id="1119967" ref_url="https://bugzilla.suse.com/1119967" source="BUGZILLA"/>
		<reference ref_id="1119970" ref_url="https://bugzilla.suse.com/1119970" source="BUGZILLA"/>
		<reference ref_id="1120046" ref_url="https://bugzilla.suse.com/1120046" source="BUGZILLA"/>
		<reference ref_id="1120743" ref_url="https://bugzilla.suse.com/1120743" source="BUGZILLA"/>
		<reference ref_id="1121239" ref_url="https://bugzilla.suse.com/1121239" source="BUGZILLA"/>
		<reference ref_id="1121240" ref_url="https://bugzilla.suse.com/1121240" source="BUGZILLA"/>
		<reference ref_id="1121241" ref_url="https://bugzilla.suse.com/1121241" source="BUGZILLA"/>
		<reference ref_id="1121242" ref_url="https://bugzilla.suse.com/1121242" source="BUGZILLA"/>
		<reference ref_id="1121275" ref_url="https://bugzilla.suse.com/1121275" source="BUGZILLA"/>
		<reference ref_id="1121621" ref_url="https://bugzilla.suse.com/1121621" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16939" ref_url="https://www.suse.com/security/cve/CVE-2017-16939/" source="CVE"/>
		<reference ref_id="CVE-2018-1120" ref_url="https://www.suse.com/security/cve/CVE-2018-1120/" source="CVE"/>
		<reference ref_id="CVE-2018-16862" ref_url="https://www.suse.com/security/cve/CVE-2018-16862/" source="CVE"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<reference ref_id="CVE-2018-19407" ref_url="https://www.suse.com/security/cve/CVE-2018-19407/" source="CVE"/>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<description>
 The SUSE Linux Enterprise 12 SP3 kernel for Azure was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic was uninitialized (bnc#1116841).
- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).
- CVE-2018-3639: Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bnc#1087082).
- CVE-2018-1120: By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which made a read() call to the /proc/&lt;pid&gt;/cmdline (or /proc/&lt;pid&gt;/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks) (bnc#1093158).
- CVE-2017-16939: The XFRM dump policy implementation in net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages (bnc#1069702).
- CVE-2018-16884: NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1119946).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1118319).
- CVE-2018-16862: A security flaw was found in the way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one (bnc#1117186).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).

The following non-security bugs were fixed:

- 9p: clear dangling pointers in p9stat_free (bnc#1012382).
- 9p locks: fix glock.client_id leak in do_lock (bnc#1012382).
- 9p/net: put a lower bound on msize (bnc#1012382).
- ACPI/IORT: Fix iort_get_platform_device_domain() uninitialized pointer value (bsc#1121239).
- ACPI/LPSS: Add alternative ACPI HIDs for Cherry Trail DMA controllers (bnc#1012382).
- ACPI/nfit, x86/mce: Handle only uncorrectable machine checks (bsc#1114648).
- ACPI/nfit, x86/mce: Validate a MCE's address before using it (bsc#1114648).
- ACPI/platform: Add SMB0001 HID to forbidden_id_list (bnc#1012382).
- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bnc#1012382).
- ahci: do not ignore result code of ahci_reset_controller() (bnc#1012382).
- aio: fix spectre gadget in lookup_ioctx (bnc#1012382).
- aio: hold an extra file reference over AIO read/write operations (bsc#1116027).
- ALSA: ac97: Fix incorrect bit shift at AC97-SPSA control write (bnc#1012382).
- ALSA: ca0106: Disable IZD on SB0570 DAC to fix audio pops (bnc#1012382).
- ALSA: control: Fix race between adding and removing a user element (bnc#1012382).
- ALSA: cs46xx: Potential NULL dereference in probe (bnc#1012382).
- ALSA: emu10k1: Fix potential Spectre v1 vulnerabilities (bnc#1012382).
- ALSA: emux: Fix potential Spectre v1 vulnerabilities (bnc#1012382).
- ALSA: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905) (bnc#1012382).
- ALSA: hda: add mute LED support for HP EliteBook 840 G4 (bnc#1012382).
- ALSA: hda: Add support for AMD Stoney Ridge (bnc#1012382).
- ALSA: hda: Check the non-cached stream buffers more explicitly (bnc#1012382).
- ALSA: hda/tegra: clear pending irq handlers (bnc#1012382).
- ALSA: isa/wavefront: prevent some out of bound writes (bnc#1012382).
- ALSA: pcm: Call snd_pcm_unlink() conditionally at closing (bnc#1012382).
- ALSA: pcm: Fix interval evaluation with openmin/max (bnc#1012382).
- ALSA: pcm: Fix potential Spectre v1 vulnerability (bnc#1012382).
- ALSA: pcm: Fix starvation on down_write_nonblock() (bnc#1012382).
- ALSA: pcm: remove SNDRV_PCM_IOCTL1_INFO internal command (bnc#1012382).
- ALSA: rme9652: Fix potential Spectre v1 vulnerability (bnc#1012382).
- ALSA: sparc: Fix invalid snd_free_pages() at error path (bnc#1012382).
- ALSA: timer: Fix zero-division by continue of uninitialized instance (bnc#1012382).
- ALSA: trident: Suppress gcc string warning (bnc#1012382).
- ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit() (bnc#1012382).
- ALSA: usb-audio: Fix an out-of-bound read in create_composite_quirks (bnc#1012382).
- ALSA: wss: Fix invalid snd_free_pages() at error path (bnc#1012382).
- amd/iommu: Fix Guest Virtual APIC Log Tail Address Register (bsc#1106105).
- ARC: change defconfig defaults to ARCv2 (bnc#1012382).
- ARC: [devboards] Add support of NFSv3 ACL (bnc#1012382).
- arch/alpha, termios: implement BOTHER, IBSHIFT and termios2 (bnc#1012382).
- ARC: io.h: Implement reads{x}()/writes{x}() (bnc#1012382).
- ARM64: Disable asm-operand-width warning for clang (bnc#1012382).
- ARM64: dts: stratix10: Correct System Manager register size (bnc#1012382).
- ARM64: Enabled ENA (Amazon network driver)
- ARM64: hardcode rodata_enabled=true earlier in the series (bsc#1114763). 
- ARM64: PCI: ACPI support for legacy IRQs parsing and consolidation with DT code.
- ARM64: percpu: Initialize ret in the default case (bnc#1012382).
- ARM64: remove no-op -p linker flag (bnc#1012382).
- ARM: 8799/1: mm: fix pci_ioremap_io() offset check (bnc#1012382).
- ARM: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bnc#1012382).
- ARM: dts: apq8064: add ahci ports-implemented mask (bnc#1012382).
- ARM: dts: imx53-qsb: disable 1.2GHz OPP (bnc#1012382).
- ARM: fix mis-applied iommu identity check (bsc#1116924).
- ARM: imx: update the cpu power up timing setting on i.mx6sx (bnc#1012382).
- ARM: kvm: fix building with gcc-8 (bsc#1121241).
- ARM: OMAP1: ams-delta: Fix possible use of uninitialized field (bnc#1012382).
- ARM: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bnc#1012382).
- asix: Check for supported Wake-on-LAN modes (bnc#1012382).
- ASoC: ak4613: Enable cache usage to fix crashes on resume (bnc#1012382).
- ASoC: dapm: Recalculate audio map forcely when card instantiated (bnc#1012382).
- ASoC: omap-dmic: Add pm_qos handling to avoid overruns with CPU_IDLE (bnc#1012382).
- ASoC: omap-mcpdm: Add pm_qos handling to avoid under/overruns with CPU_IDLE (bnc#1012382).
- ASoC: spear: fix error return code in spdif_in_probe() (bnc#1012382).
- ASoC: wm8940: Enable cache usage to fix crashes on resume (bnc#1012382).
- ataflop: fix error handling during setup (bnc#1012382).
- ath10k: fix kernel panic due to race in accessing arvif list (bnc#1012382).
- ath10k: schedule hardware restart if WMI command times out (bnc#1012382).
- ax25: fix a use-after-free in ax25_fillin_cb() (bnc#1012382).
- ax88179_178a: Check for supported Wake-on-LAN modes (bnc#1012382).
- b43: Fix error in cordic routine (bnc#1012382).
- batman-adv: Expand merged fragment buffer for full packet (bnc#1012382).
- bcache: fix miss key refill-&gt;end in writeback (bnc#1012382).
- bfs: add sanity check at bfs_fill_super() (bnc#1012382).
- binfmt_elf: fix calculations for bss padding (bnc#1012382).
- bitops: protect variables in bit_clear_unless() macro (bsc#1116285).
- block: fix inheriting request priority from bio (bsc#1116924).
- block: respect virtual boundary mask in bvecs (bsc#1113412).
- Bluetooth: btbcm: Add entry for BCM4335C0 UART bluetooth (bnc#1012382).
- Bluetooth: SMP: fix crash in unpairing (bnc#1012382).
- bna: ethtool: Avoid reading past end of buffer (bnc#1012382).
- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bnc#1012382).
- bonding: fix 802.3ad state sent to partner when unbinding slave (bnc#1012382).
- bpf: fix check of allowed specifiers in bpf_trace_printk (bnc#1012382).
- bpf: generally move prog destruction to RCU deferral (bnc#1012382).
- bpf: support 8-byte metafield access (bnc#1012382).
- bpf, trace: check event type in bpf_perf_event_read (bsc#1119970).
- bpf, trace: use READ_ONCE for retrieving file ptr (bsc#1119967).
- bpf/verifier: Add spi variable to check_stack_write() (bnc#1012382).
- bpf/verifier: Pass instruction index to check_mem_access() and check_xadd() (bnc#1012382).
- bridge: do not add port to router list when receives query with source 0.0.0.0 (bnc#1012382).
- btrfs: Always try all copies when reading extent buffers (bnc#1012382).
- btrfs: do not attempt to trim devices that do not support it (bnc#1012382).
- btrfs: ensure path name is null terminated at btrfs_control_ioctl (bnc#1012382).
- btrfs: fix backport error in submit_stripe_bio (bsc#1114763).
- btrfs: fix data corruption due to cloning of eof block (bnc#1012382).
- btrfs: Fix memory barriers usage with device stats counters.
- btrfs: fix null pointer dereference on compressed write path error (bnc#1012382).
- btrfs: fix pinned underflow after transaction aborted (bnc#1012382).
- btrfs: fix use-after-free when dumping free space (bnc#1012382).
- btrfs: fix wrong dentries after fsync of file that got its parent replaced (bnc#1012382).
- btrfs: Handle error from btrfs_uuid_tree_rem call in _btrfs_ioctl_set_received_subvol.
- btrfs: Handle owner mismatch gracefully when walking up tree (bnc#1012382).
- btrfs: iterate all devices during trim, instead of fs_devices::alloc_list (bnc#1012382).
- btrfs: locking: Add extra check in btrfs_init_new_buffer() to avoid deadlock (bnc#1012382).
- btrfs: make sure we create all new block groups (bnc#1012382).
- btrfs: qgroup: Dirty all qgroups before rescan (bnc#1012382).
- btrfs: release metadata before running delayed refs (bnc#1012382).
- btrfs: reset max_extent_size on clear in a bitmap (bnc#1012382).
- btrfs: send, fix infinite loop due to directory rename dependencies (bnc#1012382).
- btrfs: set max_extent_size properly (bnc#1012382).
- btrfs: wait on caching when putting the bg cache (bnc#1012382).
- cachefiles: fix the race between cachefiles_bury_object() and rmdir(2) (bnc#1012382).
- can: dev: __can_get_echo_skb(): Do not crash the kernel if can_priv::echo_skb is accessed out of bounds (bnc#1012382).
- can: dev: can_get_echo_skb(): factor out non sending code to __can_get_echo_skb() (bnc#1012382).
- can: dev: __can_get_echo_skb(): print error message, if trying to echo non existing skb (bnc#1012382).
- can: dev: __can_get_echo_skb(): replace struct can_frame by canfd_frame to access frame length (bnc#1012382).
- can: rcar_can: Fix erroneous registration (bnc#1012382).
- cdc-acm: correct counting of UART states in serial state notification (bnc#1012382).
- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bnc#1012382).
- ceph: call setattr_prepare from ceph_setattr instead of inode_change_ok (bsc#1114763).
- ceph: do not update importing cap's mseq when handing cap export (bsc#1121275).
- ceph: fix dentry leak in ceph_readdir_prepopulate (bsc#1114839).
- ceph: quota: fix null pointer dereference in quota check (bsc#1114839).
- cfg80211: reg: Init wiphy_idx in regulatory_hint_core() (bnc#1012382).
- checkstack.pl: fix for aarch64 (bnc#1012382).
- CIFS: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bnc#1012382).
- CIFS: Fix separator when building path from dentry (bnc#1012382).
- CIFS: handle guest access errors to Windows shares (bnc#1012382).
- CIFS: In Kconfig CONFIG_CIFS_POSIX needs depends on legacy (insecure cifs) (bnc#1012382).
- clk: mmp: Off by one in mmp_clk_add() (bnc#1012382).
- clk: s2mps11: Add used attribute to s2mps11_dt_match.
- clk: s2mps11: Fix matching when built as module and DT node contains compatible (bnc#1012382).
- clk: samsung: exynos5420: Enable PERIS clocks for suspend (bnc#1012382).
- clockevents/drivers/i8253: Add support for PIT shutdown quirk (bnc#1012382).
- configfs: replace strncpy with memcpy (bnc#1012382).
- cpufeature: avoid warning when compiling with clang.
- cpufreq: imx6q: add return value check for voltage scale (bnc#1012382).
- cpuidle: Do not access cpuidle_devices when !CONFIG_CPU_IDLE (bnc#1012382).
- Cramfs: fix abad comparison when wrap-arounds occur (bnc#1012382).
- crypto: arm64/sha - avoid non-standard inline asm tricks (bnc#1012382).
- crypto: lrw - Fix out-of bounds access on counter overflow (bnc#1012382).
- crypto: shash - Fix a sleep-in-atomic bug in shash_setkey_unaligned (bnc#1012382).
- crypto, x86: aesni - fix token pasting for clang (bnc#1012382).
- crypto: x86/chacha20 - avoid sleeping with preemption disabled (bnc#1012382).
- cw1200: Do not leak memory if krealloc failes (bnc#1012382).
- cxgb4: Add support for new flash parts (bsc#1102439).
- cxgb4: assume flash part size to be 4MB, if it can't be determined (bsc#1102439).
- cxgb4: Fix FW flash errors (bsc#1102439).
- cxgb4: fix missing break in switch and indent return statements (bsc#1102439).
- cxgb4: support new ISSI flash parts (bsc#1102439).
- debugobjects: avoid recursive calls with kmemleak (bnc#1012382).
- disable stringop truncation warnings for now (bnc#1012382).
- dlm: fixed memory leaks after failed ls_remove_names allocation (bnc#1012382).
- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bnc#1012382).
- dlm: memory leaks on error path in dlm_user_request() (bnc#1012382).
- dlm: possible memory leak on error path in create_lkb() (bnc#1012382).
- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bnc#1012382).
- dmaengine: at_hdmac: fix module unloading (bnc#1012382).
- dmaengine: dma-jz4780: Return error if not probed from DT (bnc#1012382).
- dm cache metadata: ignore hints array being too small during resize.
- dm ioctl: harden copy_params()'s copy_from_user() from malicious users (bnc#1012382).
- dm-multipath: do not assign cmd_flags in setup_clone() (bsc#1103156).
- dm raid: stop using BUG() in __rdev_sectors() (bsc#1046264).
- dm thin: stop no_space_timeout worker when switching to write-mode.
- dpaa_eth: fix dpaa_get_stats64 to match prototype (bsc#1114763).
- driver/dma/ioat: Call del_timer_sync() without holding prep_lock (bnc#1012382).
- drivers: hv: vmbus: check the creation_status in vmbus_establish_gpadl() (bsc#1104098).
- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bnc#1012382).
- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bnc#1012382).
- drivers/sbus/char: add of_node_put() (bnc#1012382).
- drivers/tty: add missing of_node_put() (bnc#1012382).
- drm/ast: change resolution may cause screen blurred (bnc#1012382).
- drm/ast: fixed cursor may disappear sometimes (bnc#1012382).
- drm/ast: fixed reading monitor EDID not stable issue (bnc#1012382).
- drm/ast: Fix incorrect free on ioregs (bsc#1106929)
- drm/ast: Remove existing framebuffers before loading driver (boo#1112963)
- drm/dp_mst: Check if primary mstb is null (bnc#1012382).
- drm/fb-helper: Ignore the value of fb_var_screeninfo.pixclock (bsc#1106929)
- drm/i915/hdmi: Add HDMI 2.0 audio clock recovery N values (bnc#1012382).
- drm/ioctl: Fix Spectre v1 vulnerabilities (bnc#1012382).
- drm/msm: Grab a vblank reference when waiting for commit_done (bnc#1012382).
- drm/nouveau/fbcon: fix oops without fbdev emulation (bnc#1012382).
- drm/omap: fix memory barrier bug in DMM driver (bnc#1012382).
- drm: rcar-du: Fix external clock error checks (bsc#1106929)
- drm: rcar-du: Fix vblank initialization (bsc#1106929)
- drm/rockchip: Allow driver to be shutdown on reboot/kexec (bnc#1012382).
- e1000: avoid null pointer dereference on invalid stat type (bnc#1012382).
- e1000: fix race condition between e1000_down() and e1000_watchdog (bnc#1012382).
- efi/libstub/arm64: Force 'hidden' visibility for section markers (bnc#1012382).
- efi/libstub/arm64: Set -fpie when building the EFI stub (bnc#1012382).
- exec: avoid gcc-8 warning for get_task_comm (bnc#1012382).
- exportfs: do not read dentry after free (bnc#1012382).
- ext2: fix potential use after free (bnc#1012382).
- ext4: add missing brelse() add_new_gdb_meta_bg()'s error path (bnc#1012382).
- ext4: add missing brelse() in set_flexbg_block_bitmap()'s error path (bnc#1012382).
- ext4: add missing brelse() update_backups()'s error path (bnc#1012382).
- ext4: avoid buffer leak in ext4_orphan_add() after prior errors (bnc#1012382).
- ext4: avoid possible double brelse() in add_new_gdb() on error path (bnc#1012382).
- ext4: avoid potential extra brelse in setup_new_flex_group_blocks() (bnc#1012382).
- ext4: fix argument checking in EXT4_IOC_MOVE_EXT (bnc#1012382).
- ext4: fix buffer leak in __ext4_read_dirblock() on error path (bnc#1012382).
- ext4: fix buffer leak in ext4_xattr_move_to_block() on error path (bnc#1012382).
- ext4: fix EXT4_IOC_GROUP_ADD ioctl (bnc#1012382).
- ext4: fix missing cleanup if ext4_alloc_flex_bg_array() fails while resizing (bnc#1012382).
- ext4: fix possible inode leak in the retry loop of ext4_resize_fs() (bnc#1012382).
- ext4: fix possible leak of sbi-&gt;s_group_desc_leak in error path (bnc#1012382).
- ext4: fix possible use after free in ext4_quota_enable (bnc#1012382).
- ext4: force inode writes when nfsd calls commit_metadata() (bnc#1012382).
- ext4: initialize retries variable in ext4_da_write_inline_data_begin() (bnc#1012382).
- ext4: missing unlock/put_page() in ext4_try_to_write_inline_data() (bnc#1012382).
- ext4: release bs.bh before re-using in ext4_xattr_block_find() (bnc#1012382).
- fbdev: fbcon: Fix unregister crash when more than one framebuffer (bsc#1106929)
- fbdev: fbmem: behave better with small rotated displays and many CPUs (bsc#1106929)
- fcoe: remove duplicate debugging message in fcoe_ctlr_vn_add (bsc#1114763).
- Fix kABI for 'Ensure we commit after writeback is complete' (bsc#1111809).
- floppy: fix race condition in __floppy_read_block_0().
- flow_dissector: do not dissect l4 ports for fragments (bnc#1012382).
- fork: record start_time late (bnc#1012382).
- fscache, cachefiles: remove redundant variable 'cache' (bnc#1012382).
- fscache: fix race between enablement and dropping of object (bsc#1107385).
- fscache: Fix race in fscache_op_complete() due to split atomic_sub &amp; read .
- fscache: Pass the correct cancelled indications to fscache_op_complete().
- fs, elf: make sure to page align bss in load_elf_library (bnc#1012382).
- fs/exofs: fix potential memory leak in mount option parsing (bnc#1012382).
- fs/fat/fatent.c: add cond_resched() to fat_count_free_clusters() (bnc#1012382).
- fuse: Dont call set_page_dirty_lock() for ITER_BVEC pages for async_dio (bnc#1012382).
- fuse: fix blocked_waitq wakeup (bnc#1012382).
- fuse: fix leaked notify reply (bnc#1012382).
- fuse: Fix use-after-free in fuse_dev_do_read() (bnc#1012382).
- fuse: Fix use-after-free in fuse_dev_do_write() (bnc#1012382).
- fuse: set FR_SENT while locked (bnc#1012382).
- genirq: Fix race on spurious interrupt detection (bnc#1012382).
- genwqe: Fix size check (bnc#1012382).
- gfs2: Do not leave s_fs_info pointing to freed memory in init_sbd (bnc#1012382).
- gfs2: Fix loop in gfs2_rbm_find (bnc#1012382).
- gfs2_meta: -&gt;mount() can get NULL dev_name (bnc#1012382).
- gfs2: Put bitmap buffers in put_super (bnc#1012382).
- git_sort.py: Remove non-existent remote tj/libata
- gpio: max7301: fix driver for use with CONFIG_VMAP_STACK (bnc#1012382).
- gpio: msic: fix error return code in platform_msic_gpio_probe() (bnc#1012382).
- gpu: host1x: fix error return code in host1x_probe() (bnc#1012382).
- gro_cell: add napi_disable in gro_cells_destroy (bnc#1012382).
- hfs: do not free node before using (bnc#1012382).
- hfsplus: do not free node before using (bnc#1012382).
- hfsplus: prevent btree data loss on root split (bnc#1012382).
- hfs: prevent btree data loss on root split (bnc#1012382).
- HID: hiddev: fix potential Spectre v1 (bnc#1012382).
- HID: uhid: forbid UHID_CREATE under KERNEL_DS or elevated privileges (bnc#1012382).
- hpwdt add dynamic debugging (bsc#1114417).
- hpwdt calculate reload value on each use (bsc#1114417).
- hugetlbfs: dirty pages as they are added to pagecache (bnc#1012382).
- hugetlbfs: fix bug in pgoff overflow checking (bnc#1012382).
- hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (bnc#1012382).
- hwmon: (ibmpowernv) Remove bogus __init annotations (bnc#1012382).
- hwmon: (ina2xx) Fix current value calculation (bnc#1012382).
- hwmon: (pmbus) Fix page count auto-detection (bnc#1012382).
- hwmon: (w83795) temp4_type has writable permission (bnc#1012382).
- hwpoison, memory_hotplug: allow hwpoisoned pages to be offlined (bnc#1116336).
- i2c: axxia: properly handle master timeout (bnc#1012382).
- i2c: scmi: Fix probe error on devices with an empty SMB0001 ACPI device node (bnc#1012382).
- IB/hfi1: Fix an out-of-bounds access in get_hw_stats ().
- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (bnc#1012382).
- ibmvnic: Convert reset work item mutex to spin lock ().
- ibmvnic: fix accelerated VLAN handling ().
- ibmvnic: fix index in release_rx_pools (bsc#1115440).
- ibmvnic: Fix non-atomic memory allocation in IRQ context ().
- ibmvnic: Fix RX queue buffer cleanup (bsc#1115440, bsc#1115433).
- ibmvnic: remove ndo_poll_controller ().
- ibmvnic: Update driver queues after change in ring size support ().
- IB/ucm: Fix Spectre v1 vulnerability (bnc#1012382).
- ide: pmac: add of_node_put() (bnc#1012382).
- ieee802154: lowpan_header_create check must check daddr (bnc#1012382).
- igb: Remove superfluous reset to PHY and page 0 selection (bnc#1012382).
- iio: adc: at91: fix acking DRDY irq on simple conversions (bnc#1012382).
- iio: adc: at91: fix wrong channel number in triggered buffer mode (bnc#1012382).
- ima: fix showing large 'violations' or 'runtime_measurements_count' (bnc#1012382).
- Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15ARR (bnc#1012382).
- Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15IGM (bnc#1012382).
- Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G (bnc#1012382).
- Input: elan_i2c - add ELAN0620 to the ACPI table (bnc#1012382).
- Input: elan_i2c - add support for ELAN0621 touchpad (bnc#1012382).
- Input: matrix_keypad - check for errors from of_get_named_gpio() (bnc#1012382).
- Input: omap-keypad - fix idle configuration to not block SoC idle states (bnc#1012382).
- Input: omap-keypad - fix keyboard debounce configuration (bnc#1012382).
- Input: restore EV_ABS ABS_RESERVED (bnc#1012382).
- Input: xpad - add GPD Win 2 Controller USB IDs (bnc#1012382).
- Input: xpad - add Mad Catz FightStick TE 2 VID/PID (bnc#1012382).
- Input: xpad - add more third-party controllers (bnc#1012382).
- Input: xpad - add PDP device id 0x02a4 (bnc#1012382).
- Input: xpad - add product ID for Xbox One S pad (bnc#1012382).
- Input: xpad - add support for PDP Xbox One controllers (bnc#1012382).
- Input: xpad - add support for Xbox1 PDP Camo series gamepad (bnc#1012382).
- Input: xpad - add USB IDs for Mad Catz Brawlstick and Razer Sabertooth (bnc#1012382).
- Input: xpad - avoid using __set_bit() for capabilities (bnc#1012382).
- Input: xpad - constify usb_device_id (bnc#1012382).
- Input: xpad - correctly sort vendor id's (bnc#1012382).
- Input: xpad - correct xbox one pad device name (bnc#1012382).
- Input: xpad - do not depend on endpoint order (bnc#1012382).
- Input: xpad - fix GPD Win 2 controller name (bnc#1012382).
- Input: xpad - fix PowerA init quirk for some gamepad models (bnc#1012382).
- Input: xpad - fix rumble on Xbox One controllers with 2015 firmware (bnc#1012382).
- Input: xpad - fix some coding style issues (bnc#1012382).
- Input: xpad - fix stuck mode button on Xbox One S pad (bnc#1012382).
- Input: xpad - fix Xbox One rumble stopping after 2.5 secs (bnc#1012382).
- Input: xpad - handle 'present' and 'gone' correctly (bnc#1012382).
- Input: xpad - move reporting xbox one home button to common function (bnc#1012382).
- Input: xpad - power off wireless 360 controllers on suspend (bnc#1012382).
- Input: xpad - prevent spurious input from wired Xbox 360 controllers (bnc#1012382).
- Input: xpad - quirk all PDP Xbox One gamepads (bnc#1012382).
- Input: xpad - remove spurious events of wireless xpad 360 controller (bnc#1012382).
- Input: xpad - remove unused function (bnc#1012382).
- Input: xpad - restore LED state after device resume (bnc#1012382).
- Input: xpad - simplify error condition in init_output (bnc#1012382).
- Input: xpad - sort supported devices by USB ID (bnc#1012382).
- Input: xpad - support some quirky Xbox One pads (bnc#1012382).
- Input: xpad - sync supported devices with 360Controller (bnc#1012382).
- Input: xpad - sync supported devices with XBCD (bnc#1012382).
- Input: xpad - sync supported devices with xboxdrv (bnc#1012382).
- Input: xpad - update Xbox One Force Feedback Support (bnc#1012382).
- Input: xpad - use LED API when identifying wireless controllers (bnc#1012382).
- Input: xpad - validate USB endpoint type during probe (bnc#1012382).
- Input: xpad - workaround dead irq_out after suspend/ resume (bnc#1012382).
- Input: xpad - xbox one elite controller support (bnc#1012382).
- intel_th: msu: Fix an off-by-one in attribute store (bnc#1012382).
- iommu/amd: Fix amd_iommu=force_isolation (bsc#1106105).
- iommu/arm-smmu: Ensure that page-table updates are visible before TLBI (bsc#1106237).
- iommu/ipmmu-vmsa: Fix crash on early domain free (bsc#1106105).
- iommu/vt-d: Fix NULL pointer dereference in prq_event_thread() (bsc#1106105).
- iommu/vt-d: Handle domain agaw being less than iommu agaw (bsc#1106105).
- iommu/vt-d: Use memunmap to free memremap (bsc#1106105).
- ip6mr: Fix potential Spectre v1 vulnerability (bnc#1012382).
- ipmi: Fix timer race with module unload (bnc#1012382).
- ip_tunnel: do not force DF when MTU is locked (bnc#1012382).
- ip_tunnel: Fix name string concatenate in __ip_tunnel_create() (bnc#1012382).
- ipv4: Fix potential Spectre v1 vulnerability (bnc#1012382).
- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (bsc#1110286).
- ipv6: Check available headroom in ip6_xmit() even without options (bnc#1012382).
- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (bnc#1012382).
- ipv6: Fix PMTU updates for UDP/raw sockets in presence of VRF (bnc#1012382).
- ipv6: mcast: fix a use-after-free in inet6_mc_check (bnc#1012382).
- ipv6/ndisc: Preserve IPv6 control buffer if protocol error handlers are called (bnc#1012382).
- ipv6: orphan skbs in reassembly unit (bnc#1012382).
- ipv6: set rt6i_protocol properly in the route when it is installed (bsc#1114190).
- ipv6: suppress sparse warnings in IP6_ECN_set_ce() (bnc#1012382).
- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bnc#1012382).
- iser: set sector for ambiguous mr status errors (bnc#1012382).
- iwlwifi: mvm: fix regulatory domain update when the firmware starts (bnc#1012382).
- iwlwifi: mvm: support sta_statistics() even on older firmware (bnc#1012382).
- ixgbe: Add function for checking to see if we can reuse page (bsc#1100105).
- ixgbe: Add support for build_skb (bsc#1100105).
- ixgbe: Add support for padding packet (bsc#1100105).
- ixgbe: Break out Rx buffer page management (bsc#1100105).
- ixgbe: Fix output from ixgbe_dump (bsc#1100105).
- ixgbe: fix possible race in reset subtask (bsc#1101557).
- ixgbe: Make use of order 1 pages and 3K buffers independent of FCoE (bsc#1100105).
- ixgbe: Only DMA sync frame length (bsc#1100105).
- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bnc#1012382).
- ixgbe: Refactor queue disable logic to take completion time into account (bsc#1101557).
- ixgbe: Reorder Tx/Rx shutdown to reduce time needed to stop device (bsc#1101557).
- ixgbe: Update code to better handle incrementing page count (bsc#1100105).
- ixgbe: Update driver to make use of DMA attributes in Rx path (bsc#1100105).
- ixgbe: Use length to determine if descriptor is done (bsc#1100105).
- jbd2: fix use after free in jbd2_log_do_checkpoint() (bnc#1012382).
- jffs2: free jffs2_sb_info through jffs2_kill_sb() (bnc#1012382).
- kabi: hwpoison, memory_hotplug: allow hwpoisoned pages to be offlined (bnc#1116336).
- kABI: protect get_vaddr_frames (kabi).
- kABI: protect struct azx (kabi).
- kABI: protect struct cfs_bandwidth (kabi).
- kABI: protect struct esp (kabi).
- kABI: protect struct fuse_io_priv (kabi).
- kABI: protect __usb_get_extra_descriptor (kabi).
- kABI: protect xen/xen-ops.h include in xlate_mmu.c (kabi).
- kabi: revert sig change on pnfs_read_resend_pnfs.
- kbuild: Add better clang cross build support (bnc#1012382).
- kbuild: Add __cc-option macro (bnc#1012382).
- kbuild: Add support to generate LLVM assembly files (bnc#1012382).
- kbuild: allow to use GCC toolchain not in Clang search path (bnc#1012382).
- kbuild: clang: add -no-integrated-as to KBUILD_[AC]FLAGS (bnc#1012382).
- kbuild: clang: Disable 'address-of-packed-member' warning (bnc#1012382).
- kbuild: clang: disable unused variable warnings only when constant (bnc#1012382).
- kbuild: clang: fix build failures with sparse check (bnc#1012382).
- kbuild: clang: remove crufty HOSTCFLAGS (bnc#1012382).
- kbuild: Consolidate header generation from ASM offset information (bnc#1012382).
- kbuild: consolidate redundant sed script ASM offset generation (bnc#1012382).
- kbuild: drop -Wno-unknown-warning-option from clang options (bnc#1012382).
- kbuild: fix asm-offset generation to work with clang (bnc#1012382).
- kbuild: fix kernel/bounds.c 'W=1' warning (bnc#1012382).
- kbuild: fix linker feature test macros when cross compiling with Clang (bnc#1012382).
- kbuild, LLVMLinux: Add -Werror to cc-option to support clang (bnc#1012382).
- kbuild: move cc-option and cc-disable-warning after incl. arch Makefile (bnc#1012382).
- kbuild: Set KBUILD_CFLAGS before incl. arch Makefile (bnc#1012382).
- kbuild: set no-integrated-as before incl. arch Makefile (bnc#1012382).
- kbuild: suppress packed-not-aligned warning for default setting only (bnc#1012382).
- kbuild: use -Oz instead of -Os when using clang (bnc#1012382).
- kdb: use memmove instead of overlapping memcpy (bnc#1012382).
- kdb: Use strscpy with destination buffer size (bnc#1012382).
- kernfs: Replace strncpy with memcpy (bnc#1012382).
- KEYS: put keyring if install_session_keyring_to_cred() fails (bnc#1012382).
- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bnc#1012382).
- kgdboc: Fix restrict error (bnc#1012382).
- kgdboc: Fix warning with module build (bnc#1012382).
- kgdboc: Passing ekgdboc to command line causes panic (bnc#1012382).
- kobject: Replace strncpy with memcpy (bnc#1012382).
- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bnc#1012382).
- KVM: arm64: Fix caching of host MDCR_EL2 value (bsc#1121242).
- KVM: arm: Restore banked registers and physical timer access on hyp_panic() (bsc#1121240).
- KVM: mmu: Fix race in emulated page table writes (bnc#1012382).
- KVM: nVMX: Always reflect #NM VM-exits to L1 (bsc#1106240).
- KVM: nVMX: Eliminate vmcs02 pool (bnc#1012382).
- KVM: nVMX: mark vmcs12 pages dirty on L2 exit (bnc#1012382).
- KVM: PPC: Move and undef TRACE_INCLUDE_PATH/FILE (bnc#1012382).
- KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRL (bnc#1012382 bsc#1068032).
- KVM/SVM: Ensure an IBPB on all affected CPUs when freeing a vmcb (bsc#1114648).
- KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL (bnc#1012382 bsc#1068032 bsc#1096242 bsc#1096281).
- KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES (bnc#1012382).
- KVM/VMX: introduce alloc_loaded_vmcs (bnc#1012382).
- KVM/VMX: make MSR bitmaps per-VCPU (bnc#1012382).
- KVM/x86: Add IBPB support (bnc#1012382 bsc#1068032 bsc#1068032).
- KVM/x86: fix empty-body warnings (bnc#1012382).
- KVM/x86: Remove indirect MSR op calls from SPEC_CTRL (bnc#1012382).
- KVM/x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bnc#1012382).
- lan78xx: Check for supported Wake-on-LAN modes (bnc#1012382).
- leds: call led_pwm_set() in leds-pwm to enforce default LED_OFF (bnc#1012382).
- leds: leds-gpio: Fix return value check in create_gpio_led() (bnc#1012382).
- leds: turn off the LED and wait for completion on unregistering LED class device (bnc#1012382).
- libata: whitelist all SAMSUNG MZ7KM* solid-state disks (bnc#1012382).
- libceph: bump CEPH_MSG_MAX_DATA_LEN (bsc#1114839).
- libceph: fall back to sendmsg for slab pages (bsc#1118316).
- libfc: sync strings with upstream versions (bsc#1114763).
- lib/interval_tree_test.c: allow full tree search (bnc#1012382).
- lib/interval_tree_test.c: allow users to limit scope of endpoint (bnc#1012382).
- lib/interval_tree_test.c: make test options module parameters (bnc#1012382).
- libnvdimm, {btt, blk}: do integrity setup before add_disk() (bsc#1118926).
- libnvdimm, dimm: fix dpa reservation vs uninitialized label area (bsc#1118936).
- libnvdimm: fix integer overflow static analysis warning (bsc#1118922).
- libnvdimm: fix nvdimm_bus_lock() vs device_lock() ordering (bsc#1118915).
- libnvdimm: Hold reference on parent while scheduling async init (bnc#1012382).
- lib/raid6: Fix arm64 test build (bnc#1012382).
- lib/rbtree_test.c: make input module parameters (bnc#1012382).
- lib/rbtree-test: lower default params (bnc#1012382).
- llc: do not use sk_eat_skb() (bnc#1012382).
- lockd: fix access beyond unterminated strings in prints (bnc#1012382).
- locking/lockdep: Fix debug_locks off performance problem (bnc#1012382).
- mac80211: Always report TX status (bnc#1012382).
- mac80211: Clear beacon_int in ieee80211_do_stop (bnc#1012382).
- mac80211: fix reordering of buffered broadcast packets (bnc#1012382).
- mac80211_hwsim: do not omit multicast announce of first added radio (bnc#1012382).
- mac80211_hwsim: fix module init error paths for netlink (bnc#1012382).
- mac80211_hwsim: Timer should be initialized before device registered (bnc#1012382).
- mac80211: ignore NullFunc frames in the duplicate detection (bnc#1012382).
- mac80211: ignore tx status for PS stations in ieee80211_tx_status_ext (bnc#1012382).
- mach64: fix display corruption on big endian machines (bnc#1012382).
- mach64: fix image corruption due to reading accelerator registers (bnc#1012382).
- matroxfb: fix size of memcpy (bnc#1012382).
- MD: do not check MD_SB_CHANGE_CLEAN in md_allow_write.
- MD: fix invalid stored role for a disk (bnc#1012382).
- MD: fix invalid stored role for a disk - try2 (bnc#1012382).
- media: dvb-frontends: fix i2c access helpers for KASAN (bnc#1012382).
- media: em28xx: fix input name for Terratec AV 350 (bnc#1012382).
- media: em28xx: Fix use-after-free when disconnecting (bnc#1012382).
- media: em28xx: make v4l2-compliance happier by starting sequence on zero (bnc#1012382).
- media: em28xx: use a default format if TRY_FMT fails (bnc#1012382).
- media: pci: cx23885: handle adding to list failure (bnc#1012382).
- media: tvp5150: fix width alignment during set_selection() (bnc#1012382).
- media: v4l: event: Add subscription to list before calling 'add' operation (bnc#1012382).
- media: vivid: free bitmap_cap when updating std/timings/etc (bnc#1012382).
- MIPS: Align kernel load address to 64KB (bnc#1012382).
- MIPS: DEC: Fix an int-handler.S CPU_DADDI_WORKAROUNDS regression (bnc#1012382).
- MIPS: Ensure pmd_present() returns false after pmd_mknotpresent() (bnc#1012382).
- MIPS: Fix FCSR Cause bit handling for correct SIGFPE issue (bnc#1012382).
- MIPS: fix mips_get_syscall_arg o32 check (bnc#1012382).
- MIPS: Handle non word sized instructions when examining frame (bnc#1012382).
- MIPS: kexec: Mark CPU offline before disabling local IRQ (bnc#1012382).
- MIPS: Loongson-3: Fix BRIDGE irq delivery problem (bnc#1012382).
- MIPS: Loongson-3: Fix CPU UART irq delivery problem (bnc#1012382).
- MIPS: microMIPS: Fix decoding of swsp16 instruction (bnc#1012382).
- MIPS: OCTEON: fix out of bounds array access on CN68XX (bnc#1012382).
- MIPS: ralink: Fix mt7620 nd_sd pinmux (bnc#1012382).
- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bnc#1012382).
- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bnc#1012382).
- mmc: core: Reset HPI enabled state during re-init and in case of errors (bnc#1012382).
- mm: cleancache: fix corruption on missed inode invalidation (bnc#1012382).
- mmc: OMAP: fix broken MMC on OMAP15XX/OMAP5910/OMAP310 (bnc#1012382).
- mmc: omap_hsmmc: fix DMA API warning (bnc#1012382).
- mmc: sdhci-pci-o2micro: Add quirk for O2 Micro dev 0x8620 rev 0x01 (bnc#1012382).
- mm, devm_memremap_pages: kill mapping 'System RAM' support (bnc#1012382).
- mm: do not bug_on on incorrect length in __mm_populate() (bnc#1012382).
- mm: do not miss the last page because of round-off error (bnc#1118798).
- mm, elf: handle vm_brk error (bnc#1012382).
- mm, hugetlb: fix huge_pte_alloc BUG_ON (bsc#1119204).
- mm: hwpoison: call shake_page() after try_to_unmap() for mlocked page (bnc#1116336).
- mm: lower the printk loglevel for __dump_page messages (generic hotplug debugability).
- mm, memory_hotplug: be more verbose for memory offline failures (generic hotplug debugability).
- mm, memory_hotplug: drop pointless block alignment checks from __offline_pages (generic hotplug debugability).
- mm, memory_hotplug: print reason for the offlining failure (generic hotplug debugability).
- mm: migration: fix migration of huge PMD shared pages (bnc#1012382).
- mm: mlock: avoid increase mm-&gt;locked_vm on mlock() when already mlock2(,MLOCK_ONFAULT) (bnc#1012382).
- mm/nommu.c: Switch __get_user_pages_unlocked() to use __get_user_pages() (bnc#1012382).
- mm: Preserve _PAGE_DEVMAP across mprotect() calls (bsc#1118790).
- mm: print more information about mapping in __dump_page (generic hotplug debugability).
- mm: put_and_wait_on_page_locked() while page is migrated (bnc#1109272).
- mm: refuse wrapped vm_brk requests (bnc#1012382).
- mm: remove write/force parameters from __get_user_pages_locked() (bnc#1012382 bsc#1027260).
- mm: remove write/force parameters from __get_user_pages_unlocked() (bnc#1012382 bsc#1027260).
- mm: replace __access_remote_vm() write parameter with gup_flags (bnc#1012382).
- mm: replace access_remote_vm() write parameter with gup_flags (bnc#1012382).
- mm: replace get_user_pages_locked() write/force parameters with gup_flags (bnc#1012382 bsc#1027260).
- mm: replace get_user_pages_unlocked() write/force parameters with gup_flags (bnc#1012382 bsc#1027260).
- mm: replace get_user_pages() write/force parameters with gup_flags (bnc#1012382 bsc#1027260).
- mm: replace get_vaddr_frames() write/force parameters with gup_flags (bnc#1012382).
- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).
- modules: mark __inittest/__exittest as __maybe_unused (bnc#1012382).
- mount: Do not allow copying MNT_UNBINDABLE|MNT_LOCKED mounts (bnc#1012382).
- mount: Prevent MNT_DETACH from disconnecting locked mounts (bnc#1012382).
- mount: Retest MNT_LOCKED in do_umount (bnc#1012382).
- Move usb-audio UAF fix into sorted section
- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bnc#1012382).
- mtd: spi-nor: Add support for is25wp series chips (bnc#1012382).
- mv88e6060: disable hardware level MAC learning (bnc#1012382).
- mwifiex: Fix NULL pointer dereference in skb_dequeue() (bnc#1012382).
- mwifiex: fix p2p device does not find in scan problem (bnc#1012382).
- namei: allow restricted O_CREAT of FIFOs and regular files (bnc#1012382).
- neighbour: Avoid writing before skb-&gt;head in neigh_hh_output() (bnc#1012382).
- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (bnc#1012382).
- net/af_iucv: drop inbound packets with invalid flags (bnc#1114475, LTC#172679).
- net/af_iucv: fix skb handling on HiperTransport xmit error (bnc#1114475, LTC#172679).
- net: amd: add missing of_node_put() (bnc#1012382).
- net: bcmgenet: fix OF child-node lookup (bnc#1012382).
- net: bridge: remove ipv6 zero address check in mcast queries (bnc#1012382).
- net: cxgb3_main: fix a missing-check bug (bnc#1012382).
- net: drop skb on failure in ip_check_defrag() (bnc#1012382).
- net: drop write-only stack variable (bnc#1012382).
- net: ena: add functions for handling Low Latency Queues in ena_com (bsc#1117562).
- net: ena: add functions for handling Low Latency Queues in ena_netdev (bsc#1117562).
- net: ena: change rx copybreak default to reduce kernel memory pressure (bsc#1117562).
- net: ena: complete host info to match latest ENA spec (bsc#1117562).
- net: ena: enable Low Latency Queues (bsc#1117562).
- net: ena: explicit casting and initialization, and clearer error handling (bsc#1117562).
- net: ena: fix auto casting to boolean (bsc#1117562).
- net: ena: fix compilation error in xtensa architecture (bsc#1117562).
- net: ena: fix crash during ena_remove() (bsc#1108240).
- net: ena: fix crash during failed resume from hibernation (bsc#1117562).
- net: ena: fix indentations in ena_defs for better readability (bsc#1117562).
- net: ena: Fix Kconfig dependency on X86 (bsc#1117562).
- net: ena: fix NULL dereference due to untimely napi initialization (bsc#1117562).
- net: ena: fix rare bug when failed restart/resume is followed by driver removal (bsc#1117562).
- net: ena: fix warning in rmmod caused by double iounmap (bsc#1117562).
- net: ena: introduce Low Latency Queues data structures according to ENA spec (bsc#1117562).
- net: ena: limit refill Rx threshold to 256 to avoid latency issues (bsc#1117562).
- net: ena: minor performance improvement (bsc#1117562).
- net: ena: remove ndo_poll_controller (bsc#1117562).
- net: ena: remove redundant parameter in ena_com_admin_init() (bsc#1117562).
- net: ena: update driver version from 2.0.1 to 2.0.2 (bsc#1108240).
- net: ena: update driver version to 2.0.1 (bsc#1117562).
- net: ena: use CSUM_CHECKED device indication to report skb's checksum status (bsc#1117562).
- net: faraday: ftmac100: remove netif_running(netdev) check before disabling interrupts (bnc#1012382).
- netfilter: ipset: actually allow allowable CIDR 0 in hash:net,port,net (bnc#1012382).
- netfilter: ipset: Correct rcu_dereference() call in ip_set_put_comment() (bnc#1012382).
- netfilter: nf_tables: fix oops when inserting an element into a verdict map (bnc#1012382).
- netfilter: xt_IDLETIMER: add sysfs filename checking routine (bnc#1012382).
- net-gro: reset skb-&gt;pkt_type in napi_reuse_skb() (bnc#1012382).
- net: hisilicon: remove unexpected free_netdev (bnc#1012382).
- net: ibm: fix return type of ndo_start_xmit function ().
- net/ibmnvic: Fix deadlock problem in reset ().
- net/ibmvnic: Fix RTNL deadlock during device reset (bnc#1115431).
- net/ipv4: defensive cipso option parsing (bnc#1012382).
- net/ipv4: do not handle duplicate fragments as overlapping (bsc#1116345).
- net/ipv6: Fix index counter for unicast addresses in in6_dump_addrs (bnc#1012382).
- net/mlx4_core: Correctly set PFC param if global pause is turned off (bsc#1015336 bsc#1015337 bsc#1015340).
- net/mlx4_core: Fix uninitialized variable compilation warning (bnc#1012382).
- net/mlx4_core: Zero out lkey field in SW2HW_MPT fw command (bnc#1012382).
- net/mlx4: Fix UBSAN warning of signed integer overflow (bnc#1012382).
- net: phy: do not allow __set_phy_supported to add unsupported modes (bnc#1012382).
- net: Prevent invalid access to skb-&gt;prev in __qdisc_drop_all (bnc#1012382).
- net: qla3xxx: Remove overflowing shift statement (bnc#1012382).
- netrom: fix locking in nr_find_socket() (bnc#1012382).
- net: sched: gred: pass the right attribute to gred_change_table_def() (bnc#1012382).
- net: socket: fix a missing-check bug (bnc#1012382).
- net: stmmac: Fix stmmac_mdio_reset() when building stmmac as modules (bnc#1012382).
- net: thunderx: fix NULL pointer dereference in nic_remove (bnc#1012382).
- new helper: uaccess_kernel() (bnc#1012382).
- NFC: nfcmrvl_uart: fix OF child-node lookup (bnc#1012382).
- nfit: skip region registration for incomplete control regions (bsc#1118930).
- nfsd: Fix an Oops in free_session() (bnc#1012382).
- NFS: Ensure we commit after writeback is complete (bsc#1111809).
- NFSv4.1: Fix the r/wsize checking (bnc#1012382).
- NFSv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING.
- nvme: validate controller state before rescheduling keep alive (bsc#1103257).
- ocfs2: fix a misuse a of brelse after failing ocfs2_check_dir_entry (bnc#1012382).
- ocfs2: fix deadlock caused by ocfs2_defrag_extent() (bnc#1012382).
- ocfs2: fix potential use after free (bnc#1012382).
- of: add helper to lookup compatible child node (bnc#1012382).
- packet: validate address length (bnc#1012382).
- packet: validate address length if non-zero (bnc#1012382).
- parisc: Fix address in HPMC IVA (bnc#1012382).
- parisc: Fix map_pages() to not overwrite existing pte entries (bnc#1012382).
- PCI: Add Device IDs for Intel GPU 'spurious interrupt' quirk (bnc#1012382).
- PCI/ASPM: Do not initialize link state when aspm_disabled is set (bsc#1109806).
- PCI/ASPM: Fix link_state teardown on device removal (bsc#1109806).
- PCI: vmd: Detach resources after stopping root bus (bsc#1106105).
- pcmcia: Implement CLKRUN protocol disabling for Ricoh bridges (bnc#1012382).
- perf/bpf: Convert perf_event_array to use struct file (bsc#1119967).
- perf/core: Do not leak event in the syscall error path (bnc#1012382).
- perf pmu: Suppress potential format-truncation warning (bnc#1012382).
- perf/ring_buffer: Prevent concurent ring buffer access (bnc#1012382).
- perf tools: Cleanup trace-event-info 'tdata' leak (bnc#1012382).
- perf tools: Disable parallelism for 'make clean' (bnc#1012382).
- perf tools: Free temporary 'sys' string in read_event_files() (bnc#1012382).
- pinctrl: qcom: spmi-mpp: Fix drive strength setting (bnc#1012382).
- pinctrl: qcom: spmi-mpp: Fix err handling of pmic_mpp_set_mux (bnc#1012382).
- pinctrl: spmi-mpp: Fix pmic_mpp_config_get() to be compliant (bnc#1012382).
- pinctrl: ssbi-gpio: Fix pm8xxx_pin_config_get() to be compliant (bnc#1012382).
- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bnc#1012382).
- platform/x86: acerhdf: Add BIOS entry for Gateway LT31 v1.3307 (bnc#1012382).
- PM / devfreq: tegra: fix error return code in tegra_devfreq_probe() (bnc#1012382).
- pNFS: Fix a deadlock between read resends and layoutreturn.
- pNFS/flexfiles: Fix up the ff_layout_write_pagelist failure path.
- pNFS/flexfiles: When checking for available DSes, conditionally check for MDS io.
- pnfs: set NFS_IOHDR_REDO in pnfs_read_resend_pnfs.
- powerpc/64s: consolidate MCE counter increment (bsc#1094244).
- powerpc/boot: Ensure _zimage_start is a weak symbol (bnc#1012382).
- powerpc/boot: Fix random libfdt related build errors (bnc#1012382).
- powerpc/boot: Request no dynamic linker for boot wrapper (bsc#1070805).
- powerpc: Fix COFF zImage booting on old powermacs (bnc#1012382).
- powerpc/mm/radix: Use mm-&gt;task_size for boundary checking instead of addr_limit (bsc#1027457).
- powerpc/msi: Fix compile error on mpc83xx (bnc#1012382).
- powerpc/msi: Fix NULL pointer access in teardown code (bnc#1012382).
- powerpc/nohash: fix undefined behaviour when testing page size support (bnc#1012382).
- powerpc/numa: Suppress 'VPHN is not supported' messages (bnc#1012382).
- powerpc/powernv: Do not select the cpufreq governors (bsc#1066223).
- powerpc/powernv: Fix opal_event_shutdown() called with interrupts disabled (bsc#1066223).
- powerpc/powernv/pci: Work around races in PCI bridge enabling (bsc#1066223).
- powerpc/pseries: Fix DTL buffer registration (bsc#1066223).
- powerpc/pseries: Fix how we iterate over the DTL entries (bsc#1066223).
- powerpc/pseries/mobility: Extend start/stop topology update scope (bsc#1116950, bsc#1115709).
- powerpc/traps: restore recoverability of machine_check interrupts (bsc#1094244).
- power: supply: olpc_battery: correct the temperature units (bnc#1012382).
- printk: Fix panic caused by passing log_buf_len to command line (bnc#1012382).
- Provide a temporary fix for STIBP on-by-default (bsc#1116497).
- pstore: Convert console write to use -&gt;write_buf (bnc#1012382).
- ptp: fix Spectre v1 vulnerability (bnc#1012382).
- pxa168fb: prepare the clock (bnc#1012382).
- qed: Fix bitmap_weight() check (bsc#1019695).
- qed: Fix PTT leak in qed_drain() (bnc#1012382).
- qed: Fix QM getters to always return a valid pq (bsc#1019695 ).
- qed: Fix reading wrong value in loop condition (bnc#1012382).
- r8152: Check for supported Wake-on-LAN Modes (bnc#1012382).
- r8169: fix NAPI handling under high load (bnc#1012382).
- rapidio/rionet: do not free skb before reading its length (bnc#1012382).
- RDMA/ucma: Fix Spectre v1 vulnerability (bnc#1012382).
- reiserfs: propagate errors from fill_with_dentries() properly (bnc#1012382).
- Reorder a few commits in kGraft out of tree section
- Revert 'Bluetooth: h5: Fix missing dependency on BT_HCIUART_SERDEV' (bnc#1012382).
- Revert 'ceph: fix dentry leak in splice_dentry()' (bsc#1114839).
- Revert 'drm/rockchip: Allow driver to be shutdown on reboot/kexec' (bsc#1106929)
- Revert 'exec: avoid gcc-8 warning for get_task_comm' (kabi).
- Revert 'iommu/io-pgtable-arm: Check for v7s-incapable systems' (bsc#1106105).
- Revert 'media: v4l: event: Add subscription to list before calling 'add' operation' (kabi).
- Revert 'media: videobuf2-core: do not call memop 'finish' when queueing' (bnc#1012382).
- Revert 'PCI/ASPM: Do not initialize link state when aspm_disabled is set' (bsc#1106105).
- Revert 'usb: musb: musb_host: Enable HCD_BH flag to handle urb return in bottom half' (bsc#1047487).
- Revert 'wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout()' (bnc#1012382).
- Revert 'x86/kconfig: Fall back to ticket spinlocks' (kabi).
- rocker: fix rocker_tlv_put_* functions for KASAN (bnc#1012382).
- rpcrdma: Add RPCRDMA_HDRLEN_ERR.
- rpm/kernel-binary.spec.in: Add missing export BRP_SIGN_FILES (bsc#1115587). 
- rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1042286 bsc#1108145).
- rtc: hctosys: Add missing range error reporting (bnc#1012382).
- rtc: snvs: add a missing write sync (bnc#1012382).
- rtc: snvs: Add timeouts to avoid kernel lockups (bnc#1012382).
- rtnetlink: Disallow FDB configuration for non-Ethernet device (bnc#1012382).
- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (bnc#1012382).
- s390/cpum_cf: Reject request for sampling in event initialization (bnc#1012382).
- s390/mm: Check for valid vma before zapping in gmap_discard (bnc#1012382).
- s390/mm: Fix ERROR: '__node_distance' undefined! (bnc#1012382).
- s390: qeth_core_mpc: Use ARRAY_SIZE instead of reimplementing its function (bnc#1114475, LTC#172682).
- s390/qeth: fix HiperSockets sniffer (bnc#1114475, LTC#172953).
- s390/qeth: fix length check in SNMP processing (bnc#1012382).
- s390: qeth: Fix potential array overrun in cmd/rc lookup (bnc#1114475, LTC#172682).
- s390/vdso: add missing FORCE to build targets (bnc#1012382).
- sbus: char: add of_node_put() (bnc#1012382).
- sc16is7xx: Fix for multi-channel stall (bnc#1012382).
- sched/cgroup: Fix cgroup entity load tracking tear-down (bnc#1012382).
- sched/fair: Fix throttle_list starvation with low CFS quota (bnc#1012382).
- sch_red: update backlog as well (bnc#1012382).
- scsi: aacraid: Fix typo in blink status (bnc#1012382).
- scsi: bfa: convert to strlcpy/strlcat (bnc#1012382 bsc#1019683, ).
- scsi: bnx2fc: Fix NULL dereference in error handling (bnc#1012382).
- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).
- scsi: Create two versions of scsi_internal_device_unblock() (bsc#1119877).
- scsi: csiostor: Avoid content leaks and casts (bnc#1012382).
- scsi: esp_scsi: Track residual for PIO transfers (bnc#1012382).
- scsi: Introduce scsi_start_queue() (bsc#1119877).
- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1103624, bsc#1104731).
- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).
- scsi: libiscsi: Fix NULL pointer dereference in iscsi_eh_session_reset (bnc#1012382).
- scsi: lpfc: Add Buffer overflow check, when nvme_info larger than PAGE_SIZE (bsc#1102660).
- scsi: lpfc: Correct soft lockup when running mds diagnostics (bnc#1012382).
- scsi: lpfc: devloss timeout race condition caused null pointer reference (bsc#1102660).
- scsi: lpfc: Fix abort error path for NVMET (bsc#1102660).
- scsi: lpfc: fix block guard enablement on SLI3 adapters (bsc#1079935).
- scsi: lpfc: Fix driver crash when re-registering NVME rports (bsc#1102660).
- scsi: lpfc: Fix ELS abort on SLI-3 adapters (bsc#1102660).
- scsi: lpfc: Fix list corruption on the completion queue (bsc#1102660).
- scsi: lpfc: Fix NVME Target crash in defer rcv logic (bsc#1102660).
- scsi: lpfc: Fix panic if driver unloaded when port is offline (bsc#1102660).
- scsi: lpfc: update driver version to 11.4.0.7-5 (bsc#1102660).
- scsi: Make __scsi_remove_device go straight from BLOCKED to DEL (bsc#1119877).
- scsi: megaraid_sas: fix a missing-check bug (bnc#1012382).
- scsi: Protect SCSI device state changes with a mutex (bsc#1119877).
- scsi: qedi: Add ISCSI_BOOT_SYSFS to Kconfig (bsc#1043083).
- scsi: qla2xxx: Fix crashes in qla2x00_probe_one on probe failure (bsc#1094973).
- scsi: qla2xxx: Fix incorrect port speed being set for FC adapters (bnc#1012382).
- scsi: qla2xxx: Fix small memory leak in qla2x00_probe_one on probe failure (bsc#1094973).
- scsi: Re-export scsi_internal_device_{,un}_block() (bsc#1119877).
- scsi: Split scsi_internal_device_block() (bsc#1119877).
- scsi: target: add emulate_pr backstore attr to toggle PR support (bsc#1091405).
- scsi: target: drop unused pi_prot_format attribute storage (bsc#1091405).
- scsi: ufs: fix bugs related to null pointer access and array size (bnc#1012382).
- scsi: ufs: fix race between clock gating and devfreq scaling work (bnc#1012382).
- scsi: ufshcd: Fix race between clk scaling and ungate work (bnc#1012382).
- scsi: ufshcd: release resources if probe fails (bnc#1012382).
- scsi: use 'inquiry_mutex' instead of 'state_mutex' (bsc#1119877).
- scsi: vmw_pscsi: Rearrange code to avoid multiple calls to free_irq during unload (bnc#1012382).
- scsi: zfcp: fix posting too many status read buffers leading to adapter shutdown (bnc#1012382).
- sctp: clear the transport of some out_chunk_list chunks in sctp_assoc_rm_peer (bnc#1012382).
- sctp: fix race on sctp_id2asoc (bnc#1012382).
- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (bnc#1012382).
- selftests: ftrace: Add synthetic event syntax testcase (bnc#1012382).
- selftests: Move networking/timestamping from Documentation (bnc#1012382).
- seq_file: fix incomplete reset on read from zero offset.
- ser_gigaset: use container_of() instead of detour (bnc#1012382).
- signal: Always deliver the kernel's SIGKILL and SIGSTOP to a pid namespace init (bnc#1012382).
- signal/GenWQE: Fix sending of SIGKILL (bnc#1012382).
- smb3: allow stats which track session and share reconnects to be reset (bnc#1012382).
- smb3: do not attempt cifs operation in smb3 query info error path (bnc#1012382).
- smb3: on kerberos mount if server does not specify auth type use krb5 (bnc#1012382).
- smsc75xx: Check for Wake-on-LAN modes (bnc#1012382).
- smsc95xx: Check for Wake-on-LAN modes (bnc#1012382).
- sock: Make sock-&gt;sk_stamp thread-safe (bnc#1012382).
- soc/tegra: pmc: Fix child-node lookup (bnc#1012382).
- sparc64: Fix exception handling in UltraSPARC-III memcpy (bnc#1012382).
- sparc64 mm: Fix more TSB sizing issues (bnc#1012382).
- sparc: Fix single-pcr perf event counter management (bnc#1012382).
- sparc/pci: Refactor dev_archdata initialization into pci_init_dev_archdata (bnc#1012382).
- spi: bcm2835: Avoid finishing transfer prematurely in IRQ mode (bnc#1012382).
- spi: bcm2835: Fix book-keeping of DMA termination (bnc#1012382).
- spi: bcm2835: Fix race on DMA termination (bnc#1012382).
- spi: bcm2835: Unbreak the build of esoteric configs (bnc#1012382).
- spi/bcm63xx: fix error return code in bcm63xx_spi_probe() (bnc#1012382).
- spi/bcm63xx-hspi: fix error return code in bcm63xx_hsspi_probe() (bnc#1012382).
- spi: xlp: fix error return code in xlp_spi_probe() (bnc#1012382).
- sr9800: Check for supported Wake-on-LAN modes (bnc#1012382).
- sr: pass down correctly sized SCSI sense buffer (bnc#1012382).
- Staging: lustre: remove two build warnings (bnc#1012382).
- staging: rts5208: fix gcc-8 logic error warning (bnc#1012382).
- staging: speakup: Replace strncpy with memcpy (bnc#1012382).
- sunrpc: correct the computation for page_ptr when truncating (bnc#1012382).
- SUNRPC: drop pointless static qualifier in xdr_get_next_encode_buffer() (bnc#1012382).
- SUNRPC: Fix a bogus get/put in generic_key_to_expire() (bnc#1012382).
- SUNRPC: Fix a potential race in xprt_connect().
- SUNRPC: fix cache_head leak due to queued request (bnc#1012382).
- SUNRPC: Fix leak of krb5p encode pages (bnc#1012382).
- svcrdma: Remove unused variable in rdma_copy_tail().
- swim: fix cleanup on setup error (bnc#1012382).
- swiotlb: clean up reporting (bnc#1012382).
- sysv: return 'err' instead of 0 in __sysv_write_inode (bnc#1012382).
- target/iscsi: avoid NULL dereference in CHAP auth error path (bsc#1117165).
- target: se_dev_attrib.emulate_pr ABI stability (bsc#1091405).
- tcp: fix NULL ref in tail loss probe (bnc#1012382).
- TC: Set DMA masks for devices (bnc#1012382).
- termios, tty/tty_baudrate.c: fix buffer overrun (bnc#1012382).
- tg3: Add PHY reset for 5717/5719/5720 in change ring and flow control paths (bnc#1012382).
- thermal: allow spear-thermal driver to be a module (bnc#1012382).
- thermal: allow u8500-thermal driver to be a module (bnc#1012382).
- timer/debug: Change /proc/timer_list from 0444 to 0400 (bnc#1012382).
- tmpfs: make lseek(SEEK_DATA/SEK_HOLE) return ENXIO with a negative offset (bnc#1012382).
- tpm: fix response size validation in tpm_get_random() (bsc#1020645).
- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bnc#1012382).
- tracing: Fix bad use of igrab in trace_uprobe.c (bsc#1120046).
- tracing: Fix memory leak in set_trigger_filter() (bnc#1012382).
- tracing: Fix memory leak of instance function hash filters (bnc#1012382).
- tracing: Skip more functions when doing stack tracing of events (bnc#1012382).
- tty: check name length in tty_find_polling_driver() (bnc#1012382).
- tty: serial: 8250_mtk: always resume the device in probe (bnc#1012382).
- tty: serial: sprd: fix error return code in sprd_probe() (bnc#1012382).
- tty: wipe buffer (bnc#1012382).
- tty: wipe buffer if not echoing data (bnc#1012382).
- tun: Consistently configure generic netdev params via rtnetlink (bnc#1012382).
- tun: forbid iface creation with rtnl ops (bnc#1012382).
- uio: ensure class is registered before devices (bnc#1012382).
- uio: Fix an Oops on load (bnc#1012382).
- uio: make symbol 'uio_class_registered' static.
- um: Avoid longjmp/setjmp symbol clashes with libpthread.a (bnc#1012382).
- um: Give start_idle_thread() a return code (bnc#1012382).
- unifdef: use memcpy instead of strncpy (bnc#1012382).
- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bnc#1012382).
- usb: appledisplay: Add 27' Apple Cinema Display (bnc#1012382).
- usb: cdc-acm: add entry for Hiro (Conexant) modem (bnc#1012382).
- usb: check usb_get_extra_descriptor for proper size (bnc#1012382).
- usb: chipidea: Prevent unbalanced IRQ disable (bnc#1012382).
- usb: core: Fix hub port connection events lost (bnc#1012382).
- usb: core: quirks: add RESET_RESUME quirk for Cherry G230 Stream series (bnc#1012382).
- usb: dwc3: omap: fix error return code in dwc3_omap_probe() (bnc#1012382).
- usb: ehci-omap: fix error return code in ehci_hcd_omap_probe() (bnc#1012382).
- usb: fix the usbfs flag sanitization for control transfers (bnc#1012382).
- usb: gadget: dummy: fix nonsensical comparisons (bnc#1012382).
- usb: gadget: storage: Fix Spectre v1 vulnerability (bnc#1012382).
- usb: imx21-hcd: fix error return code in imx21_probe() (bnc#1012382).
- usb: misc: appledisplay: add 20' Apple Cinema Display (bnc#1012382).
- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (bnc#1012382).
- usb: omap_udc: fix crashes on probe error and module removal (bnc#1012382).
- usb: omap_udc: fix omap_udc_start() on 15xx machines (bnc#1012382).
- usb: omap_udc: fix USB gadget functionality on Palm Tungsten E (bnc#1012382).
- usb: omap_udc: use devm_request_irq() (bnc#1012382).
- usb: quirk: add no-LPM quirk on SanDisk Ultra Flair device (bnc#1012382).
- usb: quirks: Add delay-init quirk for Corsair K70 LUX RGB (bnc#1012382).
- usb: quirks: Add no-lpm quirk for Raydium touchscreens (bnc#1012382).
- usb: r8a66597: Fix a possible concurrency use-after-free bug in r8a66597_endpoint_disable() (bnc#1012382).
- usb: serial: option: add Fibocom NL678 series (bnc#1012382).
- usb: serial: option: add GosunCn ZTE WeLink ME3630 (bnc#1012382).
- usb: serial: option: add HP lt4132 (bnc#1012382).
- usb: serial: option: add Simcom SIM7500/SIM7600 (MBIM mode) (bnc#1012382).
- usb: serial: option: add Telit LN940 series (bnc#1012382).
- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bnc#1012382).
- usb-storage: fix bogus hardware error messages for ATA pass-thru devices (bnc#1012382).
- usb: usb-storage: Add new IDs to ums-realtek (bnc#1012382).
- usb: xhci: fix timeout for transition from RExit to U0 (bnc#1012382).
- usb: xhci: fix uninitialized completion when USB3 port got wrong status (bnc#1012382).
- usb: xhci: Prevent bus suspend if a port connect change or polling state is detected (bnc#1012382).
- v9fs_dir_readdir: fix double-free on p9stat_read error (bnc#1012382).
- vfs: Avoid softlockups in drop_pagecache_sb() (bsc#1118505).
- vhost: Fix Spectre V1 vulnerability (bnc#1012382).
- vhost: make sure used idx is seen before log in vhost_add_used_n() (bnc#1012382).
- vhost/scsi: truncate T10 PI iov_iter to prot_bytes (bnc#1012382).
- video: fbdev: pxa3xx_gcu: fix error return code in pxa3xx_gcu_probe() (bnc#1012382).
- virtio/s390: avoid race on vcdev-&gt;config (bnc#1012382).
- virtio/s390: fix race in ccw_io_helper() (bnc#1012382).
- VSOCK: Send reset control packet when socket is partially bound (bnc#1012382).
- vti6: flush x-netns xfrm cache when vti interface is removed (bnc#1012382).
- w1: omap-hdq: fix missing bus unregister at removal (bnc#1012382).
- x86: boot: Fix EFI stub alignment (bnc#1012382).
- x86/boot: #undef memcpy() et al in string.c (bnc#1012382).
- x86/build: Fix stack alignment for CLang (bnc#1012382).
- x86/build: Specify stack alignment for clang (bnc#1012382).
- x86/build: Use __cc-option for boot code compiler options (bnc#1012382).
- x86/build: Use cc-option to validate stack alignment parameter (bnc#1012382).
- x86/corruption-check: Fix panic in memory_corruption_check() when boot option without value is provided (bnc#1012382).
- x86/earlyprintk/efi: Fix infinite loop on some screen widths (bnc#1012382).
- x86/entry: spell EBX register correctly in documentation (bnc#1012382).
- x86/kbuild: Use cc-option to enable -falign-{jumps/loops} (bnc#1012382).
- x86/kconfig: Fall back to ticket spinlocks (bnc#1012382).
- x86/MCE: Export memory_error() (bsc#1114648).
- x86/MCE: Make correctable error detection look at the Deferred bit (bsc#1114648).
- x86/mm/kaslr: Use the _ASM_MUL macro for multiplication to work around Clang incompatibility (bnc#1012382).
- x86/mm/pat: Prevent hang during boot when mapping pages (bnc#1012382).
- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bnc#1012382).
- x86/speculation/l1tf: Drop the swap storage limit restriction when l1tf=off (bnc#1114871).
- x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP (bnc#1012382).
- xen/balloon: Support xend-based toolstack (bnc#1065600).
- xen/blkfront: avoid NULL blkfront_info dereference on device removal (bsc#1111062).
- xen: fix race in xen_qlock_wait() (bnc#1012382).
- xen: fix xen_qlock_wait() (bnc#1012382).
- xen: make xen_qlock_wait() nestable (bnc#1012382).
- xen/netback: dont overflow meta array (bnc#1099523).
- xen/netfront: tolerate frags with no data (bnc#1012382).
- xen-swiotlb: use actually allocated size on check physical continuous (bnc#1012382).
- xen/x86: add diagnostic printout to xen_mc_flush() in case of error (bnc#1116183).
- xen: xlate_mmu: add missing header to fix 'W=1' warning (bnc#1012382).
- xfrm6: call kfree_skb when skb is toobig (bnc#1012382).
- xfrm: Clear sk_dst_cache when applying per-socket policy (bnc#1012382).
- xfrm: Fix bucket count reported to userspace (bnc#1012382).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfrm: Validate address prefix lengths in the xfrm selector (bnc#1012382).
- xfrm: validate template mode (bnc#1012382).
- xfs: Align compat attrlist_by_handle with native implementation.
- xfs/dmapi: restore event in xfs_getbmap (bsc#1114763).
- xfs: Fix error code in 'xfs_ioc_getbmap()'.
- xfs: fix quotacheck dquot id overflow infinite loop (bsc#1121621).
- xhci: Add quirk to workaround the errata seen on Cavium Thunder-X2 Soc (bsc#1117162).
- xhci: Do not prevent USB2 bus suspend in state check intended for USB3 only (bnc#1012382).
- xhci: Prevent U1/U2 link pm states if exit latency is too long (bnc#1012382).
- xprtrdma: checking for NULL instead of IS_ERR().
- xprtrdma: Disable pad optimization by default.
- xprtrdma: Disable RPC/RDMA backchannel debugging messages.
- xprtrdma: Fix additional uses of spin_lock_irqsave(rb_lock).
- xprtrdma: Fix backchannel allocation of extra rpcrdma_reps.
- xprtrdma: Fix Read chunk padding.
- xprtrdma: Fix receive buffer accounting.
- xprtrdma: Reset credit grant properly after a disconnect.
- xprtrdma: rpcrdma_bc_receive_call() should init rq_private_buf.len.
- xprtrdma: Serialize credit accounting again.
- xprtrdma: xprt_rdma_free() must not release backchannel reqs.
- xtensa: add NOTES section to the linker script (bnc#1012382).
- xtensa: enable coprocessors that are being flushed (bnc#1012382).
- xtensa: fix boot parameters address translation (bnc#1012382).
- xtensa: fix coprocessor context offset definitions (bnc#1012382).
- xtensa: make sure bFLT stack is 16 byte aligned (bnc#1012382).
- zram: close udev startup race condition as default groups (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-23"/>
	<updated date="2019-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015336">SUSE bug 1015336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015337">SUSE bug 1015337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015340">SUSE bug 1015340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019683">SUSE bug 1019683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019695">SUSE bug 1019695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020645">SUSE bug 1020645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027260">SUSE bug 1027260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027457">SUSE bug 1027457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043083">SUSE bug 1043083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046264">SUSE bug 1046264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048916">SUSE bug 1048916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069702">SUSE bug 1069702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070805">SUSE bug 1070805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079935">SUSE bug 1079935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091405">SUSE bug 1091405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094973">SUSE bug 1094973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096242">SUSE bug 1096242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096281">SUSE bug 1096281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099523">SUSE bug 1099523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100105">SUSE bug 1100105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101557">SUSE bug 1101557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102439">SUSE bug 1102439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102660">SUSE bug 1102660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103156">SUSE bug 1103156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103257">SUSE bug 1103257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103624">SUSE bug 1103624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104098">SUSE bug 1104098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104731">SUSE bug 1104731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105412">SUSE bug 1105412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106105">SUSE bug 1106105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106237">SUSE bug 1106237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106240">SUSE bug 1106240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106929">SUSE bug 1106929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107385">SUSE bug 1107385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108145">SUSE bug 1108145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108240">SUSE bug 1108240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109272">SUSE bug 1109272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109330">SUSE bug 1109330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109806">SUSE bug 1109806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110286">SUSE bug 1110286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111062">SUSE bug 1111062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111809">SUSE bug 1111809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112246">SUSE bug 1112246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112963">SUSE bug 1112963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113412">SUSE bug 1113412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114190">SUSE bug 1114190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114417">SUSE bug 1114417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114475">SUSE bug 1114475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114648">SUSE bug 1114648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114763">SUSE bug 1114763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114839">SUSE bug 1114839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114871">SUSE bug 1114871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115431">SUSE bug 1115431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115433">SUSE bug 1115433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115440">SUSE bug 1115440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115587">SUSE bug 1115587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115709">SUSE bug 1115709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116027">SUSE bug 1116027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116183">SUSE bug 1116183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116285">SUSE bug 1116285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116336">SUSE bug 1116336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116345">SUSE bug 1116345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116497">SUSE bug 1116497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116841">SUSE bug 1116841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116924">SUSE bug 1116924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116950">SUSE bug 1116950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117162">SUSE bug 1117162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117165">SUSE bug 1117165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117186">SUSE bug 1117186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117562">SUSE bug 1117562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118152">SUSE bug 1118152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118316">SUSE bug 1118316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118319">SUSE bug 1118319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118505">SUSE bug 1118505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118790">SUSE bug 1118790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118798">SUSE bug 1118798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118915">SUSE bug 1118915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118922">SUSE bug 1118922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118926">SUSE bug 1118926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118930">SUSE bug 1118930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118936">SUSE bug 1118936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119204">SUSE bug 1119204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119714">SUSE bug 1119714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119877">SUSE bug 1119877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119946">SUSE bug 1119946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119967">SUSE bug 1119967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119970">SUSE bug 1119970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120046">SUSE bug 1120046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120743">SUSE bug 1120743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121239">SUSE bug 1121239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121240">SUSE bug 1121240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121241">SUSE bug 1121241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121242">SUSE bug 1121242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121275">SUSE bug 1121275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121621">SUSE bug 1121621</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16939/">CVE-2017-16939 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16939">CVE-2017-16939 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1120/">CVE-2018-1120 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1120">CVE-2018-1120 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16862/">CVE-2018-16862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16862">CVE-2018-16862 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16884">CVE-2018-16884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19407/">CVE-2018-19407 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19407">CVE-2018-19407 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19824">CVE-2018-19824 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19985">CVE-2018-19985 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20169">CVE-2018-20169 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9568">CVE-2018-9568 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554094" comment="kernel-azure-4.4.170-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554095" comment="kernel-azure-base-4.4.170-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554096" comment="kernel-azure-devel-4.4.170-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554097" comment="kernel-devel-azure-4.4.170-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554098" comment="kernel-source-azure-4.4.170-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554099" comment="kernel-syms-azure-4.4.170-4.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149802" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1134689" ref_url="https://bugzilla.suse.com/1134689" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10130" ref_url="https://www.suse.com/security/cve/CVE-2019-10130/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005561.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

Security issue fixed:

- CVE-2019-10130: Prevent row-level security policies from being bypassed via selectivity estimators (bsc#1134689).

Bug fixes:

- For a complete list of fixes check the release notes.
  * https://www.postgresql.org/docs/10/release-10-8.html
  * https://www.postgresql.org/docs/10/release-10-7.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-14"/>
	<updated date="2019-06-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1134689">SUSE bug 1134689</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10130/">CVE-2019-10130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10130">CVE-2019-10130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554100" comment="libecpg6-10.8-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554101" comment="libpq5-10.8-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554102" comment="libpq5-32bit-10.8-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554103" comment="postgresql10-10.8-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554104" comment="postgresql10-contrib-10.8-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554105" comment="postgresql10-docs-10.8-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554106" comment="postgresql10-plperl-10.8-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554107" comment="postgresql10-plpython-10.8-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554108" comment="postgresql10-pltcl-10.8-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554109" comment="postgresql10-server-10.8-1.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149803" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1065237" ref_url="https://bugzilla.suse.com/1065237" source="BUGZILLA"/>
		<reference ref_id="1090671" ref_url="https://bugzilla.suse.com/1090671" source="BUGZILLA"/>
		<reference ref_id="1119183" ref_url="https://bugzilla.suse.com/1119183" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="1131709" ref_url="https://bugzilla.suse.com/1131709" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005565.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6109: Fixed an character encoding issue in the progress display of
  the scp client that could be used to manipulate client output, allowing
  for spoofing during file transfers (bsc#1121816).
- CVE-2019-6111: Properly validate object names received by the scp client to
  prevent arbitrary file overwrites when interacting with a malicious SSH server
  (bsc#1121821).

Other issues fixed: 

- Fixed two race conditions in sshd relating to SIGHUP (bsc#1119183).
- Returned proper reason for port forwarding failures (bsc#1090671).
- Fixed a double free() in the KDF CAVS testing tool (bsc#1065237).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-17"/>
	<updated date="2019-06-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1065237">SUSE bug 1065237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090671">SUSE bug 1090671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119183">SUSE bug 1119183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131709">SUSE bug 1131709</bugzilla>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6109">CVE-2019-6109 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6111">CVE-2019-6111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554110" comment="openssh-7.2p2-74.42.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554111" comment="openssh-askpass-gnome-7.2p2-74.42.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554112" comment="openssh-fips-7.2p2-74.42.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554113" comment="openssh-helpers-7.2p2-74.42.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149804" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1005778" ref_url="https://bugzilla.suse.com/1005778" source="BUGZILLA"/>
		<reference ref_id="1005780" ref_url="https://bugzilla.suse.com/1005780" source="BUGZILLA"/>
		<reference ref_id="1005781" ref_url="https://bugzilla.suse.com/1005781" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1019695" ref_url="https://bugzilla.suse.com/1019695" source="BUGZILLA"/>
		<reference ref_id="1019696" ref_url="https://bugzilla.suse.com/1019696" source="BUGZILLA"/>
		<reference ref_id="1022604" ref_url="https://bugzilla.suse.com/1022604" source="BUGZILLA"/>
		<reference ref_id="1053043" ref_url="https://bugzilla.suse.com/1053043" source="BUGZILLA"/>
		<reference ref_id="1063638" ref_url="https://bugzilla.suse.com/1063638" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1085535" ref_url="https://bugzilla.suse.com/1085535" source="BUGZILLA"/>
		<reference ref_id="1085539" ref_url="https://bugzilla.suse.com/1085539" source="BUGZILLA"/>
		<reference ref_id="1090888" ref_url="https://bugzilla.suse.com/1090888" source="BUGZILLA"/>
		<reference ref_id="1099658" ref_url="https://bugzilla.suse.com/1099658" source="BUGZILLA"/>
		<reference ref_id="1100132" ref_url="https://bugzilla.suse.com/1100132" source="BUGZILLA"/>
		<reference ref_id="1106110" ref_url="https://bugzilla.suse.com/1106110" source="BUGZILLA"/>
		<reference ref_id="1106284" ref_url="https://bugzilla.suse.com/1106284" source="BUGZILLA"/>
		<reference ref_id="1106929" ref_url="https://bugzilla.suse.com/1106929" source="BUGZILLA"/>
		<reference ref_id="1108293" ref_url="https://bugzilla.suse.com/1108293" source="BUGZILLA"/>
		<reference ref_id="1108838" ref_url="https://bugzilla.suse.com/1108838" source="BUGZILLA"/>
		<reference ref_id="1110785" ref_url="https://bugzilla.suse.com/1110785" source="BUGZILLA"/>
		<reference ref_id="1110946" ref_url="https://bugzilla.suse.com/1110946" source="BUGZILLA"/>
		<reference ref_id="1112063" ref_url="https://bugzilla.suse.com/1112063" source="BUGZILLA"/>
		<reference ref_id="1112178" ref_url="https://bugzilla.suse.com/1112178" source="BUGZILLA"/>
		<reference ref_id="1116803" ref_url="https://bugzilla.suse.com/1116803" source="BUGZILLA"/>
		<reference ref_id="1117562" ref_url="https://bugzilla.suse.com/1117562" source="BUGZILLA"/>
		<reference ref_id="1119086" ref_url="https://bugzilla.suse.com/1119086" source="BUGZILLA"/>
		<reference ref_id="1120642" ref_url="https://bugzilla.suse.com/1120642" source="BUGZILLA"/>
		<reference ref_id="1120843" ref_url="https://bugzilla.suse.com/1120843" source="BUGZILLA"/>
		<reference ref_id="1120885" ref_url="https://bugzilla.suse.com/1120885" source="BUGZILLA"/>
		<reference ref_id="1120902" ref_url="https://bugzilla.suse.com/1120902" source="BUGZILLA"/>
		<reference ref_id="1122776" ref_url="https://bugzilla.suse.com/1122776" source="BUGZILLA"/>
		<reference ref_id="1125580" ref_url="https://bugzilla.suse.com/1125580" source="BUGZILLA"/>
		<reference ref_id="1126040" ref_url="https://bugzilla.suse.com/1126040" source="BUGZILLA"/>
		<reference ref_id="1126356" ref_url="https://bugzilla.suse.com/1126356" source="BUGZILLA"/>
		<reference ref_id="1128052" ref_url="https://bugzilla.suse.com/1128052" source="BUGZILLA"/>
		<reference ref_id="1129138" ref_url="https://bugzilla.suse.com/1129138" source="BUGZILLA"/>
		<reference ref_id="1129770" ref_url="https://bugzilla.suse.com/1129770" source="BUGZILLA"/>
		<reference ref_id="1130972" ref_url="https://bugzilla.suse.com/1130972" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1131488" ref_url="https://bugzilla.suse.com/1131488" source="BUGZILLA"/>
		<reference ref_id="1131543" ref_url="https://bugzilla.suse.com/1131543" source="BUGZILLA"/>
		<reference ref_id="1131565" ref_url="https://bugzilla.suse.com/1131565" source="BUGZILLA"/>
		<reference ref_id="1132212" ref_url="https://bugzilla.suse.com/1132212" source="BUGZILLA"/>
		<reference ref_id="1132374" ref_url="https://bugzilla.suse.com/1132374" source="BUGZILLA"/>
		<reference ref_id="1132472" ref_url="https://bugzilla.suse.com/1132472" source="BUGZILLA"/>
		<reference ref_id="1133188" ref_url="https://bugzilla.suse.com/1133188" source="BUGZILLA"/>
		<reference ref_id="1133874" ref_url="https://bugzilla.suse.com/1133874" source="BUGZILLA"/>
		<reference ref_id="1134160" ref_url="https://bugzilla.suse.com/1134160" source="BUGZILLA"/>
		<reference ref_id="1134162" ref_url="https://bugzilla.suse.com/1134162" source="BUGZILLA"/>
		<reference ref_id="1134338" ref_url="https://bugzilla.suse.com/1134338" source="BUGZILLA"/>
		<reference ref_id="1134537" ref_url="https://bugzilla.suse.com/1134537" source="BUGZILLA"/>
		<reference ref_id="1134564" ref_url="https://bugzilla.suse.com/1134564" source="BUGZILLA"/>
		<reference ref_id="1134565" ref_url="https://bugzilla.suse.com/1134565" source="BUGZILLA"/>
		<reference ref_id="1134566" ref_url="https://bugzilla.suse.com/1134566" source="BUGZILLA"/>
		<reference ref_id="1134651" ref_url="https://bugzilla.suse.com/1134651" source="BUGZILLA"/>
		<reference ref_id="1134760" ref_url="https://bugzilla.suse.com/1134760" source="BUGZILLA"/>
		<reference ref_id="1134806" ref_url="https://bugzilla.suse.com/1134806" source="BUGZILLA"/>
		<reference ref_id="1134813" ref_url="https://bugzilla.suse.com/1134813" source="BUGZILLA"/>
		<reference ref_id="1134848" ref_url="https://bugzilla.suse.com/1134848" source="BUGZILLA"/>
		<reference ref_id="1135013" ref_url="https://bugzilla.suse.com/1135013" source="BUGZILLA"/>
		<reference ref_id="1135014" ref_url="https://bugzilla.suse.com/1135014" source="BUGZILLA"/>
		<reference ref_id="1135015" ref_url="https://bugzilla.suse.com/1135015" source="BUGZILLA"/>
		<reference ref_id="1135100" ref_url="https://bugzilla.suse.com/1135100" source="BUGZILLA"/>
		<reference ref_id="1135120" ref_url="https://bugzilla.suse.com/1135120" source="BUGZILLA"/>
		<reference ref_id="1135281" ref_url="https://bugzilla.suse.com/1135281" source="BUGZILLA"/>
		<reference ref_id="1135603" ref_url="https://bugzilla.suse.com/1135603" source="BUGZILLA"/>
		<reference ref_id="1135642" ref_url="https://bugzilla.suse.com/1135642" source="BUGZILLA"/>
		<reference ref_id="1135661" ref_url="https://bugzilla.suse.com/1135661" source="BUGZILLA"/>
		<reference ref_id="1135878" ref_url="https://bugzilla.suse.com/1135878" source="BUGZILLA"/>
		<reference ref_id="1136424" ref_url="https://bugzilla.suse.com/1136424" source="BUGZILLA"/>
		<reference ref_id="1136438" ref_url="https://bugzilla.suse.com/1136438" source="BUGZILLA"/>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1136448" ref_url="https://bugzilla.suse.com/1136448" source="BUGZILLA"/>
		<reference ref_id="1136449" ref_url="https://bugzilla.suse.com/1136449" source="BUGZILLA"/>
		<reference ref_id="1136451" ref_url="https://bugzilla.suse.com/1136451" source="BUGZILLA"/>
		<reference ref_id="1136452" ref_url="https://bugzilla.suse.com/1136452" source="BUGZILLA"/>
		<reference ref_id="1136455" ref_url="https://bugzilla.suse.com/1136455" source="BUGZILLA"/>
		<reference ref_id="1136458" ref_url="https://bugzilla.suse.com/1136458" source="BUGZILLA"/>
		<reference ref_id="1136539" ref_url="https://bugzilla.suse.com/1136539" source="BUGZILLA"/>
		<reference ref_id="1136573" ref_url="https://bugzilla.suse.com/1136573" source="BUGZILLA"/>
		<reference ref_id="1136575" ref_url="https://bugzilla.suse.com/1136575" source="BUGZILLA"/>
		<reference ref_id="1136586" ref_url="https://bugzilla.suse.com/1136586" source="BUGZILLA"/>
		<reference ref_id="1136590" ref_url="https://bugzilla.suse.com/1136590" source="BUGZILLA"/>
		<reference ref_id="1136623" ref_url="https://bugzilla.suse.com/1136623" source="BUGZILLA"/>
		<reference ref_id="1136810" ref_url="https://bugzilla.suse.com/1136810" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1136990" ref_url="https://bugzilla.suse.com/1136990" source="BUGZILLA"/>
		<reference ref_id="1137142" ref_url="https://bugzilla.suse.com/1137142" source="BUGZILLA"/>
		<reference ref_id="1137162" ref_url="https://bugzilla.suse.com/1137162" source="BUGZILLA"/>
		<reference ref_id="1137586" ref_url="https://bugzilla.suse.com/1137586" source="BUGZILLA"/>
		<reference ref_id="1137739" ref_url="https://bugzilla.suse.com/1137739" source="BUGZILLA"/>
		<reference ref_id="1137752" ref_url="https://bugzilla.suse.com/1137752" source="BUGZILLA"/>
		<reference ref_id="843419" ref_url="https://bugzilla.suse.com/843419" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4343" ref_url="https://www.suse.com/security/cve/CVE-2013-4343/" source="CVE"/>
		<reference ref_id="CVE-2018-17972" ref_url="https://www.suse.com/security/cve/CVE-2018-17972/" source="CVE"/>
		<reference ref_id="CVE-2018-7191" ref_url="https://www.suse.com/security/cve/CVE-2018-7191/" source="CVE"/>
		<reference ref_id="CVE-2019-11190" ref_url="https://www.suse.com/security/cve/CVE-2019-11190/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-11486" ref_url="https://www.suse.com/security/cve/CVE-2019-11486/" source="CVE"/>
		<reference ref_id="CVE-2019-11815" ref_url="https://www.suse.com/security/cve/CVE-2019-11815/" source="CVE"/>
		<reference ref_id="CVE-2019-11833" ref_url="https://www.suse.com/security/cve/CVE-2019-11833/" source="CVE"/>
		<reference ref_id="CVE-2019-11884" ref_url="https://www.suse.com/security/cve/CVE-2019-11884/" source="CVE"/>
		<reference ref_id="CVE-2019-12382" ref_url="https://www.suse.com/security/cve/CVE-2019-12382/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="CVE-2019-5489" ref_url="https://www.suse.com/security/cve/CVE-2019-5489/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.180 to receive
various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-11477: A sequence of SACKs may have been crafted such that one can
  trigger an integer overflow, leading to a kernel panic. (bsc#1137586)

- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which
  will fragment the TCP retransmission queue. An attacker may have been able to
  further exploit the fragmented queue to cause an expensive linked-list walk
  for subsequent SACKs received for that same TCP connection.

- CVE-2019-11479: It was possible to send a crafted sequence of SACKs which
  will fragment the RACK send map. A remote attacker may be able to further
  exploit the fragmented send map to cause an expensive linked-list walk for
  subsequent SACKs received for that same TCP connection. This would have
  resulted in excess resource consumption due to low mss values.

- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly
  escalate privileges was found in the mwifiex kernel module while connecting
  to a malicious wireless network. (bnc#1136424)

- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in
  drivers/gpu/drm/drm_edid_load.c in the Linux kernel There was an unchecked
  kstrdup of fwstr, which might allow an attacker to cause a denial of service
  (NULL pointer dereference and system crash). (bnc#1136586)

- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux
  kernel allowed local attackers to observe page cache access patterns of other
  processes on the same system, potentially allowing sniffing of secret
  information. (Fixing this affects the output of the fincore program.) Limited
  remote exploitation may be possible, as demonstrated by latency differences
  in accessing public files from an Apache HTTP Server. (bnc#1120843).

- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the
  unused memory region in the extent tree block, which might allow local users
  to obtain sensitive information by reading uninitialized data in the
  filesystem. (bnc#1135281)

- CVE-2018-7191: In the tun subsystem in the Linux kernel before 4.13.14,
  dev_get_valid_name is not called before register_netdevice. This allowed
  local users to cause a denial of service (NULL pointer dereference and panic)
  via an ioctl(TUNSETIFF) call with a dev name containing a / character. This
  is similar to CVE-2013-4343. (bnc#1135603)

- CVE-2019-11190: The Linux kernel allowed local users to bypass ASLR on setuid
  programs (such as /bin/su) because install_exec_creds() is called too late in
  load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check
  has a race condition when reading /proc/pid/stat. (bnc#1131543)

- CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c
  in the Linux kernel There was a race condition leading to a use-after-free,
  related to net namespace cleanup. (bnc#1134537)

- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c
  in the Linux kernel allowed a local user to obtain potentially sensitive
  information from kernel stack memory via a HIDPCONNADD command, because a
  name field may not end with a '\0' character. (bnc#1134848)

- CVE-2018-17972: An issue was discovered in the proc_pid_stack function in
  fs/proc/base.c in the Linux kernel It did not ensure that only root may
  inspect the kernel stack of an arbitrary task, allowing a local attacker to
  exploit racy stack unwinding and leak kernel task stack contents.
  (bnc#1110785)

- CVE-2019-11486: The Siemens R3964 line discipline driver in
  drivers/tty/n_r3964.c in the Linux kernel has multiple race conditions.
  (bnc#1133188)

The following new features were implemented:

- Updated the Chelsio cxgb4vf driver with the latest upstream patches.
  (fate#321660)

- Backported changes into e1000e kernel module to support systems using the
  Intel I219-LM NIC chip. (fate#326719)

- Import QLogic/Cavium qedr driver (RDMA) into the kernel. (fate#321747)

- Update the QLogic/Cavium qed driver (NET). (fate#321703)

- Update the QLogic/Cavium qede driver (NET). (fate#321702)

- Update the Chelsio iw_cxgb4 driver with the latest upstream patches.
  (fate#321661)

- Update the Chelsio cxgb4 driver with the latest upstream patches.
  (fate#321658)

- Update support for Intel Omni Path (OPA) kernel driver. (fate#321473)

- Update the QIB driver to the latest upstream version for up-to-date
  functionality and hardware support. (fate#321231)

The following non-security bugs were fixed:

- 9p locks: add mount option for lock retry interval (bnc#1012382).
- 9p: do not trust pdu content for stat item size (bnc#1012382).
- ACPI / SBS: Fix GPE storm on recent MacBookPro's (bnc#1012382).
- ALSA: PCM: check if ops are defined before suspending PCM (bnc#1012382).
- ALSA: core: Fix card races between register and disconnect (bnc#1012382).
- ALSA: echoaudio: add a check for ioremap_nocache (bnc#1012382).
- ALSA: info: Fix racy addition/deletion of nodes (bnc#1012382).
- ALSA: line6: use dynamic buffers (bnc#1012382).
- ALSA: opl3: fix mismatch between snd_opl3_drum_switch definition and declaration (bnc#1012382).
- ALSA: sb8: add a check for request_region (bnc#1012382).
- ALSA: seq: Fix OOB-reads from strlcpy (bnc#1012382).
- ARM: 8833/1: Ensure that NEON code always compiles with Clang (bnc#1012382).
- ARM: 8839/1: kprobe: make patch_lock a raw_spinlock_t (bnc#1012382).
- ARM: 8840/1: use a raw_spinlock_t in unwind (bnc#1012382).
- ARM: avoid Cortex-A9 livelock on tight dmb loops (bnc#1012382).
- ARM: dts: at91: Fix typo in ISC_D0 on PC9 (bnc#1012382).
- ARM: dts: pfla02: increase phy reset duration (bnc#1012382).
- ARM: iop: do not use using 64-bit DMA masks (bnc#1012382).
- ARM: orion: do not use using 64-bit DMA masks (bnc#1012382).
- ARM: samsung: Limit SAMSUNG_PM_CHECK config option to non-Exynos platforms (bnc#1012382).
- ASoC: Intel: avoid Oops if DMA setup fails (bnc#1012382).
- ASoC: cs4270: Set auto-increment bit for register writes (bnc#1012382).
- ASoC: fsl-asoc-card: fix object reference leaks in fsl_asoc_card_probe (bnc#1012382).
- ASoC: fsl_esai: fix channel swap issue when stream starts (bnc#1012382).
- ASoC: tlv320aic32x4: Fix Common Pins (bnc#1012382).
- ASoC:soc-pcm:fix a codec fixup issue in TDM case (bnc#1012382).
- Bluetooth: Align minimum encryption key size for LE and BR/EDR connections (bnc#1012382).
- Bluetooth: Fix decrementing reference count twice in releasing socket (bnc#1012382).
- CIFS: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).
- Correct bsc/FATE numbers.
- Do not jump to compute_result state from check_result state (bnc#1012382).
- Documentation: Add MDS vulnerability documentation (bnc#1012382).
- Documentation: Add nospectre_v1 parameter (bnc#1012382).
- Documentation: Correct the possible MDS sysfs values (bnc#1012382).
- Documentation: Move L1TF to separate directory (bnc#1012382).
- HID: debug: fix race condition with between rdesc_show() and device removal (bnc#1012382).
- HID: input: add mapping for Expose/Overview key (bnc#1012382).
- HID: input: add mapping for keyboard Brightness Up/Down/Toggle keys (bnc#1012382).
- IB/hfi1: Eliminate opcode tests on mr deref ().
- IB/hfi1: Unreserve a reserved request when it is completed ().
- IB/mlx4: Fix race condition between catas error reset and aliasguid flows (bnc#1012382).
- IB/mlx4: Increase the timeout for CM cache (bnc#1012382).
- IB/rdmavt: Add wc_flags and wc_immdata to cq entry trace ().
- IB/rdmavt: Fix frwr memory registration ().
- Input: snvs_pwrkey - initialize necessary driver data before enabling IRQ (bnc#1012382).
- KVM: fail KVM_SET_VCPU_EVENTS with invalid exception number (bnc#1012382).
- KVM: x86: Do not clear EFER during SMM transitions for 32-bit vCPU (bnc#1012382).
- KVM: x86: avoid misreporting level-triggered irqs as edge-triggered in tracing (bnc#1012382).
- MIPS: scall64-o32: Fix indirect syscall number load (bnc#1012382).
- NFS/pnfs: Bulk destroy of layouts needs to be safe w.r.t. umount (git-fixes).
- NFS: Add missing encode / decode sequence_maxsz to v4.2 operations (git-fixes).
- NFS: Fix I/O request leakages (git-fixes).
- NFS: Forbid setting AF_INET6 to 'struct sockaddr_in'-&gt;sin_family (bnc#1012382).
- PCI: Add function 1 DMA alias quirk for Marvell 9170 SATA controller (bnc#1012382).
- PCI: Mark AMD Stoney Radeon R7 GPU ATS as broken (bsc#1137142).
- PCI: Mark Atheros AR9462 to avoid bus reset (bsc#1135642).
- PCI: xilinx-nwl: Add missing of_node_put() (bsc#1100132).
- RDMA/iw_cxgb4: Fix the unchecked ep dereference (bsc#1005778 bsc#1005780 bsc#1005781).
- RDMA/qedr: Fix out of bounds index check in query pkey (bsc#1022604).
- Revert 'block/loop: Use global lock for ioctl() operation.' (bnc#1012382).
- Revert 'block: unexport DISK_EVENT_MEDIA_CHANGE for legacy/fringe drivers' (bsc#1110946).
- Revert 'cpu/speculation: Add 'mitigations=' cmdline option' (stable backports).
- Revert 'ide: unexport DISK_EVENT_MEDIA_CHANGE for ide-gd and ide-cd' (bsc#1110946).
- Revert 'kbuild: use -Oz instead of -Os when using clang' (bnc#1012382).
- Revert 'locking/lockdep: Add debug_locks check in __lock_downgrade()' (bnc#1012382).
- Revert 'netns: provide pure entropy for net_hash_mix()' (kabi).
- Revert 'sched: Add sched_smt_active()' (stable backports).
- Revert 'x86/MCE: Save microcode revision in machine check records' (kabi).
- Revert 'x86/kprobes: Verify stack frame on kretprobe' (kabi).
- Revert 'x86/speculation/mds: Add 'mitigations=' support for MDS' (stable backports).
- Revert 'x86/speculation: Support 'mitigations=' cmdline option' (stable backports).
- SoC: imx-sgtl5000: add missing put_device() (bnc#1012382).
- UAS: fix alignment of scatter/gather segments (bnc#1012382 bsc#1129770).
- UAS: fix alignment of scatter/gather segments (bsc#1129770).
- USB: Add new USB LPM helpers (bsc#1129770).
- USB: Consolidate LPM checks to avoid enabling LPM twice (bsc#1129770).
- USB: cdc-acm: fix unthrottle races (bsc#1135642).
- USB: core: Fix bug caused by duplicate interface PM usage counter (bnc#1012382).
- USB: core: Fix unterminated string returned by usb_string() (bnc#1012382).
- USB: serial: fix unthrottle races (bnc#1012382).
- USB: serial: use variable for status (bnc#1012382).
- USB: w1 ds2490: Fix bug caused by improper use of altsetting array (bnc#1012382).
- USB: yurex: Fix protection fault after device removal (bnc#1012382).
- X.509: unpack RSA signatureValue field from BIT STRING (git-fixes).
- appletalk: Fix compile regression (bnc#1012382).
- appletalk: Fix use-after-free in atalk_proc_exit (bnc#1012382).
- arm64/kernel: do not ban ADRP to work around Cortex-A53 erratum #843419 (bsc#1126040).
- arm64/kernel: rename module_emit_adrp_veneer-&gt;module_emit_veneer_for_adrp (bsc#1126040).
- arm64: Add helper to decode register from instruction (bsc#1126040).
- arm64: debug: Do not propagate UNKNOWN FAR into si_code for debug signals (bnc#1012382).
- arm64: debug: Ensure debug handlers check triggering exception level (bnc#1012382).
- arm64: futex: Fix FUTEX_WAKE_OP atomic ops with non-zero result value (bnc#1012382).
- arm64: futex: Restore oldval initialization to work around buggy compilers (bnc#1012382).
- arm64: module-plts: factor out PLT generation code for ftrace (bsc#1126040).
- arm64: module: do not BUG when exceeding preallocated PLT count (bsc#1126040).
- arm64: module: split core and init PLT sections (bsc#1126040).
- backlight: lm3630a: Return 0 on success in update_status functions (bsc#1106929)
- bcache: Move couple of functions to sysfs.c (bsc#1130972).
- bcache: Move couple of string arrays to sysfs.c (bsc#1130972).
- bcache: Populate writeback_rate_minimum attribute (bsc#1130972).
- bcache: account size of buckets used in uuid write to ca-&gt;meta_sectors_written (bsc#1130972).
- bcache: add MODULE_DESCRIPTION information (bsc#1130972).
- bcache: add a comment in super.c (bsc#1130972).
- bcache: add code comments for bset.c (bsc#1130972).
- bcache: add comment for cache_set-&gt;fill_iter (bsc#1130972).
- bcache: add identifier names to arguments of function definitions (bsc#1130972).
- bcache: add missing SPDX header (bsc#1130972).
- bcache: add separate workqueue for journal_write to avoid deadlock (bsc#1130972).
- bcache: add static const prefix to char * array declarations (bsc#1130972).
- bcache: add sysfs_strtoul_bool() for setting bit-field variables (bsc#1130972).
- bcache: add the missing comments for smp_mb()/smp_wmb() (bsc#1130972).
- bcache: cannot set writeback_running via sysfs if no writeback kthread created (bsc#1130972).
- bcache: comment on direct access to bvec table (bsc#1130972).
- bcache: correct dirty data statistics (bsc#1130972).
- bcache: do not assign in if condition in bcache_device_init() (bsc#1130972).
- bcache: do not assign in if condition in bcache_init() (bsc#1130972).
- bcache: do not assign in if condition register_bcache() (bsc#1130972).
- bcache: do not check NULL pointer before calling kmem_cache_destroy (bsc#1130972).
- bcache: do not check if debug dentry is ERR or NULL explicitly on remove (bsc#1130972).
- bcache: do not clone bio in bch_data_verify (bsc#1130972).
- bcache: do not mark writeback_running too early (bsc#1130972).
- bcache: export backing_dev_name via sysfs (bsc#1130972).
- bcache: export backing_dev_uuid via sysfs (bsc#1130972).
- bcache: fix code comments style (bsc#1130972).
- bcache: fix indent by replacing blank by tabs (bsc#1130972).
- bcache: fix indentation issue, remove tabs on a hunk of code (bsc#1130972).
- bcache: fix input integer overflow of congested threshold (bsc#1130972).
- bcache: fix input overflow to cache set sysfs file io_error_halflife (bnc#1012382).
- bcache: fix input overflow to journal_delay_ms (bsc#1130972).
- bcache: fix input overflow to sequential_cutoff (bnc#1012382).
- bcache: fix input overflow to writeback_delay (bsc#1130972).
- bcache: fix input overflow to writeback_rate_minimum (bsc#1130972).
- bcache: fix ioctl in flash device (bsc#1130972).
- bcache: fix mistaken code comments in bcache.h (bsc#1130972).
- bcache: fix mistaken comments in request.c (bsc#1130972).
- bcache: fix potential div-zero error of writeback_rate_i_term_inverse (bsc#1130972).
- bcache: fix potential div-zero error of writeback_rate_p_term_inverse (bsc#1130972).
- bcache: fix typo 'succesfully' to 'successfully' (bsc#1130972).
- bcache: fix typo in code comments of closure_return_with_destructor() (bsc#1130972).
- bcache: improve sysfs_strtoul_clamp() (bnc#1012382).
- bcache: introduce force_wake_up_gc() (bsc#1130972).
- bcache: make cutoff_writeback and cutoff_writeback_sync tunable (bsc#1130972).
- bcache: move open brace at end of function definitions to next line (bsc#1130972).
- bcache: never writeback a discard operation (bsc#1130972).
- bcache: not use hard coded memset size in bch_cache_accounting_clear() (bsc#1130972).
- bcache: option to automatically run gc thread after writeback (bsc#1130972).
- bcache: panic fix for making cache device (bsc#1130972).
- bcache: prefer 'help' in Kconfig (bsc#1130972).
- bcache: print number of keys in trace_bcache_journal_write (bsc#1130972).
- bcache: recal cached_dev_sectors on detach (bsc#1130972).
- bcache: remove unnecessary space before ioctl function pointer arguments (bsc#1130972).
- bcache: remove unused bch_passthrough_cache (bsc#1130972).
- bcache: remove useless parameter of bch_debug_init() (bsc#1130972).
- bcache: replace '%pF' by '%pS' in seq_printf() (bsc#1130972).
- bcache: replace Symbolic permissions by octal permission numbers (bsc#1130972).
- bcache: replace hard coded number with BUCKET_GC_GEN_MAX (bsc#1130972).
- bcache: replace printk() by pr_*() routines (bsc#1130972).
- bcache: set writeback_percent in a flexible range (bsc#1130972).
- bcache: split combined if-condition code into separate ones (bsc#1130972).
- bcache: stop using the deprecated get_seconds() (bsc#1130972).
- bcache: style fix to add a blank line after declarations (bsc#1130972).
- bcache: style fix to replace 'unsigned' by 'unsigned int' (bsc#1130972).
- bcache: style fixes for lines over 80 characters (bsc#1130972).
- bcache: trace missed reading by cache_missed (bsc#1130972).
- bcache: treat stale &amp;&amp; dirty keys as bad keys (bsc#1130972).
- bcache: trivial - remove tailing backslash in macro BTREE_FLAG (bsc#1130972).
- bcache: update comment for bch_data_insert (bsc#1130972).
- bcache: use (REQ_META|REQ_PRIO) to indicate bio for metadata (bsc#1130972).
- bcache: use MAX_CACHES_PER_SET instead of magic number 8 in __bch_bucket_alloc_set (bsc#1130972).
- bcache: use REQ_PRIO to indicate bio for metadata (bsc#1130972).
- bcache: use routines from lib/crc64.c for CRC64 calculation (bsc#1130972).
- bcache: use sysfs_strtoul_bool() to set bit-field variables (bsc#1130972).
- bcache: writeback: properly order backing device IO (bsc#1130972).
- binfmt_elf: switch to new creds when switching to new mm (bnc#1012382).
- bitops: avoid integer overflow in GENMASK(_ULL) (bnc#1012382).
- block: check_events: do not bother with events if unsupported (bsc#1110946).
- block: disk_events: introduce event flags (bsc#1110946).
- block: do not leak memory in bio_copy_user_iov() (bnc#1012382).
- block: fix use-after-free on gendisk (bsc#1136448).
- bnxt_en: Improve multicast address setup logic (bnc#1012382).
- bonding: fix arp_validate toggling in active-backup mode (bnc#1012382).
- bonding: fix event handling for stacked bonds (bnc#1012382).
- bonding: show full hw address in sysfs for slave entries (bnc#1012382).
- bpf: reject wrong sized filters earlier (bnc#1012382).
- bridge: Fix error path for kobject_init_and_add() (bnc#1012382).
- btrfs: Do not panic when we can't find a root key (bsc#1112063).
- btrfs: Factor out common delayed refs init code (bsc#1134813).
- btrfs: Introduce init_delayed_ref_head (bsc#1134813).
- btrfs: Open-code add_delayed_data_ref (bsc#1134813).
- btrfs: Open-code add_delayed_tree_ref (bsc#1134813).
- btrfs: Use init_delayed_ref_common in add_delayed_data_ref (bsc#1134813).
- btrfs: Use init_delayed_ref_common in add_delayed_tree_ref (bsc#1134813).
- btrfs: Use init_delayed_ref_head in add_delayed_ref_head (bsc#1134813).
- btrfs: add a helper to return a head ref (bsc#1134813).
- btrfs: breakout empty head cleanup to a helper (bsc#1134813).
- btrfs: delayed-ref: Introduce better documented delayed ref structures (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Open-code process_func in __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: move all ref head cleanup to the helper function (bsc#1134813).
- btrfs: move extent_op cleanup to a helper (bsc#1134813).
- btrfs: move ref_mod modification into the if (ref) logic (bsc#1134813).
- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1134806).
- btrfs: qgroup: Do not scan leaf if we're modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: qgroup: Move reserved data accounting from btrfs_delayed_ref_head to btrfs_qgroup_extent_record (bsc#1134162).
- btrfs: qgroup: Remove duplicated trace points for qgroup_rsv_add/release (bsc#1134160).
- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1134338).
- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1134651).
- btrfs: remove delayed_ref_node from ref_head (bsc#1134813).
- btrfs: split delayed ref head initialization and addition (bsc#1134813).
- btrfs: track refs in a rb_tree instead of a list (bsc#1134813).
- cdc-acm: cleaning up debug in data submission path (bsc#1136539).
- cdc-acm: fix race between reset and control messaging (bsc#1106110).
- cdc-acm: handle read pipe errors (bsc#1135878).
- cdc-acm: reassemble fragmented notifications (bsc#1136590).
- cdc-acm: store in and out pipes in acm structure (bsc#1136575).
- cdrom: Fix race condition in cdrom_sysctl_register (bnc#1012382).
- ceph: ensure d_name stability in ceph_dentry_hash() (bsc#1134564).
- ceph: fix ci-&gt;i_head_snapc leak (bsc#1122776).
- ceph: fix use-after-free on symlink traversal (bsc#1134565).
- ceph: only use d_name directly when parent is locked (bsc#1134566).
- cifs: Fix NULL pointer dereference of devname (bnc#1012382).
- cifs: do not attempt cifs operation on smb2+ rename error (bnc#1012382).
- cifs: fallback to older infolevels on findfirst queryinfo retry (bnc#1012382).
- cifs: use correct format characters (bnc#1012382).
- clk: fix mux clock documentation (bsc#1090888).
- coresight: etm4x: Add support to enable ETMv4.2 (bnc#1012382).
- cpu/speculation: Add 'mitigations=' cmdline option (bnc#1012382 bsc#1112178).
- cpupower: remove stringop-truncation waring (bsc#1119086).
- crypto: crypto4xx - properly set IV after de- and encrypt (bnc#1012382).
- crypto: sha256/arm - fix crash bug in Thumb2 build (bnc#1012382).
- crypto: sha512/arm - fix crash bug in Thumb2 build (bnc#1012382).
- crypto: vmx - CTR: always increment IV as quadword (bsc#1135661, bsc#1137162).
- crypto: vmx - fix copy-paste error in CTR mode (bsc#1135661, bsc#1137162).
- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).
- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).
- crypto: vmx: Only call enable_kernel_vsx() (bsc#1135661, bsc#1137162).
- crypto: x86/poly1305 - fix overflow during partial reduction (bnc#1012382).
- debugfs: fix use-after-free on symlink traversal (bnc#1012382).
- device_cgroup: fix RCU imbalance in error case (bnc#1012382).
- dm thin: add sanity checks to thin-pool and external snapshot creation (bnc#1012382).
- dmaengine: imx-dma: fix warning comparison of distinct pointer types (bnc#1012382).
- dmaengine: tegra: avoid overflow of byte tracking (bnc#1012382).
- drivers/virt/fsl_hypervisor.c: dereferencing error pointers in ioctl (bnc#1012382).
- drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl (bnc#1012382).
- drm/bridge: adv7511: Fix low refresh rate selection (bsc#1106929)
- drm/dp/mst: Configure no_stop_bit correctly for remote i2c xfers (bnc#1012382).
- drm/fb-helper: dpms_legacy(): Only set on connectors in use (bnc#1106929)
- drm/i915: Fix I915_EXEC_RING_MASK (bnc#1106929)
- drm/rockchip: shutdown drm subsystem on shutdown (bsc#1106929)
- drm/ttm: Remove warning about inconsistent mapping information (bnc#1131488)
- drm/vc4: -&gt;x_scaling[1] should never be set to VC4_SCALING_NONE (bsc#1106929)
- drm/vc4: Account for interrupts in flight (bsc#1106929)
- drm/vc4: Allocate the right amount of space for boot-time CRTC state. (bsc#1106929)
- drm/vc4: Fix NULL pointer dereference in vc4_save_hang_state() (bsc#1106929)
- drm/vc4: Fix OOPSes from trying to cache a partially constructed BO. (bsc#1106929)
- drm/vc4: Fix a couple error codes in vc4_cl_lookup_bos() (bsc#1106929)
- drm/vc4: Fix compilation error reported by kbuild test bot (bsc#1106929)
- drm/vc4: Fix memory leak during gpu reset. (bsc#1106929)
- drm/vc4: Fix memory leak of the CRTC state. (bsc#1106929)
- drm/vc4: Fix oops when userspace hands in a bad BO. (bsc#1106929)
- drm/vc4: Fix overflow mem unreferencing when the binner runs dry. (bsc#1106929)
- drm/vc4: Fix races when the CS reads from render targets. (bsc#1106929)
- drm/vc4: Fix scaling of uni-planar formats (bsc#1106929)
- drm/vc4: Fix the 'no scaling' case on multi-planar YUV formats (bsc#1106929)
- drm/vc4: Flush the caches before the bin jobs, as well. (bsc#1106929)
- drm/vc4: Free hang state before destroying BO cache. (bsc#1106929)
- drm/vc4: Move IRQ enable to PM path (bsc#1106929)
- drm/vc4: Reset -&gt;{x, y}_scaling[1] when dealing with uniplanar (bsc#1106929)
- drm/vc4: Set -&gt;is_yuv to false when num_planes == 1 (bsc#1106929)
- drm/vc4: Use drm_free_large() on handles to match its allocation. (bsc#1106929)
- drm/vc4: fix a bounds check (bsc#1106929)
- drm/vmwgfx: NULL pointer dereference from vmw_cmd_dx_view_define() (bsc#1106929)
- drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader() leading to (bsc#1106929)
- dt-bindings: rcar-dmac: Document missing error interrupt (bsc#1085535).
- e1000e: Add Support for 38.4MHZ frequency (bsc#1108293 ).
- e1000e: Add Support for CannonLake (bsc#1108293).
- e1000e: Fix -Wformat-truncation warnings (bnc#1012382).
- e1000e: Initial Support for CannonLake (bsc#1108293 ).
- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bnc#1012382).
- exportfs: fix 'passing zero to ERR_PTR()' warning (bsc#1136458).
- ext4: Return EAGAIN in case of DIO is beyond end of file (bsc#1136810).
- ext4: actually request zeroing of inode table after grow (bsc#1136451).
- ext4: add missing brelse() in add_new_gdb_meta_bg() (bnc#1012382).
- ext4: avoid panic during forced reboot due to aborted journal (bsc#1126356).
- ext4: cleanup bh release code in ext4_ind_remove_space() (bnc#1012382).
- ext4: fix ext4_show_options for file systems w/o journal (bsc#1136452).
- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1136449).
- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1136623).
- ext4: prohibit fstrim in norecovery mode (bnc#1012382).
- ext4: report real fs size after failed resize (bnc#1012382).
- ext4: wait for outstanding dio during truncate in nojournal mode (bsc#1136438).
- f2fs: do not use mutex lock in atomic context (bnc#1012382).
- f2fs: fix to do sanity check with current segment number (bnc#1012382).
- fbdev: fbmem: fix memory access if logo is bigger than the screen (bnc#1012382).
- fix incorrect error code mapping for OBJECTID_NOT_FOUND (bnc#1012382).
- fs/file.c: initialize init_files.resize_wait (bnc#1012382).
- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bnc#1012382).
- fs: fix guard_bio_eod to check for real EOD errors (bnc#1012382).
- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).
- genirq: Prevent use-after-free and work list corruption (bnc#1012382).
- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bnc#1012382).
- gpio: gpio-omap: fix level interrupt idling (bnc#1012382).
- gpu: ipu-v3: dp: fix CSC handling (bnc#1012382).
- h8300: use cc-cross-prefix instead of hardcoding h8300-unknown-linux- (bnc#1012382).
- hugetlbfs: fix memory leak for resv_map (bnc#1012382).
- hwrng: virtio - Avoid repeated init of completion (bnc#1012382).
- i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA (bnc#1012382).
- ibmvnic: Add device identification to requested IRQs (bsc#1137739).
- ibmvnic: Do not close unopened driver during reset (bsc#1137752).
- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).
- ibmvnic: Refresh device multicast list after reset (bsc#1137752).
- ibmvnic: remove set but not used variable 'netdev' (bsc#1137739).
- igb: Fix WARN_ONCE on runtime suspend (bnc#1012382).
- iio/gyro/bmg160: Use millidegrees for temperature scale (bnc#1012382).
- iio: ad_sigma_delta: select channel when reading register (bnc#1012382).
- iio: adc: at91: disable adc channel interrupt in timeout case (bnc#1012382).
- iio: adc: xilinx: fix potential use-after-free on remove (bnc#1012382).
- include/linux/bitrev.h: fix constant bitrev (bnc#1012382).
- include/linux/swap.h: use offsetof() instead of custom __swapoffset macro (bnc#1012382).
- init: initialize jump labels before command line option parsing (bnc#1012382).
- io: accel: kxcjk1013: restore the range after resume (bnc#1012382).
- iommu/vt-d: Do not request page request irq under dmar_global_lock (bsc#1135013).
- iommu/vt-d: Make kernel parameter igfx_off work with vIOMMU (bsc#1135014).
- iommu/vt-d: Set intel_iommu_gfx_mapped correctly (bsc#1135015).
- ip6_tunnel: Match to ARPHRD_TUNNEL6 for dev type (bnc#1012382).
- ipmi:ssif: compare block number correctly for multi-part return messages (bsc#1135120).
- ipv4: Fix raw socket lookup for local traffic (bnc#1012382).
- ipv4: add sanity checks in ipv4_link_failure() (git-fixes).
- ipv4: ensure rcu_read_lock() in ipv4_link_failure() (bnc#1012382).
- ipv4: ip_do_fragment: Preserve skb_iif during fragmentation (bnc#1012382).
- ipv4: recompile ip options in ipv4_link_failure (bnc#1012382).
- ipv4: set the tcp_min_rtt_wlen range from 0 to one day (bnc#1012382).
- ipv6/flowlabel: wait rcu grace period before put_pid() (bnc#1012382).
- ipv6: Fix dangling pointer when ipv6 fragment (bnc#1012382).
- ipv6: fix a potential deadlock in do_ipv6_setsockopt() (bnc#1012382).
- ipv6: invert flowlabel sharing check in process and user mode (bnc#1012382).
- ipv6: sit: reset ip header pointer in ipip6_rcv (bnc#1012382).
- ipvs: do not schedule icmp errors from tunnels (bnc#1012382).
- jffs2: fix use-after-free on symlink traversal (bnc#1012382).
- kABI: protect ring_buffer_read_prepare (kabi).
- kABI: protect struct tlb_state (kabi).
- kABI: protect struct usb_interface (kabi).
- kABI: restore ___ptrace_may_access (kabi).
- kABI: restore icmp_send (kabi).
- kabi: arm64: fix kabi breakage on arch specific module (bsc#1126040)
- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).
- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).
- kbuild: clang: choose GCC_TOOLCHAIN_DIR not on LD (bnc#1012382).
- kbuild: simplify ld-option implementation (bnc#1012382).
- kconfig/[mn]conf: handle backspace (^H) key (bnc#1012382).
- kconfig: display recursive dependency resolution hint just once (bsc#1100132).
- kernel/sysctl.c: fix out-of-bounds access when setting file-max (bnc#1012382).
- keys: Timestamp new keys (bsc#1120902).
- kprobes: Fix error check when reusing optimized probes (bnc#1012382).
- kprobes: Mark ftrace mcount handler functions nokprobe (bnc#1012382).
- kprobes: Prohibit probing on bsearch() (bnc#1012382).
- leds: lp55xx: fix null deref on firmware load failure (bnc#1012382).
- lib/div64.c: off by one in shift (bnc#1012382).
- lib/int_sqrt: optimize initial value compute (bnc#1012382).
- lib/string.c: implement a basic bcmp (bnc#1012382).
- lib: add crc64 calculation routines (bsc#1130972).
- lib: do not depend on linux headers being installed (bsc#1130972).
- libata: fix using DMA buffers on stack (bnc#1012382).
- libnvdimm/btt: Fix a kmemdup failure check (bnc#1012382).
- lpfc: validate command in lpfc_sli4_scmd_to_wqidx_distr() (bsc#1129138).
- mac80211: do not call driver wake_tx_queue op during reconfig (bnc#1012382).
- mac80211_hwsim: validate number of different channels (bsc#1085539).
- md: use mddev_suspend/resume instead of -&gt;quiesce() (bsc#1132212).
- media: mt9m111: set initial frame size other than 0x0 (bnc#1012382).
- media: mx2_emmaprp: Correct return type for mem2mem buffer helpers (bnc#1012382).
- media: pvrusb2: Prevent a buffer overflow (bsc#1135642).
- media: s5p-g2d: Correct return type for mem2mem buffer helpers (bnc#1012382).
- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bnc#1012382).
- media: s5p-jpeg: Correct return type for mem2mem buffer helpers (bnc#1012382).
- media: sh_veu: Correct return type for mem2mem buffer helpers (bnc#1012382).
- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bnc#1012382).
- media: vb2: do not call __vb2_queue_cancel if vb2_start_streaming failed (bsc#1120902).
- mm/cma.c: cma_declare_contiguous: correct err handling (bnc#1012382).
- mm/page_ext.c: fix an imbalance with kmemleak (bnc#1012382).
- mm/slab.c: kmemleak no scan alien caches (bnc#1012382).
- mm/vmalloc.c: fix kernel BUG at mm/vmalloc.c:512! (bnc#1012382).
- mm/vmstat.c: fix /proc/vmstat format for CONFIG_DEBUG_TLBFLUSH=y CONFIG_SMP=n (bnc#1012382).
- mm: mempolicy: make mbind() return -EIO when MPOL_MF_STRICT is specified (bnc#1012382).
- mmc: davinci: remove extraneous __init annotation (bnc#1012382).
- mmc: omap: fix the maximum timeout setting (bnc#1012382).
- modpost: file2alias: check prototype of handler (bnc#1012382).
- modpost: file2alias: go back to simple devtable lookup (bnc#1012382).
- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).
- mt7601u: bump supported EEPROM version (bnc#1012382).
- mtd: Fix comparison in map_word_andequal() (git-fixes).
- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).
- net/ibmvnic: Remove tests of member address (bsc#1137739).
- net/ibmvnic: Update MAC address settings after adapter reset (bsc#1134760).
- net/ibmvnic: Update carrier state after link state change (bsc#1135100).
- net: atm: Fix potential Spectre v1 vulnerabilities (bnc#1012382).
- net: bridge: multicast: use rcu to access port list from br_multicast_start_querier (bnc#1012382).
- net: ena: fix return value of ena_com_config_llq_info() (bsc#1117562).
- net: ethernet: ti: fix possible object reference leak (bnc#1012382).
- net: ethtool: not call vzalloc for zero sized memory request (bnc#1012382).
- net: fou: do not use guehdr after iptunnel_pull_offloads in gue_udp_recv (bnc#1012382).
- net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bnc#1012382).
- net: hns: Use NAPI_POLL_WEIGHT for hns driver (bnc#1012382).
- net: ibm: fix possible object reference leak (bnc#1012382).
- net: ks8851: Delay requesting IRQ until opened (bnc#1012382).
- net: ks8851: Dequeue RX packets explicitly (bnc#1012382).
- net: ks8851: Reassert reset pin if chip ID check fails (bnc#1012382).
- net: ks8851: Set initial carrier state to down (bnc#1012382).
- net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock() (bnc#1012382).
- net: stmmac: move stmmac_check_ether_addr() to driver probe (bnc#1012382).
- net: ucc_geth - fix Oops when changing number of buffers in the ring (bnc#1012382).
- net: xilinx: fix possible object reference leak (bnc#1012382).
- netfilter: bridge: set skb transport_header before entering NF_INET_PRE_ROUTING (bnc#1012382).
- netfilter: compat: initialize all fields in xt_init (bnc#1012382).
- netfilter: ebtables: CONFIG_COMPAT: drop a bogus WARN_ON (bnc#1012382).
- netfilter: physdev: relax br_netfilter dependency (bnc#1012382).
- netns: provide pure entropy for net_hash_mix() (bnc#1012382).
- nfs: clean up rest of reqs when failing to add one (git-fixes).
- nfsd: Do not release the callback slot unless it was actually held (bnc#1012382).
- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).
- nvme-fc: resolve io failures during connect (bsc#1116803).
- nvme: Do not allow to reset a reconnecting controller (bsc#1133874).
- ocfs2: fix a panic problem caused by o2cb_ctl (bnc#1012382).
- openvswitch: fix flow actions reallocation (bnc#1012382).
- pNFS: Skip invalid stateids when doing a bulk destroy (git-fixes).
- packet: Fix error path in packet_init (bnc#1012382).
- packet: validate msg_namelen in send directly (bnc#1012382).
- perf evsel: Free evsel-&gt;counts in perf_evsel__exit() (bnc#1012382).
- perf test: Fix failure of 'evsel-tp-sched' test on s390 (bnc#1012382).
- perf tests: Fix a memory leak in test__perf_evsel__tp_sched_test() (bnc#1012382).
- perf tests: Fix a memory leak of cpu_map object in the openat_syscall_event_on_all_cpus test (bnc#1012382).
- perf top: Fix error handling in cmd_top() (bnc#1012382).
- perf/core: Restore mmap record type correctly (bnc#1012382).
- perf/x86/intel: Allow PEBS multi-entry in watermark mode (git-fixes).
- perf/x86/intel: Fix handling of wakeup_events for multi-entry PEBS (bnc#1012382).
- platform/x86: sony-laptop: Fix unintentional fall-through (bnc#1012382).
- powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC (bnc#1012382).
- powerpc/64: Call setup_barrier_nospec() from setup_arch() (bnc#1012382 bsc#1131107).
- powerpc/64: Make meltdown reporting Book3S 64 specific (bnc#1012382).
- powerpc/64s: Include cpu header (bnc#1012382).
- powerpc/booke64: set RI in default MSR (bnc#1012382).
- powerpc/eeh: Fix race with driver un/bind (bsc#1066223).
- powerpc/fsl: Add FSL_PPC_BOOK3E as supported arch for nospectre_v2 boot arg (bnc#1012382).
- powerpc/fsl: Add barrier_nospec implementation for NXP PowerPC Book3E (bnc#1012382).
- powerpc/fsl: Add infrastructure to fixup branch predictor flush (bnc#1012382).
- powerpc/fsl: Add macro to flush the branch predictor (bnc#1012382).
- powerpc/fsl: Add nospectre_v2 command line argument (bnc#1012382).
- powerpc/fsl: Emulate SPRN_BUCSR register (bnc#1012382).
- powerpc/fsl: Enable runtime patching if nospectre_v2 boot arg is used (bnc#1012382).
- powerpc/fsl: Fix the flush of branch predictor (bnc#1012382).
- powerpc/fsl: Fixed warning: orphan section `__btb_flush_fixup' (bnc#1012382).
- powerpc/fsl: Flush branch predictor when entering KVM (bnc#1012382).
- powerpc/fsl: Flush the branch predictor at each kernel entry (32 bit) (bnc#1012382).
- powerpc/fsl: Flush the branch predictor at each kernel entry (64bit) (bnc#1012382).
- powerpc/fsl: Sanitize the syscall table for NXP PowerPC 32 bit platforms (bnc#1012382).
- powerpc/fsl: Update Spectre v2 reporting (bnc#1012382).
- powerpc/lib: fix book3s/32 boot failure due to code patching (bnc#1012382).
- powerpc/perf: Add blacklisted events for Power9 DD2.1 (bsc#1053043).
- powerpc/perf: Add blacklisted events for Power9 DD2.2 (bsc#1053043).
- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).
- powerpc/perf: Infrastructure to support addition of blacklisted events (bsc#1053043).
- powerpc/process: Fix sparse address space warnings (bsc#1066223).
- powerpc/xmon: Add RFI flush related fields to paca dump (bnc#1012382).
- qede: fix write to free'd pointer error and double free of ptp (bsc#1019695 bsc#1019696).
- qlcnic: Avoid potential NULL pointer dereference (bnc#1012382).
- qmi_wwan: add Olicard 600 (bnc#1012382).
- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bnc#1012382).
- rsi: improve kernel thread handling to fix kernel panic (bnc#1012382).
- rtc: da9063: set uie_unsupported when relevant (bnc#1012382).
- rtc: sh: Fix invalid alarm warning for non-enabled alarm (bnc#1012382).
- s390/3270: fix lockdep false positive on view-&gt;lock (bnc#1012382).
- s390/dasd: Fix capacity calculation for large volumes (bnc#1012382).
- s390: ctcm: fix ctcm_new_device error return code (bnc#1012382).
- sc16is7xx: missing unregister/delete driver on error in sc16is7xx_init() (bnc#1012382).
- sc16is7xx: move label 'err_spi' to correct section (git-fixes).
- sched/fair: Do not re-read -&gt;h_load_next during hierarchical load calculation (bnc#1012382).
- sched/fair: Limit sched_cfs_period_timer() loop to avoid hard lockup (bnc#1012382).
- sched/numa: Fix a possible divide-by-zero (bnc#1012382).
- sched: Add sched_smt_active() (bnc#1012382).
- scsi: core: replace GFP_ATOMIC with GFP_KERNEL in scsi_scan.c (bnc#1012382).
- scsi: csiostor: fix missing data copy in csio_scsi_err_handler() (bnc#1012382).
- scsi: libsas: fix a race condition when smp task timeout (bnc#1012382).
- scsi: megaraid_sas: return error when create DMA pool failed (bnc#1012382).
- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bnc#1012382).
- scsi: qla4xxx: fix a potential NULL pointer dereference (bnc#1012382).
- scsi: storvsc: Fix calculation of sub-channel count (bnc#1012382).
- scsi: zfcp: reduce flood of fcrscn1 trace records on multi-element RSCN (bnc#1012382).
- sctp: initialize _pad of sockaddr_in before copying to user memory (bnc#1012382).
- selftests/net: correct the return value for run_netsocktests (bnc#1012382).
- selinux: never allow relabeling on context mounts (bnc#1012382).
- serial: uartps: console_setup() can't be placed to init section (bnc#1012382).
- slip: make slhc_free() silently accept an error pointer (bnc#1012382).
- soc/tegra: fuse: Fix illegal free of IO base address (bnc#1012382).
- soc: qcom: gsbi: Fix error handling in gsbi_probe() (bnc#1012382).
- staging: comedi: ni_usb6501: Fix possible double-free of -&gt;usb_rx_buf (bnc#1012382).
- staging: comedi: ni_usb6501: Fix use of uninitialized mutex (bnc#1012382).
- staging: comedi: vmk80xx: Fix possible double-free of -&gt;usb_rx_buf (bnc#1012382).
- staging: comedi: vmk80xx: Fix use of uninitialized semaphore (bnc#1012382).
- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bnc#1012382).
- staging: iio: adt7316: fix the dac read calculation (bnc#1012382).
- staging: iio: adt7316: fix the dac write calculation (bnc#1012382).
- supported.conf: add lib/crc64 because bcache uses it
- sysctl: handle overflow for file-max (bnc#1012382).
- tcp: Ensure DCTCP reacts to losses (bnc#1012382).
- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).
- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).
- tcp: limit payload size of sacked skbs (bsc#1137586).
- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).
- tcp: tcp_grow_window() needs to respect tcp_space() (bnc#1012382).
- team: fix possible recursive locking when add slaves (bnc#1012382).
- thermal/int340x_thermal: Add additional UUIDs (bnc#1012382).
- thermal/int340x_thermal: fix mode setting (bnc#1012382).
- timer/debug: Change /proc/timer_stats from 0644 to 0600 (bnc#1012382).
- tipc: check bearer name with right length in tipc_nl_compat_bearer_enable (bnc#1012382).
- tipc: check link name with right length in tipc_nl_compat_link_set (bnc#1012382).
- tipc: handle the err returned from cmd header function (bnc#1012382).
- tools lib traceevent: Fix buffer overflow in arg_eval (bnc#1012382).
- tools lib traceevent: Fix missing equality check for strcmp (bsc#1129770).
- tools/power turbostat: return the exit status of a command (bnc#1012382).
- tpm/tpm_crb: Avoid unaligned reads in crb_recv() (bnc#1012382).
- tpm/tpm_i2c_atmel: Return -E2BIG when the transfer is incomplete (bnc#1012382).
- trace: Fix preempt_enable_no_resched() abuse (bnc#1012382).
- tracing: Fix partial reading of trace event's id file (bsc#1136573).
- tracing: kdb: Fix ftdump to not sleep (bnc#1012382).
- treewide: Use DEVICE_ATTR_WO (bsc#1137739).
- tty/serial: atmel: Add is_half_duplex helper (bnc#1012382).
- tty/serial: atmel: RS485 HD w/DMA: enable RX after TX is stopped (bnc#1012382).
- tty: increase the default flip buffer limit to 2*640K (bnc#1012382).
- tty: ldisc: add sysctl to prevent autoloading of ldiscs (bnc#1012382).
- ufs: fix braino in ufs_get_inode_gid() for solaris UFS flavour (bsc#1136455).
- usb: cdc-acm: fix race during wakeup blocking TX traffic (bsc#1129770).
- usb: chipidea: Grab the (legacy) USB PHY by phandle first (bnc#1012382).
- usb: dwc3: Fix default lpm_nyet_threshold value (bnc#1012382).
- usb: gadget: net2272: Fix net2272_dequeue() (bnc#1012382).
- usb: gadget: net2280: Fix net2280_dequeue() (bnc#1012382).
- usb: gadget: net2280: Fix overrun of OUT messages (bnc#1012382).
- usb: u132-hcd: fix resource leak (bnc#1012382).
- usb: usbip: fix isoc packet num validation in get_pipe (bnc#1012382).
- usbnet: ipheth: fix potential null pointer dereference in ipheth_carrier_set (bnc#1012382).
- usbnet: ipheth: prevent TX queue timeouts when device not ready (bnc#1012382).
- vfio/pci: use correct format characters (bnc#1012382).
- vlan: disable SIOCSHWTSTAMP in container (bnc#1012382).
- vrf: sit mtu should not be updated when vrf netdev is the link (bnc#1012382).
- wlcore: Fix memory leak in case wl12xx_fetch_firmware failure (bnc#1012382).
- x86/Kconfig: Select SCHED_SMT if SMP enabled (bnc#1012382).
- x86/MCE: Save microcode revision in machine check records (bnc#1012382).
- x86/bugs: Add AMD's SPEC_CTRL MSR usage (bnc#1012382).
- x86/bugs: Change L1TF mitigation string to match upstream (bnc#1012382).
- x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR (bnc#1012382).
- x86/bugs: Switch the selection of mitigation from CPU vendor to CPU features (bnc#1012382).
- x86/build: Mark per-CPU symbols as absolute explicitly for LLD (bnc#1012382).
- x86/build: Specify elf_i386 linker emulation explicitly for i386 objects (bnc#1012382).
- x86/cpu/bugs: Use __initconst for 'const' init data (bnc#1012382).
- x86/cpu/cyrix: Use correct macros for Cyrix calls on Geode processors (bnc#1012382).
- x86/cpufeatures: Hide AMD-specific speculation flags (bnc#1012382).
- x86/hpet: Prevent potential NULL pointer dereference (bnc#1012382).
- x86/hw_breakpoints: Make default case in hw_breakpoint_arch_parse() return an error (bnc#1012382).
- x86/kprobes: Verify stack frame on kretprobe (bnc#1012382).
- x86/mds: Add MDSUM variant to the MDS documentation (bnc#1012382).
- x86/microcode/intel: Add a helper which gives the microcode revision (bnc#1012382).
- x86/microcode/intel: Check microcode revision before updating sibling threads (bnc#1012382).
- x86/microcode: Make sure boot_cpu_data.microcode is up-to-date (bnc#1012382).
- x86/microcode: Update the new microcode revision unconditionally (bnc#1012382).
- x86/mm: Use WRITE_ONCE() when setting PTEs (bnc#1012382).
- x86/process: Consolidate and simplify switch_to_xtra() code (bnc#1012382).
- x86/speculataion: Mark command line parser data __initdata (bnc#1012382).
- x86/speculation/l1tf: Document l1tf in sysfs (bnc#1012382).
- x86/speculation/mds: Fix comment (bnc#1012382).
- x86/speculation/mds: Fix documentation typo (bnc#1012382).
- x86/speculation: Add command line control for indirect branch speculation (bnc#1012382).
- x86/speculation: Add prctl() control for indirect branch speculation (bnc#1012382).
- x86/speculation: Add seccomp Spectre v2 user space protection mode (bnc#1012382).
- x86/speculation: Avoid __switch_to_xtra() calls (bnc#1012382).
- x86/speculation: Clean up spectre_v2_parse_cmdline() (bnc#1012382).
- x86/speculation: Disable STIBP when enhanced IBRS is in use (bnc#1012382).
- x86/speculation: Enable prctl mode for spectre_v2_user (bnc#1012382).
- x86/speculation: Mark string arrays const correctly (bnc#1012382).
- x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common() (bnc#1012382).
- x86/speculation: Prepare arch_smt_update() for PRCTL mode (bnc#1012382).
- x86/speculation: Prepare for conditional IBPB in switch_mm() (bnc#1012382).
- x86/speculation: Prepare for per task indirect branch speculation control (bnc#1012382).
- x86/speculation: Prevent stale SPEC_CTRL msr content (bnc#1012382).
- x86/speculation: Provide IBPB always command line options (bnc#1012382).
- x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation (bnc#1012382).
- x86/speculation: Remove unnecessary ret variable in cpu_show_common() (bnc#1012382).
- x86/speculation: Rename SSBD update functions (bnc#1012382).
- x86/speculation: Reorder the spec_v2 code (bnc#1012382).
- x86/speculation: Reorganize speculation control MSRs update (bnc#1012382).
- x86/speculation: Split out TIF update (bnc#1012382).
- x86/speculation: Support 'mitigations=' cmdline option (bnc#1012382 bsc#1112178).
- x86/speculation: Support Enhanced IBRS on future CPUs (bnc#1012382).
- x86/speculation: Unify conditional spectre v2 print functions (bnc#1012382).
- x86/speculation: Update the TIF_SSBD comment (bnc#1012382).
- x86/vdso: Drop implicit common-page-size linker flag (bnc#1012382).
- x86/vdso: Pass --eh-frame-hdr to the linker (git-fixes).
- x86: vdso: Use $LD instead of $CC to link (bnc#1012382).
- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).
- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).
- xen: Prevent buffer overflow in privcmd ioctl (bnc#1012382).
- xenbus: drop useless LIST_HEAD in xenbus_write_watch() and xenbus_file_write() (bsc#1065600).
- xsysace: Fix error handling in ace_setup (bnc#1012382).
- xtensa: fix return_address (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-17"/>
	<updated date="2019-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005778">SUSE bug 1005778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005780">SUSE bug 1005780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005781">SUSE bug 1005781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019695">SUSE bug 1019695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019696">SUSE bug 1019696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022604">SUSE bug 1022604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053043">SUSE bug 1053043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063638">SUSE bug 1063638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085535">SUSE bug 1085535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085539">SUSE bug 1085539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090888">SUSE bug 1090888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099658">SUSE bug 1099658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100132">SUSE bug 1100132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106110">SUSE bug 1106110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106284">SUSE bug 1106284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106929">SUSE bug 1106929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108293">SUSE bug 1108293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108838">SUSE bug 1108838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110785">SUSE bug 1110785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110946">SUSE bug 1110946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112063">SUSE bug 1112063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112178">SUSE bug 1112178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116803">SUSE bug 1116803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117562">SUSE bug 1117562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119086">SUSE bug 1119086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120642">SUSE bug 1120642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120843">SUSE bug 1120843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120885">SUSE bug 1120885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120902">SUSE bug 1120902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122776">SUSE bug 1122776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125580">SUSE bug 1125580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126040">SUSE bug 1126040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126356">SUSE bug 1126356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128052">SUSE bug 1128052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129138">SUSE bug 1129138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129770">SUSE bug 1129770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130972">SUSE bug 1130972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131488">SUSE bug 1131488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131543">SUSE bug 1131543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131565">SUSE bug 1131565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132212">SUSE bug 1132212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132374">SUSE bug 1132374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132472">SUSE bug 1132472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133188">SUSE bug 1133188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133874">SUSE bug 1133874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134160">SUSE bug 1134160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134162">SUSE bug 1134162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134338">SUSE bug 1134338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134537">SUSE bug 1134537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134564">SUSE bug 1134564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134565">SUSE bug 1134565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134566">SUSE bug 1134566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134651">SUSE bug 1134651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134760">SUSE bug 1134760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134806">SUSE bug 1134806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134813">SUSE bug 1134813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134848">SUSE bug 1134848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135013">SUSE bug 1135013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135014">SUSE bug 1135014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135015">SUSE bug 1135015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135100">SUSE bug 1135100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135120">SUSE bug 1135120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135281">SUSE bug 1135281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135603">SUSE bug 1135603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135642">SUSE bug 1135642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135661">SUSE bug 1135661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135878">SUSE bug 1135878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136424">SUSE bug 1136424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136438">SUSE bug 1136438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136448">SUSE bug 1136448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136449">SUSE bug 1136449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136451">SUSE bug 1136451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136452">SUSE bug 1136452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136455">SUSE bug 1136455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136458">SUSE bug 1136458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136539">SUSE bug 1136539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136573">SUSE bug 1136573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136575">SUSE bug 1136575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136586">SUSE bug 1136586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136590">SUSE bug 1136590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136623">SUSE bug 1136623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136810">SUSE bug 1136810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136990">SUSE bug 1136990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137142">SUSE bug 1137142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137162">SUSE bug 1137162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137739">SUSE bug 1137739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137752">SUSE bug 1137752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843419">SUSE bug 843419</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4343/">CVE-2013-4343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4343">CVE-2013-4343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17972/">CVE-2018-17972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17972">CVE-2018-17972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7191/">CVE-2018-7191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7191">CVE-2018-7191 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11190/">CVE-2019-11190 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11190">CVE-2019-11190 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11479">CVE-2019-11479 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11486/">CVE-2019-11486 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11486">CVE-2019-11486 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11815/">CVE-2019-11815 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11815">CVE-2019-11815 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11833/">CVE-2019-11833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11833">CVE-2019-11833 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11884/">CVE-2019-11884 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11884">CVE-2019-11884 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12382/">CVE-2019-12382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12382">CVE-2019-12382 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3846">CVE-2019-3846 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5489/">CVE-2019-5489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5489">CVE-2019-5489 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554114" comment="kernel-azure-4.4.180-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554115" comment="kernel-azure-base-4.4.180-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554116" comment="kernel-azure-devel-4.4.180-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554117" comment="kernel-devel-azure-4.4.180-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554118" comment="kernel-source-azure-4.4.180-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554119" comment="kernel-syms-azure-4.4.180-4.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149805" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1005778" ref_url="https://bugzilla.suse.com/1005778" source="BUGZILLA"/>
		<reference ref_id="1005780" ref_url="https://bugzilla.suse.com/1005780" source="BUGZILLA"/>
		<reference ref_id="1005781" ref_url="https://bugzilla.suse.com/1005781" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1019695" ref_url="https://bugzilla.suse.com/1019695" source="BUGZILLA"/>
		<reference ref_id="1019696" ref_url="https://bugzilla.suse.com/1019696" source="BUGZILLA"/>
		<reference ref_id="1022604" ref_url="https://bugzilla.suse.com/1022604" source="BUGZILLA"/>
		<reference ref_id="1063638" ref_url="https://bugzilla.suse.com/1063638" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1085535" ref_url="https://bugzilla.suse.com/1085535" source="BUGZILLA"/>
		<reference ref_id="1085539" ref_url="https://bugzilla.suse.com/1085539" source="BUGZILLA"/>
		<reference ref_id="1090888" ref_url="https://bugzilla.suse.com/1090888" source="BUGZILLA"/>
		<reference ref_id="1099658" ref_url="https://bugzilla.suse.com/1099658" source="BUGZILLA"/>
		<reference ref_id="1100132" ref_url="https://bugzilla.suse.com/1100132" source="BUGZILLA"/>
		<reference ref_id="1106110" ref_url="https://bugzilla.suse.com/1106110" source="BUGZILLA"/>
		<reference ref_id="1106284" ref_url="https://bugzilla.suse.com/1106284" source="BUGZILLA"/>
		<reference ref_id="1106929" ref_url="https://bugzilla.suse.com/1106929" source="BUGZILLA"/>
		<reference ref_id="1108293" ref_url="https://bugzilla.suse.com/1108293" source="BUGZILLA"/>
		<reference ref_id="1108838" ref_url="https://bugzilla.suse.com/1108838" source="BUGZILLA"/>
		<reference ref_id="1110785" ref_url="https://bugzilla.suse.com/1110785" source="BUGZILLA"/>
		<reference ref_id="1110946" ref_url="https://bugzilla.suse.com/1110946" source="BUGZILLA"/>
		<reference ref_id="1112063" ref_url="https://bugzilla.suse.com/1112063" source="BUGZILLA"/>
		<reference ref_id="1112178" ref_url="https://bugzilla.suse.com/1112178" source="BUGZILLA"/>
		<reference ref_id="1116803" ref_url="https://bugzilla.suse.com/1116803" source="BUGZILLA"/>
		<reference ref_id="1117562" ref_url="https://bugzilla.suse.com/1117562" source="BUGZILLA"/>
		<reference ref_id="1119086" ref_url="https://bugzilla.suse.com/1119086" source="BUGZILLA"/>
		<reference ref_id="1120642" ref_url="https://bugzilla.suse.com/1120642" source="BUGZILLA"/>
		<reference ref_id="1120843" ref_url="https://bugzilla.suse.com/1120843" source="BUGZILLA"/>
		<reference ref_id="1120902" ref_url="https://bugzilla.suse.com/1120902" source="BUGZILLA"/>
		<reference ref_id="1122776" ref_url="https://bugzilla.suse.com/1122776" source="BUGZILLA"/>
		<reference ref_id="1126040" ref_url="https://bugzilla.suse.com/1126040" source="BUGZILLA"/>
		<reference ref_id="1126356" ref_url="https://bugzilla.suse.com/1126356" source="BUGZILLA"/>
		<reference ref_id="1128052" ref_url="https://bugzilla.suse.com/1128052" source="BUGZILLA"/>
		<reference ref_id="1129138" ref_url="https://bugzilla.suse.com/1129138" source="BUGZILLA"/>
		<reference ref_id="1129770" ref_url="https://bugzilla.suse.com/1129770" source="BUGZILLA"/>
		<reference ref_id="1130972" ref_url="https://bugzilla.suse.com/1130972" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1131488" ref_url="https://bugzilla.suse.com/1131488" source="BUGZILLA"/>
		<reference ref_id="1131565" ref_url="https://bugzilla.suse.com/1131565" source="BUGZILLA"/>
		<reference ref_id="1132212" ref_url="https://bugzilla.suse.com/1132212" source="BUGZILLA"/>
		<reference ref_id="1132472" ref_url="https://bugzilla.suse.com/1132472" source="BUGZILLA"/>
		<reference ref_id="1133188" ref_url="https://bugzilla.suse.com/1133188" source="BUGZILLA"/>
		<reference ref_id="1133874" ref_url="https://bugzilla.suse.com/1133874" source="BUGZILLA"/>
		<reference ref_id="1134160" ref_url="https://bugzilla.suse.com/1134160" source="BUGZILLA"/>
		<reference ref_id="1134162" ref_url="https://bugzilla.suse.com/1134162" source="BUGZILLA"/>
		<reference ref_id="1134338" ref_url="https://bugzilla.suse.com/1134338" source="BUGZILLA"/>
		<reference ref_id="1134537" ref_url="https://bugzilla.suse.com/1134537" source="BUGZILLA"/>
		<reference ref_id="1134564" ref_url="https://bugzilla.suse.com/1134564" source="BUGZILLA"/>
		<reference ref_id="1134565" ref_url="https://bugzilla.suse.com/1134565" source="BUGZILLA"/>
		<reference ref_id="1134566" ref_url="https://bugzilla.suse.com/1134566" source="BUGZILLA"/>
		<reference ref_id="1134651" ref_url="https://bugzilla.suse.com/1134651" source="BUGZILLA"/>
		<reference ref_id="1134760" ref_url="https://bugzilla.suse.com/1134760" source="BUGZILLA"/>
		<reference ref_id="1134806" ref_url="https://bugzilla.suse.com/1134806" source="BUGZILLA"/>
		<reference ref_id="1134813" ref_url="https://bugzilla.suse.com/1134813" source="BUGZILLA"/>
		<reference ref_id="1134848" ref_url="https://bugzilla.suse.com/1134848" source="BUGZILLA"/>
		<reference ref_id="1135013" ref_url="https://bugzilla.suse.com/1135013" source="BUGZILLA"/>
		<reference ref_id="1135014" ref_url="https://bugzilla.suse.com/1135014" source="BUGZILLA"/>
		<reference ref_id="1135015" ref_url="https://bugzilla.suse.com/1135015" source="BUGZILLA"/>
		<reference ref_id="1135100" ref_url="https://bugzilla.suse.com/1135100" source="BUGZILLA"/>
		<reference ref_id="1135120" ref_url="https://bugzilla.suse.com/1135120" source="BUGZILLA"/>
		<reference ref_id="1135281" ref_url="https://bugzilla.suse.com/1135281" source="BUGZILLA"/>
		<reference ref_id="1135603" ref_url="https://bugzilla.suse.com/1135603" source="BUGZILLA"/>
		<reference ref_id="1135642" ref_url="https://bugzilla.suse.com/1135642" source="BUGZILLA"/>
		<reference ref_id="1135661" ref_url="https://bugzilla.suse.com/1135661" source="BUGZILLA"/>
		<reference ref_id="1135878" ref_url="https://bugzilla.suse.com/1135878" source="BUGZILLA"/>
		<reference ref_id="1136424" ref_url="https://bugzilla.suse.com/1136424" source="BUGZILLA"/>
		<reference ref_id="1136438" ref_url="https://bugzilla.suse.com/1136438" source="BUGZILLA"/>
		<reference ref_id="1136448" ref_url="https://bugzilla.suse.com/1136448" source="BUGZILLA"/>
		<reference ref_id="1136449" ref_url="https://bugzilla.suse.com/1136449" source="BUGZILLA"/>
		<reference ref_id="1136451" ref_url="https://bugzilla.suse.com/1136451" source="BUGZILLA"/>
		<reference ref_id="1136452" ref_url="https://bugzilla.suse.com/1136452" source="BUGZILLA"/>
		<reference ref_id="1136455" ref_url="https://bugzilla.suse.com/1136455" source="BUGZILLA"/>
		<reference ref_id="1136458" ref_url="https://bugzilla.suse.com/1136458" source="BUGZILLA"/>
		<reference ref_id="1136539" ref_url="https://bugzilla.suse.com/1136539" source="BUGZILLA"/>
		<reference ref_id="1136573" ref_url="https://bugzilla.suse.com/1136573" source="BUGZILLA"/>
		<reference ref_id="1136575" ref_url="https://bugzilla.suse.com/1136575" source="BUGZILLA"/>
		<reference ref_id="1136586" ref_url="https://bugzilla.suse.com/1136586" source="BUGZILLA"/>
		<reference ref_id="1136590" ref_url="https://bugzilla.suse.com/1136590" source="BUGZILLA"/>
		<reference ref_id="1136623" ref_url="https://bugzilla.suse.com/1136623" source="BUGZILLA"/>
		<reference ref_id="1136810" ref_url="https://bugzilla.suse.com/1136810" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1136990" ref_url="https://bugzilla.suse.com/1136990" source="BUGZILLA"/>
		<reference ref_id="1137142" ref_url="https://bugzilla.suse.com/1137142" source="BUGZILLA"/>
		<reference ref_id="1137162" ref_url="https://bugzilla.suse.com/1137162" source="BUGZILLA"/>
		<reference ref_id="1137586" ref_url="https://bugzilla.suse.com/1137586" source="BUGZILLA"/>
		<reference ref_id="843419" ref_url="https://bugzilla.suse.com/843419" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17972" ref_url="https://www.suse.com/security/cve/CVE-2018-17972/" source="CVE"/>
		<reference ref_id="CVE-2018-7191" ref_url="https://www.suse.com/security/cve/CVE-2018-7191/" source="CVE"/>
		<reference ref_id="CVE-2019-11190" ref_url="https://www.suse.com/security/cve/CVE-2019-11190/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-11486" ref_url="https://www.suse.com/security/cve/CVE-2019-11486/" source="CVE"/>
		<reference ref_id="CVE-2019-11815" ref_url="https://www.suse.com/security/cve/CVE-2019-11815/" source="CVE"/>
		<reference ref_id="CVE-2019-11833" ref_url="https://www.suse.com/security/cve/CVE-2019-11833/" source="CVE"/>
		<reference ref_id="CVE-2019-11884" ref_url="https://www.suse.com/security/cve/CVE-2019-11884/" source="CVE"/>
		<reference ref_id="CVE-2019-12382" ref_url="https://www.suse.com/security/cve/CVE-2019-12382/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="CVE-2019-5489" ref_url="https://www.suse.com/security/cve/CVE-2019-5489/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.180 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-11477: A sequence of SACKs may have been crafted such that one can trigger an integer overflow, leading to a kernel panic.
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which will
fragment the TCP retransmission queue. An attacker may have been able to further exploit the fragmented queue to cause an
expensive linked-list walk for subsequent SACKs received for that same TCP connection.
- CVE-2019-11479: An attacker could force the Linux kernel to segment its responses into multiple TCP segments. This would drastically increased the bandwidth required to deliver the same amount of data. Further, it would consume additional resources such as CPU and NIC processing power.
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network. (bnc#1136424)
- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel, there was an unchecked kstrdup of fwstr, which might have allowed an attacker to cause a denial of service (NULL pointer dereference and system crash). (bnc#1136586)
- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux kernel allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may have been possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server. (bnc#1120843)
- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the unused memory region in the extent tree block, which might have allowed local users to obtain sensitive information by reading uninitialized data in the filesystem. (bnc#1135281)
- CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was not called before register_netdevice. This allowed local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. (bnc#1135603)
- CVE-2019-11190: The Linux kernel allowed local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() was called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check had a race condition when reading /proc/pid/stat. (bnc#1132472)
- CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel There was a race condition leading to a use-after-free, related to net namespace cleanup. (bnc#1134537)
- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel allowed a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\0' character. (bnc#1134848)
- CVE-2018-17972: An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel It did not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents. (bnc#1110785)
- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel had multiple race conditions. (bnc#1133188)

The following non-security bugs were fixed:

- 9p locks: add mount option for lock retry interval (bnc#1012382).
- 9p: do not trust pdu content for stat item size (bnc#1012382).
- X.509: unpack RSA signatureValue field from BIT STRING (git-fixes).
- acpi / sbs: Fix GPE storm on recent MacBookPro's (bnc#1012382).
- alsa: core: Fix card races between register and disconnect (bnc#1012382).
- alsa: echoaudio: add a check for ioremap_nocache (bnc#1012382).
- alsa: info: Fix racy addition/deletion of nodes (bnc#1012382).
- alsa: line6: use dynamic buffers (bnc#1012382).
- alsa: opl3: fix mismatch between snd_opl3_drum_switch definition and declaration (bnc#1012382).
- alsa: pcm: check if ops are defined before suspending PCM (bnc#1012382).
- alsa: sb8: add a check for request_region (bnc#1012382).
- alsa: seq: Fix OOB-reads from strlcpy (bnc#1012382).
- appletalk: Fix compile regression (bnc#1012382).
- appletalk: Fix use-after-free in atalk_proc_exit (bnc#1012382).
- arm64/kernel: do not ban ADRP to work around Cortex-A53 erratum #843419 (bsc#1126040).
- arm64/kernel: rename module_emit_adrp_veneer-&gt;module_emit_veneer_for_adrp (bsc#1126040).
- arm64: Add helper to decode register from instruction (bsc#1126040).
- arm64: debug: Do not propagate UNKNOWN FAR into si_code for debug signals (bnc#1012382).
- arm64: debug: Ensure debug handlers check triggering exception level (bnc#1012382).
- arm64: futex: Fix FUTEX_WAKE_OP atomic ops with non-zero result value (bnc#1012382).
- arm64: futex: Restore oldval initialization to work around buggy compilers (bnc#1012382).
- arm64: module-plts: factor out PLT generation code for ftrace (bsc#1126040).
- arm64: module: do not BUG when exceeding preallocated PLT count (bsc#1126040).
- arm64: module: split core and init PLT sections (bsc#1126040).
- arm: 8833/1: Ensure that NEON code always compiles with Clang (bnc#1012382).
- arm: 8839/1: kprobe: make patch_lock a raw_spinlock_t (bnc#1012382).
- arm: 8840/1: use a raw_spinlock_t in unwind (bnc#1012382).
- arm: avoid Cortex-A9 livelock on tight dmb loops (bnc#1012382).
- arm: dts: at91: Fix typo in ISC_D0 on PC9 (bnc#1012382).
- arm: dts: pfla02: increase phy reset duration (bnc#1012382).
- arm: iop: do not use using 64-bit DMA masks (bnc#1012382).
- arm: orion: do not use using 64-bit DMA masks (bnc#1012382).
- arm: samsung: Limit SAMSUNG_PM_CHECK config option to non-Exynos platforms (bnc#1012382).
- asoc: Intel: avoid Oops if DMA setup fails (bnc#1012382).
- asoc: cs4270: Set auto-increment bit for register writes (bnc#1012382).
- asoc: fsl-asoc-card: fix object reference leaks in fsl_asoc_card_probe (bnc#1012382).
- asoc: fsl_esai: fix channel swap issue when stream starts (bnc#1012382).
- asoc: tlv320aic32x4: Fix Common Pins (bnc#1012382).
- asoc:soc-pcm:fix a codec fixup issue in TDM case (bnc#1012382).
- backlight: lm3630a: Return 0 on success in update_status functions (bsc#1106929)
- bcache: Move couple of functions to sysfs.c (bsc#1130972).
- bcache: Move couple of string arrays to sysfs.c (bsc#1130972).
- bcache: Populate writeback_rate_minimum attribute (bsc#1130972).
- bcache: account size of buckets used in uuid write to ca-&gt;meta_sectors_written (bsc#1130972).
- bcache: add MODULE_DESCRIPTION information (bsc#1130972).
- bcache: add a comment in super.c (bsc#1130972).
- bcache: add code comments for bset.c (bsc#1130972).
- bcache: add comment for cache_set-&gt;fill_iter (bsc#1130972).
- bcache: add identifier names to arguments of function definitions (bsc#1130972).
- bcache: add missing SPDX header (bsc#1130972).
- bcache: add separate workqueue for journal_write to avoid deadlock (bsc#1130972).
- bcache: add static const prefix to char * array declarations (bsc#1130972).
- bcache: add sysfs_strtoul_bool() for setting bit-field variables (bsc#1130972).
- bcache: add the missing comments for smp_mb()/smp_wmb() (bsc#1130972).
- bcache: cannot set writeback_running via sysfs if no writeback kthread created (bsc#1130972).
- bcache: comment on direct access to bvec table (bsc#1130972).
- bcache: correct dirty data statistics (bsc#1130972).
- bcache: do not assign in if condition in bcache_device_init() (bsc#1130972).
- bcache: do not assign in if condition in bcache_init() (bsc#1130972).
- bcache: do not assign in if condition register_bcache() (bsc#1130972).
- bcache: do not check NULL pointer before calling kmem_cache_destroy (bsc#1130972).
- bcache: do not check if debug dentry is ERR or NULL explicitly on remove (bsc#1130972).
- bcache: do not clone bio in bch_data_verify (bsc#1130972).
- bcache: do not mark writeback_running too early (bsc#1130972).
- bcache: export backing_dev_name via sysfs (bsc#1130972).
- bcache: export backing_dev_uuid via sysfs (bsc#1130972).
- bcache: fix code comments style (bsc#1130972).
- bcache: fix indent by replacing blank by tabs (bsc#1130972).
- bcache: fix indentation issue, remove tabs on a hunk of code (bsc#1130972).
- bcache: fix input integer overflow of congested threshold (bsc#1130972).
- bcache: fix input overflow to cache set sysfs file io_error_halflife (bnc#1012382).
- bcache: fix input overflow to journal_delay_ms (bsc#1130972).
- bcache: fix input overflow to sequential_cutoff (bnc#1012382).
- bcache: fix input overflow to writeback_delay (bsc#1130972).
- bcache: fix input overflow to writeback_rate_minimum (bsc#1130972).
- bcache: fix ioctl in flash device (bsc#1130972).
- bcache: fix mistaken code comments in bcache.h (bsc#1130972).
- bcache: fix mistaken comments in request.c (bsc#1130972).
- bcache: fix potential div-zero error of writeback_rate_i_term_inverse (bsc#1130972).
- bcache: fix potential div-zero error of writeback_rate_p_term_inverse (bsc#1130972).
- bcache: fix typo 'succesfully' to 'successfully' (bsc#1130972).
- bcache: fix typo in code comments of closure_return_with_destructor() (bsc#1130972).
- bcache: improve sysfs_strtoul_clamp() (bnc#1012382).
- bcache: introduce force_wake_up_gc() (bsc#1130972).
- bcache: make cutoff_writeback and cutoff_writeback_sync tunable (bsc#1130972).
- bcache: move open brace at end of function definitions to next line (bsc#1130972).
- bcache: never writeback a discard operation (bsc#1130972).
- bcache: not use hard coded memset size in bch_cache_accounting_clear() (bsc#1130972).
- bcache: option to automatically run gc thread after writeback (bsc#1130972).
- bcache: panic fix for making cache device (bsc#1130972).
- bcache: prefer 'help' in Kconfig (bsc#1130972).
- bcache: print number of keys in trace_bcache_journal_write (bsc#1130972).
- bcache: recal cached_dev_sectors on detach (bsc#1130972).
- bcache: remove unnecessary space before ioctl function pointer arguments (bsc#1130972).
- bcache: remove unused bch_passthrough_cache (bsc#1130972).
- bcache: remove useless parameter of bch_debug_init() (bsc#1130972).
- bcache: replace '%pF' by '%pS' in seq_printf() (bsc#1130972).
- bcache: replace Symbolic permissions by octal permission numbers (bsc#1130972).
- bcache: replace hard coded number with BUCKET_GC_GEN_MAX (bsc#1130972).
- bcache: replace printk() by pr_*() routines (bsc#1130972).
- bcache: set writeback_percent in a flexible range (bsc#1130972).
- bcache: split combined if-condition code into separate ones (bsc#1130972).
- bcache: stop using the deprecated get_seconds() (bsc#1130972).
- bcache: style fix to add a blank line after declarations (bsc#1130972).
- bcache: style fix to replace 'unsigned' by 'unsigned int' (bsc#1130972).
- bcache: style fixes for lines over 80 characters (bsc#1130972).
- bcache: trace missed reading by cache_missed (bsc#1130972).
- bcache: treat stale and dirty keys as bad keys (bsc#1130972).
- bcache: trivial - remove tailing backslash in macro BTREE_FLAG (bsc#1130972).
- bcache: update comment for bch_data_insert (bsc#1130972).
- bcache: use (REQ_META|REQ_PRIO) to indicate bio for metadata (bsc#1130972).
- bcache: use MAX_CACHES_PER_SET instead of magic number 8 in __bch_bucket_alloc_set (bsc#1130972).
- bcache: use REQ_PRIO to indicate bio for metadata (bsc#1130972).
- bcache: use routines from lib/crc64.c for CRC64 calculation (bsc#1130972).
- bcache: use sysfs_strtoul_bool() to set bit-field variables (bsc#1130972).
- bcache: writeback: properly order backing device IO (bsc#1130972).
- binfmt_elf: switch to new creds when switching to new mm (bnc#1012382).
- bitops: avoid integer overflow in GENMASK(_ULL) (bnc#1012382).
- block: check_events: do not bother with events if unsupported (bsc#1110946).
- block: disk_events: introduce event flags (bsc#1110946).
- block: do not leak memory in bio_copy_user_iov() (bnc#1012382).
- block: fix use-after-free on gendisk (bsc#1136448).
- bluetooth: Align minimum encryption key size for LE and BR/EDR connections (bnc#1012382).
- bluetooth: Fix decrementing reference count twice in releasing socket (bnc#1012382).
- bnxt_en: Improve multicast address setup logic (bnc#1012382).
- bonding: fix arp_validate toggling in active-backup mode (bnc#1012382).
- bonding: fix event handling for stacked bonds (bnc#1012382).
- bonding: show full hw address in sysfs for slave entries (bnc#1012382).
- bpf: reject wrong sized filters earlier (bnc#1012382).
- bridge: Fix error path for kobject_init_and_add() (bnc#1012382).
- btrfs: Do not panic when we can't find a root key (bsc#1112063).
- btrfs: Factor out common delayed refs init code (bsc#1134813).
- btrfs: Introduce init_delayed_ref_head (bsc#1134813).
- btrfs: Open-code add_delayed_data_ref (bsc#1134813).
- btrfs: Open-code add_delayed_tree_ref (bsc#1134813).
- btrfs: Use init_delayed_ref_common in add_delayed_data_ref (bsc#1134813).
- btrfs: Use init_delayed_ref_common in add_delayed_tree_ref (bsc#1134813).
- btrfs: Use init_delayed_ref_head in add_delayed_ref_head (bsc#1134813).
- btrfs: add a helper to return a head ref (bsc#1134813).
- btrfs: breakout empty head cleanup to a helper (bsc#1134813).
- btrfs: delayed-ref: Introduce better documented delayed ref structures (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Open-code process_func in __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: move all ref head cleanup to the helper function (bsc#1134813).
- btrfs: move extent_op cleanup to a helper (bsc#1134813).
- btrfs: move ref_mod modification into the if (ref) logic (bsc#1134813).
- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1134806).
- btrfs: qgroup: Do not scan leaf if we're modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: qgroup: Move reserved data accounting from btrfs_delayed_ref_head to btrfs_qgroup_extent_record (bsc#1134162).
- btrfs: qgroup: Remove duplicated trace points for qgroup_rsv_add/release (bsc#1134160).
- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1134338).
- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1134651).
- btrfs: remove delayed_ref_node from ref_head (bsc#1134813).
- btrfs: split delayed ref head initialization and addition (bsc#1134813).
- btrfs: track refs in a rb_tree instead of a list (bsc#1134813).
- cdc-acm: cleaning up debug in data submission path (bsc#1136539).
- cdc-acm: fix race between reset and control messaging (bsc#1106110).
- cdc-acm: handle read pipe errors (bsc#1135878).
- cdc-acm: reassemble fragmented notifications (bsc#1136590).
- cdc-acm: store in and out pipes in acm structure (bsc#1136575).
- cdrom: Fix race condition in cdrom_sysctl_register (bnc#1012382).
- ceph: ensure d_name stability in ceph_dentry_hash() (bsc#1134564).
- ceph: fix ci-&gt;i_head_snapc leak (bsc#1122776).
- ceph: fix use-after-free on symlink traversal (bsc#1134565).
- ceph: only use d_name directly when parent is locked (bsc#1134566).
- cifs: Fix NULL pointer dereference of devname (bnc#1012382).
- cifs: do not attempt cifs operation on smb2+ rename error (bnc#1012382).
- cifs: fallback to older infolevels on findfirst queryinfo retry (bnc#1012382).
- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).
- cifs: use correct format characters (bnc#1012382).
- clk: fix mux clock documentation (bsc#1090888).
- coresight: etm4x: Add support to enable ETMv4.2 (bnc#1012382).
- cpu/speculation: Add 'mitigations=' cmdline option (bnc#1012382 bsc#1112178).
- cpupower: remove stringop-truncation waring (bsc#1119086).
- crypto: crypto4xx - properly set IV after de- and encrypt (bnc#1012382).
- crypto: sha256/arm - fix crash bug in Thumb2 build (bnc#1012382).
- crypto: sha512/arm - fix crash bug in Thumb2 build (bnc#1012382).
- crypto: vmx - CTR: always increment IV as quadword (bsc#1135661, bsc#1137162).
- crypto: vmx - fix copy-paste error in CTR mode (bsc#1135661, bsc#1137162).
- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).
- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).
- crypto: vmx: Only call enable_kernel_vsx() (bsc#1135661, bsc#1137162).
- crypto: x86/poly1305 - fix overflow during partial reduction (bnc#1012382).
- debugfs: fix use-after-free on symlink traversal (bnc#1012382).
- device_cgroup: fix RCU imbalance in error case (bnc#1012382).
- dm thin: add sanity checks to thin-pool and external snapshot creation (bnc#1012382).
- dmaengine: imx-dma: fix warning comparison of distinct pointer types (bnc#1012382).
- dmaengine: tegra: avoid overflow of byte tracking (bnc#1012382).
- documentation: Add MDS vulnerability documentation (bnc#1012382).
- documentation: Add nospectre_v1 parameter (bnc#1012382).
- documentation: Correct the possible MDS sysfs values (bnc#1012382).
- documentation: Move L1TF to separate directory (bnc#1012382).
- drivers/virt/fsl_hypervisor.c: dereferencing error pointers in ioctl (bnc#1012382).
- drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl (bnc#1012382).
- drm/bridge: adv7511: Fix low refresh rate selection (bsc#1106929)
- drm/dp/mst: Configure no_stop_bit correctly for remote i2c xfers (bnc#1012382).
- drm/fb-helper: dpms_legacy(): Only set on connectors in use (bnc#1106929)
- drm/i915: Fix I915_EXEC_RING_MASK (bnc#1106929)
- drm/rockchip: shutdown drm subsystem on shutdown (bsc#1106929)
- drm/ttm: Remove warning about inconsistent mapping information (bnc#1131488)
- drm/vc4: -&gt;x_scaling[1] should never be set to VC4_SCALING_NONE (bsc#1106929)
- drm/vc4: Account for interrupts in flight (bsc#1106929)
- drm/vc4: Allocate the right amount of space for boot-time CRTC state. (bsc#1106929)
- drm/vc4: Fix NULL pointer dereference in vc4_save_hang_state() (bsc#1106929)
- drm/vc4: Fix OOPSes from trying to cache a partially constructed BO. (bsc#1106929)
- drm/vc4: Fix a couple error codes in vc4_cl_lookup_bos() (bsc#1106929)
- drm/vc4: Fix compilation error reported by kbuild test bot (bsc#1106929)
- drm/vc4: Fix memory leak during gpu reset. (bsc#1106929)
- drm/vc4: Fix memory leak of the CRTC state. (bsc#1106929)
- drm/vc4: Fix oops when userspace hands in a bad BO. (bsc#1106929)
- drm/vc4: Fix overflow mem unreferencing when the binner runs dry. (bsc#1106929)
- drm/vc4: Fix races when the CS reads from render targets. (bsc#1106929)
- drm/vc4: Fix scaling of uni-planar formats (bsc#1106929)
- drm/vc4: Fix the 'no scaling' case on multi-planar YUV formats (bsc#1106929)
- drm/vc4: Flush the caches before the bin jobs, as well. (bsc#1106929)
- drm/vc4: Free hang state before destroying BO cache. (bsc#1106929)
- drm/vc4: Move IRQ enable to PM path (bsc#1106929)
- drm/vc4: Reset -&gt;{x, y}_scaling[1] when dealing with uniplanar (bsc#1106929)
- drm/vc4: Set -&gt;is_yuv to false when num_planes == 1 (bsc#1106929)
- drm/vc4: Use drm_free_large() on handles to match its allocation. (bsc#1106929)
- drm/vc4: fix a bounds check (bsc#1106929)
- drm/vmwgfx: NULL pointer dereference from vmw_cmd_dx_view_define() (bsc#1106929)
- drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader() leading to (bsc#1106929)
- dt-bindings: rcar-dmac: Document missing error interrupt (bsc#1085535).
- e1000e: Add Support for 38.4MHZ frequency (bsc#1108293 ).
- e1000e: Add Support for CannonLake (bsc#1108293).
- e1000e: Fix -Wformat-truncation warnings (bnc#1012382).
- e1000e: Initial Support for CannonLake (bsc#1108293 ).
- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bnc#1012382).
- exportfs: fix 'passing zero to ERR_PTR()' warning (bsc#1136458).
- ext4: Return EAGAIN in case of DIO is beyond end of file (bsc#1136810).
- ext4: actually request zeroing of inode table after grow (bsc#1136451).
- ext4: add missing brelse() in add_new_gdb_meta_bg() (bnc#1012382).
- ext4: avoid panic during forced reboot due to aborted journal (bsc#1126356).
- ext4: cleanup bh release code in ext4_ind_remove_space() (bnc#1012382).
- ext4: fix ext4_show_options for file systems w/o journal (bsc#1136452).
- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1136449).
- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1136623).
- ext4: prohibit fstrim in norecovery mode (bnc#1012382).
- ext4: report real fs size after failed resize (bnc#1012382).
- ext4: wait for outstanding dio during truncate in nojournal mode (bsc#1136438).
- f2fs: do not use mutex lock in atomic context (bnc#1012382).
- f2fs: fix to do sanity check with current segment number (bnc#1012382).
- fbdev: fbmem: fix memory access if logo is bigger than the screen (bnc#1012382).
- fix incorrect error code mapping for OBJECTID_NOT_FOUND (bnc#1012382).
- fs/file.c: initialize init_files.resize_wait (bnc#1012382).
- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bnc#1012382).
- fs: fix guard_bio_eod to check for real EOD errors (bnc#1012382).
- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).
- genirq: Prevent use-after-free and work list corruption (bnc#1012382).
- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bnc#1012382).
- gpio: gpio-omap: fix level interrupt idling (bnc#1012382).
- gpu: ipu-v3: dp: fix CSC handling (bnc#1012382).
- h8300: use cc-cross-prefix instead of hardcoding h8300-unknown-linux- (bnc#1012382).
- hid: debug: fix race condition with between rdesc_show() and device removal (bnc#1012382).
- hid: input: add mapping for Expose/Overview key (bnc#1012382).
- hid: input: add mapping for keyboard Brightness Up/Down/Toggle keys (bnc#1012382).
- hugetlbfs: fix memory leak for resv_map (bnc#1012382).
- hwrng: virtio - Avoid repeated init of completion (bnc#1012382).
- i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA (bnc#1012382).
- ib/hfi1: Eliminate opcode tests on mr deref ().
- ib/hfi1: Unreserve a reserved request when it is completed ().
- ib/mlx4: Fix race condition between catas error reset and aliasguid flows (bnc#1012382).
- ib/mlx4: Increase the timeout for CM cache (bnc#1012382).
- ib/rdmavt: Add wc_flags and wc_immdata to cq entry trace ().
- ib/rdmavt: Fix frwr memory registration ().
- igb: Fix WARN_ONCE on runtime suspend (bnc#1012382).
- iio/gyro/bmg160: Use millidegrees for temperature scale (bnc#1012382).
- iio: ad_sigma_delta: select channel when reading register (bnc#1012382).
- iio: adc: at91: disable adc channel interrupt in timeout case (bnc#1012382).
- iio: adc: xilinx: fix potential use-after-free on remove (bnc#1012382).
- include/linux/bitrev.h: fix constant bitrev (bnc#1012382).
- include/linux/swap.h: use offsetof() instead of custom __swapoffset macro (bnc#1012382).
- init: initialize jump labels before command line option parsing (bnc#1012382).
- input: snvs_pwrkey - initialize necessary driver data before enabling IRQ (bnc#1012382).
- io: accel: kxcjk1013: restore the range after resume (bnc#1012382).
- iommu/vt-d: Do not request page request irq under dmar_global_lock (bsc#1135013).
- iommu/vt-d: Make kernel parameter igfx_off work with vIOMMU (bsc#1135014).
- iommu/vt-d: Set intel_iommu_gfx_mapped correctly (bsc#1135015).
- ip6_tunnel: Match to ARPHRD_TUNNEL6 for dev type (bnc#1012382).
- ipmi:ssif: compare block number correctly for multi-part return messages (bsc#1135120).
- ipv4: Fix raw socket lookup for local traffic (bnc#1012382).
- ipv4: add sanity checks in ipv4_link_failure() (git-fixes).
- ipv4: ensure rcu_read_lock() in ipv4_link_failure() (bnc#1012382).
- ipv4: ip_do_fragment: Preserve skb_iif during fragmentation (bnc#1012382).
- ipv4: recompile ip options in ipv4_link_failure (bnc#1012382).
- ipv4: set the tcp_min_rtt_wlen range from 0 to one day (bnc#1012382).
- ipv6/flowlabel: wait rcu grace period before put_pid() (bnc#1012382).
- ipv6: Fix dangling pointer when ipv6 fragment (bnc#1012382).
- ipv6: fix a potential deadlock in do_ipv6_setsockopt() (bnc#1012382).
- ipv6: invert flowlabel sharing check in process and user mode (bnc#1012382).
- ipv6: sit: reset ip header pointer in ipip6_rcv (bnc#1012382).
- ipvs: do not schedule icmp errors from tunnels (bnc#1012382).
- jffs2: fix use-after-free on symlink traversal (bnc#1012382).
- kABI: protect ring_buffer_read_prepare (kabi).
- kABI: protect struct tlb_state (kabi).
- kABI: protect struct usb_interface (kabi).
- kABI: restore ___ptrace_may_access (kabi).
- kABI: restore icmp_send (kabi).
- kabi: arm64: fix kabi breakage on arch specific module (bsc#1126040)
- kabi: drop LINUX_Mib_TCPWQUEUETOOBIG snmp counter (bsc#1137586).
- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).
- kbuild: clang: choose GCC_TOOLCHAIN_DIR not on LD (bnc#1012382).
- kbuild: simplify ld-option implementation (bnc#1012382).
- kconfig/[mn]conf: handle backspace (^H) key (bnc#1012382).
- kconfig: display recursive dependency resolution hint just once (bsc#1100132).
- kernel/sysctl.c: fix out-of-bounds access when setting file-max (bnc#1012382).
- keys: Timestamp new keys (bsc#1120902).
- kprobes: Fix error check when reusing optimized probes (bnc#1012382).
- kprobes: Mark ftrace mcount handler functions nokprobe (bnc#1012382).
- kprobes: Prohibit probing on bsearch() (bnc#1012382).
- kvm: fail KVM_SET_VCPU_EVENTS with invalid exception number (bnc#1012382).
- kvm: x86: Do not clear EFER during SMM transitions for 32-bit vCPU (bnc#1012382).
- kvm: x86: avoid misreporting level-triggered irqs as edge-triggered in tracing (bnc#1012382).
- leds: lp55xx: fix null deref on firmware load failure (bnc#1012382).
- lib/div64.c: off by one in shift (bnc#1012382).
- lib/int_sqrt: optimize initial value compute (bnc#1012382).
- lib/string.c: implement a basic bcmp (bnc#1012382).
- lib: add crc64 calculation routines (bsc#1130972).
- lib: do not depend on linux headers being installed (bsc#1130972).
- libata: fix using DMA buffers on stack (bnc#1012382).
- libnvdimm/btt: Fix a kmemdup failure check (bnc#1012382).
- lpfc: validate command in lpfc_sli4_scmd_to_wqidx_distr() (bsc#1129138).
- mac80211: do not call driver wake_tx_queue op during reconfig (bnc#1012382).
- mac80211_hwsim: validate number of different channels (bsc#1085539).
- md: use mddev_suspend/resume instead of -&gt;quiesce() (bsc#1132212).
- media: mt9m111: set initial frame size other than 0x0 (bnc#1012382).
- media: mx2_emmaprp: Correct return type for mem2mem buffer helpers (bnc#1012382).
- media: pvrusb2: Prevent a buffer overflow (bsc#1135642).
- media: s5p-g2d: Correct return type for mem2mem buffer helpers (bnc#1012382).
- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bnc#1012382).
- media: s5p-jpeg: Correct return type for mem2mem buffer helpers (bnc#1012382).
- media: sh_veu: Correct return type for mem2mem buffer helpers (bnc#1012382).
- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bnc#1012382).
- media: vb2: do not call __vb2_queue_cancel if vb2_start_streaming failed (bsc#1120902).
- mips: scall64-o32: Fix indirect syscall number load (bnc#1012382).
- mm/cma.c: cma_declare_contiguous: correct err handling (bnc#1012382).
- mm/page_ext.c: fix an imbalance with kmemleak (bnc#1012382).
- mm/slab.c: kmemleak no scan alien caches (bnc#1012382).
- mm/vmalloc.c: fix kernel BUG at mm/vmalloc.c:512! (bnc#1012382).
- mm/vmstat.c: fix /proc/vmstat format for CONFIG_DEBUG_TLBFLUSH=y CONFIG_SMP=n (bnc#1012382).
- mm: mempolicy: make mbind() return -EIO when MPOL_MF_STRICT is specified (bnc#1012382).
- mmc: davinci: remove extraneous __init annotation (bnc#1012382).
- mmc: omap: fix the maximum timeout setting (bnc#1012382).
- modpost: file2alias: check prototype of handler (bnc#1012382).
- modpost: file2alias: go back to simple devtable lookup (bnc#1012382).
- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).
- mt7601u: bump supported EEPROM version (bnc#1012382).
- mtd: Fix comparison in map_word_andequal() (git-fixes).
- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).
- net/ibmvnic: Update MAC address settings after adapter reset (bsc#1134760).
- net/ibmvnic: Update carrier state after link state change (bsc#1135100).
- net: atm: Fix potential Spectre v1 vulnerabilities (bnc#1012382).
- net: bridge: multicast: use rcu to access port list from br_multicast_start_querier (bnc#1012382).
- net: ena: fix return value of ena_com_config_llq_info() (bsc#1117562).
- net: ethernet: ti: fix possible object reference leak (bnc#1012382).
- net: ethtool: not call vzalloc for zero sized memory request (bnc#1012382).
- net: fou: do not use guehdr after iptunnel_pull_offloads in gue_udp_recv (bnc#1012382).
- net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bnc#1012382).
- net: hns: Use NAPI_POLL_WEIGHT for hns driver (bnc#1012382).
- net: ibm: fix possible object reference leak (bnc#1012382).
- net: ks8851: Delay requesting IRQ until opened (bnc#1012382).
- net: ks8851: Dequeue RX packets explicitly (bnc#1012382).
- net: ks8851: Reassert reset pin if chip ID check fails (bnc#1012382).
- net: ks8851: Set initial carrier state to down (bnc#1012382).
- net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock() (bnc#1012382).
- net: stmmac: move stmmac_check_ether_addr() to driver probe (bnc#1012382).
- net: ucc_geth - fix Oops when changing number of buffers in the ring (bnc#1012382).
- net: xilinx: fix possible object reference leak (bnc#1012382).
- netfilter: bridge: set skb transport_header before entering NF_INET_PRE_ROUTING (bnc#1012382).
- netfilter: compat: initialize all fields in xt_init (bnc#1012382).
- netfilter: ebtables: CONFIG_COMPAT: drop a bogus WARN_ON (bnc#1012382).
- netfilter: physdev: relax br_netfilter dependency (bnc#1012382).
- netns: provide pure entropy for net_hash_mix() (bnc#1012382).
- nfs/pnfs: Bulk destroy of layouts needs to be safe w.r.t. umount (git-fixes).
- nfs: Add missing encode / decode sequence_maxsz to v4.2 operations (git-fixes).
- nfs: Fix I/O request leakages (git-fixes).
- nfs: Forbid setting AF_INET6 to 'struct sockaddr_in'-&gt;sin_family (bnc#1012382).
- nfs: clean up rest of reqs when failing to add one (git-fixes).
- nfsd: Do not release the callback slot unless it was actually held (bnc#1012382).
- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).
- nvme-fc: resolve io failures during connect (bsc#1116803).
- nvme: Do not allow to reset a reconnecting controller (bsc#1133874).
- ocfs2: fix a panic problem caused by o2cb_ctl (bnc#1012382).
- openvswitch: fix flow actions reallocation (bnc#1012382).
- pNFS: Skip invalid stateids when doing a bulk destroy (git-fixes).
- packet: Fix error path in packet_init (bnc#1012382).
- packet: validate msg_namelen in send directly (bnc#1012382).
- pci: Add function 1 DMA alias quirk for Marvell 9170 SATA controller (bnc#1012382).
- pci: Mark AMD Stoney Radeon R7 GPU ATS as broken (bsc#1137142).
- pci: Mark Atheros AR9462 to avoid bus reset (bsc#1135642).
- pci: xilinx-nwl: Add missing of_node_put() (bsc#1100132).
- perf evsel: Free evsel-&gt;counts in perf_evsel__exit() (bnc#1012382).
- perf test: Fix failure of 'evsel-tp-sched' test on s390 (bnc#1012382).
- perf tests: Fix a memory leak in test__perf_evsel__tp_sched_test() (bnc#1012382).
- perf tests: Fix a memory leak of cpu_map object in the openat_syscall_event_on_all_cpus test (bnc#1012382).
- perf top: Fix error handling in cmd_top() (bnc#1012382).
- perf/core: Restore mmap record type correctly (bnc#1012382).
- perf/x86/intel: Allow PEBS multi-entry in watermark mode (git-fixes).
- perf/x86/intel: Fix handling of wakeup_events for multi-entry PEBS (bnc#1012382).
- platform/x86: sony-laptop: Fix unintentional fall-through (bnc#1012382).
- powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC (bnc#1012382).
- powerpc/64: Call setup_barrier_nospec() from setup_arch() (bnc#1012382 bsc#1131107).
- powerpc/64: Make meltdown reporting Book3S 64 specific (bnc#1012382).
- powerpc/64s: Include cpu header (bnc#1012382).
- powerpc/booke64: set RI in default MSR (bnc#1012382).
- powerpc/fsl: Add FSL_PPC_BOOK3E as supported arch for nospectre_v2 boot arg (bnc#1012382).
- powerpc/fsl: Add barrier_nospec implementation for NXP PowerPC Book3E (bnc#1012382).
- powerpc/fsl: Add infrastructure to fixup branch predictor flush (bnc#1012382).
- powerpc/fsl: Add macro to flush the branch predictor (bnc#1012382).
- powerpc/fsl: Add nospectre_v2 command line argument (bnc#1012382).
- powerpc/fsl: Emulate SPRN_BUCSR register (bnc#1012382).
- powerpc/fsl: Enable runtime patching if nospectre_v2 boot arg is used (bnc#1012382).
- powerpc/fsl: Fix the flush of branch predictor (bnc#1012382).
- powerpc/fsl: Fixed warning: orphan section `__btb_flush_fixup' (bnc#1012382).
- powerpc/fsl: Flush branch predictor when entering KVM (bnc#1012382).
- powerpc/fsl: Flush the branch predictor at each kernel entry (32 bit) (bnc#1012382).
- powerpc/fsl: Flush the branch predictor at each kernel entry (64bit) (bnc#1012382).
- powerpc/fsl: Sanitize the syscall table for NXP PowerPC 32 bit platforms (bnc#1012382).
- powerpc/fsl: Update Spectre v2 reporting (bnc#1012382).
- powerpc/lib: fix book3s/32 boot failure due to code patching (bnc#1012382).
- powerpc/xmon: Add RFI flush related fields to paca dump (bnc#1012382).
- qede: fix write to free'd pointer error and double free of ptp (bsc#1019695 bsc#1019696).
- qlcnic: Avoid potential NULL pointer dereference (bnc#1012382).
- qmi_wwan: add Olicard 600 (bnc#1012382).
- rdma/iw_cxgb4: Fix the unchecked ep dereference (bsc#1005778 bsc#1005780 bsc#1005781).
- rdma/qedr: Fix out of bounds index check in query pkey (bsc#1022604).
- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bnc#1012382).
- rsi: improve kernel thread handling to fix kernel panic (bnc#1012382).
- rtc: da9063: set uie_unsupported when relevant (bnc#1012382).
- rtc: sh: Fix invalid alarm warning for non-enabled alarm (bnc#1012382).
- s390/3270: fix lockdep false positive on view-&gt;lock (bnc#1012382).
- s390/dasd: Fix capacity calculation for large volumes (bnc#1012382).
- s390: ctcm: fix ctcm_new_device error return code (bnc#1012382).
- sc16is7xx: missing unregister/delete driver on error in sc16is7xx_init() (bnc#1012382).
- sc16is7xx: move label 'err_spi' to correct section (git-fixes).
- sched/fair: Do not re-read -&gt;h_load_next during hierarchical load calculation (bnc#1012382).
- sched/fair: Limit sched_cfs_period_timer() loop to avoid hard lockup (bnc#1012382).
- sched/numa: Fix a possible divide-by-zero (bnc#1012382).
- sched: Add sched_smt_active() (bnc#1012382).
- scsi: core: replace GFP_ATOMIC with GFP_KERNEL in scsi_scan.c (bnc#1012382).
- scsi: csiostor: fix missing data copy in csio_scsi_err_handler() (bnc#1012382).
- scsi: libsas: fix a race condition when smp task timeout (bnc#1012382).
- scsi: megaraid_sas: return error when create DMA pool failed (bnc#1012382).
- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bnc#1012382).
- scsi: qla4xxx: fix a potential NULL pointer dereference (bnc#1012382).
- scsi: storvsc: Fix calculation of sub-channel count (bnc#1012382).
- scsi: zfcp: reduce flood of fcrscn1 trace records on multi-element RSCN (bnc#1012382).
- sctp: initialize _pad of sockaddr_in before copying to user memory (bnc#1012382).
- selftests/net: correct the return value for run_netsocktests (bnc#1012382).
- selinux: never allow relabeling on context mounts (bnc#1012382).
- serial: uartps: console_setup() can't be placed to init section (bnc#1012382).
- slip: make slhc_free() silently accept an error pointer (bnc#1012382).
- soc/tegra: fuse: Fix illegal free of IO base address (bnc#1012382).
- soc: imx-sgtl5000: add missing put_device() (bnc#1012382).
- soc: qcom: gsbi: Fix error handling in gsbi_probe() (bnc#1012382).
- staging: comedi: ni_usb6501: Fix possible double-free of -&gt;usb_rx_buf (bnc#1012382).
- staging: comedi: ni_usb6501: Fix use of uninitialized mutex (bnc#1012382).
- staging: comedi: vmk80xx: Fix possible double-free of -&gt;usb_rx_buf (bnc#1012382).
- staging: comedi: vmk80xx: Fix use of uninitialized semaphore (bnc#1012382).
- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bnc#1012382).
- staging: iio: adt7316: fix the dac read calculation (bnc#1012382).
- staging: iio: adt7316: fix the dac write calculation (bnc#1012382).
- supported.conf: add lib/crc64 because bcache uses it
- sysctl: handle overflow for file-max (bnc#1012382).
- tcp: Ensure DCTCP reacts to losses (bnc#1012382).
- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).
- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).
- tcp: limit payload size of sacked skbs (bsc#1137586).
- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).
- tcp: tcp_grow_window() needs to respect tcp_space() (bnc#1012382).
- team: fix possible recursive locking when add slaves (bnc#1012382).
- thermal/int340x_thermal: Add additional UUIDs (bnc#1012382).
- thermal/int340x_thermal: fix mode setting (bnc#1012382).
- timer/debug: Change /proc/timer_stats from 0644 to 0600 (bnc#1012382).
- tipc: check bearer name with right length in tipc_nl_compat_bearer_enable (bnc#1012382).
- tipc: check link name with right length in tipc_nl_compat_link_set (bnc#1012382).
- tipc: handle the err returned from cmd header function (bnc#1012382).
- tools lib traceevent: Fix buffer overflow in arg_eval (bnc#1012382).
- tools lib traceevent: Fix missing equality check for strcmp (bsc#1129770).
- tools/power turbostat: return the exit status of a command (bnc#1012382).
- tpm/tpm_crb: Avoid unaligned reads in crb_recv() (bnc#1012382).
- tpm/tpm_i2c_atmel: Return -E2BIG when the transfer is incomplete (bnc#1012382).
- trace: Fix preempt_enable_no_resched() abuse (bnc#1012382).
- tracing: Fix partial reading of trace event's id file (bsc#1136573).
- tracing: kdb: Fix ftdump to not sleep (bnc#1012382).
- tty/serial: atmel: Add is_half_duplex helper (bnc#1012382).
- tty/serial: atmel: RS485 HD w/DMA: enable RX after TX is stopped (bnc#1012382).
- tty: increase the default flip buffer limit to 2*640K (bnc#1012382).
- tty: ldisc: add sysctl to prevent autoloading of ldiscs (bnc#1012382).
- uas: fix alignment of scatter/gather segments (bnc#1012382 bsc#1129770).
- uas: fix alignment of scatter/gather segments (bsc#1129770).
- ufs: fix braino in ufs_get_inode_gid() for solaris UFS flavour (bsc#1136455).
- usb: Add new USB LPM helpers (bsc#1129770).
- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1129770).
- usb: cdc-acm: fix race during wakeup blocking TX traffic (bsc#1129770).
- usb: cdc-acm: fix unthrottle races (bsc#1135642).
- usb: chipidea: Grab the (legacy) usb PHY by phandle first (bnc#1012382).
- usb: core: Fix bug caused by duplicate interface PM usage counter (bnc#1012382).
- usb: core: Fix unterminated string returned by usb_string() (bnc#1012382).
- usb: dwc3: Fix default lpm_nyet_threshold value (bnc#1012382).
- usb: gadget: net2272: Fix net2272_dequeue() (bnc#1012382).
- usb: gadget: net2280: Fix net2280_dequeue() (bnc#1012382).
- usb: gadget: net2280: Fix overrun of OUT messages (bnc#1012382).
- usb: serial: fix unthrottle races (bnc#1012382).
- usb: serial: use variable for status (bnc#1012382).
- usb: u132-hcd: fix resource leak (bnc#1012382).
- usb: usbip: fix isoc packet num validation in get_pipe (bnc#1012382).
- usb: w1 ds2490: Fix bug caused by improper use of altsetting array (bnc#1012382).
- usb: yurex: Fix protection fault after device removal (bnc#1012382).
- usbnet: ipheth: fix potential null pointer dereference in ipheth_carrier_set (bnc#1012382).
- usbnet: ipheth: prevent TX queue timeouts when device not ready (bnc#1012382).
- vfio/pci: use correct format characters (bnc#1012382).
- vlan: disable SIOCSHWTSTAMP in container (bnc#1012382).
- vrf: sit mtu should not be updated when vrf netdev is the link (bnc#1012382).
- wlcore: Fix memory leak in case wl12xx_fetch_firmware failure (bnc#1012382).
- x86/Kconfig: Select SCHED_SMT if SMP enabled (bnc#1012382).
- x86/MCE: Save microcode revision in machine check records (bnc#1012382).
- x86/bugs: Add AMD's SPEC_CTRL MSR usage (bnc#1012382).
- x86/bugs: Change L1TF mitigation string to match upstream (bnc#1012382).
- x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR (bnc#1012382).
- x86/bugs: Switch the selection of mitigation from CPU vendor to CPU features (bnc#1012382).
- x86/build: Mark per-CPU symbols as absolute explicitly for LLD (bnc#1012382).
- x86/build: Specify elf_i386 linker emulation explicitly for i386 objects (bnc#1012382).
- x86/cpu/bugs: Use __initconst for 'const' init data (bnc#1012382).
- x86/cpu/cyrix: Use correct macros for Cyrix calls on Geode processors (bnc#1012382).
- x86/cpufeatures: Hide AMD-specific speculation flags (bnc#1012382).
- x86/hpet: Prevent potential NULL pointer dereference (bnc#1012382).
- x86/hw_breakpoints: Make default case in hw_breakpoint_arch_parse() return an error (bnc#1012382).
- x86/kprobes: Verify stack frame on kretprobe (bnc#1012382).
- x86/mds: Add MDSUM variant to the MDS documentation (bnc#1012382).
- x86/microcode/intel: Add a helper which gives the microcode revision (bnc#1012382).
- x86/microcode/intel: Check microcode revision before updating sibling threads (bnc#1012382).
- x86/microcode: Make sure boot_cpu_data.microcode is up-to-date (bnc#1012382).
- x86/microcode: Update the new microcode revision unconditionally (bnc#1012382).
- x86/mm: Use WRITE_ONCE() when setting PTEs (bnc#1012382).
- x86/process: Consolidate and simplify switch_to_xtra() code (bnc#1012382).
- x86/speculataion: Mark command line parser data __initdata (bnc#1012382).
- x86/speculation/l1tf: Document l1tf in sysfs (bnc#1012382).
- x86/speculation/mds: Fix comment (bnc#1012382).
- x86/speculation/mds: Fix documentation typo (bnc#1012382).
- x86/speculation: Add command line control for indirect branch speculation (bnc#1012382).
- x86/speculation: Add prctl() control for indirect branch speculation (bnc#1012382).
- x86/speculation: Add seccomp Spectre v2 user space protection mode (bnc#1012382).
- x86/speculation: Avoid __switch_to_xtra() calls (bnc#1012382).
- x86/speculation: Clean up spectre_v2_parse_cmdline() (bnc#1012382).
- x86/speculation: Disable STibP when enhanced IBRS is in use (bnc#1012382).
- x86/speculation: Enable prctl mode for spectre_v2_user (bnc#1012382).
- x86/speculation: Mark string arrays const correctly (bnc#1012382).
- x86/speculation: Move STIPB/ibPB string conditionals out of cpu_show_common() (bnc#1012382).
- x86/speculation: Prepare arch_smt_update() for PRCTL mode (bnc#1012382).
- x86/speculation: Prepare for conditional ibPB in switch_mm() (bnc#1012382).
- x86/speculation: Prepare for per task indirect branch speculation control (bnc#1012382).
- x86/speculation: Prevent stale SPEC_CTRL msr content (bnc#1012382).
- x86/speculation: Provide ibPB always command line options (bnc#1012382).
- x86/speculation: Remove SPECTRE_V2_ibRS in enum spectre_v2_mitigation (bnc#1012382).
- x86/speculation: Remove unnecessary ret variable in cpu_show_common() (bnc#1012382).
- x86/speculation: Rename SSBD update functions (bnc#1012382).
- x86/speculation: Reorder the spec_v2 code (bnc#1012382).
- x86/speculation: Reorganize speculation control MSRs update (bnc#1012382).
- x86/speculation: Split out TIF update (bnc#1012382).
- x86/speculation: Support 'mitigations=' cmdline option (bnc#1012382 bsc#1112178).
- x86/speculation: Support Enhanced ibRS on future CPUs (bnc#1012382).
- x86/speculation: Unify conditional spectre v2 print functions (bnc#1012382).
- x86/speculation: Update the TIF_SSBD comment (bnc#1012382).
- x86/vdso: Drop implicit common-page-size linker flag (bnc#1012382).
- x86/vdso: Pass --eh-frame-hdr to the linker (git-fixes).
- x86: vdso: Use $LD instead of $CC to link (bnc#1012382).
- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).
- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).
- xen: Prevent buffer overflow in privcmd ioctl (bnc#1012382).
- xenbus: drop useless LIST_HEAD in xenbus_write_watch() and xenbus_file_write() (bsc#1065600).
- xsysace: Fix error handling in ace_setup (bnc#1012382).
- xtensa: fix return_address (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-17"/>
	<updated date="2019-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005778">SUSE bug 1005778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005780">SUSE bug 1005780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005781">SUSE bug 1005781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019695">SUSE bug 1019695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019696">SUSE bug 1019696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022604">SUSE bug 1022604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063638">SUSE bug 1063638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085535">SUSE bug 1085535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085539">SUSE bug 1085539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090888">SUSE bug 1090888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099658">SUSE bug 1099658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100132">SUSE bug 1100132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106110">SUSE bug 1106110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106284">SUSE bug 1106284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106929">SUSE bug 1106929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108293">SUSE bug 1108293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108838">SUSE bug 1108838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110785">SUSE bug 1110785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110946">SUSE bug 1110946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112063">SUSE bug 1112063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112178">SUSE bug 1112178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116803">SUSE bug 1116803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117562">SUSE bug 1117562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119086">SUSE bug 1119086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120642">SUSE bug 1120642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120843">SUSE bug 1120843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120902">SUSE bug 1120902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122776">SUSE bug 1122776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126040">SUSE bug 1126040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126356">SUSE bug 1126356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128052">SUSE bug 1128052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129138">SUSE bug 1129138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129770">SUSE bug 1129770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130972">SUSE bug 1130972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131488">SUSE bug 1131488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131565">SUSE bug 1131565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132212">SUSE bug 1132212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132472">SUSE bug 1132472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133188">SUSE bug 1133188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133874">SUSE bug 1133874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134160">SUSE bug 1134160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134162">SUSE bug 1134162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134338">SUSE bug 1134338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134537">SUSE bug 1134537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134564">SUSE bug 1134564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134565">SUSE bug 1134565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134566">SUSE bug 1134566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134651">SUSE bug 1134651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134760">SUSE bug 1134760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134806">SUSE bug 1134806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134813">SUSE bug 1134813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134848">SUSE bug 1134848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135013">SUSE bug 1135013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135014">SUSE bug 1135014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135015">SUSE bug 1135015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135100">SUSE bug 1135100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135120">SUSE bug 1135120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135281">SUSE bug 1135281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135603">SUSE bug 1135603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135642">SUSE bug 1135642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135661">SUSE bug 1135661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135878">SUSE bug 1135878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136424">SUSE bug 1136424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136438">SUSE bug 1136438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136448">SUSE bug 1136448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136449">SUSE bug 1136449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136451">SUSE bug 1136451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136452">SUSE bug 1136452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136455">SUSE bug 1136455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136458">SUSE bug 1136458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136539">SUSE bug 1136539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136573">SUSE bug 1136573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136575">SUSE bug 1136575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136586">SUSE bug 1136586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136590">SUSE bug 1136590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136623">SUSE bug 1136623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136810">SUSE bug 1136810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136990">SUSE bug 1136990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137142">SUSE bug 1137142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137162">SUSE bug 1137162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843419">SUSE bug 843419</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17972/">CVE-2018-17972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17972">CVE-2018-17972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7191/">CVE-2018-7191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7191">CVE-2018-7191 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11190/">CVE-2019-11190 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11190">CVE-2019-11190 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11479">CVE-2019-11479 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11486/">CVE-2019-11486 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11486">CVE-2019-11486 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11815/">CVE-2019-11815 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11815">CVE-2019-11815 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11833/">CVE-2019-11833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11833">CVE-2019-11833 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11884/">CVE-2019-11884 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11884">CVE-2019-11884 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12382/">CVE-2019-12382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12382">CVE-2019-12382 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3846">CVE-2019-3846 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5489/">CVE-2019-5489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5489">CVE-2019-5489 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554120" comment="kernel-default-4.4.180-94.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554121" comment="kernel-default-base-4.4.180-94.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554122" comment="kernel-default-devel-4.4.180-94.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554123" comment="kernel-default-man-4.4.180-94.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521461" comment="kernel-devel-4.4.180-94.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521462" comment="kernel-macros-4.4.180-94.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521463" comment="kernel-source-4.4.180-94.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554124" comment="kernel-syms-4.4.180-94.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149806" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1135273" ref_url="https://bugzilla.suse.com/1135273" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005580.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Sampling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the libvirt adjustments, that pass through the new 'md-clear' CPU flag (bsc#1135273).

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-18"/>
	<updated date="2019-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135273">SUSE bug 1135273</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554125" comment="libvirt-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554126" comment="libvirt-admin-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554127" comment="libvirt-client-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554128" comment="libvirt-daemon-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554129" comment="libvirt-daemon-config-network-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554130" comment="libvirt-daemon-config-nwfilter-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554131" comment="libvirt-daemon-driver-interface-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521472" comment="libvirt-daemon-driver-libxl-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554132" comment="libvirt-daemon-driver-lxc-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554133" comment="libvirt-daemon-driver-network-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554134" comment="libvirt-daemon-driver-nodedev-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554135" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554136" comment="libvirt-daemon-driver-qemu-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554137" comment="libvirt-daemon-driver-secret-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554138" comment="libvirt-daemon-driver-storage-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554139" comment="libvirt-daemon-driver-storage-core-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554140" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554141" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554142" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554143" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554144" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554145" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554146" comment="libvirt-daemon-hooks-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554147" comment="libvirt-daemon-lxc-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554148" comment="libvirt-daemon-qemu-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521489" comment="libvirt-daemon-xen-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554149" comment="libvirt-doc-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554150" comment="libvirt-libs-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554151" comment="libvirt-lock-sanlock-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554152" comment="libvirt-nss-3.3.0-5.33.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149807" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1133375" ref_url="https://bugzilla.suse.com/1133375" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005593.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-base fixes the following issue:
Security issue fixed:

- CVE-2019-9928: Fixed a heap-based overflow in the rtsp connection parser (bsc#1133375).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9928">CVE-2019-9928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554153" comment="gstreamer-plugins-base-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521494" comment="gstreamer-plugins-base-lang-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554154" comment="libgstallocators-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554155" comment="libgstapp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551144" comment="libgstapp-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554156" comment="libgstaudio-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551146" comment="libgstaudio-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554157" comment="libgstfft-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554158" comment="libgstpbutils-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551149" comment="libgstpbutils-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554159" comment="libgstriff-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554160" comment="libgstrtp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554161" comment="libgstrtsp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554162" comment="libgstsdp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554163" comment="libgsttag-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551155" comment="libgsttag-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554164" comment="libgstvideo-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551157" comment="libgstvideo-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149808" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1136976" ref_url="https://bugzilla.suse.com/1136976" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005603.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issue fixed:	  

- CVE-2019-8457: Fixed a Heap out-of-bound read in rtreenode() when handling invalid rtree tables (bsc#1136976).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136976">SUSE bug 1136976</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8457">CVE-2019-8457 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554165" comment="libsqlite3-0-3.8.10.2-9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548610" comment="libsqlite3-0-32bit-3.8.10.2-9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554166" comment="sqlite3-3.8.10.2-9.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149809" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1136570" ref_url="https://bugzilla.suse.com/1136570" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1606-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005832.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- Fix the previous fix for CVE-2019-3860 (bsc#1136570, bsc#1128481)
  (Out-of-bounds reads with specially crafted SFTP packets)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3860">CVE-2019-3860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554167" comment="libssh2-1-1.4.3-20.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546464" comment="libssh2-1-32bit-1.4.3-20.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554167" comment="libssh2-1-1.4.3-20.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546464" comment="libssh2-1-32bit-1.4.3-20.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149810" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1136021" ref_url="https://bugzilla.suse.com/1136021" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:1610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005604.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.4.15 fixes the following issues:

Security issue fixed:

- Fixed a denial of service in the dissection engine (bsc#1136021). 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1136021">SUSE bug 1136021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554168" comment="libwireshark9-2.4.15-48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554169" comment="libwiretap7-2.4.15-48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554170" comment="libwscodecs1-2.4.15-48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554171" comment="libwsutil8-2.4.15-48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554172" comment="wireshark-2.4.15-48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554173" comment="wireshark-gtk-2.4.15-48.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149811" version="1" class="patch">
	<metadata>
		<title>Recommended update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1137792" ref_url="https://bugzilla.suse.com/1137792" source="BUGZILLA"/>
		<reference ref_id="1138614" ref_url="https://bugzilla.suse.com/1138614" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707/" source="CVE"/>
		<reference ref_id="SUSE-RU-2019:1625-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-June/011821.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 60.7.1 fixes the following issues:

Security issue fixed:    

- CVE-2019-11707: Fixed a type confusion vulnerability in Arrary.pop (bsc#1138614)    

Other issue addressed: 

- Fixed broken language plugins (bsc#1137792)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1137792">SUSE bug 1137792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138614">SUSE bug 1138614</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11707">CVE-2019-11707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562515" comment="MozillaFirefox-60.7.1-109.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562516" comment="MozillaFirefox-translations-common-60.7.1-109.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149812" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1132734" ref_url="https://bugzilla.suse.com/1132734" source="BUGZILLA"/>
		<reference ref_id="1134718" ref_url="https://bugzilla.suse.com/1134718" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10245" ref_url="https://www.suse.com/security/cve/CVE-2019-10245/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2697" ref_url="https://www.suse.com/security/cve/CVE-2019-2697/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005616.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 5 Fix Pack 35.

Security issues fixed:

- CVE-2019-10245: Fixed Java bytecode verifier issue causing crashes (bsc#1134718).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2697: Fixed flaw inside the 2D component (bsc#1132734).
- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw was found in the RMI registry implementation (bsc#1132732).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132734">SUSE bug 1132734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10245/">CVE-2019-10245 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10245">CVE-2019-10245 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2602">CVE-2019-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2684">CVE-2019-2684 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2697/">CVE-2019-2697 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2697">CVE-2019-2697 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2698">CVE-2019-2698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548612" comment="java-1_8_0-ibm-1.8.0_sr5.35-30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530571" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.35-30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530573" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.35-30.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149813" version="1" class="patch">
	<metadata>
		<title>Security update for netpbm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1024288" ref_url="https://bugzilla.suse.com/1024288" source="BUGZILLA"/>
		<reference ref_id="1024291" ref_url="https://bugzilla.suse.com/1024291" source="BUGZILLA"/>
		<reference ref_id="1086777" ref_url="https://bugzilla.suse.com/1086777" source="BUGZILLA"/>
		<reference ref_id="1136936" ref_url="https://bugzilla.suse.com/1136936" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2579" ref_url="https://www.suse.com/security/cve/CVE-2017-2579/" source="CVE"/>
		<reference ref_id="CVE-2017-2580" ref_url="https://www.suse.com/security/cve/CVE-2017-2580/" source="CVE"/>
		<reference ref_id="CVE-2018-8975" ref_url="https://www.suse.com/security/cve/CVE-2018-8975/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005619.html" source="SUSE-SU"/>
		<description>
This update for netpbm fixes the following issues:

Security issues fixed:

- CVE-2018-8975: The pm_mallocarray2 function allowed remote attackers to cause
  a denial of service (heap-based buffer over-read) via a crafted image file (bsc#1086777).
- CVE-2017-2579: Fixed out-of-bounds read in expandCodeOntoStack() (bsc#1024288).
- CVE-2017-2580: Fixed out-of-bounds write of heap data in addPixelToRaster() function (bsc#1024291).

- create netpbm-vulnerable subpackage and move pstopnm there (bsc#1136936)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024288">SUSE bug 1024288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024291">SUSE bug 1024291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086777">SUSE bug 1086777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136936">SUSE bug 1136936</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2579/">CVE-2017-2579 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2579">CVE-2017-2579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2580/">CVE-2017-2580 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2580">CVE-2017-2580 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8975/">CVE-2018-8975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8975">CVE-2018-8975 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554174" comment="libnetpbm11-10.66.3-8.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554175" comment="libnetpbm11-32bit-10.66.3-8.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554176" comment="netpbm-10.66.3-8.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149814" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1138872" ref_url="https://bugzilla.suse.com/1138872" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005624.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Mozilla Firefox Firefox 60.7.2
  MFSA 2019-19 (bsc#1138872)

- CVE-2019-11708: Fix sandbox escape using Prompt:Open.
  * Insufficient vetting of parameters passed with the Prompt:Open IPC
    message between child and parent processes could result in the non-sandboxed
    parent process opening web content chosen by a compromised child process.
    When combined with additional vulnerabilities this could result in executing
    arbitrary code on the user's computer.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-22"/>
	<updated date="2019-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138872">SUSE bug 1138872</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11708">CVE-2019-11708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554177" comment="MozillaFirefox-60.7.2-109.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554178" comment="MozillaFirefox-translations-common-60.7.2-109.80.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554177" comment="MozillaFirefox-60.7.2-109.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554178" comment="MozillaFirefox-translations-common-60.7.2-109.80.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149815" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1134689" ref_url="https://bugzilla.suse.com/1134689" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10130" ref_url="https://www.suse.com/security/cve/CVE-2019-10130/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005627.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

Security issue fixed:

- CVE-2019-10130: Prevent row-level security policies from being bypassed via selectivity estimators (bsc#1134689).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-24"/>
	<updated date="2019-06-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1134689">SUSE bug 1134689</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10130/">CVE-2019-10130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10130">CVE-2019-10130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554179" comment="postgresql96-9.6.13-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554180" comment="postgresql96-contrib-9.6.13-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554181" comment="postgresql96-docs-9.6.13-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554182" comment="postgresql96-server-9.6.13-3.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149816" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1133204" ref_url="https://bugzilla.suse.com/1133204" source="BUGZILLA"/>
		<reference ref_id="1133205" ref_url="https://bugzilla.suse.com/1133205" source="BUGZILLA"/>
		<reference ref_id="1133498" ref_url="https://bugzilla.suse.com/1133498" source="BUGZILLA"/>
		<reference ref_id="1133501" ref_url="https://bugzilla.suse.com/1133501" source="BUGZILLA"/>
		<reference ref_id="1134075" ref_url="https://bugzilla.suse.com/1134075" source="BUGZILLA"/>
		<reference ref_id="1135232" ref_url="https://bugzilla.suse.com/1135232" source="BUGZILLA"/>
		<reference ref_id="1135236" ref_url="https://bugzilla.suse.com/1135236" source="BUGZILLA"/>
		<reference ref_id="1136183" ref_url="https://bugzilla.suse.com/1136183" source="BUGZILLA"/>
		<reference ref_id="1136732" ref_url="https://bugzilla.suse.com/1136732" source="BUGZILLA"/>
		<reference ref_id="1138425" ref_url="https://bugzilla.suse.com/1138425" source="BUGZILLA"/>
		<reference ref_id="1138464" ref_url="https://bugzilla.suse.com/1138464" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12805" ref_url="https://www.suse.com/security/cve/CVE-2017-12805/" source="CVE"/>
		<reference ref_id="CVE-2017-12806" ref_url="https://www.suse.com/security/cve/CVE-2017-12806/" source="CVE"/>
		<reference ref_id="CVE-2019-10131" ref_url="https://www.suse.com/security/cve/CVE-2019-10131/" source="CVE"/>
		<reference ref_id="CVE-2019-11470" ref_url="https://www.suse.com/security/cve/CVE-2019-11470/" source="CVE"/>
		<reference ref_id="CVE-2019-11472" ref_url="https://www.suse.com/security/cve/CVE-2019-11472/" source="CVE"/>
		<reference ref_id="CVE-2019-11505" ref_url="https://www.suse.com/security/cve/CVE-2019-11505/" source="CVE"/>
		<reference ref_id="CVE-2019-11506" ref_url="https://www.suse.com/security/cve/CVE-2019-11506/" source="CVE"/>
		<reference ref_id="CVE-2019-11597" ref_url="https://www.suse.com/security/cve/CVE-2019-11597/" source="CVE"/>
		<reference ref_id="CVE-2019-11598" ref_url="https://www.suse.com/security/cve/CVE-2019-11598/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-11597: Fixed a heap-based buffer over-read in the WriteTIFFImage() (bsc#1138464).
- Fixed a file content disclosure via SVG and WMF decoding (bsc#1138425).- CVE-2019-11472: Fixed a denial of service in ReadXWDImage() (bsc#1133204).
- CVE-2019-11470: Fixed a denial of service in ReadCINImage() (bsc#1133205).
- CVE-2019-11506: Fixed a heap-based buffer overflow in the WriteMATLABImage() (bsc#1133498).
- CVE-2019-11505: Fixed a heap-based buffer overflow in the WritePDBImage() (bsc#1133501).
- CVE-2019-10131: Fixed a off-by-one read in formatIPTCfromBuffer function in coders/meta.c (bsc#1134075).
- CVE-2017-12806: Fixed a denial of service through memory exhaustion in format8BIM() (bsc#1135232).
- CVE-2017-12805: Fixed a denial of service through memory exhaustion in ReadTIFFImage() (bsc#1135236).
- CVE-2019-11598: Fixed a heap-based buffer over-read in WritePNMImage() (bsc#1136732)
    
We also now disable PCL in the -SUSE configuration, as it also uses ghostscript for decoding (bsc#1136183)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-25"/>
	<updated date="2019-06-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133205">SUSE bug 1133205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133498">SUSE bug 1133498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133501">SUSE bug 1133501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134075">SUSE bug 1134075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135232">SUSE bug 1135232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135236">SUSE bug 1135236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136183">SUSE bug 1136183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136732">SUSE bug 1136732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138425">SUSE bug 1138425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138464">SUSE bug 1138464</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12805/">CVE-2017-12805 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12805">CVE-2017-12805 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12806/">CVE-2017-12806 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12806">CVE-2017-12806 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10131/">CVE-2019-10131 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10131">CVE-2019-10131 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11470/">CVE-2019-11470 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11470">CVE-2019-11470 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11472/">CVE-2019-11472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11472">CVE-2019-11472 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11505/">CVE-2019-11505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11505">CVE-2019-11505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11506/">CVE-2019-11506 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11506">CVE-2019-11506 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11597/">CVE-2019-11597 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11597">CVE-2019-11597 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11598/">CVE-2019-11598 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11598">CVE-2019-11598 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554183" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.123.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554184" comment="ImageMagick-config-6-upstream-6.8.8.1-71.123.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554185" comment="libMagickCore-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554186" comment="libMagickWand-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149817" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1054429" ref_url="https://bugzilla.suse.com/1054429" source="BUGZILLA"/>
		<reference ref_id="1076958" ref_url="https://bugzilla.suse.com/1076958" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15107" ref_url="https://www.suse.com/security/cve/CVE-2017-15107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005642.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

Security issue fixed:

- CVE-2017-15107: Fixed a vulnerability in DNSSEC implementation. Processing of
  wildcard synthesized NSEC records may result improper validation for non-existance. (bsc#1076958)

Non-security issue fixed:

- Reload system dbus to pick up policy change on install (bsc#1054429).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-02"/>
	<updated date="2019-07-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054429">SUSE bug 1054429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076958">SUSE bug 1076958</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15107/">CVE-2017-15107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15107">CVE-2017-15107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554187" comment="dnsmasq-2.78-18.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149818" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1061599" ref_url="https://bugzilla.suse.com/1061599" source="BUGZILLA"/>
		<reference ref_id="1107116" ref_url="https://bugzilla.suse.com/1107116" source="BUGZILLA"/>
		<reference ref_id="1107121" ref_url="https://bugzilla.suse.com/1107121" source="BUGZILLA"/>
		<reference ref_id="1137001" ref_url="https://bugzilla.suse.com/1137001" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16428" ref_url="https://www.suse.com/security/cve/CVE-2018-16428/" source="CVE"/>
		<reference ref_id="CVE-2018-16429" ref_url="https://www.suse.com/security/cve/CVE-2018-16429/" source="CVE"/>
		<reference ref_id="CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005644.html" source="SUSE-SU"/>
		<description>
This update for glib2 provides the following fix:


Security issues fixed:

- CVE-2019-12450: Fixed an improper file permission when copy operation
  takes place (bsc#1137001).     
- CVE-2018-16428: Avoid a null pointer dereference that could crash glib2 users in markup processing (bnc#1107121).
- CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116).

Non-security issues fixed:

- Install dummy *-mimeapps.list files to prevent dead symlinks. (bsc#1061599)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-02"/>
	<updated date="2019-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1061599">SUSE bug 1061599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107116">SUSE bug 1107116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107121">SUSE bug 1107121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137001">SUSE bug 1137001</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16428/">CVE-2018-16428 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16428">CVE-2018-16428 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16429/">CVE-2018-16429 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16429">CVE-2018-16429 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12450">CVE-2019-12450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521548" comment="glib2-lang-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554188" comment="glib2-tools-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554189" comment="libgio-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551163" comment="libgio-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554190" comment="libglib-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551165" comment="libglib-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554191" comment="libgmodule-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551167" comment="libgmodule-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554192" comment="libgobject-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551169" comment="libgobject-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554193" comment="libgthread-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551171" comment="libgthread-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149819" version="1" class="patch">
	<metadata>
		<title>Security update for elfutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1030472" ref_url="https://bugzilla.suse.com/1030472" source="BUGZILLA"/>
		<reference ref_id="1030476" ref_url="https://bugzilla.suse.com/1030476" source="BUGZILLA"/>
		<reference ref_id="1033084" ref_url="https://bugzilla.suse.com/1033084" source="BUGZILLA"/>
		<reference ref_id="1033085" ref_url="https://bugzilla.suse.com/1033085" source="BUGZILLA"/>
		<reference ref_id="1033087" ref_url="https://bugzilla.suse.com/1033087" source="BUGZILLA"/>
		<reference ref_id="1033088" ref_url="https://bugzilla.suse.com/1033088" source="BUGZILLA"/>
		<reference ref_id="1033089" ref_url="https://bugzilla.suse.com/1033089" source="BUGZILLA"/>
		<reference ref_id="1033090" ref_url="https://bugzilla.suse.com/1033090" source="BUGZILLA"/>
		<reference ref_id="1106390" ref_url="https://bugzilla.suse.com/1106390" source="BUGZILLA"/>
		<reference ref_id="1107067" ref_url="https://bugzilla.suse.com/1107067" source="BUGZILLA"/>
		<reference ref_id="1111973" ref_url="https://bugzilla.suse.com/1111973" source="BUGZILLA"/>
		<reference ref_id="1112723" ref_url="https://bugzilla.suse.com/1112723" source="BUGZILLA"/>
		<reference ref_id="1112726" ref_url="https://bugzilla.suse.com/1112726" source="BUGZILLA"/>
		<reference ref_id="1123685" ref_url="https://bugzilla.suse.com/1123685" source="BUGZILLA"/>
		<reference ref_id="1125007" ref_url="https://bugzilla.suse.com/1125007" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10254" ref_url="https://www.suse.com/security/cve/CVE-2016-10254/" source="CVE"/>
		<reference ref_id="CVE-2016-10255" ref_url="https://www.suse.com/security/cve/CVE-2016-10255/" source="CVE"/>
		<reference ref_id="CVE-2017-7607" ref_url="https://www.suse.com/security/cve/CVE-2017-7607/" source="CVE"/>
		<reference ref_id="CVE-2017-7608" ref_url="https://www.suse.com/security/cve/CVE-2017-7608/" source="CVE"/>
		<reference ref_id="CVE-2017-7610" ref_url="https://www.suse.com/security/cve/CVE-2017-7610/" source="CVE"/>
		<reference ref_id="CVE-2017-7611" ref_url="https://www.suse.com/security/cve/CVE-2017-7611/" source="CVE"/>
		<reference ref_id="CVE-2017-7612" ref_url="https://www.suse.com/security/cve/CVE-2017-7612/" source="CVE"/>
		<reference ref_id="CVE-2017-7613" ref_url="https://www.suse.com/security/cve/CVE-2017-7613/" source="CVE"/>
		<reference ref_id="CVE-2018-16062" ref_url="https://www.suse.com/security/cve/CVE-2018-16062/" source="CVE"/>
		<reference ref_id="CVE-2018-16403" ref_url="https://www.suse.com/security/cve/CVE-2018-16403/" source="CVE"/>
		<reference ref_id="CVE-2018-18310" ref_url="https://www.suse.com/security/cve/CVE-2018-18310/" source="CVE"/>
		<reference ref_id="CVE-2018-18520" ref_url="https://www.suse.com/security/cve/CVE-2018-18520/" source="CVE"/>
		<reference ref_id="CVE-2018-18521" ref_url="https://www.suse.com/security/cve/CVE-2018-18521/" source="CVE"/>
		<reference ref_id="CVE-2019-7150" ref_url="https://www.suse.com/security/cve/CVE-2019-7150/" source="CVE"/>
		<reference ref_id="CVE-2019-7665" ref_url="https://www.suse.com/security/cve/CVE-2019-7665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<description>
This update for elfutils fixes the following issues:

Security issues fixed: 	  

- CVE-2018-16403: Fixed a heap-based buffer over-read that could have led to Denial of Service (bsc#1107067).  
- CVE-2016-10254: Fixed a memory allocation failure in alloxate_elf (bsc#1030472).
- CVE-2019-7665: NT_PLATFORM core file note should be a zero terminated string (bsc#1125007).
- CVE-2016-10255: Fixed a memory allocation failure in libelf_set_rawdata_wrlock (bsc#1030476).
- CVE-2019-7150: Added a missing check in dwfl_segment_report_module which could have allowed truncated files 
  to be read (bsc#1123685).
- CVE-2018-16062: Fixed a heap-buffer-overflow (bsc#1106390).
- CVE-2017-7611: Fixed a heap-based buffer over-read that could have led to Denial of Service (bsc#1033088).
- CVE-2017-7613: Fixed denial of service caused by the missing validation of the number of sections 
  and the number of segments in a crafted ELF file (bsc#1033090).
- CVE-2017-7607: Fixed a heap-based buffer overflow in handle_gnu_hash (bsc#1033084).
- CVE-2017-7608: Fixed a heap-based buffer overflow in ebl_object_note_type_name() (bsc#1033085).
- CVE-2017-7610: Fixed a heap-based buffer overflow in check_group (bsc#1033087).
- CVE-2018-18521: Fixed multiple divide-by-zero vulnerabilities in function arlib_add_symbols() (bsc#1112723).
- CVE-2017-7612: Fixed a denial of service in check_sysv_hash() via a crafted ELF file (bsc#1033089).
- CVE-2018-18310: Fixed an invalid address read in dwfl_segment_report_module.c (bsc#1111973).
- CVE-2018-18520: Fixed bad handling of ar files inside are files (bsc#1112726).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-03"/>
	<updated date="2019-07-03"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1030472">SUSE bug 1030472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030476">SUSE bug 1030476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033084">SUSE bug 1033084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033085">SUSE bug 1033085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033087">SUSE bug 1033087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033088">SUSE bug 1033088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033089">SUSE bug 1033089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033090">SUSE bug 1033090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106390">SUSE bug 1106390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107067">SUSE bug 1107067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111973">SUSE bug 1111973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112723">SUSE bug 1112723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112726">SUSE bug 1112726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123685">SUSE bug 1123685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125007">SUSE bug 1125007</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10254/">CVE-2016-10254 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10254">CVE-2016-10254 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10255/">CVE-2016-10255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10255">CVE-2016-10255 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7607/">CVE-2017-7607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7607">CVE-2017-7607 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7608/">CVE-2017-7608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7608">CVE-2017-7608 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7610/">CVE-2017-7610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7610">CVE-2017-7610 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7611/">CVE-2017-7611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7611">CVE-2017-7611 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7612/">CVE-2017-7612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7612">CVE-2017-7612 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7613/">CVE-2017-7613 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7613">CVE-2017-7613 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16062/">CVE-2018-16062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16062">CVE-2018-16062 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16403/">CVE-2018-16403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16403">CVE-2018-16403 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18310/">CVE-2018-18310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18310">CVE-2018-18310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18520/">CVE-2018-18520 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18520">CVE-2018-18520 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18521/">CVE-2018-18521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18521">CVE-2018-18521 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7150/">CVE-2019-7150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7150">CVE-2019-7150 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7665/">CVE-2019-7665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7665">CVE-2019-7665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554194" comment="elfutils-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554195" comment="libasm1-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554196" comment="libasm1-32bit-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554197" comment="libdw1-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554198" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554199" comment="libebl1-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554200" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554201" comment="libelf1-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554202" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149820" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1138034" ref_url="https://bugzilla.suse.com/1138034" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1783-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005776.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 to version 10.9 fixes the following issue:

Security issue fixed:	  

- CVE-2019-10164: Fixed buffer-overflow vulnerabilities in SCRAM verifier parsing (bsc#1138034).

More information at https://www.postgresql.org/docs/10/release-10-9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-09"/>
	<updated date="2019-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138034">SUSE bug 1138034</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10164">CVE-2019-10164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554203" comment="libecpg6-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554204" comment="libpq5-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546510" comment="libpq5-32bit-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554205" comment="postgresql10-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554206" comment="postgresql10-contrib-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530576" comment="postgresql10-docs-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554207" comment="postgresql10-plperl-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554208" comment="postgresql10-plpython-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554209" comment="postgresql10-pltcl-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554210" comment="postgresql10-server-10.9-1.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149821" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1120281" ref_url="https://bugzilla.suse.com/1120281" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000845" ref_url="https://www.suse.com/security/cve/CVE-2018-1000845/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005065.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

Security issue fixed:

- CVE-2018-1000845: Fixed DNS amplification and reflection to spoofed addresses (DOS) (bsc#1120281)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-25"/>
	<updated date="2019-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120281">SUSE bug 1120281</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000845/">CVE-2018-1000845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000845">CVE-2018-1000845 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554211" comment="avahi-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521570" comment="avahi-lang-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554212" comment="avahi-utils-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554213" comment="libavahi-client3-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554214" comment="libavahi-client3-32bit-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554215" comment="libavahi-common3-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554216" comment="libavahi-common3-32bit-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554217" comment="libavahi-core7-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554218" comment="libavahi-glib1-0.6.32-32.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554219" comment="libavahi-glib1-32bit-0.6.32-32.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554220" comment="libdns_sd-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554221" comment="libdns_sd-32bit-0.6.32-32.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149822" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1139959" ref_url="https://bugzilla.suse.com/1139959" source="BUGZILLA"/>
		<reference ref_id="1140122" ref_url="https://bugzilla.suse.com/1140122" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13012" ref_url="https://www.suse.com/security/cve/CVE-2019-13012/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1830-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005822.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

Security issue fixed:

- CVE-2019-13012: Fixed improper restriction of file permissions when creating directories (bsc#1139959).

Non-security issue fixed:

- Added explicit requires between libglib2 and libgio2 (bsc#1140122).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-12"/>
	<updated date="2019-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139959">SUSE bug 1139959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140122">SUSE bug 1140122</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13012/">CVE-2019-13012 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13012">CVE-2019-13012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521943" comment="glib2-lang-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554222" comment="glib2-tools-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554223" comment="libgio-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551179" comment="libgio-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554224" comment="libglib-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551181" comment="libglib-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554225" comment="libgmodule-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551183" comment="libgmodule-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554226" comment="libgobject-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551185" comment="libgobject-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554227" comment="libgthread-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551187" comment="libgthread-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149823" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1053043" ref_url="https://bugzilla.suse.com/1053043" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1094555" ref_url="https://bugzilla.suse.com/1094555" source="BUGZILLA"/>
		<reference ref_id="1108382" ref_url="https://bugzilla.suse.com/1108382" source="BUGZILLA"/>
		<reference ref_id="1109137" ref_url="https://bugzilla.suse.com/1109137" source="BUGZILLA"/>
		<reference ref_id="1111188" ref_url="https://bugzilla.suse.com/1111188" source="BUGZILLA"/>
		<reference ref_id="1119086" ref_url="https://bugzilla.suse.com/1119086" source="BUGZILLA"/>
		<reference ref_id="1120902" ref_url="https://bugzilla.suse.com/1120902" source="BUGZILLA"/>
		<reference ref_id="1121263" ref_url="https://bugzilla.suse.com/1121263" source="BUGZILLA"/>
		<reference ref_id="1125580" ref_url="https://bugzilla.suse.com/1125580" source="BUGZILLA"/>
		<reference ref_id="1126961" ref_url="https://bugzilla.suse.com/1126961" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1129770" ref_url="https://bugzilla.suse.com/1129770" source="BUGZILLA"/>
		<reference ref_id="1131335" ref_url="https://bugzilla.suse.com/1131335" source="BUGZILLA"/>
		<reference ref_id="1131336" ref_url="https://bugzilla.suse.com/1131336" source="BUGZILLA"/>
		<reference ref_id="1131645" ref_url="https://bugzilla.suse.com/1131645" source="BUGZILLA"/>
		<reference ref_id="1132390" ref_url="https://bugzilla.suse.com/1132390" source="BUGZILLA"/>
		<reference ref_id="1133140" ref_url="https://bugzilla.suse.com/1133140" source="BUGZILLA"/>
		<reference ref_id="1133190" ref_url="https://bugzilla.suse.com/1133190" source="BUGZILLA"/>
		<reference ref_id="1133191" ref_url="https://bugzilla.suse.com/1133191" source="BUGZILLA"/>
		<reference ref_id="1133738" ref_url="https://bugzilla.suse.com/1133738" source="BUGZILLA"/>
		<reference ref_id="1134395" ref_url="https://bugzilla.suse.com/1134395" source="BUGZILLA"/>
		<reference ref_id="1135642" ref_url="https://bugzilla.suse.com/1135642" source="BUGZILLA"/>
		<reference ref_id="1136598" ref_url="https://bugzilla.suse.com/1136598" source="BUGZILLA"/>
		<reference ref_id="1136889" ref_url="https://bugzilla.suse.com/1136889" source="BUGZILLA"/>
		<reference ref_id="1136922" ref_url="https://bugzilla.suse.com/1136922" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137004" ref_url="https://bugzilla.suse.com/1137004" source="BUGZILLA"/>
		<reference ref_id="1137194" ref_url="https://bugzilla.suse.com/1137194" source="BUGZILLA"/>
		<reference ref_id="1137739" ref_url="https://bugzilla.suse.com/1137739" source="BUGZILLA"/>
		<reference ref_id="1137749" ref_url="https://bugzilla.suse.com/1137749" source="BUGZILLA"/>
		<reference ref_id="1137752" ref_url="https://bugzilla.suse.com/1137752" source="BUGZILLA"/>
		<reference ref_id="1137915" ref_url="https://bugzilla.suse.com/1137915" source="BUGZILLA"/>
		<reference ref_id="1138291" ref_url="https://bugzilla.suse.com/1138291" source="BUGZILLA"/>
		<reference ref_id="1138293" ref_url="https://bugzilla.suse.com/1138293" source="BUGZILLA"/>
		<reference ref_id="1138374" ref_url="https://bugzilla.suse.com/1138374" source="BUGZILLA"/>
		<reference ref_id="1138681" ref_url="https://bugzilla.suse.com/1138681" source="BUGZILLA"/>
		<reference ref_id="1139751" ref_url="https://bugzilla.suse.com/1139751" source="BUGZILLA"/>
		<reference ref_id="1140575" ref_url="https://bugzilla.suse.com/1140575" source="BUGZILLA"/>
		<reference ref_id="1140577" ref_url="https://bugzilla.suse.com/1140577" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20836" ref_url="https://www.suse.com/security/cve/CVE-2018-20836/" source="CVE"/>
		<reference ref_id="CVE-2019-10126" ref_url="https://www.suse.com/security/cve/CVE-2019-10126/" source="CVE"/>
		<reference ref_id="CVE-2019-10638" ref_url="https://www.suse.com/security/cve/CVE-2019-10638/" source="CVE"/>
		<reference ref_id="CVE-2019-10639" ref_url="https://www.suse.com/security/cve/CVE-2019-10639/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-11599" ref_url="https://www.suse.com/security/cve/CVE-2019-11599/" source="CVE"/>
		<reference ref_id="CVE-2019-12380" ref_url="https://www.suse.com/security/cve/CVE-2019-12380/" source="CVE"/>
		<reference ref_id="CVE-2019-12456" ref_url="https://www.suse.com/security/cve/CVE-2019-12456/" source="CVE"/>
		<reference ref_id="CVE-2019-12614" ref_url="https://www.suse.com/security/cve/CVE-2019-12614/" source="CVE"/>
		<reference ref_id="CVE-2019-12818" ref_url="https://www.suse.com/security/cve/CVE-2019-12818/" source="CVE"/>
		<reference ref_id="CVE-2019-12819" ref_url="https://www.suse.com/security/cve/CVE-2019-12819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may have been conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses (bnc#1140575 1140577).
- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), that lead to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack could be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visited the attacker's web page, then WebRTC or gQUIC could be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable because IP ID generation was changed to have a dependency on an address associated with a network namespace (bnc#1140577).
- CVE-2019-10126: A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might have lead to memory corruption and possibly other consequences (bnc#1136935).
- CVE-2018-20836: An issue was discovered in the Linux kernel There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).
- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm call. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c (bnc#1131645 1133738).
- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel There was an unchecked kstrdup of prop-name, which might have allowed an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).
- CVE-2019-12819: An issue was discovered in the Linux kernel The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which would trigger a fixed_mdio_bus_init use-after-free. This would cause a denial of service (bnc#1138291).
- CVE-2019-12818: An issue was discovered in the Linux kernel The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller did not check for this, it would trigger a NULL pointer dereference. This would cause a denial of service. This affected nfc_llcp_build_gb in net/nfc/llcp_core.c (bnc#1138293).
- CVE-2019-12456: A double-fetch bug in _ctl_ioctl_main() could lead to a local denial of service attack (bsc#1136922 CVE-2019-12456).
- CVE-2019-12380: An issue was discovered in the efi subsystem in the Linux kernel phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because ;All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it (bnc#1136598).
- CVE-2019-11487: The Linux kernel before allowed page-_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It could occur with FUSE requests (bnc#1133190 1133191).

The following non-security bugs were fixed:

- Drop multiversion(kernel) from the KMP template (bsc#1127155).
- Fix ixgbe backport (bsc#1133140)
- Revert 'KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).' This reverts commit 4cc83da426b53d47f1fde9328112364eab1e9a19.
- Update 'TCP SACK Panic' series
- ACPI / CPPC: Check for valid PCC subspace only if PCC is used (bsc#1126961).
- ACPI / CPPC: Fix KASAN global out of bounds warning (bsc#1126961).
- ACPI / CPPC: Make CPPC ACPI driver aware of PCC subspace IDs (bsc#1126961).
- ACPI / CPPC: Update all pr_(debug/err) messages to log the susbspace id (bsc#1126961).
- ACPI / CPPC: Use 64-bit arithmetic instead of 32-bit (bsc#1126961).
- ACPI / CPPC: fix build issue with ktime_t used in logical operation (bsc#1126961).
- ACPI: CPPC: remove initial assignment of pcc_ss_data (bsc#1126961).
- at76c50x-usb: Do not register led_trigger if usb_register_driver failed (bsc#1135642).
- ath6kl: Only use match sets when firmware supports it (bsc#1120902).
- btrfs: check for refs on snapshot delete resume (bsc#1131335, bsc#1137004).
- btrfs: run delayed items before dropping the snapshot (bsc#1121263, bsc#1111188, bsc#1137004).
- btrfs: save drop_progress if we drop refs at all (bsc#1131336, bsc#1137004).
- ceph: fix potential use-after-free in ceph_mdsc_build_path (bsc#1138681).
- ceph: flush dirty inodes before proceeding with remount (bsc#1138681).
- ceph: print inode number in __caps_issued_mask debugging messages (bsc#1138681).
- cpu/hotplug: Provide cpus_read|write_[un]lock() (bsc#1138374, LTC#178199).
- cpu/hotplug: Provide lockdep_assert_cpus_held() (bsc#1138374, LTC#178199).
- cpufreq / CPPC: Add cpuinfo_cur_freq support for CPPC (bsc#1126961).
- cpufreq: CPPC: fix build in absence of v3 support (bsc#1126961).
- cpufreq: Replace 'max_transition_latency' with 'dynamic_switching' (bsc#1126961).
- cpufreq: cn99xx: set platform specific sampling rate (bsc#1126961).
- ibmvnic: Add device identification to requested IRQs (bsc#1137739).
- ibmvnic: Do not close unopened driver during reset (bsc#1137752).
- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).
- ibmvnic: Refresh device multicast list after reset (bsc#1137752).
- ibmvnic: remove set but not used variable 'netdev' (bsc#1137739).
- iwiwifi: fix bad monitor buffer register addresses (bsc#1129770).
- kabi: cpufreq: rename dynamic_switching to max_transition_latency (bsc#1126961).
- kernel/sys.c: prctl: fix false positive in validate_prctl_map() (bsc#1137749).
- libertas_tf: prevent underflow in process_cmdrequest() (bsc#1119086).
- mailbox: PCC: Move the MAX_PCC_SUBSPACES definition to header file (bsc#1126961).
- mailbox: pcc: Drop uninformative output during boot (bsc#1126961).
- mailbox: pcc: Fix crash when request PCC channel 0 (bsc#1126961).
- mwl8k: Fix rate_idx underflow (bsc#1135642).
- net/ibmvnic: Remove tests of member address (bsc#1137739).
- net: Remove NO_IRQ from powerpc-only network drivers (bsc#1137739).
- nvmet-fc: bring Disconnect into compliance with FC-NVME spec (bsc#1136889).
- nvmet-fc: fix issues with targetport assoc_list list walking (bsc#1136889).
- nvmet: fix fatal_err_work deadlock (bsc#1136889).
- nvmet_fc: support target port removal with nvmet layer (bsc#1136889).
- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).
- powerpc/eeh: Fix race with driver un/bind (bsc#1066223).
- powerpc/perf: Add blacklisted events for Power9 DD2.1 (bsc#1053043).
- powerpc/perf: Add blacklisted events for Power9 DD2.2 (bsc#1053043).
- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).
- powerpc/perf: Infrastructure to support addition of blacklisted events (bsc#1053043).
- powerpc/process: Fix sparse address space warnings (bsc#1066223).
- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).
- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).
- rtlwifi: fix false rates in _rtl8821ae_mrate_idx_to_arfr_id() (bsc#1120902).
- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).
- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).
- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).
- signals: avoid random wakeups in sigsuspend() (bsc#1137915)
- treewide: Use DEVICE_ATTR_WO (bsc#1137739).
- x86/entry/64/compat: Fix stack switching for XEN PV (bsc#1108382).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-24"/>
	<updated date="2019-07-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1053043">SUSE bug 1053043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094555">SUSE bug 1094555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108382">SUSE bug 1108382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109137">SUSE bug 1109137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111188">SUSE bug 1111188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119086">SUSE bug 1119086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120902">SUSE bug 1120902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121263">SUSE bug 1121263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125580">SUSE bug 1125580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126961">SUSE bug 1126961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129770">SUSE bug 1129770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131335">SUSE bug 1131335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131336">SUSE bug 1131336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131645">SUSE bug 1131645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132390">SUSE bug 1132390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133140">SUSE bug 1133140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133190">SUSE bug 1133190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133738">SUSE bug 1133738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134395">SUSE bug 1134395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135642">SUSE bug 1135642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136598">SUSE bug 1136598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136889">SUSE bug 1136889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136922">SUSE bug 1136922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137004">SUSE bug 1137004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137194">SUSE bug 1137194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137739">SUSE bug 1137739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137749">SUSE bug 1137749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137752">SUSE bug 1137752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137915">SUSE bug 1137915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138291">SUSE bug 1138291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138293">SUSE bug 1138293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138374">SUSE bug 1138374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138681">SUSE bug 1138681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139751">SUSE bug 1139751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140575">SUSE bug 1140575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140577">SUSE bug 1140577</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20836/">CVE-2018-20836 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20836">CVE-2018-20836 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10126/">CVE-2019-10126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10126">CVE-2019-10126 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10638/">CVE-2019-10638 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10638">CVE-2019-10638 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10639/">CVE-2019-10639 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10639">CVE-2019-10639 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11487">CVE-2019-11487 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11599/">CVE-2019-11599 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11599">CVE-2019-11599 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12380/">CVE-2019-12380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12380">CVE-2019-12380 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12456/">CVE-2019-12456 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12456">CVE-2019-12456 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12614/">CVE-2019-12614 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12614">CVE-2019-12614 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12818/">CVE-2019-12818 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12818">CVE-2019-12818 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12819/">CVE-2019-12819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12819">CVE-2019-12819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554228" comment="kernel-default-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554229" comment="kernel-default-base-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554230" comment="kernel-default-devel-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554231" comment="kernel-default-man-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521586" comment="kernel-devel-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521587" comment="kernel-macros-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521588" comment="kernel-source-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554232" comment="kernel-syms-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538239" comment="kgraft-patch-4_4_180-94_100-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554228" comment="kernel-default-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554229" comment="kernel-default-base-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554230" comment="kernel-default-devel-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554231" comment="kernel-default-man-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521586" comment="kernel-devel-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521587" comment="kernel-macros-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521588" comment="kernel-source-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554232" comment="kernel-syms-4.4.180-94.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538239" comment="kgraft-patch-4_4_180-94_100-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149824" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes the following issues:

MozillaFirefox to version ESR 60.8:

- CVE-2019-9811: Sandbox escape via installation of malicious language pack (bsc#1140868).
- CVE-2019-11711: Script injection within domain through inner window reuse (bsc#1140868).
- CVE-2019-11712: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (bsc#1140868).
- CVE-2019-11713: Use-after-free with HTTP/2 cached stream (bsc#1140868).
- CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (bsc#1140868).
- CVE-2019-11715: HTML parsing error can contribute to content XSS (bsc#1140868).
- CVE-2019-11717: Caret character improperly escaped in origins (bsc#1140868).
- CVE-2019-11719: Out-of-bounds read when importing curve25519 private key (bsc#1140868).
- CVE-2019-11730: Same-origin policy treats all files in a directory as having the same-origin (bsc#1140868).
- CVE-2019-11709: Multiple Memory safety bugs fixed (bsc#1140868).

mozilla-nss to version 3.44.1:

* Added IPSEC IKE support to softoken 
* Many new FIPS test cases
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-17"/>
	<updated date="2019-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554233" comment="MozillaFirefox-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554234" comment="MozillaFirefox-translations-common-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554235" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554236" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554237" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554238" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554239" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554240" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554241" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554242" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149825" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1118277" ref_url="https://bugzilla.suse.com/1118277" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19788" ref_url="https://www.suse.com/security/cve/CVE-2018-19788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005017.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2018-19788: Fixed handling of UIDs over MAX_UINT (bsc#1118277)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-04"/>
	<updated date="2019-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118277">SUSE bug 1118277</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19788/">CVE-2018-19788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19788">CVE-2018-19788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554243" comment="libpolkit0-0.113-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554244" comment="polkit-0.113-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554245" comment="typelib-1_0-Polkit-1_0-0.113-5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149826" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.140-94_42 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3846">CVE-2019-3846 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721142" comment="kernel-default 4.4.140-94.42 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719409" comment="kgraft-patch-4_4_140-94_42-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538240" comment="kgraft-patch-4_4_140-94_42-default-10-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149827" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.143-94_47 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3846">CVE-2019-3846 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721143" comment="kernel-default 4.4.143-94.47 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719410" comment="kgraft-patch-4_4_143-94_47-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538241" comment="kgraft-patch-4_4_143-94_47-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149828" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.155-94_50 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3846">CVE-2019-3846 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721144" comment="kernel-default 4.4.155-94.50 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719411" comment="kgraft-patch-4_4_155-94_50-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538242" comment="kgraft-patch-4_4_155-94_50-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149829" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.156-94_57 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3846">CVE-2019-3846 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721145" comment="kernel-default 4.4.156-94.57 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719412" comment="kgraft-patch-4_4_156-94_57-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538243" comment="kgraft-patch-4_4_156-94_57-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149830" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.156-94_61 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3846">CVE-2019-3846 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721146" comment="kernel-default 4.4.156-94.61 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719413" comment="kgraft-patch-4_4_156-94_61-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538244" comment="kgraft-patch-4_4_156-94_61-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149831" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.156-94_64 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3846">CVE-2019-3846 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721147" comment="kernel-default 4.4.156-94.64 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719414" comment="kgraft-patch-4_4_156-94_64-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538245" comment="kgraft-patch-4_4_156-94_64-default-6-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149832" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.162-94_69 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3846">CVE-2019-3846 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721152" comment="kernel-default 4.4.162-94.69 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719419" comment="kgraft-patch-4_4_162-94_69-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538246" comment="kgraft-patch-4_4_162-94_69-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149833" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.162-94_72 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3846">CVE-2019-3846 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721149" comment="kernel-default 4.4.162-94.72 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719416" comment="kgraft-patch-4_4_162-94_72-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538247" comment="kgraft-patch-4_4_162-94_72-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149834" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.175-94_79 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3846">CVE-2019-3846 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721151" comment="kernel-default 4.4.175-94.79 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719418" comment="kgraft-patch-4_4_175-94_79-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538248" comment="kgraft-patch-4_4_175-94_79-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149835" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.176-94_88 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3846">CVE-2019-3846 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721148" comment="kernel-default 4.4.176-94.88 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719415" comment="kgraft-patch-4_4_176-94_88-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538249" comment="kgraft-patch-4_4_176-94_88-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149836" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.178-94_91 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3846">CVE-2019-3846 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721150" comment="kernel-default 4.4.178-94.91 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719417" comment="kgraft-patch-4_4_178-94_91-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538250" comment="kgraft-patch-4_4_178-94_91-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149837" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005741.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_97 fixes one issue.

The following security issue was fixed:

This update contains a regression fix for CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721153" comment="kernel-default 4.4.180-94.97 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719420" comment="kgraft-patch-4_4_180-94_97-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538251" comment="kgraft-patch-4_4_180-94_97-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149838" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

---- updated platforms ------------------------------------
SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061d-&gt;0000061f Xeon E3/E5, Core X
SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000714-&gt;00000718 Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149839" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="985657" ref_url="https://bugzilla.suse.com/985657" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005739.html" source="SUSE-SU"/>
		<description>
This update for bzip2 fixes the following issues:

Security issue fixed:

- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1139083).
- CVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985657">SUSE bug 985657</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3189">CVE-2016-3189 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548654" comment="bzip2-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530594" comment="bzip2-doc-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548655" comment="libbz2-1-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548656" comment="libbz2-1-32bit-1.0.6-30.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149840" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1127223" ref_url="https://bugzilla.suse.com/1127223" source="BUGZILLA"/>
		<reference ref_id="1127308" ref_url="https://bugzilla.suse.com/1127308" source="BUGZILLA"/>
		<reference ref_id="1128574" ref_url="https://bugzilla.suse.com/1128574" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155/" source="CVE"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1958-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005821.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2019-9169: Fixed a heap-based buffer over-read via an attempted case-insensitive regular-expression match (bsc#1127308).
- CVE-2009-5155: Fixed a denial of service in parse_reg_exp() (bsc#1127223).

Non-security issues fixed:

- Added cfi information for start routines in order to stop unwinding on S390 (bsc#1128574).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127223">SUSE bug 1127223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127308">SUSE bug 1127308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128574">SUSE bug 1128574</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-5155">CVE-2009-5155 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9169">CVE-2019-9169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554246" comment="glibc-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551190" comment="glibc-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554247" comment="glibc-devel-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551192" comment="glibc-devel-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530599" comment="glibc-html-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530600" comment="glibc-i18ndata-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530601" comment="glibc-info-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554248" comment="glibc-locale-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551194" comment="glibc-locale-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554249" comment="glibc-profile-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551196" comment="glibc-profile-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554250" comment="nscd-2.22-62.22.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149841" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp, zypper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1109893" ref_url="https://bugzilla.suse.com/1109893" source="BUGZILLA"/>
		<reference ref_id="1110542" ref_url="https://bugzilla.suse.com/1110542" source="BUGZILLA"/>
		<reference ref_id="1111319" ref_url="https://bugzilla.suse.com/1111319" source="BUGZILLA"/>
		<reference ref_id="1112911" ref_url="https://bugzilla.suse.com/1112911" source="BUGZILLA"/>
		<reference ref_id="1113296" ref_url="https://bugzilla.suse.com/1113296" source="BUGZILLA"/>
		<reference ref_id="1120629" ref_url="https://bugzilla.suse.com/1120629" source="BUGZILLA"/>
		<reference ref_id="1120630" ref_url="https://bugzilla.suse.com/1120630" source="BUGZILLA"/>
		<reference ref_id="1120631" ref_url="https://bugzilla.suse.com/1120631" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1131823" ref_url="https://bugzilla.suse.com/1131823" source="BUGZILLA"/>
		<reference ref_id="1134226" ref_url="https://bugzilla.suse.com/1134226" source="BUGZILLA"/>
		<reference ref_id="1137977" ref_url="https://bugzilla.suse.com/1137977" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005752.html" source="SUSE-SU"/>
		<description>
This update for libsolv, libzypp and zypper fixes the following issues:

libsolv was updated to version 0.6.36 fixes the following issues:

Security issues fixed:

- CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629).
- CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630).
- CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631).

Non-security issues fixed:

- Made cleandeps jobs on patterns work (bsc#1137977).
- Fixed an issue multiversion packages that obsolete their own name (bsc#1127155).
- Keep consistent package name if there are multiple alternatives (bsc#1131823).

libzypp received following fixes:

- Fixes a bug where locking the kernel was not possible (bsc#1113296)

zypper received following fixes:

- Fixes a bug where the wrong exit code was set when refreshing
  repos if --root was used (bsc#1134226)
- Improved the displaying of locks (bsc#1112911)
- Fixes an issue where `https` repository urls caused an error prompt to
   appear twice (bsc#1110542)
- zypper will now always warn when no repositories are defined (bsc#1109893)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-25"/>
	<updated date="2019-07-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109893">SUSE bug 1109893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110542">SUSE bug 1110542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111319">SUSE bug 1111319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112911">SUSE bug 1112911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113296">SUSE bug 1113296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131823">SUSE bug 1131823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134226">SUSE bug 1134226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137977">SUSE bug 1137977</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20532">CVE-2018-20532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20533">CVE-2018-20533 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20534">CVE-2018-20534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554251" comment="libsolv-tools-0.6.36-2.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554252" comment="libzypp-16.20.0-2.39.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554253" comment="perl-solv-0.6.36-2.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554254" comment="python-solv-0.6.36-2.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554255" comment="zypper-1.13.51-21.26.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522014" comment="zypper-log-1.13.51-21.26.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149842" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005756.html" source="SUSE-SU"/>
		<description>
This update for bzip2 fixes the following issues:

- Fixed a regression with the fix for CVE-2019-12900, which caused incompatibilities
  with files that used many selectors (bsc#1139083).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-29"/>
	<updated date="2019-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554256" comment="bzip2-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530613" comment="bzip2-doc-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554257" comment="libbz2-1-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548659" comment="libbz2-1-32bit-1.0.6-30.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149843" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1121826" ref_url="https://bugzilla.suse.com/1121826" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005768.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2019-6133: Fixed improper caching of auth decisions, which could bypass 
  uid checking in the interactive backend (bsc#1121826).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-01"/>
	<updated date="2019-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6133">CVE-2019-6133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554258" comment="libpolkit0-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554259" comment="polkit-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554260" comment="typelib-1_0-Polkit-1_0-0.113-5.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149844" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1115375" ref_url="https://bugzilla.suse.com/1115375" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141784" ref_url="https://bugzilla.suse.com/1141784" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141786" ref_url="https://bugzilla.suse.com/1141786" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2842" ref_url="https://www.suse.com/security/cve/CVE-2019-2842/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u222 fixes the following issues:

Security issues fixed:

- CVE-2019-2745: Improved ECC Implementation (bsc#1141784).
- CVE-2019-2762: Exceptional throw cases (bsc#1141782).
- CVE-2019-2766: Improve file protocol handling (bsc#1141789).
- CVE-2019-2769: Better copies of CopiesList (bsc#1141783).
- CVE-2019-2786: More limited privilege usage (bsc#1141787).
- CVE-2019-2816: Normalize normalization (bsc#1141785).
- CVE-2019-2842: Extended AES support (bsc#1141786).
- CVE-2019-7317: Improve PNG support (bsc#1141780).
- Certificate validation improvements

Non-security issue fixed:

- Fixed an issue where the installation failed when the manpages are not present (bsc#1115375)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-01"/>
	<updated date="2019-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115375">SUSE bug 1115375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141784">SUSE bug 1141784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141786">SUSE bug 1141786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2745">CVE-2019-2745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2786">CVE-2019-2786 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2842/">CVE-2019-2842 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2842">CVE-2019-2842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554261" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554262" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554263" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554264" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149845" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1109663" ref_url="https://bugzilla.suse.com/1109663" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2053-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005825.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-14647: Fixed a denial of service vulnerability caused by a crafted XML document (bsc#1109847).
- CVE-2018-1000802: Fixed a command injection in the shutil module (bsc#1109663).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-06"/>
	<updated date="2019-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000802">CVE-2018-1000802 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009528378" comment="libpython3_4m1_0-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009528379" comment="python3-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009528380" comment="python3-base-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554265" comment="python3-curses-3.4.6-25.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149846" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1133037" ref_url="https://bugzilla.suse.com/1133037" source="BUGZILLA"/>
		<reference ref_id="1141619" ref_url="https://bugzilla.suse.com/1141619" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005797.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issues:

Security issues fixed: 	  

- CVE-2019-11459: Fixed an improper error handling in which could have led to use of uninitialized use of memory (bsc#1133037).
- CVE-2019-1010006: Fixed a buffer overflow in backend/tiff/tiff-document.c (bsc#1141619).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-07"/>
	<updated date="2019-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141619">SUSE bug 1141619</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010006">CVE-2019-1010006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11459">CVE-2019-11459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554266" comment="evince-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554267" comment="evince-browser-plugin-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522054" comment="evince-lang-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554268" comment="evince-plugin-djvudocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554269" comment="evince-plugin-dvidocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554270" comment="evince-plugin-pdfdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554271" comment="evince-plugin-psdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554272" comment="evince-plugin-tiffdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554273" comment="evince-plugin-xpsdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554274" comment="libevdocument3-4-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554275" comment="libevview3-3-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554276" comment="nautilus-evince-3.20.2-6.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149847" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1140738" ref_url="https://bugzilla.suse.com/1140738" source="BUGZILLA"/>
		<reference ref_id="1141329" ref_url="https://bugzilla.suse.com/1141329" source="BUGZILLA"/>
		<reference ref_id="1141332" ref_url="https://bugzilla.suse.com/1141332" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525/" source="CVE"/>
		<reference ref_id="CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529/" source="CVE"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005801.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

Security issue fixed:

- CVE-2019-12529: Fixed a potential denial of service associated with HTTP Basic Authentication credentials (bsc#1141329).
- CVE-2019-12525: Fixed a denial of service during processing of HTTP Digest Authentication credentials (bsc#1141332).
- CVE-2019-13345: Fixed a cross site scripting vulnerability via user_name or auth parameter in cachemgr.cgi (bsc#1140738).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-08"/>
	<updated date="2019-08-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141329">SUSE bug 1141329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141332">SUSE bug 1141332</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12525">CVE-2019-12525 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12529">CVE-2019-12529 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13345">CVE-2019-13345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554277" comment="squid-3.5.21-26.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149848" version="1" class="patch">
	<metadata>
		<title>Security update for rsyslog (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1123164" ref_url="https://bugzilla.suse.com/1123164" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16881" ref_url="https://www.suse.com/security/cve/CVE-2018-16881/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0209-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190209-1.html" source="SUSE-SU"/>
		<description>
This update for rsyslog fixes the following issues:

Security issue fixed:

- CVE-2018-16881: Fixed a denial of service when both the imtcp module and Octet-Counted TCP Framing is enabled (bsc#1123164).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-31"/>
	<updated date="2019-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1123164">SUSE bug 1123164</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16881/">CVE-2018-16881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16881">CVE-2018-16881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554278" comment="rsyslog-8.24.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554279" comment="rsyslog-diag-tools-8.24.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554280" comment="rsyslog-doc-8.24.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554281" comment="rsyslog-module-gssapi-8.24.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554282" comment="rsyslog-module-gtls-8.24.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554283" comment="rsyslog-module-mysql-8.24.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554284" comment="rsyslog-module-pgsql-8.24.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554285" comment="rsyslog-module-relp-8.24.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554286" comment="rsyslog-module-snmp-8.24.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554287" comment="rsyslog-module-udpspoof-8.24.0-3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149849" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005803.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-20852: Fixed an information leak where cookies could be send to the wrong server because of incorrect domain validation (bsc#1141853).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-23"/>
	<updated date="2019-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554288" comment="libpython2_7-1_0-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548681" comment="libpython2_7-1_0-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554289" comment="python-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548683" comment="python-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554290" comment="python-base-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548685" comment="python-base-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554291" comment="python-curses-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554292" comment="python-demo-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542235" comment="python-devel-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530626" comment="python-doc-2.7.13-28.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530627" comment="python-doc-pdf-2.7.13-28.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554293" comment="python-gdbm-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554294" comment="python-idle-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554295" comment="python-tk-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554296" comment="python-xml-2.7.13-28.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149850" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005834.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:                    
                                                                                          
Security issue fixed:                                                                                 
                                                                                  
- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-10208">CVE-2019-10208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554297" comment="postgresql96-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554298" comment="postgresql96-contrib-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530673" comment="postgresql96-docs-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554299" comment="postgresql96-plperl-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554300" comment="postgresql96-plpython-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554301" comment="postgresql96-pltcl-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554302" comment="postgresql96-server-9.6.15-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149851" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1133719" ref_url="https://bugzilla.suse.com/1133719" source="BUGZILLA"/>
		<reference ref_id="1138301" ref_url="https://bugzilla.suse.com/1138301" source="BUGZILLA"/>
		<reference ref_id="1138303" ref_url="https://bugzilla.suse.com/1138303" source="BUGZILLA"/>
		<reference ref_id="1138734" ref_url="https://bugzilla.suse.com/1138734" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<reference ref_id="CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2227-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005908.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path
  parameter pointing anywhere on the system and potentially leading to execution
  of a malicious file with root privileges by libvirtd (bsc#1138301).
- CVE-2019-10167: Fixed an issue with virConnectGetDomainCapabilities API which
  could have been used to execute arbitrary emulators (bsc#1138303).

Non-security issues fixed:

- Fixed an issue with short bitmaps when setting vcpu affinity using the vcpupin (bsc#1138734).
- Added support for overriding max threads per process limit (bsc#1133719)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-28"/>
	<updated date="2019-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133719">SUSE bug 1133719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138303">SUSE bug 1138303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138734">SUSE bug 1138734</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10161">CVE-2019-10161 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10167">CVE-2019-10167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554303" comment="libvirt-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554304" comment="libvirt-admin-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554305" comment="libvirt-client-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554306" comment="libvirt-daemon-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554307" comment="libvirt-daemon-config-network-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554308" comment="libvirt-daemon-config-nwfilter-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554309" comment="libvirt-daemon-driver-interface-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538264" comment="libvirt-daemon-driver-libxl-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554310" comment="libvirt-daemon-driver-lxc-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554311" comment="libvirt-daemon-driver-network-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554312" comment="libvirt-daemon-driver-nodedev-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554313" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554314" comment="libvirt-daemon-driver-qemu-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554315" comment="libvirt-daemon-driver-secret-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554316" comment="libvirt-daemon-driver-storage-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554317" comment="libvirt-daemon-driver-storage-core-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554318" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554319" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554320" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554321" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554322" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554323" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554324" comment="libvirt-daemon-hooks-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554325" comment="libvirt-daemon-lxc-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554326" comment="libvirt-daemon-qemu-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538282" comment="libvirt-daemon-xen-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554327" comment="libvirt-doc-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554328" comment="libvirt-libs-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554329" comment="libvirt-lock-sanlock-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554330" comment="libvirt-nss-3.3.0-5.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149852" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1106061" ref_url="https://bugzilla.suse.com/1106061" source="BUGZILLA"/>
		<reference ref_id="1123161" ref_url="https://bugzilla.suse.com/1123161" source="BUGZILLA"/>
		<reference ref_id="1125674" ref_url="https://bugzilla.suse.com/1125674" source="BUGZILLA"/>
		<reference ref_id="1127034" ref_url="https://bugzilla.suse.com/1127034" source="BUGZILLA"/>
		<reference ref_id="1128977" ref_url="https://bugzilla.suse.com/1128977" source="BUGZILLA"/>
		<reference ref_id="1130972" ref_url="https://bugzilla.suse.com/1130972" source="BUGZILLA"/>
		<reference ref_id="1133860" ref_url="https://bugzilla.suse.com/1133860" source="BUGZILLA"/>
		<reference ref_id="1134399" ref_url="https://bugzilla.suse.com/1134399" source="BUGZILLA"/>
		<reference ref_id="1135335" ref_url="https://bugzilla.suse.com/1135335" source="BUGZILLA"/>
		<reference ref_id="1135365" ref_url="https://bugzilla.suse.com/1135365" source="BUGZILLA"/>
		<reference ref_id="1137584" ref_url="https://bugzilla.suse.com/1137584" source="BUGZILLA"/>
		<reference ref_id="1139358" ref_url="https://bugzilla.suse.com/1139358" source="BUGZILLA"/>
		<reference ref_id="1139826" ref_url="https://bugzilla.suse.com/1139826" source="BUGZILLA"/>
		<reference ref_id="1140652" ref_url="https://bugzilla.suse.com/1140652" source="BUGZILLA"/>
		<reference ref_id="1140903" ref_url="https://bugzilla.suse.com/1140903" source="BUGZILLA"/>
		<reference ref_id="1140945" ref_url="https://bugzilla.suse.com/1140945" source="BUGZILLA"/>
		<reference ref_id="1141181" ref_url="https://bugzilla.suse.com/1141181" source="BUGZILLA"/>
		<reference ref_id="1141401" ref_url="https://bugzilla.suse.com/1141401" source="BUGZILLA"/>
		<reference ref_id="1141402" ref_url="https://bugzilla.suse.com/1141402" source="BUGZILLA"/>
		<reference ref_id="1141452" ref_url="https://bugzilla.suse.com/1141452" source="BUGZILLA"/>
		<reference ref_id="1141453" ref_url="https://bugzilla.suse.com/1141453" source="BUGZILLA"/>
		<reference ref_id="1141454" ref_url="https://bugzilla.suse.com/1141454" source="BUGZILLA"/>
		<reference ref_id="1142023" ref_url="https://bugzilla.suse.com/1142023" source="BUGZILLA"/>
		<reference ref_id="1142254" ref_url="https://bugzilla.suse.com/1142254" source="BUGZILLA"/>
		<reference ref_id="1142857" ref_url="https://bugzilla.suse.com/1142857" source="BUGZILLA"/>
		<reference ref_id="1143045" ref_url="https://bugzilla.suse.com/1143045" source="BUGZILLA"/>
		<reference ref_id="1143048" ref_url="https://bugzilla.suse.com/1143048" source="BUGZILLA"/>
		<reference ref_id="1143189" ref_url="https://bugzilla.suse.com/1143189" source="BUGZILLA"/>
		<reference ref_id="1143191" ref_url="https://bugzilla.suse.com/1143191" source="BUGZILLA"/>
		<reference ref_id="1143333" ref_url="https://bugzilla.suse.com/1143333" source="BUGZILLA"/>
		<reference ref_id="1144257" ref_url="https://bugzilla.suse.com/1144257" source="BUGZILLA"/>
		<reference ref_id="1144273" ref_url="https://bugzilla.suse.com/1144273" source="BUGZILLA"/>
		<reference ref_id="1144288" ref_url="https://bugzilla.suse.com/1144288" source="BUGZILLA"/>
		<reference ref_id="1144920" ref_url="https://bugzilla.suse.com/1144920" source="BUGZILLA"/>
		<reference ref_id="1145920" ref_url="https://bugzilla.suse.com/1145920" source="BUGZILLA"/>
		<reference ref_id="1145922" ref_url="https://bugzilla.suse.com/1145922" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20855" ref_url="https://www.suse.com/security/cve/CVE-2018-20855/" source="CVE"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10207" ref_url="https://www.suse.com/security/cve/CVE-2019-10207/" source="CVE"/>
		<reference ref_id="CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125/" source="CVE"/>
		<reference ref_id="CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810/" source="CVE"/>
		<reference ref_id="CVE-2019-13631" ref_url="https://www.suse.com/security/cve/CVE-2019-13631/" source="CVE"/>
		<reference ref_id="CVE-2019-13648" ref_url="https://www.suse.com/security/cve/CVE-2019-13648/" source="CVE"/>
		<reference ref_id="CVE-2019-14283" ref_url="https://www.suse.com/security/cve/CVE-2019-14283/" source="CVE"/>
		<reference ref_id="CVE-2019-14284" ref_url="https://www.suse.com/security/cve/CVE-2019-14284/" source="CVE"/>
		<reference ref_id="CVE-2019-15117" ref_url="https://www.suse.com/security/cve/CVE-2019-15117/" source="CVE"/>
		<reference ref_id="CVE-2019-15118" ref_url="https://www.suse.com/security/cve/CVE-2019-15118/" source="CVE"/>
		<reference ref_id="CVE-2019-3819" ref_url="https://www.suse.com/security/cve/CVE-2019-3819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).
- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).
- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).
- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).
- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c (bnc#1142254).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).
- CVE-2019-15118: Fixed kernel stack exhaustion in check_input_term in sound/usb/mixer.c via mishandled recursion (bnc#1145922).
- CVE-2019-15117: Fixed out-of-bounds memory access in parse_audio_mixer_unit in sound/usb/mixer.c via mishandled short descriptor (bnc#1145920).
- CVE-2019-3819: A flaw was fixed in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may have enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') could have caused a system lock up and a denial of service (bnc#1123161).
- CVE-2019-10207: Check for missing tty operations in bluetooth/hci_uart (bsc#1142857).
- CVE-2018-20856: Fixed a use-after-free issue in block/blk-core.c, where certain error case are mishandled (bnc#1143048).

The following non-security bugs were fixed:

- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1125674).
- dlm: Fix saving of NULL callbacks (bsc#1135365).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652, bsc#1144288).
- bcache: Revert 'bcache: free heap cache_set-&gt;flush_btree in bch_journal_free' (bsc#1140652, bsc#1144288).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652, bsc#1144288).
- bcache: fix race in btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1130972, bsc#1144257).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1130972, bsc#1144273).
- bcache: performance improvement for btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652, bsc#1144288).
- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
- clocksource: Defer override invalidation unless clock is unstable (bsc#1139826).
- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
- kvmclock: fix TSC calibration for nested guests (bsc#1133860, jsc#PM-1211).
- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945, bsc#1141401, bsc#1141402, bsc#1141452, bsc#1141453, bsc#1141454).
- qla2xxx: performance degradation when enabling blk-mq (bsc#1128977).
- qlge: Deduplicate lbq_buf_size (bsc#1106061).
- qlge: Deduplicate rx buffer queue management (bsc#1106061).
- qlge: Factor out duplicated expression (bsc#1106061).
- qlge: Fix dma_sync_single calls (bsc#1106061).
- qlge: Fix irq masking in INTx mode (bsc#1106061).
- qlge: Refill empty buffer queues from wq (bsc#1106061).
- qlge: Refill rx buffers up to multiple of 16 (bsc#1106061).
- qlge: Remove bq_desc.maplen (bsc#1106061).
- qlge: Remove irq_cnt (bsc#1106061).
- qlge: Remove page_chunk.last_flag (bsc#1106061).
- qlge: Remove qlge_bq.len size (bsc#1106061).
- qlge: Remove rx_ring.sbq_buf_size (bsc#1106061).
- qlge: Remove rx_ring.type (bsc#1106061).
- qlge: Remove useless dma synchronization calls (bsc#1106061).
- qlge: Remove useless memset (bsc#1106061).
- qlge: Replace memset with assignment (bsc#1106061).
- qlge: Update buffer queue prod index despite oom (bsc#1106061).
- rbd: flush rbd_dev-&gt;watch_dwork after watch is unregistered (bsc#1143333).
- rbd: retry watch re-registration periodically (bsc#1143333).
- sched/fair: Do not free p-&gt;numa_faults with concurrent readers (bsc#1144920).
- sched/fair: Use RCU accessors consistently for -&gt;numa_group (bsc#1144920).
- scsi: virtio_scsi: let host do exception handling (bsc#1141181).
- x86: mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- x86: tsc: Add X86_FEATURE_TSC_KNOWN_FREQ flag (bsc#1133860, jsc#PM-1211).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (XSA-300).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106061">SUSE bug 1106061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123161">SUSE bug 1123161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125674">SUSE bug 1125674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127034">SUSE bug 1127034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128977">SUSE bug 1128977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130972">SUSE bug 1130972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133860">SUSE bug 1133860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134399">SUSE bug 1134399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135335">SUSE bug 1135335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135365">SUSE bug 1135365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137584">SUSE bug 1137584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139358">SUSE bug 1139358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139826">SUSE bug 1139826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140652">SUSE bug 1140652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140903">SUSE bug 1140903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140945">SUSE bug 1140945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141181">SUSE bug 1141181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141401">SUSE bug 1141401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141402">SUSE bug 1141402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141452">SUSE bug 1141452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141453">SUSE bug 1141453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141454">SUSE bug 1141454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142023">SUSE bug 1142023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142254">SUSE bug 1142254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142857">SUSE bug 1142857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143045">SUSE bug 1143045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143048">SUSE bug 1143048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143189">SUSE bug 1143189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143333">SUSE bug 1143333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144257">SUSE bug 1144257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144273">SUSE bug 1144273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144288">SUSE bug 1144288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144920">SUSE bug 1144920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145920">SUSE bug 1145920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145922">SUSE bug 1145922</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20855/">CVE-2018-20855 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20855">CVE-2018-20855 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20856">CVE-2018-20856 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10207/">CVE-2019-10207 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10207">CVE-2019-10207 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1125">CVE-2019-1125 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11810">CVE-2019-11810 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13631/">CVE-2019-13631 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13631">CVE-2019-13631 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13648/">CVE-2019-13648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13648">CVE-2019-13648 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14283/">CVE-2019-14283 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14283">CVE-2019-14283 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14284/">CVE-2019-14284 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14284">CVE-2019-14284 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15117/">CVE-2019-15117 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15117">CVE-2019-15117 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15118/">CVE-2019-15118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15118">CVE-2019-15118 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3819/">CVE-2019-3819 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3819">CVE-2019-3819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554331" comment="kernel-default-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554332" comment="kernel-default-base-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554333" comment="kernel-default-devel-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554334" comment="kernel-default-man-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538290" comment="kernel-devel-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538291" comment="kernel-macros-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538292" comment="kernel-source-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554335" comment="kernel-syms-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538294" comment="kgraft-patch-4_4_180-94_103-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149853" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1114674" ref_url="https://bugzilla.suse.com/1114674" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2264-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192264-1.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

Security issue fixed:

- CVE-2018-18311: Fixed integer overflow with oversize environment (bsc#1114674).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1114674">SUSE bug 1114674</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18311">CVE-2018-18311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554336" comment="perl-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548722" comment="perl-32bit-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554337" comment="perl-base-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522099" comment="perl-doc-5.18.2-12.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149854" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp, zypper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1049825" ref_url="https://bugzilla.suse.com/1049825" source="BUGZILLA"/>
		<reference ref_id="1109893" ref_url="https://bugzilla.suse.com/1109893" source="BUGZILLA"/>
		<reference ref_id="1110542" ref_url="https://bugzilla.suse.com/1110542" source="BUGZILLA"/>
		<reference ref_id="1111319" ref_url="https://bugzilla.suse.com/1111319" source="BUGZILLA"/>
		<reference ref_id="1112911" ref_url="https://bugzilla.suse.com/1112911" source="BUGZILLA"/>
		<reference ref_id="1113296" ref_url="https://bugzilla.suse.com/1113296" source="BUGZILLA"/>
		<reference ref_id="1116995" ref_url="https://bugzilla.suse.com/1116995" source="BUGZILLA"/>
		<reference ref_id="1120629" ref_url="https://bugzilla.suse.com/1120629" source="BUGZILLA"/>
		<reference ref_id="1120630" ref_url="https://bugzilla.suse.com/1120630" source="BUGZILLA"/>
		<reference ref_id="1120631" ref_url="https://bugzilla.suse.com/1120631" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1131823" ref_url="https://bugzilla.suse.com/1131823" source="BUGZILLA"/>
		<reference ref_id="1134226" ref_url="https://bugzilla.suse.com/1134226" source="BUGZILLA"/>
		<reference ref_id="1137977" ref_url="https://bugzilla.suse.com/1137977" source="BUGZILLA"/>
		<reference ref_id="1140039" ref_url="https://bugzilla.suse.com/1140039" source="BUGZILLA"/>
		<reference ref_id="1145521" ref_url="https://bugzilla.suse.com/1145521" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<description>
This update for libsolv, libzypp and zypper fixes the following issues:

libsolv was updated to version 0.6.36 and fixes the following issues:

Security issues fixed:

- CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629).
- CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630).
- CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631).

Non-security issues fixed:

- Made cleandeps jobs on patterns work (bsc#1137977).
- Fixed an issue multiversion packages that obsolete their own name (bsc#1127155).
- Keep consistent package name if there are multiple alternatives (bsc#1131823).

Fixes for libzypp:

- Fixes a bug where locking the kernel was not possible (bsc#1113296)
- Fixes a file descriptor leak (bsc#1116995)
- Will now run file conflict check on dry-run (best with download-only) (bsc#1140039)

Fixes for zypper:

- Fixes a bug where the wrong exit code was set when refreshing repos if --root was used (bsc#1134226)
- Improved the displaying of locks (bsc#1112911)
- Fixes an issue where `https` repository urls caused an error prompt to appear twice (bsc#1110542)
- zypper will now always warn when no repositories are defined (bsc#1109893)
- Fixes bash completion option detection (bsc#1049825)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049825">SUSE bug 1049825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109893">SUSE bug 1109893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110542">SUSE bug 1110542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111319">SUSE bug 1111319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112911">SUSE bug 1112911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113296">SUSE bug 1113296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116995">SUSE bug 1116995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131823">SUSE bug 1131823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134226">SUSE bug 1134226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137977">SUSE bug 1137977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140039">SUSE bug 1140039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145521">SUSE bug 1145521</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20532">CVE-2018-20532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20533">CVE-2018-20533 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20534">CVE-2018-20534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554338" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554339" comment="libzypp-16.20.2-27.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554340" comment="perl-solv-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554341" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554342" comment="zypper-1.13.54-18.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149855" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update to Java 7.1 Service Refresh 4 Fix Pack 50.

Security issues fixed:

- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-09"/>
	<updated date="2019-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11771">CVE-2019-11771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11775">CVE-2019-11775 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-4473">CVE-2019-4473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548727" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548728" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149856" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1149496" ref_url="https://bugzilla.suse.com/1149496" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2339-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192339-2.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5482: Fixed TFTP small blocksize heap buffer overflow (bsc#1149496).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-12"/>
	<updated date="2019-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5482">CVE-2019-5482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554343" comment="curl-7.37.0-37.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554344" comment="libcurl4-7.37.0-37.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548731" comment="libcurl4-32bit-7.37.0-37.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149857" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1135715" ref_url="https://bugzilla.suse.com/1135715" source="BUGZILLA"/>
		<reference ref_id="1148931" ref_url="https://bugzilla.suse.com/1148931" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595/" source="CVE"/>
		<reference ref_id="CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607/" source="CVE"/>
		<reference ref_id="CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615/" source="CVE"/>
		<reference ref_id="CVE-2019-8644" ref_url="https://www.suse.com/security/cve/CVE-2019-8644/" source="CVE"/>
		<reference ref_id="CVE-2019-8649" ref_url="https://www.suse.com/security/cve/CVE-2019-8649/" source="CVE"/>
		<reference ref_id="CVE-2019-8658" ref_url="https://www.suse.com/security/cve/CVE-2019-8658/" source="CVE"/>
		<reference ref_id="CVE-2019-8666" ref_url="https://www.suse.com/security/cve/CVE-2019-8666/" source="CVE"/>
		<reference ref_id="CVE-2019-8669" ref_url="https://www.suse.com/security/cve/CVE-2019-8669/" source="CVE"/>
		<reference ref_id="CVE-2019-8671" ref_url="https://www.suse.com/security/cve/CVE-2019-8671/" source="CVE"/>
		<reference ref_id="CVE-2019-8672" ref_url="https://www.suse.com/security/cve/CVE-2019-8672/" source="CVE"/>
		<reference ref_id="CVE-2019-8673" ref_url="https://www.suse.com/security/cve/CVE-2019-8673/" source="CVE"/>
		<reference ref_id="CVE-2019-8676" ref_url="https://www.suse.com/security/cve/CVE-2019-8676/" source="CVE"/>
		<reference ref_id="CVE-2019-8677" ref_url="https://www.suse.com/security/cve/CVE-2019-8677/" source="CVE"/>
		<reference ref_id="CVE-2019-8678" ref_url="https://www.suse.com/security/cve/CVE-2019-8678/" source="CVE"/>
		<reference ref_id="CVE-2019-8679" ref_url="https://www.suse.com/security/cve/CVE-2019-8679/" source="CVE"/>
		<reference ref_id="CVE-2019-8680" ref_url="https://www.suse.com/security/cve/CVE-2019-8680/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8683" ref_url="https://www.suse.com/security/cve/CVE-2019-8683/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8686" ref_url="https://www.suse.com/security/cve/CVE-2019-8686/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Updated to version 2.24.4 (bsc#1148931).

Security issues fixed:
	  
- CVE-2019-8644, CVE-2019-8649, CVE-2019-8658, CVE-2019-8669, CVE-2019-8678,
  CVE-2019-8680, CVE-2019-8683, CVE-2019-8684, CVE-2019-8688, CVE-2019-8595,
  CVE-2019-8607, CVE-2019-8615, CVE-2019-8644, CVE-2019-8649, CVE-2019-8658,
  CVE-2019-8666, CVE-2019-8669, CVE-2019-8671, CVE-2019-8672, CVE-2019-8673,
  CVE-2019-8676, CVE-2019-8677, CVE-2019-8678, CVE-2019-8679, CVE-2019-8680,
  CVE-2019-8681, CVE-2019-8683, CVE-2019-8684, CVE-2019-8686, CVE-2019-8687,
  CVE-2019-8688, CVE-2019-8689, CVE-2019-8690

Non-security issues fixed:
	  
- Improved loading of multimedia streams to avoid memory exhaustion due to excessive caching.
- Updated the user agent string to make happy certain websites which would claim that the browser being used was unsupported.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-11"/>
	<updated date="2019-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8595">CVE-2019-8595 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8607">CVE-2019-8607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8615">CVE-2019-8615 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8644/">CVE-2019-8644 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8644">CVE-2019-8644 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8649/">CVE-2019-8649 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8649">CVE-2019-8649 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8658/">CVE-2019-8658 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8658">CVE-2019-8658 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8666/">CVE-2019-8666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8666">CVE-2019-8666 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8669/">CVE-2019-8669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8669">CVE-2019-8669 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8671/">CVE-2019-8671 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8671">CVE-2019-8671 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8672/">CVE-2019-8672 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8672">CVE-2019-8672 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8673/">CVE-2019-8673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8673">CVE-2019-8673 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8676/">CVE-2019-8676 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8676">CVE-2019-8676 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8677/">CVE-2019-8677 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8677">CVE-2019-8677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8678/">CVE-2019-8678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8678">CVE-2019-8678 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8679/">CVE-2019-8679 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8679">CVE-2019-8679 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8680/">CVE-2019-8680 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8680">CVE-2019-8680 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8681">CVE-2019-8681 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8683/">CVE-2019-8683 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8683">CVE-2019-8683 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8684">CVE-2019-8684 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8686/">CVE-2019-8686 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8686">CVE-2019-8686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8687">CVE-2019-8687 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8688">CVE-2019-8688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8689">CVE-2019-8689 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8690">CVE-2019-8690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554345" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554346" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554347" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554348" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554349" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149858" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1122292" ref_url="https://bugzilla.suse.com/1122292" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11772" ref_url="https://www.suse.com/security/cve/CVE-2019-11772/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2449" ref_url="https://www.suse.com/security/cve/CVE-2019-2449/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 5 Fix Pack 40.

Security issues fixed:

- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11772: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
- CVE-2019-2786: Fixed issue inside Component Security (bsc#1141787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-12"/>
	<updated date="2019-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122292">SUSE bug 1122292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11771">CVE-2019-11771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11772/">CVE-2019-11772 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11772">CVE-2019-11772 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11775">CVE-2019-11775 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2449/">CVE-2019-2449 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2449">CVE-2019-2449 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2786">CVE-2019-2786 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-4473">CVE-2019-4473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548732" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149859" version="1" class="patch">
	<metadata>
		<title>Security update for ibus (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1150011" ref_url="https://bugzilla.suse.com/1150011" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14822" ref_url="https://www.suse.com/security/cve/CVE-2019-14822/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005925.html" source="SUSE-SU"/>
		<description>
This update for ibus fixes the following issues:

Security issue fixed:

- CVE-2019-14822: Fixed a misconfiguration of the DBus server that allowed an unprivileged user to monitor and send method calls to the ibus bus of another user. (bsc#1150011)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150011">SUSE bug 1150011</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14822/">CVE-2019-14822 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14822">CVE-2019-14822 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554350" comment="ibus-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554351" comment="ibus-gtk-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554352" comment="ibus-gtk3-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522148" comment="ibus-lang-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554353" comment="libibus-1_0-5-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554354" comment="typelib-1_0-IBus-1_0-1.5.13-15.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149860" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1122706" ref_url="https://bugzilla.suse.com/1122706" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3813" ref_url="https://www.suse.com/security/cve/CVE-2019-3813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005084.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

Security issue fixed:

- CVE-2019-3813: Fixed a out-of-bounds read in the memslot_get_virt function that could lead to denial-of-service or code-execution (bsc#1122706).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-05"/>
	<updated date="2019-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122706">SUSE bug 1122706</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3813/">CVE-2019-3813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3813">CVE-2019-3813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554355" comment="libspice-server1-0.12.8-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149861" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005943.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

- CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance (bsc#1150003).
- CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-20"/>
	<updated date="2019-09-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1547">CVE-2019-1547 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1563">CVE-2019-1563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554356" comment="libopenssl-devel-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554357" comment="libopenssl1_0_0-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551262" comment="libopenssl1_0_0-32bit-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554358" comment="libopenssl1_0_0-hmac-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551264" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554359" comment="openssl-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530708" comment="openssl-doc-1.0.2j-60.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149862" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1120644" ref_url="https://bugzilla.suse.com/1120644" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005085.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Security issue fixed:

- CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509 certificate parser (bsc#1122191)
- CVE-2018-20406: Fixed a integer overflow via a large LONG_BINPUT (bsc#1120644)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-05"/>
	<updated date="2019-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120644">SUSE bug 1120644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20406">CVE-2018-20406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009528497" comment="libpython3_4m1_0-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009528498" comment="python3-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009528499" comment="python3-base-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554360" comment="python3-curses-3.4.6-25.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149863" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1149294" ref_url="https://bugzilla.suse.com/1149294" source="BUGZILLA"/>
		<reference ref_id="1149295" ref_url="https://bugzilla.suse.com/1149295" source="BUGZILLA"/>
		<reference ref_id="1149296" ref_url="https://bugzilla.suse.com/1149296" source="BUGZILLA"/>
		<reference ref_id="1149297" ref_url="https://bugzilla.suse.com/1149297" source="BUGZILLA"/>
		<reference ref_id="1149298" ref_url="https://bugzilla.suse.com/1149298" source="BUGZILLA"/>
		<reference ref_id="1149299" ref_url="https://bugzilla.suse.com/1149299" source="BUGZILLA"/>
		<reference ref_id="1149303" ref_url="https://bugzilla.suse.com/1149303" source="BUGZILLA"/>
		<reference ref_id="1149304" ref_url="https://bugzilla.suse.com/1149304" source="BUGZILLA"/>
		<reference ref_id="1149324" ref_url="https://bugzilla.suse.com/1149324" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to ESR 60.9 fixes the following issues:

Security issues fixed:

- CVE-2019-11742: Fixed a same-origin policy violation involving SVG filters and canvas to steal cross-origin images. (bsc#1149303)
- CVE-2019-11746: Fixed a use-after-free while manipulating video. (bsc#1149297)
- CVE-2019-11744: Fixed an XSS caused by breaking out of title and textarea elements using innerHTML. (bsc#1149304)
- CVE-2019-11753: Fixed a privilege escalation with Mozilla Maintenance Service in custom Firefox installation location. (bsc#1149295)
- CVE-2019-11752: Fixed a use-after-free while extracting a key value in IndexedDB. (bsc#1149296)
- CVE-2019-11743: Fixed a timing side-channel attack on cross-origin information, utilizing unload event attributes. (bsc#1149298)
- CVE-2019-11740: Fixed several memory safety bugs. (bsc#1149299)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-23"/>
	<updated date="2019-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149294">SUSE bug 1149294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149295">SUSE bug 1149295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149296">SUSE bug 1149296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149297">SUSE bug 1149297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149298">SUSE bug 1149298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149299">SUSE bug 1149299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149303">SUSE bug 1149303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149304">SUSE bug 1149304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11753">CVE-2019-11753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554361" comment="MozillaFirefox-60.9.0-109.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554362" comment="MozillaFirefox-translations-common-60.9.0-109.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149864" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1145559" ref_url="https://bugzilla.suse.com/1145559" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11500" ref_url="https://www.suse.com/security/cve/CVE-2019-11500/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005961.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2019-11500: Fixed a potential remote code execution in the IMAP and ManageSieve protocol parsers (bsc#1145559).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145559">SUSE bug 1145559</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11500/">CVE-2019-11500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11500">CVE-2019-11500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554363" comment="dovecot22-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554364" comment="dovecot22-backend-mysql-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554365" comment="dovecot22-backend-pgsql-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554366" comment="dovecot22-backend-sqlite-2.2.31-19.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149865" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1129180" ref_url="https://bugzilla.suse.com/1129180" source="BUGZILLA"/>
		<reference ref_id="1131863" ref_url="https://bugzilla.suse.com/1131863" source="BUGZILLA"/>
		<reference ref_id="1134156" ref_url="https://bugzilla.suse.com/1134156" source="BUGZILLA"/>
		<reference ref_id="1140359" ref_url="https://bugzilla.suse.com/1140359" source="BUGZILLA"/>
		<reference ref_id="1146882" ref_url="https://bugzilla.suse.com/1146882" source="BUGZILLA"/>
		<reference ref_id="1146884" ref_url="https://bugzilla.suse.com/1146884" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12973" ref_url="https://www.suse.com/security/cve/CVE-2019-12973/" source="CVE"/>
		<reference ref_id="CVE-2019-14811" ref_url="https://www.suse.com/security/cve/CVE-2019-14811/" source="CVE"/>
		<reference ref_id="CVE-2019-14812" ref_url="https://www.suse.com/security/cve/CVE-2019-14812/" source="CVE"/>
		<reference ref_id="CVE-2019-14813" ref_url="https://www.suse.com/security/cve/CVE-2019-14813/" source="CVE"/>
		<reference ref_id="CVE-2019-14817" ref_url="https://www.suse.com/security/cve/CVE-2019-14817/" source="CVE"/>
		<reference ref_id="CVE-2019-3835" ref_url="https://www.suse.com/security/cve/CVE-2019-3835/" source="CVE"/>
		<reference ref_id="CVE-2019-3839" ref_url="https://www.suse.com/security/cve/CVE-2019-3839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to 9.27 fixes the following issues:

Security issues fixed:

- CVE-2019-3835: Fixed an unauthorized file system access caused by an available superexec operator.  (bsc#1129180)
- CVE-2019-3839: Fixed an unauthorized file system access caused by available privileged operators. (bsc#1134156)
- CVE-2019-12973: Fixed a denial-of-service vulnerability in the OpenJPEG function opj_t1_encode_cblks. (bsc#1140359)
- CVE-2019-14811: Fixed a safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator. (bsc#1146882)
- CVE-2019-14812: Fixed a safer mode bypass by .forceput exposure in setuserparams. (bsc#1146882)
- CVE-2019-14813: Fixed a safer mode bypass by .forceput exposure in setsystemparams. (bsc#1146882)
- CVE-2019-14817: Fixed a safer mode bypass by .forceput exposure in .pdfexectoken and other procedures. (bsc#1146884)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-26"/>
	<updated date="2019-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129180">SUSE bug 1129180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131863">SUSE bug 1131863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134156">SUSE bug 1134156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140359">SUSE bug 1140359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146884">SUSE bug 1146884</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12973/">CVE-2019-12973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12973">CVE-2019-12973 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14811/">CVE-2019-14811 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14811">CVE-2019-14811 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14812/">CVE-2019-14812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14812">CVE-2019-14812 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14813/">CVE-2019-14813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14813">CVE-2019-14813 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14817/">CVE-2019-14817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14817">CVE-2019-14817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3835/">CVE-2019-3835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3835">CVE-2019-3835 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3839/">CVE-2019-3839 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3839">CVE-2019-3839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554367" comment="ghostscript-9.27-23.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554368" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149866" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1123371" ref_url="https://bugzilla.suse.com/1123371" source="BUGZILLA"/>
		<reference ref_id="1123377" ref_url="https://bugzilla.suse.com/1123377" source="BUGZILLA"/>
		<reference ref_id="1123378" ref_url="https://bugzilla.suse.com/1123378" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16890" ref_url="https://www.suse.com/security/cve/CVE-2018-16890/" source="CVE"/>
		<reference ref_id="CVE-2019-3822" ref_url="https://www.suse.com/security/cve/CVE-2019-3822/" source="CVE"/>
		<reference ref_id="CVE-2019-3823" ref_url="https://www.suse.com/security/cve/CVE-2019-3823/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005088.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2019-3823: Fixed a heap out-of-bounds read in the code handling the end-of-response for SMTP (bsc#1123378).
- CVE-2019-3822: Fixed a stack based buffer overflow in the function creating an outgoing NTLM type-3 message (bsc#1123377).
- CVE-2018-16890: Fixed a heap buffer out-of-bounds read in the function handling incoming NTLM type-2 messages (bsc#1123371).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-06"/>
	<updated date="2019-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1123371">SUSE bug 1123371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123377">SUSE bug 1123377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123378">SUSE bug 1123378</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16890/">CVE-2018-16890 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16890">CVE-2018-16890 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3822/">CVE-2019-3822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3822">CVE-2019-3822 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3823/">CVE-2019-3823 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3823">CVE-2019-3823 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554369" comment="curl-7.37.0-37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554370" comment="libcurl4-7.37.0-37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546551" comment="libcurl4-32bit-7.37.0-37.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149867" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1148987" ref_url="https://bugzilla.suse.com/1148987" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005976.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

Security issues fixed:
	  
- CVE-2019-13627: Mitigated ECDSA timing attack. (bsc#1148987)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-01"/>
	<updated date="2019-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1148987">SUSE bug 1148987</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13627">CVE-2019-13627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554371" comment="libgcrypt20-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548753" comment="libgcrypt20-32bit-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554372" comment="libgcrypt20-hmac-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548755" comment="libgcrypt20-hmac-32bit-1.6.1-16.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149868" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1145604" ref_url="https://bugzilla.suse.com/1145604" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005997.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.156-94_61 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2017-18379: Fixed an out of boundary access that happened in drivers/nvme/target/fc.c (bsc#1145604).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145604">SUSE bug 1145604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721146" comment="kernel-default 4.4.156-94.61 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719413" comment="kgraft-patch-4_4_156-94_61-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538295" comment="kgraft-patch-4_4_156-94_61-default-8-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149869" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1145604" ref_url="https://bugzilla.suse.com/1145604" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005997.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.156-94_57 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2017-18379: Fixed an out of boundary access that happened in drivers/nvme/target/fc.c (bsc#1145604).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145604">SUSE bug 1145604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721145" comment="kernel-default 4.4.156-94.57 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719412" comment="kgraft-patch-4_4_156-94_57-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538296" comment="kgraft-patch-4_4_156-94_57-default-8-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149870" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1145604" ref_url="https://bugzilla.suse.com/1145604" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005997.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.162-94_72 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2017-18379: Fixed an out of boundary access that happened in drivers/nvme/target/fc.c (bsc#1145604).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145604">SUSE bug 1145604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721149" comment="kernel-default 4.4.162-94.72 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719416" comment="kgraft-patch-4_4_162-94_72-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538297" comment="kgraft-patch-4_4_162-94_72-default-6-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149871" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1145604" ref_url="https://bugzilla.suse.com/1145604" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005997.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.162-94_69 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2017-18379: Fixed an out of boundary access that happened in drivers/nvme/target/fc.c (bsc#1145604).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145604">SUSE bug 1145604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721152" comment="kernel-default 4.4.162-94.69 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719419" comment="kgraft-patch-4_4_162-94_69-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538298" comment="kgraft-patch-4_4_162-94_69-default-6-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149872" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1145604" ref_url="https://bugzilla.suse.com/1145604" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005997.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.156-94_64 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2017-18379: Fixed an out of boundary access that happened in drivers/nvme/target/fc.c (bsc#1145604).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145604">SUSE bug 1145604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721147" comment="kernel-default 4.4.156-94.64 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719414" comment="kgraft-patch-4_4_156-94_64-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538299" comment="kgraft-patch-4_4_156-94_64-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149873" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1145604" ref_url="https://bugzilla.suse.com/1145604" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005997.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.176-94_88 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2017-18379: Fixed an out of boundary access that happened in drivers/nvme/target/fc.c (bsc#1145604).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145604">SUSE bug 1145604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721148" comment="kernel-default 4.4.176-94.88 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719415" comment="kgraft-patch-4_4_176-94_88-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538300" comment="kgraft-patch-4_4_176-94_88-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149874" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1145604" ref_url="https://bugzilla.suse.com/1145604" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005997.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.175-94_79 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2017-18379: Fixed an out of boundary access that happened in drivers/nvme/target/fc.c (bsc#1145604).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145604">SUSE bug 1145604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721151" comment="kernel-default 4.4.175-94.79 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719418" comment="kgraft-patch-4_4_175-94_79-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538301" comment="kgraft-patch-4_4_175-94_79-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149875" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1145604" ref_url="https://bugzilla.suse.com/1145604" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005997.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_103 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2017-18379: Fixed an out of boundary access that happened in drivers/nvme/target/fc.c (bsc#1145604).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145604">SUSE bug 1145604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721277" comment="kernel-default 4.4.180-94.103 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719602" comment="kgraft-patch-4_4_180-94_103-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538302" comment="kgraft-patch-4_4_180-94_103-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149876" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1145604" ref_url="https://bugzilla.suse.com/1145604" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005997.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_100 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2017-18379: Fixed an out of boundary access that happened in drivers/nvme/target/fc.c (bsc#1145604).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145604">SUSE bug 1145604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721278" comment="kernel-default 4.4.180-94.100 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719604" comment="kgraft-patch-4_4_180-94_100-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538303" comment="kgraft-patch-4_4_180-94_100-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149877" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1145604" ref_url="https://bugzilla.suse.com/1145604" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005997.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_97 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2017-18379: Fixed an out of boundary access that happened in drivers/nvme/target/fc.c (bsc#1145604).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145604">SUSE bug 1145604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721153" comment="kernel-default 4.4.180-94.97 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719420" comment="kgraft-patch-4_4_180-94_97-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538304" comment="kgraft-patch-4_4_180-94_97-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149878" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1145604" ref_url="https://bugzilla.suse.com/1145604" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005997.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.178-94_91 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2017-18379: Fixed an out of boundary access that happened in drivers/nvme/target/fc.c (bsc#1145604).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145604">SUSE bug 1145604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721150" comment="kernel-default 4.4.178-94.91 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719417" comment="kgraft-patch-4_4_178-94_91-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538305" comment="kgraft-patch-4_4_178-94_91-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149879" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1087200" ref_url="https://bugzilla.suse.com/1087200" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1117473" ref_url="https://bugzilla.suse.com/1117473" source="BUGZILLA"/>
		<reference ref_id="1123482" ref_url="https://bugzilla.suse.com/1123482" source="BUGZILLA"/>
		<reference ref_id="1124525" ref_url="https://bugzilla.suse.com/1124525" source="BUGZILLA"/>
		<reference ref_id="1133810" ref_url="https://bugzilla.suse.com/1133810" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="1145665" ref_url="https://bugzilla.suse.com/1145665" source="BUGZILLA"/>
		<reference ref_id="1149323" ref_url="https://bugzilla.suse.com/1149323" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Updated to new ESR version 68.1 (bsc#1149323).

In addition to the already fixed vulnerabilities released in previous ESR updates,
the following were also fixed:
    CVE-2019-11751, CVE-2019-11736, CVE-2019-9812, CVE-2019-11748, CVE-2019-11749,
    CVE-2019-11750, CVE-2019-11738, CVE-2019-11747, CVE-2019-11735.

Several run-time issues were also resolved (bsc#1117473, bsc#1124525, bsc#1133810).

The version displayed in Help &gt; About is now correct (bsc#1087200).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-09"/>
	<updated date="2019-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087200">SUSE bug 1087200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117473">SUSE bug 1117473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123482">SUSE bug 1123482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124525">SUSE bug 1124525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133810">SUSE bug 1133810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145665">SUSE bug 1145665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11710">CVE-2019-11710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11714">CVE-2019-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11716">CVE-2019-11716 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11718">CVE-2019-11718 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11720">CVE-2019-11720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11721">CVE-2019-11721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11723">CVE-2019-11723 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11724">CVE-2019-11724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11725">CVE-2019-11725 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11727">CVE-2019-11727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11728">CVE-2019-11728 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11733">CVE-2019-11733 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11735">CVE-2019-11735 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11736">CVE-2019-11736 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11738">CVE-2019-11738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11747">CVE-2019-11747 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11748">CVE-2019-11748 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11749">CVE-2019-11749 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11750">CVE-2019-11750 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11751">CVE-2019-11751 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11753">CVE-2019-11753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554373" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554374" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554375" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149880" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1109412" ref_url="https://bugzilla.suse.com/1109412" source="BUGZILLA"/>
		<reference ref_id="1109413" ref_url="https://bugzilla.suse.com/1109413" source="BUGZILLA"/>
		<reference ref_id="1109414" ref_url="https://bugzilla.suse.com/1109414" source="BUGZILLA"/>
		<reference ref_id="1111996" ref_url="https://bugzilla.suse.com/1111996" source="BUGZILLA"/>
		<reference ref_id="1112534" ref_url="https://bugzilla.suse.com/1112534" source="BUGZILLA"/>
		<reference ref_id="1112535" ref_url="https://bugzilla.suse.com/1112535" source="BUGZILLA"/>
		<reference ref_id="1113247" ref_url="https://bugzilla.suse.com/1113247" source="BUGZILLA"/>
		<reference ref_id="1113252" ref_url="https://bugzilla.suse.com/1113252" source="BUGZILLA"/>
		<reference ref_id="1113255" ref_url="https://bugzilla.suse.com/1113255" source="BUGZILLA"/>
		<reference ref_id="1116827" ref_url="https://bugzilla.suse.com/1116827" source="BUGZILLA"/>
		<reference ref_id="1118830" ref_url="https://bugzilla.suse.com/1118830" source="BUGZILLA"/>
		<reference ref_id="1118831" ref_url="https://bugzilla.suse.com/1118831" source="BUGZILLA"/>
		<reference ref_id="1120640" ref_url="https://bugzilla.suse.com/1120640" source="BUGZILLA"/>
		<reference ref_id="1121034" ref_url="https://bugzilla.suse.com/1121034" source="BUGZILLA"/>
		<reference ref_id="1121035" ref_url="https://bugzilla.suse.com/1121035" source="BUGZILLA"/>
		<reference ref_id="1121056" ref_url="https://bugzilla.suse.com/1121056" source="BUGZILLA"/>
		<reference ref_id="1133131" ref_url="https://bugzilla.suse.com/1133131" source="BUGZILLA"/>
		<reference ref_id="1133232" ref_url="https://bugzilla.suse.com/1133232" source="BUGZILLA"/>
		<reference ref_id="1141913" ref_url="https://bugzilla.suse.com/1141913" source="BUGZILLA"/>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000876" ref_url="https://www.suse.com/security/cve/CVE-2018-1000876/" source="CVE"/>
		<reference ref_id="CVE-2018-17358" ref_url="https://www.suse.com/security/cve/CVE-2018-17358/" source="CVE"/>
		<reference ref_id="CVE-2018-17359" ref_url="https://www.suse.com/security/cve/CVE-2018-17359/" source="CVE"/>
		<reference ref_id="CVE-2018-17360" ref_url="https://www.suse.com/security/cve/CVE-2018-17360/" source="CVE"/>
		<reference ref_id="CVE-2018-17985" ref_url="https://www.suse.com/security/cve/CVE-2018-17985/" source="CVE"/>
		<reference ref_id="CVE-2018-18309" ref_url="https://www.suse.com/security/cve/CVE-2018-18309/" source="CVE"/>
		<reference ref_id="CVE-2018-18483" ref_url="https://www.suse.com/security/cve/CVE-2018-18483/" source="CVE"/>
		<reference ref_id="CVE-2018-18484" ref_url="https://www.suse.com/security/cve/CVE-2018-18484/" source="CVE"/>
		<reference ref_id="CVE-2018-18605" ref_url="https://www.suse.com/security/cve/CVE-2018-18605/" source="CVE"/>
		<reference ref_id="CVE-2018-18606" ref_url="https://www.suse.com/security/cve/CVE-2018-18606/" source="CVE"/>
		<reference ref_id="CVE-2018-18607" ref_url="https://www.suse.com/security/cve/CVE-2018-18607/" source="CVE"/>
		<reference ref_id="CVE-2018-19931" ref_url="https://www.suse.com/security/cve/CVE-2018-19931/" source="CVE"/>
		<reference ref_id="CVE-2018-19932" ref_url="https://www.suse.com/security/cve/CVE-2018-19932/" source="CVE"/>
		<reference ref_id="CVE-2018-20623" ref_url="https://www.suse.com/security/cve/CVE-2018-20623/" source="CVE"/>
		<reference ref_id="CVE-2018-20651" ref_url="https://www.suse.com/security/cve/CVE-2018-20651/" source="CVE"/>
		<reference ref_id="CVE-2018-20671" ref_url="https://www.suse.com/security/cve/CVE-2018-20671/" source="CVE"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

binutils was updated to current 2.32 branch @7b468db3 [jsc#ECO-368]:

Includes the following security fixes:

- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)
- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)
- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)
- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)
- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)
- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)
- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)
- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)
- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)
- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)
- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)
- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)
- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)
- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)
- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in  load_specific_debug_section in objdump.c (bsc#1121056)
- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)
- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)

- Enable xtensa architecture (Tensilica lc6 and related)
- Use -ffat-lto-objects in order to provide assembly for static libs
  (bsc#1141913).
- Fixed some LTO problems (bsc#1133131 bsc#1133232).
- riscv: Don't check ABI flags if no code section

Update to binutils 2.32:

* The binutils now support for the C-SKY processor series.
* The x86 assembler now supports a -mvexwig=[0|1] option to control
  encoding of VEX.W-ignored (WIG) VEX instructions.
  It also has a new -mx86-used-note=[yes|no] option to generate (or
  not) x86 GNU property notes.
* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),
  the Loongson EXTensions (EXT) instructions, the Loongson Content
  Address Memory (CAM) ASE and the Loongson MultiMedia extensions
  Instructions (MMI) ASE.
* The addr2line, c++filt, nm and objdump tools now have a default
  limit on the maximum amount of recursion that is allowed whilst
  demangling strings.  This limit can be disabled if necessary.
* Objdump's --disassemble option can now take a parameter,
  specifying the starting symbol for disassembly.  Disassembly will
  continue from this symbol up to the next symbol or the end of the
  function.
* The BFD linker will now report property change in linker map file
  when merging GNU properties.
* The BFD linker's -t option now doesn't report members within
  archives, unless -t is given twice.  This makes it more useful
  when generating a list of files that should be packaged for a
  linker bug report.
* The GOLD linker has improved warning messages for relocations that
  refer to discarded sections.

- Improve relro support on s390 [fate#326356]
- Handle ELF compressed header alignment correctly.

  		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-14"/>
	<updated date="2019-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109412">SUSE bug 1109412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109413">SUSE bug 1109413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109414">SUSE bug 1109414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111996">SUSE bug 1111996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112534">SUSE bug 1112534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112535">SUSE bug 1112535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113247">SUSE bug 1113247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113252">SUSE bug 1113252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113255">SUSE bug 1113255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116827">SUSE bug 1116827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118830">SUSE bug 1118830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118831">SUSE bug 1118831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120640">SUSE bug 1120640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121034">SUSE bug 1121034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121035">SUSE bug 1121035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121056">SUSE bug 1121056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133131">SUSE bug 1133131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133232">SUSE bug 1133232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141913">SUSE bug 1141913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000876/">CVE-2018-1000876 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000876">CVE-2018-1000876 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17358/">CVE-2018-17358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17358">CVE-2018-17358 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17359/">CVE-2018-17359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17359">CVE-2018-17359 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17360/">CVE-2018-17360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17360">CVE-2018-17360 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17985/">CVE-2018-17985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17985">CVE-2018-17985 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18309/">CVE-2018-18309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18309">CVE-2018-18309 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18483/">CVE-2018-18483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18483">CVE-2018-18483 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18484/">CVE-2018-18484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18484">CVE-2018-18484 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18605/">CVE-2018-18605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18605">CVE-2018-18605 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18606/">CVE-2018-18606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18606">CVE-2018-18606 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18607/">CVE-2018-18607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18607">CVE-2018-18607 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19931/">CVE-2018-19931 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19931">CVE-2018-19931 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19932/">CVE-2018-19932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19932">CVE-2018-19932 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20623/">CVE-2018-20623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20623">CVE-2018-20623 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20651/">CVE-2018-20651 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20651">CVE-2018-20651 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20671/">CVE-2018-20671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20671">CVE-2018-20671 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010180">CVE-2019-1010180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554376" comment="binutils-2.32-9.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149881" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1153674" ref_url="https://bugzilla.suse.com/1153674" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006015.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

Security issue fixed: 	  

- CVE-2019-14287: Fixed an issue where a user with sudo privileges
  that allowed them to run commands with an arbitrary uid, could
  run commands as root, despite being forbidden to do so in sudoers
  (bsc#1153674).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14287">CVE-2019-14287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554377" comment="sudo-1.8.20p2-3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149882" version="1" class="patch">
	<metadata>
		<title>Security update for libpcap (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1153332" ref_url="https://bugzilla.suse.com/1153332" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2019-15165" ref_url="https://www.suse.com/security/cve/CVE-2019-15165/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006016.html" source="SUSE-SU"/>
		<description>
This update for libpcap fixes the following issues:

- CVE-2019-15165: Added sanity checks for PHB header length before allocating memory (bsc#1153332).
- CVE-2018-16301: Fixed a buffer overflow (bsc#1153332).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15165/">CVE-2019-15165 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15165">CVE-2019-15165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554378" comment="libpcap1-1.8.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554379" comment="tcpdump-4.9.2-14.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149883" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126197" ref_url="https://bugzilla.suse.com/1126197" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1133818" ref_url="https://bugzilla.suse.com/1133818" source="BUGZILLA"/>
		<reference ref_id="1143797" ref_url="https://bugzilla.suse.com/1143797" source="BUGZILLA"/>
		<reference ref_id="1146874" ref_url="https://bugzilla.suse.com/1146874" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-17340" ref_url="https://www.suse.com/security/cve/CVE-2019-17340/" source="CVE"/>
		<reference ref_id="CVE-2019-17341" ref_url="https://www.suse.com/security/cve/CVE-2019-17341/" source="CVE"/>
		<reference ref_id="CVE-2019-17342" ref_url="https://www.suse.com/security/cve/CVE-2019-17342/" source="CVE"/>
		<reference ref_id="CVE-2019-17343" ref_url="https://www.suse.com/security/cve/CVE-2019-17343/" source="CVE"/>
		<reference ref_id="CVE-2019-17344" ref_url="https://www.suse.com/security/cve/CVE-2019-17344/" source="CVE"/>
		<reference ref_id="CVE-2019-17345" ref_url="https://www.suse.com/security/cve/CVE-2019-17345/" source="CVE"/>
		<reference ref_id="CVE-2019-17346" ref_url="https://www.suse.com/security/cve/CVE-2019-17346/" source="CVE"/>
		<reference ref_id="CVE-2019-17347" ref_url="https://www.suse.com/security/cve/CVE-2019-17347/" source="CVE"/>
		<reference ref_id="CVE-2019-17348" ref_url="https://www.suse.com/security/cve/CVE-2019-17348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed: 	  

- CVE-2019-15890: Fixed a use-after-free in SLiRP networking implementation of QEMU emulator
  which could have led to Denial of Service (bsc#1149813).
- CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite loop and denial of 
  service (bsc#1146874).
- CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking implementation of QEMU 
  emulator which could have led to execution of  arbitrary code with privileges of the 
  QEMU process (bsc#1143797).

Other issue fixed: 

- Fixed an issue where libxenlight could not restore domain vsa6535522 on live migration (bsc#1133818).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-24"/>
	<updated date="2019-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126197">SUSE bug 1126197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133818">SUSE bug 1133818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146874">SUSE bug 1146874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12068">CVE-2019-12068 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14378">CVE-2019-14378 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17340/">CVE-2019-17340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17340">CVE-2019-17340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17341/">CVE-2019-17341 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17341">CVE-2019-17341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17342/">CVE-2019-17342 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17342">CVE-2019-17342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17343/">CVE-2019-17343 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17343">CVE-2019-17343 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17344/">CVE-2019-17344 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17344">CVE-2019-17344 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17345/">CVE-2019-17345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17345">CVE-2019-17345 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17346/">CVE-2019-17346 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17346">CVE-2019-17346 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17347/">CVE-2019-17347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17347">CVE-2019-17347 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17348/">CVE-2019-17348 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17348">CVE-2019-17348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538307" comment="xen-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538308" comment="xen-doc-html-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538309" comment="xen-libs-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538310" comment="xen-libs-32bit-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538311" comment="xen-tools-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538312" comment="xen-tools-domU-4.9.4_04-3.56.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149884" version="1" class="patch">
	<metadata>
		<title>Security update for nfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1150733" ref_url="https://bugzilla.suse.com/1150733" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3689" ref_url="https://www.suse.com/security/cve/CVE-2019-3689/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2781-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192781-1.html" source="SUSE-SU"/>
		<description>
This update for nfs-utils fixes the following issues:

- CVE-2019-3689: Fixed root-owned files stored in insecure /var/lib/nfs. (bsc#1150733)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-25"/>
	<updated date="2019-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150733">SUSE bug 1150733</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3689/">CVE-2019-3689 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3689">CVE-2019-3689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554380" comment="nfs-client-1.3.0-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554381" comment="nfs-doc-1.3.0-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554382" comment="nfs-kernel-server-1.3.0-34.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149885" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2829-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192829-1.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.156-94_64 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721147" comment="kernel-default 4.4.156-94.64 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719414" comment="kgraft-patch-4_4_156-94_64-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538313" comment="kgraft-patch-4_4_156-94_64-default-8-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149886" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2829-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192829-1.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.162-94_69 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721152" comment="kernel-default 4.4.162-94.69 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719419" comment="kgraft-patch-4_4_162-94_69-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538314" comment="kgraft-patch-4_4_162-94_69-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149887" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2829-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192829-1.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.162-94_72 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721149" comment="kernel-default 4.4.162-94.72 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719416" comment="kgraft-patch-4_4_162-94_72-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538315" comment="kgraft-patch-4_4_162-94_72-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149888" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2829-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192829-1.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.175-94_79 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721151" comment="kernel-default 4.4.175-94.79 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719418" comment="kgraft-patch-4_4_175-94_79-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538316" comment="kgraft-patch-4_4_175-94_79-default-6-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149889" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2829-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192829-1.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.176-94_88 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721148" comment="kernel-default 4.4.176-94.88 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719415" comment="kgraft-patch-4_4_176-94_88-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538317" comment="kgraft-patch-4_4_176-94_88-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149890" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2829-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192829-1.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.178-94_91 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721150" comment="kernel-default 4.4.178-94.91 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719417" comment="kgraft-patch-4_4_178-94_91-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538318" comment="kgraft-patch-4_4_178-94_91-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149891" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2829-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192829-1.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_97 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721153" comment="kernel-default 4.4.180-94.97 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719420" comment="kgraft-patch-4_4_180-94_97-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538319" comment="kgraft-patch-4_4_180-94_97-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149892" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2829-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192829-1.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_100 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721278" comment="kernel-default 4.4.180-94.100 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719604" comment="kgraft-patch-4_4_180-94_100-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538320" comment="kgraft-patch-4_4_180-94_100-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149893" version="1" class="patch">
	<metadata>
		<title>Security update for libunwind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1122012" ref_url="https://bugzilla.suse.com/1122012" source="BUGZILLA"/>
		<reference ref_id="936786" ref_url="https://bugzilla.suse.com/936786" source="BUGZILLA"/>
		<reference ref_id="976955" ref_url="https://bugzilla.suse.com/976955" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3239" ref_url="https://www.suse.com/security/cve/CVE-2015-3239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005095.html" source="SUSE-SU"/>
		<description>
This update for libunwind fixes the following issues:

Security issues fixed:

- CVE-2015-3239: Fixed a off-by-one in the dwarf_to_unw_regnum function (bsc#936786)

Non-security issues fixed:

- Fixed a dependency issue with libzmq5 (bsc#1122012)
- Fixed build on armv7 (bsc#976955)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-07"/>
	<updated date="2019-02-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122012">SUSE bug 1122012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936786">SUSE bug 936786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976955">SUSE bug 976955</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-3239/">CVE-2015-3239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3239">CVE-2015-3239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554383" comment="libunwind-1.1-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542100" comment="libunwind-devel-1.1-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149894" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2829-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192829-1.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_103 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721277" comment="kernel-default 4.4.180-94.103 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719602" comment="kgraft-patch-4_4_180-94_103-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538321" comment="kgraft-patch-4_4_180-94_103-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149895" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1010399" ref_url="https://bugzilla.suse.com/1010399" source="BUGZILLA"/>
		<reference ref_id="1010405" ref_url="https://bugzilla.suse.com/1010405" source="BUGZILLA"/>
		<reference ref_id="1010406" ref_url="https://bugzilla.suse.com/1010406" source="BUGZILLA"/>
		<reference ref_id="1010408" ref_url="https://bugzilla.suse.com/1010408" source="BUGZILLA"/>
		<reference ref_id="1010409" ref_url="https://bugzilla.suse.com/1010409" source="BUGZILLA"/>
		<reference ref_id="1010421" ref_url="https://bugzilla.suse.com/1010421" source="BUGZILLA"/>
		<reference ref_id="1010423" ref_url="https://bugzilla.suse.com/1010423" source="BUGZILLA"/>
		<reference ref_id="1010424" ref_url="https://bugzilla.suse.com/1010424" source="BUGZILLA"/>
		<reference ref_id="1010425" ref_url="https://bugzilla.suse.com/1010425" source="BUGZILLA"/>
		<reference ref_id="1010426" ref_url="https://bugzilla.suse.com/1010426" source="BUGZILLA"/>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1043008" ref_url="https://bugzilla.suse.com/1043008" source="BUGZILLA"/>
		<reference ref_id="1047281" ref_url="https://bugzilla.suse.com/1047281" source="BUGZILLA"/>
		<reference ref_id="1074235" ref_url="https://bugzilla.suse.com/1074235" source="BUGZILLA"/>
		<reference ref_id="1092611" ref_url="https://bugzilla.suse.com/1092611" source="BUGZILLA"/>
		<reference ref_id="1120374" ref_url="https://bugzilla.suse.com/1120374" source="BUGZILLA"/>
		<reference ref_id="1137990" ref_url="https://bugzilla.suse.com/1137990" source="BUGZILLA"/>
		<reference ref_id="1149429" ref_url="https://bugzilla.suse.com/1149429" source="BUGZILLA"/>
		<reference ref_id="1154738" ref_url="https://bugzilla.suse.com/1154738" source="BUGZILLA"/>
		<reference ref_id="959933" ref_url="https://bugzilla.suse.com/959933" source="BUGZILLA"/>
		<reference ref_id="983922" ref_url="https://bugzilla.suse.com/983922" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-5289" ref_url="https://www.suse.com/security/cve/CVE-2016-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-5292" ref_url="https://www.suse.com/security/cve/CVE-2016-5292/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2016-9067" ref_url="https://www.suse.com/security/cve/CVE-2016-9067/" source="CVE"/>
		<reference ref_id="CVE-2016-9068" ref_url="https://www.suse.com/security/cve/CVE-2016-9068/" source="CVE"/>
		<reference ref_id="CVE-2016-9069" ref_url="https://www.suse.com/security/cve/CVE-2016-9069/" source="CVE"/>
		<reference ref_id="CVE-2016-9071" ref_url="https://www.suse.com/security/cve/CVE-2016-9071/" source="CVE"/>
		<reference ref_id="CVE-2016-9073" ref_url="https://www.suse.com/security/cve/CVE-2016-9073/" source="CVE"/>
		<reference ref_id="CVE-2016-9075" ref_url="https://www.suse.com/security/cve/CVE-2016-9075/" source="CVE"/>
		<reference ref_id="CVE-2016-9076" ref_url="https://www.suse.com/security/cve/CVE-2016-9076/" source="CVE"/>
		<reference ref_id="CVE-2016-9077" ref_url="https://www.suse.com/security/cve/CVE-2016-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-7789" ref_url="https://www.suse.com/security/cve/CVE-2017-7789/" source="CVE"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5151" ref_url="https://www.suse.com/security/cve/CVE-2018-5151/" source="CVE"/>
		<reference ref_id="CVE-2018-5152" ref_url="https://www.suse.com/security/cve/CVE-2018-5152/" source="CVE"/>
		<reference ref_id="CVE-2018-5153" ref_url="https://www.suse.com/security/cve/CVE-2018-5153/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5160" ref_url="https://www.suse.com/security/cve/CVE-2018-5160/" source="CVE"/>
		<reference ref_id="CVE-2018-5163" ref_url="https://www.suse.com/security/cve/CVE-2018-5163/" source="CVE"/>
		<reference ref_id="CVE-2018-5164" ref_url="https://www.suse.com/security/cve/CVE-2018-5164/" source="CVE"/>
		<reference ref_id="CVE-2018-5165" ref_url="https://www.suse.com/security/cve/CVE-2018-5165/" source="CVE"/>
		<reference ref_id="CVE-2018-5166" ref_url="https://www.suse.com/security/cve/CVE-2018-5166/" source="CVE"/>
		<reference ref_id="CVE-2018-5167" ref_url="https://www.suse.com/security/cve/CVE-2018-5167/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5169" ref_url="https://www.suse.com/security/cve/CVE-2018-5169/" source="CVE"/>
		<reference ref_id="CVE-2018-5172" ref_url="https://www.suse.com/security/cve/CVE-2018-5172/" source="CVE"/>
		<reference ref_id="CVE-2018-5173" ref_url="https://www.suse.com/security/cve/CVE-2018-5173/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5175" ref_url="https://www.suse.com/security/cve/CVE-2018-5175/" source="CVE"/>
		<reference ref_id="CVE-2018-5176" ref_url="https://www.suse.com/security/cve/CVE-2018-5176/" source="CVE"/>
		<reference ref_id="CVE-2018-5177" ref_url="https://www.suse.com/security/cve/CVE-2018-5177/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5179" ref_url="https://www.suse.com/security/cve/CVE-2018-5179/" source="CVE"/>
		<reference ref_id="CVE-2018-5180" ref_url="https://www.suse.com/security/cve/CVE-2018-5180/" source="CVE"/>
		<reference ref_id="CVE-2018-5181" ref_url="https://www.suse.com/security/cve/CVE-2018-5181/" source="CVE"/>
		<reference ref_id="CVE-2018-5182" ref_url="https://www.suse.com/security/cve/CVE-2018-5182/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to 68.2.0 ESR fixes the following issues:

Mozilla Firefox was updated to version 68.2.0 ESR (bsc#1154738).

Security issues fixed:

-  CVE-2019-15903: Fixed a heap overflow in the expat library (bsc#1149429).
-  CVE-2019-11757: Fixed a use-after-free when creating index updates in IndexedDB (bsc#1154738).
-  CVE-2019-11758: Fixed a potentially exploitable crash due to 360 Total Security (bsc#1154738).
-  CVE-2019-11759: Fixed a stack buffer overflow in HKDF output (bsc#1154738).
-  CVE-2019-11760: Fixed a stack buffer overflow in WebRTC networking (bsc#1154738).
-  CVE-2019-11761: Fixed an unintended access to a privileged JSONView object (bsc#1154738).
-  CVE-2019-11762: Fixed a same-origin-property violation (bsc#1154738).
-  CVE-2019-11763: Fixed an XSS bypass (bsc#1154738).
-  CVE-2019-11764: Fixed several memory safety bugs (bsc#1154738).

Non-security issues fixed:

- Firefox 60.7 ESR changed the user interface language (bsc#1137990).
- Wrong Firefox GUI Language (bsc#1120374).
- Fixed an inadvertent crash report transmission without user opt-in (bsc#1074235).
- Firefox hangs randomly when browsing and scrolling (bsc#1043008).
- Firefox stops loading page until mouse is moved (bsc#1025108).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-31"/>
	<updated date="2019-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010399">SUSE bug 1010399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010405">SUSE bug 1010405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010406">SUSE bug 1010406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010408">SUSE bug 1010408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010409">SUSE bug 1010409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010421">SUSE bug 1010421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010423">SUSE bug 1010423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010424">SUSE bug 1010424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010425">SUSE bug 1010425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010426">SUSE bug 1010426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043008">SUSE bug 1043008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047281">SUSE bug 1047281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074235">SUSE bug 1074235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120374">SUSE bug 1120374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137990">SUSE bug 1137990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959933">SUSE bug 959933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983922">SUSE bug 983922</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2830">CVE-2016-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5289/">CVE-2016-5289 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5289">CVE-2016-5289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5292/">CVE-2016-5292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5292">CVE-2016-5292 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9067/">CVE-2016-9067 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9067">CVE-2016-9067 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9068/">CVE-2016-9068 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9068">CVE-2016-9068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9069/">CVE-2016-9069 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9069">CVE-2016-9069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9071/">CVE-2016-9071 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9071">CVE-2016-9071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9073/">CVE-2016-9073 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9073">CVE-2016-9073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9075/">CVE-2016-9075 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9075">CVE-2016-9075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9076/">CVE-2016-9076 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9076">CVE-2016-9076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9077/">CVE-2016-9077 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9077">CVE-2016-9077 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7789/">CVE-2017-7789 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7789">CVE-2017-7789 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5150">CVE-2018-5150 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5151/">CVE-2018-5151 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5151">CVE-2018-5151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5152/">CVE-2018-5152 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5152">CVE-2018-5152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5153/">CVE-2018-5153 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5153">CVE-2018-5153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5154">CVE-2018-5154 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5155">CVE-2018-5155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5157">CVE-2018-5157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5158">CVE-2018-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5159">CVE-2018-5159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5160/">CVE-2018-5160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5160">CVE-2018-5160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5163/">CVE-2018-5163 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5163">CVE-2018-5163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5164/">CVE-2018-5164 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5164">CVE-2018-5164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5165/">CVE-2018-5165 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5165">CVE-2018-5165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5166/">CVE-2018-5166 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5166">CVE-2018-5166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5167/">CVE-2018-5167 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5167">CVE-2018-5167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5168">CVE-2018-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5169/">CVE-2018-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5169">CVE-2018-5169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5172/">CVE-2018-5172 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5172">CVE-2018-5172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5173/">CVE-2018-5173 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5173">CVE-2018-5173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5174">CVE-2018-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5175/">CVE-2018-5175 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5175">CVE-2018-5175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5176/">CVE-2018-5176 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5176">CVE-2018-5176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5177/">CVE-2018-5177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5177">CVE-2018-5177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5178">CVE-2018-5178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5179/">CVE-2018-5179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5179">CVE-2018-5179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5180/">CVE-2018-5180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5180">CVE-2018-5180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5181/">CVE-2018-5181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5181">CVE-2018-5181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5182/">CVE-2018-5182 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5182">CVE-2018-5182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5183">CVE-2018-5183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11757">CVE-2019-11757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11758">CVE-2019-11758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11759">CVE-2019-11759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11760">CVE-2019-11760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11761">CVE-2019-11761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11762">CVE-2019-11762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11763">CVE-2019-11763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11764">CVE-2019-11764 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554384" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554385" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149896" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1144902" ref_url="https://bugzilla.suse.com/1144902" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006085.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2019-10218: Client code can return filenames containing path separators (bsc#1144902).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-04"/>
	<updated date="2019-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10218">CVE-2019-10218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554386" comment="libdcerpc-binding0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554387" comment="libdcerpc-binding0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554388" comment="libdcerpc0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554389" comment="libdcerpc0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554390" comment="libndr-krb5pac0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554391" comment="libndr-krb5pac0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554392" comment="libndr-nbt0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554393" comment="libndr-nbt0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554394" comment="libndr-standard0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554395" comment="libndr-standard0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554396" comment="libndr0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554397" comment="libndr0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554398" comment="libnetapi0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554399" comment="libnetapi0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554400" comment="libsamba-credentials0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554401" comment="libsamba-credentials0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554402" comment="libsamba-errors0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554403" comment="libsamba-errors0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554404" comment="libsamba-hostconfig0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554405" comment="libsamba-hostconfig0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554406" comment="libsamba-passdb0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554407" comment="libsamba-passdb0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554408" comment="libsamba-util0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554409" comment="libsamba-util0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554410" comment="libsamdb0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554411" comment="libsamdb0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554412" comment="libsmbclient0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554413" comment="libsmbclient0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554414" comment="libsmbconf0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554415" comment="libsmbconf0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554416" comment="libsmbldap0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554417" comment="libsmbldap0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554418" comment="libtevent-util0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554419" comment="libtevent-util0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554420" comment="libwbclient0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554421" comment="libwbclient0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554422" comment="samba-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554423" comment="samba-client-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554424" comment="samba-client-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522341" comment="samba-doc-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554425" comment="samba-libs-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554426" comment="samba-libs-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554427" comment="samba-winbind-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554428" comment="samba-winbind-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149897" version="1" class="patch">
	<metadata>
		<title>Security update for gdb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1115034" ref_url="https://bugzilla.suse.com/1115034" source="BUGZILLA"/>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="1145692" ref_url="https://bugzilla.suse.com/1145692" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006098.html" source="SUSE-SU"/>
		<description>
This update for gdb fixes the following issues:

Update to gdb 8.3.1: (jsc#ECO-368)

Security issues fixed:

- CVE-2019-1010180: Fixed a potential buffer overflow when loading ELF sections larger than the file. (bsc#1142772)

Upgrade libipt from v2.0 to v2.0.1.

- Enable librpm for version &gt; librpm.so.3 [bsc#1145692]:
  * Allow any librpm.so.x
  * Add %build test to check for 'zypper install &lt;rpm-packagename&gt;'
    message

- Copy gdbinit from fedora master @ 25caf28.  Add
  gdbinit.without-python, and use it for --without=python.

Rebase to 8.3 release (as in fedora 30 @ 1e222a3).

* DWARF index cache: GDB can now automatically save indices of DWARF
  symbols on disk to speed up further loading of the same binaries.
* Ada task switching is now supported on aarch64-elf targets when
  debugging a program using the Ravenscar Profile.
* Terminal styling is now available for the CLI and the TUI.
* Removed support for old demangling styles arm, edg, gnu, hp and
  lucid.
* Support for new native configuration RISC-V GNU/Linux (riscv*-*-linux*).

- Implemented access to more POWER8 registers.  [fate#326120, fate#325178]
- Also handle most new s390 arch13 instructions.  [fate#327369, jsc#ECO-368]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-07"/>
	<updated date="2019-11-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1115034">SUSE bug 1115034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145692">SUSE bug 1145692</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010180">CVE-2019-1010180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554429" comment="gdb-8.3.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149898" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1154862" ref_url="https://bugzilla.suse.com/1154862" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2936-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192936-1.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issue:

- CVE-2019-17498: Fixed an integer overflow in a bounds check that might have led to the disclosure of sensitive information or a denial of service (bsc#1154862).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-08"/>
	<updated date="2019-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">CVE-2019-17498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554430" comment="libssh2-1-1.4.3-20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548820" comment="libssh2-1-32bit-1.4.3-20.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149899" version="1" class="patch">
	<metadata>
		<title>Security update for libseccomp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1128828" ref_url="https://bugzilla.suse.com/1128828" source="BUGZILLA"/>
		<reference ref_id="1142614" ref_url="https://bugzilla.suse.com/1142614" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9893" ref_url="https://www.suse.com/security/cve/CVE-2019-9893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006108.html" source="SUSE-SU"/>
		<description>
This update for libseccomp fixes the following issues:

Update to new upstream release 2.4.1:

* Fix a BPF generation bug where the optimizer mistakenly
  identified duplicate BPF code blocks.

Updated to 2.4.0 (bsc#1128828 CVE-2019-9893):

* Update the syscall table for Linux v5.0-rc5
* Added support for the SCMP_ACT_KILL_PROCESS action
* Added support for the SCMP_ACT_LOG action and SCMP_FLTATR_CTL_LOG attribute
* Added explicit 32-bit (SCMP_AX_32(...)) and 64-bit (SCMP_AX_64(...)) argument comparison macros to help protect against unexpected sign extension
* Added support for the parisc and parisc64 architectures
* Added the ability to query and set the libseccomp API level via seccomp_api_get(3) and seccomp_api_set(3)
* Return -EDOM on an endian mismatch when adding an architecture to a filter
* Renumber the pseudo syscall number for subpage_prot() so it no longer conflicts with spu_run()
* Fix PFC generation when a syscall is prioritized, but no rule exists
* Numerous fixes to the seccomp-bpf filter generation code
* Switch our internal hashing function to jhash/Lookup3 to MurmurHash3
* Numerous tests added to the included test suite, coverage now at ~92%
* Update our Travis CI configuration to use Ubuntu 16.04
* Numerous documentation fixes and updates

Update to release 2.3.3:

* Updated the syscall table for Linux v4.15-rc7

Update to release 2.3.2:

* Achieved full compliance with the CII Best Practices program
* Added Travis CI builds to the GitHub repository
* Added code coverage reporting with the '--enable-code-coverage' configure
  flag and added Coveralls to the GitHub repository
* Updated the syscall tables to match Linux v4.10-rc6+
* Support for building with Python v3.x
* Allow rules with the -1 syscall if the SCMP\_FLTATR\_API\_TSKIP attribute is
  set to true
* Several small documentation fixes

- ignore make check error for ppc64/ppc64le, bypass bsc#1142614
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128828">SUSE bug 1128828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142614">SUSE bug 1142614</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9893/">CVE-2019-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9893">CVE-2019-9893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554431" comment="libseccomp2-2.4.1-11.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551319" comment="libseccomp2-32bit-2.4.1-11.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149900" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1084878" ref_url="https://bugzilla.suse.com/1084878" source="BUGZILLA"/>
		<reference ref_id="1117665" ref_url="https://bugzilla.suse.com/1117665" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1133140" ref_url="https://bugzilla.suse.com/1133140" source="BUGZILLA"/>
		<reference ref_id="1135966" ref_url="https://bugzilla.suse.com/1135966" source="BUGZILLA"/>
		<reference ref_id="1135967" ref_url="https://bugzilla.suse.com/1135967" source="BUGZILLA"/>
		<reference ref_id="1136261" ref_url="https://bugzilla.suse.com/1136261" source="BUGZILLA"/>
		<reference ref_id="1137865" ref_url="https://bugzilla.suse.com/1137865" source="BUGZILLA"/>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1140671" ref_url="https://bugzilla.suse.com/1140671" source="BUGZILLA"/>
		<reference ref_id="1141013" ref_url="https://bugzilla.suse.com/1141013" source="BUGZILLA"/>
		<reference ref_id="1141054" ref_url="https://bugzilla.suse.com/1141054" source="BUGZILLA"/>
		<reference ref_id="1142458" ref_url="https://bugzilla.suse.com/1142458" source="BUGZILLA"/>
		<reference ref_id="1143187" ref_url="https://bugzilla.suse.com/1143187" source="BUGZILLA"/>
		<reference ref_id="1144123" ref_url="https://bugzilla.suse.com/1144123" source="BUGZILLA"/>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1145477" ref_url="https://bugzilla.suse.com/1145477" source="BUGZILLA"/>
		<reference ref_id="1146042" ref_url="https://bugzilla.suse.com/1146042" source="BUGZILLA"/>
		<reference ref_id="1146163" ref_url="https://bugzilla.suse.com/1146163" source="BUGZILLA"/>
		<reference ref_id="1146285" ref_url="https://bugzilla.suse.com/1146285" source="BUGZILLA"/>
		<reference ref_id="1146361" ref_url="https://bugzilla.suse.com/1146361" source="BUGZILLA"/>
		<reference ref_id="1146378" ref_url="https://bugzilla.suse.com/1146378" source="BUGZILLA"/>
		<reference ref_id="1146391" ref_url="https://bugzilla.suse.com/1146391" source="BUGZILLA"/>
		<reference ref_id="1146413" ref_url="https://bugzilla.suse.com/1146413" source="BUGZILLA"/>
		<reference ref_id="1146425" ref_url="https://bugzilla.suse.com/1146425" source="BUGZILLA"/>
		<reference ref_id="1146512" ref_url="https://bugzilla.suse.com/1146512" source="BUGZILLA"/>
		<reference ref_id="1146514" ref_url="https://bugzilla.suse.com/1146514" source="BUGZILLA"/>
		<reference ref_id="1146516" ref_url="https://bugzilla.suse.com/1146516" source="BUGZILLA"/>
		<reference ref_id="1146519" ref_url="https://bugzilla.suse.com/1146519" source="BUGZILLA"/>
		<reference ref_id="1146524" ref_url="https://bugzilla.suse.com/1146524" source="BUGZILLA"/>
		<reference ref_id="1146526" ref_url="https://bugzilla.suse.com/1146526" source="BUGZILLA"/>
		<reference ref_id="1146529" ref_url="https://bugzilla.suse.com/1146529" source="BUGZILLA"/>
		<reference ref_id="1146540" ref_url="https://bugzilla.suse.com/1146540" source="BUGZILLA"/>
		<reference ref_id="1146543" ref_url="https://bugzilla.suse.com/1146543" source="BUGZILLA"/>
		<reference ref_id="1146547" ref_url="https://bugzilla.suse.com/1146547" source="BUGZILLA"/>
		<reference ref_id="1146550" ref_url="https://bugzilla.suse.com/1146550" source="BUGZILLA"/>
		<reference ref_id="1146584" ref_url="https://bugzilla.suse.com/1146584" source="BUGZILLA"/>
		<reference ref_id="1146589" ref_url="https://bugzilla.suse.com/1146589" source="BUGZILLA"/>
		<reference ref_id="1147022" ref_url="https://bugzilla.suse.com/1147022" source="BUGZILLA"/>
		<reference ref_id="1147122" ref_url="https://bugzilla.suse.com/1147122" source="BUGZILLA"/>
		<reference ref_id="1148394" ref_url="https://bugzilla.suse.com/1148394" source="BUGZILLA"/>
		<reference ref_id="1148938" ref_url="https://bugzilla.suse.com/1148938" source="BUGZILLA"/>
		<reference ref_id="1149083" ref_url="https://bugzilla.suse.com/1149083" source="BUGZILLA"/>
		<reference ref_id="1149376" ref_url="https://bugzilla.suse.com/1149376" source="BUGZILLA"/>
		<reference ref_id="1149522" ref_url="https://bugzilla.suse.com/1149522" source="BUGZILLA"/>
		<reference ref_id="1149527" ref_url="https://bugzilla.suse.com/1149527" source="BUGZILLA"/>
		<reference ref_id="1149555" ref_url="https://bugzilla.suse.com/1149555" source="BUGZILLA"/>
		<reference ref_id="1149612" ref_url="https://bugzilla.suse.com/1149612" source="BUGZILLA"/>
		<reference ref_id="1150025" ref_url="https://bugzilla.suse.com/1150025" source="BUGZILLA"/>
		<reference ref_id="1150112" ref_url="https://bugzilla.suse.com/1150112" source="BUGZILLA"/>
		<reference ref_id="1150452" ref_url="https://bugzilla.suse.com/1150452" source="BUGZILLA"/>
		<reference ref_id="1150457" ref_url="https://bugzilla.suse.com/1150457" source="BUGZILLA"/>
		<reference ref_id="1150465" ref_url="https://bugzilla.suse.com/1150465" source="BUGZILLA"/>
		<reference ref_id="1150727" ref_url="https://bugzilla.suse.com/1150727" source="BUGZILLA"/>
		<reference ref_id="1150942" ref_url="https://bugzilla.suse.com/1150942" source="BUGZILLA"/>
		<reference ref_id="1151347" ref_url="https://bugzilla.suse.com/1151347" source="BUGZILLA"/>
		<reference ref_id="1151350" ref_url="https://bugzilla.suse.com/1151350" source="BUGZILLA"/>
		<reference ref_id="1152685" ref_url="https://bugzilla.suse.com/1152685" source="BUGZILLA"/>
		<reference ref_id="1152782" ref_url="https://bugzilla.suse.com/1152782" source="BUGZILLA"/>
		<reference ref_id="1152788" ref_url="https://bugzilla.suse.com/1152788" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153263" ref_url="https://bugzilla.suse.com/1153263" source="BUGZILLA"/>
		<reference ref_id="1154103" ref_url="https://bugzilla.suse.com/1154103" source="BUGZILLA"/>
		<reference ref_id="1154372" ref_url="https://bugzilla.suse.com/1154372" source="BUGZILLA"/>
		<reference ref_id="1155131" ref_url="https://bugzilla.suse.com/1155131" source="BUGZILLA"/>
		<reference ref_id="1155671" ref_url="https://bugzilla.suse.com/1155671" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10906" ref_url="https://www.suse.com/security/cve/CVE-2016-10906/" source="CVE"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2017-18509" ref_url="https://www.suse.com/security/cve/CVE-2017-18509/" source="CVE"/>
		<reference ref_id="CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551/" source="CVE"/>
		<reference ref_id="CVE-2017-18595" ref_url="https://www.suse.com/security/cve/CVE-2017-18595/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-20976" ref_url="https://www.suse.com/security/cve/CVE-2018-20976/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15211" ref_url="https://www.suse.com/security/cve/CVE-2019-15211/" source="CVE"/>
		<reference ref_id="CVE-2019-15212" ref_url="https://www.suse.com/security/cve/CVE-2019-15212/" source="CVE"/>
		<reference ref_id="CVE-2019-15214" ref_url="https://www.suse.com/security/cve/CVE-2019-15214/" source="CVE"/>
		<reference ref_id="CVE-2019-15215" ref_url="https://www.suse.com/security/cve/CVE-2019-15215/" source="CVE"/>
		<reference ref_id="CVE-2019-15216" ref_url="https://www.suse.com/security/cve/CVE-2019-15216/" source="CVE"/>
		<reference ref_id="CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217/" source="CVE"/>
		<reference ref_id="CVE-2019-15218" ref_url="https://www.suse.com/security/cve/CVE-2019-15218/" source="CVE"/>
		<reference ref_id="CVE-2019-15219" ref_url="https://www.suse.com/security/cve/CVE-2019-15219/" source="CVE"/>
		<reference ref_id="CVE-2019-15220" ref_url="https://www.suse.com/security/cve/CVE-2019-15220/" source="CVE"/>
		<reference ref_id="CVE-2019-15221" ref_url="https://www.suse.com/security/cve/CVE-2019-15221/" source="CVE"/>
		<reference ref_id="CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15505" ref_url="https://www.suse.com/security/cve/CVE-2019-15505/" source="CVE"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2019-15807" ref_url="https://www.suse.com/security/cve/CVE-2019-15807/" source="CVE"/>
		<reference ref_id="CVE-2019-15902" ref_url="https://www.suse.com/security/cve/CVE-2019-15902/" source="CVE"/>
		<reference ref_id="CVE-2019-15924" ref_url="https://www.suse.com/security/cve/CVE-2019-15924/" source="CVE"/>
		<reference ref_id="CVE-2019-15926" ref_url="https://www.suse.com/security/cve/CVE-2019-15926/" source="CVE"/>
		<reference ref_id="CVE-2019-15927" ref_url="https://www.suse.com/security/cve/CVE-2019-15927/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-16413" ref_url="https://www.suse.com/security/cve/CVE-2019-16413/" source="CVE"/>
		<reference ref_id="CVE-2019-16995" ref_url="https://www.suse.com/security/cve/CVE-2019-16995/" source="CVE"/>
		<reference ref_id="CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055/" source="CVE"/>
		<reference ref_id="CVE-2019-17056" ref_url="https://www.suse.com/security/cve/CVE-2019-17056/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-9456" ref_url="https://www.suse.com/security/cve/CVE-2019-9456/" source="CVE"/>
		<reference ref_id="CVE-2019-9506" ref_url="https://www.suse.com/security/cve/CVE-2019-9506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12-SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
  condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
  Exception during Page Size Change, causing the CPU core to be non-functional.

  The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in
  executable pages by splitting / merging huge pages into small pages as
  needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7023735

- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port
  failed to add a port, which may have caused denial of service (bsc#1152685).

- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
  Transactional Memory support could be used to facilitate sidechannel
  information leaks out of microarchitectural buffers, similar to the
  previously described 'Microarchitectural Data Sampling' attack.

  The Linux kernel was supplemented with the option to disable TSX operation
  altogether (requiring CPU Microcode updates on older systems) and better
  flushing of microarchitectural buffers (VERW).

  The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251

- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the
  alloc_workqueue return value, leading to a NULL pointer dereference.
  (bsc#1150457).

- CVE-2019-10220: Added sanity checks on the pathnames passed to the user
  space. (bsc#1144903).

- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).

- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,
  leading to a Buffer Overflow (bsc#1153158).

- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell
  libertas driver (bsc#1150465).

- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return
  value, leading to a NULL pointer dereference. (bsc#1150452).

- CVE-2019-17055: The AF_ISDN network module in the Linux kernel did not
  enforce CAP_NET_RAW, which meant that unprivileged users could create a raw
  socket (bnc#1152782).

- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which
  meant that unprivileged users could create a raw socket (bsc#1152788).

- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly,
  which caused an i_size_read() infinite loop and denial of service on SMP
  systems (bnc#1151347).

- CVE-2019-15902: A backporting issue was discovered that re-introduced the
  Spectre vulnerability it had aimed to eliminate. This occurred because the
  backport process depends on cherry picking specific commits, and because two
  (correctly ordered) code lines were swapped (bnc#1149376).

- CVE-2019-15291: Fixed a NULL pointer dereference issue that could be caused
  by a malicious USB device (bnc#1146519).

- CVE-2019-15807: Fixed a memory leak in the SCSI module that could be abused
  to cause denial of service (bnc#1148938).

- CVE-2019-13272: Fixed a mishandled the recording of the credentials of a
  process that wants to create a ptrace relationship, which allowed local users
  to obtain root access by leveraging certain scenarios with a parent-child
  process relationship, where a parent drops privileges and calls execve
  (potentially allowing control by an attacker). (bnc#1140671).

- CVE-2019-14821: An out-of-bounds access issue was fixed in the kernel's KVM
  hypervisor. An unprivileged host user or process with access to '/dev/kvm'
  device could use this flaw to crash the host kernel, resulting in a denial of
  service or potentially escalating privileges on the system (bnc#1151350).

- CVE-2019-15505: An out-of-bounds issue had been fixed that could be caused by
  crafted USB device traffic (bnc#1147122).

- CVE-2017-18595: A double free in allocate_trace_buffer was fixed
  (bnc#1149555).

- CVE-2019-14835: A buffer overflow flaw was found in the kernel's vhost
  functionality that translates virtqueue buffers to IOVs. A privileged guest
  user able to pass descriptors with invalid length to the host could use this
  flaw to increase their privileges on the host (bnc#1150112).

- CVE-2019-15216: A NULL pointer dereference was fixed that could be malicious
  USB device (bnc#1146361).

- CVE-2019-15924: A a NULL pointer dereference has been fixed in the
  drivers/net/ethernet/intel/fm10k module (bnc#1149612).

- CVE-2019-9456: An out-of-bounds write in the USB monitor driver has been
  fixed. This issue could lead to local escalation of privilege with System
  execution privileges needed. (bnc#1150025).

- CVE-2019-15926: An out-of-bounds access was fixed in the
  drivers/net/wireless/ath/ath6kl module. (bnc#1149527).

- CVE-2019-15927: An out-of-bounds access was fixed in the sound/usb/mixer
  module (bnc#1149522).

- CVE-2019-15666: There was an out-of-bounds array access in the net/xfrm
  module that could cause denial of service (bnc#1148394).

- CVE-2017-18379: An out-of-boundary access was fixed in the
  drivers/nvme/target module (bnc#1143187).

- CVE-2019-15219: A NULL pointer dereference was fixed that could be abused by
  a malicious USB device (bnc#1146519 1146524).

- CVE-2019-15220: A use-after-free issue was fixed that could be caused by a
  malicious USB device (bnc#1146519 1146526).

- CVE-2019-15221: A NULL pointer dereference was fixed that could be caused by
  a malicious USB device (bnc#1146519 1146529).

- CVE-2019-14814: A heap-based buffer overflow was fixed in the marvell wifi
  chip driver. That issue allowed local users to cause a denial of service
  (system crash) or possibly execute arbitrary code (bnc#1146512).

- CVE-2019-14815: A missing length check while parsing WMM IEs was fixed
  (bsc#1146512, bsc#1146514, bsc#1146516).

- CVE-2019-14816: A heap-based buffer overflow in the marvell wifi chip driver
  was fixed. Local users would have abused this issue to cause a denial of
  service (system crash) or possibly execute arbitrary code (bnc#1146516).

- CVE-2017-18509: An issue in net/ipv6 as fixed. By setting a specific socket
  option, an attacker could control a pointer in kernel land and cause an
  inet_csk_listen_stop general protection fault, or potentially execute
  arbitrary code under certain circumstances. The issue can be triggered as
  root (e.g., inside a default LXC container or with the CAP_NET_ADMIN
  capability) or after namespace unsharing. (bnc#1145477)

- CVE-2019-9506: The Bluetooth BR/EDR specification used to permit sufficiently
  low encryption key length and did not prevent an attacker from influencing
  the key length negotiation. This allowed practical brute-force attacks (aka
  'KNOB') that could decrypt traffic and inject arbitrary ciphertext without
  the victim noticing (bnc#1137865).

- CVE-2019-15098: A NULL pointer dereference in drivers/net/wireless/ath was
  fixed (bnc#1146378).

- CVE-2019-15290: A NULL pointer dereference in ath6kl_usb_alloc_urb_from_pipe
  was fixed (bsc#1146378).

- CVE-2019-15239: A incorrect patch to net/ipv4 was fixed. By adding to a write
  queue between disconnection and re-connection, a local attacker could trigger
  multiple use-after-free conditions. This could result in kernel crashes or
  potentially in privilege escalation. (bnc#1146589)

- CVE-2019-15212: A double-free issue was fixed in drivers/usb driver
  (bnc#1146391).

- CVE-2016-10906: A use-after-free issue was fixed in drivers/net/ethernet/arc
  (bnc#1146584).

- CVE-2019-15211: A use-after-free issue caused by a malicious USB device was
  fixed in the drivers/media/v4l2-core driver (bnc#1146519).

- CVE-2019-15217: A a NULL pointer dereference issue caused by a malicious USB
  device was fixed in the drivers/media/usb/zr364xx driver (bnc#1146519).

- CVE-2019-15214: An a use-after-free issue in the sound subsystem was fixed
  (bnc#1146519).

- CVE-2019-15218: A NULL pointer dereference caused by a malicious USB device
  was fixed in the drivers/media/usb/siano driver (bnc#1146413).

- CVE-2019-15215: A use-after-free issue caused by a malicious USB device was
  fixed in the drivers/media/usb/cpia2 driver (bnc#1146425).

- CVE-2018-20976: A use-after-free issue was fixed in the fs/xfs driver
  (bnc#1146285).

- CVE-2017-18551: An out-of-bounds write was fixed in the drivers/i2c driver
  (bnc#1146163).

- CVE-2019-0154: An unprotected read access to i915 registers has been fixed
  that could have been abused to facilitate a local denial-of-service attack.
  (bsc#1135966)

- CVE-2019-0155: A privilege escalation vulnerability has been fixed in the
  i915 module that allowed batch buffers from user mode to gain super user
  privileges. (bsc#1135967)

The following non-security bugs were fixed:

- array_index_nospec: Sanitize speculative array (bsc#1155671)
- bonding/802.3ad: fix link_failure_count tracking (bsc#1141013).
- bonding/802.3ad: fix slave link initialization transition states (bsc#1141013).
- bonding: correctly update link status during mii-commit phase (bsc#1141013).
- bonding: fix active-backup transition (bsc#1141013).
- bonding: make speed, duplex setting consistent with link state (bsc#1141013).
- bonding: ratelimit failed speed/duplex update warning (bsc#1141013).
- bonding: require speed/duplex only for 802.3ad, alb and tlb (bsc#1141013).
- bonding: set default miimon value for non-arp modes if not set (bsc#1141013).
- bonding: speed/duplex update at NETDEV_UP event (bsc#1141013).
- cifs: fix panic in smb2_reconnect (bsc#1142458).
- cifs: handle netapp error codes (bsc#1136261).
- cpu/speculation: Uninline and export CPU mitigations helpers (bnc#1117665).
- ib/core, ipoib: Do not overreact to SM LID change event (bsc#1154103)
- ib/core: Add mitigation for Spectre V1 (bsc#1155671)
- ixgbe: sync the first fragment unconditionally (bsc#1133140).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: lapic: cap __delay at lapic_timer_advance_ns (bsc#1149083).
- kvm: mmu: drop vcpu param in gpte_access (bsc#1117665).
- kvm: mmu: introduce kvm_mmu_gfn_{allow,disallow}_lpage (bsc#1117665).
- kvm: mmu: rename has_wrprotected_page to mmu_gfn_lpage_is_disallowed (bsc#1117665).
- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- kvm: x86: MMU: Consolidate quickly_check_mmio_pf() and is_mmio_page_fault() (bsc#1117665).
- kvm: x86: MMU: Encapsulate the type of rmap-chain head in a new struct (bsc#1117665).
- kvm: x86: MMU: Move handle_mmio_page_fault() call to kvm_mmu_page_fault() (bsc#1117665).
- kvm: x86: MMU: Move initialization of parent_ptes out from kvm_mmu_alloc_page() (bsc#1117665).
- kvm: x86: MMU: Move parent_pte handling from kvm_mmu_get_page() to link_shadow_page() (bsc#1117665).
- kvm: x86: MMU: Remove unused parameter parent_pte from kvm_mmu_get_page() (bsc#1117665).
- kvm: x86: MMU: always set accessed bit in shadow PTEs (bsc#1117665).
- kvm: x86: Reduce the overhead when lapic_timer_advance is disabled (bsc#1149083).
- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- kvm: x86: extend usage of RET_MMIO_PF_* constants (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT (bnc#1117665).
- kvm: x86: move nsec_to_cycles from x86.c to x86.h (bsc#1149083).
- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- kvm: x86: simplify ept_misconfig (bsc#1117665).
- media: smsusb: better handle optional alignment (bsc#1146413).
- pci: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).
- powerpc/64s: support nospectre_v2 cmdline option (bsc#1131107).
- powerpc/pseries: correctly track irq state in default idle (bsc#1150727 bsc#1150942 ltc#178925 ltc#181484).
- powerpc/rtas: use device model APIs and serialization during LPM (bsc#1144123 ltc#178840).
- powerpc/security: Show powerpc_security_features in debugfs (bsc#1131107).
- scsi: scsi_transport_fc: Drop double list_del() (bsc#1084878) During the backport of 260f4aeddb48 ('scsi: scsi_transport_fc: return -EBUSY for deleted vport') an additional list_del() was introduced. The list entry will be freed in fc_vport_terminate(). Do not free it premature in fc_remove_host().
- swiotlb: Add support for DMA_ATTR_SKIP_CPU_SYNC in Xen-swiotlb unmap path (bsc#1133140).
- vmci: Release resource if the work is already queued (bsc#1051510).
- x86/cpu: Add Atom Tremont (Jacobsville) (bsc#1117665).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084878">SUSE bug 1084878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117665">SUSE bug 1117665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133140">SUSE bug 1133140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135966">SUSE bug 1135966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135967">SUSE bug 1135967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136261">SUSE bug 1136261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137865">SUSE bug 1137865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140671">SUSE bug 1140671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141013">SUSE bug 1141013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141054">SUSE bug 1141054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142458">SUSE bug 1142458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143187">SUSE bug 1143187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144123">SUSE bug 1144123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145477">SUSE bug 1145477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146042">SUSE bug 1146042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146163">SUSE bug 1146163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146285">SUSE bug 1146285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146361">SUSE bug 1146361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146378">SUSE bug 1146378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146391">SUSE bug 1146391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146413">SUSE bug 1146413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146425">SUSE bug 1146425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146512">SUSE bug 1146512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146514">SUSE bug 1146514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146516">SUSE bug 1146516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146524">SUSE bug 1146524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146526">SUSE bug 1146526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146529">SUSE bug 1146529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146540">SUSE bug 1146540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146543">SUSE bug 1146543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146547">SUSE bug 1146547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146550">SUSE bug 1146550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146584">SUSE bug 1146584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146589">SUSE bug 1146589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147022">SUSE bug 1147022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147122">SUSE bug 1147122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148394">SUSE bug 1148394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148938">SUSE bug 1148938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149083">SUSE bug 1149083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149376">SUSE bug 1149376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149522">SUSE bug 1149522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149527">SUSE bug 1149527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149555">SUSE bug 1149555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149612">SUSE bug 1149612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150025">SUSE bug 1150025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150112">SUSE bug 1150112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150452">SUSE bug 1150452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150457">SUSE bug 1150457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150465">SUSE bug 1150465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150727">SUSE bug 1150727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150942">SUSE bug 1150942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151347">SUSE bug 1151347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151350">SUSE bug 1151350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152685">SUSE bug 1152685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152782">SUSE bug 1152782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152788">SUSE bug 1152788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153263">SUSE bug 1153263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154103">SUSE bug 1154103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154372">SUSE bug 1154372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155131">SUSE bug 1155131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155671">SUSE bug 1155671</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10906/">CVE-2016-10906 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10906">CVE-2016-10906 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18509/">CVE-2017-18509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18509">CVE-2017-18509 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18551">CVE-2017-18551 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18595/">CVE-2017-18595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18595">CVE-2017-18595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20976/">CVE-2018-20976 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20976">CVE-2018-20976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0154">CVE-2019-0154 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0155">CVE-2019-0155 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13272">CVE-2019-13272 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14814">CVE-2019-14814 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14815">CVE-2019-14815 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14816">CVE-2019-14816 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14821">CVE-2019-14821 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15098">CVE-2019-15098 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15211/">CVE-2019-15211 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15211">CVE-2019-15211 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15212/">CVE-2019-15212 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15212">CVE-2019-15212 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15214/">CVE-2019-15214 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15214">CVE-2019-15214 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15215/">CVE-2019-15215 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15215">CVE-2019-15215 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15216/">CVE-2019-15216 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15216">CVE-2019-15216 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15217">CVE-2019-15217 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15218/">CVE-2019-15218 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15218">CVE-2019-15218 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15219/">CVE-2019-15219 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15219">CVE-2019-15219 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15220/">CVE-2019-15220 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15220">CVE-2019-15220 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15221/">CVE-2019-15221 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15221">CVE-2019-15221 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15239">CVE-2019-15239 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15290">CVE-2019-15290 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15291">CVE-2019-15291 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15505/">CVE-2019-15505 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15505">CVE-2019-15505 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15666">CVE-2019-15666 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15807/">CVE-2019-15807 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15807">CVE-2019-15807 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15902/">CVE-2019-15902 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15902">CVE-2019-15902 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15924/">CVE-2019-15924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15924">CVE-2019-15924 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15926/">CVE-2019-15926 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15926">CVE-2019-15926 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15927/">CVE-2019-15927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15927">CVE-2019-15927 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16232">CVE-2019-16232 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16233">CVE-2019-16233 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16234">CVE-2019-16234 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16413/">CVE-2019-16413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-16413">CVE-2019-16413 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16995/">CVE-2019-16995 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16995">CVE-2019-16995 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17055">CVE-2019-17055 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17056/">CVE-2019-17056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-17056">CVE-2019-17056 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17666">CVE-2019-17666 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9456/">CVE-2019-9456 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9456">CVE-2019-9456 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9506/">CVE-2019-9506 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9506">CVE-2019-9506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554432" comment="kernel-default-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554433" comment="kernel-default-base-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554434" comment="kernel-default-devel-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538348" comment="kernel-default-kgraft-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554435" comment="kernel-default-man-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538349" comment="kernel-devel-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538350" comment="kernel-macros-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538351" comment="kernel-source-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554436" comment="kernel-syms-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538353" comment="kgraft-patch-4_4_180-94_107-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149901" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2959-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to 20191112 security release (bsc#1155988)
  - Processor             Identifier     Version       Products
  - Model        Stepping F-MO-S/PI      Old-&gt;New
  - ---- new platforms ----------------------------------------
  - CML-U62      A0       6-a6-0/80           000000c6 Core Gen10 Mobile
  - CNL-U        D0       6-66-3/80           0000002a Core Gen8 Mobile
  - SKX-SP       B1       6-55-3/97           01000150 Xeon Scalable
  - ICL U/Y      D1       6-7e-5/80           00000046 Core Gen10 Mobile
  - ---- updated platforms ------------------------------------
  - SKL U/Y      D0       6-4e-3/c0 000000cc-&gt;000000d4 Core Gen6 Mobile
  - SKL H/S/E3   R0/N0    6-5e-3/36 000000cc-&gt;000000d4 Core Gen6
  - AML-Y22      H0       6-8e-9/10 000000b4-&gt;000000c6 Core Gen8 Mobile
  - KBL-U/Y      H0       6-8e-9/c0 000000b4-&gt;000000c6 Core Gen7 Mobile
  - CFL-U43e     D0       6-8e-a/c0 000000b4-&gt;000000c6 Core Gen8 Mobile
  - WHL-U        W0       6-8e-b/d0 000000b8-&gt;000000c6 Core Gen8 Mobile
  - AML-Y        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - CML-U42      V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - WHL-U        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen8 Mobile
  - KBL-G/X      H0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7/Gen8
  - KBL-H/S/E3   B0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7; Xeon E3 v6
  - CFL-H/S/E3   U0       6-9e-a/22 000000b4-&gt;000000c6 Core Gen8 Desktop, Mobile, Xeon E
  - CFL-S        B0       6-9e-b/02 000000b4-&gt;000000c6 Core Gen8
  - CFL-H        R0       6-9e-d/22 000000b8-&gt;000000c6 Core Gen9 Mobile
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)

- requires coreutils for the %post script (bsc#1154043)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11139">CVE-2019-11139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522370" comment="ucode-intel-20191112-13.53.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149902" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1156402" ref_url="https://bugzilla.suse.com/1156402" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006137.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2019-2201: Several integer overflow issues and subsequent segfaults occurred in libjpeg-turbo,
  when attempting to compress or decompress gigapixel images. [bsc#1156402]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-14"/>
	<updated date="2019-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156402">SUSE bug 1156402</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2201">CVE-2019-2201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554437" comment="libjpeg-turbo-1.5.3-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554438" comment="libjpeg62-62.2.0-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548828" comment="libjpeg62-32bit-62.2.0-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554439" comment="libjpeg62-turbo-1.5.3-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554440" comment="libjpeg8-8.1.2-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548831" comment="libjpeg8-32bit-8.1.2-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554441" comment="libturbojpeg0-8.1.2-31.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149903" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1156275" ref_url="https://bugzilla.suse.com/1156275" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14869" ref_url="https://www.suse.com/security/cve/CVE-2019-14869/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006145.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issue:
	  
- CVE-2019-14869: Fixed a possible  dSAFER escape which could have allowed 
  an attacker to gain high privileges by a specially crafted Postscript 
  code (bsc#1156275).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156275">SUSE bug 1156275</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14869/">CVE-2019-14869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14869">CVE-2019-14869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554442" comment="ghostscript-9.27-23.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554443" comment="ghostscript-x11-9.27-23.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149904" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006148.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to 20191112 official security release (bsc#1155988)
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11139">CVE-2019-11139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522383" comment="ucode-intel-20191112a-13.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149905" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1155787" ref_url="https://bugzilla.suse.com/1155787" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006167.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2017-2518: Fixed a use-after-free vulnerability which could have 
  led to buffer overflow via a crafted SQL statement (bsc#1155787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155787">SUSE bug 1155787</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2518">CVE-2017-2518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554444" comment="libsqlite3-0-3.8.10.2-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548839" comment="libsqlite3-0-32bit-3.8.10.2-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554445" comment="sqlite3-3.8.10.2-9.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149906" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1146358" ref_url="https://bugzilla.suse.com/1146358" source="BUGZILLA"/>
		<reference ref_id="1146359" ref_url="https://bugzilla.suse.com/1146359" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006170.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2019-8675: Fixed a stack buffer overflow in libcups's asn1_get_type function(bsc#1146358). 
- CVE-2019-8696: Fixed a stack buffer overflow in libcups's asn1_get_packed function (bsc#1146359).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146359">SUSE bug 1146359</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8675">CVE-2019-8675 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8696">CVE-2019-8696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554446" comment="cups-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554447" comment="cups-client-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554448" comment="cups-libs-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548844" comment="cups-libs-32bit-1.7.5-20.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149907" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="1151839" ref_url="https://bugzilla.suse.com/1151839" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006180.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Security issue fixed:

- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).

Non-security issues fixed:

- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option (bsc#1144504).
- Increased the startup timeout of clamd to 5 minutes to cater for the grown virus database as a workaround until clamd has learned to talk to systemd to extend the timeout as long as needed (bsc#1151839).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151839">SUSE bug 1151839</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12625">CVE-2019-12625 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554449" comment="clamav-0.100.3-33.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149908" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1154328" ref_url="https://bugzilla.suse.com/1154328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3693" ref_url="https://www.suse.com/security/cve/CVE-2019-3693/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006186.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:
	  
- CVE-2019-3693: Fixed a local privilege escalation from wwwrun to root (bsc#1154328).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154328">SUSE bug 1154328</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3693/">CVE-2019-3693 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3693">CVE-2019-3693 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548846" comment="mailman-2.1.17-3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149909" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1152856" ref_url="https://bugzilla.suse.com/1152856" source="BUGZILLA"/>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2894" ref_url="https://www.suse.com/security/cve/CVE-2019-2894/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Security issues fixed (October 2019 CPU  bsc#1154212):	  

- CVE-2019-2933: Windows file handling redux
- CVE-2019-2945: Better socket support
- CVE-2019-2949: Better Kerberos ccache handling
- CVE-2019-2958: Build Better Processes
- CVE-2019-2964: Better support for patterns
- CVE-2019-2962: Better Glyph Images
- CVE-2019-2973: Better pattern compilation
- CVE-2019-2978: Improved handling of jar files
- CVE-2019-2981: Better Path supports
- CVE-2019-2983: Better serial attributes
- CVE-2019-2987: Better rendering of native glyphs
- CVE-2019-2988: Better Graphics2D drawing
- CVE-2019-2989: Improve TLS connection support
- CVE-2019-2992: Enhance font glyph mapping
- CVE-2019-2999: Commentary on Javadoc comments
- CVE-2019-2894: Enhance ECDSA operations (bsc#1152856).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-27"/>
	<updated date="2019-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152856">SUSE bug 1152856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2894/">CVE-2019-2894 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2894">CVE-2019-2894 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2949">CVE-2019-2949 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2958">CVE-2019-2958 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2987">CVE-2019-2987 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554450" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554451" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554452" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554453" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149910" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1123823" ref_url="https://bugzilla.suse.com/1123823" source="BUGZILLA"/>
		<reference ref_id="1123828" ref_url="https://bugzilla.suse.com/1123828" source="BUGZILLA"/>
		<reference ref_id="1123832" ref_url="https://bugzilla.suse.com/1123832" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20748" ref_url="https://www.suse.com/security/cve/CVE-2018-20748/" source="CVE"/>
		<reference ref_id="CVE-2018-20749" ref_url="https://www.suse.com/security/cve/CVE-2018-20749/" source="CVE"/>
		<reference ref_id="CVE-2018-20750" ref_url="https://www.suse.com/security/cve/CVE-2018-20750/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005100.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:
	  
Security issues fixed:

- CVE-2018-20749: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123828)
- CVE-2018-20750: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123832)
- CVE-2018-20748: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1123823)  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-09"/>
	<updated date="2019-02-09"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1123823">SUSE bug 1123823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123828">SUSE bug 1123828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123832">SUSE bug 1123832</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20748/">CVE-2018-20748 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20748">CVE-2018-20748 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20749/">CVE-2018-20749 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20749">CVE-2018-20749 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20750/">CVE-2018-20750 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20750">CVE-2018-20750 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554454" comment="libvncclient0-0.9.9-17.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554455" comment="libvncserver0-0.9.9-17.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149911" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006210.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:
	  
- CVE-2019-15961: Fixed a denial of service which might occur when 
  scanning a specially crafted email file as (bsc#1157763).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15961">CVE-2019-15961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554456" comment="clamav-0.100.3-33.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149912" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1093414" ref_url="https://bugzilla.suse.com/1093414" source="BUGZILLA"/>
		<reference ref_id="1150734" ref_url="https://bugzilla.suse.com/1150734" source="BUGZILLA"/>
		<reference ref_id="1157198" ref_url="https://bugzilla.suse.com/1157198" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3688" ref_url="https://www.suse.com/security/cve/CVE-2019-3688/" source="CVE"/>
		<reference ref_id="CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006211.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

- CVE-2019-3688: Changed wrong ownership in /usr/sbin/pinger to root:squid
  which could have allowed a squid user to gain persistence by changing the 
  binary (bsc#1093414).
- CVE-2019-3690: Fixed a privilege escalation through untrusted symbolic 
  links (bsc#1150734).
- Fixed a regression which caused segmentation fault (bsc#1157198).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1093414">SUSE bug 1093414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150734">SUSE bug 1150734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157198">SUSE bug 1157198</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3688/">CVE-2019-3688 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3688">CVE-2019-3688 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3690">CVE-2019-3690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554457" comment="permissions-2015.09.28.1626-17.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149913" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156317" ref_url="https://bugzilla.suse.com/1156317" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1156331" ref_url="https://bugzilla.suse.com/1156331" source="BUGZILLA"/>
		<reference ref_id="1157770" ref_url="https://bugzilla.suse.com/1157770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006229.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_97 fixes several issues.

The following security issues were fixed:

- CVE-2018-20856: Fixed a use-after-free in __blk_drain_queue() due to an improper error handling (bsc#1156331).
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2019-15239: Fixed a vulnerability where a local attacker could have triggered multiple use-after-free conditions resulted in privilege escalation (bsc#1156317).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).

The following bugs were fixed:

- Fixed boot up hang revealed by int3 self test (bsc#1157770).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-10"/>
	<updated date="2019-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156317">SUSE bug 1156317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157770">SUSE bug 1157770</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20856">CVE-2018-20856 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13272">CVE-2019-13272 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15239">CVE-2019-15239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721153" comment="kernel-default 4.4.180-94.97 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719420" comment="kgraft-patch-4_4_180-94_97-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538354" comment="kgraft-patch-4_4_180-94_97-default-6-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149914" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156317" ref_url="https://bugzilla.suse.com/1156317" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1156331" ref_url="https://bugzilla.suse.com/1156331" source="BUGZILLA"/>
		<reference ref_id="1157770" ref_url="https://bugzilla.suse.com/1157770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006229.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_100 fixes several issues.

The following security issues were fixed:

- CVE-2018-20856: Fixed a use-after-free in __blk_drain_queue() due to an improper error handling (bsc#1156331).
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2019-15239: Fixed a vulnerability where a local attacker could have triggered multiple use-after-free conditions resulted in privilege escalation (bsc#1156317).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).

The following bugs were fixed:

- Fixed boot up hang revealed by int3 self test (bsc#1157770).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-10"/>
	<updated date="2019-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156317">SUSE bug 1156317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157770">SUSE bug 1157770</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20856">CVE-2018-20856 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13272">CVE-2019-13272 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15239">CVE-2019-15239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721278" comment="kernel-default 4.4.180-94.100 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719604" comment="kgraft-patch-4_4_180-94_100-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538355" comment="kgraft-patch-4_4_180-94_100-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149915" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156317" ref_url="https://bugzilla.suse.com/1156317" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1157770" ref_url="https://bugzilla.suse.com/1157770" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006235.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_103 fixes several issues.

The following security issues were fixed:

- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2019-15239: Fixed a vulnerability where a local attacker could have triggered multiple use-after-free conditions resulted in privilege escalation (bsc#1156317).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).

The following bugs were fixed:

- Fixed boot up hang revealed by int3 self test (bsc#1157770).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-10"/>
	<updated date="2019-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156317">SUSE bug 1156317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157770">SUSE bug 1157770</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13272">CVE-2019-13272 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15239">CVE-2019-15239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721277" comment="kernel-default 4.4.180-94.103 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719602" comment="kgraft-patch-4_4_180-94_103-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538356" comment="kgraft-patch-4_4_180-94_103-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149916" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156317" ref_url="https://bugzilla.suse.com/1156317" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1156331" ref_url="https://bugzilla.suse.com/1156331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006244.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.175-94_79 fixes several issues.

The following security issues were fixed:

- CVE-2018-20856: Fixed a use-after-free in block/blk-core.c due to improper error handling (bsc#1156331).
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging
  certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2019-15239: Fixed a vulnerability where a local attacker could have triggered multiple use-after-free conditions 
  resulted in privilege escalation (bsc#1156317).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156317">SUSE bug 1156317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20856">CVE-2018-20856 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13272">CVE-2019-13272 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15239">CVE-2019-15239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721151" comment="kernel-default 4.4.175-94.79 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719418" comment="kgraft-patch-4_4_175-94_79-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538357" comment="kgraft-patch-4_4_175-94_79-default-7-2.5 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149917" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156317" ref_url="https://bugzilla.suse.com/1156317" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1156331" ref_url="https://bugzilla.suse.com/1156331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006244.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.176-94_88 fixes several issues.

The following security issues were fixed:

- CVE-2018-20856: Fixed a use-after-free in block/blk-core.c due to improper error handling (bsc#1156331).
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging
  certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2019-15239: Fixed a vulnerability where a local attacker could have triggered multiple use-after-free conditions 
  resulted in privilege escalation (bsc#1156317).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156317">SUSE bug 1156317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20856">CVE-2018-20856 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13272">CVE-2019-13272 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15239">CVE-2019-15239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721148" comment="kernel-default 4.4.176-94.88 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719415" comment="kgraft-patch-4_4_176-94_88-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538358" comment="kgraft-patch-4_4_176-94_88-default-6-2.5 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149918" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156317" ref_url="https://bugzilla.suse.com/1156317" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1156331" ref_url="https://bugzilla.suse.com/1156331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006244.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.178-94_91 fixes several issues.

The following security issues were fixed:

- CVE-2018-20856: Fixed a use-after-free in block/blk-core.c due to improper error handling (bsc#1156331).
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging
  certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2019-15239: Fixed a vulnerability where a local attacker could have triggered multiple use-after-free conditions 
  resulted in privilege escalation (bsc#1156317).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156317">SUSE bug 1156317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20856">CVE-2018-20856 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13272">CVE-2019-13272 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15239">CVE-2019-15239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721150" comment="kernel-default 4.4.178-94.91 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719417" comment="kgraft-patch-4_4_178-94_91-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538359" comment="kgraft-patch-4_4_178-94_91-default-6-2.5 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149919" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1009254" ref_url="https://bugzilla.suse.com/1009254" source="BUGZILLA"/>
		<reference ref_id="1071853" ref_url="https://bugzilla.suse.com/1071853" source="BUGZILLA"/>
		<reference ref_id="1093536" ref_url="https://bugzilla.suse.com/1093536" source="BUGZILLA"/>
		<reference ref_id="1094462" ref_url="https://bugzilla.suse.com/1094462" source="BUGZILLA"/>
		<reference ref_id="1107874" ref_url="https://bugzilla.suse.com/1107874" source="BUGZILLA"/>
		<reference ref_id="1109845" ref_url="https://bugzilla.suse.com/1109845" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10811" ref_url="https://www.suse.com/security/cve/CVE-2018-10811/" source="CVE"/>
		<reference ref_id="CVE-2018-16151" ref_url="https://www.suse.com/security/cve/CVE-2018-16151/" source="CVE"/>
		<reference ref_id="CVE-2018-16152" ref_url="https://www.suse.com/security/cve/CVE-2018-16152/" source="CVE"/>
		<reference ref_id="CVE-2018-17540" ref_url="https://www.suse.com/security/cve/CVE-2018-17540/" source="CVE"/>
		<reference ref_id="CVE-2018-5388" ref_url="https://www.suse.com/security/cve/CVE-2018-5388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006239.html" source="SUSE-SU"/>
		<description>
This update for strongswan provides the following fixes:
	  
Security issues fixed: 

- CVE-2018-5388: Fixed a buffer underflow which may allow to a remote attacker 
  with local user credentials to resource exhaustion and denial of service while 
  reading from the socket (bsc#1094462).
- CVE-2018-10811: Fixed a denial of service during  the IKEv2 key derivation if 
  the openssl plugin is used in FIPS mode and HMAC-MD5 is negotiated as PRF 
  (bsc#1093536).
- CVE-2018-16151,CVE-2018-16152: Fixed multiple flaws in the gmp plugin which 
  might lead to authorization bypass (bsc#1107874).
- CVE-2018-17540: Fixed an improper input validation in gmp plugin (bsc#1109845).  

Other issues addressed:

- Fixed some client fails when the scep server URL is used with HTTPS protocol (bsc#1071853).
- Reject Diffie-Hellman key exchanges using primes smaller than 1024 bit.
- Handle unexpected informational message from SonicWall. (bsc#1009254)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009254">SUSE bug 1009254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071853">SUSE bug 1071853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093536">SUSE bug 1093536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094462">SUSE bug 1094462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109845">SUSE bug 1109845</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10811/">CVE-2018-10811 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10811">CVE-2018-10811 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16151/">CVE-2018-16151 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16151">CVE-2018-16151 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16152/">CVE-2018-16152 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16152">CVE-2018-16152 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17540/">CVE-2018-17540 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17540">CVE-2018-17540 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5388/">CVE-2018-5388 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5388">CVE-2018-5388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554458" comment="strongswan-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554459" comment="strongswan-hmac-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554460" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554461" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149920" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1152497" ref_url="https://bugzilla.suse.com/1152497" source="BUGZILLA"/>
		<reference ref_id="1154448" ref_url="https://bugzilla.suse.com/1154448" source="BUGZILLA"/>
		<reference ref_id="1154456" ref_url="https://bugzilla.suse.com/1154456" source="BUGZILLA"/>
		<reference ref_id="1154458" ref_url="https://bugzilla.suse.com/1154458" source="BUGZILLA"/>
		<reference ref_id="1154460" ref_url="https://bugzilla.suse.com/1154460" source="BUGZILLA"/>
		<reference ref_id="1154461" ref_url="https://bugzilla.suse.com/1154461" source="BUGZILLA"/>
		<reference ref_id="1154464" ref_url="https://bugzilla.suse.com/1154464" source="BUGZILLA"/>
		<reference ref_id="1155945" ref_url="https://bugzilla.suse.com/1155945" source="BUGZILLA"/>
		<reference ref_id="1157888" ref_url="https://bugzilla.suse.com/1157888" source="BUGZILLA"/>
		<reference ref_id="1158003" ref_url="https://bugzilla.suse.com/1158003" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1158007" ref_url="https://bugzilla.suse.com/1158007" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-18420" ref_url="https://www.suse.com/security/cve/CVE-2019-18420/" source="CVE"/>
		<reference ref_id="CVE-2019-18421" ref_url="https://www.suse.com/security/cve/CVE-2019-18421/" source="CVE"/>
		<reference ref_id="CVE-2019-18422" ref_url="https://www.suse.com/security/cve/CVE-2019-18422/" source="CVE"/>
		<reference ref_id="CVE-2019-18423" ref_url="https://www.suse.com/security/cve/CVE-2019-18423/" source="CVE"/>
		<reference ref_id="CVE-2019-18424" ref_url="https://www.suse.com/security/cve/CVE-2019-18424/" source="CVE"/>
		<reference ref_id="CVE-2019-18425" ref_url="https://www.suse.com/security/cve/CVE-2019-18425/" source="CVE"/>
		<reference ref_id="CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19581" ref_url="https://www.suse.com/security/cve/CVE-2019-19581/" source="CVE"/>
		<reference ref_id="CVE-2019-19582" ref_url="https://www.suse.com/security/cve/CVE-2019-19582/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2019-19581: Fixed a potential out of bounds on 32-bit Arm (bsc#1158003 XSA-307).
- CVE-2019-19582: Fixed a potential infinite loop when x86 accesses to bitmaps with 
  a compile time known size of 64 (bsc#1158003 XSA-307).
- CVE-2019-19583: Fixed improper checks which could have allowed HVM/PVH guest userspace 
  code to crash the guest,leading to a guest denial of service (bsc#1158004 XSA-308).
- CVE-2019-19578: Fixed an issue where a malicious or buggy PV guest could have caused
  hypervisor crash resulting in denial of service affecting the entire host (bsc#1158005 XSA-309).
- CVE-2019-19580: Fixed a privilege escalation where a malicious PV guest administrator 
  could have been able to escalate their privilege to that of the host (bsc#1158006 XSA-310).
- CVE-2019-19577: Fixed an issue where a malicious guest administrator could have caused Xen 
  to access data structures while they are being modified leading to a crash (bsc#1158007 XSA-311). 
- CVE-2019-19579: Fixed a privilege escaltion where an untrusted domain with access 
  to a physical device can DMA into host memory (bsc#1157888 XSA-306).
- CVE-2019-18420: Malicious x86 PV guests may have caused a hypervisor crash, 
  resulting in a denial of service (bsc#1154448 XSA-296)
- CVE-2019-18425: 32-bit PV guest user mode could elevate its privileges to that 
  of the guest kernel. (bsc#1154456 XSA-298).
- CVE-2019-18421: A malicious PV guest administrator may have been able to
  escalate their privilege to that of the host. (bsc#1154458 XSA-299).
- CVE-2019-18423: A malicious guest administrator may cause a hypervisor crash,
  resulting in a denial of service  (bsc#1154460 XSA-301).
- CVE-2019-18422: A malicious ARM guest might contrive to arrange for critical 
  Xen code to run with interrupts erroneously enabled. This could lead to data
  corruption, denial of service, or possibly even privilege escalation. However
  a precise attack technique has not been identified. (bsc#1154464 XSA-303)
- CVE-2019-18424: An untrusted domain with access to a physical device can DMA 
  into host memory, leading to privilege escalation. (bsc#1154461 XSA-302).  
- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
  condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
  Exception during Page Size Change, causing the CPU core to be non-functional.
  (bsc#1155945 XSA-304)  
- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
  Transactional Memory support could be used to facilitate sidechannel
  information leaks out of microarchitectural buffers, similar to the
  previously described 'Microarchitectural Data Sampling' attack. (bsc#1152497 XSA-305).  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-13"/>
	<updated date="2019-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152497">SUSE bug 1152497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154448">SUSE bug 1154448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154456">SUSE bug 1154456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154460">SUSE bug 1154460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154461">SUSE bug 1154461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154464">SUSE bug 1154464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155945">SUSE bug 1155945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18420/">CVE-2019-18420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18420">CVE-2019-18420 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18421/">CVE-2019-18421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18421">CVE-2019-18421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18422/">CVE-2019-18422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18422">CVE-2019-18422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18423/">CVE-2019-18423 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18423">CVE-2019-18423 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18424/">CVE-2019-18424 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18424">CVE-2019-18424 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18425/">CVE-2019-18425 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18425">CVE-2019-18425 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19577">CVE-2019-19577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19578">CVE-2019-19578 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19579">CVE-2019-19579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19580">CVE-2019-19580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19581/">CVE-2019-19581 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19581">CVE-2019-19581 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19582/">CVE-2019-19582 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19582">CVE-2019-19582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19583">CVE-2019-19583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538360" comment="xen-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538361" comment="xen-doc-html-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538362" comment="xen-libs-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538363" comment="xen-libs-32bit-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538364" comment="xen-tools-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538365" comment="xen-tools-domU-4.9.4_06-3.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149921" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1082023" ref_url="https://bugzilla.suse.com/1082023" source="BUGZILLA"/>
		<reference ref_id="1158785" ref_url="https://bugzilla.suse.com/1158785" source="BUGZILLA"/>
		<reference ref_id="1158787" ref_url="https://bugzilla.suse.com/1158787" source="BUGZILLA"/>
		<reference ref_id="1158788" ref_url="https://bugzilla.suse.com/1158788" source="BUGZILLA"/>
		<reference ref_id="1158789" ref_url="https://bugzilla.suse.com/1158789" source="BUGZILLA"/>
		<reference ref_id="1158790" ref_url="https://bugzilla.suse.com/1158790" source="BUGZILLA"/>
		<reference ref_id="1158791" ref_url="https://bugzilla.suse.com/1158791" source="BUGZILLA"/>
		<reference ref_id="1158792" ref_url="https://bugzilla.suse.com/1158792" source="BUGZILLA"/>
		<reference ref_id="1158793" ref_url="https://bugzilla.suse.com/1158793" source="BUGZILLA"/>
		<reference ref_id="1158795" ref_url="https://bugzilla.suse.com/1158795" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1348" ref_url="https://www.suse.com/security/cve/CVE-2019-1348/" source="CVE"/>
		<reference ref_id="CVE-2019-1349" ref_url="https://www.suse.com/security/cve/CVE-2019-1349/" source="CVE"/>
		<reference ref_id="CVE-2019-1350" ref_url="https://www.suse.com/security/cve/CVE-2019-1350/" source="CVE"/>
		<reference ref_id="CVE-2019-1351" ref_url="https://www.suse.com/security/cve/CVE-2019-1351/" source="CVE"/>
		<reference ref_id="CVE-2019-1352" ref_url="https://www.suse.com/security/cve/CVE-2019-1352/" source="CVE"/>
		<reference ref_id="CVE-2019-1353" ref_url="https://www.suse.com/security/cve/CVE-2019-1353/" source="CVE"/>
		<reference ref_id="CVE-2019-1354" ref_url="https://www.suse.com/security/cve/CVE-2019-1354/" source="CVE"/>
		<reference ref_id="CVE-2019-1387" ref_url="https://www.suse.com/security/cve/CVE-2019-1387/" source="CVE"/>
		<reference ref_id="CVE-2019-19604" ref_url="https://www.suse.com/security/cve/CVE-2019-19604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

Security issues fixed:

- CVE-2019-1349: Fixed issue on Windows, when submodules are cloned recursively, under certain circumstances Git could be fooled into using the same Git directory twice (bsc#1158787).
- CVE-2019-19604: Fixed a recursive clone followed by a submodule update could execute code contained within the repository without the user explicitly having asked for that (bsc#1158795).
- CVE-2019-1387: Fixed recursive clones that are currently affected by a vulnerability that is caused by too-lax validation of submodule names, allowing very targeted attacks via remote code execution in recursive clones (bsc#1158793).
- CVE-2019-1354: Fixed issue on Windows that refuses to write tracked files with filenames that contain backslashes (bsc#1158792).
- CVE-2019-1353: Fixed issue when run in the Windows Subsystem for Linux while accessing a working directory on a regular Windows drive, none of the NTFS protections were active (bsc#1158791).
- CVE-2019-1352: Fixed issue on Windows was unaware of NTFS Alternate Data Streams (bsc#1158790).
- CVE-2019-1351: Fixed issue on Windows mistakes drive letters outside of the US-English alphabet as relative paths (bsc#1158789).
- CVE-2019-1350: Fixed incorrect quoting of command-line arguments allowed remote code execution during a recursive clone in conjunction with SSH URLs (bsc#1158788).
- CVE-2019-1348: Fixed the --export-marks option of fast-import is exposed also via  the in-stream command feature export-marks=... and it allows overwriting arbitrary paths (bsc#1158785).
- Fixed an issue where git send-email fails to authenticate with SMTP server (bsc#1082023)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-16"/>
	<updated date="2019-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082023">SUSE bug 1082023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158787">SUSE bug 1158787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158788">SUSE bug 1158788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158789">SUSE bug 1158789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158790">SUSE bug 1158790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158791">SUSE bug 1158791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158792">SUSE bug 1158792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158793">SUSE bug 1158793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158795">SUSE bug 1158795</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-1348/">CVE-2019-1348 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1348">CVE-2019-1348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1349/">CVE-2019-1349 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1349">CVE-2019-1349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1350/">CVE-2019-1350 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1350">CVE-2019-1350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1351/">CVE-2019-1351 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1351">CVE-2019-1351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1352/">CVE-2019-1352 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1352">CVE-2019-1352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1353/">CVE-2019-1353 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1353">CVE-2019-1353 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1354/">CVE-2019-1354 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1354">CVE-2019-1354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1387/">CVE-2019-1387 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1387">CVE-2019-1387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19604/">CVE-2019-19604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19604">CVE-2019-19604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542345" comment="git-core-2.12.3-27.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149922" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1158328" ref_url="https://bugzilla.suse.com/1158328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Mozilla Firefox was updated to 68.3esr (MFSA 2019-37 bsc#1158328)	  
	  
Security issues fixed: 

- CVE-2019-17008: Fixed a use-after-free in worker destruction (bmo#1546331)
- CVE-2019-13722: Fixed a stack corruption due to incorrect number of arguments 
  in WebRTC code (bmo#1580156)
- CVE-2019-11745: Fixed an out of bounds write in NSS when encrypting with a 
  block cipher (bmo#1586176)
- CVE-2019-17009: Fixed an issue where updater temporary files accessible to 
  unprivileged processes (bmo#1510494)
- CVE-2019-17010: Fixed a use-after-free when performing device orientation 
  checks (bmo#1581084)
- CVE-2019-17005: Fixed a buffer overflow in plain text serializer (bmo#1584170)
- CVE-2019-17011: Fixed a use-after-free when retrieving a document 
  in antitracking (bmo#1591334)
- CVE-2019-17012: Fixed multiple memmory issues
  (bmo#1449736, bmo#1533957, bmo#1560667,bmo#1567209, bmo#1580288, bmo#1585760, 
  bmo#1592502)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-19"/>
	<updated date="2019-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13722">CVE-2019-13722 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17005">CVE-2019-17005 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17008">CVE-2019-17008 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17009">CVE-2019-17009 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17010">CVE-2019-17010 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17011">CVE-2019-17011 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17012">CVE-2019-17012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554462" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554463" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149923" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1120374" ref_url="https://bugzilla.suse.com/1120374" source="BUGZILLA"/>
		<reference ref_id="1122983" ref_url="https://bugzilla.suse.com/1122983" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18500" ref_url="https://www.suse.com/security/cve/CVE-2018-18500/" source="CVE"/>
		<reference ref_id="CVE-2018-18501" ref_url="https://www.suse.com/security/cve/CVE-2018-18501/" source="CVE"/>
		<reference ref_id="CVE-2018-18505" ref_url="https://www.suse.com/security/cve/CVE-2018-18505/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005108.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

CVE-2018-18500: Fixed a use-after-free parsing HTML5 stream (boo#1122983).
CVE-2018-18501: Fixed multiple memory safety bugs (boo#1122983).
CVE-2018-18505: Fixed a privilege escalation through IPC channel messages (boo#1122983).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-12"/>
	<updated date="2019-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120374">SUSE bug 1120374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18500/">CVE-2018-18500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18500">CVE-2018-18500 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18501/">CVE-2018-18501 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18501">CVE-2018-18501 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18505/">CVE-2018-18505 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18505">CVE-2018-18505 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554464" comment="MozillaFirefox-60.5.0esr-109.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554465" comment="MozillaFirefox-branding-SLE-60-32.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554466" comment="MozillaFirefox-translations-common-60.5.0esr-109.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554467" comment="libfreebl3-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546575" comment="libfreebl3-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554468" comment="libfreebl3-hmac-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546577" comment="libfreebl3-hmac-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554469" comment="libsoftokn3-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546579" comment="libsoftokn3-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554470" comment="libsoftokn3-hmac-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546581" comment="libsoftokn3-hmac-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554471" comment="mozilla-nss-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546583" comment="mozilla-nss-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554472" comment="mozilla-nss-certs-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546585" comment="mozilla-nss-certs-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554473" comment="mozilla-nss-sysinit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546588" comment="mozilla-nss-sysinit-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554474" comment="mozilla-nss-tools-3.41.1-58.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149924" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1091041" ref_url="https://bugzilla.suse.com/1091041" source="BUGZILLA"/>
		<reference ref_id="1119461" ref_url="https://bugzilla.suse.com/1119461" source="BUGZILLA"/>
		<reference ref_id="1119465" ref_url="https://bugzilla.suse.com/1119465" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1138190" ref_url="https://bugzilla.suse.com/1138190" source="BUGZILLA"/>
		<reference ref_id="1146544" ref_url="https://bugzilla.suse.com/1146544" source="BUGZILLA"/>
		<reference ref_id="1146612" ref_url="https://bugzilla.suse.com/1146612" source="BUGZILLA"/>
		<reference ref_id="1150466" ref_url="https://bugzilla.suse.com/1150466" source="BUGZILLA"/>
		<reference ref_id="1150483" ref_url="https://bugzilla.suse.com/1150483" source="BUGZILLA"/>
		<reference ref_id="1152631" ref_url="https://bugzilla.suse.com/1152631" source="BUGZILLA"/>
		<reference ref_id="1153811" ref_url="https://bugzilla.suse.com/1153811" source="BUGZILLA"/>
		<reference ref_id="1154905" ref_url="https://bugzilla.suse.com/1154905" source="BUGZILLA"/>
		<reference ref_id="1155689" ref_url="https://bugzilla.suse.com/1155689" source="BUGZILLA"/>
		<reference ref_id="1155897" ref_url="https://bugzilla.suse.com/1155897" source="BUGZILLA"/>
		<reference ref_id="1155898" ref_url="https://bugzilla.suse.com/1155898" source="BUGZILLA"/>
		<reference ref_id="1156187" ref_url="https://bugzilla.suse.com/1156187" source="BUGZILLA"/>
		<reference ref_id="1157038" ref_url="https://bugzilla.suse.com/1157038" source="BUGZILLA"/>
		<reference ref_id="1157042" ref_url="https://bugzilla.suse.com/1157042" source="BUGZILLA"/>
		<reference ref_id="1157070" ref_url="https://bugzilla.suse.com/1157070" source="BUGZILLA"/>
		<reference ref_id="1157143" ref_url="https://bugzilla.suse.com/1157143" source="BUGZILLA"/>
		<reference ref_id="1157158" ref_url="https://bugzilla.suse.com/1157158" source="BUGZILLA"/>
		<reference ref_id="1157191" ref_url="https://bugzilla.suse.com/1157191" source="BUGZILLA"/>
		<reference ref_id="1157324" ref_url="https://bugzilla.suse.com/1157324" source="BUGZILLA"/>
		<reference ref_id="1157333" ref_url="https://bugzilla.suse.com/1157333" source="BUGZILLA"/>
		<reference ref_id="1157464" ref_url="https://bugzilla.suse.com/1157464" source="BUGZILLA"/>
		<reference ref_id="1158132" ref_url="https://bugzilla.suse.com/1158132" source="BUGZILLA"/>
		<reference ref_id="1158394" ref_url="https://bugzilla.suse.com/1158394" source="BUGZILLA"/>
		<reference ref_id="1158398" ref_url="https://bugzilla.suse.com/1158398" source="BUGZILLA"/>
		<reference ref_id="1158410" ref_url="https://bugzilla.suse.com/1158410" source="BUGZILLA"/>
		<reference ref_id="1158413" ref_url="https://bugzilla.suse.com/1158413" source="BUGZILLA"/>
		<reference ref_id="1158417" ref_url="https://bugzilla.suse.com/1158417" source="BUGZILLA"/>
		<reference ref_id="1158445" ref_url="https://bugzilla.suse.com/1158445" source="BUGZILLA"/>
		<reference ref_id="1158823" ref_url="https://bugzilla.suse.com/1158823" source="BUGZILLA"/>
		<reference ref_id="1158824" ref_url="https://bugzilla.suse.com/1158824" source="BUGZILLA"/>
		<reference ref_id="1158827" ref_url="https://bugzilla.suse.com/1158827" source="BUGZILLA"/>
		<reference ref_id="1158834" ref_url="https://bugzilla.suse.com/1158834" source="BUGZILLA"/>
		<reference ref_id="1158900" ref_url="https://bugzilla.suse.com/1158900" source="BUGZILLA"/>
		<reference ref_id="1158903" ref_url="https://bugzilla.suse.com/1158903" source="BUGZILLA"/>
		<reference ref_id="1158904" ref_url="https://bugzilla.suse.com/1158904" source="BUGZILLA"/>
		<reference ref_id="1158954" ref_url="https://bugzilla.suse.com/1158954" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-15213" ref_url="https://www.suse.com/security/cve/CVE-2019-15213/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18680" ref_url="https://www.suse.com/security/cve/CVE-2019-18680/" source="CVE"/>
		<reference ref_id="CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683/" source="CVE"/>
		<reference ref_id="CVE-2019-18805" ref_url="https://www.suse.com/security/cve/CVE-2019-18805/" source="CVE"/>
		<reference ref_id="CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19065" ref_url="https://www.suse.com/security/cve/CVE-2019-19065/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19338" ref_url="https://www.suse.com/security/cve/CVE-2019-19338/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525/" source="CVE"/>
		<reference ref_id="CVE-2019-19527" ref_url="https://www.suse.com/security/cve/CVE-2019-19527/" source="CVE"/>
		<reference ref_id="CVE-2019-19530" ref_url="https://www.suse.com/security/cve/CVE-2019-19530/" source="CVE"/>
		<reference ref_id="CVE-2019-19531" ref_url="https://www.suse.com/security/cve/CVE-2019-19531/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533/" source="CVE"/>
		<reference ref_id="CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534/" source="CVE"/>
		<reference ref_id="CVE-2019-19535" ref_url="https://www.suse.com/security/cve/CVE-2019-19535/" source="CVE"/>
		<reference ref_id="CVE-2019-19536" ref_url="https://www.suse.com/security/cve/CVE-2019-19536/" source="CVE"/>
		<reference ref_id="CVE-2019-19537" ref_url="https://www.suse.com/security/cve/CVE-2019-19537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP 3 LTSS kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2019-14895: A heap-based buffer overflow was discovered in the Linux kernel in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could have allowed the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).
- CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038).
- CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid in the Linux kernel. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free (bnc#1155897).
- CVE-2019-19062: A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333).
- CVE-2019-19065: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures (bnc#1157191).
- CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324).
- CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157143).
- CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function (bnc#1157070).
- CVE-2019-16231: drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150466).
- CVE-2019-18805: An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel There was a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact (bnc#1156187).
- CVE-2019-18680: An issue was discovered in the Linux kernel. There was a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c that will cause denial of service (bnc#1155898).
- CVE-2019-15213: An use-after-free was fixed caused by malicious USB device in drivers/media/usb/dvb-usb/dvb-usb-init.c (bsc#1146544).
- CVE-2019-19536: An uninitialized Kernel memory can leak to USB devices in drivers/net/can/usb/peak_usb/pcan_usb_pro.c (bsc#1158394).
- CVE-2019-19534: An uninitialized Kernel memory can leak to USB devices in drivers/net/can/usb/peak_usb/pcan_usb_core.c (bsc#1158398).
- CVE-2019-19530: An use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver (bsc#1158410).
- CVE-2019-19524: An use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver (bsc#1158413).
- CVE-2019-19525: An use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver (bsc#1158417).
- CVE-2019-19531: An use-after-free in yurex_delete may lead to denial of service (bsc#1158445).
- CVE-2019-19523: An use-after-free on disconnect in USB adutux (bsc#1158823).
- CVE-2019-19532: An out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers (bsc#1158824).
- CVE-2019-19332: An out-of-bounds memory write via kvm_dev_ioctl_get_cpuid (bsc#1158827).
- CVE-2019-19533: An info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver (bsc#1158834).
- CVE-2019-19527: An use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (bsc#1158900).
- CVE-2019-19535: An info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver (bsc#1158903).
- CVE-2019-19537: Two races in the USB character device registration and deregistration routines (bsc#1158904).
- CVE-2019-19338: An incomplete fix for Transaction Asynchronous Abort (TAA) (bsc#1158954).


The following non-security bugs were fixed:

- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).
- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).
- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).
- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).
- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).
- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).
- sched/fair: WARN() and refuse to set buddy when !se-&gt;on_rq (bsc#1158132).
- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).
- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).
- xen/pv: Fix a boot up hang revealed by int3 self test (bsc#1153811).
- arp: Fix cache issue during Life Partition Migration (bsc#1152631).
- futexes: Fix speed on 4.12 kernel (bsc#1157464).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-21"/>
	<updated date="2019-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1091041">SUSE bug 1091041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119461">SUSE bug 1119461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119465">SUSE bug 1119465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138190">SUSE bug 1138190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146544">SUSE bug 1146544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146612">SUSE bug 1146612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150466">SUSE bug 1150466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150483">SUSE bug 1150483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152631">SUSE bug 1152631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153811">SUSE bug 1153811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154905">SUSE bug 1154905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155689">SUSE bug 1155689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155897">SUSE bug 1155897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155898">SUSE bug 1155898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156187">SUSE bug 1156187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157038">SUSE bug 1157038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157042">SUSE bug 1157042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157070">SUSE bug 1157070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157143">SUSE bug 1157143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157158">SUSE bug 1157158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157191">SUSE bug 1157191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157324">SUSE bug 1157324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157333">SUSE bug 1157333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157464">SUSE bug 1157464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158132">SUSE bug 1158132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158394">SUSE bug 1158394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158398">SUSE bug 1158398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158410">SUSE bug 1158410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158413">SUSE bug 1158413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158417">SUSE bug 1158417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158445">SUSE bug 1158445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158823">SUSE bug 1158823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158824">SUSE bug 1158824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158827">SUSE bug 1158827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158900">SUSE bug 1158900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158903">SUSE bug 1158903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158904">SUSE bug 1158904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158954">SUSE bug 1158954</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14895">CVE-2019-14895 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15213/">CVE-2019-15213 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15213">CVE-2019-15213 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16231">CVE-2019-16231 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18660">CVE-2019-18660 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18680/">CVE-2019-18680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18680">CVE-2019-18680 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18683">CVE-2019-18683 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18805/">CVE-2019-18805 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18805">CVE-2019-18805 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19052">CVE-2019-19052 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19062">CVE-2019-19062 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19065/">CVE-2019-19065 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19065">CVE-2019-19065 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19073">CVE-2019-19073 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19074">CVE-2019-19074 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19332">CVE-2019-19332 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19338/">CVE-2019-19338 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19338">CVE-2019-19338 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19523">CVE-2019-19523 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19524">CVE-2019-19524 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19525">CVE-2019-19525 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19527/">CVE-2019-19527 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19527">CVE-2019-19527 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19530/">CVE-2019-19530 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19530">CVE-2019-19530 at NVD</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19531/">CVE-2019-19531 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19531">CVE-2019-19531 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19532">CVE-2019-19532 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19533">CVE-2019-19533 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19534">CVE-2019-19534 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19535/">CVE-2019-19535 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19535">CVE-2019-19535 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19536/">CVE-2019-19536 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19536">CVE-2019-19536 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19537/">CVE-2019-19537 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19537">CVE-2019-19537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554475" comment="kernel-default-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554476" comment="kernel-default-base-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554477" comment="kernel-default-devel-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538369" comment="kernel-default-kgraft-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554478" comment="kernel-default-man-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538370" comment="kernel-devel-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538371" comment="kernel-macros-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538372" comment="kernel-source-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554479" comment="kernel-syms-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538374" comment="kgraft-patch-4_4_180-94_113-default-1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149925" version="1" class="patch">
	<metadata>
		<title>Security update for python-numpy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1122208" ref_url="https://bugzilla.suse.com/1122208" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005128.html" source="SUSE-SU"/>
		<description>
This update for python-numpy fixes the following issue:

Security issue fixed:

- CVE-2019-6446: Set allow_pickle to false by default to restrict loading untrusted content (bsc#1122208).
  With this update we decrease the possibility of allowing remote attackers to execute arbitrary code by
  misusing numpy.load(). A warning during runtime will show-up when the allow_pickle is not explicitly set.  

NOTE: By applying this update the behavior of python-numpy changes, which might break your application.
In order to get the old behaviour back, you have to explicitly set `allow_pickle` to True. Be aware
that this should only be done for trusted input, as loading untrusted input might lead to arbitrary code
execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-18"/>
	<updated date="2019-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122208">SUSE bug 1122208</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6446">CVE-2019-6446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554480" comment="python-numpy-1.8.0-5.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149926" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1111498" ref_url="https://bugzilla.suse.com/1111498" source="BUGZILLA"/>
		<reference ref_id="1117025" ref_url="https://bugzilla.suse.com/1117025" source="BUGZILLA"/>
		<reference ref_id="1117382" ref_url="https://bugzilla.suse.com/1117382" source="BUGZILLA"/>
		<reference ref_id="1120658" ref_url="https://bugzilla.suse.com/1120658" source="BUGZILLA"/>
		<reference ref_id="1122000" ref_url="https://bugzilla.suse.com/1122000" source="BUGZILLA"/>
		<reference ref_id="1122344" ref_url="https://bugzilla.suse.com/1122344" source="BUGZILLA"/>
		<reference ref_id="1123333" ref_url="https://bugzilla.suse.com/1123333" source="BUGZILLA"/>
		<reference ref_id="1123892" ref_url="https://bugzilla.suse.com/1123892" source="BUGZILLA"/>
		<reference ref_id="1125352" ref_url="https://bugzilla.suse.com/1125352" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005135.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

Security vulnerability fixed:

- CVE-2019-6454: Fixed a crash of PID1 by sending specially crafted D-BUS
  message on the system bus by an unprivileged user (bsc#1125352)

Other bug fixes and changes:

- journal-remote: set a limit on the number of fields in a message
- journal-remote: verify entry length from header
- journald: set a limit on the number of fields (1k)
- journald: do not store the iovec entry for process commandline on stack
- core: include Found state in device dumps
- device: fix serialization and deserialization of DeviceFound
- fix path in btrfs rule (#6844)
- assemble multidevice btrfs volumes without external tools (#6607) (bsc#1117025)
- Update systemd-system.conf.xml (bsc#1122000)
- units: inform user that the default target is started after exiting from rescue or emergency mode
- manager: don't skip sigchld handler for main and control pid for services (#3738)
- core: Add helper functions unit_{main, control}_pid
- manager: Fixing a debug printf formatting mistake (#3640)
- manager: Only invoke a single sigchld per unit within a cleanup cycle (bsc#1117382)
- core: update invoke_sigchld_event() to handle NULL -&gt;sigchld_event()
- sd-event: expose the event loop iteration counter via sd_event_get_iteration() (#3631)
- unit: rework a bit how we keep the service fdstore from being destroyed during service restart (bsc#1122344)
- core: when restarting services, don't close fds
- cryptsetup: Add dependency on loopback setup to generated units
- journal-gateway: use localStorage['cursor'] only when it has valid value
- journal-gateway: explicitly declare local variables
- analyze: actually select longest activated-time of services
- sd-bus: fix implicit downcast of bitfield reported by LGTM
- core: free lines after reading them (bsc#1123892)
- pam_systemd: reword message about not creating a session (bsc#1111498)
- pam_systemd: suppress LOG_DEBUG log messages if debugging is off (bsc#1111498)
- main: improve RLIMIT_NOFILE handling (#5795) (bsc#1120658)
- sd-bus: if we receive an invalid dbus message, ignore and proceeed
- automount: don't pass non-blocking pipe to kernel.
- units: make sure initrd-cleanup.service terminates before switching to rootfs (bsc#1123333)
- units: add Wants=initrd-cleanup.service to initrd-switch-root.target (#4345) (bsc#1123333)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-19"/>
	<updated date="2019-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111498">SUSE bug 1111498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117025">SUSE bug 1117025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117382">SUSE bug 1117382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120658">SUSE bug 1120658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122000">SUSE bug 1122000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122344">SUSE bug 1122344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123333">SUSE bug 1123333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123892">SUSE bug 1123892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125352">SUSE bug 1125352</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6454">CVE-2019-6454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554481" comment="libsystemd0-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551339" comment="libsystemd0-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554482" comment="libudev1-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551341" comment="libudev1-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554483" comment="systemd-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551343" comment="systemd-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521627" comment="systemd-bash-completion-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554484" comment="systemd-sysvinit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554485" comment="udev-228-150.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149927" version="1" class="patch">
	<metadata>
		<title>Security update for procps (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1092100" ref_url="https://bugzilla.suse.com/1092100" source="BUGZILLA"/>
		<reference ref_id="1121753" ref_url="https://bugzilla.suse.com/1121753" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<description>

  
This update for procps fixes the following security issues:

- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top
  with HOME unset in an attacker-controlled directory, the attacker could have
  achieved privilege escalation by exploiting one of several vulnerabilities in
  the config_file() function (bsc#1092100).
- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.
  Inbuilt protection in ps maped a guard page at the end of the overflowed
  buffer, ensuring that the impact of this flaw is limited to a crash (temporary
  denial of service) (bsc#1092100).
- CVE-2018-1124: Prevent multiple integer overflows leading to a heap
  corruption in file2strvec function. This allowed a privilege escalation for a
  local attacker who can create entries in procfs by starting processes, which
  could result in crashes or arbitrary code execution in proc utilities run by
  other users (bsc#1092100).
- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was
  mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent
  truncation/integer overflow issues (bsc#1092100).

(These issues were previously released for SUSE Linux Enterprise 12 SP3 and SP4.)

Also the following non-security issue was fixed:

- Fix CPU summary showing old data. (bsc#1121753)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-20"/>
	<updated date="2019-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121753">SUSE bug 1121753</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1122">CVE-2018-1122 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1123">CVE-2018-1123 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1124">CVE-2018-1124 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1125">CVE-2018-1125 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1126">CVE-2018-1126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554486" comment="libprocps3-3.3.9-11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554487" comment="procps-3.3.9-11.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149928" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1104301" ref_url="https://bugzilla.suse.com/1104301" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5383" ref_url="https://www.suse.com/security/cve/CVE-2018-5383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005145.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:
  
Security issue fixed:

- CVE-2018-5383: Fixed an implementation issue in Bluetooth where the eliptic curve parameters 
  were not sufficiently validated during Diffie-Hellman key exchange (bsc#1104301).
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-22"/>
	<updated date="2019-02-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104301">SUSE bug 1104301</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5383/">CVE-2018-5383 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5383">CVE-2018-5383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521632" comment="kernel-firmware-20170530-21.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521633" comment="ucode-amd-20170530-21.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149929" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1073748" ref_url="https://bugzilla.suse.com/1073748" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005150.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509 certificate parser (bsc#1122191).
- CVE-2018-14647: Fixed a denial-of-service vulnerability in Expat (bsc#1109847).

Non-security issue fixed:

- Fixed a bug where PyWeakReference struct was not initialized correctly leading to a crash (bsc#1073748).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-25"/>
	<updated date="2019-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073748">SUSE bug 1073748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554488" comment="libpython2_7-1_0-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548897" comment="libpython2_7-1_0-32bit-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554489" comment="python-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548899" comment="python-32bit-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554490" comment="python-base-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548901" comment="python-base-32bit-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554491" comment="python-curses-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554492" comment="python-demo-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530819" comment="python-doc-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530820" comment="python-doc-pdf-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554493" comment="python-gdbm-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554494" comment="python-idle-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554495" comment="python-tk-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554496" comment="python-xml-2.7.13-28.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149930" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1101644" ref_url="https://bugzilla.suse.com/1101644" source="BUGZILLA"/>
		<reference ref_id="1101645" ref_url="https://bugzilla.suse.com/1101645" source="BUGZILLA"/>
		<reference ref_id="1101651" ref_url="https://bugzilla.suse.com/1101651" source="BUGZILLA"/>
		<reference ref_id="1101656" ref_url="https://bugzilla.suse.com/1101656" source="BUGZILLA"/>
		<reference ref_id="1112142" ref_url="https://bugzilla.suse.com/1112142" source="BUGZILLA"/>
		<reference ref_id="1112143" ref_url="https://bugzilla.suse.com/1112143" source="BUGZILLA"/>
		<reference ref_id="1112144" ref_url="https://bugzilla.suse.com/1112144" source="BUGZILLA"/>
		<reference ref_id="1112146" ref_url="https://bugzilla.suse.com/1112146" source="BUGZILLA"/>
		<reference ref_id="1112147" ref_url="https://bugzilla.suse.com/1112147" source="BUGZILLA"/>
		<reference ref_id="1112152" ref_url="https://bugzilla.suse.com/1112152" source="BUGZILLA"/>
		<reference ref_id="1112153" ref_url="https://bugzilla.suse.com/1112153" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<reference ref_id="CVE-2018-2938" ref_url="https://www.suse.com/security/cve/CVE-2018-2938/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk to version 7u201 fixes the following issues:

Security issues fixed:

- CVE-2018-3136: Manifest better support (bsc#1112142)
- CVE-2018-3139: Better HTTP Redirection (bsc#1112143)
- CVE-2018-3149: Enhance JNDI lookups (bsc#1112144)
- CVE-2018-3169: Improve field accesses (bsc#1112146)
- CVE-2018-3180: Improve TLS connections stability (bsc#1112147)
- CVE-2018-3214: Better RIFF reading support (bsc#1112152)
- CVE-2018-13785: Upgrade JDK 8u to libpng 1.6.35 (bsc#1112153)
- CVE-2018-16435: heap-based buffer overflow in SetData function in cmsIT8LoadFromFile
- CVE-2018-2938: Support Derby connections (bsc#1101644)
- CVE-2018-2940: Better stack walking (bsc#1101645)
- CVE-2018-2952: Exception to Pattern Syntax (bsc#1101651)
- CVE-2018-2973: Improve LDAP support (bsc#1101656)
- CVE-2018-3639 cpu speculative store bypass mitigation
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-09"/>
	<updated date="2019-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101644">SUSE bug 1101644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101651">SUSE bug 1101651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112147">SUSE bug 1112147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112153">SUSE bug 1112153</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13785">CVE-2018-13785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16435">CVE-2018-16435 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2938/">CVE-2018-2938 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2938">CVE-2018-2938 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2940">CVE-2018-2940 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2952">CVE-2018-2952 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2973">CVE-2018-2973 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3136">CVE-2018-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3139">CVE-2018-3139 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3149">CVE-2018-3149 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3169">CVE-2018-3169 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3180">CVE-2018-3180 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3214">CVE-2018-3214 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554497" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554498" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554499" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554500" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149931" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1121086" ref_url="https://bugzilla.suse.com/1121086" source="BUGZILLA"/>
		<reference ref_id="1122838" ref_url="https://bugzilla.suse.com/1122838" source="BUGZILLA"/>
		<reference ref_id="1122839" ref_url="https://bugzilla.suse.com/1122839" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17189" ref_url="https://www.suse.com/security/cve/CVE-2018-17189/" source="CVE"/>
		<reference ref_id="CVE-2018-17199" ref_url="https://www.suse.com/security/cve/CVE-2018-17199/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005156.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

Security issues fixed:

- CVE-2018-17189: Fixed a denial of service in mod_http2, via slow and unneeded request bodies (bsc#1122838)
- CVE-2018-17199: Fixed that mod_session_cookie did not respect expiry time (bsc#1122839)

Non-security issue fixed:

- sysconfig.d is not created anymore if it already exists (bsc#1121086)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-26"/>
	<updated date="2019-02-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1121086">SUSE bug 1121086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122838">SUSE bug 1122838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122839">SUSE bug 1122839</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17189/">CVE-2018-17189 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17189">CVE-2018-17189 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17199/">CVE-2018-17199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17199">CVE-2018-17199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554501" comment="apache2-2.4.23-29.34.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554502" comment="apache2-doc-2.4.23-29.34.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554503" comment="apache2-example-pages-2.4.23-29.34.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554504" comment="apache2-prefork-2.4.23-29.34.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554505" comment="apache2-utils-2.4.23-29.34.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554506" comment="apache2-worker-2.4.23-29.34.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149932" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1111177" ref_url="https://bugzilla.suse.com/1111177" source="BUGZILLA"/>
		<reference ref_id="1113246" ref_url="https://bugzilla.suse.com/1113246" source="BUGZILLA"/>
		<reference ref_id="1114710" ref_url="https://bugzilla.suse.com/1114710" source="BUGZILLA"/>
		<reference ref_id="1121567" ref_url="https://bugzilla.suse.com/1121567" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14662" ref_url="https://www.suse.com/security/cve/CVE-2018-14662/" source="CVE"/>
		<reference ref_id="CVE-2018-16846" ref_url="https://www.suse.com/security/cve/CVE-2018-16846/" source="CVE"/>
		<reference ref_id="CVE-2018-16889" ref_url="https://www.suse.com/security/cve/CVE-2018-16889/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005154.html" source="SUSE-SU"/>
		<description>
This update for ceph fixes the following issues:

Security issues fixed:

- CVE-2018-14662: mon: limit caps allowed to access the config store (bsc#1111177)
- CVE-2018-16846: rgw: enforce bounds on max-keys/max-uploads/max-parts (bsc#1114710)
- CVE-2018-16889: rgw: sanitize customer encryption keys from log output in v4 auth (bsc#1121567)

Non-security issue fixed:

- os/bluestore: avoid frequent allocator dump on bluefs rebalance failure (bsc#1113246)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-26"/>
	<updated date="2019-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111177">SUSE bug 1111177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113246">SUSE bug 1113246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114710">SUSE bug 1114710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121567">SUSE bug 1121567</bugzilla>
	<cve impact="low" cvss3="1.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14662/">CVE-2018-14662 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14662">CVE-2018-14662 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16846/">CVE-2018-16846 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16846">CVE-2018-16846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16889/">CVE-2018-16889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16889">CVE-2018-16889 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554507" comment="ceph-common-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554508" comment="libcephfs2-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554509" comment="librados2-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554510" comment="libradosstriper1-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554511" comment="librbd1-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554512" comment="librgw2-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554513" comment="python-cephfs-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554514" comment="python-rados-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554515" comment="python-rbd-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554516" comment="python-rgw-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149933" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1124937" ref_url="https://bugzilla.suse.com/1124937" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6212" ref_url="https://www.suse.com/security/cve/CVE-2019-6212/" source="CVE"/>
		<reference ref_id="CVE-2019-6215" ref_url="https://www.suse.com/security/cve/CVE-2019-6215/" source="CVE"/>
		<reference ref_id="CVE-2019-6216" ref_url="https://www.suse.com/security/cve/CVE-2019-6216/" source="CVE"/>
		<reference ref_id="CVE-2019-6217" ref_url="https://www.suse.com/security/cve/CVE-2019-6217/" source="CVE"/>
		<reference ref_id="CVE-2019-6226" ref_url="https://www.suse.com/security/cve/CVE-2019-6226/" source="CVE"/>
		<reference ref_id="CVE-2019-6227" ref_url="https://www.suse.com/security/cve/CVE-2019-6227/" source="CVE"/>
		<reference ref_id="CVE-2019-6229" ref_url="https://www.suse.com/security/cve/CVE-2019-6229/" source="CVE"/>
		<reference ref_id="CVE-2019-6233" ref_url="https://www.suse.com/security/cve/CVE-2019-6233/" source="CVE"/>
		<reference ref_id="CVE-2019-6234" ref_url="https://www.suse.com/security/cve/CVE-2019-6234/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.22.6 fixes the following issues:

Security issues fixed:

- CVE-2019-6212: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6215: Fixed a type confusion vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6216: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content. 
- CVE-2019-6217: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content. 
- CVE-2019-6226: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content.  
- CVE-2019-6227: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6229: Fixed a logic issue by improving validation which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6233: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6234: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.

Other issues addressed:   
- Update to version 2.22.6 (bsc#1124937).
- Kinetic scrolling slow down smoothly when reaching the ends of pages, instead of abruptly, to better match the GTK+ behaviour.
- Fixed Web inspector magnifier under Wayland.
- Fixed garbled rendering of some websites (e.g. YouTube) while scrolling under X11.
- Fixed several crashes, race conditions, and rendering issues.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-28"/>
	<updated date="2019-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6212/">CVE-2019-6212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6212">CVE-2019-6212 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6215/">CVE-2019-6215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6215">CVE-2019-6215 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6216/">CVE-2019-6216 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6216">CVE-2019-6216 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6217/">CVE-2019-6217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6217">CVE-2019-6217 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6226/">CVE-2019-6226 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6226">CVE-2019-6226 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6227/">CVE-2019-6227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6227">CVE-2019-6227 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6229/">CVE-2019-6229 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6229">CVE-2019-6229 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6233/">CVE-2019-6233 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6233">CVE-2019-6233 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6234/">CVE-2019-6234 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6234">CVE-2019-6234 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554517" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554518" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554519" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554520" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554521" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149934" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1015336" ref_url="https://bugzilla.suse.com/1015336" source="BUGZILLA"/>
		<reference ref_id="1015337" ref_url="https://bugzilla.suse.com/1015337" source="BUGZILLA"/>
		<reference ref_id="1015340" ref_url="https://bugzilla.suse.com/1015340" source="BUGZILLA"/>
		<reference ref_id="1019683" ref_url="https://bugzilla.suse.com/1019683" source="BUGZILLA"/>
		<reference ref_id="1019695" ref_url="https://bugzilla.suse.com/1019695" source="BUGZILLA"/>
		<reference ref_id="1020413" ref_url="https://bugzilla.suse.com/1020413" source="BUGZILLA"/>
		<reference ref_id="1020645" ref_url="https://bugzilla.suse.com/1020645" source="BUGZILLA"/>
		<reference ref_id="1023175" ref_url="https://bugzilla.suse.com/1023175" source="BUGZILLA"/>
		<reference ref_id="1027260" ref_url="https://bugzilla.suse.com/1027260" source="BUGZILLA"/>
		<reference ref_id="1027457" ref_url="https://bugzilla.suse.com/1027457" source="BUGZILLA"/>
		<reference ref_id="1031492" ref_url="https://bugzilla.suse.com/1031492" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1043083" ref_url="https://bugzilla.suse.com/1043083" source="BUGZILLA"/>
		<reference ref_id="1046264" ref_url="https://bugzilla.suse.com/1046264" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1048916" ref_url="https://bugzilla.suse.com/1048916" source="BUGZILLA"/>
		<reference ref_id="1050549" ref_url="https://bugzilla.suse.com/1050549" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1070805" ref_url="https://bugzilla.suse.com/1070805" source="BUGZILLA"/>
		<reference ref_id="1078355" ref_url="https://bugzilla.suse.com/1078355" source="BUGZILLA"/>
		<reference ref_id="1079935" ref_url="https://bugzilla.suse.com/1079935" source="BUGZILLA"/>
		<reference ref_id="1086095" ref_url="https://bugzilla.suse.com/1086095" source="BUGZILLA"/>
		<reference ref_id="1086423" ref_url="https://bugzilla.suse.com/1086423" source="BUGZILLA"/>
		<reference ref_id="1086652" ref_url="https://bugzilla.suse.com/1086652" source="BUGZILLA"/>
		<reference ref_id="1091405" ref_url="https://bugzilla.suse.com/1091405" source="BUGZILLA"/>
		<reference ref_id="1093158" ref_url="https://bugzilla.suse.com/1093158" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1094823" ref_url="https://bugzilla.suse.com/1094823" source="BUGZILLA"/>
		<reference ref_id="1094973" ref_url="https://bugzilla.suse.com/1094973" source="BUGZILLA"/>
		<reference ref_id="1096242" ref_url="https://bugzilla.suse.com/1096242" source="BUGZILLA"/>
		<reference ref_id="1096281" ref_url="https://bugzilla.suse.com/1096281" source="BUGZILLA"/>
		<reference ref_id="1099523" ref_url="https://bugzilla.suse.com/1099523" source="BUGZILLA"/>
		<reference ref_id="1099810" ref_url="https://bugzilla.suse.com/1099810" source="BUGZILLA"/>
		<reference ref_id="1100105" ref_url="https://bugzilla.suse.com/1100105" source="BUGZILLA"/>
		<reference ref_id="1101557" ref_url="https://bugzilla.suse.com/1101557" source="BUGZILLA"/>
		<reference ref_id="1102439" ref_url="https://bugzilla.suse.com/1102439" source="BUGZILLA"/>
		<reference ref_id="1102660" ref_url="https://bugzilla.suse.com/1102660" source="BUGZILLA"/>
		<reference ref_id="1102875" ref_url="https://bugzilla.suse.com/1102875" source="BUGZILLA"/>
		<reference ref_id="1102877" ref_url="https://bugzilla.suse.com/1102877" source="BUGZILLA"/>
		<reference ref_id="1102879" ref_url="https://bugzilla.suse.com/1102879" source="BUGZILLA"/>
		<reference ref_id="1102882" ref_url="https://bugzilla.suse.com/1102882" source="BUGZILLA"/>
		<reference ref_id="1102896" ref_url="https://bugzilla.suse.com/1102896" source="BUGZILLA"/>
		<reference ref_id="1103097" ref_url="https://bugzilla.suse.com/1103097" source="BUGZILLA"/>
		<reference ref_id="1103156" ref_url="https://bugzilla.suse.com/1103156" source="BUGZILLA"/>
		<reference ref_id="1103257" ref_url="https://bugzilla.suse.com/1103257" source="BUGZILLA"/>
		<reference ref_id="1103624" ref_url="https://bugzilla.suse.com/1103624" source="BUGZILLA"/>
		<reference ref_id="1104098" ref_url="https://bugzilla.suse.com/1104098" source="BUGZILLA"/>
		<reference ref_id="1104731" ref_url="https://bugzilla.suse.com/1104731" source="BUGZILLA"/>
		<reference ref_id="1105428" ref_url="https://bugzilla.suse.com/1105428" source="BUGZILLA"/>
		<reference ref_id="1106061" ref_url="https://bugzilla.suse.com/1106061" source="BUGZILLA"/>
		<reference ref_id="1106105" ref_url="https://bugzilla.suse.com/1106105" source="BUGZILLA"/>
		<reference ref_id="1106237" ref_url="https://bugzilla.suse.com/1106237" source="BUGZILLA"/>
		<reference ref_id="1106240" ref_url="https://bugzilla.suse.com/1106240" source="BUGZILLA"/>
		<reference ref_id="1106929" ref_url="https://bugzilla.suse.com/1106929" source="BUGZILLA"/>
		<reference ref_id="1107385" ref_url="https://bugzilla.suse.com/1107385" source="BUGZILLA"/>
		<reference ref_id="1107866" ref_url="https://bugzilla.suse.com/1107866" source="BUGZILLA"/>
		<reference ref_id="1108145" ref_url="https://bugzilla.suse.com/1108145" source="BUGZILLA"/>
		<reference ref_id="1108240" ref_url="https://bugzilla.suse.com/1108240" source="BUGZILLA"/>
		<reference ref_id="1109272" ref_url="https://bugzilla.suse.com/1109272" source="BUGZILLA"/>
		<reference ref_id="1109330" ref_url="https://bugzilla.suse.com/1109330" source="BUGZILLA"/>
		<reference ref_id="1109695" ref_url="https://bugzilla.suse.com/1109695" source="BUGZILLA"/>
		<reference ref_id="1109806" ref_url="https://bugzilla.suse.com/1109806" source="BUGZILLA"/>
		<reference ref_id="1110286" ref_url="https://bugzilla.suse.com/1110286" source="BUGZILLA"/>
		<reference ref_id="1111062" ref_url="https://bugzilla.suse.com/1111062" source="BUGZILLA"/>
		<reference ref_id="1111174" ref_url="https://bugzilla.suse.com/1111174" source="BUGZILLA"/>
		<reference ref_id="1111809" ref_url="https://bugzilla.suse.com/1111809" source="BUGZILLA"/>
		<reference ref_id="1112246" ref_url="https://bugzilla.suse.com/1112246" source="BUGZILLA"/>
		<reference ref_id="1112963" ref_url="https://bugzilla.suse.com/1112963" source="BUGZILLA"/>
		<reference ref_id="1113412" ref_url="https://bugzilla.suse.com/1113412" source="BUGZILLA"/>
		<reference ref_id="1113766" ref_url="https://bugzilla.suse.com/1113766" source="BUGZILLA"/>
		<reference ref_id="1114190" ref_url="https://bugzilla.suse.com/1114190" source="BUGZILLA"/>
		<reference ref_id="1114417" ref_url="https://bugzilla.suse.com/1114417" source="BUGZILLA"/>
		<reference ref_id="1114475" ref_url="https://bugzilla.suse.com/1114475" source="BUGZILLA"/>
		<reference ref_id="1114648" ref_url="https://bugzilla.suse.com/1114648" source="BUGZILLA"/>
		<reference ref_id="1114763" ref_url="https://bugzilla.suse.com/1114763" source="BUGZILLA"/>
		<reference ref_id="1114839" ref_url="https://bugzilla.suse.com/1114839" source="BUGZILLA"/>
		<reference ref_id="1114871" ref_url="https://bugzilla.suse.com/1114871" source="BUGZILLA"/>
		<reference ref_id="1114893" ref_url="https://bugzilla.suse.com/1114893" source="BUGZILLA"/>
		<reference ref_id="1115431" ref_url="https://bugzilla.suse.com/1115431" source="BUGZILLA"/>
		<reference ref_id="1115433" ref_url="https://bugzilla.suse.com/1115433" source="BUGZILLA"/>
		<reference ref_id="1115440" ref_url="https://bugzilla.suse.com/1115440" source="BUGZILLA"/>
		<reference ref_id="1115482" ref_url="https://bugzilla.suse.com/1115482" source="BUGZILLA"/>
		<reference ref_id="1115709" ref_url="https://bugzilla.suse.com/1115709" source="BUGZILLA"/>
		<reference ref_id="1116027" ref_url="https://bugzilla.suse.com/1116027" source="BUGZILLA"/>
		<reference ref_id="1116183" ref_url="https://bugzilla.suse.com/1116183" source="BUGZILLA"/>
		<reference ref_id="1116285" ref_url="https://bugzilla.suse.com/1116285" source="BUGZILLA"/>
		<reference ref_id="1116336" ref_url="https://bugzilla.suse.com/1116336" source="BUGZILLA"/>
		<reference ref_id="1116345" ref_url="https://bugzilla.suse.com/1116345" source="BUGZILLA"/>
		<reference ref_id="1116497" ref_url="https://bugzilla.suse.com/1116497" source="BUGZILLA"/>
		<reference ref_id="1116653" ref_url="https://bugzilla.suse.com/1116653" source="BUGZILLA"/>
		<reference ref_id="1116841" ref_url="https://bugzilla.suse.com/1116841" source="BUGZILLA"/>
		<reference ref_id="1116924" ref_url="https://bugzilla.suse.com/1116924" source="BUGZILLA"/>
		<reference ref_id="1116950" ref_url="https://bugzilla.suse.com/1116950" source="BUGZILLA"/>
		<reference ref_id="1116962" ref_url="https://bugzilla.suse.com/1116962" source="BUGZILLA"/>
		<reference ref_id="1117108" ref_url="https://bugzilla.suse.com/1117108" source="BUGZILLA"/>
		<reference ref_id="1117162" ref_url="https://bugzilla.suse.com/1117162" source="BUGZILLA"/>
		<reference ref_id="1117165" ref_url="https://bugzilla.suse.com/1117165" source="BUGZILLA"/>
		<reference ref_id="1117186" ref_url="https://bugzilla.suse.com/1117186" source="BUGZILLA"/>
		<reference ref_id="1117562" ref_url="https://bugzilla.suse.com/1117562" source="BUGZILLA"/>
		<reference ref_id="1117645" ref_url="https://bugzilla.suse.com/1117645" source="BUGZILLA"/>
		<reference ref_id="1117744" ref_url="https://bugzilla.suse.com/1117744" source="BUGZILLA"/>
		<reference ref_id="1118152" ref_url="https://bugzilla.suse.com/1118152" source="BUGZILLA"/>
		<reference ref_id="1118316" ref_url="https://bugzilla.suse.com/1118316" source="BUGZILLA"/>
		<reference ref_id="1118319" ref_url="https://bugzilla.suse.com/1118319" source="BUGZILLA"/>
		<reference ref_id="1118505" ref_url="https://bugzilla.suse.com/1118505" source="BUGZILLA"/>
		<reference ref_id="1118790" ref_url="https://bugzilla.suse.com/1118790" source="BUGZILLA"/>
		<reference ref_id="1118798" ref_url="https://bugzilla.suse.com/1118798" source="BUGZILLA"/>
		<reference ref_id="1118915" ref_url="https://bugzilla.suse.com/1118915" source="BUGZILLA"/>
		<reference ref_id="1118922" ref_url="https://bugzilla.suse.com/1118922" source="BUGZILLA"/>
		<reference ref_id="1118926" ref_url="https://bugzilla.suse.com/1118926" source="BUGZILLA"/>
		<reference ref_id="1118930" ref_url="https://bugzilla.suse.com/1118930" source="BUGZILLA"/>
		<reference ref_id="1118936" ref_url="https://bugzilla.suse.com/1118936" source="BUGZILLA"/>
		<reference ref_id="1119204" ref_url="https://bugzilla.suse.com/1119204" source="BUGZILLA"/>
		<reference ref_id="1119680" ref_url="https://bugzilla.suse.com/1119680" source="BUGZILLA"/>
		<reference ref_id="1119714" ref_url="https://bugzilla.suse.com/1119714" source="BUGZILLA"/>
		<reference ref_id="1119877" ref_url="https://bugzilla.suse.com/1119877" source="BUGZILLA"/>
		<reference ref_id="1119946" ref_url="https://bugzilla.suse.com/1119946" source="BUGZILLA"/>
		<reference ref_id="1119967" ref_url="https://bugzilla.suse.com/1119967" source="BUGZILLA"/>
		<reference ref_id="1119970" ref_url="https://bugzilla.suse.com/1119970" source="BUGZILLA"/>
		<reference ref_id="1120017" ref_url="https://bugzilla.suse.com/1120017" source="BUGZILLA"/>
		<reference ref_id="1120046" ref_url="https://bugzilla.suse.com/1120046" source="BUGZILLA"/>
		<reference ref_id="1120722" ref_url="https://bugzilla.suse.com/1120722" source="BUGZILLA"/>
		<reference ref_id="1120743" ref_url="https://bugzilla.suse.com/1120743" source="BUGZILLA"/>
		<reference ref_id="1120758" ref_url="https://bugzilla.suse.com/1120758" source="BUGZILLA"/>
		<reference ref_id="1120902" ref_url="https://bugzilla.suse.com/1120902" source="BUGZILLA"/>
		<reference ref_id="1120950" ref_url="https://bugzilla.suse.com/1120950" source="BUGZILLA"/>
		<reference ref_id="1121239" ref_url="https://bugzilla.suse.com/1121239" source="BUGZILLA"/>
		<reference ref_id="1121240" ref_url="https://bugzilla.suse.com/1121240" source="BUGZILLA"/>
		<reference ref_id="1121241" ref_url="https://bugzilla.suse.com/1121241" source="BUGZILLA"/>
		<reference ref_id="1121242" ref_url="https://bugzilla.suse.com/1121242" source="BUGZILLA"/>
		<reference ref_id="1121275" ref_url="https://bugzilla.suse.com/1121275" source="BUGZILLA"/>
		<reference ref_id="1121621" ref_url="https://bugzilla.suse.com/1121621" source="BUGZILLA"/>
		<reference ref_id="1121726" ref_url="https://bugzilla.suse.com/1121726" source="BUGZILLA"/>
		<reference ref_id="1122650" ref_url="https://bugzilla.suse.com/1122650" source="BUGZILLA"/>
		<reference ref_id="1122651" ref_url="https://bugzilla.suse.com/1122651" source="BUGZILLA"/>
		<reference ref_id="1122779" ref_url="https://bugzilla.suse.com/1122779" source="BUGZILLA"/>
		<reference ref_id="1122885" ref_url="https://bugzilla.suse.com/1122885" source="BUGZILLA"/>
		<reference ref_id="1123321" ref_url="https://bugzilla.suse.com/1123321" source="BUGZILLA"/>
		<reference ref_id="1123323" ref_url="https://bugzilla.suse.com/1123323" source="BUGZILLA"/>
		<reference ref_id="1123357" ref_url="https://bugzilla.suse.com/1123357" source="BUGZILLA"/>
		<reference ref_id="1123933" ref_url="https://bugzilla.suse.com/1123933" source="BUGZILLA"/>
		<reference ref_id="1124166" ref_url="https://bugzilla.suse.com/1124166" source="BUGZILLA"/>
		<reference ref_id="1124728" ref_url="https://bugzilla.suse.com/1124728" source="BUGZILLA"/>
		<reference ref_id="1124732" ref_url="https://bugzilla.suse.com/1124732" source="BUGZILLA"/>
		<reference ref_id="1124735" ref_url="https://bugzilla.suse.com/1124735" source="BUGZILLA"/>
		<reference ref_id="1124775" ref_url="https://bugzilla.suse.com/1124775" source="BUGZILLA"/>
		<reference ref_id="1124777" ref_url="https://bugzilla.suse.com/1124777" source="BUGZILLA"/>
		<reference ref_id="1124780" ref_url="https://bugzilla.suse.com/1124780" source="BUGZILLA"/>
		<reference ref_id="1124811" ref_url="https://bugzilla.suse.com/1124811" source="BUGZILLA"/>
		<reference ref_id="1125000" ref_url="https://bugzilla.suse.com/1125000" source="BUGZILLA"/>
		<reference ref_id="1125014" ref_url="https://bugzilla.suse.com/1125014" source="BUGZILLA"/>
		<reference ref_id="1125446" ref_url="https://bugzilla.suse.com/1125446" source="BUGZILLA"/>
		<reference ref_id="1125794" ref_url="https://bugzilla.suse.com/1125794" source="BUGZILLA"/>
		<reference ref_id="1125796" ref_url="https://bugzilla.suse.com/1125796" source="BUGZILLA"/>
		<reference ref_id="1125808" ref_url="https://bugzilla.suse.com/1125808" source="BUGZILLA"/>
		<reference ref_id="1125809" ref_url="https://bugzilla.suse.com/1125809" source="BUGZILLA"/>
		<reference ref_id="1125810" ref_url="https://bugzilla.suse.com/1125810" source="BUGZILLA"/>
		<reference ref_id="1125892" ref_url="https://bugzilla.suse.com/1125892" source="BUGZILLA"/>
		<reference ref_id="985031" ref_url="https://bugzilla.suse.com/985031" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1120" ref_url="https://www.suse.com/security/cve/CVE-2018-1120/" source="CVE"/>
		<reference ref_id="CVE-2018-16862" ref_url="https://www.suse.com/security/cve/CVE-2018-16862/" source="CVE"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<reference ref_id="CVE-2018-19407" ref_url="https://www.suse.com/security/cve/CVE-2018-19407/" source="CVE"/>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<reference ref_id="CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568/" source="CVE"/>
		<reference ref_id="CVE-2019-3459" ref_url="https://www.suse.com/security/cve/CVE-2019-3459/" source="CVE"/>
		<reference ref_id="CVE-2019-3460" ref_url="https://www.suse.com/security/cve/CVE-2019-3460/" source="CVE"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.175 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free. (bnc#1124728)
- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).
- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host's stack memory contents to a guest (bsc#1124735).
- CVE-2018-1120: By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker could have caused utilities from psutils or procps (such as ps, w) or any other program which made a read() call to the /proc/&lt;pid&gt;/cmdline (or /proc/&lt;pid&gt;/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks) (bnc#1093158).
- CVE-2018-16862: A security flaw was found in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one (bnc#1117186).
- CVE-2018-16884: NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1119946).
- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
- CVE-2018-5391: The Linux kernel was vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bnc#1103097).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).
- CVE-2019-3459,CVE-2019-3460: Two remote information leak vulnerabilities in the Bluetooth stack were fixed that could potentially leak kernel information (bsc#1120758)

The following non-security bugs were fixed:

- 9p: clear dangling pointers in p9stat_free (bnc#1012382).
- 9p locks: fix glock.client_id leak in do_lock (bnc#1012382).
- 9p/net: put a lower bound on msize (bnc#1012382).
- acpi/iort: Fix iort_get_platform_device_domain() uninitialized pointer value (bsc#1121239).
- acpi/lpss: Add alternative ACPI HIDs for Cherry Trail DMA controllers (bnc#1012382).
- acpi/nfit: Block function zero DSMs (bsc#1123321).
- acpi/nfit: Fix ARS overflow continuation (bsc#1125000).
- acpi/nfit: fix cmd_rc for acpi_nfit_ctl to always return a value (bsc#1124775).
- acpi/nfit: Fix command-supported detection (bsc#1123323).
- acpi/nfit, x86/mce: Handle only uncorrectable machine checks (bsc#1114648).
- acpi/nfit, x86/mce: Validate a MCE's address before using it (bsc#1114648).
- acpi/platform: Add SMB0001 HID to forbidden_id_list (bnc#1012382).
- acpi/power: Skip duplicate power resource references in _PRx (bnc#1012382).
- acpi/processor: Fix the return value of acpi_processor_ids_walk() (git fixes (acpi)).
- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bnc#1012382).
- ahci: do not ignore result code of ahci_reset_controller() (bnc#1012382).
- aio: fix spectre gadget in lookup_ioctx (bnc#1012382).
- aio: hold an extra file reference over AIO read/write operations (bsc#1116027).
- alpha: Fix Eiger NR_IRQS to 128 (bnc#1012382).
- alpha: fix page fault handling for r16-r18 targets (bnc#1012382).
- ALSA: ac97: Fix incorrect bit shift at AC97-SPSA control write (bnc#1012382).
- ALSA: bebob: fix model-id of unit for Apogee Ensemble (bnc#1012382).
- ALSA: ca0106: Disable IZD on SB0570 DAC to fix audio pops (bnc#1012382).
- ALSA: compress: Fix stop handling on compressed capture streams (bnc#1012382).
- ALSA: control: Fix race between adding and removing a user element (bnc#1012382).
- ALSA: cs46xx: Potential NULL dereference in probe (bnc#1012382).
- ALSA: emu10k1: Fix potential Spectre v1 vulnerabilities (bnc#1012382).
- ALSA: emux: Fix potential Spectre v1 vulnerabilities (bnc#1012382).
- ALSA: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905) (bnc#1012382).
- ALSA: hda: add mute LED support for HP EliteBook 840 G4 (bnc#1012382).
- ALSA: hda - Add quirk for HP EliteBook 840 G5 (bnc#1012382).
- ALSA: hda: Add support for AMD Stoney Ridge (bnc#1012382).
- ALSA: hda: Check the non-cached stream buffers more explicitly (bnc#1012382).
- ALSA: hda/realtek - Disable headset Mic VREF for headset mode of ALC225 (bnc#1012382).
- ALSA: hda - Serialize codec registrations (bnc#1012382).
- ALSA: hda/tegra: clear pending irq handlers (bnc#1012382).
- ALSA: isa/wavefront: prevent some out of bound writes (bnc#1012382).
- ALSA: pcm: Call snd_pcm_unlink() conditionally at closing (bnc#1012382).
- ALSA: pcm: Fix interval evaluation with openmin/max (bnc#1012382).
- ALSA: pcm: Fix potential Spectre v1 vulnerability (bnc#1012382).
- ALSA: pcm: Fix starvation on down_write_nonblock() (bnc#1012382).
- ALSA: pcm: remove SNDRV_PCM_IOCTL1_INFO internal command (bnc#1012382).
- ALSA: rme9652: Fix potential Spectre v1 vulnerability (bnc#1012382).
- ALSA: sparc: Fix invalid snd_free_pages() at error path (bnc#1012382).
- ALSA: timer: Fix zero-division by continue of uninitialized instance (bnc#1012382).
- ALSA: trident: Suppress gcc string warning (bnc#1012382).
- ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit() (bnc#1012382).
- ALSA: usb-audio: Fix an out-of-bound read in create_composite_quirks (bnc#1012382).
- ALSA: usb-audio: Fix implicit fb endpoint setup by quirk (bnc#1012382).
- ALSA: wss: Fix invalid snd_free_pages() at error path (bnc#1012382).
- amd/iommu: Fix Guest Virtual APIC Log Tail Address Register (bsc#1106105).
- arc: change defconfig defaults to ARCv2 (bnc#1012382).
- arc: [devboards] Add support of NFSv3 ACL (bnc#1012382).
- arch/alpha, termios: implement BOTHER, IBSHIFT and termios2 (bnc#1012382).
- arc: io.h: Implement reads{x}()/writes{x}() (bnc#1012382).
- arc: perf: map generic branches to correct hardware condition (bnc#1012382).
- arm64: Disable asm-operand-width warning for clang (bnc#1012382).
- arm64: Do not trap host pointer auth use to EL2 (bnc#1012382).
- arm64: dts: stratix10: Correct System Manager register size (bnc#1012382).
- arm64: Enabled ENA (Amazon network driver) for arm64
- arm64: ftrace: do not adjust the LR value (bnc#1012382).
- arm64: hardcode rodata_enabled=true earlier in the series (bsc#1114763).
- arm64: hyp-stub: Forbid kprobing of the hyp-stub (bnc#1012382).
- arm64/kvm: consistently handle host HCR_EL2 flags (bnc#1012382).
- arm64: kvm: Skip MMIO insn after emulation (bnc#1012382).
- arm64: PCI: ACPI support for legacy IRQs parsing and consolidation with DT code (bsc#985031).
- arm64: percpu: Initialize ret in the default case (bnc#1012382).
- arm64: perf: set suppress_bind_attrs flag to true (bnc#1012382).
- arm64: remove no-op -p linker flag (bnc#1012382).
- arm: 8799/1: mm: fix pci_ioremap_io() offset check (bnc#1012382).
- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bnc#1012382).
- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bnc#1012382).
- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bnc#1012382).
- arm: dts: apq8064: add ahci ports-implemented mask (bnc#1012382).
- arm: dts: da850-evm: Correct the sound card name (bnc#1012382).
- arm: dts: Fix OMAP4430 SDP Ethernet startup (bnc#1012382).
- arm: dts: imx53-qsb: disable 1.2GHz OPP (bnc#1012382).
- arm: dts: kirkwood: Fix polarity of GPIO fan lines (bnc#1012382).
- arm: dts: mmp2: fix TWSI2 (bnc#1012382).
- arm: fix mis-applied iommu identity check (bsc#1116924).
- arm: imx: update the cpu power up timing setting on i.mx6sx (bnc#1012382).
- arm: iop32x/n2100: fix PCI IRQ mapping (bnc#1012382).
- arm: kvm: fix building with gcc-8 (bsc#1121241).
- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bnc#1012382).
- arm: OMAP2+: hwmod: Fix some section annotations (bnc#1012382).
- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bnc#1012382).
- arm: pxa: avoid section mismatch warning (bnc#1012382).
- asix: Check for supported Wake-on-LAN modes (bnc#1012382).
- ASoC: ak4613: Enable cache usage to fix crashes on resume (bnc#1012382).
- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bnc#1012382).
- ASoC: dapm: Recalculate audio map forcely when card instantiated (bnc#1012382).
- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bnc#1012382).
- ASoC: Intel: mrfld: fix uninitialized variable access (bnc#1012382).
- ASoC: omap-dmic: Add pm_qos handling to avoid overruns with CPU_IDLE (bnc#1012382).
- ASoC: omap-mcpdm: Add pm_qos handling to avoid under/overruns with CPU_IDLE (bnc#1012382).
- ASoC: spear: fix error return code in spdif_in_probe() (bnc#1012382).
- ASoC: wm8940: Enable cache usage to fix crashes on resume (bnc#1012382).
- ata: Fix racy link clearance (bsc#1107866).
- ataflop: fix error handling during setup (bnc#1012382).
- ath10k: fix kernel panic due to race in accessing arvif list (bnc#1012382).
- ath10k: schedule hardware restart if WMI command times out (bnc#1012382).
- ax25: fix a use-after-free in ax25_fillin_cb() (bnc#1012382).
- ax88179_178a: Check for supported Wake-on-LAN modes (bnc#1012382).
- b43: Fix error in cordic routine (bnc#1012382).
- batman-adv: Avoid WARN on net_device without parent in netns (bnc#1012382).
- batman-adv: Expand merged fragment buffer for full packet (bnc#1012382).
- batman-adv: Force mac header to start of data on xmit (bnc#1012382).
- bcache: fix miss key refill-&gt;end in writeback (bnc#1012382).
- bfs: add sanity check at bfs_fill_super() (bnc#1012382).
- binfmt_elf: fix calculations for bss padding (bnc#1012382).
- bitops: protect variables in bit_clear_unless() macro (bsc#1116285).
- block: fix inheriting request priority from bio (bsc#1116924).
- block/loop: Use global lock for ioctl() operation (bnc#1012382).
- block: respect virtual boundary mask in bvecs (bsc#1113412).
- block/swim3: Fix -EBUSY error when re-opening device after unmount (Git-fixes).
- Bluetooth: btbcm: Add entry for BCM4335C0 UART bluetooth (bnc#1012382).
- Bluetooth: Fix unnecessary error message for HCI request completion (bnc#1012382).
- Bluetooth: SMP: fix crash in unpairing (bnc#1012382).
- bna: ethtool: Avoid reading past end of buffer (bnc#1012382).
- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bnc#1012382).
- bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1020413).
- bonding: fix 802.3ad state sent to partner when unbinding slave (bnc#1012382).
- bpf: fix check of allowed specifiers in bpf_trace_printk (bnc#1012382).
- bpf: generally move prog destruction to RCU deferral (bnc#1012382).
- bpf: support 8-byte metafield access (bnc#1012382).
- bpf, trace: check event type in bpf_perf_event_read (bsc#1119970).
- bpf, trace: use READ_ONCE for retrieving file ptr (bsc#1119967).
- bpf/verifier: Add spi variable to check_stack_write() (bnc#1012382).
- bpf/verifier: Pass instruction index to check_mem_access() and check_xadd() (bnc#1012382).
- bridge: do not add port to router list when receives query with source 0.0.0.0 (bnc#1012382).
- btrfs: Always try all copies when reading extent buffers (bnc#1012382).
- btrfs: do not attempt to trim devices that do not support it (bnc#1012382).
- btrfs: ensure path name is null terminated at btrfs_control_ioctl (bnc#1012382).
- btrfs: fix backport error in submit_stripe_bio (bsc#1114763).
- btrfs: fix data corruption due to cloning of eof block (bnc#1012382).
- btrfs: Fix memory barriers usage with device stats counters (git-fixes).
- btrfs: fix null pointer dereference on compressed write path error (bnc#1012382).
- btrfs: fix pinned underflow after transaction aborted (bnc#1012382).
- btrfs: fix use-after-free when dumping free space (bnc#1012382).
- btrfs: fix wrong dentries after fsync of file that got its parent replaced (bnc#1012382).
- btrfs: Handle error from btrfs_uuid_tree_rem call in _btrfs_ioctl_set_received_subvol (git-fixes).
- btrfs: Handle owner mismatch gracefully when walking up tree (bnc#1012382).
- btrfs: iterate all devices during trim, instead of fs_devices::alloc_list (bnc#1012382).
- btrfs: locking: Add extra check in btrfs_init_new_buffer() to avoid deadlock (bnc#1012382).
- btrfs: make sure we create all new block groups (bnc#1012382).
- btrfs: qgroup: Dirty all qgroups before rescan (bnc#1012382).
- btrfs: release metadata before running delayed refs (bnc#1012382).
- btrfs: reset max_extent_size on clear in a bitmap (bnc#1012382).
- btrfs: send, fix infinite loop due to directory rename dependencies (bnc#1012382).
- btrfs: set max_extent_size properly (bnc#1012382).
- btrfs: tree-checker: Check level for leaves and nodes (bnc#1012382).
- btrfs: tree-checker: Do not check max block group size as current max chunk size limit is unreliable (fixes for bnc#1012382 bsc#1102875 bsc#1102877 bsc#1102879 bsc#1102882 bsc#1102896).
- btrfs: tree-checker: Fix misleading group system information (bnc#1012382).
- btrfs: tree-check: reduce stack consumption in check_dir_item (bnc#1012382).
- btrfs: validate type when reading a chunk (bnc#1012382).
- btrfs: wait on caching when putting the bg cache (bnc#1012382).
- btrfs: wait on ordered extents on abort cleanup (bnc#1012382).
- cachefiles: fix the race between cachefiles_bury_object() and rmdir(2) (bnc#1012382).
- can: bcm: check timer values before ktime conversion (bnc#1012382).
- can: dev: __can_get_echo_skb(): Do not crash the kernel if can_priv::echo_skb is accessed out of bounds (bnc#1012382).
- can: dev: can_get_echo_skb(): factor out non sending code to __can_get_echo_skb() (bnc#1012382).
- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bnc#1012382).
- can: dev: __can_get_echo_skb(): print error message, if trying to echo non existing skb (bnc#1012382).
- can: dev: __can_get_echo_skb(): replace struct can_frame by canfd_frame to access frame length (bnc#1012382).
- can: gw: ensure DLC boundaries after CAN frame modification (bnc#1012382).
- can: rcar_can: Fix erroneous registration (bnc#1012382).
- cdc-acm: correct counting of UART states in serial state notification (bnc#1012382).
- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bnc#1012382).
- ceph: call setattr_prepare from ceph_setattr instead of inode_change_ok (bsc#1114763).
- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125809).
- ceph: do not update importing cap's mseq when handing cap export (bsc#1121275).
- ceph: fix dentry leak in ceph_readdir_prepopulate (bsc#1114839).
- ceph: quota: fix null pointer dereference in quota check (bsc#1114839).
- cfg80211: reg: Init wiphy_idx in regulatory_hint_core() (bnc#1012382).
- char/mwave: fix potential Spectre v1 vulnerability (bnc#1012382).
- checkstack.pl: fix for aarch64 (bnc#1012382).
- cifs: Always resolve hostname before reconnecting (bnc#1012382).
- cifs: check ntwrk_buf_start for NULL before dereferencing it (bnc#1012382).
- cifs: Do not count -ENODATA as failure for query directory (bnc#1012382).
- cifs: Do not hide EINTR after sending network packets (bnc#1012382).
- cifs: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bnc#1012382).
- cifs: Fix possible hang during async MTU reads and writes (bnc#1012382).
- cifs: Fix potential OOB access of lock element array (bnc#1012382).
- cifs: Fix separator when building path from dentry (bnc#1012382).
- cifs: handle guest access errors to Windows shares (bnc#1012382).
- cifs: In Kconfig CONFIG_CIFS_POSIX needs depends on legacy (insecure cifs) (bnc#1012382).
- cifs: Limit memory used by lock request calls to a page (bnc#1012382).
- clk: imx6q: reset exclusive gates on init (bnc#1012382).
- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bnc#1012382).
- clk: mmp: Off by one in mmp_clk_add() (bnc#1012382).
- clk: s2mps11: Add used attribute to s2mps11_dt_match (git-fixes).
- clk: s2mps11: Fix matching when built as module and DT node contains compatible (bnc#1012382).
- clk: samsung: exynos5420: Enable PERIS clocks for suspend (bnc#1012382).
- clockevents/drivers/i8253: Add support for PIT shutdown quirk (bnc#1012382).
- configfs: replace strncpy with memcpy (bnc#1012382).
- cpufeature: avoid warning when compiling with clang (Git-fixes).
- cpufreq: imx6q: add return value check for voltage scale (bnc#1012382).
- cpufreq: intel_pstate: Fix HWP on boot CPU after system resume (bsc#1120017).
- cpuidle: big.LITTLE: fix refcount leak (bnc#1012382).
- cpuidle: Do not access cpuidle_devices when !CONFIG_CPU_IDLE (bnc#1012382).
- cramfs: fix abad comparison when wrap-arounds occur (bnc#1012382).
- crypto: arm64/sha - avoid non-standard inline asm tricks (bnc#1012382).
- crypto: authencesn - Avoid twice completion call in decrypt path (bnc#1012382).
- crypto: authenc - fix parsing key with misaligned rta_len (bnc#1012382).
- crypto: cts - fix crash on short inputs (bnc#1012382).
- crypto: lrw - Fix out-of bounds access on counter overflow (bnc#1012382).
- crypto: shash - Fix a sleep-in-atomic bug in shash_setkey_unaligned (bnc#1012382).
- crypto: user - support incremental algorithm dumps (bsc#1120902).
- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bnc#1012382).
- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bnc#1012382).
- crypto, x86: aesni - fix token pasting for clang (bnc#1012382).
- crypto: x86/chacha20 - avoid sleeping with preemption disabled (bnc#1012382).
- cw1200: Do not leak memory if krealloc failes (bnc#1012382).
- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bnc#1012382).
- cxgb4: Add support for new flash parts (bsc#1102439).
- cxgb4: assume flash part size to be 4MB, if it can't be determined (bsc#1102439).
- cxgb4: Fix FW flash errors (bsc#1102439).
- cxgb4: fix missing break in switch and indent return statements (bsc#1102439).
- cxgb4: support new ISSI flash parts (bsc#1102439).
- dccp: fool proof ccid_hc_[rt]x_parse_options() (bnc#1012382).
- debugfs: fix debugfs_rename parameter checking (bnc#1012382).
- debugobjects: avoid recursive calls with kmemleak (bnc#1012382).
- disable stringop truncation warnings for now (bnc#1012382).
- dlm: Do not swamp the CPU with callbacks queued during recovery (bnc#1012382).
- dlm: fixed memory leaks after failed ls_remove_names allocation (bnc#1012382).
- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bnc#1012382).
- dlm: memory leaks on error path in dlm_user_request() (bnc#1012382).
- dlm: possible memory leak on error path in create_lkb() (bnc#1012382).
- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bnc#1012382).
- dmaengine: at_hdmac: fix module unloading (bnc#1012382).
- dmaengine: dma-jz4780: Return error if not probed from DT (bnc#1012382).
- dmaengine: imx-dma: fix wrong callback invoke (bnc#1012382).
- dm cache metadata: ignore hints array being too small during resize (Git-fixes).
- dm crypt: add cryptographic data integrity protection (authenticated encryption) (Git-fixes).
- dm crypt: factor IV constructor out to separate function (Git-fixes).
- dm crypt: fix crash by adding missing check for auth key size (git-fixes).
- dm crypt: fix error return code in crypt_ctr() (git-fixes).
- dm crypt: fix memory leak in crypt_ctr_cipher_old() (git-fixes).
- dm crypt: introduce new format of cipher with 'capi:' prefix (Git-fixes).
- dm crypt: wipe kernel key copy after IV initialization (Git-fixes).
- dm: do not allow readahead to limit IO size (git fixes (readahead)).
- dm ioctl: harden copy_params()'s copy_from_user() from malicious users (bnc#1012382).
- dm kcopyd: Fix bug causing workqueue stalls (bnc#1012382).
- dm-multipath: do not assign cmd_flags in setup_clone() (bsc#1103156).
- dm raid: stop using BUG() in __rdev_sectors() (bsc#1046264).
- dm snapshot: Fix excessive memory usage and workqueue stalls (bnc#1012382).
- dm thin: fix bug where bio that overwrites thin block ignores FUA (bnc#1012382).
- dm thin: stop no_space_timeout worker when switching to write-mode (Git-fixes).
- Documentation/network: reword kernel version reference (bnc#1012382).
- dpaa_eth: fix dpaa_get_stats64 to match prototype (bsc#1114763).
- drbd: Avoid Clang warning about pointless switch statment (bnc#1012382).
- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bnc#1012382).
- drbd: narrow rcu_read_lock in drbd_sync_handshake (bnc#1012382).
- drbd: skip spurious timeout (ping-timeo) when failing promote (bnc#1012382).
- driver/dma/ioat: Call del_timer_sync() without holding prep_lock (bnc#1012382).
- drivers: core: Remove glue dirs from sysfs earlier (bnc#1012382).
- drivers: hv: vmbus: check the creation_status in vmbus_establish_gpadl() (bsc#1104098).
- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bnc#1012382).
- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bnc#1012382).
- drivers/sbus/char: add of_node_put() (bnc#1012382).
- drivers/tty: add missing of_node_put() (bnc#1012382).
- drm/ast: change resolution may cause screen blurred (bnc#1012382).
- drm/ast: fixed cursor may disappear sometimes (bnc#1012382).
- drm/ast: fixed reading monitor EDID not stable issue (bnc#1012382).
- drm/ast: Fix incorrect free on ioregs (bsc#1106929)
- drm/ast: Remove existing framebuffers before loading driver (boo#1112963)
- drm/bufs: Fix Spectre v1 vulnerability (bnc#1012382).
- drm/dp_mst: Check if primary mstb is null (bnc#1012382).
- drm/fb-helper: Ignore the value of fb_var_screeninfo.pixclock (bsc#1106929)
- drm/hisilicon: hibmc: Do not carry error code in HiBMC framebuffer (bsc#1113766)
- drm/hisilicon: hibmc: Do not overwrite fb helper surface depth (bsc#1113766)
- drm/i915: Block fbdev HPD processing during suspend (bsc#1106929)
- drm/i915/hdmi: Add HDMI 2.0 audio clock recovery N values (bnc#1012382).
- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1106929)
- drm/ioctl: Fix Spectre v1 vulnerabilities (bnc#1012382).
- drm/modes: Prevent division by zero htotal (bnc#1012382).
- drm/msm: Grab a vblank reference when waiting for commit_done (bnc#1012382).
- drm/nouveau/fbcon: fix oops without fbdev emulation (bnc#1012382).
- drm/omap: fix memory barrier bug in DMM driver (bnc#1012382).
- drm: rcar-du: Fix external clock error checks (bsc#1106929)
- drm: rcar-du: Fix vblank initialization (bsc#1106929)
- drm/rockchip: Allow driver to be shutdown on reboot/kexec (bnc#1012382).
- drm/vmwgfx: Fix setting of dma masks (bsc#1106929)
- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1106929)
- e1000: avoid null pointer dereference on invalid stat type (bnc#1012382).
- e1000e: allow non-monotonic SYSTIM readings (bnc#1012382).
- e1000: fix race condition between e1000_down() and e1000_watchdog (bnc#1012382).
- edac: Raise the maximum number of memory controllers (bsc#1120722).
- efi/libstub/arm64: Force 'hidden' visibility for section markers (bnc#1012382).
- efi/libstub/arm64: Set -fpie when building the EFI stub (bnc#1012382).
- efi/libstub/arm64: Use hidden attribute for struct screen_info reference (bsc#1122650).
- enic: fix checksum validation for IPv6 (bnc#1012382).
- exec: avoid gcc-8 warning for get_task_comm (bnc#1012382).
- exec: load_script: do not blindly truncate shebang string (bnc#1012382).
- exportfs: do not read dentry after free (bnc#1012382).
- ext2: fix potential use after free (bnc#1012382).
- ext4: add missing brelse() add_new_gdb_meta_bg()'s error path (bnc#1012382).
- ext4: add missing brelse() in set_flexbg_block_bitmap()'s error path (bnc#1012382).
- ext4: add missing brelse() update_backups()'s error path (bnc#1012382).
- ext4: avoid buffer leak in ext4_orphan_add() after prior errors (bnc#1012382).
- ext4: avoid possible double brelse() in add_new_gdb() on error path (bnc#1012382).
- ext4: avoid potential extra brelse in setup_new_flex_group_blocks() (bnc#1012382).
- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bnc#1012382).
- ext4: fix argument checking in EXT4_IOC_MOVE_EXT (bnc#1012382).
- ext4: fix buffer leak in __ext4_read_dirblock() on error path (bnc#1012382).
- ext4: fix buffer leak in ext4_xattr_move_to_block() on error path (bnc#1012382).
- ext4: Fix crash during online resizing (bsc#1122779).
- ext4: fix EXT4_IOC_GROUP_ADD ioctl (bnc#1012382).
- ext4: fix missing cleanup if ext4_alloc_flex_bg_array() fails while resizing (bnc#1012382).
- ext4: fix possible inode leak in the retry loop of ext4_resize_fs() (bnc#1012382).
- ext4: fix possible leak of sbi-&gt;s_group_desc_leak in error path (bnc#1012382).
- ext4: fix possible use after free in ext4_quota_enable (bnc#1012382).
- ext4: force inode writes when nfsd calls commit_metadata() (bnc#1012382).
- ext4: initialize retries variable in ext4_da_write_inline_data_begin() (bnc#1012382).
- ext4: missing unlock/put_page() in ext4_try_to_write_inline_data() (bnc#1012382).
- ext4: release bs.bh before re-using in ext4_xattr_block_find() (bnc#1012382).
- f2fs: Add sanity_check_inode() function (bnc#1012382).
- f2fs: avoid unneeded loop in build_sit_entries (bnc#1012382).
- f2fs: check blkaddr more accuratly before issue a bio (bnc#1012382).
- f2fs: clean up argument of recover_data (bnc#1012382).
- f2fs: clean up with is_valid_blkaddr() (bnc#1012382).
- f2fs: detect wrong layout (bnc#1012382).
- f2fs: enhance sanity_check_raw_super() to avoid potential overflow (bnc#1012382).
- f2fs: factor out fsync inode entry operations (bnc#1012382).
- f2fs: fix inode cache leak (bnc#1012382).
- f2fs: fix invalid memory access (bnc#1012382).
- f2fs: fix missing up_read (bnc#1012382).
- f2fs: fix to avoid reading out encrypted data in page cache (bnc#1012382).
- f2fs: fix to convert inline directory correctly (bnc#1012382).
- f2fs: fix to determine start_cp_addr by sbi-&gt;cur_cp_pack (bnc#1012382).
- f2fs: fix to do sanity check with block address in main area (bnc#1012382).
- f2fs: fix to do sanity check with block address in main area v2 (bnc#1012382).
- f2fs: fix to do sanity check with cp_pack_start_sum (bnc#1012382).
- f2fs: fix to do sanity check with node footer and iblocks (bnc#1012382).
- f2fs: fix to do sanity check with reserved blkaddr of inline inode (bnc#1012382).
- f2fs: fix to do sanity check with secs_per_zone (bnc#1012382).
- f2fs: fix to do sanity check with user_block_count (bnc#1012382).
- f2fs: fix validation of the block count in sanity_check_raw_super (bnc#1012382).
- f2fs: fix wrong return value of f2fs_acl_create (bnc#1012382).
- f2fs: free meta pages if sanity check for ckpt is failed (bnc#1012382).
- f2fs: give -EINVAL for norecovery and rw mount (bnc#1012382).
- f2fs: introduce and spread verify_blkaddr (bnc#1012382).
- f2fs: introduce get_checkpoint_version for cleanup (bnc#1012382).
- f2fs: move dir data flush to write checkpoint process (bnc#1012382).
- f2fs: move sanity checking of cp into get_valid_checkpoint (bnc#1012382).
- f2fs: not allow to write illegal blkaddr (bnc#1012382).
- f2fs: put directory inodes before checkpoint in roll-forward recovery (bnc#1012382).
- f2fs: read page index before freeing (bnc#1012382).
- f2fs: remove an obsolete variable (bnc#1012382).
- f2fs: return error during fill_super (bnc#1012382).
- f2fs: sanity check on sit entry (bnc#1012382).
- f2fs: use crc and cp version to determine roll-forward recovery (bnc#1012382).
- fbdev: fbcon: Fix unregister crash when more than one framebuffer (bsc#1106929)
- fbdev: fbmem: behave better with small rotated displays and many CPUs (bsc#1106929)
- fcoe: remove duplicate debugging message in fcoe_ctlr_vn_add (bsc#1114763).
- Fix kabi for 'Ensure we commit after writeback is complete' (bsc#1111809).
- Fix problem with sharetransport= and NFSv4 (bsc#1114893).
- floppy: fix race condition in __floppy_read_block_0() (Git-fixes).
- flow_dissector: do not dissect l4 ports for fragments (bnc#1012382).
- fork: record start_time late (bnc#1012382).
- fs: add the fsnotify call to vfs_iter_write (bnc#1012382).
- fscache, cachefiles: remove redundant variable 'cache' (bnc#1012382).
- fscache: fix race between enablement and dropping of object (bsc#1107385).
- fscache: Fix race in fscache_op_complete() due to split atomic_sub &amp; read (Git-fixes).
- fscache: Pass the correct cancelled indications to fscache_op_complete() (Git-fixes).
- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (bnc#1012382).
- fs: do not scan the inode cache before SB_BORN is set (bnc#1012382).
- fs, elf: make sure to page align bss in load_elf_library (bnc#1012382).
- fs/epoll: drop ovflist branch prediction (bnc#1012382).
- fs/exofs: fix potential memory leak in mount option parsing (bnc#1012382).
- fs/fat/fatent.c: add cond_resched() to fat_count_free_clusters() (bnc#1012382).
- fs: fix lost error code in dio_complete (bsc#1117744).
- fuse: call pipe_buf_release() under pipe lock (bnc#1012382).
- fuse: decrement NR_WRITEBACK_TEMP on the right page (bnc#1012382).
- fuse: Dont call set_page_dirty_lock() for ITER_BVEC pages for async_dio (bnc#1012382).
- fuse: fix blocked_waitq wakeup (bnc#1012382).
- fuse: fix leaked notify reply (bnc#1012382).
- fuse: Fix use-after-free in fuse_dev_do_read() (bnc#1012382).
- fuse: Fix use-after-free in fuse_dev_do_write() (bnc#1012382).
- fuse: handle zero sized retrieve correctly (bnc#1012382).
- fuse: set FR_SENT while locked (bnc#1012382).
- futex: Fix (possible) missed wakeup (bsc#1050549).
- gdrom: fix a memory leak bug (bnc#1012382).
- genirq: Fix race on spurious interrupt detection (bnc#1012382).
- genwqe: Fix size check (bnc#1012382).
- gfs2: Do not leave s_fs_info pointing to freed memory in init_sbd (bnc#1012382).
- gfs2: Fix loop in gfs2_rbm_find (bnc#1012382).
- gfs2_meta: -&gt;mount() can get NULL dev_name (bnc#1012382).
- gfs2: Put bitmap buffers in put_super (bnc#1012382).
- gfs2: Revert 'Fix loop in gfs2_rbm_find' (bnc#1012382).
- git_sort.py: Remove non-existent remote tj/libata
- gpiolib: Fix return value of gpio_to_desc() stub if !GPIOLIB (Git-fixes).
- gpio: max7301: fix driver for use with CONFIG_VMAP_STACK (bnc#1012382).
- gpio: msic: fix error return code in platform_msic_gpio_probe() (bnc#1012382).
- gpio: pl061: handle failed allocations (bnc#1012382).
- gpu: host1x: fix error return code in host1x_probe() (bnc#1012382).
- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1106929)
- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1106929)
- gro_cell: add napi_disable in gro_cells_destroy (bnc#1012382).
- hfs: do not free node before using (bnc#1012382).
- hfsplus: do not free node before using (bnc#1012382).
- hfsplus: prevent btree data loss on root split (bnc#1012382).
- hfs: prevent btree data loss on root split (bnc#1012382).
- hid: debug: fix the ring buffer implementation (bnc#1012382).
- hid: hiddev: fix potential Spectre v1 (bnc#1012382).
- hid: lenovo: Add checks to fix of_led_classdev_register (bnc#1012382).
- hid: uhid: forbid UHID_CREATE under KERNEL_DS or elevated privileges (bnc#1012382).
- hpwdt add dynamic debugging (bsc#1114417).
- hpwdt calculate reload value on each use (bsc#1114417).
- hugetlbfs: dirty pages as they are added to pagecache (bnc#1012382).
- hugetlbfs: fix bug in pgoff overflow checking (bnc#1012382).
- hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (bnc#1012382).
- hwmon: (ibmpowernv) Remove bogus __init annotations (bnc#1012382).
- hwmon: (ina2xx) Fix current value calculation (bnc#1012382).
- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bnc#1012382).
- hwmon: (lm80) fix a missing check of the status of SMBus read (bnc#1012382).
- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (git-fixes).
- hwmon: (pmbus) Fix page count auto-detection (bnc#1012382).
- hwmon: (w83795) temp4_type has writable permission (bnc#1012382).
- hwpoison, memory_hotplug: allow hwpoisoned pages to be offlined (bnc#1116336).
- i2c-axxia: check for error conditions first (bnc#1012382).
- i2c: axxia: properly handle master timeout (bnc#1012382).
- i2c: dev: prevent adapter retries and timeout being set as minus value (bnc#1012382).
- i2c: scmi: Fix probe error on devices with an empty SMB0001 ACPI device node (bnc#1012382).
- IB/core: type promotion bug in rdma_rw_init_one_mr() ().
- IB/hfi1: Fix an out-of-bounds access in get_hw_stats ().
- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).
- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (bnc#1012382).
- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).
- ibmvnic: Convert reset work item mutex to spin lock ().
- ibmvnic: fix accelerated VLAN handling ().
- ibmvnic: fix index in release_rx_pools (bsc#1115440).
- ibmvnic: Fix non-atomic memory allocation in IRQ context ().
- ibmvnic: Increase maximum queue size limit (bsc#1121726).
- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).
- ibmvnic: remove ndo_poll_controller ().
- ibmvnic: Update driver queues after change in ring size support ().
- ib/rxe: Fix incorrect cache cleanup in error flow ().
- ib/rxe: replace kvfree with vfree ().
- ib/ucm: Fix Spectre v1 vulnerability (bnc#1012382).
- ide: pmac: add of_node_put() (bnc#1012382).
- ieee802154: lowpan_header_create check must check daddr (bnc#1012382).
- igb: Fix an issue that PME is not enabled during runtime suspend (bnc#1012382).
- igb: Remove superfluous reset to PHY and page 0 selection (bnc#1012382).
- iio: adc: at91: fix acking DRDY irq on simple conversions (bnc#1012382).
- iio: adc: at91: fix wrong channel number in triggered buffer mode (bnc#1012382).
- ima: fix showing large 'violations' or 'runtime_measurements_count' (bnc#1012382).
- inet: frags: add a pointer to struct netns_frags (bnc#1012382).
- inet: frags: better deal with smp races (bnc#1012382).
- inet: frags: break the 2GB limit for frags storage (bnc#1012382).
- inet: frags: change inet_frags_init_net() return value (bnc#1012382).
- inet: frags: do not clone skb in ip_expire() (bnc#1012382).
- inet: frags: fix ip6frag_low_thresh boundary (bnc#1012382).
- inet: frags: get rid of ipfrag_skb_cb/FRAG_CB (bnc#1012382).
- inet: frags: get rif of inet_frag_evicting() (bnc#1012382).
- inet: frags: refactor ipfrag_init() (bnc#1012382).
- inet: frags: refactor ipv6_frag_init() (bnc#1012382).
- inet: frags: refactor lowpan_net_frag_init() (bnc#1012382).
- inet: frags: remove inet_frag_maybe_warn_overflow() (bnc#1012382).
- inet: frags: remove some helpers (bnc#1012382).
- inet: frags: reorganize struct netns_frags (bnc#1012382).
- inet: frags: use rhashtables for reassembly units (bnc#1012382).
- Input: bma150 - register input device after setting private data (bnc#1012382).
- Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15ARR (bnc#1012382).
- Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15IGM (bnc#1012382).
- Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G (bnc#1012382).
- Input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bnc#1012382).
- Input: elan_i2c - add ELAN0620 to the ACPI table (bnc#1012382).
- Input: elan_i2c - add support for ELAN0621 touchpad (bnc#1012382).
- Input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bnc#1012382).
- Input: matrix_keypad - check for errors from of_get_named_gpio() (bnc#1012382).
- Input: omap-keypad - fix idle configuration to not block SoC idle states (bnc#1012382).
- Input: omap-keypad - fix keyboard debounce configuration (bnc#1012382).
- Input: restore EV_ABS ABS_RESERVED (bnc#1012382).
- Input: xpad - add GPD Win 2 Controller USB IDs (bnc#1012382).
- Input: xpad - add Mad Catz FightStick TE 2 VID/PID (bnc#1012382).
- Input: xpad - add more third-party controllers (bnc#1012382).
- Input: xpad - add PDP device id 0x02a4 (bnc#1012382).
- Input: xpad - add product ID for Xbox One S pad (bnc#1012382).
- Input: xpad - add support for PDP Xbox One controllers (bnc#1012382).
- Input: xpad - add support for SteelSeries Stratus Duo (bnc#1012382).
- Input: xpad - add support for Xbox1 PDP Camo series gamepad (bnc#1012382).
- Input: xpad - add USB IDs for Mad Catz Brawlstick and Razer Sabertooth (bnc#1012382).
- Input: xpad - avoid using __set_bit() for capabilities (bnc#1012382).
- Input: xpad - constify usb_device_id (bnc#1012382).
- Input: xpad - correctly sort vendor id's (bnc#1012382).
- Input: xpad - correct xbox one pad device name (bnc#1012382).
- Input: xpad - do not depend on endpoint order (bnc#1012382).
- Input: xpad - fix GPD Win 2 controller name (bnc#1012382).
- Input: xpad - fix PowerA init quirk for some gamepad models (bnc#1012382).
- Input: xpad - fix rumble on Xbox One controllers with 2015 firmware (bnc#1012382).
- Input: xpad - fix some coding style issues (bnc#1012382).
- Input: xpad - fix stuck mode button on Xbox One S pad (bnc#1012382).
- Input: xpad - fix Xbox One rumble stopping after 2.5 secs (bnc#1012382).
- Input: xpad - handle 'present' and 'gone' correctly (bnc#1012382).
- Input: xpad - move reporting xbox one home button to common function (bnc#1012382).
- Input: xpad - power off wireless 360 controllers on suspend (bnc#1012382).
- Input: xpad - prevent spurious input from wired Xbox 360 controllers (bnc#1012382).
- Input: xpad - quirk all PDP Xbox One gamepads (bnc#1012382).
- Input: xpad - remove spurious events of wireless xpad 360 controller (bnc#1012382).
- Input: xpad - remove unused function (bnc#1012382).
- Input: xpad - restore LED state after device resume (bnc#1012382).
- Input: xpad - simplify error condition in init_output (bnc#1012382).
- Input: xpad - sort supported devices by USB ID (bnc#1012382).
- Input: xpad - support some quirky Xbox One pads (bnc#1012382).
- Input: xpad - sync supported devices with 360Controller (bnc#1012382).
- Input: xpad - sync supported devices with XBCD (bnc#1012382).
- Input: xpad - sync supported devices with xboxdrv (bnc#1012382).
- Input: xpad - update Xbox One Force Feedback Support (bnc#1012382).
- Input: xpad - use LED API when identifying wireless controllers (bnc#1012382).
- Input: xpad - validate USB endpoint type during probe (bnc#1012382).
- Input: xpad - workaround dead irq_out after suspend/ resume (bnc#1012382).
- Input: xpad - xbox one elite controller support (bnc#1012382).
- intel_pstate: Update frequencies of policy-&gt;cpus only from -&gt;set_policy() (bsc#1120017).
- intel_th: msu: Fix an off-by-one in attribute store (bnc#1012382).
- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).
- iommu/amd: Fix amd_iommu=force_isolation (bsc#1106105).
- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).
- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).
- iommu/arm-smmu: Ensure that page-table updates are visible before TLBI (bsc#1106237).
- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bnc#1012382).
- iommu/ipmmu-vmsa: Fix crash on early domain free (bsc#1106105).
- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).
- iommu/vt-d: Fix NULL pointer dereference in prq_event_thread() (bsc#1106105).
- iommu/vt-d: Handle domain agaw being less than iommu agaw (bsc#1106105).
- iommu/vt-d: Use memunmap to free memremap (bsc#1106105).
- ip6mr: Fix potential Spectre v1 vulnerability (bnc#1012382).
- ip: add helpers to process in-order fragments faster (bnc#1012382).
- ipfrag: really prevent allocation on netns exit (bnc#1012382).
- ip: frags: fix crash in ip_do_fragment() (bnc#1012382).
- ipmi: Fix timer race with module unload (bnc#1012382).
- ipmi:ssif: Fix handling of multi-part return messages (bnc#1012382).
- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (bnc#1012382).
- ip: process in-order fragments efficiently (bnc#1012382).
- ip_tunnel: do not force DF when MTU is locked (bnc#1012382).
- ip_tunnel: Fix name string concatenate in __ip_tunnel_create() (bnc#1012382).
- ip: use rb trees for IP frag queue (bnc#1012382).
- ipv4: Fix potential Spectre v1 vulnerability (bnc#1012382).
- ipv4: frags: precedence bug in ip_expire() (bnc#1012382).
- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (bsc#1110286).
- ipv6: Check available headroom in ip6_xmit() even without options (bnc#1012382).
- ipv6: Consider sk_bound_dev_if when binding a socket to an address (bnc#1012382).
- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (bnc#1012382).
- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (bnc#1012382).
- ipv6: fix kernel-infoleak in ipv6_local_error() (bnc#1012382).
- ipv6: Fix PMTU updates for UDP/raw sockets in presence of VRF (bnc#1012382).
- ipv6: frags: rewrite ip6_expire_frag_queue() (bnc#1012382).
- ipv6: mcast: fix a use-after-free in inet6_mc_check (bnc#1012382).
- ipv6/ndisc: Preserve IPv6 control buffer if protocol error handlers are called (bnc#1012382).
- ipv6: orphan skbs in reassembly unit (bnc#1012382).
- ipv6: set rt6i_protocol properly in the route when it is installed (bsc#1114190).
- ipv6: suppress sparse warnings in IP6_ECN_set_ce() (bnc#1012382).
- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (bnc#1012382).
- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bnc#1012382).
- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bnc#1012382).
- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bnc#1012382).
- iser: set sector for ambiguous mr status errors (bnc#1012382).
- iwlwifi: mvm: fix regulatory domain update when the firmware starts (bnc#1012382).
- iwlwifi: mvm: support sta_statistics() even on older firmware (bnc#1012382).
- ixgbe: Add function for checking to see if we can reuse page (bsc#1100105).
- ixgbe: Add support for build_skb (bsc#1100105).
- ixgbe: Add support for padding packet (bsc#1100105).
- ixgbe: Break out Rx buffer page management (bsc#1100105).
- ixgbe: Fix output from ixgbe_dump (bsc#1100105).
- ixgbe: fix possible race in reset subtask (bsc#1101557).
- ixgbe: Make use of order 1 pages and 3K buffers independent of FCoE (bsc#1100105).
- ixgbe: Only DMA sync frame length (bsc#1100105).
- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bnc#1012382).
- ixgbe: Refactor queue disable logic to take completion time into account (bsc#1101557).
- ixgbe: Reorder Tx/Rx shutdown to reduce time needed to stop device (bsc#1101557).
- ixgbe: Update code to better handle incrementing page count (bsc#1100105).
- ixgbe: Update driver to make use of DMA attributes in Rx path (bsc#1100105).
- ixgbe: Use length to determine if descriptor is done (bsc#1100105).
- jbd2: fix use after free in jbd2_log_do_checkpoint() (bnc#1012382).
- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bnc#1012382).
- jffs2: free jffs2_sb_info through jffs2_kill_sb() (bnc#1012382).
- kabi: hwpoison, memory_hotplug: allow hwpoisoned pages to be offlined (bnc#1116336).
- kabi: protect get_vaddr_frames (kabi).
- kabi: protect linux/kfifo.h include in hid-debug (kabi).
- kabi: protect struct azx (kabi).
- kabi: protect struct cfs_bandwidth (kabi).
- kabi: protect struct esp (kabi).
- kabi: protect struct fuse_io_priv (kabi).
- kabi: protect struct hda_bus (kabi).
- kabi: protect __usb_get_extra_descriptor (kabi).
- kabi: protect xen/xen-ops.h include in xlate_mmu.c (kabi).
- kabi: reorder new slabinfo fields in struct kmem_cache_node (bnc#1116653).
- kabi: revert sig change on pnfs_read_resend_pnfs (git-fixes).
- kaweth: use skb_cow_head() to deal with cloned skbs (bnc#1012382).
- kbuild: Add better clang cross build support (bnc#1012382).
- kbuild: Add __cc-option macro (bnc#1012382).
- kbuild: Add support to generate LLVM assembly files (bnc#1012382).
- kbuild: allow to use GCC toolchain not in Clang search path (bnc#1012382).
- kbuild: clang: add -no-integrated-as to KBUILD_[AC]FLAGS (bnc#1012382).
- kbuild: clang: Disable 'address-of-packed-member' warning (bnc#1012382).
- kbuild: clang: disable unused variable warnings only when constant (bnc#1012382).
- kbuild: clang: fix build failures with sparse check (bnc#1012382).
- kbuild: clang: remove crufty HOSTCFLAGS (bnc#1012382).
- kbuild: Consolidate header generation from ASM offset information (bnc#1012382).
- kbuild: consolidate redundant sed script ASM offset generation (bnc#1012382).
- kbuild: drop -Wno-unknown-warning-option from clang options (bnc#1012382).
- kbuild: fix asm-offset generation to work with clang (bnc#1012382).
- kbuild: fix kernel/bounds.c 'W=1' warning (bnc#1012382).
- kbuild: fix linker feature test macros when cross compiling with Clang (bnc#1012382).
- kbuild, LLVMLinux: Add -Werror to cc-option to support clang (bnc#1012382).
- kbuild: move cc-option and cc-disable-warning after incl. arch Makefile (bnc#1012382).
- kbuild: Set KBUILD_CFLAGS before incl. arch Makefile (bnc#1012382).
- kbuild: set no-integrated-as before incl. arch Makefile (bnc#1012382).
- kbuild: suppress packed-not-aligned warning for default setting only (bnc#1012382).
- kbuild: use -Oz instead of -Os when using clang (bnc#1012382).
- kconfig: fix file name and line number of warn_ignored_character() (bnc#1012382).
- kconfig: fix memory leak when EOF is encountered in quotation (bnc#1012382).
- kdb: use memmove instead of overlapping memcpy (bnc#1012382).
- kdb: Use strscpy with destination buffer size (bnc#1012382).
- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (bnc#1012382).
- kernel/hung_task.c: break RCU locks based on jiffies (bnc#1012382).
- kernel-source.spec: Align source numbering.
- kernfs: Replace strncpy with memcpy (bnc#1012382).
- keys: put keyring if install_session_keyring_to_cred() fails (bnc#1012382).
- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bnc#1012382).
- kgdboc: Fix restrict error (bnc#1012382).
- kgdboc: Fix warning with module build (bnc#1012382).
- kgdboc: Passing ekgdboc to command line causes panic (bnc#1012382).
- kobject: Replace strncpy with memcpy (bnc#1012382).
- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bnc#1012382).
- kvm/arm64: Fix caching of host MDCR_EL2 value (bsc#1121242).
- kvm/arm: Restore banked registers and physical timer access on hyp_panic() (bsc#1121240).
- kvm/mmu: Fix race in emulated page table writes (bnc#1012382).
- kvm/nvmx: Always reflect #NM VM-exits to L1 (bsc#1106240).
- kvm/nvmx: Eliminate vmcs02 pool (bnc#1012382).
- kvm/nvmx: mark vmcs12 pages dirty on L2 exit (bnc#1012382).
- kvm/ppc: Move and undef TRACE_INCLUDE_PATH/FILE (bnc#1012382).
- kvm/svm: Allow direct access to MSR_IA32_SPEC_CTRL (bnc#1012382 bsc#1068032).
- kvm/svm: Ensure an IBPB on all affected CPUs when freeing a vmcb (bsc#1114648).
- kvm/vmx: Allow direct access to MSR_IA32_SPEC_CTRL (bnc#1012382 bsc#1068032 bsc#1096242 bsc#1096281).
- kvm/vmx: Emulate MSR_IA32_ARCH_CAPABILITIES (bnc#1012382).
- kvm/vmx: Fix x2apic check in vmx_msr_bitmap_mode() (bsc#1124166).
- kvm/vmx: introduce alloc_loaded_vmcs (bnc#1012382).
- kvm/vmx: make MSR bitmaps per-VCPU (bnc#1012382).
- kvm/vmx: Missing part of upstream commit 904e14fb7cb9 (bsc#1124166).
- kvm/x86: Add IBPB support (bnc#1012382 bsc#1068032 bsc#1068032).
- kvm/x86: fix empty-body warnings (bnc#1012382).
- kvm/x86: Fix single-step debugging (bnc#1012382).
- kvm/x86: Remove indirect MSR op calls from SPEC_CTRL (bnc#1012382).
- kvm/x86: svm: report MSR_IA32_MCG_EXT_CTL as unsupported (bnc#1012382).
- kvm/x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bnc#1012382).
- l2tp: copy 4 more bytes to linear part if necessary (bnc#1012382).
- l2tp: fix reading optional fields of L2TPv3 (bnc#1012382).
- l2tp: remove l2specific_len dependency in l2tp_core (bnc#1012382).
- lan78xx: Check for supported Wake-on-LAN modes (bnc#1012382).
- leds: call led_pwm_set() in leds-pwm to enforce default LED_OFF (bnc#1012382).
- leds: leds-gpio: Fix return value check in create_gpio_led() (bnc#1012382).
- leds: turn off the LED and wait for completion on unregistering LED class device (bnc#1012382).
- libata: whitelist all SAMSUNG MZ7KM* solid-state disks (bnc#1012382).
- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125810).
- libceph: bump CEPH_MSG_MAX_DATA_LEN (bsc#1114839).
- libceph: fall back to sendmsg for slab pages (bsc#1118316).
- libfc: sync strings with upstream versions (bsc#1114763).
- lib/interval_tree_test.c: allow full tree search (bnc#1012382).
- lib/interval_tree_test.c: allow users to limit scope of endpoint (bnc#1012382).
- lib/interval_tree_test.c: make test options module parameters (bnc#1012382).
- libnvdimm, {btt, blk}: do integrity setup before add_disk() (bsc#1118926).
- libnvdimm, dimm: fix dpa reservation vs uninitialized label area (bsc#1118936).
- libnvdimm: fix ars_status output length calculation (bsc#1124777).
- libnvdimm: fix integer overflow static analysis warning (bsc#1118922).
- libnvdimm: fix nvdimm_bus_lock() vs device_lock() ordering (bsc#1118915).
- libnvdimm: Hold reference on parent while scheduling async init (bnc#1012382).
- libnvdimm, pfn: Pad pfn namespaces relative to other regions (bsc#1124811).
- libnvdimm: Use max contiguous area for namespace size (bsc#1124780).
- lib/raid6: Fix arm64 test build (bnc#1012382).
- lib/rbtree_test.c: make input module parameters (bnc#1012382).
- lib/rbtree-test: lower default params (bnc#1012382).
- llc: do not use sk_eat_skb() (bnc#1012382).
- lockd: fix access beyond unterminated strings in prints (bnc#1012382).
- locking/lockdep: Fix debug_locks off performance problem (bnc#1012382).
- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).
- loop: Fix double mutex_unlock(&amp;loop_ctl_mutex) in loop_control_ioctl() (bnc#1012382).
- loop: Fold __loop_release into loop_release (bnc#1012382).
- loop: Get rid of loop_index_mutex (bnc#1012382).
- lsm: Check for NULL cred-security on free (bnc#1012382).
- mac80211: Always report TX status (bnc#1012382).
- mac80211: Clear beacon_int in ieee80211_do_stop (bnc#1012382).
- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bnc#1012382).
- mac80211: fix radiotap vendor presence bitmap handling (bnc#1012382).
- mac80211: fix reordering of buffered broadcast packets (bnc#1012382).
- mac80211_hwsim: do not omit multicast announce of first added radio (bnc#1012382).
- mac80211_hwsim: fix module init error paths for netlink (bnc#1012382).
- mac80211_hwsim: Timer should be initialized before device registered (bnc#1012382).
- mac80211: ignore NullFunc frames in the duplicate detection (bnc#1012382).
- mac80211: ignore tx status for PS stations in ieee80211_tx_status_ext (bnc#1012382).
- mach64: fix display corruption on big endian machines (bnc#1012382).
- mach64: fix image corruption due to reading accelerator registers (bnc#1012382).
- matroxfb: fix size of memcpy (bnc#1012382).
- md: batch flush requests (bsc#1119680).
- md: do not check MD_SB_CHANGE_CLEAN in md_allow_write (Git-fixes).
- md: fix invalid stored role for a disk (bnc#1012382).
- md: fix invalid stored role for a disk - try2 (bnc#1012382).
- md: reorder flag_bits to match upstream commits
- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bnc#1012382).
- media: dvb-frontends: fix i2c access helpers for KASAN (bnc#1012382).
- media: em28xx: fix input name for Terratec AV 350 (bnc#1012382).
- media: em28xx: Fix misplaced reset of dev-&gt;v4l::field_count (bnc#1012382).
- media: em28xx: Fix use-after-free when disconnecting (bnc#1012382).
- media: em28xx: make v4l2-compliance happier by starting sequence on zero (bnc#1012382).
- media: em28xx: use a default format if TRY_FMT fails (bnc#1012382).
- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bnc#1012382).
- media: pci: cx23885: handle adding to list failure (bnc#1012382).
- media: tvp5150: fix width alignment during set_selection() (bnc#1012382).
- media: v4l: event: Add subscription to list before calling 'add' operation (bnc#1012382).
- media: vb2: be sure to unlock mutex on errors (bnc#1012382).
- media: vb2: vb2_mmap: move lock up (bnc#1012382).
- media: vivid: fix error handling of kthread_run (bnc#1012382).
- media: vivid: free bitmap_cap when updating std/timings/etc (bnc#1012382).
- media: vivid: set min width/height to a value &gt; 0 (bnc#1012382).
- memstick: Prevent memstick host from getting runtime suspended during card detection (bnc#1012382).
- mfd: tps6586x: Handle interrupts on suspend (bnc#1012382).
- mips: bpf: fix encoding bug for mm_srlv32_op (bnc#1012382).
- mips: cm: reprime error cause (bnc#1012382).
- mips: fix n32 compat_ipc_parse_version (bnc#1012382).
- mips: OCTEON: do not set octeon_dma_bar_type if PCI is disabled (bnc#1012382).
- mips: SiByte: Enable swiotlb for SWARM, LittleSur and BigSur (bnc#1012382).
- mips: VDSO: Include $(ccflags-vdso) in o32,n32 .lds builds (bnc#1012382).
- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bnc#1012382).
- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bnc#1012382).
- misc: vexpress: Off by one in vexpress_syscfg_exec() (bnc#1012382).
- mmc: atmel-mci: do not assume idle after atmci_request_end (bnc#1012382).
- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1120902).
- mmc: core: Reset HPI enabled state during re-init and in case of errors (bnc#1012382).
- mm: cleancache: fix corruption on missed inode invalidation (bnc#1012382).
- mmc: OMAP: fix broken MMC on OMAP15XX/OMAP5910/OMAP310 (bnc#1012382).
- mmc: omap_hsmmc: fix DMA API warning (bnc#1012382).
- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bnc#1012382).
- mmc: sdhci-pci-o2micro: Add quirk for O2 Micro dev 0x8620 rev 0x01 (bnc#1012382).
- mm, devm_memremap_pages: kill mapping 'System RAM' support (bnc#1012382).
- mm: do not bug_on on incorrect length in __mm_populate() (bnc#1012382).
- mm: do not miss the last page because of round-off error (bnc#1118798).
- mm, elf: handle vm_brk error (bnc#1012382).
- mm, hugetlb: fix huge_pte_alloc BUG_ON (bsc#1119204).
- mm: hwpoison: call shake_page() after try_to_unmap() for mlocked page (bnc#1116336).
- mm: lower the printk loglevel for __dump_page messages (generic hotplug debugability).
- mm, memory_hotplug: be more verbose for memory offline failures (generic hotplug debugability).
- mm, memory_hotplug: drop pointless block alignment checks from __offline_pages (generic hotplug debugability).
- mm, memory_hotplug: print reason for the offlining failure (generic hotplug debugability).
- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (bnc#1012382).
- mm: migration: fix migration of huge PMD shared pages (bnc#1012382).
- mm: mlock: avoid increase mm-&gt;locked_vm on mlock() when already mlock2(,MLOCK_ONFAULT) (bnc#1012382).
- mm/nommu.c: Switch __get_user_pages_unlocked() to use __get_user_pages() (bnc#1012382).
- mm: only report isolation failures when offlining memory (generic hotplug debugability).
- mm, oom: fix use-after-free in oom_kill_process (bnc#1012382).
- mm, page_alloc: drop should_suppress_show_mem (bnc#1125892, bnc#1106061).
- mm/page-writeback.c: do not break integrity writeback on -&gt;writepage() error (bnc#1012382).
- mm: Preserve _PAGE_DEVMAP across mprotect() calls (bsc#1118790).
- mm: print more information about mapping in __dump_page (generic hotplug debugability).
- mm, proc: be more verbose about unstable VMA flags in /proc/&amp;lt;pid&gt;/smaps (bnc#1012382).
- mm: put_and_wait_on_page_locked() while page is migrated (bnc#1109272).
- mm: refuse wrapped vm_brk requests (bnc#1012382).
- mm: remove write/force parameters from __get_user_pages_locked() (bnc#1012382 bsc#1027260).
- mm: remove write/force parameters from __get_user_pages_unlocked() (bnc#1012382 bsc#1027260).
- mm: replace __access_remote_vm() write parameter with gup_flags (bnc#1012382).
- mm: replace access_remote_vm() write parameter with gup_flags (bnc#1012382).
- mm: replace get_user_pages_locked() write/force parameters with gup_flags (bnc#1012382 bsc#1027260).
- mm: replace get_user_pages_unlocked() write/force parameters with gup_flags (bnc#1012382 bsc#1027260).
- mm: replace get_user_pages() write/force parameters with gup_flags (bnc#1012382 bsc#1027260).
- mm: replace get_vaddr_frames() write/force parameters with gup_flags (bnc#1012382).
- mm, slab: faster active and free stats (bsc#1116653, VM Performance).
- mm/slab: improve performance of gathering slabinfo stats (bsc#1116653, VM Performance).
- mm, slab: maintain total slab count instead of active count (bsc#1116653, VM Performance).
- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).
- modpost: validate symbol names also in find_elf_symbol (bnc#1012382).
- modules: mark __inittest/__exittest as __maybe_unused (bnc#1012382).
- mount: Do not allow copying MNT_UNBINDABLE|MNT_LOCKED mounts (bnc#1012382).
- mount: Prevent MNT_DETACH from disconnecting locked mounts (bnc#1012382).
- mount: Retest MNT_LOCKED in do_umount (bnc#1012382).
- Move patches to sorted range, p1
- Move /proc/sys/vm/procfs-drop-fd-dentries to /proc/sys/fs/procfs-drop-fd-dentries (bsc#1086652) This was incorrectly put in /proc/sys/vm.
- msi: Disable MSI also when pcie-octeon.pcie_disable on (bnc#1012382).
- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bnc#1012382).
- mtd: rawnand: gpmi: fix MX28 bus master lockup problem (bnc#1012382).
- mtd: spi-nor: Add support for is25wp series chips (bnc#1012382).
- mv88e6060: disable hardware level MAC learning (bnc#1012382).
- mwifiex: Fix NULL pointer dereference in skb_dequeue() (bnc#1012382).
- mwifiex: fix p2p device does not find in scan problem (bnc#1012382).
- namei: allow restricted O_CREAT of FIFOs and regular files (bnc#1012382).
- neighbour: Avoid writing before skb-&gt;head in neigh_hh_output() (bnc#1012382).
- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (bnc#1012382).
- net/af_iucv: drop inbound packets with invalid flags (bnc#1114475, LTC#172679).
- net/af_iucv: fix skb handling on HiperTransport xmit error (bnc#1114475, LTC#172679).
- net: amd: add missing of_node_put() (bnc#1012382).
- net: bcmgenet: fix OF child-node lookup (bnc#1012382).
- net: bridge: fix a bug on using a neighbour cache entry without checking its state (bnc#1012382).
- net: bridge: Fix ethernet header pointer before check skb forwardable (bnc#1012382).
- net: bridge: remove ipv6 zero address check in mcast queries (bnc#1012382).
- net: call sk_dst_reset when set SO_DONTROUTE (bnc#1012382).
- net: cxgb3_main: fix a missing-check bug (bnc#1012382).
- net: dp83640: expire old TX-skb (bnc#1012382).
- net: drop skb on failure in ip_check_defrag() (bnc#1012382).
- net: drop write-only stack variable (bnc#1012382).
- net: dsa: slave: Do not propagate flag changes on down slave interfaces (bnc#1012382).
- net: ena: add functions for handling Low Latency Queues in ena_com (bsc#1117562).
- net: ena: add functions for handling Low Latency Queues in ena_netdev (bsc#1117562).
- net: ena: change rx copybreak default to reduce kernel memory pressure (bsc#1117562).
- net: ena: complete host info to match latest ENA spec (bsc#1117562).
- net: ena: enable Low Latency Queues (bsc#1117562).
- net: ena: explicit casting and initialization, and clearer error handling (bsc#1117562).
- net: ena: fix auto casting to boolean (bsc#1117562).
- net: ena: fix compilation error in xtensa architecture (bsc#1117562).
- net: ena: fix crash during ena_remove() (bsc#1108240).
- net: ena: fix crash during failed resume from hibernation (bsc#1117562).
- net: ena: fix indentations in ena_defs for better readability (bsc#1117562).
- net: ena: Fix Kconfig dependency on X86 (bsc#1117562).
- net: ena: fix NULL dereference due to untimely napi initialization (bsc#1117562).
- net: ena: fix rare bug when failed restart/resume is followed by driver removal (bsc#1117562).
- net: ena: fix warning in rmmod caused by double iounmap (bsc#1117562).
- net: ena: introduce Low Latency Queues data structures according to ENA spec (bsc#1117562).
- net: ena: limit refill Rx threshold to 256 to avoid latency issues (bsc#1117562).
- net: ena: minor performance improvement (bsc#1117562).
- net: ena: remove ndo_poll_controller (bsc#1117562).
- net: ena: remove redundant parameter in ena_com_admin_init() (bsc#1117562).
- net: ena: update driver version from 2.0.1 to 2.0.2 (bsc#1108240).
- net: ena: update driver version to 2.0.1 (bsc#1117562).
- net: ena: use CSUM_CHECKED device indication to report skb's checksum status (bsc#1117562).
- net: faraday: ftmac100: remove netif_running(netdev) check before disabling interrupts (bnc#1012382).
- netfilter: ipset: actually allow allowable CIDR 0 in hash:net,port,net (bnc#1012382).
- netfilter: ipset: Correct rcu_dereference() call in ip_set_put_comment() (bnc#1012382).
- netfilter: nf_tables: fix oops when inserting an element into a verdict map (bnc#1012382).
- netfilter: xt_IDLETIMER: add sysfs filename checking routine (bnc#1012382).
- net: fix pskb_trim_rcsum_slow() with odd trim offset (bnc#1012382).
- net: Fix usage of pskb_trim_rcsum (bnc#1012382).
- net-gro: reset skb-&gt;pkt_type in napi_reuse_skb() (bnc#1012382).
- net: hisilicon: remove unexpected free_netdev (bnc#1012382).
- net: ibm: fix return type of ndo_start_xmit function ().
- net/ibmnvic: Fix deadlock problem in reset ().
- net/ibmvnic: Fix RTNL deadlock during device reset (bnc#1115431).
- net: ieee802154: 6lowpan: fix frag reassembly (bnc#1012382).
- net/ipv4: defensive cipso option parsing (bnc#1012382).
- net: ipv4: do not handle duplicate fragments as overlapping (bnc#1012382 bsc#1116345).
- net: ipv4: do not handle duplicate fragments as overlapping (bsc#1116345).
- net: ipv4: Fix memory leak in network namespace dismantle (bnc#1012382).
- net/ipv6: Fix index counter for unicast addresses in in6_dump_addrs (bnc#1012382).
- net/mlx4_core: Add masking for a few queries on HCA caps (bnc#1012382).
- net/mlx4_core: Correctly set PFC param if global pause is turned off (bsc#1015336 bsc#1015337 bsc#1015340).
- net/mlx4_core: Fix uninitialized variable compilation warning (bnc#1012382).
- net/mlx4_core: Zero out lkey field in SW2HW_MPT fw command (bnc#1012382).
- net/mlx4: Fix UBSAN warning of signed integer overflow (bnc#1012382).
- net: modify skb_rbtree_purge to return the truesize of all purged skbs (bnc#1012382).
- net: phy: do not allow __set_phy_supported to add unsupported modes (bnc#1012382).
- net: Prevent invalid access to skb-&gt;prev in __qdisc_drop_all (bnc#1012382).
- net: pskb_trim_rcsum() and CHECKSUM_COMPLETE are friends (bnc#1012382).
- net: qla3xxx: Remove overflowing shift statement (bnc#1012382).
- netrom: fix locking in nr_find_socket() (bnc#1012382).
- netrom: switch to sock timer API (bnc#1012382).
- net/rose: fix NULL ax25_cb kernel panic (bnc#1012382).
- net: sched: gred: pass the right attribute to gred_change_table_def() (bnc#1012382).
- net_sched: refetch skb protocol for each filter (bnc#1012382).
- net: socket: fix a missing-check bug (bnc#1012382).
- net: speed up skb_rbtree_purge() (bnc#1012382).
- net: stmmac: Fix stmmac_mdio_reset() when building stmmac as modules (bnc#1012382).
- net: systemport: Fix WoL with password after deep sleep (bnc#1012382).
- net: thunderx: fix NULL pointer dereference in nic_remove (bnc#1012382).
- new helper: uaccess_kernel() (bnc#1012382).
- nfc: nfcmrvl_uart: fix OF child-node lookup (bnc#1012382).
- nfc: nxp-nci: Include unaligned.h instead of access_ok.h (bnc#1012382).
- nfit: fix unchecked dereference in acpi_nfit_ctl (bsc#1125014).
- nfit: skip region registration for incomplete control regions (bsc#1118930).
- nfsd4: fix crash on writing v4_end_grace before nfsd startup (bnc#1012382).
- nfsd: Fix an Oops in free_session() (bnc#1012382).
- nfs: Ensure we commit after writeback is complete (bsc#1111809).
- nfs: nfs_compare_mount_options always compare auth flavors (bnc#1012382).
- nfsv4.1: Fix the r/wsize checking (bnc#1012382).
- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).
- niu: fix missing checks of niu_pci_eeprom_read (bnc#1012382).
- nvme: validate controller state before rescheduling keep alive (bsc#1103257).
- ocfs2: do not clear bh uptodate for block read (bnc#1012382).
- ocfs2: fix a misuse a of brelse after failing ocfs2_check_dir_entry (bnc#1012382).
- ocfs2: fix deadlock caused by ocfs2_defrag_extent() (bnc#1012382).
- ocfs2: fix panic due to unrecovered local alloc (bnc#1012382).
- ocfs2: fix potential use after free (bnc#1012382).
- of: add helper to lookup compatible child node (bnc#1012382).
- omap2fb: Fix stack memory disclosure (bsc#1106929)
- openvswitch: Avoid OOB read when parsing flow nlattrs (bnc#1012382).
- packet: Do not leak dev refcounts on error exit (bnc#1012382).
- packet: validate address length (bnc#1012382).
- packet: validate address length if non-zero (bnc#1012382).
- parisc: Fix address in HPMC IVA (bnc#1012382).
- parisc: Fix map_pages() to not overwrite existing pte entries (bnc#1012382).
- pci: Add Device IDs for Intel GPU 'spurious interrupt' quirk (bnc#1012382).
- pci: altera: Check link status before retrain link (bnc#1012382).
- pci: altera: Fix altera_pcie_link_is_up() (bnc#1012382).
- pci: altera: Move retrain from fixup to altera_pcie_host_init() (bnc#1012382).
- pci: altera: Poll for link training status after retraining the link (bnc#1012382).
- pci: altera: Poll for link up status after retraining the link (bnc#1012382).
- pci: altera: Reorder read/write functions (bnc#1012382).
- pci: altera: Rework config accessors for use without a struct pci_bus (bnc#1012382).
- pci/ASPM: Do not initialize link state when aspm_disabled is set (bsc#1109806).
- pci/ASPM: Fix link_state teardown on device removal (bsc#1109806).
- pci: vmd: Detach resources after stopping root bus (bsc#1106105).
- pcmcia: Implement CLKRUN protocol disabling for Ricoh bridges (bnc#1012382).
- perf/bpf: Convert perf_event_array to use struct file (bsc#1119967).
- perf/core: Do not leak event in the syscall error path (bnc#1012382).
- perf/core: Do not WARN() for impossible ring-buffer sizes (bnc#1012382).
- perf/core: Fix impossible ring-buffer sizes warning (bnc#1012382).
- perf intel-pt: Fix error with config term 'pt=0' (bnc#1012382).
- perf parse-events: Fix unchecked usage of strncpy() (bnc#1012382).
- perf pmu: Suppress potential format-truncation warning (bnc#1012382).
- perf/ring_buffer: Prevent concurent ring buffer access (bnc#1012382).
- perf svghelper: Fix unchecked usage of strncpy() (bnc#1012382).
- perf tests evsel-tp-sched: Fix bitwise operator (bnc#1012382).
- perf tools: Add Hygon Dhyana support (bnc#1012382).
- perf tools: Cleanup trace-event-info 'tdata' leak (bnc#1012382).
- perf tools: Disable parallelism for 'make clean' (bnc#1012382).
- perf tools: Free temporary 'sys' string in read_event_files() (bnc#1012382).
- perf unwind: Take pgoff into account when reporting elf to libdwfl (bnc#1012382).
- perf unwind: Unwind with libdw does not take symfs into account (bnc#1012382).
- perf/x86/intel/uncore: Add Node ID mask (bnc#1012382).
- pinctrl: msm: fix gpio-hog related boot issues (bnc#1012382).
- pinctrl: qcom: spmi-mpp: Fix drive strength setting (bnc#1012382).
- pinctrl: qcom: spmi-mpp: Fix err handling of pmic_mpp_set_mux (bnc#1012382).
- pinctrl: spmi-mpp: Fix pmic_mpp_config_get() to be compliant (bnc#1012382).
- pinctrl: ssbi-gpio: Fix pm8xxx_pin_config_get() to be compliant (bnc#1012382).
- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bnc#1012382).
- platform/x86: acerhdf: Add BIOS entry for Gateway LT31 v1.3307 (bnc#1012382).
- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bnc#1012382).
- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bnc#1012382).
- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bnc#1012382).
- platform/x86: thinkpad_acpi: Proper model/release matching (bsc#1099810).
- pm / devfreq: tegra: fix error return code in tegra_devfreq_probe() (bnc#1012382).
- pNFS: Fix a deadlock between read resends and layoutreturn (git-fixes).
- pNFS/flexfiles: Fix up the ff_layout_write_pagelist failure path (git-fixes).
- pNFS/flexfiles: When checking for available DSes, conditionally check for MDS io (git-fixes).
- pnfs: set NFS_IOHDR_REDO in pnfs_read_resend_pnfs (git-fixes).
- powerpc/64s: consolidate MCE counter increment (bsc#1094244).
- powerpc/boot: Ensure _zimage_start is a weak symbol (bnc#1012382).
- powerpc/boot: Fix random libfdt related build errors (bnc#1012382).
- powerpc/boot: Request no dynamic linker for boot wrapper (bsc#1070805).
- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).
- powerpc: Detect the presence of big-cores via 'ibm, thread-groups' (bsc#1109695).
- powerpc: Fix COFF zImage booting on old powermacs (bnc#1012382).
- powerpc: handle RFI (exrfi and fallback area) and STF (exrfi).
- powerpc, hotplug: Avoid to touch non-existent cpumasks (bsc#1109695).
- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).
- powerpc/mm/radix: Use mm-&gt;task_size for boundary checking instead of addr_limit (bsc#1027457).
- powerpc/msi: Fix compile error on mpc83xx (bnc#1012382).
- powerpc/msi: Fix NULL pointer access in teardown code (bnc#1012382).
- powerpc/nohash: fix undefined behaviour when testing page size support (bnc#1012382).
- powerpc/numa: Suppress 'VPHN is not supported' messages (bnc#1012382).
- powerpc/powernv: Do not select the cpufreq governors (bsc#1066223).
- powerpc/powernv: Fix opal_event_shutdown() called with interrupts disabled (bsc#1066223).
- powerpc/powernv/pci: Work around races in PCI bridge enabling (bsc#1066223).
- powerpc/pseries: add of_node_put() in dlpar_detach_node() (bnc#1012382).
- powerpc/pseries/cpuidle: Fix preempt warning (bnc#1012382).
- powerpc/pseries: Fix DTL buffer registration (bsc#1066223).
- powerpc/pseries: Fix how we iterate over the DTL entries (bsc#1066223).
- powerpc/pseries/mobility: Extend start/stop topology update scope (bsc#1116950, bsc#1115709).
- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).
- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).
- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).
- powerpc/smp: Rework CPU topology construction (bsc#1109695).
- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).
- powerpc/traps: restore recoverability of machine_check interrupts (bsc#1094244).
- powerpc/uaccess: fix warning/error with access_ok() (bnc#1012382).
- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).
- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).
- power: supply: olpc_battery: correct the temperature units (bnc#1012382).
- printk: Fix panic caused by passing log_buf_len to command line (bnc#1012382).
- proc: Remove empty line in /proc/self/status (bnc#1012382 bsc#1094823).
- Provide a temporary fix for STIBP on-by-default See bsc#1116497 for details.
- pstore: Convert console write to use -&gt;write_buf (bnc#1012382).
- pstore/ram: Do not treat empty buffers as valid (bnc#1012382).
- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bnc#1012382).
- ptp: fix Spectre v1 vulnerability (bnc#1012382).
- pxa168fb: prepare the clock (bnc#1012382).
- qed: Fix bitmap_weight() check (bsc#1019695).
- qed: Fix PTT leak in qed_drain() (bnc#1012382).
- qed: Fix QM getters to always return a valid pq (bsc#1019695 ).
- qed: Fix reading wrong value in loop condition (bnc#1012382).
- r8152: Check for supported Wake-on-LAN Modes (bnc#1012382).
- r8169: Add support for new Realtek Ethernet (bnc#1012382).
- r8169: fix NAPI handling under high load (bnc#1012382).
- rapidio/rionet: do not free skb before reading its length (bnc#1012382).
- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125808).
- rcu: Force boolean subscript for expedited stall warnings (bnc#1012382).
- RDMA/bnxt_re: Fix a couple off by one bugs (bsc#1020413, ).
- RDMA/bnxt_re: Synchronize destroy_qp with poll_cq (bsc#1125446).
- RDMA/ucma: Fix Spectre v1 vulnerability (bnc#1012382).
- Refresh patches.kabi/x86-cpufeature-preserve-numbers.patch. (bsc#1122651)
- reiserfs: propagate errors from fill_with_dentries() properly (bnc#1012382).
- Revert 'Bluetooth: h5: Fix missing dependency on BT_HCIUART_SERDEV' (bnc#1012382).
- Revert 'ceph: fix dentry leak in splice_dentry()' (bsc#1114839).
- Revert 'cifs: In Kconfig CONFIG_CIFS_POSIX needs depends on legacy (insecure cifs)' (bnc#1012382).
- Revert 'drm/rockchip: Allow driver to be shutdown on reboot/kexec' (bsc#1106929)
- Revert 'exec: load_script: do not blindly truncate shebang string' (bnc#1012382).
- Revert 'Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G' (bnc#1012382).
- Revert 'iommu/io-pgtable-arm: Check for v7s-incapable systems' (bsc#1106105).
- Revert 'loop: Fix double mutex_unlock(&amp;loop_ctl_mutex) in loop_control_ioctl()' (bnc#1012382).
- Revert 'loop: Fold __loop_release into loop_release' (bnc#1012382).
- Revert 'loop: Get rid of loop_index_mutex' (bnc#1012382).
- Revert 'media: videobuf2-core: do not call memop 'finish' when queueing' (bnc#1012382).
- Revert 'mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1120902).' The backport patch does not built properly.
- Revert 'PCI/ASPM: Do not initialize link state when aspm_disabled is set' (bsc#1106105).
- Revert 'usb: musb: musb_host: Enable HCD_BH flag to handle urb return in bottom half' (bsc#1047487).
- Revert 'wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout()' (bnc#1012382).
- rhashtable: Add rhashtable_lookup() (bnc#1012382).
- rhashtable: add rhashtable_lookup_get_insert_key() (bnc#1012382 bsc#1042286).
- rhashtable: add schedule points (bnc#1012382).
- rhashtable: reorganize struct rhashtable layout (bnc#1012382).
- rocker: fix rocker_tlv_put_* functions for KASAN (bnc#1012382).
- rpcrdma: Add RPCRDMA_HDRLEN_ERR (git-fixes).
- rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1042286 bsc#1108145).
- rtc: hctosys: Add missing range error reporting (bnc#1012382).
- rtc: snvs: add a missing write sync (bnc#1012382).
- rtc: snvs: Add timeouts to avoid kernel lockups (bnc#1012382).
- rtnetlink: Disallow FDB configuration for non-Ethernet device (bnc#1012382).
- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (bnc#1012382).
- s390/cpum_cf: Reject request for sampling in event initialization (bnc#1012382).
- s390/early: improve machine detection (bnc#1012382).
- s390/mm: Check for valid vma before zapping in gmap_discard (bnc#1012382).
- s390/mm: Fix ERROR: '__node_distance' undefined! (bnc#1012382).
- s390: qeth_core_mpc: Use ARRAY_SIZE instead of reimplementing its function (bnc#1114475, LTC#172682).
- s390/qeth: fix HiperSockets sniffer (bnc#1114475, LTC#172953).
- s390/qeth: fix length check in SNMP processing (bnc#1012382).
- s390: qeth: Fix potential array overrun in cmd/rc lookup (bnc#1114475, LTC#172682).
- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (bnc#1012382).
- s390/smp: fix CPU hotplug deadlock with CPU rescan (bnc#1012382).
- s390/vdso: add missing FORCE to build targets (bnc#1012382).
- sata_rcar: fix deferred probing (bnc#1012382).
- sbus: char: add of_node_put() (bnc#1012382).
- sc16is7xx: Fix for multi-channel stall (bnc#1012382).
- sched/cgroup: Fix cgroup entity load tracking tear-down (bnc#1012382).
- sched/fair: Fix throttle_list starvation with low CFS quota (bnc#1012382).
- sched/wake_q: Document wake_q_add() (bsc#1050549).
- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).
- sched/wake_q: Reduce reference counting for special users (bsc#1050549).
- sch_red: update backlog as well (bnc#1012382).
- scripts/decode_stacktrace: only strip base path when a prefix of the path (bnc#1012382).
- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes
- scsi: aacraid: Fix typo in blink status (bnc#1012382).
- scsi: bfa: convert to strlcpy/strlcat (bnc#1012382 bsc#1019683, ).
- scsi: bnx2fc: Fix NULL dereference in error handling (bnc#1012382).
- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).
- scsi: Create two versions of scsi_internal_device_unblock() (bsc#1119877).
- scsi: csiostor: Avoid content leaks and casts (bnc#1012382).
- scsi: esp_scsi: Track residual for PIO transfers (bnc#1012382).
- scsi: Introduce scsi_start_queue() (bsc#1119877).
- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1103624, bsc#1104731).
- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).
- scsi: libiscsi: Fix NULL pointer dereference in iscsi_eh_session_reset (bnc#1012382).
- scsi: lpfc: Add Buffer overflow check, when nvme_info larger than PAGE_SIZE (bsc#1102660).
- scsi: lpfc: Correct LCB RJT handling (bnc#1012382).
- scsi: lpfc: Correct MDS diag and nvmet configuration (bsc#1125796).
- scsi: lpfc: Correct soft lockup when running mds diagnostics (bnc#1012382).
- scsi: lpfc: devloss timeout race condition caused null pointer reference (bsc#1102660).
- scsi: lpfc: Fix abort error path for NVMET (bsc#1102660).
- scsi: lpfc: fix block guard enablement on SLI3 adapters (bsc#1079935).
- scsi: lpfc: Fix driver crash when re-registering NVME rports (bsc#1102660).
- scsi: lpfc: Fix ELS abort on SLI-3 adapters (bsc#1102660).
- scsi: lpfc: Fix list corruption on the completion queue (bsc#1102660).
- scsi: lpfc: Fix NVME Target crash in defer rcv logic (bsc#1102660).
- scsi: lpfc: Fix panic if driver unloaded when port is offline (bsc#1102660).
- scsi: lpfc: update driver version to 11.4.0.7-5 (bsc#1102660).
- scsi: Make __scsi_remove_device go straight from BLOCKED to DEL (bsc#1119877).
- scsi: megaraid: fix out-of-bound array accesses (bnc#1012382).
- scsi: megaraid_sas: fix a missing-check bug (bnc#1012382).
- scsi: mpt3sas: Add an I/O barrier (bsc#1117108).
- scsi: mpt3sas: Added support for nvme encapsulated request message (bsc#1117108).
- scsi: mpt3sas: Added support for SAS Device Discovery Error Event (bsc#1117108).
- scsi: mpt3sas: Adding support for SAS3616 HBA device (bsc#1117108).
- scsi: mpt3sas: Add ioc_&lt;level&gt; logging macros (bsc#1117108).
- scsi: mpt3sas: Add nvme device support in slave alloc, target alloc and probe (bsc#1117108).
- scsi: mpt3sas: Add PCI device ID for Andromeda (bsc#1117108).
- scsi: mpt3sas: Add-Task-management-debug-info-for-NVMe-drives (bsc#1117108).
- scsi: mpt3sas: Allow processing of events during driver unload (bsc#1117108).
- scsi: mpt3sas: always use first reserved smid for ioctl passthrough (bsc#1117108).
- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).
- scsi: mpt3sas: API's to remove nvme drive from sml (bsc#1117108).
- scsi: mpt3sas: API 's to support NVMe drive addition to SML (bsc#1117108).
- scsi: mpt3sas: As per MPI-spec, use combined reply queue for SAS3.5 controllers when HBA supports more than 16 MSI-x vectors (bsc#1117108).
- scsi: mpt3sas: Bug fix for big endian systems (bsc#1117108).
- scsi: mpt3sas: Bump mpt3sas driver version to v16.100.00.00 (bsc#1117108).
- scsi: mpt3sas: Cache enclosure pages during enclosure add (bsc#1117108).
- scsi: mpt3sas: check command status before attempting abort (bsc#1117108).
- scsi: mpt3sas: clarify mmio pointer types (bsc#1117108).
- scsi: mpt3sas: cleanup _scsih_pcie_enumeration_event() (bsc#1117108).
- scsi: mpt3sas: Configure reply post queue depth, DMA and sgl tablesize (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).
- scsi: mpt3sas: Convert mlsleading uses of pr_&lt;level&gt; with MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Convert uses of pr_&lt;level&gt; with MPT3SAS_FMT to ioc_&lt;level&gt; (bsc#1117108).
- scsi: mpt3sas: Display chassis slot information of the drive (bsc#1117108).
- scsi: mpt3sas: Do not abort I/Os issued to NVMe drives while processing Async Broadcast primitive event (bsc#1117108).
- scsi: mpt3sas: Do not access the structure after decrementing it's instance reference count (bsc#1117108).
- scsi: mpt3sas: Do not use 32-bit atomic request descriptor for Ventura controllers (bsc#1117108).
- scsi: mpt3sas: Enhanced handling of Sense Buffer (bsc#1117108).
- scsi: mpt3sas: fix an out of bound write (bsc#1117108).
- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Fix calltrace observed while running IO &amp; reset (bsc#1117108).
- scsi: mpt3sas: fix dma_addr_t casts (bsc#1117108).
- scsi: mpt3sas: Fixed memory leaks in driver (bsc#1117108).
- scsi: mpt3sas: Fix, False timeout prints for ioctl and other internal commands during controller reset (bsc#1117108).
- scsi: mpt3sas: fix format overflow warning (bsc#1117108).
- scsi: mpt3sas: Fix indentation (bsc#1117108).
- scsi: mpt3sas: Fix memory allocation failure test in 'mpt3sas_base_attach()' (bsc#1117108).
- scsi: mpt3sas: Fix nvme drives checking for tlr (bsc#1117108).
- scsi: mpt3sas: fix oops in error handlers after shutdown/unload (bsc#1117108).
- scsi: mpt3sas: Fix possibility of using invalid Enclosure Handle for SAS device after host reset (bsc#1117108).
- scsi: mpt3sas: fix possible memory leak (bsc#1117108).
- scsi: mpt3sas: fix pr_info message continuation (bsc#1117108).
- scsi: mpt3sas: Fix removal and addition of vSES device during host reset (bsc#1117108).
- scsi: mpt3sas: Fix sparse warnings (bsc#1117108).
- scsi: mpt3sas: fix spelling mistake: 'disbale' -&gt; 'disable' (bsc#1117108).
- scsi: mpt3sas: For NVME device, issue a protocol level reset (bsc#1117108).
- scsi: mpt3sas: Handle NVMe PCIe device related events generated from firmware (bsc#1117108).
- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).
- scsi: mpt3sas: Incorrect command status was set/marked as not used (bsc#1117108).
- scsi: mpt3sas: Increase event log buffer to support 24 port HBA's (bsc#1117108).
- scsi: mpt3sas: Introduce API to get BAR0 mapped buffer address (bsc#1117108).
- scsi: mpt3sas: Introduce Base function for cloning (bsc#1117108).
- scsi: mpt3sas: Introduce function to clone mpi reply (bsc#1117108).
- scsi: mpt3sas: Introduce function to clone mpi request (bsc#1117108).
- scsi: mpt3sas: Introduce mpt3sas_get_st_from_smid() (bsc#1117108).
- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).
- scsi: mpt3sas: Lockless access for chain buffers (bsc#1117108).
- scsi: mpt3sas: lockless command submission (bsc#1117108).
- scsi: mpt3sas: make function _get_st_from_smid static (bsc#1117108).
- scsi: mpt3sas: NVMe drive support for BTDHMAPPING ioctl command and log info (bsc#1117108).
- scsi: mpt3sas: open-code _scsih_scsi_lookup_get() (bsc#1117108).
- scsi: mpt3sas: Optimize I/O memory consumption in driver (bsc#1117108).
- scsi: mpt3sas: Pre-allocate RDPQ Array at driver boot time (bsc#1117108).
- scsi: mpt3sas: Processing of Cable Exception events (bsc#1117108).
- scsi: mpt3sas: Reduce memory footprint in kdump kernel (bsc#1117108).
- scsi: mpt3sas: remove a stray KERN_INFO (bsc#1117108).
- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).
- scsi: mpt3sas: remove redundant copy_from_user in _ctl_getiocinfo (bsc#1117108).
- scsi: mpt3sas: remove redundant wmb (bsc#1117108).
- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).
- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).
- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Remove unused variable requeue_event (bsc#1117108).
- scsi: mpt3sas: Replace PCI pool old API (bsc#1117108).
- scsi: mpt3sas: Replace PCI pool old API (bsc#1117108).
- scsi: mpt3sas: Report Firmware Package Version from HBA Driver (bsc#1117108).
- scsi: mpt3sas: scan and add nvme device after controller reset (bsc#1117108).
- scsi: mpt3sas: separate out _base_recovery_check() (bsc#1117108).
- scsi: mpt3sas: set default value for cb_idx (bsc#1117108).
- scsi: mpt3sas: Set NVMe device queue depth as 128 (bsc#1117108).
- scsi: mpt3sas: SGL to PRP Translation for I/Os to NVMe devices (bsc#1117108).
- scsi: mpt3sas: simplify mpt3sas_scsi_issue_tm() (bsc#1117108).
- scsi: mpt3sas: simplify task management functions (bsc#1117108).
- scsi: mpt3sas: simplify _wait_for_commands_to_complete() (bsc#1117108).
- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).
- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).
- scsi: mpt3sas: switch to pci_alloc_irq_vectors (bsc#1117108).
- scsi: mpt3sas: Updated MPI headers to v2.00.48 (bsc#1117108).
- scsi: mpt3sas: Update driver version '25.100.00.00' (bsc#1117108).
- scsi: mpt3sas: Update driver version '26.100.00.00' (bsc#1117108).
- scsi: mpt3sas: Update MPI Headers (bsc#1117108).
- scsi: mpt3sas: Update mpt3sas driver version (bsc#1117108).
- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).
- scsi: mpt3sas: use list_splice_init() (bsc#1117108).
- scsi: mpt3sas: wait for and flush running commands on shutdown/unload (bsc#1117108).
- scsi: Protect SCSI device state changes with a mutex (bsc#1119877).
- scsi: qedi: Add ISCSI_BOOT_SYSFS to Kconfig (bsc#1043083).
- scsi: qla2xxx: Fix crashes in qla2x00_probe_one on probe failure (bsc#1094973).
- scsi: qla2xxx: Fix deadlock between ATIO and HW lock (bsc#1125794).
- scsi: qla2xxx: Fix incorrect port speed being set for FC adapters (bnc#1012382).
- scsi: qla2xxx: Fix small memory leak in qla2x00_probe_one on probe failure (bsc#1094973).
- scsi: Re-export scsi_internal_device_{,un}_block() (bsc#1119877).
- scsi: sd: Fix cache_type_store() (bnc#1012382).
- scsi: Split scsi_internal_device_block() (bsc#1119877).
- scsi: target: add emulate_pr backstore attr to toggle PR support (bsc#1091405).
- scsi: target: drop unused pi_prot_format attribute storage (bsc#1091405).
- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).
- scsi: target: use consistent left-aligned ASCII INQUIRY data (bnc#1012382).
- scsi: ufs: fix bugs related to null pointer access and array size (bnc#1012382).
- scsi: ufs: fix race between clock gating and devfreq scaling work (bnc#1012382).
- scsi: ufshcd: Fix race between clk scaling and ungate work (bnc#1012382).
- scsi: ufshcd: release resources if probe fails (bnc#1012382).
- scsi: use 'inquiry_mutex' instead of 'state_mutex' (bsc#1119877).
- scsi: vmw_pscsi: Rearrange code to avoid multiple calls to free_irq during unload (bnc#1012382).
- scsi: zfcp: fix posting too many status read buffers leading to adapter shutdown (bnc#1012382).
- sctp: allocate sctp_sockaddr_entry with kzalloc (bnc#1012382).
- sctp: clear the transport of some out_chunk_list chunks in sctp_assoc_rm_peer (bnc#1012382).
- sctp: fix race on sctp_id2asoc (bnc#1012382).
- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (bnc#1012382).
- sd: disable logical block provisioning if 'lbpme' is not set (bsc#1086095 bsc#1078355).
- selftests: ftrace: Add synthetic event syntax testcase (bnc#1012382).
- selftests: Move networking/timestamping from Documentation (bnc#1012382).
- selinux: fix GPF on invalid policy (bnc#1012382).
- seq_buf: Make seq_buf_puts() null-terminate the buffer (bnc#1012382).
- seq_file: fix incomplete reset on read from zero offset (Git-fixes).
- ser_gigaset: use container_of() instead of detour (bnc#1012382).
- serial: fsl_lpuart: clear parity enable bit when disable parity (bnc#1012382).
- signal: Always deliver the kernel's SIGKILL and SIGSTOP to a pid namespace init (bnc#1012382).
- signal: Always notice exiting tasks (bnc#1012382).
- signal: Better detection of synchronous signals (bnc#1012382).
- signal/GenWQE: Fix sending of SIGKILL (bnc#1012382).
- signal: Restore the stop PTRACE_EVENT_EXIT (bnc#1012382).
- skge: potential memory corruption in skge_get_regs() (bnc#1012382).
- slab: alien caches must not be initialized if the allocation of the alien cache failed (bnc#1012382).
- smack: fix access permissions for keyring (bnc#1012382).
- smb3: allow stats which track session and share reconnects to be reset (bnc#1012382).
- smb3: do not attempt cifs operation in smb3 query info error path (bnc#1012382).
- smb3: on kerberos mount if server does not specify auth type use krb5 (bnc#1012382).
- smsc75xx: Check for Wake-on-LAN modes (bnc#1012382).
- smsc95xx: Check for Wake-on-LAN modes (bnc#1012382).
- smsc95xx: Use skb_cow_head to deal with cloned skbs (bnc#1012382).
- sock: Make sock-&gt;sk_stamp thread-safe (bnc#1012382).
- soc/tegra: Do not leak device tree node reference (bnc#1012382).
- soc/tegra: pmc: Fix child-node lookup (bnc#1012382).
- sparc64: Fix exception handling in UltraSPARC-III memcpy (bnc#1012382).
- sparc64 mm: Fix more TSB sizing issues (bnc#1012382).
- sparc: Fix single-pcr perf event counter management (bnc#1012382).
- sparc/pci: Refactor dev_archdata initialization into pci_init_dev_archdata (bnc#1012382).
- spi: bcm2835: Avoid finishing transfer prematurely in IRQ mode (bnc#1012382).
- spi: bcm2835: Fix book-keeping of DMA termination (bnc#1012382).
- spi: bcm2835: Fix race on DMA termination (bnc#1012382).
- spi: bcm2835: Unbreak the build of esoteric configs (bnc#1012382).
- spi/bcm63xx: fix error return code in bcm63xx_spi_probe() (bnc#1012382).
- spi/bcm63xx-hspi: fix error return code in bcm63xx_hsspi_probe() (bnc#1012382).
- spi: xlp: fix error return code in xlp_spi_probe() (bnc#1012382).
- sr9800: Check for supported Wake-on-LAN modes (bnc#1012382).
- sr: pass down correctly sized SCSI sense buffer (bnc#1012382).
- staging:iio:ad2s90: Make probe handle spi_setup failure (bnc#1012382).
- staging: iio: ad7780: update voltage on read (bnc#1012382).
- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bnc#1012382).
- staging: lustre: remove two build warnings (bnc#1012382).
- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bnc#1012382).
- staging: rts5208: fix gcc-8 logic error warning (bnc#1012382).
- staging: speakup: Replace strncpy with memcpy (bnc#1012382).
- sunrpc: correct the computation for page_ptr when truncating (bnc#1012382).
- sunrpc: drop pointless static qualifier in xdr_get_next_encode_buffer() (bnc#1012382).
- sunrpc: Fix a bogus get/put in generic_key_to_expire() (bnc#1012382).
- sunrpc: Fix a potential race in xprt_connect() (git-fixes).
- sunrpc: fix cache_head leak due to queued request (bnc#1012382).
- sunrpc: Fix leak of krb5p encode pages (bnc#1012382).
- sunrpc: handle ENOMEM in rpcb_getport_async (bnc#1012382).
- sunvdc: Do not spin in an infinite loop when vio_ldc_send() returns EAGAIN (bnc#1012382).
- svcrdma: Remove unused variable in rdma_copy_tail() (git-fixes).
- swim: fix cleanup on setup error (bnc#1012382).
- swiotlb: clean up reporting (bnc#1012382).
- sysfs: Disable lockdep for driver bind/unbind files (bnc#1012382).
- sysv: return 'err' instead of 0 in __sysv_write_inode (bnc#1012382).
- target/iscsi: avoid NULL dereference in CHAP auth error path (bsc#1117165).
- target: se_dev_attrib.emulate_pr ABI stability (bsc#1091405).
- tcp: fix NULL ref in tail loss probe (bnc#1012382).
- TC: Set DMA masks for devices (bnc#1012382).
- termios, tty/tty_baudrate.c: fix buffer overrun (bnc#1012382).
- test_hexdump: use memcpy instead of strncpy (bnc#1012382).
- tg3: Add PHY reset for 5717/5719/5720 in change ring and flow control paths (bnc#1012382).
- thermal: allow spear-thermal driver to be a module (bnc#1012382).
- thermal: allow u8500-thermal driver to be a module (bnc#1012382).
- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bnc#1012382).
- timekeeping: Use proper seqcount initializer (bnc#1012382).
- timer/debug: Change /proc/timer_list from 0444 to 0400 (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_doit (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_link_set (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bnc#1012382).
- tipc: use destination length for copy string (bnc#1012382).
- tmpfs: make lseek(SEEK_DATA/SEK_HOLE) return ENXIO with a negative offset (bnc#1012382).
- tpm: fix response size validation in tpm_get_random() (bsc#1020645, git-fixes).
- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bnc#1012382).
- tracing: Fix bad use of igrab in trace_uprobe.c (bsc#1120046).
- tracing: Fix memory leak in set_trigger_filter() (bnc#1012382).
- tracing: Fix memory leak of instance function hash filters (bnc#1012382).
- tracing: Skip more functions when doing stack tracing of events (bnc#1012382).
- tracing/uprobes: Fix output for multiple string arguments (bnc#1012382).
- tty: check name length in tty_find_polling_driver() (bnc#1012382).
- tty: Do not block on IO when ldisc change is pending (bnc#1105428).
- tty: Do not hold ldisc lock in tty_reopen() if ldisc present (bnc#1105428).
- tty: fix data race between tty_init_dev and flush of buf (bnc#1105428).
- tty: Handle problem if line discipline does not have receive_buf (bnc#1012382).
- tty: Hold tty_ldisc_lock() during tty_reopen() (bnc#1105428).
- tty/ldsem: Add lockdep asserts for ldisc_sem (bnc#1105428).
- tty/ldsem: Convert to regular lockdep annotations (bnc#1105428).
- tty/ldsem: Decrement wait_readers on timeouted down_read() (bnc#1105428).
- tty/ldsem: Wake up readers after timed out down_write() (bnc#1012382).
- tty/n_hdlc: fix __might_sleep warning (bnc#1012382).
- tty: serial: 8250_mtk: always resume the device in probe (bnc#1012382).
- tty: serial: samsung: Properly set flags in autoCTS mode (bnc#1012382).
- tty: serial: sprd: fix error return code in sprd_probe() (bnc#1012382).
- tty: Simplify tty-&gt;count math in tty_reopen() (bnc#1105428).
- tty: wipe buffer (bnc#1012382).
- tty: wipe buffer if not echoing data (bnc#1012382).
- tun: Consistently configure generic netdev params via rtnetlink (bnc#1012382).
- tun: forbid iface creation with rtnl ops (bnc#1012382).
- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (bnc#1012382).
- uapi/if_ether.h: prevent redefinition of struct ethhdr (bnc#1012382).
- ucc_geth: Reset BQL queue when stopping device (bnc#1012382).
- udf: Fix BUG on corrupted inode (bnc#1012382).
- uio: ensure class is registered before devices (bnc#1012382).
- uio: Fix an Oops on load (bnc#1012382).
- uio: make symbol 'uio_class_registered' static (git-fixes).
- um: Avoid longjmp/setjmp symbol clashes with libpthread.a (bnc#1012382).
- um: Avoid marking pages with 'changed protection' (bnc#1012382).
- um: Give start_idle_thread() a return code (bnc#1012382).
- unifdef: use memcpy instead of strncpy (bnc#1012382).
- Update ibmvnic: Fix RX queue buffer cleanup (bsc#1115440, bsc#1115433).
- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bnc#1012382).
- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bnc#1012382).
- usb: appledisplay: Add 27' Apple Cinema Display (bnc#1012382).
- usb: cdc-acm: add entry for Hiro (Conexant) modem (bnc#1012382).
- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bnc#1012382).
- usb: check usb_get_extra_descriptor for proper size (bnc#1012382).
- usb: chipidea: Prevent unbalanced IRQ disable (bnc#1012382).
- usb: core: Fix hub port connection events lost (bnc#1012382).
- usb: core: quirks: add RESET_RESUME quirk for Cherry G230 Stream series (bnc#1012382).
- usb: dwc2: Remove unnecessary kfree (bnc#1012382).
- usb: dwc3: omap: fix error return code in dwc3_omap_probe() (bnc#1012382).
- usb: ehci-omap: fix error return code in ehci_hcd_omap_probe() (bnc#1012382).
- usb: fix the usbfs flag sanitization for control transfers (bnc#1012382).
- usb: gadget: dummy: fix nonsensical comparisons (bnc#1012382).
- usb: gadget: storage: Fix Spectre v1 vulnerability (bnc#1012382).
- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bnc#1012382).
- usb: hub: delay hub autosuspend if USB3 port is still link training (bnc#1012382).
- usb: imx21-hcd: fix error return code in imx21_probe() (bnc#1012382).
- usb: misc: appledisplay: add 20' Apple Cinema Display (bnc#1012382).
- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (bnc#1012382).
- usb: omap_udc: fix crashes on probe error and module removal (bnc#1012382).
- usb: omap_udc: fix omap_udc_start() on 15xx machines (bnc#1012382).
- usb: omap_udc: fix USB gadget functionality on Palm Tungsten E (bnc#1012382).
- usb: omap_udc: use devm_request_irq() (bnc#1012382).
- usb: phy: am335x: fix race condition in _probe (bnc#1012382).
- usb: quirk: add no-LPM quirk on SanDisk Ultra Flair device (bnc#1012382).
- usb: quirks: Add delay-init quirk for Corsair K70 LUX RGB (bnc#1012382).
- usb: quirks: Add no-lpm quirk for Raydium touchscreens (bnc#1012382).
- usb: r8a66597: Fix a possible concurrency use-after-free bug in r8a66597_endpoint_disable() (bnc#1012382).
- usb: serial: option: add Fibocom NL668 series (bnc#1012382).
- usb: serial: option: add Fibocom NL678 series (bnc#1012382).
- usb: serial: option: add GosunCn ZTE WeLink ME3630 (bnc#1012382).
- usb: serial: option: add HP lt4132 (bnc#1012382).
- usb: serial: option: add Simcom SIM7500/SIM7600 (MBIM mode) (bnc#1012382).
- usb: serial: option: add Telit LN940 series (bnc#1012382).
- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bnc#1012382).
- usb: serial: pl2303: add new PID to support PL2303TB (bnc#1012382).
- usb: serial: simple: add Motorola Tetra TPG2200 device id (bnc#1012382).
- usb: storage: add quirk for SMI SM3350 (bnc#1012382).
- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bnc#1012382).
- usb-storage: fix bogus hardware error messages for ATA pass-thru devices (bnc#1012382).
- usb: usb-storage: Add new IDs to ums-realtek (bnc#1012382).
- usb: xhci: fix timeout for transition from RExit to U0 (bnc#1012382).
- usb: xhci: fix uninitialized completion when USB3 port got wrong status (bnc#1012382).
- usb: xhci: Prevent bus suspend if a port connect change or polling state is detected (bnc#1012382).
- v9fs_dir_readdir: fix double-free on p9stat_read error (bnc#1012382).
- vfs: Avoid softlockups in drop_pagecache_sb() (bsc#1118505).
- vhost: Fix Spectre V1 vulnerability (bnc#1012382).
- vhost: make sure used idx is seen before log in vhost_add_used_n() (bnc#1012382).
- vhost/scsi: truncate T10 PI iov_iter to prot_bytes (bnc#1012382).
- video: clps711x-fb: release disp device node in probe() (bnc#1012382).
- video: fbdev: pxa3xx_gcu: fix error return code in pxa3xx_gcu_probe() (bnc#1012382).
- virtio/s390: avoid race on vcdev-&gt;config (bnc#1012382).
- virtio/s390: fix race in ccw_io_helper() (bnc#1012382).
- VSOCK: Send reset control packet when socket is partially bound (bnc#1012382).
- vti6: flush x-netns xfrm cache when vti interface is removed (bnc#1012382).
- vt: invoke notifier on screen size change (bnc#1012382).
- w1: omap-hdq: fix missing bus unregister at removal (bnc#1012382).
- writeback: do not decrement wb-&gt;refcnt if !wb-&gt;bdi (git fixes (writeback)).
- x86/a.out: Clear the dump structure initially (bnc#1012382).
- x86: boot: Fix EFI stub alignment (bnc#1012382).
- x86/boot: #undef memcpy() et al in string.c (bnc#1012382).
- x86/build: Fix stack alignment for CLang (bnc#1012382).
- x86/build: Specify stack alignment for clang (bnc#1012382).
- x86/build: Use __cc-option for boot code compiler options (bnc#1012382).
- x86/build: Use cc-option to validate stack alignment parameter (bnc#1012382).
- x86/corruption-check: Fix panic in memory_corruption_check() when boot option without value is provided (bnc#1012382).
- x86/earlyprintk/efi: Fix infinite loop on some screen widths (bnc#1012382).
- x86/entry: spell EBX register correctly in documentation (bnc#1012382).
- x86/fpu: Add might_fault() to user_insn() (bnc#1012382).
- x86/kaslr: Fix incorrect i8254 outb() parameters (bnc#1012382).
- x86/kbuild: Use cc-option to enable -falign-{jumps/loops} (bnc#1012382).
- x86/kconfig: Fall back to ticket spinlocks (bnc#1012382).
- x86/MCE: Export memory_error() (bsc#1114648).
- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bnc#1012382).
- x86/MCE: Make correctable error detection look at the Deferred bit (bsc#1114648).
- x86/mm/kaslr: Use the _ASM_MUL macro for multiplication to work around Clang incompatibility (bnc#1012382).
- x86/mm/pat: Prevent hang during boot when mapping pages (bnc#1012382).
- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bnc#1012382).
- x86/PCI: Fix Broadcom CNB20LE unintended sign extension (redux) (bnc#1012382).
- x86/pkeys: Properly copy pkey state at fork() (bsc#1106105).
- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bnc#1012382).
- x86: respect memory size limiting via mem= parameter (bsc#1117645).
- x86/speculation/l1tf: Drop the swap storage limit restriction when l1tf=off (bnc#1114871).
- x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP (bnc#1012382).
- x86/xen: dont add memory above max allowed allocation (bsc#1117645).
- xen/balloon: Support xend-based toolstack (bnc#1065600).
- xen/blkfront: avoid NULL blkfront_info dereference on device removal (bsc#1111062).
- xen: fix race in xen_qlock_wait() (bnc#1012382).
- xen: fix xen_qlock_wait() (bnc#1012382).
- xen: make xen_qlock_wait() nestable (bnc#1012382).
- xen/netback: dont overflow meta array (bnc#1099523).
- xen/netfront: tolerate frags with no data (bnc#1012382).
- xen-swiotlb: use actually allocated size on check physical continuous (bnc#1012382).
- xen/x86: add diagnostic printout to xen_mc_flush() in case of error (bnc#1116183).
- xen: xlate_mmu: add missing header to fix 'W=1' warning (bnc#1012382).
- xfrm6: call kfree_skb when skb is toobig (bnc#1012382).
- xfrm6_tunnel: Fix spi check in __xfrm6_tunnel_alloc_spi (bnc#1012382).
- xfrm: Clear sk_dst_cache when applying per-socket policy (bnc#1012382).
- xfrm: Fix bucket count reported to userspace (bnc#1012382).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfrm: Validate address prefix lengths in the xfrm selector (bnc#1012382).
- xfrm: validate template mode (bnc#1012382).
- xfs: Align compat attrlist_by_handle with native implementation (git-fixes).
- xfs/dmapi: restore event in xfs_getbmap (bsc#1114763).
- xfs: Fix error code in 'xfs_ioc_getbmap()' (git-fixes).
- xfs: fix quotacheck dquot id overflow infinite loop (bsc#1121621).
- xhci: Add quirk to workaround the errata seen on Cavium Thunder-X2 Soc (bsc#1117162).
- xhci: Do not prevent USB2 bus suspend in state check intended for USB3 only (bnc#1012382).
- xhci: Prevent U1/U2 link pm states if exit latency is too long (bnc#1012382).
- xprtrdma: checking for NULL instead of IS_ERR() (git-fixes).
- xprtrdma: Disable pad optimization by default (git-fixes).
- xprtrdma: Disable RPC/RDMA backchannel debugging messages (git-fixes).
- xprtrdma: Fix additional uses of spin_lock_irqsave(rb_lock) (git-fixes).
- xprtrdma: Fix backchannel allocation of extra rpcrdma_reps (git-fixes).
- xprtrdma: Fix Read chunk padding (git-fixes).
- xprtrdma: Fix receive buffer accounting (git-fixes).
- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).
- xprtrdma: rpcrdma_bc_receive_call() should init rq_private_buf.len (git-fixes).
- xprtrdma: Serialize credit accounting again (git-fixes).
- xprtrdma: xprt_rdma_free() must not release backchannel reqs (git-fixes).
- xtensa: add NOTES section to the linker script (bnc#1012382).
- xtensa: enable coprocessors that are being flushed (bnc#1012382).
- xtensa: fix boot parameters address translation (bnc#1012382).
- xtensa: fix coprocessor context offset definitions (bnc#1012382).
- xtensa: make sure bFLT stack is 16 byte aligned (bnc#1012382).
- yama: Check for pid death before checking ancestry (bnc#1012382).
- zram: close udev startup race condition as default groups (bnc#1012382).
- xfrm: refine validation of template and selector families (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-04"/>
	<updated date="2019-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015336">SUSE bug 1015336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015337">SUSE bug 1015337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015340">SUSE bug 1015340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019683">SUSE bug 1019683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019695">SUSE bug 1019695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020413">SUSE bug 1020413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020645">SUSE bug 1020645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023175">SUSE bug 1023175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027260">SUSE bug 1027260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027457">SUSE bug 1027457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031492">SUSE bug 1031492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043083">SUSE bug 1043083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046264">SUSE bug 1046264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048916">SUSE bug 1048916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050549">SUSE bug 1050549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070805">SUSE bug 1070805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078355">SUSE bug 1078355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079935">SUSE bug 1079935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086095">SUSE bug 1086095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086423">SUSE bug 1086423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086652">SUSE bug 1086652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091405">SUSE bug 1091405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094823">SUSE bug 1094823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094973">SUSE bug 1094973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096242">SUSE bug 1096242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096281">SUSE bug 1096281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099523">SUSE bug 1099523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099810">SUSE bug 1099810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100105">SUSE bug 1100105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101557">SUSE bug 1101557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102439">SUSE bug 1102439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102660">SUSE bug 1102660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102875">SUSE bug 1102875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102877">SUSE bug 1102877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102879">SUSE bug 1102879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102882">SUSE bug 1102882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102896">SUSE bug 1102896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103097">SUSE bug 1103097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103156">SUSE bug 1103156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103257">SUSE bug 1103257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103624">SUSE bug 1103624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104098">SUSE bug 1104098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104731">SUSE bug 1104731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105428">SUSE bug 1105428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106061">SUSE bug 1106061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106105">SUSE bug 1106105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106237">SUSE bug 1106237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106240">SUSE bug 1106240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106929">SUSE bug 1106929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107385">SUSE bug 1107385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107866">SUSE bug 1107866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108145">SUSE bug 1108145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108240">SUSE bug 1108240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109272">SUSE bug 1109272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109330">SUSE bug 1109330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109695">SUSE bug 1109695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109806">SUSE bug 1109806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110286">SUSE bug 1110286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111062">SUSE bug 1111062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111174">SUSE bug 1111174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111809">SUSE bug 1111809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112246">SUSE bug 1112246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112963">SUSE bug 1112963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113412">SUSE bug 1113412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113766">SUSE bug 1113766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114190">SUSE bug 1114190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114417">SUSE bug 1114417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114475">SUSE bug 1114475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114648">SUSE bug 1114648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114763">SUSE bug 1114763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114839">SUSE bug 1114839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114871">SUSE bug 1114871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114893">SUSE bug 1114893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115431">SUSE bug 1115431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115433">SUSE bug 1115433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115440">SUSE bug 1115440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115482">SUSE bug 1115482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115709">SUSE bug 1115709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116027">SUSE bug 1116027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116183">SUSE bug 1116183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116285">SUSE bug 1116285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116336">SUSE bug 1116336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116345">SUSE bug 1116345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116497">SUSE bug 1116497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116653">SUSE bug 1116653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116841">SUSE bug 1116841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116924">SUSE bug 1116924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116950">SUSE bug 1116950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116962">SUSE bug 1116962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117108">SUSE bug 1117108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117162">SUSE bug 1117162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117165">SUSE bug 1117165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117186">SUSE bug 1117186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117562">SUSE bug 1117562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117645">SUSE bug 1117645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117744">SUSE bug 1117744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118152">SUSE bug 1118152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118316">SUSE bug 1118316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118319">SUSE bug 1118319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118505">SUSE bug 1118505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118790">SUSE bug 1118790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118798">SUSE bug 1118798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118915">SUSE bug 1118915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118922">SUSE bug 1118922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118926">SUSE bug 1118926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118930">SUSE bug 1118930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118936">SUSE bug 1118936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119204">SUSE bug 1119204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119680">SUSE bug 1119680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119714">SUSE bug 1119714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119877">SUSE bug 1119877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119946">SUSE bug 1119946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119967">SUSE bug 1119967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119970">SUSE bug 1119970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120017">SUSE bug 1120017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120046">SUSE bug 1120046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120722">SUSE bug 1120722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120743">SUSE bug 1120743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120902">SUSE bug 1120902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120950">SUSE bug 1120950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121239">SUSE bug 1121239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121240">SUSE bug 1121240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121241">SUSE bug 1121241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121242">SUSE bug 1121242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121275">SUSE bug 1121275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121621">SUSE bug 1121621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121726">SUSE bug 1121726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122650">SUSE bug 1122650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122651">SUSE bug 1122651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122779">SUSE bug 1122779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122885">SUSE bug 1122885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123321">SUSE bug 1123321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123323">SUSE bug 1123323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123357">SUSE bug 1123357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123933">SUSE bug 1123933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124166">SUSE bug 1124166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124728">SUSE bug 1124728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124732">SUSE bug 1124732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124735">SUSE bug 1124735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124775">SUSE bug 1124775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124777">SUSE bug 1124777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124780">SUSE bug 1124780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124811">SUSE bug 1124811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125000">SUSE bug 1125000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125014">SUSE bug 1125014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125446">SUSE bug 1125446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125794">SUSE bug 1125794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125796">SUSE bug 1125796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125808">SUSE bug 1125808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125809">SUSE bug 1125809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125810">SUSE bug 1125810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125892">SUSE bug 1125892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985031">SUSE bug 985031</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1120/">CVE-2018-1120 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1120">CVE-2018-1120 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16862/">CVE-2018-16862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16862">CVE-2018-16862 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16884">CVE-2018-16884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19407/">CVE-2018-19407 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19407">CVE-2018-19407 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19824">CVE-2018-19824 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19985">CVE-2018-19985 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20169">CVE-2018-20169 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5391">CVE-2018-5391 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9568">CVE-2018-9568 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3459/">CVE-2019-3459 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3459">CVE-2019-3459 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3460/">CVE-2019-3460 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3460">CVE-2019-3460 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6974">CVE-2019-6974 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7221">CVE-2019-7221 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7222">CVE-2019-7222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554522" comment="kernel-default-4.4.175-94.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554523" comment="kernel-default-base-4.4.175-94.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554524" comment="kernel-default-devel-4.4.175-94.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554525" comment="kernel-default-man-4.4.175-94.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521663" comment="kernel-devel-4.4.175-94.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521664" comment="kernel-macros-4.4.175-94.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521665" comment="kernel-source-4.4.175-94.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554526" comment="kernel-syms-4.4.175-94.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149935" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1112142" ref_url="https://bugzilla.suse.com/1112142" source="BUGZILLA"/>
		<reference ref_id="1112143" ref_url="https://bugzilla.suse.com/1112143" source="BUGZILLA"/>
		<reference ref_id="1112144" ref_url="https://bugzilla.suse.com/1112144" source="BUGZILLA"/>
		<reference ref_id="1112146" ref_url="https://bugzilla.suse.com/1112146" source="BUGZILLA"/>
		<reference ref_id="1112147" ref_url="https://bugzilla.suse.com/1112147" source="BUGZILLA"/>
		<reference ref_id="1112148" ref_url="https://bugzilla.suse.com/1112148" source="BUGZILLA"/>
		<reference ref_id="1112152" ref_url="https://bugzilla.suse.com/1112152" source="BUGZILLA"/>
		<reference ref_id="1112153" ref_url="https://bugzilla.suse.com/1112153" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u191 fixes the following issues:

Security issues fixed:

- CVE-2018-3136: Manifest better support (bsc#1112142)
- CVE-2018-3139: Better HTTP Redirection (bsc#1112143)
- CVE-2018-3149: Enhance JNDI lookups (bsc#1112144)
- CVE-2018-3169: Improve field accesses (bsc#1112146)
- CVE-2018-3180: Improve TLS connections stability (bsc#1112147)
- CVE-2018-3214: Better RIFF reading support (bsc#1112152)
- CVE-2018-13785: Upgrade JDK 8u to libpng 1.6.35 (bsc#1112153)
- CVE-2018-3183: Improve script engine support (bsc#1112148)
- CVE-2018-16435: heap-based buffer overflow in SetData function in cmsIT8LoadFromFile
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112147">SUSE bug 1112147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112153">SUSE bug 1112153</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13785">CVE-2018-13785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16435">CVE-2018-16435 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3136">CVE-2018-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3139">CVE-2018-3139 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3149">CVE-2018-3149 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3169">CVE-2018-3169 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3180">CVE-2018-3180 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3183">CVE-2018-3183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3214">CVE-2018-3214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554527" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554528" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554529" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554530" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149936" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1127820" ref_url="https://bugzilla.suse.com/1127820" source="BUGZILLA"/>
		<reference ref_id="1127821" ref_url="https://bugzilla.suse.com/1127821" source="BUGZILLA"/>
		<reference ref_id="1127822" ref_url="https://bugzilla.suse.com/1127822" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12178" ref_url="https://www.suse.com/security/cve/CVE-2018-12178/" source="CVE"/>
		<reference ref_id="CVE-2018-12180" ref_url="https://www.suse.com/security/cve/CVE-2018-12180/" source="CVE"/>
		<reference ref_id="CVE-2018-3630" ref_url="https://www.suse.com/security/cve/CVE-2018-3630/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005181.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

Security issues fixed: 

- CVE-2018-12180: Fixed a buffer overflow in BlockIo service, which could lead 
  to memory read/write overrun (bsc#1127820).
- CVE-2018-12178: Fixed an improper DNS check upon receiving a new DNS packet (bsc#1127821).
- CVE-2018-3630: Fixed a logic error in FV parsing which could allow a local attacker to 
  bypass the chain of trust checks (bsc#1127822).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-11"/>
	<updated date="2019-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1127820">SUSE bug 1127820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127821">SUSE bug 1127821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127822">SUSE bug 1127822</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12178/">CVE-2018-12178 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12178">CVE-2018-12178 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12180/">CVE-2018-12180 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12180">CVE-2018-12180 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3630/">CVE-2018-3630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-3630">CVE-2018-3630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554531" comment="ovmf-2017+git1492060560.b6d11d7c46-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554532" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554533" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554534" comment="qemu-uefi-aarch64-2017+git1492060560.b6d11d7c46-4.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149937" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1056334" ref_url="https://bugzilla.suse.com/1056334" source="BUGZILLA"/>
		<reference ref_id="1056386" ref_url="https://bugzilla.suse.com/1056386" source="BUGZILLA"/>
		<reference ref_id="1084604" ref_url="https://bugzilla.suse.com/1084604" source="BUGZILLA"/>
		<reference ref_id="1113231" ref_url="https://bugzilla.suse.com/1113231" source="BUGZILLA"/>
		<reference ref_id="1114957" ref_url="https://bugzilla.suse.com/1114957" source="BUGZILLA"/>
		<reference ref_id="1116717" ref_url="https://bugzilla.suse.com/1116717" source="BUGZILLA"/>
		<reference ref_id="1117275" ref_url="https://bugzilla.suse.com/1117275" source="BUGZILLA"/>
		<reference ref_id="1119493" ref_url="https://bugzilla.suse.com/1119493" source="BUGZILLA"/>
		<reference ref_id="1121600" ref_url="https://bugzilla.suse.com/1121600" source="BUGZILLA"/>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-13673" ref_url="https://www.suse.com/security/cve/CVE-2017-13673/" source="CVE"/>
		<reference ref_id="CVE-2018-16872" ref_url="https://www.suse.com/security/cve/CVE-2018-16872/" source="CVE"/>
		<reference ref_id="CVE-2018-18954" ref_url="https://www.suse.com/security/cve/CVE-2018-18954/" source="CVE"/>
		<reference ref_id="CVE-2018-19364" ref_url="https://www.suse.com/security/cve/CVE-2018-19364/" source="CVE"/>
		<reference ref_id="CVE-2018-19489" ref_url="https://www.suse.com/security/cve/CVE-2018-19489/" source="CVE"/>
		<reference ref_id="CVE-2018-7858" ref_url="https://www.suse.com/security/cve/CVE-2018-7858/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6778: Fixed an out-of-bounds access in slirp (bsc#1123156)
- CVE-2018-16872: Fixed a host security vulnerability related to handling symlinks in usb-mtp (bsc#1119493)
- CVE-2018-19489: Fixed a Denial-of-Service in virtfs (bsc#1117275)
- CVE-2018-19364: Fixed an use-after-free vulnerability if virtfs interface is deliberately abused (bsc#1116717)
- CVE-2018-18954: Fixed an out-of-bounds access performing PowerNV memory operations (bsc#1114957)
- CVE-2017-13673: Fixed a reachable assert failure during during display update (bsc#1056386)
- CVE-2017-13672: Fixed an out-of-bounds read access during display update (bsc#1056334)
- CVE-2018-7858: Fixed an out-of-bounds access in cirrus when updating vga display allowing for Denial-of-Service (bsc#1084604)

Other bug fixes and changes:

- Fix pwrite64/pread64/write to return 0 over -1 for a zero length NULL buffer in qemu (bsc#1121600)
- Fix bad guest time after migration (bsc#1113231)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-11"/>
	<updated date="2019-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056334">SUSE bug 1056334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056386">SUSE bug 1056386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084604">SUSE bug 1084604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113231">SUSE bug 1113231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114957">SUSE bug 1114957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116717">SUSE bug 1116717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117275">SUSE bug 1117275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119493">SUSE bug 1119493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121600">SUSE bug 1121600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13672">CVE-2017-13672 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13673/">CVE-2017-13673 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13673">CVE-2017-13673 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16872/">CVE-2018-16872 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16872">CVE-2018-16872 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18954/">CVE-2018-18954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18954">CVE-2018-18954 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19364/">CVE-2018-19364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19364">CVE-2018-19364 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19489/">CVE-2018-19489 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19489">CVE-2018-19489 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7858/">CVE-2018-7858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7858">CVE-2018-7858 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554535" comment="qemu-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554536" comment="qemu-arm-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554537" comment="qemu-block-curl-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554538" comment="qemu-block-iscsi-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554539" comment="qemu-block-rbd-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554540" comment="qemu-block-ssh-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554541" comment="qemu-guest-agent-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521671" comment="qemu-ipxe-1.0.0+-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554542" comment="qemu-kvm-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554543" comment="qemu-lang-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554544" comment="qemu-ppc-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554545" comment="qemu-s390-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521673" comment="qemu-seabios-1.10.2-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521674" comment="qemu-sgabios-8-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554546" comment="qemu-tools-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521676" comment="qemu-vgabios-1.10.2-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521677" comment="qemu-x86-2.9.1-6.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149938" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1110279" ref_url="https://bugzilla.suse.com/1110279" source="BUGZILLA"/>
		<reference ref_id="1116998" ref_url="https://bugzilla.suse.com/1116998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4191" ref_url="https://www.suse.com/security/cve/CVE-2018-4191/" source="CVE"/>
		<reference ref_id="CVE-2018-4197" ref_url="https://www.suse.com/security/cve/CVE-2018-4197/" source="CVE"/>
		<reference ref_id="CVE-2018-4207" ref_url="https://www.suse.com/security/cve/CVE-2018-4207/" source="CVE"/>
		<reference ref_id="CVE-2018-4208" ref_url="https://www.suse.com/security/cve/CVE-2018-4208/" source="CVE"/>
		<reference ref_id="CVE-2018-4209" ref_url="https://www.suse.com/security/cve/CVE-2018-4209/" source="CVE"/>
		<reference ref_id="CVE-2018-4210" ref_url="https://www.suse.com/security/cve/CVE-2018-4210/" source="CVE"/>
		<reference ref_id="CVE-2018-4212" ref_url="https://www.suse.com/security/cve/CVE-2018-4212/" source="CVE"/>
		<reference ref_id="CVE-2018-4213" ref_url="https://www.suse.com/security/cve/CVE-2018-4213/" source="CVE"/>
		<reference ref_id="CVE-2018-4261" ref_url="https://www.suse.com/security/cve/CVE-2018-4261/" source="CVE"/>
		<reference ref_id="CVE-2018-4262" ref_url="https://www.suse.com/security/cve/CVE-2018-4262/" source="CVE"/>
		<reference ref_id="CVE-2018-4263" ref_url="https://www.suse.com/security/cve/CVE-2018-4263/" source="CVE"/>
		<reference ref_id="CVE-2018-4264" ref_url="https://www.suse.com/security/cve/CVE-2018-4264/" source="CVE"/>
		<reference ref_id="CVE-2018-4265" ref_url="https://www.suse.com/security/cve/CVE-2018-4265/" source="CVE"/>
		<reference ref_id="CVE-2018-4266" ref_url="https://www.suse.com/security/cve/CVE-2018-4266/" source="CVE"/>
		<reference ref_id="CVE-2018-4267" ref_url="https://www.suse.com/security/cve/CVE-2018-4267/" source="CVE"/>
		<reference ref_id="CVE-2018-4270" ref_url="https://www.suse.com/security/cve/CVE-2018-4270/" source="CVE"/>
		<reference ref_id="CVE-2018-4272" ref_url="https://www.suse.com/security/cve/CVE-2018-4272/" source="CVE"/>
		<reference ref_id="CVE-2018-4273" ref_url="https://www.suse.com/security/cve/CVE-2018-4273/" source="CVE"/>
		<reference ref_id="CVE-2018-4278" ref_url="https://www.suse.com/security/cve/CVE-2018-4278/" source="CVE"/>
		<reference ref_id="CVE-2018-4284" ref_url="https://www.suse.com/security/cve/CVE-2018-4284/" source="CVE"/>
		<reference ref_id="CVE-2018-4299" ref_url="https://www.suse.com/security/cve/CVE-2018-4299/" source="CVE"/>
		<reference ref_id="CVE-2018-4306" ref_url="https://www.suse.com/security/cve/CVE-2018-4306/" source="CVE"/>
		<reference ref_id="CVE-2018-4309" ref_url="https://www.suse.com/security/cve/CVE-2018-4309/" source="CVE"/>
		<reference ref_id="CVE-2018-4312" ref_url="https://www.suse.com/security/cve/CVE-2018-4312/" source="CVE"/>
		<reference ref_id="CVE-2018-4314" ref_url="https://www.suse.com/security/cve/CVE-2018-4314/" source="CVE"/>
		<reference ref_id="CVE-2018-4315" ref_url="https://www.suse.com/security/cve/CVE-2018-4315/" source="CVE"/>
		<reference ref_id="CVE-2018-4316" ref_url="https://www.suse.com/security/cve/CVE-2018-4316/" source="CVE"/>
		<reference ref_id="CVE-2018-4317" ref_url="https://www.suse.com/security/cve/CVE-2018-4317/" source="CVE"/>
		<reference ref_id="CVE-2018-4318" ref_url="https://www.suse.com/security/cve/CVE-2018-4318/" source="CVE"/>
		<reference ref_id="CVE-2018-4319" ref_url="https://www.suse.com/security/cve/CVE-2018-4319/" source="CVE"/>
		<reference ref_id="CVE-2018-4323" ref_url="https://www.suse.com/security/cve/CVE-2018-4323/" source="CVE"/>
		<reference ref_id="CVE-2018-4328" ref_url="https://www.suse.com/security/cve/CVE-2018-4328/" source="CVE"/>
		<reference ref_id="CVE-2018-4345" ref_url="https://www.suse.com/security/cve/CVE-2018-4345/" source="CVE"/>
		<reference ref_id="CVE-2018-4358" ref_url="https://www.suse.com/security/cve/CVE-2018-4358/" source="CVE"/>
		<reference ref_id="CVE-2018-4359" ref_url="https://www.suse.com/security/cve/CVE-2018-4359/" source="CVE"/>
		<reference ref_id="CVE-2018-4361" ref_url="https://www.suse.com/security/cve/CVE-2018-4361/" source="CVE"/>
		<reference ref_id="CVE-2018-4372" ref_url="https://www.suse.com/security/cve/CVE-2018-4372/" source="CVE"/>
		<reference ref_id="CVE-2018-4373" ref_url="https://www.suse.com/security/cve/CVE-2018-4373/" source="CVE"/>
		<reference ref_id="CVE-2018-4375" ref_url="https://www.suse.com/security/cve/CVE-2018-4375/" source="CVE"/>
		<reference ref_id="CVE-2018-4376" ref_url="https://www.suse.com/security/cve/CVE-2018-4376/" source="CVE"/>
		<reference ref_id="CVE-2018-4378" ref_url="https://www.suse.com/security/cve/CVE-2018-4378/" source="CVE"/>
		<reference ref_id="CVE-2018-4382" ref_url="https://www.suse.com/security/cve/CVE-2018-4382/" source="CVE"/>
		<reference ref_id="CVE-2018-4386" ref_url="https://www.suse.com/security/cve/CVE-2018-4386/" source="CVE"/>
		<reference ref_id="CVE-2018-4392" ref_url="https://www.suse.com/security/cve/CVE-2018-4392/" source="CVE"/>
		<reference ref_id="CVE-2018-4416" ref_url="https://www.suse.com/security/cve/CVE-2018-4416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.22.4 fixes the following issues:

Security issues fixed:

  CVE-2018-4191, CVE-2018-4197, CVE-2018-4299, CVE-2018-4306, CVE-2018-4309, CVE-2018-4392,
  CVE-2018-4312, CVE-2018-4314, CVE-2018-4315, CVE-2018-4316, CVE-2018-4317, CVE-2018-4318,
  CVE-2018-4319, CVE-2018-4323, CVE-2018-4328, CVE-2018-4358, CVE-2018-4359, CVE-2018-4361,
  CVE-2018-4345, CVE-2018-4372, CVE-2018-4373, CVE-2018-4375, CVE-2018-4376, CVE-2018-4416,
  CVE-2018-4378, CVE-2018-4382, CVE-2018-4386 (bsc#1110279, bsc#1116998). 
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4191/">CVE-2018-4191 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4191">CVE-2018-4191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4197/">CVE-2018-4197 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4197">CVE-2018-4197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4207/">CVE-2018-4207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4207">CVE-2018-4207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4208/">CVE-2018-4208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4208">CVE-2018-4208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4209/">CVE-2018-4209 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4209">CVE-2018-4209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4210/">CVE-2018-4210 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4210">CVE-2018-4210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4212/">CVE-2018-4212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4212">CVE-2018-4212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4213/">CVE-2018-4213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4213">CVE-2018-4213 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4261/">CVE-2018-4261 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4261">CVE-2018-4261 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4262/">CVE-2018-4262 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4262">CVE-2018-4262 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4263/">CVE-2018-4263 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4263">CVE-2018-4263 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4264/">CVE-2018-4264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4264">CVE-2018-4264 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4265/">CVE-2018-4265 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4265">CVE-2018-4265 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4266/">CVE-2018-4266 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4266">CVE-2018-4266 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4267/">CVE-2018-4267 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4267">CVE-2018-4267 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4270/">CVE-2018-4270 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4270">CVE-2018-4270 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4272/">CVE-2018-4272 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4272">CVE-2018-4272 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4273/">CVE-2018-4273 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4273">CVE-2018-4273 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4278/">CVE-2018-4278 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4278">CVE-2018-4278 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4284/">CVE-2018-4284 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4284">CVE-2018-4284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4299/">CVE-2018-4299 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4299">CVE-2018-4299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4306/">CVE-2018-4306 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4306">CVE-2018-4306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4309/">CVE-2018-4309 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4309">CVE-2018-4309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4312/">CVE-2018-4312 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4312">CVE-2018-4312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4314/">CVE-2018-4314 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4314">CVE-2018-4314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4315/">CVE-2018-4315 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4315">CVE-2018-4315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4316/">CVE-2018-4316 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4316">CVE-2018-4316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4317/">CVE-2018-4317 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4317">CVE-2018-4317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4318/">CVE-2018-4318 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4318">CVE-2018-4318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4319/">CVE-2018-4319 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4319">CVE-2018-4319 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4323/">CVE-2018-4323 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4323">CVE-2018-4323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4328/">CVE-2018-4328 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4328">CVE-2018-4328 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4345/">CVE-2018-4345 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4345">CVE-2018-4345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4358/">CVE-2018-4358 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4358">CVE-2018-4358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4359/">CVE-2018-4359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4359">CVE-2018-4359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4361/">CVE-2018-4361 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4361">CVE-2018-4361 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4372/">CVE-2018-4372 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4372">CVE-2018-4372 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4373/">CVE-2018-4373 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4373">CVE-2018-4373 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4375/">CVE-2018-4375 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4375">CVE-2018-4375 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4376/">CVE-2018-4376 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4376">CVE-2018-4376 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4378/">CVE-2018-4378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4378">CVE-2018-4378 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4382/">CVE-2018-4382 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4382">CVE-2018-4382 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4386/">CVE-2018-4386 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4386">CVE-2018-4386 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4392/">CVE-2018-4392 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4392">CVE-2018-4392 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4416/">CVE-2018-4416 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4416">CVE-2018-4416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554547" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554548" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554549" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554550" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554551" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149939" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1120114" ref_url="https://bugzilla.suse.com/1120114" source="BUGZILLA"/>
		<reference ref_id="1120115" ref_url="https://bugzilla.suse.com/1120115" source="BUGZILLA"/>
		<reference ref_id="1120116" ref_url="https://bugzilla.suse.com/1120116" source="BUGZILLA"/>
		<reference ref_id="1120117" ref_url="https://bugzilla.suse.com/1120117" source="BUGZILLA"/>
		<reference ref_id="1120118" ref_url="https://bugzilla.suse.com/1120118" source="BUGZILLA"/>
		<reference ref_id="1120119" ref_url="https://bugzilla.suse.com/1120119" source="BUGZILLA"/>
		<reference ref_id="1120120" ref_url="https://bugzilla.suse.com/1120120" source="BUGZILLA"/>
		<reference ref_id="1120121" ref_url="https://bugzilla.suse.com/1120121" source="BUGZILLA"/>
		<reference ref_id="1120122" ref_url="https://bugzilla.suse.com/1120122" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15126" ref_url="https://www.suse.com/security/cve/CVE-2018-15126/" source="CVE"/>
		<reference ref_id="CVE-2018-15127" ref_url="https://www.suse.com/security/cve/CVE-2018-15127/" source="CVE"/>
		<reference ref_id="CVE-2018-20019" ref_url="https://www.suse.com/security/cve/CVE-2018-20019/" source="CVE"/>
		<reference ref_id="CVE-2018-20020" ref_url="https://www.suse.com/security/cve/CVE-2018-20020/" source="CVE"/>
		<reference ref_id="CVE-2018-20021" ref_url="https://www.suse.com/security/cve/CVE-2018-20021/" source="CVE"/>
		<reference ref_id="CVE-2018-20022" ref_url="https://www.suse.com/security/cve/CVE-2018-20022/" source="CVE"/>
		<reference ref_id="CVE-2018-20023" ref_url="https://www.suse.com/security/cve/CVE-2018-20023/" source="CVE"/>
		<reference ref_id="CVE-2018-20024" ref_url="https://www.suse.com/security/cve/CVE-2018-20024/" source="CVE"/>
		<reference ref_id="CVE-2018-6307" ref_url="https://www.suse.com/security/cve/CVE-2018-6307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005025.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-15126: Fixed use-after-free in file transfer extension (bsc#1120114)
- CVE-2018-6307: Fixed use-after-free in file transfer extension server code (bsc#1120115)
- CVE-2018-20020: Fixed heap out-of-bound write inside structure in VNC client code (bsc#1120116)
- CVE-2018-15127: Fixed heap out-of-bounds write in rfbserver.c (bsc#1120117)
- CVE-2018-20019: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1120118)
- CVE-2018-20023: Fixed information disclosure through improper initialization in VNC Repeater client code (bsc#1120119)
- CVE-2018-20022: Fixed information disclosure through improper initialization in VNC client code (bsc#1120120)
- CVE-2018-20024: Fixed NULL pointer dereference in VNC client code (bsc#1120121)
- CVE-2018-20021: Fixed infinite loop in VNC client code (bsc#1120122)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120114">SUSE bug 1120114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120115">SUSE bug 1120115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120116">SUSE bug 1120116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120117">SUSE bug 1120117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120118">SUSE bug 1120118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120119">SUSE bug 1120119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120120">SUSE bug 1120120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120121">SUSE bug 1120121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120122">SUSE bug 1120122</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15126/">CVE-2018-15126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15126">CVE-2018-15126 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15127/">CVE-2018-15127 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15127">CVE-2018-15127 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20019/">CVE-2018-20019 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20019">CVE-2018-20019 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20020/">CVE-2018-20020 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20020">CVE-2018-20020 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20021/">CVE-2018-20021 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20021">CVE-2018-20021 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20022/">CVE-2018-20022 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20022">CVE-2018-20022 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20023/">CVE-2018-20023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20023">CVE-2018-20023 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20024/">CVE-2018-20024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20024">CVE-2018-20024 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6307/">CVE-2018-6307 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6307">CVE-2018-6307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554552" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554553" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149940" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005190.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm to version 7.1.4.40 fixes the following issues:

Security issues fixed: 

- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).	  

More information: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_February_2019
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-13"/>
	<updated date="2019-03-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2422">CVE-2019-2422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546656" comment="java-1_7_1-ibm-1.7.1_sr4.40-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530866" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546657" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530869" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149941" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1122292" ref_url="https://bugzilla.suse.com/1122292" source="BUGZILLA"/>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1128158" ref_url="https://bugzilla.suse.com/1128158" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-1890" ref_url="https://www.suse.com/security/cve/CVE-2018-1890/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2449" ref_url="https://www.suse.com/security/cve/CVE-2019-2449/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005195.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm to version 8.0.5.30 fixes the following issues:

Security issues fixed:

- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).
- CVE-2018-1890: Fixed a local privilege escalation via RPATHs (bsc#1128158).
- CVE-2019-2449: Fixed a vulnerabilit which could allow remote atackers to delete arbitrary files (bsc#1122292). 

More information: https://www-01.ibm.com/support/docview.wss?uid=ibm10873332	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-15"/>
	<updated date="2019-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122292">SUSE bug 1122292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128158">SUSE bug 1128158</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1890/">CVE-2018-1890 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1890">CVE-2018-1890 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2422">CVE-2019-2422 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2449/">CVE-2019-2449 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2449">CVE-2019-2449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548942" comment="java-1_8_0-ibm-1.8.0_sr5.30-30.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530871" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530873" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149942" version="1" class="patch">
	<metadata>
		<title>Security update for lftp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1103367" ref_url="https://bugzilla.suse.com/1103367" source="BUGZILLA"/>
		<reference ref_id="1120946" ref_url="https://bugzilla.suse.com/1120946" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10916" ref_url="https://www.suse.com/security/cve/CVE-2018-10916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0642-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190642-1.html" source="SUSE-SU"/>
		<description>
This update for lftp fixes the following issues:

Security issue fixed: 

- CVE-2018-10916: Fixed an improper file name sanitization which could lead to loss of integrity of 
  the local system (bsc#1103367).
  
Other issue addressed:

- The SSH login handling code detects password prompts more reliably (bsc#1120946).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-19"/>
	<updated date="2019-03-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103367">SUSE bug 1103367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120946">SUSE bug 1120946</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10916/">CVE-2018-10916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10916">CVE-2018-10916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554554" comment="lftp-4.7.4-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149943" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1091236" ref_url="https://bugzilla.suse.com/1091236" source="BUGZILLA"/>
		<reference ref_id="1128471" ref_url="https://bugzilla.suse.com/1128471" source="BUGZILLA"/>
		<reference ref_id="1128472" ref_url="https://bugzilla.suse.com/1128472" source="BUGZILLA"/>
		<reference ref_id="1128474" ref_url="https://bugzilla.suse.com/1128474" source="BUGZILLA"/>
		<reference ref_id="1128476" ref_url="https://bugzilla.suse.com/1128476" source="BUGZILLA"/>
		<reference ref_id="1128480" ref_url="https://bugzilla.suse.com/1128480" source="BUGZILLA"/>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1128490" ref_url="https://bugzilla.suse.com/1128490" source="BUGZILLA"/>
		<reference ref_id="1128492" ref_url="https://bugzilla.suse.com/1128492" source="BUGZILLA"/>
		<reference ref_id="1128493" ref_url="https://bugzilla.suse.com/1128493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

Security issues fixed: 	  

- CVE-2019-3861: Fixed Out-of-bounds reads with specially crafted SSH packets (bsc#1128490).
- CVE-2019-3862: Fixed Out-of-bounds memory comparison with specially crafted message channel request packet (bsc#1128492).
- CVE-2019-3860: Fixed Out-of-bounds reads with specially crafted SFTP packets (bsc#1128481).
- CVE-2019-3863: Fixed an Integer overflow in user authenticate keyboard interactive which could allow out-of-bounds writes 
  with specially crafted keyboard responses (bsc#1128493).
- CVE-2019-3856: Fixed a potential Integer overflow in keyboard interactive handling which could allow out-of-bounds write 
  with specially crafted payload (bsc#1128472).
- CVE-2019-3859: Fixed Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require 
  and _libssh2_packet_requirev (bsc#1128480).
- CVE-2019-3855: Fixed a potential Integer overflow in transport read which could allow out-of-bounds write with specially 
  crafted payload (bsc#1128471).
- CVE-2019-3858: Fixed a potential zero-byte allocation which could lead to an out-of-bounds read with a specially crafted 
  SFTP packet (bsc#1128476).
- CVE-2019-3857: Fixed a potential Integer overflow which could lead to zero-byte allocation and out-of-bounds with specially 
  crafted message channel request SSH packet (bsc#1128474).

Other issue addressed: 

- Libbssh2 will stop using keys unsupported types in the known_hosts file (bsc#1091236).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-20"/>
	<updated date="2019-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091236">SUSE bug 1091236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128480">SUSE bug 1128480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3855">CVE-2019-3855 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3856">CVE-2019-3856 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3857">CVE-2019-3857 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3858">CVE-2019-3858 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3859">CVE-2019-3859 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3860">CVE-2019-3860 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3861">CVE-2019-3861 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3862">CVE-2019-3862 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3863">CVE-2019-3863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554555" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546671" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149944" version="1" class="patch">
	<metadata>
		<title>Security update for openwsman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1122623" ref_url="https://bugzilla.suse.com/1122623" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3816" ref_url="https://www.suse.com/security/cve/CVE-2019-3816/" source="CVE"/>
		<reference ref_id="CVE-2019-3833" ref_url="https://www.suse.com/security/cve/CVE-2019-3833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005211.html" source="SUSE-SU"/>
		<description>
This update for openwsman fixes the following issues:

Security issues fixed:

- CVE-2019-3816: Fixed a vulnerability in openwsmand deamon which could lead to arbitary file disclosure (bsc#1122623).
- CVE-2019-3833: Fixed a vulnerability in process_connection() which could allow an attacker to trigger an infinite
  loop which leads to Denial of Service (bsc#1122623).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-20"/>
	<updated date="2019-03-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122623">SUSE bug 1122623</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3816/">CVE-2019-3816 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3816">CVE-2019-3816 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3833/">CVE-2019-3833 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3833">CVE-2019-3833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554556" comment="libwsman1-2.4.11-21.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554557" comment="libwsman_clientpp1-2.4.11-21.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554558" comment="openwsman-server-2.4.11-21.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149945" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1127367" ref_url="https://bugzilla.suse.com/1127367" source="BUGZILLA"/>
		<reference ref_id="1127369" ref_url="https://bugzilla.suse.com/1127369" source="BUGZILLA"/>
		<reference ref_id="1127370" ref_url="https://bugzilla.suse.com/1127370" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9208" ref_url="https://www.suse.com/security/cve/CVE-2019-9208/" source="CVE"/>
		<reference ref_id="CVE-2019-9209" ref_url="https://www.suse.com/security/cve/CVE-2019-9209/" source="CVE"/>
		<reference ref_id="CVE-2019-9214" ref_url="https://www.suse.com/security/cve/CVE-2019-9214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005216.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.4.13 fixes the following issues:

Security issues fixed:

- CVE-2019-9214: Avoided a dereference of a null coversation which could make RPCAP 
  dissector crash (bsc#1127367).
- CVE-2019-9209: Fixed a buffer overflow in time values which could make ASN.1 BER 
  and related dissectors crash (bsc#1127369).
- CVE-2019-9208: Fixed a null pointer dereference which could make TCAP dissector 
  crash (bsc#1127370).

Release notes: https://www.wireshark.org/docs/relnotes/wireshark-2.4.13.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127367">SUSE bug 1127367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127369">SUSE bug 1127369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127370">SUSE bug 1127370</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9208/">CVE-2019-9208 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9208">CVE-2019-9208 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9209/">CVE-2019-9209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9209">CVE-2019-9209 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9214/">CVE-2019-9214 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9214">CVE-2019-9214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554559" comment="libwireshark9-2.4.13-48.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554560" comment="libwiretap7-2.4.13-48.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554561" comment="libwscodecs1-2.4.13-48.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554562" comment="libwsutil8-2.4.13-48.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554563" comment="wireshark-2.4.13-48.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554564" comment="wireshark-gtk-2.4.13-48.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149946" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1129186" ref_url="https://bugzilla.suse.com/1129186" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005228.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issue:
	  
Security issue fixed:

- CVE-2019-3838: Fixed a vulnerability which made forceput operator in DefineResource to be still accessible
  which could allow access to file system outside of the constraints of -dSAFER (bsc#1129186).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-22"/>
	<updated date="2019-03-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3838">CVE-2019-3838 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554565" comment="ghostscript-9.26a-23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554566" comment="ghostscript-x11-9.26a-23.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149947" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1129231" ref_url="https://bugzilla.suse.com/1129231" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005232.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to the 20190312 bundle release (bsc#1129231)

New Platforms:

- AML-Y22      H0       6-8e-9/10           0000009e Core Gen8 Mobile
- WHL-U        W0       6-8e-b/d0           000000a4 Core Gen8 Mobile
- WHL-U        V0       6-8e-d/94           000000b2 Core Gen8 Mobile
- CFL-S        P0       6-9e-c/22           000000a2 Core Gen9 Desktop
- CFL-H        R0       6-9e-d/22           000000b0 Core Gen9 Mobile

Updated Platforms:

- HSX-E/EP     Cx/M1    6-3f-2/6f 0000003d-&gt;00000041 Core Gen4 X series; Xeon E5 v3
- HSX-EX       E0       6-3f-4/80 00000012-&gt;00000013 Xeon E7 v3
- SKX-SP       H0/M0/U0 6-55-4/b7 0200004d-&gt;0000005a Xeon Scalable
- SKX-D        M1       6-55-4/b7 0200004d-&gt;0000005a Xeon D-21xx
- BDX-DE       V1       6-56-2/10 00000017-&gt;00000019 Xeon D-1520/40
- BDX-DE       V2/3     6-56-3/10 07000013-&gt;07000016 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
- BDX-DE       Y0       6-56-4/10 0f000012-&gt;0f000014 Xeon D-1557/59/67/71/77/81/87
- BDX-NS       A0       6-56-5/10 0e00000a-&gt;0e00000c Xeon D-1513N/23/33/43/53
- APL          D0       6-5c-9/03 00000032-&gt;00000036 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
- APL          E0       6-5c-a/03 0000000c-&gt;00000010 Atom x5/7-E39xx
- GLK          B0       6-7a-1/01 00000028-&gt;0000002c Pentium Silver N/J5xxx, Celeron N/J4xxx
- KBL-U/Y      H0       6-8e-9/c0 0000008e-&gt;0000009a Core Gen7 Mobile
- CFL-U43e     D0       6-8e-a/c0 00000096-&gt;0000009e Core Gen8 Mobile
- KBL-H/S/E3   B0       6-9e-9/2a 0000008e-&gt;0000009a Core Gen7; Xeon E3 v6
- CFL-H/S/E3   U0       6-9e-a/22 00000096-&gt;000000aa Core Gen8 Desktop, Mobile, Xeon E
- CFL-S B0 6-9e-b/02 0000008e-&gt;000000aa Core Gen8

		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-25"/>
	<updated date="2019-03-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1129231">SUSE bug 1129231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521698" comment="ucode-intel-20190312-13.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149948" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1128503" ref_url="https://bugzilla.suse.com/1128503" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12181" ref_url="https://www.suse.com/security/cve/CVE-2018-12181/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005234.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issue:

Security issue fixed: 

- CVE-2018-12181: Fixed a stack buffer overflow in the HII database when a corrupted Bitmap was used (bsc#1128503).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-26"/>
	<updated date="2019-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128503">SUSE bug 1128503</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12181/">CVE-2018-12181 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12181">CVE-2018-12181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554567" comment="ovmf-2017+git1492060560.b6d11d7c46-4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554568" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554569" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554570" comment="qemu-uefi-aarch64-2017+git1492060560.b6d11d7c46-4.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149949" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1123361" ref_url="https://bugzilla.suse.com/1123361" source="BUGZILLA"/>
		<reference ref_id="1123522" ref_url="https://bugzilla.suse.com/1123522" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6977" ref_url="https://www.suse.com/security/cve/CVE-2019-6977/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005236.html" source="SUSE-SU"/>
		<description>
This update for gd fixes the following issues:

Security issues fixed:

- CVE-2019-6977: Fixed a heap-based buffer overflow the GD Graphics Library used in the imagecolormatch function (bsc#1123361).
- CVE-2019-6978: Fixed a double free in the gdImage*Ptr() functions (bsc#1123522).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-26"/>
	<updated date="2019-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123361">SUSE bug 1123361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123522">SUSE bug 1123522</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6977/">CVE-2019-6977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6977">CVE-2019-6977 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6978">CVE-2019-6978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554571" comment="gd-2.1.0-24.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149950" version="1" class="patch">
	<metadata>
		<title>Security update for w3m (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1077559" ref_url="https://bugzilla.suse.com/1077559" source="BUGZILLA"/>
		<reference ref_id="1077568" ref_url="https://bugzilla.suse.com/1077568" source="BUGZILLA"/>
		<reference ref_id="1077572" ref_url="https://bugzilla.suse.com/1077572" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6196" ref_url="https://www.suse.com/security/cve/CVE-2018-6196/" source="CVE"/>
		<reference ref_id="CVE-2018-6197" ref_url="https://www.suse.com/security/cve/CVE-2018-6197/" source="CVE"/>
		<reference ref_id="CVE-2018-6198" ref_url="https://www.suse.com/security/cve/CVE-2018-6198/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005254.html" source="SUSE-SU"/>
		<description>
This update for w3m fixes several issues.

These security issues were fixed:

- CVE-2018-6196: Prevent infinite recursion in HTMLlineproc0 caused by the feed_table_block_tag function which did not prevent a negative indent value (bsc#1077559)
- CVE-2018-6197: Prevent NULL pointer dereference in formUpdateBuffer (bsc#1077568)
- CVE-2018-6198: w3m did not properly handle temporary files when the ~/.w3m directory is unwritable, which allowed a local attacker to craft a symlink attack to overwrite arbitrary files (bsc#1077572)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077559">SUSE bug 1077559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077568">SUSE bug 1077568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077572">SUSE bug 1077572</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6196/">CVE-2018-6196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6196">CVE-2018-6196 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6197/">CVE-2018-6197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6197">CVE-2018-6197 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6198/">CVE-2018-6198 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6198">CVE-2018-6198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554572" comment="w3m-0.5.3.git20161120-161.3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149951" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1125401" ref_url="https://bugzilla.suse.com/1125401" source="BUGZILLA"/>
		<reference ref_id="1128525" ref_url="https://bugzilla.suse.com/1128525" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8936" ref_url="https://www.suse.com/security/cve/CVE-2019-8936/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005258.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

Security issue fixed: 	  

- CVE-2019-8936: Fixed a null pointer exception which could allow an authenticated attcker to cause 
  segmentation fault to ntpd (bsc#1128525).

Other isses addressed:

- Fixed an issue which caused openSSL mismatch (bsc#1125401)
- Fixed several bugs in the BANCOMM reclock driver.
- Fixed ntp_loopfilter.c snprintf compilation warnings.
- Fixed spurious initgroups() error message.
- Fixed STA_NANO struct timex units.
- Fixed GPS week rollover in libparse.
- Fixed incorrect poll interval in packet.
- Added a missing check for ENABLE_CMAC.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-28"/>
	<updated date="2019-03-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1125401">SUSE bug 1125401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128525">SUSE bug 1128525</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8936/">CVE-2019-8936 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8936">CVE-2019-8936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554573" comment="ntp-4.2.8p13-85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554574" comment="ntp-doc-4.2.8p13-85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149952" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1020413" ref_url="https://bugzilla.suse.com/1020413" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1070767" ref_url="https://bugzilla.suse.com/1070767" source="BUGZILLA"/>
		<reference ref_id="1075697" ref_url="https://bugzilla.suse.com/1075697" source="BUGZILLA"/>
		<reference ref_id="1082943" ref_url="https://bugzilla.suse.com/1082943" source="BUGZILLA"/>
		<reference ref_id="1087092" ref_url="https://bugzilla.suse.com/1087092" source="BUGZILLA"/>
		<reference ref_id="1090435" ref_url="https://bugzilla.suse.com/1090435" source="BUGZILLA"/>
		<reference ref_id="1102959" ref_url="https://bugzilla.suse.com/1102959" source="BUGZILLA"/>
		<reference ref_id="1103429" ref_url="https://bugzilla.suse.com/1103429" source="BUGZILLA"/>
		<reference ref_id="1106929" ref_url="https://bugzilla.suse.com/1106929" source="BUGZILLA"/>
		<reference ref_id="1109137" ref_url="https://bugzilla.suse.com/1109137" source="BUGZILLA"/>
		<reference ref_id="1109248" ref_url="https://bugzilla.suse.com/1109248" source="BUGZILLA"/>
		<reference ref_id="1119019" ref_url="https://bugzilla.suse.com/1119019" source="BUGZILLA"/>
		<reference ref_id="1119843" ref_url="https://bugzilla.suse.com/1119843" source="BUGZILLA"/>
		<reference ref_id="1120691" ref_url="https://bugzilla.suse.com/1120691" source="BUGZILLA"/>
		<reference ref_id="1120902" ref_url="https://bugzilla.suse.com/1120902" source="BUGZILLA"/>
		<reference ref_id="1121713" ref_url="https://bugzilla.suse.com/1121713" source="BUGZILLA"/>
		<reference ref_id="1121805" ref_url="https://bugzilla.suse.com/1121805" source="BUGZILLA"/>
		<reference ref_id="1124235" ref_url="https://bugzilla.suse.com/1124235" source="BUGZILLA"/>
		<reference ref_id="1125315" ref_url="https://bugzilla.suse.com/1125315" source="BUGZILLA"/>
		<reference ref_id="1125446" ref_url="https://bugzilla.suse.com/1125446" source="BUGZILLA"/>
		<reference ref_id="1126389" ref_url="https://bugzilla.suse.com/1126389" source="BUGZILLA"/>
		<reference ref_id="1126772" ref_url="https://bugzilla.suse.com/1126772" source="BUGZILLA"/>
		<reference ref_id="1126773" ref_url="https://bugzilla.suse.com/1126773" source="BUGZILLA"/>
		<reference ref_id="1126805" ref_url="https://bugzilla.suse.com/1126805" source="BUGZILLA"/>
		<reference ref_id="1127082" ref_url="https://bugzilla.suse.com/1127082" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1127561" ref_url="https://bugzilla.suse.com/1127561" source="BUGZILLA"/>
		<reference ref_id="1127725" ref_url="https://bugzilla.suse.com/1127725" source="BUGZILLA"/>
		<reference ref_id="1127731" ref_url="https://bugzilla.suse.com/1127731" source="BUGZILLA"/>
		<reference ref_id="1127961" ref_url="https://bugzilla.suse.com/1127961" source="BUGZILLA"/>
		<reference ref_id="1128166" ref_url="https://bugzilla.suse.com/1128166" source="BUGZILLA"/>
		<reference ref_id="1128452" ref_url="https://bugzilla.suse.com/1128452" source="BUGZILLA"/>
		<reference ref_id="1128565" ref_url="https://bugzilla.suse.com/1128565" source="BUGZILLA"/>
		<reference ref_id="1128696" ref_url="https://bugzilla.suse.com/1128696" source="BUGZILLA"/>
		<reference ref_id="1128756" ref_url="https://bugzilla.suse.com/1128756" source="BUGZILLA"/>
		<reference ref_id="1128893" ref_url="https://bugzilla.suse.com/1128893" source="BUGZILLA"/>
		<reference ref_id="1129080" ref_url="https://bugzilla.suse.com/1129080" source="BUGZILLA"/>
		<reference ref_id="1129179" ref_url="https://bugzilla.suse.com/1129179" source="BUGZILLA"/>
		<reference ref_id="1129237" ref_url="https://bugzilla.suse.com/1129237" source="BUGZILLA"/>
		<reference ref_id="1129238" ref_url="https://bugzilla.suse.com/1129238" source="BUGZILLA"/>
		<reference ref_id="1129239" ref_url="https://bugzilla.suse.com/1129239" source="BUGZILLA"/>
		<reference ref_id="1129240" ref_url="https://bugzilla.suse.com/1129240" source="BUGZILLA"/>
		<reference ref_id="1129241" ref_url="https://bugzilla.suse.com/1129241" source="BUGZILLA"/>
		<reference ref_id="1129413" ref_url="https://bugzilla.suse.com/1129413" source="BUGZILLA"/>
		<reference ref_id="1129414" ref_url="https://bugzilla.suse.com/1129414" source="BUGZILLA"/>
		<reference ref_id="1129415" ref_url="https://bugzilla.suse.com/1129415" source="BUGZILLA"/>
		<reference ref_id="1129416" ref_url="https://bugzilla.suse.com/1129416" source="BUGZILLA"/>
		<reference ref_id="1129417" ref_url="https://bugzilla.suse.com/1129417" source="BUGZILLA"/>
		<reference ref_id="1129418" ref_url="https://bugzilla.suse.com/1129418" source="BUGZILLA"/>
		<reference ref_id="1129419" ref_url="https://bugzilla.suse.com/1129419" source="BUGZILLA"/>
		<reference ref_id="1129581" ref_url="https://bugzilla.suse.com/1129581" source="BUGZILLA"/>
		<reference ref_id="1129770" ref_url="https://bugzilla.suse.com/1129770" source="BUGZILLA"/>
		<reference ref_id="1129923" ref_url="https://bugzilla.suse.com/1129923" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2024" ref_url="https://www.suse.com/security/cve/CVE-2019-2024/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005261.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.176 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).

The following non-security bugs were fixed:

- ax25: fix possible use-after-free (bnc#1012382).
- block_dev: fix crash on chained bios with O_DIRECT (bsc#1090435).
- block: do not use bio-&gt;bi_vcnt to figure out segment number (bsc#1128893).
- bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1020413).
- bpf: fix replace_map_fd_with_map_ptr's ldimm64 second imm field (bsc#1012382).
- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128452).
- ceph: avoid repeatedly adding inode to mdsc-&gt;snap_flush_list (bsc#1126773).
- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).
- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).
- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- device property: Fix the length used in PROPERTY_ENTRY_STRING() (bsc#1129770).
- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389).
- drm: Fix error handling in drm_legacy_addctx (bsc#1106929)
- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1106929)
- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1106929)
- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1106929)
- drm/vmwgfx: Do not double-free the mode stored in par-&gt;set_mode (bsc#1103429)
- enic: add wq clean up budget (bsc#1075697, bsc#1120691. bsc#1102959).
- enic: do not overwrite error code (bnc#1012382).
- fbdev: chipsfb: remove set but not used variable 'size' (bsc#1106929)
- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).
- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- input: mms114 - fix license module information (bsc#1087092).
- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129237).
- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129238).
- iommu/vt-d: Check identity map for hot-added devices (bsc#1129239).
- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129240).
- ixgbe: fix crash in build_skb Rx code path (git-fixes).
- kabi: protect struct inet_peer (kabi).
- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).
- KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).
- kvm: arm/arm64: vgic-its: Check CBASER/BASER validity before enabling the ITS (bsc#1109248).
- kvm: arm/arm64: vgic-its: Check GITS_BASER Valid bit before saving tables (bsc#1109248).
- kvm: arm/arm64: vgic-its: Fix return value for device table restore (bsc#1109248).
- kvm: arm/arm64: vgic-its: Fix vgic_its_restore_collection_table returned value (bsc#1109248).
- kvm: nVMX: Do not halt vcpu when L1 is injecting events to L2 (bsc#1129413).
- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129414).
- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129415).
- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129416).
- kvm: VMX: Do not allow reexecute_instruction() when skipping MMIO instr (bsc#1129417).
- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129418).
- kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs (bsc#1127082).
- kvm: x86: IA32_ARCH_CAPABILITIES is always supported (bsc#1129419).
- libceph: handle an empty authorize reply (bsc#1126772).
- mdio_bus: Fix use-after-free on device_register fails (git-fixes).
- mfd: as3722: Handle interrupts on suspend (bnc#1012382).
- mfd: as3722: Mark PM functions as __maybe_unused (bnc#1012382).
- mISDN: fix a race in dev_expire_timer() (bnc#1012382).
- mlxsw: pci: Correctly determine if descriptor queue is full (git-fixes).
- mlxsw: reg: Use correct offset in field definiton (git-fixes).
- mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL (bnc#1012382).
- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).
- net: Add header for usage of fls64() (bnc#1012382).
- net: Do not allocate page fragments that are not skb aligned (bnc#1012382).
- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).
- net: dsa: mv88e6xxx: fix port VLAN maps (git-fixes).
- net: Fix for_each_netdev_feature on Big endian (bnc#1012382).
- net: fix IPv6 prefix route residue (bnc#1012382).
- net/hamradio/6pack: Convert timers to use timer_setup() (git-fixes).
- net/hamradio/6pack: use mod_timer() to rearm timers (git-fixes).
- net: ipv4: use a dedicated counter for icmp_v4 redirect packets (bnc#1012382).
- net: lan78xx: Fix race in tx pending skb size calculation (git-fixes).
- net/mlx4_core: drop useless LIST_HEAD (git-fixes).
- net/mlx4_core: Fix qp mtt size calculation (git-fixes).
- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).
- net/mlx4: Fix endianness issue in qp context params (git-fixes).
- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).
- net/mlx5e: Fix TCP checksum in LRO buffers (git-fixes).
- net/mlx5: Fix driver load bad flow when having fw initializing timeout (git-fixes).
- net/mlx5: fix uaccess beyond 'count' in debugfs read/write handlers (git-fixes).
- net/mlx5: Fix use-after-free in self-healing flow (git-fixes).
- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).
- net: mv643xx_eth: fix packet corruption with TSO and tiny unaligned packets (git-fixes).
- net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS (git-fixes).
- net: phy: bcm7xxx: Fix shadow mode 2 disabling (git-fixes).
- net: qca_spi: Fix race condition in spi transfers (git-fixes).
- net: stmmac: Fix a race in EEE enable callback (bnc#1012382).
- net: stmmac: Fix a race in EEE enable callback (git-fixes).
- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (git-fixes).
- net/x25: do not hold the cpu too long in x25_new_lci() (bnc#1012382).
- PCI/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1129241).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- phy: micrel: Ensure interrupts are reenabled on resume (git-fixes).
- powerpc/pseries: Add CPU dlpar remove functionality (bsc#1128756).
- powerpc/pseries: Consolidate CPU hotplug code to hotplug-cpu.c (bsc#1128756).
- powerpc/pseries: Factor out common cpu hotplug code (bsc#1128756).
- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1128756).
- pppoe: fix reception of frames with no mac header (git-fixes).
- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).
- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).
- rdma/bnxt_re: Synchronize destroy_qp with poll_cq (bsc#1125446).
- Revert 'mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL' (bnc#1012382).
- Revert 'x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls' (bsc#1128565).
- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).
- scsi: aacraid: Fix missing break in switch statement (bsc#1128696).
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: lpfc: do not set queue-&gt;page_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1127725).
- scsi: qla2xxx: Fix early srb free on abort (bsc#1121713).
- scsi: qla2xxx: Fix for double free of SRB structure (bsc#1121713).
- scsi: qla2xxx: Increase abort timeout value (bsc#1121713).
- scsi: qla2xxx: Move {get|rel}_sp to base_qpair struct (bsc#1121713).
- scsi: qla2xxx: Return switch command on a timeout (bsc#1121713).
- scsi: qla2xxx: Turn off IOCB timeout timer on IOCB completion (bsc#1121713).
- scsi: qla2xxx: Use correct qpair for ABTS/CMD (bsc#1121713).
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- sky2: Increase D3 delay again (bnc#1012382).
- tcp: clear icsk_backoff in tcp_write_queue_purge() (bnc#1012382).
- tcp: tcp_v4_err() should be more careful (bnc#1012382).
- team: avoid complex list operations in team_nl_cmd_options_set() (bnc#1012382).
- team: Free BPF filter when unregistering netdev (git-fixes).
- tracing: Do not free iter-&gt;trace in fail path of tracing_open_pipe() (bsc#1129581).
- vsock: cope with memory allocation failure at socket creation time (bnc#1012382).
- vxlan: test dev-&gt;flags &amp; IFF_UP before calling netif_rx() (bnc#1012382).
- wireless: airo: potential buffer overflow in sprintf() (bsc#1120902).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86: Fix incorrect value for X86_FEATURE_TSX_FORCE_ABORT
- x86: livepatch: Treat R_X86_64_PLT32 as R_X86_64_PC32 (bnc#1012382).
- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).
- xen: remove pre-xen3 fallback handlers (bsc#1065600).
- xfs: remove filestream item xfs_inode reference (bsc#1127961).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020413">SUSE bug 1020413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070767">SUSE bug 1070767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075697">SUSE bug 1075697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082943">SUSE bug 1082943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087092">SUSE bug 1087092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090435">SUSE bug 1090435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102959">SUSE bug 1102959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103429">SUSE bug 1103429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106929">SUSE bug 1106929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109137">SUSE bug 1109137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109248">SUSE bug 1109248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119019">SUSE bug 1119019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119843">SUSE bug 1119843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120691">SUSE bug 1120691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120902">SUSE bug 1120902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121713">SUSE bug 1121713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121805">SUSE bug 1121805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124235">SUSE bug 1124235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125315">SUSE bug 1125315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125446">SUSE bug 1125446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126389">SUSE bug 1126389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126772">SUSE bug 1126772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126773">SUSE bug 1126773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126805">SUSE bug 1126805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127082">SUSE bug 1127082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127561">SUSE bug 1127561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127725">SUSE bug 1127725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127731">SUSE bug 1127731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127961">SUSE bug 1127961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128166">SUSE bug 1128166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128452">SUSE bug 1128452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128565">SUSE bug 1128565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128696">SUSE bug 1128696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128756">SUSE bug 1128756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128893">SUSE bug 1128893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129080">SUSE bug 1129080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129179">SUSE bug 1129179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129237">SUSE bug 1129237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129238">SUSE bug 1129238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129239">SUSE bug 1129239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129240">SUSE bug 1129240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129241">SUSE bug 1129241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129413">SUSE bug 1129413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129414">SUSE bug 1129414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129415">SUSE bug 1129415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129416">SUSE bug 1129416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129417">SUSE bug 1129417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129418">SUSE bug 1129418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129419">SUSE bug 1129419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129581">SUSE bug 1129581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129770">SUSE bug 1129770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129923">SUSE bug 1129923</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2024/">CVE-2019-2024 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2024">CVE-2019-2024 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9213">CVE-2019-9213 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554575" comment="kernel-default-4.4.176-94.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554576" comment="kernel-default-base-4.4.176-94.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554577" comment="kernel-default-devel-4.4.176-94.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554578" comment="kernel-default-man-4.4.176-94.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521707" comment="kernel-devel-4.4.176-94.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521708" comment="kernel-macros-4.4.176-94.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521709" comment="kernel-source-4.4.176-94.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554579" comment="kernel-syms-4.4.176-94.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149953" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1100078" ref_url="https://bugzilla.suse.com/1100078" source="BUGZILLA"/>
		<reference ref_id="1113975" ref_url="https://bugzilla.suse.com/1113975" source="BUGZILLA"/>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005266.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed: 

- The 9 Lives of Bleichenbacher's CAT: Cache Attacks on TLS Implementations (bsc#1117951)
- CVE-2019-1559: Fixed OpenSSL 0-byte Record Padding Oracle which under certain circumstances
  a TLS server can be forced to respond differently to a client and lead to the decryption of the data (bsc#1127080).

Other issues addressed: 

- Fixed IV handling in SHAEXT paths: aes/asm/aesni-sha*-x86_64.pl (bsc#1113975).
- Set TLS version to 0 in msg_callback for record messages to avoid confusing applications (bsc#1100078).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100078">SUSE bug 1100078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113975">SUSE bug 1113975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1559">CVE-2019-1559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009542134" comment="libopenssl-devel-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554580" comment="libopenssl1_0_0-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551392" comment="libopenssl1_0_0-32bit-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554581" comment="libopenssl1_0_0-hmac-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551394" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554582" comment="openssl-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530876" comment="openssl-doc-1.0.2j-60.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149954" version="1" class="patch">
	<metadata>
		<title>Recommended update for adcli, sssd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1109849" ref_url="https://bugzilla.suse.com/1109849" source="BUGZILLA"/>
		<reference ref_id="1110121" ref_url="https://bugzilla.suse.com/1110121" source="BUGZILLA"/>
		<reference ref_id="1121759" ref_url="https://bugzilla.suse.com/1121759" source="BUGZILLA"/>
		<reference ref_id="1125617" ref_url="https://bugzilla.suse.com/1125617" source="BUGZILLA"/>
		<reference ref_id="1127670" ref_url="https://bugzilla.suse.com/1127670" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3811" ref_url="https://www.suse.com/security/cve/CVE-2019-3811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005264.html" source="SUSE-SU"/>
		<description>

This update for adcli and sssd provides the following improvement:

Security vulnerability fixed:

- CVE-2019-3811: Fix fallback_homedir returning '/' for empty home directories
  (bsc#1121759)

Other fixes:

- Add an option to disable checking for trusted domains in the subdomains provider (bsc#1125617)
- Clear pid file in corner cases (bsc#1127670)
- Fix child unable to write to log file after SIGHUP (bsc#1127670)
- Include adcli in SUSE Linux Enterprise 12 SP3 for sssd-ad. (fate#326619, bsc#1109849)

The adcli enables sssd to do password renewal when using Active Directory.
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109849">SUSE bug 1109849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110121">SUSE bug 1110121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121759">SUSE bug 1121759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125617">SUSE bug 1125617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127670">SUSE bug 1127670</bugzilla>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3811/">CVE-2019-3811 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3811">CVE-2019-3811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554583" comment="adcli-0.8.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554584" comment="libipa_hbac0-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554585" comment="libsss_idmap0-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554586" comment="libsss_nss_idmap0-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554587" comment="libsss_sudo-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554588" comment="python-sssd-config-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554589" comment="sssd-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554590" comment="sssd-32bit-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554591" comment="sssd-ad-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554592" comment="sssd-ipa-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554593" comment="sssd-krb5-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554594" comment="sssd-krb5-common-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554595" comment="sssd-ldap-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554596" comment="sssd-proxy-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554597" comment="sssd-tools-1.13.4-34.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149955" version="1" class="patch">
	<metadata>
		<title>Security update for sssd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1010700" ref_url="https://bugzilla.suse.com/1010700" source="BUGZILLA"/>
		<reference ref_id="1072728" ref_url="https://bugzilla.suse.com/1072728" source="BUGZILLA"/>
		<reference ref_id="1080156" ref_url="https://bugzilla.suse.com/1080156" source="BUGZILLA"/>
		<reference ref_id="1087320" ref_url="https://bugzilla.suse.com/1087320" source="BUGZILLA"/>
		<reference ref_id="1098377" ref_url="https://bugzilla.suse.com/1098377" source="BUGZILLA"/>
		<reference ref_id="1101877" ref_url="https://bugzilla.suse.com/1101877" source="BUGZILLA"/>
		<reference ref_id="1110299" ref_url="https://bugzilla.suse.com/1110299" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10852" ref_url="https://www.suse.com/security/cve/CVE-2018-10852/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005031.html" source="SUSE-SU"/>
		<description>
This update for sssd provides the following fixes:

This security issue was fixed:

- CVE-2018-10852: Set stricter permissions on /var/lib/sss/pipes/sudo to prevent the disclosure of sudo rules for arbitrary users (bsc#1098377)

These non-security issues were fixed:

- Fix a segmentation fault in sss_cache command. (bsc#1072728)
- Fix a failure in autofs initialisation sequence upon system boot. (bsc#1010700)
- Fix race condition on boot between SSSD and autofs. (bsc#1010700)
- Fix a bug where file descriptors were not closed (bsc#1080156)
- Fix an issue where sssd logs were not rotated properly (bsc#1080156)
- Remove whitespaces from netgroup entries (bsc#1087320)
- Remove misleading log messages (bsc#1101877)
- exit() the forked process if exec()-ing a child process fails (bsc#1110299)
- Do not schedule the machine renewal task if adcli is not executable (bsc#1110299)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-11"/>
	<updated date="2019-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010700">SUSE bug 1010700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072728">SUSE bug 1072728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080156">SUSE bug 1080156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087320">SUSE bug 1087320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098377">SUSE bug 1098377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101877">SUSE bug 1101877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110299">SUSE bug 1110299</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10852/">CVE-2018-10852 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10852">CVE-2018-10852 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554598" comment="libipa_hbac0-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554599" comment="libsss_idmap0-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554600" comment="libsss_nss_idmap0-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554601" comment="libsss_sudo-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554602" comment="python-sssd-config-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554603" comment="sssd-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551401" comment="sssd-32bit-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554604" comment="sssd-ad-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554605" comment="sssd-ipa-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554606" comment="sssd-krb5-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554607" comment="sssd-krb5-common-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554608" comment="sssd-ldap-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554609" comment="sssd-proxy-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554610" comment="sssd-tools-1.13.4-34.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149956" version="1" class="patch">
	<metadata>
		<title>Optional update for php72 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1126314" ref_url="https://bugzilla.suse.com/1126314" source="BUGZILLA"/>
		<reference ref_id="1129032" ref_url="https://bugzilla.suse.com/1129032" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20783" ref_url="https://www.suse.com/security/cve/CVE-2018-20783/" source="CVE"/>
		<reference ref_id="CVE-2019-9020" ref_url="https://www.suse.com/security/cve/CVE-2019-9020/" source="CVE"/>
		<reference ref_id="CVE-2019-9021" ref_url="https://www.suse.com/security/cve/CVE-2019-9021/" source="CVE"/>
		<reference ref_id="CVE-2019-9022" ref_url="https://www.suse.com/security/cve/CVE-2019-9022/" source="CVE"/>
		<reference ref_id="CVE-2019-9023" ref_url="https://www.suse.com/security/cve/CVE-2019-9023/" source="CVE"/>
		<reference ref_id="CVE-2019-9024" ref_url="https://www.suse.com/security/cve/CVE-2019-9024/" source="CVE"/>
		<reference ref_id="CVE-2019-9641" ref_url="https://www.suse.com/security/cve/CVE-2019-9641/" source="CVE"/>
		<reference ref_id="SUSE-RU-2019:0823-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-March/011096.html" source="SUSE-SU"/>
		<description>

This update provides PHP 7.2 and subpackages to the SUSE Linux Enterprise 12 Web and Scripting Module.

It is a replacement of the php7 packages, the packages do not co-exist.

The mcrypt extensions was removed in PHP 7.2.
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126314">SUSE bug 1126314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129032">SUSE bug 1129032</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20783/">CVE-2018-20783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20783">CVE-2018-20783 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9020/">CVE-2019-9020 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9020">CVE-2019-9020 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9021/">CVE-2019-9021 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9021">CVE-2019-9021 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9022/">CVE-2019-9022 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9022">CVE-2019-9022 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9023/">CVE-2019-9023 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9023">CVE-2019-9023 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9024/">CVE-2019-9024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9024">CVE-2019-9024 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9641/">CVE-2019-9641 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9641">CVE-2019-9641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562488" comment="libmemcached-1.0.18-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562432" comment="libmemcached11-1.0.18-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562489" comment="libmemcachedutil2-1.0.18-3.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149957" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1130324" ref_url="https://bugzilla.suse.com/1130324" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9924" ref_url="https://www.suse.com/security/cve/CVE-2019-9924/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005282.html" source="SUSE-SU"/>
		<description>
This update for bash fixes the following issues:
	  
Security issue fixed: 

- CVE-2019-9924: Fixed a vulnerability in which shell did not prevent user BASH_CMDS 
  allowing the user to execute any command with the permissions of the shell (bsc#1130324).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-02"/>
	<updated date="2019-04-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130324">SUSE bug 1130324</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9924/">CVE-2019-9924 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9924">CVE-2019-9924 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554611" comment="bash-4.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521745" comment="bash-doc-4.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554612" comment="libreadline6-6.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551416" comment="libreadline6-32bit-6.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521749" comment="readline-doc-6.3-83.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149958" version="1" class="patch">
	<metadata>
		<title>Security update for file (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1096974" ref_url="https://bugzilla.suse.com/1096974" source="BUGZILLA"/>
		<reference ref_id="1096984" ref_url="https://bugzilla.suse.com/1096984" source="BUGZILLA"/>
		<reference ref_id="1126117" ref_url="https://bugzilla.suse.com/1126117" source="BUGZILLA"/>
		<reference ref_id="1126118" ref_url="https://bugzilla.suse.com/1126118" source="BUGZILLA"/>
		<reference ref_id="1126119" ref_url="https://bugzilla.suse.com/1126119" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10360" ref_url="https://www.suse.com/security/cve/CVE-2018-10360/" source="CVE"/>
		<reference ref_id="CVE-2019-8905" ref_url="https://www.suse.com/security/cve/CVE-2019-8905/" source="CVE"/>
		<reference ref_id="CVE-2019-8906" ref_url="https://www.suse.com/security/cve/CVE-2019-8906/" source="CVE"/>
		<reference ref_id="CVE-2019-8907" ref_url="https://www.suse.com/security/cve/CVE-2019-8907/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005284.html" source="SUSE-SU"/>
		<description>
This update for file fixes the following issues:

The following security vulnerabilities were addressed:

- Fixed an out-of-bounds read in the function do_core_note in readelf.c, which
  allowed remote attackers to cause a denial of service (application crash) via
  a crafted ELF file (bsc#1096974 CVE-2018-10360).
- CVE-2019-8905: Fixed a stack-based buffer over-read in do_core_note in readelf.c
  (bsc#1126118)
- CVE-2019-8906: Fixed an out-of-bounds read in do_core_note in readelf. c
  (bsc#1126119)
- CVE-2019-8907: Fixed a stack corruption in do_core_note in readelf.c
  (bsc#1126117)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-02"/>
	<updated date="2019-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096974">SUSE bug 1096974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096984">SUSE bug 1096984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126117">SUSE bug 1126117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126118">SUSE bug 1126118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126119">SUSE bug 1126119</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10360/">CVE-2018-10360 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10360">CVE-2018-10360 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8905/">CVE-2019-8905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8905">CVE-2019-8905 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8906/">CVE-2019-8906 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8906">CVE-2019-8906 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8907/">CVE-2019-8907 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8907">CVE-2019-8907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554613" comment="file-5.22-10.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554614" comment="file-magic-5.22-10.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554615" comment="libmagic1-5.22-10.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554616" comment="libmagic1-32bit-5.22-10.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149959" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1125330" ref_url="https://bugzilla.suse.com/1125330" source="BUGZILLA"/>
		<reference ref_id="1127987" ref_url="https://bugzilla.suse.com/1127987" source="BUGZILLA"/>
		<reference ref_id="1129821" ref_url="https://bugzilla.suse.com/1129821" source="BUGZILLA"/>
		<reference ref_id="1130262" ref_url="https://bugzilla.suse.com/1130262" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18335" ref_url="https://www.suse.com/security/cve/CVE-2018-18335/" source="CVE"/>
		<reference ref_id="CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356/" source="CVE"/>
		<reference ref_id="CVE-2018-18506" ref_url="https://www.suse.com/security/cve/CVE-2018-18506/" source="CVE"/>
		<reference ref_id="CVE-2019-5785" ref_url="https://www.suse.com/security/cve/CVE-2019-5785/" source="CVE"/>
		<reference ref_id="CVE-2019-9788" ref_url="https://www.suse.com/security/cve/CVE-2019-9788/" source="CVE"/>
		<reference ref_id="CVE-2019-9790" ref_url="https://www.suse.com/security/cve/CVE-2019-9790/" source="CVE"/>
		<reference ref_id="CVE-2019-9791" ref_url="https://www.suse.com/security/cve/CVE-2019-9791/" source="CVE"/>
		<reference ref_id="CVE-2019-9792" ref_url="https://www.suse.com/security/cve/CVE-2019-9792/" source="CVE"/>
		<reference ref_id="CVE-2019-9793" ref_url="https://www.suse.com/security/cve/CVE-2019-9793/" source="CVE"/>
		<reference ref_id="CVE-2019-9794" ref_url="https://www.suse.com/security/cve/CVE-2019-9794/" source="CVE"/>
		<reference ref_id="CVE-2019-9795" ref_url="https://www.suse.com/security/cve/CVE-2019-9795/" source="CVE"/>
		<reference ref_id="CVE-2019-9796" ref_url="https://www.suse.com/security/cve/CVE-2019-9796/" source="CVE"/>
		<reference ref_id="CVE-2019-9801" ref_url="https://www.suse.com/security/cve/CVE-2019-9801/" source="CVE"/>
		<reference ref_id="CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810/" source="CVE"/>
		<reference ref_id="CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issuess addressed:	  

- update to Firefox ESR 60.6.1 (bsc#1130262):

- CVE-2019-9813: Fixed Ionmonkey type confusion with __proto__ mutations
- CVE-2019-9810: Fixed IonMonkey MArraySlice incorrect alias information

- Update to Firefox ESR 60.6 (bsc#1129821):

- CVE-2018-18506: Fixed an issue with Proxy Auto-Configuration file 
- CVE-2019-9801: Fixed an issue which could allow Windows programs to be exposed to web content
- CVE-2019-9788: Fixed multiple memory safety bugs
- CVE-2019-9790: Fixed a Use-after-free vulnerability when removing in-use DOM elements
- CVE-2019-9791: Fixed an incorrect Type inference for constructors entered through on-stack replacement 
  with IonMonkey
- CVE-2019-9792: Fixed an issue where IonMonkey leaks JS_OPTIMIZED_OUT magic value to script
- CVE-2019-9793: Fixed multiple improper bounds checks when Spectre mitigations are disabled
- CVE-2019-9794: Fixed an issue where command line arguments not discarded during execution
- CVE-2019-9795: Fixed a Type-confusion vulnerability in IonMonkey JIT compiler
- CVE-2019-9796: Fixed a Use-after-free vulnerability in SMIL animation controller


- Update to Firefox ESR 60.5.1 (bsc#1125330):

- CVE-2018-18356: Fixed a use-after-free vulnerability in the Skia library which can occur when
    creating a path, leading to a potentially exploitable crash.
- CVE-2019-5785: Fixed an integer overflow vulnerability in the Skia library which can occur
  after specific transform operations, leading to a potentially exploitable crash.
- CVE-2018-18335: Fixed a buffer overflow vulnerability in the Skia library which can occur with
  Canvas 2D acceleration on macOS. This issue was addressed by disabling Canvas 2D acceleration 
  in Firefox ESR.  Note: this does not affect other versions and platforms where Canvas 2D
  acceleration is already disabled by default.

Other issue addressed: 

- Fixed an issue with MozillaFirefox-translations-common which was causing error on update (bsc#1127987).

Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-12/
Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-08/
Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-03"/>
	<updated date="2019-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1125330">SUSE bug 1125330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127987">SUSE bug 1127987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130262">SUSE bug 1130262</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18335/">CVE-2018-18335 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18335">CVE-2018-18335 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18356">CVE-2018-18356 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18506/">CVE-2018-18506 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18506">CVE-2018-18506 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5785/">CVE-2019-5785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5785">CVE-2019-5785 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9788/">CVE-2019-9788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9788">CVE-2019-9788 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9790/">CVE-2019-9790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9790">CVE-2019-9790 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9791/">CVE-2019-9791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9791">CVE-2019-9791 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9792/">CVE-2019-9792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9792">CVE-2019-9792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9793/">CVE-2019-9793 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9793">CVE-2019-9793 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9794/">CVE-2019-9794 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9794">CVE-2019-9794 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9795/">CVE-2019-9795 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9795">CVE-2019-9795 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9796/">CVE-2019-9796 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9796">CVE-2019-9796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9801/">CVE-2019-9801 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9801">CVE-2019-9801 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9810">CVE-2019-9810 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9813">CVE-2019-9813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554617" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554618" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149960" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1131233" ref_url="https://bugzilla.suse.com/1131233" source="BUGZILLA"/>
		<reference ref_id="1131237" ref_url="https://bugzilla.suse.com/1131237" source="BUGZILLA"/>
		<reference ref_id="1131239" ref_url="https://bugzilla.suse.com/1131239" source="BUGZILLA"/>
		<reference ref_id="1131241" ref_url="https://bugzilla.suse.com/1131241" source="BUGZILLA"/>
		<reference ref_id="1131245" ref_url="https://bugzilla.suse.com/1131245" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0196" ref_url="https://www.suse.com/security/cve/CVE-2019-0196/" source="CVE"/>
		<reference ref_id="CVE-2019-0197" ref_url="https://www.suse.com/security/cve/CVE-2019-0197/" source="CVE"/>
		<reference ref_id="CVE-2019-0211" ref_url="https://www.suse.com/security/cve/CVE-2019-0211/" source="CVE"/>
		<reference ref_id="CVE-2019-0217" ref_url="https://www.suse.com/security/cve/CVE-2019-0217/" source="CVE"/>
		<reference ref_id="CVE-2019-0220" ref_url="https://www.suse.com/security/cve/CVE-2019-0220/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005296.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

* CVE-2019-0220: The Apache HTTP server did not use a consistent strategy for
  URL normalization throughout all of its components. In particular,
  consecutive slashes were not always collapsed. Attackers could potentially
  abuse these inconsistencies to by-pass access control mechanisms and thus
  gain unauthorized access to protected parts of the service. [bsc#1131241]

* CVE-2019-0217: A race condition in Apache's 'mod_auth_digest' when running in
  a threaded server could have allowed users with valid credentials to
  authenticate using another username, bypassing configured access control
  restrictions. [bsc#1131239]

* CVE-2019-0211: A flaw in the Apache HTTP Server allowed less-privileged child
  processes or threads to execute arbitrary code with the privileges of the
  parent process. Attackers with control over CGI scripts or extension modules
  run by the server could have abused this issue to potentially gain super user
  privileges. [bsc#1131233]

* CVE-2019-0197: When HTTP/2 support was enabled in the Apache server for a
  'http' host or H2Upgrade was enabled for h2 on a 'https' host, an Upgrade
  request from http/1.1 to http/2 that was not the first request on a
  connection could lead to a misconfiguration and crash. This issue could have
  been abused to mount a denial-of-service attack. Servers that never enabled
  the h2 protocol or that only enabled it for https: and did not configure the
  'H2Upgrade on' are unaffected. [bsc#1131245]

* CVE-2019-0196: Through specially crafted network input the Apache's http/2
  request handler could be lead to access previously freed memory while
  determining the method of a request. This resulted in the request being
  misclassified and thus being processed incorrectly. [bsc#1131237]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-04"/>
	<updated date="2019-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131233">SUSE bug 1131233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131237">SUSE bug 1131237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131239">SUSE bug 1131239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131241">SUSE bug 1131241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131245">SUSE bug 1131245</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0196/">CVE-2019-0196 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0196">CVE-2019-0196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-0197/">CVE-2019-0197 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0197">CVE-2019-0197 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0211/">CVE-2019-0211 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0211">CVE-2019-0211 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-0217/">CVE-2019-0217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0217">CVE-2019-0217 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0220/">CVE-2019-0220 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0220">CVE-2019-0220 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554619" comment="apache2-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530887" comment="apache2-doc-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554620" comment="apache2-example-pages-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554621" comment="apache2-prefork-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554622" comment="apache2-utils-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554623" comment="apache2-worker-2.4.23-29.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149961" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1130721" ref_url="https://bugzilla.suse.com/1130721" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787/" source="CVE"/>
		<reference ref_id="CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788/" source="CVE"/>
		<reference ref_id="CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005308.html" source="SUSE-SU"/>
		<description>
This update for clamav to version 0.100.3 fixes the following issues:

Security issues fixed (bsc#1130721): 	  

- CVE-2019-1787: Fixed an out-of-bounds heap read condition which may occur
  when scanning PDF documents.   
- CVE-2019-1789: Fixed an out-of-bounds heap read condition which may occur
  when scanning PE files (i.e. Windows EXE and DLL files).
- CVE-2019-1788: Fixed an out-of-bounds heap write condition which may occur
  when scanning OLE2 files such as Microsoft Office 97-2003 documents. 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-08"/>
	<updated date="2019-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1787">CVE-2019-1787 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1788">CVE-2019-1788 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1789">CVE-2019-1789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554624" comment="clamav-0.100.3-33.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149962" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1124799" ref_url="https://bugzilla.suse.com/1124799" source="BUGZILLA"/>
		<reference ref_id="1124800" ref_url="https://bugzilla.suse.com/1124800" source="BUGZILLA"/>
		<reference ref_id="1124802" ref_url="https://bugzilla.suse.com/1124802" source="BUGZILLA"/>
		<reference ref_id="1124803" ref_url="https://bugzilla.suse.com/1124803" source="BUGZILLA"/>
		<reference ref_id="1124805" ref_url="https://bugzilla.suse.com/1124805" source="BUGZILLA"/>
		<reference ref_id="1124806" ref_url="https://bugzilla.suse.com/1124806" source="BUGZILLA"/>
		<reference ref_id="1124824" ref_url="https://bugzilla.suse.com/1124824" source="BUGZILLA"/>
		<reference ref_id="1124825" ref_url="https://bugzilla.suse.com/1124825" source="BUGZILLA"/>
		<reference ref_id="1124826" ref_url="https://bugzilla.suse.com/1124826" source="BUGZILLA"/>
		<reference ref_id="1124827" ref_url="https://bugzilla.suse.com/1124827" source="BUGZILLA"/>
		<reference ref_id="1125099" ref_url="https://bugzilla.suse.com/1125099" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7576" ref_url="https://www.suse.com/security/cve/CVE-2019-7576/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:
	  
Security issues fixed:	  

- CVE-2019-7572: Fixed a buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c.(bsc#1124806).
- CVE-2019-7578: Fixed a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c (bsc#1125099).
- CVE-2019-7576: Fixed heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124799).
- CVE-2019-7573: Fixed a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124805).
- CVE-2019-7635: Fixed a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c. (bsc#1124827).
- CVE-2019-7636: Fixed a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c (bsc#1124826).
- CVE-2019-7638: Fixed a heap-based buffer over-read in Map1toN in video/SDL_pixels.c (bsc#1124824).
- CVE-2019-7574: Fixed a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c (bsc#1124803).
- CVE-2019-7575: Fixed a heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c (bsc#1124802).
- CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect function in SDL_surface.c (bsc#1124825).
- CVE-2019-7577: Fixed a buffer over read in SDL_LoadWAV_RW in audio/SDL_wave.c (bsc#1124800). 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-08"/>
	<updated date="2019-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124799">SUSE bug 1124799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124800">SUSE bug 1124800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124802">SUSE bug 1124802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124803">SUSE bug 1124803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124805">SUSE bug 1124805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124806">SUSE bug 1124806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124824">SUSE bug 1124824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124826">SUSE bug 1124826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124827">SUSE bug 1124827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125099">SUSE bug 1125099</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7572">CVE-2019-7572 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7573">CVE-2019-7573 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7574">CVE-2019-7574 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7575">CVE-2019-7575 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7576/">CVE-2019-7576 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7576">CVE-2019-7576 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7577">CVE-2019-7577 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7578">CVE-2019-7578 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7635">CVE-2019-7635 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7636">CVE-2019-7636 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7637">CVE-2019-7637 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7638">CVE-2019-7638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554625" comment="libSDL-1_2-0-1.2.15-15.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554626" comment="libSDL-1_2-0-32bit-1.2.15-15.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149963" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1111789" ref_url="https://bugzilla.suse.com/1111789" source="BUGZILLA"/>
		<reference ref_id="1123022" ref_url="https://bugzilla.suse.com/1123022" source="BUGZILLA"/>
		<reference ref_id="1130116" ref_url="https://bugzilla.suse.com/1130116" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3814" ref_url="https://www.suse.com/security/cve/CVE-2019-3814/" source="CVE"/>
		<reference ref_id="CVE-2019-7524" ref_url="https://www.suse.com/security/cve/CVE-2019-7524/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005310.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

Security issues fixed: 

- CVE-2019-7524: Fixed an improper file handling which could result in stack overflow allowing 
  local root escalation (bsc#1130116).
- CVE-2019-3814: Fixed a vulnerability related to SSL client certificate authentication (bsc#1123022).

Other issue fixed: 
- Fixed handling of command continuation(bsc#1111789)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-08"/>
	<updated date="2019-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111789">SUSE bug 1111789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123022">SUSE bug 1123022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130116">SUSE bug 1130116</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-3814/">CVE-2019-3814 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3814">CVE-2019-3814 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7524/">CVE-2019-7524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7524">CVE-2019-7524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554627" comment="dovecot22-2.2.31-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554628" comment="dovecot22-backend-mysql-2.2.31-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554629" comment="dovecot22-backend-pgsql-2.2.31-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554630" comment="dovecot22-backend-sqlite-2.2.31-19.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149964" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1020413" ref_url="https://bugzilla.suse.com/1020413" source="BUGZILLA"/>
		<reference ref_id="1023175" ref_url="https://bugzilla.suse.com/1023175" source="BUGZILLA"/>
		<reference ref_id="1031492" ref_url="https://bugzilla.suse.com/1031492" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1050549" ref_url="https://bugzilla.suse.com/1050549" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1070767" ref_url="https://bugzilla.suse.com/1070767" source="BUGZILLA"/>
		<reference ref_id="1075697" ref_url="https://bugzilla.suse.com/1075697" source="BUGZILLA"/>
		<reference ref_id="1078355" ref_url="https://bugzilla.suse.com/1078355" source="BUGZILLA"/>
		<reference ref_id="1082943" ref_url="https://bugzilla.suse.com/1082943" source="BUGZILLA"/>
		<reference ref_id="1086095" ref_url="https://bugzilla.suse.com/1086095" source="BUGZILLA"/>
		<reference ref_id="1086652" ref_url="https://bugzilla.suse.com/1086652" source="BUGZILLA"/>
		<reference ref_id="1087036" ref_url="https://bugzilla.suse.com/1087036" source="BUGZILLA"/>
		<reference ref_id="1087092" ref_url="https://bugzilla.suse.com/1087092" source="BUGZILLA"/>
		<reference ref_id="1090435" ref_url="https://bugzilla.suse.com/1090435" source="BUGZILLA"/>
		<reference ref_id="1094823" ref_url="https://bugzilla.suse.com/1094823" source="BUGZILLA"/>
		<reference ref_id="1099810" ref_url="https://bugzilla.suse.com/1099810" source="BUGZILLA"/>
		<reference ref_id="1102875" ref_url="https://bugzilla.suse.com/1102875" source="BUGZILLA"/>
		<reference ref_id="1102877" ref_url="https://bugzilla.suse.com/1102877" source="BUGZILLA"/>
		<reference ref_id="1102879" ref_url="https://bugzilla.suse.com/1102879" source="BUGZILLA"/>
		<reference ref_id="1102882" ref_url="https://bugzilla.suse.com/1102882" source="BUGZILLA"/>
		<reference ref_id="1102896" ref_url="https://bugzilla.suse.com/1102896" source="BUGZILLA"/>
		<reference ref_id="1102959" ref_url="https://bugzilla.suse.com/1102959" source="BUGZILLA"/>
		<reference ref_id="1103429" ref_url="https://bugzilla.suse.com/1103429" source="BUGZILLA"/>
		<reference ref_id="1105428" ref_url="https://bugzilla.suse.com/1105428" source="BUGZILLA"/>
		<reference ref_id="1106061" ref_url="https://bugzilla.suse.com/1106061" source="BUGZILLA"/>
		<reference ref_id="1106105" ref_url="https://bugzilla.suse.com/1106105" source="BUGZILLA"/>
		<reference ref_id="1106929" ref_url="https://bugzilla.suse.com/1106929" source="BUGZILLA"/>
		<reference ref_id="1107866" ref_url="https://bugzilla.suse.com/1107866" source="BUGZILLA"/>
		<reference ref_id="1109137" ref_url="https://bugzilla.suse.com/1109137" source="BUGZILLA"/>
		<reference ref_id="1109248" ref_url="https://bugzilla.suse.com/1109248" source="BUGZILLA"/>
		<reference ref_id="1109695" ref_url="https://bugzilla.suse.com/1109695" source="BUGZILLA"/>
		<reference ref_id="1114893" ref_url="https://bugzilla.suse.com/1114893" source="BUGZILLA"/>
		<reference ref_id="1116345" ref_url="https://bugzilla.suse.com/1116345" source="BUGZILLA"/>
		<reference ref_id="1116653" ref_url="https://bugzilla.suse.com/1116653" source="BUGZILLA"/>
		<reference ref_id="1117108" ref_url="https://bugzilla.suse.com/1117108" source="BUGZILLA"/>
		<reference ref_id="1117645" ref_url="https://bugzilla.suse.com/1117645" source="BUGZILLA"/>
		<reference ref_id="1117744" ref_url="https://bugzilla.suse.com/1117744" source="BUGZILLA"/>
		<reference ref_id="1119019" ref_url="https://bugzilla.suse.com/1119019" source="BUGZILLA"/>
		<reference ref_id="1119680" ref_url="https://bugzilla.suse.com/1119680" source="BUGZILLA"/>
		<reference ref_id="1119843" ref_url="https://bugzilla.suse.com/1119843" source="BUGZILLA"/>
		<reference ref_id="1120017" ref_url="https://bugzilla.suse.com/1120017" source="BUGZILLA"/>
		<reference ref_id="1120691" ref_url="https://bugzilla.suse.com/1120691" source="BUGZILLA"/>
		<reference ref_id="1120722" ref_url="https://bugzilla.suse.com/1120722" source="BUGZILLA"/>
		<reference ref_id="1120758" ref_url="https://bugzilla.suse.com/1120758" source="BUGZILLA"/>
		<reference ref_id="1120902" ref_url="https://bugzilla.suse.com/1120902" source="BUGZILLA"/>
		<reference ref_id="1121713" ref_url="https://bugzilla.suse.com/1121713" source="BUGZILLA"/>
		<reference ref_id="1121726" ref_url="https://bugzilla.suse.com/1121726" source="BUGZILLA"/>
		<reference ref_id="1121805" ref_url="https://bugzilla.suse.com/1121805" source="BUGZILLA"/>
		<reference ref_id="1122650" ref_url="https://bugzilla.suse.com/1122650" source="BUGZILLA"/>
		<reference ref_id="1122651" ref_url="https://bugzilla.suse.com/1122651" source="BUGZILLA"/>
		<reference ref_id="1122779" ref_url="https://bugzilla.suse.com/1122779" source="BUGZILLA"/>
		<reference ref_id="1122885" ref_url="https://bugzilla.suse.com/1122885" source="BUGZILLA"/>
		<reference ref_id="1123321" ref_url="https://bugzilla.suse.com/1123321" source="BUGZILLA"/>
		<reference ref_id="1123323" ref_url="https://bugzilla.suse.com/1123323" source="BUGZILLA"/>
		<reference ref_id="1123357" ref_url="https://bugzilla.suse.com/1123357" source="BUGZILLA"/>
		<reference ref_id="1123933" ref_url="https://bugzilla.suse.com/1123933" source="BUGZILLA"/>
		<reference ref_id="1124166" ref_url="https://bugzilla.suse.com/1124166" source="BUGZILLA"/>
		<reference ref_id="1124235" ref_url="https://bugzilla.suse.com/1124235" source="BUGZILLA"/>
		<reference ref_id="1124728" ref_url="https://bugzilla.suse.com/1124728" source="BUGZILLA"/>
		<reference ref_id="1124732" ref_url="https://bugzilla.suse.com/1124732" source="BUGZILLA"/>
		<reference ref_id="1124735" ref_url="https://bugzilla.suse.com/1124735" source="BUGZILLA"/>
		<reference ref_id="1124775" ref_url="https://bugzilla.suse.com/1124775" source="BUGZILLA"/>
		<reference ref_id="1124777" ref_url="https://bugzilla.suse.com/1124777" source="BUGZILLA"/>
		<reference ref_id="1124780" ref_url="https://bugzilla.suse.com/1124780" source="BUGZILLA"/>
		<reference ref_id="1124811" ref_url="https://bugzilla.suse.com/1124811" source="BUGZILLA"/>
		<reference ref_id="1125000" ref_url="https://bugzilla.suse.com/1125000" source="BUGZILLA"/>
		<reference ref_id="1125014" ref_url="https://bugzilla.suse.com/1125014" source="BUGZILLA"/>
		<reference ref_id="1125315" ref_url="https://bugzilla.suse.com/1125315" source="BUGZILLA"/>
		<reference ref_id="1125446" ref_url="https://bugzilla.suse.com/1125446" source="BUGZILLA"/>
		<reference ref_id="1125794" ref_url="https://bugzilla.suse.com/1125794" source="BUGZILLA"/>
		<reference ref_id="1125796" ref_url="https://bugzilla.suse.com/1125796" source="BUGZILLA"/>
		<reference ref_id="1125808" ref_url="https://bugzilla.suse.com/1125808" source="BUGZILLA"/>
		<reference ref_id="1125809" ref_url="https://bugzilla.suse.com/1125809" source="BUGZILLA"/>
		<reference ref_id="1125810" ref_url="https://bugzilla.suse.com/1125810" source="BUGZILLA"/>
		<reference ref_id="1125892" ref_url="https://bugzilla.suse.com/1125892" source="BUGZILLA"/>
		<reference ref_id="1126389" ref_url="https://bugzilla.suse.com/1126389" source="BUGZILLA"/>
		<reference ref_id="1126772" ref_url="https://bugzilla.suse.com/1126772" source="BUGZILLA"/>
		<reference ref_id="1126773" ref_url="https://bugzilla.suse.com/1126773" source="BUGZILLA"/>
		<reference ref_id="1126805" ref_url="https://bugzilla.suse.com/1126805" source="BUGZILLA"/>
		<reference ref_id="1127082" ref_url="https://bugzilla.suse.com/1127082" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1127561" ref_url="https://bugzilla.suse.com/1127561" source="BUGZILLA"/>
		<reference ref_id="1127725" ref_url="https://bugzilla.suse.com/1127725" source="BUGZILLA"/>
		<reference ref_id="1127731" ref_url="https://bugzilla.suse.com/1127731" source="BUGZILLA"/>
		<reference ref_id="1127961" ref_url="https://bugzilla.suse.com/1127961" source="BUGZILLA"/>
		<reference ref_id="1128166" ref_url="https://bugzilla.suse.com/1128166" source="BUGZILLA"/>
		<reference ref_id="1128452" ref_url="https://bugzilla.suse.com/1128452" source="BUGZILLA"/>
		<reference ref_id="1128565" ref_url="https://bugzilla.suse.com/1128565" source="BUGZILLA"/>
		<reference ref_id="1128696" ref_url="https://bugzilla.suse.com/1128696" source="BUGZILLA"/>
		<reference ref_id="1128756" ref_url="https://bugzilla.suse.com/1128756" source="BUGZILLA"/>
		<reference ref_id="1128893" ref_url="https://bugzilla.suse.com/1128893" source="BUGZILLA"/>
		<reference ref_id="1129080" ref_url="https://bugzilla.suse.com/1129080" source="BUGZILLA"/>
		<reference ref_id="1129179" ref_url="https://bugzilla.suse.com/1129179" source="BUGZILLA"/>
		<reference ref_id="1129237" ref_url="https://bugzilla.suse.com/1129237" source="BUGZILLA"/>
		<reference ref_id="1129238" ref_url="https://bugzilla.suse.com/1129238" source="BUGZILLA"/>
		<reference ref_id="1129239" ref_url="https://bugzilla.suse.com/1129239" source="BUGZILLA"/>
		<reference ref_id="1129240" ref_url="https://bugzilla.suse.com/1129240" source="BUGZILLA"/>
		<reference ref_id="1129241" ref_url="https://bugzilla.suse.com/1129241" source="BUGZILLA"/>
		<reference ref_id="1129413" ref_url="https://bugzilla.suse.com/1129413" source="BUGZILLA"/>
		<reference ref_id="1129414" ref_url="https://bugzilla.suse.com/1129414" source="BUGZILLA"/>
		<reference ref_id="1129415" ref_url="https://bugzilla.suse.com/1129415" source="BUGZILLA"/>
		<reference ref_id="1129416" ref_url="https://bugzilla.suse.com/1129416" source="BUGZILLA"/>
		<reference ref_id="1129417" ref_url="https://bugzilla.suse.com/1129417" source="BUGZILLA"/>
		<reference ref_id="1129418" ref_url="https://bugzilla.suse.com/1129418" source="BUGZILLA"/>
		<reference ref_id="1129419" ref_url="https://bugzilla.suse.com/1129419" source="BUGZILLA"/>
		<reference ref_id="1129581" ref_url="https://bugzilla.suse.com/1129581" source="BUGZILLA"/>
		<reference ref_id="1129770" ref_url="https://bugzilla.suse.com/1129770" source="BUGZILLA"/>
		<reference ref_id="1129923" ref_url="https://bugzilla.suse.com/1129923" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18249" ref_url="https://www.suse.com/security/cve/CVE-2017-18249/" source="CVE"/>
		<reference ref_id="CVE-2019-2024" ref_url="https://www.suse.com/security/cve/CVE-2019-2024/" source="CVE"/>
		<reference ref_id="CVE-2019-3459" ref_url="https://www.suse.com/security/cve/CVE-2019-3459/" source="CVE"/>
		<reference ref_id="CVE-2019-3460" ref_url="https://www.suse.com/security/cve/CVE-2019-3460/" source="CVE"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 Azure kernel was updated to 4.4.176 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).
- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free. (bnc#1124728)
- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).
- CVE-2019-7221: Fixed a use-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).
- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host's stack memory contents to a guest (bsc#1124735).
- CVE-2017-18249: The add_free_nid function in fs/f2fs/node.c did not properly track an allocated nid, which allowed local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads (bnc#1087036).

The following non-security bugs were fixed:

- acpi/nfit: Block function zero DSMs (bsc#1123321).
- acpi, nfit: Fix ARS overflow continuation (bsc#1125000).
- acpi/nfit: fix cmd_rc for acpi_nfit_ctl to always return a value (bsc#1124775).
- acpi/nfit: Fix command-supported detection (bsc#1123323).
- acpi: power: Skip duplicate power resource references in _PRx (bnc#1012382).
- acpi / processor: Fix the return value of acpi_processor_ids_walk() (git fixes (acpi)).
- alpha: Fix Eiger NR_IRQS to 128 (bnc#1012382).
- alpha: fix page fault handling for r16-r18 targets (bnc#1012382).
- alsa: bebob: fix model-id of unit for Apogee Ensemble (bnc#1012382).
- alsa: compress: Fix stop handling on compressed capture streams (bnc#1012382).
- alsa: hda - Add quirk for HP EliteBook 840 G5 (bnc#1012382).
- alsa: hda/realtek - Disable headset Mic VREF for headset mode of ALC225 (bnc#1012382).
- alsa: hda - Serialize codec registrations (bnc#1012382).
- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bnc#1012382).
- ARC: perf: map generic branches to correct hardware condition (bnc#1012382).
- arm64: Do not trap host pointer auth use to EL2 (bnc#1012382).
- arm64: ftrace: do not adjust the LR value (bnc#1012382).
- arm64: hyp-stub: Forbid kprobing of the hyp-stub (bnc#1012382).
- arm64/kvm: consistently handle host HCR_EL2 flags (bnc#1012382).
- arm64: KVM: Skip MMIO insn after emulation (bnc#1012382).
- arm64: perf: set suppress_bind_attrs flag to true (bnc#1012382).
- ARM: 8808/1: kexec:offline panic_smp_self_stop CPU (bnc#1012382).
- ARM: cns3xxx: Fix writing to wrong PCI config registers after alignment (bnc#1012382).
- ARM: dts: da850-evm: Correct the sound card name (bnc#1012382).
- ARM: dts: Fix OMAP4430 SDP Ethernet startup (bnc#1012382).
- ARM: dts: kirkwood: Fix polarity of GPIO fan lines (bnc#1012382).
- ARM: dts: mmp2: fix TWSI2 (bnc#1012382).
- ARM: iop32x/n2100: fix PCI IRQ mapping (bnc#1012382).
- ARM: OMAP2+: hwmod: Fix some section annotations (bnc#1012382).
- ARM: pxa: avoid section mismatch warning (bnc#1012382).
- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bnc#1012382).
- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bnc#1012382).
- ASoC: Intel: mrfld: fix uninitialized variable access (bnc#1012382).
- ata: Fix racy link clearance (bsc#1107866).
- ax25: fix possible use-after-free (bnc#1012382).
- batman-adv: Avoid WARN on net_device without parent in netns (bnc#1012382).
- batman-adv: Force mac header to start of data on xmit (bnc#1012382).
- block_dev: fix crash on chained bios with O_DIRECT (bsc#1090435).
- block: do not use bio-&gt;bi_vcnt to figure out segment number (bsc#1128893).
- block/loop: Use global lock for ioctl() operation (bnc#1012382).
- block/swim3: Fix -EBUSY error when re-opening device after unmount (Git-fixes).
- bluetooth: Fix unnecessary error message for HCI request completion (bnc#1012382).
- bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1020413).
- bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1020413).
- bpf: fix replace_map_fd_with_map_ptr's ldimm64 second imm field (bsc#1012382).
- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128452).
- btrfs: tree-checker: Check level for leaves and nodes (bnc#1012382).
- btrfs: tree-checker: Do not check max block group size as current max chunk size limit is unreliable (fixes for bnc#1012382 bsc#1102875 bsc#1102877 bsc#1102879 bsc#1102882 bsc#1102896).
- btrfs: tree-checker: Fix misleading group system information (bnc#1012382).
- btrfs: tree-check: reduce stack consumption in check_dir_item (bnc#1012382).
- btrfs: validate type when reading a chunk (bnc#1012382).
- btrfs: wait on ordered extents on abort cleanup (bnc#1012382).
- can: bcm: check timer values before ktime conversion (bnc#1012382).
- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bnc#1012382).
- can: gw: ensure DLC boundaries after CAN frame modification (bnc#1012382).
- ceph: avoid repeatedly adding inode to mdsc-&gt;snap_flush_list (bsc#1126773).
- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125809).
- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).
- char/mwave: fix potential Spectre v1 vulnerability (bnc#1012382).
- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).
- cifs: Always resolve hostname before reconnecting (bnc#1012382).
- cifs: check ntwrk_buf_start for NULL before dereferencing it (bnc#1012382).
- cifs: Do not count -ENODATA as failure for query directory (bnc#1012382).
- cifs: Do not hide EINTR after sending network packets (bnc#1012382).
- cifs: Fix possible hang during async MTU reads and writes (bnc#1012382).
- cifs: Fix potential OOB access of lock element array (bnc#1012382).
- cifs: Limit memory used by lock request calls to a page (bnc#1012382).
- clk: imx6q: reset exclusive gates on init (bnc#1012382).
- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bnc#1012382).
- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- cpufreq: intel_pstate: Fix HWP on boot CPU after system resume (bsc#1120017).
- cpuidle: big.LITTLE: fix refcount leak (bnc#1012382).
- crypto: authencesn - Avoid twice completion call in decrypt path (bnc#1012382).
- crypto: authenc - fix parsing key with misaligned rta_len (bnc#1012382).
- crypto: cts - fix crash on short inputs (bnc#1012382).
- crypto: user - support incremental algorithm dumps (bsc#1120902).
- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bnc#1012382).
- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bnc#1012382).
- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bnc#1012382).
- dccp: fool proof ccid_hc_[rt]x_parse_options() (bnc#1012382).
- debugfs: fix debugfs_rename parameter checking (bnc#1012382).
- device property: Fix the length used in PROPERTY_ENTRY_STRING() (bsc#1129770).
- Disable MSI also when pcie-octeon.pcie_disable on (bnc#1012382).
- dlm: Do not swamp the CPU with callbacks queued during recovery (bnc#1012382).
- dmaengine: imx-dma: fix wrong callback invoke (bnc#1012382).
- dm crypt: add cryptographic data integrity protection (authenticated encryption) (Git-fixes).
- dm crypt: factor IV constructor out to separate function (Git-fixes).
- dm crypt: fix crash by adding missing check for auth key size (git-fixes).
- dm crypt: fix error return code in crypt_ctr() (git-fixes).
- dm crypt: fix memory leak in crypt_ctr_cipher_old() (git-fixes).
- dm crypt: introduce new format of cipher with 'capi:' prefix (Git-fixes).
- dm crypt: wipe kernel key copy after IV initialization (Git-fixes).
- dm: do not allow readahead to limit IO size (git fixes (readahead)).
- dm kcopyd: Fix bug causing workqueue stalls (bnc#1012382).
- dm snapshot: Fix excessive memory usage and workqueue stalls (bnc#1012382).
- dm thin: fix bug where bio that overwrites thin block ignores FUA (bnc#1012382).
- Documentation/network: reword kernel version reference (bnc#1012382).
- drbd: Avoid Clang warning about pointless switch statment (bnc#1012382).
- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bnc#1012382).
- drbd: narrow rcu_read_lock in drbd_sync_handshake (bnc#1012382).
- drbd: skip spurious timeout (ping-timeo) when failing promote (bnc#1012382).
- drivers: core: Remove glue dirs from sysfs earlier (bnc#1012382).
- Drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389).
- drm/bufs: Fix Spectre v1 vulnerability (bnc#1012382).
- drm: Fix error handling in drm_legacy_addctx (bsc#1106929)
- drm/i915: Block fbdev HPD processing during suspend (bsc#1106929)
- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1106929)
- drm/modes: Prevent division by zero htotal (bnc#1012382).
- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1106929)
- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1106929)
- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1106929)
- drm/vmwgfx: Do not double-free the mode stored in par-&gt;set_mode (bsc#1103429)
- drm/vmwgfx: Fix setting of dma masks (bsc#1106929)
- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1106929)
- e1000e: allow non-monotonic SYSTIM readings (bnc#1012382).
- EDAC: Raise the maximum number of memory controllers (bsc#1120722).
- efi/libstub/arm64: Use hidden attribute for struct screen_info reference (bsc#1122650).
- enic: add wq clean up budget (bsc#1075697, bsc#1120691. bsc#1102959).
- enic: do not overwrite error code (bnc#1012382).
- enic: fix checksum validation for IPv6 (bnc#1012382).
- exec: load_script: do not blindly truncate shebang string (bnc#1012382).
- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bnc#1012382).
- ext4: Fix crash during online resizing (bsc#1122779).
- f2fs: Add sanity_check_inode() function (bnc#1012382).
- f2fs: avoid unneeded loop in build_sit_entries (bnc#1012382).
- f2fs: check blkaddr more accuratly before issue a bio (bnc#1012382).
- f2fs: clean up argument of recover_data (bnc#1012382).
- f2fs: clean up with is_valid_blkaddr() (bnc#1012382).
- f2fs: detect wrong layout (bnc#1012382).
- f2fs: enhance sanity_check_raw_super() to avoid potential overflow (bnc#1012382).
- f2fs: factor out fsync inode entry operations (bnc#1012382).
- f2fs: fix inode cache leak (bnc#1012382).
- f2fs: fix invalid memory access (bnc#1012382).
- f2fs: fix missing up_read (bnc#1012382).
- f2fs: fix to avoid reading out encrypted data in page cache (bnc#1012382).
- f2fs: fix to convert inline directory correctly (bnc#1012382).
- f2fs: fix to determine start_cp_addr by sbi-&gt;cur_cp_pack (bnc#1012382).
- f2fs: fix to do sanity check with block address in main area (bnc#1012382).
- f2fs: fix to do sanity check with block address in main area v2 (bnc#1012382).
- f2fs: fix to do sanity check with cp_pack_start_sum (bnc#1012382).
- f2fs: fix to do sanity check with node footer and iblocks (bnc#1012382).
- f2fs: fix to do sanity check with reserved blkaddr of inline inode (bnc#1012382).
- f2fs: fix to do sanity check with secs_per_zone (bnc#1012382).
- f2fs: fix to do sanity check with user_block_count (bnc#1012382).
- f2fs: fix validation of the block count in sanity_check_raw_super (bnc#1012382).
- f2fs: fix wrong return value of f2fs_acl_create (bnc#1012382).
- f2fs: free meta pages if sanity check for ckpt is failed (bnc#1012382).
- f2fs: give -EINVAL for norecovery and rw mount (bnc#1012382).
- f2fs: introduce and spread verify_blkaddr (bnc#1012382).
- f2fs: introduce get_checkpoint_version for cleanup (bnc#1012382).
- f2fs: move dir data flush to write checkpoint process (bnc#1012382).
- f2fs: move sanity checking of cp into get_valid_checkpoint (bnc#1012382).
- f2fs: not allow to write illegal blkaddr (bnc#1012382).
- f2fs: put directory inodes before checkpoint in roll-forward recovery (bnc#1012382).
- f2fs: read page index before freeing (bnc#1012382).
- f2fs: remove an obsolete variable (bnc#1012382).
- f2fs: return error during fill_super (bnc#1012382).
- f2fs: sanity check on sit entry (bnc#1012382).
- f2fs: use crc and cp version to determine roll-forward recovery (bnc#1012382).
- fbdev: chipsfb: remove set but not used variable 'size' (bsc#1106929)
- Fix incorrect value for X86_FEATURE_TSX_FORCE_ABORT
- Fix problem with sharetransport= and NFSv4 (bsc#1114893).
- fs: add the fsnotify call to vfs_iter_write (bnc#1012382).
- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (bnc#1012382).
- fs: do not scan the inode cache before SB_BORN is set (bnc#1012382).
- fs/epoll: drop ovflist branch prediction (bnc#1012382).
- fs: fix lost error code in dio_complete (bsc#1117744).
- fuse: call pipe_buf_release() under pipe lock (bnc#1012382).
- fuse: decrement NR_WRITEBACK_TEMP on the right page (bnc#1012382).
- fuse: handle zero sized retrieve correctly (bnc#1012382).
- futex: Fix (possible) missed wakeup (bsc#1050549).
- gdrom: fix a memory leak bug (bnc#1012382).
- gfs2: Revert 'Fix loop in gfs2_rbm_find' (bnc#1012382).
- gpiolib: Fix return value of gpio_to_desc() stub if !GPIOLIB (Git-fixes).
- gpio: pl061: handle failed allocations (bnc#1012382).
- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1106929)
- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1106929)
- HID: debug: fix the ring buffer implementation (bnc#1012382).
- HID: lenovo: Add checks to fix of_led_classdev_register (bnc#1012382).
- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bnc#1012382).
- hwmon: (lm80) fix a missing check of the status of SMBus read (bnc#1012382).
- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (git-fixes).
- i2c-axxia: check for error conditions first (bnc#1012382).
- i2c: dev: prevent adapter retries and timeout being set as minus value (bnc#1012382).
- IB/core: type promotion bug in rdma_rw_init_one_mr() ().
- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).
- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).
- ibmvnic: Increase maximum queue size limit (bsc#1121726).
- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).
- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).
- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- IB/rxe: Fix incorrect cache cleanup in error flow ().
- IB/rxe: replace kvfree with vfree ().
- igb: Fix an issue that PME is not enabled during runtime suspend (bnc#1012382).
- inet: frags: add a pointer to struct netns_frags (bnc#1012382).
- inet: frags: better deal with smp races (bnc#1012382).
- inet: frags: break the 2GB limit for frags storage (bnc#1012382).
- inet: frags: change inet_frags_init_net() return value (bnc#1012382).
- inet: frags: do not clone skb in ip_expire() (bnc#1012382).
- inet: frags: fix ip6frag_low_thresh boundary (bnc#1012382).
- inet: frags: get rid of ipfrag_skb_cb/FRAG_CB (bnc#1012382).
- inet: frags: get rif of inet_frag_evicting() (bnc#1012382).
- inet: frags: refactor ipfrag_init() (bnc#1012382).
- inet: frags: refactor ipv6_frag_init() (bnc#1012382).
- inet: frags: refactor lowpan_net_frag_init() (bnc#1012382).
- inet: frags: remove inet_frag_maybe_warn_overflow() (bnc#1012382).
- inet: frags: remove some helpers (bnc#1012382).
- inet: frags: reorganize struct netns_frags (bnc#1012382).
- inet: frags: use rhashtables for reassembly units (bnc#1012382).
- input: bma150 - register input device after setting private data (bnc#1012382).
- input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bnc#1012382).
- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bnc#1012382).
- input: mms114 - fix license module information (bsc#1087092).
- input: xpad - add support for SteelSeries Stratus Duo (bnc#1012382).
- intel_pstate: Update frequencies of policy-&gt;cpus only from -&gt;set_policy() (bsc#1120017).
- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).
- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).
- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).
- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bnc#1012382).
- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129237).
- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129238).
- iommu/vt-d: Check identity map for hot-added devices (bsc#1129239).
- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).
- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129240).
- ip: add helpers to process in-order fragments faster (bnc#1012382).
- ipfrag: really prevent allocation on netns exit (bnc#1012382).
- ip: frags: fix crash in ip_do_fragment() (bnc#1012382).
- ipmi:ssif: Fix handling of multi-part return messages (bnc#1012382).
- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (bnc#1012382).
- ip: process in-order fragments efficiently (bnc#1012382).
- ip: use rb trees for IP frag queue (bnc#1012382).
- ipv4: frags: precedence bug in ip_expire() (bnc#1012382).
- ipv6: Consider sk_bound_dev_if when binding a socket to an address (bnc#1012382).
- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (bnc#1012382).
- ipv6: fix kernel-infoleak in ipv6_local_error() (bnc#1012382).
- ipv6: frags: rewrite ip6_expire_frag_queue() (bnc#1012382).
- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (bnc#1012382).
- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bnc#1012382).
- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bnc#1012382).
- ixgbe: fix crash in build_skb Rx code path (git-fixes).
- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bnc#1012382).
- kABI: protect linux/kfifo.h include in hid-debug (kabi).
- kABI: protect struct hda_bus (kabi).
- kABI: protect struct inet_peer (kabi).
- kabi: reorder new slabinfo fields in struct kmem_cache_node (bnc#1116653).
- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).
- kaweth: use skb_cow_head() to deal with cloned skbs (bnc#1012382).
- kconfig: fix file name and line number of warn_ignored_character() (bnc#1012382).
- kconfig: fix memory leak when EOF is encountered in quotation (bnc#1012382).
- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (bnc#1012382).
- kernel/hung_task.c: break RCU locks based on jiffies (bnc#1012382).
- KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).
- kvm: arm/arm64: vgic-its: Check CBASER/BASER validity before enabling the ITS (bsc#1109248).
- kvm: arm/arm64: vgic-its: Check GITS_BASER Valid bit before saving tables (bsc#1109248).
- kvm: arm/arm64: vgic-its: Fix return value for device table restore (bsc#1109248).
- kvm: arm/arm64: vgic-its: Fix vgic_its_restore_collection_table returned value (bsc#1109248).
- kvm: nVMX: Do not halt vcpu when L1 is injecting events to L2 (bsc#1129413).
- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129414).
- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129415).
- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129416).
- kvm: VMX: Do not allow reexecute_instruction() when skipping MMIO instr (bsc#1129417).
- kvm: VMX: Fix x2apic check in vmx_msr_bitmap_mode() (bsc#1124166).
- kvm: VMX: Missing part of upstream commit 904e14fb7cb9 (bsc#1124166).
- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129418).
- kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs (bsc#1127082).
- kvm: x86: Fix single-step debugging (bnc#1012382).
- kvm: x86: IA32_ARCH_CAPABILITIES is always supported (bsc#1129419).
- kvm: x86: svm: report MSR_IA32_MCG_EXT_CTL as unsupported (bnc#1012382).
- l2tp: copy 4 more bytes to linear part if necessary (bnc#1012382).
- l2tp: fix reading optional fields of L2TPv3 (bnc#1012382).
- l2tp: remove l2specific_len dependency in l2tp_core (bnc#1012382).
- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125810).
- libceph: handle an empty authorize reply (bsc#1126772).
- libnvdimm: fix ars_status output length calculation (bsc#1124777).
- libnvdimm, pfn: Pad pfn namespaces relative to other regions (bsc#1124811).
- libnvdimm: Use max contiguous area for namespace size (bsc#1124780).
- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).
- loop: Fix double mutex_unlock(&amp;loop_ctl_mutex) in loop_control_ioctl() (bnc#1012382).
- loop: Fold __loop_release into loop_release (bnc#1012382).
- loop: Get rid of loop_index_mutex (bnc#1012382).
- LSM: Check for NULL cred-security on free (bnc#1012382).
- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bnc#1012382).
- mac80211: fix radiotap vendor presence bitmap handling (bnc#1012382).
- md: batch flush requests (bsc#1119680).
- mdio_bus: Fix use-after-free on device_register fails (git-fixes).
- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bnc#1012382).
- media: em28xx: Fix misplaced reset of dev-&gt;v4l::field_count (bnc#1012382).
- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bnc#1012382).
- media: vb2: be sure to unlock mutex on errors (bnc#1012382).
- media: vb2: vb2_mmap: move lock up (bnc#1012382).
- media: vivid: fix error handling of kthread_run (bnc#1012382).
- media: vivid: set min width/height to a value &gt; 0 (bnc#1012382).
- memstick: Prevent memstick host from getting runtime suspended during card detection (bnc#1012382).
- mfd: as3722: Handle interrupts on suspend (bnc#1012382).
- mfd: as3722: Mark PM functions as __maybe_unused (bnc#1012382).
- mfd: tps6586x: Handle interrupts on suspend (bnc#1012382).
- misc: vexpress: Off by one in vexpress_syscfg_exec() (bnc#1012382).
- mISDN: fix a race in dev_expire_timer() (bnc#1012382).
- mlxsw: pci: Correctly determine if descriptor queue is full (git-fixes).
- mlxsw: reg: Use correct offset in field definiton (git-fixes).
- mmc: atmel-mci: do not assume idle after atmci_request_end (bnc#1012382).
- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1120902).
- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bnc#1012382).
- mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL (bnc#1012382).
- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).
- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (bnc#1012382).
- mm: only report isolation failures when offlining memory (generic hotplug debugability).
- mm, oom: fix use-after-free in oom_kill_process (bnc#1012382).
- mm, page_alloc: drop should_suppress_show_mem (bnc#1125892, bnc#1106061).
- mm/page-writeback.c: do not break integrity writeback on -&gt;writepage() error (bnc#1012382).
- mm, proc: be more verbose about unstable VMA flags in /proc/&amp;lt;pid&gt;/smaps (bnc#1012382).
- mm, slab: faster active and free stats (bsc#116653, VM Performance).
- mm/slab: improve performance of gathering slabinfo stats (bsc#116653, VM Performance).
- mm, slab: maintain total slab count instead of active count (bsc#116653, VM Performance).
- modpost: validate symbol names also in find_elf_symbol (bnc#1012382).
- mtd: rawnand: gpmi: fix MX28 bus master lockup problem (bnc#1012382).
- net: Add header for usage of fls64() (bnc#1012382).
- net: bridge: fix a bug on using a neighbour cache entry without checking its state (bnc#1012382).
- net: bridge: Fix ethernet header pointer before check skb forwardable (bnc#1012382).
- net: call sk_dst_reset when set SO_DONTROUTE (bnc#1012382).
- net: Do not allocate page fragments that are not skb aligned (bnc#1012382).
- net: dp83640: expire old TX-skb (bnc#1012382).
- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).
- net: dsa: mv88e6xxx: fix port VLAN maps (git-fixes).
- net: dsa: slave: Do not propagate flag changes on down slave interfaces (bnc#1012382).
- net: Fix for_each_netdev_feature on Big endian (bnc#1012382).
- net: fix IPv6 prefix route residue (bnc#1012382).
- net: fix pskb_trim_rcsum_slow() with odd trim offset (bnc#1012382).
- net: Fix usage of pskb_trim_rcsum (bnc#1012382).
- net/hamradio/6pack: Convert timers to use timer_setup() (git-fixes).
- net/hamradio/6pack: use mod_timer() to rearm timers (git-fixes).
- net: ieee802154: 6lowpan: fix frag reassembly (bnc#1012382).
- net: ipv4: do not handle duplicate fragments as overlapping (bnc#1012382 bsc#1116345).
- net: ipv4: Fix memory leak in network namespace dismantle (bnc#1012382).
- net: ipv4: use a dedicated counter for icmp_v4 redirect packets (bnc#1012382).
- net: lan78xx: Fix race in tx pending skb size calculation (git-fixes).
- net/mlx4_core: Add masking for a few queries on HCA caps (bnc#1012382).
- net/mlx4_core: drop useless LIST_HEAD (git-fixes).
- net/mlx4_core: Fix qp mtt size calculation (git-fixes).
- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).
- net/mlx4: Fix endianness issue in qp context params (git-fixes).
- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).
- net/mlx5e: Fix TCP checksum in LRO buffers (git-fixes).
- net/mlx5: Fix driver load bad flow when having fw initializing timeout (git-fixes).
- net/mlx5: fix uaccess beyond 'count' in debugfs read/write handlers (git-fixes).
- net/mlx5: Fix use-after-free in self-healing flow (git-fixes).
- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).
- net: modify skb_rbtree_purge to return the truesize of all purged skbs (bnc#1012382).
- net: mv643xx_eth: fix packet corruption with TSO and tiny unaligned packets (git-fixes).
- net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS (git-fixes).
- net: phy: bcm7xxx: Fix shadow mode 2 disabling (git-fixes).
- net: pskb_trim_rcsum() and CHECKSUM_COMPLETE are friends (bnc#1012382).
- net: qca_spi: Fix race condition in spi transfers (git-fixes).
- netrom: switch to sock timer API (bnc#1012382).
- net/rose: fix NULL ax25_cb kernel panic (bnc#1012382).
- net_sched: refetch skb protocol for each filter (bnc#1012382).
- net: speed up skb_rbtree_purge() (bnc#1012382).
- net: stmmac: Fix a race in EEE enable callback (bnc#1012382).
- net: stmmac: Fix a race in EEE enable callback (git-fixes).
- net: systemport: Fix WoL with password after deep sleep (bnc#1012382).
- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (git-fixes).
- net/x25: do not hold the cpu too long in x25_new_lci() (bnc#1012382).
- NFC: nxp-nci: Include unaligned.h instead of access_ok.h (bnc#1012382).
- nfit: fix unchecked dereference in acpi_nfit_ctl (bsc#1125014).
- nfsd4: fix crash on writing v4_end_grace before nfsd startup (bnc#1012382).
- NFS: nfs_compare_mount_options always compare auth flavors (bnc#1012382).
- niu: fix missing checks of niu_pci_eeprom_read (bnc#1012382).
- ocfs2: do not clear bh uptodate for block read (bnc#1012382).
- ocfs2: fix panic due to unrecovered local alloc (bnc#1012382).
- omap2fb: Fix stack memory disclosure (bsc#1106929)
- openvswitch: Avoid OOB read when parsing flow nlattrs (bnc#1012382).
- packet: Do not leak dev refcounts on error exit (bnc#1012382).
- pci: altera: Check link status before retrain link (bnc#1012382).
- pci: altera: Fix altera_pcie_link_is_up() (bnc#1012382).
- pci: altera: Move retrain from fixup to altera_pcie_host_init() (bnc#1012382).
- pci: altera: Poll for link training status after retraining the link (bnc#1012382).
- pci: altera: Poll for link up status after retraining the link (bnc#1012382).
- pci: altera: Reorder read/write functions (bnc#1012382).
- pci: altera: Rework config accessors for use without a struct pci_bus (bnc#1012382).
- pci/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1129241).
- perf/core: Do not WARN() for impossible ring-buffer sizes (bnc#1012382).
- perf/core: Fix impossible ring-buffer sizes warning (bnc#1012382).
- perf intel-pt: Fix error with config term 'pt=0' (bnc#1012382).
- perf parse-events: Fix unchecked usage of strncpy() (bnc#1012382).
- perf svghelper: Fix unchecked usage of strncpy() (bnc#1012382).
- perf tests evsel-tp-sched: Fix bitwise operator (bnc#1012382).
- perf tools: Add Hygon Dhyana support (bnc#1012382).
- perf unwind: Take pgoff into account when reporting elf to libdwfl (bnc#1012382).
- perf unwind: Unwind with libdw does not take symfs into account (bnc#1012382).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- perf/x86/intel/uncore: Add Node ID mask (bnc#1012382).
- phy: micrel: Ensure interrupts are reenabled on resume (git-fixes).
- pinctrl: msm: fix gpio-hog related boot issues (bnc#1012382).
- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bnc#1012382).
- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bnc#1012382).
- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bnc#1012382).
- platform/x86: thinkpad_acpi: Proper model/release matching (bsc#1099810).
- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).
- powerpc: Detect the presence of big-cores via 'ibm, thread-groups' (bsc#1109695).
- powerpc, hotplug: Avoid to touch non-existent cpumasks (bsc#1109695).
- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).
- powerpc/pseries: Add CPU dlpar remove functionality (bsc#1128756).
- powerpc/pseries: add of_node_put() in dlpar_detach_node() (bnc#1012382).
- powerpc/pseries: Consolidate CPU hotplug code to hotplug-cpu.c (bsc#1128756).
- powerpc/pseries/cpuidle: Fix preempt warning (bnc#1012382).
- powerpc/pseries: Factor out common cpu hotplug code (bsc#1128756).
- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1128756).
- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).
- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).
- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).
- powerpc/smp: Rework CPU topology construction (bsc#1109695).
- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).
- powerpc/uaccess: fix warning/error with access_ok() (bnc#1012382).
- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).
- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).
- pppoe: fix reception of frames with no mac header (git-fixes).
- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).
- proc: Remove empty line in /proc/self/status (bnc#1012382 bsc#1094823).
- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).
- pstore/ram: Do not treat empty buffers as valid (bnc#1012382).
- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bnc#1012382).
- r8169: Add support for new Realtek Ethernet (bnc#1012382).
- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125808).
- rcu: Force boolean subscript for expedited stall warnings (bnc#1012382).
- RDMA/bnxt_re: Fix a couple off by one bugs (bsc#1020413, ).
- RDMA/bnxt_re: Synchronize destroy_qp with poll_cq (bsc#1125446).
- Revert 'bs-upload-kernel: do not set %opensuse_bs' This reverts commit e89e2b8cbef05df6c874ba70af3cb4c57f82a821.
- Revert 'cifs: In Kconfig CONFIG_CIFS_POSIX needs depends on legacy (insecure cifs)' (bnc#1012382).
- Revert 'exec: load_script: do not blindly truncate shebang string' (bnc#1012382).
- Revert 'Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G' (bnc#1012382).
- Revert 'loop: Fix double mutex_unlock(&amp;loop_ctl_mutex) in loop_control_ioctl()' (bnc#1012382).
- Revert 'loop: Fold __loop_release into loop_release' (bnc#1012382).
- Revert 'loop: Get rid of loop_index_mutex' (bnc#1012382).
- Revert 'mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1120902).' The backport patch does not built properly.
- Revert 'mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL' (bnc#1012382).
- Revert 'net: stmmac: Fix a race in EEE enable callback (git-fixes).' This reverts commit f323fa8d233c1f44aff17e6fae90c2c8be30edf9. The patch was already included in stable 4.4.176.
- Revert 'sd: disable logical block provisioning if 'lbpme' is not set' This reverts commit 96370bd87299c7a6883b3e2bf13818f60c8ba611. Patch not accepted upstream.
- Revert 'x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls' (bsc#1128565).
- rhashtable: Add rhashtable_lookup() (bnc#1012382).
- rhashtable: add rhashtable_lookup_get_insert_key() (bnc#1012382 bsc#1042286).
- rhashtable: add schedule points (bnc#1012382).
- rhashtable: reorganize struct rhashtable layout (bnc#1012382).
- s390/early: improve machine detection (bnc#1012382).
- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).
- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (bnc#1012382).
- s390/smp: fix CPU hotplug deadlock with CPU rescan (bnc#1012382).
- sata_rcar: fix deferred probing (bnc#1012382).
- sched/wake_q: Document wake_q_add() (bsc#1050549).
- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).
- sched/wake_q: Reduce reference counting for special users (bsc#1050549).
- scripts/decode_stacktrace: only strip base path when a prefix of the path (bnc#1012382).
- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes
- scsi: aacraid: Fix missing break in switch statement (bsc#1128696).
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: lpfc: Correct LCB RJT handling (bnc#1012382).
- scsi: lpfc: Correct MDS diag and nvmet configuration (bsc#1125796).
- scsi: lpfc: do not set queue-&gt;page_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1127725).
- scsi: megaraid: fix out-of-bound array accesses (bnc#1012382).
- scsi: mpt3sas: Add an I/O barrier (bsc#1117108).
- scsi: mpt3sas: Added support for nvme encapsulated request message (bsc#1117108).
- scsi: mpt3sas: Added support for SAS Device Discovery Error Event (bsc#1117108).
- scsi: mpt3sas: Adding support for SAS3616 HBA device (bsc#1117108).
- scsi: mpt3sas: Add ioc_&amp;lt;level&gt; logging macros (bsc#1117108).
- scsi: mpt3sas: Add nvme device support in slave alloc, target alloc and probe (bsc#1117108).
- scsi: mpt3sas: Add PCI device ID for Andromeda (bsc#1117108).
- scsi: mpt3sas: Add-Task-management-debug-info-for-NVMe-drives (bsc#1117108).
- scsi: mpt3sas: Allow processing of events during driver unload (bsc#1117108).
- scsi: mpt3sas: always use first reserved smid for ioctl passthrough (bsc#1117108).
- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).
- scsi: mpt3sas: API's to remove nvme drive from sml (bsc#1117108).
- scsi: mpt3sas: API 's to support NVMe drive addition to SML (bsc#1117108).
- scsi: mpt3sas: As per MPI-spec, use combined reply queue for SAS3.5 controllers when HBA supports more than 16 MSI-x vectors (bsc#1117108).
- scsi: mpt3sas: Bug fix for big endian systems (bsc#1117108).
- scsi: mpt3sas: Bump mpt3sas driver version to v16.100.00.00 (bsc#1117108).
- scsi: mpt3sas: Cache enclosure pages during enclosure add (bsc#1117108).
- scsi: mpt3sas: check command status before attempting abort (bsc#1117108).
- scsi: mpt3sas: clarify mmio pointer types (bsc#1117108).
- scsi: mpt3sas: cleanup _scsih_pcie_enumeration_event() (bsc#1117108).
- scsi: mpt3sas: Configure reply post queue depth, DMA and sgl tablesize (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).
- scsi: mpt3sas: Convert mlsleading uses of pr_&amp;lt;level&gt; with MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Convert uses of pr_&amp;lt;level&gt; with MPT3SAS_FMT to ioc_&amp;lt;level&gt; (bsc#1117108).
- scsi: mpt3sas: Display chassis slot information of the drive (bsc#1117108).
- scsi: mpt3sas: Do not abort I/Os issued to NVMe drives while processing Async Broadcast primitive event (bsc#1117108).
- scsi: mpt3sas: Do not access the structure after decrementing it's instance reference count (bsc#1117108).
- scsi: mpt3sas: Do not use 32-bit atomic request descriptor for Ventura controllers (bsc#1117108).
- scsi: mpt3sas: Enhanced handling of Sense Buffer (bsc#1117108).
- scsi: mpt3sas: fix an out of bound write (bsc#1117108).
- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Fix calltrace observed while running IO &amp; reset (bsc#1117108).
- scsi: mpt3sas: fix dma_addr_t casts (bsc#1117108).
- scsi: mpt3sas: Fixed memory leaks in driver (bsc#1117108).
- scsi: mpt3sas: Fix, False timeout prints for ioctl and other internal commands during controller reset (bsc#1117108).
- scsi: mpt3sas: fix format overflow warning (bsc#1117108).
- scsi: mpt3sas: Fix indentation (bsc#1117108).
- scsi: mpt3sas: Fix memory allocation failure test in 'mpt3sas_base_attach()' (bsc#1117108).
- scsi: mpt3sas: Fix nvme drives checking for tlr (bsc#1117108).
- scsi: mpt3sas: fix oops in error handlers after shutdown/unload (bsc#1117108).
- scsi: mpt3sas: Fix possibility of using invalid Enclosure Handle for SAS device after host reset (bsc#1117108).
- scsi: mpt3sas: fix possible memory leak (bsc#1117108).
- scsi: mpt3sas: fix pr_info message continuation (bsc#1117108).
- scsi: mpt3sas: Fix removal and addition of vSES device during host reset (bsc#1117108).
- scsi: mpt3sas: Fix sparse warnings (bsc#1117108).
- scsi: mpt3sas: fix spelling mistake: 'disbale' -&gt; 'disable' (bsc#1117108).
- scsi: mpt3sas: For NVME device, issue a protocol level reset (bsc#1117108).
- scsi: mpt3sas: Handle NVMe PCIe device related events generated from firmware (bsc#1117108).
- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).
- scsi: mpt3sas: Incorrect command status was set/marked as not used (bsc#1117108).
- scsi: mpt3sas: Increase event log buffer to support 24 port HBA's (bsc#1117108).
- scsi: mpt3sas: Introduce API to get BAR0 mapped buffer address (bsc#1117108).
- scsi: mpt3sas: Introduce Base function for cloning (bsc#1117108).
- scsi: mpt3sas: Introduce function to clone mpi reply (bsc#1117108).
- scsi: mpt3sas: Introduce function to clone mpi request (bsc#1117108).
- scsi: mpt3sas: Introduce mpt3sas_get_st_from_smid() (bsc#1117108).
- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).
- scsi: mpt3sas: Lockless access for chain buffers (bsc#1117108).
- scsi: mpt3sas: lockless command submission (bsc#1117108).
- scsi: mpt3sas: make function _get_st_from_smid static (bsc#1117108).
- scsi: mpt3sas: NVMe drive support for BTDHMAPPING ioctl command and log info (bsc#1117108).
- scsi: mpt3sas: open-code _scsih_scsi_lookup_get() (bsc#1117108).
- scsi: mpt3sas: Optimize I/O memory consumption in driver (bsc#1117108).
- scsi: mpt3sas: Pre-allocate RDPQ Array at driver boot time (bsc#1117108).
- scsi: mpt3sas: Processing of Cable Exception events (bsc#1117108).
- scsi: mpt3sas: Reduce memory footprint in kdump kernel (bsc#1117108).
- scsi: mpt3sas: remove a stray KERN_INFO (bsc#1117108).
- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).
- scsi: mpt3sas: remove redundant copy_from_user in _ctl_getiocinfo (bsc#1117108).
- scsi: mpt3sas: remove redundant wmb (bsc#1117108).
- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).
- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).
- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Remove unused variable requeue_event (bsc#1117108).
- scsi: mpt3sas: Replace PCI pool old API (bsc#1117108).
- scsi: mpt3sas: Replace PCI pool old API (bsc#1117108).
- scsi: mpt3sas: Report Firmware Package Version from HBA Driver (bsc#1117108).
- scsi: mpt3sas: scan and add nvme device after controller reset (bsc#1117108).
- scsi: mpt3sas: separate out _base_recovery_check() (bsc#1117108).
- scsi: mpt3sas: set default value for cb_idx (bsc#1117108).
- scsi: mpt3sas: Set NVMe device queue depth as 128 (bsc#1117108).
- scsi: mpt3sas: SGL to PRP Translation for I/Os to NVMe devices (bsc#1117108).
- scsi: mpt3sas: simplify mpt3sas_scsi_issue_tm() (bsc#1117108).
- scsi: mpt3sas: simplify task management functions (bsc#1117108).
- scsi: mpt3sas: simplify _wait_for_commands_to_complete() (bsc#1117108).
- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).
- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).
- scsi: mpt3sas: switch to pci_alloc_irq_vectors (bsc#1117108).
- scsi: mpt3sas: Updated MPI headers to v2.00.48 (bsc#1117108).
- scsi: mpt3sas: Update driver version '25.100.00.00' (bsc#1117108).
- scsi: mpt3sas: Update driver version '26.100.00.00' (bsc#1117108).
- scsi: mpt3sas: Update MPI Headers (bsc#1117108).
- scsi: mpt3sas: Update mpt3sas driver version (bsc#1117108).
- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).
- scsi: mpt3sas: use list_splice_init() (bsc#1117108).
- scsi: mpt3sas: wait for and flush running commands on shutdown/unload (bsc#1117108).
- scsi: qla2xxx: Fix deadlock between ATIO and HW lock (bsc#1125794).
- scsi: qla2xxx: Fix early srb free on abort (bsc#1121713).
- scsi: qla2xxx: Fix for double free of SRB structure (bsc#1121713).
- scsi: qla2xxx: Increase abort timeout value (bsc#1121713).
- scsi: qla2xxx: Move {get|rel}_sp to base_qpair struct (bsc#1121713).
- scsi: qla2xxx: Return switch command on a timeout (bsc#1121713).
- scsi: qla2xxx: Turn off IOCB timeout timer on IOCB completion (bsc#1121713).
- scsi: qla2xxx: Use correct qpair for ABTS/CMD (bsc#1121713).
- scsi: sd: Fix cache_type_store() (bnc#1012382).
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).
- scsi: target: use consistent left-aligned ASCII INQUIRY data (bnc#1012382).
- sctp: allocate sctp_sockaddr_entry with kzalloc (bnc#1012382).
- sd: disable logical block provisioning if 'lbpme' is not set (bsc#1086095 bsc#1078355).
- selinux: fix GPF on invalid policy (bnc#1012382).
- seq_buf: Make seq_buf_puts() null-terminate the buffer (bnc#1012382).
- serial: fsl_lpuart: clear parity enable bit when disable parity (bnc#1012382).
- series.conf: Move 'patches.fixes/aio-hold-an-extra-file-reference-over-AIO-read-write.patch' into sorted section.
- signal: Always notice exiting tasks (bnc#1012382).
- signal: Better detection of synchronous signals (bnc#1012382).
- signal: Restore the stop PTRACE_EVENT_EXIT (bnc#1012382).
- skge: potential memory corruption in skge_get_regs() (bnc#1012382).
- sky2: Increase D3 delay again (bnc#1012382).
- slab: alien caches must not be initialized if the allocation of the alien cache failed (bnc#1012382).
- smack: fix access permissions for keyring (bnc#1012382).
- smsc95xx: Use skb_cow_head to deal with cloned skbs (bnc#1012382).
- soc/tegra: Do not leak device tree node reference (bnc#1012382).
- staging:iio:ad2s90: Make probe handle spi_setup failure (bnc#1012382).
- staging: iio: ad7780: update voltage on read (bnc#1012382).
- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bnc#1012382).
- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bnc#1012382).
- sunrpc: handle ENOMEM in rpcb_getport_async (bnc#1012382).
- sunvdc: Do not spin in an infinite loop when vio_ldc_send() returns EAGAIN (bnc#1012382).
- sysfs: Disable lockdep for driver bind/unbind files (bnc#1012382).
- tcp: clear icsk_backoff in tcp_write_queue_purge() (bnc#1012382).
- tcp: tcp_v4_err() should be more careful (bnc#1012382).
- team: avoid complex list operations in team_nl_cmd_options_set() (bnc#1012382).
- team: Free BPF filter when unregistering netdev (git-fixes).
- test_hexdump: use memcpy instead of strncpy (bnc#1012382).
- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bnc#1012382).
- timekeeping: Use proper seqcount initializer (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_doit (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_link_set (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bnc#1012382).
- tipc: use destination length for copy string (bnc#1012382).
- tracing: Do not free iter-&gt;trace in fail path of tracing_open_pipe() (bsc#1129581).
- tracing/uprobes: Fix output for multiple string arguments (bnc#1012382).
- tty: Do not block on IO when ldisc change is pending (bnc#1105428).
- tty: Do not hold ldisc lock in tty_reopen() if ldisc present (bnc#1105428).
- tty: fix data race between tty_init_dev and flush of buf (bnc#1105428).
- tty: Handle problem if line discipline does not have receive_buf (bnc#1012382).
- tty: Hold tty_ldisc_lock() during tty_reopen() (bnc#1105428).
- tty/ldsem: Add lockdep asserts for ldisc_sem (bnc#1105428).
- tty/ldsem: Convert to regular lockdep annotations (bnc#1105428).
- tty/ldsem: Decrement wait_readers on timeouted down_read() (bnc#1105428).
- tty/ldsem: Wake up readers after timed out down_write() (bnc#1012382).
- tty/n_hdlc: fix __might_sleep warning (bnc#1012382).
- tty: serial: samsung: Properly set flags in autoCTS mode (bnc#1012382).
- tty: Simplify tty-&gt;count math in tty_reopen() (bnc#1105428).
- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (bnc#1012382).
- uapi/if_ether.h: prevent redefinition of struct ethhdr (bnc#1012382).
- ucc_geth: Reset BQL queue when stopping device (bnc#1012382).
- udf: Fix BUG on corrupted inode (bnc#1012382).
- um: Avoid marking pages with 'changed protection' (bnc#1012382).
- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bnc#1012382).
- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bnc#1012382).
- usb: dwc2: Remove unnecessary kfree (bnc#1012382).
- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bnc#1012382).
- usb: hub: delay hub autosuspend if USB3 port is still link training (bnc#1012382).
- usb: phy: am335x: fix race condition in _probe (bnc#1012382).
- usb: serial: pl2303: add new PID to support PL2303TB (bnc#1012382).
- usb: serial: simple: add Motorola Tetra TPG2200 device id (bnc#1012382).
- usb: storage: add quirk for SMI SM3350 (bnc#1012382).
- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bnc#1012382).
- video: clps711x-fb: release disp device node in probe() (bnc#1012382).
- vsock: cope with memory allocation failure at socket creation time (bnc#1012382).
- vt: invoke notifier on screen size change (bnc#1012382).
- vxlan: test dev-&gt;flags &amp; IFF_UP before calling netif_rx() (bnc#1012382).
- wireless: airo: potential buffer overflow in sprintf() (bsc#1120902).
- writeback: do not decrement wb-&gt;refcnt if !wb-&gt;bdi (git fixes (writeback)).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86/a.out: Clear the dump structure initially (bnc#1012382).
- x86/fpu: Add might_fault() to user_insn() (bnc#1012382).
- x86/kaslr: Fix incorrect i8254 outb() parameters (bnc#1012382).
- x86: livepatch: Treat R_X86_64_PLT32 as R_X86_64_PC32 (bnc#1012382).
- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bnc#1012382).
- x86/PCI: Fix Broadcom CNB20LE unintended sign extension (redux) (bnc#1012382).
- x86/pkeys: Properly copy pkey state at fork() (bsc#1106105).
- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bnc#1012382).
- x86: respect memory size limiting via mem= parameter (bsc#1117645).
- x86/xen: dont add memory above max allowed allocation (bsc#1117645).
- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).
- xen: remove pre-xen3 fallback handlers (bsc#1065600).
- xfrm6_tunnel: Fix spi check in __xfrm6_tunnel_alloc_spi (bnc#1012382).
- xfrm: refine validation of template and selector families (bnc#1012382).
- Yama: Check for pid death before checking ancestry (bnc#1012382).
- xfs: remove filestream item xfs_inode reference (bsc#1127961).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-08"/>
	<updated date="2019-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020413">SUSE bug 1020413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023175">SUSE bug 1023175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031492">SUSE bug 1031492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050549">SUSE bug 1050549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070767">SUSE bug 1070767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075697">SUSE bug 1075697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078355">SUSE bug 1078355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082943">SUSE bug 1082943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086095">SUSE bug 1086095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086652">SUSE bug 1086652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087036">SUSE bug 1087036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087092">SUSE bug 1087092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090435">SUSE bug 1090435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094823">SUSE bug 1094823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099810">SUSE bug 1099810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102875">SUSE bug 1102875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102877">SUSE bug 1102877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102879">SUSE bug 1102879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102882">SUSE bug 1102882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102896">SUSE bug 1102896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102959">SUSE bug 1102959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103429">SUSE bug 1103429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105428">SUSE bug 1105428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106061">SUSE bug 1106061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106105">SUSE bug 1106105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106929">SUSE bug 1106929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107866">SUSE bug 1107866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109137">SUSE bug 1109137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109248">SUSE bug 1109248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109695">SUSE bug 1109695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114893">SUSE bug 1114893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116345">SUSE bug 1116345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116653">SUSE bug 1116653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117108">SUSE bug 1117108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117645">SUSE bug 1117645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117744">SUSE bug 1117744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119019">SUSE bug 1119019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119680">SUSE bug 1119680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119843">SUSE bug 1119843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120017">SUSE bug 1120017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120691">SUSE bug 1120691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120722">SUSE bug 1120722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120902">SUSE bug 1120902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121713">SUSE bug 1121713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121726">SUSE bug 1121726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121805">SUSE bug 1121805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122650">SUSE bug 1122650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122651">SUSE bug 1122651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122779">SUSE bug 1122779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122885">SUSE bug 1122885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123321">SUSE bug 1123321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123323">SUSE bug 1123323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123357">SUSE bug 1123357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123933">SUSE bug 1123933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124166">SUSE bug 1124166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124235">SUSE bug 1124235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124728">SUSE bug 1124728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124732">SUSE bug 1124732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124735">SUSE bug 1124735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124775">SUSE bug 1124775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124777">SUSE bug 1124777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124780">SUSE bug 1124780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124811">SUSE bug 1124811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125000">SUSE bug 1125000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125014">SUSE bug 1125014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125315">SUSE bug 1125315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125446">SUSE bug 1125446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125794">SUSE bug 1125794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125796">SUSE bug 1125796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125808">SUSE bug 1125808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125809">SUSE bug 1125809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125810">SUSE bug 1125810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125892">SUSE bug 1125892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126389">SUSE bug 1126389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126772">SUSE bug 1126772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126773">SUSE bug 1126773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126805">SUSE bug 1126805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127082">SUSE bug 1127082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127561">SUSE bug 1127561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127725">SUSE bug 1127725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127731">SUSE bug 1127731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127961">SUSE bug 1127961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128166">SUSE bug 1128166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128452">SUSE bug 1128452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128565">SUSE bug 1128565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128696">SUSE bug 1128696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128756">SUSE bug 1128756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128893">SUSE bug 1128893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129080">SUSE bug 1129080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129179">SUSE bug 1129179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129237">SUSE bug 1129237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129238">SUSE bug 1129238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129239">SUSE bug 1129239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129240">SUSE bug 1129240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129241">SUSE bug 1129241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129413">SUSE bug 1129413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129414">SUSE bug 1129414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129415">SUSE bug 1129415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129416">SUSE bug 1129416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129417">SUSE bug 1129417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129418">SUSE bug 1129418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129419">SUSE bug 1129419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129581">SUSE bug 1129581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129770">SUSE bug 1129770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129923">SUSE bug 1129923</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-18249/">CVE-2017-18249 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18249">CVE-2017-18249 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2024/">CVE-2019-2024 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2024">CVE-2019-2024 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3459/">CVE-2019-3459 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3459">CVE-2019-3459 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3460/">CVE-2019-3460 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3460">CVE-2019-3460 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6974">CVE-2019-6974 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7221">CVE-2019-7221 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7222">CVE-2019-7222 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9213">CVE-2019-9213 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554631" comment="kernel-azure-4.4.176-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554632" comment="kernel-azure-base-4.4.176-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554633" comment="kernel-azure-devel-4.4.176-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554634" comment="kernel-devel-azure-4.4.176-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554635" comment="kernel-source-azure-4.4.176-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554636" comment="kernel-syms-azure-4.4.176-4.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149965" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1119687" ref_url="https://bugzilla.suse.com/1119687" source="BUGZILLA"/>
		<reference ref_id="1131576" ref_url="https://bugzilla.suse.com/1131576" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<reference ref_id="CVE-2018-20506" ref_url="https://www.suse.com/security/cve/CVE-2018-20506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005313.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issues fixed: 

- CVE-2018-20346: Fixed a remote code execution vulnerability in FTS3 (Magellan) (bsc#1119687).
- CVE-2018-20506: Fixed an integer overflow when FTS3 extension is enabled (bsc#1131576).    
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1119687">SUSE bug 1119687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131576">SUSE bug 1131576</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20346">CVE-2018-20346 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20506/">CVE-2018-20506 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20506">CVE-2018-20506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554637" comment="libsqlite3-0-3.8.10.2-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548951" comment="libsqlite3-0-32bit-3.8.10.2-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554638" comment="sqlite3-3.8.10.2-9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149966" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1026236" ref_url="https://bugzilla.suse.com/1026236" source="BUGZILLA"/>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1069468" ref_url="https://bugzilla.suse.com/1069468" source="BUGZILLA"/>
		<reference ref_id="1105528" ref_url="https://bugzilla.suse.com/1105528" source="BUGZILLA"/>
		<reference ref_id="1114988" ref_url="https://bugzilla.suse.com/1114988" source="BUGZILLA"/>
		<reference ref_id="1115040" ref_url="https://bugzilla.suse.com/1115040" source="BUGZILLA"/>
		<reference ref_id="1115045" ref_url="https://bugzilla.suse.com/1115045" source="BUGZILLA"/>
		<reference ref_id="1115047" ref_url="https://bugzilla.suse.com/1115047" source="BUGZILLA"/>
		<reference ref_id="1116380" ref_url="https://bugzilla.suse.com/1116380" source="BUGZILLA"/>
		<reference ref_id="1117756" ref_url="https://bugzilla.suse.com/1117756" source="BUGZILLA"/>
		<reference ref_id="1119161" ref_url="https://bugzilla.suse.com/1119161" source="BUGZILLA"/>
		<reference ref_id="1123157" ref_url="https://bugzilla.suse.com/1123157" source="BUGZILLA"/>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126197" ref_url="https://bugzilla.suse.com/1126197" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1126325" ref_url="https://bugzilla.suse.com/1126325" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1129623" ref_url="https://bugzilla.suse.com/1129623" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19665" ref_url="https://www.suse.com/security/cve/CVE-2018-19665/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<reference ref_id="CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed: 

- CVE-2018-19967: Fixed HLE constructs that allowed guests to lock up the host,
  resulting in a Denial of Service (DoS). (XSA-282) (bsc#1114988)
- CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() found in slirp (bsc#1123157).
- Fixed an issue which could allow malicious or buggy guests with passed through PCI devices to  be able to 
  escalate their privileges, crash the host, or access data belonging to other guests. Additionally memory 
  leaks were also possible (bsc#1126140).
- Fixed a race condition issue which could allow malicious PV guests to escalate their privilege to that 
  of the hypervisor (bsc#1126141).
- Fixed an issue which could allow a malicious unprivileged guest userspace process to escalate its privilege 
  to that of other userspace processes in the same guest and potentially thereby to that 
  of the guest operating system (bsc#1126201).
- CVE-2019-9824: Fixed an information leak in SLiRP networking implementation which could allow a user/process 
  to read uninitialised stack memory contents (bsc#1129623).
- CVE-2018-19961 CVE-2018-19962: Fixed insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275)(bsc#1115040).
- CVE-2018-19965: Fixed denial of service issue from attempting to use INVPCID with a non-canonical addresses (XSA-279)(bsc#1115045).
- CVE-2018-19966: Fixed issue introduced by XSA-240 that could have caused conflicts with shadow paging (XSA-280)(bsc#1115047).
- Fixed an issue which could allow malicious PV guests may cause a host crash or
  gain access to data pertaining to other guests.Additionally, vulnerable configurations
  are likely to be unstable even in the absence of an attack (bsc#1126198).
- Fixed multiple access violations introduced by XENMEM_exchange hypercall which could allow
  a single PV guest to leak arbitrary amounts of memory, leading to a denial of service (bsc#1126192).
- Fixed an issue which could allow malicious 64bit PV guests to cause a host crash (bsc#1127400).
- Fixed an issue which could allow malicious or buggy x86 PV guest kernels to mount a Denial of Service
  attack affecting the whole system (bsc#1126197).
- Fixed an issue which could allow an untrusted PV domain with access to a physical device to DMA into its own 
  pagetables leading to privilege escalation (bsc#1126195).
- Fixed an issue which could allow a malicious or buggy x86 PV guest kernels can mount a Denial of Service
  attack affecting the whole system (bsc#1126196).

Other issues addressed: 

- Upstream bug fixes (bsc#1027519)
- Fixed an issue where live migrations were failing when spectre was enabled on xen boot cmdline (bsc#1116380).
- Fixed an issue where setup of grant_tables and other variables may fail (bsc#1126325).
- Fixed a building issue (bsc#1119161).
- Fixed an issue where xpti=no-dom0 was not working as expected (bsc#1105528).
- Packages should no longer use /var/adm/fillup-templates (bsc#1069468). 
- Added Xen cmdline option 'suse_vtsc_tolerance' to avoid TSC emulation for HVM domUs (bsc#1026236).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1026236">SUSE bug 1026236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069468">SUSE bug 1069468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105528">SUSE bug 1105528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114988">SUSE bug 1114988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116380">SUSE bug 1116380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117756">SUSE bug 1117756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119161">SUSE bug 1119161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123157">SUSE bug 1123157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126197">SUSE bug 1126197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126325">SUSE bug 1126325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129623">SUSE bug 1129623</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19665/">CVE-2018-19665 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19665">CVE-2018-19665 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19961">CVE-2018-19961 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19962">CVE-2018-19962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19965">CVE-2018-19965 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19966">CVE-2018-19966 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19967">CVE-2018-19967 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9824">CVE-2019-9824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521761" comment="xen-4.9.4_02-3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554639" comment="xen-doc-html-4.9.4_02-3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521762" comment="xen-libs-4.9.4_02-3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521763" comment="xen-libs-32bit-4.9.4_02-3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554640" comment="xen-tools-4.9.4_02-3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554641" comment="xen-tools-domU-4.9.4_02-3.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149967" version="1" class="patch">
	<metadata>
		<title>Security update for xmltooling (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1129537" ref_url="https://bugzilla.suse.com/1129537" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9628" ref_url="https://www.suse.com/security/cve/CVE-2019-9628/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005324.html" source="SUSE-SU"/>
		<description>
This update for xmltooling fixes the following issue:

Security issue fixed: 	  

- CVE-2019-9628: Fixed an improper handling of exception in XMLTooling library which could result in
denial of service against the application using XMLTooling (bsc#1129537).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-10"/>
	<updated date="2019-04-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1129537">SUSE bug 1129537</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9628/">CVE-2019-9628 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9628">CVE-2019-9628 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554642" comment="libxmltooling6-1.5.6-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554643" comment="xmltooling-schemas-1.5.6-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149968" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1011920" ref_url="https://bugzilla.suse.com/1011920" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1020645" ref_url="https://bugzilla.suse.com/1020645" source="BUGZILLA"/>
		<reference ref_id="1031392" ref_url="https://bugzilla.suse.com/1031392" source="BUGZILLA"/>
		<reference ref_id="1035053" ref_url="https://bugzilla.suse.com/1035053" source="BUGZILLA"/>
		<reference ref_id="1042422" ref_url="https://bugzilla.suse.com/1042422" source="BUGZILLA"/>
		<reference ref_id="1043591" ref_url="https://bugzilla.suse.com/1043591" source="BUGZILLA"/>
		<reference ref_id="1044189" ref_url="https://bugzilla.suse.com/1044189" source="BUGZILLA"/>
		<reference ref_id="1048129" ref_url="https://bugzilla.suse.com/1048129" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1050549" ref_url="https://bugzilla.suse.com/1050549" source="BUGZILLA"/>
		<reference ref_id="1053043" ref_url="https://bugzilla.suse.com/1053043" source="BUGZILLA"/>
		<reference ref_id="1054239" ref_url="https://bugzilla.suse.com/1054239" source="BUGZILLA"/>
		<reference ref_id="1057199" ref_url="https://bugzilla.suse.com/1057199" source="BUGZILLA"/>
		<reference ref_id="1062303" ref_url="https://bugzilla.suse.com/1062303" source="BUGZILLA"/>
		<reference ref_id="1063026" ref_url="https://bugzilla.suse.com/1063026" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065726" ref_url="https://bugzilla.suse.com/1065726" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1067906" ref_url="https://bugzilla.suse.com/1067906" source="BUGZILLA"/>
		<reference ref_id="1073579" ref_url="https://bugzilla.suse.com/1073579" source="BUGZILLA"/>
		<reference ref_id="1076393" ref_url="https://bugzilla.suse.com/1076393" source="BUGZILLA"/>
		<reference ref_id="1078788" ref_url="https://bugzilla.suse.com/1078788" source="BUGZILLA"/>
		<reference ref_id="1079524" ref_url="https://bugzilla.suse.com/1079524" source="BUGZILLA"/>
		<reference ref_id="1082519" ref_url="https://bugzilla.suse.com/1082519" source="BUGZILLA"/>
		<reference ref_id="1082863" ref_url="https://bugzilla.suse.com/1082863" source="BUGZILLA"/>
		<reference ref_id="1082979" ref_url="https://bugzilla.suse.com/1082979" source="BUGZILLA"/>
		<reference ref_id="1083215" ref_url="https://bugzilla.suse.com/1083215" source="BUGZILLA"/>
		<reference ref_id="1083527" ref_url="https://bugzilla.suse.com/1083527" source="BUGZILLA"/>
		<reference ref_id="1084427" ref_url="https://bugzilla.suse.com/1084427" source="BUGZILLA"/>
		<reference ref_id="1084536" ref_url="https://bugzilla.suse.com/1084536" source="BUGZILLA"/>
		<reference ref_id="1084760" ref_url="https://bugzilla.suse.com/1084760" source="BUGZILLA"/>
		<reference ref_id="1087209" ref_url="https://bugzilla.suse.com/1087209" source="BUGZILLA"/>
		<reference ref_id="1088087" ref_url="https://bugzilla.suse.com/1088087" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1090535" ref_url="https://bugzilla.suse.com/1090535" source="BUGZILLA"/>
		<reference ref_id="1091158" ref_url="https://bugzilla.suse.com/1091158" source="BUGZILLA"/>
		<reference ref_id="1093118" ref_url="https://bugzilla.suse.com/1093118" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1094555" ref_url="https://bugzilla.suse.com/1094555" source="BUGZILLA"/>
		<reference ref_id="1094562" ref_url="https://bugzilla.suse.com/1094562" source="BUGZILLA"/>
		<reference ref_id="1094825" ref_url="https://bugzilla.suse.com/1094825" source="BUGZILLA"/>
		<reference ref_id="1095344" ref_url="https://bugzilla.suse.com/1095344" source="BUGZILLA"/>
		<reference ref_id="1095753" ref_url="https://bugzilla.suse.com/1095753" source="BUGZILLA"/>
		<reference ref_id="1095805" ref_url="https://bugzilla.suse.com/1095805" source="BUGZILLA"/>
		<reference ref_id="1096052" ref_url="https://bugzilla.suse.com/1096052" source="BUGZILLA"/>
		<reference ref_id="1096547" ref_url="https://bugzilla.suse.com/1096547" source="BUGZILLA"/>
		<reference ref_id="1098050" ref_url="https://bugzilla.suse.com/1098050" source="BUGZILLA"/>
		<reference ref_id="1098996" ref_url="https://bugzilla.suse.com/1098996" source="BUGZILLA"/>
		<reference ref_id="1099597" ref_url="https://bugzilla.suse.com/1099597" source="BUGZILLA"/>
		<reference ref_id="1099810" ref_url="https://bugzilla.suse.com/1099810" source="BUGZILLA"/>
		<reference ref_id="1101555" ref_url="https://bugzilla.suse.com/1101555" source="BUGZILLA"/>
		<reference ref_id="1102495" ref_url="https://bugzilla.suse.com/1102495" source="BUGZILLA"/>
		<reference ref_id="1102715" ref_url="https://bugzilla.suse.com/1102715" source="BUGZILLA"/>
		<reference ref_id="1102870" ref_url="https://bugzilla.suse.com/1102870" source="BUGZILLA"/>
		<reference ref_id="1102875" ref_url="https://bugzilla.suse.com/1102875" source="BUGZILLA"/>
		<reference ref_id="1102877" ref_url="https://bugzilla.suse.com/1102877" source="BUGZILLA"/>
		<reference ref_id="1102879" ref_url="https://bugzilla.suse.com/1102879" source="BUGZILLA"/>
		<reference ref_id="1102882" ref_url="https://bugzilla.suse.com/1102882" source="BUGZILLA"/>
		<reference ref_id="1102896" ref_url="https://bugzilla.suse.com/1102896" source="BUGZILLA"/>
		<reference ref_id="1103156" ref_url="https://bugzilla.suse.com/1103156" source="BUGZILLA"/>
		<reference ref_id="1103269" ref_url="https://bugzilla.suse.com/1103269" source="BUGZILLA"/>
		<reference ref_id="1103308" ref_url="https://bugzilla.suse.com/1103308" source="BUGZILLA"/>
		<reference ref_id="1103405" ref_url="https://bugzilla.suse.com/1103405" source="BUGZILLA"/>
		<reference ref_id="1104124" ref_url="https://bugzilla.suse.com/1104124" source="BUGZILLA"/>
		<reference ref_id="1105025" ref_url="https://bugzilla.suse.com/1105025" source="BUGZILLA"/>
		<reference ref_id="1105428" ref_url="https://bugzilla.suse.com/1105428" source="BUGZILLA"/>
		<reference ref_id="1105795" ref_url="https://bugzilla.suse.com/1105795" source="BUGZILLA"/>
		<reference ref_id="1105931" ref_url="https://bugzilla.suse.com/1105931" source="BUGZILLA"/>
		<reference ref_id="1106095" ref_url="https://bugzilla.suse.com/1106095" source="BUGZILLA"/>
		<reference ref_id="1106105" ref_url="https://bugzilla.suse.com/1106105" source="BUGZILLA"/>
		<reference ref_id="1106110" ref_url="https://bugzilla.suse.com/1106110" source="BUGZILLA"/>
		<reference ref_id="1106240" ref_url="https://bugzilla.suse.com/1106240" source="BUGZILLA"/>
		<reference ref_id="1106293" ref_url="https://bugzilla.suse.com/1106293" source="BUGZILLA"/>
		<reference ref_id="1106359" ref_url="https://bugzilla.suse.com/1106359" source="BUGZILLA"/>
		<reference ref_id="1106434" ref_url="https://bugzilla.suse.com/1106434" source="BUGZILLA"/>
		<reference ref_id="1106512" ref_url="https://bugzilla.suse.com/1106512" source="BUGZILLA"/>
		<reference ref_id="1106594" ref_url="https://bugzilla.suse.com/1106594" source="BUGZILLA"/>
		<reference ref_id="1106913" ref_url="https://bugzilla.suse.com/1106913" source="BUGZILLA"/>
		<reference ref_id="1106929" ref_url="https://bugzilla.suse.com/1106929" source="BUGZILLA"/>
		<reference ref_id="1106934" ref_url="https://bugzilla.suse.com/1106934" source="BUGZILLA"/>
		<reference ref_id="1107060" ref_url="https://bugzilla.suse.com/1107060" source="BUGZILLA"/>
		<reference ref_id="1107299" ref_url="https://bugzilla.suse.com/1107299" source="BUGZILLA"/>
		<reference ref_id="1107318" ref_url="https://bugzilla.suse.com/1107318" source="BUGZILLA"/>
		<reference ref_id="1107535" ref_url="https://bugzilla.suse.com/1107535" source="BUGZILLA"/>
		<reference ref_id="1107829" ref_url="https://bugzilla.suse.com/1107829" source="BUGZILLA"/>
		<reference ref_id="1107870" ref_url="https://bugzilla.suse.com/1107870" source="BUGZILLA"/>
		<reference ref_id="1107924" ref_url="https://bugzilla.suse.com/1107924" source="BUGZILLA"/>
		<reference ref_id="1108096" ref_url="https://bugzilla.suse.com/1108096" source="BUGZILLA"/>
		<reference ref_id="1108170" ref_url="https://bugzilla.suse.com/1108170" source="BUGZILLA"/>
		<reference ref_id="1108240" ref_url="https://bugzilla.suse.com/1108240" source="BUGZILLA"/>
		<reference ref_id="1108281" ref_url="https://bugzilla.suse.com/1108281" source="BUGZILLA"/>
		<reference ref_id="1108315" ref_url="https://bugzilla.suse.com/1108315" source="BUGZILLA"/>
		<reference ref_id="1108377" ref_url="https://bugzilla.suse.com/1108377" source="BUGZILLA"/>
		<reference ref_id="1108399" ref_url="https://bugzilla.suse.com/1108399" source="BUGZILLA"/>
		<reference ref_id="1108498" ref_url="https://bugzilla.suse.com/1108498" source="BUGZILLA"/>
		<reference ref_id="1108803" ref_url="https://bugzilla.suse.com/1108803" source="BUGZILLA"/>
		<reference ref_id="1108823" ref_url="https://bugzilla.suse.com/1108823" source="BUGZILLA"/>
		<reference ref_id="1109038" ref_url="https://bugzilla.suse.com/1109038" source="BUGZILLA"/>
		<reference ref_id="1109158" ref_url="https://bugzilla.suse.com/1109158" source="BUGZILLA"/>
		<reference ref_id="1109333" ref_url="https://bugzilla.suse.com/1109333" source="BUGZILLA"/>
		<reference ref_id="1109336" ref_url="https://bugzilla.suse.com/1109336" source="BUGZILLA"/>
		<reference ref_id="1109337" ref_url="https://bugzilla.suse.com/1109337" source="BUGZILLA"/>
		<reference ref_id="1109441" ref_url="https://bugzilla.suse.com/1109441" source="BUGZILLA"/>
		<reference ref_id="1109772" ref_url="https://bugzilla.suse.com/1109772" source="BUGZILLA"/>
		<reference ref_id="1109784" ref_url="https://bugzilla.suse.com/1109784" source="BUGZILLA"/>
		<reference ref_id="1109806" ref_url="https://bugzilla.suse.com/1109806" source="BUGZILLA"/>
		<reference ref_id="1109818" ref_url="https://bugzilla.suse.com/1109818" source="BUGZILLA"/>
		<reference ref_id="1109907" ref_url="https://bugzilla.suse.com/1109907" source="BUGZILLA"/>
		<reference ref_id="1109919" ref_url="https://bugzilla.suse.com/1109919" source="BUGZILLA"/>
		<reference ref_id="1109923" ref_url="https://bugzilla.suse.com/1109923" source="BUGZILLA"/>
		<reference ref_id="1110006" ref_url="https://bugzilla.suse.com/1110006" source="BUGZILLA"/>
		<reference ref_id="1110297" ref_url="https://bugzilla.suse.com/1110297" source="BUGZILLA"/>
		<reference ref_id="1110337" ref_url="https://bugzilla.suse.com/1110337" source="BUGZILLA"/>
		<reference ref_id="1110363" ref_url="https://bugzilla.suse.com/1110363" source="BUGZILLA"/>
		<reference ref_id="1110468" ref_url="https://bugzilla.suse.com/1110468" source="BUGZILLA"/>
		<reference ref_id="1110600" ref_url="https://bugzilla.suse.com/1110600" source="BUGZILLA"/>
		<reference ref_id="1110601" ref_url="https://bugzilla.suse.com/1110601" source="BUGZILLA"/>
		<reference ref_id="1110602" ref_url="https://bugzilla.suse.com/1110602" source="BUGZILLA"/>
		<reference ref_id="1110603" ref_url="https://bugzilla.suse.com/1110603" source="BUGZILLA"/>
		<reference ref_id="1110604" ref_url="https://bugzilla.suse.com/1110604" source="BUGZILLA"/>
		<reference ref_id="1110605" ref_url="https://bugzilla.suse.com/1110605" source="BUGZILLA"/>
		<reference ref_id="1110606" ref_url="https://bugzilla.suse.com/1110606" source="BUGZILLA"/>
		<reference ref_id="1110611" ref_url="https://bugzilla.suse.com/1110611" source="BUGZILLA"/>
		<reference ref_id="1110612" ref_url="https://bugzilla.suse.com/1110612" source="BUGZILLA"/>
		<reference ref_id="1110613" ref_url="https://bugzilla.suse.com/1110613" source="BUGZILLA"/>
		<reference ref_id="1110614" ref_url="https://bugzilla.suse.com/1110614" source="BUGZILLA"/>
		<reference ref_id="1110615" ref_url="https://bugzilla.suse.com/1110615" source="BUGZILLA"/>
		<reference ref_id="1110616" ref_url="https://bugzilla.suse.com/1110616" source="BUGZILLA"/>
		<reference ref_id="1110618" ref_url="https://bugzilla.suse.com/1110618" source="BUGZILLA"/>
		<reference ref_id="1110619" ref_url="https://bugzilla.suse.com/1110619" source="BUGZILLA"/>
		<reference ref_id="1110930" ref_url="https://bugzilla.suse.com/1110930" source="BUGZILLA"/>
		<reference ref_id="1111363" ref_url="https://bugzilla.suse.com/1111363" source="BUGZILLA"/>
		<reference ref_id="1111516" ref_url="https://bugzilla.suse.com/1111516" source="BUGZILLA"/>
		<reference ref_id="1111870" ref_url="https://bugzilla.suse.com/1111870" source="BUGZILLA"/>
		<reference ref_id="1112007" ref_url="https://bugzilla.suse.com/1112007" source="BUGZILLA"/>
		<reference ref_id="1112262" ref_url="https://bugzilla.suse.com/1112262" source="BUGZILLA"/>
		<reference ref_id="1112263" ref_url="https://bugzilla.suse.com/1112263" source="BUGZILLA"/>
		<reference ref_id="1112894" ref_url="https://bugzilla.suse.com/1112894" source="BUGZILLA"/>
		<reference ref_id="1112902" ref_url="https://bugzilla.suse.com/1112902" source="BUGZILLA"/>
		<reference ref_id="1112903" ref_url="https://bugzilla.suse.com/1112903" source="BUGZILLA"/>
		<reference ref_id="1112905" ref_url="https://bugzilla.suse.com/1112905" source="BUGZILLA"/>
		<reference ref_id="1113667" ref_url="https://bugzilla.suse.com/1113667" source="BUGZILLA"/>
		<reference ref_id="1113751" ref_url="https://bugzilla.suse.com/1113751" source="BUGZILLA"/>
		<reference ref_id="1113766" ref_url="https://bugzilla.suse.com/1113766" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="1114178" ref_url="https://bugzilla.suse.com/1114178" source="BUGZILLA"/>
		<reference ref_id="1114229" ref_url="https://bugzilla.suse.com/1114229" source="BUGZILLA"/>
		<reference ref_id="1114648" ref_url="https://bugzilla.suse.com/1114648" source="BUGZILLA"/>
		<reference ref_id="1115593" ref_url="https://bugzilla.suse.com/1115593" source="BUGZILLA"/>
		<reference ref_id="981083" ref_url="https://bugzilla.suse.com/981083" source="BUGZILLA"/>
		<reference ref_id="997172" ref_url="https://bugzilla.suse.com/997172" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14613" ref_url="https://www.suse.com/security/cve/CVE-2018-14613/" source="CVE"/>
		<reference ref_id="CVE-2018-14617" ref_url="https://www.suse.com/security/cve/CVE-2018-14617/" source="CVE"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-16276" ref_url="https://www.suse.com/security/cve/CVE-2018-16276/" source="CVE"/>
		<reference ref_id="CVE-2018-16597" ref_url="https://www.suse.com/security/cve/CVE-2018-16597/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<reference ref_id="CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281/" source="CVE"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-18690" ref_url="https://www.suse.com/security/cve/CVE-2018-18690/" source="CVE"/>
		<reference ref_id="CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710/" source="CVE"/>
		<reference ref_id="CVE-2018-7480" ref_url="https://www.suse.com/security/cve/CVE-2018-7480/" source="CVE"/>
		<reference ref_id="CVE-2018-7757" ref_url="https://www.suse.com/security/cve/CVE-2018-7757/" source="CVE"/>
		<reference ref_id="CVE-2018-9516" ref_url="https://www.suse.com/security/cve/CVE-2018-9516/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 Azure kernel was updated to 4.4.162 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).
- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (bnc#1108498).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bnc#1107829).
- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bnc#1108399).
- CVE-2018-16597: Incorrect access checking in overlayfs mounts could be used by local attackers to modify or truncate files in the underlying filesystem (bnc#1106512).
- CVE-2018-14613: There is an invalid pointer dereference in io_ctl_map_page() when mounting and operating a crafted btrfs image, because of a lack of block group item validation in check_leaf_item in fs/btrfs/tree-checker.c (bnc#1102896).
- CVE-2018-14617: There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory (bnc#1102870).
- CVE-2018-16276: Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges (bnc#1106095 bnc#1115593).
- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1087209).
- CVE-2018-7480: The blkcg_init_queue function in block/blk-cgroup.c allowed local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure (bnc#1082863).

The following non-security bugs were fixed:

- 6lowpan: iphc: reset mac_header after decompress to fix panic (bnc#1012382).
- alsa: bebob: use address returned by kmalloc() instead of kernel stack for streaming DMA mapping (bnc#1012382).
- alsa: emu10k1: fix possible info leak to userspace on SNDRV_EMU10K1_IOCTL_INFO (bnc#1012382).
- alsa: hda: Add AZX_DCAPS_PM_RUNTIME for AMD Raven Ridge (bnc#1012382).
- alsa: hda - Fix cancel_work_sync() stall from jackpoll work (bnc#1012382).
- alsa: hda/realtek - Cannot adjust speaker's volume on Dell XPS 27 7760 (bnc#1012382).
- alsa: msnd: Fix the default sample sizes (bnc#1012382).
- alsa: pcm: Fix snd_interval_refine first/last with open min/max (bnc#1012382).
- alsa: usb-audio: Fix multiple definitions in AU0828_DEVICE() macro (bnc#1012382).
- apparmor: remove no-op permission check in policy_unpack (git-fixes).
- arc: build: Get rid of toolchain check (bnc#1012382).
- arc: clone syscall to setp r25 as thread pointer (bnc#1012382).
- arch/hexagon: fix kernel/dma.c build warning (bnc#1012382).
- arch-symbols: use bash as interpreter since the script uses bashism.
- arc: [plat-axs*]: Enable SWAP (bnc#1012382).
- arm64: bpf: jit JMP_JSET_{X,K} (bsc#1110613).
- arm64: Correct type for PUD macros (bsc#1110600).
- arm64: cpufeature: Track 32bit EL0 support (bnc#1012382).
- arm64: dts: qcom: db410c: Fix Bluetooth LED trigger (bnc#1012382).
- arm64: fix erroneous __raw_read_system_reg() cases (bsc#1110606).
- arm64: Fix potential race with hardware DBM in ptep_set_access_flags() (bsc#1110605).
- arm64: fpsimd: Avoid FPSIMD context leakage for the init task (bsc#1110603).
- arm64: jump_label.h: use asm_volatile_goto macro instead of 'asm goto' (bnc#1012382).
- arm64: kasan: avoid bad virt_to_pfn() (bsc#1110612).
- arm64: kasan: avoid pfn_to_nid() before page array is initialized (bsc#1110619).
- arm64/kasan: do not allocate extra shadow memory (bsc#1110611).
- arm64: kernel: Update kerneldoc for cpu_suspend() rename (bsc#1110602).
- arm64: kgdb: handle read-only text / modules (bsc#1110604).
- arm64: KVM: Sanitize PSTATE.M when being set from userspace (bnc#1012382).
- arm64: KVM: Tighten guest core register access from userspace (bnc#1012382).
- arm64/mm/kasan: do not use vmemmap_populate() to initialize shadow (bsc#1110618).
- arm64: ptrace: Avoid setting compat FP[SC]R to garbage if get_user fails (bsc#1110601).
- arm64: supported.conf: mark armmmci as not supported
- arm64 Update config files. (bsc#1110468) Set MMC_QCOM_DML to build-in and delete driver from supported.conf
- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1110614).
- arm: dts: at91: add new compatibility string for macb on sama5d3 (bnc#1012382).
- arm: dts: dra7: fix DCAN node addresses (bnc#1012382).
- arm: exynos: Clear global variable on init error path (bnc#1012382).
- arm: hisi: check of_iomap and fix missing of_node_put (bnc#1012382).
- arm: hisi: fix error handling and missing of_node_put (bnc#1012382).
- arm: hisi: handle of_iomap and fix missing of_node_put (bnc#1012382).
- arm: mvebu: declare asm symbols as character arrays in pmsu.c (bnc#1012382).
- asm/sections: add helpers to check for section data (bsc#1063026).
- ASoC: cs4265: fix MMTLR Data switch control (bnc#1012382).
- ASoC: dapm: Fix potential DAI widget pointer deref when linking DAIs (bnc#1012382).
- ASoC: sigmadsp: safeload should not have lower byte limit (bnc#1012382).
- ASoC: wm8804: Add ACPI support (bnc#1012382).
- ASoC: wm8994: Fix missing break in switch (bnc#1012382).
- ata: libahci: Correct setting of DEVSLP register (bnc#1012382).
- ath10k: disable bundle mgmt tx completion event support (bnc#1012382).
- ath10k: fix scan crash due to incorrect length calculation (bnc#1012382).
- ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bnc#1012382).
- ath10k: prevent active scans on potential unusable channels (bnc#1012382).
- ath10k: protect ath10k_htt_rx_ring_free with rx_ring.lock (bnc#1012382).
- audit: fix use-after-free in audit_add_watch (bnc#1012382).
- autofs: fix autofs_sbi() does not check super block type (bnc#1012382).
- binfmt_elf: Respect error return from `regset-&gt;active' (bnc#1012382).
- block: bvec_nr_vecs() returns value for wrong slab (bsc#1082979).
- bluetooth: Add a new Realtek 8723DE ID 0bda:b009 (bnc#1012382).
- bluetooth: h5: Fix missing dependency on BT_HCIUART_SERDEV (bnc#1012382).
- bluetooth: hidp: Fix handling of strncpy for hid-&gt;name information (bnc#1012382).
- bnxt_en: Fix TX timeout during netpoll (bnc#1012382).
- bonding: avoid possible dead-lock (bnc#1012382).
- bpf: fix cb access in socket filter programs on tail calls (bsc#1012382).
- bpf: fix map not being uncharged during map creation failure (bsc#1012382).
- bpf: fix overflow in prog accounting (bsc#1012382).
- bpf, s390: fix potential memleak when later bpf_jit_prog fails (git-fixes).
- bpf, s390x: do not reload skb pointers in non-skb context (git-fixes).
- btrfs: add a comp_refs() helper (dependency for bsc#1031392).
- btrfs: Add checker for EXTENT_CSUM (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: add missing initialization in btrfs_check_shared (Git-fixes bsc#1112262).
- btrfs: Add sanity check for EXTENT_DATA when reading out leaf (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: add tracepoints for outstanding extents mods (dependency for bsc#1031392).
- btrfs: add wrapper for counting BTRFS_MAX_EXTENT_SIZE (dependency for bsc#1031392).
- btrfs: Check if item pointer overlaps with the item itself (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: Check that each block group has corresponding chunk at mount time (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: cleanup extent locking sequence (dependency for bsc#1031392).
- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (Follow up fixes for bsc#1031392).
- btrfs: delayed-inode: Remove wrong qgroup meta reservation calls (bsc#1031392).
- btrfs: delayed-inode: Use new qgroup meta rsv for delayed inode and item (bsc#1031392).
- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).
- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).
- btrfs: fix error handling in btrfs_dev_replace_start (bsc#1107535).
- btrfs: fix invalid attempt to free reserved space on failure to cow range (dependency for bsc#1031392).
- btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).
- btrfs: Fix race condition between delayed refs and blockgroup removal (Git-fixes bsc#1112263).
- btrfs: Fix wrong btrfs_delalloc_release_extents parameter (bsc#1031392).
- btrfs: Introduce mount time chunk &lt;-&gt; dev extent mapping check (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: kill trans in run_delalloc_nocow and btrfs_cross_ref_exist (dependency for bsc#1031392).
- btrfs: make the delalloc block rsv per inode (dependency for bsc#1031392).
- btrfs: Move leaf and node validation checker to tree-checker.c (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: pass delayed_refs directly to btrfs_find_delayed_ref_head (dependency for bsc#1031392).
- btrfs: qgroup: Add quick exit for non-fs extents (dependency for bsc#1031392).
- btrfs: qgroup: Cleanup btrfs_qgroup_prepare_account_extents function (dependency for bsc#1031392).
- btrfs: qgroup: Cleanup the remaining old reservation counters (bsc#1031392).
- btrfs: qgroup: Commit transaction in advance to reduce early EDQUOT (bsc#1031392).
- btrfs: qgroup: Do not use root-&gt;qgroup_meta_rsv for qgroup (bsc#1031392).
- btrfs: qgroup: Fix wrong qgroup reservation update for relationship modification (bsc#1031392).
- btrfs: qgroup: Introduce function to convert META_PREALLOC into META_PERTRANS (bsc#1031392).
- btrfs: qgroup: Introduce helpers to update and access new qgroup rsv (bsc#1031392).
- btrfs: qgroup: Make qgroup_reserve and its callers to use separate reservation type (bsc#1031392).
- btrfs: qgroup: Skeleton to support separate qgroup reservation type (bsc#1031392).
- btrfs: qgroups: opencode qgroup_free helper (dependency for bsc#1031392).
- btrfs: qgroup: Split meta rsv type into meta_prealloc and meta_pertrans (bsc#1031392).
- btrfs: qgroup: Update trace events for metadata reservation (bsc#1031392).
- btrfs: qgroup: Update trace events to use new separate rsv types (bsc#1031392).
- btrfs: qgroup: Use independent and accurate per inode qgroup rsv (bsc#1031392).
- btrfs: qgroup: Use root::qgroup_meta_rsv_* to record qgroup meta reserved space (bsc#1031392).
- btrfs: qgroup: Use separate meta reservation type for delalloc (bsc#1031392).
- btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized (bnc#1012382).
- btrfs: remove type argument from comp_tree_refs (dependency for bsc#1031392).
- btrfs: replace: Reset on-disk dev stats value after replace (bnc#1012382).
- btrfs: rework outstanding_extents (dependency for bsc#1031392).
- btrfs: scrub: Do not use inode page cache in scrub_handle_errored_block() (bsc#1108096).
- btrfs: switch args for comp_*_refs (dependency for bsc#1031392).
- btrfs: Take trans lock before access running trans in check_delayed_ref (Follow up fixes for bsc#1031392).
- btrfs: tree-checker: Add checker for dir item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Detect invalid and empty essential trees (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Enhance btrfs_check_node output (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Enhance output for btrfs_check_leaf (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Enhance output for check_csum_item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Enhance output for check_extent_data_item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Fix false panic for sanity test (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Replace root parameter with fs_info (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: use %zu format string for size_t (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: use %zu format string for size_t (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Verify block_group_item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: use correct compare function of dirty_metadata_bytes (bnc#1012382).
- btrfs: Verify that every chunk has corresponding block group at mount time (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1112007).
- cfg80211: fix a type issue in ieee80211_chandef_to_operating_class() (bnc#1012382).
- cfg80211: nl80211_update_ft_ies() to validate NL80211_ATTR_IE (bnc#1012382).
- cfq: Give a chance for arming slice idle timer in case of group_idle (bnc#1012382).
- cgroup: Fix deadlock in cpu hotplug path (bnc#1012382).
- cgroup, netclassid: add a preemption point to write_classid (bnc#1098996).
- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).
- cifs: check if SMB2 PDU size has been padded and suppress the warning (bnc#1012382).
- cifs: connect to servername instead of IP for IPC$ share (bsc#1106359).
- cifs: fix memory leak in SMB2_open() (bsc#1112894).
- cifs: Fix use after free of a mid_q_entry (bsc#1112903).
- cifs: fix wrapping bugs in num_entries() (bnc#1012382).
- cifs: integer overflow in in SMB2_ioctl() (bsc#1012382).
- cifs: prevent integer overflow in nxt_dir_entry() (bnc#1012382).
- cifs: read overflow in is_valid_oplock_break() (bnc#1012382).
- clk: imx6ul: fix missing of_node_put() (bnc#1012382).
- clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bnc#1012382).
- coresight: Handle errors in finding input/output ports (bnc#1012382).
- coresight: tpiu: Fix disabling timeouts (bnc#1012382).
- cpu/hotplug: Fix SMT supported evaluation (bsc#1089343).
- crypto: clarify licensing of OpenSSL asm code ().
- crypto: mxs-dcp - Fix wait logic on chan threads (bnc#1012382).
- crypto: sharah - Unregister correct algorithms for SAHARA 3 (bnc#1012382).
- crypto: skcipher - Fix -Wstringop-truncation warnings (bnc#1012382).
- crypto: vmx - Remove overly verbose printk from AES XTS init (git-fixes).
- debugobjects: Make stack check warning more informative (bnc#1012382).
- Define dependencies of in-kernel KMPs statically This allows us to use rpm's internal dependency generator (bsc#981083).
- Define early_radix_enabled() (bsc#1094244).
- dmaengine: pl330: fix irq race with terminate_all (bnc#1012382).
- dm cache: fix resize crash if user does not reload cache table (bnc#1012382).
- dm kcopyd: avoid softlockup in run_complete_job (bnc#1012382).
- dm-mpath: do not try to access NULL rq (bsc#1110337).
- dm-mpath: finally fixup cmd_flags (bsc#1110930).
- dm thin metadata: fix __udivdi3 undefined on 32-bit (bnc#1012382).
- dm thin metadata: try to avoid ever aborting transactions (bnc#1012382).
- Do not ship firmware (bsc#1054239). Pull firmware from kernel-firmware instead.
- drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bug#1109038).
- drivers: hv: vmbus: Add comments on ring buffer signaling (bug#1109038).
- drivers: hv: vmbus: add numa_node to sysfs (bug#1109038).
- drivers: hv: vmbus: Cleanup synic memory free path (bug#1109038).
- drivers: hv: vmbus: do not mark HV_PCIE as perf_device (bug#1109038).
- drivers: hv: vmbus: enable VMBus protocol version 5.0 (bug#1109038).
- drivers: hv: vmbus: Expose per-channel interrupts and events counters (bsc#1109038).
- drivers: hv: vmbus: Fix a rescind issue (bsc#1109038).
- drivers: hv: vmbus: Fix bugs in rescind handling (bug#1109038).
- drivers: hv: vmbus: Fix ring buffer signaling (bug#1109038).
- drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bug#1109038).
- drivers: hv: vmbus: Fix the offer_in_progress in vmbus_process_offer() (bug#1109038).
- drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bug#1109038).
- drivers: hv: vmbus: Make panic reporting to be more useful (bsc#1109038).
- drivers: hv: vmbus: Make TLFS #define names architecture neutral (bug#1109038).
- drivers: hv: vmbus: Removed an unnecessary cast from void * (bug#1109038).
- drivers: hv: vmbus: Remove use of slow_virt_to_phys() (bug#1109038).
- drivers: hv: vmbus: Remove x86-isms from arch independent drivers (bsc#1109038).
- drivers: hv: vmbus: Remove x86 MSR refs in arch independent code (bug#1109038).
- drivers: hv: vmbus: Reset the channel callback in vmbus_onoffer_rescind() (bug#1109038).
- drivers: hv: vmbus: respect what we get from hv_get_synint_state() (bug#1109038).
- drivers: hv: vmbus: Use get/put_cpu() in vmbus_connect() (bug#1109038).
- drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bug#1109038).
- drivers: net: cpsw: fix parsing of phy-handle DT property in dual_emac config (bnc#1012382).
- drivers: net: cpsw: fix segfault in case of bad phy-handle (bnc#1012382).
- drivers/tty: add error handling for pcmcia_loop_config (bnc#1012382).
- drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bnc#1012382).
- drm/amdkfd: Fix error codes in kfd_get_process (bnc#1012382).
- drm/hisilicon: hibmc: Do not carry error code in HiBMC framebuffer (bsc#1113766)
- drm/hisilicon: hibmc: Do not overwrite fb helper surface depth (bsc#1113766)
- drm/nouveau/drm/nouveau: Use pm_runtime_get_noresume() in connector_detect() (bnc#1012382).
- drm/nouveau/TBDdevinit: do not fail when PMU/PRE_OS is missing from VBIOS (bnc#1012382).
- drm/nouveau: tegra: Detach from ARM DMA/IOMMU mapping (bnc#1012382).
- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1106929)
- Drop dtb-source.spec and move the sources to kernel-source (bsc#1011920)
- e1000: check on netif_running() before calling e1000_up() (bnc#1012382).
- e1000: ensure to free old tx/rx rings in set_ringparam() (bnc#1012382).
- ebtables: arpreply: Add the standard target sanity check (bnc#1012382).
- edac: Fix memleak in module init error path (bsc#1109441).
- edac, i7core: Fix memleaks and use-after-free on probe and remove (1109441).
- edac, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114648).
- ethernet: ti: davinci_emac: add missing of_node_put after calling of_parse_phandle (bnc#1012382).
- ethtool: Remove trailing semicolon for static inline (bnc#1012382).
- ethtool: restore erroneously removed break in dev_ethtool (bsc#1114229).
- ext4: avoid divide by zero fault when deleting corrupted inline directories (bnc#1012382).
- ext4: do not mark mmp buffer head dirty (bnc#1012382).
- ext4: fix online resize's handling of a too-small final block group (bnc#1012382).
- ext4: fix online resizing for bigalloc file systems with a 1k block size (bnc#1012382).
- ext4: recalucate superblock checksum after updating free blocks/inodes (bnc#1012382).
- f2fs: do not set free of current section (bnc#1012382).
- f2fs: fix to do sanity check with {sit,nat}_ver_bitmap_bytesize (bnc#1012382).
- fat: validate -&gt;i_start before using (bnc#1012382).
- fbdev: Distinguish between interlaced and progressive modes (bnc#1012382).
- fbdev: fix broken menu dependencies (bsc#1106929)
- fbdev/omapfb: fix omapfb_memory_read infoleak (bnc#1012382).
- fbdev/via: fix defined but not used warning (bnc#1012382).
- Fixes: Commit cdbf92675fad ('mm: numa: avoid waiting on freed migrated pages') (bnc#1012382).
- fix init of hv_vp_index on SMP
- floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (bnc#1012382).
- fork: do not copy inconsistent signal handler state to child (bnc#1012382).
- fs/cifs: do not translate SFM_SLASH (U+F026) to backslash (bnc#1012382).
- fs/cifs: suppress a string overflow warning (bnc#1012382).
- fs/dcache.c: fix kmemcheck splat at take_dentry_name_snapshot() (bnc#1012382).
- fs/eventpoll: loosen irq-safety when possible (bsc#1096052).
- genirq: Delay incrementing interrupt count if it's disabled/pending (bnc#1012382).
- gfs2: Special-case rindex for gfs2_grow (bnc#1012382).
- gpio: adp5588: Fix sleep-in-atomic-context bug (bnc#1012382).
- gpiolib: Mark gpio_suffixes array with __maybe_unused (bnc#1012382).
- gpio: ml-ioh: Fix buffer underwrite on probe error path (bnc#1012382).
- gpio: tegra: Move driver registration to subsys_init level (bnc#1012382).
- gso_segment: Reset skb-&gt;mac_len after modifying network header (bnc#1012382).
- hexagon: modify ffs() and fls() to return int (bnc#1012382).
- hfsplus: do not return 0 when fill_super() failed (bnc#1012382).
- hfs: prevent crash on exit from failed search (bnc#1012382).
- hid: hid-ntrig: add error handling for sysfs_create_group (bnc#1012382).
- hid: hyperv: pr_err() strings should end with newlines (bug#1109038).
- hid: sony: Support DS4 dongle (bnc#1012382).
- hid: sony: Update device ids (bnc#1012382).
- hv: add SPDX license id to Kconfig (bug#1109038).
- hv: add SPDX license to trace (bug#1109038).
- hv: avoid crash in vmbus sysfs files (bnc#1108377).
- hv_balloon: trace post_status (bug#1109038).
- hv_netvsc: Add handlers for ethtool get/set msg level (bug#1109038).
- hv_netvsc: Add NetVSP v6 and v6.1 into version negotiation (bug#1109038).
- hv_netvsc: Add per-cpu ethtool stats for netvsc (bug#1109038).
- hv_netvsc: Add range checking for rx packet offset and length (bug#1109038).
- hv_netvsc: add trace points (bug#1109038).
- hv_netvsc: avoid retry on send during shutdown (bug#1109038).
- hv_netvsc: avoid unnecessary wakeups on subchannel creation (bug#1109038).
- hv_netvsc: cancel subchannel setup before halting device (bug#1109038).
- hv_netvsc: change GPAD teardown order on older versions (bug#1109038).
- hv_netvsc: Clean up extra parameter from rndis_filter_receive_data() (bug#1109038).
- hv_netvsc: common detach logic (bug#1109038).
- hv_netvsc: disable NAPI before channel close (bug#1109038).
- hv_netvsc: Ensure correct teardown message sequence order (bug#1109038).
- hv_netvsc: Fix a deadlock by getting rtnl lock earlier in netvsc_probe() (bug#1109038).
- hv_netvsc: Fix a network regression after ifdown/ifup (bug#1109038).
- hv_netvsc: fix bogus ifalias on network device (bug#1109038).
- hv_netvsc: fix deadlock on hotplug (bug#1109038).
- hv_netvsc: fix error unwind handling if vmbus_open fails (bug#1109038).
- hv/netvsc: fix handling of fallback to single queue mode (bug#1109038).
- hv_netvsc: Fix napi reschedule while receive completion is busy (bug#1109038).
- hv_netvsc: Fix net device attach on older Windows hosts (bug#1109038).
- hv_netvsc: fix network namespace issues with VF support (bug#1109038).
- hv/netvsc: Fix NULL dereference at single queue mode fallback (bug#1109038).
- hv_netvsc: fix race in napi poll when rescheduling (bug#1109038).
- hv_netvsc: fix schedule in RCU context (bug#1109038).
- hv_netvsc: Fix the return status in RX path (bug#1109038).
- hv_netvsc: Fix the variable sizes in ipsecv2 and rsc offload (bug#1109038).
- hv_netvsc: fix vf serial matching with pci slot info (bug#1109038).
- hv_netvsc: ignore devices that are not PCI (bug#1109038).
- hv_netvsc: move VF to same namespace as netvsc device (bug#1109038).
- hv_netvsc: netvsc_teardown_gpadl() split (bsc#1109038).
- hv_netvsc: only wake transmit queue if link is up (bug#1109038).
- hv_netvsc: pair VF based on serial number (bug#1109038).
- hv_netvsc: Pass net_device parameter to revoke and teardown functions (bug#1109038).
- hv_netvsc: pass netvsc_device to rndis halt (bug#1109038).
- hv_netvsc: preserve hw_features on mtu/channels/ringparam changes (bsc#1109038).
- hv_netvsc: propogate Hyper-V friendly name into interface alias (bug#1109038).
- hv_netvsc: select needed ucs2_string routine (bug#1109038).
- hv_netvsc: set master device (bug#1109038).
- hv_netvsc: Set tx_table to equal weight after subchannels open (bsc#1109038).
- hv_netvsc: Simplify num_chn checking in rndis_filter_device_add() (bug#1109038).
- hv_netvsc: simplify receive side calling arguments (bug#1109038).
- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() (bug#1109038).
- hv_netvsc: split sub-channel setup into async and sync (bug#1109038).
- hv_netvsc: typo in NDIS RSS parameters structure (bug#1109038).
- hv_netvsc: use napi_schedule_irqoff (bug#1109038).
- hv_netvsc: use RCU to fix concurrent rx and queue changes (bug#1109038).
- hv_netvsc: use reciprocal divide to speed up percent calculation (bsc#1109038).
- hv_netvsc: Use the num_online_cpus() for channel limit (bsc#1109038).
- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown (bug#1109038).
- hv: Synthetic typo correction (bug#1109038).
- hv_vmbus: Correct the stale comments regarding cpu affinity (bug#1109038).
- hwmon: (adt7475) Make adt7475_read_word() return errors (bnc#1012382).
- hwmon: (ina2xx) fix sysfs shunt resistor read access (bnc#1012382).
- hwrng: core - document the quality field (git-fixes).
- hyper-v: Globalize vp_index (bug#1109038).
- hyper-v: use GFP_KERNEL for hv_context.hv_numa_map (bug#1109038).
- i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bnc#1012382).
- i2c: i801: Allow ACPI AML access I/O ports not reserved for SMBus (bnc#1012382).
- i2c: i801: fix DNV's SMBCTRL register offset (bnc#1012382).
- i2c: uniphier-f: issue STOP only for last message or I2C_M_STOP (bnc#1012382).
- i2c: uniphier: issue STOP only for last message or I2C_M_STOP (bnc#1012382).
- i2c: xiic: Make the start and the byte count write atomic (bnc#1012382).
- i2c: xlp9xx: Add support for SMBAlert (bsc#1103308).
- i2c: xlp9xx: Fix case where SSIF read transaction completes early (bsc#1103308).
- i2c: xlp9xx: Fix issue seen when updating receive length (bsc#1103308).
- i2c: xlp9xx: Make sure the transfer size is not more than I2C_SMBUS_BLOCK_SIZE (bsc#1103308).
- IB/ipoib: Avoid a race condition between start_xmit and cm_rep_handler (bnc#1012382).
- IB/srp: Avoid that sg_reset -d ${srp_device} triggers an infinite loop (bnc#1012382).
- ib_srp: Remove WARN_ON in srp_terminate_io() (bsc#1094562).
- Input: atakbd - fix Atari CapsLock behaviour (bnc#1012382).
- Input: atakbd - fix Atari keymap (bnc#1012382).
- Input: atmel_mxt_ts - only use first T9 instance (bnc#1012382).
- Input: elantech - enable middle button of touchpad on ThinkPad P72 (bnc#1012382).
- iommu/amd: Return devid as alias for ACPI HID devices (bsc#1106105).
- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bnc#1012382).
- iommu/ipmmu-vmsa: Fix allocation in atomic context (bnc#1012382).
- ip6_tunnel: be careful when accessing the inner header (bnc#1012382).
- ipmi:ssif: Add support for multi-part transmit messages &gt; 2 parts (bsc#1103308).
- ip_tunnel: be careful when accessing the inner header (bnc#1012382).
- ipv4: fix use-after-free in ip_cmsg_recv_dstaddr() (bnc#1012382).
- ipv6: fix possible use-after-free in ip6_xmit() (bnc#1012382).
- ipvs: fix race between ip_vs_conn_new() and ip_vs_del_dest() (bnc#1012382).
- irqchip/bcm7038-l1: Hide cpu offline callback when building for !SMP (bnc#1012382).
- irqchip/gic-v3: Add missing barrier to 32bit version of gic_read_iar() (bnc#1012382).
- iw_cxgb4: only allow 1 flush on user qps (bnc#1012382).
- ixgbe: pci_set_drvdata must be called before register_netdev (Git-fixes bsc#1109923).
- jffs2: return -ERANGE when xattr buffer is too small (bnc#1012382).
- KABI: move the new handler to end of machdep_calls and hide it from genksyms (bsc#1094244).
- kabi.pl: Consider GPL vs. non-GPL exports ()
- kabi protect hnae_ae_ops (bsc#1107924).
- kABI: protect struct hnae_desc_cb (kabi).
- kbuild: add .DELETE_ON_ERROR special target (bnc#1012382).
- kbuild: make missing $DEPMOD a Warning instead of an Error (bnc#1012382).
- kernel-{binary,docs}.spec sort dependencies.
- kernel-binary: pass ARCH= to kernel build Recent kernel does not save CONFIG_64BIT so it has to be specified by arch.
- kernel-binary: pass MAKE_ARGS to install script as well.
- kernel-binary.spec Remove superfluous [].
- kernel-binary undefine unique_debug_names Some tools do not understand names like usr/lib/debug/boot/vmlinux-4.12.14-11.10-default-4.12.14-11.10.ppc64le.debug
- kernel-obs-build.spec.in: add --no-hostonly-cmdline to dracut invocation (boo#1062303). call dracut with --no-hostonly-cmdline to avoid the random rootfs UUID being added into the initrd's /etc/cmdline.d/95root-dev.conf
- kernel-obs-build.spec.in: enable xfs module This allows the public cloud team to build images with XFS as root filesystem
- kernel-obs-build: use pae and lpae kernels where available (bsc#1073579).
- kernel/params.c: downgrade warning for unsafe parameters (bsc#1050549).
- kernel-source.spec: Align source numbering.
- kernel-*.spec: remove remaining occurences of %release from dependencies There is a mix of %release and %source_rel in manually added dependencies and the %release dependencies tend to fail due to rebuild sync issues. So get rid of them.
- kprobes/x86: Release insn_slot in failure path (bsc#1110006).
- kthread: fix boot hang (regression) on MIPS/OpenRISC (bnc#1012382).
- kthread: Fix use-after-free if kthread fork fails (bnc#1012382).
- KVM: nVMX: Do not expose MPX VMX controls when guest MPX disabled (bsc#1106240).
- KVM: nVMX: Do not flush TLB when vmcs12 uses VPID (bsc#1106240).
- KVM: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bnc#1012382).
- KVM: x86: Do not re-{try,execute} after failed emulation in L2 (bsc#1106240).
- KVM: x86: Do not use kvm_x86_ops-&gt;mpx_supported() directly (bsc#1106240).
- KVM: x86: fix APIC page invalidation (bsc#1106240).
- KVM: x86: remove eager_fpu field of struct kvm_vcpu_arch (bnc#1012382).
- KVM/x86: remove WARN_ON() for when vm_munmap() fails (bsc#1106240).
- KVM: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabled (bsc#1106240).
- l2tp: cast l2tp traffic counter to unsigned (bsc#1099810).
- lib/test_hexdump.c: fix failure on big endian cpu (bsc#1106110).
- Limit kernel-source build to architectures for which we build binaries (bsc#1108281).
- locking/osq_lock: Fix osq_lock queue corruption (bnc#1012382).
- locking/rwsem-xadd: Fix missed wakeup due to reordering of load (bnc#1012382).
- lpfc: fixup crash in lpfc_els_unsol_buffer() (bsc#1107318).
- mac80211: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).
- mac80211: fix a race between restart and CSA flows (bnc#1012382).
- mac80211: fix setting IEEE80211_KEY_FLAG_RX_MGMT for AP mode keys (bnc#1012382).
- mac80211: Fix station bandwidth setting after channel switch (bnc#1012382).
- mac80211_hwsim: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).
- mac80211: mesh: fix HWMP sequence numbering to follow standard (bnc#1012382).
- mac80211: restrict delayed tailroom needed decrement (bnc#1012382).
- mac80211: shorten the IBSS debug messages (bnc#1012382).
- mach64: detect the dot clock divider correctly on sparc (bnc#1012382).
- macintosh/via-pmu: Add missing mmio accessors (bnc#1012382).
- macros.kernel-source: define linux_arch for KMPs (boo#1098050). CONFIG_64BIT is no longer defined so KMP spec files need to include %{?linux_make_arch} in any make call to build modules or descent into the kernel directory for any reason.
- macros.kernel-source: Fix building non-x86 KMPs
- macros.kernel-source: ignore errors when using make to print kernel release There is no way to handle the errors anyway and including the error into package version does not give good results.
- macros.kernel-source: pass -b properly in kernel module package (bsc#1107870).
- macros.kernel-source: pass -f properly in module subpackage (boo#1076393).
- md-cluster: clear another node's suspend_area after the copy is finished (bnc#1012382).
- md/raid1: exit sync request if MD_RECOVERY_INTR is set (git-fixes).
- md/raid5: fix data corruption of replacements after originals dropped (bnc#1012382).
- media: af9035: prevent buffer overflow on write (bnc#1012382).
- media: exynos4-is: Prevent NULL pointer dereference in __isp_video_try_fmt() (bnc#1012382).
- media: fsl-viu: fix error handling in viu_of_probe() (bnc#1012382).
- media: omap3isp: zero-initialize the isp cam_xclk{a,b} initial data (bnc#1012382).
- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).
- media: s3c-camif: ignore -ENOIOCTLCMD from v4l2_subdev_call for s_power (bnc#1012382).
- media: soc_camera: ov772x: correct setting of banding filter (bnc#1012382).
- media: tm6000: add error handling for dvb_register_adapter (bnc#1012382).
- media: uvcvideo: Support realtek's UVC 1.5 device (bnc#1012382).
- media: v4l: event: Prevent freeing event subscriptions while accessed (bnc#1012382).
- media: videobuf2-core: check for q-&gt;error in vb2_core_qbuf() (bnc#1012382).
- media: videobuf-dma-sg: Fix dma_{sync,unmap}_sg() calls (bsc#1050431).
- mei: bus: type promotion bug in mei_nfc_if_version() (bnc#1012382).
- mei: me: allow runtime pm for platform with D0i3 (bnc#1012382).
- memory_hotplug: cond_resched in __remove_pages (bnc#1114178).
- mfd: omap-usb-host: Fix dts probe of children (bnc#1012382).
- mfd: sm501: Set coherent_dma_mask when creating subdevices (bnc#1012382).
- mfd: ti_am335x_tscadc: Fix struct clk memory leak (bnc#1012382).
- MIPS: ath79: fix system restart (bnc#1012382).
- MIPS: Fix ISA virt/bus conversion for non-zero PHYS_OFFSET (bnc#1012382).
- MIPS: jz4740: Bump zload address (bnc#1012382).
- MIPS: loongson64: cs5536: Fix PCI_OHCI_INT_REG reads (bnc#1012382).
- MIPS: Octeon: add missing of_node_put() (bnc#1012382).
- MIPS: VDSO: Match data page cache colouring when D$ aliases (bnc#1012382).
- MIPS: WARN_ON invalid DMA cache maintenance, not BUG_ON (bnc#1012382).
- misc: hmc6352: fix potential Spectre v1 (bnc#1012382).
- misc: mic: SCIF Fix scif_get_new_port() error handling (bnc#1012382).
- misc: ti-st: Fix memory leak in the error path of probe() (bnc#1012382).
- mkspec: do not build dtbs for architectures with no kernel.
- mkspec: fix perl warning
- mkspec: only build docs for default variant kernel.
- mmc: mmci: stop building qcom dml as module (bsc#1110468).
- mm/fadvise.c: fix signed overflow UBSAN complaint (bnc#1012382).
- mm: fix devmem_is_allowed() for sub-page System RAM intersections (bsc#1110006).
- mm: get rid of vmacache_flush_all() entirely (bnc#1012382).
- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (bnc#1012382).
- mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).
- mm: shmem.c: Correctly annotate new inodes for lockdep (bnc#1012382).
- mm/vmstat.c: fix outdated vmstat_text (bnc#1012382).
- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (bnc#1012382).
- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (git fixes).
- module: exclude SHN_UNDEF symbols from kallsyms api (bnc#1012382).
- move changes without Git-commit out of sorted section
- mtdchar: fix overflows in adjustment of `count` (bnc#1012382).
- mtd/maps: fix solutionengine.c printk format warnings (bnc#1012382).
- neighbour: confirm neigh entries when ARP packet is received (bnc#1012382).
- net/9p: fix error path of p9_virtio_probe (bnc#1012382).
- net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT (bnc#1012382).
- net: bcmgenet: use MAC link status for fixed phy (bnc#1012382).
- net: cadence: Fix a sleep-in-atomic-context bug in macb_halt_tx() (bnc#1012382).
- net: dcb: For wild-card lookups, use priority -1, not 0 (bnc#1012382).
- net: ena: Eliminate duplicate barriers on weakly-ordered archs (bsc#1108240).
- net: ena: fix device destruction to gracefully free resources (bsc#1108240).
- net: ena: fix driver when PAGE_SIZE == 64kB (bsc#1108240).
- net: ena: fix incorrect usage of memory barriers (bsc#1108240).
- net: ena: fix missing calls to READ_ONCE (bsc#1108240).
- net: ena: fix missing lock during device destruction (bsc#1108240).
- net: ena: fix potential double ena_destroy_device() (bsc#1108240).
- net: ena: fix surprise unplug NULL dereference kernel crash (bsc#1108240).
- net: ethernet: mvneta: Fix napi structure mixup on armada 3700 (bsc#1110616).
- net: ethernet: ti: cpsw: fix mdio device reference leak (bnc#1012382).
- netfilter: x_tables: avoid stack-out-of-bounds read in xt_copy_counters_from_user (bnc#1012382).
- net: hns: add netif_carrier_off before change speed and duplex (bsc#1107924).
- net: hns: add the code for cleaning pkt in chip (bsc#1107924).
- net: hns: fix length and page_offset overflow when CONFIG_ARM64_64K_PAGES (bnc#1012382).
- net: hp100: fix always-true check for link up state (bnc#1012382).
- net: ipv4: update fnhe_pmtu when first hop's MTU changes (bnc#1012382).
- net/ipv6: Display all addresses in output of /proc/net/if_inet6 (bnc#1012382).
- netlabel: check for IPV4MASK in addrinfo_get (bnc#1012382).
- net: macb: disable scatter-gather for macb on sama5d3 (bnc#1012382).
- net/mlx4: Use cpumask_available for eq-&gt;affinity_mask (bnc#1012382).
- net: mvneta: fix mtu change on port without link (bnc#1012382).
- net: mvneta: fix mvneta_config_rss on armada 3700 (bsc#1110615).
- net: mvpp2: Extract the correct ethtype from the skb for tx csum offload (bnc#1012382).
- net: systemport: Fix wake-up interrupt race during resume (bnc#1012382).
- net/usb: cancel pending work when unbinding smsc75xx (bnc#1012382).
- netvsc: delay setup of VF device (bug#1109038).
- netvsc: fix race during initialization (bug#1109038).
- netvsc: fix race on sub channel creation (bug#1109038).
- netvsc: remove bonding setup script (bug#1109038).
- NFC: Fix possible memory corruption when handling SHDLC I-Frame commands (bnc#1012382).
- NFC: Fix the number of pipes (bnc#1012382).
- NFS: add nostatflush mount option (bsc#1065726).
- NFS: Avoid quadratic search when freeing delegations (bsc#1084760).
- nfsd: fix corrupted reply to badly ordered compound (bnc#1012382).
- NFS: Use an appropriate work queue for direct-write completion (bsc#1082519).
- NFSv4.0 fix client reference leak in callback (bnc#1012382).
- nvme_fc: add 'nvme_discovery' sysfs attribute to fc transport device (bsc#1044189).
- nvmet: fixup crash on NULL device path (bsc#1082979).
- ocfs2: fix locking for res-&gt;tracking and dlm-&gt;tracking_list (bnc#1012382).
- ocfs2: fix ocfs2 read block panic (bnc#1012382).
- of: unittest: Disable interrupt node tests for old world MAC systems (bnc#1012382).
- ovl: Copy inode attributes after setting xattr (bsc#1107299).
- ovl: modify ovl_permission() to do checks on two inodes (bsc#1106512)
- ovl: proper cleanup of workdir (bnc#1012382).
- ovl: rename is_merge to is_lowest (bnc#1012382).
- parport: sunbpp: fix error return code (bnc#1012382).
- partitions/aix: append null character to print data from disk (bnc#1012382).
- partitions/aix: fix usage of uninitialized lv_info and lvname structures (bnc#1012382).
- Pass x86 as architecture on x86_64 and i386 (bsc#1093118).
- pci: altera: Fix bool initialization in tlp_read_packet() (bsc#1109806).
- pci: designware: Fix I/O space page leak (bsc#1109806).
- pci: designware: Fix pci_remap_iospace() failure path (bsc#1109806).
- pci: hv: Convert remove_lock to refcount (bug#1109038).
- pci: hv: Do not wait forever on a device that has disappeared (bug#1109038).
- pci: hv: Fix return value check in hv_pci_assign_slots() (bug#1109038).
- pci: hv: Make sure the bus domain is really unique (bug#1109038).
- pci: hv: Remove unused reason for refcount handler (bug#1109038).
- pci: hv: Replace GFP_ATOMIC with GFP_KERNEL in new_pcichild_device() (bug#1109038).
- pci: hv: support reporting serial number as slot information (bug#1109038).
- pci: hv: Use effective affinity mask (bsc#1109038).
- pci: hv: Use effective affinity mask (bsc#1109772).
- pci: hv: Use list_for_each_entry() (bug#1109038).
- pci: mvebu: Fix I/O space end address calculation (bnc#1012382).
- pci: OF: Fix I/O space page leak (bsc#1109806).
- pci: pciehp: Fix unprotected list iteration in IRQ handler (bsc#1109806).
- pci: Reprogram bridge prefetch registers on resume (bnc#1012382).
- pci: shpchp: Fix AMD POGO identification (bsc#1109806).
- pci: Supply CPU physical address (not bus address) to iomem_is_exclusive() (bsc#1109806).
- pci: versatile: Fix I/O space page leak (bsc#1109806).
- pci: versatile: Fix pci_remap_iospace() failure path (bsc#1109806).
- pci: xgene: Fix I/O space page leak (bsc#1109806).
- pci: xilinx: Add missing of_node_put() (bsc#1109806).
- perf powerpc: Fix callchain ip filtering (bnc#1012382).
- perf powerpc: Fix callchain ip filtering when return address is in a register (bnc#1012382).
- perf probe powerpc: Ignore SyS symbols irrespective of endianness (bnc#1012382).
- perf script python: Fix export-to-postgresql.py occasional failure (bnc#1012382).
- perf tools: Allow overriding MAX_NR_CPUS at compile time (bnc#1012382).
- phy: qcom-ufs: add MODULE_LICENSE tag (bsc#1110468).
- pinctrl: qcom: spmi-gpio: Fix pmic_gpio_config_get() to be compliant (bnc#1012382).
- pipe: actually allow root to exceed the pipe buffer limit (git-fixes).
- platform/x86: alienware-wmi: Correct a memory leak (bnc#1012382).
- platform/x86: asus-nb-wmi: Add keymap entry for lid flip action on UX360 (bnc#1012382).
- platform/x86: toshiba_acpi: Fix defined but not used build warnings (bnc#1012382).
- PM / core: Clear the direct_complete flag on errors (bnc#1012382).
- powerpc/64: Do load of PACAKBASE in LOAD_HANDLER (bsc#1094244).
- powerpc/64s: move machine check SLB flushing to mm/slb.c (bsc#1094244).
- powerpc/book3s: Fix MCE console messages for unrecoverable MCE (bsc#1094244).
- powerpc/fadump: cleanup crash memory ranges support (bsc#1103269).
- powerpc/fadump: re-register firmware-assisted dump if already registered (bsc#1108170, bsc#1108823).
- powerpc: Fix size calculation using resource_size() (bnc#1012382).
- powerpc/kdump: Handle crashkernel memory reservation failure (bnc#1012382).
- powerpc/mce: Fix SLB rebolting during MCE recovery path (bsc#1094244).
- powerpc/mce: Move 64-bit machine check code into mce.c (bsc#1094244).
- powerpc/numa: Skip onlining a offline node in kdump path (bsc#1109784).
- powerpc/numa: Use associativity if VPHN hcall is successful (bsc#1110363).
- powerpc/perf/hv-24x7: Fix off-by-one error in request_buffer check (git-fixes).
- powerpc/perf/hv-24x7: Fix passing of catalog version number (bsc#1053043).
- powerpc/powernv/ioda2: Reduce upper limit for DMA window size (bsc#1066223).
- powerpc/powernv: opal_put_chars partial write fix (bnc#1012382).
- powerpc/powernv: Rename machine_check_pSeries_early() to powernv (bsc#1094244).
- powerpc/pseries: Avoid using the size greater than RTAS_ERROR_LOG_MAX (bnc#1012382).
- powerpc/pseries: Defer the logging of rtas error to irq work queue (bsc#1094244).
- powerpc/pseries: Define MCE error event section (bsc#1094244).
- powerpc/pseries: Disable CPU hotplug across migrations (bsc#1066223).
- powerpc/pseries: Display machine check error details (bsc#1094244).
- powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).
- powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).
- powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries/mm: call H_BLOCK_REMOVE (bsc#1109158).
- powerpc/pseries/mm: factorize PTE slot computation (bsc#1109158).
- powerpc/pseries/mm: Introducing FW_FEATURE_BLOCK_REMOVE (bsc#1109158).
- powerpc/pseries: Remove prrn_work workqueue (bsc#1102495, bsc#1109337).
- powerpc/pseries: Remove unneeded uses of dlpar work queue (bsc#1102495, bsc#1109337).
- powerpc/rtas: Fix a potential race between CPU-Offline &amp; Migration (bsc#1111870).
- powerpc/tm: Avoid possible userspace r1 corruption on reclaim (bsc#1109333).
- powerpc/tm: Fix userspace r13 corruption (bsc#1109333).
- power: vexpress: fix corruption in notifier registration (bnc#1012382).
- printk: do not spin in printk when in nmi (bsc#1094244).
- proc: restrict kernel stack dumps to root (bnc#1012382).
- pstore: Fix incorrect persistent ram buffer mapping (bnc#1012382).
- qlcnic: fix Tx descriptor corruption on 82xx devices (bnc#1012382).
- r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bnc#1012382).
- RAID10 BUG_ON in raise_barrier when force is true and conf-&gt;barrier is 0 (bnc#1012382).
- rculist: add list_for_each_entry_from_rcu() (bsc#1084760).
- rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).
- RDMA/cma: Do not ignore net namespace for unbound cm_id (bnc#1012382).
- RDMA/cma: Protect cma dev list with lock (bnc#1012382).
- RDMA/rw: Fix rdma_rw_ctx_signature_init() kernel-doc header (bsc#1082979).
- RDMA/ucma: check fd type in ucma_migrate_id() (bnc#1012382).
- README: Clean-up trailing whitespace
- reiserfs: add check to detect corrupted directory entry (bsc#1109818).
- reiserfs: change j_timestamp type to time64_t (bnc#1012382).
- reiserfs: do not panic on bad directory entries (bsc#1109818).
- resource: Include resource end in walk_*() interfaces (bsc#1114648).
- Revert 'ARM: imx_v6_v7_defconfig: Select ULPI support' (bnc#1012382).
- Revert 'btrfs: qgroups: Retry after commit on getting EDQUOT' (bsc#1031392).
- Revert 'dma-buf/sync-file: Avoid enable fence signaling if poll(.timeout=0)' (bsc#1111363).
- Revert 'drm: Do not pass negative delta to ktime_sub_ns()' (bsc#1106929)
- Revert 'drm/i915: Initialize HWS page address after GPU reset' (bsc#1106929)
- Revert 'Drop kernel trampoline stack.' This reverts commit 85dead31706c1c1755adff90405ff9861c39c704.
- Revert 'kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)' This reverts commit edde1f21880e3bfe244c6f98a3733b05b13533dc.
- Revert 'KVM: x86: remove eager_fpu field of struct kvm_vcpu_arch' (kabi).
- Revert 'media: v4l: event: Prevent freeing event subscriptions while accessed' (kabi).
- Revert 'mm: get rid of vmacache_flush_all() entirely' (kabi).
- Revert 'proc: restrict kernel stack dumps to root' (kabi).
- Revert 'Skip intel_crt_init for Dell XPS 8700' (bsc#1106929)
- Revert 'usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt()' (bnc#1012382).
- ring-buffer: Allow for rescheduling when removing pages (bnc#1012382).
- rndis_wlan: potential buffer overflow in rndis_wlan_auth_indication() (bnc#1012382).
- rpm/kernel-binary.spec.in: Check module licenses (bsc#1083215,bsc#1083527)
- rpm/kernel-binary.spec.in: Do not sign modules if CONFIG_MODULE_SIG=n (bsc#1035053)
- rpm/kernel-binary.spec.in: Obsolete ftsteutates KMP (boo#997172)
- rpm/kernel-binary.spec.in: Only kernel-syzkaller needs gcc-devel (boo#1043591).
- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)
- rpm/kernel-docs.spec.in: refresh dependencies for PDF build (bsc#1048129)
- rpm/kernel-module-subpackage: Generate proper supplements in the template ... instead of relying on find-provides.ksyms to do it (bsc#981083).
- rpm/kernel-source.spec.in: Do not list deleted depdendency helpers (bsc#981083).
- rpm/kernel-spec-macros: Try harder to detect Build Service environment (bsc#1078788)
- rpmsg: Correct support for MODULE_DEVICE_TABLE() (git-fixes).
- rtc: bq4802: add error handling for devm_ioremap (bnc#1012382).
- rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096 (bnc#1012382).
- s390/chsc: Add exception handler for CHSC instruction (git-fixes).
- s390/dasd: fix hanging offline processing due to canceled worker (bnc#1012382).
- s390/extmem: fix gcc 8 stringop-overflow warning (bnc#1012382).
- s390/facilites: use stfle_fac_list array size for MAX_FACILITY_BIT (bnc#1108315, LTC#171326).
- s390/kdump: Fix elfcorehdr size calculation (git-fixes).
- s390/kdump: Make elfcorehdr size calculation ABI compliant (git-fixes).
- s390/lib: use expoline for all bcr instructions (LTC#171029 bnc#1012382 bnc#1106934).
- s390/mm: correct allocate_pgste proc_handler callback (git-fixes).
- s390/qeth: do not dump past end of unknown HW header (bnc#1012382).
- s390/qeth: fix race in used-buffer accounting (bnc#1012382).
- s390/qeth: handle failure on workqueue creation (git-fixes).
- s390/qeth: reset layer2 attribute on layer switch (bnc#1012382).
- s390/qeth: use vzalloc for QUERY OAT buffer (bnc#1108315, LTC#171527).
- s390: revert ELF_ET_DYN_BASE base changes (git-fixes).
- s390/stacktrace: fix address ranges for asynchronous and panic stack (git-fixes).
- sched/fair: Fix bandwidth timer clock drift condition (Git-fixes).
- sched/fair: Fix vruntime_normalized() for remote non-migration wakeup (Git-fixes).
- sched/isolcpus: Fix 'isolcpus=' boot parameter handling when !CONFIG_CPUMASK_OFFSTACK (bug#1109038).
- sch_hhf: fix null pointer dereference on init failure (bnc#1012382).
- sch_htb: fix crash on init failure (bnc#1012382).
- sch_multiq: fix double free on init failure (bnc#1012382).
- sch_netem: avoid null pointer deref on init failure (bnc#1012382).
- sch_tbf: fix two null pointer dereferences on init failure (bnc#1012382).
- scripts: modpost: check memory allocation results (bnc#1012382).
- scsi: 3ware: fix return 0 on the error path of probe (bnc#1012382).
- scsi: aic94xx: fix an error code in aic94xx_init() (bnc#1012382).
- scsi: bnx2i: add error handling for ioremap_nocache (bnc#1012382).
- scsi: ibmvscsi: Improve strings handling (bnc#1012382).
- scsi: ipr: System hung while dlpar adding primary ipr adapter back (bsc#1109336).
- scsi: klist: Make it safe to use klists in atomic context (bnc#1012382).
- scsi: netvsc: Use the vmbus function to calculate ring buffer percentage (bug#1109038).
- scsi: qla2xxx: Add changes for devloss timeout in driver (bsc#1084427).
- scsi: qla2xxx: Add FC-NVMe abort processing (bsc#1084427).
- scsi: qla2xxx: Add longer window for chip reset (bsc#1094555).
- scsi: qla2xxx: Avoid double completion of abort command (bsc#1094555).
- scsi: qla2xxx: Cleanup code to improve FC-NVMe error handling (bsc#1084427).
- scsi: qla2xxx: Cleanup for N2N code (bsc#1094555).
- scsi: qla2xxx: correctly shift host byte (bsc#1094555).
- scsi: qla2xxx: Correct setting of SAM_STAT_CHECK_CONDITION (bsc#1094555).
- scsi: qla2xxx: Delete session for nport id change (bsc#1094555).
- scsi: qla2xxx: Fix Async GPN_FT for FCP and FC-NVMe scan (bsc#1084427).
- scsi: qla2xxx: Fix crash on qla2x00_mailbox_command (bsc#1094555).
- scsi: qla2xxx: Fix double free bug after firmware timeout (bsc#1094555).
- scsi: qla2xxx: Fix driver unload by shutting down chip (bsc#1094555).
- scsi: qla2xxx: fix error message on &lt;qla2400 (bsc#1094555).
- scsi: qla2xxx: Fix FC-NVMe IO abort during driver reset (bsc#1084427).
- scsi: qla2xxx: Fix function argument descriptions (bsc#1094555).
- scsi: qla2xxx: Fix Inquiry command being dropped in Target mode (bsc#1094555).
- scsi: qla2xxx: Fix issue reported by static checker for qla2x00_els_dcmd2_sp_done() (bsc#1094555).
- scsi: qla2xxx: Fix login retry count (bsc#1094555).
- scsi: qla2xxx: Fix Management Server NPort handle reservation logic (bsc#1094555).
- scsi: qla2xxx: Fix memory leak for allocating abort IOCB (bsc#1094555).
- scsi: qla2xxx: Fix n2n_ae flag to prevent dev_loss on PDB change (bsc#1084427).
- scsi: qla2xxx: Fix N2N link re-connect (bsc#1094555).
- scsi: qla2xxx: Fix NPIV deletion by calling wait_for_sess_deletion (bsc#1094555).
- scsi: qla2xxx: Fix race between switch cmd completion and timeout (bsc#1094555).
- scsi: qla2xxx: Fix race condition between iocb timeout and initialisation (bsc#1094555).
- scsi: qla2xxx: Fix redundant fc_rport registration (bsc#1094555).
- scsi: qla2xxx: Fix retry for PRLI RJT with reason of BUSY (bsc#1084427).
- scsi: qla2xxx: Fix Rport and session state getting out of sync (bsc#1094555).
- scsi: qla2xxx: Fix sending ADISC command for login (bsc#1094555).
- scsi: qla2xxx: Fix session state stuck in Get Port DB (bsc#1094555).
- scsi: qla2xxx: Fix stalled relogin (bsc#1094555).
- scsi: qla2xxx: Fix TMF and Multi-Queue config (bsc#1094555).
- scsi: qla2xxx: Fix unintended Logout (bsc#1094555).
- scsi: qla2xxx: Fix unintialized List head crash (bsc#1094555).
- scsi: qla2xxx: Flush mailbox commands on chip reset (bsc#1094555).
- scsi: qla2xxx: fx00 copypaste typo (bsc#1094555).
- scsi: qla2xxx: Migrate NVME N2N handling into state machine (bsc#1094555).
- scsi: qla2xxx: Move GPSC and GFPNID out of session management (bsc#1094555).
- scsi: qla2xxx: Prevent relogin loop by removing stale code (bsc#1094555).
- scsi: qla2xxx: Prevent sysfs access when chip is down (bsc#1094555).
- scsi: qla2xxx: Reduce redundant ADISC command for RSCNs (bsc#1094555).
- scsi: qla2xxx: remove irq save in qla2x00_poll() (bsc#1094555).
- scsi: qla2xxx: Remove nvme_done_list (bsc#1084427).
- scsi: qla2xxx: Remove stale debug value for login_retry flag (bsc#1094555).
- scsi: qla2xxx: Remove unneeded message and minor cleanup for FC-NVMe (bsc#1084427).
- scsi: qla2xxx: Restore ZIO threshold setting (bsc#1084427).
- scsi: qla2xxx: Return busy if rport going away (bsc#1084427).
- scsi: qla2xxx: Save frame payload size from ICB (bsc#1094555).
- scsi: qla2xxx: Set IIDMA and fcport state before qla_nvme_register_remote() (bsc#1084427).
- scsi: qla2xxx: Silent erroneous message (bsc#1094555).
- scsi: qla2xxx: Update driver version to 10.00.00.06-k (bsc#1084427).
- scsi: qla2xxx: Update driver version to 10.00.00.07-k (bsc#1094555).
- scsi: qla2xxx: Update driver version to 10.00.00.08-k (bsc#1094555).
- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1094555).
- scsi: qla2xxx: Use predefined get_datalen_for_atio() inline function (bsc#1094555).
- scsi: scsi_transport_fc: Add dummy initiator role to rport (bug#1109038).
- scsi: storsvc: do not set a bounce limit (bug#1109038).
- scsi: storvsc: Add support for FC rport (bug#1109038).
- scsi: storvsc: Allow only one remove lun work item to be issued per lun (bsc#1109038).
- scsi: storvsc: Avoid allocating memory for temp cpumasks (bug#1109038).
- scsi: storvsc: Avoid excessive host scan on controller change (bsc#1109038).
- scsi: storvsc: missing error code in storvsc_probe() (bsc#1109038).
- scsi: storvsc: Select channel based on available percentage of ring buffer to write (bug#1109038).
- scsi: storvsc: Set up correct queue depth values for IDE devices (bug#1109038).
- scsi: storvsc: Spread interrupts when picking a channel for I/O requests (bug#1109038).
- scsi: storvsc: use default I/O timeout handler for FC devices (bug#1109038).
- scsi: storvsc: use in place iterator function (bug#1109038).
- scsi: target: fix __transport_register_session locking (bnc#1012382).
- scsi: target/iscsi: Make iscsit_ta_authentication() respect the output buffer size (bnc#1012382).
- scsi: vmbus: Add function to report available ring buffer to write in total ring size percentage (bug#1109038).
- selftests/efivarfs: add required kernel configs (bnc#1012382).
- selftests/powerpc: Kill child processes on SIGINT (bnc#1012382).
- selftest: timers: Tweak raw_skew to SKIP when ADJ_OFFSET/other clock adjustments are in progress (bnc#1012382).
- selinux: use GFP_NOWAIT in the AVC kmem_caches (bnc#1012382).
- serial: cpm_uart: return immediately from console poll (bnc#1012382).
- serial: imx: restore handshaking irq for imx1 (bnc#1012382).
- signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).
- silence build warning in hyperv_init
- silence buildwarnings in hyperv/mmu.c
- slub: make -&gt;cpu_partial unsigned int (bnc#1012382).
- smb2: fix missing files in root share directory listing (bnc#1012382).
- smb3: fill in statfs fsid and correct namelen (bsc#1112905).
- smb3: fix reset of bytes read and written stats (bnc#1012382).
- smb3: Number of requests sent should be displayed for SMB3 not just CIFS (bnc#1012382).
- sound: enable interrupt after dma buffer initialization (bnc#1012382).
- spi: rspi: Fix interrupted DMA transfers (bnc#1012382).
- spi: rspi: Fix invalid SPI use during system suspend (bnc#1012382).
- spi: sh-msiof: Fix handling of write value for SISTR register (bnc#1012382).
- spi: sh-msiof: Fix invalid SPI use during system suspend (bnc#1012382).
- spi: tegra20-slink: explicitly enable/disable clock (bnc#1012382).
- split-modules: use MAKE_ARGS
- srcu: Allow use of Tiny/Tree SRCU from both process and interrupt context (bsc#1050549).
- staging: android: ashmem: Fix mmap size validation (bnc#1012382).
- staging: android: ion: fix ION_IOC_{MAP,SHARE} use-after-free (bnc#1012382).
- staging: comedi: ni_mio_common: fix subdevice flags for PFI subdevice (bnc#1012382).
- staging: rt5208: Fix a sleep-in-atomic bug in xd_copy_page (bnc#1012382).
- staging: rts5208: fix missing error check on call to rtsx_write_register (bnc#1012382).
- staging/rts5208: Fix read overflow in memcpy (bnc#1012382).
- stmmac: fix valid numbers of unicast filter entries (bnc#1012382).
- stop_machine: Atomically queue and wake stopper threads (git-fixes).
- target: log Data-Out timeouts as errors (bsc#1095805).
- target: log NOP ping timeouts as errors (bsc#1095805).
- target: split out helper for cxn timeout error stashing (bsc#1095805).
- target: stash sess_err_stats on Data-Out timeout (bsc#1095805).
- target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).
- tcp: add tcp_ooo_try_coalesce() helper (bnc#1012382).
- tcp: call tcp_drop() from tcp_data_queue_ofo() (bnc#1012382).
- tcp: do not restart timewait timer on rst reception (bnc#1012382).
- tcp: fix a stale ooo_last_skb after a replace (bnc#1012382).
- tcp: free batches of packets in tcp_prune_ofo_queue() (bnc#1012382).
- tcp: increment sk_drops for dropped rx packets (bnc#1012382).
- tcp: use an RB tree for ooo receive queue (bnc#1012382).
- team: Forbid enslaving team device to itself (bnc#1012382).
- thermal: of-thermal: disable passive polling when thermal zone is disabled (bnc#1012382).
- tools: hv: fcopy: set 'error' in case an unknown operation was requested (bug#1109038).
- tools: hv: Fix a bug in the key delete code (bnc#1012382).
- tools: hv: fix compiler warnings about major/target_fname (bug#1109038).
- tools/hv: Fix IP reporting by KVP daemon with SRIOV (bug#1109038).
- tools: hv: fix snprintf warning in kvp_daemon (bug#1109038).
- tools: hv: ignore a NIC if it has been configured (bug#1109038).
- tools: hv: include string.h in hv_fcopy_daemon (bug#1109038).
- tools: hv: update buffer handling in hv_fcopy_daemon (bug#1109038).
- tools: hv: update lsvmbus to be compatible with python3 (bug#1109038).
- tools: hv: vss: fix loop device detection (bug#1109038).
- tools: hv: vss: Skip freezing filesystems backed by loop (bug#1109038).
- tools/vm/page-types.c: fix 'defined but not used' warning (bnc#1012382).
- tools/vm/slabinfo.c: fix sign-compare warning (bnc#1012382).
- tpm: Restore functionality to xen vtpm driver (bsc#1020645, git-fixes).
- tsl2550: fix lux1_input error in low light (bnc#1012382).
- tty: Drop tty-&gt;count on tty_reopen() failure (bnc#1105428).
- tty: rocket: Fix possible buffer overwrite on register_PCI (bnc#1012382).
- tty: vt_ioctl: fix potential Spectre v1 (bnc#1012382).
t usb: yurex: Fix buffer over-read in yurex_write() (bnc#1012382).
- ubifs: Check for name being NULL while mounting (bnc#1012382).
- ucma: fix a use-after-free in ucma_resolve_ip() (bnc#1012382).
- uio_hv_generic: add rescind support (bsc#1109038).
- uio_hv_generic: check that host supports monitor page (bsc#1109038).
- uio_hv_generic: create send and receive buffers (bsc#1109038).
- uio_hv_generic: fix configuration comments (bsc#1109038).
- uio_hv_generic: fix new type mismatch warnings (bsc#1109038).
- uio_hv_generic: fix type mismatch warnings (bsc#1109038).
- uio_hv_generic: use ISR callback method (bsc#1109038).
- uio_hv_generic: use standard mmap for resources (bsc#1109038).
- uio: potential double frees if __uio_register_device() fails (bnc#1012382).
- usb: add quirk for WORLDE Controller KS49 or Prodipe MIDI 49C USB controller (bnc#1012382).
- usb: Add quirk to support DJI CineSSD (bnc#1012382).
- usb: Avoid use-after-free by flushing endpoints early in usb_set_interface() (bnc#1012382).
- usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt() (bnc#1012382).
- usb: Do not die twice if PCI xhci host is not responding in resume (bnc#1012382).
- usb: fix error handling in usb_driver_claim_interface() (bnc#1012382).
- usb: gadget: fotg210-udc: Fix memory leak of fotg210-&gt;ep[i] (bnc#1012382).
- usb: gadget: serial: fix oops when data rx'd after close (bnc#1012382).
- usb: handle NULL config in usb_find_alt_setting() (bnc#1012382).
- usb: host: u132-hcd: Fix a sleep-in-atomic-context bug in u132_get_frame() (bnc#1012382).
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).
- usb: misc: uss720: Fix two sleep-in-atomic-context bugs (bnc#1012382).
- usb: net2280: Fix erroneous synchronization change (bnc#1012382).
- usb: remove LPM management from usb_driver_claim_interface() (bnc#1012382).
- usb: serial: io_ti: fix array underflow in completion handler (bnc#1012382).
- usb: serial: kobil_sct: fix modem-status error handling (bnc#1012382).
- usb: serial: simple: add Motorola Tetra MTP6550 id (bnc#1012382).
- usb: serial: ti_usb_3410_5052: fix array underflow in completion handler (bnc#1012382).
- usb: usbdevfs: restore warning for nonsensical flags (bnc#1012382).
- usb: usbdevfs: sanitize flags more (bnc#1012382).
- usb: wusbcore: security: cast sizeof to int for comparison (bnc#1012382).
- usb: yurex: Check for truncation in yurex_read() (bnc#1012382).
- use the new async probing feature for the hyperv drivers (bug#1109038).
- Use upstream version of pci-hyperv change 35a88a18d7
- uwb: hwa-rc: fix memory leak at probe (bnc#1012382).
- vfs: do not test owner for NFS in set_posix_acl() (bsc#1103405).
- video: goldfishfb: fix memory leak on driver remove (bnc#1012382).
- vmbus: add monitor_id and subchannel_id to sysfs per channel (bsc#1109038).
- vmbus: do not return values for uninitalized channels (bug#1109038).
- vmbus: make channel attributes static (bsc#1109038).
- vmbus: make hv_get_ringbuffer_availbytes local (bsc#1109038).
- vmci: type promotion bug in qp_host_get_user_memory() (bnc#1012382).
- vmw_balloon: include asm/io.h (bnc#1012382).
- vti6: remove !skb-&gt;ignore_df check from vti6_xmit() (bnc#1012382).
- watchdog: w83627hf: Added NCT6102D support (bsc#1106434).
- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).
- wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout() (bnc#1012382).
- wlcore: Fix memory leak in wlcore_cmd_wait_for_event_or_timeout (git-fixes).
- x86/apic: Fix restoring boot IRQ mode in reboot and kexec/kdump (bsc#1110006).
- x86/apic: Split disable_IO_APIC() into two functions to fix CONFIG_KEXEC_JUMP=y (bsc#1110006).
- x86/apic: Split out restore_boot_irq_mode() from disable_IO_APIC() (bsc#1110006).
- x86/boot: Fix 'run_size' calculation (bsc#1110006).
- x86/cpufeature: deduplicate X86_FEATURE_L1TF_PTEINV (kabi).
- x86/entry/64: Add two more instruction suffixes (bnc#1012382).
- x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculation attack surface (bsc#1105931).
- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).
- x86/entry/64: sanitize extra registers on syscall entry (bsc#1105931).
- x86/fpu: Finish excising 'eagerfpu' (bnc#1012382).
- x86/fpu: Remove second definition of fpu in __fpu__restore_sig() (bsc#1110006).
- x86/fpu: Remove struct fpu::counter (bnc#1012382).
- x86/fpu: Remove use_eager_fpu() (bnc#1012382).
- x86/headers/UAPI: Use __u64 instead of u64 in &lt;uapi/asm/hyperv.h&gt; (bug#1109038).
- x86/hyperv: Add a function to read both TSC and TSC page value simulateneously (bsc#1109038).
- x86/hyperv: Add interrupt handler annotations (bug#1109038).
- x86/hyper-v: allocate and use Virtual Processor Assist Pages (bug#1109038).
- x86/hyper-V: Allocate the IDT entry early in boot (bug#1109038).
- x86/hyper-v: Check cpumask_to_vpset() return value in hyperv_flush_tlb_others_ex() (bug#1109038).
- x86/hyperv: Check for required priviliges in hyperv_init() (bsc#1109038).
- x86/hyper-v: Check for VP_INVAL in hyperv_flush_tlb_others() (bug#1109038).
- x86/hyperv: Clear vCPU banks between calls to avoid flushing unneeded vCPUs (bsc#1109038).
- x86/Hyper-V: Consolidate the allocation of the hypercall input page (bug#1109038).
- x86/hyper-v: define struct hv_enlightened_vmcs and clean field bits (bug#1109038).
- x86/hyper-v: detect nested features (bug#1109038).
- x86/hyperv: Do not use percpu areas for pcpu_flush/pcpu_flush_ex structures (bsc#1109038).
- x86/Hyper-V: Enable IPI enlightenments (bug#1109038).
- x86/Hyper-V: Enhanced IPI enlightenment (bug#1109038).
- x86/Hyper-V: Enlighten APIC access (bug#1109038).
- x86/hyperv: Fix hypercalls with extended CPU ranges for TLB flushing (bsc#1109038).
- x86/hyper-v: Fix the circular dependency in IPI enlightenment (bug#1109038).
- x86/hyper-v: Fix wrong merge conflict resolution (bug#1109038).
- x86/Hyper-V/hv_apic: Build the Hyper-V APIC conditionally (bug#1109038).
- x86/Hyper-V/hv_apic: Include asm/apic.h (bug#1109038).
- x86/hyper-v: Implement hv_do_fast_hypercall16 (bug#1109038).
- x86/hyper-v: Implement rep hypercalls (bug#1109038).
- x86/hyper-v: move definitions from TLFS to hyperv-tlfs.h (bug#1109038).
- x86/hyper-v: move hyperv.h out of uapi (bug#1109038).
- x86/hyper-v: move struct hv_flush_pcpu{,ex} definitions to common header (bug#1109038).
- x86/hyperv: Read TSC frequency from a synthetic MSR (bug#1109038).
- x86/hyperv: Redirect reenlightment notifications on CPU offlining (bug#1109038).
- x86/hyperv: Reenlightenment notifications support (bug#1109038).
- x86/hyper-v: Remove duplicated HV_X64_EX_PROCESSOR_MASKS_RECOMMENDED definition (bug#1109038).
- x86/hyper-v: rename ipi_arg_{ex,non_ex} structures (bug#1109038).
- x86/hyper-v: stash the max number of virtual/logical processor (bug#1109038).
- x86/hyperv: Stop suppressing X86_FEATURE_PCID (bsc#1109038).
- x86/hyper-v: Support extended CPU ranges for TLB flush hypercalls (bug#1109038).
- x86/hyper-v: Use cheaper HVCALL_FLUSH_VIRTUAL_ADDRESS_{LIST,SPACE} hypercalls when possible (bug#1109038).
- x86/hyper-v: Use cheaper HVCALL_SEND_IPI hypercall when possible (bug#1109038).
- x86/hyper-v: Use 'fast' hypercall for HVCALL_SEND_IPI (bug#1109038).
- x86/hyper-v: Use hypercall for remote TLB flush (bug#1109038).
- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).
- x86/kaiser: Avoid loosing NMIs when using trampoline stack (bsc#1106293 bsc#1099597).
- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114648).
- x86/kvm: rename HV_X64_MSR_APIC_ASSIST_PAGE to HV_X64_MSR_VP_ASSIST_PAGE (bug#1109038).
- x86/mm: Remove in_nmi() warning from vmalloc_fault() (bnc#1012382).
- x86: msr-index.h: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1110006).
- x86/numa_emulation: Fix emulated-to-physical node mapping (bnc#1012382).
- x86/pae: use 64 bit atomic xchg function in native_ptep_get_and_clear (bnc#1012382).
- x86/paravirt: Fix some warning messages (bnc#1065600).
- x86/percpu: Fix this_cpu_read() (bsc#1110006).
- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158, bsc#1101555).
- x86/spec_ctrl: Fix spec_ctrl reporting (bsc#1106913, bsc#1111516).
- x86/speculation: Apply IBPB more strictly to avoid cross-process data leak (bsc#1106913).
- x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1106913).
- x86/speculation/l1tf: Fix up pte-&gt;pfn conversion for PAE (bnc#1012382).
- x86/speculation: Propagate information about RSB filling mitigation to sysfs (bsc#1106913).
- x86/time: Correct the attribute on jiffies' definition (bsc#1110006).
- x86/tsc: Add missing header to tsc_msr.c (bnc#1012382).
- x86/vdso: Fix asm constraints on vDSO syscall fallbacks (bsc#1110006).
- x86/vdso: Fix vDSO build if a retpoline is emitted (bsc#1110006).
- x86/vdso: Fix vDSO syscall fallback asm constraint regression (bsc#1110006).
- x86/vdso: Only enable vDSO retpolines when enabled and supported (bsc#1110006).
- xen: avoid crash in disable_hotplug_cpu (bnc#1012382 bsc#1106594 bsc#1042422).
- xen/blkfront: correct purging of persistent grants (bnc#1065600).
- xen: fix GCC warning and remove duplicate EVTCHN_ROW/EVTCHN_COL usage (bnc#1012382).
- xen: issue warning message when out of grant maptrack entries (bsc#1105795).
- xen/manage: do not complain about an empty value in control/sysrq node (bnc#1012382).
- xen/netfront: do not bug in case of too many frags (bnc#1012382).
- xen-netfront: fix queue name setting (bnc#1012382).
- xen/netfront: fix waiting for xenbus state change (bnc#1012382).
- xen-netfront: fix warn message as irq device name has '/' (bnc#1012382).
- xen/x86/vpmu: Zero struct pt_regs before calling into sample handling code (bnc#1012382).
- xfrm: fix 'passing zero to ERR_PTR()' warning (bnc#1012382).
- xfs: add a new xfs_iext_lookup_extent_before helper (bsc#1095344).
- xfs: add asserts for the mmap lock in xfs_{insert,collapse}_file_space (bsc#1095344).
- xfs: add a xfs_bmap_fork_to_state helper (bsc#1095344).
- xfs: add a xfs_iext_update_extent helper (bsc#1095344).
- xfs: add comments documenting the rebalance algorithm (bsc#1095344).
- xfs: add some comments to xfs_iext_insert/xfs_iext_insert_node (bsc#1095344).
- xfs: add xfs_trim_extent (bsc#1095344).
- xfs: allow unaligned extent records in xfs_bmbt_disk_set_all (bsc#1095344).
- xfs: borrow indirect blocks from freed extent when available (bsc#1095344).
- xfs: cleanup xfs_bmap_last_before (bsc#1095344).
- xfs: do not create overlapping extents in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: do not rely on extent indices in xfs_bmap_collapse_extents (bsc#1095344).
- xfs: do not rely on extent indices in xfs_bmap_insert_extents (bsc#1095344).
- xfs: do not set XFS_BTCUR_BPRV_WASDEL in xfs_bunmapi (bsc#1095344).
- xfs: during btree split, save new block key &amp; ptr for future insertion (bsc#1095344).
- xfs: factor out a helper to initialize a local format inode fork (bsc#1095344).
- xfs: fix memory leak in xfs_iext_free_last_leaf (bsc#1095344).
- xfs: fix number of records handling in xfs_iext_split_leaf (bsc#1095344).
- xfs: fix transaction allocation deadlock in IO path (bsc#1090535).
- xfs: handle indlen shortage on delalloc extent merge (bsc#1095344).
- xfs: handle zero entries case in xfs_iext_rebalance_leaf (bsc#1095344).
- xfs: improve kmem_realloc (bsc#1095344).
- xfs: inline xfs_shift_file_space into callers (bsc#1095344).
- xfs: introduce the xfs_iext_cursor abstraction (bsc#1095344).
- xfs: iterate over extents in xfs_bmap_extents_to_btree (bsc#1095344).
- xfs: iterate over extents in xfs_iextents_copy (bsc#1095344).
- xfs: make better use of the 'state' variable in xfs_bmap_del_extent_real (bsc#1095344).
- xfs: merge xfs_bmap_read_extents into xfs_iread_extents (bsc#1095344).
- xfs: move pre/post-bmap tracing into xfs_iext_update_extent (bsc#1095344).
- xfs: move some code around inside xfs_bmap_shift_extents (bsc#1095344).
- xfs: move some more code into xfs_bmap_del_extent_real (bsc#1095344).
- xfs: move xfs_bmbt_irec and xfs_exntst_t to xfs_types.h (bsc#1095344).
- xfs: move xfs_iext_insert tracepoint to report useful information (bsc#1095344).
- xfs: new inode extent list lookup helpers (bsc#1095344).
- xfs: only run torn log write detection on dirty logs (bsc#1095753).
- xfs: pass an on-disk extent to xfs_bmbt_validate_extent (bsc#1095344).
- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_lookup_eq (bsc#1095344).
- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_update (bsc#1095344).
- xfs: pass struct xfs_bmbt_irec to xfs_bmbt_validate_extent (bsc#1095344).
- xfs: provide helper for counting extents from if_bytes (bsc#1095344).
- xfs: refactor delalloc accounting in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: refactor delalloc indlen reservation split into helper (bsc#1095344).
- xfs: refactor dir2 leaf readahead shadow buffer cleverness (bsc#1095344).
- xfs: refactor in-core log state update to helper (bsc#1095753).
- xfs: refactor unmount record detection into helper (bsc#1095753).
- xfs: refactor xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_hole_delay (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_hole_real (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_unwritten_real (bsc#1095344).
- xfs: refactor xfs_bunmapi_cow (bsc#1095344).
- xfs: refactor xfs_del_extent_real (bsc#1095344).
- xfs: remove a duplicate assignment in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: remove all xfs_bmbt_set_* helpers except for xfs_bmbt_set_all (bsc#1095344).
- xfs: remove a superflous assignment in xfs_iext_remove_node (bsc#1095344).
- xfs: remove if_rdev (bsc#1095344).
- xfs: remove prev argument to xfs_bmapi_reserve_delalloc (bsc#1095344).
- xfs: remove support for inlining data/extents into the inode fork (bsc#1095344).
- xfs: remove the never fully implemented UUID fork format (bsc#1095344).
- xfs: remove the nr_extents argument to xfs_iext_insert (bsc#1095344).
- xfs: remove the nr_extents argument to xfs_iext_remove (bsc#1095344).
- xfs: remove XFS_BMAP_MAX_SHIFT_EXTENTS (bsc#1095344).
- xfs: remove XFS_BMAP_TRACE_EXLIST (bsc#1095344).
- xfs: remove xfs_bmbt_get_state (bsc#1095344).
- xfs: remove xfs_bmse_shift_one (bsc#1095344).
- xfs: rename bno to end in __xfs_bunmapi (bsc#1095344).
- xfs: replace xfs_bmbt_lookup_ge with xfs_bmbt_lookup_first (bsc#1095344).
- xfs: replace xfs_qm_get_rtblks with a direct call to xfs_bmap_count_leaves (bsc#1095344).
- xfs: rewrite getbmap using the xfs_iext_* helpers (bsc#1095344).
- xfs: rewrite xfs_bmap_count_leaves using xfs_iext_get_extent (bsc#1095344).
- xfs: rewrite xfs_bmap_first_unused to make better use of xfs_iext_get_extent (bsc#1095344).
- xfs: separate log head record discovery from verification (bsc#1095753).
- xfs: simplify the xfs_getbmap interface (bsc#1095344).
- xfs: simplify validation of the unwritten extent bit (bsc#1095344).
- xfs: split indlen reservations fairly when under reserved (bsc#1095344).
- xfs: split xfs_bmap_shift_extents (bsc#1095344).
- xfs: switch xfs_bmap_local_to_extents to use xfs_iext_insert (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_delay (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_unwritten_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_collapse_extents (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_del_extent_* (bsc#1095344).
- xfs: update freeblocks counter after extent deletion (bsc#1095344).
- xfs: update got in xfs_bmap_shift_update_extent (bsc#1095344).
- xfs: use a b+tree for the in-core extent list (bsc#1095344).
- xfs: use correct state defines in xfs_bmap_del_extent_{cow,delay} (bsc#1095344).
- xfs: use new extent lookup helpers in xfs_bmapi_read (bsc#1095344).
- xfs: use new extent lookup helpers in xfs_bmapi_write (bsc#1095344).
- xfs: use new extent lookup helpers in __xfs_bunmapi (bsc#1095344).
- xfs: use the state defines in xfs_bmap_del_extent_real (bsc#1095344).
- xfs: use xfs_bmap_del_extent_delay for the data fork as well (bsc#1095344).
- xfs: use xfs_iext_*_extent helpers in xfs_bmap_shift_extents (bsc#1095344).
- xfs: use xfs_iext_*_extent helpers in xfs_bmap_split_extent_at (bsc#1095344).
- xfs: use xfs_iext_get_extent instead of open coding it (bsc#1095344).
- xfs: use xfs_iext_get_extent in xfs_bmap_first_unused (bsc#1095344).
- xhci: Add missing CAS workaround for Intel Sunrise Point xHCI (bnc#1012382).
- xhci: Do not print a warning when setting link state for disabled ports (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-15"/>
	<updated date="2019-01-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1011920">SUSE bug 1011920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020645">SUSE bug 1020645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031392">SUSE bug 1031392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035053">SUSE bug 1035053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042422">SUSE bug 1042422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043591">SUSE bug 1043591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044189">SUSE bug 1044189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048129">SUSE bug 1048129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050549">SUSE bug 1050549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053043">SUSE bug 1053043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054239">SUSE bug 1054239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057199">SUSE bug 1057199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062303">SUSE bug 1062303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063026">SUSE bug 1063026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065726">SUSE bug 1065726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067906">SUSE bug 1067906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073579">SUSE bug 1073579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076393">SUSE bug 1076393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078788">SUSE bug 1078788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079524">SUSE bug 1079524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082519">SUSE bug 1082519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082863">SUSE bug 1082863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082979">SUSE bug 1082979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083215">SUSE bug 1083215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083527">SUSE bug 1083527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084427">SUSE bug 1084427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084760">SUSE bug 1084760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087209">SUSE bug 1087209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088087">SUSE bug 1088087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090535">SUSE bug 1090535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091158">SUSE bug 1091158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093118">SUSE bug 1093118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094555">SUSE bug 1094555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094562">SUSE bug 1094562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094825">SUSE bug 1094825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095344">SUSE bug 1095344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095753">SUSE bug 1095753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095805">SUSE bug 1095805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096052">SUSE bug 1096052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096547">SUSE bug 1096547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098050">SUSE bug 1098050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098996">SUSE bug 1098996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099597">SUSE bug 1099597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099810">SUSE bug 1099810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101555">SUSE bug 1101555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102495">SUSE bug 1102495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102715">SUSE bug 1102715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102870">SUSE bug 1102870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102875">SUSE bug 1102875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102877">SUSE bug 1102877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102879">SUSE bug 1102879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102882">SUSE bug 1102882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102896">SUSE bug 1102896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103156">SUSE bug 1103156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103269">SUSE bug 1103269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103308">SUSE bug 1103308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103405">SUSE bug 1103405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104124">SUSE bug 1104124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105025">SUSE bug 1105025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105428">SUSE bug 1105428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105795">SUSE bug 1105795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105931">SUSE bug 1105931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106095">SUSE bug 1106095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106105">SUSE bug 1106105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106110">SUSE bug 1106110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106240">SUSE bug 1106240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106293">SUSE bug 1106293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106359">SUSE bug 1106359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106434">SUSE bug 1106434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106512">SUSE bug 1106512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106594">SUSE bug 1106594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106913">SUSE bug 1106913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106929">SUSE bug 1106929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106934">SUSE bug 1106934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107060">SUSE bug 1107060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107299">SUSE bug 1107299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107318">SUSE bug 1107318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107535">SUSE bug 1107535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107829">SUSE bug 1107829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107870">SUSE bug 1107870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107924">SUSE bug 1107924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108096">SUSE bug 1108096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108170">SUSE bug 1108170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108240">SUSE bug 1108240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108281">SUSE bug 1108281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108315">SUSE bug 1108315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108377">SUSE bug 1108377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108399">SUSE bug 1108399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108498">SUSE bug 1108498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108803">SUSE bug 1108803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108823">SUSE bug 1108823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109038">SUSE bug 1109038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109158">SUSE bug 1109158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109333">SUSE bug 1109333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109336">SUSE bug 1109336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109337">SUSE bug 1109337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109441">SUSE bug 1109441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109772">SUSE bug 1109772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109784">SUSE bug 1109784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109806">SUSE bug 1109806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109818">SUSE bug 1109818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109907">SUSE bug 1109907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109919">SUSE bug 1109919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109923">SUSE bug 1109923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110006">SUSE bug 1110006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110297">SUSE bug 1110297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110337">SUSE bug 1110337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110363">SUSE bug 1110363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110468">SUSE bug 1110468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110600">SUSE bug 1110600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110601">SUSE bug 1110601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110602">SUSE bug 1110602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110603">SUSE bug 1110603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110604">SUSE bug 1110604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110605">SUSE bug 1110605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110606">SUSE bug 1110606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110611">SUSE bug 1110611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110612">SUSE bug 1110612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110613">SUSE bug 1110613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110614">SUSE bug 1110614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110615">SUSE bug 1110615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110616">SUSE bug 1110616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110618">SUSE bug 1110618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110619">SUSE bug 1110619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110930">SUSE bug 1110930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111363">SUSE bug 1111363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111516">SUSE bug 1111516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111870">SUSE bug 1111870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112007">SUSE bug 1112007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112262">SUSE bug 1112262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112263">SUSE bug 1112263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112894">SUSE bug 1112894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112902">SUSE bug 1112902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112903">SUSE bug 1112903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112905">SUSE bug 1112905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113667">SUSE bug 1113667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113766">SUSE bug 1113766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114178">SUSE bug 1114178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114229">SUSE bug 1114229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114648">SUSE bug 1114648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115593">SUSE bug 1115593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981083">SUSE bug 981083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997172">SUSE bug 997172</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14613/">CVE-2018-14613 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14613">CVE-2018-14613 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14617/">CVE-2018-14617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14617">CVE-2018-14617 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14633">CVE-2018-14633 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16276/">CVE-2018-16276 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16276">CVE-2018-16276 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16597/">CVE-2018-16597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16597">CVE-2018-16597 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17182">CVE-2018-17182 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18281">CVE-2018-18281 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18386">CVE-2018-18386 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18690/">CVE-2018-18690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18690">CVE-2018-18690 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18710">CVE-2018-18710 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7480/">CVE-2018-7480 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7480">CVE-2018-7480 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7757/">CVE-2018-7757 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7757">CVE-2018-7757 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9516/">CVE-2018-9516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9516">CVE-2018-9516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554644" comment="kernel-azure-4.4.162-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554645" comment="kernel-azure-base-4.4.162-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554646" comment="kernel-azure-devel-4.4.162-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554647" comment="kernel-devel-azure-4.4.162-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554648" comment="kernel-source-azure-4.4.162-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554649" comment="kernel-syms-azure-4.4.162-4.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149969" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1131493" ref_url="https://bugzilla.suse.com/1131493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5953" ref_url="https://www.suse.com/security/cve/CVE-2019-5953/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005343.html" source="SUSE-SU"/>
		<description>
This update for wget fixes the following issues:

Security issue fixed:

- CVE-2019-5953: Fixed a buffer overflow vulnerability which might cause code execution (bsc#1131493).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131493">SUSE bug 1131493</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5953/">CVE-2019-5953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5953">CVE-2019-5953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554650" comment="wget-1.14-21.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149970" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1118900" ref_url="https://bugzilla.suse.com/1118900" source="BUGZILLA"/>
		<reference ref_id="1125721" ref_url="https://bugzilla.suse.com/1125721" source="BUGZILLA"/>
		<reference ref_id="1126455" ref_url="https://bugzilla.suse.com/1126455" source="BUGZILLA"/>
		<reference ref_id="1129622" ref_url="https://bugzilla.suse.com/1129622" source="BUGZILLA"/>
		<reference ref_id="1130675" ref_url="https://bugzilla.suse.com/1130675" source="BUGZILLA"/>
		<reference ref_id="1131955" ref_url="https://bugzilla.suse.com/1131955" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-3812" ref_url="https://www.suse.com/security/cve/CVE-2019-3812/" source="CVE"/>
		<reference ref_id="CVE-2019-8934" ref_url="https://www.suse.com/security/cve/CVE-2019-8934/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2019-9824: Fixed information leak in slirp (bsc#1129622).
- CVE-2019-8934: Added method to specify whether or not to expose certain ppc64 hostinformation (bsc#1126455).
- CVE-2019-3812: Fixed Out-of-bounds memory access and information leak in virtual monitor interface (bsc#1125721).
- CVE-2018-20815: Fixed a denial of service possibility in device tree processing (bsc#1130675).

Non-security issue fixed:

- Backported Skylake-Server vcpu model support from qemu v2.11 (FATE#327261 bsc#1131955).
- Added ability to set virtqueue size using virtqueue_size parameter (FATE#327255 bsc#1118900).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118900">SUSE bug 1118900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125721">SUSE bug 1125721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126455">SUSE bug 1126455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129622">SUSE bug 1129622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130675">SUSE bug 1130675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131955">SUSE bug 1131955</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20815">CVE-2018-20815 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3812/">CVE-2019-3812 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3812">CVE-2019-3812 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8934/">CVE-2019-8934 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8934">CVE-2019-8934 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9824">CVE-2019-9824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554651" comment="qemu-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554652" comment="qemu-arm-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554653" comment="qemu-block-curl-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554654" comment="qemu-block-iscsi-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554655" comment="qemu-block-rbd-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554656" comment="qemu-block-ssh-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554657" comment="qemu-guest-agent-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521767" comment="qemu-ipxe-1.0.0+-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554658" comment="qemu-kvm-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554659" comment="qemu-lang-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554660" comment="qemu-ppc-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554661" comment="qemu-s390-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521769" comment="qemu-seabios-1.10.2-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521770" comment="qemu-sgabios-8-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554662" comment="qemu-tools-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521772" comment="qemu-vgabios-1.10.2-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521773" comment="qemu-x86-2.9.1-6.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149971" version="1" class="patch">
	<metadata>
		<title>Security update for soundtouch (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1108631" ref_url="https://bugzilla.suse.com/1108631" source="BUGZILLA"/>
		<reference ref_id="1108632" ref_url="https://bugzilla.suse.com/1108632" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17097" ref_url="https://www.suse.com/security/cve/CVE-2018-17097/" source="CVE"/>
		<reference ref_id="CVE-2018-17098" ref_url="https://www.suse.com/security/cve/CVE-2018-17098/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005036.html" source="SUSE-SU"/>
		<description>
This update for soundtouch fixes the following issues:

Security issues fixed:

- CVE-2018-17098: Fixed a heap corruption from size inconsistency, which
  allowed remote attackers to cause a denial of service or possibly have
  other unspecified impact (bsc#1108632)
- CVE-2018-17097: Fixed a double free, which allowed remote attackers to cause
  a denial of service or possibly have other unspecified impact  (bsc#1108631)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-15"/>
	<updated date="2019-01-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108631">SUSE bug 1108631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108632">SUSE bug 1108632</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17097/">CVE-2018-17097 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17097">CVE-2018-17097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17098/">CVE-2018-17098 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17098">CVE-2018-17098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554663" comment="libSoundTouch0-1.7.1-5.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149972" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005344.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Security issue fixed:

- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636">CVE-2019-9636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009528730" comment="libpython3_4m1_0-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009528731" comment="python3-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009528732" comment="python3-base-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554664" comment="python3-curses-3.4.6-25.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149973" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3</platform>
		</affected>
		<reference ref_id="1112758" ref_url="https://bugzilla.suse.com/1112758" source="BUGZILLA"/>
		<reference ref_id="1131886" ref_url="https://bugzilla.suse.com/1131886" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16839" ref_url="https://www.suse.com/security/cve/CVE-2018-16839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005352.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2018-16839: Fixed a buffer overflow in the SASL authentication code (bsc#1112758).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-23"/>
	<updated date="2019-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131886">SUSE bug 1131886</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16839/">CVE-2018-16839 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16839">CVE-2018-16839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554665" comment="curl-7.37.0-37.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554666" comment="libcurl4-7.37.0-37.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546718" comment="libcurl4-32bit-7.37.0-37.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149974" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1144524" ref_url="https://bugzilla.suse.com/1144524" source="BUGZILLA"/>
		<reference ref_id="1146848" ref_url="https://bugzilla.suse.com/1146848" source="BUGZILLA"/>
		<reference ref_id="1166847" ref_url="https://bugzilla.suse.com/1166847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13456" ref_url="https://www.suse.com/security/cve/CVE-2019-13456/" source="CVE"/>
		<reference ref_id="CVE-2019-17185" ref_url="https://www.suse.com/security/cve/CVE-2019-17185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006713.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

- CVE-2019-13456: Fixed a side-channel password leak in EAP-pwd
  (bsc#1144524).
- CVE-2019-17185: Fixed a debial of service due to multithreaded
  BN_CTX access (bsc#1166847).
- Fixed an issue in TLS-EAP where the OCSP verification, when an 
  intermediate client certificate was not explicitly trusted 
  (bsc#1146848).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-17"/>
	<updated date="2020-04-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144524">SUSE bug 1144524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146848">SUSE bug 1146848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166847">SUSE bug 1166847</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13456/">CVE-2019-13456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13456">CVE-2019-13456 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17185/">CVE-2019-17185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17185">CVE-2019-17185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554667" comment="freeradius-server-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554668" comment="freeradius-server-doc-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554669" comment="freeradius-server-krb5-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554670" comment="freeradius-server-ldap-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554671" comment="freeradius-server-libs-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554672" comment="freeradius-server-mysql-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554673" comment="freeradius-server-perl-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554674" comment="freeradius-server-postgresql-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554675" comment="freeradius-server-python-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554676" comment="freeradius-server-sqlite-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554677" comment="freeradius-server-utils-3.0.15-2.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149975" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1168422" ref_url="https://bugzilla.suse.com/1168422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006730.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-3898: Fixed a heap buffer overflow in ppdFindOption() (bsc#1168422).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-23"/>
	<updated date="2020-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3898">CVE-2020-3898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554678" comment="cups-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554679" comment="cups-client-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554680" comment="cups-libs-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548956" comment="cups-libs-32bit-1.7.5-20.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149976" version="1" class="patch">
	<metadata>
		<title>Security update for pam_radius (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1141670" ref_url="https://bugzilla.suse.com/1141670" source="BUGZILLA"/>
		<reference ref_id="1163933" ref_url="https://bugzilla.suse.com/1163933" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9542" ref_url="https://www.suse.com/security/cve/CVE-2015-9542/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006742.html" source="SUSE-SU"/>
		<description>
This update for pam_radius fixes the following issues:

- CVE-2015-9542: Fixed a buffer overflow in password field (bsc#1163933).
- On s390x didn't decrypt passwords correctly (bsc#1141670).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-27"/>
	<updated date="2020-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141670">SUSE bug 1141670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163933">SUSE bug 1163933</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9542/">CVE-2015-9542 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9542">CVE-2015-9542 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554681" comment="pam_radius-1.3.16-239.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548963" comment="pam_radius-32bit-1.3.16-239.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149977" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1155321" ref_url="https://bugzilla.suse.com/1155321" source="BUGZILLA"/>
		<reference ref_id="1156318" ref_url="https://bugzilla.suse.com/1156318" source="BUGZILLA"/>
		<reference ref_id="1159329" ref_url="https://bugzilla.suse.com/1159329" source="BUGZILLA"/>
		<reference ref_id="1161719" ref_url="https://bugzilla.suse.com/1161719" source="BUGZILLA"/>
		<reference ref_id="1163809" ref_url="https://bugzilla.suse.com/1163809" source="BUGZILLA"/>
		<reference ref_id="1165528" ref_url="https://bugzilla.suse.com/1165528" source="BUGZILLA"/>
		<reference ref_id="1169658" ref_url="https://bugzilla.suse.com/1169658" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8625" ref_url="https://www.suse.com/security/cve/CVE-2019-8625/" source="CVE"/>
		<reference ref_id="CVE-2019-8710" ref_url="https://www.suse.com/security/cve/CVE-2019-8710/" source="CVE"/>
		<reference ref_id="CVE-2019-8720" ref_url="https://www.suse.com/security/cve/CVE-2019-8720/" source="CVE"/>
		<reference ref_id="CVE-2019-8743" ref_url="https://www.suse.com/security/cve/CVE-2019-8743/" source="CVE"/>
		<reference ref_id="CVE-2019-8764" ref_url="https://www.suse.com/security/cve/CVE-2019-8764/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8769" ref_url="https://www.suse.com/security/cve/CVE-2019-8769/" source="CVE"/>
		<reference ref_id="CVE-2019-8771" ref_url="https://www.suse.com/security/cve/CVE-2019-8771/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8783" ref_url="https://www.suse.com/security/cve/CVE-2019-8783/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8811" ref_url="https://www.suse.com/security/cve/CVE-2019-8811/" source="CVE"/>
		<reference ref_id="CVE-2019-8812" ref_url="https://www.suse.com/security/cve/CVE-2019-8812/" source="CVE"/>
		<reference ref_id="CVE-2019-8813" ref_url="https://www.suse.com/security/cve/CVE-2019-8813/" source="CVE"/>
		<reference ref_id="CVE-2019-8814" ref_url="https://www.suse.com/security/cve/CVE-2019-8814/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8816" ref_url="https://www.suse.com/security/cve/CVE-2019-8816/" source="CVE"/>
		<reference ref_id="CVE-2019-8819" ref_url="https://www.suse.com/security/cve/CVE-2019-8819/" source="CVE"/>
		<reference ref_id="CVE-2019-8820" ref_url="https://www.suse.com/security/cve/CVE-2019-8820/" source="CVE"/>
		<reference ref_id="CVE-2019-8823" ref_url="https://www.suse.com/security/cve/CVE-2019-8823/" source="CVE"/>
		<reference ref_id="CVE-2019-8835" ref_url="https://www.suse.com/security/cve/CVE-2019-8835/" source="CVE"/>
		<reference ref_id="CVE-2019-8844" ref_url="https://www.suse.com/security/cve/CVE-2019-8844/" source="CVE"/>
		<reference ref_id="CVE-2019-8846" ref_url="https://www.suse.com/security/cve/CVE-2019-8846/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-11793" ref_url="https://www.suse.com/security/cve/CVE-2020-11793/" source="CVE"/>
		<reference ref_id="CVE-2020-3862" ref_url="https://www.suse.com/security/cve/CVE-2020-3862/" source="CVE"/>
		<reference ref_id="CVE-2020-3864" ref_url="https://www.suse.com/security/cve/CVE-2020-3864/" source="CVE"/>
		<reference ref_id="CVE-2020-3865" ref_url="https://www.suse.com/security/cve/CVE-2020-3865/" source="CVE"/>
		<reference ref_id="CVE-2020-3867" ref_url="https://www.suse.com/security/cve/CVE-2020-3867/" source="CVE"/>
		<reference ref_id="CVE-2020-3868" ref_url="https://www.suse.com/security/cve/CVE-2020-3868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.28.1 fixes the following issues:

Security issues fixed:

- CVE-2020-10018: Fixed a denial of service because the m_deferredFocusedNodeChange data structure was mishandled (bsc#1165528).
- CVE-2020-11793: Fixed a potential arbitrary code execution caused by a use-after-free vulnerability (bsc#1169658).
- CVE-2019-8835: Fixed multiple memory corruption issues (bsc#1161719).
- CVE-2019-8844: Fixed multiple memory corruption issues (bsc#1161719).
- CVE-2019-8846: Fixed a use-after-free issue (bsc#1161719).
- CVE-2020-3862: Fixed a memory handling issue (bsc#1163809).
- CVE-2020-3867: Fixed an XSS issue (bsc#1163809).
- CVE-2020-3868: Fixed multiple memory corruption issues that could have lead to arbitrary code execution (bsc#1163809).
- CVE-2020-3864,CVE-2020-3865: Fixed logic issues in the DOM object context handling (bsc#1163809).

Non-security issues fixed:

- Add API to enable Process Swap on (Cross-site) Navigation.
- Add user messages API for the communication with the web extension.
- Add support for same-site cookies.
- Service workers are enabled by default.
- Add support for Pointer Lock API.
- Add flatpak sandbox support.
- Make ondemand hardware acceleration policy never leave accelerated compositing mode.
- Always use a light theme for rendering form controls.
- Add about:gpu to show information about the graphics stack.
- Fixed issues while trying to play a video on NextCloud.
- Fixed vertical alignment of text containing arabic diacritics.
- Fixed build with icu 65.1.
- Fixed page loading errors with websites using HSTS.
- Fixed web process crash when displaying a KaTeX formula.
- Fixed several crashes and rendering issues.
- Switched to a single web process for Evolution and geary (bsc#1159329).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-29"/>
	<updated date="2020-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159329">SUSE bug 1159329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161719">SUSE bug 1161719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165528">SUSE bug 1165528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169658">SUSE bug 1169658</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8625/">CVE-2019-8625 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8625">CVE-2019-8625 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8710/">CVE-2019-8710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8710">CVE-2019-8710 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8720/">CVE-2019-8720 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8720">CVE-2019-8720 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8743/">CVE-2019-8743 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8743">CVE-2019-8743 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8764/">CVE-2019-8764 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8764">CVE-2019-8764 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8766">CVE-2019-8766 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8769/">CVE-2019-8769 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8769">CVE-2019-8769 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8771/">CVE-2019-8771 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8771">CVE-2019-8771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8782">CVE-2019-8782 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8783/">CVE-2019-8783 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8783">CVE-2019-8783 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8808">CVE-2019-8808 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8811/">CVE-2019-8811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8811">CVE-2019-8811 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8812/">CVE-2019-8812 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8812">CVE-2019-8812 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8813/">CVE-2019-8813 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8813">CVE-2019-8813 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8814/">CVE-2019-8814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8814">CVE-2019-8814 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8815">CVE-2019-8815 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8816/">CVE-2019-8816 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8816">CVE-2019-8816 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8819/">CVE-2019-8819 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8819">CVE-2019-8819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8820/">CVE-2019-8820 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8820">CVE-2019-8820 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8823/">CVE-2019-8823 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8823">CVE-2019-8823 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8835/">CVE-2019-8835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8835">CVE-2019-8835 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8844/">CVE-2019-8844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8844">CVE-2019-8844 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8846/">CVE-2019-8846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8846">CVE-2019-8846 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10018">CVE-2020-10018 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11793/">CVE-2020-11793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11793">CVE-2020-11793 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-3862/">CVE-2020-3862 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3862">CVE-2020-3862 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-3864/">CVE-2020-3864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3864">CVE-2020-3864 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3865/">CVE-2020-3865 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3865">CVE-2020-3865 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3867/">CVE-2020-3867 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3867">CVE-2020-3867 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3868/">CVE-2020-3868 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3868">CVE-2020-3868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554682" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554683" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554684" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554685" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554686" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149978" version="1" class="patch">
	<metadata>
		<title>Security update for shibboleth-sp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1157471" ref_url="https://bugzilla.suse.com/1157471" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19191" ref_url="https://www.suse.com/security/cve/CVE-2019-19191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006355.html" source="SUSE-SU"/>
		<description>
This update for shibboleth-sp fixes the following issues:

Security issue fixed:

- CVE-2019-19191: Fixed escalation to root by fixing ownership of log files (bsc#1157471).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-16"/>
	<updated date="2020-01-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1157471">SUSE bug 1157471</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19191/">CVE-2019-19191 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19191">CVE-2019-19191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554687" comment="libshibsp-lite6-2.5.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554688" comment="libshibsp6-2.5.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554689" comment="shibboleth-sp-2.5.5-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149979" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1170170" ref_url="https://bugzilla.suse.com/1170170" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12059" ref_url="https://www.suse.com/security/cve/CVE-2020-12059/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006768.html" source="SUSE-SU"/>
		<description>
This update for ceph fixes the following issues:

- CVE-2020-12059: Fixed a denial of service caused by a specially crafted XML payload on POST requests (bsc#1170170).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-30"/>
	<updated date="2020-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170170">SUSE bug 1170170</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12059/">CVE-2020-12059 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12059">CVE-2020-12059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554690" comment="ceph-common-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554691" comment="libcephfs2-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554692" comment="librados2-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554693" comment="libradosstriper1-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554694" comment="librbd1-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554695" comment="librgw2-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554696" comment="python-cephfs-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554697" comment="python-rados-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554698" comment="python-rbd-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554699" comment="python-rgw-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149980" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1155419" ref_url="https://bugzilla.suse.com/1155419" source="BUGZILLA"/>
		<reference ref_id="1160471" ref_url="https://bugzilla.suse.com/1160471" source="BUGZILLA"/>
		<reference ref_id="1170441" ref_url="https://bugzilla.suse.com/1170441" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<reference ref_id="CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006773.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2019-15690: Fixed a heap buffer overflow (bsc#1160471).
- CVE-2019-15681: Fixed a memory leak which could have allowed to a remote attacker to read stack memory (bsc#1155419).
- CVE-2019-20788: Fixed a integer overflow and heap-based buffer overflow via a large height or width value (bsc#1170441).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-04"/>
	<updated date="2020-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160471">SUSE bug 1160471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170441">SUSE bug 1170441</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15681">CVE-2019-15681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15690">CVE-2019-15690 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20788">CVE-2019-20788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554700" comment="libvncclient0-0.9.9-17.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554701" comment="libvncserver0-0.9.9-17.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149981" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1166844" ref_url="https://bugzilla.suse.com/1166844" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006779.html" source="SUSE-SU"/>
		<description>
This update for icu fixes the following issues:

- CVE-2020-10531: Fixed integer overflow in UnicodeString:doAppend() (bsc#1166844).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1166844">SUSE bug 1166844</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10531">CVE-2020-10531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554702" comment="libicu-doc-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554703" comment="libicu52_1-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548971" comment="libicu52_1-32bit-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554704" comment="libicu52_1-data-52.1-8.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149982" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1170771" ref_url="https://bugzilla.suse.com/1170771" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006783.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-12243: Fixed a denial of service related to recursive filters (bsc#1170771).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12243">CVE-2020-12243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554705" comment="libldap-2_4-2-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551431" comment="libldap-2_4-2-32bit-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554706" comment="openldap2-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554707" comment="openldap2-back-meta-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554708" comment="openldap2-client-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530930" comment="openldap2-doc-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554709" comment="openldap2-ppolicy-check-password-1.2-18.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149983" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1170643" ref_url="https://bugzilla.suse.com/1170643" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3899" ref_url="https://www.suse.com/security/cve/CVE-2020-3899/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006800.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Security issue fixed:

- CVE-2020-3899: Fixed a memory consumption issue that could have led to remote code execution (bsc#1170643).

Non-security issues fixed:

- Update to version 2.28.2 (bsc#1170643):
  + Fix excessive CPU usage due to GdkFrameClock not being stopped.
  + Fix UI process crash when EGL_WL_bind_wayland_display extension
    is not available.
  + Fix position of select popup menus in X11.
  + Fix playing of Youtube 'live stream'/H264 URLs.
  + Fix a crash under X11 when cairo uses xcb.
  + Fix the build in MIPS64.
  + Fix several crashes and rendering issues.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3899/">CVE-2020-3899 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3899">CVE-2020-3899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554710" comment="libjavascriptcoregtk-4_0-18-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554711" comment="libwebkit2gtk-4_0-37-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530934" comment="libwebkit2gtk3-lang-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554712" comment="typelib-1_0-JavaScriptCore-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554713" comment="typelib-1_0-WebKit2-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554714" comment="webkit2gtk-4_0-injected-bundles-2.28.2-2.53.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149984" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1170603" ref_url="https://bugzilla.suse.com/1170603" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12268" ref_url="https://www.suse.com/security/cve/CVE-2020-12268/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006798.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.52 fixes the following issues:

- CVE-2020-12268: Fixed a heap-based buffer overflow in jbig2_image_compose (bsc#1170603).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170603">SUSE bug 1170603</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-12268/">CVE-2020-12268 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12268">CVE-2020-12268 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554715" comment="ghostscript-9.52-23.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554716" comment="ghostscript-x11-9.52-23.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554717" comment="libspectre1-0.2.7-12.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149985" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1171186" ref_url="https://bugzilla.suse.com/1171186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388/" source="CVE"/>
		<reference ref_id="CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to version 68.8.0 ESR (bsc#1171186):

- CVE-2020-12387: Use-after-free during worker shutdown
- CVE-2020-12388: Sandbox escape with improperly guarded Access Tokens
- CVE-2020-12389: Sandbox escape with improperly separated process types
- CVE-2020-6831: Buffer overflow in SCTP chunk input validation
- CVE-2020-12392: Arbitrary local file access with 'Copy as cURL'
- CVE-2020-12393: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection
- CVE-2020-12395: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12387">CVE-2020-12387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12388">CVE-2020-12388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12389">CVE-2020-12389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12392">CVE-2020-12392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12393">CVE-2020-12393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12395">CVE-2020-12395 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6831">CVE-2020-6831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554718" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554719" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149986" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1169659" ref_url="https://bugzilla.suse.com/1169659" source="BUGZILLA"/>
		<reference ref_id="1170313" ref_url="https://bugzilla.suse.com/1170313" source="BUGZILLA"/>
		<reference ref_id="1170423" ref_url="https://bugzilla.suse.com/1170423" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519/" source="CVE"/>
		<reference ref_id="CVE-2019-12520" ref_url="https://www.suse.com/security/cve/CVE-2019-12520/" source="CVE"/>
		<reference ref_id="CVE-2019-12521" ref_url="https://www.suse.com/security/cve/CVE-2019-12521/" source="CVE"/>
		<reference ref_id="CVE-2019-12524" ref_url="https://www.suse.com/security/cve/CVE-2019-12524/" source="CVE"/>
		<reference ref_id="CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006808.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2019-12519, CVE-2019-12521: fixes incorrect buffer handling that can 
  result in cache poisoning, remote execution, and denial of service attacks
  when processing ESI responses (bsc#1169659).
- CVE-2020-11945: fixes a potential remote execution vulnerability
  when using HTTP Digest Authentication (bsc#1170313).
- CVE-2019-12520, CVE-2019-12524: fixes a potential ACL bypass, cache-bypass
  and cross-site scripting attack when processing invalid HTTP
  Request messages (bsc#1170423).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-08"/>
	<updated date="2020-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169659">SUSE bug 1169659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170313">SUSE bug 1170313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170423">SUSE bug 1170423</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12519">CVE-2019-12519 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12520/">CVE-2019-12520 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12520">CVE-2019-12520 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12521/">CVE-2019-12521 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12521">CVE-2019-12521 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12524/">CVE-2019-12524 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12524">CVE-2019-12524 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11945">CVE-2020-11945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554720" comment="squid-3.5.21-26.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149987" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1168404" ref_url="https://bugzilla.suse.com/1168404" source="BUGZILLA"/>
		<reference ref_id="1168407" ref_url="https://bugzilla.suse.com/1168407" source="BUGZILLA"/>
		<reference ref_id="1169066" ref_url="https://bugzilla.suse.com/1169066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1927" ref_url="https://www.suse.com/security/cve/CVE-2020-1927/" source="CVE"/>
		<reference ref_id="CVE-2020-1934" ref_url="https://www.suse.com/security/cve/CVE-2020-1934/" source="CVE"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006814.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-1934: mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server (bsc#1168404).
- CVE-2020-1927: mod_rewrite configurations vulnerable to open redirect (bsc#1168407).
- CVE-2020-1938: mod_proxy_ajp: Add 'secret' parameter to proxy workers to implement legacy AJP13 authentication (bsc#1169066).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-13"/>
	<updated date="2020-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168404">SUSE bug 1168404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168407">SUSE bug 1168407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169066">SUSE bug 1169066</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1927/">CVE-2020-1927 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1927">CVE-2020-1927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1934/">CVE-2020-1934 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1934">CVE-2020-1934 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554721" comment="apache2-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530956" comment="apache2-doc-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554722" comment="apache2-example-pages-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554723" comment="apache2-prefork-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554724" comment="apache2-utils-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554725" comment="apache2-worker-2.4.23-29.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149988" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1056134" ref_url="https://bugzilla.suse.com/1056134" source="BUGZILLA"/>
		<reference ref_id="1087813" ref_url="https://bugzilla.suse.com/1087813" source="BUGZILLA"/>
		<reference ref_id="1120386" ref_url="https://bugzilla.suse.com/1120386" source="BUGZILLA"/>
		<reference ref_id="1133147" ref_url="https://bugzilla.suse.com/1133147" source="BUGZILLA"/>
		<reference ref_id="1137325" ref_url="https://bugzilla.suse.com/1137325" source="BUGZILLA"/>
		<reference ref_id="1145929" ref_url="https://bugzilla.suse.com/1145929" source="BUGZILLA"/>
		<reference ref_id="1149591" ref_url="https://bugzilla.suse.com/1149591" source="BUGZILLA"/>
		<reference ref_id="1154118" ref_url="https://bugzilla.suse.com/1154118" source="BUGZILLA"/>
		<reference ref_id="1154844" ref_url="https://bugzilla.suse.com/1154844" source="BUGZILLA"/>
		<reference ref_id="1155689" ref_url="https://bugzilla.suse.com/1155689" source="BUGZILLA"/>
		<reference ref_id="1157155" ref_url="https://bugzilla.suse.com/1157155" source="BUGZILLA"/>
		<reference ref_id="1157157" ref_url="https://bugzilla.suse.com/1157157" source="BUGZILLA"/>
		<reference ref_id="1157303" ref_url="https://bugzilla.suse.com/1157303" source="BUGZILLA"/>
		<reference ref_id="1157804" ref_url="https://bugzilla.suse.com/1157804" source="BUGZILLA"/>
		<reference ref_id="1158021" ref_url="https://bugzilla.suse.com/1158021" source="BUGZILLA"/>
		<reference ref_id="1158642" ref_url="https://bugzilla.suse.com/1158642" source="BUGZILLA"/>
		<reference ref_id="1158819" ref_url="https://bugzilla.suse.com/1158819" source="BUGZILLA"/>
		<reference ref_id="1159199" ref_url="https://bugzilla.suse.com/1159199" source="BUGZILLA"/>
		<reference ref_id="1159285" ref_url="https://bugzilla.suse.com/1159285" source="BUGZILLA"/>
		<reference ref_id="1159297" ref_url="https://bugzilla.suse.com/1159297" source="BUGZILLA"/>
		<reference ref_id="1159841" ref_url="https://bugzilla.suse.com/1159841" source="BUGZILLA"/>
		<reference ref_id="1159908" ref_url="https://bugzilla.suse.com/1159908" source="BUGZILLA"/>
		<reference ref_id="1159910" ref_url="https://bugzilla.suse.com/1159910" source="BUGZILLA"/>
		<reference ref_id="1159911" ref_url="https://bugzilla.suse.com/1159911" source="BUGZILLA"/>
		<reference ref_id="1159912" ref_url="https://bugzilla.suse.com/1159912" source="BUGZILLA"/>
		<reference ref_id="1160195" ref_url="https://bugzilla.suse.com/1160195" source="BUGZILLA"/>
		<reference ref_id="1161586" ref_url="https://bugzilla.suse.com/1161586" source="BUGZILLA"/>
		<reference ref_id="1162227" ref_url="https://bugzilla.suse.com/1162227" source="BUGZILLA"/>
		<reference ref_id="1162928" ref_url="https://bugzilla.suse.com/1162928" source="BUGZILLA"/>
		<reference ref_id="1162929" ref_url="https://bugzilla.suse.com/1162929" source="BUGZILLA"/>
		<reference ref_id="1162931" ref_url="https://bugzilla.suse.com/1162931" source="BUGZILLA"/>
		<reference ref_id="1163508" ref_url="https://bugzilla.suse.com/1163508" source="BUGZILLA"/>
		<reference ref_id="1163971" ref_url="https://bugzilla.suse.com/1163971" source="BUGZILLA"/>
		<reference ref_id="1164009" ref_url="https://bugzilla.suse.com/1164009" source="BUGZILLA"/>
		<reference ref_id="1164051" ref_url="https://bugzilla.suse.com/1164051" source="BUGZILLA"/>
		<reference ref_id="1164069" ref_url="https://bugzilla.suse.com/1164069" source="BUGZILLA"/>
		<reference ref_id="1164078" ref_url="https://bugzilla.suse.com/1164078" source="BUGZILLA"/>
		<reference ref_id="1164846" ref_url="https://bugzilla.suse.com/1164846" source="BUGZILLA"/>
		<reference ref_id="1165111" ref_url="https://bugzilla.suse.com/1165111" source="BUGZILLA"/>
		<reference ref_id="1165311" ref_url="https://bugzilla.suse.com/1165311" source="BUGZILLA"/>
		<reference ref_id="1165873" ref_url="https://bugzilla.suse.com/1165873" source="BUGZILLA"/>
		<reference ref_id="1165881" ref_url="https://bugzilla.suse.com/1165881" source="BUGZILLA"/>
		<reference ref_id="1165984" ref_url="https://bugzilla.suse.com/1165984" source="BUGZILLA"/>
		<reference ref_id="1165985" ref_url="https://bugzilla.suse.com/1165985" source="BUGZILLA"/>
		<reference ref_id="1167421" ref_url="https://bugzilla.suse.com/1167421" source="BUGZILLA"/>
		<reference ref_id="1167423" ref_url="https://bugzilla.suse.com/1167423" source="BUGZILLA"/>
		<reference ref_id="1167629" ref_url="https://bugzilla.suse.com/1167629" source="BUGZILLA"/>
		<reference ref_id="1168075" ref_url="https://bugzilla.suse.com/1168075" source="BUGZILLA"/>
		<reference ref_id="1168295" ref_url="https://bugzilla.suse.com/1168295" source="BUGZILLA"/>
		<reference ref_id="1168424" ref_url="https://bugzilla.suse.com/1168424" source="BUGZILLA"/>
		<reference ref_id="1168829" ref_url="https://bugzilla.suse.com/1168829" source="BUGZILLA"/>
		<reference ref_id="1168854" ref_url="https://bugzilla.suse.com/1168854" source="BUGZILLA"/>
		<reference ref_id="1170056" ref_url="https://bugzilla.suse.com/1170056" source="BUGZILLA"/>
		<reference ref_id="1170345" ref_url="https://bugzilla.suse.com/1170345" source="BUGZILLA"/>
		<reference ref_id="1170778" ref_url="https://bugzilla.suse.com/1170778" source="BUGZILLA"/>
		<reference ref_id="1170847" ref_url="https://bugzilla.suse.com/1170847" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18255" ref_url="https://www.suse.com/security/cve/CVE-2017-18255/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-21008" ref_url="https://www.suse.com/security/cve/CVE-2018-21008/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="CVE-2019-18675" ref_url="https://www.suse.com/security/cve/CVE-2019-18675/" source="CVE"/>
		<reference ref_id="CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066/" source="CVE"/>
		<reference ref_id="CVE-2019-19319" ref_url="https://www.suse.com/security/cve/CVE-2019-19319/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-19966" ref_url="https://www.suse.com/security/cve/CVE-2019-19966/" source="CVE"/>
		<reference ref_id="CVE-2019-20054" ref_url="https://www.suse.com/security/cve/CVE-2019-20054/" source="CVE"/>
		<reference ref_id="CVE-2019-20096" ref_url="https://www.suse.com/security/cve/CVE-2019-20096/" source="CVE"/>
		<reference ref_id="CVE-2019-3701" ref_url="https://www.suse.com/security/cve/CVE-2019-3701/" source="CVE"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2019-9455" ref_url="https://www.suse.com/security/cve/CVE-2019-9455/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690/" source="CVE"/>
		<reference ref_id="CVE-2020-10720" ref_url="https://www.suse.com/security/cve/CVE-2020-10720/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11494" ref_url="https://www.suse.com/security/cve/CVE-2020-11494/" source="CVE"/>
		<reference ref_id="CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608/" source="CVE"/>
		<reference ref_id="CVE-2020-11609" ref_url="https://www.suse.com/security/cve/CVE-2020-11609/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-8992" ref_url="https://www.suse.com/security/cve/CVE-2020-8992/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-11494: An issue was discovered in slc_bump in drivers/net/can/slcan.c, which allowed attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL (bnc#1168424).
- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bnc#1167629).
- CVE-2020-8647: Fixed a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bnc#1162929).
- CVE-2020-8649: Fixed a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bnc#1162931).
- CVE-2020-9383: Fixed an issue in set_fdc in drivers/block/floppy.c, which leads to a wait_til_ready out-of-bounds read (bnc#1165111).
- CVE-2019-9458: In the video driver there was a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed (bnc#1168295).
- CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a system crash (bnc#1120386).
- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bnc#1159285).
- CVE-2020-11609: Fixed a NULL pointer dereference in the stv06xx subsystem caused by mishandling invalid descriptors (bnc#1168854).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bnc#1170345).
- CVE-2020-11608: Fixed an issue in drivers/media/usb/gspca/ov519.c caused by a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bnc#1168829).
- CVE-2017-18255: The perf_cpu_time_max_percent_handler function in kernel/events/core.c allowed local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation (bnc#1087813).
- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).
- CVE-2020-2732: A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest (bnc#1163971).
- CVE-2019-5108: Fixed a denial-of-service vulnerability caused by triggering AP to send IAPP location updates for stations before the required authentication process has completed (bnc#1159912).
- CVE-2020-8992: ext4_protect_reserved_inode in fs/ext4/block_validity.c allowed attackers to cause a denial of service (soft lockup) via a crafted journal size (bnc#1164069).
- CVE-2018-21008: Fixed a use-after-free which could be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c (bnc#1149591).
- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bnc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bnc#1157155).
- CVE-2019-18675: Fixed an integer overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bnc#1157804).
- CVE-2019-14615: Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may have allowed an unauthenticated user to potentially enable information disclosure via local access (bnc#1160195, bsc#1165881).
- CVE-2019-19965: Fixed a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bnc#1159911).
- CVE-2019-20054: Fixed a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bnc#1159910).
- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bnc#1159908).
- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bnc#1159841).
- CVE-2019-19447: Fixed an issue with mounting a crafted ext4 filesystem image, performing some operations, and unmounting could lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c (bnc#1158819).
- CVE-2019-19319: Fixed an issue with a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call (bnc#1158021).
- CVE-2019-19767: Fixed mishandling of ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c (bnc#1159297).
- CVE-2019-11091,CVE-2018-12126,CVE-2018-12130,CVE-2018-12127: Earlier mitigations for the 'MDS' Microarchitectural Data Sampling attacks were not complete.
  An additional fix was added to the x86_64 fast systemcall path to further mitigate these attacks. (bsc#1164846 bsc#1170847)


The following non-security bugs were fixed:

- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).
- blktrace: fix dereference after null check (bsc#1159285).
- blktrace: fix trace mutex deadlock (bsc#1159285).
- btrfs: fix btrfs_wait_ordered_range() so that it waits for all ordered extents (bsc#1163508).
- btrfs: fix panic during relocation after ENOSPC before writeback happens (bsc#1163508).
- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1158642)
- btrfs: relocation: fix reloc_root lifespan and access (bsc#1164009).
- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).
- fix PageHeadHuge() race with THP split (VM Functionality, bsc#1165311).
- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).
- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).
- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).
- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).
- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).
- input: add safety guards to input_set_keycode() (bsc#1168075).
- ipv4: correct gso_size for UFO (bsc#1154844).
- ipv6: fix memory accounting during ipv6 queue expire (bsc#1162227) (bsc#1162227).
- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).
- md: add mddev-&gt;pers to avoid potential NULL pointer dereference (bsc#1056134).
- md/bitmap: do not read page from device with Bitmap_sync (bsc#1056134).
- md: change the initialization value for a spare device spot to MD_DISK_ROLE_SPARE (bsc#1056134).
- md: Delete gendisk before cleaning up the request queue (bsc#1056134).
- md: do not call bitmap_create() while array is quiesced (bsc#1056134).
- md: do not set In_sync if array is frozen (bsc#1056134).
- md: fix a potential deadlock of raid5/raid10 reshape (bsc#1056134).
- md: md.c: Return -ENODEV when mddev is NULL in rdev_attr_show (bsc#1056134).
- md: notify about new spare disk in the container (bsc#1056134).
- md/raid0: Fix buffer overflow at debug print (bsc#1164051).
- md/raid10: end bio when the device faulty (bsc#1056134).
- md/raid10: Fix raid10 replace hang when new added disk faulty (bsc#1056134).
- md/raid1,raid10: silence warning about wait-within-wait (bsc#1056134).
- md: return -ENODEV if rdev has no mddev assigned (bsc#1056134).
- media: ov519: add missing endpoint sanity checks (bsc#1168829).
- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).
- net: ena: Add PCI shutdown handler to allow safe kexec (bsc#1167421, bsc#1167423).
- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).
- net/ibmvnic: Fix typo in retry check (bsc#1155689 ltc#182047).
- rpm/kernel-binary.spec.in: Replace Novell with SUSE
- sched/fair: Scale bandwidth quota and period without losing quota/period ratio precision (bsc#1161586).
- scsi: core: avoid repetitive logging of device offline messages (bsc#1145929).
- scsi: core: kABI fix already_offline (bsc#1145929).
- tcp: clear tp-&gt;packets_out when purging write queue (bsc#1154118).
- x86/mitigations: Clear CPU buffers on the SYSCALL fast path (bsc#1164846 bsc#1170847).
- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).
- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-14"/>
	<updated date="2020-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056134">SUSE bug 1056134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087813">SUSE bug 1087813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120386">SUSE bug 1120386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133147">SUSE bug 1133147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137325">SUSE bug 1137325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145929">SUSE bug 1145929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149591">SUSE bug 1149591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154118">SUSE bug 1154118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154844">SUSE bug 1154844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155689">SUSE bug 1155689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157155">SUSE bug 1157155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157157">SUSE bug 1157157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157303">SUSE bug 1157303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157804">SUSE bug 1157804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158021">SUSE bug 1158021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158642">SUSE bug 1158642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158819">SUSE bug 1158819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159199">SUSE bug 1159199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159285">SUSE bug 1159285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159297">SUSE bug 1159297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159841">SUSE bug 1159841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159908">SUSE bug 1159908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159910">SUSE bug 1159910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159911">SUSE bug 1159911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159912">SUSE bug 1159912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160195">SUSE bug 1160195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161586">SUSE bug 1161586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162227">SUSE bug 1162227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162928">SUSE bug 1162928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162929">SUSE bug 1162929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162931">SUSE bug 1162931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163508">SUSE bug 1163508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163971">SUSE bug 1163971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164009">SUSE bug 1164009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164051">SUSE bug 1164051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164069">SUSE bug 1164069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164078">SUSE bug 1164078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164846">SUSE bug 1164846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165111">SUSE bug 1165111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165311">SUSE bug 1165311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165873">SUSE bug 1165873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165881">SUSE bug 1165881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165984">SUSE bug 1165984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165985">SUSE bug 1165985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167421">SUSE bug 1167421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167423">SUSE bug 1167423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167629">SUSE bug 1167629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168075">SUSE bug 1168075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168295">SUSE bug 1168295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168424">SUSE bug 1168424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168829">SUSE bug 1168829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168854">SUSE bug 1168854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170056">SUSE bug 1170056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170345">SUSE bug 1170345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170778">SUSE bug 1170778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170847">SUSE bug 1170847</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18255/">CVE-2017-18255 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18255">CVE-2017-18255 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-21008/">CVE-2018-21008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21008">CVE-2018-21008 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14615">CVE-2019-14615 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18675/">CVE-2019-18675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18675">CVE-2019-18675 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19066">CVE-2019-19066 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19319/">CVE-2019-19319 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19319">CVE-2019-19319 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19447">CVE-2019-19447 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19767">CVE-2019-19767 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19768">CVE-2019-19768 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19965">CVE-2019-19965 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19966/">CVE-2019-19966 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19966">CVE-2019-19966 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20054/">CVE-2019-20054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20054">CVE-2019-20054 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20096/">CVE-2019-20096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20096">CVE-2019-20096 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3701/">CVE-2019-3701 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3701">CVE-2019-3701 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5108">CVE-2019-5108 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9455/">CVE-2019-9455 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9455">CVE-2019-9455 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9458">CVE-2019-9458 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10690">CVE-2020-10690 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10720/">CVE-2020-10720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10720">CVE-2020-10720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10942">CVE-2020-10942 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11494/">CVE-2020-11494 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11494">CVE-2020-11494 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11608">CVE-2020-11608 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11609/">CVE-2020-11609 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11609">CVE-2020-11609 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2732">CVE-2020-2732 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8647">CVE-2020-8647 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8648">CVE-2020-8648 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8649">CVE-2020-8649 at NVD</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8992/">CVE-2020-8992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8992">CVE-2020-8992 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9383">CVE-2020-9383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554726" comment="kernel-default-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554727" comment="kernel-default-base-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554728" comment="kernel-default-devel-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538399" comment="kernel-default-kgraft-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554729" comment="kernel-default-man-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538400" comment="kernel-devel-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538401" comment="kernel-macros-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538402" comment="kernel-source-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554730" comment="kernel-syms-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538404" comment="kgraft-patch-4_4_180-94_116-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149989" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyYAML (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1165439" ref_url="https://bugzilla.suse.com/1165439" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1747" ref_url="https://www.suse.com/security/cve/CVE-2020-1747/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006820.html" source="SUSE-SU"/>
		<description>
This update for python-PyYAML fixes the following issues:

- CVE-2020-1747: Fixed an arbitrary code execution when YAML files are parsed by FullLoader (bsc#1165439).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-15"/>
	<updated date="2020-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165439">SUSE bug 1165439</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1747/">CVE-2020-1747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1747">CVE-2020-1747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009525264" comment="python-PyYAML-5.1.2-26.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525265" comment="python3-PyYAML-5.1.2-26.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149990" version="1" class="patch">
	<metadata>
		<title>Security update for git (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1168930" ref_url="https://bugzilla.suse.com/1168930" source="BUGZILLA"/>
		<reference ref_id="1169605" ref_url="https://bugzilla.suse.com/1169605" source="BUGZILLA"/>
		<reference ref_id="1169786" ref_url="https://bugzilla.suse.com/1169786" source="BUGZILLA"/>
		<reference ref_id="1169936" ref_url="https://bugzilla.suse.com/1169936" source="BUGZILLA"/>
		<reference ref_id="1170302" ref_url="https://bugzilla.suse.com/1170302" source="BUGZILLA"/>
		<reference ref_id="1170741" ref_url="https://bugzilla.suse.com/1170741" source="BUGZILLA"/>
		<reference ref_id="1170939" ref_url="https://bugzilla.suse.com/1170939" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11008" ref_url="https://www.suse.com/security/cve/CVE-2020-11008/" source="CVE"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006829.html" source="SUSE-SU"/>
		<description>
This update for git to 2.26.2 fixes the following issues:

Security issue fixed:

- CVE-2020-11008: Specially crafted URLs may have tricked the credentials helper 
  to providing credential information that is not appropriate for the protocol 
  in use and host being contacted (bsc#1169936).

Non-security issue fixed:

- Fixed git-daemon not starting after conversion from sysvinit to systemd service (bsc#1169605).
- Enabled access for git-daemon in firewall configuration (bsc#1170302).
- Fixed problems with recent switch to protocol v2, which caused fetches transferring unreasonable amount of data (bsc#1170741).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-18"/>
	<updated date="2020-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169605">SUSE bug 1169605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169786">SUSE bug 1169786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169936">SUSE bug 1169936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170302">SUSE bug 1170302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170741">SUSE bug 1170741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170939">SUSE bug 1170939</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11008/">CVE-2020-11008 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11008">CVE-2020-11008 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5260">CVE-2020-5260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542416" comment="git-core-2.26.2-27.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149991" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1167068" ref_url="https://bugzilla.suse.com/1167068" source="BUGZILLA"/>
		<reference ref_id="1170558" ref_url="https://bugzilla.suse.com/1170558" source="BUGZILLA"/>
		<reference ref_id="1171363" ref_url="https://bugzilla.suse.com/1171363" source="BUGZILLA"/>
		<reference ref_id="682920" ref_url="https://bugzilla.suse.com/682920" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12108" ref_url="https://www.suse.com/security/cve/CVE-2020-12108/" source="CVE"/>
		<reference ref_id="CVE-2020-12137" ref_url="https://www.suse.com/security/cve/CVE-2020-12137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006830.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2020-12108: Fixed a content injection bug (bsc#1171363).
- CVE-2020-12137: Fixed a XSS vulnerability caused by MIME type confusion (bsc#1170558).

Non-security issue fixed:

- Fixed rights and ownership on /var/lib/mailman/archives (bsc#1167068).
- Don't default to invalid hosts for DEFAULT_EMAIL_HOST (bsc#682920).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-18"/>
	<updated date="2020-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167068">SUSE bug 1167068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170558">SUSE bug 1170558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171363">SUSE bug 1171363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682920">SUSE bug 682920</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12108/">CVE-2020-12108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12108">CVE-2020-12108 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12137/">CVE-2020-12137 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12137">CVE-2020-12137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548985" comment="mailman-2.1.17-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149992" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006863.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_113 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721279" comment="kernel-default 4.4.180-94.113 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719606" comment="kgraft-patch-4_4_180-94_113-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538407" comment="kgraft-patch-4_4_180-94_113-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149993" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006863.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_107 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721280" comment="kernel-default 4.4.180-94.107 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719608" comment="kgraft-patch-4_4_180-94_107-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538408" comment="kgraft-patch-4_4_180-94_107-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149994" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006863.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_103 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721277" comment="kernel-default 4.4.180-94.103 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719602" comment="kgraft-patch-4_4_180-94_103-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538409" comment="kgraft-patch-4_4_180-94_103-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149995" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006863.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_100 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721278" comment="kernel-default 4.4.180-94.100 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719604" comment="kgraft-patch-4_4_180-94_100-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538410" comment="kgraft-patch-4_4_180-94_100-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149996" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006863.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_97 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721153" comment="kernel-default 4.4.180-94.97 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719420" comment="kgraft-patch-4_4_180-94_97-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538411" comment="kgraft-patch-4_4_180-94_97-default-9-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149997" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006863.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.178-94_91 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721150" comment="kernel-default 4.4.178-94.91 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719417" comment="kgraft-patch-4_4_178-94_91-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538412" comment="kgraft-patch-4_4_178-94_91-default-9-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149998" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1136085" ref_url="https://bugzilla.suse.com/1136085" source="BUGZILLA"/>
		<reference ref_id="1159723" ref_url="https://bugzilla.suse.com/1159723" source="BUGZILLA"/>
		<reference ref_id="1159729" ref_url="https://bugzilla.suse.com/1159729" source="BUGZILLA"/>
		<reference ref_id="1164825" ref_url="https://bugzilla.suse.com/1164825" source="BUGZILLA"/>
		<reference ref_id="1171928" ref_url="https://bugzilla.suse.com/1171928" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221/" source="CVE"/>
		<reference ref_id="CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418/" source="CVE"/>
		<reference ref_id="CVE-2019-17563" ref_url="https://www.suse.com/security/cve/CVE-2019-17563/" source="CVE"/>
		<reference ref_id="CVE-2019-17569" ref_url="https://www.suse.com/security/cve/CVE-2019-17569/" source="CVE"/>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006867.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

CVE-2020-9484 (bsc#1171928)
Apache Tomcat Remote Code Execution via session persistence

If an attacker was able to control the contents and name of a file on a
server configured to use the PersistenceManager, then the attacker could
have triggered a remote code execution via deserialization of the file under
their control.

CVE-2019-12418 (bsc#1159723)
Local privilege escalation by manipulating the RMI registry and performing a man-in-the-middle attack

When Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files was able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface.
The attacker could then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.

CVE-2019-0221 (bsc#1136085)
The SSI printenv command echoed user provided data without escaping, which
made it vulnerable to XSS.

CVE-2019-17563 (bsc#1159729)
When using FORM authentication there was a narrow window where an attacker could perform a session fixation attack.

CVE-2019-17569 (bsc#1164825)
Invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling
if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-28"/>
	<updated date="2020-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136085">SUSE bug 1136085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159723">SUSE bug 1159723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159729">SUSE bug 1159729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164825">SUSE bug 1164825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171928">SUSE bug 1171928</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0221">CVE-2019-0221 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12418">CVE-2019-12418 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17563/">CVE-2019-17563 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17563">CVE-2019-17563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17569/">CVE-2019-17569 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17569">CVE-2019-17569 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9484">CVE-2020-9484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530964" comment="tomcat-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530965" comment="tomcat-admin-webapps-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530966" comment="tomcat-docs-webapp-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530967" comment="tomcat-el-3_0-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530968" comment="tomcat-javadoc-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530969" comment="tomcat-jsp-2_3-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530970" comment="tomcat-lib-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530971" comment="tomcat-servlet-3_1-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530972" comment="tomcat-webapps-8.0.53-29.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149999" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1027282" ref_url="https://bugzilla.suse.com/1027282" source="BUGZILLA"/>
		<reference ref_id="1041090" ref_url="https://bugzilla.suse.com/1041090" source="BUGZILLA"/>
		<reference ref_id="1042670" ref_url="https://bugzilla.suse.com/1042670" source="BUGZILLA"/>
		<reference ref_id="1073269" ref_url="https://bugzilla.suse.com/1073269" source="BUGZILLA"/>
		<reference ref_id="1073748" ref_url="https://bugzilla.suse.com/1073748" source="BUGZILLA"/>
		<reference ref_id="1078326" ref_url="https://bugzilla.suse.com/1078326" source="BUGZILLA"/>
		<reference ref_id="1078485" ref_url="https://bugzilla.suse.com/1078485" source="BUGZILLA"/>
		<reference ref_id="1081750" ref_url="https://bugzilla.suse.com/1081750" source="BUGZILLA"/>
		<reference ref_id="1084650" ref_url="https://bugzilla.suse.com/1084650" source="BUGZILLA"/>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1153830" ref_url="https://bugzilla.suse.com/1153830" source="BUGZILLA"/>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1159035" ref_url="https://bugzilla.suse.com/1159035" source="BUGZILLA"/>
		<reference ref_id="1162224" ref_url="https://bugzilla.suse.com/1162224" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="1170411" ref_url="https://bugzilla.suse.com/1170411" source="BUGZILLA"/>
		<reference ref_id="1171561" ref_url="https://bugzilla.suse.com/1171561" source="BUGZILLA"/>
		<reference ref_id="945401" ref_url="https://bugzilla.suse.com/945401" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006878.html" source="SUSE-SU"/>
		<description>


This update for python to version 2.7.17 fixes the following issues:

Syncing with lots of upstream bug fixes and security fixes.

Bug fixes:

- CVE-2019-9674: Improved the documentation to reflect the dangers of zip-bombs (bsc#1162825).
- CVE-2019-18348: Fixed a CRLF injection via the host part of the url passed to urlopen(). Now an InvalidURL exception is raised (bsc#1155094).
- CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367).
- Fixed mismatches between libpython and python-base versions (bsc#1162224).
- Fixed segfault in libpython2.7.so.1 (bsc#1073748).
- Unified packages among openSUSE:Factory and SLE versions (bsc#1159035).
- Added idle.desktop and idle.appdata.xml to provide IDLE in menus (bsc#1153830).
- Excluded tsl_check files from python-base to prevent file conflict with python-strict-tls-checks package (bsc#945401).
- Changed the name of idle3 icons to idle3.png to avoid collision with Python 2 version (bsc#1165894).

Additionally a new 'shared-python-startup' package is provided containing startup files.

python-rpm-macros was updated to fix:

- Do not write .pyc files for tests (bsc#1171561)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-03"/>
	<updated date="2020-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027282">SUSE bug 1027282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041090">SUSE bug 1041090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042670">SUSE bug 1042670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073269">SUSE bug 1073269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073748">SUSE bug 1073748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078326">SUSE bug 1078326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078485">SUSE bug 1078485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081750">SUSE bug 1081750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084650">SUSE bug 1084650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153830">SUSE bug 1153830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159035">SUSE bug 1159035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162224">SUSE bug 1162224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170411">SUSE bug 1170411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171561">SUSE bug 1171561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945401">SUSE bug 945401</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554731" comment="libpython2_7-1_0-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548995" comment="libpython2_7-1_0-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554732" comment="python-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548997" comment="python-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554733" comment="python-base-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548999" comment="python-base-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554734" comment="python-curses-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554735" comment="python-demo-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542461" comment="python-devel-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530982" comment="python-doc-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530983" comment="python-doc-pdf-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554736" comment="python-gdbm-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554737" comment="python-idle-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530986" comment="python-rpm-macros-20200207.5feb6c1-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554738" comment="python-tk-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554739" comment="python-xml-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530989" comment="shared-python-startup-0.1-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150000" version="1" class="patch">
	<metadata>
		<title>Security update for krb5-appl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1165787" ref_url="https://bugzilla.suse.com/1165787" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10188" ref_url="https://www.suse.com/security/cve/CVE-2020-10188/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006882.html" source="SUSE-SU"/>
		<description>
This update for krb5-appl fixes the following issues:

- CVE-2020-10188: Fixed a remote root execution (bsc#1165787).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165787">SUSE bug 1165787</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10188/">CVE-2020-10188 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10188">CVE-2020-10188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554740" comment="krb5-appl-clients-1.0.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554741" comment="krb5-appl-servers-1.0.3-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150001" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1055857" ref_url="https://bugzilla.suse.com/1055857" source="BUGZILLA"/>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="1171475" ref_url="https://bugzilla.suse.com/1171475" source="BUGZILLA"/>
		<reference ref_id="1171847" ref_url="https://bugzilla.suse.com/1171847" source="BUGZILLA"/>
		<reference ref_id="1172105" ref_url="https://bugzilla.suse.com/1172105" source="BUGZILLA"/>
		<reference ref_id="1172116" ref_url="https://bugzilla.suse.com/1172116" source="BUGZILLA"/>
		<reference ref_id="1172121" ref_url="https://bugzilla.suse.com/1172121" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328/" source="CVE"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="CVE-2020-0093" ref_url="https://www.suse.com/security/cve/CVE-2020-0093/" source="CVE"/>
		<reference ref_id="CVE-2020-12767" ref_url="https://www.suse.com/security/cve/CVE-2020-12767/" source="CVE"/>
		<reference ref_id="CVE-2020-13112" ref_url="https://www.suse.com/security/cve/CVE-2020-13112/" source="CVE"/>
		<reference ref_id="CVE-2020-13113" ref_url="https://www.suse.com/security/cve/CVE-2020-13113/" source="CVE"/>
		<reference ref_id="CVE-2020-13114" ref_url="https://www.suse.com/security/cve/CVE-2020-13114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

Security issues fixed:

- CVE-2016-6328: Fixed an integer overflow in parsing MNOTE entry data of the input file (bsc#1055857).
- CVE-2017-7544: Fixed an out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c (bsc#1059893).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2020-0093: Fixed an out-of-bounds read in exif_data_save_data_entry (bsc#1171847).
- CVE-2020-12767: Fixed a divide-by-zero error in exif_entry_get_value (bsc#1171475).
- CVE-2020-13112: Fixed a time consumption DoS when parsing canon array markers (bsc#1172121).
- CVE-2020-13113: Fixed a potential use of uninitialized memory (bsc#1172105).
- CVE-2020-13114: Fixed various buffer overread fixes due to integer overflows in maker notes (bsc#1172116).

Non-security issues fixed:

- libexif was updated to version 0.6.22:
  * New translations: ms
  * Updated translations for most languages
  * Some useful EXIF 2.3 tag added:
    * EXIF_TAG_GAMMA
    * EXIF_TAG_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_IMAGE_NUMBER_OF_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_EXPOSURE_TIMES_OF_COMPOSITE_IMAGE
    * EXIF_TAG_GPS_H_POSITIONING_ERROR
    * EXIF_TAG_CAMERA_OWNER_NAME
    * EXIF_TAG_BODY_SERIAL_NUMBER
    * EXIF_TAG_LENS_SPECIFICATION
    * EXIF_TAG_LENS_MAKE
    * EXIF_TAG_LENS_MODEL
    * EXIF_TAG_LENS_SERIAL_NUMBER
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055857">SUSE bug 1055857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171475">SUSE bug 1171475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171847">SUSE bug 1171847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172105">SUSE bug 1172105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172116">SUSE bug 1172116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172121">SUSE bug 1172121</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6328">CVE-2016-6328 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7544">CVE-2017-7544 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20030">CVE-2018-20030 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9278">CVE-2019-9278 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0093/">CVE-2020-0093 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0093">CVE-2020-0093 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12767/">CVE-2020-12767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12767">CVE-2020-12767 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13112/">CVE-2020-13112 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13112">CVE-2020-13112 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13113/">CVE-2020-13113 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13113">CVE-2020-13113 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13114/">CVE-2020-13114 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13114">CVE-2020-13114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554742" comment="libexif12-0.6.22-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549008" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150002" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="1146873" ref_url="https://bugzilla.suse.com/1146873" source="BUGZILLA"/>
		<reference ref_id="1149811" ref_url="https://bugzilla.suse.com/1149811" source="BUGZILLA"/>
		<reference ref_id="1160024" ref_url="https://bugzilla.suse.com/1160024" source="BUGZILLA"/>
		<reference ref_id="1161066" ref_url="https://bugzilla.suse.com/1161066" source="BUGZILLA"/>
		<reference ref_id="1163018" ref_url="https://bugzilla.suse.com/1163018" source="BUGZILLA"/>
		<reference ref_id="1166240" ref_url="https://bugzilla.suse.com/1166240" source="BUGZILLA"/>
		<reference ref_id="1170940" ref_url="https://bugzilla.suse.com/1170940" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2020-1711: Fixed a potential OOB access in the iSCSI client code (bsc#1166240).
- CVE-2019-12068: Fixed a potential DoS in the LSI SCSI controller emulation (bsc#1146873).
- CVE-2020-1983: Fixed a use-after-free in the ip_reass function of slirp (bsc#1170940).
- CVE-2020-8608: Fixed a potential OOB access in slirp (bsc#1163018).
- CVE-2020-7039: Fixed a potential OOB access in slirp (bsc#1161066).
- CVE-2019-15890: Fixed a use-after-free during packet reassembly in slirp (bsc#1149811).
- Fixed multiple potential DoS issues in SLIRP, similar to CVE-2019-6778 (bsc#1123156).

Non-security issue fixed:

- Make sure that required memory is mapped properly during an incoming migration of a Xen HVM domU (bsc#1160024).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146873">SUSE bug 1146873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149811">SUSE bug 1149811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160024">SUSE bug 1160024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161066">SUSE bug 1161066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163018">SUSE bug 1163018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166240">SUSE bug 1166240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170940">SUSE bug 1170940</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12068">CVE-2019-12068 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1711">CVE-2020-1711 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1983">CVE-2020-1983 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7039">CVE-2020-7039 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554743" comment="qemu-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554744" comment="qemu-arm-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554745" comment="qemu-block-curl-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554746" comment="qemu-block-iscsi-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554747" comment="qemu-block-rbd-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554748" comment="qemu-block-ssh-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554749" comment="qemu-guest-agent-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538419" comment="qemu-ipxe-1.0.0+-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554750" comment="qemu-kvm-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554751" comment="qemu-lang-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538422" comment="qemu-ppc-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554752" comment="qemu-s390-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538423" comment="qemu-seabios-1.10.2-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538424" comment="qemu-sgabios-8-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554753" comment="qemu-tools-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538426" comment="qemu-vgabios-1.10.2-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538427" comment="qemu-x86-2.9.1-6.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150003" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1172031" ref_url="https://bugzilla.suse.com/1172031" source="BUGZILLA"/>
		<reference ref_id="1172225" ref_url="https://bugzilla.suse.com/1172225" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006895.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2019-20807: Fixed an issue where escaping from the restrictive mode of vim 
  was possible using interfaces (bsc#1172225 and bsc#1172031).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172031">SUSE bug 1172031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172225">SUSE bug 1172225</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20807">CVE-2019-20807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554754" comment="gvim-7.4.326-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554755" comment="vim-7.4.326-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531009" comment="vim-data-7.4.326-17.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150004" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1172402" ref_url="https://bugzilla.suse.com/1172402" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006901.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- MozillaFirefox was updated to version 68.9.0 Extended Support Release (bsc#1172402).

- CVE-2020-12405: Fixed a use-after-free in SharedWorkerService. 
- CVE-2020-12406: Fixed a JavaScript Type confusion with NativeTypes.
- CVE-2020-12410: Fixed multiple memory safety bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12405">CVE-2020-12405 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12406">CVE-2020-12406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12410">CVE-2020-12410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554756" comment="MozillaFirefox-68.9.0-109.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554757" comment="MozillaFirefox-translations-common-68.9.0-109.123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150005" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1043983" ref_url="https://bugzilla.suse.com/1043983" source="BUGZILLA"/>
		<reference ref_id="1048072" ref_url="https://bugzilla.suse.com/1048072" source="BUGZILLA"/>
		<reference ref_id="1055265" ref_url="https://bugzilla.suse.com/1055265" source="BUGZILLA"/>
		<reference ref_id="1056286" ref_url="https://bugzilla.suse.com/1056286" source="BUGZILLA"/>
		<reference ref_id="1056782" ref_url="https://bugzilla.suse.com/1056782" source="BUGZILLA"/>
		<reference ref_id="1058754" ref_url="https://bugzilla.suse.com/1058754" source="BUGZILLA"/>
		<reference ref_id="1058755" ref_url="https://bugzilla.suse.com/1058755" source="BUGZILLA"/>
		<reference ref_id="1058757" ref_url="https://bugzilla.suse.com/1058757" source="BUGZILLA"/>
		<reference ref_id="1062452" ref_url="https://bugzilla.suse.com/1062452" source="BUGZILLA"/>
		<reference ref_id="1069607" ref_url="https://bugzilla.suse.com/1069607" source="BUGZILLA"/>
		<reference ref_id="1069632" ref_url="https://bugzilla.suse.com/1069632" source="BUGZILLA"/>
		<reference ref_id="1073002" ref_url="https://bugzilla.suse.com/1073002" source="BUGZILLA"/>
		<reference ref_id="1078782" ref_url="https://bugzilla.suse.com/1078782" source="BUGZILLA"/>
		<reference ref_id="1082007" ref_url="https://bugzilla.suse.com/1082007" source="BUGZILLA"/>
		<reference ref_id="1082008" ref_url="https://bugzilla.suse.com/1082008" source="BUGZILLA"/>
		<reference ref_id="1082009" ref_url="https://bugzilla.suse.com/1082009" source="BUGZILLA"/>
		<reference ref_id="1082010" ref_url="https://bugzilla.suse.com/1082010" source="BUGZILLA"/>
		<reference ref_id="1082011" ref_url="https://bugzilla.suse.com/1082011" source="BUGZILLA"/>
		<reference ref_id="1082014" ref_url="https://bugzilla.suse.com/1082014" source="BUGZILLA"/>
		<reference ref_id="1082058" ref_url="https://bugzilla.suse.com/1082058" source="BUGZILLA"/>
		<reference ref_id="1087433" ref_url="https://bugzilla.suse.com/1087433" source="BUGZILLA"/>
		<reference ref_id="1087434" ref_url="https://bugzilla.suse.com/1087434" source="BUGZILLA"/>
		<reference ref_id="1087436" ref_url="https://bugzilla.suse.com/1087436" source="BUGZILLA"/>
		<reference ref_id="1087437" ref_url="https://bugzilla.suse.com/1087437" source="BUGZILLA"/>
		<reference ref_id="1087440" ref_url="https://bugzilla.suse.com/1087440" source="BUGZILLA"/>
		<reference ref_id="1087441" ref_url="https://bugzilla.suse.com/1087441" source="BUGZILLA"/>
		<reference ref_id="1112530" ref_url="https://bugzilla.suse.com/1112530" source="BUGZILLA"/>
		<reference ref_id="1112532" ref_url="https://bugzilla.suse.com/1112532" source="BUGZILLA"/>
		<reference ref_id="1130611" ref_url="https://bugzilla.suse.com/1130611" source="BUGZILLA"/>
		<reference ref_id="1130617" ref_url="https://bugzilla.suse.com/1130617" source="BUGZILLA"/>
		<reference ref_id="1130620" ref_url="https://bugzilla.suse.com/1130620" source="BUGZILLA"/>
		<reference ref_id="1130622" ref_url="https://bugzilla.suse.com/1130622" source="BUGZILLA"/>
		<reference ref_id="1130623" ref_url="https://bugzilla.suse.com/1130623" source="BUGZILLA"/>
		<reference ref_id="1130627" ref_url="https://bugzilla.suse.com/1130627" source="BUGZILLA"/>
		<reference ref_id="1152990" ref_url="https://bugzilla.suse.com/1152990" source="BUGZILLA"/>
		<reference ref_id="1152992" ref_url="https://bugzilla.suse.com/1152992" source="BUGZILLA"/>
		<reference ref_id="1152994" ref_url="https://bugzilla.suse.com/1152994" source="BUGZILLA"/>
		<reference ref_id="1152995" ref_url="https://bugzilla.suse.com/1152995" source="BUGZILLA"/>
		<reference ref_id="1171517" ref_url="https://bugzilla.suse.com/1171517" source="BUGZILLA"/>
		<reference ref_id="1172275" ref_url="https://bugzilla.suse.com/1172275" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9096" ref_url="https://www.suse.com/security/cve/CVE-2015-9096/" source="CVE"/>
		<reference ref_id="CVE-2016-2339" ref_url="https://www.suse.com/security/cve/CVE-2016-2339/" source="CVE"/>
		<reference ref_id="CVE-2016-7798" ref_url="https://www.suse.com/security/cve/CVE-2016-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-0898" ref_url="https://www.suse.com/security/cve/CVE-2017-0898/" source="CVE"/>
		<reference ref_id="CVE-2017-0899" ref_url="https://www.suse.com/security/cve/CVE-2017-0899/" source="CVE"/>
		<reference ref_id="CVE-2017-0900" ref_url="https://www.suse.com/security/cve/CVE-2017-0900/" source="CVE"/>
		<reference ref_id="CVE-2017-0901" ref_url="https://www.suse.com/security/cve/CVE-2017-0901/" source="CVE"/>
		<reference ref_id="CVE-2017-0902" ref_url="https://www.suse.com/security/cve/CVE-2017-0902/" source="CVE"/>
		<reference ref_id="CVE-2017-0903" ref_url="https://www.suse.com/security/cve/CVE-2017-0903/" source="CVE"/>
		<reference ref_id="CVE-2017-10784" ref_url="https://www.suse.com/security/cve/CVE-2017-10784/" source="CVE"/>
		<reference ref_id="CVE-2017-14033" ref_url="https://www.suse.com/security/cve/CVE-2017-14033/" source="CVE"/>
		<reference ref_id="CVE-2017-14064" ref_url="https://www.suse.com/security/cve/CVE-2017-14064/" source="CVE"/>
		<reference ref_id="CVE-2017-17405" ref_url="https://www.suse.com/security/cve/CVE-2017-17405/" source="CVE"/>
		<reference ref_id="CVE-2017-17742" ref_url="https://www.suse.com/security/cve/CVE-2017-17742/" source="CVE"/>
		<reference ref_id="CVE-2017-17790" ref_url="https://www.suse.com/security/cve/CVE-2017-17790/" source="CVE"/>
		<reference ref_id="CVE-2017-9228" ref_url="https://www.suse.com/security/cve/CVE-2017-9228/" source="CVE"/>
		<reference ref_id="CVE-2017-9229" ref_url="https://www.suse.com/security/cve/CVE-2017-9229/" source="CVE"/>
		<reference ref_id="CVE-2018-1000073" ref_url="https://www.suse.com/security/cve/CVE-2018-1000073/" source="CVE"/>
		<reference ref_id="CVE-2018-1000074" ref_url="https://www.suse.com/security/cve/CVE-2018-1000074/" source="CVE"/>
		<reference ref_id="CVE-2018-1000075" ref_url="https://www.suse.com/security/cve/CVE-2018-1000075/" source="CVE"/>
		<reference ref_id="CVE-2018-1000076" ref_url="https://www.suse.com/security/cve/CVE-2018-1000076/" source="CVE"/>
		<reference ref_id="CVE-2018-1000077" ref_url="https://www.suse.com/security/cve/CVE-2018-1000077/" source="CVE"/>
		<reference ref_id="CVE-2018-1000078" ref_url="https://www.suse.com/security/cve/CVE-2018-1000078/" source="CVE"/>
		<reference ref_id="CVE-2018-1000079" ref_url="https://www.suse.com/security/cve/CVE-2018-1000079/" source="CVE"/>
		<reference ref_id="CVE-2018-16395" ref_url="https://www.suse.com/security/cve/CVE-2018-16395/" source="CVE"/>
		<reference ref_id="CVE-2018-16396" ref_url="https://www.suse.com/security/cve/CVE-2018-16396/" source="CVE"/>
		<reference ref_id="CVE-2018-6914" ref_url="https://www.suse.com/security/cve/CVE-2018-6914/" source="CVE"/>
		<reference ref_id="CVE-2018-8777" ref_url="https://www.suse.com/security/cve/CVE-2018-8777/" source="CVE"/>
		<reference ref_id="CVE-2018-8778" ref_url="https://www.suse.com/security/cve/CVE-2018-8778/" source="CVE"/>
		<reference ref_id="CVE-2018-8779" ref_url="https://www.suse.com/security/cve/CVE-2018-8779/" source="CVE"/>
		<reference ref_id="CVE-2018-8780" ref_url="https://www.suse.com/security/cve/CVE-2018-8780/" source="CVE"/>
		<reference ref_id="CVE-2019-15845" ref_url="https://www.suse.com/security/cve/CVE-2019-15845/" source="CVE"/>
		<reference ref_id="CVE-2019-16201" ref_url="https://www.suse.com/security/cve/CVE-2019-16201/" source="CVE"/>
		<reference ref_id="CVE-2019-16254" ref_url="https://www.suse.com/security/cve/CVE-2019-16254/" source="CVE"/>
		<reference ref_id="CVE-2019-16255" ref_url="https://www.suse.com/security/cve/CVE-2019-16255/" source="CVE"/>
		<reference ref_id="CVE-2019-8320" ref_url="https://www.suse.com/security/cve/CVE-2019-8320/" source="CVE"/>
		<reference ref_id="CVE-2019-8321" ref_url="https://www.suse.com/security/cve/CVE-2019-8321/" source="CVE"/>
		<reference ref_id="CVE-2019-8322" ref_url="https://www.suse.com/security/cve/CVE-2019-8322/" source="CVE"/>
		<reference ref_id="CVE-2019-8323" ref_url="https://www.suse.com/security/cve/CVE-2019-8323/" source="CVE"/>
		<reference ref_id="CVE-2019-8324" ref_url="https://www.suse.com/security/cve/CVE-2019-8324/" source="CVE"/>
		<reference ref_id="CVE-2019-8325" ref_url="https://www.suse.com/security/cve/CVE-2019-8325/" source="CVE"/>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<description>
This update for ruby2.1 fixes the following issues:

Security issues fixed:

- CVE-2015-9096: Fixed an SMTP command injection via CRLFsequences in a RCPT TO or MAIL FROM command (bsc#1043983).
- CVE-2016-7798: Fixed an IV Reuse in GCM Mode (bsc#1055265).
- CVE-2017-0898: Fixed a buffer underrun vulnerability in Kernel.sprintf (bsc#1058755).
- CVE-2017-0899: Fixed an issue with malicious gem specifications, insufficient sanitation when printing gem specifications could have included terminal characters (bsc#1056286).
- CVE-2017-0900: Fixed an issue with malicious gem specifications, the query command could have led to a denial of service attack against clients (bsc#1056286).
- CVE-2017-0901: Fixed an issue with malicious gem specifications, potentially overwriting arbitrary files on the client system (bsc#1056286).
- CVE-2017-0902: Fixed an issue with malicious gem specifications, that could have enabled MITM attacks against clients (bsc#1056286).
- CVE-2017-0903: Fixed an unsafe object deserialization vulnerability (bsc#1062452).
- CVE-2017-9228: Fixed a heap out-of-bounds write in bitset_set_range() during regex compilation (bsc#1069607).
- CVE-2017-9229: Fixed an invalid pointer dereference in left_adjust_char_head() in oniguruma (bsc#1069632).
- CVE-2017-10784: Fixed an escape sequence injection vulnerability in the Basic authentication of WEBrick (bsc#1058754).
- CVE-2017-14033: Fixed a buffer underrun vulnerability in OpenSSL ASN1 decode (bsc#1058757).
- CVE-2017-14064: Fixed an arbitrary memory exposure during a JSON.generate call (bsc#1056782).
- CVE-2017-17405: Fixed a command injection vulnerability in Net::FTP (bsc#1073002).
- CVE-2017-17742: Fixed an HTTP response splitting issue in WEBrick (bsc#1087434).
- CVE-2017-17790: Fixed a command injection in lib/resolv.rb:lazy_initialize() (bsc#1078782).
- CVE-2018-6914: Fixed an unintentional file and directory creation with directory traversal in tempfile and tmpdir (bsc#1087441).
- CVE-2018-8777: Fixed a potential DoS caused by large requests in WEBrick (bsc#1087436).
- CVE-2018-8778: Fixed a buffer under-read in String#unpack (bsc#1087433).
- CVE-2018-8779: Fixed an unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket (bsc#1087440).
- CVE-2018-8780: Fixed an unintentional directory traversal by poisoned NUL byte in Dir (bsc#1087437).
- CVE-2018-16395: Fixed an issue with OpenSSL::X509::Name equality checking (bsc#1112530).
- CVE-2018-16396: Fixed an issue with tainted string handling, where the flag was not propagated in Array#pack and String#unpack with some directives (bsc#1112532).
- CVE-2018-1000073: Fixed a path traversal issue (bsc#1082007).
- CVE-2018-1000074: Fixed an unsafe object deserialization vulnerability in gem owner, allowing arbitrary code execution with specially crafted YAML (bsc#1082008).
- CVE-2018-1000075: Fixed an infinite loop vulnerability due to negative size in tar header causes Denial of Service (bsc#1082014).
- CVE-2018-1000076: Fixed an improper verification of signatures in tarballs (bsc#1082009).
- CVE-2018-1000077: Fixed an improper URL validation in the homepage attribute of ruby gems (bsc#1082010).
- CVE-2018-1000078: Fixed a XSS vulnerability in the homepage attribute when displayed via gem server (bsc#1082011).
- CVE-2018-1000079: Fixed a path traversal issue during gem installation allows to write to arbitrary filesystem locations (bsc#1082058).
- CVE-2019-8320: Fixed a directory traversal issue when decompressing tar files (bsc#1130627).
- CVE-2019-8321: Fixed an escape sequence injection vulnerability in verbose (bsc#1130623).
- CVE-2019-8322: Fixed an escape sequence injection vulnerability in gem owner (bsc#1130622).
- CVE-2019-8323: Fixed an escape sequence injection vulnerability in API response handling (bsc#1130620).
- CVE-2019-8324: Fixed an issue with malicious gems that may have led to arbitrary code execution (bsc#1130617).
- CVE-2019-8325: Fixed an escape sequence injection vulnerability in errors (bsc#1130611).
- CVE-2019-15845: Fixed a NUL injection vulnerability in File.fnmatch and File.fnmatch? (bsc#1152994).
- CVE-2019-16201: Fixed a regular expression denial of service vulnerability in WEBrick's digest access authentication (bsc#1152995).
- CVE-2019-16254: Fixed an HTTP response splitting vulnerability in WEBrick (bsc#1152992).
- CVE-2019-16255: Fixed a code injection vulnerability in Shell#[] and Shell#test (bsc#1152990).
- CVE-2020-10663: Fixed an unsafe object creation vulnerability in JSON (bsc#1171517).

Non-security issue fixed:

- Add conflicts to libruby to make sure ruby and ruby-stdlib are also updated when libruby is updated (bsc#1048072).

Also yast2-ruby-bindings on SLES 12 SP2 LTSS was updated to handle the updated ruby interpreter. (bsc#1172275)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1043983">SUSE bug 1043983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048072">SUSE bug 1048072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055265">SUSE bug 1055265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056286">SUSE bug 1056286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056782">SUSE bug 1056782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058754">SUSE bug 1058754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058755">SUSE bug 1058755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058757">SUSE bug 1058757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062452">SUSE bug 1062452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069607">SUSE bug 1069607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069632">SUSE bug 1069632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073002">SUSE bug 1073002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078782">SUSE bug 1078782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082007">SUSE bug 1082007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082008">SUSE bug 1082008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082009">SUSE bug 1082009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082010">SUSE bug 1082010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082011">SUSE bug 1082011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082014">SUSE bug 1082014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082058">SUSE bug 1082058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087433">SUSE bug 1087433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087434">SUSE bug 1087434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087436">SUSE bug 1087436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087437">SUSE bug 1087437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087440">SUSE bug 1087440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087441">SUSE bug 1087441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112530">SUSE bug 1112530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112532">SUSE bug 1112532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130611">SUSE bug 1130611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130617">SUSE bug 1130617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130620">SUSE bug 1130620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130622">SUSE bug 1130622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130623">SUSE bug 1130623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130627">SUSE bug 1130627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152990">SUSE bug 1152990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152992">SUSE bug 1152992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152994">SUSE bug 1152994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152995">SUSE bug 1152995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171517">SUSE bug 1171517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172275">SUSE bug 1172275</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-9096/">CVE-2015-9096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-9096">CVE-2015-9096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2339/">CVE-2016-2339 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2339">CVE-2016-2339 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7798/">CVE-2016-7798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7798">CVE-2016-7798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0898/">CVE-2017-0898 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0898">CVE-2017-0898 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-0899/">CVE-2017-0899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0899">CVE-2017-0899 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-0900/">CVE-2017-0900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0900">CVE-2017-0900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-0901/">CVE-2017-0901 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0901">CVE-2017-0901 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0902/">CVE-2017-0902 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0902">CVE-2017-0902 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0903/">CVE-2017-0903 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0903">CVE-2017-0903 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10784/">CVE-2017-10784 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10784">CVE-2017-10784 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14033/">CVE-2017-14033 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14033">CVE-2017-14033 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14064/">CVE-2017-14064 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14064">CVE-2017-14064 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17405/">CVE-2017-17405 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17405">CVE-2017-17405 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17742/">CVE-2017-17742 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17742">CVE-2017-17742 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17790/">CVE-2017-17790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17790">CVE-2017-17790 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9228/">CVE-2017-9228 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9228">CVE-2017-9228 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9229/">CVE-2017-9229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9229">CVE-2017-9229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000073/">CVE-2018-1000073 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000073">CVE-2018-1000073 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000074/">CVE-2018-1000074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000074">CVE-2018-1000074 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000075/">CVE-2018-1000075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000075">CVE-2018-1000075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000076/">CVE-2018-1000076 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000076">CVE-2018-1000076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000077/">CVE-2018-1000077 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000077">CVE-2018-1000077 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000078/">CVE-2018-1000078 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000078">CVE-2018-1000078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000079/">CVE-2018-1000079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000079">CVE-2018-1000079 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16395/">CVE-2018-16395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16395">CVE-2018-16395 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16396/">CVE-2018-16396 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16396">CVE-2018-16396 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6914/">CVE-2018-6914 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6914">CVE-2018-6914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8777/">CVE-2018-8777 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8777">CVE-2018-8777 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8778/">CVE-2018-8778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8778">CVE-2018-8778 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8779/">CVE-2018-8779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8779">CVE-2018-8779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8780/">CVE-2018-8780 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8780">CVE-2018-8780 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-15845/">CVE-2019-15845 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15845">CVE-2019-15845 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16201/">CVE-2019-16201 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16201">CVE-2019-16201 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16254/">CVE-2019-16254 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16254">CVE-2019-16254 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-16255/">CVE-2019-16255 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16255">CVE-2019-16255 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8320/">CVE-2019-8320 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8320">CVE-2019-8320 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8321/">CVE-2019-8321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8321">CVE-2019-8321 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8322/">CVE-2019-8322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8322">CVE-2019-8322 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8323/">CVE-2019-8323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8323">CVE-2019-8323 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8324/">CVE-2019-8324 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8324">CVE-2019-8324 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8325/">CVE-2019-8325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8325">CVE-2019-8325 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554758" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554759" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554760" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150006" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk to version 7u261 fixes the following issues:

- CVE-2020-2756: Better mapping of serial ENUMs (bsc#1169511)
- CVE-2020-2757: Less Blocking Array Queues (bsc#1169511)
- CVE-2020-2773: Better signatures in XML (bsc#1169511)
- CVE-2020-2781: Improve TLS session handling (bsc#1169511)
- CVE-2020-2800: Better Headings for HTTP Servers (bsc#1169511)
- CVE-2020-2803: Enhance buffering of byte buffers (bsc#1169511)
- CVE-2020-2805: Enhance typing of methods (bsc#1169511)
- CVE-2020-2830: Better Scanner conversions (bsc#1169511)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2773">CVE-2020-2773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554761" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554762" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554763" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554764" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150007" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1159856" ref_url="https://bugzilla.suse.com/1159856" source="BUGZILLA"/>
		<reference ref_id="1159858" ref_url="https://bugzilla.suse.com/1159858" source="BUGZILLA"/>
		<reference ref_id="1159860" ref_url="https://bugzilla.suse.com/1159860" source="BUGZILLA"/>
		<reference ref_id="1160250" ref_url="https://bugzilla.suse.com/1160250" source="BUGZILLA"/>
		<reference ref_id="1160251" ref_url="https://bugzilla.suse.com/1160251" source="BUGZILLA"/>
		<reference ref_id="1160937" ref_url="https://bugzilla.suse.com/1160937" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15691" ref_url="https://www.suse.com/security/cve/CVE-2019-15691/" source="CVE"/>
		<reference ref_id="CVE-2019-15692" ref_url="https://www.suse.com/security/cve/CVE-2019-15692/" source="CVE"/>
		<reference ref_id="CVE-2019-15693" ref_url="https://www.suse.com/security/cve/CVE-2019-15693/" source="CVE"/>
		<reference ref_id="CVE-2019-15694" ref_url="https://www.suse.com/security/cve/CVE-2019-15694/" source="CVE"/>
		<reference ref_id="CVE-2019-15695" ref_url="https://www.suse.com/security/cve/CVE-2019-15695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006396.html" source="SUSE-SU"/>
		<description>
This update for tigervnc fixes the following issues:

- CVE-2019-15691: Fixed a use-after-return due to incorrect usage of stack memory in ZRLEDecoder (bsc#1159856).
- CVE-2019-15692: Fixed a heap-based buffer overflow in CopyRectDecode (bsc#1160250).
- CVE-2019-15693: Fixed a heap-based buffer overflow in TightDecoder::FilterGradient (bsc#1159858).
- CVE-2019-15694: Fixed a heap-based buffer overflow, caused by improper error handling in processing MemOutStream (bsc#1160251).
- CVE-2019-15695: Fixed a stack-based buffer overflow, which could be triggered from CMsgReader::readSetCursor (bsc#1159860).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159856">SUSE bug 1159856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159858">SUSE bug 1159858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159860">SUSE bug 1159860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160250">SUSE bug 1160250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160251">SUSE bug 1160251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160937">SUSE bug 1160937</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15691/">CVE-2019-15691 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15691">CVE-2019-15691 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15692/">CVE-2019-15692 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15692">CVE-2019-15692 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15693/">CVE-2019-15693 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15693">CVE-2019-15693 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15694/">CVE-2019-15694 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15694">CVE-2019-15694 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15695/">CVE-2019-15695 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15695">CVE-2019-15695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554765" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554766" comment="tigervnc-1.6.0-18.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554767" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150008" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1156353" ref_url="https://bugzilla.suse.com/1156353" source="BUGZILLA"/>
		<reference ref_id="1172466" ref_url="https://bugzilla.suse.com/1172466" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006918.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)
  
This update contains security mitigations for:

- CVE-2020-0543: Fixed a side channel attack against special registers
  which could have resulted in leaking of read values to cores other
  than the one which called it.  This attack is known as Special Register
  Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to
  mitigate the Vector Register and L1D Eviction Sampling aka 'CacheOutAttack'
  attacks. (bsc#1156353)

Microcode Table:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  HSW          C0       6-3c-3/32 00000027-&gt;00000028 Core Gen4
  BDW-U/Y      E0/F0    6-3d-4/c0 0000002e-&gt;0000002f Core Gen5
  HSW-U        C0/D0    6-45-1/72 00000025-&gt;00000026 Core Gen4
  HSW-H        C0       6-46-1/32 0000001b-&gt;0000001c Core Gen4
  BDW-H/E3     E0/G0    6-47-1/22 00000021-&gt;00000022 Core Gen5
  SKL-U/Y      D0       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKL-U23e     K1       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKX-SP       B1       6-55-3/97 01000151-&gt;01000157 Xeon Scalable
  SKX-SP       H0/M0/U0 6-55-4/b7 02000065-&gt;02006906 Xeon Scalable
  SKX-D        M1       6-55-4/b7 02000065-&gt;02006906 Xeon D-21xx
  CLX-SP       B0       6-55-6/bf 0400002c-&gt;04002f01 Xeon Scalable Gen2
  CLX-SP       B1       6-55-7/bf 0500002c-&gt;04002f01 Xeon Scalable Gen2
  SKL-H/S      R0/N0    6-5e-3/36 000000d6-&gt;000000dc Core Gen6; Xeon E3 v5
  AML-Y22      H0       6-8e-9/10 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-U/Y      H0       6-8e-9/c0 000000ca-&gt;000000d6 Core Gen7 Mobile
  CFL-U43e     D0       6-8e-a/c0 000000ca-&gt;000000d6 Core Gen8 Mobile
  WHL-U        W0       6-8e-b/d0 000000ca-&gt;000000d6 Core Gen8 Mobile
  AML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  CML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  WHL-U        V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-G/H/S/E3 B0       6-9e-9/2a 000000ca-&gt;000000d6 Core Gen7; Xeon E3 v6
  CFL-H/S/E3   U0       6-9e-a/22 000000ca-&gt;000000d6 Core Gen8 Desktop, Mobile, Xeon E
  CFL-S        B0       6-9e-b/02 000000ca-&gt;000000d6 Core Gen8
  CFL-H/S      P0       6-9e-c/22 000000ca-&gt;000000d6 Core Gen9
  CFL-H        R0       6-9e-d/22 000000ca-&gt;000000d6 Core Gen9 Mobile

Also contains the Intel CPU Microcode update to 20200520:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061f-&gt;00000621 Xeon E3/E5, Core X
  SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000718-&gt;0000071a Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172466">SUSE bug 1172466</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0548">CVE-2020-0548 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0549">CVE-2020-0549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531024" comment="ucode-intel-20200602-13.68.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150009" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1161951" ref_url="https://bugzilla.suse.com/1161951" source="BUGZILLA"/>
		<reference ref_id="1164871" ref_url="https://bugzilla.suse.com/1164871" source="BUGZILLA"/>
		<reference ref_id="1169025" ref_url="https://bugzilla.suse.com/1169025" source="BUGZILLA"/>
		<reference ref_id="1169625" ref_url="https://bugzilla.suse.com/1169625" source="BUGZILLA"/>
		<reference ref_id="1170383" ref_url="https://bugzilla.suse.com/1170383" source="BUGZILLA"/>
		<reference ref_id="1170618" ref_url="https://bugzilla.suse.com/1170618" source="BUGZILLA"/>
		<reference ref_id="1170620" ref_url="https://bugzilla.suse.com/1170620" source="BUGZILLA"/>
		<reference ref_id="1171098" ref_url="https://bugzilla.suse.com/1171098" source="BUGZILLA"/>
		<reference ref_id="1171195" ref_url="https://bugzilla.suse.com/1171195" source="BUGZILLA"/>
		<reference ref_id="1171202" ref_url="https://bugzilla.suse.com/1171202" source="BUGZILLA"/>
		<reference ref_id="1171218" ref_url="https://bugzilla.suse.com/1171218" source="BUGZILLA"/>
		<reference ref_id="1171219" ref_url="https://bugzilla.suse.com/1171219" source="BUGZILLA"/>
		<reference ref_id="1171689" ref_url="https://bugzilla.suse.com/1171689" source="BUGZILLA"/>
		<reference ref_id="1171698" ref_url="https://bugzilla.suse.com/1171698" source="BUGZILLA"/>
		<reference ref_id="1172032" ref_url="https://bugzilla.suse.com/1172032" source="BUGZILLA"/>
		<reference ref_id="1172221" ref_url="https://bugzilla.suse.com/1172221" source="BUGZILLA"/>
		<reference ref_id="1172317" ref_url="https://bugzilla.suse.com/1172317" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="CVE-2020-12114" ref_url="https://www.suse.com/security/cve/CVE-2020-12114/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
  This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12114: Fixed A pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).

The following non-security bugs were fixed:

- can, slip: Protect tty-&gt;disc_data in write_wakeup and close with RCU (bsc#1171698).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).
- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).
- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).
- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).
- Drivers: hv: vmbus: Make panic reporting to be more useful (bsc#1170618).
- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).
- EDAC: Convert to new X86 CPU match macros
- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).
- ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).
- KEYS: reaching the keys quotas correctly (bsc#1171689).
- NFS: Cleanup if nfs_match_client is interrupted (bsc#1169025).
- NFS: Fix a double unlock from nfs_match,get_client (bsc#1169025).
- NFS: make nfs_match_client killable (bsc#1169025).
- NFS: Unlock requests must never fail (bsc#1172032).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (bsc#1161951 ltc#183551).
- scsi: ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).
- x86/dumpstack/64: Handle faults when printing the 'Stack: ' part of an OOPS (bsc#1170383).
- x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170620).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).
- x86: hyperv: report value of misc_features (git fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161951">SUSE bug 1161951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164871">SUSE bug 1164871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169025">SUSE bug 1169025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169625">SUSE bug 1169625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170383">SUSE bug 1170383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170618">SUSE bug 1170618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170620">SUSE bug 1170620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171098">SUSE bug 1171098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171195">SUSE bug 1171195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171202">SUSE bug 1171202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171218">SUSE bug 1171218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171689">SUSE bug 1171689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171698">SUSE bug 1171698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172032">SUSE bug 1172032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172221">SUSE bug 1172221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172317">SUSE bug 1172317</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12114/">CVE-2020-12114 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12114">CVE-2020-12114 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12652">CVE-2020-12652 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12656">CVE-2020-12656 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554768" comment="kernel-default-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554769" comment="kernel-default-base-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554770" comment="kernel-default-devel-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538431" comment="kernel-default-kgraft-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554771" comment="kernel-default-man-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538432" comment="kernel-devel-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538433" comment="kernel-macros-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538434" comment="kernel-source-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554772" comment="kernel-syms-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538436" comment="kgraft-patch-4_4_180-94_121-default-1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150010" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1159478" ref_url="https://bugzilla.suse.com/1159478" source="BUGZILLA"/>
		<reference ref_id="1159479" ref_url="https://bugzilla.suse.com/1159479" source="BUGZILLA"/>
		<reference ref_id="1159482" ref_url="https://bugzilla.suse.com/1159482" source="BUGZILLA"/>
		<reference ref_id="1159486" ref_url="https://bugzilla.suse.com/1159486" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18388" ref_url="https://www.suse.com/security/cve/CVE-2019-18388/" source="CVE"/>
		<reference ref_id="CVE-2019-18389" ref_url="https://www.suse.com/security/cve/CVE-2019-18389/" source="CVE"/>
		<reference ref_id="CVE-2019-18390" ref_url="https://www.suse.com/security/cve/CVE-2019-18390/" source="CVE"/>
		<reference ref_id="CVE-2019-18391" ref_url="https://www.suse.com/security/cve/CVE-2019-18391/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<description>
This update for virglrenderer fixes the following issues:

- CVE-2019-18388: Fixed a null pointer dereference which could have led
   to denial of service (bsc#1159479).
- CVE-2019-18390: Fixed an out of bound read which could have led to
  denial of service (bsc#1159478).
- CVE-2019-18389: Fixed a heap buffer overflow which could have led to
  guest escape or denial of service (bsc#1159482).
- CVE-2019-18391: Fixed a heap based buffer overflow which could have led to
  guest escape or denial of service (bsc#1159486).  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159478">SUSE bug 1159478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159479">SUSE bug 1159479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159482">SUSE bug 1159482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159486">SUSE bug 1159486</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18388/">CVE-2019-18388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18388">CVE-2019-18388 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18389/">CVE-2019-18389 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18389">CVE-2019-18389 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18390/">CVE-2019-18390 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18390">CVE-2019-18390 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18391/">CVE-2019-18391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18391">CVE-2019-18391 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554773" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150011" version="1" class="patch">
	<metadata>
		<title>Security update for adns (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1172265" ref_url="https://bugzilla.suse.com/1172265" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9103" ref_url="https://www.suse.com/security/cve/CVE-2017-9103/" source="CVE"/>
		<reference ref_id="CVE-2017-9104" ref_url="https://www.suse.com/security/cve/CVE-2017-9104/" source="CVE"/>
		<reference ref_id="CVE-2017-9105" ref_url="https://www.suse.com/security/cve/CVE-2017-9105/" source="CVE"/>
		<reference ref_id="CVE-2017-9106" ref_url="https://www.suse.com/security/cve/CVE-2017-9106/" source="CVE"/>
		<reference ref_id="CVE-2017-9107" ref_url="https://www.suse.com/security/cve/CVE-2017-9107/" source="CVE"/>
		<reference ref_id="CVE-2017-9108" ref_url="https://www.suse.com/security/cve/CVE-2017-9108/" source="CVE"/>
		<reference ref_id="CVE-2017-9109" ref_url="https://www.suse.com/security/cve/CVE-2017-9109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006937.html" source="SUSE-SU"/>
		<description>
This update for adns fixes the following issues:
	  
- CVE-2017-9103,CVE-2017-9104,CVE-2017-9105,CVE-2017-9109: Fixed an issue in local recursive resolver
  which could have led to remote code execution (bsc#1172265).
- CVE-2017-9106: Fixed an issue with upstream DNS data sources which could have led to denial of 
  service (bsc#1172265).
- CVE-2017-9107: Fixed an issue when quering domain names which could have led to denial of service (bsc#1172265).
- CVE-2017-9108: Fixed an issue which could have led to denial of service (bsc#1172265).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-12"/>
	<updated date="2020-06-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9103/">CVE-2017-9103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9103">CVE-2017-9103 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9104/">CVE-2017-9104 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9104">CVE-2017-9104 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9105/">CVE-2017-9105 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9105">CVE-2017-9105 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9106/">CVE-2017-9106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9106">CVE-2017-9106 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9107/">CVE-2017-9107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9107">CVE-2017-9107 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9108/">CVE-2017-9108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9108">CVE-2017-9108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9109/">CVE-2017-9109 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9109">CVE-2017-9109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554774" comment="libadns1-1.4-103.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150012" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1157888" ref_url="https://bugzilla.suse.com/1157888" source="BUGZILLA"/>
		<reference ref_id="1158003" ref_url="https://bugzilla.suse.com/1158003" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1158007" ref_url="https://bugzilla.suse.com/1158007" source="BUGZILLA"/>
		<reference ref_id="1161181" ref_url="https://bugzilla.suse.com/1161181" source="BUGZILLA"/>
		<reference ref_id="1167152" ref_url="https://bugzilla.suse.com/1167152" source="BUGZILLA"/>
		<reference ref_id="1168140" ref_url="https://bugzilla.suse.com/1168140" source="BUGZILLA"/>
		<reference ref_id="1168142" ref_url="https://bugzilla.suse.com/1168142" source="BUGZILLA"/>
		<reference ref_id="1169392" ref_url="https://bugzilla.suse.com/1169392" source="BUGZILLA"/>
		<reference ref_id="1172205" ref_url="https://bugzilla.suse.com/1172205" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19581" ref_url="https://www.suse.com/security/cve/CVE-2019-19581/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-11739" ref_url="https://www.suse.com/security/cve/CVE-2020-11739/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742/" source="CVE"/>
		<reference ref_id="CVE-2020-7211" ref_url="https://www.suse.com/security/cve/CVE-2020-7211/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
  This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1172205).
- CVE-2020-11742: Bad continuation handling in GNTTABOP_copy (bsc#1169392).
- CVE-2020-11740, CVE-2020-11741: xen: XSA-313 multiple xenoprof issues (bsc#1168140).
- CVE-2020-11739: Missing memory barriers in read-write unlock paths (bsc#1168142).
- CVE-2019-19583: Fixed improper checks which could have allowed HVM/PVH guest userspace code to crash the guest, leading to a guest denial of service (bsc#1158004 XSA-308).
- CVE-2019-19581: Fixed a potential out of bounds on 32-bit Arm (bsc#1158003 XSA-307).
- CVE-2019-19580: Fixed a privilege escalation where a malicious PV guest administrator could have been able to escalate their privilege to that of the host (bsc#1158006 XSA-310).
- CVE-2019-19579: Fixed a privilege escalation where an untrusted domain with access to a physical device can DMA into host memory (bsc#1157888 XSA-306).
- CVE-2019-19578: Fixed an issue where a malicious or buggy PV guest could have caused hypervisor crash resulting in denial of service affecting the entire host (bsc#1158005 XSA-309).
- CVE-2019-19577: Fixed an issue where a malicious guest administrator could have caused Xen to access data structures while they are being modified leading to a crash (bsc#1158007 XSA-311). 
- Xenstored Crashed during VM install (bsc#1167152)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-16"/>
	<updated date="2020-06-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161181">SUSE bug 1161181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167152">SUSE bug 1167152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168142">SUSE bug 1168142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19577">CVE-2019-19577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19578">CVE-2019-19578 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19579">CVE-2019-19579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19580">CVE-2019-19580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19581/">CVE-2019-19581 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19581">CVE-2019-19581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19583">CVE-2019-19583 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11739/">CVE-2020-11739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11739">CVE-2020-11739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11740">CVE-2020-11740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11741">CVE-2020-11741 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11742">CVE-2020-11742 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7211/">CVE-2020-7211 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7211">CVE-2020-7211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538437" comment="xen-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538438" comment="xen-doc-html-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538439" comment="xen-libs-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538440" comment="xen-libs-32bit-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538441" comment="xen-tools-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538442" comment="xen-tools-domU-4.9.4_06-3.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150013" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1102840" ref_url="https://bugzilla.suse.com/1102840" source="BUGZILLA"/>
		<reference ref_id="1160039" ref_url="https://bugzilla.suse.com/1160039" source="BUGZILLA"/>
		<reference ref_id="1170601" ref_url="https://bugzilla.suse.com/1170601" source="BUGZILLA"/>
		<reference ref_id="1171863" ref_url="https://bugzilla.suse.com/1171863" source="BUGZILLA"/>
		<reference ref_id="1171864" ref_url="https://bugzilla.suse.com/1171864" source="BUGZILLA"/>
		<reference ref_id="1171866" ref_url="https://bugzilla.suse.com/1171866" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543/" source="CVE"/>
		<reference ref_id="CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878/" source="CVE"/>
		<reference ref_id="CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006972.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

- CVE-2020-10543: Fixed a heap buffer overflow in regular expression compiler which could have 
  allowed overwriting of allocated memory with attacker's data (bsc#1171863).
- CVE-2020-10878: Fixed multiple integer overflows which could have allowed the insertion of 
  instructions into the compiled form of Perl regular expression (bsc#1171864).
- CVE-2020-12723: Fixed an attacker's corruption of the intermediate language state of a 
  compiled regular expression (bsc#1171866).
- Fixed utf8 handling in perldoc by useing 'term' instead of 'man' (bsc#1170601).
- Some packages make assumptions about the date and time they are built. 
  This update will solve the issues caused by calling the perl function timelocal
  expressing the year with two digit only instead of four digits. (bsc#1102840) (bsc#1160039)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-18"/>
	<updated date="2020-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102840">SUSE bug 1102840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160039">SUSE bug 1160039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170601">SUSE bug 1170601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171863">SUSE bug 1171863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171864">SUSE bug 1171864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171866">SUSE bug 1171866</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10543">CVE-2020-10543 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10878">CVE-2020-10878 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12723">CVE-2020-12723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554775" comment="perl-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551488" comment="perl-32bit-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554776" comment="perl-base-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531037" comment="perl-doc-5.18.2-12.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150014" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 65 (bsc#1172277 and bsc#1169511)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551490" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542540" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551491" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150015" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

java-1_8_0-ibm was updated to Java 8.0 Service Refresh 6 Fix Pack 10 (bsc#1172277,bsc#1169511,bsc#1160968)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2754: Forwarded references to Nashorn 
- CVE-2020-2755: Improved Nashorn matching 
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
- CVE-2019-2949: Fixed an issue which could have resulted in unauthorized access to critical data 
- Added RSA PSS SUPPORT TO IBMPKCS11IMPL
- The pack200 and unpack200 alternatives should be slaves of java (bsc#1171352).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2949">CVE-2019-2949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2754">CVE-2020-2754 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2755">CVE-2020-2755 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551492" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542541" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150016" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1160398" ref_url="https://bugzilla.suse.com/1160398" source="BUGZILLA"/>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version jdk8u252 fixes the following issues:

- CVE-2020-2754: Forward references to Nashorn (bsc#1169511)
- CVE-2020-2755: Improve Nashorn matching (bsc#1169511)
- CVE-2020-2756: Better mapping of serial ENUMs (bsc#1169511)
- CVE-2020-2757: Less Blocking Array Queues (bsc#1169511)
- CVE-2020-2773: Better signatures in XML (bsc#1169511)
- CVE-2020-2781: Improve TLS session handling (bsc#1169511)
- CVE-2020-2800: Better Headings for HTTP Servers (bsc#1169511)
- CVE-2020-2803: Enhance buffering of byte buffers (bsc#1169511)
- CVE-2020-2805: Enhance typing of methods (bsc#1169511)
- CVE-2020-2830: Better Scanner conversions (bsc#1169511)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160398">SUSE bug 1160398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2754">CVE-2020-2754 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2755">CVE-2020-2755 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2773">CVE-2020-2773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554777" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554778" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554779" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554780" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150017" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1172049" ref_url="https://bugzilla.suse.com/1172049" source="BUGZILLA"/>
		<reference ref_id="1172781" ref_url="https://bugzilla.suse.com/1172781" source="BUGZILLA"/>
		<reference ref_id="1172782" ref_url="https://bugzilla.suse.com/1172782" source="BUGZILLA"/>
		<reference ref_id="1172783" ref_url="https://bugzilla.suse.com/1172783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766/" source="CVE"/>
		<reference ref_id="CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767/" source="CVE"/>
		<reference ref_id="CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007008.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-10768: Fixed an issue with the prctl() function which could have allowed indirect branch speculation even after it has been disabled (bsc#1172783).
- CVE-2020-10767: Fixed an issue where the Indirect Branch Prediction Barrier (IBPB) would have been disabled when STIBP is unavailable or enhanced IBRS is available making the system vulnerable to spectre v2 (bsc#1172782).
- CVE-2020-10766: Fixed an issue with Linux scheduler which could have allowed an attacker to turn off the SSBD protection (bsc#1172781).

- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1172049).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-23"/>
	<updated date="2020-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172049">SUSE bug 1172049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10766">CVE-2020-10766 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10767">CVE-2020-10767 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10768">CVE-2020-10768 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554781" comment="kernel-default-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554782" comment="kernel-default-base-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554783" comment="kernel-default-devel-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538446" comment="kernel-default-kgraft-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554784" comment="kernel-default-man-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538447" comment="kernel-devel-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538448" comment="kernel-macros-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538449" comment="kernel-source-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554785" comment="kernel-syms-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538451" comment="kgraft-patch-4_4_180-94_124-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150018" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1173027" ref_url="https://bugzilla.suse.com/1173027" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007017.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious server to overwrite a local file when using the -J option (bsc#1173027).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-24"/>
	<updated date="2020-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8177">CVE-2020-8177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554786" comment="curl-7.37.0-37.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554787" comment="libcurl4-7.37.0-37.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551499" comment="libcurl4-32bit-7.37.0-37.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150019" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1126230" ref_url="https://bugzilla.suse.com/1126230" source="BUGZILLA"/>
		<reference ref_id="1136082" ref_url="https://bugzilla.suse.com/1136082" source="BUGZILLA"/>
		<reference ref_id="1157607" ref_url="https://bugzilla.suse.com/1157607" source="BUGZILLA"/>
		<reference ref_id="1161096" ref_url="https://bugzilla.suse.com/1161096" source="BUGZILLA"/>
		<reference ref_id="1162553" ref_url="https://bugzilla.suse.com/1162553" source="BUGZILLA"/>
		<reference ref_id="1171670" ref_url="https://bugzilla.suse.com/1171670" source="BUGZILLA"/>
		<reference ref_id="1171921" ref_url="https://bugzilla.suse.com/1171921" source="BUGZILLA"/>
		<reference ref_id="1171960" ref_url="https://bugzilla.suse.com/1171960" source="BUGZILLA"/>
		<reference ref_id="1171961" ref_url="https://bugzilla.suse.com/1171961" source="BUGZILLA"/>
		<reference ref_id="1171963" ref_url="https://bugzilla.suse.com/1171963" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10753" ref_url="https://www.suse.com/security/cve/CVE-2020-10753/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007029.html" source="SUSE-SU"/>
		<description>
This is a version update for ceph to version 12.2.13:

Security issue fixed: 	  

- CVE-2020-10753: Fixed an HTTP header injection via CORS ExposeHeader tag (bsc#1171921).

- Notable changes in this update for ceph:
  * mgr: telemetry: backported and now available on SES5.5. Please
    consider enabling via 'ceph telemetry on' (bsc#1171670)
  * OSD heartbeat ping time: new health warning, options and admin
    commands (bsc#1171960)
  * 'osd_calc_pg_upmaps_max_stddev' ceph.conf parameter has been
    removed; use 'upmap_max_deviation' instead (bsc#1171961)
  * Default maximum concurrent bluestore rocksdb compaction threads
    raised from 1 to 2 for improved ability to keep up with rgw
    bucket index workloads (bsc#1171963)

- Bug fixes in this ceph update:
  * mon: Error message displayed when mon_osd_max_split_count would be
    exceeded is not as user-friendly as it could be (bsc#1126230)
  * ceph_volume_client: remove ceph mds calls in favor of ceph fs
    calls (bsc#1136082)
  * rgw: crypt: permit RGW-AUTO/default with SSE-S3 headers
    (bsc#1157607)
  * mon/AuthMonitor: don't validate fs caps on authorize (bsc#1161096)

- Additional bug fixes:
  * ceph-volume: strip _dmcrypt suffix in simple scan json output (bsc#1162553)		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-25"/>
	<updated date="2020-06-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1126230">SUSE bug 1126230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136082">SUSE bug 1136082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157607">SUSE bug 1157607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161096">SUSE bug 1161096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162553">SUSE bug 1162553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171670">SUSE bug 1171670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171921">SUSE bug 1171921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171960">SUSE bug 1171960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171961">SUSE bug 1171961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171963">SUSE bug 1171963</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10753/">CVE-2020-10753 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10753">CVE-2020-10753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554788" comment="ceph-common-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554789" comment="libcephfs2-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554790" comment="librados2-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554791" comment="libradosstriper1-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554792" comment="librbd1-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554793" comment="librgw2-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554794" comment="python-cephfs-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554795" comment="python-rados-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554796" comment="python-rbd-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554797" comment="python-rgw-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150020" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="1172437" ref_url="https://bugzilla.suse.com/1172437" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007044.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_116 fixes several issues.

The following security issues were fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171252).
- CVE-2020-1749: Fixed an issue where some ipv6 protocols were not encrypted over ipsec tunnel (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721281" comment="kernel-default 4.4.180-94.116 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719610" comment="kgraft-patch-4_4_180-94_116-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538462" comment="kgraft-patch-4_4_180-94_116-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150021" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1172437" ref_url="https://bugzilla.suse.com/1172437" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007037.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_113 fixes one issue.

The following security issue was fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721279" comment="kernel-default 4.4.180-94.113 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719606" comment="kgraft-patch-4_4_180-94_113-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538463" comment="kgraft-patch-4_4_180-94_113-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150022" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1172437" ref_url="https://bugzilla.suse.com/1172437" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007037.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_107 fixes one issue.

The following security issue was fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721280" comment="kernel-default 4.4.180-94.107 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719608" comment="kgraft-patch-4_4_180-94_107-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538464" comment="kgraft-patch-4_4_180-94_107-default-6-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150023" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1172140" ref_url="https://bugzilla.suse.com/1172140" source="BUGZILLA"/>
		<reference ref_id="1172437" ref_url="https://bugzilla.suse.com/1172437" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007043.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_103 fixes several issues.

The following security issues were fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
- CVE-2019-15666: Fixed an out of bounds read __xfrm_policy_unlink, which could have led to denial of service (bsc#1172140).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172140">SUSE bug 1172140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15666">CVE-2019-15666 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721277" comment="kernel-default 4.4.180-94.103 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719602" comment="kgraft-patch-4_4_180-94_103-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538465" comment="kgraft-patch-4_4_180-94_103-default-8-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150024" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1172140" ref_url="https://bugzilla.suse.com/1172140" source="BUGZILLA"/>
		<reference ref_id="1172437" ref_url="https://bugzilla.suse.com/1172437" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007043.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_100 fixes several issues.

The following security issues were fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
- CVE-2019-15666: Fixed an out of bounds read __xfrm_policy_unlink, which could have led to denial of service (bsc#1172140).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172140">SUSE bug 1172140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15666">CVE-2019-15666 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721278" comment="kernel-default 4.4.180-94.100 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719604" comment="kgraft-patch-4_4_180-94_100-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538466" comment="kgraft-patch-4_4_180-94_100-default-8-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150025" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1172140" ref_url="https://bugzilla.suse.com/1172140" source="BUGZILLA"/>
		<reference ref_id="1172437" ref_url="https://bugzilla.suse.com/1172437" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007043.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_97 fixes several issues.

The following security issues were fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
- CVE-2019-15666: Fixed an out of bounds read __xfrm_policy_unlink, which could have led to denial of service (bsc#1172140).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172140">SUSE bug 1172140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15666">CVE-2019-15666 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721153" comment="kernel-default 4.4.180-94.97 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719420" comment="kgraft-patch-4_4_180-94_97-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538467" comment="kgraft-patch-4_4_180-94_97-default-10-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150026" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1172405" ref_url="https://bugzilla.suse.com/1172405" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8022" ref_url="https://www.suse.com/security/cve/CVE-2020-8022/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007047.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-8022: Fixed a local root exploit due to improper permissions (bsc#1172405)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172405">SUSE bug 1172405</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8022/">CVE-2020-8022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8022">CVE-2020-8022 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531054" comment="tomcat-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531055" comment="tomcat-admin-webapps-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531056" comment="tomcat-docs-webapp-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531057" comment="tomcat-el-3_0-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531058" comment="tomcat-javadoc-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531059" comment="tomcat-jsp-2_3-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531060" comment="tomcat-lib-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531061" comment="tomcat-servlet-3_1-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531062" comment="tomcat-webapps-8.0.53-29.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150027" version="1" class="patch">
	<metadata>
		<title>Security update for python3-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1054413" ref_url="https://bugzilla.suse.com/1054413" source="BUGZILLA"/>
		<reference ref_id="1073879" ref_url="https://bugzilla.suse.com/1073879" source="BUGZILLA"/>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="1122668" ref_url="https://bugzilla.suse.com/1122668" source="BUGZILLA"/>
		<reference ref_id="761500" ref_url="https://bugzilla.suse.com/761500" source="BUGZILLA"/>
		<reference ref_id="922448" ref_url="https://bugzilla.suse.com/922448" source="BUGZILLA"/>
		<reference ref_id="929736" ref_url="https://bugzilla.suse.com/929736" source="BUGZILLA"/>
		<reference ref_id="935252" ref_url="https://bugzilla.suse.com/935252" source="BUGZILLA"/>
		<reference ref_id="945455" ref_url="https://bugzilla.suse.com/945455" source="BUGZILLA"/>
		<reference ref_id="947357" ref_url="https://bugzilla.suse.com/947357" source="BUGZILLA"/>
		<reference ref_id="961596" ref_url="https://bugzilla.suse.com/961596" source="BUGZILLA"/>
		<reference ref_id="967128" ref_url="https://bugzilla.suse.com/967128" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007049.html" source="SUSE-SU"/>
		<description>
This update for python3-requests provides the following fix:

python-requests was updated to 2.20.1.

Update to version 2.20.1:

* Fixed bug with unintended Authorization header stripping for
  redirects using default ports (http/80, https/443).

Update to version 2.20.0:

* Bugfixes

  + Content-Type header parsing is now case-insensitive
    (e.g. charset=utf8 v Charset=utf8).
  + Fixed exception leak where certain redirect urls would raise
    uncaught urllib3 exceptions.
  + Requests removes Authorization header from requests redirected
    from https to http on the same hostname. (CVE-2018-18074)
  + should_bypass_proxies now handles URIs without hostnames
    (e.g. files).

Update to version 2.19.1:

* Fixed issue where status_codes.py’s init function failed trying
  to append to a __doc__ value of None.

Update to version 2.19.0:

* Improvements

  + Warn about possible slowdown with cryptography version &lt; 1.3.4
  + Check host in proxy URL, before forwarding request to adapter.
  + Maintain fragments properly across redirects. (RFC7231 7.1.2)
  + Removed use of cgi module to expedite library load time.
  + Added support for SHA-256 and SHA-512 digest auth algorithms.
  + Minor performance improvement to Request.content.

* Bugfixes

  + Parsing empty Link headers with parse_header_links() no longer
    return one bogus entry.
  + Fixed issue where loading the default certificate bundle from
    a zip archive would raise an IOError.
  + Fixed issue with unexpected ImportError on windows system
    which do not support winreg module.
  + DNS resolution in proxy bypass no longer includes the username
    and password in the request. This also fixes the issue of DNS
    queries failing on macOS.
  + Properly normalize adapter prefixes for url comparison.
  + Passing None as a file pointer to the files param no longer
    raises an exception.
  + Calling copy on a RequestsCookieJar will now preserve the
    cookie policy correctly.

Update to version 2.18.4:

* Improvements

  + Error messages for invalid headers now include the header name
    for easier debugging

Update to version 2.18.3:

* Improvements
  + Running $ python -m requests.help now includes the installed
    version of idna.
* Bugfixes
  + Fixed issue where Requests would raise ConnectionError instead
    of SSLError when encountering SSL problems when using urllib3
    v1.22.

- Add ca-certificates (and ca-certificates-mozilla) to dependencies, otherwise https
  connections will fail.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054413">SUSE bug 1054413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073879">SUSE bug 1073879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122668">SUSE bug 1122668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761500">SUSE bug 761500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922448">SUSE bug 922448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929736">SUSE bug 929736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935252">SUSE bug 935252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945455">SUSE bug 945455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947357">SUSE bug 947357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961596">SUSE bug 961596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967128">SUSE bug 967128</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2296">CVE-2015-2296 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009525269" comment="python3-certifi-2018.4.16-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525270" comment="python3-chardet-3.0.4-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531063" comment="python3-requests-2.20.1-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525271" comment="python3-urllib3-1.22-3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150028" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1172906" ref_url="https://bugzilla.suse.com/1172906" source="BUGZILLA"/>
		<reference ref_id="1172935" ref_url="https://bugzilla.suse.com/1172935" source="BUGZILLA"/>
		<reference ref_id="1173197" ref_url="https://bugzilla.suse.com/1173197" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093/" source="CVE"/>
		<reference ref_id="CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154/" source="CVE"/>
		<reference ref_id="CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007050.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-14954: Fixed a response injection due to a STARTTLS buffering issue which was
  affecting IMAP, SMTP, and POP3 (bsc#1173197).
- CVE-2020-14093: Fixed a potential IMAP Man-in-the-Middle attack via a PREAUTH response (bsc#1172906, bsc#1172935).
- CVE-2020-14154: Fixed an issue where Mutt was ignoring an expired certificate and was
  proceeding with a connection (bsc#1172906, bsc#1172935).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-29"/>
	<updated date="2020-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173197">SUSE bug 1173197</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14093">CVE-2020-14093 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14154">CVE-2020-14154 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14954">CVE-2020-14954 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554798" comment="mutt-1.10.1-55.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150029" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1167373" ref_url="https://bugzilla.suse.com/1167373" source="BUGZILLA"/>
		<reference ref_id="1173304" ref_url="https://bugzilla.suse.com/1173304" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860/" source="CVE"/>
		<reference ref_id="CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007055.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-14059: Fixed an issue where a client could potentially deny the service of a server 
  during TLS Handshake (bsc#1173304).
- CVE-2019-18860: Fixed handling of invalid domain names in cachemgr.cgi (bsc#1167373).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167373">SUSE bug 1167373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173304">SUSE bug 1173304</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18860">CVE-2019-18860 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14059">CVE-2020-14059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554799" comment="squid-3.5.21-26.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150030" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1169740" ref_url="https://bugzilla.suse.com/1169740" source="BUGZILLA"/>
		<reference ref_id="1171355" ref_url="https://bugzilla.suse.com/1171355" source="BUGZILLA"/>
		<reference ref_id="1172651" ref_url="https://bugzilla.suse.com/1172651" source="BUGZILLA"/>
		<reference ref_id="1173334" ref_url="https://bugzilla.suse.com/1173334" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8956" ref_url="https://www.suse.com/security/cve/CVE-2018-8956/" source="CVE"/>
		<reference ref_id="CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868/" source="CVE"/>
		<reference ref_id="CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817/" source="CVE"/>
		<reference ref_id="CVE-2020-15025" ref_url="https://www.suse.com/security/cve/CVE-2020-15025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007056.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

ntp was updated to 4.2.8p15

- CVE-2020-11868: Fixed an issue which a server mode packet with spoofed source address 
  frequently send to the client ntpd could have caused denial of service (bsc#1169740).
- CVE-2018-8956: Fixed an issue which could have allowed remote attackers to prevent 
  a broadcast client from synchronizing its clock with a broadcast NTP server via spoofed 
  mode 3 and mode 5 packets (bsc#1171355).
- CVE-2020-13817: Fixed an issue which an off-path attacker with the ability to query time 
  from victim's ntpd instance could have modified the victim's clock by a limited amount (bsc#1172651).
- CVE-2020-15025: Fixed an issue which remote attacker could have caused denial of service by consuming 
  the memory when a CMAC key was used andassociated with a CMAC algorithm in the ntp.keys (bsc#1173334).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169740">SUSE bug 1169740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171355">SUSE bug 1171355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172651">SUSE bug 1172651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173334">SUSE bug 1173334</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8956/">CVE-2018-8956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8956">CVE-2018-8956 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11868">CVE-2020-11868 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13817">CVE-2020-13817 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15025/">CVE-2020-15025 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15025">CVE-2020-15025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554800" comment="ntp-4.2.8p15-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554801" comment="ntp-doc-4.2.8p15-88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150031" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006397.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_97 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721153" comment="kernel-default 4.4.180-94.97 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719420" comment="kgraft-patch-4_4_180-94_97-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538468" comment="kgraft-patch-4_4_180-94_97-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150032" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="1168669" ref_url="https://bugzilla.suse.com/1168669" source="BUGZILLA"/>
		<reference ref_id="1169746" ref_url="https://bugzilla.suse.com/1169746" source="BUGZILLA"/>
		<reference ref_id="1170908" ref_url="https://bugzilla.suse.com/1170908" source="BUGZILLA"/>
		<reference ref_id="1171978" ref_url="https://bugzilla.suse.com/1171978" source="BUGZILLA"/>
		<reference ref_id="1173022" ref_url="https://bugzilla.suse.com/1173022" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007069.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to version 3.53.1

- CVE-2020-12402: Fixed a potential side channel attack during RSA key generation (bsc#1173032).
- CVE-2020-12399: Fixed a timing attack on DSA signature generation (bsc#1171978).
- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- Fixed various FIPS issues in libfreebl3 which were causing segfaults in the test suite of chrony (bsc#1168669).
- Fixed an issue where Firefox tab was crashing (bsc#1170908).

Release notes: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes

mozilla-nspr to version 4.25
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-03"/>
	<updated date="2020-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168669">SUSE bug 1168669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169746">SUSE bug 1169746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170908">SUSE bug 1170908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171978">SUSE bug 1171978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173022">SUSE bug 1173022</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17006">CVE-2019-17006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12399">CVE-2020-12399 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554802" comment="libfreebl3-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551505" comment="libfreebl3-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554803" comment="libfreebl3-hmac-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551507" comment="libfreebl3-hmac-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554804" comment="libsoftokn3-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551509" comment="libsoftokn3-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554805" comment="libsoftokn3-hmac-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551511" comment="libsoftokn3-hmac-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554806" comment="mozilla-nspr-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551513" comment="mozilla-nspr-32bit-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542839" comment="mozilla-nspr-devel-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554807" comment="mozilla-nss-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551515" comment="mozilla-nss-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554808" comment="mozilla-nss-certs-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551517" comment="mozilla-nss-certs-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542840" comment="mozilla-nss-devel-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554809" comment="mozilla-nss-sysinit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551519" comment="mozilla-nss-sysinit-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554810" comment="mozilla-nss-tools-3.53.1-58.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150033" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006397.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.178-94_91 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721150" comment="kernel-default 4.4.178-94.91 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719417" comment="kgraft-patch-4_4_178-94_91-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538471" comment="kgraft-patch-4_4_178-94_91-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150034" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1170715" ref_url="https://bugzilla.suse.com/1170715" source="BUGZILLA"/>
		<reference ref_id="1172698" ref_url="https://bugzilla.suse.com/1172698" source="BUGZILLA"/>
		<reference ref_id="1172704" ref_url="https://bugzilla.suse.com/1172704" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007077.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8023: Fixed a potential local privilege escalation from ldap to root when OPENLDAP_CONFIG_BACKEND='ldap' was used (bsc#1172698).	  
- Changed DB_CONFIG to root:ldap permissions (bsc#1172704).	 
- Fixed an issue where slapd becomes unresponsive after many failed login/bind attempts(bsc#1170715).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170715">SUSE bug 1170715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172704">SUSE bug 1172704</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8023">CVE-2020-8023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554811" comment="libldap-2_4-2-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551522" comment="libldap-2_4-2-32bit-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554812" comment="openldap2-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554813" comment="openldap2-back-meta-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554814" comment="openldap2-client-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531090" comment="openldap2-doc-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554815" comment="openldap2-ppolicy-check-password-1.2-18.71.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150035" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006397.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.176-94_88 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721148" comment="kernel-default 4.4.176-94.88 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719415" comment="kgraft-patch-4_4_176-94_88-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538472" comment="kgraft-patch-4_4_176-94_88-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150036" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1173377" ref_url="https://bugzilla.suse.com/1173377" source="BUGZILLA"/>
		<reference ref_id="1173378" ref_url="https://bugzilla.suse.com/1173378" source="BUGZILLA"/>
		<reference ref_id="1173380" ref_url="https://bugzilla.suse.com/1173380" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15563" ref_url="https://www.suse.com/security/cve/CVE-2020-15563/" source="CVE"/>
		<reference ref_id="CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565/" source="CVE"/>
		<reference ref_id="CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007116.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).
- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).
- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-10"/>
	<updated date="2020-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173377">SUSE bug 1173377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173378">SUSE bug 1173378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173380">SUSE bug 1173380</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15563/">CVE-2020-15563 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15563">CVE-2020-15563 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15565">CVE-2020-15565 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15567">CVE-2020-15567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538473" comment="xen-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538474" comment="xen-doc-html-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538475" comment="xen-libs-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538476" comment="xen-libs-32bit-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538477" comment="xen-tools-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538478" comment="xen-tools-domU-4.9.4_08-3.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150037" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006397.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.175-94_79 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721151" comment="kernel-default 4.4.175-94.79 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719418" comment="kgraft-patch-4_4_175-94_79-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538479" comment="kgraft-patch-4_4_175-94_79-default-8-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150038" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1167231" ref_url="https://bugzilla.suse.com/1167231" source="BUGZILLA"/>
		<reference ref_id="1173576" ref_url="https://bugzilla.suse.com/1173576" source="BUGZILLA"/>
		<reference ref_id="1173613" ref_url="https://bugzilla.suse.com/1173613" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415/" source="CVE"/>
		<reference ref_id="CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426/" source="CVE"/>
		<reference ref_id="CVE-2020-6813" ref_url="https://www.suse.com/security/cve/CVE-2020-6813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 78.0.1 ESR fixes the following issues:

Security issues fixed:

- CVE-2020-12415: AppCache manifest poisoning due to url encoded character processing (bsc#1173576).
- CVE-2020-12416: Use-after-free in WebRTC VideoBroadcaster (bsc#1173576).
- CVE-2020-12417: Memory corruption due to missing sign-extension for ValueTags on ARM64 (bsc#1173576).
- CVE-2020-12418: Information disclosure due to manipulated URL object (bsc#1173576).
- CVE-2020-12419: Use-after-free in nsGlobalWindowInner (bsc#1173576).
- CVE-2020-12420: Use-After-Free when trying to connect to a STUN server (bsc#1173576).
- CVE-2020-12402: RSA Key Generation vulnerable to side-channel attack (bsc#1173576).
- CVE-2020-12421: Add-On updates did not respect the same certificate trust rules as software updates (bsc#1173576).
- CVE-2020-12422: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (bsc#1173576).
- CVE-2020-12423: DLL Hijacking due to searching %PATH% for a library (bsc#1173576).
- CVE-2020-12424: WebRTC permission prompt could have been bypassed by a compromised content process (bsc#1173576).
- CVE-2020-12425: Out of bound read in Date.parse() (bsc#1173576).
- CVE-2020-12426: Memory safety bugs fixed in Firefox 78 (bsc#1173576).
- FIPS: MozillaFirefox: allow /proc/sys/crypto/fips_enabled (bsc#1167231).

Non-security issues fixed:

- Fixed interaction with freetype6 (bsc#1173613).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-13"/>
	<updated date="2020-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167231">SUSE bug 1167231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173613">SUSE bug 1173613</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12415">CVE-2020-12415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12416">CVE-2020-12416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12417">CVE-2020-12417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12418">CVE-2020-12418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12419">CVE-2020-12419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12420">CVE-2020-12420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12421">CVE-2020-12421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12422">CVE-2020-12422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12423">CVE-2020-12423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12424">CVE-2020-12424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12425">CVE-2020-12425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12426">CVE-2020-12426 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6813/">CVE-2020-6813 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6813">CVE-2020-6813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554816" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554817" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542843" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554818" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150039" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1109160" ref_url="https://bugzilla.suse.com/1109160" source="BUGZILLA"/>
		<reference ref_id="1118367" ref_url="https://bugzilla.suse.com/1118367" source="BUGZILLA"/>
		<reference ref_id="1118368" ref_url="https://bugzilla.suse.com/1118368" source="BUGZILLA"/>
		<reference ref_id="1171740" ref_url="https://bugzilla.suse.com/1171740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741/" source="CVE"/>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007135.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- Amended documentation referring to rule types 'krb5-subdomain'
  and 'ms-subdomain'. This incorrect documentation could mislead
  operators into believing that policies they had configured were 
  more restrictive than they actually were. [CVE-2018-5741]
- Further limit the number of queries that can be triggered from a
  request.  Root and TLD servers are no longer exempt from 
  max-recursion-queries. Fetches for missing name server address
  records are limited to 4 for any domain. [CVE-2020-8616]
- Replaying a TSIG BADTIME response as a request could trigger an
  assertion failure. [CVE-2020-8617]
  [bsc#1109160, bsc#1171740,
   CVE-2018-5741, bind-CVE-2018-5741.patch,
   CVE-2020-8616, bind-CVE-2020-8616.patch,
   CVE-2020-8617, bind-CVE-2020-8617.patch]

- Don't rely on /etc/insserv.conf anymore for proper dependencies
  against nss-lookup.target in named.service and lwresd.service
  (bsc#1118367 bsc#1118368)
- Using a drop-in file
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118367">SUSE bug 1118367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118368">SUSE bug 1118368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5741">CVE-2018-5741 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8616">CVE-2020-8616 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8617">CVE-2020-8617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554819" comment="bind-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554820" comment="bind-chrootenv-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531098" comment="bind-doc-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554821" comment="bind-libs-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551534" comment="bind-libs-32bit-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554822" comment="bind-utils-9.9.9P1-63.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150040" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1173455" ref_url="https://bugzilla.suse.com/1173455" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007148.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-15049.patch: fixes a Cache Poisoning and Request Smuggling
  attack (CVE-2020-15049, bsc#1173455)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173455">SUSE bug 1173455</bugzilla>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15049">CVE-2020-15049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554823" comment="squid-3.5.21-26.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150041" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1113160" ref_url="https://bugzilla.suse.com/1113160" source="BUGZILLA"/>
		<reference ref_id="1134195" ref_url="https://bugzilla.suse.com/1134195" source="BUGZILLA"/>
		<reference ref_id="1138822" ref_url="https://bugzilla.suse.com/1138822" source="BUGZILLA"/>
		<reference ref_id="1141661" ref_url="https://bugzilla.suse.com/1141661" source="BUGZILLA"/>
		<reference ref_id="1142038" ref_url="https://bugzilla.suse.com/1142038" source="BUGZILLA"/>
		<reference ref_id="1143913" ref_url="https://bugzilla.suse.com/1143913" source="BUGZILLA"/>
		<reference ref_id="1148177" ref_url="https://bugzilla.suse.com/1148177" source="BUGZILLA"/>
		<reference ref_id="1153090" ref_url="https://bugzilla.suse.com/1153090" source="BUGZILLA"/>
		<reference ref_id="1153277" ref_url="https://bugzilla.suse.com/1153277" source="BUGZILLA"/>
		<reference ref_id="1154940" ref_url="https://bugzilla.suse.com/1154940" source="BUGZILLA"/>
		<reference ref_id="1154968" ref_url="https://bugzilla.suse.com/1154968" source="BUGZILLA"/>
		<reference ref_id="1155372" ref_url="https://bugzilla.suse.com/1155372" source="BUGZILLA"/>
		<reference ref_id="1163871" ref_url="https://bugzilla.suse.com/1163871" source="BUGZILLA"/>
		<reference ref_id="1165921" ref_url="https://bugzilla.suse.com/1165921" source="BUGZILLA"/>
		<reference ref_id="1168310" ref_url="https://bugzilla.suse.com/1168310" source="BUGZILLA"/>
		<reference ref_id="1170231" ref_url="https://bugzilla.suse.com/1170231" source="BUGZILLA"/>
		<reference ref_id="1170557" ref_url="https://bugzilla.suse.com/1170557" source="BUGZILLA"/>
		<reference ref_id="1171687" ref_url="https://bugzilla.suse.com/1171687" source="BUGZILLA"/>
		<reference ref_id="1172462" ref_url="https://bugzilla.suse.com/1172462" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10215" ref_url="https://www.suse.com/security/cve/CVE-2019-10215/" source="CVE"/>
		<reference ref_id="CVE-2019-15043" ref_url="https://www.suse.com/security/cve/CVE-2019-15043/" source="CVE"/>
		<reference ref_id="CVE-2020-12245" ref_url="https://www.suse.com/security/cve/CVE-2020-12245/" source="CVE"/>
		<reference ref_id="CVE-2020-13379" ref_url="https://www.suse.com/security/cve/CVE-2020-13379/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007159.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

cobbler:

- Calculate relative path for kernel and inited when generating
  grub entry (bsc#1170231)
  Added: fix-grub2-entry-paths.diff
- Fix os-release version detection for SUSE
  Modified: sles15.patch
- Jinja2 template library fix (bsc#1141661)
- Removes string replace for textmode fix (bsc#1134195)

golang-github-prometheus-node_exporter:

- Update to 0.18.1
  * [BUGFIX] Fix incorrect sysctl call in BSD meminfo collector, resulting in broken swap metrics on FreeBSD #1345
  * [BUGFIX] Fix rollover bug in mountstats collector #1364
  * Renamed interface label to device in netclass collector for consistency with
  * other network metrics #1224
  * The cpufreq metrics now separate the cpufreq and scaling data based on what the driver provides. #1248
  * The labels for the network_up metric have changed, see issue #1236
  * Bonding collector now uses mii_status instead of operstatus #1124
  * Several systemd metrics have been turned off by default to improve performance #1254
  * These include unit_tasks_current, unit_tasks_max, service_restart_total, and unit_start_time_seconds
  * The systemd collector blacklist now includes automount, device, mount, and slice units by default. #1255
  * [CHANGE] Bonding state uses mii_status #1124
  * [CHANGE] Add a limit to the number of in-flight requests #1166
  * [CHANGE] Renamed interface label to device in netclass collector #1224
  * [CHANGE] Add separate cpufreq and scaling metrics #1248
  * [CHANGE] Several systemd metrics have been turned off by default to improve performance #1254
  * [CHANGE] Expand systemd collector blacklist #1255
  * [CHANGE] Split cpufreq metrics into a separate collector #1253
  * [FEATURE] Add a flag to disable exporter metrics #1148
  * [FEATURE] Add kstat-based Solaris metrics for boottime, cpu and zfs collectors #1197
  * [FEATURE] Add uname collector for FreeBSD #1239
  * [FEATURE] Add diskstats collector for OpenBSD #1250
  * [FEATURE] Add pressure collector exposing pressure stall information for Linux #1174
  * [FEATURE] Add perf exporter for Linux #1274
  * [ENHANCEMENT] Add Infiniband counters #1120
  * [ENHANCEMENT] Add TCPSynRetrans to netstat default filter #1143
  * [ENHANCEMENT] Move network_up labels into new metric network_info #1236
  * [ENHANCEMENT] Use 64-bit counters for Darwin netstat
  * [BUGFIX] Add fallback for missing /proc/1/mounts #1172
  * [BUGFIX] Fix node_textfile_mtime_seconds to work properly on symlinks #1326
- Add network-online (Wants and After) dependency to systemd unit bsc#1143913

golang-github-prometheus-prometheus:

- Update change log and spec file
  + Modified spec file: default to golang 1.14 to avoid 'have choice' build issues in OBS. 
  + Rebase and update patches for version 2.18.0
  + Changed:  
    * 0002-Default-settings.patch Changed
- Update to 2.18.0 
  + Features 
    * Tracing: Added experimental Jaeger support #7148
  + Changes
    * Federation: Only use local TSDB for federation (ignore remote read). #7096
    * Rules: `rule_evaluations_total` and `rule_evaluation_failures_total` have a `rule_group` label now. #7094
  + Enhancements
    * TSDB: Significantly reduce WAL size kept around after a block cut. #7098
    * Discovery: Add `architecture` meta label for EC2. #7000
  + Bug fixes
    * UI: Fixed wrong MinTime reported by /status. #7182
    * React UI: Fixed multiselect legend on OSX. #6880
    * Remote Write: Fixed blocked resharding edge case. #7122
    * Remote Write: Fixed remote write not updating on relabel configs change. #7073
- Changes from 2.17.2
  + Bug fixes
    * Federation: Register federation metrics #7081
    * PromQL: Fix panic in parser error handling #7132
    * Rules: Fix reloads hanging when deleting a rule group that is being evaluated #7138
    * TSDB: Fix a memory leak when prometheus starts with an empty TSDB WAL #7135
    * TSDB: Make isolation more robust to panics in web handlers #7129 #7136
- Changes from 2.17.1
  + Bug fixes
    * TSDB: Fix query performance regression that increased memory and CPU usage #7051
- Changes from 2.17.0
  + Features 
    * TSDB: Support isolation #6841
    * This release implements isolation in TSDB. API queries and recording rules are
      guaranteed to only see full scrapes and full recording rules. This comes with a
      certain overhead in resource usage. Depending on the situation, there might be
      some increase in memory usage, CPU usage, or query latency.
  + Enhancements
    * PromQL: Allow more keywords as metric names #6933
    * React UI: Add normalization of localhost URLs in targets page #6794
    * Remote read: Read from remote storage concurrently #6770
    * Rules: Mark deleted rule series as stale after a reload #6745
    * Scrape: Log scrape append failures as debug rather than warn #6852
    * TSDB: Improve query performance for queries that partially hit the head #6676
    * Consul SD: Expose service health as meta label #5313
    * EC2 SD: Expose EC2 instance lifecycle as meta label #6914
    * Kubernetes SD: Expose service type as meta label for K8s service role #6684
    * Kubernetes SD: Expose label_selector and field_selector #6807
    * Openstack SD: Expose hypervisor id as meta label #6962
  + Bug fixes
    * PromQL: Do not escape HTML-like chars in query log #6834 #6795
    * React UI: Fix data table matrix values #6896
    * React UI: Fix new targets page not loading when using non-ASCII characters #6892
    * Remote read: Fix duplication of metrics read from remote storage with external labels #6967 #7018
    * Remote write: Register WAL watcher and live reader metrics for all remotes, not just the first one #6998
    * Scrape: Prevent removal of metric names upon relabeling #6891
    * Scrape: Fix 'superfluous response.WriteHeader call' errors when scrape fails under some circonstances #6986
    * Scrape: Fix crash when reloads are separated by two scrape intervals #7011
- Changes from 2.16.0
  + Features 
    * React UI: Support local timezone on /graph #6692
    * PromQL: add absent_over_time query function #6490
    * Adding optional logging of queries to their own file #6520
  + Enhancements
    * React UI: Add support for rules page and 'Xs ago' duration displays #6503
    * React UI: alerts page, replace filtering togglers tabs with checkboxes #6543
    * TSDB: Export metric for WAL write errors #6647
    * TSDB: Improve query performance for queries that only touch the most recent 2h of data. #6651
    * PromQL: Refactoring in parser errors to improve error messages #6634
    * PromQL: Support trailing commas in grouping opts #6480
    * Scrape: Reduce memory usage on reloads by reusing scrape cache #6670
    * Scrape: Add metrics to track bytes and entries in the metadata cache #6675
    * promtool: Add support for line-column numbers for invalid rules output #6533
    * Avoid restarting rule groups when it is unnecessary #6450
  + Bug fixes
    * React UI: Send cookies on fetch() on older browsers #6553
    * React UI: adopt grafana flot fix for stacked graphs #6603
    * React UI: broken graph page browser history so that back button works as expected #6659
    * TSDB: ensure compactionsSkipped metric is registered, and log proper error if one is returned from head.Init #6616
    * TSDB: return an error on ingesting series with duplicate labels #6664
    * PromQL: Fix unary operator precedence #6579
    * PromQL: Respect query.timeout even when we reach query.max-concurrency #6712
    * PromQL: Fix string and parentheses handling in engine, which affected React UI #6612
    * PromQL: Remove output labels returned by absent() if they are produced by multiple identical label matchers #6493
    * Scrape: Validate that OpenMetrics input ends with `# EOF` #6505
    * Remote read: return the correct error if configs can't be marshal'd to JSON #6622
    * Remote write: Make remote client `Store` use passed context, which can affect shutdown timing #6673
    * Remote write: Improve sharding calculation in cases where we would always be consistently behind by tracking pendingSamples #6511
    * Ensure prometheus_rule_group metrics are deleted when a rule group is removed #6693
- Changes from 2.15.2
  + Bug fixes
    * TSDB: Fixed support for TSDB blocks built with Prometheus before 2.1.0. #6564
    * TSDB: Fixed block compaction issues on Windows. #6547
- Changes from 2.15.1
  + Bug fixes
    * TSDB: Fixed race on concurrent queries against same data. #6512
- Changes from 2.15.0
  + Features 
    * API: Added new endpoint for exposing per metric metadata `/metadata`. #6420 #6442
  + Changes
    * Discovery: Removed `prometheus_sd_kubernetes_cache_*` metrics. Additionally `prometheus_sd_kubernetes_workqueue_latency_seconds` and `prometheus_sd_kubernetes_workqueue_work_duration_seconds` metrics now show correct values in seconds. #6393
    * Remote write: Changed `query` label on `prometheus_remote_storage_*` metrics to `remote_name` and `url`. #6043
  + Enhancements
    * TSDB: Significantly reduced memory footprint of loaded TSDB blocks. #6418 #6461
    * TSDB: Significantly optimized what we buffer during compaction which should result in lower memory footprint during compaction. #6422 #6452 #6468 #6475
    * TSDB: Improve replay latency. #6230
    * TSDB: WAL size is now used for size based retention calculation. #5886
    * Remote read: Added query grouping and range hints to the remote read request #6401
    * Remote write: Added `prometheus_remote_storage_sent_bytes_total` counter per queue. #6344
    * promql: Improved PromQL parser performance. #6356
    * React UI: Implemented missing pages like `/targets` #6276, TSDB status page #6281 #6267 and many other fixes and performance improvements.
    * promql: Prometheus now accepts spaces between time range and square bracket. e.g `[ 5m]` #6065  
  + Bug fixes
    * Config: Fixed alertmanager configuration to not miss targets when configurations are similar. #6455
    * Remote write: Value of `prometheus_remote_storage_shards_desired` gauge shows raw value of desired shards and it's updated correctly. #6378
    * Rules: Prometheus now fails the evaluation of rules and alerts where metric results collide with labels specified in `labels` field. #6469
    * API: Targets Metadata API `/targets/metadata` now accepts empty `match_targets` parameter as in the spec. #6303
- Changes from 2.14.0
  + Features 
    * API: `/api/v1/status/runtimeinfo` and `/api/v1/status/buildinfo` endpoints added for use by the React UI. #6243
    * React UI: implement the new experimental React based UI. #5694 and many more
      * Can be found by under `/new`.
      * Not all pages are implemented yet.
    * Status: Cardinality statistics added to the Runtime &amp; Build Information page. #6125
  + Enhancements
    * Remote write: fix delays in remote write after a compaction. #6021
    * UI: Alerts can be filtered by state. #5758
  + Bug fixes
    * Ensure warnings from the API are escaped. #6279
    * API: lifecycle endpoints return 403 when not enabled. #6057
    * Build: Fix Solaris build. #6149
    * Promtool: Remove false duplicate rule warnings when checking rule files with alerts. #6270
    * Remote write: restore use of deduplicating logger in remote write. #6113
    * Remote write: do not reshard when unable to send samples. #6111
    * Service discovery: errors are no longer logged on context cancellation. #6116, #6133
    * UI: handle null response from API properly. #6071
- Changes from 2.13.1
  + Bug fixes
    * Fix panic in ARM builds of Prometheus. #6110
    * promql: fix potential panic in the query logger. #6094
    * Multiple errors of http: superfluous response.WriteHeader call in the logs. #6145
- Changes from 2.13.0
  + Enhancements
    * Metrics: renamed prometheus_sd_configs_failed_total to prometheus_sd_failed_configs and changed to Gauge #5254
    * Include the tsdb tool in builds. #6089
    * Service discovery: add new node address types for kubernetes. #5902
    * UI: show warnings if query have returned some warnings. #5964
    * Remote write: reduce memory usage of the series cache. #5849
    * Remote read: use remote read streaming to reduce memory usage. #5703
    * Metrics: added metrics for remote write max/min/desired shards to queue manager. #5787
    * Promtool: show the warnings during label query. #5924
    * Promtool: improve error messages when parsing bad rules. #5965
    * Promtool: more promlint rules. #5515
  + Bug fixes
    * UI: Fix a Stored DOM XSS vulnerability with query history [CVE-2019-10215](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10215). #6098
    * Promtool: fix recording inconsistency due to duplicate labels. #6026
    * UI: fixes service-discovery view when accessed from unhealthy targets. #5915
    * Metrics format: OpenMetrics parser crashes on short input. #5939
    * UI: avoid truncated Y-axis values. #6014
- Changes from 2.12.0
  + Features 
    * Track currently active PromQL queries in a log file. #5794
    * Enable and provide binaries for `mips64` / `mips64le` architectures. #5792
  + Enhancements
    * Improve responsiveness of targets web UI and API endpoint. #5740
    * Improve remote write desired shards calculation. #5763
    * Flush TSDB pages more precisely. tsdb#660
    * Add `prometheus_tsdb_retention_limit_bytes` metric. tsdb#667
    * Add logging during TSDB WAL replay on startup. tsdb#662
    * Improve TSDB memory usage. tsdb#653, tsdb#643, tsdb#654, tsdb#642, tsdb#627
  + Bug fixes
    * Check for duplicate label names in remote read. #5829
    * Mark deleted rules' series as stale on next evaluation. #5759
    * Fix JavaScript error when showing warning about out-of-sync server time. #5833
    * Fix `promtool test rules` panic when providing empty `exp_labels`. #5774
    * Only check last directory when discovering checkpoint number. #5756
    * Fix error propagation in WAL watcher helper functions. #5741
    * Correctly handle empty labels from alert templates. #5845
- Update Uyuni/SUSE Manager service discovery patch
  + Modified 0003-Add-Uyuni-service-discovery.patch:
  + Adapt service discovery to the new Uyuni API endpoints
  + Modified spec file: force golang 1.12 to fix build issues in SLE15SP2
- Update to Prometheus 2.11.2

grafana:

- Update to version 7.0.3
  * Features / Enhancements
    - Stats: include all fields. #24829, @ryantxu
    - Variables: change VariableEditorList row action Icon to IconButton. #25217, @hshoff
  * Bug fixes
    - Cloudwatch: Fix dimensions of DDoSProtection. #25317, @papagian
    - Configuration: Fix env var override of sections containing hyphen. #25178, @marefr
    - Dashboard: Get panels in collapsed rows. #25079, @peterholmberg
    - Do not show alerts tab when alerting is disabled. #25285, @dprokop
    - Jaeger: fixes cascader option label duration value. #25129, @Estrax
    - Transformations: Fixed Transform tab crash &amp; no update after adding first transform. #25152, @torkelo
- Update to version 7.0.2
  * Bug fixes
    - Security: Urgent security patch release to fix CVE-2020-13379
- Update to version 7.0.1
  * Features / Enhancements
    - Datasource/CloudWatch: Makes CloudWatch Logs query history more readable. #24795, @kaydelaney
    - Download CSV: Add date and time formatting. #24992, @ryantxu
    - Table: Make last cell value visible when right aligned. #24921, @peterholmberg
    - TablePanel: Adding sort order persistance. #24705, @torkelo
    - Transformations: Display correct field name when using reduce transformation. #25068, @peterholmberg
    - Transformations: Allow custom number input for binary operations. #24752, @ryantxu
  * Bug fixes
    - Dashboard/Links: Fixes dashboard links by tags not working. #24773, @KamalGalrani
    - Dashboard/Links: Fixes open in new window for dashboard link. #24772, @KamalGalrani
    - Dashboard/Links: Variables are resolved and limits to 100. #25076, @hugohaggmark
    - DataLinks: Bring back variables interpolation in title. #24970, @dprokop
    - Datasource/CloudWatch: Field suggestions no longer limited to prefix-only. #24855, @kaydelaney
    - Explore/Table: Keep existing field types if possible. #24944, @kaydelaney
    - Explore: Fix wrap lines toggle for results of queries with filter expression. #24915, @ivanahuckova
    - Explore: fix undo in query editor. #24797, @zoltanbedi
    - Explore: fix word break in type head info. #25014, @zoltanbedi
    - Graph: Legend decimals now work as expected. #24931, @torkelo
    - LoginPage: Fix hover color for service buttons. #25009, @tskarhed
    - LogsPanel: Fix scrollbar. #24850, @ivanahuckova
    - MoveDashboard: Fix for moving dashboard caused all variables to be lost. #25005, @torkelo
    - Organize transformer: Use display name in field order comparer. #24984, @dprokop
    - Panel: shows correct panel menu items in view mode. #24912, @hugohaggmark
    - PanelEditor Fix missing labels and description if there is only single option in category. #24905, @dprokop
    - PanelEditor: Overrides name matcher still show all original field names even after Field default display name is specified. #24933, @torkelo
    - PanelInspector: Makes sure Data display options are visible. #24902, @hugohaggmark
    - PanelInspector: Hides unsupported data display options for Panel type. #24918, @hugohaggmark
    - PanelMenu: Make menu disappear on button press. #25015, @tskarhed
    - Postgres: Fix add button. #25087, @phemmer
    - Prometheus: Fix recording rules expansion. #24977, @ivanahuckova
    - Stackdriver: Fix creating Service Level Objectives (SLO) datasource query variable. #25023, @papagian
- Update to version 7.0.0 
  * Breaking changes
    - Removed PhantomJS: PhantomJS was deprecated in Grafana v6.4 and starting from Grafana v7.0.0, all PhantomJS support has been removed. This means that Grafana no longer ships with a built-in image renderer, and we advise you to install the Grafana Image Renderer plugin.
    - Dashboard: A global minimum dashboard refresh interval is now enforced and defaults to 5 seconds.
    - Interval calculation: There is now a new option Max data points that controls the auto interval $__interval calculation. Interval was previously calculated by dividing the panel width by the time range. With the new max data points option it is now easy to set $__interval to a dynamic value that is time range agnostic. For example if you set Max data points to 10 Grafana will dynamically set $__interval by dividing the current time range by 10.
    - Datasource/Loki: Support for deprecated Loki endpoints has been removed.
    - Backend plugins: Grafana now requires backend plugins to be signed, otherwise Grafana will not load/start them. This is an additional security measure to make sure backend plugin binaries and files haven't been tampered with. Refer to Upgrade Grafana for more information.
    - @grafana/ui: Forms migration notice, see @grafana/ui changelog
    - @grafana/ui: Select API change for creating custom values, see @grafana/ui changelog
    + Deprecation warnings
      - Scripted dashboards is now deprecated. The feature is not removed but will be in a future release. We hope to address the underlying requirement of dynamic dashboards in a different way. #24059
      - The unofficial first version of backend plugins together with usage of grafana/grafana-plugin-model is now deprecated and support for that will be removed in a future release. Please refer to backend plugins documentation for information about the new officially supported backend plugins.
  * Features / Enhancements
    - Backend plugins: Log deprecation warning when using the unofficial first version of backend plugins. #24675, @marefr
    - Editor: New line on Enter, run query on Shift+Enter. #24654, @davkal
    - Loki: Allow multiple derived fields with the same name. #24437, @aocenas
    - Orgs: Add future deprecation notice. #24502, @torkelo
  * Bug Fixes
    - @grafana/toolkit: Use process.cwd() instead of PWD to get directory. #24677, @zoltanbedi
    - Admin: Makes long settings values line break in settings page. #24559, @hugohaggmark
    - Dashboard: Allow editing provisioned dashboard JSON and add confirmation when JSON is copied to dashboard. #24680, @dprokop
    - Dashboard: Fix for strange 'dashboard not found' errors when opening links in dashboard settings. #24416, @torkelo
    - Dashboard: Fix so default data source is selected when data source can't be found in panel editor. #24526, @mckn
    - Dashboard: Fixed issue changing a panel from transparent back to normal in panel editor. #24483, @torkelo
    - Dashboard: Make header names reflect the field name when exporting to CSV file from the the panel inspector. #24624, @peterholmberg
    - Dashboard: Make sure side pane is displayed with tabs by default in panel editor. #24636, @dprokop
    - Data source: Fix query/annotation help content formatting. #24687, @AgnesToulet
    - Data source: Fixes async mount errors. #24579, @Estrax
    - Data source: Fixes saving a data source without failure when URL doesn't specify a protocol. #24497, @aknuds1
    - Explore/Prometheus: Show results of instant queries only in table. #24508, @ivanahuckova
    - Explore: Fix rendering of react query editors. #24593, @ivanahuckova
    - Explore: Fixes loading more logs in logs context view. #24135, @Estrax
    - Graphite: Fix schema and dedupe strategy in rollup indicators for Metrictank queries. #24685, @torkelo
    - Graphite: Makes query annotations work again. #24556, @hugohaggmark
    - Logs: Clicking 'Load more' from context overlay doesn't expand log row. #24299, @kaydelaney
    - Logs: Fix total bytes process calculation. #24691, @davkal
    - Org/user/team preferences: Fixes so UI Theme can be set back to Default. #24628, @AgnesToulet
    - Plugins: Fix manifest validation. #24573, @aknuds1
    - Provisioning: Use proxy as default access mode in provisioning. #24669, @bergquist
    - Search: Fix select item when pressing enter and Grafana is served using a sub path. #24634, @tskarhed
    - Search: Save folder expanded state. #24496, @Clarity-89
    - Security: Tag value sanitization fix in OpenTSDB data source. #24539, @rotemreiss
    - Table: Do not include angular options in options when switching from angular panel. #24684, @torkelo
    - Table: Fixed persisting column resize for time series fields. #24505, @torkelo
    - Table: Fixes Cannot read property subRows of null. #24578, @hugohaggmark
    - Time picker: Fixed so you can enter a relative range in the time picker without being converted to absolute range. #24534, @mckn
    - Transformations: Make transform dropdowns not cropped. #24615, @dprokop
    - Transformations: Sort order should be preserved as entered by user when using the reduce transformation. #24494, @hugohaggmark
    - Units: Adds scale symbol for currencies with suffixed symbol. #24678, @hugohaggmark
    - Variables: Fixes filtering options with more than 1000 entries. #24614, @hugohaggmark
    - Variables: Fixes so Textbox variables read value from url. #24623, @hugohaggmark
    - Zipkin: Fix error when span contains remoteEndpoint. #24524, @aocenas
    - SAML: Switch from email to login for user login attribute mapping (Enterprise)
- Update Makefile and spec file
  * Remove phantomJS patch from Makefile 
  * Fix multiline strings in Makefile
  * Exclude s390 from SLE12 builds, golang 1.14 is not built for s390
- Add instructions for patching the Grafana javascript frontend.
- BuildRequires golang(API) instead of go metapackage version range
  * BuildRequires:  golang(API) &gt;= 1.14   from
    BuildRequires:  ( go &gt;= 1.14 with go &lt; 1.15 )
- Update to version 6.7.3
  - This version fixes bsc#1170557 and its corresponding CVE-2020-12245
  - Admin: Fix Synced via LDAP message for non-LDAP external users. #23477, @alexanderzobnin
  - Alerting: Fixes notifications for alerts with empty message in Google Hangouts notifier. #23559, @hugohaggmark
  - AuthProxy: Fixes bug where long username could not be cached.. #22926, @jcmcken
  - Dashboard: Fix saving dashboard when editing raw dashboard JSON model. #23314, @peterholmberg
  - Dashboard: Try to parse 8 and 15 digit numbers as timestamps if parsing of time range as date fails. #21694, @jessetan
  - DashboardListPanel: Fixed problem with empty panel after going into edit mode (General folder filter being automatically added) . #23426, @torkelo
  - Data source: Handle datasource withCredentials option properly. #23380, @hvtuananh
  - Security: Fix annotation popup XSS vulnerability. #23813, @torkelo
  - Server: Exit Grafana with status code 0 if no error. #23312, @aknuds1
  - TablePanel: Fix XSS issue in header column rename (backport). #23814, @torkelo
  - Variables: Fixes error when setting adhoc variable values. #23580, @hugohaggmark
- Update to version 6.7.2:
  (see installed changelog for the full list of changes)
  -  BackendSrv: Adds config to response to fix issue for external plugins that used this property . #23032, @torkelo
  -  Dashboard: Fixed issue with saving new dashboard after changing title . #23104, @dprokop
  -  DataLinks: make sure we use the correct datapoint when dataset contains null value.. #22981, @mckn
  -  Plugins: Fixed issue for plugins that imported dateMath util . #23069, @mckn
  -  Security: Fix for dashboard snapshot original dashboard link could contain XSS vulnerability in url. #23254, @torkelo
  -  Variables: Fixes issue with too many queries being issued for nested template variables after value change. #23220, @torkelo
  -  Plugins: Expose promiseToDigest. #23249, @torkelo
  -  Reporting (Enterprise): Fixes issue updating a report created by someone else
- Update to 6.7.1:
  (see installed changelog for the full list of changes)
  Bug Fixes
  - Azure: Fixed dropdowns not showing current value. #22914, @torkelo
  - BackendSrv: only add content-type on POST, PUT requests. #22910, @hugohaggmark
  - Panels: Fixed size issue with panel internal size when exiting panel edit mode. #22912, @torkelo
  - Reporting: fixes migrations compatibility with mysql (Enterprise)
  - Reporting: Reduce default concurrency limit to 4 (Enterprise)
- Update to 6.7.0:
  (see installed changelog for the full list of changes)
  Bug Fixes
  - AngularPanels: Fixed inner height calculation for angular panels . #22796, @torkelo
  - BackendSrv: makes sure provided headers are correctly recognized and set. #22778, @hugohaggmark
  - Forms: Fix input suffix position (caret-down in Select) . #22780, @torkelo
  - Graphite: Fixed issue with query editor and next select metric now showing after selecting metric node . #22856, @torkelo
  - Rich History: UX adjustments and fixes. #22729, @ivanahuckova
- Update to 6.7.0-beta1:
  Breaking changes
  -  Slack: Removed Mention setting and instead introduce Mention Users, Mention Groups, and Mention Channel. The first two settings require user and group IDs, respectively. This change was necessary because the way of mentioning via the Slack API changed and mentions in Slack notifications no longer worked.
  -  Alerting: Reverts the behavior of diff and percent_diff to not always be absolute. Something we introduced by mistake in 6.1.0. Alerting now support diff(), diff_abs(), percent_diff() and percent_diff_abs(). #21338
  - Notice about changes in backendSrv for plugin authors
    In our mission to migrate away from AngularJS to React we have removed all AngularJS dependencies in the core data retrieval service backendSrv.
    Removing the AngularJS dependencies in backendSrv has the unfortunate side effect of AngularJS digest no longer being triggered for any request made with backendSrv. Because of this, external plugins using backendSrv directly may suffer from strange behaviour in the UI.
    To remedy this issue, as a plugin author you need to trigger the digest after a direct call to backendSrv.
  Bug Fixes
    API: Fix redirect issues. #22285, @papagian
    Alerting: Don't include image_url field with Slack message if empty. #22372, @aknuds1
    Alerting: Fixed bad background color for default notifications in alert tab . #22660, @krvajal
    Annotations: In table panel when setting transform to annotation, they will now show up right away without a manual refresh. #22323, @krvajal
    Azure Monitor: Fix app insights source to allow for new __timeFrom and __timeTo. #21879, @ChadNedzlek
    BackendSrv: Fixes POST body for form data. gmark
    CloudWatch: Credentials cache invalidation fix. #22473, @sunker
    CloudWatch: Expand alias variables when query yields no result. #22695, @sunker
    Dashboard: Fix bug with NaN in alerting. #22053, @a-melnyk
    Explore: Fix display of multiline logs in log panel and explore. #22057, @thomasdraebing
    Heatmap: Legend color range is incorrect when using custom min/max. #21748, @sv5d
    Security: Fixed XSS issue in dashboard history diff . #22680, @torkelo
    StatPanel: Fixes base color is being used for null values .
    #22646, @torkelo
- Update to version 6.6.2:
  (see installed changelog for the full list of changes)
- Update to version 6.6.1:
  (see installed changelog for the full list of changes)
- Update to version 6.6.0:
  (see installed changelog for the full list of changes)
- Update to version 6.5.3:
  (see installed changelog for the full list of changes)
- Update to version 6.5.2:
  (see installed changelog for the full list of changes)
- Update to version 6.5.1:
  (see installed changelog for the full list of changes)
- Update to version 6.5.0
  (see installed changelog for the full list of changes)
- Update to version 6.4.5:
  * Create version 6.4.5
  * CloudWatch: Fix high CPU load (#20579)
- Add obs-service-go_modules to download required modules into vendor.tar.gz
- Adjusted spec file to use vendor.tar.gz
- Adjusted Makefile to work with new filenames
- BuildRequire go1.14
- Update to version 6.4.4:
  * DataLinks: Fix blur issues. #19883, @aocenas
  * Docker: Makes it possible to parse timezones in the docker image. #20081, @xlson
  * LDAP: All LDAP servers should be tried even if one of them returns a connection error. #20077, @jongyllen
  * LDAP: No longer shows incorrectly matching groups based on role in debug page. #20018, @xlson
  * Singlestat: Fix no data / null value mapping . #19951, @ryantxu
- Revert the spec file and make script
- Remove PhantomJS dependency
- Update to 6.4.3
  * Bug Fixes
    - Alerting: All notification channels should send even if one fails to send. #19807, @jan25
    - AzureMonitor: Fix slate interference with dropdowns. #19799, @aocenas
    - ContextMenu: make ContextMenu positioning aware of the viewport width. #19699, @krvajal
    - DataLinks: Fix context menu not showing in singlestat-ish visualisations. #19809, @dprokop
    - DataLinks: Fix url field not releasing focus. #19804, @aocenas
    - Datasource: Fixes clicking outside of some query editors required 2 clicks. #19822, @aocenas
    - Panels: Fixes default tab for visualizations without Queries Tab. #19803, @hugohaggmark
    - Singlestat: Fixed issue with mapping null to text. #19689, @torkelo
    - @grafana/toolkit: Don't fail plugin creation when git user.name config is not set. #19821, @dprokop
    - @grafana/toolkit: TSLint line number off by 1. #19782, @fredwangwang
- Update to 6.4.2
  * Bug Fixes
    - CloudWatch: Changes incorrect dimension wmlid to wlmid . #19679, @ATTron
    - Grafana Image Renderer: Fixes plugin page. #19664, @hugohaggmark
    - Graph: Fixes auto decimals logic for y axis ticks that results in too many decimals for high values. #19618, @torkelo
    - Graph: Switching to series mode should re-render graph. #19623, @torkelo
    - Loki: Fix autocomplete on label values. #19579, @aocenas
    - Loki: Removes live option for logs panel. #19533, @davkal
    - Profile: Fix issue with user profile not showing more than sessions sessions in some cases. #19578, @huynhsamha
    - Prometheus: Fixes so results in Panel always are sorted by query order. #19597, @hugohaggmark
    - sted keys in YAML provisioning caused a server crash, #19547
    - ImageRendering: Fixed issue with image rendering in enterprise build (Enterprise)
    - Reporting: Fixed issue with reporting service when STMP was disabled (Enterprise).
- Changes from 6.4.0
  * Features / Enhancements
    - Build: Upgrade go to 1.12.10. #19499, @marefr
    - DataLinks: Suggestions menu improvements. #19396, @dprokop
    - Explore: Take root_url setting into account when redirecting from dashboard to explore. #19447, @ivanahuckova
    - Explore: Update broken link to logql docs. #19510, @ivanahuckova
    - Logs: Adds Logs Panel as a visualization. #19504, @davkal
  * Bug Fixes
    - CLI: Fix version selection for plugin install. #19498, @aocenas
    - Graph: Fixes minor issue with series override color picker and custom color . #19516, @torkelo
- Changes from 6.4.0 Beta 2
  * Features / Enhancements
    - Azure Monitor: Remove support for cross resource queries (#19115)'. #19346, @sunker
    - Docker: Upgrade packages to resolve reported vulnerabilities. #19188, @marefr
    - Graphite: Time range expansion reduced from 1 minute to 1 second. #19246, @torkelo
    - grafana/toolkit: Add plugin creation task. #19207, @dprokop
  * Bug Fixes
    - Alerting: Prevents creating alerts from unsupported queries. #19250, @hugohaggmark
    - Alerting: Truncate PagerDuty summary when greater than 1024 characters. #18730, @nvllsvm
    - Cloudwatch: Fix autocomplete for Gamelift dimensions. #19146, @kevinpz
    - Dashboard: Fix export for sharing when panels use default data source. #19315, @torkelo
    - Database: Rewrite system statistics query to perform better. #19178, @papagian
    - Gauge/BarGauge: Fix issue with [object Object] in titles . #19217, @ryantxu
    - MSSQL: Revert usage of new connectionstring format introduced by #18384. #19203, @marefr
    - Multi-LDAP: Do not fail-fast on invalid credentials. #19261, @gotjosh
    - MySQL, Postgres, MSSQL: Fix validating query with template variables in alert . #19237, @marefr
    - MySQL, Postgres: Update raw sql when query builder updates. #19209, @marefr
    - MySQL: Limit datasource error details returned from the backend. #19373, @marefr
- Changes from 6.4.0 Beta 1
  * Features / Enhancements
    - API: Readonly datasources should not be created via the API. #19006, @papagian
    - Alerting: Include configured AlertRuleTags in Webhooks notifier. #18233, @dominic-miglar
    - Annotations: Add annotations support to Loki. #18949, @aocenas
    - Annotations: Use a single row to represent a region. #17673, @ryantxu
    - Auth: Allow inviting existing users when login form is disabled. #19048, @548017
    - Azure Monitor: Add support for cross resource queries. #19115, @sunker
    - CLI: Allow installing custom binary plugins. #17551, @aocenas
    - Dashboard: Adds Logs Panel (alpha) as visualization option for Dashboards. #18641, @hugohaggmark
    - Dashboard: Reuse query results between panels . #16660, @ryantxu
    - Dashboard: Set time to to 23:59:59 when setting To time using calendar. #18595, @simPod
    - DataLinks: Add DataLinks support to Gauge, BarGauge and SingleStat2 panel. #18605, @ryantxu
    - DataLinks: Enable access to labels &amp; field names. #18918, @torkelo
    - DataLinks: Enable multiple data links per panel. #18434, @dprokop
    - Docker: switch docker image to alpine base with phantomjs support. #18468, @DanCech
    - Elasticsearch: allow templating queries to order by doc_count. #18870, @hackery
    - Explore: Add throttling when doing live queries. #19085, @aocenas
    - Explore: Adds ability to go back to dashboard, optionally with query changes. #17982, @kaydelaney
    - Explore: Reduce default time range to last hour. #18212, @davkal
    - Gauge/BarGauge: Support decimals for min/max. #18368, @ryantxu
    - Graph: New series override transform constant that renders a single point as a line across the whole graph. #19102, @davkal
    - Image rendering: Add deprecation warning when PhantomJS is used for rendering images. #18933, @papagian
    - InfluxDB: Enable interpolation within ad-hoc filter values. #18077, @kvc-code
    - LDAP: Allow an user to be synchronized against LDAP. #18976, @gotjosh
    - Ldap: Add ldap debug page. #18759, @peterholmberg
    - Loki: Remove prefetching of default label values. #18213, @davkal
    - Metrics: Add failed alert notifications metric. #18089, @koorgoo
    - OAuth: Support JMES path lookup when retrieving user email. #14683, @bobmshannon
    - OAuth: return GitLab groups as a part of user info (enable team sync). #18388, @alexanderzobnin
    - Panels: Add unit for electrical charge - ampere-hour. #18950, @anirudh-ramesh
    - Plugin: AzureMonitor - Reapply MetricNamespace support. #17282, @raphaelquati
    - Plugins: better warning when plugins fail to load. #18671, @ryantxu
    - Postgres: Add support for scram sha 256 authentication. #18397, @nonamef
    - RemoteCache: Support SSL with Redis. #18511, @kylebrandt
    - SingleStat: The gauge option in now disabled/hidden (unless it's an old panel with it already enabled) . #18610, @ryantxu
    - Stackdriver: Add extra alignment period options. #18909, @sunker
    - Units: Add South African Rand (ZAR) to currencies. #18893, @jeteon
    - Units: Adding T,P,E,Z,and Y bytes. #18706, @chiqomar
  * Bug Fixes
    - Alerting: Notification is sent when state changes from no_data to ok. #18920, @papagian
    - Alerting: fix duplicate alert states when the alert fails to save to the database. #18216, @kylebrandt
    - Alerting: fix response popover prompt when add notification channels. #18967, @lzdw
    - CloudWatch: Fix alerting for queries with Id (using GetMetricData). #17899, @alex-berger
    - Explore: Fix auto completion on label values for Loki. #18988, @aocenas
    - Explore: Fixes crash using back button with a zoomed in graph. #19122, @hugohaggmark
    - Explore: Fixes so queries in Explore are only run if Graph/Table is shown. #19000, @hugohaggmark
    - MSSQL: Change connectionstring to URL format to fix using passwords with semicolon. #18384, @Russiancold
    - MSSQL: Fix memory leak when debug enabled. #19049, @briangann
    - Provisioning: Allow escaping literal '$' with '$$' in configs to avoid interpolation. #18045, @kylebrandt
    - TimePicker: Fixes hiding time picker dropdown in FireFox. #19154, @hugohaggmark
  * Breaking changes
    + Annotations
      There are some breaking changes in the annotations HTTP API for region annotations. Region annotations are now represented
      using a single event instead of two seperate events. Check breaking changes in HTTP API below and HTTP API documentation for more details.
    + Docker
      Grafana is now using Alpine 3.10 as docker base image.
    + HTTP API
      - GET /api/alert-notifications now requires at least editor access.
        New /api/alert-notifications/lookup returns less information than /api/alert-notifications and can be access by any authenticated user.
      - GET /api/alert-notifiers now requires at least editor access
      - GET /api/org/users now requires org admin role.
        New /api/org/users/lookup returns less information than /api/org/users and can be access by users that are org admins,
        admin in any folder or admin of any team.
      - GET /api/annotations no longer returns regionId property.
      - POST /api/annotations no longer supports isRegion property.
      - PUT /api/annotations/:id no longer supports isRegion property.
      - PATCH /api/annotations/:id no longer supports isRegion property.
      - DELETE /api/annotations/region/:id has been removed.
  * Deprecation notes
    + PhantomJS
      - PhantomJS, which is used for rendering images of dashboards and panels,
        is deprecated and will be removed in a future Grafana release.
        A deprecation warning will from now on be logged when Grafana starts up if PhantomJS is in use.
        Please consider migrating from PhantomJS to the Grafana Image Renderer plugin.
- Changes from 6.3.6
  * Features / Enhancements
    - Metrics: Adds setting for turning off total stats metrics. #19142, @marefr
  * Bug Fixes
    - Database: Rewrite system statistics query to perform better. #19178, @papagian
    - Explore: Fixes error when switching from prometheus to loki data sources. #18599, @kaydelaney
- Rebase package spec. Use mostly from fedora, fix suse specified things and fix some errors.
- Add missing directories provisioning/datasources and provisioning/notifiers
  and sample.yaml as described in packaging/rpm/control from upstream.
  Missing directories are shown in logfiles.
- Version 6.3.5
  * Upgrades
    + Build: Upgrade to go 1.12.9.
  * Bug Fixes
    + Dashboard: Fixes dashboards init failed loading error for dashboards with panel links that had missing properties.
    + Editor: Fixes issue where only entire lines were being copied.
    + Explore: Fixes query field layout in splitted view for Safari browsers.
    + LDAP: multildap + ldap integration.
    + Profile/UserAdmin: Fix for user agent parser crashes grafana-server on 32-bit builds.
    + Prometheus: Prevents panel editor crash when switching to Prometheus datasource.
    + Prometheus: Changes brace-insertion behavior to be less annoying.
- Version 6.3.4
  * Security: CVE-2019-15043 - Parts of the HTTP API allow unauthenticated use.
- Version 6.3.3
  * Bug Fixes
    + Annotations: Fix failing annotation query when time series query is cancelled. #18532 1, @dprokop 1
    + Auth: Do not set SameSite cookie attribute if cookie_samesite is none. #18462 1, @papagian 3
    + DataLinks: Apply scoped variables to data links correctly. #18454 1, @dprokop 1
    + DataLinks: Respect timezone when displaying datapoint’s timestamp in graph context menu. #18461 2, @dprokop 1
    + DataLinks: Use datapoint timestamp correctly when interpolating variables. #18459 1, @dprokop 1
    + Explore: Fix loading error for empty queries. #18488 1, @davkal
    + Graph: Fixes legend issue clicking on series line icon and issue with horizontal scrollbar being visible on windows. #18563 1, @torkelo 2
    + Graphite: Avoid glob of single-value array variables . #18420, @gotjosh
    + Prometheus: Fix queries with label_replace remove the $1 match when loading query editor. #18480 5, @hugohaggmark 3
    + Prometheus: More consistently allows for multi-line queries in editor. #18362 2, @kaydelaney 2
    + TimeSeries: Assume values are all numbers. #18540 4, @ryantxu
- Version 6.3.2
  * Bug Fixes
    + Gauge/BarGauge: Fixes issue with losts thresholds and issue loading Gauge with avg stat. #18375 12
- Version 6.3.1
  * Bug Fixes
    + PanelLinks: Fix crash issue Gauge &amp; Bar Gauge for panels with panel links (drill down links). #18430 2
- Version 6.3.0
  * Features / Enhancements
    + OAuth: Do not set SameSite OAuth cookie if cookie_samesite is None. #18392 4, @papagian 3
    + Auth Proxy: Include additional headers as part of the cache key. #18298 6, @gotjosh
    + Build grafana images consistently. #18224 12, @hassanfarid
    + Docs: SAML. #18069 11, @gotjosh
    + Permissions: Show plugins in nav for non admin users but hide plugin configuration. #18234 1, @aocenas
    + TimePicker: Increase max height of quick range dropdown. #18247 2, @torkelo 2
    + Alerting: Add tags to alert rules. #10989 13, @Thib17 1
    + Alerting: Attempt to send email notifications to all given email addresses. #16881 1, @zhulongcheng
    + Alerting: Improve alert rule testing. #16286 2, @marefr
    + Alerting: Support for configuring content field for Discord alert notifier. #17017 2, @jan25
    + Alertmanager: Replace illegal chars with underscore in label names. #17002 5, @bergquist 1
    + Auth: Allow expiration of API keys. #17678, @papagian 3
    + Auth: Return device, os and browser when listing user auth tokens in HTTP API. #17504, @shavonn 1
    + Auth: Support list and revoke of user auth tokens in UI. #17434 2, @shavonn 1
    + AzureMonitor: change clashing built-in Grafana variables/macro names for Azure Logs. #17140, @shavonn 1
    + CloudWatch: Made region visible for AWS Cloudwatch Expressions. #17243 2, @utkarshcmu
    + Cloudwatch: Add AWS DocDB metrics. #17241, @utkarshcmu
    + Dashboard: Use timezone dashboard setting when exporting to CSV. #18002 1, @dehrax
    + Data links. #17267 11, @torkelo 2
    + Docker: Switch base image to ubuntu:latest from debian:stretch to avoid security issues… #17066 5, @bergquist 1
    + Elasticsearch: Support for visualizing logs in Explore . #17605 7, @marefr
    + Explore: Adds Live option for supported datasources. #17062 1, @hugohaggmark 3
    + Explore: Adds orgId to URL for sharing purposes. #17895 1, @kaydelaney 2
    + Explore: Adds support for new loki ‘start’ and ‘end’ params for labels endpoint. #17512, @kaydelaney 2
    + Explore: Adds support for toggling raw query mode in explore. #17870, @kaydelaney 2
    + Explore: Allow switching between metrics and logs . #16959 2, @marefr
    + Explore: Combines the timestamp and local time columns into one. #17775, @hugohaggmark 3
    + Explore: Display log lines context . #17097, @dprokop 1
    + Explore: Don’t parse log levels if provided by field or label. #17180 1, @marefr
    + Explore: Improves performance of Logs element by limiting re-rendering. #17685, @kaydelaney 2
    + Explore: Support for new LogQL filtering syntax. #16674 4, @davkal
    + Explore: Use new TimePicker from Grafana/UI. #17793, @hugohaggmark 3
    + Explore: handle newlines in LogRow Highlighter. #17425, @rrfeng 1
    + Graph: Added new fill gradient option. #17528 3, @torkelo 2
    + GraphPanel: Don’t sort series when legend table &amp; sort column is not visible . #17095, @shavonn 1
    + InfluxDB: Support for visualizing logs in Explore. #17450 9, @hugohaggmark 3
    + Logging: Login and Logout actions (#17760). #17883 1, @ATTron
    + Logging: Move log package to pkg/infra. #17023, @zhulongcheng
    + Metrics: Expose stats about roles as metrics. #17469 2, @bergquist 1
    + MySQL/Postgres/MSSQL: Add parsing for day, weeks and year intervals in macros. #13086 6, @bernardd
    + MySQL: Add support for periodically reloading client certs. #14892, @tpetr
    + Plugins: replace dataFormats list with skipDataQuery flag in plugin.json. #16984, @ryantxu
    + Prometheus: Take timezone into account for step alignment. #17477, @fxmiii
    + Prometheus: Use overridden panel range for $__range instead of dashboard range. #17352, @patrick246
    + Prometheus: added time range filter to series labels query. #16851 3, @FUSAKLA
    + Provisioning: Support folder that doesn’t exist yet in dashboard provisioning. #17407 1, @Nexucis
    + Refresh picker: Handle empty intervals. #17585 1, @dehrax
    + Singlestat: Add y min/max config to singlestat sparklines. #17527 4, @pitr
    + Snapshot: use given key and deleteKey. #16876, @zhulongcheng
    + Templating: Correctly display __text in multi-value variable after page reload. #17840 1, @EduardSergeev
    + Templating: Support selecting all filtered values of a multi-value variable. #16873 2, @r66ad
    + Tracing: allow propagation with Zipkin headers. #17009 4, @jrockway
    + Users: Disable users removed from LDAP. #16820 2, @alexanderzobnin
  * Bug Fixes
    + PanelLinks: Fix render issue when there is no panel description. #18408 3, @dehrax
    + OAuth: Fix “missing saved state” OAuth login failure due to SameSite cookie policy. #18332 1, @papagian 3
    + cli: fix for recognizing when in dev mode… #18334, @xlson
    + DataLinks: Fixes incorrect interpolation of ${__series_name} . #18251 1, @torkelo 2
    + Loki: Display live tailed logs in correct order in Explore. #18031 3, @kaydelaney 2
    + PhantomJS: Fixes rendering on Debian Buster. #18162 2, @xlson
    + TimePicker: Fixed style issue for custom range popover. #18244, @torkelo 2
    + Timerange: Fixes a bug where custom time ranges didn’t respect UTC. #18248 1, @kaydelaney 2
    + remote_cache: Fix redis connstr parsing. #18204 1, @mblaschke
    + AddPanel: Fix issue when removing moved add panel widget . #17659 2, @dehrax
    + CLI: Fix encrypt-datasource-passwords fails with sql error. #18014, @marefr
    + Elasticsearch: Fix default max concurrent shard requests. #17770 4, @marefr
    + Explore: Fix browsing back to dashboard panel. #17061, @jschill
    + Explore: Fix filter by series level in logs graph. #17798, @marefr
    + Explore: Fix issues when loading and both graph/table are collapsed. #17113, @marefr
    + Explore: Fix selection/copy of log lines. #17121, @marefr
    + Fix: Wrap value of multi variable in array when coming from URL. #16992 1, @aocenas
    + Frontend: Fix for Json tree component not working. #17608, @srid12
    + Graphite: Fix for issue with alias function being moved last. #17791, @torkelo 2
    + Graphite: Fixes issue with seriesByTag &amp; function with variable param. #17795, @torkelo 2
    + Graphite: use POST for /metrics/find requests. #17814 2, @papagian 3
    + HTTP Server: Serve Grafana with a custom URL path prefix. #17048 6, @jan25
    + InfluxDB: Fixes single quotes are not escaped in label value filters. #17398 1, @Panzki
    + Prometheus: Correctly escape ‘|’ literals in interpolated PromQL variables. #16932, @Limess
    + Prometheus: Fix when adding label for metrics which contains colons in Explore. #16760, @tolwi
    + SinglestatPanel: Remove background color when value turns null. #17552 1, @druggieri
- Make phantomjs dependency configurable
- Create plugin directory and clean up (create in %install,
  add to %files) handling of /var/lib/grafana/* and

mgr-cfg:

- Remove commented code in test files
- Replace spacewalk-usix with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)
- Add mgr manpage links

mgr-custom-info:

- Bump version to 4.1.0 (bsc#1154940)

mgr-daemon:

- Bump version to 4.1.0 (bsc#1154940)
- Fix systemd timer configuration on SLE12 (bsc#1142038)

mgr-osad:

- Separate osa-dispatcher and jabberd so it can be disabled independently
- Replace spacewalk-usix with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)
- Move /usr/share/rhn/config-defaults to uyuni-base-common
- Require uyuni-base-common for /etc/rhn (for osa-dispatcher)
- Ensure bytes type when using hashlib to avoid traceback (bsc#1138822)

mgr-push:

- Replace spacewalk-usix and spacewalk-backend-libs with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)

mgr-virtualization:

- Replace spacewalk-usix with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)
- Fix mgr-virtualization timer

rhnlib:

- Fix building
- Fix malformed XML response when data contains non-ASCII chars (bsc#1154968)
- Bump version to 4.1.0 (bsc#1154940)
- Fix bootstrapping SLE11SP4 trad client with SSL enabled (bsc#1148177)

spacecmd:

- Only report real error, not result (bsc#1171687)
- Use defined return values for spacecmd methods so scripts can
  check for failure (bsc#1171687)
- Disable globbing for api subcommand to allow wildcards in filter
  settings (bsc#1163871)
- Bugfix: attempt to purge SSM when it is empty (bsc#1155372)
- Bump version to 4.1.0 (bsc#1154940)
- Prevent error when piping stdout in Python 2 (bsc#1153090)
- Java api expects content as encoded string instead of encoded bytes like before (bsc#1153277)
- Enable building and installing for Ubuntu 16.04 and Ubuntu 18.04
- Add unit test for schedule, errata, user, utils, misc, configchannel
  and kickstart modules
- Multiple minor bugfixes alongside the unit tests
- Bugfix: referenced variable before assignment.
- Add unit test for report, package, org, repo and group

spacewalk-client-tools:

- Add workaround for uptime overflow to spacewalk-update-status as well (bsc#1165921)
- Spell correctly 'successful' and 'successfully'
- Skip dmidecode data on aarch64 to prevent coredump (bsc#1113160)
- Replace spacewalk-usix with uyuni-common-libs
- Return a non-zero exit status on errors in rhn_check
- Bump version to 4.1.0 (bsc#1154940)
- Make a explicit requirement to systemd for spacewalk-client-tools
  when rhnsd timer is installed

spacewalk-koan:

- Bump version to 4.1.0 (bsc#1154940)
- Require commands we use in merge-rd.sh

spacewalk-oscap:

- Bump version to 4.1.0 (bsc#1154940)

spacewalk-remote-utils:

- Update spacewalk-create-channel with RHEL 7.7 channel definitions
- Bump version to 4.1.0 (bsc#1154940)

supportutils-plugin-susemanager-client:

- Bump version to 4.1.0 (bsc#1154940)

suseRegisterInfo:

- SuseRegisterInfo only needs perl-base, not full perl (bsc#1168310)
- Bump version to 4.1.0 (bsc#1154940)

zypp-plugin-spacewalk:

- Prevent issue with non-ASCII characters in Python 2 systems (bsc#1172462)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-21"/>
	<updated date="2020-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1113160">SUSE bug 1113160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134195">SUSE bug 1134195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138822">SUSE bug 1138822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141661">SUSE bug 1141661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142038">SUSE bug 1142038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143913">SUSE bug 1143913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148177">SUSE bug 1148177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153090">SUSE bug 1153090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153277">SUSE bug 1153277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154940">SUSE bug 1154940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154968">SUSE bug 1154968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155372">SUSE bug 1155372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163871">SUSE bug 1163871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165921">SUSE bug 1165921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168310">SUSE bug 1168310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170231">SUSE bug 1170231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170557">SUSE bug 1170557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171687">SUSE bug 1171687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172462">SUSE bug 1172462</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10215/">CVE-2019-10215 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10215">CVE-2019-10215 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15043/">CVE-2019-15043 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15043">CVE-2019-15043 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12245/">CVE-2020-12245 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12245">CVE-2020-12245 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13379/">CVE-2020-13379 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13379">CVE-2020-13379 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554824" comment="golang-github-prometheus-node_exporter-0.18.1-1.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150042" version="1" class="patch">
	<metadata>
		<title>Security update for xrdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1173580" ref_url="https://bugzilla.suse.com/1173580" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-4044" ref_url="https://www.suse.com/security/cve/CVE-2020-4044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007166.html" source="SUSE-SU"/>
		<description>
This update for xrdp fixes the following issues:

- Security fixes (bsc#1173580, CVE-2020-4044):
  + Add patches:
    * xrdp-cve-2020-4044-fix-0.patch
    * xrdp-cve-2020-4044-fix-1.patch
  + Rebase SLE patch:
    * xrdp-fate318398-change-expired-password.patch
- Update patch:
  + xrdp-Allow-sessions-with-32-bpp.patch.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-21"/>
	<updated date="2020-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173580">SUSE bug 1173580</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-4044/">CVE-2020-4044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4044">CVE-2020-4044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554825" comment="xrdp-0.9.0~git.1456906198.f422461-21.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150043" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006397.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_113 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721279" comment="kernel-default 4.4.180-94.113 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719606" comment="kgraft-patch-4_4_180-94_113-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538482" comment="kgraft-patch-4_4_180-94_113-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150044" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1173369" ref_url="https://bugzilla.suse.com/1173369" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15011" ref_url="https://www.suse.com/security/cve/CVE-2020-15011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007181.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2020-15011: Fixed a possible Arbitrary Content Injection via the private archive login page (bsc#1173369).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-24"/>
	<updated date="2020-07-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173369">SUSE bug 1173369</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15011/">CVE-2020-15011 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15011">CVE-2020-15011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551538" comment="mailman-2.1.17-3.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150045" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006397.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_107 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721280" comment="kernel-default 4.4.180-94.107 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719608" comment="kgraft-patch-4_4_180-94_107-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538483" comment="kgraft-patch-4_4_180-94_107-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150046" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1173160" ref_url="https://bugzilla.suse.com/1173160" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007194.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-10745: Fixed an issue which parsing and packing of NBT and DNS packets containing dots could potentially have consumed excessive CPU (bsc#1173160).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10745">CVE-2020-10745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554826" comment="libdcerpc-binding0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554827" comment="libdcerpc-binding0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554828" comment="libdcerpc0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554829" comment="libdcerpc0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554830" comment="libndr-krb5pac0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554831" comment="libndr-krb5pac0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554832" comment="libndr-nbt0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554833" comment="libndr-nbt0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554834" comment="libndr-standard0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554835" comment="libndr-standard0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554836" comment="libndr0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554837" comment="libndr0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554838" comment="libnetapi0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554839" comment="libnetapi0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554840" comment="libsamba-credentials0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554841" comment="libsamba-credentials0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554842" comment="libsamba-errors0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554843" comment="libsamba-errors0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554844" comment="libsamba-hostconfig0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554845" comment="libsamba-hostconfig0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554846" comment="libsamba-passdb0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554847" comment="libsamba-passdb0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554848" comment="libsamba-util0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554849" comment="libsamba-util0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554850" comment="libsamdb0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554851" comment="libsamdb0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554852" comment="libsmbclient0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554853" comment="libsmbclient0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554854" comment="libsmbconf0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554855" comment="libsmbconf0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554856" comment="libsmbldap0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554857" comment="libsmbldap0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554858" comment="libtevent-util0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554859" comment="libtevent-util0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554860" comment="libwbclient0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554861" comment="libwbclient0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554862" comment="samba-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554863" comment="samba-client-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554864" comment="samba-client-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538523" comment="samba-doc-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554865" comment="samba-libs-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554866" comment="samba-libs-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554867" comment="samba-winbind-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554868" comment="samba-winbind-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150047" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1173998" ref_url="https://bugzilla.suse.com/1173998" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9806" ref_url="https://www.suse.com/security/cve/CVE-2020-9806/" source="CVE"/>
		<reference ref_id="CVE-2020-9807" ref_url="https://www.suse.com/security/cve/CVE-2020-9807/" source="CVE"/>
		<reference ref_id="CVE-2020-9843" ref_url="https://www.suse.com/security/cve/CVE-2020-9843/" source="CVE"/>
		<reference ref_id="CVE-2020-9850" ref_url="https://www.suse.com/security/cve/CVE-2020-9850/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.3 (bsc#1173998):
  + Enable kinetic scrolling with async scrolling.
  + Fix web process hangs on large GitHub pages.
  + Bubblewrap sandbox should not attempt to bind empty paths.
  + Fix threading issues in the media player.
  + Fix several crashes and rendering issues.
  + Security fixes:  CVE-2020-9802, CVE-2020-9803, CVE-2020-9805,
    CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850,
    CVE-2020-13753.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13753">CVE-2020-13753 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9802">CVE-2020-9802 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9803">CVE-2020-9803 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9805">CVE-2020-9805 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9806/">CVE-2020-9806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9806">CVE-2020-9806 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9807/">CVE-2020-9807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9807">CVE-2020-9807 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9843/">CVE-2020-9843 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9843">CVE-2020-9843 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9850/">CVE-2020-9850 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9850">CVE-2020-9850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554869" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554870" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554871" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554872" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542856" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554873" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150048" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1084632" ref_url="https://bugzilla.suse.com/1084632" source="BUGZILLA"/>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1173812" ref_url="https://bugzilla.suse.com/1173812" source="BUGZILLA"/>
		<reference ref_id="1174463" ref_url="https://bugzilla.suse.com/1174463" source="BUGZILLA"/>
		<reference ref_id="1174570" ref_url="https://bugzilla.suse.com/1174570" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308/" source="CVE"/>
		<reference ref_id="CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309/" source="CVE"/>
		<reference ref_id="CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310/" source="CVE"/>
		<reference ref_id="CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311/" source="CVE"/>
		<reference ref_id="CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706/" source="CVE"/>
		<reference ref_id="CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- Fix for CVE-2020-10713 (bsc#1168994)
- Fix for CVE-2020-14308 CVE-2020-14309, CVE-2020-14310, CVE-2020-14311
  (bsc#1173812)
- Fix for CVE-2020-15706 (bsc#1174463)
- Fix for CVE-2020-15707 (bsc#1174570)

- Use overflow checking primitives where the arithmetic expression for buffer
  allocations may include unvalidated data
- Use grub_calloc for overflow check and return NULL when it would occur 
- Use gcc-9 compiler for overflow check builtins
- Backport gcc-9 build fixes
- Fix packed-not-aligned error on GCC 8 (bsc#1084632)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1084632">SUSE bug 1084632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174463">SUSE bug 1174463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174570">SUSE bug 1174570</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14308">CVE-2020-14308 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14309">CVE-2020-14309 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14310">CVE-2020-14310 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14311">CVE-2020-14311 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15706">CVE-2020-15706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15707">CVE-2020-15707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554874" comment="grub2-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554875" comment="grub2-arm64-efi-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538529" comment="grub2-i386-pc-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538530" comment="grub2-powerpc-ieee1275-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554876" comment="grub2-s390x-emu-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538531" comment="grub2-snapper-plugin-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538532" comment="grub2-systemd-sleep-plugin-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538533" comment="grub2-x86_64-efi-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538534" comment="grub2-x86_64-xen-2.02-4.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150049" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006397.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_103 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721277" comment="kernel-default 4.4.180-94.103 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719602" comment="kgraft-patch-4_4_180-94_103-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538535" comment="kgraft-patch-4_4_180-94_103-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150050" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1174415" ref_url="https://bugzilla.suse.com/1174415" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15900" ref_url="https://www.suse.com/security/cve/CVE-2020-15900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007204.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- fixed CVE-2020-15900 Memory Corruption (SAFER Sandbox Breakout)
  cf. https://bugs.ghostscript.com/show_bug.cgi?id=702582
  (bsc#1174415)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-30"/>
	<updated date="2020-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174415">SUSE bug 1174415</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15900/">CVE-2020-15900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15900">CVE-2020-15900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554877" comment="ghostscript-9.52-23.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554878" comment="ghostscript-x11-9.52-23.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150051" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1173948" ref_url="https://bugzilla.suse.com/1173948" source="BUGZILLA"/>
		<reference ref_id="1174538" ref_url="https://bugzilla.suse.com/1174538" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.1.0 ESR
  * Fixed: Various stability, functionality, and security fixes (bsc#1174538)
  * CVE-2020-15652: Potential leak of redirect targets when loading scripts in a worker
  * CVE-2020-6514: WebRTC data channel leaks internal address to peer
  * CVE-2020-15655: Extension APIs could be used to bypass Same-Origin Policy
  * CVE-2020-15653: Bypassing iframe sandbox when allowing popups
  * CVE-2020-6463: Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture
  * CVE-2020-15656: Type confusion for special arguments in IonMonkey
  * CVE-2020-15658: Overriding file type when saving to disk
  * CVE-2020-15657: DLL hijacking due to incorrect loading path
  * CVE-2020-15654: Custom cursor can overlay user interface
  * CVE-2020-15659: Memory safety bugs fixed in Firefox 79 and Firefox ESR 78.1
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-31"/>
	<updated date="2020-07-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173948">SUSE bug 1173948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15652">CVE-2020-15652 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15653">CVE-2020-15653 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15654">CVE-2020-15654 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15655">CVE-2020-15655 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15656">CVE-2020-15656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15657">CVE-2020-15657 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15658">CVE-2020-15658 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15659">CVE-2020-15659 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6463">CVE-2020-6463 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6514">CVE-2020-6514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554879" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542859" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554880" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150052" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006397.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_100 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721278" comment="kernel-default 4.4.180-94.100 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719604" comment="kgraft-patch-4_4_180-94_100-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538536" comment="kgraft-patch-4_4_180-94_100-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150053" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007222.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-04"/>
	<updated date="2020-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554881" comment="libX11-6-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551554" comment="libX11-6-32bit-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531126" comment="libX11-data-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554882" comment="libX11-xcb1-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551556" comment="libX11-xcb1-32bit-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554883" comment="libxcb-dri2-0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551558" comment="libxcb-dri2-0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542866" comment="libxcb-dri3-0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551560" comment="libxcb-dri3-0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554884" comment="libxcb-glx0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551562" comment="libxcb-glx0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542867" comment="libxcb-present0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551564" comment="libxcb-present0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554885" comment="libxcb-randr0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554886" comment="libxcb-render0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551567" comment="libxcb-render0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554887" comment="libxcb-shape0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554888" comment="libxcb-shm0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551570" comment="libxcb-shm0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554889" comment="libxcb-sync1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551572" comment="libxcb-sync1-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554890" comment="libxcb-xf86dri0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554891" comment="libxcb-xfixes0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551575" comment="libxcb-xfixes0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542872" comment="libxcb-xinerama0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554892" comment="libxcb-xkb1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551578" comment="libxcb-xkb1-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554893" comment="libxcb-xv0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554894" comment="libxcb1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551581" comment="libxcb1-32bit-1.10-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150054" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1146351" ref_url="https://bugzilla.suse.com/1146351" source="BUGZILLA"/>
		<reference ref_id="1149652" ref_url="https://bugzilla.suse.com/1149652" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1162002" ref_url="https://bugzilla.suse.com/1162002" source="BUGZILLA"/>
		<reference ref_id="1164910" ref_url="https://bugzilla.suse.com/1164910" source="BUGZILLA"/>
		<reference ref_id="1170011" ref_url="https://bugzilla.suse.com/1170011" source="BUGZILLA"/>
		<reference ref_id="1170618" ref_url="https://bugzilla.suse.com/1170618" source="BUGZILLA"/>
		<reference ref_id="1171078" ref_url="https://bugzilla.suse.com/1171078" source="BUGZILLA"/>
		<reference ref_id="1171189" ref_url="https://bugzilla.suse.com/1171189" source="BUGZILLA"/>
		<reference ref_id="1171191" ref_url="https://bugzilla.suse.com/1171191" source="BUGZILLA"/>
		<reference ref_id="1171220" ref_url="https://bugzilla.suse.com/1171220" source="BUGZILLA"/>
		<reference ref_id="1171732" ref_url="https://bugzilla.suse.com/1171732" source="BUGZILLA"/>
		<reference ref_id="1171988" ref_url="https://bugzilla.suse.com/1171988" source="BUGZILLA"/>
		<reference ref_id="1172453" ref_url="https://bugzilla.suse.com/1172453" source="BUGZILLA"/>
		<reference ref_id="1172458" ref_url="https://bugzilla.suse.com/1172458" source="BUGZILLA"/>
		<reference ref_id="1172775" ref_url="https://bugzilla.suse.com/1172775" source="BUGZILLA"/>
		<reference ref_id="1172999" ref_url="https://bugzilla.suse.com/1172999" source="BUGZILLA"/>
		<reference ref_id="1173280" ref_url="https://bugzilla.suse.com/1173280" source="BUGZILLA"/>
		<reference ref_id="1173658" ref_url="https://bugzilla.suse.com/1173658" source="BUGZILLA"/>
		<reference ref_id="1174115" ref_url="https://bugzilla.suse.com/1174115" source="BUGZILLA"/>
		<reference ref_id="1174462" ref_url="https://bugzilla.suse.com/1174462" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810/" source="CVE"/>
		<reference ref_id="CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135/" source="CVE"/>
		<reference ref_id="CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).
- CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).
- CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).
- CVE-2020-10732: A flaw was found in the implementation of userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed  (bnc#1172999).
- CVE-2020-14416: A race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. (bnc#1172775).
- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).

The following non-security bugs were fixed:

- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170618).
- ibmvnic: Do not process device remove during device reset (bsc#1065729).
- ibmvnic: Do not process reset during or after device removal (bsc#1149652 ltc#179635).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).
- ibmvnic: Unmap DMA address of TX descriptor buffers after use (bsc#1146351 ltc#180726).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1164910).
- net/ibmvnic: Fix missing { in __ibmvnic_reset (bsc#1149652 ltc#179635).
- net/ibmvnic: free reset work of removed device from queue (bsc#1149652 ltc#179635).
- net/ibmvnic: prevent more than one thread from running in reset (bsc#1152457 ltc#174432).
- net/ibmvnic: unlock rtnl_lock in reset so linkwatch_event can run (bsc#1152457 ltc#174432).
- udp: drop corrupt packets earlier to avoid data corruption (bsc#1173658).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146351">SUSE bug 1146351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149652">SUSE bug 1149652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164910">SUSE bug 1164910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170011">SUSE bug 1170011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170618">SUSE bug 1170618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171078">SUSE bug 1171078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171189">SUSE bug 1171189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171191">SUSE bug 1171191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171732">SUSE bug 1171732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171988">SUSE bug 1171988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172453">SUSE bug 1172453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172458">SUSE bug 1172458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173280">SUSE bug 1173280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173658">SUSE bug 1173658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174115">SUSE bug 1174115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20810">CVE-2019-20810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20812">CVE-2019-20812 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0305">CVE-2020-0305 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10135">CVE-2020-10135 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10711">CVE-2020-10711 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10732">CVE-2020-10732 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10751">CVE-2020-10751 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10773">CVE-2020-10773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12771">CVE-2020-12771 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13974">CVE-2020-13974 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14416">CVE-2020-14416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554895" comment="kernel-default-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554896" comment="kernel-default-base-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554897" comment="kernel-default-devel-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538540" comment="kernel-default-kgraft-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554898" comment="kernel-default-man-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538541" comment="kernel-devel-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538542" comment="kernel-macros-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538543" comment="kernel-source-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554899" comment="kernel-syms-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538545" comment="kgraft-patch-4_4_180-94_127-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150055" version="1" class="patch">
	<metadata>
		<title>Security update for python-ipaddress (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007239.html" source="SUSE-SU"/>
		<description>
This update for python-ipaddress fixes the following issues:

- Add CVE-2020-14422-ipaddress-hash-collision.patch fixing
  CVE-2020-14422 (bsc#1173274, bpo#41004), where hash collisions
  in IPv4Interface and IPv6Interface could lead to DOS. 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14422">CVE-2020-14422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531162" comment="python-ipaddress-1.0.18-3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150056" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1173477" ref_url="https://bugzilla.suse.com/1173477" source="BUGZILLA"/>
		<reference ref_id="1173691" ref_url="https://bugzilla.suse.com/1173691" source="BUGZILLA"/>
		<reference ref_id="1173694" ref_url="https://bugzilla.suse.com/1173694" source="BUGZILLA"/>
		<reference ref_id="1173700" ref_url="https://bugzilla.suse.com/1173700" source="BUGZILLA"/>
		<reference ref_id="1173701" ref_url="https://bugzilla.suse.com/1173701" source="BUGZILLA"/>
		<reference ref_id="1173743" ref_url="https://bugzilla.suse.com/1173743" source="BUGZILLA"/>
		<reference ref_id="1173874" ref_url="https://bugzilla.suse.com/1173874" source="BUGZILLA"/>
		<reference ref_id="1173875" ref_url="https://bugzilla.suse.com/1173875" source="BUGZILLA"/>
		<reference ref_id="1173876" ref_url="https://bugzilla.suse.com/1173876" source="BUGZILLA"/>
		<reference ref_id="1173880" ref_url="https://bugzilla.suse.com/1173880" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922/" source="CVE"/>
		<reference ref_id="CVE-2018-21247" ref_url="https://www.suse.com/security/cve/CVE-2018-21247/" source="CVE"/>
		<reference ref_id="CVE-2019-20839" ref_url="https://www.suse.com/security/cve/CVE-2019-20839/" source="CVE"/>
		<reference ref_id="CVE-2019-20840" ref_url="https://www.suse.com/security/cve/CVE-2019-20840/" source="CVE"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398/" source="CVE"/>
		<reference ref_id="CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399/" source="CVE"/>
		<reference ref_id="CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400/" source="CVE"/>
		<reference ref_id="CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401/" source="CVE"/>
		<reference ref_id="CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402/" source="CVE"/>
		<reference ref_id="CVE-2020-14403" ref_url="https://www.suse.com/security/cve/CVE-2020-14403/" source="CVE"/>
		<reference ref_id="CVE-2020-14404" ref_url="https://www.suse.com/security/cve/CVE-2020-14404/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- security update
  fix CVE-2018-21247 [bsc#1173874], uninitialized memory contents are vulnerable to Information leak
  fix CVE-2019-20839 [bsc#1173875], buffer overflow in ConnectClientToUnixSock()
  fix CVE-2019-20840 [bsc#1173876], unaligned accesses in hybiReadAndDecode can lead to denial of service
  fix CVE-2020-14398 [bsc#1173880], improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c
  fix CVE-2020-14397 [bsc#1173700], NULL pointer dereference in libvncserver/rfbregion.c
  fix CVE-2020-14399 [bsc#1173743], Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c.
  fix CVE-2020-14400 [bsc#1173691], Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c.
  fix CVE-2020-14401 [bsc#1173694], potential integer overflows in libvncserver/scale.c
  fix CVE-2020-14402 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2020-14403 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2020-14404 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2017-18922 [bsc#1173477], preauth buffer overwrite
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-07"/>
	<updated date="2020-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173691">SUSE bug 1173691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173694">SUSE bug 1173694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173700">SUSE bug 1173700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173743">SUSE bug 1173743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173874">SUSE bug 1173874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173875">SUSE bug 1173875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173876">SUSE bug 1173876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173880">SUSE bug 1173880</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18922">CVE-2017-18922 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-21247/">CVE-2018-21247 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21247">CVE-2018-21247 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20839/">CVE-2019-20839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20839">CVE-2019-20839 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20840/">CVE-2019-20840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20840">CVE-2019-20840 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14397">CVE-2020-14397 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14398">CVE-2020-14398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14399">CVE-2020-14399 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14400">CVE-2020-14400 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14401">CVE-2020-14401 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14402">CVE-2020-14402 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14403/">CVE-2020-14403 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14403">CVE-2020-14403 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14404/">CVE-2020-14404 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14404">CVE-2020-14404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554900" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554901" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150057" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007243.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1174543 - secure boot related fixes
- bsc#1163019 - CVE-2020-8608: Potential OOB access due to unsafe snprintf() usages
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-07"/>
	<updated date="2020-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538546" comment="xen-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538547" comment="xen-doc-html-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538548" comment="xen-libs-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538549" comment="xen-libs-32bit-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538550" comment="xen-tools-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538551" comment="xen-tools-domU-4.9.4_10-3.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150058" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1156146" ref_url="https://bugzilla.suse.com/1156146" source="BUGZILLA"/>
		<reference ref_id="1171477" ref_url="https://bugzilla.suse.com/1171477" source="BUGZILLA"/>
		<reference ref_id="1171930" ref_url="https://bugzilla.suse.com/1171930" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14818" ref_url="https://www.suse.com/security/cve/CVE-2019-14818/" source="CVE"/>
		<reference ref_id="CVE-2020-10722" ref_url="https://www.suse.com/security/cve/CVE-2020-10722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007254.html" source="SUSE-SU"/>
		<description>
This update for dpdk to version 16.11.9 following issue:

- CVE-2019-14818: Fixed a memory leak vulnerability caused by a malicious container may lead to to denial of service (bsc#1156146).
- CVE-2020-12693: Fixed an authentication bypass via an alternate path or channel (boo#1172004).

- rebuilt with new signing key. (bsc#1174543)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156146">SUSE bug 1156146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171477">SUSE bug 1171477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171930">SUSE bug 1171930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14818/">CVE-2019-14818 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14818">CVE-2019-14818 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10722/">CVE-2020-10722 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10722">CVE-2020-10722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554902" comment="dpdk-16.11.9-8.15.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538553" comment="dpdk-kmp-default-16.11.9_k4.4.180_94.127-8.15.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554903" comment="dpdk-thunderx-16.11.9-8.15.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554904" comment="dpdk-thunderx-kmp-default-16.11.9_k4.4.180_94.127-8.15.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554905" comment="dpdk-tools-16.11.9-8.15.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150059" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007253.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554906" comment="libX11-6-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551590" comment="libX11-6-32bit-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531167" comment="libX11-data-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554907" comment="libX11-xcb1-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551592" comment="libX11-xcb1-32bit-1.6.2-12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150060" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-c (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1083630" ref_url="https://bugzilla.suse.com/1083630" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12627" ref_url="https://www.suse.com/security/cve/CVE-2017-12627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007262.html" source="SUSE-SU"/>
		<description>
This update for xerces-c fixes the following issues:

- CVE-2017-12627: Processing of external DTD paths could have resulted in a
  null pointer dereference under certain conditions (bsc#1083630)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083630">SUSE bug 1083630</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12627/">CVE-2017-12627 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12627">CVE-2017-12627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554908" comment="libxerces-c-3_1-3.1.1-13.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551594" comment="libxerces-c-3_1-32bit-3.1.1-13.3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150061" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1174662" ref_url="https://bugzilla.suse.com/1174662" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-9862" ref_url="https://www.suse.com/security/cve/CVE-2020-9862/" source="CVE"/>
		<reference ref_id="CVE-2020-9893" ref_url="https://www.suse.com/security/cve/CVE-2020-9893/" source="CVE"/>
		<reference ref_id="CVE-2020-9894" ref_url="https://www.suse.com/security/cve/CVE-2020-9894/" source="CVE"/>
		<reference ref_id="CVE-2020-9895" ref_url="https://www.suse.com/security/cve/CVE-2020-9895/" source="CVE"/>
		<reference ref_id="CVE-2020-9915" ref_url="https://www.suse.com/security/cve/CVE-2020-9915/" source="CVE"/>
		<reference ref_id="CVE-2020-9925" ref_url="https://www.suse.com/security/cve/CVE-2020-9925/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.4 (bsc#1174662):
  + Fix several crashes and rendering issues.
  + Security fixes: CVE-2020-9862, CVE-2020-9893, CVE-2020-9894,
    CVE-2020-9895, CVE-2020-9915, CVE-2020-9925.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9862/">CVE-2020-9862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9862">CVE-2020-9862 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9893/">CVE-2020-9893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9893">CVE-2020-9893 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9894/">CVE-2020-9894 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9894">CVE-2020-9894 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9895/">CVE-2020-9895 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9895">CVE-2020-9895 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9915/">CVE-2020-9915 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9915">CVE-2020-9915 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9925/">CVE-2020-9925 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9925">CVE-2020-9925 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554909" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554910" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554912" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542882" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554913" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150062" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1174922" ref_url="https://bugzilla.suse.com/1174922" source="BUGZILLA"/>
		<reference ref_id="1174923" ref_url="https://bugzilla.suse.com/1174923" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12673" ref_url="https://www.suse.com/security/cve/CVE-2020-12673/" source="CVE"/>
		<reference ref_id="CVE-2020-12674" ref_url="https://www.suse.com/security/cve/CVE-2020-12674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007281.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2020-12673: improper implementation of NTLM does not check message buffer size (bsc#1174922).
- CVE-2020-12674: improper implementation of RPA mechanism (bsc#1174923).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-19"/>
	<updated date="2020-08-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174922">SUSE bug 1174922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174923">SUSE bug 1174923</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12673/">CVE-2020-12673 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12673">CVE-2020-12673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12674/">CVE-2020-12674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12674">CVE-2020-12674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554914" comment="dovecot22-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554915" comment="dovecot22-backend-mysql-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554916" comment="dovecot22-backend-pgsql-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554917" comment="dovecot22-backend-sqlite-2.2.31-19.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150063" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1172745" ref_url="https://bugzilla.suse.com/1172745" source="BUGZILLA"/>
		<reference ref_id="1174421" ref_url="https://bugzilla.suse.com/1174421" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007290.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- CVE-2020-15705: Fail kernel validation without shim protocol (bsc#1174421).
- Add fibre channel device's ofpath support to grub-ofpathname and search hint to speed up root device discovery (bsc#1172745).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172745">SUSE bug 1172745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174421">SUSE bug 1174421</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15705">CVE-2020-15705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554918" comment="grub2-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554919" comment="grub2-arm64-efi-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538556" comment="grub2-i386-pc-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538557" comment="grub2-powerpc-ieee1275-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554920" comment="grub2-s390x-emu-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538558" comment="grub2-snapper-plugin-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538559" comment="grub2-systemd-sleep-plugin-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538560" comment="grub2-x86_64-efi-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538561" comment="grub2-x86_64-xen-2.02-4.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150064" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1160888" ref_url="https://bugzilla.suse.com/1160888" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14907" ref_url="https://www.suse.com/security/cve/CVE-2019-14907/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006407.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2019-14907: Fixed a Server-side crash after charset conversion failure during NTLMSSP processing (bsc#1160888).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-24"/>
	<updated date="2020-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1160888">SUSE bug 1160888</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14907/">CVE-2019-14907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14907">CVE-2019-14907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554921" comment="libdcerpc-binding0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554922" comment="libdcerpc-binding0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554923" comment="libdcerpc0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554924" comment="libdcerpc0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554925" comment="libndr-krb5pac0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554926" comment="libndr-krb5pac0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554927" comment="libndr-nbt0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554928" comment="libndr-nbt0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554929" comment="libndr-standard0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554930" comment="libndr-standard0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554931" comment="libndr0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554932" comment="libndr0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554933" comment="libnetapi0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554934" comment="libnetapi0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554935" comment="libsamba-credentials0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554936" comment="libsamba-credentials0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554937" comment="libsamba-errors0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554938" comment="libsamba-errors0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554939" comment="libsamba-hostconfig0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554940" comment="libsamba-hostconfig0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554941" comment="libsamba-passdb0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554942" comment="libsamba-passdb0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554943" comment="libsamba-util0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554944" comment="libsamba-util0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554945" comment="libsamdb0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554946" comment="libsamdb0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554947" comment="libsmbclient0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554948" comment="libsmbclient0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554949" comment="libsmbconf0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554950" comment="libsmbconf0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554951" comment="libsmbldap0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554952" comment="libsmbldap0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554953" comment="libtevent-util0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554954" comment="libtevent-util0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554955" comment="libwbclient0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554956" comment="libwbclient0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554957" comment="samba-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554958" comment="samba-client-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554959" comment="samba-client-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522590" comment="samba-doc-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554960" comment="samba-libs-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554961" comment="samba-libs-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554962" comment="samba-winbind-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554963" comment="samba-winbind-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150065" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1174633" ref_url="https://bugzilla.suse.com/1174633" source="BUGZILLA"/>
		<reference ref_id="1174635" ref_url="https://bugzilla.suse.com/1174635" source="BUGZILLA"/>
		<reference ref_id="1174638" ref_url="https://bugzilla.suse.com/1174638" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14346" ref_url="https://www.suse.com/security/cve/CVE-2020-14346/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007305.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14347: Leak of uninitialized heap memory from the X server to clients on pixmap allocation (bsc#1174633, ZDI-CAN-11426).
- CVE-2020-14346: XIChangeHierarchy Integer Underflow Privilege Escalation Vulnerability (bsc#1174638, ZDI-CAN-11429).
- CVE-2020-14345: XKB out-of-bounds access privilege escalation vulnerability (bsc#1174635, ZDI-CAN-11428).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-26"/>
	<updated date="2020-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14345">CVE-2020-14345 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14346/">CVE-2020-14346 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14346">CVE-2020-14346 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14347">CVE-2020-14347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554964" comment="xorg-x11-server-7.6_1.18.3-76.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554965" comment="xorg-x11-server-extra-7.6_1.18.3-76.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150066" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17631" ref_url="https://www.suse.com/security/cve/CVE-2019-17631/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2996" ref_url="https://www.suse.com/security/cve/CVE-2019-2996/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2958
    CVE-2019-2962 CVE-2019-2964 CVE-2019-2975
    CVE-2019-2978 CVE-2019-2983 CVE-2019-2988
    CVE-2019-2989 CVE-2019-2992 CVE-2019-2996
    CVE-2019-2999 CVE-2019-2973 CVE-2019-2981
    CVE-2019-17631
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17631/">CVE-2019-17631 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17631">CVE-2019-17631 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2958">CVE-2019-2958 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2975">CVE-2019-2975 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2996/">CVE-2019-2996 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2996">CVE-2019-2996 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549012" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150067" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1174910" ref_url="https://bugzilla.suse.com/1174910" source="BUGZILLA"/>
		<reference ref_id="1174913" ref_url="https://bugzilla.suse.com/1174913" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007319.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14361: Fix XkbSelectEvents() integer underflow (bsc#1174910 ZDI-CAN-11573).
- CVE-2020-14362: Fix XRecordRegisterClients() Integer underflow (bsc#1174913 ZDI-CAN-11574).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-01"/>
	<updated date="2020-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14361">CVE-2020-14361 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14362">CVE-2020-14362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554966" comment="xorg-x11-server-7.6_1.18.3-76.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554967" comment="xorg-x11-server-extra-7.6_1.18.3-76.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150068" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1175070" ref_url="https://bugzilla.suse.com/1175070" source="BUGZILLA"/>
		<reference ref_id="1175071" ref_url="https://bugzilla.suse.com/1175071" source="BUGZILLA"/>
		<reference ref_id="1175072" ref_url="https://bugzilla.suse.com/1175072" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11985" ref_url="https://www.suse.com/security/cve/CVE-2020-11985/" source="CVE"/>
		<reference ref_id="CVE-2020-11993" ref_url="https://www.suse.com/security/cve/CVE-2020-11993/" source="CVE"/>
		<reference ref_id="CVE-2020-9490" ref_url="https://www.suse.com/security/cve/CVE-2020-9490/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007331.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-9490: Fixed a crash caused by a specially crafted value for the 'Cache-Digest' header in a HTTP/2 request (bsc#1175071).
- CVE-2020-11985: IP address spoofing when proxying using mod_remoteip and mod_rewrite (bsc#1175072).
- CVE-2020-11993: When trace/debug was enabled for the HTTP/2 module logging statements were made on the wrong connection (bsc#1175070).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175070">SUSE bug 1175070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175071">SUSE bug 1175071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175072">SUSE bug 1175072</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11985/">CVE-2020-11985 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11985">CVE-2020-11985 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11993/">CVE-2020-11993 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11993">CVE-2020-11993 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-9490/">CVE-2020-9490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9490">CVE-2020-9490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554968" comment="apache2-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531260" comment="apache2-doc-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554969" comment="apache2-example-pages-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554970" comment="apache2-prefork-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554971" comment="apache2-utils-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554972" comment="apache2-worker-2.4.23-29.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150069" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 15 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14581
  CVE-2020-14556 CVE-2020-14621 CVE-2020-14593 CVE-2020-14583
  CVE-2019-17639
  * Class Libraries:
    - JAVA.UTIL.ZIP.DEFLATER OPERATIONS THROW JAVA.LANG.INTERNALERROR
    - JAVA 8 DECODER OBJECTS CONSUME A LARGE AMOUNT OF JAVA HEAP
    - TRANSLATION MESSAGES UPDATE FOR JCL
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Java Virtual Machine:
    - IBM JAVA REGISTERS A HANDLER BY DEFAULT FOR SIGABRT
    - LARGE MEMORY FOOTPRINT HELD BY TRACECONTEXT OBJECT
  * JIT Compiler:
    - CRASH IN THE INTERPRETER AFTER OSR FROM INLINED SYNCHRONIZED METHOD
      IN DEBUGGING MODE
    - INTERMITTENT ASSERTION FAILURE REPORTED
    - CRASH IN RESOLVECLASSREF() DURING AOT LOAD
    - JIT CRASH DURING CLASS UNLOADING IN J9METHOD_HT::ONCLASSUNLOADING()
    - SEGMENTATION FAULT WHILE COMPILING A METHOD
    - UNEXPECTED CLASSCASTEXCEPTION THROWN IN HIGH LEVEL PARALLEL
      APPLICATION ON IBM Z PLATFORM
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
    - CHANGES TO IBMJCE AND IBMJCEPLUS PROVIDERS
    - IBMJCEPLUS FAILS, WHEN THE SECURITY MANAGER IS ENABLED, WITH
      DEFAULT PERMISSIONS, SPECIFIED IN JAVA.POLICY FILE
    - IN CERTAIN INSTANCES, IBMJCEPLUS PROVIDER THROWS EXCEPTION FROM
      KEYFACTORY CLASS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17639">CVE-2019-17639 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551671" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542898" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150070" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="1175665" ref_url="https://bugzilla.suse.com/1175665" source="BUGZILLA"/>
		<reference ref_id="1175671" ref_url="https://bugzilla.suse.com/1175671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811/" source="CVE"/>
		<reference ref_id="CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007341.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-24606: Fix livelocking in peerDigestHandleReply (bsc#1175671).
- CVE-2020-15811: Improve Transfer-Encoding handling (bsc#1175665).
- CVE-2020-15810: Enforce token characters for field-name (bsc#1175664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175665">SUSE bug 1175665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175671">SUSE bug 1175671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15810">CVE-2020-15810 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15811">CVE-2020-15811 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24606">CVE-2020-24606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554973" comment="squid-3.5.21-26.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150071" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1175239" ref_url="https://bugzilla.suse.com/1175239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2475-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007895.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- CVE-2020-14363: Fix an integer overflow in init_om() (bsc#1175239).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175239">SUSE bug 1175239</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14363">CVE-2020-14363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554974" comment="libX11-6-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551674" comment="libX11-6-32bit-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531272" comment="libX11-data-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554975" comment="libX11-xcb1-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551676" comment="libX11-xcb1-32bit-1.6.2-12.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150072" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 70 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14621
  CVE-2020-14593 CVE-2020-14583 CVE-2019-17639
  * Class Libraries:
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17639">CVE-2019-17639 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551677" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542900" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551678" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150073" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1173100" ref_url="https://bugzilla.suse.com/1173100" source="BUGZILLA"/>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173661" ref_url="https://bugzilla.suse.com/1173661" source="BUGZILLA"/>
		<reference ref_id="1173663" ref_url="https://bugzilla.suse.com/1173663" source="BUGZILLA"/>
		<reference ref_id="1173664" ref_url="https://bugzilla.suse.com/1173664" source="BUGZILLA"/>
		<reference ref_id="1173665" ref_url="https://bugzilla.suse.com/1173665" source="BUGZILLA"/>
		<reference ref_id="1173666" ref_url="https://bugzilla.suse.com/1173666" source="BUGZILLA"/>
		<reference ref_id="1173867" ref_url="https://bugzilla.suse.com/1173867" source="BUGZILLA"/>
		<reference ref_id="1173869" ref_url="https://bugzilla.suse.com/1173869" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1173963" ref_url="https://bugzilla.suse.com/1173963" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2019-18680" ref_url="https://www.suse.com/security/cve/CVE-2019-18680/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_103 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-0155: Fixed a privilege escalation in the i915 graphics driver (bsc#1173663).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).
- CVE-2019-18680: Fixed a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c (bsc#1173867).
- CVE-2019-14816: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173666).
- CVE-2019-14814: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173664).
- CVE-2019-14815: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173665).
- CVE-2019-14901: Fixed a heap overflow in the Marvell WiFi driver (bsc#1173661).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173100">SUSE bug 1173100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173661">SUSE bug 1173661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173663">SUSE bug 1173663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173664">SUSE bug 1173664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173665">SUSE bug 1173665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173666">SUSE bug 1173666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173867">SUSE bug 1173867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173869">SUSE bug 1173869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173963">SUSE bug 1173963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0155">CVE-2019-0155 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14814">CVE-2019-14814 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14815">CVE-2019-14815 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14816">CVE-2019-14816 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14895">CVE-2019-14895 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14901">CVE-2019-14901 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18680/">CVE-2019-18680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18680">CVE-2019-18680 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19447">CVE-2019-19447 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9458">CVE-2019-9458 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721277" comment="kernel-default 4.4.180-94.103 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719602" comment="kgraft-patch-4_4_180-94_103-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538584" comment="kgraft-patch-4_4_180-94_103-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150074" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1173100" ref_url="https://bugzilla.suse.com/1173100" source="BUGZILLA"/>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173661" ref_url="https://bugzilla.suse.com/1173661" source="BUGZILLA"/>
		<reference ref_id="1173663" ref_url="https://bugzilla.suse.com/1173663" source="BUGZILLA"/>
		<reference ref_id="1173867" ref_url="https://bugzilla.suse.com/1173867" source="BUGZILLA"/>
		<reference ref_id="1173869" ref_url="https://bugzilla.suse.com/1173869" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1173963" ref_url="https://bugzilla.suse.com/1173963" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2019-18680" ref_url="https://www.suse.com/security/cve/CVE-2019-18680/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_107 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-0155: Fixed a privilege escalation in the i915 graphics driver (bsc#1173663).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).
- CVE-2019-18680: Fixed a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c (bsc#1173867).
- CVE-2019-14901: Fixed a heap overflow in the Marvell WiFi driver (bsc#1173661).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173100">SUSE bug 1173100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173661">SUSE bug 1173661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173663">SUSE bug 1173663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173867">SUSE bug 1173867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173869">SUSE bug 1173869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173963">SUSE bug 1173963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0155">CVE-2019-0155 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14895">CVE-2019-14895 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14901">CVE-2019-14901 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18680/">CVE-2019-18680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18680">CVE-2019-18680 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19447">CVE-2019-19447 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9458">CVE-2019-9458 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721280" comment="kernel-default 4.4.180-94.107 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719608" comment="kgraft-patch-4_4_180-94_107-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538585" comment="kgraft-patch-4_4_180-94_107-default-7-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150075" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1173100" ref_url="https://bugzilla.suse.com/1173100" source="BUGZILLA"/>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173869" ref_url="https://bugzilla.suse.com/1173869" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1173963" ref_url="https://bugzilla.suse.com/1173963" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_113 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173100">SUSE bug 1173100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173869">SUSE bug 1173869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173963">SUSE bug 1173963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14895">CVE-2019-14895 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19447">CVE-2019-19447 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9458">CVE-2019-9458 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721279" comment="kernel-default 4.4.180-94.113 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719606" comment="kgraft-patch-4_4_180-94_113-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538586" comment="kgraft-patch-4_4_180-94_113-default-6-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150076" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007363.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_116 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721281" comment="kernel-default 4.4.180-94.116 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719610" comment="kgraft-patch-4_4_180-94_116-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538587" comment="kgraft-patch-4_4_180-94_116-default-3-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150077" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_121 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721282" comment="kernel-default 4.4.180-94.121 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719612" comment="kgraft-patch-4_4_180-94_121-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538588" comment="kgraft-patch-4_4_180-94_121-default-2-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150078" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_124 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721283" comment="kernel-default 4.4.180-94.124 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719614" comment="kgraft-patch-4_4_180-94_124-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538589" comment="kgraft-patch-4_4_180-94_124-default-2-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150079" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538590" comment="kgraft-patch-4_4_180-94_127-default-2-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150080" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1173991" ref_url="https://bugzilla.suse.com/1173991" source="BUGZILLA"/>
		<reference ref_id="1174284" ref_url="https://bugzilla.suse.com/1174284" source="BUGZILLA"/>
		<reference ref_id="1175686" ref_url="https://bugzilla.suse.com/1175686" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007373.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.2.0 ESR
  * Fixed: Various stability, functionality, and security fixes
- Mozilla Firefox ESR 78.2
  MFSA 2020-38 (bsc#1175686)
  * CVE-2020-15663 (bmo#1643199)
    Downgrade attack on the Mozilla Maintenance Service could
    have resulted in escalation of privilege
  * CVE-2020-15664 (bmo#1658214)
    Attacker-induced prompt for extension installation
  * CVE-2020-15670 (bmo#1651001, bmo#1651449, bmo#1653626,
    bmo#1656957)
    Memory safety bugs fixed in Firefox 80 and Firefox ESR 78.2

- Fixed Firefox tab crash in FIPS mode (bsc#1174284).

- Fix broken translation-loading. (bsc#1173991) 
  * allow addon sideloading
  * mark signatures for langpacks non-mandatory
  * do not autodisable user profile scopes
- Google API key is not usable for geolocation service any more
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173991">SUSE bug 1173991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174284">SUSE bug 1174284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15663">CVE-2020-15663 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15664">CVE-2020-15664 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15670">CVE-2020-15670 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554976" comment="MozillaFirefox-78.2.0-112.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542901" comment="MozillaFirefox-devel-78.2.0-112.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554977" comment="MozillaFirefox-translations-common-78.2.0-112.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150081" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1152107" ref_url="https://bugzilla.suse.com/1152107" source="BUGZILLA"/>
		<reference ref_id="1173798" ref_url="https://bugzilla.suse.com/1173798" source="BUGZILLA"/>
		<reference ref_id="1174205" ref_url="https://bugzilla.suse.com/1174205" source="BUGZILLA"/>
		<reference ref_id="1174757" ref_url="https://bugzilla.suse.com/1174757" source="BUGZILLA"/>
		<reference ref_id="1174771" ref_url="https://bugzilla.suse.com/1174771" source="BUGZILLA"/>
		<reference ref_id="1175112" ref_url="https://bugzilla.suse.com/1175112" source="BUGZILLA"/>
		<reference ref_id="1175127" ref_url="https://bugzilla.suse.com/1175127" source="BUGZILLA"/>
		<reference ref_id="1175228" ref_url="https://bugzilla.suse.com/1175228" source="BUGZILLA"/>
		<reference ref_id="1175691" ref_url="https://bugzilla.suse.com/1175691" source="BUGZILLA"/>
		<reference ref_id="1176069" ref_url="https://bugzilla.suse.com/1176069" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).
- CVE-2019-16746: Fixed an improper check of the length of variable elements in a beacon head, leading to a buffer overflow (bsc#1152107).
- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).

The following non-security bugs were fixed:

- bonding: fix active-backup failover for current ARP slave (bsc#1174771).
- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1175691).
- ocfs2: add trimfs dlm lock resource (bsc#1175228).
- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).
- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-09"/>
	<updated date="2020-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152107">SUSE bug 1152107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173798">SUSE bug 1173798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174757">SUSE bug 1174757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174771">SUSE bug 1174771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175112">SUSE bug 1175112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175127">SUSE bug 1175127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175228">SUSE bug 1175228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175691">SUSE bug 1175691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14314">CVE-2020-14314 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16166">CVE-2020-16166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554978" comment="kernel-default-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554979" comment="kernel-default-base-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554980" comment="kernel-default-devel-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538594" comment="kernel-default-kgraft-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554981" comment="kernel-default-man-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538595" comment="kernel-devel-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538596" comment="kernel-macros-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538597" comment="kernel-source-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554982" comment="kernel-syms-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538599" comment="kgraft-patch-4_4_180-94_130-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150082" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update java-1_8_0-openjdk to version jdk8u242 (icedtea 3.15.0) (January 2020 CPU, bsc#1160968):

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2020-2590: Improve Kerberos interop capabilities
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2601: Better Ticket Granting Services
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support
- CVE-2020-2654: Improve Object Identifier Processing
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-30"/>
	<updated date="2020-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2590">CVE-2020-2590 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2601">CVE-2020-2601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554983" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554984" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554985" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554986" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150083" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1164860" ref_url="https://bugzilla.suse.com/1164860" source="BUGZILLA"/>
		<reference ref_id="1174117" ref_url="https://bugzilla.suse.com/1174117" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13935" ref_url="https://www.suse.com/security/cve/CVE-2020-13935/" source="CVE"/>
		<reference ref_id="CVE-2020-1935" ref_url="https://www.suse.com/security/cve/CVE-2020-1935/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007410.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-1935: Fixed an HTTP request smuggling vulnerability (bsc#1164860).
- CVE-2020-13935: Fixed a WebSocket DoS (bsc#1174117).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-11"/>
	<updated date="2020-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1164860">SUSE bug 1164860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174117">SUSE bug 1174117</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13935/">CVE-2020-13935 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13935">CVE-2020-13935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1935/">CVE-2020-1935 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1935">CVE-2020-1935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531293" comment="tomcat-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531294" comment="tomcat-admin-webapps-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531295" comment="tomcat-docs-webapp-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531296" comment="tomcat-el-3_0-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531297" comment="tomcat-javadoc-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531298" comment="tomcat-jsp-2_3-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531299" comment="tomcat-lib-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531300" comment="tomcat-servlet-3_1-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531301" comment="tomcat-webapps-8.0.53-29.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150084" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1175626" ref_url="https://bugzilla.suse.com/1175626" source="BUGZILLA"/>
		<reference ref_id="1175656" ref_url="https://bugzilla.suse.com/1175656" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007424.html" source="SUSE-SU"/>
		<description>
This update for shim fixes the following issues:

- Update to the unified shim binary from SUSE Linux Enterprise 15-SP1 (bsc#1168994)

This update addresses the 'BootHole' security issue (master CVE CVE-2020-10713), by
disallowing binaries signed by the previous SUSE UEFI signing key from booting.

This update should only be installed after updates of grub2, the Linux kernel and (if used)
Xen from July / August 2020 are applied.

Additional fixes:

+ shim-install: install MokManager to \EFI\boot to process the pending MOK request (bsc#1175626, bsc#1175656)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-14"/>
	<updated date="2020-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175626">SUSE bug 1175626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175656">SUSE bug 1175656</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538600" comment="shim-15+git47-25.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150085" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1120629" ref_url="https://bugzilla.suse.com/1120629" source="BUGZILLA"/>
		<reference ref_id="1120630" ref_url="https://bugzilla.suse.com/1120630" source="BUGZILLA"/>
		<reference ref_id="1120631" ref_url="https://bugzilla.suse.com/1120631" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1131823" ref_url="https://bugzilla.suse.com/1131823" source="BUGZILLA"/>
		<reference ref_id="1137977" ref_url="https://bugzilla.suse.com/1137977" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007438.html" source="SUSE-SU"/>
		<description>
This update for libsolv fixes the following issues:

This is a reissue of an existing libsolv update that also included libsolv-devel for LTSS products.

libsolv was updated to version 0.6.36 fixes the following issues:

Security issues fixed:

- CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629).
- CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630).
- CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631).

Non-security issues fixed:

- Made cleandeps jobs on patterns work (bsc#1137977).
- Fixed an issue multiversion packages that obsolete their own name (bsc#1127155).
- Keep consistent package name if there are multiple alternatives (bsc#1131823).

		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131823">SUSE bug 1131823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137977">SUSE bug 1137977</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20532">CVE-2018-20532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20533">CVE-2018-20533 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20534">CVE-2018-20534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009542910" comment="libsolv-devel-0.6.36-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554987" comment="libsolv-tools-0.6.36-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542911" comment="perl-solv-0.6.36-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554988" comment="python-solv-0.6.36-2.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150086" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1176409" ref_url="https://bugzilla.suse.com/1176409" source="BUGZILLA"/>
		<reference ref_id="1176412" ref_url="https://bugzilla.suse.com/1176412" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392/" source="CVE"/>
		<reference ref_id="CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007439.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

Security issues fixed:

- CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated (bsc#1176412).
- CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name (bsc#1176409).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176409">SUSE bug 1176409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176412">SUSE bug 1176412</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14392">CVE-2020-14392 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14393">CVE-2020-14393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554989" comment="perl-DBI-1.628-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150087" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="1130840" ref_url="https://bugzilla.suse.com/1130840" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="1153238" ref_url="https://bugzilla.suse.com/1153238" source="BUGZILLA"/>
		<reference ref_id="1162423" ref_url="https://bugzilla.suse.com/1162423" source="BUGZILLA"/>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="1174701" ref_url="https://bugzilla.suse.com/1174701" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-20907: Fixed denial of service by avoiding possible infinite loop in specifically crafted tarball (bsc#1174091).
- CVE-2020-14422: Fixed an improper computation of hash values in the IPv4Interface and IPv6Interface 
  could have led to denial of service (bsc#1173274).
- CVE-2019-16935: Fixed a reflected XSS in python/Lib/DocXMLRPCServer.py (bsc#1153238).
- CVE-2019-9947: Fixed an issue in urllib2 which allowed CRLF injection if the attacker controls a url parameter (bsc#1130840).
- If the locale is 'C', coerce it to C.UTF-8 (bsc#1162423).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-21"/>
	<updated date="2020-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162423">SUSE bug 1162423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174701">SUSE bug 1174701</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16935">CVE-2019-16935 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14422">CVE-2020-14422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009529283" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009529284" comment="python3-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009529285" comment="python3-base-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009529286" comment="python3-curses-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542925" comment="python3-devel-3.4.10-25.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150088" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1174120" ref_url="https://bugzilla.suse.com/1174120" source="BUGZILLA"/>
		<reference ref_id="1174316" ref_url="https://bugzilla.suse.com/1174316" source="BUGZILLA"/>
		<reference ref_id="1176579" ref_url="https://bugzilla.suse.com/1176579" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007463.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

-  ZeroLogon: An elevation of privilege was possible with some configurations when an attacker established
a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC) 
(CVE-2020-1472, bsc#1176579).

- Fixed an issue where multiple home folders were created(bsc#1174316, bso#13369).

- Fixed an issue where the net command was unable to negotiate SMB2 (bsc#1174120);
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174120">SUSE bug 1174120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174316">SUSE bug 1174316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176579">SUSE bug 1176579</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1472">CVE-2020-1472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009554990" comment="libdcerpc-binding0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554991" comment="libdcerpc-binding0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554992" comment="libdcerpc0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554993" comment="libdcerpc0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554994" comment="libndr-krb5pac0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554995" comment="libndr-krb5pac0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554996" comment="libndr-nbt0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554997" comment="libndr-nbt0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554998" comment="libndr-standard0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554999" comment="libndr-standard0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555000" comment="libndr0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555001" comment="libndr0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555002" comment="libnetapi0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555003" comment="libnetapi0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555004" comment="libsamba-credentials0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555005" comment="libsamba-credentials0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555006" comment="libsamba-errors0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555007" comment="libsamba-errors0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555008" comment="libsamba-hostconfig0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555009" comment="libsamba-hostconfig0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555010" comment="libsamba-passdb0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555011" comment="libsamba-passdb0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555012" comment="libsamba-util0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555013" comment="libsamba-util0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555014" comment="libsamdb0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555015" comment="libsamdb0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555016" comment="libsmbclient0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555017" comment="libsmbclient0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555018" comment="libsmbconf0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555019" comment="libsmbconf0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555020" comment="libsmbldap0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555021" comment="libsmbldap0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555022" comment="libtevent-util0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555023" comment="libtevent-util0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555024" comment="libwbclient0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555025" comment="libwbclient0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555026" comment="samba-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555027" comment="samba-client-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555028" comment="samba-client-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538644" comment="samba-doc-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555029" comment="samba-libs-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555030" comment="samba-libs-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555031" comment="samba-winbind-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555032" comment="samba-winbind-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150089" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1172515" ref_url="https://bugzilla.suse.com/1172515" source="BUGZILLA"/>
		<reference ref_id="1176315" ref_url="https://bugzilla.suse.com/1176315" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007486.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2020-17507: Fixed a buffer overflow in XBM parser (bsc#1176315)
- Made handling of XDG_RUNTIME_DIR more secure (bsc#1172515)	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-25"/>
	<updated date="2020-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172515">SUSE bug 1172515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176315">SUSE bug 1176315</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17507">CVE-2020-17507 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555033" comment="libQt5Concurrent5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555034" comment="libQt5Core5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555035" comment="libQt5DBus5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555036" comment="libQt5Gui5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555037" comment="libQt5Network5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555038" comment="libQt5OpenGL5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555039" comment="libQt5PrintSupport5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555040" comment="libQt5Sql5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555041" comment="libQt5Sql5-mysql-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555042" comment="libQt5Sql5-postgresql-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555043" comment="libQt5Sql5-sqlite-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555044" comment="libQt5Sql5-unixODBC-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555045" comment="libQt5Test5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555046" comment="libQt5Widgets5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555047" comment="libQt5Xml5-5.6.2-6.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150090" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1167976" ref_url="https://bugzilla.suse.com/1167976" source="BUGZILLA"/>
		<reference ref_id="1173986" ref_url="https://bugzilla.suse.com/1173986" source="BUGZILLA"/>
		<reference ref_id="1174420" ref_url="https://bugzilla.suse.com/1174420" source="BUGZILLA"/>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

-Firefox was updated to 78.3.0 ESR (bsc#1176756, MFSA 2020-43)
   - CVE-2020-15677: Download origin spoofing via redirect
   - CVE-2020-15676: Fixed an XSS when pasting attacker-controlled data into a
     contenteditable element 
   - CVE-2020-15678: When recursing through layers while scrolling, an iterator
     may have become invalid, resulting in a potential use-after-free scenario
   - CVE-2020-15673: Fixed memory safety bugs 
- Enhance fix for wayland-detection (bsc#1174420)
- Attempt to fix langpack-parallelization by introducing separate
  obj-dirs for each lang (bsc#1173986, bsc#1167976)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-26"/>
	<updated date="2020-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167976">SUSE bug 1167976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173986">SUSE bug 1173986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174420">SUSE bug 1174420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15673">CVE-2020-15673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15676">CVE-2020-15676 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15677">CVE-2020-15677 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15678">CVE-2020-15678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555048" comment="MozillaFirefox-78.3.0-112.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542973" comment="MozillaFirefox-devel-78.3.0-112.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555049" comment="MozillaFirefox-translations-common-78.3.0-112.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150091" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1176343" ref_url="https://bugzilla.suse.com/1176343" source="BUGZILLA"/>
		<reference ref_id="1176344" ref_url="https://bugzilla.suse.com/1176344" source="BUGZILLA"/>
		<reference ref_id="1176345" ref_url="https://bugzilla.suse.com/1176345" source="BUGZILLA"/>
		<reference ref_id="1176346" ref_url="https://bugzilla.suse.com/1176346" source="BUGZILLA"/>
		<reference ref_id="1176347" ref_url="https://bugzilla.suse.com/1176347" source="BUGZILLA"/>
		<reference ref_id="1176348" ref_url="https://bugzilla.suse.com/1176348" source="BUGZILLA"/>
		<reference ref_id="1176349" ref_url="https://bugzilla.suse.com/1176349" source="BUGZILLA"/>
		<reference ref_id="1176350" ref_url="https://bugzilla.suse.com/1176350" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595/" source="CVE"/>
		<reference ref_id="CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596/" source="CVE"/>
		<reference ref_id="CVE-2020-25597" ref_url="https://www.suse.com/security/cve/CVE-2020-25597/" source="CVE"/>
		<reference ref_id="CVE-2020-25599" ref_url="https://www.suse.com/security/cve/CVE-2020-25599/" source="CVE"/>
		<reference ref_id="CVE-2020-25600" ref_url="https://www.suse.com/security/cve/CVE-2020-25600/" source="CVE"/>
		<reference ref_id="CVE-2020-25601" ref_url="https://www.suse.com/security/cve/CVE-2020-25601/" source="CVE"/>
		<reference ref_id="CVE-2020-25603" ref_url="https://www.suse.com/security/cve/CVE-2020-25603/" source="CVE"/>
		<reference ref_id="CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-25604: Fixed a race condition when migrating timers between x86 
  HVM vCPU-s (bsc#1176343,XSA-336)
- CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers (bsc#1176344,XSA-337)
- CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid (bsc#1176346,XSA-338)
- CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER (bsc#1176345,XSA-339)
- CVE-2020-25603: Fixed an issue due to  missing barriers when accessing/allocating an event channel (bsc#1176347,XSA-340)
- CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains (bsc#1176348,XSA-342)
- CVE-2020-25599: Fixed race conditions with evtchn_reset() (bsc#1176349,XSA-343)
- CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset() / evtchn_destroy() (bsc#1176350,XSA-344)	  
- CVE-2020-14364: Fixed an out-of-bounds read/write access while processing usb packets (bsc#1175534).
- Various bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-29"/>
	<updated date="2020-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176343">SUSE bug 1176343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176344">SUSE bug 1176344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176345">SUSE bug 1176345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176346">SUSE bug 1176346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176347">SUSE bug 1176347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176348">SUSE bug 1176348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176349">SUSE bug 1176349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176350">SUSE bug 1176350</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25595">CVE-2020-25595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25596">CVE-2020-25596 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25597/">CVE-2020-25597 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25597">CVE-2020-25597 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25599/">CVE-2020-25599 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25599">CVE-2020-25599 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25600/">CVE-2020-25600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25600">CVE-2020-25600 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25601/">CVE-2020-25601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25601">CVE-2020-25601 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25603/">CVE-2020-25603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25603">CVE-2020-25603 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25604">CVE-2020-25604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538664" comment="xen-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538665" comment="xen-doc-html-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538666" comment="xen-libs-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538667" comment="xen-libs-32bit-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538668" comment="xen-tools-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538669" comment="xen-tools-domU-4.9.4_12-3.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150092" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1176496" ref_url="https://bugzilla.suse.com/1176496" source="BUGZILLA"/>
		<reference ref_id="1176764" ref_url="https://bugzilla.suse.com/1176764" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7490" ref_url="https://www.suse.com/security/cve/CVE-2013-7490/" source="CVE"/>
		<reference ref_id="CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007519.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

- CVE-2019-20919: Fixed a NULL profile dereference in dbi_profile (bsc#1176764).
- CVE-2013-7490: Fixed memory corruption when using many arguments 
  to methods for CallbacksUsing (bsc#1176496).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176496">SUSE bug 1176496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176764">SUSE bug 1176764</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7490/">CVE-2013-7490 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7490">CVE-2013-7490 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20919">CVE-2019-20919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555050" comment="perl-DBI-1.628-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150093" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- java-1_7_0-openjdk was updated to 2.6.23 (July 2020 CPU, bsc#1174157)
    - JDK-8028431, CVE-2020-14579: NullPointerException in
    - DerValue.equals(DerValue)
    - JDK-8028591, CVE-2020-14578: NegativeArraySizeException in
    - sun.security.util.DerInputStream.getUnalignedBitString()
    - JDK-8230613: Better ASCII conversions
    - JDK-8231800: Better listing of arrays
    - JDK-8232014: Expand DTD support
    - JDK-8233255: Better Swing Buttons
    - JDK-8234032: Improve basic calendar services
    - JDK-8234042: Better factory production of certificates
    - JDK-8234418: Better parsing with CertificateFactory
    - JDK-8234836: Improve serialization handling
    - JDK-8236191: Enhance OID processing
    - JDK-8237592, CVE-2020-14577: Enhance certificate verification
    - JDK-8238002, CVE-2020-14581: Better matrix operations
    - JDK-8238804: Enhance key handling process
    - JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    - JDK-8238843: Enhanced font handing
    - JDK-8238920, CVE-2020-14583: Better Buffer support
    - JDK-8238925: Enhance WAV file playback
    - JDK-8240119, CVE-2020-14593: Less Affine Transformations
    - JDK-8240482: Improved WAV file playback
    - JDK-8241379: Update JCEKS support
    - JDK-8241522: Manifest improved jar headers redux
    - JDK-8242136, CVE-2020-14621: Better XML namespace handling
    - JDK-8040113: File not initialized in src/share/native/sun/awt/giflib/dgif_lib.c
    - JDK-8054446: Repeated offer and remove on ConcurrentLinkedQueue lead to an OutOfMemoryError
    - JDK-8077982: GIFLIB upgrade
    - JDK-8081315: 8077982 giflib upgrade breaks system giflib builds with earlier versions
    - JDK-8147087: Race when reusing PerRegionTable bitmaps may result in dropped remembered set entries
    - JDK-8151582: (ch) test java/nio/channels/AsyncCloseAndInterrupt.java failing due to 'Connection succeeded'
    - JDK-8155691: Update GIFlib library to the latest up-to-date
    - JDK-8181841: A TSA server returns timestamp with precision higher than milliseconds
    - JDK-8203190: SessionId.hashCode generates too many collisions
    - JDK-8217676: Upgrade libpng to 1.6.37
    - JDK-8220495: Update GIFlib library to the 5.1.8
    - JDK-8226892: ActionListeners on JRadioButtons don't get notified when selection is changed with arrow keys
    - JDK-8229899: Make java.io.File.isInvalid() less racy
    - JDK-8230597: Update GIFlib library to the 5.2.1
    - JDK-8230769: BufImg_SetupICM add ReleasePrimitiveArrayCritical call in early return
    - JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a
    - JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion() returns wrong result
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555051" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555052" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555053" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555054" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150094" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1176733" ref_url="https://bugzilla.suse.com/1176733" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26117" ref_url="https://www.suse.com/security/cve/CVE-2020-26117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007542.html" source="SUSE-SU"/>
		<description>
This update for tigervnc fixes the following issues:

- CVE-2020-26117: Server certificates were stored as certiticate
  authorities, allowing malicious owners of these certificates
  to impersonate any server after a client had added an exception
  (bsc#1176733).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1176733">SUSE bug 1176733</bugzilla>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26117/">CVE-2020-26117 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26117">CVE-2020-26117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555055" comment="libXvnc1-1.6.0-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555056" comment="tigervnc-1.6.0-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555057" comment="xorg-x11-Xvnc-1.6.0-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150095" version="1" class="patch">
	<metadata>
		<title>Security update for libproxy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1176410" ref_url="https://bugzilla.suse.com/1176410" source="BUGZILLA"/>
		<reference ref_id="1177143" ref_url="https://bugzilla.suse.com/1177143" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25219" ref_url="https://www.suse.com/security/cve/CVE-2020-25219/" source="CVE"/>
		<reference ref_id="CVE-2020-26154" ref_url="https://www.suse.com/security/cve/CVE-2020-26154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007543.html" source="SUSE-SU"/>
		<description>
This update for libproxy fixes the following issues:

- CVE-2020-25219: Rewrote url::recvline to be nonrecursive (bsc#1176410).
- CVE-2020-26154: Fixed a buffer overflow when PAC is enabled (bsc#1177143).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176410">SUSE bug 1176410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177143">SUSE bug 1177143</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25219/">CVE-2020-25219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25219">CVE-2020-25219 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26154/">CVE-2020-26154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26154">CVE-2020-26154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555058" comment="libproxy1-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551763" comment="libproxy1-32bit-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555059" comment="libproxy1-config-gnome3-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551765" comment="libproxy1-config-gnome3-32bit-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555060" comment="libproxy1-networkmanager-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555061" comment="libproxy1-pacrunner-webkit-0.4.13-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150096" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1177914" ref_url="https://bugzilla.suse.com/1177914" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007609.html" source="SUSE-SU"/>
		<description>
This update for freetype2 fixes the following issues:

- CVE-2020-15999: fixed a heap buffer overflow found in the handling of embedded PNG bitmaps (bsc#1177914).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-22"/>
	<updated date="2020-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177914">SUSE bug 1177914</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555062" comment="ft2demos-2.6.3-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555063" comment="libfreetype6-2.6.3-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551770" comment="libfreetype6-32bit-2.6.3-7.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150097" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1149332" ref_url="https://bugzilla.suse.com/1149332" source="BUGZILLA"/>
		<reference ref_id="1165784" ref_url="https://bugzilla.suse.com/1165784" source="BUGZILLA"/>
		<reference ref_id="1171878" ref_url="https://bugzilla.suse.com/1171878" source="BUGZILLA"/>
		<reference ref_id="1172085" ref_url="https://bugzilla.suse.com/1172085" source="BUGZILLA"/>
		<reference ref_id="1176013" ref_url="https://bugzilla.suse.com/1176013" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10029" ref_url="https://www.suse.com/security/cve/CVE-2020-10029/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007618.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:
	  
- CVE-2020-10029: Fixed a stack corruption from range reduction of pseudo-zero (bsc#1165784)
- Use posix_spawn on popen (bsc#1149332, bsc#1176013)
- Correct locking and cancellation cleanup in syslog functions (bsc#1172085)
- Fixed concurrent changes on nscd aware files (bsc#1171878)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-23"/>
	<updated date="2020-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149332">SUSE bug 1149332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165784">SUSE bug 1165784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171878">SUSE bug 1171878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172085">SUSE bug 1172085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176013">SUSE bug 1176013</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10029/">CVE-2020-10029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">CVE-2020-10029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555064" comment="glibc-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551772" comment="glibc-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555065" comment="glibc-devel-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551774" comment="glibc-devel-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531397" comment="glibc-html-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531398" comment="glibc-i18ndata-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531399" comment="glibc-info-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555066" comment="glibc-locale-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551776" comment="glibc-locale-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555067" comment="glibc-profile-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551778" comment="glibc-profile-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555068" comment="nscd-2.22-113.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150098" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="1177872" ref_url="https://bugzilla.suse.com/1177872" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007631.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.0 ESR
  * Fixed: Various stability, functionality, and security fixes MFSA 2020-46 (bsc#1177872, bsc#1176756)
  * CVE-2020-15969 Use-after-free in usersctp
  * CVE-2020-15683 Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4
  * Fixed: Fixed legacy preferences not being properly applied when set via GPO
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-27"/>
	<updated date="2020-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15683">CVE-2020-15683 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15969">CVE-2020-15969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555069" comment="MozillaFirefox-78.4.0-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543000" comment="MozillaFirefox-devel-78.4.0-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555070" comment="MozillaFirefox-translations-common-78.4.0-112.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150099" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1177158" ref_url="https://bugzilla.suse.com/1177158" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007658.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

- CVE-2020-14355: Fixed multiple buffer overflow vulnerabilities in QUIC image decoding (bsc#1177158).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14355">CVE-2020-14355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555071" comment="libspice-server1-0.12.8-15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150100" version="1" class="patch">
	<metadata>
		<title>Security update for spice-gtk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1177158" ref_url="https://bugzilla.suse.com/1177158" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007662.html" source="SUSE-SU"/>
		<description>
This update for spice-gtk fixes the following issues:

- CVE-2020-14355: Fixed multiple buffer overflow vulnerabilities in QUIC image decoding (bsc#1177158).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14355">CVE-2020-14355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555072" comment="libspice-client-glib-2_0-8-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555073" comment="libspice-client-glib-helper-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555074" comment="libspice-client-gtk-3_0-5-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555075" comment="libspice-controller0-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555076" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543013" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150101" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1173902" ref_url="https://bugzilla.suse.com/1173902" source="BUGZILLA"/>
		<reference ref_id="1173994" ref_url="https://bugzilla.suse.com/1173994" source="BUGZILLA"/>
		<reference ref_id="1177613" ref_url="https://bugzilla.suse.com/1177613" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<reference ref_id="CVE-2020-14383" ref_url="https://www.suse.com/security/cve/CVE-2020-14383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007673.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-14383: An authenticated user can crash the DCE/RPC DNS with easily crafted records (bsc#1177613).
- CVE-2020-14323: Unprivileged user can crash winbind (bsc#1173994).
- CVE-2020-14318: Missing permissions check in SMB1/2/3 ChangeNotify (bsc#1173902).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173902">SUSE bug 1173902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173994">SUSE bug 1173994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177613">SUSE bug 1177613</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14318">CVE-2020-14318 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14323">CVE-2020-14323 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14383/">CVE-2020-14383 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14383">CVE-2020-14383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555077" comment="libdcerpc-binding0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555078" comment="libdcerpc-binding0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555079" comment="libdcerpc0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555080" comment="libdcerpc0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555081" comment="libndr-krb5pac0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555082" comment="libndr-krb5pac0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555083" comment="libndr-nbt0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555084" comment="libndr-nbt0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555085" comment="libndr-standard0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555086" comment="libndr-standard0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555087" comment="libndr0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555088" comment="libndr0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555089" comment="libnetapi0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555090" comment="libnetapi0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555091" comment="libsamba-credentials0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555092" comment="libsamba-credentials0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555093" comment="libsamba-errors0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555094" comment="libsamba-errors0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555095" comment="libsamba-hostconfig0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555096" comment="libsamba-hostconfig0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555097" comment="libsamba-passdb0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555098" comment="libsamba-passdb0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555099" comment="libsamba-util0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555100" comment="libsamba-util0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555101" comment="libsamdb0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555102" comment="libsamdb0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555103" comment="libsmbclient0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555104" comment="libsmbclient0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555105" comment="libsmbconf0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555106" comment="libsmbconf0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555107" comment="libsmbldap0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555108" comment="libsmbldap0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555109" comment="libtevent-util0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555110" comment="libtevent-util0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555111" comment="libwbclient0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555112" comment="libwbclient0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555113" comment="samba-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555114" comment="samba-client-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555115" comment="samba-client-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538716" comment="samba-doc-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555116" comment="samba-libs-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555117" comment="samba-libs-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555118" comment="samba-winbind-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555119" comment="samba-winbind-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150102" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1174955" ref_url="https://bugzilla.suse.com/1174955" source="BUGZILLA"/>
		<reference ref_id="1177155" ref_url="https://bugzilla.suse.com/1177155" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15708" ref_url="https://www.suse.com/security/cve/CVE-2020-15708/" source="CVE"/>
		<reference ref_id="CVE-2020-25637" ref_url="https://www.suse.com/security/cve/CVE-2020-25637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007670.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

CVE-2020-15708: Added a note to libvirtd.conf about polkit auth in SUSE distros (bsc#1174955).
CVE-2020-25637: Fixed a double free in qemuAgentGetInterfaces() (bsc#1177155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174955">SUSE bug 1174955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177155">SUSE bug 1177155</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15708/">CVE-2020-15708 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15708">CVE-2020-15708 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25637/">CVE-2020-25637 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25637">CVE-2020-25637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555120" comment="libvirt-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555121" comment="libvirt-admin-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555122" comment="libvirt-client-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555123" comment="libvirt-daemon-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555124" comment="libvirt-daemon-config-network-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555125" comment="libvirt-daemon-config-nwfilter-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555126" comment="libvirt-daemon-driver-interface-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538728" comment="libvirt-daemon-driver-libxl-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555127" comment="libvirt-daemon-driver-lxc-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555128" comment="libvirt-daemon-driver-network-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555129" comment="libvirt-daemon-driver-nodedev-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555130" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555131" comment="libvirt-daemon-driver-qemu-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555132" comment="libvirt-daemon-driver-secret-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555133" comment="libvirt-daemon-driver-storage-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555134" comment="libvirt-daemon-driver-storage-core-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555135" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555136" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555137" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555138" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555139" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555140" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555141" comment="libvirt-daemon-hooks-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555142" comment="libvirt-daemon-lxc-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555143" comment="libvirt-daemon-qemu-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538746" comment="libvirt-daemon-xen-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555144" comment="libvirt-doc-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555145" comment="libvirt-libs-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555146" comment="libvirt-lock-sanlock-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555147" comment="libvirt-nss-3.3.0-5.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150103" version="1" class="patch">
	<metadata>
		<title>Security update for sane-backends (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1172524" ref_url="https://bugzilla.suse.com/1172524" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<reference ref_id="CVE-2020-12861" ref_url="https://www.suse.com/security/cve/CVE-2020-12861/" source="CVE"/>
		<reference ref_id="CVE-2020-12862" ref_url="https://www.suse.com/security/cve/CVE-2020-12862/" source="CVE"/>
		<reference ref_id="CVE-2020-12863" ref_url="https://www.suse.com/security/cve/CVE-2020-12863/" source="CVE"/>
		<reference ref_id="CVE-2020-12864" ref_url="https://www.suse.com/security/cve/CVE-2020-12864/" source="CVE"/>
		<reference ref_id="CVE-2020-12865" ref_url="https://www.suse.com/security/cve/CVE-2020-12865/" source="CVE"/>
		<reference ref_id="CVE-2020-12866" ref_url="https://www.suse.com/security/cve/CVE-2020-12866/" source="CVE"/>
		<reference ref_id="CVE-2020-12867" ref_url="https://www.suse.com/security/cve/CVE-2020-12867/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<description>
This update for sane-backends fixes the following issues:

- sane-backends version upgrade to 1.0.31:
  * sane-backends version upgrade to 1.0.30
    fixes memory corruption bugs CVE-2020-12861, CVE-2020-12862,
    CVE-2020-12863, CVE-2020-12864, CVE-2020-12865,
    CVE-2020-12866, CVE-2020-12867 (bsc#1172524)
  * sane-backends version upgrade to 1.0.31
    to further improve hardware enablement for scanner devices
    (jsc#SLE-15561 and jsc#SLE-15560 with jsc#ECO-2418)
  * The new escl backend cannot be provided for SLE12 because
    it requires more additional software (avahi-client, libcurl,
    and libpoppler-glib-devel) where in particular for libcurl
    the one that is in SLE12 (via libcurl-devel-7.37.0) is likely
    too old because with that building the escl backend fails with
    'escl/escl.c:1267:34: error: 'CURLOPT_UNIX_SOCKET_PATH'
    undeclared curl_easy_setopt(handle, CURLOPT_UNIX_SOCKET_PATH'
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6318">CVE-2017-6318 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12861/">CVE-2020-12861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12861">CVE-2020-12861 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12862/">CVE-2020-12862 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12862">CVE-2020-12862 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12863/">CVE-2020-12863 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12863">CVE-2020-12863 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12864/">CVE-2020-12864 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12864">CVE-2020-12864 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12865/">CVE-2020-12865 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12865">CVE-2020-12865 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12866/">CVE-2020-12866 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12866">CVE-2020-12866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12867/">CVE-2020-12867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12867">CVE-2020-12867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555148" comment="sane-backends-1.0.31-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150104" version="1" class="patch">
	<metadata>
		<title>Security update for apache-commons-httpclient (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178171" ref_url="https://bugzilla.suse.com/1178171" source="BUGZILLA"/>
		<reference ref_id="945190" ref_url="https://bugzilla.suse.com/945190" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3577" ref_url="https://www.suse.com/security/cve/CVE-2014-3577/" source="CVE"/>
		<reference ref_id="CVE-2015-5262" ref_url="https://www.suse.com/security/cve/CVE-2015-5262/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007689.html" source="SUSE-SU"/>
		<description>
This update for apache-commons-httpclient fixes the following issues:

- http/conn/ssl/SSLConnectionSocketFactory.java ignores the
  http.socket.timeout configuration setting during an SSL handshake,
  which allows remote attackers to cause a denial of service (HTTPS
  call hang) via unspecified vectors. [bsc#945190, CVE-2015-5262]
- org.apache.http.conn.ssl.AbstractVerifier does not properly
  verify that the server hostname matches a domain name in the
  subject's Common Name (CN) or subjectAltName field of the X.509
  certificate, which allows MITM attackers to spoof SSL servers
  via a 'CN=' string in a field in the distinguished name (DN)
  of a certificate. [bsc#1178171, CVE-2014-3577]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-04"/>
	<updated date="2020-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178171">SUSE bug 1178171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945190">SUSE bug 945190</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3577/">CVE-2014-3577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3577">CVE-2014-3577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5262/">CVE-2015-5262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5262">CVE-2015-5262 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531477" comment="apache-commons-httpclient-3.1-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150105" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1118597" ref_url="https://bugzilla.suse.com/1118597" source="BUGZILLA"/>
		<reference ref_id="1130246" ref_url="https://bugzilla.suse.com/1130246" source="BUGZILLA"/>
		<reference ref_id="1161167" ref_url="https://bugzilla.suse.com/1161167" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19870" ref_url="https://www.suse.com/security/cve/CVE-2018-19870/" source="CVE"/>
		<reference ref_id="CVE-2018-19872" ref_url="https://www.suse.com/security/cve/CVE-2018-19872/" source="CVE"/>
		<reference ref_id="CVE-2020-0569" ref_url="https://www.suse.com/security/cve/CVE-2020-0569/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006448.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

Security issues fixed:	  

- CVE-2020-0569: Fixed a potential local code execution by loading plugins from CWD (bsc#1161167).
- CVE-2018-19870: Fixed an improper check in QImage allocation which could allow Denial of Service
  when opening crafted gif files (bsc#1118597).
- CVE-2018-19872: Fixed an issue which could allow a division by zero leading to crash (bsc#1130246).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-04"/>
	<updated date="2020-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118597">SUSE bug 1118597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130246">SUSE bug 1130246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161167">SUSE bug 1161167</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19870/">CVE-2018-19870 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19870">CVE-2018-19870 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19872/">CVE-2018-19872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19872">CVE-2018-19872 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0569/">CVE-2020-0569 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0569">CVE-2020-0569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555149" comment="libQt5Concurrent5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555150" comment="libQt5Core5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555151" comment="libQt5DBus5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555152" comment="libQt5Gui5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555153" comment="libQt5Network5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555154" comment="libQt5OpenGL5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555155" comment="libQt5PrintSupport5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555156" comment="libQt5Sql5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555157" comment="libQt5Sql5-mysql-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555158" comment="libQt5Sql5-postgresql-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555159" comment="libQt5Sql5-sqlite-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555160" comment="libQt5Sql5-unixODBC-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555161" comment="libQt5Test5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555162" comment="libQt5Widgets5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555163" comment="libQt5Xml5-5.6.2-6.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150106" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Fix regression '8250861: Crash in MinINode::Ideal(PhaseGVN*, bool)',
  introduced in October 2020 CPU.

- Update to version jdk8u272 (icedtea 3.17.0) (July 2020 CPU,
  bsc#1174157, and October 2020 CPU, bsc#1177943)
  * New features
    + JDK-8245468: Add TLSv1.3 implementation classes from 11.0.7
    + PR3796: Allow the number of curves supported to be specified
  * Security fixes
    + JDK-8028431, CVE-2020-14579: NullPointerException in
      DerValue.equals(DerValue)
    + JDK-8028591, CVE-2020-14578: NegativeArraySizeException in
      sun.security.util.DerInputStream.getUnalignedBitString()
    + JDK-8230613: Better ASCII conversions
    + JDK-8231800: Better listing of arrays
    + JDK-8232014: Expand DTD support
    + JDK-8233255: Better Swing Buttons
    + JDK-8233624: Enhance JNI linkage
    + JDK-8234032: Improve basic calendar services
    + JDK-8234042: Better factory production of certificates
    + JDK-8234418: Better parsing with CertificateFactory
    + JDK-8234836: Improve serialization handling
    + JDK-8236191: Enhance OID processing
    + JDK-8236196: Improve string pooling
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237117, CVE-2020-14556: Better ForkJoinPool behavior
    + JDK-8237592, CVE-2020-14577: Enhance certificate verification
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8238002, CVE-2020-14581: Better matrix operations
    + JDK-8238804: Enhance key handling process
    + JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    + JDK-8238843: Enhanced font handing
    + JDK-8238920, CVE-2020-14583: Better Buffer support
    + JDK-8238925: Enhance WAV file playback
    + JDK-8240119, CVE-2020-14593: Less Affine Transformations
    + JDK-8240124: Better VM Interning
    + JDK-8240482: Improved WAV file playback
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8241379: Update JCEKS support
    + JDK-8241522: Manifest improved jar headers redux
    + JDK-8242136, CVE-2020-14621: Better XML namespace handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Import of OpenJDK 8 u262 build 01
    + JDK-4949105: Access Bridge lacks html tags parsing
    + JDK-8003209: JFR events for network utilization
    + JDK-8030680: 292 cleanup from default method code assessment
    + JDK-8035633: TEST_BUG: java/net/NetworkInterface/Equals.java
      and some tests failed on windows intermittently
    + JDK-8041626: Shutdown tracing event
    + JDK-8141056: Erroneous assignment in HeapRegionSet.cpp
    + JDK-8149338: JVM Crash caused by Marlin renderer not handling
       NaN coordinates
    + JDK-8151582: (ch) test java/nio/channels/
      /AsyncCloseAndInterrupt.java failing due to 'Connection
      succeeded'
    + JDK-8165675: Trace event for thread park has incorrect unit
       for timeout
    + JDK-8176182: 4 security tests are not run
    + JDK-8178910: Problemlist sample tests
    + JDK-8183925: Decouple crash protection from watcher thread
    + JDK-8191393: Random crashes during cfree+0x1c
    + JDK-8195817: JFR.stop should require name of recording
    + JDK-8195818: JFR.start should increase autogenerated name by
       one
    + JDK-8195819: Remove recording=x from jcmd JFR.check output
    + JDK-8199712: Flight Recorder
    + JDK-8202578: Revisit location for class unload events
    + JDK-8202835: jfr/event/os/TestSystemProcess.java fails on
      missing events
    + JDK-8203287: Zero fails to build after JDK-8199712 (Flight
      Recorder)
    + JDK-8203346: JFR: Inconsistent signature of
      jfr_add_string_constant
    + JDK-8203664: JFR start failure after AppCDS archive created
      with JFR StartFlightRecording
    + JDK-8203921: JFR thread sampling is missing fixes from
      JDK-8194552
    + JDK-8203929: Limit amount of data for JFR.dump
    + JDK-8205516: JFR tool
    + JDK-8207392: [PPC64] Implement JFR profiling
    + JDK-8207829: FlightRecorderMXBeanImpl is leaking the first
      classloader which calls it
    + JDK-8209960: -Xlog:jfr* doesn't work with the JFR
    + JDK-8210024: JFR calls virtual is_Java_thread from ~Thread()
    + JDK-8210776: Upgrade X Window System 6.8.2 to the latest XWD
      1.0.7
    + JDK-8211239: Build fails without JFR: empty JFR events
      signatures mismatch
    + JDK-8212232: Wrong metadata for the configuration of the
      cutoff for old object sample events
    + JDK-8213015: Inconsistent settings between JFR.configure and
      -XX:FlightRecorderOptions
    + JDK-8213421: Line number information for execution samples
      always 0
    + JDK-8213617: JFR should record the PID of the recorded process
    + JDK-8213734: SAXParser.parse(File, ..) does not close
      resources when Exception occurs.
    + JDK-8213914: [TESTBUG] Several JFR VM events are not covered
      by tests
    + JDK-8213917: [TESTBUG] Shutdown JFR event is not covered by
      test
    + JDK-8213966: The ZGC JFR events should be marked as
      experimental
    + JDK-8214542: JFR: Old Object Sample event slow on a deep heap
      in debug builds
    + JDK-8214750: Unnecessary &lt;p&gt; tags in jfr classes
    + JDK-8214896: JFR Tool left files behind
    + JDK-8214906: [TESTBUG] jfr/event/sampling/TestNative.java
      fails with UnsatisfiedLinkError
    + JDK-8214925: JFR tool fails to execute
    + JDK-8215175: Inconsistencies in JFR event metadata
    + JDK-8215237: jdk.jfr.Recording javadoc does not compile
    + JDK-8215284: Reduce noise induced by periodic task
      getFileSize()
    + JDK-8215355: Object monitor deadlock with no threads holding
      the monitor (using jemalloc 5.1)
    + JDK-8215362: JFR GTest JfrTestNetworkUtilization fails
    + JDK-8215771: The jfr tool should pretty print reference chains
    + JDK-8216064: -XX:StartFlightRecording:settings= doesn't work
      properly
    + JDK-8216486: Possibility of integer overflow in
      JfrThreadSampler::run()
    + JDK-8216528: test/jdk/java/rmi/transport/
       /runtimeThreadInheritanceLeak/
       /RuntimeThreadInheritanceLeak.java failing with Xcomp
    + JDK-8216559: [JFR] Native libraries not correctly parsed from
      /proc/self/maps
    + JDK-8216578: Remove unused/obsolete method in JFR code
    + JDK-8216995: Clean up JFR command line processing
    + JDK-8217744: [TESTBUG] JFR TestShutdownEvent fails on some
      systems due to process surviving SIGINT
    + JDK-8217748: [TESTBUG] Exclude TestSig test case from JFR
      TestShutdownEvent
    + JDK-8218935: Make jfr strncpy uses GCC 8.x friendly
    + JDK-8223147: JFR Backport
    + JDK-8223689: Add JFR Thread Sampling Support
    + JDK-8223690: Add JFR BiasedLock Event Support
    + JDK-8223691: Add JFR G1 Region Type Change Event Support
    + JDK-8223692: Add JFR G1 Heap Summary Event Support
    + JDK-8224172: assert(jfr_is_event_enabled(id)) failed:
      invariant
    + JDK-8224475: JTextPane does not show images in HTML rendering
    + JDK-8226253: JAWS reports wrong number of radio buttons when
      buttons are hidden.
    + JDK-8226779: [TESTBUG] Test JFR API from Java agent
    + JDK-8226892: ActionListeners on JRadioButtons don't get
      notified when selection is changed with arrow keys
    + JDK-8227011: Starting a JFR recording in response to JVMTI
      VMInit and / or Java agent premain corrupts memory
    + JDK-8227605: Kitchensink fails 'assert((((klass)-&gt;trace_id()
      &amp; (JfrTraceIdEpoch::leakp_in_use_this_epoch_bit())) != 0))
      failed: invariant'
    + JDK-8229366: JFR backport allows unchecked writing to memory
    + JDK-8229401: Fix JFR code cache test failures
    + JDK-8229708: JFR backport code does not initialize
    + JDK-8229873: 8229401 broke jdk8u-jfr-incubator
    + JDK-8230448: [test] JFRSecurityTestSuite.java is failing on
      Windows
    + JDK-8230707: JFR related tests are failing
    + JDK-8230782: Robot.createScreenCapture() fails if
      'awt.robot.gtk' is set to false
    + JDK-8230856: Java_java_net_NetworkInterface_getByName0 on
       unix misses ReleaseStringUTFChars in early return
    + JDK-8230947: TestLookForUntestedEvents.java is failing after
      JDK-8230707
    + JDK-8231995: two jtreg tests failed after 8229366 is fixed
    + JDK-8233623: Add classpath exception to copyright in
      EventHandlerProxyCreator.java file
    + JDK-8236002: CSR for JFR backport suggests not leaving out
      the package-info
    + JDK-8236008: Some backup files were accidentally left in the
      hotspot tree
    + JDK-8236074: Missed package-info
    + JDK-8236174: Should update javadoc since tags
    + JDK-8238076: Fix OpenJDK 7 Bootstrap Broken by JFR Backport
    + JDK-8238452: Keytool generates wrong expiration date if
      validity is set to 2050/01/01
    + JDK-8238555: Allow Initialization of SunPKCS11 with NSS when
      there are external FIPS modules in the NSSDB
    + JDK-8238589: Necessary code cleanup in JFR for JDK8u
    + JDK-8238590: Enable JFR by default during compilation in 8u
    + JDK-8239055: Wrong implementation of VMState.hasListener
    + JDK-8239476: JDK-8238589 broke windows build by moving
      OrderedPair
    + JDK-8239479: minimal1 and zero builds are failing
    + JDK-8239867: correct over use of INCLUDE_JFR macro
    + JDK-8240375: Disable JFR by default for July 2020 release
    + JDK-8241444: Metaspace::_class_vsm not initialized if
      compressed class pointers are disabled
    + JDK-8241902: AIX Build broken after integration of
      JDK-8223147 (JFR Backport)
    + JDK-8242788: Non-PCH build is broken after JDK-8191393
  * Import of OpenJDK 8 u262 build 02
    + JDK-8130737: AffineTransformOp can't handle child raster with
      non-zero x-offset
    + JDK-8172559: [PIT][TEST_BUG] Move @test to be 1st annotation
      in java/awt/image/Raster/TestChildRasterOp.java
    + JDK-8230926: [macosx] Two apostrophes are entered instead of
      one with 'U.S. International - PC' layout
    + JDK-8240576: JVM crashes after transformation in C2
      IdealLoopTree::merge_many_backedges
    + JDK-8242883: Incomplete backport of JDK-8078268: backport
      test part
  * Import of OpenJDK 8 u262 build 03
    + JDK-8037866: Replace the Fun class in tests with lambdas
    + JDK-8146612: C2: Precedence edges specification violated
    + JDK-8150986: serviceability/sa/jmap-hprof/
       /JMapHProfLargeHeapTest.java failing because expects HPROF
      JAVA PROFILE 1.0.1 file format
    + JDK-8229888: (zipfs) Updating an existing zip file does not
      preserve original permissions
    + JDK-8230597: Update GIFlib library to the 5.2.1
    + JDK-8230769: BufImg_SetupICM add
      ReleasePrimitiveArrayCritical call in early return
    + JDK-8233880, PR3798: Support compilers with multi-digit major
      version numbers
    + JDK-8239852: java/util/concurrent tests fail with
      -XX:+VerifyGraphEdges: assert(!VerifyGraphEdges) failed:
      verification should have failed
    + JDK-8241638: launcher time metrics always report 1 on Linux
      when _JAVA_LAUNCHER_DEBUG set
    + JDK-8243059: Build fails when --with-vendor-name contains a
      comma
    + JDK-8243474: [TESTBUG] removed three tests of 0 bytes
    + JDK-8244461: [JDK 8u] Build fails with glibc 2.32
    + JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion()
      returns wrong result
  * Import of OpenJDK 8 u262 build 04
    + JDK-8067796: (process) Process.waitFor(timeout, unit) doesn't
      throw NPE if timeout is less than, or equal to zero when unit
      == null
    + JDK-8148886: SEGV in sun.java2d.marlin.Renderer._endRendering
    + JDK-8171934:
      ObjectSizeCalculator.getEffectiveMemoryLayoutSpecification()
      does not recognize OpenJDK's HotSpot VM
    + JDK-8196969: JTreg Failure:
      serviceability/sa/ClhsdbJstack.java causes NPE
    + JDK-8243539: Copyright info (Year) should be updated for fix
      of 8241638
    + JDK-8244777: ClassLoaderStats VM Op uses constant hash value
  * Import of OpenJDK 8 u262 build 05
    + JDK-7147060: com/sun/org/apache/xml/internal/security/
      /transforms/ClassLoaderTest.java doesn't run in agentvm mode
    + JDK-8178374: Problematic ByteBuffer handling in
      CipherSpi.bufferCrypt method
    + JDK-8181841: A TSA server returns timestamp with precision
      higher than milliseconds
    + JDK-8227269: Slow class loading when running with JDWP
    + JDK-8229899: Make java.io.File.isInvalid() less racy
    + JDK-8236996: Incorrect Roboto font rendering on Windows with
      subpixel antialiasing
    + JDK-8241750: x86_32 build failure after JDK-8227269
    + JDK-8244407: JVM crashes after transformation in C2
      IdealLoopTree::split_fall_in
    + JDK-8244843: JapanEraNameCompatTest fails
  * Import of OpenJDK 8 u262 build 06
    + JDK-8246223: Windows build fails after JDK-8227269
  * Import of OpenJDK 8 u262 build 07
    + JDK-8233197: Invert JvmtiExport::post_vm_initialized() and
      Jfr:on_vm_start() start-up order for correct option parsing
    + JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a
    + JDK-8245167: Top package in method profiling shows null in JMC
    + JDK-8246703: [TESTBUG] Add test for JDK-8233197
  * Import of OpenJDK 8 u262 build 08
    + JDK-8220293: Deadlock in JFR string pool
    + JDK-8225068: Remove DocuSign root certificate that is
      expiring in May 2020
    + JDK-8225069: Remove Comodo root certificate that is expiring
      in May 2020
  * Import of OpenJDK 8 u262 build 09
    + JDK-8248399: Build installs jfr binary when JFR is disabled
  * Import of OpenJDK 8 u262 build 10
    + JDK-8248715: New JavaTimeSupplementary localisation for 'in'
      installed in wrong package
  * Import of OpenJDK 8 u265 build 01
    + JDK-8249677: Regression in 8u after JDK-8237117: Better
      ForkJoinPool behavior
    + JDK-8250546: Expect changed behaviour reported in JDK-8249846
  * Import of OpenJDK 8 u272 build 01
    + JDK-8006205: [TESTBUG] NEED_TEST: please JTREGIFY
      test/compiler/7177917/Test7177917.java
    + JDK-8035493: JVMTI PopFrame capability must instruct
      compilers not to prune locals
    + JDK-8036088: Replace strtok() with its safe equivalent
      strtok_s() in DefaultProxySelector.c
    + JDK-8039082: [TEST_BUG] Test java/awt/dnd/
      /BadSerializationTest/BadSerializationTest.java fails
    + JDK-8075774: Small readability and performance improvements
      for zipfs
    + JDK-8132206: move ScanTest.java into OpenJDK
    + JDK-8132376: Add @requires os.family to the client tests with
      access to internal OS-specific API
    + JDK-8132745: minor cleanup of java/util/Scanner/ScanTest.java
    + JDK-8137087: [TEST_BUG] Cygwin failure of java/awt/
      /appletviewer/IOExceptionIfEncodedURLTest/
      /IOExceptionIfEncodedURLTest.sh
    + JDK-8145808: java/awt/Graphics2D/MTGraphicsAccessTest/
      /MTGraphicsAccessTest.java hangs on Win. 8
    + JDK-8151788: NullPointerException from ntlm.Client.type3
    + JDK-8151834: Test SmallPrimeExponentP.java times out
      intermittently
    + JDK-8153430: jdk regression test MletParserLocaleTest,
      ParserInfiniteLoopTest reduce default timeout
    + JDK-8153583: Make OutputAnalyzer.reportDiagnosticSummary
      public
    + JDK-8156169: Some sound tests rarely hangs because of
      incorrect synchronization
    + JDK-8165936: Potential Heap buffer overflow when seaching
      timezone info files
    + JDK-8166148: Fix for JDK-8165936 broke solaris builds
    + JDK-8167300: Scheduling failures during gcm should be fatal
    + JDK-8167615: Opensource unit/regression tests for JavaSound
    + JDK-8172012: [TEST_BUG] delays needed in
      javax/swing/JTree/4633594/bug4633594.java
    + JDK-8177628: Opensource unit/regression tests for ImageIO
    + JDK-8183341: Better cleanup for javax/imageio/AllowSearch.java
    + JDK-8183351: Better cleanup for jdk/test/javax/imageio/spi/
      /AppletContextTest/BadPluginConfigurationTest.sh
    + JDK-8193137: Nashorn crashes when given an empty script file
    + JDK-8194298: Add support for per Socket configuration of TCP
      keepalive
    + JDK-8198004: javax/swing/JFileChooser/6868611/bug6868611.java
      throws error
    + JDK-8200313: java/awt/Gtk/GtkVersionTest/GtkVersionTest.java
      fails
    + JDK-8210147: adjust some WSAGetLastError usages in windows
      network coding
    + JDK-8211714: Need to update vm_version.cpp to recognise
      VS2017 minor versions
    + JDK-8214862: assert(proj != __null) at compile.cpp:3251
    + JDK-8217606: LdapContext#reconnect always opens a new
      connection
    + JDK-8217647: JFR: recordings on 32-bit systems unreadable
    + JDK-8226697: Several tests which need the @key headful
      keyword are missing it.
    + JDK-8229378: jdwp library loader in linker_md.c quietly
      truncates on buffer overflow
    + JDK-8230303: JDB hangs when running monitor command
    + JDK-8230711: ConnectionGraph::unique_java_object(Node* N)
      return NULL if n is not in the CG
    + JDK-8234617: C1: Incorrect result of field load due to
      missing narrowing conversion
    + JDK-8235243: handle VS2017 15.9 and VS2019 in
      abstract_vm_version
    + JDK-8235325: build failure on Linux after 8235243
    + JDK-8235687: Contents/MacOS/libjli.dylib cannot be a symlink
    + JDK-8237951: CTW: C2 compilation fails with 'malformed
      control flow'
    + JDK-8238225: Issues reported after replacing symlink at
      Contents/MacOS/libjli.dylib with binary
    + JDK-8239385: KerberosTicket client name refers wrongly to
      sAMAccountName in AD
    + JDK-8239819: XToolkit: Misread of screen information memory
    + JDK-8240295: hs_err elapsed time in seconds is not accurate
      enough
    + JDK-8241888: Mirror jdk.security.allowNonCaAnchor system
      property with a security one
    + JDK-8242498: Invalid 'sun.awt.TimedWindowEvent' object leads
      to JVM crash
    + JDK-8243489: Thread CPU Load event may contain wrong data for
      CPU time under certain conditions
    + JDK-8244818: Java2D Queue Flusher crash while moving
      application window to external monitor
    + JDK-8246310: Clean commented-out code about ModuleEntry
      and PackageEntry in JFR
    + JDK-8246384: Enable JFR by default on supported architectures
      for October 2020 release
    + JDK-8248643: Remove extra leading space in JDK-8240295 8u
      backport
    + JDK-8249610: Make
      sun.security.krb5.Config.getBooleanObject(String... keys)
      method public
  * Import of OpenJDK 8 u272 build 02
    + JDK-8023697: failed class resolution reports different class
      name in detail message for the first and subsequent times
    + JDK-8025886: replace [[ and == bash extensions in regtest
    + JDK-8046274: Removing dependency on jakarta-regexp
    + JDK-8048933: -XX:+TraceExceptions output should include the
      message
    + JDK-8076151: [TESTBUG] Test java/awt/FontClass/CreateFont/
      /fileaccess/FontFile.java fails
    + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'
      treated by JVM as an equivalent
    + JDK-8154313: Generated javadoc scattered all over the place
    + JDK-8163251: Hard coded loop limit prevents reading of smart
      card data greater than 8k
    + JDK-8173300: [TESTBUG]compiler/tiered/NonTieredLevelsTest.java
      fails with compiler.whitebox.SimpleTestCaseHelper(int) must be
      compiled
    + JDK-8183349: Better cleanup for jdk/test/javax/imageio/
      /plugins/shared/CanWriteSequence.java and WriteAfterAbort.java
    + JDK-8191678: [TESTBUG] Add keyword headful in java/awt
      FocusTransitionTest test.
    + JDK-8201633: Problems with AES-GCM native acceleration
    + JDK-8211049: Second parameter of 'initialize' method is not
          used
    + JDK-8219566: JFR did not collect call stacks when
      MaxJavaStackTraceDepth is set to zero
    + JDK-8220165: Encryption using GCM results in
      RuntimeException- input length out of bound
    + JDK-8220555: JFR tool shows potentially misleading message
      when it cannot access a file
    + JDK-8224217: RecordingInfo should use textual representation
      of path
    + JDK-8231779: crash
      HeapWord*ParallelScavengeHeap::failed_mem_allocate
    + JDK-8238380, PR3798: java.base/unix/native/libjava/childproc.c
      'multiple definition' link errors with GCC10
    + JDK-8238386, PR3798: (sctp) jdk.sctp/unix/native/libsctp/
      /SctpNet.c 'multiple definition' link errors with GCC10
    + JDK-8238388, PR3798: libj2gss/NativeFunc.o 'multiple
      definition' link errors with GCC10
    + JDK-8242556: Cannot load RSASSA-PSS public key with non-null
      params from byte array
    + JDK-8250755: Better cleanup for jdk/test/javax/imageio/
      /plugins/shared/CanWriteSequence.java
  * Import of OpenJDK 8 u272 build 03
    + JDK-6574989: TEST_BUG:
      javax/sound/sampled/Clip/bug5070081.java fails sometimes
    + JDK-8148754: C2 loop unrolling fails due to unexpected graph
      shape
    + JDK-8192953: sun/management/jmxremote/bootstrap/*.sh tests
      fail with error : revokeall.exe: Permission denied
    + JDK-8203357: Container Metrics
    + JDK-8209113: Use WeakReference for lastFontStrike for created
      Fonts
    + JDK-8216283: Allow shorter method sampling interval than 10 ms
    + JDK-8221569: JFR tool produces incorrect output when both
      --categories and --events are specified
    + JDK-8233097: Fontmetrics for large Fonts has zero width
    + JDK-8248851: CMS: Missing memory fences between free chunk
      check and klass read
    + JDK-8250875: Incorrect parameter type for update_number in
      JDK_Version::jdk_update
  * Import of OpenJDK 8 u272 build 04
    + JDK-8061616: HotspotDiagnosticMXBean.getVMOption() throws
      IllegalArgumentException for flags of type double
    + JDK-8177334: Update xmldsig implementation to Apache
      Santuario 2.1.1
    + JDK-8217878: ENVELOPING XML signature no longer works in JDK
      11
    + JDK-8218629: XML Digital Signature throws NAMESPACE_ERR
      exception on OpenJDK 11, works 8/9/10
    + JDK-8243138: Enhance BaseLdapServer to support starttls
      extended request
  * Import of OpenJDK 8 u272 build 05
    + JDK-8026236: Add PrimeTest for BigInteger
    + JDK-8057003: Large reference arrays cause extremely long
      synchronization times
    + JDK-8060721: Test runtime/SharedArchiveFile/
      /LimitSharedSizes.java fails in jdk 9 fcs new
      platforms/compiler
    + JDK-8152077: (cal) Calendar.roll does not always roll the
      hours during daylight savings
    + JDK-8168517: java/lang/ProcessBuilder/Basic.java failed
    + JDK-8211163: UNIX version of Java_java_io_Console_echo does
      not return a clean boolean
    + JDK-8220674: [TESTBUG] MetricsMemoryTester failcount test in
      docker container only works with debug JVMs
    + JDK-8231213: Migrate SimpleDateFormatConstTest to JDK Repo
    + JDK-8236645: JDK 8u231 introduces a regression with
      incompatible handling of XML messages
    + JDK-8240676: Meet not symmetric failure when running lucene
      on jdk8
    + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA
      program
    + JDK-8249158: THREAD_START and THREAD_END event posted in
      primordial phase
    + JDK-8250627: Use -XX:+/-UseContainerSupport for
      enabling/disabling Java container metrics
    + JDK-8251546: 8u backport of JDK-8194298 breaks AIX and
      Solaris builds
    + JDK-8252084: Minimal VM fails to bootcycle: undefined symbol:
      AgeTableTracer::is_tenuring_distribution_event_enabled
  * Import of OpenJDK 8 u272 build 06
    + JDK-8064319: Need to enable -XX:+TraceExceptions in release
      builds
    + JDK-8080462, PR3801: Update SunPKCS11 provider with PKCS11
      v2.40 support
    + JDK-8160768: Add capability to custom resolve host/domain
      names within the default JNDI LDAP provider
    + JDK-8161973: PKIXRevocationChecker.getSoftFailExceptions()
      not working
    + JDK-8169925, PR3801: PKCS #11 Cryptographic Token Interface
      license
    + JDK-8184762: ZapStackSegments should use optimized memset
    + JDK-8193234: When using -Xcheck:jni an internally allocated
      buffer can leak
    + JDK-8219919: RuntimeStub name lost with
      PrintFrameConverterAssembly
    + JDK-8220313: [TESTBUG] Update base image for Docker testing
      to OL 7.6
    + JDK-8222079: Don't use memset to initialize fields decode_env
      constructor in disassembler.cpp
    + JDK-8225695: 32-bit build failures after JDK-8080462 (Update
      SunPKCS11 provider with PKCS11 v2.40 support)
    + JDK-8226575: OperatingSystemMXBean should be made container
      aware
    + JDK-8226809: Circular reference in printed stack trace is not
      correctly indented &amp; ambiguous
    + JDK-8228835: Memory leak in PKCS11 provider when using AES GCM
    + JDK-8233621: Mismatch in jsse.enableMFLNExtension property
      name
    + JDK-8238898, PR3801: Missing hash characters for header on
      license file
    + JDK-8243320: Add SSL root certificates to Oracle Root CA
      program
    + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest
      release 1.8.26
    + JDK-8245467: Remove 8u TLSv1.2 implementation files
    + JDK-8245469: Remove DTLS protocol implementation
    + JDK-8245470: Fix JDK8 compatibility issues
    + JDK-8245471: Revert JDK-8148188
    + JDK-8245472: Backport JDK-8038893 to JDK8
    + JDK-8245473: OCSP stapling support
    + JDK-8245474: Add TLS_KRB5 cipher suites support according to
      RFC-2712
    + JDK-8245476: Disable TLSv1.3 protocol in the ClientHello
      message by default
    + JDK-8245477: Adjust TLS tests location
    + JDK-8245653: Remove 8u TLS tests
    + JDK-8245681: Add TLSv1.3 regression test from 11.0.7
    + JDK-8251117: Cannot check P11Key size in P11Cipher and
      P11AEADCipher
    + JDK-8251120, PR3793: [8u] HotSpot build assumes ENABLE_JFR is
      set to either true or false
    + JDK-8251341: Minimal Java specification change
    + JDK-8251478: Backport TLSv1.3 regression tests to JDK8u
  * Import of OpenJDK 8 u272 build 07
    + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ
  * Import of OpenJDK 8 u272 build 08
    + JDK-8062947: Fix exception message to correctly represent
      LDAP connection failure
    + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed
      due to timeout on DeadServerNoTimeoutTest is incorrect
    + JDK-8252573: 8u: Windows build failed after 8222079 backport
  * Import of OpenJDK 8 u272 build 09
    + JDK-8252886: [TESTBUG] sun/security/ec/TestEC.java :
      Compilation failed
  * Import of OpenJDK 8 u272 build 10
    + JDK-8254673: Call to JvmtiExport::post_vm_start() was removed
      by the fix for JDK-8249158
    + JDK-8254937: Revert JDK-8148854 for 8u272
  * Backports
    + JDK-8038723, PR3806: Openup some PrinterJob tests
    + JDK-8041480, PR3806: ArrayIndexOutOfBoundsException when
      JTable contains certain string
    + JDK-8058779, PR3805: Faster implementation of
      String.replace(CharSequence, CharSequence)
    + JDK-8130125, PR3806: [TEST_BUG] add @modules to the several
      client tests unaffected by the automated bulk update
    + JDK-8144015, PR3806: [PIT] failures of text layout font tests
    + JDK-8144023, PR3806: [PIT] failure of text measurements in
      javax/swing/text/html/parser/Parser/6836089/bug6836089.java
    + JDK-8144240, PR3806: [macosx][PIT] AIOOB in
      closed/javax/swing/text/GlyphPainter2/6427244/bug6427244.java
    + JDK-8145542, PR3806: The case failed automatically and thrown
      java.lang.ArrayIndexOutOfBoundsException exception
    + JDK-8151725, PR3806: [macosx] ArrayIndexOOB exception when
      displaying Devanagari text in JEditorPane
    + JDK-8152358, PR3800: code and comment cleanups found during
      the hunt for 8077392
    + JDK-8152545, PR3804: Use preprocessor instead of compiling a
      program to generate native nio constants
    + JDK-8152680, PR3806: Regression in
      GlyphVector.getGlyphCharIndex behaviour
    + JDK-8158924, PR3806: Incorrect i18n text document layout
    + JDK-8166003, PR3806: [PIT][TEST_BUG] missing helper for
      javax/swing/text/GlyphPainter2/6427244/bug6427244.java
    + JDK-8166068, PR3806: test/java/awt/font/GlyphVector/
      /GetGlyphCharIndexTest.java does not compile
    + JDK-8169879, PR3806: [TEST_BUG] javax/swing/text/
      /GlyphPainter2/6427244/bug6427244.java - compilation failed
    + JDK-8191512, PR3806: T2K font rasterizer code removal
    + JDK-8191522, PR3806: Remove Bigelow&amp;Holmes Lucida fonts from
      JDK sources
    + JDK-8236512, PR3801: PKCS11 Connection closed after
      Cipher.doFinal and NoPadding
    + JDK-8254177, PR3809: (tz) Upgrade time-zone data to
      tzdata2020b
  * Bug fixes
    + PR3798: Fix format-overflow error on GCC 10, caused by
      passing NULL to a '%s' directive
    + PR3795: ECDSAUtils for XML digital signatures should support
      the same curve set as the rest of the JDK
    + PR3799: Adapt elliptic curve patches to JDK-8245468: Add
      TLSv1.3 implementation classes from 11.0.7
    + PR3808: IcedTea does not install the JFR *.jfc files
    + PR3810: Enable JFR on x86 (32-bit) now that JDK-8252096 has
      fixed its use with Shenandoah
    + PR3811: Don't attempt to install JFR files when JFR is
      disabled
  * Shenandoah
    + [backport] 8221435: Shenandoah should not mark through weak
      roots
    + [backport] 8221629: Shenandoah: Cleanup class unloading logic
    + [backport] 8222992: Shenandoah: Pre-evacuate all roots
    + [backport] 8223215: Shenandoah: Support verifying subset of
      roots
    + [backport] 8223774: Shenandoah: Refactor
      ShenandoahRootProcessor and family
    + [backport] 8224210: Shenandoah: Refactor
      ShenandoahRootScanner to support scanning CSet codecache roots
    + [backport] 8224508: Shenandoah: Need to update thread roots
      in final mark for piggyback ref update cycle
    + [backport] 8224579: ResourceMark not declared in
      shenandoahRootProcessor.inline.hpp with
      --disable-precompiled-headers
    + [backport] 8224679: Shenandoah: Make
      ShenandoahParallelCodeCacheIterator noncopyable
    + [backport] 8224751: Shenandoah: Shenandoah Verifier should
      select proper roots according to current GC cycle
    + [backport] 8225014: Separate ShenandoahRootScanner method for
      object_iterate
    + [backport] 8225216: gc/logging/TestMetaSpaceLog.java doesn't
      work for Shenandoah
    + [backport] 8225573: Shenandoah: Enhance ShenandoahVerifier to
      ensure roots to-space invariant
    + [backport] 8225590: Shenandoah: Refactor
      ShenandoahClassLoaderDataRoots API
    + [backport] 8226413: Shenandoah: Separate root scanner for
      SH::object_iterate()
    + [backport] 8230853: Shenandoah: replace leftover
      assert(is_in(...)) with rich asserts
    + [backport] 8231198: Shenandoah: heap walking should visit all
      roots most of the time
    + [backport] 8231244: Shenandoah: all-roots heap walking misses
      some weak roots
    + [backport] 8237632: Shenandoah: accept NULL fwdptr to
      cooperate with JVMTI and JFR
    + [backport] 8239786: Shenandoah: print per-cycle statistics
    + [backport] 8239926: Shenandoah: Shenandoah needs to mark
      nmethod's metadata
    + [backport] 8240671: Shenandoah: refactor
      ShenandoahPhaseTimings
    + [backport] 8240749: Shenandoah: refactor ShenandoahUtils
    + [backport] 8240750: Shenandoah: remove leftover files and
      mentions of ShenandoahAllocTracker
    + [backport] 8240868: Shenandoah: remove CM-with-UR
      piggybacking cycles
    + [backport] 8240872: Shenandoah: Avoid updating new regions
      from start of evacuation
    + [backport] 8240873: Shenandoah: Short-cut arraycopy barriers
    + [backport] 8240915: Shenandoah: Remove unused fields in init
      mark tasks
    + [backport] 8240948: Shenandoah: cleanup not-forwarded-objects
      paths after JDK-8240868
    + [backport] 8241007: Shenandoah: remove
      ShenandoahCriticalControlThreadPriority support
    + [backport] 8241062: Shenandoah: rich asserts trigger 'empty
      statement' inspection
    + [backport] 8241081: Shenandoah: Do not modify
      update-watermark concurrently
    + [backport] 8241093: Shenandoah: editorial changes in flag
      descriptions
    + [backport] 8241139: Shenandoah: distribute mark-compact work
      exactly to minimize fragmentation
    + [backport] 8241142: Shenandoah: should not use parallel
      reference processing with single GC thread
    + [backport] 8241351: Shenandoah: fragmentation metrics overhaul
    + [backport] 8241435: Shenandoah: avoid disabling pacing with
      'aggressive'
    + [backport] 8241520: Shenandoah: simplify region sequence
      numbers handling
    + [backport] 8241534: Shenandoah: region status should include
      update watermark
    + [backport] 8241574: Shenandoah: remove
      ShenandoahAssertToSpaceClosure
    + [backport] 8241583: Shenandoah: turn heap lock asserts into
      macros
    + [backport] 8241668: Shenandoah: make ShenandoahHeapRegion not
      derive from ContiguousSpace
    + [backport] 8241673: Shenandoah: refactor anti-false-sharing
      padding
    + [backport] 8241675: Shenandoah: assert(n-&gt;outcnt() &gt; 0) at
      shenandoahSupport.cpp:2858 with
      java/util/Collections/FindSubList.java
    + [backport] 8241692: Shenandoah: remove
      ShenandoahHeapRegion::_reserved
    + [backport] 8241700: Shenandoah: Fold
      ShenandoahKeepAliveBarrier flag into ShenandoahSATBBarrier
    + [backport] 8241740: Shenandoah: remove
      ShenandoahHeapRegion::_heap
    + [backport] 8241743: Shenandoah: refactor and inline
      ShenandoahHeap::heap()
    + [backport] 8241748: Shenandoah: inline MarkingContext TAMS
      methods
    + [backport] 8241838: Shenandoah: no need to trash cset during
      final mark
    + [backport] 8241841: Shenandoah: ditch one of allocation type
      counters in ShenandoahHeapRegion
    + [backport] 8241842: Shenandoah: inline
      ShenandoahHeapRegion::region_number
    + [backport] 8241844: Shenandoah: rename
      ShenandoahHeapRegion::region_number
    + [backport] 8241845: Shenandoah: align ShenandoahHeapRegions
      to cache lines
    + [backport] 8241926: Shenandoah: only print heap changes for
      operations that directly affect it
    + [backport] 8241983: Shenandoah: simplify FreeSet logging
    + [backport] 8241985: Shenandoah: simplify collectable garbage
      logging
    + [backport] 8242040: Shenandoah: print allocation failure type
    + [backport] 8242041: Shenandoah: adaptive heuristics should
      account evac reserve in free target
    + [backport] 8242042: Shenandoah: tune down
      ShenandoahGarbageThreshold
    + [backport] 8242054: Shenandoah: New incremental-update mode
    + [backport] 8242075: Shenandoah: rename
      ShenandoahHeapRegionSize flag
    + [backport] 8242082: Shenandoah: Purge Traversal mode
    + [backport] 8242083: Shenandoah: split 'Prepare Evacuation'
      tracking into cset/freeset counters
    + [backport] 8242089: Shenandoah: per-worker stats should be
      summed up, not averaged
    + [backport] 8242101: Shenandoah: coalesce and parallelise heap
      region walks during the pauses
    + [backport] 8242114: Shenandoah: remove
      ShenandoahHeapRegion::reset_alloc_metadata_to_shared
    + [backport] 8242130: Shenandoah: Simplify arraycopy-barrier
      dispatching
    + [backport] 8242211: Shenandoah: remove
      ShenandoahHeuristics::RegionData::_seqnum_last_alloc
    + [backport] 8242212: Shenandoah: initialize
      ShenandoahHeuristics::_region_data eagerly
    + [backport] 8242213: Shenandoah: remove
      ShenandoahHeuristics::_bytes_in_cset
    + [backport] 8242217: Shenandoah: Enable GC mode to be
      diagnostic/experimental and have a name
    + [backport] 8242227: Shenandoah: transit regions to cset state
      when adding to collection set
    + [backport] 8242228: Shenandoah: remove unused
      ShenandoahCollectionSet methods
    + [backport] 8242229: Shenandoah: inline ShenandoahHeapRegion
      liveness-related methods
    + [backport] 8242267: Shenandoah: regions space needs to be
      aligned by os::vm_allocation_granularity()
    + [backport] 8242271: Shenandoah: add test to verify GC mode
      unlock
    + [backport] 8242273: Shenandoah: accept either SATB or IU
      barriers, but not both
    + [backport] 8242301: Shenandoah: Inline LRB runtime call
    + [backport] 8242316: Shenandoah: Turn NULL-check into assert
      in SATB slow-path entry
    + [backport] 8242353: Shenandoah: micro-optimize region
      liveness handling
    + [backport] 8242365: Shenandoah: use uint16_t instead of
      jushort for liveness cache
    + [backport] 8242375: Shenandoah: Remove
      ShenandoahHeuristic::record_gc_start/end methods
    + [backport] 8242641: Shenandoah: clear live data and update
      TAMS optimistically
    + [backport] 8243238: Shenandoah: explicit GC request should
      wait for a complete GC cycle
    + [backport] 8243301: Shenandoah: ditch
      ShenandoahAllowMixedAllocs
    + [backport] 8243307: Shenandoah: remove
      ShCollectionSet::live_data
    + [backport] 8243395: Shenandoah: demote guarantee in
      ShenandoahPhaseTimings::record_workers_end
    + [backport] 8243463: Shenandoah: ditch total_pause counters
    + [backport] 8243464: Shenandoah: print statistic counters in
      time order
    + [backport] 8243465: Shenandoah: ditch unused pause_other,
      conc_other counters
    + [backport] 8243487: Shenandoah: make _num_phases illegal
      phase type
    + [backport] 8243494: Shenandoah: set counters once per cycle
    + [backport] 8243573: Shenandoah: rename GCParPhases and
      related code
    + [backport] 8243848: Shenandoah: Windows build fails after
      JDK-8239786
    + [backport] 8244180: Shenandoah: carry Phase to
      ShWorkerTimingsTracker explicitly
    + [backport] 8244200: Shenandoah: build breakages after
      JDK-8241743
    + [backport] 8244226: Shenandoah: per-cycle statistics contain
      worker data from previous cycles
    + [backport] 8244326: Shenandoah: global statistics should not
      accept bogus samples
    + [backport] 8244509: Shenandoah: refactor
      ShenandoahBarrierC2Support::test_* methods
    + [backport] 8244551: Shenandoah: Fix racy update of
      update_watermark
    + [backport] 8244667: Shenandoah: SBC2Support::test_gc_state
      takes loop for wrong control
    + [backport] 8244730: Shenandoah: gc/shenandoah/options/
      /TestHeuristicsUnlock.java should only verify the heuristics
    + [backport] 8244732: Shenandoah: move heuristics code to
      gc/shenandoah/heuristics
    + [backport] 8244737: Shenandoah: move mode code to
      gc/shenandoah/mode
    + [backport] 8244739: Shenandoah: break superclass dependency
      on ShenandoahNormalMode
    + [backport] 8244740: Shenandoah: rename ShenandoahNormalMode
      to ShenandoahSATBMode
    + [backport] 8245461: Shenandoah: refine mode name()-s
    + [backport] 8245463: Shenandoah: refine ShenandoahPhaseTimings
      constructor arguments
    + [backport] 8245464: Shenandoah: allocate collection set
      bitmap at lower addresses
    + [backport] 8245465: Shenandoah: test_in_cset can use more
      efficient encoding
    + [backport] 8245726: Shenandoah: lift/cleanup
      ShenandoahHeuristics names and properties
    + [backport] 8245754: Shenandoah: ditch ShenandoahAlwaysPreTouch
    + [backport] 8245757: Shenandoah: AlwaysPreTouch should not
      disable heap resizing or uncommits
    + [backport] 8245773: Shenandoah: Windows assertion failure
      after JDK-8245464
    + [backport] 8245812: Shenandoah: compute root phase parallelism
    + [backport] 8245814: Shenandoah: reconsider format specifiers
      for stats
    + [backport] 8245825: Shenandoah: Remove diagnostic flag
      ShenandoahConcurrentScanCodeRoots
    + [backport] 8246162: Shenandoah: full GC does not mark code
      roots when class unloading is off
    + [backport] 8247310: Shenandoah: pacer should not affect
      interrupt status
    + [backport] 8247358: Shenandoah: reconsider free budget slice
      for marking
    + [backport] 8247367: Shenandoah: pacer should wait on lock
      instead of exponential backoff
    + [backport] 8247474: Shenandoah: Windows build warning after
      JDK-8247310
    + [backport] 8247560: Shenandoah: heap iteration holds root
      locks all the time
    + [backport] 8247593: Shenandoah: should not block pacing
      reporters
    + [backport] 8247751: Shenandoah: options tests should run with
      smaller heaps
    + [backport] 8247754: Shenandoah: mxbeans tests can be shorter
    + [backport] 8247757: Shenandoah: split heavy tests by
      heuristics to improve parallelism
    + [backport] 8247860: Shenandoah: add update watermark line in
      rich assert failure message
    + [backport] 8248041: Shenandoah: pre-Full GC root updates may
      miss some roots
    + [backport] 8248652: Shenandoah: SATB buffer handling may
      assume no forwarded objects
    + [backport] 8249560: Shenandoah: Fix racy GC request handling
    + [backport] 8249649: Shenandoah: provide per-cycle pacing stats
    + [backport] 8249801: Shenandoah: Clear soft-refs on requested
      GC cycle
    + [backport] 8249953: Shenandoah: gc/shenandoah/mxbeans tests
      should account for corner cases
    + Fix slowdebug build after JDK-8230853 backport
    + JDK-8252096: Shenandoah: adjust SerialPageShiftCount for
      x86_32 and JFR
    + JDK-8252366: Shenandoah: revert/cleanup changes in
      graphKit.cpp
    + Shenandoah: add JFR roots to root processor after JFR
      integration
    + Shenandoah: add root statistics for string dedup table/queues
    + Shenandoah: enable low-frequency STW class unloading
    + Shenandoah: fix build failures after JDK-8244737 backport
    + Shenandoah: Fix build failure with +JFR -PCH
    + Shenandoah: fix forceful pacer claim
    + Shenandoah: fix formats in
      ShenandoahStringSymbolTableUnlinkTask
    + Shenandoah: fix runtime linking failure due to non-compiled
      shenandoahBarrierSetC1
    + Shenandoah: hook statistics printing to PrintGCDetails, not
      PrintGC
    + Shenandoah: JNI weak roots are always cleared before Full GC
      mark
    + Shenandoah: missing SystemDictionary roots in
      ShenandoahHeapIterationRootScanner
    + Shenandoah: move barrier sets to their proper locations
    + Shenandoah: move parallelCleaning.* to shenandoah/
    + Shenandoah: pacer should use proper Atomics for intptr_t
    + Shenandoah: properly deallocates class loader metadata
    + Shenandoah: specialize String Table scans for better pause
      performance
    + Shenandoah: Zero build fails after recent Atomic cleanup in
      Pacer
  * AArch64 port
    + JDK-8161072, PR3797: AArch64: jtreg
      compiler/uncommontrap/TestDeoptOOM failure
    + JDK-8171537, PR3797: aarch64: compiler/c1/Test6849574.java
      generates guarantee failure in C1
    + JDK-8183925, PR3797: [AArch64] Decouple crash protection from
      watcher thread
    + JDK-8199712, PR3797: [AArch64] Flight Recorder
    + JDK-8203481, PR3797: Incorrect constraint for unextended_sp
      in frame:safe_for_sender
    + JDK-8203699, PR3797: java/lang/invoke/SpecialInterfaceCall
      fails with SIGILL on aarch64
    + JDK-8209413, PR3797: AArch64: NPE in clhsdb jstack command
    + JDK-8215961, PR3797: jdk/jfr/event/os/TestCPUInformation.java
      fails on AArch64
    + JDK-8216989, PR3797:
      CardTableBarrierSetAssembler::gen_write_ref_array_post_barrier()
      does not check for zero length on AARCH64
    + JDK-8217368, PR3797: AArch64: C2 recursive stack locking
      optimisation not triggered
    + JDK-8221658, PR3797: aarch64: add necessary predicate for
      ubfx patterns
    + JDK-8237512, PR3797: AArch64: aarch64TestHook leaks a
      BufferBlob
    + JDK-8246482, PR3797: Build failures with +JFR -PCH
    + JDK-8247979, PR3797: aarch64: missing side effect of killing
      flags for clearArray_reg_reg
    + JDK-8248219, PR3797: aarch64: missing memory barrier in
      fast_storefield and fast_accessfield

- Ignore whitespaces after the header or footer in PEM X.509 cert
  (bsc#1171352)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555164" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555165" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555166" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555167" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150107" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_124 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721283" comment="kernel-default 4.4.180-94.124 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719614" comment="kgraft-patch-4_4_180-94_124-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538766" comment="kgraft-patch-4_4_180-94_124-default-3-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150108" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_121 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721282" comment="kernel-default 4.4.180-94.121 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719612" comment="kgraft-patch-4_4_180-94_121-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538767" comment="kgraft-patch-4_4_180-94_121-default-3-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150109" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_116 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721281" comment="kernel-default 4.4.180-94.116 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719610" comment="kgraft-patch-4_4_180-94_116-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538768" comment="kgraft-patch-4_4_180-94_116-default-4-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150110" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-11668: Fixed an out of bounds write to the heap in drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) caused by mishandling invalid descriptors (bsc#1168952).
- CVE-2020-1749: A flaw was found in the implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link, rather sending the data unencrypted. This would have allowed anyone in between the two endpoints to read the traffic unencrypted. (bsc#1165629)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538769" comment="kgraft-patch-4_4_180-94_130-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150111" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_113 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721279" comment="kernel-default 4.4.180-94.113 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719606" comment="kgraft-patch-4_4_180-94_113-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538770" comment="kgraft-patch-4_4_180-94_113-default-7-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150112" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538771" comment="kgraft-patch-4_4_180-94_127-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150113" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_107 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721280" comment="kernel-default 4.4.180-94.107 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719608" comment="kgraft-patch-4_4_180-94_107-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538772" comment="kgraft-patch-4_4_180-94_107-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150114" version="1" class="patch">
	<metadata>
		<title>Security update for gcc10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1172798" ref_url="https://bugzilla.suse.com/1172798" source="BUGZILLA"/>
		<reference ref_id="1172846" ref_url="https://bugzilla.suse.com/1172846" source="BUGZILLA"/>
		<reference ref_id="1173972" ref_url="https://bugzilla.suse.com/1173972" source="BUGZILLA"/>
		<reference ref_id="1174753" ref_url="https://bugzilla.suse.com/1174753" source="BUGZILLA"/>
		<reference ref_id="1174817" ref_url="https://bugzilla.suse.com/1174817" source="BUGZILLA"/>
		<reference ref_id="1175168" ref_url="https://bugzilla.suse.com/1175168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007739.html" source="SUSE-SU"/>
		<description>
This update for gcc10 fixes the following issues:
This update provides the GCC10 compiler suite and runtime libraries.

The base SUSE Linux Enterprise libraries libgcc_s1, libstdc++6 are replaced by
the gcc10 variants.

The new compiler variants are available with '-10' suffix, you can specify them
via:

        CC=gcc-10
        CXX=g++-10

or similar commands.

For a detailed changelog check out https://gcc.gnu.org/gcc-10/changes.html
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-10"/>
	<updated date="2020-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172798">SUSE bug 1172798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172846">SUSE bug 1172846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173972">SUSE bug 1173972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174753">SUSE bug 1174753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174817">SUSE bug 1174817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175168">SUSE bug 1175168</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13844">CVE-2020-13844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555168" comment="libasan6-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551866" comment="libasan6-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555169" comment="libatomic1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551868" comment="libatomic1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555170" comment="libgcc_s1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551870" comment="libgcc_s1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555171" comment="libgfortran5-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551872" comment="libgfortran5-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555172" comment="libgo16-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551874" comment="libgo16-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555173" comment="libgomp1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551876" comment="libgomp1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555174" comment="libitm1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551878" comment="libitm1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555175" comment="liblsan0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555176" comment="libobjc4-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551880" comment="libobjc4-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537839" comment="libquadmath0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531515" comment="libquadmath0-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555177" comment="libstdc++6-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551882" comment="libstdc++6-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525347" comment="libstdc++6-locale-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525348" comment="libstdc++6-pp-gcc10-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525349" comment="libstdc++6-pp-gcc10-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555178" comment="libtsan0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555179" comment="libubsan1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551886" comment="libubsan1-32bit-10.2.1+git583-1.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150115" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007757.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Intel CPU Microcode updated to 20201027 prerelease 
- CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) (bsc#1170446)
- CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)

# New Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  # Updated Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531524" comment="ucode-intel-20201027-13.76.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150116" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1106383" ref_url="https://bugzilla.suse.com/1106383" source="BUGZILLA"/>
		<reference ref_id="1133495" ref_url="https://bugzilla.suse.com/1133495" source="BUGZILLA"/>
		<reference ref_id="1139459" ref_url="https://bugzilla.suse.com/1139459" source="BUGZILLA"/>
		<reference ref_id="1151377" ref_url="https://bugzilla.suse.com/1151377" source="BUGZILLA"/>
		<reference ref_id="1151506" ref_url="https://bugzilla.suse.com/1151506" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1155574" ref_url="https://bugzilla.suse.com/1155574" source="BUGZILLA"/>
		<reference ref_id="1156482" ref_url="https://bugzilla.suse.com/1156482" source="BUGZILLA"/>
		<reference ref_id="1159814" ref_url="https://bugzilla.suse.com/1159814" source="BUGZILLA"/>
		<reference ref_id="1162108" ref_url="https://bugzilla.suse.com/1162108" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1712" ref_url="https://www.suse.com/security/cve/CVE-2020-1712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006452.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2020-1712 (bsc#bsc#1162108)
  Fix a heap use-after-free vulnerability, when asynchronous
  Polkit queries were performed while handling Dbus messages. A local
  unprivileged attacker could have abused this flaw to crash systemd services or
  potentially execute code and elevate their privileges, by sending specially
  crafted Dbus messages.

- Unconfirmed fix for prevent hanging of systemctl during restart. (bsc#1139459)
- Fix warnings thrown during package installation. (bsc#1154043)
- Fix for system-udevd prevent crash within OES2018. (bsc#1151506)
- Fragments of masked units ought not be considered for 'NeedDaemonReload'. (bsc#1156482)
- Wait for workers to finish when exiting. (bsc#1106383)
- Improve log message when inotify limit is reached. (bsc#1155574)
- Mention in the man pages that alias names are only effective after command 'systemctl enable'. (bsc#1151377)
- Introduce function for reading virtual files in 'sysfs' and 'procfs'. (bsc#1133495, bsc#1159814)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106383">SUSE bug 1106383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133495">SUSE bug 1133495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139459">SUSE bug 1139459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151377">SUSE bug 1151377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151506">SUSE bug 1151506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155574">SUSE bug 1155574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156482">SUSE bug 1156482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159814">SUSE bug 1159814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162108">SUSE bug 1162108</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1712/">CVE-2020-1712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1712">CVE-2020-1712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555180" comment="libsystemd0-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551888" comment="libsystemd0-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542599" comment="libudev-devel-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555181" comment="libudev1-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551891" comment="libudev1-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555182" comment="systemd-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551893" comment="systemd-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522625" comment="systemd-bash-completion-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555183" comment="systemd-sysvinit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555184" comment="udev-228-150.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150117" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.24 - OpenJDK 7u281 (October 2020 CPU, bsc#1177943)
  * Security fixes
    + JDK-8233624: Enhance JNI linkage
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8240124: Better VM Interning
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Import of OpenJDK 7 u281 build 1
    + JDK-8145096: Undefined behaviour in HotSpot
    + JDK-8215265: C2: range check elimination may allow illegal
      out of bound access
  * Backports
    + JDK-8250861, PR3812: Crash in MinINode::Ideal(PhaseGVN*, bool)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555185" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555186" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555187" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555188" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150118" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178387" ref_url="https://bugzilla.suse.com/1178387" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007768.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25692">CVE-2020-25692 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555189" comment="libldap-2_4-2-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551901" comment="libldap-2_4-2-32bit-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555190" comment="openldap2-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555191" comment="openldap2-back-meta-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555192" comment="openldap2-client-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531535" comment="openldap2-doc-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555193" comment="openldap2-ppolicy-check-password-1.2-18.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150119" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178588" ref_url="https://bugzilla.suse.com/1178588" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007779.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-49 (bsc#1178588)
  * CVE-2020-26950 (bmo#1675905)
    Write side effects in MCallGetProperty opcode not accounted
    for
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178588">SUSE bug 1178588</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26950">CVE-2020-26950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555194" comment="MozillaFirefox-78.4.1-112.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543033" comment="MozillaFirefox-devel-78.4.1-112.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555195" comment="MozillaFirefox-translations-common-78.4.1-112.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150120" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql96, postgresql10 and postgresql12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1171924" ref_url="https://bugzilla.suse.com/1171924" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007780.html" source="SUSE-SU"/>
		<description>


This update changes the internal packaging for postgresql, and so contains
all currently maintained postgresql versions across our SUSE Linux Enterprise 12
products.


* postgresql12 is shipped new in version 12.3 (bsc#1171924).

  The server and client packages only on SUSE Linux Enterprise Server 12 SP5,
  the libraries on SUSE Linux Enterprise Server 12 SP2 LTSS up to 12 SP5.

  + https://www.postgresql.org/about/news/2038/
  + https://www.postgresql.org/docs/12/release-12-3.html


* postgresql10 is updated to 10.13 (bsc#1171924).

  On SUSE Linux Enterprise Server 12 SP2 LTSS up to 12 SP5.

  +  https://www.postgresql.org/about/news/2038/
  +  https://www.postgresql.org/docs/10/release-10-13.html


* postgresql96 is updated to 9.6.18 (bsc#1171924):

  +  https://www.postgresql.org/about/news/2038/
  +  https://www.postgresql.org/docs/9.6/release-9-6-18.html

  On SUSE Linux Enterprise Server 12-SP2 and 12-SP3 LTSS only.

* postgresql 9.4 is updated to 9.4.26:

  +  https://www.postgresql.org/about/news/2011/
  +  https://www.postgresql.org/docs/9.4/release-9-4-26.html
  +  https://www.postgresql.org/about/news/1994/
  +  https://www.postgresql.org/docs/9.4/release-9-4-25.html

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171924">SUSE bug 1171924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555196" comment="libecpg6-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555197" comment="libpq5-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551911" comment="libpq5-32bit-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531549" comment="postgresql-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531550" comment="postgresql-contrib-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531551" comment="postgresql-docs-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531552" comment="postgresql-plperl-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531553" comment="postgresql-plpython-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531554" comment="postgresql-pltcl-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531555" comment="postgresql-server-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555198" comment="postgresql10-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555199" comment="postgresql10-contrib-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531558" comment="postgresql10-docs-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555200" comment="postgresql10-plperl-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555201" comment="postgresql10-plpython-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555202" comment="postgresql10-pltcl-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555203" comment="postgresql10-server-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555204" comment="postgresql96-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555205" comment="postgresql96-contrib-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531572" comment="postgresql96-docs-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555206" comment="postgresql96-plperl-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555207" comment="postgresql96-plpython-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555208" comment="postgresql96-pltcl-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555209" comment="postgresql96-server-9.6.19-6.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150121" version="1" class="patch">
	<metadata>
		<title>Security update for raptor (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178593" ref_url="https://bugzilla.suse.com/1178593" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18926" ref_url="https://www.suse.com/security/cve/CVE-2017-18926/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007782.html" source="SUSE-SU"/>
		<description>
This update for raptor fixes the following issues:

- Fixed a heap overflow vulnerability (bsc#1178593, CVE-2017-18926).
- Update raptor to version 2.0.15
  * Made several fixes to Turtle / N-Triples family of parsers and serializers
  * Added utility functions for re-entrant sorting of objects and sequences.
  * Made other fixes and improvements including fixing reported issues:
    0000574, 0000575, 0000576, 0000577, 0000579, 0000581 and 0000584.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178593">SUSE bug 1178593</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18926/">CVE-2017-18926 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18926">CVE-2017-18926 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555210" comment="libraptor2-0-2.0.15-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150122" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178671" ref_url="https://bugzilla.suse.com/1178671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12321" ref_url="https://www.suse.com/security/cve/CVE-2020-12321/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007786.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issue:

- CVE-2020-12321: Updated the Intel Bluetooth firmware for buffer overflow security bugs (bsc#1178671).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-17"/>
	<updated date="2020-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178671">SUSE bug 1178671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12321/">CVE-2020-12321 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12321">CVE-2020-12321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531578" comment="kernel-firmware-20170530-21.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531579" comment="ucode-amd-20170530-21.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150123" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178512" ref_url="https://bugzilla.suse.com/1178512" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28196" ref_url="https://www.suse.com/security/cve/CVE-2020-28196/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007792.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following security issue:

- CVE-2020-28196: Fixed an unbounded recursion via an ASN.1-encoded Kerberos message (bsc#1178512).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178512">SUSE bug 1178512</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28196/">CVE-2020-28196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28196">CVE-2020-28196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555211" comment="krb5-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551935" comment="krb5-32bit-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555212" comment="krb5-client-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555213" comment="krb5-doc-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555214" comment="krb5-plugin-kdb-ldap-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555215" comment="krb5-plugin-preauth-otp-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555216" comment="krb5-plugin-preauth-pkinit-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555217" comment="krb5-server-1.12.5-40.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150124" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007821.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538773" comment="kgraft-patch-4_4_180-94_130-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150125" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007821.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538774" comment="kgraft-patch-4_4_180-94_127-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150126" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007821.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_124 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721283" comment="kernel-default 4.4.180-94.124 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719614" comment="kgraft-patch-4_4_180-94_124-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538775" comment="kgraft-patch-4_4_180-94_124-default-4-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150127" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007821.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_121 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721282" comment="kernel-default 4.4.180-94.121 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719612" comment="kgraft-patch-4_4_180-94_121-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538776" comment="kgraft-patch-4_4_180-94_121-default-4-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150128" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007821.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_116 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721281" comment="kernel-default 4.4.180-94.116 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719610" comment="kgraft-patch-4_4_180-94_116-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538777" comment="kgraft-patch-4_4_180-94_116-default-5-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150129" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007821.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_113 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721279" comment="kernel-default 4.4.180-94.113 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719606" comment="kgraft-patch-4_4_180-94_113-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538778" comment="kgraft-patch-4_4_180-94_113-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150130" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007821.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_107 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721280" comment="kernel-default 4.4.180-94.107 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719608" comment="kgraft-patch-4_4_180-94_107-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538779" comment="kgraft-patch-4_4_180-94_107-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150131" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007828.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

Upgrade to version 10.15:

  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/10/release-10-15.html

Update to 10.14:

  * CVE-2020-14349, bsc#1175193: Set a secure search_path in
    logical replication walsenders and apply workers
  * CVE-2020-14350, bsc#1175194: Make contrib modules' installation
    scripts more secure.
  * https://www.postgresql.org/docs/10/release-10-14.html

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14349">CVE-2020-14349 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555218" comment="postgresql10-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555219" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555220" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555221" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555222" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555223" comment="postgresql10-server-10.15-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150132" version="1" class="patch">
	<metadata>
		<title>Security update for u-boot (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1134157" ref_url="https://bugzilla.suse.com/1134157" source="BUGZILLA"/>
		<reference ref_id="1134853" ref_url="https://bugzilla.suse.com/1134853" source="BUGZILLA"/>
		<reference ref_id="1143463" ref_url="https://bugzilla.suse.com/1143463" source="BUGZILLA"/>
		<reference ref_id="1143777" ref_url="https://bugzilla.suse.com/1143777" source="BUGZILLA"/>
		<reference ref_id="1143817" ref_url="https://bugzilla.suse.com/1143817" source="BUGZILLA"/>
		<reference ref_id="1143818" ref_url="https://bugzilla.suse.com/1143818" source="BUGZILLA"/>
		<reference ref_id="1143819" ref_url="https://bugzilla.suse.com/1143819" source="BUGZILLA"/>
		<reference ref_id="1143820" ref_url="https://bugzilla.suse.com/1143820" source="BUGZILLA"/>
		<reference ref_id="1143821" ref_url="https://bugzilla.suse.com/1143821" source="BUGZILLA"/>
		<reference ref_id="1143823" ref_url="https://bugzilla.suse.com/1143823" source="BUGZILLA"/>
		<reference ref_id="1143824" ref_url="https://bugzilla.suse.com/1143824" source="BUGZILLA"/>
		<reference ref_id="1143825" ref_url="https://bugzilla.suse.com/1143825" source="BUGZILLA"/>
		<reference ref_id="1143827" ref_url="https://bugzilla.suse.com/1143827" source="BUGZILLA"/>
		<reference ref_id="1143828" ref_url="https://bugzilla.suse.com/1143828" source="BUGZILLA"/>
		<reference ref_id="1143830" ref_url="https://bugzilla.suse.com/1143830" source="BUGZILLA"/>
		<reference ref_id="1143831" ref_url="https://bugzilla.suse.com/1143831" source="BUGZILLA"/>
		<reference ref_id="1167209" ref_url="https://bugzilla.suse.com/1167209" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11059" ref_url="https://www.suse.com/security/cve/CVE-2019-11059/" source="CVE"/>
		<reference ref_id="CVE-2019-11690" ref_url="https://www.suse.com/security/cve/CVE-2019-11690/" source="CVE"/>
		<reference ref_id="CVE-2019-13103" ref_url="https://www.suse.com/security/cve/CVE-2019-13103/" source="CVE"/>
		<reference ref_id="CVE-2019-14192" ref_url="https://www.suse.com/security/cve/CVE-2019-14192/" source="CVE"/>
		<reference ref_id="CVE-2019-14193" ref_url="https://www.suse.com/security/cve/CVE-2019-14193/" source="CVE"/>
		<reference ref_id="CVE-2019-14194" ref_url="https://www.suse.com/security/cve/CVE-2019-14194/" source="CVE"/>
		<reference ref_id="CVE-2019-14195" ref_url="https://www.suse.com/security/cve/CVE-2019-14195/" source="CVE"/>
		<reference ref_id="CVE-2019-14196" ref_url="https://www.suse.com/security/cve/CVE-2019-14196/" source="CVE"/>
		<reference ref_id="CVE-2019-14197" ref_url="https://www.suse.com/security/cve/CVE-2019-14197/" source="CVE"/>
		<reference ref_id="CVE-2019-14198" ref_url="https://www.suse.com/security/cve/CVE-2019-14198/" source="CVE"/>
		<reference ref_id="CVE-2019-14200" ref_url="https://www.suse.com/security/cve/CVE-2019-14200/" source="CVE"/>
		<reference ref_id="CVE-2019-14201" ref_url="https://www.suse.com/security/cve/CVE-2019-14201/" source="CVE"/>
		<reference ref_id="CVE-2019-14202" ref_url="https://www.suse.com/security/cve/CVE-2019-14202/" source="CVE"/>
		<reference ref_id="CVE-2019-14203" ref_url="https://www.suse.com/security/cve/CVE-2019-14203/" source="CVE"/>
		<reference ref_id="CVE-2019-14204" ref_url="https://www.suse.com/security/cve/CVE-2019-14204/" source="CVE"/>
		<reference ref_id="CVE-2019-14299" ref_url="https://www.suse.com/security/cve/CVE-2019-14299/" source="CVE"/>
		<reference ref_id="CVE-2020-10648" ref_url="https://www.suse.com/security/cve/CVE-2020-10648/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007831.html" source="SUSE-SU"/>
		<description>
This update for u-boot fixes the following issues:

Work around CVE-2019-11059 by disabling 64Bit descritptor size (bsc#1134853)

CVE-2019-11690 (bsc#1134157), CVE-2020-10648 (bsc#1167209), CVE-2019-13103 (bsc#1143463),
CVE-2019-14197 (bsc#1143821), CVE-2019-14200 (bsc#1143825), CVE-2019-14201 (bsc#1143827),
CVE-2019-14202 (bsc#1143828), CVE-2019-14203 (bsc#1143830), CVE-2019-14204 (bsc#1143831),
CVE-2019-14194 (bsc#1143818), CVE-2019-14198 (bsc#1143823), CVE-2019-14195 (bsc#1143819),
CVE-2019-14196 (bsc#1143820), CVE-2019-14299 (bsc#1143824), CVE-2019-14192 (bsc#1143777),
CVE-2019-14193 (bsc#1143817).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-20"/>
	<updated date="2020-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1134157">SUSE bug 1134157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134853">SUSE bug 1134853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143463">SUSE bug 1143463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143777">SUSE bug 1143777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143817">SUSE bug 1143817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143818">SUSE bug 1143818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143819">SUSE bug 1143819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143820">SUSE bug 1143820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143821">SUSE bug 1143821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143823">SUSE bug 1143823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143824">SUSE bug 1143824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143825">SUSE bug 1143825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143827">SUSE bug 1143827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143828">SUSE bug 1143828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143830">SUSE bug 1143830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143831">SUSE bug 1143831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167209">SUSE bug 1167209</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-11059/">CVE-2019-11059 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11059">CVE-2019-11059 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11690/">CVE-2019-11690 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11690">CVE-2019-11690 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-13103/">CVE-2019-13103 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13103">CVE-2019-13103 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14192/">CVE-2019-14192 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14192">CVE-2019-14192 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14193/">CVE-2019-14193 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14193">CVE-2019-14193 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14194/">CVE-2019-14194 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14194">CVE-2019-14194 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14195/">CVE-2019-14195 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14195">CVE-2019-14195 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14196/">CVE-2019-14196 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14196">CVE-2019-14196 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14197/">CVE-2019-14197 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14197">CVE-2019-14197 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14198/">CVE-2019-14198 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14198">CVE-2019-14198 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14200/">CVE-2019-14200 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14200">CVE-2019-14200 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14201/">CVE-2019-14201 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14201">CVE-2019-14201 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14202/">CVE-2019-14202 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14202">CVE-2019-14202 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14203/">CVE-2019-14203 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14203">CVE-2019-14203 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14204/">CVE-2019-14204 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14204">CVE-2019-14204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14299/">CVE-2019-14299 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14299">CVE-2019-14299 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10648/">CVE-2020-10648 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10648">CVE-2020-10648 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555224" comment="u-boot-rpi3-2016.07-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555225" comment="u-boot-tools-2016.07-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150133" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007833.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

Upgrade to version 9.6.20:

  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/9.6/release-9-6-20.html

Changes from 9.6.19:

  * CVE-2020-14350, bsc#1175194: Make contrib modules installation
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555226" comment="postgresql96-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555227" comment="postgresql96-contrib-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531601" comment="postgresql96-docs-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555228" comment="postgresql96-plperl-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555229" comment="postgresql96-plpython-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555230" comment="postgresql96-pltcl-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555231" comment="postgresql96-server-9.6.20-6.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150134" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1083244" ref_url="https://bugzilla.suse.com/1083244" source="BUGZILLA"/>
		<reference ref_id="1121826" ref_url="https://bugzilla.suse.com/1121826" source="BUGZILLA"/>
		<reference ref_id="1121872" ref_url="https://bugzilla.suse.com/1121872" source="BUGZILLA"/>
		<reference ref_id="1157298" ref_url="https://bugzilla.suse.com/1157298" source="BUGZILLA"/>
		<reference ref_id="1160917" ref_url="https://bugzilla.suse.com/1160917" source="BUGZILLA"/>
		<reference ref_id="1170415" ref_url="https://bugzilla.suse.com/1170415" source="BUGZILLA"/>
		<reference ref_id="1175228" ref_url="https://bugzilla.suse.com/1175228" source="BUGZILLA"/>
		<reference ref_id="1175306" ref_url="https://bugzilla.suse.com/1175306" source="BUGZILLA"/>
		<reference ref_id="1175721" ref_url="https://bugzilla.suse.com/1175721" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1176011" ref_url="https://bugzilla.suse.com/1176011" source="BUGZILLA"/>
		<reference ref_id="1176069" ref_url="https://bugzilla.suse.com/1176069" source="BUGZILLA"/>
		<reference ref_id="1176235" ref_url="https://bugzilla.suse.com/1176235" source="BUGZILLA"/>
		<reference ref_id="1176253" ref_url="https://bugzilla.suse.com/1176253" source="BUGZILLA"/>
		<reference ref_id="1176278" ref_url="https://bugzilla.suse.com/1176278" source="BUGZILLA"/>
		<reference ref_id="1176381" ref_url="https://bugzilla.suse.com/1176381" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176423" ref_url="https://bugzilla.suse.com/1176423" source="BUGZILLA"/>
		<reference ref_id="1176482" ref_url="https://bugzilla.suse.com/1176482" source="BUGZILLA"/>
		<reference ref_id="1176721" ref_url="https://bugzilla.suse.com/1176721" source="BUGZILLA"/>
		<reference ref_id="1176722" ref_url="https://bugzilla.suse.com/1176722" source="BUGZILLA"/>
		<reference ref_id="1176725" ref_url="https://bugzilla.suse.com/1176725" source="BUGZILLA"/>
		<reference ref_id="1176816" ref_url="https://bugzilla.suse.com/1176816" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176990" ref_url="https://bugzilla.suse.com/1176990" source="BUGZILLA"/>
		<reference ref_id="1177027" ref_url="https://bugzilla.suse.com/1177027" source="BUGZILLA"/>
		<reference ref_id="1177086" ref_url="https://bugzilla.suse.com/1177086" source="BUGZILLA"/>
		<reference ref_id="1177121" ref_url="https://bugzilla.suse.com/1177121" source="BUGZILLA"/>
		<reference ref_id="1177165" ref_url="https://bugzilla.suse.com/1177165" source="BUGZILLA"/>
		<reference ref_id="1177206" ref_url="https://bugzilla.suse.com/1177206" source="BUGZILLA"/>
		<reference ref_id="1177226" ref_url="https://bugzilla.suse.com/1177226" source="BUGZILLA"/>
		<reference ref_id="1177410" ref_url="https://bugzilla.suse.com/1177410" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177511" ref_url="https://bugzilla.suse.com/1177511" source="BUGZILLA"/>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="1177725" ref_url="https://bugzilla.suse.com/1177725" source="BUGZILLA"/>
		<reference ref_id="1177766" ref_url="https://bugzilla.suse.com/1177766" source="BUGZILLA"/>
		<reference ref_id="1177816" ref_url="https://bugzilla.suse.com/1177816" source="BUGZILLA"/>
		<reference ref_id="1178123" ref_url="https://bugzilla.suse.com/1178123" source="BUGZILLA"/>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178782" ref_url="https://bugzilla.suse.com/1178782" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18204" ref_url="https://www.suse.com/security/cve/CVE-2017-18204/" source="CVE"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-25641" ref_url="https://www.suse.com/security/cve/CVE-2020-25641/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bug fixes.


The following security bugs were fixed:

- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-25212: Fixed A TOCTOU mismatch in the NFS client code which could have been used by local attackers to corrupt memory (bsc#1176381).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).
- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2019-19063: Fixed two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c, which could have allowed an attacker to cause a denial of service (memory consumption) (bsc#1157298).
- CVE-2019-6133: In PolicyKit (aka polkit), the 'start time' protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c (bsc#1121872).
- CVE-2017-18204: Fixed a denial of service in the ocfs2_setattr function of fs/ocfs2/file.c (bnc#1083244).

The following non-security bugs were fixed:

- hv: vmbus: Add timeout to vmbus_wait_for_unload (bsc#1177816).
- hyperv_fb: disable superfluous VERSION_WIN10_V5 case (bsc#1175306).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1176816).
- net/packet: fix overflow in tpacket_rcv (bsc#1176069).
- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083244">SUSE bug 1083244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121872">SUSE bug 1121872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157298">SUSE bug 1157298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160917">SUSE bug 1160917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175228">SUSE bug 1175228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175306">SUSE bug 1175306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176011">SUSE bug 1176011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176253">SUSE bug 1176253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176721">SUSE bug 1176721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176725">SUSE bug 1176725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176816">SUSE bug 1176816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176990">SUSE bug 1176990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177027">SUSE bug 1177027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177086">SUSE bug 1177086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177121">SUSE bug 1177121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177165">SUSE bug 1177165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177226">SUSE bug 1177226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177410">SUSE bug 1177410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177725">SUSE bug 1177725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177816">SUSE bug 1177816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178782">SUSE bug 1178782</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18204/">CVE-2017-18204 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18204">CVE-2017-18204 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19063">CVE-2019-19063 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6133">CVE-2019-6133 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0404">CVE-2020-0404 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0427">CVE-2020-0427 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0432">CVE-2020-0432 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12352">CVE-2020-12352 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14351">CVE-2020-14351 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14390">CVE-2020-14390 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25284">CVE-2020-25284 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25641/">CVE-2020-25641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25641">CVE-2020-25641 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25643">CVE-2020-25643 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25656">CVE-2020-25656 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26088">CVE-2020-26088 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555232" comment="kernel-default-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555233" comment="kernel-default-base-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555234" comment="kernel-default-devel-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538783" comment="kernel-default-kgraft-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555235" comment="kernel-default-man-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538784" comment="kernel-devel-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538785" comment="kernel-macros-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538786" comment="kernel-source-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555236" comment="kernel-syms-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538788" comment="kgraft-patch-4_4_180-94_135-default-1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150135" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173592" ref_url="https://bugzilla.suse.com/1173592" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="1178971" ref_url="https://bugzilla.suse.com/1178971" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated Intel CPU Microcode to 20201118 official release. (bsc#1178971)
 - Removed TGL/06-8c-01/80 due to functional issues with some OEM platforms.
 - CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) INTEL-SA-00389 (bsc#1170446)
 - CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)
 - CVE-2020-8696: Vector Register Sampling Active INTEL-SA-00381 (bsc#1173592)

- Release notes:
  - Security updates for [INTEL-SA-00381](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html).
  - Security updates for [INTEL-SA-00389](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html).
  - Update for functional issues. Refer to [Second Generation Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
  - Update for functional issues. Refer to [10th Gen Intel? Core™ Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
  - Update for functional issues. Refer to [8th and 9th Gen Intel? Core™ Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
  - Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel? Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
  - Update for functional issues. Refer to [6th Gen Intel? Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

  ### New Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | LKF            | B2/B3    | 06-8a-01/10 |          | 00000028 | Core w/Hybrid Technology
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  ### Updated Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173592">SUSE bug 1173592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178971">SUSE bug 1178971</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8696">CVE-2020-8696 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531614" comment="ucode-intel-20201118-13.81.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150136" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1166751" ref_url="https://bugzilla.suse.com/1166751" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0556" ref_url="https://www.suse.com/security/cve/CVE-2020-0556/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007858.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2020-0556: Fixed improper access control which may lead to escalation of privilege and denial of service by an unauthenticated user (bsc#1166751).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166751">SUSE bug 1166751</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-0556/">CVE-2020-0556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0556">CVE-2020-0556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555237" comment="bluez-5.13-5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555238" comment="libbluetooth3-5.13-5.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150137" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178824" ref_url="https://bugzilla.suse.com/1178824" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.5.0 ESR (bsc#1178824)
  * CVE-2020-26951: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code
  * CVE-2020-16012: Variable time processing of cross-origin images during drawImage calls
  * CVE-2020-26953: Fullscreen could be enabled without displaying the security UI
  * CVE-2020-26956: XSS through paste (manual and clipboard API)
  * CVE-2020-26958: Requests intercepted through ServiceWorkers lacked MIME type restrictions
  * CVE-2020-26959: Use-after-free in WebRequestService
  * CVE-2020-26960: Potential use-after-free in uses of nsTArray
  * CVE-2020-15999: Heap buffer overflow in freetype
  * CVE-2020-26961: DoH did not filter IPv4 mapped IP Addresses
  * CVE-2020-26965: Software keyboards may have remembered typed passwords
  * CVE-2020-26966: Single-word search queries were also broadcast to local network
  * CVE-2020-26968: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-27"/>
	<updated date="2020-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16012">CVE-2020-16012 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26951">CVE-2020-26951 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26953">CVE-2020-26953 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26956">CVE-2020-26956 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26958">CVE-2020-26958 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26959">CVE-2020-26959 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26960">CVE-2020-26960 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26961">CVE-2020-26961 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26965">CVE-2020-26965 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26966">CVE-2020-26966 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26968">CVE-2020-26968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555239" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543047" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555240" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150138" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178682" ref_url="https://bugzilla.suse.com/1178682" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007885.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2020-25708 [bsc#1178682], libvncserver/rfbserver.c has a divide by zero which could result in DoS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-27"/>
	<updated date="2020-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178682">SUSE bug 1178682</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25708">CVE-2020-25708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555241" comment="libvncclient0-0.9.9-17.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555242" comment="libvncserver0-0.9.9-17.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150139" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1174908" ref_url="https://bugzilla.suse.com/1174908" source="BUGZILLA"/>
		<reference ref_id="1177596" ref_url="https://bugzilla.suse.com/1177596" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007901.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to privilege escalation (bsc#1177596).
- CVE-2020-14360: Fixed an out of bounds memory accesses on too short request which could lead to denial of service (bsc#1174908).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14360">CVE-2020-14360 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25712">CVE-2020-25712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555243" comment="xorg-x11-server-7.6_1.18.3-76.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555244" comment="xorg-x11-server-extra-7.6_1.18.3-76.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150140" version="1" class="patch">
	<metadata>
		<title>Security update for python-setuptools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007907.html" source="SUSE-SU"/>
		<description>
This update for python-setuptools fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009524556" comment="python-setuptools-40.6.2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525277" comment="python3-setuptools-40.6.2-4.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150141" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007903.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009529567" comment="libpython3_4m1_0-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009529568" comment="python3-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009529569" comment="python3-base-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009529570" comment="python3-curses-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543051" comment="python3-devel-3.4.10-25.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150142" version="1" class="patch">
	<metadata>
		<title>Security update for gdm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178150" ref_url="https://bugzilla.suse.com/1178150" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16125" ref_url="https://www.suse.com/security/cve/CVE-2020-16125/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007912.html" source="SUSE-SU"/>
		<description>
This update for gdm fixes the following issues:

- CVE-2020-16125: Fixed a privilege escalation (bsc#1178150).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178150">SUSE bug 1178150</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16125/">CVE-2020-16125 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16125">CVE-2020-16125 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555245" comment="gdm-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531630" comment="gdm-lang-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531631" comment="gdmflexiserver-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555246" comment="libgdm1-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555247" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150143" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178168" ref_url="https://bugzilla.suse.com/1178168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007919.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-25659: Attempted to mitigate Bleichenbacher attacks on RSA decryption (bsc#1178168).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178168">SUSE bug 1178168</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25659">CVE-2020-25659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555248" comment="python-cryptography-2.1.4-7.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555249" comment="python3-cryptography-2.1.4-7.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150144" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<description>

This update for postgresql12 fixes the following issues:

Upgrade to version 12.5:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/12/release-12-5.html

The previous postgresql12 update already addressed:

Update to 12.4:

* CVE-2020-14349, bsc#1175193: Set a secure search_path in logical replication walsenders and apply workers
* CVE-2020-14350, bsc#1175194: Make contrib modules' installation scripts more secure.

* https://www.postgresql.org/docs/12/release-12-4.html

  		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14349">CVE-2020-14349 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555250" comment="libecpg6-12.5-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555251" comment="libpq5-12.5-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551980" comment="libpq5-32bit-12.5-3.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150145" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1177409" ref_url="https://bugzilla.suse.com/1177409" source="BUGZILLA"/>
		<reference ref_id="1177412" ref_url="https://bugzilla.suse.com/1177412" source="BUGZILLA"/>
		<reference ref_id="1177413" ref_url="https://bugzilla.suse.com/1177413" source="BUGZILLA"/>
		<reference ref_id="1177414" ref_url="https://bugzilla.suse.com/1177414" source="BUGZILLA"/>
		<reference ref_id="1178591" ref_url="https://bugzilla.suse.com/1178591" source="BUGZILLA"/>
		<reference ref_id="1178963" ref_url="https://bugzilla.suse.com/1178963" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674/" source="CVE"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1178963 - stack corruption from XSA-346 change (XSA-355) 
- bsc#1177409 - CVE-2020-27674: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286)
- bsc#1177412 - CVE-2020-27672: Race condition in Xen mapping code (XSA-345)
- bsc#1177413 - CVE-2020-27671: undue deferral of IOMMU TLB flushes (XSA-346)
- bsc#1177414 - CVE-2020-27670: unsafe AMD IOMMU page table updates (XSA-347)
- bsc#1178591 - CVE-2020-28368: Intel RAPL sidechannel attack aka PLATYPUS attack aka XSA-351
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177413">SUSE bug 1177413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178963">SUSE bug 1178963</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27670">CVE-2020-27670 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27671">CVE-2020-27671 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27672">CVE-2020-27672 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27674">CVE-2020-27674 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28368">CVE-2020-28368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538789" comment="xen-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538790" comment="xen-doc-html-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538791" comment="xen-libs-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538792" comment="xen-libs-32bit-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538793" comment="xen-tools-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538794" comment="xen-tools-domU-4.9.4_14-3.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150146" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1179035" ref_url="https://bugzilla.suse.com/1179035" source="BUGZILLA"/>
		<reference ref_id="1179113" ref_url="https://bugzilla.suse.com/1179113" source="BUGZILLA"/>
		<reference ref_id="1179461" ref_url="https://bugzilla.suse.com/1179461" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007921.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- Find and display the content of messages properly. (bsc#1179461)
- CVE-2020-28896: incomplete connection termination could send credentials over unencrypted connections. (bsc#1179035)
- Avoid that message with a million tiny parts can freeze MUA for several minutes. (bsc#1179113)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179035">SUSE bug 1179035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179113">SUSE bug 1179113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179461">SUSE bug 1179461</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28896">CVE-2020-28896 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555252" comment="mutt-1.10.1-55.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150147" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_113 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721279" comment="kernel-default 4.4.180-94.113 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719606" comment="kgraft-patch-4_4_180-94_113-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538795" comment="kgraft-patch-4_4_180-94_113-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150148" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_116 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721281" comment="kernel-default 4.4.180-94.116 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719610" comment="kgraft-patch-4_4_180-94_116-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538796" comment="kgraft-patch-4_4_180-94_116-default-6-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150149" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_121 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721282" comment="kernel-default 4.4.180-94.121 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719612" comment="kgraft-patch-4_4_180-94_121-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538797" comment="kgraft-patch-4_4_180-94_121-default-5-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150150" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_124 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721283" comment="kernel-default 4.4.180-94.124 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719614" comment="kgraft-patch-4_4_180-94_124-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538798" comment="kgraft-patch-4_4_180-94_124-default-5-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150151" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538799" comment="kgraft-patch-4_4_180-94_127-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150152" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538800" comment="kgraft-patch-4_4_180-94_130-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150153" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007925.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177513).
- CVE-2020-0429: Fixed a memory corruption due to a use after free which could have led to to local privilege escalation (bsc#1176931).
- CVE-2020-11668: Fixed an issue where the Xirlink camera USB driver mishandled invalid descriptors (bsc#1173942).
- CVE-2020-1749: Use ip6_dst_lookup_flow instead of  ip6_dst_lookup (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538801" comment="kgraft-patch-4_4_180-94_135-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150154" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1137832" ref_url="https://bugzilla.suse.com/1137832" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<description>
This update for dbus-1 fixes the following issues:
	  
Security issue fixed:     
    
- CVE-2019-12749: Fixed an implementation flaw in DBUS_COOKIE_SHA1 which 
  could have allowed local attackers to bypass authentication (bsc#1137832).   
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-18"/>
	<updated date="2020-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12749">CVE-2019-12749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555253" comment="dbus-1-1.8.22-29.17.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555254" comment="dbus-1-x11-1.8.22-29.17.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555255" comment="libdbus-1-3-1.8.22-29.17.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555256" comment="libdbus-1-3-32bit-1.8.22-29.17.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150155" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1179491" ref_url="https://bugzilla.suse.com/1179491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007976.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2020-1971: Fixed a null pointer dereference in EDIPARTYNAME (bsc#1179491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">CVE-2020-1971 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555257" comment="libopenssl-devel-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555258" comment="libopenssl1_0_0-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551984" comment="libopenssl1_0_0-32bit-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555259" comment="libopenssl1_0_0-hmac-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551986" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555260" comment="openssl-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531652" comment="openssl-doc-1.0.2j-60.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150156" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007975.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555261" comment="libpython2_7-1_0-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551989" comment="libpython2_7-1_0-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555262" comment="python-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551991" comment="python-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555263" comment="python-base-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551993" comment="python-base-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555264" comment="python-curses-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555265" comment="python-demo-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555266" comment="python-devel-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531662" comment="python-doc-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531663" comment="python-doc-pdf-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555267" comment="python-gdbm-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555268" comment="python-idle-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555269" comment="python-tk-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555270" comment="python-xml-2.7.17-28.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150157" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1161799" ref_url="https://bugzilla.suse.com/1161799" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.5.0 ESR
  * CVE-2020-6796 (bmo#1610426)
    Missing bounds check on shared memory read in the parent
    process
  * CVE-2020-6797 (bmo#1596668)
    Extensions granted downloads.open permission could open
    arbitrary applications on Mac OSX
  * CVE-2020-6798 (bmo#1602944)
    Incorrect parsing of template tag could result in JavaScript
    injection
  * CVE-2020-6799 (bmo#1606596)
    Arbitrary code execution when opening pdf links from other
    applications, when Firefox is configured as default pdf
    reader
  * CVE-2020-6800 (bmo#1595786, bmo#1596706, bmo#1598543,
    bmo#1604851, bmo#1605777, bmo#1608580, bmo#1608785)
    Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
  * Fixed: Fixed various issues opening files with spaces in
    their path (bmo#1601905, bmo#1602726)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-17"/>
	<updated date="2020-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161799">SUSE bug 1161799</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6796">CVE-2020-6796 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6797">CVE-2020-6797 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6798">CVE-2020-6798 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6799">CVE-2020-6799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6800">CVE-2020-6800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555271" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555272" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150158" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1180039" ref_url="https://bugzilla.suse.com/1180039" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2020-55 (bsc#1180039)
  * CVE-2020-16042 (bmo#1679003)
    Operations on a BigInt could have caused uninitialized memory
    to be exposed
  * CVE-2020-26971 (bmo#1663466)
    Heap buffer overflow in WebGL
  * CVE-2020-26973 (bmo#1680084)
    CSS Sanitizer performed incorrect sanitization
  * CVE-2020-26974 (bmo#1681022)
    Incorrect cast of StyleGenericFlexBasis resulted in a heap
    use-after-free
  * CVE-2020-26978 (bmo#1677047)
    Internal network hosts could have been probed by a malicious
    webpage
  * CVE-2020-35111 (bmo#1657916)
    The proxy.onRequest API did not catch view-source URLs
  * CVE-2020-35112 (bmo#1661365)
    Opening an extension-less download may have inadvertently
    launched an executable instead
  * CVE-2020-35113 (bmo#1664831, bmo#1673589)
    Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16042">CVE-2020-16042 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26971">CVE-2020-26971 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26973">CVE-2020-26973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26974">CVE-2020-26974 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26978">CVE-2020-26978 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35111">CVE-2020-35111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35112">CVE-2020-35112 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35113">CVE-2020-35113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555273" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543065" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555274" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150159" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1118459" ref_url="https://bugzilla.suse.com/1118459" source="BUGZILLA"/>
		<reference ref_id="1119353" ref_url="https://bugzilla.suse.com/1119353" source="BUGZILLA"/>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="1171981" ref_url="https://bugzilla.suse.com/1171981" source="BUGZILLA"/>
		<reference ref_id="1174250" ref_url="https://bugzilla.suse.com/1174250" source="BUGZILLA"/>
		<reference ref_id="1174255" ref_url="https://bugzilla.suse.com/1174255" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123/" source="CVE"/>
		<reference ref_id="CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327/" source="CVE"/>
		<reference ref_id="CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341/" source="CVE"/>
		<reference ref_id="CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350/" source="CVE"/>
		<reference ref_id="CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

clamav was updated to 0.103.0 to implement jsc#ECO-3010 and bsc#1118459.

* clamd can now reload the signature database without blocking
  scanning. This multi-threaded database reload improvement was made
  possible thanks to a community effort.
  - Non-blocking database reloads are now the default behavior. Some
    systems that are more constrained on RAM may need to disable
    non-blocking reloads as it will temporarily consume two times as
    much memory. We added a new clamd config option
    ConcurrentDatabaseReload, which may be set to no.
* Fix clamav-milter.service (requires clamd.service to run)
* bsc#1119353, clamav-fips.patch: Fix freshclam crash in FIPS mode.
* Partial sync with SLE15.

Update to version 0.102.4

Accumulated security fixes:

* CVE-2020-3350: Fix a vulnerability wherein a malicious user could
  replace a scan target's directory with a symlink to another path
  to trick clamscan, clamdscan, or clamonacc into removing or moving
  a different file (eg. a critical system file). The issue would
  affect users that use the --move or --remove options for clamscan,
  clamdscan, and clamonacc. (bsc#1174255)
* CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
  module in ClamAV 0.102.3 that could cause a Denial-of-Service
  (DoS) condition. Improper bounds checking results in an
  out-of-bounds read which could cause a crash. The previous fix for
  this CVE in 0.102.3 was incomplete. This fix correctly resolves
  the issue.
* CVE-2020-3481: Fix a vulnerability in the EGG archive module in
  ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)
  condition. Improper error handling may result in a crash due to a
  NULL pointer dereference. This vulnerability is mitigated for
  those using the official ClamAV signature databases because the
  file type signatures in daily.cvd will not enable the EGG archive
  parser in versions affected by the vulnerability. (bsc#1174250)
* CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
  ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
  condition. Improper size checking of a buffer used to initialize AES
  decryption routines results in an out-of-bounds read which may cause
  a crash. (bsc#1171981)
* CVE-2020-3123: A denial-of-service (DoS) condition may occur when
  using the optional credit card data-loss-prevention (DLP) feature.
  Improper bounds checking of an unsigned variable resulted in an
  out-of-bounds read, which causes a crash.
* CVE-2019-15961: A Denial-of-Service (DoS) vulnerability may
  occur when scanning a specially crafted email file as a result
  of excessively long scan times. The issue is resolved by
  implementing several maximums in parsing MIME messages and by
  optimizing use of memory allocation. (bsc#1157763).
* CVE-2019-12900: An out of bounds write in the NSIS bzip2
  (bsc#1149458)
* CVE-2019-12625: Introduce a configurable time limit to mitigate
  zip bomb vulnerability completely. Default is 2 minutes,
  configurable useing the clamscan --max-scantime and for clamd
  using the MaxScanTime config option (bsc#1144504)

Update to version 0.101.3:

* ZIP bomb causes extreme CPU spikes (bsc#1144504)

Update to version 0.101.2 (bsc#1118459):

* Support for RAR v5 archive extraction.
* Incompatible changes to the arguments of cl_scandesc,
  cl_scandesc_callback, and cl_scanmap_callback.
* Scanning options have been converted from a single flag
  bit-field into a structure of multiple categorized flag
  bit-fields.
* The CL_SCAN_HEURISTIC_ENCRYPTED scan option was replaced by
  2 new scan options: CL_SCAN_HEURISTIC_ENCRYPTED_ARCHIVE, and
  CL_SCAN_HEURISTIC_ENCRYPTED_DOC
* Incompatible clamd.conf and command line interface changes.
* Heuristic Alerts' (aka 'Algorithmic Detection') options have
  been changed to make the names more consistent. The original
  options are deprecated in 0.101, and will be removed in a
  future feature release.
* For details, see https://blog.clamav.net/2018/12/clamav-01010-has-been-released.html		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118459">SUSE bug 1118459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119353">SUSE bug 1119353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171981">SUSE bug 1171981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174255">SUSE bug 1174255</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15961">CVE-2019-15961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3123">CVE-2020-3123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3327">CVE-2020-3327 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3341">CVE-2020-3341 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3350">CVE-2020-3350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3481">CVE-2020-3481 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555275" comment="clamav-0.103.0-33.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150160" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1159635" ref_url="https://bugzilla.suse.com/1159635" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008123.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2019-19906: Fixed an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet (bsc#1159635).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-28"/>
	<updated date="2020-12-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159635">SUSE bug 1159635</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19906">CVE-2019-19906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555276" comment="cyrus-sasl-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552013" comment="cyrus-sasl-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555277" comment="cyrus-sasl-crammd5-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552015" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555278" comment="cyrus-sasl-digestmd5-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555279" comment="cyrus-sasl-gssapi-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552018" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555280" comment="cyrus-sasl-otp-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552020" comment="cyrus-sasl-otp-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555281" comment="cyrus-sasl-plain-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552022" comment="cyrus-sasl-plain-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555282" comment="libsasl2-3-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552024" comment="libsasl2-3-32bit-2.1.26-8.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150161" version="1" class="patch">
	<metadata>
		<title>Security update for gcc9 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1114592" ref_url="https://bugzilla.suse.com/1114592" source="BUGZILLA"/>
		<reference ref_id="1135254" ref_url="https://bugzilla.suse.com/1135254" source="BUGZILLA"/>
		<reference ref_id="1141897" ref_url="https://bugzilla.suse.com/1141897" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1142654" ref_url="https://bugzilla.suse.com/1142654" source="BUGZILLA"/>
		<reference ref_id="1148517" ref_url="https://bugzilla.suse.com/1148517" source="BUGZILLA"/>
		<reference ref_id="1149145" ref_url="https://bugzilla.suse.com/1149145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-15847" ref_url="https://www.suse.com/security/cve/CVE-2019-15847/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006488.html" source="SUSE-SU"/>
		<description>
This update for gcc9 fixes the following issues:

The GNU Compiler Collection is shipped in version 9.

A detailed changelog on what changed in GCC 9 is available at https://gcc.gnu.org/gcc-9/changes.html

The compilers have been added to the SUSE Linux Enterprise Toolchain Module.

To use these compilers, install e.g. gcc9, gcc9-c++ and build with CC=gcc-9
CXX=g++-9 set.


For SUSE Linux Enterprise base products, the libstdc++6, libgcc_s1 and
other compiler libraries have been switched from their gcc8 variants to
their gcc9 variants.

Security issues fixed:

- CVE-2019-15847: Fixed a miscompilation in the POWER9 back end, that optimized multiple calls of the __builtin_darn intrinsic into a single call. (bsc#1149145)
- CVE-2019-14250: Fixed a heap overflow in the LTO linker. (bsc#1142649)

Non-security issues fixed:

- Split out libstdc++ pretty-printers into a separate package supplementing gdb and the installed runtime. (bsc#1135254)
- Fixed miscompilation for vector shift on s390. (bsc#1141897)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-14"/>
	<updated date="2020-04-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114592">SUSE bug 1114592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135254">SUSE bug 1135254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141897">SUSE bug 1141897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142654">SUSE bug 1142654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148517">SUSE bug 1148517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149145">SUSE bug 1149145</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14250">CVE-2019-14250 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15847/">CVE-2019-15847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15847">CVE-2019-15847 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555283" comment="libasan5-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549031" comment="libasan5-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555284" comment="libatomic1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549033" comment="libatomic1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555285" comment="libgcc_s1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549035" comment="libgcc_s1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555286" comment="libgfortran5-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549037" comment="libgfortran5-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555287" comment="libgo14-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549039" comment="libgo14-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555288" comment="libgomp1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549041" comment="libgomp1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555289" comment="libitm1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549043" comment="libitm1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555290" comment="liblsan0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537987" comment="libquadmath0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531716" comment="libquadmath0-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555291" comment="libstdc++6-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549045" comment="libstdc++6-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555292" comment="libstdc++6-locale-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555293" comment="libtsan0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555294" comment="libubsan1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549048" comment="libubsan1-32bit-9.2.1+r275327-1.3.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150162" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1176782" ref_url="https://bugzilla.suse.com/1176782" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1179496" ref_url="https://bugzilla.suse.com/1179496" source="BUGZILLA"/>
		<reference ref_id="1179498" ref_url="https://bugzilla.suse.com/1179498" source="BUGZILLA"/>
		<reference ref_id="1179501" ref_url="https://bugzilla.suse.com/1179501" source="BUGZILLA"/>
		<reference ref_id="1179502" ref_url="https://bugzilla.suse.com/1179502" source="BUGZILLA"/>
		<reference ref_id="1179506" ref_url="https://bugzilla.suse.com/1179506" source="BUGZILLA"/>
		<reference ref_id="1179514" ref_url="https://bugzilla.suse.com/1179514" source="BUGZILLA"/>
		<reference ref_id="1179516" ref_url="https://bugzilla.suse.com/1179516" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480/" source="CVE"/>
		<reference ref_id="CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481/" source="CVE"/>
		<reference ref_id="CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483/" source="CVE"/>
		<reference ref_id="CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484/" source="CVE"/>
		<reference ref_id="CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566/" source="CVE"/>
		<reference ref_id="CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570/" source="CVE"/>
		<reference ref_id="CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-29480: Fixed an issue which could have allowed leak of non-sensitive data to administrator guests (bsc#117949 XSA-115).
- CVE-2020-29481: Fixed an issue which could have allowd to new domains to inherit existing node permissions (bsc#1179498 XSA-322). 
- CVE-2020-29483: Fixed an issue where guests could disturb domain cleanup (bsc#1179502 XSA-325).
- CVE-2020-29484: Fixed an issue where guests could crash xenstored via watchs (bsc#1179501 XSA-324). 
- CVE-2020-29566: Fixed an undue recursion in x86 HVM context switch code (bsc#1179506 XSA-348).
- CVE-2020-29570: Fixed an issue where FIFO event channels control block related ordering (bsc#1179514 XSA-358).
- CVE-2020-29571: Fixed an issue where FIFO event channels control structure ordering (bsc#1179516 XSA-359).
- CVE-2020-29130: Fixed an out-of-bounds access while processing ARP packets (bsc#1179477). 
- Fixed an issue where dump-core shows missing nr_pages during core (bsc#1176782).
- Multiple other bugs (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-29"/>
	<updated date="2020-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176782">SUSE bug 1176782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179496">SUSE bug 1179496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179498">SUSE bug 1179498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179501">SUSE bug 1179501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179502">SUSE bug 1179502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179506">SUSE bug 1179506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179514">SUSE bug 1179514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179516">SUSE bug 1179516</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29480">CVE-2020-29480 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29481">CVE-2020-29481 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29483">CVE-2020-29483 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29484">CVE-2020-29484 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29566">CVE-2020-29566 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29570">CVE-2020-29570 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29571">CVE-2020-29571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538805" comment="xen-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538806" comment="xen-doc-html-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538807" comment="xen-libs-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538808" comment="xen-libs-32bit-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538809" comment="xen-tools-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538810" comment="xen-tools-domU-4.9.4_16-3.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150163" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1162202" ref_url="https://bugzilla.suse.com/1162202" source="BUGZILLA"/>
		<reference ref_id="1162675" ref_url="https://bugzilla.suse.com/1162675" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006491.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

Security issue fixed:

- CVE-2019-18634: Fixed a buffer overflow in the passphrase prompt that could occur when pwfeedback was enabled in /etc/sudoers (bsc#1162202).

Non-security issue fixed:

- Fixed an issue where sudo -l would ask for a password even though `listpw` was set to `never` (bsc#1162675).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-19"/>
	<updated date="2020-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162202">SUSE bug 1162202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162675">SUSE bug 1162675</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18634">CVE-2019-18634 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555295" comment="sudo-1.8.20p2-3.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150164" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Java was updated to 7.1 Service Refresh 4 Fix Pack 60 [bsc#1162972, bsc#1160968].

Security issues fixed:

- CVE-2020-2583: Fixed a serialization vulnerability in BeanContextSupport (bsc#1162972).
- CVE-2020-2593: Fixed an incorrect check in isBuiltinStreamHandler, causing URL normalization issues (bsc#1162972).
- CVE-2020-2604: Fixed a serialization issue in jdk.serialFilter (bsc#1162972).
- CVE-2020-2659: Fixed the incomplete enforcement of the maxDatagramSockets limit in DatagramChannelImpl (bsc#1162972).

Non-security issues fixed:

* Class Libraries:
  IJ22333 HANG IN JAVA_JAVA_NET_SOCKETINPUTSTREAM_SOCKETREAD0 EVEN
          WHEN TIMEOUT IS SET
  IJ22350 JAVA 7 AND JAVA 8 NOT WORKING WELL WITH TRADITIONAL/SIMPLIFIED
          CHINESE EDITION OF WINDOWS CLIENT SYSTEM
  IJ22337 THE NAME OF THE REPUBLIC OF BELARUS IN THE RUSSIAN LOCALE
          INCONSISTENT WITH CLDR
  IJ22349 UPDATE TIMEZONE INFORMATION TO TZDATA2019C
* JIT Compiler:
  IJ11368 JAVA JIT PPC: CRASH IN JIT COMPILED CODE ON PPC MACHINES
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-07"/>
	<updated date="2020-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549059" comment="java-1_7_1-ibm-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531725" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542713" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549060" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531728" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-38.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150165" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006521.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20030">CVE-2018-20030 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9278">CVE-2019-9278 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555296" comment="libexif12-0.6.21-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549062" comment="libexif12-32bit-0.6.21-8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150166" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1158809" ref_url="https://bugzilla.suse.com/1158809" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006529.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issue fixed:

- CVE-2019-1551: Fixed an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli (bsc#1158809).

Non-security issue fixed:

- Fixed a crash in BN_copy (bsc#1160163).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158809">SUSE bug 1158809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1551">CVE-2019-1551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555297" comment="libopenssl-devel-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555298" comment="libopenssl1_0_0-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552028" comment="libopenssl1_0_0-32bit-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555299" comment="libopenssl1_0_0-hmac-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552030" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555300" comment="openssl-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531735" comment="openssl-doc-1.0.2j-60.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150167" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1162610" ref_url="https://bugzilla.suse.com/1162610" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006533.html" source="SUSE-SU"/>
		<description>
This update for ppp fixes the following security issue:

- CVE-2020-8597: Fixed a buffer overflow in the eap_request and eap_response functions (bsc#1162610).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-26"/>
	<updated date="2020-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162610">SUSE bug 1162610</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8597">CVE-2020-8597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555301" comment="ppp-2.4.7-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150168" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="1159208" ref_url="https://bugzilla.suse.com/1159208" source="BUGZILLA"/>
		<reference ref_id="1159623" ref_url="https://bugzilla.suse.com/1159623" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-4472" ref_url="https://www.suse.com/security/cve/CVE-2016-4472/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Update to 3.4.10 (jsc#SLE-9427, bsc#1159208) from 3.4.6:

Security issues fixed:

- Update expat copy from 2.1.1 to 2.2.0 to fix the following issues:
  CVE-2012-0876, CVE-2016-0718, CVE-2016-4472, CVE-2017-9233, CVE-2016-9063
- CVE-2017-1000158: Fix an integer overflow in thePyString_DecodeEscape function in stringobject.c, resulting in heap-based bufferoverflow (bsc#1068664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-20"/>
	<updated date="2020-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159208">SUSE bug 1159208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159623">SUSE bug 1159623</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0876">CVE-2012-0876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0718">CVE-2016-0718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4472/">CVE-2016-4472 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4472">CVE-2016-4472 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000158">CVE-2017-1000158 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9233">CVE-2017-9233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009529634" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009529635" comment="python3-3.4.10-25.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009529636" comment="python3-base-3.4.10-25.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555302" comment="python3-curses-3.4.10-25.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542718" comment="python3-devel-3.4.10-25.39.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150169" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1154162" ref_url="https://bugzilla.suse.com/1154162" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0050-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200050-1.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Security issue fixed:

- CVE-2019-2974: Fixed Server Optimizer (bsc#1154162).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2974">CVE-2019-2974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555303" comment="libmysqlclient18-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549071" comment="libmysqlclient18-32bit-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555304" comment="mariadb-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555305" comment="mariadb-client-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555306" comment="mariadb-errormessages-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555307" comment="mariadb-tools-10.0.40.2-29.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150170" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to 7.1 Service Refresh 4 Fix Pack 55 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2962 CVE-2019-2964
    CVE-2019-2978 CVE-2019-2983 CVE-2019-2989 CVE-2019-2992
    CVE-2019-2999 CVE-2019-2973 CVE-2019-2981
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549079" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549080" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150171" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-4732" ref_url="https://www.suse.com/security/cve/CVE-2019-4732/" source="CVE"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Java 8.0 was updated to Service Refresh 6 Fix Pack 5 (bsc#1162972, bsc#1160968)

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2019-4732: Untrusted DLL search path vulnerability 
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-4732/">CVE-2019-4732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-4732">CVE-2019-4732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549086" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542735" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150172" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1159646" ref_url="https://bugzilla.suse.com/1159646" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0054-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200054-1.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2019-17571: Fixed a remote code execution by deserialization of untrusted data in SocketServer (bsc#1159646).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159646">SUSE bug 1159646</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17571">CVE-2019-17571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531752" comment="log4j-1.2.15-126.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150173" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1123886" ref_url="https://bugzilla.suse.com/1123886" source="BUGZILLA"/>
		<reference ref_id="1160594" ref_url="https://bugzilla.suse.com/1160594" source="BUGZILLA"/>
		<reference ref_id="1160764" ref_url="https://bugzilla.suse.com/1160764" source="BUGZILLA"/>
		<reference ref_id="1161779" ref_url="https://bugzilla.suse.com/1161779" source="BUGZILLA"/>
		<reference ref_id="1163922" ref_url="https://bugzilla.suse.com/1163922" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8013" ref_url="https://www.suse.com/security/cve/CVE-2020-8013/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006557.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

Security issues fixed:

- CVE-2020-8013: Fixed an issue where chkstat set unintended setuid/capabilities for mrsh and wodim (bsc#1163922).

Non-security issues fixed:

- Fixed a regression where chkstat broke when /proc was not available (bsc#1160764, bsc#1160594).
- Fixed capability handling when doing multiple permission changes at once (bsc#1161779).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-28"/>
	<updated date="2020-02-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123886">SUSE bug 1123886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160594">SUSE bug 1160594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160764">SUSE bug 1160764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161779">SUSE bug 1161779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163922">SUSE bug 1163922</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8013/">CVE-2020-8013 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8013">CVE-2020-8013 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555308" comment="permissions-2015.09.28.1626-17.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150174" version="1" class="patch">
	<metadata>
		<title>Security update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="1122668" ref_url="https://bugzilla.suse.com/1122668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006561.html" source="SUSE-SU"/>
		<description>
This update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer, python-jsonpatch, python-jsonpointer, python-scandir, python-PyYAML fixes the following issues:

python-cfn-lint was included as a new package in 0.21.4.


python-aws-sam-translator was updated to 1.11.0:

  * Add ReservedConcurrentExecutions to globals
  * Fix ElasticsearchHttpPostPolicy resource reference
  * Support using AWS::Region in Ref and Sub
  * Documentation and examples updates
  * Add VersionDescription property to Serverless::Function
  * Update ServerlessRepoReadWriteAccessPolicy
  * Add additional template validation

Upgrade to 1.10.0:

  * Add GSIs to DynamoDBReadPolicy and DynamoDBCrudPolicy
  * Add DynamoDBReconfigurePolicy
  * Add CostExplorerReadOnlyPolicy and OrganizationsListAccountsPolicy
  * Add EKSDescribePolicy
  * Add SESBulkTemplatedCrudPolicy
  * Add FilterLogEventsPolicy
  * Add SSMParameterReadPolicy
  * Add SESEmailTemplateCrudPolicy
  * Add s3:PutObjectAcl to S3CrudPolicy
  * Add allow_credentials CORS option
  * Add support for AccessLogSetting and CanarySetting Serverless::Api properties
  * Add support for X-Ray in Serverless::Api
  * Add support for MinimumCompressionSize in Serverless::Api
  * Add Auth to Serverless::Api globals
  * Remove trailing slashes from APIGW permissions
  * Add SNS FilterPolicy and an example application
  * Add Enabled property to Serverless::Function event sources
  * Add support for PermissionsBoundary in Serverless::Function
  * Fix boto3 client initialization
  * Add PublicAccessBlockConfiguration property to S3 bucket resource
  * Make PAY_PER_REQUEST default mode for Serverless::SimpleTable
  * Add limited support for resolving intrinsics in Serverless::LayerVersion
  * SAM now uses Flake8
  * Add example application for S3 Events written in Go
  * Updated several example applications

- Initial build
  + Version 1.9.0
- Add patch to drop compatible releases operator from setup.py,
  required for SLES12 as the setuptools version is too old
  + ast_drop-compatible-releases-operator.patch


python-jsonschema was updated to 2.6.0:

* Improved performance on CPython by adding caching around ref resolution

Update to version 2.5.0:

* Improved performance on CPython by adding caching around ref
  resolution (#203)

Update to version 2.4.0:

* Added a CLI (#134)
* Added absolute path and absolute schema path to errors (#120)
* Added ``relevance``
* Meta-schemas are now loaded via ``pkgutil``
* Added ``by_relevance`` and ``best_match`` (#91)
* Fixed ``format`` to allow adding formats for non-strings (#125)
* Fixed the ``uri`` format to reject URI references (#131)

- Install /usr/bin/jsonschema with update-alternatives support

python-nose2 was updated to 0.9.1:

* the prof plugin now uses cProfile instead of hotshot for profiling
* skipped tests now include the user's reason in junit XML's message field
* the prettyassert plugin mishandled multi-line function definitions
* Using a plugin's CLI flag when the plugin is already enabled via config
  no longer errors
* nose2.plugins.prettyassert, enabled with --pretty-assert
* Cleanup code for EOLed python versions
* Dropped support for distutils.
* Result reporter respects failure status set by other plugins
* JUnit XML plugin now includes the skip reason in its output

Upgrade to 0.8.0:

List of changes is too long to show here, see
https://github.com/nose-devs/nose2/blob/master/docs/changelog.rst
changes between 0.6.5 and 0.8.0

Update to 0.7.0:

* Added parameterized_class feature, for parameterizing entire test
  classes (many thanks to @TobyLL for their suggestions and help testing!)
* Fix DeprecationWarning on `inspect.getargs` (thanks @brettdh;
  https://github.com/wolever/parameterized/issues/67)
* Make sure that `setUp` and `tearDown` methods work correctly (#40)
* Raise a ValueError when input is empty (thanks @danielbradburn;
  https://github.com/wolever/parameterized/pull/48)
* Fix the order when number of cases exceeds 10 (thanks @ntflc;
  https://github.com/wolever/parameterized/pull/49)

python-scandir was included in version 2.3.2.

python-requests was updated to version 2.20.1 (bsc#1111622)

* Fixed bug with unintended Authorization header stripping for
  redirects using default ports (http/80, https/443).


* remove restriction for urllib3 &lt; 1.24

Update to version 2.20.0:

* Bugfixes
  + Content-Type header parsing is now case-insensitive
    (e.g. charset=utf8 v Charset=utf8).
  + Fixed exception leak where certain redirect urls would raise
    uncaught urllib3 exceptions.
  + Requests removes Authorization header from requests redirected
    from https to http on the same hostname. (CVE-2018-18074)
  + should_bypass_proxies now handles URIs without hostnames
    (e.g. files).
* Dependencies
  + Requests now supports urllib3 v1.24.
* Deprecations
  + Requests has officially stopped support for Python 2.6.

Update to version 2.19.1:

* Fixed issue where status_codes.py’s init function failed trying
  to append to a __doc__ value of None.

Update to version 2.19.0:

* Improvements
  + Warn about possible slowdown with cryptography version &lt; 1.3.4
  + Check host in proxy URL, before forwarding request to adapter.
  + Maintain fragments properly across redirects. (RFC7231 7.1.2)
  + Removed use of cgi module to expedite library load time.
  + Added support for SHA-256 and SHA-512 digest auth algorithms.
  + Minor performance improvement to Request.content.
  + Migrate to using collections.abc for 3.7 compatibility.
* Bugfixes
  + Parsing empty Link headers with parse_header_links() no longer
    return one bogus entry.
  + Fixed issue where loading the default certificate bundle from
    a zip archive would raise an IOError.
  + Fixed issue with unexpected ImportError on windows system
    which do not support winreg module.
  + DNS resolution in proxy bypass no longer includes the username
    and password in the request. This also fixes the issue of DNS
    queries failing on macOS.
  + Properly normalize adapter prefixes for url comparison.
  + Passing None as a file pointer to the files param no longer
    raises an exception.
  + Calling copy on a RequestsCookieJar will now preserve the
    cookie policy correctly.
* We now support idna v2.7 and urllib3 v1.23.

update to version 2.18.4:

* Improvements
  + Error messages for invalid headers now include the header name
    for easier debugging
* Dependencies
  + We now support idna v2.6.

update to version 2.18.3:

* Improvements
  + Running $ python -m requests.help now includes the installed
    version of idna.
* Bugfixes
  + Fixed issue where Requests would raise ConnectionError instead
    of SSLError when encountering SSL problems when using urllib3
    v1.22.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-02"/>
	<updated date="2020-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122668">SUSE bug 1122668</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009525281" comment="python-PyYAML-5.1.2-26.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522744" comment="python-asn1crypto-0.24.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522745" comment="python-packaging-17.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525290" comment="python3-PyYAML-5.1.2-26.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522747" comment="python3-asn1crypto-0.24.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522748" comment="python3-packaging-17.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150175" version="1" class="patch">
	<metadata>
		<title>Security update for libpng16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1124211" ref_url="https://bugzilla.suse.com/1124211" source="BUGZILLA"/>
		<reference ref_id="1141493" ref_url="https://bugzilla.suse.com/1141493" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006567.html" source="SUSE-SU"/>
		<description>
This update for libpng16 fixes the following issues:

Security issues fixed:

- CVE-2019-7317: Fixed a use-after-free vulnerability, triggered when
  png_image_free() was called under png_safe_execute (bsc#1124211).
- CVE-2017-12652: Fixed an Input Validation Error related to the length of chunks (bsc#1141493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-03"/>
	<updated date="2020-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124211">SUSE bug 1124211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141493">SUSE bug 1141493</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12652">CVE-2017-12652 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555309" comment="libpng16-16-1.6.8-15.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549088" comment="libpng16-16-32bit-1.6.8-15.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150176" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006573.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

PostgreSQL was updated to version 9.6.17.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-04"/>
	<updated date="2020-03-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1720">CVE-2020-1720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555310" comment="postgresql96-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555311" comment="postgresql96-contrib-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531756" comment="postgresql96-docs-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555312" comment="postgresql96-plperl-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555313" comment="postgresql96-plpython-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555314" comment="postgresql96-pltcl-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555315" comment="postgresql96-server-9.6.17-3.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150177" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Update java-1_7_0-openjdk to version jdk7u251 (January 2020 CPU, bsc#1160968):

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2020-2590: Improve Kerberos interop capabilities
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2601: Better Ticket Granting Services
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support
- CVE-2020-2654: Improve Object Identifier Processing	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-10"/>
	<updated date="2020-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2590">CVE-2020-2590 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2601">CVE-2020-2601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555316" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555317" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555318" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555319" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150178" version="1" class="patch">
	<metadata>
		<title>Security update for ipmitool (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1085469" ref_url="https://bugzilla.suse.com/1085469" source="BUGZILLA"/>
		<reference ref_id="1163026" ref_url="https://bugzilla.suse.com/1163026" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-5208" ref_url="https://www.suse.com/security/cve/CVE-2020-5208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006594.html" source="SUSE-SU"/>
		<description>
This update for ipmitool fixes the following issues:

- CVE-2020-5208: Fixed multiple remote code executtion vulnerabilities (bsc#1163026).	  
- picmg discover messages are now DEBUG and not INFO messages (bsc#1085469).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-10"/>
	<updated date="2020-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085469">SUSE bug 1085469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163026">SUSE bug 1163026</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5208/">CVE-2020-5208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5208">CVE-2020-5208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555320" comment="ipmitool-1.8.18-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150179" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1156323" ref_url="https://bugzilla.suse.com/1156323" source="BUGZILLA"/>
		<reference ref_id="1156324" ref_url="https://bugzilla.suse.com/1156324" source="BUGZILLA"/>
		<reference ref_id="1156326" ref_url="https://bugzilla.suse.com/1156326" source="BUGZILLA"/>
		<reference ref_id="1156328" ref_url="https://bugzilla.suse.com/1156328" source="BUGZILLA"/>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1162687" ref_url="https://bugzilla.suse.com/1162687" source="BUGZILLA"/>
		<reference ref_id="1162689" ref_url="https://bugzilla.suse.com/1162689" source="BUGZILLA"/>
		<reference ref_id="1162691" ref_url="https://bugzilla.suse.com/1162691" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526/" source="CVE"/>
		<reference ref_id="CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677/" source="CVE"/>
		<reference ref_id="CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678/" source="CVE"/>
		<reference ref_id="CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679/" source="CVE"/>
		<reference ref_id="CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449/" source="CVE"/>
		<reference ref_id="CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450/" source="CVE"/>
		<reference ref_id="CVE-2020-8517" ref_url="https://www.suse.com/security/cve/CVE-2020-8517/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2019-12528: Fixed an information disclosure flaw in the FTP gateway (bsc#1162689). 
- CVE-2019-12526: Fixed potential remote code execution during URN processing (bsc#1156326).
- CVE-2019-12523,CVE-2019-18676: Fixed multiple improper validations in URI processing (bsc#1156329).
- CVE-2019-18677: Fixed Cross-Site Request Forgery in HTTP Request processing (bsc#1156328).
- CVE-2019-18678: Fixed incorrect message parsing which could have led to HTTP request splitting issue (bsc#1156323).
- CVE-2019-18679: Fixed information disclosure when processing HTTP Digest Authentication (bsc#1156324).
- CVE-2020-8449: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
- CVE-2020-8450: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
- CVE-2020-8517: Fixed a buffer overflow in ext_lm_group_acl when processing NTLM Authentication credentials (bsc#1162691).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-12"/>
	<updated date="2020-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156323">SUSE bug 1156323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156324">SUSE bug 1156324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156326">SUSE bug 1156326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156328">SUSE bug 1156328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162689">SUSE bug 1162689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162691">SUSE bug 1162691</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12523">CVE-2019-12523 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12526">CVE-2019-12526 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12528">CVE-2019-12528 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18676">CVE-2019-18676 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18677">CVE-2019-18677 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18678">CVE-2019-18678 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18679">CVE-2019-18679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8449">CVE-2020-8449 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8450">CVE-2020-8450 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8517/">CVE-2020-8517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8517">CVE-2020-8517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555321" comment="squid-3.5.21-26.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150180" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1160305" ref_url="https://bugzilla.suse.com/1160305" source="BUGZILLA"/>
		<reference ref_id="1160498" ref_url="https://bugzilla.suse.com/1160498" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-03 (bsc#1160498)
  * CVE-2019-17026 (bmo#1607443)
    IonMonkey type confusion with StoreElementHole and
    FallibleStoreElement 

- Firefox Extended Support Release 68.4.0 ESR
  * Fixed: Various security fixes
  MFSA 2020-02 (bsc#1160305)
  * CVE-2019-17015 (bmo#1599005)
    Memory corruption in parent process during new content
    process initialization on Windows
  * CVE-2019-17016 (bmo#1599181)
    Bypass of @namespace CSS sanitization during pasting
  * CVE-2019-17017 (bmo#1603055)
    Type Confusion in XPCVariant.cpp
  * CVE-2019-17021 (bmo#1599008)
    Heap address disclosure in parent process during content
    process initialization on Windows
  * CVE-2019-17022 (bmo#1602843)
    CSS sanitization does not escape HTML tags
  * CVE-2019-17024 (bmo#1507180, bmo#1595470, bmo#1598605,
    bmo#1601826)
    Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-10"/>
	<updated date="2020-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160498">SUSE bug 1160498</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17015">CVE-2019-17015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17016">CVE-2019-17016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17017">CVE-2019-17017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17021">CVE-2019-17021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17022">CVE-2019-17022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17024">CVE-2019-17024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17026">CVE-2019-17026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555322" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555323" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150181" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006625.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

PostgreSQL was updated to version 10.12.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1720">CVE-2020-1720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555324" comment="libecpg6-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555325" comment="libpq5-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549104" comment="libpq5-32bit-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555326" comment="postgresql10-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555327" comment="postgresql10-contrib-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531766" comment="postgresql10-docs-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555328" comment="postgresql10-plperl-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555329" comment="postgresql10-plpython-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555330" comment="postgresql10-pltcl-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555331" comment="postgresql10-server-10.12-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150182" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1132665" ref_url="https://bugzilla.suse.com/1132665" source="BUGZILLA"/>
		<reference ref_id="1166238" ref_url="https://bugzilla.suse.com/1166238" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to 68.6.0 ESR (MFSA 2020-09 bsc#1132665 bsc#1166238)
          
- CVE-2020-6805: Fixed a use-after-free when removing data about origins
- CVE-2020-6806: Fixed improper protections against state confusion
- CVE-2020-6807: Fixed a use-after-free in cubeb during stream destruction 
- CVE-2020-6811: Fixed an issue where copy as cURL' feature did not fully 
  escape website-controlled data potentially leading to command injection 
- CVE-2019-20503: Fixed out of bounds reads in sctp_load_addresses_from_init 
- CVE-2020-6812: Fixed an issue where the names of AirPods with personally 
  identifiable information were exposed to websites with camera or microphone 
  permission     
- CVE-2020-6814: Fixed multiple memory safety bugs
- Fixed an issue with minimizing a window (bsc#1132665).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-19"/>
	<updated date="2020-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132665">SUSE bug 1132665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20503">CVE-2019-20503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6805">CVE-2020-6805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6806">CVE-2020-6806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6807">CVE-2020-6807 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6811">CVE-2020-6811 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6812">CVE-2020-6812 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6814">CVE-2020-6814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555332" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555333" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150183" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1164692" ref_url="https://bugzilla.suse.com/1164692" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006629.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-1938: Fixed a file contents disclosure vulnerability (bsc#1164692).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-19"/>
	<updated date="2020-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1164692">SUSE bug 1164692</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531774" comment="tomcat-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531775" comment="tomcat-admin-webapps-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531776" comment="tomcat-docs-webapp-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531777" comment="tomcat-el-3_0-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531778" comment="tomcat-javadoc-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531779" comment="tomcat-jsp-2_3-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531780" comment="tomcat-lib-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531781" comment="tomcat-servlet-3_1-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531782" comment="tomcat-webapps-8.0.53-29.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150184" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1158763" ref_url="https://bugzilla.suse.com/1158763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18900" ref_url="https://www.suse.com/security/cve/CVE-2019-18900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0079-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007437.html" source="SUSE-SU"/>
		<description>
This update for libzypp fixes the following issues:

Security issue fixed:

- CVE-2019-18900: Fixed assert cookie file that was world readable (bsc#1158763).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1158763">SUSE bug 1158763</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18900/">CVE-2019-18900 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18900">CVE-2019-18900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555334" comment="libzypp-16.21.2-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542752" comment="libzypp-devel-16.21.2-2.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150185" version="1" class="patch">
	<metadata>
		<title>Security update for python-cffi, python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1055478" ref_url="https://bugzilla.suse.com/1055478" source="BUGZILLA"/>
		<reference ref_id="1070737" ref_url="https://bugzilla.suse.com/1070737" source="BUGZILLA"/>
		<reference ref_id="1101820" ref_url="https://bugzilla.suse.com/1101820" source="BUGZILLA"/>
		<reference ref_id="1111657" ref_url="https://bugzilla.suse.com/1111657" source="BUGZILLA"/>
		<reference ref_id="1138748" ref_url="https://bugzilla.suse.com/1138748" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="981848" ref_url="https://bugzilla.suse.com/981848" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10903" ref_url="https://www.suse.com/security/cve/CVE-2018-10903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006644.html" source="SUSE-SU"/>
		<description>
This update for python-cffi, python-cryptography fixes the following issues:

Security issue fixed:

- CVE-2018-10903: Fixed GCM tag forgery via truncated tag in finalize_with_tag API (bsc#1101820).

Non-security issues fixed:

python-cffi was updated to 1.11.2 (bsc#1138748, jsc#ECO-1256, jsc#PM-1598):

- fixed a build failure on i586 (bsc#1111657)
- Salt was unable to highstate in snapshot 20171129 (bsc#1070737)

- Update pytest in spec to add c directory tests in addition to 
  testing directory.

- update to version 1.11.2:
  * Fix Windows issue with managing the thread-state on CPython 3.0 to
    3.5

- Update pytest in spec to add c directory tests in addition to 
  testing directory.
- Omit test_init_once_multithread tests as they rely on multiple
  threads finishing in a given time. Returns sporadic pass/fail
  within build.
- Update to 1.11.1:
  * Fix tests, remove deprecated C API usage
  * Fix (hack) for 3.6.0/3.6.1/3.6.2 giving incompatible binary
    extensions (cpython issue #29943)
  * Fix for 3.7.0a1+

- Update to 1.11.0:
  * Support the modern standard types char16_t and char32_t. These
    work like wchar_t: they represent one unicode character, or when
    used as charN_t * or charN_t[] they represent a unicode string.
    The difference with wchar_t is that they have a known, fixed
    size. They should work at all places that used to work with
    wchar_t (please report an issue if I missed something). Note
    that with set_source(), you need to make sure that these types
    are actually defined by the C source you provide (if used in
    cdef()).
  * Support the C99 types float _Complex and double _Complex. Note
    that libffi doesn't support them, which means that in the ABI
    mode you still cannot call C functions that take complex
    numbers directly as arguments or return type.
  * Fixed a rare race condition when creating multiple FFI instances
    from multiple threads. (Note that you aren't meant to create
    many FFI instances: in inline mode, you should write
    ffi = cffi.FFI() at module level just after import cffi; and in
    out-of-line mode you don't instantiate FFI explicitly at all.)
  * Windows: using callbacks can be messy because the CFFI internal
    error messages show up to stderr-but stderr goes nowhere in many
    applications. This makes it particularly hard to get started
    with the embedding mode. (Once you get started, you can at least
    use @ffi.def_extern(onerror=...) and send the error logs where
    it makes sense for your application, or record them in log
    files, and so on.) So what is new in CFFI is that now, on
    Windows CFFI will try to open a non-modal MessageBox (in addition
    to sending raw messages to stderr). The MessageBox is only
    visible if the process stays alive: typically, console
    applications that crash close immediately, but that is also the
    situation where stderr should be visible anyway.
  * Progress on support for callbacks in NetBSD.
  * Functions returning booleans would in some case still return 0
    or 1 instead of False or True. Fixed.
  * ffi.gc() now takes an optional third parameter, which gives an
    estimate of the size (in bytes) of the object. So far, this is
    only used by PyPy, to make the next GC occur more quickly
    (issue #320). In the future, this might have an effect on
    CPython too (provided the CPython issue 31105 is addressed).
  * Add a note to the documentation: the ABI mode gives function
    objects that are slower to call than the API mode does. For
    some reason it is often thought to be faster. It is not!
- Update to 1.10.1:
  * Fixed the line numbers reported in case of cdef() errors. Also,
    I just noticed, but pycparser always supported the preprocessor
    directive # 42 'foo.h' to mean 'from the next line, we're in
    file foo.h starting from line 42';, which it puts in the error
    messages. 

- update to 1.10.0:
 * Issue #295: use calloc() directly instead of PyObject_Malloc()+memset()
   to handle ffi.new() with a default allocator. Speeds up ffi.new(large-array)
   where most of the time you never touch most of the array.
  * Some OS/X build fixes ('only with Xcode but without CLT';).
  * Improve a couple of error messages: when getting mismatched versions of
    cffi and its backend; and when calling functions which cannot be called with
    libffi because an argument is a struct that is 'too complicated'; (and not
    a struct pointer, which always works).
  * Add support for some unusual compilers (non-msvc, non-gcc, non-icc, non-clang)
  * Implemented the remaining cases for ffi.from_buffer. Now all
    buffer/memoryview objects can be passed. The one remaining check is against
    passing unicode strings in Python 2. (They support the buffer interface, but
    that gives the raw bytes behind the UTF16/UCS4 storage, which is most of the
    times not what you expect. In Python 3 this has been fixed and the unicode
    strings don't support the memoryview interface any more.)
  * The C type _Bool or bool now converts to a Python boolean when reading,
    instead of the content of the byte as an integer. The potential
    incompatibility here is what occurs if the byte contains a value different
    from 0 and 1. Previously, it would just return it; with this change, CFFI
    raises an exception in this case. But this case means 'undefined behavior';
    in C; if you really have to interface with a library relying on this,
    don't use bool in the CFFI side. Also, it is still valid to use a byte
    string as initializer for a bool[], but now it must only contain \x00 or
    \x01. As an aside, ffi.string() no longer works on bool[] (but it never made
    much sense, as this function stops at the first zero).
  * ffi.buffer is now the name of cffi's buffer type, and ffi.buffer() works
    like before but is the constructor of that type.
  * ffi.addressof(lib, 'name') now works also in in-line mode, not only in
    out-of-line mode. This is useful for taking the address of global variables.
  * Issue #255: cdata objects of a primitive type (integers, floats, char) are
    now compared and ordered by value. For example, &lt;cdata 'int' 42&gt; compares
    equal to 42 and &lt;cdata 'char' b'A'&gt; compares equal to b'A'. Unlike C,
    &lt;cdata 'int' -1&gt; does not compare equal to ffi.cast('unsigned int', -1): it
    compares smaller, because -1 &lt; 4294967295.
  * PyPy: ffi.new() and ffi.new_allocator()() did not record 'memory pressure';,
    causing the GC to run too infrequently if you call ffi.new() very often
    and/or with large arrays. Fixed in PyPy 5.7.
  * Support in ffi.cdef() for numeric expressions with + or -. Assumes that
    there is no overflow; it should be fixed first before we add more general
    support for arbitrary arithmetic on constants.

- do not generate HTML documentation for packages that are indirect
  dependencies of Sphinx
  (see docs at https://cffi.readthedocs.org/ )

- update to 1.9.1
  - Structs with variable-sized arrays as their last field: now we track the
    length of the array after ffi.new() is called, just like we always tracked
    the length of ffi.new('int[]', 42). This lets us detect out-of-range
    accesses to array items. This also lets us display a better repr(), and
    have the total size returned by ffi.sizeof() and ffi.buffer(). Previously
    both functions would return a result based on the size of the declared
    structure type, with an assumed empty array. (Thanks andrew for starting
    this refactoring.)
  - Add support in cdef()/set_source() for unspecified-length arrays in
    typedefs: typedef int foo_t[...];. It was already supported for global
    variables or structure fields.
  - I turned in v1.8 a warning from cffi/model.py into an error: 'enum xxx' has
    no values explicitly defined: refusing to guess which integer type it is
    meant to be (unsigned/signed, int/long). Now I'm turning it back to a
    warning again; it seems that guessing that the enum has size int is a
    99%-safe bet. (But not 100%, so it stays as a warning.)
  - Fix leaks in the code handling FILE * arguments. In CPython 3 there is a
    remaining issue that is hard to fix: if you pass a Python file object to a
    FILE * argument, then os.dup() is used and the new file descriptor is only
    closed when the GC reclaims the Python file object-and not at the earlier
    time when you call close(), which only closes the original file descriptor.
    If this is an issue, you should avoid this automatic convertion of Python
    file objects: instead, explicitly manipulate file descriptors and call
    fdopen() from C (...via cffi).
  - When passing a void * argument to a function with a different pointer type,
    or vice-versa, the cast occurs automatically, like in C. The same occurs
    for initialization with ffi.new() and a few other places. However, I
    thought that char * had the same property-but I was mistaken. In C you get
    the usual warning if you try to give a char * to a char ** argument, for
    example. Sorry about the confusion. This has been fixed in CFFI by giving
    for now a warning, too. It will turn into an error in a future version.
  - Issue #283: fixed ffi.new() on structures/unions with nested anonymous
    structures/unions, when there is at least one union in the mix. When
    initialized with a list or a dict, it should now behave more closely like
    the { } syntax does in GCC.
  - CPython 3.x: experimental: the generated C extension modules now use the
    'limited API';, which means that, as a compiled .so/.dll, it should work
    directly on any version of CPython &gt;= 3.2. The name produced by distutils
    is still version-specific. To get the version-independent name, you can
    rename it manually to NAME.abi3.so, or use the very recent setuptools 26.
  - Added ffi.compile(debug=...), similar to python setup.py build --debug but
    defaulting to True if we are running a debugging version of Python itself.
  - Removed the restriction that ffi.from_buffer() cannot be used on byte
    strings. Now you can get a char * out of a byte string, which is valid as
    long as the string object is kept alive. (But don't use it to modify the
    string object! If you need this, use bytearray or other official
    techniques.)
  - PyPy 5.4 can now pass a byte string directly to a char * argument (in older
    versions, a copy would be made). This used to be a CPython-only
    optimization.
  - ffi.gc(p, None) removes the destructor on an object previously created by
    another call to ffi.gc()
  - bool(ffi.cast('primitive type', x)) now returns False if the value is zero
    (including -0.0), and True otherwise. Previously this would only return
    False for cdata objects of a pointer type when the pointer is NULL.
  - bytearrays: ffi.from_buffer(bytearray-object) is now supported. (The reason
    it was not supported was that it was hard to do in PyPy, but it works since
    PyPy 5.3.) To call a C function with a char * argument from a buffer
    object-now including bytearrays-you write lib.foo(ffi.from_buffer(x)).
    Additionally, this is now supported: p[0:length] = bytearray-object. The
    problem with this was that a iterating over bytearrays gives numbers
    instead of characters. (Now it is implemented with just a memcpy, of
    course, not actually iterating over the characters.)
  - C++: compiling the generated C code with C++ was supposed to work, but
    failed if you make use the bool type (because that is rendered as the C
    _Bool type, which doesn't exist in C++).
  - help(lib) and help(lib.myfunc) now give useful information, as well as
    dir(p) where p is a struct or pointer-to-struct.

- update for multipython build

- disable 'negative left shift' warning in test suite to prevent
  failures with gcc6, until upstream fixes the undefined code
  in question (bsc#981848)

- Update to version 1.6.0:
  * ffi.list_types()
  * ffi.unpack()
  * extern 'Python+C';
  * in API mode, lib.foo.__doc__ contains the C signature now.
  * Yet another attempt at robustness of ffi.def_extern() against
    CPython's interpreter shutdown logic.
- Update in SLE-12 (bsc#1138748, jsc#ECO-1256, jsc#PM-1598)

- Make this version of the package compatible with OpenSSL 1.1.1d, thus fixing bsc#1149792.

- bsc#1101820 CVE-2018-10903 GCM tag forgery via truncated tag in
  finalize_with_tag API

- Add proper conditional for the python2, the ifpython works only
  for the requires/etc

- add missing dependency on python ssl

- update to version 2.1.4:
  * Added X509_up_ref for an upcoming pyOpenSSL release.

- update to version 2.1.3:
  * Updated Windows, macOS, and manylinux1 wheels to be compiled with
    OpenSSL 1.1.0g.

- update to version 2.1.2:
  * Corrected a bug with the manylinux1 wheels where OpenSSL's stack
    was marked executable.

- fix BuildRequires conditions for python3

- update to 2.1.1

- Fix cffi version requirement.

- Disable memleak tests to fix build with OpenSSL 1.1 (bsc#1055478)


- update to 2.0.3

- update to 2.0.2

- update to 2.0

- update to 1.9

- add python-packaging to requirements explicitly instead of relying
  on setuptools to pull it in

- Switch to singlespec approach

- update to 1.8.1
- Adust Requires and BuildRequires		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-25"/>
	<updated date="2020-03-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055478">SUSE bug 1055478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070737">SUSE bug 1070737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101820">SUSE bug 1101820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111657">SUSE bug 1111657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138748">SUSE bug 1138748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981848">SUSE bug 981848</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10903/">CVE-2018-10903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10903">CVE-2018-10903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555335" comment="python-cffi-1.11.2-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555336" comment="python-cryptography-2.1.4-7.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555337" comment="python-xattr-0.7.5-6.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555338" comment="python3-cffi-1.11.2-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555339" comment="python3-cryptography-2.1.4-7.28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150186" version="1" class="patch">
	<metadata>
		<title>Security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1118987" ref_url="https://bugzilla.suse.com/1118987" source="BUGZILLA"/>
		<reference ref_id="1162197" ref_url="https://bugzilla.suse.com/1162197" source="BUGZILLA"/>
		<reference ref_id="1162200" ref_url="https://bugzilla.suse.com/1162200" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11805" ref_url="https://www.suse.com/security/cve/CVE-2018-11805/" source="CVE"/>
		<reference ref_id="CVE-2020-1930" ref_url="https://www.suse.com/security/cve/CVE-2020-1930/" source="CVE"/>
		<reference ref_id="CVE-2020-1931" ref_url="https://www.suse.com/security/cve/CVE-2020-1931/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006648.html" source="SUSE-SU"/>
		<description>
This update for spamassassin fixes the following issues:

- CVE-2018-11805: Fixed an issue with delimiter handling in rule files 
  related to is_regexp_valid() (bsc#1118987).
- CVE-2020-1930: Fixed an issue with rule configuration (.cf) files which 
  can be configured to run system commands (bsc#1162197).
- CVE-2020-1931: Fixed an issue with rule configuration (.cf) files which 
  can be configured to run system commands with warnings (bsc#1162200).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-30"/>
	<updated date="2020-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118987">SUSE bug 1118987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162197">SUSE bug 1162197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162200">SUSE bug 1162200</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11805/">CVE-2018-11805 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11805">CVE-2018-11805 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1930/">CVE-2020-1930 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1930">CVE-2020-1930 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1931/">CVE-2020-1931 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1931">CVE-2020-1931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555340" comment="perl-Mail-SpamAssassin-3.4.2-44.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555341" comment="spamassassin-3.4.2-44.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150187" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1162224" ref_url="https://bugzilla.suse.com/1162224" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006666.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issue:

- CVE-2019-18348: Fixed a CRLF injection via the host part 
  of the url passed to urlopen(). Now an InvalidURL exception 
  is raised (bsc#1155094).
- CVE-2019-9674: Improved the documentation to reflect the 
  dangers of zip-bombs (bsc#1162825).
- CVE-2020-8492: Fixed a regular expression in urllib that 
  was prone to denial of service via HTTP (bsc#1162367).
- Fixed an issue with version missmatch (bsc#1162224).
- Rename idle icons to idle3 in order to not conflict with python2
  variant of the package. (bsc#1165894)
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-02"/>
	<updated date="2020-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162224">SUSE bug 1162224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009529802" comment="libpython3_4m1_0-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009529803" comment="python3-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009529804" comment="python3-base-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009529805" comment="python3-curses-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542758" comment="python3-devel-3.4.10-25.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150188" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006672.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.176-94_88 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5108">CVE-2019-5108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721148" comment="kernel-default 4.4.176-94.88 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719415" comment="kgraft-patch-4_4_176-94_88-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538817" comment="kgraft-patch-4_4_176-94_88-default-8-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150189" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1141322" ref_url="https://bugzilla.suse.com/1141322" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0088-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200088-1.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to NSS 3.47.1:

Security issues fixed:

- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- CVE-2019-11745: EncryptUpdate should use maxout, not block size (bsc#1158527).
- CVE-2019-11727: Fixed vulnerability sign CertificateVerify with PKCS#1 v1.5 signatures issue (bsc#1141322).

mozilla-nspr was updated to version 4.23:

- Whitespace in C files was cleaned up and no longer uses tab characters for indenting.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-13"/>
	<updated date="2020-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141322">SUSE bug 1141322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17006">CVE-2019-17006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555342" comment="libfreebl3-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549127" comment="libfreebl3-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555343" comment="libfreebl3-hmac-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549129" comment="libfreebl3-hmac-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555344" comment="libsoftokn3-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549131" comment="libsoftokn3-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555345" comment="libsoftokn3-hmac-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549133" comment="libsoftokn3-hmac-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555346" comment="mozilla-nspr-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549135" comment="mozilla-nspr-32bit-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542760" comment="mozilla-nspr-devel-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555347" comment="mozilla-nss-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549138" comment="mozilla-nss-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555348" comment="mozilla-nss-certs-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549140" comment="mozilla-nss-certs-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542761" comment="mozilla-nss-devel-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555349" comment="mozilla-nss-sysinit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549143" comment="mozilla-nss-sysinit-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555350" comment="mozilla-nss-tools-3.47.1-58.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150190" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006672.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_113 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5108">CVE-2019-5108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721279" comment="kernel-default 4.4.180-94.113 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719606" comment="kgraft-patch-4_4_180-94_113-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538820" comment="kgraft-patch-4_4_180-94_113-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150191" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006672.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_107 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5108">CVE-2019-5108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721280" comment="kernel-default 4.4.180-94.107 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719608" comment="kgraft-patch-4_4_180-94_107-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538821" comment="kgraft-patch-4_4_180-94_107-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150192" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006672.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_103 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5108">CVE-2019-5108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721277" comment="kernel-default 4.4.180-94.103 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719602" comment="kgraft-patch-4_4_180-94_103-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538822" comment="kgraft-patch-4_4_180-94_103-default-6-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150193" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006672.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_100 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5108">CVE-2019-5108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721278" comment="kernel-default 4.4.180-94.100 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719604" comment="kgraft-patch-4_4_180-94_100-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538823" comment="kgraft-patch-4_4_180-94_100-default-6-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150194" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006672.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_97 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5108">CVE-2019-5108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721153" comment="kernel-default 4.4.180-94.97 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719420" comment="kgraft-patch-4_4_180-94_97-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538824" comment="kgraft-patch-4_4_180-94_97-default-8-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150195" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006672.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.178-94_91 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5108">CVE-2019-5108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721150" comment="kernel-default 4.4.178-94.91 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719417" comment="kgraft-patch-4_4_178-94_91-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538825" comment="kgraft-patch-4_4_178-94_91-default-8-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150196" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1154609" ref_url="https://bugzilla.suse.com/1154609" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0920-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007307.html" source="SUSE-SU"/>
		<description>
This update for libxslt fixes the following issue:

- CVE-2019-18197: Fixed a dangling pointer in xsltCopyText which may have led to information disclosure (bsc#1154609).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-26"/>
	<updated date="2020-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154609">SUSE bug 1154609</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18197">CVE-2019-18197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555351" comment="libxslt-tools-1.1.28-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555352" comment="libxslt1-1.1.28-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552051" comment="libxslt1-32bit-1.1.28-17.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150197" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1168630" ref_url="https://bugzilla.suse.com/1168630" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006677.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Mozilla Firefox 68.6.1esr
  MFSA 2020-11 (bsc#1168630)
  * CVE-2020-6819 (bmo#1620818)
    Use-after-free while running the nsDocShell destructor
  * CVE-2020-6820 (bmo#1626728)
    Use-after-free when handling a ReadableStream
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-06"/>
	<updated date="2020-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6819">CVE-2020-6819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6820">CVE-2020-6820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555353" comment="MozillaFirefox-68.6.1-109.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555354" comment="MozillaFirefox-translations-common-68.6.1-109.113.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150198" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1168874" ref_url="https://bugzilla.suse.com/1168874" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6827" ref_url="https://www.suse.com/security/cve/CVE-2020-6827/" source="CVE"/>
		<reference ref_id="CVE-2020-6828" ref_url="https://www.suse.com/security/cve/CVE-2020-6828/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006698.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 68.7.0 ESR fixes the following issues:

- CVE-2020-6821: Uninitialized memory could be read when using the WebGL copyTexSubImage method (bsc#1168874).
- CVE-2020-6822: Fixed out of bounds write in GMPDecodeData when processing large images (bsc#1168874).
- CVE-2020-6825: Fixed Memory safety bugs (bsc#1168874).
- CVE-2020-6827: Custom Tabs could have the URI spoofed (bsc#1168874).
- CVE-2020-6828: Preference overwrite via crafted Intent (bsc#1168874).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-09"/>
	<updated date="2020-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6821">CVE-2020-6821 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6822">CVE-2020-6822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6825">CVE-2020-6825 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6827/">CVE-2020-6827 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6827">CVE-2020-6827 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6828/">CVE-2020-6828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6828">CVE-2020-6828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555355" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555356" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150199" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1167890" ref_url="https://bugzilla.suse.com/1167890" source="BUGZILLA"/>
		<reference ref_id="1168930" ref_url="https://bugzilla.suse.com/1168930" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006709.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

Security issue fixed:

- CVE-2020-5260: With a crafted URL that contains a newline in it, the credential
  helper machinery can be fooled to give credential information for a wrong host (bsc#1168930). 

Non-security issue fixed: 

git was updated to 2.26.0 for SHA256 support (bsc#1167890, jsc#SLE-11608):

- the xinetd snippet was removed
- the System V init script for the git-daemon was replaced by a systemd
  service file of the same name.

git 2.26.0:

* 'git rebase' now uses a different backend that is based on the
  'merge' machinery by default. The 'rebase.backend' configuration
   variable reverts to old behaviour when set to  'apply'
* Improved handling of sparse checkouts
* Improvements to many commands and internal features

git 2.25.1:

* 'git commit' now honors advise.statusHints
* various updates, bug fixes and documentation updates

git 2.25.0:

* The branch description ('git branch --edit-description') has been
  used to fill the body of the cover letters by the format-patch
  command; this has been enhanced so that the subject can also be
  filled.
* A few commands learned to take the pathspec from the standard input
  or a named file, instead of taking it as the command line
  arguments, with the '--pathspec-from-file' option.
* Test updates to prepare for SHA-2 transition continues.
* Redo 'git name-rev' to avoid recursive calls.
* When all files from some subdirectory were renamed to the root
  directory, the directory rename heuristics would fail to detect that
  as a rename/merge of the subdirectory to the root directory, which has
  been corrected.
* HTTP transport had possible allocator/deallocator mismatch, which
  has been corrected.

git 2.24.1:

* CVE-2019-1348: The --export-marks option of fast-import is
  exposed also via the in-stream command feature export-marks=...
  and it allows overwriting arbitrary paths (bsc#1158785)
* CVE-2019-1349: on Windows, when submodules are cloned
  recursively, under certain circumstances Git could be fooled
  into using the same Git directory twice (bsc#1158787)
* CVE-2019-1350: Incorrect quoting of command-line arguments
  allowed remote code execution during a recursive clone in
  conjunction with SSH URLs (bsc#1158788)
* CVE-2019-1351: on Windows mistakes drive letters outside of
  the US-English alphabet as relative paths (bsc#1158789)
* CVE-2019-1352: on Windows was unaware of NTFS Alternate Data
  Streams (bsc#1158790)
* CVE-2019-1353: when run in the Windows Subsystem for Linux
  while accessing a working directory on a regular Windows
  drive, none of the NTFS protections were active (bsc#1158791)
* CVE-2019-1354: on Windows refuses to write tracked files with
  filenames that contain backslashes (bsc#1158792)
* CVE-2019-1387: Recursive clones vulnerability that is caused
  by too-lax validation of submodule names, allowing very
  targeted attacks via remote code execution in recursive
  clones (bsc#1158793)
* CVE-2019-19604: a recursive clone followed by a submodule
  update could execute code contained within the repository
  without the user explicitly having asked for that (bsc#1158795)

- Fix building with asciidoctor and without DocBook4 stylesheets.

git 2.24.0

* The command line parser learned '--end-of-options' notation.
* A mechanism to affect the default setting for a (related) group of
  configuration variables is introduced.
* 'git fetch' learned '--set-upstream' option to help those who first
  clone from their private fork they intend to push to, add the true
  upstream via 'git remote add' and then 'git fetch' from it.
* fixes and improvements to UI, workflow and features, bash completion fixes
* part of it merged upstream
* the Makefile attempted to download some documentation, banned

git 2.23.0:

* The '--base' option of 'format-patch' computed the patch-ids for
  prerequisite patches in an unstable way, which has been updated
  to compute in a way that is compatible with 'git patch-id
  --stable'.
* The 'git log' command by default behaves as if the --mailmap
  option was given.
* fixes and improvements to UI, workflow and features

git 2.22.1:

* A relative pathname given to 'git init --template=&lt;path&gt; &lt;repo&gt;'
  ought to be relative to the directory 'git init' gets invoked in,
  but it instead was made relative to the repository, which has been
  corrected.
* 'git worktree add' used to fail when another worktree connected to
  the same repository was corrupt, which has been corrected.
* 'git am -i --resolved' segfaulted after trying to see a commit as
  if it were a tree, which has been corrected.
* 'git merge --squash' is designed to update the working tree and the
  index without creating the commit, and this cannot be countermanded
  by adding the '--commit' option; the command now refuses to work
  when both options are given.
* Update to Unicode 12.1 width table.
* 'git request-pull' learned to warn when the ref we ask them to pull
  from in the local repository and in the published repository are
  different.
* 'git fetch' into a lazy clone forgot to fetch base objects that are
  necessary to complete delta in a thin packfile, which has been
  corrected.
* The URL decoding code has been updated to avoid going past the end
  of the string while parsing %-&lt;hex&gt;-&lt;hex&gt; sequence.
* 'git clean' silently skipped a path when it cannot lstat() it; now
  it gives a warning.
* 'git rm' to resolve a conflicted path leaked an internal message
  'needs merge' before actually removing the path, which was
  confusing. This has been corrected.
* Many more bugfixes and code cleanups.

- removal of SuSEfirewall2 service, since SuSEfirewall2 has been replaced by
  firewalld, see [1].
  [1]: https://lists.opensuse.org/opensuse-factory/2019-01/msg00490.html

git 2.22.0:

* The filter specification '--filter=sparse:path=&lt;path&gt;' used to
  create a lazy/partial clone has been removed. Using a blob that is
  part of the project as sparse specification is still supported with
  the '--filter=sparse:oid=&lt;blob&gt;' option
* 'git checkout --no-overlay' can be used to trigger a new mode of
  checking out paths out of the tree-ish, that allows paths that
  match the pathspec that are in the current index and working tree
  and are not in the tree-ish.
* Four new configuration variables {author,committer}.{name,email}
  have been introduced to override user.{name,email} in more specific
  cases.
* 'git branch' learned a new subcommand '--show-current'.
* The command line completion (in contrib/) has been taught to
  complete more subcommand parameters.
* The completion helper code now pays attention to repository-local
  configuration (when available), which allows --list-cmds to honour
  a repository specific setting of completion.commands, for example.
* The list of conflicted paths shown in the editor while concluding a
  conflicted merge was shown above the scissors line when the
  clean-up mode is set to 'scissors', even though it was commented
  out just like the list of updated paths and other information to
  help the user explain the merge better.
* 'git rebase' that was reimplemented in C did not set ORIG_HEAD
  correctly, which has been corrected.
* 'git worktree add' used to do a 'find an available name with stat
  and then mkdir', which is race-prone. This has been fixed by using
  mkdir and reacting to EEXIST in a loop. 

- update git-web AppArmor profile for bash and tar usrMerge (bsc#1132350)

git 2.21.0:

* Historically, the '-m' (mainline) option can only be used for 'git
  cherry-pick' and 'git revert' when working with a merge commit.
  This version of Git no longer warns or errors out when working with
  a single-parent commit, as long as the argument to the '-m' option
  is 1 (i.e. it has only one parent, and the request is to pick or
  revert relative to that first parent). Scripts that relied on the
  behaviour may get broken with this change.
* Small fixes and features for fast-export and fast-import.
* The 'http.version' configuration variable can be used with recent
  enough versions of cURL library to force the version of HTTP used
  to talk when fetching and pushing.
* 'git push $there $src:$dst' rejects when $dst is not a fully
  qualified refname and it is not clear what the end user meant.
* Update 'git multimail' from the upstream.
* A new date format '--date=human' that morphs its output depending
  on how far the time is from the current time has been introduced.
  '--date=auto:human' can be used to use this new format (or any
  existing format) when the output is going to the pager or to the
  terminal, and otherwise the default format.

- Fix worktree creation race (bsc#1114225).

git 2.20.1:

* portability fixes
* 'git help -a' did not work well when an overly long alias was
  defined
* no longer squelched an error message when the run_command API
  failed to run a missing command

git 2.20.0:

* 'git help -a' now gives verbose output (same as 'git help -av').
  Those who want the old output may say 'git help --no-verbose -a'..
* 'git send-email' learned to grab address-looking string on any
  trailer whose name ends with '-by'.
* 'git format-patch' learned new '--interdiff' and '--range-diff'
  options to explain the difference between this version and the
  previous attempt in the cover letter (or after the three-dashes as
  a comment).
* Developer builds now use -Wunused-function compilation option.
* Fix a bug in which the same path could be registered under multiple
  worktree entries if the path was missing (for instance, was removed
  manually).  Also, as a convenience, expand the number of cases in
  which --force is applicable.
* The overly large Documentation/config.txt file have been split into
  million little pieces.  This potentially allows each individual piece
  to be included into the manual page of the command it affects more easily.
* Malformed or crafted data in packstream can make our code attempt
  to read or write past the allocated buffer and abort, instead of
  reporting an error, which has been fixed.
* Fix for a long-standing bug that leaves the index file corrupt when
  it shrinks during a partial commit.
* 'git merge' and 'git pull' that merges into an unborn branch used
  to completely ignore '--verify-signatures', which has been
  corrected.
* ...and much more features and fixes

- fix CVE-2018-19486 (bsc#1117257)

git 2.19.2:

* various bug fixes for multiple subcommands and operations

git 2.19.1:

* CVE-2018-17456: Specially crafted .gitmodules files may have
  allowed arbitrary code execution when the repository is cloned
  with --recurse-submodules (bsc#1110949)

git 2.19.0:

* 'git diff' compares the index and the working tree.  For paths
   added with intent-to-add bit, the command shows the full contents
   of them as added, but the paths themselves were not marked as new
   files.  They are now shown as new by default.
* 'git apply' learned the '--intent-to-add' option so that an
   otherwise working-tree-only application of a patch will add new
   paths to the index marked with the 'intent-to-add' bit.
* 'git grep' learned the '--column' option that gives not just the
   line number but the column number of the hit.
* The '-l' option in 'git branch -l' is an unfortunate short-hand for
   '--create-reflog', but many users, both old and new, somehow expect
   it to be something else, perhaps '--list'.  This step warns when '-l'
   is used as a short-hand for '--create-reflog' and warns about the
   future repurposing of the it when it is used.
* The userdiff pattern for .php has been updated.
* The content-transfer-encoding of the message 'git send-email' sends
   out by default was 8bit, which can cause trouble when there is an
   overlong line to bust RFC 5322/2822 limit.  A new option 'auto' to
   automatically switch to quoted-printable when there is such a line
   in the payload has been introduced and is made the default.
* 'git checkout' and 'git worktree add' learned to honor
   checkout.defaultRemote when auto-vivifying a local branch out of a
   remote tracking branch in a repository with multiple remotes that
   have tracking branches that share the same names.
   (merge 8d7b558bae ab/checkout-default-remote later to maint).
* 'git grep' learned the '--only-matching' option.
* 'git rebase --rebase-merges' mode now handles octopus merges as
   well.
* Add a server-side knob to skip commits in exponential/fibbonacci
  stride in an attempt to cover wider swath of history with a smaller
  number of iterations, potentially accepting a larger packfile
  transfer, instead of going back one commit a time during common
  ancestor discovery during the 'git fetch' transaction.
  (merge 42cc7485a2 jt/fetch-negotiator-skipping later to maint).
* A new configuration variable core.usereplacerefs has been added,
  primarily to help server installations that want to ignore the
  replace mechanism altogether.
* Teach 'git tag -s' etc. a few configuration variables (gpg.format
  that can be set to 'openpgp' or 'x509', and gpg.&lt;format&gt;.program
  that is used to specify what program to use to deal with the format)
  to allow x.509 certs with CMS via 'gpgsm' to be used instead of
  openpgp via 'gnupg'.
* Many more strings are prepared for l10n.
* 'git p4 submit' learns to ask its own pre-submit hook if it should
  continue with submitting.
* The test performed at the receiving end of 'git push' to prevent
  bad objects from entering repository can be customized via
  receive.fsck.* configuration variables; we now have gained a
  counterpart to do the same on the 'git fetch' side, with
  fetch.fsck.* configuration variables.
* 'git pull --rebase=interactive' learned 'i' as a short-hand for
  'interactive'.
* 'git instaweb' has been adjusted to run better with newer Apache on
  RedHat based distros.
* 'git range-diff' is a reimplementation of 'git tbdiff' that lets us
  compare individual patches in two iterations of a topic.
* The sideband code learned to optionally paint selected keywords at
  the beginning of incoming lines on the receiving end.
* 'git branch --list' learned to take the default sort order from the
  'branch.sort' configuration variable, just like 'git tag --list'
  pays attention to 'tag.sort'.
* 'git worktree' command learned '--quiet' option to make it less
  verbose.

git 2.18.0:

* improvements to rename detection logic
* When built with more recent cURL, GIT_SSL_VERSION can now
  specify 'tlsv1.3' as its value.
* 'git mergetools' learned talking to guiffy.
* various other workflow improvements and fixes
* performance improvements and other developer visible fixes

Update to git 2.16.4: security fix release

git 2.17.1:

* Submodule 'names' come from the untrusted .gitmodules file, but
  we blindly append them to $GIT_DIR/modules to create our on-disk
  repo paths. This means you can do bad things by putting '../'
  into the name. We now enforce some rules for submodule names
  which will cause Git to ignore these malicious names
  (CVE-2018-11235, bsc#1095219)
* It was possible to trick the code that sanity-checks paths on
  NTFS into reading random piece of memory
  (CVE-2018-11233, bsc#1095218)
* Support on the server side to reject pushes to repositories
  that attempt to create such problematic .gitmodules file etc.
  as tracked contents, to help hosting sites protect their
  customers by preventing malicious contents from spreading.

git 2.17.0:

* 'diff' family of commands learned '--find-object=&lt;object-id&gt;' option
  to limit the findings to changes that involve the named object.
* 'git format-patch' learned to give 72-cols to diffstat, which is
  consistent with other line length limits the subcommand uses for
  its output meant for e-mails.
* The log from 'git daemon' can be redirected with a new option; one
  relevant use case is to send the log to standard error (instead of
  syslog) when running it from inetd.
* 'git rebase' learned to take '--allow-empty-message' option.
* 'git am' has learned the '--quit' option, in addition to the
  existing '--abort' option; having the pair mirrors a few other
  commands like 'rebase' and 'cherry-pick'.
* 'git worktree add' learned to run the post-checkout hook, just like
  'git clone' runs it upon the initial checkout.
* 'git tag' learned an explicit '--edit' option that allows the
  message given via '-m' and '-F' to be further edited.
* 'git fetch --prune-tags' may be used as a handy short-hand for
  getting rid of stale tags that are locally held.
* The new '--show-current-patch' option gives an end-user facing way
  to get the diff being applied when 'git rebase' (and 'git am')
  stops with a conflict.
* 'git add -p' used to offer '/' (look for a matching hunk) as a
  choice, even there was only one hunk, which has been corrected.
  Also the single-key help is now given only for keys that are
  enabled (e.g. help for '/' won't be shown when there is only one
  hunk).
* Since Git 1.7.9, 'git merge' defaulted to --no-ff (i.e. even when
  the side branch being merged is a descendant of the current commit,
  create a merge commit instead of fast-forwarding) when merging a
  tag object.  This was appropriate default for integrators who pull
  signed tags from their downstream contributors, but caused an
  unnecessary merges when used by downstream contributors who
  habitually 'catch up' their topic branches with tagged releases
  from the upstream.  Update 'git merge' to default to --no-ff only
  when merging a tag object that does *not* sit at its usual place in
  refs/tags/ hierarchy, and allow fast-forwarding otherwise, to
  mitigate the problem.
* 'git status' can spend a lot of cycles to compute the relation
  between the current branch and its upstream, which can now be
  disabled with '--no-ahead-behind' option.
* 'git diff' and friends learned funcname patterns for Go language
  source files.
* 'git send-email' learned '--reply-to=&lt;address&gt;' option.
* Funcname pattern used for C# now recognizes 'async' keyword.
* In a way similar to how 'git tag' learned to honor the pager
  setting only in the list mode, 'git config' learned to ignore the
  pager setting when it is used for setting values (i.e. when the
  purpose of the operation is not to 'show').
- Use %license instead of %doc [bsc#1082318]

git 2.16.3:

* 'git status' after moving a path in the working tree (hence
  making it appear 'removed') and then adding with the -N option
  (hence making that appear 'added') detected it as a rename, but
  did not report the  old and new pathnames correctly.
* 'git commit --fixup' did not allow '-m&lt;message&gt;' option to be
  used at the same time; allow it to annotate resulting commit
  with more text.
* When resetting the working tree files recursively, the working
  tree of submodules are now also reset to match.
* Fix for a commented-out code to adjust it to a rather old API
  change around object ID.
* When there are too many changed paths, 'git diff' showed a
  warning message but in the middle of a line.
* The http tracing code, often used to debug connection issues,
  learned to redact potentially sensitive information from its
  output so that it can be more safely sharable.
* Crash fix for a corner case where an error codepath tried to
  unlock what it did not acquire lock on.
* The split-index mode had a few corner case bugs fixed.
* Assorted fixes to 'git daemon'.
* Completion of 'git merge -s&lt;strategy&gt;' (in contrib/) did not
  work well in non-C locale.
* Workaround for segfault with more recent versions of SVN.
* Recently introduced leaks in fsck have been plugged.
* Travis CI integration now builds the executable in 'script'
  phase to follow the established practice, rather than during
  'before_script' phase.  This allows the CI categorize the
  failures better ('failed' is project's fault, 'errored' is
  build environment's).

- Drop superfluous xinetd snippet, no longer used (bsc#1084460)

- Build with asciidoctor for the recent distros (bsc#1075764)

- Move %{?systemd_requires} to daemon subpackage
- Create subpackage for libsecret credential helper.

git 2.16.2:

* An old regression in 'git describe --all $annotated_tag^0' has
  been fixed.
* 'git svn dcommit' did not take into account the fact that a
  svn+ssh:// URL with a username@ (typically used for pushing)
  refers to the same SVN repository without the username@ and
  failed when svn.pushmergeinfo option is set.
* 'git merge -Xours/-Xtheirs' learned to use our/their version
  when resolving a conflicting updates to a symbolic link.
* 'git clone $there $here' is allowed even when here directory
  exists as long as it is an empty directory, but the command
   incorrectly removed it upon a failure of the operation.
* 'git stash -- &lt;pathspec&gt;' incorrectly blew away untracked files
  in the directory that matched the pathspec, which has been
  corrected.
* 'git add -p' was taught to ignore local changes to submodules
  as they do not interfere with the partial addition of regular
  changes anyway.

git 2.16.1:

* 'git clone' segfaulted when cloning a project that happens to
  track two paths that differ only in case on a case insensitive
  filesystem

git 2.16.0 (CVE-2017-15298, bsc#1063412):

* See https://raw.github.com/git/git/master/Documentation/RelNotes/2.16.0.txt

git 2.15.1:

* fix 'auto' column output 
* fixes to moved lines diffing
* documentation updates
* fix use of repositories immediately under the root directory
* improve usage of libsecret
* fixes to various error conditions in git commands

- Rewrite from sysv init to systemd unit file for git-daemon
  (bsc#1069803)

- Replace references to /var/adm/fillup-templates with new 
  %_fillupdir macro (bsc#1069468)

- split off p4 to a subpackage (bsc#1067502)

- Build with the external libsha1detectcoll (bsc#1042644)

git 2.15.0:

* Use of an empty string as a pathspec element that is used for
 'everything matches' is still warned and Git asks users to use a
  more explicit '.' for that instead. Removal scheduled for 2.16
* Git now avoids blindly falling back to '.git' when the setup
  sequence said we are _not_ in Git repository (another corner
  case removed)
* 'branch --set-upstream' was retired, deprecated since 1.8
* many other improvements and updates

git 2.14.3:

* git send-email understands more cc: formats
* fixes so gitk --bisect
* git commit-tree fixed to handle -F file alike
* Prevent segfault in 'git cat-file --textconv'
* Fix function header parsing for HTML
* Various small fixes to user commands and and internal functions

git 2.14.2:

* fixes to color output
* http.{sslkey,sslCert} now interpret '~[username]/' prefix
* fixes to walking of reflogs via 'log -g' and friends
* various fixes to output correctness
* 'git push --recurse-submodules $there HEAD:$target' is now
  propagated down to the submodules
* 'git clone --recurse-submodules --quiet' c$how propagates quiet
  option down to submodules.
* 'git svn --localtime' correctness fixes
* 'git grep -L' and 'git grep --quiet -L' now report same exit code
* fixes to 'git apply' when converting line endings
* Various Perl scripts did not use safe_pipe_capture() instead 
  of backticks, leaving them susceptible to end-user input.
  CVE-2017-14867 bsc#1061041
* 'git cvsserver' no longer is invoked by 'git daemon' by
  default 

git 2.14.1 (bsc#1052481):
* Security fix for CVE-2017-1000117: A malicious third-party can
  give a crafted 'ssh://...' URL to an unsuspecting victim, and
  an attempt to visit the URL can result in any program that
  exists on the victim's machine being executed. Such a URL could
  be placed in the .gitmodules file of a malicious project, and
  an unsuspecting victim could be tricked into running
  'git clone --recurse-submodules' to trigger the vulnerability.
* A 'ssh://...' URL can result in a 'ssh' command line with a
  hostname that begins with a dash '-', which would cause the
  'ssh' command to instead (mis)treat it as an option. This is
  now prevented by forbidding such a hostname (which should not
  impact any real-world usage).
* Similarly, when GIT_PROXY_COMMAND is configured, the command
  is run with host and port that are parsed out from 'ssh://...'
  URL; a poorly written GIT_PROXY_COMMAND could be tricked into
  treating a string that begins with a dash '-' as an option.
  This is now prevented by forbidding such a hostname and port
  number (again, which should not impact any real-world usage).
* In the same spirit, a repository name that begins with a dash
  '-' is also forbidden now.

git 2.14.0:

* Use of an empty string as a pathspec element that is used for
  'everything matches' is deprecated, use '.'
* Avoid blindly falling back to '.git' when the setup sequence
  indicates operation not on a Git repository
* 'indent heuristics' are now the default.
* Builds with pcre2
* Many bug fixes, improvements and updates

git 2.13.4:

* Update the character width tables.
* Fix an alias that contained an uppercase letter
* Progress meter fixes
* git gc concurrency fixes

git 2.13.3:

* various internal bug fixes
* Fix a  regression to 'git rebase -i'
* Correct unaligned 32-bit access in pack-bitmap code
* Tighten error checks for invalid 'git apply' input
* The split index code did not honor core.sharedrepository setting
  correctly
* Fix 'git branch --list' handling of color.branch.local

git 2.13.2:

* 'collision detecting' SHA-1 update for platform fixes
* 'git checkout --recurse-submodules' did not quite work with a
  submodule that itself has submodules.
* The 'run-command' API implementation has been made more robust
  against dead-locking in a threaded environment.
* 'git clean -d' now only cleans ignored files with '-x'
* 'git status --ignored'  did not list ignored and untracked files
  without '-uall'
* 'git pull --rebase --autostash' didn't auto-stash when the local
  history fast-forwards to the upstream.
* 'git describe --contains' gives as much weight to lightweight
  tags as annotated tags
* Fix 'git stash push &lt;pathspec&gt;' from a subdirectory

git 2.13.1:

* Setting 'log.decorate=false' in the configuration file did not
  take effect in v2.13, which has been corrected.
* corrections to documentation and command help output
* garbage collection fixes
* memory leaks fixed
* receive-pack now makes sure that the push certificate records
  the same set of push options used for pushing
* shell completion corrections for git stash
* fix 'git clone --config var=val' with empty strings
* internal efficiency improvements
* Update sha1 collision detection code for big-endian platforms
  and platforms not supporting unaligned fetches

- Fix packaging of documentation

git 2.13.0:

* empty string as a pathspec element for 'everything matches'
  is still warned, for future removal.
* deprecated argument order 'git merge &lt;msg&gt; HEAD &lt;commit&gt;...'
  was removed
* default location '~/.git-credential-cache/socket' for the
  socket used to communicate with the credential-cache daemon 
  moved to '~/.cache/git/credential/socket'.
* now avoid blindly falling back to '.git' when the setup
  sequence indicated otherwise
* many workflow features, improvements and bug fixes
* add a hardened implementation of SHA1 in response to practical
  collision attacks (CVE-2005-4900, bsc#1042640)
* CVE-2017-8386: On a server running git-shell as login shell to
  restrict user to git commands, remote users may have been able
  to have git service programs spawn an interactive pager
  and thus escape the shell restrictions. (bsc#1038395)

Changes in pcre2:

- Include the libraries, development and tools packages.
  
  git uses only libpcre2-8 so far, but this allows further
  application usage of pcre2.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-14"/>
	<updated date="2020-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167890">SUSE bug 1167890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5260">CVE-2020-5260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009542775" comment="git-core-2.26.0-27.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555357" comment="libpcre2-16-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555358" comment="libpcre2-32-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555359" comment="libpcre2-8-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555360" comment="libpcre2-posix2-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531814" comment="perl-CGI-4.38-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150200" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008591.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_116 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721281" comment="kernel-default 4.4.180-94.116 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719610" comment="kgraft-patch-4_4_180-94_116-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538826" comment="kgraft-patch-4_4_180-94_116-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150201" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008591.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_121 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721282" comment="kernel-default 4.4.180-94.121 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719612" comment="kgraft-patch-4_4_180-94_121-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538827" comment="kgraft-patch-4_4_180-94_121-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150202" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008591.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_124 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721283" comment="kernel-default 4.4.180-94.124 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719614" comment="kgraft-patch-4_4_180-94_124-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538828" comment="kgraft-patch-4_4_180-94_124-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150203" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008591.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538829" comment="kgraft-patch-4_4_180-94_127-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150204" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008591.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538830" comment="kgraft-patch-4_4_180-94_130-default-7-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150205" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008591.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538831" comment="kgraft-patch-4_4_180-94_135-default-5-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150206" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008591.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538832" comment="kgraft-patch-4_4_180-94_138-default-3-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150207" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bsc#1177513).
- CVE-2020-0429: Fixed a memory corruption due to a use after free which could have led to local escalation of privilege with System execution privileges needed (bsc#1176931).
- CVE-2020-1749:  Use ip6_dst_lookup_flow instead of  ip6_dst_lookup (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538833" comment="kgraft-patch-4_4_180-94_141-default-2-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150208" version="1" class="patch">
	<metadata>
		<title>Security update for fwupdate (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008600.html" source="SUSE-SU"/>
		<description>
This update for fwupdate fixes the following issues:

- Add SBAT section to EFI images (bsc#1182057)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-08"/>
	<updated date="2021-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538834" comment="fwupdate-0.5-10.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538835" comment="fwupdate-efi-0.5-10.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538836" comment="libfwup0-0.5-10.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150209" version="1" class="patch">
	<metadata>
		<title>Security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1159133" ref_url="https://bugzilla.suse.com/1159133" source="BUGZILLA"/>
		<reference ref_id="1184221" ref_url="https://bugzilla.suse.com/1184221" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12420" ref_url="https://www.suse.com/security/cve/CVE-2019-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-1946" ref_url="https://www.suse.com/security/cve/CVE-2020-1946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008613.html" source="SUSE-SU"/>
		<description>
This update for spamassassin fixes the following issues:

- spamassassin was updated to version 3.4.5
- CVE-2019-12420: memory leak via crafted messages (bsc#1159133)
- CVE-2020-1946: security update (bsc#1184221)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-12"/>
	<updated date="2021-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159133">SUSE bug 1159133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184221">SUSE bug 1184221</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12420/">CVE-2019-12420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12420">CVE-2019-12420 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1946/">CVE-2020-1946 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1946">CVE-2020-1946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555361" comment="perl-Mail-SpamAssassin-3.4.5-44.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555362" comment="spamassassin-3.4.5-44.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150210" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1180128" ref_url="https://bugzilla.suse.com/1180128" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008639.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-3472: XChangeFeedbackControl Integer Underflow Privilege Escalation (bsc#1180128)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180128">SUSE bug 1180128</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3472">CVE-2021-3472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555363" comment="xorg-x11-server-7.6_1.18.3-76.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555364" comment="xorg-x11-server-extra-7.6_1.18.3-76.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150211" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1181256" ref_url="https://bugzilla.suse.com/1181256" source="BUGZILLA"/>
		<reference ref_id="1184532" ref_url="https://bugzilla.suse.com/1184532" source="BUGZILLA"/>
		<reference ref_id="1184533" ref_url="https://bugzilla.suse.com/1184533" source="BUGZILLA"/>
		<reference ref_id="1184534" ref_url="https://bugzilla.suse.com/1184534" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-1252" ref_url="https://www.suse.com/security/cve/CVE-2021-1252/" source="CVE"/>
		<reference ref_id="CVE-2021-1404" ref_url="https://www.suse.com/security/cve/CVE-2021-1404/" source="CVE"/>
		<reference ref_id="CVE-2021-1405" ref_url="https://www.suse.com/security/cve/CVE-2021-1405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008638.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2021-1252: Fix for Excel XLM parser infinite loop. (bsc#1184532)
- CVE-2021-1404: Fix for PDF parser buffer over-read; possible crash. (bsc#1184533)
- CVE-2021-1405: Fix for mail parser NULL-dereference crash. (bsc#1184534)
- Fix errors when scanning files &gt; 4G (bsc#1181256)
- Update clamav.keyring
- Update to 0.103.2
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181256">SUSE bug 1181256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184532">SUSE bug 1184532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184533">SUSE bug 1184533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184534">SUSE bug 1184534</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1252/">CVE-2021-1252 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1252">CVE-2021-1252 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1404/">CVE-2021-1404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1404">CVE-2021-1404 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1405/">CVE-2021-1405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1405">CVE-2021-1405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555365" comment="clamav-0.103.2-33.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150212" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1172383" ref_url="https://bugzilla.suse.com/1172383" source="BUGZILLA"/>
		<reference ref_id="1172384" ref_url="https://bugzilla.suse.com/1172384" source="BUGZILLA"/>
		<reference ref_id="1172385" ref_url="https://bugzilla.suse.com/1172385" source="BUGZILLA"/>
		<reference ref_id="1172386" ref_url="https://bugzilla.suse.com/1172386" source="BUGZILLA"/>
		<reference ref_id="1172478" ref_url="https://bugzilla.suse.com/1172478" source="BUGZILLA"/>
		<reference ref_id="1173612" ref_url="https://bugzilla.suse.com/1173612" source="BUGZILLA"/>
		<reference ref_id="1174386" ref_url="https://bugzilla.suse.com/1174386" source="BUGZILLA"/>
		<reference ref_id="1174641" ref_url="https://bugzilla.suse.com/1174641" source="BUGZILLA"/>
		<reference ref_id="1175441" ref_url="https://bugzilla.suse.com/1175441" source="BUGZILLA"/>
		<reference ref_id="1176673" ref_url="https://bugzilla.suse.com/1176673" source="BUGZILLA"/>
		<reference ref_id="1176682" ref_url="https://bugzilla.suse.com/1176682" source="BUGZILLA"/>
		<reference ref_id="1176684" ref_url="https://bugzilla.suse.com/1176684" source="BUGZILLA"/>
		<reference ref_id="1178174" ref_url="https://bugzilla.suse.com/1178174" source="BUGZILLA"/>
		<reference ref_id="1178934" ref_url="https://bugzilla.suse.com/1178934" source="BUGZILLA"/>
		<reference ref_id="1179467" ref_url="https://bugzilla.suse.com/1179467" source="BUGZILLA"/>
		<reference ref_id="1179468" ref_url="https://bugzilla.suse.com/1179468" source="BUGZILLA"/>
		<reference ref_id="1180523" ref_url="https://bugzilla.suse.com/1180523" source="BUGZILLA"/>
		<reference ref_id="1181108" ref_url="https://bugzilla.suse.com/1181108" source="BUGZILLA"/>
		<reference ref_id="1181639" ref_url="https://bugzilla.suse.com/1181639" source="BUGZILLA"/>
		<reference ref_id="1182137" ref_url="https://bugzilla.suse.com/1182137" source="BUGZILLA"/>
		<reference ref_id="1182425" ref_url="https://bugzilla.suse.com/1182425" source="BUGZILLA"/>
		<reference ref_id="1182577" ref_url="https://bugzilla.suse.com/1182577" source="BUGZILLA"/>
		<reference ref_id="1182968" ref_url="https://bugzilla.suse.com/1182968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11947" ref_url="https://www.suse.com/security/cve/CVE-2020-11947/" source="CVE"/>
		<reference ref_id="CVE-2020-12829" ref_url="https://www.suse.com/security/cve/CVE-2020-12829/" source="CVE"/>
		<reference ref_id="CVE-2020-13361" ref_url="https://www.suse.com/security/cve/CVE-2020-13361/" source="CVE"/>
		<reference ref_id="CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362/" source="CVE"/>
		<reference ref_id="CVE-2020-13659" ref_url="https://www.suse.com/security/cve/CVE-2020-13659/" source="CVE"/>
		<reference ref_id="CVE-2020-13765" ref_url="https://www.suse.com/security/cve/CVE-2020-13765/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-15469" ref_url="https://www.suse.com/security/cve/CVE-2020-15469/" source="CVE"/>
		<reference ref_id="CVE-2020-15863" ref_url="https://www.suse.com/security/cve/CVE-2020-15863/" source="CVE"/>
		<reference ref_id="CVE-2020-16092" ref_url="https://www.suse.com/security/cve/CVE-2020-16092/" source="CVE"/>
		<reference ref_id="CVE-2020-25084" ref_url="https://www.suse.com/security/cve/CVE-2020-25084/" source="CVE"/>
		<reference ref_id="CVE-2020-25624" ref_url="https://www.suse.com/security/cve/CVE-2020-25624/" source="CVE"/>
		<reference ref_id="CVE-2020-25625" ref_url="https://www.suse.com/security/cve/CVE-2020-25625/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-27617" ref_url="https://www.suse.com/security/cve/CVE-2020-27617/" source="CVE"/>
		<reference ref_id="CVE-2020-28916" ref_url="https://www.suse.com/security/cve/CVE-2020-28916/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29443" ref_url="https://www.suse.com/security/cve/CVE-2020-29443/" source="CVE"/>
		<reference ref_id="CVE-2021-20181" ref_url="https://www.suse.com/security/cve/CVE-2021-20181/" source="CVE"/>
		<reference ref_id="CVE-2021-20203" ref_url="https://www.suse.com/security/cve/CVE-2021-20203/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-3416" ref_url="https://www.suse.com/security/cve/CVE-2021-3416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- Fix OOB access in sm501 device emulation (CVE-2020-12829, bsc#1172385)
- Fix OOB access possibility in MegaRAID SAS 8708EM2 emulation (CVE-2020-13362 bsc#1172383)
- Fix use-after-free in usb xhci packet handling (CVE-2020-25723, bsc#1178934)
- Fix use-after-free in usb ehci packet handling (CVE-2020-25084, bsc#1176673)
- Fix OOB access in usb hcd-ohci emulation (CVE-2020-25624, bsc#1176682)
- Fix infinite loop (DoS) in usb hcd-ohci emulation (CVE-2020-25625, bsc#1176684)
- Fix guest triggerable assert in shared network handling code (CVE-2020-27617, bsc#1178174)
- Fix infinite loop (DoS) in e1000e device emulation (CVE-2020-28916, bsc#1179468)
- Fix OOB access in atapi emulation (CVE-2020-29443, bsc#1181108)
- Fix null pointer deref. (DoS) in mmio ops (CVE-2020-15469, bsc#1173612)
- Fix infinite loop (DoS) in e1000 device emulation (CVE-2021-20257, bsc#1182577)
- Fix OOB access (stack overflow) in rtl8139 NIC emulation (CVE-2021-3416, bsc#1182968)
- Fix OOB access (stack overflow) in other NIC emulations (CVE-2021-3416)
- Fix OOB access in SLIRP ARP packet processing (CVE-2020-29130, bsc#1179467)
- Fix null pointer dereference possibility (DoS) in MegaRAID SAS 8708EM2 emulation (CVE-2020-13659 bsc#1172386
- Fix OOB access in iscsi (CVE-2020-11947 bsc#1180523)
- Fix OOB access in vmxnet3 emulation (CVE-2021-20203 bsc#1181639)
- Fix buffer overflow in the XGMAC device (CVE-2020-15863, bsc#1174386)
- Fix DoS in packet processing of various emulated NICs (CVE-2020-16092 bsc#1174641)
- Fix OOB access while processing USB packets (CVE-2020-14364 bsc#1175441)
- Fix package scripts to not use hard coded paths for temporary working directories and log files (bsc#1182425)
- Fix potential privilege escalation in virtfs (CVE-2021-20181 bsc#1182137)
- Fix OOB access possibility in ES1370 audio device emulation (CVE-2020-13361 bsc#1172384)
- Fix OOB access in ROM loading (CVE-2020-13765 bsc#1172478)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-16"/>
	<updated date="2021-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172383">SUSE bug 1172383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172384">SUSE bug 1172384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172385">SUSE bug 1172385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172386">SUSE bug 1172386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172478">SUSE bug 1172478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173612">SUSE bug 1173612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174386">SUSE bug 1174386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174641">SUSE bug 1174641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175441">SUSE bug 1175441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176673">SUSE bug 1176673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176682">SUSE bug 1176682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176684">SUSE bug 1176684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178174">SUSE bug 1178174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178934">SUSE bug 1178934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179468">SUSE bug 1179468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180523">SUSE bug 1180523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181108">SUSE bug 1181108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181639">SUSE bug 1181639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182137">SUSE bug 1182137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182425">SUSE bug 1182425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182577">SUSE bug 1182577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182968">SUSE bug 1182968</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11947/">CVE-2020-11947 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11947">CVE-2020-11947 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12829/">CVE-2020-12829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12829">CVE-2020-12829 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13361/">CVE-2020-13361 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13361">CVE-2020-13361 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13362">CVE-2020-13362 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13659/">CVE-2020-13659 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13659">CVE-2020-13659 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13765/">CVE-2020-13765 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13765">CVE-2020-13765 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15469/">CVE-2020-15469 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15469">CVE-2020-15469 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15863/">CVE-2020-15863 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15863">CVE-2020-15863 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16092/">CVE-2020-16092 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16092">CVE-2020-16092 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25084/">CVE-2020-25084 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25084">CVE-2020-25084 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25624/">CVE-2020-25624 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25624">CVE-2020-25624 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25625/">CVE-2020-25625 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25625">CVE-2020-25625 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25723">CVE-2020-25723 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27617/">CVE-2020-27617 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27617">CVE-2020-27617 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28916/">CVE-2020-28916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28916">CVE-2020-28916 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29443/">CVE-2020-29443 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29443">CVE-2020-29443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20181/">CVE-2021-20181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20181">CVE-2021-20181 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20203/">CVE-2021-20203 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20203">CVE-2021-20203 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3416/">CVE-2021-3416 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3416">CVE-2021-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555366" comment="qemu-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555367" comment="qemu-arm-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555368" comment="qemu-block-curl-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555369" comment="qemu-block-iscsi-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555370" comment="qemu-block-rbd-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555371" comment="qemu-block-ssh-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555372" comment="qemu-guest-agent-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538848" comment="qemu-ipxe-1.0.0+-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555373" comment="qemu-kvm-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555374" comment="qemu-lang-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538851" comment="qemu-ppc-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555375" comment="qemu-s390-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538852" comment="qemu-seabios-1.10.2_0_g5f4c7b1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538853" comment="qemu-sgabios-8-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555376" comment="qemu-tools-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538855" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538856" comment="qemu-x86-2.9.1-6.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150213" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182431" ref_url="https://bugzilla.suse.com/1182431" source="BUGZILLA"/>
		<reference ref_id="1182846" ref_url="https://bugzilla.suse.com/1182846" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-27379" ref_url="https://www.suse.com/security/cve/CVE-2021-27379/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008654.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-20257: xen: infinite loop issue in the e1000 NIC emulator (bsc#1182846).
- CVE-2021-27379: Fixed an issue where entries in the IOMMU were not being updated 
  under certain circumstances due to improper backport of XSA-321 (XSA-366, bsc#1182431).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-19"/>
	<updated date="2021-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182431">SUSE bug 1182431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27379/">CVE-2021-27379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27379">CVE-2021-27379 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538857" comment="xen-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538858" comment="xen-doc-html-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538859" comment="xen-libs-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538860" comment="xen-libs-32bit-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538861" comment="xen-tools-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538862" comment="xen-tools-domU-4.9.4_16-3.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150214" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1183936" ref_url="https://bugzilla.suse.com/1183936" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008663.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- L3: Tenable Scan reports sudo is vulnerable to CVE-2021-3156 (bsc#1183936)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183936">SUSE bug 1183936</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3156">CVE-2021-3156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555377" comment="sudo-1.8.20p2-3.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150215" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1184960" ref_url="https://bugzilla.suse.com/1184960" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.10.0 ESR (bsc#1184960)
  * CVE-2021-23994: Out of bound write due to lazy initialization
  * CVE-2021-23995: Use-after-free in Responsive Design Mode
  * CVE-2021-23998: Secure Lock icon could have been spoofed
  * CVE-2021-23961: More internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23999: Blob URLs may have been granted additional privileges
  * CVE-2021-24002: Arbitrary FTP command execution on FTP servers using an encoded URL
  * CVE-2021-29945: Incorrect size computation in WebAssembly JIT could lead to null-reads
  * CVE-2021-29946: Port blocking could be bypassed
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-27"/>
	<updated date="2021-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23961">CVE-2021-23961 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23994">CVE-2021-23994 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23995">CVE-2021-23995 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23998">CVE-2021-23998 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23999">CVE-2021-23999 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24002">CVE-2021-24002 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29945">CVE-2021-29945 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29946">CVE-2021-29946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555378" comment="MozillaFirefox-78.10.0-112.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543103" comment="MozillaFirefox-devel-78.10.0-112.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555379" comment="MozillaFirefox-translations-common-78.10.0-112.57.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150216" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008687.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_124 fixes one issue.

The following security issues were fixed:

- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721283" comment="kernel-default 4.4.180-94.124 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719614" comment="kgraft-patch-4_4_180-94_124-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538867" comment="kgraft-patch-4_4_180-94_124-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150217" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008687.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes one issue.

The following security issues were fixed:

- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538868" comment="kgraft-patch-4_4_180-94_127-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150218" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008687.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes one issue.

The following security issues were fixed:

- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538869" comment="kgraft-patch-4_4_180-94_130-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150219" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008687.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes one issue.

The following security issues were fixed:

- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538870" comment="kgraft-patch-4_4_180-94_138-default-4-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150220" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008680.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes one issue.

The following security issue was fixed:

- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538871" comment="kgraft-patch-4_4_180-94_141-default-3-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150221" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008687.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_116 fixes one issue.

The following security issues were fixed:

- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721281" comment="kernel-default 4.4.180-94.116 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719610" comment="kgraft-patch-4_4_180-94_116-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538872" comment="kgraft-patch-4_4_180-94_116-default-10-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150222" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008687.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_121 fixes one issue.

The following security issues were fixed:

- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721282" comment="kernel-default 4.4.180-94.121 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719612" comment="kgraft-patch-4_4_180-94_121-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538873" comment="kgraft-patch-4_4_180-94_121-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150223" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008687.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes one issue.

The following security issues were fixed:

- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538874" comment="kgraft-patch-4_4_180-94_135-default-6-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150224" version="1" class="patch">
	<metadata>
		<title>Security update for libnettle (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1183835" ref_url="https://bugzilla.suse.com/1183835" source="BUGZILLA"/>
		<reference ref_id="1184401" ref_url="https://bugzilla.suse.com/1184401" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20305" ref_url="https://www.suse.com/security/cve/CVE-2021-20305/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008682.html" source="SUSE-SU"/>
		<description>
This update for libnettle fixes the following issues:

- CVE-2021-20305: Fixed the multiply function which was being called with out-of-range scalars (bsc#1184401, bsc#1183835).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183835">SUSE bug 1183835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184401">SUSE bug 1184401</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20305/">CVE-2021-20305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20305">CVE-2021-20305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555380" comment="libhogweed2-2.7.1-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555381" comment="libhogweed2-32bit-2.7.1-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555382" comment="libnettle4-2.7.1-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555383" comment="libnettle4-32bit-2.7.1-13.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150225" version="1" class="patch">
	<metadata>
		<title>Security update for gdm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1184456" ref_url="https://bugzilla.suse.com/1184456" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008681.html" source="SUSE-SU"/>
		<description>
This update for gdm fixes the following issues:

-  Avoid the signal SIGTRAP when gdm exits (bsc#1184456).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184456">SUSE bug 1184456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555384" comment="gdm-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538880" comment="gdm-lang-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538881" comment="gdmflexiserver-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555385" comment="libgdm1-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555386" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150226" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182909" ref_url="https://bugzilla.suse.com/1182909" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25329" ref_url="https://www.suse.com/security/cve/CVE-2021-25329/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008703.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2021-25329: Complete fix for CVE-2020-9484 (bsc#1182909)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182909">SUSE bug 1182909</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25329/">CVE-2021-25329 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25329">CVE-2021-25329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538884" comment="tomcat-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538885" comment="tomcat-admin-webapps-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538886" comment="tomcat-docs-webapp-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538887" comment="tomcat-el-3_0-api-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538888" comment="tomcat-javadoc-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538889" comment="tomcat-jsp-2_3-api-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538890" comment="tomcat-lib-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538891" comment="tomcat-servlet-3_1-api-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538892" comment="tomcat-webapps-8.0.53-29.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150227" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008701.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.25 - OpenJDK 7u291 (January 2021 CPU, bsc#1181239)
  * Security fixes
    + JDK-8247619: Improve Direct Buffering of Characters
  * Import of OpenJDK 7 u291 build 1
    + JDK-8254177: (tz) Upgrade time-zone data to tzdata2020b
    + JDK-8254982: (tz) Upgrade time-zone data to tzdata2020c
    + JDK-8255226: (tz) Upgrade time-zone data to tzdata2020d
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555387" comment="java-1_7_0-openjdk-1.7.0.291-43.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555388" comment="java-1_7_0-openjdk-demo-1.7.0.291-43.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555389" comment="java-1_7_0-openjdk-devel-1.7.0.291-43.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555390" comment="java-1_7_0-openjdk-headless-1.7.0.291-43.47.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150228" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1184161" ref_url="https://bugzilla.suse.com/1184161" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25317" ref_url="https://www.suse.com/security/cve/CVE-2021-25317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008713.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2021-25317: ownership of /var/log/cups could allow privilege escalation from lp user to root via symlink attacks (bsc#1184161)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184161">SUSE bug 1184161</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-25317/">CVE-2021-25317 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25317">CVE-2021-25317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555391" comment="cups-1.7.5-20.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555392" comment="cups-client-1.7.5-20.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555393" comment="cups-libs-1.7.5-20.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555394" comment="cups-libs-32bit-1.7.5-20.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150229" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1181495" ref_url="https://bugzilla.suse.com/1181495" source="BUGZILLA"/>
		<reference ref_id="1185345" ref_url="https://bugzilla.suse.com/1185345" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214/" source="CVE"/>
		<reference ref_id="CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215/" source="CVE"/>
		<reference ref_id="CVE-2021-25216" ref_url="https://www.suse.com/security/cve/CVE-2021-25216/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008723.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25214: Fixed a broken inbound incremental zone update (IXFR) which could have caused named to terminate unexpectedly (bsc#1185345).
- CVE-2021-25215: Fixed an assertion check which could have failed while answering queries for DNAME records that required the DNAME to be processed to resolve itself (bsc#1185345).
- CVE-2021-25216: Fixed an issue where policy negotiation can be targeted by a buffer overflow attack (bsc#1185345).
- MD5 warning message using host, dig, nslookup (bind-utils) with FIPS enabled (bsc#1181495).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181495">SUSE bug 1181495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25214">CVE-2021-25214 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25215">CVE-2021-25215 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25216/">CVE-2021-25216 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25216">CVE-2021-25216 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555395" comment="bind-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555396" comment="bind-chrootenv-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538903" comment="bind-doc-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555397" comment="bind-libs-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555398" comment="bind-libs-32bit-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555399" comment="bind-utils-9.9.9P1-63.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150230" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178469" ref_url="https://bugzilla.suse.com/1178469" source="BUGZILLA"/>
		<reference ref_id="1179156" ref_url="https://bugzilla.suse.com/1179156" source="BUGZILLA"/>
		<reference ref_id="1184677" ref_url="https://bugzilla.suse.com/1184677" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008729.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-20254: Fixed a buffer overrun in sids_to_unixids() (bsc#1184677).
- Avoid free'ing our own pointer in memcache when memcache_trim attempts to reduce cache size (bsc#1179156).
- Adjust smbcacls '--propagate-inheritance' feature to align with upstream (bsc#1178469).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178469">SUSE bug 1178469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179156">SUSE bug 1179156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184677">SUSE bug 1184677</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20254">CVE-2021-20254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555400" comment="libdcerpc-binding0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555401" comment="libdcerpc-binding0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555402" comment="libdcerpc0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555403" comment="libdcerpc0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555404" comment="libndr-krb5pac0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555405" comment="libndr-krb5pac0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555406" comment="libndr-nbt0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555407" comment="libndr-nbt0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555408" comment="libndr-standard0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555409" comment="libndr-standard0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555410" comment="libndr0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555411" comment="libndr0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555412" comment="libnetapi0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555413" comment="libnetapi0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555414" comment="libsamba-credentials0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555415" comment="libsamba-credentials0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555416" comment="libsamba-errors0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555417" comment="libsamba-errors0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555418" comment="libsamba-hostconfig0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555419" comment="libsamba-hostconfig0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555420" comment="libsamba-passdb0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555421" comment="libsamba-passdb0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555422" comment="libsamba-util0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555423" comment="libsamba-util0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555424" comment="libsamdb0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555425" comment="libsamdb0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555426" comment="libsmbclient0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555427" comment="libsmbclient0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555428" comment="libsmbconf0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555429" comment="libsmbconf0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555430" comment="libsmbldap0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555431" comment="libsmbldap0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555432" comment="libtevent-util0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555433" comment="libtevent-util0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555434" comment="libwbclient0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555435" comment="libwbclient0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555436" comment="samba-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555437" comment="samba-client-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555438" comment="samba-client-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538946" comment="samba-doc-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555439" comment="samba-libs-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555440" comment="samba-libs-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555441" comment="samba-winbind-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555442" comment="samba-winbind-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150231" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1184521" ref_url="https://bugzilla.suse.com/1184521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1494-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008929.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2021-3468: avoid infinite loop by handling  HUP event in client_work (bsc#1184521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-03"/>
	<updated date="2021-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184521">SUSE bug 1184521</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3468">CVE-2021-3468 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555443" comment="avahi-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538952" comment="avahi-lang-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555444" comment="avahi-utils-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555445" comment="libavahi-client3-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555446" comment="libavahi-client3-32bit-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555447" comment="libavahi-common3-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555448" comment="libavahi-common3-32bit-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555449" comment="libavahi-core7-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555450" comment="libavahi-glib1-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555451" comment="libavahi-glib1-32bit-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555452" comment="libdns_sd-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555453" comment="libdns_sd-32bit-0.6.32-32.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150232" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-27619" ref_url="https://www.suse.com/security/cve/CVE-2020-27619/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008779.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Security issues fixed:

- CVE-2020-27619: where Lib/test/multibytecodec_support calls eval() on content retrieved via HTTP. (bsc#1178009)

Other fixes:

- Make sure to close the 'import_failed.map' file after the exception
  has been raised in order to avoid ResourceWarnings when the
  failing import is part of a try...except block
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-17"/>
	<updated date="2021-05-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27619/">CVE-2020-27619 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27619">CVE-2020-27619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009529915" comment="libpython3_4m1_0-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009529916" comment="python3-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009529917" comment="python3-base-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009529918" comment="python3-curses-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543140" comment="python3-devel-3.4.10-25.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150233" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1120163" ref_url="https://bugzilla.suse.com/1120163" source="BUGZILLA"/>
		<reference ref_id="1152974" ref_url="https://bugzilla.suse.com/1152974" source="BUGZILLA"/>
		<reference ref_id="1152975" ref_url="https://bugzilla.suse.com/1152975" source="BUGZILLA"/>
		<reference ref_id="1155179" ref_url="https://bugzilla.suse.com/1155179" source="BUGZILLA"/>
		<reference ref_id="1155184" ref_url="https://bugzilla.suse.com/1155184" source="BUGZILLA"/>
		<reference ref_id="1155186" ref_url="https://bugzilla.suse.com/1155186" source="BUGZILLA"/>
		<reference ref_id="1159483" ref_url="https://bugzilla.suse.com/1159483" source="BUGZILLA"/>
		<reference ref_id="1165629" ref_url="https://bugzilla.suse.com/1165629" source="BUGZILLA"/>
		<reference ref_id="1165823" ref_url="https://bugzilla.suse.com/1165823" source="BUGZILLA"/>
		<reference ref_id="1172247" ref_url="https://bugzilla.suse.com/1172247" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1176720" ref_url="https://bugzilla.suse.com/1176720" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177855" ref_url="https://bugzilla.suse.com/1177855" source="BUGZILLA"/>
		<reference ref_id="1177856" ref_url="https://bugzilla.suse.com/1177856" source="BUGZILLA"/>
		<reference ref_id="1178181" ref_url="https://bugzilla.suse.com/1178181" source="BUGZILLA"/>
		<reference ref_id="1178634" ref_url="https://bugzilla.suse.com/1178634" source="BUGZILLA"/>
		<reference ref_id="1179575" ref_url="https://bugzilla.suse.com/1179575" source="BUGZILLA"/>
		<reference ref_id="1182047" ref_url="https://bugzilla.suse.com/1182047" source="BUGZILLA"/>
		<reference ref_id="1182261" ref_url="https://bugzilla.suse.com/1182261" source="BUGZILLA"/>
		<reference ref_id="1182715" ref_url="https://bugzilla.suse.com/1182715" source="BUGZILLA"/>
		<reference ref_id="1182716" ref_url="https://bugzilla.suse.com/1182716" source="BUGZILLA"/>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183022" ref_url="https://bugzilla.suse.com/1183022" source="BUGZILLA"/>
		<reference ref_id="1183069" ref_url="https://bugzilla.suse.com/1183069" source="BUGZILLA"/>
		<reference ref_id="1183593" ref_url="https://bugzilla.suse.com/1183593" source="BUGZILLA"/>
		<reference ref_id="1184120" ref_url="https://bugzilla.suse.com/1184120" source="BUGZILLA"/>
		<reference ref_id="1184167" ref_url="https://bugzilla.suse.com/1184167" source="BUGZILLA"/>
		<reference ref_id="1184168" ref_url="https://bugzilla.suse.com/1184168" source="BUGZILLA"/>
		<reference ref_id="1184194" ref_url="https://bugzilla.suse.com/1184194" source="BUGZILLA"/>
		<reference ref_id="1184198" ref_url="https://bugzilla.suse.com/1184198" source="BUGZILLA"/>
		<reference ref_id="1184208" ref_url="https://bugzilla.suse.com/1184208" source="BUGZILLA"/>
		<reference ref_id="1184211" ref_url="https://bugzilla.suse.com/1184211" source="BUGZILLA"/>
		<reference ref_id="1184391" ref_url="https://bugzilla.suse.com/1184391" source="BUGZILLA"/>
		<reference ref_id="1184393" ref_url="https://bugzilla.suse.com/1184393" source="BUGZILLA"/>
		<reference ref_id="1184397" ref_url="https://bugzilla.suse.com/1184397" source="BUGZILLA"/>
		<reference ref_id="1184509" ref_url="https://bugzilla.suse.com/1184509" source="BUGZILLA"/>
		<reference ref_id="1184583" ref_url="https://bugzilla.suse.com/1184583" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1185248" ref_url="https://bugzilla.suse.com/1185248" source="BUGZILLA"/>
		<reference ref_id="1185555" ref_url="https://bugzilla.suse.com/1185555" source="BUGZILLA"/>
		<reference ref_id="1185556" ref_url="https://bugzilla.suse.com/1185556" source="BUGZILLA"/>
		<reference ref_id="1185557" ref_url="https://bugzilla.suse.com/1185557" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0433" ref_url="https://www.suse.com/security/cve/CVE-2020-0433/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-27673" ref_url="https://www.suse.com/security/cve/CVE-2020-27673/" source="CVE"/>
		<reference ref_id="CVE-2020-36312" ref_url="https://www.suse.com/security/cve/CVE-2020-36312/" source="CVE"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-20219" ref_url="https://www.suse.com/security/cve/CVE-2021-20219/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28038" ref_url="https://www.suse.com/security/cve/CVE-2021-28038/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950/" source="CVE"/>
		<reference ref_id="CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-29264" ref_url="https://www.suse.com/security/cve/CVE-2021-29264/" source="CVE"/>
		<reference ref_id="CVE-2021-29265" ref_url="https://www.suse.com/security/cve/CVE-2021-29265/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-36312: Fixed an issue in virt/kvm/kvm_main.c that had a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure (bnc#1184509).
- CVE-2021-29650: Fixed an issue inside the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).
- CVE-2020-27673: Fixed an issue in Xen where a guest OS users could have caused a denial of service (host OS hang) via a high rate of events to dom0 (bnc#1177411, bnc#1184583).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bnc#1184391).
- CVE-2020-25673: Fixed NFC endless loops caused by repeated llcp_sock_connect() (bsc#1178181).
- CVE-2020-25672: Fixed NFC memory leak in llcp_sock_connect() (bsc#1178181).
- CVE-2020-25671: Fixed NFC refcount leak in llcp_sock_connect() (bsc#1178181).
- CVE-2020-25670: Fixed NFC refcount leak in llcp_sock_bind() (bsc#1178181).
- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h where a 'stall on CPU' could have occured because a retry loop continually finds the same bad inode (bnc#1184194, bnc#1184211).
- CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bnc#1184211).
- CVE-2021-30002: Fixed a memory leak issue when a webcam device exists (bnc#1184120).
- CVE-2021-3483: Fixed a use-after-free bug in nosy_ioctl() (bsc#1184393).
- CVE-2021-20219: Fixed a denial of service vulnerability in drivers/tty/n_tty.c of the Linux kernel. In this flaw a local attacker with a normal user privilege could have delayed the loop and cause a threat to the system availability (bnc#1184397).
- CVE-2021-29265: Fixed an issue in usbip_sockfd_store in drivers/usb/usbip/stub_dev.c that allowed attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status (bnc#1184167).
- CVE-2021-29264: Fixed an issue in drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver that allowed attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled (bnc#1184168).
- CVE-2021-28972: Fixed an issue in drivers/pci/hotplug/rpadlpar_sysfs.c where the RPA PCI Hotplug driver had a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\0' termination (bnc#1184198).
- CVE-2021-28660: Fixed rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c that allowed writing beyond the end of the ssid array (bnc#1183593).
- CVE-2020-0433: Fixed blk_mq_queue_tag_busy_iter of blk-mq-tag.c, where a possible use after free due to improper locking could have happened. This could have led to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1176720).
- CVE-2021-28038: Fixed an issue with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931 (bnc#1183022, bnc#1183069).
- CVE-2021-27365: Fixed an issue inside the iSCSI data structures that does not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bnc#1182715).
- CVE-2021-27363: Fixed an issue with a kernel pointer leak that could have been used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables (bnc#1182716).
- CVE-2021-27364: Fixed an issue in drivers/scsi/scsi_transport_iscsi.c where an unprivileged user can craft Netlink messages (bnc#1182717).
- CVE-2020-1749: Fixed a flaw inside of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality (bnc#1165629).

The following non-security bugs were fixed:

- bluetooth: eliminate the potential race condition when removing the HCI controller (bsc#1184611).
- Btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).
- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).
- btrfs: Cleanup try_flush_qgroup (bsc#1182047).
- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: drop unused parameter qgroup_reserved (bsc#1182261).
- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1182261).
- btrfs: fix qgroup_free wrong num_bytes in btrfs_subvolume_reserve_metadata (bsc#1182261).
- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).
- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).
- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).
- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).
- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).
- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).
- btrfs: qgroup: Do not hold qgroup_ioctl_lock in btrfs_qgroup_inherit() (bsc#1165823).
- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).
- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).
- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).
- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).
- btrfs: qgroup: Fix reserved data space leak if we have multiple reserve calls (bsc#1152975).
- btrfs: qgroup: Fix the wrong target io_tree when freeing reserved data space (bsc#1152974).
- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).
- btrfs: qgroup: mark qgroup inconsistent if we're inherting snapshot to a new qgroup (bsc#1165823).
- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).
- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).
- btrfs: remove unused parameter from btrfs_subvolume_release_metadata (bsc#1182261).
- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).
- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- hv_netvsc: remove ndo_poll_controller (bsc#1185248).
- KVM: Add proper lockdep assertion in I/O bus unregister (bsc#1185555).
- KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU (bsc#1185556).
- KVM: Stop looking for coalesced MMIO zones if the bus is destroyed (bsc#1185557).
- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).
- Xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-18"/>
	<updated date="2021-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120163">SUSE bug 1120163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152974">SUSE bug 1152974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152975">SUSE bug 1152975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155179">SUSE bug 1155179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155184">SUSE bug 1155184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155186">SUSE bug 1155186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159483">SUSE bug 1159483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165629">SUSE bug 1165629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165823">SUSE bug 1165823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172247">SUSE bug 1172247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176720">SUSE bug 1176720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177855">SUSE bug 1177855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177856">SUSE bug 1177856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178634">SUSE bug 1178634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179575">SUSE bug 1179575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182047">SUSE bug 1182047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182261">SUSE bug 1182261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183069">SUSE bug 1183069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183593">SUSE bug 1183593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184120">SUSE bug 1184120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184167">SUSE bug 1184167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184168">SUSE bug 1184168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184194">SUSE bug 1184194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184393">SUSE bug 1184393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184397">SUSE bug 1184397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184509">SUSE bug 1184509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184583">SUSE bug 1184583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185248">SUSE bug 1185248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185555">SUSE bug 1185555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185556">SUSE bug 1185556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185557">SUSE bug 1185557</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0433/">CVE-2020-0433 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0433">CVE-2020-0433 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25670">CVE-2020-25670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25671">CVE-2020-25671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25672">CVE-2020-25672 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25673">CVE-2020-25673 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27673/">CVE-2020-27673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27673">CVE-2020-27673 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36312/">CVE-2020-36312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36312">CVE-2020-36312 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20219/">CVE-2021-20219 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20219">CVE-2021-20219 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28038/">CVE-2021-28038 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28038">CVE-2021-28038 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28660">CVE-2021-28660 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28950">CVE-2021-28950 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28972">CVE-2021-28972 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29264/">CVE-2021-29264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29264">CVE-2021-29264 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29265/">CVE-2021-29265 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29265">CVE-2021-29265 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29650">CVE-2021-29650 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30002">CVE-2021-30002 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3483">CVE-2021-3483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555454" comment="kernel-default-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555455" comment="kernel-default-base-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555456" comment="kernel-default-devel-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538971" comment="kernel-default-kgraft-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555457" comment="kernel-default-man-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538972" comment="kernel-devel-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538973" comment="kernel-macros-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538974" comment="kernel-source-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555458" comment="kernel-syms-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538976" comment="kgraft-patch-4_4_180-94_144-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150234" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1185900" ref_url="https://bugzilla.suse.com/1185900" source="BUGZILLA"/>
		<reference ref_id="1185904" ref_url="https://bugzilla.suse.com/1185904" source="BUGZILLA"/>
		<reference ref_id="1185905" ref_url="https://bugzilla.suse.com/1185905" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18804" ref_url="https://www.suse.com/security/cve/CVE-2019-18804/" source="CVE"/>
		<reference ref_id="CVE-2021-32491" ref_url="https://www.suse.com/security/cve/CVE-2021-32491/" source="CVE"/>
		<reference ref_id="CVE-2021-32492" ref_url="https://www.suse.com/security/cve/CVE-2021-32492/" source="CVE"/>
		<reference ref_id="CVE-2021-32493" ref_url="https://www.suse.com/security/cve/CVE-2021-32493/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008794.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

Security issues fixed:

- CVE-2021-32491 [bsc#1185900]: Integer overflow in function render() in tools/ddjvu via crafted djvu file
- CVE-2021-32492 [bsc#1185904]: Out of bounds read in function DJVU:DataPool:has_data() via crafted djvu file
- CVE-2021-32493 [bsc#1185905]: Heap buffer overflow in function DJVU:GBitmap:decode() via crafted djvu file
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185900">SUSE bug 1185900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185904">SUSE bug 1185904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185905">SUSE bug 1185905</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18804/">CVE-2019-18804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18804">CVE-2019-18804 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32491/">CVE-2021-32491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32491">CVE-2021-32491 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32492/">CVE-2021-32492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32492">CVE-2021-32492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32493/">CVE-2021-32493 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32493">CVE-2021-32493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555459" comment="libdjvulibre21-3.5.25.3-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150235" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1185833" ref_url="https://bugzilla.suse.com/1185833" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-18032" ref_url="https://www.suse.com/security/cve/CVE-2020-18032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008793.html" source="SUSE-SU"/>
		<description>
This update for graphviz fixes the following issues:

- CVE-2020-18032: Fixed possible remote code execution via buffer overflow (bsc#1185833).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185833">SUSE bug 1185833</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-18032/">CVE-2020-18032 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18032">CVE-2020-18032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555460" comment="graphviz-2.28.0-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555461" comment="graphviz-gd-2.28.0-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555462" comment="graphviz-gnome-2.28.0-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555463" comment="graphviz-tcl-2.28.0-29.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150236" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="1185698" ref_url="https://bugzilla.suse.com/1185698" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008798.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:

CVE-2021-3537: NULL pointer dereference in valid.c:xmlValidBuildAContentModel (bsc#1185698)
- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in entities.c:xmlEncodeEntitiesInternal (bsc#1185409).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185698">SUSE bug 1185698</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">CVE-2021-3537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555464" comment="libxml2-2-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555465" comment="libxml2-2-32bit-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538984" comment="libxml2-doc-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555466" comment="libxml2-tools-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555467" comment="python-libxml2-2.9.4-46.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150237" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1176076" ref_url="https://bugzilla.suse.com/1176076" source="BUGZILLA"/>
		<reference ref_id="1177077" ref_url="https://bugzilla.suse.com/1177077" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681/" source="CVE"/>
		<reference ref_id="CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682/" source="CVE"/>
		<reference ref_id="CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683/" source="CVE"/>
		<reference ref_id="CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684/" source="CVE"/>
		<reference ref_id="CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685/" source="CVE"/>
		<reference ref_id="CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686/" source="CVE"/>
		<reference ref_id="CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- bsc#1177077: Fixed DNSpooq vulnerabilities
- CVE-2020-25684, CVE-2020-25685, CVE-2020-25686:
  Fixed multiple Cache Poisoning attacks.
- CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687:
  Fixed multiple potential Heap-based overflows when DNSSEC is
  enabled.

- Retry query to other servers on receipt of SERVFAIL rcode
  (bsc#1176076)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-19"/>
	<updated date="2021-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176076">SUSE bug 1176076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25681">CVE-2020-25681 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25682">CVE-2020-25682 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25683">CVE-2020-25683 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25684">CVE-2020-25684 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25685">CVE-2020-25685 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25686">CVE-2020-25686 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25687">CVE-2020-25687 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555468" comment="dnsmasq-2.78-18.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150238" version="1" class="patch">
	<metadata>
		<title>Security update for flac (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1180099" ref_url="https://bugzilla.suse.com/1180099" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0499" ref_url="https://www.suse.com/security/cve/CVE-2020-0499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008132.html" source="SUSE-SU"/>
		<description>
This update for flac fixes the following issues:

- CVE-2020-0499: Fixed an out-of-bounds access (bsc#1180099).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180099">SUSE bug 1180099</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0499/">CVE-2020-0499 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0499">CVE-2020-0499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555469" comment="libFLAC++6-1.3.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555470" comment="libFLAC8-1.3.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552055" comment="libFLAC8-32bit-1.3.0-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150239" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1180405" ref_url="https://bugzilla.suse.com/1180405" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24386" ref_url="https://www.suse.com/security/cve/CVE-2020-24386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008134.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2020-24386: Fixed an issue with IMAP hibernation that allowed users to access other users' emails (bsc#1180405).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180405">SUSE bug 1180405</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24386/">CVE-2020-24386 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24386">CVE-2020-24386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555471" comment="dovecot22-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555472" comment="dovecot22-backend-mysql-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555473" comment="dovecot22-backend-pgsql-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555474" comment="dovecot22-backend-sqlite-2.2.31-19.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150240" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1186253" ref_url="https://bugzilla.suse.com/1186253" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3500" ref_url="https://www.suse.com/security/cve/CVE-2021-3500/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008888.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3500: Stack overflow in function DJVU:DjVuDocument:get_djvu_file() via crafted djvu file (bsc#1186253)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-31"/>
	<updated date="2021-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186253">SUSE bug 1186253</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3500/">CVE-2021-3500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3500">CVE-2021-3500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555475" comment="libdjvulibre21-3.5.25.3-5.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150241" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1186382" ref_url="https://bugzilla.suse.com/1186382" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008906.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

- CVE-2021-25217: A buffer overrun in lease file parsing code can be used to exploit a common vulnerability shared by dhcpd and dhclient (bsc#1186382)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-01"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186382">SUSE bug 1186382</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25217">CVE-2021-25217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555476" comment="dhcp-4.3.3-10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555477" comment="dhcp-client-4.3.3-10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555478" comment="dhcp-relay-4.3.3-10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555479" comment="dhcp-server-4.3.3-10.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150242" version="1" class="patch">
	<metadata>
		<title>Security update for libwebp (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1185652" ref_url="https://bugzilla.suse.com/1185652" source="BUGZILLA"/>
		<reference ref_id="1185654" ref_url="https://bugzilla.suse.com/1185654" source="BUGZILLA"/>
		<reference ref_id="1185673" ref_url="https://bugzilla.suse.com/1185673" source="BUGZILLA"/>
		<reference ref_id="1185674" ref_url="https://bugzilla.suse.com/1185674" source="BUGZILLA"/>
		<reference ref_id="1185685" ref_url="https://bugzilla.suse.com/1185685" source="BUGZILLA"/>
		<reference ref_id="1185686" ref_url="https://bugzilla.suse.com/1185686" source="BUGZILLA"/>
		<reference ref_id="1185690" ref_url="https://bugzilla.suse.com/1185690" source="BUGZILLA"/>
		<reference ref_id="1185691" ref_url="https://bugzilla.suse.com/1185691" source="BUGZILLA"/>
		<reference ref_id="1186247" ref_url="https://bugzilla.suse.com/1186247" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25009" ref_url="https://www.suse.com/security/cve/CVE-2018-25009/" source="CVE"/>
		<reference ref_id="CVE-2018-25010" ref_url="https://www.suse.com/security/cve/CVE-2018-25010/" source="CVE"/>
		<reference ref_id="CVE-2018-25011" ref_url="https://www.suse.com/security/cve/CVE-2018-25011/" source="CVE"/>
		<reference ref_id="CVE-2018-25012" ref_url="https://www.suse.com/security/cve/CVE-2018-25012/" source="CVE"/>
		<reference ref_id="CVE-2018-25013" ref_url="https://www.suse.com/security/cve/CVE-2018-25013/" source="CVE"/>
		<reference ref_id="CVE-2020-36329" ref_url="https://www.suse.com/security/cve/CVE-2020-36329/" source="CVE"/>
		<reference ref_id="CVE-2020-36330" ref_url="https://www.suse.com/security/cve/CVE-2020-36330/" source="CVE"/>
		<reference ref_id="CVE-2020-36331" ref_url="https://www.suse.com/security/cve/CVE-2020-36331/" source="CVE"/>
		<reference ref_id="CVE-2020-36332" ref_url="https://www.suse.com/security/cve/CVE-2020-36332/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008911.html" source="SUSE-SU"/>
		<description>
This update for libwebp fixes the following issues:

- CVE-2018-25010: Fixed heap-based buffer overflow in ApplyFilter() (bsc#1185685).
- CVE-2020-36330: Fixed heap-based buffer overflow in ChunkVerifyAndAssign() (bsc#1185691).
- CVE-2020-36332: Fixed extreme memory allocation when reading a file (bsc#1185674).
- CVE-2020-36329: Fixed use-after-free in EmitFancyRGB() (bsc#1185652).
- CVE-2018-25012: Fixed heap-based buffer overflow in GetLE24() (bsc#1185690).
- CVE-2018-25013: Fixed heap-based buffer overflow in ShiftBytes() (bsc#1185654).
- CVE-2020-36331: Fixed heap-based buffer overflow in ChunkAssignData() (bsc#1185686).
- CVE-2018-25009: Fixed heap-based buffer overflow in GetLE16() (bsc#1185673).
- CVE-2018-25011: Fixed fail on multiple image chunks (bsc#1186247).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-02"/>
	<updated date="2021-06-02"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185652">SUSE bug 1185652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185654">SUSE bug 1185654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185673">SUSE bug 1185673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185674">SUSE bug 1185674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185685">SUSE bug 1185685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185686">SUSE bug 1185686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185690">SUSE bug 1185690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185691">SUSE bug 1185691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186247">SUSE bug 1186247</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25009/">CVE-2018-25009 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25009">CVE-2018-25009 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25010/">CVE-2018-25010 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25010">CVE-2018-25010 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25011/">CVE-2018-25011 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25011">CVE-2018-25011 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25012/">CVE-2018-25012 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25012">CVE-2018-25012 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25013/">CVE-2018-25013 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25013">CVE-2018-25013 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36329/">CVE-2020-36329 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36329">CVE-2020-36329 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36330/">CVE-2020-36330 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36330">CVE-2020-36330 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36331/">CVE-2020-36331 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36331">CVE-2020-36331 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36332/">CVE-2020-36332 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36332">CVE-2020-36332 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555480" comment="libwebp5-0.4.3-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555481" comment="libwebp5-32bit-0.4.3-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555482" comment="libwebpdemux1-0.4.3-4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150243" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1186497" ref_url="https://bugzilla.suse.com/1186497" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3560" ref_url="https://www.suse.com/security/cve/CVE-2021-3560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008927.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-3560: Fixed a local privilege escalation using polkit_system_bus_name_get_creds_sync() (bsc#1186497).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-03"/>
	<updated date="2021-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186497">SUSE bug 1186497</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3560/">CVE-2021-3560 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3560">CVE-2021-3560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555483" comment="libpolkit0-0.113-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555484" comment="polkit-0.113-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555485" comment="typelib-1_0-Polkit-1_0-0.113-5.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150244" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="1186235" ref_url="https://bugzilla.suse.com/1186235" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008939.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- Fix a kernel warning during sysfs read (bsc#1186235)
- CVE-2020-36322: An issue was discovered in the FUSE filesystem implementation in the Linux kernel aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: BPF JIT compilers in the Linux kernel have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186235">SUSE bug 1186235</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538998" comment="kgraft-patch-4_4_180-94_135-default-7-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150245" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="1186235" ref_url="https://bugzilla.suse.com/1186235" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008939.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

- Fix a kernel warning during sysfs read (bsc#1186235)
- CVE-2020-36322: An issue was discovered in the FUSE filesystem implementation in the Linux kernel aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: BPF JIT compilers in the Linux kernel have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186235">SUSE bug 1186235</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009538999" comment="kgraft-patch-4_4_180-94_130-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150246" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="1186235" ref_url="https://bugzilla.suse.com/1186235" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008939.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.

The following security issues were fixed:

- Fix a kernel warning during sysfs read (bsc#1186235)
- CVE-2020-36322: An issue was discovered in the FUSE filesystem implementation in the Linux kernel aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: BPF JIT compilers in the Linux kernel have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186235">SUSE bug 1186235</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539000" comment="kgraft-patch-4_4_180-94_127-default-10-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150247" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="1186235" ref_url="https://bugzilla.suse.com/1186235" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008939.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_124 fixes several issues.

The following security issues were fixed:

- Fix a kernel warning during sysfs read (bsc#1186235)
- CVE-2020-36322: An issue was discovered in the FUSE filesystem implementation in the Linux kernel aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: BPF JIT compilers in the Linux kernel have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186235">SUSE bug 1186235</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721283" comment="kernel-default 4.4.180-94.124 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719614" comment="kgraft-patch-4_4_180-94_124-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539001" comment="kgraft-patch-4_4_180-94_124-default-10-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150248" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="1186235" ref_url="https://bugzilla.suse.com/1186235" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008939.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_121 fixes several issues.

The following security issues were fixed:

- Fix a kernel warning during sysfs read (bsc#1186235)
- CVE-2020-36322: An issue was discovered in the FUSE filesystem implementation in the Linux kernel aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: BPF JIT compilers in the Linux kernel have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186235">SUSE bug 1186235</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721282" comment="kernel-default 4.4.180-94.121 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719612" comment="kgraft-patch-4_4_180-94_121-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539002" comment="kgraft-patch-4_4_180-94_121-default-10-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150249" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008940.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.

The following security issues were fixed:

- CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539003" comment="kgraft-patch-4_4_180-94_141-default-4-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150250" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008940.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following security issues were fixed:

- CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539004" comment="kgraft-patch-4_4_180-94_138-default-5-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150251" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1181255" ref_url="https://bugzilla.suse.com/1181255" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008942.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-bad fixes the following issues:

- CVE-2021-3185: Fixed buffer overflow in gst_h264_slice_parse_dec_ref_pic_marking (bsc#1181255).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-07"/>
	<updated date="2021-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181255">SUSE bug 1181255</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3185">CVE-2021-3185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555486" comment="gstreamer-plugins-bad-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539006" comment="gstreamer-plugins-bad-lang-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555487" comment="libgstadaptivedemux-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555488" comment="libgstbadaudio-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555489" comment="libgstbadbase-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555490" comment="libgstbadvideo-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555491" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555492" comment="libgstcodecparsers-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555493" comment="libgstgl-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555494" comment="libgstmpegts-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555495" comment="libgstphotography-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543162" comment="libgsturidownloader-1_0-0-1.8.3-18.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150252" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1185633" ref_url="https://bugzilla.suse.com/1185633" source="BUGZILLA"/>
		<reference ref_id="1186696" ref_url="https://bugzilla.suse.com/1186696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29951" ref_url="https://www.suse.com/security/cve/CVE-2021-29951/" source="CVE"/>
		<reference ref_id="CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008953.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.11.0 ESR (bsc#1186696)

  * CVE-2021-29964: Out of bounds-read when parsing a `WM_COPYDATA` message
  * CVE-2021-29967: Memory safety bugs fixed in Firefox
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185633">SUSE bug 1185633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186696">SUSE bug 1186696</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29951/">CVE-2021-29951 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29951">CVE-2021-29951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29964">CVE-2021-29964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29967">CVE-2021-29967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555496" comment="MozillaFirefox-78.11.0-112.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543163" comment="MozillaFirefox-devel-78.11.0-112.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555497" comment="MozillaFirefox-translations-common-78.11.0-112.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150253" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1186643" ref_url="https://bugzilla.suse.com/1186643" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008951.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Regression in the fix for CVE-2021-31535, causing segfaults for xforms applications like fdesign (bsc#1186643)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186643">SUSE bug 1186643</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31535">CVE-2021-31535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555498" comment="libX11-6-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555499" comment="libX11-6-32bit-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539022" comment="libX11-data-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555500" comment="libX11-xcb1-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555501" comment="libX11-xcb1-32bit-1.6.2-12.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150254" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1094725" ref_url="https://bugzilla.suse.com/1094725" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1172380" ref_url="https://bugzilla.suse.com/1172380" source="BUGZILLA"/>
		<reference ref_id="1172382" ref_url="https://bugzilla.suse.com/1172382" source="BUGZILLA"/>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1178683" ref_url="https://bugzilla.suse.com/1178683" source="BUGZILLA"/>
		<reference ref_id="1178935" ref_url="https://bugzilla.suse.com/1178935" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1181933" ref_url="https://bugzilla.suse.com/1181933" source="BUGZILLA"/>
		<reference ref_id="1182846" ref_url="https://bugzilla.suse.com/1182846" source="BUGZILLA"/>
		<reference ref_id="1182975" ref_url="https://bugzilla.suse.com/1182975" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756/" source="CVE"/>
		<reference ref_id="CVE-2020-13754" ref_url="https://www.suse.com/security/cve/CVE-2020-13754/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-25707" ref_url="https://www.suse.com/security/cve/CVE-2020-25707/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="CVE-2021-20221" ref_url="https://www.suse.com/security/cve/CVE-2021-20221/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-3419" ref_url="https://www.suse.com/security/cve/CVE-2021-3419/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- Fix OOB access during mmio operations (CVE-2020-13754, bsc#1172382)
- Fix out-of-bounds read information disclosure in icmp6_send_echoreply (CVE-2020-10756, bsc#1172380)
- Fix out-of-bound heap buffer access via an interrupt ID field (CVE-2021-20221, bsc#1181933)
- For the record, these issues are fixed in this package already.
  Most are alternate references to previously mentioned issues:
  (CVE-2019-15890, bsc#1149813, CVE-2020-8608, bsc#1163019,
  CVE-2020-14364, bsc#1175534, CVE-2020-25707, bsc#1178683,
  CVE-2020-25723, bsc#1178935, CVE-2020-29130, bsc#1179477,
  CVE-2021-20257, bsc#1182846, CVE-2021-3419, bsc#1182975,
  bsc#1094725)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1094725">SUSE bug 1094725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172380">SUSE bug 1172380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172382">SUSE bug 1172382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178683">SUSE bug 1178683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178935">SUSE bug 1178935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181933">SUSE bug 1181933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182975">SUSE bug 1182975</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10756">CVE-2020-10756 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13754/">CVE-2020-13754 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13754">CVE-2020-13754 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25707/">CVE-2020-25707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-25707">CVE-2020-25707 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25723">CVE-2020-25723 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20221/">CVE-2021-20221 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20221">CVE-2021-20221 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3419/">CVE-2021-3419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3419">CVE-2021-3419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555502" comment="qemu-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555503" comment="qemu-arm-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555504" comment="qemu-block-curl-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555505" comment="qemu-block-iscsi-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555506" comment="qemu-block-rbd-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555507" comment="qemu-block-ssh-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555508" comment="qemu-guest-agent-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539031" comment="qemu-ipxe-1.0.0+-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555509" comment="qemu-kvm-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555510" comment="qemu-lang-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539034" comment="qemu-ppc-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555511" comment="qemu-s390-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539035" comment="qemu-seabios-1.10.2_0_g5f4c7b1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539036" comment="qemu-sgabios-8-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555512" comment="qemu-tools-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539038" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539039" comment="qemu-x86-2.9.1-6.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150255" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 75 [bsc#1180063, bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14782 CVE-2020-14781
  CVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class Libraries:
    - Z/OS specific C function send_file is changing the file pointer position
  * Security:
    - Add the new oracle signer certificate
    - Certificate parsing error
    - JVM memory growth can be caused by the IBMPKCS11IMPL crypto provider
    - Remove check for websphere signed jars
    - sessionid.hashcode generates too many collisions
    - The Java 8 IBM certpath provider does not honor the user
      specified system property for CLR connect timeout
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552060" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543165" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552061" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150256" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1181686" ref_url="https://bugzilla.suse.com/1181686" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20201" ref_url="https://www.suse.com/security/cve/CVE-2021-20201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008964.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

- CVE-2021-20201: client initiated renegotiation causing denial of service (bsc#1181686)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181686">SUSE bug 1181686</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20201/">CVE-2021-20201 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20201">CVE-2021-20201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555513" comment="libspice-server1-0.12.8-18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150257" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1179833" ref_url="https://bugzilla.suse.com/1179833" source="BUGZILLA"/>
		<reference ref_id="1179836" ref_url="https://bugzilla.suse.com/1179836" source="BUGZILLA"/>
		<reference ref_id="1179837" ref_url="https://bugzilla.suse.com/1179837" source="BUGZILLA"/>
		<reference ref_id="1179839" ref_url="https://bugzilla.suse.com/1179839" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489/" source="CVE"/>
		<reference ref_id="CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511/" source="CVE"/>
		<reference ref_id="CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512/" source="CVE"/>
		<reference ref_id="CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019273.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20210608 release.

- CVE-2020-24513: A domain bypass transient execution vulnerability was discovered on some Intel Atom processors that use a micro-architectural incident channel. (INTEL-SA-00465 bsc#1179833)

  See also: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html

- CVE-2020-24511: The IBRS feature to mitigate Spectre variant 2 transient execution side channel vulnerabilities may not fully prevent non-root (guest) branches from controlling the branch predictions of the root (host) (INTEL-SA-00464 bsc#1179836)

  See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html)

- CVE-2020-24512: Fixed trivial data value cache-lines such as all-zero value cache-lines may lead to changes in cache-allocation or write-back behavior for such cache-lines (bsc#1179837 INTEL-SA-00464)

  See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html)

- CVE-2020-24489: Fixed Intel VT-d device pass through potential local privilege escalation (INTEL-SA-00442 bsc#1179839)

  See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html

Other fixes:

- Update for functional issues. Refer to [Third Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780)for details.
- Update for functional issues. Refer to [Second Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
- Update for functional issues. Refer to [Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
- Update for functional issues. Refer to [Intel Xeon Processor D-1500, D-1500 NS and D-1600 NS Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-d-1500-specification-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon E7-8800 and E7-4800 v3 Processor Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e7-v3-spec-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
- Update for functional issues. Refer to [10th Gen Intel Core Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
- Update for functional issues. Refer to [8th and 9th Gen Intel Core Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
- Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
- Update for functional issues. Refer to [6th Gen Intel Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
- Update for functional issues. Refer to [Intel Xeon E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

- New platforms:

| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| CLX-SP         | A0       | 06-55-05/b7 |          | 03000010 | Xeon Scalable Gen2
| ICX-SP         | C0       | 06-6a-05/87 |          | 0c0002f0 | Xeon Scalable Gen3
| ICX-SP         | D0       | 06-6a-06/87 |          | 0d0002a0 | Xeon Scalable Gen3
| SNR            | B0       | 06-86-04/01 |          | 0b00000f | Atom P59xxB
| SNR            | B1       | 06-86-05/01 |          | 0b00000f | Atom P59xxB
| TGL            | B1       | 06-8c-01/80 |          | 00000088 | Core Gen11 Mobile
| TGL-R          | C0       | 06-8c-02/c2 |          | 00000016 | Core Gen11 Mobile
| TGL-H          | R0       | 06-8d-01/c2 |          | 0000002c | Core Gen11 Mobile
| EHL            | B1       | 06-96-01/01 |          | 00000011 | Pentium J6426/N6415, Celeron J6412/J6413/N6210/N6211, Atom x6000E
| JSL            | A0/A1    | 06-9c-00/01 |          | 0000001d | Pentium N6000/N6005, Celeron N4500/N4505/N5100/N5105
| RKL-S          | B0       | 06-a7-01/02 |          | 00000040 | Core Gen11

- Updated platforms:

| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000044 | 00000046 | Core Gen4 X series; Xeon E5 v3
| HSX-EX         | E0       | 06-3f-04/80 | 00000016 | 00000019 | Xeon E7 v3
| SKL-U/Y        | D0       | 06-4e-03/c0 | 000000e2 | 000000ea | Core Gen6 Mobile
| SKL-U23e       | K1       | 06-4e-03/c0 | 000000e2 | 000000ea | Core Gen6 Mobile
| BDX-ML         | B0/M0/R0 | 06-4f-01/ef | 0b000038 | 0b00003e | Xeon E5/E7 v4; Core i7-69xx/68xx
| SKX-SP         | B1       | 06-55-03/97 | 01000159 | 0100015b | Xeon Scalable
| SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006a0a | 02006b06 | Xeon Scalable
| SKX-D          | M1       | 06-55-04/b7 | 02006a0a | 02006b06 | Xeon D-21xx
| CLX-SP         | B0       | 06-55-06/bf | 04003006 | 04003102 | Xeon Scalable Gen2
| CLX-SP         | B1       | 06-55-07/bf | 05003006 | 05003102 | Xeon Scalable Gen2
| CPX-SP         | A1       | 06-55-0b/bf | 0700001e | 07002302 | Xeon Scalable Gen3
| BDX-DE         | V2/V3    | 06-56-03/10 | 07000019 | 0700001b | Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
| BDX-DE         | Y0       | 06-56-04/10 | 0f000017 | 0f000019 | Xeon D-1557/59/67/71/77/81/87
| BDX-NS         | A0       | 06-56-05/10 | 0e00000f | 0e000012 | Xeon D-1513N/23/33/43/53
| APL            | D0       | 06-5c-09/03 | 00000040 | 00000044 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
| APL            | E0       | 06-5c-0a/03 | 0000001e | 00000020 | Atom x5-E39xx
| SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000e2 | 000000ea | Core Gen6; Xeon E3 v5
| DNV            | B0       | 06-5f-01/01 | 0000002e | 00000034 | Atom C Series
| GLK            | B0       | 06-7a-01/01 | 00000034 | 00000036 | Pentium Silver N/J5xxx, Celeron N/J4xxx
| GKL-R          | R0       | 06-7a-08/01 | 00000018 | 0000001a | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
| ICL-U/Y        | D1       | 06-7e-05/80 | 000000a0 | 000000a6 | Core Gen10 Mobile
| LKF            | B2/B3    | 06-8a-01/10 | 00000028 | 0000002a | Core w/Hybrid Technology
| AML-Y22        | H0       | 06-8e-09/10 | 000000de | 000000ea | Core Gen8 Mobile
| KBL-U/Y        | H0       | 06-8e-09/c0 | 000000de | 000000ea | Core Gen7 Mobile
| CFL-U43e       | D0       | 06-8e-0a/c0 | 000000e0 | 000000ea | Core Gen8 Mobile
| WHL-U          | W0       | 06-8e-0b/d0 | 000000de | 000000ea | Core Gen8 Mobile
| AML-Y42        | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen10 Mobile
| CML-Y42        | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen10 Mobile
| WHL-U          | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen8 Mobile
| KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000de | 000000ea | Core Gen7; Xeon E3 v6
| CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000de | 000000ea | Core Gen8 Desktop, Mobile, Xeon E
| CFL-S          | B0       | 06-9e-0b/02 | 000000de | 000000ea | Core Gen8
| CFL-H/S        | P0       | 06-9e-0c/22 | 000000de | 000000ea | Core Gen9
| CFL-H          | R0       | 06-9e-0d/22 | 000000de | 000000ea | Core Gen9 Mobile
| CML-H          | R1       | 06-a5-02/20 | 000000e0 | 000000ea | Core Gen10 Mobile
| CML-S62        | G1       | 06-a5-03/22 | 000000e0 | 000000ea | Core Gen10
| CML-S102       | Q0       | 06-a5-05/22 | 000000e0 | 000000ec | Core Gen10
| CML-U62        | A0       | 06-a6-00/80 | 000000e0 | 000000e8 | Core Gen10 Mobile
| CML-U62 V2     | K0       | 06-a6-01/80 | 000000e0 | 000000ea | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-10"/>
	<updated date="2021-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179833">SUSE bug 1179833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179836">SUSE bug 1179836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179837">SUSE bug 1179837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179839">SUSE bug 1179839</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24489">CVE-2020-24489 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24511">CVE-2020-24511 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24512">CVE-2020-24512 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24513">CVE-2020-24513 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539041" comment="ucode-intel-20210525-13.90.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150258" version="1" class="patch">
	<metadata>
		<title>Security update for caribou (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1186617" ref_url="https://bugzilla.suse.com/1186617" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3567" ref_url="https://www.suse.com/security/cve/CVE-2021-3567/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008985.html" source="SUSE-SU"/>
		<description>
This update for caribou fixes the following issues:

Security issue fixed:

- CVE-2021-3567: Fixed a segfault when attempting to use shifted characters (bsc#1186617).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-10"/>
	<updated date="2021-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186617">SUSE bug 1186617</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3567/">CVE-2021-3567 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3567">CVE-2021-3567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555514" comment="caribou-common-0.4.21-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555515" comment="libcaribou0-0.4.21-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555516" comment="typelib-1_0-Caribou-1_0-0.4.21-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150259" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1184016" ref_url="https://bugzilla.suse.com/1184016" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009000.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

- Do not log passwords in logfiles (bsc#1184016)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-11"/>
	<updated date="2021-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184016">SUSE bug 1184016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555517" comment="freeradius-server-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555518" comment="freeradius-server-doc-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555519" comment="freeradius-server-krb5-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555520" comment="freeradius-server-ldap-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555521" comment="freeradius-server-libs-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555522" comment="freeradius-server-mysql-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555523" comment="freeradius-server-perl-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555524" comment="freeradius-server-postgresql-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555525" comment="freeradius-server-python-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555526" comment="freeradius-server-sqlite-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555527" comment="freeradius-server-utils-3.0.15-2.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150260" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009020.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u292 (icedtea 3.19.0).
- CVE-2021-2161: Fixed incomplete enforcement of JAR signing disabled algorithms (bsc#1185055).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-15"/>
	<updated date="2021-06-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555528" comment="java-1_8_0-openjdk-1.8.0.292-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555529" comment="java-1_8_0-openjdk-demo-1.8.0.292-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555530" comment="java-1_8_0-openjdk-devel-1.8.0.292-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555531" comment="java-1_8_0-openjdk-headless-1.8.0.292-27.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150261" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1179103" ref_url="https://bugzilla.suse.com/1179103" source="BUGZILLA"/>
		<reference ref_id="1179202" ref_url="https://bugzilla.suse.com/1179202" source="BUGZILLA"/>
		<reference ref_id="1179208" ref_url="https://bugzilla.suse.com/1179208" source="BUGZILLA"/>
		<reference ref_id="1179212" ref_url="https://bugzilla.suse.com/1179212" source="BUGZILLA"/>
		<reference ref_id="1179223" ref_url="https://bugzilla.suse.com/1179223" source="BUGZILLA"/>
		<reference ref_id="1179240" ref_url="https://bugzilla.suse.com/1179240" source="BUGZILLA"/>
		<reference ref_id="1179244" ref_url="https://bugzilla.suse.com/1179244" source="BUGZILLA"/>
		<reference ref_id="1179260" ref_url="https://bugzilla.suse.com/1179260" source="BUGZILLA"/>
		<reference ref_id="1179268" ref_url="https://bugzilla.suse.com/1179268" source="BUGZILLA"/>
		<reference ref_id="1179269" ref_url="https://bugzilla.suse.com/1179269" source="BUGZILLA"/>
		<reference ref_id="1179278" ref_url="https://bugzilla.suse.com/1179278" source="BUGZILLA"/>
		<reference ref_id="1179281" ref_url="https://bugzilla.suse.com/1179281" source="BUGZILLA"/>
		<reference ref_id="1179285" ref_url="https://bugzilla.suse.com/1179285" source="BUGZILLA"/>
		<reference ref_id="1179311" ref_url="https://bugzilla.suse.com/1179311" source="BUGZILLA"/>
		<reference ref_id="1179312" ref_url="https://bugzilla.suse.com/1179312" source="BUGZILLA"/>
		<reference ref_id="1179313" ref_url="https://bugzilla.suse.com/1179313" source="BUGZILLA"/>
		<reference ref_id="1179315" ref_url="https://bugzilla.suse.com/1179315" source="BUGZILLA"/>
		<reference ref_id="1179317" ref_url="https://bugzilla.suse.com/1179317" source="BUGZILLA"/>
		<reference ref_id="1179321" ref_url="https://bugzilla.suse.com/1179321" source="BUGZILLA"/>
		<reference ref_id="1179322" ref_url="https://bugzilla.suse.com/1179322" source="BUGZILLA"/>
		<reference ref_id="1179327" ref_url="https://bugzilla.suse.com/1179327" source="BUGZILLA"/>
		<reference ref_id="1179333" ref_url="https://bugzilla.suse.com/1179333" source="BUGZILLA"/>
		<reference ref_id="1179336" ref_url="https://bugzilla.suse.com/1179336" source="BUGZILLA"/>
		<reference ref_id="1179338" ref_url="https://bugzilla.suse.com/1179338" source="BUGZILLA"/>
		<reference ref_id="1179339" ref_url="https://bugzilla.suse.com/1179339" source="BUGZILLA"/>
		<reference ref_id="1179343" ref_url="https://bugzilla.suse.com/1179343" source="BUGZILLA"/>
		<reference ref_id="1179345" ref_url="https://bugzilla.suse.com/1179345" source="BUGZILLA"/>
		<reference ref_id="1179346" ref_url="https://bugzilla.suse.com/1179346" source="BUGZILLA"/>
		<reference ref_id="1179347" ref_url="https://bugzilla.suse.com/1179347" source="BUGZILLA"/>
		<reference ref_id="1179361" ref_url="https://bugzilla.suse.com/1179361" source="BUGZILLA"/>
		<reference ref_id="1179362" ref_url="https://bugzilla.suse.com/1179362" source="BUGZILLA"/>
		<reference ref_id="1179397" ref_url="https://bugzilla.suse.com/1179397" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667/" source="CVE"/>
		<reference ref_id="CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664/" source="CVE"/>
		<reference ref_id="CVE-2020-25665" ref_url="https://www.suse.com/security/cve/CVE-2020-25665/" source="CVE"/>
		<reference ref_id="CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666/" source="CVE"/>
		<reference ref_id="CVE-2020-25674" ref_url="https://www.suse.com/security/cve/CVE-2020-25674/" source="CVE"/>
		<reference ref_id="CVE-2020-25675" ref_url="https://www.suse.com/security/cve/CVE-2020-25675/" source="CVE"/>
		<reference ref_id="CVE-2020-25676" ref_url="https://www.suse.com/security/cve/CVE-2020-25676/" source="CVE"/>
		<reference ref_id="CVE-2020-27750" ref_url="https://www.suse.com/security/cve/CVE-2020-27750/" source="CVE"/>
		<reference ref_id="CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751/" source="CVE"/>
		<reference ref_id="CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752/" source="CVE"/>
		<reference ref_id="CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753/" source="CVE"/>
		<reference ref_id="CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754/" source="CVE"/>
		<reference ref_id="CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755/" source="CVE"/>
		<reference ref_id="CVE-2020-27757" ref_url="https://www.suse.com/security/cve/CVE-2020-27757/" source="CVE"/>
		<reference ref_id="CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759/" source="CVE"/>
		<reference ref_id="CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760/" source="CVE"/>
		<reference ref_id="CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761/" source="CVE"/>
		<reference ref_id="CVE-2020-27762" ref_url="https://www.suse.com/security/cve/CVE-2020-27762/" source="CVE"/>
		<reference ref_id="CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763/" source="CVE"/>
		<reference ref_id="CVE-2020-27764" ref_url="https://www.suse.com/security/cve/CVE-2020-27764/" source="CVE"/>
		<reference ref_id="CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765/" source="CVE"/>
		<reference ref_id="CVE-2020-27766" ref_url="https://www.suse.com/security/cve/CVE-2020-27766/" source="CVE"/>
		<reference ref_id="CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767/" source="CVE"/>
		<reference ref_id="CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768/" source="CVE"/>
		<reference ref_id="CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769/" source="CVE"/>
		<reference ref_id="CVE-2020-27770" ref_url="https://www.suse.com/security/cve/CVE-2020-27770/" source="CVE"/>
		<reference ref_id="CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771/" source="CVE"/>
		<reference ref_id="CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772/" source="CVE"/>
		<reference ref_id="CVE-2020-27773" ref_url="https://www.suse.com/security/cve/CVE-2020-27773/" source="CVE"/>
		<reference ref_id="CVE-2020-27774" ref_url="https://www.suse.com/security/cve/CVE-2020-27774/" source="CVE"/>
		<reference ref_id="CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775/" source="CVE"/>
		<reference ref_id="CVE-2020-27776" ref_url="https://www.suse.com/security/cve/CVE-2020-27776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103).
- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202).
- CVE-2020-25665: Fixed a heap-based buffer overflow in WritePALMImage (bsc#1179208).
- CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212).
- CVE-2020-25674: Fixed a heap-based buffer overflow in WriteOnePNGImage (bsc#1179223).
- CVE-2020-25675: Fixed an outside the range of representable values of type 'long' and integer overflow (bsc#1179240).
- CVE-2020-25676: Fixed an outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c (bsc#1179244).
- CVE-2020-27750: Fixed an division by zero in MagickCore/colorspace-private.h (bsc#1179260).
- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397).
- CVE-2020-27754: Fixed an outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336).
- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345).
- CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
- CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313).
- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281).
- CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315).
- CVE-2020-27762: Fixed an outside the range of representable values of type 'unsigned char' (bsc#1179278).
- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312).
- CVE-2020-27764: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179317).
- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311).
- CVE-2020-27766: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179361).
- CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322).
- CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
- CVE-2020-27769: Fixed an outside the range of representable values of type 'float' at MagickCore/quantize.c (bsc#1179321).
- CVE-2020-27770: Fixed an unsigned offset overflowed at MagickCore/string.c (bsc#1179343).
- CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327).
- CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347).
- CVE-2020-27773: Fixed a division by zero at MagickCore/gem-private.h (bsc#1179285).
- CVE-2020-27774: Fixed an integer overflow at MagickCore/statistic.c (bsc#1179333).
- CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
- CVE-2020-27776: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179362).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-22"/>
	<updated date="2021-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179103">SUSE bug 1179103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179208">SUSE bug 1179208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179212">SUSE bug 1179212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179223">SUSE bug 1179223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179240">SUSE bug 1179240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179244">SUSE bug 1179244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179260">SUSE bug 1179260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179268">SUSE bug 1179268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179278">SUSE bug 1179278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179281">SUSE bug 1179281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179285">SUSE bug 1179285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179311">SUSE bug 1179311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179312">SUSE bug 1179312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179315">SUSE bug 1179315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179317">SUSE bug 1179317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179327">SUSE bug 1179327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179338">SUSE bug 1179338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179339">SUSE bug 1179339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179343">SUSE bug 1179343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179345">SUSE bug 1179345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179347">SUSE bug 1179347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179361">SUSE bug 1179361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179362">SUSE bug 1179362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179397">SUSE bug 1179397</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19667">CVE-2020-19667 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25664">CVE-2020-25664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25665/">CVE-2020-25665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25665">CVE-2020-25665 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25666">CVE-2020-25666 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25674/">CVE-2020-25674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25674">CVE-2020-25674 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25675/">CVE-2020-25675 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25675">CVE-2020-25675 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25676/">CVE-2020-25676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25676">CVE-2020-25676 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27750/">CVE-2020-27750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27750">CVE-2020-27750 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27751">CVE-2020-27751 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27752">CVE-2020-27752 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27753">CVE-2020-27753 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27754">CVE-2020-27754 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27755">CVE-2020-27755 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27757/">CVE-2020-27757 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27757">CVE-2020-27757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27759">CVE-2020-27759 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27760">CVE-2020-27760 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27761">CVE-2020-27761 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27762/">CVE-2020-27762 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27762">CVE-2020-27762 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27763">CVE-2020-27763 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27764/">CVE-2020-27764 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27764">CVE-2020-27764 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27765">CVE-2020-27765 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27766/">CVE-2020-27766 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27766">CVE-2020-27766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27767">CVE-2020-27767 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27768">CVE-2020-27768 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27769">CVE-2020-27769 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27770/">CVE-2020-27770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27770">CVE-2020-27770 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27771">CVE-2020-27771 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27772">CVE-2020-27772 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27773/">CVE-2020-27773 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27773">CVE-2020-27773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27774/">CVE-2020-27774 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27774">CVE-2020-27774 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27775">CVE-2020-27775 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27776/">CVE-2020-27776 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27776">CVE-2020-27776 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009543178" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543179" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555538" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555539" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150262" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1177087" ref_url="https://bugzilla.suse.com/1177087" source="BUGZILLA"/>
		<reference ref_id="1179122" ref_url="https://bugzilla.suse.com/1179122" source="BUGZILLA"/>
		<reference ref_id="1179451" ref_url="https://bugzilla.suse.com/1179451" source="BUGZILLA"/>
		<reference ref_id="1182286" ref_url="https://bugzilla.suse.com/1182286" source="BUGZILLA"/>
		<reference ref_id="1184155" ref_url="https://bugzilla.suse.com/1184155" source="BUGZILLA"/>
		<reference ref_id="1184262" ref_url="https://bugzilla.suse.com/1184262" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13543" ref_url="https://www.suse.com/security/cve/CVE-2020-13543/" source="CVE"/>
		<reference ref_id="CVE-2020-13558" ref_url="https://www.suse.com/security/cve/CVE-2020-13558/" source="CVE"/>
		<reference ref_id="CVE-2020-13584" ref_url="https://www.suse.com/security/cve/CVE-2020-13584/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9983" ref_url="https://www.suse.com/security/cve/CVE-2020-9983/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1789" ref_url="https://www.suse.com/security/cve/CVE-2021-1789/" source="CVE"/>
		<reference ref_id="CVE-2021-1799" ref_url="https://www.suse.com/security/cve/CVE-2021-1799/" source="CVE"/>
		<reference ref_id="CVE-2021-1801" ref_url="https://www.suse.com/security/cve/CVE-2021-1801/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1870" ref_url="https://www.suse.com/security/cve/CVE-2021-1870/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.1:
  + Improve handling of Media Capture devices.
  + Improve WebAudio playback.
  + Improve video orientation handling.
  + Improve seeking support for MSE playback.
  + Improve flush support in EME decryptors.
  + Fix HTTP status codes for requests done through a custom URI handler.
  + Fix the Bubblewrap sandbox in certain 32-bit systems.
  + Fix inconsistencies between the WebKitWebView.is-muted property
    state and values returned by
    webkit_web_view_is_playing_audio().
  + Fix the build with ENABLE_VIDEO=OFF.
  + Fix wrong timestamps for long-lived cookies.
  + Fix UI process crash when failing to load favicons.
  + Fix several crashes and rendering issues.
- Including Security fixes for: CVE-2021-1788, CVE-2021-1844, CVE-2021-1871,
    CVE-2020-27918, CVE-2020-29623, CVE-2021-1765, CVE-2021-1789, CVE-2021-1799,
    CVE-2021-1801, CVE-2021-1870, CVE-2020-13558, CVE-2020-13584, CVE-2020-9983, 
    CVE-2020-13543, CVE-2020-9947, CVE-2020-9948, CVE-2020-9951.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177087">SUSE bug 1177087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179122">SUSE bug 1179122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179451">SUSE bug 1179451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182286">SUSE bug 1182286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184155">SUSE bug 1184155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13543/">CVE-2020-13543 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13543">CVE-2020-13543 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13558/">CVE-2020-13558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13558">CVE-2020-13558 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13584/">CVE-2020-13584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13584">CVE-2020-13584 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27918">CVE-2020-27918 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29623">CVE-2020-29623 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9947">CVE-2020-9947 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9948">CVE-2020-9948 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9951">CVE-2020-9951 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9983/">CVE-2020-9983 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9983">CVE-2020-9983 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1765">CVE-2021-1765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1788">CVE-2021-1788 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1789/">CVE-2021-1789 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1789">CVE-2021-1789 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1799/">CVE-2021-1799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1799">CVE-2021-1799 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1801/">CVE-2021-1801 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1801">CVE-2021-1801 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1844">CVE-2021-1844 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1870/">CVE-2021-1870 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1870">CVE-2021-1870 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1871">CVE-2021-1871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555540" comment="libjavascriptcoregtk-4_0-18-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555541" comment="libwebkit2gtk-4_0-37-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539068" comment="libwebkit2gtk3-lang-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555542" comment="typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555543" comment="typelib-1_0-WebKit2-4_0-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543184" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555544" comment="webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150263" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1186922" ref_url="https://bugzilla.suse.com/1186922" source="BUGZILLA"/>
		<reference ref_id="1186923" ref_url="https://bugzilla.suse.com/1186923" source="BUGZILLA"/>
		<reference ref_id="1186924" ref_url="https://bugzilla.suse.com/1186924" source="BUGZILLA"/>
		<reference ref_id="1187017" ref_url="https://bugzilla.suse.com/1187017" source="BUGZILLA"/>
		<reference ref_id="1187174" ref_url="https://bugzilla.suse.com/1187174" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35452" ref_url="https://www.suse.com/security/cve/CVE-2020-35452/" source="CVE"/>
		<reference ref_id="CVE-2021-26690" ref_url="https://www.suse.com/security/cve/CVE-2021-26690/" source="CVE"/>
		<reference ref_id="CVE-2021-26691" ref_url="https://www.suse.com/security/cve/CVE-2021-26691/" source="CVE"/>
		<reference ref_id="CVE-2021-30641" ref_url="https://www.suse.com/security/cve/CVE-2021-30641/" source="CVE"/>
		<reference ref_id="CVE-2021-31618" ref_url="https://www.suse.com/security/cve/CVE-2021-31618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009032.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- fixed CVE-2021-30641 [bsc#1187174]: MergeSlashes regression
- fixed CVE-2021-31618 [bsc#1186924]: NULL pointer dereference on specially crafted HTTP/2 request
- fixed CVE-2020-35452 [bsc#1186922]: Single zero byte stack overflow in mod_auth_digest 
- fixed CVE-2021-26690 [bsc#1186923]: mod_session NULL pointer dereference in parser
- fixed CVE-2021-26691 [bsc#1187017]: Heap overflow in mod_session
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186922">SUSE bug 1186922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186923">SUSE bug 1186923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186924">SUSE bug 1186924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187017">SUSE bug 1187017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187174">SUSE bug 1187174</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35452/">CVE-2020-35452 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35452">CVE-2020-35452 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26690/">CVE-2021-26690 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26690">CVE-2021-26690 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26691/">CVE-2021-26691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26691">CVE-2021-26691 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30641/">CVE-2021-30641 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30641">CVE-2021-30641 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31618/">CVE-2021-31618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31618">CVE-2021-31618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555545" comment="apache2-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539074" comment="apache2-doc-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555546" comment="apache2-example-pages-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555547" comment="apache2-prefork-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555548" comment="apache2-utils-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555549" comment="apache2-worker-2.4.23-29.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150264" version="1" class="patch">
	<metadata>
		<title>Security update for xterm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182091" ref_url="https://bugzilla.suse.com/1182091" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009039.html" source="SUSE-SU"/>
		<description>
This update for xterm fixes the following issues:

- CVE-2021-27135: Fixed buffer-overflow when clicking on selected utf8 text. (bsc#1182091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182091">SUSE bug 1182091</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27135">CVE-2021-27135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555550" comment="xterm-308-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150265" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="1186235" ref_url="https://bugzilla.suse.com/1186235" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009045.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes several issues.

The following issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-28688: Fixed an issue introduced by XSA-365, leaving around zombie domains after xen guest has died (bsc#1183646).
- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. (bsc#1176724).
- Fixed a regression with the last livepatch which caused a kernel warning during sysfs read (bsc#1186235).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186235">SUSE bug 1186235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539080" comment="kgraft-patch-4_4_180-94_144-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150266" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186235" ref_url="https://bugzilla.suse.com/1186235" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009041.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.

The following issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- Fixed a regression with the last livepatch which caused a kernel warning during sysfs read (bsc#1186235).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186235">SUSE bug 1186235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539081" comment="kgraft-patch-4_4_180-94_141-default-5-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150267" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186235" ref_url="https://bugzilla.suse.com/1186235" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009041.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- Fixed a regression with the last livepatch which caused a kernel warning during sysfs read (bsc#1186235).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186235">SUSE bug 1186235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539082" comment="kgraft-patch-4_4_180-94_138-default-6-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150268" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009049.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539083" comment="kgraft-patch-4_4_180-94_135-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150269" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009049.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539084" comment="kgraft-patch-4_4_180-94_130-default-10-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150270" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009049.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.

The following security issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539085" comment="kgraft-patch-4_4_180-94_127-default-11-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150271" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009049.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_124 fixes several issues.

The following security issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721283" comment="kernel-default 4.4.180-94.124 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719614" comment="kgraft-patch-4_4_180-94_124-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539086" comment="kgraft-patch-4_4_180-94_124-default-11-2.3 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150272" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1186151" ref_url="https://bugzilla.suse.com/1186151" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009071.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

- Fixed a possible  buffer overflow in IScsiDxe (bsc#1186151)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-22"/>
	<updated date="2021-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186151">SUSE bug 1186151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555551" comment="ovmf-2017+git1492060560.b6d11d7c46-4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555552" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539089" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555553" comment="qemu-uefi-aarch64-2017+git1492060560.b6d11d7c46-4.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150273" version="1" class="patch">
	<metadata>
		<title>Security update for libnettle (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1187060" ref_url="https://bugzilla.suse.com/1187060" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3580" ref_url="https://www.suse.com/security/cve/CVE-2021-3580/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009077.html" source="SUSE-SU"/>
		<description>
This update for libnettle fixes the following issues:

- CVE-2021-3580: Fixed a remote denial of service in the RSA decryption via manipulated ciphertext (bsc#1187060).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-23"/>
	<updated date="2021-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187060">SUSE bug 1187060</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3580/">CVE-2021-3580 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3580">CVE-2021-3580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555554" comment="libhogweed2-2.7.1-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555555" comment="libhogweed2-32bit-2.7.1-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555556" comment="libnettle4-2.7.1-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555557" comment="libnettle4-32bit-2.7.1-13.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150274" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1187212" ref_url="https://bugzilla.suse.com/1187212" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009087.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2021-33560: Fixed a side-channel against ElGamal encryption, caused by missing exponent blinding (bsc#1187212).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-24"/>
	<updated date="2021-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187212">SUSE bug 1187212</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">CVE-2021-33560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555558" comment="libgcrypt20-1.6.1-16.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555559" comment="libgcrypt20-32bit-1.6.1-16.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555560" comment="libgcrypt20-hmac-1.6.1-16.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555561" comment="libgcrypt20-hmac-32bit-1.6.1-16.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150275" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1184354" ref_url="https://bugzilla.suse.com/1184354" source="BUGZILLA"/>
		<reference ref_id="1187310" ref_url="https://bugzilla.suse.com/1187310" source="BUGZILLA"/>
		<reference ref_id="1187395" ref_url="https://bugzilla.suse.com/1187395" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3479" ref_url="https://www.suse.com/security/cve/CVE-2021-3479/" source="CVE"/>
		<reference ref_id="CVE-2021-3598" ref_url="https://www.suse.com/security/cve/CVE-2021-3598/" source="CVE"/>
		<reference ref_id="CVE-2021-3605" ref_url="https://www.suse.com/security/cve/CVE-2021-3605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009088.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- Fixed CVE-2021-3479 [bsc#1184354]: Out-of-memory caused by allocation of a very large buffer
- Fixed CVE-2021-3605 [bsc#1187395]: Heap buffer overflow in the rleUncompress function
- Fixed CVE-2021-3598 [bsc#1187310]: Heap buffer overflow in Imf_3_1:CharPtrIO:readChars
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-24"/>
	<updated date="2021-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184354">SUSE bug 1184354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187310">SUSE bug 1187310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187395">SUSE bug 1187395</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3479/">CVE-2021-3479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3479">CVE-2021-3479 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3598/">CVE-2021-3598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3598">CVE-2021-3598 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3605/">CVE-2021-3605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3605">CVE-2021-3605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555562" comment="libIlmImf-Imf_2_1-21-2.1.0-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555563" comment="openexr-2.1.0-6.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150276" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql12, postgresql13 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="1178961" ref_url="https://bugzilla.suse.com/1178961" source="BUGZILLA"/>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008245.html" source="SUSE-SU"/>
		<description>
This update for postgresql, postgresql12, postgresql13 fixes the following issues:

Initial packaging of PostgreSQL 13:

* https://www.postgresql.org/about/news/2077/
* https://www.postgresql.org/docs/13/release-13.html

Changes in postgresql:

- Bump postgresql major version to 13.

Changes in postgresql12:

- %ghost the symlinks to pg_config and ecpg. (bsc#1178961)
- BuildRequire libpq5 and libecpg6 when not building them to avoid dangling symlinks in the devel package. (bsc#1179765)
- Fix a DST problem in the test suite.

Changes in postgresql13:

- Add postgresql-icu68.patch: fix build with ICU 68

- %ghost the symlinks to pg_config and ecpg. (bsc#1178961)
- BuildRequire libpq5 and libecpg6 when not building them to avoid dangling symlinks in the devel package. (bsc#1179765)

Upgrade to version 13.1:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/13/release-13-1.html

- Fix a DST problem in the test suite.

  		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-26"/>
	<updated date="2021-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178961">SUSE bug 1178961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555564" comment="libecpg6-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555565" comment="libpq5-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552068" comment="libpq5-32bit-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531844" comment="postgresql-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531845" comment="postgresql-contrib-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531846" comment="postgresql-docs-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531847" comment="postgresql-plperl-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531848" comment="postgresql-plpython-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531849" comment="postgresql-pltcl-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531850" comment="postgresql-server-13-4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150277" version="1" class="patch">
	<metadata>
		<title>Security update for arpwatch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1186240" ref_url="https://bugzilla.suse.com/1186240" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25321" ref_url="https://www.suse.com/security/cve/CVE-2021-25321/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009095.html" source="SUSE-SU"/>
		<description>
This update for arpwatch fixes the following issues:

- CVE-2021-25321: Fixed local privilege escalation from runtime user to root (bsc#1186240).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186240">SUSE bug 1186240</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25321/">CVE-2021-25321 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25321">CVE-2021-25321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615944" comment="arpwatch-2.1a15-159.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150278" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1161510" ref_url="https://bugzilla.suse.com/1161510" source="BUGZILLA"/>
		<reference ref_id="1186229" ref_url="https://bugzilla.suse.com/1186229" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20387" ref_url="https://www.suse.com/security/cve/CVE-2019-20387/" source="CVE"/>
		<reference ref_id="CVE-2021-3200" ref_url="https://www.suse.com/security/cve/CVE-2021-3200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009094.html" source="SUSE-SU"/>
		<description>
This update for libsolv fixes the following issues:

Security issues fixed:

- CVE-2019-20387: Fixed heap-buffer-overflow in repodata_schema2id (bsc#1161510)
- CVE-2021-3200: testcase_read: error out if repos are added or the system is changed too late (bsc#1186229)

Other issues fixed:

- backport support for blacklisted packages to support ptf packages and retracted patches
- fix ruleinfo of complex dependencies returning the wrong origin
- fix SOLVER_FLAG_FOCUS_BEST updateing packages without reason
- fix add_complex_recommends() selecting conflicted packages in rare cases
- fix potential segfault in resolve_jobrules
- fix solv_zchunk decoding error if large chunks are used
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161510">SUSE bug 1161510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186229">SUSE bug 1186229</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20387/">CVE-2019-20387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20387">CVE-2019-20387 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3200/">CVE-2021-3200 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3200">CVE-2021-3200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009543173" comment="libsolv-devel-0.6.37-2.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009560189" comment="libsolv-tools-0.6.37-2.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009560190" comment="libzypp-16.21.4-2.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543174" comment="libzypp-devel-16.21.4-2.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543176" comment="perl-solv-0.6.37-2.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009560191" comment="python-solv-0.6.37-2.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150279" version="1" class="patch">
	<metadata>
		<title>Recommended update for the Azure and AWS SDKs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1125671" ref_url="https://bugzilla.suse.com/1125671" source="BUGZILLA"/>
		<reference ref_id="1154393" ref_url="https://bugzilla.suse.com/1154393" source="BUGZILLA"/>
		<reference ref_id="1175289" ref_url="https://bugzilla.suse.com/1175289" source="BUGZILLA"/>
		<reference ref_id="1176784" ref_url="https://bugzilla.suse.com/1176784" source="BUGZILLA"/>
		<reference ref_id="1176785" ref_url="https://bugzilla.suse.com/1176785" source="BUGZILLA"/>
		<reference ref_id="1182421" ref_url="https://bugzilla.suse.com/1182421" source="BUGZILLA"/>
		<reference ref_id="1187045" ref_url="https://bugzilla.suse.com/1187045" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33503" ref_url="https://www.suse.com/security/cve/CVE-2021-33503/" source="CVE"/>
		<reference ref_id="SUSE-RU-2021:2194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019478.html" source="SUSE-SU"/>
		<description>
This update for the SLE Public Cloud module provides the following fixes:

Azure SDK update:
This update for the Azure SDK and CLI adds support for the AHB (Azure Hybrid Benefit).
(bsc#1176784, jsc#ECO-3105)

AWS SDK update:
This update for the AWS SDK updates python-boto3 to version 1.17.9 and aws-cli to 1.19.9.
(bsc#1182421, jsc#ECO-3352)

Security fix for python-urllib3:

- Improve performance of sub-authority splitting in URL. (bsc#1187045, CVE-2021-33503)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1125671">SUSE bug 1125671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154393">SUSE bug 1154393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175289">SUSE bug 1175289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176784">SUSE bug 1176784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176785">SUSE bug 1176785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182421">SUSE bug 1182421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187045">SUSE bug 1187045</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33503/">CVE-2021-33503 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33503">CVE-2021-33503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009616195" comment="python-six-1.14.0-13.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616449" comment="python3-requests-2.24.0-8.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616438" comment="python3-six-1.14.0-13.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616441" comment="python3-urllib3-1.25.10-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150280" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1173513" ref_url="https://bugzilla.suse.com/1173513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14145" ref_url="https://www.suse.com/security/cve/CVE-2020-14145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008149.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2020-14145: Fixed a potential information leak during host key exchange (bsc#1173513).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173513">SUSE bug 1173513</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14145/">CVE-2020-14145 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14145">CVE-2020-14145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555566" comment="openssh-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555567" comment="openssh-askpass-gnome-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555568" comment="openssh-fips-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555569" comment="openssh-helpers-7.2p2-74.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150281" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1180684" ref_url="https://bugzilla.suse.com/1180684" source="BUGZILLA"/>
		<reference ref_id="1180685" ref_url="https://bugzilla.suse.com/1180685" source="BUGZILLA"/>
		<reference ref_id="1180687" ref_url="https://bugzilla.suse.com/1180687" source="BUGZILLA"/>
		<reference ref_id="1181090" ref_url="https://bugzilla.suse.com/1181090" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23239" ref_url="https://www.suse.com/security/cve/CVE-2021-23239/" source="CVE"/>
		<reference ref_id="CVE-2021-23240" ref_url="https://www.suse.com/security/cve/CVE-2021-23240/" source="CVE"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008249.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- A Heap-based buffer overflow in sudo could be exploited to allow a user to gain root privileges 
  [bsc#1181090,CVE-2021-3156]
- It was possible for a user to test for the existence of a directory due to a Race Condition in `sudoedit`
  [bsc#1180684,CVE-2021-23239]
- A Possible Symlink Attack vector existed in `sudoedit` if SELinux was running in permissive mode [bsc#1180685,
  CVE-2021-23240]
- It was possible for a User to enable Debug Settings not Intended for them [bsc#1180687]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-26"/>
	<updated date="2021-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180684">SUSE bug 1180684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180685">SUSE bug 1180685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180687">SUSE bug 1180687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181090">SUSE bug 1181090</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23239/">CVE-2021-23239 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23239">CVE-2021-23239 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23240/">CVE-2021-23240 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23240">CVE-2021-23240 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3156">CVE-2021-3156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555570" comment="sudo-1.8.20p2-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150282" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1188275" ref_url="https://bugzilla.suse.com/1188275" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009155.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.12.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-29 (bsc#1188275)

* CVE-2021-29970: Use-after-free in accessibility features of a document
* CVE-2021-30547: Out of bounds write in ANGLE
* CVE-2021-29976: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29970">CVE-2021-29970 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29976">CVE-2021-29976 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30547">CVE-2021-30547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625241" comment="MozillaFirefox-78.12.0-112.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625231" comment="MozillaFirefox-devel-78.12.0-112.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625242" comment="MozillaFirefox-translations-common-78.12.0-112.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150283" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1181414" ref_url="https://bugzilla.suse.com/1181414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.7.0 ESR  (MFSA 2021-04, bsc#1181414)
  * CVE-2021-23953: Fixed a Cross-origin information leakage via redirected PDF requests
  * CVE-2021-23954: Fixed a type confusion when using logical assignment operators in JavaScript switch statements
  * CVE-2020-26976: Fixed an issue where HTTPS pages could have been intercepted by a registered service worker when they should not have been
  * CVE-2021-23960: Fixed a use-after-poison for incorrectly redeclared JavaScript variables during GC
  * CVE-2021-23964: Fixed Memory safety bugs 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-29"/>
	<updated date="2021-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26976">CVE-2020-26976 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23953">CVE-2021-23953 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23954">CVE-2021-23954 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23960">CVE-2021-23960 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23964">CVE-2021-23964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555571" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543203" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555572" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150284" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178561" ref_url="https://bugzilla.suse.com/1178561" source="BUGZILLA"/>
		<reference ref_id="1184761" ref_url="https://bugzilla.suse.com/1184761" source="BUGZILLA"/>
		<reference ref_id="1184967" ref_url="https://bugzilla.suse.com/1184967" source="BUGZILLA"/>
		<reference ref_id="1185046" ref_url="https://bugzilla.suse.com/1185046" source="BUGZILLA"/>
		<reference ref_id="1185331" ref_url="https://bugzilla.suse.com/1185331" source="BUGZILLA"/>
		<reference ref_id="1185807" ref_url="https://bugzilla.suse.com/1185807" source="BUGZILLA"/>
		<reference ref_id="1188063" ref_url="https://bugzilla.suse.com/1188063" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33910" ref_url="https://www.suse.com/security/cve/CVE-2021-33910/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009184.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2021-33910: Fixed a denial of service (stack exhaustion) in systemd (PID 1) (bsc#1188063)

Other fixes:

- mount-util: shorten the loop a bit (#7545)
- mount-util: do not use the official MAX_HANDLE_SZ (#7523)
- mount-util: tape over name_to_handle_at() flakiness (#7517) (bsc#1184761)
- mount-util: fix bad indenting
- mount-util: EOVERFLOW might have other causes than buffer size issues
- mount-util: fix error propagation in fd_fdinfo_mnt_id()
- mount-util: drop exponential buffer growing in name_to_handle_at_loop()
- udev: port udev_has_devtmpfs() to use path_get_mnt_id()
- mount-util: add new path_get_mnt_id() call that queries the mnt ID of a path
- mount-util: add name_to_handle_at_loop() wrapper around name_to_handle_at()
- mount-util: accept that name_to_handle_at() might fail with EPERM (#5499)
- basic: fallback to the fstat if we don't have access to the /proc/self/fdinfo
- sysusers: use the usual comment style
- test/TEST-21-SYSUSERS: add tests for new functionality
- sysusers: allow admin/runtime overrides to command-line config
- basic/strv: add function to insert items at position
- sysusers: allow the shell to be specified
- sysusers: move various user credential validity checks to src/basic/
- man: reformat table in sysusers.d(5)
- sysusers: take configuration as positional arguments
- sysusers: emit a bit more info at debug level when locking fails
- sysusers: allow force reusing existing user/group IDs (#8037)
- sysusers: ensure GID in uid:gid syntax exists
- sysusers: make ADD_GROUP always create a group
- test: add TEST-21-SYSUSERS test
- sysuser: use OrderedHashmap
- sysusers: allow uid:gid in sysusers.conf files
- sysusers: fix memleak (#4430)
- These commits implement the option '--replace' for systemd-sysusers
  so %sysusers_create_package can be introduced in SLE and packages
  can rely on this rpm macro without wondering whether the macro is
  available on the different target the package is submitted to.
- Expect 644 permissions for /usr/lib/udev/compat-symlink-generation (bsc#1185807)
- systemctl: add --value option
- execute: make sure to call into PAM after initializing resource limits (bsc#1184967)
- rlimit-util: introduce setrlimit_closest_all()
- system-conf: drop reference to ShutdownWatchdogUsec=
- core: rename ShutdownWatchdogSec to RebootWatchdogSec (bsc#1185331)
- Return -EAGAIN instead of -EALREADY from unit_reload (bsc#1185046)
- rules: don't ignore Xen virtual interfaces anymore (bsc#1178561)
- write_net_rules: set execute bits (bsc#1178561)
- udev: rework network device renaming
- Revert 'Revert 'udev: network device renaming - immediately give up if the target name isn't available''
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178561">SUSE bug 1178561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184761">SUSE bug 1184761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184967">SUSE bug 1184967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185046">SUSE bug 1185046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185331">SUSE bug 1185331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185807">SUSE bug 1185807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33910/">CVE-2021-33910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33910">CVE-2021-33910 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626115" comment="libsystemd0-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626116" comment="libsystemd0-32bit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626117" comment="libudev-devel-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626118" comment="libudev1-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626119" comment="libudev1-32bit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626120" comment="systemd-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626121" comment="systemd-32bit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625749" comment="systemd-bash-completion-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626122" comment="systemd-devel-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626123" comment="systemd-sysvinit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626124" comment="udev-228-150.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150285" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="1187687" ref_url="https://bugzilla.suse.com/1187687" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009189.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes several issues.

The following security issues were fixed:

- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187687)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187687">SUSE bug 1187687</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0605">CVE-2021-0605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009624821" comment="kgraft-patch-4_4_180-94_144-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150286" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="1187687" ref_url="https://bugzilla.suse.com/1187687" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009189.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.

The following security issues were fixed:

- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187687)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187687">SUSE bug 1187687</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0605">CVE-2021-0605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009624820" comment="kgraft-patch-4_4_180-94_141-default-6-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150287" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="1187687" ref_url="https://bugzilla.suse.com/1187687" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009189.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following security issues were fixed:

- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187687)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187687">SUSE bug 1187687</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0605">CVE-2021-0605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009624819" comment="kgraft-patch-4_4_180-94_138-default-7-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150288" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="1187687" ref_url="https://bugzilla.suse.com/1187687" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009189.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187687)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187687">SUSE bug 1187687</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0605">CVE-2021-0605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009624818" comment="kgraft-patch-4_4_180-94_135-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150289" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="1187687" ref_url="https://bugzilla.suse.com/1187687" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009189.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187687)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187687">SUSE bug 1187687</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0605">CVE-2021-0605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009624817" comment="kgraft-patch-4_4_180-94_130-default-11-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150290" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="1187687" ref_url="https://bugzilla.suse.com/1187687" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009189.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.

The following security issues were fixed:

- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187687)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187687">SUSE bug 1187687</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0605">CVE-2021-0605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009624816" comment="kgraft-patch-4_4_180-94_127-default-12-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150291" version="1" class="patch">
	<metadata>
		<title>Security update for linuxptp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1187646" ref_url="https://bugzilla.suse.com/1187646" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3570" ref_url="https://www.suse.com/security/cve/CVE-2021-3570/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009196.html" source="SUSE-SU"/>
		<description>
This update for linuxptp fixes the following issues:

- CVE-2021-3570: Validate the messageLength field of incoming messages. (bsc#1187646)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187646">SUSE bug 1187646</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3570/">CVE-2021-3570 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3570">CVE-2021-3570 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626125" comment="linuxptp-1.4-15.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150292" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1115026" ref_url="https://bugzilla.suse.com/1115026" source="BUGZILLA"/>
		<reference ref_id="1175462" ref_url="https://bugzilla.suse.com/1175462" source="BUGZILLA"/>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1185724" ref_url="https://bugzilla.suse.com/1185724" source="BUGZILLA"/>
		<reference ref_id="1185859" ref_url="https://bugzilla.suse.com/1185859" source="BUGZILLA"/>
		<reference ref_id="1185860" ref_url="https://bugzilla.suse.com/1185860" source="BUGZILLA"/>
		<reference ref_id="1185861" ref_url="https://bugzilla.suse.com/1185861" source="BUGZILLA"/>
		<reference ref_id="1185862" ref_url="https://bugzilla.suse.com/1185862" source="BUGZILLA"/>
		<reference ref_id="1185863" ref_url="https://bugzilla.suse.com/1185863" source="BUGZILLA"/>
		<reference ref_id="1185898" ref_url="https://bugzilla.suse.com/1185898" source="BUGZILLA"/>
		<reference ref_id="1185987" ref_url="https://bugzilla.suse.com/1185987" source="BUGZILLA"/>
		<reference ref_id="1186060" ref_url="https://bugzilla.suse.com/1186060" source="BUGZILLA"/>
		<reference ref_id="1186062" ref_url="https://bugzilla.suse.com/1186062" source="BUGZILLA"/>
		<reference ref_id="1186111" ref_url="https://bugzilla.suse.com/1186111" source="BUGZILLA"/>
		<reference ref_id="1186235" ref_url="https://bugzilla.suse.com/1186235" source="BUGZILLA"/>
		<reference ref_id="1186390" ref_url="https://bugzilla.suse.com/1186390" source="BUGZILLA"/>
		<reference ref_id="1186463" ref_url="https://bugzilla.suse.com/1186463" source="BUGZILLA"/>
		<reference ref_id="1187038" ref_url="https://bugzilla.suse.com/1187038" source="BUGZILLA"/>
		<reference ref_id="1187050" ref_url="https://bugzilla.suse.com/1187050" source="BUGZILLA"/>
		<reference ref_id="1187193" ref_url="https://bugzilla.suse.com/1187193" source="BUGZILLA"/>
		<reference ref_id="1187215" ref_url="https://bugzilla.suse.com/1187215" source="BUGZILLA"/>
		<reference ref_id="1187388" ref_url="https://bugzilla.suse.com/1187388" source="BUGZILLA"/>
		<reference ref_id="1187452" ref_url="https://bugzilla.suse.com/1187452" source="BUGZILLA"/>
		<reference ref_id="1187595" ref_url="https://bugzilla.suse.com/1187595" source="BUGZILLA"/>
		<reference ref_id="1187601" ref_url="https://bugzilla.suse.com/1187601" source="BUGZILLA"/>
		<reference ref_id="1187934" ref_url="https://bugzilla.suse.com/1187934" source="BUGZILLA"/>
		<reference ref_id="1188062" ref_url="https://bugzilla.suse.com/1188062" source="BUGZILLA"/>
		<reference ref_id="1188063" ref_url="https://bugzilla.suse.com/1188063" source="BUGZILLA"/>
		<reference ref_id="1188116" ref_url="https://bugzilla.suse.com/1188116" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141/" source="CVE"/>
		<reference ref_id="CVE-2020-26145" ref_url="https://www.suse.com/security/cve/CVE-2020-26145/" source="CVE"/>
		<reference ref_id="CVE-2020-26147" ref_url="https://www.suse.com/security/cve/CVE-2020-26147/" source="CVE"/>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)
- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)
- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)
- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)
- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)
- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bsc#1186463)
- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bsc#1179610)
- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)
- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861)
- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)
- CVE-2021-33034: Fixed an issue in net/bluetooth/hci_event.c where a use-after-free leads to writing an arbitrary value. (bsc#1186111)
- CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1186062)
- CVE-2021-23134: Fixed a use After Free vulnerability in nfc sockets which allows local attackers to elevate their privileges. (bsc#1186060)
- CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859)
- CVE-2020-26141: Fixed a flaw that could allows an adversary to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bsc#1185987)
- CVE-2020-26145: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject arbitrary network packets. (bsc#1185860)
- CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862)
- CVE-2020-26147: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames. (bsc#1185987)

The following non-security bugs were fixed:

- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).
- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).
- hv_netvsc: Add handlers for ethtool get/set msg level (bsc#1175462).
- hv_netvsc: avoid retry on send during shutdown (bsc#1175462).
- hv_netvsc: avoid unnecessary wakeups on subchannel creation (bsc#1175462).
- hv_netvsc: cancel subchannel setup before halting device (bsc#1175462).
- hv_netvsc: change GPAD teardown order on older versions (bsc#1175462).
- hv_netvsc: common detach logic (bsc#1175462).
- hv_netvsc: delay setup of VF device (bsc#1175462).
- hv_netvsc: disable NAPI before channel close (bsc#1175462).
- hv_netvsc: Ensure correct teardown message sequence order (bsc#1175462).
- hv_netvsc: Fix a deadlock by getting rtnl lock earlier in netvsc_probe() (bsc#1175462).
- hv_netvsc: Fix a network regression after ifdown/ifup (bsc#1175462).
- hv_netvsc: fix deadlock on hotplug (bsc#1175462).
- hv_netvsc: Fix error handling in netvsc_attach() (bsc#1175462).
- hv_netvsc: fix error unwind handling if vmbus_open fails (bsc#1175462).
- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (bsc#1175462).
- hv_netvsc: fix handling of fallback to single queue mode (bsc#1175462).
- hv_netvsc: Fix hash key value reset after other ops (bsc#1175462).
- hv_netvsc: Fix IP header checksum for coalesced packets (bsc#1175462).
- hv_netvsc: Fix net device attach on older Windows hosts (bsc#1175462).
- hv_netvsc: fix network namespace issues with VF support (bsc#1175462).
- hv_netvsc: Fix NULL dereference at single queue mode fallback (bsc#1175462).
- hv_netvsc: fix race during initialization (bsc#1175462).
- hv_netvsc: fix race on sub channel creation (bsc#1175462).
- hv_netvsc: fix race that may miss tx queue wakeup (bsc#1175462).
- hv_netvsc: fix schedule in RCU context (bsc#1175462).
- hv_netvsc: Fix the variable sizes in ipsecv2 and rsc offload (bsc#1175462).
- hv_netvsc: Fix tx_table init in rndis_set_subchannel() (bsc#1175462).
- hv_netvsc: Fix unwanted wakeup after tx_disable (bsc#1175462).
- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (bsc#1175462).
- hv_netvsc: flag software created hash value (bsc#1175462).
- hv_netvsc: netvsc_teardown_gpadl() split (bsc#1175462).
- hv_netvsc: only wake transmit queue if link is up (bsc#1175462).
- hv_netvsc: pass netvsc_device to rndis halt (bsc#1175462).
- hv_netvsc: preserve hw_features on mtu/channels/ringparam changes (bsc#1175462).
- hv_netvsc: Refactor assignments of struct netvsc_device_info (bsc#1175462).
- hv_netvsc: set master device (bsc#1175462).
- hv_netvsc: Set tx_table to equal weight after subchannels open (bsc#1175462).
- hv_netvsc: Simplify num_chn checking in rndis_filter_device_add() (bsc#1175462).
- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() (bsc#1175462).
- hv_netvsc: split sub-channel setup into async and sync (bsc#1175462).
- hv_netvsc: typo in NDIS RSS parameters structure (bsc#1175462).
- hv_netvsc: use RCU to fix concurrent rx and queue changes (bsc#1175462).
- hv_netvsc: use reciprocal divide to speed up percent calculation (bsc#1175462).
- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown (bsc#1175462).
- kgraft: truncate the output from state_show() sysfs attr (bsc#1186235).
- mm, memory_hotplug: do not clear numa_node association after hot_remove (bsc#1115026).
- mm: consider __HW_POISON pages when allocating from pcp lists (bsc#1187388).
- scsi: storvsc: Enable scatterlist entry lengths &gt; 4Kbytes (bsc#1187193).
- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-22"/>
	<updated date="2021-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115026">SUSE bug 1115026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175462">SUSE bug 1175462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185724">SUSE bug 1185724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185860">SUSE bug 1185860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185861">SUSE bug 1185861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185862">SUSE bug 1185862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185863">SUSE bug 1185863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185898">SUSE bug 1185898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185987">SUSE bug 1185987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186060">SUSE bug 1186060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186062">SUSE bug 1186062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186111">SUSE bug 1186111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186235">SUSE bug 1186235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186390">SUSE bug 1186390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187193">SUSE bug 1187193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187388">SUSE bug 1187388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187601">SUSE bug 1187601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187934">SUSE bug 1187934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188116">SUSE bug 1188116</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24586">CVE-2020-24586 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24587">CVE-2020-24587 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24588">CVE-2020-24588 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26139">CVE-2020-26139 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26141">CVE-2020-26141 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26145/">CVE-2020-26145 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26145">CVE-2020-26145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26147/">CVE-2020-26147 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26147">CVE-2020-26147 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26558">CVE-2020-26558 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36386">CVE-2020-36386 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0129">CVE-2021-0129 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0605">CVE-2021-0605 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23134">CVE-2021-23134 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34693">CVE-2021-34693 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626305" comment="kernel-default-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626306" comment="kernel-default-base-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626307" comment="kernel-default-devel-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625760" comment="kernel-default-kgraft-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625807" comment="kernel-default-man-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625761" comment="kernel-devel-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625762" comment="kernel-macros-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625763" comment="kernel-source-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626308" comment="kernel-syms-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625765" comment="kgraft-patch-4_4_180-94_147-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150293" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009221.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009626533" comment="kgraft-patch-4_4_180-94_144-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150294" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009221.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009626532" comment="kgraft-patch-4_4_180-94_141-default-7-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150295" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009221.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009626531" comment="kgraft-patch-4_4_180-94_138-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150296" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009221.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009626530" comment="kgraft-patch-4_4_180-94_135-default-10-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150297" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009221.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009626529" comment="kgraft-patch-4_4_180-94_130-default-12-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150298" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009221.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009626528" comment="kgraft-patch-4_4_180-94_127-default-13-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150299" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1187364" ref_url="https://bugzilla.suse.com/1187364" source="BUGZILLA"/>
		<reference ref_id="1187365" ref_url="https://bugzilla.suse.com/1187365" source="BUGZILLA"/>
		<reference ref_id="1187366" ref_url="https://bugzilla.suse.com/1187366" source="BUGZILLA"/>
		<reference ref_id="1187367" ref_url="https://bugzilla.suse.com/1187367" source="BUGZILLA"/>
		<reference ref_id="1187529" ref_url="https://bugzilla.suse.com/1187529" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3593" ref_url="https://www.suse.com/security/cve/CVE-2021-3593/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<reference ref_id="CVE-2021-3611" ref_url="https://www.suse.com/security/cve/CVE-2021-3611/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009229.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2021-3595: Fixed slirp: invalid pointer initialization may lead to information disclosure (tftp) (bsc#1187366)
- CVE-2021-3592: Fix for slirp: invalid pointer initialization may lead to information disclosure (bootp) (bsc#1187364)
- CVE-2021-3594: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp) (bsc#1187367)
- CVE-2021-3593: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp6) (bsc#1187365)
- CVE-2021-3611: Fix intel-hda segmentation fault due to stack overflow (bsc#1187529)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-29"/>
	<updated date="2021-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187365">SUSE bug 1187365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187366">SUSE bug 1187366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187529">SUSE bug 1187529</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3593/">CVE-2021-3593 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3593">CVE-2021-3593 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3595">CVE-2021-3595 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3611/">CVE-2021-3611 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3611">CVE-2021-3611 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627024" comment="qemu-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625033" comment="qemu-arm-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627025" comment="qemu-block-curl-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627026" comment="qemu-block-iscsi-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627027" comment="qemu-block-rbd-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627028" comment="qemu-block-ssh-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627029" comment="qemu-guest-agent-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624979" comment="qemu-ipxe-1.0.0+-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627030" comment="qemu-kvm-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627031" comment="qemu-lang-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624982" comment="qemu-ppc-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625023" comment="qemu-s390-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624983" comment="qemu-seabios-1.10.2_0_g5f4c7b1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624984" comment="qemu-sgabios-8-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627032" comment="qemu-tools-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624986" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624987" comment="qemu-x86-2.9.1-6.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150300" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1172505" ref_url="https://bugzilla.suse.com/1172505" source="BUGZILLA"/>
		<reference ref_id="1187105" ref_url="https://bugzilla.suse.com/1187105" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12049" ref_url="https://www.suse.com/security/cve/CVE-2020-12049/" source="CVE"/>
		<reference ref_id="CVE-2020-35512" ref_url="https://www.suse.com/security/cve/CVE-2020-35512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009240.html" source="SUSE-SU"/>
		<description>
This update for dbus-1 fixes the following issues:

- CVE-2020-35512: Fixed a bug where users with the same numeric UID could lead to use-after-free and undefined behaviour. (bsc#1187105)
- CVE-2020-12049: Fixed a bug where a truncated messages lead to resource exhaustion. (bsc#1172505)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-02"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172505">SUSE bug 1172505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187105">SUSE bug 1187105</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12049/">CVE-2020-12049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12049">CVE-2020-12049 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35512/">CVE-2020-35512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35512">CVE-2020-35512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627325" comment="dbus-1-1.8.22-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627326" comment="dbus-1-x11-1.8.22-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627327" comment="libdbus-1-3-1.8.22-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627328" comment="libdbus-1-3-32bit-1.8.22-29.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150301" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1188697" ref_url="https://bugzilla.suse.com/1188697" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21775" ref_url="https://www.suse.com/security/cve/CVE-2021-21775/" source="CVE"/>
		<reference ref_id="CVE-2021-21779" ref_url="https://www.suse.com/security/cve/CVE-2021-21779/" source="CVE"/>
		<reference ref_id="CVE-2021-30663" ref_url="https://www.suse.com/security/cve/CVE-2021-30663/" source="CVE"/>
		<reference ref_id="CVE-2021-30665" ref_url="https://www.suse.com/security/cve/CVE-2021-30665/" source="CVE"/>
		<reference ref_id="CVE-2021-30689" ref_url="https://www.suse.com/security/cve/CVE-2021-30689/" source="CVE"/>
		<reference ref_id="CVE-2021-30720" ref_url="https://www.suse.com/security/cve/CVE-2021-30720/" source="CVE"/>
		<reference ref_id="CVE-2021-30734" ref_url="https://www.suse.com/security/cve/CVE-2021-30734/" source="CVE"/>
		<reference ref_id="CVE-2021-30744" ref_url="https://www.suse.com/security/cve/CVE-2021-30744/" source="CVE"/>
		<reference ref_id="CVE-2021-30749" ref_url="https://www.suse.com/security/cve/CVE-2021-30749/" source="CVE"/>
		<reference ref_id="CVE-2021-30758" ref_url="https://www.suse.com/security/cve/CVE-2021-30758/" source="CVE"/>
		<reference ref_id="CVE-2021-30795" ref_url="https://www.suse.com/security/cve/CVE-2021-30795/" source="CVE"/>
		<reference ref_id="CVE-2021-30797" ref_url="https://www.suse.com/security/cve/CVE-2021-30797/" source="CVE"/>
		<reference ref_id="CVE-2021-30799" ref_url="https://www.suse.com/security/cve/CVE-2021-30799/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.32.3:

- CVE-2021-21775: Fixed a use-after-free vulnerability in the way certain events are processed for ImageLoader objects. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. (bsc#1188697)
- CVE-2021-21779: Fixed a use-after-free vulnerability in the way that WebKit GraphicsContext handles certain events. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. (bsc#1188697)
- CVE-2021-30663: An integer overflow was addressed with improved input validation. (bsc#1188697)
- CVE-2021-30665: A memory corruption issue was addressed with improved state management. (bsc#1188697)
- CVE-2021-30689: A logic issue was addressed with improved state management. (bsc#1188697)
- CVE-2021-30720: A logic issue was addressed with improved restrictions. (bsc#1188697)
- CVE-2021-30734: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
- CVE-2021-30744: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. (bsc#1188697)
- CVE-2021-30749: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
- CVE-2021-30758: A type confusion issue was addressed with improved state handling. (bsc#1188697)
- CVE-2021-30795: A use after free issue was addressed with improved memory management. (bsc#1188697)
- CVE-2021-30797: This issue was addressed with improved checks. (bsc#1188697)
- CVE-2021-30799: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-03"/>
	<updated date="2021-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21775/">CVE-2021-21775 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21775">CVE-2021-21775 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21779/">CVE-2021-21779 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21779">CVE-2021-21779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30663/">CVE-2021-30663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30663">CVE-2021-30663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30665/">CVE-2021-30665 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30665">CVE-2021-30665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30689/">CVE-2021-30689 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30689">CVE-2021-30689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30720/">CVE-2021-30720 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30720">CVE-2021-30720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30734/">CVE-2021-30734 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30734">CVE-2021-30734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30744/">CVE-2021-30744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30744">CVE-2021-30744 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30749/">CVE-2021-30749 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30749">CVE-2021-30749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30758/">CVE-2021-30758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30758">CVE-2021-30758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30795/">CVE-2021-30795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30795">CVE-2021-30795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30797/">CVE-2021-30797 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30797">CVE-2021-30797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30799/">CVE-2021-30799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30799">CVE-2021-30799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627338" comment="libjavascriptcoregtk-4_0-18-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627339" comment="libwebkit2gtk-4_0-37-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627305" comment="libwebkit2gtk3-lang-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627340" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627341" comment="typelib-1_0-WebKit2-4_0-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627310" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627342" comment="webkit2gtk-4_0-injected-bundles-2.32.3-2.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150302" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1100167" ref_url="https://bugzilla.suse.com/1100167" source="BUGZILLA"/>
		<reference ref_id="1116993" ref_url="https://bugzilla.suse.com/1116993" source="BUGZILLA"/>
		<reference ref_id="1117954" ref_url="https://bugzilla.suse.com/1117954" source="BUGZILLA"/>
		<reference ref_id="1188540" ref_url="https://bugzilla.suse.com/1188540" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13139" ref_url="https://www.suse.com/security/cve/CVE-2018-13139/" source="CVE"/>
		<reference ref_id="CVE-2018-19432" ref_url="https://www.suse.com/security/cve/CVE-2018-19432/" source="CVE"/>
		<reference ref_id="CVE-2018-19758" ref_url="https://www.suse.com/security/cve/CVE-2018-19758/" source="CVE"/>
		<reference ref_id="CVE-2021-3246" ref_url="https://www.suse.com/security/cve/CVE-2021-3246/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009252.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2018-13139: Fixed a stack-based buffer overflow in psf_memset in common.c in libsndfile 1.0.28allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact. (bsc#1100167)
- CVE-2018-19432: Fixed a NULL pointer dereference in the function sf_write_int in sndfile.c, which will lead to a denial of service. (bsc#1116993)
- CVE-2021-3246: Fixed a heap buffer overflow vulnerability in msadpcm_decode_block. (bsc#1188540)
- CVE-2018-19758: Fixed a heap-based buffer over-read at wav.c in wav_write_header in libsndfile 1.0.28 that will cause a denial of service. (bsc#1117954)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1100167">SUSE bug 1100167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116993">SUSE bug 1116993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117954">SUSE bug 1117954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188540">SUSE bug 1188540</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13139/">CVE-2018-13139 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13139">CVE-2018-13139 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19432/">CVE-2018-19432 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19432">CVE-2018-19432 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19758/">CVE-2018-19758 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19758">CVE-2018-19758 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3246/">CVE-2021-3246 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3246">CVE-2021-3246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626928" comment="libsndfile1-1.0.25-36.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626929" comment="libsndfile1-32bit-1.0.25-36.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150303" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009250.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3630: out-of-bounds write in DJVU:DjVuTXT:decode() in DjVuText.cpp (bsc#1187869)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3630">CVE-2021-3630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627955" comment="libdjvulibre21-3.5.25.3-5.19.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150304" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1189206" ref_url="https://bugzilla.suse.com/1189206" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009291.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

  It was possible to trigger Remote code execution due to a integer overflow (CVE-2021-38185, bsc#1189206)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-14"/>
	<updated date="2021-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189206">SUSE bug 1189206</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630641" comment="cpio-2.11-36.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630610" comment="cpio-lang-2.11-36.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150305" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1188881" ref_url="https://bugzilla.suse.com/1188881" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009294.html" source="SUSE-SU"/>
		<description>
This update for libcares2 fixes the following issues:

- CVE-2021-3672: Fixed input validation on hostnames (bsc#1188881).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3672">CVE-2021-3672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630396" comment="libcares2-1.9.1-9.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150306" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.13.0 ESR (MFSA 2021-34, bsc#1188891):

- CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
- CVE-2021-29988: Memory corruption as a result of incorrect style treatment
- CVE-2021-29984: Incorrect instruction reordering during JIT optimization
- CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
- CVE-2021-29985: Use-after-free media channels
- CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630642" comment="MozillaFirefox-78.13.0-112.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630614" comment="MozillaFirefox-devel-78.13.0-112.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630643" comment="MozillaFirefox-translations-common-78.13.0-112.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150307" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1033081" ref_url="https://bugzilla.suse.com/1033081" source="BUGZILLA"/>
		<reference ref_id="1182807" ref_url="https://bugzilla.suse.com/1182807" source="BUGZILLA"/>
		<reference ref_id="1188034" ref_url="https://bugzilla.suse.com/1188034" source="BUGZILLA"/>
		<reference ref_id="1188875" ref_url="https://bugzilla.suse.com/1188875" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36386" ref_url="https://www.suse.com/security/cve/CVE-2021-36386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009308.html" source="SUSE-SU"/>
		<description>
This update for fetchmail fixes the following issues:

- CVE-2021-36386: DoS or information disclosure in some configurations (bsc#1188875)
- Change PASSWORDLEN from 64 to 256 [bsc#1188034]
- Set the hostname for SNI when using TLS [bsc#1182807]
- Allow --syslog option in daemon mode. (bsc#1033081)
- Set the hostname for SNI when using TLS. (bsc#1182807)
- Change PASSWORDLEN from 64 to 256 (bsc#1188034)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-18"/>
	<updated date="2021-08-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033081">SUSE bug 1033081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182807">SUSE bug 1182807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188034">SUSE bug 1188034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188875">SUSE bug 1188875</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36386/">CVE-2021-36386 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36386">CVE-2021-36386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630889" comment="fetchmail-6.3.26-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630890" comment="fetchmailconf-6.3.26-13.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150308" version="1" class="patch">
	<metadata>
		<title>Recommended update for cpio (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1189465" ref_url="https://bugzilla.suse.com/1189465" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<reference ref_id="SUSE-RU-2021:2779-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019895.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

- A regression in the previous update could lead to crashes (bsc#1189465)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-19"/>
	<updated date="2021-08-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1189465">SUSE bug 1189465</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631322" comment="cpio-2.11-36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631320" comment="cpio-lang-2.11-36.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150309" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1185056" ref_url="https://bugzilla.suse.com/1185056" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188566" ref_url="https://bugzilla.suse.com/1188566" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2161" ref_url="https://www.suse.com/security/cve/CVE-2021-2161/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009315.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u302 (icedtea 3.20.0)
- CVE-2021-2341: Improve file transfers. (bsc#1188564)
- CVE-2021-2369: Better jar file validation. (bsc#1188565)
- CVE-2021-2388: Enhance compiler validation. (bsc#1188566)
- CVE-2021-2161: Less ambiguous processing. (bsc#1185056)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185056">SUSE bug 1185056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188566">SUSE bug 1188566</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2161/">CVE-2021-2161 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2161">CVE-2021-2161 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2388">CVE-2021-2388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627227" comment="java-1_8_0-openjdk-1.8.0.302-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627228" comment="java-1_8_0-openjdk-demo-1.8.0.302-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627229" comment="java-1_8_0-openjdk-devel-1.8.0.302-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627230" comment="java-1_8_0-openjdk-headless-1.8.0.302-27.63.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150310" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1189465" ref_url="https://bugzilla.suse.com/1189465" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009333.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

- A patch previously applied to remedy CVE-2021-38185 introduced a regression
  that had the potential to cause a segmentation fault in cpio. [bsc#1189465]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189465">SUSE bug 1189465</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631545" comment="cpio-2.11-36.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631541" comment="cpio-lang-2.11-36.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150311" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyYAML (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1174514" ref_url="https://bugzilla.suse.com/1174514" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14343" ref_url="https://www.suse.com/security/cve/CVE-2020-14343/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009336.html" source="SUSE-SU"/>
		<description>

This update for python-PyYAML fixes the following issues:

- Update to 5.3.1.

- CVE-2020-14343: A vulnerability was discovered in the PyYAML library,
  where it was susceptible to arbitrary code execution when it processes
  untrusted YAML files through the full_load method or with the FullLoader
  loader. Applications that use the library to process untrusted input
  may be vulnerable to this flaw. This flaw allows an attacker to
  execute arbitrary code on the system by abusing the python/object/new
  constructor. This flaw is due to an incomplete fix for CVE-2020-1747.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174514">SUSE bug 1174514</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14343/">CVE-2020-14343 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14343">CVE-2020-14343 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628217" comment="python-PyYAML-5.3.1-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628218" comment="python3-PyYAML-5.3.1-28.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150312" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009342.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following security issue:

- CVE-2021-3712: a bug in the code for printing certificate details could lead
  to a buffer overrun that a malicious actor could exploit to crash the
  application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631700" comment="libopenssl-devel-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631701" comment="libopenssl1_0_0-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631702" comment="libopenssl1_0_0-32bit-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631703" comment="libopenssl1_0_0-hmac-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631704" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631705" comment="openssl-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631682" comment="openssl-doc-1.0.2j-60.69.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150313" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1046882" ref_url="https://bugzilla.suse.com/1046882" source="BUGZILLA"/>
		<reference ref_id="1054038" ref_url="https://bugzilla.suse.com/1054038" source="BUGZILLA"/>
		<reference ref_id="1187974" ref_url="https://bugzilla.suse.com/1187974" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-12938" ref_url="https://www.suse.com/security/cve/CVE-2017-12938/" source="CVE"/>
		<reference ref_id="CVE-2017-12940" ref_url="https://www.suse.com/security/cve/CVE-2017-12940/" source="CVE"/>
		<reference ref_id="CVE-2017-12941" ref_url="https://www.suse.com/security/cve/CVE-2017-12941/" source="CVE"/>
		<reference ref_id="CVE-2017-12942" ref_url="https://www.suse.com/security/cve/CVE-2017-12942/" source="CVE"/>
		<reference ref_id="CVE-2017-20006" ref_url="https://www.suse.com/security/cve/CVE-2017-20006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009355.html" source="SUSE-SU"/>
		<description>
This update for unrar to version 5.6.1 fixes several issues.

These security issues were fixed:

- CVE-2017-12938: Prevent remote attackers to bypass a directory-traversal
  protection mechanism via vectors involving a symlink to the . directory, a
  symlink to the .. directory, and a regular file (bsc#1054038).
- CVE-2017-12940: Prevent out-of-bounds read in the EncodeFileName::Decode call
  within the Archive::ReadHeader15 function (bsc#1054038).
- CVE-2017-12941: Prevent an out-of-bounds read in the Unpack::Unpack20
  function (bsc#1054038).
- CVE-2017-12942: Prevent a buffer overflow in the Unpack::LongLZ function
  (bsc#1054038).
- CVE-2017-20006: Fixed heap-based buffer overflow in Unpack:CopyString (bsc#1187974).

These non-security issues were fixed:

- Added extraction support for .LZ archives created by Lzip compressor
- Enable unpacking of files in ZIP archives compressed with XZ algorithm and
  encrypted with AES
- Added support for PAX extended headers inside of TAR archive
- If RAR recovery volumes (.rev files) are present in the same folder as usual
  RAR volumes, archive test command verifies .rev contents after completing
  testing .rar files
- By default unrar skips symbolic links with absolute paths in link target when
  extracting unless -ola command line switch is specified
- Added support for AES-NI CPU instructions
- Support for a new RAR 5.0 archiving format
- Wildcard exclusion mask for folders
- Prevent conditional jumps depending on uninitialised values (bsc#1046882)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046882">SUSE bug 1046882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054038">SUSE bug 1054038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187974">SUSE bug 1187974</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6706">CVE-2012-6706 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12938/">CVE-2017-12938 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12938">CVE-2017-12938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12940/">CVE-2017-12940 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12940">CVE-2017-12940 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12941/">CVE-2017-12941 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12941">CVE-2017-12941 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12942/">CVE-2017-12942 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12942">CVE-2017-12942 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-20006/">CVE-2017-20006 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-20006">CVE-2017-20006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631584" comment="unrar-5.6.1-4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150314" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1117483" ref_url="https://bugzilla.suse.com/1117483" source="BUGZILLA"/>
		<reference ref_id="1181345" ref_url="https://bugzilla.suse.com/1181345" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27827" ref_url="https://www.suse.com/security/cve/CVE-2020-27827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008266.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:
	  
- openvswitch was updated to 2.7.12
- CVE-2020-27827: Fixed a memory leak when parsing lldp packets (bsc#1181345)	  
A lot more minor bugs have been fixed with this openvswitch version. Please refer to the changelog of
the openvswitch.rpm file in order to obtain a list of all changes.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-02"/>
	<updated date="2021-02-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1117483">SUSE bug 1117483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181345">SUSE bug 1181345</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27827/">CVE-2020-27827 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27827">CVE-2020-27827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555573" comment="openvswitch-2.7.12-3.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150315" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009357.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.

The following security issues were fixed:

- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009630749" comment="kgraft-patch-4_4_180-94_127-default-14-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150316" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009357.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009630750" comment="kgraft-patch-4_4_180-94_130-default-13-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150317" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009357.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009630751" comment="kgraft-patch-4_4_180-94_135-default-11-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150318" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009357.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following security issues were fixed:

- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009630752" comment="kgraft-patch-4_4_180-94_138-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150319" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009357.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.

The following security issues were fixed:

- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009630753" comment="kgraft-patch-4_4_180-94_141-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150320" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009357.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes several issues.

The following security issues were fixed:

- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009630754" comment="kgraft-patch-4_4_180-94_144-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150321" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009359.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes several issues.

The following security issues were fixed:

- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-28688: The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. (bsc#1183646)
- CVE-2020-0429: Fixed a potential local privilege escalation in l2tp_session_delete and related functions of l2tp_core.c (bsc#1176724).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009630755" comment="kgraft-patch-4_4_180-94_147-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150322" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1188576" ref_url="https://bugzilla.suse.com/1188576" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25051" ref_url="https://www.suse.com/security/cve/CVE-2019-25051/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009356.html" source="SUSE-SU"/>
		<description>
This update for aspell fixes the following issues:

- CVE-2019-25051: Fixed heap-buffer-overflow in acommon:ObjStack:dup_top (bsc#1188576).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188576">SUSE bug 1188576</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25051/">CVE-2019-25051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25051">CVE-2019-25051 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627825" comment="aspell-0.60.6.1-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627826" comment="aspell-ispell-0.60.6.1-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627827" comment="libaspell15-0.60.6.1-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627828" comment="libaspell15-32bit-0.60.6.1-18.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150323" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1175443" ref_url="https://bugzilla.suse.com/1175443" source="BUGZILLA"/>
		<reference ref_id="1188888" ref_url="https://bugzilla.suse.com/1188888" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8622" ref_url="https://www.suse.com/security/cve/CVE-2020-8622/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009368.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8622: A truncated TSIG response can lead to an assertion failure (bsc#1175443).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-30"/>
	<updated date="2021-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188888">SUSE bug 1188888</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8622/">CVE-2020-8622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8622">CVE-2020-8622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632080" comment="bind-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632081" comment="bind-chrootenv-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627784" comment="bind-doc-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632082" comment="bind-libs-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632083" comment="bind-libs-32bit-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632084" comment="bind-utils-9.9.9P1-63.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150324" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1188457" ref_url="https://bugzilla.suse.com/1188457" source="BUGZILLA"/>
		<reference ref_id="1188458" ref_url="https://bugzilla.suse.com/1188458" source="BUGZILLA"/>
		<reference ref_id="1188459" ref_url="https://bugzilla.suse.com/1188459" source="BUGZILLA"/>
		<reference ref_id="1188460" ref_url="https://bugzilla.suse.com/1188460" source="BUGZILLA"/>
		<reference ref_id="1188461" ref_url="https://bugzilla.suse.com/1188461" source="BUGZILLA"/>
		<reference ref_id="1188462" ref_url="https://bugzilla.suse.com/1188462" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20298" ref_url="https://www.suse.com/security/cve/CVE-2021-20298/" source="CVE"/>
		<reference ref_id="CVE-2021-20299" ref_url="https://www.suse.com/security/cve/CVE-2021-20299/" source="CVE"/>
		<reference ref_id="CVE-2021-20300" ref_url="https://www.suse.com/security/cve/CVE-2021-20300/" source="CVE"/>
		<reference ref_id="CVE-2021-20302" ref_url="https://www.suse.com/security/cve/CVE-2021-20302/" source="CVE"/>
		<reference ref_id="CVE-2021-20303" ref_url="https://www.suse.com/security/cve/CVE-2021-20303/" source="CVE"/>
		<reference ref_id="CVE-2021-20304" ref_url="https://www.suse.com/security/cve/CVE-2021-20304/" source="CVE"/>
		<reference ref_id="CVE-2021-3476" ref_url="https://www.suse.com/security/cve/CVE-2021-3476/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009386.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- CVE-2021-20298 [bsc#1188460]: Fixed Out-of-memory in B44Compressor
- CVE-2021-20299 [bsc#1188459]: Fixed Null-dereference READ in Imf_2_5:Header:operator
- CVE-2021-20300 [bsc#1188458]: Fixed Integer-overflow in Imf_2_5:hufUncompress
- CVE-2021-20302 [bsc#1188462]: Fixed Floating-point-exception in Imf_2_5:precalculateTileInfot
- CVE-2021-20303 [bsc#1188457]: Fixed Heap-buffer-overflow in Imf_2_5::copyIntoFrameBuffer
- CVE-2021-20304 [bsc#1188461]: Fixed Undefined-shift in Imf_2_5:hufDecode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188457">SUSE bug 1188457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188458">SUSE bug 1188458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188459">SUSE bug 1188459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188460">SUSE bug 1188460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188461">SUSE bug 1188461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188462">SUSE bug 1188462</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20298/">CVE-2021-20298 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20298">CVE-2021-20298 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20299/">CVE-2021-20299 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20299">CVE-2021-20299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20300/">CVE-2021-20300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20300">CVE-2021-20300 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20302/">CVE-2021-20302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20302">CVE-2021-20302 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-20303/">CVE-2021-20303 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20303">CVE-2021-20303 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20304/">CVE-2021-20304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20304">CVE-2021-20304 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3476/">CVE-2021-3476 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3476">CVE-2021-3476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627964" comment="libIlmImf-Imf_2_1-21-2.1.0-6.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627965" comment="openexr-2.1.0-6.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150325" version="1" class="patch">
	<metadata>
		<title>Security update for libesmtp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1160462" ref_url="https://bugzilla.suse.com/1160462" source="BUGZILLA"/>
		<reference ref_id="1189097" ref_url="https://bugzilla.suse.com/1189097" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19977" ref_url="https://www.suse.com/security/cve/CVE-2019-19977/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009380.html" source="SUSE-SU"/>
		<description>
This update for libesmtp fixes the following issues:

- CVE-2019-19977: Fix stack-based buffer over-read in ntlm/ntlmstruct.c (bsc#1160462).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160462">SUSE bug 1160462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189097">SUSE bug 1189097</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19977/">CVE-2019-19977 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19977">CVE-2019-19977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628216" comment="libesmtp-1.0.6-17.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150326" version="1" class="patch">
	<metadata>
		<title>Security update for file (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1154661" ref_url="https://bugzilla.suse.com/1154661" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18218" ref_url="https://www.suse.com/security/cve/CVE-2019-18218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009396.html" source="SUSE-SU"/>
		<description>
This update for file fixes the following issues:

- CVE-2019-18218: Fixed heap-based buffer overflow in cdf_read_property_info in cdf.c (bsc#1154661).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154661">SUSE bug 1154661</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18218/">CVE-2019-18218 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18218">CVE-2019-18218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628166" comment="file-5.22-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628167" comment="file-magic-5.22-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628168" comment="libmagic1-5.22-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628169" comment="libmagic1-32bit-5.22-10.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150327" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182654" ref_url="https://bugzilla.suse.com/1182654" source="BUGZILLA"/>
		<reference ref_id="1186429" ref_url="https://bugzilla.suse.com/1186429" source="BUGZILLA"/>
		<reference ref_id="1186433" ref_url="https://bugzilla.suse.com/1186433" source="BUGZILLA"/>
		<reference ref_id="1186434" ref_url="https://bugzilla.suse.com/1186434" source="BUGZILLA"/>
		<reference ref_id="1187369" ref_url="https://bugzilla.suse.com/1187369" source="BUGZILLA"/>
		<reference ref_id="1187376" ref_url="https://bugzilla.suse.com/1187376" source="BUGZILLA"/>
		<reference ref_id="1187378" ref_url="https://bugzilla.suse.com/1187378" source="BUGZILLA"/>
		<reference ref_id="1189373" ref_url="https://bugzilla.suse.com/1189373" source="BUGZILLA"/>
		<reference ref_id="1189376" ref_url="https://bugzilla.suse.com/1189376" source="BUGZILLA"/>
		<reference ref_id="1189378" ref_url="https://bugzilla.suse.com/1189378" source="BUGZILLA"/>
		<reference ref_id="1189380" ref_url="https://bugzilla.suse.com/1189380" source="BUGZILLA"/>
		<reference ref_id="1189882" ref_url="https://bugzilla.suse.com/1189882" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0089" ref_url="https://www.suse.com/security/cve/CVE-2021-0089/" source="CVE"/>
		<reference ref_id="CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255/" source="CVE"/>
		<reference ref_id="CVE-2021-28690" ref_url="https://www.suse.com/security/cve/CVE-2021-28690/" source="CVE"/>
		<reference ref_id="CVE-2021-28692" ref_url="https://www.suse.com/security/cve/CVE-2021-28692/" source="CVE"/>
		<reference ref_id="CVE-2021-28694" ref_url="https://www.suse.com/security/cve/CVE-2021-28694/" source="CVE"/>
		<reference ref_id="CVE-2021-28695" ref_url="https://www.suse.com/security/cve/CVE-2021-28695/" source="CVE"/>
		<reference ref_id="CVE-2021-28696" ref_url="https://www.suse.com/security/cve/CVE-2021-28696/" source="CVE"/>
		<reference ref_id="CVE-2021-28697" ref_url="https://www.suse.com/security/cve/CVE-2021-28697/" source="CVE"/>
		<reference ref_id="CVE-2021-28698" ref_url="https://www.suse.com/security/cve/CVE-2021-28698/" source="CVE"/>
		<reference ref_id="CVE-2021-28699" ref_url="https://www.suse.com/security/cve/CVE-2021-28699/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-3594: slirp: invalid pointer initialization may lead to information disclosure (udp)(bsc#1187378).
- CVE-2021-3595: slirp: invalid pointer initialization may lead to information disclosure (tftp)(bsc#1187376).
- CVE-2021-28698: long running loops in grant table handling (XSA-380)(bsc#1189378).
- CVE-2021-28699: inadequate grant-v2 status frames array bounds check (XSA-382)(bsc#1189380).
- CVE-2021-20255: Fixed stack overflow via infinite recursion in eepro100 (bsc#1182654)
- CVE-2021-28690: xen: x86: TSX Async Abort protections not restored after S3 (bsc#1186434)
- CVE-2021-28692: xen: inappropriate x86 IOMMU timeout detection / handling (bsc#1186429)
- CVE-2021-28694,CVE-2021-28695,CVE-2021-28696: IOMMU page mapping issues on x86 (XSA-378)(bsc#1189373).
- CVE-2021-0089: xen: Speculative Code Store Bypass (bsc#1186433)
- CVE-2021-28697: grant table v2 status pages may remain accessible after de-allocation (XSA-379)(bsc#1189376).
- CVE-2021-3592: slirp: invalid pointer initialization may lead to information disclosure (bootp)(bsc#1187369).

- Prevent superpage allocation in the LAPIC and ACPI_INFO range (bsc#1189882).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-06"/>
	<updated date="2021-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182654">SUSE bug 1182654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186429">SUSE bug 1186429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186433">SUSE bug 1186433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186434">SUSE bug 1186434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187369">SUSE bug 1187369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187376">SUSE bug 1187376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187378">SUSE bug 1187378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189376">SUSE bug 1189376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189378">SUSE bug 1189378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189380">SUSE bug 1189380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189882">SUSE bug 1189882</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0089/">CVE-2021-0089 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0089">CVE-2021-0089 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20255">CVE-2021-20255 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28690/">CVE-2021-28690 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28690">CVE-2021-28690 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-28692/">CVE-2021-28692 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28692">CVE-2021-28692 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28694/">CVE-2021-28694 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28694">CVE-2021-28694 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28695/">CVE-2021-28695 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28695">CVE-2021-28695 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28696/">CVE-2021-28696 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28696">CVE-2021-28696 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28697/">CVE-2021-28697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28697">CVE-2021-28697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28698/">CVE-2021-28698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28698">CVE-2021-28698 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28699/">CVE-2021-28699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28699">CVE-2021-28699 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3595">CVE-2021-3595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632286" comment="xen-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632287" comment="xen-doc-html-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632288" comment="xen-libs-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632289" comment="xen-libs-32bit-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632290" comment="xen-tools-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632291" comment="xen-tools-domU-4.9.4_20-3.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150328" version="1" class="patch">
	<metadata>
		<title>Recommended update for mozilla-nspr, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1029961" ref_url="https://bugzilla.suse.com/1029961" source="BUGZILLA"/>
		<reference ref_id="1174697" ref_url="https://bugzilla.suse.com/1174697" source="BUGZILLA"/>
		<reference ref_id="1176206" ref_url="https://bugzilla.suse.com/1176206" source="BUGZILLA"/>
		<reference ref_id="1176934" ref_url="https://bugzilla.suse.com/1176934" source="BUGZILLA"/>
		<reference ref_id="1179382" ref_url="https://bugzilla.suse.com/1179382" source="BUGZILLA"/>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12400" ref_url="https://www.suse.com/security/cve/CVE-2020-12400/" source="CVE"/>
		<reference ref_id="CVE-2020-12401" ref_url="https://www.suse.com/security/cve/CVE-2020-12401/" source="CVE"/>
		<reference ref_id="CVE-2020-12403" ref_url="https://www.suse.com/security/cve/CVE-2020-12403/" source="CVE"/>
		<reference ref_id="CVE-2020-25648" ref_url="https://www.suse.com/security/cve/CVE-2020-25648/" source="CVE"/>
		<reference ref_id="CVE-2020-6829" ref_url="https://www.suse.com/security/cve/CVE-2020-6829/" source="CVE"/>
		<reference ref_id="SUSE-RU-2021:3116-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020178.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr fixes the following issues:

mozilla-nspr was updated to version 4.32:

* implement new socket option PR_SockOpt_DontFrag
* support larger DNS records by increasing the default buffer
  size for DNS queries 
* Lock access to PRCallOnceType members in PR_CallOnce* for
  thread safety bmo#1686138
* PR_GetSystemInfo supports a new flag PR_SI_RELEASE_BUILD to get
  information about the operating system build version.


Mozilla NSS was updated to version 3.68:

* bmo#1713562 - Fix test leak.
* bmo#1717452 - NSS 3.68 should depend on NSPR 4.32.
* bmo#1693206 - Implement PKCS8 export of ECDSA keys.
* bmo#1712883 - DTLS 1.3 draft-43.
* bmo#1655493 - Support SHA2 HW acceleration using Intel SHA Extension.
* bmo#1713562 - Validate ECH public names.
* bmo#1717610 - Add function to get seconds from epoch from pkix::Time.

update to NSS 3.67

* bmo#1683710 - Add a means to disable ALPN.
* bmo#1715720 - Fix nssckbi version number in NSS 3.67 (was supposed to be incremented in 3.66).
* bmo#1714719 - Set NSS_USE_64 on riscv64 target when using GYP/Ninja.
* bmo#1566124 - Fix counter increase in ppc-gcm-wrap.c.
* bmo#1566124 - Fix AES_GCM mode on ppc64le for messages of length more than 255-byte.

update to NSS 3.66

* bmo#1710716 - Remove Expired Sonera Class2 CA from NSS.
* bmo#1710716 - Remove Expired Root Certificates from NSS - QuoVadis Root Certification Authority.
* bmo#1708307 - Remove Trustis FPS Root CA from NSS.
* bmo#1707097 - Add Certum Trusted Root CA to NSS.
* bmo#1707097 - Add Certum EC-384 CA to NSS.
* bmo#1703942 - Add ANF Secure Server Root CA to NSS.
* bmo#1697071 - Add GLOBALTRUST 2020 root cert to NSS.
* bmo#1712184 - NSS tools manpages need to be updated to reflect that sqlite is the default database.
* bmo#1712230 - Don't build ppc-gcm.s with clang integrated assembler.
* bmo#1712211 - Strict prototype error when trying to compile nss code that includes blapi.h.
* bmo#1710773 - NSS needs FIPS 180-3 FIPS indicators.
* bmo#1709291 - Add VerifyCodeSigningCertificateChain.

update to NSS 3.65

* bmo#1709654 - Update for NetBSD configuration.
* bmo#1709750 - Disable HPKE test when fuzzing.
* bmo#1566124 - Optimize AES-GCM for ppc64le.
* bmo#1699021 - Add AES-256-GCM to HPKE.
* bmo#1698419 - ECH -10 updates.
* bmo#1692930 - Update HPKE to final version.
* bmo#1707130 - NSS should use modern algorithms in PKCS#12 files by default.
* bmo#1703936 - New coverity/cpp scanner errors.
* bmo#1697303 - NSS needs to update it's csp clearing to FIPS 180-3 standards.
* bmo#1702663 - Need to support RSA PSS with Hashing PKCS #11 Mechanisms.
* bmo#1705119 - Deadlock when using GCM and non-thread safe tokens.

update to NSS 3.64

* bmo#1705286 - Properly detect mips64.
* bmo#1687164 - Introduce NSS_DISABLE_CRYPTO_VSX and
		disable_crypto_vsx.
* bmo#1698320 - replace __builtin_cpu_supports('vsx') with
		ppc_crypto_support() for clang.
* bmo#1613235 - Add POWER ChaCha20 stream cipher vector
		acceleration.

Fixed in 3.63

* bmo#1697380 - Make a clang-format run on top of helpful contributions.
* bmo#1683520 - ECCKiila P384, change syntax of nested structs
		initialization to prevent build isses with GCC 4.8.
* bmo#1683520 - [lib/freebl/ecl] P-384: allow zero scalars in dual
		scalar multiplication.
* bmo#1683520 - ECCKiila P521, change syntax of nested structs
		initialization to prevent build isses with GCC 4.8.
* bmo#1683520 - [lib/freebl/ecl] P-521: allow zero scalars in dual
		scalar multiplication.
* bmo#1696800 - HACL* update March 2021 - c95ab70fcb2bc21025d8845281bc4bc8987ca683.
* bmo#1694214 - tstclnt can't enable middlebox compat mode.
* bmo#1694392 - NSS does not work with PKCS #11 modules not supporting
		profiles.
* bmo#1685880 - Minor fix to prevent unused variable on early return.
* bmo#1685880 - Fix for the gcc compiler version 7 to support setenv
		with nss build.
* bmo#1693217 - Increase nssckbi.h version number for March 2021 batch
		of root CA changes, CA list version 2.48.
* bmo#1692094 - Set email distrust after to 21-03-01 for Camerfirma's
		'Chambers of Commerce' and 'Global Chambersign' roots.
* bmo#1618407 - Symantec root certs - Set CKA_NSS_EMAIL_DISTRUST_AFTER.
* bmo#1693173 - Add GlobalSign R45, E45, R46, and E46 root certs to NSS.
* bmo#1683738 - Add AC RAIZ FNMT-RCM SERVIDORES SEGUROS root cert to NSS.
* bmo#1686854 - Remove GeoTrust PCA-G2 and VeriSign Universal root certs
		from NSS.
* bmo#1687822 - Turn off Websites trust bit for the “Staat der
		Nederlanden Root CA - G3” root cert in NSS.
* bmo#1692094 - Turn off Websites Trust Bit for 'Chambers of Commerce
		Root - 2008' and 'Global Chambersign Root - 2008’.
* bmo#1694291 - Tracing fixes for ECH.

update to NSS 3.62

* bmo#1688374 - Fix parallel build NSS-3.61 with make
* bmo#1682044 - pkix_Build_GatherCerts() + pkix_CacheCert_Add()
		can corrupt 'cachedCertTable'
* bmo#1690583 - Fix CH padding extension size calculation
* bmo#1690421 - Adjust 3.62 ABI report formatting for new libabigail
* bmo#1690421 - Install packaged libabigail in docker-builds image
* bmo#1689228 - Minor ECH -09 fixes for interop testing, fuzzing
* bmo#1674819 - Fixup a51fae403328, enum type may be signed
* bmo#1681585 - Add ECH support to selfserv
* bmo#1681585 - Update ECH to Draft-09
* bmo#1678398 - Add Export/Import functions for HPKE context
* bmo#1678398 - Update HPKE to draft-07

update to NSS 3.61

* bmo#1682071 - Fix issue with IKE Quick mode deriving incorrect key
		values under certain conditions.
* bmo#1684300 - Fix default PBE iteration count when NSS is compiled
		with NSS_DISABLE_DBM.
* bmo#1651411 - Improve constant-timeness in RSA operations.
* bmo#1677207 - Upgrade Google Test version to latest release.
* bmo#1654332 - Add aarch64-make target to nss-try.

Update to NSS 3.60.1:

Notable changes in NSS 3.60:
* TLS 1.3 Encrypted Client Hello (draft-ietf-tls-esni-08) support
  has been added, replacing the previous ESNI (draft-ietf-tls-esni-01)
  implementation. See bmo#1654332 for more information.
* December 2020 batch of Root CA changes, builtins library updated
  to version 2.46. See bmo#1678189, bmo#1678166, and bmo#1670769
  for more information.

Update to NSS 3.59.1:

* bmo#1679290 - Fix potential deadlock with certain third-party
		PKCS11 modules

Update to NSS 3.59:

Notable changes:

* Exported two existing functions from libnss:
  CERT_AddCertToListHeadWithData and CERT_AddCertToListTailWithData

Bugfixes

* bmo#1607449 - Lock cert-&gt;nssCertificate to prevent a potential data race
* bmo#1672823 - Add Wycheproof test cases for HMAC, HKDF, and DSA
* bmo#1663661 - Guard against NULL token in nssSlot_IsTokenPresent
* bmo#1670835 - Support enabling and disabling signatures via Crypto Policy
* bmo#1672291 - Resolve libpkix OCSP failures on SHA1 self-signed
		root certs when SHA1 signatures are disabled.
* bmo#1644209 - Fix broken SelectedCipherSuiteReplacer filter to
		solve some test intermittents
* bmo#1672703 - Tolerate the first CCS in TLS 1.3 to fix a regression in
		our CVE-2020-25648 fix that broke purple-discord
		(boo#1179382)
* bmo#1666891 - Support key wrap/unwrap with RSA-OAEP
* bmo#1667989 - Fix gyp linking on Solaris
* bmo#1668123 - Export CERT_AddCertToListHeadWithData and
		CERT_AddCertToListTailWithData from libnss
* bmo#1634584 - Set CKA_NSS_SERVER_DISTRUST_AFTER for Trustis FPS Root CA
* bmo#1663091 - Remove unnecessary assertions in the streaming
		ASN.1 decoder that affected decoding certain PKCS8
		private keys when using NSS debug builds
*  bmo#670839 - Use ARM crypto extension for AES, SHA1 and SHA2 on MacOS.

update to NSS 3.58

Bugs fixed:

* bmo#1641480 (CVE-2020-25648)
  Tighten CCS handling for middlebox compatibility mode.
* bmo#1631890 - Add support for Hybrid Public Key Encryption
  (draft-irtf-cfrg-hpke) support for TLS Encrypted Client Hello
  (draft-ietf-tls-esni).
* bmo#1657255 - Add CI tests that disable SHA1/SHA2 ARM crypto
  extensions.
* bmo#1668328 - Handle spaces in the Python path name when using
  gyp on Windows.
* bmo#1667153 - Add PK11_ImportDataKey for data object import.
* bmo#1665715 - Pass the embedded SCT list extension (if present)
  to TrustDomain::CheckRevocation instead of the notBefore value.

update to NSS 3.57

* The following CA certificates were Added:
  bmo#1663049 - CN=Trustwave Global Certification Authority
      SHA-256 Fingerprint: 97552015F5DDFC3C8788C006944555408894450084F100867086BC1A2BB58DC8
  bmo#1663049 - CN=Trustwave Global ECC P256 Certification Authority
      SHA-256 Fingerprint: 945BBC825EA554F489D1FD51A73DDF2EA624AC7019A05205225C22A78CCFA8B4
  bmo#1663049 - CN=Trustwave Global ECC P384 Certification Authority
      SHA-256 Fingerprint: 55903859C8C0C3EBB8759ECE4E2557225FF5758BBD38EBD48276601E1BD58097
* The following CA certificates were Removed:
  bmo#1651211 - CN=EE Certification Centre Root CA
      SHA-256 Fingerprint: 3E84BA4342908516E77573C0992F0979CA084E4685681FF195CCBA8A229B8A76
  bmo#1656077 - O=Government Root Certification Authority; C=TW
      SHA-256 Fingerprint: 7600295EEFE85B9E1FD624DB76062AAAAE59818A54D2774CD4C0B2C01131E1B3
* Trust settings for the following CA certificates were Modified:
  bmo#1653092 - CN=OISTE WISeKey Global Root GA CA
      Websites (server authentication) trust bit removed.
* https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.57_release_notes

update to NSS 3.56

Notable changes

* bmo#1650702 - Support SHA-1 HW acceleration on ARMv8
* bmo#1656981 - Use MPI comba and mulq optimizations on x86-64 MacOS.
* bmo#1654142 - Add CPU feature detection for Intel SHA extension.
* bmo#1648822 - Add stricter validation of DH keys in FIPS mode.
* bmo#1656986 - Properly detect arm64 during GYP build architecture
		detection.
* bmo#1652729 - Add build flag to disable RC2 and relocate to
		lib/freebl/deprecated.
* bmo#1656429 - Correct RTT estimate used in 0-RTT anti-replay.
* bmo#1588941 - Send empty certificate message when scheme selection
		fails.
* bmo#1652032 - Fix failure to build in Windows arm64 makefile
		cross-compilation.
* bmo#1625791 - Fix deadlock issue in nssSlot_IsTokenPresent.
* bmo#1653975 - Fix 3.53 regression by setting 'all' as the default
		makefile target.
* bmo#1659792 - Fix broken libpkix tests with unexpired PayPal cert.
* bmo#1659814 - Fix interop.sh failures with newer tls-interop
		commit and dependencies.
* bmo#1656519 - NSPR dependency updated to 4.28

update to NSS 3.55

Notable changes
* P384 and P521 elliptic curve implementations are replaced with
  verifiable implementations from Fiat-Crypto [0] and ECCKiila [1].
* PK11_FindCertInSlot is added. With this function, a given slot
  can be queried with a DER-Encoded certificate, providing performance
  and usability improvements over other mechanisms. (bmo#1649633)
* DTLS 1.3 implementation is updated to draft-38. (bmo#1647752)

Relevant Bugfixes

* bmo#1631583 (CVE-2020-6829, CVE-2020-12400) - Replace P384 and
  P521 with new, verifiable implementations from Fiat-Crypto and ECCKiila.
* bmo#1649487 - Move overzealous assertion in VFY_EndWithSignature.
* bmo#1631573 (CVE-2020-12401) - Remove unnecessary scalar padding.
* bmo#1636771 (CVE-2020-12403) - Explicitly disable multi-part
  ChaCha20 (which was not functioning correctly) and more strictly
  enforce tag length.
* bmo#1649648 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1649316 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1649322 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1653202 - Fix initialization bug in blapitest when compiled
  with NSS_DISABLE_DEPRECATED_SEED.
* bmo#1646594 - Fix AVX2 detection in makefile builds.
* bmo#1649633 - Add PK11_FindCertInSlot to search a given slot
  for a DER-encoded certificate.
* bmo#1651520 - Fix slotLock race in NSC_GetTokenInfo.
* bmo#1647752 - Update DTLS 1.3 implementation to draft-38.
* bmo#1649190 - Run cipher, sdr, and ocsp tests under standard test cycle in CI.
* bmo#1649226 - Add Wycheproof ECDSA tests.
* bmo#1637222 - Consistently enforce IV requirements for DES and 3DES.
* bmo#1067214 - Enforce minimum PKCS#1 v1.5 padding length in
  RSA_CheckSignRecover.
* bmo#1646324 - Advertise PKCS#1 schemes for certificates in the
  signature_algorithms extension.

update to NSS 3.54

Notable changes

* Support for TLS 1.3 external pre-shared keys (bmo#1603042).
* Use ARM Cryptography Extension for SHA256, when available
  (bmo#1528113)
* The following CA certificates were Added:
  bmo#1645186 - certSIGN Root CA G2.
  bmo#1645174 - e-Szigno Root CA 2017.
  bmo#1641716 - Microsoft ECC Root Certificate Authority 2017.
  bmo#1641716 - Microsoft RSA Root Certificate Authority 2017.
* The following CA certificates were Removed:
  bmo#1645199 - AddTrust Class 1 CA Root.
  bmo#1645199 - AddTrust External CA Root.
  bmo#1641718 - LuxTrust Global Root 2.
  bmo#1639987 - Staat der Nederlanden Root CA - G2.
  bmo#1618402 - Symantec Class 2 Public Primary Certification Authority - G4.
  bmo#1618402 - Symantec Class 1 Public Primary Certification Authority - G4.
  bmo#1618402 - VeriSign Class 3 Public Primary Certification Authority - G3.

* A number of certificates had their Email trust bit disabled.
  See bmo#1618402 for a complete list.

Bugs fixed

* bmo#1528113 - Use ARM Cryptography Extension for SHA256.
* bmo#1603042 - Add TLS 1.3 external PSK support.
* bmo#1642802 - Add uint128 support for HACL* curve25519 on Windows.
* bmo#1645186 - Add 'certSIGN Root CA G2' root certificate.
* bmo#1645174 - Add Microsec's 'e-Szigno Root CA 2017' root certificate.
* bmo#1641716 - Add Microsoft's non-EV root certificates.
* bmo1621151 - Disable email trust bit for 'O=Government
	       Root Certification Authority; C=TW' root.
* bmo#1645199 - Remove AddTrust root certificates.
* bmo#1641718 - Remove 'LuxTrust Global Root 2' root certificate.
* bmo#1639987 - Remove 'Staat der Nederlanden Root CA - G2' root
		certificate.
* bmo#1618402 - Remove Symantec root certificates and disable email trust
		bit.
* bmo#1640516 - NSS 3.54 should depend on NSPR 4.26.
* bmo#1642146 - Fix undefined reference to `PORT_ZAlloc_stub' in seed.c.
* bmo#1642153 - Fix infinite recursion building NSS.
* bmo#1642638 - Fix fuzzing assertion crash.
* bmo#1642871 - Enable SSL_SendSessionTicket after resumption.
* bmo#1643123 - Support SSL_ExportEarlyKeyingMaterial with External PSKs.
* bmo#1643557 - Fix numerous compile warnings in NSS.
* bmo#1644774 - SSL gtests to use ClearServerCache when resetting
		self-encrypt keys.
* bmo#1645479 - Don't use SECITEM_MakeItem in secutil.c.
* bmo#1646520 - Stricter enforcement of ASN.1 INTEGER encoding.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029961">SUSE bug 1029961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174697">SUSE bug 1174697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176206">SUSE bug 1176206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176934">SUSE bug 1176934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179382">SUSE bug 1179382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12400/">CVE-2020-12400 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12400">CVE-2020-12400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12401/">CVE-2020-12401 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12401">CVE-2020-12401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12403/">CVE-2020-12403 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12403">CVE-2020-12403 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25648/">CVE-2020-25648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25648">CVE-2020-25648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6829/">CVE-2020-6829 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6829">CVE-2020-6829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633072" comment="libfreebl3-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633073" comment="libfreebl3-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633074" comment="libfreebl3-hmac-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633075" comment="libfreebl3-hmac-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633076" comment="libsoftokn3-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633077" comment="libsoftokn3-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633078" comment="libsoftokn3-hmac-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633079" comment="libsoftokn3-hmac-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633080" comment="mozilla-nspr-4.32-19.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633081" comment="mozilla-nspr-32bit-4.32-19.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633082" comment="mozilla-nspr-devel-4.32-19.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633083" comment="mozilla-nss-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633084" comment="mozilla-nss-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633085" comment="mozilla-nss-certs-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633086" comment="mozilla-nss-certs-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633087" comment="mozilla-nss-devel-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633088" comment="mozilla-nss-sysinit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633089" comment="mozilla-nss-sysinit-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633090" comment="mozilla-nss-tools-3.68-58.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150329" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1136882" ref_url="https://bugzilla.suse.com/1136882" source="BUGZILLA"/>
		<reference ref_id="1159130" ref_url="https://bugzilla.suse.com/1159130" source="BUGZILLA"/>
		<reference ref_id="1159293" ref_url="https://bugzilla.suse.com/1159293" source="BUGZILLA"/>
		<reference ref_id="1161698" ref_url="https://bugzilla.suse.com/1161698" source="BUGZILLA"/>
		<reference ref_id="1186329" ref_url="https://bugzilla.suse.com/1186329" source="BUGZILLA"/>
		<reference ref_id="1189325" ref_url="https://bugzilla.suse.com/1189325" source="BUGZILLA"/>
		<reference ref_id="1189343" ref_url="https://bugzilla.suse.com/1189343" source="BUGZILLA"/>
		<reference ref_id="1189345" ref_url="https://bugzilla.suse.com/1189345" source="BUGZILLA"/>
		<reference ref_id="1189346" ref_url="https://bugzilla.suse.com/1189346" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19555" ref_url="https://www.suse.com/security/cve/CVE-2019-19555/" source="CVE"/>
		<reference ref_id="CVE-2019-19746" ref_url="https://www.suse.com/security/cve/CVE-2019-19746/" source="CVE"/>
		<reference ref_id="CVE-2019-19797" ref_url="https://www.suse.com/security/cve/CVE-2019-19797/" source="CVE"/>
		<reference ref_id="CVE-2020-21680" ref_url="https://www.suse.com/security/cve/CVE-2020-21680/" source="CVE"/>
		<reference ref_id="CVE-2020-21681" ref_url="https://www.suse.com/security/cve/CVE-2020-21681/" source="CVE"/>
		<reference ref_id="CVE-2020-21682" ref_url="https://www.suse.com/security/cve/CVE-2020-21682/" source="CVE"/>
		<reference ref_id="CVE-2020-21683" ref_url="https://www.suse.com/security/cve/CVE-2020-21683/" source="CVE"/>
		<reference ref_id="CVE-2021-3561" ref_url="https://www.suse.com/security/cve/CVE-2021-3561/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Update to version 3.2.8, including fixes for

- CVE-2021-3561: overflow in fig2dev/read.c in function read_colordef() (bsc#1186329).
- CVE-2020-21683: Fixed buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c (bsc#1189325).
- CVE-2020-21682: Fixed buffer overflow in the set_fill component in genge.c (bsc#1189346).
- CVE-2020-21681: Fixed buffer overflow in the set_color component in genge.c (bsc#1189345).
- CVE-2020-21680: Fixed stack-based buffer overflow in the put_arrow() component in genpict2e.c (bsc#1189343).
- CVE-2019-19797: out-of-bounds write in read_colordef in read.c (bsc#1159293).
- CVE-2019-19555: stack-based buffer overflow because of an incorrect sscanf (bsc#1161698).
- CVE-2019-19746: segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type (bsc#1159130).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1136882">SUSE bug 1136882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159130">SUSE bug 1159130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159293">SUSE bug 1159293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161698">SUSE bug 1161698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186329">SUSE bug 1186329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189325">SUSE bug 1189325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189343">SUSE bug 1189343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189345">SUSE bug 1189345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189346">SUSE bug 1189346</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19555/">CVE-2019-19555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19555">CVE-2019-19555 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19746/">CVE-2019-19746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19746">CVE-2019-19746 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19797/">CVE-2019-19797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19797">CVE-2019-19797 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21680/">CVE-2020-21680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21680">CVE-2020-21680 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21681/">CVE-2020-21681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21681">CVE-2020-21681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21682/">CVE-2020-21682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21682">CVE-2020-21682 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21683/">CVE-2020-21683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21683">CVE-2020-21683 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3561/">CVE-2021-3561 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3561">CVE-2021-3561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631279" comment="transfig-3.2.8a-2.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150330" version="1" class="patch">
	<metadata>
		<title>Security update for gtk-vnc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1024266" ref_url="https://bugzilla.suse.com/1024266" source="BUGZILLA"/>
		<reference ref_id="1024268" ref_url="https://bugzilla.suse.com/1024268" source="BUGZILLA"/>
		<reference ref_id="1046782" ref_url="https://bugzilla.suse.com/1046782" source="BUGZILLA"/>
		<reference ref_id="1188292" ref_url="https://bugzilla.suse.com/1188292" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5884" ref_url="https://www.suse.com/security/cve/CVE-2017-5884/" source="CVE"/>
		<reference ref_id="CVE-2017-5885" ref_url="https://www.suse.com/security/cve/CVE-2017-5885/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009456.html" source="SUSE-SU"/>
		<description>
This update for gtk-vnc fixes the following issues:

- CVE-2017-5885: Correctly validate color map range indexes (bsc#1024268).
- CVE-2017-5884: Fix bounds checking for RRE, hextile &amp; copyrect encodings (bsc#1024266).
- Fix crash when opening connection from a GSocketAddress (bsc#1046782).
- Fix possible crash on connection failure (bsc#1188292).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024266">SUSE bug 1024266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024268">SUSE bug 1024268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046782">SUSE bug 1046782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188292">SUSE bug 1188292</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5884/">CVE-2017-5884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5884">CVE-2017-5884 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5885/">CVE-2017-5885 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5885">CVE-2017-5885 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628160" comment="libgtk-vnc-1_0-0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628161" comment="libgtk-vnc-2_0-0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628162" comment="libgvnc-1_0-0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628163" comment="python-gtk-vnc-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628164" comment="typelib-1_0-GVnc-1_0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628165" comment="typelib-1_0-GtkVnc-2_0-0.6.0-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150331" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009467.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712. 
  Read buffer overruns processing ASN.1 strings (bsc#1189521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-20"/>
	<updated date="2021-09-20"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633625" comment="libopenssl-devel-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633626" comment="libopenssl1_0_0-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633627" comment="libopenssl1_0_0-32bit-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633628" comment="libopenssl1_0_0-hmac-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633629" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633630" comment="openssl-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632405" comment="openssl-doc-1.0.2j-60.72.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150332" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1190381" ref_url="https://bugzilla.suse.com/1190381" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3781" ref_url="https://www.suse.com/security/cve/CVE-2021-3781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009476.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2021-3781: Fixed a trivial -dSAFER bypass command injection (bsc#1190381)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-21"/>
	<updated date="2021-09-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1190381">SUSE bug 1190381</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3781/">CVE-2021-3781 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3781">CVE-2021-3781 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632795" comment="ghostscript-9.52-23.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632778" comment="ghostscript-devel-9.52-23.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632796" comment="ghostscript-x11-9.52-23.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632779" comment="libspectre-devel-0.2.7-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632797" comment="libspectre1-0.2.7-12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150333" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.1.0 ESR.

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-22"/>
	<updated date="2021-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29981">CVE-2021-29981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29982">CVE-2021-29982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29983">CVE-2021-29983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29987">CVE-2021-29987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29990">CVE-2021-29990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29991">CVE-2021-29991 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38492">CVE-2021-38492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38495">CVE-2021-38495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633643" comment="MozillaFirefox-91.1.0-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633644" comment="MozillaFirefox-branding-SLE-91-35.6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633607" comment="MozillaFirefox-devel-91.1.0-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633645" comment="MozillaFirefox-translations-common-91.1.0-112.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150334" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009497.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009633390" comment="kgraft-patch-4_4_180-94_135-default-12-2.3 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150335" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009497.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009632887" comment="kgraft-patch-4_4_180-94_147-default-3-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150336" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009497.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009632886" comment="kgraft-patch-4_4_180-94_144-default-6-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150337" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009497.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009632885" comment="kgraft-patch-4_4_180-94_141-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150338" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009497.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009632884" comment="kgraft-patch-4_4_180-94_138-default-10-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150339" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 20 [bsc#1180063,bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14781 CVE-2020-14779
  CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class libraries:
    - SOCKETADAPTOR$SOCKETINPUTSTREAM.READ is blocking for more time
      that the set timeout
    - Z/OS specific C function send_file is changing the file pointer
      position
  * Java Virtual Machine:
    - Crash on iterate java stack
    - Java process hang on SIGTERM
  * JIT Compiler:
    - JMS performance regression from JDK8 SR5 FP40 TO FP41

  * Class Libraries:
    - z15 high utilization following Z/VM and Linux migration from
      z14 To z15
  * Java Virtual Machine:
    - Assertion failed when trying to write a class file
    - Assertion failure at modronapi.cpp
    - Improve the performance of defining and finding classes
  * JIT Compiler:
    - An assert in ppcbinaryencoding.cpp may trigger when running
      with traps disabled on power
    - AOT field offset off by n bytes
    - Segmentation fault in jit module on ibm z platform		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552079" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543206" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150340" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009497.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009632883" comment="kgraft-patch-4_4_180-94_130-default-14-2.3 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150341" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1189373" ref_url="https://bugzilla.suse.com/1189373" source="BUGZILLA"/>
		<reference ref_id="1189378" ref_url="https://bugzilla.suse.com/1189378" source="BUGZILLA"/>
		<reference ref_id="1189632" ref_url="https://bugzilla.suse.com/1189632" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28701" ref_url="https://www.suse.com/security/cve/CVE-2021-28701/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009501.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-28701: Fixed race condition in XENMAPSPACE_grant_table handling (XSA-384) (bsc#1189632).

- Integrate bugfixes (bsc#1189373, bsc#1189378).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189378">SUSE bug 1189378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189632">SUSE bug 1189632</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28701/">CVE-2021-28701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28701">CVE-2021-28701 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633441" comment="xen-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633442" comment="xen-doc-html-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633443" comment="xen-libs-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633444" comment="xen-libs-32bit-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633445" comment="xen-tools-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633446" comment="xen-tools-domU-4.9.4_22-3.94.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150342" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1157818" ref_url="https://bugzilla.suse.com/1157818" source="BUGZILLA"/>
		<reference ref_id="1158812" ref_url="https://bugzilla.suse.com/1158812" source="BUGZILLA"/>
		<reference ref_id="1158958" ref_url="https://bugzilla.suse.com/1158958" source="BUGZILLA"/>
		<reference ref_id="1158959" ref_url="https://bugzilla.suse.com/1158959" source="BUGZILLA"/>
		<reference ref_id="1158960" ref_url="https://bugzilla.suse.com/1158960" source="BUGZILLA"/>
		<reference ref_id="1159491" ref_url="https://bugzilla.suse.com/1159491" source="BUGZILLA"/>
		<reference ref_id="1159715" ref_url="https://bugzilla.suse.com/1159715" source="BUGZILLA"/>
		<reference ref_id="1159847" ref_url="https://bugzilla.suse.com/1159847" source="BUGZILLA"/>
		<reference ref_id="1159850" ref_url="https://bugzilla.suse.com/1159850" source="BUGZILLA"/>
		<reference ref_id="1160309" ref_url="https://bugzilla.suse.com/1160309" source="BUGZILLA"/>
		<reference ref_id="1160438" ref_url="https://bugzilla.suse.com/1160438" source="BUGZILLA"/>
		<reference ref_id="1160439" ref_url="https://bugzilla.suse.com/1160439" source="BUGZILLA"/>
		<reference ref_id="1164719" ref_url="https://bugzilla.suse.com/1164719" source="BUGZILLA"/>
		<reference ref_id="1172091" ref_url="https://bugzilla.suse.com/1172091" source="BUGZILLA"/>
		<reference ref_id="1172115" ref_url="https://bugzilla.suse.com/1172115" source="BUGZILLA"/>
		<reference ref_id="1172234" ref_url="https://bugzilla.suse.com/1172234" source="BUGZILLA"/>
		<reference ref_id="1172236" ref_url="https://bugzilla.suse.com/1172236" source="BUGZILLA"/>
		<reference ref_id="1172240" ref_url="https://bugzilla.suse.com/1172240" source="BUGZILLA"/>
		<reference ref_id="1173641" ref_url="https://bugzilla.suse.com/1173641" source="BUGZILLA"/>
		<reference ref_id="928700" ref_url="https://bugzilla.suse.com/928700" source="BUGZILLA"/>
		<reference ref_id="928701" ref_url="https://bugzilla.suse.com/928701" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3414" ref_url="https://www.suse.com/security/cve/CVE-2015-3414/" source="CVE"/>
		<reference ref_id="CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415/" source="CVE"/>
		<reference ref_id="CVE-2016-6153" ref_url="https://www.suse.com/security/cve/CVE-2016-6153/" source="CVE"/>
		<reference ref_id="CVE-2017-10989" ref_url="https://www.suse.com/security/cve/CVE-2017-10989/" source="CVE"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<reference ref_id="CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740/" source="CVE"/>
		<reference ref_id="CVE-2019-16168" ref_url="https://www.suse.com/security/cve/CVE-2019-16168/" source="CVE"/>
		<reference ref_id="CVE-2019-19244" ref_url="https://www.suse.com/security/cve/CVE-2019-19244/" source="CVE"/>
		<reference ref_id="CVE-2019-19317" ref_url="https://www.suse.com/security/cve/CVE-2019-19317/" source="CVE"/>
		<reference ref_id="CVE-2019-19603" ref_url="https://www.suse.com/security/cve/CVE-2019-19603/" source="CVE"/>
		<reference ref_id="CVE-2019-19645" ref_url="https://www.suse.com/security/cve/CVE-2019-19645/" source="CVE"/>
		<reference ref_id="CVE-2019-19646" ref_url="https://www.suse.com/security/cve/CVE-2019-19646/" source="CVE"/>
		<reference ref_id="CVE-2019-19880" ref_url="https://www.suse.com/security/cve/CVE-2019-19880/" source="CVE"/>
		<reference ref_id="CVE-2019-19923" ref_url="https://www.suse.com/security/cve/CVE-2019-19923/" source="CVE"/>
		<reference ref_id="CVE-2019-19924" ref_url="https://www.suse.com/security/cve/CVE-2019-19924/" source="CVE"/>
		<reference ref_id="CVE-2019-19925" ref_url="https://www.suse.com/security/cve/CVE-2019-19925/" source="CVE"/>
		<reference ref_id="CVE-2019-19926" ref_url="https://www.suse.com/security/cve/CVE-2019-19926/" source="CVE"/>
		<reference ref_id="CVE-2019-19959" ref_url="https://www.suse.com/security/cve/CVE-2019-19959/" source="CVE"/>
		<reference ref_id="CVE-2019-20218" ref_url="https://www.suse.com/security/cve/CVE-2019-20218/" source="CVE"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<reference ref_id="CVE-2020-13434" ref_url="https://www.suse.com/security/cve/CVE-2020-13434/" source="CVE"/>
		<reference ref_id="CVE-2020-13435" ref_url="https://www.suse.com/security/cve/CVE-2020-13435/" source="CVE"/>
		<reference ref_id="CVE-2020-13630" ref_url="https://www.suse.com/security/cve/CVE-2020-13630/" source="CVE"/>
		<reference ref_id="CVE-2020-13631" ref_url="https://www.suse.com/security/cve/CVE-2020-13631/" source="CVE"/>
		<reference ref_id="CVE-2020-13632" ref_url="https://www.suse.com/security/cve/CVE-2020-13632/" source="CVE"/>
		<reference ref_id="CVE-2020-15358" ref_url="https://www.suse.com/security/cve/CVE-2020-15358/" source="CVE"/>
		<reference ref_id="CVE-2020-9327" ref_url="https://www.suse.com/security/cve/CVE-2020-9327/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

sqlite3 is sync version 3.36.0 from Factory (jsc#SLE-16032).

The following CVEs have been fixed in upstream releases up to
this point, but were not mentioned in the change log so far:

* bsc#1173641, CVE-2020-15358: heap-based buffer overflow in
  multiSelectOrderBy due to mishandling of query-flattener
  optimization
* bsc#1164719, CVE-2020-9327: NULL pointer dereference and
  segmentation fault because of generated column optimizations in
  isAuxiliaryVtabOperator
* bsc#1160439, CVE-2019-20218: selectExpander in select.c proceeds
  with WITH stack unwinding even after a parsing error
* bsc#1160438, CVE-2019-19959: memory-management error via
  ext/misc/zipfile.c involving embedded '\0' input
* bsc#1160309, CVE-2019-19923: improper handling  of  certain uses
  of SELECT DISTINCT in flattenSubquery may lead to null pointer
  dereference
* bsc#1159850, CVE-2019-19924: improper error handling in
  sqlite3WindowRewrite()
* bsc#1159847, CVE-2019-19925: improper handling of NULL pathname
  during an update of a ZIP archive
* bsc#1159715, CVE-2019-19926: improper handling  of certain
  errors during parsing  multiSelect in select.c
* bsc#1159491, CVE-2019-19880: exprListAppendList in window.c
  allows attackers to trigger an invalid pointer dereference
* bsc#1158960, CVE-2019-19603: during handling of CREATE TABLE
  and CREATE VIEW statements, does not consider confusion with
  a shadow table name
* bsc#1158959, CVE-2019-19646: pragma.c mishandles NOT NULL in an
  integrity_check PRAGMA command in certain cases of generated
  columns
* bsc#1158958, CVE-2019-19645: alter.c allows attackers to trigger
  infinite recursion via certain types of self-referential views
  in conjunction with ALTER TABLE statements
* bsc#1158812, CVE-2019-19317: lookupName in resolve.c omits bits
  from the colUsed bitmask in the case of a generated column,
  which allows attackers to cause a denial of service
* bsc#1157818, CVE-2019-19244: sqlite3,sqlite2,sqlite: The
  function sqlite3Select in select.c allows a crash if a
  sub-select uses both DISTINCT and window functions, and also
  has certain ORDER BY usage
* bsc#928701, CVE-2015-3415: sqlite3VdbeExec comparison operator
  vulnerability
* bsc#928700, CVE-2015-3414: sqlite3,sqlite2: dequoting of
  collation-sequence names
* CVE-2020-13434 bsc#1172115: integer overflow in
  sqlite3_str_vappendf
* CVE-2020-13630 bsc#1172234: use-after-free in fts3EvalNextRow
* CVE-2020-13631 bsc#1172236: virtual table allowed to be renamed
  to one of its shadow tables
* CVE-2020-13632 bsc#1172240: NULL pointer dereference via
  crafted matchinfo() query
* CVE-2020-13435: Malicious SQL statements could have crashed the
  process that is running SQLite (bsc#1172091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157818">SUSE bug 1157818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158812">SUSE bug 1158812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158958">SUSE bug 1158958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158959">SUSE bug 1158959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158960">SUSE bug 1158960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159491">SUSE bug 1159491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159715">SUSE bug 1159715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159847">SUSE bug 1159847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159850">SUSE bug 1159850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160309">SUSE bug 1160309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160438">SUSE bug 1160438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160439">SUSE bug 1160439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164719">SUSE bug 1164719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172091">SUSE bug 1172091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172115">SUSE bug 1172115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172234">SUSE bug 1172234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172236">SUSE bug 1172236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172240">SUSE bug 1172240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173641">SUSE bug 1173641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3414/">CVE-2015-3414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3414">CVE-2015-3414 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3415">CVE-2015-3415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6153/">CVE-2016-6153 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6153">CVE-2016-6153 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10989/">CVE-2017-10989 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10989">CVE-2017-10989 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2518">CVE-2017-2518 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20346">CVE-2018-20346 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8740">CVE-2018-8740 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16168/">CVE-2019-16168 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16168">CVE-2019-16168 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19244/">CVE-2019-19244 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19244">CVE-2019-19244 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19317/">CVE-2019-19317 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19317">CVE-2019-19317 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19603/">CVE-2019-19603 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19603">CVE-2019-19603 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19645/">CVE-2019-19645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19645">CVE-2019-19645 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19646/">CVE-2019-19646 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19646">CVE-2019-19646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19880/">CVE-2019-19880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19880">CVE-2019-19880 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19923/">CVE-2019-19923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19923">CVE-2019-19923 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19924/">CVE-2019-19924 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19924">CVE-2019-19924 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19925/">CVE-2019-19925 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19925">CVE-2019-19925 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19926/">CVE-2019-19926 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19926">CVE-2019-19926 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19959/">CVE-2019-19959 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19959">CVE-2019-19959 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20218/">CVE-2019-20218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20218">CVE-2019-20218 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8457">CVE-2019-8457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13434/">CVE-2020-13434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13434">CVE-2020-13434 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13435/">CVE-2020-13435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13435">CVE-2020-13435 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13630/">CVE-2020-13630 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13630">CVE-2020-13630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13631/">CVE-2020-13631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13631">CVE-2020-13631 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13632/">CVE-2020-13632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13632">CVE-2020-13632 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15358/">CVE-2020-15358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15358">CVE-2020-15358 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-9327/">CVE-2020-9327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9327">CVE-2020-9327 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633647" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633648" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633649" comment="sqlite3-3.36.0-9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633609" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150343" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1177120" ref_url="https://bugzilla.suse.com/1177120" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009517.html" source="SUSE-SU"/>
		<description>

This update for python-urllib3 fixes the following security issue:

- CVE-2020-26137: A CRLF injection via HTTP request method was fixed (bsc#1177120)

Note that this was fixed in a previous version update to 1.25.9, this update just complements the tracking.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-29"/>
	<updated date="2021-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26137">CVE-2020-26137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631062" comment="python3-urllib3-1.25.10-3.31.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150344" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1117993" ref_url="https://bugzilla.suse.com/1117993" source="BUGZILLA"/>
		<reference ref_id="1186489" ref_url="https://bugzilla.suse.com/1186489" source="BUGZILLA"/>
		<reference ref_id="1187911" ref_url="https://bugzilla.suse.com/1187911" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574/" source="CVE"/>
		<reference ref_id="CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009546.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2021-35942: wordexp: handle overflow in positional parameter number (bsc#1187911)
- CVE-2021-33574: Use __pthread_attr_copy in mq_notify (bsc#1186489)

Also the following bug was fixed:

- Avoid concurrency problem in ldconfig (bsc#1117993)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117993">SUSE bug 1117993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186489">SUSE bug 1186489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187911">SUSE bug 1187911</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">CVE-2021-33574 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">CVE-2021-35942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651259" comment="glibc-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651260" comment="glibc-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651261" comment="glibc-devel-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651262" comment="glibc-devel-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651118" comment="glibc-html-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651119" comment="glibc-i18ndata-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651120" comment="glibc-info-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651263" comment="glibc-locale-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651264" comment="glibc-locale-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651265" comment="glibc-profile-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651266" comment="glibc-profile-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651267" comment="nscd-2.22-116.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150345" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1188697" ref_url="https://bugzilla.suse.com/1188697" source="BUGZILLA"/>
		<reference ref_id="1190701" ref_url="https://bugzilla.suse.com/1190701" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21806" ref_url="https://www.suse.com/security/cve/CVE-2021-21806/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009534.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.4
- CVE-2021-30858: Fixed a security bug that could allow maliciously crafted web content to achieve arbitrary code execution. (bsc#1190701)
- CVE-2021-21806: Fixed an exploitable use-after-free vulnerability via specially crafted HTML web page. (bsc#1188697)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190701">SUSE bug 1190701</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21806/">CVE-2021-21806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21806">CVE-2021-21806 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30858">CVE-2021-30858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634406" comment="libjavascriptcoregtk-4_0-18-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634407" comment="libwebkit2gtk-4_0-37-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634365" comment="libwebkit2gtk3-lang-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634408" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634409" comment="typelib-1_0-WebKit2-4_0-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634370" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634410" comment="webkit2gtk-4_0-injected-bundles-2.32.4-2.71.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150346" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1190666" ref_url="https://bugzilla.suse.com/1190666" source="BUGZILLA"/>
		<reference ref_id="1190669" ref_url="https://bugzilla.suse.com/1190669" source="BUGZILLA"/>
		<reference ref_id="1190703" ref_url="https://bugzilla.suse.com/1190703" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34798" ref_url="https://www.suse.com/security/cve/CVE-2021-34798/" source="CVE"/>
		<reference ref_id="CVE-2021-39275" ref_url="https://www.suse.com/security/cve/CVE-2021-39275/" source="CVE"/>
		<reference ref_id="CVE-2021-40438" ref_url="https://www.suse.com/security/cve/CVE-2021-40438/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009537.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-40438: Fixed a SRF via a crafted request uri-path. (bsc#1190703)
- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)
- CVE-2021-34798: Fixed a NULL pointer dereference via malformed requests. (bsc#1190669)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190666">SUSE bug 1190666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190669">SUSE bug 1190669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190703">SUSE bug 1190703</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34798/">CVE-2021-34798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34798">CVE-2021-34798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39275/">CVE-2021-39275 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39275">CVE-2021-39275 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40438/">CVE-2021-40438 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40438">CVE-2021-40438 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633928" comment="apache2-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633898" comment="apache2-doc-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633929" comment="apache2-example-pages-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633930" comment="apache2-prefork-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633931" comment="apache2-utils-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633932" comment="apache2-worker-2.4.23-29.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150347" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008282.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-08"/>
	<updated date="2021-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009529919" comment="libpython3_4m1_0-3.4.10-25.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009529920" comment="python3-3.4.10-25.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009529921" comment="python3-base-3.4.10-25.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009529922" comment="python3-curses-3.4.10-25.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543208" comment="python3-devel-3.4.10-25.63.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150348" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1190710" ref_url="https://bugzilla.suse.com/1190710" source="BUGZILLA"/>
		<reference ref_id="1191332" ref_url="https://bugzilla.suse.com/1191332" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.2.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-45 (bsc#1191332)

* CVE-2021-38496: Use-after-free in MessageTask
* CVE-2021-38497: Validation message could have been overlaid on another origin
* CVE-2021-38498: Use-after-free of nsLanguageAtomService object
* CVE-2021-32810: Fixed Data race in crossbeam-deque
* CVE-2021-38500: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2
* CVE-2021-38501: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2

- Fixed crash in FIPS mode (bsc#1190710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-15"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190710">SUSE bug 1190710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32810">CVE-2021-32810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38496">CVE-2021-38496 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38497">CVE-2021-38497 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38498">CVE-2021-38498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38500">CVE-2021-38500 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38501">CVE-2021-38501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651917" comment="MozillaFirefox-91.2.0-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651859" comment="MozillaFirefox-devel-91.2.0-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651918" comment="MozillaFirefox-translations-common-91.2.0-112.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150349" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="1190350" ref_url="https://bugzilla.suse.com/1190350" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009606.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes several issues.

The following security issues were fixed:

- CVE-2021-3715: Fixed a user-after-free in the Linux kernel's Traffic Control networking subsystem which could lead to local privilege escalation. (bsc#1190350).
- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190350">SUSE bug 1190350</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3573">CVE-2021-3573 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3715">CVE-2021-3715 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160">CVE-2021-38160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009651505" comment="kgraft-patch-4_4_180-94_144-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150350" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="1190350" ref_url="https://bugzilla.suse.com/1190350" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009606.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes several issues.

The following security issues were fixed:

- CVE-2021-3715: Fixed a user-after-free in the Linux kernel's Traffic Control networking subsystem which could lead to local privilege escalation. (bsc#1190350).
- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190350">SUSE bug 1190350</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3573">CVE-2021-3573 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3715">CVE-2021-3715 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160">CVE-2021-38160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009651506" comment="kgraft-patch-4_4_180-94_147-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150351" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="1190350" ref_url="https://bugzilla.suse.com/1190350" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009606.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- CVE-2021-3715: Fixed a user-after-free in the Linux kernel's Traffic Control networking subsystem which could lead to local privilege escalation. (bsc#1190350).
- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190350">SUSE bug 1190350</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3573">CVE-2021-3573 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3715">CVE-2021-3715 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160">CVE-2021-38160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009651572" comment="kgraft-patch-4_4_180-94_135-default-13-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150352" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="1190350" ref_url="https://bugzilla.suse.com/1190350" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009606.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following security issues were fixed:

- CVE-2021-3715: Fixed a user-after-free in the Linux kernel's Traffic Control networking subsystem which could lead to local privilege escalation. (bsc#1190350).
- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190350">SUSE bug 1190350</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3573">CVE-2021-3573 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3715">CVE-2021-3715 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160">CVE-2021-38160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009651573" comment="kgraft-patch-4_4_180-94_138-default-11-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150353" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="1190350" ref_url="https://bugzilla.suse.com/1190350" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009606.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.

The following security issues were fixed:

- CVE-2021-3715: Fixed a user-after-free in the Linux kernel's Traffic Control networking subsystem which could lead to local privilege escalation. (bsc#1190350).
- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190350">SUSE bug 1190350</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3573">CVE-2021-3573 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3715">CVE-2021-3715 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160">CVE-2021-38160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009651574" comment="kgraft-patch-4_4_180-94_141-default-10-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150354" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1081947" ref_url="https://bugzilla.suse.com/1081947" source="BUGZILLA"/>
		<reference ref_id="1082293" ref_url="https://bugzilla.suse.com/1082293" source="BUGZILLA"/>
		<reference ref_id="1084671" ref_url="https://bugzilla.suse.com/1084671" source="BUGZILLA"/>
		<reference ref_id="1085196" ref_url="https://bugzilla.suse.com/1085196" source="BUGZILLA"/>
		<reference ref_id="1106214" ref_url="https://bugzilla.suse.com/1106214" source="BUGZILLA"/>
		<reference ref_id="1122417" ref_url="https://bugzilla.suse.com/1122417" source="BUGZILLA"/>
		<reference ref_id="1125886" ref_url="https://bugzilla.suse.com/1125886" source="BUGZILLA"/>
		<reference ref_id="1135534" ref_url="https://bugzilla.suse.com/1135534" source="BUGZILLA"/>
		<reference ref_id="1135708" ref_url="https://bugzilla.suse.com/1135708" source="BUGZILLA"/>
		<reference ref_id="1151708" ref_url="https://bugzilla.suse.com/1151708" source="BUGZILLA"/>
		<reference ref_id="1168235" ref_url="https://bugzilla.suse.com/1168235" source="BUGZILLA"/>
		<reference ref_id="1168389" ref_url="https://bugzilla.suse.com/1168389" source="BUGZILLA"/>
		<reference ref_id="1169006" ref_url="https://bugzilla.suse.com/1169006" source="BUGZILLA"/>
		<reference ref_id="1174942" ref_url="https://bugzilla.suse.com/1174942" source="BUGZILLA"/>
		<reference ref_id="1175514" ref_url="https://bugzilla.suse.com/1175514" source="BUGZILLA"/>
		<reference ref_id="1175623" ref_url="https://bugzilla.suse.com/1175623" source="BUGZILLA"/>
		<reference ref_id="1178236" ref_url="https://bugzilla.suse.com/1178236" source="BUGZILLA"/>
		<reference ref_id="1178554" ref_url="https://bugzilla.suse.com/1178554" source="BUGZILLA"/>
		<reference ref_id="1178825" ref_url="https://bugzilla.suse.com/1178825" source="BUGZILLA"/>
		<reference ref_id="1188921" ref_url="https://bugzilla.suse.com/1188921" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37600" ref_url="https://www.suse.com/security/cve/CVE-2021-37600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009610.html" source="SUSE-SU"/>
		<description>
This update for util-linux fixes the following issues:

- CVE-2021-37600: Fixed an integer overflow which could lead to buffer overflow in get_sem_elements. (bsc#1188921)
- Prevent outdated pam files (bsc#1082293, bsc#1081947#c68).
- Do not trim read-only volumes (bsc#1106214).
- libmount: To prevent incorrect behavior, recognize more pseudofs and netfs (bsc#1122417).
- raw.service: Add RemainAfterExit=yes (bsc#1135534).
- agetty: Reload issue only if it is really needed (bsc#1085196)
- agetty: Return previous response of agetty for special characters (bsc#1085196, bsc#1125886)
- blockdev: Do not fail --report on kpartx-style partitions on multipath. (bsc#1168235)
- nologin: Add support for -c to prevent error from su -c. (bsc#1151708)
- Avoid triggering autofs in lookup_umount_fs_by_statfs. (bsc#1168389)
- libblkid: Do not trigger CDROM autoclose. (bsc#1084671)
- Avoid sulogin failing on not existing or not functional console devices. (bsc#1175514)
- Build with libudev support to support non-root users. (bsc#1169006)
- lscpu: avoid segfault on PowerPC systems with valid hardware configurations. (bsc#1175623, bsc#1178554, bsc#1178825)
- Fix for warning on mounts to CIFS with mount. (SG#57988, bsc#1174942)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081947">SUSE bug 1081947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082293">SUSE bug 1082293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084671">SUSE bug 1084671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085196">SUSE bug 1085196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106214">SUSE bug 1106214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122417">SUSE bug 1122417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125886">SUSE bug 1125886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135534">SUSE bug 1135534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135708">SUSE bug 1135708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151708">SUSE bug 1151708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168235">SUSE bug 1168235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168389">SUSE bug 1168389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169006">SUSE bug 1169006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174942">SUSE bug 1174942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175514">SUSE bug 1175514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175623">SUSE bug 1175623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178236">SUSE bug 1178236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178554">SUSE bug 1178554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178825">SUSE bug 1178825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188921">SUSE bug 1188921</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37600/">CVE-2021-37600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">CVE-2021-37600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652809" comment="libblkid1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652810" comment="libblkid1-32bit-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652811" comment="libfdisk1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652812" comment="libmount1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652813" comment="libmount1-32bit-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652814" comment="libsmartcols1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652815" comment="libuuid1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652816" comment="libuuid1-32bit-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652817" comment="python-libmount-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652818" comment="util-linux-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652496" comment="util-linux-lang-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652819" comment="util-linux-systemd-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652820" comment="uuidd-2.29.2-3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150355" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1191435" ref_url="https://bugzilla.suse.com/1191435" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41991" ref_url="https://www.suse.com/security/cve/CVE-2021-41991/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009611.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191435">SUSE bug 1191435</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41991/">CVE-2021-41991 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41991">CVE-2021-41991 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652821" comment="strongswan-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652801" comment="strongswan-doc-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652822" comment="strongswan-hmac-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652823" comment="strongswan-ipsec-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652824" comment="strongswan-libs0-5.1.3-26.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150356" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178961" ref_url="https://bugzilla.suse.com/1178961" source="BUGZILLA"/>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1183118" ref_url="https://bugzilla.suse.com/1183118" source="BUGZILLA"/>
		<reference ref_id="1183168" ref_url="https://bugzilla.suse.com/1183168" source="BUGZILLA"/>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="1185952" ref_url="https://bugzilla.suse.com/1185952" source="BUGZILLA"/>
		<reference ref_id="1187751" ref_url="https://bugzilla.suse.com/1187751" source="BUGZILLA"/>
		<reference ref_id="1190177" ref_url="https://bugzilla.suse.com/1190177" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009622.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

- Fix for build with llvm12 on s390x. (bsc#1185952)
- Re-enable 'icu' for PostgreSQL 10. (bsc#1179945)
- Add postgresqlXX-server-devel as a dependency for postgresql13-server-devel. (bsc#1187751)
- Upgrade to version 10.18. (bsc#1190177)

Upgrade to version 10.17 (already released for SUSE Linux Enterprise 12 SP5):

- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).

- Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).
- Re-enable build of the llvmjit subpackage on SLE, but it will only be delivered on PackageHub for now (bsc#1183118).
- Disable icu for PostgreSQL 10 (and older) on TW (bsc#1179945).
- Fixed an issue droping irregular warning messages by removing the package. (bsc#1178961)
- Fixed an issue when build does not build the requiements to avoid dangling symlinks in the devel package. (bsc#1179765)
- Fix recently-added timetz test case so it works when the USA is not observing daylight savings time.

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178961">SUSE bug 1178961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183118">SUSE bug 1183118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183168">SUSE bug 1183168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185952">SUSE bug 1185952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187751">SUSE bug 1187751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190177">SUSE bug 1190177</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652182" comment="postgresql10-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652183" comment="postgresql10-contrib-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652158" comment="postgresql10-docs-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652184" comment="postgresql10-plperl-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652185" comment="postgresql10-plpython-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652186" comment="postgresql10-pltcl-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652187" comment="postgresql10-server-10.18-4.19.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150357" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1191957" ref_url="https://bugzilla.suse.com/1191957" source="BUGZILLA"/>
		<reference ref_id="1191992" ref_url="https://bugzilla.suse.com/1191992" source="BUGZILLA"/>
		<reference ref_id="1192000" ref_url="https://bugzilla.suse.com/1192000" source="BUGZILLA"/>
		<reference ref_id="1192005" ref_url="https://bugzilla.suse.com/1192005" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42779" ref_url="https://www.suse.com/security/cve/CVE-2021-42779/" source="CVE"/>
		<reference ref_id="CVE-2021-42780" ref_url="https://www.suse.com/security/cve/CVE-2021-42780/" source="CVE"/>
		<reference ref_id="CVE-2021-42781" ref_url="https://www.suse.com/security/cve/CVE-2021-42781/" source="CVE"/>
		<reference ref_id="CVE-2021-42782" ref_url="https://www.suse.com/security/cve/CVE-2021-42782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009683.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2021-42780: Fixed use after return in insert_pin() (bsc#1192005).
- CVE-2021-42779: Fixed use after free in sc_file_valid() (bsc#1191992).
- CVE-2021-42781: Fixed multiple heap buffer overflows in pkcs15-oberthur.c (bsc#1192000).
- CVE-2021-42782: Stack buffer overflow issues in various places (bsc#1191957).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191957">SUSE bug 1191957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191992">SUSE bug 1191992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192000">SUSE bug 1192000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192005">SUSE bug 1192005</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42779/">CVE-2021-42779 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42779">CVE-2021-42779 at NVD</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-42780/">CVE-2021-42780 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42780">CVE-2021-42780 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42781/">CVE-2021-42781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42781">CVE-2021-42781 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42782/">CVE-2021-42782 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42782">CVE-2021-42782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653631" comment="opensc-0.13.0-3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150358" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1190607" ref_url="https://bugzilla.suse.com/1190607" source="BUGZILLA"/>
		<reference ref_id="1190611" ref_url="https://bugzilla.suse.com/1190611" source="BUGZILLA"/>
		<reference ref_id="1190612" ref_url="https://bugzilla.suse.com/1190612" source="BUGZILLA"/>
		<reference ref_id="1190615" ref_url="https://bugzilla.suse.com/1190615" source="BUGZILLA"/>
		<reference ref_id="1190616" ref_url="https://bugzilla.suse.com/1190616" source="BUGZILLA"/>
		<reference ref_id="1190617" ref_url="https://bugzilla.suse.com/1190617" source="BUGZILLA"/>
		<reference ref_id="1190618" ref_url="https://bugzilla.suse.com/1190618" source="BUGZILLA"/>
		<reference ref_id="1192019" ref_url="https://bugzilla.suse.com/1192019" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-21529" ref_url="https://www.suse.com/security/cve/CVE-2020-21529/" source="CVE"/>
		<reference ref_id="CVE-2020-21530" ref_url="https://www.suse.com/security/cve/CVE-2020-21530/" source="CVE"/>
		<reference ref_id="CVE-2020-21531" ref_url="https://www.suse.com/security/cve/CVE-2020-21531/" source="CVE"/>
		<reference ref_id="CVE-2020-21532" ref_url="https://www.suse.com/security/cve/CVE-2020-21532/" source="CVE"/>
		<reference ref_id="CVE-2020-21533" ref_url="https://www.suse.com/security/cve/CVE-2020-21533/" source="CVE"/>
		<reference ref_id="CVE-2020-21534" ref_url="https://www.suse.com/security/cve/CVE-2020-21534/" source="CVE"/>
		<reference ref_id="CVE-2020-21535" ref_url="https://www.suse.com/security/cve/CVE-2020-21535/" source="CVE"/>
		<reference ref_id="CVE-2021-32280" ref_url="https://www.suse.com/security/cve/CVE-2021-32280/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009685.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Update to fig2dev version 3.2.8 Patchlevel 8b (Aug 2021)

- bsc#1190618, CVE-2020-21529: stack buffer overflow in the bezier_spline function in genepic.c.
- bsc#1190615, CVE-2020-21530: segmentation fault in the read_objects function in read.c.
- bsc#1190617, CVE-2020-21531: global buffer overflow in the conv_pattern_index function in gencgm.c.
- bsc#1190616, CVE-2020-21532: global buffer overflow in the setfigfont function in genepic.c.
- bsc#1190612, CVE-2020-21533: stack buffer overflow in the read_textobject function in read.c.
- bsc#1190611, CVE-2020-21534: global buffer overflow in the get_line function in read.c.
- bsc#1190607, CVE-2020-21535: segmentation fault in the gencgm_start function in gencgm.c.
- bsc#1192019, CVE-2021-32280: NULL pointer dereference in compute_closed_spline() in trans_spline.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190607">SUSE bug 1190607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190611">SUSE bug 1190611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190612">SUSE bug 1190612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190615">SUSE bug 1190615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190616">SUSE bug 1190616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190617">SUSE bug 1190617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190618">SUSE bug 1190618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192019">SUSE bug 1192019</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21529/">CVE-2020-21529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21529">CVE-2020-21529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21530/">CVE-2020-21530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21530">CVE-2020-21530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21531/">CVE-2020-21531 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21531">CVE-2020-21531 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21532/">CVE-2020-21532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21532">CVE-2020-21532 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21533/">CVE-2020-21533 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21533">CVE-2020-21533 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21534/">CVE-2020-21534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21534">CVE-2020-21534 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21535/">CVE-2020-21535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21535">CVE-2020-21535 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32280/">CVE-2021-32280 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32280">CVE-2021-32280 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653558" comment="transfig-3.2.8b-2.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150359" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1126826" ref_url="https://bugzilla.suse.com/1126826" source="BUGZILLA"/>
		<reference ref_id="1126829" ref_url="https://bugzilla.suse.com/1126829" source="BUGZILLA"/>
		<reference ref_id="1126831" ref_url="https://bugzilla.suse.com/1126831" source="BUGZILLA"/>
		<reference ref_id="1140126" ref_url="https://bugzilla.suse.com/1140126" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1143609" ref_url="https://bugzilla.suse.com/1143609" source="BUGZILLA"/>
		<reference ref_id="1153768" ref_url="https://bugzilla.suse.com/1153768" source="BUGZILLA"/>
		<reference ref_id="1153770" ref_url="https://bugzilla.suse.com/1153770" source="BUGZILLA"/>
		<reference ref_id="1157755" ref_url="https://bugzilla.suse.com/1157755" source="BUGZILLA"/>
		<reference ref_id="1160254" ref_url="https://bugzilla.suse.com/1160254" source="BUGZILLA"/>
		<reference ref_id="1160590" ref_url="https://bugzilla.suse.com/1160590" source="BUGZILLA"/>
		<reference ref_id="1163333" ref_url="https://bugzilla.suse.com/1163333" source="BUGZILLA"/>
		<reference ref_id="1163744" ref_url="https://bugzilla.suse.com/1163744" source="BUGZILLA"/>
		<reference ref_id="1179036" ref_url="https://bugzilla.suse.com/1179036" source="BUGZILLA"/>
		<reference ref_id="1179341" ref_url="https://bugzilla.suse.com/1179341" source="BUGZILLA"/>
		<reference ref_id="1179898" ref_url="https://bugzilla.suse.com/1179898" source="BUGZILLA"/>
		<reference ref_id="1179899" ref_url="https://bugzilla.suse.com/1179899" source="BUGZILLA"/>
		<reference ref_id="1179900" ref_url="https://bugzilla.suse.com/1179900" source="BUGZILLA"/>
		<reference ref_id="1179901" ref_url="https://bugzilla.suse.com/1179901" source="BUGZILLA"/>
		<reference ref_id="1179902" ref_url="https://bugzilla.suse.com/1179902" source="BUGZILLA"/>
		<reference ref_id="1179903" ref_url="https://bugzilla.suse.com/1179903" source="BUGZILLA"/>
		<reference ref_id="1180451" ref_url="https://bugzilla.suse.com/1180451" source="BUGZILLA"/>
		<reference ref_id="1180454" ref_url="https://bugzilla.suse.com/1180454" source="BUGZILLA"/>
		<reference ref_id="1180461" ref_url="https://bugzilla.suse.com/1180461" source="BUGZILLA"/>
		<reference ref_id="1181452" ref_url="https://bugzilla.suse.com/1181452" source="BUGZILLA"/>
		<reference ref_id="1182252" ref_url="https://bugzilla.suse.com/1182252" source="BUGZILLA"/>
		<reference ref_id="1183511" ref_url="https://bugzilla.suse.com/1183511" source="BUGZILLA"/>
		<reference ref_id="1184620" ref_url="https://bugzilla.suse.com/1184620" source="BUGZILLA"/>
		<reference ref_id="1184794" ref_url="https://bugzilla.suse.com/1184794" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12972" ref_url="https://www.suse.com/security/cve/CVE-2019-12972/" source="CVE"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-14444" ref_url="https://www.suse.com/security/cve/CVE-2019-14444/" source="CVE"/>
		<reference ref_id="CVE-2019-17450" ref_url="https://www.suse.com/security/cve/CVE-2019-17450/" source="CVE"/>
		<reference ref_id="CVE-2019-17451" ref_url="https://www.suse.com/security/cve/CVE-2019-17451/" source="CVE"/>
		<reference ref_id="CVE-2019-9074" ref_url="https://www.suse.com/security/cve/CVE-2019-9074/" source="CVE"/>
		<reference ref_id="CVE-2019-9075" ref_url="https://www.suse.com/security/cve/CVE-2019-9075/" source="CVE"/>
		<reference ref_id="CVE-2019-9077" ref_url="https://www.suse.com/security/cve/CVE-2019-9077/" source="CVE"/>
		<reference ref_id="CVE-2020-16590" ref_url="https://www.suse.com/security/cve/CVE-2020-16590/" source="CVE"/>
		<reference ref_id="CVE-2020-16591" ref_url="https://www.suse.com/security/cve/CVE-2020-16591/" source="CVE"/>
		<reference ref_id="CVE-2020-16592" ref_url="https://www.suse.com/security/cve/CVE-2020-16592/" source="CVE"/>
		<reference ref_id="CVE-2020-16593" ref_url="https://www.suse.com/security/cve/CVE-2020-16593/" source="CVE"/>
		<reference ref_id="CVE-2020-16598" ref_url="https://www.suse.com/security/cve/CVE-2020-16598/" source="CVE"/>
		<reference ref_id="CVE-2020-16599" ref_url="https://www.suse.com/security/cve/CVE-2020-16599/" source="CVE"/>
		<reference ref_id="CVE-2020-35448" ref_url="https://www.suse.com/security/cve/CVE-2020-35448/" source="CVE"/>
		<reference ref_id="CVE-2020-35493" ref_url="https://www.suse.com/security/cve/CVE-2020-35493/" source="CVE"/>
		<reference ref_id="CVE-2020-35496" ref_url="https://www.suse.com/security/cve/CVE-2020-35496/" source="CVE"/>
		<reference ref_id="CVE-2020-35507" ref_url="https://www.suse.com/security/cve/CVE-2020-35507/" source="CVE"/>
		<reference ref_id="CVE-2021-20197" ref_url="https://www.suse.com/security/cve/CVE-2021-20197/" source="CVE"/>
		<reference ref_id="CVE-2021-20284" ref_url="https://www.suse.com/security/cve/CVE-2021-20284/" source="CVE"/>
		<reference ref_id="CVE-2021-3487" ref_url="https://www.suse.com/security/cve/CVE-2021-3487/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

Update to binutils 2.37:

* The GNU Binutils sources now requires a C99 compiler and library to
  build.
* Support for the arm-symbianelf format has been removed.
* Support for Realm Management Extension (RME) for AArch64 has been
  added.
* A new linker option '-z report-relative-reloc' for x86 ELF targets
  has been added to report dynamic relative relocations.
* A new linker option '-z start-stop-gc' has been added to disable
  special treatment of __start_*/__stop_* references when
  --gc-sections.
* A new linker options '-Bno-symbolic' has been added which will
  cancel the '-Bsymbolic' and '-Bsymbolic-functions' options.
* The readelf tool has a new command line option which can be used to
  specify how the numeric values of symbols are reported.
  --sym-base=0|8|10|16 tells readelf to display the values in base 8,
  base 10 or base 16.  A sym base of 0 represents the default action
  of displaying values under 10000 in base 10 and values above that in
  base 16.
* A new format has been added to the nm program.  Specifying
  '--format=just-symbols' (or just using -j) will tell the program to
  only display symbol names and nothing else.
* A new command line option '--keep-section-symbols' has been added to
  objcopy and strip.  This stops the removal of unused section symbols
  when the file is copied.  Removing these symbols saves space, but
  sometimes they are needed by other tools.
* The '--weaken', '--weaken-symbol' and '--weaken-symbols' options
  supported by objcopy now make undefined symbols weak on targets that
  support weak symbols. 
* Readelf and objdump can now display and use the contents of .debug_sup
  sections.
* Readelf and objdump will now follow links to separate debug info
  files by default.  This behaviour can be stopped via the use of the
  new '-wN' or '--debug-dump=no-follow-links' options for readelf and
  the '-WN' or '--dwarf=no-follow-links' options for objdump.  Also
  the old behaviour can be restored by the use of the
  '--enable-follow-debug-links=no' configure time option.

  The semantics of the =follow-links option have also been slightly
  changed.  When enabled, the option allows for the loading of symbol
  tables and string tables from the separate files which can be used
  to enhance the information displayed when dumping other sections,
  but it does not automatically imply that information from the
  separate files should be displayed.

  If other debug section display options are also enabled (eg
  '--debug-dump=info') then the contents of matching sections in both
  the main file and the separate debuginfo file *will* be displayed.
  This is because in most cases the debug section will only be present
  in one of the files.

  If however non-debug section display options are enabled (eg
  '--sections') then the contents of matching parts of the separate
  debuginfo file will *not* be displayed.  This is because in most
  cases the user probably only wanted to load the symbol information
  from the separate debuginfo file.  In order to change this behaviour
  a new command line option --process-links can be used.  This will
  allow di0pslay options to applied to both the main file and any
  separate debuginfo files.
* Nm has a new command line option: '--quiet'.  This suppresses 'no
  symbols' diagnostic.

Update to binutils 2.36:

 New features in the Assembler:

  General:

   * When setting the link order attribute of ELF sections, it is now
     possible to use a numeric section index instead of symbol name.
   * Added a .nop directive to generate a single no-op instruction in
     a target neutral manner.  This instruction does have an effect on
     DWARF line number generation, if that is active.
   * Removed --reduce-memory-overheads and --hash-size as gas now
     uses hash tables that can be expand and shrink automatically.

   X86/x86_64:

     * Add support for AVX VNNI, HRESET, UINTR, TDX, AMX and Key
       Locker instructions. 
     * Support non-absolute segment values for lcall and ljmp.
     * Add {disp16} pseudo prefix to x86 assembler.
     * Configure with --enable-x86-used-note by default for Linux/x86.

   ARM/AArch64:

     * Add support for Cortex-A78, Cortex-A78AE and Cortex-X1,
       Cortex-R82, Neoverse V1, and Neoverse N2 cores.
     * Add support for ETMv4 (Embedded Trace Macrocell), ETE (Embedded
       Trace Extension), TRBE (Trace Buffer Extension), CSRE (Call
       Stack Recorder Extension) and BRBE (Branch Record Buffer
       Extension) system registers.
     * Add support for Armv8-R and Armv8.7-A ISA extensions.
     * Add support for DSB memory nXS barrier, WFET and WFIT
       instruction for Armv8.7.
     * Add support for +csre feature for -march. Add CSR PDEC
       instruction for CSRE feature in AArch64.
     * Add support for +flagm feature for -march in Armv8.4 AArch64.
     * Add support for +ls64 feature for -march in Armv8.7
       AArch64. Add atomic 64-byte load/store instructions for this
       feature. 
     * Add support for +pauth (Pointer Authentication) feature for
       -march in AArch64.

  New features in the Linker:

    * Add --error-handling-script=&lt;NAME&gt; command line option to allow
      a helper script to be invoked when an undefined symbol or a
      missing library is encountered.  This option can be suppressed
      via the configure time switch: --enable-error-handling-script=no.
    * Add -z x86-64-{baseline|v[234]} to the x86 ELF linker to mark
      x86-64-{baseline|v[234]} ISA level as needed.
    * Add -z unique-symbol to avoid duplicated local symbol names.
    * The creation of PE format DLLs now defaults to using a more
      secure set of DLL characteristics.
    * The linker now deduplicates the types in .ctf sections.  The new 
       command-line option --ctf-share-types describes how to do this:
       its default value, share-unconflicted, produces the most compact
       output.
    * The linker now omits the 'variable section' from .ctf sections
      by default, saving space.  This is almost certainly what you
      want unless you are working on a project that has its own
      analogue of symbol tables that are not reflected in the ELF
      symtabs.

New features in other binary tools:

    * The ar tool's previously unused l modifier is now used for
      specifying dependencies of a static library. The arguments of
      this option (or --record-libdeps long form option) will be
      stored verbatim in the __.LIBDEP member of the archive, which
      the linker may read at link time.
    * Readelf can now display the contents of LTO symbol table
      sections when asked to do so via the --lto-syms command line
      option.
    * Readelf now accepts the -C command line option to enable the
      demangling of symbol names.  In addition the --demangle=&lt;style&gt;,
      --no-demangle, --recurse-limit and --no-recurse-limit options
      are also now availale.

Update to binutils 2.35.1:

* This is a point release over the previous 2.35 version, containing bug
  fixes, and as an exception to the usual rule, one new feature.  The
  new feature is the support for a new directive in the assembler:
  '.nop'.  This directive creates a single no-op instruction in whatever
  encoding is correct for the target architecture.  Unlike the .space or
  .fill this is a real instruction, and it does affect the generation of
  DWARF line number tables, should they be enabled.

Update to binutils 2.35:

* The assembler can now produce DWARF-5 format line number tables.
* Readelf now has a 'lint' mode to enable extra checks of the files it is processing.
* Readelf will now display '[...]' when it has to truncate a symbol name.  
  The old behaviour - of displaying as many characters as possible, up to
  the 80 column limit - can be restored by the use of the --silent-truncation
  option.
* The linker can now produce a dependency file listing the inputs that it
  has processed, much like the -M -MP option supported by the compiler.

Update to binutils 2.34:

* The disassembler (objdump --disassemble) now has an option to
  generate ascii art thats show the arcs between that start and end
  points of control flow instructions.
* The binutils tools now have support for debuginfod.  Debuginfod is a 
  HTTP service for distributing ELF/DWARF debugging information as
  well as source code.  The tools can now connect to debuginfod
  servers in order to download debug information about the files that
  they are processing.
* The assembler and linker now support the generation of ELF format
  files for the Z80 architecture.

Update to binutils 2.33.1:

* Adds support for the Arm Scalable Vector Extension version 2
  (SVE2) instructions, the Arm Transactional Memory Extension (TME)
  instructions and the Armv8.1-M Mainline and M-profile Vector
  Extension (MVE) instructions.
* Adds support for the Arm Cortex-A76AE, Cortex-A77 and Cortex-M35P
  processors and the AArch64 Cortex-A34, Cortex-A65, Cortex-A65AE,
  Cortex-A76AE, and Cortex-A77 processors.
* Adds a .float16 directive for both Arm and AArch64 to allow
  encoding of 16-bit floating point literals.
* For MIPS, Add -m[no-]fix-loongson3-llsc option to fix (or not)
  Loongson3 LLSC Errata.  Add a --enable-mips-fix-loongson3-llsc=[yes|no]
  configure time option to set the default behavior. Set the default
  if the configure option is not used to 'no'.
* The Cortex-A53 Erratum 843419 workaround now supports a choice of
  which workaround to use.  The option --fix-cortex-a53-843419 now
  takes an optional argument --fix-cortex-a53-843419[=full|adr|adrp]
  which can be used to force a particular workaround to be used.
  See --help for AArch64 for more details.
* Add support for GNU_PROPERTY_AARCH64_FEATURE_1_BTI and
  GNU_PROPERTY_AARCH64_FEATURE_1_PAC  in ELF GNU program properties
  in the AArch64 ELF linker. 
* Add -z force-bti for AArch64 to enable GNU_PROPERTY_AARCH64_FEATURE_1_BTI
  on output while warning about missing GNU_PROPERTY_AARCH64_FEATURE_1_BTI 
  on inputs and use PLTs protected with BTI.
* Add -z pac-plt for AArch64 to pick PAC enabled PLTs.
* Add --source-comment[=&lt;txt&gt;] option to objdump which if present,
  provides a prefix to source code lines displayed in a disassembly.
* Add --set-section-alignment &lt;section-name&gt;=&lt;power-of-2-align&gt;
  option to objcopy to allow the changing of section alignments.
* Add --verilog-data-width option to objcopy for verilog targets to
  control width of data elements in verilog hex format.
* The separate debug info file options of readelf (--debug-dump=links
  and --debug-dump=follow) and objdump (--dwarf=links and
  --dwarf=follow-links) will now display and/or follow multiple
  links if more than one are present in a file.  (This usually
  happens when gcc's -gsplit-dwarf option is used).
  In addition objdump's --dwarf=follow-links now also affects its
  other display options, so that for example, when combined with
  --syms it will cause the symbol tables in any linked debug info
  files to also be displayed.  In addition when combined with
  --disassemble the --dwarf= follow-links option will ensure that
  any symbol tables in the linked files are read and used when
  disassembling code in the main file.
* Add support for dumping types encoded in the Compact Type Format
  to objdump and readelf.

The following security fixes are addressed by the update:

- CVE-2021-20197: Fixed a race condition which allows users to own arbitrary files (bsc#1181452).
- CVE-2021-20284: Fixed a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c (bsc#1183511).
- CVE-2021-3487: Fixed a denial of service via excessive debug section size causing excessive memory consumption in bfd's dwarf2.c read_section() (bsc#1184620).
- CVE-2020-35448: Fixed a heap-based buffer over-read in bfd_getl_signed_32() in libbfd.c (bsc#1184794).
- CVE-2020-16590: Fixed a double free vulnerability in process_symbol_table() (bsc#1179898).
- CVE-2020-16591: Fixed an invalid read in process_symbol_table() (bsc#1179899).
- CVE-2020-16592: Fixed an use-after-free in bfd_hash_lookup() (bsc#1179900).
- CVE-2020-16593: Fixed a null pointer dereference in scan_unit_for_symbols() (bsc#1179901).
- CVE-2020-16598: Fixed a null pointer dereference in debug_get_real_type() (bsc#1179902).
- CVE-2020-16599: Fixed a null pointer dereference in _bfd_elf_get_symbol_version_string() (bsc#1179903)
- CVE-2020-35493: Fixed heap-based buffer overflow in bfd_pef_parse_function_stubs function in bfd/pef.c via crafted PEF file (bsc#1180451).
- CVE-2020-35496: Fixed multiple null pointer dereferences in bfd module due to not checking return value of bfd_malloc (bsc#1180454).
- CVE-2020-35507: Fixed a null pointer dereference in bfd_pef_parse_function_stubs() (bsc#1180461).
- CVE-2019-17451: Fixed an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line() in dwarf2.c (bsc#1153768).
- CVE-2019-17450: Fixed a potential denial of service in find_abstract_instance() in dwarf2.c (bsc#1153770).
- CVE-2019-9077: Fixed a heap-based buffer overflow in process_mips_specific() in readelf.c via a malformed MIPS option section (bsc#1126826).
- CVE-2019-9075: Fixed a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap() in archive64.c (bsc#1126829).
- CVE-2019-9074: Fixed a out-of-bounds read leading to a SEGV in bfd_getl32() in libbfd.c (bsc#1126831).
- CVE-2019-12972: Fixed a heap-based buffer over-read in _bfd_doprnt() in bfd.c (bsc#1140126).
- CVE-2019-14444: Fixed an integer overflow apply_relocations() in readelf.c (bsc#1143609).
- CVE-2019-14250: Fixed an integer overflow in simple_object_elf_match() in simple-object-elf.c (bsc#1142649).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-02"/>
	<updated date="2021-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126826">SUSE bug 1126826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126829">SUSE bug 1126829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126831">SUSE bug 1126831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140126">SUSE bug 1140126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143609">SUSE bug 1143609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153768">SUSE bug 1153768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153770">SUSE bug 1153770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157755">SUSE bug 1157755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160254">SUSE bug 1160254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160590">SUSE bug 1160590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163333">SUSE bug 1163333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163744">SUSE bug 1163744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179036">SUSE bug 1179036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179341">SUSE bug 1179341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179898">SUSE bug 1179898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179899">SUSE bug 1179899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179900">SUSE bug 1179900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179901">SUSE bug 1179901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179902">SUSE bug 1179902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179903">SUSE bug 1179903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180451">SUSE bug 1180451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180454">SUSE bug 1180454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180461">SUSE bug 1180461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181452">SUSE bug 1181452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182252">SUSE bug 1182252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183511">SUSE bug 1183511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184620">SUSE bug 1184620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184794">SUSE bug 1184794</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12972/">CVE-2019-12972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12972">CVE-2019-12972 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14250">CVE-2019-14250 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14444/">CVE-2019-14444 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14444">CVE-2019-14444 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17450/">CVE-2019-17450 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17450">CVE-2019-17450 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17451/">CVE-2019-17451 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17451">CVE-2019-17451 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9074/">CVE-2019-9074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9074">CVE-2019-9074 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9075/">CVE-2019-9075 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9075">CVE-2019-9075 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9077/">CVE-2019-9077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9077">CVE-2019-9077 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16590/">CVE-2020-16590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16590">CVE-2020-16590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16591/">CVE-2020-16591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16591">CVE-2020-16591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16592/">CVE-2020-16592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16592">CVE-2020-16592 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16593/">CVE-2020-16593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16593">CVE-2020-16593 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16598/">CVE-2020-16598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16598">CVE-2020-16598 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16599/">CVE-2020-16599 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16599">CVE-2020-16599 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-35448/">CVE-2020-35448 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35448">CVE-2020-35448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35493/">CVE-2020-35493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35493">CVE-2020-35493 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35496/">CVE-2020-35496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35496">CVE-2020-35496 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35507/">CVE-2020-35507 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35507">CVE-2020-35507 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20197/">CVE-2021-20197 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20197">CVE-2021-20197 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20284/">CVE-2021-20284 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20284">CVE-2021-20284 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3487/">CVE-2021-3487 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3487">CVE-2021-3487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653555" comment="binutils-2.37-9.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653536" comment="binutils-devel-2.37-9.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653556" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653557" comment="libctf0-2.37-9.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150360" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1183909" ref_url="https://bugzilla.suse.com/1183909" source="BUGZILLA"/>
		<reference ref_id="1184519" ref_url="https://bugzilla.suse.com/1184519" source="BUGZILLA"/>
		<reference ref_id="1188941" ref_url="https://bugzilla.suse.com/1188941" source="BUGZILLA"/>
		<reference ref_id="1191473" ref_url="https://bugzilla.suse.com/1191473" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20294" ref_url="https://www.suse.com/security/cve/CVE-2021-20294/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009707.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

- For compatibility on old code stream that expect 'brcl 0,label' to
  not be disassembled as 'jgnop label' on s390x.  (bsc#1192267)
  This reverts IBM zSeries HLASM support for now.
- Fixed that ppc64 optflags did not enable LTO (bsc#1188941).
- Fix empty man-pages from broken release tarball
- Fixed a memory corruption with rpath option (bsc#1191473).

- Fixed slow performance of stripping some binaries (bsc#1183909).

Security issue fixed:

- CVE-2021-20294: Fixed out-of-bounds write in print_dynamic_symbol in readelf (bnc#1184519)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183909">SUSE bug 1183909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184519">SUSE bug 1184519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188941">SUSE bug 1188941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191473">SUSE bug 1191473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20294/">CVE-2021-20294 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20294">CVE-2021-20294 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654418" comment="binutils-2.37-9.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654410" comment="binutils-devel-2.37-9.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654419" comment="libctf-nobfd0-2.37-9.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654420" comment="libctf0-2.37-9.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150361" version="1" class="patch">
	<metadata>
		<title>Security update for pcre (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1025709" ref_url="https://bugzilla.suse.com/1025709" source="BUGZILLA"/>
		<reference ref_id="1030066" ref_url="https://bugzilla.suse.com/1030066" source="BUGZILLA"/>
		<reference ref_id="1030803" ref_url="https://bugzilla.suse.com/1030803" source="BUGZILLA"/>
		<reference ref_id="1030805" ref_url="https://bugzilla.suse.com/1030805" source="BUGZILLA"/>
		<reference ref_id="1030807" ref_url="https://bugzilla.suse.com/1030807" source="BUGZILLA"/>
		<reference ref_id="1172973" ref_url="https://bugzilla.suse.com/1172973" source="BUGZILLA"/>
		<reference ref_id="1172974" ref_url="https://bugzilla.suse.com/1172974" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6004" ref_url="https://www.suse.com/security/cve/CVE-2017-6004/" source="CVE"/>
		<reference ref_id="CVE-2017-7186" ref_url="https://www.suse.com/security/cve/CVE-2017-7186/" source="CVE"/>
		<reference ref_id="CVE-2017-7244" ref_url="https://www.suse.com/security/cve/CVE-2017-7244/" source="CVE"/>
		<reference ref_id="CVE-2017-7245" ref_url="https://www.suse.com/security/cve/CVE-2017-7245/" source="CVE"/>
		<reference ref_id="CVE-2017-7246" ref_url="https://www.suse.com/security/cve/CVE-2017-7246/" source="CVE"/>
		<reference ref_id="CVE-2019-20838" ref_url="https://www.suse.com/security/cve/CVE-2019-20838/" source="CVE"/>
		<reference ref_id="CVE-2020-14155" ref_url="https://www.suse.com/security/cve/CVE-2020-14155/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
		<description>
This update for pcre fixes the following issues:

Update pcre to version 8.45:

- CVE-2020-14155: Fixed integer overflow via a large number after a '(?C' substring (bsc#1172974).
- CVE-2019-20838: Fixed buffer over-read in JIT compiler (bsc#1172973).
- CVE-2017-7244: Fixed invalid read in _pcre32_xclass() (bsc#1030807).
- CVE-2017-7245: Fixed buffer overflow in the pcre32_copy_substring (bsc#1030805).
- CVE-2017-7246: Fixed another buffer overflow in the pcre32_copy_substring (bsc#1030803).
- CVE-2017-7186: Fixed denial of service caused by an invalid Unicode property lookup (bsc#1030066).
- CVE-2017-6004: Fixed denial of service via crafted regular expression (bsc#1025709).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-10"/>
	<updated date="2021-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025709">SUSE bug 1025709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030066">SUSE bug 1030066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030803">SUSE bug 1030803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030805">SUSE bug 1030805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030807">SUSE bug 1030807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172973">SUSE bug 1172973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172974">SUSE bug 1172974</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6004/">CVE-2017-6004 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6004">CVE-2017-6004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7186/">CVE-2017-7186 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7186">CVE-2017-7186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7244/">CVE-2017-7244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7244">CVE-2017-7244 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7245/">CVE-2017-7245 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7245">CVE-2017-7245 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7246/">CVE-2017-7246 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7246">CVE-2017-7246 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20838/">CVE-2019-20838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20838">CVE-2019-20838 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14155/">CVE-2020-14155 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">CVE-2020-14155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653063" comment="libpcre1-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653064" comment="libpcre1-32bit-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653065" comment="libpcre16-0-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653033" comment="libpcrecpp0-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653034" comment="libpcreposix0-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653035" comment="pcre-devel-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653349" comment="selinux-policy-20140730-36.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653350" comment="selinux-policy-devel-20140730-36.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653351" comment="selinux-policy-minimum-20140730-36.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150362" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1189702" ref_url="https://bugzilla.suse.com/1189702" source="BUGZILLA"/>
		<reference ref_id="1189938" ref_url="https://bugzilla.suse.com/1189938" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3713" ref_url="https://www.suse.com/security/cve/CVE-2021-3713/" source="CVE"/>
		<reference ref_id="CVE-2021-3748" ref_url="https://www.suse.com/security/cve/CVE-2021-3748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020738.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- Fix out-of-bounds write in UAS (USB Attached SCSI) device emulation (bsc#1189702, CVE-2021-3713)
- Fix heap use-after-free in virtio_net_receive_rcu (bsc#1189938, CVE-2021-3748)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-10"/>
	<updated date="2021-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189702">SUSE bug 1189702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189938">SUSE bug 1189938</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3713/">CVE-2021-3713 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3713">CVE-2021-3713 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3748/">CVE-2021-3748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3748">CVE-2021-3748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655250" comment="qemu-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653201" comment="qemu-arm-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655251" comment="qemu-block-curl-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655252" comment="qemu-block-iscsi-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655253" comment="qemu-block-rbd-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655254" comment="qemu-block-ssh-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655255" comment="qemu-guest-agent-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653159" comment="qemu-ipxe-1.0.0+-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655256" comment="qemu-kvm-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655257" comment="qemu-lang-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653162" comment="qemu-ppc-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653189" comment="qemu-s390-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653163" comment="qemu-seabios-1.10.2_0_g5f4c7b1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653164" comment="qemu-sgabios-8-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655258" comment="qemu-tools-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653166" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653167" comment="qemu-x86-2.9.1-43.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150363" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1192250" ref_url="https://bugzilla.suse.com/1192250" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38505" ref_url="https://www.suse.com/security/cve/CVE-2021-38505/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<reference ref_id="CVE-2021-38510" ref_url="https://www.suse.com/security/cve/CVE-2021-38510/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to Extended Support Release 91.3.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-49 (bsc#1192250)

  * CVE-2021-38503: iframe sandbox rules did not apply to XSLT stylesheets
  * CVE-2021-38504: Use-after-free in file picker dialog
  * CVE-2021-38505: Windows 10 Cloud Clipboard may have recorded sensitive user data
  * CVE-2021-38506: Firefox could be coaxed into going into fullscreen mode without notification or warning
  * CVE-2021-38507: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports
  * CVE-2021-38508: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing
  * CVE-2021-38509: Javascript alert box could have been spoofed onto an arbitrary domain
  * CVE-2021-38510: Download Protections were bypassed by .inetloc files on Mac OS
  * MOZ-2021-0008: Use-after-free in HTTP2 Session object
  * MOZ-2021-0007: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38503">CVE-2021-38503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38504">CVE-2021-38504 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38505/">CVE-2021-38505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38505">CVE-2021-38505 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38506">CVE-2021-38506 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38507">CVE-2021-38507 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38508">CVE-2021-38508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38509">CVE-2021-38509 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38510/">CVE-2021-38510 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38510">CVE-2021-38510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655741" comment="MozillaFirefox-91.3.0-112.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655636" comment="MozillaFirefox-devel-91.3.0-112.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655742" comment="MozillaFirefox-translations-common-91.3.0-112.80.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150364" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1014440" ref_url="https://bugzilla.suse.com/1014440" source="BUGZILLA"/>
		<reference ref_id="1192284" ref_url="https://bugzilla.suse.com/1192284" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124/" source="CVE"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009750.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:
	  
- CVE-2016-2124: Fixed not to fallback to non spnego authentication if we require kerberos (bsc#1014440).
- CVE-2020-25717: Fixed privilege escalation inside an AD Domain where a user could become root on domain members (bsc#1192284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014440">SUSE bug 1014440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192284">SUSE bug 1192284</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2124">CVE-2016-2124 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25717">CVE-2020-25717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657052" comment="libdcerpc-binding0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657053" comment="libdcerpc-binding0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657054" comment="libdcerpc0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657055" comment="libdcerpc0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657056" comment="libndr-krb5pac0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657057" comment="libndr-krb5pac0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657058" comment="libndr-nbt0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657059" comment="libndr-nbt0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657060" comment="libndr-standard0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657061" comment="libndr-standard0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657062" comment="libndr0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657063" comment="libndr0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657064" comment="libnetapi0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657065" comment="libnetapi0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657066" comment="libsamba-credentials0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657067" comment="libsamba-credentials0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657068" comment="libsamba-errors0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657069" comment="libsamba-errors0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657070" comment="libsamba-hostconfig0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657071" comment="libsamba-hostconfig0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657072" comment="libsamba-passdb0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657073" comment="libsamba-passdb0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657074" comment="libsamba-util0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657075" comment="libsamba-util0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657076" comment="libsamdb0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657077" comment="libsamdb0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657078" comment="libsmbclient0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657079" comment="libsmbclient0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657080" comment="libsmbconf0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657081" comment="libsmbconf0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657082" comment="libsmbldap0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657083" comment="libsmbldap0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657084" comment="libtevent-util0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657085" comment="libtevent-util0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657086" comment="libwbclient0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657087" comment="libwbclient0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657088" comment="samba-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657089" comment="samba-client-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657090" comment="samba-client-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655626" comment="samba-doc-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657091" comment="samba-libs-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657092" comment="samba-libs-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657093" comment="samba-winbind-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657094" comment="samba-winbind-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150365" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1192042" ref_url="https://bugzilla.suse.com/1192042" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0935" ref_url="https://www.suse.com/security/cve/CVE-2021-0935/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009755.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- CVE-2021-0935: Fixed use after free that could lead to local escalation of privilege in ip6_xmit of ip6_output.c (bsc#1192042).
- CVE-2021-3752: Fixed vulnerability in the linux kernel Bluetooth uaf module (bsc#1190432).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192042">SUSE bug 1192042</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0935/">CVE-2021-0935 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0935">CVE-2021-0935 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3752">CVE-2021-3752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009656539" comment="kgraft-patch-4_4_180-94_135-default-14-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150366" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1192042" ref_url="https://bugzilla.suse.com/1192042" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0935" ref_url="https://www.suse.com/security/cve/CVE-2021-0935/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009755.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following security issues were fixed:

- CVE-2021-0935: Fixed use after free that could lead to local escalation of privilege in ip6_xmit of ip6_output.c (bsc#1192042).
- CVE-2021-3752: Fixed vulnerability in the linux kernel Bluetooth uaf module (bsc#1190432).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192042">SUSE bug 1192042</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0935/">CVE-2021-0935 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0935">CVE-2021-0935 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3752">CVE-2021-3752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009656540" comment="kgraft-patch-4_4_180-94_138-default-12-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150367" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1192042" ref_url="https://bugzilla.suse.com/1192042" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0935" ref_url="https://www.suse.com/security/cve/CVE-2021-0935/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009755.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.

The following security issues were fixed:

- CVE-2021-0935: Fixed use after free that could lead to local escalation of privilege in ip6_xmit of ip6_output.c (bsc#1192042).
- CVE-2021-3752: Fixed vulnerability in the linux kernel Bluetooth uaf module (bsc#1190432).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192042">SUSE bug 1192042</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0935/">CVE-2021-0935 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0935">CVE-2021-0935 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3752">CVE-2021-3752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009656541" comment="kgraft-patch-4_4_180-94_141-default-11-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150368" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1192042" ref_url="https://bugzilla.suse.com/1192042" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0935" ref_url="https://www.suse.com/security/cve/CVE-2021-0935/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009755.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes several issues.

The following security issues were fixed:

- CVE-2021-0935: Fixed use after free that could lead to local escalation of privilege in ip6_xmit of ip6_output.c (bsc#1192042).
- CVE-2021-3752: Fixed vulnerability in the linux kernel Bluetooth uaf module (bsc#1190432).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192042">SUSE bug 1192042</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0935/">CVE-2021-0935 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0935">CVE-2021-0935 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3752">CVE-2021-3752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009656542" comment="kgraft-patch-4_4_180-94_144-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150369" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1192042" ref_url="https://bugzilla.suse.com/1192042" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0935" ref_url="https://www.suse.com/security/cve/CVE-2021-0935/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009755.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes several issues.

The following security issues were fixed:

- CVE-2021-0935: Fixed use after free that could lead to local escalation of privilege in ip6_xmit of ip6_output.c (bsc#1192042).
- CVE-2021-3752: Fixed vulnerability in the linux kernel Bluetooth uaf module (bsc#1190432).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192042">SUSE bug 1192042</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0935/">CVE-2021-0935 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0935">CVE-2021-0935 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3752">CVE-2021-3752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009656543" comment="kgraft-patch-4_4_180-94_147-default-5-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150370" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql13, postgresql14  (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009760.html" source="SUSE-SU"/>
		<description>
This update for postgresql, postgresql13 and postgresql14 fixes the following issues:

Security issues fixed:

- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).

This update also ships postgresql14 to SUSE Linux Enterprise 12 SP5. (jsc#SLE-22673)
On older service packs only libpq5 and libecpg6 are being replaced by the postgresql14 variants.

Feature changes in postgresql14:

- https://www.postgresql.org/about/news/postgresql-14-released-2318/
- https://www.postgresql.org/docs/14/release-14.html

		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-20"/>
	<updated date="2021-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656250" comment="libecpg6-14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656251" comment="libpq5-14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656252" comment="libpq5-32bit-14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656230" comment="postgresql-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656231" comment="postgresql-contrib-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656232" comment="postgresql-docs-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656233" comment="postgresql-plperl-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656234" comment="postgresql-plpython-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656235" comment="postgresql-pltcl-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656236" comment="postgresql-server-14-4.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150371" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009763.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657352" comment="postgresql96-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657353" comment="postgresql96-contrib-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656857" comment="postgresql96-docs-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657354" comment="postgresql96-plperl-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657355" comment="postgresql96-plpython-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657356" comment="postgresql96-pltcl-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657357" comment="postgresql96-server-9.6.24-6.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150372" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009764.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:
          
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656572" comment="postgresql10-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656573" comment="postgresql10-contrib-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656534" comment="postgresql10-docs-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656574" comment="postgresql10-plperl-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656575" comment="postgresql10-plpython-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656576" comment="postgresql10-pltcl-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656577" comment="postgresql10-server-10.19-4.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150373" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1191937" ref_url="https://bugzilla.suse.com/1191937" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42762" ref_url="https://www.suse.com/security/cve/CVE-2021-42762/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009769.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2021-42762: Updated seccomp rules with latest changes from flatpak (bsc#1191937).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-23"/>
	<updated date="2021-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191937">SUSE bug 1191937</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42762/">CVE-2021-42762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42762">CVE-2021-42762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657376" comment="libjavascriptcoregtk-4_0-18-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657377" comment="libwebkit2gtk-4_0-37-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657332" comment="libwebkit2gtk3-lang-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657378" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657379" comment="typelib-1_0-WebKit2-4_0-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657337" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657380" comment="webkit2gtk-4_0-injected-bundles-2.32.4-2.74.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150374" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1191901" ref_url="https://bugzilla.suse.com/1191901" source="BUGZILLA"/>
		<reference ref_id="1191903" ref_url="https://bugzilla.suse.com/1191903" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191906" ref_url="https://bugzilla.suse.com/1191906" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version OpenJDK 8u312 (October 2021 CPU):
  
- CVE-2021-35550: Fixed weak ciphers preferred over stronger ones for TLS (bsc#1191901).
- CVE-2021-35556: Fixed excessive memory allocation in RTFParser (bsc#1191910).
- CVE-2021-35559: Fixed excessive memory allocation in RTFReader (bsc#1191911).
- CVE-2021-35561: Fixed excessive memory allocation in HashMap and HashSet (bsc#1191912).
- CVE-2021-35564: Fixed certificates with end dates too far in the future can corrupt keystore (bsc#1191913).
- CVE-2021-35565: Fixed loop in HttpsServer triggered during TLS session close (bsc#1191909).
- CVE-2021-35567: Fixed incorrect principal selection when using Kerberos Constrained Delegation (bsc#1191903).
- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake (bsc#1191904).
- CVE-2021-35586: Fixed excessive memory allocation in BMPImageReader (bsc#1191914).
- CVE-2021-35588: Fixed incomplete validation of inner class references in ClassFileParser (bsc#1191905)
- CVE-2021-35603: Fixed non-constant comparison during TLS handshakes (bsc#1191906).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-23"/>
	<updated date="2021-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191903">SUSE bug 1191903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35550">CVE-2021-35550 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35567">CVE-2021-35567 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657126" comment="java-1_8_0-openjdk-1.8.0.312-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657127" comment="java-1_8_0-openjdk-demo-1.8.0.312-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657128" comment="java-1_8_0-openjdk-devel-1.8.0.312-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657129" comment="java-1_8_0-openjdk-headless-1.8.0.312-27.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150375" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1191901" ref_url="https://bugzilla.suse.com/1191901" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191906" ref_url="https://bugzilla.suse.com/1191906" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:


Update to OpenJDK 7u321 (October 2021 CPU):

- CVE-2021-35550: Fixed weak ciphers preferred over stronger ones for TLS (bsc#1191901).
- CVE-2021-35556: Fixed excessive memory allocation in RTFParser (bsc#1191910).
- CVE-2021-35559: Fixed excessive memory allocation in RTFReader (bsc#1191911).
- CVE-2021-35561: Fixed excessive memory allocation in HashMap and HashSet (bsc#1191912).
- CVE-2021-35564: Fixed certificates with end dates too far in the future can corrupt keystore (bsc#1191913).
- CVE-2021-35565: Fixed loop in HttpsServer triggered during TLS session close (bsc#1191909).
- CVE-2021-35586: Fixed excessive memory allocation in BMPImageReader (bsc#1191914).
- CVE-2021-35588: Fixed incomplete validation of inner class references in ClassFileParser (bsc#1191905)
- CVE-2021-35603: Fixed non-constant comparison during TLS handshakes (bsc#1191906).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35550">CVE-2021-35550 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656912" comment="java-1_7_0-openjdk-1.7.0.321-43.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656913" comment="java-1_7_0-openjdk-demo-1.7.0.321-43.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656914" comment="java-1_7_0-openjdk-devel-1.7.0.321-43.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656915" comment="java-1_7_0-openjdk-headless-1.7.0.321-43.53.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150376" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1177125" ref_url="https://bugzilla.suse.com/1177125" source="BUGZILLA"/>
		<reference ref_id="1188160" ref_url="https://bugzilla.suse.com/1188160" source="BUGZILLA"/>
		<reference ref_id="1188161" ref_url="https://bugzilla.suse.com/1188161" source="BUGZILLA"/>
		<reference ref_id="1190375" ref_url="https://bugzilla.suse.com/1190375" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25613" ref_url="https://www.suse.com/security/cve/CVE-2020-25613/" source="CVE"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009790.html" source="SUSE-SU"/>
		<description>
This update for ruby2.1 fixes the following issues:

- CVE-2020-25613: Fixed potential HTTP request smuggling in WEBrick (bsc#1177125).
- CVE-2021-31799: Fixed Command injection vulnerability in RDoc (bsc#1190375).
- CVE-2021-31810: Fixed trusting FTP PASV responses vulnerability in Net:FTP (bsc#1188161).
- CVE-2021-32066: Fixed StartTLS stripping vulnerability in Net:IMAP (bsc#1188160).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177125">SUSE bug 1177125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188160">SUSE bug 1188160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188161">SUSE bug 1188161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190375">SUSE bug 1190375</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25613/">CVE-2020-25613 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25613">CVE-2020-25613 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31799">CVE-2021-31799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31810">CVE-2021-31810 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32066">CVE-2021-32066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657572" comment="libruby2_1-2_1-2.1.9-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657573" comment="ruby2.1-2.1.9-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657574" comment="ruby2.1-stdlib-2.1.9-19.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150377" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1192554" ref_url="https://bugzilla.suse.com/1192554" source="BUGZILLA"/>
		<reference ref_id="1192557" ref_url="https://bugzilla.suse.com/1192557" source="BUGZILLA"/>
		<reference ref_id="1192559" ref_url="https://bugzilla.suse.com/1192559" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28704" ref_url="https://www.suse.com/security/cve/CVE-2021-28704/" source="CVE"/>
		<reference ref_id="CVE-2021-28705" ref_url="https://www.suse.com/security/cve/CVE-2021-28705/" source="CVE"/>
		<reference ref_id="CVE-2021-28706" ref_url="https://www.suse.com/security/cve/CVE-2021-28706/" source="CVE"/>
		<reference ref_id="CVE-2021-28707" ref_url="https://www.suse.com/security/cve/CVE-2021-28707/" source="CVE"/>
		<reference ref_id="CVE-2021-28708" ref_url="https://www.suse.com/security/cve/CVE-2021-28708/" source="CVE"/>
		<reference ref_id="CVE-2021-28709" ref_url="https://www.suse.com/security/cve/CVE-2021-28709/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009783.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-28704, CVE-2021-28707, CVE-2021-28708: Fixed PoD operations on misaligned GFNs (XSA-388) (bsc#1192557).
- CVE-2021-28705, CVE-2021-28709: Fixed issues with partially successful P2M updates on x86 (XSA-389) (bsc#1192559).
- CVE-2021-28706: Fixed guests may exceed their designated memory limit (XSA-385) (bsc#1192554).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192554">SUSE bug 1192554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192557">SUSE bug 1192557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192559">SUSE bug 1192559</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28704/">CVE-2021-28704 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28704">CVE-2021-28704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28705/">CVE-2021-28705 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28705">CVE-2021-28705 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28706/">CVE-2021-28706 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28706">CVE-2021-28706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28707/">CVE-2021-28707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28707">CVE-2021-28707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28708/">CVE-2021-28708 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28708">CVE-2021-28708 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28709/">CVE-2021-28709 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28709">CVE-2021-28709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658666" comment="xen-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658667" comment="xen-doc-html-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658668" comment="xen-libs-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658669" comment="xen-libs-32bit-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658670" comment="xen-tools-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658671" comment="xen-tools-domU-4.9.4_24-3.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150378" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1103032" ref_url="https://bugzilla.suse.com/1103032" source="BUGZILLA"/>
		<reference ref_id="1188284" ref_url="https://bugzilla.suse.com/1188284" source="BUGZILLA"/>
		<reference ref_id="1192346" ref_url="https://bugzilla.suse.com/1192346" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009804.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2018-14679: Fixed off-by-one issue in embedded libmspack that could lead to denial of service (bsc#1103032). 
  
- Update to 0.103.4 (bsc#1192346).
- Update to 0.103.3 (bsc#1188284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188284">SUSE bug 1188284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192346">SUSE bug 1192346</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14679">CVE-2018-14679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658828" comment="clamav-0.103.4-33.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150379" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1192063" ref_url="https://bugzilla.suse.com/1192063" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009802.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2021-30846: Fixed memory corruption issue that could lead to arbitrary code execution when processing maliciously crafted web content (bsc#1192063).
- CVE-2021-30851: Fixed memory corruption vulnerability that could lead to arbitrary code execution when processing maliciously crafted web content (bsc#1192063).   
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192063">SUSE bug 1192063</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30846">CVE-2021-30846 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30851">CVE-2021-30851 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658232" comment="libjavascriptcoregtk-4_0-18-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658233" comment="libwebkit2gtk-4_0-37-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658196" comment="libwebkit2gtk3-lang-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658234" comment="typelib-1_0-JavaScriptCore-4_0-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658235" comment="typelib-1_0-WebKit2-4_0-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658203" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658236" comment="webkit2gtk-4_0-injected-bundles-2.34.1-2.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150380" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1073928" ref_url="https://bugzilla.suse.com/1073928" source="BUGZILLA"/>
		<reference ref_id="1098425" ref_url="https://bugzilla.suse.com/1098425" source="BUGZILLA"/>
		<reference ref_id="1100416" ref_url="https://bugzilla.suse.com/1100416" source="BUGZILLA"/>
		<reference ref_id="1119934" ref_url="https://bugzilla.suse.com/1119934" source="BUGZILLA"/>
		<reference ref_id="1129735" ref_url="https://bugzilla.suse.com/1129735" source="BUGZILLA"/>
		<reference ref_id="1171217" ref_url="https://bugzilla.suse.com/1171217" source="BUGZILLA"/>
		<reference ref_id="1171420" ref_url="https://bugzilla.suse.com/1171420" source="BUGZILLA"/>
		<reference ref_id="1173346" ref_url="https://bugzilla.suse.com/1173346" source="BUGZILLA"/>
		<reference ref_id="1176724" ref_url="https://bugzilla.suse.com/1176724" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1181158" ref_url="https://bugzilla.suse.com/1181158" source="BUGZILLA"/>
		<reference ref_id="1181854" ref_url="https://bugzilla.suse.com/1181854" source="BUGZILLA"/>
		<reference ref_id="1181855" ref_url="https://bugzilla.suse.com/1181855" source="BUGZILLA"/>
		<reference ref_id="1183089" ref_url="https://bugzilla.suse.com/1183089" source="BUGZILLA"/>
		<reference ref_id="1184673" ref_url="https://bugzilla.suse.com/1184673" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185727" ref_url="https://bugzilla.suse.com/1185727" source="BUGZILLA"/>
		<reference ref_id="1185758" ref_url="https://bugzilla.suse.com/1185758" source="BUGZILLA"/>
		<reference ref_id="1185973" ref_url="https://bugzilla.suse.com/1185973" source="BUGZILLA"/>
		<reference ref_id="1186109" ref_url="https://bugzilla.suse.com/1186109" source="BUGZILLA"/>
		<reference ref_id="1186390" ref_url="https://bugzilla.suse.com/1186390" source="BUGZILLA"/>
		<reference ref_id="1188172" ref_url="https://bugzilla.suse.com/1188172" source="BUGZILLA"/>
		<reference ref_id="1188563" ref_url="https://bugzilla.suse.com/1188563" source="BUGZILLA"/>
		<reference ref_id="1188601" ref_url="https://bugzilla.suse.com/1188601" source="BUGZILLA"/>
		<reference ref_id="1188838" ref_url="https://bugzilla.suse.com/1188838" source="BUGZILLA"/>
		<reference ref_id="1188876" ref_url="https://bugzilla.suse.com/1188876" source="BUGZILLA"/>
		<reference ref_id="1188983" ref_url="https://bugzilla.suse.com/1188983" source="BUGZILLA"/>
		<reference ref_id="1188985" ref_url="https://bugzilla.suse.com/1188985" source="BUGZILLA"/>
		<reference ref_id="1189057" ref_url="https://bugzilla.suse.com/1189057" source="BUGZILLA"/>
		<reference ref_id="1189262" ref_url="https://bugzilla.suse.com/1189262" source="BUGZILLA"/>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189291" ref_url="https://bugzilla.suse.com/1189291" source="BUGZILLA"/>
		<reference ref_id="1189399" ref_url="https://bugzilla.suse.com/1189399" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="1189706" ref_url="https://bugzilla.suse.com/1189706" source="BUGZILLA"/>
		<reference ref_id="1190022" ref_url="https://bugzilla.suse.com/1190022" source="BUGZILLA"/>
		<reference ref_id="1190023" ref_url="https://bugzilla.suse.com/1190023" source="BUGZILLA"/>
		<reference ref_id="1190025" ref_url="https://bugzilla.suse.com/1190025" source="BUGZILLA"/>
		<reference ref_id="1190067" ref_url="https://bugzilla.suse.com/1190067" source="BUGZILLA"/>
		<reference ref_id="1190117" ref_url="https://bugzilla.suse.com/1190117" source="BUGZILLA"/>
		<reference ref_id="1190159" ref_url="https://bugzilla.suse.com/1190159" source="BUGZILLA"/>
		<reference ref_id="1190194" ref_url="https://bugzilla.suse.com/1190194" source="BUGZILLA"/>
		<reference ref_id="1190349" ref_url="https://bugzilla.suse.com/1190349" source="BUGZILLA"/>
		<reference ref_id="1190351" ref_url="https://bugzilla.suse.com/1190351" source="BUGZILLA"/>
		<reference ref_id="1190601" ref_url="https://bugzilla.suse.com/1190601" source="BUGZILLA"/>
		<reference ref_id="1190717" ref_url="https://bugzilla.suse.com/1190717" source="BUGZILLA"/>
		<reference ref_id="1191193" ref_url="https://bugzilla.suse.com/1191193" source="BUGZILLA"/>
		<reference ref_id="1191315" ref_url="https://bugzilla.suse.com/1191315" source="BUGZILLA"/>
		<reference ref_id="1191790" ref_url="https://bugzilla.suse.com/1191790" source="BUGZILLA"/>
		<reference ref_id="1191801" ref_url="https://bugzilla.suse.com/1191801" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1191961" ref_url="https://bugzilla.suse.com/1191961" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192400" ref_url="https://bugzilla.suse.com/1192400" source="BUGZILLA"/>
		<reference ref_id="1192775" ref_url="https://bugzilla.suse.com/1192775" source="BUGZILLA"/>
		<reference ref_id="1192781" ref_url="https://bugzilla.suse.com/1192781" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17862" ref_url="https://www.suse.com/security/cve/CVE-2017-17862/" source="CVE"/>
		<reference ref_id="CVE-2017-17864" ref_url="https://www.suse.com/security/cve/CVE-2017-17864/" source="CVE"/>
		<reference ref_id="CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405/" source="CVE"/>
		<reference ref_id="CVE-2018-16882" ref_url="https://www.suse.com/security/cve/CVE-2018-16882/" source="CVE"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-12655" ref_url="https://www.suse.com/security/cve/CVE-2020-12655/" source="CVE"/>
		<reference ref_id="CVE-2020-14305" ref_url="https://www.suse.com/security/cve/CVE-2020-14305/" source="CVE"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<reference ref_id="CVE-2021-20265" ref_url="https://www.suse.com/security/cve/CVE-2021-20265/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="CVE-2021-31916" ref_url="https://www.suse.com/security/cve/CVE-2021-31916/" source="CVE"/>
		<reference ref_id="CVE-2021-33033" ref_url="https://www.suse.com/security/cve/CVE-2021-33033/" source="CVE"/>
		<reference ref_id="CVE-2021-34556" ref_url="https://www.suse.com/security/cve/CVE-2021-34556/" source="CVE"/>
		<reference ref_id="CVE-2021-34981" ref_url="https://www.suse.com/security/cve/CVE-2021-34981/" source="CVE"/>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<reference ref_id="CVE-2021-35477" ref_url="https://www.suse.com/security/cve/CVE-2021-35477/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655/" source="CVE"/>
		<reference ref_id="CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159/" source="CVE"/>
		<reference ref_id="CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="CVE-2021-3760" ref_url="https://www.suse.com/security/cve/CVE-2021-3760/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="CVE-2021-38204" ref_url="https://www.suse.com/security/cve/CVE-2021-38204/" source="CVE"/>
		<reference ref_id="CVE-2021-3896" ref_url="https://www.suse.com/security/cve/CVE-2021-3896/" source="CVE"/>
		<reference ref_id="CVE-2021-40490" ref_url="https://www.suse.com/security/cve/CVE-2021-40490/" source="CVE"/>
		<reference ref_id="CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)

  You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails  (bsc#1191961).
- CVE-2020-12655: An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767 (bnc#1171217).
- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).
- CVE-2021-34556: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack (bnc#1188983).
- CVE-2021-35477: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation did not necessarily occur before a store operation that has an attacker-controlled value (bnc#1188985).
- CVE-2017-17862: kernel/bpf/verifier.c in the Linux kernel ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service (bnc#1073928).
- CVE-2017-17864: kernel/bpf/verifier.c in the Linux kernel mishandled states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allowed local users to obtain potentially sensitive address information, aka a 'pointer leak (bnc#1073928).
- CVE-2021-20265: A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allowed an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability (bnc#1183089).
- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
- CVE-2021-3655: Missing size validations on inbound SCTP packets may have allowed the kernel to read uninitialized memory (bnc#1188563).
- CVE-2018-13405: The inode_init_owner function in fs/inode.c in the Linux kernel allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416 bnc#1129735).
- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-&gt;rf_conn_info object (bsc#1190067).
- CVE-2021-42739: The firewire subsystem in the Linux kernel has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bnc#1184673).
- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).
- CVE-2021-33033: The Linux kernel has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value (bnc#1186109 bnc#1186390 bnc#1188876).
- CVE-2020-14305: An out-of-bounds memory write flaw was found in how the Linux kernel&amp;#8217;s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allowed an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability (bnc#1173346).
- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).
- CVE-2021-3896: Fixed a array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (bsc#1191958).
- CVE-2021-42008: The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access (bnc#1191315).
- CVE-2020-3702: Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic (bnc#1191193).
- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel's bluetooth module. (bsc#1190023)
- CVE-2021-40490: A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel (bnc#1190159 bnc#1192775)
- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)
- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).
- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).
- CVE-2021-3653: A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the 'int_ctl' field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7 (bnc#1189399 bnc#1189420).
- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262 bnc#1189278).
- CVE-2021-38204: drivers/usb/host/max3421-hcd.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).
- CVE-2021-3679: A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).
- CVE-2018-16882: A use-after-free issue was found in the way the Linux kernel's KVM hypervisor processed posted interrupts when nested(=1) virtualization is enabled. In nested_get_vmcs12_pages(), in case of an error while processing posted interrupt address, it unmaps the 'pi_desc_page' without resetting 'pi_desc' descriptor address, which is later used in pi_test_and_clear_on(). A guest user/process could use this flaw to crash the host kernel resulting in DoS or potentially gain privileged access to a system. Kernel versions and are vulnerable (bnc#1119934).
- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1176724).
- CVE-2020-4788: IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296 (bnc#1177666 bnc#1181158).
- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).
- CVE-2021-37576: arch/powerpc/kvm/book3s_rtas.c in the Linux kernel on the powerpc platform allowed KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e (bnc#1188838).

The following non-security bugs were fixed:

- PCI: hv: Use expected affinity when unmasking IRQ (bsc#1185973).
- SUNRPC: improve error response to over-size gss credential (bsc#1190022).
- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
- blacklist.conf: Drop a line that was added by mistake
- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22918)
- bpf: Disallow unprivileged bpf by default (jsc#SLE-22918).
- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).
- config: disable unprivileged BPF by default (jsc#SLE-22918)
- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758,bsc#1192400).
- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).
- hv: mana: adjust mana_select_queue to old API (jsc#SLE-18779, bsc#1185727).
- hv: mana: declare vzalloc (jsc#SLE-18779, bsc#1185726).
- hv: mana: fake bitmap API (jsc#SLE-18779, bsc#1185726).
- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185727).
- kABI: protect struct bpf_map (kabi).
- mm: replace open coded page to virt conversion with page_to_virt() (jsc#SLE-18779, bsc#1185727).
- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854 bsc#1181855).
- net/mlx4_en: Handle TX error CQE (bsc#1181854 bsc#1181855).
- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185727).
- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185727).
- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185727).
- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185727).
- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191801).
- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185727).
- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185727).
- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185727).
- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185727).
- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (bsc#1190601).
- s390/bpf: Fix branch shortening during codegen pass (bsc#1190601).
- s390/bpf: Fix optimizing out zero-extensions (bsc#1190601).
- s390/bpf: Wrap JIT macro parameter usages in parentheses (bsc#1190601).
- s390: bpf: implement jitting of BPF_ALU | BPF_ARSH | BPF_* (bsc#1190601).
- scsi: sg: add sg_remove_request in sg_write (bsc#1171420 CVE2020-12770).
- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).
- sctp: fully initialize v4 addr in some functions (bsc#1188563).
- sctp: simplify addr copy (bsc#1188563).
- x86/CPU: Add more Icelake model numbers (bsc#1185758,bsc#1192400).
- x86/tlb: Flush global mappings when KAISER is disabled (bsc#1190194).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073928">SUSE bug 1073928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098425">SUSE bug 1098425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100416">SUSE bug 1100416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119934">SUSE bug 1119934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129735">SUSE bug 1129735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171217">SUSE bug 1171217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171420">SUSE bug 1171420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173346">SUSE bug 1173346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176724">SUSE bug 1176724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181854">SUSE bug 1181854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181855">SUSE bug 1181855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183089">SUSE bug 1183089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185727">SUSE bug 1185727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185758">SUSE bug 1185758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185973">SUSE bug 1185973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186109">SUSE bug 1186109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186390">SUSE bug 1186390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188838">SUSE bug 1188838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188983">SUSE bug 1188983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188985">SUSE bug 1188985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189291">SUSE bug 1189291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189706">SUSE bug 1189706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190022">SUSE bug 1190022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190023">SUSE bug 1190023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190067">SUSE bug 1190067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190159">SUSE bug 1190159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190194">SUSE bug 1190194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190349">SUSE bug 1190349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190601">SUSE bug 1190601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190717">SUSE bug 1190717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191193">SUSE bug 1191193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191801">SUSE bug 1191801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191961">SUSE bug 1191961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192400">SUSE bug 1192400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192775">SUSE bug 1192775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192781">SUSE bug 1192781</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17862/">CVE-2017-17862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17862">CVE-2017-17862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17864/">CVE-2017-17864 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17864">CVE-2017-17864 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13405">CVE-2018-13405 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16882/">CVE-2018-16882 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16882">CVE-2018-16882 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12655/">CVE-2020-12655 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12655">CVE-2020-12655 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14305/">CVE-2020-14305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14305">CVE-2020-14305 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3702">CVE-2020-3702 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4788">CVE-2020-4788 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20265/">CVE-2021-20265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20265">CVE-2021-20265 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20322">CVE-2021-20322 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31916/">CVE-2021-31916 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31916">CVE-2021-31916 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33033/">CVE-2021-33033 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33033">CVE-2021-33033 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34556/">CVE-2021-34556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34556">CVE-2021-34556 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34981/">CVE-2021-34981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-34981">CVE-2021-34981 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3542">CVE-2021-3542 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35477/">CVE-2021-35477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35477">CVE-2021-35477 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3655">CVE-2021-3655 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3659">CVE-2021-3659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3679">CVE-2021-3679 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3715">CVE-2021-3715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37159">CVE-2021-37159 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3732">CVE-2021-3732 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3752">CVE-2021-3752 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3753">CVE-2021-3753 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3760/">CVE-2021-3760 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3760">CVE-2021-3760 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3772">CVE-2021-3772 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160">CVE-2021-38160 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38204/">CVE-2021-38204 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38204">CVE-2021-38204 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3896/">CVE-2021-3896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3896">CVE-2021-3896 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40490/">CVE-2021-40490 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40490">CVE-2021-40490 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42008">CVE-2021-42008 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43389">CVE-2021-43389 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659112" comment="kernel-default-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659113" comment="kernel-default-base-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659114" comment="kernel-default-devel-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657857" comment="kernel-default-kgraft-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657873" comment="kernel-default-man-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657858" comment="kernel-devel-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657859" comment="kernel-macros-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657860" comment="kernel-source-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659115" comment="kernel-syms-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657862" comment="kgraft-patch-4_4_180-94_150-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150381" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1193170" ref_url="https://bugzilla.suse.com/1193170" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009847.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Update to version 3.68.1:

- CVE-2021-43527: Fixed a Heap overflow in NSS when verifying DER-encoded DSA or RSA-PSS signatures (bsc#1193170).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659116" comment="libfreebl3-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659117" comment="libfreebl3-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659118" comment="libfreebl3-hmac-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659119" comment="libfreebl3-hmac-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659120" comment="libsoftokn3-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659121" comment="libsoftokn3-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659122" comment="libsoftokn3-hmac-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659123" comment="libsoftokn3-hmac-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659124" comment="mozilla-nss-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659125" comment="mozilla-nss-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659126" comment="mozilla-nss-certs-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659127" comment="mozilla-nss-certs-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659101" comment="mozilla-nss-devel-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659128" comment="mozilla-nss-sysinit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659129" comment="mozilla-nss-sysinit-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659130" comment="mozilla-nss-tools-3.68.1-58.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150382" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1190975" ref_url="https://bugzilla.suse.com/1190975" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009848.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:
  
- CVE-2021-41617: Fixed privilege escalation when AuthorizedKeysCommand/AuthorizedPrincipalsCommand are configured (bsc#1190975).  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190975">SUSE bug 1190975</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41617">CVE-2021-41617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659131" comment="openssh-7.2p2-74.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659132" comment="openssh-askpass-gnome-7.2p2-74.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659133" comment="openssh-fips-7.2p2-74.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659134" comment="openssh-helpers-7.2p2-74.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150383" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1193321" ref_url="https://bugzilla.suse.com/1193321" source="BUGZILLA"/>
		<reference ref_id="1193485" ref_url="https://bugzilla.suse.com/1193485" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:
                                                                                                                    
Update to Extended Support Release 91.4.0 (bsc#1193485):                                                            
                                                                                                                    
- CVE-2021-43536: URL leakage when navigating while executing asynchronous function
- CVE-2021-43537: Heap buffer overflow when using structured clone                         
- CVE-2021-43538: Missing fullscreen and pointer lock notification when requesting both
- CVE-2021-43539: GC rooting failure when calling wasm instance methods 
- CVE-2021-43541: External protocol handler parameters were unescaped                                                  
- CVE-2021-43542: XMLHttpRequest error codes could have leaked the existence of an external protocol handler           
- CVE-2021-43543: Bypass of CSP sandbox directive when embedding                                                       
- CVE-2021-43545: Denial of Service when using the Location API in a loop                                              
- CVE-2021-43546: Cursor spoofing could overlay user interface when native cursor is zoomed                         
- Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4                                                       
- Removed x-scheme-handler/ftp from MozillaFirefox.desktop (bsc#1193321)                                            
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-12"/>
	<updated date="2021-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193321">SUSE bug 1193321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43536">CVE-2021-43536 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43537">CVE-2021-43537 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43538">CVE-2021-43538 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43539">CVE-2021-43539 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43541">CVE-2021-43541 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43542">CVE-2021-43542 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43543">CVE-2021-43543 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43545">CVE-2021-43545 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43546">CVE-2021-43546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659453" comment="MozillaFirefox-91.4.0-112.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659443" comment="MozillaFirefox-devel-91.4.0-112.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659454" comment="MozillaFirefox-translations-common-91.4.0-112.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150384" version="1" class="patch">
	<metadata>
		<title>Security update for glib-networking (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1172460" ref_url="https://bugzilla.suse.com/1172460" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13645" ref_url="https://www.suse.com/security/cve/CVE-2020-13645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009886.html" source="SUSE-SU"/>
		<description>
This update for glib-networking fixes the following issues:

- CVE-2020-13645: Fixed a connection failure when the server identity is unset (bsc#1172460).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-13"/>
	<updated date="2021-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172460">SUSE bug 1172460</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13645/">CVE-2020-13645 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13645">CVE-2020-13645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659155" comment="glib-networking-2.48.2-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659084" comment="glib-networking-lang-2.48.2-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150385" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">CVE-2020-29569 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539103" comment="kgraft-patch-4_4_180-94_135-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150386" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">CVE-2020-29569 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539104" comment="kgraft-patch-4_4_180-94_130-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150387" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="1192042" ref_url="https://bugzilla.suse.com/1192042" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0935" ref_url="https://www.suse.com/security/cve/CVE-2021-0935/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009897.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_150 fixes several issues.

The following security issues were fixed:

- CVE-2021-0935: In ip6_xmit of ip6_output.c, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (bsc#1192032)
- CVE-2021-28688: The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. (bsc#1183646) 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192042">SUSE bug 1192042</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0935/">CVE-2021-0935 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0935">CVE-2021-0935 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721291" comment="kernel-default 4.4.180-94.150 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719630" comment="kgraft-patch-4_4_180-94_150-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009659442" comment="kgraft-patch-4_4_180-94_150-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150388" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1191813" ref_url="https://bugzilla.suse.com/1191813" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009895.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes one issue.

The following security issue was fixed:

- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20322">CVE-2021-20322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009659441" comment="kgraft-patch-4_4_180-94_147-default-6-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150389" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1191813" ref_url="https://bugzilla.suse.com/1191813" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009895.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes one issue.

The following security issue was fixed:

- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20322">CVE-2021-20322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009659440" comment="kgraft-patch-4_4_180-94_144-default-9-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150390" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1191813" ref_url="https://bugzilla.suse.com/1191813" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009895.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes one issue.

The following security issue was fixed:

- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20322">CVE-2021-20322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009659439" comment="kgraft-patch-4_4_180-94_141-default-12-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150391" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1191813" ref_url="https://bugzilla.suse.com/1191813" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009895.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes one issue.

The following security issue was fixed:

- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20322">CVE-2021-20322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009659438" comment="kgraft-patch-4_4_180-94_138-default-13-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150392" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.

The following security issues were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">CVE-2020-29569 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539105" comment="kgraft-patch-4_4_180-94_127-default-6-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150393" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1193030" ref_url="https://bugzilla.suse.com/1193030" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009903.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:
 
- CVE-2021-4008: Fixed Privilege Escalation Vulnerability via Out-Of-Bounds Access in SProcRenderCompositeGlyphs (bsc#1193030).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193030">SUSE bug 1193030</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4008">CVE-2021-4008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659891" comment="xorg-x11-server-7.6_1.18.3-76.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659892" comment="xorg-x11-server-extra-7.6_1.18.3-76.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150394" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_124 fixes several issues.

The following security issues were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">CVE-2020-29569 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721283" comment="kernel-default 4.4.180-94.124 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719614" comment="kgraft-patch-4_4_180-94_124-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539106" comment="kgraft-patch-4_4_180-94_124-default-6-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150395" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_121 fixes several issues.

The following security issues were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">CVE-2020-29569 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721282" comment="kernel-default 4.4.180-94.121 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719612" comment="kgraft-patch-4_4_180-94_121-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539107" comment="kgraft-patch-4_4_180-94_121-default-6-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150396" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_116 fixes several issues.

The following security issues were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">CVE-2020-29569 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721281" comment="kernel-default 4.4.180-94.116 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719610" comment="kgraft-patch-4_4_180-94_116-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539108" comment="kgraft-patch-4_4_180-94_116-default-7-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150397" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009918.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issue:

- CVE-2021-4104: Disable the JMSAppender class from log4j to protect against
  the log4jshell vulnerability. [bsc#1193662]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-17"/>
	<updated date="2021-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">CVE-2021-4104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660148" comment="log4j-1.2.15-126.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150398" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1190487" ref_url="https://bugzilla.suse.com/1190487" source="BUGZILLA"/>
		<reference ref_id="1190489" ref_url="https://bugzilla.suse.com/1190489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009/" source="CVE"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009920.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4009: The handler for the CreatePointerBarrier request of the XFixes 
  extension does not properly validate the request length leading to out of 
  bounds memory write. (bsc#1190487)
- CVE-2021-4011: The handlers for the RecordCreateContext and RecordRegisterClients
  requests of the Record extension do not properly validate the request
  length leading to out of bounds memory write. (bsc#1190489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-20"/>
	<updated date="2021-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190487">SUSE bug 1190487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4009">CVE-2021-4009 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4011">CVE-2021-4011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660800" comment="xorg-x11-server-7.6_1.18.3-76.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660801" comment="xorg-x11-server-extra-7.6_1.18.3-76.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150399" version="1" class="patch">
	<metadata>
		<title>Recommended update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1192849" ref_url="https://bugzilla.suse.com/1192849" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<reference ref_id="SUSE-RU-2021:4126-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021140.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

The username map advice from the CVE-2020-25717 advisory
note has undesired side effects for the local nt token. Fallback
to a SID/UID based mapping if the name based lookup fails (bsc#1192849).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-20"/>
	<updated date="2021-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192849">SUSE bug 1192849</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25717">CVE-2020-25717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660877" comment="libdcerpc-binding0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660878" comment="libdcerpc-binding0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660879" comment="libdcerpc0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660880" comment="libdcerpc0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660881" comment="libndr-krb5pac0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660882" comment="libndr-krb5pac0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660883" comment="libndr-nbt0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660884" comment="libndr-nbt0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660885" comment="libndr-standard0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660886" comment="libndr-standard0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660887" comment="libndr0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660888" comment="libndr0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660889" comment="libnetapi0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660890" comment="libnetapi0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660891" comment="libsamba-credentials0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660892" comment="libsamba-credentials0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660893" comment="libsamba-errors0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660894" comment="libsamba-errors0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660895" comment="libsamba-hostconfig0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660896" comment="libsamba-hostconfig0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660897" comment="libsamba-passdb0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660898" comment="libsamba-passdb0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660899" comment="libsamba-util0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660900" comment="libsamba-util0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660901" comment="libsamdb0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660902" comment="libsamdb0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660903" comment="libsmbclient0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660904" comment="libsmbclient0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660905" comment="libsmbconf0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660906" comment="libsmbconf0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660907" comment="libsmbldap0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660908" comment="libsmbldap0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660909" comment="libtevent-util0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660910" comment="libtevent-util0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660911" comment="libwbclient0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660912" comment="libwbclient0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660913" comment="samba-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660914" comment="samba-client-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660915" comment="samba-client-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660850" comment="samba-doc-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660916" comment="samba-libs-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660917" comment="samba-libs-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660918" comment="samba-winbind-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660919" comment="samba-winbind-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150400" version="1" class="patch">
	<metadata>
		<title>Security update for chrony (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1063704" ref_url="https://bugzilla.suse.com/1063704" source="BUGZILLA"/>
		<reference ref_id="1069468" ref_url="https://bugzilla.suse.com/1069468" source="BUGZILLA"/>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1083597" ref_url="https://bugzilla.suse.com/1083597" source="BUGZILLA"/>
		<reference ref_id="1099272" ref_url="https://bugzilla.suse.com/1099272" source="BUGZILLA"/>
		<reference ref_id="1115529" ref_url="https://bugzilla.suse.com/1115529" source="BUGZILLA"/>
		<reference ref_id="1128846" ref_url="https://bugzilla.suse.com/1128846" source="BUGZILLA"/>
		<reference ref_id="1156884" ref_url="https://bugzilla.suse.com/1156884" source="BUGZILLA"/>
		<reference ref_id="1159840" ref_url="https://bugzilla.suse.com/1159840" source="BUGZILLA"/>
		<reference ref_id="1161119" ref_url="https://bugzilla.suse.com/1161119" source="BUGZILLA"/>
		<reference ref_id="1162964" ref_url="https://bugzilla.suse.com/1162964" source="BUGZILLA"/>
		<reference ref_id="1171806" ref_url="https://bugzilla.suse.com/1171806" source="BUGZILLA"/>
		<reference ref_id="1172113" ref_url="https://bugzilla.suse.com/1172113" source="BUGZILLA"/>
		<reference ref_id="1173277" ref_url="https://bugzilla.suse.com/1173277" source="BUGZILLA"/>
		<reference ref_id="1173760" ref_url="https://bugzilla.suse.com/1173760" source="BUGZILLA"/>
		<reference ref_id="1174075" ref_url="https://bugzilla.suse.com/1174075" source="BUGZILLA"/>
		<reference ref_id="1174911" ref_url="https://bugzilla.suse.com/1174911" source="BUGZILLA"/>
		<reference ref_id="1180689" ref_url="https://bugzilla.suse.com/1180689" source="BUGZILLA"/>
		<reference ref_id="1181826" ref_url="https://bugzilla.suse.com/1181826" source="BUGZILLA"/>
		<reference ref_id="1183783" ref_url="https://bugzilla.suse.com/1183783" source="BUGZILLA"/>
		<reference ref_id="1184400" ref_url="https://bugzilla.suse.com/1184400" source="BUGZILLA"/>
		<reference ref_id="1187906" ref_url="https://bugzilla.suse.com/1187906" source="BUGZILLA"/>
		<reference ref_id="1190926" ref_url="https://bugzilla.suse.com/1190926" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14367" ref_url="https://www.suse.com/security/cve/CVE-2020-14367/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009931.html" source="SUSE-SU"/>
		<description>
This update for chrony fixes the following issues:

Chrony was updated to 4.1:

* Add support for NTS servers specified by IP address (matching
  Subject Alternative Name in server certificate)
* Add source-specific configuration of trusted certificates
* Allow multiple files and directories with trusted certificates
* Allow multiple pairs of server keys and certificates
* Add copy option to server/pool directive
* Increase PPS lock limit to 40% of pulse interval
* Perform source selection immediately after loading dump files
* Reload dump files for addresses negotiated by NTS-KE server
* Update seccomp filter and add less restrictive level
* Restart ongoing name resolution on online command
* Fix dump files to not include uncorrected offset
* Fix initstepslew to accept time from own NTP clients
* Reset NTP address and port when no longer negotiated by NTS-KE
  server
- Update clknetsim to snapshot f89702d.

- Ensure the correct pool packages are installed for openSUSE and SLE (bsc#1180689).

- Enable syscallfilter unconditionally (bsc#1181826).

Chrony was updated to 4.0:

Enhancements

- Add support for Network Time Security (NTS) authentication
- Add support for AES-CMAC keys (AES128, AES256) with Nettle
- Add authselectmode directive to control selection of
  unauthenticated sources
- Add binddevice, bindacqdevice, bindcmddevice directives
- Add confdir directive to better support fragmented
  configuration
- Add sourcedir directive and 'reload sources' command to
  support dynamic NTP sources specified in files
- Add clockprecision directive
- Add dscp directive to set Differentiated Services Code Point
  (DSCP)
- Add -L option to limit log messages by severity
- Add -p option to print whole configuration with included
  files
- Add -U option to allow start under non-root user
- Allow maxsamples to be set to 1 for faster update with -q/-Q
  option
- Avoid replacing NTP sources with sources that have
  unreachable address
- Improve pools to repeat name resolution to get 'maxsources'
  sources
- Improve source selection with trusted sources
- Improve NTP loop test to prevent synchronisation to itself
- Repeat iburst when NTP source is switched from offline state
  to online
- Update clock synchronisation status and leap status more
  frequently
- Update seccomp filter
- Add 'add pool' command
- Add 'reset sources' command to drop all measurements
- Add authdata command to print details about NTP
  authentication
- Add selectdata command to print details about source
  selection
- Add -N option and sourcename command to print original names
  of sources
- Add -a option to some commands to print also unresolved
  sources
- Add -k, -p, -r options to clients command to select, limit,
  reset data
- Bug fixes
- Don’t set interface for NTP responses to allow asymmetric
  routing
- Handle RTCs that don’t support interrupts
- Respond to command requests with correct address on
  multihomed hosts
- Removed features
- Drop support for RIPEMD keys (RMD128, RMD160, RMD256, RMD320)
- Drop support for long (non-standard) MACs in NTPv4 packets
  (chrony 2.x clients using non-MD5/SHA1 keys need to use
  option 'version 3')

- By default we don't write log files but log to journald, so
  only recommend logrotate.

- Adjust and rename the sysconfig file, so that it matches the
  expectations of chronyd.service (bsc#1173277).

Chrony was updated to 3.5.1:

* Create new file when writing pidfile (CVE-2020-14367, bsc#1174911)

- Add chrony-pool-suse and chrony-pool-openSUSE subpackages that
  preconfigure chrony to use NTP servers from the  respective
  pools for SUSE and openSUSE (bsc#1156884, SLE-11424).
- Add chrony-pool-empty to still allow installing chrony without
  preconfigured servers.
- Use iburst in the default pool statements to speed up initial
  synchronisation (bsc#1172113).

- Update clknetsim to version 79ffe44 (fixes bsc#1162964).

Update to 3.5:

+ Add support for more accurate reading of PHC on Linux 5.0
+ Add support for hardware timestamping on interfaces with read-only timestamping configuration
+ Add support for memory locking and real-time priority on FreeBSD, NetBSD, Solaris
+ Update seccomp filter to work on more architectures
+ Validate refclock driver options
+ Fix bindaddress directive on FreeBSD
+ Fix transposition of hardware RX timestamp on Linux 4.13 and later
+ Fix building on non-glibc systems

- Fix location of helper script in chrony-dnssrv@.service (bsc#1128846).

- Read runtime servers from /var/run/netconfig/chrony.servers (bsc#1099272)
- Move chrony-helper to /usr/lib/chrony/helper, because there should be no executables in /usr/share.
- Remove discrepancies between spec file and chrony-tmpfiles (bsc#1115529) 

Update to version 3.4

* Enhancements

  + Add filter option to server/pool/peer directive
  + Add minsamples and maxsamples options to hwtimestamp directive
  + Add support for faster frequency adjustments in Linux 4.19
  + Change default pidfile to /var/run/chrony/chronyd.pid to allow chronyd 
    without root privileges to remove it on exit
  + Disable sub-second polling intervals for distant NTP sources
  + Extend range of supported sub-second polling intervals
  + Get/set IPv4 destination/source address of NTP packets on FreeBSD
  + Make burst options and command useful with short polling intervals
  + Modify auto_offline option to activate when sending request failed
  + Respond from interface that received NTP request if possible
  + Add onoffline command to switch between online and offline state 
    according to current system network configuration
  + Improve example NetworkManager dispatcher script

* Bug fixes

  + Avoid waiting in Linux getrandom system call
  + Fix PPS support on FreeBSD and NetBSD

Update to version 3.3

* Enhancements:

  + Add burst option to server/pool directive
  + Add stratum and tai options to refclock directive
  + Add support for Nettle crypto library
  + Add workaround for missing kernel receive timestamps on Linux
  + Wait for late hardware transmit timestamps
  + Improve source selection with unreachable sources
  + Improve protection against replay attacks on symmetric mode
  + Allow PHC refclock to use socket in /var/run/chrony
  + Add shutdown command to stop chronyd
  + Simplify format of response to manual list command
  + Improve handling of unknown responses in chronyc

* Bug fixes:

  + Respond to NTPv1 client requests with zero mode
  + Fix -x option to not require CAP_SYS_TIME under non-root user
  + Fix acquisitionport directive to work with privilege separation
  + Fix handling of socket errors on Linux to avoid high CPU usage
  + Fix chronyc to not get stuck in infinite loop after clock step

- Added /etc/chrony.d/ directory to the package (bsc#1083597) Modifed default chrony.conf to add 'include /etc/chrony.d/*'

- Enable pps support

Upgraded to version 3.2:

Enhancements

* Improve stability with NTP sources and reference clocks
* Improve stability with hardware timestamping
* Improve support for NTP interleaved modes
* Control frequency of system clock on macOS 10.13 and later
* Set TAI-UTC offset of system clock with leapsectz directive
* Minimise data in client requests to improve privacy
* Allow transmit-only hardware timestamping
* Add support for new timestamping options introduced in Linux 4.13
* Add root delay, root dispersion and maximum error to tracking log
* Add mindelay and asymmetry options to server/peer/pool directive
* Add extpps option to PHC refclock to timestamp external PPS signal
* Add pps option to refclock directive to treat any refclock as PPS
* Add width option to refclock directive to filter wrong pulse edges
* Add rxfilter option to hwtimestamp directive
* Add -x option to disable control of system clock
* Add -l option to log to specified file instead of syslog
* Allow multiple command-line options to be specified together
* Allow starting without root privileges with -Q option
* Update seccomp filter for new glibc versions
* Dump history on exit by default with dumpdir directive
* Use hardening compiler options by default

Bug fixes

* Don't drop PHC samples with low-resolution system clock
* Ignore outliers in PHC tracking, RTC tracking, manual input
* Increase polling interval when peer is not responding
* Exit with error message when include directive fails
* Don't allow slash after hostname in allow/deny directive/command
* Try to connect to all addresses in chronyc before giving up

Upgraded to version 3.1:

- Enhancements

  - Add support for precise cross timestamping of PHC on Linux
  - Add minpoll, precision, nocrossts options to hwtimestamp directive
  - Add rawmeasurements option to log directive and modify measurements
    option to log only valid measurements from synchronised sources
  - Allow sub-second polling interval with NTP sources

- Bug fixes

  - Fix time smoothing in interleaved mode

Upgraded to version 3.0:

- Enhancements

  - Add support for software and hardware timestamping on Linux
  - Add support for client/server and symmetric interleaved modes
  - Add support for MS-SNTP authentication in Samba
  - Add support for truncated MACs in NTPv4 packets
  - Estimate and correct for asymmetric network jitter
  - Increase default minsamples and polltarget to improve stability with very low jitter
  - Add maxjitter directive to limit source selection by jitter
  - Add offset option to server/pool/peer directive
  - Add maxlockage option to refclock directive
  - Add -t option to chronyd to exit after specified time
  - Add partial protection against replay attacks on symmetric mode
  - Don't reset polling interval when switching sources to online state
  - Allow rate limiting with very short intervals
  - Improve maximum server throughput on Linux and NetBSD
  - Remove dump files after start
  - Add tab-completion to chronyc with libedit/readline
  - Add ntpdata command to print details about NTP measurements
  - Allow all source options to be set in add server/peer command
  - Indicate truncated addresses/hostnames in chronyc output
  - Print reference IDs as hexadecimal numbers to avoid confusion with IPv4 addresses

- Bug fixes

  - Fix crash with disabled asynchronous name resolving

Upgraded to version 2.4.1:

- Bug fixes

  - Fix processing of kernel timestamps on non-Linux systems
  - Fix crash with smoothtime directive
  - Fix validation of refclock sample times
  - Fix parsing of refclock directive

update to 2.4:

- Enhancements

  - Add orphan option to local directive for orphan mode
    compatible with ntpd
  - Add distance option to local directive to set activation
    threshold (1 second by default)
  - Add maxdrift directive to set maximum allowed drift of system
    clock
  - Try to replace NTP sources exceeding maximum distance
  - Randomise source replacement to avoid getting stuck with bad
    sources
  - Randomise selection of sources from pools on start
  - Ignore reference timestamp as ntpd doesn't always set it
    correctly
  - Modify tracking report to use same values as seen by NTP
    clients
  - Add -c option to chronyc to write reports in CSV format
  - Provide detailed manual pages

- Bug fixes

  - Fix SOCK refclock to work correctly when not specified as
    last refclock
  - Fix initstepslew and -q/-Q options to accept time from own
    NTP clients
  - Fix authentication with keys using 512-bit hash functions
  - Fix crash on exit when multiple signals are received
  - Fix conversion of very small floating-point numbers in
    command packets
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1063704">SUSE bug 1063704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069468">SUSE bug 1069468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083597">SUSE bug 1083597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099272">SUSE bug 1099272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115529">SUSE bug 1115529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128846">SUSE bug 1128846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156884">SUSE bug 1156884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159840">SUSE bug 1159840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161119">SUSE bug 1161119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162964">SUSE bug 1162964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171806">SUSE bug 1171806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172113">SUSE bug 1172113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173277">SUSE bug 1173277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173760">SUSE bug 1173760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174075">SUSE bug 1174075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174911">SUSE bug 1174911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180689">SUSE bug 1180689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181826">SUSE bug 1181826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183783">SUSE bug 1183783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184400">SUSE bug 1184400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187906">SUSE bug 1187906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190926">SUSE bug 1190926</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14367/">CVE-2020-14367 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14367">CVE-2020-14367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660013" comment="chrony-4.1-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150401" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008310.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- buffer overflow in PyCArg_repr in _ctypes/callproc.c,
  which may lead to remote code execution (bsc#1181126, CVE-2021-3177).
- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-11"/>
	<updated date="2021-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555574" comment="libpython2_7-1_0-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552086" comment="libpython2_7-1_0-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555575" comment="python-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552088" comment="python-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555576" comment="python-base-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552090" comment="python-base-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555577" comment="python-curses-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555578" comment="python-demo-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555579" comment="python-devel-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531881" comment="python-doc-2.7.17-28.64.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531882" comment="python-doc-pdf-2.7.17-28.64.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555580" comment="python-gdbm-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555581" comment="python-idle-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555582" comment="python-tk-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555583" comment="python-xml-2.7.17-28.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150402" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1181742" ref_url="https://bugzilla.suse.com/1181742" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35498" ref_url="https://www.suse.com/security/cve/CVE-2020-35498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008320.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2020-35498: Fixed a denial of service related to the handling of Ethernet padding (bsc#1181742).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-12"/>
	<updated date="2021-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181742">SUSE bug 1181742</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35498/">CVE-2020-35498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35498">CVE-2020-35498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555584" comment="openvswitch-2.7.12-3.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150403" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1105322" ref_url="https://bugzilla.suse.com/1105322" source="BUGZILLA"/>
		<reference ref_id="1105323" ref_url="https://bugzilla.suse.com/1105323" source="BUGZILLA"/>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1168952" ref_url="https://bugzilla.suse.com/1168952" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1175306" ref_url="https://bugzilla.suse.com/1175306" source="BUGZILLA"/>
		<reference ref_id="1176395" ref_url="https://bugzilla.suse.com/1176395" source="BUGZILLA"/>
		<reference ref_id="1176485" ref_url="https://bugzilla.suse.com/1176485" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1178182" ref_url="https://bugzilla.suse.com/1178182" source="BUGZILLA"/>
		<reference ref_id="1178272" ref_url="https://bugzilla.suse.com/1178272" source="BUGZILLA"/>
		<reference ref_id="1178589" ref_url="https://bugzilla.suse.com/1178589" source="BUGZILLA"/>
		<reference ref_id="1178886" ref_url="https://bugzilla.suse.com/1178886" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179140" ref_url="https://bugzilla.suse.com/1179140" source="BUGZILLA"/>
		<reference ref_id="1179141" ref_url="https://bugzilla.suse.com/1179141" source="BUGZILLA"/>
		<reference ref_id="1179204" ref_url="https://bugzilla.suse.com/1179204" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179508" ref_url="https://bugzilla.suse.com/1179508" source="BUGZILLA"/>
		<reference ref_id="1179509" ref_url="https://bugzilla.suse.com/1179509" source="BUGZILLA"/>
		<reference ref_id="1179601" ref_url="https://bugzilla.suse.com/1179601" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1179663" ref_url="https://bugzilla.suse.com/1179663" source="BUGZILLA"/>
		<reference ref_id="1179666" ref_url="https://bugzilla.suse.com/1179666" source="BUGZILLA"/>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1179878" ref_url="https://bugzilla.suse.com/1179878" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1179961" ref_url="https://bugzilla.suse.com/1179961" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180027" ref_url="https://bugzilla.suse.com/1180027" source="BUGZILLA"/>
		<reference ref_id="1180028" ref_url="https://bugzilla.suse.com/1180028" source="BUGZILLA"/>
		<reference ref_id="1180029" ref_url="https://bugzilla.suse.com/1180029" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180031" ref_url="https://bugzilla.suse.com/1180031" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180052" ref_url="https://bugzilla.suse.com/1180052" source="BUGZILLA"/>
		<reference ref_id="1180086" ref_url="https://bugzilla.suse.com/1180086" source="BUGZILLA"/>
		<reference ref_id="1180559" ref_url="https://bugzilla.suse.com/1180559" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="1180815" ref_url="https://bugzilla.suse.com/1180815" source="BUGZILLA"/>
		<reference ref_id="1181096" ref_url="https://bugzilla.suse.com/1181096" source="BUGZILLA"/>
		<reference ref_id="1181158" ref_url="https://bugzilla.suse.com/1181158" source="BUGZILLA"/>
		<reference ref_id="1181349" ref_url="https://bugzilla.suse.com/1181349" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="969755" ref_url="https://bugzilla.suse.com/969755" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2019-20934" ref_url="https://www.suse.com/security/cve/CVE-2019-20934/" source="CVE"/>
		<reference ref_id="CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444/" source="CVE"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2020-27835" ref_url="https://www.suse.com/security/cve/CVE-2020-27835/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2020-25211: Fixed a buffer overflow in ctnetlink_parse_tuple_filter() which could be triggered by a local attackers by injecting conntrack netlink configuration (bnc#1176395).
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation (bnc#1105322).

The following non-security bugs were fixed:

- cifs: do not revalidate mountpoint dentries (bsc#1177440).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: ignore revalidate failures in case of process gets signaled (bsc#1177440).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- futex: Avoid freeing an active timer (bsc#969755).
- futex: Avoid violating the 10th rule of futex (bsc#969755).
- futex: Change locking rules (bsc#969755).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#969755).
- futex: Drop hb-&gt;lock before enqueueing on the rtmutex (bsc#969755).
- futex: Fix incorrect should_fail_futex() handling (bsc#969755).
- futex: Fix more put_pi_state() vs. exit_pi_state_list() races (bsc#969755).
- futex: Fix OWNER_DEAD fixup (bsc#969755).
- futex: Fix pi_state-&gt;owner serialization (bsc#969755).
- futex: Fix small (and harmless looking) inconsistencies (bsc#969755).
- futex: Futex_unlock_pi() determinism (bsc#969755).
- futex: Handle early deadlock return correctly (bsc#969755).
- futex: Handle transient 'ownerless' rtmutex state correctly (bsc#969755).
- futex: Pull rt_mutex_futex_unlock() out from under hb-&gt;lock (bsc#969755).
- futex: Rework futex_lock_pi() to use rt_mutex_*_proxy_lock() (bsc#969755).
- futex: Rework inconsistent rt_mutex/futex_q state (bsc#969755).
- futex,rt_mutex: Fix rt_mutex_cleanup_proxy_lock() (bsc#969755).
- futex,rt_mutex: Introduce rt_mutex_init_waiter() (bsc#969755).
- futex,rt_mutex: Provide futex specific rt_mutex API (bsc#969755).
- futex,rt_mutex: Restructure rt_mutex_finish_proxy_lock() (bsc#969755).
- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- IB/hfi1: Clean up hfi1_user_exp_rcv_setup function (bsc#1179878).
- IB/hfi1: Clean up pin_vector_pages() function (bsc#1179878).
- IB/hfi1: Fix the bail out code in pin_vector_pages() function (bsc#1179878).
- IB/hfi1: Move structure definitions from user_exp_rcv.c to user_exp_rcv.h (bsc#1179878).
- IB/hfi1: Name function prototype parameters (bsc#1179878).
- IB/hfi1: Use filedata rather than filepointer (bsc#1179878).
- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#969755).
- mm/userfaultfd: do not access vma-&gt;vm_mm after calling handle_userfault() (bsc#1179204).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1178272).
- Use r3 instead of r13 for l1d fallback flush in do_uaccess_fush (bsc#1181096 ltc#190883).
- video: hyperv_fb: include vmalloc.h (bsc#1175306).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-12"/>
	<updated date="2021-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175306">SUSE bug 1175306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178272">SUSE bug 1178272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179204">SUSE bug 1179204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179508">SUSE bug 1179508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179509">SUSE bug 1179509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179663">SUSE bug 1179663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179666">SUSE bug 1179666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179878">SUSE bug 1179878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179961">SUSE bug 1179961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180027">SUSE bug 1180027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180028">SUSE bug 1180028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180031">SUSE bug 1180031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180052">SUSE bug 1180052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180815">SUSE bug 1180815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181096">SUSE bug 1181096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969755">SUSE bug 969755</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10902">CVE-2018-10902 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20934/">CVE-2019-20934 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20934">CVE-2019-20934 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0444">CVE-2020-0444 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15436">CVE-2020-15436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15437">CVE-2020-15437 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25211">CVE-2020-25211 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25285">CVE-2020-25285 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25669">CVE-2020-25669 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27068">CVE-2020-27068 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27777">CVE-2020-27777 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27825">CVE-2020-27825 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27835/">CVE-2020-27835 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27835">CVE-2020-27835 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28915">CVE-2020-28915 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28974">CVE-2020-28974 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29568">CVE-2020-29568 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">CVE-2020-29569 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4788">CVE-2020-4788 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555585" comment="kernel-default-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555586" comment="kernel-default-base-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555587" comment="kernel-default-devel-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539113" comment="kernel-default-kgraft-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555588" comment="kernel-default-man-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539114" comment="kernel-devel-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539115" comment="kernel-macros-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539116" comment="kernel-source-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555589" comment="kernel-syms-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539118" comment="kgraft-patch-4_4_180-94_138-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150404" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1150934" ref_url="https://bugzilla.suse.com/1150934" source="BUGZILLA"/>
		<reference ref_id="1181777" ref_url="https://bugzilla.suse.com/1181777" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16275" ref_url="https://www.suse.com/security/cve/CVE-2019-16275/" source="CVE"/>
		<reference ref_id="CVE-2021-0326" ref_url="https://www.suse.com/security/cve/CVE-2021-0326/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008327.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-0326: P2P group information processing vulnerability (bsc#1181777).
- CVE-2019-16275: AP mode PMF disconnection protection bypass (bsc#1150934)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-15"/>
	<updated date="2021-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150934">SUSE bug 1150934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181777">SUSE bug 1181777</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16275/">CVE-2019-16275 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16275">CVE-2019-16275 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0326/">CVE-2021-0326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0326">CVE-2021-0326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555590" comment="wpa_supplicant-2.6-15.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150405" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1179748" ref_url="https://bugzilla.suse.com/1179748" source="BUGZILLA"/>
		<reference ref_id="1181483" ref_url="https://bugzilla.suse.com/1181483" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008333.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

- bsc#1179748 CVE-2020-27828: Fix heap overflow by checking maxrlvls
- bsc#1181483 CVE-2021-3272: Fix buffer over-read in jp2_decode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179748">SUSE bug 1179748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181483">SUSE bug 1181483</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27828">CVE-2020-27828 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3272">CVE-2021-3272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555591" comment="libjasper1-1.900.14-195.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552107" comment="libjasper1-32bit-1.900.14-195.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150406" version="1" class="patch">
	<metadata>
		<title>Security update for screen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182092" ref_url="https://bugzilla.suse.com/1182092" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26937" ref_url="https://www.suse.com/security/cve/CVE-2021-26937/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008336.html" source="SUSE-SU"/>
		<description>
This update for screen fixes the following issues:

- CVE-2021-26937: Fixed double width combining char handling that could lead to a denial of service or code execution (bsc#1182092).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-17"/>
	<updated date="2021-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182092">SUSE bug 1182092</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26937/">CVE-2021-26937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26937">CVE-2021-26937 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555592" comment="screen-4.0.4-23.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150407" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182246" ref_url="https://bugzilla.suse.com/1182246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008342.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy
  negotiation can be targeted by a buffer overflow attack [bsc#1182246, CVE-2020-8625]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182246">SUSE bug 1182246</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8625">CVE-2020-8625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555593" comment="bind-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555594" comment="bind-chrootenv-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531905" comment="bind-doc-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555595" comment="bind-libs-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552112" comment="bind-libs-32bit-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555596" comment="bind-utils-9.9.9P1-63.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150408" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008344.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 80
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27221">CVE-2020-27221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552114" comment="java-1_7_1-ibm-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531910" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543223" comment="java-1_7_1-ibm-devel-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552115" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531913" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.80-38.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150409" version="1" class="patch">
	<metadata>
		<title>Security update for krb5-appl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1131109" ref_url="https://bugzilla.suse.com/1131109" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25017" ref_url="https://www.suse.com/security/cve/CVE-2019-25017/" source="CVE"/>
		<reference ref_id="CVE-2019-25018" ref_url="https://www.suse.com/security/cve/CVE-2019-25018/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008353.html" source="SUSE-SU"/>
		<description>
This update for krb5-appl fixes the following issues:

- CVE-2019-25017: Check the filenames sent by the server match those requested by the client (bsc#1131109).
- CVE-2019-25018: Disallow empty incoming filename or ones that refer to the current directory (bsc#1131109).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131109">SUSE bug 1131109</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25017/">CVE-2019-25017 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25017">CVE-2019-25017 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25018/">CVE-2019-25018 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25018">CVE-2019-25018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555597" comment="krb5-appl-clients-1.0.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555598" comment="krb5-appl-servers-1.0.3-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150410" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008355.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u282 (icedtea 3.18.0)
  * January 2021 CPU (bsc#1181239)
  * Security fixes
    + JDK-8247619: Improve Direct Buffering of Characters (CVE-2020-14803)
  * Import of OpenJDK 8 u282 build 01
    + JDK-6962725: Regtest javax/swing/JFileChooser/6738668/
      /bug6738668.java fails under Linux
    + JDK-8025936: Windows .pdb and .map files does not have proper
      dependencies setup
    + JDK-8030350: Enable additional compiler warnings for GCC
    + JDK-8031423: Test java/awt/dnd/DisposeFrameOnDragCrash/
      /DisposeFrameOnDragTest.java fails by Timeout on Windows
    + JDK-8036122: Fix warning 'format not a string literal'
    + JDK-8051853: new
      URI('x/').resolve('..').getSchemeSpecificPart() returns null!
    + JDK-8132664: closed/javax/swing/DataTransfer/DefaultNoDrop/
      /DefaultNoDrop.java locks on Windows
    + JDK-8134632: Mark javax/sound/midi/Devices/
      /InitializationHang.java as headful
    + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'
      treated by JVM as an equivalent
    + JDK-8148916: Mark bug6400879.java as intermittently failing
    + JDK-8148983: Fix extra comma in changes for JDK-8148916
    + JDK-8160438: javax/swing/plaf/nimbus/8057791/bug8057791.java
      fails
    + JDK-8165808: Add release barriers when allocating objects
      with concurrent collection
    + JDK-8185003: JMX: Add a version of
      ThreadMXBean.dumpAllThreads with a maxDepth argument
    + JDK-8202076: test/jdk/java/io/File/WinSpecialFiles.java on
      windows with VS2017
    + JDK-8207766: [testbug] Adapt tests for Aix.
    + JDK-8212070: Introduce diagnostic flag to abort VM on failed
      JIT compilation
    + JDK-8213448: [TESTBUG] enhance jfr/jvm/TestDumpOnCrash
    + JDK-8215727: Restore JFR thread sampler loop to old /
      previous behavior
    + JDK-8220657: JFR.dump does not work when filename is set
    + JDK-8221342: [TESTBUG] Generate Dockerfile for docker testing
    + JDK-8224502: [TESTBUG] JDK docker test TestSystemMetrics.java
      fails with access issues and OOM
    + JDK-8231209: [REDO] ThreadMXBean::getThreadAllocatedBytes()
      can be quicker for self thread
    + JDK-8231968: getCurrentThreadAllocatedBytes default
      implementation s/b getThreadAllocatedBytes
    + JDK-8232114: JVM crashed at imjpapi.dll in native code
    + JDK-8234270: [REDO] JDK-8204128 NMT might report incorrect
      numbers for Compiler area
    + JDK-8234339: replace JLI_StrTok in java_md_solinux.c
    + JDK-8238448: RSASSA-PSS signature verification fail when
      using certain odd key sizes
    + JDK-8242335: Additional Tests for RSASSA-PSS
    + JDK-8244225: stringop-overflow warning on strncpy call from
      compile_the_world_in
    + JDK-8245400: Upgrade to LittleCMS 2.11
    + JDK-8248214: Add paddings for TaskQueueSuper to reduce
      false-sharing cache contention
    + JDK-8249176: Update GlobalSignR6CA test certificates
    + JDK-8250665: Wrong translation for the month name of May in
      ar_JO,LB,SY
    + JDK-8250928: JFR: Improve hash algorithm for stack traces
    + JDK-8251469: Better cleanup for
      test/jdk/javax/imageio/SetOutput.java
    + JDK-8251840: Java_sun_awt_X11_XToolkit_getDefaultScreenData
      should not be in make/mapfiles/libawt_xawt/mapfile-vers
    + JDK-8252384: [TESTBUG] Some tests refer to COMPAT provider
      rather than JRE
    + JDK-8252395: [8u] --with-native-debug-symbols=external
      doesn't include debuginfo files for binaries
    + JDK-8252497: Incorrect numeric currency code for ROL
    + JDK-8252754: Hash code calculation of JfrStackTrace is
      inconsistent
    + JDK-8252904: VM crashes when JFR is used and JFR event class
      is transformed
    + JDK-8252975: [8u] JDK-8252395 breaks the build for
      --with-native-debug-symbols=internal
    + JDK-8253284: Zero OrderAccess barrier mappings are incorrect
    + JDK-8253550: [8u] JDK-8252395 breaks the build for make
      STRIP_POLICY=no_strip
    + JDK-8253752: test/sun/management/jmxremote/bootstrap/
      /RmiBootstrapTest.java fails randomly
    + JDK-8254081: java/security/cert/PolicyNode/
      /GetPolicyQualifiers.java fails due to an expired certificate
    + JDK-8254144: Non-x86 Zero builds fail with return-type
      warning in os_linux_zero.cpp
    + JDK-8254166: Zero: return-type warning in
       zeroInterpreter_zero.cpp
    + JDK-8254683: [TEST_BUG] jdk/test/sun/tools/jconsole/
      /WorkerDeadlockTest.java fails
    + JDK-8255003: Build failures on Solaris
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555599" comment="java-1_8_0-openjdk-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555600" comment="java-1_8_0-openjdk-demo-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555601" comment="java-1_8_0-openjdk-devel-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555602" comment="java-1_8_0-openjdk-headless-1.8.0.282-27.56.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150411" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008394.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 25
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27221">CVE-2020-27221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552122" comment="java-1_8_0-ibm-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531921" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543254" comment="java-1_8_0-ibm-devel-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531923" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.25-30.81.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150412" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-Twig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1008644" ref_url="https://bugzilla.suse.com/1008644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9180" ref_url="https://www.suse.com/security/cve/CVE-2016-9180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008410.html" source="SUSE-SU"/>
		<description>
This update for perl-XML-Twig fixes the following issues:

- Security fix [bsc#1008644, CVE-2016-9180]
  * Added: the no_xxe option to XML::Twig::new, which causes the
    parse to fail if external entities are used (to prevent
    malicious XML to access the filesystem).
  * Setting expand_external_ents to 0 or -1 currently doesn't work
    as expected; To completely turn off expanding external entities
    use no_xxe.
  * Update documentation for XML::Twig to mention problems with
    expand_external_ents and add information about new no_xxe argument
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008644">SUSE bug 1008644</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9180/">CVE-2016-9180 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9180">CVE-2016-9180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531924" comment="perl-XML-Twig-3.44-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150413" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182357" ref_url="https://bugzilla.suse.com/1182357" source="BUGZILLA"/>
		<reference ref_id="1182614" ref_url="https://bugzilla.suse.com/1182614" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008404.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.8.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2021-08 (bsc#1182614)
  * CVE-2021-23969: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23968: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23973: MediaError message property could have leaked information about cross-origin resources
  * CVE-2021-23978: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182357">SUSE bug 1182357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23968">CVE-2021-23968 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23969">CVE-2021-23969 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23973">CVE-2021-23973 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23978">CVE-2021-23978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555603" comment="MozillaFirefox-78.8.0-112.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543255" comment="MozillaFirefox-devel-78.8.0-112.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555604" comment="MozillaFirefox-translations-common-78.8.0-112.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150414" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182066" ref_url="https://bugzilla.suse.com/1182066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008413.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-36242: Using the Fernet class to symmetrically encrypt multi gigabyte
  values could result in an integer overflow and buffer overflow (bsc#1182066).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182066">SUSE bug 1182066</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36242">CVE-2020-36242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555605" comment="python-cryptography-2.1.4-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555606" comment="python3-cryptography-2.1.4-7.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150415" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1175970" ref_url="https://bugzilla.suse.com/1175970" source="BUGZILLA"/>
		<reference ref_id="1176711" ref_url="https://bugzilla.suse.com/1176711" source="BUGZILLA"/>
		<reference ref_id="1177883" ref_url="https://bugzilla.suse.com/1177883" source="BUGZILLA"/>
		<reference ref_id="1179264" ref_url="https://bugzilla.suse.com/1179264" source="BUGZILLA"/>
		<reference ref_id="1179265" ref_url="https://bugzilla.suse.com/1179265" source="BUGZILLA"/>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="1182262" ref_url="https://bugzilla.suse.com/1182262" source="BUGZILLA"/>
		<reference ref_id="1182263" ref_url="https://bugzilla.suse.com/1182263" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

grub2 now implements the new 'SBAT' method for SHIM based secure boot revocation. (bsc#1182057)

Following security issues are fixed that can violate secure boot constraints:

- CVE-2020-25632: Fixed a use-after-free in rmmod command (bsc#1176711)
- CVE-2020-25647: Fixed an out-of-bound write in grub_usb_device_initialize() (bsc#1177883)
- CVE-2020-27749: Fixed a stack buffer overflow in grub_parser_split_cmdline (bsc#1179264)
- CVE-2020-27779, CVE-2020-14372: Disallow cutmem and acpi commands in secure boot mode (bsc#1179265 bsc#1175970)
- CVE-2021-20225: Fixed a heap out-of-bounds write in short form option parser (bsc#1182262)
- CVE-2021-20233: Fixed a heap out-of-bound write due to mis-calculation of space required for quoting (bsc#1182263)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175970">SUSE bug 1175970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176711">SUSE bug 1176711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177883">SUSE bug 1177883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179264">SUSE bug 1179264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179265">SUSE bug 1179265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182262">SUSE bug 1182262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182263">SUSE bug 1182263</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14372">CVE-2020-14372 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25632">CVE-2020-25632 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25647">CVE-2020-25647 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27749">CVE-2020-27749 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27779">CVE-2020-27779 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20225">CVE-2021-20225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20233">CVE-2021-20233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555607" comment="grub2-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555608" comment="grub2-arm64-efi-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539120" comment="grub2-i386-pc-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539121" comment="grub2-powerpc-ieee1275-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555609" comment="grub2-s390x-emu-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539122" comment="grub2-snapper-plugin-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539123" comment="grub2-systemd-sleep-plugin-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539124" comment="grub2-x86_64-efi-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539125" comment="grub2-x86_64-xen-2.02-4.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150416" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182279" ref_url="https://bugzilla.suse.com/1182279" source="BUGZILLA"/>
		<reference ref_id="1182408" ref_url="https://bugzilla.suse.com/1182408" source="BUGZILLA"/>
		<reference ref_id="1182411" ref_url="https://bugzilla.suse.com/1182411" source="BUGZILLA"/>
		<reference ref_id="1182412" ref_url="https://bugzilla.suse.com/1182412" source="BUGZILLA"/>
		<reference ref_id="1182413" ref_url="https://bugzilla.suse.com/1182413" source="BUGZILLA"/>
		<reference ref_id="1182415" ref_url="https://bugzilla.suse.com/1182415" source="BUGZILLA"/>
		<reference ref_id="1182416" ref_url="https://bugzilla.suse.com/1182416" source="BUGZILLA"/>
		<reference ref_id="1182417" ref_url="https://bugzilla.suse.com/1182417" source="BUGZILLA"/>
		<reference ref_id="1182418" ref_url="https://bugzilla.suse.com/1182418" source="BUGZILLA"/>
		<reference ref_id="1182419" ref_url="https://bugzilla.suse.com/1182419" source="BUGZILLA"/>
		<reference ref_id="1182420" ref_url="https://bugzilla.suse.com/1182420" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch-&gt;bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-03"/>
	<updated date="2021-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36221">CVE-2020-36221 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36222">CVE-2020-36222 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36223">CVE-2020-36223 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36224">CVE-2020-36224 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36225">CVE-2020-36225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36226">CVE-2020-36226 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36227">CVE-2020-36227 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36228">CVE-2020-36228 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36229">CVE-2020-36229 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36230">CVE-2020-36230 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27212">CVE-2021-27212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555610" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555611" comment="openldap2-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555612" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555613" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555614" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150417" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1178372" ref_url="https://bugzilla.suse.com/1178372" source="BUGZILLA"/>
		<reference ref_id="1181747" ref_url="https://bugzilla.suse.com/1181747" source="BUGZILLA"/>
		<reference ref_id="1181753" ref_url="https://bugzilla.suse.com/1181753" source="BUGZILLA"/>
		<reference ref_id="1181843" ref_url="https://bugzilla.suse.com/1181843" source="BUGZILLA"/>
		<reference ref_id="1182175" ref_url="https://bugzilla.suse.com/1182175" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008448.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used
  by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).

The following non-security bugs were fixed:

- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178372">SUSE bug 1178372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181747">SUSE bug 1181747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181753">SUSE bug 1181753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181843">SUSE bug 1181843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182175">SUSE bug 1182175</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26932">CVE-2021-26932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555615" comment="kernel-default-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555616" comment="kernel-default-base-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555617" comment="kernel-default-devel-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539129" comment="kernel-default-kgraft-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555618" comment="kernel-default-man-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539130" comment="kernel-devel-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539131" comment="kernel-macros-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539132" comment="kernel-source-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555619" comment="kernel-syms-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539134" comment="kgraft-patch-4_4_180-94_141-default-1-4.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150418" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182805" ref_url="https://bugzilla.suse.com/1182805" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27803" ref_url="https://www.suse.com/security/cve/CVE-2021-27803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008451.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-27803: P2P provision discovery processing vulnerability (bsc#1182805) 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182805">SUSE bug 1182805</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27803/">CVE-2021-27803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27803">CVE-2021-27803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555620" comment="wpa_supplicant-2.6-15.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150419" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1183026" ref_url="https://bugzilla.suse.com/1183026" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21300" ref_url="https://www.suse.com/security/cve/CVE-2021-21300/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008456.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- On case-insensitive filesystems, with support for symbolic links,
  if Git is configured globally to apply delay-capable clean/smudge
  filters (such as Git LFS), Git could be fooled into running
  remote code during a clone. (bsc#1183026, CVE-2021-21300)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183026">SUSE bug 1183026</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21300/">CVE-2021-21300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21300">CVE-2021-21300 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009543265" comment="git-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543267" comment="git-core-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543268" comment="git-cvs-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543269" comment="git-daemon-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543270" comment="git-email-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543271" comment="git-gui-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543272" comment="git-svn-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543273" comment="git-web-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543274" comment="gitk-2.26.2-27.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150420" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008491.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- python27 was upgraded to 2.7.18
- CVE-2021-23336: Fixed a potential web cache poisoning by using a semicolon in query parameters use of semicolon as a query string separator (bsc#1182379).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-16"/>
	<updated date="2021-03-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555621" comment="libpython2_7-1_0-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552152" comment="libpython2_7-1_0-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555622" comment="python-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552154" comment="python-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555623" comment="python-base-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552156" comment="python-base-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555624" comment="python-curses-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555625" comment="python-demo-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555626" comment="python-devel-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531971" comment="python-doc-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531972" comment="python-doc-pdf-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555627" comment="python-gdbm-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555628" comment="python-idle-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555629" comment="python-tk-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555630" comment="python-xml-2.7.18-28.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150421" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1180623" ref_url="https://bugzilla.suse.com/1180623" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008173.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.1 ESR
  * Fixed: Critical security issue MFSA 2021-01 (bsc#1180623)
  * CVE-2020-16044
    Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180623">SUSE bug 1180623</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16044">CVE-2020-16044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555631" comment="MozillaFirefox-78.6.1-112.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543276" comment="MozillaFirefox-devel-78.6.1-112.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555632" comment="MozillaFirefox-translations-common-78.6.1-112.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150422" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182328" ref_url="https://bugzilla.suse.com/1182328" source="BUGZILLA"/>
		<reference ref_id="1182362" ref_url="https://bugzilla.suse.com/1182362" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27218" ref_url="https://www.suse.com/security/cve/CVE-2021-27218/" source="CVE"/>
		<reference ref_id="CVE-2021-27219" ref_url="https://www.suse.com/security/cve/CVE-2021-27219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008493.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2021-27218: g_byte_array_new_take takes a gsize as length but stores in a guint, this patch will refuse if the length is larger than guint. (bsc#1182328)
- CVE-2021-27219: g_memdup takes a guint as parameter and sometimes leads into an integer overflow, so add a g_memdup2 function which uses gsize to replace it. (bsc#1182362)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-16"/>
	<updated date="2021-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182328">SUSE bug 1182328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182362">SUSE bug 1182362</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-27218/">CVE-2021-27218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27218">CVE-2021-27218 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27219/">CVE-2021-27219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27219">CVE-2021-27219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531980" comment="glib2-lang-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555633" comment="glib2-tools-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555634" comment="libgio-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552169" comment="libgio-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555635" comment="libglib-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552171" comment="libglib-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555636" comment="libgmodule-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552173" comment="libgmodule-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555637" comment="libgobject-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552175" comment="libgobject-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555638" comment="libgthread-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552177" comment="libgthread-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150423" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008495.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following security issues were fixed:

- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
- CVE-2020-25645: Fixed an issue where the traffic between two Geneve endpoints may have been unencrypted when IPsec was configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177513).
- CVE-2020-0429: Fixed a potential memory corruption due to a use after free which could have led local escalation of privilege with System execution privileges needed (bsc#1176931).
- CVE-2020-1749: Fixed an issue in some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6 where the kernel was not correctly routing tunneled data over the encrypted link rather sending the data unencrypted (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539135" comment="kgraft-patch-4_4_180-94_138-default-2-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150424" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008497.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539136" comment="kgraft-patch-4_4_180-94_135-default-4-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150425" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008497.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539137" comment="kgraft-patch-4_4_180-94_130-default-6-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150426" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008497.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539138" comment="kgraft-patch-4_4_180-94_127-default-7-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150427" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008497.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_124 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721283" comment="kernel-default 4.4.180-94.124 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719614" comment="kgraft-patch-4_4_180-94_124-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539139" comment="kgraft-patch-4_4_180-94_124-default-7-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150428" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008497.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_121 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721282" comment="kernel-default 4.4.180-94.121 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719612" comment="kgraft-patch-4_4_180-94_121-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539140" comment="kgraft-patch-4_4_180-94_121-default-7-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150429" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008497.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_116 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721281" comment="kernel-default 4.4.180-94.116 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719610" comment="kgraft-patch-4_4_180-94_116-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009539141" comment="kgraft-patch-4_4_180-94_116-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150430" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1180414" ref_url="https://bugzilla.suse.com/1180414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008537.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:
	
- CVE-2020-35738: Fixed an out-of-bounds write in WavpackPackSamples (bsc#1180414). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180414">SUSE bug 1180414</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35738">CVE-2020-35738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555639" comment="libwavpack1-4.60.99-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150431" version="1" class="patch">
	<metadata>
		<title>Security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1088639" ref_url="https://bugzilla.suse.com/1088639" source="BUGZILLA"/>
		<reference ref_id="1112438" ref_url="https://bugzilla.suse.com/1112438" source="BUGZILLA"/>
		<reference ref_id="1125689" ref_url="https://bugzilla.suse.com/1125689" source="BUGZILLA"/>
		<reference ref_id="1134616" ref_url="https://bugzilla.suse.com/1134616" source="BUGZILLA"/>
		<reference ref_id="1146182" ref_url="https://bugzilla.suse.com/1146182" source="BUGZILLA"/>
		<reference ref_id="1146184" ref_url="https://bugzilla.suse.com/1146184" source="BUGZILLA"/>
		<reference ref_id="1181358" ref_url="https://bugzilla.suse.com/1181358" source="BUGZILLA"/>
		<reference ref_id="962914" ref_url="https://bugzilla.suse.com/962914" source="BUGZILLA"/>
		<reference ref_id="964140" ref_url="https://bugzilla.suse.com/964140" source="BUGZILLA"/>
		<reference ref_id="966514" ref_url="https://bugzilla.suse.com/966514" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1544" ref_url="https://www.suse.com/security/cve/CVE-2016-1544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" source="SUSE-SU"/>
		<description>
This update for nghttp2 fixes the following issues:

Security issues fixed:

- CVE-2020-11080: HTTP/2 Large Settings Frame DoS (bsc#1181358).
- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service (bsc#1146184).
- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146182).
- CVE-2018-1000168: Fixed ALTSVC frame client side denial of service (bsc#1088639).
- CVE-2016-1544: Fixed out of memory due to unlimited incoming HTTP header fields (bsc#966514).

Bug fixes and enhancements:

- Packages must not mark license files as %doc (bsc#1082318)
- Typo in description of libnghttp2_asio1 (bsc#962914)
- Fixed mistake in spec file (bsc#1125689)
- Fixed build issue with boost 1.70.0 (bsc#1134616)
- Fixed build issue with GCC 6 (bsc#964140)
- Feature: Add W&amp;S module (FATE#326776, bsc#1112438)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088639">SUSE bug 1088639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112438">SUSE bug 1112438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125689">SUSE bug 1125689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134616">SUSE bug 1134616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146182">SUSE bug 1146182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146184">SUSE bug 1146184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181358">SUSE bug 1181358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962914">SUSE bug 962914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964140">SUSE bug 964140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966514">SUSE bug 966514</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1544/">CVE-2016-1544 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1544">CVE-2016-1544 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000168">CVE-2018-1000168 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9511">CVE-2019-9511 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9513">CVE-2019-9513 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11080">CVE-2020-11080 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555640" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150432" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008551.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841">CVE-2021-23841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555641" comment="libopenssl-devel-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555642" comment="libopenssl1_0_0-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552183" comment="libopenssl1_0_0-32bit-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555643" comment="libopenssl1_0_0-hmac-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552185" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555644" comment="openssl-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532002" comment="openssl-doc-1.0.2j-60.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150433" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1183942" ref_url="https://bugzilla.suse.com/1183942" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.9.0 ESR  (MFSA 2021-11, bsc#1183942)
  * CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read
  * CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23984: Malicious extensions could have spoofed popup information
  * CVE-2021-23987: Memory safety bugs
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-31"/>
	<updated date="2021-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23981">CVE-2021-23981 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23982">CVE-2021-23982 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23984">CVE-2021-23984 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23987">CVE-2021-23987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555645" comment="MozillaFirefox-78.9.0-112.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543290" comment="MozillaFirefox-devel-78.9.0-112.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555646" comment="MozillaFirefox-translations-common-78.9.0-112.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150434" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195949" ref_url="https://bugzilla.suse.com/1195949" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010561.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes several issues.

The following security issues were fixed:

- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0487">CVE-2022-0487 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009676963" comment="kgraft-patch-4_4_180-94_144-default-13-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150435" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195949" ref_url="https://bugzilla.suse.com/1195949" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010561.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes several issues.

The following security issues were fixed:

- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0487">CVE-2022-0487 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009676964" comment="kgraft-patch-4_4_180-94_147-default-10-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150436" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195949" ref_url="https://bugzilla.suse.com/1195949" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010561.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_150 fixes several issues.

The following security issues were fixed:

- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0487">CVE-2022-0487 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721291" comment="kernel-default 4.4.180-94.150 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719630" comment="kgraft-patch-4_4_180-94_150-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009676965" comment="kgraft-patch-4_4_180-94_150-default-6-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150437" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 43 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010555.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_156 fixes one issue.

The following security issue was fixed:

- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721292" comment="kernel-default 4.4.180-94.156 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719632" comment="kgraft-patch-4_4_180-94_156-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009676967" comment="kgraft-patch-4_4_180-94_156-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150438" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1197341" ref_url="https://bugzilla.suse.com/1197341" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0547" ref_url="https://www.suse.com/security/cve/CVE-2022-0547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010562.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2022-0547: Fixed possible authentication bypass in external authentication plug-in (bsc#1197341).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197341">SUSE bug 1197341</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0547/">CVE-2022-0547 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0547">CVE-2022-0547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009676883" comment="openvpn-2.3.8-16.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676884" comment="openvpn-auth-pam-plugin-2.3.8-16.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150439" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1196500" ref_url="https://bugzilla.suse.com/1196500" source="BUGZILLA"/>
		<reference ref_id="1197126" ref_url="https://bugzilla.suse.com/1197126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update Java 7.1 to Service Refresh 7 Fix Pack 5 (bsc#1197126).

Including fixes for the following vulnerabilities: 

  CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349,
  CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277,
  CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294,
  CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248,
  CVE-2022-21271.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21271">CVE-2022-21271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21349">CVE-2022-21349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674084" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674025" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674085" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150440" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1195146" ref_url="https://bugzilla.suse.com/1195146" source="BUGZILLA"/>
		<reference ref_id="1196500" ref_url="https://bugzilla.suse.com/1196500" source="BUGZILLA"/>
		<reference ref_id="1197126" ref_url="https://bugzilla.suse.com/1197126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update Java 8.0 to Service Refresh 7 Fix Pack 5 (bsc#1197126).

Including fixes for the following vulnerabilities: 

  CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349,
  CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277,
  CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294,
  CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248,
  CVE-2022-21271.

Non-securtiy fix:

- Fixed a broken symlink for javaws (bsc#1195146).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195146">SUSE bug 1195146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21271">CVE-2022-21271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21349">CVE-2022-21349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674083" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674024" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150441" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 42 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010569.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_153 fixes one issue.

The following security issue was fixed:

- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721293" comment="kernel-default 4.4.180-94.153 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719634" comment="kgraft-patch-4_4_180-94_153-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009676966" comment="kgraft-patch-4_4_180-94_153-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150442" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1197459" ref_url="https://bugzilla.suse.com/1197459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010583.html" source="SUSE-SU"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677636" comment="libz1-1.2.8-12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677637" comment="libz1-32bit-1.2.8-12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677638" comment="zlib-devel-1.2.8-12.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150443" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1191902" ref_url="https://bugzilla.suse.com/1191902" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35560" ref_url="https://www.suse.com/security/cve/CVE-2021-35560/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 7 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
- CVE-2021-35560: Fixed a vulnerability in the component Deployment. (bsc#1191902)
- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake. (bsc#1191904)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191902">SUSE bug 1191902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35560/">CVE-2021-35560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35560">CVE-2021-35560 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41035">CVE-2021-41035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662516" comment="java-1_8_0-ibm-1.8.0_sr7.0-30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662492" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662497" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662494" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-30.84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150444" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010659.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.3 (bsc#1197903):
  - CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11
    tokens are removed while in use.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-05"/>
	<updated date="2022-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678355" comment="libfreebl3-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678356" comment="libfreebl3-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678357" comment="libfreebl3-hmac-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678358" comment="libfreebl3-hmac-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678359" comment="libsoftokn3-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678360" comment="libsoftokn3-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678361" comment="libsoftokn3-hmac-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678362" comment="libsoftokn3-hmac-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678363" comment="mozilla-nss-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678364" comment="mozilla-nss-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678365" comment="mozilla-nss-certs-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678366" comment="mozilla-nss-certs-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678284" comment="mozilla-nss-devel-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678367" comment="mozilla-nss-sysinit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678368" comment="mozilla-nss-sysinit-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678369" comment="mozilla-nss-tools-3.68.3-58.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150445" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<reference ref_id="SUSE-RU-2022:1114-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022464.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.8.0 ESR (bsc#1197903):

MFSA 2022-14 (bsc#1197903)

* CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11 tokens are removed while in use
* CVE-2022-28281: Fixed an out of bounds write due to unexpected WebAuthN Extensions
* CVE-2022-1196: Fixed a use-after-free after VR Process destruction
* CVE-2022-28282: Fixed a use-after-free in DocumentL10n::TranslateDocument
* CVE-2022-28285: Fixed incorrect AliasSet used in JIT Codegen
* CVE-2022-28286: Fixed that iframe contents could be rendered outside the border
* CVE-2022-24713: Fixed a denial of service via complex regular expressions
* CVE-2022-28289: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1196">CVE-2022-1196 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28281">CVE-2022-28281 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28282">CVE-2022-28282 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28285">CVE-2022-28285 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28286">CVE-2022-28286 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28289">CVE-2022-28289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678503" comment="MozillaFirefox-91.8.0-112.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678504" comment="MozillaFirefox-devel-91.8.0-112.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678505" comment="MozillaFirefox-translations-common-91.8.0-112.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150446" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1167631" ref_url="https://bugzilla.suse.com/1167631" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1752" ref_url="https://www.suse.com/security/cve/CVE-2020-1752/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010664.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2020-1752: Fix use-after-free in glob when expanding ~user (bsc#1167631)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167631">SUSE bug 1167631</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1752/">CVE-2020-1752 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">CVE-2020-1752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678616" comment="glibc-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678617" comment="glibc-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678618" comment="glibc-devel-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678619" comment="glibc-devel-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677553" comment="glibc-html-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677554" comment="glibc-i18ndata-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677555" comment="glibc-info-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678620" comment="glibc-locale-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678621" comment="glibc-locale-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678622" comment="glibc-profile-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678623" comment="glibc-profile-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678624" comment="nscd-2.22-123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150447" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1102016" ref_url="https://bugzilla.suse.com/1102016" source="BUGZILLA"/>
		<reference ref_id="1106881" ref_url="https://bugzilla.suse.com/1106881" source="BUGZILLA"/>
		<reference ref_id="1106882" ref_url="https://bugzilla.suse.com/1106882" source="BUGZILLA"/>
		<reference ref_id="1140130" ref_url="https://bugzilla.suse.com/1140130" source="BUGZILLA"/>
		<reference ref_id="1140205" ref_url="https://bugzilla.suse.com/1140205" source="BUGZILLA"/>
		<reference ref_id="1162090" ref_url="https://bugzilla.suse.com/1162090" source="BUGZILLA"/>
		<reference ref_id="1173578" ref_url="https://bugzilla.suse.com/1173578" source="BUGZILLA"/>
		<reference ref_id="1180457" ref_url="https://bugzilla.suse.com/1180457" source="BUGZILLA"/>
		<reference ref_id="1184774" ref_url="https://bugzilla.suse.com/1184774" source="BUGZILLA"/>
		<reference ref_id="1197738" ref_url="https://bugzilla.suse.com/1197738" source="BUGZILLA"/>
		<reference ref_id="971617" ref_url="https://bugzilla.suse.com/971617" source="BUGZILLA"/>
		<reference ref_id="980504" ref_url="https://bugzilla.suse.com/980504" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1924" ref_url="https://www.suse.com/security/cve/CVE-2016-1924/" source="CVE"/>
		<reference ref_id="CVE-2016-3183" ref_url="https://www.suse.com/security/cve/CVE-2016-3183/" source="CVE"/>
		<reference ref_id="CVE-2016-4797" ref_url="https://www.suse.com/security/cve/CVE-2016-4797/" source="CVE"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16375" ref_url="https://www.suse.com/security/cve/CVE-2018-16375/" source="CVE"/>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2018-20845" ref_url="https://www.suse.com/security/cve/CVE-2018-20845/" source="CVE"/>
		<reference ref_id="CVE-2018-20846" ref_url="https://www.suse.com/security/cve/CVE-2018-20846/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="CVE-2022-1122" ref_url="https://www.suse.com/security/cve/CVE-2022-1122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes the following issues:

- CVE-2016-1924: Fixed heap buffer overflow (bsc#980504).
- CVE-2016-3183: Fixed out-of-bounds read in sycc422_to_rgb function (bsc#971617).
- CVE-2016-4797: Fixed heap buffer overflow (bsc#980504).
- CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016).
- CVE-2018-16375: Fixed missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c (bsc#1106882).
- CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881).
- CVE-2018-20845: Fixed division-by-zero in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c (bsc#1140130).
- CVE-2018-20846: Fixed out-of-bounds accesses in pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c (bsc#1140205).
- CVE-2020-8112: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090).
- CVE-2020-15389: Fixed use-after-free if t a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578).
- CVE-2020-27823: Fixed heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457).
- CVE-2021-29338: Fixed integer overflow that allows remote attackers to crash the application (bsc#1184774).
- CVE-2022-1122: Fixed segmentation fault in opj2_decompress due to uninitialized pointer (bsc#1197738).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-07"/>
	<updated date="2022-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102016">SUSE bug 1102016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106881">SUSE bug 1106881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106882">SUSE bug 1106882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140130">SUSE bug 1140130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140205">SUSE bug 1140205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180457">SUSE bug 1180457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184774">SUSE bug 1184774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197738">SUSE bug 1197738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971617">SUSE bug 971617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980504">SUSE bug 980504</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1924/">CVE-2016-1924 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1924">CVE-2016-1924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3183/">CVE-2016-3183 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3183">CVE-2016-3183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-4797/">CVE-2016-4797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4797">CVE-2016-4797 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14423">CVE-2018-14423 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16375/">CVE-2018-16375 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16375">CVE-2018-16375 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16376">CVE-2018-16376 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20845/">CVE-2018-20845 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20845">CVE-2018-20845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20846/">CVE-2018-20846 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20846">CVE-2018-20846 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15389">CVE-2020-15389 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27823">CVE-2020-27823 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8112">CVE-2020-8112 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29338">CVE-2021-29338 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1122/">CVE-2022-1122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1122">CVE-2022-1122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677950" comment="libopenjp2-7-2.1.0-4.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150448" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194547" ref_url="https://bugzilla.suse.com/1194547" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- CVE-2021-4140: Fixed iframe sandbox bypass with XSLT (bsc#1194547).
- CVE-2022-22737: Fixed race condition when playing audio files (bsc#1194547).
- CVE-2022-22738: Fixed heap-buffer-overflow in blendGaussianBlur (bsc#1194547).
- CVE-2022-22739: Fixed missing throttling on external protocol launch dialog (bsc#1194547).
- CVE-2022-22740: Fixed use-after-free of ChannelEventQueue::mOwner (bsc#1194547).
- CVE-2022-22741: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22742: Fixed out-of-bounds memory access when inserting text in edit mode (bsc#1194547).
- CVE-2022-22743: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22744: Fixed possible command injection via the 'Copy as curl' feature in DevTools (bsc#1194547).
- CVE-2022-22745: Fixed leaking cross-origin URLs through securitypolicyviolation event (bsc#1194547).
- CVE-2022-22746: Fixed calling into reportValidity could have lead to fullscreen window spoof (bsc#1194547).
- CVE-2022-22747: Fixed crash when handling empty pkcs7 sequence(bsc#1194547).
- CVE-2022-22748: Fixed spoofed origin on external protocol launch dialog (bsc#1194547).
- CVE-2022-22751: Fixed memory safety bugs (bsc#1194547).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4140">CVE-2021-4140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22737">CVE-2022-22737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22738">CVE-2022-22738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22739">CVE-2022-22739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22740">CVE-2022-22740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22741">CVE-2022-22741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22742">CVE-2022-22742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22743">CVE-2022-22743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22744">CVE-2022-22744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22745">CVE-2022-22745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22746">CVE-2022-22746 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22747">CVE-2022-22747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22748">CVE-2022-22748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22751">CVE-2022-22751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663810" comment="MozillaFirefox-91.5.0-112.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663796" comment="MozillaFirefox-devel-91.5.0-112.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663811" comment="MozillaFirefox-translations-common-91.5.0-112.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150449" version="1" class="patch">
	<metadata>
		<title>Security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010685.html" source="SUSE-SU"/>
		<description>
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679311" comment="liblzma5-5.0.5-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679312" comment="liblzma5-32bit-5.0.5-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679313" comment="xz-5.0.5-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679280" comment="xz-lang-5.0.5-6.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150450" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1172768" ref_url="https://bugzilla.suse.com/1172768" source="BUGZILLA"/>
		<reference ref_id="1172802" ref_url="https://bugzilla.suse.com/1172802" source="BUGZILLA"/>
		<reference ref_id="1178479" ref_url="https://bugzilla.suse.com/1178479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0181" ref_url="https://www.suse.com/security/cve/CVE-2020-0181/" source="CVE"/>
		<reference ref_id="CVE-2020-0198" ref_url="https://www.suse.com/security/cve/CVE-2020-0198/" source="CVE"/>
		<reference ref_id="CVE-2020-0452" ref_url="https://www.suse.com/security/cve/CVE-2020-0452/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010691.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2020-0181: Fixed an integer overflow that could lead to denial of service
  (bsc#1172802).
- CVE-2020-0198: Fixed and unsigned integer overflow that could lead to denial
  of service (bsc#1172768).
- CVE-2020-0452: Fixed a buffer overflow check that could be optimized away
  by the compiler (bsc#1178479).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172768">SUSE bug 1172768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172802">SUSE bug 1172802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178479">SUSE bug 1178479</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0181/">CVE-2020-0181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0181">CVE-2020-0181 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0198/">CVE-2020-0198 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0198">CVE-2020-0198 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0452/">CVE-2020-0452 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0452">CVE-2020-0452 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677725" comment="libexif12-0.6.22-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677726" comment="libexif12-32bit-0.6.22-8.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150451" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196488" ref_url="https://bugzilla.suse.com/1196488" source="BUGZILLA"/>
		<reference ref_id="1196761" ref_url="https://bugzilla.suse.com/1196761" source="BUGZILLA"/>
		<reference ref_id="1196830" ref_url="https://bugzilla.suse.com/1196830" source="BUGZILLA"/>
		<reference ref_id="1196836" ref_url="https://bugzilla.suse.com/1196836" source="BUGZILLA"/>
		<reference ref_id="1197227" ref_url="https://bugzilla.suse.com/1197227" source="BUGZILLA"/>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1197366" ref_url="https://bugzilla.suse.com/1197366" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868/" source="CVE"/>
		<reference ref_id="CVE-2022-0850" ref_url="https://www.suse.com/security/cve/CVE-2022-0850/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-23036" ref_url="https://www.suse.com/security/cve/CVE-2022-23036/" source="CVE"/>
		<reference ref_id="CVE-2022-23037" ref_url="https://www.suse.com/security/cve/CVE-2022-23037/" source="CVE"/>
		<reference ref_id="CVE-2022-23038" ref_url="https://www.suse.com/security/cve/CVE-2022-23038/" source="CVE"/>
		<reference ref_id="CVE-2022-23039" ref_url="https://www.suse.com/security/cve/CVE-2022-23039/" source="CVE"/>
		<reference ref_id="CVE-2022-23040" ref_url="https://www.suse.com/security/cve/CVE-2022-23040/" source="CVE"/>
		<reference ref_id="CVE-2022-23041" ref_url="https://www.suse.com/security/cve/CVE-2022-23041/" source="CVE"/>
		<reference ref_id="CVE-2022-23042" ref_url="https://www.suse.com/security/cve/CVE-2022-23042/" source="CVE"/>
		<reference ref_id="CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490/" source="CVE"/>
		<reference ref_id="CVE-2022-26966" ref_url="https://www.suse.com/security/cve/CVE-2022-26966/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated.

The following security bugs were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331)
- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)
- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device. (bsc#1196836)
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)

The following non-security bugs were fixed:

- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018).
- clocksource: Initialize cs-&gt;wd_list (git-fixes)
- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).
- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).
- net: usb: ax88179_178a: fix packet alignment padding (bsc#1196018).
- sched/autogroup: Fix possible Spectre-v1 indexing for (git-fixes)
- sr9700: sanity check for packet length (bsc#1196836).
- usb: host: xen-hcd: add missing unlock in error path (git-fixes).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196488">SUSE bug 1196488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196761">SUSE bug 1196761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196830">SUSE bug 1196830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196836">SUSE bug 1196836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197227">SUSE bug 1197227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197366">SUSE bug 1197366</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45868">CVE-2021-45868 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0850/">CVE-2022-0850 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0850">CVE-2022-0850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23036/">CVE-2022-23036 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23036">CVE-2022-23036 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23037/">CVE-2022-23037 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23037">CVE-2022-23037 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23038/">CVE-2022-23038 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23038">CVE-2022-23038 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23039/">CVE-2022-23039 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23039">CVE-2022-23039 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23040/">CVE-2022-23040 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23040">CVE-2022-23040 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23041/">CVE-2022-23041 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23041">CVE-2022-23041 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23042/">CVE-2022-23042 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23042">CVE-2022-23042 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26490">CVE-2022-26490 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26966/">CVE-2022-26966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26966">CVE-2022-26966 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680620" comment="kernel-default-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680621" comment="kernel-default-base-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680622" comment="kernel-default-devel-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679284" comment="kernel-default-kgraft-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679317" comment="kernel-default-man-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679285" comment="kernel-devel-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679286" comment="kernel-macros-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679287" comment="kernel-source-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680623" comment="kernel-syms-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679289" comment="kgraft-patch-4_4_180-94_161-default-1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150452" version="1" class="patch">
	<metadata>
		<title>Security update for gzip (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010766.html" source="SUSE-SU"/>
		<description>
This update for gzip fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680624" comment="gzip-1.6-9.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150453" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1183709" ref_url="https://bugzilla.suse.com/1183709" source="BUGZILLA"/>
		<reference ref_id="1197872" ref_url="https://bugzilla.suse.com/1197872" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3448" ref_url="https://www.suse.com/security/cve/CVE-2021-3448/" source="CVE"/>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010784.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2021-3448: Fixed a potential DNS cache poisoning issue due to a constant
  outgoing port being used when for certain use cases of the --server option
  (bsc#1183709).
- CVE-2022-0934: Fixed an invalid memory access that could lead to remote denial
  of service via crafted packet (bsc#1197872).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183709">SUSE bug 1183709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197872">SUSE bug 1197872</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3448/">CVE-2021-3448 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3448">CVE-2021-3448 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0934">CVE-2022-0934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679563" comment="dnsmasq-2.78-18.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150454" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1196137" ref_url="https://bugzilla.suse.com/1196137" source="BUGZILLA"/>
		<reference ref_id="1198136" ref_url="https://bugzilla.suse.com/1198136" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010789.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- Remove the log4j dependency as it is not used by the tomcat package (bsc#1196137)
    
Security hardening, related to Spring Framework vulnerabilities:    
- Deprecate getResources() and always return null (bsc#1198136).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196137">SUSE bug 1196137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198136">SUSE bug 1198136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679544" comment="javapackages-filesystem-5.3.1-14.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679528" comment="tomcat-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679529" comment="tomcat-admin-webapps-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679530" comment="tomcat-docs-webapp-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679531" comment="tomcat-el-3_0-api-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679532" comment="tomcat-javadoc-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679533" comment="tomcat-jsp-2_3-api-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679534" comment="tomcat-lib-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679535" comment="tomcat-servlet-3_1-api-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679536" comment="tomcat-webapps-8.0.53-29.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150455" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1198234" ref_url="https://bugzilla.suse.com/1198234" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010798.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2022-24765: Fixed a potential command injection via git worktree (bsc#1198234).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198234">SUSE bug 1198234</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24765">CVE-2022-24765 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679994" comment="git-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679996" comment="git-core-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679997" comment="git-cvs-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679998" comment="git-daemon-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680000" comment="git-email-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680001" comment="git-gui-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680002" comment="git-svn-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680003" comment="git-web-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680004" comment="gitk-2.26.2-27.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150456" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1196490" ref_url="https://bugzilla.suse.com/1196490" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010799.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-23308: Fixed use-after-free of ID and IDREF attributes. (bsc#1196490)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680090" comment="libxml2-2-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680091" comment="libxml2-2-32bit-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679984" comment="libxml2-doc-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680092" comment="libxml2-tools-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680093" comment="python-libxml2-2.9.4-46.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150457" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010794.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:

- CVE-2020-14409: Fixed an integer overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c. (bsc#1181202)
- CVE-2020-14410: Fixed a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c. (bsc#1181201)
- CVE-2021-33657: Fixed a Heap overflow problem in video/SDL_pixels.c. (bsc#1198001)
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14409">CVE-2020-14409 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14410">CVE-2020-14410 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33657">CVE-2021-33657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679561" comment="libSDL-1_2-0-1.2.15-15.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679562" comment="libSDL-1_2-0-32bit-1.2.15-15.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150458" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1196915" ref_url="https://bugzilla.suse.com/1196915" source="BUGZILLA"/>
		<reference ref_id="1197423" ref_url="https://bugzilla.suse.com/1197423" source="BUGZILLA"/>
		<reference ref_id="1197425" ref_url="https://bugzilla.suse.com/1197425" source="BUGZILLA"/>
		<reference ref_id="1197426" ref_url="https://bugzilla.suse.com/1197426" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26401" ref_url="https://www.suse.com/security/cve/CVE-2021-26401/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-26356" ref_url="https://www.suse.com/security/cve/CVE-2022-26356/" source="CVE"/>
		<reference ref_id="CVE-2022-26357" ref_url="https://www.suse.com/security/cve/CVE-2022-26357/" source="CVE"/>
		<reference ref_id="CVE-2022-26358" ref_url="https://www.suse.com/security/cve/CVE-2022-26358/" source="CVE"/>
		<reference ref_id="CVE-2022-26359" ref_url="https://www.suse.com/security/cve/CVE-2022-26359/" source="CVE"/>
		<reference ref_id="CVE-2022-26360" ref_url="https://www.suse.com/security/cve/CVE-2022-26360/" source="CVE"/>
		<reference ref_id="CVE-2022-26361" ref_url="https://www.suse.com/security/cve/CVE-2022-26361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that
  could cause a denial of service in the host (bsc#1197423).
- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts
  using VT-d IOMMU hardware, which could lead to a denial of service in the host
  (bsc#1197425).
- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory
  corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be
  leveraged by an attacker to cause a denial of service in the host (bsc#1197426).
- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue
  mitigations (bsc#1196915).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-26"/>
	<updated date="2022-04-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196915">SUSE bug 1196915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197423">SUSE bug 1197423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197425">SUSE bug 1197425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26401/">CVE-2021-26401 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26401">CVE-2021-26401 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0002">CVE-2022-0002 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26356/">CVE-2022-26356 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26356">CVE-2022-26356 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26357/">CVE-2022-26357 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26357">CVE-2022-26357 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26358/">CVE-2022-26358 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26358">CVE-2022-26358 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26359/">CVE-2022-26359 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26359">CVE-2022-26359 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26360/">CVE-2022-26360 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26360">CVE-2022-26360 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26361/">CVE-2022-26361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26361">CVE-2022-26361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680580" comment="xen-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680581" comment="xen-doc-html-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680582" comment="xen-libs-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680583" comment="xen-libs-32bit-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680584" comment="xen-tools-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680585" comment="xen-tools-domU-4.9.4_28-3.103.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150459" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194019" ref_url="https://bugzilla.suse.com/1194019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8518" ref_url="https://www.suse.com/security/cve/CVE-2018-8518/" source="CVE"/>
		<reference ref_id="CVE-2018-8523" ref_url="https://www.suse.com/security/cve/CVE-2018-8523/" source="CVE"/>
		<reference ref_id="CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551/" source="CVE"/>
		<reference ref_id="CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558/" source="CVE"/>
		<reference ref_id="CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559/" source="CVE"/>
		<reference ref_id="CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563/" source="CVE"/>
		<reference ref_id="CVE-2019-8674" ref_url="https://www.suse.com/security/cve/CVE-2019-8674/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<reference ref_id="CVE-2019-8707" ref_url="https://www.suse.com/security/cve/CVE-2019-8707/" source="CVE"/>
		<reference ref_id="CVE-2019-8719" ref_url="https://www.suse.com/security/cve/CVE-2019-8719/" source="CVE"/>
		<reference ref_id="CVE-2019-8726" ref_url="https://www.suse.com/security/cve/CVE-2019-8726/" source="CVE"/>
		<reference ref_id="CVE-2019-8733" ref_url="https://www.suse.com/security/cve/CVE-2019-8733/" source="CVE"/>
		<reference ref_id="CVE-2019-8763" ref_url="https://www.suse.com/security/cve/CVE-2019-8763/" source="CVE"/>
		<reference ref_id="CVE-2019-8765" ref_url="https://www.suse.com/security/cve/CVE-2019-8765/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8768" ref_url="https://www.suse.com/security/cve/CVE-2019-8768/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8821" ref_url="https://www.suse.com/security/cve/CVE-2019-8821/" source="CVE"/>
		<reference ref_id="CVE-2019-8822" ref_url="https://www.suse.com/security/cve/CVE-2019-8822/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-3885" ref_url="https://www.suse.com/security/cve/CVE-2020-3885/" source="CVE"/>
		<reference ref_id="CVE-2020-3894" ref_url="https://www.suse.com/security/cve/CVE-2020-3894/" source="CVE"/>
		<reference ref_id="CVE-2020-3895" ref_url="https://www.suse.com/security/cve/CVE-2020-3895/" source="CVE"/>
		<reference ref_id="CVE-2020-3897" ref_url="https://www.suse.com/security/cve/CVE-2020-3897/" source="CVE"/>
		<reference ref_id="CVE-2020-3900" ref_url="https://www.suse.com/security/cve/CVE-2020-3900/" source="CVE"/>
		<reference ref_id="CVE-2020-3901" ref_url="https://www.suse.com/security/cve/CVE-2020-3901/" source="CVE"/>
		<reference ref_id="CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9952" ref_url="https://www.suse.com/security/cve/CVE-2020-9952/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1817" ref_url="https://www.suse.com/security/cve/CVE-2021-1817/" source="CVE"/>
		<reference ref_id="CVE-2021-1820" ref_url="https://www.suse.com/security/cve/CVE-2021-1820/" source="CVE"/>
		<reference ref_id="CVE-2021-1825" ref_url="https://www.suse.com/security/cve/CVE-2021-1825/" source="CVE"/>
		<reference ref_id="CVE-2021-1826" ref_url="https://www.suse.com/security/cve/CVE-2021-1826/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="CVE-2021-30661" ref_url="https://www.suse.com/security/cve/CVE-2021-30661/" source="CVE"/>
		<reference ref_id="CVE-2021-30666" ref_url="https://www.suse.com/security/cve/CVE-2021-30666/" source="CVE"/>
		<reference ref_id="CVE-2021-30682" ref_url="https://www.suse.com/security/cve/CVE-2021-30682/" source="CVE"/>
		<reference ref_id="CVE-2021-30761" ref_url="https://www.suse.com/security/cve/CVE-2021-30761/" source="CVE"/>
		<reference ref_id="CVE-2021-30762" ref_url="https://www.suse.com/security/cve/CVE-2021-30762/" source="CVE"/>
		<reference ref_id="CVE-2021-30809" ref_url="https://www.suse.com/security/cve/CVE-2021-30809/" source="CVE"/>
		<reference ref_id="CVE-2021-30818" ref_url="https://www.suse.com/security/cve/CVE-2021-30818/" source="CVE"/>
		<reference ref_id="CVE-2021-30823" ref_url="https://www.suse.com/security/cve/CVE-2021-30823/" source="CVE"/>
		<reference ref_id="CVE-2021-30836" ref_url="https://www.suse.com/security/cve/CVE-2021-30836/" source="CVE"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30848" ref_url="https://www.suse.com/security/cve/CVE-2021-30848/" source="CVE"/>
		<reference ref_id="CVE-2021-30849" ref_url="https://www.suse.com/security/cve/CVE-2021-30849/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="CVE-2021-30884" ref_url="https://www.suse.com/security/cve/CVE-2021-30884/" source="CVE"/>
		<reference ref_id="CVE-2021-30887" ref_url="https://www.suse.com/security/cve/CVE-2021-30887/" source="CVE"/>
		<reference ref_id="CVE-2021-30888" ref_url="https://www.suse.com/security/cve/CVE-2021-30888/" source="CVE"/>
		<reference ref_id="CVE-2021-30889" ref_url="https://www.suse.com/security/cve/CVE-2021-30889/" source="CVE"/>
		<reference ref_id="CVE-2021-30890" ref_url="https://www.suse.com/security/cve/CVE-2021-30890/" source="CVE"/>
		<reference ref_id="CVE-2021-30897" ref_url="https://www.suse.com/security/cve/CVE-2021-30897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.34.3 (bsc#1194019).
- CVE-2021-30887: Fixed logic issue allowing unexpectedly unenforced Content Security Policy when processing maliciously crafted web content.
- CVE-2021-30890: Fixed logic issue allowing universal cross site scripting when processing maliciously crafted web content.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8518/">CVE-2018-8518 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8518">CVE-2018-8518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8523/">CVE-2018-8523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-8523">CVE-2018-8523 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8551">CVE-2019-8551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8558">CVE-2019-8558 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8559">CVE-2019-8559 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8563">CVE-2019-8563 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8674/">CVE-2019-8674 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8674">CVE-2019-8674 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8681">CVE-2019-8681 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8684">CVE-2019-8684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8687">CVE-2019-8687 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8688">CVE-2019-8688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8689">CVE-2019-8689 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8690">CVE-2019-8690 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8707/">CVE-2019-8707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8707">CVE-2019-8707 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8719/">CVE-2019-8719 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8719">CVE-2019-8719 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8726/">CVE-2019-8726 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8726">CVE-2019-8726 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8733/">CVE-2019-8733 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8733">CVE-2019-8733 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8763/">CVE-2019-8763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8763">CVE-2019-8763 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8765/">CVE-2019-8765 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8765">CVE-2019-8765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8766">CVE-2019-8766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8768/">CVE-2019-8768 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8768">CVE-2019-8768 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8782">CVE-2019-8782 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8808">CVE-2019-8808 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8815">CVE-2019-8815 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8821/">CVE-2019-8821 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8821">CVE-2019-8821 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8822/">CVE-2019-8822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8822">CVE-2019-8822 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10018">CVE-2020-10018 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13753">CVE-2020-13753 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27918">CVE-2020-27918 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29623">CVE-2020-29623 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3885/">CVE-2020-3885 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3885">CVE-2020-3885 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3894/">CVE-2020-3894 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3894">CVE-2020-3894 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3895/">CVE-2020-3895 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3895">CVE-2020-3895 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3897/">CVE-2020-3897 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3897">CVE-2020-3897 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3900/">CVE-2020-3900 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3900">CVE-2020-3900 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3901/">CVE-2020-3901 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3901">CVE-2020-3901 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3902">CVE-2020-3902 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9802">CVE-2020-9802 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9803">CVE-2020-9803 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9805">CVE-2020-9805 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9947">CVE-2020-9947 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9948">CVE-2020-9948 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9951">CVE-2020-9951 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-9952/">CVE-2020-9952 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9952">CVE-2020-9952 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1765">CVE-2021-1765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1788">CVE-2021-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1817/">CVE-2021-1817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1817">CVE-2021-1817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1820/">CVE-2021-1820 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1820">CVE-2021-1820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1825/">CVE-2021-1825 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1825">CVE-2021-1825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1826/">CVE-2021-1826 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1826">CVE-2021-1826 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1844">CVE-2021-1844 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1871">CVE-2021-1871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30661/">CVE-2021-30661 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30661">CVE-2021-30661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30666/">CVE-2021-30666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30666">CVE-2021-30666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30682/">CVE-2021-30682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30682">CVE-2021-30682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30761/">CVE-2021-30761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30761">CVE-2021-30761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30762/">CVE-2021-30762 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30762">CVE-2021-30762 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30809/">CVE-2021-30809 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30809">CVE-2021-30809 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30818/">CVE-2021-30818 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30818">CVE-2021-30818 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30823/">CVE-2021-30823 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30823">CVE-2021-30823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30836/">CVE-2021-30836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30836">CVE-2021-30836 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30846">CVE-2021-30846 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30848/">CVE-2021-30848 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30848">CVE-2021-30848 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30849/">CVE-2021-30849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30849">CVE-2021-30849 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30851">CVE-2021-30851 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30858">CVE-2021-30858 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30884/">CVE-2021-30884 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30884">CVE-2021-30884 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30887/">CVE-2021-30887 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30887">CVE-2021-30887 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30888/">CVE-2021-30888 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30888">CVE-2021-30888 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30889/">CVE-2021-30889 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30889">CVE-2021-30889 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30890/">CVE-2021-30890 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30890">CVE-2021-30890 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30897/">CVE-2021-30897 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30897">CVE-2021-30897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664005" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664006" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664007" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664008" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663978" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664009" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150460" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1197216" ref_url="https://bugzilla.suse.com/1197216" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010844.html" source="SUSE-SU"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2022-27239: Fixed a buffer overflow in the command line ip option (bsc#1197216).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197216">SUSE bug 1197216</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27239">CVE-2022-27239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681236" comment="cifs-utils-6.9-9.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150461" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 43 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1197211" ref_url="https://bugzilla.suse.com/1197211" source="BUGZILLA"/>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39713" ref_url="https://www.suse.com/security/cve/CVE-2021-39713/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010856.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_156 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free (bsc#1197211).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197211">SUSE bug 1197211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39713/">CVE-2021-39713 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39713">CVE-2021-39713 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721292" comment="kernel-default 4.4.180-94.156 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719632" comment="kgraft-patch-4_4_180-94_156-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009680590" comment="kgraft-patch-4_4_180-94_156-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150462" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 42 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1197211" ref_url="https://bugzilla.suse.com/1197211" source="BUGZILLA"/>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39713" ref_url="https://www.suse.com/security/cve/CVE-2021-39713/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010856.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_153 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free (bsc#1197211).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197211">SUSE bug 1197211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39713/">CVE-2021-39713 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39713">CVE-2021-39713 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721293" comment="kernel-default 4.4.180-94.153 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719634" comment="kgraft-patch-4_4_180-94_153-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009680589" comment="kgraft-patch-4_4_180-94_153-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150463" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1197211" ref_url="https://bugzilla.suse.com/1197211" source="BUGZILLA"/>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39713" ref_url="https://www.suse.com/security/cve/CVE-2021-39713/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010856.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_150 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free (bsc#1197211).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197211">SUSE bug 1197211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39713/">CVE-2021-39713 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39713">CVE-2021-39713 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721291" comment="kernel-default 4.4.180-94.150 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719630" comment="kgraft-patch-4_4_180-94_150-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009680588" comment="kgraft-patch-4_4_180-94_150-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150464" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1197211" ref_url="https://bugzilla.suse.com/1197211" source="BUGZILLA"/>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39713" ref_url="https://www.suse.com/security/cve/CVE-2021-39713/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010856.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free (bsc#1197211).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197211">SUSE bug 1197211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39713/">CVE-2021-39713 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39713">CVE-2021-39713 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009680587" comment="kgraft-patch-4_4_180-94_147-default-11-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150465" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1197211" ref_url="https://bugzilla.suse.com/1197211" source="BUGZILLA"/>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39713" ref_url="https://www.suse.com/security/cve/CVE-2021-39713/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010856.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free (bsc#1197211).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197211">SUSE bug 1197211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39713/">CVE-2021-39713 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39713">CVE-2021-39713 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009680586" comment="kgraft-patch-4_4_180-94_144-default-14-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150466" version="1" class="patch">
	<metadata>
		<title>Security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194735" ref_url="https://bugzilla.suse.com/1194735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010044.html" source="SUSE-SU"/>
		<description>
This update for aide fixes the following issues:

- CVE-2021-45417: Fix a bufferoverflow in base64 functions (bsc#1194735)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45417">CVE-2021-45417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664240" comment="aide-0.16-20.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150467" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.1.0 ESR.

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-09"/>
	<updated date="2022-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29981">CVE-2021-29981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29982">CVE-2021-29982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29983">CVE-2021-29983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29987">CVE-2021-29987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29990">CVE-2021-29990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29991">CVE-2021-29991 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38492">CVE-2021-38492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38495">CVE-2021-38495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682646" comment="MozillaFirefox-91.9.0-112.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682632" comment="MozillaFirefox-devel-91.9.0-112.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682647" comment="MozillaFirefox-translations-common-91.9.0-112.104.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150468" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1107294" ref_url="https://bugzilla.suse.com/1107294" source="BUGZILLA"/>
		<reference ref_id="1107296" ref_url="https://bugzilla.suse.com/1107296" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0502" ref_url="https://www.suse.com/security/cve/CVE-2018-0502/" source="CVE"/>
		<reference ref_id="CVE-2018-13259" ref_url="https://www.suse.com/security/cve/CVE-2018-13259/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010048.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2018-0502: Fixed execve call vulnerability to program named on the second line when the beginning of a #! script file was mishandled. (bsc#1107296, bsc#1107294)
- CVE-2018-13259: Fixed execve call vulnerability to program name that is a substring of the intended one. (bsc#1107296, bsc#1107294)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-24"/>
	<updated date="2022-01-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107294">SUSE bug 1107294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107296">SUSE bug 1107296</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0502/">CVE-2018-0502 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0502">CVE-2018-0502 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13259/">CVE-2018-13259 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13259">CVE-2018-13259 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664010" comment="zsh-5.0.5-6.12.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150469" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1197135" ref_url="https://bugzilla.suse.com/1197135" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011206.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25220: Fixed potentially incorrect answers by cached forwarders (bsc#1197135).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197135">SUSE bug 1197135</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25220">CVE-2021-25220 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696423" comment="bind-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696424" comment="bind-chrootenv-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682677" comment="bind-doc-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696425" comment="bind-libs-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696426" comment="bind-libs-32bit-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696427" comment="bind-utils-9.9.9P1-63.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150470" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1195950" ref_url="https://bugzilla.suse.com/1195950" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010991.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes one issue.

The following security issue was fixed:

- CVE-2022-0330: A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allowed a local user to crash the system or escalate their privileges on the system. (bsc#1195950)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-11"/>
	<updated date="2022-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195950">SUSE bug 1195950</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009682627" comment="kgraft-patch-4_4_180-94_144-default-15-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150471" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1195950" ref_url="https://bugzilla.suse.com/1195950" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010991.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes one issue.

The following security issue was fixed:

- CVE-2022-0330: A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allowed a local user to crash the system or escalate their privileges on the system. (bsc#1195950)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-11"/>
	<updated date="2022-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195950">SUSE bug 1195950</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009682628" comment="kgraft-patch-4_4_180-94_147-default-12-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150472" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1195950" ref_url="https://bugzilla.suse.com/1195950" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010991.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_150 fixes one issue.

The following security issue was fixed:

- CVE-2022-0330: A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allowed a local user to crash the system or escalate their privileges on the system. (bsc#1195950)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-11"/>
	<updated date="2022-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195950">SUSE bug 1195950</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721291" comment="kernel-default 4.4.180-94.150 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719630" comment="kgraft-patch-4_4_180-94_150-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009682629" comment="kgraft-patch-4_4_180-94_150-default-8-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150473" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 44 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="1197211" ref_url="https://bugzilla.suse.com/1197211" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-39713" ref_url="https://www.suse.com/security/cve/CVE-2021-39713/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010989.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_161 fixes several issues.

The following security issues were fixed:

- CVE-2022-1011: A use-after-free flaw was found in the FUSE filesystem in the way a user triggers write(). This flaw allowed a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation. (bsc#1197344)
- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free. (bsc#1197211)
- CVE-2021-28688: The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11 (bsc#1182294)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-11"/>
	<updated date="2022-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197211">SUSE bug 1197211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39713/">CVE-2021-39713 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39713">CVE-2021-39713 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721294" comment="kernel-default 4.4.180-94.161 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719636" comment="kgraft-patch-4_4_180-94_161-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009682630" comment="kgraft-patch-4_4_180-94_161-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150474" version="1" class="patch">
	<metadata>
		<title>Security update for e2fsprogs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1198446" ref_url="https://bugzilla.suse.com/1198446" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1304" ref_url="https://www.suse.com/security/cve/CVE-2022-1304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010997.html" source="SUSE-SU"/>
		<description>
This update for e2fsprogs fixes the following issues:

- CVE-2022-1304: Fixed out-of-bounds read/write leading to segmentation fault
  and possibly arbitrary code execution. (bsc#1198446)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-12"/>
	<updated date="2022-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198446">SUSE bug 1198446</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1304/">CVE-2022-1304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">CVE-2022-1304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683230" comment="e2fsprogs-1.42.11-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683231" comment="libcom_err2-1.42.11-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683232" comment="libcom_err2-32bit-1.42.11-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683233" comment="libext2fs2-1.42.11-16.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150475" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188568" ref_url="https://bugzilla.suse.com/1188568" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2432" ref_url="https://www.suse.com/security/cve/CVE-2021-2432/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 5 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2432: Fixed a vulnerability in the omponent JNDI. (bsc#1188568)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-24"/>
	<updated date="2022-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188568">SUSE bug 1188568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-2432/">CVE-2021-2432 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2432">CVE-2021-2432 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41035">CVE-2021-41035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662514" comment="java-1_7_1-ibm-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662487" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662496" comment="java-1_7_1-ibm-devel-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662515" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662490" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.0-38.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150476" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1198383" ref_url="https://bugzilla.suse.com/1198383" source="BUGZILLA"/>
		<reference ref_id="1199240" ref_url="https://bugzilla.suse.com/1199240" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29155" ref_url="https://www.suse.com/security/cve/CVE-2022-29155/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011023.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2022-29155: Fixed SQL injection in back-sql (bsc#1199240).
- Fixed issue with SASL init that crashed slapd at startup under certain conditions (bsc#1198383).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198383">SUSE bug 1198383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199240">SUSE bug 1199240</bugzilla>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29155/">CVE-2022-29155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29155">CVE-2022-29155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683701" comment="libldap-2_4-2-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683702" comment="libldap-2_4-2-32bit-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683703" comment="openldap2-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683704" comment="openldap2-back-meta-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683705" comment="openldap2-client-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682625" comment="openldap2-doc-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683706" comment="openldap2-ppolicy-check-password-1.2-18.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150477" version="1" class="patch">
	<metadata>
		<title>Security update for gzip (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011029.html" source="SUSE-SU"/>
		<description>
This update for gzip fixes the following issues:

- CVE-2022-1271: Add hardening for zgrep. (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683707" comment="gzip-1.6-9.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150478" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="1198290" ref_url="https://bugzilla.suse.com/1198290" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<reference ref_id="CVE-2022-22624" ref_url="https://www.suse.com/security/cve/CVE-2022-22624/" source="CVE"/>
		<reference ref_id="CVE-2022-22628" ref_url="https://www.suse.com/security/cve/CVE-2022-22628/" source="CVE"/>
		<reference ref_id="CVE-2022-22629" ref_url="https://www.suse.com/security/cve/CVE-2022-22629/" source="CVE"/>
		<reference ref_id="CVE-2022-22637" ref_url="https://www.suse.com/security/cve/CVE-2022-22637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011016.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.0 (bsc#1198290):

- CVE-2022-22624: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22628: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22629: Fixed a buffer overflow that may lead to arbitrary code execution.
- CVE-2022-22637: Fixed an unexpected cross-origin behavior due to a logic error.

Missing CVE reference for the update to 2.34.6 (bsc#1196133):

- CVE-2022-22594: Fixed a cross-origin issue in the IndexDB API.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198290">SUSE bug 1198290</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22594">CVE-2022-22594 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22624/">CVE-2022-22624 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22624">CVE-2022-22624 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22628/">CVE-2022-22628 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22628">CVE-2022-22628 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22629/">CVE-2022-22629 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22629">CVE-2022-22629 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22637/">CVE-2022-22637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22637">CVE-2022-22637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681335" comment="libjavascriptcoregtk-4_0-18-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681336" comment="libwebkit2gtk-4_0-37-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681309" comment="libwebkit2gtk3-lang-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681337" comment="typelib-1_0-JavaScriptCore-4_0-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681338" comment="typelib-1_0-WebKit2-4_0-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681314" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681339" comment="webkit2gtk-4_0-injected-bundles-2.36.0-2.96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150479" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1199223" ref_url="https://bugzilla.suse.com/1199223" source="BUGZILLA"/>
		<reference ref_id="1199224" ref_url="https://bugzilla.suse.com/1199224" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27781" ref_url="https://www.suse.com/security/cve/CVE-2022-27781/" source="CVE"/>
		<reference ref_id="CVE-2022-27782" ref_url="https://www.suse.com/security/cve/CVE-2022-27782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011074.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-27781: Fixed CERTINFO never-ending busy-loop (bsc#1199223)
- CVE-2022-27782: Fixed TLS and SSH connection too eager reuse (bsc#1199224)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-18"/>
	<updated date="2022-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199223">SUSE bug 1199223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199224">SUSE bug 1199224</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-27781/">CVE-2022-27781 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27781">CVE-2022-27781 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27782/">CVE-2022-27782 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27782">CVE-2022-27782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684086" comment="curl-7.37.0-37.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684087" comment="libcurl4-7.37.0-37.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684088" comment="libcurl4-32bit-7.37.0-37.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150480" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1198717" ref_url="https://bugzilla.suse.com/1198717" source="BUGZILLA"/>
		<reference ref_id="1199423" ref_url="https://bugzilla.suse.com/1199423" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21151" ref_url="https://www.suse.com/security/cve/CVE-2022-21151/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011092.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220510 release. (bsc#1199423)
Updated to Intel CPU Microcode 20220419 release. (bsc#1198717)

- CVE-2022-21151: Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access (bsc#1199423).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198717">SUSE bug 1198717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199423">SUSE bug 1199423</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21151/">CVE-2022-21151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21151">CVE-2022-21151 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683677" comment="ucode-intel-20220510-13.97.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150481" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1198970" ref_url="https://bugzilla.suse.com/1198970" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909/" source="CVE"/>
		<reference ref_id="CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911/" source="CVE"/>
		<reference ref_id="CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912/" source="CVE"/>
		<reference ref_id="CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914/" source="CVE"/>
		<reference ref_id="CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916/" source="CVE"/>
		<reference ref_id="CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.9.0 ESR (MFSA 2022-17)(bsc#1198970):

- CVE-2022-29914: Fullscreen notification bypass using popups
- CVE-2022-29909: Bypassing permission prompt in nested browsing contexts
- CVE-2022-29916: Leaking browser history with CSS variables
- CVE-2022-29911: iframe Sandbox bypass
- CVE-2022-29912: Reader mode bypassed SameSite cookies
- CVE-2022-29917: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29909">CVE-2022-29909 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29911">CVE-2022-29911 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29912">CVE-2022-29912 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29914">CVE-2022-29914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29916">CVE-2022-29916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29917">CVE-2022-29917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684100" comment="MozillaFirefox-91.9.0-112.108.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684080" comment="MozillaFirefox-devel-91.9.0-112.108.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684101" comment="MozillaFirefox-translations-common-91.9.0-112.108.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150482" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194251" ref_url="https://bugzilla.suse.com/1194251" source="BUGZILLA"/>
		<reference ref_id="1194362" ref_url="https://bugzilla.suse.com/1194362" source="BUGZILLA"/>
		<reference ref_id="1194474" ref_url="https://bugzilla.suse.com/1194474" source="BUGZILLA"/>
		<reference ref_id="1194476" ref_url="https://bugzilla.suse.com/1194476" source="BUGZILLA"/>
		<reference ref_id="1194477" ref_url="https://bugzilla.suse.com/1194477" source="BUGZILLA"/>
		<reference ref_id="1194478" ref_url="https://bugzilla.suse.com/1194478" source="BUGZILLA"/>
		<reference ref_id="1194479" ref_url="https://bugzilla.suse.com/1194479" source="BUGZILLA"/>
		<reference ref_id="1194480" ref_url="https://bugzilla.suse.com/1194480" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2021-45960: Fixed left shift in the storeAtts function in xmlparse.c that can lead to realloc misbehavior (bsc#1194251).
- CVE-2021-46143: Fixed integer overflow in m_groupSize in doProlog (bsc#1194362).
- CVE-2022-22822: Fixed integer overflow in addBinding in xmlparse.c (bsc#1194474).
- CVE-2022-22823: Fixed integer overflow in build_model in xmlparse.c (bsc#1194476).
- CVE-2022-22824: Fixed integer overflow in defineAttribute in xmlparse.c (bsc#1194477).
- CVE-2022-22825: Fixed integer overflow in lookup in xmlparse.c (bsc#1194478).
- CVE-2022-22826: Fixed integer overflow in nextScaffoldPart in xmlparse.c (bsc#1194479).
- CVE-2022-22827: Fixed integer overflow in storeAtts in xmlparse.c (bsc#1194480).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">CVE-2021-45960 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">CVE-2021-46143 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">CVE-2022-22825 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">CVE-2022-22826 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">CVE-2022-22827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664115" comment="expat-2.1.0-21.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664116" comment="libexpat1-2.1.0-21.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664117" comment="libexpat1-32bit-2.1.0-21.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150483" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1199475" ref_url="https://bugzilla.suse.com/1199475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011129.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:
 
- CVE-2022-1552: Confine additional operations within 'security restricted operation' sandboxes (bsc#1199475).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199475">SUSE bug 1199475</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696428" comment="postgresql10-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696429" comment="postgresql10-contrib-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696064" comment="postgresql10-docs-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696430" comment="postgresql10-plperl-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696431" comment="postgresql10-plpython-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696432" comment="postgresql10-pltcl-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696433" comment="postgresql10-server-10.21-4.28.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150484" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1199768" ref_url="https://bugzilla.suse.com/1199768" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1529" ref_url="https://www.suse.com/security/cve/CVE-2022-1529/" source="CVE"/>
		<reference ref_id="CVE-2022-1802" ref_url="https://www.suse.com/security/cve/CVE-2022-1802/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011131.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.9.1 ESR - MFSA 2022-19 (bsc#1199768):

- CVE-2022-1802: Prototype pollution in Top-Level Await implementation
- CVE-2022-1529: Untrusted input used in JavaScript object indexing, leading to prototype pollution
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199768">SUSE bug 1199768</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1529/">CVE-2022-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1529">CVE-2022-1529 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1802/">CVE-2022-1802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1802">CVE-2022-1802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696434" comment="MozillaFirefox-91.9.1-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696275" comment="MozillaFirefox-devel-91.9.1-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696435" comment="MozillaFirefox-translations-common-91.9.1-112.111.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150485" version="1" class="patch">
	<metadata>
		<title>Security update for python-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011137.html" source="SUSE-SU"/>
		<description>
This update for python-requests fixes the following issues:

- CVE-2018-18074: Fixed to prevent the package to send an HTTP Authorization header to an http URI
  upon receiving a same-hostname https-to-http redirect. (bsc#1111622) 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595040" comment="python-requests-2.11.1-6.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150486" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1069689" ref_url="https://bugzilla.suse.com/1069689" source="BUGZILLA"/>
		<reference ref_id="1199132" ref_url="https://bugzilla.suse.com/1199132" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16932" ref_url="https://www.suse.com/security/cve/CVE-2017-16932/" source="CVE"/>
		<reference ref_id="CVE-2022-29824" ref_url="https://www.suse.com/security/cve/CVE-2022-29824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011148.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-29824: Fixed integer overflow leading to out-of-bounds write in buf.c and tree.c (bsc#1199132).
- CVE-2017-16932: Prevent infinite recursion in parameter entities (bsc#1069689).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-24"/>
	<updated date="2022-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1069689">SUSE bug 1069689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199132">SUSE bug 1199132</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16932/">CVE-2017-16932 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16932">CVE-2017-16932 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29824/">CVE-2022-29824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824">CVE-2022-29824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696436" comment="libxml2-2-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696437" comment="libxml2-2-32bit-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696074" comment="libxml2-doc-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696438" comment="libxml2-tools-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696439" comment="python-libxml2-2.9.4-46.54.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150487" version="1" class="patch">
	<metadata>
		<title>Security update for pcre2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1199232" ref_url="https://bugzilla.suse.com/1199232" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1586" ref_url="https://www.suse.com/security/cve/CVE-2022-1586/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011157.html" source="SUSE-SU"/>
		<description>
This update for pcre2 fixes the following issues:

- CVE-2022-1586: Fixed out-of-bounds read via missing Unicode property matching issue in JIT compiled regular expressions (bsc#1199232).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-25"/>
	<updated date="2022-05-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199232">SUSE bug 1199232</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1586/">CVE-2022-1586 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">CVE-2022-1586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696440" comment="libpcre2-16-0-10.34-1.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696441" comment="libpcre2-32-0-10.34-1.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696442" comment="libpcre2-8-0-10.34-1.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696443" comment="libpcre2-posix2-10.34-1.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150488" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1131644" ref_url="https://bugzilla.suse.com/1131644" source="BUGZILLA"/>
		<reference ref_id="1131868" ref_url="https://bugzilla.suse.com/1131868" source="BUGZILLA"/>
		<reference ref_id="1131870" ref_url="https://bugzilla.suse.com/1131870" source="BUGZILLA"/>
		<reference ref_id="1131871" ref_url="https://bugzilla.suse.com/1131871" source="BUGZILLA"/>
		<reference ref_id="1131872" ref_url="https://bugzilla.suse.com/1131872" source="BUGZILLA"/>
		<reference ref_id="1131874" ref_url="https://bugzilla.suse.com/1131874" source="BUGZILLA"/>
		<reference ref_id="1133640" ref_url="https://bugzilla.suse.com/1133640" source="BUGZILLA"/>
		<reference ref_id="1144443" ref_url="https://bugzilla.suse.com/1144443" source="BUGZILLA"/>
		<reference ref_id="1156920" ref_url="https://bugzilla.suse.com/1156920" source="BUGZILLA"/>
		<reference ref_id="1165266" ref_url="https://bugzilla.suse.com/1165266" source="BUGZILLA"/>
		<reference ref_id="1166933" ref_url="https://bugzilla.suse.com/1166933" source="BUGZILLA"/>
		<reference ref_id="1167331" ref_url="https://bugzilla.suse.com/1167331" source="BUGZILLA"/>
		<reference ref_id="1182805" ref_url="https://bugzilla.suse.com/1182805" source="BUGZILLA"/>
		<reference ref_id="1194732" ref_url="https://bugzilla.suse.com/1194732" source="BUGZILLA"/>
		<reference ref_id="1194733" ref_url="https://bugzilla.suse.com/1194733" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8041" ref_url="https://www.suse.com/security/cve/CVE-2015-8041/" source="CVE"/>
		<reference ref_id="CVE-2017-13077" ref_url="https://www.suse.com/security/cve/CVE-2017-13077/" source="CVE"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-13082" ref_url="https://www.suse.com/security/cve/CVE-2017-13082/" source="CVE"/>
		<reference ref_id="CVE-2017-13086" ref_url="https://www.suse.com/security/cve/CVE-2017-13086/" source="CVE"/>
		<reference ref_id="CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087/" source="CVE"/>
		<reference ref_id="CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088/" source="CVE"/>
		<reference ref_id="CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526/" source="CVE"/>
		<reference ref_id="CVE-2019-11555" ref_url="https://www.suse.com/security/cve/CVE-2019-11555/" source="CVE"/>
		<reference ref_id="CVE-2019-13377" ref_url="https://www.suse.com/security/cve/CVE-2019-13377/" source="CVE"/>
		<reference ref_id="CVE-2019-9494" ref_url="https://www.suse.com/security/cve/CVE-2019-9494/" source="CVE"/>
		<reference ref_id="CVE-2019-9495" ref_url="https://www.suse.com/security/cve/CVE-2019-9495/" source="CVE"/>
		<reference ref_id="CVE-2019-9497" ref_url="https://www.suse.com/security/cve/CVE-2019-9497/" source="CVE"/>
		<reference ref_id="CVE-2019-9498" ref_url="https://www.suse.com/security/cve/CVE-2019-9498/" source="CVE"/>
		<reference ref_id="CVE-2019-9499" ref_url="https://www.suse.com/security/cve/CVE-2019-9499/" source="CVE"/>
		<reference ref_id="CVE-2022-23303" ref_url="https://www.suse.com/security/cve/CVE-2022-23303/" source="CVE"/>
		<reference ref_id="CVE-2022-23304" ref_url="https://www.suse.com/security/cve/CVE-2022-23304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2022-23303, CVE-2022-23304: Fixed SAE/EAP-pwd side-channel attacks (bsc#1194732, bsc#1194733)
- CVE-2021-0326: Fixed P2P group information processing vulnerability (bsc#1181777)

- Fix systemd device ready dependencies in wpa_supplicant@.service file. (bsc#1182805)

- Limit P2P_DEVICE name to appropriate ifname size
- Enable SAE support(jsc#SLE-14992).
- Fix wicked wlan (bsc#1156920)
- Change wpa_supplicant.service to ensure wpa_supplicant gets started before
  network. Fix WLAN config on boot with wicked. (bsc#1166933)

- Adjust the service to start after network.target wrt bsc#1165266

Update to 2.9 release:

* SAE changes
  - disable use of groups using Brainpool curves
  - improved protection against side channel attacks
  [https://w1.fi/security/2019-6/]
* EAP-pwd changes
  - disable use of groups using Brainpool curves
  - allow the set of groups to be configured (eap_pwd_groups)
  - improved protection against side channel attacks
  [https://w1.fi/security/2019-6/]
* fixed FT-EAP initial mobility domain association using PMKSA caching
  (disabled by default for backwards compatibility; can be enabled
  with ft_eap_pmksa_caching=1)
* fixed a regression in OpenSSL 1.1+ engine loading
* added validation of RSNE in (Re)Association Response frames
* fixed DPP bootstrapping URI parser of channel list
* extended EAP-SIM/AKA fast re-authentication to allow use with FILS
* extended ca_cert_blob to support PEM format
* improved robustness of P2P Action frame scheduling
* added support for EAP-SIM/AKA using anonymous@realm identity
* fixed Hotspot 2.0 credential selection based on roaming consortium
  to ignore credentials without a specific EAP method
* added experimental support for EAP-TEAP peer (RFC 7170)
* added experimental support for EAP-TLS peer with TLS v1.3
* fixed a regression in WMM parameter configuration for a TDLS peer
* fixed a regression in operation with drivers that offload 802.1X
  4-way handshake
* fixed an ECDH operation corner case with OpenSSL
* SAE changes
  - added support for SAE Password Identifier
  - changed default configuration to enable only groups 19, 20, 21
    (i.e., disable groups 25 and 26) and disable all unsuitable groups
    completely based on REVmd changes
  - do not regenerate PWE unnecessarily when the AP uses the
    anti-clogging token mechanisms
  - fixed some association cases where both SAE and FT-SAE were enabled
    on both the station and the selected AP
  - started to prefer FT-SAE over SAE AKM if both are enabled
  - started to prefer FT-SAE over FT-PSK if both are enabled
  - fixed FT-SAE when SAE PMKSA caching is used
  - reject use of unsuitable groups based on new implementation guidance
    in REVmd (allow only FFC groups with prime &gt;= 3072 bits and ECC
    groups with prime &gt;= 256)
  - minimize timing and memory use differences in PWE derivation
    [https://w1.fi/security/2019-1/] (CVE-2019-9494, bsc#1131868)
* EAP-pwd changes
  - minimize timing and memory use differences in PWE derivation
    [https://w1.fi/security/2019-2/] (CVE-2019-9495, bsc#1131870)
  - verify server scalar/element
    [https://w1.fi/security/2019-4/] (CVE-2019-9497, CVE-2019-9498,
    CVE-2019-9499, bsc#1131874, bsc#1131872, bsc#1131871, bsc#1131644)
  - fix message reassembly issue with unexpected fragment
    [https://w1.fi/security/2019-5/] (CVE-2019-11555, bsc#1133640)
  - enforce rand,mask generation rules more strictly
  - fix a memory leak in PWE derivation
  - disallow ECC groups with a prime under 256 bits (groups 25, 26, and
    27)
  - SAE/EAP-pwd side-channel attack update
    [https://w1.fi/security/2019-6/] (CVE-2019-13377, bsc#1144443)
* fixed CONFIG_IEEE80211R=y (FT) build without CONFIG_FILS=y
* Hotspot 2.0 changes
  - do not indicate release number that is higher than the one
    AP supports
  - added support for release number 3
  - enable PMF automatically for network profiles created from
    credentials
* fixed OWE network profile saving
* fixed DPP network profile saving
* added support for RSN operating channel validation
  (CONFIG_OCV=y and network profile parameter ocv=1)
* added Multi-AP backhaul STA support
* fixed build with LibreSSL
* number of MKA/MACsec fixes and extensions
* extended domain_match and domain_suffix_match to allow list of values
* fixed dNSName matching in domain_match and domain_suffix_match when
  using wolfSSL
* started to prefer FT-EAP-SHA384 over WPA-EAP-SUITE-B-192 AKM if both
  are enabled
* extended nl80211 Connect and external authentication to support
  SAE, FT-SAE, FT-EAP-SHA384
* fixed KEK2 derivation for FILS+FT
* extended client_cert file to allow loading of a chain of PEM
  encoded certificates
* extended beacon reporting functionality
* extended D-Bus interface with number of new properties
* fixed a regression in FT-over-DS with mac80211-based drivers
* OpenSSL: allow systemwide policies to be overridden
* extended driver flags indication for separate 802.1X and PSK
  4-way handshake offload capability
* added support for random P2P Device/Interface Address use
* extended PEAP to derive EMSK to enable use with ERP/FILS
* extended WPS to allow SAE configuration to be added automatically
  for PSK (wps_cred_add_sae=1)
* removed support for the old D-Bus interface (CONFIG_CTRL_IFACE_DBUS)
* extended domain_match and domain_suffix_match to allow list of values
* added a RSN workaround for misbehaving PMF APs that advertise
  IGTK/BIP KeyID using incorrect byte order
* fixed PTK rekeying with FILS and FT
* fixed WPA packet number reuse with replayed messages and key
  reinstallation
  [https://w1.fi/security/2017-1/] (CVE-2017-13077, CVE-2017-13078,
  CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082,
  CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)
* fixed unauthenticated EAPOL-Key decryption in wpa_supplicant
  [https://w1.fi/security/2018-1/] (CVE-2018-14526)
* added support for FILS (IEEE 802.11ai) shared key authentication
* added support for OWE (Opportunistic Wireless Encryption, RFC 8110;
  and transition mode defined by WFA)
* added support for DPP (Wi-Fi Device Provisioning Protocol)
* added support for RSA 3k key case with Suite B 192-bit level
* fixed Suite B PMKSA caching not to update PMKID during each 4-way
  handshake
* fixed EAP-pwd pre-processing with PasswordHashHash
* added EAP-pwd client support for salted passwords
* fixed a regression in TDLS prohibited bit validation
* started to use estimated throughput to avoid undesired signal
  strength based roaming decision
* MACsec/MKA:
  - new macsec_linux driver interface support for the Linux
    kernel macsec module
  - number of fixes and extensions
* added support for external persistent storage of PMKSA cache
  (PMKSA_GET/PMKSA_ADD control interface commands; and
   MESH_PMKSA_GET/MESH_PMKSA_SET for the mesh case)
* fixed mesh channel configuration pri/sec switch case
* added support for beacon report
* large number of other fixes, cleanup, and extensions
* added support for randomizing local address for GAS queries
  (gas_rand_mac_addr parameter)
* fixed EAP-SIM/AKA/AKA' ext auth cases within TLS tunnel
* added option for using random WPS UUID (auto_uuid=1)
* added SHA256-hash support for OCSP certificate matching
* fixed EAP-AKA' to add AT_KDF into Synchronization-Failure
* fixed a regression in RSN pre-authentication candidate selection
* added option to configure allowed group management cipher suites
  (group_mgmt network profile parameter)
* removed all PeerKey functionality
* fixed nl80211 AP and mesh mode configuration regression with
  Linux 4.15 and newer
* added ap_isolate configuration option for AP mode
* added support for nl80211 to offload 4-way handshake into the driver
* added support for using wolfSSL cryptographic library
* SAE
  - added support for configuring SAE password separately of the
    WPA2 PSK/passphrase
  - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection
    for SAE;
    note: this is not backwards compatible, i.e., both the AP and
    station side implementations will need to be update at the same
    time to maintain interoperability
  - added support for Password Identifier
  - fixed FT-SAE PMKID matching
* Hotspot 2.0
  - added support for fetching of Operator Icon Metadata ANQP-element
  - added support for Roaming Consortium Selection element
  - added support for Terms and Conditions
  - added support for OSEN connection in a shared RSN BSS
  - added support for fetching Venue URL information
* added support for using OpenSSL 1.1.1
* FT
  - disabled PMKSA caching with FT since it is not fully functional
  - added support for SHA384 based AKM
  - added support for BIP ciphers BIP-CMAC-256, BIP-GMAC-128,
    BIP-GMAC-256 in addition to previously supported BIP-CMAC-128
  - fixed additional IE inclusion in Reassociation Request frame when
    using FT protocol

- CVE-2015-8041: Using O_WRONLY flag [http://w1.fi/security/2015-5/]		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-26"/>
	<updated date="2022-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131644">SUSE bug 1131644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131868">SUSE bug 1131868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131870">SUSE bug 1131870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131871">SUSE bug 1131871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131872">SUSE bug 1131872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131874">SUSE bug 1131874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133640">SUSE bug 1133640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144443">SUSE bug 1144443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156920">SUSE bug 1156920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165266">SUSE bug 1165266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166933">SUSE bug 1166933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167331">SUSE bug 1167331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182805">SUSE bug 1182805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194732">SUSE bug 1194732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194733">SUSE bug 1194733</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8041/">CVE-2015-8041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8041">CVE-2015-8041 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13077/">CVE-2017-13077 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13077">CVE-2017-13077 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13078">CVE-2017-13078 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13079">CVE-2017-13079 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13081">CVE-2017-13081 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13082/">CVE-2017-13082 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13082">CVE-2017-13082 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13086/">CVE-2017-13086 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13086">CVE-2017-13086 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13087">CVE-2017-13087 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13088">CVE-2017-13088 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14526">CVE-2018-14526 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11555/">CVE-2019-11555 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11555">CVE-2019-11555 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13377/">CVE-2019-13377 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13377">CVE-2019-13377 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9494/">CVE-2019-9494 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9494">CVE-2019-9494 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9495/">CVE-2019-9495 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9495">CVE-2019-9495 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9497/">CVE-2019-9497 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9497">CVE-2019-9497 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9498/">CVE-2019-9498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9498">CVE-2019-9498 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9499/">CVE-2019-9499 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9499">CVE-2019-9499 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23303/">CVE-2022-23303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23303">CVE-2022-23303 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23304/">CVE-2022-23304 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23304">CVE-2022-23304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696444" comment="wpa_supplicant-2.9-15.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150489" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1199475" ref_url="https://bugzilla.suse.com/1199475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011173.html" source="SUSE-SU"/>
		<description>
This update for postgresql14 fixes the following issues:
 
- CVE-2022-1552: Confine additional operations within 'security restricted operation' sandboxes (bsc#1199475).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-27"/>
	<updated date="2022-05-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199475">SUSE bug 1199475</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696445" comment="libecpg6-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696446" comment="libpq5-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696447" comment="libpq5-32bit-14.3-3.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150490" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1198351" ref_url="https://bugzilla.suse.com/1198351" source="BUGZILLA"/>
		<reference ref_id="1199350" ref_url="https://bugzilla.suse.com/1199350" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1270" ref_url="https://www.suse.com/security/cve/CVE-2022-1270/" source="CVE"/>
		<reference ref_id="CVE-2022-28463" ref_url="https://www.suse.com/security/cve/CVE-2022-28463/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011200.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2022-1270: Fixed a memory corruption issue when parsing MIFF files (bsc#1198351).
- CVE-2022-28463: Fixed buffer overflow in coders/cin.c (bsc#1199350).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198351">SUSE bug 1198351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199350">SUSE bug 1199350</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-1270/">CVE-2022-1270 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1270">CVE-2022-1270 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28463/">CVE-2022-28463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28463">CVE-2022-28463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696288" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696289" comment="ImageMagick-config-6-upstream-6.8.8.1-71.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696448" comment="libMagickCore-6_Q16-1-6.8.8.1-71.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696449" comment="libMagickWand-6_Q16-1-6.8.8.1-71.172.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150491" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1191959" ref_url="https://bugzilla.suse.com/1191959" source="BUGZILLA"/>
		<reference ref_id="1192735" ref_url="https://bugzilla.suse.com/1192735" source="BUGZILLA"/>
		<reference ref_id="1192741" ref_url="https://bugzilla.suse.com/1192741" source="BUGZILLA"/>
		<reference ref_id="1193316" ref_url="https://bugzilla.suse.com/1193316" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42096" ref_url="https://www.suse.com/security/cve/CVE-2021-42096/" source="CVE"/>
		<reference ref_id="CVE-2021-43331" ref_url="https://www.suse.com/security/cve/CVE-2021-43331/" source="CVE"/>
		<reference ref_id="CVE-2021-43332" ref_url="https://www.suse.com/security/cve/CVE-2021-43332/" source="CVE"/>
		<reference ref_id="CVE-2021-44227" ref_url="https://www.suse.com/security/cve/CVE-2021-44227/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011201.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2021-44227: Preventing list moderator or list member accessing the admin UI (bsc#1193316).
- CVE-2021-43332: Preventing list moderator from cracking the list admin password encrypted in a CSRF token (bsc#1192741).
- CVE-2021-43331: Fixed XSS in Cgi/options.py (bsc#1192735).
- CVE-2021-42096: Add protection against remote privilege escalation via csrf_token derived from admin password (bsc#1191959).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191959">SUSE bug 1191959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192735">SUSE bug 1192735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192741">SUSE bug 1192741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193316">SUSE bug 1193316</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-42096/">CVE-2021-42096 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42096">CVE-2021-42096 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43331/">CVE-2021-43331 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43331">CVE-2021-43331 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43332/">CVE-2021-43332 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43332">CVE-2021-43332 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-44227/">CVE-2021-44227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44227">CVE-2021-44227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696450" comment="mailman-2.1.17-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150492" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194568" ref_url="https://bugzilla.suse.com/1194568" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4034" ref_url="https://www.suse.com/security/cve/CVE-2021-4034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010074.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-4034: Fixed a local privilege escalation in pkexec (bsc#1194568).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194568">SUSE bug 1194568</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4034/">CVE-2021-4034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4034">CVE-2021-4034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664694" comment="libpolkit0-0.113-5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664695" comment="polkit-0.113-5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664696" comment="typelib-1_0-Polkit-1_0-0.113-5.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150493" version="1" class="patch">
	<metadata>
		<title>Security update for librelp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1086730" ref_url="https://bugzilla.suse.com/1086730" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000140" ref_url="https://www.suse.com/security/cve/CVE-2018-1000140/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011210.html" source="SUSE-SU"/>
		<description>
This update for librelp fixes the following issues:

- CVE-2018-1000140: Fixed remote attack via specially crafted x509 certificates when connecting to rsyslog to trigger a stack buffer overflow and run arbitrary code (bsc#1086730).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086730">SUSE bug 1086730</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000140/">CVE-2018-1000140 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000140">CVE-2018-1000140 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696451" comment="librelp0-1.2.15-3.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150494" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1200027" ref_url="https://bugzilla.suse.com/1200027" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31736" ref_url="https://www.suse.com/security/cve/CVE-2022-31736/" source="CVE"/>
		<reference ref_id="CVE-2022-31737" ref_url="https://www.suse.com/security/cve/CVE-2022-31737/" source="CVE"/>
		<reference ref_id="CVE-2022-31738" ref_url="https://www.suse.com/security/cve/CVE-2022-31738/" source="CVE"/>
		<reference ref_id="CVE-2022-31739" ref_url="https://www.suse.com/security/cve/CVE-2022-31739/" source="CVE"/>
		<reference ref_id="CVE-2022-31740" ref_url="https://www.suse.com/security/cve/CVE-2022-31740/" source="CVE"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="CVE-2022-31742" ref_url="https://www.suse.com/security/cve/CVE-2022-31742/" source="CVE"/>
		<reference ref_id="CVE-2022-31747" ref_url="https://www.suse.com/security/cve/CVE-2022-31747/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011223.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.10.0 ESR (MFSA 2022-21)(bsc#1200027)

- CVE-2022-31736: Cross-Origin resource's length leaked
- CVE-2022-31737: Heap buffer overflow in WebGL
- CVE-2022-31738: Browser window spoof using fullscreen mode
- CVE-2022-31739: Attacker-influenced path traversal when saving downloaded files
- CVE-2022-31740: Register allocation problem in WASM on arm64
- CVE-2022-31741: Uninitialized variable leads to invalid memory read
- CVE-2022-31742: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information
- CVE-2022-31747: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-02"/>
	<updated date="2022-06-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31736/">CVE-2022-31736 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31736">CVE-2022-31736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31737/">CVE-2022-31737 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31737">CVE-2022-31737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31738/">CVE-2022-31738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31738">CVE-2022-31738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31739/">CVE-2022-31739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31739">CVE-2022-31739 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31740/">CVE-2022-31740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31740">CVE-2022-31740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31742/">CVE-2022-31742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31742">CVE-2022-31742 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31747/">CVE-2022-31747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31747">CVE-2022-31747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696452" comment="MozillaFirefox-91.10.0-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696299" comment="MozillaFirefox-devel-91.10.0-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696453" comment="MozillaFirefox-translations-common-91.10.0-112.114.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150495" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1197597" ref_url="https://bugzilla.suse.com/1197597" source="BUGZILLA"/>
		<reference ref_id="1199602" ref_url="https://bugzilla.suse.com/1199602" source="BUGZILLA"/>
		<reference ref_id="1199834" ref_url="https://bugzilla.suse.com/1199834" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011246.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes several issues.

The following security issues were fixed:

- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock (bsc#1197597).
- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199602).
- Add missing module_mutex lock to module notifier for previous live patches (bsc#1199834).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-07"/>
	<updated date="2022-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197597">SUSE bug 1197597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199602">SUSE bug 1199602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199834">SUSE bug 1199834</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009696094" comment="kgraft-patch-4_4_180-94_147-default-13-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150496" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1197597" ref_url="https://bugzilla.suse.com/1197597" source="BUGZILLA"/>
		<reference ref_id="1199602" ref_url="https://bugzilla.suse.com/1199602" source="BUGZILLA"/>
		<reference ref_id="1199834" ref_url="https://bugzilla.suse.com/1199834" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011246.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_150 fixes several issues.

The following security issues were fixed:

- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock (bsc#1197597).
- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199602).
- Add missing module_mutex lock to module notifier for previous live patches (bsc#1199834).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-07"/>
	<updated date="2022-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197597">SUSE bug 1197597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199602">SUSE bug 1199602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199834">SUSE bug 1199834</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721291" comment="kernel-default 4.4.180-94.150 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719630" comment="kgraft-patch-4_4_180-94_150-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009696095" comment="kgraft-patch-4_4_180-94_150-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150497" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 42 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1197597" ref_url="https://bugzilla.suse.com/1197597" source="BUGZILLA"/>
		<reference ref_id="1199602" ref_url="https://bugzilla.suse.com/1199602" source="BUGZILLA"/>
		<reference ref_id="1199834" ref_url="https://bugzilla.suse.com/1199834" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011246.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_153 fixes several issues.

The following security issues were fixed:

- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock (bsc#1197597).
- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199602).
- Add missing module_mutex lock to module notifier for previous live patches (bsc#1199834).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-07"/>
	<updated date="2022-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197597">SUSE bug 1197597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199602">SUSE bug 1199602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199834">SUSE bug 1199834</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721293" comment="kernel-default 4.4.180-94.153 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719634" comment="kgraft-patch-4_4_180-94_153-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009696096" comment="kgraft-patch-4_4_180-94_153-default-5-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150498" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 43 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1197597" ref_url="https://bugzilla.suse.com/1197597" source="BUGZILLA"/>
		<reference ref_id="1199602" ref_url="https://bugzilla.suse.com/1199602" source="BUGZILLA"/>
		<reference ref_id="1199834" ref_url="https://bugzilla.suse.com/1199834" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011246.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_156 fixes several issues.

The following security issues were fixed:

- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock (bsc#1197597).
- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199602).
- Add missing module_mutex lock to module notifier for previous live patches (bsc#1199834).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-07"/>
	<updated date="2022-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197597">SUSE bug 1197597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199602">SUSE bug 1199602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199834">SUSE bug 1199834</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721292" comment="kernel-default 4.4.180-94.156 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719632" comment="kgraft-patch-4_4_180-94_156-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009696097" comment="kgraft-patch-4_4_180-94_156-default-4-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150499" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 44 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1199602" ref_url="https://bugzilla.suse.com/1199602" source="BUGZILLA"/>
		<reference ref_id="1199834" ref_url="https://bugzilla.suse.com/1199834" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011248.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_161 fixes several issues.

The following security issue was fixed:

- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199602).
- Add missing module_mutex lock to module notifier for previous live patches (bsc#1199834).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-07"/>
	<updated date="2022-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199602">SUSE bug 1199602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199834">SUSE bug 1199834</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721294" comment="kernel-default 4.4.180-94.161 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719636" comment="kgraft-patch-4_4_180-94_161-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009696098" comment="kgraft-patch-4_4_180-94_161-default-3-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150500" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194471" ref_url="https://bugzilla.suse.com/1194471" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010084.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194471">SUSE bug 1194471</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45079">CVE-2021-45079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664937" comment="strongswan-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664929" comment="strongswan-doc-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664938" comment="strongswan-hmac-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664939" comment="strongswan-ipsec-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664940" comment="strongswan-libs0-5.1.3-26.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150501" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1200027" ref_url="https://bugzilla.suse.com/1200027" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011255.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.4 (bsc#1200027)

* CVE-2022-31741: Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple.  (bmo#1767590)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-09"/>
	<updated date="2022-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696454" comment="libfreebl3-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696455" comment="libfreebl3-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696456" comment="libfreebl3-hmac-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696457" comment="libfreebl3-hmac-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696458" comment="libsoftokn3-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696459" comment="libsoftokn3-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696460" comment="libsoftokn3-hmac-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696461" comment="libsoftokn3-hmac-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696462" comment="mozilla-nss-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696463" comment="mozilla-nss-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696464" comment="mozilla-nss-certs-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696465" comment="mozilla-nss-certs-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696300" comment="mozilla-nss-devel-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696466" comment="mozilla-nss-sysinit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696467" comment="mozilla-nss-sysinit-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696468" comment="mozilla-nss-tools-3.68.4-58.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150502" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1191184" ref_url="https://bugzilla.suse.com/1191184" source="BUGZILLA"/>
		<reference ref_id="1191185" ref_url="https://bugzilla.suse.com/1191185" source="BUGZILLA"/>
		<reference ref_id="1191186" ref_url="https://bugzilla.suse.com/1191186" source="BUGZILLA"/>
		<reference ref_id="1193282" ref_url="https://bugzilla.suse.com/1193282" source="BUGZILLA"/>
		<reference ref_id="1197948" ref_url="https://bugzilla.suse.com/1197948" source="BUGZILLA"/>
		<reference ref_id="1198460" ref_url="https://bugzilla.suse.com/1198460" source="BUGZILLA"/>
		<reference ref_id="1198493" ref_url="https://bugzilla.suse.com/1198493" source="BUGZILLA"/>
		<reference ref_id="1198496" ref_url="https://bugzilla.suse.com/1198496" source="BUGZILLA"/>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3695" ref_url="https://www.suse.com/security/cve/CVE-2021-3695/" source="CVE"/>
		<reference ref_id="CVE-2021-3696" ref_url="https://www.suse.com/security/cve/CVE-2021-3696/" source="CVE"/>
		<reference ref_id="CVE-2021-3697" ref_url="https://www.suse.com/security/cve/CVE-2021-3697/" source="CVE"/>
		<reference ref_id="CVE-2022-28733" ref_url="https://www.suse.com/security/cve/CVE-2022-28733/" source="CVE"/>
		<reference ref_id="CVE-2022-28734" ref_url="https://www.suse.com/security/cve/CVE-2022-28734/" source="CVE"/>
		<reference ref_id="CVE-2022-28736" ref_url="https://www.suse.com/security/cve/CVE-2022-28736/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011257.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

Security fixes and hardenings for boothole 3 / boothole 2022 (bsc#1198581)

- CVE-2021-3695: Fixed that a crafted PNG grayscale image could lead to out-of-bounds write in heap (bsc#1191184)
- CVE-2021-3696: Fixed that a crafted PNG image could lead to out-of-bound write during huffman table handling (bsc#1191185)
- CVE-2021-3697: Fixed that a crafted JPEG image could lead to buffer underflow write in the heap (bsc#1191186)
- CVE-2022-28733: Fixed fragmentation math in net/ip (bsc#1198460)
- CVE-2022-28734: Fixed an out-of-bound write for split http headers (bsc#1198493)
- CVE-2022-28736: Fixed a use-after-free in chainloader command (bsc#1198496)
- Update SBAT security contact (bsc#1193282)
- Bump grub's SBAT generation to 2

- Use boot disks in OpenFirmware, fixing regression caused when the root LV is completely in the boot LUN (bsc#1197948)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-10"/>
	<updated date="2022-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191184">SUSE bug 1191184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191185">SUSE bug 1191185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191186">SUSE bug 1191186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193282">SUSE bug 1193282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197948">SUSE bug 1197948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198460">SUSE bug 1198460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198493">SUSE bug 1198493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198496">SUSE bug 1198496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3695/">CVE-2021-3695 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3695">CVE-2021-3695 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3696/">CVE-2021-3696 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3696">CVE-2021-3696 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3697/">CVE-2021-3697 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3697">CVE-2021-3697 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28733/">CVE-2022-28733 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28733">CVE-2022-28733 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-28734/">CVE-2022-28734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28734">CVE-2022-28734 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28736/">CVE-2022-28736 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28736">CVE-2022-28736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696469" comment="grub2-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696470" comment="grub2-arm64-efi-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696116" comment="grub2-i386-pc-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696117" comment="grub2-powerpc-ieee1275-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696471" comment="grub2-s390x-emu-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696118" comment="grub2-snapper-plugin-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696119" comment="grub2-systemd-sleep-plugin-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696120" comment="grub2-x86_64-efi-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696121" comment="grub2-x86_64-xen-2.02-137.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150503" version="1" class="patch">
	<metadata>
		<title>Security update for u-boot (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1200363" ref_url="https://bugzilla.suse.com/1200363" source="BUGZILLA"/>
		<reference ref_id="1200364" ref_url="https://bugzilla.suse.com/1200364" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-30552" ref_url="https://www.suse.com/security/cve/CVE-2022-30552/" source="CVE"/>
		<reference ref_id="CVE-2022-30790" ref_url="https://www.suse.com/security/cve/CVE-2022-30790/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011273.html" source="SUSE-SU"/>
		<description>
This update for u-boot fixes the following issues:

- A large buffer overflow could have lead to a denial of service in the IP Packet deframentation code. 
(CVE-2022-30552, bsc#1200363)
- A Hole Descriptor Overwrite could have lead to an arbitrary out of bounds write primitive. 
(CVE-2022-30790, bsc#1200364)

  		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-13"/>
	<updated date="2022-06-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200363">SUSE bug 1200363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200364">SUSE bug 1200364</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-30552/">CVE-2022-30552 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30552">CVE-2022-30552 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30790/">CVE-2022-30790 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30790">CVE-2022-30790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696472" comment="u-boot-rpi3-2016.07-12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696473" comment="u-boot-tools-2016.07-12.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150504" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1055710" ref_url="https://bugzilla.suse.com/1055710" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1084513" ref_url="https://bugzilla.suse.com/1084513" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1126703" ref_url="https://bugzilla.suse.com/1126703" source="BUGZILLA"/>
		<reference ref_id="1158266" ref_url="https://bugzilla.suse.com/1158266" source="BUGZILLA"/>
		<reference ref_id="1173265" ref_url="https://bugzilla.suse.com/1173265" source="BUGZILLA"/>
		<reference ref_id="1182171" ref_url="https://bugzilla.suse.com/1182171" source="BUGZILLA"/>
		<reference ref_id="1183646" ref_url="https://bugzilla.suse.com/1183646" source="BUGZILLA"/>
		<reference ref_id="1183723" ref_url="https://bugzilla.suse.com/1183723" source="BUGZILLA"/>
		<reference ref_id="1187055" ref_url="https://bugzilla.suse.com/1187055" source="BUGZILLA"/>
		<reference ref_id="1191647" ref_url="https://bugzilla.suse.com/1191647" source="BUGZILLA"/>
		<reference ref_id="1195651" ref_url="https://bugzilla.suse.com/1195651" source="BUGZILLA"/>
		<reference ref_id="1196426" ref_url="https://bugzilla.suse.com/1196426" source="BUGZILLA"/>
		<reference ref_id="1197343" ref_url="https://bugzilla.suse.com/1197343" source="BUGZILLA"/>
		<reference ref_id="1198031" ref_url="https://bugzilla.suse.com/1198031" source="BUGZILLA"/>
		<reference ref_id="1198032" ref_url="https://bugzilla.suse.com/1198032" source="BUGZILLA"/>
		<reference ref_id="1198516" ref_url="https://bugzilla.suse.com/1198516" source="BUGZILLA"/>
		<reference ref_id="1198577" ref_url="https://bugzilla.suse.com/1198577" source="BUGZILLA"/>
		<reference ref_id="1198660" ref_url="https://bugzilla.suse.com/1198660" source="BUGZILLA"/>
		<reference ref_id="1198687" ref_url="https://bugzilla.suse.com/1198687" source="BUGZILLA"/>
		<reference ref_id="1198742" ref_url="https://bugzilla.suse.com/1198742" source="BUGZILLA"/>
		<reference ref_id="1198962" ref_url="https://bugzilla.suse.com/1198962" source="BUGZILLA"/>
		<reference ref_id="1198997" ref_url="https://bugzilla.suse.com/1198997" source="BUGZILLA"/>
		<reference ref_id="1199012" ref_url="https://bugzilla.suse.com/1199012" source="BUGZILLA"/>
		<reference ref_id="1199063" ref_url="https://bugzilla.suse.com/1199063" source="BUGZILLA"/>
		<reference ref_id="1199314" ref_url="https://bugzilla.suse.com/1199314" source="BUGZILLA"/>
		<reference ref_id="1199426" ref_url="https://bugzilla.suse.com/1199426" source="BUGZILLA"/>
		<reference ref_id="1199505" ref_url="https://bugzilla.suse.com/1199505" source="BUGZILLA"/>
		<reference ref_id="1199507" ref_url="https://bugzilla.suse.com/1199507" source="BUGZILLA"/>
		<reference ref_id="1199605" ref_url="https://bugzilla.suse.com/1199605" source="BUGZILLA"/>
		<reference ref_id="1199650" ref_url="https://bugzilla.suse.com/1199650" source="BUGZILLA"/>
		<reference ref_id="1199785" ref_url="https://bugzilla.suse.com/1199785" source="BUGZILLA"/>
		<reference ref_id="1200143" ref_url="https://bugzilla.suse.com/1200143" source="BUGZILLA"/>
		<reference ref_id="1200144" ref_url="https://bugzilla.suse.com/1200144" source="BUGZILLA"/>
		<reference ref_id="1200249" ref_url="https://bugzilla.suse.com/1200249" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13695" ref_url="https://www.suse.com/security/cve/CVE-2017-13695/" source="CVE"/>
		<reference ref_id="CVE-2018-20784" ref_url="https://www.suse.com/security/cve/CVE-2018-20784/" source="CVE"/>
		<reference ref_id="CVE-2018-7755" ref_url="https://www.suse.com/security/cve/CVE-2018-7755/" source="CVE"/>
		<reference ref_id="CVE-2019-19377" ref_url="https://www.suse.com/security/cve/CVE-2019-19377/" source="CVE"/>
		<reference ref_id="CVE-2020-10769" ref_url="https://www.suse.com/security/cve/CVE-2020-10769/" source="CVE"/>
		<reference ref_id="CVE-2021-20292" ref_url="https://www.suse.com/security/cve/CVE-2021-20292/" source="CVE"/>
		<reference ref_id="CVE-2021-20321" ref_url="https://www.suse.com/security/cve/CVE-2021-20321/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-33061" ref_url="https://www.suse.com/security/cve/CVE-2021-33061/" source="CVE"/>
		<reference ref_id="CVE-2021-38208" ref_url="https://www.suse.com/security/cve/CVE-2021-38208/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1184" ref_url="https://www.suse.com/security/cve/CVE-2022-1184/" source="CVE"/>
		<reference ref_id="CVE-2022-1353" ref_url="https://www.suse.com/security/cve/CVE-2022-1353/" source="CVE"/>
		<reference ref_id="CVE-2022-1419" ref_url="https://www.suse.com/security/cve/CVE-2022-1419/" source="CVE"/>
		<reference ref_id="CVE-2022-1516" ref_url="https://www.suse.com/security/cve/CVE-2022-1516/" source="CVE"/>
		<reference ref_id="CVE-2022-1652" ref_url="https://www.suse.com/security/cve/CVE-2022-1652/" source="CVE"/>
		<reference ref_id="CVE-2022-1729" ref_url="https://www.suse.com/security/cve/CVE-2022-1729/" source="CVE"/>
		<reference ref_id="CVE-2022-1734" ref_url="https://www.suse.com/security/cve/CVE-2022-1734/" source="CVE"/>
		<reference ref_id="CVE-2022-1974" ref_url="https://www.suse.com/security/cve/CVE-2022-1974/" source="CVE"/>
		<reference ref_id="CVE-2022-1975" ref_url="https://www.suse.com/security/cve/CVE-2022-1975/" source="CVE"/>
		<reference ref_id="CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123/" source="CVE"/>
		<reference ref_id="CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125/" source="CVE"/>
		<reference ref_id="CVE-2022-21127" ref_url="https://www.suse.com/security/cve/CVE-2022-21127/" source="CVE"/>
		<reference ref_id="CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166/" source="CVE"/>
		<reference ref_id="CVE-2022-21180" ref_url="https://www.suse.com/security/cve/CVE-2022-21180/" source="CVE"/>
		<reference ref_id="CVE-2022-21499" ref_url="https://www.suse.com/security/cve/CVE-2022-21499/" source="CVE"/>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to 3.12.31 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-1975: Fixed a bug that allows an attacker to crash the linux kernel by simulating nfc device from user-space. (bsc#1200143)
- CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144)
- CVE-2019-19377: Fixed an user-after-free that could be triggered when an attacker mounts a crafted btrfs filesystem image. (bnc#1158266)
- CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).
- CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)
- CVE-2022-21499: Reinforce the kernel lockdown feature, until now it's been trivial to break out of it with kgdb or kdb. (bsc#1199426)
- CVE-2017-13695: Fixed a bug that caused a stack dump allowing local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted ACPI table. (bnc#1055710)
- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).
- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)
- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).
- CVE-2021-28688: Fixed XSA-365 that includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains (bnc#1183646).
- CVE-2020-10769: Fixed a buffer over-read flaw in the IPsec Cryptographic algorithm's module. This flaw allowed a local attacker with user privileges to cause a denial of service. (bnc#1173265)
- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).
- CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012).
- CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc#1191647).
- CVE-2018-7755: Fixed an issue in the fd_locked_ioctl function in drivers/block/floppy.c. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR (bnc#1084513).
- CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742).
- CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055).
- CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c. (bnc#1198516)
- CVE-2018-20784: Fixed a denial of service (infinite loop in update_blocked_averages) by mishandled leaf cfs_rq in kernel/sched/fair.c (bnc#1126703).
- CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc#1183723).
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel (bnc#1198032).
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bnc#1197343)

The following non-security bugs were fixed:

- btrfs: tree-checker: fix incorrect printk format (bsc#1200249).
- net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651).
- net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651).
- PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314).
- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900 bsc#1198660 ltc#197803).
- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729 bsc#1198660 ltc#197803).
- vmbus: do not return values for uninitalized channels (bsc#1051510 bsc#1198997).
- vt: vt_ioctl: fix race in VT_RESIZEX (bsc#1199785).
- x86/hyperv: Read TSC frequency from a synthetic MSR (bsc#1198962).
- x86/speculation: Fix redundant MDS mitigation message (bsc#1199650).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-14"/>
	<updated date="2022-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055710">SUSE bug 1055710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084513">SUSE bug 1084513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126703">SUSE bug 1126703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158266">SUSE bug 1158266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173265">SUSE bug 1173265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182171">SUSE bug 1182171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183646">SUSE bug 1183646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183723">SUSE bug 1183723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187055">SUSE bug 1187055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191647">SUSE bug 1191647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195651">SUSE bug 1195651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196426">SUSE bug 1196426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197343">SUSE bug 1197343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198031">SUSE bug 1198031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198032">SUSE bug 1198032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198516">SUSE bug 1198516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198577">SUSE bug 1198577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198660">SUSE bug 1198660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198687">SUSE bug 1198687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198742">SUSE bug 1198742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198962">SUSE bug 1198962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198997">SUSE bug 1198997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199012">SUSE bug 1199012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199063">SUSE bug 1199063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199314">SUSE bug 1199314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199426">SUSE bug 1199426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199505">SUSE bug 1199505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199507">SUSE bug 1199507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199605">SUSE bug 1199605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199650">SUSE bug 1199650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199785">SUSE bug 1199785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200143">SUSE bug 1200143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200144">SUSE bug 1200144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200249">SUSE bug 1200249</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13695/">CVE-2017-13695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13695">CVE-2017-13695 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20784/">CVE-2018-20784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20784">CVE-2018-20784 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7755/">CVE-2018-7755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7755">CVE-2018-7755 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19377/">CVE-2019-19377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19377">CVE-2019-19377 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10769/">CVE-2020-10769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10769">CVE-2020-10769 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20292/">CVE-2021-20292 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20292">CVE-2021-20292 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20321/">CVE-2021-20321 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20321">CVE-2021-20321 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33061/">CVE-2021-33061 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33061">CVE-2021-33061 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38208/">CVE-2021-38208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38208">CVE-2021-38208 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1184/">CVE-2022-1184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1184">CVE-2022-1184 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1353/">CVE-2022-1353 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1353">CVE-2022-1353 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1419/">CVE-2022-1419 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1419">CVE-2022-1419 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1516/">CVE-2022-1516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1516">CVE-2022-1516 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1652/">CVE-2022-1652 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1652">CVE-2022-1652 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1729/">CVE-2022-1729 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1729">CVE-2022-1729 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1734/">CVE-2022-1734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1974/">CVE-2022-1974 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1974">CVE-2022-1974 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1975/">CVE-2022-1975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1975">CVE-2022-1975 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123">CVE-2022-21123 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21125">CVE-2022-21125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21127/">CVE-2022-21127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21127">CVE-2022-21127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166">CVE-2022-21166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21180/">CVE-2022-21180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21180">CVE-2022-21180 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21499/">CVE-2022-21499 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21499">CVE-2022-21499 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28388">CVE-2022-28388 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28390">CVE-2022-28390 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696474" comment="kernel-default-4.4.180-94.164.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696475" comment="kernel-default-base-4.4.180-94.164.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696476" comment="kernel-default-devel-4.4.180-94.164.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696125" comment="kernel-default-kgraft-4.4.180-94.164.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696477" comment="kernel-default-man-4.4.180-94.164.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696126" comment="kernel-devel-4.4.180-94.164.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696127" comment="kernel-macros-4.4.180-94.164.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696128" comment="kernel-source-4.4.180-94.164.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696478" comment="kernel-syms-4.4.180-94.164.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696130" comment="kgraft-patch-4_4_180-94_164-default-1-4.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150505" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1199287" ref_url="https://bugzilla.suse.com/1199287" source="BUGZILLA"/>
		<reference ref_id="1200106" ref_url="https://bugzilla.suse.com/1200106" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26700" ref_url="https://www.suse.com/security/cve/CVE-2022-26700/" source="CVE"/>
		<reference ref_id="CVE-2022-26709" ref_url="https://www.suse.com/security/cve/CVE-2022-26709/" source="CVE"/>
		<reference ref_id="CVE-2022-26716" ref_url="https://www.suse.com/security/cve/CVE-2022-26716/" source="CVE"/>
		<reference ref_id="CVE-2022-26717" ref_url="https://www.suse.com/security/cve/CVE-2022-26717/" source="CVE"/>
		<reference ref_id="CVE-2022-26719" ref_url="https://www.suse.com/security/cve/CVE-2022-26719/" source="CVE"/>
		<reference ref_id="CVE-2022-30293" ref_url="https://www.suse.com/security/cve/CVE-2022-30293/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011295.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.3 (bsc#1200106)

- CVE-2022-30293: Fixed heap-based buffer overflow in WebCore::TextureMapperLayer::setContentsLayer (bsc#1199287).
- CVE-2022-26700: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26709: Fixed use after free issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26716: Fixed use after free issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26717: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26719: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-15"/>
	<updated date="2022-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199287">SUSE bug 1199287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200106">SUSE bug 1200106</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26700/">CVE-2022-26700 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26700">CVE-2022-26700 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26709/">CVE-2022-26709 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26709">CVE-2022-26709 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26716/">CVE-2022-26716 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26716">CVE-2022-26716 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26717/">CVE-2022-26717 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26717">CVE-2022-26717 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26719/">CVE-2022-26719 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26719">CVE-2022-26719 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30293/">CVE-2022-30293 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30293">CVE-2022-30293 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696479" comment="libjavascriptcoregtk-4_0-18-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696480" comment="libwebkit2gtk-4_0-37-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696133" comment="libwebkit2gtk3-lang-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696481" comment="typelib-1_0-JavaScriptCore-4_0-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696482" comment="typelib-1_0-WebKit2-4_0-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696302" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696483" comment="webkit2gtk-4_0-injected-bundles-2.36.3-2.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150506" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1199166" ref_url="https://bugzilla.suse.com/1199166" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1292" ref_url="https://www.suse.com/security/cve/CVE-2022-1292/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011296.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:
	  
- CVE-2022-1292: Fixed command injection in c_rehash (bsc#1199166).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-16"/>
	<updated date="2022-06-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199166">SUSE bug 1199166</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1292/">CVE-2022-1292 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696484" comment="libopenssl-devel-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696485" comment="libopenssl1_0_0-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696486" comment="libopenssl1_0_0-32bit-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696487" comment="libopenssl1_0_0-hmac-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696488" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696489" comment="openssl-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696144" comment="openssl-doc-1.0.2j-60.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150507" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1200338" ref_url="https://bugzilla.suse.com/1200338" source="BUGZILLA"/>
		<reference ref_id="1200340" ref_url="https://bugzilla.suse.com/1200340" source="BUGZILLA"/>
		<reference ref_id="1200341" ref_url="https://bugzilla.suse.com/1200341" source="BUGZILLA"/>
		<reference ref_id="1200345" ref_url="https://bugzilla.suse.com/1200345" source="BUGZILLA"/>
		<reference ref_id="1200348" ref_url="https://bugzilla.suse.com/1200348" source="BUGZILLA"/>
		<reference ref_id="1200350" ref_url="https://bugzilla.suse.com/1200350" source="BUGZILLA"/>
		<reference ref_id="1200352" ref_url="https://bugzilla.suse.com/1200352" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26377" ref_url="https://www.suse.com/security/cve/CVE-2022-26377/" source="CVE"/>
		<reference ref_id="CVE-2022-28614" ref_url="https://www.suse.com/security/cve/CVE-2022-28614/" source="CVE"/>
		<reference ref_id="CVE-2022-28615" ref_url="https://www.suse.com/security/cve/CVE-2022-28615/" source="CVE"/>
		<reference ref_id="CVE-2022-29404" ref_url="https://www.suse.com/security/cve/CVE-2022-29404/" source="CVE"/>
		<reference ref_id="CVE-2022-30522" ref_url="https://www.suse.com/security/cve/CVE-2022-30522/" source="CVE"/>
		<reference ref_id="CVE-2022-30556" ref_url="https://www.suse.com/security/cve/CVE-2022-30556/" source="CVE"/>
		<reference ref_id="CVE-2022-31813" ref_url="https://www.suse.com/security/cve/CVE-2022-31813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011297.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-26377: Fixed possible request smuggling in mod_proxy_ajp (bsc#1200338)
- CVE-2022-28614: Fixed read beyond bounds via ap_rwrite() (bsc#1200340)
- CVE-2022-28615: Fixed read beyond bounds in ap_strcmp_match() (bsc#1200341)
- CVE-2022-29404: Fixed denial of service in mod_lua r:parsebody (bsc#1200345)
- CVE-2022-30556: Fixed information disclosure in mod_lua with websockets (bsc#1200350)
- CVE-2022-30522: Fixed mod_sed denial of service (bsc#1200352)
- CVE-2022-31813: Fixed mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism (bsc#1200348)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-16"/>
	<updated date="2022-06-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200338">SUSE bug 1200338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200340">SUSE bug 1200340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200341">SUSE bug 1200341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200345">SUSE bug 1200345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200348">SUSE bug 1200348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200350">SUSE bug 1200350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200352">SUSE bug 1200352</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-26377/">CVE-2022-26377 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26377">CVE-2022-26377 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28614/">CVE-2022-28614 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28614">CVE-2022-28614 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28615/">CVE-2022-28615 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28615">CVE-2022-28615 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29404/">CVE-2022-29404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29404">CVE-2022-29404 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30522/">CVE-2022-30522 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30522">CVE-2022-30522 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30556/">CVE-2022-30556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30556">CVE-2022-30556 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-31813/">CVE-2022-31813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31813">CVE-2022-31813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696490" comment="apache2-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696146" comment="apache2-doc-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696491" comment="apache2-example-pages-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696492" comment="apache2-prefork-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696493" comment="apache2-utils-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696494" comment="apache2-worker-2.4.23-29.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150508" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010124.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2022-23307: Fix deserialization issue by removing the chainsaw sub-package. (bsc#1194844)
- CVE-2022-23305: Fix SQL injection by removing src/main/java/org/apache/log4j/jdbc/JDBCAppender.java. (bsc#1194843)
- CVE-2022-23302: Fix remote code execution by removing src/main/java/org/apache/log4j/net/JMSSink.java. (bsc#1194842)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-27"/>
	<updated date="2022-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23302">CVE-2022-23302 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23305">CVE-2022-23305 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23307">CVE-2022-23307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664687" comment="log4j-1.2.15-126.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150509" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1181223" ref_url="https://bugzilla.suse.com/1181223" source="BUGZILLA"/>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1190462" ref_url="https://bugzilla.suse.com/1190462" source="BUGZILLA"/>
		<reference ref_id="1190535" ref_url="https://bugzilla.suse.com/1190535" source="BUGZILLA"/>
		<reference ref_id="1193600" ref_url="https://bugzilla.suse.com/1193600" source="BUGZILLA"/>
		<reference ref_id="1194873" ref_url="https://bugzilla.suse.com/1194873" source="BUGZILLA"/>
		<reference ref_id="1195726" ref_url="https://bugzilla.suse.com/1195726" source="BUGZILLA"/>
		<reference ref_id="1195727" ref_url="https://bugzilla.suse.com/1195727" source="BUGZILLA"/>
		<reference ref_id="1195728" ref_url="https://bugzilla.suse.com/1195728" source="BUGZILLA"/>
		<reference ref_id="1196338" ref_url="https://bugzilla.suse.com/1196338" source="BUGZILLA"/>
		<reference ref_id="1196704" ref_url="https://bugzilla.suse.com/1196704" source="BUGZILLA"/>
		<reference ref_id="1197507" ref_url="https://bugzilla.suse.com/1197507" source="BUGZILLA"/>
		<reference ref_id="1197689" ref_url="https://bugzilla.suse.com/1197689" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36222" ref_url="https://www.suse.com/security/cve/CVE-2021-36222/" source="CVE"/>
		<reference ref_id="CVE-2021-3711" ref_url="https://www.suse.com/security/cve/CVE-2021-3711/" source="CVE"/>
		<reference ref_id="CVE-2021-39226" ref_url="https://www.suse.com/security/cve/CVE-2021-39226/" source="CVE"/>
		<reference ref_id="CVE-2021-41174" ref_url="https://www.suse.com/security/cve/CVE-2021-41174/" source="CVE"/>
		<reference ref_id="CVE-2021-41244" ref_url="https://www.suse.com/security/cve/CVE-2021-41244/" source="CVE"/>
		<reference ref_id="CVE-2021-43798" ref_url="https://www.suse.com/security/cve/CVE-2021-43798/" source="CVE"/>
		<reference ref_id="CVE-2021-43813" ref_url="https://www.suse.com/security/cve/CVE-2021-43813/" source="CVE"/>
		<reference ref_id="CVE-2021-43815" ref_url="https://www.suse.com/security/cve/CVE-2021-43815/" source="CVE"/>
		<reference ref_id="CVE-2022-21673" ref_url="https://www.suse.com/security/cve/CVE-2022-21673/" source="CVE"/>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<reference ref_id="CVE-2022-21702" ref_url="https://www.suse.com/security/cve/CVE-2022-21702/" source="CVE"/>
		<reference ref_id="CVE-2022-21703" ref_url="https://www.suse.com/security/cve/CVE-2022-21703/" source="CVE"/>
		<reference ref_id="CVE-2022-21713" ref_url="https://www.suse.com/security/cve/CVE-2022-21713/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011316.html" source="SUSE-SU"/>
		<description>
This update fixes the following issues:

golang-github-QubitProducts-exporter_exporter:

- Adapted to build on Enterprise Linux.
- Fix build for RedHat 7
- Require Go &gt;= 1.14 also for CentOS
- Add support for CentOS
- Replace %{?systemd_requires} with %{?systemd_ordering}

golang-github-prometheus-alertmanager:

- CVE-2022-21698: Denial of service using InstrumentHandlerCounter.
  * Update vendor tarball with prometheus/client_golang 1.11.1  (bsc#1196338, jsc#SLE-24077)
- Update required Go version to 1.16
- Update to version 0.23.0:
  * amtool: Detect version drift and warn users (#2672)
  * Add ability to skip TLS verification for amtool (#2663)
  * Fix empty isEqual in amtool. (#2668)
  * Fix main tests (#2670)
  * cli: add new template render command (#2538)
  * OpsGenie: refer to alert instead of incident (#2609)
  * Docs: target_match and source_match are DEPRECATED (#2665)
  * Fix test not waiting for cluster member to be ready
- Added hardening to systemd service(s) (bsc#1181400)

golang-github-prometheus-node_exporter:

- CVE-2022-21698: Denial of service using InstrumentHandlerCounter.
  * Update vendor tarball with prometheus/client_golang 1.11.1
  (bsc#1196338, jsc#SLE-24238, jsc#SLE-24239)
- Update to 1.3.0
  * [CHANGE] Add path label to rapl collector #2146
  * [CHANGE] Exclude filesystems under /run/credentials #2157
  * [CHANGE] Add TCPTimeouts to netstat default filter #2189
  * [FEATURE] Add lnstat collector for metrics from /proc/net/stat/ #1771
  * [FEATURE] Add darwin powersupply collector #1777
  * [FEATURE] Add support for monitoring GPUs on Linux #1998
  * [FEATURE] Add Darwin thermal collector #2032
  * [FEATURE] Add os release collector #2094
  * [FEATURE] Add netdev.address-info collector #2105
  * [FEATURE] Add clocksource metrics to time collector #2197
  * [ENHANCEMENT] Support glob textfile collector directories #1985
  * [ENHANCEMENT] ethtool: Expose node_ethtool_info metric #2080
  * [ENHANCEMENT] Use include/exclude flags for ethtool filtering #2165
  * [ENHANCEMENT] Add flag to disable guest CPU metrics #2123
  * [ENHANCEMENT] Add DMI collector #2131
  * [ENHANCEMENT] Add threads metrics to processes collector #2164
  * [ENHANCMMENT] Reduce timer GC delays in the Linux filesystem collector #2169
  * [ENHANCMMENT] Add TCPTimeouts to netstat default filter #2189
  * [ENHANCMMENT] Use SysctlTimeval for boottime collector on BSD #2208
  * [BUGFIX] ethtool: Sanitize metric names #2093
  * [BUGFIX] Fix ethtool collector for multiple interfaces #2126
  * [BUGFIX] Fix possible panic on macOS #2133
  * [BUGFIX] Collect flag_info and bug_info only for one core #2156
  * [BUGFIX] Prevent duplicate ethtool metric names #2187
- Update to 1.2.2
  * Bug fixes
     Fix processes collector long int parsing #2112
- Update to 1.2.1
  * Removed
     Remove obsolete capture permission denied error patch that is already included upstream
     Fix zoneinfo parsing prometheus/procfs#386
     Fix nvme collector log noise #2091
     Fix rapl collector log noise #2092
- Update to 1.2.0
  * Changes
     Rename filesystem collector flags to match other collectors #2012
     Make node_exporter print usage to STDOUT #203
  * Features
     Add conntrack statistics metrics #1155
     Add ethtool stats collector #1832
     Add flag to ignore network speed if it is unknown #1989
     Add tapestats collector for Linux #2044
     Add nvme collector #2062
  * Enhancements
     Add ErrorLog plumbing to promhttp #1887
     Add more Infiniband counters #2019
     netclass: retrieve interface names and filter before parsing #2033
     Add time zone offset metric #2060
     Handle errors from disabled PSI subsystem #1983
     Fix panic when using backwards compatible flags #2000
     Fix wrong value for OpenBSD memory buffer cache #2015
     Only initiate collectors once #2048
     Handle small backwards jumps in CPU idle #2067
- Apply patch to capture permission denied error for 'energy_uj' file (bsc#1190535)

grafana:

- Update to version 8.3.5 (jsc#SLE-23439, jsc#SLE-23422)
  + Security:
    * Fixes XSS vulnerability in handling data sources
      (bsc#1195726, CVE-2022-21702)
    * Fixes cross-origin request forgery vulnerability
      (bsc#1195727, CVE-2022-21703)
    * Fixes Insecure Direct Object Reference vulnerability in Teams
      API (bsc#1195728, CVE-2022-21713)
- Update to Go 1.17.
- Add build-time dependency on `wire`.
- Update license to GNU Affero General Public License v3.0.
- Update to version 8.3.4
    * GetUserInfo: return an error if no user was found
      (bsc#1194873, CVE-2022-21673)
  + Features and enhancements:
    * Alerting: Allow configuration of non-ready alertmanagers.
    * Alerting: Allow customization of Google chat message.
    * AppPlugins: Support app plugins with only default nav.
    * InfluxDB: query editor: skip fields in metadata queries.
    * Postgres/MySQL/MSSQL: Cancel in-flight SQL query if user
      cancels query in grafana.
    * Prometheus: Forward oauth tokens after prometheus datasource
      migration.
  + Bug fixes:
    * Azure Monitor: Bug fix for variable interpolations in metrics
      dropdowns.
    * Azure Monitor: Improved error messages for variable queries.
    * CloudMonitoring: Fixes broken variable queries that use group
      bys.
    * Configuration: You can now see your expired API keys if you
      have no active ones.
    * Elasticsearch: Fix handling multiple datalinks for a single
      field.
    * Export: Fix error being thrown when exporting dashboards
      using query variables that reference the default datasource.
    * ImportDashboard: Fixes issue with importing dashboard and
      name ending up in uid.
    * Login: Page no longer overflows on mobile.
    * Plugins: Set backend metadata property for core plugins.
    * Prometheus: Fill missing steps with null values.
    * Prometheus: Fix interpolation of $__rate_interval variable.
    * Prometheus: Interpolate variables with curly brackets syntax.
    * Prometheus: Respect the http-method data source setting.
    * Table: Fixes issue with field config applied to wrong fields
      when hiding columns.
    * Toolkit: Fix bug with rootUrls not being properly parsed when
      signing a private plugin.
    * Variables: Fix so data source variables are added to adhoc
      configuration.
  + Plugin development fixes &amp; changes:
    * Toolkit: Revert build config so tslib is bundled with plugins
      to prevent plugins from crashing.
- Update to version 8.3.3:
    * BarChart: Use new data error view component to show actions
      in panel edit.
    * CloudMonitor: Iterate over pageToken for resources.
    * Macaron: Prevent WriteHeader invalid HTTP status code panic.
    * AnnoListPanel: Fix interpolation of variables in tags.
    * CloudWatch: Allow queries to have no dimensions specified.
    * CloudWatch: Fix broken queries for users migrating from
      8.2.4/8.2.5 to 8.3.0.
    * CloudWatch: Make sure MatchExact flag gets the right value.
    * Dashboards: Fix so that empty folders can be deleted from the
      manage dashboards/folders page.
    * InfluxDB: Improve handling of metadata query errors in
      InfluxQL.
    * Loki: Fix adding of ad hoc filters for queries with parser
      and line_format expressions.
    * Prometheus: Fix running of exemplar queries for non-histogram
      metrics.
    * Prometheus: Interpolate template variables in interval.
    * StateTimeline: Fix toolitp not showing when for frames with
      multiple fields.
    * TraceView: Fix virtualized scrolling when trace view is
      opened in right pane in Explore.
    * Variables: Fix repeating panels for on time range changed
      variables.
    * Variables: Fix so queryparam option works for scoped
- Update to version 8.3.2
  + Security: Fixes CVE-2021-43813 and CVE-2021-43815.
- Update to version 8.3.1
  + Security: Fixes CVE-2021-43798.
- Update to version 8.3.0
    * Alerting: Prevent folders from being deleted when they
      contain alerts.
    * Alerting: Show full preview value in tooltip.
    * BarGauge: Limit title width when name is really long.
    * CloudMonitoring: Avoid to escape regexps in filters.
    * CloudWatch: Add support for AWS Metric Insights.
    * TooltipPlugin: Remove other panels' shared tooltip in edit
      panel.
    * Visualizations: Limit y label width to 40% of visualization
      width.
    * Alerting: Clear alerting rule evaluation errors after
      intermittent failures.
    * Alerting: Fix refresh on legacy Alert List panel.
    * Dashboard: Fix queries for panels with non-integer widths.
    * Explore: Fix url update inconsistency.
    * Prometheus: Fix range variables interpolation for time ranges
      smaller than 1 second.
    * ValueMappings: Fixes issue with regex value mapping that only
      sets color.
- Update to version 8.3.0-beta2
  + Breaking changes:
    * Grafana 8 Alerting enabled by default for installations that
      do not use legacy alerting.
    * Keep Last State for 'If execution error or timeout' when
      upgrading to Grafana 8 alerting.
    * Alerting: Create DatasourceError alert if evaluation returns
      error.
    * Alerting: Make Unified Alerting enabled by default for those
      who do not use legacy alerting.
    * Alerting: Support mute timings configuration through the api
      for the embedded alert manager.
    * CloudWatch: Add missing AWS/Events metrics.
    * Docs: Add easier to find deprecation notices to certain data
      sources and to the changelog.
    * Plugins Catalog: Enable install controls based on the
      pluginAdminEnabled flag.
    * Table: Add space between values for the DefaultCell and
      JSONViewCell.
    * Tracing: Make query editors available in dashboard for Tempo
      and Zipkin.
    * AccessControl: Renamed orgs roles, removed fixed:orgs:reader
      introduced in beta1.
    * Azure Monitor: Add trap focus for modals in grafana/ui and
      other small a11y fixes for Azure Monitor.
    * CodeEditor: Prevent suggestions from being clipped.
    * Dashboard: Fix cache timeout persistence.
    * Datasource: Fix stable sort order of query responses.
    * Explore: Fix error in query history when removing last item.
    * Logs: Fix requesting of older logs when flipped order.
    * Prometheus: Fix running of health check query based on access
      mode.
    * TextPanel: Fix suggestions for existing panels.
    * Tracing: Fix incorrect indentations due to reoccurring
      spanIDs.
    * Tracing: Show start time of trace with milliseconds
      precision.
    * Variables: Make renamed or missing variable section
      expandable.
    * Select: Select menus now properly scroll during keyboard
      navigation.
- Update to version 8.3.0-beta1
    * Alerting: Add UI for contact point testing with custom
      annotations and labels.
    * Alerting: Make alert state indicator in panel header work
      with Grafana 8 alerts.
    * Alerting: Option for Discord notifier to use webhook name.
    * Annotations: Deprecate AnnotationsSrv.
    * Auth: Omit all base64 paddings in JWT tokens for the JWT
      auth.
    * Azure Monitor: Clean up fields when editing Metrics.
    * AzureMonitor: Add new starter dashboards.
    * AzureMonitor: Add starter dashboard for app monitoring with
      Application Insights.
    * Barchart/Time series: Allow x axis label.
    * CLI: Improve error handling for installing plugins.
    * CloudMonitoring: Migrate to use backend plugin SDK contracts.
    * CloudWatch Logs: Add retry strategy for hitting max
      concurrent queries.
    * CloudWatch: Add AWS RoboMaker metrics and dimension.
    * CloudWatch: Add AWS Transfer metrics and dimension.
    * Dashboard: replace datasource name with a reference object.
    * Dashboards: Show logs on time series when hovering.
    * Elasticsearch: Add support for Elasticsearch 8.0 (Beta).
    * Elasticsearch: Add time zone setting to Date Histogram
      aggregation.
    * Elasticsearch: Enable full range log volume histogram.
    * Elasticsearch: Full range logs volume.
    * Explore: Allow changing the graph type.
    * Explore: Show ANSI colors when highlighting matched words in
      the logs panel.
    * Graph(old) panel: Listen to events from Time series panel.
    * Import: Load gcom dashboards from URL.
    * LibraryPanels: Improves export and import of library panels
      between orgs.
    * OAuth: Support PKCE.
    * Panel edit: Overrides now highlight correctly when searching.
    * PanelEdit: Display drag indicators on draggable sections.
    * Plugins: Refactor Plugin Management.
    * Prometheus: Add custom query parameters when creating
      PromLink url.
    * Prometheus: Remove limits on metrics, labels, and values in
      Metrics Browser.
    * StateTimeline: Share cursor with rest of the panels.
    * Tempo: Add error details when json upload fails.
    * Tempo: Add filtering for service graph query.
    * Tempo: Add links to nodes in Service Graph pointing to
      Prometheus metrics.
    * Time series/Bar chart panel: Add ability to sort series via
      legend.
    * TimeSeries: Allow multiple axes for the same unit.
    * TraceView: Allow span links defined on dataFrame.
    * Transformations: Support a rows mode in labels to fields.
    * ValueMappings: Don't apply field config defaults to time
      fields.
    * Variables: Only update panels that are impacted by variable
      change.
    * API: Fix dashboard quota limit for imports.
    * Alerting: Fix rule editor issues with Azure Monitor data
      source.
    * Azure monitor: Make sure alert rule editor is not enabled
      when template variables are being used.
    * CloudMonitoring: Fix annotation queries.
    * CodeEditor: Trigger the latest getSuggestions() passed to
      CodeEditor.
    * Dashboard: Remove the current panel from the list of options
      in the Dashboard datasource.
    * Encryption: Fix decrypting secrets in alerting migration.
    * InfluxDB: Fix corner case where index is too large in ALIAS
    * NavBar: Order App plugins alphabetically.
    * NodeGraph: Fix zooming sensitivity on touchpads.
    * Plugins: Add OAuth pass-through logic to api/ds/query
      endpoint.
    * Snapshots: Fix panel inspector for snapshot data.
    * Tempo: Fix basic auth password reset on adding tag.
    * ValueMapping: Fixes issue with regex mappings.
    * grafana/ui: Enable slider marks display.
- Update to version 8.2.7
- Update to version 8.2.6
    * Security: Upgrade Docker base image to Alpine 3.14.3.
    * Security: Upgrade Go to 1.17.2.
    * TimeSeries: Fix fillBelowTo wrongly affecting fills of
      unrelated series.
- Update to version 8.2.5
    * Fix No Data behaviour in Legacy Alerting.
    * Alerting: Fix a bug where the metric in the evaluation string
      was not correctly populated.
    * Alerting: Fix no data behaviour in Legacy Alerting for alert
      rules using the AND operator.
    * CloudMonitoring: Ignore min and max aggregation in MQL
      queries.
    * Dashboards: 'Copy' is no longer added to new dashboard
      titles.
    * DataProxy: Fix overriding response body when response is a
      WebSocket upgrade.
    * Elasticsearch: Use field configured in query editor as field
      for date_histogram aggregations.
    * Explore: Fix running queries without a datasource property
      set.
    * InfluxDB: Fix numeric aliases in queries.
    * Plugins: Ensure consistent plugin settings list response.
    * Tempo: Fix validation of float durations.
    * Tracing: Correct tags for each span are shown.
- Update to version 8.2.4
  + Security: Fixes CVE-2021-41244.
- Update to version 8.2.3
  + Security: Fixes CVE-2021-41174.
- Update to version 8.2.2
    * Annotations: We have improved tag search performance.
    * Application: You can now configure an error-template title.
    * AzureMonitor: We removed a restriction from the resource
      filter query.
    * Packaging: We removed the ProcSubset option in systemd. This
      option prevented Grafana from starting in LXC environments.
    * Prometheus: We removed the autocomplete limit for metrics.
    * Table: We improved the styling of the type icons to make them
      more distinct from column / field name.
    * ValueMappings: You can now use value mapping in stat, gauge,
      bar gauge, and pie chart visualizations.
    * Alerting: Fix panic when Slack's API sends unexpected
      response.
    * Alerting: The Create Alert button now appears on the
      dashboard panel when you are working with a default
      datasource.
    * Explore: We fixed the problem where the Explore log panel
      disappears when an Elasticsearch logs query returns no
      results.
    * Graph: You can now see annotation descriptions on hover.
    * Logs: The system now uses the JSON parser only if the line is
      parsed to an object.
    * Prometheus: We fixed the issue where the system did not reuse
      TCP connections when querying from Grafana alerting.
    * Prometheus: We fixed the problem that resulted in an error
      when a user created a query with a $__interval min step.
    * RowsToFields: We fixed the issue where the system was not
      properly interpreting number values.
    * Scale: We fixed how the system handles NaN percent when data
      min = data max.
    * Table panel: You can now create a filter that includes
      special characters.
- Update to version 8.2.1
    * Dashboard: Fix rendering of repeating panels.
    * Datasources: Fix deletion of data source if plugin is not
      found.
    * Packaging: Remove systemcallfilters sections from systemd
      unit files.
    * Prometheus: Add Headers to HTTP client options.
- Update to version 8.2.0
    * AWS: Updated AWS authentication documentation.
    * Alerting: Added support Alertmanager data source for upstream
      Prometheus AM implementation.
    * Alerting: Allows more characters in label names so
      notifications are sent.
    * Alerting: Get alert rules for a dashboard or a panel using
      /api/v1/rules endpoints.
    * Annotations: Improved rendering performance of event markers.
    * CloudWatch Logs: Skip caching for log queries.
    * Explore: Added an opt-in configuration for Node Graph in
      Jaeger, Zipkin, and Tempo.
    * Packaging: Add stricter systemd unit options.
    * Prometheus: Metrics browser can now handle label values with
    * CodeEditor: Ensure that we trigger the latest onSave callback
      provided to the component.
    * DashboardList/AlertList: Fix for missing All folder value.
    * Plugins: Create a mock icon component to prevent console
      errors.
- Update to version 8.2.0-beta2
    * AccessControl: Document new permissions restricting data
      source access.
    * TimePicker: Add fiscal years and search to time picker.
    * Alerting: Added support for Unified Alerting with Grafana HA.
    * Alerting: Added support for tune rule evaluation using
      configuration options.
    * Alerting: Cleanups alertmanager namespace from key-value
      store when disabling Grafana 8 alerts.
    * Alerting: Remove ngalert feature toggle and introduce two new
      settings for enabling Grafana 8 alerts and disabling them for
      specific organisations.
    * CloudWatch: Introduced new math expression where it is
      necessary to specify the period field.
    * InfluxDB: Added support for $__interval and $__interval_ms in
      Flux queries for alerting.
    * InfluxDB: Flux queries can use more precise start and end
      timestamps with nanosecond-precision.
    * Plugins Catalog: Make the catalog the default way to interact
      with plugins.
    * Prometheus: Removed autocomplete limit for metrics.
    * Alerting: Fixed an issue where the edit page crashes if you
      tried to preview an alert without a condition set.
    * Alerting: Fixed rules migration to keep existing Grafana 8
      alert rules.
    * Alerting: Fixed the silence file content generated during
    * Analytics: Fixed an issue related to interaction event
      propagation in Azure Application Insights.
    * BarGauge: Fixed an issue where the cell color was lit even
      though there was no data.
    * BarGauge: Improved handling of streaming data.
    * CloudMonitoring: Fixed INT64 label unmarshal error.
    * ConfirmModal: Fixes confirm button focus on modal open.
    * Dashboard: Add option to generate short URL for variables
      with values containing spaces.
    * Explore: No longer hides errors containing refId property.
    * Fixed an issue that produced State timeline panel tooltip
      error when data was not in sync.
    * InfluxDB: InfluxQL query editor is set to always use
      resultFormat.
    * Loki: Fixed creating context query for logs with parsed
      labels.
    * PageToolbar: Fixed alignment of titles.
    * Plugins Catalog: Update to the list of available panels after
      an install, update or uninstall.
    * TimeSeries: Fixed an issue where the shared cursor was not
      showing when hovering over in old Graph panel.
    * Variables: Fixed issues related to change of focus or refresh
      pages when pressing enter in a text box variable input.
    * Variables: Panel no longer crash when using the adhoc
      variable in data links.
- Update to version 8.2.0-beta1
    * AccessControl: Introduce new permissions to restrict access
      for reloading provisioning configuration.
    * Alerting: Add UI to edit Cortex/Loki namespace, group names,
      and group evaluation interval.
    * Alerting: Add a Test button to test contact point.
    * Alerting: Allow creating/editing recording rules for Loki and
      Cortex.
    * Alerting: Metrics should have the label org instead of user.
    * Alerting: Sort notification channels by name to make them
      easier to locate.
    * Alerting: Support org level isolation of notification
    * AzureMonitor: Add data links to deep link to Azure Portal
      Azure Resource Graph.
    * AzureMonitor: Add support for annotations from Azure Monitor
      Metrics and Azure Resource Graph services.
    * AzureMonitor: Show error message when subscriptions request
      fails in ConfigEditor.
    * Chore: Update to Golang 1.16.7.
    * CloudWatch Logs: Add link to X-Ray data source for trace IDs
      in logs.
    * CloudWatch Logs: Disable query path using websockets (Live)
      feature.
    * CloudWatch/Logs: Don't group dataframes for non time series
    * Cloudwatch: Migrate queries that use multiple stats to one
      query per stat.
    * Dashboard: Keep live timeseries moving left (v2).
    * Datasources: Introduce response_limit for datasource
      responses.
    * Explore: Add filter by trace or span ID to trace to logs
    * Explore: Download traces as JSON in Explore Inspector.
    * Explore: Reuse Dashboard's QueryRows component.
    * Explore: Support custom display label for derived fields
      buttons for Loki datasource.
    * Grafana UI: Update monaco-related dependencies.
    * Graphite: Deprecate browser access mode.
    * InfluxDB: Improve handling of intervals in alerting.
    * InfluxDB: InfluxQL query editor: Handle unusual characters in
      tag values better.
    * Jaeger: Add ability to upload JSON file for trace data.
    * LibraryElements: Enable specifying UID for new and existing
      library elements.
    * LibraryPanels: Remove library panel icon from the panel
      header so you can no longer tell that a panel is a library
      panel from the dashboard view.
    * Logs panel: Scroll to the bottom on page refresh when sorting
      in ascending order.
    * Loki: Add fuzzy search to label browser.
    * Navigation: Implement active state for items in the Sidemenu.
    * Packaging: Update PID file location from /var/run to /run.
    * Plugins: Add Hide OAuth Forward config option.
    * Postgres/MySQL/MSSQL: Add setting to limit the maximum number
      of rows processed.
    * Prometheus: Add browser access mode deprecation warning.
    * Prometheus: Add interpolation for built-in-time variables to
      backend.
    * Tempo: Add ability to upload trace data in JSON format.
    * TimeSeries/XYChart: Allow grid lines visibility control in
      XYChart and TimeSeries panels.
    * Transformations: Convert field types to time string number or
      boolean.
    * Value mappings: Add regular-expression based value mapping.
    * Zipkin: Add ability to upload trace JSON.
    * Admin: Prevent user from deleting user's current/active
      organization.
    * LibraryPanels: Fix library panel getting saved in the
      dashboard's folder.
    * OAuth: Make generic teams URL and JMES path configurable.
    * QueryEditor: Fix broken copy-paste for mouse middle-click
    * Thresholds: Fix undefined color in 'Add threshold'.
    * Timeseries: Add wide-to-long, and fix multi-frame output.
    * TooltipPlugin: Fix behavior of Shared Crosshair when Tooltip
      is set to All.
    * Grafana UI: Fix TS error property css is missing in type.
- Update to version 8.1.8
- Update to version 8.1.7
    * Alerting: Fix alerts with evaluation interval more than 30
      seconds resolving before notification.
    * Elasticsearch/Prometheus: Fix usage of proper SigV4 service
      namespace.
- Update to version 8.1.6
  + Security: Fixes CVE-2021-39226.
- Update to version 8.1.5
    * BarChart: Fixes panel error that happens on second refresh.
- Update to version 8.1.4
  + Features and enhancements
    * Explore: Ensure logs volume bar colors match legend colors.
    * LDAP: Search all DNs for users.
    * Alerting: Fix notification channel migration.
    * Annotations: Fix blank panels for queries with unknown data
      sources.
    * BarChart: Fix stale values and x axis labels.
    * Graph: Make old graph panel thresholds work even if ngalert
      is enabled.
    * InfluxDB: Fix regex to identify / as separator.
    * LibraryPanels: Fix update issues related to library panels in
      rows.
    * Variables: Fix variables not updating inside a Panel when the
      preceding Row uses 'Repeat For'.
- Update to version 8.1.3
  + Bug fixes
    * Alerting: Fix alert flapping in the internal alertmanager.
    * Alerting: Fix request handler failed to convert dataframe
      'results' to plugins.DataTimeSeriesSlice: input frame is not
      recognized as a time series.
    * Dashboard: Fix UIDs are not preserved when importing/creating
      dashboards thru importing .json file.
    * Dashboard: Forces panel re-render when exiting panel edit.
    * Dashboard: Prevent folder from changing when navigating to
      general settings.
    * Docker: Force use of libcrypto1.1 and libssl1.1 versions to
      fix CVE-2021-3711.
    * Elasticsearch: Fix metric names for alert queries.
    * Elasticsearch: Limit Histogram field parameter to numeric
      values.
    * Elasticsearch: Prevent pipeline aggregations to show up in
      terms order by options.
    * LibraryPanels: Prevent duplicate repeated panels from being
      created.
    * Loki: Fix ad-hoc filter in dashboard when used with parser.
    * Plugins: Track signed files + add warn log for plugin assets
      which are not signed.
    * Postgres/MySQL/MSSQL: Fix region annotations not displayed
      correctly.
    * Prometheus: Fix validate selector in metrics browser.
    * Security: Fix stylesheet injection vulnerability.
    * Security: Fix short URL vulnerability.
- Update to version 8.1.2
    * AzureMonitor: Add support for PostgreSQL and MySQL Flexible
      Servers.
    * Datasource: Change HTTP status code for failed datasource
      health check to 400.
    * Explore: Add span duration to left panel in trace viewer.
    * Plugins: Use file extension allowlist when serving plugin
      assets instead of checking for UNIX executable.
    * Profiling: Add support for binding pprof server to custom
      network interfaces.
    * Search: Make search icon keyboard navigable.
    * Template variables: Keyboard navigation improvements.
    * Tooltip: Display ms within minute time range.
    * Alerting: Fix saving LINE contact point.
    * Annotations: Fix alerting annotation coloring.
    * Annotations: Alert annotations are now visible in the correct
      Panel.
    * Auth: Hide SigV4 config UI and disable middleware when its
      config flag is disabled.
    * Dashboard: Prevent incorrect panel layout by comparing window
      width against theme breakpoints.
    * Explore: Fix showing of full log context.
    * PanelEdit: Fix 'Actual' size by passing the correct panel
      size to Dashboard.
    * Plugins: Fix TLS datasource settings.
    * Variables: Fix issue with empty drop downs on navigation.
    * Variables: Fix URL util converting false into true.
    * Toolkit: Fix matchMedia not found error.
- Update to version 8.1.1
    * CloudWatch Logs: Fix crash when no region is selected.
- Update to version 8.1.0
    * Alerting: Deduplicate receivers during migration.
    * ColorPicker: Display colors as RGBA.
    * Select: Make portalling the menu opt-in, but opt-in
      everywhere.
    * TimeRangePicker: Improve accessibility.
    * Annotations: Correct annotations that are displayed upon page
      refresh.
    * Annotations: Fix Enabled button that disappeared from Grafana
      v8.0.6.
    * Annotations: Fix data source template variable that was not
      available for annotations.
    * AzureMonitor: Fix annotations query editor that does not
      load.
    * Geomap: Fix scale calculations.
    * GraphNG: Fix y-axis autosizing.
    * Live: Display stream rate and fix duplicate channels in list
    * Loki: Update labels in log browser when time range changes in
      dashboard.
    * NGAlert: Send resolve signal to alertmanager on alerting -&gt;
      Normal.
    * PasswordField: Prevent a password from being displayed when
      you click the Enter button.
    * Renderer: Remove debug.log file when Grafana is stopped.
    * Security: Update dependencies to fix CVE-2021-36222.
- Update to version 8.1.0-beta3
    * Alerting: Support label matcher syntax in alert rule list
      filter.
    * IconButton: Put tooltip text as aria-label.
    * Live: Experimental HA with Redis.
    * UI: FileDropzone component.
    * CloudWatch: Add AWS LookoutMetrics.
    * Docker: Fix builds by delaying go mod verify until all
      required files are copied over.
    * Exemplars: Fix disable exemplars only on the query that
      failed.
    * SQL: Fix SQL dataframe resampling (fill mode + time
      intervals).
- Update to version 8.1.0-beta2
    * Alerting: Expand the value string in alert annotations and
    * Auth: Add Azure HTTP authentication middleware.
    * Auth: Auth: Pass user role when using the authentication
      proxy.
    * Gazetteer: Update countries.json file to allow for linking to
      3-letter country codes.
    * Config: Fix Docker builds by correcting formatting in
      sample.ini.
    * Explore: Fix encoding of internal URLs.
- Update to version 8.1.0-beta1
    * Alerting: Add Alertmanager notifications tab.
    * Alerting: Add button to deactivate current Alertmanager
    * Alerting: Add toggle in Loki/Prometheus data source
      configuration to opt out of alerting UI.
    * Alerting: Allow any 'evaluate for' value &gt;=0 in the alert
      rule form.
    * Alerting: Load default configuration from status endpoint, if
      Cortex Alertmanager returns empty user configuration. 
    * Alerting: view to display alert rule and its underlying data.
    * Annotation panel: Release the annotation panel.
    * Annotations: Add typeahead support for tags in built-in
      annotations.
    * AzureMonitor: Add curated dashboards for Azure services.
    * AzureMonitor: Add support for deep links to Microsoft Azure
      portal for Metrics.
    * AzureMonitor: Remove support for different credentials for
      Azure Monitor Logs.
    * AzureMonitor: Support querying any Resource for Logs queries.
    * Elasticsearch: Add frozen indices search support.
    * Elasticsearch: Name fields after template variables values
      instead of their name.
    * Elasticsearch: add rate aggregation.
    * Email: Allow configuration of content types for email
      notifications.
    * Explore: Add more meta information when line limit is hit.
    * Explore: UI improvements to trace view.
    * FieldOverrides: Added support to change display name in an
      override field and have it be matched by a later rule.
    * HTTP Client: Introduce dataproxy_max_idle_connections config
      variable.
    * InfluxDB: InfluxQL: adds tags to timeseries data.
    * InfluxDB: InfluxQL: make measurement search case insensitive.
      Legacy Alerting: Replace simplejson with a struct in webhook
      notification channel.
    * Legend: Updates display name for Last (not null) to just
      Last*.
    * Logs panel: Add option to show common labels.
    * Loki: Add $__range variable.
    * Loki: Add support for 'label_values(log stream selector,
      label)' in templating.
    * Loki: Add support for ad-hoc filtering in dashboard.
    * MySQL Datasource: Add timezone parameter.
    * NodeGraph: Show gradient fields in legend.
    * PanelOptions: Don't mutate panel options/field config object
      when updating.
    * PieChart: Make pie gradient more subtle to match other
      charts.
    * Prometheus: Update PromQL typeahead and highlighting.
    * Prometheus: interpolate variable for step field.
    * Provisioning: Improve validation by validating across all
      dashboard providers.
    * SQL Datasources: Allow multiple string/labels columns with
      time series.
    * Select: Portal select menu to document.body.
    * Team Sync: Add group mapping to support team sync in the
      Generic OAuth provider.
    * Tooltip: Make active series more noticeable.
    * Tracing: Add support to configure trace to logs start and end
      time.
    * Transformations: Skip merge when there is only a single data
      frame.
    * ValueMapping: Added support for mapping text to color,
      boolean values, NaN and Null. Improved UI for value mapping.
    * Visualizations: Dynamically set any config (min, max, unit,
      color, thresholds) from query results.
    * live: Add support to handle origin without a value for the
      port when matching with root_url.
    * Alerting: Handle marshaling Inf values.
    * AzureMonitor: Fix macro resolution for template variables.
    * AzureMonitor: Fix queries with Microsoft.NetApp/../../volumes
      resources.
    * AzureMonitor: Request and concat subsequent resource pages.
    * Bug: Fix parse duration for day.
    * Datasources: Improve error handling for error messages.
    * Explore: Correct the functionality of shift-enter shortcut
      across all uses.
    * Explore: Show all dataFrames in data tab in Inspector.
    * GraphNG: Fix Tooltip mode 'All' for XYChart.
    * Loki: Fix highlight of logs when using filter expressions
      with backticks.
    * Modal: Force modal content to overflow with scroll.
    * Plugins: Ignore symlinked folders when verifying plugin
      signature.
    * Toolkit: Improve error messages when tasks fail.
- Update to version 8.0.7
- Update to version 8.0.6
    * Alerting: Add annotation upon alert state change.
    * Alerting: Allow space in label and annotation names.
    * InfluxDB: Improve legend labels for InfluxDB query results.
    * Alerting: Fix improper alert by changing the handling of
      empty labels.
    * CloudWatch/Logs: Reestablish Cloud Watch alert behavior.
    * Dashboard: Avoid migration breaking on fieldConfig without
      defaults field in folded panel.
    * DashboardList: Fix issue not re-fetching dashboard list after
      variable change.
    * Database: Fix incorrect format of isolation level
      configuration parameter for MySQL.
    * InfluxDB: Correct tag filtering on InfluxDB data.
    * Links: Fix links that caused a full page reload.
    * Live: Fix HTTP error when InfluxDB metrics have an incomplete
      or asymmetrical field set.
    * Postgres/MySQL/MSSQL: Change time field to 'Time' for time
      series queries.
    * Postgres: Fix the handling of a null return value in query
    * Tempo: Show hex strings instead of uints for IDs.
    * TimeSeries: Improve tooltip positioning when tooltip
      overflows.
    * Transformations: Add 'prepare time series' transformer.
- Update to version 8.0.5
    * Cloudwatch Logs: Send error down to client.
    * Folders: Return 409 Conflict status when folder already
      exists.
    * TimeSeries: Do not show series in tooltip if it's hidden in
      the viz.
    * AzureMonitor: Fix issue where resource group name is missing
      on the resource picker button.
    * Chore: Fix AWS auth assuming role with workspace IAM.
    * DashboardQueryRunner: Fixes unrestrained subscriptions being
    * DateFormats: Fix reading correct setting key for
      use_browser_locale.
    * Links: Fix links to other apps outside Grafana when under sub
      path.
    * Snapshots: Fix snapshot absolute time range issue.
    * Table: Fix data link color.
    * Time Series: Fix X-axis time format when tick increment is
      larger than a year.
    * Tooltip Plugin: Prevent tooltip render if field is undefined.
- Update to version 8.0.4
    * Live: Rely on app url for origin check.
    * PieChart: Sort legend descending, update placeholder.
    * TimeSeries panel: Do not reinitialize plot when thresholds
      mode change.
    * Elasticsearch: Allow case sensitive custom options in
      date_histogram interval.
    * Elasticsearch: Restore previous field naming strategy when
      using variables.
    * Explore: Fix import of queries between SQL data sources.
    * InfluxDB: InfluxQL query editor: fix retention policy
      handling.
    * Loki: Send correct time range in template variable queries.
    * TimeSeries: Preserve RegExp series overrides when migrating
      from old graph panel.
- Update to version 8.0.3
    * Alerting: Increase alertmanager_conf column if MySQL.
    * Time series/Bar chart panel: Handle infinite numbers as nulls
      when converting to plot array.
    * TimeSeries: Ensure series overrides that contain color are
      migrated, and migrate the previous fieldConfig when changing
      the panel type.
    * ValueMappings: Improve singlestat value mappings migration.
    * Annotations: Fix annotation line and marker colors.
    * AzureMonitor: Fix KQL template variable queries without
      default workspace.
    * CloudWatch/Logs: Fix missing response data for log queries.
    * LibraryPanels: Fix crash in library panels list when panel
      plugin is not found.
    * LogsPanel: Fix performance drop when moving logs panel in
    * Loki: Parse log levels when ANSI coloring is enabled.
    * MSSQL: Fix issue with hidden queries still being executed.
    * PanelEdit: Display the VisualizationPicker that was not
      displayed if a panel has an unknown panel plugin.
    * Plugins: Fix loading symbolically linked plugins.
    * Prometheus: Fix issue where legend name was replaced with
      name Value in stat and gauge panels.
    * State Timeline: Fix crash when hovering over panel.
- Update to version 8.0.2
    * Datasource: Add support for max_conns_per_host in dataproxy
      settings.
    * Configuration: Fix changing org preferences in FireFox.
    * PieChart: Fix legend dimension limits.
    * Postgres/MySQL/MSSQL: Fix panic in concurrent map writes.
    * Variables: Hide default data source if missing from regex.
- Update to version 8.0.1
    * Alerting/SSE: Fix 'count_non_null' reducer validation.
    * Cloudwatch: Fix duplicated time series.
    * Cloudwatch: Fix missing defaultRegion.
    * Dashboard: Fix Dashboard init failed error on dashboards with
      old singlestat panels in collapsed rows.
    * Datasource: Fix storing timeout option as numeric.
    * Postgres/MySQL/MSSQL: Fix annotation parsing for empty
    * Postgres/MySQL/MSSQL: Numeric/non-string values are now
      returned from query variables.
    * Postgres: Fix an error that was thrown when the annotation
      query did not return any results.
    * StatPanel: Fix an issue with the appearance of the graph when
      switching color mode.
    * Visualizations: Fix an issue in the
      Stat/BarGauge/Gauge/PieChart panels where all values mode
      were showing the same name if they had the same value.
    * Toolkit: Resolve external fonts when Grafana is served from a
      sub path.
- Update to version 8.0.0
    * The following endpoints were deprecated for Grafana v5.0 and
      support for them has now been removed:
      GET /dashboards/db/:slug
      GET /dashboard-solo/db/:slug
      GET /api/dashboard/db/:slug
      DELETE /api/dashboards/db/:slug
    * AzureMonitor: Require default subscription for workspaces()
      template variable query.
    * AzureMonitor: Use resource type display names in the UI.
    * Dashboard: Remove support for loading and deleting dashboard
      by slug.
    * InfluxDB: Deprecate direct browser access in data source.
    * VizLegend: Add a read-only property.
    * AzureMonitor: Fix Azure Resource Graph queries in Azure
      China.
    * Checkbox: Fix vertical layout issue with checkboxes due to
      fixed height.
    * Dashboard: Fix Table view when editing causes the panel data
      to not update.
    * Dashboard: Fix issues where unsaved-changes warning is not
      displayed.
    * Login: Fixes Unauthorized message showing when on login page
      or snapshot page.
    * NodeGraph: Fix sorting markers in grid view.
    * Short URL: Include orgId in generated short URLs.
    * Variables: Support raw values of boolean type.
- Update to version 8.0.0-beta3
    * The default HTTP method for Prometheus data source is now
      POST.
    * API: Support folder UID in dashboards API.
    * Alerting: Add support for configuring avatar URL for the
      Discord notifier.
    * Alerting: Clarify that Threema Gateway Alerts support only
      Basic IDs.
    * Azure: Expose Azure settings to external plugins.
    * AzureMonitor: Deprecate using separate credentials for Azure
      Monitor Logs.
    * AzureMonitor: Display variables in resource picker for Azure
    * AzureMonitor: Hide application insights for data sources not
      using it.
    * AzureMonitor: Support querying subscriptions and resource
      groups in Azure Monitor Logs.
    * AzureMonitor: remove requirement for default subscription.
    * CloudWatch: Add Lambda@Edge Amazon CloudFront metrics.
    * CloudWatch: Add missing AWS AppSync metrics.
    * ConfirmModal: Auto focus delete button.
    * Explore: Add caching for queries that are run from logs
    * Loki: Add formatting for annotations.
    * Loki: Bring back processed bytes as meta information.
    * NodeGraph: Display node graph collapsed by default with trace
      view.
    * Overrides: Include a manual override option to hide something
      from visualization.
    * PieChart: Support row data in pie charts.
    * Prometheus: Update default HTTP method to POST for existing
      data sources.
    * Time series panel: Position tooltip correctly when window is
      scrolled or resized.
    * Admin: Fix infinite loading edit on the profile page.
    * Color: Fix issues with random colors in string and date
    * Dashboard: Fix issue with title or folder change has no
      effect after exiting settings view.
    * DataLinks: Fix an issue __series.name is not working in data
      link.
    * Datasource: Fix dataproxy timeout should always be applied
      for outgoing data source HTTP requests.
    * Elasticsearch: Fix NewClient not passing httpClientProvider
      to client impl.
    * Explore: Fix Browser title not updated on Navigation to
      Explore.
    * GraphNG: Remove fieldName and hideInLegend properties from
      UPlotSeriesBuilder.
    * OAuth: Fix fallback to auto_assign_org_role setting for Azure
      AD OAuth when no role claims exists.
    * PanelChrome: Fix issue with empty panel after adding a non
      data panel and coming back from panel edit.
    * StatPanel: Fix data link tooltip not showing for single
      value.
    * Table: Fix sorting for number fields.
    * Table: Have text underline for datalink, and add support for
      image datalink.
    * Transformations: Prevent FilterByValue transform from
      crashing panel edit.
- Update to version 8.0.0-beta2
    * AppPlugins: Expose react-router to apps.
    * AzureMonitor: Add Azure Resource Graph.
    * AzureMonitor: Managed Identity configuration UI.
    * AzureMonitor: Token provider with support for Managed
      Identities.
    * AzureMonitor: Update Logs workspace() template variable query
      to return resource URIs.
    * BarChart: Value label sizing.
    * CloudMonitoring: Add support for preprocessing.
    * CloudWatch: Add AWS/EFS StorageBytes metric.
    * CloudWatch: Allow use of missing AWS namespaces using custom
    * Datasource: Shared HTTP client provider for core backend data
      sources and any data source using the data source proxy.
    * InfluxDB: InfluxQL: allow empty tag values in the query
      editor.
    * Instrumentation: Instrument incoming HTTP request with
      histograms by default.
    * Library Panels: Add name endpoint &amp; unique name validation to
      AddLibraryPanelModal.
    * Logs panel: Support details view.
    * PieChart: Always show the calculation options dropdown in the
    * PieChart: Remove beta flag.
    * Plugins: Enforce signing for all plugins.
    * Plugins: Remove support for deprecated backend plugin
      protocol version.
    * Tempo/Jaeger: Add better display name to legend.
    * Timeline: Add time range zoom.
    * Timeline: Adds opacity &amp; line width option.
    * Timeline: Value text alignment option.
    * ValueMappings: Add duplicate action, and disable dismiss on
      backdrop click.
    * Zipkin: Add node graph view to trace response.
    * Annotations panel: Remove subpath from dashboard links.
    * Content Security Policy: Allow all image sources by default.
    * Content Security Policy: Relax default template wrt. loading
      of scripts, due to nonces not working.
    * Datasource: Fix tracing propagation for alert execution by
      introducing HTTP client outgoing tracing middleware.
    * InfluxDB: InfluxQL always apply time interval end.
    * Library Panels: Fixes 'error while loading library panels'.
    * NewsPanel: Fixes rendering issue in Safari.
    * PanelChrome: Fix queries being issued again when scrolling in
      and out of view.
    * Plugins: Fix Azure token provider cache panic and auth param
      nil value.
    * Snapshots: Fix key and deleteKey being ignored when creating
      an external snapshot.
    * Table: Fix issue with cell border not showing with colored
      background cells.
    * Table: Makes tooltip scrollable for long JSON values.
    * TimeSeries: Fix for Connected null values threshold toggle
      during panel editing.
    * Variables: Fixes inconsistent selected states on dashboard
    * Variables: Refreshes all panels even if panel is full screen.
    * QueryField: Remove carriage return character from pasted text.
- Update to version 8.0.0-beta1
  + License update:
    * AGPL License: Update license from Apache 2.0 to the GNU
      Affero General Public License (AGPL).
    * Removes the never refresh option for Query variables.
    * Removes the experimental Tags feature for Variables.
  + Deprecations:
    * The InfoBox &amp; FeatureInfoBox are now deprecated please use
      the Alert component instead with severity info.
    * API: Add org users with pagination.
    * API: Return 404 when deleting nonexistent API key.
    * API: Return query results as JSON rather than base64 encoded
      Arrow.
    * Alerting: Allow sending notification tags to Opsgenie as
      extra properties.
    * Alerts: Replaces all uses of InfoBox &amp; FeatureInfoBox with
      Alert.
    * Auth: Add support for JWT Authentication.
    * AzureMonitor: Add support for
      Microsoft.SignalRService/SignalR metrics.
    * AzureMonitor: Azure settings in Grafana server config.
    * AzureMonitor: Migrate Metrics query editor to React.
    * BarChart panel: enable series toggling via legend.
    * BarChart panel: Adds support for Tooltip in BarChartPanel.
    * PieChart panel: Change look of highlighted pie slices.
    * CloudMonitoring: Migrate config editor from angular to react.
    * CloudWatch: Add Amplify Console metrics and dimensions.
    * CloudWatch: Add missing Redshift metrics to CloudWatch data
    * CloudWatch: Add metrics for managed RabbitMQ service.
    * DashboardList: Enable templating on search tag input.
    * Datasource config: correctly remove single custom http
      header.
    * Elasticsearch: Add generic support for template variables.
    * Elasticsearch: Allow omitting field when metric supports
      inline script.
    * Elasticsearch: Allow setting a custom limit for log queries.
    * Elasticsearch: Guess field type from first non-empty value.
    * Elasticsearch: Use application/x-ndjson content type for
      multisearch requests.
    * Elasticsearch: Use semver strings to identify ES version.
    * Explore: Add logs navigation to request more logs.
    * Explore: Map Graphite queries to Loki.
    * Explore: Scroll split panes in Explore independently.
    * Explore: Wrap each panel in separate error boundary.
    * FieldDisplay: Smarter naming of stat values when visualising
      row values (all values) in stat panels.
    * Graphite: Expand metric names for variables.
    * Graphite: Handle unknown Graphite functions without breaking
      the visual editor.
    * Graphite: Show graphite functions descriptions.
    * Graphite: Support request cancellation properly (Uses new
      backendSrv.fetch Observable request API).
    * InfluxDB: Flux: Improve handling of complex
      response-structures.
    * InfluxDB: Support region annotations.
    * Inspector: Download logs for manual processing.
    * Jaeger: Add node graph view for trace.
    * Jaeger: Search traces.
    * Loki: Use data source settings for alerting queries.
    * NodeGraph: Exploration mode.
    * OAuth: Add support for empty scopes.
    * PanelChrome: New logic-less emotion based component with no
      dependency on PanelModel or DashboardModel.
    * PanelEdit: Adds a table view toggle to quickly view data in
      table form.
    * PanelEdit: Highlight matched words when searching options.
    * PanelEdit: UX improvements.
    * Plugins: PanelRenderer and simplified QueryRunner to be used
      from plugins.
    * Plugins: AuthType in route configuration and params
      interpolation.
    * Plugins: Enable plugin runtime install/uninstall
      capabilities.
    * Plugins: Support set body content in plugin routes.
    * Plugins: Introduce marketplace app.
    * Plugins: Moving the DataSourcePicker to grafana/runtime so it
      can be reused in plugins.
    * Prometheus: Add custom query params for alert and exemplars
    * Prometheus: Use fuzzy string matching to autocomplete metric
      names and label.
    * Routing: Replace Angular routing with react-router.
    * Slack: Use chat.postMessage API by default.
    * Tempo: Search for Traces by querying Loki directly from
      Tempo.
    * Tempo: Show graph view of the trace.
    * Themes: Switch theme without reload using global shortcut.
    * TimeSeries panel: Add support for shared cursor.
    * TimeSeries panel: Do not crash the panel if there is no time
      series data in the response.
    * Variables: Do not save repeated panels, rows and scopedVars.
    * Variables: Removes experimental Tags feature.
    * Variables: Removes the never refresh option.
    * Visualizations: Unify tooltip options across visualizations.
    * Visualizations: Refactor and unify option creation between
      new visualizations.
    * Visualizations: Remove singlestat panel.
    * APIKeys: Fixes issue with adding first api key.
    * Alerting: Add checks for non supported units - disable
      defaulting to seconds.
    * Alerting: Fix issue where Slack notifications won't link to
      user IDs.
    * Alerting: Omit empty message in PagerDuty notifier.
    * AzureMonitor: Fix migration error from older versions of App
      Insights queries.
    * CloudWatch: Fix AWS/Connect dimensions.
    * CloudWatch: Fix broken AWS/MediaTailor dimension name.
    * Dashboards: Allow string manipulation as advanced variable
      format option.
    * DataLinks: Includes harmless extended characters like
      Cyrillic characters.
    * Drawer: Fixes title overflowing its container.
    * Explore: Fix issue when some query errors were not shown.
    * Generic OAuth: Prevent adding duplicated users.
    * Graphite: Handle invalid annotations.
    * Graphite: Fix autocomplete when tags are not available.
    * InfluxDB: Fix Cannot read property 'length' of undefined in
      when parsing response.
    * Instrumentation: Enable tracing when Jaeger host and port are
    * Instrumentation: Prefix metrics with grafana.
    * MSSQL: By default let driver choose port.
    * OAuth: Add optional strict parsing of role_attribute_path.
    * Panel: Fixes description markdown with inline code being
      rendered on newlines and full width.
    * PanelChrome: Ignore data updates &amp; errors for non data
      panels.
    * Permissions: Fix inherited folder permissions can prevent new
      permissions being added to a dashboard.
    * Plugins: Remove pre-existing plugin installs when installing
      with grafana-cli.
    * Plugins: Support installing to folders with whitespace and
      fix pluginUrl trailing and leading whitespace failures.
    * Postgres/MySQL/MSSQL: Don't return connection failure details
      to the client.
    * Postgres: Fix ms precision of interval in time group macro
      when TimescaleDB is enabled.
    * Provisioning: Use dashboard checksum field as change
      indicator.
    * SQL: Fix so that all captured errors are returned from sql
      engine.
    * Shortcuts: Fixes panel shortcuts so they always work.
    * Table: Fixes so border is visible for cells with links.
    * Variables: Clear query when data source type changes.
    * Variables: Filters out builtin variables from unknown list.
    * Button: Introduce buttonStyle prop.
    * DataQueryRequest: Remove deprecated props showingGraph and
      showingTabel and exploreMode.
    * grafana/ui: Update React Hook Form to v7.
    * IconButton: Introduce variant for red and blue icon buttons.
    * Plugins: Expose the getTimeZone function to be able to get
      the current selected timeZone.
    * TagsInput: Add className to TagsInput.
    * VizLegend: Move onSeriesColorChanged to PanelContext
      (breaking change).
- Update to version 7.5.13
    * Alerting: Fix NoDataFound for alert rules using AND operator.

mgr-cfg:

- Version 4.3.6-1
  * Corrected source URL in spec file
  * Fix installation problem for SLE15SP4 due missing python-selinux
  * Fix python selinux package name depending on build target (bsc#1193600)
  * Do not build python 2 package for SLE15SP4 and higher
  * Remove unused legacy code

mgr-custom-info:

- Version 4.3.3-1
  * Remove unused legacy code

mgr-daemon:

- Version 4.3.4-1
  * Corrected source URLs in spec file
  * Update translation strings

mgr-osad:

- Version 4.3.6-1
  * Corrected source URL in spec file.
  * Do not build python 2 package for SLE15SP4 and higher
  * Removed spacewalk-selinux dependencies.
  * Updated source url.

mgr-push:

- Version 4.3.4-1
  * Corrected source URLs in spec file

mgr-virtualization:

- Version 4.3.5-1
  * Corrected source URLs in spec file.
  * Do not build python 2 package for SLE15SP4 and higher

prometheus-blackbox_exporter:

- Enhanced to build on Enterprise Linux 8

prometheus-postgres_exporter:

- Updated for RHEL8.

python-hwdata:

- Require python macros for building

rhnlib:

- Version 4.3.4-1
  * Reorganize python files

spacecmd:

- Version 4.3.11-1
  * on full system update call schedulePackageUpdate API (bsc#1197507)
  * parse boolean paramaters correctly (bsc#1197689)
  * Add parameter to set containerized proxy SSH port
  * Add proxy config generation subcommand
  * Option 'org_createfirst' added to perform initial organization and user creation
  * Added gettext build requirement for RHEL.
  * Removed RHEL 5 references.
  * Include group formulas configuration in spacecmd group_backup and
    spacecmd group_restore. This changes backup format to json,
    previously used plain text is still supported for reading (bsc#1190462)
  * Update translation strings
  * Improved event history listing and added new system_eventdetails 
    command to retrieve the details of an event
  * Make schedule_deletearchived to get all actions without display limit
  * Allow passing a date limit for schedule_deletearchived on spacecmd (bsc#1181223)

spacewalk-client-tools:

- Version 4.3.9-1
  * Corrected source URLs in spec file.
  * do not build python 2 package for SLE15
  * Remove unused legacy code
  * Update translation strings

spacewalk-koan:

- Version 4.3.5-1
  * Corrected source URLs in spec file.

spacewalk-oscap:

- Version 4.3.5-1
  * Corrected source URLs in spec file.
  * Do not build python 2 package for SLE15SP4 and higher

spacewalk-remote-utils:

- Version 4.3.3-1
  * Adapt the package for changes in rhnlib

supportutils-plugin-susemanager-client:

- Version 4.3.2-1
  * Add proxy containers config and logs

suseRegisterInfo:

- Version 4.3.3-1
  * Bump version to 4.3.0

supportutils-plugin-salt:

- Add support for Salt Bundle

uyuni-common-libs:

- Version 4.3.4-1
  * implement more decompression algorithms for reposync (bsc#1196704)
  * Reorganize python files
  * Add decompression of zck files to fileutils

		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-20"/>
	<updated date="2022-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181223">SUSE bug 1181223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190462">SUSE bug 1190462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190535">SUSE bug 1190535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193600">SUSE bug 1193600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194873">SUSE bug 1194873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195726">SUSE bug 1195726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195727">SUSE bug 1195727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195728">SUSE bug 1195728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196338">SUSE bug 1196338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196704">SUSE bug 1196704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197507">SUSE bug 1197507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197689">SUSE bug 1197689</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36222/">CVE-2021-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">CVE-2021-36222 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3711/">CVE-2021-3711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3711">CVE-2021-3711 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-39226/">CVE-2021-39226 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39226">CVE-2021-39226 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-41174/">CVE-2021-41174 at SUSE</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41174">CVE-2021-41174 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41244/">CVE-2021-41244 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41244">CVE-2021-41244 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43798/">CVE-2021-43798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43798">CVE-2021-43798 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43813/">CVE-2021-43813 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43813">CVE-2021-43813 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43815/">CVE-2021-43815 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43815">CVE-2021-43815 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21673/">CVE-2022-21673 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21673">CVE-2022-21673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21698">CVE-2022-21698 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21702/">CVE-2022-21702 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21702">CVE-2022-21702 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21703/">CVE-2022-21703 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21703">CVE-2022-21703 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21713/">CVE-2022-21713 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21713">CVE-2022-21713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696495" comment="golang-github-prometheus-node_exporter-1.3.0-1.15.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150510" version="1" class="patch">
	<metadata>
		<title>Security update for fwupdate (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011330.html" source="SUSE-SU"/>
		<description>

This update of fwupdate fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-22"/>
	<updated date="2022-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696152" comment="fwupdate-0.5-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696153" comment="fwupdate-efi-0.5-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696154" comment="libfwup0-0.5-10.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150511" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1070738" ref_url="https://bugzilla.suse.com/1070738" source="BUGZILLA"/>
		<reference ref_id="1198511" ref_url="https://bugzilla.suse.com/1198511" source="BUGZILLA"/>
		<reference ref_id="1199441" ref_url="https://bugzilla.suse.com/1199441" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011339.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2015-20107: avoid command injection in the mailcap module (bsc#1198511).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-23"/>
	<updated date="2022-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070738">SUSE bug 1070738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198511">SUSE bug 1198511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199441">SUSE bug 1199441</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695986" comment="libpython3_4m1_0-3.4.10-25.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695987" comment="python3-3.4.10-25.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695988" comment="python3-base-3.4.10-25.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695989" comment="python3-curses-3.4.10-25.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696312" comment="python3-devel-3.4.10-25.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150512" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1200550" ref_url="https://bugzilla.suse.com/1200550" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2068" ref_url="https://www.suse.com/security/cve/CVE-2022-2068/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011354.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-2068: Fixed more shell code injection issues in c_rehash. (bsc#1200550)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-24"/>
	<updated date="2022-06-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1200550">SUSE bug 1200550</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2068/">CVE-2022-2068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">CVE-2022-2068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696496" comment="libopenssl-devel-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696497" comment="libopenssl1_0_0-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696498" comment="libopenssl1_0_0-32bit-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696499" comment="libopenssl1_0_0-hmac-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696500" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696501" comment="openssl-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696166" comment="openssl-doc-1.0.2j-60.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150513" version="1" class="patch">
	<metadata>
		<title>Security update for oracleasm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011369.html" source="SUSE-SU"/>
		<description>

This update of oracleasm fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-28"/>
	<updated date="2022-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696502" comment="oracleasm-kmp-default-2.0.8_k4.4.180_94.164-3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150514" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1198511" ref_url="https://bugzilla.suse.com/1198511" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011384.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2015-20107: avoid command injection in the mailcap module (bsc#1198511).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-04"/>
	<updated date="2022-07-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198511">SUSE bug 1198511</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700104" comment="libpython2_7-1_0-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700105" comment="libpython2_7-1_0-32bit-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700106" comment="python-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700107" comment="python-32bit-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700108" comment="python-base-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700109" comment="python-base-32bit-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700110" comment="python-curses-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700111" comment="python-demo-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700112" comment="python-devel-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696179" comment="python-doc-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696180" comment="python-doc-pdf-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700113" comment="python-gdbm-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700114" comment="python-idle-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700115" comment="python-tk-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700116" comment="python-xml-2.7.18-28.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150515" version="1" class="patch">
	<metadata>
		<title>Security update for sysstat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1144923" ref_url="https://bugzilla.suse.com/1144923" source="BUGZILLA"/>
		<reference ref_id="1159104" ref_url="https://bugzilla.suse.com/1159104" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19725" ref_url="https://www.suse.com/security/cve/CVE-2019-19725/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0026-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011392.html" source="SUSE-SU"/>
		<description>
This update for sysstat fixes the following issues:

Security issue fixed:                                                                                                                                                               
                                                                                                                                                                                   
- CVE-2019-19725: Fixed double free in check_file_actlst in sa_common.c (bsc#1159104).                                                                                    

Bug fixes:

- Enable log information of starting/stoping services. (bsc#1144923, jsc#SLE-5958)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-04"/>
	<updated date="2022-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144923">SUSE bug 1144923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159104">SUSE bug 1159104</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19725/">CVE-2019-19725 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19725">CVE-2019-19725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009558632" comment="sysstat-12.0.2-10.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009558633" comment="sysstat-isag-12.0.2-10.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150516" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011404.html" source="SUSE-SU"/>
		<description>

This update of dpdk fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-05"/>
	<updated date="2022-07-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700117" comment="dpdk-16.11.9-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696196" comment="dpdk-kmp-default-16.11.9_k4.4.180_94.164-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696661" comment="dpdk-thunderx-16.11.9-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696662" comment="dpdk-thunderx-kmp-default-16.11.9_k4.4.180_94.164-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700118" comment="dpdk-tools-16.11.9-8.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150517" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1199606" ref_url="https://bugzilla.suse.com/1199606" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1734" ref_url="https://www.suse.com/security/cve/CVE-2022-1734/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011410.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes one issue.

The following security issue was fixed:

- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-06"/>
	<updated date="2022-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199606">SUSE bug 1199606</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1734/">CVE-2022-1734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009696207" comment="kgraft-patch-4_4_180-94_147-default-14-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150518" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1199606" ref_url="https://bugzilla.suse.com/1199606" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1734" ref_url="https://www.suse.com/security/cve/CVE-2022-1734/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011410.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_150 fixes one issue.

The following security issue was fixed:

- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-06"/>
	<updated date="2022-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199606">SUSE bug 1199606</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1734/">CVE-2022-1734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721291" comment="kernel-default 4.4.180-94.150 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719630" comment="kgraft-patch-4_4_180-94_150-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009696208" comment="kgraft-patch-4_4_180-94_150-default-10-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150519" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 42 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1199606" ref_url="https://bugzilla.suse.com/1199606" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1734" ref_url="https://www.suse.com/security/cve/CVE-2022-1734/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011410.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_153 fixes one issue.

The following security issue was fixed:

- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-06"/>
	<updated date="2022-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199606">SUSE bug 1199606</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1734/">CVE-2022-1734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721293" comment="kernel-default 4.4.180-94.153 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719634" comment="kgraft-patch-4_4_180-94_153-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009696209" comment="kgraft-patch-4_4_180-94_153-default-6-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150520" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 43 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1199606" ref_url="https://bugzilla.suse.com/1199606" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1734" ref_url="https://www.suse.com/security/cve/CVE-2022-1734/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011410.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_156 fixes one issue.

The following security issue was fixed:

- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-06"/>
	<updated date="2022-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199606">SUSE bug 1199606</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1734/">CVE-2022-1734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721292" comment="kernel-default 4.4.180-94.156 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719632" comment="kgraft-patch-4_4_180-94_156-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009696210" comment="kgraft-patch-4_4_180-94_156-default-5-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150521" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 44 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1199606" ref_url="https://bugzilla.suse.com/1199606" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1734" ref_url="https://www.suse.com/security/cve/CVE-2022-1734/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011410.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_161 fixes one issue.

The following security issue was fixed:

- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-06"/>
	<updated date="2022-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199606">SUSE bug 1199606</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1734/">CVE-2022-1734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721294" comment="kernel-default 4.4.180-94.161 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719636" comment="kgraft-patch-4_4_180-94_161-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009696211" comment="kgraft-patch-4_4_180-94_161-default-4-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150522" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 45 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1197211" ref_url="https://bugzilla.suse.com/1197211" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39713" ref_url="https://www.suse.com/security/cve/CVE-2021-39713/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011414.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_164 fixes one issue.

The following security issue was fixed:

- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free. (bnc#1196973)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-06"/>
	<updated date="2022-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197211">SUSE bug 1197211</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39713/">CVE-2021-39713 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39713">CVE-2021-39713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721295" comment="kernel-default 4.4.180-94.164 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719638" comment="kgraft-patch-4_4_180-94_164-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009696212" comment="kgraft-patch-4_4_180-94_164-default-2-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150523" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1200793" ref_url="https://bugzilla.suse.com/1200793" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-31744" ref_url="https://www.suse.com/security/cve/CVE-2022-31744/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34478" ref_url="https://www.suse.com/security/cve/CVE-2022-34478/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011428.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 91.11.0 ESR (MFSA 2022-25) (bsc#1200793):

- CVE-2022-2200: Undesired attributes could be set as part of prototype pollution (bmo#1771381)
- CVE-2022-31744: CSP bypass enabling stylesheet injection (bmo#1757604)
- CVE-2022-34468: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI (bmo#1768537)
- CVE-2022-34470: Use-after-free in nsSHistory (bmo#1765951)
- CVE-2022-34472: Unavailable PAC file resulted in OCSP requests being blocked (bmo#1770123)
- CVE-2022-34478: Microsoft protocols can be attacked if a user accepts a prompt (bmo#1773717)
- CVE-2022-34479: A popup window could be resized in a way to overlay the address bar with web content (bmo#1745595)
- CVE-2022-34481: Potential integer overflow in ReplaceElementsAt (bmo#1497246)
- CVE-2022-34484: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 (bmo#1763634, bmo#1772651)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-06"/>
	<updated date="2022-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2200">CVE-2022-2200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31744/">CVE-2022-31744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31744">CVE-2022-31744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34468">CVE-2022-34468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34470">CVE-2022-34470 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34472">CVE-2022-34472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34478/">CVE-2022-34478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34478">CVE-2022-34478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34479">CVE-2022-34479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34481">CVE-2022-34481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34484">CVE-2022-34484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700119" comment="MozillaFirefox-91.11.0-112.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700020" comment="MozillaFirefox-devel-91.11.0-112.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700120" comment="MozillaFirefox-translations-common-91.11.0-112.119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150524" version="1" class="patch">
	<metadata>
		<title>Security update for rsyslog (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1199061" ref_url="https://bugzilla.suse.com/1199061" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24903" ref_url="https://www.suse.com/security/cve/CVE-2022-24903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011474.html" source="SUSE-SU"/>
		<description>
This update for rsyslog fixes the following issues:

- CVE-2022-24903: fix potential heap buffer overflow in modules for TCP syslog reception (bsc#1199061)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-07"/>
	<updated date="2022-07-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199061">SUSE bug 1199061</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24903/">CVE-2022-24903 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24903">CVE-2022-24903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700121" comment="rsyslog-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700122" comment="rsyslog-diag-tools-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700123" comment="rsyslog-doc-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700124" comment="rsyslog-module-gssapi-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700125" comment="rsyslog-module-gtls-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700126" comment="rsyslog-module-mysql-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700127" comment="rsyslog-module-pgsql-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700128" comment="rsyslog-module-relp-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700129" comment="rsyslog-module-snmp-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700130" comment="rsyslog-module-udpspoof-8.24.0-3.58.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150525" version="1" class="patch">
	<metadata>
		<title>Security update for pcre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1199232" ref_url="https://bugzilla.suse.com/1199232" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1586" ref_url="https://www.suse.com/security/cve/CVE-2022-1586/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011480.html" source="SUSE-SU"/>
		<description>
This update for pcre fixes the following issues:
	  
- CVE-2022-1586: Fixed unicode property matching issue. (bsc#1199232)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-08"/>
	<updated date="2022-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199232">SUSE bug 1199232</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1586/">CVE-2022-1586 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">CVE-2022-1586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696904" comment="libpcre1-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696905" comment="libpcre1-32bit-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696906" comment="libpcre16-0-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696327" comment="libpcrecpp0-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696328" comment="libpcreposix0-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696329" comment="pcre-devel-8.45-8.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150526" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194859" ref_url="https://bugzilla.suse.com/1194859" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44142" ref_url="https://www.suse.com/security/cve/CVE-2021-44142/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010159.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-44142: Fixed out-of-Bound Read/Write on Samba vfs_fruit module. (bsc#1194859)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-01"/>
	<updated date="2022-02-01"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194859">SUSE bug 1194859</bugzilla>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44142/">CVE-2021-44142 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44142">CVE-2021-44142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666685" comment="libdcerpc-binding0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666686" comment="libdcerpc-binding0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666687" comment="libdcerpc0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666688" comment="libdcerpc0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666689" comment="libndr-krb5pac0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666690" comment="libndr-krb5pac0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666691" comment="libndr-nbt0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666692" comment="libndr-nbt0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666693" comment="libndr-standard0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666694" comment="libndr-standard0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666695" comment="libndr0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666696" comment="libndr0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666697" comment="libnetapi0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666698" comment="libnetapi0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666699" comment="libsamba-credentials0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666700" comment="libsamba-credentials0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666701" comment="libsamba-errors0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666702" comment="libsamba-errors0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666703" comment="libsamba-hostconfig0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666704" comment="libsamba-hostconfig0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666705" comment="libsamba-passdb0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666706" comment="libsamba-passdb0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666707" comment="libsamba-util0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666708" comment="libsamba-util0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666709" comment="libsamdb0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666710" comment="libsamdb0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666711" comment="libsmbclient0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666712" comment="libsmbclient0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666713" comment="libsmbconf0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666714" comment="libsmbconf0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666715" comment="libsmbldap0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666716" comment="libsmbldap0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666717" comment="libtevent-util0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666718" comment="libtevent-util0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666719" comment="libwbclient0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666720" comment="libwbclient0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666721" comment="samba-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666722" comment="samba-client-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666723" comment="samba-client-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666199" comment="samba-doc-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666724" comment="samba-libs-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666725" comment="samba-libs-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666726" comment="samba-winbind-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666727" comment="samba-winbind-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150527" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1100146" ref_url="https://bugzilla.suse.com/1100146" source="BUGZILLA"/>
		<reference ref_id="1145864" ref_url="https://bugzilla.suse.com/1145864" source="BUGZILLA"/>
		<reference ref_id="1152968" ref_url="https://bugzilla.suse.com/1152968" source="BUGZILLA"/>
		<reference ref_id="1174961" ref_url="https://bugzilla.suse.com/1174961" source="BUGZILLA"/>
		<reference ref_id="1178021" ref_url="https://bugzilla.suse.com/1178021" source="BUGZILLA"/>
		<reference ref_id="1178351" ref_url="https://bugzilla.suse.com/1178351" source="BUGZILLA"/>
		<reference ref_id="1179009" ref_url="https://bugzilla.suse.com/1179009" source="BUGZILLA"/>
		<reference ref_id="1179699" ref_url="https://bugzilla.suse.com/1179699" source="BUGZILLA"/>
		<reference ref_id="1184839" ref_url="https://bugzilla.suse.com/1184839" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15862" ref_url="https://www.suse.com/security/cve/CVE-2020-15862/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009966.html" source="SUSE-SU"/>
		<description>
This update for net-snmp fixes the following issues:

- CVE-2020-15862: Make extended MIB read-only (bsc#1174961)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1100146">SUSE bug 1100146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145864">SUSE bug 1145864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152968">SUSE bug 1152968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174961">SUSE bug 1174961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178021">SUSE bug 1178021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178351">SUSE bug 1178351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179009">SUSE bug 1179009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179699">SUSE bug 1179699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184839">SUSE bug 1184839</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15862/">CVE-2020-15862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15862">CVE-2020-15862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661620" comment="libsnmp30-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661621" comment="libsnmp30-32bit-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661622" comment="net-snmp-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661623" comment="perl-SNMP-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661624" comment="snmp-mibs-5.7.3-6.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150528" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1186061" ref_url="https://bugzilla.suse.com/1186061" source="BUGZILLA"/>
		<reference ref_id="1191529" ref_url="https://bugzilla.suse.com/1191529" source="BUGZILLA"/>
		<reference ref_id="1192036" ref_url="https://bugzilla.suse.com/1192036" source="BUGZILLA"/>
		<reference ref_id="1193161" ref_url="https://bugzilla.suse.com/1193161" source="BUGZILLA"/>
		<reference ref_id="1193863" ref_url="https://bugzilla.suse.com/1193863" source="BUGZILLA"/>
		<reference ref_id="1194680" ref_url="https://bugzilla.suse.com/1194680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25020" ref_url="https://www.suse.com/security/cve/CVE-2018-25020/" source="CVE"/>
		<reference ref_id="CVE-2019-0136" ref_url="https://www.suse.com/security/cve/CVE-2019-0136/" source="CVE"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following security issues were fixed:

- CVE-2018-25020: Fixed an issue in the BPF subsystem in the Linux kernel mishandled situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. (bsc#1193575)
- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)
- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673, CVE-2021-23134: Fixed multiple bugs in NFC subsytem (bsc#1178181, bsc#1186060).
- CVE-2019-0136: Fixed an insufficient access control which allow an unauthenticated user to execute a denial of service. (bsc#1193157)
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-04"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191529">SUSE bug 1191529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193161">SUSE bug 1193161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193863">SUSE bug 1193863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194680">SUSE bug 1194680</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25020/">CVE-2018-25020 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25020">CVE-2018-25020 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0136/">CVE-2019-0136 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0136">CVE-2019-0136 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25670">CVE-2020-25670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25671">CVE-2020-25671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25672">CVE-2020-25672 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25673">CVE-2020-25673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3702">CVE-2020-3702 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23134">CVE-2021-23134 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009665194" comment="kgraft-patch-4_4_180-94_138-default-14-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150529" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1186061" ref_url="https://bugzilla.suse.com/1186061" source="BUGZILLA"/>
		<reference ref_id="1191529" ref_url="https://bugzilla.suse.com/1191529" source="BUGZILLA"/>
		<reference ref_id="1192036" ref_url="https://bugzilla.suse.com/1192036" source="BUGZILLA"/>
		<reference ref_id="1193161" ref_url="https://bugzilla.suse.com/1193161" source="BUGZILLA"/>
		<reference ref_id="1193863" ref_url="https://bugzilla.suse.com/1193863" source="BUGZILLA"/>
		<reference ref_id="1194680" ref_url="https://bugzilla.suse.com/1194680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25020" ref_url="https://www.suse.com/security/cve/CVE-2018-25020/" source="CVE"/>
		<reference ref_id="CVE-2019-0136" ref_url="https://www.suse.com/security/cve/CVE-2019-0136/" source="CVE"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.

The following security issues were fixed:

- CVE-2018-25020: Fixed an issue in the BPF subsystem in the Linux kernel mishandled situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. (bsc#1193575)
- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)
- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673, CVE-2021-23134: Fixed multiple bugs in NFC subsytem (bsc#1178181, bsc#1186060).
- CVE-2019-0136: Fixed an insufficient access control which allow an unauthenticated user to execute a denial of service. (bsc#1193157)
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-04"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191529">SUSE bug 1191529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193161">SUSE bug 1193161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193863">SUSE bug 1193863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194680">SUSE bug 1194680</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25020/">CVE-2018-25020 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25020">CVE-2018-25020 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0136/">CVE-2019-0136 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0136">CVE-2019-0136 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25670">CVE-2020-25670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25671">CVE-2020-25671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25672">CVE-2020-25672 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25673">CVE-2020-25673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3702">CVE-2020-3702 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23134">CVE-2021-23134 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009665195" comment="kgraft-patch-4_4_180-94_141-default-13-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150530" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1186061" ref_url="https://bugzilla.suse.com/1186061" source="BUGZILLA"/>
		<reference ref_id="1191529" ref_url="https://bugzilla.suse.com/1191529" source="BUGZILLA"/>
		<reference ref_id="1192036" ref_url="https://bugzilla.suse.com/1192036" source="BUGZILLA"/>
		<reference ref_id="1193161" ref_url="https://bugzilla.suse.com/1193161" source="BUGZILLA"/>
		<reference ref_id="1193863" ref_url="https://bugzilla.suse.com/1193863" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25020" ref_url="https://www.suse.com/security/cve/CVE-2018-25020/" source="CVE"/>
		<reference ref_id="CVE-2019-0136" ref_url="https://www.suse.com/security/cve/CVE-2019-0136/" source="CVE"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010186.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes several issues.

The following security issues were fixed:

- CVE-2018-25020: Fixed an issue in the BPF subsystem in the Linux kernel mishandled situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. (bsc#1193575)
- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)
- CVE-2021-23134: Fixed a use After Free vulnerability in nfc sockets which allows local attackers to elevate their privileges. (bsc#1186060)
- CVE-2019-0136: Fixed an insufficient access control which allow an unauthenticated user to execute a denial of service. (bsc#1193157)
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-04"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191529">SUSE bug 1191529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193161">SUSE bug 1193161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193863">SUSE bug 1193863</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25020/">CVE-2018-25020 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25020">CVE-2018-25020 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0136/">CVE-2019-0136 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0136">CVE-2019-0136 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3702">CVE-2020-3702 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23134">CVE-2021-23134 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009665196" comment="kgraft-patch-4_4_180-94_144-default-10-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150531" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1191529" ref_url="https://bugzilla.suse.com/1191529" source="BUGZILLA"/>
		<reference ref_id="1192036" ref_url="https://bugzilla.suse.com/1192036" source="BUGZILLA"/>
		<reference ref_id="1193161" ref_url="https://bugzilla.suse.com/1193161" source="BUGZILLA"/>
		<reference ref_id="1193863" ref_url="https://bugzilla.suse.com/1193863" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25020" ref_url="https://www.suse.com/security/cve/CVE-2018-25020/" source="CVE"/>
		<reference ref_id="CVE-2019-0136" ref_url="https://www.suse.com/security/cve/CVE-2019-0136/" source="CVE"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010184.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes several issues.

The following security issues were fixed:

- CVE-2018-25020: Fixed an issue in the BPF subsystem in the Linux kernel mishandled situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. (bsc#1193575)
- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)
- CVE-2019-0136: Fixed an insufficient access control which allow an unauthenticated user to execute a denial of service. (bsc#1193157)
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-04"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191529">SUSE bug 1191529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193161">SUSE bug 1193161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193863">SUSE bug 1193863</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25020/">CVE-2018-25020 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25020">CVE-2018-25020 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0136/">CVE-2019-0136 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0136">CVE-2019-0136 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3702">CVE-2020-3702 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009665197" comment="kgraft-patch-4_4_180-94_147-default-7-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150532" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1193161" ref_url="https://bugzilla.suse.com/1193161" source="BUGZILLA"/>
		<reference ref_id="1193863" ref_url="https://bugzilla.suse.com/1193863" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25020" ref_url="https://www.suse.com/security/cve/CVE-2018-25020/" source="CVE"/>
		<reference ref_id="CVE-2019-0136" ref_url="https://www.suse.com/security/cve/CVE-2019-0136/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010188.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_150 fixes several issues.

The following security issues were fixed:

- CVE-2018-25020: Fixed an issue in the BPF subsystem in the Linux kernel mishandled situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. (bsc#1193575)
- CVE-2019-0136: Fixed an insufficient access control which allow an unauthenticated user to execute a denial of service. (bsc#1193157)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-04"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193161">SUSE bug 1193161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193863">SUSE bug 1193863</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25020/">CVE-2018-25020 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25020">CVE-2018-25020 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0136/">CVE-2019-0136 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0136">CVE-2019-0136 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721291" comment="kernel-default 4.4.180-94.150 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719630" comment="kgraft-patch-4_4_180-94_150-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009665198" comment="kgraft-patch-4_4_180-94_150-default-3-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150533" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194006" ref_url="https://bugzilla.suse.com/1194006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009971.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-4156: Fixed heap buffer overflow in flac_buffer_copy that 
could potentially lead to heap exploitation (bsc#1194006).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4156">CVE-2021-4156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662512" comment="libsndfile1-1.0.25-36.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662513" comment="libsndfile1-32bit-1.0.25-36.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150534" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010197.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-09"/>
	<updated date="2022-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20698">CVE-2022-20698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667359" comment="clamav-0.103.5-33.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150535" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194581" ref_url="https://bugzilla.suse.com/1194581" source="BUGZILLA"/>
		<reference ref_id="1194588" ref_url="https://bugzilla.suse.com/1194588" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23034" ref_url="https://www.suse.com/security/cve/CVE-2022-23034/" source="CVE"/>
		<reference ref_id="CVE-2022-23035" ref_url="https://www.suse.com/security/cve/CVE-2022-23035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010198.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-23034: Fixed possible DoS by a PV guest Xen while unmapping a grant. (XSA-394) (bsc#1194581)
- CVE-2022-23035: Fixed insufficient cleanup of passed-through device IRQs. (XSA-395) (bsc#1194588)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-09"/>
	<updated date="2022-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194581">SUSE bug 1194581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194588">SUSE bug 1194588</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23034/">CVE-2022-23034 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23034">CVE-2022-23034 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23035/">CVE-2022-23035 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23035">CVE-2022-23035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666154" comment="xen-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666155" comment="xen-doc-html-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666156" comment="xen-libs-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666157" comment="xen-libs-32bit-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666158" comment="xen-tools-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666159" comment="xen-tools-domU-4.9.4_26-3.100.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150536" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1183696" ref_url="https://bugzilla.suse.com/1183696" source="BUGZILLA"/>
		<reference ref_id="1186207" ref_url="https://bugzilla.suse.com/1186207" source="BUGZILLA"/>
		<reference ref_id="1192032" ref_url="https://bugzilla.suse.com/1192032" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192847" ref_url="https://bugzilla.suse.com/1192847" source="BUGZILLA"/>
		<reference ref_id="1192877" ref_url="https://bugzilla.suse.com/1192877" source="BUGZILLA"/>
		<reference ref_id="1192946" ref_url="https://bugzilla.suse.com/1192946" source="BUGZILLA"/>
		<reference ref_id="1193157" ref_url="https://bugzilla.suse.com/1193157" source="BUGZILLA"/>
		<reference ref_id="1193440" ref_url="https://bugzilla.suse.com/1193440" source="BUGZILLA"/>
		<reference ref_id="1193442" ref_url="https://bugzilla.suse.com/1193442" source="BUGZILLA"/>
		<reference ref_id="1193507" ref_url="https://bugzilla.suse.com/1193507" source="BUGZILLA"/>
		<reference ref_id="1193575" ref_url="https://bugzilla.suse.com/1193575" source="BUGZILLA"/>
		<reference ref_id="1193669" ref_url="https://bugzilla.suse.com/1193669" source="BUGZILLA"/>
		<reference ref_id="1193727" ref_url="https://bugzilla.suse.com/1193727" source="BUGZILLA"/>
		<reference ref_id="1193861" ref_url="https://bugzilla.suse.com/1193861" source="BUGZILLA"/>
		<reference ref_id="1193864" ref_url="https://bugzilla.suse.com/1193864" source="BUGZILLA"/>
		<reference ref_id="1193867" ref_url="https://bugzilla.suse.com/1193867" source="BUGZILLA"/>
		<reference ref_id="1194001" ref_url="https://bugzilla.suse.com/1194001" source="BUGZILLA"/>
		<reference ref_id="1194087" ref_url="https://bugzilla.suse.com/1194087" source="BUGZILLA"/>
		<reference ref_id="1194094" ref_url="https://bugzilla.suse.com/1194094" source="BUGZILLA"/>
		<reference ref_id="1194272" ref_url="https://bugzilla.suse.com/1194272" source="BUGZILLA"/>
		<reference ref_id="1194302" ref_url="https://bugzilla.suse.com/1194302" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1194529" ref_url="https://bugzilla.suse.com/1194529" source="BUGZILLA"/>
		<reference ref_id="1194880" ref_url="https://bugzilla.suse.com/1194880" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25020" ref_url="https://www.suse.com/security/cve/CVE-2018-25020/" source="CVE"/>
		<reference ref_id="CVE-2019-0136" ref_url="https://www.suse.com/security/cve/CVE-2019-0136/" source="CVE"/>
		<reference ref_id="CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519/" source="CVE"/>
		<reference ref_id="CVE-2021-0935" ref_url="https://www.suse.com/security/cve/CVE-2021-0935/" source="CVE"/>
		<reference ref_id="CVE-2021-28711" ref_url="https://www.suse.com/security/cve/CVE-2021-28711/" source="CVE"/>
		<reference ref_id="CVE-2021-28712" ref_url="https://www.suse.com/security/cve/CVE-2021-28712/" source="CVE"/>
		<reference ref_id="CVE-2021-28713" ref_url="https://www.suse.com/security/cve/CVE-2021-28713/" source="CVE"/>
		<reference ref_id="CVE-2021-28715" ref_url="https://www.suse.com/security/cve/CVE-2021-28715/" source="CVE"/>
		<reference ref_id="CVE-2021-33098" ref_url="https://www.suse.com/security/cve/CVE-2021-33098/" source="CVE"/>
		<reference ref_id="CVE-2021-3564" ref_url="https://www.suse.com/security/cve/CVE-2021-3564/" source="CVE"/>
		<reference ref_id="CVE-2021-39648" ref_url="https://www.suse.com/security/cve/CVE-2021-39648/" source="CVE"/>
		<reference ref_id="CVE-2021-39657" ref_url="https://www.suse.com/security/cve/CVE-2021-39657/" source="CVE"/>
		<reference ref_id="CVE-2021-4002" ref_url="https://www.suse.com/security/cve/CVE-2021-4002/" source="CVE"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4149" ref_url="https://www.suse.com/security/cve/CVE-2021-4149/" source="CVE"/>
		<reference ref_id="CVE-2021-4155" ref_url="https://www.suse.com/security/cve/CVE-2021-4155/" source="CVE"/>
		<reference ref_id="CVE-2021-4197" ref_url="https://www.suse.com/security/cve/CVE-2021-4197/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2021-45485" ref_url="https://www.suse.com/security/cve/CVE-2021-45485/" source="CVE"/>
		<reference ref_id="CVE-2021-45486" ref_url="https://www.suse.com/security/cve/CVE-2021-45486/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 LTSS kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2018-25020: Fixed an overflow in the BPF subsystem due to a mishandling of a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions. This affects kernel/bpf/core.c and net/core/filter.c (bnc#1193575).
- CVE-2019-0136: Fixed insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver that may have allowed an unauthenticated user to potentially enable denial of service via adjacent access (bnc#1193157).
- CVE-2020-35519: Fixed out-of-bounds memory access in x25_bind in net/x25/af_x25.c. A bounds check failure allowed a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information (bnc#1183696).
- CVE-2021-0935: Fixed possible out of bounds write in ip6_xmit of ip6_output.c due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192032).
- CVE-2021-28711: Fixed issue with xen/blkfront to harden blkfront against event channel storms (XSA-391) (bsc#1193440).
- CVE-2021-28712: Fixed issue with xen/netfront to harden netfront against event channel storms (XSA-391) (bsc#1193440).
- CVE-2021-28713: Fixed issue with xen/console to harden hvc_xen against event channel storms (XSA-391) (bsc#1193440).
- CVE-2021-28715: Fixed issue with xen/netback to do not queue unlimited number of packages (XSA-392) (bsc#1193442).
- CVE-2021-33098: Fixed improper input validation in the Intel(R) Ethernet ixgbe driver that may have allowed an authenticated user to potentially cause denial of service via local access (bnc#1192877).
- CVE-2021-3564: Fixed double-free memory corruption in the Linux kernel HCI device initialization subsystem that could have been used by attaching malicious HCI TTY Bluetooth devices. A local user could use this flaw to crash the system (bnc#1186207).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-4002: Fixed incorrect TLBs flush in hugetlbfs after huge_pmd_unshare (bsc#1192946).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1193727).
- CVE-2021-4149: Fixed btrfs unlock newly allocated extent buffer after error (bsc#1194001).
- CVE-2021-4155: Fixed XFS map issue when unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate (bsc#1194272).
- CVE-2021-4197: Use cgroup open-time credentials for process migraton perm checks (bsc#1194302).
- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194529).
- CVE-2021-43976: Fixed insufficient access control in drivers/net/wireless/marvell/mwifiex/usb.c that allowed an attacker who connect a crafted USB device to cause denial of service (bnc#1192847).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2021-45485: Fixed information leak in the IPv6 implementation in net/ipv6/output_core.c (bnc#1194094).
- CVE-2021-45486: Fixed information leak inside the IPv4 implementation caused by very small hash table (bnc#1194087).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).


The following non-security bugs were fixed:

- fget: clarify and improve __fget_files() implementation (bsc#1193727).
- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (bsc#1193507).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193507).
- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- memstick: rtsx_usb_ms: fix UAF
- moxart: fix potential use-after-free on remove path (bsc1194516).
- net/x25: fix a race in x25_bind() (networking-stable-19_03_15).
- net: mana: Add RX fencing (bsc#1193507).
- net: mana: Allow setting the number of queues while the NIC is down (bsc#1193507).
- net: mana: Fix spelling mistake 'calledd' -&gt; 'called' (bsc#1193507).
- net: mana: Fix the netdev_err()'s vPort argument in mana_init_port() (bsc#1193507).
- net: mana: Improve the HWC error handling (bsc#1193507).
- net: mana: Support hibernation and kexec (bsc#1193507).
- net: mana: Use kcalloc() instead of kzalloc() (bsc#1193507).
- recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267).
- recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc#1192267).
- ring-buffer: Protect ring_buffer_reset() from reentrancy (bsc#1179960).
- tty: hvc: replace BUG_ON() with negative return value (git-fixes).
- xen-netfront: do not assume sk_buff_head list is empty in error handling (git-fixes).
- xen-netfront: do not use ~0U as error return value for xennet_fill_frags() (git-fixes).
- xen/blkfront: do not take local copy of a request from the ring page (git-fixes).
- xen/blkfront: do not trust the backend response data blindly (git-fixes).
- xen/blkfront: read response from backend only once (git-fixes).
- xen/netfront: disentangle tx_skb_freelist (git-fixes).
- xen/netfront: do not bug in case of too many frags (bnc#1012382).
- xen/netfront: do not cache skb_shinfo() (bnc#1012382).
- xen/netfront: do not read data from request on the ring page (git-fixes).
- xen/netfront: do not trust the backend response data blindly (git-fixes).
- xen/netfront: read response from backend only once (git-fixes).
- xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-10"/>
	<updated date="2022-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183696">SUSE bug 1183696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186207">SUSE bug 1186207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192032">SUSE bug 1192032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192847">SUSE bug 1192847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192877">SUSE bug 1192877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192946">SUSE bug 1192946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193157">SUSE bug 1193157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193440">SUSE bug 1193440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193442">SUSE bug 1193442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193507">SUSE bug 1193507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193575">SUSE bug 1193575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193669">SUSE bug 1193669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193727">SUSE bug 1193727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193861">SUSE bug 1193861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193864">SUSE bug 1193864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194001">SUSE bug 1194001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194087">SUSE bug 1194087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194094">SUSE bug 1194094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194272">SUSE bug 1194272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194302">SUSE bug 1194302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194529">SUSE bug 1194529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194880">SUSE bug 1194880</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25020/">CVE-2018-25020 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25020">CVE-2018-25020 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0136/">CVE-2019-0136 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0136">CVE-2019-0136 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35519">CVE-2020-35519 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0935/">CVE-2021-0935 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0935">CVE-2021-0935 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28711/">CVE-2021-28711 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28711">CVE-2021-28711 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28712/">CVE-2021-28712 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28712">CVE-2021-28712 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28713/">CVE-2021-28713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28713">CVE-2021-28713 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28715/">CVE-2021-28715 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28715">CVE-2021-28715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33098/">CVE-2021-33098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33098">CVE-2021-33098 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3564/">CVE-2021-3564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3564">CVE-2021-3564 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39648/">CVE-2021-39648 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39648">CVE-2021-39648 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39657/">CVE-2021-39657 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39657">CVE-2021-39657 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4002/">CVE-2021-4002 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4002">CVE-2021-4002 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">CVE-2021-4083 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4149/">CVE-2021-4149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4149">CVE-2021-4149 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4155/">CVE-2021-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4155">CVE-2021-4155 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4197/">CVE-2021-4197 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4197">CVE-2021-4197 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4202">CVE-2021-4202 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43976">CVE-2021-43976 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45095">CVE-2021-45095 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45485/">CVE-2021-45485 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45485">CVE-2021-45485 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45486/">CVE-2021-45486 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45486">CVE-2021-45486 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667634" comment="kernel-default-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667635" comment="kernel-default-base-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667636" comment="kernel-default-devel-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666897" comment="kernel-default-kgraft-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666920" comment="kernel-default-man-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666898" comment="kernel-devel-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666899" comment="kernel-macros-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666900" comment="kernel-source-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667637" comment="kernel-syms-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666902" comment="kgraft-patch-4_4_180-94_153-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150537" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1192876" ref_url="https://bugzilla.suse.com/1192876" source="BUGZILLA"/>
		<reference ref_id="1193981" ref_url="https://bugzilla.suse.com/1193981" source="BUGZILLA"/>
		<reference ref_id="1194041" ref_url="https://bugzilla.suse.com/1194041" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3975" ref_url="https://www.suse.com/security/cve/CVE-2021-3975/" source="CVE"/>
		<reference ref_id="CVE-2021-4147" ref_url="https://www.suse.com/security/cve/CVE-2021-4147/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009983.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2021-4147: libxl: Fix libvirtd deadlocks and segfaults. (bsc#1194041)
- CVE-2021-3975: Add missing lock in qemuProcessHandleMonitorEOF. (bsc#1192876)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-10"/>
	<updated date="2022-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192876">SUSE bug 1192876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193981">SUSE bug 1193981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194041">SUSE bug 1194041</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3975/">CVE-2021-3975 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3975">CVE-2021-3975 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4147/">CVE-2021-4147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4147">CVE-2021-4147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662695" comment="libvirt-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662696" comment="libvirt-admin-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662697" comment="libvirt-client-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662698" comment="libvirt-daemon-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662699" comment="libvirt-daemon-config-network-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662700" comment="libvirt-daemon-config-nwfilter-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662701" comment="libvirt-daemon-driver-interface-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662170" comment="libvirt-daemon-driver-libxl-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662702" comment="libvirt-daemon-driver-lxc-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662703" comment="libvirt-daemon-driver-network-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662704" comment="libvirt-daemon-driver-nodedev-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662705" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662706" comment="libvirt-daemon-driver-qemu-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662707" comment="libvirt-daemon-driver-secret-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662708" comment="libvirt-daemon-driver-storage-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662709" comment="libvirt-daemon-driver-storage-core-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662710" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662711" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662712" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662713" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662714" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662715" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662716" comment="libvirt-daemon-hooks-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662717" comment="libvirt-daemon-lxc-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662718" comment="libvirt-daemon-qemu-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662188" comment="libvirt-daemon-xen-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662719" comment="libvirt-doc-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662720" comment="libvirt-libs-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662721" comment="libvirt-lock-sanlock-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662722" comment="libvirt-nss-3.3.0-5.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150538" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1195389" ref_url="https://bugzilla.suse.com/1195389" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0135" ref_url="https://www.suse.com/security/cve/CVE-2022-0135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010244.html" source="SUSE-SU"/>
		<description>
This update for virglrenderer fixes the following issues:

- CVE-2022-0135: Fixed out-of-bonds write in read_transfer_data() (bsc#1195389).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195389">SUSE bug 1195389</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0135/">CVE-2022-0135 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0135">CVE-2022-0135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667338" comment="libvirglrenderer0-0.5.0-12.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150539" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1195054" ref_url="https://bugzilla.suse.com/1195054" source="BUGZILLA"/>
		<reference ref_id="1195217" ref_url="https://bugzilla.suse.com/1195217" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010253.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">CVE-2022-23852 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23990">CVE-2022-23990 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666449" comment="expat-2.1.0-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666450" comment="libexpat1-2.1.0-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666451" comment="libexpat1-32bit-2.1.0-21.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150540" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1071031" ref_url="https://bugzilla.suse.com/1071031" source="BUGZILLA"/>
		<reference ref_id="1154365" ref_url="https://bugzilla.suse.com/1154365" source="BUGZILLA"/>
		<reference ref_id="1182808" ref_url="https://bugzilla.suse.com/1182808" source="BUGZILLA"/>
		<reference ref_id="1182809" ref_url="https://bugzilla.suse.com/1182809" source="BUGZILLA"/>
		<reference ref_id="1182811" ref_url="https://bugzilla.suse.com/1182811" source="BUGZILLA"/>
		<reference ref_id="1182812" ref_url="https://bugzilla.suse.com/1182812" source="BUGZILLA"/>
		<reference ref_id="1190312" ref_url="https://bugzilla.suse.com/1190312" source="BUGZILLA"/>
		<reference ref_id="1194539" ref_url="https://bugzilla.suse.com/1194539" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17095" ref_url="https://www.suse.com/security/cve/CVE-2017-17095/" source="CVE"/>
		<reference ref_id="CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546/" source="CVE"/>
		<reference ref_id="CVE-2020-19131" ref_url="https://www.suse.com/security/cve/CVE-2020-19131/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<reference ref_id="CVE-2022-22844" ref_url="https://www.suse.com/security/cve/CVE-2022-22844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010261.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2017-17095: Fixed DoS in tools/pal2rgb.c in pal2rgb (bsc#1071031).
- CVE-2019-17546: Fixed integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image (bsc#1154365).
- CVE-2020-19131: Fixed buffer overflow in tiffcrop that may cause DoS via the invertImage() function (bsc#1190312).
- CVE-2020-35521: Fixed memory allocation failure in tif_read.c (bsc#1182808).
- CVE-2020-35522: Fixed memory allocation failure in tif_pixarlog.c (bsc#1182809).
- CVE-2020-35523: Fixed integer overflow in tif_getimage.c (bsc#1182811).
- CVE-2020-35524: Fixed heap-based buffer overflow in TIFF2PDF tool (bsc#1182812).
- CVE-2022-22844: Fixed out-of-bounds read in _TIFFmemcpy in tif_unix.c (bsc#1194539).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071031">SUSE bug 1071031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154365">SUSE bug 1154365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182808">SUSE bug 1182808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182809">SUSE bug 1182809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182811">SUSE bug 1182811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182812">SUSE bug 1182812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190312">SUSE bug 1190312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194539">SUSE bug 1194539</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17095/">CVE-2017-17095 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17095">CVE-2017-17095 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17546">CVE-2019-17546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-19131/">CVE-2020-19131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19131">CVE-2020-19131 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35521">CVE-2020-35521 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35522">CVE-2020-35522 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35523">CVE-2020-35523 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35524">CVE-2020-35524 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22844/">CVE-2022-22844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22844">CVE-2022-22844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666446" comment="libtiff5-4.0.9-44.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666447" comment="libtiff5-32bit-4.0.9-44.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666448" comment="tiff-4.0.9-44.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150541" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1195825" ref_url="https://bugzilla.suse.com/1195825" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010269.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2018-16301: Fixed segfault when handling large files (bsc#1195825).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668127" comment="tcpdump-4.9.2-14.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150542" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1195108" ref_url="https://bugzilla.suse.com/1195108" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010280.html" source="SUSE-SU"/>
		<description>
This update for xerces-j2 fixes the following issues:

- CVE-2022-23437: Fixed infinite loop within Apache XercesJ xml parser (bsc#1195108).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-21"/>
	<updated date="2022-02-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23437">CVE-2022-23437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667934" comment="xerces-j2-2.8.1-268.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667935" comment="xerces-j2-xml-apis-2.8.1-268.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667936" comment="xerces-j2-xml-resolver-2.8.1-268.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150543" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194460" ref_url="https://bugzilla.suse.com/1194460" source="BUGZILLA"/>
		<reference ref_id="1194533" ref_url="https://bugzilla.suse.com/1194533" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010289.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.

The following security issues were fixed:

- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-22"/>
	<updated date="2022-02-22"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">CVE-2021-4083 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4202">CVE-2021-4202 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009667930" comment="kgraft-patch-4_4_180-94_141-default-14-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150544" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194460" ref_url="https://bugzilla.suse.com/1194460" source="BUGZILLA"/>
		<reference ref_id="1194533" ref_url="https://bugzilla.suse.com/1194533" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010289.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes several issues.

The following security issues were fixed:

- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-22"/>
	<updated date="2022-02-22"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">CVE-2021-4083 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4202">CVE-2021-4202 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009667931" comment="kgraft-patch-4_4_180-94_144-default-11-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150545" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194460" ref_url="https://bugzilla.suse.com/1194460" source="BUGZILLA"/>
		<reference ref_id="1194533" ref_url="https://bugzilla.suse.com/1194533" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010289.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes several issues.

The following security issues were fixed:

- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-22"/>
	<updated date="2022-02-22"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">CVE-2021-4083 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4202">CVE-2021-4202 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009667932" comment="kgraft-patch-4_4_180-94_147-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150546" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194460" ref_url="https://bugzilla.suse.com/1194460" source="BUGZILLA"/>
		<reference ref_id="1194533" ref_url="https://bugzilla.suse.com/1194533" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010289.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_150 fixes several issues.

The following security issues were fixed:

- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-22"/>
	<updated date="2022-02-22"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">CVE-2021-4083 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4202">CVE-2021-4202 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721291" comment="kernel-default 4.4.180-94.150 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719630" comment="kgraft-patch-4_4_180-94_150-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009667933" comment="kgraft-patch-4_4_180-94_150-default-4-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150547" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194460" ref_url="https://bugzilla.suse.com/1194460" source="BUGZILLA"/>
		<reference ref_id="1194533" ref_url="https://bugzilla.suse.com/1194533" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010289.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following security issues were fixed:

- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-22"/>
	<updated date="2022-02-22"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">CVE-2021-4083 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4202">CVE-2021-4202 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009669104" comment="kgraft-patch-4_4_180-94_138-default-15-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150548" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1195230" ref_url="https://bugzilla.suse.com/1195230" source="BUGZILLA"/>
		<reference ref_id="1195682" ref_url="https://bugzilla.suse.com/1195682" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010302.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682)

- CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via Maintenance Service
- CVE-2022-22754: Extensions could have bypassed permission confirmation during update
- CVE-2022-22756: Drag and dropping an image could have resulted in the dropped object being an executable
- CVE-2022-22759: Sandboxed iframes could have executed script if the parent appended elements
- CVE-2022-22760: Cross-Origin responses could be distinguished between script and non-script content-types
- CVE-2022-22761: frame-ancestors Content Security Policy directive was not enforced for framed extension pages
- CVE-2022-22763: Script Execution during invalid object state
- CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6


Firefox Extended Support Release 91.5.1 ESR (bsc#1195230)

- Fixed an issue that allowed unexpected data to be submitted in some of our search telemetry
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-24"/>
	<updated date="2022-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195230">SUSE bug 1195230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22753">CVE-2022-22753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22754">CVE-2022-22754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22756">CVE-2022-22756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22759">CVE-2022-22759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22760">CVE-2022-22760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22761">CVE-2022-22761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22763">CVE-2022-22763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22764">CVE-2022-22764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668896" comment="MozillaFirefox-91.6.0-112.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668886" comment="MozillaFirefox-devel-91.6.0-112.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668897" comment="MozillaFirefox-translations-common-91.6.0-112.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150549" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1192615" ref_url="https://bugzilla.suse.com/1192615" source="BUGZILLA"/>
		<reference ref_id="1195779" ref_url="https://bugzilla.suse.com/1195779" source="BUGZILLA"/>
		<reference ref_id="1195780" ref_url="https://bugzilla.suse.com/1195780" source="BUGZILLA"/>
		<reference ref_id="1195781" ref_url="https://bugzilla.suse.com/1195781" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0127" ref_url="https://www.suse.com/security/cve/CVE-2021-0127/" source="CVE"/>
		<reference ref_id="CVE-2021-0145" ref_url="https://www.suse.com/security/cve/CVE-2021-0145/" source="CVE"/>
		<reference ref_id="CVE-2021-0146" ref_url="https://www.suse.com/security/cve/CVE-2021-0146/" source="CVE"/>
		<reference ref_id="CVE-2021-33120" ref_url="https://www.suse.com/security/cve/CVE-2021-33120/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010308.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220207 release.

- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)
- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)
- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)
- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)

- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)
- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-25"/>
	<updated date="2022-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192615">SUSE bug 1192615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195779">SUSE bug 1195779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195780">SUSE bug 1195780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195781">SUSE bug 1195781</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0127/">CVE-2021-0127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0127">CVE-2021-0127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0145/">CVE-2021-0145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0145">CVE-2021-0145 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0146/">CVE-2021-0146 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0146">CVE-2021-0146 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33120/">CVE-2021-33120 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33120">CVE-2021-33120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667937" comment="ucode-intel-20220207-13.93.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150550" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1193942" ref_url="https://bugzilla.suse.com/1193942" source="BUGZILLA"/>
		<reference ref_id="1193943" ref_url="https://bugzilla.suse.com/1193943" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44224" ref_url="https://www.suse.com/security/cve/CVE-2021-44224/" source="CVE"/>
		<reference ref_id="CVE-2021-44790" ref_url="https://www.suse.com/security/cve/CVE-2021-44790/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010001.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-44224: Fixed NULL dereference or SSRF in forward proxy configurations. (bsc#1193943)
- CVE-2021-44790: Fixed buffer overflow when parsing multipart content in mod_lua. (bsc#1193942)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-12"/>
	<updated date="2022-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193942">SUSE bug 1193942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193943">SUSE bug 1193943</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44224/">CVE-2021-44224 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44224">CVE-2021-44224 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44790/">CVE-2021-44790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44790">CVE-2021-44790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663241" comment="apache2-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663071" comment="apache2-doc-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663242" comment="apache2-example-pages-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663243" comment="apache2-prefork-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663244" comment="apache2-utils-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663245" comment="apache2-worker-2.4.23-29.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150551" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010322.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

-  CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24407">CVE-2022-24407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670410" comment="cyrus-sasl-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670411" comment="cyrus-sasl-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670412" comment="cyrus-sasl-crammd5-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670413" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670414" comment="cyrus-sasl-digestmd5-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670415" comment="cyrus-sasl-gssapi-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670416" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670417" comment="cyrus-sasl-otp-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670418" comment="cyrus-sasl-otp-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670419" comment="cyrus-sasl-plain-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670420" comment="cyrus-sasl-plain-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670421" comment="libsasl2-3-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670422" comment="libsasl2-3-32bit-2.1.26-8.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150552" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 42 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010328.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_153 fixes several issues.

The following security issues were fixed:

- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
- CVE-2021-28688: Fixed XSA-365 that includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains (bsc#1182294).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0920">CVE-2021-0920 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721293" comment="kernel-default 4.4.180-94.153 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719634" comment="kgraft-patch-4_4_180-94_153-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009670238" comment="kgraft-patch-4_4_180-94_153-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150553" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010327.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_150 fixes one issue.

The following security issue was fixed:

- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0920">CVE-2021-0920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721291" comment="kernel-default 4.4.180-94.150 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719630" comment="kgraft-patch-4_4_180-94_150-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009670237" comment="kgraft-patch-4_4_180-94_150-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150554" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010327.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes one issue.

The following security issue was fixed:

- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0920">CVE-2021-0920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009670236" comment="kgraft-patch-4_4_180-94_147-default-9-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150555" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010327.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes one issue.

The following security issue was fixed:

- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0920">CVE-2021-0920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009670235" comment="kgraft-patch-4_4_180-94_144-default-12-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150556" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010327.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes one issue.

The following security issue was fixed:

- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0920">CVE-2021-0920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009670234" comment="kgraft-patch-4_4_180-94_141-default-15-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150557" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1195064" ref_url="https://bugzilla.suse.com/1195064" source="BUGZILLA"/>
		<reference ref_id="1195735" ref_url="https://bugzilla.suse.com/1195735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30934" ref_url="https://www.suse.com/security/cve/CVE-2021-30934/" source="CVE"/>
		<reference ref_id="CVE-2021-30936" ref_url="https://www.suse.com/security/cve/CVE-2021-30936/" source="CVE"/>
		<reference ref_id="CVE-2021-30951" ref_url="https://www.suse.com/security/cve/CVE-2021-30951/" source="CVE"/>
		<reference ref_id="CVE-2021-30952" ref_url="https://www.suse.com/security/cve/CVE-2021-30952/" source="CVE"/>
		<reference ref_id="CVE-2021-30953" ref_url="https://www.suse.com/security/cve/CVE-2021-30953/" source="CVE"/>
		<reference ref_id="CVE-2021-30954" ref_url="https://www.suse.com/security/cve/CVE-2021-30954/" source="CVE"/>
		<reference ref_id="CVE-2021-30984" ref_url="https://www.suse.com/security/cve/CVE-2021-30984/" source="CVE"/>
		<reference ref_id="CVE-2021-45481" ref_url="https://www.suse.com/security/cve/CVE-2021-45481/" source="CVE"/>
		<reference ref_id="CVE-2021-45482" ref_url="https://www.suse.com/security/cve/CVE-2021-45482/" source="CVE"/>
		<reference ref_id="CVE-2021-45483" ref_url="https://www.suse.com/security/cve/CVE-2021-45483/" source="CVE"/>
		<reference ref_id="CVE-2022-22589" ref_url="https://www.suse.com/security/cve/CVE-2022-22589/" source="CVE"/>
		<reference ref_id="CVE-2022-22590" ref_url="https://www.suse.com/security/cve/CVE-2022-22590/" source="CVE"/>
		<reference ref_id="CVE-2022-22592" ref_url="https://www.suse.com/security/cve/CVE-2022-22592/" source="CVE"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010335.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.34.5 (bsc#1195735):

- CVE-2022-22589: A validation issue was addressed with improved input sanitization.
- CVE-2022-22590: A use after free issue was addressed with improved memory management.
- CVE-2022-22592: A logic issue was addressed with improved state management.

Update to version 2.34.4 (bsc#1195064):

- CVE-2021-30934: A buffer overflow issue was addressed with improved memory handling.
- CVE-2021-30936: A use after free issue was addressed with improved memory management.
- CVE-2021-30951: A use after free issue was addressed with improved memory management.
- CVE-2021-30952: An integer overflow was addressed with improved input validation.
- CVE-2021-30953: An out-of-bounds read was addressed with improved bounds checking.
- CVE-2021-30954: A type confusion issue was addressed with improved memory handling.
- CVE-2021-30984: A race condition was addressed with improved state handling.
- CVE-2022-22594: A cross-origin issue in the IndexDB API was addressed with improved input validation.

The following CVEs were addressed in a previous update:

- CVE-2021-45481: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create.
- CVE-2021-45482: A use-after-free in WebCore::ContainerNode::firstChild.
- CVE-2021-45483: A use-after-free in WebCore::Frame::page.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195735">SUSE bug 1195735</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30934/">CVE-2021-30934 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30934">CVE-2021-30934 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30936/">CVE-2021-30936 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30936">CVE-2021-30936 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30951/">CVE-2021-30951 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30951">CVE-2021-30951 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30952/">CVE-2021-30952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30952">CVE-2021-30952 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30953/">CVE-2021-30953 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30953">CVE-2021-30953 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30954/">CVE-2021-30954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30954">CVE-2021-30954 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30984/">CVE-2021-30984 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30984">CVE-2021-30984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45481/">CVE-2021-45481 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45481">CVE-2021-45481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45482/">CVE-2021-45482 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45482">CVE-2021-45482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45483/">CVE-2021-45483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45483">CVE-2021-45483 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-22589/">CVE-2022-22589 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22589">CVE-2022-22589 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22590/">CVE-2022-22590 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22590">CVE-2022-22590 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22592/">CVE-2022-22592 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22592">CVE-2022-22592 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22594">CVE-2022-22594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669722" comment="libjavascriptcoregtk-4_0-18-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669723" comment="libwebkit2gtk-4_0-37-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669688" comment="libwebkit2gtk3-lang-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669724" comment="typelib-1_0-JavaScriptCore-4_0-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669725" comment="typelib-1_0-WebKit2-4_0-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669693" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669726" comment="webkit2gtk-4_0-injected-bundles-2.34.5-2.85.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150558" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196026" ref_url="https://bugzilla.suse.com/1196026" source="BUGZILLA"/>
		<reference ref_id="1196168" ref_url="https://bugzilla.suse.com/1196168" source="BUGZILLA"/>
		<reference ref_id="1196169" ref_url="https://bugzilla.suse.com/1196169" source="BUGZILLA"/>
		<reference ref_id="1196171" ref_url="https://bugzilla.suse.com/1196171" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010336.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">CVE-2022-25313 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25314">CVE-2022-25314 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669428" comment="expat-2.1.0-21.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669429" comment="libexpat1-2.1.0-21.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669430" comment="libexpat1-32bit-2.1.0-21.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150559" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1089030" ref_url="https://bugzilla.suse.com/1089030" source="BUGZILLA"/>
		<reference ref_id="1163882" ref_url="https://bugzilla.suse.com/1163882" source="BUGZILLA"/>
		<reference ref_id="1196435" ref_url="https://bugzilla.suse.com/1196435" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1100" ref_url="https://www.suse.com/security/cve/CVE-2018-1100/" source="CVE"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<reference ref_id="CVE-2021-45444" ref_url="https://www.suse.com/security/cve/CVE-2021-45444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010368.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2021-45444: Fixed a vulnerability where arbitrary shell commands could be 
  executed related to prompt expansion (bsc#1196435).
- CVE-2019-20044: Fixed a vulnerability where shell privileges would not be
  properly dropped when unsetting the PRIVILEGED option (bsc#1163882).
- CVE-2018-1100: Fixed a potential code execution via a stack-based buffer
  overflow in utils.c:checkmailpath() (bsc#1089030).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1089030">SUSE bug 1089030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196435">SUSE bug 1196435</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1100/">CVE-2018-1100 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1100">CVE-2018-1100 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20044">CVE-2019-20044 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45444/">CVE-2021-45444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45444">CVE-2021-45444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670832" comment="zsh-5.0.5-6.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150560" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1146312" ref_url="https://bugzilla.suse.com/1146312" source="BUGZILLA"/>
		<reference ref_id="1185973" ref_url="https://bugzilla.suse.com/1185973" source="BUGZILLA"/>
		<reference ref_id="1191580" ref_url="https://bugzilla.suse.com/1191580" source="BUGZILLA"/>
		<reference ref_id="1193731" ref_url="https://bugzilla.suse.com/1193731" source="BUGZILLA"/>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="1195536" ref_url="https://bugzilla.suse.com/1195536" source="BUGZILLA"/>
		<reference ref_id="1195543" ref_url="https://bugzilla.suse.com/1195543" source="BUGZILLA"/>
		<reference ref_id="1195612" ref_url="https://bugzilla.suse.com/1195612" source="BUGZILLA"/>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195939" ref_url="https://bugzilla.suse.com/1195939" source="BUGZILLA"/>
		<reference ref_id="1196079" ref_url="https://bugzilla.suse.com/1196079" source="BUGZILLA"/>
		<reference ref_id="1196612" ref_url="https://bugzilla.suse.com/1196612" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10905" ref_url="https://www.suse.com/security/cve/CVE-2016-10905/" source="CVE"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.


Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc (bsc#1193731).
- CVE-2016-10905: Fixed a use-after-free is gfs2_clear_rgrpd() and read_rindex_entry() (bsc#1146312).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-08"/>
	<updated date="2022-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146312">SUSE bug 1146312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185973">SUSE bug 1185973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193731">SUSE bug 1193731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195536">SUSE bug 1195536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195612">SUSE bug 1195612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195939">SUSE bug 1195939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10905/">CVE-2016-10905 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10905">CVE-2016-10905 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0920">CVE-2021-0920 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0002">CVE-2022-0002 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0617">CVE-2022-0617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24448">CVE-2022-24448 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671796" comment="kernel-default-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671797" comment="kernel-default-base-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671798" comment="kernel-default-devel-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671767" comment="kernel-default-kgraft-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671799" comment="kernel-default-man-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671768" comment="kernel-devel-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671769" comment="kernel-macros-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671770" comment="kernel-source-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671800" comment="kernel-syms-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671772" comment="kgraft-patch-4_4_180-94_156-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150561" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1196809" ref_url="https://bugzilla.suse.com/1196809" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010408.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):

- CVE-2022-26485: Use-after-free in XSLT parameter processing
- CVE-2022-26486: Use-after-free in WebGPU IPC Framework
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26485">CVE-2022-26485 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26486">CVE-2022-26486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671826" comment="MozillaFirefox-91.6.1-112.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671780" comment="MozillaFirefox-devel-91.6.1-112.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671827" comment="MozillaFirefox-translations-common-91.6.1-112.92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150562" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22620" ref_url="https://www.suse.com/security/cve/CVE-2022-22620/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010419.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.34.6 (bsc#1196133):

- CVE-2022-22620: Processing maliciously crafted web content may have lead to arbitrary code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-11"/>
	<updated date="2022-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22620/">CVE-2022-22620 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22620">CVE-2022-22620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670872" comment="libjavascriptcoregtk-4_0-18-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670873" comment="libwebkit2gtk-4_0-37-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670802" comment="libwebkit2gtk3-lang-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670874" comment="typelib-1_0-JavaScriptCore-4_0-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670875" comment="typelib-1_0-WebKit2-4_0-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670809" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670876" comment="webkit2gtk-4_0-injected-bundles-2.34.6-2.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150563" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1184751" ref_url="https://bugzilla.suse.com/1184751" source="BUGZILLA"/>
		<reference ref_id="1184752" ref_url="https://bugzilla.suse.com/1184752" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010432.html" source="SUSE-SU"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-30498, CVE-2021-30499: If an image has a size of 0x0, when exporting, no 
  data is written and space is allocated for the header only, not taking into
  account that sprintf appends a NUL byte (bsc#1184751, bsc#1184752).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184751">SUSE bug 1184751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184752">SUSE bug 1184752</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30498">CVE-2021-30498 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30499">CVE-2021-30499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670877" comment="libcaca0-0.99.beta18-14.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150564" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1196900" ref_url="https://bugzilla.suse.com/1196900" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010434.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):

- CVE-2022-26383: Browser window spoof using fullscreen mode
- CVE-2022-26384: iframe allow-scripts sandbox bypass
- CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures
- CVE-2022-26381: Use-after-free in text reflows
- CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26381">CVE-2022-26381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26383">CVE-2022-26383 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26384">CVE-2022-26384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26386">CVE-2022-26386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26387">CVE-2022-26387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672592" comment="MozillaFirefox-91.7.0-112.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672566" comment="MozillaFirefox-devel-91.7.0-112.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672593" comment="MozillaFirefox-translations-common-91.7.0-112.95.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150565" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196784" ref_url="https://bugzilla.suse.com/1196784" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010442.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671284" comment="expat-2.1.0-21.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671285" comment="libexpat1-2.1.0-21.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671286" comment="libexpat1-32bit-2.1.0-21.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150566" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010449.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673337" comment="libopenssl-devel-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673338" comment="libopenssl1_0_0-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673339" comment="libopenssl1_0_0-32bit-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673340" comment="libopenssl1_0_0-hmac-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673341" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673342" comment="openssl-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673027" comment="openssl-doc-1.0.2j-60.75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150567" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1193314" ref_url="https://bugzilla.suse.com/1193314" source="BUGZILLA"/>
		<reference ref_id="1193444" ref_url="https://bugzilla.suse.com/1193444" source="BUGZILLA"/>
		<reference ref_id="1193491" ref_url="https://bugzilla.suse.com/1193491" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1195163" ref_url="https://bugzilla.suse.com/1195163" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u322 (icedtea-3.22.0)

Including the following security fixes:

- CVE-2022-21248, bsc#1194926: Enhance cross VM serialization
- CVE-2022-21283, bsc#1194937: Better String matching
- CVE-2022-21293, bsc#1194935: Improve String constructions
- CVE-2022-21294, bsc#1194934: Enhance construction of Identity maps
- CVE-2022-21282, bsc#1194933: Better resolution of URIs
- CVE-2022-21296, bsc#1194932: Improve SAX Parser configuration management
- CVE-2022-21299, bsc#1194931: Improved scanning of XML entities
- CVE-2022-21305, bsc#1194939: Better array indexing
- CVE-2022-21340, bsc#1194940: Verify Jar Verification
- CVE-2022-21341, bsc#1194941: Improve serial forms for transport
- CVE-2022-21349: Improve Solaris font rendering
- CVE-2022-21360, bsc#1194929: Enhance BMP image support
- CVE-2022-21365, bsc#1194928: Enhanced BMP processing
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193314">SUSE bug 1193314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193444">SUSE bug 1193444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193491">SUSE bug 1193491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195163">SUSE bug 1195163</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21349">CVE-2022-21349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672588" comment="java-1_8_0-openjdk-1.8.0.322-27.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672589" comment="java-1_8_0-openjdk-demo-1.8.0.322-27.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672590" comment="java-1_8_0-openjdk-devel-1.8.0.322-27.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672591" comment="java-1_8_0-openjdk-headless-1.8.0.322-27.72.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150568" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1194640" ref_url="https://bugzilla.suse.com/1194640" source="BUGZILLA"/>
		<reference ref_id="1194768" ref_url="https://bugzilla.suse.com/1194768" source="BUGZILLA"/>
		<reference ref_id="1194770" ref_url="https://bugzilla.suse.com/1194770" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010485.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2022-23219: Fixed buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768)
- CVE-2022-23218: Fixed buffer overflow in sunrpc svcunix_create (bsc#1194770)
- CVE-2021-3999: Fixed getcwd to set errno to ERANGE for size == 1 (bsc#1194640)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3999">CVE-2021-3999 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">CVE-2022-23218 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">CVE-2022-23219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674037" comment="glibc-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674038" comment="glibc-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674039" comment="glibc-devel-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674040" comment="glibc-devel-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673013" comment="glibc-html-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673014" comment="glibc-i18ndata-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673015" comment="glibc-info-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674041" comment="glibc-locale-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674042" comment="glibc-locale-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674043" comment="glibc-profile-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674044" comment="glibc-profile-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674045" comment="nscd-2.22-119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150569" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1197091" ref_url="https://bugzilla.suse.com/1197091" source="BUGZILLA"/>
		<reference ref_id="1197095" ref_url="https://bugzilla.suse.com/1197095" source="BUGZILLA"/>
		<reference ref_id="1197096" ref_url="https://bugzilla.suse.com/1197096" source="BUGZILLA"/>
		<reference ref_id="1197098" ref_url="https://bugzilla.suse.com/1197098" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22719" ref_url="https://www.suse.com/security/cve/CVE-2022-22719/" source="CVE"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<reference ref_id="CVE-2022-23943" ref_url="https://www.suse.com/security/cve/CVE-2022-23943/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010494.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-23943: heap out-of-bounds write in mod_sed (bsc#1197098).
- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22719: use of uninitialized value of in r:parsebody in mod_lua (bsc#1197091).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197091">SUSE bug 1197091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197098">SUSE bug 1197098</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22719/">CVE-2022-22719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22719">CVE-2022-22719 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22720">CVE-2022-22720 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22721">CVE-2022-22721 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23943/">CVE-2022-23943 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23943">CVE-2022-23943 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674046" comment="apache2-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673736" comment="apache2-doc-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674047" comment="apache2-example-pages-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674048" comment="apache2-prefork-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674049" comment="apache2-utils-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674050" comment="apache2-worker-2.4.23-29.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150570" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1136570" ref_url="https://bugzilla.suse.com/1136570" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1606-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005832.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- Fix the previous fix for CVE-2019-3860 (bsc#1136570, bsc#1128481)
  (Out-of-bounds reads with specially crafted SFTP packets)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-21"/>
	<updated date="2019-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3860">CVE-2019-3860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521526" comment="libssh2-1-1.4.3-20.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521924" comment="libssh2-1-32bit-1.4.3-20.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150571" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1138034" ref_url="https://bugzilla.suse.com/1138034" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1783-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005776.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 to version 10.9 fixes the following issue:

Security issue fixed:	  

- CVE-2019-10164: Fixed buffer-overflow vulnerabilities in SCRAM verifier parsing (bsc#1138034).

More information at https://www.postgresql.org/docs/10/release-10-9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-05"/>
	<updated date="2019-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138034">SUSE bug 1138034</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10164">CVE-2019-10164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521936" comment="libecpg6-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521937" comment="libpq5-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521938" comment="libpq5-32bit-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521939" comment="postgresql10-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530575" comment="postgresql10-contrib-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530576" comment="postgresql10-docs-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530577" comment="postgresql10-plperl-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530578" comment="postgresql10-plpython-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530579" comment="postgresql10-pltcl-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530580" comment="postgresql10-server-10.9-1.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150572" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1139959" ref_url="https://bugzilla.suse.com/1139959" source="BUGZILLA"/>
		<reference ref_id="1140122" ref_url="https://bugzilla.suse.com/1140122" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13012" ref_url="https://www.suse.com/security/cve/CVE-2019-13012/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1830-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005822.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

Security issue fixed:

- CVE-2019-13012: Fixed improper restriction of file permissions when creating directories (bsc#1139959).

Non-security issue fixed:

- Added explicit requires between libglib2 and libgio2 (bsc#1140122).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-16"/>
	<updated date="2019-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139959">SUSE bug 1139959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140122">SUSE bug 1140122</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13012/">CVE-2019-13012 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13012">CVE-2019-13012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521943" comment="glib2-lang-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521944" comment="glib2-tools-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521945" comment="libgio-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521946" comment="libgio-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521948" comment="libglib-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521949" comment="libglib-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521950" comment="libgmodule-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521951" comment="libgmodule-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521952" comment="libgobject-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521953" comment="libgobject-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521954" comment="libgthread-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521955" comment="libgthread-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150573" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes the following issues:

MozillaFirefox to version ESR 60.8:

- CVE-2019-9811: Sandbox escape via installation of malicious language pack (bsc#1140868).
- CVE-2019-11711: Script injection within domain through inner window reuse (bsc#1140868).
- CVE-2019-11712: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (bsc#1140868).
- CVE-2019-11713: Use-after-free with HTTP/2 cached stream (bsc#1140868).
- CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (bsc#1140868).
- CVE-2019-11715: HTML parsing error can contribute to content XSS (bsc#1140868).
- CVE-2019-11717: Caret character improperly escaped in origins (bsc#1140868).
- CVE-2019-11719: Out-of-bounds read when importing curve25519 private key (bsc#1140868).
- CVE-2019-11730: Same-origin policy treats all files in a directory as having the same-origin (bsc#1140868).
- CVE-2019-11709: Multiple Memory safety bugs fixed (bsc#1140868).

mozilla-nss to version 3.44.1:

* Added IPSEC IKE support to softoken 
* Many new FIPS test cases
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-17"/>
	<updated date="2019-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521974" comment="MozillaFirefox-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521975" comment="MozillaFirefox-translations-common-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530590" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530591" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530592" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530593" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150574" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

---- updated platforms ------------------------------------
SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061d-&gt;0000061f Xeon E3/E5, Core X
SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000714-&gt;00000718 Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150575" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1127223" ref_url="https://bugzilla.suse.com/1127223" source="BUGZILLA"/>
		<reference ref_id="1127308" ref_url="https://bugzilla.suse.com/1127308" source="BUGZILLA"/>
		<reference ref_id="1128574" ref_url="https://bugzilla.suse.com/1128574" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155/" source="CVE"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1958-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005821.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2019-9169: Fixed a heap-based buffer over-read via an attempted case-insensitive regular-expression match (bsc#1127308).
- CVE-2009-5155: Fixed a denial of service in parse_reg_exp() (bsc#1127223).

Non-security issues fixed:

- Added cfi information for start routines in order to stop unwinding on S390 (bsc#1128574).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-16"/>
	<updated date="2019-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127223">SUSE bug 1127223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127308">SUSE bug 1127308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128574">SUSE bug 1128574</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-5155">CVE-2009-5155 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9169">CVE-2019-9169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530595" comment="glibc-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530596" comment="glibc-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530597" comment="glibc-devel-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530598" comment="glibc-devel-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530599" comment="glibc-html-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530600" comment="glibc-i18ndata-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530601" comment="glibc-info-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530602" comment="glibc-locale-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530603" comment="glibc-locale-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530604" comment="glibc-profile-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530605" comment="glibc-profile-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530606" comment="nscd-2.22-62.22.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150576" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005756.html" source="SUSE-SU"/>
		<description>
This update for bzip2 fixes the following issues:

- Fixed a regression with the fix for CVE-2019-12900, which caused incompatibilities
  with files that used many selectors (bsc#1139083).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-29"/>
	<updated date="2019-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522027" comment="bzip2-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530613" comment="bzip2-doc-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522028" comment="libbz2-1-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522029" comment="libbz2-1-32bit-1.0.6-30.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150577" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1121826" ref_url="https://bugzilla.suse.com/1121826" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005768.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2019-6133: Fixed improper caching of auth decisions, which could bypass 
  uid checking in the interactive backend (bsc#1121826).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-01"/>
	<updated date="2019-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6133">CVE-2019-6133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522035" comment="libpolkit0-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522037" comment="polkit-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522038" comment="typelib-1_0-Polkit-1_0-0.113-5.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150578" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1115375" ref_url="https://bugzilla.suse.com/1115375" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141784" ref_url="https://bugzilla.suse.com/1141784" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141786" ref_url="https://bugzilla.suse.com/1141786" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2842" ref_url="https://www.suse.com/security/cve/CVE-2019-2842/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u222 fixes the following issues:

Security issues fixed:

- CVE-2019-2745: Improved ECC Implementation (bsc#1141784).
- CVE-2019-2762: Exceptional throw cases (bsc#1141782).
- CVE-2019-2766: Improve file protocol handling (bsc#1141789).
- CVE-2019-2769: Better copies of CopiesList (bsc#1141783).
- CVE-2019-2786: More limited privilege usage (bsc#1141787).
- CVE-2019-2816: Normalize normalization (bsc#1141785).
- CVE-2019-2842: Extended AES support (bsc#1141786).
- CVE-2019-7317: Improve PNG support (bsc#1141780).
- Certificate validation improvements

Non-security issue fixed:

- Fixed an issue where the installation failed when the manpages are not present (bsc#1115375)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-01"/>
	<updated date="2019-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115375">SUSE bug 1115375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141784">SUSE bug 1141784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141786">SUSE bug 1141786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2745">CVE-2019-2745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2786">CVE-2019-2786 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2842/">CVE-2019-2842 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2842">CVE-2019-2842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530614" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530615" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150579" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1109663" ref_url="https://bugzilla.suse.com/1109663" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2053-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005825.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-14647: Fixed a denial of service vulnerability caused by a crafted XML document (bsc#1109847).
- CVE-2018-1000802: Fixed a command injection in the shutil module (bsc#1109663).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-16"/>
	<updated date="2019-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000802">CVE-2018-1000802 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522041" comment="libpython3_4m1_0-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522042" comment="python3-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522043" comment="python3-base-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522044" comment="python3-curses-3.4.6-25.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150580" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1133037" ref_url="https://bugzilla.suse.com/1133037" source="BUGZILLA"/>
		<reference ref_id="1141619" ref_url="https://bugzilla.suse.com/1141619" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005797.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issues:

Security issues fixed: 	  

- CVE-2019-11459: Fixed an improper error handling in which could have led to use of uninitialized use of memory (bsc#1133037).
- CVE-2019-1010006: Fixed a buffer overflow in backend/tiff/tiff-document.c (bsc#1141619).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-07"/>
	<updated date="2019-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141619">SUSE bug 1141619</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010006">CVE-2019-1010006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11459">CVE-2019-11459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522052" comment="evince-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522053" comment="evince-browser-plugin-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522054" comment="evince-lang-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522055" comment="evince-plugin-djvudocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522056" comment="evince-plugin-dvidocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522057" comment="evince-plugin-pdfdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522058" comment="evince-plugin-psdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522059" comment="evince-plugin-tiffdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522060" comment="evince-plugin-xpsdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522061" comment="libevdocument3-4-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522062" comment="libevview3-3-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522063" comment="nautilus-evince-3.20.2-6.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150581" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1140738" ref_url="https://bugzilla.suse.com/1140738" source="BUGZILLA"/>
		<reference ref_id="1141329" ref_url="https://bugzilla.suse.com/1141329" source="BUGZILLA"/>
		<reference ref_id="1141332" ref_url="https://bugzilla.suse.com/1141332" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525/" source="CVE"/>
		<reference ref_id="CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529/" source="CVE"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005801.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

Security issue fixed:

- CVE-2019-12529: Fixed a potential denial of service associated with HTTP Basic Authentication credentials (bsc#1141329).
- CVE-2019-12525: Fixed a denial of service during processing of HTTP Digest Authentication credentials (bsc#1141332).
- CVE-2019-13345: Fixed a cross site scripting vulnerability via user_name or auth parameter in cachemgr.cgi (bsc#1140738).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-08"/>
	<updated date="2019-08-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141329">SUSE bug 1141329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141332">SUSE bug 1141332</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12525">CVE-2019-12525 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12529">CVE-2019-12529 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13345">CVE-2019-13345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530622" comment="squid-3.5.21-26.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150582" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005803.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-20852: Fixed an information leak where cookies could be send to the wrong server because of incorrect domain validation (bsc#1141853).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-23"/>
	<updated date="2019-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522067" comment="libpython2_7-1_0-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522068" comment="libpython2_7-1_0-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522069" comment="python-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530623" comment="python-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522070" comment="python-base-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530624" comment="python-base-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522071" comment="python-curses-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530625" comment="python-demo-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522072" comment="python-devel-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530626" comment="python-doc-2.7.13-28.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530627" comment="python-doc-pdf-2.7.13-28.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530628" comment="python-gdbm-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530629" comment="python-idle-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522073" comment="python-tk-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522074" comment="python-xml-2.7.13-28.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150583" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005834.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:                    
                                                                                          
Security issue fixed:                                                                                 
                                                                                  
- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-10208">CVE-2019-10208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530671" comment="postgresql96-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530672" comment="postgresql96-contrib-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530673" comment="postgresql96-docs-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530674" comment="postgresql96-plperl-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530675" comment="postgresql96-plpython-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530676" comment="postgresql96-pltcl-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530677" comment="postgresql96-server-9.6.15-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150584" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1133719" ref_url="https://bugzilla.suse.com/1133719" source="BUGZILLA"/>
		<reference ref_id="1138301" ref_url="https://bugzilla.suse.com/1138301" source="BUGZILLA"/>
		<reference ref_id="1138303" ref_url="https://bugzilla.suse.com/1138303" source="BUGZILLA"/>
		<reference ref_id="1138734" ref_url="https://bugzilla.suse.com/1138734" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<reference ref_id="CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2227-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005908.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path
  parameter pointing anywhere on the system and potentially leading to execution
  of a malicious file with root privileges by libvirtd (bsc#1138301).
- CVE-2019-10167: Fixed an issue with virConnectGetDomainCapabilities API which
  could have been used to execute arbitrary emulators (bsc#1138303).

Non-security issues fixed:

- Fixed an issue with short bitmaps when setting vcpu affinity using the vcpupin (bsc#1138734).
- Added support for overriding max threads per process limit (bsc#1133719)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-11"/>
	<updated date="2019-09-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133719">SUSE bug 1133719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138303">SUSE bug 1138303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138734">SUSE bug 1138734</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10161">CVE-2019-10161 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10167">CVE-2019-10167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555647" comment="libvirt-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555648" comment="libvirt-admin-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555649" comment="libvirt-client-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555650" comment="libvirt-daemon-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555651" comment="libvirt-daemon-config-network-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555652" comment="libvirt-daemon-config-nwfilter-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555653" comment="libvirt-daemon-driver-interface-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538264" comment="libvirt-daemon-driver-libxl-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555654" comment="libvirt-daemon-driver-lxc-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555655" comment="libvirt-daemon-driver-network-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555656" comment="libvirt-daemon-driver-nodedev-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555657" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555658" comment="libvirt-daemon-driver-qemu-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555659" comment="libvirt-daemon-driver-secret-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555660" comment="libvirt-daemon-driver-storage-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555661" comment="libvirt-daemon-driver-storage-core-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555662" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555663" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555664" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555665" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538277" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555666" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555667" comment="libvirt-daemon-hooks-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555668" comment="libvirt-daemon-lxc-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555669" comment="libvirt-daemon-qemu-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538282" comment="libvirt-daemon-xen-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555670" comment="libvirt-doc-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555671" comment="libvirt-libs-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555672" comment="libvirt-lock-sanlock-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555673" comment="libvirt-nss-3.3.0-5.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150585" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1106061" ref_url="https://bugzilla.suse.com/1106061" source="BUGZILLA"/>
		<reference ref_id="1123161" ref_url="https://bugzilla.suse.com/1123161" source="BUGZILLA"/>
		<reference ref_id="1125674" ref_url="https://bugzilla.suse.com/1125674" source="BUGZILLA"/>
		<reference ref_id="1127034" ref_url="https://bugzilla.suse.com/1127034" source="BUGZILLA"/>
		<reference ref_id="1128977" ref_url="https://bugzilla.suse.com/1128977" source="BUGZILLA"/>
		<reference ref_id="1130972" ref_url="https://bugzilla.suse.com/1130972" source="BUGZILLA"/>
		<reference ref_id="1133860" ref_url="https://bugzilla.suse.com/1133860" source="BUGZILLA"/>
		<reference ref_id="1134399" ref_url="https://bugzilla.suse.com/1134399" source="BUGZILLA"/>
		<reference ref_id="1135335" ref_url="https://bugzilla.suse.com/1135335" source="BUGZILLA"/>
		<reference ref_id="1135365" ref_url="https://bugzilla.suse.com/1135365" source="BUGZILLA"/>
		<reference ref_id="1137584" ref_url="https://bugzilla.suse.com/1137584" source="BUGZILLA"/>
		<reference ref_id="1139358" ref_url="https://bugzilla.suse.com/1139358" source="BUGZILLA"/>
		<reference ref_id="1139826" ref_url="https://bugzilla.suse.com/1139826" source="BUGZILLA"/>
		<reference ref_id="1140652" ref_url="https://bugzilla.suse.com/1140652" source="BUGZILLA"/>
		<reference ref_id="1140903" ref_url="https://bugzilla.suse.com/1140903" source="BUGZILLA"/>
		<reference ref_id="1140945" ref_url="https://bugzilla.suse.com/1140945" source="BUGZILLA"/>
		<reference ref_id="1141181" ref_url="https://bugzilla.suse.com/1141181" source="BUGZILLA"/>
		<reference ref_id="1141401" ref_url="https://bugzilla.suse.com/1141401" source="BUGZILLA"/>
		<reference ref_id="1141402" ref_url="https://bugzilla.suse.com/1141402" source="BUGZILLA"/>
		<reference ref_id="1141452" ref_url="https://bugzilla.suse.com/1141452" source="BUGZILLA"/>
		<reference ref_id="1141453" ref_url="https://bugzilla.suse.com/1141453" source="BUGZILLA"/>
		<reference ref_id="1141454" ref_url="https://bugzilla.suse.com/1141454" source="BUGZILLA"/>
		<reference ref_id="1142023" ref_url="https://bugzilla.suse.com/1142023" source="BUGZILLA"/>
		<reference ref_id="1142254" ref_url="https://bugzilla.suse.com/1142254" source="BUGZILLA"/>
		<reference ref_id="1142857" ref_url="https://bugzilla.suse.com/1142857" source="BUGZILLA"/>
		<reference ref_id="1143045" ref_url="https://bugzilla.suse.com/1143045" source="BUGZILLA"/>
		<reference ref_id="1143048" ref_url="https://bugzilla.suse.com/1143048" source="BUGZILLA"/>
		<reference ref_id="1143189" ref_url="https://bugzilla.suse.com/1143189" source="BUGZILLA"/>
		<reference ref_id="1143191" ref_url="https://bugzilla.suse.com/1143191" source="BUGZILLA"/>
		<reference ref_id="1143333" ref_url="https://bugzilla.suse.com/1143333" source="BUGZILLA"/>
		<reference ref_id="1144257" ref_url="https://bugzilla.suse.com/1144257" source="BUGZILLA"/>
		<reference ref_id="1144273" ref_url="https://bugzilla.suse.com/1144273" source="BUGZILLA"/>
		<reference ref_id="1144288" ref_url="https://bugzilla.suse.com/1144288" source="BUGZILLA"/>
		<reference ref_id="1144920" ref_url="https://bugzilla.suse.com/1144920" source="BUGZILLA"/>
		<reference ref_id="1145920" ref_url="https://bugzilla.suse.com/1145920" source="BUGZILLA"/>
		<reference ref_id="1145922" ref_url="https://bugzilla.suse.com/1145922" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20855" ref_url="https://www.suse.com/security/cve/CVE-2018-20855/" source="CVE"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10207" ref_url="https://www.suse.com/security/cve/CVE-2019-10207/" source="CVE"/>
		<reference ref_id="CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125/" source="CVE"/>
		<reference ref_id="CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810/" source="CVE"/>
		<reference ref_id="CVE-2019-13631" ref_url="https://www.suse.com/security/cve/CVE-2019-13631/" source="CVE"/>
		<reference ref_id="CVE-2019-13648" ref_url="https://www.suse.com/security/cve/CVE-2019-13648/" source="CVE"/>
		<reference ref_id="CVE-2019-14283" ref_url="https://www.suse.com/security/cve/CVE-2019-14283/" source="CVE"/>
		<reference ref_id="CVE-2019-14284" ref_url="https://www.suse.com/security/cve/CVE-2019-14284/" source="CVE"/>
		<reference ref_id="CVE-2019-15117" ref_url="https://www.suse.com/security/cve/CVE-2019-15117/" source="CVE"/>
		<reference ref_id="CVE-2019-15118" ref_url="https://www.suse.com/security/cve/CVE-2019-15118/" source="CVE"/>
		<reference ref_id="CVE-2019-3819" ref_url="https://www.suse.com/security/cve/CVE-2019-3819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).
- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).
- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).
- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).
- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c (bnc#1142254).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).
- CVE-2019-15118: Fixed kernel stack exhaustion in check_input_term in sound/usb/mixer.c via mishandled recursion (bnc#1145922).
- CVE-2019-15117: Fixed out-of-bounds memory access in parse_audio_mixer_unit in sound/usb/mixer.c via mishandled short descriptor (bnc#1145920).
- CVE-2019-3819: A flaw was fixed in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may have enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') could have caused a system lock up and a denial of service (bnc#1123161).
- CVE-2019-10207: Check for missing tty operations in bluetooth/hci_uart (bsc#1142857).
- CVE-2018-20856: Fixed a use-after-free issue in block/blk-core.c, where certain error case are mishandled (bnc#1143048).

The following non-security bugs were fixed:

- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1125674).
- dlm: Fix saving of NULL callbacks (bsc#1135365).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652, bsc#1144288).
- bcache: Revert 'bcache: free heap cache_set-&gt;flush_btree in bch_journal_free' (bsc#1140652, bsc#1144288).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652, bsc#1144288).
- bcache: fix race in btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1130972, bsc#1144257).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1130972, bsc#1144273).
- bcache: performance improvement for btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652, bsc#1144288).
- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
- clocksource: Defer override invalidation unless clock is unstable (bsc#1139826).
- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
- kvmclock: fix TSC calibration for nested guests (bsc#1133860, jsc#PM-1211).
- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945, bsc#1141401, bsc#1141402, bsc#1141452, bsc#1141453, bsc#1141454).
- qla2xxx: performance degradation when enabling blk-mq (bsc#1128977).
- qlge: Deduplicate lbq_buf_size (bsc#1106061).
- qlge: Deduplicate rx buffer queue management (bsc#1106061).
- qlge: Factor out duplicated expression (bsc#1106061).
- qlge: Fix dma_sync_single calls (bsc#1106061).
- qlge: Fix irq masking in INTx mode (bsc#1106061).
- qlge: Refill empty buffer queues from wq (bsc#1106061).
- qlge: Refill rx buffers up to multiple of 16 (bsc#1106061).
- qlge: Remove bq_desc.maplen (bsc#1106061).
- qlge: Remove irq_cnt (bsc#1106061).
- qlge: Remove page_chunk.last_flag (bsc#1106061).
- qlge: Remove qlge_bq.len size (bsc#1106061).
- qlge: Remove rx_ring.sbq_buf_size (bsc#1106061).
- qlge: Remove rx_ring.type (bsc#1106061).
- qlge: Remove useless dma synchronization calls (bsc#1106061).
- qlge: Remove useless memset (bsc#1106061).
- qlge: Replace memset with assignment (bsc#1106061).
- qlge: Update buffer queue prod index despite oom (bsc#1106061).
- rbd: flush rbd_dev-&gt;watch_dwork after watch is unregistered (bsc#1143333).
- rbd: retry watch re-registration periodically (bsc#1143333).
- sched/fair: Do not free p-&gt;numa_faults with concurrent readers (bsc#1144920).
- sched/fair: Use RCU accessors consistently for -&gt;numa_group (bsc#1144920).
- scsi: virtio_scsi: let host do exception handling (bsc#1141181).
- x86: mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- x86: tsc: Add X86_FEATURE_TSC_KNOWN_FREQ flag (bsc#1133860, jsc#PM-1211).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (XSA-300).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106061">SUSE bug 1106061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123161">SUSE bug 1123161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125674">SUSE bug 1125674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127034">SUSE bug 1127034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128977">SUSE bug 1128977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130972">SUSE bug 1130972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133860">SUSE bug 1133860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134399">SUSE bug 1134399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135335">SUSE bug 1135335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135365">SUSE bug 1135365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137584">SUSE bug 1137584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139358">SUSE bug 1139358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139826">SUSE bug 1139826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140652">SUSE bug 1140652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140903">SUSE bug 1140903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140945">SUSE bug 1140945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141181">SUSE bug 1141181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141401">SUSE bug 1141401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141402">SUSE bug 1141402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141452">SUSE bug 1141452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141453">SUSE bug 1141453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141454">SUSE bug 1141454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142023">SUSE bug 1142023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142254">SUSE bug 1142254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142857">SUSE bug 1142857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143045">SUSE bug 1143045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143048">SUSE bug 1143048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143189">SUSE bug 1143189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143333">SUSE bug 1143333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144257">SUSE bug 1144257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144273">SUSE bug 1144273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144288">SUSE bug 1144288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144920">SUSE bug 1144920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145920">SUSE bug 1145920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145922">SUSE bug 1145922</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20855/">CVE-2018-20855 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20855">CVE-2018-20855 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20856">CVE-2018-20856 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10207/">CVE-2019-10207 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10207">CVE-2019-10207 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1125">CVE-2019-1125 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11810">CVE-2019-11810 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13631/">CVE-2019-13631 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13631">CVE-2019-13631 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13648/">CVE-2019-13648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13648">CVE-2019-13648 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14283/">CVE-2019-14283 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14283">CVE-2019-14283 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14284/">CVE-2019-14284 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14284">CVE-2019-14284 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15117/">CVE-2019-15117 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15117">CVE-2019-15117 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15118/">CVE-2019-15118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15118">CVE-2019-15118 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3819/">CVE-2019-3819 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3819">CVE-2019-3819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555674" comment="kernel-default-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555675" comment="kernel-default-base-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555676" comment="kernel-default-devel-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538290" comment="kernel-devel-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538291" comment="kernel-macros-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538292" comment="kernel-source-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555677" comment="kernel-syms-4.4.180-94.103.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150586" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1114674" ref_url="https://bugzilla.suse.com/1114674" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2264-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192264-1.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

Security issue fixed:

- CVE-2018-18311: Fixed integer overflow with oversize environment (bsc#1114674).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1114674">SUSE bug 1114674</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18311">CVE-2018-18311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522096" comment="perl-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522097" comment="perl-32bit-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522098" comment="perl-base-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522099" comment="perl-doc-5.18.2-12.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150587" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp, zypper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1049825" ref_url="https://bugzilla.suse.com/1049825" source="BUGZILLA"/>
		<reference ref_id="1109893" ref_url="https://bugzilla.suse.com/1109893" source="BUGZILLA"/>
		<reference ref_id="1110542" ref_url="https://bugzilla.suse.com/1110542" source="BUGZILLA"/>
		<reference ref_id="1111319" ref_url="https://bugzilla.suse.com/1111319" source="BUGZILLA"/>
		<reference ref_id="1112911" ref_url="https://bugzilla.suse.com/1112911" source="BUGZILLA"/>
		<reference ref_id="1113296" ref_url="https://bugzilla.suse.com/1113296" source="BUGZILLA"/>
		<reference ref_id="1116995" ref_url="https://bugzilla.suse.com/1116995" source="BUGZILLA"/>
		<reference ref_id="1120629" ref_url="https://bugzilla.suse.com/1120629" source="BUGZILLA"/>
		<reference ref_id="1120630" ref_url="https://bugzilla.suse.com/1120630" source="BUGZILLA"/>
		<reference ref_id="1120631" ref_url="https://bugzilla.suse.com/1120631" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1131823" ref_url="https://bugzilla.suse.com/1131823" source="BUGZILLA"/>
		<reference ref_id="1134226" ref_url="https://bugzilla.suse.com/1134226" source="BUGZILLA"/>
		<reference ref_id="1137977" ref_url="https://bugzilla.suse.com/1137977" source="BUGZILLA"/>
		<reference ref_id="1140039" ref_url="https://bugzilla.suse.com/1140039" source="BUGZILLA"/>
		<reference ref_id="1145521" ref_url="https://bugzilla.suse.com/1145521" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<description>
This update for libsolv, libzypp and zypper fixes the following issues:

libsolv was updated to version 0.6.36 and fixes the following issues:

Security issues fixed:

- CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629).
- CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630).
- CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631).

Non-security issues fixed:

- Made cleandeps jobs on patterns work (bsc#1137977).
- Fixed an issue multiversion packages that obsolete their own name (bsc#1127155).
- Keep consistent package name if there are multiple alternatives (bsc#1131823).

Fixes for libzypp:

- Fixes a bug where locking the kernel was not possible (bsc#1113296)
- Fixes a file descriptor leak (bsc#1116995)
- Will now run file conflict check on dry-run (best with download-only) (bsc#1140039)

Fixes for zypper:

- Fixes a bug where the wrong exit code was set when refreshing repos if --root was used (bsc#1134226)
- Improved the displaying of locks (bsc#1112911)
- Fixes an issue where `https` repository urls caused an error prompt to appear twice (bsc#1110542)
- zypper will now always warn when no repositories are defined (bsc#1109893)
- Fixes bash completion option detection (bsc#1049825)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049825">SUSE bug 1049825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109893">SUSE bug 1109893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110542">SUSE bug 1110542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111319">SUSE bug 1111319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112911">SUSE bug 1112911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113296">SUSE bug 1113296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116995">SUSE bug 1116995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131823">SUSE bug 1131823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134226">SUSE bug 1134226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137977">SUSE bug 1137977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140039">SUSE bug 1140039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145521">SUSE bug 1145521</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20532">CVE-2018-20532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20533">CVE-2018-20533 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20534">CVE-2018-20534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522100" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522101" comment="libzypp-16.20.2-27.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530678" comment="perl-solv-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522102" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522103" comment="zypper-1.13.54-18.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150588" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update to Java 7.1 Service Refresh 4 Fix Pack 50.

Security issues fixed:

- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-09"/>
	<updated date="2019-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11771">CVE-2019-11771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11775">CVE-2019-11775 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-4473">CVE-2019-4473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530688" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530691" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150589" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1149496" ref_url="https://bugzilla.suse.com/1149496" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2339-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192339-2.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5482: Fixed TFTP small blocksize heap buffer overflow (bsc#1149496).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-12"/>
	<updated date="2019-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5482">CVE-2019-5482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530693" comment="curl-7.37.0-37.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530694" comment="libcurl4-7.37.0-37.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530695" comment="libcurl4-32bit-7.37.0-37.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150590" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1135715" ref_url="https://bugzilla.suse.com/1135715" source="BUGZILLA"/>
		<reference ref_id="1148931" ref_url="https://bugzilla.suse.com/1148931" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595/" source="CVE"/>
		<reference ref_id="CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607/" source="CVE"/>
		<reference ref_id="CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615/" source="CVE"/>
		<reference ref_id="CVE-2019-8644" ref_url="https://www.suse.com/security/cve/CVE-2019-8644/" source="CVE"/>
		<reference ref_id="CVE-2019-8649" ref_url="https://www.suse.com/security/cve/CVE-2019-8649/" source="CVE"/>
		<reference ref_id="CVE-2019-8658" ref_url="https://www.suse.com/security/cve/CVE-2019-8658/" source="CVE"/>
		<reference ref_id="CVE-2019-8666" ref_url="https://www.suse.com/security/cve/CVE-2019-8666/" source="CVE"/>
		<reference ref_id="CVE-2019-8669" ref_url="https://www.suse.com/security/cve/CVE-2019-8669/" source="CVE"/>
		<reference ref_id="CVE-2019-8671" ref_url="https://www.suse.com/security/cve/CVE-2019-8671/" source="CVE"/>
		<reference ref_id="CVE-2019-8672" ref_url="https://www.suse.com/security/cve/CVE-2019-8672/" source="CVE"/>
		<reference ref_id="CVE-2019-8673" ref_url="https://www.suse.com/security/cve/CVE-2019-8673/" source="CVE"/>
		<reference ref_id="CVE-2019-8676" ref_url="https://www.suse.com/security/cve/CVE-2019-8676/" source="CVE"/>
		<reference ref_id="CVE-2019-8677" ref_url="https://www.suse.com/security/cve/CVE-2019-8677/" source="CVE"/>
		<reference ref_id="CVE-2019-8678" ref_url="https://www.suse.com/security/cve/CVE-2019-8678/" source="CVE"/>
		<reference ref_id="CVE-2019-8679" ref_url="https://www.suse.com/security/cve/CVE-2019-8679/" source="CVE"/>
		<reference ref_id="CVE-2019-8680" ref_url="https://www.suse.com/security/cve/CVE-2019-8680/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8683" ref_url="https://www.suse.com/security/cve/CVE-2019-8683/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8686" ref_url="https://www.suse.com/security/cve/CVE-2019-8686/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Updated to version 2.24.4 (bsc#1148931).

Security issues fixed:
	  
- CVE-2019-8644, CVE-2019-8649, CVE-2019-8658, CVE-2019-8669, CVE-2019-8678,
  CVE-2019-8680, CVE-2019-8683, CVE-2019-8684, CVE-2019-8688, CVE-2019-8595,
  CVE-2019-8607, CVE-2019-8615, CVE-2019-8644, CVE-2019-8649, CVE-2019-8658,
  CVE-2019-8666, CVE-2019-8669, CVE-2019-8671, CVE-2019-8672, CVE-2019-8673,
  CVE-2019-8676, CVE-2019-8677, CVE-2019-8678, CVE-2019-8679, CVE-2019-8680,
  CVE-2019-8681, CVE-2019-8683, CVE-2019-8684, CVE-2019-8686, CVE-2019-8687,
  CVE-2019-8688, CVE-2019-8689, CVE-2019-8690

Non-security issues fixed:
	  
- Improved loading of multimedia streams to avoid memory exhaustion due to excessive caching.
- Updated the user agent string to make happy certain websites which would claim that the browser being used was unsupported.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-11"/>
	<updated date="2019-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8595">CVE-2019-8595 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8607">CVE-2019-8607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8615">CVE-2019-8615 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8644/">CVE-2019-8644 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8644">CVE-2019-8644 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8649/">CVE-2019-8649 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8649">CVE-2019-8649 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8658/">CVE-2019-8658 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8658">CVE-2019-8658 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8666/">CVE-2019-8666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8666">CVE-2019-8666 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8669/">CVE-2019-8669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8669">CVE-2019-8669 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8671/">CVE-2019-8671 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8671">CVE-2019-8671 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8672/">CVE-2019-8672 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8672">CVE-2019-8672 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8673/">CVE-2019-8673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8673">CVE-2019-8673 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8676/">CVE-2019-8676 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8676">CVE-2019-8676 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8677/">CVE-2019-8677 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8677">CVE-2019-8677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8678/">CVE-2019-8678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8678">CVE-2019-8678 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8679/">CVE-2019-8679 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8679">CVE-2019-8679 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8680/">CVE-2019-8680 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8680">CVE-2019-8680 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8681">CVE-2019-8681 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8683/">CVE-2019-8683 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8683">CVE-2019-8683 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8684">CVE-2019-8684 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8686/">CVE-2019-8686 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8686">CVE-2019-8686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8687">CVE-2019-8687 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8688">CVE-2019-8688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8689">CVE-2019-8689 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8690">CVE-2019-8690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150591" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1122292" ref_url="https://bugzilla.suse.com/1122292" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11772" ref_url="https://www.suse.com/security/cve/CVE-2019-11772/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2449" ref_url="https://www.suse.com/security/cve/CVE-2019-2449/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 5 Fix Pack 40.

Security issues fixed:

- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11772: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
- CVE-2019-2786: Fixed issue inside Component Security (bsc#1141787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-12"/>
	<updated date="2019-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122292">SUSE bug 1122292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11771">CVE-2019-11771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11772/">CVE-2019-11772 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11772">CVE-2019-11772 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11775">CVE-2019-11775 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2449/">CVE-2019-2449 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2449">CVE-2019-2449 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2786">CVE-2019-2786 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-4473">CVE-2019-4473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530698" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150592" version="1" class="patch">
	<metadata>
		<title>Security update for ibus (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1150011" ref_url="https://bugzilla.suse.com/1150011" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14822" ref_url="https://www.suse.com/security/cve/CVE-2019-14822/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005925.html" source="SUSE-SU"/>
		<description>
This update for ibus fixes the following issues:

Security issue fixed:

- CVE-2019-14822: Fixed a misconfiguration of the DBus server that allowed an unprivileged user to monitor and send method calls to the ibus bus of another user. (bsc#1150011)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150011">SUSE bug 1150011</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14822/">CVE-2019-14822 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14822">CVE-2019-14822 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522144" comment="ibus-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522145" comment="ibus-gtk-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522146" comment="ibus-gtk3-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522148" comment="ibus-lang-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522149" comment="libibus-1_0-5-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522152" comment="typelib-1_0-IBus-1_0-1.5.13-15.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150593" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005943.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

- CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance (bsc#1150003).
- CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-20"/>
	<updated date="2019-09-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1547">CVE-2019-1547 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1563">CVE-2019-1563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530702" comment="libopenssl-devel-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530703" comment="libopenssl1_0_0-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530704" comment="libopenssl1_0_0-32bit-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530705" comment="libopenssl1_0_0-hmac-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530706" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530707" comment="openssl-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530708" comment="openssl-doc-1.0.2j-60.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150594" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1149294" ref_url="https://bugzilla.suse.com/1149294" source="BUGZILLA"/>
		<reference ref_id="1149295" ref_url="https://bugzilla.suse.com/1149295" source="BUGZILLA"/>
		<reference ref_id="1149296" ref_url="https://bugzilla.suse.com/1149296" source="BUGZILLA"/>
		<reference ref_id="1149297" ref_url="https://bugzilla.suse.com/1149297" source="BUGZILLA"/>
		<reference ref_id="1149298" ref_url="https://bugzilla.suse.com/1149298" source="BUGZILLA"/>
		<reference ref_id="1149299" ref_url="https://bugzilla.suse.com/1149299" source="BUGZILLA"/>
		<reference ref_id="1149303" ref_url="https://bugzilla.suse.com/1149303" source="BUGZILLA"/>
		<reference ref_id="1149304" ref_url="https://bugzilla.suse.com/1149304" source="BUGZILLA"/>
		<reference ref_id="1149324" ref_url="https://bugzilla.suse.com/1149324" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to ESR 60.9 fixes the following issues:

Security issues fixed:

- CVE-2019-11742: Fixed a same-origin policy violation involving SVG filters and canvas to steal cross-origin images. (bsc#1149303)
- CVE-2019-11746: Fixed a use-after-free while manipulating video. (bsc#1149297)
- CVE-2019-11744: Fixed an XSS caused by breaking out of title and textarea elements using innerHTML. (bsc#1149304)
- CVE-2019-11753: Fixed a privilege escalation with Mozilla Maintenance Service in custom Firefox installation location. (bsc#1149295)
- CVE-2019-11752: Fixed a use-after-free while extracting a key value in IndexedDB. (bsc#1149296)
- CVE-2019-11743: Fixed a timing side-channel attack on cross-origin information, utilizing unload event attributes. (bsc#1149298)
- CVE-2019-11740: Fixed several memory safety bugs. (bsc#1149299)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-23"/>
	<updated date="2019-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149294">SUSE bug 1149294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149295">SUSE bug 1149295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149296">SUSE bug 1149296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149297">SUSE bug 1149297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149298">SUSE bug 1149298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149299">SUSE bug 1149299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149303">SUSE bug 1149303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149304">SUSE bug 1149304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11753">CVE-2019-11753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522212" comment="MozillaFirefox-60.9.0-109.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522213" comment="MozillaFirefox-translations-common-60.9.0-109.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150595" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1145559" ref_url="https://bugzilla.suse.com/1145559" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11500" ref_url="https://www.suse.com/security/cve/CVE-2019-11500/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005961.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2019-11500: Fixed a potential remote code execution in the IMAP and ManageSieve protocol parsers (bsc#1145559).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145559">SUSE bug 1145559</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11500/">CVE-2019-11500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11500">CVE-2019-11500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530710" comment="dovecot22-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530711" comment="dovecot22-backend-mysql-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530712" comment="dovecot22-backend-pgsql-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530713" comment="dovecot22-backend-sqlite-2.2.31-19.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150596" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1129180" ref_url="https://bugzilla.suse.com/1129180" source="BUGZILLA"/>
		<reference ref_id="1131863" ref_url="https://bugzilla.suse.com/1131863" source="BUGZILLA"/>
		<reference ref_id="1134156" ref_url="https://bugzilla.suse.com/1134156" source="BUGZILLA"/>
		<reference ref_id="1140359" ref_url="https://bugzilla.suse.com/1140359" source="BUGZILLA"/>
		<reference ref_id="1146882" ref_url="https://bugzilla.suse.com/1146882" source="BUGZILLA"/>
		<reference ref_id="1146884" ref_url="https://bugzilla.suse.com/1146884" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12973" ref_url="https://www.suse.com/security/cve/CVE-2019-12973/" source="CVE"/>
		<reference ref_id="CVE-2019-14811" ref_url="https://www.suse.com/security/cve/CVE-2019-14811/" source="CVE"/>
		<reference ref_id="CVE-2019-14812" ref_url="https://www.suse.com/security/cve/CVE-2019-14812/" source="CVE"/>
		<reference ref_id="CVE-2019-14813" ref_url="https://www.suse.com/security/cve/CVE-2019-14813/" source="CVE"/>
		<reference ref_id="CVE-2019-14817" ref_url="https://www.suse.com/security/cve/CVE-2019-14817/" source="CVE"/>
		<reference ref_id="CVE-2019-3835" ref_url="https://www.suse.com/security/cve/CVE-2019-3835/" source="CVE"/>
		<reference ref_id="CVE-2019-3839" ref_url="https://www.suse.com/security/cve/CVE-2019-3839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to 9.27 fixes the following issues:

Security issues fixed:

- CVE-2019-3835: Fixed an unauthorized file system access caused by an available superexec operator.  (bsc#1129180)
- CVE-2019-3839: Fixed an unauthorized file system access caused by available privileged operators. (bsc#1134156)
- CVE-2019-12973: Fixed a denial-of-service vulnerability in the OpenJPEG function opj_t1_encode_cblks. (bsc#1140359)
- CVE-2019-14811: Fixed a safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator. (bsc#1146882)
- CVE-2019-14812: Fixed a safer mode bypass by .forceput exposure in setuserparams. (bsc#1146882)
- CVE-2019-14813: Fixed a safer mode bypass by .forceput exposure in setsystemparams. (bsc#1146882)
- CVE-2019-14817: Fixed a safer mode bypass by .forceput exposure in .pdfexectoken and other procedures. (bsc#1146884)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-26"/>
	<updated date="2019-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129180">SUSE bug 1129180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131863">SUSE bug 1131863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134156">SUSE bug 1134156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140359">SUSE bug 1140359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146884">SUSE bug 1146884</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12973/">CVE-2019-12973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12973">CVE-2019-12973 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14811/">CVE-2019-14811 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14811">CVE-2019-14811 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14812/">CVE-2019-14812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14812">CVE-2019-14812 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14813/">CVE-2019-14813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14813">CVE-2019-14813 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14817/">CVE-2019-14817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14817">CVE-2019-14817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3835/">CVE-2019-3835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3835">CVE-2019-3835 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3839/">CVE-2019-3839 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3839">CVE-2019-3839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522218" comment="ghostscript-9.27-23.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522219" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150597" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1148987" ref_url="https://bugzilla.suse.com/1148987" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005976.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

Security issues fixed:
	  
- CVE-2019-13627: Mitigated ECDSA timing attack. (bsc#1148987)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-01"/>
	<updated date="2019-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1148987">SUSE bug 1148987</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13627">CVE-2019-13627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522236" comment="libgcrypt20-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522237" comment="libgcrypt20-32bit-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530714" comment="libgcrypt20-hmac-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530715" comment="libgcrypt20-hmac-32bit-1.6.1-16.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150598" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1087200" ref_url="https://bugzilla.suse.com/1087200" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1117473" ref_url="https://bugzilla.suse.com/1117473" source="BUGZILLA"/>
		<reference ref_id="1123482" ref_url="https://bugzilla.suse.com/1123482" source="BUGZILLA"/>
		<reference ref_id="1124525" ref_url="https://bugzilla.suse.com/1124525" source="BUGZILLA"/>
		<reference ref_id="1133810" ref_url="https://bugzilla.suse.com/1133810" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="1145665" ref_url="https://bugzilla.suse.com/1145665" source="BUGZILLA"/>
		<reference ref_id="1149323" ref_url="https://bugzilla.suse.com/1149323" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Updated to new ESR version 68.1 (bsc#1149323).

In addition to the already fixed vulnerabilities released in previous ESR updates,
the following were also fixed:
    CVE-2019-11751, CVE-2019-11736, CVE-2019-9812, CVE-2019-11748, CVE-2019-11749,
    CVE-2019-11750, CVE-2019-11738, CVE-2019-11747, CVE-2019-11735.

Several run-time issues were also resolved (bsc#1117473, bsc#1124525, bsc#1133810).

The version displayed in Help &gt; About is now correct (bsc#1087200).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-09"/>
	<updated date="2019-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087200">SUSE bug 1087200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117473">SUSE bug 1117473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123482">SUSE bug 1123482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124525">SUSE bug 1124525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133810">SUSE bug 1133810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145665">SUSE bug 1145665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11710">CVE-2019-11710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11714">CVE-2019-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11716">CVE-2019-11716 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11718">CVE-2019-11718 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11720">CVE-2019-11720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11721">CVE-2019-11721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11723">CVE-2019-11723 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11724">CVE-2019-11724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11725">CVE-2019-11725 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11727">CVE-2019-11727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11728">CVE-2019-11728 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11733">CVE-2019-11733 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11735">CVE-2019-11735 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11736">CVE-2019-11736 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11738">CVE-2019-11738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11747">CVE-2019-11747 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11748">CVE-2019-11748 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11749">CVE-2019-11749 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11750">CVE-2019-11750 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11751">CVE-2019-11751 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11753">CVE-2019-11753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150599" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1109412" ref_url="https://bugzilla.suse.com/1109412" source="BUGZILLA"/>
		<reference ref_id="1109413" ref_url="https://bugzilla.suse.com/1109413" source="BUGZILLA"/>
		<reference ref_id="1109414" ref_url="https://bugzilla.suse.com/1109414" source="BUGZILLA"/>
		<reference ref_id="1111996" ref_url="https://bugzilla.suse.com/1111996" source="BUGZILLA"/>
		<reference ref_id="1112534" ref_url="https://bugzilla.suse.com/1112534" source="BUGZILLA"/>
		<reference ref_id="1112535" ref_url="https://bugzilla.suse.com/1112535" source="BUGZILLA"/>
		<reference ref_id="1113247" ref_url="https://bugzilla.suse.com/1113247" source="BUGZILLA"/>
		<reference ref_id="1113252" ref_url="https://bugzilla.suse.com/1113252" source="BUGZILLA"/>
		<reference ref_id="1113255" ref_url="https://bugzilla.suse.com/1113255" source="BUGZILLA"/>
		<reference ref_id="1116827" ref_url="https://bugzilla.suse.com/1116827" source="BUGZILLA"/>
		<reference ref_id="1118830" ref_url="https://bugzilla.suse.com/1118830" source="BUGZILLA"/>
		<reference ref_id="1118831" ref_url="https://bugzilla.suse.com/1118831" source="BUGZILLA"/>
		<reference ref_id="1120640" ref_url="https://bugzilla.suse.com/1120640" source="BUGZILLA"/>
		<reference ref_id="1121034" ref_url="https://bugzilla.suse.com/1121034" source="BUGZILLA"/>
		<reference ref_id="1121035" ref_url="https://bugzilla.suse.com/1121035" source="BUGZILLA"/>
		<reference ref_id="1121056" ref_url="https://bugzilla.suse.com/1121056" source="BUGZILLA"/>
		<reference ref_id="1133131" ref_url="https://bugzilla.suse.com/1133131" source="BUGZILLA"/>
		<reference ref_id="1133232" ref_url="https://bugzilla.suse.com/1133232" source="BUGZILLA"/>
		<reference ref_id="1141913" ref_url="https://bugzilla.suse.com/1141913" source="BUGZILLA"/>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000876" ref_url="https://www.suse.com/security/cve/CVE-2018-1000876/" source="CVE"/>
		<reference ref_id="CVE-2018-17358" ref_url="https://www.suse.com/security/cve/CVE-2018-17358/" source="CVE"/>
		<reference ref_id="CVE-2018-17359" ref_url="https://www.suse.com/security/cve/CVE-2018-17359/" source="CVE"/>
		<reference ref_id="CVE-2018-17360" ref_url="https://www.suse.com/security/cve/CVE-2018-17360/" source="CVE"/>
		<reference ref_id="CVE-2018-17985" ref_url="https://www.suse.com/security/cve/CVE-2018-17985/" source="CVE"/>
		<reference ref_id="CVE-2018-18309" ref_url="https://www.suse.com/security/cve/CVE-2018-18309/" source="CVE"/>
		<reference ref_id="CVE-2018-18483" ref_url="https://www.suse.com/security/cve/CVE-2018-18483/" source="CVE"/>
		<reference ref_id="CVE-2018-18484" ref_url="https://www.suse.com/security/cve/CVE-2018-18484/" source="CVE"/>
		<reference ref_id="CVE-2018-18605" ref_url="https://www.suse.com/security/cve/CVE-2018-18605/" source="CVE"/>
		<reference ref_id="CVE-2018-18606" ref_url="https://www.suse.com/security/cve/CVE-2018-18606/" source="CVE"/>
		<reference ref_id="CVE-2018-18607" ref_url="https://www.suse.com/security/cve/CVE-2018-18607/" source="CVE"/>
		<reference ref_id="CVE-2018-19931" ref_url="https://www.suse.com/security/cve/CVE-2018-19931/" source="CVE"/>
		<reference ref_id="CVE-2018-19932" ref_url="https://www.suse.com/security/cve/CVE-2018-19932/" source="CVE"/>
		<reference ref_id="CVE-2018-20623" ref_url="https://www.suse.com/security/cve/CVE-2018-20623/" source="CVE"/>
		<reference ref_id="CVE-2018-20651" ref_url="https://www.suse.com/security/cve/CVE-2018-20651/" source="CVE"/>
		<reference ref_id="CVE-2018-20671" ref_url="https://www.suse.com/security/cve/CVE-2018-20671/" source="CVE"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

binutils was updated to current 2.32 branch @7b468db3 [jsc#ECO-368]:

Includes the following security fixes:

- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)
- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)
- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)
- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)
- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)
- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)
- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)
- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)
- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)
- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)
- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)
- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)
- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)
- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)
- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in  load_specific_debug_section in objdump.c (bsc#1121056)
- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)
- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)

- Enable xtensa architecture (Tensilica lc6 and related)
- Use -ffat-lto-objects in order to provide assembly for static libs
  (bsc#1141913).
- Fixed some LTO problems (bsc#1133131 bsc#1133232).
- riscv: Don't check ABI flags if no code section

Update to binutils 2.32:

* The binutils now support for the C-SKY processor series.
* The x86 assembler now supports a -mvexwig=[0|1] option to control
  encoding of VEX.W-ignored (WIG) VEX instructions.
  It also has a new -mx86-used-note=[yes|no] option to generate (or
  not) x86 GNU property notes.
* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),
  the Loongson EXTensions (EXT) instructions, the Loongson Content
  Address Memory (CAM) ASE and the Loongson MultiMedia extensions
  Instructions (MMI) ASE.
* The addr2line, c++filt, nm and objdump tools now have a default
  limit on the maximum amount of recursion that is allowed whilst
  demangling strings.  This limit can be disabled if necessary.
* Objdump's --disassemble option can now take a parameter,
  specifying the starting symbol for disassembly.  Disassembly will
  continue from this symbol up to the next symbol or the end of the
  function.
* The BFD linker will now report property change in linker map file
  when merging GNU properties.
* The BFD linker's -t option now doesn't report members within
  archives, unless -t is given twice.  This makes it more useful
  when generating a list of files that should be packaged for a
  linker bug report.
* The GOLD linker has improved warning messages for relocations that
  refer to discarded sections.

- Improve relro support on s390 [fate#326356]
- Handle ELF compressed header alignment correctly.

  		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-14"/>
	<updated date="2019-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109412">SUSE bug 1109412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109413">SUSE bug 1109413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109414">SUSE bug 1109414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111996">SUSE bug 1111996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112534">SUSE bug 1112534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112535">SUSE bug 1112535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113247">SUSE bug 1113247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113252">SUSE bug 1113252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113255">SUSE bug 1113255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116827">SUSE bug 1116827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118830">SUSE bug 1118830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118831">SUSE bug 1118831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120640">SUSE bug 1120640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121034">SUSE bug 1121034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121035">SUSE bug 1121035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121056">SUSE bug 1121056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133131">SUSE bug 1133131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133232">SUSE bug 1133232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141913">SUSE bug 1141913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000876/">CVE-2018-1000876 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000876">CVE-2018-1000876 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17358/">CVE-2018-17358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17358">CVE-2018-17358 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17359/">CVE-2018-17359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17359">CVE-2018-17359 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17360/">CVE-2018-17360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17360">CVE-2018-17360 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17985/">CVE-2018-17985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17985">CVE-2018-17985 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18309/">CVE-2018-18309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18309">CVE-2018-18309 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18483/">CVE-2018-18483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18483">CVE-2018-18483 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18484/">CVE-2018-18484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18484">CVE-2018-18484 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18605/">CVE-2018-18605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18605">CVE-2018-18605 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18606/">CVE-2018-18606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18606">CVE-2018-18606 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18607/">CVE-2018-18607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18607">CVE-2018-18607 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19931/">CVE-2018-19931 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19931">CVE-2018-19931 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19932/">CVE-2018-19932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19932">CVE-2018-19932 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20623/">CVE-2018-20623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20623">CVE-2018-20623 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20651/">CVE-2018-20651 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20651">CVE-2018-20651 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20671/">CVE-2018-20671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20671">CVE-2018-20671 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010180">CVE-2019-1010180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150600" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1153674" ref_url="https://bugzilla.suse.com/1153674" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006015.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

Security issue fixed: 	  

- CVE-2019-14287: Fixed an issue where a user with sudo privileges
  that allowed them to run commands with an arbitrary uid, could
  run commands as root, despite being forbidden to do so in sudoers
  (bsc#1153674).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14287">CVE-2019-14287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522249" comment="sudo-1.8.20p2-3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150601" version="1" class="patch">
	<metadata>
		<title>Security update for libpcap (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1153332" ref_url="https://bugzilla.suse.com/1153332" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2019-15165" ref_url="https://www.suse.com/security/cve/CVE-2019-15165/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006016.html" source="SUSE-SU"/>
		<description>
This update for libpcap fixes the following issues:

- CVE-2019-15165: Added sanity checks for PHB header length before allocating memory (bsc#1153332).
- CVE-2018-16301: Fixed a buffer overflow (bsc#1153332).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15165/">CVE-2019-15165 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15165">CVE-2019-15165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522250" comment="libpcap1-1.8.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522252" comment="tcpdump-4.9.2-14.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150602" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126197" ref_url="https://bugzilla.suse.com/1126197" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1133818" ref_url="https://bugzilla.suse.com/1133818" source="BUGZILLA"/>
		<reference ref_id="1143797" ref_url="https://bugzilla.suse.com/1143797" source="BUGZILLA"/>
		<reference ref_id="1146874" ref_url="https://bugzilla.suse.com/1146874" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-17340" ref_url="https://www.suse.com/security/cve/CVE-2019-17340/" source="CVE"/>
		<reference ref_id="CVE-2019-17341" ref_url="https://www.suse.com/security/cve/CVE-2019-17341/" source="CVE"/>
		<reference ref_id="CVE-2019-17342" ref_url="https://www.suse.com/security/cve/CVE-2019-17342/" source="CVE"/>
		<reference ref_id="CVE-2019-17343" ref_url="https://www.suse.com/security/cve/CVE-2019-17343/" source="CVE"/>
		<reference ref_id="CVE-2019-17344" ref_url="https://www.suse.com/security/cve/CVE-2019-17344/" source="CVE"/>
		<reference ref_id="CVE-2019-17345" ref_url="https://www.suse.com/security/cve/CVE-2019-17345/" source="CVE"/>
		<reference ref_id="CVE-2019-17346" ref_url="https://www.suse.com/security/cve/CVE-2019-17346/" source="CVE"/>
		<reference ref_id="CVE-2019-17347" ref_url="https://www.suse.com/security/cve/CVE-2019-17347/" source="CVE"/>
		<reference ref_id="CVE-2019-17348" ref_url="https://www.suse.com/security/cve/CVE-2019-17348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed: 	  

- CVE-2019-15890: Fixed a use-after-free in SLiRP networking implementation of QEMU emulator
  which could have led to Denial of Service (bsc#1149813).
- CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite loop and denial of 
  service (bsc#1146874).
- CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking implementation of QEMU 
  emulator which could have led to execution of  arbitrary code with privileges of the 
  QEMU process (bsc#1143797).

Other issue fixed: 

- Fixed an issue where libxenlight could not restore domain vsa6535522 on live migration (bsc#1133818).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-24"/>
	<updated date="2019-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126197">SUSE bug 1126197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133818">SUSE bug 1133818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146874">SUSE bug 1146874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12068">CVE-2019-12068 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14378">CVE-2019-14378 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17340/">CVE-2019-17340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17340">CVE-2019-17340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17341/">CVE-2019-17341 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17341">CVE-2019-17341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17342/">CVE-2019-17342 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17342">CVE-2019-17342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17343/">CVE-2019-17343 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17343">CVE-2019-17343 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17344/">CVE-2019-17344 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17344">CVE-2019-17344 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17345/">CVE-2019-17345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17345">CVE-2019-17345 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17346/">CVE-2019-17346 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17346">CVE-2019-17346 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17347/">CVE-2019-17347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17347">CVE-2019-17347 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17348/">CVE-2019-17348 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17348">CVE-2019-17348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538307" comment="xen-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538308" comment="xen-doc-html-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538309" comment="xen-libs-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538310" comment="xen-libs-32bit-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538311" comment="xen-tools-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538312" comment="xen-tools-domU-4.9.4_04-3.56.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150603" version="1" class="patch">
	<metadata>
		<title>Security update for nfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1150733" ref_url="https://bugzilla.suse.com/1150733" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3689" ref_url="https://www.suse.com/security/cve/CVE-2019-3689/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2781-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192781-1.html" source="SUSE-SU"/>
		<description>
This update for nfs-utils fixes the following issues:

- CVE-2019-3689: Fixed root-owned files stored in insecure /var/lib/nfs. (bsc#1150733)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-25"/>
	<updated date="2019-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150733">SUSE bug 1150733</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3689/">CVE-2019-3689 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3689">CVE-2019-3689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522280" comment="nfs-client-1.3.0-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530719" comment="nfs-doc-1.3.0-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522281" comment="nfs-kernel-server-1.3.0-34.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150604" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1010399" ref_url="https://bugzilla.suse.com/1010399" source="BUGZILLA"/>
		<reference ref_id="1010405" ref_url="https://bugzilla.suse.com/1010405" source="BUGZILLA"/>
		<reference ref_id="1010406" ref_url="https://bugzilla.suse.com/1010406" source="BUGZILLA"/>
		<reference ref_id="1010408" ref_url="https://bugzilla.suse.com/1010408" source="BUGZILLA"/>
		<reference ref_id="1010409" ref_url="https://bugzilla.suse.com/1010409" source="BUGZILLA"/>
		<reference ref_id="1010421" ref_url="https://bugzilla.suse.com/1010421" source="BUGZILLA"/>
		<reference ref_id="1010423" ref_url="https://bugzilla.suse.com/1010423" source="BUGZILLA"/>
		<reference ref_id="1010424" ref_url="https://bugzilla.suse.com/1010424" source="BUGZILLA"/>
		<reference ref_id="1010425" ref_url="https://bugzilla.suse.com/1010425" source="BUGZILLA"/>
		<reference ref_id="1010426" ref_url="https://bugzilla.suse.com/1010426" source="BUGZILLA"/>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1043008" ref_url="https://bugzilla.suse.com/1043008" source="BUGZILLA"/>
		<reference ref_id="1047281" ref_url="https://bugzilla.suse.com/1047281" source="BUGZILLA"/>
		<reference ref_id="1074235" ref_url="https://bugzilla.suse.com/1074235" source="BUGZILLA"/>
		<reference ref_id="1092611" ref_url="https://bugzilla.suse.com/1092611" source="BUGZILLA"/>
		<reference ref_id="1120374" ref_url="https://bugzilla.suse.com/1120374" source="BUGZILLA"/>
		<reference ref_id="1137990" ref_url="https://bugzilla.suse.com/1137990" source="BUGZILLA"/>
		<reference ref_id="1149429" ref_url="https://bugzilla.suse.com/1149429" source="BUGZILLA"/>
		<reference ref_id="1154738" ref_url="https://bugzilla.suse.com/1154738" source="BUGZILLA"/>
		<reference ref_id="959933" ref_url="https://bugzilla.suse.com/959933" source="BUGZILLA"/>
		<reference ref_id="983922" ref_url="https://bugzilla.suse.com/983922" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-5289" ref_url="https://www.suse.com/security/cve/CVE-2016-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-5292" ref_url="https://www.suse.com/security/cve/CVE-2016-5292/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2016-9067" ref_url="https://www.suse.com/security/cve/CVE-2016-9067/" source="CVE"/>
		<reference ref_id="CVE-2016-9068" ref_url="https://www.suse.com/security/cve/CVE-2016-9068/" source="CVE"/>
		<reference ref_id="CVE-2016-9069" ref_url="https://www.suse.com/security/cve/CVE-2016-9069/" source="CVE"/>
		<reference ref_id="CVE-2016-9071" ref_url="https://www.suse.com/security/cve/CVE-2016-9071/" source="CVE"/>
		<reference ref_id="CVE-2016-9073" ref_url="https://www.suse.com/security/cve/CVE-2016-9073/" source="CVE"/>
		<reference ref_id="CVE-2016-9075" ref_url="https://www.suse.com/security/cve/CVE-2016-9075/" source="CVE"/>
		<reference ref_id="CVE-2016-9076" ref_url="https://www.suse.com/security/cve/CVE-2016-9076/" source="CVE"/>
		<reference ref_id="CVE-2016-9077" ref_url="https://www.suse.com/security/cve/CVE-2016-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-7789" ref_url="https://www.suse.com/security/cve/CVE-2017-7789/" source="CVE"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5151" ref_url="https://www.suse.com/security/cve/CVE-2018-5151/" source="CVE"/>
		<reference ref_id="CVE-2018-5152" ref_url="https://www.suse.com/security/cve/CVE-2018-5152/" source="CVE"/>
		<reference ref_id="CVE-2018-5153" ref_url="https://www.suse.com/security/cve/CVE-2018-5153/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5160" ref_url="https://www.suse.com/security/cve/CVE-2018-5160/" source="CVE"/>
		<reference ref_id="CVE-2018-5163" ref_url="https://www.suse.com/security/cve/CVE-2018-5163/" source="CVE"/>
		<reference ref_id="CVE-2018-5164" ref_url="https://www.suse.com/security/cve/CVE-2018-5164/" source="CVE"/>
		<reference ref_id="CVE-2018-5165" ref_url="https://www.suse.com/security/cve/CVE-2018-5165/" source="CVE"/>
		<reference ref_id="CVE-2018-5166" ref_url="https://www.suse.com/security/cve/CVE-2018-5166/" source="CVE"/>
		<reference ref_id="CVE-2018-5167" ref_url="https://www.suse.com/security/cve/CVE-2018-5167/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5169" ref_url="https://www.suse.com/security/cve/CVE-2018-5169/" source="CVE"/>
		<reference ref_id="CVE-2018-5172" ref_url="https://www.suse.com/security/cve/CVE-2018-5172/" source="CVE"/>
		<reference ref_id="CVE-2018-5173" ref_url="https://www.suse.com/security/cve/CVE-2018-5173/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5175" ref_url="https://www.suse.com/security/cve/CVE-2018-5175/" source="CVE"/>
		<reference ref_id="CVE-2018-5176" ref_url="https://www.suse.com/security/cve/CVE-2018-5176/" source="CVE"/>
		<reference ref_id="CVE-2018-5177" ref_url="https://www.suse.com/security/cve/CVE-2018-5177/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5179" ref_url="https://www.suse.com/security/cve/CVE-2018-5179/" source="CVE"/>
		<reference ref_id="CVE-2018-5180" ref_url="https://www.suse.com/security/cve/CVE-2018-5180/" source="CVE"/>
		<reference ref_id="CVE-2018-5181" ref_url="https://www.suse.com/security/cve/CVE-2018-5181/" source="CVE"/>
		<reference ref_id="CVE-2018-5182" ref_url="https://www.suse.com/security/cve/CVE-2018-5182/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to 68.2.0 ESR fixes the following issues:

Mozilla Firefox was updated to version 68.2.0 ESR (bsc#1154738).

Security issues fixed:

-  CVE-2019-15903: Fixed a heap overflow in the expat library (bsc#1149429).
-  CVE-2019-11757: Fixed a use-after-free when creating index updates in IndexedDB (bsc#1154738).
-  CVE-2019-11758: Fixed a potentially exploitable crash due to 360 Total Security (bsc#1154738).
-  CVE-2019-11759: Fixed a stack buffer overflow in HKDF output (bsc#1154738).
-  CVE-2019-11760: Fixed a stack buffer overflow in WebRTC networking (bsc#1154738).
-  CVE-2019-11761: Fixed an unintended access to a privileged JSONView object (bsc#1154738).
-  CVE-2019-11762: Fixed a same-origin-property violation (bsc#1154738).
-  CVE-2019-11763: Fixed an XSS bypass (bsc#1154738).
-  CVE-2019-11764: Fixed several memory safety bugs (bsc#1154738).

Non-security issues fixed:

- Firefox 60.7 ESR changed the user interface language (bsc#1137990).
- Wrong Firefox GUI Language (bsc#1120374).
- Fixed an inadvertent crash report transmission without user opt-in (bsc#1074235).
- Firefox hangs randomly when browsing and scrolling (bsc#1043008).
- Firefox stops loading page until mouse is moved (bsc#1025108).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-31"/>
	<updated date="2019-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010399">SUSE bug 1010399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010405">SUSE bug 1010405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010406">SUSE bug 1010406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010408">SUSE bug 1010408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010409">SUSE bug 1010409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010421">SUSE bug 1010421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010423">SUSE bug 1010423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010424">SUSE bug 1010424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010425">SUSE bug 1010425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010426">SUSE bug 1010426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043008">SUSE bug 1043008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047281">SUSE bug 1047281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074235">SUSE bug 1074235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120374">SUSE bug 1120374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137990">SUSE bug 1137990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959933">SUSE bug 959933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983922">SUSE bug 983922</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2830">CVE-2016-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5289/">CVE-2016-5289 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5289">CVE-2016-5289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5292/">CVE-2016-5292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5292">CVE-2016-5292 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9067/">CVE-2016-9067 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9067">CVE-2016-9067 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9068/">CVE-2016-9068 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9068">CVE-2016-9068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9069/">CVE-2016-9069 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9069">CVE-2016-9069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9071/">CVE-2016-9071 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9071">CVE-2016-9071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9073/">CVE-2016-9073 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9073">CVE-2016-9073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9075/">CVE-2016-9075 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9075">CVE-2016-9075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9076/">CVE-2016-9076 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9076">CVE-2016-9076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9077/">CVE-2016-9077 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9077">CVE-2016-9077 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7789/">CVE-2017-7789 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7789">CVE-2017-7789 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5150">CVE-2018-5150 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5151/">CVE-2018-5151 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5151">CVE-2018-5151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5152/">CVE-2018-5152 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5152">CVE-2018-5152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5153/">CVE-2018-5153 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5153">CVE-2018-5153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5154">CVE-2018-5154 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5155">CVE-2018-5155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5157">CVE-2018-5157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5158">CVE-2018-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5159">CVE-2018-5159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5160/">CVE-2018-5160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5160">CVE-2018-5160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5163/">CVE-2018-5163 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5163">CVE-2018-5163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5164/">CVE-2018-5164 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5164">CVE-2018-5164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5165/">CVE-2018-5165 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5165">CVE-2018-5165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5166/">CVE-2018-5166 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5166">CVE-2018-5166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5167/">CVE-2018-5167 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5167">CVE-2018-5167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5168">CVE-2018-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5169/">CVE-2018-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5169">CVE-2018-5169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5172/">CVE-2018-5172 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5172">CVE-2018-5172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5173/">CVE-2018-5173 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5173">CVE-2018-5173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5174">CVE-2018-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5175/">CVE-2018-5175 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5175">CVE-2018-5175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5176/">CVE-2018-5176 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5176">CVE-2018-5176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5177/">CVE-2018-5177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5177">CVE-2018-5177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5178">CVE-2018-5178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5179/">CVE-2018-5179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5179">CVE-2018-5179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5180/">CVE-2018-5180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5180">CVE-2018-5180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5181/">CVE-2018-5181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5181">CVE-2018-5181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5182/">CVE-2018-5182 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5182">CVE-2018-5182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5183">CVE-2018-5183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11757">CVE-2019-11757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11758">CVE-2019-11758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11759">CVE-2019-11759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11760">CVE-2019-11760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11761">CVE-2019-11761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11762">CVE-2019-11762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11763">CVE-2019-11763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11764">CVE-2019-11764 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150605" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1144902" ref_url="https://bugzilla.suse.com/1144902" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006085.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2019-10218: Client code can return filenames containing path separators (bsc#1144902).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-04"/>
	<updated date="2019-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10218">CVE-2019-10218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522302" comment="libdcerpc-binding0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522303" comment="libdcerpc-binding0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522304" comment="libdcerpc0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522305" comment="libdcerpc0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522306" comment="libndr-krb5pac0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522307" comment="libndr-krb5pac0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522308" comment="libndr-nbt0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522309" comment="libndr-nbt0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522310" comment="libndr-standard0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522311" comment="libndr-standard0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522312" comment="libndr0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522313" comment="libndr0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522314" comment="libnetapi0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522315" comment="libnetapi0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522316" comment="libsamba-credentials0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522317" comment="libsamba-credentials0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522318" comment="libsamba-errors0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522319" comment="libsamba-errors0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522320" comment="libsamba-hostconfig0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522321" comment="libsamba-hostconfig0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522322" comment="libsamba-passdb0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522323" comment="libsamba-passdb0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522324" comment="libsamba-util0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522325" comment="libsamba-util0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522326" comment="libsamdb0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522327" comment="libsamdb0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522328" comment="libsmbclient0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522329" comment="libsmbclient0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522330" comment="libsmbconf0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522331" comment="libsmbconf0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522332" comment="libsmbldap0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522333" comment="libsmbldap0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522334" comment="libtevent-util0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522335" comment="libtevent-util0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522336" comment="libwbclient0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522337" comment="libwbclient0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522338" comment="samba-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522339" comment="samba-client-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522340" comment="samba-client-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522341" comment="samba-doc-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522342" comment="samba-libs-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522343" comment="samba-libs-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522344" comment="samba-winbind-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522345" comment="samba-winbind-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150606" version="1" class="patch">
	<metadata>
		<title>Security update for gdb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1115034" ref_url="https://bugzilla.suse.com/1115034" source="BUGZILLA"/>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="1145692" ref_url="https://bugzilla.suse.com/1145692" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006098.html" source="SUSE-SU"/>
		<description>
This update for gdb fixes the following issues:

Update to gdb 8.3.1: (jsc#ECO-368)

Security issues fixed:

- CVE-2019-1010180: Fixed a potential buffer overflow when loading ELF sections larger than the file. (bsc#1142772)

Upgrade libipt from v2.0 to v2.0.1.

- Enable librpm for version &gt; librpm.so.3 [bsc#1145692]:
  * Allow any librpm.so.x
  * Add %build test to check for 'zypper install &lt;rpm-packagename&gt;'
    message

- Copy gdbinit from fedora master @ 25caf28.  Add
  gdbinit.without-python, and use it for --without=python.

Rebase to 8.3 release (as in fedora 30 @ 1e222a3).

* DWARF index cache: GDB can now automatically save indices of DWARF
  symbols on disk to speed up further loading of the same binaries.
* Ada task switching is now supported on aarch64-elf targets when
  debugging a program using the Ravenscar Profile.
* Terminal styling is now available for the CLI and the TUI.
* Removed support for old demangling styles arm, edg, gnu, hp and
  lucid.
* Support for new native configuration RISC-V GNU/Linux (riscv*-*-linux*).

- Implemented access to more POWER8 registers.  [fate#326120, fate#325178]
- Also handle most new s390 arch13 instructions.  [fate#327369, jsc#ECO-368]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-07"/>
	<updated date="2019-11-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1115034">SUSE bug 1115034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145692">SUSE bug 1145692</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010180">CVE-2019-1010180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522349" comment="gdb-8.3.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150607" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1154862" ref_url="https://bugzilla.suse.com/1154862" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2936-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192936-1.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issue:

- CVE-2019-17498: Fixed an integer overflow in a bounds check that might have led to the disclosure of sensitive information or a denial of service (bsc#1154862).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-08"/>
	<updated date="2019-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">CVE-2019-17498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522350" comment="libssh2-1-1.4.3-20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522351" comment="libssh2-1-32bit-1.4.3-20.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150608" version="1" class="patch">
	<metadata>
		<title>Security update for libseccomp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1128828" ref_url="https://bugzilla.suse.com/1128828" source="BUGZILLA"/>
		<reference ref_id="1142614" ref_url="https://bugzilla.suse.com/1142614" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9893" ref_url="https://www.suse.com/security/cve/CVE-2019-9893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006108.html" source="SUSE-SU"/>
		<description>
This update for libseccomp fixes the following issues:

Update to new upstream release 2.4.1:

* Fix a BPF generation bug where the optimizer mistakenly
  identified duplicate BPF code blocks.

Updated to 2.4.0 (bsc#1128828 CVE-2019-9893):

* Update the syscall table for Linux v5.0-rc5
* Added support for the SCMP_ACT_KILL_PROCESS action
* Added support for the SCMP_ACT_LOG action and SCMP_FLTATR_CTL_LOG attribute
* Added explicit 32-bit (SCMP_AX_32(...)) and 64-bit (SCMP_AX_64(...)) argument comparison macros to help protect against unexpected sign extension
* Added support for the parisc and parisc64 architectures
* Added the ability to query and set the libseccomp API level via seccomp_api_get(3) and seccomp_api_set(3)
* Return -EDOM on an endian mismatch when adding an architecture to a filter
* Renumber the pseudo syscall number for subpage_prot() so it no longer conflicts with spu_run()
* Fix PFC generation when a syscall is prioritized, but no rule exists
* Numerous fixes to the seccomp-bpf filter generation code
* Switch our internal hashing function to jhash/Lookup3 to MurmurHash3
* Numerous tests added to the included test suite, coverage now at ~92%
* Update our Travis CI configuration to use Ubuntu 16.04
* Numerous documentation fixes and updates

Update to release 2.3.3:

* Updated the syscall table for Linux v4.15-rc7

Update to release 2.3.2:

* Achieved full compliance with the CII Best Practices program
* Added Travis CI builds to the GitHub repository
* Added code coverage reporting with the '--enable-code-coverage' configure
  flag and added Coveralls to the GitHub repository
* Updated the syscall tables to match Linux v4.10-rc6+
* Support for building with Python v3.x
* Allow rules with the -1 syscall if the SCMP\_FLTATR\_API\_TSKIP attribute is
  set to true
* Several small documentation fixes

- ignore make check error for ppc64/ppc64le, bypass bsc#1142614
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128828">SUSE bug 1128828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142614">SUSE bug 1142614</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9893/">CVE-2019-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9893">CVE-2019-9893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522352" comment="libseccomp2-2.4.1-11.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522353" comment="libseccomp2-32bit-2.4.1-11.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150609" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1084878" ref_url="https://bugzilla.suse.com/1084878" source="BUGZILLA"/>
		<reference ref_id="1117665" ref_url="https://bugzilla.suse.com/1117665" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1133140" ref_url="https://bugzilla.suse.com/1133140" source="BUGZILLA"/>
		<reference ref_id="1135966" ref_url="https://bugzilla.suse.com/1135966" source="BUGZILLA"/>
		<reference ref_id="1135967" ref_url="https://bugzilla.suse.com/1135967" source="BUGZILLA"/>
		<reference ref_id="1136261" ref_url="https://bugzilla.suse.com/1136261" source="BUGZILLA"/>
		<reference ref_id="1137865" ref_url="https://bugzilla.suse.com/1137865" source="BUGZILLA"/>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1140671" ref_url="https://bugzilla.suse.com/1140671" source="BUGZILLA"/>
		<reference ref_id="1141013" ref_url="https://bugzilla.suse.com/1141013" source="BUGZILLA"/>
		<reference ref_id="1141054" ref_url="https://bugzilla.suse.com/1141054" source="BUGZILLA"/>
		<reference ref_id="1142458" ref_url="https://bugzilla.suse.com/1142458" source="BUGZILLA"/>
		<reference ref_id="1143187" ref_url="https://bugzilla.suse.com/1143187" source="BUGZILLA"/>
		<reference ref_id="1144123" ref_url="https://bugzilla.suse.com/1144123" source="BUGZILLA"/>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1145477" ref_url="https://bugzilla.suse.com/1145477" source="BUGZILLA"/>
		<reference ref_id="1146042" ref_url="https://bugzilla.suse.com/1146042" source="BUGZILLA"/>
		<reference ref_id="1146163" ref_url="https://bugzilla.suse.com/1146163" source="BUGZILLA"/>
		<reference ref_id="1146285" ref_url="https://bugzilla.suse.com/1146285" source="BUGZILLA"/>
		<reference ref_id="1146361" ref_url="https://bugzilla.suse.com/1146361" source="BUGZILLA"/>
		<reference ref_id="1146378" ref_url="https://bugzilla.suse.com/1146378" source="BUGZILLA"/>
		<reference ref_id="1146391" ref_url="https://bugzilla.suse.com/1146391" source="BUGZILLA"/>
		<reference ref_id="1146413" ref_url="https://bugzilla.suse.com/1146413" source="BUGZILLA"/>
		<reference ref_id="1146425" ref_url="https://bugzilla.suse.com/1146425" source="BUGZILLA"/>
		<reference ref_id="1146512" ref_url="https://bugzilla.suse.com/1146512" source="BUGZILLA"/>
		<reference ref_id="1146514" ref_url="https://bugzilla.suse.com/1146514" source="BUGZILLA"/>
		<reference ref_id="1146516" ref_url="https://bugzilla.suse.com/1146516" source="BUGZILLA"/>
		<reference ref_id="1146519" ref_url="https://bugzilla.suse.com/1146519" source="BUGZILLA"/>
		<reference ref_id="1146524" ref_url="https://bugzilla.suse.com/1146524" source="BUGZILLA"/>
		<reference ref_id="1146526" ref_url="https://bugzilla.suse.com/1146526" source="BUGZILLA"/>
		<reference ref_id="1146529" ref_url="https://bugzilla.suse.com/1146529" source="BUGZILLA"/>
		<reference ref_id="1146540" ref_url="https://bugzilla.suse.com/1146540" source="BUGZILLA"/>
		<reference ref_id="1146543" ref_url="https://bugzilla.suse.com/1146543" source="BUGZILLA"/>
		<reference ref_id="1146547" ref_url="https://bugzilla.suse.com/1146547" source="BUGZILLA"/>
		<reference ref_id="1146550" ref_url="https://bugzilla.suse.com/1146550" source="BUGZILLA"/>
		<reference ref_id="1146584" ref_url="https://bugzilla.suse.com/1146584" source="BUGZILLA"/>
		<reference ref_id="1146589" ref_url="https://bugzilla.suse.com/1146589" source="BUGZILLA"/>
		<reference ref_id="1147022" ref_url="https://bugzilla.suse.com/1147022" source="BUGZILLA"/>
		<reference ref_id="1147122" ref_url="https://bugzilla.suse.com/1147122" source="BUGZILLA"/>
		<reference ref_id="1148394" ref_url="https://bugzilla.suse.com/1148394" source="BUGZILLA"/>
		<reference ref_id="1148938" ref_url="https://bugzilla.suse.com/1148938" source="BUGZILLA"/>
		<reference ref_id="1149083" ref_url="https://bugzilla.suse.com/1149083" source="BUGZILLA"/>
		<reference ref_id="1149376" ref_url="https://bugzilla.suse.com/1149376" source="BUGZILLA"/>
		<reference ref_id="1149522" ref_url="https://bugzilla.suse.com/1149522" source="BUGZILLA"/>
		<reference ref_id="1149527" ref_url="https://bugzilla.suse.com/1149527" source="BUGZILLA"/>
		<reference ref_id="1149555" ref_url="https://bugzilla.suse.com/1149555" source="BUGZILLA"/>
		<reference ref_id="1149612" ref_url="https://bugzilla.suse.com/1149612" source="BUGZILLA"/>
		<reference ref_id="1150025" ref_url="https://bugzilla.suse.com/1150025" source="BUGZILLA"/>
		<reference ref_id="1150112" ref_url="https://bugzilla.suse.com/1150112" source="BUGZILLA"/>
		<reference ref_id="1150452" ref_url="https://bugzilla.suse.com/1150452" source="BUGZILLA"/>
		<reference ref_id="1150457" ref_url="https://bugzilla.suse.com/1150457" source="BUGZILLA"/>
		<reference ref_id="1150465" ref_url="https://bugzilla.suse.com/1150465" source="BUGZILLA"/>
		<reference ref_id="1150727" ref_url="https://bugzilla.suse.com/1150727" source="BUGZILLA"/>
		<reference ref_id="1150942" ref_url="https://bugzilla.suse.com/1150942" source="BUGZILLA"/>
		<reference ref_id="1151347" ref_url="https://bugzilla.suse.com/1151347" source="BUGZILLA"/>
		<reference ref_id="1151350" ref_url="https://bugzilla.suse.com/1151350" source="BUGZILLA"/>
		<reference ref_id="1152685" ref_url="https://bugzilla.suse.com/1152685" source="BUGZILLA"/>
		<reference ref_id="1152782" ref_url="https://bugzilla.suse.com/1152782" source="BUGZILLA"/>
		<reference ref_id="1152788" ref_url="https://bugzilla.suse.com/1152788" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153263" ref_url="https://bugzilla.suse.com/1153263" source="BUGZILLA"/>
		<reference ref_id="1154103" ref_url="https://bugzilla.suse.com/1154103" source="BUGZILLA"/>
		<reference ref_id="1154372" ref_url="https://bugzilla.suse.com/1154372" source="BUGZILLA"/>
		<reference ref_id="1155131" ref_url="https://bugzilla.suse.com/1155131" source="BUGZILLA"/>
		<reference ref_id="1155671" ref_url="https://bugzilla.suse.com/1155671" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10906" ref_url="https://www.suse.com/security/cve/CVE-2016-10906/" source="CVE"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2017-18509" ref_url="https://www.suse.com/security/cve/CVE-2017-18509/" source="CVE"/>
		<reference ref_id="CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551/" source="CVE"/>
		<reference ref_id="CVE-2017-18595" ref_url="https://www.suse.com/security/cve/CVE-2017-18595/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-20976" ref_url="https://www.suse.com/security/cve/CVE-2018-20976/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15211" ref_url="https://www.suse.com/security/cve/CVE-2019-15211/" source="CVE"/>
		<reference ref_id="CVE-2019-15212" ref_url="https://www.suse.com/security/cve/CVE-2019-15212/" source="CVE"/>
		<reference ref_id="CVE-2019-15214" ref_url="https://www.suse.com/security/cve/CVE-2019-15214/" source="CVE"/>
		<reference ref_id="CVE-2019-15215" ref_url="https://www.suse.com/security/cve/CVE-2019-15215/" source="CVE"/>
		<reference ref_id="CVE-2019-15216" ref_url="https://www.suse.com/security/cve/CVE-2019-15216/" source="CVE"/>
		<reference ref_id="CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217/" source="CVE"/>
		<reference ref_id="CVE-2019-15218" ref_url="https://www.suse.com/security/cve/CVE-2019-15218/" source="CVE"/>
		<reference ref_id="CVE-2019-15219" ref_url="https://www.suse.com/security/cve/CVE-2019-15219/" source="CVE"/>
		<reference ref_id="CVE-2019-15220" ref_url="https://www.suse.com/security/cve/CVE-2019-15220/" source="CVE"/>
		<reference ref_id="CVE-2019-15221" ref_url="https://www.suse.com/security/cve/CVE-2019-15221/" source="CVE"/>
		<reference ref_id="CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15505" ref_url="https://www.suse.com/security/cve/CVE-2019-15505/" source="CVE"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2019-15807" ref_url="https://www.suse.com/security/cve/CVE-2019-15807/" source="CVE"/>
		<reference ref_id="CVE-2019-15902" ref_url="https://www.suse.com/security/cve/CVE-2019-15902/" source="CVE"/>
		<reference ref_id="CVE-2019-15924" ref_url="https://www.suse.com/security/cve/CVE-2019-15924/" source="CVE"/>
		<reference ref_id="CVE-2019-15926" ref_url="https://www.suse.com/security/cve/CVE-2019-15926/" source="CVE"/>
		<reference ref_id="CVE-2019-15927" ref_url="https://www.suse.com/security/cve/CVE-2019-15927/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-16413" ref_url="https://www.suse.com/security/cve/CVE-2019-16413/" source="CVE"/>
		<reference ref_id="CVE-2019-16995" ref_url="https://www.suse.com/security/cve/CVE-2019-16995/" source="CVE"/>
		<reference ref_id="CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055/" source="CVE"/>
		<reference ref_id="CVE-2019-17056" ref_url="https://www.suse.com/security/cve/CVE-2019-17056/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-9456" ref_url="https://www.suse.com/security/cve/CVE-2019-9456/" source="CVE"/>
		<reference ref_id="CVE-2019-9506" ref_url="https://www.suse.com/security/cve/CVE-2019-9506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12-SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
  condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
  Exception during Page Size Change, causing the CPU core to be non-functional.

  The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in
  executable pages by splitting / merging huge pages into small pages as
  needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7023735

- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port
  failed to add a port, which may have caused denial of service (bsc#1152685).

- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
  Transactional Memory support could be used to facilitate sidechannel
  information leaks out of microarchitectural buffers, similar to the
  previously described 'Microarchitectural Data Sampling' attack.

  The Linux kernel was supplemented with the option to disable TSX operation
  altogether (requiring CPU Microcode updates on older systems) and better
  flushing of microarchitectural buffers (VERW).

  The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251

- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the
  alloc_workqueue return value, leading to a NULL pointer dereference.
  (bsc#1150457).

- CVE-2019-10220: Added sanity checks on the pathnames passed to the user
  space. (bsc#1144903).

- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).

- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,
  leading to a Buffer Overflow (bsc#1153158).

- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell
  libertas driver (bsc#1150465).

- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return
  value, leading to a NULL pointer dereference. (bsc#1150452).

- CVE-2019-17055: The AF_ISDN network module in the Linux kernel did not
  enforce CAP_NET_RAW, which meant that unprivileged users could create a raw
  socket (bnc#1152782).

- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which
  meant that unprivileged users could create a raw socket (bsc#1152788).

- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly,
  which caused an i_size_read() infinite loop and denial of service on SMP
  systems (bnc#1151347).

- CVE-2019-15902: A backporting issue was discovered that re-introduced the
  Spectre vulnerability it had aimed to eliminate. This occurred because the
  backport process depends on cherry picking specific commits, and because two
  (correctly ordered) code lines were swapped (bnc#1149376).

- CVE-2019-15291: Fixed a NULL pointer dereference issue that could be caused
  by a malicious USB device (bnc#1146519).

- CVE-2019-15807: Fixed a memory leak in the SCSI module that could be abused
  to cause denial of service (bnc#1148938).

- CVE-2019-13272: Fixed a mishandled the recording of the credentials of a
  process that wants to create a ptrace relationship, which allowed local users
  to obtain root access by leveraging certain scenarios with a parent-child
  process relationship, where a parent drops privileges and calls execve
  (potentially allowing control by an attacker). (bnc#1140671).

- CVE-2019-14821: An out-of-bounds access issue was fixed in the kernel's KVM
  hypervisor. An unprivileged host user or process with access to '/dev/kvm'
  device could use this flaw to crash the host kernel, resulting in a denial of
  service or potentially escalating privileges on the system (bnc#1151350).

- CVE-2019-15505: An out-of-bounds issue had been fixed that could be caused by
  crafted USB device traffic (bnc#1147122).

- CVE-2017-18595: A double free in allocate_trace_buffer was fixed
  (bnc#1149555).

- CVE-2019-14835: A buffer overflow flaw was found in the kernel's vhost
  functionality that translates virtqueue buffers to IOVs. A privileged guest
  user able to pass descriptors with invalid length to the host could use this
  flaw to increase their privileges on the host (bnc#1150112).

- CVE-2019-15216: A NULL pointer dereference was fixed that could be malicious
  USB device (bnc#1146361).

- CVE-2019-15924: A a NULL pointer dereference has been fixed in the
  drivers/net/ethernet/intel/fm10k module (bnc#1149612).

- CVE-2019-9456: An out-of-bounds write in the USB monitor driver has been
  fixed. This issue could lead to local escalation of privilege with System
  execution privileges needed. (bnc#1150025).

- CVE-2019-15926: An out-of-bounds access was fixed in the
  drivers/net/wireless/ath/ath6kl module. (bnc#1149527).

- CVE-2019-15927: An out-of-bounds access was fixed in the sound/usb/mixer
  module (bnc#1149522).

- CVE-2019-15666: There was an out-of-bounds array access in the net/xfrm
  module that could cause denial of service (bnc#1148394).

- CVE-2017-18379: An out-of-boundary access was fixed in the
  drivers/nvme/target module (bnc#1143187).

- CVE-2019-15219: A NULL pointer dereference was fixed that could be abused by
  a malicious USB device (bnc#1146519 1146524).

- CVE-2019-15220: A use-after-free issue was fixed that could be caused by a
  malicious USB device (bnc#1146519 1146526).

- CVE-2019-15221: A NULL pointer dereference was fixed that could be caused by
  a malicious USB device (bnc#1146519 1146529).

- CVE-2019-14814: A heap-based buffer overflow was fixed in the marvell wifi
  chip driver. That issue allowed local users to cause a denial of service
  (system crash) or possibly execute arbitrary code (bnc#1146512).

- CVE-2019-14815: A missing length check while parsing WMM IEs was fixed
  (bsc#1146512, bsc#1146514, bsc#1146516).

- CVE-2019-14816: A heap-based buffer overflow in the marvell wifi chip driver
  was fixed. Local users would have abused this issue to cause a denial of
  service (system crash) or possibly execute arbitrary code (bnc#1146516).

- CVE-2017-18509: An issue in net/ipv6 as fixed. By setting a specific socket
  option, an attacker could control a pointer in kernel land and cause an
  inet_csk_listen_stop general protection fault, or potentially execute
  arbitrary code under certain circumstances. The issue can be triggered as
  root (e.g., inside a default LXC container or with the CAP_NET_ADMIN
  capability) or after namespace unsharing. (bnc#1145477)

- CVE-2019-9506: The Bluetooth BR/EDR specification used to permit sufficiently
  low encryption key length and did not prevent an attacker from influencing
  the key length negotiation. This allowed practical brute-force attacks (aka
  'KNOB') that could decrypt traffic and inject arbitrary ciphertext without
  the victim noticing (bnc#1137865).

- CVE-2019-15098: A NULL pointer dereference in drivers/net/wireless/ath was
  fixed (bnc#1146378).

- CVE-2019-15290: A NULL pointer dereference in ath6kl_usb_alloc_urb_from_pipe
  was fixed (bsc#1146378).

- CVE-2019-15239: A incorrect patch to net/ipv4 was fixed. By adding to a write
  queue between disconnection and re-connection, a local attacker could trigger
  multiple use-after-free conditions. This could result in kernel crashes or
  potentially in privilege escalation. (bnc#1146589)

- CVE-2019-15212: A double-free issue was fixed in drivers/usb driver
  (bnc#1146391).

- CVE-2016-10906: A use-after-free issue was fixed in drivers/net/ethernet/arc
  (bnc#1146584).

- CVE-2019-15211: A use-after-free issue caused by a malicious USB device was
  fixed in the drivers/media/v4l2-core driver (bnc#1146519).

- CVE-2019-15217: A a NULL pointer dereference issue caused by a malicious USB
  device was fixed in the drivers/media/usb/zr364xx driver (bnc#1146519).

- CVE-2019-15214: An a use-after-free issue in the sound subsystem was fixed
  (bnc#1146519).

- CVE-2019-15218: A NULL pointer dereference caused by a malicious USB device
  was fixed in the drivers/media/usb/siano driver (bnc#1146413).

- CVE-2019-15215: A use-after-free issue caused by a malicious USB device was
  fixed in the drivers/media/usb/cpia2 driver (bnc#1146425).

- CVE-2018-20976: A use-after-free issue was fixed in the fs/xfs driver
  (bnc#1146285).

- CVE-2017-18551: An out-of-bounds write was fixed in the drivers/i2c driver
  (bnc#1146163).

- CVE-2019-0154: An unprotected read access to i915 registers has been fixed
  that could have been abused to facilitate a local denial-of-service attack.
  (bsc#1135966)

- CVE-2019-0155: A privilege escalation vulnerability has been fixed in the
  i915 module that allowed batch buffers from user mode to gain super user
  privileges. (bsc#1135967)

The following non-security bugs were fixed:

- array_index_nospec: Sanitize speculative array (bsc#1155671)
- bonding/802.3ad: fix link_failure_count tracking (bsc#1141013).
- bonding/802.3ad: fix slave link initialization transition states (bsc#1141013).
- bonding: correctly update link status during mii-commit phase (bsc#1141013).
- bonding: fix active-backup transition (bsc#1141013).
- bonding: make speed, duplex setting consistent with link state (bsc#1141013).
- bonding: ratelimit failed speed/duplex update warning (bsc#1141013).
- bonding: require speed/duplex only for 802.3ad, alb and tlb (bsc#1141013).
- bonding: set default miimon value for non-arp modes if not set (bsc#1141013).
- bonding: speed/duplex update at NETDEV_UP event (bsc#1141013).
- cifs: fix panic in smb2_reconnect (bsc#1142458).
- cifs: handle netapp error codes (bsc#1136261).
- cpu/speculation: Uninline and export CPU mitigations helpers (bnc#1117665).
- ib/core, ipoib: Do not overreact to SM LID change event (bsc#1154103)
- ib/core: Add mitigation for Spectre V1 (bsc#1155671)
- ixgbe: sync the first fragment unconditionally (bsc#1133140).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: lapic: cap __delay at lapic_timer_advance_ns (bsc#1149083).
- kvm: mmu: drop vcpu param in gpte_access (bsc#1117665).
- kvm: mmu: introduce kvm_mmu_gfn_{allow,disallow}_lpage (bsc#1117665).
- kvm: mmu: rename has_wrprotected_page to mmu_gfn_lpage_is_disallowed (bsc#1117665).
- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- kvm: x86: MMU: Consolidate quickly_check_mmio_pf() and is_mmio_page_fault() (bsc#1117665).
- kvm: x86: MMU: Encapsulate the type of rmap-chain head in a new struct (bsc#1117665).
- kvm: x86: MMU: Move handle_mmio_page_fault() call to kvm_mmu_page_fault() (bsc#1117665).
- kvm: x86: MMU: Move initialization of parent_ptes out from kvm_mmu_alloc_page() (bsc#1117665).
- kvm: x86: MMU: Move parent_pte handling from kvm_mmu_get_page() to link_shadow_page() (bsc#1117665).
- kvm: x86: MMU: Remove unused parameter parent_pte from kvm_mmu_get_page() (bsc#1117665).
- kvm: x86: MMU: always set accessed bit in shadow PTEs (bsc#1117665).
- kvm: x86: Reduce the overhead when lapic_timer_advance is disabled (bsc#1149083).
- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- kvm: x86: extend usage of RET_MMIO_PF_* constants (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT (bnc#1117665).
- kvm: x86: move nsec_to_cycles from x86.c to x86.h (bsc#1149083).
- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- kvm: x86: simplify ept_misconfig (bsc#1117665).
- media: smsusb: better handle optional alignment (bsc#1146413).
- pci: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).
- powerpc/64s: support nospectre_v2 cmdline option (bsc#1131107).
- powerpc/pseries: correctly track irq state in default idle (bsc#1150727 bsc#1150942 ltc#178925 ltc#181484).
- powerpc/rtas: use device model APIs and serialization during LPM (bsc#1144123 ltc#178840).
- powerpc/security: Show powerpc_security_features in debugfs (bsc#1131107).
- scsi: scsi_transport_fc: Drop double list_del() (bsc#1084878) During the backport of 260f4aeddb48 ('scsi: scsi_transport_fc: return -EBUSY for deleted vport') an additional list_del() was introduced. The list entry will be freed in fc_vport_terminate(). Do not free it premature in fc_remove_host().
- swiotlb: Add support for DMA_ATTR_SKIP_CPU_SYNC in Xen-swiotlb unmap path (bsc#1133140).
- vmci: Release resource if the work is already queued (bsc#1051510).
- x86/cpu: Add Atom Tremont (Jacobsville) (bsc#1117665).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084878">SUSE bug 1084878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117665">SUSE bug 1117665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133140">SUSE bug 1133140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135966">SUSE bug 1135966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135967">SUSE bug 1135967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136261">SUSE bug 1136261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137865">SUSE bug 1137865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140671">SUSE bug 1140671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141013">SUSE bug 1141013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141054">SUSE bug 1141054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142458">SUSE bug 1142458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143187">SUSE bug 1143187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144123">SUSE bug 1144123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145477">SUSE bug 1145477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146042">SUSE bug 1146042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146163">SUSE bug 1146163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146285">SUSE bug 1146285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146361">SUSE bug 1146361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146378">SUSE bug 1146378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146391">SUSE bug 1146391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146413">SUSE bug 1146413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146425">SUSE bug 1146425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146512">SUSE bug 1146512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146514">SUSE bug 1146514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146516">SUSE bug 1146516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146524">SUSE bug 1146524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146526">SUSE bug 1146526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146529">SUSE bug 1146529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146540">SUSE bug 1146540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146543">SUSE bug 1146543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146547">SUSE bug 1146547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146550">SUSE bug 1146550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146584">SUSE bug 1146584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146589">SUSE bug 1146589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147022">SUSE bug 1147022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147122">SUSE bug 1147122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148394">SUSE bug 1148394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148938">SUSE bug 1148938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149083">SUSE bug 1149083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149376">SUSE bug 1149376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149522">SUSE bug 1149522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149527">SUSE bug 1149527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149555">SUSE bug 1149555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149612">SUSE bug 1149612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150025">SUSE bug 1150025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150112">SUSE bug 1150112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150452">SUSE bug 1150452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150457">SUSE bug 1150457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150465">SUSE bug 1150465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150727">SUSE bug 1150727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150942">SUSE bug 1150942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151347">SUSE bug 1151347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151350">SUSE bug 1151350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152685">SUSE bug 1152685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152782">SUSE bug 1152782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152788">SUSE bug 1152788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153263">SUSE bug 1153263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154103">SUSE bug 1154103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154372">SUSE bug 1154372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155131">SUSE bug 1155131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155671">SUSE bug 1155671</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10906/">CVE-2016-10906 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10906">CVE-2016-10906 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18509/">CVE-2017-18509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18509">CVE-2017-18509 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18551">CVE-2017-18551 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18595/">CVE-2017-18595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18595">CVE-2017-18595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20976/">CVE-2018-20976 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20976">CVE-2018-20976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0154">CVE-2019-0154 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0155">CVE-2019-0155 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13272">CVE-2019-13272 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14814">CVE-2019-14814 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14815">CVE-2019-14815 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14816">CVE-2019-14816 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14821">CVE-2019-14821 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15098">CVE-2019-15098 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15211/">CVE-2019-15211 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15211">CVE-2019-15211 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15212/">CVE-2019-15212 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15212">CVE-2019-15212 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15214/">CVE-2019-15214 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15214">CVE-2019-15214 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15215/">CVE-2019-15215 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15215">CVE-2019-15215 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15216/">CVE-2019-15216 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15216">CVE-2019-15216 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15217">CVE-2019-15217 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15218/">CVE-2019-15218 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15218">CVE-2019-15218 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15219/">CVE-2019-15219 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15219">CVE-2019-15219 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15220/">CVE-2019-15220 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15220">CVE-2019-15220 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15221/">CVE-2019-15221 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15221">CVE-2019-15221 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15239">CVE-2019-15239 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15290">CVE-2019-15290 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15291">CVE-2019-15291 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15505/">CVE-2019-15505 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15505">CVE-2019-15505 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15666">CVE-2019-15666 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15807/">CVE-2019-15807 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15807">CVE-2019-15807 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15902/">CVE-2019-15902 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15902">CVE-2019-15902 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15924/">CVE-2019-15924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15924">CVE-2019-15924 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15926/">CVE-2019-15926 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15926">CVE-2019-15926 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15927/">CVE-2019-15927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15927">CVE-2019-15927 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16232">CVE-2019-16232 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16233">CVE-2019-16233 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16234">CVE-2019-16234 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16413/">CVE-2019-16413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-16413">CVE-2019-16413 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16995/">CVE-2019-16995 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16995">CVE-2019-16995 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17055">CVE-2019-17055 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17056/">CVE-2019-17056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-17056">CVE-2019-17056 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17666">CVE-2019-17666 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9456/">CVE-2019-9456 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9456">CVE-2019-9456 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9506/">CVE-2019-9506 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9506">CVE-2019-9506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555678" comment="kernel-default-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555679" comment="kernel-default-base-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555680" comment="kernel-default-devel-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538349" comment="kernel-devel-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538350" comment="kernel-macros-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538351" comment="kernel-source-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555681" comment="kernel-syms-4.4.180-94.107.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150610" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2959-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to 20191112 security release (bsc#1155988)
  - Processor             Identifier     Version       Products
  - Model        Stepping F-MO-S/PI      Old-&gt;New
  - ---- new platforms ----------------------------------------
  - CML-U62      A0       6-a6-0/80           000000c6 Core Gen10 Mobile
  - CNL-U        D0       6-66-3/80           0000002a Core Gen8 Mobile
  - SKX-SP       B1       6-55-3/97           01000150 Xeon Scalable
  - ICL U/Y      D1       6-7e-5/80           00000046 Core Gen10 Mobile
  - ---- updated platforms ------------------------------------
  - SKL U/Y      D0       6-4e-3/c0 000000cc-&gt;000000d4 Core Gen6 Mobile
  - SKL H/S/E3   R0/N0    6-5e-3/36 000000cc-&gt;000000d4 Core Gen6
  - AML-Y22      H0       6-8e-9/10 000000b4-&gt;000000c6 Core Gen8 Mobile
  - KBL-U/Y      H0       6-8e-9/c0 000000b4-&gt;000000c6 Core Gen7 Mobile
  - CFL-U43e     D0       6-8e-a/c0 000000b4-&gt;000000c6 Core Gen8 Mobile
  - WHL-U        W0       6-8e-b/d0 000000b8-&gt;000000c6 Core Gen8 Mobile
  - AML-Y        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - CML-U42      V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - WHL-U        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen8 Mobile
  - KBL-G/X      H0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7/Gen8
  - KBL-H/S/E3   B0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7; Xeon E3 v6
  - CFL-H/S/E3   U0       6-9e-a/22 000000b4-&gt;000000c6 Core Gen8 Desktop, Mobile, Xeon E
  - CFL-S        B0       6-9e-b/02 000000b4-&gt;000000c6 Core Gen8
  - CFL-H        R0       6-9e-d/22 000000b8-&gt;000000c6 Core Gen9 Mobile
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)

- requires coreutils for the %post script (bsc#1154043)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11139">CVE-2019-11139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522370" comment="ucode-intel-20191112-13.53.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150611" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1156402" ref_url="https://bugzilla.suse.com/1156402" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006137.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2019-2201: Several integer overflow issues and subsequent segfaults occurred in libjpeg-turbo,
  when attempting to compress or decompress gigapixel images. [bsc#1156402]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-14"/>
	<updated date="2019-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156402">SUSE bug 1156402</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2201">CVE-2019-2201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522374" comment="libjpeg-turbo-1.5.3-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522375" comment="libjpeg62-62.2.0-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522376" comment="libjpeg62-32bit-62.2.0-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522377" comment="libjpeg62-turbo-1.5.3-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522378" comment="libjpeg8-8.1.2-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522379" comment="libjpeg8-32bit-8.1.2-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522380" comment="libturbojpeg0-8.1.2-31.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150612" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1156275" ref_url="https://bugzilla.suse.com/1156275" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14869" ref_url="https://www.suse.com/security/cve/CVE-2019-14869/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006145.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issue:
	  
- CVE-2019-14869: Fixed a possible  dSAFER escape which could have allowed 
  an attacker to gain high privileges by a specially crafted Postscript 
  code (bsc#1156275).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156275">SUSE bug 1156275</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14869/">CVE-2019-14869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14869">CVE-2019-14869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522381" comment="ghostscript-9.27-23.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522382" comment="ghostscript-x11-9.27-23.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150613" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006148.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to 20191112 official security release (bsc#1155988)
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11139">CVE-2019-11139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522383" comment="ucode-intel-20191112a-13.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150614" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1155787" ref_url="https://bugzilla.suse.com/1155787" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006167.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2017-2518: Fixed a use-after-free vulnerability which could have 
  led to buffer overflow via a crafted SQL statement (bsc#1155787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155787">SUSE bug 1155787</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2518">CVE-2017-2518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522390" comment="libsqlite3-0-3.8.10.2-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522391" comment="libsqlite3-0-32bit-3.8.10.2-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522392" comment="sqlite3-3.8.10.2-9.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150615" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1146358" ref_url="https://bugzilla.suse.com/1146358" source="BUGZILLA"/>
		<reference ref_id="1146359" ref_url="https://bugzilla.suse.com/1146359" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006170.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2019-8675: Fixed a stack buffer overflow in libcups's asn1_get_type function(bsc#1146358). 
- CVE-2019-8696: Fixed a stack buffer overflow in libcups's asn1_get_packed function (bsc#1146359).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146359">SUSE bug 1146359</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8675">CVE-2019-8675 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8696">CVE-2019-8696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522393" comment="cups-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522394" comment="cups-client-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522395" comment="cups-libs-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522396" comment="cups-libs-32bit-1.7.5-20.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150616" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="1151839" ref_url="https://bugzilla.suse.com/1151839" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006180.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Security issue fixed:

- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).

Non-security issues fixed:

- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option (bsc#1144504).
- Increased the startup timeout of clamd to 5 minutes to cater for the grown virus database as a workaround until clamd has learned to talk to systemd to extend the timeout as long as needed (bsc#1151839).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151839">SUSE bug 1151839</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12625">CVE-2019-12625 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522401" comment="clamav-0.100.3-33.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150617" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1154328" ref_url="https://bugzilla.suse.com/1154328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3693" ref_url="https://www.suse.com/security/cve/CVE-2019-3693/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006186.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:
	  
- CVE-2019-3693: Fixed a local privilege escalation from wwwrun to root (bsc#1154328).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154328">SUSE bug 1154328</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3693/">CVE-2019-3693 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3693">CVE-2019-3693 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530781" comment="mailman-2.1.17-3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150618" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1152856" ref_url="https://bugzilla.suse.com/1152856" source="BUGZILLA"/>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2894" ref_url="https://www.suse.com/security/cve/CVE-2019-2894/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Security issues fixed (October 2019 CPU  bsc#1154212):	  

- CVE-2019-2933: Windows file handling redux
- CVE-2019-2945: Better socket support
- CVE-2019-2949: Better Kerberos ccache handling
- CVE-2019-2958: Build Better Processes
- CVE-2019-2964: Better support for patterns
- CVE-2019-2962: Better Glyph Images
- CVE-2019-2973: Better pattern compilation
- CVE-2019-2978: Improved handling of jar files
- CVE-2019-2981: Better Path supports
- CVE-2019-2983: Better serial attributes
- CVE-2019-2987: Better rendering of native glyphs
- CVE-2019-2988: Better Graphics2D drawing
- CVE-2019-2989: Improve TLS connection support
- CVE-2019-2992: Enhance font glyph mapping
- CVE-2019-2999: Commentary on Javadoc comments
- CVE-2019-2894: Enhance ECDSA operations (bsc#1152856).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-27"/>
	<updated date="2019-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152856">SUSE bug 1152856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2894/">CVE-2019-2894 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2894">CVE-2019-2894 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2949">CVE-2019-2949 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2958">CVE-2019-2958 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2987">CVE-2019-2987 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530782" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530783" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150619" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006210.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:
	  
- CVE-2019-15961: Fixed a denial of service which might occur when 
  scanning a specially crafted email file as (bsc#1157763).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15961">CVE-2019-15961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522421" comment="clamav-0.100.3-33.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150620" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1093414" ref_url="https://bugzilla.suse.com/1093414" source="BUGZILLA"/>
		<reference ref_id="1150734" ref_url="https://bugzilla.suse.com/1150734" source="BUGZILLA"/>
		<reference ref_id="1157198" ref_url="https://bugzilla.suse.com/1157198" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3688" ref_url="https://www.suse.com/security/cve/CVE-2019-3688/" source="CVE"/>
		<reference ref_id="CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006211.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

- CVE-2019-3688: Changed wrong ownership in /usr/sbin/pinger to root:squid
  which could have allowed a squid user to gain persistence by changing the 
  binary (bsc#1093414).
- CVE-2019-3690: Fixed a privilege escalation through untrusted symbolic 
  links (bsc#1150734).
- Fixed a regression which caused segmentation fault (bsc#1157198).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1093414">SUSE bug 1093414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150734">SUSE bug 1150734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157198">SUSE bug 1157198</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3688/">CVE-2019-3688 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3688">CVE-2019-3688 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3690">CVE-2019-3690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530786" comment="permissions-2015.09.28.1626-17.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150621" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1009254" ref_url="https://bugzilla.suse.com/1009254" source="BUGZILLA"/>
		<reference ref_id="1071853" ref_url="https://bugzilla.suse.com/1071853" source="BUGZILLA"/>
		<reference ref_id="1093536" ref_url="https://bugzilla.suse.com/1093536" source="BUGZILLA"/>
		<reference ref_id="1094462" ref_url="https://bugzilla.suse.com/1094462" source="BUGZILLA"/>
		<reference ref_id="1107874" ref_url="https://bugzilla.suse.com/1107874" source="BUGZILLA"/>
		<reference ref_id="1109845" ref_url="https://bugzilla.suse.com/1109845" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10811" ref_url="https://www.suse.com/security/cve/CVE-2018-10811/" source="CVE"/>
		<reference ref_id="CVE-2018-16151" ref_url="https://www.suse.com/security/cve/CVE-2018-16151/" source="CVE"/>
		<reference ref_id="CVE-2018-16152" ref_url="https://www.suse.com/security/cve/CVE-2018-16152/" source="CVE"/>
		<reference ref_id="CVE-2018-17540" ref_url="https://www.suse.com/security/cve/CVE-2018-17540/" source="CVE"/>
		<reference ref_id="CVE-2018-5388" ref_url="https://www.suse.com/security/cve/CVE-2018-5388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006239.html" source="SUSE-SU"/>
		<description>
This update for strongswan provides the following fixes:
	  
Security issues fixed: 

- CVE-2018-5388: Fixed a buffer underflow which may allow to a remote attacker 
  with local user credentials to resource exhaustion and denial of service while 
  reading from the socket (bsc#1094462).
- CVE-2018-10811: Fixed a denial of service during  the IKEv2 key derivation if 
  the openssl plugin is used in FIPS mode and HMAC-MD5 is negotiated as PRF 
  (bsc#1093536).
- CVE-2018-16151,CVE-2018-16152: Fixed multiple flaws in the gmp plugin which 
  might lead to authorization bypass (bsc#1107874).
- CVE-2018-17540: Fixed an improper input validation in gmp plugin (bsc#1109845).  

Other issues addressed:

- Fixed some client fails when the scep server URL is used with HTTPS protocol (bsc#1071853).
- Reject Diffie-Hellman key exchanges using primes smaller than 1024 bit.
- Handle unexpected informational message from SonicWall. (bsc#1009254)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009254">SUSE bug 1009254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071853">SUSE bug 1071853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093536">SUSE bug 1093536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094462">SUSE bug 1094462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109845">SUSE bug 1109845</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10811/">CVE-2018-10811 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10811">CVE-2018-10811 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16151/">CVE-2018-16151 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16151">CVE-2018-16151 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16152/">CVE-2018-16152 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16152">CVE-2018-16152 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17540/">CVE-2018-17540 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17540">CVE-2018-17540 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5388/">CVE-2018-5388 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5388">CVE-2018-5388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522423" comment="strongswan-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552195" comment="strongswan-hmac-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522425" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522426" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150622" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1152497" ref_url="https://bugzilla.suse.com/1152497" source="BUGZILLA"/>
		<reference ref_id="1154448" ref_url="https://bugzilla.suse.com/1154448" source="BUGZILLA"/>
		<reference ref_id="1154456" ref_url="https://bugzilla.suse.com/1154456" source="BUGZILLA"/>
		<reference ref_id="1154458" ref_url="https://bugzilla.suse.com/1154458" source="BUGZILLA"/>
		<reference ref_id="1154460" ref_url="https://bugzilla.suse.com/1154460" source="BUGZILLA"/>
		<reference ref_id="1154461" ref_url="https://bugzilla.suse.com/1154461" source="BUGZILLA"/>
		<reference ref_id="1154464" ref_url="https://bugzilla.suse.com/1154464" source="BUGZILLA"/>
		<reference ref_id="1155945" ref_url="https://bugzilla.suse.com/1155945" source="BUGZILLA"/>
		<reference ref_id="1157888" ref_url="https://bugzilla.suse.com/1157888" source="BUGZILLA"/>
		<reference ref_id="1158003" ref_url="https://bugzilla.suse.com/1158003" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1158007" ref_url="https://bugzilla.suse.com/1158007" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-18420" ref_url="https://www.suse.com/security/cve/CVE-2019-18420/" source="CVE"/>
		<reference ref_id="CVE-2019-18421" ref_url="https://www.suse.com/security/cve/CVE-2019-18421/" source="CVE"/>
		<reference ref_id="CVE-2019-18422" ref_url="https://www.suse.com/security/cve/CVE-2019-18422/" source="CVE"/>
		<reference ref_id="CVE-2019-18423" ref_url="https://www.suse.com/security/cve/CVE-2019-18423/" source="CVE"/>
		<reference ref_id="CVE-2019-18424" ref_url="https://www.suse.com/security/cve/CVE-2019-18424/" source="CVE"/>
		<reference ref_id="CVE-2019-18425" ref_url="https://www.suse.com/security/cve/CVE-2019-18425/" source="CVE"/>
		<reference ref_id="CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19581" ref_url="https://www.suse.com/security/cve/CVE-2019-19581/" source="CVE"/>
		<reference ref_id="CVE-2019-19582" ref_url="https://www.suse.com/security/cve/CVE-2019-19582/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2019-19581: Fixed a potential out of bounds on 32-bit Arm (bsc#1158003 XSA-307).
- CVE-2019-19582: Fixed a potential infinite loop when x86 accesses to bitmaps with 
  a compile time known size of 64 (bsc#1158003 XSA-307).
- CVE-2019-19583: Fixed improper checks which could have allowed HVM/PVH guest userspace 
  code to crash the guest,leading to a guest denial of service (bsc#1158004 XSA-308).
- CVE-2019-19578: Fixed an issue where a malicious or buggy PV guest could have caused
  hypervisor crash resulting in denial of service affecting the entire host (bsc#1158005 XSA-309).
- CVE-2019-19580: Fixed a privilege escalation where a malicious PV guest administrator 
  could have been able to escalate their privilege to that of the host (bsc#1158006 XSA-310).
- CVE-2019-19577: Fixed an issue where a malicious guest administrator could have caused Xen 
  to access data structures while they are being modified leading to a crash (bsc#1158007 XSA-311). 
- CVE-2019-19579: Fixed a privilege escaltion where an untrusted domain with access 
  to a physical device can DMA into host memory (bsc#1157888 XSA-306).
- CVE-2019-18420: Malicious x86 PV guests may have caused a hypervisor crash, 
  resulting in a denial of service (bsc#1154448 XSA-296)
- CVE-2019-18425: 32-bit PV guest user mode could elevate its privileges to that 
  of the guest kernel. (bsc#1154456 XSA-298).
- CVE-2019-18421: A malicious PV guest administrator may have been able to
  escalate their privilege to that of the host. (bsc#1154458 XSA-299).
- CVE-2019-18423: A malicious guest administrator may cause a hypervisor crash,
  resulting in a denial of service  (bsc#1154460 XSA-301).
- CVE-2019-18422: A malicious ARM guest might contrive to arrange for critical 
  Xen code to run with interrupts erroneously enabled. This could lead to data
  corruption, denial of service, or possibly even privilege escalation. However
  a precise attack technique has not been identified. (bsc#1154464 XSA-303)
- CVE-2019-18424: An untrusted domain with access to a physical device can DMA 
  into host memory, leading to privilege escalation. (bsc#1154461 XSA-302).  
- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
  condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
  Exception during Page Size Change, causing the CPU core to be non-functional.
  (bsc#1155945 XSA-304)  
- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
  Transactional Memory support could be used to facilitate sidechannel
  information leaks out of microarchitectural buffers, similar to the
  previously described 'Microarchitectural Data Sampling' attack. (bsc#1152497 XSA-305).  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-13"/>
	<updated date="2019-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152497">SUSE bug 1152497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154448">SUSE bug 1154448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154456">SUSE bug 1154456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154460">SUSE bug 1154460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154461">SUSE bug 1154461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154464">SUSE bug 1154464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155945">SUSE bug 1155945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18420/">CVE-2019-18420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18420">CVE-2019-18420 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18421/">CVE-2019-18421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18421">CVE-2019-18421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18422/">CVE-2019-18422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18422">CVE-2019-18422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18423/">CVE-2019-18423 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18423">CVE-2019-18423 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18424/">CVE-2019-18424 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18424">CVE-2019-18424 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18425/">CVE-2019-18425 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18425">CVE-2019-18425 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19577">CVE-2019-19577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19578">CVE-2019-19578 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19579">CVE-2019-19579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19580">CVE-2019-19580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19581/">CVE-2019-19581 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19581">CVE-2019-19581 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19582/">CVE-2019-19582 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19582">CVE-2019-19582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19583">CVE-2019-19583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538360" comment="xen-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538361" comment="xen-doc-html-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538362" comment="xen-libs-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538363" comment="xen-libs-32bit-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538364" comment="xen-tools-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538365" comment="xen-tools-domU-4.9.4_06-3.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150623" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1082023" ref_url="https://bugzilla.suse.com/1082023" source="BUGZILLA"/>
		<reference ref_id="1158785" ref_url="https://bugzilla.suse.com/1158785" source="BUGZILLA"/>
		<reference ref_id="1158787" ref_url="https://bugzilla.suse.com/1158787" source="BUGZILLA"/>
		<reference ref_id="1158788" ref_url="https://bugzilla.suse.com/1158788" source="BUGZILLA"/>
		<reference ref_id="1158789" ref_url="https://bugzilla.suse.com/1158789" source="BUGZILLA"/>
		<reference ref_id="1158790" ref_url="https://bugzilla.suse.com/1158790" source="BUGZILLA"/>
		<reference ref_id="1158791" ref_url="https://bugzilla.suse.com/1158791" source="BUGZILLA"/>
		<reference ref_id="1158792" ref_url="https://bugzilla.suse.com/1158792" source="BUGZILLA"/>
		<reference ref_id="1158793" ref_url="https://bugzilla.suse.com/1158793" source="BUGZILLA"/>
		<reference ref_id="1158795" ref_url="https://bugzilla.suse.com/1158795" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1348" ref_url="https://www.suse.com/security/cve/CVE-2019-1348/" source="CVE"/>
		<reference ref_id="CVE-2019-1349" ref_url="https://www.suse.com/security/cve/CVE-2019-1349/" source="CVE"/>
		<reference ref_id="CVE-2019-1350" ref_url="https://www.suse.com/security/cve/CVE-2019-1350/" source="CVE"/>
		<reference ref_id="CVE-2019-1351" ref_url="https://www.suse.com/security/cve/CVE-2019-1351/" source="CVE"/>
		<reference ref_id="CVE-2019-1352" ref_url="https://www.suse.com/security/cve/CVE-2019-1352/" source="CVE"/>
		<reference ref_id="CVE-2019-1353" ref_url="https://www.suse.com/security/cve/CVE-2019-1353/" source="CVE"/>
		<reference ref_id="CVE-2019-1354" ref_url="https://www.suse.com/security/cve/CVE-2019-1354/" source="CVE"/>
		<reference ref_id="CVE-2019-1387" ref_url="https://www.suse.com/security/cve/CVE-2019-1387/" source="CVE"/>
		<reference ref_id="CVE-2019-19604" ref_url="https://www.suse.com/security/cve/CVE-2019-19604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

Security issues fixed:

- CVE-2019-1349: Fixed issue on Windows, when submodules are cloned recursively, under certain circumstances Git could be fooled into using the same Git directory twice (bsc#1158787).
- CVE-2019-19604: Fixed a recursive clone followed by a submodule update could execute code contained within the repository without the user explicitly having asked for that (bsc#1158795).
- CVE-2019-1387: Fixed recursive clones that are currently affected by a vulnerability that is caused by too-lax validation of submodule names, allowing very targeted attacks via remote code execution in recursive clones (bsc#1158793).
- CVE-2019-1354: Fixed issue on Windows that refuses to write tracked files with filenames that contain backslashes (bsc#1158792).
- CVE-2019-1353: Fixed issue when run in the Windows Subsystem for Linux while accessing a working directory on a regular Windows drive, none of the NTFS protections were active (bsc#1158791).
- CVE-2019-1352: Fixed issue on Windows was unaware of NTFS Alternate Data Streams (bsc#1158790).
- CVE-2019-1351: Fixed issue on Windows mistakes drive letters outside of the US-English alphabet as relative paths (bsc#1158789).
- CVE-2019-1350: Fixed incorrect quoting of command-line arguments allowed remote code execution during a recursive clone in conjunction with SSH URLs (bsc#1158788).
- CVE-2019-1348: Fixed the --export-marks option of fast-import is exposed also via  the in-stream command feature export-marks=... and it allows overwriting arbitrary paths (bsc#1158785).
- Fixed an issue where git send-email fails to authenticate with SMTP server (bsc#1082023)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-16"/>
	<updated date="2019-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082023">SUSE bug 1082023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158787">SUSE bug 1158787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158788">SUSE bug 1158788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158789">SUSE bug 1158789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158790">SUSE bug 1158790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158791">SUSE bug 1158791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158792">SUSE bug 1158792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158793">SUSE bug 1158793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158795">SUSE bug 1158795</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-1348/">CVE-2019-1348 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1348">CVE-2019-1348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1349/">CVE-2019-1349 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1349">CVE-2019-1349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1350/">CVE-2019-1350 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1350">CVE-2019-1350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1351/">CVE-2019-1351 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1351">CVE-2019-1351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1352/">CVE-2019-1352 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1352">CVE-2019-1352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1353/">CVE-2019-1353 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1353">CVE-2019-1353 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1354/">CVE-2019-1354 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1354">CVE-2019-1354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1387/">CVE-2019-1387 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1387">CVE-2019-1387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19604/">CVE-2019-19604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19604">CVE-2019-19604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530787" comment="git-core-2.12.3-27.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150624" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1158328" ref_url="https://bugzilla.suse.com/1158328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Mozilla Firefox was updated to 68.3esr (MFSA 2019-37 bsc#1158328)	  
	  
Security issues fixed: 

- CVE-2019-17008: Fixed a use-after-free in worker destruction (bmo#1546331)
- CVE-2019-13722: Fixed a stack corruption due to incorrect number of arguments 
  in WebRTC code (bmo#1580156)
- CVE-2019-11745: Fixed an out of bounds write in NSS when encrypting with a 
  block cipher (bmo#1586176)
- CVE-2019-17009: Fixed an issue where updater temporary files accessible to 
  unprivileged processes (bmo#1510494)
- CVE-2019-17010: Fixed a use-after-free when performing device orientation 
  checks (bmo#1581084)
- CVE-2019-17005: Fixed a buffer overflow in plain text serializer (bmo#1584170)
- CVE-2019-17011: Fixed a use-after-free when retrieving a document 
  in antitracking (bmo#1591334)
- CVE-2019-17012: Fixed multiple memmory issues
  (bmo#1449736, bmo#1533957, bmo#1560667,bmo#1567209, bmo#1580288, bmo#1585760, 
  bmo#1592502)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-19"/>
	<updated date="2019-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13722">CVE-2019-13722 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17005">CVE-2019-17005 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17008">CVE-2019-17008 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17009">CVE-2019-17009 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17010">CVE-2019-17010 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17011">CVE-2019-17011 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17012">CVE-2019-17012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150625" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1091041" ref_url="https://bugzilla.suse.com/1091041" source="BUGZILLA"/>
		<reference ref_id="1119461" ref_url="https://bugzilla.suse.com/1119461" source="BUGZILLA"/>
		<reference ref_id="1119465" ref_url="https://bugzilla.suse.com/1119465" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1138190" ref_url="https://bugzilla.suse.com/1138190" source="BUGZILLA"/>
		<reference ref_id="1146544" ref_url="https://bugzilla.suse.com/1146544" source="BUGZILLA"/>
		<reference ref_id="1146612" ref_url="https://bugzilla.suse.com/1146612" source="BUGZILLA"/>
		<reference ref_id="1150466" ref_url="https://bugzilla.suse.com/1150466" source="BUGZILLA"/>
		<reference ref_id="1150483" ref_url="https://bugzilla.suse.com/1150483" source="BUGZILLA"/>
		<reference ref_id="1152631" ref_url="https://bugzilla.suse.com/1152631" source="BUGZILLA"/>
		<reference ref_id="1153811" ref_url="https://bugzilla.suse.com/1153811" source="BUGZILLA"/>
		<reference ref_id="1154905" ref_url="https://bugzilla.suse.com/1154905" source="BUGZILLA"/>
		<reference ref_id="1155689" ref_url="https://bugzilla.suse.com/1155689" source="BUGZILLA"/>
		<reference ref_id="1155897" ref_url="https://bugzilla.suse.com/1155897" source="BUGZILLA"/>
		<reference ref_id="1155898" ref_url="https://bugzilla.suse.com/1155898" source="BUGZILLA"/>
		<reference ref_id="1156187" ref_url="https://bugzilla.suse.com/1156187" source="BUGZILLA"/>
		<reference ref_id="1157038" ref_url="https://bugzilla.suse.com/1157038" source="BUGZILLA"/>
		<reference ref_id="1157042" ref_url="https://bugzilla.suse.com/1157042" source="BUGZILLA"/>
		<reference ref_id="1157070" ref_url="https://bugzilla.suse.com/1157070" source="BUGZILLA"/>
		<reference ref_id="1157143" ref_url="https://bugzilla.suse.com/1157143" source="BUGZILLA"/>
		<reference ref_id="1157158" ref_url="https://bugzilla.suse.com/1157158" source="BUGZILLA"/>
		<reference ref_id="1157191" ref_url="https://bugzilla.suse.com/1157191" source="BUGZILLA"/>
		<reference ref_id="1157324" ref_url="https://bugzilla.suse.com/1157324" source="BUGZILLA"/>
		<reference ref_id="1157333" ref_url="https://bugzilla.suse.com/1157333" source="BUGZILLA"/>
		<reference ref_id="1157464" ref_url="https://bugzilla.suse.com/1157464" source="BUGZILLA"/>
		<reference ref_id="1158132" ref_url="https://bugzilla.suse.com/1158132" source="BUGZILLA"/>
		<reference ref_id="1158394" ref_url="https://bugzilla.suse.com/1158394" source="BUGZILLA"/>
		<reference ref_id="1158398" ref_url="https://bugzilla.suse.com/1158398" source="BUGZILLA"/>
		<reference ref_id="1158410" ref_url="https://bugzilla.suse.com/1158410" source="BUGZILLA"/>
		<reference ref_id="1158413" ref_url="https://bugzilla.suse.com/1158413" source="BUGZILLA"/>
		<reference ref_id="1158417" ref_url="https://bugzilla.suse.com/1158417" source="BUGZILLA"/>
		<reference ref_id="1158445" ref_url="https://bugzilla.suse.com/1158445" source="BUGZILLA"/>
		<reference ref_id="1158823" ref_url="https://bugzilla.suse.com/1158823" source="BUGZILLA"/>
		<reference ref_id="1158824" ref_url="https://bugzilla.suse.com/1158824" source="BUGZILLA"/>
		<reference ref_id="1158827" ref_url="https://bugzilla.suse.com/1158827" source="BUGZILLA"/>
		<reference ref_id="1158834" ref_url="https://bugzilla.suse.com/1158834" source="BUGZILLA"/>
		<reference ref_id="1158900" ref_url="https://bugzilla.suse.com/1158900" source="BUGZILLA"/>
		<reference ref_id="1158903" ref_url="https://bugzilla.suse.com/1158903" source="BUGZILLA"/>
		<reference ref_id="1158904" ref_url="https://bugzilla.suse.com/1158904" source="BUGZILLA"/>
		<reference ref_id="1158954" ref_url="https://bugzilla.suse.com/1158954" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-15213" ref_url="https://www.suse.com/security/cve/CVE-2019-15213/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18680" ref_url="https://www.suse.com/security/cve/CVE-2019-18680/" source="CVE"/>
		<reference ref_id="CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683/" source="CVE"/>
		<reference ref_id="CVE-2019-18805" ref_url="https://www.suse.com/security/cve/CVE-2019-18805/" source="CVE"/>
		<reference ref_id="CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19065" ref_url="https://www.suse.com/security/cve/CVE-2019-19065/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19338" ref_url="https://www.suse.com/security/cve/CVE-2019-19338/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525/" source="CVE"/>
		<reference ref_id="CVE-2019-19527" ref_url="https://www.suse.com/security/cve/CVE-2019-19527/" source="CVE"/>
		<reference ref_id="CVE-2019-19530" ref_url="https://www.suse.com/security/cve/CVE-2019-19530/" source="CVE"/>
		<reference ref_id="CVE-2019-19531" ref_url="https://www.suse.com/security/cve/CVE-2019-19531/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533/" source="CVE"/>
		<reference ref_id="CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534/" source="CVE"/>
		<reference ref_id="CVE-2019-19535" ref_url="https://www.suse.com/security/cve/CVE-2019-19535/" source="CVE"/>
		<reference ref_id="CVE-2019-19536" ref_url="https://www.suse.com/security/cve/CVE-2019-19536/" source="CVE"/>
		<reference ref_id="CVE-2019-19537" ref_url="https://www.suse.com/security/cve/CVE-2019-19537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP 3 LTSS kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2019-14895: A heap-based buffer overflow was discovered in the Linux kernel in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could have allowed the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).
- CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038).
- CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid in the Linux kernel. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free (bnc#1155897).
- CVE-2019-19062: A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333).
- CVE-2019-19065: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures (bnc#1157191).
- CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324).
- CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157143).
- CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function (bnc#1157070).
- CVE-2019-16231: drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150466).
- CVE-2019-18805: An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel There was a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact (bnc#1156187).
- CVE-2019-18680: An issue was discovered in the Linux kernel. There was a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c that will cause denial of service (bnc#1155898).
- CVE-2019-15213: An use-after-free was fixed caused by malicious USB device in drivers/media/usb/dvb-usb/dvb-usb-init.c (bsc#1146544).
- CVE-2019-19536: An uninitialized Kernel memory can leak to USB devices in drivers/net/can/usb/peak_usb/pcan_usb_pro.c (bsc#1158394).
- CVE-2019-19534: An uninitialized Kernel memory can leak to USB devices in drivers/net/can/usb/peak_usb/pcan_usb_core.c (bsc#1158398).
- CVE-2019-19530: An use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver (bsc#1158410).
- CVE-2019-19524: An use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver (bsc#1158413).
- CVE-2019-19525: An use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver (bsc#1158417).
- CVE-2019-19531: An use-after-free in yurex_delete may lead to denial of service (bsc#1158445).
- CVE-2019-19523: An use-after-free on disconnect in USB adutux (bsc#1158823).
- CVE-2019-19532: An out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers (bsc#1158824).
- CVE-2019-19332: An out-of-bounds memory write via kvm_dev_ioctl_get_cpuid (bsc#1158827).
- CVE-2019-19533: An info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver (bsc#1158834).
- CVE-2019-19527: An use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (bsc#1158900).
- CVE-2019-19535: An info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver (bsc#1158903).
- CVE-2019-19537: Two races in the USB character device registration and deregistration routines (bsc#1158904).
- CVE-2019-19338: An incomplete fix for Transaction Asynchronous Abort (TAA) (bsc#1158954).


The following non-security bugs were fixed:

- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).
- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).
- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).
- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).
- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).
- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).
- sched/fair: WARN() and refuse to set buddy when !se-&gt;on_rq (bsc#1158132).
- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).
- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).
- xen/pv: Fix a boot up hang revealed by int3 self test (bsc#1153811).
- arp: Fix cache issue during Life Partition Migration (bsc#1152631).
- futexes: Fix speed on 4.12 kernel (bsc#1157464).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-21"/>
	<updated date="2019-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1091041">SUSE bug 1091041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119461">SUSE bug 1119461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119465">SUSE bug 1119465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138190">SUSE bug 1138190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146544">SUSE bug 1146544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146612">SUSE bug 1146612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150466">SUSE bug 1150466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150483">SUSE bug 1150483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152631">SUSE bug 1152631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153811">SUSE bug 1153811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154905">SUSE bug 1154905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155689">SUSE bug 1155689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155897">SUSE bug 1155897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155898">SUSE bug 1155898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156187">SUSE bug 1156187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157038">SUSE bug 1157038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157042">SUSE bug 1157042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157070">SUSE bug 1157070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157143">SUSE bug 1157143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157158">SUSE bug 1157158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157191">SUSE bug 1157191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157324">SUSE bug 1157324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157333">SUSE bug 1157333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157464">SUSE bug 1157464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158132">SUSE bug 1158132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158394">SUSE bug 1158394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158398">SUSE bug 1158398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158410">SUSE bug 1158410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158413">SUSE bug 1158413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158417">SUSE bug 1158417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158445">SUSE bug 1158445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158823">SUSE bug 1158823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158824">SUSE bug 1158824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158827">SUSE bug 1158827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158900">SUSE bug 1158900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158903">SUSE bug 1158903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158904">SUSE bug 1158904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158954">SUSE bug 1158954</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14895">CVE-2019-14895 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15213/">CVE-2019-15213 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15213">CVE-2019-15213 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16231">CVE-2019-16231 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18660">CVE-2019-18660 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18680/">CVE-2019-18680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18680">CVE-2019-18680 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18683">CVE-2019-18683 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18805/">CVE-2019-18805 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18805">CVE-2019-18805 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19052">CVE-2019-19052 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19062">CVE-2019-19062 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19065/">CVE-2019-19065 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19065">CVE-2019-19065 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19073">CVE-2019-19073 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19074">CVE-2019-19074 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19332">CVE-2019-19332 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19338/">CVE-2019-19338 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19338">CVE-2019-19338 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19523">CVE-2019-19523 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19524">CVE-2019-19524 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19525">CVE-2019-19525 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19527/">CVE-2019-19527 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19527">CVE-2019-19527 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19530/">CVE-2019-19530 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19530">CVE-2019-19530 at NVD</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19531/">CVE-2019-19531 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19531">CVE-2019-19531 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19532">CVE-2019-19532 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19533">CVE-2019-19533 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19534">CVE-2019-19534 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19535/">CVE-2019-19535 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19535">CVE-2019-19535 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19536/">CVE-2019-19536 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19536">CVE-2019-19536 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19537/">CVE-2019-19537 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19537">CVE-2019-19537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555682" comment="kernel-default-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555683" comment="kernel-default-base-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555684" comment="kernel-default-devel-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538370" comment="kernel-devel-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538371" comment="kernel-macros-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538372" comment="kernel-source-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555685" comment="kernel-syms-4.4.180-94.113.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150626" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1144524" ref_url="https://bugzilla.suse.com/1144524" source="BUGZILLA"/>
		<reference ref_id="1146848" ref_url="https://bugzilla.suse.com/1146848" source="BUGZILLA"/>
		<reference ref_id="1166847" ref_url="https://bugzilla.suse.com/1166847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13456" ref_url="https://www.suse.com/security/cve/CVE-2019-13456/" source="CVE"/>
		<reference ref_id="CVE-2019-17185" ref_url="https://www.suse.com/security/cve/CVE-2019-17185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006713.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

- CVE-2019-13456: Fixed a side-channel password leak in EAP-pwd
  (bsc#1144524).
- CVE-2019-17185: Fixed a debial of service due to multithreaded
  BN_CTX access (bsc#1166847).
- Fixed an issue in TLS-EAP where the OCSP verification, when an 
  intermediate client certificate was not explicitly trusted 
  (bsc#1146848).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-17"/>
	<updated date="2020-04-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144524">SUSE bug 1144524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146848">SUSE bug 1146848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166847">SUSE bug 1166847</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13456/">CVE-2019-13456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13456">CVE-2019-13456 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17185/">CVE-2019-17185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17185">CVE-2019-17185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555686" comment="freeradius-server-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555687" comment="freeradius-server-doc-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555688" comment="freeradius-server-krb5-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555689" comment="freeradius-server-ldap-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555690" comment="freeradius-server-libs-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555691" comment="freeradius-server-mysql-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555692" comment="freeradius-server-perl-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555693" comment="freeradius-server-postgresql-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555694" comment="freeradius-server-python-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555695" comment="freeradius-server-sqlite-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555696" comment="freeradius-server-utils-3.0.15-2.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150627" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1168422" ref_url="https://bugzilla.suse.com/1168422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006730.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-3898: Fixed a heap buffer overflow in ppdFindOption() (bsc#1168422).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-23"/>
	<updated date="2020-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3898">CVE-2020-3898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530902" comment="cups-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530903" comment="cups-client-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530904" comment="cups-libs-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530905" comment="cups-libs-32bit-1.7.5-20.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150628" version="1" class="patch">
	<metadata>
		<title>Security update for pam_radius (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1141670" ref_url="https://bugzilla.suse.com/1141670" source="BUGZILLA"/>
		<reference ref_id="1163933" ref_url="https://bugzilla.suse.com/1163933" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9542" ref_url="https://www.suse.com/security/cve/CVE-2015-9542/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006742.html" source="SUSE-SU"/>
		<description>
This update for pam_radius fixes the following issues:

- CVE-2015-9542: Fixed a buffer overflow in password field (bsc#1163933).
- On s390x didn't decrypt passwords correctly (bsc#1141670).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-27"/>
	<updated date="2020-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141670">SUSE bug 1141670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163933">SUSE bug 1163933</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9542/">CVE-2015-9542 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9542">CVE-2015-9542 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530906" comment="pam_radius-1.3.16-239.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530907" comment="pam_radius-32bit-1.3.16-239.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150629" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1155321" ref_url="https://bugzilla.suse.com/1155321" source="BUGZILLA"/>
		<reference ref_id="1156318" ref_url="https://bugzilla.suse.com/1156318" source="BUGZILLA"/>
		<reference ref_id="1159329" ref_url="https://bugzilla.suse.com/1159329" source="BUGZILLA"/>
		<reference ref_id="1161719" ref_url="https://bugzilla.suse.com/1161719" source="BUGZILLA"/>
		<reference ref_id="1163809" ref_url="https://bugzilla.suse.com/1163809" source="BUGZILLA"/>
		<reference ref_id="1165528" ref_url="https://bugzilla.suse.com/1165528" source="BUGZILLA"/>
		<reference ref_id="1169658" ref_url="https://bugzilla.suse.com/1169658" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8625" ref_url="https://www.suse.com/security/cve/CVE-2019-8625/" source="CVE"/>
		<reference ref_id="CVE-2019-8710" ref_url="https://www.suse.com/security/cve/CVE-2019-8710/" source="CVE"/>
		<reference ref_id="CVE-2019-8720" ref_url="https://www.suse.com/security/cve/CVE-2019-8720/" source="CVE"/>
		<reference ref_id="CVE-2019-8743" ref_url="https://www.suse.com/security/cve/CVE-2019-8743/" source="CVE"/>
		<reference ref_id="CVE-2019-8764" ref_url="https://www.suse.com/security/cve/CVE-2019-8764/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8769" ref_url="https://www.suse.com/security/cve/CVE-2019-8769/" source="CVE"/>
		<reference ref_id="CVE-2019-8771" ref_url="https://www.suse.com/security/cve/CVE-2019-8771/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8783" ref_url="https://www.suse.com/security/cve/CVE-2019-8783/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8811" ref_url="https://www.suse.com/security/cve/CVE-2019-8811/" source="CVE"/>
		<reference ref_id="CVE-2019-8812" ref_url="https://www.suse.com/security/cve/CVE-2019-8812/" source="CVE"/>
		<reference ref_id="CVE-2019-8813" ref_url="https://www.suse.com/security/cve/CVE-2019-8813/" source="CVE"/>
		<reference ref_id="CVE-2019-8814" ref_url="https://www.suse.com/security/cve/CVE-2019-8814/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8816" ref_url="https://www.suse.com/security/cve/CVE-2019-8816/" source="CVE"/>
		<reference ref_id="CVE-2019-8819" ref_url="https://www.suse.com/security/cve/CVE-2019-8819/" source="CVE"/>
		<reference ref_id="CVE-2019-8820" ref_url="https://www.suse.com/security/cve/CVE-2019-8820/" source="CVE"/>
		<reference ref_id="CVE-2019-8823" ref_url="https://www.suse.com/security/cve/CVE-2019-8823/" source="CVE"/>
		<reference ref_id="CVE-2019-8835" ref_url="https://www.suse.com/security/cve/CVE-2019-8835/" source="CVE"/>
		<reference ref_id="CVE-2019-8844" ref_url="https://www.suse.com/security/cve/CVE-2019-8844/" source="CVE"/>
		<reference ref_id="CVE-2019-8846" ref_url="https://www.suse.com/security/cve/CVE-2019-8846/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-11793" ref_url="https://www.suse.com/security/cve/CVE-2020-11793/" source="CVE"/>
		<reference ref_id="CVE-2020-3862" ref_url="https://www.suse.com/security/cve/CVE-2020-3862/" source="CVE"/>
		<reference ref_id="CVE-2020-3864" ref_url="https://www.suse.com/security/cve/CVE-2020-3864/" source="CVE"/>
		<reference ref_id="CVE-2020-3865" ref_url="https://www.suse.com/security/cve/CVE-2020-3865/" source="CVE"/>
		<reference ref_id="CVE-2020-3867" ref_url="https://www.suse.com/security/cve/CVE-2020-3867/" source="CVE"/>
		<reference ref_id="CVE-2020-3868" ref_url="https://www.suse.com/security/cve/CVE-2020-3868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.28.1 fixes the following issues:

Security issues fixed:

- CVE-2020-10018: Fixed a denial of service because the m_deferredFocusedNodeChange data structure was mishandled (bsc#1165528).
- CVE-2020-11793: Fixed a potential arbitrary code execution caused by a use-after-free vulnerability (bsc#1169658).
- CVE-2019-8835: Fixed multiple memory corruption issues (bsc#1161719).
- CVE-2019-8844: Fixed multiple memory corruption issues (bsc#1161719).
- CVE-2019-8846: Fixed a use-after-free issue (bsc#1161719).
- CVE-2020-3862: Fixed a memory handling issue (bsc#1163809).
- CVE-2020-3867: Fixed an XSS issue (bsc#1163809).
- CVE-2020-3868: Fixed multiple memory corruption issues that could have lead to arbitrary code execution (bsc#1163809).
- CVE-2020-3864,CVE-2020-3865: Fixed logic issues in the DOM object context handling (bsc#1163809).

Non-security issues fixed:

- Add API to enable Process Swap on (Cross-site) Navigation.
- Add user messages API for the communication with the web extension.
- Add support for same-site cookies.
- Service workers are enabled by default.
- Add support for Pointer Lock API.
- Add flatpak sandbox support.
- Make ondemand hardware acceleration policy never leave accelerated compositing mode.
- Always use a light theme for rendering form controls.
- Add about:gpu to show information about the graphics stack.
- Fixed issues while trying to play a video on NextCloud.
- Fixed vertical alignment of text containing arabic diacritics.
- Fixed build with icu 65.1.
- Fixed page loading errors with websites using HSTS.
- Fixed web process crash when displaying a KaTeX formula.
- Fixed several crashes and rendering issues.
- Switched to a single web process for Evolution and geary (bsc#1159329).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-29"/>
	<updated date="2020-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159329">SUSE bug 1159329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161719">SUSE bug 1161719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165528">SUSE bug 1165528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169658">SUSE bug 1169658</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8625/">CVE-2019-8625 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8625">CVE-2019-8625 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8710/">CVE-2019-8710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8710">CVE-2019-8710 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8720/">CVE-2019-8720 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8720">CVE-2019-8720 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8743/">CVE-2019-8743 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8743">CVE-2019-8743 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8764/">CVE-2019-8764 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8764">CVE-2019-8764 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8766">CVE-2019-8766 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8769/">CVE-2019-8769 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8769">CVE-2019-8769 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8771/">CVE-2019-8771 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8771">CVE-2019-8771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8782">CVE-2019-8782 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8783/">CVE-2019-8783 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8783">CVE-2019-8783 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8808">CVE-2019-8808 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8811/">CVE-2019-8811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8811">CVE-2019-8811 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8812/">CVE-2019-8812 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8812">CVE-2019-8812 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8813/">CVE-2019-8813 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8813">CVE-2019-8813 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8814/">CVE-2019-8814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8814">CVE-2019-8814 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8815">CVE-2019-8815 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8816/">CVE-2019-8816 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8816">CVE-2019-8816 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8819/">CVE-2019-8819 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8819">CVE-2019-8819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8820/">CVE-2019-8820 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8820">CVE-2019-8820 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8823/">CVE-2019-8823 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8823">CVE-2019-8823 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8835/">CVE-2019-8835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8835">CVE-2019-8835 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8844/">CVE-2019-8844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8844">CVE-2019-8844 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8846/">CVE-2019-8846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8846">CVE-2019-8846 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10018">CVE-2020-10018 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11793/">CVE-2020-11793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11793">CVE-2020-11793 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-3862/">CVE-2020-3862 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3862">CVE-2020-3862 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-3864/">CVE-2020-3864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3864">CVE-2020-3864 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3865/">CVE-2020-3865 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3865">CVE-2020-3865 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3867/">CVE-2020-3867 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3867">CVE-2020-3867 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3868/">CVE-2020-3868 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3868">CVE-2020-3868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150630" version="1" class="patch">
	<metadata>
		<title>Security update for shibboleth-sp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1157471" ref_url="https://bugzilla.suse.com/1157471" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19191" ref_url="https://www.suse.com/security/cve/CVE-2019-19191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006355.html" source="SUSE-SU"/>
		<description>
This update for shibboleth-sp fixes the following issues:

Security issue fixed:

- CVE-2019-19191: Fixed escalation to root by fixing ownership of log files (bsc#1157471).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-16"/>
	<updated date="2020-01-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1157471">SUSE bug 1157471</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19191/">CVE-2019-19191 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19191">CVE-2019-19191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530916" comment="libshibsp-lite6-2.5.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530917" comment="libshibsp6-2.5.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530918" comment="shibboleth-sp-2.5.5-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150631" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1170170" ref_url="https://bugzilla.suse.com/1170170" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12059" ref_url="https://www.suse.com/security/cve/CVE-2020-12059/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006768.html" source="SUSE-SU"/>
		<description>
This update for ceph fixes the following issues:

- CVE-2020-12059: Fixed a denial of service caused by a specially crafted XML payload on POST requests (bsc#1170170).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-30"/>
	<updated date="2020-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170170">SUSE bug 1170170</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12059/">CVE-2020-12059 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12059">CVE-2020-12059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555697" comment="ceph-common-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555698" comment="libcephfs2-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555699" comment="librados2-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555700" comment="libradosstriper1-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555701" comment="librbd1-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555702" comment="librgw2-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555703" comment="python-cephfs-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555704" comment="python-rados-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555705" comment="python-rbd-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555706" comment="python-rgw-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150632" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1155419" ref_url="https://bugzilla.suse.com/1155419" source="BUGZILLA"/>
		<reference ref_id="1160471" ref_url="https://bugzilla.suse.com/1160471" source="BUGZILLA"/>
		<reference ref_id="1170441" ref_url="https://bugzilla.suse.com/1170441" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<reference ref_id="CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006773.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2019-15690: Fixed a heap buffer overflow (bsc#1160471).
- CVE-2019-15681: Fixed a memory leak which could have allowed to a remote attacker to read stack memory (bsc#1155419).
- CVE-2019-20788: Fixed a integer overflow and heap-based buffer overflow via a large height or width value (bsc#1170441).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-04"/>
	<updated date="2020-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160471">SUSE bug 1160471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170441">SUSE bug 1170441</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15681">CVE-2019-15681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15690">CVE-2019-15690 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20788">CVE-2019-20788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530919" comment="libvncclient0-0.9.9-17.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530920" comment="libvncserver0-0.9.9-17.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150633" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1166844" ref_url="https://bugzilla.suse.com/1166844" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006779.html" source="SUSE-SU"/>
		<description>
This update for icu fixes the following issues:

- CVE-2020-10531: Fixed integer overflow in UnicodeString:doAppend() (bsc#1166844).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1166844">SUSE bug 1166844</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10531">CVE-2020-10531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530921" comment="libicu-doc-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530922" comment="libicu52_1-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530923" comment="libicu52_1-32bit-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530924" comment="libicu52_1-data-52.1-8.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150634" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1170771" ref_url="https://bugzilla.suse.com/1170771" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006783.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-12243: Fixed a denial of service related to recursive filters (bsc#1170771).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12243">CVE-2020-12243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530925" comment="libldap-2_4-2-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530926" comment="libldap-2_4-2-32bit-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530927" comment="openldap2-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530928" comment="openldap2-back-meta-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530929" comment="openldap2-client-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530930" comment="openldap2-doc-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530931" comment="openldap2-ppolicy-check-password-1.2-18.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150635" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1170643" ref_url="https://bugzilla.suse.com/1170643" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3899" ref_url="https://www.suse.com/security/cve/CVE-2020-3899/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006800.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Security issue fixed:

- CVE-2020-3899: Fixed a memory consumption issue that could have led to remote code execution (bsc#1170643).

Non-security issues fixed:

- Update to version 2.28.2 (bsc#1170643):
  + Fix excessive CPU usage due to GdkFrameClock not being stopped.
  + Fix UI process crash when EGL_WL_bind_wayland_display extension
    is not available.
  + Fix position of select popup menus in X11.
  + Fix playing of Youtube 'live stream'/H264 URLs.
  + Fix a crash under X11 when cairo uses xcb.
  + Fix the build in MIPS64.
  + Fix several crashes and rendering issues.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3899/">CVE-2020-3899 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3899">CVE-2020-3899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530932" comment="libjavascriptcoregtk-4_0-18-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530933" comment="libwebkit2gtk-4_0-37-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530935" comment="typelib-1_0-JavaScriptCore-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530936" comment="typelib-1_0-WebKit2-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530938" comment="webkit2gtk-4_0-injected-bundles-2.28.2-2.53.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150636" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1170603" ref_url="https://bugzilla.suse.com/1170603" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12268" ref_url="https://www.suse.com/security/cve/CVE-2020-12268/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006798.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.52 fixes the following issues:

- CVE-2020-12268: Fixed a heap-based buffer overflow in jbig2_image_compose (bsc#1170603).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170603">SUSE bug 1170603</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-12268/">CVE-2020-12268 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12268">CVE-2020-12268 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530940" comment="ghostscript-9.52-23.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530941" comment="ghostscript-x11-9.52-23.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530942" comment="libspectre1-0.2.7-12.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150637" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1171186" ref_url="https://bugzilla.suse.com/1171186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388/" source="CVE"/>
		<reference ref_id="CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to version 68.8.0 ESR (bsc#1171186):

- CVE-2020-12387: Use-after-free during worker shutdown
- CVE-2020-12388: Sandbox escape with improperly guarded Access Tokens
- CVE-2020-12389: Sandbox escape with improperly separated process types
- CVE-2020-6831: Buffer overflow in SCTP chunk input validation
- CVE-2020-12392: Arbitrary local file access with 'Copy as cURL'
- CVE-2020-12393: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection
- CVE-2020-12395: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12387">CVE-2020-12387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12388">CVE-2020-12388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12389">CVE-2020-12389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12392">CVE-2020-12392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12393">CVE-2020-12393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12395">CVE-2020-12395 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6831">CVE-2020-6831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530943" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530945" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150638" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1169659" ref_url="https://bugzilla.suse.com/1169659" source="BUGZILLA"/>
		<reference ref_id="1170313" ref_url="https://bugzilla.suse.com/1170313" source="BUGZILLA"/>
		<reference ref_id="1170423" ref_url="https://bugzilla.suse.com/1170423" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519/" source="CVE"/>
		<reference ref_id="CVE-2019-12520" ref_url="https://www.suse.com/security/cve/CVE-2019-12520/" source="CVE"/>
		<reference ref_id="CVE-2019-12521" ref_url="https://www.suse.com/security/cve/CVE-2019-12521/" source="CVE"/>
		<reference ref_id="CVE-2019-12524" ref_url="https://www.suse.com/security/cve/CVE-2019-12524/" source="CVE"/>
		<reference ref_id="CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006808.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2019-12519, CVE-2019-12521: fixes incorrect buffer handling that can 
  result in cache poisoning, remote execution, and denial of service attacks
  when processing ESI responses (bsc#1169659).
- CVE-2020-11945: fixes a potential remote execution vulnerability
  when using HTTP Digest Authentication (bsc#1170313).
- CVE-2019-12520, CVE-2019-12524: fixes a potential ACL bypass, cache-bypass
  and cross-site scripting attack when processing invalid HTTP
  Request messages (bsc#1170423).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-08"/>
	<updated date="2020-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169659">SUSE bug 1169659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170313">SUSE bug 1170313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170423">SUSE bug 1170423</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12519">CVE-2019-12519 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12520/">CVE-2019-12520 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12520">CVE-2019-12520 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12521/">CVE-2019-12521 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12521">CVE-2019-12521 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12524/">CVE-2019-12524 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12524">CVE-2019-12524 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11945">CVE-2020-11945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530946" comment="squid-3.5.21-26.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150639" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1168404" ref_url="https://bugzilla.suse.com/1168404" source="BUGZILLA"/>
		<reference ref_id="1168407" ref_url="https://bugzilla.suse.com/1168407" source="BUGZILLA"/>
		<reference ref_id="1169066" ref_url="https://bugzilla.suse.com/1169066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1927" ref_url="https://www.suse.com/security/cve/CVE-2020-1927/" source="CVE"/>
		<reference ref_id="CVE-2020-1934" ref_url="https://www.suse.com/security/cve/CVE-2020-1934/" source="CVE"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006814.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-1934: mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server (bsc#1168404).
- CVE-2020-1927: mod_rewrite configurations vulnerable to open redirect (bsc#1168407).
- CVE-2020-1938: mod_proxy_ajp: Add 'secret' parameter to proxy workers to implement legacy AJP13 authentication (bsc#1169066).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-13"/>
	<updated date="2020-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168404">SUSE bug 1168404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168407">SUSE bug 1168407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169066">SUSE bug 1169066</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1927/">CVE-2020-1927 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1927">CVE-2020-1927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1934/">CVE-2020-1934 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1934">CVE-2020-1934 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530955" comment="apache2-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530956" comment="apache2-doc-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530957" comment="apache2-example-pages-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530958" comment="apache2-prefork-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530959" comment="apache2-utils-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530960" comment="apache2-worker-2.4.23-29.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150640" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1056134" ref_url="https://bugzilla.suse.com/1056134" source="BUGZILLA"/>
		<reference ref_id="1087813" ref_url="https://bugzilla.suse.com/1087813" source="BUGZILLA"/>
		<reference ref_id="1120386" ref_url="https://bugzilla.suse.com/1120386" source="BUGZILLA"/>
		<reference ref_id="1133147" ref_url="https://bugzilla.suse.com/1133147" source="BUGZILLA"/>
		<reference ref_id="1137325" ref_url="https://bugzilla.suse.com/1137325" source="BUGZILLA"/>
		<reference ref_id="1145929" ref_url="https://bugzilla.suse.com/1145929" source="BUGZILLA"/>
		<reference ref_id="1149591" ref_url="https://bugzilla.suse.com/1149591" source="BUGZILLA"/>
		<reference ref_id="1154118" ref_url="https://bugzilla.suse.com/1154118" source="BUGZILLA"/>
		<reference ref_id="1154844" ref_url="https://bugzilla.suse.com/1154844" source="BUGZILLA"/>
		<reference ref_id="1155689" ref_url="https://bugzilla.suse.com/1155689" source="BUGZILLA"/>
		<reference ref_id="1157155" ref_url="https://bugzilla.suse.com/1157155" source="BUGZILLA"/>
		<reference ref_id="1157157" ref_url="https://bugzilla.suse.com/1157157" source="BUGZILLA"/>
		<reference ref_id="1157303" ref_url="https://bugzilla.suse.com/1157303" source="BUGZILLA"/>
		<reference ref_id="1157804" ref_url="https://bugzilla.suse.com/1157804" source="BUGZILLA"/>
		<reference ref_id="1158021" ref_url="https://bugzilla.suse.com/1158021" source="BUGZILLA"/>
		<reference ref_id="1158642" ref_url="https://bugzilla.suse.com/1158642" source="BUGZILLA"/>
		<reference ref_id="1158819" ref_url="https://bugzilla.suse.com/1158819" source="BUGZILLA"/>
		<reference ref_id="1159199" ref_url="https://bugzilla.suse.com/1159199" source="BUGZILLA"/>
		<reference ref_id="1159285" ref_url="https://bugzilla.suse.com/1159285" source="BUGZILLA"/>
		<reference ref_id="1159297" ref_url="https://bugzilla.suse.com/1159297" source="BUGZILLA"/>
		<reference ref_id="1159841" ref_url="https://bugzilla.suse.com/1159841" source="BUGZILLA"/>
		<reference ref_id="1159908" ref_url="https://bugzilla.suse.com/1159908" source="BUGZILLA"/>
		<reference ref_id="1159910" ref_url="https://bugzilla.suse.com/1159910" source="BUGZILLA"/>
		<reference ref_id="1159911" ref_url="https://bugzilla.suse.com/1159911" source="BUGZILLA"/>
		<reference ref_id="1159912" ref_url="https://bugzilla.suse.com/1159912" source="BUGZILLA"/>
		<reference ref_id="1160195" ref_url="https://bugzilla.suse.com/1160195" source="BUGZILLA"/>
		<reference ref_id="1161586" ref_url="https://bugzilla.suse.com/1161586" source="BUGZILLA"/>
		<reference ref_id="1162227" ref_url="https://bugzilla.suse.com/1162227" source="BUGZILLA"/>
		<reference ref_id="1162928" ref_url="https://bugzilla.suse.com/1162928" source="BUGZILLA"/>
		<reference ref_id="1162929" ref_url="https://bugzilla.suse.com/1162929" source="BUGZILLA"/>
		<reference ref_id="1162931" ref_url="https://bugzilla.suse.com/1162931" source="BUGZILLA"/>
		<reference ref_id="1163508" ref_url="https://bugzilla.suse.com/1163508" source="BUGZILLA"/>
		<reference ref_id="1163971" ref_url="https://bugzilla.suse.com/1163971" source="BUGZILLA"/>
		<reference ref_id="1164009" ref_url="https://bugzilla.suse.com/1164009" source="BUGZILLA"/>
		<reference ref_id="1164051" ref_url="https://bugzilla.suse.com/1164051" source="BUGZILLA"/>
		<reference ref_id="1164069" ref_url="https://bugzilla.suse.com/1164069" source="BUGZILLA"/>
		<reference ref_id="1164078" ref_url="https://bugzilla.suse.com/1164078" source="BUGZILLA"/>
		<reference ref_id="1164846" ref_url="https://bugzilla.suse.com/1164846" source="BUGZILLA"/>
		<reference ref_id="1165111" ref_url="https://bugzilla.suse.com/1165111" source="BUGZILLA"/>
		<reference ref_id="1165311" ref_url="https://bugzilla.suse.com/1165311" source="BUGZILLA"/>
		<reference ref_id="1165873" ref_url="https://bugzilla.suse.com/1165873" source="BUGZILLA"/>
		<reference ref_id="1165881" ref_url="https://bugzilla.suse.com/1165881" source="BUGZILLA"/>
		<reference ref_id="1165984" ref_url="https://bugzilla.suse.com/1165984" source="BUGZILLA"/>
		<reference ref_id="1165985" ref_url="https://bugzilla.suse.com/1165985" source="BUGZILLA"/>
		<reference ref_id="1167421" ref_url="https://bugzilla.suse.com/1167421" source="BUGZILLA"/>
		<reference ref_id="1167423" ref_url="https://bugzilla.suse.com/1167423" source="BUGZILLA"/>
		<reference ref_id="1167629" ref_url="https://bugzilla.suse.com/1167629" source="BUGZILLA"/>
		<reference ref_id="1168075" ref_url="https://bugzilla.suse.com/1168075" source="BUGZILLA"/>
		<reference ref_id="1168295" ref_url="https://bugzilla.suse.com/1168295" source="BUGZILLA"/>
		<reference ref_id="1168424" ref_url="https://bugzilla.suse.com/1168424" source="BUGZILLA"/>
		<reference ref_id="1168829" ref_url="https://bugzilla.suse.com/1168829" source="BUGZILLA"/>
		<reference ref_id="1168854" ref_url="https://bugzilla.suse.com/1168854" source="BUGZILLA"/>
		<reference ref_id="1170056" ref_url="https://bugzilla.suse.com/1170056" source="BUGZILLA"/>
		<reference ref_id="1170345" ref_url="https://bugzilla.suse.com/1170345" source="BUGZILLA"/>
		<reference ref_id="1170778" ref_url="https://bugzilla.suse.com/1170778" source="BUGZILLA"/>
		<reference ref_id="1170847" ref_url="https://bugzilla.suse.com/1170847" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18255" ref_url="https://www.suse.com/security/cve/CVE-2017-18255/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-21008" ref_url="https://www.suse.com/security/cve/CVE-2018-21008/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="CVE-2019-18675" ref_url="https://www.suse.com/security/cve/CVE-2019-18675/" source="CVE"/>
		<reference ref_id="CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066/" source="CVE"/>
		<reference ref_id="CVE-2019-19319" ref_url="https://www.suse.com/security/cve/CVE-2019-19319/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-19966" ref_url="https://www.suse.com/security/cve/CVE-2019-19966/" source="CVE"/>
		<reference ref_id="CVE-2019-20054" ref_url="https://www.suse.com/security/cve/CVE-2019-20054/" source="CVE"/>
		<reference ref_id="CVE-2019-20096" ref_url="https://www.suse.com/security/cve/CVE-2019-20096/" source="CVE"/>
		<reference ref_id="CVE-2019-3701" ref_url="https://www.suse.com/security/cve/CVE-2019-3701/" source="CVE"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2019-9455" ref_url="https://www.suse.com/security/cve/CVE-2019-9455/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690/" source="CVE"/>
		<reference ref_id="CVE-2020-10720" ref_url="https://www.suse.com/security/cve/CVE-2020-10720/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11494" ref_url="https://www.suse.com/security/cve/CVE-2020-11494/" source="CVE"/>
		<reference ref_id="CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608/" source="CVE"/>
		<reference ref_id="CVE-2020-11609" ref_url="https://www.suse.com/security/cve/CVE-2020-11609/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-8992" ref_url="https://www.suse.com/security/cve/CVE-2020-8992/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-11494: An issue was discovered in slc_bump in drivers/net/can/slcan.c, which allowed attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL (bnc#1168424).
- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bnc#1167629).
- CVE-2020-8647: Fixed a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bnc#1162929).
- CVE-2020-8649: Fixed a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bnc#1162931).
- CVE-2020-9383: Fixed an issue in set_fdc in drivers/block/floppy.c, which leads to a wait_til_ready out-of-bounds read (bnc#1165111).
- CVE-2019-9458: In the video driver there was a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed (bnc#1168295).
- CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a system crash (bnc#1120386).
- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bnc#1159285).
- CVE-2020-11609: Fixed a NULL pointer dereference in the stv06xx subsystem caused by mishandling invalid descriptors (bnc#1168854).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bnc#1170345).
- CVE-2020-11608: Fixed an issue in drivers/media/usb/gspca/ov519.c caused by a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bnc#1168829).
- CVE-2017-18255: The perf_cpu_time_max_percent_handler function in kernel/events/core.c allowed local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation (bnc#1087813).
- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).
- CVE-2020-2732: A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest (bnc#1163971).
- CVE-2019-5108: Fixed a denial-of-service vulnerability caused by triggering AP to send IAPP location updates for stations before the required authentication process has completed (bnc#1159912).
- CVE-2020-8992: ext4_protect_reserved_inode in fs/ext4/block_validity.c allowed attackers to cause a denial of service (soft lockup) via a crafted journal size (bnc#1164069).
- CVE-2018-21008: Fixed a use-after-free which could be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c (bnc#1149591).
- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bnc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bnc#1157155).
- CVE-2019-18675: Fixed an integer overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bnc#1157804).
- CVE-2019-14615: Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may have allowed an unauthenticated user to potentially enable information disclosure via local access (bnc#1160195, bsc#1165881).
- CVE-2019-19965: Fixed a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bnc#1159911).
- CVE-2019-20054: Fixed a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bnc#1159910).
- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bnc#1159908).
- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bnc#1159841).
- CVE-2019-19447: Fixed an issue with mounting a crafted ext4 filesystem image, performing some operations, and unmounting could lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c (bnc#1158819).
- CVE-2019-19319: Fixed an issue with a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call (bnc#1158021).
- CVE-2019-19767: Fixed mishandling of ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c (bnc#1159297).
- CVE-2019-11091,CVE-2018-12126,CVE-2018-12130,CVE-2018-12127: Earlier mitigations for the 'MDS' Microarchitectural Data Sampling attacks were not complete.
  An additional fix was added to the x86_64 fast systemcall path to further mitigate these attacks. (bsc#1164846 bsc#1170847)


The following non-security bugs were fixed:

- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).
- blktrace: fix dereference after null check (bsc#1159285).
- blktrace: fix trace mutex deadlock (bsc#1159285).
- btrfs: fix btrfs_wait_ordered_range() so that it waits for all ordered extents (bsc#1163508).
- btrfs: fix panic during relocation after ENOSPC before writeback happens (bsc#1163508).
- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1158642)
- btrfs: relocation: fix reloc_root lifespan and access (bsc#1164009).
- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).
- fix PageHeadHuge() race with THP split (VM Functionality, bsc#1165311).
- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).
- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).
- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).
- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).
- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).
- input: add safety guards to input_set_keycode() (bsc#1168075).
- ipv4: correct gso_size for UFO (bsc#1154844).
- ipv6: fix memory accounting during ipv6 queue expire (bsc#1162227) (bsc#1162227).
- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).
- md: add mddev-&gt;pers to avoid potential NULL pointer dereference (bsc#1056134).
- md/bitmap: do not read page from device with Bitmap_sync (bsc#1056134).
- md: change the initialization value for a spare device spot to MD_DISK_ROLE_SPARE (bsc#1056134).
- md: Delete gendisk before cleaning up the request queue (bsc#1056134).
- md: do not call bitmap_create() while array is quiesced (bsc#1056134).
- md: do not set In_sync if array is frozen (bsc#1056134).
- md: fix a potential deadlock of raid5/raid10 reshape (bsc#1056134).
- md: md.c: Return -ENODEV when mddev is NULL in rdev_attr_show (bsc#1056134).
- md: notify about new spare disk in the container (bsc#1056134).
- md/raid0: Fix buffer overflow at debug print (bsc#1164051).
- md/raid10: end bio when the device faulty (bsc#1056134).
- md/raid10: Fix raid10 replace hang when new added disk faulty (bsc#1056134).
- md/raid1,raid10: silence warning about wait-within-wait (bsc#1056134).
- md: return -ENODEV if rdev has no mddev assigned (bsc#1056134).
- media: ov519: add missing endpoint sanity checks (bsc#1168829).
- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).
- net: ena: Add PCI shutdown handler to allow safe kexec (bsc#1167421, bsc#1167423).
- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).
- net/ibmvnic: Fix typo in retry check (bsc#1155689 ltc#182047).
- rpm/kernel-binary.spec.in: Replace Novell with SUSE
- sched/fair: Scale bandwidth quota and period without losing quota/period ratio precision (bsc#1161586).
- scsi: core: avoid repetitive logging of device offline messages (bsc#1145929).
- scsi: core: kABI fix already_offline (bsc#1145929).
- tcp: clear tp-&gt;packets_out when purging write queue (bsc#1154118).
- x86/mitigations: Clear CPU buffers on the SYSCALL fast path (bsc#1164846 bsc#1170847).
- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).
- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-14"/>
	<updated date="2020-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056134">SUSE bug 1056134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087813">SUSE bug 1087813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120386">SUSE bug 1120386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133147">SUSE bug 1133147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137325">SUSE bug 1137325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145929">SUSE bug 1145929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149591">SUSE bug 1149591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154118">SUSE bug 1154118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154844">SUSE bug 1154844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155689">SUSE bug 1155689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157155">SUSE bug 1157155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157157">SUSE bug 1157157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157303">SUSE bug 1157303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157804">SUSE bug 1157804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158021">SUSE bug 1158021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158642">SUSE bug 1158642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158819">SUSE bug 1158819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159199">SUSE bug 1159199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159285">SUSE bug 1159285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159297">SUSE bug 1159297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159841">SUSE bug 1159841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159908">SUSE bug 1159908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159910">SUSE bug 1159910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159911">SUSE bug 1159911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159912">SUSE bug 1159912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160195">SUSE bug 1160195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161586">SUSE bug 1161586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162227">SUSE bug 1162227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162928">SUSE bug 1162928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162929">SUSE bug 1162929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162931">SUSE bug 1162931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163508">SUSE bug 1163508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163971">SUSE bug 1163971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164009">SUSE bug 1164009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164051">SUSE bug 1164051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164069">SUSE bug 1164069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164078">SUSE bug 1164078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164846">SUSE bug 1164846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165111">SUSE bug 1165111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165311">SUSE bug 1165311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165873">SUSE bug 1165873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165881">SUSE bug 1165881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165984">SUSE bug 1165984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165985">SUSE bug 1165985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167421">SUSE bug 1167421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167423">SUSE bug 1167423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167629">SUSE bug 1167629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168075">SUSE bug 1168075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168295">SUSE bug 1168295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168424">SUSE bug 1168424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168829">SUSE bug 1168829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168854">SUSE bug 1168854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170056">SUSE bug 1170056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170345">SUSE bug 1170345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170778">SUSE bug 1170778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170847">SUSE bug 1170847</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18255/">CVE-2017-18255 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18255">CVE-2017-18255 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-21008/">CVE-2018-21008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21008">CVE-2018-21008 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14615">CVE-2019-14615 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18675/">CVE-2019-18675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18675">CVE-2019-18675 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19066">CVE-2019-19066 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19319/">CVE-2019-19319 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19319">CVE-2019-19319 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19447">CVE-2019-19447 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19767">CVE-2019-19767 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19768">CVE-2019-19768 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19965">CVE-2019-19965 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19966/">CVE-2019-19966 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19966">CVE-2019-19966 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20054/">CVE-2019-20054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20054">CVE-2019-20054 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20096/">CVE-2019-20096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20096">CVE-2019-20096 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3701/">CVE-2019-3701 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3701">CVE-2019-3701 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5108">CVE-2019-5108 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9455/">CVE-2019-9455 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9455">CVE-2019-9455 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9458">CVE-2019-9458 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10690">CVE-2020-10690 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10720/">CVE-2020-10720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10720">CVE-2020-10720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10942">CVE-2020-10942 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11494/">CVE-2020-11494 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11494">CVE-2020-11494 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11608">CVE-2020-11608 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11609/">CVE-2020-11609 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11609">CVE-2020-11609 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2732">CVE-2020-2732 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8647">CVE-2020-8647 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8648">CVE-2020-8648 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8649">CVE-2020-8649 at NVD</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8992/">CVE-2020-8992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8992">CVE-2020-8992 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9383">CVE-2020-9383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555707" comment="kernel-default-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555708" comment="kernel-default-base-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555709" comment="kernel-default-devel-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538400" comment="kernel-devel-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538401" comment="kernel-macros-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538402" comment="kernel-source-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555710" comment="kernel-syms-4.4.180-94.116.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150641" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyYAML (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1165439" ref_url="https://bugzilla.suse.com/1165439" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1747" ref_url="https://www.suse.com/security/cve/CVE-2020-1747/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006820.html" source="SUSE-SU"/>
		<description>
This update for python-PyYAML fixes the following issues:

- CVE-2020-1747: Fixed an arbitrary code execution when YAML files are parsed by FullLoader (bsc#1165439).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-15"/>
	<updated date="2020-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165439">SUSE bug 1165439</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1747/">CVE-2020-1747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1747">CVE-2020-1747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009524550" comment="python-PyYAML-5.1.2-26.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530070" comment="python3-PyYAML-5.1.2-26.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150642" version="1" class="patch">
	<metadata>
		<title>Security update for git (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1168930" ref_url="https://bugzilla.suse.com/1168930" source="BUGZILLA"/>
		<reference ref_id="1169605" ref_url="https://bugzilla.suse.com/1169605" source="BUGZILLA"/>
		<reference ref_id="1169786" ref_url="https://bugzilla.suse.com/1169786" source="BUGZILLA"/>
		<reference ref_id="1169936" ref_url="https://bugzilla.suse.com/1169936" source="BUGZILLA"/>
		<reference ref_id="1170302" ref_url="https://bugzilla.suse.com/1170302" source="BUGZILLA"/>
		<reference ref_id="1170741" ref_url="https://bugzilla.suse.com/1170741" source="BUGZILLA"/>
		<reference ref_id="1170939" ref_url="https://bugzilla.suse.com/1170939" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11008" ref_url="https://www.suse.com/security/cve/CVE-2020-11008/" source="CVE"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006829.html" source="SUSE-SU"/>
		<description>
This update for git to 2.26.2 fixes the following issues:

Security issue fixed:

- CVE-2020-11008: Specially crafted URLs may have tricked the credentials helper 
  to providing credential information that is not appropriate for the protocol 
  in use and host being contacted (bsc#1169936).

Non-security issue fixed:

- Fixed git-daemon not starting after conversion from sysvinit to systemd service (bsc#1169605).
- Enabled access for git-daemon in firewall configuration (bsc#1170302).
- Fixed problems with recent switch to protocol v2, which caused fetches transferring unreasonable amount of data (bsc#1170741).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-18"/>
	<updated date="2020-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169605">SUSE bug 1169605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169786">SUSE bug 1169786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169936">SUSE bug 1169936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170302">SUSE bug 1170302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170741">SUSE bug 1170741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170939">SUSE bug 1170939</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11008/">CVE-2020-11008 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11008">CVE-2020-11008 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5260">CVE-2020-5260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530961" comment="git-core-2.26.2-27.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150643" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1167068" ref_url="https://bugzilla.suse.com/1167068" source="BUGZILLA"/>
		<reference ref_id="1170558" ref_url="https://bugzilla.suse.com/1170558" source="BUGZILLA"/>
		<reference ref_id="1171363" ref_url="https://bugzilla.suse.com/1171363" source="BUGZILLA"/>
		<reference ref_id="682920" ref_url="https://bugzilla.suse.com/682920" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12108" ref_url="https://www.suse.com/security/cve/CVE-2020-12108/" source="CVE"/>
		<reference ref_id="CVE-2020-12137" ref_url="https://www.suse.com/security/cve/CVE-2020-12137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006830.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2020-12108: Fixed a content injection bug (bsc#1171363).
- CVE-2020-12137: Fixed a XSS vulnerability caused by MIME type confusion (bsc#1170558).

Non-security issue fixed:

- Fixed rights and ownership on /var/lib/mailman/archives (bsc#1167068).
- Don't default to invalid hosts for DEFAULT_EMAIL_HOST (bsc#682920).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-18"/>
	<updated date="2020-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167068">SUSE bug 1167068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170558">SUSE bug 1170558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171363">SUSE bug 1171363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682920">SUSE bug 682920</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12108/">CVE-2020-12108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12108">CVE-2020-12108 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12137/">CVE-2020-12137 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12137">CVE-2020-12137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530963" comment="mailman-2.1.17-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150644" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1136085" ref_url="https://bugzilla.suse.com/1136085" source="BUGZILLA"/>
		<reference ref_id="1159723" ref_url="https://bugzilla.suse.com/1159723" source="BUGZILLA"/>
		<reference ref_id="1159729" ref_url="https://bugzilla.suse.com/1159729" source="BUGZILLA"/>
		<reference ref_id="1164825" ref_url="https://bugzilla.suse.com/1164825" source="BUGZILLA"/>
		<reference ref_id="1171928" ref_url="https://bugzilla.suse.com/1171928" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221/" source="CVE"/>
		<reference ref_id="CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418/" source="CVE"/>
		<reference ref_id="CVE-2019-17563" ref_url="https://www.suse.com/security/cve/CVE-2019-17563/" source="CVE"/>
		<reference ref_id="CVE-2019-17569" ref_url="https://www.suse.com/security/cve/CVE-2019-17569/" source="CVE"/>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006867.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

CVE-2020-9484 (bsc#1171928)
Apache Tomcat Remote Code Execution via session persistence

If an attacker was able to control the contents and name of a file on a
server configured to use the PersistenceManager, then the attacker could
have triggered a remote code execution via deserialization of the file under
their control.

CVE-2019-12418 (bsc#1159723)
Local privilege escalation by manipulating the RMI registry and performing a man-in-the-middle attack

When Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files was able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface.
The attacker could then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.

CVE-2019-0221 (bsc#1136085)
The SSI printenv command echoed user provided data without escaping, which
made it vulnerable to XSS.

CVE-2019-17563 (bsc#1159729)
When using FORM authentication there was a narrow window where an attacker could perform a session fixation attack.

CVE-2019-17569 (bsc#1164825)
Invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling
if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-28"/>
	<updated date="2020-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136085">SUSE bug 1136085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159723">SUSE bug 1159723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159729">SUSE bug 1159729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164825">SUSE bug 1164825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171928">SUSE bug 1171928</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0221">CVE-2019-0221 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12418">CVE-2019-12418 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17563/">CVE-2019-17563 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17563">CVE-2019-17563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17569/">CVE-2019-17569 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17569">CVE-2019-17569 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9484">CVE-2020-9484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530964" comment="tomcat-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530965" comment="tomcat-admin-webapps-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530966" comment="tomcat-docs-webapp-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530967" comment="tomcat-el-3_0-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530968" comment="tomcat-javadoc-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530969" comment="tomcat-jsp-2_3-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530970" comment="tomcat-lib-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530971" comment="tomcat-servlet-3_1-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530972" comment="tomcat-webapps-8.0.53-29.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150645" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1027282" ref_url="https://bugzilla.suse.com/1027282" source="BUGZILLA"/>
		<reference ref_id="1041090" ref_url="https://bugzilla.suse.com/1041090" source="BUGZILLA"/>
		<reference ref_id="1042670" ref_url="https://bugzilla.suse.com/1042670" source="BUGZILLA"/>
		<reference ref_id="1073269" ref_url="https://bugzilla.suse.com/1073269" source="BUGZILLA"/>
		<reference ref_id="1073748" ref_url="https://bugzilla.suse.com/1073748" source="BUGZILLA"/>
		<reference ref_id="1078326" ref_url="https://bugzilla.suse.com/1078326" source="BUGZILLA"/>
		<reference ref_id="1078485" ref_url="https://bugzilla.suse.com/1078485" source="BUGZILLA"/>
		<reference ref_id="1081750" ref_url="https://bugzilla.suse.com/1081750" source="BUGZILLA"/>
		<reference ref_id="1084650" ref_url="https://bugzilla.suse.com/1084650" source="BUGZILLA"/>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1153830" ref_url="https://bugzilla.suse.com/1153830" source="BUGZILLA"/>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1159035" ref_url="https://bugzilla.suse.com/1159035" source="BUGZILLA"/>
		<reference ref_id="1162224" ref_url="https://bugzilla.suse.com/1162224" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="1170411" ref_url="https://bugzilla.suse.com/1170411" source="BUGZILLA"/>
		<reference ref_id="1171561" ref_url="https://bugzilla.suse.com/1171561" source="BUGZILLA"/>
		<reference ref_id="945401" ref_url="https://bugzilla.suse.com/945401" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006878.html" source="SUSE-SU"/>
		<description>


This update for python to version 2.7.17 fixes the following issues:

Syncing with lots of upstream bug fixes and security fixes.

Bug fixes:

- CVE-2019-9674: Improved the documentation to reflect the dangers of zip-bombs (bsc#1162825).
- CVE-2019-18348: Fixed a CRLF injection via the host part of the url passed to urlopen(). Now an InvalidURL exception is raised (bsc#1155094).
- CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367).
- Fixed mismatches between libpython and python-base versions (bsc#1162224).
- Fixed segfault in libpython2.7.so.1 (bsc#1073748).
- Unified packages among openSUSE:Factory and SLE versions (bsc#1159035).
- Added idle.desktop and idle.appdata.xml to provide IDLE in menus (bsc#1153830).
- Excluded tsl_check files from python-base to prevent file conflict with python-strict-tls-checks package (bsc#945401).
- Changed the name of idle3 icons to idle3.png to avoid collision with Python 2 version (bsc#1165894).

Additionally a new 'shared-python-startup' package is provided containing startup files.

python-rpm-macros was updated to fix:

- Do not write .pyc files for tests (bsc#1171561)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-03"/>
	<updated date="2020-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027282">SUSE bug 1027282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041090">SUSE bug 1041090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042670">SUSE bug 1042670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073269">SUSE bug 1073269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073748">SUSE bug 1073748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078326">SUSE bug 1078326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078485">SUSE bug 1078485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081750">SUSE bug 1081750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084650">SUSE bug 1084650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153830">SUSE bug 1153830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159035">SUSE bug 1159035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162224">SUSE bug 1162224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170411">SUSE bug 1170411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171561">SUSE bug 1171561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945401">SUSE bug 945401</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530973" comment="libpython2_7-1_0-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530974" comment="libpython2_7-1_0-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530975" comment="python-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530976" comment="python-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530977" comment="python-base-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530978" comment="python-base-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530979" comment="python-curses-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530980" comment="python-demo-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530981" comment="python-devel-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530982" comment="python-doc-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530983" comment="python-doc-pdf-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530984" comment="python-gdbm-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530985" comment="python-idle-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530986" comment="python-rpm-macros-20200207.5feb6c1-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530987" comment="python-tk-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530988" comment="python-xml-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530989" comment="shared-python-startup-0.1-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150646" version="1" class="patch">
	<metadata>
		<title>Security update for krb5-appl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1165787" ref_url="https://bugzilla.suse.com/1165787" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10188" ref_url="https://www.suse.com/security/cve/CVE-2020-10188/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006882.html" source="SUSE-SU"/>
		<description>
This update for krb5-appl fixes the following issues:

- CVE-2020-10188: Fixed a remote root execution (bsc#1165787).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165787">SUSE bug 1165787</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10188/">CVE-2020-10188 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10188">CVE-2020-10188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531003" comment="krb5-appl-clients-1.0.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531004" comment="krb5-appl-servers-1.0.3-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150647" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1055857" ref_url="https://bugzilla.suse.com/1055857" source="BUGZILLA"/>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="1171475" ref_url="https://bugzilla.suse.com/1171475" source="BUGZILLA"/>
		<reference ref_id="1171847" ref_url="https://bugzilla.suse.com/1171847" source="BUGZILLA"/>
		<reference ref_id="1172105" ref_url="https://bugzilla.suse.com/1172105" source="BUGZILLA"/>
		<reference ref_id="1172116" ref_url="https://bugzilla.suse.com/1172116" source="BUGZILLA"/>
		<reference ref_id="1172121" ref_url="https://bugzilla.suse.com/1172121" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328/" source="CVE"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="CVE-2020-0093" ref_url="https://www.suse.com/security/cve/CVE-2020-0093/" source="CVE"/>
		<reference ref_id="CVE-2020-12767" ref_url="https://www.suse.com/security/cve/CVE-2020-12767/" source="CVE"/>
		<reference ref_id="CVE-2020-13112" ref_url="https://www.suse.com/security/cve/CVE-2020-13112/" source="CVE"/>
		<reference ref_id="CVE-2020-13113" ref_url="https://www.suse.com/security/cve/CVE-2020-13113/" source="CVE"/>
		<reference ref_id="CVE-2020-13114" ref_url="https://www.suse.com/security/cve/CVE-2020-13114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

Security issues fixed:

- CVE-2016-6328: Fixed an integer overflow in parsing MNOTE entry data of the input file (bsc#1055857).
- CVE-2017-7544: Fixed an out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c (bsc#1059893).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2020-0093: Fixed an out-of-bounds read in exif_data_save_data_entry (bsc#1171847).
- CVE-2020-12767: Fixed a divide-by-zero error in exif_entry_get_value (bsc#1171475).
- CVE-2020-13112: Fixed a time consumption DoS when parsing canon array markers (bsc#1172121).
- CVE-2020-13113: Fixed a potential use of uninitialized memory (bsc#1172105).
- CVE-2020-13114: Fixed various buffer overread fixes due to integer overflows in maker notes (bsc#1172116).

Non-security issues fixed:

- libexif was updated to version 0.6.22:
  * New translations: ms
  * Updated translations for most languages
  * Some useful EXIF 2.3 tag added:
    * EXIF_TAG_GAMMA
    * EXIF_TAG_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_IMAGE_NUMBER_OF_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_EXPOSURE_TIMES_OF_COMPOSITE_IMAGE
    * EXIF_TAG_GPS_H_POSITIONING_ERROR
    * EXIF_TAG_CAMERA_OWNER_NAME
    * EXIF_TAG_BODY_SERIAL_NUMBER
    * EXIF_TAG_LENS_SPECIFICATION
    * EXIF_TAG_LENS_MAKE
    * EXIF_TAG_LENS_MODEL
    * EXIF_TAG_LENS_SERIAL_NUMBER
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055857">SUSE bug 1055857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171475">SUSE bug 1171475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171847">SUSE bug 1171847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172105">SUSE bug 1172105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172116">SUSE bug 1172116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172121">SUSE bug 1172121</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6328">CVE-2016-6328 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7544">CVE-2017-7544 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20030">CVE-2018-20030 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9278">CVE-2019-9278 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0093/">CVE-2020-0093 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0093">CVE-2020-0093 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12767/">CVE-2020-12767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12767">CVE-2020-12767 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13112/">CVE-2020-13112 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13112">CVE-2020-13112 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13113/">CVE-2020-13113 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13113">CVE-2020-13113 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13114/">CVE-2020-13114 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13114">CVE-2020-13114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531005" comment="libexif12-0.6.22-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531006" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150648" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="1146873" ref_url="https://bugzilla.suse.com/1146873" source="BUGZILLA"/>
		<reference ref_id="1149811" ref_url="https://bugzilla.suse.com/1149811" source="BUGZILLA"/>
		<reference ref_id="1160024" ref_url="https://bugzilla.suse.com/1160024" source="BUGZILLA"/>
		<reference ref_id="1161066" ref_url="https://bugzilla.suse.com/1161066" source="BUGZILLA"/>
		<reference ref_id="1163018" ref_url="https://bugzilla.suse.com/1163018" source="BUGZILLA"/>
		<reference ref_id="1166240" ref_url="https://bugzilla.suse.com/1166240" source="BUGZILLA"/>
		<reference ref_id="1170940" ref_url="https://bugzilla.suse.com/1170940" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2020-1711: Fixed a potential OOB access in the iSCSI client code (bsc#1166240).
- CVE-2019-12068: Fixed a potential DoS in the LSI SCSI controller emulation (bsc#1146873).
- CVE-2020-1983: Fixed a use-after-free in the ip_reass function of slirp (bsc#1170940).
- CVE-2020-8608: Fixed a potential OOB access in slirp (bsc#1163018).
- CVE-2020-7039: Fixed a potential OOB access in slirp (bsc#1161066).
- CVE-2019-15890: Fixed a use-after-free during packet reassembly in slirp (bsc#1149811).
- Fixed multiple potential DoS issues in SLIRP, similar to CVE-2019-6778 (bsc#1123156).

Non-security issue fixed:

- Make sure that required memory is mapped properly during an incoming migration of a Xen HVM domU (bsc#1160024).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146873">SUSE bug 1146873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149811">SUSE bug 1149811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160024">SUSE bug 1160024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161066">SUSE bug 1161066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163018">SUSE bug 1163018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166240">SUSE bug 1166240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170940">SUSE bug 1170940</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12068">CVE-2019-12068 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1711">CVE-2020-1711 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1983">CVE-2020-1983 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7039">CVE-2020-7039 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555711" comment="qemu-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555712" comment="qemu-block-curl-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555713" comment="qemu-block-iscsi-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538416" comment="qemu-block-rbd-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555714" comment="qemu-block-ssh-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555715" comment="qemu-guest-agent-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538419" comment="qemu-ipxe-1.0.0+-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538420" comment="qemu-kvm-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555716" comment="qemu-lang-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538423" comment="qemu-seabios-1.10.2-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538424" comment="qemu-sgabios-8-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555717" comment="qemu-tools-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538426" comment="qemu-vgabios-1.10.2-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538427" comment="qemu-x86-2.9.1-6.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150649" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1172031" ref_url="https://bugzilla.suse.com/1172031" source="BUGZILLA"/>
		<reference ref_id="1172225" ref_url="https://bugzilla.suse.com/1172225" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006895.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2019-20807: Fixed an issue where escaping from the restrictive mode of vim 
  was possible using interfaces (bsc#1172225 and bsc#1172031).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172031">SUSE bug 1172031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172225">SUSE bug 1172225</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20807">CVE-2019-20807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531007" comment="gvim-7.4.326-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531008" comment="vim-7.4.326-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531009" comment="vim-data-7.4.326-17.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150650" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1172402" ref_url="https://bugzilla.suse.com/1172402" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006901.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- MozillaFirefox was updated to version 68.9.0 Extended Support Release (bsc#1172402).

- CVE-2020-12405: Fixed a use-after-free in SharedWorkerService. 
- CVE-2020-12406: Fixed a JavaScript Type confusion with NativeTypes.
- CVE-2020-12410: Fixed multiple memory safety bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12405">CVE-2020-12405 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12406">CVE-2020-12406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12410">CVE-2020-12410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531010" comment="MozillaFirefox-68.9.0-109.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531012" comment="MozillaFirefox-translations-common-68.9.0-109.123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150651" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1043983" ref_url="https://bugzilla.suse.com/1043983" source="BUGZILLA"/>
		<reference ref_id="1048072" ref_url="https://bugzilla.suse.com/1048072" source="BUGZILLA"/>
		<reference ref_id="1055265" ref_url="https://bugzilla.suse.com/1055265" source="BUGZILLA"/>
		<reference ref_id="1056286" ref_url="https://bugzilla.suse.com/1056286" source="BUGZILLA"/>
		<reference ref_id="1056782" ref_url="https://bugzilla.suse.com/1056782" source="BUGZILLA"/>
		<reference ref_id="1058754" ref_url="https://bugzilla.suse.com/1058754" source="BUGZILLA"/>
		<reference ref_id="1058755" ref_url="https://bugzilla.suse.com/1058755" source="BUGZILLA"/>
		<reference ref_id="1058757" ref_url="https://bugzilla.suse.com/1058757" source="BUGZILLA"/>
		<reference ref_id="1062452" ref_url="https://bugzilla.suse.com/1062452" source="BUGZILLA"/>
		<reference ref_id="1069607" ref_url="https://bugzilla.suse.com/1069607" source="BUGZILLA"/>
		<reference ref_id="1069632" ref_url="https://bugzilla.suse.com/1069632" source="BUGZILLA"/>
		<reference ref_id="1073002" ref_url="https://bugzilla.suse.com/1073002" source="BUGZILLA"/>
		<reference ref_id="1078782" ref_url="https://bugzilla.suse.com/1078782" source="BUGZILLA"/>
		<reference ref_id="1082007" ref_url="https://bugzilla.suse.com/1082007" source="BUGZILLA"/>
		<reference ref_id="1082008" ref_url="https://bugzilla.suse.com/1082008" source="BUGZILLA"/>
		<reference ref_id="1082009" ref_url="https://bugzilla.suse.com/1082009" source="BUGZILLA"/>
		<reference ref_id="1082010" ref_url="https://bugzilla.suse.com/1082010" source="BUGZILLA"/>
		<reference ref_id="1082011" ref_url="https://bugzilla.suse.com/1082011" source="BUGZILLA"/>
		<reference ref_id="1082014" ref_url="https://bugzilla.suse.com/1082014" source="BUGZILLA"/>
		<reference ref_id="1082058" ref_url="https://bugzilla.suse.com/1082058" source="BUGZILLA"/>
		<reference ref_id="1087433" ref_url="https://bugzilla.suse.com/1087433" source="BUGZILLA"/>
		<reference ref_id="1087434" ref_url="https://bugzilla.suse.com/1087434" source="BUGZILLA"/>
		<reference ref_id="1087436" ref_url="https://bugzilla.suse.com/1087436" source="BUGZILLA"/>
		<reference ref_id="1087437" ref_url="https://bugzilla.suse.com/1087437" source="BUGZILLA"/>
		<reference ref_id="1087440" ref_url="https://bugzilla.suse.com/1087440" source="BUGZILLA"/>
		<reference ref_id="1087441" ref_url="https://bugzilla.suse.com/1087441" source="BUGZILLA"/>
		<reference ref_id="1112530" ref_url="https://bugzilla.suse.com/1112530" source="BUGZILLA"/>
		<reference ref_id="1112532" ref_url="https://bugzilla.suse.com/1112532" source="BUGZILLA"/>
		<reference ref_id="1130611" ref_url="https://bugzilla.suse.com/1130611" source="BUGZILLA"/>
		<reference ref_id="1130617" ref_url="https://bugzilla.suse.com/1130617" source="BUGZILLA"/>
		<reference ref_id="1130620" ref_url="https://bugzilla.suse.com/1130620" source="BUGZILLA"/>
		<reference ref_id="1130622" ref_url="https://bugzilla.suse.com/1130622" source="BUGZILLA"/>
		<reference ref_id="1130623" ref_url="https://bugzilla.suse.com/1130623" source="BUGZILLA"/>
		<reference ref_id="1130627" ref_url="https://bugzilla.suse.com/1130627" source="BUGZILLA"/>
		<reference ref_id="1152990" ref_url="https://bugzilla.suse.com/1152990" source="BUGZILLA"/>
		<reference ref_id="1152992" ref_url="https://bugzilla.suse.com/1152992" source="BUGZILLA"/>
		<reference ref_id="1152994" ref_url="https://bugzilla.suse.com/1152994" source="BUGZILLA"/>
		<reference ref_id="1152995" ref_url="https://bugzilla.suse.com/1152995" source="BUGZILLA"/>
		<reference ref_id="1171517" ref_url="https://bugzilla.suse.com/1171517" source="BUGZILLA"/>
		<reference ref_id="1172275" ref_url="https://bugzilla.suse.com/1172275" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9096" ref_url="https://www.suse.com/security/cve/CVE-2015-9096/" source="CVE"/>
		<reference ref_id="CVE-2016-2339" ref_url="https://www.suse.com/security/cve/CVE-2016-2339/" source="CVE"/>
		<reference ref_id="CVE-2016-7798" ref_url="https://www.suse.com/security/cve/CVE-2016-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-0898" ref_url="https://www.suse.com/security/cve/CVE-2017-0898/" source="CVE"/>
		<reference ref_id="CVE-2017-0899" ref_url="https://www.suse.com/security/cve/CVE-2017-0899/" source="CVE"/>
		<reference ref_id="CVE-2017-0900" ref_url="https://www.suse.com/security/cve/CVE-2017-0900/" source="CVE"/>
		<reference ref_id="CVE-2017-0901" ref_url="https://www.suse.com/security/cve/CVE-2017-0901/" source="CVE"/>
		<reference ref_id="CVE-2017-0902" ref_url="https://www.suse.com/security/cve/CVE-2017-0902/" source="CVE"/>
		<reference ref_id="CVE-2017-0903" ref_url="https://www.suse.com/security/cve/CVE-2017-0903/" source="CVE"/>
		<reference ref_id="CVE-2017-10784" ref_url="https://www.suse.com/security/cve/CVE-2017-10784/" source="CVE"/>
		<reference ref_id="CVE-2017-14033" ref_url="https://www.suse.com/security/cve/CVE-2017-14033/" source="CVE"/>
		<reference ref_id="CVE-2017-14064" ref_url="https://www.suse.com/security/cve/CVE-2017-14064/" source="CVE"/>
		<reference ref_id="CVE-2017-17405" ref_url="https://www.suse.com/security/cve/CVE-2017-17405/" source="CVE"/>
		<reference ref_id="CVE-2017-17742" ref_url="https://www.suse.com/security/cve/CVE-2017-17742/" source="CVE"/>
		<reference ref_id="CVE-2017-17790" ref_url="https://www.suse.com/security/cve/CVE-2017-17790/" source="CVE"/>
		<reference ref_id="CVE-2017-9228" ref_url="https://www.suse.com/security/cve/CVE-2017-9228/" source="CVE"/>
		<reference ref_id="CVE-2017-9229" ref_url="https://www.suse.com/security/cve/CVE-2017-9229/" source="CVE"/>
		<reference ref_id="CVE-2018-1000073" ref_url="https://www.suse.com/security/cve/CVE-2018-1000073/" source="CVE"/>
		<reference ref_id="CVE-2018-1000074" ref_url="https://www.suse.com/security/cve/CVE-2018-1000074/" source="CVE"/>
		<reference ref_id="CVE-2018-1000075" ref_url="https://www.suse.com/security/cve/CVE-2018-1000075/" source="CVE"/>
		<reference ref_id="CVE-2018-1000076" ref_url="https://www.suse.com/security/cve/CVE-2018-1000076/" source="CVE"/>
		<reference ref_id="CVE-2018-1000077" ref_url="https://www.suse.com/security/cve/CVE-2018-1000077/" source="CVE"/>
		<reference ref_id="CVE-2018-1000078" ref_url="https://www.suse.com/security/cve/CVE-2018-1000078/" source="CVE"/>
		<reference ref_id="CVE-2018-1000079" ref_url="https://www.suse.com/security/cve/CVE-2018-1000079/" source="CVE"/>
		<reference ref_id="CVE-2018-16395" ref_url="https://www.suse.com/security/cve/CVE-2018-16395/" source="CVE"/>
		<reference ref_id="CVE-2018-16396" ref_url="https://www.suse.com/security/cve/CVE-2018-16396/" source="CVE"/>
		<reference ref_id="CVE-2018-6914" ref_url="https://www.suse.com/security/cve/CVE-2018-6914/" source="CVE"/>
		<reference ref_id="CVE-2018-8777" ref_url="https://www.suse.com/security/cve/CVE-2018-8777/" source="CVE"/>
		<reference ref_id="CVE-2018-8778" ref_url="https://www.suse.com/security/cve/CVE-2018-8778/" source="CVE"/>
		<reference ref_id="CVE-2018-8779" ref_url="https://www.suse.com/security/cve/CVE-2018-8779/" source="CVE"/>
		<reference ref_id="CVE-2018-8780" ref_url="https://www.suse.com/security/cve/CVE-2018-8780/" source="CVE"/>
		<reference ref_id="CVE-2019-15845" ref_url="https://www.suse.com/security/cve/CVE-2019-15845/" source="CVE"/>
		<reference ref_id="CVE-2019-16201" ref_url="https://www.suse.com/security/cve/CVE-2019-16201/" source="CVE"/>
		<reference ref_id="CVE-2019-16254" ref_url="https://www.suse.com/security/cve/CVE-2019-16254/" source="CVE"/>
		<reference ref_id="CVE-2019-16255" ref_url="https://www.suse.com/security/cve/CVE-2019-16255/" source="CVE"/>
		<reference ref_id="CVE-2019-8320" ref_url="https://www.suse.com/security/cve/CVE-2019-8320/" source="CVE"/>
		<reference ref_id="CVE-2019-8321" ref_url="https://www.suse.com/security/cve/CVE-2019-8321/" source="CVE"/>
		<reference ref_id="CVE-2019-8322" ref_url="https://www.suse.com/security/cve/CVE-2019-8322/" source="CVE"/>
		<reference ref_id="CVE-2019-8323" ref_url="https://www.suse.com/security/cve/CVE-2019-8323/" source="CVE"/>
		<reference ref_id="CVE-2019-8324" ref_url="https://www.suse.com/security/cve/CVE-2019-8324/" source="CVE"/>
		<reference ref_id="CVE-2019-8325" ref_url="https://www.suse.com/security/cve/CVE-2019-8325/" source="CVE"/>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<description>
This update for ruby2.1 fixes the following issues:

Security issues fixed:

- CVE-2015-9096: Fixed an SMTP command injection via CRLFsequences in a RCPT TO or MAIL FROM command (bsc#1043983).
- CVE-2016-7798: Fixed an IV Reuse in GCM Mode (bsc#1055265).
- CVE-2017-0898: Fixed a buffer underrun vulnerability in Kernel.sprintf (bsc#1058755).
- CVE-2017-0899: Fixed an issue with malicious gem specifications, insufficient sanitation when printing gem specifications could have included terminal characters (bsc#1056286).
- CVE-2017-0900: Fixed an issue with malicious gem specifications, the query command could have led to a denial of service attack against clients (bsc#1056286).
- CVE-2017-0901: Fixed an issue with malicious gem specifications, potentially overwriting arbitrary files on the client system (bsc#1056286).
- CVE-2017-0902: Fixed an issue with malicious gem specifications, that could have enabled MITM attacks against clients (bsc#1056286).
- CVE-2017-0903: Fixed an unsafe object deserialization vulnerability (bsc#1062452).
- CVE-2017-9228: Fixed a heap out-of-bounds write in bitset_set_range() during regex compilation (bsc#1069607).
- CVE-2017-9229: Fixed an invalid pointer dereference in left_adjust_char_head() in oniguruma (bsc#1069632).
- CVE-2017-10784: Fixed an escape sequence injection vulnerability in the Basic authentication of WEBrick (bsc#1058754).
- CVE-2017-14033: Fixed a buffer underrun vulnerability in OpenSSL ASN1 decode (bsc#1058757).
- CVE-2017-14064: Fixed an arbitrary memory exposure during a JSON.generate call (bsc#1056782).
- CVE-2017-17405: Fixed a command injection vulnerability in Net::FTP (bsc#1073002).
- CVE-2017-17742: Fixed an HTTP response splitting issue in WEBrick (bsc#1087434).
- CVE-2017-17790: Fixed a command injection in lib/resolv.rb:lazy_initialize() (bsc#1078782).
- CVE-2018-6914: Fixed an unintentional file and directory creation with directory traversal in tempfile and tmpdir (bsc#1087441).
- CVE-2018-8777: Fixed a potential DoS caused by large requests in WEBrick (bsc#1087436).
- CVE-2018-8778: Fixed a buffer under-read in String#unpack (bsc#1087433).
- CVE-2018-8779: Fixed an unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket (bsc#1087440).
- CVE-2018-8780: Fixed an unintentional directory traversal by poisoned NUL byte in Dir (bsc#1087437).
- CVE-2018-16395: Fixed an issue with OpenSSL::X509::Name equality checking (bsc#1112530).
- CVE-2018-16396: Fixed an issue with tainted string handling, where the flag was not propagated in Array#pack and String#unpack with some directives (bsc#1112532).
- CVE-2018-1000073: Fixed a path traversal issue (bsc#1082007).
- CVE-2018-1000074: Fixed an unsafe object deserialization vulnerability in gem owner, allowing arbitrary code execution with specially crafted YAML (bsc#1082008).
- CVE-2018-1000075: Fixed an infinite loop vulnerability due to negative size in tar header causes Denial of Service (bsc#1082014).
- CVE-2018-1000076: Fixed an improper verification of signatures in tarballs (bsc#1082009).
- CVE-2018-1000077: Fixed an improper URL validation in the homepage attribute of ruby gems (bsc#1082010).
- CVE-2018-1000078: Fixed a XSS vulnerability in the homepage attribute when displayed via gem server (bsc#1082011).
- CVE-2018-1000079: Fixed a path traversal issue during gem installation allows to write to arbitrary filesystem locations (bsc#1082058).
- CVE-2019-8320: Fixed a directory traversal issue when decompressing tar files (bsc#1130627).
- CVE-2019-8321: Fixed an escape sequence injection vulnerability in verbose (bsc#1130623).
- CVE-2019-8322: Fixed an escape sequence injection vulnerability in gem owner (bsc#1130622).
- CVE-2019-8323: Fixed an escape sequence injection vulnerability in API response handling (bsc#1130620).
- CVE-2019-8324: Fixed an issue with malicious gems that may have led to arbitrary code execution (bsc#1130617).
- CVE-2019-8325: Fixed an escape sequence injection vulnerability in errors (bsc#1130611).
- CVE-2019-15845: Fixed a NUL injection vulnerability in File.fnmatch and File.fnmatch? (bsc#1152994).
- CVE-2019-16201: Fixed a regular expression denial of service vulnerability in WEBrick's digest access authentication (bsc#1152995).
- CVE-2019-16254: Fixed an HTTP response splitting vulnerability in WEBrick (bsc#1152992).
- CVE-2019-16255: Fixed a code injection vulnerability in Shell#[] and Shell#test (bsc#1152990).
- CVE-2020-10663: Fixed an unsafe object creation vulnerability in JSON (bsc#1171517).

Non-security issue fixed:

- Add conflicts to libruby to make sure ruby and ruby-stdlib are also updated when libruby is updated (bsc#1048072).

Also yast2-ruby-bindings on SLES 12 SP2 LTSS was updated to handle the updated ruby interpreter. (bsc#1172275)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1043983">SUSE bug 1043983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048072">SUSE bug 1048072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055265">SUSE bug 1055265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056286">SUSE bug 1056286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056782">SUSE bug 1056782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058754">SUSE bug 1058754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058755">SUSE bug 1058755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058757">SUSE bug 1058757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062452">SUSE bug 1062452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069607">SUSE bug 1069607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069632">SUSE bug 1069632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073002">SUSE bug 1073002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078782">SUSE bug 1078782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082007">SUSE bug 1082007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082008">SUSE bug 1082008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082009">SUSE bug 1082009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082010">SUSE bug 1082010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082011">SUSE bug 1082011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082014">SUSE bug 1082014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082058">SUSE bug 1082058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087433">SUSE bug 1087433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087434">SUSE bug 1087434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087436">SUSE bug 1087436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087437">SUSE bug 1087437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087440">SUSE bug 1087440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087441">SUSE bug 1087441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112530">SUSE bug 1112530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112532">SUSE bug 1112532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130611">SUSE bug 1130611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130617">SUSE bug 1130617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130620">SUSE bug 1130620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130622">SUSE bug 1130622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130623">SUSE bug 1130623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130627">SUSE bug 1130627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152990">SUSE bug 1152990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152992">SUSE bug 1152992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152994">SUSE bug 1152994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152995">SUSE bug 1152995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171517">SUSE bug 1171517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172275">SUSE bug 1172275</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-9096/">CVE-2015-9096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-9096">CVE-2015-9096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2339/">CVE-2016-2339 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2339">CVE-2016-2339 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7798/">CVE-2016-7798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7798">CVE-2016-7798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0898/">CVE-2017-0898 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0898">CVE-2017-0898 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-0899/">CVE-2017-0899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0899">CVE-2017-0899 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-0900/">CVE-2017-0900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0900">CVE-2017-0900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-0901/">CVE-2017-0901 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0901">CVE-2017-0901 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0902/">CVE-2017-0902 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0902">CVE-2017-0902 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0903/">CVE-2017-0903 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0903">CVE-2017-0903 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10784/">CVE-2017-10784 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10784">CVE-2017-10784 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14033/">CVE-2017-14033 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14033">CVE-2017-14033 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14064/">CVE-2017-14064 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14064">CVE-2017-14064 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17405/">CVE-2017-17405 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17405">CVE-2017-17405 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17742/">CVE-2017-17742 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17742">CVE-2017-17742 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17790/">CVE-2017-17790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17790">CVE-2017-17790 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9228/">CVE-2017-9228 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9228">CVE-2017-9228 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9229/">CVE-2017-9229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9229">CVE-2017-9229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000073/">CVE-2018-1000073 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000073">CVE-2018-1000073 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000074/">CVE-2018-1000074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000074">CVE-2018-1000074 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000075/">CVE-2018-1000075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000075">CVE-2018-1000075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000076/">CVE-2018-1000076 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000076">CVE-2018-1000076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000077/">CVE-2018-1000077 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000077">CVE-2018-1000077 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000078/">CVE-2018-1000078 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000078">CVE-2018-1000078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000079/">CVE-2018-1000079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000079">CVE-2018-1000079 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16395/">CVE-2018-16395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16395">CVE-2018-16395 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16396/">CVE-2018-16396 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16396">CVE-2018-16396 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6914/">CVE-2018-6914 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6914">CVE-2018-6914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8777/">CVE-2018-8777 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8777">CVE-2018-8777 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8778/">CVE-2018-8778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8778">CVE-2018-8778 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8779/">CVE-2018-8779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8779">CVE-2018-8779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8780/">CVE-2018-8780 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8780">CVE-2018-8780 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-15845/">CVE-2019-15845 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15845">CVE-2019-15845 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16201/">CVE-2019-16201 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16201">CVE-2019-16201 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16254/">CVE-2019-16254 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16254">CVE-2019-16254 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-16255/">CVE-2019-16255 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16255">CVE-2019-16255 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8320/">CVE-2019-8320 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8320">CVE-2019-8320 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8321/">CVE-2019-8321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8321">CVE-2019-8321 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8322/">CVE-2019-8322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8322">CVE-2019-8322 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8323/">CVE-2019-8323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8323">CVE-2019-8323 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8324/">CVE-2019-8324 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8324">CVE-2019-8324 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8325/">CVE-2019-8325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8325">CVE-2019-8325 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150652" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk to version 7u261 fixes the following issues:

- CVE-2020-2756: Better mapping of serial ENUMs (bsc#1169511)
- CVE-2020-2757: Less Blocking Array Queues (bsc#1169511)
- CVE-2020-2773: Better signatures in XML (bsc#1169511)
- CVE-2020-2781: Improve TLS session handling (bsc#1169511)
- CVE-2020-2800: Better Headings for HTTP Servers (bsc#1169511)
- CVE-2020-2803: Enhance buffering of byte buffers (bsc#1169511)
- CVE-2020-2805: Enhance typing of methods (bsc#1169511)
- CVE-2020-2830: Better Scanner conversions (bsc#1169511)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2773">CVE-2020-2773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531017" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531018" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531019" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531020" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150653" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1159856" ref_url="https://bugzilla.suse.com/1159856" source="BUGZILLA"/>
		<reference ref_id="1159858" ref_url="https://bugzilla.suse.com/1159858" source="BUGZILLA"/>
		<reference ref_id="1159860" ref_url="https://bugzilla.suse.com/1159860" source="BUGZILLA"/>
		<reference ref_id="1160250" ref_url="https://bugzilla.suse.com/1160250" source="BUGZILLA"/>
		<reference ref_id="1160251" ref_url="https://bugzilla.suse.com/1160251" source="BUGZILLA"/>
		<reference ref_id="1160937" ref_url="https://bugzilla.suse.com/1160937" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15691" ref_url="https://www.suse.com/security/cve/CVE-2019-15691/" source="CVE"/>
		<reference ref_id="CVE-2019-15692" ref_url="https://www.suse.com/security/cve/CVE-2019-15692/" source="CVE"/>
		<reference ref_id="CVE-2019-15693" ref_url="https://www.suse.com/security/cve/CVE-2019-15693/" source="CVE"/>
		<reference ref_id="CVE-2019-15694" ref_url="https://www.suse.com/security/cve/CVE-2019-15694/" source="CVE"/>
		<reference ref_id="CVE-2019-15695" ref_url="https://www.suse.com/security/cve/CVE-2019-15695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006396.html" source="SUSE-SU"/>
		<description>
This update for tigervnc fixes the following issues:

- CVE-2019-15691: Fixed a use-after-return due to incorrect usage of stack memory in ZRLEDecoder (bsc#1159856).
- CVE-2019-15692: Fixed a heap-based buffer overflow in CopyRectDecode (bsc#1160250).
- CVE-2019-15693: Fixed a heap-based buffer overflow in TightDecoder::FilterGradient (bsc#1159858).
- CVE-2019-15694: Fixed a heap-based buffer overflow, caused by improper error handling in processing MemOutStream (bsc#1160251).
- CVE-2019-15695: Fixed a stack-based buffer overflow, which could be triggered from CMsgReader::readSetCursor (bsc#1159860).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159856">SUSE bug 1159856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159858">SUSE bug 1159858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159860">SUSE bug 1159860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160250">SUSE bug 1160250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160251">SUSE bug 1160251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160937">SUSE bug 1160937</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15691/">CVE-2019-15691 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15691">CVE-2019-15691 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15692/">CVE-2019-15692 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15692">CVE-2019-15692 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15693/">CVE-2019-15693 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15693">CVE-2019-15693 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15694/">CVE-2019-15694 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15694">CVE-2019-15694 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15695/">CVE-2019-15695 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15695">CVE-2019-15695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531021" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531022" comment="tigervnc-1.6.0-18.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531023" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150654" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1156353" ref_url="https://bugzilla.suse.com/1156353" source="BUGZILLA"/>
		<reference ref_id="1172466" ref_url="https://bugzilla.suse.com/1172466" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006918.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)
  
This update contains security mitigations for:

- CVE-2020-0543: Fixed a side channel attack against special registers
  which could have resulted in leaking of read values to cores other
  than the one which called it.  This attack is known as Special Register
  Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to
  mitigate the Vector Register and L1D Eviction Sampling aka 'CacheOutAttack'
  attacks. (bsc#1156353)

Microcode Table:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  HSW          C0       6-3c-3/32 00000027-&gt;00000028 Core Gen4
  BDW-U/Y      E0/F0    6-3d-4/c0 0000002e-&gt;0000002f Core Gen5
  HSW-U        C0/D0    6-45-1/72 00000025-&gt;00000026 Core Gen4
  HSW-H        C0       6-46-1/32 0000001b-&gt;0000001c Core Gen4
  BDW-H/E3     E0/G0    6-47-1/22 00000021-&gt;00000022 Core Gen5
  SKL-U/Y      D0       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKL-U23e     K1       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKX-SP       B1       6-55-3/97 01000151-&gt;01000157 Xeon Scalable
  SKX-SP       H0/M0/U0 6-55-4/b7 02000065-&gt;02006906 Xeon Scalable
  SKX-D        M1       6-55-4/b7 02000065-&gt;02006906 Xeon D-21xx
  CLX-SP       B0       6-55-6/bf 0400002c-&gt;04002f01 Xeon Scalable Gen2
  CLX-SP       B1       6-55-7/bf 0500002c-&gt;04002f01 Xeon Scalable Gen2
  SKL-H/S      R0/N0    6-5e-3/36 000000d6-&gt;000000dc Core Gen6; Xeon E3 v5
  AML-Y22      H0       6-8e-9/10 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-U/Y      H0       6-8e-9/c0 000000ca-&gt;000000d6 Core Gen7 Mobile
  CFL-U43e     D0       6-8e-a/c0 000000ca-&gt;000000d6 Core Gen8 Mobile
  WHL-U        W0       6-8e-b/d0 000000ca-&gt;000000d6 Core Gen8 Mobile
  AML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  CML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  WHL-U        V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-G/H/S/E3 B0       6-9e-9/2a 000000ca-&gt;000000d6 Core Gen7; Xeon E3 v6
  CFL-H/S/E3   U0       6-9e-a/22 000000ca-&gt;000000d6 Core Gen8 Desktop, Mobile, Xeon E
  CFL-S        B0       6-9e-b/02 000000ca-&gt;000000d6 Core Gen8
  CFL-H/S      P0       6-9e-c/22 000000ca-&gt;000000d6 Core Gen9
  CFL-H        R0       6-9e-d/22 000000ca-&gt;000000d6 Core Gen9 Mobile

Also contains the Intel CPU Microcode update to 20200520:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061f-&gt;00000621 Xeon E3/E5, Core X
  SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000718-&gt;0000071a Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172466">SUSE bug 1172466</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0548">CVE-2020-0548 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0549">CVE-2020-0549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531024" comment="ucode-intel-20200602-13.68.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150655" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1161951" ref_url="https://bugzilla.suse.com/1161951" source="BUGZILLA"/>
		<reference ref_id="1164871" ref_url="https://bugzilla.suse.com/1164871" source="BUGZILLA"/>
		<reference ref_id="1169025" ref_url="https://bugzilla.suse.com/1169025" source="BUGZILLA"/>
		<reference ref_id="1169625" ref_url="https://bugzilla.suse.com/1169625" source="BUGZILLA"/>
		<reference ref_id="1170383" ref_url="https://bugzilla.suse.com/1170383" source="BUGZILLA"/>
		<reference ref_id="1170618" ref_url="https://bugzilla.suse.com/1170618" source="BUGZILLA"/>
		<reference ref_id="1170620" ref_url="https://bugzilla.suse.com/1170620" source="BUGZILLA"/>
		<reference ref_id="1171098" ref_url="https://bugzilla.suse.com/1171098" source="BUGZILLA"/>
		<reference ref_id="1171195" ref_url="https://bugzilla.suse.com/1171195" source="BUGZILLA"/>
		<reference ref_id="1171202" ref_url="https://bugzilla.suse.com/1171202" source="BUGZILLA"/>
		<reference ref_id="1171218" ref_url="https://bugzilla.suse.com/1171218" source="BUGZILLA"/>
		<reference ref_id="1171219" ref_url="https://bugzilla.suse.com/1171219" source="BUGZILLA"/>
		<reference ref_id="1171689" ref_url="https://bugzilla.suse.com/1171689" source="BUGZILLA"/>
		<reference ref_id="1171698" ref_url="https://bugzilla.suse.com/1171698" source="BUGZILLA"/>
		<reference ref_id="1172032" ref_url="https://bugzilla.suse.com/1172032" source="BUGZILLA"/>
		<reference ref_id="1172221" ref_url="https://bugzilla.suse.com/1172221" source="BUGZILLA"/>
		<reference ref_id="1172317" ref_url="https://bugzilla.suse.com/1172317" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="CVE-2020-12114" ref_url="https://www.suse.com/security/cve/CVE-2020-12114/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
  This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12114: Fixed A pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).

The following non-security bugs were fixed:

- can, slip: Protect tty-&gt;disc_data in write_wakeup and close with RCU (bsc#1171698).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).
- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).
- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).
- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).
- Drivers: hv: vmbus: Make panic reporting to be more useful (bsc#1170618).
- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).
- EDAC: Convert to new X86 CPU match macros
- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).
- ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).
- KEYS: reaching the keys quotas correctly (bsc#1171689).
- NFS: Cleanup if nfs_match_client is interrupted (bsc#1169025).
- NFS: Fix a double unlock from nfs_match,get_client (bsc#1169025).
- NFS: make nfs_match_client killable (bsc#1169025).
- NFS: Unlock requests must never fail (bsc#1172032).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (bsc#1161951 ltc#183551).
- scsi: ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).
- x86/dumpstack/64: Handle faults when printing the 'Stack: ' part of an OOPS (bsc#1170383).
- x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170620).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).
- x86: hyperv: report value of misc_features (git fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161951">SUSE bug 1161951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164871">SUSE bug 1164871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169025">SUSE bug 1169025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169625">SUSE bug 1169625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170383">SUSE bug 1170383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170618">SUSE bug 1170618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170620">SUSE bug 1170620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171098">SUSE bug 1171098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171195">SUSE bug 1171195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171202">SUSE bug 1171202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171218">SUSE bug 1171218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171689">SUSE bug 1171689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171698">SUSE bug 1171698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172032">SUSE bug 1172032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172221">SUSE bug 1172221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172317">SUSE bug 1172317</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12114/">CVE-2020-12114 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12114">CVE-2020-12114 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12652">CVE-2020-12652 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12656">CVE-2020-12656 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555718" comment="kernel-default-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555719" comment="kernel-default-base-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555720" comment="kernel-default-devel-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538432" comment="kernel-devel-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538433" comment="kernel-macros-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538434" comment="kernel-source-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555721" comment="kernel-syms-4.4.180-94.121.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150656" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1159478" ref_url="https://bugzilla.suse.com/1159478" source="BUGZILLA"/>
		<reference ref_id="1159479" ref_url="https://bugzilla.suse.com/1159479" source="BUGZILLA"/>
		<reference ref_id="1159482" ref_url="https://bugzilla.suse.com/1159482" source="BUGZILLA"/>
		<reference ref_id="1159486" ref_url="https://bugzilla.suse.com/1159486" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18388" ref_url="https://www.suse.com/security/cve/CVE-2019-18388/" source="CVE"/>
		<reference ref_id="CVE-2019-18389" ref_url="https://www.suse.com/security/cve/CVE-2019-18389/" source="CVE"/>
		<reference ref_id="CVE-2019-18390" ref_url="https://www.suse.com/security/cve/CVE-2019-18390/" source="CVE"/>
		<reference ref_id="CVE-2019-18391" ref_url="https://www.suse.com/security/cve/CVE-2019-18391/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<description>
This update for virglrenderer fixes the following issues:

- CVE-2019-18388: Fixed a null pointer dereference which could have led
   to denial of service (bsc#1159479).
- CVE-2019-18390: Fixed an out of bound read which could have led to
  denial of service (bsc#1159478).
- CVE-2019-18389: Fixed a heap buffer overflow which could have led to
  guest escape or denial of service (bsc#1159482).
- CVE-2019-18391: Fixed a heap based buffer overflow which could have led to
  guest escape or denial of service (bsc#1159486).  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159478">SUSE bug 1159478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159479">SUSE bug 1159479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159482">SUSE bug 1159482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159486">SUSE bug 1159486</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18388/">CVE-2019-18388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18388">CVE-2019-18388 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18389/">CVE-2019-18389 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18389">CVE-2019-18389 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18390/">CVE-2019-18390 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18390">CVE-2019-18390 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18391/">CVE-2019-18391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18391">CVE-2019-18391 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522550" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150657" version="1" class="patch">
	<metadata>
		<title>Security update for adns (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1172265" ref_url="https://bugzilla.suse.com/1172265" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9103" ref_url="https://www.suse.com/security/cve/CVE-2017-9103/" source="CVE"/>
		<reference ref_id="CVE-2017-9104" ref_url="https://www.suse.com/security/cve/CVE-2017-9104/" source="CVE"/>
		<reference ref_id="CVE-2017-9105" ref_url="https://www.suse.com/security/cve/CVE-2017-9105/" source="CVE"/>
		<reference ref_id="CVE-2017-9106" ref_url="https://www.suse.com/security/cve/CVE-2017-9106/" source="CVE"/>
		<reference ref_id="CVE-2017-9107" ref_url="https://www.suse.com/security/cve/CVE-2017-9107/" source="CVE"/>
		<reference ref_id="CVE-2017-9108" ref_url="https://www.suse.com/security/cve/CVE-2017-9108/" source="CVE"/>
		<reference ref_id="CVE-2017-9109" ref_url="https://www.suse.com/security/cve/CVE-2017-9109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006937.html" source="SUSE-SU"/>
		<description>
This update for adns fixes the following issues:
	  
- CVE-2017-9103,CVE-2017-9104,CVE-2017-9105,CVE-2017-9109: Fixed an issue in local recursive resolver
  which could have led to remote code execution (bsc#1172265).
- CVE-2017-9106: Fixed an issue with upstream DNS data sources which could have led to denial of 
  service (bsc#1172265).
- CVE-2017-9107: Fixed an issue when quering domain names which could have led to denial of service (bsc#1172265).
- CVE-2017-9108: Fixed an issue which could have led to denial of service (bsc#1172265).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-12"/>
	<updated date="2020-06-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9103/">CVE-2017-9103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9103">CVE-2017-9103 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9104/">CVE-2017-9104 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9104">CVE-2017-9104 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9105/">CVE-2017-9105 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9105">CVE-2017-9105 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9106/">CVE-2017-9106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9106">CVE-2017-9106 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9107/">CVE-2017-9107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9107">CVE-2017-9107 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9108/">CVE-2017-9108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9108">CVE-2017-9108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9109/">CVE-2017-9109 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9109">CVE-2017-9109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531033" comment="libadns1-1.4-103.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150658" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1157888" ref_url="https://bugzilla.suse.com/1157888" source="BUGZILLA"/>
		<reference ref_id="1158003" ref_url="https://bugzilla.suse.com/1158003" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1158007" ref_url="https://bugzilla.suse.com/1158007" source="BUGZILLA"/>
		<reference ref_id="1161181" ref_url="https://bugzilla.suse.com/1161181" source="BUGZILLA"/>
		<reference ref_id="1167152" ref_url="https://bugzilla.suse.com/1167152" source="BUGZILLA"/>
		<reference ref_id="1168140" ref_url="https://bugzilla.suse.com/1168140" source="BUGZILLA"/>
		<reference ref_id="1168142" ref_url="https://bugzilla.suse.com/1168142" source="BUGZILLA"/>
		<reference ref_id="1169392" ref_url="https://bugzilla.suse.com/1169392" source="BUGZILLA"/>
		<reference ref_id="1172205" ref_url="https://bugzilla.suse.com/1172205" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19581" ref_url="https://www.suse.com/security/cve/CVE-2019-19581/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-11739" ref_url="https://www.suse.com/security/cve/CVE-2020-11739/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742/" source="CVE"/>
		<reference ref_id="CVE-2020-7211" ref_url="https://www.suse.com/security/cve/CVE-2020-7211/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
  This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1172205).
- CVE-2020-11742: Bad continuation handling in GNTTABOP_copy (bsc#1169392).
- CVE-2020-11740, CVE-2020-11741: xen: XSA-313 multiple xenoprof issues (bsc#1168140).
- CVE-2020-11739: Missing memory barriers in read-write unlock paths (bsc#1168142).
- CVE-2019-19583: Fixed improper checks which could have allowed HVM/PVH guest userspace code to crash the guest, leading to a guest denial of service (bsc#1158004 XSA-308).
- CVE-2019-19581: Fixed a potential out of bounds on 32-bit Arm (bsc#1158003 XSA-307).
- CVE-2019-19580: Fixed a privilege escalation where a malicious PV guest administrator could have been able to escalate their privilege to that of the host (bsc#1158006 XSA-310).
- CVE-2019-19579: Fixed a privilege escalation where an untrusted domain with access to a physical device can DMA into host memory (bsc#1157888 XSA-306).
- CVE-2019-19578: Fixed an issue where a malicious or buggy PV guest could have caused hypervisor crash resulting in denial of service affecting the entire host (bsc#1158005 XSA-309).
- CVE-2019-19577: Fixed an issue where a malicious guest administrator could have caused Xen to access data structures while they are being modified leading to a crash (bsc#1158007 XSA-311). 
- Xenstored Crashed during VM install (bsc#1167152)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-16"/>
	<updated date="2020-06-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161181">SUSE bug 1161181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167152">SUSE bug 1167152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168142">SUSE bug 1168142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19577">CVE-2019-19577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19578">CVE-2019-19578 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19579">CVE-2019-19579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19580">CVE-2019-19580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19581/">CVE-2019-19581 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19581">CVE-2019-19581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19583">CVE-2019-19583 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11739/">CVE-2020-11739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11739">CVE-2020-11739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11740">CVE-2020-11740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11741">CVE-2020-11741 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11742">CVE-2020-11742 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7211/">CVE-2020-7211 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7211">CVE-2020-7211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538437" comment="xen-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538438" comment="xen-doc-html-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538439" comment="xen-libs-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538440" comment="xen-libs-32bit-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538441" comment="xen-tools-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538442" comment="xen-tools-domU-4.9.4_06-3.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150659" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1102840" ref_url="https://bugzilla.suse.com/1102840" source="BUGZILLA"/>
		<reference ref_id="1160039" ref_url="https://bugzilla.suse.com/1160039" source="BUGZILLA"/>
		<reference ref_id="1170601" ref_url="https://bugzilla.suse.com/1170601" source="BUGZILLA"/>
		<reference ref_id="1171863" ref_url="https://bugzilla.suse.com/1171863" source="BUGZILLA"/>
		<reference ref_id="1171864" ref_url="https://bugzilla.suse.com/1171864" source="BUGZILLA"/>
		<reference ref_id="1171866" ref_url="https://bugzilla.suse.com/1171866" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543/" source="CVE"/>
		<reference ref_id="CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878/" source="CVE"/>
		<reference ref_id="CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006972.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

- CVE-2020-10543: Fixed a heap buffer overflow in regular expression compiler which could have 
  allowed overwriting of allocated memory with attacker's data (bsc#1171863).
- CVE-2020-10878: Fixed multiple integer overflows which could have allowed the insertion of 
  instructions into the compiled form of Perl regular expression (bsc#1171864).
- CVE-2020-12723: Fixed an attacker's corruption of the intermediate language state of a 
  compiled regular expression (bsc#1171866).
- Fixed utf8 handling in perldoc by useing 'term' instead of 'man' (bsc#1170601).
- Some packages make assumptions about the date and time they are built. 
  This update will solve the issues caused by calling the perl function timelocal
  expressing the year with two digit only instead of four digits. (bsc#1102840) (bsc#1160039)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-18"/>
	<updated date="2020-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102840">SUSE bug 1102840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160039">SUSE bug 1160039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170601">SUSE bug 1170601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171863">SUSE bug 1171863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171864">SUSE bug 1171864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171866">SUSE bug 1171866</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10543">CVE-2020-10543 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10878">CVE-2020-10878 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12723">CVE-2020-12723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531034" comment="perl-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531035" comment="perl-32bit-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531036" comment="perl-base-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531037" comment="perl-doc-5.18.2-12.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150660" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 65 (bsc#1172277 and bsc#1169511)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531038" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531040" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531041" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150661" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

java-1_8_0-ibm was updated to Java 8.0 Service Refresh 6 Fix Pack 10 (bsc#1172277,bsc#1169511,bsc#1160968)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2754: Forwarded references to Nashorn 
- CVE-2020-2755: Improved Nashorn matching 
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
- CVE-2019-2949: Fixed an issue which could have resulted in unauthorized access to critical data 
- Added RSA PSS SUPPORT TO IBMPKCS11IMPL
- The pack200 and unpack200 alternatives should be slaves of java (bsc#1171352).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2949">CVE-2019-2949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2754">CVE-2020-2754 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2755">CVE-2020-2755 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531043" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531045" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150662" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1160398" ref_url="https://bugzilla.suse.com/1160398" source="BUGZILLA"/>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version jdk8u252 fixes the following issues:

- CVE-2020-2754: Forward references to Nashorn (bsc#1169511)
- CVE-2020-2755: Improve Nashorn matching (bsc#1169511)
- CVE-2020-2756: Better mapping of serial ENUMs (bsc#1169511)
- CVE-2020-2757: Less Blocking Array Queues (bsc#1169511)
- CVE-2020-2773: Better signatures in XML (bsc#1169511)
- CVE-2020-2781: Improve TLS session handling (bsc#1169511)
- CVE-2020-2800: Better Headings for HTTP Servers (bsc#1169511)
- CVE-2020-2803: Enhance buffering of byte buffers (bsc#1169511)
- CVE-2020-2805: Enhance typing of methods (bsc#1169511)
- CVE-2020-2830: Better Scanner conversions (bsc#1169511)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160398">SUSE bug 1160398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2754">CVE-2020-2754 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2755">CVE-2020-2755 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2773">CVE-2020-2773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531047" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531048" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531049" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531050" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150663" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1172049" ref_url="https://bugzilla.suse.com/1172049" source="BUGZILLA"/>
		<reference ref_id="1172781" ref_url="https://bugzilla.suse.com/1172781" source="BUGZILLA"/>
		<reference ref_id="1172782" ref_url="https://bugzilla.suse.com/1172782" source="BUGZILLA"/>
		<reference ref_id="1172783" ref_url="https://bugzilla.suse.com/1172783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766/" source="CVE"/>
		<reference ref_id="CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767/" source="CVE"/>
		<reference ref_id="CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007008.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-10768: Fixed an issue with the prctl() function which could have allowed indirect branch speculation even after it has been disabled (bsc#1172783).
- CVE-2020-10767: Fixed an issue where the Indirect Branch Prediction Barrier (IBPB) would have been disabled when STIBP is unavailable or enhanced IBRS is available making the system vulnerable to spectre v2 (bsc#1172782).
- CVE-2020-10766: Fixed an issue with Linux scheduler which could have allowed an attacker to turn off the SSBD protection (bsc#1172781).

- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1172049).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-23"/>
	<updated date="2020-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172049">SUSE bug 1172049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10766">CVE-2020-10766 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10767">CVE-2020-10767 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10768">CVE-2020-10768 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555722" comment="kernel-default-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555723" comment="kernel-default-base-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555724" comment="kernel-default-devel-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538447" comment="kernel-devel-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538448" comment="kernel-macros-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538449" comment="kernel-source-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555725" comment="kernel-syms-4.4.180-94.124.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150664" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1173027" ref_url="https://bugzilla.suse.com/1173027" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007017.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious server to overwrite a local file when using the -J option (bsc#1173027).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-24"/>
	<updated date="2020-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8177">CVE-2020-8177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531051" comment="curl-7.37.0-37.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531052" comment="libcurl4-7.37.0-37.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531053" comment="libcurl4-32bit-7.37.0-37.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150665" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1126230" ref_url="https://bugzilla.suse.com/1126230" source="BUGZILLA"/>
		<reference ref_id="1136082" ref_url="https://bugzilla.suse.com/1136082" source="BUGZILLA"/>
		<reference ref_id="1157607" ref_url="https://bugzilla.suse.com/1157607" source="BUGZILLA"/>
		<reference ref_id="1161096" ref_url="https://bugzilla.suse.com/1161096" source="BUGZILLA"/>
		<reference ref_id="1162553" ref_url="https://bugzilla.suse.com/1162553" source="BUGZILLA"/>
		<reference ref_id="1171670" ref_url="https://bugzilla.suse.com/1171670" source="BUGZILLA"/>
		<reference ref_id="1171921" ref_url="https://bugzilla.suse.com/1171921" source="BUGZILLA"/>
		<reference ref_id="1171960" ref_url="https://bugzilla.suse.com/1171960" source="BUGZILLA"/>
		<reference ref_id="1171961" ref_url="https://bugzilla.suse.com/1171961" source="BUGZILLA"/>
		<reference ref_id="1171963" ref_url="https://bugzilla.suse.com/1171963" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10753" ref_url="https://www.suse.com/security/cve/CVE-2020-10753/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007029.html" source="SUSE-SU"/>
		<description>
This is a version update for ceph to version 12.2.13:

Security issue fixed: 	  

- CVE-2020-10753: Fixed an HTTP header injection via CORS ExposeHeader tag (bsc#1171921).

- Notable changes in this update for ceph:
  * mgr: telemetry: backported and now available on SES5.5. Please
    consider enabling via 'ceph telemetry on' (bsc#1171670)
  * OSD heartbeat ping time: new health warning, options and admin
    commands (bsc#1171960)
  * 'osd_calc_pg_upmaps_max_stddev' ceph.conf parameter has been
    removed; use 'upmap_max_deviation' instead (bsc#1171961)
  * Default maximum concurrent bluestore rocksdb compaction threads
    raised from 1 to 2 for improved ability to keep up with rgw
    bucket index workloads (bsc#1171963)

- Bug fixes in this ceph update:
  * mon: Error message displayed when mon_osd_max_split_count would be
    exceeded is not as user-friendly as it could be (bsc#1126230)
  * ceph_volume_client: remove ceph mds calls in favor of ceph fs
    calls (bsc#1136082)
  * rgw: crypt: permit RGW-AUTO/default with SSE-S3 headers
    (bsc#1157607)
  * mon/AuthMonitor: don't validate fs caps on authorize (bsc#1161096)

- Additional bug fixes:
  * ceph-volume: strip _dmcrypt suffix in simple scan json output (bsc#1162553)		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-25"/>
	<updated date="2020-06-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1126230">SUSE bug 1126230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136082">SUSE bug 1136082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157607">SUSE bug 1157607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161096">SUSE bug 1161096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162553">SUSE bug 1162553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171670">SUSE bug 1171670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171921">SUSE bug 1171921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171960">SUSE bug 1171960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171961">SUSE bug 1171961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171963">SUSE bug 1171963</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10753/">CVE-2020-10753 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10753">CVE-2020-10753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555726" comment="ceph-common-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555727" comment="libcephfs2-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555728" comment="librados2-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555729" comment="libradosstriper1-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555730" comment="librbd1-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555731" comment="librgw2-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555732" comment="python-cephfs-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555733" comment="python-rados-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555734" comment="python-rbd-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555735" comment="python-rgw-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150666" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1172405" ref_url="https://bugzilla.suse.com/1172405" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8022" ref_url="https://www.suse.com/security/cve/CVE-2020-8022/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007047.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-8022: Fixed a local root exploit due to improper permissions (bsc#1172405)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172405">SUSE bug 1172405</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8022/">CVE-2020-8022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8022">CVE-2020-8022 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531054" comment="tomcat-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531055" comment="tomcat-admin-webapps-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531056" comment="tomcat-docs-webapp-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531057" comment="tomcat-el-3_0-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531058" comment="tomcat-javadoc-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531059" comment="tomcat-jsp-2_3-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531060" comment="tomcat-lib-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531061" comment="tomcat-servlet-3_1-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531062" comment="tomcat-webapps-8.0.53-29.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150667" version="1" class="patch">
	<metadata>
		<title>Security update for python3-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1054413" ref_url="https://bugzilla.suse.com/1054413" source="BUGZILLA"/>
		<reference ref_id="1073879" ref_url="https://bugzilla.suse.com/1073879" source="BUGZILLA"/>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="1122668" ref_url="https://bugzilla.suse.com/1122668" source="BUGZILLA"/>
		<reference ref_id="761500" ref_url="https://bugzilla.suse.com/761500" source="BUGZILLA"/>
		<reference ref_id="922448" ref_url="https://bugzilla.suse.com/922448" source="BUGZILLA"/>
		<reference ref_id="929736" ref_url="https://bugzilla.suse.com/929736" source="BUGZILLA"/>
		<reference ref_id="935252" ref_url="https://bugzilla.suse.com/935252" source="BUGZILLA"/>
		<reference ref_id="945455" ref_url="https://bugzilla.suse.com/945455" source="BUGZILLA"/>
		<reference ref_id="947357" ref_url="https://bugzilla.suse.com/947357" source="BUGZILLA"/>
		<reference ref_id="961596" ref_url="https://bugzilla.suse.com/961596" source="BUGZILLA"/>
		<reference ref_id="967128" ref_url="https://bugzilla.suse.com/967128" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007049.html" source="SUSE-SU"/>
		<description>
This update for python3-requests provides the following fix:

python-requests was updated to 2.20.1.

Update to version 2.20.1:

* Fixed bug with unintended Authorization header stripping for
  redirects using default ports (http/80, https/443).

Update to version 2.20.0:

* Bugfixes

  + Content-Type header parsing is now case-insensitive
    (e.g. charset=utf8 v Charset=utf8).
  + Fixed exception leak where certain redirect urls would raise
    uncaught urllib3 exceptions.
  + Requests removes Authorization header from requests redirected
    from https to http on the same hostname. (CVE-2018-18074)
  + should_bypass_proxies now handles URIs without hostnames
    (e.g. files).

Update to version 2.19.1:

* Fixed issue where status_codes.py’s init function failed trying
  to append to a __doc__ value of None.

Update to version 2.19.0:

* Improvements

  + Warn about possible slowdown with cryptography version &lt; 1.3.4
  + Check host in proxy URL, before forwarding request to adapter.
  + Maintain fragments properly across redirects. (RFC7231 7.1.2)
  + Removed use of cgi module to expedite library load time.
  + Added support for SHA-256 and SHA-512 digest auth algorithms.
  + Minor performance improvement to Request.content.

* Bugfixes

  + Parsing empty Link headers with parse_header_links() no longer
    return one bogus entry.
  + Fixed issue where loading the default certificate bundle from
    a zip archive would raise an IOError.
  + Fixed issue with unexpected ImportError on windows system
    which do not support winreg module.
  + DNS resolution in proxy bypass no longer includes the username
    and password in the request. This also fixes the issue of DNS
    queries failing on macOS.
  + Properly normalize adapter prefixes for url comparison.
  + Passing None as a file pointer to the files param no longer
    raises an exception.
  + Calling copy on a RequestsCookieJar will now preserve the
    cookie policy correctly.

Update to version 2.18.4:

* Improvements

  + Error messages for invalid headers now include the header name
    for easier debugging

Update to version 2.18.3:

* Improvements
  + Running $ python -m requests.help now includes the installed
    version of idna.
* Bugfixes
  + Fixed issue where Requests would raise ConnectionError instead
    of SSLError when encountering SSL problems when using urllib3
    v1.22.

- Add ca-certificates (and ca-certificates-mozilla) to dependencies, otherwise https
  connections will fail.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054413">SUSE bug 1054413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073879">SUSE bug 1073879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122668">SUSE bug 1122668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761500">SUSE bug 761500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922448">SUSE bug 922448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929736">SUSE bug 929736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935252">SUSE bug 935252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945455">SUSE bug 945455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947357">SUSE bug 947357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961596">SUSE bug 961596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967128">SUSE bug 967128</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2296">CVE-2015-2296 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009525269" comment="python3-certifi-2018.4.16-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525270" comment="python3-chardet-3.0.4-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531063" comment="python3-requests-2.20.1-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525271" comment="python3-urllib3-1.22-3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150668" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1172906" ref_url="https://bugzilla.suse.com/1172906" source="BUGZILLA"/>
		<reference ref_id="1172935" ref_url="https://bugzilla.suse.com/1172935" source="BUGZILLA"/>
		<reference ref_id="1173197" ref_url="https://bugzilla.suse.com/1173197" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093/" source="CVE"/>
		<reference ref_id="CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154/" source="CVE"/>
		<reference ref_id="CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007050.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-14954: Fixed a response injection due to a STARTTLS buffering issue which was
  affecting IMAP, SMTP, and POP3 (bsc#1173197).
- CVE-2020-14093: Fixed a potential IMAP Man-in-the-Middle attack via a PREAUTH response (bsc#1172906, bsc#1172935).
- CVE-2020-14154: Fixed an issue where Mutt was ignoring an expired certificate and was
  proceeding with a connection (bsc#1172906, bsc#1172935).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-29"/>
	<updated date="2020-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173197">SUSE bug 1173197</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14093">CVE-2020-14093 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14154">CVE-2020-14154 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14954">CVE-2020-14954 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531064" comment="mutt-1.10.1-55.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150669" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1167373" ref_url="https://bugzilla.suse.com/1167373" source="BUGZILLA"/>
		<reference ref_id="1173304" ref_url="https://bugzilla.suse.com/1173304" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860/" source="CVE"/>
		<reference ref_id="CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007055.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-14059: Fixed an issue where a client could potentially deny the service of a server 
  during TLS Handshake (bsc#1173304).
- CVE-2019-18860: Fixed handling of invalid domain names in cachemgr.cgi (bsc#1167373).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167373">SUSE bug 1167373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173304">SUSE bug 1173304</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18860">CVE-2019-18860 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14059">CVE-2020-14059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531065" comment="squid-3.5.21-26.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150670" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1169740" ref_url="https://bugzilla.suse.com/1169740" source="BUGZILLA"/>
		<reference ref_id="1171355" ref_url="https://bugzilla.suse.com/1171355" source="BUGZILLA"/>
		<reference ref_id="1172651" ref_url="https://bugzilla.suse.com/1172651" source="BUGZILLA"/>
		<reference ref_id="1173334" ref_url="https://bugzilla.suse.com/1173334" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8956" ref_url="https://www.suse.com/security/cve/CVE-2018-8956/" source="CVE"/>
		<reference ref_id="CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868/" source="CVE"/>
		<reference ref_id="CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817/" source="CVE"/>
		<reference ref_id="CVE-2020-15025" ref_url="https://www.suse.com/security/cve/CVE-2020-15025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007056.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

ntp was updated to 4.2.8p15

- CVE-2020-11868: Fixed an issue which a server mode packet with spoofed source address 
  frequently send to the client ntpd could have caused denial of service (bsc#1169740).
- CVE-2018-8956: Fixed an issue which could have allowed remote attackers to prevent 
  a broadcast client from synchronizing its clock with a broadcast NTP server via spoofed 
  mode 3 and mode 5 packets (bsc#1171355).
- CVE-2020-13817: Fixed an issue which an off-path attacker with the ability to query time 
  from victim's ntpd instance could have modified the victim's clock by a limited amount (bsc#1172651).
- CVE-2020-15025: Fixed an issue which remote attacker could have caused denial of service by consuming 
  the memory when a CMAC key was used andassociated with a CMAC algorithm in the ntp.keys (bsc#1173334).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169740">SUSE bug 1169740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171355">SUSE bug 1171355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172651">SUSE bug 1172651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173334">SUSE bug 1173334</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8956/">CVE-2018-8956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8956">CVE-2018-8956 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11868">CVE-2020-11868 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13817">CVE-2020-13817 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15025/">CVE-2020-15025 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15025">CVE-2020-15025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531066" comment="ntp-4.2.8p15-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531067" comment="ntp-doc-4.2.8p15-88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150671" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="1168669" ref_url="https://bugzilla.suse.com/1168669" source="BUGZILLA"/>
		<reference ref_id="1169746" ref_url="https://bugzilla.suse.com/1169746" source="BUGZILLA"/>
		<reference ref_id="1170908" ref_url="https://bugzilla.suse.com/1170908" source="BUGZILLA"/>
		<reference ref_id="1171978" ref_url="https://bugzilla.suse.com/1171978" source="BUGZILLA"/>
		<reference ref_id="1173022" ref_url="https://bugzilla.suse.com/1173022" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007069.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to version 3.53.1

- CVE-2020-12402: Fixed a potential side channel attack during RSA key generation (bsc#1173032).
- CVE-2020-12399: Fixed a timing attack on DSA signature generation (bsc#1171978).
- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- Fixed various FIPS issues in libfreebl3 which were causing segfaults in the test suite of chrony (bsc#1168669).
- Fixed an issue where Firefox tab was crashing (bsc#1170908).

Release notes: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes

mozilla-nspr to version 4.25
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-03"/>
	<updated date="2020-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168669">SUSE bug 1168669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169746">SUSE bug 1169746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170908">SUSE bug 1170908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171978">SUSE bug 1171978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173022">SUSE bug 1173022</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17006">CVE-2019-17006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12399">CVE-2020-12399 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531068" comment="libfreebl3-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531069" comment="libfreebl3-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531070" comment="libfreebl3-hmac-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531071" comment="libfreebl3-hmac-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531072" comment="libsoftokn3-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531073" comment="libsoftokn3-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531074" comment="libsoftokn3-hmac-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531075" comment="libsoftokn3-hmac-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531076" comment="mozilla-nspr-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531077" comment="mozilla-nspr-32bit-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531078" comment="mozilla-nss-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531079" comment="mozilla-nss-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531080" comment="mozilla-nss-certs-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531081" comment="mozilla-nss-certs-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531082" comment="mozilla-nss-sysinit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531083" comment="mozilla-nss-sysinit-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531084" comment="mozilla-nss-tools-3.53.1-58.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150672" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1170715" ref_url="https://bugzilla.suse.com/1170715" source="BUGZILLA"/>
		<reference ref_id="1172698" ref_url="https://bugzilla.suse.com/1172698" source="BUGZILLA"/>
		<reference ref_id="1172704" ref_url="https://bugzilla.suse.com/1172704" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007077.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8023: Fixed a potential local privilege escalation from ldap to root when OPENLDAP_CONFIG_BACKEND='ldap' was used (bsc#1172698).	  
- Changed DB_CONFIG to root:ldap permissions (bsc#1172704).	 
- Fixed an issue where slapd becomes unresponsive after many failed login/bind attempts(bsc#1170715).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170715">SUSE bug 1170715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172704">SUSE bug 1172704</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8023">CVE-2020-8023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531085" comment="libldap-2_4-2-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531086" comment="libldap-2_4-2-32bit-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531087" comment="openldap2-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531088" comment="openldap2-back-meta-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531089" comment="openldap2-client-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531090" comment="openldap2-doc-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531091" comment="openldap2-ppolicy-check-password-1.2-18.71.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150673" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1173377" ref_url="https://bugzilla.suse.com/1173377" source="BUGZILLA"/>
		<reference ref_id="1173378" ref_url="https://bugzilla.suse.com/1173378" source="BUGZILLA"/>
		<reference ref_id="1173380" ref_url="https://bugzilla.suse.com/1173380" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15563" ref_url="https://www.suse.com/security/cve/CVE-2020-15563/" source="CVE"/>
		<reference ref_id="CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565/" source="CVE"/>
		<reference ref_id="CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007116.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).
- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).
- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-10"/>
	<updated date="2020-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173377">SUSE bug 1173377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173378">SUSE bug 1173378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173380">SUSE bug 1173380</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15563/">CVE-2020-15563 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15563">CVE-2020-15563 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15565">CVE-2020-15565 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15567">CVE-2020-15567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538473" comment="xen-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538474" comment="xen-doc-html-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538475" comment="xen-libs-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538476" comment="xen-libs-32bit-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538477" comment="xen-tools-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538478" comment="xen-tools-domU-4.9.4_08-3.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150674" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1167231" ref_url="https://bugzilla.suse.com/1167231" source="BUGZILLA"/>
		<reference ref_id="1173576" ref_url="https://bugzilla.suse.com/1173576" source="BUGZILLA"/>
		<reference ref_id="1173613" ref_url="https://bugzilla.suse.com/1173613" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415/" source="CVE"/>
		<reference ref_id="CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426/" source="CVE"/>
		<reference ref_id="CVE-2020-6813" ref_url="https://www.suse.com/security/cve/CVE-2020-6813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 78.0.1 ESR fixes the following issues:

Security issues fixed:

- CVE-2020-12415: AppCache manifest poisoning due to url encoded character processing (bsc#1173576).
- CVE-2020-12416: Use-after-free in WebRTC VideoBroadcaster (bsc#1173576).
- CVE-2020-12417: Memory corruption due to missing sign-extension for ValueTags on ARM64 (bsc#1173576).
- CVE-2020-12418: Information disclosure due to manipulated URL object (bsc#1173576).
- CVE-2020-12419: Use-after-free in nsGlobalWindowInner (bsc#1173576).
- CVE-2020-12420: Use-After-Free when trying to connect to a STUN server (bsc#1173576).
- CVE-2020-12402: RSA Key Generation vulnerable to side-channel attack (bsc#1173576).
- CVE-2020-12421: Add-On updates did not respect the same certificate trust rules as software updates (bsc#1173576).
- CVE-2020-12422: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (bsc#1173576).
- CVE-2020-12423: DLL Hijacking due to searching %PATH% for a library (bsc#1173576).
- CVE-2020-12424: WebRTC permission prompt could have been bypassed by a compromised content process (bsc#1173576).
- CVE-2020-12425: Out of bound read in Date.parse() (bsc#1173576).
- CVE-2020-12426: Memory safety bugs fixed in Firefox 78 (bsc#1173576).
- FIPS: MozillaFirefox: allow /proc/sys/crypto/fips_enabled (bsc#1167231).

Non-security issues fixed:

- Fixed interaction with freetype6 (bsc#1173613).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-13"/>
	<updated date="2020-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167231">SUSE bug 1167231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173613">SUSE bug 1173613</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12415">CVE-2020-12415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12416">CVE-2020-12416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12417">CVE-2020-12417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12418">CVE-2020-12418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12419">CVE-2020-12419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12420">CVE-2020-12420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12421">CVE-2020-12421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12422">CVE-2020-12422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12423">CVE-2020-12423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12424">CVE-2020-12424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12425">CVE-2020-12425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12426">CVE-2020-12426 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6813/">CVE-2020-6813 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6813">CVE-2020-6813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531092" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531093" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531094" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531095" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150675" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1109160" ref_url="https://bugzilla.suse.com/1109160" source="BUGZILLA"/>
		<reference ref_id="1118367" ref_url="https://bugzilla.suse.com/1118367" source="BUGZILLA"/>
		<reference ref_id="1118368" ref_url="https://bugzilla.suse.com/1118368" source="BUGZILLA"/>
		<reference ref_id="1171740" ref_url="https://bugzilla.suse.com/1171740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741/" source="CVE"/>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007135.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- Amended documentation referring to rule types 'krb5-subdomain'
  and 'ms-subdomain'. This incorrect documentation could mislead
  operators into believing that policies they had configured were 
  more restrictive than they actually were. [CVE-2018-5741]
- Further limit the number of queries that can be triggered from a
  request.  Root and TLD servers are no longer exempt from 
  max-recursion-queries. Fetches for missing name server address
  records are limited to 4 for any domain. [CVE-2020-8616]
- Replaying a TSIG BADTIME response as a request could trigger an
  assertion failure. [CVE-2020-8617]
  [bsc#1109160, bsc#1171740,
   CVE-2018-5741, bind-CVE-2018-5741.patch,
   CVE-2020-8616, bind-CVE-2020-8616.patch,
   CVE-2020-8617, bind-CVE-2020-8617.patch]

- Don't rely on /etc/insserv.conf anymore for proper dependencies
  against nss-lookup.target in named.service and lwresd.service
  (bsc#1118367 bsc#1118368)
- Using a drop-in file
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118367">SUSE bug 1118367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118368">SUSE bug 1118368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5741">CVE-2018-5741 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8616">CVE-2020-8616 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8617">CVE-2020-8617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531096" comment="bind-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531097" comment="bind-chrootenv-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531098" comment="bind-doc-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531099" comment="bind-libs-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531100" comment="bind-libs-32bit-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531101" comment="bind-utils-9.9.9P1-63.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150676" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1173455" ref_url="https://bugzilla.suse.com/1173455" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007148.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-15049.patch: fixes a Cache Poisoning and Request Smuggling
  attack (CVE-2020-15049, bsc#1173455)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173455">SUSE bug 1173455</bugzilla>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15049">CVE-2020-15049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531103" comment="squid-3.5.21-26.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150677" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1113160" ref_url="https://bugzilla.suse.com/1113160" source="BUGZILLA"/>
		<reference ref_id="1134195" ref_url="https://bugzilla.suse.com/1134195" source="BUGZILLA"/>
		<reference ref_id="1138822" ref_url="https://bugzilla.suse.com/1138822" source="BUGZILLA"/>
		<reference ref_id="1141661" ref_url="https://bugzilla.suse.com/1141661" source="BUGZILLA"/>
		<reference ref_id="1142038" ref_url="https://bugzilla.suse.com/1142038" source="BUGZILLA"/>
		<reference ref_id="1143913" ref_url="https://bugzilla.suse.com/1143913" source="BUGZILLA"/>
		<reference ref_id="1148177" ref_url="https://bugzilla.suse.com/1148177" source="BUGZILLA"/>
		<reference ref_id="1153090" ref_url="https://bugzilla.suse.com/1153090" source="BUGZILLA"/>
		<reference ref_id="1153277" ref_url="https://bugzilla.suse.com/1153277" source="BUGZILLA"/>
		<reference ref_id="1154940" ref_url="https://bugzilla.suse.com/1154940" source="BUGZILLA"/>
		<reference ref_id="1154968" ref_url="https://bugzilla.suse.com/1154968" source="BUGZILLA"/>
		<reference ref_id="1155372" ref_url="https://bugzilla.suse.com/1155372" source="BUGZILLA"/>
		<reference ref_id="1163871" ref_url="https://bugzilla.suse.com/1163871" source="BUGZILLA"/>
		<reference ref_id="1165921" ref_url="https://bugzilla.suse.com/1165921" source="BUGZILLA"/>
		<reference ref_id="1168310" ref_url="https://bugzilla.suse.com/1168310" source="BUGZILLA"/>
		<reference ref_id="1170231" ref_url="https://bugzilla.suse.com/1170231" source="BUGZILLA"/>
		<reference ref_id="1170557" ref_url="https://bugzilla.suse.com/1170557" source="BUGZILLA"/>
		<reference ref_id="1171687" ref_url="https://bugzilla.suse.com/1171687" source="BUGZILLA"/>
		<reference ref_id="1172462" ref_url="https://bugzilla.suse.com/1172462" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10215" ref_url="https://www.suse.com/security/cve/CVE-2019-10215/" source="CVE"/>
		<reference ref_id="CVE-2019-15043" ref_url="https://www.suse.com/security/cve/CVE-2019-15043/" source="CVE"/>
		<reference ref_id="CVE-2020-12245" ref_url="https://www.suse.com/security/cve/CVE-2020-12245/" source="CVE"/>
		<reference ref_id="CVE-2020-13379" ref_url="https://www.suse.com/security/cve/CVE-2020-13379/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007159.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

cobbler:

- Calculate relative path for kernel and inited when generating
  grub entry (bsc#1170231)
  Added: fix-grub2-entry-paths.diff
- Fix os-release version detection for SUSE
  Modified: sles15.patch
- Jinja2 template library fix (bsc#1141661)
- Removes string replace for textmode fix (bsc#1134195)

golang-github-prometheus-node_exporter:

- Update to 0.18.1
  * [BUGFIX] Fix incorrect sysctl call in BSD meminfo collector, resulting in broken swap metrics on FreeBSD #1345
  * [BUGFIX] Fix rollover bug in mountstats collector #1364
  * Renamed interface label to device in netclass collector for consistency with
  * other network metrics #1224
  * The cpufreq metrics now separate the cpufreq and scaling data based on what the driver provides. #1248
  * The labels for the network_up metric have changed, see issue #1236
  * Bonding collector now uses mii_status instead of operstatus #1124
  * Several systemd metrics have been turned off by default to improve performance #1254
  * These include unit_tasks_current, unit_tasks_max, service_restart_total, and unit_start_time_seconds
  * The systemd collector blacklist now includes automount, device, mount, and slice units by default. #1255
  * [CHANGE] Bonding state uses mii_status #1124
  * [CHANGE] Add a limit to the number of in-flight requests #1166
  * [CHANGE] Renamed interface label to device in netclass collector #1224
  * [CHANGE] Add separate cpufreq and scaling metrics #1248
  * [CHANGE] Several systemd metrics have been turned off by default to improve performance #1254
  * [CHANGE] Expand systemd collector blacklist #1255
  * [CHANGE] Split cpufreq metrics into a separate collector #1253
  * [FEATURE] Add a flag to disable exporter metrics #1148
  * [FEATURE] Add kstat-based Solaris metrics for boottime, cpu and zfs collectors #1197
  * [FEATURE] Add uname collector for FreeBSD #1239
  * [FEATURE] Add diskstats collector for OpenBSD #1250
  * [FEATURE] Add pressure collector exposing pressure stall information for Linux #1174
  * [FEATURE] Add perf exporter for Linux #1274
  * [ENHANCEMENT] Add Infiniband counters #1120
  * [ENHANCEMENT] Add TCPSynRetrans to netstat default filter #1143
  * [ENHANCEMENT] Move network_up labels into new metric network_info #1236
  * [ENHANCEMENT] Use 64-bit counters for Darwin netstat
  * [BUGFIX] Add fallback for missing /proc/1/mounts #1172
  * [BUGFIX] Fix node_textfile_mtime_seconds to work properly on symlinks #1326
- Add network-online (Wants and After) dependency to systemd unit bsc#1143913

golang-github-prometheus-prometheus:

- Update change log and spec file
  + Modified spec file: default to golang 1.14 to avoid 'have choice' build issues in OBS. 
  + Rebase and update patches for version 2.18.0
  + Changed:  
    * 0002-Default-settings.patch Changed
- Update to 2.18.0 
  + Features 
    * Tracing: Added experimental Jaeger support #7148
  + Changes
    * Federation: Only use local TSDB for federation (ignore remote read). #7096
    * Rules: `rule_evaluations_total` and `rule_evaluation_failures_total` have a `rule_group` label now. #7094
  + Enhancements
    * TSDB: Significantly reduce WAL size kept around after a block cut. #7098
    * Discovery: Add `architecture` meta label for EC2. #7000
  + Bug fixes
    * UI: Fixed wrong MinTime reported by /status. #7182
    * React UI: Fixed multiselect legend on OSX. #6880
    * Remote Write: Fixed blocked resharding edge case. #7122
    * Remote Write: Fixed remote write not updating on relabel configs change. #7073
- Changes from 2.17.2
  + Bug fixes
    * Federation: Register federation metrics #7081
    * PromQL: Fix panic in parser error handling #7132
    * Rules: Fix reloads hanging when deleting a rule group that is being evaluated #7138
    * TSDB: Fix a memory leak when prometheus starts with an empty TSDB WAL #7135
    * TSDB: Make isolation more robust to panics in web handlers #7129 #7136
- Changes from 2.17.1
  + Bug fixes
    * TSDB: Fix query performance regression that increased memory and CPU usage #7051
- Changes from 2.17.0
  + Features 
    * TSDB: Support isolation #6841
    * This release implements isolation in TSDB. API queries and recording rules are
      guaranteed to only see full scrapes and full recording rules. This comes with a
      certain overhead in resource usage. Depending on the situation, there might be
      some increase in memory usage, CPU usage, or query latency.
  + Enhancements
    * PromQL: Allow more keywords as metric names #6933
    * React UI: Add normalization of localhost URLs in targets page #6794
    * Remote read: Read from remote storage concurrently #6770
    * Rules: Mark deleted rule series as stale after a reload #6745
    * Scrape: Log scrape append failures as debug rather than warn #6852
    * TSDB: Improve query performance for queries that partially hit the head #6676
    * Consul SD: Expose service health as meta label #5313
    * EC2 SD: Expose EC2 instance lifecycle as meta label #6914
    * Kubernetes SD: Expose service type as meta label for K8s service role #6684
    * Kubernetes SD: Expose label_selector and field_selector #6807
    * Openstack SD: Expose hypervisor id as meta label #6962
  + Bug fixes
    * PromQL: Do not escape HTML-like chars in query log #6834 #6795
    * React UI: Fix data table matrix values #6896
    * React UI: Fix new targets page not loading when using non-ASCII characters #6892
    * Remote read: Fix duplication of metrics read from remote storage with external labels #6967 #7018
    * Remote write: Register WAL watcher and live reader metrics for all remotes, not just the first one #6998
    * Scrape: Prevent removal of metric names upon relabeling #6891
    * Scrape: Fix 'superfluous response.WriteHeader call' errors when scrape fails under some circonstances #6986
    * Scrape: Fix crash when reloads are separated by two scrape intervals #7011
- Changes from 2.16.0
  + Features 
    * React UI: Support local timezone on /graph #6692
    * PromQL: add absent_over_time query function #6490
    * Adding optional logging of queries to their own file #6520
  + Enhancements
    * React UI: Add support for rules page and 'Xs ago' duration displays #6503
    * React UI: alerts page, replace filtering togglers tabs with checkboxes #6543
    * TSDB: Export metric for WAL write errors #6647
    * TSDB: Improve query performance for queries that only touch the most recent 2h of data. #6651
    * PromQL: Refactoring in parser errors to improve error messages #6634
    * PromQL: Support trailing commas in grouping opts #6480
    * Scrape: Reduce memory usage on reloads by reusing scrape cache #6670
    * Scrape: Add metrics to track bytes and entries in the metadata cache #6675
    * promtool: Add support for line-column numbers for invalid rules output #6533
    * Avoid restarting rule groups when it is unnecessary #6450
  + Bug fixes
    * React UI: Send cookies on fetch() on older browsers #6553
    * React UI: adopt grafana flot fix for stacked graphs #6603
    * React UI: broken graph page browser history so that back button works as expected #6659
    * TSDB: ensure compactionsSkipped metric is registered, and log proper error if one is returned from head.Init #6616
    * TSDB: return an error on ingesting series with duplicate labels #6664
    * PromQL: Fix unary operator precedence #6579
    * PromQL: Respect query.timeout even when we reach query.max-concurrency #6712
    * PromQL: Fix string and parentheses handling in engine, which affected React UI #6612
    * PromQL: Remove output labels returned by absent() if they are produced by multiple identical label matchers #6493
    * Scrape: Validate that OpenMetrics input ends with `# EOF` #6505
    * Remote read: return the correct error if configs can't be marshal'd to JSON #6622
    * Remote write: Make remote client `Store` use passed context, which can affect shutdown timing #6673
    * Remote write: Improve sharding calculation in cases where we would always be consistently behind by tracking pendingSamples #6511
    * Ensure prometheus_rule_group metrics are deleted when a rule group is removed #6693
- Changes from 2.15.2
  + Bug fixes
    * TSDB: Fixed support for TSDB blocks built with Prometheus before 2.1.0. #6564
    * TSDB: Fixed block compaction issues on Windows. #6547
- Changes from 2.15.1
  + Bug fixes
    * TSDB: Fixed race on concurrent queries against same data. #6512
- Changes from 2.15.0
  + Features 
    * API: Added new endpoint for exposing per metric metadata `/metadata`. #6420 #6442
  + Changes
    * Discovery: Removed `prometheus_sd_kubernetes_cache_*` metrics. Additionally `prometheus_sd_kubernetes_workqueue_latency_seconds` and `prometheus_sd_kubernetes_workqueue_work_duration_seconds` metrics now show correct values in seconds. #6393
    * Remote write: Changed `query` label on `prometheus_remote_storage_*` metrics to `remote_name` and `url`. #6043
  + Enhancements
    * TSDB: Significantly reduced memory footprint of loaded TSDB blocks. #6418 #6461
    * TSDB: Significantly optimized what we buffer during compaction which should result in lower memory footprint during compaction. #6422 #6452 #6468 #6475
    * TSDB: Improve replay latency. #6230
    * TSDB: WAL size is now used for size based retention calculation. #5886
    * Remote read: Added query grouping and range hints to the remote read request #6401
    * Remote write: Added `prometheus_remote_storage_sent_bytes_total` counter per queue. #6344
    * promql: Improved PromQL parser performance. #6356
    * React UI: Implemented missing pages like `/targets` #6276, TSDB status page #6281 #6267 and many other fixes and performance improvements.
    * promql: Prometheus now accepts spaces between time range and square bracket. e.g `[ 5m]` #6065  
  + Bug fixes
    * Config: Fixed alertmanager configuration to not miss targets when configurations are similar. #6455
    * Remote write: Value of `prometheus_remote_storage_shards_desired` gauge shows raw value of desired shards and it's updated correctly. #6378
    * Rules: Prometheus now fails the evaluation of rules and alerts where metric results collide with labels specified in `labels` field. #6469
    * API: Targets Metadata API `/targets/metadata` now accepts empty `match_targets` parameter as in the spec. #6303
- Changes from 2.14.0
  + Features 
    * API: `/api/v1/status/runtimeinfo` and `/api/v1/status/buildinfo` endpoints added for use by the React UI. #6243
    * React UI: implement the new experimental React based UI. #5694 and many more
      * Can be found by under `/new`.
      * Not all pages are implemented yet.
    * Status: Cardinality statistics added to the Runtime &amp; Build Information page. #6125
  + Enhancements
    * Remote write: fix delays in remote write after a compaction. #6021
    * UI: Alerts can be filtered by state. #5758
  + Bug fixes
    * Ensure warnings from the API are escaped. #6279
    * API: lifecycle endpoints return 403 when not enabled. #6057
    * Build: Fix Solaris build. #6149
    * Promtool: Remove false duplicate rule warnings when checking rule files with alerts. #6270
    * Remote write: restore use of deduplicating logger in remote write. #6113
    * Remote write: do not reshard when unable to send samples. #6111
    * Service discovery: errors are no longer logged on context cancellation. #6116, #6133
    * UI: handle null response from API properly. #6071
- Changes from 2.13.1
  + Bug fixes
    * Fix panic in ARM builds of Prometheus. #6110
    * promql: fix potential panic in the query logger. #6094
    * Multiple errors of http: superfluous response.WriteHeader call in the logs. #6145
- Changes from 2.13.0
  + Enhancements
    * Metrics: renamed prometheus_sd_configs_failed_total to prometheus_sd_failed_configs and changed to Gauge #5254
    * Include the tsdb tool in builds. #6089
    * Service discovery: add new node address types for kubernetes. #5902
    * UI: show warnings if query have returned some warnings. #5964
    * Remote write: reduce memory usage of the series cache. #5849
    * Remote read: use remote read streaming to reduce memory usage. #5703
    * Metrics: added metrics for remote write max/min/desired shards to queue manager. #5787
    * Promtool: show the warnings during label query. #5924
    * Promtool: improve error messages when parsing bad rules. #5965
    * Promtool: more promlint rules. #5515
  + Bug fixes
    * UI: Fix a Stored DOM XSS vulnerability with query history [CVE-2019-10215](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10215). #6098
    * Promtool: fix recording inconsistency due to duplicate labels. #6026
    * UI: fixes service-discovery view when accessed from unhealthy targets. #5915
    * Metrics format: OpenMetrics parser crashes on short input. #5939
    * UI: avoid truncated Y-axis values. #6014
- Changes from 2.12.0
  + Features 
    * Track currently active PromQL queries in a log file. #5794
    * Enable and provide binaries for `mips64` / `mips64le` architectures. #5792
  + Enhancements
    * Improve responsiveness of targets web UI and API endpoint. #5740
    * Improve remote write desired shards calculation. #5763
    * Flush TSDB pages more precisely. tsdb#660
    * Add `prometheus_tsdb_retention_limit_bytes` metric. tsdb#667
    * Add logging during TSDB WAL replay on startup. tsdb#662
    * Improve TSDB memory usage. tsdb#653, tsdb#643, tsdb#654, tsdb#642, tsdb#627
  + Bug fixes
    * Check for duplicate label names in remote read. #5829
    * Mark deleted rules' series as stale on next evaluation. #5759
    * Fix JavaScript error when showing warning about out-of-sync server time. #5833
    * Fix `promtool test rules` panic when providing empty `exp_labels`. #5774
    * Only check last directory when discovering checkpoint number. #5756
    * Fix error propagation in WAL watcher helper functions. #5741
    * Correctly handle empty labels from alert templates. #5845
- Update Uyuni/SUSE Manager service discovery patch
  + Modified 0003-Add-Uyuni-service-discovery.patch:
  + Adapt service discovery to the new Uyuni API endpoints
  + Modified spec file: force golang 1.12 to fix build issues in SLE15SP2
- Update to Prometheus 2.11.2

grafana:

- Update to version 7.0.3
  * Features / Enhancements
    - Stats: include all fields. #24829, @ryantxu
    - Variables: change VariableEditorList row action Icon to IconButton. #25217, @hshoff
  * Bug fixes
    - Cloudwatch: Fix dimensions of DDoSProtection. #25317, @papagian
    - Configuration: Fix env var override of sections containing hyphen. #25178, @marefr
    - Dashboard: Get panels in collapsed rows. #25079, @peterholmberg
    - Do not show alerts tab when alerting is disabled. #25285, @dprokop
    - Jaeger: fixes cascader option label duration value. #25129, @Estrax
    - Transformations: Fixed Transform tab crash &amp; no update after adding first transform. #25152, @torkelo
- Update to version 7.0.2
  * Bug fixes
    - Security: Urgent security patch release to fix CVE-2020-13379
- Update to version 7.0.1
  * Features / Enhancements
    - Datasource/CloudWatch: Makes CloudWatch Logs query history more readable. #24795, @kaydelaney
    - Download CSV: Add date and time formatting. #24992, @ryantxu
    - Table: Make last cell value visible when right aligned. #24921, @peterholmberg
    - TablePanel: Adding sort order persistance. #24705, @torkelo
    - Transformations: Display correct field name when using reduce transformation. #25068, @peterholmberg
    - Transformations: Allow custom number input for binary operations. #24752, @ryantxu
  * Bug fixes
    - Dashboard/Links: Fixes dashboard links by tags not working. #24773, @KamalGalrani
    - Dashboard/Links: Fixes open in new window for dashboard link. #24772, @KamalGalrani
    - Dashboard/Links: Variables are resolved and limits to 100. #25076, @hugohaggmark
    - DataLinks: Bring back variables interpolation in title. #24970, @dprokop
    - Datasource/CloudWatch: Field suggestions no longer limited to prefix-only. #24855, @kaydelaney
    - Explore/Table: Keep existing field types if possible. #24944, @kaydelaney
    - Explore: Fix wrap lines toggle for results of queries with filter expression. #24915, @ivanahuckova
    - Explore: fix undo in query editor. #24797, @zoltanbedi
    - Explore: fix word break in type head info. #25014, @zoltanbedi
    - Graph: Legend decimals now work as expected. #24931, @torkelo
    - LoginPage: Fix hover color for service buttons. #25009, @tskarhed
    - LogsPanel: Fix scrollbar. #24850, @ivanahuckova
    - MoveDashboard: Fix for moving dashboard caused all variables to be lost. #25005, @torkelo
    - Organize transformer: Use display name in field order comparer. #24984, @dprokop
    - Panel: shows correct panel menu items in view mode. #24912, @hugohaggmark
    - PanelEditor Fix missing labels and description if there is only single option in category. #24905, @dprokop
    - PanelEditor: Overrides name matcher still show all original field names even after Field default display name is specified. #24933, @torkelo
    - PanelInspector: Makes sure Data display options are visible. #24902, @hugohaggmark
    - PanelInspector: Hides unsupported data display options for Panel type. #24918, @hugohaggmark
    - PanelMenu: Make menu disappear on button press. #25015, @tskarhed
    - Postgres: Fix add button. #25087, @phemmer
    - Prometheus: Fix recording rules expansion. #24977, @ivanahuckova
    - Stackdriver: Fix creating Service Level Objectives (SLO) datasource query variable. #25023, @papagian
- Update to version 7.0.0 
  * Breaking changes
    - Removed PhantomJS: PhantomJS was deprecated in Grafana v6.4 and starting from Grafana v7.0.0, all PhantomJS support has been removed. This means that Grafana no longer ships with a built-in image renderer, and we advise you to install the Grafana Image Renderer plugin.
    - Dashboard: A global minimum dashboard refresh interval is now enforced and defaults to 5 seconds.
    - Interval calculation: There is now a new option Max data points that controls the auto interval $__interval calculation. Interval was previously calculated by dividing the panel width by the time range. With the new max data points option it is now easy to set $__interval to a dynamic value that is time range agnostic. For example if you set Max data points to 10 Grafana will dynamically set $__interval by dividing the current time range by 10.
    - Datasource/Loki: Support for deprecated Loki endpoints has been removed.
    - Backend plugins: Grafana now requires backend plugins to be signed, otherwise Grafana will not load/start them. This is an additional security measure to make sure backend plugin binaries and files haven't been tampered with. Refer to Upgrade Grafana for more information.
    - @grafana/ui: Forms migration notice, see @grafana/ui changelog
    - @grafana/ui: Select API change for creating custom values, see @grafana/ui changelog
    + Deprecation warnings
      - Scripted dashboards is now deprecated. The feature is not removed but will be in a future release. We hope to address the underlying requirement of dynamic dashboards in a different way. #24059
      - The unofficial first version of backend plugins together with usage of grafana/grafana-plugin-model is now deprecated and support for that will be removed in a future release. Please refer to backend plugins documentation for information about the new officially supported backend plugins.
  * Features / Enhancements
    - Backend plugins: Log deprecation warning when using the unofficial first version of backend plugins. #24675, @marefr
    - Editor: New line on Enter, run query on Shift+Enter. #24654, @davkal
    - Loki: Allow multiple derived fields with the same name. #24437, @aocenas
    - Orgs: Add future deprecation notice. #24502, @torkelo
  * Bug Fixes
    - @grafana/toolkit: Use process.cwd() instead of PWD to get directory. #24677, @zoltanbedi
    - Admin: Makes long settings values line break in settings page. #24559, @hugohaggmark
    - Dashboard: Allow editing provisioned dashboard JSON and add confirmation when JSON is copied to dashboard. #24680, @dprokop
    - Dashboard: Fix for strange 'dashboard not found' errors when opening links in dashboard settings. #24416, @torkelo
    - Dashboard: Fix so default data source is selected when data source can't be found in panel editor. #24526, @mckn
    - Dashboard: Fixed issue changing a panel from transparent back to normal in panel editor. #24483, @torkelo
    - Dashboard: Make header names reflect the field name when exporting to CSV file from the the panel inspector. #24624, @peterholmberg
    - Dashboard: Make sure side pane is displayed with tabs by default in panel editor. #24636, @dprokop
    - Data source: Fix query/annotation help content formatting. #24687, @AgnesToulet
    - Data source: Fixes async mount errors. #24579, @Estrax
    - Data source: Fixes saving a data source without failure when URL doesn't specify a protocol. #24497, @aknuds1
    - Explore/Prometheus: Show results of instant queries only in table. #24508, @ivanahuckova
    - Explore: Fix rendering of react query editors. #24593, @ivanahuckova
    - Explore: Fixes loading more logs in logs context view. #24135, @Estrax
    - Graphite: Fix schema and dedupe strategy in rollup indicators for Metrictank queries. #24685, @torkelo
    - Graphite: Makes query annotations work again. #24556, @hugohaggmark
    - Logs: Clicking 'Load more' from context overlay doesn't expand log row. #24299, @kaydelaney
    - Logs: Fix total bytes process calculation. #24691, @davkal
    - Org/user/team preferences: Fixes so UI Theme can be set back to Default. #24628, @AgnesToulet
    - Plugins: Fix manifest validation. #24573, @aknuds1
    - Provisioning: Use proxy as default access mode in provisioning. #24669, @bergquist
    - Search: Fix select item when pressing enter and Grafana is served using a sub path. #24634, @tskarhed
    - Search: Save folder expanded state. #24496, @Clarity-89
    - Security: Tag value sanitization fix in OpenTSDB data source. #24539, @rotemreiss
    - Table: Do not include angular options in options when switching from angular panel. #24684, @torkelo
    - Table: Fixed persisting column resize for time series fields. #24505, @torkelo
    - Table: Fixes Cannot read property subRows of null. #24578, @hugohaggmark
    - Time picker: Fixed so you can enter a relative range in the time picker without being converted to absolute range. #24534, @mckn
    - Transformations: Make transform dropdowns not cropped. #24615, @dprokop
    - Transformations: Sort order should be preserved as entered by user when using the reduce transformation. #24494, @hugohaggmark
    - Units: Adds scale symbol for currencies with suffixed symbol. #24678, @hugohaggmark
    - Variables: Fixes filtering options with more than 1000 entries. #24614, @hugohaggmark
    - Variables: Fixes so Textbox variables read value from url. #24623, @hugohaggmark
    - Zipkin: Fix error when span contains remoteEndpoint. #24524, @aocenas
    - SAML: Switch from email to login for user login attribute mapping (Enterprise)
- Update Makefile and spec file
  * Remove phantomJS patch from Makefile 
  * Fix multiline strings in Makefile
  * Exclude s390 from SLE12 builds, golang 1.14 is not built for s390
- Add instructions for patching the Grafana javascript frontend.
- BuildRequires golang(API) instead of go metapackage version range
  * BuildRequires:  golang(API) &gt;= 1.14   from
    BuildRequires:  ( go &gt;= 1.14 with go &lt; 1.15 )
- Update to version 6.7.3
  - This version fixes bsc#1170557 and its corresponding CVE-2020-12245
  - Admin: Fix Synced via LDAP message for non-LDAP external users. #23477, @alexanderzobnin
  - Alerting: Fixes notifications for alerts with empty message in Google Hangouts notifier. #23559, @hugohaggmark
  - AuthProxy: Fixes bug where long username could not be cached.. #22926, @jcmcken
  - Dashboard: Fix saving dashboard when editing raw dashboard JSON model. #23314, @peterholmberg
  - Dashboard: Try to parse 8 and 15 digit numbers as timestamps if parsing of time range as date fails. #21694, @jessetan
  - DashboardListPanel: Fixed problem with empty panel after going into edit mode (General folder filter being automatically added) . #23426, @torkelo
  - Data source: Handle datasource withCredentials option properly. #23380, @hvtuananh
  - Security: Fix annotation popup XSS vulnerability. #23813, @torkelo
  - Server: Exit Grafana with status code 0 if no error. #23312, @aknuds1
  - TablePanel: Fix XSS issue in header column rename (backport). #23814, @torkelo
  - Variables: Fixes error when setting adhoc variable values. #23580, @hugohaggmark
- Update to version 6.7.2:
  (see installed changelog for the full list of changes)
  -  BackendSrv: Adds config to response to fix issue for external plugins that used this property . #23032, @torkelo
  -  Dashboard: Fixed issue with saving new dashboard after changing title . #23104, @dprokop
  -  DataLinks: make sure we use the correct datapoint when dataset contains null value.. #22981, @mckn
  -  Plugins: Fixed issue for plugins that imported dateMath util . #23069, @mckn
  -  Security: Fix for dashboard snapshot original dashboard link could contain XSS vulnerability in url. #23254, @torkelo
  -  Variables: Fixes issue with too many queries being issued for nested template variables after value change. #23220, @torkelo
  -  Plugins: Expose promiseToDigest. #23249, @torkelo
  -  Reporting (Enterprise): Fixes issue updating a report created by someone else
- Update to 6.7.1:
  (see installed changelog for the full list of changes)
  Bug Fixes
  - Azure: Fixed dropdowns not showing current value. #22914, @torkelo
  - BackendSrv: only add content-type on POST, PUT requests. #22910, @hugohaggmark
  - Panels: Fixed size issue with panel internal size when exiting panel edit mode. #22912, @torkelo
  - Reporting: fixes migrations compatibility with mysql (Enterprise)
  - Reporting: Reduce default concurrency limit to 4 (Enterprise)
- Update to 6.7.0:
  (see installed changelog for the full list of changes)
  Bug Fixes
  - AngularPanels: Fixed inner height calculation for angular panels . #22796, @torkelo
  - BackendSrv: makes sure provided headers are correctly recognized and set. #22778, @hugohaggmark
  - Forms: Fix input suffix position (caret-down in Select) . #22780, @torkelo
  - Graphite: Fixed issue with query editor and next select metric now showing after selecting metric node . #22856, @torkelo
  - Rich History: UX adjustments and fixes. #22729, @ivanahuckova
- Update to 6.7.0-beta1:
  Breaking changes
  -  Slack: Removed Mention setting and instead introduce Mention Users, Mention Groups, and Mention Channel. The first two settings require user and group IDs, respectively. This change was necessary because the way of mentioning via the Slack API changed and mentions in Slack notifications no longer worked.
  -  Alerting: Reverts the behavior of diff and percent_diff to not always be absolute. Something we introduced by mistake in 6.1.0. Alerting now support diff(), diff_abs(), percent_diff() and percent_diff_abs(). #21338
  - Notice about changes in backendSrv for plugin authors
    In our mission to migrate away from AngularJS to React we have removed all AngularJS dependencies in the core data retrieval service backendSrv.
    Removing the AngularJS dependencies in backendSrv has the unfortunate side effect of AngularJS digest no longer being triggered for any request made with backendSrv. Because of this, external plugins using backendSrv directly may suffer from strange behaviour in the UI.
    To remedy this issue, as a plugin author you need to trigger the digest after a direct call to backendSrv.
  Bug Fixes
    API: Fix redirect issues. #22285, @papagian
    Alerting: Don't include image_url field with Slack message if empty. #22372, @aknuds1
    Alerting: Fixed bad background color for default notifications in alert tab . #22660, @krvajal
    Annotations: In table panel when setting transform to annotation, they will now show up right away without a manual refresh. #22323, @krvajal
    Azure Monitor: Fix app insights source to allow for new __timeFrom and __timeTo. #21879, @ChadNedzlek
    BackendSrv: Fixes POST body for form data. gmark
    CloudWatch: Credentials cache invalidation fix. #22473, @sunker
    CloudWatch: Expand alias variables when query yields no result. #22695, @sunker
    Dashboard: Fix bug with NaN in alerting. #22053, @a-melnyk
    Explore: Fix display of multiline logs in log panel and explore. #22057, @thomasdraebing
    Heatmap: Legend color range is incorrect when using custom min/max. #21748, @sv5d
    Security: Fixed XSS issue in dashboard history diff . #22680, @torkelo
    StatPanel: Fixes base color is being used for null values .
    #22646, @torkelo
- Update to version 6.6.2:
  (see installed changelog for the full list of changes)
- Update to version 6.6.1:
  (see installed changelog for the full list of changes)
- Update to version 6.6.0:
  (see installed changelog for the full list of changes)
- Update to version 6.5.3:
  (see installed changelog for the full list of changes)
- Update to version 6.5.2:
  (see installed changelog for the full list of changes)
- Update to version 6.5.1:
  (see installed changelog for the full list of changes)
- Update to version 6.5.0
  (see installed changelog for the full list of changes)
- Update to version 6.4.5:
  * Create version 6.4.5
  * CloudWatch: Fix high CPU load (#20579)
- Add obs-service-go_modules to download required modules into vendor.tar.gz
- Adjusted spec file to use vendor.tar.gz
- Adjusted Makefile to work with new filenames
- BuildRequire go1.14
- Update to version 6.4.4:
  * DataLinks: Fix blur issues. #19883, @aocenas
  * Docker: Makes it possible to parse timezones in the docker image. #20081, @xlson
  * LDAP: All LDAP servers should be tried even if one of them returns a connection error. #20077, @jongyllen
  * LDAP: No longer shows incorrectly matching groups based on role in debug page. #20018, @xlson
  * Singlestat: Fix no data / null value mapping . #19951, @ryantxu
- Revert the spec file and make script
- Remove PhantomJS dependency
- Update to 6.4.3
  * Bug Fixes
    - Alerting: All notification channels should send even if one fails to send. #19807, @jan25
    - AzureMonitor: Fix slate interference with dropdowns. #19799, @aocenas
    - ContextMenu: make ContextMenu positioning aware of the viewport width. #19699, @krvajal
    - DataLinks: Fix context menu not showing in singlestat-ish visualisations. #19809, @dprokop
    - DataLinks: Fix url field not releasing focus. #19804, @aocenas
    - Datasource: Fixes clicking outside of some query editors required 2 clicks. #19822, @aocenas
    - Panels: Fixes default tab for visualizations without Queries Tab. #19803, @hugohaggmark
    - Singlestat: Fixed issue with mapping null to text. #19689, @torkelo
    - @grafana/toolkit: Don't fail plugin creation when git user.name config is not set. #19821, @dprokop
    - @grafana/toolkit: TSLint line number off by 1. #19782, @fredwangwang
- Update to 6.4.2
  * Bug Fixes
    - CloudWatch: Changes incorrect dimension wmlid to wlmid . #19679, @ATTron
    - Grafana Image Renderer: Fixes plugin page. #19664, @hugohaggmark
    - Graph: Fixes auto decimals logic for y axis ticks that results in too many decimals for high values. #19618, @torkelo
    - Graph: Switching to series mode should re-render graph. #19623, @torkelo
    - Loki: Fix autocomplete on label values. #19579, @aocenas
    - Loki: Removes live option for logs panel. #19533, @davkal
    - Profile: Fix issue with user profile not showing more than sessions sessions in some cases. #19578, @huynhsamha
    - Prometheus: Fixes so results in Panel always are sorted by query order. #19597, @hugohaggmark
    - sted keys in YAML provisioning caused a server crash, #19547
    - ImageRendering: Fixed issue with image rendering in enterprise build (Enterprise)
    - Reporting: Fixed issue with reporting service when STMP was disabled (Enterprise).
- Changes from 6.4.0
  * Features / Enhancements
    - Build: Upgrade go to 1.12.10. #19499, @marefr
    - DataLinks: Suggestions menu improvements. #19396, @dprokop
    - Explore: Take root_url setting into account when redirecting from dashboard to explore. #19447, @ivanahuckova
    - Explore: Update broken link to logql docs. #19510, @ivanahuckova
    - Logs: Adds Logs Panel as a visualization. #19504, @davkal
  * Bug Fixes
    - CLI: Fix version selection for plugin install. #19498, @aocenas
    - Graph: Fixes minor issue with series override color picker and custom color . #19516, @torkelo
- Changes from 6.4.0 Beta 2
  * Features / Enhancements
    - Azure Monitor: Remove support for cross resource queries (#19115)'. #19346, @sunker
    - Docker: Upgrade packages to resolve reported vulnerabilities. #19188, @marefr
    - Graphite: Time range expansion reduced from 1 minute to 1 second. #19246, @torkelo
    - grafana/toolkit: Add plugin creation task. #19207, @dprokop
  * Bug Fixes
    - Alerting: Prevents creating alerts from unsupported queries. #19250, @hugohaggmark
    - Alerting: Truncate PagerDuty summary when greater than 1024 characters. #18730, @nvllsvm
    - Cloudwatch: Fix autocomplete for Gamelift dimensions. #19146, @kevinpz
    - Dashboard: Fix export for sharing when panels use default data source. #19315, @torkelo
    - Database: Rewrite system statistics query to perform better. #19178, @papagian
    - Gauge/BarGauge: Fix issue with [object Object] in titles . #19217, @ryantxu
    - MSSQL: Revert usage of new connectionstring format introduced by #18384. #19203, @marefr
    - Multi-LDAP: Do not fail-fast on invalid credentials. #19261, @gotjosh
    - MySQL, Postgres, MSSQL: Fix validating query with template variables in alert . #19237, @marefr
    - MySQL, Postgres: Update raw sql when query builder updates. #19209, @marefr
    - MySQL: Limit datasource error details returned from the backend. #19373, @marefr
- Changes from 6.4.0 Beta 1
  * Features / Enhancements
    - API: Readonly datasources should not be created via the API. #19006, @papagian
    - Alerting: Include configured AlertRuleTags in Webhooks notifier. #18233, @dominic-miglar
    - Annotations: Add annotations support to Loki. #18949, @aocenas
    - Annotations: Use a single row to represent a region. #17673, @ryantxu
    - Auth: Allow inviting existing users when login form is disabled. #19048, @548017
    - Azure Monitor: Add support for cross resource queries. #19115, @sunker
    - CLI: Allow installing custom binary plugins. #17551, @aocenas
    - Dashboard: Adds Logs Panel (alpha) as visualization option for Dashboards. #18641, @hugohaggmark
    - Dashboard: Reuse query results between panels . #16660, @ryantxu
    - Dashboard: Set time to to 23:59:59 when setting To time using calendar. #18595, @simPod
    - DataLinks: Add DataLinks support to Gauge, BarGauge and SingleStat2 panel. #18605, @ryantxu
    - DataLinks: Enable access to labels &amp; field names. #18918, @torkelo
    - DataLinks: Enable multiple data links per panel. #18434, @dprokop
    - Docker: switch docker image to alpine base with phantomjs support. #18468, @DanCech
    - Elasticsearch: allow templating queries to order by doc_count. #18870, @hackery
    - Explore: Add throttling when doing live queries. #19085, @aocenas
    - Explore: Adds ability to go back to dashboard, optionally with query changes. #17982, @kaydelaney
    - Explore: Reduce default time range to last hour. #18212, @davkal
    - Gauge/BarGauge: Support decimals for min/max. #18368, @ryantxu
    - Graph: New series override transform constant that renders a single point as a line across the whole graph. #19102, @davkal
    - Image rendering: Add deprecation warning when PhantomJS is used for rendering images. #18933, @papagian
    - InfluxDB: Enable interpolation within ad-hoc filter values. #18077, @kvc-code
    - LDAP: Allow an user to be synchronized against LDAP. #18976, @gotjosh
    - Ldap: Add ldap debug page. #18759, @peterholmberg
    - Loki: Remove prefetching of default label values. #18213, @davkal
    - Metrics: Add failed alert notifications metric. #18089, @koorgoo
    - OAuth: Support JMES path lookup when retrieving user email. #14683, @bobmshannon
    - OAuth: return GitLab groups as a part of user info (enable team sync). #18388, @alexanderzobnin
    - Panels: Add unit for electrical charge - ampere-hour. #18950, @anirudh-ramesh
    - Plugin: AzureMonitor - Reapply MetricNamespace support. #17282, @raphaelquati
    - Plugins: better warning when plugins fail to load. #18671, @ryantxu
    - Postgres: Add support for scram sha 256 authentication. #18397, @nonamef
    - RemoteCache: Support SSL with Redis. #18511, @kylebrandt
    - SingleStat: The gauge option in now disabled/hidden (unless it's an old panel with it already enabled) . #18610, @ryantxu
    - Stackdriver: Add extra alignment period options. #18909, @sunker
    - Units: Add South African Rand (ZAR) to currencies. #18893, @jeteon
    - Units: Adding T,P,E,Z,and Y bytes. #18706, @chiqomar
  * Bug Fixes
    - Alerting: Notification is sent when state changes from no_data to ok. #18920, @papagian
    - Alerting: fix duplicate alert states when the alert fails to save to the database. #18216, @kylebrandt
    - Alerting: fix response popover prompt when add notification channels. #18967, @lzdw
    - CloudWatch: Fix alerting for queries with Id (using GetMetricData). #17899, @alex-berger
    - Explore: Fix auto completion on label values for Loki. #18988, @aocenas
    - Explore: Fixes crash using back button with a zoomed in graph. #19122, @hugohaggmark
    - Explore: Fixes so queries in Explore are only run if Graph/Table is shown. #19000, @hugohaggmark
    - MSSQL: Change connectionstring to URL format to fix using passwords with semicolon. #18384, @Russiancold
    - MSSQL: Fix memory leak when debug enabled. #19049, @briangann
    - Provisioning: Allow escaping literal '$' with '$$' in configs to avoid interpolation. #18045, @kylebrandt
    - TimePicker: Fixes hiding time picker dropdown in FireFox. #19154, @hugohaggmark
  * Breaking changes
    + Annotations
      There are some breaking changes in the annotations HTTP API for region annotations. Region annotations are now represented
      using a single event instead of two seperate events. Check breaking changes in HTTP API below and HTTP API documentation for more details.
    + Docker
      Grafana is now using Alpine 3.10 as docker base image.
    + HTTP API
      - GET /api/alert-notifications now requires at least editor access.
        New /api/alert-notifications/lookup returns less information than /api/alert-notifications and can be access by any authenticated user.
      - GET /api/alert-notifiers now requires at least editor access
      - GET /api/org/users now requires org admin role.
        New /api/org/users/lookup returns less information than /api/org/users and can be access by users that are org admins,
        admin in any folder or admin of any team.
      - GET /api/annotations no longer returns regionId property.
      - POST /api/annotations no longer supports isRegion property.
      - PUT /api/annotations/:id no longer supports isRegion property.
      - PATCH /api/annotations/:id no longer supports isRegion property.
      - DELETE /api/annotations/region/:id has been removed.
  * Deprecation notes
    + PhantomJS
      - PhantomJS, which is used for rendering images of dashboards and panels,
        is deprecated and will be removed in a future Grafana release.
        A deprecation warning will from now on be logged when Grafana starts up if PhantomJS is in use.
        Please consider migrating from PhantomJS to the Grafana Image Renderer plugin.
- Changes from 6.3.6
  * Features / Enhancements
    - Metrics: Adds setting for turning off total stats metrics. #19142, @marefr
  * Bug Fixes
    - Database: Rewrite system statistics query to perform better. #19178, @papagian
    - Explore: Fixes error when switching from prometheus to loki data sources. #18599, @kaydelaney
- Rebase package spec. Use mostly from fedora, fix suse specified things and fix some errors.
- Add missing directories provisioning/datasources and provisioning/notifiers
  and sample.yaml as described in packaging/rpm/control from upstream.
  Missing directories are shown in logfiles.
- Version 6.3.5
  * Upgrades
    + Build: Upgrade to go 1.12.9.
  * Bug Fixes
    + Dashboard: Fixes dashboards init failed loading error for dashboards with panel links that had missing properties.
    + Editor: Fixes issue where only entire lines were being copied.
    + Explore: Fixes query field layout in splitted view for Safari browsers.
    + LDAP: multildap + ldap integration.
    + Profile/UserAdmin: Fix for user agent parser crashes grafana-server on 32-bit builds.
    + Prometheus: Prevents panel editor crash when switching to Prometheus datasource.
    + Prometheus: Changes brace-insertion behavior to be less annoying.
- Version 6.3.4
  * Security: CVE-2019-15043 - Parts of the HTTP API allow unauthenticated use.
- Version 6.3.3
  * Bug Fixes
    + Annotations: Fix failing annotation query when time series query is cancelled. #18532 1, @dprokop 1
    + Auth: Do not set SameSite cookie attribute if cookie_samesite is none. #18462 1, @papagian 3
    + DataLinks: Apply scoped variables to data links correctly. #18454 1, @dprokop 1
    + DataLinks: Respect timezone when displaying datapoint’s timestamp in graph context menu. #18461 2, @dprokop 1
    + DataLinks: Use datapoint timestamp correctly when interpolating variables. #18459 1, @dprokop 1
    + Explore: Fix loading error for empty queries. #18488 1, @davkal
    + Graph: Fixes legend issue clicking on series line icon and issue with horizontal scrollbar being visible on windows. #18563 1, @torkelo 2
    + Graphite: Avoid glob of single-value array variables . #18420, @gotjosh
    + Prometheus: Fix queries with label_replace remove the $1 match when loading query editor. #18480 5, @hugohaggmark 3
    + Prometheus: More consistently allows for multi-line queries in editor. #18362 2, @kaydelaney 2
    + TimeSeries: Assume values are all numbers. #18540 4, @ryantxu
- Version 6.3.2
  * Bug Fixes
    + Gauge/BarGauge: Fixes issue with losts thresholds and issue loading Gauge with avg stat. #18375 12
- Version 6.3.1
  * Bug Fixes
    + PanelLinks: Fix crash issue Gauge &amp; Bar Gauge for panels with panel links (drill down links). #18430 2
- Version 6.3.0
  * Features / Enhancements
    + OAuth: Do not set SameSite OAuth cookie if cookie_samesite is None. #18392 4, @papagian 3
    + Auth Proxy: Include additional headers as part of the cache key. #18298 6, @gotjosh
    + Build grafana images consistently. #18224 12, @hassanfarid
    + Docs: SAML. #18069 11, @gotjosh
    + Permissions: Show plugins in nav for non admin users but hide plugin configuration. #18234 1, @aocenas
    + TimePicker: Increase max height of quick range dropdown. #18247 2, @torkelo 2
    + Alerting: Add tags to alert rules. #10989 13, @Thib17 1
    + Alerting: Attempt to send email notifications to all given email addresses. #16881 1, @zhulongcheng
    + Alerting: Improve alert rule testing. #16286 2, @marefr
    + Alerting: Support for configuring content field for Discord alert notifier. #17017 2, @jan25
    + Alertmanager: Replace illegal chars with underscore in label names. #17002 5, @bergquist 1
    + Auth: Allow expiration of API keys. #17678, @papagian 3
    + Auth: Return device, os and browser when listing user auth tokens in HTTP API. #17504, @shavonn 1
    + Auth: Support list and revoke of user auth tokens in UI. #17434 2, @shavonn 1
    + AzureMonitor: change clashing built-in Grafana variables/macro names for Azure Logs. #17140, @shavonn 1
    + CloudWatch: Made region visible for AWS Cloudwatch Expressions. #17243 2, @utkarshcmu
    + Cloudwatch: Add AWS DocDB metrics. #17241, @utkarshcmu
    + Dashboard: Use timezone dashboard setting when exporting to CSV. #18002 1, @dehrax
    + Data links. #17267 11, @torkelo 2
    + Docker: Switch base image to ubuntu:latest from debian:stretch to avoid security issues… #17066 5, @bergquist 1
    + Elasticsearch: Support for visualizing logs in Explore . #17605 7, @marefr
    + Explore: Adds Live option for supported datasources. #17062 1, @hugohaggmark 3
    + Explore: Adds orgId to URL for sharing purposes. #17895 1, @kaydelaney 2
    + Explore: Adds support for new loki ‘start’ and ‘end’ params for labels endpoint. #17512, @kaydelaney 2
    + Explore: Adds support for toggling raw query mode in explore. #17870, @kaydelaney 2
    + Explore: Allow switching between metrics and logs . #16959 2, @marefr
    + Explore: Combines the timestamp and local time columns into one. #17775, @hugohaggmark 3
    + Explore: Display log lines context . #17097, @dprokop 1
    + Explore: Don’t parse log levels if provided by field or label. #17180 1, @marefr
    + Explore: Improves performance of Logs element by limiting re-rendering. #17685, @kaydelaney 2
    + Explore: Support for new LogQL filtering syntax. #16674 4, @davkal
    + Explore: Use new TimePicker from Grafana/UI. #17793, @hugohaggmark 3
    + Explore: handle newlines in LogRow Highlighter. #17425, @rrfeng 1
    + Graph: Added new fill gradient option. #17528 3, @torkelo 2
    + GraphPanel: Don’t sort series when legend table &amp; sort column is not visible . #17095, @shavonn 1
    + InfluxDB: Support for visualizing logs in Explore. #17450 9, @hugohaggmark 3
    + Logging: Login and Logout actions (#17760). #17883 1, @ATTron
    + Logging: Move log package to pkg/infra. #17023, @zhulongcheng
    + Metrics: Expose stats about roles as metrics. #17469 2, @bergquist 1
    + MySQL/Postgres/MSSQL: Add parsing for day, weeks and year intervals in macros. #13086 6, @bernardd
    + MySQL: Add support for periodically reloading client certs. #14892, @tpetr
    + Plugins: replace dataFormats list with skipDataQuery flag in plugin.json. #16984, @ryantxu
    + Prometheus: Take timezone into account for step alignment. #17477, @fxmiii
    + Prometheus: Use overridden panel range for $__range instead of dashboard range. #17352, @patrick246
    + Prometheus: added time range filter to series labels query. #16851 3, @FUSAKLA
    + Provisioning: Support folder that doesn’t exist yet in dashboard provisioning. #17407 1, @Nexucis
    + Refresh picker: Handle empty intervals. #17585 1, @dehrax
    + Singlestat: Add y min/max config to singlestat sparklines. #17527 4, @pitr
    + Snapshot: use given key and deleteKey. #16876, @zhulongcheng
    + Templating: Correctly display __text in multi-value variable after page reload. #17840 1, @EduardSergeev
    + Templating: Support selecting all filtered values of a multi-value variable. #16873 2, @r66ad
    + Tracing: allow propagation with Zipkin headers. #17009 4, @jrockway
    + Users: Disable users removed from LDAP. #16820 2, @alexanderzobnin
  * Bug Fixes
    + PanelLinks: Fix render issue when there is no panel description. #18408 3, @dehrax
    + OAuth: Fix “missing saved state” OAuth login failure due to SameSite cookie policy. #18332 1, @papagian 3
    + cli: fix for recognizing when in dev mode… #18334, @xlson
    + DataLinks: Fixes incorrect interpolation of ${__series_name} . #18251 1, @torkelo 2
    + Loki: Display live tailed logs in correct order in Explore. #18031 3, @kaydelaney 2
    + PhantomJS: Fixes rendering on Debian Buster. #18162 2, @xlson
    + TimePicker: Fixed style issue for custom range popover. #18244, @torkelo 2
    + Timerange: Fixes a bug where custom time ranges didn’t respect UTC. #18248 1, @kaydelaney 2
    + remote_cache: Fix redis connstr parsing. #18204 1, @mblaschke
    + AddPanel: Fix issue when removing moved add panel widget . #17659 2, @dehrax
    + CLI: Fix encrypt-datasource-passwords fails with sql error. #18014, @marefr
    + Elasticsearch: Fix default max concurrent shard requests. #17770 4, @marefr
    + Explore: Fix browsing back to dashboard panel. #17061, @jschill
    + Explore: Fix filter by series level in logs graph. #17798, @marefr
    + Explore: Fix issues when loading and both graph/table are collapsed. #17113, @marefr
    + Explore: Fix selection/copy of log lines. #17121, @marefr
    + Fix: Wrap value of multi variable in array when coming from URL. #16992 1, @aocenas
    + Frontend: Fix for Json tree component not working. #17608, @srid12
    + Graphite: Fix for issue with alias function being moved last. #17791, @torkelo 2
    + Graphite: Fixes issue with seriesByTag &amp; function with variable param. #17795, @torkelo 2
    + Graphite: use POST for /metrics/find requests. #17814 2, @papagian 3
    + HTTP Server: Serve Grafana with a custom URL path prefix. #17048 6, @jan25
    + InfluxDB: Fixes single quotes are not escaped in label value filters. #17398 1, @Panzki
    + Prometheus: Correctly escape ‘|’ literals in interpolated PromQL variables. #16932, @Limess
    + Prometheus: Fix when adding label for metrics which contains colons in Explore. #16760, @tolwi
    + SinglestatPanel: Remove background color when value turns null. #17552 1, @druggieri
- Make phantomjs dependency configurable
- Create plugin directory and clean up (create in %install,
  add to %files) handling of /var/lib/grafana/* and

mgr-cfg:

- Remove commented code in test files
- Replace spacewalk-usix with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)
- Add mgr manpage links

mgr-custom-info:

- Bump version to 4.1.0 (bsc#1154940)

mgr-daemon:

- Bump version to 4.1.0 (bsc#1154940)
- Fix systemd timer configuration on SLE12 (bsc#1142038)

mgr-osad:

- Separate osa-dispatcher and jabberd so it can be disabled independently
- Replace spacewalk-usix with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)
- Move /usr/share/rhn/config-defaults to uyuni-base-common
- Require uyuni-base-common for /etc/rhn (for osa-dispatcher)
- Ensure bytes type when using hashlib to avoid traceback (bsc#1138822)

mgr-push:

- Replace spacewalk-usix and spacewalk-backend-libs with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)

mgr-virtualization:

- Replace spacewalk-usix with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)
- Fix mgr-virtualization timer

rhnlib:

- Fix building
- Fix malformed XML response when data contains non-ASCII chars (bsc#1154968)
- Bump version to 4.1.0 (bsc#1154940)
- Fix bootstrapping SLE11SP4 trad client with SSL enabled (bsc#1148177)

spacecmd:

- Only report real error, not result (bsc#1171687)
- Use defined return values for spacecmd methods so scripts can
  check for failure (bsc#1171687)
- Disable globbing for api subcommand to allow wildcards in filter
  settings (bsc#1163871)
- Bugfix: attempt to purge SSM when it is empty (bsc#1155372)
- Bump version to 4.1.0 (bsc#1154940)
- Prevent error when piping stdout in Python 2 (bsc#1153090)
- Java api expects content as encoded string instead of encoded bytes like before (bsc#1153277)
- Enable building and installing for Ubuntu 16.04 and Ubuntu 18.04
- Add unit test for schedule, errata, user, utils, misc, configchannel
  and kickstart modules
- Multiple minor bugfixes alongside the unit tests
- Bugfix: referenced variable before assignment.
- Add unit test for report, package, org, repo and group

spacewalk-client-tools:

- Add workaround for uptime overflow to spacewalk-update-status as well (bsc#1165921)
- Spell correctly 'successful' and 'successfully'
- Skip dmidecode data on aarch64 to prevent coredump (bsc#1113160)
- Replace spacewalk-usix with uyuni-common-libs
- Return a non-zero exit status on errors in rhn_check
- Bump version to 4.1.0 (bsc#1154940)
- Make a explicit requirement to systemd for spacewalk-client-tools
  when rhnsd timer is installed

spacewalk-koan:

- Bump version to 4.1.0 (bsc#1154940)
- Require commands we use in merge-rd.sh

spacewalk-oscap:

- Bump version to 4.1.0 (bsc#1154940)

spacewalk-remote-utils:

- Update spacewalk-create-channel with RHEL 7.7 channel definitions
- Bump version to 4.1.0 (bsc#1154940)

supportutils-plugin-susemanager-client:

- Bump version to 4.1.0 (bsc#1154940)

suseRegisterInfo:

- SuseRegisterInfo only needs perl-base, not full perl (bsc#1168310)
- Bump version to 4.1.0 (bsc#1154940)

zypp-plugin-spacewalk:

- Prevent issue with non-ASCII characters in Python 2 systems (bsc#1172462)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-21"/>
	<updated date="2020-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1113160">SUSE bug 1113160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134195">SUSE bug 1134195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138822">SUSE bug 1138822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141661">SUSE bug 1141661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142038">SUSE bug 1142038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143913">SUSE bug 1143913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148177">SUSE bug 1148177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153090">SUSE bug 1153090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153277">SUSE bug 1153277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154940">SUSE bug 1154940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154968">SUSE bug 1154968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155372">SUSE bug 1155372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163871">SUSE bug 1163871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165921">SUSE bug 1165921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168310">SUSE bug 1168310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170231">SUSE bug 1170231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170557">SUSE bug 1170557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171687">SUSE bug 1171687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172462">SUSE bug 1172462</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10215/">CVE-2019-10215 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10215">CVE-2019-10215 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15043/">CVE-2019-15043 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15043">CVE-2019-15043 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12245/">CVE-2020-12245 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12245">CVE-2020-12245 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13379/">CVE-2020-13379 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13379">CVE-2020-13379 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555736" comment="golang-github-prometheus-node_exporter-0.18.1-1.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150678" version="1" class="patch">
	<metadata>
		<title>Security update for xrdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1173580" ref_url="https://bugzilla.suse.com/1173580" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-4044" ref_url="https://www.suse.com/security/cve/CVE-2020-4044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007166.html" source="SUSE-SU"/>
		<description>
This update for xrdp fixes the following issues:

- Security fixes (bsc#1173580, CVE-2020-4044):
  + Add patches:
    * xrdp-cve-2020-4044-fix-0.patch
    * xrdp-cve-2020-4044-fix-1.patch
  + Rebase SLE patch:
    * xrdp-fate318398-change-expired-password.patch
- Update patch:
  + xrdp-Allow-sessions-with-32-bpp.patch.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-21"/>
	<updated date="2020-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173580">SUSE bug 1173580</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-4044/">CVE-2020-4044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4044">CVE-2020-4044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555737" comment="xrdp-0.9.0~git.1456906198.f422461-21.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150679" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1173369" ref_url="https://bugzilla.suse.com/1173369" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15011" ref_url="https://www.suse.com/security/cve/CVE-2020-15011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007181.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2020-15011: Fixed a possible Arbitrary Content Injection via the private archive login page (bsc#1173369).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-24"/>
	<updated date="2020-07-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173369">SUSE bug 1173369</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15011/">CVE-2020-15011 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15011">CVE-2020-15011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531104" comment="mailman-2.1.17-3.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150680" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1173160" ref_url="https://bugzilla.suse.com/1173160" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007194.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-10745: Fixed an issue which parsing and packing of NBT and DNS packets containing dots could potentially have consumed excessive CPU (bsc#1173160).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10745">CVE-2020-10745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555738" comment="libdcerpc-binding0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538485" comment="libdcerpc-binding0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555739" comment="libdcerpc0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538487" comment="libdcerpc0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555740" comment="libndr-krb5pac0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538489" comment="libndr-krb5pac0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555741" comment="libndr-nbt0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538491" comment="libndr-nbt0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555742" comment="libndr-standard0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538493" comment="libndr-standard0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555743" comment="libndr0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538495" comment="libndr0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555744" comment="libnetapi0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538497" comment="libnetapi0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555745" comment="libsamba-credentials0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538499" comment="libsamba-credentials0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555746" comment="libsamba-errors0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538501" comment="libsamba-errors0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555747" comment="libsamba-hostconfig0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538503" comment="libsamba-hostconfig0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555748" comment="libsamba-passdb0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538505" comment="libsamba-passdb0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555749" comment="libsamba-util0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538507" comment="libsamba-util0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555750" comment="libsamdb0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538509" comment="libsamdb0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555751" comment="libsmbclient0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538511" comment="libsmbclient0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555752" comment="libsmbconf0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538513" comment="libsmbconf0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555753" comment="libsmbldap0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538515" comment="libsmbldap0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555754" comment="libtevent-util0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538517" comment="libtevent-util0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555755" comment="libwbclient0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538519" comment="libwbclient0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555756" comment="samba-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555757" comment="samba-client-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538522" comment="samba-client-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538523" comment="samba-doc-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555758" comment="samba-libs-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538525" comment="samba-libs-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555759" comment="samba-winbind-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538527" comment="samba-winbind-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150681" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1173998" ref_url="https://bugzilla.suse.com/1173998" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9806" ref_url="https://www.suse.com/security/cve/CVE-2020-9806/" source="CVE"/>
		<reference ref_id="CVE-2020-9807" ref_url="https://www.suse.com/security/cve/CVE-2020-9807/" source="CVE"/>
		<reference ref_id="CVE-2020-9843" ref_url="https://www.suse.com/security/cve/CVE-2020-9843/" source="CVE"/>
		<reference ref_id="CVE-2020-9850" ref_url="https://www.suse.com/security/cve/CVE-2020-9850/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.3 (bsc#1173998):
  + Enable kinetic scrolling with async scrolling.
  + Fix web process hangs on large GitHub pages.
  + Bubblewrap sandbox should not attempt to bind empty paths.
  + Fix threading issues in the media player.
  + Fix several crashes and rendering issues.
  + Security fixes:  CVE-2020-9802, CVE-2020-9803, CVE-2020-9805,
    CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850,
    CVE-2020-13753.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13753">CVE-2020-13753 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9802">CVE-2020-9802 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9803">CVE-2020-9803 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9805">CVE-2020-9805 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9806/">CVE-2020-9806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9806">CVE-2020-9806 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9807/">CVE-2020-9807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9807">CVE-2020-9807 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9843/">CVE-2020-9843 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9843">CVE-2020-9843 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9850/">CVE-2020-9850 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9850">CVE-2020-9850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531105" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531106" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531108" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531109" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531111" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150682" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1084632" ref_url="https://bugzilla.suse.com/1084632" source="BUGZILLA"/>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1173812" ref_url="https://bugzilla.suse.com/1173812" source="BUGZILLA"/>
		<reference ref_id="1174463" ref_url="https://bugzilla.suse.com/1174463" source="BUGZILLA"/>
		<reference ref_id="1174570" ref_url="https://bugzilla.suse.com/1174570" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308/" source="CVE"/>
		<reference ref_id="CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309/" source="CVE"/>
		<reference ref_id="CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310/" source="CVE"/>
		<reference ref_id="CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311/" source="CVE"/>
		<reference ref_id="CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706/" source="CVE"/>
		<reference ref_id="CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- Fix for CVE-2020-10713 (bsc#1168994)
- Fix for CVE-2020-14308 CVE-2020-14309, CVE-2020-14310, CVE-2020-14311
  (bsc#1173812)
- Fix for CVE-2020-15706 (bsc#1174463)
- Fix for CVE-2020-15707 (bsc#1174570)

- Use overflow checking primitives where the arithmetic expression for buffer
  allocations may include unvalidated data
- Use grub_calloc for overflow check and return NULL when it would occur 
- Use gcc-9 compiler for overflow check builtins
- Backport gcc-9 build fixes
- Fix packed-not-aligned error on GCC 8 (bsc#1084632)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1084632">SUSE bug 1084632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174463">SUSE bug 1174463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174570">SUSE bug 1174570</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14308">CVE-2020-14308 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14309">CVE-2020-14309 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14310">CVE-2020-14310 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14311">CVE-2020-14311 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15706">CVE-2020-15706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15707">CVE-2020-15707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555760" comment="grub2-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538529" comment="grub2-i386-pc-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538531" comment="grub2-snapper-plugin-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538532" comment="grub2-systemd-sleep-plugin-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538533" comment="grub2-x86_64-efi-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538534" comment="grub2-x86_64-xen-2.02-4.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150683" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1174415" ref_url="https://bugzilla.suse.com/1174415" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15900" ref_url="https://www.suse.com/security/cve/CVE-2020-15900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007204.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- fixed CVE-2020-15900 Memory Corruption (SAFER Sandbox Breakout)
  cf. https://bugs.ghostscript.com/show_bug.cgi?id=702582
  (bsc#1174415)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-30"/>
	<updated date="2020-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174415">SUSE bug 1174415</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15900/">CVE-2020-15900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15900">CVE-2020-15900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531119" comment="ghostscript-9.52-23.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531120" comment="ghostscript-x11-9.52-23.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150684" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1173948" ref_url="https://bugzilla.suse.com/1173948" source="BUGZILLA"/>
		<reference ref_id="1174538" ref_url="https://bugzilla.suse.com/1174538" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.1.0 ESR
  * Fixed: Various stability, functionality, and security fixes (bsc#1174538)
  * CVE-2020-15652: Potential leak of redirect targets when loading scripts in a worker
  * CVE-2020-6514: WebRTC data channel leaks internal address to peer
  * CVE-2020-15655: Extension APIs could be used to bypass Same-Origin Policy
  * CVE-2020-15653: Bypassing iframe sandbox when allowing popups
  * CVE-2020-6463: Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture
  * CVE-2020-15656: Type confusion for special arguments in IonMonkey
  * CVE-2020-15658: Overriding file type when saving to disk
  * CVE-2020-15657: DLL hijacking due to incorrect loading path
  * CVE-2020-15654: Custom cursor can overlay user interface
  * CVE-2020-15659: Memory safety bugs fixed in Firefox 79 and Firefox ESR 78.1
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-31"/>
	<updated date="2020-07-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173948">SUSE bug 1173948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15652">CVE-2020-15652 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15653">CVE-2020-15653 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15654">CVE-2020-15654 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15655">CVE-2020-15655 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15656">CVE-2020-15656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15657">CVE-2020-15657 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15658">CVE-2020-15658 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15659">CVE-2020-15659 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6463">CVE-2020-6463 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6514">CVE-2020-6514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531121" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531122" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531123" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150685" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007222.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-04"/>
	<updated date="2020-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531124" comment="libX11-6-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531125" comment="libX11-6-32bit-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531126" comment="libX11-data-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531127" comment="libX11-xcb1-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531128" comment="libX11-xcb1-32bit-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531129" comment="libxcb-dri2-0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531130" comment="libxcb-dri2-0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531131" comment="libxcb-dri3-0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531132" comment="libxcb-dri3-0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531133" comment="libxcb-glx0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531134" comment="libxcb-glx0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531135" comment="libxcb-present0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531136" comment="libxcb-present0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531137" comment="libxcb-randr0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531138" comment="libxcb-render0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531139" comment="libxcb-render0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531140" comment="libxcb-shape0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531141" comment="libxcb-shm0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531142" comment="libxcb-shm0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531143" comment="libxcb-sync1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531144" comment="libxcb-sync1-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531145" comment="libxcb-xf86dri0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531146" comment="libxcb-xfixes0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531147" comment="libxcb-xfixes0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531148" comment="libxcb-xinerama0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531149" comment="libxcb-xkb1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531150" comment="libxcb-xkb1-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531151" comment="libxcb-xv0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531152" comment="libxcb1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531153" comment="libxcb1-32bit-1.10-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150686" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1146351" ref_url="https://bugzilla.suse.com/1146351" source="BUGZILLA"/>
		<reference ref_id="1149652" ref_url="https://bugzilla.suse.com/1149652" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1162002" ref_url="https://bugzilla.suse.com/1162002" source="BUGZILLA"/>
		<reference ref_id="1164910" ref_url="https://bugzilla.suse.com/1164910" source="BUGZILLA"/>
		<reference ref_id="1170011" ref_url="https://bugzilla.suse.com/1170011" source="BUGZILLA"/>
		<reference ref_id="1170618" ref_url="https://bugzilla.suse.com/1170618" source="BUGZILLA"/>
		<reference ref_id="1171078" ref_url="https://bugzilla.suse.com/1171078" source="BUGZILLA"/>
		<reference ref_id="1171189" ref_url="https://bugzilla.suse.com/1171189" source="BUGZILLA"/>
		<reference ref_id="1171191" ref_url="https://bugzilla.suse.com/1171191" source="BUGZILLA"/>
		<reference ref_id="1171220" ref_url="https://bugzilla.suse.com/1171220" source="BUGZILLA"/>
		<reference ref_id="1171732" ref_url="https://bugzilla.suse.com/1171732" source="BUGZILLA"/>
		<reference ref_id="1171988" ref_url="https://bugzilla.suse.com/1171988" source="BUGZILLA"/>
		<reference ref_id="1172453" ref_url="https://bugzilla.suse.com/1172453" source="BUGZILLA"/>
		<reference ref_id="1172458" ref_url="https://bugzilla.suse.com/1172458" source="BUGZILLA"/>
		<reference ref_id="1172775" ref_url="https://bugzilla.suse.com/1172775" source="BUGZILLA"/>
		<reference ref_id="1172999" ref_url="https://bugzilla.suse.com/1172999" source="BUGZILLA"/>
		<reference ref_id="1173280" ref_url="https://bugzilla.suse.com/1173280" source="BUGZILLA"/>
		<reference ref_id="1173658" ref_url="https://bugzilla.suse.com/1173658" source="BUGZILLA"/>
		<reference ref_id="1174115" ref_url="https://bugzilla.suse.com/1174115" source="BUGZILLA"/>
		<reference ref_id="1174462" ref_url="https://bugzilla.suse.com/1174462" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810/" source="CVE"/>
		<reference ref_id="CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135/" source="CVE"/>
		<reference ref_id="CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).
- CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).
- CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).
- CVE-2020-10732: A flaw was found in the implementation of userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed  (bnc#1172999).
- CVE-2020-14416: A race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. (bnc#1172775).
- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).

The following non-security bugs were fixed:

- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170618).
- ibmvnic: Do not process device remove during device reset (bsc#1065729).
- ibmvnic: Do not process reset during or after device removal (bsc#1149652 ltc#179635).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).
- ibmvnic: Unmap DMA address of TX descriptor buffers after use (bsc#1146351 ltc#180726).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1164910).
- net/ibmvnic: Fix missing { in __ibmvnic_reset (bsc#1149652 ltc#179635).
- net/ibmvnic: free reset work of removed device from queue (bsc#1149652 ltc#179635).
- net/ibmvnic: prevent more than one thread from running in reset (bsc#1152457 ltc#174432).
- net/ibmvnic: unlock rtnl_lock in reset so linkwatch_event can run (bsc#1152457 ltc#174432).
- udp: drop corrupt packets earlier to avoid data corruption (bsc#1173658).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146351">SUSE bug 1146351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149652">SUSE bug 1149652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164910">SUSE bug 1164910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170011">SUSE bug 1170011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170618">SUSE bug 1170618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171078">SUSE bug 1171078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171189">SUSE bug 1171189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171191">SUSE bug 1171191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171732">SUSE bug 1171732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171988">SUSE bug 1171988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172453">SUSE bug 1172453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172458">SUSE bug 1172458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173280">SUSE bug 1173280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173658">SUSE bug 1173658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174115">SUSE bug 1174115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20810">CVE-2019-20810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20812">CVE-2019-20812 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0305">CVE-2020-0305 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10135">CVE-2020-10135 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10711">CVE-2020-10711 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10732">CVE-2020-10732 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10751">CVE-2020-10751 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10773">CVE-2020-10773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12771">CVE-2020-12771 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13974">CVE-2020-13974 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14416">CVE-2020-14416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555761" comment="kernel-default-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555762" comment="kernel-default-base-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555763" comment="kernel-default-devel-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538541" comment="kernel-devel-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538542" comment="kernel-macros-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538543" comment="kernel-source-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555764" comment="kernel-syms-4.4.180-94.127.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150687" version="1" class="patch">
	<metadata>
		<title>Security update for python-ipaddress (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007239.html" source="SUSE-SU"/>
		<description>
This update for python-ipaddress fixes the following issues:

- Add CVE-2020-14422-ipaddress-hash-collision.patch fixing
  CVE-2020-14422 (bsc#1173274, bpo#41004), where hash collisions
  in IPv4Interface and IPv6Interface could lead to DOS. 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14422">CVE-2020-14422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531162" comment="python-ipaddress-1.0.18-3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150688" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1173477" ref_url="https://bugzilla.suse.com/1173477" source="BUGZILLA"/>
		<reference ref_id="1173691" ref_url="https://bugzilla.suse.com/1173691" source="BUGZILLA"/>
		<reference ref_id="1173694" ref_url="https://bugzilla.suse.com/1173694" source="BUGZILLA"/>
		<reference ref_id="1173700" ref_url="https://bugzilla.suse.com/1173700" source="BUGZILLA"/>
		<reference ref_id="1173701" ref_url="https://bugzilla.suse.com/1173701" source="BUGZILLA"/>
		<reference ref_id="1173743" ref_url="https://bugzilla.suse.com/1173743" source="BUGZILLA"/>
		<reference ref_id="1173874" ref_url="https://bugzilla.suse.com/1173874" source="BUGZILLA"/>
		<reference ref_id="1173875" ref_url="https://bugzilla.suse.com/1173875" source="BUGZILLA"/>
		<reference ref_id="1173876" ref_url="https://bugzilla.suse.com/1173876" source="BUGZILLA"/>
		<reference ref_id="1173880" ref_url="https://bugzilla.suse.com/1173880" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922/" source="CVE"/>
		<reference ref_id="CVE-2018-21247" ref_url="https://www.suse.com/security/cve/CVE-2018-21247/" source="CVE"/>
		<reference ref_id="CVE-2019-20839" ref_url="https://www.suse.com/security/cve/CVE-2019-20839/" source="CVE"/>
		<reference ref_id="CVE-2019-20840" ref_url="https://www.suse.com/security/cve/CVE-2019-20840/" source="CVE"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398/" source="CVE"/>
		<reference ref_id="CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399/" source="CVE"/>
		<reference ref_id="CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400/" source="CVE"/>
		<reference ref_id="CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401/" source="CVE"/>
		<reference ref_id="CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402/" source="CVE"/>
		<reference ref_id="CVE-2020-14403" ref_url="https://www.suse.com/security/cve/CVE-2020-14403/" source="CVE"/>
		<reference ref_id="CVE-2020-14404" ref_url="https://www.suse.com/security/cve/CVE-2020-14404/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- security update
  fix CVE-2018-21247 [bsc#1173874], uninitialized memory contents are vulnerable to Information leak
  fix CVE-2019-20839 [bsc#1173875], buffer overflow in ConnectClientToUnixSock()
  fix CVE-2019-20840 [bsc#1173876], unaligned accesses in hybiReadAndDecode can lead to denial of service
  fix CVE-2020-14398 [bsc#1173880], improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c
  fix CVE-2020-14397 [bsc#1173700], NULL pointer dereference in libvncserver/rfbregion.c
  fix CVE-2020-14399 [bsc#1173743], Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c.
  fix CVE-2020-14400 [bsc#1173691], Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c.
  fix CVE-2020-14401 [bsc#1173694], potential integer overflows in libvncserver/scale.c
  fix CVE-2020-14402 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2020-14403 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2020-14404 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2017-18922 [bsc#1173477], preauth buffer overwrite
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-07"/>
	<updated date="2020-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173691">SUSE bug 1173691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173694">SUSE bug 1173694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173700">SUSE bug 1173700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173743">SUSE bug 1173743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173874">SUSE bug 1173874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173875">SUSE bug 1173875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173876">SUSE bug 1173876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173880">SUSE bug 1173880</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18922">CVE-2017-18922 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-21247/">CVE-2018-21247 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21247">CVE-2018-21247 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20839/">CVE-2019-20839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20839">CVE-2019-20839 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20840/">CVE-2019-20840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20840">CVE-2019-20840 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14397">CVE-2020-14397 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14398">CVE-2020-14398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14399">CVE-2020-14399 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14400">CVE-2020-14400 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14401">CVE-2020-14401 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14402">CVE-2020-14402 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14403/">CVE-2020-14403 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14403">CVE-2020-14403 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14404/">CVE-2020-14404 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14404">CVE-2020-14404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531163" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531164" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150689" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007243.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1174543 - secure boot related fixes
- bsc#1163019 - CVE-2020-8608: Potential OOB access due to unsafe snprintf() usages
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-07"/>
	<updated date="2020-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538546" comment="xen-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538547" comment="xen-doc-html-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538548" comment="xen-libs-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538549" comment="xen-libs-32bit-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538550" comment="xen-tools-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538551" comment="xen-tools-domU-4.9.4_10-3.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150690" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1156146" ref_url="https://bugzilla.suse.com/1156146" source="BUGZILLA"/>
		<reference ref_id="1171477" ref_url="https://bugzilla.suse.com/1171477" source="BUGZILLA"/>
		<reference ref_id="1171930" ref_url="https://bugzilla.suse.com/1171930" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14818" ref_url="https://www.suse.com/security/cve/CVE-2019-14818/" source="CVE"/>
		<reference ref_id="CVE-2020-10722" ref_url="https://www.suse.com/security/cve/CVE-2020-10722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007254.html" source="SUSE-SU"/>
		<description>
This update for dpdk to version 16.11.9 following issue:

- CVE-2019-14818: Fixed a memory leak vulnerability caused by a malicious container may lead to to denial of service (bsc#1156146).
- CVE-2020-12693: Fixed an authentication bypass via an alternate path or channel (boo#1172004).

- rebuilt with new signing key. (bsc#1174543)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156146">SUSE bug 1156146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171477">SUSE bug 1171477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171930">SUSE bug 1171930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14818/">CVE-2019-14818 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14818">CVE-2019-14818 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10722/">CVE-2020-10722 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10722">CVE-2020-10722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555765" comment="dpdk-16.11.9-8.15.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538553" comment="dpdk-kmp-default-16.11.9_k4.4.180_94.127-8.15.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555766" comment="dpdk-tools-16.11.9-8.15.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150691" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007253.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531165" comment="libX11-6-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531166" comment="libX11-6-32bit-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531167" comment="libX11-data-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531168" comment="libX11-xcb1-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531169" comment="libX11-xcb1-32bit-1.6.2-12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150692" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-c (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1083630" ref_url="https://bugzilla.suse.com/1083630" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12627" ref_url="https://www.suse.com/security/cve/CVE-2017-12627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007262.html" source="SUSE-SU"/>
		<description>
This update for xerces-c fixes the following issues:

- CVE-2017-12627: Processing of external DTD paths could have resulted in a
  null pointer dereference under certain conditions (bsc#1083630)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083630">SUSE bug 1083630</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12627/">CVE-2017-12627 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12627">CVE-2017-12627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531170" comment="libxerces-c-3_1-3.1.1-13.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531171" comment="libxerces-c-3_1-32bit-3.1.1-13.3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150693" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1174662" ref_url="https://bugzilla.suse.com/1174662" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-9862" ref_url="https://www.suse.com/security/cve/CVE-2020-9862/" source="CVE"/>
		<reference ref_id="CVE-2020-9893" ref_url="https://www.suse.com/security/cve/CVE-2020-9893/" source="CVE"/>
		<reference ref_id="CVE-2020-9894" ref_url="https://www.suse.com/security/cve/CVE-2020-9894/" source="CVE"/>
		<reference ref_id="CVE-2020-9895" ref_url="https://www.suse.com/security/cve/CVE-2020-9895/" source="CVE"/>
		<reference ref_id="CVE-2020-9915" ref_url="https://www.suse.com/security/cve/CVE-2020-9915/" source="CVE"/>
		<reference ref_id="CVE-2020-9925" ref_url="https://www.suse.com/security/cve/CVE-2020-9925/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.4 (bsc#1174662):
  + Fix several crashes and rendering issues.
  + Security fixes: CVE-2020-9862, CVE-2020-9893, CVE-2020-9894,
    CVE-2020-9895, CVE-2020-9915, CVE-2020-9925.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9862/">CVE-2020-9862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9862">CVE-2020-9862 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9893/">CVE-2020-9893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9893">CVE-2020-9893 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9894/">CVE-2020-9894 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9894">CVE-2020-9894 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9895/">CVE-2020-9895 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9895">CVE-2020-9895 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9915/">CVE-2020-9915 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9915">CVE-2020-9915 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9925/">CVE-2020-9925 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9925">CVE-2020-9925 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531172" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531173" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531175" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531176" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531178" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150694" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1174922" ref_url="https://bugzilla.suse.com/1174922" source="BUGZILLA"/>
		<reference ref_id="1174923" ref_url="https://bugzilla.suse.com/1174923" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12673" ref_url="https://www.suse.com/security/cve/CVE-2020-12673/" source="CVE"/>
		<reference ref_id="CVE-2020-12674" ref_url="https://www.suse.com/security/cve/CVE-2020-12674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007281.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2020-12673: improper implementation of NTLM does not check message buffer size (bsc#1174922).
- CVE-2020-12674: improper implementation of RPA mechanism (bsc#1174923).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-19"/>
	<updated date="2020-08-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174922">SUSE bug 1174922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174923">SUSE bug 1174923</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12673/">CVE-2020-12673 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12673">CVE-2020-12673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12674/">CVE-2020-12674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12674">CVE-2020-12674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531186" comment="dovecot22-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531187" comment="dovecot22-backend-mysql-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531188" comment="dovecot22-backend-pgsql-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531189" comment="dovecot22-backend-sqlite-2.2.31-19.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150695" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1172745" ref_url="https://bugzilla.suse.com/1172745" source="BUGZILLA"/>
		<reference ref_id="1174421" ref_url="https://bugzilla.suse.com/1174421" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007290.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- CVE-2020-15705: Fail kernel validation without shim protocol (bsc#1174421).
- Add fibre channel device's ofpath support to grub-ofpathname and search hint to speed up root device discovery (bsc#1172745).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172745">SUSE bug 1172745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174421">SUSE bug 1174421</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15705">CVE-2020-15705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555767" comment="grub2-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538556" comment="grub2-i386-pc-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538558" comment="grub2-snapper-plugin-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538559" comment="grub2-systemd-sleep-plugin-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538560" comment="grub2-x86_64-efi-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538561" comment="grub2-x86_64-xen-2.02-4.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150696" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1160888" ref_url="https://bugzilla.suse.com/1160888" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14907" ref_url="https://www.suse.com/security/cve/CVE-2019-14907/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006407.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2019-14907: Fixed a Server-side crash after charset conversion failure during NTLMSSP processing (bsc#1160888).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-24"/>
	<updated date="2020-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1160888">SUSE bug 1160888</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14907/">CVE-2019-14907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14907">CVE-2019-14907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522551" comment="libdcerpc-binding0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522552" comment="libdcerpc-binding0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522553" comment="libdcerpc0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522554" comment="libdcerpc0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522555" comment="libndr-krb5pac0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522556" comment="libndr-krb5pac0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522557" comment="libndr-nbt0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522558" comment="libndr-nbt0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522559" comment="libndr-standard0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522560" comment="libndr-standard0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522561" comment="libndr0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522562" comment="libndr0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522563" comment="libnetapi0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522564" comment="libnetapi0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522565" comment="libsamba-credentials0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522566" comment="libsamba-credentials0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522567" comment="libsamba-errors0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522568" comment="libsamba-errors0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522569" comment="libsamba-hostconfig0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522570" comment="libsamba-hostconfig0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522571" comment="libsamba-passdb0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522572" comment="libsamba-passdb0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522573" comment="libsamba-util0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522574" comment="libsamba-util0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522575" comment="libsamdb0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522576" comment="libsamdb0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522577" comment="libsmbclient0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522578" comment="libsmbclient0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522579" comment="libsmbconf0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522580" comment="libsmbconf0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522581" comment="libsmbldap0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522582" comment="libsmbldap0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522583" comment="libtevent-util0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522584" comment="libtevent-util0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522585" comment="libwbclient0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522586" comment="libwbclient0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522587" comment="samba-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522588" comment="samba-client-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522589" comment="samba-client-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522590" comment="samba-doc-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522591" comment="samba-libs-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522592" comment="samba-libs-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522593" comment="samba-winbind-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522594" comment="samba-winbind-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150697" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1174633" ref_url="https://bugzilla.suse.com/1174633" source="BUGZILLA"/>
		<reference ref_id="1174635" ref_url="https://bugzilla.suse.com/1174635" source="BUGZILLA"/>
		<reference ref_id="1174638" ref_url="https://bugzilla.suse.com/1174638" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14346" ref_url="https://www.suse.com/security/cve/CVE-2020-14346/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007305.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14347: Leak of uninitialized heap memory from the X server to clients on pixmap allocation (bsc#1174633, ZDI-CAN-11426).
- CVE-2020-14346: XIChangeHierarchy Integer Underflow Privilege Escalation Vulnerability (bsc#1174638, ZDI-CAN-11429).
- CVE-2020-14345: XKB out-of-bounds access privilege escalation vulnerability (bsc#1174635, ZDI-CAN-11428).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-26"/>
	<updated date="2020-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14345">CVE-2020-14345 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14346/">CVE-2020-14346 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14346">CVE-2020-14346 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14347">CVE-2020-14347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531240" comment="xorg-x11-server-7.6_1.18.3-76.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531241" comment="xorg-x11-server-extra-7.6_1.18.3-76.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150698" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17631" ref_url="https://www.suse.com/security/cve/CVE-2019-17631/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2996" ref_url="https://www.suse.com/security/cve/CVE-2019-2996/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2958
    CVE-2019-2962 CVE-2019-2964 CVE-2019-2975
    CVE-2019-2978 CVE-2019-2983 CVE-2019-2988
    CVE-2019-2989 CVE-2019-2992 CVE-2019-2996
    CVE-2019-2999 CVE-2019-2973 CVE-2019-2981
    CVE-2019-17631
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17631/">CVE-2019-17631 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17631">CVE-2019-17631 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2958">CVE-2019-2958 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2975">CVE-2019-2975 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2996/">CVE-2019-2996 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2996">CVE-2019-2996 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150699" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1174910" ref_url="https://bugzilla.suse.com/1174910" source="BUGZILLA"/>
		<reference ref_id="1174913" ref_url="https://bugzilla.suse.com/1174913" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007319.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14361: Fix XkbSelectEvents() integer underflow (bsc#1174910 ZDI-CAN-11573).
- CVE-2020-14362: Fix XRecordRegisterClients() Integer underflow (bsc#1174913 ZDI-CAN-11574).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-01"/>
	<updated date="2020-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14361">CVE-2020-14361 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14362">CVE-2020-14362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531257" comment="xorg-x11-server-7.6_1.18.3-76.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531258" comment="xorg-x11-server-extra-7.6_1.18.3-76.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150700" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1175070" ref_url="https://bugzilla.suse.com/1175070" source="BUGZILLA"/>
		<reference ref_id="1175071" ref_url="https://bugzilla.suse.com/1175071" source="BUGZILLA"/>
		<reference ref_id="1175072" ref_url="https://bugzilla.suse.com/1175072" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11985" ref_url="https://www.suse.com/security/cve/CVE-2020-11985/" source="CVE"/>
		<reference ref_id="CVE-2020-11993" ref_url="https://www.suse.com/security/cve/CVE-2020-11993/" source="CVE"/>
		<reference ref_id="CVE-2020-9490" ref_url="https://www.suse.com/security/cve/CVE-2020-9490/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007331.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-9490: Fixed a crash caused by a specially crafted value for the 'Cache-Digest' header in a HTTP/2 request (bsc#1175071).
- CVE-2020-11985: IP address spoofing when proxying using mod_remoteip and mod_rewrite (bsc#1175072).
- CVE-2020-11993: When trace/debug was enabled for the HTTP/2 module logging statements were made on the wrong connection (bsc#1175070).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175070">SUSE bug 1175070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175071">SUSE bug 1175071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175072">SUSE bug 1175072</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11985/">CVE-2020-11985 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11985">CVE-2020-11985 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11993/">CVE-2020-11993 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11993">CVE-2020-11993 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-9490/">CVE-2020-9490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9490">CVE-2020-9490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531259" comment="apache2-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531260" comment="apache2-doc-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531261" comment="apache2-example-pages-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531262" comment="apache2-prefork-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531263" comment="apache2-utils-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531264" comment="apache2-worker-2.4.23-29.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150701" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 15 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14581
  CVE-2020-14556 CVE-2020-14621 CVE-2020-14593 CVE-2020-14583
  CVE-2019-17639
  * Class Libraries:
    - JAVA.UTIL.ZIP.DEFLATER OPERATIONS THROW JAVA.LANG.INTERNALERROR
    - JAVA 8 DECODER OBJECTS CONSUME A LARGE AMOUNT OF JAVA HEAP
    - TRANSLATION MESSAGES UPDATE FOR JCL
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Java Virtual Machine:
    - IBM JAVA REGISTERS A HANDLER BY DEFAULT FOR SIGABRT
    - LARGE MEMORY FOOTPRINT HELD BY TRACECONTEXT OBJECT
  * JIT Compiler:
    - CRASH IN THE INTERPRETER AFTER OSR FROM INLINED SYNCHRONIZED METHOD
      IN DEBUGGING MODE
    - INTERMITTENT ASSERTION FAILURE REPORTED
    - CRASH IN RESOLVECLASSREF() DURING AOT LOAD
    - JIT CRASH DURING CLASS UNLOADING IN J9METHOD_HT::ONCLASSUNLOADING()
    - SEGMENTATION FAULT WHILE COMPILING A METHOD
    - UNEXPECTED CLASSCASTEXCEPTION THROWN IN HIGH LEVEL PARALLEL
      APPLICATION ON IBM Z PLATFORM
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
    - CHANGES TO IBMJCE AND IBMJCEPLUS PROVIDERS
    - IBMJCEPLUS FAILS, WHEN THE SECURITY MANAGER IS ENABLED, WITH
      DEFAULT PERMISSIONS, SPECIFIED IN JAVA.POLICY FILE
    - IN CERTAIN INSTANCES, IBMJCEPLUS PROVIDER THROWS EXCEPTION FROM
      KEYFACTORY CLASS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17639">CVE-2019-17639 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531265" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531267" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150702" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="1175665" ref_url="https://bugzilla.suse.com/1175665" source="BUGZILLA"/>
		<reference ref_id="1175671" ref_url="https://bugzilla.suse.com/1175671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811/" source="CVE"/>
		<reference ref_id="CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007341.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-24606: Fix livelocking in peerDigestHandleReply (bsc#1175671).
- CVE-2020-15811: Improve Transfer-Encoding handling (bsc#1175665).
- CVE-2020-15810: Enforce token characters for field-name (bsc#1175664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175665">SUSE bug 1175665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175671">SUSE bug 1175671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15810">CVE-2020-15810 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15811">CVE-2020-15811 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24606">CVE-2020-24606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531269" comment="squid-3.5.21-26.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150703" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1175239" ref_url="https://bugzilla.suse.com/1175239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2475-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007895.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- CVE-2020-14363: Fix an integer overflow in init_om() (bsc#1175239).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175239">SUSE bug 1175239</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14363">CVE-2020-14363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531270" comment="libX11-6-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531271" comment="libX11-6-32bit-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531272" comment="libX11-data-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531273" comment="libX11-xcb1-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531274" comment="libX11-xcb1-32bit-1.6.2-12.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150704" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 70 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14621
  CVE-2020-14593 CVE-2020-14583 CVE-2019-17639
  * Class Libraries:
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17639">CVE-2019-17639 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531275" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531277" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531278" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150705" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1173991" ref_url="https://bugzilla.suse.com/1173991" source="BUGZILLA"/>
		<reference ref_id="1174284" ref_url="https://bugzilla.suse.com/1174284" source="BUGZILLA"/>
		<reference ref_id="1175686" ref_url="https://bugzilla.suse.com/1175686" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007373.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.2.0 ESR
  * Fixed: Various stability, functionality, and security fixes
- Mozilla Firefox ESR 78.2
  MFSA 2020-38 (bsc#1175686)
  * CVE-2020-15663 (bmo#1643199)
    Downgrade attack on the Mozilla Maintenance Service could
    have resulted in escalation of privilege
  * CVE-2020-15664 (bmo#1658214)
    Attacker-induced prompt for extension installation
  * CVE-2020-15670 (bmo#1651001, bmo#1651449, bmo#1653626,
    bmo#1656957)
    Memory safety bugs fixed in Firefox 80 and Firefox ESR 78.2

- Fixed Firefox tab crash in FIPS mode (bsc#1174284).

- Fix broken translation-loading. (bsc#1173991) 
  * allow addon sideloading
  * mark signatures for langpacks non-mandatory
  * do not autodisable user profile scopes
- Google API key is not usable for geolocation service any more
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173991">SUSE bug 1173991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174284">SUSE bug 1174284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15663">CVE-2020-15663 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15664">CVE-2020-15664 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15670">CVE-2020-15670 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531280" comment="MozillaFirefox-78.2.0-112.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531281" comment="MozillaFirefox-devel-78.2.0-112.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531282" comment="MozillaFirefox-translations-common-78.2.0-112.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150706" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1152107" ref_url="https://bugzilla.suse.com/1152107" source="BUGZILLA"/>
		<reference ref_id="1173798" ref_url="https://bugzilla.suse.com/1173798" source="BUGZILLA"/>
		<reference ref_id="1174205" ref_url="https://bugzilla.suse.com/1174205" source="BUGZILLA"/>
		<reference ref_id="1174757" ref_url="https://bugzilla.suse.com/1174757" source="BUGZILLA"/>
		<reference ref_id="1174771" ref_url="https://bugzilla.suse.com/1174771" source="BUGZILLA"/>
		<reference ref_id="1175112" ref_url="https://bugzilla.suse.com/1175112" source="BUGZILLA"/>
		<reference ref_id="1175127" ref_url="https://bugzilla.suse.com/1175127" source="BUGZILLA"/>
		<reference ref_id="1175228" ref_url="https://bugzilla.suse.com/1175228" source="BUGZILLA"/>
		<reference ref_id="1175691" ref_url="https://bugzilla.suse.com/1175691" source="BUGZILLA"/>
		<reference ref_id="1176069" ref_url="https://bugzilla.suse.com/1176069" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).
- CVE-2019-16746: Fixed an improper check of the length of variable elements in a beacon head, leading to a buffer overflow (bsc#1152107).
- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).

The following non-security bugs were fixed:

- bonding: fix active-backup failover for current ARP slave (bsc#1174771).
- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1175691).
- ocfs2: add trimfs dlm lock resource (bsc#1175228).
- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).
- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-09"/>
	<updated date="2020-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152107">SUSE bug 1152107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173798">SUSE bug 1173798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174757">SUSE bug 1174757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174771">SUSE bug 1174771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175112">SUSE bug 1175112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175127">SUSE bug 1175127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175228">SUSE bug 1175228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175691">SUSE bug 1175691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14314">CVE-2020-14314 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16166">CVE-2020-16166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555768" comment="kernel-default-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555769" comment="kernel-default-base-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555770" comment="kernel-default-devel-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538595" comment="kernel-devel-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538596" comment="kernel-macros-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538597" comment="kernel-source-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555771" comment="kernel-syms-4.4.180-94.130.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150707" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update java-1_8_0-openjdk to version jdk8u242 (icedtea 3.15.0) (January 2020 CPU, bsc#1160968):

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2020-2590: Improve Kerberos interop capabilities
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2601: Better Ticket Granting Services
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support
- CVE-2020-2654: Improve Object Identifier Processing
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-30"/>
	<updated date="2020-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2590">CVE-2020-2590 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2601">CVE-2020-2601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522598" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531291" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531292" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522599" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150708" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1164860" ref_url="https://bugzilla.suse.com/1164860" source="BUGZILLA"/>
		<reference ref_id="1174117" ref_url="https://bugzilla.suse.com/1174117" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13935" ref_url="https://www.suse.com/security/cve/CVE-2020-13935/" source="CVE"/>
		<reference ref_id="CVE-2020-1935" ref_url="https://www.suse.com/security/cve/CVE-2020-1935/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007410.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-1935: Fixed an HTTP request smuggling vulnerability (bsc#1164860).
- CVE-2020-13935: Fixed a WebSocket DoS (bsc#1174117).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-11"/>
	<updated date="2020-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1164860">SUSE bug 1164860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174117">SUSE bug 1174117</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13935/">CVE-2020-13935 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13935">CVE-2020-13935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1935/">CVE-2020-1935 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1935">CVE-2020-1935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531293" comment="tomcat-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531294" comment="tomcat-admin-webapps-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531295" comment="tomcat-docs-webapp-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531296" comment="tomcat-el-3_0-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531297" comment="tomcat-javadoc-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531298" comment="tomcat-jsp-2_3-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531299" comment="tomcat-lib-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531300" comment="tomcat-servlet-3_1-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531301" comment="tomcat-webapps-8.0.53-29.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150709" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1175626" ref_url="https://bugzilla.suse.com/1175626" source="BUGZILLA"/>
		<reference ref_id="1175656" ref_url="https://bugzilla.suse.com/1175656" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007424.html" source="SUSE-SU"/>
		<description>
This update for shim fixes the following issues:

- Update to the unified shim binary from SUSE Linux Enterprise 15-SP1 (bsc#1168994)

This update addresses the 'BootHole' security issue (master CVE CVE-2020-10713), by
disallowing binaries signed by the previous SUSE UEFI signing key from booting.

This update should only be installed after updates of grub2, the Linux kernel and (if used)
Xen from July / August 2020 are applied.

Additional fixes:

+ shim-install: install MokManager to \EFI\boot to process the pending MOK request (bsc#1175626, bsc#1175656)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-14"/>
	<updated date="2020-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175626">SUSE bug 1175626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175656">SUSE bug 1175656</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538600" comment="shim-15+git47-25.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150710" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1120629" ref_url="https://bugzilla.suse.com/1120629" source="BUGZILLA"/>
		<reference ref_id="1120630" ref_url="https://bugzilla.suse.com/1120630" source="BUGZILLA"/>
		<reference ref_id="1120631" ref_url="https://bugzilla.suse.com/1120631" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1131823" ref_url="https://bugzilla.suse.com/1131823" source="BUGZILLA"/>
		<reference ref_id="1137977" ref_url="https://bugzilla.suse.com/1137977" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007438.html" source="SUSE-SU"/>
		<description>
This update for libsolv fixes the following issues:

This is a reissue of an existing libsolv update that also included libsolv-devel for LTSS products.

libsolv was updated to version 0.6.36 fixes the following issues:

Security issues fixed:

- CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629).
- CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630).
- CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631).

Non-security issues fixed:

- Made cleandeps jobs on patterns work (bsc#1137977).
- Fixed an issue multiversion packages that obsolete their own name (bsc#1127155).
- Keep consistent package name if there are multiple alternatives (bsc#1131823).

		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131823">SUSE bug 1131823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137977">SUSE bug 1137977</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20532">CVE-2018-20532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20533">CVE-2018-20533 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20534">CVE-2018-20534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555772" comment="libsolv-devel-0.6.36-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555773" comment="libsolv-tools-0.6.36-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555774" comment="perl-solv-0.6.36-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555775" comment="python-solv-0.6.36-2.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150711" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1176409" ref_url="https://bugzilla.suse.com/1176409" source="BUGZILLA"/>
		<reference ref_id="1176412" ref_url="https://bugzilla.suse.com/1176412" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392/" source="CVE"/>
		<reference ref_id="CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007439.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

Security issues fixed:

- CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated (bsc#1176412).
- CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name (bsc#1176409).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176409">SUSE bug 1176409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176412">SUSE bug 1176412</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14392">CVE-2020-14392 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14393">CVE-2020-14393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531302" comment="perl-DBI-1.628-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150712" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="1130840" ref_url="https://bugzilla.suse.com/1130840" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="1153238" ref_url="https://bugzilla.suse.com/1153238" source="BUGZILLA"/>
		<reference ref_id="1162423" ref_url="https://bugzilla.suse.com/1162423" source="BUGZILLA"/>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="1174701" ref_url="https://bugzilla.suse.com/1174701" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-20907: Fixed denial of service by avoiding possible infinite loop in specifically crafted tarball (bsc#1174091).
- CVE-2020-14422: Fixed an improper computation of hash values in the IPv4Interface and IPv6Interface 
  could have led to denial of service (bsc#1173274).
- CVE-2019-16935: Fixed a reflected XSS in python/Lib/DocXMLRPCServer.py (bsc#1153238).
- CVE-2019-9947: Fixed an issue in urllib2 which allowed CRLF injection if the attacker controls a url parameter (bsc#1130840).
- If the locale is 'C', coerce it to C.UTF-8 (bsc#1162423).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-21"/>
	<updated date="2020-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162423">SUSE bug 1162423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174701">SUSE bug 1174701</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16935">CVE-2019-16935 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14422">CVE-2020-14422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531303" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531304" comment="python3-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531305" comment="python3-base-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531306" comment="python3-curses-3.4.10-25.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150713" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1174120" ref_url="https://bugzilla.suse.com/1174120" source="BUGZILLA"/>
		<reference ref_id="1174316" ref_url="https://bugzilla.suse.com/1174316" source="BUGZILLA"/>
		<reference ref_id="1176579" ref_url="https://bugzilla.suse.com/1176579" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007463.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

-  ZeroLogon: An elevation of privilege was possible with some configurations when an attacker established
a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC) 
(CVE-2020-1472, bsc#1176579).

- Fixed an issue where multiple home folders were created(bsc#1174316, bso#13369).

- Fixed an issue where the net command was unable to negotiate SMB2 (bsc#1174120);
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174120">SUSE bug 1174120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174316">SUSE bug 1174316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176579">SUSE bug 1176579</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1472">CVE-2020-1472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555776" comment="libdcerpc-binding0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538606" comment="libdcerpc-binding0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555777" comment="libdcerpc0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538608" comment="libdcerpc0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555778" comment="libndr-krb5pac0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538610" comment="libndr-krb5pac0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555779" comment="libndr-nbt0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538612" comment="libndr-nbt0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555780" comment="libndr-standard0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538614" comment="libndr-standard0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555781" comment="libndr0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538616" comment="libndr0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555782" comment="libnetapi0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538618" comment="libnetapi0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555783" comment="libsamba-credentials0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538620" comment="libsamba-credentials0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555784" comment="libsamba-errors0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538622" comment="libsamba-errors0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555785" comment="libsamba-hostconfig0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538624" comment="libsamba-hostconfig0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555786" comment="libsamba-passdb0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538626" comment="libsamba-passdb0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555787" comment="libsamba-util0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538628" comment="libsamba-util0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555788" comment="libsamdb0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538630" comment="libsamdb0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555789" comment="libsmbclient0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538632" comment="libsmbclient0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555790" comment="libsmbconf0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538634" comment="libsmbconf0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555791" comment="libsmbldap0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538636" comment="libsmbldap0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555792" comment="libtevent-util0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538638" comment="libtevent-util0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555793" comment="libwbclient0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538640" comment="libwbclient0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555794" comment="samba-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555795" comment="samba-client-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538643" comment="samba-client-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538644" comment="samba-doc-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555796" comment="samba-libs-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538646" comment="samba-libs-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555797" comment="samba-winbind-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538648" comment="samba-winbind-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150714" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1172515" ref_url="https://bugzilla.suse.com/1172515" source="BUGZILLA"/>
		<reference ref_id="1176315" ref_url="https://bugzilla.suse.com/1176315" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007486.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2020-17507: Fixed a buffer overflow in XBM parser (bsc#1176315)
- Made handling of XDG_RUNTIME_DIR more secure (bsc#1172515)	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-25"/>
	<updated date="2020-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172515">SUSE bug 1172515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176315">SUSE bug 1176315</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17507">CVE-2020-17507 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555798" comment="libQt5Concurrent5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555799" comment="libQt5Core5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555800" comment="libQt5DBus5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555801" comment="libQt5Gui5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555802" comment="libQt5Network5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555803" comment="libQt5OpenGL5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555804" comment="libQt5PrintSupport5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555805" comment="libQt5Sql5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555806" comment="libQt5Sql5-mysql-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555807" comment="libQt5Sql5-postgresql-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555808" comment="libQt5Sql5-sqlite-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555809" comment="libQt5Sql5-unixODBC-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555810" comment="libQt5Test5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555811" comment="libQt5Widgets5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555812" comment="libQt5Xml5-5.6.2-6.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150715" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1167976" ref_url="https://bugzilla.suse.com/1167976" source="BUGZILLA"/>
		<reference ref_id="1173986" ref_url="https://bugzilla.suse.com/1173986" source="BUGZILLA"/>
		<reference ref_id="1174420" ref_url="https://bugzilla.suse.com/1174420" source="BUGZILLA"/>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

-Firefox was updated to 78.3.0 ESR (bsc#1176756, MFSA 2020-43)
   - CVE-2020-15677: Download origin spoofing via redirect
   - CVE-2020-15676: Fixed an XSS when pasting attacker-controlled data into a
     contenteditable element 
   - CVE-2020-15678: When recursing through layers while scrolling, an iterator
     may have become invalid, resulting in a potential use-after-free scenario
   - CVE-2020-15673: Fixed memory safety bugs 
- Enhance fix for wayland-detection (bsc#1174420)
- Attempt to fix langpack-parallelization by introducing separate
  obj-dirs for each lang (bsc#1173986, bsc#1167976)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-26"/>
	<updated date="2020-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167976">SUSE bug 1167976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173986">SUSE bug 1173986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174420">SUSE bug 1174420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15673">CVE-2020-15673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15676">CVE-2020-15676 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15677">CVE-2020-15677 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15678">CVE-2020-15678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531352" comment="MozillaFirefox-78.3.0-112.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531353" comment="MozillaFirefox-devel-78.3.0-112.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531354" comment="MozillaFirefox-translations-common-78.3.0-112.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150716" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1176343" ref_url="https://bugzilla.suse.com/1176343" source="BUGZILLA"/>
		<reference ref_id="1176344" ref_url="https://bugzilla.suse.com/1176344" source="BUGZILLA"/>
		<reference ref_id="1176345" ref_url="https://bugzilla.suse.com/1176345" source="BUGZILLA"/>
		<reference ref_id="1176346" ref_url="https://bugzilla.suse.com/1176346" source="BUGZILLA"/>
		<reference ref_id="1176347" ref_url="https://bugzilla.suse.com/1176347" source="BUGZILLA"/>
		<reference ref_id="1176348" ref_url="https://bugzilla.suse.com/1176348" source="BUGZILLA"/>
		<reference ref_id="1176349" ref_url="https://bugzilla.suse.com/1176349" source="BUGZILLA"/>
		<reference ref_id="1176350" ref_url="https://bugzilla.suse.com/1176350" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595/" source="CVE"/>
		<reference ref_id="CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596/" source="CVE"/>
		<reference ref_id="CVE-2020-25597" ref_url="https://www.suse.com/security/cve/CVE-2020-25597/" source="CVE"/>
		<reference ref_id="CVE-2020-25599" ref_url="https://www.suse.com/security/cve/CVE-2020-25599/" source="CVE"/>
		<reference ref_id="CVE-2020-25600" ref_url="https://www.suse.com/security/cve/CVE-2020-25600/" source="CVE"/>
		<reference ref_id="CVE-2020-25601" ref_url="https://www.suse.com/security/cve/CVE-2020-25601/" source="CVE"/>
		<reference ref_id="CVE-2020-25603" ref_url="https://www.suse.com/security/cve/CVE-2020-25603/" source="CVE"/>
		<reference ref_id="CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-25604: Fixed a race condition when migrating timers between x86 
  HVM vCPU-s (bsc#1176343,XSA-336)
- CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers (bsc#1176344,XSA-337)
- CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid (bsc#1176346,XSA-338)
- CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER (bsc#1176345,XSA-339)
- CVE-2020-25603: Fixed an issue due to  missing barriers when accessing/allocating an event channel (bsc#1176347,XSA-340)
- CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains (bsc#1176348,XSA-342)
- CVE-2020-25599: Fixed race conditions with evtchn_reset() (bsc#1176349,XSA-343)
- CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset() / evtchn_destroy() (bsc#1176350,XSA-344)	  
- CVE-2020-14364: Fixed an out-of-bounds read/write access while processing usb packets (bsc#1175534).
- Various bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-29"/>
	<updated date="2020-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176343">SUSE bug 1176343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176344">SUSE bug 1176344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176345">SUSE bug 1176345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176346">SUSE bug 1176346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176347">SUSE bug 1176347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176348">SUSE bug 1176348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176349">SUSE bug 1176349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176350">SUSE bug 1176350</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25595">CVE-2020-25595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25596">CVE-2020-25596 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25597/">CVE-2020-25597 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25597">CVE-2020-25597 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25599/">CVE-2020-25599 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25599">CVE-2020-25599 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25600/">CVE-2020-25600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25600">CVE-2020-25600 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25601/">CVE-2020-25601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25601">CVE-2020-25601 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25603/">CVE-2020-25603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25603">CVE-2020-25603 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25604">CVE-2020-25604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538664" comment="xen-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538665" comment="xen-doc-html-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538666" comment="xen-libs-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538667" comment="xen-libs-32bit-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538668" comment="xen-tools-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538669" comment="xen-tools-domU-4.9.4_12-3.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150717" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1176496" ref_url="https://bugzilla.suse.com/1176496" source="BUGZILLA"/>
		<reference ref_id="1176764" ref_url="https://bugzilla.suse.com/1176764" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7490" ref_url="https://www.suse.com/security/cve/CVE-2013-7490/" source="CVE"/>
		<reference ref_id="CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007519.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

- CVE-2019-20919: Fixed a NULL profile dereference in dbi_profile (bsc#1176764).
- CVE-2013-7490: Fixed memory corruption when using many arguments 
  to methods for CallbacksUsing (bsc#1176496).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176496">SUSE bug 1176496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176764">SUSE bug 1176764</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7490/">CVE-2013-7490 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7490">CVE-2013-7490 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20919">CVE-2019-20919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531376" comment="perl-DBI-1.628-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150718" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- java-1_7_0-openjdk was updated to 2.6.23 (July 2020 CPU, bsc#1174157)
    - JDK-8028431, CVE-2020-14579: NullPointerException in
    - DerValue.equals(DerValue)
    - JDK-8028591, CVE-2020-14578: NegativeArraySizeException in
    - sun.security.util.DerInputStream.getUnalignedBitString()
    - JDK-8230613: Better ASCII conversions
    - JDK-8231800: Better listing of arrays
    - JDK-8232014: Expand DTD support
    - JDK-8233255: Better Swing Buttons
    - JDK-8234032: Improve basic calendar services
    - JDK-8234042: Better factory production of certificates
    - JDK-8234418: Better parsing with CertificateFactory
    - JDK-8234836: Improve serialization handling
    - JDK-8236191: Enhance OID processing
    - JDK-8237592, CVE-2020-14577: Enhance certificate verification
    - JDK-8238002, CVE-2020-14581: Better matrix operations
    - JDK-8238804: Enhance key handling process
    - JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    - JDK-8238843: Enhanced font handing
    - JDK-8238920, CVE-2020-14583: Better Buffer support
    - JDK-8238925: Enhance WAV file playback
    - JDK-8240119, CVE-2020-14593: Less Affine Transformations
    - JDK-8240482: Improved WAV file playback
    - JDK-8241379: Update JCEKS support
    - JDK-8241522: Manifest improved jar headers redux
    - JDK-8242136, CVE-2020-14621: Better XML namespace handling
    - JDK-8040113: File not initialized in src/share/native/sun/awt/giflib/dgif_lib.c
    - JDK-8054446: Repeated offer and remove on ConcurrentLinkedQueue lead to an OutOfMemoryError
    - JDK-8077982: GIFLIB upgrade
    - JDK-8081315: 8077982 giflib upgrade breaks system giflib builds with earlier versions
    - JDK-8147087: Race when reusing PerRegionTable bitmaps may result in dropped remembered set entries
    - JDK-8151582: (ch) test java/nio/channels/AsyncCloseAndInterrupt.java failing due to 'Connection succeeded'
    - JDK-8155691: Update GIFlib library to the latest up-to-date
    - JDK-8181841: A TSA server returns timestamp with precision higher than milliseconds
    - JDK-8203190: SessionId.hashCode generates too many collisions
    - JDK-8217676: Upgrade libpng to 1.6.37
    - JDK-8220495: Update GIFlib library to the 5.1.8
    - JDK-8226892: ActionListeners on JRadioButtons don't get notified when selection is changed with arrow keys
    - JDK-8229899: Make java.io.File.isInvalid() less racy
    - JDK-8230597: Update GIFlib library to the 5.2.1
    - JDK-8230769: BufImg_SetupICM add ReleasePrimitiveArrayCritical call in early return
    - JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a
    - JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion() returns wrong result
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531377" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531378" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531379" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531380" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150719" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1176733" ref_url="https://bugzilla.suse.com/1176733" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26117" ref_url="https://www.suse.com/security/cve/CVE-2020-26117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007542.html" source="SUSE-SU"/>
		<description>
This update for tigervnc fixes the following issues:

- CVE-2020-26117: Server certificates were stored as certiticate
  authorities, allowing malicious owners of these certificates
  to impersonate any server after a client had added an exception
  (bsc#1176733).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1176733">SUSE bug 1176733</bugzilla>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26117/">CVE-2020-26117 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26117">CVE-2020-26117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531381" comment="libXvnc1-1.6.0-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531382" comment="tigervnc-1.6.0-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531383" comment="xorg-x11-Xvnc-1.6.0-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150720" version="1" class="patch">
	<metadata>
		<title>Security update for libproxy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1176410" ref_url="https://bugzilla.suse.com/1176410" source="BUGZILLA"/>
		<reference ref_id="1177143" ref_url="https://bugzilla.suse.com/1177143" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25219" ref_url="https://www.suse.com/security/cve/CVE-2020-25219/" source="CVE"/>
		<reference ref_id="CVE-2020-26154" ref_url="https://www.suse.com/security/cve/CVE-2020-26154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007543.html" source="SUSE-SU"/>
		<description>
This update for libproxy fixes the following issues:

- CVE-2020-25219: Rewrote url::recvline to be nonrecursive (bsc#1176410).
- CVE-2020-26154: Fixed a buffer overflow when PAC is enabled (bsc#1177143).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176410">SUSE bug 1176410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177143">SUSE bug 1177143</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25219/">CVE-2020-25219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25219">CVE-2020-25219 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26154/">CVE-2020-26154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26154">CVE-2020-26154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531384" comment="libproxy1-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531385" comment="libproxy1-32bit-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531386" comment="libproxy1-config-gnome3-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531387" comment="libproxy1-config-gnome3-32bit-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531388" comment="libproxy1-networkmanager-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531389" comment="libproxy1-pacrunner-webkit-0.4.13-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150721" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1177914" ref_url="https://bugzilla.suse.com/1177914" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007609.html" source="SUSE-SU"/>
		<description>
This update for freetype2 fixes the following issues:

- CVE-2020-15999: fixed a heap buffer overflow found in the handling of embedded PNG bitmaps (bsc#1177914).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-22"/>
	<updated date="2020-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177914">SUSE bug 1177914</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531390" comment="ft2demos-2.6.3-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531391" comment="libfreetype6-2.6.3-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531392" comment="libfreetype6-32bit-2.6.3-7.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150722" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1149332" ref_url="https://bugzilla.suse.com/1149332" source="BUGZILLA"/>
		<reference ref_id="1165784" ref_url="https://bugzilla.suse.com/1165784" source="BUGZILLA"/>
		<reference ref_id="1171878" ref_url="https://bugzilla.suse.com/1171878" source="BUGZILLA"/>
		<reference ref_id="1172085" ref_url="https://bugzilla.suse.com/1172085" source="BUGZILLA"/>
		<reference ref_id="1176013" ref_url="https://bugzilla.suse.com/1176013" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10029" ref_url="https://www.suse.com/security/cve/CVE-2020-10029/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007618.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:
	  
- CVE-2020-10029: Fixed a stack corruption from range reduction of pseudo-zero (bsc#1165784)
- Use posix_spawn on popen (bsc#1149332, bsc#1176013)
- Correct locking and cancellation cleanup in syslog functions (bsc#1172085)
- Fixed concurrent changes on nscd aware files (bsc#1171878)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-23"/>
	<updated date="2020-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149332">SUSE bug 1149332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165784">SUSE bug 1165784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171878">SUSE bug 1171878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172085">SUSE bug 1172085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176013">SUSE bug 1176013</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10029/">CVE-2020-10029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">CVE-2020-10029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531393" comment="glibc-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531394" comment="glibc-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531395" comment="glibc-devel-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531396" comment="glibc-devel-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531397" comment="glibc-html-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531398" comment="glibc-i18ndata-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531399" comment="glibc-info-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531400" comment="glibc-locale-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531401" comment="glibc-locale-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531402" comment="glibc-profile-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531403" comment="glibc-profile-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531404" comment="nscd-2.22-113.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150723" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="1177872" ref_url="https://bugzilla.suse.com/1177872" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007631.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.0 ESR
  * Fixed: Various stability, functionality, and security fixes MFSA 2020-46 (bsc#1177872, bsc#1176756)
  * CVE-2020-15969 Use-after-free in usersctp
  * CVE-2020-15683 Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4
  * Fixed: Fixed legacy preferences not being properly applied when set via GPO
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-27"/>
	<updated date="2020-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15683">CVE-2020-15683 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15969">CVE-2020-15969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531405" comment="MozillaFirefox-78.4.0-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531406" comment="MozillaFirefox-devel-78.4.0-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531407" comment="MozillaFirefox-translations-common-78.4.0-112.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150724" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1177158" ref_url="https://bugzilla.suse.com/1177158" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007658.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

- CVE-2020-14355: Fixed multiple buffer overflow vulnerabilities in QUIC image decoding (bsc#1177158).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14355">CVE-2020-14355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555813" comment="libspice-server1-0.12.8-15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150725" version="1" class="patch">
	<metadata>
		<title>Security update for spice-gtk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1177158" ref_url="https://bugzilla.suse.com/1177158" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007662.html" source="SUSE-SU"/>
		<description>
This update for spice-gtk fixes the following issues:

- CVE-2020-14355: Fixed multiple buffer overflow vulnerabilities in QUIC image decoding (bsc#1177158).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14355">CVE-2020-14355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555814" comment="libspice-client-glib-2_0-8-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555815" comment="libspice-client-glib-helper-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555816" comment="libspice-client-gtk-3_0-5-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555817" comment="libspice-controller0-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555818" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555819" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150726" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1173902" ref_url="https://bugzilla.suse.com/1173902" source="BUGZILLA"/>
		<reference ref_id="1173994" ref_url="https://bugzilla.suse.com/1173994" source="BUGZILLA"/>
		<reference ref_id="1177613" ref_url="https://bugzilla.suse.com/1177613" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<reference ref_id="CVE-2020-14383" ref_url="https://www.suse.com/security/cve/CVE-2020-14383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007673.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-14383: An authenticated user can crash the DCE/RPC DNS with easily crafted records (bsc#1177613).
- CVE-2020-14323: Unprivileged user can crash winbind (bsc#1173994).
- CVE-2020-14318: Missing permissions check in SMB1/2/3 ChangeNotify (bsc#1173902).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173902">SUSE bug 1173902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173994">SUSE bug 1173994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177613">SUSE bug 1177613</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14318">CVE-2020-14318 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14323">CVE-2020-14323 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14383/">CVE-2020-14383 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14383">CVE-2020-14383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555820" comment="libdcerpc-binding0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538678" comment="libdcerpc-binding0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555821" comment="libdcerpc0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538680" comment="libdcerpc0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555822" comment="libndr-krb5pac0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538682" comment="libndr-krb5pac0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555823" comment="libndr-nbt0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538684" comment="libndr-nbt0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555824" comment="libndr-standard0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538686" comment="libndr-standard0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555825" comment="libndr0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538688" comment="libndr0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555826" comment="libnetapi0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538690" comment="libnetapi0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555827" comment="libsamba-credentials0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538692" comment="libsamba-credentials0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555828" comment="libsamba-errors0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538694" comment="libsamba-errors0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555829" comment="libsamba-hostconfig0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538696" comment="libsamba-hostconfig0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555830" comment="libsamba-passdb0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538698" comment="libsamba-passdb0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555831" comment="libsamba-util0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538700" comment="libsamba-util0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555832" comment="libsamdb0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538702" comment="libsamdb0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555833" comment="libsmbclient0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538704" comment="libsmbclient0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555834" comment="libsmbconf0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538706" comment="libsmbconf0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555835" comment="libsmbldap0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538708" comment="libsmbldap0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555836" comment="libtevent-util0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538710" comment="libtevent-util0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555837" comment="libwbclient0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538712" comment="libwbclient0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555838" comment="samba-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555839" comment="samba-client-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538715" comment="samba-client-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538716" comment="samba-doc-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555840" comment="samba-libs-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538718" comment="samba-libs-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555841" comment="samba-winbind-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538720" comment="samba-winbind-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150727" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1174955" ref_url="https://bugzilla.suse.com/1174955" source="BUGZILLA"/>
		<reference ref_id="1177155" ref_url="https://bugzilla.suse.com/1177155" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15708" ref_url="https://www.suse.com/security/cve/CVE-2020-15708/" source="CVE"/>
		<reference ref_id="CVE-2020-25637" ref_url="https://www.suse.com/security/cve/CVE-2020-25637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007670.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

CVE-2020-15708: Added a note to libvirtd.conf about polkit auth in SUSE distros (bsc#1174955).
CVE-2020-25637: Fixed a double free in qemuAgentGetInterfaces() (bsc#1177155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174955">SUSE bug 1174955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177155">SUSE bug 1177155</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15708/">CVE-2020-15708 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15708">CVE-2020-15708 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25637/">CVE-2020-25637 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25637">CVE-2020-25637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555842" comment="libvirt-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555843" comment="libvirt-admin-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555844" comment="libvirt-client-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555845" comment="libvirt-daemon-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555846" comment="libvirt-daemon-config-network-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555847" comment="libvirt-daemon-config-nwfilter-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555848" comment="libvirt-daemon-driver-interface-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538728" comment="libvirt-daemon-driver-libxl-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555849" comment="libvirt-daemon-driver-lxc-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555850" comment="libvirt-daemon-driver-network-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555851" comment="libvirt-daemon-driver-nodedev-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555852" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555853" comment="libvirt-daemon-driver-qemu-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555854" comment="libvirt-daemon-driver-secret-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555855" comment="libvirt-daemon-driver-storage-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555856" comment="libvirt-daemon-driver-storage-core-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555857" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555858" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555859" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555860" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538741" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555861" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555862" comment="libvirt-daemon-hooks-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555863" comment="libvirt-daemon-lxc-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555864" comment="libvirt-daemon-qemu-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538746" comment="libvirt-daemon-xen-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555865" comment="libvirt-doc-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555866" comment="libvirt-libs-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555867" comment="libvirt-lock-sanlock-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555868" comment="libvirt-nss-3.3.0-5.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150728" version="1" class="patch">
	<metadata>
		<title>Security update for sane-backends (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1172524" ref_url="https://bugzilla.suse.com/1172524" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<reference ref_id="CVE-2020-12861" ref_url="https://www.suse.com/security/cve/CVE-2020-12861/" source="CVE"/>
		<reference ref_id="CVE-2020-12862" ref_url="https://www.suse.com/security/cve/CVE-2020-12862/" source="CVE"/>
		<reference ref_id="CVE-2020-12863" ref_url="https://www.suse.com/security/cve/CVE-2020-12863/" source="CVE"/>
		<reference ref_id="CVE-2020-12864" ref_url="https://www.suse.com/security/cve/CVE-2020-12864/" source="CVE"/>
		<reference ref_id="CVE-2020-12865" ref_url="https://www.suse.com/security/cve/CVE-2020-12865/" source="CVE"/>
		<reference ref_id="CVE-2020-12866" ref_url="https://www.suse.com/security/cve/CVE-2020-12866/" source="CVE"/>
		<reference ref_id="CVE-2020-12867" ref_url="https://www.suse.com/security/cve/CVE-2020-12867/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<description>
This update for sane-backends fixes the following issues:

- sane-backends version upgrade to 1.0.31:
  * sane-backends version upgrade to 1.0.30
    fixes memory corruption bugs CVE-2020-12861, CVE-2020-12862,
    CVE-2020-12863, CVE-2020-12864, CVE-2020-12865,
    CVE-2020-12866, CVE-2020-12867 (bsc#1172524)
  * sane-backends version upgrade to 1.0.31
    to further improve hardware enablement for scanner devices
    (jsc#SLE-15561 and jsc#SLE-15560 with jsc#ECO-2418)
  * The new escl backend cannot be provided for SLE12 because
    it requires more additional software (avahi-client, libcurl,
    and libpoppler-glib-devel) where in particular for libcurl
    the one that is in SLE12 (via libcurl-devel-7.37.0) is likely
    too old because with that building the escl backend fails with
    'escl/escl.c:1267:34: error: 'CURLOPT_UNIX_SOCKET_PATH'
    undeclared curl_easy_setopt(handle, CURLOPT_UNIX_SOCKET_PATH'
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6318">CVE-2017-6318 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12861/">CVE-2020-12861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12861">CVE-2020-12861 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12862/">CVE-2020-12862 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12862">CVE-2020-12862 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12863/">CVE-2020-12863 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12863">CVE-2020-12863 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12864/">CVE-2020-12864 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12864">CVE-2020-12864 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12865/">CVE-2020-12865 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12865">CVE-2020-12865 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12866/">CVE-2020-12866 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12866">CVE-2020-12866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12867/">CVE-2020-12867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12867">CVE-2020-12867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531452" comment="sane-backends-1.0.31-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150729" version="1" class="patch">
	<metadata>
		<title>Security update for apache-commons-httpclient (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1178171" ref_url="https://bugzilla.suse.com/1178171" source="BUGZILLA"/>
		<reference ref_id="945190" ref_url="https://bugzilla.suse.com/945190" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3577" ref_url="https://www.suse.com/security/cve/CVE-2014-3577/" source="CVE"/>
		<reference ref_id="CVE-2015-5262" ref_url="https://www.suse.com/security/cve/CVE-2015-5262/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007689.html" source="SUSE-SU"/>
		<description>
This update for apache-commons-httpclient fixes the following issues:

- http/conn/ssl/SSLConnectionSocketFactory.java ignores the
  http.socket.timeout configuration setting during an SSL handshake,
  which allows remote attackers to cause a denial of service (HTTPS
  call hang) via unspecified vectors. [bsc#945190, CVE-2015-5262]
- org.apache.http.conn.ssl.AbstractVerifier does not properly
  verify that the server hostname matches a domain name in the
  subject's Common Name (CN) or subjectAltName field of the X.509
  certificate, which allows MITM attackers to spoof SSL servers
  via a 'CN=' string in a field in the distinguished name (DN)
  of a certificate. [bsc#1178171, CVE-2014-3577]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-04"/>
	<updated date="2020-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178171">SUSE bug 1178171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945190">SUSE bug 945190</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3577/">CVE-2014-3577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3577">CVE-2014-3577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5262/">CVE-2015-5262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5262">CVE-2015-5262 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531477" comment="apache-commons-httpclient-3.1-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150730" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1118597" ref_url="https://bugzilla.suse.com/1118597" source="BUGZILLA"/>
		<reference ref_id="1130246" ref_url="https://bugzilla.suse.com/1130246" source="BUGZILLA"/>
		<reference ref_id="1161167" ref_url="https://bugzilla.suse.com/1161167" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19870" ref_url="https://www.suse.com/security/cve/CVE-2018-19870/" source="CVE"/>
		<reference ref_id="CVE-2018-19872" ref_url="https://www.suse.com/security/cve/CVE-2018-19872/" source="CVE"/>
		<reference ref_id="CVE-2020-0569" ref_url="https://www.suse.com/security/cve/CVE-2020-0569/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006448.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

Security issues fixed:	  

- CVE-2020-0569: Fixed a potential local code execution by loading plugins from CWD (bsc#1161167).
- CVE-2018-19870: Fixed an improper check in QImage allocation which could allow Denial of Service
  when opening crafted gif files (bsc#1118597).
- CVE-2018-19872: Fixed an issue which could allow a division by zero leading to crash (bsc#1130246).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-04"/>
	<updated date="2020-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118597">SUSE bug 1118597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130246">SUSE bug 1130246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161167">SUSE bug 1161167</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19870/">CVE-2018-19870 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19870">CVE-2018-19870 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19872/">CVE-2018-19872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19872">CVE-2018-19872 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0569/">CVE-2020-0569 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0569">CVE-2020-0569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522604" comment="libQt5Concurrent5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522605" comment="libQt5Core5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522606" comment="libQt5DBus5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522607" comment="libQt5Gui5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522608" comment="libQt5Network5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522609" comment="libQt5OpenGL5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522610" comment="libQt5PrintSupport5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522611" comment="libQt5Sql5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522612" comment="libQt5Sql5-mysql-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522613" comment="libQt5Sql5-postgresql-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522614" comment="libQt5Sql5-sqlite-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522615" comment="libQt5Sql5-unixODBC-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522616" comment="libQt5Test5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522617" comment="libQt5Widgets5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522618" comment="libQt5Xml5-5.6.2-6.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150731" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Fix regression '8250861: Crash in MinINode::Ideal(PhaseGVN*, bool)',
  introduced in October 2020 CPU.

- Update to version jdk8u272 (icedtea 3.17.0) (July 2020 CPU,
  bsc#1174157, and October 2020 CPU, bsc#1177943)
  * New features
    + JDK-8245468: Add TLSv1.3 implementation classes from 11.0.7
    + PR3796: Allow the number of curves supported to be specified
  * Security fixes
    + JDK-8028431, CVE-2020-14579: NullPointerException in
      DerValue.equals(DerValue)
    + JDK-8028591, CVE-2020-14578: NegativeArraySizeException in
      sun.security.util.DerInputStream.getUnalignedBitString()
    + JDK-8230613: Better ASCII conversions
    + JDK-8231800: Better listing of arrays
    + JDK-8232014: Expand DTD support
    + JDK-8233255: Better Swing Buttons
    + JDK-8233624: Enhance JNI linkage
    + JDK-8234032: Improve basic calendar services
    + JDK-8234042: Better factory production of certificates
    + JDK-8234418: Better parsing with CertificateFactory
    + JDK-8234836: Improve serialization handling
    + JDK-8236191: Enhance OID processing
    + JDK-8236196: Improve string pooling
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237117, CVE-2020-14556: Better ForkJoinPool behavior
    + JDK-8237592, CVE-2020-14577: Enhance certificate verification
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8238002, CVE-2020-14581: Better matrix operations
    + JDK-8238804: Enhance key handling process
    + JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    + JDK-8238843: Enhanced font handing
    + JDK-8238920, CVE-2020-14583: Better Buffer support
    + JDK-8238925: Enhance WAV file playback
    + JDK-8240119, CVE-2020-14593: Less Affine Transformations
    + JDK-8240124: Better VM Interning
    + JDK-8240482: Improved WAV file playback
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8241379: Update JCEKS support
    + JDK-8241522: Manifest improved jar headers redux
    + JDK-8242136, CVE-2020-14621: Better XML namespace handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Import of OpenJDK 8 u262 build 01
    + JDK-4949105: Access Bridge lacks html tags parsing
    + JDK-8003209: JFR events for network utilization
    + JDK-8030680: 292 cleanup from default method code assessment
    + JDK-8035633: TEST_BUG: java/net/NetworkInterface/Equals.java
      and some tests failed on windows intermittently
    + JDK-8041626: Shutdown tracing event
    + JDK-8141056: Erroneous assignment in HeapRegionSet.cpp
    + JDK-8149338: JVM Crash caused by Marlin renderer not handling
       NaN coordinates
    + JDK-8151582: (ch) test java/nio/channels/
      /AsyncCloseAndInterrupt.java failing due to 'Connection
      succeeded'
    + JDK-8165675: Trace event for thread park has incorrect unit
       for timeout
    + JDK-8176182: 4 security tests are not run
    + JDK-8178910: Problemlist sample tests
    + JDK-8183925: Decouple crash protection from watcher thread
    + JDK-8191393: Random crashes during cfree+0x1c
    + JDK-8195817: JFR.stop should require name of recording
    + JDK-8195818: JFR.start should increase autogenerated name by
       one
    + JDK-8195819: Remove recording=x from jcmd JFR.check output
    + JDK-8199712: Flight Recorder
    + JDK-8202578: Revisit location for class unload events
    + JDK-8202835: jfr/event/os/TestSystemProcess.java fails on
      missing events
    + JDK-8203287: Zero fails to build after JDK-8199712 (Flight
      Recorder)
    + JDK-8203346: JFR: Inconsistent signature of
      jfr_add_string_constant
    + JDK-8203664: JFR start failure after AppCDS archive created
      with JFR StartFlightRecording
    + JDK-8203921: JFR thread sampling is missing fixes from
      JDK-8194552
    + JDK-8203929: Limit amount of data for JFR.dump
    + JDK-8205516: JFR tool
    + JDK-8207392: [PPC64] Implement JFR profiling
    + JDK-8207829: FlightRecorderMXBeanImpl is leaking the first
      classloader which calls it
    + JDK-8209960: -Xlog:jfr* doesn't work with the JFR
    + JDK-8210024: JFR calls virtual is_Java_thread from ~Thread()
    + JDK-8210776: Upgrade X Window System 6.8.2 to the latest XWD
      1.0.7
    + JDK-8211239: Build fails without JFR: empty JFR events
      signatures mismatch
    + JDK-8212232: Wrong metadata for the configuration of the
      cutoff for old object sample events
    + JDK-8213015: Inconsistent settings between JFR.configure and
      -XX:FlightRecorderOptions
    + JDK-8213421: Line number information for execution samples
      always 0
    + JDK-8213617: JFR should record the PID of the recorded process
    + JDK-8213734: SAXParser.parse(File, ..) does not close
      resources when Exception occurs.
    + JDK-8213914: [TESTBUG] Several JFR VM events are not covered
      by tests
    + JDK-8213917: [TESTBUG] Shutdown JFR event is not covered by
      test
    + JDK-8213966: The ZGC JFR events should be marked as
      experimental
    + JDK-8214542: JFR: Old Object Sample event slow on a deep heap
      in debug builds
    + JDK-8214750: Unnecessary &lt;p&gt; tags in jfr classes
    + JDK-8214896: JFR Tool left files behind
    + JDK-8214906: [TESTBUG] jfr/event/sampling/TestNative.java
      fails with UnsatisfiedLinkError
    + JDK-8214925: JFR tool fails to execute
    + JDK-8215175: Inconsistencies in JFR event metadata
    + JDK-8215237: jdk.jfr.Recording javadoc does not compile
    + JDK-8215284: Reduce noise induced by periodic task
      getFileSize()
    + JDK-8215355: Object monitor deadlock with no threads holding
      the monitor (using jemalloc 5.1)
    + JDK-8215362: JFR GTest JfrTestNetworkUtilization fails
    + JDK-8215771: The jfr tool should pretty print reference chains
    + JDK-8216064: -XX:StartFlightRecording:settings= doesn't work
      properly
    + JDK-8216486: Possibility of integer overflow in
      JfrThreadSampler::run()
    + JDK-8216528: test/jdk/java/rmi/transport/
       /runtimeThreadInheritanceLeak/
       /RuntimeThreadInheritanceLeak.java failing with Xcomp
    + JDK-8216559: [JFR] Native libraries not correctly parsed from
      /proc/self/maps
    + JDK-8216578: Remove unused/obsolete method in JFR code
    + JDK-8216995: Clean up JFR command line processing
    + JDK-8217744: [TESTBUG] JFR TestShutdownEvent fails on some
      systems due to process surviving SIGINT
    + JDK-8217748: [TESTBUG] Exclude TestSig test case from JFR
      TestShutdownEvent
    + JDK-8218935: Make jfr strncpy uses GCC 8.x friendly
    + JDK-8223147: JFR Backport
    + JDK-8223689: Add JFR Thread Sampling Support
    + JDK-8223690: Add JFR BiasedLock Event Support
    + JDK-8223691: Add JFR G1 Region Type Change Event Support
    + JDK-8223692: Add JFR G1 Heap Summary Event Support
    + JDK-8224172: assert(jfr_is_event_enabled(id)) failed:
      invariant
    + JDK-8224475: JTextPane does not show images in HTML rendering
    + JDK-8226253: JAWS reports wrong number of radio buttons when
      buttons are hidden.
    + JDK-8226779: [TESTBUG] Test JFR API from Java agent
    + JDK-8226892: ActionListeners on JRadioButtons don't get
      notified when selection is changed with arrow keys
    + JDK-8227011: Starting a JFR recording in response to JVMTI
      VMInit and / or Java agent premain corrupts memory
    + JDK-8227605: Kitchensink fails 'assert((((klass)-&gt;trace_id()
      &amp; (JfrTraceIdEpoch::leakp_in_use_this_epoch_bit())) != 0))
      failed: invariant'
    + JDK-8229366: JFR backport allows unchecked writing to memory
    + JDK-8229401: Fix JFR code cache test failures
    + JDK-8229708: JFR backport code does not initialize
    + JDK-8229873: 8229401 broke jdk8u-jfr-incubator
    + JDK-8230448: [test] JFRSecurityTestSuite.java is failing on
      Windows
    + JDK-8230707: JFR related tests are failing
    + JDK-8230782: Robot.createScreenCapture() fails if
      'awt.robot.gtk' is set to false
    + JDK-8230856: Java_java_net_NetworkInterface_getByName0 on
       unix misses ReleaseStringUTFChars in early return
    + JDK-8230947: TestLookForUntestedEvents.java is failing after
      JDK-8230707
    + JDK-8231995: two jtreg tests failed after 8229366 is fixed
    + JDK-8233623: Add classpath exception to copyright in
      EventHandlerProxyCreator.java file
    + JDK-8236002: CSR for JFR backport suggests not leaving out
      the package-info
    + JDK-8236008: Some backup files were accidentally left in the
      hotspot tree
    + JDK-8236074: Missed package-info
    + JDK-8236174: Should update javadoc since tags
    + JDK-8238076: Fix OpenJDK 7 Bootstrap Broken by JFR Backport
    + JDK-8238452: Keytool generates wrong expiration date if
      validity is set to 2050/01/01
    + JDK-8238555: Allow Initialization of SunPKCS11 with NSS when
      there are external FIPS modules in the NSSDB
    + JDK-8238589: Necessary code cleanup in JFR for JDK8u
    + JDK-8238590: Enable JFR by default during compilation in 8u
    + JDK-8239055: Wrong implementation of VMState.hasListener
    + JDK-8239476: JDK-8238589 broke windows build by moving
      OrderedPair
    + JDK-8239479: minimal1 and zero builds are failing
    + JDK-8239867: correct over use of INCLUDE_JFR macro
    + JDK-8240375: Disable JFR by default for July 2020 release
    + JDK-8241444: Metaspace::_class_vsm not initialized if
      compressed class pointers are disabled
    + JDK-8241902: AIX Build broken after integration of
      JDK-8223147 (JFR Backport)
    + JDK-8242788: Non-PCH build is broken after JDK-8191393
  * Import of OpenJDK 8 u262 build 02
    + JDK-8130737: AffineTransformOp can't handle child raster with
      non-zero x-offset
    + JDK-8172559: [PIT][TEST_BUG] Move @test to be 1st annotation
      in java/awt/image/Raster/TestChildRasterOp.java
    + JDK-8230926: [macosx] Two apostrophes are entered instead of
      one with 'U.S. International - PC' layout
    + JDK-8240576: JVM crashes after transformation in C2
      IdealLoopTree::merge_many_backedges
    + JDK-8242883: Incomplete backport of JDK-8078268: backport
      test part
  * Import of OpenJDK 8 u262 build 03
    + JDK-8037866: Replace the Fun class in tests with lambdas
    + JDK-8146612: C2: Precedence edges specification violated
    + JDK-8150986: serviceability/sa/jmap-hprof/
       /JMapHProfLargeHeapTest.java failing because expects HPROF
      JAVA PROFILE 1.0.1 file format
    + JDK-8229888: (zipfs) Updating an existing zip file does not
      preserve original permissions
    + JDK-8230597: Update GIFlib library to the 5.2.1
    + JDK-8230769: BufImg_SetupICM add
      ReleasePrimitiveArrayCritical call in early return
    + JDK-8233880, PR3798: Support compilers with multi-digit major
      version numbers
    + JDK-8239852: java/util/concurrent tests fail with
      -XX:+VerifyGraphEdges: assert(!VerifyGraphEdges) failed:
      verification should have failed
    + JDK-8241638: launcher time metrics always report 1 on Linux
      when _JAVA_LAUNCHER_DEBUG set
    + JDK-8243059: Build fails when --with-vendor-name contains a
      comma
    + JDK-8243474: [TESTBUG] removed three tests of 0 bytes
    + JDK-8244461: [JDK 8u] Build fails with glibc 2.32
    + JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion()
      returns wrong result
  * Import of OpenJDK 8 u262 build 04
    + JDK-8067796: (process) Process.waitFor(timeout, unit) doesn't
      throw NPE if timeout is less than, or equal to zero when unit
      == null
    + JDK-8148886: SEGV in sun.java2d.marlin.Renderer._endRendering
    + JDK-8171934:
      ObjectSizeCalculator.getEffectiveMemoryLayoutSpecification()
      does not recognize OpenJDK's HotSpot VM
    + JDK-8196969: JTreg Failure:
      serviceability/sa/ClhsdbJstack.java causes NPE
    + JDK-8243539: Copyright info (Year) should be updated for fix
      of 8241638
    + JDK-8244777: ClassLoaderStats VM Op uses constant hash value
  * Import of OpenJDK 8 u262 build 05
    + JDK-7147060: com/sun/org/apache/xml/internal/security/
      /transforms/ClassLoaderTest.java doesn't run in agentvm mode
    + JDK-8178374: Problematic ByteBuffer handling in
      CipherSpi.bufferCrypt method
    + JDK-8181841: A TSA server returns timestamp with precision
      higher than milliseconds
    + JDK-8227269: Slow class loading when running with JDWP
    + JDK-8229899: Make java.io.File.isInvalid() less racy
    + JDK-8236996: Incorrect Roboto font rendering on Windows with
      subpixel antialiasing
    + JDK-8241750: x86_32 build failure after JDK-8227269
    + JDK-8244407: JVM crashes after transformation in C2
      IdealLoopTree::split_fall_in
    + JDK-8244843: JapanEraNameCompatTest fails
  * Import of OpenJDK 8 u262 build 06
    + JDK-8246223: Windows build fails after JDK-8227269
  * Import of OpenJDK 8 u262 build 07
    + JDK-8233197: Invert JvmtiExport::post_vm_initialized() and
      Jfr:on_vm_start() start-up order for correct option parsing
    + JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a
    + JDK-8245167: Top package in method profiling shows null in JMC
    + JDK-8246703: [TESTBUG] Add test for JDK-8233197
  * Import of OpenJDK 8 u262 build 08
    + JDK-8220293: Deadlock in JFR string pool
    + JDK-8225068: Remove DocuSign root certificate that is
      expiring in May 2020
    + JDK-8225069: Remove Comodo root certificate that is expiring
      in May 2020
  * Import of OpenJDK 8 u262 build 09
    + JDK-8248399: Build installs jfr binary when JFR is disabled
  * Import of OpenJDK 8 u262 build 10
    + JDK-8248715: New JavaTimeSupplementary localisation for 'in'
      installed in wrong package
  * Import of OpenJDK 8 u265 build 01
    + JDK-8249677: Regression in 8u after JDK-8237117: Better
      ForkJoinPool behavior
    + JDK-8250546: Expect changed behaviour reported in JDK-8249846
  * Import of OpenJDK 8 u272 build 01
    + JDK-8006205: [TESTBUG] NEED_TEST: please JTREGIFY
      test/compiler/7177917/Test7177917.java
    + JDK-8035493: JVMTI PopFrame capability must instruct
      compilers not to prune locals
    + JDK-8036088: Replace strtok() with its safe equivalent
      strtok_s() in DefaultProxySelector.c
    + JDK-8039082: [TEST_BUG] Test java/awt/dnd/
      /BadSerializationTest/BadSerializationTest.java fails
    + JDK-8075774: Small readability and performance improvements
      for zipfs
    + JDK-8132206: move ScanTest.java into OpenJDK
    + JDK-8132376: Add @requires os.family to the client tests with
      access to internal OS-specific API
    + JDK-8132745: minor cleanup of java/util/Scanner/ScanTest.java
    + JDK-8137087: [TEST_BUG] Cygwin failure of java/awt/
      /appletviewer/IOExceptionIfEncodedURLTest/
      /IOExceptionIfEncodedURLTest.sh
    + JDK-8145808: java/awt/Graphics2D/MTGraphicsAccessTest/
      /MTGraphicsAccessTest.java hangs on Win. 8
    + JDK-8151788: NullPointerException from ntlm.Client.type3
    + JDK-8151834: Test SmallPrimeExponentP.java times out
      intermittently
    + JDK-8153430: jdk regression test MletParserLocaleTest,
      ParserInfiniteLoopTest reduce default timeout
    + JDK-8153583: Make OutputAnalyzer.reportDiagnosticSummary
      public
    + JDK-8156169: Some sound tests rarely hangs because of
      incorrect synchronization
    + JDK-8165936: Potential Heap buffer overflow when seaching
      timezone info files
    + JDK-8166148: Fix for JDK-8165936 broke solaris builds
    + JDK-8167300: Scheduling failures during gcm should be fatal
    + JDK-8167615: Opensource unit/regression tests for JavaSound
    + JDK-8172012: [TEST_BUG] delays needed in
      javax/swing/JTree/4633594/bug4633594.java
    + JDK-8177628: Opensource unit/regression tests for ImageIO
    + JDK-8183341: Better cleanup for javax/imageio/AllowSearch.java
    + JDK-8183351: Better cleanup for jdk/test/javax/imageio/spi/
      /AppletContextTest/BadPluginConfigurationTest.sh
    + JDK-8193137: Nashorn crashes when given an empty script file
    + JDK-8194298: Add support for per Socket configuration of TCP
      keepalive
    + JDK-8198004: javax/swing/JFileChooser/6868611/bug6868611.java
      throws error
    + JDK-8200313: java/awt/Gtk/GtkVersionTest/GtkVersionTest.java
      fails
    + JDK-8210147: adjust some WSAGetLastError usages in windows
      network coding
    + JDK-8211714: Need to update vm_version.cpp to recognise
      VS2017 minor versions
    + JDK-8214862: assert(proj != __null) at compile.cpp:3251
    + JDK-8217606: LdapContext#reconnect always opens a new
      connection
    + JDK-8217647: JFR: recordings on 32-bit systems unreadable
    + JDK-8226697: Several tests which need the @key headful
      keyword are missing it.
    + JDK-8229378: jdwp library loader in linker_md.c quietly
      truncates on buffer overflow
    + JDK-8230303: JDB hangs when running monitor command
    + JDK-8230711: ConnectionGraph::unique_java_object(Node* N)
      return NULL if n is not in the CG
    + JDK-8234617: C1: Incorrect result of field load due to
      missing narrowing conversion
    + JDK-8235243: handle VS2017 15.9 and VS2019 in
      abstract_vm_version
    + JDK-8235325: build failure on Linux after 8235243
    + JDK-8235687: Contents/MacOS/libjli.dylib cannot be a symlink
    + JDK-8237951: CTW: C2 compilation fails with 'malformed
      control flow'
    + JDK-8238225: Issues reported after replacing symlink at
      Contents/MacOS/libjli.dylib with binary
    + JDK-8239385: KerberosTicket client name refers wrongly to
      sAMAccountName in AD
    + JDK-8239819: XToolkit: Misread of screen information memory
    + JDK-8240295: hs_err elapsed time in seconds is not accurate
      enough
    + JDK-8241888: Mirror jdk.security.allowNonCaAnchor system
      property with a security one
    + JDK-8242498: Invalid 'sun.awt.TimedWindowEvent' object leads
      to JVM crash
    + JDK-8243489: Thread CPU Load event may contain wrong data for
      CPU time under certain conditions
    + JDK-8244818: Java2D Queue Flusher crash while moving
      application window to external monitor
    + JDK-8246310: Clean commented-out code about ModuleEntry
      and PackageEntry in JFR
    + JDK-8246384: Enable JFR by default on supported architectures
      for October 2020 release
    + JDK-8248643: Remove extra leading space in JDK-8240295 8u
      backport
    + JDK-8249610: Make
      sun.security.krb5.Config.getBooleanObject(String... keys)
      method public
  * Import of OpenJDK 8 u272 build 02
    + JDK-8023697: failed class resolution reports different class
      name in detail message for the first and subsequent times
    + JDK-8025886: replace [[ and == bash extensions in regtest
    + JDK-8046274: Removing dependency on jakarta-regexp
    + JDK-8048933: -XX:+TraceExceptions output should include the
      message
    + JDK-8076151: [TESTBUG] Test java/awt/FontClass/CreateFont/
      /fileaccess/FontFile.java fails
    + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'
      treated by JVM as an equivalent
    + JDK-8154313: Generated javadoc scattered all over the place
    + JDK-8163251: Hard coded loop limit prevents reading of smart
      card data greater than 8k
    + JDK-8173300: [TESTBUG]compiler/tiered/NonTieredLevelsTest.java
      fails with compiler.whitebox.SimpleTestCaseHelper(int) must be
      compiled
    + JDK-8183349: Better cleanup for jdk/test/javax/imageio/
      /plugins/shared/CanWriteSequence.java and WriteAfterAbort.java
    + JDK-8191678: [TESTBUG] Add keyword headful in java/awt
      FocusTransitionTest test.
    + JDK-8201633: Problems with AES-GCM native acceleration
    + JDK-8211049: Second parameter of 'initialize' method is not
          used
    + JDK-8219566: JFR did not collect call stacks when
      MaxJavaStackTraceDepth is set to zero
    + JDK-8220165: Encryption using GCM results in
      RuntimeException- input length out of bound
    + JDK-8220555: JFR tool shows potentially misleading message
      when it cannot access a file
    + JDK-8224217: RecordingInfo should use textual representation
      of path
    + JDK-8231779: crash
      HeapWord*ParallelScavengeHeap::failed_mem_allocate
    + JDK-8238380, PR3798: java.base/unix/native/libjava/childproc.c
      'multiple definition' link errors with GCC10
    + JDK-8238386, PR3798: (sctp) jdk.sctp/unix/native/libsctp/
      /SctpNet.c 'multiple definition' link errors with GCC10
    + JDK-8238388, PR3798: libj2gss/NativeFunc.o 'multiple
      definition' link errors with GCC10
    + JDK-8242556: Cannot load RSASSA-PSS public key with non-null
      params from byte array
    + JDK-8250755: Better cleanup for jdk/test/javax/imageio/
      /plugins/shared/CanWriteSequence.java
  * Import of OpenJDK 8 u272 build 03
    + JDK-6574989: TEST_BUG:
      javax/sound/sampled/Clip/bug5070081.java fails sometimes
    + JDK-8148754: C2 loop unrolling fails due to unexpected graph
      shape
    + JDK-8192953: sun/management/jmxremote/bootstrap/*.sh tests
      fail with error : revokeall.exe: Permission denied
    + JDK-8203357: Container Metrics
    + JDK-8209113: Use WeakReference for lastFontStrike for created
      Fonts
    + JDK-8216283: Allow shorter method sampling interval than 10 ms
    + JDK-8221569: JFR tool produces incorrect output when both
      --categories and --events are specified
    + JDK-8233097: Fontmetrics for large Fonts has zero width
    + JDK-8248851: CMS: Missing memory fences between free chunk
      check and klass read
    + JDK-8250875: Incorrect parameter type for update_number in
      JDK_Version::jdk_update
  * Import of OpenJDK 8 u272 build 04
    + JDK-8061616: HotspotDiagnosticMXBean.getVMOption() throws
      IllegalArgumentException for flags of type double
    + JDK-8177334: Update xmldsig implementation to Apache
      Santuario 2.1.1
    + JDK-8217878: ENVELOPING XML signature no longer works in JDK
      11
    + JDK-8218629: XML Digital Signature throws NAMESPACE_ERR
      exception on OpenJDK 11, works 8/9/10
    + JDK-8243138: Enhance BaseLdapServer to support starttls
      extended request
  * Import of OpenJDK 8 u272 build 05
    + JDK-8026236: Add PrimeTest for BigInteger
    + JDK-8057003: Large reference arrays cause extremely long
      synchronization times
    + JDK-8060721: Test runtime/SharedArchiveFile/
      /LimitSharedSizes.java fails in jdk 9 fcs new
      platforms/compiler
    + JDK-8152077: (cal) Calendar.roll does not always roll the
      hours during daylight savings
    + JDK-8168517: java/lang/ProcessBuilder/Basic.java failed
    + JDK-8211163: UNIX version of Java_java_io_Console_echo does
      not return a clean boolean
    + JDK-8220674: [TESTBUG] MetricsMemoryTester failcount test in
      docker container only works with debug JVMs
    + JDK-8231213: Migrate SimpleDateFormatConstTest to JDK Repo
    + JDK-8236645: JDK 8u231 introduces a regression with
      incompatible handling of XML messages
    + JDK-8240676: Meet not symmetric failure when running lucene
      on jdk8
    + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA
      program
    + JDK-8249158: THREAD_START and THREAD_END event posted in
      primordial phase
    + JDK-8250627: Use -XX:+/-UseContainerSupport for
      enabling/disabling Java container metrics
    + JDK-8251546: 8u backport of JDK-8194298 breaks AIX and
      Solaris builds
    + JDK-8252084: Minimal VM fails to bootcycle: undefined symbol:
      AgeTableTracer::is_tenuring_distribution_event_enabled
  * Import of OpenJDK 8 u272 build 06
    + JDK-8064319: Need to enable -XX:+TraceExceptions in release
      builds
    + JDK-8080462, PR3801: Update SunPKCS11 provider with PKCS11
      v2.40 support
    + JDK-8160768: Add capability to custom resolve host/domain
      names within the default JNDI LDAP provider
    + JDK-8161973: PKIXRevocationChecker.getSoftFailExceptions()
      not working
    + JDK-8169925, PR3801: PKCS #11 Cryptographic Token Interface
      license
    + JDK-8184762: ZapStackSegments should use optimized memset
    + JDK-8193234: When using -Xcheck:jni an internally allocated
      buffer can leak
    + JDK-8219919: RuntimeStub name lost with
      PrintFrameConverterAssembly
    + JDK-8220313: [TESTBUG] Update base image for Docker testing
      to OL 7.6
    + JDK-8222079: Don't use memset to initialize fields decode_env
      constructor in disassembler.cpp
    + JDK-8225695: 32-bit build failures after JDK-8080462 (Update
      SunPKCS11 provider with PKCS11 v2.40 support)
    + JDK-8226575: OperatingSystemMXBean should be made container
      aware
    + JDK-8226809: Circular reference in printed stack trace is not
      correctly indented &amp; ambiguous
    + JDK-8228835: Memory leak in PKCS11 provider when using AES GCM
    + JDK-8233621: Mismatch in jsse.enableMFLNExtension property
      name
    + JDK-8238898, PR3801: Missing hash characters for header on
      license file
    + JDK-8243320: Add SSL root certificates to Oracle Root CA
      program
    + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest
      release 1.8.26
    + JDK-8245467: Remove 8u TLSv1.2 implementation files
    + JDK-8245469: Remove DTLS protocol implementation
    + JDK-8245470: Fix JDK8 compatibility issues
    + JDK-8245471: Revert JDK-8148188
    + JDK-8245472: Backport JDK-8038893 to JDK8
    + JDK-8245473: OCSP stapling support
    + JDK-8245474: Add TLS_KRB5 cipher suites support according to
      RFC-2712
    + JDK-8245476: Disable TLSv1.3 protocol in the ClientHello
      message by default
    + JDK-8245477: Adjust TLS tests location
    + JDK-8245653: Remove 8u TLS tests
    + JDK-8245681: Add TLSv1.3 regression test from 11.0.7
    + JDK-8251117: Cannot check P11Key size in P11Cipher and
      P11AEADCipher
    + JDK-8251120, PR3793: [8u] HotSpot build assumes ENABLE_JFR is
      set to either true or false
    + JDK-8251341: Minimal Java specification change
    + JDK-8251478: Backport TLSv1.3 regression tests to JDK8u
  * Import of OpenJDK 8 u272 build 07
    + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ
  * Import of OpenJDK 8 u272 build 08
    + JDK-8062947: Fix exception message to correctly represent
      LDAP connection failure
    + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed
      due to timeout on DeadServerNoTimeoutTest is incorrect
    + JDK-8252573: 8u: Windows build failed after 8222079 backport
  * Import of OpenJDK 8 u272 build 09
    + JDK-8252886: [TESTBUG] sun/security/ec/TestEC.java :
      Compilation failed
  * Import of OpenJDK 8 u272 build 10
    + JDK-8254673: Call to JvmtiExport::post_vm_start() was removed
      by the fix for JDK-8249158
    + JDK-8254937: Revert JDK-8148854 for 8u272
  * Backports
    + JDK-8038723, PR3806: Openup some PrinterJob tests
    + JDK-8041480, PR3806: ArrayIndexOutOfBoundsException when
      JTable contains certain string
    + JDK-8058779, PR3805: Faster implementation of
      String.replace(CharSequence, CharSequence)
    + JDK-8130125, PR3806: [TEST_BUG] add @modules to the several
      client tests unaffected by the automated bulk update
    + JDK-8144015, PR3806: [PIT] failures of text layout font tests
    + JDK-8144023, PR3806: [PIT] failure of text measurements in
      javax/swing/text/html/parser/Parser/6836089/bug6836089.java
    + JDK-8144240, PR3806: [macosx][PIT] AIOOB in
      closed/javax/swing/text/GlyphPainter2/6427244/bug6427244.java
    + JDK-8145542, PR3806: The case failed automatically and thrown
      java.lang.ArrayIndexOutOfBoundsException exception
    + JDK-8151725, PR3806: [macosx] ArrayIndexOOB exception when
      displaying Devanagari text in JEditorPane
    + JDK-8152358, PR3800: code and comment cleanups found during
      the hunt for 8077392
    + JDK-8152545, PR3804: Use preprocessor instead of compiling a
      program to generate native nio constants
    + JDK-8152680, PR3806: Regression in
      GlyphVector.getGlyphCharIndex behaviour
    + JDK-8158924, PR3806: Incorrect i18n text document layout
    + JDK-8166003, PR3806: [PIT][TEST_BUG] missing helper for
      javax/swing/text/GlyphPainter2/6427244/bug6427244.java
    + JDK-8166068, PR3806: test/java/awt/font/GlyphVector/
      /GetGlyphCharIndexTest.java does not compile
    + JDK-8169879, PR3806: [TEST_BUG] javax/swing/text/
      /GlyphPainter2/6427244/bug6427244.java - compilation failed
    + JDK-8191512, PR3806: T2K font rasterizer code removal
    + JDK-8191522, PR3806: Remove Bigelow&amp;Holmes Lucida fonts from
      JDK sources
    + JDK-8236512, PR3801: PKCS11 Connection closed after
      Cipher.doFinal and NoPadding
    + JDK-8254177, PR3809: (tz) Upgrade time-zone data to
      tzdata2020b
  * Bug fixes
    + PR3798: Fix format-overflow error on GCC 10, caused by
      passing NULL to a '%s' directive
    + PR3795: ECDSAUtils for XML digital signatures should support
      the same curve set as the rest of the JDK
    + PR3799: Adapt elliptic curve patches to JDK-8245468: Add
      TLSv1.3 implementation classes from 11.0.7
    + PR3808: IcedTea does not install the JFR *.jfc files
    + PR3810: Enable JFR on x86 (32-bit) now that JDK-8252096 has
      fixed its use with Shenandoah
    + PR3811: Don't attempt to install JFR files when JFR is
      disabled
  * Shenandoah
    + [backport] 8221435: Shenandoah should not mark through weak
      roots
    + [backport] 8221629: Shenandoah: Cleanup class unloading logic
    + [backport] 8222992: Shenandoah: Pre-evacuate all roots
    + [backport] 8223215: Shenandoah: Support verifying subset of
      roots
    + [backport] 8223774: Shenandoah: Refactor
      ShenandoahRootProcessor and family
    + [backport] 8224210: Shenandoah: Refactor
      ShenandoahRootScanner to support scanning CSet codecache roots
    + [backport] 8224508: Shenandoah: Need to update thread roots
      in final mark for piggyback ref update cycle
    + [backport] 8224579: ResourceMark not declared in
      shenandoahRootProcessor.inline.hpp with
      --disable-precompiled-headers
    + [backport] 8224679: Shenandoah: Make
      ShenandoahParallelCodeCacheIterator noncopyable
    + [backport] 8224751: Shenandoah: Shenandoah Verifier should
      select proper roots according to current GC cycle
    + [backport] 8225014: Separate ShenandoahRootScanner method for
      object_iterate
    + [backport] 8225216: gc/logging/TestMetaSpaceLog.java doesn't
      work for Shenandoah
    + [backport] 8225573: Shenandoah: Enhance ShenandoahVerifier to
      ensure roots to-space invariant
    + [backport] 8225590: Shenandoah: Refactor
      ShenandoahClassLoaderDataRoots API
    + [backport] 8226413: Shenandoah: Separate root scanner for
      SH::object_iterate()
    + [backport] 8230853: Shenandoah: replace leftover
      assert(is_in(...)) with rich asserts
    + [backport] 8231198: Shenandoah: heap walking should visit all
      roots most of the time
    + [backport] 8231244: Shenandoah: all-roots heap walking misses
      some weak roots
    + [backport] 8237632: Shenandoah: accept NULL fwdptr to
      cooperate with JVMTI and JFR
    + [backport] 8239786: Shenandoah: print per-cycle statistics
    + [backport] 8239926: Shenandoah: Shenandoah needs to mark
      nmethod's metadata
    + [backport] 8240671: Shenandoah: refactor
      ShenandoahPhaseTimings
    + [backport] 8240749: Shenandoah: refactor ShenandoahUtils
    + [backport] 8240750: Shenandoah: remove leftover files and
      mentions of ShenandoahAllocTracker
    + [backport] 8240868: Shenandoah: remove CM-with-UR
      piggybacking cycles
    + [backport] 8240872: Shenandoah: Avoid updating new regions
      from start of evacuation
    + [backport] 8240873: Shenandoah: Short-cut arraycopy barriers
    + [backport] 8240915: Shenandoah: Remove unused fields in init
      mark tasks
    + [backport] 8240948: Shenandoah: cleanup not-forwarded-objects
      paths after JDK-8240868
    + [backport] 8241007: Shenandoah: remove
      ShenandoahCriticalControlThreadPriority support
    + [backport] 8241062: Shenandoah: rich asserts trigger 'empty
      statement' inspection
    + [backport] 8241081: Shenandoah: Do not modify
      update-watermark concurrently
    + [backport] 8241093: Shenandoah: editorial changes in flag
      descriptions
    + [backport] 8241139: Shenandoah: distribute mark-compact work
      exactly to minimize fragmentation
    + [backport] 8241142: Shenandoah: should not use parallel
      reference processing with single GC thread
    + [backport] 8241351: Shenandoah: fragmentation metrics overhaul
    + [backport] 8241435: Shenandoah: avoid disabling pacing with
      'aggressive'
    + [backport] 8241520: Shenandoah: simplify region sequence
      numbers handling
    + [backport] 8241534: Shenandoah: region status should include
      update watermark
    + [backport] 8241574: Shenandoah: remove
      ShenandoahAssertToSpaceClosure
    + [backport] 8241583: Shenandoah: turn heap lock asserts into
      macros
    + [backport] 8241668: Shenandoah: make ShenandoahHeapRegion not
      derive from ContiguousSpace
    + [backport] 8241673: Shenandoah: refactor anti-false-sharing
      padding
    + [backport] 8241675: Shenandoah: assert(n-&gt;outcnt() &gt; 0) at
      shenandoahSupport.cpp:2858 with
      java/util/Collections/FindSubList.java
    + [backport] 8241692: Shenandoah: remove
      ShenandoahHeapRegion::_reserved
    + [backport] 8241700: Shenandoah: Fold
      ShenandoahKeepAliveBarrier flag into ShenandoahSATBBarrier
    + [backport] 8241740: Shenandoah: remove
      ShenandoahHeapRegion::_heap
    + [backport] 8241743: Shenandoah: refactor and inline
      ShenandoahHeap::heap()
    + [backport] 8241748: Shenandoah: inline MarkingContext TAMS
      methods
    + [backport] 8241838: Shenandoah: no need to trash cset during
      final mark
    + [backport] 8241841: Shenandoah: ditch one of allocation type
      counters in ShenandoahHeapRegion
    + [backport] 8241842: Shenandoah: inline
      ShenandoahHeapRegion::region_number
    + [backport] 8241844: Shenandoah: rename
      ShenandoahHeapRegion::region_number
    + [backport] 8241845: Shenandoah: align ShenandoahHeapRegions
      to cache lines
    + [backport] 8241926: Shenandoah: only print heap changes for
      operations that directly affect it
    + [backport] 8241983: Shenandoah: simplify FreeSet logging
    + [backport] 8241985: Shenandoah: simplify collectable garbage
      logging
    + [backport] 8242040: Shenandoah: print allocation failure type
    + [backport] 8242041: Shenandoah: adaptive heuristics should
      account evac reserve in free target
    + [backport] 8242042: Shenandoah: tune down
      ShenandoahGarbageThreshold
    + [backport] 8242054: Shenandoah: New incremental-update mode
    + [backport] 8242075: Shenandoah: rename
      ShenandoahHeapRegionSize flag
    + [backport] 8242082: Shenandoah: Purge Traversal mode
    + [backport] 8242083: Shenandoah: split 'Prepare Evacuation'
      tracking into cset/freeset counters
    + [backport] 8242089: Shenandoah: per-worker stats should be
      summed up, not averaged
    + [backport] 8242101: Shenandoah: coalesce and parallelise heap
      region walks during the pauses
    + [backport] 8242114: Shenandoah: remove
      ShenandoahHeapRegion::reset_alloc_metadata_to_shared
    + [backport] 8242130: Shenandoah: Simplify arraycopy-barrier
      dispatching
    + [backport] 8242211: Shenandoah: remove
      ShenandoahHeuristics::RegionData::_seqnum_last_alloc
    + [backport] 8242212: Shenandoah: initialize
      ShenandoahHeuristics::_region_data eagerly
    + [backport] 8242213: Shenandoah: remove
      ShenandoahHeuristics::_bytes_in_cset
    + [backport] 8242217: Shenandoah: Enable GC mode to be
      diagnostic/experimental and have a name
    + [backport] 8242227: Shenandoah: transit regions to cset state
      when adding to collection set
    + [backport] 8242228: Shenandoah: remove unused
      ShenandoahCollectionSet methods
    + [backport] 8242229: Shenandoah: inline ShenandoahHeapRegion
      liveness-related methods
    + [backport] 8242267: Shenandoah: regions space needs to be
      aligned by os::vm_allocation_granularity()
    + [backport] 8242271: Shenandoah: add test to verify GC mode
      unlock
    + [backport] 8242273: Shenandoah: accept either SATB or IU
      barriers, but not both
    + [backport] 8242301: Shenandoah: Inline LRB runtime call
    + [backport] 8242316: Shenandoah: Turn NULL-check into assert
      in SATB slow-path entry
    + [backport] 8242353: Shenandoah: micro-optimize region
      liveness handling
    + [backport] 8242365: Shenandoah: use uint16_t instead of
      jushort for liveness cache
    + [backport] 8242375: Shenandoah: Remove
      ShenandoahHeuristic::record_gc_start/end methods
    + [backport] 8242641: Shenandoah: clear live data and update
      TAMS optimistically
    + [backport] 8243238: Shenandoah: explicit GC request should
      wait for a complete GC cycle
    + [backport] 8243301: Shenandoah: ditch
      ShenandoahAllowMixedAllocs
    + [backport] 8243307: Shenandoah: remove
      ShCollectionSet::live_data
    + [backport] 8243395: Shenandoah: demote guarantee in
      ShenandoahPhaseTimings::record_workers_end
    + [backport] 8243463: Shenandoah: ditch total_pause counters
    + [backport] 8243464: Shenandoah: print statistic counters in
      time order
    + [backport] 8243465: Shenandoah: ditch unused pause_other,
      conc_other counters
    + [backport] 8243487: Shenandoah: make _num_phases illegal
      phase type
    + [backport] 8243494: Shenandoah: set counters once per cycle
    + [backport] 8243573: Shenandoah: rename GCParPhases and
      related code
    + [backport] 8243848: Shenandoah: Windows build fails after
      JDK-8239786
    + [backport] 8244180: Shenandoah: carry Phase to
      ShWorkerTimingsTracker explicitly
    + [backport] 8244200: Shenandoah: build breakages after
      JDK-8241743
    + [backport] 8244226: Shenandoah: per-cycle statistics contain
      worker data from previous cycles
    + [backport] 8244326: Shenandoah: global statistics should not
      accept bogus samples
    + [backport] 8244509: Shenandoah: refactor
      ShenandoahBarrierC2Support::test_* methods
    + [backport] 8244551: Shenandoah: Fix racy update of
      update_watermark
    + [backport] 8244667: Shenandoah: SBC2Support::test_gc_state
      takes loop for wrong control
    + [backport] 8244730: Shenandoah: gc/shenandoah/options/
      /TestHeuristicsUnlock.java should only verify the heuristics
    + [backport] 8244732: Shenandoah: move heuristics code to
      gc/shenandoah/heuristics
    + [backport] 8244737: Shenandoah: move mode code to
      gc/shenandoah/mode
    + [backport] 8244739: Shenandoah: break superclass dependency
      on ShenandoahNormalMode
    + [backport] 8244740: Shenandoah: rename ShenandoahNormalMode
      to ShenandoahSATBMode
    + [backport] 8245461: Shenandoah: refine mode name()-s
    + [backport] 8245463: Shenandoah: refine ShenandoahPhaseTimings
      constructor arguments
    + [backport] 8245464: Shenandoah: allocate collection set
      bitmap at lower addresses
    + [backport] 8245465: Shenandoah: test_in_cset can use more
      efficient encoding
    + [backport] 8245726: Shenandoah: lift/cleanup
      ShenandoahHeuristics names and properties
    + [backport] 8245754: Shenandoah: ditch ShenandoahAlwaysPreTouch
    + [backport] 8245757: Shenandoah: AlwaysPreTouch should not
      disable heap resizing or uncommits
    + [backport] 8245773: Shenandoah: Windows assertion failure
      after JDK-8245464
    + [backport] 8245812: Shenandoah: compute root phase parallelism
    + [backport] 8245814: Shenandoah: reconsider format specifiers
      for stats
    + [backport] 8245825: Shenandoah: Remove diagnostic flag
      ShenandoahConcurrentScanCodeRoots
    + [backport] 8246162: Shenandoah: full GC does not mark code
      roots when class unloading is off
    + [backport] 8247310: Shenandoah: pacer should not affect
      interrupt status
    + [backport] 8247358: Shenandoah: reconsider free budget slice
      for marking
    + [backport] 8247367: Shenandoah: pacer should wait on lock
      instead of exponential backoff
    + [backport] 8247474: Shenandoah: Windows build warning after
      JDK-8247310
    + [backport] 8247560: Shenandoah: heap iteration holds root
      locks all the time
    + [backport] 8247593: Shenandoah: should not block pacing
      reporters
    + [backport] 8247751: Shenandoah: options tests should run with
      smaller heaps
    + [backport] 8247754: Shenandoah: mxbeans tests can be shorter
    + [backport] 8247757: Shenandoah: split heavy tests by
      heuristics to improve parallelism
    + [backport] 8247860: Shenandoah: add update watermark line in
      rich assert failure message
    + [backport] 8248041: Shenandoah: pre-Full GC root updates may
      miss some roots
    + [backport] 8248652: Shenandoah: SATB buffer handling may
      assume no forwarded objects
    + [backport] 8249560: Shenandoah: Fix racy GC request handling
    + [backport] 8249649: Shenandoah: provide per-cycle pacing stats
    + [backport] 8249801: Shenandoah: Clear soft-refs on requested
      GC cycle
    + [backport] 8249953: Shenandoah: gc/shenandoah/mxbeans tests
      should account for corner cases
    + Fix slowdebug build after JDK-8230853 backport
    + JDK-8252096: Shenandoah: adjust SerialPageShiftCount for
      x86_32 and JFR
    + JDK-8252366: Shenandoah: revert/cleanup changes in
      graphKit.cpp
    + Shenandoah: add JFR roots to root processor after JFR
      integration
    + Shenandoah: add root statistics for string dedup table/queues
    + Shenandoah: enable low-frequency STW class unloading
    + Shenandoah: fix build failures after JDK-8244737 backport
    + Shenandoah: Fix build failure with +JFR -PCH
    + Shenandoah: fix forceful pacer claim
    + Shenandoah: fix formats in
      ShenandoahStringSymbolTableUnlinkTask
    + Shenandoah: fix runtime linking failure due to non-compiled
      shenandoahBarrierSetC1
    + Shenandoah: hook statistics printing to PrintGCDetails, not
      PrintGC
    + Shenandoah: JNI weak roots are always cleared before Full GC
      mark
    + Shenandoah: missing SystemDictionary roots in
      ShenandoahHeapIterationRootScanner
    + Shenandoah: move barrier sets to their proper locations
    + Shenandoah: move parallelCleaning.* to shenandoah/
    + Shenandoah: pacer should use proper Atomics for intptr_t
    + Shenandoah: properly deallocates class loader metadata
    + Shenandoah: specialize String Table scans for better pause
      performance
    + Shenandoah: Zero build fails after recent Atomic cleanup in
      Pacer
  * AArch64 port
    + JDK-8161072, PR3797: AArch64: jtreg
      compiler/uncommontrap/TestDeoptOOM failure
    + JDK-8171537, PR3797: aarch64: compiler/c1/Test6849574.java
      generates guarantee failure in C1
    + JDK-8183925, PR3797: [AArch64] Decouple crash protection from
      watcher thread
    + JDK-8199712, PR3797: [AArch64] Flight Recorder
    + JDK-8203481, PR3797: Incorrect constraint for unextended_sp
      in frame:safe_for_sender
    + JDK-8203699, PR3797: java/lang/invoke/SpecialInterfaceCall
      fails with SIGILL on aarch64
    + JDK-8209413, PR3797: AArch64: NPE in clhsdb jstack command
    + JDK-8215961, PR3797: jdk/jfr/event/os/TestCPUInformation.java
      fails on AArch64
    + JDK-8216989, PR3797:
      CardTableBarrierSetAssembler::gen_write_ref_array_post_barrier()
      does not check for zero length on AARCH64
    + JDK-8217368, PR3797: AArch64: C2 recursive stack locking
      optimisation not triggered
    + JDK-8221658, PR3797: aarch64: add necessary predicate for
      ubfx patterns
    + JDK-8237512, PR3797: AArch64: aarch64TestHook leaks a
      BufferBlob
    + JDK-8246482, PR3797: Build failures with +JFR -PCH
    + JDK-8247979, PR3797: aarch64: missing side effect of killing
      flags for clearArray_reg_reg
    + JDK-8248219, PR3797: aarch64: missing memory barrier in
      fast_storefield and fast_accessfield

- Ignore whitespaces after the header or footer in PEM X.509 cert
  (bsc#1171352)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531493" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531494" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531495" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531496" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150732" version="1" class="patch">
	<metadata>
		<title>Security update for gcc10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1172798" ref_url="https://bugzilla.suse.com/1172798" source="BUGZILLA"/>
		<reference ref_id="1172846" ref_url="https://bugzilla.suse.com/1172846" source="BUGZILLA"/>
		<reference ref_id="1173972" ref_url="https://bugzilla.suse.com/1173972" source="BUGZILLA"/>
		<reference ref_id="1174753" ref_url="https://bugzilla.suse.com/1174753" source="BUGZILLA"/>
		<reference ref_id="1174817" ref_url="https://bugzilla.suse.com/1174817" source="BUGZILLA"/>
		<reference ref_id="1175168" ref_url="https://bugzilla.suse.com/1175168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007739.html" source="SUSE-SU"/>
		<description>
This update for gcc10 fixes the following issues:
This update provides the GCC10 compiler suite and runtime libraries.

The base SUSE Linux Enterprise libraries libgcc_s1, libstdc++6 are replaced by
the gcc10 variants.

The new compiler variants are available with '-10' suffix, you can specify them
via:

        CC=gcc-10
        CXX=g++-10

or similar commands.

For a detailed changelog check out https://gcc.gnu.org/gcc-10/changes.html
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-10"/>
	<updated date="2020-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172798">SUSE bug 1172798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172846">SUSE bug 1172846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173972">SUSE bug 1173972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174753">SUSE bug 1174753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174817">SUSE bug 1174817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175168">SUSE bug 1175168</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13844">CVE-2020-13844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531497" comment="libasan6-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531498" comment="libasan6-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531499" comment="libatomic1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531500" comment="libatomic1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531501" comment="libgcc_s1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531502" comment="libgcc_s1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531503" comment="libgfortran5-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531504" comment="libgfortran5-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531505" comment="libgo16-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531506" comment="libgo16-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531507" comment="libgomp1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531508" comment="libgomp1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531509" comment="libitm1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531510" comment="libitm1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531511" comment="liblsan0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555869" comment="libobjc4-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531513" comment="libobjc4-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531514" comment="libquadmath0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531515" comment="libquadmath0-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531516" comment="libstdc++6-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531517" comment="libstdc++6-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531518" comment="libstdc++6-locale-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531519" comment="libstdc++6-pp-gcc10-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531520" comment="libstdc++6-pp-gcc10-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531521" comment="libtsan0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531522" comment="libubsan1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531523" comment="libubsan1-32bit-10.2.1+git583-1.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150733" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007757.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Intel CPU Microcode updated to 20201027 prerelease 
- CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) (bsc#1170446)
- CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)

# New Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  # Updated Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531524" comment="ucode-intel-20201027-13.76.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150734" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1106383" ref_url="https://bugzilla.suse.com/1106383" source="BUGZILLA"/>
		<reference ref_id="1133495" ref_url="https://bugzilla.suse.com/1133495" source="BUGZILLA"/>
		<reference ref_id="1139459" ref_url="https://bugzilla.suse.com/1139459" source="BUGZILLA"/>
		<reference ref_id="1151377" ref_url="https://bugzilla.suse.com/1151377" source="BUGZILLA"/>
		<reference ref_id="1151506" ref_url="https://bugzilla.suse.com/1151506" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1155574" ref_url="https://bugzilla.suse.com/1155574" source="BUGZILLA"/>
		<reference ref_id="1156482" ref_url="https://bugzilla.suse.com/1156482" source="BUGZILLA"/>
		<reference ref_id="1159814" ref_url="https://bugzilla.suse.com/1159814" source="BUGZILLA"/>
		<reference ref_id="1162108" ref_url="https://bugzilla.suse.com/1162108" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1712" ref_url="https://www.suse.com/security/cve/CVE-2020-1712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006452.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2020-1712 (bsc#bsc#1162108)
  Fix a heap use-after-free vulnerability, when asynchronous
  Polkit queries were performed while handling Dbus messages. A local
  unprivileged attacker could have abused this flaw to crash systemd services or
  potentially execute code and elevate their privileges, by sending specially
  crafted Dbus messages.

- Unconfirmed fix for prevent hanging of systemctl during restart. (bsc#1139459)
- Fix warnings thrown during package installation. (bsc#1154043)
- Fix for system-udevd prevent crash within OES2018. (bsc#1151506)
- Fragments of masked units ought not be considered for 'NeedDaemonReload'. (bsc#1156482)
- Wait for workers to finish when exiting. (bsc#1106383)
- Improve log message when inotify limit is reached. (bsc#1155574)
- Mention in the man pages that alias names are only effective after command 'systemctl enable'. (bsc#1151377)
- Introduce function for reading virtual files in 'sysfs' and 'procfs'. (bsc#1133495, bsc#1159814)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106383">SUSE bug 1106383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133495">SUSE bug 1133495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139459">SUSE bug 1139459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151377">SUSE bug 1151377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151506">SUSE bug 1151506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155574">SUSE bug 1155574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156482">SUSE bug 1156482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159814">SUSE bug 1159814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162108">SUSE bug 1162108</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1712/">CVE-2020-1712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1712">CVE-2020-1712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522619" comment="libsystemd0-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522620" comment="libsystemd0-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522621" comment="libudev1-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522622" comment="libudev1-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522623" comment="systemd-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522624" comment="systemd-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522625" comment="systemd-bash-completion-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522626" comment="systemd-sysvinit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522627" comment="udev-228-150.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150735" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.24 - OpenJDK 7u281 (October 2020 CPU, bsc#1177943)
  * Security fixes
    + JDK-8233624: Enhance JNI linkage
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8240124: Better VM Interning
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Import of OpenJDK 7 u281 build 1
    + JDK-8145096: Undefined behaviour in HotSpot
    + JDK-8215265: C2: range check elimination may allow illegal
      out of bound access
  * Backports
    + JDK-8250861, PR3812: Crash in MinINode::Ideal(PhaseGVN*, bool)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531526" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531527" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531528" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531529" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150736" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1178387" ref_url="https://bugzilla.suse.com/1178387" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007768.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25692">CVE-2020-25692 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531530" comment="libldap-2_4-2-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531531" comment="libldap-2_4-2-32bit-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531532" comment="openldap2-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531533" comment="openldap2-back-meta-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531534" comment="openldap2-client-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531535" comment="openldap2-doc-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531536" comment="openldap2-ppolicy-check-password-1.2-18.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150737" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1178588" ref_url="https://bugzilla.suse.com/1178588" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007779.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-49 (bsc#1178588)
  * CVE-2020-26950 (bmo#1675905)
    Write side effects in MCallGetProperty opcode not accounted
    for
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178588">SUSE bug 1178588</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26950">CVE-2020-26950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531537" comment="MozillaFirefox-78.4.1-112.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531538" comment="MozillaFirefox-devel-78.4.1-112.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531539" comment="MozillaFirefox-translations-common-78.4.1-112.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150738" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql96, postgresql10 and postgresql12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1171924" ref_url="https://bugzilla.suse.com/1171924" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007780.html" source="SUSE-SU"/>
		<description>


This update changes the internal packaging for postgresql, and so contains
all currently maintained postgresql versions across our SUSE Linux Enterprise 12
products.


* postgresql12 is shipped new in version 12.3 (bsc#1171924).

  The server and client packages only on SUSE Linux Enterprise Server 12 SP5,
  the libraries on SUSE Linux Enterprise Server 12 SP2 LTSS up to 12 SP5.

  + https://www.postgresql.org/about/news/2038/
  + https://www.postgresql.org/docs/12/release-12-3.html


* postgresql10 is updated to 10.13 (bsc#1171924).

  On SUSE Linux Enterprise Server 12 SP2 LTSS up to 12 SP5.

  +  https://www.postgresql.org/about/news/2038/
  +  https://www.postgresql.org/docs/10/release-10-13.html


* postgresql96 is updated to 9.6.18 (bsc#1171924):

  +  https://www.postgresql.org/about/news/2038/
  +  https://www.postgresql.org/docs/9.6/release-9-6-18.html

  On SUSE Linux Enterprise Server 12-SP2 and 12-SP3 LTSS only.

* postgresql 9.4 is updated to 9.4.26:

  +  https://www.postgresql.org/about/news/2011/
  +  https://www.postgresql.org/docs/9.4/release-9-4-26.html
  +  https://www.postgresql.org/about/news/1994/
  +  https://www.postgresql.org/docs/9.4/release-9-4-25.html

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171924">SUSE bug 1171924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531546" comment="libecpg6-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531547" comment="libpq5-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531548" comment="libpq5-32bit-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531549" comment="postgresql-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531550" comment="postgresql-contrib-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531551" comment="postgresql-docs-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531552" comment="postgresql-plperl-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531553" comment="postgresql-plpython-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531554" comment="postgresql-pltcl-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531555" comment="postgresql-server-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531556" comment="postgresql10-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531557" comment="postgresql10-contrib-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531558" comment="postgresql10-docs-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531559" comment="postgresql10-plperl-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531560" comment="postgresql10-plpython-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531561" comment="postgresql10-pltcl-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531562" comment="postgresql10-server-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531570" comment="postgresql96-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531571" comment="postgresql96-contrib-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531572" comment="postgresql96-docs-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531573" comment="postgresql96-plperl-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531574" comment="postgresql96-plpython-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531575" comment="postgresql96-pltcl-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531576" comment="postgresql96-server-9.6.19-6.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150739" version="1" class="patch">
	<metadata>
		<title>Security update for raptor (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1178593" ref_url="https://bugzilla.suse.com/1178593" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18926" ref_url="https://www.suse.com/security/cve/CVE-2017-18926/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007782.html" source="SUSE-SU"/>
		<description>
This update for raptor fixes the following issues:

- Fixed a heap overflow vulnerability (bsc#1178593, CVE-2017-18926).
- Update raptor to version 2.0.15
  * Made several fixes to Turtle / N-Triples family of parsers and serializers
  * Added utility functions for re-entrant sorting of objects and sequences.
  * Made other fixes and improvements including fixing reported issues:
    0000574, 0000575, 0000576, 0000577, 0000579, 0000581 and 0000584.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178593">SUSE bug 1178593</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18926/">CVE-2017-18926 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18926">CVE-2017-18926 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531577" comment="libraptor2-0-2.0.15-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150740" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1178671" ref_url="https://bugzilla.suse.com/1178671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12321" ref_url="https://www.suse.com/security/cve/CVE-2020-12321/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007786.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issue:

- CVE-2020-12321: Updated the Intel Bluetooth firmware for buffer overflow security bugs (bsc#1178671).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-17"/>
	<updated date="2020-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178671">SUSE bug 1178671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12321/">CVE-2020-12321 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12321">CVE-2020-12321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531578" comment="kernel-firmware-20170530-21.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531579" comment="ucode-amd-20170530-21.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150741" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1178512" ref_url="https://bugzilla.suse.com/1178512" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28196" ref_url="https://www.suse.com/security/cve/CVE-2020-28196/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007792.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following security issue:

- CVE-2020-28196: Fixed an unbounded recursion via an ASN.1-encoded Kerberos message (bsc#1178512).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178512">SUSE bug 1178512</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28196/">CVE-2020-28196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28196">CVE-2020-28196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531584" comment="krb5-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531585" comment="krb5-32bit-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531586" comment="krb5-client-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531587" comment="krb5-doc-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531588" comment="krb5-plugin-kdb-ldap-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531589" comment="krb5-plugin-preauth-otp-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531590" comment="krb5-plugin-preauth-pkinit-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531591" comment="krb5-server-1.12.5-40.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150742" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007828.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

Upgrade to version 10.15:

  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/10/release-10-15.html

Update to 10.14:

  * CVE-2020-14349, bsc#1175193: Set a secure search_path in
    logical replication walsenders and apply workers
  * CVE-2020-14350, bsc#1175194: Make contrib modules' installation
    scripts more secure.
  * https://www.postgresql.org/docs/10/release-10-14.html

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14349">CVE-2020-14349 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531592" comment="postgresql10-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531593" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531595" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531596" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531597" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531598" comment="postgresql10-server-10.15-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150743" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007833.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

Upgrade to version 9.6.20:

  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/9.6/release-9-6-20.html

Changes from 9.6.19:

  * CVE-2020-14350, bsc#1175194: Make contrib modules installation
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531599" comment="postgresql96-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531600" comment="postgresql96-contrib-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531601" comment="postgresql96-docs-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531602" comment="postgresql96-plperl-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531603" comment="postgresql96-plpython-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531604" comment="postgresql96-pltcl-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531605" comment="postgresql96-server-9.6.20-6.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150744" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1083244" ref_url="https://bugzilla.suse.com/1083244" source="BUGZILLA"/>
		<reference ref_id="1121826" ref_url="https://bugzilla.suse.com/1121826" source="BUGZILLA"/>
		<reference ref_id="1121872" ref_url="https://bugzilla.suse.com/1121872" source="BUGZILLA"/>
		<reference ref_id="1157298" ref_url="https://bugzilla.suse.com/1157298" source="BUGZILLA"/>
		<reference ref_id="1160917" ref_url="https://bugzilla.suse.com/1160917" source="BUGZILLA"/>
		<reference ref_id="1170415" ref_url="https://bugzilla.suse.com/1170415" source="BUGZILLA"/>
		<reference ref_id="1175228" ref_url="https://bugzilla.suse.com/1175228" source="BUGZILLA"/>
		<reference ref_id="1175306" ref_url="https://bugzilla.suse.com/1175306" source="BUGZILLA"/>
		<reference ref_id="1175721" ref_url="https://bugzilla.suse.com/1175721" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1176011" ref_url="https://bugzilla.suse.com/1176011" source="BUGZILLA"/>
		<reference ref_id="1176069" ref_url="https://bugzilla.suse.com/1176069" source="BUGZILLA"/>
		<reference ref_id="1176235" ref_url="https://bugzilla.suse.com/1176235" source="BUGZILLA"/>
		<reference ref_id="1176253" ref_url="https://bugzilla.suse.com/1176253" source="BUGZILLA"/>
		<reference ref_id="1176278" ref_url="https://bugzilla.suse.com/1176278" source="BUGZILLA"/>
		<reference ref_id="1176381" ref_url="https://bugzilla.suse.com/1176381" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176423" ref_url="https://bugzilla.suse.com/1176423" source="BUGZILLA"/>
		<reference ref_id="1176482" ref_url="https://bugzilla.suse.com/1176482" source="BUGZILLA"/>
		<reference ref_id="1176721" ref_url="https://bugzilla.suse.com/1176721" source="BUGZILLA"/>
		<reference ref_id="1176722" ref_url="https://bugzilla.suse.com/1176722" source="BUGZILLA"/>
		<reference ref_id="1176725" ref_url="https://bugzilla.suse.com/1176725" source="BUGZILLA"/>
		<reference ref_id="1176816" ref_url="https://bugzilla.suse.com/1176816" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176990" ref_url="https://bugzilla.suse.com/1176990" source="BUGZILLA"/>
		<reference ref_id="1177027" ref_url="https://bugzilla.suse.com/1177027" source="BUGZILLA"/>
		<reference ref_id="1177086" ref_url="https://bugzilla.suse.com/1177086" source="BUGZILLA"/>
		<reference ref_id="1177121" ref_url="https://bugzilla.suse.com/1177121" source="BUGZILLA"/>
		<reference ref_id="1177165" ref_url="https://bugzilla.suse.com/1177165" source="BUGZILLA"/>
		<reference ref_id="1177206" ref_url="https://bugzilla.suse.com/1177206" source="BUGZILLA"/>
		<reference ref_id="1177226" ref_url="https://bugzilla.suse.com/1177226" source="BUGZILLA"/>
		<reference ref_id="1177410" ref_url="https://bugzilla.suse.com/1177410" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177511" ref_url="https://bugzilla.suse.com/1177511" source="BUGZILLA"/>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="1177725" ref_url="https://bugzilla.suse.com/1177725" source="BUGZILLA"/>
		<reference ref_id="1177766" ref_url="https://bugzilla.suse.com/1177766" source="BUGZILLA"/>
		<reference ref_id="1177816" ref_url="https://bugzilla.suse.com/1177816" source="BUGZILLA"/>
		<reference ref_id="1178123" ref_url="https://bugzilla.suse.com/1178123" source="BUGZILLA"/>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178782" ref_url="https://bugzilla.suse.com/1178782" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18204" ref_url="https://www.suse.com/security/cve/CVE-2017-18204/" source="CVE"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-25641" ref_url="https://www.suse.com/security/cve/CVE-2020-25641/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bug fixes.


The following security bugs were fixed:

- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-25212: Fixed A TOCTOU mismatch in the NFS client code which could have been used by local attackers to corrupt memory (bsc#1176381).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).
- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2019-19063: Fixed two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c, which could have allowed an attacker to cause a denial of service (memory consumption) (bsc#1157298).
- CVE-2019-6133: In PolicyKit (aka polkit), the 'start time' protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c (bsc#1121872).
- CVE-2017-18204: Fixed a denial of service in the ocfs2_setattr function of fs/ocfs2/file.c (bnc#1083244).

The following non-security bugs were fixed:

- hv: vmbus: Add timeout to vmbus_wait_for_unload (bsc#1177816).
- hyperv_fb: disable superfluous VERSION_WIN10_V5 case (bsc#1175306).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1176816).
- net/packet: fix overflow in tpacket_rcv (bsc#1176069).
- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083244">SUSE bug 1083244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121872">SUSE bug 1121872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157298">SUSE bug 1157298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160917">SUSE bug 1160917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175228">SUSE bug 1175228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175306">SUSE bug 1175306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176011">SUSE bug 1176011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176253">SUSE bug 1176253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176721">SUSE bug 1176721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176725">SUSE bug 1176725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176816">SUSE bug 1176816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176990">SUSE bug 1176990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177027">SUSE bug 1177027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177086">SUSE bug 1177086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177121">SUSE bug 1177121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177165">SUSE bug 1177165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177226">SUSE bug 1177226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177410">SUSE bug 1177410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177725">SUSE bug 1177725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177816">SUSE bug 1177816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178782">SUSE bug 1178782</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18204/">CVE-2017-18204 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18204">CVE-2017-18204 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19063">CVE-2019-19063 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6133">CVE-2019-6133 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0404">CVE-2020-0404 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0427">CVE-2020-0427 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0432">CVE-2020-0432 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12352">CVE-2020-12352 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14351">CVE-2020-14351 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14390">CVE-2020-14390 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25284">CVE-2020-25284 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25641/">CVE-2020-25641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25641">CVE-2020-25641 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25643">CVE-2020-25643 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25656">CVE-2020-25656 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26088">CVE-2020-26088 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555870" comment="kernel-default-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555871" comment="kernel-default-base-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555872" comment="kernel-default-devel-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538784" comment="kernel-devel-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538785" comment="kernel-macros-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538786" comment="kernel-source-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555873" comment="kernel-syms-4.4.180-94.135.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150745" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173592" ref_url="https://bugzilla.suse.com/1173592" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="1178971" ref_url="https://bugzilla.suse.com/1178971" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated Intel CPU Microcode to 20201118 official release. (bsc#1178971)
 - Removed TGL/06-8c-01/80 due to functional issues with some OEM platforms.
 - CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) INTEL-SA-00389 (bsc#1170446)
 - CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)
 - CVE-2020-8696: Vector Register Sampling Active INTEL-SA-00381 (bsc#1173592)

- Release notes:
  - Security updates for [INTEL-SA-00381](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html).
  - Security updates for [INTEL-SA-00389](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html).
  - Update for functional issues. Refer to [Second Generation Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
  - Update for functional issues. Refer to [10th Gen Intel? Core™ Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
  - Update for functional issues. Refer to [8th and 9th Gen Intel? Core™ Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
  - Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel? Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
  - Update for functional issues. Refer to [6th Gen Intel? Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

  ### New Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | LKF            | B2/B3    | 06-8a-01/10 |          | 00000028 | Core w/Hybrid Technology
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  ### Updated Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173592">SUSE bug 1173592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178971">SUSE bug 1178971</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8696">CVE-2020-8696 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531614" comment="ucode-intel-20201118-13.81.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150746" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1166751" ref_url="https://bugzilla.suse.com/1166751" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0556" ref_url="https://www.suse.com/security/cve/CVE-2020-0556/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007858.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2020-0556: Fixed improper access control which may lead to escalation of privilege and denial of service by an unauthenticated user (bsc#1166751).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166751">SUSE bug 1166751</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-0556/">CVE-2020-0556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0556">CVE-2020-0556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531615" comment="bluez-5.13-5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531616" comment="libbluetooth3-5.13-5.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150747" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1178824" ref_url="https://bugzilla.suse.com/1178824" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.5.0 ESR (bsc#1178824)
  * CVE-2020-26951: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code
  * CVE-2020-16012: Variable time processing of cross-origin images during drawImage calls
  * CVE-2020-26953: Fullscreen could be enabled without displaying the security UI
  * CVE-2020-26956: XSS through paste (manual and clipboard API)
  * CVE-2020-26958: Requests intercepted through ServiceWorkers lacked MIME type restrictions
  * CVE-2020-26959: Use-after-free in WebRequestService
  * CVE-2020-26960: Potential use-after-free in uses of nsTArray
  * CVE-2020-15999: Heap buffer overflow in freetype
  * CVE-2020-26961: DoH did not filter IPv4 mapped IP Addresses
  * CVE-2020-26965: Software keyboards may have remembered typed passwords
  * CVE-2020-26966: Single-word search queries were also broadcast to local network
  * CVE-2020-26968: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-27"/>
	<updated date="2020-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16012">CVE-2020-16012 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26951">CVE-2020-26951 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26953">CVE-2020-26953 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26956">CVE-2020-26956 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26958">CVE-2020-26958 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26959">CVE-2020-26959 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26960">CVE-2020-26960 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26961">CVE-2020-26961 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26965">CVE-2020-26965 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26966">CVE-2020-26966 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26968">CVE-2020-26968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531617" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531618" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531619" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150748" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1178682" ref_url="https://bugzilla.suse.com/1178682" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007885.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2020-25708 [bsc#1178682], libvncserver/rfbserver.c has a divide by zero which could result in DoS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-27"/>
	<updated date="2020-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178682">SUSE bug 1178682</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25708">CVE-2020-25708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531620" comment="libvncclient0-0.9.9-17.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531621" comment="libvncserver0-0.9.9-17.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150749" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1174908" ref_url="https://bugzilla.suse.com/1174908" source="BUGZILLA"/>
		<reference ref_id="1177596" ref_url="https://bugzilla.suse.com/1177596" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007901.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to privilege escalation (bsc#1177596).
- CVE-2020-14360: Fixed an out of bounds memory accesses on too short request which could lead to denial of service (bsc#1174908).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14360">CVE-2020-14360 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25712">CVE-2020-25712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531622" comment="xorg-x11-server-7.6_1.18.3-76.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531623" comment="xorg-x11-server-extra-7.6_1.18.3-76.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150750" version="1" class="patch">
	<metadata>
		<title>Security update for python-setuptools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007907.html" source="SUSE-SU"/>
		<description>
This update for python-setuptools fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009524556" comment="python-setuptools-40.6.2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525277" comment="python3-setuptools-40.6.2-4.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150751" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007903.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531624" comment="libpython3_4m1_0-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531625" comment="python3-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531626" comment="python3-base-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531627" comment="python3-curses-3.4.10-25.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150752" version="1" class="patch">
	<metadata>
		<title>Security update for gdm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1178150" ref_url="https://bugzilla.suse.com/1178150" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16125" ref_url="https://www.suse.com/security/cve/CVE-2020-16125/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007912.html" source="SUSE-SU"/>
		<description>
This update for gdm fixes the following issues:

- CVE-2020-16125: Fixed a privilege escalation (bsc#1178150).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178150">SUSE bug 1178150</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16125/">CVE-2020-16125 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16125">CVE-2020-16125 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531629" comment="gdm-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531630" comment="gdm-lang-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531631" comment="gdmflexiserver-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531632" comment="libgdm1-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531633" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150753" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1178168" ref_url="https://bugzilla.suse.com/1178168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007919.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-25659: Attempted to mitigate Bleichenbacher attacks on RSA decryption (bsc#1178168).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178168">SUSE bug 1178168</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25659">CVE-2020-25659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531634" comment="python-cryptography-2.1.4-7.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531635" comment="python3-cryptography-2.1.4-7.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150754" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<description>

This update for postgresql12 fixes the following issues:

Upgrade to version 12.5:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/12/release-12-5.html

The previous postgresql12 update already addressed:

Update to 12.4:

* CVE-2020-14349, bsc#1175193: Set a secure search_path in logical replication walsenders and apply workers
* CVE-2020-14350, bsc#1175194: Make contrib modules' installation scripts more secure.

* https://www.postgresql.org/docs/12/release-12-4.html

  		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14349">CVE-2020-14349 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531636" comment="libecpg6-12.5-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531637" comment="libpq5-12.5-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531638" comment="libpq5-32bit-12.5-3.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150755" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1177409" ref_url="https://bugzilla.suse.com/1177409" source="BUGZILLA"/>
		<reference ref_id="1177412" ref_url="https://bugzilla.suse.com/1177412" source="BUGZILLA"/>
		<reference ref_id="1177413" ref_url="https://bugzilla.suse.com/1177413" source="BUGZILLA"/>
		<reference ref_id="1177414" ref_url="https://bugzilla.suse.com/1177414" source="BUGZILLA"/>
		<reference ref_id="1178591" ref_url="https://bugzilla.suse.com/1178591" source="BUGZILLA"/>
		<reference ref_id="1178963" ref_url="https://bugzilla.suse.com/1178963" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674/" source="CVE"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1178963 - stack corruption from XSA-346 change (XSA-355) 
- bsc#1177409 - CVE-2020-27674: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286)
- bsc#1177412 - CVE-2020-27672: Race condition in Xen mapping code (XSA-345)
- bsc#1177413 - CVE-2020-27671: undue deferral of IOMMU TLB flushes (XSA-346)
- bsc#1177414 - CVE-2020-27670: unsafe AMD IOMMU page table updates (XSA-347)
- bsc#1178591 - CVE-2020-28368: Intel RAPL sidechannel attack aka PLATYPUS attack aka XSA-351
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177413">SUSE bug 1177413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178963">SUSE bug 1178963</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27670">CVE-2020-27670 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27671">CVE-2020-27671 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27672">CVE-2020-27672 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27674">CVE-2020-27674 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28368">CVE-2020-28368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538789" comment="xen-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538790" comment="xen-doc-html-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538791" comment="xen-libs-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538792" comment="xen-libs-32bit-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538793" comment="xen-tools-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538794" comment="xen-tools-domU-4.9.4_14-3.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150756" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1179035" ref_url="https://bugzilla.suse.com/1179035" source="BUGZILLA"/>
		<reference ref_id="1179113" ref_url="https://bugzilla.suse.com/1179113" source="BUGZILLA"/>
		<reference ref_id="1179461" ref_url="https://bugzilla.suse.com/1179461" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007921.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- Find and display the content of messages properly. (bsc#1179461)
- CVE-2020-28896: incomplete connection termination could send credentials over unencrypted connections. (bsc#1179035)
- Avoid that message with a million tiny parts can freeze MUA for several minutes. (bsc#1179113)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179035">SUSE bug 1179035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179113">SUSE bug 1179113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179461">SUSE bug 1179461</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28896">CVE-2020-28896 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531639" comment="mutt-1.10.1-55.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150757" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1137832" ref_url="https://bugzilla.suse.com/1137832" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<description>
This update for dbus-1 fixes the following issues:
	  
Security issue fixed:     
    
- CVE-2019-12749: Fixed an implementation flaw in DBUS_COOKIE_SHA1 which 
  could have allowed local attackers to bypass authentication (bsc#1137832).   
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-18"/>
	<updated date="2020-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12749">CVE-2019-12749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522634" comment="dbus-1-1.8.22-29.17.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522635" comment="dbus-1-x11-1.8.22-29.17.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522636" comment="libdbus-1-3-1.8.22-29.17.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522637" comment="libdbus-1-3-32bit-1.8.22-29.17.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150758" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1179491" ref_url="https://bugzilla.suse.com/1179491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007976.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2020-1971: Fixed a null pointer dereference in EDIPARTYNAME (bsc#1179491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">CVE-2020-1971 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531646" comment="libopenssl-devel-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531647" comment="libopenssl1_0_0-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531648" comment="libopenssl1_0_0-32bit-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531649" comment="libopenssl1_0_0-hmac-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531650" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531651" comment="openssl-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531652" comment="openssl-doc-1.0.2j-60.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150759" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007975.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531653" comment="libpython2_7-1_0-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531654" comment="libpython2_7-1_0-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531655" comment="python-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531656" comment="python-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531657" comment="python-base-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531658" comment="python-base-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531659" comment="python-curses-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531660" comment="python-demo-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531661" comment="python-devel-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531662" comment="python-doc-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531663" comment="python-doc-pdf-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531664" comment="python-gdbm-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531665" comment="python-idle-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531666" comment="python-tk-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531667" comment="python-xml-2.7.17-28.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150760" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1161799" ref_url="https://bugzilla.suse.com/1161799" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.5.0 ESR
  * CVE-2020-6796 (bmo#1610426)
    Missing bounds check on shared memory read in the parent
    process
  * CVE-2020-6797 (bmo#1596668)
    Extensions granted downloads.open permission could open
    arbitrary applications on Mac OSX
  * CVE-2020-6798 (bmo#1602944)
    Incorrect parsing of template tag could result in JavaScript
    injection
  * CVE-2020-6799 (bmo#1606596)
    Arbitrary code execution when opening pdf links from other
    applications, when Firefox is configured as default pdf
    reader
  * CVE-2020-6800 (bmo#1595786, bmo#1596706, bmo#1598543,
    bmo#1604851, bmo#1605777, bmo#1608580, bmo#1608785)
    Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
  * Fixed: Fixed various issues opening files with spaces in
    their path (bmo#1601905, bmo#1602726)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-17"/>
	<updated date="2020-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161799">SUSE bug 1161799</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6796">CVE-2020-6796 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6797">CVE-2020-6797 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6798">CVE-2020-6798 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6799">CVE-2020-6799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6800">CVE-2020-6800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522638" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522639" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150761" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1180039" ref_url="https://bugzilla.suse.com/1180039" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2020-55 (bsc#1180039)
  * CVE-2020-16042 (bmo#1679003)
    Operations on a BigInt could have caused uninitialized memory
    to be exposed
  * CVE-2020-26971 (bmo#1663466)
    Heap buffer overflow in WebGL
  * CVE-2020-26973 (bmo#1680084)
    CSS Sanitizer performed incorrect sanitization
  * CVE-2020-26974 (bmo#1681022)
    Incorrect cast of StyleGenericFlexBasis resulted in a heap
    use-after-free
  * CVE-2020-26978 (bmo#1677047)
    Internal network hosts could have been probed by a malicious
    webpage
  * CVE-2020-35111 (bmo#1657916)
    The proxy.onRequest API did not catch view-source URLs
  * CVE-2020-35112 (bmo#1661365)
    Opening an extension-less download may have inadvertently
    launched an executable instead
  * CVE-2020-35113 (bmo#1664831, bmo#1673589)
    Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16042">CVE-2020-16042 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26971">CVE-2020-26971 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26973">CVE-2020-26973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26974">CVE-2020-26974 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26978">CVE-2020-26978 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35111">CVE-2020-35111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35112">CVE-2020-35112 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35113">CVE-2020-35113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531677" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531678" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531679" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150762" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1118459" ref_url="https://bugzilla.suse.com/1118459" source="BUGZILLA"/>
		<reference ref_id="1119353" ref_url="https://bugzilla.suse.com/1119353" source="BUGZILLA"/>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="1171981" ref_url="https://bugzilla.suse.com/1171981" source="BUGZILLA"/>
		<reference ref_id="1174250" ref_url="https://bugzilla.suse.com/1174250" source="BUGZILLA"/>
		<reference ref_id="1174255" ref_url="https://bugzilla.suse.com/1174255" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123/" source="CVE"/>
		<reference ref_id="CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327/" source="CVE"/>
		<reference ref_id="CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341/" source="CVE"/>
		<reference ref_id="CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350/" source="CVE"/>
		<reference ref_id="CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

clamav was updated to 0.103.0 to implement jsc#ECO-3010 and bsc#1118459.

* clamd can now reload the signature database without blocking
  scanning. This multi-threaded database reload improvement was made
  possible thanks to a community effort.
  - Non-blocking database reloads are now the default behavior. Some
    systems that are more constrained on RAM may need to disable
    non-blocking reloads as it will temporarily consume two times as
    much memory. We added a new clamd config option
    ConcurrentDatabaseReload, which may be set to no.
* Fix clamav-milter.service (requires clamd.service to run)
* bsc#1119353, clamav-fips.patch: Fix freshclam crash in FIPS mode.
* Partial sync with SLE15.

Update to version 0.102.4

Accumulated security fixes:

* CVE-2020-3350: Fix a vulnerability wherein a malicious user could
  replace a scan target's directory with a symlink to another path
  to trick clamscan, clamdscan, or clamonacc into removing or moving
  a different file (eg. a critical system file). The issue would
  affect users that use the --move or --remove options for clamscan,
  clamdscan, and clamonacc. (bsc#1174255)
* CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
  module in ClamAV 0.102.3 that could cause a Denial-of-Service
  (DoS) condition. Improper bounds checking results in an
  out-of-bounds read which could cause a crash. The previous fix for
  this CVE in 0.102.3 was incomplete. This fix correctly resolves
  the issue.
* CVE-2020-3481: Fix a vulnerability in the EGG archive module in
  ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)
  condition. Improper error handling may result in a crash due to a
  NULL pointer dereference. This vulnerability is mitigated for
  those using the official ClamAV signature databases because the
  file type signatures in daily.cvd will not enable the EGG archive
  parser in versions affected by the vulnerability. (bsc#1174250)
* CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
  ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
  condition. Improper size checking of a buffer used to initialize AES
  decryption routines results in an out-of-bounds read which may cause
  a crash. (bsc#1171981)
* CVE-2020-3123: A denial-of-service (DoS) condition may occur when
  using the optional credit card data-loss-prevention (DLP) feature.
  Improper bounds checking of an unsigned variable resulted in an
  out-of-bounds read, which causes a crash.
* CVE-2019-15961: A Denial-of-Service (DoS) vulnerability may
  occur when scanning a specially crafted email file as a result
  of excessively long scan times. The issue is resolved by
  implementing several maximums in parsing MIME messages and by
  optimizing use of memory allocation. (bsc#1157763).
* CVE-2019-12900: An out of bounds write in the NSIS bzip2
  (bsc#1149458)
* CVE-2019-12625: Introduce a configurable time limit to mitigate
  zip bomb vulnerability completely. Default is 2 minutes,
  configurable useing the clamscan --max-scantime and for clamd
  using the MaxScanTime config option (bsc#1144504)

Update to version 0.101.3:

* ZIP bomb causes extreme CPU spikes (bsc#1144504)

Update to version 0.101.2 (bsc#1118459):

* Support for RAR v5 archive extraction.
* Incompatible changes to the arguments of cl_scandesc,
  cl_scandesc_callback, and cl_scanmap_callback.
* Scanning options have been converted from a single flag
  bit-field into a structure of multiple categorized flag
  bit-fields.
* The CL_SCAN_HEURISTIC_ENCRYPTED scan option was replaced by
  2 new scan options: CL_SCAN_HEURISTIC_ENCRYPTED_ARCHIVE, and
  CL_SCAN_HEURISTIC_ENCRYPTED_DOC
* Incompatible clamd.conf and command line interface changes.
* Heuristic Alerts' (aka 'Algorithmic Detection') options have
  been changed to make the names more consistent. The original
  options are deprecated in 0.101, and will be removed in a
  future feature release.
* For details, see https://blog.clamav.net/2018/12/clamav-01010-has-been-released.html		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118459">SUSE bug 1118459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119353">SUSE bug 1119353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171981">SUSE bug 1171981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174255">SUSE bug 1174255</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15961">CVE-2019-15961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3123">CVE-2020-3123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3327">CVE-2020-3327 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3341">CVE-2020-3341 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3350">CVE-2020-3350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3481">CVE-2020-3481 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531686" comment="clamav-0.103.0-33.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150763" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1159635" ref_url="https://bugzilla.suse.com/1159635" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008123.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2019-19906: Fixed an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet (bsc#1159635).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-28"/>
	<updated date="2020-12-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159635">SUSE bug 1159635</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19906">CVE-2019-19906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531687" comment="cyrus-sasl-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531688" comment="cyrus-sasl-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531689" comment="cyrus-sasl-crammd5-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531690" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531691" comment="cyrus-sasl-digestmd5-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531692" comment="cyrus-sasl-gssapi-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531693" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531694" comment="cyrus-sasl-otp-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531695" comment="cyrus-sasl-otp-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531696" comment="cyrus-sasl-plain-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531697" comment="cyrus-sasl-plain-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531698" comment="libsasl2-3-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531699" comment="libsasl2-3-32bit-2.1.26-8.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150764" version="1" class="patch">
	<metadata>
		<title>Security update for gcc9 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1114592" ref_url="https://bugzilla.suse.com/1114592" source="BUGZILLA"/>
		<reference ref_id="1135254" ref_url="https://bugzilla.suse.com/1135254" source="BUGZILLA"/>
		<reference ref_id="1141897" ref_url="https://bugzilla.suse.com/1141897" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1142654" ref_url="https://bugzilla.suse.com/1142654" source="BUGZILLA"/>
		<reference ref_id="1148517" ref_url="https://bugzilla.suse.com/1148517" source="BUGZILLA"/>
		<reference ref_id="1149145" ref_url="https://bugzilla.suse.com/1149145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-15847" ref_url="https://www.suse.com/security/cve/CVE-2019-15847/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006488.html" source="SUSE-SU"/>
		<description>
This update for gcc9 fixes the following issues:

The GNU Compiler Collection is shipped in version 9.

A detailed changelog on what changed in GCC 9 is available at https://gcc.gnu.org/gcc-9/changes.html

The compilers have been added to the SUSE Linux Enterprise Toolchain Module.

To use these compilers, install e.g. gcc9, gcc9-c++ and build with CC=gcc-9
CXX=g++-9 set.


For SUSE Linux Enterprise base products, the libstdc++6, libgcc_s1 and
other compiler libraries have been switched from their gcc8 variants to
their gcc9 variants.

Security issues fixed:

- CVE-2019-15847: Fixed a miscompilation in the POWER9 back end, that optimized multiple calls of the __builtin_darn intrinsic into a single call. (bsc#1149145)
- CVE-2019-14250: Fixed a heap overflow in the LTO linker. (bsc#1142649)

Non-security issues fixed:

- Split out libstdc++ pretty-printers into a separate package supplementing gdb and the installed runtime. (bsc#1135254)
- Fixed miscompilation for vector shift on s390. (bsc#1141897)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-14"/>
	<updated date="2020-04-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114592">SUSE bug 1114592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135254">SUSE bug 1135254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141897">SUSE bug 1141897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142654">SUSE bug 1142654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148517">SUSE bug 1148517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149145">SUSE bug 1149145</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14250">CVE-2019-14250 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15847/">CVE-2019-15847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15847">CVE-2019-15847 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531700" comment="libasan5-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531701" comment="libasan5-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531702" comment="libatomic1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531703" comment="libatomic1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531704" comment="libgcc_s1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531705" comment="libgcc_s1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531706" comment="libgfortran5-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531707" comment="libgfortran5-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531708" comment="libgo14-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531709" comment="libgo14-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531710" comment="libgomp1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531711" comment="libgomp1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531712" comment="libitm1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531713" comment="libitm1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531714" comment="liblsan0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531715" comment="libquadmath0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531716" comment="libquadmath0-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531717" comment="libstdc++6-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531718" comment="libstdc++6-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531719" comment="libstdc++6-locale-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531720" comment="libtsan0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531721" comment="libubsan1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531722" comment="libubsan1-32bit-9.2.1+r275327-1.3.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150765" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1176782" ref_url="https://bugzilla.suse.com/1176782" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1179496" ref_url="https://bugzilla.suse.com/1179496" source="BUGZILLA"/>
		<reference ref_id="1179498" ref_url="https://bugzilla.suse.com/1179498" source="BUGZILLA"/>
		<reference ref_id="1179501" ref_url="https://bugzilla.suse.com/1179501" source="BUGZILLA"/>
		<reference ref_id="1179502" ref_url="https://bugzilla.suse.com/1179502" source="BUGZILLA"/>
		<reference ref_id="1179506" ref_url="https://bugzilla.suse.com/1179506" source="BUGZILLA"/>
		<reference ref_id="1179514" ref_url="https://bugzilla.suse.com/1179514" source="BUGZILLA"/>
		<reference ref_id="1179516" ref_url="https://bugzilla.suse.com/1179516" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480/" source="CVE"/>
		<reference ref_id="CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481/" source="CVE"/>
		<reference ref_id="CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483/" source="CVE"/>
		<reference ref_id="CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484/" source="CVE"/>
		<reference ref_id="CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566/" source="CVE"/>
		<reference ref_id="CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570/" source="CVE"/>
		<reference ref_id="CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-29480: Fixed an issue which could have allowed leak of non-sensitive data to administrator guests (bsc#117949 XSA-115).
- CVE-2020-29481: Fixed an issue which could have allowd to new domains to inherit existing node permissions (bsc#1179498 XSA-322). 
- CVE-2020-29483: Fixed an issue where guests could disturb domain cleanup (bsc#1179502 XSA-325).
- CVE-2020-29484: Fixed an issue where guests could crash xenstored via watchs (bsc#1179501 XSA-324). 
- CVE-2020-29566: Fixed an undue recursion in x86 HVM context switch code (bsc#1179506 XSA-348).
- CVE-2020-29570: Fixed an issue where FIFO event channels control block related ordering (bsc#1179514 XSA-358).
- CVE-2020-29571: Fixed an issue where FIFO event channels control structure ordering (bsc#1179516 XSA-359).
- CVE-2020-29130: Fixed an out-of-bounds access while processing ARP packets (bsc#1179477). 
- Fixed an issue where dump-core shows missing nr_pages during core (bsc#1176782).
- Multiple other bugs (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-29"/>
	<updated date="2020-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176782">SUSE bug 1176782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179496">SUSE bug 1179496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179498">SUSE bug 1179498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179501">SUSE bug 1179501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179502">SUSE bug 1179502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179506">SUSE bug 1179506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179514">SUSE bug 1179514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179516">SUSE bug 1179516</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29480">CVE-2020-29480 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29481">CVE-2020-29481 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29483">CVE-2020-29483 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29484">CVE-2020-29484 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29566">CVE-2020-29566 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29570">CVE-2020-29570 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29571">CVE-2020-29571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538805" comment="xen-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538806" comment="xen-doc-html-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538807" comment="xen-libs-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538808" comment="xen-libs-32bit-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538809" comment="xen-tools-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538810" comment="xen-tools-domU-4.9.4_16-3.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150766" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1162202" ref_url="https://bugzilla.suse.com/1162202" source="BUGZILLA"/>
		<reference ref_id="1162675" ref_url="https://bugzilla.suse.com/1162675" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006491.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

Security issue fixed:

- CVE-2019-18634: Fixed a buffer overflow in the passphrase prompt that could occur when pwfeedback was enabled in /etc/sudoers (bsc#1162202).

Non-security issue fixed:

- Fixed an issue where sudo -l would ask for a password even though `listpw` was set to `never` (bsc#1162675).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-19"/>
	<updated date="2020-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162202">SUSE bug 1162202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162675">SUSE bug 1162675</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18634">CVE-2019-18634 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522640" comment="sudo-1.8.20p2-3.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150767" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Java was updated to 7.1 Service Refresh 4 Fix Pack 60 [bsc#1162972, bsc#1160968].

Security issues fixed:

- CVE-2020-2583: Fixed a serialization vulnerability in BeanContextSupport (bsc#1162972).
- CVE-2020-2593: Fixed an incorrect check in isBuiltinStreamHandler, causing URL normalization issues (bsc#1162972).
- CVE-2020-2604: Fixed a serialization issue in jdk.serialFilter (bsc#1162972).
- CVE-2020-2659: Fixed the incomplete enforcement of the maxDatagramSockets limit in DatagramChannelImpl (bsc#1162972).

Non-security issues fixed:

* Class Libraries:
  IJ22333 HANG IN JAVA_JAVA_NET_SOCKETINPUTSTREAM_SOCKETREAD0 EVEN
          WHEN TIMEOUT IS SET
  IJ22350 JAVA 7 AND JAVA 8 NOT WORKING WELL WITH TRADITIONAL/SIMPLIFIED
          CHINESE EDITION OF WINDOWS CLIENT SYSTEM
  IJ22337 THE NAME OF THE REPUBLIC OF BELARUS IN THE RUSSIAN LOCALE
          INCONSISTENT WITH CLDR
  IJ22349 UPDATE TIMEZONE INFORMATION TO TZDATA2019C
* JIT Compiler:
  IJ11368 JAVA JIT PPC: CRASH IN JIT COMPILED CODE ON PPC MACHINES
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-07"/>
	<updated date="2020-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531724" comment="java-1_7_1-ibm-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531725" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531726" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531727" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531728" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-38.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150768" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006521.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20030">CVE-2018-20030 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9278">CVE-2019-9278 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522649" comment="libexif12-0.6.21-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522650" comment="libexif12-32bit-0.6.21-8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150769" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1158809" ref_url="https://bugzilla.suse.com/1158809" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006529.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issue fixed:

- CVE-2019-1551: Fixed an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli (bsc#1158809).

Non-security issue fixed:

- Fixed a crash in BN_copy (bsc#1160163).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158809">SUSE bug 1158809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1551">CVE-2019-1551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531729" comment="libopenssl-devel-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531730" comment="libopenssl1_0_0-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531731" comment="libopenssl1_0_0-32bit-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531732" comment="libopenssl1_0_0-hmac-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531733" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531734" comment="openssl-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531735" comment="openssl-doc-1.0.2j-60.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150770" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1162610" ref_url="https://bugzilla.suse.com/1162610" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006533.html" source="SUSE-SU"/>
		<description>
This update for ppp fixes the following security issue:

- CVE-2020-8597: Fixed a buffer overflow in the eap_request and eap_response functions (bsc#1162610).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-26"/>
	<updated date="2020-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162610">SUSE bug 1162610</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8597">CVE-2020-8597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522651" comment="ppp-2.4.7-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150771" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="1159208" ref_url="https://bugzilla.suse.com/1159208" source="BUGZILLA"/>
		<reference ref_id="1159623" ref_url="https://bugzilla.suse.com/1159623" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-4472" ref_url="https://www.suse.com/security/cve/CVE-2016-4472/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Update to 3.4.10 (jsc#SLE-9427, bsc#1159208) from 3.4.6:

Security issues fixed:

- Update expat copy from 2.1.1 to 2.2.0 to fix the following issues:
  CVE-2012-0876, CVE-2016-0718, CVE-2016-4472, CVE-2017-9233, CVE-2016-9063
- CVE-2017-1000158: Fix an integer overflow in thePyString_DecodeEscape function in stringobject.c, resulting in heap-based bufferoverflow (bsc#1068664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-20"/>
	<updated date="2020-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159208">SUSE bug 1159208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159623">SUSE bug 1159623</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0876">CVE-2012-0876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0718">CVE-2016-0718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4472/">CVE-2016-4472 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4472">CVE-2016-4472 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000158">CVE-2017-1000158 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9233">CVE-2017-9233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150772" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1154162" ref_url="https://bugzilla.suse.com/1154162" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0050-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200050-1.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Security issue fixed:

- CVE-2019-2974: Fixed Server Optimizer (bsc#1154162).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2974">CVE-2019-2974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531737" comment="libmysqlclient18-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531738" comment="libmysqlclient18-32bit-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531739" comment="mariadb-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531740" comment="mariadb-client-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531741" comment="mariadb-errormessages-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531742" comment="mariadb-tools-10.0.40.2-29.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150773" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to 7.1 Service Refresh 4 Fix Pack 55 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2962 CVE-2019-2964
    CVE-2019-2978 CVE-2019-2983 CVE-2019-2989 CVE-2019-2992
    CVE-2019-2999 CVE-2019-2973 CVE-2019-2981
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531743" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531746" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150774" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-4732" ref_url="https://www.suse.com/security/cve/CVE-2019-4732/" source="CVE"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Java 8.0 was updated to Service Refresh 6 Fix Pack 5 (bsc#1162972, bsc#1160968)

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2019-4732: Untrusted DLL search path vulnerability 
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-4732/">CVE-2019-4732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-4732">CVE-2019-4732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531748" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531750" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150775" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1159646" ref_url="https://bugzilla.suse.com/1159646" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0054-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200054-1.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2019-17571: Fixed a remote code execution by deserialization of untrusted data in SocketServer (bsc#1159646).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159646">SUSE bug 1159646</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17571">CVE-2019-17571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531752" comment="log4j-1.2.15-126.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150776" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1123886" ref_url="https://bugzilla.suse.com/1123886" source="BUGZILLA"/>
		<reference ref_id="1160594" ref_url="https://bugzilla.suse.com/1160594" source="BUGZILLA"/>
		<reference ref_id="1160764" ref_url="https://bugzilla.suse.com/1160764" source="BUGZILLA"/>
		<reference ref_id="1161779" ref_url="https://bugzilla.suse.com/1161779" source="BUGZILLA"/>
		<reference ref_id="1163922" ref_url="https://bugzilla.suse.com/1163922" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8013" ref_url="https://www.suse.com/security/cve/CVE-2020-8013/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006557.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

Security issues fixed:

- CVE-2020-8013: Fixed an issue where chkstat set unintended setuid/capabilities for mrsh and wodim (bsc#1163922).

Non-security issues fixed:

- Fixed a regression where chkstat broke when /proc was not available (bsc#1160764, bsc#1160594).
- Fixed capability handling when doing multiple permission changes at once (bsc#1161779).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-28"/>
	<updated date="2020-02-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123886">SUSE bug 1123886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160594">SUSE bug 1160594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160764">SUSE bug 1160764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161779">SUSE bug 1161779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163922">SUSE bug 1163922</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8013/">CVE-2020-8013 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8013">CVE-2020-8013 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531753" comment="permissions-2015.09.28.1626-17.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150777" version="1" class="patch">
	<metadata>
		<title>Security update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="1122668" ref_url="https://bugzilla.suse.com/1122668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006561.html" source="SUSE-SU"/>
		<description>
This update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer, python-jsonpatch, python-jsonpointer, python-scandir, python-PyYAML fixes the following issues:

python-cfn-lint was included as a new package in 0.21.4.


python-aws-sam-translator was updated to 1.11.0:

  * Add ReservedConcurrentExecutions to globals
  * Fix ElasticsearchHttpPostPolicy resource reference
  * Support using AWS::Region in Ref and Sub
  * Documentation and examples updates
  * Add VersionDescription property to Serverless::Function
  * Update ServerlessRepoReadWriteAccessPolicy
  * Add additional template validation

Upgrade to 1.10.0:

  * Add GSIs to DynamoDBReadPolicy and DynamoDBCrudPolicy
  * Add DynamoDBReconfigurePolicy
  * Add CostExplorerReadOnlyPolicy and OrganizationsListAccountsPolicy
  * Add EKSDescribePolicy
  * Add SESBulkTemplatedCrudPolicy
  * Add FilterLogEventsPolicy
  * Add SSMParameterReadPolicy
  * Add SESEmailTemplateCrudPolicy
  * Add s3:PutObjectAcl to S3CrudPolicy
  * Add allow_credentials CORS option
  * Add support for AccessLogSetting and CanarySetting Serverless::Api properties
  * Add support for X-Ray in Serverless::Api
  * Add support for MinimumCompressionSize in Serverless::Api
  * Add Auth to Serverless::Api globals
  * Remove trailing slashes from APIGW permissions
  * Add SNS FilterPolicy and an example application
  * Add Enabled property to Serverless::Function event sources
  * Add support for PermissionsBoundary in Serverless::Function
  * Fix boto3 client initialization
  * Add PublicAccessBlockConfiguration property to S3 bucket resource
  * Make PAY_PER_REQUEST default mode for Serverless::SimpleTable
  * Add limited support for resolving intrinsics in Serverless::LayerVersion
  * SAM now uses Flake8
  * Add example application for S3 Events written in Go
  * Updated several example applications

- Initial build
  + Version 1.9.0
- Add patch to drop compatible releases operator from setup.py,
  required for SLES12 as the setuptools version is too old
  + ast_drop-compatible-releases-operator.patch


python-jsonschema was updated to 2.6.0:

* Improved performance on CPython by adding caching around ref resolution

Update to version 2.5.0:

* Improved performance on CPython by adding caching around ref
  resolution (#203)

Update to version 2.4.0:

* Added a CLI (#134)
* Added absolute path and absolute schema path to errors (#120)
* Added ``relevance``
* Meta-schemas are now loaded via ``pkgutil``
* Added ``by_relevance`` and ``best_match`` (#91)
* Fixed ``format`` to allow adding formats for non-strings (#125)
* Fixed the ``uri`` format to reject URI references (#131)

- Install /usr/bin/jsonschema with update-alternatives support

python-nose2 was updated to 0.9.1:

* the prof plugin now uses cProfile instead of hotshot for profiling
* skipped tests now include the user's reason in junit XML's message field
* the prettyassert plugin mishandled multi-line function definitions
* Using a plugin's CLI flag when the plugin is already enabled via config
  no longer errors
* nose2.plugins.prettyassert, enabled with --pretty-assert
* Cleanup code for EOLed python versions
* Dropped support for distutils.
* Result reporter respects failure status set by other plugins
* JUnit XML plugin now includes the skip reason in its output

Upgrade to 0.8.0:

List of changes is too long to show here, see
https://github.com/nose-devs/nose2/blob/master/docs/changelog.rst
changes between 0.6.5 and 0.8.0

Update to 0.7.0:

* Added parameterized_class feature, for parameterizing entire test
  classes (many thanks to @TobyLL for their suggestions and help testing!)
* Fix DeprecationWarning on `inspect.getargs` (thanks @brettdh;
  https://github.com/wolever/parameterized/issues/67)
* Make sure that `setUp` and `tearDown` methods work correctly (#40)
* Raise a ValueError when input is empty (thanks @danielbradburn;
  https://github.com/wolever/parameterized/pull/48)
* Fix the order when number of cases exceeds 10 (thanks @ntflc;
  https://github.com/wolever/parameterized/pull/49)

python-scandir was included in version 2.3.2.

python-requests was updated to version 2.20.1 (bsc#1111622)

* Fixed bug with unintended Authorization header stripping for
  redirects using default ports (http/80, https/443).


* remove restriction for urllib3 &lt; 1.24

Update to version 2.20.0:

* Bugfixes
  + Content-Type header parsing is now case-insensitive
    (e.g. charset=utf8 v Charset=utf8).
  + Fixed exception leak where certain redirect urls would raise
    uncaught urllib3 exceptions.
  + Requests removes Authorization header from requests redirected
    from https to http on the same hostname. (CVE-2018-18074)
  + should_bypass_proxies now handles URIs without hostnames
    (e.g. files).
* Dependencies
  + Requests now supports urllib3 v1.24.
* Deprecations
  + Requests has officially stopped support for Python 2.6.

Update to version 2.19.1:

* Fixed issue where status_codes.py’s init function failed trying
  to append to a __doc__ value of None.

Update to version 2.19.0:

* Improvements
  + Warn about possible slowdown with cryptography version &lt; 1.3.4
  + Check host in proxy URL, before forwarding request to adapter.
  + Maintain fragments properly across redirects. (RFC7231 7.1.2)
  + Removed use of cgi module to expedite library load time.
  + Added support for SHA-256 and SHA-512 digest auth algorithms.
  + Minor performance improvement to Request.content.
  + Migrate to using collections.abc for 3.7 compatibility.
* Bugfixes
  + Parsing empty Link headers with parse_header_links() no longer
    return one bogus entry.
  + Fixed issue where loading the default certificate bundle from
    a zip archive would raise an IOError.
  + Fixed issue with unexpected ImportError on windows system
    which do not support winreg module.
  + DNS resolution in proxy bypass no longer includes the username
    and password in the request. This also fixes the issue of DNS
    queries failing on macOS.
  + Properly normalize adapter prefixes for url comparison.
  + Passing None as a file pointer to the files param no longer
    raises an exception.
  + Calling copy on a RequestsCookieJar will now preserve the
    cookie policy correctly.
* We now support idna v2.7 and urllib3 v1.23.

update to version 2.18.4:

* Improvements
  + Error messages for invalid headers now include the header name
    for easier debugging
* Dependencies
  + We now support idna v2.6.

update to version 2.18.3:

* Improvements
  + Running $ python -m requests.help now includes the installed
    version of idna.
* Bugfixes
  + Fixed issue where Requests would raise ConnectionError instead
    of SSLError when encountering SSL problems when using urllib3
    v1.22.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-02"/>
	<updated date="2020-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122668">SUSE bug 1122668</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009524562" comment="python-PyYAML-5.1.2-26.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522744" comment="python-asn1crypto-0.24.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522745" comment="python-packaging-17.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530078" comment="python3-PyYAML-5.1.2-26.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522747" comment="python3-asn1crypto-0.24.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522748" comment="python3-packaging-17.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150778" version="1" class="patch">
	<metadata>
		<title>Security update for libpng16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1124211" ref_url="https://bugzilla.suse.com/1124211" source="BUGZILLA"/>
		<reference ref_id="1141493" ref_url="https://bugzilla.suse.com/1141493" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006567.html" source="SUSE-SU"/>
		<description>
This update for libpng16 fixes the following issues:

Security issues fixed:

- CVE-2019-7317: Fixed a use-after-free vulnerability, triggered when
  png_image_free() was called under png_safe_execute (bsc#1124211).
- CVE-2017-12652: Fixed an Input Validation Error related to the length of chunks (bsc#1141493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-03"/>
	<updated date="2020-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124211">SUSE bug 1124211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141493">SUSE bug 1141493</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12652">CVE-2017-12652 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522656" comment="libpng16-16-1.6.8-15.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522657" comment="libpng16-16-32bit-1.6.8-15.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150779" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006573.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

PostgreSQL was updated to version 9.6.17.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-04"/>
	<updated date="2020-03-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1720">CVE-2020-1720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531754" comment="postgresql96-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531755" comment="postgresql96-contrib-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531756" comment="postgresql96-docs-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531757" comment="postgresql96-plperl-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531758" comment="postgresql96-plpython-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531759" comment="postgresql96-pltcl-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531760" comment="postgresql96-server-9.6.17-3.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150780" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Update java-1_7_0-openjdk to version jdk7u251 (January 2020 CPU, bsc#1160968):

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2020-2590: Improve Kerberos interop capabilities
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2601: Better Ticket Granting Services
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support
- CVE-2020-2654: Improve Object Identifier Processing	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-10"/>
	<updated date="2020-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2590">CVE-2020-2590 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2601">CVE-2020-2601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522665" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531761" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531762" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522666" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150781" version="1" class="patch">
	<metadata>
		<title>Security update for ipmitool (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1085469" ref_url="https://bugzilla.suse.com/1085469" source="BUGZILLA"/>
		<reference ref_id="1163026" ref_url="https://bugzilla.suse.com/1163026" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-5208" ref_url="https://www.suse.com/security/cve/CVE-2020-5208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006594.html" source="SUSE-SU"/>
		<description>
This update for ipmitool fixes the following issues:

- CVE-2020-5208: Fixed multiple remote code executtion vulnerabilities (bsc#1163026).	  
- picmg discover messages are now DEBUG and not INFO messages (bsc#1085469).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-10"/>
	<updated date="2020-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085469">SUSE bug 1085469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163026">SUSE bug 1163026</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5208/">CVE-2020-5208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5208">CVE-2020-5208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522667" comment="ipmitool-1.8.18-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150782" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1156323" ref_url="https://bugzilla.suse.com/1156323" source="BUGZILLA"/>
		<reference ref_id="1156324" ref_url="https://bugzilla.suse.com/1156324" source="BUGZILLA"/>
		<reference ref_id="1156326" ref_url="https://bugzilla.suse.com/1156326" source="BUGZILLA"/>
		<reference ref_id="1156328" ref_url="https://bugzilla.suse.com/1156328" source="BUGZILLA"/>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1162687" ref_url="https://bugzilla.suse.com/1162687" source="BUGZILLA"/>
		<reference ref_id="1162689" ref_url="https://bugzilla.suse.com/1162689" source="BUGZILLA"/>
		<reference ref_id="1162691" ref_url="https://bugzilla.suse.com/1162691" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526/" source="CVE"/>
		<reference ref_id="CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677/" source="CVE"/>
		<reference ref_id="CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678/" source="CVE"/>
		<reference ref_id="CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679/" source="CVE"/>
		<reference ref_id="CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449/" source="CVE"/>
		<reference ref_id="CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450/" source="CVE"/>
		<reference ref_id="CVE-2020-8517" ref_url="https://www.suse.com/security/cve/CVE-2020-8517/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2019-12528: Fixed an information disclosure flaw in the FTP gateway (bsc#1162689). 
- CVE-2019-12526: Fixed potential remote code execution during URN processing (bsc#1156326).
- CVE-2019-12523,CVE-2019-18676: Fixed multiple improper validations in URI processing (bsc#1156329).
- CVE-2019-18677: Fixed Cross-Site Request Forgery in HTTP Request processing (bsc#1156328).
- CVE-2019-18678: Fixed incorrect message parsing which could have led to HTTP request splitting issue (bsc#1156323).
- CVE-2019-18679: Fixed information disclosure when processing HTTP Digest Authentication (bsc#1156324).
- CVE-2020-8449: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
- CVE-2020-8450: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
- CVE-2020-8517: Fixed a buffer overflow in ext_lm_group_acl when processing NTLM Authentication credentials (bsc#1162691).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-12"/>
	<updated date="2020-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156323">SUSE bug 1156323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156324">SUSE bug 1156324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156326">SUSE bug 1156326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156328">SUSE bug 1156328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162689">SUSE bug 1162689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162691">SUSE bug 1162691</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12523">CVE-2019-12523 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12526">CVE-2019-12526 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12528">CVE-2019-12528 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18676">CVE-2019-18676 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18677">CVE-2019-18677 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18678">CVE-2019-18678 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18679">CVE-2019-18679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8449">CVE-2020-8449 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8450">CVE-2020-8450 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8517/">CVE-2020-8517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8517">CVE-2020-8517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531763" comment="squid-3.5.21-26.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150783" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1160305" ref_url="https://bugzilla.suse.com/1160305" source="BUGZILLA"/>
		<reference ref_id="1160498" ref_url="https://bugzilla.suse.com/1160498" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-03 (bsc#1160498)
  * CVE-2019-17026 (bmo#1607443)
    IonMonkey type confusion with StoreElementHole and
    FallibleStoreElement 

- Firefox Extended Support Release 68.4.0 ESR
  * Fixed: Various security fixes
  MFSA 2020-02 (bsc#1160305)
  * CVE-2019-17015 (bmo#1599005)
    Memory corruption in parent process during new content
    process initialization on Windows
  * CVE-2019-17016 (bmo#1599181)
    Bypass of @namespace CSS sanitization during pasting
  * CVE-2019-17017 (bmo#1603055)
    Type Confusion in XPCVariant.cpp
  * CVE-2019-17021 (bmo#1599008)
    Heap address disclosure in parent process during content
    process initialization on Windows
  * CVE-2019-17022 (bmo#1602843)
    CSS sanitization does not escape HTML tags
  * CVE-2019-17024 (bmo#1507180, bmo#1595470, bmo#1598605,
    bmo#1601826)
    Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-10"/>
	<updated date="2020-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160498">SUSE bug 1160498</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17015">CVE-2019-17015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17016">CVE-2019-17016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17017">CVE-2019-17017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17021">CVE-2019-17021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17022">CVE-2019-17022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17024">CVE-2019-17024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17026">CVE-2019-17026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522668" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522669" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150784" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006625.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

PostgreSQL was updated to version 10.12.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1720">CVE-2020-1720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522670" comment="libecpg6-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522671" comment="libpq5-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522672" comment="libpq5-32bit-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522673" comment="postgresql10-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531765" comment="postgresql10-contrib-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531766" comment="postgresql10-docs-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531767" comment="postgresql10-plperl-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531768" comment="postgresql10-plpython-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531769" comment="postgresql10-pltcl-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531770" comment="postgresql10-server-10.12-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150785" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1132665" ref_url="https://bugzilla.suse.com/1132665" source="BUGZILLA"/>
		<reference ref_id="1166238" ref_url="https://bugzilla.suse.com/1166238" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to 68.6.0 ESR (MFSA 2020-09 bsc#1132665 bsc#1166238)
          
- CVE-2020-6805: Fixed a use-after-free when removing data about origins
- CVE-2020-6806: Fixed improper protections against state confusion
- CVE-2020-6807: Fixed a use-after-free in cubeb during stream destruction 
- CVE-2020-6811: Fixed an issue where copy as cURL' feature did not fully 
  escape website-controlled data potentially leading to command injection 
- CVE-2019-20503: Fixed out of bounds reads in sctp_load_addresses_from_init 
- CVE-2020-6812: Fixed an issue where the names of AirPods with personally 
  identifiable information were exposed to websites with camera or microphone 
  permission     
- CVE-2020-6814: Fixed multiple memory safety bugs
- Fixed an issue with minimizing a window (bsc#1132665).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-19"/>
	<updated date="2020-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132665">SUSE bug 1132665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20503">CVE-2019-20503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6805">CVE-2020-6805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6806">CVE-2020-6806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6807">CVE-2020-6807 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6811">CVE-2020-6811 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6812">CVE-2020-6812 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6814">CVE-2020-6814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531771" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531773" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150786" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1164692" ref_url="https://bugzilla.suse.com/1164692" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006629.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-1938: Fixed a file contents disclosure vulnerability (bsc#1164692).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-19"/>
	<updated date="2020-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1164692">SUSE bug 1164692</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531774" comment="tomcat-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531775" comment="tomcat-admin-webapps-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531776" comment="tomcat-docs-webapp-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531777" comment="tomcat-el-3_0-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531778" comment="tomcat-javadoc-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531779" comment="tomcat-jsp-2_3-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531780" comment="tomcat-lib-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531781" comment="tomcat-servlet-3_1-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531782" comment="tomcat-webapps-8.0.53-29.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150787" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1158763" ref_url="https://bugzilla.suse.com/1158763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18900" ref_url="https://www.suse.com/security/cve/CVE-2019-18900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0079-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007437.html" source="SUSE-SU"/>
		<description>
This update for libzypp fixes the following issues:

Security issue fixed:

- CVE-2019-18900: Fixed assert cookie file that was world readable (bsc#1158763).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1158763">SUSE bug 1158763</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18900/">CVE-2019-18900 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18900">CVE-2019-18900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522674" comment="libzypp-16.21.2-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555874" comment="libzypp-devel-16.21.2-2.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150788" version="1" class="patch">
	<metadata>
		<title>Security update for python-cffi, python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1055478" ref_url="https://bugzilla.suse.com/1055478" source="BUGZILLA"/>
		<reference ref_id="1070737" ref_url="https://bugzilla.suse.com/1070737" source="BUGZILLA"/>
		<reference ref_id="1101820" ref_url="https://bugzilla.suse.com/1101820" source="BUGZILLA"/>
		<reference ref_id="1111657" ref_url="https://bugzilla.suse.com/1111657" source="BUGZILLA"/>
		<reference ref_id="1138748" ref_url="https://bugzilla.suse.com/1138748" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="981848" ref_url="https://bugzilla.suse.com/981848" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10903" ref_url="https://www.suse.com/security/cve/CVE-2018-10903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006644.html" source="SUSE-SU"/>
		<description>
This update for python-cffi, python-cryptography fixes the following issues:

Security issue fixed:

- CVE-2018-10903: Fixed GCM tag forgery via truncated tag in finalize_with_tag API (bsc#1101820).

Non-security issues fixed:

python-cffi was updated to 1.11.2 (bsc#1138748, jsc#ECO-1256, jsc#PM-1598):

- fixed a build failure on i586 (bsc#1111657)
- Salt was unable to highstate in snapshot 20171129 (bsc#1070737)

- Update pytest in spec to add c directory tests in addition to 
  testing directory.

- update to version 1.11.2:
  * Fix Windows issue with managing the thread-state on CPython 3.0 to
    3.5

- Update pytest in spec to add c directory tests in addition to 
  testing directory.
- Omit test_init_once_multithread tests as they rely on multiple
  threads finishing in a given time. Returns sporadic pass/fail
  within build.
- Update to 1.11.1:
  * Fix tests, remove deprecated C API usage
  * Fix (hack) for 3.6.0/3.6.1/3.6.2 giving incompatible binary
    extensions (cpython issue #29943)
  * Fix for 3.7.0a1+

- Update to 1.11.0:
  * Support the modern standard types char16_t and char32_t. These
    work like wchar_t: they represent one unicode character, or when
    used as charN_t * or charN_t[] they represent a unicode string.
    The difference with wchar_t is that they have a known, fixed
    size. They should work at all places that used to work with
    wchar_t (please report an issue if I missed something). Note
    that with set_source(), you need to make sure that these types
    are actually defined by the C source you provide (if used in
    cdef()).
  * Support the C99 types float _Complex and double _Complex. Note
    that libffi doesn't support them, which means that in the ABI
    mode you still cannot call C functions that take complex
    numbers directly as arguments or return type.
  * Fixed a rare race condition when creating multiple FFI instances
    from multiple threads. (Note that you aren't meant to create
    many FFI instances: in inline mode, you should write
    ffi = cffi.FFI() at module level just after import cffi; and in
    out-of-line mode you don't instantiate FFI explicitly at all.)
  * Windows: using callbacks can be messy because the CFFI internal
    error messages show up to stderr-but stderr goes nowhere in many
    applications. This makes it particularly hard to get started
    with the embedding mode. (Once you get started, you can at least
    use @ffi.def_extern(onerror=...) and send the error logs where
    it makes sense for your application, or record them in log
    files, and so on.) So what is new in CFFI is that now, on
    Windows CFFI will try to open a non-modal MessageBox (in addition
    to sending raw messages to stderr). The MessageBox is only
    visible if the process stays alive: typically, console
    applications that crash close immediately, but that is also the
    situation where stderr should be visible anyway.
  * Progress on support for callbacks in NetBSD.
  * Functions returning booleans would in some case still return 0
    or 1 instead of False or True. Fixed.
  * ffi.gc() now takes an optional third parameter, which gives an
    estimate of the size (in bytes) of the object. So far, this is
    only used by PyPy, to make the next GC occur more quickly
    (issue #320). In the future, this might have an effect on
    CPython too (provided the CPython issue 31105 is addressed).
  * Add a note to the documentation: the ABI mode gives function
    objects that are slower to call than the API mode does. For
    some reason it is often thought to be faster. It is not!
- Update to 1.10.1:
  * Fixed the line numbers reported in case of cdef() errors. Also,
    I just noticed, but pycparser always supported the preprocessor
    directive # 42 'foo.h' to mean 'from the next line, we're in
    file foo.h starting from line 42';, which it puts in the error
    messages. 

- update to 1.10.0:
 * Issue #295: use calloc() directly instead of PyObject_Malloc()+memset()
   to handle ffi.new() with a default allocator. Speeds up ffi.new(large-array)
   where most of the time you never touch most of the array.
  * Some OS/X build fixes ('only with Xcode but without CLT';).
  * Improve a couple of error messages: when getting mismatched versions of
    cffi and its backend; and when calling functions which cannot be called with
    libffi because an argument is a struct that is 'too complicated'; (and not
    a struct pointer, which always works).
  * Add support for some unusual compilers (non-msvc, non-gcc, non-icc, non-clang)
  * Implemented the remaining cases for ffi.from_buffer. Now all
    buffer/memoryview objects can be passed. The one remaining check is against
    passing unicode strings in Python 2. (They support the buffer interface, but
    that gives the raw bytes behind the UTF16/UCS4 storage, which is most of the
    times not what you expect. In Python 3 this has been fixed and the unicode
    strings don't support the memoryview interface any more.)
  * The C type _Bool or bool now converts to a Python boolean when reading,
    instead of the content of the byte as an integer. The potential
    incompatibility here is what occurs if the byte contains a value different
    from 0 and 1. Previously, it would just return it; with this change, CFFI
    raises an exception in this case. But this case means 'undefined behavior';
    in C; if you really have to interface with a library relying on this,
    don't use bool in the CFFI side. Also, it is still valid to use a byte
    string as initializer for a bool[], but now it must only contain \x00 or
    \x01. As an aside, ffi.string() no longer works on bool[] (but it never made
    much sense, as this function stops at the first zero).
  * ffi.buffer is now the name of cffi's buffer type, and ffi.buffer() works
    like before but is the constructor of that type.
  * ffi.addressof(lib, 'name') now works also in in-line mode, not only in
    out-of-line mode. This is useful for taking the address of global variables.
  * Issue #255: cdata objects of a primitive type (integers, floats, char) are
    now compared and ordered by value. For example, &lt;cdata 'int' 42&gt; compares
    equal to 42 and &lt;cdata 'char' b'A'&gt; compares equal to b'A'. Unlike C,
    &lt;cdata 'int' -1&gt; does not compare equal to ffi.cast('unsigned int', -1): it
    compares smaller, because -1 &lt; 4294967295.
  * PyPy: ffi.new() and ffi.new_allocator()() did not record 'memory pressure';,
    causing the GC to run too infrequently if you call ffi.new() very often
    and/or with large arrays. Fixed in PyPy 5.7.
  * Support in ffi.cdef() for numeric expressions with + or -. Assumes that
    there is no overflow; it should be fixed first before we add more general
    support for arbitrary arithmetic on constants.

- do not generate HTML documentation for packages that are indirect
  dependencies of Sphinx
  (see docs at https://cffi.readthedocs.org/ )

- update to 1.9.1
  - Structs with variable-sized arrays as their last field: now we track the
    length of the array after ffi.new() is called, just like we always tracked
    the length of ffi.new('int[]', 42). This lets us detect out-of-range
    accesses to array items. This also lets us display a better repr(), and
    have the total size returned by ffi.sizeof() and ffi.buffer(). Previously
    both functions would return a result based on the size of the declared
    structure type, with an assumed empty array. (Thanks andrew for starting
    this refactoring.)
  - Add support in cdef()/set_source() for unspecified-length arrays in
    typedefs: typedef int foo_t[...];. It was already supported for global
    variables or structure fields.
  - I turned in v1.8 a warning from cffi/model.py into an error: 'enum xxx' has
    no values explicitly defined: refusing to guess which integer type it is
    meant to be (unsigned/signed, int/long). Now I'm turning it back to a
    warning again; it seems that guessing that the enum has size int is a
    99%-safe bet. (But not 100%, so it stays as a warning.)
  - Fix leaks in the code handling FILE * arguments. In CPython 3 there is a
    remaining issue that is hard to fix: if you pass a Python file object to a
    FILE * argument, then os.dup() is used and the new file descriptor is only
    closed when the GC reclaims the Python file object-and not at the earlier
    time when you call close(), which only closes the original file descriptor.
    If this is an issue, you should avoid this automatic convertion of Python
    file objects: instead, explicitly manipulate file descriptors and call
    fdopen() from C (...via cffi).
  - When passing a void * argument to a function with a different pointer type,
    or vice-versa, the cast occurs automatically, like in C. The same occurs
    for initialization with ffi.new() and a few other places. However, I
    thought that char * had the same property-but I was mistaken. In C you get
    the usual warning if you try to give a char * to a char ** argument, for
    example. Sorry about the confusion. This has been fixed in CFFI by giving
    for now a warning, too. It will turn into an error in a future version.
  - Issue #283: fixed ffi.new() on structures/unions with nested anonymous
    structures/unions, when there is at least one union in the mix. When
    initialized with a list or a dict, it should now behave more closely like
    the { } syntax does in GCC.
  - CPython 3.x: experimental: the generated C extension modules now use the
    'limited API';, which means that, as a compiled .so/.dll, it should work
    directly on any version of CPython &gt;= 3.2. The name produced by distutils
    is still version-specific. To get the version-independent name, you can
    rename it manually to NAME.abi3.so, or use the very recent setuptools 26.
  - Added ffi.compile(debug=...), similar to python setup.py build --debug but
    defaulting to True if we are running a debugging version of Python itself.
  - Removed the restriction that ffi.from_buffer() cannot be used on byte
    strings. Now you can get a char * out of a byte string, which is valid as
    long as the string object is kept alive. (But don't use it to modify the
    string object! If you need this, use bytearray or other official
    techniques.)
  - PyPy 5.4 can now pass a byte string directly to a char * argument (in older
    versions, a copy would be made). This used to be a CPython-only
    optimization.
  - ffi.gc(p, None) removes the destructor on an object previously created by
    another call to ffi.gc()
  - bool(ffi.cast('primitive type', x)) now returns False if the value is zero
    (including -0.0), and True otherwise. Previously this would only return
    False for cdata objects of a pointer type when the pointer is NULL.
  - bytearrays: ffi.from_buffer(bytearray-object) is now supported. (The reason
    it was not supported was that it was hard to do in PyPy, but it works since
    PyPy 5.3.) To call a C function with a char * argument from a buffer
    object-now including bytearrays-you write lib.foo(ffi.from_buffer(x)).
    Additionally, this is now supported: p[0:length] = bytearray-object. The
    problem with this was that a iterating over bytearrays gives numbers
    instead of characters. (Now it is implemented with just a memcpy, of
    course, not actually iterating over the characters.)
  - C++: compiling the generated C code with C++ was supposed to work, but
    failed if you make use the bool type (because that is rendered as the C
    _Bool type, which doesn't exist in C++).
  - help(lib) and help(lib.myfunc) now give useful information, as well as
    dir(p) where p is a struct or pointer-to-struct.

- update for multipython build

- disable 'negative left shift' warning in test suite to prevent
  failures with gcc6, until upstream fixes the undefined code
  in question (bsc#981848)

- Update to version 1.6.0:
  * ffi.list_types()
  * ffi.unpack()
  * extern 'Python+C';
  * in API mode, lib.foo.__doc__ contains the C signature now.
  * Yet another attempt at robustness of ffi.def_extern() against
    CPython's interpreter shutdown logic.
- Update in SLE-12 (bsc#1138748, jsc#ECO-1256, jsc#PM-1598)

- Make this version of the package compatible with OpenSSL 1.1.1d, thus fixing bsc#1149792.

- bsc#1101820 CVE-2018-10903 GCM tag forgery via truncated tag in
  finalize_with_tag API

- Add proper conditional for the python2, the ifpython works only
  for the requires/etc

- add missing dependency on python ssl

- update to version 2.1.4:
  * Added X509_up_ref for an upcoming pyOpenSSL release.

- update to version 2.1.3:
  * Updated Windows, macOS, and manylinux1 wheels to be compiled with
    OpenSSL 1.1.0g.

- update to version 2.1.2:
  * Corrected a bug with the manylinux1 wheels where OpenSSL's stack
    was marked executable.

- fix BuildRequires conditions for python3

- update to 2.1.1

- Fix cffi version requirement.

- Disable memleak tests to fix build with OpenSSL 1.1 (bsc#1055478)


- update to 2.0.3

- update to 2.0.2

- update to 2.0

- update to 1.9

- add python-packaging to requirements explicitly instead of relying
  on setuptools to pull it in

- Switch to singlespec approach

- update to 1.8.1
- Adust Requires and BuildRequires		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-25"/>
	<updated date="2020-03-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055478">SUSE bug 1055478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070737">SUSE bug 1070737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101820">SUSE bug 1101820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111657">SUSE bug 1111657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138748">SUSE bug 1138748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981848">SUSE bug 981848</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10903/">CVE-2018-10903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10903">CVE-2018-10903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531783" comment="python-cffi-1.11.2-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531784" comment="python-cryptography-2.1.4-7.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531785" comment="python-xattr-0.7.5-6.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531786" comment="python3-cffi-1.11.2-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531787" comment="python3-cryptography-2.1.4-7.28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150789" version="1" class="patch">
	<metadata>
		<title>Security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1118987" ref_url="https://bugzilla.suse.com/1118987" source="BUGZILLA"/>
		<reference ref_id="1162197" ref_url="https://bugzilla.suse.com/1162197" source="BUGZILLA"/>
		<reference ref_id="1162200" ref_url="https://bugzilla.suse.com/1162200" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11805" ref_url="https://www.suse.com/security/cve/CVE-2018-11805/" source="CVE"/>
		<reference ref_id="CVE-2020-1930" ref_url="https://www.suse.com/security/cve/CVE-2020-1930/" source="CVE"/>
		<reference ref_id="CVE-2020-1931" ref_url="https://www.suse.com/security/cve/CVE-2020-1931/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006648.html" source="SUSE-SU"/>
		<description>
This update for spamassassin fixes the following issues:

- CVE-2018-11805: Fixed an issue with delimiter handling in rule files 
  related to is_regexp_valid() (bsc#1118987).
- CVE-2020-1930: Fixed an issue with rule configuration (.cf) files which 
  can be configured to run system commands (bsc#1162197).
- CVE-2020-1931: Fixed an issue with rule configuration (.cf) files which 
  can be configured to run system commands with warnings (bsc#1162200).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-30"/>
	<updated date="2020-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118987">SUSE bug 1118987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162197">SUSE bug 1162197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162200">SUSE bug 1162200</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11805/">CVE-2018-11805 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11805">CVE-2018-11805 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1930/">CVE-2020-1930 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1930">CVE-2020-1930 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1931/">CVE-2020-1931 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1931">CVE-2020-1931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531788" comment="perl-Mail-SpamAssassin-3.4.2-44.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531789" comment="spamassassin-3.4.2-44.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150790" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1162224" ref_url="https://bugzilla.suse.com/1162224" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006666.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issue:

- CVE-2019-18348: Fixed a CRLF injection via the host part 
  of the url passed to urlopen(). Now an InvalidURL exception 
  is raised (bsc#1155094).
- CVE-2019-9674: Improved the documentation to reflect the 
  dangers of zip-bombs (bsc#1162825).
- CVE-2020-8492: Fixed a regular expression in urllib that 
  was prone to denial of service via HTTP (bsc#1162367).
- Fixed an issue with version missmatch (bsc#1162224).
- Rename idle icons to idle3 in order to not conflict with python2
  variant of the package. (bsc#1165894)
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-02"/>
	<updated date="2020-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162224">SUSE bug 1162224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531790" comment="libpython3_4m1_0-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531791" comment="python3-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531792" comment="python3-base-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531793" comment="python3-curses-3.4.10-25.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150791" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1141322" ref_url="https://bugzilla.suse.com/1141322" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0088-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200088-1.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to NSS 3.47.1:

Security issues fixed:

- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- CVE-2019-11745: EncryptUpdate should use maxout, not block size (bsc#1158527).
- CVE-2019-11727: Fixed vulnerability sign CertificateVerify with PKCS#1 v1.5 signatures issue (bsc#1141322).

mozilla-nspr was updated to version 4.23:

- Whitespace in C files was cleaned up and no longer uses tab characters for indenting.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-13"/>
	<updated date="2020-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141322">SUSE bug 1141322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17006">CVE-2019-17006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522675" comment="libfreebl3-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522676" comment="libfreebl3-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531795" comment="libfreebl3-hmac-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531796" comment="libfreebl3-hmac-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522677" comment="libsoftokn3-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522678" comment="libsoftokn3-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531797" comment="libsoftokn3-hmac-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531798" comment="libsoftokn3-hmac-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522679" comment="mozilla-nspr-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522680" comment="mozilla-nspr-32bit-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522681" comment="mozilla-nss-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522682" comment="mozilla-nss-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522683" comment="mozilla-nss-certs-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522684" comment="mozilla-nss-certs-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522685" comment="mozilla-nss-sysinit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522686" comment="mozilla-nss-sysinit-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522687" comment="mozilla-nss-tools-3.47.1-58.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150792" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1154609" ref_url="https://bugzilla.suse.com/1154609" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0920-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007307.html" source="SUSE-SU"/>
		<description>
This update for libxslt fixes the following issue:

- CVE-2019-18197: Fixed a dangling pointer in xsltCopyText which may have led to information disclosure (bsc#1154609).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-26"/>
	<updated date="2020-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154609">SUSE bug 1154609</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18197">CVE-2019-18197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531799" comment="libxslt-tools-1.1.28-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531800" comment="libxslt1-1.1.28-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531801" comment="libxslt1-32bit-1.1.28-17.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150793" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1168630" ref_url="https://bugzilla.suse.com/1168630" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006677.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Mozilla Firefox 68.6.1esr
  MFSA 2020-11 (bsc#1168630)
  * CVE-2020-6819 (bmo#1620818)
    Use-after-free while running the nsDocShell destructor
  * CVE-2020-6820 (bmo#1626728)
    Use-after-free when handling a ReadableStream
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-06"/>
	<updated date="2020-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6819">CVE-2020-6819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6820">CVE-2020-6820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531802" comment="MozillaFirefox-68.6.1-109.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531804" comment="MozillaFirefox-translations-common-68.6.1-109.113.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150794" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1168874" ref_url="https://bugzilla.suse.com/1168874" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6827" ref_url="https://www.suse.com/security/cve/CVE-2020-6827/" source="CVE"/>
		<reference ref_id="CVE-2020-6828" ref_url="https://www.suse.com/security/cve/CVE-2020-6828/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006698.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 68.7.0 ESR fixes the following issues:

- CVE-2020-6821: Uninitialized memory could be read when using the WebGL copyTexSubImage method (bsc#1168874).
- CVE-2020-6822: Fixed out of bounds write in GMPDecodeData when processing large images (bsc#1168874).
- CVE-2020-6825: Fixed Memory safety bugs (bsc#1168874).
- CVE-2020-6827: Custom Tabs could have the URI spoofed (bsc#1168874).
- CVE-2020-6828: Preference overwrite via crafted Intent (bsc#1168874).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-09"/>
	<updated date="2020-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6821">CVE-2020-6821 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6822">CVE-2020-6822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6825">CVE-2020-6825 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6827/">CVE-2020-6827 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6827">CVE-2020-6827 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6828/">CVE-2020-6828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6828">CVE-2020-6828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531805" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531807" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150795" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1167890" ref_url="https://bugzilla.suse.com/1167890" source="BUGZILLA"/>
		<reference ref_id="1168930" ref_url="https://bugzilla.suse.com/1168930" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006709.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

Security issue fixed:

- CVE-2020-5260: With a crafted URL that contains a newline in it, the credential
  helper machinery can be fooled to give credential information for a wrong host (bsc#1168930). 

Non-security issue fixed: 

git was updated to 2.26.0 for SHA256 support (bsc#1167890, jsc#SLE-11608):

- the xinetd snippet was removed
- the System V init script for the git-daemon was replaced by a systemd
  service file of the same name.

git 2.26.0:

* 'git rebase' now uses a different backend that is based on the
  'merge' machinery by default. The 'rebase.backend' configuration
   variable reverts to old behaviour when set to  'apply'
* Improved handling of sparse checkouts
* Improvements to many commands and internal features

git 2.25.1:

* 'git commit' now honors advise.statusHints
* various updates, bug fixes and documentation updates

git 2.25.0:

* The branch description ('git branch --edit-description') has been
  used to fill the body of the cover letters by the format-patch
  command; this has been enhanced so that the subject can also be
  filled.
* A few commands learned to take the pathspec from the standard input
  or a named file, instead of taking it as the command line
  arguments, with the '--pathspec-from-file' option.
* Test updates to prepare for SHA-2 transition continues.
* Redo 'git name-rev' to avoid recursive calls.
* When all files from some subdirectory were renamed to the root
  directory, the directory rename heuristics would fail to detect that
  as a rename/merge of the subdirectory to the root directory, which has
  been corrected.
* HTTP transport had possible allocator/deallocator mismatch, which
  has been corrected.

git 2.24.1:

* CVE-2019-1348: The --export-marks option of fast-import is
  exposed also via the in-stream command feature export-marks=...
  and it allows overwriting arbitrary paths (bsc#1158785)
* CVE-2019-1349: on Windows, when submodules are cloned
  recursively, under certain circumstances Git could be fooled
  into using the same Git directory twice (bsc#1158787)
* CVE-2019-1350: Incorrect quoting of command-line arguments
  allowed remote code execution during a recursive clone in
  conjunction with SSH URLs (bsc#1158788)
* CVE-2019-1351: on Windows mistakes drive letters outside of
  the US-English alphabet as relative paths (bsc#1158789)
* CVE-2019-1352: on Windows was unaware of NTFS Alternate Data
  Streams (bsc#1158790)
* CVE-2019-1353: when run in the Windows Subsystem for Linux
  while accessing a working directory on a regular Windows
  drive, none of the NTFS protections were active (bsc#1158791)
* CVE-2019-1354: on Windows refuses to write tracked files with
  filenames that contain backslashes (bsc#1158792)
* CVE-2019-1387: Recursive clones vulnerability that is caused
  by too-lax validation of submodule names, allowing very
  targeted attacks via remote code execution in recursive
  clones (bsc#1158793)
* CVE-2019-19604: a recursive clone followed by a submodule
  update could execute code contained within the repository
  without the user explicitly having asked for that (bsc#1158795)

- Fix building with asciidoctor and without DocBook4 stylesheets.

git 2.24.0

* The command line parser learned '--end-of-options' notation.
* A mechanism to affect the default setting for a (related) group of
  configuration variables is introduced.
* 'git fetch' learned '--set-upstream' option to help those who first
  clone from their private fork they intend to push to, add the true
  upstream via 'git remote add' and then 'git fetch' from it.
* fixes and improvements to UI, workflow and features, bash completion fixes
* part of it merged upstream
* the Makefile attempted to download some documentation, banned

git 2.23.0:

* The '--base' option of 'format-patch' computed the patch-ids for
  prerequisite patches in an unstable way, which has been updated
  to compute in a way that is compatible with 'git patch-id
  --stable'.
* The 'git log' command by default behaves as if the --mailmap
  option was given.
* fixes and improvements to UI, workflow and features

git 2.22.1:

* A relative pathname given to 'git init --template=&lt;path&gt; &lt;repo&gt;'
  ought to be relative to the directory 'git init' gets invoked in,
  but it instead was made relative to the repository, which has been
  corrected.
* 'git worktree add' used to fail when another worktree connected to
  the same repository was corrupt, which has been corrected.
* 'git am -i --resolved' segfaulted after trying to see a commit as
  if it were a tree, which has been corrected.
* 'git merge --squash' is designed to update the working tree and the
  index without creating the commit, and this cannot be countermanded
  by adding the '--commit' option; the command now refuses to work
  when both options are given.
* Update to Unicode 12.1 width table.
* 'git request-pull' learned to warn when the ref we ask them to pull
  from in the local repository and in the published repository are
  different.
* 'git fetch' into a lazy clone forgot to fetch base objects that are
  necessary to complete delta in a thin packfile, which has been
  corrected.
* The URL decoding code has been updated to avoid going past the end
  of the string while parsing %-&lt;hex&gt;-&lt;hex&gt; sequence.
* 'git clean' silently skipped a path when it cannot lstat() it; now
  it gives a warning.
* 'git rm' to resolve a conflicted path leaked an internal message
  'needs merge' before actually removing the path, which was
  confusing. This has been corrected.
* Many more bugfixes and code cleanups.

- removal of SuSEfirewall2 service, since SuSEfirewall2 has been replaced by
  firewalld, see [1].
  [1]: https://lists.opensuse.org/opensuse-factory/2019-01/msg00490.html

git 2.22.0:

* The filter specification '--filter=sparse:path=&lt;path&gt;' used to
  create a lazy/partial clone has been removed. Using a blob that is
  part of the project as sparse specification is still supported with
  the '--filter=sparse:oid=&lt;blob&gt;' option
* 'git checkout --no-overlay' can be used to trigger a new mode of
  checking out paths out of the tree-ish, that allows paths that
  match the pathspec that are in the current index and working tree
  and are not in the tree-ish.
* Four new configuration variables {author,committer}.{name,email}
  have been introduced to override user.{name,email} in more specific
  cases.
* 'git branch' learned a new subcommand '--show-current'.
* The command line completion (in contrib/) has been taught to
  complete more subcommand parameters.
* The completion helper code now pays attention to repository-local
  configuration (when available), which allows --list-cmds to honour
  a repository specific setting of completion.commands, for example.
* The list of conflicted paths shown in the editor while concluding a
  conflicted merge was shown above the scissors line when the
  clean-up mode is set to 'scissors', even though it was commented
  out just like the list of updated paths and other information to
  help the user explain the merge better.
* 'git rebase' that was reimplemented in C did not set ORIG_HEAD
  correctly, which has been corrected.
* 'git worktree add' used to do a 'find an available name with stat
  and then mkdir', which is race-prone. This has been fixed by using
  mkdir and reacting to EEXIST in a loop. 

- update git-web AppArmor profile for bash and tar usrMerge (bsc#1132350)

git 2.21.0:

* Historically, the '-m' (mainline) option can only be used for 'git
  cherry-pick' and 'git revert' when working with a merge commit.
  This version of Git no longer warns or errors out when working with
  a single-parent commit, as long as the argument to the '-m' option
  is 1 (i.e. it has only one parent, and the request is to pick or
  revert relative to that first parent). Scripts that relied on the
  behaviour may get broken with this change.
* Small fixes and features for fast-export and fast-import.
* The 'http.version' configuration variable can be used with recent
  enough versions of cURL library to force the version of HTTP used
  to talk when fetching and pushing.
* 'git push $there $src:$dst' rejects when $dst is not a fully
  qualified refname and it is not clear what the end user meant.
* Update 'git multimail' from the upstream.
* A new date format '--date=human' that morphs its output depending
  on how far the time is from the current time has been introduced.
  '--date=auto:human' can be used to use this new format (or any
  existing format) when the output is going to the pager or to the
  terminal, and otherwise the default format.

- Fix worktree creation race (bsc#1114225).

git 2.20.1:

* portability fixes
* 'git help -a' did not work well when an overly long alias was
  defined
* no longer squelched an error message when the run_command API
  failed to run a missing command

git 2.20.0:

* 'git help -a' now gives verbose output (same as 'git help -av').
  Those who want the old output may say 'git help --no-verbose -a'..
* 'git send-email' learned to grab address-looking string on any
  trailer whose name ends with '-by'.
* 'git format-patch' learned new '--interdiff' and '--range-diff'
  options to explain the difference between this version and the
  previous attempt in the cover letter (or after the three-dashes as
  a comment).
* Developer builds now use -Wunused-function compilation option.
* Fix a bug in which the same path could be registered under multiple
  worktree entries if the path was missing (for instance, was removed
  manually).  Also, as a convenience, expand the number of cases in
  which --force is applicable.
* The overly large Documentation/config.txt file have been split into
  million little pieces.  This potentially allows each individual piece
  to be included into the manual page of the command it affects more easily.
* Malformed or crafted data in packstream can make our code attempt
  to read or write past the allocated buffer and abort, instead of
  reporting an error, which has been fixed.
* Fix for a long-standing bug that leaves the index file corrupt when
  it shrinks during a partial commit.
* 'git merge' and 'git pull' that merges into an unborn branch used
  to completely ignore '--verify-signatures', which has been
  corrected.
* ...and much more features and fixes

- fix CVE-2018-19486 (bsc#1117257)

git 2.19.2:

* various bug fixes for multiple subcommands and operations

git 2.19.1:

* CVE-2018-17456: Specially crafted .gitmodules files may have
  allowed arbitrary code execution when the repository is cloned
  with --recurse-submodules (bsc#1110949)

git 2.19.0:

* 'git diff' compares the index and the working tree.  For paths
   added with intent-to-add bit, the command shows the full contents
   of them as added, but the paths themselves were not marked as new
   files.  They are now shown as new by default.
* 'git apply' learned the '--intent-to-add' option so that an
   otherwise working-tree-only application of a patch will add new
   paths to the index marked with the 'intent-to-add' bit.
* 'git grep' learned the '--column' option that gives not just the
   line number but the column number of the hit.
* The '-l' option in 'git branch -l' is an unfortunate short-hand for
   '--create-reflog', but many users, both old and new, somehow expect
   it to be something else, perhaps '--list'.  This step warns when '-l'
   is used as a short-hand for '--create-reflog' and warns about the
   future repurposing of the it when it is used.
* The userdiff pattern for .php has been updated.
* The content-transfer-encoding of the message 'git send-email' sends
   out by default was 8bit, which can cause trouble when there is an
   overlong line to bust RFC 5322/2822 limit.  A new option 'auto' to
   automatically switch to quoted-printable when there is such a line
   in the payload has been introduced and is made the default.
* 'git checkout' and 'git worktree add' learned to honor
   checkout.defaultRemote when auto-vivifying a local branch out of a
   remote tracking branch in a repository with multiple remotes that
   have tracking branches that share the same names.
   (merge 8d7b558bae ab/checkout-default-remote later to maint).
* 'git grep' learned the '--only-matching' option.
* 'git rebase --rebase-merges' mode now handles octopus merges as
   well.
* Add a server-side knob to skip commits in exponential/fibbonacci
  stride in an attempt to cover wider swath of history with a smaller
  number of iterations, potentially accepting a larger packfile
  transfer, instead of going back one commit a time during common
  ancestor discovery during the 'git fetch' transaction.
  (merge 42cc7485a2 jt/fetch-negotiator-skipping later to maint).
* A new configuration variable core.usereplacerefs has been added,
  primarily to help server installations that want to ignore the
  replace mechanism altogether.
* Teach 'git tag -s' etc. a few configuration variables (gpg.format
  that can be set to 'openpgp' or 'x509', and gpg.&lt;format&gt;.program
  that is used to specify what program to use to deal with the format)
  to allow x.509 certs with CMS via 'gpgsm' to be used instead of
  openpgp via 'gnupg'.
* Many more strings are prepared for l10n.
* 'git p4 submit' learns to ask its own pre-submit hook if it should
  continue with submitting.
* The test performed at the receiving end of 'git push' to prevent
  bad objects from entering repository can be customized via
  receive.fsck.* configuration variables; we now have gained a
  counterpart to do the same on the 'git fetch' side, with
  fetch.fsck.* configuration variables.
* 'git pull --rebase=interactive' learned 'i' as a short-hand for
  'interactive'.
* 'git instaweb' has been adjusted to run better with newer Apache on
  RedHat based distros.
* 'git range-diff' is a reimplementation of 'git tbdiff' that lets us
  compare individual patches in two iterations of a topic.
* The sideband code learned to optionally paint selected keywords at
  the beginning of incoming lines on the receiving end.
* 'git branch --list' learned to take the default sort order from the
  'branch.sort' configuration variable, just like 'git tag --list'
  pays attention to 'tag.sort'.
* 'git worktree' command learned '--quiet' option to make it less
  verbose.

git 2.18.0:

* improvements to rename detection logic
* When built with more recent cURL, GIT_SSL_VERSION can now
  specify 'tlsv1.3' as its value.
* 'git mergetools' learned talking to guiffy.
* various other workflow improvements and fixes
* performance improvements and other developer visible fixes

Update to git 2.16.4: security fix release

git 2.17.1:

* Submodule 'names' come from the untrusted .gitmodules file, but
  we blindly append them to $GIT_DIR/modules to create our on-disk
  repo paths. This means you can do bad things by putting '../'
  into the name. We now enforce some rules for submodule names
  which will cause Git to ignore these malicious names
  (CVE-2018-11235, bsc#1095219)
* It was possible to trick the code that sanity-checks paths on
  NTFS into reading random piece of memory
  (CVE-2018-11233, bsc#1095218)
* Support on the server side to reject pushes to repositories
  that attempt to create such problematic .gitmodules file etc.
  as tracked contents, to help hosting sites protect their
  customers by preventing malicious contents from spreading.

git 2.17.0:

* 'diff' family of commands learned '--find-object=&lt;object-id&gt;' option
  to limit the findings to changes that involve the named object.
* 'git format-patch' learned to give 72-cols to diffstat, which is
  consistent with other line length limits the subcommand uses for
  its output meant for e-mails.
* The log from 'git daemon' can be redirected with a new option; one
  relevant use case is to send the log to standard error (instead of
  syslog) when running it from inetd.
* 'git rebase' learned to take '--allow-empty-message' option.
* 'git am' has learned the '--quit' option, in addition to the
  existing '--abort' option; having the pair mirrors a few other
  commands like 'rebase' and 'cherry-pick'.
* 'git worktree add' learned to run the post-checkout hook, just like
  'git clone' runs it upon the initial checkout.
* 'git tag' learned an explicit '--edit' option that allows the
  message given via '-m' and '-F' to be further edited.
* 'git fetch --prune-tags' may be used as a handy short-hand for
  getting rid of stale tags that are locally held.
* The new '--show-current-patch' option gives an end-user facing way
  to get the diff being applied when 'git rebase' (and 'git am')
  stops with a conflict.
* 'git add -p' used to offer '/' (look for a matching hunk) as a
  choice, even there was only one hunk, which has been corrected.
  Also the single-key help is now given only for keys that are
  enabled (e.g. help for '/' won't be shown when there is only one
  hunk).
* Since Git 1.7.9, 'git merge' defaulted to --no-ff (i.e. even when
  the side branch being merged is a descendant of the current commit,
  create a merge commit instead of fast-forwarding) when merging a
  tag object.  This was appropriate default for integrators who pull
  signed tags from their downstream contributors, but caused an
  unnecessary merges when used by downstream contributors who
  habitually 'catch up' their topic branches with tagged releases
  from the upstream.  Update 'git merge' to default to --no-ff only
  when merging a tag object that does *not* sit at its usual place in
  refs/tags/ hierarchy, and allow fast-forwarding otherwise, to
  mitigate the problem.
* 'git status' can spend a lot of cycles to compute the relation
  between the current branch and its upstream, which can now be
  disabled with '--no-ahead-behind' option.
* 'git diff' and friends learned funcname patterns for Go language
  source files.
* 'git send-email' learned '--reply-to=&lt;address&gt;' option.
* Funcname pattern used for C# now recognizes 'async' keyword.
* In a way similar to how 'git tag' learned to honor the pager
  setting only in the list mode, 'git config' learned to ignore the
  pager setting when it is used for setting values (i.e. when the
  purpose of the operation is not to 'show').
- Use %license instead of %doc [bsc#1082318]

git 2.16.3:

* 'git status' after moving a path in the working tree (hence
  making it appear 'removed') and then adding with the -N option
  (hence making that appear 'added') detected it as a rename, but
  did not report the  old and new pathnames correctly.
* 'git commit --fixup' did not allow '-m&lt;message&gt;' option to be
  used at the same time; allow it to annotate resulting commit
  with more text.
* When resetting the working tree files recursively, the working
  tree of submodules are now also reset to match.
* Fix for a commented-out code to adjust it to a rather old API
  change around object ID.
* When there are too many changed paths, 'git diff' showed a
  warning message but in the middle of a line.
* The http tracing code, often used to debug connection issues,
  learned to redact potentially sensitive information from its
  output so that it can be more safely sharable.
* Crash fix for a corner case where an error codepath tried to
  unlock what it did not acquire lock on.
* The split-index mode had a few corner case bugs fixed.
* Assorted fixes to 'git daemon'.
* Completion of 'git merge -s&lt;strategy&gt;' (in contrib/) did not
  work well in non-C locale.
* Workaround for segfault with more recent versions of SVN.
* Recently introduced leaks in fsck have been plugged.
* Travis CI integration now builds the executable in 'script'
  phase to follow the established practice, rather than during
  'before_script' phase.  This allows the CI categorize the
  failures better ('failed' is project's fault, 'errored' is
  build environment's).

- Drop superfluous xinetd snippet, no longer used (bsc#1084460)

- Build with asciidoctor for the recent distros (bsc#1075764)

- Move %{?systemd_requires} to daemon subpackage
- Create subpackage for libsecret credential helper.

git 2.16.2:

* An old regression in 'git describe --all $annotated_tag^0' has
  been fixed.
* 'git svn dcommit' did not take into account the fact that a
  svn+ssh:// URL with a username@ (typically used for pushing)
  refers to the same SVN repository without the username@ and
  failed when svn.pushmergeinfo option is set.
* 'git merge -Xours/-Xtheirs' learned to use our/their version
  when resolving a conflicting updates to a symbolic link.
* 'git clone $there $here' is allowed even when here directory
  exists as long as it is an empty directory, but the command
   incorrectly removed it upon a failure of the operation.
* 'git stash -- &lt;pathspec&gt;' incorrectly blew away untracked files
  in the directory that matched the pathspec, which has been
  corrected.
* 'git add -p' was taught to ignore local changes to submodules
  as they do not interfere with the partial addition of regular
  changes anyway.

git 2.16.1:

* 'git clone' segfaulted when cloning a project that happens to
  track two paths that differ only in case on a case insensitive
  filesystem

git 2.16.0 (CVE-2017-15298, bsc#1063412):

* See https://raw.github.com/git/git/master/Documentation/RelNotes/2.16.0.txt

git 2.15.1:

* fix 'auto' column output 
* fixes to moved lines diffing
* documentation updates
* fix use of repositories immediately under the root directory
* improve usage of libsecret
* fixes to various error conditions in git commands

- Rewrite from sysv init to systemd unit file for git-daemon
  (bsc#1069803)

- Replace references to /var/adm/fillup-templates with new 
  %_fillupdir macro (bsc#1069468)

- split off p4 to a subpackage (bsc#1067502)

- Build with the external libsha1detectcoll (bsc#1042644)

git 2.15.0:

* Use of an empty string as a pathspec element that is used for
 'everything matches' is still warned and Git asks users to use a
  more explicit '.' for that instead. Removal scheduled for 2.16
* Git now avoids blindly falling back to '.git' when the setup
  sequence said we are _not_ in Git repository (another corner
  case removed)
* 'branch --set-upstream' was retired, deprecated since 1.8
* many other improvements and updates

git 2.14.3:

* git send-email understands more cc: formats
* fixes so gitk --bisect
* git commit-tree fixed to handle -F file alike
* Prevent segfault in 'git cat-file --textconv'
* Fix function header parsing for HTML
* Various small fixes to user commands and and internal functions

git 2.14.2:

* fixes to color output
* http.{sslkey,sslCert} now interpret '~[username]/' prefix
* fixes to walking of reflogs via 'log -g' and friends
* various fixes to output correctness
* 'git push --recurse-submodules $there HEAD:$target' is now
  propagated down to the submodules
* 'git clone --recurse-submodules --quiet' c$how propagates quiet
  option down to submodules.
* 'git svn --localtime' correctness fixes
* 'git grep -L' and 'git grep --quiet -L' now report same exit code
* fixes to 'git apply' when converting line endings
* Various Perl scripts did not use safe_pipe_capture() instead 
  of backticks, leaving them susceptible to end-user input.
  CVE-2017-14867 bsc#1061041
* 'git cvsserver' no longer is invoked by 'git daemon' by
  default 

git 2.14.1 (bsc#1052481):
* Security fix for CVE-2017-1000117: A malicious third-party can
  give a crafted 'ssh://...' URL to an unsuspecting victim, and
  an attempt to visit the URL can result in any program that
  exists on the victim's machine being executed. Such a URL could
  be placed in the .gitmodules file of a malicious project, and
  an unsuspecting victim could be tricked into running
  'git clone --recurse-submodules' to trigger the vulnerability.
* A 'ssh://...' URL can result in a 'ssh' command line with a
  hostname that begins with a dash '-', which would cause the
  'ssh' command to instead (mis)treat it as an option. This is
  now prevented by forbidding such a hostname (which should not
  impact any real-world usage).
* Similarly, when GIT_PROXY_COMMAND is configured, the command
  is run with host and port that are parsed out from 'ssh://...'
  URL; a poorly written GIT_PROXY_COMMAND could be tricked into
  treating a string that begins with a dash '-' as an option.
  This is now prevented by forbidding such a hostname and port
  number (again, which should not impact any real-world usage).
* In the same spirit, a repository name that begins with a dash
  '-' is also forbidden now.

git 2.14.0:

* Use of an empty string as a pathspec element that is used for
  'everything matches' is deprecated, use '.'
* Avoid blindly falling back to '.git' when the setup sequence
  indicates operation not on a Git repository
* 'indent heuristics' are now the default.
* Builds with pcre2
* Many bug fixes, improvements and updates

git 2.13.4:

* Update the character width tables.
* Fix an alias that contained an uppercase letter
* Progress meter fixes
* git gc concurrency fixes

git 2.13.3:

* various internal bug fixes
* Fix a  regression to 'git rebase -i'
* Correct unaligned 32-bit access in pack-bitmap code
* Tighten error checks for invalid 'git apply' input
* The split index code did not honor core.sharedrepository setting
  correctly
* Fix 'git branch --list' handling of color.branch.local

git 2.13.2:

* 'collision detecting' SHA-1 update for platform fixes
* 'git checkout --recurse-submodules' did not quite work with a
  submodule that itself has submodules.
* The 'run-command' API implementation has been made more robust
  against dead-locking in a threaded environment.
* 'git clean -d' now only cleans ignored files with '-x'
* 'git status --ignored'  did not list ignored and untracked files
  without '-uall'
* 'git pull --rebase --autostash' didn't auto-stash when the local
  history fast-forwards to the upstream.
* 'git describe --contains' gives as much weight to lightweight
  tags as annotated tags
* Fix 'git stash push &lt;pathspec&gt;' from a subdirectory

git 2.13.1:

* Setting 'log.decorate=false' in the configuration file did not
  take effect in v2.13, which has been corrected.
* corrections to documentation and command help output
* garbage collection fixes
* memory leaks fixed
* receive-pack now makes sure that the push certificate records
  the same set of push options used for pushing
* shell completion corrections for git stash
* fix 'git clone --config var=val' with empty strings
* internal efficiency improvements
* Update sha1 collision detection code for big-endian platforms
  and platforms not supporting unaligned fetches

- Fix packaging of documentation

git 2.13.0:

* empty string as a pathspec element for 'everything matches'
  is still warned, for future removal.
* deprecated argument order 'git merge &lt;msg&gt; HEAD &lt;commit&gt;...'
  was removed
* default location '~/.git-credential-cache/socket' for the
  socket used to communicate with the credential-cache daemon 
  moved to '~/.cache/git/credential/socket'.
* now avoid blindly falling back to '.git' when the setup
  sequence indicated otherwise
* many workflow features, improvements and bug fixes
* add a hardened implementation of SHA1 in response to practical
  collision attacks (CVE-2005-4900, bsc#1042640)
* CVE-2017-8386: On a server running git-shell as login shell to
  restrict user to git commands, remote users may have been able
  to have git service programs spawn an interactive pager
  and thus escape the shell restrictions. (bsc#1038395)

Changes in pcre2:

- Include the libraries, development and tools packages.
  
  git uses only libpcre2-8 so far, but this allows further
  application usage of pcre2.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-14"/>
	<updated date="2020-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167890">SUSE bug 1167890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5260">CVE-2020-5260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531808" comment="git-core-2.26.0-27.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531810" comment="libpcre2-16-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531811" comment="libpcre2-32-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531812" comment="libpcre2-8-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531813" comment="libpcre2-posix2-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531814" comment="perl-CGI-4.38-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150796" version="1" class="patch">
	<metadata>
		<title>Security update for fwupdate (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008600.html" source="SUSE-SU"/>
		<description>
This update for fwupdate fixes the following issues:

- Add SBAT section to EFI images (bsc#1182057)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-08"/>
	<updated date="2021-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538834" comment="fwupdate-0.5-10.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538835" comment="fwupdate-efi-0.5-10.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538836" comment="libfwup0-0.5-10.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150797" version="1" class="patch">
	<metadata>
		<title>Security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1159133" ref_url="https://bugzilla.suse.com/1159133" source="BUGZILLA"/>
		<reference ref_id="1184221" ref_url="https://bugzilla.suse.com/1184221" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12420" ref_url="https://www.suse.com/security/cve/CVE-2019-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-1946" ref_url="https://www.suse.com/security/cve/CVE-2020-1946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008613.html" source="SUSE-SU"/>
		<description>
This update for spamassassin fixes the following issues:

- spamassassin was updated to version 3.4.5
- CVE-2019-12420: memory leak via crafted messages (bsc#1159133)
- CVE-2020-1946: security update (bsc#1184221)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-12"/>
	<updated date="2021-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159133">SUSE bug 1159133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184221">SUSE bug 1184221</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12420/">CVE-2019-12420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12420">CVE-2019-12420 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1946/">CVE-2020-1946 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1946">CVE-2020-1946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552206" comment="perl-Mail-SpamAssassin-3.4.5-44.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552207" comment="spamassassin-3.4.5-44.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150798" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1180128" ref_url="https://bugzilla.suse.com/1180128" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008639.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-3472: XChangeFeedbackControl Integer Underflow Privilege Escalation (bsc#1180128)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180128">SUSE bug 1180128</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3472">CVE-2021-3472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552208" comment="xorg-x11-server-7.6_1.18.3-76.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552209" comment="xorg-x11-server-extra-7.6_1.18.3-76.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150799" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1181256" ref_url="https://bugzilla.suse.com/1181256" source="BUGZILLA"/>
		<reference ref_id="1184532" ref_url="https://bugzilla.suse.com/1184532" source="BUGZILLA"/>
		<reference ref_id="1184533" ref_url="https://bugzilla.suse.com/1184533" source="BUGZILLA"/>
		<reference ref_id="1184534" ref_url="https://bugzilla.suse.com/1184534" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-1252" ref_url="https://www.suse.com/security/cve/CVE-2021-1252/" source="CVE"/>
		<reference ref_id="CVE-2021-1404" ref_url="https://www.suse.com/security/cve/CVE-2021-1404/" source="CVE"/>
		<reference ref_id="CVE-2021-1405" ref_url="https://www.suse.com/security/cve/CVE-2021-1405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008638.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2021-1252: Fix for Excel XLM parser infinite loop. (bsc#1184532)
- CVE-2021-1404: Fix for PDF parser buffer over-read; possible crash. (bsc#1184533)
- CVE-2021-1405: Fix for mail parser NULL-dereference crash. (bsc#1184534)
- Fix errors when scanning files &gt; 4G (bsc#1181256)
- Update clamav.keyring
- Update to 0.103.2
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181256">SUSE bug 1181256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184532">SUSE bug 1184532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184533">SUSE bug 1184533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184534">SUSE bug 1184534</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1252/">CVE-2021-1252 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1252">CVE-2021-1252 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1404/">CVE-2021-1404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1404">CVE-2021-1404 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1405/">CVE-2021-1405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1405">CVE-2021-1405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552210" comment="clamav-0.103.2-33.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150800" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1172383" ref_url="https://bugzilla.suse.com/1172383" source="BUGZILLA"/>
		<reference ref_id="1172384" ref_url="https://bugzilla.suse.com/1172384" source="BUGZILLA"/>
		<reference ref_id="1172385" ref_url="https://bugzilla.suse.com/1172385" source="BUGZILLA"/>
		<reference ref_id="1172386" ref_url="https://bugzilla.suse.com/1172386" source="BUGZILLA"/>
		<reference ref_id="1172478" ref_url="https://bugzilla.suse.com/1172478" source="BUGZILLA"/>
		<reference ref_id="1173612" ref_url="https://bugzilla.suse.com/1173612" source="BUGZILLA"/>
		<reference ref_id="1174386" ref_url="https://bugzilla.suse.com/1174386" source="BUGZILLA"/>
		<reference ref_id="1174641" ref_url="https://bugzilla.suse.com/1174641" source="BUGZILLA"/>
		<reference ref_id="1175441" ref_url="https://bugzilla.suse.com/1175441" source="BUGZILLA"/>
		<reference ref_id="1176673" ref_url="https://bugzilla.suse.com/1176673" source="BUGZILLA"/>
		<reference ref_id="1176682" ref_url="https://bugzilla.suse.com/1176682" source="BUGZILLA"/>
		<reference ref_id="1176684" ref_url="https://bugzilla.suse.com/1176684" source="BUGZILLA"/>
		<reference ref_id="1178174" ref_url="https://bugzilla.suse.com/1178174" source="BUGZILLA"/>
		<reference ref_id="1178934" ref_url="https://bugzilla.suse.com/1178934" source="BUGZILLA"/>
		<reference ref_id="1179467" ref_url="https://bugzilla.suse.com/1179467" source="BUGZILLA"/>
		<reference ref_id="1179468" ref_url="https://bugzilla.suse.com/1179468" source="BUGZILLA"/>
		<reference ref_id="1180523" ref_url="https://bugzilla.suse.com/1180523" source="BUGZILLA"/>
		<reference ref_id="1181108" ref_url="https://bugzilla.suse.com/1181108" source="BUGZILLA"/>
		<reference ref_id="1181639" ref_url="https://bugzilla.suse.com/1181639" source="BUGZILLA"/>
		<reference ref_id="1182137" ref_url="https://bugzilla.suse.com/1182137" source="BUGZILLA"/>
		<reference ref_id="1182425" ref_url="https://bugzilla.suse.com/1182425" source="BUGZILLA"/>
		<reference ref_id="1182577" ref_url="https://bugzilla.suse.com/1182577" source="BUGZILLA"/>
		<reference ref_id="1182968" ref_url="https://bugzilla.suse.com/1182968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11947" ref_url="https://www.suse.com/security/cve/CVE-2020-11947/" source="CVE"/>
		<reference ref_id="CVE-2020-12829" ref_url="https://www.suse.com/security/cve/CVE-2020-12829/" source="CVE"/>
		<reference ref_id="CVE-2020-13361" ref_url="https://www.suse.com/security/cve/CVE-2020-13361/" source="CVE"/>
		<reference ref_id="CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362/" source="CVE"/>
		<reference ref_id="CVE-2020-13659" ref_url="https://www.suse.com/security/cve/CVE-2020-13659/" source="CVE"/>
		<reference ref_id="CVE-2020-13765" ref_url="https://www.suse.com/security/cve/CVE-2020-13765/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-15469" ref_url="https://www.suse.com/security/cve/CVE-2020-15469/" source="CVE"/>
		<reference ref_id="CVE-2020-15863" ref_url="https://www.suse.com/security/cve/CVE-2020-15863/" source="CVE"/>
		<reference ref_id="CVE-2020-16092" ref_url="https://www.suse.com/security/cve/CVE-2020-16092/" source="CVE"/>
		<reference ref_id="CVE-2020-25084" ref_url="https://www.suse.com/security/cve/CVE-2020-25084/" source="CVE"/>
		<reference ref_id="CVE-2020-25624" ref_url="https://www.suse.com/security/cve/CVE-2020-25624/" source="CVE"/>
		<reference ref_id="CVE-2020-25625" ref_url="https://www.suse.com/security/cve/CVE-2020-25625/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-27617" ref_url="https://www.suse.com/security/cve/CVE-2020-27617/" source="CVE"/>
		<reference ref_id="CVE-2020-28916" ref_url="https://www.suse.com/security/cve/CVE-2020-28916/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29443" ref_url="https://www.suse.com/security/cve/CVE-2020-29443/" source="CVE"/>
		<reference ref_id="CVE-2021-20181" ref_url="https://www.suse.com/security/cve/CVE-2021-20181/" source="CVE"/>
		<reference ref_id="CVE-2021-20203" ref_url="https://www.suse.com/security/cve/CVE-2021-20203/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-3416" ref_url="https://www.suse.com/security/cve/CVE-2021-3416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- Fix OOB access in sm501 device emulation (CVE-2020-12829, bsc#1172385)
- Fix OOB access possibility in MegaRAID SAS 8708EM2 emulation (CVE-2020-13362 bsc#1172383)
- Fix use-after-free in usb xhci packet handling (CVE-2020-25723, bsc#1178934)
- Fix use-after-free in usb ehci packet handling (CVE-2020-25084, bsc#1176673)
- Fix OOB access in usb hcd-ohci emulation (CVE-2020-25624, bsc#1176682)
- Fix infinite loop (DoS) in usb hcd-ohci emulation (CVE-2020-25625, bsc#1176684)
- Fix guest triggerable assert in shared network handling code (CVE-2020-27617, bsc#1178174)
- Fix infinite loop (DoS) in e1000e device emulation (CVE-2020-28916, bsc#1179468)
- Fix OOB access in atapi emulation (CVE-2020-29443, bsc#1181108)
- Fix null pointer deref. (DoS) in mmio ops (CVE-2020-15469, bsc#1173612)
- Fix infinite loop (DoS) in e1000 device emulation (CVE-2021-20257, bsc#1182577)
- Fix OOB access (stack overflow) in rtl8139 NIC emulation (CVE-2021-3416, bsc#1182968)
- Fix OOB access (stack overflow) in other NIC emulations (CVE-2021-3416)
- Fix OOB access in SLIRP ARP packet processing (CVE-2020-29130, bsc#1179467)
- Fix null pointer dereference possibility (DoS) in MegaRAID SAS 8708EM2 emulation (CVE-2020-13659 bsc#1172386
- Fix OOB access in iscsi (CVE-2020-11947 bsc#1180523)
- Fix OOB access in vmxnet3 emulation (CVE-2021-20203 bsc#1181639)
- Fix buffer overflow in the XGMAC device (CVE-2020-15863, bsc#1174386)
- Fix DoS in packet processing of various emulated NICs (CVE-2020-16092 bsc#1174641)
- Fix OOB access while processing USB packets (CVE-2020-14364 bsc#1175441)
- Fix package scripts to not use hard coded paths for temporary working directories and log files (bsc#1182425)
- Fix potential privilege escalation in virtfs (CVE-2021-20181 bsc#1182137)
- Fix OOB access possibility in ES1370 audio device emulation (CVE-2020-13361 bsc#1172384)
- Fix OOB access in ROM loading (CVE-2020-13765 bsc#1172478)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-16"/>
	<updated date="2021-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172383">SUSE bug 1172383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172384">SUSE bug 1172384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172385">SUSE bug 1172385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172386">SUSE bug 1172386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172478">SUSE bug 1172478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173612">SUSE bug 1173612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174386">SUSE bug 1174386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174641">SUSE bug 1174641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175441">SUSE bug 1175441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176673">SUSE bug 1176673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176682">SUSE bug 1176682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176684">SUSE bug 1176684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178174">SUSE bug 1178174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178934">SUSE bug 1178934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179468">SUSE bug 1179468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180523">SUSE bug 1180523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181108">SUSE bug 1181108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181639">SUSE bug 1181639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182137">SUSE bug 1182137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182425">SUSE bug 1182425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182577">SUSE bug 1182577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182968">SUSE bug 1182968</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11947/">CVE-2020-11947 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11947">CVE-2020-11947 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12829/">CVE-2020-12829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12829">CVE-2020-12829 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13361/">CVE-2020-13361 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13361">CVE-2020-13361 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13362">CVE-2020-13362 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13659/">CVE-2020-13659 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13659">CVE-2020-13659 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13765/">CVE-2020-13765 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13765">CVE-2020-13765 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15469/">CVE-2020-15469 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15469">CVE-2020-15469 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15863/">CVE-2020-15863 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15863">CVE-2020-15863 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16092/">CVE-2020-16092 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16092">CVE-2020-16092 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25084/">CVE-2020-25084 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25084">CVE-2020-25084 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25624/">CVE-2020-25624 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25624">CVE-2020-25624 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25625/">CVE-2020-25625 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25625">CVE-2020-25625 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25723">CVE-2020-25723 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27617/">CVE-2020-27617 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27617">CVE-2020-27617 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28916/">CVE-2020-28916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28916">CVE-2020-28916 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29443/">CVE-2020-29443 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29443">CVE-2020-29443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20181/">CVE-2021-20181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20181">CVE-2021-20181 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20203/">CVE-2021-20203 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20203">CVE-2021-20203 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3416/">CVE-2021-3416 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3416">CVE-2021-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555875" comment="qemu-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555876" comment="qemu-block-curl-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555877" comment="qemu-block-iscsi-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538845" comment="qemu-block-rbd-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555878" comment="qemu-block-ssh-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555879" comment="qemu-guest-agent-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538848" comment="qemu-ipxe-1.0.0+-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538849" comment="qemu-kvm-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555880" comment="qemu-lang-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538852" comment="qemu-seabios-1.10.2_0_g5f4c7b1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538853" comment="qemu-sgabios-8-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555881" comment="qemu-tools-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538855" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538856" comment="qemu-x86-2.9.1-6.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150801" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1182431" ref_url="https://bugzilla.suse.com/1182431" source="BUGZILLA"/>
		<reference ref_id="1182846" ref_url="https://bugzilla.suse.com/1182846" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-27379" ref_url="https://www.suse.com/security/cve/CVE-2021-27379/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008654.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-20257: xen: infinite loop issue in the e1000 NIC emulator (bsc#1182846).
- CVE-2021-27379: Fixed an issue where entries in the IOMMU were not being updated 
  under certain circumstances due to improper backport of XSA-321 (XSA-366, bsc#1182431).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-19"/>
	<updated date="2021-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182431">SUSE bug 1182431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27379/">CVE-2021-27379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27379">CVE-2021-27379 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538857" comment="xen-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538858" comment="xen-doc-html-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538859" comment="xen-libs-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538860" comment="xen-libs-32bit-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538861" comment="xen-tools-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538862" comment="xen-tools-domU-4.9.4_16-3.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150802" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1183936" ref_url="https://bugzilla.suse.com/1183936" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008663.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- L3: Tenable Scan reports sudo is vulnerable to CVE-2021-3156 (bsc#1183936)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183936">SUSE bug 1183936</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3156">CVE-2021-3156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555882" comment="sudo-1.8.20p2-3.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150803" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1184960" ref_url="https://bugzilla.suse.com/1184960" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.10.0 ESR (bsc#1184960)
  * CVE-2021-23994: Out of bound write due to lazy initialization
  * CVE-2021-23995: Use-after-free in Responsive Design Mode
  * CVE-2021-23998: Secure Lock icon could have been spoofed
  * CVE-2021-23961: More internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23999: Blob URLs may have been granted additional privileges
  * CVE-2021-24002: Arbitrary FTP command execution on FTP servers using an encoded URL
  * CVE-2021-29945: Incorrect size computation in WebAssembly JIT could lead to null-reads
  * CVE-2021-29946: Port blocking could be bypassed
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-27"/>
	<updated date="2021-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23961">CVE-2021-23961 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23994">CVE-2021-23994 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23995">CVE-2021-23995 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23998">CVE-2021-23998 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23999">CVE-2021-23999 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24002">CVE-2021-24002 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29945">CVE-2021-29945 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29946">CVE-2021-29946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552225" comment="MozillaFirefox-78.10.0-112.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552226" comment="MozillaFirefox-devel-78.10.0-112.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552227" comment="MozillaFirefox-translations-common-78.10.0-112.57.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150804" version="1" class="patch">
	<metadata>
		<title>Security update for libnettle (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1183835" ref_url="https://bugzilla.suse.com/1183835" source="BUGZILLA"/>
		<reference ref_id="1184401" ref_url="https://bugzilla.suse.com/1184401" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20305" ref_url="https://www.suse.com/security/cve/CVE-2021-20305/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008682.html" source="SUSE-SU"/>
		<description>
This update for libnettle fixes the following issues:

- CVE-2021-20305: Fixed the multiply function which was being called with out-of-range scalars (bsc#1184401, bsc#1183835).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183835">SUSE bug 1183835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184401">SUSE bug 1184401</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20305/">CVE-2021-20305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20305">CVE-2021-20305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552228" comment="libhogweed2-2.7.1-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538876" comment="libhogweed2-32bit-2.7.1-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552229" comment="libnettle4-2.7.1-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538878" comment="libnettle4-32bit-2.7.1-13.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150805" version="1" class="patch">
	<metadata>
		<title>Security update for gdm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1184456" ref_url="https://bugzilla.suse.com/1184456" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008681.html" source="SUSE-SU"/>
		<description>
This update for gdm fixes the following issues:

-  Avoid the signal SIGTRAP when gdm exits (bsc#1184456).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184456">SUSE bug 1184456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552230" comment="gdm-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538880" comment="gdm-lang-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538881" comment="gdmflexiserver-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552231" comment="libgdm1-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552232" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150806" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1182909" ref_url="https://bugzilla.suse.com/1182909" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25329" ref_url="https://www.suse.com/security/cve/CVE-2021-25329/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008703.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2021-25329: Complete fix for CVE-2020-9484 (bsc#1182909)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182909">SUSE bug 1182909</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25329/">CVE-2021-25329 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25329">CVE-2021-25329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538884" comment="tomcat-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538885" comment="tomcat-admin-webapps-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538886" comment="tomcat-docs-webapp-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538887" comment="tomcat-el-3_0-api-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538888" comment="tomcat-javadoc-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538889" comment="tomcat-jsp-2_3-api-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538890" comment="tomcat-lib-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538891" comment="tomcat-servlet-3_1-api-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538892" comment="tomcat-webapps-8.0.53-29.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150807" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008701.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.25 - OpenJDK 7u291 (January 2021 CPU, bsc#1181239)
  * Security fixes
    + JDK-8247619: Improve Direct Buffering of Characters
  * Import of OpenJDK 7 u291 build 1
    + JDK-8254177: (tz) Upgrade time-zone data to tzdata2020b
    + JDK-8254982: (tz) Upgrade time-zone data to tzdata2020c
    + JDK-8255226: (tz) Upgrade time-zone data to tzdata2020d
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552233" comment="java-1_7_0-openjdk-1.7.0.291-43.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552234" comment="java-1_7_0-openjdk-demo-1.7.0.291-43.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552235" comment="java-1_7_0-openjdk-devel-1.7.0.291-43.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552236" comment="java-1_7_0-openjdk-headless-1.7.0.291-43.47.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150808" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1184161" ref_url="https://bugzilla.suse.com/1184161" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25317" ref_url="https://www.suse.com/security/cve/CVE-2021-25317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008713.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2021-25317: ownership of /var/log/cups could allow privilege escalation from lp user to root via symlink attacks (bsc#1184161)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184161">SUSE bug 1184161</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-25317/">CVE-2021-25317 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25317">CVE-2021-25317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552282" comment="cups-1.7.5-20.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552283" comment="cups-client-1.7.5-20.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552284" comment="cups-libs-1.7.5-20.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538900" comment="cups-libs-32bit-1.7.5-20.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150809" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1181495" ref_url="https://bugzilla.suse.com/1181495" source="BUGZILLA"/>
		<reference ref_id="1185345" ref_url="https://bugzilla.suse.com/1185345" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214/" source="CVE"/>
		<reference ref_id="CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215/" source="CVE"/>
		<reference ref_id="CVE-2021-25216" ref_url="https://www.suse.com/security/cve/CVE-2021-25216/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008723.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25214: Fixed a broken inbound incremental zone update (IXFR) which could have caused named to terminate unexpectedly (bsc#1185345).
- CVE-2021-25215: Fixed an assertion check which could have failed while answering queries for DNAME records that required the DNAME to be processed to resolve itself (bsc#1185345).
- CVE-2021-25216: Fixed an issue where policy negotiation can be targeted by a buffer overflow attack (bsc#1185345).
- MD5 warning message using host, dig, nslookup (bind-utils) with FIPS enabled (bsc#1181495).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181495">SUSE bug 1181495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25214">CVE-2021-25214 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25215">CVE-2021-25215 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25216/">CVE-2021-25216 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25216">CVE-2021-25216 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552285" comment="bind-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552286" comment="bind-chrootenv-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538903" comment="bind-doc-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552287" comment="bind-libs-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538905" comment="bind-libs-32bit-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552288" comment="bind-utils-9.9.9P1-63.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150810" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1178469" ref_url="https://bugzilla.suse.com/1178469" source="BUGZILLA"/>
		<reference ref_id="1179156" ref_url="https://bugzilla.suse.com/1179156" source="BUGZILLA"/>
		<reference ref_id="1184677" ref_url="https://bugzilla.suse.com/1184677" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008729.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-20254: Fixed a buffer overrun in sids_to_unixids() (bsc#1184677).
- Avoid free'ing our own pointer in memcache when memcache_trim attempts to reduce cache size (bsc#1179156).
- Adjust smbcacls '--propagate-inheritance' feature to align with upstream (bsc#1178469).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178469">SUSE bug 1178469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179156">SUSE bug 1179156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184677">SUSE bug 1184677</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20254">CVE-2021-20254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555883" comment="libdcerpc-binding0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538908" comment="libdcerpc-binding0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555884" comment="libdcerpc0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538910" comment="libdcerpc0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555885" comment="libndr-krb5pac0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538912" comment="libndr-krb5pac0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555886" comment="libndr-nbt0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538914" comment="libndr-nbt0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555887" comment="libndr-standard0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538916" comment="libndr-standard0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555888" comment="libndr0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538918" comment="libndr0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555889" comment="libnetapi0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538920" comment="libnetapi0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555890" comment="libsamba-credentials0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538922" comment="libsamba-credentials0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555891" comment="libsamba-errors0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538924" comment="libsamba-errors0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555892" comment="libsamba-hostconfig0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538926" comment="libsamba-hostconfig0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555893" comment="libsamba-passdb0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538928" comment="libsamba-passdb0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555894" comment="libsamba-util0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538930" comment="libsamba-util0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555895" comment="libsamdb0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538932" comment="libsamdb0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555896" comment="libsmbclient0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538934" comment="libsmbclient0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555897" comment="libsmbconf0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538936" comment="libsmbconf0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555898" comment="libsmbldap0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538938" comment="libsmbldap0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555899" comment="libtevent-util0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538940" comment="libtevent-util0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555900" comment="libwbclient0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538942" comment="libwbclient0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555901" comment="samba-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555902" comment="samba-client-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538945" comment="samba-client-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538946" comment="samba-doc-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555903" comment="samba-libs-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538948" comment="samba-libs-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555904" comment="samba-winbind-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538950" comment="samba-winbind-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150811" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1184521" ref_url="https://bugzilla.suse.com/1184521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1494-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008929.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2021-3468: avoid infinite loop by handling  HUP event in client_work (bsc#1184521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-03"/>
	<updated date="2021-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184521">SUSE bug 1184521</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3468">CVE-2021-3468 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552289" comment="avahi-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538952" comment="avahi-lang-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552290" comment="avahi-utils-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552291" comment="libavahi-client3-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538955" comment="libavahi-client3-32bit-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552292" comment="libavahi-common3-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538957" comment="libavahi-common3-32bit-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552293" comment="libavahi-core7-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552294" comment="libavahi-glib1-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538960" comment="libavahi-glib1-32bit-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552295" comment="libdns_sd-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538962" comment="libdns_sd-32bit-0.6.32-32.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150812" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="CVE-2020-27619" ref_url="https://www.suse.com/security/cve/CVE-2020-27619/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008779.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Security issues fixed:

- CVE-2020-27619: where Lib/test/multibytecodec_support calls eval() on content retrieved via HTTP. (bsc#1178009)

Other fixes:

- Make sure to close the 'import_failed.map' file after the exception
  has been raised in order to avoid ResourceWarnings when the
  failing import is part of a try...except block
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-17"/>
	<updated date="2021-05-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27619/">CVE-2020-27619 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27619">CVE-2020-27619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552303" comment="libpython3_4m1_0-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552304" comment="python3-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552305" comment="python3-base-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552306" comment="python3-curses-3.4.10-25.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150813" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1120163" ref_url="https://bugzilla.suse.com/1120163" source="BUGZILLA"/>
		<reference ref_id="1152974" ref_url="https://bugzilla.suse.com/1152974" source="BUGZILLA"/>
		<reference ref_id="1152975" ref_url="https://bugzilla.suse.com/1152975" source="BUGZILLA"/>
		<reference ref_id="1155179" ref_url="https://bugzilla.suse.com/1155179" source="BUGZILLA"/>
		<reference ref_id="1155184" ref_url="https://bugzilla.suse.com/1155184" source="BUGZILLA"/>
		<reference ref_id="1155186" ref_url="https://bugzilla.suse.com/1155186" source="BUGZILLA"/>
		<reference ref_id="1159483" ref_url="https://bugzilla.suse.com/1159483" source="BUGZILLA"/>
		<reference ref_id="1165629" ref_url="https://bugzilla.suse.com/1165629" source="BUGZILLA"/>
		<reference ref_id="1165823" ref_url="https://bugzilla.suse.com/1165823" source="BUGZILLA"/>
		<reference ref_id="1172247" ref_url="https://bugzilla.suse.com/1172247" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1176720" ref_url="https://bugzilla.suse.com/1176720" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177855" ref_url="https://bugzilla.suse.com/1177855" source="BUGZILLA"/>
		<reference ref_id="1177856" ref_url="https://bugzilla.suse.com/1177856" source="BUGZILLA"/>
		<reference ref_id="1178181" ref_url="https://bugzilla.suse.com/1178181" source="BUGZILLA"/>
		<reference ref_id="1178634" ref_url="https://bugzilla.suse.com/1178634" source="BUGZILLA"/>
		<reference ref_id="1179575" ref_url="https://bugzilla.suse.com/1179575" source="BUGZILLA"/>
		<reference ref_id="1182047" ref_url="https://bugzilla.suse.com/1182047" source="BUGZILLA"/>
		<reference ref_id="1182261" ref_url="https://bugzilla.suse.com/1182261" source="BUGZILLA"/>
		<reference ref_id="1182715" ref_url="https://bugzilla.suse.com/1182715" source="BUGZILLA"/>
		<reference ref_id="1182716" ref_url="https://bugzilla.suse.com/1182716" source="BUGZILLA"/>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183022" ref_url="https://bugzilla.suse.com/1183022" source="BUGZILLA"/>
		<reference ref_id="1183069" ref_url="https://bugzilla.suse.com/1183069" source="BUGZILLA"/>
		<reference ref_id="1183593" ref_url="https://bugzilla.suse.com/1183593" source="BUGZILLA"/>
		<reference ref_id="1184120" ref_url="https://bugzilla.suse.com/1184120" source="BUGZILLA"/>
		<reference ref_id="1184167" ref_url="https://bugzilla.suse.com/1184167" source="BUGZILLA"/>
		<reference ref_id="1184168" ref_url="https://bugzilla.suse.com/1184168" source="BUGZILLA"/>
		<reference ref_id="1184194" ref_url="https://bugzilla.suse.com/1184194" source="BUGZILLA"/>
		<reference ref_id="1184198" ref_url="https://bugzilla.suse.com/1184198" source="BUGZILLA"/>
		<reference ref_id="1184208" ref_url="https://bugzilla.suse.com/1184208" source="BUGZILLA"/>
		<reference ref_id="1184211" ref_url="https://bugzilla.suse.com/1184211" source="BUGZILLA"/>
		<reference ref_id="1184391" ref_url="https://bugzilla.suse.com/1184391" source="BUGZILLA"/>
		<reference ref_id="1184393" ref_url="https://bugzilla.suse.com/1184393" source="BUGZILLA"/>
		<reference ref_id="1184397" ref_url="https://bugzilla.suse.com/1184397" source="BUGZILLA"/>
		<reference ref_id="1184509" ref_url="https://bugzilla.suse.com/1184509" source="BUGZILLA"/>
		<reference ref_id="1184583" ref_url="https://bugzilla.suse.com/1184583" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1185248" ref_url="https://bugzilla.suse.com/1185248" source="BUGZILLA"/>
		<reference ref_id="1185555" ref_url="https://bugzilla.suse.com/1185555" source="BUGZILLA"/>
		<reference ref_id="1185556" ref_url="https://bugzilla.suse.com/1185556" source="BUGZILLA"/>
		<reference ref_id="1185557" ref_url="https://bugzilla.suse.com/1185557" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0433" ref_url="https://www.suse.com/security/cve/CVE-2020-0433/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-27673" ref_url="https://www.suse.com/security/cve/CVE-2020-27673/" source="CVE"/>
		<reference ref_id="CVE-2020-36312" ref_url="https://www.suse.com/security/cve/CVE-2020-36312/" source="CVE"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-20219" ref_url="https://www.suse.com/security/cve/CVE-2021-20219/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28038" ref_url="https://www.suse.com/security/cve/CVE-2021-28038/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950/" source="CVE"/>
		<reference ref_id="CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-29264" ref_url="https://www.suse.com/security/cve/CVE-2021-29264/" source="CVE"/>
		<reference ref_id="CVE-2021-29265" ref_url="https://www.suse.com/security/cve/CVE-2021-29265/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-36312: Fixed an issue in virt/kvm/kvm_main.c that had a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure (bnc#1184509).
- CVE-2021-29650: Fixed an issue inside the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).
- CVE-2020-27673: Fixed an issue in Xen where a guest OS users could have caused a denial of service (host OS hang) via a high rate of events to dom0 (bnc#1177411, bnc#1184583).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bnc#1184391).
- CVE-2020-25673: Fixed NFC endless loops caused by repeated llcp_sock_connect() (bsc#1178181).
- CVE-2020-25672: Fixed NFC memory leak in llcp_sock_connect() (bsc#1178181).
- CVE-2020-25671: Fixed NFC refcount leak in llcp_sock_connect() (bsc#1178181).
- CVE-2020-25670: Fixed NFC refcount leak in llcp_sock_bind() (bsc#1178181).
- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h where a 'stall on CPU' could have occured because a retry loop continually finds the same bad inode (bnc#1184194, bnc#1184211).
- CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bnc#1184211).
- CVE-2021-30002: Fixed a memory leak issue when a webcam device exists (bnc#1184120).
- CVE-2021-3483: Fixed a use-after-free bug in nosy_ioctl() (bsc#1184393).
- CVE-2021-20219: Fixed a denial of service vulnerability in drivers/tty/n_tty.c of the Linux kernel. In this flaw a local attacker with a normal user privilege could have delayed the loop and cause a threat to the system availability (bnc#1184397).
- CVE-2021-29265: Fixed an issue in usbip_sockfd_store in drivers/usb/usbip/stub_dev.c that allowed attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status (bnc#1184167).
- CVE-2021-29264: Fixed an issue in drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver that allowed attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled (bnc#1184168).
- CVE-2021-28972: Fixed an issue in drivers/pci/hotplug/rpadlpar_sysfs.c where the RPA PCI Hotplug driver had a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\0' termination (bnc#1184198).
- CVE-2021-28660: Fixed rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c that allowed writing beyond the end of the ssid array (bnc#1183593).
- CVE-2020-0433: Fixed blk_mq_queue_tag_busy_iter of blk-mq-tag.c, where a possible use after free due to improper locking could have happened. This could have led to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1176720).
- CVE-2021-28038: Fixed an issue with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931 (bnc#1183022, bnc#1183069).
- CVE-2021-27365: Fixed an issue inside the iSCSI data structures that does not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bnc#1182715).
- CVE-2021-27363: Fixed an issue with a kernel pointer leak that could have been used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables (bnc#1182716).
- CVE-2021-27364: Fixed an issue in drivers/scsi/scsi_transport_iscsi.c where an unprivileged user can craft Netlink messages (bnc#1182717).
- CVE-2020-1749: Fixed a flaw inside of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality (bnc#1165629).

The following non-security bugs were fixed:

- bluetooth: eliminate the potential race condition when removing the HCI controller (bsc#1184611).
- Btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).
- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).
- btrfs: Cleanup try_flush_qgroup (bsc#1182047).
- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: drop unused parameter qgroup_reserved (bsc#1182261).
- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1182261).
- btrfs: fix qgroup_free wrong num_bytes in btrfs_subvolume_reserve_metadata (bsc#1182261).
- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).
- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).
- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).
- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).
- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).
- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).
- btrfs: qgroup: Do not hold qgroup_ioctl_lock in btrfs_qgroup_inherit() (bsc#1165823).
- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).
- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).
- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).
- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).
- btrfs: qgroup: Fix reserved data space leak if we have multiple reserve calls (bsc#1152975).
- btrfs: qgroup: Fix the wrong target io_tree when freeing reserved data space (bsc#1152974).
- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).
- btrfs: qgroup: mark qgroup inconsistent if we're inherting snapshot to a new qgroup (bsc#1165823).
- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).
- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).
- btrfs: remove unused parameter from btrfs_subvolume_release_metadata (bsc#1182261).
- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).
- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- hv_netvsc: remove ndo_poll_controller (bsc#1185248).
- KVM: Add proper lockdep assertion in I/O bus unregister (bsc#1185555).
- KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU (bsc#1185556).
- KVM: Stop looking for coalesced MMIO zones if the bus is destroyed (bsc#1185557).
- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).
- Xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-18"/>
	<updated date="2021-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120163">SUSE bug 1120163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152974">SUSE bug 1152974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152975">SUSE bug 1152975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155179">SUSE bug 1155179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155184">SUSE bug 1155184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155186">SUSE bug 1155186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159483">SUSE bug 1159483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165629">SUSE bug 1165629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165823">SUSE bug 1165823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172247">SUSE bug 1172247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176720">SUSE bug 1176720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177855">SUSE bug 1177855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177856">SUSE bug 1177856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178634">SUSE bug 1178634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179575">SUSE bug 1179575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182047">SUSE bug 1182047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182261">SUSE bug 1182261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183069">SUSE bug 1183069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183593">SUSE bug 1183593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184120">SUSE bug 1184120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184167">SUSE bug 1184167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184168">SUSE bug 1184168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184194">SUSE bug 1184194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184393">SUSE bug 1184393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184397">SUSE bug 1184397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184509">SUSE bug 1184509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184583">SUSE bug 1184583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185248">SUSE bug 1185248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185555">SUSE bug 1185555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185556">SUSE bug 1185556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185557">SUSE bug 1185557</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0433/">CVE-2020-0433 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0433">CVE-2020-0433 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25670">CVE-2020-25670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25671">CVE-2020-25671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25672">CVE-2020-25672 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25673">CVE-2020-25673 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27673/">CVE-2020-27673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27673">CVE-2020-27673 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36312/">CVE-2020-36312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36312">CVE-2020-36312 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20219/">CVE-2021-20219 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20219">CVE-2021-20219 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28038/">CVE-2021-28038 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28038">CVE-2021-28038 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28660">CVE-2021-28660 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28950">CVE-2021-28950 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28972">CVE-2021-28972 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29264/">CVE-2021-29264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29264">CVE-2021-29264 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29265/">CVE-2021-29265 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29265">CVE-2021-29265 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29650">CVE-2021-29650 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30002">CVE-2021-30002 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3483">CVE-2021-3483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555905" comment="kernel-default-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555906" comment="kernel-default-base-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555907" comment="kernel-default-devel-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538972" comment="kernel-devel-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538973" comment="kernel-macros-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538974" comment="kernel-source-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555908" comment="kernel-syms-4.4.180-94.144.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150814" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1185900" ref_url="https://bugzilla.suse.com/1185900" source="BUGZILLA"/>
		<reference ref_id="1185904" ref_url="https://bugzilla.suse.com/1185904" source="BUGZILLA"/>
		<reference ref_id="1185905" ref_url="https://bugzilla.suse.com/1185905" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18804" ref_url="https://www.suse.com/security/cve/CVE-2019-18804/" source="CVE"/>
		<reference ref_id="CVE-2021-32491" ref_url="https://www.suse.com/security/cve/CVE-2021-32491/" source="CVE"/>
		<reference ref_id="CVE-2021-32492" ref_url="https://www.suse.com/security/cve/CVE-2021-32492/" source="CVE"/>
		<reference ref_id="CVE-2021-32493" ref_url="https://www.suse.com/security/cve/CVE-2021-32493/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008794.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

Security issues fixed:

- CVE-2021-32491 [bsc#1185900]: Integer overflow in function render() in tools/ddjvu via crafted djvu file
- CVE-2021-32492 [bsc#1185904]: Out of bounds read in function DJVU:DataPool:has_data() via crafted djvu file
- CVE-2021-32493 [bsc#1185905]: Heap buffer overflow in function DJVU:GBitmap:decode() via crafted djvu file
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185900">SUSE bug 1185900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185904">SUSE bug 1185904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185905">SUSE bug 1185905</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18804/">CVE-2019-18804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18804">CVE-2019-18804 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32491/">CVE-2021-32491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32491">CVE-2021-32491 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32492/">CVE-2021-32492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32492">CVE-2021-32492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32493/">CVE-2021-32493 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32493">CVE-2021-32493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552307" comment="libdjvulibre21-3.5.25.3-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150815" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1185833" ref_url="https://bugzilla.suse.com/1185833" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-18032" ref_url="https://www.suse.com/security/cve/CVE-2020-18032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008793.html" source="SUSE-SU"/>
		<description>
This update for graphviz fixes the following issues:

- CVE-2020-18032: Fixed possible remote code execution via buffer overflow (bsc#1185833).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185833">SUSE bug 1185833</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-18032/">CVE-2020-18032 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18032">CVE-2020-18032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552308" comment="graphviz-2.28.0-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552309" comment="graphviz-gd-2.28.0-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552310" comment="graphviz-gnome-2.28.0-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552311" comment="graphviz-tcl-2.28.0-29.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150816" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="1185698" ref_url="https://bugzilla.suse.com/1185698" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008798.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:

CVE-2021-3537: NULL pointer dereference in valid.c:xmlValidBuildAContentModel (bsc#1185698)
- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in entities.c:xmlEncodeEntitiesInternal (bsc#1185409).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185698">SUSE bug 1185698</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">CVE-2021-3537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552312" comment="libxml2-2-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538983" comment="libxml2-2-32bit-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538984" comment="libxml2-doc-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552313" comment="libxml2-tools-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552314" comment="python-libxml2-2.9.4-46.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150817" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1176076" ref_url="https://bugzilla.suse.com/1176076" source="BUGZILLA"/>
		<reference ref_id="1177077" ref_url="https://bugzilla.suse.com/1177077" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681/" source="CVE"/>
		<reference ref_id="CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682/" source="CVE"/>
		<reference ref_id="CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683/" source="CVE"/>
		<reference ref_id="CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684/" source="CVE"/>
		<reference ref_id="CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685/" source="CVE"/>
		<reference ref_id="CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686/" source="CVE"/>
		<reference ref_id="CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- bsc#1177077: Fixed DNSpooq vulnerabilities
- CVE-2020-25684, CVE-2020-25685, CVE-2020-25686:
  Fixed multiple Cache Poisoning attacks.
- CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687:
  Fixed multiple potential Heap-based overflows when DNSSEC is
  enabled.

- Retry query to other servers on receipt of SERVFAIL rcode
  (bsc#1176076)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-19"/>
	<updated date="2021-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176076">SUSE bug 1176076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25681">CVE-2020-25681 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25682">CVE-2020-25682 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25683">CVE-2020-25683 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25684">CVE-2020-25684 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25685">CVE-2020-25685 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25686">CVE-2020-25686 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25687">CVE-2020-25687 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531824" comment="dnsmasq-2.78-18.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150818" version="1" class="patch">
	<metadata>
		<title>Security update for flac (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1180099" ref_url="https://bugzilla.suse.com/1180099" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0499" ref_url="https://www.suse.com/security/cve/CVE-2020-0499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008132.html" source="SUSE-SU"/>
		<description>
This update for flac fixes the following issues:

- CVE-2020-0499: Fixed an out-of-bounds access (bsc#1180099).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180099">SUSE bug 1180099</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0499/">CVE-2020-0499 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0499">CVE-2020-0499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531825" comment="libFLAC++6-1.3.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531826" comment="libFLAC8-1.3.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531827" comment="libFLAC8-32bit-1.3.0-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150819" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1180405" ref_url="https://bugzilla.suse.com/1180405" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24386" ref_url="https://www.suse.com/security/cve/CVE-2020-24386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008134.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2020-24386: Fixed an issue with IMAP hibernation that allowed users to access other users' emails (bsc#1180405).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180405">SUSE bug 1180405</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24386/">CVE-2020-24386 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24386">CVE-2020-24386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531828" comment="dovecot22-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531829" comment="dovecot22-backend-mysql-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531830" comment="dovecot22-backend-pgsql-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531831" comment="dovecot22-backend-sqlite-2.2.31-19.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150820" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1186253" ref_url="https://bugzilla.suse.com/1186253" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3500" ref_url="https://www.suse.com/security/cve/CVE-2021-3500/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008888.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3500: Stack overflow in function DJVU:DjVuDocument:get_djvu_file() via crafted djvu file (bsc#1186253)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-31"/>
	<updated date="2021-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186253">SUSE bug 1186253</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3500/">CVE-2021-3500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3500">CVE-2021-3500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552315" comment="libdjvulibre21-3.5.25.3-5.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150821" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1186382" ref_url="https://bugzilla.suse.com/1186382" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008906.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

- CVE-2021-25217: A buffer overrun in lease file parsing code can be used to exploit a common vulnerability shared by dhcpd and dhclient (bsc#1186382)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-01"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186382">SUSE bug 1186382</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25217">CVE-2021-25217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552316" comment="dhcp-4.3.3-10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552317" comment="dhcp-client-4.3.3-10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552318" comment="dhcp-relay-4.3.3-10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552319" comment="dhcp-server-4.3.3-10.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150822" version="1" class="patch">
	<metadata>
		<title>Security update for libwebp (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1185652" ref_url="https://bugzilla.suse.com/1185652" source="BUGZILLA"/>
		<reference ref_id="1185654" ref_url="https://bugzilla.suse.com/1185654" source="BUGZILLA"/>
		<reference ref_id="1185673" ref_url="https://bugzilla.suse.com/1185673" source="BUGZILLA"/>
		<reference ref_id="1185674" ref_url="https://bugzilla.suse.com/1185674" source="BUGZILLA"/>
		<reference ref_id="1185685" ref_url="https://bugzilla.suse.com/1185685" source="BUGZILLA"/>
		<reference ref_id="1185686" ref_url="https://bugzilla.suse.com/1185686" source="BUGZILLA"/>
		<reference ref_id="1185690" ref_url="https://bugzilla.suse.com/1185690" source="BUGZILLA"/>
		<reference ref_id="1185691" ref_url="https://bugzilla.suse.com/1185691" source="BUGZILLA"/>
		<reference ref_id="1186247" ref_url="https://bugzilla.suse.com/1186247" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25009" ref_url="https://www.suse.com/security/cve/CVE-2018-25009/" source="CVE"/>
		<reference ref_id="CVE-2018-25010" ref_url="https://www.suse.com/security/cve/CVE-2018-25010/" source="CVE"/>
		<reference ref_id="CVE-2018-25011" ref_url="https://www.suse.com/security/cve/CVE-2018-25011/" source="CVE"/>
		<reference ref_id="CVE-2018-25012" ref_url="https://www.suse.com/security/cve/CVE-2018-25012/" source="CVE"/>
		<reference ref_id="CVE-2018-25013" ref_url="https://www.suse.com/security/cve/CVE-2018-25013/" source="CVE"/>
		<reference ref_id="CVE-2020-36329" ref_url="https://www.suse.com/security/cve/CVE-2020-36329/" source="CVE"/>
		<reference ref_id="CVE-2020-36330" ref_url="https://www.suse.com/security/cve/CVE-2020-36330/" source="CVE"/>
		<reference ref_id="CVE-2020-36331" ref_url="https://www.suse.com/security/cve/CVE-2020-36331/" source="CVE"/>
		<reference ref_id="CVE-2020-36332" ref_url="https://www.suse.com/security/cve/CVE-2020-36332/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008911.html" source="SUSE-SU"/>
		<description>
This update for libwebp fixes the following issues:

- CVE-2018-25010: Fixed heap-based buffer overflow in ApplyFilter() (bsc#1185685).
- CVE-2020-36330: Fixed heap-based buffer overflow in ChunkVerifyAndAssign() (bsc#1185691).
- CVE-2020-36332: Fixed extreme memory allocation when reading a file (bsc#1185674).
- CVE-2020-36329: Fixed use-after-free in EmitFancyRGB() (bsc#1185652).
- CVE-2018-25012: Fixed heap-based buffer overflow in GetLE24() (bsc#1185690).
- CVE-2018-25013: Fixed heap-based buffer overflow in ShiftBytes() (bsc#1185654).
- CVE-2020-36331: Fixed heap-based buffer overflow in ChunkAssignData() (bsc#1185686).
- CVE-2018-25009: Fixed heap-based buffer overflow in GetLE16() (bsc#1185673).
- CVE-2018-25011: Fixed fail on multiple image chunks (bsc#1186247).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-02"/>
	<updated date="2021-06-02"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185652">SUSE bug 1185652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185654">SUSE bug 1185654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185673">SUSE bug 1185673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185674">SUSE bug 1185674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185685">SUSE bug 1185685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185686">SUSE bug 1185686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185690">SUSE bug 1185690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185691">SUSE bug 1185691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186247">SUSE bug 1186247</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25009/">CVE-2018-25009 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25009">CVE-2018-25009 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25010/">CVE-2018-25010 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25010">CVE-2018-25010 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25011/">CVE-2018-25011 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25011">CVE-2018-25011 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25012/">CVE-2018-25012 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25012">CVE-2018-25012 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25013/">CVE-2018-25013 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25013">CVE-2018-25013 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36329/">CVE-2020-36329 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36329">CVE-2020-36329 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36330/">CVE-2020-36330 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36330">CVE-2020-36330 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36331/">CVE-2020-36331 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36331">CVE-2020-36331 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36332/">CVE-2020-36332 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36332">CVE-2020-36332 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552333" comment="libwebp5-0.4.3-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538993" comment="libwebp5-32bit-0.4.3-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552334" comment="libwebpdemux1-0.4.3-4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150823" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1186497" ref_url="https://bugzilla.suse.com/1186497" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3560" ref_url="https://www.suse.com/security/cve/CVE-2021-3560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008927.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-3560: Fixed a local privilege escalation using polkit_system_bus_name_get_creds_sync() (bsc#1186497).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-03"/>
	<updated date="2021-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186497">SUSE bug 1186497</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3560/">CVE-2021-3560 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3560">CVE-2021-3560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552335" comment="libpolkit0-0.113-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552336" comment="polkit-0.113-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552337" comment="typelib-1_0-Polkit-1_0-0.113-5.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150824" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1181255" ref_url="https://bugzilla.suse.com/1181255" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008942.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-bad fixes the following issues:

- CVE-2021-3185: Fixed buffer overflow in gst_h264_slice_parse_dec_ref_pic_marking (bsc#1181255).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-07"/>
	<updated date="2021-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181255">SUSE bug 1181255</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3185">CVE-2021-3185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552339" comment="gstreamer-plugins-bad-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539006" comment="gstreamer-plugins-bad-lang-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552340" comment="libgstadaptivedemux-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552341" comment="libgstbadaudio-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552342" comment="libgstbadbase-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552343" comment="libgstbadvideo-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552344" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552345" comment="libgstcodecparsers-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552346" comment="libgstgl-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552347" comment="libgstmpegts-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552348" comment="libgstphotography-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552349" comment="libgsturidownloader-1_0-0-1.8.3-18.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150825" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1185633" ref_url="https://bugzilla.suse.com/1185633" source="BUGZILLA"/>
		<reference ref_id="1186696" ref_url="https://bugzilla.suse.com/1186696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29951" ref_url="https://www.suse.com/security/cve/CVE-2021-29951/" source="CVE"/>
		<reference ref_id="CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008953.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.11.0 ESR (bsc#1186696)

  * CVE-2021-29964: Out of bounds-read when parsing a `WM_COPYDATA` message
  * CVE-2021-29967: Memory safety bugs fixed in Firefox
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185633">SUSE bug 1185633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186696">SUSE bug 1186696</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29951/">CVE-2021-29951 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29951">CVE-2021-29951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29964">CVE-2021-29964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29967">CVE-2021-29967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552350" comment="MozillaFirefox-78.11.0-112.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552351" comment="MozillaFirefox-devel-78.11.0-112.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552352" comment="MozillaFirefox-translations-common-78.11.0-112.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150826" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1186643" ref_url="https://bugzilla.suse.com/1186643" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008951.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Regression in the fix for CVE-2021-31535, causing segfaults for xforms applications like fdesign (bsc#1186643)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186643">SUSE bug 1186643</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31535">CVE-2021-31535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552353" comment="libX11-6-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539021" comment="libX11-6-32bit-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539022" comment="libX11-data-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552354" comment="libX11-xcb1-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539024" comment="libX11-xcb1-32bit-1.6.2-12.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150827" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1094725" ref_url="https://bugzilla.suse.com/1094725" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1172380" ref_url="https://bugzilla.suse.com/1172380" source="BUGZILLA"/>
		<reference ref_id="1172382" ref_url="https://bugzilla.suse.com/1172382" source="BUGZILLA"/>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1178683" ref_url="https://bugzilla.suse.com/1178683" source="BUGZILLA"/>
		<reference ref_id="1178935" ref_url="https://bugzilla.suse.com/1178935" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1181933" ref_url="https://bugzilla.suse.com/1181933" source="BUGZILLA"/>
		<reference ref_id="1182846" ref_url="https://bugzilla.suse.com/1182846" source="BUGZILLA"/>
		<reference ref_id="1182975" ref_url="https://bugzilla.suse.com/1182975" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756/" source="CVE"/>
		<reference ref_id="CVE-2020-13754" ref_url="https://www.suse.com/security/cve/CVE-2020-13754/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-25707" ref_url="https://www.suse.com/security/cve/CVE-2020-25707/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="CVE-2021-20221" ref_url="https://www.suse.com/security/cve/CVE-2021-20221/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-3419" ref_url="https://www.suse.com/security/cve/CVE-2021-3419/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- Fix OOB access during mmio operations (CVE-2020-13754, bsc#1172382)
- Fix out-of-bounds read information disclosure in icmp6_send_echoreply (CVE-2020-10756, bsc#1172380)
- Fix out-of-bound heap buffer access via an interrupt ID field (CVE-2021-20221, bsc#1181933)
- For the record, these issues are fixed in this package already.
  Most are alternate references to previously mentioned issues:
  (CVE-2019-15890, bsc#1149813, CVE-2020-8608, bsc#1163019,
  CVE-2020-14364, bsc#1175534, CVE-2020-25707, bsc#1178683,
  CVE-2020-25723, bsc#1178935, CVE-2020-29130, bsc#1179477,
  CVE-2021-20257, bsc#1182846, CVE-2021-3419, bsc#1182975,
  bsc#1094725)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1094725">SUSE bug 1094725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172380">SUSE bug 1172380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172382">SUSE bug 1172382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178683">SUSE bug 1178683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178935">SUSE bug 1178935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181933">SUSE bug 1181933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182975">SUSE bug 1182975</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10756">CVE-2020-10756 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13754/">CVE-2020-13754 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13754">CVE-2020-13754 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25707/">CVE-2020-25707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-25707">CVE-2020-25707 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25723">CVE-2020-25723 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20221/">CVE-2021-20221 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20221">CVE-2021-20221 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3419/">CVE-2021-3419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3419">CVE-2021-3419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555909" comment="qemu-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555910" comment="qemu-block-curl-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555911" comment="qemu-block-iscsi-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539028" comment="qemu-block-rbd-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555912" comment="qemu-block-ssh-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555913" comment="qemu-guest-agent-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539031" comment="qemu-ipxe-1.0.0+-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539032" comment="qemu-kvm-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555914" comment="qemu-lang-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539035" comment="qemu-seabios-1.10.2_0_g5f4c7b1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539036" comment="qemu-sgabios-8-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555915" comment="qemu-tools-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539038" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539039" comment="qemu-x86-2.9.1-6.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150828" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 75 [bsc#1180063, bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14782 CVE-2020-14781
  CVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class Libraries:
    - Z/OS specific C function send_file is changing the file pointer position
  * Security:
    - Add the new oracle signer certificate
    - Certificate parsing error
    - JVM memory growth can be caused by the IBMPKCS11IMPL crypto provider
    - Remove check for websphere signed jars
    - sessionid.hashcode generates too many collisions
    - The Java 8 IBM certpath provider does not honor the user
      specified system property for CLR connect timeout
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531832" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531834" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531835" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150829" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1181686" ref_url="https://bugzilla.suse.com/1181686" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20201" ref_url="https://www.suse.com/security/cve/CVE-2021-20201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008964.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

- CVE-2021-20201: client initiated renegotiation causing denial of service (bsc#1181686)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181686">SUSE bug 1181686</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20201/">CVE-2021-20201 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20201">CVE-2021-20201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555916" comment="libspice-server1-0.12.8-18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150830" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1179833" ref_url="https://bugzilla.suse.com/1179833" source="BUGZILLA"/>
		<reference ref_id="1179836" ref_url="https://bugzilla.suse.com/1179836" source="BUGZILLA"/>
		<reference ref_id="1179837" ref_url="https://bugzilla.suse.com/1179837" source="BUGZILLA"/>
		<reference ref_id="1179839" ref_url="https://bugzilla.suse.com/1179839" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489/" source="CVE"/>
		<reference ref_id="CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511/" source="CVE"/>
		<reference ref_id="CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512/" source="CVE"/>
		<reference ref_id="CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019273.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20210608 release.

- CVE-2020-24513: A domain bypass transient execution vulnerability was discovered on some Intel Atom processors that use a micro-architectural incident channel. (INTEL-SA-00465 bsc#1179833)

  See also: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html

- CVE-2020-24511: The IBRS feature to mitigate Spectre variant 2 transient execution side channel vulnerabilities may not fully prevent non-root (guest) branches from controlling the branch predictions of the root (host) (INTEL-SA-00464 bsc#1179836)

  See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html)

- CVE-2020-24512: Fixed trivial data value cache-lines such as all-zero value cache-lines may lead to changes in cache-allocation or write-back behavior for such cache-lines (bsc#1179837 INTEL-SA-00464)

  See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html)

- CVE-2020-24489: Fixed Intel VT-d device pass through potential local privilege escalation (INTEL-SA-00442 bsc#1179839)

  See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html

Other fixes:

- Update for functional issues. Refer to [Third Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780)for details.
- Update for functional issues. Refer to [Second Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
- Update for functional issues. Refer to [Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
- Update for functional issues. Refer to [Intel Xeon Processor D-1500, D-1500 NS and D-1600 NS Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-d-1500-specification-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon E7-8800 and E7-4800 v3 Processor Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e7-v3-spec-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
- Update for functional issues. Refer to [10th Gen Intel Core Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
- Update for functional issues. Refer to [8th and 9th Gen Intel Core Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
- Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
- Update for functional issues. Refer to [6th Gen Intel Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
- Update for functional issues. Refer to [Intel Xeon E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

- New platforms:

| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| CLX-SP         | A0       | 06-55-05/b7 |          | 03000010 | Xeon Scalable Gen2
| ICX-SP         | C0       | 06-6a-05/87 |          | 0c0002f0 | Xeon Scalable Gen3
| ICX-SP         | D0       | 06-6a-06/87 |          | 0d0002a0 | Xeon Scalable Gen3
| SNR            | B0       | 06-86-04/01 |          | 0b00000f | Atom P59xxB
| SNR            | B1       | 06-86-05/01 |          | 0b00000f | Atom P59xxB
| TGL            | B1       | 06-8c-01/80 |          | 00000088 | Core Gen11 Mobile
| TGL-R          | C0       | 06-8c-02/c2 |          | 00000016 | Core Gen11 Mobile
| TGL-H          | R0       | 06-8d-01/c2 |          | 0000002c | Core Gen11 Mobile
| EHL            | B1       | 06-96-01/01 |          | 00000011 | Pentium J6426/N6415, Celeron J6412/J6413/N6210/N6211, Atom x6000E
| JSL            | A0/A1    | 06-9c-00/01 |          | 0000001d | Pentium N6000/N6005, Celeron N4500/N4505/N5100/N5105
| RKL-S          | B0       | 06-a7-01/02 |          | 00000040 | Core Gen11

- Updated platforms:

| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000044 | 00000046 | Core Gen4 X series; Xeon E5 v3
| HSX-EX         | E0       | 06-3f-04/80 | 00000016 | 00000019 | Xeon E7 v3
| SKL-U/Y        | D0       | 06-4e-03/c0 | 000000e2 | 000000ea | Core Gen6 Mobile
| SKL-U23e       | K1       | 06-4e-03/c0 | 000000e2 | 000000ea | Core Gen6 Mobile
| BDX-ML         | B0/M0/R0 | 06-4f-01/ef | 0b000038 | 0b00003e | Xeon E5/E7 v4; Core i7-69xx/68xx
| SKX-SP         | B1       | 06-55-03/97 | 01000159 | 0100015b | Xeon Scalable
| SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006a0a | 02006b06 | Xeon Scalable
| SKX-D          | M1       | 06-55-04/b7 | 02006a0a | 02006b06 | Xeon D-21xx
| CLX-SP         | B0       | 06-55-06/bf | 04003006 | 04003102 | Xeon Scalable Gen2
| CLX-SP         | B1       | 06-55-07/bf | 05003006 | 05003102 | Xeon Scalable Gen2
| CPX-SP         | A1       | 06-55-0b/bf | 0700001e | 07002302 | Xeon Scalable Gen3
| BDX-DE         | V2/V3    | 06-56-03/10 | 07000019 | 0700001b | Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
| BDX-DE         | Y0       | 06-56-04/10 | 0f000017 | 0f000019 | Xeon D-1557/59/67/71/77/81/87
| BDX-NS         | A0       | 06-56-05/10 | 0e00000f | 0e000012 | Xeon D-1513N/23/33/43/53
| APL            | D0       | 06-5c-09/03 | 00000040 | 00000044 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
| APL            | E0       | 06-5c-0a/03 | 0000001e | 00000020 | Atom x5-E39xx
| SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000e2 | 000000ea | Core Gen6; Xeon E3 v5
| DNV            | B0       | 06-5f-01/01 | 0000002e | 00000034 | Atom C Series
| GLK            | B0       | 06-7a-01/01 | 00000034 | 00000036 | Pentium Silver N/J5xxx, Celeron N/J4xxx
| GKL-R          | R0       | 06-7a-08/01 | 00000018 | 0000001a | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
| ICL-U/Y        | D1       | 06-7e-05/80 | 000000a0 | 000000a6 | Core Gen10 Mobile
| LKF            | B2/B3    | 06-8a-01/10 | 00000028 | 0000002a | Core w/Hybrid Technology
| AML-Y22        | H0       | 06-8e-09/10 | 000000de | 000000ea | Core Gen8 Mobile
| KBL-U/Y        | H0       | 06-8e-09/c0 | 000000de | 000000ea | Core Gen7 Mobile
| CFL-U43e       | D0       | 06-8e-0a/c0 | 000000e0 | 000000ea | Core Gen8 Mobile
| WHL-U          | W0       | 06-8e-0b/d0 | 000000de | 000000ea | Core Gen8 Mobile
| AML-Y42        | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen10 Mobile
| CML-Y42        | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen10 Mobile
| WHL-U          | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen8 Mobile
| KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000de | 000000ea | Core Gen7; Xeon E3 v6
| CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000de | 000000ea | Core Gen8 Desktop, Mobile, Xeon E
| CFL-S          | B0       | 06-9e-0b/02 | 000000de | 000000ea | Core Gen8
| CFL-H/S        | P0       | 06-9e-0c/22 | 000000de | 000000ea | Core Gen9
| CFL-H          | R0       | 06-9e-0d/22 | 000000de | 000000ea | Core Gen9 Mobile
| CML-H          | R1       | 06-a5-02/20 | 000000e0 | 000000ea | Core Gen10 Mobile
| CML-S62        | G1       | 06-a5-03/22 | 000000e0 | 000000ea | Core Gen10
| CML-S102       | Q0       | 06-a5-05/22 | 000000e0 | 000000ec | Core Gen10
| CML-U62        | A0       | 06-a6-00/80 | 000000e0 | 000000e8 | Core Gen10 Mobile
| CML-U62 V2     | K0       | 06-a6-01/80 | 000000e0 | 000000ea | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-10"/>
	<updated date="2021-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179833">SUSE bug 1179833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179836">SUSE bug 1179836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179837">SUSE bug 1179837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179839">SUSE bug 1179839</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24489">CVE-2020-24489 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24511">CVE-2020-24511 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24512">CVE-2020-24512 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24513">CVE-2020-24513 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539041" comment="ucode-intel-20210525-13.90.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150831" version="1" class="patch">
	<metadata>
		<title>Security update for caribou (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1186617" ref_url="https://bugzilla.suse.com/1186617" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3567" ref_url="https://www.suse.com/security/cve/CVE-2021-3567/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008985.html" source="SUSE-SU"/>
		<description>
This update for caribou fixes the following issues:

Security issue fixed:

- CVE-2021-3567: Fixed a segfault when attempting to use shifted characters (bsc#1186617).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-10"/>
	<updated date="2021-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186617">SUSE bug 1186617</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3567/">CVE-2021-3567 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3567">CVE-2021-3567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552363" comment="caribou-common-0.4.21-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552364" comment="libcaribou0-0.4.21-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552365" comment="typelib-1_0-Caribou-1_0-0.4.21-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150832" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1184016" ref_url="https://bugzilla.suse.com/1184016" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009000.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

- Do not log passwords in logfiles (bsc#1184016)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-11"/>
	<updated date="2021-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184016">SUSE bug 1184016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555917" comment="freeradius-server-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555918" comment="freeradius-server-doc-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555919" comment="freeradius-server-krb5-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555920" comment="freeradius-server-ldap-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555921" comment="freeradius-server-libs-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555922" comment="freeradius-server-mysql-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555923" comment="freeradius-server-perl-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555924" comment="freeradius-server-postgresql-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555925" comment="freeradius-server-python-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555926" comment="freeradius-server-sqlite-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555927" comment="freeradius-server-utils-3.0.15-2.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150833" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009020.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u292 (icedtea 3.19.0).
- CVE-2021-2161: Fixed incomplete enforcement of JAR signing disabled algorithms (bsc#1185055).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-15"/>
	<updated date="2021-06-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552366" comment="java-1_8_0-openjdk-1.8.0.292-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552367" comment="java-1_8_0-openjdk-demo-1.8.0.292-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552368" comment="java-1_8_0-openjdk-devel-1.8.0.292-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552369" comment="java-1_8_0-openjdk-headless-1.8.0.292-27.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150834" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1179103" ref_url="https://bugzilla.suse.com/1179103" source="BUGZILLA"/>
		<reference ref_id="1179202" ref_url="https://bugzilla.suse.com/1179202" source="BUGZILLA"/>
		<reference ref_id="1179208" ref_url="https://bugzilla.suse.com/1179208" source="BUGZILLA"/>
		<reference ref_id="1179212" ref_url="https://bugzilla.suse.com/1179212" source="BUGZILLA"/>
		<reference ref_id="1179223" ref_url="https://bugzilla.suse.com/1179223" source="BUGZILLA"/>
		<reference ref_id="1179240" ref_url="https://bugzilla.suse.com/1179240" source="BUGZILLA"/>
		<reference ref_id="1179244" ref_url="https://bugzilla.suse.com/1179244" source="BUGZILLA"/>
		<reference ref_id="1179260" ref_url="https://bugzilla.suse.com/1179260" source="BUGZILLA"/>
		<reference ref_id="1179268" ref_url="https://bugzilla.suse.com/1179268" source="BUGZILLA"/>
		<reference ref_id="1179269" ref_url="https://bugzilla.suse.com/1179269" source="BUGZILLA"/>
		<reference ref_id="1179278" ref_url="https://bugzilla.suse.com/1179278" source="BUGZILLA"/>
		<reference ref_id="1179281" ref_url="https://bugzilla.suse.com/1179281" source="BUGZILLA"/>
		<reference ref_id="1179285" ref_url="https://bugzilla.suse.com/1179285" source="BUGZILLA"/>
		<reference ref_id="1179311" ref_url="https://bugzilla.suse.com/1179311" source="BUGZILLA"/>
		<reference ref_id="1179312" ref_url="https://bugzilla.suse.com/1179312" source="BUGZILLA"/>
		<reference ref_id="1179313" ref_url="https://bugzilla.suse.com/1179313" source="BUGZILLA"/>
		<reference ref_id="1179315" ref_url="https://bugzilla.suse.com/1179315" source="BUGZILLA"/>
		<reference ref_id="1179317" ref_url="https://bugzilla.suse.com/1179317" source="BUGZILLA"/>
		<reference ref_id="1179321" ref_url="https://bugzilla.suse.com/1179321" source="BUGZILLA"/>
		<reference ref_id="1179322" ref_url="https://bugzilla.suse.com/1179322" source="BUGZILLA"/>
		<reference ref_id="1179327" ref_url="https://bugzilla.suse.com/1179327" source="BUGZILLA"/>
		<reference ref_id="1179333" ref_url="https://bugzilla.suse.com/1179333" source="BUGZILLA"/>
		<reference ref_id="1179336" ref_url="https://bugzilla.suse.com/1179336" source="BUGZILLA"/>
		<reference ref_id="1179338" ref_url="https://bugzilla.suse.com/1179338" source="BUGZILLA"/>
		<reference ref_id="1179339" ref_url="https://bugzilla.suse.com/1179339" source="BUGZILLA"/>
		<reference ref_id="1179343" ref_url="https://bugzilla.suse.com/1179343" source="BUGZILLA"/>
		<reference ref_id="1179345" ref_url="https://bugzilla.suse.com/1179345" source="BUGZILLA"/>
		<reference ref_id="1179346" ref_url="https://bugzilla.suse.com/1179346" source="BUGZILLA"/>
		<reference ref_id="1179347" ref_url="https://bugzilla.suse.com/1179347" source="BUGZILLA"/>
		<reference ref_id="1179361" ref_url="https://bugzilla.suse.com/1179361" source="BUGZILLA"/>
		<reference ref_id="1179362" ref_url="https://bugzilla.suse.com/1179362" source="BUGZILLA"/>
		<reference ref_id="1179397" ref_url="https://bugzilla.suse.com/1179397" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667/" source="CVE"/>
		<reference ref_id="CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664/" source="CVE"/>
		<reference ref_id="CVE-2020-25665" ref_url="https://www.suse.com/security/cve/CVE-2020-25665/" source="CVE"/>
		<reference ref_id="CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666/" source="CVE"/>
		<reference ref_id="CVE-2020-25674" ref_url="https://www.suse.com/security/cve/CVE-2020-25674/" source="CVE"/>
		<reference ref_id="CVE-2020-25675" ref_url="https://www.suse.com/security/cve/CVE-2020-25675/" source="CVE"/>
		<reference ref_id="CVE-2020-25676" ref_url="https://www.suse.com/security/cve/CVE-2020-25676/" source="CVE"/>
		<reference ref_id="CVE-2020-27750" ref_url="https://www.suse.com/security/cve/CVE-2020-27750/" source="CVE"/>
		<reference ref_id="CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751/" source="CVE"/>
		<reference ref_id="CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752/" source="CVE"/>
		<reference ref_id="CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753/" source="CVE"/>
		<reference ref_id="CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754/" source="CVE"/>
		<reference ref_id="CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755/" source="CVE"/>
		<reference ref_id="CVE-2020-27757" ref_url="https://www.suse.com/security/cve/CVE-2020-27757/" source="CVE"/>
		<reference ref_id="CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759/" source="CVE"/>
		<reference ref_id="CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760/" source="CVE"/>
		<reference ref_id="CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761/" source="CVE"/>
		<reference ref_id="CVE-2020-27762" ref_url="https://www.suse.com/security/cve/CVE-2020-27762/" source="CVE"/>
		<reference ref_id="CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763/" source="CVE"/>
		<reference ref_id="CVE-2020-27764" ref_url="https://www.suse.com/security/cve/CVE-2020-27764/" source="CVE"/>
		<reference ref_id="CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765/" source="CVE"/>
		<reference ref_id="CVE-2020-27766" ref_url="https://www.suse.com/security/cve/CVE-2020-27766/" source="CVE"/>
		<reference ref_id="CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767/" source="CVE"/>
		<reference ref_id="CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768/" source="CVE"/>
		<reference ref_id="CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769/" source="CVE"/>
		<reference ref_id="CVE-2020-27770" ref_url="https://www.suse.com/security/cve/CVE-2020-27770/" source="CVE"/>
		<reference ref_id="CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771/" source="CVE"/>
		<reference ref_id="CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772/" source="CVE"/>
		<reference ref_id="CVE-2020-27773" ref_url="https://www.suse.com/security/cve/CVE-2020-27773/" source="CVE"/>
		<reference ref_id="CVE-2020-27774" ref_url="https://www.suse.com/security/cve/CVE-2020-27774/" source="CVE"/>
		<reference ref_id="CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775/" source="CVE"/>
		<reference ref_id="CVE-2020-27776" ref_url="https://www.suse.com/security/cve/CVE-2020-27776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103).
- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202).
- CVE-2020-25665: Fixed a heap-based buffer overflow in WritePALMImage (bsc#1179208).
- CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212).
- CVE-2020-25674: Fixed a heap-based buffer overflow in WriteOnePNGImage (bsc#1179223).
- CVE-2020-25675: Fixed an outside the range of representable values of type 'long' and integer overflow (bsc#1179240).
- CVE-2020-25676: Fixed an outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c (bsc#1179244).
- CVE-2020-27750: Fixed an division by zero in MagickCore/colorspace-private.h (bsc#1179260).
- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397).
- CVE-2020-27754: Fixed an outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336).
- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345).
- CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
- CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313).
- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281).
- CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315).
- CVE-2020-27762: Fixed an outside the range of representable values of type 'unsigned char' (bsc#1179278).
- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312).
- CVE-2020-27764: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179317).
- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311).
- CVE-2020-27766: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179361).
- CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322).
- CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
- CVE-2020-27769: Fixed an outside the range of representable values of type 'float' at MagickCore/quantize.c (bsc#1179321).
- CVE-2020-27770: Fixed an unsigned offset overflowed at MagickCore/string.c (bsc#1179343).
- CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327).
- CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347).
- CVE-2020-27773: Fixed a division by zero at MagickCore/gem-private.h (bsc#1179285).
- CVE-2020-27774: Fixed an integer overflow at MagickCore/statistic.c (bsc#1179333).
- CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
- CVE-2020-27776: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179362).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-22"/>
	<updated date="2021-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179103">SUSE bug 1179103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179208">SUSE bug 1179208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179212">SUSE bug 1179212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179223">SUSE bug 1179223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179240">SUSE bug 1179240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179244">SUSE bug 1179244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179260">SUSE bug 1179260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179268">SUSE bug 1179268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179278">SUSE bug 1179278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179281">SUSE bug 1179281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179285">SUSE bug 1179285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179311">SUSE bug 1179311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179312">SUSE bug 1179312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179315">SUSE bug 1179315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179317">SUSE bug 1179317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179327">SUSE bug 1179327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179338">SUSE bug 1179338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179339">SUSE bug 1179339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179343">SUSE bug 1179343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179345">SUSE bug 1179345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179347">SUSE bug 1179347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179361">SUSE bug 1179361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179362">SUSE bug 1179362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179397">SUSE bug 1179397</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19667">CVE-2020-19667 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25664">CVE-2020-25664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25665/">CVE-2020-25665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25665">CVE-2020-25665 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25666">CVE-2020-25666 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25674/">CVE-2020-25674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25674">CVE-2020-25674 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25675/">CVE-2020-25675 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25675">CVE-2020-25675 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25676/">CVE-2020-25676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25676">CVE-2020-25676 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27750/">CVE-2020-27750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27750">CVE-2020-27750 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27751">CVE-2020-27751 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27752">CVE-2020-27752 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27753">CVE-2020-27753 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27754">CVE-2020-27754 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27755">CVE-2020-27755 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27757/">CVE-2020-27757 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27757">CVE-2020-27757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27759">CVE-2020-27759 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27760">CVE-2020-27760 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27761">CVE-2020-27761 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27762/">CVE-2020-27762 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27762">CVE-2020-27762 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27763">CVE-2020-27763 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27764/">CVE-2020-27764 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27764">CVE-2020-27764 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27765">CVE-2020-27765 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27766/">CVE-2020-27766 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27766">CVE-2020-27766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27767">CVE-2020-27767 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27768">CVE-2020-27768 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27769">CVE-2020-27769 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27770/">CVE-2020-27770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27770">CVE-2020-27770 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27771">CVE-2020-27771 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27772">CVE-2020-27772 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27773/">CVE-2020-27773 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27773">CVE-2020-27773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27774/">CVE-2020-27774 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27774">CVE-2020-27774 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27775">CVE-2020-27775 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27776/">CVE-2020-27776 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27776">CVE-2020-27776 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150835" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1177087" ref_url="https://bugzilla.suse.com/1177087" source="BUGZILLA"/>
		<reference ref_id="1179122" ref_url="https://bugzilla.suse.com/1179122" source="BUGZILLA"/>
		<reference ref_id="1179451" ref_url="https://bugzilla.suse.com/1179451" source="BUGZILLA"/>
		<reference ref_id="1182286" ref_url="https://bugzilla.suse.com/1182286" source="BUGZILLA"/>
		<reference ref_id="1184155" ref_url="https://bugzilla.suse.com/1184155" source="BUGZILLA"/>
		<reference ref_id="1184262" ref_url="https://bugzilla.suse.com/1184262" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13543" ref_url="https://www.suse.com/security/cve/CVE-2020-13543/" source="CVE"/>
		<reference ref_id="CVE-2020-13558" ref_url="https://www.suse.com/security/cve/CVE-2020-13558/" source="CVE"/>
		<reference ref_id="CVE-2020-13584" ref_url="https://www.suse.com/security/cve/CVE-2020-13584/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9983" ref_url="https://www.suse.com/security/cve/CVE-2020-9983/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1789" ref_url="https://www.suse.com/security/cve/CVE-2021-1789/" source="CVE"/>
		<reference ref_id="CVE-2021-1799" ref_url="https://www.suse.com/security/cve/CVE-2021-1799/" source="CVE"/>
		<reference ref_id="CVE-2021-1801" ref_url="https://www.suse.com/security/cve/CVE-2021-1801/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1870" ref_url="https://www.suse.com/security/cve/CVE-2021-1870/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.1:
  + Improve handling of Media Capture devices.
  + Improve WebAudio playback.
  + Improve video orientation handling.
  + Improve seeking support for MSE playback.
  + Improve flush support in EME decryptors.
  + Fix HTTP status codes for requests done through a custom URI handler.
  + Fix the Bubblewrap sandbox in certain 32-bit systems.
  + Fix inconsistencies between the WebKitWebView.is-muted property
    state and values returned by
    webkit_web_view_is_playing_audio().
  + Fix the build with ENABLE_VIDEO=OFF.
  + Fix wrong timestamps for long-lived cookies.
  + Fix UI process crash when failing to load favicons.
  + Fix several crashes and rendering issues.
- Including Security fixes for: CVE-2021-1788, CVE-2021-1844, CVE-2021-1871,
    CVE-2020-27918, CVE-2020-29623, CVE-2021-1765, CVE-2021-1789, CVE-2021-1799,
    CVE-2021-1801, CVE-2021-1870, CVE-2020-13558, CVE-2020-13584, CVE-2020-9983, 
    CVE-2020-13543, CVE-2020-9947, CVE-2020-9948, CVE-2020-9951.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177087">SUSE bug 1177087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179122">SUSE bug 1179122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179451">SUSE bug 1179451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182286">SUSE bug 1182286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184155">SUSE bug 1184155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13543/">CVE-2020-13543 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13543">CVE-2020-13543 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13558/">CVE-2020-13558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13558">CVE-2020-13558 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13584/">CVE-2020-13584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13584">CVE-2020-13584 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27918">CVE-2020-27918 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29623">CVE-2020-29623 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9947">CVE-2020-9947 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9948">CVE-2020-9948 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9951">CVE-2020-9951 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9983/">CVE-2020-9983 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9983">CVE-2020-9983 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1765">CVE-2021-1765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1788">CVE-2021-1788 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1789/">CVE-2021-1789 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1789">CVE-2021-1789 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1799/">CVE-2021-1799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1799">CVE-2021-1799 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1801/">CVE-2021-1801 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1801">CVE-2021-1801 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1844">CVE-2021-1844 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1870/">CVE-2021-1870 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1870">CVE-2021-1870 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1871">CVE-2021-1871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552370" comment="libjavascriptcoregtk-4_0-18-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552371" comment="libwebkit2gtk-4_0-37-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552372" comment="typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552373" comment="typelib-1_0-WebKit2-4_0-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552375" comment="webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150836" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1186922" ref_url="https://bugzilla.suse.com/1186922" source="BUGZILLA"/>
		<reference ref_id="1186923" ref_url="https://bugzilla.suse.com/1186923" source="BUGZILLA"/>
		<reference ref_id="1186924" ref_url="https://bugzilla.suse.com/1186924" source="BUGZILLA"/>
		<reference ref_id="1187017" ref_url="https://bugzilla.suse.com/1187017" source="BUGZILLA"/>
		<reference ref_id="1187174" ref_url="https://bugzilla.suse.com/1187174" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35452" ref_url="https://www.suse.com/security/cve/CVE-2020-35452/" source="CVE"/>
		<reference ref_id="CVE-2021-26690" ref_url="https://www.suse.com/security/cve/CVE-2021-26690/" source="CVE"/>
		<reference ref_id="CVE-2021-26691" ref_url="https://www.suse.com/security/cve/CVE-2021-26691/" source="CVE"/>
		<reference ref_id="CVE-2021-30641" ref_url="https://www.suse.com/security/cve/CVE-2021-30641/" source="CVE"/>
		<reference ref_id="CVE-2021-31618" ref_url="https://www.suse.com/security/cve/CVE-2021-31618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009032.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- fixed CVE-2021-30641 [bsc#1187174]: MergeSlashes regression
- fixed CVE-2021-31618 [bsc#1186924]: NULL pointer dereference on specially crafted HTTP/2 request
- fixed CVE-2020-35452 [bsc#1186922]: Single zero byte stack overflow in mod_auth_digest 
- fixed CVE-2021-26690 [bsc#1186923]: mod_session NULL pointer dereference in parser
- fixed CVE-2021-26691 [bsc#1187017]: Heap overflow in mod_session
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186922">SUSE bug 1186922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186923">SUSE bug 1186923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186924">SUSE bug 1186924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187017">SUSE bug 1187017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187174">SUSE bug 1187174</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35452/">CVE-2020-35452 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35452">CVE-2020-35452 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26690/">CVE-2021-26690 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26690">CVE-2021-26690 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26691/">CVE-2021-26691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26691">CVE-2021-26691 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30641/">CVE-2021-30641 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30641">CVE-2021-30641 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31618/">CVE-2021-31618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31618">CVE-2021-31618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552377" comment="apache2-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539074" comment="apache2-doc-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552378" comment="apache2-example-pages-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552379" comment="apache2-prefork-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552380" comment="apache2-utils-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552381" comment="apache2-worker-2.4.23-29.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150837" version="1" class="patch">
	<metadata>
		<title>Security update for xterm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1182091" ref_url="https://bugzilla.suse.com/1182091" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009039.html" source="SUSE-SU"/>
		<description>
This update for xterm fixes the following issues:

- CVE-2021-27135: Fixed buffer-overflow when clicking on selected utf8 text. (bsc#1182091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182091">SUSE bug 1182091</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27135">CVE-2021-27135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552382" comment="xterm-308-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150838" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1186151" ref_url="https://bugzilla.suse.com/1186151" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009071.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

- Fixed a possible  buffer overflow in IScsiDxe (bsc#1186151)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-22"/>
	<updated date="2021-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186151">SUSE bug 1186151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009539087" comment="ovmf-2017+git1492060560.b6d11d7c46-4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539088" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539089" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150839" version="1" class="patch">
	<metadata>
		<title>Security update for libnettle (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1187060" ref_url="https://bugzilla.suse.com/1187060" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3580" ref_url="https://www.suse.com/security/cve/CVE-2021-3580/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009077.html" source="SUSE-SU"/>
		<description>
This update for libnettle fixes the following issues:

- CVE-2021-3580: Fixed a remote denial of service in the RSA decryption via manipulated ciphertext (bsc#1187060).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-23"/>
	<updated date="2021-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187060">SUSE bug 1187060</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3580/">CVE-2021-3580 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3580">CVE-2021-3580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552386" comment="libhogweed2-2.7.1-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539091" comment="libhogweed2-32bit-2.7.1-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552387" comment="libnettle4-2.7.1-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539093" comment="libnettle4-32bit-2.7.1-13.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150840" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1187212" ref_url="https://bugzilla.suse.com/1187212" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009087.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2021-33560: Fixed a side-channel against ElGamal encryption, caused by missing exponent blinding (bsc#1187212).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-24"/>
	<updated date="2021-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187212">SUSE bug 1187212</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">CVE-2021-33560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552394" comment="libgcrypt20-1.6.1-16.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539096" comment="libgcrypt20-32bit-1.6.1-16.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552395" comment="libgcrypt20-hmac-1.6.1-16.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539098" comment="libgcrypt20-hmac-32bit-1.6.1-16.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150841" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1184354" ref_url="https://bugzilla.suse.com/1184354" source="BUGZILLA"/>
		<reference ref_id="1187310" ref_url="https://bugzilla.suse.com/1187310" source="BUGZILLA"/>
		<reference ref_id="1187395" ref_url="https://bugzilla.suse.com/1187395" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3479" ref_url="https://www.suse.com/security/cve/CVE-2021-3479/" source="CVE"/>
		<reference ref_id="CVE-2021-3598" ref_url="https://www.suse.com/security/cve/CVE-2021-3598/" source="CVE"/>
		<reference ref_id="CVE-2021-3605" ref_url="https://www.suse.com/security/cve/CVE-2021-3605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009088.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- Fixed CVE-2021-3479 [bsc#1184354]: Out-of-memory caused by allocation of a very large buffer
- Fixed CVE-2021-3605 [bsc#1187395]: Heap buffer overflow in the rleUncompress function
- Fixed CVE-2021-3598 [bsc#1187310]: Heap buffer overflow in Imf_3_1:CharPtrIO:readChars
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-24"/>
	<updated date="2021-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184354">SUSE bug 1184354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187310">SUSE bug 1187310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187395">SUSE bug 1187395</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3479/">CVE-2021-3479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3479">CVE-2021-3479 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3598/">CVE-2021-3598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3598">CVE-2021-3598 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3605/">CVE-2021-3605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3605">CVE-2021-3605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552396" comment="libIlmImf-Imf_2_1-21-2.1.0-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552397" comment="openexr-2.1.0-6.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150842" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql12, postgresql13 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="1178961" ref_url="https://bugzilla.suse.com/1178961" source="BUGZILLA"/>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008245.html" source="SUSE-SU"/>
		<description>
This update for postgresql, postgresql12, postgresql13 fixes the following issues:

Initial packaging of PostgreSQL 13:

* https://www.postgresql.org/about/news/2077/
* https://www.postgresql.org/docs/13/release-13.html

Changes in postgresql:

- Bump postgresql major version to 13.

Changes in postgresql12:

- %ghost the symlinks to pg_config and ecpg. (bsc#1178961)
- BuildRequire libpq5 and libecpg6 when not building them to avoid dangling symlinks in the devel package. (bsc#1179765)
- Fix a DST problem in the test suite.

Changes in postgresql13:

- Add postgresql-icu68.patch: fix build with ICU 68

- %ghost the symlinks to pg_config and ecpg. (bsc#1178961)
- BuildRequire libpq5 and libecpg6 when not building them to avoid dangling symlinks in the devel package. (bsc#1179765)

Upgrade to version 13.1:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/13/release-13-1.html

- Fix a DST problem in the test suite.

  		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-26"/>
	<updated date="2021-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178961">SUSE bug 1178961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531841" comment="libecpg6-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531842" comment="libpq5-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531843" comment="libpq5-32bit-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531844" comment="postgresql-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531845" comment="postgresql-contrib-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531846" comment="postgresql-docs-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531847" comment="postgresql-plperl-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531848" comment="postgresql-plpython-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531849" comment="postgresql-pltcl-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531850" comment="postgresql-server-13-4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150843" version="1" class="patch">
	<metadata>
		<title>Security update for arpwatch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1186240" ref_url="https://bugzilla.suse.com/1186240" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25321" ref_url="https://www.suse.com/security/cve/CVE-2021-25321/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009095.html" source="SUSE-SU"/>
		<description>
This update for arpwatch fixes the following issues:

- CVE-2021-25321: Fixed local privilege escalation from runtime user to root (bsc#1186240).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186240">SUSE bug 1186240</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25321/">CVE-2021-25321 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25321">CVE-2021-25321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615943" comment="arpwatch-2.1a15-159.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150844" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1161510" ref_url="https://bugzilla.suse.com/1161510" source="BUGZILLA"/>
		<reference ref_id="1186229" ref_url="https://bugzilla.suse.com/1186229" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20387" ref_url="https://www.suse.com/security/cve/CVE-2019-20387/" source="CVE"/>
		<reference ref_id="CVE-2021-3200" ref_url="https://www.suse.com/security/cve/CVE-2021-3200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009094.html" source="SUSE-SU"/>
		<description>
This update for libsolv fixes the following issues:

Security issues fixed:

- CVE-2019-20387: Fixed heap-buffer-overflow in repodata_schema2id (bsc#1161510)
- CVE-2021-3200: testcase_read: error out if repos are added or the system is changed too late (bsc#1186229)

Other issues fixed:

- backport support for blacklisted packages to support ptf packages and retracted patches
- fix ruleinfo of complex dependencies returning the wrong origin
- fix SOLVER_FLAG_FOCUS_BEST updateing packages without reason
- fix add_complex_recommends() selecting conflicted packages in rare cases
- fix potential segfault in resolve_jobrules
- fix solv_zchunk decoding error if large chunks are used
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161510">SUSE bug 1161510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186229">SUSE bug 1186229</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20387/">CVE-2019-20387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20387">CVE-2019-20387 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3200/">CVE-2021-3200 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3200">CVE-2021-3200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555928" comment="libsolv-devel-0.6.37-2.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555929" comment="libsolv-tools-0.6.37-2.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555930" comment="libzypp-16.21.4-2.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555931" comment="libzypp-devel-16.21.4-2.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555932" comment="perl-solv-0.6.37-2.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555933" comment="python-solv-0.6.37-2.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150845" version="1" class="patch">
	<metadata>
		<title>Recommended update for the Azure and AWS SDKs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1125671" ref_url="https://bugzilla.suse.com/1125671" source="BUGZILLA"/>
		<reference ref_id="1154393" ref_url="https://bugzilla.suse.com/1154393" source="BUGZILLA"/>
		<reference ref_id="1175289" ref_url="https://bugzilla.suse.com/1175289" source="BUGZILLA"/>
		<reference ref_id="1176784" ref_url="https://bugzilla.suse.com/1176784" source="BUGZILLA"/>
		<reference ref_id="1176785" ref_url="https://bugzilla.suse.com/1176785" source="BUGZILLA"/>
		<reference ref_id="1182421" ref_url="https://bugzilla.suse.com/1182421" source="BUGZILLA"/>
		<reference ref_id="1187045" ref_url="https://bugzilla.suse.com/1187045" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33503" ref_url="https://www.suse.com/security/cve/CVE-2021-33503/" source="CVE"/>
		<reference ref_id="SUSE-RU-2021:2194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019478.html" source="SUSE-SU"/>
		<description>
This update for the SLE Public Cloud module provides the following fixes:

Azure SDK update:
This update for the Azure SDK and CLI adds support for the AHB (Azure Hybrid Benefit).
(bsc#1176784, jsc#ECO-3105)

AWS SDK update:
This update for the AWS SDK updates python-boto3 to version 1.17.9 and aws-cli to 1.19.9.
(bsc#1182421, jsc#ECO-3352)

Security fix for python-urllib3:

- Improve performance of sub-authority splitting in URL. (bsc#1187045, CVE-2021-33503)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1125671">SUSE bug 1125671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154393">SUSE bug 1154393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175289">SUSE bug 1175289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176784">SUSE bug 1176784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176785">SUSE bug 1176785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182421">SUSE bug 1182421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187045">SUSE bug 1187045</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33503/">CVE-2021-33503 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33503">CVE-2021-33503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009616195" comment="python-six-1.14.0-13.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616449" comment="python3-requests-2.24.0-8.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616438" comment="python3-six-1.14.0-13.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616441" comment="python3-urllib3-1.25.10-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150846" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1173513" ref_url="https://bugzilla.suse.com/1173513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14145" ref_url="https://www.suse.com/security/cve/CVE-2020-14145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008149.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2020-14145: Fixed a potential information leak during host key exchange (bsc#1173513).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173513">SUSE bug 1173513</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14145/">CVE-2020-14145 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14145">CVE-2020-14145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531851" comment="openssh-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531852" comment="openssh-askpass-gnome-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531853" comment="openssh-fips-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531854" comment="openssh-helpers-7.2p2-74.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150847" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1180684" ref_url="https://bugzilla.suse.com/1180684" source="BUGZILLA"/>
		<reference ref_id="1180685" ref_url="https://bugzilla.suse.com/1180685" source="BUGZILLA"/>
		<reference ref_id="1180687" ref_url="https://bugzilla.suse.com/1180687" source="BUGZILLA"/>
		<reference ref_id="1181090" ref_url="https://bugzilla.suse.com/1181090" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23239" ref_url="https://www.suse.com/security/cve/CVE-2021-23239/" source="CVE"/>
		<reference ref_id="CVE-2021-23240" ref_url="https://www.suse.com/security/cve/CVE-2021-23240/" source="CVE"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008249.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- A Heap-based buffer overflow in sudo could be exploited to allow a user to gain root privileges 
  [bsc#1181090,CVE-2021-3156]
- It was possible for a user to test for the existence of a directory due to a Race Condition in `sudoedit`
  [bsc#1180684,CVE-2021-23239]
- A Possible Symlink Attack vector existed in `sudoedit` if SELinux was running in permissive mode [bsc#1180685,
  CVE-2021-23240]
- It was possible for a User to enable Debug Settings not Intended for them [bsc#1180687]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-26"/>
	<updated date="2021-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180684">SUSE bug 1180684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180685">SUSE bug 1180685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180687">SUSE bug 1180687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181090">SUSE bug 1181090</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23239/">CVE-2021-23239 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23239">CVE-2021-23239 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23240/">CVE-2021-23240 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23240">CVE-2021-23240 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3156">CVE-2021-3156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555934" comment="sudo-1.8.20p2-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150848" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1188275" ref_url="https://bugzilla.suse.com/1188275" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009155.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.12.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-29 (bsc#1188275)

* CVE-2021-29970: Use-after-free in accessibility features of a document
* CVE-2021-30547: Out of bounds write in ANGLE
* CVE-2021-29976: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29970">CVE-2021-29970 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29976">CVE-2021-29976 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30547">CVE-2021-30547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625232" comment="MozillaFirefox-78.12.0-112.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625233" comment="MozillaFirefox-devel-78.12.0-112.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625234" comment="MozillaFirefox-translations-common-78.12.0-112.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150849" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1181414" ref_url="https://bugzilla.suse.com/1181414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.7.0 ESR  (MFSA 2021-04, bsc#1181414)
  * CVE-2021-23953: Fixed a Cross-origin information leakage via redirected PDF requests
  * CVE-2021-23954: Fixed a type confusion when using logical assignment operators in JavaScript switch statements
  * CVE-2020-26976: Fixed an issue where HTTPS pages could have been intercepted by a registered service worker when they should not have been
  * CVE-2021-23960: Fixed a use-after-poison for incorrectly redeclared JavaScript variables during GC
  * CVE-2021-23964: Fixed Memory safety bugs 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-29"/>
	<updated date="2021-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26976">CVE-2020-26976 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23953">CVE-2021-23953 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23954">CVE-2021-23954 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23960">CVE-2021-23960 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23964">CVE-2021-23964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531856" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531857" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531858" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150850" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1178561" ref_url="https://bugzilla.suse.com/1178561" source="BUGZILLA"/>
		<reference ref_id="1184761" ref_url="https://bugzilla.suse.com/1184761" source="BUGZILLA"/>
		<reference ref_id="1184967" ref_url="https://bugzilla.suse.com/1184967" source="BUGZILLA"/>
		<reference ref_id="1185046" ref_url="https://bugzilla.suse.com/1185046" source="BUGZILLA"/>
		<reference ref_id="1185331" ref_url="https://bugzilla.suse.com/1185331" source="BUGZILLA"/>
		<reference ref_id="1185807" ref_url="https://bugzilla.suse.com/1185807" source="BUGZILLA"/>
		<reference ref_id="1188063" ref_url="https://bugzilla.suse.com/1188063" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33910" ref_url="https://www.suse.com/security/cve/CVE-2021-33910/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009184.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2021-33910: Fixed a denial of service (stack exhaustion) in systemd (PID 1) (bsc#1188063)

Other fixes:

- mount-util: shorten the loop a bit (#7545)
- mount-util: do not use the official MAX_HANDLE_SZ (#7523)
- mount-util: tape over name_to_handle_at() flakiness (#7517) (bsc#1184761)
- mount-util: fix bad indenting
- mount-util: EOVERFLOW might have other causes than buffer size issues
- mount-util: fix error propagation in fd_fdinfo_mnt_id()
- mount-util: drop exponential buffer growing in name_to_handle_at_loop()
- udev: port udev_has_devtmpfs() to use path_get_mnt_id()
- mount-util: add new path_get_mnt_id() call that queries the mnt ID of a path
- mount-util: add name_to_handle_at_loop() wrapper around name_to_handle_at()
- mount-util: accept that name_to_handle_at() might fail with EPERM (#5499)
- basic: fallback to the fstat if we don't have access to the /proc/self/fdinfo
- sysusers: use the usual comment style
- test/TEST-21-SYSUSERS: add tests for new functionality
- sysusers: allow admin/runtime overrides to command-line config
- basic/strv: add function to insert items at position
- sysusers: allow the shell to be specified
- sysusers: move various user credential validity checks to src/basic/
- man: reformat table in sysusers.d(5)
- sysusers: take configuration as positional arguments
- sysusers: emit a bit more info at debug level when locking fails
- sysusers: allow force reusing existing user/group IDs (#8037)
- sysusers: ensure GID in uid:gid syntax exists
- sysusers: make ADD_GROUP always create a group
- test: add TEST-21-SYSUSERS test
- sysuser: use OrderedHashmap
- sysusers: allow uid:gid in sysusers.conf files
- sysusers: fix memleak (#4430)
- These commits implement the option '--replace' for systemd-sysusers
  so %sysusers_create_package can be introduced in SLE and packages
  can rely on this rpm macro without wondering whether the macro is
  available on the different target the package is submitted to.
- Expect 644 permissions for /usr/lib/udev/compat-symlink-generation (bsc#1185807)
- systemctl: add --value option
- execute: make sure to call into PAM after initializing resource limits (bsc#1184967)
- rlimit-util: introduce setrlimit_closest_all()
- system-conf: drop reference to ShutdownWatchdogUsec=
- core: rename ShutdownWatchdogSec to RebootWatchdogSec (bsc#1185331)
- Return -EAGAIN instead of -EALREADY from unit_reload (bsc#1185046)
- rules: don't ignore Xen virtual interfaces anymore (bsc#1178561)
- write_net_rules: set execute bits (bsc#1178561)
- udev: rework network device renaming
- Revert 'Revert 'udev: network device renaming - immediately give up if the target name isn't available''
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178561">SUSE bug 1178561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184761">SUSE bug 1184761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184967">SUSE bug 1184967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185046">SUSE bug 1185046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185331">SUSE bug 1185331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185807">SUSE bug 1185807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33910/">CVE-2021-33910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33910">CVE-2021-33910 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625777" comment="libsystemd0-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625743" comment="libsystemd0-32bit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625778" comment="libudev1-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625746" comment="libudev1-32bit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625779" comment="systemd-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625748" comment="systemd-32bit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625749" comment="systemd-bash-completion-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625780" comment="systemd-devel-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625781" comment="systemd-sysvinit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625782" comment="udev-228-150.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150851" version="1" class="patch">
	<metadata>
		<title>Security update for linuxptp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1187646" ref_url="https://bugzilla.suse.com/1187646" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3570" ref_url="https://www.suse.com/security/cve/CVE-2021-3570/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009196.html" source="SUSE-SU"/>
		<description>
This update for linuxptp fixes the following issues:

- CVE-2021-3570: Validate the messageLength field of incoming messages. (bsc#1187646)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187646">SUSE bug 1187646</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3570/">CVE-2021-3570 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3570">CVE-2021-3570 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626114" comment="linuxptp-1.4-15.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150852" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1115026" ref_url="https://bugzilla.suse.com/1115026" source="BUGZILLA"/>
		<reference ref_id="1175462" ref_url="https://bugzilla.suse.com/1175462" source="BUGZILLA"/>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1185724" ref_url="https://bugzilla.suse.com/1185724" source="BUGZILLA"/>
		<reference ref_id="1185859" ref_url="https://bugzilla.suse.com/1185859" source="BUGZILLA"/>
		<reference ref_id="1185860" ref_url="https://bugzilla.suse.com/1185860" source="BUGZILLA"/>
		<reference ref_id="1185861" ref_url="https://bugzilla.suse.com/1185861" source="BUGZILLA"/>
		<reference ref_id="1185862" ref_url="https://bugzilla.suse.com/1185862" source="BUGZILLA"/>
		<reference ref_id="1185863" ref_url="https://bugzilla.suse.com/1185863" source="BUGZILLA"/>
		<reference ref_id="1185898" ref_url="https://bugzilla.suse.com/1185898" source="BUGZILLA"/>
		<reference ref_id="1185987" ref_url="https://bugzilla.suse.com/1185987" source="BUGZILLA"/>
		<reference ref_id="1186060" ref_url="https://bugzilla.suse.com/1186060" source="BUGZILLA"/>
		<reference ref_id="1186062" ref_url="https://bugzilla.suse.com/1186062" source="BUGZILLA"/>
		<reference ref_id="1186111" ref_url="https://bugzilla.suse.com/1186111" source="BUGZILLA"/>
		<reference ref_id="1186235" ref_url="https://bugzilla.suse.com/1186235" source="BUGZILLA"/>
		<reference ref_id="1186390" ref_url="https://bugzilla.suse.com/1186390" source="BUGZILLA"/>
		<reference ref_id="1186463" ref_url="https://bugzilla.suse.com/1186463" source="BUGZILLA"/>
		<reference ref_id="1187038" ref_url="https://bugzilla.suse.com/1187038" source="BUGZILLA"/>
		<reference ref_id="1187050" ref_url="https://bugzilla.suse.com/1187050" source="BUGZILLA"/>
		<reference ref_id="1187193" ref_url="https://bugzilla.suse.com/1187193" source="BUGZILLA"/>
		<reference ref_id="1187215" ref_url="https://bugzilla.suse.com/1187215" source="BUGZILLA"/>
		<reference ref_id="1187388" ref_url="https://bugzilla.suse.com/1187388" source="BUGZILLA"/>
		<reference ref_id="1187452" ref_url="https://bugzilla.suse.com/1187452" source="BUGZILLA"/>
		<reference ref_id="1187595" ref_url="https://bugzilla.suse.com/1187595" source="BUGZILLA"/>
		<reference ref_id="1187601" ref_url="https://bugzilla.suse.com/1187601" source="BUGZILLA"/>
		<reference ref_id="1187934" ref_url="https://bugzilla.suse.com/1187934" source="BUGZILLA"/>
		<reference ref_id="1188062" ref_url="https://bugzilla.suse.com/1188062" source="BUGZILLA"/>
		<reference ref_id="1188063" ref_url="https://bugzilla.suse.com/1188063" source="BUGZILLA"/>
		<reference ref_id="1188116" ref_url="https://bugzilla.suse.com/1188116" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141/" source="CVE"/>
		<reference ref_id="CVE-2020-26145" ref_url="https://www.suse.com/security/cve/CVE-2020-26145/" source="CVE"/>
		<reference ref_id="CVE-2020-26147" ref_url="https://www.suse.com/security/cve/CVE-2020-26147/" source="CVE"/>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)
- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)
- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)
- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)
- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)
- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bsc#1186463)
- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bsc#1179610)
- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)
- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861)
- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)
- CVE-2021-33034: Fixed an issue in net/bluetooth/hci_event.c where a use-after-free leads to writing an arbitrary value. (bsc#1186111)
- CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1186062)
- CVE-2021-23134: Fixed a use After Free vulnerability in nfc sockets which allows local attackers to elevate their privileges. (bsc#1186060)
- CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859)
- CVE-2020-26141: Fixed a flaw that could allows an adversary to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bsc#1185987)
- CVE-2020-26145: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject arbitrary network packets. (bsc#1185860)
- CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862)
- CVE-2020-26147: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames. (bsc#1185987)

The following non-security bugs were fixed:

- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).
- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).
- hv_netvsc: Add handlers for ethtool get/set msg level (bsc#1175462).
- hv_netvsc: avoid retry on send during shutdown (bsc#1175462).
- hv_netvsc: avoid unnecessary wakeups on subchannel creation (bsc#1175462).
- hv_netvsc: cancel subchannel setup before halting device (bsc#1175462).
- hv_netvsc: change GPAD teardown order on older versions (bsc#1175462).
- hv_netvsc: common detach logic (bsc#1175462).
- hv_netvsc: delay setup of VF device (bsc#1175462).
- hv_netvsc: disable NAPI before channel close (bsc#1175462).
- hv_netvsc: Ensure correct teardown message sequence order (bsc#1175462).
- hv_netvsc: Fix a deadlock by getting rtnl lock earlier in netvsc_probe() (bsc#1175462).
- hv_netvsc: Fix a network regression after ifdown/ifup (bsc#1175462).
- hv_netvsc: fix deadlock on hotplug (bsc#1175462).
- hv_netvsc: Fix error handling in netvsc_attach() (bsc#1175462).
- hv_netvsc: fix error unwind handling if vmbus_open fails (bsc#1175462).
- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (bsc#1175462).
- hv_netvsc: fix handling of fallback to single queue mode (bsc#1175462).
- hv_netvsc: Fix hash key value reset after other ops (bsc#1175462).
- hv_netvsc: Fix IP header checksum for coalesced packets (bsc#1175462).
- hv_netvsc: Fix net device attach on older Windows hosts (bsc#1175462).
- hv_netvsc: fix network namespace issues with VF support (bsc#1175462).
- hv_netvsc: Fix NULL dereference at single queue mode fallback (bsc#1175462).
- hv_netvsc: fix race during initialization (bsc#1175462).
- hv_netvsc: fix race on sub channel creation (bsc#1175462).
- hv_netvsc: fix race that may miss tx queue wakeup (bsc#1175462).
- hv_netvsc: fix schedule in RCU context (bsc#1175462).
- hv_netvsc: Fix the variable sizes in ipsecv2 and rsc offload (bsc#1175462).
- hv_netvsc: Fix tx_table init in rndis_set_subchannel() (bsc#1175462).
- hv_netvsc: Fix unwanted wakeup after tx_disable (bsc#1175462).
- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (bsc#1175462).
- hv_netvsc: flag software created hash value (bsc#1175462).
- hv_netvsc: netvsc_teardown_gpadl() split (bsc#1175462).
- hv_netvsc: only wake transmit queue if link is up (bsc#1175462).
- hv_netvsc: pass netvsc_device to rndis halt (bsc#1175462).
- hv_netvsc: preserve hw_features on mtu/channels/ringparam changes (bsc#1175462).
- hv_netvsc: Refactor assignments of struct netvsc_device_info (bsc#1175462).
- hv_netvsc: set master device (bsc#1175462).
- hv_netvsc: Set tx_table to equal weight after subchannels open (bsc#1175462).
- hv_netvsc: Simplify num_chn checking in rndis_filter_device_add() (bsc#1175462).
- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() (bsc#1175462).
- hv_netvsc: split sub-channel setup into async and sync (bsc#1175462).
- hv_netvsc: typo in NDIS RSS parameters structure (bsc#1175462).
- hv_netvsc: use RCU to fix concurrent rx and queue changes (bsc#1175462).
- hv_netvsc: use reciprocal divide to speed up percent calculation (bsc#1175462).
- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown (bsc#1175462).
- kgraft: truncate the output from state_show() sysfs attr (bsc#1186235).
- mm, memory_hotplug: do not clear numa_node association after hot_remove (bsc#1115026).
- mm: consider __HW_POISON pages when allocating from pcp lists (bsc#1187388).
- scsi: storvsc: Enable scatterlist entry lengths &gt; 4Kbytes (bsc#1187193).
- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-22"/>
	<updated date="2021-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115026">SUSE bug 1115026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175462">SUSE bug 1175462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185724">SUSE bug 1185724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185860">SUSE bug 1185860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185861">SUSE bug 1185861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185862">SUSE bug 1185862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185863">SUSE bug 1185863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185898">SUSE bug 1185898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185987">SUSE bug 1185987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186060">SUSE bug 1186060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186062">SUSE bug 1186062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186111">SUSE bug 1186111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186235">SUSE bug 1186235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186390">SUSE bug 1186390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187193">SUSE bug 1187193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187388">SUSE bug 1187388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187601">SUSE bug 1187601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187934">SUSE bug 1187934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188116">SUSE bug 1188116</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24586">CVE-2020-24586 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24587">CVE-2020-24587 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24588">CVE-2020-24588 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26139">CVE-2020-26139 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26141">CVE-2020-26141 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26145/">CVE-2020-26145 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26145">CVE-2020-26145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26147/">CVE-2020-26147 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26147">CVE-2020-26147 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26558">CVE-2020-26558 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36386">CVE-2020-36386 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0129">CVE-2021-0129 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0605">CVE-2021-0605 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23134">CVE-2021-23134 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34693">CVE-2021-34693 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625812" comment="kernel-default-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625813" comment="kernel-default-base-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625814" comment="kernel-default-devel-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625761" comment="kernel-devel-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625762" comment="kernel-macros-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625763" comment="kernel-source-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625815" comment="kernel-syms-4.4.180-94.147.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150853" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1187364" ref_url="https://bugzilla.suse.com/1187364" source="BUGZILLA"/>
		<reference ref_id="1187365" ref_url="https://bugzilla.suse.com/1187365" source="BUGZILLA"/>
		<reference ref_id="1187366" ref_url="https://bugzilla.suse.com/1187366" source="BUGZILLA"/>
		<reference ref_id="1187367" ref_url="https://bugzilla.suse.com/1187367" source="BUGZILLA"/>
		<reference ref_id="1187529" ref_url="https://bugzilla.suse.com/1187529" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3593" ref_url="https://www.suse.com/security/cve/CVE-2021-3593/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<reference ref_id="CVE-2021-3611" ref_url="https://www.suse.com/security/cve/CVE-2021-3611/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009229.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2021-3595: Fixed slirp: invalid pointer initialization may lead to information disclosure (tftp) (bsc#1187366)
- CVE-2021-3592: Fix for slirp: invalid pointer initialization may lead to information disclosure (bootp) (bsc#1187364)
- CVE-2021-3594: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp) (bsc#1187367)
- CVE-2021-3593: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp6) (bsc#1187365)
- CVE-2021-3611: Fix intel-hda segmentation fault due to stack overflow (bsc#1187529)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-29"/>
	<updated date="2021-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187365">SUSE bug 1187365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187366">SUSE bug 1187366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187529">SUSE bug 1187529</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3593/">CVE-2021-3593 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3593">CVE-2021-3593 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3595">CVE-2021-3595 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3611/">CVE-2021-3611 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3611">CVE-2021-3611 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625025" comment="qemu-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625026" comment="qemu-block-curl-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625027" comment="qemu-block-iscsi-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624976" comment="qemu-block-rbd-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625028" comment="qemu-block-ssh-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625029" comment="qemu-guest-agent-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624979" comment="qemu-ipxe-1.0.0+-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624980" comment="qemu-kvm-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625030" comment="qemu-lang-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624983" comment="qemu-seabios-1.10.2_0_g5f4c7b1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624984" comment="qemu-sgabios-8-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625031" comment="qemu-tools-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624986" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624987" comment="qemu-x86-2.9.1-6.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150854" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1172505" ref_url="https://bugzilla.suse.com/1172505" source="BUGZILLA"/>
		<reference ref_id="1187105" ref_url="https://bugzilla.suse.com/1187105" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12049" ref_url="https://www.suse.com/security/cve/CVE-2020-12049/" source="CVE"/>
		<reference ref_id="CVE-2020-35512" ref_url="https://www.suse.com/security/cve/CVE-2020-35512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009240.html" source="SUSE-SU"/>
		<description>
This update for dbus-1 fixes the following issues:

- CVE-2020-35512: Fixed a bug where users with the same numeric UID could lead to use-after-free and undefined behaviour. (bsc#1187105)
- CVE-2020-12049: Fixed a bug where a truncated messages lead to resource exhaustion. (bsc#1172505)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-02"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172505">SUSE bug 1172505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187105">SUSE bug 1187105</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12049/">CVE-2020-12049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12049">CVE-2020-12049 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35512/">CVE-2020-35512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35512">CVE-2020-35512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625809" comment="dbus-1-1.8.22-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625810" comment="dbus-1-x11-1.8.22-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625811" comment="libdbus-1-3-1.8.22-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625756" comment="libdbus-1-3-32bit-1.8.22-29.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150855" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1188697" ref_url="https://bugzilla.suse.com/1188697" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21775" ref_url="https://www.suse.com/security/cve/CVE-2021-21775/" source="CVE"/>
		<reference ref_id="CVE-2021-21779" ref_url="https://www.suse.com/security/cve/CVE-2021-21779/" source="CVE"/>
		<reference ref_id="CVE-2021-30663" ref_url="https://www.suse.com/security/cve/CVE-2021-30663/" source="CVE"/>
		<reference ref_id="CVE-2021-30665" ref_url="https://www.suse.com/security/cve/CVE-2021-30665/" source="CVE"/>
		<reference ref_id="CVE-2021-30689" ref_url="https://www.suse.com/security/cve/CVE-2021-30689/" source="CVE"/>
		<reference ref_id="CVE-2021-30720" ref_url="https://www.suse.com/security/cve/CVE-2021-30720/" source="CVE"/>
		<reference ref_id="CVE-2021-30734" ref_url="https://www.suse.com/security/cve/CVE-2021-30734/" source="CVE"/>
		<reference ref_id="CVE-2021-30744" ref_url="https://www.suse.com/security/cve/CVE-2021-30744/" source="CVE"/>
		<reference ref_id="CVE-2021-30749" ref_url="https://www.suse.com/security/cve/CVE-2021-30749/" source="CVE"/>
		<reference ref_id="CVE-2021-30758" ref_url="https://www.suse.com/security/cve/CVE-2021-30758/" source="CVE"/>
		<reference ref_id="CVE-2021-30795" ref_url="https://www.suse.com/security/cve/CVE-2021-30795/" source="CVE"/>
		<reference ref_id="CVE-2021-30797" ref_url="https://www.suse.com/security/cve/CVE-2021-30797/" source="CVE"/>
		<reference ref_id="CVE-2021-30799" ref_url="https://www.suse.com/security/cve/CVE-2021-30799/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.32.3:

- CVE-2021-21775: Fixed a use-after-free vulnerability in the way certain events are processed for ImageLoader objects. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. (bsc#1188697)
- CVE-2021-21779: Fixed a use-after-free vulnerability in the way that WebKit GraphicsContext handles certain events. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. (bsc#1188697)
- CVE-2021-30663: An integer overflow was addressed with improved input validation. (bsc#1188697)
- CVE-2021-30665: A memory corruption issue was addressed with improved state management. (bsc#1188697)
- CVE-2021-30689: A logic issue was addressed with improved state management. (bsc#1188697)
- CVE-2021-30720: A logic issue was addressed with improved restrictions. (bsc#1188697)
- CVE-2021-30734: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
- CVE-2021-30744: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. (bsc#1188697)
- CVE-2021-30749: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
- CVE-2021-30758: A type confusion issue was addressed with improved state handling. (bsc#1188697)
- CVE-2021-30795: A use after free issue was addressed with improved memory management. (bsc#1188697)
- CVE-2021-30797: This issue was addressed with improved checks. (bsc#1188697)
- CVE-2021-30799: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-03"/>
	<updated date="2021-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21775/">CVE-2021-21775 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21775">CVE-2021-21775 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21779/">CVE-2021-21779 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21779">CVE-2021-21779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30663/">CVE-2021-30663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30663">CVE-2021-30663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30665/">CVE-2021-30665 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30665">CVE-2021-30665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30689/">CVE-2021-30689 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30689">CVE-2021-30689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30720/">CVE-2021-30720 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30720">CVE-2021-30720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30734/">CVE-2021-30734 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30734">CVE-2021-30734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30744/">CVE-2021-30744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30744">CVE-2021-30744 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30749/">CVE-2021-30749 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30749">CVE-2021-30749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30758/">CVE-2021-30758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30758">CVE-2021-30758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30795/">CVE-2021-30795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30795">CVE-2021-30795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30797/">CVE-2021-30797 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30797">CVE-2021-30797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30799/">CVE-2021-30799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30799">CVE-2021-30799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627312" comment="libjavascriptcoregtk-4_0-18-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627313" comment="libwebkit2gtk-4_0-37-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627314" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627315" comment="typelib-1_0-WebKit2-4_0-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627317" comment="webkit2gtk-4_0-injected-bundles-2.32.3-2.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150856" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1100167" ref_url="https://bugzilla.suse.com/1100167" source="BUGZILLA"/>
		<reference ref_id="1116993" ref_url="https://bugzilla.suse.com/1116993" source="BUGZILLA"/>
		<reference ref_id="1117954" ref_url="https://bugzilla.suse.com/1117954" source="BUGZILLA"/>
		<reference ref_id="1188540" ref_url="https://bugzilla.suse.com/1188540" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13139" ref_url="https://www.suse.com/security/cve/CVE-2018-13139/" source="CVE"/>
		<reference ref_id="CVE-2018-19432" ref_url="https://www.suse.com/security/cve/CVE-2018-19432/" source="CVE"/>
		<reference ref_id="CVE-2018-19758" ref_url="https://www.suse.com/security/cve/CVE-2018-19758/" source="CVE"/>
		<reference ref_id="CVE-2021-3246" ref_url="https://www.suse.com/security/cve/CVE-2021-3246/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009252.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2018-13139: Fixed a stack-based buffer overflow in psf_memset in common.c in libsndfile 1.0.28allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact. (bsc#1100167)
- CVE-2018-19432: Fixed a NULL pointer dereference in the function sf_write_int in sndfile.c, which will lead to a denial of service. (bsc#1116993)
- CVE-2021-3246: Fixed a heap buffer overflow vulnerability in msadpcm_decode_block. (bsc#1188540)
- CVE-2018-19758: Fixed a heap-based buffer over-read at wav.c in wav_write_header in libsndfile 1.0.28 that will cause a denial of service. (bsc#1117954)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1100167">SUSE bug 1100167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116993">SUSE bug 1116993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117954">SUSE bug 1117954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188540">SUSE bug 1188540</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13139/">CVE-2018-13139 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13139">CVE-2018-13139 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19432/">CVE-2018-19432 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19432">CVE-2018-19432 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19758/">CVE-2018-19758 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19758">CVE-2018-19758 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3246/">CVE-2021-3246 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3246">CVE-2021-3246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626903" comment="libsndfile1-1.0.25-36.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626901" comment="libsndfile1-32bit-1.0.25-36.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150857" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009250.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3630: out-of-bounds write in DJVU:DjVuTXT:decode() in DjVuText.cpp (bsc#1187869)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3630">CVE-2021-3630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627946" comment="libdjvulibre21-3.5.25.3-5.19.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150858" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1189206" ref_url="https://bugzilla.suse.com/1189206" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009291.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

  It was possible to trigger Remote code execution due to a integer overflow (CVE-2021-38185, bsc#1189206)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-14"/>
	<updated date="2021-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189206">SUSE bug 1189206</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630615" comment="cpio-2.11-36.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630610" comment="cpio-lang-2.11-36.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150859" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1188881" ref_url="https://bugzilla.suse.com/1188881" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009294.html" source="SUSE-SU"/>
		<description>
This update for libcares2 fixes the following issues:

- CVE-2021-3672: Fixed input validation on hostnames (bsc#1188881).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3672">CVE-2021-3672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630393" comment="libcares2-1.9.1-9.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150860" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.13.0 ESR (MFSA 2021-34, bsc#1188891):

- CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
- CVE-2021-29988: Memory corruption as a result of incorrect style treatment
- CVE-2021-29984: Incorrect instruction reordering during JIT optimization
- CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
- CVE-2021-29985: Use-after-free media channels
- CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630616" comment="MozillaFirefox-78.13.0-112.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630617" comment="MozillaFirefox-devel-78.13.0-112.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630618" comment="MozillaFirefox-translations-common-78.13.0-112.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150861" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1033081" ref_url="https://bugzilla.suse.com/1033081" source="BUGZILLA"/>
		<reference ref_id="1182807" ref_url="https://bugzilla.suse.com/1182807" source="BUGZILLA"/>
		<reference ref_id="1188034" ref_url="https://bugzilla.suse.com/1188034" source="BUGZILLA"/>
		<reference ref_id="1188875" ref_url="https://bugzilla.suse.com/1188875" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36386" ref_url="https://www.suse.com/security/cve/CVE-2021-36386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009308.html" source="SUSE-SU"/>
		<description>
This update for fetchmail fixes the following issues:

- CVE-2021-36386: DoS or information disclosure in some configurations (bsc#1188875)
- Change PASSWORDLEN from 64 to 256 [bsc#1188034]
- Set the hostname for SNI when using TLS [bsc#1182807]
- Allow --syslog option in daemon mode. (bsc#1033081)
- Set the hostname for SNI when using TLS. (bsc#1182807)
- Change PASSWORDLEN from 64 to 256 (bsc#1188034)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-18"/>
	<updated date="2021-08-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033081">SUSE bug 1033081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182807">SUSE bug 1182807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188034">SUSE bug 1188034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188875">SUSE bug 1188875</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36386/">CVE-2021-36386 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36386">CVE-2021-36386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630872" comment="fetchmail-6.3.26-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630873" comment="fetchmailconf-6.3.26-13.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150862" version="1" class="patch">
	<metadata>
		<title>Recommended update for cpio (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1189465" ref_url="https://bugzilla.suse.com/1189465" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<reference ref_id="SUSE-RU-2021:2779-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019895.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

- A regression in the previous update could lead to crashes (bsc#1189465)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-19"/>
	<updated date="2021-08-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1189465">SUSE bug 1189465</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631319" comment="cpio-2.11-36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631320" comment="cpio-lang-2.11-36.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150863" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1185056" ref_url="https://bugzilla.suse.com/1185056" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188566" ref_url="https://bugzilla.suse.com/1188566" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2161" ref_url="https://www.suse.com/security/cve/CVE-2021-2161/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009315.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u302 (icedtea 3.20.0)
- CVE-2021-2341: Improve file transfers. (bsc#1188564)
- CVE-2021-2369: Better jar file validation. (bsc#1188565)
- CVE-2021-2388: Enhance compiler validation. (bsc#1188566)
- CVE-2021-2161: Less ambiguous processing. (bsc#1185056)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185056">SUSE bug 1185056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188566">SUSE bug 1188566</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2161/">CVE-2021-2161 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2161">CVE-2021-2161 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2388">CVE-2021-2388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627215" comment="java-1_8_0-openjdk-1.8.0.302-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627216" comment="java-1_8_0-openjdk-demo-1.8.0.302-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627217" comment="java-1_8_0-openjdk-devel-1.8.0.302-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627218" comment="java-1_8_0-openjdk-headless-1.8.0.302-27.63.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150864" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1189465" ref_url="https://bugzilla.suse.com/1189465" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009333.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

- A patch previously applied to remedy CVE-2021-38185 introduced a regression
  that had the potential to cause a segmentation fault in cpio. [bsc#1189465]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189465">SUSE bug 1189465</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631542" comment="cpio-2.11-36.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631541" comment="cpio-lang-2.11-36.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150865" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyYAML (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1174514" ref_url="https://bugzilla.suse.com/1174514" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14343" ref_url="https://www.suse.com/security/cve/CVE-2020-14343/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009336.html" source="SUSE-SU"/>
		<description>

This update for python-PyYAML fixes the following issues:

- Update to 5.3.1.

- CVE-2020-14343: A vulnerability was discovered in the PyYAML library,
  where it was susceptible to arbitrary code execution when it processes
  untrusted YAML files through the full_load method or with the FullLoader
  loader. Applications that use the library to process untrusted input
  may be vulnerable to this flaw. This flaw allows an attacker to
  execute arbitrary code on the system by abusing the python/object/new
  constructor. This flaw is due to an incomplete fix for CVE-2020-1747.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174514">SUSE bug 1174514</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14343/">CVE-2020-14343 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14343">CVE-2020-14343 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628223" comment="python-PyYAML-5.3.1-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628224" comment="python3-PyYAML-5.3.1-28.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150866" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009342.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following security issue:

- CVE-2021-3712: a bug in the code for printing certificate details could lead
  to a buffer overrun that a malicious actor could exploit to crash the
  application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631696" comment="libopenssl-devel-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631697" comment="libopenssl1_0_0-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631678" comment="libopenssl1_0_0-32bit-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631698" comment="libopenssl1_0_0-hmac-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631680" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631699" comment="openssl-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631682" comment="openssl-doc-1.0.2j-60.69.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150867" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1046882" ref_url="https://bugzilla.suse.com/1046882" source="BUGZILLA"/>
		<reference ref_id="1054038" ref_url="https://bugzilla.suse.com/1054038" source="BUGZILLA"/>
		<reference ref_id="1187974" ref_url="https://bugzilla.suse.com/1187974" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-12938" ref_url="https://www.suse.com/security/cve/CVE-2017-12938/" source="CVE"/>
		<reference ref_id="CVE-2017-12940" ref_url="https://www.suse.com/security/cve/CVE-2017-12940/" source="CVE"/>
		<reference ref_id="CVE-2017-12941" ref_url="https://www.suse.com/security/cve/CVE-2017-12941/" source="CVE"/>
		<reference ref_id="CVE-2017-12942" ref_url="https://www.suse.com/security/cve/CVE-2017-12942/" source="CVE"/>
		<reference ref_id="CVE-2017-20006" ref_url="https://www.suse.com/security/cve/CVE-2017-20006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009355.html" source="SUSE-SU"/>
		<description>
This update for unrar to version 5.6.1 fixes several issues.

These security issues were fixed:

- CVE-2017-12938: Prevent remote attackers to bypass a directory-traversal
  protection mechanism via vectors involving a symlink to the . directory, a
  symlink to the .. directory, and a regular file (bsc#1054038).
- CVE-2017-12940: Prevent out-of-bounds read in the EncodeFileName::Decode call
  within the Archive::ReadHeader15 function (bsc#1054038).
- CVE-2017-12941: Prevent an out-of-bounds read in the Unpack::Unpack20
  function (bsc#1054038).
- CVE-2017-12942: Prevent a buffer overflow in the Unpack::LongLZ function
  (bsc#1054038).
- CVE-2017-20006: Fixed heap-based buffer overflow in Unpack:CopyString (bsc#1187974).

These non-security issues were fixed:

- Added extraction support for .LZ archives created by Lzip compressor
- Enable unpacking of files in ZIP archives compressed with XZ algorithm and
  encrypted with AES
- Added support for PAX extended headers inside of TAR archive
- If RAR recovery volumes (.rev files) are present in the same folder as usual
  RAR volumes, archive test command verifies .rev contents after completing
  testing .rar files
- By default unrar skips symbolic links with absolute paths in link target when
  extracting unless -ola command line switch is specified
- Added support for AES-NI CPU instructions
- Support for a new RAR 5.0 archiving format
- Wildcard exclusion mask for folders
- Prevent conditional jumps depending on uninitialised values (bsc#1046882)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046882">SUSE bug 1046882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054038">SUSE bug 1054038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187974">SUSE bug 1187974</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6706">CVE-2012-6706 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12938/">CVE-2017-12938 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12938">CVE-2017-12938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12940/">CVE-2017-12940 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12940">CVE-2017-12940 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12941/">CVE-2017-12941 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12941">CVE-2017-12941 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12942/">CVE-2017-12942 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12942">CVE-2017-12942 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-20006/">CVE-2017-20006 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-20006">CVE-2017-20006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631579" comment="unrar-5.6.1-4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150868" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1117483" ref_url="https://bugzilla.suse.com/1117483" source="BUGZILLA"/>
		<reference ref_id="1181345" ref_url="https://bugzilla.suse.com/1181345" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27827" ref_url="https://www.suse.com/security/cve/CVE-2020-27827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008266.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:
	  
- openvswitch was updated to 2.7.12
- CVE-2020-27827: Fixed a memory leak when parsing lldp packets (bsc#1181345)	  
A lot more minor bugs have been fixed with this openvswitch version. Please refer to the changelog of
the openvswitch.rpm file in order to obtain a list of all changes.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-02"/>
	<updated date="2021-02-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1117483">SUSE bug 1117483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181345">SUSE bug 1181345</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27827/">CVE-2020-27827 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27827">CVE-2020-27827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555935" comment="openvswitch-2.7.12-3.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150869" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1188576" ref_url="https://bugzilla.suse.com/1188576" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25051" ref_url="https://www.suse.com/security/cve/CVE-2019-25051/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009356.html" source="SUSE-SU"/>
		<description>
This update for aspell fixes the following issues:

- CVE-2019-25051: Fixed heap-buffer-overflow in acommon:ObjStack:dup_top (bsc#1188576).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188576">SUSE bug 1188576</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25051/">CVE-2019-25051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25051">CVE-2019-25051 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627800" comment="aspell-0.60.6.1-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627801" comment="aspell-ispell-0.60.6.1-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627802" comment="libaspell15-0.60.6.1-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627791" comment="libaspell15-32bit-0.60.6.1-18.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150870" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1175443" ref_url="https://bugzilla.suse.com/1175443" source="BUGZILLA"/>
		<reference ref_id="1188888" ref_url="https://bugzilla.suse.com/1188888" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8622" ref_url="https://www.suse.com/security/cve/CVE-2020-8622/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009368.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8622: A truncated TSIG response can lead to an assertion failure (bsc#1175443).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-30"/>
	<updated date="2021-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188888">SUSE bug 1188888</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8622/">CVE-2020-8622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8622">CVE-2020-8622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627796" comment="bind-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627797" comment="bind-chrootenv-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627784" comment="bind-doc-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627798" comment="bind-libs-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627786" comment="bind-libs-32bit-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627799" comment="bind-utils-9.9.9P1-63.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150871" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1188457" ref_url="https://bugzilla.suse.com/1188457" source="BUGZILLA"/>
		<reference ref_id="1188458" ref_url="https://bugzilla.suse.com/1188458" source="BUGZILLA"/>
		<reference ref_id="1188459" ref_url="https://bugzilla.suse.com/1188459" source="BUGZILLA"/>
		<reference ref_id="1188460" ref_url="https://bugzilla.suse.com/1188460" source="BUGZILLA"/>
		<reference ref_id="1188461" ref_url="https://bugzilla.suse.com/1188461" source="BUGZILLA"/>
		<reference ref_id="1188462" ref_url="https://bugzilla.suse.com/1188462" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20298" ref_url="https://www.suse.com/security/cve/CVE-2021-20298/" source="CVE"/>
		<reference ref_id="CVE-2021-20299" ref_url="https://www.suse.com/security/cve/CVE-2021-20299/" source="CVE"/>
		<reference ref_id="CVE-2021-20300" ref_url="https://www.suse.com/security/cve/CVE-2021-20300/" source="CVE"/>
		<reference ref_id="CVE-2021-20302" ref_url="https://www.suse.com/security/cve/CVE-2021-20302/" source="CVE"/>
		<reference ref_id="CVE-2021-20303" ref_url="https://www.suse.com/security/cve/CVE-2021-20303/" source="CVE"/>
		<reference ref_id="CVE-2021-20304" ref_url="https://www.suse.com/security/cve/CVE-2021-20304/" source="CVE"/>
		<reference ref_id="CVE-2021-3476" ref_url="https://www.suse.com/security/cve/CVE-2021-3476/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009386.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- CVE-2021-20298 [bsc#1188460]: Fixed Out-of-memory in B44Compressor
- CVE-2021-20299 [bsc#1188459]: Fixed Null-dereference READ in Imf_2_5:Header:operator
- CVE-2021-20300 [bsc#1188458]: Fixed Integer-overflow in Imf_2_5:hufUncompress
- CVE-2021-20302 [bsc#1188462]: Fixed Floating-point-exception in Imf_2_5:precalculateTileInfot
- CVE-2021-20303 [bsc#1188457]: Fixed Heap-buffer-overflow in Imf_2_5::copyIntoFrameBuffer
- CVE-2021-20304 [bsc#1188461]: Fixed Undefined-shift in Imf_2_5:hufDecode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188457">SUSE bug 1188457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188458">SUSE bug 1188458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188459">SUSE bug 1188459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188460">SUSE bug 1188460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188461">SUSE bug 1188461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188462">SUSE bug 1188462</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20298/">CVE-2021-20298 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20298">CVE-2021-20298 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20299/">CVE-2021-20299 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20299">CVE-2021-20299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20300/">CVE-2021-20300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20300">CVE-2021-20300 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20302/">CVE-2021-20302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20302">CVE-2021-20302 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-20303/">CVE-2021-20303 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20303">CVE-2021-20303 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20304/">CVE-2021-20304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20304">CVE-2021-20304 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3476/">CVE-2021-3476 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3476">CVE-2021-3476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627947" comment="libIlmImf-Imf_2_1-21-2.1.0-6.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627948" comment="openexr-2.1.0-6.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150872" version="1" class="patch">
	<metadata>
		<title>Security update for libesmtp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1160462" ref_url="https://bugzilla.suse.com/1160462" source="BUGZILLA"/>
		<reference ref_id="1189097" ref_url="https://bugzilla.suse.com/1189097" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19977" ref_url="https://www.suse.com/security/cve/CVE-2019-19977/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009380.html" source="SUSE-SU"/>
		<description>
This update for libesmtp fixes the following issues:

- CVE-2019-19977: Fix stack-based buffer over-read in ntlm/ntlmstruct.c (bsc#1160462).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160462">SUSE bug 1160462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189097">SUSE bug 1189097</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19977/">CVE-2019-19977 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19977">CVE-2019-19977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628213" comment="libesmtp-1.0.6-17.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150873" version="1" class="patch">
	<metadata>
		<title>Security update for file (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1154661" ref_url="https://bugzilla.suse.com/1154661" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18218" ref_url="https://www.suse.com/security/cve/CVE-2019-18218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009396.html" source="SUSE-SU"/>
		<description>
This update for file fixes the following issues:

- CVE-2019-18218: Fixed heap-based buffer overflow in cdf_read_property_info in cdf.c (bsc#1154661).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154661">SUSE bug 1154661</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18218/">CVE-2019-18218 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18218">CVE-2019-18218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628151" comment="file-5.22-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628152" comment="file-magic-5.22-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628153" comment="libmagic1-5.22-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628154" comment="libmagic1-32bit-5.22-10.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150874" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1182654" ref_url="https://bugzilla.suse.com/1182654" source="BUGZILLA"/>
		<reference ref_id="1186429" ref_url="https://bugzilla.suse.com/1186429" source="BUGZILLA"/>
		<reference ref_id="1186433" ref_url="https://bugzilla.suse.com/1186433" source="BUGZILLA"/>
		<reference ref_id="1186434" ref_url="https://bugzilla.suse.com/1186434" source="BUGZILLA"/>
		<reference ref_id="1187369" ref_url="https://bugzilla.suse.com/1187369" source="BUGZILLA"/>
		<reference ref_id="1187376" ref_url="https://bugzilla.suse.com/1187376" source="BUGZILLA"/>
		<reference ref_id="1187378" ref_url="https://bugzilla.suse.com/1187378" source="BUGZILLA"/>
		<reference ref_id="1189373" ref_url="https://bugzilla.suse.com/1189373" source="BUGZILLA"/>
		<reference ref_id="1189376" ref_url="https://bugzilla.suse.com/1189376" source="BUGZILLA"/>
		<reference ref_id="1189378" ref_url="https://bugzilla.suse.com/1189378" source="BUGZILLA"/>
		<reference ref_id="1189380" ref_url="https://bugzilla.suse.com/1189380" source="BUGZILLA"/>
		<reference ref_id="1189882" ref_url="https://bugzilla.suse.com/1189882" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0089" ref_url="https://www.suse.com/security/cve/CVE-2021-0089/" source="CVE"/>
		<reference ref_id="CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255/" source="CVE"/>
		<reference ref_id="CVE-2021-28690" ref_url="https://www.suse.com/security/cve/CVE-2021-28690/" source="CVE"/>
		<reference ref_id="CVE-2021-28692" ref_url="https://www.suse.com/security/cve/CVE-2021-28692/" source="CVE"/>
		<reference ref_id="CVE-2021-28694" ref_url="https://www.suse.com/security/cve/CVE-2021-28694/" source="CVE"/>
		<reference ref_id="CVE-2021-28695" ref_url="https://www.suse.com/security/cve/CVE-2021-28695/" source="CVE"/>
		<reference ref_id="CVE-2021-28696" ref_url="https://www.suse.com/security/cve/CVE-2021-28696/" source="CVE"/>
		<reference ref_id="CVE-2021-28697" ref_url="https://www.suse.com/security/cve/CVE-2021-28697/" source="CVE"/>
		<reference ref_id="CVE-2021-28698" ref_url="https://www.suse.com/security/cve/CVE-2021-28698/" source="CVE"/>
		<reference ref_id="CVE-2021-28699" ref_url="https://www.suse.com/security/cve/CVE-2021-28699/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-3594: slirp: invalid pointer initialization may lead to information disclosure (udp)(bsc#1187378).
- CVE-2021-3595: slirp: invalid pointer initialization may lead to information disclosure (tftp)(bsc#1187376).
- CVE-2021-28698: long running loops in grant table handling (XSA-380)(bsc#1189378).
- CVE-2021-28699: inadequate grant-v2 status frames array bounds check (XSA-382)(bsc#1189380).
- CVE-2021-20255: Fixed stack overflow via infinite recursion in eepro100 (bsc#1182654)
- CVE-2021-28690: xen: x86: TSX Async Abort protections not restored after S3 (bsc#1186434)
- CVE-2021-28692: xen: inappropriate x86 IOMMU timeout detection / handling (bsc#1186429)
- CVE-2021-28694,CVE-2021-28695,CVE-2021-28696: IOMMU page mapping issues on x86 (XSA-378)(bsc#1189373).
- CVE-2021-0089: xen: Speculative Code Store Bypass (bsc#1186433)
- CVE-2021-28697: grant table v2 status pages may remain accessible after de-allocation (XSA-379)(bsc#1189376).
- CVE-2021-3592: slirp: invalid pointer initialization may lead to information disclosure (bootp)(bsc#1187369).

- Prevent superpage allocation in the LAPIC and ACPI_INFO range (bsc#1189882).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-06"/>
	<updated date="2021-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182654">SUSE bug 1182654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186429">SUSE bug 1186429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186433">SUSE bug 1186433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186434">SUSE bug 1186434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187369">SUSE bug 1187369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187376">SUSE bug 1187376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187378">SUSE bug 1187378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189376">SUSE bug 1189376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189378">SUSE bug 1189378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189380">SUSE bug 1189380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189882">SUSE bug 1189882</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0089/">CVE-2021-0089 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0089">CVE-2021-0089 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20255">CVE-2021-20255 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28690/">CVE-2021-28690 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28690">CVE-2021-28690 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-28692/">CVE-2021-28692 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28692">CVE-2021-28692 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28694/">CVE-2021-28694 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28694">CVE-2021-28694 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28695/">CVE-2021-28695 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28695">CVE-2021-28695 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28696/">CVE-2021-28696 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28696">CVE-2021-28696 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28697/">CVE-2021-28697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28697">CVE-2021-28697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28698/">CVE-2021-28698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28698">CVE-2021-28698 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28699/">CVE-2021-28699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28699">CVE-2021-28699 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3595">CVE-2021-3595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632286" comment="xen-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632287" comment="xen-doc-html-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632288" comment="xen-libs-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632289" comment="xen-libs-32bit-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632290" comment="xen-tools-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632291" comment="xen-tools-domU-4.9.4_20-3.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150875" version="1" class="patch">
	<metadata>
		<title>Recommended update for mozilla-nspr, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1029961" ref_url="https://bugzilla.suse.com/1029961" source="BUGZILLA"/>
		<reference ref_id="1174697" ref_url="https://bugzilla.suse.com/1174697" source="BUGZILLA"/>
		<reference ref_id="1176206" ref_url="https://bugzilla.suse.com/1176206" source="BUGZILLA"/>
		<reference ref_id="1176934" ref_url="https://bugzilla.suse.com/1176934" source="BUGZILLA"/>
		<reference ref_id="1179382" ref_url="https://bugzilla.suse.com/1179382" source="BUGZILLA"/>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12400" ref_url="https://www.suse.com/security/cve/CVE-2020-12400/" source="CVE"/>
		<reference ref_id="CVE-2020-12401" ref_url="https://www.suse.com/security/cve/CVE-2020-12401/" source="CVE"/>
		<reference ref_id="CVE-2020-12403" ref_url="https://www.suse.com/security/cve/CVE-2020-12403/" source="CVE"/>
		<reference ref_id="CVE-2020-25648" ref_url="https://www.suse.com/security/cve/CVE-2020-25648/" source="CVE"/>
		<reference ref_id="CVE-2020-6829" ref_url="https://www.suse.com/security/cve/CVE-2020-6829/" source="CVE"/>
		<reference ref_id="SUSE-RU-2021:3116-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020178.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr fixes the following issues:

mozilla-nspr was updated to version 4.32:

* implement new socket option PR_SockOpt_DontFrag
* support larger DNS records by increasing the default buffer
  size for DNS queries 
* Lock access to PRCallOnceType members in PR_CallOnce* for
  thread safety bmo#1686138
* PR_GetSystemInfo supports a new flag PR_SI_RELEASE_BUILD to get
  information about the operating system build version.


Mozilla NSS was updated to version 3.68:

* bmo#1713562 - Fix test leak.
* bmo#1717452 - NSS 3.68 should depend on NSPR 4.32.
* bmo#1693206 - Implement PKCS8 export of ECDSA keys.
* bmo#1712883 - DTLS 1.3 draft-43.
* bmo#1655493 - Support SHA2 HW acceleration using Intel SHA Extension.
* bmo#1713562 - Validate ECH public names.
* bmo#1717610 - Add function to get seconds from epoch from pkix::Time.

update to NSS 3.67

* bmo#1683710 - Add a means to disable ALPN.
* bmo#1715720 - Fix nssckbi version number in NSS 3.67 (was supposed to be incremented in 3.66).
* bmo#1714719 - Set NSS_USE_64 on riscv64 target when using GYP/Ninja.
* bmo#1566124 - Fix counter increase in ppc-gcm-wrap.c.
* bmo#1566124 - Fix AES_GCM mode on ppc64le for messages of length more than 255-byte.

update to NSS 3.66

* bmo#1710716 - Remove Expired Sonera Class2 CA from NSS.
* bmo#1710716 - Remove Expired Root Certificates from NSS - QuoVadis Root Certification Authority.
* bmo#1708307 - Remove Trustis FPS Root CA from NSS.
* bmo#1707097 - Add Certum Trusted Root CA to NSS.
* bmo#1707097 - Add Certum EC-384 CA to NSS.
* bmo#1703942 - Add ANF Secure Server Root CA to NSS.
* bmo#1697071 - Add GLOBALTRUST 2020 root cert to NSS.
* bmo#1712184 - NSS tools manpages need to be updated to reflect that sqlite is the default database.
* bmo#1712230 - Don't build ppc-gcm.s with clang integrated assembler.
* bmo#1712211 - Strict prototype error when trying to compile nss code that includes blapi.h.
* bmo#1710773 - NSS needs FIPS 180-3 FIPS indicators.
* bmo#1709291 - Add VerifyCodeSigningCertificateChain.

update to NSS 3.65

* bmo#1709654 - Update for NetBSD configuration.
* bmo#1709750 - Disable HPKE test when fuzzing.
* bmo#1566124 - Optimize AES-GCM for ppc64le.
* bmo#1699021 - Add AES-256-GCM to HPKE.
* bmo#1698419 - ECH -10 updates.
* bmo#1692930 - Update HPKE to final version.
* bmo#1707130 - NSS should use modern algorithms in PKCS#12 files by default.
* bmo#1703936 - New coverity/cpp scanner errors.
* bmo#1697303 - NSS needs to update it's csp clearing to FIPS 180-3 standards.
* bmo#1702663 - Need to support RSA PSS with Hashing PKCS #11 Mechanisms.
* bmo#1705119 - Deadlock when using GCM and non-thread safe tokens.

update to NSS 3.64

* bmo#1705286 - Properly detect mips64.
* bmo#1687164 - Introduce NSS_DISABLE_CRYPTO_VSX and
		disable_crypto_vsx.
* bmo#1698320 - replace __builtin_cpu_supports('vsx') with
		ppc_crypto_support() for clang.
* bmo#1613235 - Add POWER ChaCha20 stream cipher vector
		acceleration.

Fixed in 3.63

* bmo#1697380 - Make a clang-format run on top of helpful contributions.
* bmo#1683520 - ECCKiila P384, change syntax of nested structs
		initialization to prevent build isses with GCC 4.8.
* bmo#1683520 - [lib/freebl/ecl] P-384: allow zero scalars in dual
		scalar multiplication.
* bmo#1683520 - ECCKiila P521, change syntax of nested structs
		initialization to prevent build isses with GCC 4.8.
* bmo#1683520 - [lib/freebl/ecl] P-521: allow zero scalars in dual
		scalar multiplication.
* bmo#1696800 - HACL* update March 2021 - c95ab70fcb2bc21025d8845281bc4bc8987ca683.
* bmo#1694214 - tstclnt can't enable middlebox compat mode.
* bmo#1694392 - NSS does not work with PKCS #11 modules not supporting
		profiles.
* bmo#1685880 - Minor fix to prevent unused variable on early return.
* bmo#1685880 - Fix for the gcc compiler version 7 to support setenv
		with nss build.
* bmo#1693217 - Increase nssckbi.h version number for March 2021 batch
		of root CA changes, CA list version 2.48.
* bmo#1692094 - Set email distrust after to 21-03-01 for Camerfirma's
		'Chambers of Commerce' and 'Global Chambersign' roots.
* bmo#1618407 - Symantec root certs - Set CKA_NSS_EMAIL_DISTRUST_AFTER.
* bmo#1693173 - Add GlobalSign R45, E45, R46, and E46 root certs to NSS.
* bmo#1683738 - Add AC RAIZ FNMT-RCM SERVIDORES SEGUROS root cert to NSS.
* bmo#1686854 - Remove GeoTrust PCA-G2 and VeriSign Universal root certs
		from NSS.
* bmo#1687822 - Turn off Websites trust bit for the “Staat der
		Nederlanden Root CA - G3” root cert in NSS.
* bmo#1692094 - Turn off Websites Trust Bit for 'Chambers of Commerce
		Root - 2008' and 'Global Chambersign Root - 2008’.
* bmo#1694291 - Tracing fixes for ECH.

update to NSS 3.62

* bmo#1688374 - Fix parallel build NSS-3.61 with make
* bmo#1682044 - pkix_Build_GatherCerts() + pkix_CacheCert_Add()
		can corrupt 'cachedCertTable'
* bmo#1690583 - Fix CH padding extension size calculation
* bmo#1690421 - Adjust 3.62 ABI report formatting for new libabigail
* bmo#1690421 - Install packaged libabigail in docker-builds image
* bmo#1689228 - Minor ECH -09 fixes for interop testing, fuzzing
* bmo#1674819 - Fixup a51fae403328, enum type may be signed
* bmo#1681585 - Add ECH support to selfserv
* bmo#1681585 - Update ECH to Draft-09
* bmo#1678398 - Add Export/Import functions for HPKE context
* bmo#1678398 - Update HPKE to draft-07

update to NSS 3.61

* bmo#1682071 - Fix issue with IKE Quick mode deriving incorrect key
		values under certain conditions.
* bmo#1684300 - Fix default PBE iteration count when NSS is compiled
		with NSS_DISABLE_DBM.
* bmo#1651411 - Improve constant-timeness in RSA operations.
* bmo#1677207 - Upgrade Google Test version to latest release.
* bmo#1654332 - Add aarch64-make target to nss-try.

Update to NSS 3.60.1:

Notable changes in NSS 3.60:
* TLS 1.3 Encrypted Client Hello (draft-ietf-tls-esni-08) support
  has been added, replacing the previous ESNI (draft-ietf-tls-esni-01)
  implementation. See bmo#1654332 for more information.
* December 2020 batch of Root CA changes, builtins library updated
  to version 2.46. See bmo#1678189, bmo#1678166, and bmo#1670769
  for more information.

Update to NSS 3.59.1:

* bmo#1679290 - Fix potential deadlock with certain third-party
		PKCS11 modules

Update to NSS 3.59:

Notable changes:

* Exported two existing functions from libnss:
  CERT_AddCertToListHeadWithData and CERT_AddCertToListTailWithData

Bugfixes

* bmo#1607449 - Lock cert-&gt;nssCertificate to prevent a potential data race
* bmo#1672823 - Add Wycheproof test cases for HMAC, HKDF, and DSA
* bmo#1663661 - Guard against NULL token in nssSlot_IsTokenPresent
* bmo#1670835 - Support enabling and disabling signatures via Crypto Policy
* bmo#1672291 - Resolve libpkix OCSP failures on SHA1 self-signed
		root certs when SHA1 signatures are disabled.
* bmo#1644209 - Fix broken SelectedCipherSuiteReplacer filter to
		solve some test intermittents
* bmo#1672703 - Tolerate the first CCS in TLS 1.3 to fix a regression in
		our CVE-2020-25648 fix that broke purple-discord
		(boo#1179382)
* bmo#1666891 - Support key wrap/unwrap with RSA-OAEP
* bmo#1667989 - Fix gyp linking on Solaris
* bmo#1668123 - Export CERT_AddCertToListHeadWithData and
		CERT_AddCertToListTailWithData from libnss
* bmo#1634584 - Set CKA_NSS_SERVER_DISTRUST_AFTER for Trustis FPS Root CA
* bmo#1663091 - Remove unnecessary assertions in the streaming
		ASN.1 decoder that affected decoding certain PKCS8
		private keys when using NSS debug builds
*  bmo#670839 - Use ARM crypto extension for AES, SHA1 and SHA2 on MacOS.

update to NSS 3.58

Bugs fixed:

* bmo#1641480 (CVE-2020-25648)
  Tighten CCS handling for middlebox compatibility mode.
* bmo#1631890 - Add support for Hybrid Public Key Encryption
  (draft-irtf-cfrg-hpke) support for TLS Encrypted Client Hello
  (draft-ietf-tls-esni).
* bmo#1657255 - Add CI tests that disable SHA1/SHA2 ARM crypto
  extensions.
* bmo#1668328 - Handle spaces in the Python path name when using
  gyp on Windows.
* bmo#1667153 - Add PK11_ImportDataKey for data object import.
* bmo#1665715 - Pass the embedded SCT list extension (if present)
  to TrustDomain::CheckRevocation instead of the notBefore value.

update to NSS 3.57

* The following CA certificates were Added:
  bmo#1663049 - CN=Trustwave Global Certification Authority
      SHA-256 Fingerprint: 97552015F5DDFC3C8788C006944555408894450084F100867086BC1A2BB58DC8
  bmo#1663049 - CN=Trustwave Global ECC P256 Certification Authority
      SHA-256 Fingerprint: 945BBC825EA554F489D1FD51A73DDF2EA624AC7019A05205225C22A78CCFA8B4
  bmo#1663049 - CN=Trustwave Global ECC P384 Certification Authority
      SHA-256 Fingerprint: 55903859C8C0C3EBB8759ECE4E2557225FF5758BBD38EBD48276601E1BD58097
* The following CA certificates were Removed:
  bmo#1651211 - CN=EE Certification Centre Root CA
      SHA-256 Fingerprint: 3E84BA4342908516E77573C0992F0979CA084E4685681FF195CCBA8A229B8A76
  bmo#1656077 - O=Government Root Certification Authority; C=TW
      SHA-256 Fingerprint: 7600295EEFE85B9E1FD624DB76062AAAAE59818A54D2774CD4C0B2C01131E1B3
* Trust settings for the following CA certificates were Modified:
  bmo#1653092 - CN=OISTE WISeKey Global Root GA CA
      Websites (server authentication) trust bit removed.
* https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.57_release_notes

update to NSS 3.56

Notable changes

* bmo#1650702 - Support SHA-1 HW acceleration on ARMv8
* bmo#1656981 - Use MPI comba and mulq optimizations on x86-64 MacOS.
* bmo#1654142 - Add CPU feature detection for Intel SHA extension.
* bmo#1648822 - Add stricter validation of DH keys in FIPS mode.
* bmo#1656986 - Properly detect arm64 during GYP build architecture
		detection.
* bmo#1652729 - Add build flag to disable RC2 and relocate to
		lib/freebl/deprecated.
* bmo#1656429 - Correct RTT estimate used in 0-RTT anti-replay.
* bmo#1588941 - Send empty certificate message when scheme selection
		fails.
* bmo#1652032 - Fix failure to build in Windows arm64 makefile
		cross-compilation.
* bmo#1625791 - Fix deadlock issue in nssSlot_IsTokenPresent.
* bmo#1653975 - Fix 3.53 regression by setting 'all' as the default
		makefile target.
* bmo#1659792 - Fix broken libpkix tests with unexpired PayPal cert.
* bmo#1659814 - Fix interop.sh failures with newer tls-interop
		commit and dependencies.
* bmo#1656519 - NSPR dependency updated to 4.28

update to NSS 3.55

Notable changes
* P384 and P521 elliptic curve implementations are replaced with
  verifiable implementations from Fiat-Crypto [0] and ECCKiila [1].
* PK11_FindCertInSlot is added. With this function, a given slot
  can be queried with a DER-Encoded certificate, providing performance
  and usability improvements over other mechanisms. (bmo#1649633)
* DTLS 1.3 implementation is updated to draft-38. (bmo#1647752)

Relevant Bugfixes

* bmo#1631583 (CVE-2020-6829, CVE-2020-12400) - Replace P384 and
  P521 with new, verifiable implementations from Fiat-Crypto and ECCKiila.
* bmo#1649487 - Move overzealous assertion in VFY_EndWithSignature.
* bmo#1631573 (CVE-2020-12401) - Remove unnecessary scalar padding.
* bmo#1636771 (CVE-2020-12403) - Explicitly disable multi-part
  ChaCha20 (which was not functioning correctly) and more strictly
  enforce tag length.
* bmo#1649648 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1649316 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1649322 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1653202 - Fix initialization bug in blapitest when compiled
  with NSS_DISABLE_DEPRECATED_SEED.
* bmo#1646594 - Fix AVX2 detection in makefile builds.
* bmo#1649633 - Add PK11_FindCertInSlot to search a given slot
  for a DER-encoded certificate.
* bmo#1651520 - Fix slotLock race in NSC_GetTokenInfo.
* bmo#1647752 - Update DTLS 1.3 implementation to draft-38.
* bmo#1649190 - Run cipher, sdr, and ocsp tests under standard test cycle in CI.
* bmo#1649226 - Add Wycheproof ECDSA tests.
* bmo#1637222 - Consistently enforce IV requirements for DES and 3DES.
* bmo#1067214 - Enforce minimum PKCS#1 v1.5 padding length in
  RSA_CheckSignRecover.
* bmo#1646324 - Advertise PKCS#1 schemes for certificates in the
  signature_algorithms extension.

update to NSS 3.54

Notable changes

* Support for TLS 1.3 external pre-shared keys (bmo#1603042).
* Use ARM Cryptography Extension for SHA256, when available
  (bmo#1528113)
* The following CA certificates were Added:
  bmo#1645186 - certSIGN Root CA G2.
  bmo#1645174 - e-Szigno Root CA 2017.
  bmo#1641716 - Microsoft ECC Root Certificate Authority 2017.
  bmo#1641716 - Microsoft RSA Root Certificate Authority 2017.
* The following CA certificates were Removed:
  bmo#1645199 - AddTrust Class 1 CA Root.
  bmo#1645199 - AddTrust External CA Root.
  bmo#1641718 - LuxTrust Global Root 2.
  bmo#1639987 - Staat der Nederlanden Root CA - G2.
  bmo#1618402 - Symantec Class 2 Public Primary Certification Authority - G4.
  bmo#1618402 - Symantec Class 1 Public Primary Certification Authority - G4.
  bmo#1618402 - VeriSign Class 3 Public Primary Certification Authority - G3.

* A number of certificates had their Email trust bit disabled.
  See bmo#1618402 for a complete list.

Bugs fixed

* bmo#1528113 - Use ARM Cryptography Extension for SHA256.
* bmo#1603042 - Add TLS 1.3 external PSK support.
* bmo#1642802 - Add uint128 support for HACL* curve25519 on Windows.
* bmo#1645186 - Add 'certSIGN Root CA G2' root certificate.
* bmo#1645174 - Add Microsec's 'e-Szigno Root CA 2017' root certificate.
* bmo#1641716 - Add Microsoft's non-EV root certificates.
* bmo1621151 - Disable email trust bit for 'O=Government
	       Root Certification Authority; C=TW' root.
* bmo#1645199 - Remove AddTrust root certificates.
* bmo#1641718 - Remove 'LuxTrust Global Root 2' root certificate.
* bmo#1639987 - Remove 'Staat der Nederlanden Root CA - G2' root
		certificate.
* bmo#1618402 - Remove Symantec root certificates and disable email trust
		bit.
* bmo#1640516 - NSS 3.54 should depend on NSPR 4.26.
* bmo#1642146 - Fix undefined reference to `PORT_ZAlloc_stub' in seed.c.
* bmo#1642153 - Fix infinite recursion building NSS.
* bmo#1642638 - Fix fuzzing assertion crash.
* bmo#1642871 - Enable SSL_SendSessionTicket after resumption.
* bmo#1643123 - Support SSL_ExportEarlyKeyingMaterial with External PSKs.
* bmo#1643557 - Fix numerous compile warnings in NSS.
* bmo#1644774 - SSL gtests to use ClearServerCache when resetting
		self-encrypt keys.
* bmo#1645479 - Don't use SECITEM_MakeItem in secutil.c.
* bmo#1646520 - Stricter enforcement of ASN.1 INTEGER encoding.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029961">SUSE bug 1029961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174697">SUSE bug 1174697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176206">SUSE bug 1176206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176934">SUSE bug 1176934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179382">SUSE bug 1179382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12400/">CVE-2020-12400 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12400">CVE-2020-12400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12401/">CVE-2020-12401 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12401">CVE-2020-12401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12403/">CVE-2020-12403 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12403">CVE-2020-12403 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25648/">CVE-2020-25648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25648">CVE-2020-25648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6829/">CVE-2020-6829 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6829">CVE-2020-6829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633044" comment="libfreebl3-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633045" comment="libfreebl3-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633046" comment="libfreebl3-hmac-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633047" comment="libfreebl3-hmac-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633048" comment="libsoftokn3-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633049" comment="libsoftokn3-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633050" comment="libsoftokn3-hmac-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633051" comment="libsoftokn3-hmac-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633052" comment="mozilla-nspr-4.32-19.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633053" comment="mozilla-nspr-32bit-4.32-19.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633054" comment="mozilla-nss-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633055" comment="mozilla-nss-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633056" comment="mozilla-nss-certs-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633057" comment="mozilla-nss-certs-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633058" comment="mozilla-nss-sysinit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633059" comment="mozilla-nss-sysinit-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633060" comment="mozilla-nss-tools-3.68-58.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150876" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1136882" ref_url="https://bugzilla.suse.com/1136882" source="BUGZILLA"/>
		<reference ref_id="1159130" ref_url="https://bugzilla.suse.com/1159130" source="BUGZILLA"/>
		<reference ref_id="1159293" ref_url="https://bugzilla.suse.com/1159293" source="BUGZILLA"/>
		<reference ref_id="1161698" ref_url="https://bugzilla.suse.com/1161698" source="BUGZILLA"/>
		<reference ref_id="1186329" ref_url="https://bugzilla.suse.com/1186329" source="BUGZILLA"/>
		<reference ref_id="1189325" ref_url="https://bugzilla.suse.com/1189325" source="BUGZILLA"/>
		<reference ref_id="1189343" ref_url="https://bugzilla.suse.com/1189343" source="BUGZILLA"/>
		<reference ref_id="1189345" ref_url="https://bugzilla.suse.com/1189345" source="BUGZILLA"/>
		<reference ref_id="1189346" ref_url="https://bugzilla.suse.com/1189346" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19555" ref_url="https://www.suse.com/security/cve/CVE-2019-19555/" source="CVE"/>
		<reference ref_id="CVE-2019-19746" ref_url="https://www.suse.com/security/cve/CVE-2019-19746/" source="CVE"/>
		<reference ref_id="CVE-2019-19797" ref_url="https://www.suse.com/security/cve/CVE-2019-19797/" source="CVE"/>
		<reference ref_id="CVE-2020-21680" ref_url="https://www.suse.com/security/cve/CVE-2020-21680/" source="CVE"/>
		<reference ref_id="CVE-2020-21681" ref_url="https://www.suse.com/security/cve/CVE-2020-21681/" source="CVE"/>
		<reference ref_id="CVE-2020-21682" ref_url="https://www.suse.com/security/cve/CVE-2020-21682/" source="CVE"/>
		<reference ref_id="CVE-2020-21683" ref_url="https://www.suse.com/security/cve/CVE-2020-21683/" source="CVE"/>
		<reference ref_id="CVE-2021-3561" ref_url="https://www.suse.com/security/cve/CVE-2021-3561/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Update to version 3.2.8, including fixes for

- CVE-2021-3561: overflow in fig2dev/read.c in function read_colordef() (bsc#1186329).
- CVE-2020-21683: Fixed buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c (bsc#1189325).
- CVE-2020-21682: Fixed buffer overflow in the set_fill component in genge.c (bsc#1189346).
- CVE-2020-21681: Fixed buffer overflow in the set_color component in genge.c (bsc#1189345).
- CVE-2020-21680: Fixed stack-based buffer overflow in the put_arrow() component in genpict2e.c (bsc#1189343).
- CVE-2019-19797: out-of-bounds write in read_colordef in read.c (bsc#1159293).
- CVE-2019-19555: stack-based buffer overflow because of an incorrect sscanf (bsc#1161698).
- CVE-2019-19746: segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type (bsc#1159130).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1136882">SUSE bug 1136882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159130">SUSE bug 1159130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159293">SUSE bug 1159293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161698">SUSE bug 1161698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186329">SUSE bug 1186329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189325">SUSE bug 1189325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189343">SUSE bug 1189343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189345">SUSE bug 1189345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189346">SUSE bug 1189346</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19555/">CVE-2019-19555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19555">CVE-2019-19555 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19746/">CVE-2019-19746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19746">CVE-2019-19746 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19797/">CVE-2019-19797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19797">CVE-2019-19797 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21680/">CVE-2020-21680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21680">CVE-2020-21680 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21681/">CVE-2020-21681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21681">CVE-2020-21681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21682/">CVE-2020-21682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21682">CVE-2020-21682 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21683/">CVE-2020-21683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21683">CVE-2020-21683 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3561/">CVE-2021-3561 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3561">CVE-2021-3561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631268" comment="transfig-3.2.8a-2.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150877" version="1" class="patch">
	<metadata>
		<title>Security update for gtk-vnc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1024266" ref_url="https://bugzilla.suse.com/1024266" source="BUGZILLA"/>
		<reference ref_id="1024268" ref_url="https://bugzilla.suse.com/1024268" source="BUGZILLA"/>
		<reference ref_id="1046782" ref_url="https://bugzilla.suse.com/1046782" source="BUGZILLA"/>
		<reference ref_id="1188292" ref_url="https://bugzilla.suse.com/1188292" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5884" ref_url="https://www.suse.com/security/cve/CVE-2017-5884/" source="CVE"/>
		<reference ref_id="CVE-2017-5885" ref_url="https://www.suse.com/security/cve/CVE-2017-5885/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009456.html" source="SUSE-SU"/>
		<description>
This update for gtk-vnc fixes the following issues:

- CVE-2017-5885: Correctly validate color map range indexes (bsc#1024268).
- CVE-2017-5884: Fix bounds checking for RRE, hextile &amp; copyrect encodings (bsc#1024266).
- Fix crash when opening connection from a GSocketAddress (bsc#1046782).
- Fix possible crash on connection failure (bsc#1188292).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024266">SUSE bug 1024266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024268">SUSE bug 1024268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046782">SUSE bug 1046782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188292">SUSE bug 1188292</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5884/">CVE-2017-5884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5884">CVE-2017-5884 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5885/">CVE-2017-5885 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5885">CVE-2017-5885 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628130" comment="libgtk-vnc-1_0-0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628131" comment="libgtk-vnc-2_0-0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628132" comment="libgvnc-1_0-0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628133" comment="python-gtk-vnc-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628134" comment="typelib-1_0-GVnc-1_0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628135" comment="typelib-1_0-GtkVnc-2_0-0.6.0-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150878" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009467.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712. 
  Read buffer overruns processing ASN.1 strings (bsc#1189521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-20"/>
	<updated date="2021-09-20"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632419" comment="libopenssl-devel-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632420" comment="libopenssl1_0_0-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632401" comment="libopenssl1_0_0-32bit-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632421" comment="libopenssl1_0_0-hmac-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632403" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632422" comment="openssl-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632405" comment="openssl-doc-1.0.2j-60.72.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150879" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1190381" ref_url="https://bugzilla.suse.com/1190381" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3781" ref_url="https://www.suse.com/security/cve/CVE-2021-3781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009476.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2021-3781: Fixed a trivial -dSAFER bypass command injection (bsc#1190381)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-21"/>
	<updated date="2021-09-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1190381">SUSE bug 1190381</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3781/">CVE-2021-3781 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3781">CVE-2021-3781 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632780" comment="ghostscript-9.52-23.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632781" comment="ghostscript-devel-9.52-23.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632782" comment="ghostscript-x11-9.52-23.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632783" comment="libspectre-devel-0.2.7-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632784" comment="libspectre1-0.2.7-12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150880" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.1.0 ESR.

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-22"/>
	<updated date="2021-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29981">CVE-2021-29981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29982">CVE-2021-29982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29983">CVE-2021-29983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29987">CVE-2021-29987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29990">CVE-2021-29990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29991">CVE-2021-29991 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38492">CVE-2021-38492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38495">CVE-2021-38495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633610" comment="MozillaFirefox-91.1.0-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633611" comment="MozillaFirefox-branding-SLE-91-35.6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633612" comment="MozillaFirefox-devel-91.1.0-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633613" comment="MozillaFirefox-translations-common-91.1.0-112.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150881" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 20 [bsc#1180063,bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14781 CVE-2020-14779
  CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class libraries:
    - SOCKETADAPTOR$SOCKETINPUTSTREAM.READ is blocking for more time
      that the set timeout
    - Z/OS specific C function send_file is changing the file pointer
      position
  * Java Virtual Machine:
    - Crash on iterate java stack
    - Java process hang on SIGTERM
  * JIT Compiler:
    - JMS performance regression from JDK8 SR5 FP40 TO FP41

  * Class Libraries:
    - z15 high utilization following Z/VM and Linux migration from
      z14 To z15
  * Java Virtual Machine:
    - Assertion failed when trying to write a class file
    - Assertion failure at modronapi.cpp
    - Improve the performance of defining and finding classes
  * JIT Compiler:
    - An assert in ppcbinaryencoding.cpp may trigger when running
      with traps disabled on power
    - AOT field offset off by n bytes
    - Segmentation fault in jit module on ibm z platform		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531863" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531865" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150882" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1189373" ref_url="https://bugzilla.suse.com/1189373" source="BUGZILLA"/>
		<reference ref_id="1189378" ref_url="https://bugzilla.suse.com/1189378" source="BUGZILLA"/>
		<reference ref_id="1189632" ref_url="https://bugzilla.suse.com/1189632" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28701" ref_url="https://www.suse.com/security/cve/CVE-2021-28701/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009501.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-28701: Fixed race condition in XENMAPSPACE_grant_table handling (XSA-384) (bsc#1189632).

- Integrate bugfixes (bsc#1189373, bsc#1189378).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189378">SUSE bug 1189378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189632">SUSE bug 1189632</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28701/">CVE-2021-28701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28701">CVE-2021-28701 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633441" comment="xen-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633442" comment="xen-doc-html-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633443" comment="xen-libs-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633444" comment="xen-libs-32bit-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633445" comment="xen-tools-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633446" comment="xen-tools-domU-4.9.4_22-3.94.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150883" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1157818" ref_url="https://bugzilla.suse.com/1157818" source="BUGZILLA"/>
		<reference ref_id="1158812" ref_url="https://bugzilla.suse.com/1158812" source="BUGZILLA"/>
		<reference ref_id="1158958" ref_url="https://bugzilla.suse.com/1158958" source="BUGZILLA"/>
		<reference ref_id="1158959" ref_url="https://bugzilla.suse.com/1158959" source="BUGZILLA"/>
		<reference ref_id="1158960" ref_url="https://bugzilla.suse.com/1158960" source="BUGZILLA"/>
		<reference ref_id="1159491" ref_url="https://bugzilla.suse.com/1159491" source="BUGZILLA"/>
		<reference ref_id="1159715" ref_url="https://bugzilla.suse.com/1159715" source="BUGZILLA"/>
		<reference ref_id="1159847" ref_url="https://bugzilla.suse.com/1159847" source="BUGZILLA"/>
		<reference ref_id="1159850" ref_url="https://bugzilla.suse.com/1159850" source="BUGZILLA"/>
		<reference ref_id="1160309" ref_url="https://bugzilla.suse.com/1160309" source="BUGZILLA"/>
		<reference ref_id="1160438" ref_url="https://bugzilla.suse.com/1160438" source="BUGZILLA"/>
		<reference ref_id="1160439" ref_url="https://bugzilla.suse.com/1160439" source="BUGZILLA"/>
		<reference ref_id="1164719" ref_url="https://bugzilla.suse.com/1164719" source="BUGZILLA"/>
		<reference ref_id="1172091" ref_url="https://bugzilla.suse.com/1172091" source="BUGZILLA"/>
		<reference ref_id="1172115" ref_url="https://bugzilla.suse.com/1172115" source="BUGZILLA"/>
		<reference ref_id="1172234" ref_url="https://bugzilla.suse.com/1172234" source="BUGZILLA"/>
		<reference ref_id="1172236" ref_url="https://bugzilla.suse.com/1172236" source="BUGZILLA"/>
		<reference ref_id="1172240" ref_url="https://bugzilla.suse.com/1172240" source="BUGZILLA"/>
		<reference ref_id="1173641" ref_url="https://bugzilla.suse.com/1173641" source="BUGZILLA"/>
		<reference ref_id="928700" ref_url="https://bugzilla.suse.com/928700" source="BUGZILLA"/>
		<reference ref_id="928701" ref_url="https://bugzilla.suse.com/928701" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3414" ref_url="https://www.suse.com/security/cve/CVE-2015-3414/" source="CVE"/>
		<reference ref_id="CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415/" source="CVE"/>
		<reference ref_id="CVE-2016-6153" ref_url="https://www.suse.com/security/cve/CVE-2016-6153/" source="CVE"/>
		<reference ref_id="CVE-2017-10989" ref_url="https://www.suse.com/security/cve/CVE-2017-10989/" source="CVE"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<reference ref_id="CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740/" source="CVE"/>
		<reference ref_id="CVE-2019-16168" ref_url="https://www.suse.com/security/cve/CVE-2019-16168/" source="CVE"/>
		<reference ref_id="CVE-2019-19244" ref_url="https://www.suse.com/security/cve/CVE-2019-19244/" source="CVE"/>
		<reference ref_id="CVE-2019-19317" ref_url="https://www.suse.com/security/cve/CVE-2019-19317/" source="CVE"/>
		<reference ref_id="CVE-2019-19603" ref_url="https://www.suse.com/security/cve/CVE-2019-19603/" source="CVE"/>
		<reference ref_id="CVE-2019-19645" ref_url="https://www.suse.com/security/cve/CVE-2019-19645/" source="CVE"/>
		<reference ref_id="CVE-2019-19646" ref_url="https://www.suse.com/security/cve/CVE-2019-19646/" source="CVE"/>
		<reference ref_id="CVE-2019-19880" ref_url="https://www.suse.com/security/cve/CVE-2019-19880/" source="CVE"/>
		<reference ref_id="CVE-2019-19923" ref_url="https://www.suse.com/security/cve/CVE-2019-19923/" source="CVE"/>
		<reference ref_id="CVE-2019-19924" ref_url="https://www.suse.com/security/cve/CVE-2019-19924/" source="CVE"/>
		<reference ref_id="CVE-2019-19925" ref_url="https://www.suse.com/security/cve/CVE-2019-19925/" source="CVE"/>
		<reference ref_id="CVE-2019-19926" ref_url="https://www.suse.com/security/cve/CVE-2019-19926/" source="CVE"/>
		<reference ref_id="CVE-2019-19959" ref_url="https://www.suse.com/security/cve/CVE-2019-19959/" source="CVE"/>
		<reference ref_id="CVE-2019-20218" ref_url="https://www.suse.com/security/cve/CVE-2019-20218/" source="CVE"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<reference ref_id="CVE-2020-13434" ref_url="https://www.suse.com/security/cve/CVE-2020-13434/" source="CVE"/>
		<reference ref_id="CVE-2020-13435" ref_url="https://www.suse.com/security/cve/CVE-2020-13435/" source="CVE"/>
		<reference ref_id="CVE-2020-13630" ref_url="https://www.suse.com/security/cve/CVE-2020-13630/" source="CVE"/>
		<reference ref_id="CVE-2020-13631" ref_url="https://www.suse.com/security/cve/CVE-2020-13631/" source="CVE"/>
		<reference ref_id="CVE-2020-13632" ref_url="https://www.suse.com/security/cve/CVE-2020-13632/" source="CVE"/>
		<reference ref_id="CVE-2020-15358" ref_url="https://www.suse.com/security/cve/CVE-2020-15358/" source="CVE"/>
		<reference ref_id="CVE-2020-9327" ref_url="https://www.suse.com/security/cve/CVE-2020-9327/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

sqlite3 is sync version 3.36.0 from Factory (jsc#SLE-16032).

The following CVEs have been fixed in upstream releases up to
this point, but were not mentioned in the change log so far:

* bsc#1173641, CVE-2020-15358: heap-based buffer overflow in
  multiSelectOrderBy due to mishandling of query-flattener
  optimization
* bsc#1164719, CVE-2020-9327: NULL pointer dereference and
  segmentation fault because of generated column optimizations in
  isAuxiliaryVtabOperator
* bsc#1160439, CVE-2019-20218: selectExpander in select.c proceeds
  with WITH stack unwinding even after a parsing error
* bsc#1160438, CVE-2019-19959: memory-management error via
  ext/misc/zipfile.c involving embedded '\0' input
* bsc#1160309, CVE-2019-19923: improper handling  of  certain uses
  of SELECT DISTINCT in flattenSubquery may lead to null pointer
  dereference
* bsc#1159850, CVE-2019-19924: improper error handling in
  sqlite3WindowRewrite()
* bsc#1159847, CVE-2019-19925: improper handling of NULL pathname
  during an update of a ZIP archive
* bsc#1159715, CVE-2019-19926: improper handling  of certain
  errors during parsing  multiSelect in select.c
* bsc#1159491, CVE-2019-19880: exprListAppendList in window.c
  allows attackers to trigger an invalid pointer dereference
* bsc#1158960, CVE-2019-19603: during handling of CREATE TABLE
  and CREATE VIEW statements, does not consider confusion with
  a shadow table name
* bsc#1158959, CVE-2019-19646: pragma.c mishandles NOT NULL in an
  integrity_check PRAGMA command in certain cases of generated
  columns
* bsc#1158958, CVE-2019-19645: alter.c allows attackers to trigger
  infinite recursion via certain types of self-referential views
  in conjunction with ALTER TABLE statements
* bsc#1158812, CVE-2019-19317: lookupName in resolve.c omits bits
  from the colUsed bitmask in the case of a generated column,
  which allows attackers to cause a denial of service
* bsc#1157818, CVE-2019-19244: sqlite3,sqlite2,sqlite: The
  function sqlite3Select in select.c allows a crash if a
  sub-select uses both DISTINCT and window functions, and also
  has certain ORDER BY usage
* bsc#928701, CVE-2015-3415: sqlite3VdbeExec comparison operator
  vulnerability
* bsc#928700, CVE-2015-3414: sqlite3,sqlite2: dequoting of
  collation-sequence names
* CVE-2020-13434 bsc#1172115: integer overflow in
  sqlite3_str_vappendf
* CVE-2020-13630 bsc#1172234: use-after-free in fts3EvalNextRow
* CVE-2020-13631 bsc#1172236: virtual table allowed to be renamed
  to one of its shadow tables
* CVE-2020-13632 bsc#1172240: NULL pointer dereference via
  crafted matchinfo() query
* CVE-2020-13435: Malicious SQL statements could have crashed the
  process that is running SQLite (bsc#1172091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157818">SUSE bug 1157818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158812">SUSE bug 1158812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158958">SUSE bug 1158958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158959">SUSE bug 1158959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158960">SUSE bug 1158960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159491">SUSE bug 1159491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159715">SUSE bug 1159715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159847">SUSE bug 1159847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159850">SUSE bug 1159850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160309">SUSE bug 1160309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160438">SUSE bug 1160438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160439">SUSE bug 1160439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164719">SUSE bug 1164719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172091">SUSE bug 1172091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172115">SUSE bug 1172115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172234">SUSE bug 1172234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172236">SUSE bug 1172236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172240">SUSE bug 1172240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173641">SUSE bug 1173641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3414/">CVE-2015-3414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3414">CVE-2015-3414 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3415">CVE-2015-3415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6153/">CVE-2016-6153 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6153">CVE-2016-6153 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10989/">CVE-2017-10989 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10989">CVE-2017-10989 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2518">CVE-2017-2518 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20346">CVE-2018-20346 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8740">CVE-2018-8740 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16168/">CVE-2019-16168 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16168">CVE-2019-16168 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19244/">CVE-2019-19244 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19244">CVE-2019-19244 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19317/">CVE-2019-19317 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19317">CVE-2019-19317 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19603/">CVE-2019-19603 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19603">CVE-2019-19603 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19645/">CVE-2019-19645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19645">CVE-2019-19645 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19646/">CVE-2019-19646 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19646">CVE-2019-19646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19880/">CVE-2019-19880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19880">CVE-2019-19880 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19923/">CVE-2019-19923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19923">CVE-2019-19923 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19924/">CVE-2019-19924 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19924">CVE-2019-19924 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19925/">CVE-2019-19925 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19925">CVE-2019-19925 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19926/">CVE-2019-19926 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19926">CVE-2019-19926 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19959/">CVE-2019-19959 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19959">CVE-2019-19959 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20218/">CVE-2019-20218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20218">CVE-2019-20218 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8457">CVE-2019-8457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13434/">CVE-2020-13434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13434">CVE-2020-13434 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13435/">CVE-2020-13435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13435">CVE-2020-13435 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13630/">CVE-2020-13630 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13630">CVE-2020-13630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13631/">CVE-2020-13631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13631">CVE-2020-13631 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13632/">CVE-2020-13632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13632">CVE-2020-13632 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15358/">CVE-2020-15358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15358">CVE-2020-15358 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-9327/">CVE-2020-9327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9327">CVE-2020-9327 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150884" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1177120" ref_url="https://bugzilla.suse.com/1177120" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009517.html" source="SUSE-SU"/>
		<description>

This update for python-urllib3 fixes the following security issue:

- CVE-2020-26137: A CRLF injection via HTTP request method was fixed (bsc#1177120)

Note that this was fixed in a previous version update to 1.25.9, this update just complements the tracking.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-29"/>
	<updated date="2021-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26137">CVE-2020-26137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631062" comment="python3-urllib3-1.25.10-3.31.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150885" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1117993" ref_url="https://bugzilla.suse.com/1117993" source="BUGZILLA"/>
		<reference ref_id="1186489" ref_url="https://bugzilla.suse.com/1186489" source="BUGZILLA"/>
		<reference ref_id="1187911" ref_url="https://bugzilla.suse.com/1187911" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574/" source="CVE"/>
		<reference ref_id="CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009546.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2021-35942: wordexp: handle overflow in positional parameter number (bsc#1187911)
- CVE-2021-33574: Use __pthread_attr_copy in mq_notify (bsc#1186489)

Also the following bug was fixed:

- Avoid concurrency problem in ldconfig (bsc#1117993)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117993">SUSE bug 1117993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186489">SUSE bug 1186489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187911">SUSE bug 1187911</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">CVE-2021-33574 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">CVE-2021-35942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651126" comment="glibc-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651115" comment="glibc-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651127" comment="glibc-devel-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651117" comment="glibc-devel-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651118" comment="glibc-html-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651119" comment="glibc-i18ndata-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651120" comment="glibc-info-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651128" comment="glibc-locale-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651122" comment="glibc-locale-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651129" comment="glibc-profile-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651124" comment="glibc-profile-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651130" comment="nscd-2.22-116.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150886" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1188697" ref_url="https://bugzilla.suse.com/1188697" source="BUGZILLA"/>
		<reference ref_id="1190701" ref_url="https://bugzilla.suse.com/1190701" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21806" ref_url="https://www.suse.com/security/cve/CVE-2021-21806/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009534.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.4
- CVE-2021-30858: Fixed a security bug that could allow maliciously crafted web content to achieve arbitrary code execution. (bsc#1190701)
- CVE-2021-21806: Fixed an exploitable use-after-free vulnerability via specially crafted HTML web page. (bsc#1188697)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190701">SUSE bug 1190701</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21806/">CVE-2021-21806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21806">CVE-2021-21806 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30858">CVE-2021-30858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634387" comment="libjavascriptcoregtk-4_0-18-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634388" comment="libwebkit2gtk-4_0-37-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634389" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634390" comment="typelib-1_0-WebKit2-4_0-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634392" comment="webkit2gtk-4_0-injected-bundles-2.32.4-2.71.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150887" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1190666" ref_url="https://bugzilla.suse.com/1190666" source="BUGZILLA"/>
		<reference ref_id="1190669" ref_url="https://bugzilla.suse.com/1190669" source="BUGZILLA"/>
		<reference ref_id="1190703" ref_url="https://bugzilla.suse.com/1190703" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34798" ref_url="https://www.suse.com/security/cve/CVE-2021-34798/" source="CVE"/>
		<reference ref_id="CVE-2021-39275" ref_url="https://www.suse.com/security/cve/CVE-2021-39275/" source="CVE"/>
		<reference ref_id="CVE-2021-40438" ref_url="https://www.suse.com/security/cve/CVE-2021-40438/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009537.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-40438: Fixed a SRF via a crafted request uri-path. (bsc#1190703)
- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)
- CVE-2021-34798: Fixed a NULL pointer dereference via malformed requests. (bsc#1190669)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190666">SUSE bug 1190666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190669">SUSE bug 1190669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190703">SUSE bug 1190703</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34798/">CVE-2021-34798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34798">CVE-2021-34798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39275/">CVE-2021-39275 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39275">CVE-2021-39275 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40438/">CVE-2021-40438 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40438">CVE-2021-40438 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633904" comment="apache2-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633898" comment="apache2-doc-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633905" comment="apache2-example-pages-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633906" comment="apache2-prefork-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633907" comment="apache2-utils-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633908" comment="apache2-worker-2.4.23-29.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150888" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008282.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-08"/>
	<updated date="2021-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531867" comment="libpython3_4m1_0-3.4.10-25.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531868" comment="python3-3.4.10-25.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531869" comment="python3-base-3.4.10-25.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531870" comment="python3-curses-3.4.10-25.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150889" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1190710" ref_url="https://bugzilla.suse.com/1190710" source="BUGZILLA"/>
		<reference ref_id="1191332" ref_url="https://bugzilla.suse.com/1191332" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.2.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-45 (bsc#1191332)

* CVE-2021-38496: Use-after-free in MessageTask
* CVE-2021-38497: Validation message could have been overlaid on another origin
* CVE-2021-38498: Use-after-free of nsLanguageAtomService object
* CVE-2021-32810: Fixed Data race in crossbeam-deque
* CVE-2021-38500: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2
* CVE-2021-38501: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2

- Fixed crash in FIPS mode (bsc#1190710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-15"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190710">SUSE bug 1190710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32810">CVE-2021-32810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38496">CVE-2021-38496 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38497">CVE-2021-38497 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38498">CVE-2021-38498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38500">CVE-2021-38500 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38501">CVE-2021-38501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651862" comment="MozillaFirefox-91.2.0-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651863" comment="MozillaFirefox-devel-91.2.0-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651864" comment="MozillaFirefox-translations-common-91.2.0-112.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150890" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1081947" ref_url="https://bugzilla.suse.com/1081947" source="BUGZILLA"/>
		<reference ref_id="1082293" ref_url="https://bugzilla.suse.com/1082293" source="BUGZILLA"/>
		<reference ref_id="1084671" ref_url="https://bugzilla.suse.com/1084671" source="BUGZILLA"/>
		<reference ref_id="1085196" ref_url="https://bugzilla.suse.com/1085196" source="BUGZILLA"/>
		<reference ref_id="1106214" ref_url="https://bugzilla.suse.com/1106214" source="BUGZILLA"/>
		<reference ref_id="1122417" ref_url="https://bugzilla.suse.com/1122417" source="BUGZILLA"/>
		<reference ref_id="1125886" ref_url="https://bugzilla.suse.com/1125886" source="BUGZILLA"/>
		<reference ref_id="1135534" ref_url="https://bugzilla.suse.com/1135534" source="BUGZILLA"/>
		<reference ref_id="1135708" ref_url="https://bugzilla.suse.com/1135708" source="BUGZILLA"/>
		<reference ref_id="1151708" ref_url="https://bugzilla.suse.com/1151708" source="BUGZILLA"/>
		<reference ref_id="1168235" ref_url="https://bugzilla.suse.com/1168235" source="BUGZILLA"/>
		<reference ref_id="1168389" ref_url="https://bugzilla.suse.com/1168389" source="BUGZILLA"/>
		<reference ref_id="1169006" ref_url="https://bugzilla.suse.com/1169006" source="BUGZILLA"/>
		<reference ref_id="1174942" ref_url="https://bugzilla.suse.com/1174942" source="BUGZILLA"/>
		<reference ref_id="1175514" ref_url="https://bugzilla.suse.com/1175514" source="BUGZILLA"/>
		<reference ref_id="1175623" ref_url="https://bugzilla.suse.com/1175623" source="BUGZILLA"/>
		<reference ref_id="1178236" ref_url="https://bugzilla.suse.com/1178236" source="BUGZILLA"/>
		<reference ref_id="1178554" ref_url="https://bugzilla.suse.com/1178554" source="BUGZILLA"/>
		<reference ref_id="1178825" ref_url="https://bugzilla.suse.com/1178825" source="BUGZILLA"/>
		<reference ref_id="1188921" ref_url="https://bugzilla.suse.com/1188921" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37600" ref_url="https://www.suse.com/security/cve/CVE-2021-37600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009610.html" source="SUSE-SU"/>
		<description>
This update for util-linux fixes the following issues:

- CVE-2021-37600: Fixed an integer overflow which could lead to buffer overflow in get_sem_elements. (bsc#1188921)
- Prevent outdated pam files (bsc#1082293, bsc#1081947#c68).
- Do not trim read-only volumes (bsc#1106214).
- libmount: To prevent incorrect behavior, recognize more pseudofs and netfs (bsc#1122417).
- raw.service: Add RemainAfterExit=yes (bsc#1135534).
- agetty: Reload issue only if it is really needed (bsc#1085196)
- agetty: Return previous response of agetty for special characters (bsc#1085196, bsc#1125886)
- blockdev: Do not fail --report on kpartx-style partitions on multipath. (bsc#1168235)
- nologin: Add support for -c to prevent error from su -c. (bsc#1151708)
- Avoid triggering autofs in lookup_umount_fs_by_statfs. (bsc#1168389)
- libblkid: Do not trigger CDROM autoclose. (bsc#1084671)
- Avoid sulogin failing on not existing or not functional console devices. (bsc#1175514)
- Build with libudev support to support non-root users. (bsc#1169006)
- lscpu: avoid segfault on PowerPC systems with valid hardware configurations. (bsc#1175623, bsc#1178554, bsc#1178825)
- Fix for warning on mounts to CIFS with mount. (SG#57988, bsc#1174942)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081947">SUSE bug 1081947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082293">SUSE bug 1082293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084671">SUSE bug 1084671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085196">SUSE bug 1085196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106214">SUSE bug 1106214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122417">SUSE bug 1122417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125886">SUSE bug 1125886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135534">SUSE bug 1135534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135708">SUSE bug 1135708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151708">SUSE bug 1151708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168235">SUSE bug 1168235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168389">SUSE bug 1168389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169006">SUSE bug 1169006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174942">SUSE bug 1174942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175514">SUSE bug 1175514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175623">SUSE bug 1175623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178236">SUSE bug 1178236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178554">SUSE bug 1178554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178825">SUSE bug 1178825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188921">SUSE bug 1188921</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37600/">CVE-2021-37600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">CVE-2021-37600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652523" comment="libblkid1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652487" comment="libblkid1-32bit-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652524" comment="libfdisk1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652525" comment="libmount1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652490" comment="libmount1-32bit-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652526" comment="libsmartcols1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652527" comment="libuuid1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652493" comment="libuuid1-32bit-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652528" comment="python-libmount-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652529" comment="util-linux-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652496" comment="util-linux-lang-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652530" comment="util-linux-systemd-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652531" comment="uuidd-2.29.2-3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150891" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1191435" ref_url="https://bugzilla.suse.com/1191435" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41991" ref_url="https://www.suse.com/security/cve/CVE-2021-41991/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009611.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191435">SUSE bug 1191435</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41991/">CVE-2021-41991 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41991">CVE-2021-41991 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652805" comment="strongswan-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652801" comment="strongswan-doc-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652806" comment="strongswan-hmac-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652807" comment="strongswan-ipsec-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652808" comment="strongswan-libs0-5.1.3-26.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150892" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1178961" ref_url="https://bugzilla.suse.com/1178961" source="BUGZILLA"/>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1183118" ref_url="https://bugzilla.suse.com/1183118" source="BUGZILLA"/>
		<reference ref_id="1183168" ref_url="https://bugzilla.suse.com/1183168" source="BUGZILLA"/>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="1185952" ref_url="https://bugzilla.suse.com/1185952" source="BUGZILLA"/>
		<reference ref_id="1187751" ref_url="https://bugzilla.suse.com/1187751" source="BUGZILLA"/>
		<reference ref_id="1190177" ref_url="https://bugzilla.suse.com/1190177" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009622.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

- Fix for build with llvm12 on s390x. (bsc#1185952)
- Re-enable 'icu' for PostgreSQL 10. (bsc#1179945)
- Add postgresqlXX-server-devel as a dependency for postgresql13-server-devel. (bsc#1187751)
- Upgrade to version 10.18. (bsc#1190177)

Upgrade to version 10.17 (already released for SUSE Linux Enterprise 12 SP5):

- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).

- Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).
- Re-enable build of the llvmjit subpackage on SLE, but it will only be delivered on PackageHub for now (bsc#1183118).
- Disable icu for PostgreSQL 10 (and older) on TW (bsc#1179945).
- Fixed an issue droping irregular warning messages by removing the package. (bsc#1178961)
- Fixed an issue when build does not build the requiements to avoid dangling symlinks in the devel package. (bsc#1179765)
- Fix recently-added timetz test case so it works when the USA is not observing daylight savings time.

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178961">SUSE bug 1178961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183118">SUSE bug 1183118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183168">SUSE bug 1183168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185952">SUSE bug 1185952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187751">SUSE bug 1187751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190177">SUSE bug 1190177</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652164" comment="postgresql10-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652165" comment="postgresql10-contrib-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652158" comment="postgresql10-docs-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652166" comment="postgresql10-plperl-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652167" comment="postgresql10-plpython-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652168" comment="postgresql10-pltcl-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652169" comment="postgresql10-server-10.18-4.19.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150893" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1191957" ref_url="https://bugzilla.suse.com/1191957" source="BUGZILLA"/>
		<reference ref_id="1191992" ref_url="https://bugzilla.suse.com/1191992" source="BUGZILLA"/>
		<reference ref_id="1192000" ref_url="https://bugzilla.suse.com/1192000" source="BUGZILLA"/>
		<reference ref_id="1192005" ref_url="https://bugzilla.suse.com/1192005" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42779" ref_url="https://www.suse.com/security/cve/CVE-2021-42779/" source="CVE"/>
		<reference ref_id="CVE-2021-42780" ref_url="https://www.suse.com/security/cve/CVE-2021-42780/" source="CVE"/>
		<reference ref_id="CVE-2021-42781" ref_url="https://www.suse.com/security/cve/CVE-2021-42781/" source="CVE"/>
		<reference ref_id="CVE-2021-42782" ref_url="https://www.suse.com/security/cve/CVE-2021-42782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009683.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2021-42780: Fixed use after return in insert_pin() (bsc#1192005).
- CVE-2021-42779: Fixed use after free in sc_file_valid() (bsc#1191992).
- CVE-2021-42781: Fixed multiple heap buffer overflows in pkcs15-oberthur.c (bsc#1192000).
- CVE-2021-42782: Stack buffer overflow issues in various places (bsc#1191957).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191957">SUSE bug 1191957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191992">SUSE bug 1191992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192000">SUSE bug 1192000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192005">SUSE bug 1192005</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42779/">CVE-2021-42779 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42779">CVE-2021-42779 at NVD</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-42780/">CVE-2021-42780 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42780">CVE-2021-42780 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42781/">CVE-2021-42781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42781">CVE-2021-42781 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42782/">CVE-2021-42782 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42782">CVE-2021-42782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653628" comment="opensc-0.13.0-3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150894" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1190607" ref_url="https://bugzilla.suse.com/1190607" source="BUGZILLA"/>
		<reference ref_id="1190611" ref_url="https://bugzilla.suse.com/1190611" source="BUGZILLA"/>
		<reference ref_id="1190612" ref_url="https://bugzilla.suse.com/1190612" source="BUGZILLA"/>
		<reference ref_id="1190615" ref_url="https://bugzilla.suse.com/1190615" source="BUGZILLA"/>
		<reference ref_id="1190616" ref_url="https://bugzilla.suse.com/1190616" source="BUGZILLA"/>
		<reference ref_id="1190617" ref_url="https://bugzilla.suse.com/1190617" source="BUGZILLA"/>
		<reference ref_id="1190618" ref_url="https://bugzilla.suse.com/1190618" source="BUGZILLA"/>
		<reference ref_id="1192019" ref_url="https://bugzilla.suse.com/1192019" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-21529" ref_url="https://www.suse.com/security/cve/CVE-2020-21529/" source="CVE"/>
		<reference ref_id="CVE-2020-21530" ref_url="https://www.suse.com/security/cve/CVE-2020-21530/" source="CVE"/>
		<reference ref_id="CVE-2020-21531" ref_url="https://www.suse.com/security/cve/CVE-2020-21531/" source="CVE"/>
		<reference ref_id="CVE-2020-21532" ref_url="https://www.suse.com/security/cve/CVE-2020-21532/" source="CVE"/>
		<reference ref_id="CVE-2020-21533" ref_url="https://www.suse.com/security/cve/CVE-2020-21533/" source="CVE"/>
		<reference ref_id="CVE-2020-21534" ref_url="https://www.suse.com/security/cve/CVE-2020-21534/" source="CVE"/>
		<reference ref_id="CVE-2020-21535" ref_url="https://www.suse.com/security/cve/CVE-2020-21535/" source="CVE"/>
		<reference ref_id="CVE-2021-32280" ref_url="https://www.suse.com/security/cve/CVE-2021-32280/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009685.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Update to fig2dev version 3.2.8 Patchlevel 8b (Aug 2021)

- bsc#1190618, CVE-2020-21529: stack buffer overflow in the bezier_spline function in genepic.c.
- bsc#1190615, CVE-2020-21530: segmentation fault in the read_objects function in read.c.
- bsc#1190617, CVE-2020-21531: global buffer overflow in the conv_pattern_index function in gencgm.c.
- bsc#1190616, CVE-2020-21532: global buffer overflow in the setfigfont function in genepic.c.
- bsc#1190612, CVE-2020-21533: stack buffer overflow in the read_textobject function in read.c.
- bsc#1190611, CVE-2020-21534: global buffer overflow in the get_line function in read.c.
- bsc#1190607, CVE-2020-21535: segmentation fault in the gencgm_start function in gencgm.c.
- bsc#1192019, CVE-2021-32280: NULL pointer dereference in compute_closed_spline() in trans_spline.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190607">SUSE bug 1190607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190611">SUSE bug 1190611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190612">SUSE bug 1190612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190615">SUSE bug 1190615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190616">SUSE bug 1190616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190617">SUSE bug 1190617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190618">SUSE bug 1190618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192019">SUSE bug 1192019</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21529/">CVE-2020-21529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21529">CVE-2020-21529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21530/">CVE-2020-21530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21530">CVE-2020-21530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21531/">CVE-2020-21531 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21531">CVE-2020-21531 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21532/">CVE-2020-21532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21532">CVE-2020-21532 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21533/">CVE-2020-21533 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21533">CVE-2020-21533 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21534/">CVE-2020-21534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21534">CVE-2020-21534 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21535/">CVE-2020-21535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21535">CVE-2020-21535 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32280/">CVE-2021-32280 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32280">CVE-2021-32280 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653544" comment="transfig-3.2.8b-2.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150895" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1126826" ref_url="https://bugzilla.suse.com/1126826" source="BUGZILLA"/>
		<reference ref_id="1126829" ref_url="https://bugzilla.suse.com/1126829" source="BUGZILLA"/>
		<reference ref_id="1126831" ref_url="https://bugzilla.suse.com/1126831" source="BUGZILLA"/>
		<reference ref_id="1140126" ref_url="https://bugzilla.suse.com/1140126" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1143609" ref_url="https://bugzilla.suse.com/1143609" source="BUGZILLA"/>
		<reference ref_id="1153768" ref_url="https://bugzilla.suse.com/1153768" source="BUGZILLA"/>
		<reference ref_id="1153770" ref_url="https://bugzilla.suse.com/1153770" source="BUGZILLA"/>
		<reference ref_id="1157755" ref_url="https://bugzilla.suse.com/1157755" source="BUGZILLA"/>
		<reference ref_id="1160254" ref_url="https://bugzilla.suse.com/1160254" source="BUGZILLA"/>
		<reference ref_id="1160590" ref_url="https://bugzilla.suse.com/1160590" source="BUGZILLA"/>
		<reference ref_id="1163333" ref_url="https://bugzilla.suse.com/1163333" source="BUGZILLA"/>
		<reference ref_id="1163744" ref_url="https://bugzilla.suse.com/1163744" source="BUGZILLA"/>
		<reference ref_id="1179036" ref_url="https://bugzilla.suse.com/1179036" source="BUGZILLA"/>
		<reference ref_id="1179341" ref_url="https://bugzilla.suse.com/1179341" source="BUGZILLA"/>
		<reference ref_id="1179898" ref_url="https://bugzilla.suse.com/1179898" source="BUGZILLA"/>
		<reference ref_id="1179899" ref_url="https://bugzilla.suse.com/1179899" source="BUGZILLA"/>
		<reference ref_id="1179900" ref_url="https://bugzilla.suse.com/1179900" source="BUGZILLA"/>
		<reference ref_id="1179901" ref_url="https://bugzilla.suse.com/1179901" source="BUGZILLA"/>
		<reference ref_id="1179902" ref_url="https://bugzilla.suse.com/1179902" source="BUGZILLA"/>
		<reference ref_id="1179903" ref_url="https://bugzilla.suse.com/1179903" source="BUGZILLA"/>
		<reference ref_id="1180451" ref_url="https://bugzilla.suse.com/1180451" source="BUGZILLA"/>
		<reference ref_id="1180454" ref_url="https://bugzilla.suse.com/1180454" source="BUGZILLA"/>
		<reference ref_id="1180461" ref_url="https://bugzilla.suse.com/1180461" source="BUGZILLA"/>
		<reference ref_id="1181452" ref_url="https://bugzilla.suse.com/1181452" source="BUGZILLA"/>
		<reference ref_id="1182252" ref_url="https://bugzilla.suse.com/1182252" source="BUGZILLA"/>
		<reference ref_id="1183511" ref_url="https://bugzilla.suse.com/1183511" source="BUGZILLA"/>
		<reference ref_id="1184620" ref_url="https://bugzilla.suse.com/1184620" source="BUGZILLA"/>
		<reference ref_id="1184794" ref_url="https://bugzilla.suse.com/1184794" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12972" ref_url="https://www.suse.com/security/cve/CVE-2019-12972/" source="CVE"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-14444" ref_url="https://www.suse.com/security/cve/CVE-2019-14444/" source="CVE"/>
		<reference ref_id="CVE-2019-17450" ref_url="https://www.suse.com/security/cve/CVE-2019-17450/" source="CVE"/>
		<reference ref_id="CVE-2019-17451" ref_url="https://www.suse.com/security/cve/CVE-2019-17451/" source="CVE"/>
		<reference ref_id="CVE-2019-9074" ref_url="https://www.suse.com/security/cve/CVE-2019-9074/" source="CVE"/>
		<reference ref_id="CVE-2019-9075" ref_url="https://www.suse.com/security/cve/CVE-2019-9075/" source="CVE"/>
		<reference ref_id="CVE-2019-9077" ref_url="https://www.suse.com/security/cve/CVE-2019-9077/" source="CVE"/>
		<reference ref_id="CVE-2020-16590" ref_url="https://www.suse.com/security/cve/CVE-2020-16590/" source="CVE"/>
		<reference ref_id="CVE-2020-16591" ref_url="https://www.suse.com/security/cve/CVE-2020-16591/" source="CVE"/>
		<reference ref_id="CVE-2020-16592" ref_url="https://www.suse.com/security/cve/CVE-2020-16592/" source="CVE"/>
		<reference ref_id="CVE-2020-16593" ref_url="https://www.suse.com/security/cve/CVE-2020-16593/" source="CVE"/>
		<reference ref_id="CVE-2020-16598" ref_url="https://www.suse.com/security/cve/CVE-2020-16598/" source="CVE"/>
		<reference ref_id="CVE-2020-16599" ref_url="https://www.suse.com/security/cve/CVE-2020-16599/" source="CVE"/>
		<reference ref_id="CVE-2020-35448" ref_url="https://www.suse.com/security/cve/CVE-2020-35448/" source="CVE"/>
		<reference ref_id="CVE-2020-35493" ref_url="https://www.suse.com/security/cve/CVE-2020-35493/" source="CVE"/>
		<reference ref_id="CVE-2020-35496" ref_url="https://www.suse.com/security/cve/CVE-2020-35496/" source="CVE"/>
		<reference ref_id="CVE-2020-35507" ref_url="https://www.suse.com/security/cve/CVE-2020-35507/" source="CVE"/>
		<reference ref_id="CVE-2021-20197" ref_url="https://www.suse.com/security/cve/CVE-2021-20197/" source="CVE"/>
		<reference ref_id="CVE-2021-20284" ref_url="https://www.suse.com/security/cve/CVE-2021-20284/" source="CVE"/>
		<reference ref_id="CVE-2021-3487" ref_url="https://www.suse.com/security/cve/CVE-2021-3487/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

Update to binutils 2.37:

* The GNU Binutils sources now requires a C99 compiler and library to
  build.
* Support for the arm-symbianelf format has been removed.
* Support for Realm Management Extension (RME) for AArch64 has been
  added.
* A new linker option '-z report-relative-reloc' for x86 ELF targets
  has been added to report dynamic relative relocations.
* A new linker option '-z start-stop-gc' has been added to disable
  special treatment of __start_*/__stop_* references when
  --gc-sections.
* A new linker options '-Bno-symbolic' has been added which will
  cancel the '-Bsymbolic' and '-Bsymbolic-functions' options.
* The readelf tool has a new command line option which can be used to
  specify how the numeric values of symbols are reported.
  --sym-base=0|8|10|16 tells readelf to display the values in base 8,
  base 10 or base 16.  A sym base of 0 represents the default action
  of displaying values under 10000 in base 10 and values above that in
  base 16.
* A new format has been added to the nm program.  Specifying
  '--format=just-symbols' (or just using -j) will tell the program to
  only display symbol names and nothing else.
* A new command line option '--keep-section-symbols' has been added to
  objcopy and strip.  This stops the removal of unused section symbols
  when the file is copied.  Removing these symbols saves space, but
  sometimes they are needed by other tools.
* The '--weaken', '--weaken-symbol' and '--weaken-symbols' options
  supported by objcopy now make undefined symbols weak on targets that
  support weak symbols. 
* Readelf and objdump can now display and use the contents of .debug_sup
  sections.
* Readelf and objdump will now follow links to separate debug info
  files by default.  This behaviour can be stopped via the use of the
  new '-wN' or '--debug-dump=no-follow-links' options for readelf and
  the '-WN' or '--dwarf=no-follow-links' options for objdump.  Also
  the old behaviour can be restored by the use of the
  '--enable-follow-debug-links=no' configure time option.

  The semantics of the =follow-links option have also been slightly
  changed.  When enabled, the option allows for the loading of symbol
  tables and string tables from the separate files which can be used
  to enhance the information displayed when dumping other sections,
  but it does not automatically imply that information from the
  separate files should be displayed.

  If other debug section display options are also enabled (eg
  '--debug-dump=info') then the contents of matching sections in both
  the main file and the separate debuginfo file *will* be displayed.
  This is because in most cases the debug section will only be present
  in one of the files.

  If however non-debug section display options are enabled (eg
  '--sections') then the contents of matching parts of the separate
  debuginfo file will *not* be displayed.  This is because in most
  cases the user probably only wanted to load the symbol information
  from the separate debuginfo file.  In order to change this behaviour
  a new command line option --process-links can be used.  This will
  allow di0pslay options to applied to both the main file and any
  separate debuginfo files.
* Nm has a new command line option: '--quiet'.  This suppresses 'no
  symbols' diagnostic.

Update to binutils 2.36:

 New features in the Assembler:

  General:

   * When setting the link order attribute of ELF sections, it is now
     possible to use a numeric section index instead of symbol name.
   * Added a .nop directive to generate a single no-op instruction in
     a target neutral manner.  This instruction does have an effect on
     DWARF line number generation, if that is active.
   * Removed --reduce-memory-overheads and --hash-size as gas now
     uses hash tables that can be expand and shrink automatically.

   X86/x86_64:

     * Add support for AVX VNNI, HRESET, UINTR, TDX, AMX and Key
       Locker instructions. 
     * Support non-absolute segment values for lcall and ljmp.
     * Add {disp16} pseudo prefix to x86 assembler.
     * Configure with --enable-x86-used-note by default for Linux/x86.

   ARM/AArch64:

     * Add support for Cortex-A78, Cortex-A78AE and Cortex-X1,
       Cortex-R82, Neoverse V1, and Neoverse N2 cores.
     * Add support for ETMv4 (Embedded Trace Macrocell), ETE (Embedded
       Trace Extension), TRBE (Trace Buffer Extension), CSRE (Call
       Stack Recorder Extension) and BRBE (Branch Record Buffer
       Extension) system registers.
     * Add support for Armv8-R and Armv8.7-A ISA extensions.
     * Add support for DSB memory nXS barrier, WFET and WFIT
       instruction for Armv8.7.
     * Add support for +csre feature for -march. Add CSR PDEC
       instruction for CSRE feature in AArch64.
     * Add support for +flagm feature for -march in Armv8.4 AArch64.
     * Add support for +ls64 feature for -march in Armv8.7
       AArch64. Add atomic 64-byte load/store instructions for this
       feature. 
     * Add support for +pauth (Pointer Authentication) feature for
       -march in AArch64.

  New features in the Linker:

    * Add --error-handling-script=&lt;NAME&gt; command line option to allow
      a helper script to be invoked when an undefined symbol or a
      missing library is encountered.  This option can be suppressed
      via the configure time switch: --enable-error-handling-script=no.
    * Add -z x86-64-{baseline|v[234]} to the x86 ELF linker to mark
      x86-64-{baseline|v[234]} ISA level as needed.
    * Add -z unique-symbol to avoid duplicated local symbol names.
    * The creation of PE format DLLs now defaults to using a more
      secure set of DLL characteristics.
    * The linker now deduplicates the types in .ctf sections.  The new 
       command-line option --ctf-share-types describes how to do this:
       its default value, share-unconflicted, produces the most compact
       output.
    * The linker now omits the 'variable section' from .ctf sections
      by default, saving space.  This is almost certainly what you
      want unless you are working on a project that has its own
      analogue of symbol tables that are not reflected in the ELF
      symtabs.

New features in other binary tools:

    * The ar tool's previously unused l modifier is now used for
      specifying dependencies of a static library. The arguments of
      this option (or --record-libdeps long form option) will be
      stored verbatim in the __.LIBDEP member of the archive, which
      the linker may read at link time.
    * Readelf can now display the contents of LTO symbol table
      sections when asked to do so via the --lto-syms command line
      option.
    * Readelf now accepts the -C command line option to enable the
      demangling of symbol names.  In addition the --demangle=&lt;style&gt;,
      --no-demangle, --recurse-limit and --no-recurse-limit options
      are also now availale.

Update to binutils 2.35.1:

* This is a point release over the previous 2.35 version, containing bug
  fixes, and as an exception to the usual rule, one new feature.  The
  new feature is the support for a new directive in the assembler:
  '.nop'.  This directive creates a single no-op instruction in whatever
  encoding is correct for the target architecture.  Unlike the .space or
  .fill this is a real instruction, and it does affect the generation of
  DWARF line number tables, should they be enabled.

Update to binutils 2.35:

* The assembler can now produce DWARF-5 format line number tables.
* Readelf now has a 'lint' mode to enable extra checks of the files it is processing.
* Readelf will now display '[...]' when it has to truncate a symbol name.  
  The old behaviour - of displaying as many characters as possible, up to
  the 80 column limit - can be restored by the use of the --silent-truncation
  option.
* The linker can now produce a dependency file listing the inputs that it
  has processed, much like the -M -MP option supported by the compiler.

Update to binutils 2.34:

* The disassembler (objdump --disassemble) now has an option to
  generate ascii art thats show the arcs between that start and end
  points of control flow instructions.
* The binutils tools now have support for debuginfod.  Debuginfod is a 
  HTTP service for distributing ELF/DWARF debugging information as
  well as source code.  The tools can now connect to debuginfod
  servers in order to download debug information about the files that
  they are processing.
* The assembler and linker now support the generation of ELF format
  files for the Z80 architecture.

Update to binutils 2.33.1:

* Adds support for the Arm Scalable Vector Extension version 2
  (SVE2) instructions, the Arm Transactional Memory Extension (TME)
  instructions and the Armv8.1-M Mainline and M-profile Vector
  Extension (MVE) instructions.
* Adds support for the Arm Cortex-A76AE, Cortex-A77 and Cortex-M35P
  processors and the AArch64 Cortex-A34, Cortex-A65, Cortex-A65AE,
  Cortex-A76AE, and Cortex-A77 processors.
* Adds a .float16 directive for both Arm and AArch64 to allow
  encoding of 16-bit floating point literals.
* For MIPS, Add -m[no-]fix-loongson3-llsc option to fix (or not)
  Loongson3 LLSC Errata.  Add a --enable-mips-fix-loongson3-llsc=[yes|no]
  configure time option to set the default behavior. Set the default
  if the configure option is not used to 'no'.
* The Cortex-A53 Erratum 843419 workaround now supports a choice of
  which workaround to use.  The option --fix-cortex-a53-843419 now
  takes an optional argument --fix-cortex-a53-843419[=full|adr|adrp]
  which can be used to force a particular workaround to be used.
  See --help for AArch64 for more details.
* Add support for GNU_PROPERTY_AARCH64_FEATURE_1_BTI and
  GNU_PROPERTY_AARCH64_FEATURE_1_PAC  in ELF GNU program properties
  in the AArch64 ELF linker. 
* Add -z force-bti for AArch64 to enable GNU_PROPERTY_AARCH64_FEATURE_1_BTI
  on output while warning about missing GNU_PROPERTY_AARCH64_FEATURE_1_BTI 
  on inputs and use PLTs protected with BTI.
* Add -z pac-plt for AArch64 to pick PAC enabled PLTs.
* Add --source-comment[=&lt;txt&gt;] option to objdump which if present,
  provides a prefix to source code lines displayed in a disassembly.
* Add --set-section-alignment &lt;section-name&gt;=&lt;power-of-2-align&gt;
  option to objcopy to allow the changing of section alignments.
* Add --verilog-data-width option to objcopy for verilog targets to
  control width of data elements in verilog hex format.
* The separate debug info file options of readelf (--debug-dump=links
  and --debug-dump=follow) and objdump (--dwarf=links and
  --dwarf=follow-links) will now display and/or follow multiple
  links if more than one are present in a file.  (This usually
  happens when gcc's -gsplit-dwarf option is used).
  In addition objdump's --dwarf=follow-links now also affects its
  other display options, so that for example, when combined with
  --syms it will cause the symbol tables in any linked debug info
  files to also be displayed.  In addition when combined with
  --disassemble the --dwarf= follow-links option will ensure that
  any symbol tables in the linked files are read and used when
  disassembling code in the main file.
* Add support for dumping types encoded in the Compact Type Format
  to objdump and readelf.

The following security fixes are addressed by the update:

- CVE-2021-20197: Fixed a race condition which allows users to own arbitrary files (bsc#1181452).
- CVE-2021-20284: Fixed a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c (bsc#1183511).
- CVE-2021-3487: Fixed a denial of service via excessive debug section size causing excessive memory consumption in bfd's dwarf2.c read_section() (bsc#1184620).
- CVE-2020-35448: Fixed a heap-based buffer over-read in bfd_getl_signed_32() in libbfd.c (bsc#1184794).
- CVE-2020-16590: Fixed a double free vulnerability in process_symbol_table() (bsc#1179898).
- CVE-2020-16591: Fixed an invalid read in process_symbol_table() (bsc#1179899).
- CVE-2020-16592: Fixed an use-after-free in bfd_hash_lookup() (bsc#1179900).
- CVE-2020-16593: Fixed a null pointer dereference in scan_unit_for_symbols() (bsc#1179901).
- CVE-2020-16598: Fixed a null pointer dereference in debug_get_real_type() (bsc#1179902).
- CVE-2020-16599: Fixed a null pointer dereference in _bfd_elf_get_symbol_version_string() (bsc#1179903)
- CVE-2020-35493: Fixed heap-based buffer overflow in bfd_pef_parse_function_stubs function in bfd/pef.c via crafted PEF file (bsc#1180451).
- CVE-2020-35496: Fixed multiple null pointer dereferences in bfd module due to not checking return value of bfd_malloc (bsc#1180454).
- CVE-2020-35507: Fixed a null pointer dereference in bfd_pef_parse_function_stubs() (bsc#1180461).
- CVE-2019-17451: Fixed an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line() in dwarf2.c (bsc#1153768).
- CVE-2019-17450: Fixed a potential denial of service in find_abstract_instance() in dwarf2.c (bsc#1153770).
- CVE-2019-9077: Fixed a heap-based buffer overflow in process_mips_specific() in readelf.c via a malformed MIPS option section (bsc#1126826).
- CVE-2019-9075: Fixed a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap() in archive64.c (bsc#1126829).
- CVE-2019-9074: Fixed a out-of-bounds read leading to a SEGV in bfd_getl32() in libbfd.c (bsc#1126831).
- CVE-2019-12972: Fixed a heap-based buffer over-read in _bfd_doprnt() in bfd.c (bsc#1140126).
- CVE-2019-14444: Fixed an integer overflow apply_relocations() in readelf.c (bsc#1143609).
- CVE-2019-14250: Fixed an integer overflow in simple_object_elf_match() in simple-object-elf.c (bsc#1142649).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-02"/>
	<updated date="2021-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126826">SUSE bug 1126826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126829">SUSE bug 1126829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126831">SUSE bug 1126831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140126">SUSE bug 1140126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143609">SUSE bug 1143609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153768">SUSE bug 1153768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153770">SUSE bug 1153770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157755">SUSE bug 1157755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160254">SUSE bug 1160254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160590">SUSE bug 1160590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163333">SUSE bug 1163333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163744">SUSE bug 1163744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179036">SUSE bug 1179036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179341">SUSE bug 1179341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179898">SUSE bug 1179898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179899">SUSE bug 1179899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179900">SUSE bug 1179900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179901">SUSE bug 1179901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179902">SUSE bug 1179902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179903">SUSE bug 1179903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180451">SUSE bug 1180451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180454">SUSE bug 1180454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180461">SUSE bug 1180461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181452">SUSE bug 1181452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182252">SUSE bug 1182252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183511">SUSE bug 1183511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184620">SUSE bug 1184620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184794">SUSE bug 1184794</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12972/">CVE-2019-12972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12972">CVE-2019-12972 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14250">CVE-2019-14250 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14444/">CVE-2019-14444 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14444">CVE-2019-14444 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17450/">CVE-2019-17450 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17450">CVE-2019-17450 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17451/">CVE-2019-17451 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17451">CVE-2019-17451 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9074/">CVE-2019-9074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9074">CVE-2019-9074 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9075/">CVE-2019-9075 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9075">CVE-2019-9075 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9077/">CVE-2019-9077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9077">CVE-2019-9077 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16590/">CVE-2020-16590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16590">CVE-2020-16590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16591/">CVE-2020-16591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16591">CVE-2020-16591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16592/">CVE-2020-16592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16592">CVE-2020-16592 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16593/">CVE-2020-16593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16593">CVE-2020-16593 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16598/">CVE-2020-16598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16598">CVE-2020-16598 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16599/">CVE-2020-16599 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16599">CVE-2020-16599 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-35448/">CVE-2020-35448 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35448">CVE-2020-35448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35493/">CVE-2020-35493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35493">CVE-2020-35493 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35496/">CVE-2020-35496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35496">CVE-2020-35496 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35507/">CVE-2020-35507 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35507">CVE-2020-35507 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20197/">CVE-2021-20197 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20197">CVE-2021-20197 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20284/">CVE-2021-20284 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20284">CVE-2021-20284 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3487/">CVE-2021-3487 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3487">CVE-2021-3487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150896" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1183909" ref_url="https://bugzilla.suse.com/1183909" source="BUGZILLA"/>
		<reference ref_id="1184519" ref_url="https://bugzilla.suse.com/1184519" source="BUGZILLA"/>
		<reference ref_id="1188941" ref_url="https://bugzilla.suse.com/1188941" source="BUGZILLA"/>
		<reference ref_id="1191473" ref_url="https://bugzilla.suse.com/1191473" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20294" ref_url="https://www.suse.com/security/cve/CVE-2021-20294/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009707.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

- For compatibility on old code stream that expect 'brcl 0,label' to
  not be disassembled as 'jgnop label' on s390x.  (bsc#1192267)
  This reverts IBM zSeries HLASM support for now.
- Fixed that ppc64 optflags did not enable LTO (bsc#1188941).
- Fix empty man-pages from broken release tarball
- Fixed a memory corruption with rpath option (bsc#1191473).

- Fixed slow performance of stripping some binaries (bsc#1183909).

Security issue fixed:

- CVE-2021-20294: Fixed out-of-bounds write in print_dynamic_symbol in readelf (bnc#1184519)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183909">SUSE bug 1183909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184519">SUSE bug 1184519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188941">SUSE bug 1188941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191473">SUSE bug 1191473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20294/">CVE-2021-20294 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20294">CVE-2021-20294 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654414" comment="binutils-2.37-9.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654415" comment="binutils-devel-2.37-9.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654416" comment="libctf-nobfd0-2.37-9.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654417" comment="libctf0-2.37-9.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150897" version="1" class="patch">
	<metadata>
		<title>Security update for pcre (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1025709" ref_url="https://bugzilla.suse.com/1025709" source="BUGZILLA"/>
		<reference ref_id="1030066" ref_url="https://bugzilla.suse.com/1030066" source="BUGZILLA"/>
		<reference ref_id="1030803" ref_url="https://bugzilla.suse.com/1030803" source="BUGZILLA"/>
		<reference ref_id="1030805" ref_url="https://bugzilla.suse.com/1030805" source="BUGZILLA"/>
		<reference ref_id="1030807" ref_url="https://bugzilla.suse.com/1030807" source="BUGZILLA"/>
		<reference ref_id="1172973" ref_url="https://bugzilla.suse.com/1172973" source="BUGZILLA"/>
		<reference ref_id="1172974" ref_url="https://bugzilla.suse.com/1172974" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6004" ref_url="https://www.suse.com/security/cve/CVE-2017-6004/" source="CVE"/>
		<reference ref_id="CVE-2017-7186" ref_url="https://www.suse.com/security/cve/CVE-2017-7186/" source="CVE"/>
		<reference ref_id="CVE-2017-7244" ref_url="https://www.suse.com/security/cve/CVE-2017-7244/" source="CVE"/>
		<reference ref_id="CVE-2017-7245" ref_url="https://www.suse.com/security/cve/CVE-2017-7245/" source="CVE"/>
		<reference ref_id="CVE-2017-7246" ref_url="https://www.suse.com/security/cve/CVE-2017-7246/" source="CVE"/>
		<reference ref_id="CVE-2019-20838" ref_url="https://www.suse.com/security/cve/CVE-2019-20838/" source="CVE"/>
		<reference ref_id="CVE-2020-14155" ref_url="https://www.suse.com/security/cve/CVE-2020-14155/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
		<description>
This update for pcre fixes the following issues:

Update pcre to version 8.45:

- CVE-2020-14155: Fixed integer overflow via a large number after a '(?C' substring (bsc#1172974).
- CVE-2019-20838: Fixed buffer over-read in JIT compiler (bsc#1172973).
- CVE-2017-7244: Fixed invalid read in _pcre32_xclass() (bsc#1030807).
- CVE-2017-7245: Fixed buffer overflow in the pcre32_copy_substring (bsc#1030805).
- CVE-2017-7246: Fixed another buffer overflow in the pcre32_copy_substring (bsc#1030803).
- CVE-2017-7186: Fixed denial of service caused by an invalid Unicode property lookup (bsc#1030066).
- CVE-2017-6004: Fixed denial of service via crafted regular expression (bsc#1025709).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-10"/>
	<updated date="2021-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025709">SUSE bug 1025709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030066">SUSE bug 1030066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030803">SUSE bug 1030803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030805">SUSE bug 1030805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030807">SUSE bug 1030807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172973">SUSE bug 1172973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172974">SUSE bug 1172974</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6004/">CVE-2017-6004 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6004">CVE-2017-6004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7186/">CVE-2017-7186 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7186">CVE-2017-7186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7244/">CVE-2017-7244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7244">CVE-2017-7244 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7245/">CVE-2017-7245 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7245">CVE-2017-7245 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7246/">CVE-2017-7246 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7246">CVE-2017-7246 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20838/">CVE-2019-20838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20838">CVE-2019-20838 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14155/">CVE-2020-14155 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">CVE-2020-14155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653038" comment="libpcre1-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653016" comment="libpcre1-32bit-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653039" comment="libpcre16-0-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653066" comment="libpcrecpp0-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653354" comment="libpcreposix0-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653191" comment="pcre-devel-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653349" comment="selinux-policy-20140730-36.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653350" comment="selinux-policy-devel-20140730-36.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653351" comment="selinux-policy-minimum-20140730-36.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150898" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1189702" ref_url="https://bugzilla.suse.com/1189702" source="BUGZILLA"/>
		<reference ref_id="1189938" ref_url="https://bugzilla.suse.com/1189938" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3713" ref_url="https://www.suse.com/security/cve/CVE-2021-3713/" source="CVE"/>
		<reference ref_id="CVE-2021-3748" ref_url="https://www.suse.com/security/cve/CVE-2021-3748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020738.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- Fix out-of-bounds write in UAS (USB Attached SCSI) device emulation (bsc#1189702, CVE-2021-3713)
- Fix heap use-after-free in virtio_net_receive_rcu (bsc#1189938, CVE-2021-3748)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-10"/>
	<updated date="2021-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189702">SUSE bug 1189702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189938">SUSE bug 1189938</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3713/">CVE-2021-3713 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3713">CVE-2021-3713 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3748/">CVE-2021-3748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3748">CVE-2021-3748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653192" comment="qemu-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653193" comment="qemu-block-curl-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653194" comment="qemu-block-iscsi-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653156" comment="qemu-block-rbd-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653195" comment="qemu-block-ssh-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653196" comment="qemu-guest-agent-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653159" comment="qemu-ipxe-1.0.0+-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653160" comment="qemu-kvm-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653197" comment="qemu-lang-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653163" comment="qemu-seabios-1.10.2_0_g5f4c7b1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653164" comment="qemu-sgabios-8-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653198" comment="qemu-tools-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653166" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653167" comment="qemu-x86-2.9.1-43.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150899" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1192250" ref_url="https://bugzilla.suse.com/1192250" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38505" ref_url="https://www.suse.com/security/cve/CVE-2021-38505/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<reference ref_id="CVE-2021-38510" ref_url="https://www.suse.com/security/cve/CVE-2021-38510/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to Extended Support Release 91.3.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-49 (bsc#1192250)

  * CVE-2021-38503: iframe sandbox rules did not apply to XSLT stylesheets
  * CVE-2021-38504: Use-after-free in file picker dialog
  * CVE-2021-38505: Windows 10 Cloud Clipboard may have recorded sensitive user data
  * CVE-2021-38506: Firefox could be coaxed into going into fullscreen mode without notification or warning
  * CVE-2021-38507: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports
  * CVE-2021-38508: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing
  * CVE-2021-38509: Javascript alert box could have been spoofed onto an arbitrary domain
  * CVE-2021-38510: Download Protections were bypassed by .inetloc files on Mac OS
  * MOZ-2021-0008: Use-after-free in HTTP2 Session object
  * MOZ-2021-0007: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38503">CVE-2021-38503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38504">CVE-2021-38504 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38505/">CVE-2021-38505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38505">CVE-2021-38505 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38506">CVE-2021-38506 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38507">CVE-2021-38507 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38508">CVE-2021-38508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38509">CVE-2021-38509 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38510/">CVE-2021-38510 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38510">CVE-2021-38510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655637" comment="MozillaFirefox-91.3.0-112.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655638" comment="MozillaFirefox-devel-91.3.0-112.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655639" comment="MozillaFirefox-translations-common-91.3.0-112.80.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150900" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1014440" ref_url="https://bugzilla.suse.com/1014440" source="BUGZILLA"/>
		<reference ref_id="1192284" ref_url="https://bugzilla.suse.com/1192284" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124/" source="CVE"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009750.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:
	  
- CVE-2016-2124: Fixed not to fallback to non spnego authentication if we require kerberos (bsc#1014440).
- CVE-2020-25717: Fixed privilege escalation inside an AD Domain where a user could become root on domain members (bsc#1192284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014440">SUSE bug 1014440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192284">SUSE bug 1192284</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2124">CVE-2016-2124 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25717">CVE-2020-25717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655686" comment="libdcerpc-binding0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655588" comment="libdcerpc-binding0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655687" comment="libdcerpc0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655590" comment="libdcerpc0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655688" comment="libndr-krb5pac0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655592" comment="libndr-krb5pac0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655689" comment="libndr-nbt0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655594" comment="libndr-nbt0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655690" comment="libndr-standard0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655596" comment="libndr-standard0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655691" comment="libndr0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655598" comment="libndr0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655692" comment="libnetapi0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655600" comment="libnetapi0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655693" comment="libsamba-credentials0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655602" comment="libsamba-credentials0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655694" comment="libsamba-errors0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655604" comment="libsamba-errors0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655695" comment="libsamba-hostconfig0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655606" comment="libsamba-hostconfig0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655696" comment="libsamba-passdb0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655608" comment="libsamba-passdb0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655697" comment="libsamba-util0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655610" comment="libsamba-util0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655698" comment="libsamdb0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655612" comment="libsamdb0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655699" comment="libsmbclient0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655614" comment="libsmbclient0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655700" comment="libsmbconf0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655616" comment="libsmbconf0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655701" comment="libsmbldap0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655618" comment="libsmbldap0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655702" comment="libtevent-util0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655620" comment="libtevent-util0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655703" comment="libwbclient0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655622" comment="libwbclient0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655704" comment="samba-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655705" comment="samba-client-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655625" comment="samba-client-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655626" comment="samba-doc-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655706" comment="samba-libs-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655628" comment="samba-libs-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655707" comment="samba-winbind-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655630" comment="samba-winbind-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150901" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql13, postgresql14  (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009760.html" source="SUSE-SU"/>
		<description>
This update for postgresql, postgresql13 and postgresql14 fixes the following issues:

Security issues fixed:

- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).

This update also ships postgresql14 to SUSE Linux Enterprise 12 SP5. (jsc#SLE-22673)
On older service packs only libpq5 and libecpg6 are being replaced by the postgresql14 variants.

Feature changes in postgresql14:

- https://www.postgresql.org/about/news/postgresql-14-released-2318/
- https://www.postgresql.org/docs/14/release-14.html

		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-20"/>
	<updated date="2021-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656243" comment="libecpg6-14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656244" comment="libpq5-14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656229" comment="libpq5-32bit-14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656230" comment="postgresql-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656231" comment="postgresql-contrib-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656232" comment="postgresql-docs-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656233" comment="postgresql-plperl-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656234" comment="postgresql-plpython-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656235" comment="postgresql-pltcl-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656236" comment="postgresql-server-14-4.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150902" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009763.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656863" comment="postgresql96-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656864" comment="postgresql96-contrib-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656857" comment="postgresql96-docs-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656865" comment="postgresql96-plperl-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656866" comment="postgresql96-plpython-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656867" comment="postgresql96-pltcl-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656868" comment="postgresql96-server-9.6.24-6.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150903" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009764.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:
          
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656548" comment="postgresql10-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656549" comment="postgresql10-contrib-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656534" comment="postgresql10-docs-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656550" comment="postgresql10-plperl-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656551" comment="postgresql10-plpython-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656552" comment="postgresql10-pltcl-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656553" comment="postgresql10-server-10.19-4.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150904" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1191937" ref_url="https://bugzilla.suse.com/1191937" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42762" ref_url="https://www.suse.com/security/cve/CVE-2021-42762/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009769.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2021-42762: Updated seccomp rules with latest changes from flatpak (bsc#1191937).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-23"/>
	<updated date="2021-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191937">SUSE bug 1191937</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42762/">CVE-2021-42762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42762">CVE-2021-42762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657339" comment="libjavascriptcoregtk-4_0-18-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657340" comment="libwebkit2gtk-4_0-37-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657341" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657342" comment="typelib-1_0-WebKit2-4_0-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657344" comment="webkit2gtk-4_0-injected-bundles-2.32.4-2.74.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150905" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1191901" ref_url="https://bugzilla.suse.com/1191901" source="BUGZILLA"/>
		<reference ref_id="1191903" ref_url="https://bugzilla.suse.com/1191903" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191906" ref_url="https://bugzilla.suse.com/1191906" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version OpenJDK 8u312 (October 2021 CPU):
  
- CVE-2021-35550: Fixed weak ciphers preferred over stronger ones for TLS (bsc#1191901).
- CVE-2021-35556: Fixed excessive memory allocation in RTFParser (bsc#1191910).
- CVE-2021-35559: Fixed excessive memory allocation in RTFReader (bsc#1191911).
- CVE-2021-35561: Fixed excessive memory allocation in HashMap and HashSet (bsc#1191912).
- CVE-2021-35564: Fixed certificates with end dates too far in the future can corrupt keystore (bsc#1191913).
- CVE-2021-35565: Fixed loop in HttpsServer triggered during TLS session close (bsc#1191909).
- CVE-2021-35567: Fixed incorrect principal selection when using Kerberos Constrained Delegation (bsc#1191903).
- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake (bsc#1191904).
- CVE-2021-35586: Fixed excessive memory allocation in BMPImageReader (bsc#1191914).
- CVE-2021-35588: Fixed incomplete validation of inner class references in ClassFileParser (bsc#1191905)
- CVE-2021-35603: Fixed non-constant comparison during TLS handshakes (bsc#1191906).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-23"/>
	<updated date="2021-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191903">SUSE bug 1191903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35550">CVE-2021-35550 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35567">CVE-2021-35567 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657044" comment="java-1_8_0-openjdk-1.8.0.312-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657045" comment="java-1_8_0-openjdk-demo-1.8.0.312-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657046" comment="java-1_8_0-openjdk-devel-1.8.0.312-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657047" comment="java-1_8_0-openjdk-headless-1.8.0.312-27.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150906" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1191901" ref_url="https://bugzilla.suse.com/1191901" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191906" ref_url="https://bugzilla.suse.com/1191906" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:


Update to OpenJDK 7u321 (October 2021 CPU):

- CVE-2021-35550: Fixed weak ciphers preferred over stronger ones for TLS (bsc#1191901).
- CVE-2021-35556: Fixed excessive memory allocation in RTFParser (bsc#1191910).
- CVE-2021-35559: Fixed excessive memory allocation in RTFReader (bsc#1191911).
- CVE-2021-35561: Fixed excessive memory allocation in HashMap and HashSet (bsc#1191912).
- CVE-2021-35564: Fixed certificates with end dates too far in the future can corrupt keystore (bsc#1191913).
- CVE-2021-35565: Fixed loop in HttpsServer triggered during TLS session close (bsc#1191909).
- CVE-2021-35586: Fixed excessive memory allocation in BMPImageReader (bsc#1191914).
- CVE-2021-35588: Fixed incomplete validation of inner class references in ClassFileParser (bsc#1191905)
- CVE-2021-35603: Fixed non-constant comparison during TLS handshakes (bsc#1191906).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35550">CVE-2021-35550 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656897" comment="java-1_7_0-openjdk-1.7.0.321-43.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656898" comment="java-1_7_0-openjdk-demo-1.7.0.321-43.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656899" comment="java-1_7_0-openjdk-devel-1.7.0.321-43.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656900" comment="java-1_7_0-openjdk-headless-1.7.0.321-43.53.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150907" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1177125" ref_url="https://bugzilla.suse.com/1177125" source="BUGZILLA"/>
		<reference ref_id="1188160" ref_url="https://bugzilla.suse.com/1188160" source="BUGZILLA"/>
		<reference ref_id="1188161" ref_url="https://bugzilla.suse.com/1188161" source="BUGZILLA"/>
		<reference ref_id="1190375" ref_url="https://bugzilla.suse.com/1190375" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25613" ref_url="https://www.suse.com/security/cve/CVE-2020-25613/" source="CVE"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009790.html" source="SUSE-SU"/>
		<description>
This update for ruby2.1 fixes the following issues:

- CVE-2020-25613: Fixed potential HTTP request smuggling in WEBrick (bsc#1177125).
- CVE-2021-31799: Fixed Command injection vulnerability in RDoc (bsc#1190375).
- CVE-2021-31810: Fixed trusting FTP PASV responses vulnerability in Net:FTP (bsc#1188161).
- CVE-2021-32066: Fixed StartTLS stripping vulnerability in Net:IMAP (bsc#1188160).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177125">SUSE bug 1177125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188160">SUSE bug 1188160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188161">SUSE bug 1188161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190375">SUSE bug 1190375</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25613/">CVE-2020-25613 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25613">CVE-2020-25613 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31799">CVE-2021-31799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31810">CVE-2021-31810 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32066">CVE-2021-32066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657553" comment="libruby2_1-2_1-2.1.9-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657554" comment="ruby2.1-2.1.9-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657555" comment="ruby2.1-stdlib-2.1.9-19.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150908" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1192554" ref_url="https://bugzilla.suse.com/1192554" source="BUGZILLA"/>
		<reference ref_id="1192557" ref_url="https://bugzilla.suse.com/1192557" source="BUGZILLA"/>
		<reference ref_id="1192559" ref_url="https://bugzilla.suse.com/1192559" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28704" ref_url="https://www.suse.com/security/cve/CVE-2021-28704/" source="CVE"/>
		<reference ref_id="CVE-2021-28705" ref_url="https://www.suse.com/security/cve/CVE-2021-28705/" source="CVE"/>
		<reference ref_id="CVE-2021-28706" ref_url="https://www.suse.com/security/cve/CVE-2021-28706/" source="CVE"/>
		<reference ref_id="CVE-2021-28707" ref_url="https://www.suse.com/security/cve/CVE-2021-28707/" source="CVE"/>
		<reference ref_id="CVE-2021-28708" ref_url="https://www.suse.com/security/cve/CVE-2021-28708/" source="CVE"/>
		<reference ref_id="CVE-2021-28709" ref_url="https://www.suse.com/security/cve/CVE-2021-28709/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009783.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-28704, CVE-2021-28707, CVE-2021-28708: Fixed PoD operations on misaligned GFNs (XSA-388) (bsc#1192557).
- CVE-2021-28705, CVE-2021-28709: Fixed issues with partially successful P2M updates on x86 (XSA-389) (bsc#1192559).
- CVE-2021-28706: Fixed guests may exceed their designated memory limit (XSA-385) (bsc#1192554).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192554">SUSE bug 1192554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192557">SUSE bug 1192557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192559">SUSE bug 1192559</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28704/">CVE-2021-28704 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28704">CVE-2021-28704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28705/">CVE-2021-28705 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28705">CVE-2021-28705 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28706/">CVE-2021-28706 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28706">CVE-2021-28706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28707/">CVE-2021-28707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28707">CVE-2021-28707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28708/">CVE-2021-28708 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28708">CVE-2021-28708 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28709/">CVE-2021-28709 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28709">CVE-2021-28709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658666" comment="xen-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658667" comment="xen-doc-html-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658668" comment="xen-libs-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658669" comment="xen-libs-32bit-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658670" comment="xen-tools-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658671" comment="xen-tools-domU-4.9.4_24-3.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150909" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1103032" ref_url="https://bugzilla.suse.com/1103032" source="BUGZILLA"/>
		<reference ref_id="1188284" ref_url="https://bugzilla.suse.com/1188284" source="BUGZILLA"/>
		<reference ref_id="1192346" ref_url="https://bugzilla.suse.com/1192346" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009804.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2018-14679: Fixed off-by-one issue in embedded libmspack that could lead to denial of service (bsc#1103032). 
  
- Update to 0.103.4 (bsc#1192346).
- Update to 0.103.3 (bsc#1188284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188284">SUSE bug 1188284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192346">SUSE bug 1192346</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14679">CVE-2018-14679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656968" comment="clamav-0.103.4-33.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150910" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1192063" ref_url="https://bugzilla.suse.com/1192063" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009802.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2021-30846: Fixed memory corruption issue that could lead to arbitrary code execution when processing maliciously crafted web content (bsc#1192063).
- CVE-2021-30851: Fixed memory corruption vulnerability that could lead to arbitrary code execution when processing maliciously crafted web content (bsc#1192063).   
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192063">SUSE bug 1192063</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30846">CVE-2021-30846 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30851">CVE-2021-30851 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658205" comment="libjavascriptcoregtk-4_0-18-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658206" comment="libwebkit2gtk-4_0-37-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658207" comment="typelib-1_0-JavaScriptCore-4_0-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658208" comment="typelib-1_0-WebKit2-4_0-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658210" comment="webkit2gtk-4_0-injected-bundles-2.34.1-2.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150911" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1073928" ref_url="https://bugzilla.suse.com/1073928" source="BUGZILLA"/>
		<reference ref_id="1098425" ref_url="https://bugzilla.suse.com/1098425" source="BUGZILLA"/>
		<reference ref_id="1100416" ref_url="https://bugzilla.suse.com/1100416" source="BUGZILLA"/>
		<reference ref_id="1119934" ref_url="https://bugzilla.suse.com/1119934" source="BUGZILLA"/>
		<reference ref_id="1129735" ref_url="https://bugzilla.suse.com/1129735" source="BUGZILLA"/>
		<reference ref_id="1171217" ref_url="https://bugzilla.suse.com/1171217" source="BUGZILLA"/>
		<reference ref_id="1171420" ref_url="https://bugzilla.suse.com/1171420" source="BUGZILLA"/>
		<reference ref_id="1173346" ref_url="https://bugzilla.suse.com/1173346" source="BUGZILLA"/>
		<reference ref_id="1176724" ref_url="https://bugzilla.suse.com/1176724" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1181158" ref_url="https://bugzilla.suse.com/1181158" source="BUGZILLA"/>
		<reference ref_id="1181854" ref_url="https://bugzilla.suse.com/1181854" source="BUGZILLA"/>
		<reference ref_id="1181855" ref_url="https://bugzilla.suse.com/1181855" source="BUGZILLA"/>
		<reference ref_id="1183089" ref_url="https://bugzilla.suse.com/1183089" source="BUGZILLA"/>
		<reference ref_id="1184673" ref_url="https://bugzilla.suse.com/1184673" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185727" ref_url="https://bugzilla.suse.com/1185727" source="BUGZILLA"/>
		<reference ref_id="1185758" ref_url="https://bugzilla.suse.com/1185758" source="BUGZILLA"/>
		<reference ref_id="1185973" ref_url="https://bugzilla.suse.com/1185973" source="BUGZILLA"/>
		<reference ref_id="1186109" ref_url="https://bugzilla.suse.com/1186109" source="BUGZILLA"/>
		<reference ref_id="1186390" ref_url="https://bugzilla.suse.com/1186390" source="BUGZILLA"/>
		<reference ref_id="1188172" ref_url="https://bugzilla.suse.com/1188172" source="BUGZILLA"/>
		<reference ref_id="1188563" ref_url="https://bugzilla.suse.com/1188563" source="BUGZILLA"/>
		<reference ref_id="1188601" ref_url="https://bugzilla.suse.com/1188601" source="BUGZILLA"/>
		<reference ref_id="1188838" ref_url="https://bugzilla.suse.com/1188838" source="BUGZILLA"/>
		<reference ref_id="1188876" ref_url="https://bugzilla.suse.com/1188876" source="BUGZILLA"/>
		<reference ref_id="1188983" ref_url="https://bugzilla.suse.com/1188983" source="BUGZILLA"/>
		<reference ref_id="1188985" ref_url="https://bugzilla.suse.com/1188985" source="BUGZILLA"/>
		<reference ref_id="1189057" ref_url="https://bugzilla.suse.com/1189057" source="BUGZILLA"/>
		<reference ref_id="1189262" ref_url="https://bugzilla.suse.com/1189262" source="BUGZILLA"/>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189291" ref_url="https://bugzilla.suse.com/1189291" source="BUGZILLA"/>
		<reference ref_id="1189399" ref_url="https://bugzilla.suse.com/1189399" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="1189706" ref_url="https://bugzilla.suse.com/1189706" source="BUGZILLA"/>
		<reference ref_id="1190022" ref_url="https://bugzilla.suse.com/1190022" source="BUGZILLA"/>
		<reference ref_id="1190023" ref_url="https://bugzilla.suse.com/1190023" source="BUGZILLA"/>
		<reference ref_id="1190025" ref_url="https://bugzilla.suse.com/1190025" source="BUGZILLA"/>
		<reference ref_id="1190067" ref_url="https://bugzilla.suse.com/1190067" source="BUGZILLA"/>
		<reference ref_id="1190117" ref_url="https://bugzilla.suse.com/1190117" source="BUGZILLA"/>
		<reference ref_id="1190159" ref_url="https://bugzilla.suse.com/1190159" source="BUGZILLA"/>
		<reference ref_id="1190194" ref_url="https://bugzilla.suse.com/1190194" source="BUGZILLA"/>
		<reference ref_id="1190349" ref_url="https://bugzilla.suse.com/1190349" source="BUGZILLA"/>
		<reference ref_id="1190351" ref_url="https://bugzilla.suse.com/1190351" source="BUGZILLA"/>
		<reference ref_id="1190601" ref_url="https://bugzilla.suse.com/1190601" source="BUGZILLA"/>
		<reference ref_id="1190717" ref_url="https://bugzilla.suse.com/1190717" source="BUGZILLA"/>
		<reference ref_id="1191193" ref_url="https://bugzilla.suse.com/1191193" source="BUGZILLA"/>
		<reference ref_id="1191315" ref_url="https://bugzilla.suse.com/1191315" source="BUGZILLA"/>
		<reference ref_id="1191790" ref_url="https://bugzilla.suse.com/1191790" source="BUGZILLA"/>
		<reference ref_id="1191801" ref_url="https://bugzilla.suse.com/1191801" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1191961" ref_url="https://bugzilla.suse.com/1191961" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192400" ref_url="https://bugzilla.suse.com/1192400" source="BUGZILLA"/>
		<reference ref_id="1192775" ref_url="https://bugzilla.suse.com/1192775" source="BUGZILLA"/>
		<reference ref_id="1192781" ref_url="https://bugzilla.suse.com/1192781" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17862" ref_url="https://www.suse.com/security/cve/CVE-2017-17862/" source="CVE"/>
		<reference ref_id="CVE-2017-17864" ref_url="https://www.suse.com/security/cve/CVE-2017-17864/" source="CVE"/>
		<reference ref_id="CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405/" source="CVE"/>
		<reference ref_id="CVE-2018-16882" ref_url="https://www.suse.com/security/cve/CVE-2018-16882/" source="CVE"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-12655" ref_url="https://www.suse.com/security/cve/CVE-2020-12655/" source="CVE"/>
		<reference ref_id="CVE-2020-14305" ref_url="https://www.suse.com/security/cve/CVE-2020-14305/" source="CVE"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<reference ref_id="CVE-2021-20265" ref_url="https://www.suse.com/security/cve/CVE-2021-20265/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="CVE-2021-31916" ref_url="https://www.suse.com/security/cve/CVE-2021-31916/" source="CVE"/>
		<reference ref_id="CVE-2021-33033" ref_url="https://www.suse.com/security/cve/CVE-2021-33033/" source="CVE"/>
		<reference ref_id="CVE-2021-34556" ref_url="https://www.suse.com/security/cve/CVE-2021-34556/" source="CVE"/>
		<reference ref_id="CVE-2021-34981" ref_url="https://www.suse.com/security/cve/CVE-2021-34981/" source="CVE"/>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<reference ref_id="CVE-2021-35477" ref_url="https://www.suse.com/security/cve/CVE-2021-35477/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655/" source="CVE"/>
		<reference ref_id="CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159/" source="CVE"/>
		<reference ref_id="CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="CVE-2021-3760" ref_url="https://www.suse.com/security/cve/CVE-2021-3760/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="CVE-2021-38204" ref_url="https://www.suse.com/security/cve/CVE-2021-38204/" source="CVE"/>
		<reference ref_id="CVE-2021-3896" ref_url="https://www.suse.com/security/cve/CVE-2021-3896/" source="CVE"/>
		<reference ref_id="CVE-2021-40490" ref_url="https://www.suse.com/security/cve/CVE-2021-40490/" source="CVE"/>
		<reference ref_id="CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)

  You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails  (bsc#1191961).
- CVE-2020-12655: An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767 (bnc#1171217).
- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).
- CVE-2021-34556: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack (bnc#1188983).
- CVE-2021-35477: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation did not necessarily occur before a store operation that has an attacker-controlled value (bnc#1188985).
- CVE-2017-17862: kernel/bpf/verifier.c in the Linux kernel ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service (bnc#1073928).
- CVE-2017-17864: kernel/bpf/verifier.c in the Linux kernel mishandled states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allowed local users to obtain potentially sensitive address information, aka a 'pointer leak (bnc#1073928).
- CVE-2021-20265: A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allowed an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability (bnc#1183089).
- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
- CVE-2021-3655: Missing size validations on inbound SCTP packets may have allowed the kernel to read uninitialized memory (bnc#1188563).
- CVE-2018-13405: The inode_init_owner function in fs/inode.c in the Linux kernel allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416 bnc#1129735).
- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-&gt;rf_conn_info object (bsc#1190067).
- CVE-2021-42739: The firewire subsystem in the Linux kernel has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bnc#1184673).
- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).
- CVE-2021-33033: The Linux kernel has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value (bnc#1186109 bnc#1186390 bnc#1188876).
- CVE-2020-14305: An out-of-bounds memory write flaw was found in how the Linux kernel&amp;#8217;s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allowed an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability (bnc#1173346).
- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).
- CVE-2021-3896: Fixed a array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (bsc#1191958).
- CVE-2021-42008: The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access (bnc#1191315).
- CVE-2020-3702: Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic (bnc#1191193).
- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel's bluetooth module. (bsc#1190023)
- CVE-2021-40490: A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel (bnc#1190159 bnc#1192775)
- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)
- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).
- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).
- CVE-2021-3653: A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the 'int_ctl' field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7 (bnc#1189399 bnc#1189420).
- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262 bnc#1189278).
- CVE-2021-38204: drivers/usb/host/max3421-hcd.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).
- CVE-2021-3679: A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).
- CVE-2018-16882: A use-after-free issue was found in the way the Linux kernel's KVM hypervisor processed posted interrupts when nested(=1) virtualization is enabled. In nested_get_vmcs12_pages(), in case of an error while processing posted interrupt address, it unmaps the 'pi_desc_page' without resetting 'pi_desc' descriptor address, which is later used in pi_test_and_clear_on(). A guest user/process could use this flaw to crash the host kernel resulting in DoS or potentially gain privileged access to a system. Kernel versions and are vulnerable (bnc#1119934).
- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1176724).
- CVE-2020-4788: IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296 (bnc#1177666 bnc#1181158).
- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).
- CVE-2021-37576: arch/powerpc/kvm/book3s_rtas.c in the Linux kernel on the powerpc platform allowed KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e (bnc#1188838).

The following non-security bugs were fixed:

- PCI: hv: Use expected affinity when unmasking IRQ (bsc#1185973).
- SUNRPC: improve error response to over-size gss credential (bsc#1190022).
- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
- blacklist.conf: Drop a line that was added by mistake
- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22918)
- bpf: Disallow unprivileged bpf by default (jsc#SLE-22918).
- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).
- config: disable unprivileged BPF by default (jsc#SLE-22918)
- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758,bsc#1192400).
- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).
- hv: mana: adjust mana_select_queue to old API (jsc#SLE-18779, bsc#1185727).
- hv: mana: declare vzalloc (jsc#SLE-18779, bsc#1185726).
- hv: mana: fake bitmap API (jsc#SLE-18779, bsc#1185726).
- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185727).
- kABI: protect struct bpf_map (kabi).
- mm: replace open coded page to virt conversion with page_to_virt() (jsc#SLE-18779, bsc#1185727).
- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854 bsc#1181855).
- net/mlx4_en: Handle TX error CQE (bsc#1181854 bsc#1181855).
- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185727).
- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185727).
- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185727).
- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185727).
- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191801).
- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185727).
- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185727).
- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185727).
- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185727).
- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (bsc#1190601).
- s390/bpf: Fix branch shortening during codegen pass (bsc#1190601).
- s390/bpf: Fix optimizing out zero-extensions (bsc#1190601).
- s390/bpf: Wrap JIT macro parameter usages in parentheses (bsc#1190601).
- s390: bpf: implement jitting of BPF_ALU | BPF_ARSH | BPF_* (bsc#1190601).
- scsi: sg: add sg_remove_request in sg_write (bsc#1171420 CVE2020-12770).
- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).
- sctp: fully initialize v4 addr in some functions (bsc#1188563).
- sctp: simplify addr copy (bsc#1188563).
- x86/CPU: Add more Icelake model numbers (bsc#1185758,bsc#1192400).
- x86/tlb: Flush global mappings when KAISER is disabled (bsc#1190194).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073928">SUSE bug 1073928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098425">SUSE bug 1098425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100416">SUSE bug 1100416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119934">SUSE bug 1119934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129735">SUSE bug 1129735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171217">SUSE bug 1171217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171420">SUSE bug 1171420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173346">SUSE bug 1173346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176724">SUSE bug 1176724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181854">SUSE bug 1181854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181855">SUSE bug 1181855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183089">SUSE bug 1183089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185727">SUSE bug 1185727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185758">SUSE bug 1185758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185973">SUSE bug 1185973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186109">SUSE bug 1186109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186390">SUSE bug 1186390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188838">SUSE bug 1188838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188983">SUSE bug 1188983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188985">SUSE bug 1188985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189291">SUSE bug 1189291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189706">SUSE bug 1189706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190022">SUSE bug 1190022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190023">SUSE bug 1190023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190067">SUSE bug 1190067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190159">SUSE bug 1190159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190194">SUSE bug 1190194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190349">SUSE bug 1190349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190601">SUSE bug 1190601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190717">SUSE bug 1190717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191193">SUSE bug 1191193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191801">SUSE bug 1191801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191961">SUSE bug 1191961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192400">SUSE bug 1192400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192775">SUSE bug 1192775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192781">SUSE bug 1192781</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17862/">CVE-2017-17862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17862">CVE-2017-17862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17864/">CVE-2017-17864 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17864">CVE-2017-17864 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13405">CVE-2018-13405 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16882/">CVE-2018-16882 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16882">CVE-2018-16882 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12655/">CVE-2020-12655 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12655">CVE-2020-12655 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14305/">CVE-2020-14305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14305">CVE-2020-14305 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3702">CVE-2020-3702 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4788">CVE-2020-4788 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20265/">CVE-2021-20265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20265">CVE-2021-20265 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20322">CVE-2021-20322 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31916/">CVE-2021-31916 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31916">CVE-2021-31916 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33033/">CVE-2021-33033 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33033">CVE-2021-33033 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34556/">CVE-2021-34556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34556">CVE-2021-34556 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34981/">CVE-2021-34981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-34981">CVE-2021-34981 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3542">CVE-2021-3542 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35477/">CVE-2021-35477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35477">CVE-2021-35477 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3655">CVE-2021-3655 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3659">CVE-2021-3659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3679">CVE-2021-3679 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3715">CVE-2021-3715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37159">CVE-2021-37159 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3732">CVE-2021-3732 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3752">CVE-2021-3752 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3753">CVE-2021-3753 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3760/">CVE-2021-3760 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3760">CVE-2021-3760 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3772">CVE-2021-3772 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160">CVE-2021-38160 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38204/">CVE-2021-38204 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38204">CVE-2021-38204 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3896/">CVE-2021-3896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3896">CVE-2021-3896 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40490/">CVE-2021-40490 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40490">CVE-2021-40490 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42008">CVE-2021-42008 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43389">CVE-2021-43389 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657875" comment="kernel-default-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657876" comment="kernel-default-base-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657877" comment="kernel-default-devel-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657858" comment="kernel-devel-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657859" comment="kernel-macros-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657860" comment="kernel-source-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657878" comment="kernel-syms-4.4.180-94.150.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150912" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1193170" ref_url="https://bugzilla.suse.com/1193170" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009847.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Update to version 3.68.1:

- CVE-2021-43527: Fixed a Heap overflow in NSS when verifying DER-encoded DSA or RSA-PSS signatures (bsc#1193170).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659103" comment="libfreebl3-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659086" comment="libfreebl3-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659104" comment="libfreebl3-hmac-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659088" comment="libfreebl3-hmac-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659105" comment="libsoftokn3-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659090" comment="libsoftokn3-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659106" comment="libsoftokn3-hmac-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659092" comment="libsoftokn3-hmac-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659107" comment="mozilla-nss-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659094" comment="mozilla-nss-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659108" comment="mozilla-nss-certs-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659096" comment="mozilla-nss-certs-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659109" comment="mozilla-nss-sysinit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659099" comment="mozilla-nss-sysinit-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659110" comment="mozilla-nss-tools-3.68.1-58.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150913" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1190975" ref_url="https://bugzilla.suse.com/1190975" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009848.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:
  
- CVE-2021-41617: Fixed privilege escalation when AuthorizedKeysCommand/AuthorizedPrincipalsCommand are configured (bsc#1190975).  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190975">SUSE bug 1190975</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41617">CVE-2021-41617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658348" comment="openssh-7.2p2-74.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658349" comment="openssh-askpass-gnome-7.2p2-74.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658350" comment="openssh-fips-7.2p2-74.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658351" comment="openssh-helpers-7.2p2-74.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150914" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1193321" ref_url="https://bugzilla.suse.com/1193321" source="BUGZILLA"/>
		<reference ref_id="1193485" ref_url="https://bugzilla.suse.com/1193485" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:
                                                                                                                    
Update to Extended Support Release 91.4.0 (bsc#1193485):                                                            
                                                                                                                    
- CVE-2021-43536: URL leakage when navigating while executing asynchronous function
- CVE-2021-43537: Heap buffer overflow when using structured clone                         
- CVE-2021-43538: Missing fullscreen and pointer lock notification when requesting both
- CVE-2021-43539: GC rooting failure when calling wasm instance methods 
- CVE-2021-43541: External protocol handler parameters were unescaped                                                  
- CVE-2021-43542: XMLHttpRequest error codes could have leaked the existence of an external protocol handler           
- CVE-2021-43543: Bypass of CSP sandbox directive when embedding                                                       
- CVE-2021-43545: Denial of Service when using the Location API in a loop                                              
- CVE-2021-43546: Cursor spoofing could overlay user interface when native cursor is zoomed                         
- Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4                                                       
- Removed x-scheme-handler/ftp from MozillaFirefox.desktop (bsc#1193321)                                            
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-12"/>
	<updated date="2021-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193321">SUSE bug 1193321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43536">CVE-2021-43536 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43537">CVE-2021-43537 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43538">CVE-2021-43538 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43539">CVE-2021-43539 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43541">CVE-2021-43541 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43542">CVE-2021-43542 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43543">CVE-2021-43543 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43545">CVE-2021-43545 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43546">CVE-2021-43546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659444" comment="MozillaFirefox-91.4.0-112.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659445" comment="MozillaFirefox-devel-91.4.0-112.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659446" comment="MozillaFirefox-translations-common-91.4.0-112.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150915" version="1" class="patch">
	<metadata>
		<title>Security update for glib-networking (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1172460" ref_url="https://bugzilla.suse.com/1172460" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13645" ref_url="https://www.suse.com/security/cve/CVE-2020-13645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009886.html" source="SUSE-SU"/>
		<description>
This update for glib-networking fixes the following issues:

- CVE-2020-13645: Fixed a connection failure when the server identity is unset (bsc#1172460).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-13"/>
	<updated date="2021-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172460">SUSE bug 1172460</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13645/">CVE-2020-13645 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13645">CVE-2020-13645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659102" comment="glib-networking-2.48.2-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659084" comment="glib-networking-lang-2.48.2-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150916" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1193030" ref_url="https://bugzilla.suse.com/1193030" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009903.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:
 
- CVE-2021-4008: Fixed Privilege Escalation Vulnerability via Out-Of-Bounds Access in SProcRenderCompositeGlyphs (bsc#1193030).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193030">SUSE bug 1193030</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4008">CVE-2021-4008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659889" comment="xorg-x11-server-7.6_1.18.3-76.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659890" comment="xorg-x11-server-extra-7.6_1.18.3-76.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150917" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009918.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issue:

- CVE-2021-4104: Disable the JMSAppender class from log4j to protect against
  the log4jshell vulnerability. [bsc#1193662]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-17"/>
	<updated date="2021-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">CVE-2021-4104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660148" comment="log4j-1.2.15-126.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150918" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1190487" ref_url="https://bugzilla.suse.com/1190487" source="BUGZILLA"/>
		<reference ref_id="1190489" ref_url="https://bugzilla.suse.com/1190489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009/" source="CVE"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009920.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4009: The handler for the CreatePointerBarrier request of the XFixes 
  extension does not properly validate the request length leading to out of 
  bounds memory write. (bsc#1190487)
- CVE-2021-4011: The handlers for the RecordCreateContext and RecordRegisterClients
  requests of the Record extension do not properly validate the request
  length leading to out of bounds memory write. (bsc#1190489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-20"/>
	<updated date="2021-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190487">SUSE bug 1190487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4009">CVE-2021-4009 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4011">CVE-2021-4011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660798" comment="xorg-x11-server-7.6_1.18.3-76.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660799" comment="xorg-x11-server-extra-7.6_1.18.3-76.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150919" version="1" class="patch">
	<metadata>
		<title>Recommended update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1192849" ref_url="https://bugzilla.suse.com/1192849" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<reference ref_id="SUSE-RU-2021:4126-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021140.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

The username map advice from the CVE-2020-25717 advisory
note has undesired side effects for the local nt token. Fallback
to a SID/UID based mapping if the name based lookup fails (bsc#1192849).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-20"/>
	<updated date="2021-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192849">SUSE bug 1192849</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25717">CVE-2020-25717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660811" comment="libdcerpc-binding0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660812" comment="libdcerpc-binding0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660813" comment="libdcerpc0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660814" comment="libdcerpc0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660815" comment="libndr-krb5pac0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660816" comment="libndr-krb5pac0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660817" comment="libndr-nbt0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660818" comment="libndr-nbt0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660819" comment="libndr-standard0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660820" comment="libndr-standard0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660821" comment="libndr0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660822" comment="libndr0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660823" comment="libnetapi0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660824" comment="libnetapi0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660825" comment="libsamba-credentials0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660826" comment="libsamba-credentials0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660827" comment="libsamba-errors0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660828" comment="libsamba-errors0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660829" comment="libsamba-hostconfig0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660830" comment="libsamba-hostconfig0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660831" comment="libsamba-passdb0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660832" comment="libsamba-passdb0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660833" comment="libsamba-util0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660834" comment="libsamba-util0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660835" comment="libsamdb0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660836" comment="libsamdb0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660837" comment="libsmbclient0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660838" comment="libsmbclient0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660839" comment="libsmbconf0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660840" comment="libsmbconf0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660841" comment="libsmbldap0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660842" comment="libsmbldap0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660843" comment="libtevent-util0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660844" comment="libtevent-util0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660845" comment="libwbclient0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660846" comment="libwbclient0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660847" comment="samba-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660848" comment="samba-client-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660849" comment="samba-client-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660850" comment="samba-doc-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660851" comment="samba-libs-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660852" comment="samba-libs-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660853" comment="samba-winbind-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660854" comment="samba-winbind-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150920" version="1" class="patch">
	<metadata>
		<title>Security update for chrony (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1063704" ref_url="https://bugzilla.suse.com/1063704" source="BUGZILLA"/>
		<reference ref_id="1069468" ref_url="https://bugzilla.suse.com/1069468" source="BUGZILLA"/>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1083597" ref_url="https://bugzilla.suse.com/1083597" source="BUGZILLA"/>
		<reference ref_id="1099272" ref_url="https://bugzilla.suse.com/1099272" source="BUGZILLA"/>
		<reference ref_id="1115529" ref_url="https://bugzilla.suse.com/1115529" source="BUGZILLA"/>
		<reference ref_id="1128846" ref_url="https://bugzilla.suse.com/1128846" source="BUGZILLA"/>
		<reference ref_id="1156884" ref_url="https://bugzilla.suse.com/1156884" source="BUGZILLA"/>
		<reference ref_id="1159840" ref_url="https://bugzilla.suse.com/1159840" source="BUGZILLA"/>
		<reference ref_id="1161119" ref_url="https://bugzilla.suse.com/1161119" source="BUGZILLA"/>
		<reference ref_id="1162964" ref_url="https://bugzilla.suse.com/1162964" source="BUGZILLA"/>
		<reference ref_id="1171806" ref_url="https://bugzilla.suse.com/1171806" source="BUGZILLA"/>
		<reference ref_id="1172113" ref_url="https://bugzilla.suse.com/1172113" source="BUGZILLA"/>
		<reference ref_id="1173277" ref_url="https://bugzilla.suse.com/1173277" source="BUGZILLA"/>
		<reference ref_id="1173760" ref_url="https://bugzilla.suse.com/1173760" source="BUGZILLA"/>
		<reference ref_id="1174075" ref_url="https://bugzilla.suse.com/1174075" source="BUGZILLA"/>
		<reference ref_id="1174911" ref_url="https://bugzilla.suse.com/1174911" source="BUGZILLA"/>
		<reference ref_id="1180689" ref_url="https://bugzilla.suse.com/1180689" source="BUGZILLA"/>
		<reference ref_id="1181826" ref_url="https://bugzilla.suse.com/1181826" source="BUGZILLA"/>
		<reference ref_id="1183783" ref_url="https://bugzilla.suse.com/1183783" source="BUGZILLA"/>
		<reference ref_id="1184400" ref_url="https://bugzilla.suse.com/1184400" source="BUGZILLA"/>
		<reference ref_id="1187906" ref_url="https://bugzilla.suse.com/1187906" source="BUGZILLA"/>
		<reference ref_id="1190926" ref_url="https://bugzilla.suse.com/1190926" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14367" ref_url="https://www.suse.com/security/cve/CVE-2020-14367/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009931.html" source="SUSE-SU"/>
		<description>
This update for chrony fixes the following issues:

Chrony was updated to 4.1:

* Add support for NTS servers specified by IP address (matching
  Subject Alternative Name in server certificate)
* Add source-specific configuration of trusted certificates
* Allow multiple files and directories with trusted certificates
* Allow multiple pairs of server keys and certificates
* Add copy option to server/pool directive
* Increase PPS lock limit to 40% of pulse interval
* Perform source selection immediately after loading dump files
* Reload dump files for addresses negotiated by NTS-KE server
* Update seccomp filter and add less restrictive level
* Restart ongoing name resolution on online command
* Fix dump files to not include uncorrected offset
* Fix initstepslew to accept time from own NTP clients
* Reset NTP address and port when no longer negotiated by NTS-KE
  server
- Update clknetsim to snapshot f89702d.

- Ensure the correct pool packages are installed for openSUSE and SLE (bsc#1180689).

- Enable syscallfilter unconditionally (bsc#1181826).

Chrony was updated to 4.0:

Enhancements

- Add support for Network Time Security (NTS) authentication
- Add support for AES-CMAC keys (AES128, AES256) with Nettle
- Add authselectmode directive to control selection of
  unauthenticated sources
- Add binddevice, bindacqdevice, bindcmddevice directives
- Add confdir directive to better support fragmented
  configuration
- Add sourcedir directive and 'reload sources' command to
  support dynamic NTP sources specified in files
- Add clockprecision directive
- Add dscp directive to set Differentiated Services Code Point
  (DSCP)
- Add -L option to limit log messages by severity
- Add -p option to print whole configuration with included
  files
- Add -U option to allow start under non-root user
- Allow maxsamples to be set to 1 for faster update with -q/-Q
  option
- Avoid replacing NTP sources with sources that have
  unreachable address
- Improve pools to repeat name resolution to get 'maxsources'
  sources
- Improve source selection with trusted sources
- Improve NTP loop test to prevent synchronisation to itself
- Repeat iburst when NTP source is switched from offline state
  to online
- Update clock synchronisation status and leap status more
  frequently
- Update seccomp filter
- Add 'add pool' command
- Add 'reset sources' command to drop all measurements
- Add authdata command to print details about NTP
  authentication
- Add selectdata command to print details about source
  selection
- Add -N option and sourcename command to print original names
  of sources
- Add -a option to some commands to print also unresolved
  sources
- Add -k, -p, -r options to clients command to select, limit,
  reset data
- Bug fixes
- Don’t set interface for NTP responses to allow asymmetric
  routing
- Handle RTCs that don’t support interrupts
- Respond to command requests with correct address on
  multihomed hosts
- Removed features
- Drop support for RIPEMD keys (RMD128, RMD160, RMD256, RMD320)
- Drop support for long (non-standard) MACs in NTPv4 packets
  (chrony 2.x clients using non-MD5/SHA1 keys need to use
  option 'version 3')

- By default we don't write log files but log to journald, so
  only recommend logrotate.

- Adjust and rename the sysconfig file, so that it matches the
  expectations of chronyd.service (bsc#1173277).

Chrony was updated to 3.5.1:

* Create new file when writing pidfile (CVE-2020-14367, bsc#1174911)

- Add chrony-pool-suse and chrony-pool-openSUSE subpackages that
  preconfigure chrony to use NTP servers from the  respective
  pools for SUSE and openSUSE (bsc#1156884, SLE-11424).
- Add chrony-pool-empty to still allow installing chrony without
  preconfigured servers.
- Use iburst in the default pool statements to speed up initial
  synchronisation (bsc#1172113).

- Update clknetsim to version 79ffe44 (fixes bsc#1162964).

Update to 3.5:

+ Add support for more accurate reading of PHC on Linux 5.0
+ Add support for hardware timestamping on interfaces with read-only timestamping configuration
+ Add support for memory locking and real-time priority on FreeBSD, NetBSD, Solaris
+ Update seccomp filter to work on more architectures
+ Validate refclock driver options
+ Fix bindaddress directive on FreeBSD
+ Fix transposition of hardware RX timestamp on Linux 4.13 and later
+ Fix building on non-glibc systems

- Fix location of helper script in chrony-dnssrv@.service (bsc#1128846).

- Read runtime servers from /var/run/netconfig/chrony.servers (bsc#1099272)
- Move chrony-helper to /usr/lib/chrony/helper, because there should be no executables in /usr/share.
- Remove discrepancies between spec file and chrony-tmpfiles (bsc#1115529) 

Update to version 3.4

* Enhancements

  + Add filter option to server/pool/peer directive
  + Add minsamples and maxsamples options to hwtimestamp directive
  + Add support for faster frequency adjustments in Linux 4.19
  + Change default pidfile to /var/run/chrony/chronyd.pid to allow chronyd 
    without root privileges to remove it on exit
  + Disable sub-second polling intervals for distant NTP sources
  + Extend range of supported sub-second polling intervals
  + Get/set IPv4 destination/source address of NTP packets on FreeBSD
  + Make burst options and command useful with short polling intervals
  + Modify auto_offline option to activate when sending request failed
  + Respond from interface that received NTP request if possible
  + Add onoffline command to switch between online and offline state 
    according to current system network configuration
  + Improve example NetworkManager dispatcher script

* Bug fixes

  + Avoid waiting in Linux getrandom system call
  + Fix PPS support on FreeBSD and NetBSD

Update to version 3.3

* Enhancements:

  + Add burst option to server/pool directive
  + Add stratum and tai options to refclock directive
  + Add support for Nettle crypto library
  + Add workaround for missing kernel receive timestamps on Linux
  + Wait for late hardware transmit timestamps
  + Improve source selection with unreachable sources
  + Improve protection against replay attacks on symmetric mode
  + Allow PHC refclock to use socket in /var/run/chrony
  + Add shutdown command to stop chronyd
  + Simplify format of response to manual list command
  + Improve handling of unknown responses in chronyc

* Bug fixes:

  + Respond to NTPv1 client requests with zero mode
  + Fix -x option to not require CAP_SYS_TIME under non-root user
  + Fix acquisitionport directive to work with privilege separation
  + Fix handling of socket errors on Linux to avoid high CPU usage
  + Fix chronyc to not get stuck in infinite loop after clock step

- Added /etc/chrony.d/ directory to the package (bsc#1083597) Modifed default chrony.conf to add 'include /etc/chrony.d/*'

- Enable pps support

Upgraded to version 3.2:

Enhancements

* Improve stability with NTP sources and reference clocks
* Improve stability with hardware timestamping
* Improve support for NTP interleaved modes
* Control frequency of system clock on macOS 10.13 and later
* Set TAI-UTC offset of system clock with leapsectz directive
* Minimise data in client requests to improve privacy
* Allow transmit-only hardware timestamping
* Add support for new timestamping options introduced in Linux 4.13
* Add root delay, root dispersion and maximum error to tracking log
* Add mindelay and asymmetry options to server/peer/pool directive
* Add extpps option to PHC refclock to timestamp external PPS signal
* Add pps option to refclock directive to treat any refclock as PPS
* Add width option to refclock directive to filter wrong pulse edges
* Add rxfilter option to hwtimestamp directive
* Add -x option to disable control of system clock
* Add -l option to log to specified file instead of syslog
* Allow multiple command-line options to be specified together
* Allow starting without root privileges with -Q option
* Update seccomp filter for new glibc versions
* Dump history on exit by default with dumpdir directive
* Use hardening compiler options by default

Bug fixes

* Don't drop PHC samples with low-resolution system clock
* Ignore outliers in PHC tracking, RTC tracking, manual input
* Increase polling interval when peer is not responding
* Exit with error message when include directive fails
* Don't allow slash after hostname in allow/deny directive/command
* Try to connect to all addresses in chronyc before giving up

Upgraded to version 3.1:

- Enhancements

  - Add support for precise cross timestamping of PHC on Linux
  - Add minpoll, precision, nocrossts options to hwtimestamp directive
  - Add rawmeasurements option to log directive and modify measurements
    option to log only valid measurements from synchronised sources
  - Allow sub-second polling interval with NTP sources

- Bug fixes

  - Fix time smoothing in interleaved mode

Upgraded to version 3.0:

- Enhancements

  - Add support for software and hardware timestamping on Linux
  - Add support for client/server and symmetric interleaved modes
  - Add support for MS-SNTP authentication in Samba
  - Add support for truncated MACs in NTPv4 packets
  - Estimate and correct for asymmetric network jitter
  - Increase default minsamples and polltarget to improve stability with very low jitter
  - Add maxjitter directive to limit source selection by jitter
  - Add offset option to server/pool/peer directive
  - Add maxlockage option to refclock directive
  - Add -t option to chronyd to exit after specified time
  - Add partial protection against replay attacks on symmetric mode
  - Don't reset polling interval when switching sources to online state
  - Allow rate limiting with very short intervals
  - Improve maximum server throughput on Linux and NetBSD
  - Remove dump files after start
  - Add tab-completion to chronyc with libedit/readline
  - Add ntpdata command to print details about NTP measurements
  - Allow all source options to be set in add server/peer command
  - Indicate truncated addresses/hostnames in chronyc output
  - Print reference IDs as hexadecimal numbers to avoid confusion with IPv4 addresses

- Bug fixes

  - Fix crash with disabled asynchronous name resolving

Upgraded to version 2.4.1:

- Bug fixes

  - Fix processing of kernel timestamps on non-Linux systems
  - Fix crash with smoothtime directive
  - Fix validation of refclock sample times
  - Fix parsing of refclock directive

update to 2.4:

- Enhancements

  - Add orphan option to local directive for orphan mode
    compatible with ntpd
  - Add distance option to local directive to set activation
    threshold (1 second by default)
  - Add maxdrift directive to set maximum allowed drift of system
    clock
  - Try to replace NTP sources exceeding maximum distance
  - Randomise source replacement to avoid getting stuck with bad
    sources
  - Randomise selection of sources from pools on start
  - Ignore reference timestamp as ntpd doesn't always set it
    correctly
  - Modify tracking report to use same values as seen by NTP
    clients
  - Add -c option to chronyc to write reports in CSV format
  - Provide detailed manual pages

- Bug fixes

  - Fix SOCK refclock to work correctly when not specified as
    last refclock
  - Fix initstepslew and -q/-Q options to accept time from own
    NTP clients
  - Fix authentication with keys using 512-bit hash functions
  - Fix crash on exit when multiple signals are received
  - Fix conversion of very small floating-point numbers in
    command packets
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1063704">SUSE bug 1063704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069468">SUSE bug 1069468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083597">SUSE bug 1083597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099272">SUSE bug 1099272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115529">SUSE bug 1115529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128846">SUSE bug 1128846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156884">SUSE bug 1156884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159840">SUSE bug 1159840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161119">SUSE bug 1161119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162964">SUSE bug 1162964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171806">SUSE bug 1171806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172113">SUSE bug 1172113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173277">SUSE bug 1173277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173760">SUSE bug 1173760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174075">SUSE bug 1174075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174911">SUSE bug 1174911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180689">SUSE bug 1180689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181826">SUSE bug 1181826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183783">SUSE bug 1183783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184400">SUSE bug 1184400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187906">SUSE bug 1187906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190926">SUSE bug 1190926</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14367/">CVE-2020-14367 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14367">CVE-2020-14367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659981" comment="chrony-4.1-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150921" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008310.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- buffer overflow in PyCArg_repr in _ctypes/callproc.c,
  which may lead to remote code execution (bsc#1181126, CVE-2021-3177).
- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-11"/>
	<updated date="2021-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531872" comment="libpython2_7-1_0-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531873" comment="libpython2_7-1_0-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531874" comment="python-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531875" comment="python-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531876" comment="python-base-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531877" comment="python-base-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531878" comment="python-curses-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531879" comment="python-demo-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531880" comment="python-devel-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531881" comment="python-doc-2.7.17-28.64.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531882" comment="python-doc-pdf-2.7.17-28.64.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531883" comment="python-gdbm-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531884" comment="python-idle-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531885" comment="python-tk-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531886" comment="python-xml-2.7.17-28.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150922" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1181742" ref_url="https://bugzilla.suse.com/1181742" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35498" ref_url="https://www.suse.com/security/cve/CVE-2020-35498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008320.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2020-35498: Fixed a denial of service related to the handling of Ethernet padding (bsc#1181742).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-12"/>
	<updated date="2021-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181742">SUSE bug 1181742</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35498/">CVE-2020-35498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35498">CVE-2020-35498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555936" comment="openvswitch-2.7.12-3.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150923" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1105322" ref_url="https://bugzilla.suse.com/1105322" source="BUGZILLA"/>
		<reference ref_id="1105323" ref_url="https://bugzilla.suse.com/1105323" source="BUGZILLA"/>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1168952" ref_url="https://bugzilla.suse.com/1168952" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1175306" ref_url="https://bugzilla.suse.com/1175306" source="BUGZILLA"/>
		<reference ref_id="1176395" ref_url="https://bugzilla.suse.com/1176395" source="BUGZILLA"/>
		<reference ref_id="1176485" ref_url="https://bugzilla.suse.com/1176485" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1178182" ref_url="https://bugzilla.suse.com/1178182" source="BUGZILLA"/>
		<reference ref_id="1178272" ref_url="https://bugzilla.suse.com/1178272" source="BUGZILLA"/>
		<reference ref_id="1178589" ref_url="https://bugzilla.suse.com/1178589" source="BUGZILLA"/>
		<reference ref_id="1178886" ref_url="https://bugzilla.suse.com/1178886" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179140" ref_url="https://bugzilla.suse.com/1179140" source="BUGZILLA"/>
		<reference ref_id="1179141" ref_url="https://bugzilla.suse.com/1179141" source="BUGZILLA"/>
		<reference ref_id="1179204" ref_url="https://bugzilla.suse.com/1179204" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179508" ref_url="https://bugzilla.suse.com/1179508" source="BUGZILLA"/>
		<reference ref_id="1179509" ref_url="https://bugzilla.suse.com/1179509" source="BUGZILLA"/>
		<reference ref_id="1179601" ref_url="https://bugzilla.suse.com/1179601" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1179663" ref_url="https://bugzilla.suse.com/1179663" source="BUGZILLA"/>
		<reference ref_id="1179666" ref_url="https://bugzilla.suse.com/1179666" source="BUGZILLA"/>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1179878" ref_url="https://bugzilla.suse.com/1179878" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1179961" ref_url="https://bugzilla.suse.com/1179961" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180027" ref_url="https://bugzilla.suse.com/1180027" source="BUGZILLA"/>
		<reference ref_id="1180028" ref_url="https://bugzilla.suse.com/1180028" source="BUGZILLA"/>
		<reference ref_id="1180029" ref_url="https://bugzilla.suse.com/1180029" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180031" ref_url="https://bugzilla.suse.com/1180031" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180052" ref_url="https://bugzilla.suse.com/1180052" source="BUGZILLA"/>
		<reference ref_id="1180086" ref_url="https://bugzilla.suse.com/1180086" source="BUGZILLA"/>
		<reference ref_id="1180559" ref_url="https://bugzilla.suse.com/1180559" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="1180815" ref_url="https://bugzilla.suse.com/1180815" source="BUGZILLA"/>
		<reference ref_id="1181096" ref_url="https://bugzilla.suse.com/1181096" source="BUGZILLA"/>
		<reference ref_id="1181158" ref_url="https://bugzilla.suse.com/1181158" source="BUGZILLA"/>
		<reference ref_id="1181349" ref_url="https://bugzilla.suse.com/1181349" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="969755" ref_url="https://bugzilla.suse.com/969755" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2019-20934" ref_url="https://www.suse.com/security/cve/CVE-2019-20934/" source="CVE"/>
		<reference ref_id="CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444/" source="CVE"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2020-27835" ref_url="https://www.suse.com/security/cve/CVE-2020-27835/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2020-25211: Fixed a buffer overflow in ctnetlink_parse_tuple_filter() which could be triggered by a local attackers by injecting conntrack netlink configuration (bnc#1176395).
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation (bnc#1105322).

The following non-security bugs were fixed:

- cifs: do not revalidate mountpoint dentries (bsc#1177440).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: ignore revalidate failures in case of process gets signaled (bsc#1177440).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- futex: Avoid freeing an active timer (bsc#969755).
- futex: Avoid violating the 10th rule of futex (bsc#969755).
- futex: Change locking rules (bsc#969755).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#969755).
- futex: Drop hb-&gt;lock before enqueueing on the rtmutex (bsc#969755).
- futex: Fix incorrect should_fail_futex() handling (bsc#969755).
- futex: Fix more put_pi_state() vs. exit_pi_state_list() races (bsc#969755).
- futex: Fix OWNER_DEAD fixup (bsc#969755).
- futex: Fix pi_state-&gt;owner serialization (bsc#969755).
- futex: Fix small (and harmless looking) inconsistencies (bsc#969755).
- futex: Futex_unlock_pi() determinism (bsc#969755).
- futex: Handle early deadlock return correctly (bsc#969755).
- futex: Handle transient 'ownerless' rtmutex state correctly (bsc#969755).
- futex: Pull rt_mutex_futex_unlock() out from under hb-&gt;lock (bsc#969755).
- futex: Rework futex_lock_pi() to use rt_mutex_*_proxy_lock() (bsc#969755).
- futex: Rework inconsistent rt_mutex/futex_q state (bsc#969755).
- futex,rt_mutex: Fix rt_mutex_cleanup_proxy_lock() (bsc#969755).
- futex,rt_mutex: Introduce rt_mutex_init_waiter() (bsc#969755).
- futex,rt_mutex: Provide futex specific rt_mutex API (bsc#969755).
- futex,rt_mutex: Restructure rt_mutex_finish_proxy_lock() (bsc#969755).
- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- IB/hfi1: Clean up hfi1_user_exp_rcv_setup function (bsc#1179878).
- IB/hfi1: Clean up pin_vector_pages() function (bsc#1179878).
- IB/hfi1: Fix the bail out code in pin_vector_pages() function (bsc#1179878).
- IB/hfi1: Move structure definitions from user_exp_rcv.c to user_exp_rcv.h (bsc#1179878).
- IB/hfi1: Name function prototype parameters (bsc#1179878).
- IB/hfi1: Use filedata rather than filepointer (bsc#1179878).
- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#969755).
- mm/userfaultfd: do not access vma-&gt;vm_mm after calling handle_userfault() (bsc#1179204).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1178272).
- Use r3 instead of r13 for l1d fallback flush in do_uaccess_fush (bsc#1181096 ltc#190883).
- video: hyperv_fb: include vmalloc.h (bsc#1175306).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-12"/>
	<updated date="2021-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175306">SUSE bug 1175306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178272">SUSE bug 1178272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179204">SUSE bug 1179204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179508">SUSE bug 1179508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179509">SUSE bug 1179509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179663">SUSE bug 1179663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179666">SUSE bug 1179666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179878">SUSE bug 1179878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179961">SUSE bug 1179961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180027">SUSE bug 1180027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180028">SUSE bug 1180028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180031">SUSE bug 1180031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180052">SUSE bug 1180052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180815">SUSE bug 1180815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181096">SUSE bug 1181096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969755">SUSE bug 969755</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10902">CVE-2018-10902 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20934/">CVE-2019-20934 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20934">CVE-2019-20934 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0444">CVE-2020-0444 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15436">CVE-2020-15436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15437">CVE-2020-15437 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25211">CVE-2020-25211 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25285">CVE-2020-25285 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25669">CVE-2020-25669 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27068">CVE-2020-27068 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27777">CVE-2020-27777 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27825">CVE-2020-27825 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27835/">CVE-2020-27835 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27835">CVE-2020-27835 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28915">CVE-2020-28915 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28974">CVE-2020-28974 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29568">CVE-2020-29568 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">CVE-2020-29569 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4788">CVE-2020-4788 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555937" comment="kernel-default-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555938" comment="kernel-default-base-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555939" comment="kernel-default-devel-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539114" comment="kernel-devel-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539115" comment="kernel-macros-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539116" comment="kernel-source-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555940" comment="kernel-syms-4.4.180-94.138.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150924" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1150934" ref_url="https://bugzilla.suse.com/1150934" source="BUGZILLA"/>
		<reference ref_id="1181777" ref_url="https://bugzilla.suse.com/1181777" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16275" ref_url="https://www.suse.com/security/cve/CVE-2019-16275/" source="CVE"/>
		<reference ref_id="CVE-2021-0326" ref_url="https://www.suse.com/security/cve/CVE-2021-0326/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008327.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-0326: P2P group information processing vulnerability (bsc#1181777).
- CVE-2019-16275: AP mode PMF disconnection protection bypass (bsc#1150934)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-15"/>
	<updated date="2021-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150934">SUSE bug 1150934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181777">SUSE bug 1181777</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16275/">CVE-2019-16275 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16275">CVE-2019-16275 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0326/">CVE-2021-0326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0326">CVE-2021-0326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531899" comment="wpa_supplicant-2.6-15.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150925" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1179748" ref_url="https://bugzilla.suse.com/1179748" source="BUGZILLA"/>
		<reference ref_id="1181483" ref_url="https://bugzilla.suse.com/1181483" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008333.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

- bsc#1179748 CVE-2020-27828: Fix heap overflow by checking maxrlvls
- bsc#1181483 CVE-2021-3272: Fix buffer over-read in jp2_decode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179748">SUSE bug 1179748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181483">SUSE bug 1181483</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27828">CVE-2020-27828 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3272">CVE-2021-3272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531900" comment="libjasper1-1.900.14-195.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531901" comment="libjasper1-32bit-1.900.14-195.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150926" version="1" class="patch">
	<metadata>
		<title>Security update for screen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1182092" ref_url="https://bugzilla.suse.com/1182092" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26937" ref_url="https://www.suse.com/security/cve/CVE-2021-26937/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008336.html" source="SUSE-SU"/>
		<description>
This update for screen fixes the following issues:

- CVE-2021-26937: Fixed double width combining char handling that could lead to a denial of service or code execution (bsc#1182092).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-17"/>
	<updated date="2021-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182092">SUSE bug 1182092</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26937/">CVE-2021-26937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26937">CVE-2021-26937 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531902" comment="screen-4.0.4-23.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150927" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1182246" ref_url="https://bugzilla.suse.com/1182246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008342.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy
  negotiation can be targeted by a buffer overflow attack [bsc#1182246, CVE-2020-8625]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182246">SUSE bug 1182246</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8625">CVE-2020-8625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531903" comment="bind-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531904" comment="bind-chrootenv-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531905" comment="bind-doc-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531906" comment="bind-libs-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531907" comment="bind-libs-32bit-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531908" comment="bind-utils-9.9.9P1-63.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150928" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008344.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 80
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27221">CVE-2020-27221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531909" comment="java-1_7_1-ibm-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531910" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531911" comment="java-1_7_1-ibm-devel-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531912" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531913" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.80-38.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150929" version="1" class="patch">
	<metadata>
		<title>Security update for krb5-appl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1131109" ref_url="https://bugzilla.suse.com/1131109" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25017" ref_url="https://www.suse.com/security/cve/CVE-2019-25017/" source="CVE"/>
		<reference ref_id="CVE-2019-25018" ref_url="https://www.suse.com/security/cve/CVE-2019-25018/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008353.html" source="SUSE-SU"/>
		<description>
This update for krb5-appl fixes the following issues:

- CVE-2019-25017: Check the filenames sent by the server match those requested by the client (bsc#1131109).
- CVE-2019-25018: Disallow empty incoming filename or ones that refer to the current directory (bsc#1131109).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131109">SUSE bug 1131109</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25017/">CVE-2019-25017 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25017">CVE-2019-25017 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25018/">CVE-2019-25018 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25018">CVE-2019-25018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531914" comment="krb5-appl-clients-1.0.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531915" comment="krb5-appl-servers-1.0.3-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150930" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008355.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u282 (icedtea 3.18.0)
  * January 2021 CPU (bsc#1181239)
  * Security fixes
    + JDK-8247619: Improve Direct Buffering of Characters (CVE-2020-14803)
  * Import of OpenJDK 8 u282 build 01
    + JDK-6962725: Regtest javax/swing/JFileChooser/6738668/
      /bug6738668.java fails under Linux
    + JDK-8025936: Windows .pdb and .map files does not have proper
      dependencies setup
    + JDK-8030350: Enable additional compiler warnings for GCC
    + JDK-8031423: Test java/awt/dnd/DisposeFrameOnDragCrash/
      /DisposeFrameOnDragTest.java fails by Timeout on Windows
    + JDK-8036122: Fix warning 'format not a string literal'
    + JDK-8051853: new
      URI('x/').resolve('..').getSchemeSpecificPart() returns null!
    + JDK-8132664: closed/javax/swing/DataTransfer/DefaultNoDrop/
      /DefaultNoDrop.java locks on Windows
    + JDK-8134632: Mark javax/sound/midi/Devices/
      /InitializationHang.java as headful
    + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'
      treated by JVM as an equivalent
    + JDK-8148916: Mark bug6400879.java as intermittently failing
    + JDK-8148983: Fix extra comma in changes for JDK-8148916
    + JDK-8160438: javax/swing/plaf/nimbus/8057791/bug8057791.java
      fails
    + JDK-8165808: Add release barriers when allocating objects
      with concurrent collection
    + JDK-8185003: JMX: Add a version of
      ThreadMXBean.dumpAllThreads with a maxDepth argument
    + JDK-8202076: test/jdk/java/io/File/WinSpecialFiles.java on
      windows with VS2017
    + JDK-8207766: [testbug] Adapt tests for Aix.
    + JDK-8212070: Introduce diagnostic flag to abort VM on failed
      JIT compilation
    + JDK-8213448: [TESTBUG] enhance jfr/jvm/TestDumpOnCrash
    + JDK-8215727: Restore JFR thread sampler loop to old /
      previous behavior
    + JDK-8220657: JFR.dump does not work when filename is set
    + JDK-8221342: [TESTBUG] Generate Dockerfile for docker testing
    + JDK-8224502: [TESTBUG] JDK docker test TestSystemMetrics.java
      fails with access issues and OOM
    + JDK-8231209: [REDO] ThreadMXBean::getThreadAllocatedBytes()
      can be quicker for self thread
    + JDK-8231968: getCurrentThreadAllocatedBytes default
      implementation s/b getThreadAllocatedBytes
    + JDK-8232114: JVM crashed at imjpapi.dll in native code
    + JDK-8234270: [REDO] JDK-8204128 NMT might report incorrect
      numbers for Compiler area
    + JDK-8234339: replace JLI_StrTok in java_md_solinux.c
    + JDK-8238448: RSASSA-PSS signature verification fail when
      using certain odd key sizes
    + JDK-8242335: Additional Tests for RSASSA-PSS
    + JDK-8244225: stringop-overflow warning on strncpy call from
      compile_the_world_in
    + JDK-8245400: Upgrade to LittleCMS 2.11
    + JDK-8248214: Add paddings for TaskQueueSuper to reduce
      false-sharing cache contention
    + JDK-8249176: Update GlobalSignR6CA test certificates
    + JDK-8250665: Wrong translation for the month name of May in
      ar_JO,LB,SY
    + JDK-8250928: JFR: Improve hash algorithm for stack traces
    + JDK-8251469: Better cleanup for
      test/jdk/javax/imageio/SetOutput.java
    + JDK-8251840: Java_sun_awt_X11_XToolkit_getDefaultScreenData
      should not be in make/mapfiles/libawt_xawt/mapfile-vers
    + JDK-8252384: [TESTBUG] Some tests refer to COMPAT provider
      rather than JRE
    + JDK-8252395: [8u] --with-native-debug-symbols=external
      doesn't include debuginfo files for binaries
    + JDK-8252497: Incorrect numeric currency code for ROL
    + JDK-8252754: Hash code calculation of JfrStackTrace is
      inconsistent
    + JDK-8252904: VM crashes when JFR is used and JFR event class
      is transformed
    + JDK-8252975: [8u] JDK-8252395 breaks the build for
      --with-native-debug-symbols=internal
    + JDK-8253284: Zero OrderAccess barrier mappings are incorrect
    + JDK-8253550: [8u] JDK-8252395 breaks the build for make
      STRIP_POLICY=no_strip
    + JDK-8253752: test/sun/management/jmxremote/bootstrap/
      /RmiBootstrapTest.java fails randomly
    + JDK-8254081: java/security/cert/PolicyNode/
      /GetPolicyQualifiers.java fails due to an expired certificate
    + JDK-8254144: Non-x86 Zero builds fail with return-type
      warning in os_linux_zero.cpp
    + JDK-8254166: Zero: return-type warning in
       zeroInterpreter_zero.cpp
    + JDK-8254683: [TEST_BUG] jdk/test/sun/tools/jconsole/
      /WorkerDeadlockTest.java fails
    + JDK-8255003: Build failures on Solaris
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531916" comment="java-1_8_0-openjdk-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531917" comment="java-1_8_0-openjdk-demo-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531918" comment="java-1_8_0-openjdk-devel-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531919" comment="java-1_8_0-openjdk-headless-1.8.0.282-27.56.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150931" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008394.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 25
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27221">CVE-2020-27221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531920" comment="java-1_8_0-ibm-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531921" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531922" comment="java-1_8_0-ibm-devel-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531923" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.25-30.81.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150932" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-Twig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1008644" ref_url="https://bugzilla.suse.com/1008644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9180" ref_url="https://www.suse.com/security/cve/CVE-2016-9180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008410.html" source="SUSE-SU"/>
		<description>
This update for perl-XML-Twig fixes the following issues:

- Security fix [bsc#1008644, CVE-2016-9180]
  * Added: the no_xxe option to XML::Twig::new, which causes the
    parse to fail if external entities are used (to prevent
    malicious XML to access the filesystem).
  * Setting expand_external_ents to 0 or -1 currently doesn't work
    as expected; To completely turn off expanding external entities
    use no_xxe.
  * Update documentation for XML::Twig to mention problems with
    expand_external_ents and add information about new no_xxe argument
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008644">SUSE bug 1008644</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9180/">CVE-2016-9180 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9180">CVE-2016-9180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531924" comment="perl-XML-Twig-3.44-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150933" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1182357" ref_url="https://bugzilla.suse.com/1182357" source="BUGZILLA"/>
		<reference ref_id="1182614" ref_url="https://bugzilla.suse.com/1182614" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008404.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.8.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2021-08 (bsc#1182614)
  * CVE-2021-23969: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23968: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23973: MediaError message property could have leaked information about cross-origin resources
  * CVE-2021-23978: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182357">SUSE bug 1182357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23968">CVE-2021-23968 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23969">CVE-2021-23969 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23973">CVE-2021-23973 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23978">CVE-2021-23978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531925" comment="MozillaFirefox-78.8.0-112.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531926" comment="MozillaFirefox-devel-78.8.0-112.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531927" comment="MozillaFirefox-translations-common-78.8.0-112.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150934" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1182066" ref_url="https://bugzilla.suse.com/1182066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008413.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-36242: Using the Fernet class to symmetrically encrypt multi gigabyte
  values could result in an integer overflow and buffer overflow (bsc#1182066).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182066">SUSE bug 1182066</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36242">CVE-2020-36242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531928" comment="python-cryptography-2.1.4-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531929" comment="python3-cryptography-2.1.4-7.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150935" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1175970" ref_url="https://bugzilla.suse.com/1175970" source="BUGZILLA"/>
		<reference ref_id="1176711" ref_url="https://bugzilla.suse.com/1176711" source="BUGZILLA"/>
		<reference ref_id="1177883" ref_url="https://bugzilla.suse.com/1177883" source="BUGZILLA"/>
		<reference ref_id="1179264" ref_url="https://bugzilla.suse.com/1179264" source="BUGZILLA"/>
		<reference ref_id="1179265" ref_url="https://bugzilla.suse.com/1179265" source="BUGZILLA"/>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="1182262" ref_url="https://bugzilla.suse.com/1182262" source="BUGZILLA"/>
		<reference ref_id="1182263" ref_url="https://bugzilla.suse.com/1182263" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

grub2 now implements the new 'SBAT' method for SHIM based secure boot revocation. (bsc#1182057)

Following security issues are fixed that can violate secure boot constraints:

- CVE-2020-25632: Fixed a use-after-free in rmmod command (bsc#1176711)
- CVE-2020-25647: Fixed an out-of-bound write in grub_usb_device_initialize() (bsc#1177883)
- CVE-2020-27749: Fixed a stack buffer overflow in grub_parser_split_cmdline (bsc#1179264)
- CVE-2020-27779, CVE-2020-14372: Disallow cutmem and acpi commands in secure boot mode (bsc#1179265 bsc#1175970)
- CVE-2021-20225: Fixed a heap out-of-bounds write in short form option parser (bsc#1182262)
- CVE-2021-20233: Fixed a heap out-of-bound write due to mis-calculation of space required for quoting (bsc#1182263)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175970">SUSE bug 1175970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176711">SUSE bug 1176711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177883">SUSE bug 1177883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179264">SUSE bug 1179264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179265">SUSE bug 1179265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182262">SUSE bug 1182262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182263">SUSE bug 1182263</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14372">CVE-2020-14372 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25632">CVE-2020-25632 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25647">CVE-2020-25647 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27749">CVE-2020-27749 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27779">CVE-2020-27779 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20225">CVE-2021-20225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20233">CVE-2021-20233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555941" comment="grub2-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539120" comment="grub2-i386-pc-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539122" comment="grub2-snapper-plugin-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539123" comment="grub2-systemd-sleep-plugin-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539124" comment="grub2-x86_64-efi-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539125" comment="grub2-x86_64-xen-2.02-4.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150936" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1182279" ref_url="https://bugzilla.suse.com/1182279" source="BUGZILLA"/>
		<reference ref_id="1182408" ref_url="https://bugzilla.suse.com/1182408" source="BUGZILLA"/>
		<reference ref_id="1182411" ref_url="https://bugzilla.suse.com/1182411" source="BUGZILLA"/>
		<reference ref_id="1182412" ref_url="https://bugzilla.suse.com/1182412" source="BUGZILLA"/>
		<reference ref_id="1182413" ref_url="https://bugzilla.suse.com/1182413" source="BUGZILLA"/>
		<reference ref_id="1182415" ref_url="https://bugzilla.suse.com/1182415" source="BUGZILLA"/>
		<reference ref_id="1182416" ref_url="https://bugzilla.suse.com/1182416" source="BUGZILLA"/>
		<reference ref_id="1182417" ref_url="https://bugzilla.suse.com/1182417" source="BUGZILLA"/>
		<reference ref_id="1182418" ref_url="https://bugzilla.suse.com/1182418" source="BUGZILLA"/>
		<reference ref_id="1182419" ref_url="https://bugzilla.suse.com/1182419" source="BUGZILLA"/>
		<reference ref_id="1182420" ref_url="https://bugzilla.suse.com/1182420" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch-&gt;bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-03"/>
	<updated date="2021-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36221">CVE-2020-36221 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36222">CVE-2020-36222 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36223">CVE-2020-36223 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36224">CVE-2020-36224 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36225">CVE-2020-36225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36226">CVE-2020-36226 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36227">CVE-2020-36227 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36228">CVE-2020-36228 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36229">CVE-2020-36229 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36230">CVE-2020-36230 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27212">CVE-2021-27212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531942" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150937" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1178372" ref_url="https://bugzilla.suse.com/1178372" source="BUGZILLA"/>
		<reference ref_id="1181747" ref_url="https://bugzilla.suse.com/1181747" source="BUGZILLA"/>
		<reference ref_id="1181753" ref_url="https://bugzilla.suse.com/1181753" source="BUGZILLA"/>
		<reference ref_id="1181843" ref_url="https://bugzilla.suse.com/1181843" source="BUGZILLA"/>
		<reference ref_id="1182175" ref_url="https://bugzilla.suse.com/1182175" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008448.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used
  by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).

The following non-security bugs were fixed:

- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178372">SUSE bug 1178372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181747">SUSE bug 1181747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181753">SUSE bug 1181753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181843">SUSE bug 1181843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182175">SUSE bug 1182175</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26932">CVE-2021-26932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555942" comment="kernel-default-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555943" comment="kernel-default-base-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555944" comment="kernel-default-devel-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539130" comment="kernel-devel-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539131" comment="kernel-macros-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539132" comment="kernel-source-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555945" comment="kernel-syms-4.4.180-94.141.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150938" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1182805" ref_url="https://bugzilla.suse.com/1182805" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27803" ref_url="https://www.suse.com/security/cve/CVE-2021-27803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008451.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-27803: P2P provision discovery processing vulnerability (bsc#1182805) 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182805">SUSE bug 1182805</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27803/">CVE-2021-27803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27803">CVE-2021-27803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531951" comment="wpa_supplicant-2.6-15.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150939" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1183026" ref_url="https://bugzilla.suse.com/1183026" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21300" ref_url="https://www.suse.com/security/cve/CVE-2021-21300/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008456.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- On case-insensitive filesystems, with support for symbolic links,
  if Git is configured globally to apply delay-capable clean/smudge
  filters (such as Git LFS), Git could be fooled into running
  remote code during a clone. (bsc#1183026, CVE-2021-21300)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183026">SUSE bug 1183026</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21300/">CVE-2021-21300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21300">CVE-2021-21300 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531952" comment="git-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531953" comment="git-core-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531954" comment="git-cvs-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531955" comment="git-daemon-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531957" comment="git-email-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531958" comment="git-gui-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531959" comment="git-svn-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531960" comment="git-web-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531961" comment="gitk-2.26.2-27.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150940" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008491.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- python27 was upgraded to 2.7.18
- CVE-2021-23336: Fixed a potential web cache poisoning by using a semicolon in query parameters use of semicolon as a query string separator (bsc#1182379).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-16"/>
	<updated date="2021-03-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531962" comment="libpython2_7-1_0-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531963" comment="libpython2_7-1_0-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531964" comment="python-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531965" comment="python-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531966" comment="python-base-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531967" comment="python-base-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531968" comment="python-curses-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531969" comment="python-demo-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531970" comment="python-devel-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531971" comment="python-doc-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531972" comment="python-doc-pdf-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531973" comment="python-gdbm-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531974" comment="python-idle-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531975" comment="python-tk-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531976" comment="python-xml-2.7.18-28.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150941" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1180623" ref_url="https://bugzilla.suse.com/1180623" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008173.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.1 ESR
  * Fixed: Critical security issue MFSA 2021-01 (bsc#1180623)
  * CVE-2020-16044
    Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180623">SUSE bug 1180623</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16044">CVE-2020-16044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531977" comment="MozillaFirefox-78.6.1-112.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531978" comment="MozillaFirefox-devel-78.6.1-112.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531979" comment="MozillaFirefox-translations-common-78.6.1-112.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150942" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1182328" ref_url="https://bugzilla.suse.com/1182328" source="BUGZILLA"/>
		<reference ref_id="1182362" ref_url="https://bugzilla.suse.com/1182362" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27218" ref_url="https://www.suse.com/security/cve/CVE-2021-27218/" source="CVE"/>
		<reference ref_id="CVE-2021-27219" ref_url="https://www.suse.com/security/cve/CVE-2021-27219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008493.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2021-27218: g_byte_array_new_take takes a gsize as length but stores in a guint, this patch will refuse if the length is larger than guint. (bsc#1182328)
- CVE-2021-27219: g_memdup takes a guint as parameter and sometimes leads into an integer overflow, so add a g_memdup2 function which uses gsize to replace it. (bsc#1182362)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-16"/>
	<updated date="2021-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182328">SUSE bug 1182328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182362">SUSE bug 1182362</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-27218/">CVE-2021-27218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27218">CVE-2021-27218 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27219/">CVE-2021-27219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27219">CVE-2021-27219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531980" comment="glib2-lang-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531981" comment="glib2-tools-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531982" comment="libgio-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531983" comment="libgio-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531984" comment="libglib-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531985" comment="libglib-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531986" comment="libgmodule-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531987" comment="libgmodule-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531988" comment="libgobject-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531989" comment="libgobject-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531990" comment="libgthread-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531991" comment="libgthread-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150943" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1180414" ref_url="https://bugzilla.suse.com/1180414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008537.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:
	
- CVE-2020-35738: Fixed an out-of-bounds write in WavpackPackSamples (bsc#1180414). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180414">SUSE bug 1180414</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35738">CVE-2020-35738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531994" comment="libwavpack1-4.60.99-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150944" version="1" class="patch">
	<metadata>
		<title>Security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1088639" ref_url="https://bugzilla.suse.com/1088639" source="BUGZILLA"/>
		<reference ref_id="1112438" ref_url="https://bugzilla.suse.com/1112438" source="BUGZILLA"/>
		<reference ref_id="1125689" ref_url="https://bugzilla.suse.com/1125689" source="BUGZILLA"/>
		<reference ref_id="1134616" ref_url="https://bugzilla.suse.com/1134616" source="BUGZILLA"/>
		<reference ref_id="1146182" ref_url="https://bugzilla.suse.com/1146182" source="BUGZILLA"/>
		<reference ref_id="1146184" ref_url="https://bugzilla.suse.com/1146184" source="BUGZILLA"/>
		<reference ref_id="1181358" ref_url="https://bugzilla.suse.com/1181358" source="BUGZILLA"/>
		<reference ref_id="962914" ref_url="https://bugzilla.suse.com/962914" source="BUGZILLA"/>
		<reference ref_id="964140" ref_url="https://bugzilla.suse.com/964140" source="BUGZILLA"/>
		<reference ref_id="966514" ref_url="https://bugzilla.suse.com/966514" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1544" ref_url="https://www.suse.com/security/cve/CVE-2016-1544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" source="SUSE-SU"/>
		<description>
This update for nghttp2 fixes the following issues:

Security issues fixed:

- CVE-2020-11080: HTTP/2 Large Settings Frame DoS (bsc#1181358).
- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service (bsc#1146184).
- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146182).
- CVE-2018-1000168: Fixed ALTSVC frame client side denial of service (bsc#1088639).
- CVE-2016-1544: Fixed out of memory due to unlimited incoming HTTP header fields (bsc#966514).

Bug fixes and enhancements:

- Packages must not mark license files as %doc (bsc#1082318)
- Typo in description of libnghttp2_asio1 (bsc#962914)
- Fixed mistake in spec file (bsc#1125689)
- Fixed build issue with boost 1.70.0 (bsc#1134616)
- Fixed build issue with GCC 6 (bsc#964140)
- Feature: Add W&amp;S module (FATE#326776, bsc#1112438)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088639">SUSE bug 1088639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112438">SUSE bug 1112438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125689">SUSE bug 1125689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134616">SUSE bug 1134616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146182">SUSE bug 1146182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146184">SUSE bug 1146184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181358">SUSE bug 1181358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962914">SUSE bug 962914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964140">SUSE bug 964140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966514">SUSE bug 966514</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1544/">CVE-2016-1544 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1544">CVE-2016-1544 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000168">CVE-2018-1000168 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9511">CVE-2019-9511 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9513">CVE-2019-9513 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11080">CVE-2020-11080 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531995" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150945" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008551.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841">CVE-2021-23841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531996" comment="libopenssl-devel-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531997" comment="libopenssl1_0_0-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531998" comment="libopenssl1_0_0-32bit-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531999" comment="libopenssl1_0_0-hmac-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532000" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532001" comment="openssl-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532002" comment="openssl-doc-1.0.2j-60.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150946" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1183942" ref_url="https://bugzilla.suse.com/1183942" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.9.0 ESR  (MFSA 2021-11, bsc#1183942)
  * CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read
  * CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23984: Malicious extensions could have spoofed popup information
  * CVE-2021-23987: Memory safety bugs
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-31"/>
	<updated date="2021-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23981">CVE-2021-23981 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23982">CVE-2021-23982 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23984">CVE-2021-23984 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23987">CVE-2021-23987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009532003" comment="MozillaFirefox-78.9.0-112.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532004" comment="MozillaFirefox-devel-78.9.0-112.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532005" comment="MozillaFirefox-translations-common-78.9.0-112.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150947" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1197341" ref_url="https://bugzilla.suse.com/1197341" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0547" ref_url="https://www.suse.com/security/cve/CVE-2022-0547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010562.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2022-0547: Fixed possible authentication bypass in external authentication plug-in (bsc#1197341).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197341">SUSE bug 1197341</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0547/">CVE-2022-0547 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0547">CVE-2022-0547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009676877" comment="openvpn-2.3.8-16.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676878" comment="openvpn-auth-pam-plugin-2.3.8-16.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150948" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1196500" ref_url="https://bugzilla.suse.com/1196500" source="BUGZILLA"/>
		<reference ref_id="1197126" ref_url="https://bugzilla.suse.com/1197126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update Java 7.1 to Service Refresh 7 Fix Pack 5 (bsc#1197126).

Including fixes for the following vulnerabilities: 

  CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349,
  CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277,
  CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294,
  CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248,
  CVE-2022-21271.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21271">CVE-2022-21271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21349">CVE-2022-21349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150949" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1195146" ref_url="https://bugzilla.suse.com/1195146" source="BUGZILLA"/>
		<reference ref_id="1196500" ref_url="https://bugzilla.suse.com/1196500" source="BUGZILLA"/>
		<reference ref_id="1197126" ref_url="https://bugzilla.suse.com/1197126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update Java 8.0 to Service Refresh 7 Fix Pack 5 (bsc#1197126).

Including fixes for the following vulnerabilities: 

  CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349,
  CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277,
  CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294,
  CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248,
  CVE-2022-21271.

Non-securtiy fix:

- Fixed a broken symlink for javaws (bsc#1195146).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195146">SUSE bug 1195146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21271">CVE-2022-21271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21349">CVE-2022-21349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150950" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1197459" ref_url="https://bugzilla.suse.com/1197459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010583.html" source="SUSE-SU"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677126" comment="libz1-1.2.8-12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677109" comment="libz1-32bit-1.2.8-12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677127" comment="zlib-devel-1.2.8-12.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150951" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1191902" ref_url="https://bugzilla.suse.com/1191902" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35560" ref_url="https://www.suse.com/security/cve/CVE-2021-35560/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 7 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
- CVE-2021-35560: Fixed a vulnerability in the component Deployment. (bsc#1191902)
- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake. (bsc#1191904)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191902">SUSE bug 1191902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35560/">CVE-2021-35560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35560">CVE-2021-35560 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41035">CVE-2021-41035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662502" comment="java-1_8_0-ibm-1.8.0_sr7.0-30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662492" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662503" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662494" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-30.84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150952" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010659.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.3 (bsc#1197903):
  - CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11
    tokens are removed while in use.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-05"/>
	<updated date="2022-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678285" comment="libfreebl3-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678251" comment="libfreebl3-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678286" comment="libfreebl3-hmac-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678253" comment="libfreebl3-hmac-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678287" comment="libsoftokn3-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678255" comment="libsoftokn3-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678288" comment="libsoftokn3-hmac-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678257" comment="libsoftokn3-hmac-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678289" comment="mozilla-nss-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678259" comment="mozilla-nss-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678290" comment="mozilla-nss-certs-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678261" comment="mozilla-nss-certs-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678291" comment="mozilla-nss-sysinit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678264" comment="mozilla-nss-sysinit-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678292" comment="mozilla-nss-tools-3.68.3-58.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150953" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<reference ref_id="SUSE-RU-2022:1114-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022464.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.8.0 ESR (bsc#1197903):

MFSA 2022-14 (bsc#1197903)

* CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11 tokens are removed while in use
* CVE-2022-28281: Fixed an out of bounds write due to unexpected WebAuthN Extensions
* CVE-2022-1196: Fixed a use-after-free after VR Process destruction
* CVE-2022-28282: Fixed a use-after-free in DocumentL10n::TranslateDocument
* CVE-2022-28285: Fixed incorrect AliasSet used in JIT Codegen
* CVE-2022-28286: Fixed that iframe contents could be rendered outside the border
* CVE-2022-24713: Fixed a denial of service via complex regular expressions
* CVE-2022-28289: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1196">CVE-2022-1196 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28281">CVE-2022-28281 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28282">CVE-2022-28282 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28285">CVE-2022-28285 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28286">CVE-2022-28286 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28289">CVE-2022-28289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678497" comment="MozillaFirefox-91.8.0-112.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678498" comment="MozillaFirefox-devel-91.8.0-112.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678499" comment="MozillaFirefox-translations-common-91.8.0-112.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150954" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1167631" ref_url="https://bugzilla.suse.com/1167631" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1752" ref_url="https://www.suse.com/security/cve/CVE-2020-1752/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010664.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2020-1752: Fix use-after-free in glob when expanding ~user (bsc#1167631)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167631">SUSE bug 1167631</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1752/">CVE-2020-1752 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">CVE-2020-1752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677624" comment="glibc-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677550" comment="glibc-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677625" comment="glibc-devel-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677552" comment="glibc-devel-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677553" comment="glibc-html-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677554" comment="glibc-i18ndata-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677555" comment="glibc-info-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677626" comment="glibc-locale-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677557" comment="glibc-locale-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677627" comment="glibc-profile-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677559" comment="glibc-profile-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677628" comment="nscd-2.22-123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150955" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1102016" ref_url="https://bugzilla.suse.com/1102016" source="BUGZILLA"/>
		<reference ref_id="1106881" ref_url="https://bugzilla.suse.com/1106881" source="BUGZILLA"/>
		<reference ref_id="1106882" ref_url="https://bugzilla.suse.com/1106882" source="BUGZILLA"/>
		<reference ref_id="1140130" ref_url="https://bugzilla.suse.com/1140130" source="BUGZILLA"/>
		<reference ref_id="1140205" ref_url="https://bugzilla.suse.com/1140205" source="BUGZILLA"/>
		<reference ref_id="1162090" ref_url="https://bugzilla.suse.com/1162090" source="BUGZILLA"/>
		<reference ref_id="1173578" ref_url="https://bugzilla.suse.com/1173578" source="BUGZILLA"/>
		<reference ref_id="1180457" ref_url="https://bugzilla.suse.com/1180457" source="BUGZILLA"/>
		<reference ref_id="1184774" ref_url="https://bugzilla.suse.com/1184774" source="BUGZILLA"/>
		<reference ref_id="1197738" ref_url="https://bugzilla.suse.com/1197738" source="BUGZILLA"/>
		<reference ref_id="971617" ref_url="https://bugzilla.suse.com/971617" source="BUGZILLA"/>
		<reference ref_id="980504" ref_url="https://bugzilla.suse.com/980504" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1924" ref_url="https://www.suse.com/security/cve/CVE-2016-1924/" source="CVE"/>
		<reference ref_id="CVE-2016-3183" ref_url="https://www.suse.com/security/cve/CVE-2016-3183/" source="CVE"/>
		<reference ref_id="CVE-2016-4797" ref_url="https://www.suse.com/security/cve/CVE-2016-4797/" source="CVE"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16375" ref_url="https://www.suse.com/security/cve/CVE-2018-16375/" source="CVE"/>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2018-20845" ref_url="https://www.suse.com/security/cve/CVE-2018-20845/" source="CVE"/>
		<reference ref_id="CVE-2018-20846" ref_url="https://www.suse.com/security/cve/CVE-2018-20846/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="CVE-2022-1122" ref_url="https://www.suse.com/security/cve/CVE-2022-1122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes the following issues:

- CVE-2016-1924: Fixed heap buffer overflow (bsc#980504).
- CVE-2016-3183: Fixed out-of-bounds read in sycc422_to_rgb function (bsc#971617).
- CVE-2016-4797: Fixed heap buffer overflow (bsc#980504).
- CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016).
- CVE-2018-16375: Fixed missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c (bsc#1106882).
- CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881).
- CVE-2018-20845: Fixed division-by-zero in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c (bsc#1140130).
- CVE-2018-20846: Fixed out-of-bounds accesses in pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c (bsc#1140205).
- CVE-2020-8112: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090).
- CVE-2020-15389: Fixed use-after-free if t a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578).
- CVE-2020-27823: Fixed heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457).
- CVE-2021-29338: Fixed integer overflow that allows remote attackers to crash the application (bsc#1184774).
- CVE-2022-1122: Fixed segmentation fault in opj2_decompress due to uninitialized pointer (bsc#1197738).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-07"/>
	<updated date="2022-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102016">SUSE bug 1102016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106881">SUSE bug 1106881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106882">SUSE bug 1106882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140130">SUSE bug 1140130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140205">SUSE bug 1140205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180457">SUSE bug 1180457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184774">SUSE bug 1184774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197738">SUSE bug 1197738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971617">SUSE bug 971617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980504">SUSE bug 980504</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1924/">CVE-2016-1924 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1924">CVE-2016-1924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3183/">CVE-2016-3183 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3183">CVE-2016-3183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-4797/">CVE-2016-4797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4797">CVE-2016-4797 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14423">CVE-2018-14423 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16375/">CVE-2018-16375 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16375">CVE-2018-16375 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16376">CVE-2018-16376 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20845/">CVE-2018-20845 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20845">CVE-2018-20845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20846/">CVE-2018-20846 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20846">CVE-2018-20846 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15389">CVE-2020-15389 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27823">CVE-2020-27823 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8112">CVE-2020-8112 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29338">CVE-2021-29338 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1122/">CVE-2022-1122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1122">CVE-2022-1122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677943" comment="libopenjp2-7-2.1.0-4.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150956" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1194547" ref_url="https://bugzilla.suse.com/1194547" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- CVE-2021-4140: Fixed iframe sandbox bypass with XSLT (bsc#1194547).
- CVE-2022-22737: Fixed race condition when playing audio files (bsc#1194547).
- CVE-2022-22738: Fixed heap-buffer-overflow in blendGaussianBlur (bsc#1194547).
- CVE-2022-22739: Fixed missing throttling on external protocol launch dialog (bsc#1194547).
- CVE-2022-22740: Fixed use-after-free of ChannelEventQueue::mOwner (bsc#1194547).
- CVE-2022-22741: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22742: Fixed out-of-bounds memory access when inserting text in edit mode (bsc#1194547).
- CVE-2022-22743: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22744: Fixed possible command injection via the 'Copy as curl' feature in DevTools (bsc#1194547).
- CVE-2022-22745: Fixed leaking cross-origin URLs through securitypolicyviolation event (bsc#1194547).
- CVE-2022-22746: Fixed calling into reportValidity could have lead to fullscreen window spoof (bsc#1194547).
- CVE-2022-22747: Fixed crash when handling empty pkcs7 sequence(bsc#1194547).
- CVE-2022-22748: Fixed spoofed origin on external protocol launch dialog (bsc#1194547).
- CVE-2022-22751: Fixed memory safety bugs (bsc#1194547).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4140">CVE-2021-4140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22737">CVE-2022-22737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22738">CVE-2022-22738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22739">CVE-2022-22739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22740">CVE-2022-22740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22741">CVE-2022-22741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22742">CVE-2022-22742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22743">CVE-2022-22743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22744">CVE-2022-22744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22745">CVE-2022-22745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22746">CVE-2022-22746 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22747">CVE-2022-22747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22748">CVE-2022-22748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22751">CVE-2022-22751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663799" comment="MozillaFirefox-91.5.0-112.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663800" comment="MozillaFirefox-devel-91.5.0-112.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663801" comment="MozillaFirefox-translations-common-91.5.0-112.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150957" version="1" class="patch">
	<metadata>
		<title>Security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010685.html" source="SUSE-SU"/>
		<description>
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679302" comment="liblzma5-5.0.5-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679278" comment="liblzma5-32bit-5.0.5-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679303" comment="xz-5.0.5-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679280" comment="xz-lang-5.0.5-6.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150958" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1172768" ref_url="https://bugzilla.suse.com/1172768" source="BUGZILLA"/>
		<reference ref_id="1172802" ref_url="https://bugzilla.suse.com/1172802" source="BUGZILLA"/>
		<reference ref_id="1178479" ref_url="https://bugzilla.suse.com/1178479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0181" ref_url="https://www.suse.com/security/cve/CVE-2020-0181/" source="CVE"/>
		<reference ref_id="CVE-2020-0198" ref_url="https://www.suse.com/security/cve/CVE-2020-0198/" source="CVE"/>
		<reference ref_id="CVE-2020-0452" ref_url="https://www.suse.com/security/cve/CVE-2020-0452/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010691.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2020-0181: Fixed an integer overflow that could lead to denial of service
  (bsc#1172802).
- CVE-2020-0198: Fixed and unsigned integer overflow that could lead to denial
  of service (bsc#1172768).
- CVE-2020-0452: Fixed a buffer overflow check that could be optimized away
  by the compiler (bsc#1178479).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172768">SUSE bug 1172768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172802">SUSE bug 1172802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178479">SUSE bug 1178479</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0181/">CVE-2020-0181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0181">CVE-2020-0181 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0198/">CVE-2020-0198 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0198">CVE-2020-0198 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0452/">CVE-2020-0452 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0452">CVE-2020-0452 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677635" comment="libexif12-0.6.22-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677562" comment="libexif12-32bit-0.6.22-8.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150959" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196488" ref_url="https://bugzilla.suse.com/1196488" source="BUGZILLA"/>
		<reference ref_id="1196761" ref_url="https://bugzilla.suse.com/1196761" source="BUGZILLA"/>
		<reference ref_id="1196830" ref_url="https://bugzilla.suse.com/1196830" source="BUGZILLA"/>
		<reference ref_id="1196836" ref_url="https://bugzilla.suse.com/1196836" source="BUGZILLA"/>
		<reference ref_id="1197227" ref_url="https://bugzilla.suse.com/1197227" source="BUGZILLA"/>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1197366" ref_url="https://bugzilla.suse.com/1197366" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868/" source="CVE"/>
		<reference ref_id="CVE-2022-0850" ref_url="https://www.suse.com/security/cve/CVE-2022-0850/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-23036" ref_url="https://www.suse.com/security/cve/CVE-2022-23036/" source="CVE"/>
		<reference ref_id="CVE-2022-23037" ref_url="https://www.suse.com/security/cve/CVE-2022-23037/" source="CVE"/>
		<reference ref_id="CVE-2022-23038" ref_url="https://www.suse.com/security/cve/CVE-2022-23038/" source="CVE"/>
		<reference ref_id="CVE-2022-23039" ref_url="https://www.suse.com/security/cve/CVE-2022-23039/" source="CVE"/>
		<reference ref_id="CVE-2022-23040" ref_url="https://www.suse.com/security/cve/CVE-2022-23040/" source="CVE"/>
		<reference ref_id="CVE-2022-23041" ref_url="https://www.suse.com/security/cve/CVE-2022-23041/" source="CVE"/>
		<reference ref_id="CVE-2022-23042" ref_url="https://www.suse.com/security/cve/CVE-2022-23042/" source="CVE"/>
		<reference ref_id="CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490/" source="CVE"/>
		<reference ref_id="CVE-2022-26966" ref_url="https://www.suse.com/security/cve/CVE-2022-26966/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated.

The following security bugs were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331)
- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)
- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device. (bsc#1196836)
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)

The following non-security bugs were fixed:

- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018).
- clocksource: Initialize cs-&gt;wd_list (git-fixes)
- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).
- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).
- net: usb: ax88179_178a: fix packet alignment padding (bsc#1196018).
- sched/autogroup: Fix possible Spectre-v1 indexing for (git-fixes)
- sr9700: sanity check for packet length (bsc#1196836).
- usb: host: xen-hcd: add missing unlock in error path (git-fixes).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196488">SUSE bug 1196488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196761">SUSE bug 1196761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196830">SUSE bug 1196830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196836">SUSE bug 1196836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197227">SUSE bug 1197227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197366">SUSE bug 1197366</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45868">CVE-2021-45868 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0850/">CVE-2022-0850 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0850">CVE-2022-0850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23036/">CVE-2022-23036 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23036">CVE-2022-23036 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23037/">CVE-2022-23037 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23037">CVE-2022-23037 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23038/">CVE-2022-23038 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23038">CVE-2022-23038 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23039/">CVE-2022-23039 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23039">CVE-2022-23039 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23040/">CVE-2022-23040 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23040">CVE-2022-23040 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23041/">CVE-2022-23041 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23041">CVE-2022-23041 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23042/">CVE-2022-23042 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23042">CVE-2022-23042 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26490">CVE-2022-26490 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26966/">CVE-2022-26966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26966">CVE-2022-26966 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679319" comment="kernel-default-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679320" comment="kernel-default-base-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679321" comment="kernel-default-devel-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679285" comment="kernel-devel-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679286" comment="kernel-macros-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679287" comment="kernel-source-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679322" comment="kernel-syms-4.4.180-94.161.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150960" version="1" class="patch">
	<metadata>
		<title>Security update for gzip (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010766.html" source="SUSE-SU"/>
		<description>
This update for gzip fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679548" comment="gzip-1.6-9.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150961" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1183709" ref_url="https://bugzilla.suse.com/1183709" source="BUGZILLA"/>
		<reference ref_id="1197872" ref_url="https://bugzilla.suse.com/1197872" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3448" ref_url="https://www.suse.com/security/cve/CVE-2021-3448/" source="CVE"/>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010784.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2021-3448: Fixed a potential DNS cache poisoning issue due to a constant
  outgoing port being used when for certain use cases of the --server option
  (bsc#1183709).
- CVE-2022-0934: Fixed an invalid memory access that could lead to remote denial
  of service via crafted packet (bsc#1197872).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183709">SUSE bug 1183709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197872">SUSE bug 1197872</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3448/">CVE-2021-3448 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3448">CVE-2021-3448 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0934">CVE-2022-0934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679550" comment="dnsmasq-2.78-18.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150962" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1196137" ref_url="https://bugzilla.suse.com/1196137" source="BUGZILLA"/>
		<reference ref_id="1198136" ref_url="https://bugzilla.suse.com/1198136" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010789.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- Remove the log4j dependency as it is not used by the tomcat package (bsc#1196137)
    
Security hardening, related to Spring Framework vulnerabilities:    
- Deprecate getResources() and always return null (bsc#1198136).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196137">SUSE bug 1196137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198136">SUSE bug 1198136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679547" comment="javapackages-filesystem-5.3.1-14.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679528" comment="tomcat-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679529" comment="tomcat-admin-webapps-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679530" comment="tomcat-docs-webapp-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679531" comment="tomcat-el-3_0-api-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679532" comment="tomcat-javadoc-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679533" comment="tomcat-jsp-2_3-api-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679534" comment="tomcat-lib-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679535" comment="tomcat-servlet-3_1-api-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679536" comment="tomcat-webapps-8.0.53-29.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150963" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1198234" ref_url="https://bugzilla.suse.com/1198234" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010798.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2022-24765: Fixed a potential command injection via git worktree (bsc#1198234).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198234">SUSE bug 1198234</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24765">CVE-2022-24765 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680006" comment="git-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680007" comment="git-core-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680008" comment="git-cvs-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680009" comment="git-daemon-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680010" comment="git-email-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680011" comment="git-gui-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680012" comment="git-svn-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680013" comment="git-web-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680014" comment="gitk-2.26.2-27.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150964" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1196490" ref_url="https://bugzilla.suse.com/1196490" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010799.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-23308: Fixed use-after-free of ID and IDREF attributes. (bsc#1196490)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680015" comment="libxml2-2-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679983" comment="libxml2-2-32bit-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679984" comment="libxml2-doc-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680016" comment="libxml2-tools-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680017" comment="python-libxml2-2.9.4-46.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150965" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010794.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:

- CVE-2020-14409: Fixed an integer overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c. (bsc#1181202)
- CVE-2020-14410: Fixed a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c. (bsc#1181201)
- CVE-2021-33657: Fixed a Heap overflow problem in video/SDL_pixels.c. (bsc#1198001)
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14409">CVE-2020-14409 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14410">CVE-2020-14410 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33657">CVE-2021-33657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679549" comment="libSDL-1_2-0-1.2.15-15.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679539" comment="libSDL-1_2-0-32bit-1.2.15-15.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150966" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1196915" ref_url="https://bugzilla.suse.com/1196915" source="BUGZILLA"/>
		<reference ref_id="1197423" ref_url="https://bugzilla.suse.com/1197423" source="BUGZILLA"/>
		<reference ref_id="1197425" ref_url="https://bugzilla.suse.com/1197425" source="BUGZILLA"/>
		<reference ref_id="1197426" ref_url="https://bugzilla.suse.com/1197426" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26401" ref_url="https://www.suse.com/security/cve/CVE-2021-26401/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-26356" ref_url="https://www.suse.com/security/cve/CVE-2022-26356/" source="CVE"/>
		<reference ref_id="CVE-2022-26357" ref_url="https://www.suse.com/security/cve/CVE-2022-26357/" source="CVE"/>
		<reference ref_id="CVE-2022-26358" ref_url="https://www.suse.com/security/cve/CVE-2022-26358/" source="CVE"/>
		<reference ref_id="CVE-2022-26359" ref_url="https://www.suse.com/security/cve/CVE-2022-26359/" source="CVE"/>
		<reference ref_id="CVE-2022-26360" ref_url="https://www.suse.com/security/cve/CVE-2022-26360/" source="CVE"/>
		<reference ref_id="CVE-2022-26361" ref_url="https://www.suse.com/security/cve/CVE-2022-26361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that
  could cause a denial of service in the host (bsc#1197423).
- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts
  using VT-d IOMMU hardware, which could lead to a denial of service in the host
  (bsc#1197425).
- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory
  corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be
  leveraged by an attacker to cause a denial of service in the host (bsc#1197426).
- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue
  mitigations (bsc#1196915).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-26"/>
	<updated date="2022-04-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196915">SUSE bug 1196915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197423">SUSE bug 1197423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197425">SUSE bug 1197425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26401/">CVE-2021-26401 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26401">CVE-2021-26401 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0002">CVE-2022-0002 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26356/">CVE-2022-26356 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26356">CVE-2022-26356 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26357/">CVE-2022-26357 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26357">CVE-2022-26357 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26358/">CVE-2022-26358 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26358">CVE-2022-26358 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26359/">CVE-2022-26359 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26359">CVE-2022-26359 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26360/">CVE-2022-26360 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26360">CVE-2022-26360 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26361/">CVE-2022-26361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26361">CVE-2022-26361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680580" comment="xen-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680581" comment="xen-doc-html-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680582" comment="xen-libs-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680583" comment="xen-libs-32bit-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680584" comment="xen-tools-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680585" comment="xen-tools-domU-4.9.4_28-3.103.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150967" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1194019" ref_url="https://bugzilla.suse.com/1194019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8518" ref_url="https://www.suse.com/security/cve/CVE-2018-8518/" source="CVE"/>
		<reference ref_id="CVE-2018-8523" ref_url="https://www.suse.com/security/cve/CVE-2018-8523/" source="CVE"/>
		<reference ref_id="CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551/" source="CVE"/>
		<reference ref_id="CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558/" source="CVE"/>
		<reference ref_id="CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559/" source="CVE"/>
		<reference ref_id="CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563/" source="CVE"/>
		<reference ref_id="CVE-2019-8674" ref_url="https://www.suse.com/security/cve/CVE-2019-8674/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<reference ref_id="CVE-2019-8707" ref_url="https://www.suse.com/security/cve/CVE-2019-8707/" source="CVE"/>
		<reference ref_id="CVE-2019-8719" ref_url="https://www.suse.com/security/cve/CVE-2019-8719/" source="CVE"/>
		<reference ref_id="CVE-2019-8726" ref_url="https://www.suse.com/security/cve/CVE-2019-8726/" source="CVE"/>
		<reference ref_id="CVE-2019-8733" ref_url="https://www.suse.com/security/cve/CVE-2019-8733/" source="CVE"/>
		<reference ref_id="CVE-2019-8763" ref_url="https://www.suse.com/security/cve/CVE-2019-8763/" source="CVE"/>
		<reference ref_id="CVE-2019-8765" ref_url="https://www.suse.com/security/cve/CVE-2019-8765/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8768" ref_url="https://www.suse.com/security/cve/CVE-2019-8768/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8821" ref_url="https://www.suse.com/security/cve/CVE-2019-8821/" source="CVE"/>
		<reference ref_id="CVE-2019-8822" ref_url="https://www.suse.com/security/cve/CVE-2019-8822/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-3885" ref_url="https://www.suse.com/security/cve/CVE-2020-3885/" source="CVE"/>
		<reference ref_id="CVE-2020-3894" ref_url="https://www.suse.com/security/cve/CVE-2020-3894/" source="CVE"/>
		<reference ref_id="CVE-2020-3895" ref_url="https://www.suse.com/security/cve/CVE-2020-3895/" source="CVE"/>
		<reference ref_id="CVE-2020-3897" ref_url="https://www.suse.com/security/cve/CVE-2020-3897/" source="CVE"/>
		<reference ref_id="CVE-2020-3900" ref_url="https://www.suse.com/security/cve/CVE-2020-3900/" source="CVE"/>
		<reference ref_id="CVE-2020-3901" ref_url="https://www.suse.com/security/cve/CVE-2020-3901/" source="CVE"/>
		<reference ref_id="CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9952" ref_url="https://www.suse.com/security/cve/CVE-2020-9952/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1817" ref_url="https://www.suse.com/security/cve/CVE-2021-1817/" source="CVE"/>
		<reference ref_id="CVE-2021-1820" ref_url="https://www.suse.com/security/cve/CVE-2021-1820/" source="CVE"/>
		<reference ref_id="CVE-2021-1825" ref_url="https://www.suse.com/security/cve/CVE-2021-1825/" source="CVE"/>
		<reference ref_id="CVE-2021-1826" ref_url="https://www.suse.com/security/cve/CVE-2021-1826/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="CVE-2021-30661" ref_url="https://www.suse.com/security/cve/CVE-2021-30661/" source="CVE"/>
		<reference ref_id="CVE-2021-30666" ref_url="https://www.suse.com/security/cve/CVE-2021-30666/" source="CVE"/>
		<reference ref_id="CVE-2021-30682" ref_url="https://www.suse.com/security/cve/CVE-2021-30682/" source="CVE"/>
		<reference ref_id="CVE-2021-30761" ref_url="https://www.suse.com/security/cve/CVE-2021-30761/" source="CVE"/>
		<reference ref_id="CVE-2021-30762" ref_url="https://www.suse.com/security/cve/CVE-2021-30762/" source="CVE"/>
		<reference ref_id="CVE-2021-30809" ref_url="https://www.suse.com/security/cve/CVE-2021-30809/" source="CVE"/>
		<reference ref_id="CVE-2021-30818" ref_url="https://www.suse.com/security/cve/CVE-2021-30818/" source="CVE"/>
		<reference ref_id="CVE-2021-30823" ref_url="https://www.suse.com/security/cve/CVE-2021-30823/" source="CVE"/>
		<reference ref_id="CVE-2021-30836" ref_url="https://www.suse.com/security/cve/CVE-2021-30836/" source="CVE"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30848" ref_url="https://www.suse.com/security/cve/CVE-2021-30848/" source="CVE"/>
		<reference ref_id="CVE-2021-30849" ref_url="https://www.suse.com/security/cve/CVE-2021-30849/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="CVE-2021-30884" ref_url="https://www.suse.com/security/cve/CVE-2021-30884/" source="CVE"/>
		<reference ref_id="CVE-2021-30887" ref_url="https://www.suse.com/security/cve/CVE-2021-30887/" source="CVE"/>
		<reference ref_id="CVE-2021-30888" ref_url="https://www.suse.com/security/cve/CVE-2021-30888/" source="CVE"/>
		<reference ref_id="CVE-2021-30889" ref_url="https://www.suse.com/security/cve/CVE-2021-30889/" source="CVE"/>
		<reference ref_id="CVE-2021-30890" ref_url="https://www.suse.com/security/cve/CVE-2021-30890/" source="CVE"/>
		<reference ref_id="CVE-2021-30897" ref_url="https://www.suse.com/security/cve/CVE-2021-30897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.34.3 (bsc#1194019).
- CVE-2021-30887: Fixed logic issue allowing unexpectedly unenforced Content Security Policy when processing maliciously crafted web content.
- CVE-2021-30890: Fixed logic issue allowing universal cross site scripting when processing maliciously crafted web content.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8518/">CVE-2018-8518 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8518">CVE-2018-8518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8523/">CVE-2018-8523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-8523">CVE-2018-8523 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8551">CVE-2019-8551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8558">CVE-2019-8558 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8559">CVE-2019-8559 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8563">CVE-2019-8563 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8674/">CVE-2019-8674 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8674">CVE-2019-8674 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8681">CVE-2019-8681 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8684">CVE-2019-8684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8687">CVE-2019-8687 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8688">CVE-2019-8688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8689">CVE-2019-8689 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8690">CVE-2019-8690 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8707/">CVE-2019-8707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8707">CVE-2019-8707 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8719/">CVE-2019-8719 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8719">CVE-2019-8719 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8726/">CVE-2019-8726 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8726">CVE-2019-8726 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8733/">CVE-2019-8733 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8733">CVE-2019-8733 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8763/">CVE-2019-8763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8763">CVE-2019-8763 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8765/">CVE-2019-8765 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8765">CVE-2019-8765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8766">CVE-2019-8766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8768/">CVE-2019-8768 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8768">CVE-2019-8768 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8782">CVE-2019-8782 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8808">CVE-2019-8808 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8815">CVE-2019-8815 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8821/">CVE-2019-8821 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8821">CVE-2019-8821 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8822/">CVE-2019-8822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8822">CVE-2019-8822 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10018">CVE-2020-10018 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13753">CVE-2020-13753 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27918">CVE-2020-27918 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29623">CVE-2020-29623 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3885/">CVE-2020-3885 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3885">CVE-2020-3885 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3894/">CVE-2020-3894 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3894">CVE-2020-3894 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3895/">CVE-2020-3895 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3895">CVE-2020-3895 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3897/">CVE-2020-3897 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3897">CVE-2020-3897 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3900/">CVE-2020-3900 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3900">CVE-2020-3900 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3901/">CVE-2020-3901 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3901">CVE-2020-3901 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3902">CVE-2020-3902 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9802">CVE-2020-9802 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9803">CVE-2020-9803 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9805">CVE-2020-9805 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9947">CVE-2020-9947 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9948">CVE-2020-9948 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9951">CVE-2020-9951 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-9952/">CVE-2020-9952 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9952">CVE-2020-9952 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1765">CVE-2021-1765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1788">CVE-2021-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1817/">CVE-2021-1817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1817">CVE-2021-1817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1820/">CVE-2021-1820 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1820">CVE-2021-1820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1825/">CVE-2021-1825 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1825">CVE-2021-1825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1826/">CVE-2021-1826 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1826">CVE-2021-1826 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1844">CVE-2021-1844 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1871">CVE-2021-1871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30661/">CVE-2021-30661 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30661">CVE-2021-30661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30666/">CVE-2021-30666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30666">CVE-2021-30666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30682/">CVE-2021-30682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30682">CVE-2021-30682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30761/">CVE-2021-30761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30761">CVE-2021-30761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30762/">CVE-2021-30762 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30762">CVE-2021-30762 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30809/">CVE-2021-30809 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30809">CVE-2021-30809 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30818/">CVE-2021-30818 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30818">CVE-2021-30818 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30823/">CVE-2021-30823 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30823">CVE-2021-30823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30836/">CVE-2021-30836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30836">CVE-2021-30836 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30846">CVE-2021-30846 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30848/">CVE-2021-30848 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30848">CVE-2021-30848 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30849/">CVE-2021-30849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30849">CVE-2021-30849 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30851">CVE-2021-30851 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30858">CVE-2021-30858 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30884/">CVE-2021-30884 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30884">CVE-2021-30884 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30887/">CVE-2021-30887 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30887">CVE-2021-30887 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30888/">CVE-2021-30888 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30888">CVE-2021-30888 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30889/">CVE-2021-30889 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30889">CVE-2021-30889 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30890/">CVE-2021-30890 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30890">CVE-2021-30890 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30897/">CVE-2021-30897 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30897">CVE-2021-30897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150968" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1197216" ref_url="https://bugzilla.suse.com/1197216" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010844.html" source="SUSE-SU"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2022-27239: Fixed a buffer overflow in the command line ip option (bsc#1197216).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197216">SUSE bug 1197216</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27239">CVE-2022-27239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681235" comment="cifs-utils-6.9-9.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150969" version="1" class="patch">
	<metadata>
		<title>Security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1194735" ref_url="https://bugzilla.suse.com/1194735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010044.html" source="SUSE-SU"/>
		<description>
This update for aide fixes the following issues:

- CVE-2021-45417: Fix a bufferoverflow in base64 functions (bsc#1194735)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45417">CVE-2021-45417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664239" comment="aide-0.16-20.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150970" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.1.0 ESR.

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-09"/>
	<updated date="2022-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29981">CVE-2021-29981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29982">CVE-2021-29982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29983">CVE-2021-29983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29987">CVE-2021-29987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29990">CVE-2021-29990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29991">CVE-2021-29991 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38492">CVE-2021-38492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38495">CVE-2021-38495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682635" comment="MozillaFirefox-91.9.0-112.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682636" comment="MozillaFirefox-devel-91.9.0-112.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682637" comment="MozillaFirefox-translations-common-91.9.0-112.104.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150971" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1107294" ref_url="https://bugzilla.suse.com/1107294" source="BUGZILLA"/>
		<reference ref_id="1107296" ref_url="https://bugzilla.suse.com/1107296" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0502" ref_url="https://www.suse.com/security/cve/CVE-2018-0502/" source="CVE"/>
		<reference ref_id="CVE-2018-13259" ref_url="https://www.suse.com/security/cve/CVE-2018-13259/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010048.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2018-0502: Fixed execve call vulnerability to program named on the second line when the beginning of a #! script file was mishandled. (bsc#1107296, bsc#1107294)
- CVE-2018-13259: Fixed execve call vulnerability to program name that is a substring of the intended one. (bsc#1107296, bsc#1107294)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-24"/>
	<updated date="2022-01-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107294">SUSE bug 1107294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107296">SUSE bug 1107296</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0502/">CVE-2018-0502 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0502">CVE-2018-0502 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13259/">CVE-2018-13259 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13259">CVE-2018-13259 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663987" comment="zsh-5.0.5-6.12.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150972" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1197135" ref_url="https://bugzilla.suse.com/1197135" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011206.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25220: Fixed potentially incorrect answers by cached forwarders (bsc#1197135).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197135">SUSE bug 1197135</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25220">CVE-2021-25220 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682675" comment="bind-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682676" comment="bind-chrootenv-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682677" comment="bind-doc-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682678" comment="bind-libs-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682679" comment="bind-libs-32bit-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682680" comment="bind-utils-9.9.9P1-63.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150973" version="1" class="patch">
	<metadata>
		<title>Security update for e2fsprogs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1198446" ref_url="https://bugzilla.suse.com/1198446" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1304" ref_url="https://www.suse.com/security/cve/CVE-2022-1304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010997.html" source="SUSE-SU"/>
		<description>
This update for e2fsprogs fixes the following issues:

- CVE-2022-1304: Fixed out-of-bounds read/write leading to segmentation fault
  and possibly arbitrary code execution. (bsc#1198446)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-12"/>
	<updated date="2022-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198446">SUSE bug 1198446</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1304/">CVE-2022-1304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">CVE-2022-1304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682319" comment="e2fsprogs-1.42.11-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682320" comment="libcom_err2-1.42.11-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682310" comment="libcom_err2-32bit-1.42.11-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682321" comment="libext2fs2-1.42.11-16.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150974" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188568" ref_url="https://bugzilla.suse.com/1188568" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2432" ref_url="https://www.suse.com/security/cve/CVE-2021-2432/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 5 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2432: Fixed a vulnerability in the omponent JNDI. (bsc#1188568)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-24"/>
	<updated date="2022-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188568">SUSE bug 1188568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-2432/">CVE-2021-2432 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2432">CVE-2021-2432 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41035">CVE-2021-41035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662499" comment="java-1_7_1-ibm-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662487" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662500" comment="java-1_7_1-ibm-devel-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662501" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662490" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.0-38.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150975" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1198383" ref_url="https://bugzilla.suse.com/1198383" source="BUGZILLA"/>
		<reference ref_id="1199240" ref_url="https://bugzilla.suse.com/1199240" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29155" ref_url="https://www.suse.com/security/cve/CVE-2022-29155/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011023.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2022-29155: Fixed SQL injection in back-sql (bsc#1199240).
- Fixed issue with SASL init that crashed slapd at startup under certain conditions (bsc#1198383).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198383">SUSE bug 1198383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199240">SUSE bug 1199240</bugzilla>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29155/">CVE-2022-29155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29155">CVE-2022-29155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682642" comment="libldap-2_4-2-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682621" comment="libldap-2_4-2-32bit-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682643" comment="openldap2-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682644" comment="openldap2-back-meta-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682645" comment="openldap2-client-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682625" comment="openldap2-doc-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682659" comment="openldap2-ppolicy-check-password-1.2-18.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150976" version="1" class="patch">
	<metadata>
		<title>Security update for gzip (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011029.html" source="SUSE-SU"/>
		<description>
This update for gzip fixes the following issues:

- CVE-2022-1271: Add hardening for zgrep. (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682638" comment="gzip-1.6-9.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150977" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="1198290" ref_url="https://bugzilla.suse.com/1198290" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<reference ref_id="CVE-2022-22624" ref_url="https://www.suse.com/security/cve/CVE-2022-22624/" source="CVE"/>
		<reference ref_id="CVE-2022-22628" ref_url="https://www.suse.com/security/cve/CVE-2022-22628/" source="CVE"/>
		<reference ref_id="CVE-2022-22629" ref_url="https://www.suse.com/security/cve/CVE-2022-22629/" source="CVE"/>
		<reference ref_id="CVE-2022-22637" ref_url="https://www.suse.com/security/cve/CVE-2022-22637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011016.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.0 (bsc#1198290):

- CVE-2022-22624: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22628: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22629: Fixed a buffer overflow that may lead to arbitrary code execution.
- CVE-2022-22637: Fixed an unexpected cross-origin behavior due to a logic error.

Missing CVE reference for the update to 2.34.6 (bsc#1196133):

- CVE-2022-22594: Fixed a cross-origin issue in the IndexDB API.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198290">SUSE bug 1198290</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22594">CVE-2022-22594 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22624/">CVE-2022-22624 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22624">CVE-2022-22624 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22628/">CVE-2022-22628 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22628">CVE-2022-22628 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22629/">CVE-2022-22629 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22629">CVE-2022-22629 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22637/">CVE-2022-22637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22637">CVE-2022-22637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681316" comment="libjavascriptcoregtk-4_0-18-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681317" comment="libwebkit2gtk-4_0-37-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681318" comment="typelib-1_0-JavaScriptCore-4_0-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681319" comment="typelib-1_0-WebKit2-4_0-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681321" comment="webkit2gtk-4_0-injected-bundles-2.36.0-2.96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150978" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1199223" ref_url="https://bugzilla.suse.com/1199223" source="BUGZILLA"/>
		<reference ref_id="1199224" ref_url="https://bugzilla.suse.com/1199224" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27781" ref_url="https://www.suse.com/security/cve/CVE-2022-27781/" source="CVE"/>
		<reference ref_id="CVE-2022-27782" ref_url="https://www.suse.com/security/cve/CVE-2022-27782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011074.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-27781: Fixed CERTINFO never-ending busy-loop (bsc#1199223)
- CVE-2022-27782: Fixed TLS and SSH connection too eager reuse (bsc#1199224)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-18"/>
	<updated date="2022-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199223">SUSE bug 1199223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199224">SUSE bug 1199224</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-27781/">CVE-2022-27781 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27781">CVE-2022-27781 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27782/">CVE-2022-27782 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27782">CVE-2022-27782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684081" comment="curl-7.37.0-37.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684082" comment="libcurl4-7.37.0-37.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684074" comment="libcurl4-32bit-7.37.0-37.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150979" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1198717" ref_url="https://bugzilla.suse.com/1198717" source="BUGZILLA"/>
		<reference ref_id="1199423" ref_url="https://bugzilla.suse.com/1199423" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21151" ref_url="https://www.suse.com/security/cve/CVE-2022-21151/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011092.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220510 release. (bsc#1199423)
Updated to Intel CPU Microcode 20220419 release. (bsc#1198717)

- CVE-2022-21151: Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access (bsc#1199423).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198717">SUSE bug 1198717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199423">SUSE bug 1199423</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21151/">CVE-2022-21151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21151">CVE-2022-21151 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683677" comment="ucode-intel-20220510-13.97.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150980" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1198970" ref_url="https://bugzilla.suse.com/1198970" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909/" source="CVE"/>
		<reference ref_id="CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911/" source="CVE"/>
		<reference ref_id="CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912/" source="CVE"/>
		<reference ref_id="CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914/" source="CVE"/>
		<reference ref_id="CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916/" source="CVE"/>
		<reference ref_id="CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.9.0 ESR (MFSA 2022-17)(bsc#1198970):

- CVE-2022-29914: Fullscreen notification bypass using popups
- CVE-2022-29909: Bypassing permission prompt in nested browsing contexts
- CVE-2022-29916: Leaking browser history with CSS variables
- CVE-2022-29911: iframe Sandbox bypass
- CVE-2022-29912: Reader mode bypassed SameSite cookies
- CVE-2022-29917: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29909">CVE-2022-29909 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29911">CVE-2022-29911 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29912">CVE-2022-29912 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29914">CVE-2022-29914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29916">CVE-2022-29916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29917">CVE-2022-29917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684083" comment="MozillaFirefox-91.9.0-112.108.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684084" comment="MozillaFirefox-devel-91.9.0-112.108.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684085" comment="MozillaFirefox-translations-common-91.9.0-112.108.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150981" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1194251" ref_url="https://bugzilla.suse.com/1194251" source="BUGZILLA"/>
		<reference ref_id="1194362" ref_url="https://bugzilla.suse.com/1194362" source="BUGZILLA"/>
		<reference ref_id="1194474" ref_url="https://bugzilla.suse.com/1194474" source="BUGZILLA"/>
		<reference ref_id="1194476" ref_url="https://bugzilla.suse.com/1194476" source="BUGZILLA"/>
		<reference ref_id="1194477" ref_url="https://bugzilla.suse.com/1194477" source="BUGZILLA"/>
		<reference ref_id="1194478" ref_url="https://bugzilla.suse.com/1194478" source="BUGZILLA"/>
		<reference ref_id="1194479" ref_url="https://bugzilla.suse.com/1194479" source="BUGZILLA"/>
		<reference ref_id="1194480" ref_url="https://bugzilla.suse.com/1194480" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2021-45960: Fixed left shift in the storeAtts function in xmlparse.c that can lead to realloc misbehavior (bsc#1194251).
- CVE-2021-46143: Fixed integer overflow in m_groupSize in doProlog (bsc#1194362).
- CVE-2022-22822: Fixed integer overflow in addBinding in xmlparse.c (bsc#1194474).
- CVE-2022-22823: Fixed integer overflow in build_model in xmlparse.c (bsc#1194476).
- CVE-2022-22824: Fixed integer overflow in defineAttribute in xmlparse.c (bsc#1194477).
- CVE-2022-22825: Fixed integer overflow in lookup in xmlparse.c (bsc#1194478).
- CVE-2022-22826: Fixed integer overflow in nextScaffoldPart in xmlparse.c (bsc#1194479).
- CVE-2022-22827: Fixed integer overflow in storeAtts in xmlparse.c (bsc#1194480).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">CVE-2021-45960 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">CVE-2021-46143 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">CVE-2022-22825 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">CVE-2022-22826 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">CVE-2022-22827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664107" comment="expat-2.1.0-21.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664108" comment="libexpat1-2.1.0-21.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664105" comment="libexpat1-32bit-2.1.0-21.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150982" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1199475" ref_url="https://bugzilla.suse.com/1199475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011129.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:
 
- CVE-2022-1552: Confine additional operations within 'security restricted operation' sandboxes (bsc#1199475).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199475">SUSE bug 1199475</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696333" comment="postgresql10-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696334" comment="postgresql10-contrib-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696064" comment="postgresql10-docs-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696335" comment="postgresql10-plperl-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696336" comment="postgresql10-plpython-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696337" comment="postgresql10-pltcl-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696338" comment="postgresql10-server-10.21-4.28.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150983" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1199768" ref_url="https://bugzilla.suse.com/1199768" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1529" ref_url="https://www.suse.com/security/cve/CVE-2022-1529/" source="CVE"/>
		<reference ref_id="CVE-2022-1802" ref_url="https://www.suse.com/security/cve/CVE-2022-1802/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011131.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.9.1 ESR - MFSA 2022-19 (bsc#1199768):

- CVE-2022-1802: Prototype pollution in Top-Level Await implementation
- CVE-2022-1529: Untrusted input used in JavaScript object indexing, leading to prototype pollution
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199768">SUSE bug 1199768</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1529/">CVE-2022-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1529">CVE-2022-1529 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1802/">CVE-2022-1802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1802">CVE-2022-1802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696339" comment="MozillaFirefox-91.9.1-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696340" comment="MozillaFirefox-devel-91.9.1-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696341" comment="MozillaFirefox-translations-common-91.9.1-112.111.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150984" version="1" class="patch">
	<metadata>
		<title>Security update for python-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011137.html" source="SUSE-SU"/>
		<description>
This update for python-requests fixes the following issues:

- CVE-2018-18074: Fixed to prevent the package to send an HTTP Authorization header to an http URI
  upon receiving a same-hostname https-to-http redirect. (bsc#1111622) 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595040" comment="python-requests-2.11.1-6.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150985" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1069689" ref_url="https://bugzilla.suse.com/1069689" source="BUGZILLA"/>
		<reference ref_id="1199132" ref_url="https://bugzilla.suse.com/1199132" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16932" ref_url="https://www.suse.com/security/cve/CVE-2017-16932/" source="CVE"/>
		<reference ref_id="CVE-2022-29824" ref_url="https://www.suse.com/security/cve/CVE-2022-29824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011148.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-29824: Fixed integer overflow leading to out-of-bounds write in buf.c and tree.c (bsc#1199132).
- CVE-2017-16932: Prevent infinite recursion in parameter entities (bsc#1069689).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-24"/>
	<updated date="2022-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1069689">SUSE bug 1069689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199132">SUSE bug 1199132</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16932/">CVE-2017-16932 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16932">CVE-2017-16932 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29824/">CVE-2022-29824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824">CVE-2022-29824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696342" comment="libxml2-2-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696073" comment="libxml2-2-32bit-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696074" comment="libxml2-doc-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696343" comment="libxml2-tools-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696344" comment="python-libxml2-2.9.4-46.54.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150986" version="1" class="patch">
	<metadata>
		<title>Security update for pcre2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1199232" ref_url="https://bugzilla.suse.com/1199232" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1586" ref_url="https://www.suse.com/security/cve/CVE-2022-1586/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011157.html" source="SUSE-SU"/>
		<description>
This update for pcre2 fixes the following issues:

- CVE-2022-1586: Fixed out-of-bounds read via missing Unicode property matching issue in JIT compiled regular expressions (bsc#1199232).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-25"/>
	<updated date="2022-05-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199232">SUSE bug 1199232</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1586/">CVE-2022-1586 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">CVE-2022-1586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696345" comment="libpcre2-16-0-10.34-1.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696346" comment="libpcre2-32-0-10.34-1.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696347" comment="libpcre2-8-0-10.34-1.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696348" comment="libpcre2-posix2-10.34-1.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150987" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1131644" ref_url="https://bugzilla.suse.com/1131644" source="BUGZILLA"/>
		<reference ref_id="1131868" ref_url="https://bugzilla.suse.com/1131868" source="BUGZILLA"/>
		<reference ref_id="1131870" ref_url="https://bugzilla.suse.com/1131870" source="BUGZILLA"/>
		<reference ref_id="1131871" ref_url="https://bugzilla.suse.com/1131871" source="BUGZILLA"/>
		<reference ref_id="1131872" ref_url="https://bugzilla.suse.com/1131872" source="BUGZILLA"/>
		<reference ref_id="1131874" ref_url="https://bugzilla.suse.com/1131874" source="BUGZILLA"/>
		<reference ref_id="1133640" ref_url="https://bugzilla.suse.com/1133640" source="BUGZILLA"/>
		<reference ref_id="1144443" ref_url="https://bugzilla.suse.com/1144443" source="BUGZILLA"/>
		<reference ref_id="1156920" ref_url="https://bugzilla.suse.com/1156920" source="BUGZILLA"/>
		<reference ref_id="1165266" ref_url="https://bugzilla.suse.com/1165266" source="BUGZILLA"/>
		<reference ref_id="1166933" ref_url="https://bugzilla.suse.com/1166933" source="BUGZILLA"/>
		<reference ref_id="1167331" ref_url="https://bugzilla.suse.com/1167331" source="BUGZILLA"/>
		<reference ref_id="1182805" ref_url="https://bugzilla.suse.com/1182805" source="BUGZILLA"/>
		<reference ref_id="1194732" ref_url="https://bugzilla.suse.com/1194732" source="BUGZILLA"/>
		<reference ref_id="1194733" ref_url="https://bugzilla.suse.com/1194733" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8041" ref_url="https://www.suse.com/security/cve/CVE-2015-8041/" source="CVE"/>
		<reference ref_id="CVE-2017-13077" ref_url="https://www.suse.com/security/cve/CVE-2017-13077/" source="CVE"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-13082" ref_url="https://www.suse.com/security/cve/CVE-2017-13082/" source="CVE"/>
		<reference ref_id="CVE-2017-13086" ref_url="https://www.suse.com/security/cve/CVE-2017-13086/" source="CVE"/>
		<reference ref_id="CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087/" source="CVE"/>
		<reference ref_id="CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088/" source="CVE"/>
		<reference ref_id="CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526/" source="CVE"/>
		<reference ref_id="CVE-2019-11555" ref_url="https://www.suse.com/security/cve/CVE-2019-11555/" source="CVE"/>
		<reference ref_id="CVE-2019-13377" ref_url="https://www.suse.com/security/cve/CVE-2019-13377/" source="CVE"/>
		<reference ref_id="CVE-2019-9494" ref_url="https://www.suse.com/security/cve/CVE-2019-9494/" source="CVE"/>
		<reference ref_id="CVE-2019-9495" ref_url="https://www.suse.com/security/cve/CVE-2019-9495/" source="CVE"/>
		<reference ref_id="CVE-2019-9497" ref_url="https://www.suse.com/security/cve/CVE-2019-9497/" source="CVE"/>
		<reference ref_id="CVE-2019-9498" ref_url="https://www.suse.com/security/cve/CVE-2019-9498/" source="CVE"/>
		<reference ref_id="CVE-2019-9499" ref_url="https://www.suse.com/security/cve/CVE-2019-9499/" source="CVE"/>
		<reference ref_id="CVE-2022-23303" ref_url="https://www.suse.com/security/cve/CVE-2022-23303/" source="CVE"/>
		<reference ref_id="CVE-2022-23304" ref_url="https://www.suse.com/security/cve/CVE-2022-23304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2022-23303, CVE-2022-23304: Fixed SAE/EAP-pwd side-channel attacks (bsc#1194732, bsc#1194733)
- CVE-2021-0326: Fixed P2P group information processing vulnerability (bsc#1181777)

- Fix systemd device ready dependencies in wpa_supplicant@.service file. (bsc#1182805)

- Limit P2P_DEVICE name to appropriate ifname size
- Enable SAE support(jsc#SLE-14992).
- Fix wicked wlan (bsc#1156920)
- Change wpa_supplicant.service to ensure wpa_supplicant gets started before
  network. Fix WLAN config on boot with wicked. (bsc#1166933)

- Adjust the service to start after network.target wrt bsc#1165266

Update to 2.9 release:

* SAE changes
  - disable use of groups using Brainpool curves
  - improved protection against side channel attacks
  [https://w1.fi/security/2019-6/]
* EAP-pwd changes
  - disable use of groups using Brainpool curves
  - allow the set of groups to be configured (eap_pwd_groups)
  - improved protection against side channel attacks
  [https://w1.fi/security/2019-6/]
* fixed FT-EAP initial mobility domain association using PMKSA caching
  (disabled by default for backwards compatibility; can be enabled
  with ft_eap_pmksa_caching=1)
* fixed a regression in OpenSSL 1.1+ engine loading
* added validation of RSNE in (Re)Association Response frames
* fixed DPP bootstrapping URI parser of channel list
* extended EAP-SIM/AKA fast re-authentication to allow use with FILS
* extended ca_cert_blob to support PEM format
* improved robustness of P2P Action frame scheduling
* added support for EAP-SIM/AKA using anonymous@realm identity
* fixed Hotspot 2.0 credential selection based on roaming consortium
  to ignore credentials without a specific EAP method
* added experimental support for EAP-TEAP peer (RFC 7170)
* added experimental support for EAP-TLS peer with TLS v1.3
* fixed a regression in WMM parameter configuration for a TDLS peer
* fixed a regression in operation with drivers that offload 802.1X
  4-way handshake
* fixed an ECDH operation corner case with OpenSSL
* SAE changes
  - added support for SAE Password Identifier
  - changed default configuration to enable only groups 19, 20, 21
    (i.e., disable groups 25 and 26) and disable all unsuitable groups
    completely based on REVmd changes
  - do not regenerate PWE unnecessarily when the AP uses the
    anti-clogging token mechanisms
  - fixed some association cases where both SAE and FT-SAE were enabled
    on both the station and the selected AP
  - started to prefer FT-SAE over SAE AKM if both are enabled
  - started to prefer FT-SAE over FT-PSK if both are enabled
  - fixed FT-SAE when SAE PMKSA caching is used
  - reject use of unsuitable groups based on new implementation guidance
    in REVmd (allow only FFC groups with prime &gt;= 3072 bits and ECC
    groups with prime &gt;= 256)
  - minimize timing and memory use differences in PWE derivation
    [https://w1.fi/security/2019-1/] (CVE-2019-9494, bsc#1131868)
* EAP-pwd changes
  - minimize timing and memory use differences in PWE derivation
    [https://w1.fi/security/2019-2/] (CVE-2019-9495, bsc#1131870)
  - verify server scalar/element
    [https://w1.fi/security/2019-4/] (CVE-2019-9497, CVE-2019-9498,
    CVE-2019-9499, bsc#1131874, bsc#1131872, bsc#1131871, bsc#1131644)
  - fix message reassembly issue with unexpected fragment
    [https://w1.fi/security/2019-5/] (CVE-2019-11555, bsc#1133640)
  - enforce rand,mask generation rules more strictly
  - fix a memory leak in PWE derivation
  - disallow ECC groups with a prime under 256 bits (groups 25, 26, and
    27)
  - SAE/EAP-pwd side-channel attack update
    [https://w1.fi/security/2019-6/] (CVE-2019-13377, bsc#1144443)
* fixed CONFIG_IEEE80211R=y (FT) build without CONFIG_FILS=y
* Hotspot 2.0 changes
  - do not indicate release number that is higher than the one
    AP supports
  - added support for release number 3
  - enable PMF automatically for network profiles created from
    credentials
* fixed OWE network profile saving
* fixed DPP network profile saving
* added support for RSN operating channel validation
  (CONFIG_OCV=y and network profile parameter ocv=1)
* added Multi-AP backhaul STA support
* fixed build with LibreSSL
* number of MKA/MACsec fixes and extensions
* extended domain_match and domain_suffix_match to allow list of values
* fixed dNSName matching in domain_match and domain_suffix_match when
  using wolfSSL
* started to prefer FT-EAP-SHA384 over WPA-EAP-SUITE-B-192 AKM if both
  are enabled
* extended nl80211 Connect and external authentication to support
  SAE, FT-SAE, FT-EAP-SHA384
* fixed KEK2 derivation for FILS+FT
* extended client_cert file to allow loading of a chain of PEM
  encoded certificates
* extended beacon reporting functionality
* extended D-Bus interface with number of new properties
* fixed a regression in FT-over-DS with mac80211-based drivers
* OpenSSL: allow systemwide policies to be overridden
* extended driver flags indication for separate 802.1X and PSK
  4-way handshake offload capability
* added support for random P2P Device/Interface Address use
* extended PEAP to derive EMSK to enable use with ERP/FILS
* extended WPS to allow SAE configuration to be added automatically
  for PSK (wps_cred_add_sae=1)
* removed support for the old D-Bus interface (CONFIG_CTRL_IFACE_DBUS)
* extended domain_match and domain_suffix_match to allow list of values
* added a RSN workaround for misbehaving PMF APs that advertise
  IGTK/BIP KeyID using incorrect byte order
* fixed PTK rekeying with FILS and FT
* fixed WPA packet number reuse with replayed messages and key
  reinstallation
  [https://w1.fi/security/2017-1/] (CVE-2017-13077, CVE-2017-13078,
  CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082,
  CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)
* fixed unauthenticated EAPOL-Key decryption in wpa_supplicant
  [https://w1.fi/security/2018-1/] (CVE-2018-14526)
* added support for FILS (IEEE 802.11ai) shared key authentication
* added support for OWE (Opportunistic Wireless Encryption, RFC 8110;
  and transition mode defined by WFA)
* added support for DPP (Wi-Fi Device Provisioning Protocol)
* added support for RSA 3k key case with Suite B 192-bit level
* fixed Suite B PMKSA caching not to update PMKID during each 4-way
  handshake
* fixed EAP-pwd pre-processing with PasswordHashHash
* added EAP-pwd client support for salted passwords
* fixed a regression in TDLS prohibited bit validation
* started to use estimated throughput to avoid undesired signal
  strength based roaming decision
* MACsec/MKA:
  - new macsec_linux driver interface support for the Linux
    kernel macsec module
  - number of fixes and extensions
* added support for external persistent storage of PMKSA cache
  (PMKSA_GET/PMKSA_ADD control interface commands; and
   MESH_PMKSA_GET/MESH_PMKSA_SET for the mesh case)
* fixed mesh channel configuration pri/sec switch case
* added support for beacon report
* large number of other fixes, cleanup, and extensions
* added support for randomizing local address for GAS queries
  (gas_rand_mac_addr parameter)
* fixed EAP-SIM/AKA/AKA' ext auth cases within TLS tunnel
* added option for using random WPS UUID (auto_uuid=1)
* added SHA256-hash support for OCSP certificate matching
* fixed EAP-AKA' to add AT_KDF into Synchronization-Failure
* fixed a regression in RSN pre-authentication candidate selection
* added option to configure allowed group management cipher suites
  (group_mgmt network profile parameter)
* removed all PeerKey functionality
* fixed nl80211 AP and mesh mode configuration regression with
  Linux 4.15 and newer
* added ap_isolate configuration option for AP mode
* added support for nl80211 to offload 4-way handshake into the driver
* added support for using wolfSSL cryptographic library
* SAE
  - added support for configuring SAE password separately of the
    WPA2 PSK/passphrase
  - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection
    for SAE;
    note: this is not backwards compatible, i.e., both the AP and
    station side implementations will need to be update at the same
    time to maintain interoperability
  - added support for Password Identifier
  - fixed FT-SAE PMKID matching
* Hotspot 2.0
  - added support for fetching of Operator Icon Metadata ANQP-element
  - added support for Roaming Consortium Selection element
  - added support for Terms and Conditions
  - added support for OSEN connection in a shared RSN BSS
  - added support for fetching Venue URL information
* added support for using OpenSSL 1.1.1
* FT
  - disabled PMKSA caching with FT since it is not fully functional
  - added support for SHA384 based AKM
  - added support for BIP ciphers BIP-CMAC-256, BIP-GMAC-128,
    BIP-GMAC-256 in addition to previously supported BIP-CMAC-128
  - fixed additional IE inclusion in Reassociation Request frame when
    using FT protocol

- CVE-2015-8041: Using O_WRONLY flag [http://w1.fi/security/2015-5/]		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-26"/>
	<updated date="2022-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131644">SUSE bug 1131644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131868">SUSE bug 1131868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131870">SUSE bug 1131870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131871">SUSE bug 1131871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131872">SUSE bug 1131872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131874">SUSE bug 1131874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133640">SUSE bug 1133640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144443">SUSE bug 1144443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156920">SUSE bug 1156920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165266">SUSE bug 1165266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166933">SUSE bug 1166933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167331">SUSE bug 1167331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182805">SUSE bug 1182805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194732">SUSE bug 1194732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194733">SUSE bug 1194733</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8041/">CVE-2015-8041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8041">CVE-2015-8041 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13077/">CVE-2017-13077 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13077">CVE-2017-13077 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13078">CVE-2017-13078 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13079">CVE-2017-13079 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13081">CVE-2017-13081 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13082/">CVE-2017-13082 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13082">CVE-2017-13082 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13086/">CVE-2017-13086 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13086">CVE-2017-13086 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13087">CVE-2017-13087 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13088">CVE-2017-13088 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14526">CVE-2018-14526 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11555/">CVE-2019-11555 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11555">CVE-2019-11555 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13377/">CVE-2019-13377 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13377">CVE-2019-13377 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9494/">CVE-2019-9494 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9494">CVE-2019-9494 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9495/">CVE-2019-9495 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9495">CVE-2019-9495 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9497/">CVE-2019-9497 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9497">CVE-2019-9497 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9498/">CVE-2019-9498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9498">CVE-2019-9498 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9499/">CVE-2019-9499 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9499">CVE-2019-9499 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23303/">CVE-2022-23303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23303">CVE-2022-23303 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23304/">CVE-2022-23304 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23304">CVE-2022-23304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696349" comment="wpa_supplicant-2.9-15.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150988" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1199475" ref_url="https://bugzilla.suse.com/1199475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011173.html" source="SUSE-SU"/>
		<description>
This update for postgresql14 fixes the following issues:
 
- CVE-2022-1552: Confine additional operations within 'security restricted operation' sandboxes (bsc#1199475).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-27"/>
	<updated date="2022-05-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199475">SUSE bug 1199475</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696350" comment="libecpg6-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696351" comment="libpq5-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696084" comment="libpq5-32bit-14.3-3.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150989" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1198351" ref_url="https://bugzilla.suse.com/1198351" source="BUGZILLA"/>
		<reference ref_id="1199350" ref_url="https://bugzilla.suse.com/1199350" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1270" ref_url="https://www.suse.com/security/cve/CVE-2022-1270/" source="CVE"/>
		<reference ref_id="CVE-2022-28463" ref_url="https://www.suse.com/security/cve/CVE-2022-28463/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011200.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2022-1270: Fixed a memory corruption issue when parsing MIFF files (bsc#1198351).
- CVE-2022-28463: Fixed buffer overflow in coders/cin.c (bsc#1199350).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198351">SUSE bug 1198351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199350">SUSE bug 1199350</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-1270/">CVE-2022-1270 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1270">CVE-2022-1270 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28463/">CVE-2022-28463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28463">CVE-2022-28463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696352" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696353" comment="ImageMagick-config-6-upstream-6.8.8.1-71.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696354" comment="libMagickCore-6_Q16-1-6.8.8.1-71.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696355" comment="libMagickWand-6_Q16-1-6.8.8.1-71.172.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150990" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1191959" ref_url="https://bugzilla.suse.com/1191959" source="BUGZILLA"/>
		<reference ref_id="1192735" ref_url="https://bugzilla.suse.com/1192735" source="BUGZILLA"/>
		<reference ref_id="1192741" ref_url="https://bugzilla.suse.com/1192741" source="BUGZILLA"/>
		<reference ref_id="1193316" ref_url="https://bugzilla.suse.com/1193316" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42096" ref_url="https://www.suse.com/security/cve/CVE-2021-42096/" source="CVE"/>
		<reference ref_id="CVE-2021-43331" ref_url="https://www.suse.com/security/cve/CVE-2021-43331/" source="CVE"/>
		<reference ref_id="CVE-2021-43332" ref_url="https://www.suse.com/security/cve/CVE-2021-43332/" source="CVE"/>
		<reference ref_id="CVE-2021-44227" ref_url="https://www.suse.com/security/cve/CVE-2021-44227/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011201.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2021-44227: Preventing list moderator or list member accessing the admin UI (bsc#1193316).
- CVE-2021-43332: Preventing list moderator from cracking the list admin password encrypted in a CSRF token (bsc#1192741).
- CVE-2021-43331: Fixed XSS in Cgi/options.py (bsc#1192735).
- CVE-2021-42096: Add protection against remote privilege escalation via csrf_token derived from admin password (bsc#1191959).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191959">SUSE bug 1191959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192735">SUSE bug 1192735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192741">SUSE bug 1192741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193316">SUSE bug 1193316</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-42096/">CVE-2021-42096 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42096">CVE-2021-42096 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43331/">CVE-2021-43331 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43331">CVE-2021-43331 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43332/">CVE-2021-43332 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43332">CVE-2021-43332 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-44227/">CVE-2021-44227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44227">CVE-2021-44227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696356" comment="mailman-2.1.17-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150991" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1194568" ref_url="https://bugzilla.suse.com/1194568" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4034" ref_url="https://www.suse.com/security/cve/CVE-2021-4034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010074.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-4034: Fixed a local privilege escalation in pkexec (bsc#1194568).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194568">SUSE bug 1194568</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4034/">CVE-2021-4034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4034">CVE-2021-4034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664690" comment="libpolkit0-0.113-5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664691" comment="polkit-0.113-5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664692" comment="typelib-1_0-Polkit-1_0-0.113-5.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150992" version="1" class="patch">
	<metadata>
		<title>Security update for librelp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1086730" ref_url="https://bugzilla.suse.com/1086730" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000140" ref_url="https://www.suse.com/security/cve/CVE-2018-1000140/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011210.html" source="SUSE-SU"/>
		<description>
This update for librelp fixes the following issues:

- CVE-2018-1000140: Fixed remote attack via specially crafted x509 certificates when connecting to rsyslog to trigger a stack buffer overflow and run arbitrary code (bsc#1086730).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086730">SUSE bug 1086730</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000140/">CVE-2018-1000140 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000140">CVE-2018-1000140 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696535" comment="librelp0-1.2.15-3.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150993" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1200027" ref_url="https://bugzilla.suse.com/1200027" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31736" ref_url="https://www.suse.com/security/cve/CVE-2022-31736/" source="CVE"/>
		<reference ref_id="CVE-2022-31737" ref_url="https://www.suse.com/security/cve/CVE-2022-31737/" source="CVE"/>
		<reference ref_id="CVE-2022-31738" ref_url="https://www.suse.com/security/cve/CVE-2022-31738/" source="CVE"/>
		<reference ref_id="CVE-2022-31739" ref_url="https://www.suse.com/security/cve/CVE-2022-31739/" source="CVE"/>
		<reference ref_id="CVE-2022-31740" ref_url="https://www.suse.com/security/cve/CVE-2022-31740/" source="CVE"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="CVE-2022-31742" ref_url="https://www.suse.com/security/cve/CVE-2022-31742/" source="CVE"/>
		<reference ref_id="CVE-2022-31747" ref_url="https://www.suse.com/security/cve/CVE-2022-31747/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011223.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.10.0 ESR (MFSA 2022-21)(bsc#1200027)

- CVE-2022-31736: Cross-Origin resource's length leaked
- CVE-2022-31737: Heap buffer overflow in WebGL
- CVE-2022-31738: Browser window spoof using fullscreen mode
- CVE-2022-31739: Attacker-influenced path traversal when saving downloaded files
- CVE-2022-31740: Register allocation problem in WASM on arm64
- CVE-2022-31741: Uninitialized variable leads to invalid memory read
- CVE-2022-31742: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information
- CVE-2022-31747: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-02"/>
	<updated date="2022-06-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31736/">CVE-2022-31736 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31736">CVE-2022-31736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31737/">CVE-2022-31737 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31737">CVE-2022-31737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31738/">CVE-2022-31738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31738">CVE-2022-31738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31739/">CVE-2022-31739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31739">CVE-2022-31739 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31740/">CVE-2022-31740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31740">CVE-2022-31740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31742/">CVE-2022-31742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31742">CVE-2022-31742 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31747/">CVE-2022-31747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31747">CVE-2022-31747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696357" comment="MozillaFirefox-91.10.0-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696358" comment="MozillaFirefox-devel-91.10.0-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696359" comment="MozillaFirefox-translations-common-91.10.0-112.114.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150994" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1194471" ref_url="https://bugzilla.suse.com/1194471" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010084.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194471">SUSE bug 1194471</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45079">CVE-2021-45079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664933" comment="strongswan-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664929" comment="strongswan-doc-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664934" comment="strongswan-hmac-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664935" comment="strongswan-ipsec-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664936" comment="strongswan-libs0-5.1.3-26.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150995" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1200027" ref_url="https://bugzilla.suse.com/1200027" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011255.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.4 (bsc#1200027)

* CVE-2022-31741: Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple.  (bmo#1767590)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-09"/>
	<updated date="2022-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696360" comment="libfreebl3-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696100" comment="libfreebl3-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696361" comment="libfreebl3-hmac-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696102" comment="libfreebl3-hmac-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696362" comment="libsoftokn3-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696104" comment="libsoftokn3-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696363" comment="libsoftokn3-hmac-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696106" comment="libsoftokn3-hmac-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696364" comment="mozilla-nss-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696108" comment="mozilla-nss-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696365" comment="mozilla-nss-certs-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696110" comment="mozilla-nss-certs-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696366" comment="mozilla-nss-sysinit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696113" comment="mozilla-nss-sysinit-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696367" comment="mozilla-nss-tools-3.68.4-58.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150996" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1191184" ref_url="https://bugzilla.suse.com/1191184" source="BUGZILLA"/>
		<reference ref_id="1191185" ref_url="https://bugzilla.suse.com/1191185" source="BUGZILLA"/>
		<reference ref_id="1191186" ref_url="https://bugzilla.suse.com/1191186" source="BUGZILLA"/>
		<reference ref_id="1193282" ref_url="https://bugzilla.suse.com/1193282" source="BUGZILLA"/>
		<reference ref_id="1197948" ref_url="https://bugzilla.suse.com/1197948" source="BUGZILLA"/>
		<reference ref_id="1198460" ref_url="https://bugzilla.suse.com/1198460" source="BUGZILLA"/>
		<reference ref_id="1198493" ref_url="https://bugzilla.suse.com/1198493" source="BUGZILLA"/>
		<reference ref_id="1198496" ref_url="https://bugzilla.suse.com/1198496" source="BUGZILLA"/>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3695" ref_url="https://www.suse.com/security/cve/CVE-2021-3695/" source="CVE"/>
		<reference ref_id="CVE-2021-3696" ref_url="https://www.suse.com/security/cve/CVE-2021-3696/" source="CVE"/>
		<reference ref_id="CVE-2021-3697" ref_url="https://www.suse.com/security/cve/CVE-2021-3697/" source="CVE"/>
		<reference ref_id="CVE-2022-28733" ref_url="https://www.suse.com/security/cve/CVE-2022-28733/" source="CVE"/>
		<reference ref_id="CVE-2022-28734" ref_url="https://www.suse.com/security/cve/CVE-2022-28734/" source="CVE"/>
		<reference ref_id="CVE-2022-28736" ref_url="https://www.suse.com/security/cve/CVE-2022-28736/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011257.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

Security fixes and hardenings for boothole 3 / boothole 2022 (bsc#1198581)

- CVE-2021-3695: Fixed that a crafted PNG grayscale image could lead to out-of-bounds write in heap (bsc#1191184)
- CVE-2021-3696: Fixed that a crafted PNG image could lead to out-of-bound write during huffman table handling (bsc#1191185)
- CVE-2021-3697: Fixed that a crafted JPEG image could lead to buffer underflow write in the heap (bsc#1191186)
- CVE-2022-28733: Fixed fragmentation math in net/ip (bsc#1198460)
- CVE-2022-28734: Fixed an out-of-bound write for split http headers (bsc#1198493)
- CVE-2022-28736: Fixed a use-after-free in chainloader command (bsc#1198496)
- Update SBAT security contact (bsc#1193282)
- Bump grub's SBAT generation to 2

- Use boot disks in OpenFirmware, fixing regression caused when the root LV is completely in the boot LUN (bsc#1197948)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-10"/>
	<updated date="2022-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191184">SUSE bug 1191184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191185">SUSE bug 1191185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191186">SUSE bug 1191186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193282">SUSE bug 1193282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197948">SUSE bug 1197948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198460">SUSE bug 1198460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198493">SUSE bug 1198493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198496">SUSE bug 1198496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3695/">CVE-2021-3695 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3695">CVE-2021-3695 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3696/">CVE-2021-3696 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3696">CVE-2021-3696 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3697/">CVE-2021-3697 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3697">CVE-2021-3697 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28733/">CVE-2022-28733 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28733">CVE-2022-28733 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-28734/">CVE-2022-28734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28734">CVE-2022-28734 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28736/">CVE-2022-28736 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28736">CVE-2022-28736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696536" comment="grub2-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696116" comment="grub2-i386-pc-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696118" comment="grub2-snapper-plugin-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696119" comment="grub2-systemd-sleep-plugin-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696120" comment="grub2-x86_64-efi-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696121" comment="grub2-x86_64-xen-2.02-137.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150997" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1055710" ref_url="https://bugzilla.suse.com/1055710" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1084513" ref_url="https://bugzilla.suse.com/1084513" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1126703" ref_url="https://bugzilla.suse.com/1126703" source="BUGZILLA"/>
		<reference ref_id="1158266" ref_url="https://bugzilla.suse.com/1158266" source="BUGZILLA"/>
		<reference ref_id="1173265" ref_url="https://bugzilla.suse.com/1173265" source="BUGZILLA"/>
		<reference ref_id="1182171" ref_url="https://bugzilla.suse.com/1182171" source="BUGZILLA"/>
		<reference ref_id="1183646" ref_url="https://bugzilla.suse.com/1183646" source="BUGZILLA"/>
		<reference ref_id="1183723" ref_url="https://bugzilla.suse.com/1183723" source="BUGZILLA"/>
		<reference ref_id="1187055" ref_url="https://bugzilla.suse.com/1187055" source="BUGZILLA"/>
		<reference ref_id="1191647" ref_url="https://bugzilla.suse.com/1191647" source="BUGZILLA"/>
		<reference ref_id="1195651" ref_url="https://bugzilla.suse.com/1195651" source="BUGZILLA"/>
		<reference ref_id="1196426" ref_url="https://bugzilla.suse.com/1196426" source="BUGZILLA"/>
		<reference ref_id="1197343" ref_url="https://bugzilla.suse.com/1197343" source="BUGZILLA"/>
		<reference ref_id="1198031" ref_url="https://bugzilla.suse.com/1198031" source="BUGZILLA"/>
		<reference ref_id="1198032" ref_url="https://bugzilla.suse.com/1198032" source="BUGZILLA"/>
		<reference ref_id="1198516" ref_url="https://bugzilla.suse.com/1198516" source="BUGZILLA"/>
		<reference ref_id="1198577" ref_url="https://bugzilla.suse.com/1198577" source="BUGZILLA"/>
		<reference ref_id="1198660" ref_url="https://bugzilla.suse.com/1198660" source="BUGZILLA"/>
		<reference ref_id="1198687" ref_url="https://bugzilla.suse.com/1198687" source="BUGZILLA"/>
		<reference ref_id="1198742" ref_url="https://bugzilla.suse.com/1198742" source="BUGZILLA"/>
		<reference ref_id="1198962" ref_url="https://bugzilla.suse.com/1198962" source="BUGZILLA"/>
		<reference ref_id="1198997" ref_url="https://bugzilla.suse.com/1198997" source="BUGZILLA"/>
		<reference ref_id="1199012" ref_url="https://bugzilla.suse.com/1199012" source="BUGZILLA"/>
		<reference ref_id="1199063" ref_url="https://bugzilla.suse.com/1199063" source="BUGZILLA"/>
		<reference ref_id="1199314" ref_url="https://bugzilla.suse.com/1199314" source="BUGZILLA"/>
		<reference ref_id="1199426" ref_url="https://bugzilla.suse.com/1199426" source="BUGZILLA"/>
		<reference ref_id="1199505" ref_url="https://bugzilla.suse.com/1199505" source="BUGZILLA"/>
		<reference ref_id="1199507" ref_url="https://bugzilla.suse.com/1199507" source="BUGZILLA"/>
		<reference ref_id="1199605" ref_url="https://bugzilla.suse.com/1199605" source="BUGZILLA"/>
		<reference ref_id="1199650" ref_url="https://bugzilla.suse.com/1199650" source="BUGZILLA"/>
		<reference ref_id="1199785" ref_url="https://bugzilla.suse.com/1199785" source="BUGZILLA"/>
		<reference ref_id="1200143" ref_url="https://bugzilla.suse.com/1200143" source="BUGZILLA"/>
		<reference ref_id="1200144" ref_url="https://bugzilla.suse.com/1200144" source="BUGZILLA"/>
		<reference ref_id="1200249" ref_url="https://bugzilla.suse.com/1200249" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13695" ref_url="https://www.suse.com/security/cve/CVE-2017-13695/" source="CVE"/>
		<reference ref_id="CVE-2018-20784" ref_url="https://www.suse.com/security/cve/CVE-2018-20784/" source="CVE"/>
		<reference ref_id="CVE-2018-7755" ref_url="https://www.suse.com/security/cve/CVE-2018-7755/" source="CVE"/>
		<reference ref_id="CVE-2019-19377" ref_url="https://www.suse.com/security/cve/CVE-2019-19377/" source="CVE"/>
		<reference ref_id="CVE-2020-10769" ref_url="https://www.suse.com/security/cve/CVE-2020-10769/" source="CVE"/>
		<reference ref_id="CVE-2021-20292" ref_url="https://www.suse.com/security/cve/CVE-2021-20292/" source="CVE"/>
		<reference ref_id="CVE-2021-20321" ref_url="https://www.suse.com/security/cve/CVE-2021-20321/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-33061" ref_url="https://www.suse.com/security/cve/CVE-2021-33061/" source="CVE"/>
		<reference ref_id="CVE-2021-38208" ref_url="https://www.suse.com/security/cve/CVE-2021-38208/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1184" ref_url="https://www.suse.com/security/cve/CVE-2022-1184/" source="CVE"/>
		<reference ref_id="CVE-2022-1353" ref_url="https://www.suse.com/security/cve/CVE-2022-1353/" source="CVE"/>
		<reference ref_id="CVE-2022-1419" ref_url="https://www.suse.com/security/cve/CVE-2022-1419/" source="CVE"/>
		<reference ref_id="CVE-2022-1516" ref_url="https://www.suse.com/security/cve/CVE-2022-1516/" source="CVE"/>
		<reference ref_id="CVE-2022-1652" ref_url="https://www.suse.com/security/cve/CVE-2022-1652/" source="CVE"/>
		<reference ref_id="CVE-2022-1729" ref_url="https://www.suse.com/security/cve/CVE-2022-1729/" source="CVE"/>
		<reference ref_id="CVE-2022-1734" ref_url="https://www.suse.com/security/cve/CVE-2022-1734/" source="CVE"/>
		<reference ref_id="CVE-2022-1974" ref_url="https://www.suse.com/security/cve/CVE-2022-1974/" source="CVE"/>
		<reference ref_id="CVE-2022-1975" ref_url="https://www.suse.com/security/cve/CVE-2022-1975/" source="CVE"/>
		<reference ref_id="CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123/" source="CVE"/>
		<reference ref_id="CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125/" source="CVE"/>
		<reference ref_id="CVE-2022-21127" ref_url="https://www.suse.com/security/cve/CVE-2022-21127/" source="CVE"/>
		<reference ref_id="CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166/" source="CVE"/>
		<reference ref_id="CVE-2022-21180" ref_url="https://www.suse.com/security/cve/CVE-2022-21180/" source="CVE"/>
		<reference ref_id="CVE-2022-21499" ref_url="https://www.suse.com/security/cve/CVE-2022-21499/" source="CVE"/>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to 3.12.31 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-1975: Fixed a bug that allows an attacker to crash the linux kernel by simulating nfc device from user-space. (bsc#1200143)
- CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144)
- CVE-2019-19377: Fixed an user-after-free that could be triggered when an attacker mounts a crafted btrfs filesystem image. (bnc#1158266)
- CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).
- CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)
- CVE-2022-21499: Reinforce the kernel lockdown feature, until now it's been trivial to break out of it with kgdb or kdb. (bsc#1199426)
- CVE-2017-13695: Fixed a bug that caused a stack dump allowing local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted ACPI table. (bnc#1055710)
- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).
- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)
- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).
- CVE-2021-28688: Fixed XSA-365 that includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains (bnc#1183646).
- CVE-2020-10769: Fixed a buffer over-read flaw in the IPsec Cryptographic algorithm's module. This flaw allowed a local attacker with user privileges to cause a denial of service. (bnc#1173265)
- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).
- CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012).
- CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc#1191647).
- CVE-2018-7755: Fixed an issue in the fd_locked_ioctl function in drivers/block/floppy.c. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR (bnc#1084513).
- CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742).
- CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055).
- CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c. (bnc#1198516)
- CVE-2018-20784: Fixed a denial of service (infinite loop in update_blocked_averages) by mishandled leaf cfs_rq in kernel/sched/fair.c (bnc#1126703).
- CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc#1183723).
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel (bnc#1198032).
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bnc#1197343)

The following non-security bugs were fixed:

- btrfs: tree-checker: fix incorrect printk format (bsc#1200249).
- net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651).
- net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651).
- PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314).
- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900 bsc#1198660 ltc#197803).
- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729 bsc#1198660 ltc#197803).
- vmbus: do not return values for uninitalized channels (bsc#1051510 bsc#1198997).
- vt: vt_ioctl: fix race in VT_RESIZEX (bsc#1199785).
- x86/hyperv: Read TSC frequency from a synthetic MSR (bsc#1198962).
- x86/speculation: Fix redundant MDS mitigation message (bsc#1199650).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-14"/>
	<updated date="2022-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055710">SUSE bug 1055710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084513">SUSE bug 1084513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126703">SUSE bug 1126703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158266">SUSE bug 1158266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173265">SUSE bug 1173265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182171">SUSE bug 1182171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183646">SUSE bug 1183646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183723">SUSE bug 1183723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187055">SUSE bug 1187055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191647">SUSE bug 1191647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195651">SUSE bug 1195651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196426">SUSE bug 1196426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197343">SUSE bug 1197343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198031">SUSE bug 1198031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198032">SUSE bug 1198032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198516">SUSE bug 1198516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198577">SUSE bug 1198577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198660">SUSE bug 1198660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198687">SUSE bug 1198687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198742">SUSE bug 1198742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198962">SUSE bug 1198962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198997">SUSE bug 1198997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199012">SUSE bug 1199012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199063">SUSE bug 1199063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199314">SUSE bug 1199314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199426">SUSE bug 1199426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199505">SUSE bug 1199505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199507">SUSE bug 1199507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199605">SUSE bug 1199605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199650">SUSE bug 1199650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199785">SUSE bug 1199785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200143">SUSE bug 1200143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200144">SUSE bug 1200144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200249">SUSE bug 1200249</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13695/">CVE-2017-13695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13695">CVE-2017-13695 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20784/">CVE-2018-20784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20784">CVE-2018-20784 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7755/">CVE-2018-7755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7755">CVE-2018-7755 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19377/">CVE-2019-19377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19377">CVE-2019-19377 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10769/">CVE-2020-10769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10769">CVE-2020-10769 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20292/">CVE-2021-20292 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20292">CVE-2021-20292 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20321/">CVE-2021-20321 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20321">CVE-2021-20321 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33061/">CVE-2021-33061 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33061">CVE-2021-33061 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38208/">CVE-2021-38208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38208">CVE-2021-38208 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1184/">CVE-2022-1184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1184">CVE-2022-1184 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1353/">CVE-2022-1353 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1353">CVE-2022-1353 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1419/">CVE-2022-1419 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1419">CVE-2022-1419 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1516/">CVE-2022-1516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1516">CVE-2022-1516 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1652/">CVE-2022-1652 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1652">CVE-2022-1652 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1729/">CVE-2022-1729 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1729">CVE-2022-1729 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1734/">CVE-2022-1734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1974/">CVE-2022-1974 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1974">CVE-2022-1974 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1975/">CVE-2022-1975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1975">CVE-2022-1975 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123">CVE-2022-21123 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21125">CVE-2022-21125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21127/">CVE-2022-21127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21127">CVE-2022-21127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166">CVE-2022-21166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21180/">CVE-2022-21180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21180">CVE-2022-21180 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21499/">CVE-2022-21499 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21499">CVE-2022-21499 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28388">CVE-2022-28388 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28390">CVE-2022-28390 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696537" comment="kernel-default-4.4.180-94.164.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696538" comment="kernel-default-base-4.4.180-94.164.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696539" comment="kernel-default-devel-4.4.180-94.164.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696126" comment="kernel-devel-4.4.180-94.164.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696127" comment="kernel-macros-4.4.180-94.164.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696128" comment="kernel-source-4.4.180-94.164.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696540" comment="kernel-syms-4.4.180-94.164.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150998" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1199287" ref_url="https://bugzilla.suse.com/1199287" source="BUGZILLA"/>
		<reference ref_id="1200106" ref_url="https://bugzilla.suse.com/1200106" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26700" ref_url="https://www.suse.com/security/cve/CVE-2022-26700/" source="CVE"/>
		<reference ref_id="CVE-2022-26709" ref_url="https://www.suse.com/security/cve/CVE-2022-26709/" source="CVE"/>
		<reference ref_id="CVE-2022-26716" ref_url="https://www.suse.com/security/cve/CVE-2022-26716/" source="CVE"/>
		<reference ref_id="CVE-2022-26717" ref_url="https://www.suse.com/security/cve/CVE-2022-26717/" source="CVE"/>
		<reference ref_id="CVE-2022-26719" ref_url="https://www.suse.com/security/cve/CVE-2022-26719/" source="CVE"/>
		<reference ref_id="CVE-2022-30293" ref_url="https://www.suse.com/security/cve/CVE-2022-30293/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011295.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.3 (bsc#1200106)

- CVE-2022-30293: Fixed heap-based buffer overflow in WebCore::TextureMapperLayer::setContentsLayer (bsc#1199287).
- CVE-2022-26700: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26709: Fixed use after free issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26716: Fixed use after free issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26717: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26719: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-15"/>
	<updated date="2022-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199287">SUSE bug 1199287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200106">SUSE bug 1200106</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26700/">CVE-2022-26700 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26700">CVE-2022-26700 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26709/">CVE-2022-26709 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26709">CVE-2022-26709 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26716/">CVE-2022-26716 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26716">CVE-2022-26716 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26717/">CVE-2022-26717 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26717">CVE-2022-26717 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26719/">CVE-2022-26719 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26719">CVE-2022-26719 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30293/">CVE-2022-30293 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30293">CVE-2022-30293 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696381" comment="libjavascriptcoregtk-4_0-18-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696382" comment="libwebkit2gtk-4_0-37-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696383" comment="typelib-1_0-JavaScriptCore-4_0-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696384" comment="typelib-1_0-WebKit2-4_0-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696386" comment="webkit2gtk-4_0-injected-bundles-2.36.3-2.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150999" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1199166" ref_url="https://bugzilla.suse.com/1199166" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1292" ref_url="https://www.suse.com/security/cve/CVE-2022-1292/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011296.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:
	  
- CVE-2022-1292: Fixed command injection in c_rehash (bsc#1199166).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-16"/>
	<updated date="2022-06-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199166">SUSE bug 1199166</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1292/">CVE-2022-1292 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696388" comment="libopenssl-devel-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696389" comment="libopenssl1_0_0-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696140" comment="libopenssl1_0_0-32bit-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696390" comment="libopenssl1_0_0-hmac-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696142" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696391" comment="openssl-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696144" comment="openssl-doc-1.0.2j-60.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151000" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1200338" ref_url="https://bugzilla.suse.com/1200338" source="BUGZILLA"/>
		<reference ref_id="1200340" ref_url="https://bugzilla.suse.com/1200340" source="BUGZILLA"/>
		<reference ref_id="1200341" ref_url="https://bugzilla.suse.com/1200341" source="BUGZILLA"/>
		<reference ref_id="1200345" ref_url="https://bugzilla.suse.com/1200345" source="BUGZILLA"/>
		<reference ref_id="1200348" ref_url="https://bugzilla.suse.com/1200348" source="BUGZILLA"/>
		<reference ref_id="1200350" ref_url="https://bugzilla.suse.com/1200350" source="BUGZILLA"/>
		<reference ref_id="1200352" ref_url="https://bugzilla.suse.com/1200352" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26377" ref_url="https://www.suse.com/security/cve/CVE-2022-26377/" source="CVE"/>
		<reference ref_id="CVE-2022-28614" ref_url="https://www.suse.com/security/cve/CVE-2022-28614/" source="CVE"/>
		<reference ref_id="CVE-2022-28615" ref_url="https://www.suse.com/security/cve/CVE-2022-28615/" source="CVE"/>
		<reference ref_id="CVE-2022-29404" ref_url="https://www.suse.com/security/cve/CVE-2022-29404/" source="CVE"/>
		<reference ref_id="CVE-2022-30522" ref_url="https://www.suse.com/security/cve/CVE-2022-30522/" source="CVE"/>
		<reference ref_id="CVE-2022-30556" ref_url="https://www.suse.com/security/cve/CVE-2022-30556/" source="CVE"/>
		<reference ref_id="CVE-2022-31813" ref_url="https://www.suse.com/security/cve/CVE-2022-31813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011297.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-26377: Fixed possible request smuggling in mod_proxy_ajp (bsc#1200338)
- CVE-2022-28614: Fixed read beyond bounds via ap_rwrite() (bsc#1200340)
- CVE-2022-28615: Fixed read beyond bounds in ap_strcmp_match() (bsc#1200341)
- CVE-2022-29404: Fixed denial of service in mod_lua r:parsebody (bsc#1200345)
- CVE-2022-30556: Fixed information disclosure in mod_lua with websockets (bsc#1200350)
- CVE-2022-30522: Fixed mod_sed denial of service (bsc#1200352)
- CVE-2022-31813: Fixed mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism (bsc#1200348)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-16"/>
	<updated date="2022-06-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200338">SUSE bug 1200338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200340">SUSE bug 1200340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200341">SUSE bug 1200341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200345">SUSE bug 1200345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200348">SUSE bug 1200348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200350">SUSE bug 1200350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200352">SUSE bug 1200352</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-26377/">CVE-2022-26377 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26377">CVE-2022-26377 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28614/">CVE-2022-28614 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28614">CVE-2022-28614 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28615/">CVE-2022-28615 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28615">CVE-2022-28615 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29404/">CVE-2022-29404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29404">CVE-2022-29404 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30522/">CVE-2022-30522 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30522">CVE-2022-30522 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30556/">CVE-2022-30556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30556">CVE-2022-30556 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-31813/">CVE-2022-31813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31813">CVE-2022-31813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696392" comment="apache2-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696146" comment="apache2-doc-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696393" comment="apache2-example-pages-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696394" comment="apache2-prefork-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696395" comment="apache2-utils-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696396" comment="apache2-worker-2.4.23-29.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151001" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010124.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2022-23307: Fix deserialization issue by removing the chainsaw sub-package. (bsc#1194844)
- CVE-2022-23305: Fix SQL injection by removing src/main/java/org/apache/log4j/jdbc/JDBCAppender.java. (bsc#1194843)
- CVE-2022-23302: Fix remote code execution by removing src/main/java/org/apache/log4j/net/JMSSink.java. (bsc#1194842)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-27"/>
	<updated date="2022-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23302">CVE-2022-23302 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23305">CVE-2022-23305 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23307">CVE-2022-23307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664687" comment="log4j-1.2.15-126.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151002" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1181223" ref_url="https://bugzilla.suse.com/1181223" source="BUGZILLA"/>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1190462" ref_url="https://bugzilla.suse.com/1190462" source="BUGZILLA"/>
		<reference ref_id="1190535" ref_url="https://bugzilla.suse.com/1190535" source="BUGZILLA"/>
		<reference ref_id="1193600" ref_url="https://bugzilla.suse.com/1193600" source="BUGZILLA"/>
		<reference ref_id="1194873" ref_url="https://bugzilla.suse.com/1194873" source="BUGZILLA"/>
		<reference ref_id="1195726" ref_url="https://bugzilla.suse.com/1195726" source="BUGZILLA"/>
		<reference ref_id="1195727" ref_url="https://bugzilla.suse.com/1195727" source="BUGZILLA"/>
		<reference ref_id="1195728" ref_url="https://bugzilla.suse.com/1195728" source="BUGZILLA"/>
		<reference ref_id="1196338" ref_url="https://bugzilla.suse.com/1196338" source="BUGZILLA"/>
		<reference ref_id="1196704" ref_url="https://bugzilla.suse.com/1196704" source="BUGZILLA"/>
		<reference ref_id="1197507" ref_url="https://bugzilla.suse.com/1197507" source="BUGZILLA"/>
		<reference ref_id="1197689" ref_url="https://bugzilla.suse.com/1197689" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36222" ref_url="https://www.suse.com/security/cve/CVE-2021-36222/" source="CVE"/>
		<reference ref_id="CVE-2021-3711" ref_url="https://www.suse.com/security/cve/CVE-2021-3711/" source="CVE"/>
		<reference ref_id="CVE-2021-39226" ref_url="https://www.suse.com/security/cve/CVE-2021-39226/" source="CVE"/>
		<reference ref_id="CVE-2021-41174" ref_url="https://www.suse.com/security/cve/CVE-2021-41174/" source="CVE"/>
		<reference ref_id="CVE-2021-41244" ref_url="https://www.suse.com/security/cve/CVE-2021-41244/" source="CVE"/>
		<reference ref_id="CVE-2021-43798" ref_url="https://www.suse.com/security/cve/CVE-2021-43798/" source="CVE"/>
		<reference ref_id="CVE-2021-43813" ref_url="https://www.suse.com/security/cve/CVE-2021-43813/" source="CVE"/>
		<reference ref_id="CVE-2021-43815" ref_url="https://www.suse.com/security/cve/CVE-2021-43815/" source="CVE"/>
		<reference ref_id="CVE-2022-21673" ref_url="https://www.suse.com/security/cve/CVE-2022-21673/" source="CVE"/>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<reference ref_id="CVE-2022-21702" ref_url="https://www.suse.com/security/cve/CVE-2022-21702/" source="CVE"/>
		<reference ref_id="CVE-2022-21703" ref_url="https://www.suse.com/security/cve/CVE-2022-21703/" source="CVE"/>
		<reference ref_id="CVE-2022-21713" ref_url="https://www.suse.com/security/cve/CVE-2022-21713/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011316.html" source="SUSE-SU"/>
		<description>
This update fixes the following issues:

golang-github-QubitProducts-exporter_exporter:

- Adapted to build on Enterprise Linux.
- Fix build for RedHat 7
- Require Go &gt;= 1.14 also for CentOS
- Add support for CentOS
- Replace %{?systemd_requires} with %{?systemd_ordering}

golang-github-prometheus-alertmanager:

- CVE-2022-21698: Denial of service using InstrumentHandlerCounter.
  * Update vendor tarball with prometheus/client_golang 1.11.1  (bsc#1196338, jsc#SLE-24077)
- Update required Go version to 1.16
- Update to version 0.23.0:
  * amtool: Detect version drift and warn users (#2672)
  * Add ability to skip TLS verification for amtool (#2663)
  * Fix empty isEqual in amtool. (#2668)
  * Fix main tests (#2670)
  * cli: add new template render command (#2538)
  * OpsGenie: refer to alert instead of incident (#2609)
  * Docs: target_match and source_match are DEPRECATED (#2665)
  * Fix test not waiting for cluster member to be ready
- Added hardening to systemd service(s) (bsc#1181400)

golang-github-prometheus-node_exporter:

- CVE-2022-21698: Denial of service using InstrumentHandlerCounter.
  * Update vendor tarball with prometheus/client_golang 1.11.1
  (bsc#1196338, jsc#SLE-24238, jsc#SLE-24239)
- Update to 1.3.0
  * [CHANGE] Add path label to rapl collector #2146
  * [CHANGE] Exclude filesystems under /run/credentials #2157
  * [CHANGE] Add TCPTimeouts to netstat default filter #2189
  * [FEATURE] Add lnstat collector for metrics from /proc/net/stat/ #1771
  * [FEATURE] Add darwin powersupply collector #1777
  * [FEATURE] Add support for monitoring GPUs on Linux #1998
  * [FEATURE] Add Darwin thermal collector #2032
  * [FEATURE] Add os release collector #2094
  * [FEATURE] Add netdev.address-info collector #2105
  * [FEATURE] Add clocksource metrics to time collector #2197
  * [ENHANCEMENT] Support glob textfile collector directories #1985
  * [ENHANCEMENT] ethtool: Expose node_ethtool_info metric #2080
  * [ENHANCEMENT] Use include/exclude flags for ethtool filtering #2165
  * [ENHANCEMENT] Add flag to disable guest CPU metrics #2123
  * [ENHANCEMENT] Add DMI collector #2131
  * [ENHANCEMENT] Add threads metrics to processes collector #2164
  * [ENHANCMMENT] Reduce timer GC delays in the Linux filesystem collector #2169
  * [ENHANCMMENT] Add TCPTimeouts to netstat default filter #2189
  * [ENHANCMMENT] Use SysctlTimeval for boottime collector on BSD #2208
  * [BUGFIX] ethtool: Sanitize metric names #2093
  * [BUGFIX] Fix ethtool collector for multiple interfaces #2126
  * [BUGFIX] Fix possible panic on macOS #2133
  * [BUGFIX] Collect flag_info and bug_info only for one core #2156
  * [BUGFIX] Prevent duplicate ethtool metric names #2187
- Update to 1.2.2
  * Bug fixes
     Fix processes collector long int parsing #2112
- Update to 1.2.1
  * Removed
     Remove obsolete capture permission denied error patch that is already included upstream
     Fix zoneinfo parsing prometheus/procfs#386
     Fix nvme collector log noise #2091
     Fix rapl collector log noise #2092
- Update to 1.2.0
  * Changes
     Rename filesystem collector flags to match other collectors #2012
     Make node_exporter print usage to STDOUT #203
  * Features
     Add conntrack statistics metrics #1155
     Add ethtool stats collector #1832
     Add flag to ignore network speed if it is unknown #1989
     Add tapestats collector for Linux #2044
     Add nvme collector #2062
  * Enhancements
     Add ErrorLog plumbing to promhttp #1887
     Add more Infiniband counters #2019
     netclass: retrieve interface names and filter before parsing #2033
     Add time zone offset metric #2060
     Handle errors from disabled PSI subsystem #1983
     Fix panic when using backwards compatible flags #2000
     Fix wrong value for OpenBSD memory buffer cache #2015
     Only initiate collectors once #2048
     Handle small backwards jumps in CPU idle #2067
- Apply patch to capture permission denied error for 'energy_uj' file (bsc#1190535)

grafana:

- Update to version 8.3.5 (jsc#SLE-23439, jsc#SLE-23422)
  + Security:
    * Fixes XSS vulnerability in handling data sources
      (bsc#1195726, CVE-2022-21702)
    * Fixes cross-origin request forgery vulnerability
      (bsc#1195727, CVE-2022-21703)
    * Fixes Insecure Direct Object Reference vulnerability in Teams
      API (bsc#1195728, CVE-2022-21713)
- Update to Go 1.17.
- Add build-time dependency on `wire`.
- Update license to GNU Affero General Public License v3.0.
- Update to version 8.3.4
    * GetUserInfo: return an error if no user was found
      (bsc#1194873, CVE-2022-21673)
  + Features and enhancements:
    * Alerting: Allow configuration of non-ready alertmanagers.
    * Alerting: Allow customization of Google chat message.
    * AppPlugins: Support app plugins with only default nav.
    * InfluxDB: query editor: skip fields in metadata queries.
    * Postgres/MySQL/MSSQL: Cancel in-flight SQL query if user
      cancels query in grafana.
    * Prometheus: Forward oauth tokens after prometheus datasource
      migration.
  + Bug fixes:
    * Azure Monitor: Bug fix for variable interpolations in metrics
      dropdowns.
    * Azure Monitor: Improved error messages for variable queries.
    * CloudMonitoring: Fixes broken variable queries that use group
      bys.
    * Configuration: You can now see your expired API keys if you
      have no active ones.
    * Elasticsearch: Fix handling multiple datalinks for a single
      field.
    * Export: Fix error being thrown when exporting dashboards
      using query variables that reference the default datasource.
    * ImportDashboard: Fixes issue with importing dashboard and
      name ending up in uid.
    * Login: Page no longer overflows on mobile.
    * Plugins: Set backend metadata property for core plugins.
    * Prometheus: Fill missing steps with null values.
    * Prometheus: Fix interpolation of $__rate_interval variable.
    * Prometheus: Interpolate variables with curly brackets syntax.
    * Prometheus: Respect the http-method data source setting.
    * Table: Fixes issue with field config applied to wrong fields
      when hiding columns.
    * Toolkit: Fix bug with rootUrls not being properly parsed when
      signing a private plugin.
    * Variables: Fix so data source variables are added to adhoc
      configuration.
  + Plugin development fixes &amp; changes:
    * Toolkit: Revert build config so tslib is bundled with plugins
      to prevent plugins from crashing.
- Update to version 8.3.3:
    * BarChart: Use new data error view component to show actions
      in panel edit.
    * CloudMonitor: Iterate over pageToken for resources.
    * Macaron: Prevent WriteHeader invalid HTTP status code panic.
    * AnnoListPanel: Fix interpolation of variables in tags.
    * CloudWatch: Allow queries to have no dimensions specified.
    * CloudWatch: Fix broken queries for users migrating from
      8.2.4/8.2.5 to 8.3.0.
    * CloudWatch: Make sure MatchExact flag gets the right value.
    * Dashboards: Fix so that empty folders can be deleted from the
      manage dashboards/folders page.
    * InfluxDB: Improve handling of metadata query errors in
      InfluxQL.
    * Loki: Fix adding of ad hoc filters for queries with parser
      and line_format expressions.
    * Prometheus: Fix running of exemplar queries for non-histogram
      metrics.
    * Prometheus: Interpolate template variables in interval.
    * StateTimeline: Fix toolitp not showing when for frames with
      multiple fields.
    * TraceView: Fix virtualized scrolling when trace view is
      opened in right pane in Explore.
    * Variables: Fix repeating panels for on time range changed
      variables.
    * Variables: Fix so queryparam option works for scoped
- Update to version 8.3.2
  + Security: Fixes CVE-2021-43813 and CVE-2021-43815.
- Update to version 8.3.1
  + Security: Fixes CVE-2021-43798.
- Update to version 8.3.0
    * Alerting: Prevent folders from being deleted when they
      contain alerts.
    * Alerting: Show full preview value in tooltip.
    * BarGauge: Limit title width when name is really long.
    * CloudMonitoring: Avoid to escape regexps in filters.
    * CloudWatch: Add support for AWS Metric Insights.
    * TooltipPlugin: Remove other panels' shared tooltip in edit
      panel.
    * Visualizations: Limit y label width to 40% of visualization
      width.
    * Alerting: Clear alerting rule evaluation errors after
      intermittent failures.
    * Alerting: Fix refresh on legacy Alert List panel.
    * Dashboard: Fix queries for panels with non-integer widths.
    * Explore: Fix url update inconsistency.
    * Prometheus: Fix range variables interpolation for time ranges
      smaller than 1 second.
    * ValueMappings: Fixes issue with regex value mapping that only
      sets color.
- Update to version 8.3.0-beta2
  + Breaking changes:
    * Grafana 8 Alerting enabled by default for installations that
      do not use legacy alerting.
    * Keep Last State for 'If execution error or timeout' when
      upgrading to Grafana 8 alerting.
    * Alerting: Create DatasourceError alert if evaluation returns
      error.
    * Alerting: Make Unified Alerting enabled by default for those
      who do not use legacy alerting.
    * Alerting: Support mute timings configuration through the api
      for the embedded alert manager.
    * CloudWatch: Add missing AWS/Events metrics.
    * Docs: Add easier to find deprecation notices to certain data
      sources and to the changelog.
    * Plugins Catalog: Enable install controls based on the
      pluginAdminEnabled flag.
    * Table: Add space between values for the DefaultCell and
      JSONViewCell.
    * Tracing: Make query editors available in dashboard for Tempo
      and Zipkin.
    * AccessControl: Renamed orgs roles, removed fixed:orgs:reader
      introduced in beta1.
    * Azure Monitor: Add trap focus for modals in grafana/ui and
      other small a11y fixes for Azure Monitor.
    * CodeEditor: Prevent suggestions from being clipped.
    * Dashboard: Fix cache timeout persistence.
    * Datasource: Fix stable sort order of query responses.
    * Explore: Fix error in query history when removing last item.
    * Logs: Fix requesting of older logs when flipped order.
    * Prometheus: Fix running of health check query based on access
      mode.
    * TextPanel: Fix suggestions for existing panels.
    * Tracing: Fix incorrect indentations due to reoccurring
      spanIDs.
    * Tracing: Show start time of trace with milliseconds
      precision.
    * Variables: Make renamed or missing variable section
      expandable.
    * Select: Select menus now properly scroll during keyboard
      navigation.
- Update to version 8.3.0-beta1
    * Alerting: Add UI for contact point testing with custom
      annotations and labels.
    * Alerting: Make alert state indicator in panel header work
      with Grafana 8 alerts.
    * Alerting: Option for Discord notifier to use webhook name.
    * Annotations: Deprecate AnnotationsSrv.
    * Auth: Omit all base64 paddings in JWT tokens for the JWT
      auth.
    * Azure Monitor: Clean up fields when editing Metrics.
    * AzureMonitor: Add new starter dashboards.
    * AzureMonitor: Add starter dashboard for app monitoring with
      Application Insights.
    * Barchart/Time series: Allow x axis label.
    * CLI: Improve error handling for installing plugins.
    * CloudMonitoring: Migrate to use backend plugin SDK contracts.
    * CloudWatch Logs: Add retry strategy for hitting max
      concurrent queries.
    * CloudWatch: Add AWS RoboMaker metrics and dimension.
    * CloudWatch: Add AWS Transfer metrics and dimension.
    * Dashboard: replace datasource name with a reference object.
    * Dashboards: Show logs on time series when hovering.
    * Elasticsearch: Add support for Elasticsearch 8.0 (Beta).
    * Elasticsearch: Add time zone setting to Date Histogram
      aggregation.
    * Elasticsearch: Enable full range log volume histogram.
    * Elasticsearch: Full range logs volume.
    * Explore: Allow changing the graph type.
    * Explore: Show ANSI colors when highlighting matched words in
      the logs panel.
    * Graph(old) panel: Listen to events from Time series panel.
    * Import: Load gcom dashboards from URL.
    * LibraryPanels: Improves export and import of library panels
      between orgs.
    * OAuth: Support PKCE.
    * Panel edit: Overrides now highlight correctly when searching.
    * PanelEdit: Display drag indicators on draggable sections.
    * Plugins: Refactor Plugin Management.
    * Prometheus: Add custom query parameters when creating
      PromLink url.
    * Prometheus: Remove limits on metrics, labels, and values in
      Metrics Browser.
    * StateTimeline: Share cursor with rest of the panels.
    * Tempo: Add error details when json upload fails.
    * Tempo: Add filtering for service graph query.
    * Tempo: Add links to nodes in Service Graph pointing to
      Prometheus metrics.
    * Time series/Bar chart panel: Add ability to sort series via
      legend.
    * TimeSeries: Allow multiple axes for the same unit.
    * TraceView: Allow span links defined on dataFrame.
    * Transformations: Support a rows mode in labels to fields.
    * ValueMappings: Don't apply field config defaults to time
      fields.
    * Variables: Only update panels that are impacted by variable
      change.
    * API: Fix dashboard quota limit for imports.
    * Alerting: Fix rule editor issues with Azure Monitor data
      source.
    * Azure monitor: Make sure alert rule editor is not enabled
      when template variables are being used.
    * CloudMonitoring: Fix annotation queries.
    * CodeEditor: Trigger the latest getSuggestions() passed to
      CodeEditor.
    * Dashboard: Remove the current panel from the list of options
      in the Dashboard datasource.
    * Encryption: Fix decrypting secrets in alerting migration.
    * InfluxDB: Fix corner case where index is too large in ALIAS
    * NavBar: Order App plugins alphabetically.
    * NodeGraph: Fix zooming sensitivity on touchpads.
    * Plugins: Add OAuth pass-through logic to api/ds/query
      endpoint.
    * Snapshots: Fix panel inspector for snapshot data.
    * Tempo: Fix basic auth password reset on adding tag.
    * ValueMapping: Fixes issue with regex mappings.
    * grafana/ui: Enable slider marks display.
- Update to version 8.2.7
- Update to version 8.2.6
    * Security: Upgrade Docker base image to Alpine 3.14.3.
    * Security: Upgrade Go to 1.17.2.
    * TimeSeries: Fix fillBelowTo wrongly affecting fills of
      unrelated series.
- Update to version 8.2.5
    * Fix No Data behaviour in Legacy Alerting.
    * Alerting: Fix a bug where the metric in the evaluation string
      was not correctly populated.
    * Alerting: Fix no data behaviour in Legacy Alerting for alert
      rules using the AND operator.
    * CloudMonitoring: Ignore min and max aggregation in MQL
      queries.
    * Dashboards: 'Copy' is no longer added to new dashboard
      titles.
    * DataProxy: Fix overriding response body when response is a
      WebSocket upgrade.
    * Elasticsearch: Use field configured in query editor as field
      for date_histogram aggregations.
    * Explore: Fix running queries without a datasource property
      set.
    * InfluxDB: Fix numeric aliases in queries.
    * Plugins: Ensure consistent plugin settings list response.
    * Tempo: Fix validation of float durations.
    * Tracing: Correct tags for each span are shown.
- Update to version 8.2.4
  + Security: Fixes CVE-2021-41244.
- Update to version 8.2.3
  + Security: Fixes CVE-2021-41174.
- Update to version 8.2.2
    * Annotations: We have improved tag search performance.
    * Application: You can now configure an error-template title.
    * AzureMonitor: We removed a restriction from the resource
      filter query.
    * Packaging: We removed the ProcSubset option in systemd. This
      option prevented Grafana from starting in LXC environments.
    * Prometheus: We removed the autocomplete limit for metrics.
    * Table: We improved the styling of the type icons to make them
      more distinct from column / field name.
    * ValueMappings: You can now use value mapping in stat, gauge,
      bar gauge, and pie chart visualizations.
    * Alerting: Fix panic when Slack's API sends unexpected
      response.
    * Alerting: The Create Alert button now appears on the
      dashboard panel when you are working with a default
      datasource.
    * Explore: We fixed the problem where the Explore log panel
      disappears when an Elasticsearch logs query returns no
      results.
    * Graph: You can now see annotation descriptions on hover.
    * Logs: The system now uses the JSON parser only if the line is
      parsed to an object.
    * Prometheus: We fixed the issue where the system did not reuse
      TCP connections when querying from Grafana alerting.
    * Prometheus: We fixed the problem that resulted in an error
      when a user created a query with a $__interval min step.
    * RowsToFields: We fixed the issue where the system was not
      properly interpreting number values.
    * Scale: We fixed how the system handles NaN percent when data
      min = data max.
    * Table panel: You can now create a filter that includes
      special characters.
- Update to version 8.2.1
    * Dashboard: Fix rendering of repeating panels.
    * Datasources: Fix deletion of data source if plugin is not
      found.
    * Packaging: Remove systemcallfilters sections from systemd
      unit files.
    * Prometheus: Add Headers to HTTP client options.
- Update to version 8.2.0
    * AWS: Updated AWS authentication documentation.
    * Alerting: Added support Alertmanager data source for upstream
      Prometheus AM implementation.
    * Alerting: Allows more characters in label names so
      notifications are sent.
    * Alerting: Get alert rules for a dashboard or a panel using
      /api/v1/rules endpoints.
    * Annotations: Improved rendering performance of event markers.
    * CloudWatch Logs: Skip caching for log queries.
    * Explore: Added an opt-in configuration for Node Graph in
      Jaeger, Zipkin, and Tempo.
    * Packaging: Add stricter systemd unit options.
    * Prometheus: Metrics browser can now handle label values with
    * CodeEditor: Ensure that we trigger the latest onSave callback
      provided to the component.
    * DashboardList/AlertList: Fix for missing All folder value.
    * Plugins: Create a mock icon component to prevent console
      errors.
- Update to version 8.2.0-beta2
    * AccessControl: Document new permissions restricting data
      source access.
    * TimePicker: Add fiscal years and search to time picker.
    * Alerting: Added support for Unified Alerting with Grafana HA.
    * Alerting: Added support for tune rule evaluation using
      configuration options.
    * Alerting: Cleanups alertmanager namespace from key-value
      store when disabling Grafana 8 alerts.
    * Alerting: Remove ngalert feature toggle and introduce two new
      settings for enabling Grafana 8 alerts and disabling them for
      specific organisations.
    * CloudWatch: Introduced new math expression where it is
      necessary to specify the period field.
    * InfluxDB: Added support for $__interval and $__interval_ms in
      Flux queries for alerting.
    * InfluxDB: Flux queries can use more precise start and end
      timestamps with nanosecond-precision.
    * Plugins Catalog: Make the catalog the default way to interact
      with plugins.
    * Prometheus: Removed autocomplete limit for metrics.
    * Alerting: Fixed an issue where the edit page crashes if you
      tried to preview an alert without a condition set.
    * Alerting: Fixed rules migration to keep existing Grafana 8
      alert rules.
    * Alerting: Fixed the silence file content generated during
    * Analytics: Fixed an issue related to interaction event
      propagation in Azure Application Insights.
    * BarGauge: Fixed an issue where the cell color was lit even
      though there was no data.
    * BarGauge: Improved handling of streaming data.
    * CloudMonitoring: Fixed INT64 label unmarshal error.
    * ConfirmModal: Fixes confirm button focus on modal open.
    * Dashboard: Add option to generate short URL for variables
      with values containing spaces.
    * Explore: No longer hides errors containing refId property.
    * Fixed an issue that produced State timeline panel tooltip
      error when data was not in sync.
    * InfluxDB: InfluxQL query editor is set to always use
      resultFormat.
    * Loki: Fixed creating context query for logs with parsed
      labels.
    * PageToolbar: Fixed alignment of titles.
    * Plugins Catalog: Update to the list of available panels after
      an install, update or uninstall.
    * TimeSeries: Fixed an issue where the shared cursor was not
      showing when hovering over in old Graph panel.
    * Variables: Fixed issues related to change of focus or refresh
      pages when pressing enter in a text box variable input.
    * Variables: Panel no longer crash when using the adhoc
      variable in data links.
- Update to version 8.2.0-beta1
    * AccessControl: Introduce new permissions to restrict access
      for reloading provisioning configuration.
    * Alerting: Add UI to edit Cortex/Loki namespace, group names,
      and group evaluation interval.
    * Alerting: Add a Test button to test contact point.
    * Alerting: Allow creating/editing recording rules for Loki and
      Cortex.
    * Alerting: Metrics should have the label org instead of user.
    * Alerting: Sort notification channels by name to make them
      easier to locate.
    * Alerting: Support org level isolation of notification
    * AzureMonitor: Add data links to deep link to Azure Portal
      Azure Resource Graph.
    * AzureMonitor: Add support for annotations from Azure Monitor
      Metrics and Azure Resource Graph services.
    * AzureMonitor: Show error message when subscriptions request
      fails in ConfigEditor.
    * Chore: Update to Golang 1.16.7.
    * CloudWatch Logs: Add link to X-Ray data source for trace IDs
      in logs.
    * CloudWatch Logs: Disable query path using websockets (Live)
      feature.
    * CloudWatch/Logs: Don't group dataframes for non time series
    * Cloudwatch: Migrate queries that use multiple stats to one
      query per stat.
    * Dashboard: Keep live timeseries moving left (v2).
    * Datasources: Introduce response_limit for datasource
      responses.
    * Explore: Add filter by trace or span ID to trace to logs
    * Explore: Download traces as JSON in Explore Inspector.
    * Explore: Reuse Dashboard's QueryRows component.
    * Explore: Support custom display label for derived fields
      buttons for Loki datasource.
    * Grafana UI: Update monaco-related dependencies.
    * Graphite: Deprecate browser access mode.
    * InfluxDB: Improve handling of intervals in alerting.
    * InfluxDB: InfluxQL query editor: Handle unusual characters in
      tag values better.
    * Jaeger: Add ability to upload JSON file for trace data.
    * LibraryElements: Enable specifying UID for new and existing
      library elements.
    * LibraryPanels: Remove library panel icon from the panel
      header so you can no longer tell that a panel is a library
      panel from the dashboard view.
    * Logs panel: Scroll to the bottom on page refresh when sorting
      in ascending order.
    * Loki: Add fuzzy search to label browser.
    * Navigation: Implement active state for items in the Sidemenu.
    * Packaging: Update PID file location from /var/run to /run.
    * Plugins: Add Hide OAuth Forward config option.
    * Postgres/MySQL/MSSQL: Add setting to limit the maximum number
      of rows processed.
    * Prometheus: Add browser access mode deprecation warning.
    * Prometheus: Add interpolation for built-in-time variables to
      backend.
    * Tempo: Add ability to upload trace data in JSON format.
    * TimeSeries/XYChart: Allow grid lines visibility control in
      XYChart and TimeSeries panels.
    * Transformations: Convert field types to time string number or
      boolean.
    * Value mappings: Add regular-expression based value mapping.
    * Zipkin: Add ability to upload trace JSON.
    * Admin: Prevent user from deleting user's current/active
      organization.
    * LibraryPanels: Fix library panel getting saved in the
      dashboard's folder.
    * OAuth: Make generic teams URL and JMES path configurable.
    * QueryEditor: Fix broken copy-paste for mouse middle-click
    * Thresholds: Fix undefined color in 'Add threshold'.
    * Timeseries: Add wide-to-long, and fix multi-frame output.
    * TooltipPlugin: Fix behavior of Shared Crosshair when Tooltip
      is set to All.
    * Grafana UI: Fix TS error property css is missing in type.
- Update to version 8.1.8
- Update to version 8.1.7
    * Alerting: Fix alerts with evaluation interval more than 30
      seconds resolving before notification.
    * Elasticsearch/Prometheus: Fix usage of proper SigV4 service
      namespace.
- Update to version 8.1.6
  + Security: Fixes CVE-2021-39226.
- Update to version 8.1.5
    * BarChart: Fixes panel error that happens on second refresh.
- Update to version 8.1.4
  + Features and enhancements
    * Explore: Ensure logs volume bar colors match legend colors.
    * LDAP: Search all DNs for users.
    * Alerting: Fix notification channel migration.
    * Annotations: Fix blank panels for queries with unknown data
      sources.
    * BarChart: Fix stale values and x axis labels.
    * Graph: Make old graph panel thresholds work even if ngalert
      is enabled.
    * InfluxDB: Fix regex to identify / as separator.
    * LibraryPanels: Fix update issues related to library panels in
      rows.
    * Variables: Fix variables not updating inside a Panel when the
      preceding Row uses 'Repeat For'.
- Update to version 8.1.3
  + Bug fixes
    * Alerting: Fix alert flapping in the internal alertmanager.
    * Alerting: Fix request handler failed to convert dataframe
      'results' to plugins.DataTimeSeriesSlice: input frame is not
      recognized as a time series.
    * Dashboard: Fix UIDs are not preserved when importing/creating
      dashboards thru importing .json file.
    * Dashboard: Forces panel re-render when exiting panel edit.
    * Dashboard: Prevent folder from changing when navigating to
      general settings.
    * Docker: Force use of libcrypto1.1 and libssl1.1 versions to
      fix CVE-2021-3711.
    * Elasticsearch: Fix metric names for alert queries.
    * Elasticsearch: Limit Histogram field parameter to numeric
      values.
    * Elasticsearch: Prevent pipeline aggregations to show up in
      terms order by options.
    * LibraryPanels: Prevent duplicate repeated panels from being
      created.
    * Loki: Fix ad-hoc filter in dashboard when used with parser.
    * Plugins: Track signed files + add warn log for plugin assets
      which are not signed.
    * Postgres/MySQL/MSSQL: Fix region annotations not displayed
      correctly.
    * Prometheus: Fix validate selector in metrics browser.
    * Security: Fix stylesheet injection vulnerability.
    * Security: Fix short URL vulnerability.
- Update to version 8.1.2
    * AzureMonitor: Add support for PostgreSQL and MySQL Flexible
      Servers.
    * Datasource: Change HTTP status code for failed datasource
      health check to 400.
    * Explore: Add span duration to left panel in trace viewer.
    * Plugins: Use file extension allowlist when serving plugin
      assets instead of checking for UNIX executable.
    * Profiling: Add support for binding pprof server to custom
      network interfaces.
    * Search: Make search icon keyboard navigable.
    * Template variables: Keyboard navigation improvements.
    * Tooltip: Display ms within minute time range.
    * Alerting: Fix saving LINE contact point.
    * Annotations: Fix alerting annotation coloring.
    * Annotations: Alert annotations are now visible in the correct
      Panel.
    * Auth: Hide SigV4 config UI and disable middleware when its
      config flag is disabled.
    * Dashboard: Prevent incorrect panel layout by comparing window
      width against theme breakpoints.
    * Explore: Fix showing of full log context.
    * PanelEdit: Fix 'Actual' size by passing the correct panel
      size to Dashboard.
    * Plugins: Fix TLS datasource settings.
    * Variables: Fix issue with empty drop downs on navigation.
    * Variables: Fix URL util converting false into true.
    * Toolkit: Fix matchMedia not found error.
- Update to version 8.1.1
    * CloudWatch Logs: Fix crash when no region is selected.
- Update to version 8.1.0
    * Alerting: Deduplicate receivers during migration.
    * ColorPicker: Display colors as RGBA.
    * Select: Make portalling the menu opt-in, but opt-in
      everywhere.
    * TimeRangePicker: Improve accessibility.
    * Annotations: Correct annotations that are displayed upon page
      refresh.
    * Annotations: Fix Enabled button that disappeared from Grafana
      v8.0.6.
    * Annotations: Fix data source template variable that was not
      available for annotations.
    * AzureMonitor: Fix annotations query editor that does not
      load.
    * Geomap: Fix scale calculations.
    * GraphNG: Fix y-axis autosizing.
    * Live: Display stream rate and fix duplicate channels in list
    * Loki: Update labels in log browser when time range changes in
      dashboard.
    * NGAlert: Send resolve signal to alertmanager on alerting -&gt;
      Normal.
    * PasswordField: Prevent a password from being displayed when
      you click the Enter button.
    * Renderer: Remove debug.log file when Grafana is stopped.
    * Security: Update dependencies to fix CVE-2021-36222.
- Update to version 8.1.0-beta3
    * Alerting: Support label matcher syntax in alert rule list
      filter.
    * IconButton: Put tooltip text as aria-label.
    * Live: Experimental HA with Redis.
    * UI: FileDropzone component.
    * CloudWatch: Add AWS LookoutMetrics.
    * Docker: Fix builds by delaying go mod verify until all
      required files are copied over.
    * Exemplars: Fix disable exemplars only on the query that
      failed.
    * SQL: Fix SQL dataframe resampling (fill mode + time
      intervals).
- Update to version 8.1.0-beta2
    * Alerting: Expand the value string in alert annotations and
    * Auth: Add Azure HTTP authentication middleware.
    * Auth: Auth: Pass user role when using the authentication
      proxy.
    * Gazetteer: Update countries.json file to allow for linking to
      3-letter country codes.
    * Config: Fix Docker builds by correcting formatting in
      sample.ini.
    * Explore: Fix encoding of internal URLs.
- Update to version 8.1.0-beta1
    * Alerting: Add Alertmanager notifications tab.
    * Alerting: Add button to deactivate current Alertmanager
    * Alerting: Add toggle in Loki/Prometheus data source
      configuration to opt out of alerting UI.
    * Alerting: Allow any 'evaluate for' value &gt;=0 in the alert
      rule form.
    * Alerting: Load default configuration from status endpoint, if
      Cortex Alertmanager returns empty user configuration. 
    * Alerting: view to display alert rule and its underlying data.
    * Annotation panel: Release the annotation panel.
    * Annotations: Add typeahead support for tags in built-in
      annotations.
    * AzureMonitor: Add curated dashboards for Azure services.
    * AzureMonitor: Add support for deep links to Microsoft Azure
      portal for Metrics.
    * AzureMonitor: Remove support for different credentials for
      Azure Monitor Logs.
    * AzureMonitor: Support querying any Resource for Logs queries.
    * Elasticsearch: Add frozen indices search support.
    * Elasticsearch: Name fields after template variables values
      instead of their name.
    * Elasticsearch: add rate aggregation.
    * Email: Allow configuration of content types for email
      notifications.
    * Explore: Add more meta information when line limit is hit.
    * Explore: UI improvements to trace view.
    * FieldOverrides: Added support to change display name in an
      override field and have it be matched by a later rule.
    * HTTP Client: Introduce dataproxy_max_idle_connections config
      variable.
    * InfluxDB: InfluxQL: adds tags to timeseries data.
    * InfluxDB: InfluxQL: make measurement search case insensitive.
      Legacy Alerting: Replace simplejson with a struct in webhook
      notification channel.
    * Legend: Updates display name for Last (not null) to just
      Last*.
    * Logs panel: Add option to show common labels.
    * Loki: Add $__range variable.
    * Loki: Add support for 'label_values(log stream selector,
      label)' in templating.
    * Loki: Add support for ad-hoc filtering in dashboard.
    * MySQL Datasource: Add timezone parameter.
    * NodeGraph: Show gradient fields in legend.
    * PanelOptions: Don't mutate panel options/field config object
      when updating.
    * PieChart: Make pie gradient more subtle to match other
      charts.
    * Prometheus: Update PromQL typeahead and highlighting.
    * Prometheus: interpolate variable for step field.
    * Provisioning: Improve validation by validating across all
      dashboard providers.
    * SQL Datasources: Allow multiple string/labels columns with
      time series.
    * Select: Portal select menu to document.body.
    * Team Sync: Add group mapping to support team sync in the
      Generic OAuth provider.
    * Tooltip: Make active series more noticeable.
    * Tracing: Add support to configure trace to logs start and end
      time.
    * Transformations: Skip merge when there is only a single data
      frame.
    * ValueMapping: Added support for mapping text to color,
      boolean values, NaN and Null. Improved UI for value mapping.
    * Visualizations: Dynamically set any config (min, max, unit,
      color, thresholds) from query results.
    * live: Add support to handle origin without a value for the
      port when matching with root_url.
    * Alerting: Handle marshaling Inf values.
    * AzureMonitor: Fix macro resolution for template variables.
    * AzureMonitor: Fix queries with Microsoft.NetApp/../../volumes
      resources.
    * AzureMonitor: Request and concat subsequent resource pages.
    * Bug: Fix parse duration for day.
    * Datasources: Improve error handling for error messages.
    * Explore: Correct the functionality of shift-enter shortcut
      across all uses.
    * Explore: Show all dataFrames in data tab in Inspector.
    * GraphNG: Fix Tooltip mode 'All' for XYChart.
    * Loki: Fix highlight of logs when using filter expressions
      with backticks.
    * Modal: Force modal content to overflow with scroll.
    * Plugins: Ignore symlinked folders when verifying plugin
      signature.
    * Toolkit: Improve error messages when tasks fail.
- Update to version 8.0.7
- Update to version 8.0.6
    * Alerting: Add annotation upon alert state change.
    * Alerting: Allow space in label and annotation names.
    * InfluxDB: Improve legend labels for InfluxDB query results.
    * Alerting: Fix improper alert by changing the handling of
      empty labels.
    * CloudWatch/Logs: Reestablish Cloud Watch alert behavior.
    * Dashboard: Avoid migration breaking on fieldConfig without
      defaults field in folded panel.
    * DashboardList: Fix issue not re-fetching dashboard list after
      variable change.
    * Database: Fix incorrect format of isolation level
      configuration parameter for MySQL.
    * InfluxDB: Correct tag filtering on InfluxDB data.
    * Links: Fix links that caused a full page reload.
    * Live: Fix HTTP error when InfluxDB metrics have an incomplete
      or asymmetrical field set.
    * Postgres/MySQL/MSSQL: Change time field to 'Time' for time
      series queries.
    * Postgres: Fix the handling of a null return value in query
    * Tempo: Show hex strings instead of uints for IDs.
    * TimeSeries: Improve tooltip positioning when tooltip
      overflows.
    * Transformations: Add 'prepare time series' transformer.
- Update to version 8.0.5
    * Cloudwatch Logs: Send error down to client.
    * Folders: Return 409 Conflict status when folder already
      exists.
    * TimeSeries: Do not show series in tooltip if it's hidden in
      the viz.
    * AzureMonitor: Fix issue where resource group name is missing
      on the resource picker button.
    * Chore: Fix AWS auth assuming role with workspace IAM.
    * DashboardQueryRunner: Fixes unrestrained subscriptions being
    * DateFormats: Fix reading correct setting key for
      use_browser_locale.
    * Links: Fix links to other apps outside Grafana when under sub
      path.
    * Snapshots: Fix snapshot absolute time range issue.
    * Table: Fix data link color.
    * Time Series: Fix X-axis time format when tick increment is
      larger than a year.
    * Tooltip Plugin: Prevent tooltip render if field is undefined.
- Update to version 8.0.4
    * Live: Rely on app url for origin check.
    * PieChart: Sort legend descending, update placeholder.
    * TimeSeries panel: Do not reinitialize plot when thresholds
      mode change.
    * Elasticsearch: Allow case sensitive custom options in
      date_histogram interval.
    * Elasticsearch: Restore previous field naming strategy when
      using variables.
    * Explore: Fix import of queries between SQL data sources.
    * InfluxDB: InfluxQL query editor: fix retention policy
      handling.
    * Loki: Send correct time range in template variable queries.
    * TimeSeries: Preserve RegExp series overrides when migrating
      from old graph panel.
- Update to version 8.0.3
    * Alerting: Increase alertmanager_conf column if MySQL.
    * Time series/Bar chart panel: Handle infinite numbers as nulls
      when converting to plot array.
    * TimeSeries: Ensure series overrides that contain color are
      migrated, and migrate the previous fieldConfig when changing
      the panel type.
    * ValueMappings: Improve singlestat value mappings migration.
    * Annotations: Fix annotation line and marker colors.
    * AzureMonitor: Fix KQL template variable queries without
      default workspace.
    * CloudWatch/Logs: Fix missing response data for log queries.
    * LibraryPanels: Fix crash in library panels list when panel
      plugin is not found.
    * LogsPanel: Fix performance drop when moving logs panel in
    * Loki: Parse log levels when ANSI coloring is enabled.
    * MSSQL: Fix issue with hidden queries still being executed.
    * PanelEdit: Display the VisualizationPicker that was not
      displayed if a panel has an unknown panel plugin.
    * Plugins: Fix loading symbolically linked plugins.
    * Prometheus: Fix issue where legend name was replaced with
      name Value in stat and gauge panels.
    * State Timeline: Fix crash when hovering over panel.
- Update to version 8.0.2
    * Datasource: Add support for max_conns_per_host in dataproxy
      settings.
    * Configuration: Fix changing org preferences in FireFox.
    * PieChart: Fix legend dimension limits.
    * Postgres/MySQL/MSSQL: Fix panic in concurrent map writes.
    * Variables: Hide default data source if missing from regex.
- Update to version 8.0.1
    * Alerting/SSE: Fix 'count_non_null' reducer validation.
    * Cloudwatch: Fix duplicated time series.
    * Cloudwatch: Fix missing defaultRegion.
    * Dashboard: Fix Dashboard init failed error on dashboards with
      old singlestat panels in collapsed rows.
    * Datasource: Fix storing timeout option as numeric.
    * Postgres/MySQL/MSSQL: Fix annotation parsing for empty
    * Postgres/MySQL/MSSQL: Numeric/non-string values are now
      returned from query variables.
    * Postgres: Fix an error that was thrown when the annotation
      query did not return any results.
    * StatPanel: Fix an issue with the appearance of the graph when
      switching color mode.
    * Visualizations: Fix an issue in the
      Stat/BarGauge/Gauge/PieChart panels where all values mode
      were showing the same name if they had the same value.
    * Toolkit: Resolve external fonts when Grafana is served from a
      sub path.
- Update to version 8.0.0
    * The following endpoints were deprecated for Grafana v5.0 and
      support for them has now been removed:
      GET /dashboards/db/:slug
      GET /dashboard-solo/db/:slug
      GET /api/dashboard/db/:slug
      DELETE /api/dashboards/db/:slug
    * AzureMonitor: Require default subscription for workspaces()
      template variable query.
    * AzureMonitor: Use resource type display names in the UI.
    * Dashboard: Remove support for loading and deleting dashboard
      by slug.
    * InfluxDB: Deprecate direct browser access in data source.
    * VizLegend: Add a read-only property.
    * AzureMonitor: Fix Azure Resource Graph queries in Azure
      China.
    * Checkbox: Fix vertical layout issue with checkboxes due to
      fixed height.
    * Dashboard: Fix Table view when editing causes the panel data
      to not update.
    * Dashboard: Fix issues where unsaved-changes warning is not
      displayed.
    * Login: Fixes Unauthorized message showing when on login page
      or snapshot page.
    * NodeGraph: Fix sorting markers in grid view.
    * Short URL: Include orgId in generated short URLs.
    * Variables: Support raw values of boolean type.
- Update to version 8.0.0-beta3
    * The default HTTP method for Prometheus data source is now
      POST.
    * API: Support folder UID in dashboards API.
    * Alerting: Add support for configuring avatar URL for the
      Discord notifier.
    * Alerting: Clarify that Threema Gateway Alerts support only
      Basic IDs.
    * Azure: Expose Azure settings to external plugins.
    * AzureMonitor: Deprecate using separate credentials for Azure
      Monitor Logs.
    * AzureMonitor: Display variables in resource picker for Azure
    * AzureMonitor: Hide application insights for data sources not
      using it.
    * AzureMonitor: Support querying subscriptions and resource
      groups in Azure Monitor Logs.
    * AzureMonitor: remove requirement for default subscription.
    * CloudWatch: Add Lambda@Edge Amazon CloudFront metrics.
    * CloudWatch: Add missing AWS AppSync metrics.
    * ConfirmModal: Auto focus delete button.
    * Explore: Add caching for queries that are run from logs
    * Loki: Add formatting for annotations.
    * Loki: Bring back processed bytes as meta information.
    * NodeGraph: Display node graph collapsed by default with trace
      view.
    * Overrides: Include a manual override option to hide something
      from visualization.
    * PieChart: Support row data in pie charts.
    * Prometheus: Update default HTTP method to POST for existing
      data sources.
    * Time series panel: Position tooltip correctly when window is
      scrolled or resized.
    * Admin: Fix infinite loading edit on the profile page.
    * Color: Fix issues with random colors in string and date
    * Dashboard: Fix issue with title or folder change has no
      effect after exiting settings view.
    * DataLinks: Fix an issue __series.name is not working in data
      link.
    * Datasource: Fix dataproxy timeout should always be applied
      for outgoing data source HTTP requests.
    * Elasticsearch: Fix NewClient not passing httpClientProvider
      to client impl.
    * Explore: Fix Browser title not updated on Navigation to
      Explore.
    * GraphNG: Remove fieldName and hideInLegend properties from
      UPlotSeriesBuilder.
    * OAuth: Fix fallback to auto_assign_org_role setting for Azure
      AD OAuth when no role claims exists.
    * PanelChrome: Fix issue with empty panel after adding a non
      data panel and coming back from panel edit.
    * StatPanel: Fix data link tooltip not showing for single
      value.
    * Table: Fix sorting for number fields.
    * Table: Have text underline for datalink, and add support for
      image datalink.
    * Transformations: Prevent FilterByValue transform from
      crashing panel edit.
- Update to version 8.0.0-beta2
    * AppPlugins: Expose react-router to apps.
    * AzureMonitor: Add Azure Resource Graph.
    * AzureMonitor: Managed Identity configuration UI.
    * AzureMonitor: Token provider with support for Managed
      Identities.
    * AzureMonitor: Update Logs workspace() template variable query
      to return resource URIs.
    * BarChart: Value label sizing.
    * CloudMonitoring: Add support for preprocessing.
    * CloudWatch: Add AWS/EFS StorageBytes metric.
    * CloudWatch: Allow use of missing AWS namespaces using custom
    * Datasource: Shared HTTP client provider for core backend data
      sources and any data source using the data source proxy.
    * InfluxDB: InfluxQL: allow empty tag values in the query
      editor.
    * Instrumentation: Instrument incoming HTTP request with
      histograms by default.
    * Library Panels: Add name endpoint &amp; unique name validation to
      AddLibraryPanelModal.
    * Logs panel: Support details view.
    * PieChart: Always show the calculation options dropdown in the
    * PieChart: Remove beta flag.
    * Plugins: Enforce signing for all plugins.
    * Plugins: Remove support for deprecated backend plugin
      protocol version.
    * Tempo/Jaeger: Add better display name to legend.
    * Timeline: Add time range zoom.
    * Timeline: Adds opacity &amp; line width option.
    * Timeline: Value text alignment option.
    * ValueMappings: Add duplicate action, and disable dismiss on
      backdrop click.
    * Zipkin: Add node graph view to trace response.
    * Annotations panel: Remove subpath from dashboard links.
    * Content Security Policy: Allow all image sources by default.
    * Content Security Policy: Relax default template wrt. loading
      of scripts, due to nonces not working.
    * Datasource: Fix tracing propagation for alert execution by
      introducing HTTP client outgoing tracing middleware.
    * InfluxDB: InfluxQL always apply time interval end.
    * Library Panels: Fixes 'error while loading library panels'.
    * NewsPanel: Fixes rendering issue in Safari.
    * PanelChrome: Fix queries being issued again when scrolling in
      and out of view.
    * Plugins: Fix Azure token provider cache panic and auth param
      nil value.
    * Snapshots: Fix key and deleteKey being ignored when creating
      an external snapshot.
    * Table: Fix issue with cell border not showing with colored
      background cells.
    * Table: Makes tooltip scrollable for long JSON values.
    * TimeSeries: Fix for Connected null values threshold toggle
      during panel editing.
    * Variables: Fixes inconsistent selected states on dashboard
    * Variables: Refreshes all panels even if panel is full screen.
    * QueryField: Remove carriage return character from pasted text.
- Update to version 8.0.0-beta1
  + License update:
    * AGPL License: Update license from Apache 2.0 to the GNU
      Affero General Public License (AGPL).
    * Removes the never refresh option for Query variables.
    * Removes the experimental Tags feature for Variables.
  + Deprecations:
    * The InfoBox &amp; FeatureInfoBox are now deprecated please use
      the Alert component instead with severity info.
    * API: Add org users with pagination.
    * API: Return 404 when deleting nonexistent API key.
    * API: Return query results as JSON rather than base64 encoded
      Arrow.
    * Alerting: Allow sending notification tags to Opsgenie as
      extra properties.
    * Alerts: Replaces all uses of InfoBox &amp; FeatureInfoBox with
      Alert.
    * Auth: Add support for JWT Authentication.
    * AzureMonitor: Add support for
      Microsoft.SignalRService/SignalR metrics.
    * AzureMonitor: Azure settings in Grafana server config.
    * AzureMonitor: Migrate Metrics query editor to React.
    * BarChart panel: enable series toggling via legend.
    * BarChart panel: Adds support for Tooltip in BarChartPanel.
    * PieChart panel: Change look of highlighted pie slices.
    * CloudMonitoring: Migrate config editor from angular to react.
    * CloudWatch: Add Amplify Console metrics and dimensions.
    * CloudWatch: Add missing Redshift metrics to CloudWatch data
    * CloudWatch: Add metrics for managed RabbitMQ service.
    * DashboardList: Enable templating on search tag input.
    * Datasource config: correctly remove single custom http
      header.
    * Elasticsearch: Add generic support for template variables.
    * Elasticsearch: Allow omitting field when metric supports
      inline script.
    * Elasticsearch: Allow setting a custom limit for log queries.
    * Elasticsearch: Guess field type from first non-empty value.
    * Elasticsearch: Use application/x-ndjson content type for
      multisearch requests.
    * Elasticsearch: Use semver strings to identify ES version.
    * Explore: Add logs navigation to request more logs.
    * Explore: Map Graphite queries to Loki.
    * Explore: Scroll split panes in Explore independently.
    * Explore: Wrap each panel in separate error boundary.
    * FieldDisplay: Smarter naming of stat values when visualising
      row values (all values) in stat panels.
    * Graphite: Expand metric names for variables.
    * Graphite: Handle unknown Graphite functions without breaking
      the visual editor.
    * Graphite: Show graphite functions descriptions.
    * Graphite: Support request cancellation properly (Uses new
      backendSrv.fetch Observable request API).
    * InfluxDB: Flux: Improve handling of complex
      response-structures.
    * InfluxDB: Support region annotations.
    * Inspector: Download logs for manual processing.
    * Jaeger: Add node graph view for trace.
    * Jaeger: Search traces.
    * Loki: Use data source settings for alerting queries.
    * NodeGraph: Exploration mode.
    * OAuth: Add support for empty scopes.
    * PanelChrome: New logic-less emotion based component with no
      dependency on PanelModel or DashboardModel.
    * PanelEdit: Adds a table view toggle to quickly view data in
      table form.
    * PanelEdit: Highlight matched words when searching options.
    * PanelEdit: UX improvements.
    * Plugins: PanelRenderer and simplified QueryRunner to be used
      from plugins.
    * Plugins: AuthType in route configuration and params
      interpolation.
    * Plugins: Enable plugin runtime install/uninstall
      capabilities.
    * Plugins: Support set body content in plugin routes.
    * Plugins: Introduce marketplace app.
    * Plugins: Moving the DataSourcePicker to grafana/runtime so it
      can be reused in plugins.
    * Prometheus: Add custom query params for alert and exemplars
    * Prometheus: Use fuzzy string matching to autocomplete metric
      names and label.
    * Routing: Replace Angular routing with react-router.
    * Slack: Use chat.postMessage API by default.
    * Tempo: Search for Traces by querying Loki directly from
      Tempo.
    * Tempo: Show graph view of the trace.
    * Themes: Switch theme without reload using global shortcut.
    * TimeSeries panel: Add support for shared cursor.
    * TimeSeries panel: Do not crash the panel if there is no time
      series data in the response.
    * Variables: Do not save repeated panels, rows and scopedVars.
    * Variables: Removes experimental Tags feature.
    * Variables: Removes the never refresh option.
    * Visualizations: Unify tooltip options across visualizations.
    * Visualizations: Refactor and unify option creation between
      new visualizations.
    * Visualizations: Remove singlestat panel.
    * APIKeys: Fixes issue with adding first api key.
    * Alerting: Add checks for non supported units - disable
      defaulting to seconds.
    * Alerting: Fix issue where Slack notifications won't link to
      user IDs.
    * Alerting: Omit empty message in PagerDuty notifier.
    * AzureMonitor: Fix migration error from older versions of App
      Insights queries.
    * CloudWatch: Fix AWS/Connect dimensions.
    * CloudWatch: Fix broken AWS/MediaTailor dimension name.
    * Dashboards: Allow string manipulation as advanced variable
      format option.
    * DataLinks: Includes harmless extended characters like
      Cyrillic characters.
    * Drawer: Fixes title overflowing its container.
    * Explore: Fix issue when some query errors were not shown.
    * Generic OAuth: Prevent adding duplicated users.
    * Graphite: Handle invalid annotations.
    * Graphite: Fix autocomplete when tags are not available.
    * InfluxDB: Fix Cannot read property 'length' of undefined in
      when parsing response.
    * Instrumentation: Enable tracing when Jaeger host and port are
    * Instrumentation: Prefix metrics with grafana.
    * MSSQL: By default let driver choose port.
    * OAuth: Add optional strict parsing of role_attribute_path.
    * Panel: Fixes description markdown with inline code being
      rendered on newlines and full width.
    * PanelChrome: Ignore data updates &amp; errors for non data
      panels.
    * Permissions: Fix inherited folder permissions can prevent new
      permissions being added to a dashboard.
    * Plugins: Remove pre-existing plugin installs when installing
      with grafana-cli.
    * Plugins: Support installing to folders with whitespace and
      fix pluginUrl trailing and leading whitespace failures.
    * Postgres/MySQL/MSSQL: Don't return connection failure details
      to the client.
    * Postgres: Fix ms precision of interval in time group macro
      when TimescaleDB is enabled.
    * Provisioning: Use dashboard checksum field as change
      indicator.
    * SQL: Fix so that all captured errors are returned from sql
      engine.
    * Shortcuts: Fixes panel shortcuts so they always work.
    * Table: Fixes so border is visible for cells with links.
    * Variables: Clear query when data source type changes.
    * Variables: Filters out builtin variables from unknown list.
    * Button: Introduce buttonStyle prop.
    * DataQueryRequest: Remove deprecated props showingGraph and
      showingTabel and exploreMode.
    * grafana/ui: Update React Hook Form to v7.
    * IconButton: Introduce variant for red and blue icon buttons.
    * Plugins: Expose the getTimeZone function to be able to get
      the current selected timeZone.
    * TagsInput: Add className to TagsInput.
    * VizLegend: Move onSeriesColorChanged to PanelContext
      (breaking change).
- Update to version 7.5.13
    * Alerting: Fix NoDataFound for alert rules using AND operator.

mgr-cfg:

- Version 4.3.6-1
  * Corrected source URL in spec file
  * Fix installation problem for SLE15SP4 due missing python-selinux
  * Fix python selinux package name depending on build target (bsc#1193600)
  * Do not build python 2 package for SLE15SP4 and higher
  * Remove unused legacy code

mgr-custom-info:

- Version 4.3.3-1
  * Remove unused legacy code

mgr-daemon:

- Version 4.3.4-1
  * Corrected source URLs in spec file
  * Update translation strings

mgr-osad:

- Version 4.3.6-1
  * Corrected source URL in spec file.
  * Do not build python 2 package for SLE15SP4 and higher
  * Removed spacewalk-selinux dependencies.
  * Updated source url.

mgr-push:

- Version 4.3.4-1
  * Corrected source URLs in spec file

mgr-virtualization:

- Version 4.3.5-1
  * Corrected source URLs in spec file.
  * Do not build python 2 package for SLE15SP4 and higher

prometheus-blackbox_exporter:

- Enhanced to build on Enterprise Linux 8

prometheus-postgres_exporter:

- Updated for RHEL8.

python-hwdata:

- Require python macros for building

rhnlib:

- Version 4.3.4-1
  * Reorganize python files

spacecmd:

- Version 4.3.11-1
  * on full system update call schedulePackageUpdate API (bsc#1197507)
  * parse boolean paramaters correctly (bsc#1197689)
  * Add parameter to set containerized proxy SSH port
  * Add proxy config generation subcommand
  * Option 'org_createfirst' added to perform initial organization and user creation
  * Added gettext build requirement for RHEL.
  * Removed RHEL 5 references.
  * Include group formulas configuration in spacecmd group_backup and
    spacecmd group_restore. This changes backup format to json,
    previously used plain text is still supported for reading (bsc#1190462)
  * Update translation strings
  * Improved event history listing and added new system_eventdetails 
    command to retrieve the details of an event
  * Make schedule_deletearchived to get all actions without display limit
  * Allow passing a date limit for schedule_deletearchived on spacecmd (bsc#1181223)

spacewalk-client-tools:

- Version 4.3.9-1
  * Corrected source URLs in spec file.
  * do not build python 2 package for SLE15
  * Remove unused legacy code
  * Update translation strings

spacewalk-koan:

- Version 4.3.5-1
  * Corrected source URLs in spec file.

spacewalk-oscap:

- Version 4.3.5-1
  * Corrected source URLs in spec file.
  * Do not build python 2 package for SLE15SP4 and higher

spacewalk-remote-utils:

- Version 4.3.3-1
  * Adapt the package for changes in rhnlib

supportutils-plugin-susemanager-client:

- Version 4.3.2-1
  * Add proxy containers config and logs

suseRegisterInfo:

- Version 4.3.3-1
  * Bump version to 4.3.0

supportutils-plugin-salt:

- Add support for Salt Bundle

uyuni-common-libs:

- Version 4.3.4-1
  * implement more decompression algorithms for reposync (bsc#1196704)
  * Reorganize python files
  * Add decompression of zck files to fileutils

		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-20"/>
	<updated date="2022-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181223">SUSE bug 1181223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190462">SUSE bug 1190462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190535">SUSE bug 1190535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193600">SUSE bug 1193600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194873">SUSE bug 1194873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195726">SUSE bug 1195726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195727">SUSE bug 1195727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195728">SUSE bug 1195728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196338">SUSE bug 1196338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196704">SUSE bug 1196704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197507">SUSE bug 1197507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197689">SUSE bug 1197689</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36222/">CVE-2021-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">CVE-2021-36222 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3711/">CVE-2021-3711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3711">CVE-2021-3711 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-39226/">CVE-2021-39226 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39226">CVE-2021-39226 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-41174/">CVE-2021-41174 at SUSE</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41174">CVE-2021-41174 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41244/">CVE-2021-41244 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41244">CVE-2021-41244 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43798/">CVE-2021-43798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43798">CVE-2021-43798 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43813/">CVE-2021-43813 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43813">CVE-2021-43813 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43815/">CVE-2021-43815 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43815">CVE-2021-43815 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21673/">CVE-2022-21673 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21673">CVE-2022-21673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21698">CVE-2022-21698 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21702/">CVE-2022-21702 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21702">CVE-2022-21702 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21703/">CVE-2022-21703 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21703">CVE-2022-21703 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21713/">CVE-2022-21713 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21713">CVE-2022-21713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696541" comment="golang-github-prometheus-node_exporter-1.3.0-1.15.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151003" version="1" class="patch">
	<metadata>
		<title>Security update for fwupdate (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011330.html" source="SUSE-SU"/>
		<description>

This update of fwupdate fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-22"/>
	<updated date="2022-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696152" comment="fwupdate-0.5-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696153" comment="fwupdate-efi-0.5-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696154" comment="libfwup0-0.5-10.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151004" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1070738" ref_url="https://bugzilla.suse.com/1070738" source="BUGZILLA"/>
		<reference ref_id="1198511" ref_url="https://bugzilla.suse.com/1198511" source="BUGZILLA"/>
		<reference ref_id="1199441" ref_url="https://bugzilla.suse.com/1199441" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011339.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2015-20107: avoid command injection in the mailcap module (bsc#1198511).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-23"/>
	<updated date="2022-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070738">SUSE bug 1070738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198511">SUSE bug 1198511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199441">SUSE bug 1199441</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696400" comment="libpython3_4m1_0-3.4.10-25.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696401" comment="python3-3.4.10-25.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696402" comment="python3-base-3.4.10-25.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696403" comment="python3-curses-3.4.10-25.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151005" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1200550" ref_url="https://bugzilla.suse.com/1200550" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2068" ref_url="https://www.suse.com/security/cve/CVE-2022-2068/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011354.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-2068: Fixed more shell code injection issues in c_rehash. (bsc#1200550)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-24"/>
	<updated date="2022-06-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1200550">SUSE bug 1200550</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2068/">CVE-2022-2068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">CVE-2022-2068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696404" comment="libopenssl-devel-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696405" comment="libopenssl1_0_0-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696162" comment="libopenssl1_0_0-32bit-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696406" comment="libopenssl1_0_0-hmac-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696164" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696407" comment="openssl-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696166" comment="openssl-doc-1.0.2j-60.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151006" version="1" class="patch">
	<metadata>
		<title>Security update for oracleasm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011369.html" source="SUSE-SU"/>
		<description>

This update of oracleasm fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-28"/>
	<updated date="2022-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696542" comment="oracleasm-kmp-default-2.0.8_k4.4.180_94.164-3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151007" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1198511" ref_url="https://bugzilla.suse.com/1198511" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011384.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2015-20107: avoid command injection in the mailcap module (bsc#1198511).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-04"/>
	<updated date="2022-07-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198511">SUSE bug 1198511</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696408" comment="libpython2_7-1_0-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696171" comment="libpython2_7-1_0-32bit-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696409" comment="python-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696173" comment="python-32bit-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696410" comment="python-base-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696175" comment="python-base-32bit-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696411" comment="python-curses-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696412" comment="python-demo-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696543" comment="python-devel-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696179" comment="python-doc-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696180" comment="python-doc-pdf-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696413" comment="python-gdbm-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696414" comment="python-idle-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696415" comment="python-tk-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696416" comment="python-xml-2.7.18-28.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151008" version="1" class="patch">
	<metadata>
		<title>Security update for sysstat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1144923" ref_url="https://bugzilla.suse.com/1144923" source="BUGZILLA"/>
		<reference ref_id="1159104" ref_url="https://bugzilla.suse.com/1159104" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19725" ref_url="https://www.suse.com/security/cve/CVE-2019-19725/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0026-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011392.html" source="SUSE-SU"/>
		<description>
This update for sysstat fixes the following issues:

Security issue fixed:                                                                                                                                                               
                                                                                                                                                                                   
- CVE-2019-19725: Fixed double free in check_file_actlst in sa_common.c (bsc#1159104).                                                                                    

Bug fixes:

- Enable log information of starting/stoping services. (bsc#1144923, jsc#SLE-5958)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-04"/>
	<updated date="2022-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144923">SUSE bug 1144923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159104">SUSE bug 1159104</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19725/">CVE-2019-19725 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19725">CVE-2019-19725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522597" comment="sysstat-12.0.2-10.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557523" comment="sysstat-isag-12.0.2-10.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151009" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011404.html" source="SUSE-SU"/>
		<description>

This update of dpdk fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-05"/>
	<updated date="2022-07-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696554" comment="dpdk-16.11.9-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696196" comment="dpdk-kmp-default-16.11.9_k4.4.180_94.164-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696555" comment="dpdk-tools-16.11.9-8.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151010" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1200793" ref_url="https://bugzilla.suse.com/1200793" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-31744" ref_url="https://www.suse.com/security/cve/CVE-2022-31744/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34478" ref_url="https://www.suse.com/security/cve/CVE-2022-34478/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011428.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 91.11.0 ESR (MFSA 2022-25) (bsc#1200793):

- CVE-2022-2200: Undesired attributes could be set as part of prototype pollution (bmo#1771381)
- CVE-2022-31744: CSP bypass enabling stylesheet injection (bmo#1757604)
- CVE-2022-34468: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI (bmo#1768537)
- CVE-2022-34470: Use-after-free in nsSHistory (bmo#1765951)
- CVE-2022-34472: Unavailable PAC file resulted in OCSP requests being blocked (bmo#1770123)
- CVE-2022-34478: Microsoft protocols can be attacked if a user accepts a prompt (bmo#1773717)
- CVE-2022-34479: A popup window could be resized in a way to overlay the address bar with web content (bmo#1745595)
- CVE-2022-34481: Potential integer overflow in ReplaceElementsAt (bmo#1497246)
- CVE-2022-34484: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 (bmo#1763634, bmo#1772651)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-06"/>
	<updated date="2022-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2200">CVE-2022-2200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31744/">CVE-2022-31744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31744">CVE-2022-31744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34468">CVE-2022-34468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34470">CVE-2022-34470 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34472">CVE-2022-34472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34478/">CVE-2022-34478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34478">CVE-2022-34478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34479">CVE-2022-34479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34481">CVE-2022-34481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34484">CVE-2022-34484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700049" comment="MozillaFirefox-91.11.0-112.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700050" comment="MozillaFirefox-devel-91.11.0-112.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700051" comment="MozillaFirefox-translations-common-91.11.0-112.119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151011" version="1" class="patch">
	<metadata>
		<title>Security update for rsyslog (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1199061" ref_url="https://bugzilla.suse.com/1199061" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24903" ref_url="https://www.suse.com/security/cve/CVE-2022-24903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011474.html" source="SUSE-SU"/>
		<description>
This update for rsyslog fixes the following issues:

- CVE-2022-24903: fix potential heap buffer overflow in modules for TCP syslog reception (bsc#1199061)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-07"/>
	<updated date="2022-07-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199061">SUSE bug 1199061</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24903/">CVE-2022-24903 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24903">CVE-2022-24903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696544" comment="rsyslog-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696545" comment="rsyslog-diag-tools-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696546" comment="rsyslog-doc-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696547" comment="rsyslog-module-gssapi-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696548" comment="rsyslog-module-gtls-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696549" comment="rsyslog-module-mysql-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696550" comment="rsyslog-module-pgsql-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696551" comment="rsyslog-module-relp-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696552" comment="rsyslog-module-snmp-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696553" comment="rsyslog-module-udpspoof-8.24.0-3.58.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151012" version="1" class="patch">
	<metadata>
		<title>Security update for pcre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1199232" ref_url="https://bugzilla.suse.com/1199232" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1586" ref_url="https://www.suse.com/security/cve/CVE-2022-1586/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011480.html" source="SUSE-SU"/>
		<description>
This update for pcre fixes the following issues:
	  
- CVE-2022-1586: Fixed unicode property matching issue. (bsc#1199232)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-08"/>
	<updated date="2022-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199232">SUSE bug 1199232</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1586/">CVE-2022-1586 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">CVE-2022-1586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696418" comment="libpcre1-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696199" comment="libpcre1-32bit-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696419" comment="libpcre16-0-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696556" comment="libpcrecpp0-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696557" comment="libpcreposix0-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696558" comment="pcre-devel-8.45-8.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151013" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1200737" ref_url="https://bugzilla.suse.com/1200737" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32208" ref_url="https://www.suse.com/security/cve/CVE-2022-32208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011504.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-32208: FTP-KRB bad message verification (bsc#1200737)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-11"/>
	<updated date="2022-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200737">SUSE bug 1200737</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32208/">CVE-2022-32208 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32208">CVE-2022-32208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700062" comment="curl-7.37.0-37.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700063" comment="libcurl4-7.37.0-37.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700064" comment="libcurl4-32bit-7.37.0-37.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151014" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1194179" ref_url="https://bugzilla.suse.com/1194179" source="BUGZILLA"/>
		<reference ref_id="1194181" ref_url="https://bugzilla.suse.com/1194181" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2319" ref_url="https://www.suse.com/security/cve/CVE-2022-2319/" source="CVE"/>
		<reference ref_id="CVE-2022-2320" ref_url="https://www.suse.com/security/cve/CVE-2022-2320/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011516.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2022-2319: Fixed out-of-bounds access in _CheckSetSections() (ZDI-CAN-16062) (bsc#1194179).
- CVE-2022-2320: Fixed out-of-bounds access in CheckSetDeviceIndicators() (ZDI-CAN-16070) (bsc#1194181).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-12"/>
	<updated date="2022-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194179">SUSE bug 1194179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194181">SUSE bug 1194181</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2319/">CVE-2022-2319 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2319">CVE-2022-2319 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2320/">CVE-2022-2320 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2320">CVE-2022-2320 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700065" comment="xorg-x11-server-7.6_1.18.3-76.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700066" comment="xorg-x11-server-extra-7.6_1.18.3-76.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151015" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1183436" ref_url="https://bugzilla.suse.com/1183436" source="BUGZILLA"/>
		<reference ref_id="1185921" ref_url="https://bugzilla.suse.com/1185921" source="BUGZILLA"/>
		<reference ref_id="1200907" ref_url="https://bugzilla.suse.com/1200907" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25097" ref_url="https://www.suse.com/security/cve/CVE-2020-25097/" source="CVE"/>
		<reference ref_id="CVE-2021-28651" ref_url="https://www.suse.com/security/cve/CVE-2021-28651/" source="CVE"/>
		<reference ref_id="CVE-2021-46784" ref_url="https://www.suse.com/security/cve/CVE-2021-46784/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011543.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-25097: Fixed HTTP Request Smuggling (bsc#1183436)
- CVE-2021-28651: Fixed DoS in URN processing (bsc#1185921)
- CVE-2021-46784: Fixed DoS when processing gopher server responses (bsc#1200907)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-13"/>
	<updated date="2022-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183436">SUSE bug 1183436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185921">SUSE bug 1185921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200907">SUSE bug 1200907</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25097/">CVE-2020-25097 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25097">CVE-2020-25097 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28651/">CVE-2021-28651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28651">CVE-2021-28651 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46784/">CVE-2021-46784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46784">CVE-2021-46784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700074" comment="squid-3.5.21-26.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151016" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1066618" ref_url="https://bugzilla.suse.com/1066618" source="BUGZILLA"/>
		<reference ref_id="1146519" ref_url="https://bugzilla.suse.com/1146519" source="BUGZILLA"/>
		<reference ref_id="1194013" ref_url="https://bugzilla.suse.com/1194013" source="BUGZILLA"/>
		<reference ref_id="1196901" ref_url="https://bugzilla.suse.com/1196901" source="BUGZILLA"/>
		<reference ref_id="1199487" ref_url="https://bugzilla.suse.com/1199487" source="BUGZILLA"/>
		<reference ref_id="1199657" ref_url="https://bugzilla.suse.com/1199657" source="BUGZILLA"/>
		<reference ref_id="1200571" ref_url="https://bugzilla.suse.com/1200571" source="BUGZILLA"/>
		<reference ref_id="1200604" ref_url="https://bugzilla.suse.com/1200604" source="BUGZILLA"/>
		<reference ref_id="1200605" ref_url="https://bugzilla.suse.com/1200605" source="BUGZILLA"/>
		<reference ref_id="1200619" ref_url="https://bugzilla.suse.com/1200619" source="BUGZILLA"/>
		<reference ref_id="1200692" ref_url="https://bugzilla.suse.com/1200692" source="BUGZILLA"/>
		<reference ref_id="1201050" ref_url="https://bugzilla.suse.com/1201050" source="BUGZILLA"/>
		<reference ref_id="1201080" ref_url="https://bugzilla.suse.com/1201080" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16525" ref_url="https://www.suse.com/security/cve/CVE-2017-16525/" source="CVE"/>
		<reference ref_id="CVE-2021-26341" ref_url="https://www.suse.com/security/cve/CVE-2021-26341/" source="CVE"/>
		<reference ref_id="CVE-2021-4157" ref_url="https://www.suse.com/security/cve/CVE-2021-4157/" source="CVE"/>
		<reference ref_id="CVE-2022-1679" ref_url="https://www.suse.com/security/cve/CVE-2022-1679/" source="CVE"/>
		<reference ref_id="CVE-2022-20132" ref_url="https://www.suse.com/security/cve/CVE-2022-20132/" source="CVE"/>
		<reference ref_id="CVE-2022-20141" ref_url="https://www.suse.com/security/cve/CVE-2022-20141/" source="CVE"/>
		<reference ref_id="CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900/" source="CVE"/>
		<reference ref_id="CVE-2022-29901" ref_url="https://www.suse.com/security/cve/CVE-2022-29901/" source="CVE"/>
		<reference ref_id="CVE-2022-33981" ref_url="https://www.suse.com/security/cve/CVE-2022-33981/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011611.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).
- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)
- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).
- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).
- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).
- CVE-2017-16525: Fixed a use-after-free after failed setup in usb/serial/console (bsc#1066618).

The following non-security bugs were fixed:

- exec: Force single empty string when argv is empty (bsc#1200571).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-21"/>
	<updated date="2022-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1066618">SUSE bug 1066618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194013">SUSE bug 1194013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196901">SUSE bug 1196901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199487">SUSE bug 1199487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199657">SUSE bug 1199657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200571">SUSE bug 1200571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200604">SUSE bug 1200604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200605">SUSE bug 1200605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200619">SUSE bug 1200619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200692">SUSE bug 1200692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201050">SUSE bug 1201050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201080">SUSE bug 1201080</bugzilla>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16525/">CVE-2017-16525 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16525">CVE-2017-16525 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26341/">CVE-2021-26341 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26341">CVE-2021-26341 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4157/">CVE-2021-4157 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4157">CVE-2021-4157 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1679/">CVE-2022-1679 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1679">CVE-2022-1679 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-20132/">CVE-2022-20132 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20132">CVE-2022-20132 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20141/">CVE-2022-20141 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20141">CVE-2022-20141 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29901/">CVE-2022-29901 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29901">CVE-2022-29901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33981/">CVE-2022-33981 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33981">CVE-2022-33981 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700134" comment="kernel-default-4.4.180-94.167.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700135" comment="kernel-default-base-4.4.180-94.167.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700136" comment="kernel-default-devel-4.4.180-94.167.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700137" comment="kernel-devel-4.4.180-94.167.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700138" comment="kernel-macros-4.4.180-94.167.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700139" comment="kernel-source-4.4.180-94.167.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700140" comment="kernel-syms-4.4.180-94.167.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151017" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1201221" ref_url="https://bugzilla.suse.com/1201221" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22662" ref_url="https://www.suse.com/security/cve/CVE-2022-22662/" source="CVE"/>
		<reference ref_id="CVE-2022-22677" ref_url="https://www.suse.com/security/cve/CVE-2022-22677/" source="CVE"/>
		<reference ref_id="CVE-2022-26710" ref_url="https://www.suse.com/security/cve/CVE-2022-26710/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011627.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.4 (bsc#1201221):

- CVE-2022-22662: Processing maliciously crafted web content may disclose sensitive user information.
- CVE-2022-22677: The video in a webRTC call may be interrupted if the audio capture gets interrupted.
- CVE-2022-26710: Processing maliciously crafted web content may lead to arbitrary code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-22"/>
	<updated date="2022-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201221">SUSE bug 1201221</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22662/">CVE-2022-22662 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22662">CVE-2022-22662 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22677/">CVE-2022-22677 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22677">CVE-2022-22677 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26710/">CVE-2022-26710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26710">CVE-2022-26710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700091" comment="libjavascriptcoregtk-4_0-18-2.36.4-2.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700092" comment="libwebkit2gtk-4_0-37-2.36.4-2.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700093" comment="typelib-1_0-JavaScriptCore-4_0-2.36.4-2.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700094" comment="typelib-1_0-WebKit2-4_0-2.36.4-2.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700096" comment="webkit2gtk-4_0-injected-bundles-2.36.4-2.102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151018" version="1" class="patch">
	<metadata>
		<title>Security update for python-M2Crypto (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1178829" ref_url="https://bugzilla.suse.com/1178829" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25657" ref_url="https://www.suse.com/security/cve/CVE-2020-25657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011631.html" source="SUSE-SU"/>
		<description>
This update for python-M2Crypto fixes the following issues:

- CVE-2020-25657: Fixed Bleichenbacher timing attacks in the RSA decryption API (bsc#1178829).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-22"/>
	<updated date="2022-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178829">SUSE bug 1178829</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25657/">CVE-2020-25657 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25657">CVE-2020-25657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700102" comment="python-M2Crypto-0.29.0-23.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700103" comment="python3-M2Crypto-0.29.0-23.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151019" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1201225" ref_url="https://bugzilla.suse.com/1201225" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-34903" ref_url="https://www.suse.com/security/cve/CVE-2022-34903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011632.html" source="SUSE-SU"/>
		<description>
This update for gpg2 fixes the following issues:

- CVE-2022-34903: Fixed a status injection vulnerability (bsc#1201225).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-22"/>
	<updated date="2022-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201225">SUSE bug 1201225</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34903/">CVE-2022-34903 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34903">CVE-2022-34903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009701178" comment="gpg2-2.0.24-9.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701176" comment="gpg2-lang-2.0.24-9.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151020" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1198671" ref_url="https://bugzilla.suse.com/1198671" source="BUGZILLA"/>
		<reference ref_id="1198672" ref_url="https://bugzilla.suse.com/1198672" source="BUGZILLA"/>
		<reference ref_id="1198673" ref_url="https://bugzilla.suse.com/1198673" source="BUGZILLA"/>
		<reference ref_id="1198674" ref_url="https://bugzilla.suse.com/1198674" source="BUGZILLA"/>
		<reference ref_id="1198675" ref_url="https://bugzilla.suse.com/1198675" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011635.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u332 - April 2022 CPU (icedtea-3.23.0)

- CVE-2022-21426: Better XPath expression handling (bsc#1198672)
- CVE-2022-21443: Improved Object Identification (bsc#1198675)
- CVE-2022-21434: Better invocation handler handling (bsc#1198674)
- CVE-2022-21476: Improve Santuario processing (bsc#1198671)
- CVE-2022-21496: Improve URL supports (bsc#1198673)

And further Security fixes, Import of OpenJDK 8 u332, Backports and Bug fixes.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-22"/>
	<updated date="2022-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198671">SUSE bug 1198671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198672">SUSE bug 1198672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198673">SUSE bug 1198673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198674">SUSE bug 1198674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198675">SUSE bug 1198675</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700075" comment="java-1_8_0-openjdk-1.8.0.332-27.75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700076" comment="java-1_8_0-openjdk-demo-1.8.0.332-27.75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700077" comment="java-1_8_0-openjdk-devel-1.8.0.332-27.75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700078" comment="java-1_8_0-openjdk-headless-1.8.0.332-27.75.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151021" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1191546" ref_url="https://bugzilla.suse.com/1191546" source="BUGZILLA"/>
		<reference ref_id="1192079" ref_url="https://bugzilla.suse.com/1192079" source="BUGZILLA"/>
		<reference ref_id="1192080" ref_url="https://bugzilla.suse.com/1192080" source="BUGZILLA"/>
		<reference ref_id="1192086" ref_url="https://bugzilla.suse.com/1192086" source="BUGZILLA"/>
		<reference ref_id="1192087" ref_url="https://bugzilla.suse.com/1192087" source="BUGZILLA"/>
		<reference ref_id="1192228" ref_url="https://bugzilla.suse.com/1192228" source="BUGZILLA"/>
		<reference ref_id="1193170" ref_url="https://bugzilla.suse.com/1193170" source="BUGZILLA"/>
		<reference ref_id="1195040" ref_url="https://bugzilla.suse.com/1195040" source="BUGZILLA"/>
		<reference ref_id="1198486" ref_url="https://bugzilla.suse.com/1198486" source="BUGZILLA"/>
		<reference ref_id="1198980" ref_url="https://bugzilla.suse.com/1198980" source="BUGZILLA"/>
		<reference ref_id="1200325" ref_url="https://bugzilla.suse.com/1200325" source="BUGZILLA"/>
		<reference ref_id="1201298" ref_url="https://bugzilla.suse.com/1201298" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011639.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to fix various issues:

FIPS 140-3 enablement patches were backported from SUSE Linux Enterprise 15.

- FIPS: add on-demand integrity tests through sftk_FIPSRepeatIntegrityCheck() (bsc#1198980).
- FIPS: mark algorithms as approved/non-approved according to security policy (bsc#1191546, bsc#1201298).
- FISP: remove hard disabling of unapproved algorithms. This requirement is now
  fulfilled by the service level indicator (bsc#1200325).

Version update to NSS 3.79

- Use PK11_GetSlotInfo instead of raw C_GetSlotInfo calls.
- Update mercurial in clang-format docker image.
- Use of uninitialized pointer in lg_init after alloc fail.
- selfserv and tstclnt should use PR_GetPrefLoopbackAddrInfo.
- Add SECMOD_LockedModuleHasRemovableSlots.
- Fix secasn1d parsing of indefinite SEQUENCE inside indefinite GROUP.
- Added RFC8422 compliant TLS &lt;= 1.2 undefined/compressed ECPointFormat extension alerts.
- TLS 1.3 Server: Send protocol_version alert on unsupported ClientHello.legacy_version.
- Correct invalid record inner and outer content type alerts.
- NSS does not properly import or export pkcs12 files with large passwords and pkcs5v2 encoding.
- improve error handling after nssCKFWInstance_CreateObjectHandle.
- Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple.
- NSS 3.79 should depend on NSPR 4.34   

Update to NSS 3.78.1

- Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple

update to NSS 3.78

- Added TLS 1.3 zero-length inner plaintext checks and tests, zero-length record/fragment handling tests.
- Reworked overlong record size checks and added TLS1.3 specific boundaries.
- Add ECH Grease Support to tstclnt
- Add a strict variant of moz::pkix::CheckCertHostname.
- Change SSL_REUSE_SERVER_ECDHE_KEY default to false.
- Make SEC_PKCS12EnableCipher succeed
- Update zlib in NSS to 1.2.12.

Update to NSS 3.77:

- resolve mpitests build failure on Windows.
- Fix link to TLS page on wireshark wiki
- Add two D-TRUST 2020 root certificates.
- Add Telia Root CA v2 root certificate.
- Remove expired explicitly distrusted certificates from certdata.txt.
- support specific RSA-PSS parameters in mozilla::pkix
- Remove obsolete stateEnd check in SEC_ASN1DecoderUpdate.
- Remove token member from NSSSlot struct.
- Provide secure variants of mpp_pprime and mpp_make_prime.
- Support UTF-8 library path in the module spec string.
- Update nssUTF8_Length to RFC 3629 and fix buffer overrun.
- Add a CI Target for gcc-11.
- Change to makefiles for gcc-4.8.
- Update googletest to 1.11.0
- Add SetTls13GreaseEchSize to experimental API.
- TLS 1.3 Illegal legacy_version handling/alerts.
- Fix calculation of ECH HRR Transcript.
- Allow ld path to be set as environment variable.
- Ensure we don't read uninitialized memory in ssl gtests.
- Fix DataBuffer Move Assignment.
- internal_error alert on Certificate Request with sha1+ecdsa in TLS 1.3
- rework signature verification in mozilla::pkix

update to NSS 3.76.1

- Remove token member from NSSSlot struct.

NSS 3.76

- Hold tokensLock through nssToken_GetSlot calls in nssTrustDomain_GetActiveSlots.
- Check return value of PK11Slot_GetNSSToken.
- Use Wycheproof JSON for RSASSA-PSS
- Add SHA256 fingerprint comments to old certdata.txt entries.
- Avoid truncating files in nss-release-helper.py.
- Throw illegal_parameter alert for illegal extensions in handshake message.

update to NSS 3.75

- Make DottedOIDToCode.py compatible with python3.
- Avoid undefined shift in SSL_CERT_IS while fuzzing.
- Remove redundant key type check.
- Update ABI expectations to match ECH changes.
- Enable CKM_CHACHA20.
- check return on NSS_NoDB_Init and NSS_Shutdown.
- real move assignment operator.
- Run ECDSA test vectors from bltest as part of the CI tests.
- Add ECDSA test vectors to the bltest command line tool.
- Allow to build using clang's integrated assembler.
- Allow to override python for the build.
- test HKDF output rather than input.
- Use ASSERT macros to end failed tests early.
- move assignment operator for DataBuffer.
- Add test cases for ECH compression and unexpected extensions in SH.
- Update tests for ECH-13.
- Tidy up error handling.
- Add tests for ECH HRR Changes.
- Server only sends GREASE HRR extension if enabled by preference.
- Update generation of the Associated Data for ECH-13.
- When ECH is accepted, reject extensions which were only advertised in the Outer Client Hello.
- Allow for compressed, non-contiguous, extensions.
- Scramble the PSK extension in CHOuter.
- Split custom extension handling for ECH.
- Add ECH-13 HRR Handling.
- Client side ECH padding.
- Stricter ClientHelloInner Decompression.
- Remove ECH_inner extension, use new enum format.
- Update the version number for ECH-13 and adjust the ECHConfig size.

Update to NSS 3.74:

- mozilla::pkix: support SHA-2 hashes in CertIDs in OCSP responses
- Ensure clients offer consistent ciphersuites after HRR
- NSS does not properly restrict server keys based on policy
- Set nssckbi version number to 2.54
- Replace Google Trust Services LLC (GTS) R4 root certificate
- Replace Google Trust Services LLC (GTS) R3 root certificate
- Replace Google Trust Services LLC (GTS) R2 root certificate
- Replace Google Trust Services LLC (GTS) R1 root certificate
- Replace GlobalSign ECC Root CA R4
- Remove Expired Root Certificates - DST Root CA X3
- Remove Expiring Cybertrust Global Root and GlobalSign root certificates
- Add renewed Autoridad de Certificacion Firmaprofesional CIF A62634068 root certificate
- Add iTrusChina ECC root certificate
- Add iTrusChina RSA root certificate
- Add ISRG Root X2 root certificate
- Add Chunghwa Telecom's HiPKI Root CA - G1 root certificate
- Avoid a clang 13 unused variable warning in opt build
- Check for missing signedData field
- Ensure DER encoded signatures are within size limits
- enable key logging option (bsc#1195040)

Update to NSS 3.73.1:

- Add SHA-2 support to mozilla::pkix's OSCP implementation

Update to NSS 3.73

- check for missing signedData field.
- Ensure DER encoded signatures are within size limits.
- NSS needs FiPS 140-3 version indicators.
- pkix_CacheCert_Lookup doesn't return cached certs
- sunset Coverity from NSS

MFSA 2021-51 (bsc#1193170) CVE-2021-43527: Memory corruption via DER-encoded DSA and RSA-PSS signatures

Update to NSS 3.72

- Fix nsinstall parallel failure.
- Increase KDF cache size to mitigate perf regression in about:logins

Update to NSS 3.71

- Set nssckbi version number to 2.52.
- Respect server requirements of tlsfuzzer/test-tls13-signature-algorithms.py
- Import of PKCS#12 files with Camellia encryption is not supported
- Add HARICA Client ECC Root CA 2021.
- Add HARICA Client RSA Root CA 2021.
- Add HARICA TLS ECC Root CA 2021.
- Add HARICA TLS RSA Root CA 2021.
- Add TunTrust Root CA certificate to NSS.

update to NSS 3.70

- Update test case to verify fix.
- Explicitly disable downgrade check in TlsConnectStreamTls13.EchOuterWith12Max
- Explicitly disable downgrade check in TlsConnectTest.DisableFalseStartOnFallback
- Avoid using a lookup table in nssb64d.
- Use HW accelerated SHA2 on AArch64 Big Endian.
- Change default value of enableHelloDowngradeCheck to true.
- Cache additional PBE entries.
- Read HPKE vectors from official JSON.

Update to NSS 3.69.1

- Disable DTLS 1.0 and 1.1 by default
- integrity checks in key4.db not happening on private components with AES_CBC

NSS 3.69

- Disable DTLS 1.0 and 1.1 by default (backed out again)
- integrity checks in key4.db not happening on private components with AES_CBC (backed out again)
- SSL handling of signature algorithms ignores environmental invalid algorithms.
- sqlite 3.34 changed it's open semantics, causing nss failures.
- Gtest update changed the gtest reports, losing gtest details in all.sh reports.
- NSS incorrectly accepting 1536 bit DH primes in FIPS mode
- SQLite calls could timeout in starvation situations.
- Coverity/cpp scanner errors found in nss 3.67
- Import the NSS documentation from MDN in nss/doc.
- NSS using a tempdir to measure sql performance not active

- FIPS: scan LD_LIBRARY_PATH for external libraries to be checksummed.
- Run test suite at build time, and make it pass (bsc#1198486).
- Enable FIPS during test certificate creation and disables the library checksum
  validation during same.
- FIPS: allow checksumming to be disabled, but only if we entered FIPS mode
  due to NSS_FIPS being set, not if it came from /proc.
- FIPS: This makes the PBKDF known answer test compliant with NIST SP800-132.
- FIPS: update validation string to version-release format. (bsc#1192079). 
- FIPS: remove XCBC MAC from list of FIPS approved algorithms.
- Enable NSS_ENABLE_FIPS_INDICATORS and set NSS_FIPS_MODULE_ID
  for build.
- FIPS: claim 3DES unapproved in FIPS mode (bsc#1192080).
- FIPS: allow testing of unapproved algorithms (bsc#1192228).
- FIPS: adds FIPS version indicators. (bmo#1729550, bsc#1192086).
- FIPS: Add CSP clearing (bmo#1697303, bsc#1192087).

mozilla-nspr was updated to version 4.34:

* add an API that returns a preferred loopback IP on hosts that
  have two IP stacks available.

update to 4.33:
* fixes to build system and export of private symbols

		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-22"/>
	<updated date="2022-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1191546">SUSE bug 1191546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192079">SUSE bug 1192079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192080">SUSE bug 1192080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192086">SUSE bug 1192086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192087">SUSE bug 1192087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192228">SUSE bug 1192228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195040">SUSE bug 1195040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198486">SUSE bug 1198486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198980">SUSE bug 1198980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200325">SUSE bug 1200325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201298">SUSE bug 1201298</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700938" comment="libfreebl3-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700918" comment="libfreebl3-32bit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700939" comment="libfreebl3-hmac-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700920" comment="libfreebl3-hmac-32bit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700940" comment="libsoftokn3-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700922" comment="libsoftokn3-32bit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700941" comment="libsoftokn3-hmac-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700924" comment="libsoftokn3-hmac-32bit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700942" comment="mozilla-nspr-4.34-19.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700926" comment="mozilla-nspr-32bit-4.34-19.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700943" comment="mozilla-nss-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700929" comment="mozilla-nss-32bit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700944" comment="mozilla-nss-certs-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700931" comment="mozilla-nss-certs-32bit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700945" comment="mozilla-nss-sysinit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700934" comment="mozilla-nss-sysinit-32bit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700946" comment="mozilla-nss-tools-3.79-58.75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151022" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1200119" ref_url="https://bugzilla.suse.com/1200119" source="BUGZILLA"/>
		<reference ref_id="1201431" ref_url="https://bugzilla.suse.com/1201431" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29187" ref_url="https://www.suse.com/security/cve/CVE-2022-29187/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011634.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2022-29187: Incomplete fix for CVE-2022-24765: potential command injection via git worktree (bsc#1201431).
- Allow to opt-out from the check added in the security fix for CVE-2022-24765 (bsc#1200119)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-22"/>
	<updated date="2022-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200119">SUSE bug 1200119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201431">SUSE bug 1201431</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29187/">CVE-2022-29187 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29187">CVE-2022-29187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700082" comment="git-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700083" comment="git-core-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700084" comment="git-cvs-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700085" comment="git-daemon-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700086" comment="git-email-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700087" comment="git-gui-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700088" comment="git-svn-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700089" comment="git-web-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700090" comment="gitk-2.26.2-27.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151023" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1198670" ref_url="https://bugzilla.suse.com/1198670" source="BUGZILLA"/>
		<reference ref_id="1198671" ref_url="https://bugzilla.suse.com/1198671" source="BUGZILLA"/>
		<reference ref_id="1198672" ref_url="https://bugzilla.suse.com/1198672" source="BUGZILLA"/>
		<reference ref_id="1198673" ref_url="https://bugzilla.suse.com/1198673" source="BUGZILLA"/>
		<reference ref_id="1198674" ref_url="https://bugzilla.suse.com/1198674" source="BUGZILLA"/>
		<reference ref_id="1198675" ref_url="https://bugzilla.suse.com/1198675" source="BUGZILLA"/>
		<reference ref_id="1201643" ref_url="https://bugzilla.suse.com/1201643" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21449" ref_url="https://www.suse.com/security/cve/CVE-2022-21449/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011645.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update to Java 7.1 Service Refresh 5 Fix Pack 10 (bsc#1201643), including fixes for:
  
- CVE-2022-21476 (bsc#1198671), CVE-2022-21449 (bsc#1198670),
  CVE-2022-21496 (bsc#1198673), CVE-2022-21434 (bsc#1198674),
  CVE-2022-21426 (bsc#1198672), CVE-2022-21443 (bsc#1198675),
  CVE-2021-35561 (bsc#1191912), CVE-2022-21299 (bsc#1194931).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-23"/>
	<updated date="2022-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198670">SUSE bug 1198670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198671">SUSE bug 1198671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198672">SUSE bug 1198672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198673">SUSE bug 1198673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198674">SUSE bug 1198674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198675">SUSE bug 1198675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201643">SUSE bug 1201643</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21449/">CVE-2022-21449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21449">CVE-2022-21449 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009701366" comment="java-1_7_1-ibm-1.7.1_sr5.10-38.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701351" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.10-38.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701367" comment="java-1_7_1-ibm-devel-1.7.1_sr5.10-38.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701368" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.10-38.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701354" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.10-38.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151024" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1198670" ref_url="https://bugzilla.suse.com/1198670" source="BUGZILLA"/>
		<reference ref_id="1198671" ref_url="https://bugzilla.suse.com/1198671" source="BUGZILLA"/>
		<reference ref_id="1198672" ref_url="https://bugzilla.suse.com/1198672" source="BUGZILLA"/>
		<reference ref_id="1198673" ref_url="https://bugzilla.suse.com/1198673" source="BUGZILLA"/>
		<reference ref_id="1198674" ref_url="https://bugzilla.suse.com/1198674" source="BUGZILLA"/>
		<reference ref_id="1198675" ref_url="https://bugzilla.suse.com/1198675" source="BUGZILLA"/>
		<reference ref_id="1201643" ref_url="https://bugzilla.suse.com/1201643" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21449" ref_url="https://www.suse.com/security/cve/CVE-2022-21449/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011646.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 7 Fix Pack 10 (bsc#1201643), including fixes for:

- CVE-2022-21476 (bsc#1198671), CVE-2022-21449 (bsc#1198670),
  CVE-2022-21496 (bsc#1198673), CVE-2022-21434 (bsc#1198674),
  CVE-2022-21426 (bsc#1198672), CVE-2022-21443 (bsc#1198675),
  CVE-2021-35561 (bsc#1191912), CVE-2022-21299 (bsc#1194931).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-23"/>
	<updated date="2022-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198670">SUSE bug 1198670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198671">SUSE bug 1198671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198672">SUSE bug 1198672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198673">SUSE bug 1198673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198674">SUSE bug 1198674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198675">SUSE bug 1198675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201643">SUSE bug 1201643</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21449/">CVE-2022-21449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21449">CVE-2022-21449 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009701364" comment="java-1_8_0-ibm-1.8.0_sr7.10-30.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701347" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.10-30.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701365" comment="java-1_8_0-ibm-devel-1.8.0_sr7.10-30.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701349" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.10-30.90.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151025" version="1" class="patch">
	<metadata>
		<title>Security update for pcre2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1199235" ref_url="https://bugzilla.suse.com/1199235" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1587" ref_url="https://www.suse.com/security/cve/CVE-2022-1587/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011678.html" source="SUSE-SU"/>
		<description>
This update for pcre2 fixes the following issues:

- CVE-2022-1587: Fixed out-of-bounds read due to bug in recursions (bsc#1199235).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-27"/>
	<updated date="2022-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199235">SUSE bug 1199235</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1587/">CVE-2022-1587 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1587">CVE-2022-1587 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009701369" comment="libpcre2-16-0-10.34-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701370" comment="libpcre2-32-0-10.34-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701371" comment="libpcre2-8-0-10.34-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701372" comment="libpcre2-posix2-10.34-1.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151026" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1199965" ref_url="https://bugzilla.suse.com/1199965" source="BUGZILLA"/>
		<reference ref_id="1199966" ref_url="https://bugzilla.suse.com/1199966" source="BUGZILLA"/>
		<reference ref_id="1200549" ref_url="https://bugzilla.suse.com/1200549" source="BUGZILLA"/>
		<reference ref_id="1201394" ref_url="https://bugzilla.suse.com/1201394" source="BUGZILLA"/>
		<reference ref_id="1201469" ref_url="https://bugzilla.suse.com/1201469" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123/" source="CVE"/>
		<reference ref_id="CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125/" source="CVE"/>
		<reference ref_id="CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166/" source="CVE"/>
		<reference ref_id="CVE-2022-23816" ref_url="https://www.suse.com/security/cve/CVE-2022-23816/" source="CVE"/>
		<reference ref_id="CVE-2022-23825" ref_url="https://www.suse.com/security/cve/CVE-2022-23825/" source="CVE"/>
		<reference ref_id="CVE-2022-26362" ref_url="https://www.suse.com/security/cve/CVE-2022-26362/" source="CVE"/>
		<reference ref_id="CVE-2022-26363" ref_url="https://www.suse.com/security/cve/CVE-2022-26363/" source="CVE"/>
		<reference ref_id="CVE-2022-26364" ref_url="https://www.suse.com/security/cve/CVE-2022-26364/" source="CVE"/>
		<reference ref_id="CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900/" source="CVE"/>
		<reference ref_id="CVE-2022-33745" ref_url="https://www.suse.com/security/cve/CVE-2022-33745/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-26363, CVE-2022-26364: Fixed insufficient care with non-coherent mappings (XSA-402) (bsc#1199966).
- CVE-2022-21123, CVE-2022-21125, CVE-2022-21166: Fixed MMIO stale data vulnerabilities on x86 (XSA-404) (bsc#1200549).
- CVE-2022-26362: Fixed a race condition in typeref acquisition (XSA-401) (bsc#1199965).
- CVE-2022-33745: Fixed insufficient TLB flush for x86 PV guests in shadow mode (XSA-408) (bsc#1201394).
- CVE-2022-23816, CVE-2022-23825, CVE-2022-29900: Fixed RETBLEED vulnerability, arbitrary speculative code execution with return instructions (XSA-407) (bsc#1201469).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-28"/>
	<updated date="2022-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199965">SUSE bug 1199965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199966">SUSE bug 1199966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200549">SUSE bug 1200549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201394">SUSE bug 1201394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201469">SUSE bug 1201469</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123">CVE-2022-21123 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21125">CVE-2022-21125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166">CVE-2022-21166 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23816/">CVE-2022-23816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-23816">CVE-2022-23816 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23825/">CVE-2022-23825 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23825">CVE-2022-23825 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26362/">CVE-2022-26362 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26362">CVE-2022-26362 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26363/">CVE-2022-26363 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26363">CVE-2022-26363 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26364/">CVE-2022-26364 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26364">CVE-2022-26364 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-33745/">CVE-2022-33745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33745">CVE-2022-33745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009702582" comment="xen-4.9.4_30-3.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702583" comment="xen-doc-html-4.9.4_30-3.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702584" comment="xen-libs-4.9.4_30-3.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702585" comment="xen-libs-32bit-4.9.4_30-3.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702586" comment="xen-tools-4.9.4_30-3.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702587" comment="xen-tools-domU-4.9.4_30-3.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151027" version="1" class="patch">
	<metadata>
		<title>Security update for crash (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011699.html" source="SUSE-SU"/>
		<description>

This update of crash fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-28"/>
	<updated date="2022-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700131" comment="crash-7.1.8-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700132" comment="crash-gcore-7.1.8-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700133" comment="crash-kmp-default-7.1.8_k4.4.180_94.164-4.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151028" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1201496" ref_url="https://bugzilla.suse.com/1201496" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32742" ref_url="https://www.suse.com/security/cve/CVE-2022-32742/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011713.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2022-32742: Fixed incorrect length check in SMB1write, SMB1write_and_close, SMB1write_and_unlock (bsc#1201496).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-29"/>
	<updated date="2022-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201496">SUSE bug 1201496</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32742/">CVE-2022-32742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32742">CVE-2022-32742 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009703728" comment="libdcerpc-binding0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703668" comment="libdcerpc-binding0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703729" comment="libdcerpc0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703670" comment="libdcerpc0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703730" comment="libndr-krb5pac0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703672" comment="libndr-krb5pac0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703731" comment="libndr-nbt0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703674" comment="libndr-nbt0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703732" comment="libndr-standard0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703676" comment="libndr-standard0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703733" comment="libndr0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703678" comment="libndr0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703734" comment="libnetapi0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703680" comment="libnetapi0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703735" comment="libsamba-credentials0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703682" comment="libsamba-credentials0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703736" comment="libsamba-errors0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703684" comment="libsamba-errors0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703737" comment="libsamba-hostconfig0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703686" comment="libsamba-hostconfig0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703738" comment="libsamba-passdb0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703688" comment="libsamba-passdb0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703739" comment="libsamba-util0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703690" comment="libsamba-util0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703740" comment="libsamdb0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703692" comment="libsamdb0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703741" comment="libsmbclient0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703694" comment="libsmbclient0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703742" comment="libsmbconf0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703696" comment="libsmbconf0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703743" comment="libsmbldap0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703698" comment="libsmbldap0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703744" comment="libtevent-util0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703700" comment="libtevent-util0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703745" comment="libwbclient0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703702" comment="libwbclient0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703746" comment="samba-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703747" comment="samba-client-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703705" comment="samba-client-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703706" comment="samba-doc-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703748" comment="samba-libs-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703708" comment="samba-libs-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703749" comment="samba-winbind-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703710" comment="samba-winbind-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151029" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1201758" ref_url="https://bugzilla.suse.com/1201758" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-36318" ref_url="https://www.suse.com/security/cve/CVE-2022-36318/" source="CVE"/>
		<reference ref_id="CVE-2022-36319" ref_url="https://www.suse.com/security/cve/CVE-2022-36319/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011714.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.12.0 ESR (bsc#1201758):

- CVE-2022-36319: Mouse Position spoofing with CSS transforms
- CVE-2022-36318: Directory indexes for bundled resources reflected URL parameters
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-29"/>
	<updated date="2022-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201758">SUSE bug 1201758</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36318/">CVE-2022-36318 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36318">CVE-2022-36318 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36319/">CVE-2022-36319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36319">CVE-2022-36319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009703725" comment="MozillaFirefox-91.12.0-112.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703726" comment="MozillaFirefox-devel-91.12.0-112.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703727" comment="MozillaFirefox-translations-common-91.12.0-112.124.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151030" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1201267" ref_url="https://bugzilla.suse.com/1201267" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-30550" ref_url="https://www.suse.com/security/cve/CVE-2022-30550/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011732.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2022-30550: Fixed privilege escalation in dovecot when similar master and non-master passdbs are used (bsc#1201267).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-01"/>
	<updated date="2022-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201267">SUSE bug 1201267</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-30550/">CVE-2022-30550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30550">CVE-2022-30550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700098" comment="dovecot22-2.2.31-19.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700099" comment="dovecot22-backend-mysql-2.2.31-19.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700100" comment="dovecot22-backend-pgsql-2.2.31-19.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700101" comment="dovecot22-backend-sqlite-2.2.31-19.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151031" version="1" class="patch">
	<metadata>
		<title>Security update for qpdf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1188514" ref_url="https://bugzilla.suse.com/1188514" source="BUGZILLA"/>
		<reference ref_id="1201830" ref_url="https://bugzilla.suse.com/1201830" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36978" ref_url="https://www.suse.com/security/cve/CVE-2021-36978/" source="CVE"/>
		<reference ref_id="CVE-2022-34503" ref_url="https://www.suse.com/security/cve/CVE-2022-34503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011801.html" source="SUSE-SU"/>
		<description>
This update for qpdf fixes the following issues:

- CVE-2022-34503: Fixed a heap buffer overflow via the function QPDF::processXRefStream (bsc#1201830).
- CVE-2021-36978: Fixed heap-based buffer overflow in Pl_ASCII85Decoder::write (bsc#1188514).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-04"/>
	<updated date="2022-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188514">SUSE bug 1188514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201830">SUSE bug 1201830</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36978/">CVE-2021-36978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36978">CVE-2021-36978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-34503/">CVE-2022-34503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34503">CVE-2022-34503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009703723" comment="libqpdf18-7.1.1-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703724" comment="qpdf-7.1.1-3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151032" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1194859" ref_url="https://bugzilla.suse.com/1194859" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44142" ref_url="https://www.suse.com/security/cve/CVE-2021-44142/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010159.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-44142: Fixed out-of-Bound Read/Write on Samba vfs_fruit module. (bsc#1194859)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-01"/>
	<updated date="2022-02-01"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194859">SUSE bug 1194859</bugzilla>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44142/">CVE-2021-44142 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44142">CVE-2021-44142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666331" comment="libdcerpc-binding0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666161" comment="libdcerpc-binding0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666332" comment="libdcerpc0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666163" comment="libdcerpc0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666333" comment="libndr-krb5pac0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666165" comment="libndr-krb5pac0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666334" comment="libndr-nbt0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666167" comment="libndr-nbt0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666335" comment="libndr-standard0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666169" comment="libndr-standard0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666336" comment="libndr0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666171" comment="libndr0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666337" comment="libnetapi0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666173" comment="libnetapi0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666338" comment="libsamba-credentials0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666175" comment="libsamba-credentials0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666339" comment="libsamba-errors0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666177" comment="libsamba-errors0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666340" comment="libsamba-hostconfig0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666179" comment="libsamba-hostconfig0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666341" comment="libsamba-passdb0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666181" comment="libsamba-passdb0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666342" comment="libsamba-util0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666183" comment="libsamba-util0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666343" comment="libsamdb0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666185" comment="libsamdb0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666344" comment="libsmbclient0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666187" comment="libsmbclient0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666345" comment="libsmbconf0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666189" comment="libsmbconf0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666346" comment="libsmbldap0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666191" comment="libsmbldap0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666347" comment="libtevent-util0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666193" comment="libtevent-util0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666348" comment="libwbclient0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666195" comment="libwbclient0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666349" comment="samba-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666350" comment="samba-client-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666198" comment="samba-client-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666199" comment="samba-doc-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666351" comment="samba-libs-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666201" comment="samba-libs-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666352" comment="samba-winbind-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666203" comment="samba-winbind-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151033" version="1" class="patch">
	<metadata>
		<title>Security update for mokutil (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1198458" ref_url="https://bugzilla.suse.com/1198458" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011839.html" source="SUSE-SU"/>
		<description>
This update for mokutil fixes the following issues:

- Adds SBAT revocation support to mokutil. (bsc#1198458)

New options added (see manpage):

- mokutil --sbat

  List all entries in SBAT.

- mokutil --set-sbat-policy  (latest | previous | delete)
  To set the SBAT acceptance policy.

- mokutil --list-sbat-revocations

  To list the current SBAT revocations.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-09"/>
	<updated date="2022-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198458">SUSE bug 1198458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696169" comment="mokutil-0.2.0-12.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151034" version="1" class="patch">
	<metadata>
		<title>Security update for open-iscsi (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1179908" ref_url="https://bugzilla.suse.com/1179908" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13987" ref_url="https://www.suse.com/security/cve/CVE-2020-13987/" source="CVE"/>
		<reference ref_id="CVE-2020-13988" ref_url="https://www.suse.com/security/cve/CVE-2020-13988/" source="CVE"/>
		<reference ref_id="CVE-2020-17437" ref_url="https://www.suse.com/security/cve/CVE-2020-17437/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011912.html" source="SUSE-SU"/>
		<description>
This update for open-iscsi fixes the following issues:

Fixed various vulnerabilities in the embedded TCP/IP stack (bsc#1179908):
 - CVE-2020-13987: Fixed an out of bounds memory access when
   calculating the checksums for IP packets.
 - CVE-2020-13988: Fixed an integer overflow when parsing TCP MSS
   options of IPv4 network packets.
 - CVE-2020-17437: Fixed an out of bounds memory access when the TCP
   urgent flag is set.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-15"/>
	<updated date="2022-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179908">SUSE bug 1179908</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-13987/">CVE-2020-13987 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13987">CVE-2020-13987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13988/">CVE-2020-13988 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13988">CVE-2020-13988 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-17437/">CVE-2020-17437 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17437">CVE-2020-17437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704786" comment="iscsiuio-0.7.8.2-53.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704787" comment="libopeniscsiusr0_2_0-2.0.876-53.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704788" comment="open-iscsi-2.0.876-53.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151035" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1195163" ref_url="https://bugzilla.suse.com/1195163" source="BUGZILLA"/>
		<reference ref_id="1201684" ref_url="https://bugzilla.suse.com/1201684" source="BUGZILLA"/>
		<reference ref_id="1201692" ref_url="https://bugzilla.suse.com/1201692" source="BUGZILLA"/>
		<reference ref_id="1201694" ref_url="https://bugzilla.suse.com/1201694" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011920.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Updated to version jdk8u345 (icedtea-3.24.0)
    - CVE-2022-21540: Fixed a potential Java sandbox bypass (bsc#1201694).
    - CVE-2022-21541: Fixed a potential Java sandbox bypass (bsc#1201692).
    - CVE-2022-34169: Fixed an issue where arbitrary bytecode could
      be executed via a malicious stylesheet (bsc#1201684).

- Non-security fixes:
    - Allowed for customization of PKCS12 keystores (bsc#1195163).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-16"/>
	<updated date="2022-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195163">SUSE bug 1195163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201684">SUSE bug 1201684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201692">SUSE bug 1201692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201694">SUSE bug 1201694</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704778" comment="java-1_8_0-openjdk-1.8.0.345-27.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704779" comment="java-1_8_0-openjdk-demo-1.8.0.345-27.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704780" comment="java-1_8_0-openjdk-devel-1.8.0.345-27.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704781" comment="java-1_8_0-openjdk-headless-1.8.0.345-27.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151036" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1201727" ref_url="https://bugzilla.suse.com/1201727" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21233" ref_url="https://www.suse.com/security/cve/CVE-2022-21233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011939.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220809 release (bsc#1201727):

- CVE-2022-21233: Fixed an issue where stale data may have been leaked from the legacy xAPIC MMIO region, which could be used to compromise an SGX enclave (INTEL-SA-00657).
    See also: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html

Other fixes:

- Update for functional issues.
    See also: https://www.intel.com/content/www/us/en/processors/xeon/scalable/xeon-scalable-spec-update.html?wapkw=processor+specification+update

- Updated Platforms:

  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | SKX-SP         | B1       | 06-55-03/97 | 0100015d | 0100015e | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006d05 | 02006e05 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006d05 | 02006e05 | Xeon D-21xx
  | ICX-SP         | D0       | 06-6a-06/87 | 0d000363 | 0d000375 | Xeon Scalable Gen3
  | GLK            | B0       | 06-7a-01/01 | 0000003a | 0000003c | Pentium Silver N/J5xxx, Celeron N/J4xxx
  | GLK-R          | R0       | 06-7a-08/01 | 0000001e | 00000020 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-U/Y        | D1       | 06-7e-05/80 | 000000b0 | 000000b2 | Core Gen10 Mobile
  | TGL-R          | C0       | 06-8c-02/c2 | 00000026 | 00000028 | Core Gen11 Mobile
  | TGL-H          | R0       | 06-8d-01/c2 | 0000003e | 00000040 | Core Gen11 Mobile
  | RKL-S          | B0       | 06-a7-01/02 | 00000053 | 00000054 | Core Gen11
  | ADL            | C0       | 06-97-02/03 | 0000001f | 00000022 | Core Gen12
  | ADL            | C0       | 06-97-05/03 | 0000001f | 00000022 | Core Gen12
  | ADL            | L0       | 06-9a-03/80 | 0000041c | 00000421 | Core Gen12
  | ADL            | L0       | 06-9a-04/80 | 0000041c | 00000421 | Core Gen12
  | ADL            | C0       | 06-bf-02/03 | 0000001f | 00000022 | Core Gen12
  | ADL            | C0       | 06-bf-05/03 | 0000001f | 00000022 | Core Gen12
  ------------------------------------------------------------------
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-18"/>
	<updated date="2022-08-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201727">SUSE bug 1201727</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21233/">CVE-2022-21233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21233">CVE-2022-21233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707017" comment="ucode-intel-20220809-13.101.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151037" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1173514" ref_url="https://bugzilla.suse.com/1173514" source="BUGZILLA"/>
		<reference ref_id="1196973" ref_url="https://bugzilla.suse.com/1196973" source="BUGZILLA"/>
		<reference ref_id="1198829" ref_url="https://bugzilla.suse.com/1198829" source="BUGZILLA"/>
		<reference ref_id="1200598" ref_url="https://bugzilla.suse.com/1200598" source="BUGZILLA"/>
		<reference ref_id="1200762" ref_url="https://bugzilla.suse.com/1200762" source="BUGZILLA"/>
		<reference ref_id="1200910" ref_url="https://bugzilla.suse.com/1200910" source="BUGZILLA"/>
		<reference ref_id="1201251" ref_url="https://bugzilla.suse.com/1201251" source="BUGZILLA"/>
		<reference ref_id="1201429" ref_url="https://bugzilla.suse.com/1201429" source="BUGZILLA"/>
		<reference ref_id="1201635" ref_url="https://bugzilla.suse.com/1201635" source="BUGZILLA"/>
		<reference ref_id="1201636" ref_url="https://bugzilla.suse.com/1201636" source="BUGZILLA"/>
		<reference ref_id="1201930" ref_url="https://bugzilla.suse.com/1201930" source="BUGZILLA"/>
		<reference ref_id="1201940" ref_url="https://bugzilla.suse.com/1201940" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15393" ref_url="https://www.suse.com/security/cve/CVE-2020-15393/" source="CVE"/>
		<reference ref_id="CVE-2020-36557" ref_url="https://www.suse.com/security/cve/CVE-2020-36557/" source="CVE"/>
		<reference ref_id="CVE-2020-36558" ref_url="https://www.suse.com/security/cve/CVE-2020-36558/" source="CVE"/>
		<reference ref_id="CVE-2021-33655" ref_url="https://www.suse.com/security/cve/CVE-2021-33655/" source="CVE"/>
		<reference ref_id="CVE-2021-33656" ref_url="https://www.suse.com/security/cve/CVE-2021-33656/" source="CVE"/>
		<reference ref_id="CVE-2021-39713" ref_url="https://www.suse.com/security/cve/CVE-2021-39713/" source="CVE"/>
		<reference ref_id="CVE-2022-1462" ref_url="https://www.suse.com/security/cve/CVE-2022-1462/" source="CVE"/>
		<reference ref_id="CVE-2022-20166" ref_url="https://www.suse.com/security/cve/CVE-2022-20166/" source="CVE"/>
		<reference ref_id="CVE-2022-2318" ref_url="https://www.suse.com/security/cve/CVE-2022-2318/" source="CVE"/>
		<reference ref_id="CVE-2022-26365" ref_url="https://www.suse.com/security/cve/CVE-2022-26365/" source="CVE"/>
		<reference ref_id="CVE-2022-33740" ref_url="https://www.suse.com/security/cve/CVE-2022-33740/" source="CVE"/>
		<reference ref_id="CVE-2022-33741" ref_url="https://www.suse.com/security/cve/CVE-2022-33741/" source="CVE"/>
		<reference ref_id="CVE-2022-33742" ref_url="https://www.suse.com/security/cve/CVE-2022-33742/" source="CVE"/>
		<reference ref_id="CVE-2022-36946" ref_url="https://www.suse.com/security/cve/CVE-2022-36946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011942.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-15393: CVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).
- CVE-2020-36557: Fixed race condition between the VT_DISALLOCATE ioctl and closing/opening of ttys that could lead to a use-after-free (bnc#1201429).
- CVE-2020-36558: Fixed race condition involving VT_RESIZEX that could lead to a NULL pointer dereference and general protection fault (bnc#1200910).
- CVE-2021-33655: Fixed out of bounds write with ioctl FBIOPUT_VSCREENINFO (bnc#1201635).
- CVE-2021-33656: Fixed out of bounds write with ioctl PIO_FONT (bnc#1201636).
- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free. (bnc#1196973)
- CVE-2022-1462: Fixed an out-of-bounds read flaw in the TeleTYpe subsystem (bnc#1198829).
- CVE-2022-20166: Fixed possible out of bounds write due to sprintf unsafety that could cause local escalation of privilege (bnc#1200598).
- CVE-2022-2318: Fixed a use-after-free vulnerabilities in the timer handler in net/rose/rose_timer.c that allow attackers to crash the system without any privileges (bsc#1201251).
- CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends (bsc#1200762).
- CVE-2022-36946: Fixed incorrect packet truncation in nfqnl_mangle() that could lead to remote DoS (bnc#1201940).

The following non-security bugs were fixed:

- kvm: emulate: do not adjust size of fastop and setcc subroutines (bsc#1201930).
- kvm: emulate: Fix SETcc emulation function offsets with SLS (bsc#1201930).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-18"/>
	<updated date="2022-08-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173514">SUSE bug 1173514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196973">SUSE bug 1196973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198829">SUSE bug 1198829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200598">SUSE bug 1200598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200762">SUSE bug 1200762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200910">SUSE bug 1200910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201251">SUSE bug 1201251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201429">SUSE bug 1201429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201635">SUSE bug 1201635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201636">SUSE bug 1201636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201930">SUSE bug 1201930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201940">SUSE bug 1201940</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15393/">CVE-2020-15393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15393">CVE-2020-15393 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36557/">CVE-2020-36557 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36557">CVE-2020-36557 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36558/">CVE-2020-36558 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36558">CVE-2020-36558 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33655/">CVE-2021-33655 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33655">CVE-2021-33655 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33656/">CVE-2021-33656 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33656">CVE-2021-33656 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39713/">CVE-2021-39713 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39713">CVE-2021-39713 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1462/">CVE-2022-1462 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1462">CVE-2022-1462 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-20166/">CVE-2022-20166 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20166">CVE-2022-20166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2318/">CVE-2022-2318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2318">CVE-2022-2318 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-26365/">CVE-2022-26365 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26365">CVE-2022-26365 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33740/">CVE-2022-33740 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33740">CVE-2022-33740 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33741/">CVE-2022-33741 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33741">CVE-2022-33741 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33742/">CVE-2022-33742 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33742">CVE-2022-33742 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36946/">CVE-2022-36946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36946">CVE-2022-36946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704590" comment="kernel-default-4.4.180-94.171.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704591" comment="kernel-default-base-4.4.180-94.171.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704592" comment="kernel-default-devel-4.4.180-94.171.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704593" comment="kernel-devel-4.4.180-94.171.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704594" comment="kernel-macros-4.4.180-94.171.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704595" comment="kernel-source-4.4.180-94.171.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704596" comment="kernel-syms-4.4.180-94.171.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151038" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1202175" ref_url="https://bugzilla.suse.com/1202175" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-37434" ref_url="https://www.suse.com/security/cve/CVE-2022-37434/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011946.html" source="SUSE-SU"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2022-37434: Fixed heap-based buffer over-read or buffer overflow via large gzip header extra field (bsc#1202175).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-18"/>
	<updated date="2022-08-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202175">SUSE bug 1202175</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37434/">CVE-2022-37434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706364" comment="libz1-1.2.8-12.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706365" comment="libz1-32bit-1.2.8-12.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706366" comment="zlib-devel-1.2.8-12.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151039" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1201840" ref_url="https://bugzilla.suse.com/1201840" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29154" ref_url="https://www.suse.com/security/cve/CVE-2022-29154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011953.html" source="SUSE-SU"/>
		<description>
This update for rsync fixes the following issues:

- CVE-2022-29154: Fixed an arbitrary file write issue that could be
  triggered by a malicious remote server (bsc#1201840).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-19"/>
	<updated date="2022-08-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201840">SUSE bug 1201840</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29154/">CVE-2022-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29154">CVE-2022-29154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707023" comment="rsync-3.1.0-13.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151040" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1027496" ref_url="https://bugzilla.suse.com/1027496" source="BUGZILLA"/>
		<reference ref_id="1178386" ref_url="https://bugzilla.suse.com/1178386" source="BUGZILLA"/>
		<reference ref_id="1179694" ref_url="https://bugzilla.suse.com/1179694" source="BUGZILLA"/>
		<reference ref_id="1179721" ref_url="https://bugzilla.suse.com/1179721" source="BUGZILLA"/>
		<reference ref_id="1181505" ref_url="https://bugzilla.suse.com/1181505" source="BUGZILLA"/>
		<reference ref_id="1182117" ref_url="https://bugzilla.suse.com/1182117" source="BUGZILLA"/>
		<reference ref_id="941234" ref_url="https://bugzilla.suse.com/941234" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180/" source="CVE"/>
		<reference ref_id="CVE-2016-10228" ref_url="https://www.suse.com/security/cve/CVE-2016-10228/" source="CVE"/>
		<reference ref_id="CVE-2019-25013" ref_url="https://www.suse.com/security/cve/CVE-2019-25013/" source="CVE"/>
		<reference ref_id="CVE-2020-27618" ref_url="https://www.suse.com/security/cve/CVE-2020-27618/" source="CVE"/>
		<reference ref_id="CVE-2020-29562" ref_url="https://www.suse.com/security/cve/CVE-2020-29562/" source="CVE"/>
		<reference ref_id="CVE-2020-29573" ref_url="https://www.suse.com/security/cve/CVE-2020-29573/" source="CVE"/>
		<reference ref_id="CVE-2021-3326" ref_url="https://www.suse.com/security/cve/CVE-2021-3326/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011984.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2015-5180: Fix crash with internal QTYPE in resolv (bsc#941234, BZ #18784)
- CVE-2016-10228: Rewrite iconv option parsing (bsc#1027496, BZ #19519)
- CVE-2019-25013: Fix buffer overrun in EUC-KR conversion module (bsc#1182117, BZ #24973)
- CVE-2020-27618: Accept redundant shift sequences in IBM1364 iconv module (bsc#1178386, BZ #26224)
- CVE-2020-29562: Fix incorrect UCS4 inner loop bounds in iconv (bsc#1179694, BZ #26923)
- CVE-2020-29573: Hardened printf against non-normal long double values (bsc#1179721, BZ #26649)
- CVE-2021-3326: Fix assertion failure in ISO-2022-JP-3 gconv module (bsc#1181505, BZ #27256)

- Recognize ppc64p7 arch to build for power7
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2022-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027496">SUSE bug 1027496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178386">SUSE bug 1178386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179694">SUSE bug 1179694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179721">SUSE bug 1179721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181505">SUSE bug 1181505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182117">SUSE bug 1182117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941234">SUSE bug 941234</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5180">CVE-2015-5180 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10228/">CVE-2016-10228 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10228">CVE-2016-10228 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-25013/">CVE-2019-25013 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">CVE-2019-25013 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27618/">CVE-2020-27618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">CVE-2020-27618 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29562/">CVE-2020-29562 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29562">CVE-2020-29562 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29573/">CVE-2020-29573 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29573">CVE-2020-29573 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3326/">CVE-2021-3326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">CVE-2021-3326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706213" comment="glibc-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706214" comment="glibc-32bit-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706215" comment="glibc-devel-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706216" comment="glibc-devel-32bit-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706217" comment="glibc-html-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706218" comment="glibc-i18ndata-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706219" comment="glibc-info-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706220" comment="glibc-locale-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706221" comment="glibc-locale-32bit-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706222" comment="glibc-profile-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706223" comment="glibc-profile-32bit-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706224" comment="nscd-2.22-126.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151041" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1201684" ref_url="https://bugzilla.suse.com/1201684" source="BUGZILLA"/>
		<reference ref_id="1201685" ref_url="https://bugzilla.suse.com/1201685" source="BUGZILLA"/>
		<reference ref_id="1201692" ref_url="https://bugzilla.suse.com/1201692" source="BUGZILLA"/>
		<reference ref_id="1201694" ref_url="https://bugzilla.suse.com/1201694" source="BUGZILLA"/>
		<reference ref_id="1202427" ref_url="https://bugzilla.suse.com/1202427" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-21549" ref_url="https://www.suse.com/security/cve/CVE-2022-21549/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011996.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Updated to Java 7.1 Service Refresh 5 Fix Pack 15 (bsc#1202427):
  - CVE-2022-34169: Fixed an integer truncation issue in the Xalan
    Java XSLT library that occurred when processing malicious
    stylesheets (bsc#1201684).
  - CVE-2022-21549: Fixed an issue that could lead to computing
    negative random exponentials (bsc#1201685).
  - CVE-2022-21541: Fixed a potential bypass of sandbox restrictions
    in the Hotspot component (bsc#1201692).
  - CVE-2022-21540: Fixed a potential bypass of sandbox restrictions
    in the Hotspot component (bsc#1201694).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-25"/>
	<updated date="2022-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201684">SUSE bug 1201684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201685">SUSE bug 1201685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201692">SUSE bug 1201692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201694">SUSE bug 1201694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202427">SUSE bug 1202427</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21549/">CVE-2022-21549 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21549">CVE-2022-21549 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707298" comment="java-1_7_1-ibm-1.7.1_sr5.15-38.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707276" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707299" comment="java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707300" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707279" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151042" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1201684" ref_url="https://bugzilla.suse.com/1201684" source="BUGZILLA"/>
		<reference ref_id="1201685" ref_url="https://bugzilla.suse.com/1201685" source="BUGZILLA"/>
		<reference ref_id="1201692" ref_url="https://bugzilla.suse.com/1201692" source="BUGZILLA"/>
		<reference ref_id="1201694" ref_url="https://bugzilla.suse.com/1201694" source="BUGZILLA"/>
		<reference ref_id="1202427" ref_url="https://bugzilla.suse.com/1202427" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-21549" ref_url="https://www.suse.com/security/cve/CVE-2022-21549/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011995.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 7 Fix Pack 11 (bsc#1202427):
  - CVE-2022-34169: Fixed an integer truncation issue in the Xalan
    Java XSLT library that occurred when processing malicious
    stylesheets (bsc#1201684).
  - CVE-2022-21549: Fixed an issue that could lead to computing
    negative random exponentials (bsc#1201685).
  - CVE-2022-21541: Fixed a potential bypass of sandbox restrictions
    in the Hotspot component (bsc#1201692).
  - CVE-2022-21540: Fixed a potential bypass of sandbox restrictions
    in the Hotspot component (bsc#1201694).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-25"/>
	<updated date="2022-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201684">SUSE bug 1201684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201685">SUSE bug 1201685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201692">SUSE bug 1201692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201694">SUSE bug 1201694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202427">SUSE bug 1202427</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21549/">CVE-2022-21549 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21549">CVE-2022-21549 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707301" comment="java-1_8_0-ibm-1.8.0_sr7.11-30.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707281" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707302" comment="java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707283" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151043" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1193227" ref_url="https://bugzilla.suse.com/1193227" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8922" ref_url="https://www.suse.com/security/cve/CVE-2019-8922/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011994.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2019-8922: Fixed a buffer overflow in the implementation of the
  Service Discovery Protocol (bsc#1193227).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-25"/>
	<updated date="2022-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193227">SUSE bug 1193227</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8922/">CVE-2019-8922 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8922">CVE-2019-8922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707303" comment="bluez-5.13-5.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707304" comment="libbluetooth3-5.13-5.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151044" version="1" class="patch">
	<metadata>
		<title>Security update for libcroco (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1171685" ref_url="https://bugzilla.suse.com/1171685" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12825" ref_url="https://www.suse.com/security/cve/CVE-2020-12825/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012001.html" source="SUSE-SU"/>
		<description>
This update for libcroco fixes the following issues:

- CVE-2020-12825: Fixed an uncontrolled recursion issue (bsc#1171685).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-26"/>
	<updated date="2022-08-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171685">SUSE bug 1171685</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12825/">CVE-2020-12825 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12825">CVE-2020-12825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707620" comment="libcroco-0_6-3-0.6.11-12.6.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707617" comment="libcroco-0_6-3-32bit-0.6.11-12.6.45 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151045" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-good (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1201688" ref_url="https://bugzilla.suse.com/1201688" source="BUGZILLA"/>
		<reference ref_id="1201693" ref_url="https://bugzilla.suse.com/1201693" source="BUGZILLA"/>
		<reference ref_id="1201702" ref_url="https://bugzilla.suse.com/1201702" source="BUGZILLA"/>
		<reference ref_id="1201704" ref_url="https://bugzilla.suse.com/1201704" source="BUGZILLA"/>
		<reference ref_id="1201706" ref_url="https://bugzilla.suse.com/1201706" source="BUGZILLA"/>
		<reference ref_id="1201707" ref_url="https://bugzilla.suse.com/1201707" source="BUGZILLA"/>
		<reference ref_id="1201708" ref_url="https://bugzilla.suse.com/1201708" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1920" ref_url="https://www.suse.com/security/cve/CVE-2022-1920/" source="CVE"/>
		<reference ref_id="CVE-2022-1921" ref_url="https://www.suse.com/security/cve/CVE-2022-1921/" source="CVE"/>
		<reference ref_id="CVE-2022-1922" ref_url="https://www.suse.com/security/cve/CVE-2022-1922/" source="CVE"/>
		<reference ref_id="CVE-2022-1923" ref_url="https://www.suse.com/security/cve/CVE-2022-1923/" source="CVE"/>
		<reference ref_id="CVE-2022-1924" ref_url="https://www.suse.com/security/cve/CVE-2022-1924/" source="CVE"/>
		<reference ref_id="CVE-2022-1925" ref_url="https://www.suse.com/security/cve/CVE-2022-1925/" source="CVE"/>
		<reference ref_id="CVE-2022-2122" ref_url="https://www.suse.com/security/cve/CVE-2022-2122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012002.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-good fixes the following issues:

- CVE-2022-1920: Fixed integer overflow in WavPack header handling code (bsc#1201688).
- CVE-2022-1921: Fixed integer overflow resulting in heap corruption in avidemux element (bsc#1201693).
- CVE-2022-1922: Fixed integer overflows in mkv demuxing (bsc#1201702).
- CVE-2022-1923: Fixed integer overflows in mkv demuxing using bzip (bsc#1201704).
- CVE-2022-1924: Fixed integer overflows in mkv demuxing using lzo (bsc#1201706).
- CVE-2022-1925: Fixed integer overflows in mkv demuxing using HEADERSTRIP (bsc#1201707).
- CVE-2022-2122: Fixed integer overflows in qtdemux using zlib (bsc#1201708).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-26"/>
	<updated date="2022-08-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201688">SUSE bug 1201688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201693">SUSE bug 1201693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201702">SUSE bug 1201702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201704">SUSE bug 1201704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201706">SUSE bug 1201706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201707">SUSE bug 1201707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201708">SUSE bug 1201708</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1920/">CVE-2022-1920 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1920">CVE-2022-1920 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1921/">CVE-2022-1921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1921">CVE-2022-1921 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1922/">CVE-2022-1922 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1922">CVE-2022-1922 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1923/">CVE-2022-1923 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1923">CVE-2022-1923 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1924/">CVE-2022-1924 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1924">CVE-2022-1924 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1925/">CVE-2022-1925 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1925">CVE-2022-1925 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-2122/">CVE-2022-2122 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2122">CVE-2022-2122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707466" comment="gstreamer-plugins-good-1.8.3-16.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707462" comment="gstreamer-plugins-good-lang-1.8.3-16.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151046" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1202368" ref_url="https://bugzilla.suse.com/1202368" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011999.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

- Upgrade to 10.22:
- CVE-2022-2625: Fixed an issue where extension scripts would replace objects not belonging to that extension (bsc#1202368).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-26"/>
	<updated date="2022-08-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202368">SUSE bug 1202368</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2625">CVE-2022-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707292" comment="postgresql10-10.22-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707293" comment="postgresql10-contrib-10.22-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707270" comment="postgresql10-docs-10.22-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707294" comment="postgresql10-plperl-10.22-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707295" comment="postgresql10-plpython-10.22-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707296" comment="postgresql10-pltcl-10.22-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707297" comment="postgresql10-server-10.22-4.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151047" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1201980" ref_url="https://bugzilla.suse.com/1201980" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32792" ref_url="https://www.suse.com/security/cve/CVE-2022-32792/" source="CVE"/>
		<reference ref_id="CVE-2022-32816" ref_url="https://www.suse.com/security/cve/CVE-2022-32816/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012003.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.36.5 (bsc#1201980):
  - Add support for PAC proxy in the WebDriver implementation.
  - Fix video playback when loaded through custom URIs, this fixes
    video playback in the Yelp documentation browser.
  - Fix WebKitWebView::context-menu when using GTK4.
  - Fix LTO builds with GCC.
  - Fix several crashes and rendering issues.

- Security fixes: 
  - CVE-2022-32792: Fixed processing maliciously crafted web content may lead to
    arbitrary code execution.
  - CVE-2022-32816: Fixed visiting a website that frames malicious content may lead to
    UI spoofing.

		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-26"/>
	<updated date="2022-08-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201980">SUSE bug 1201980</bugzilla>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32792/">CVE-2022-32792 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32792">CVE-2022-32792 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32816/">CVE-2022-32816 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32816">CVE-2022-32816 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706633" comment="libjavascriptcoregtk-4_0-18-2.36.5-2.107.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706634" comment="libwebkit2gtk-4_0-37-2.36.5-2.107.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706635" comment="typelib-1_0-JavaScriptCore-4_0-2.36.5-2.107.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706636" comment="typelib-1_0-WebKit2-4_0-2.36.5-2.107.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706638" comment="webkit2gtk-4_0-injected-bundles-2.36.5-2.107.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151048" version="1" class="patch">
	<metadata>
		<title>Security update for open-vm-tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1202657" ref_url="https://bugzilla.suse.com/1202657" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31676" ref_url="https://www.suse.com/security/cve/CVE-2022-31676/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012020.html" source="SUSE-SU"/>
		<description>
This update for open-vm-tools fixes the following issues:

- CVE-2022-31676: Fixed an issue that could allow unprivileged users
  inside a virtual machine to escalate privileges (bsc#1202657).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-01"/>
	<updated date="2022-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202657">SUSE bug 1202657</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31676/">CVE-2022-31676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31676">CVE-2022-31676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707897" comment="libvmtools0-10.3.10-3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707898" comment="open-vm-tools-10.3.10-3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707899" comment="open-vm-tools-desktop-10.3.10-3.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151049" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1100146" ref_url="https://bugzilla.suse.com/1100146" source="BUGZILLA"/>
		<reference ref_id="1145864" ref_url="https://bugzilla.suse.com/1145864" source="BUGZILLA"/>
		<reference ref_id="1152968" ref_url="https://bugzilla.suse.com/1152968" source="BUGZILLA"/>
		<reference ref_id="1174961" ref_url="https://bugzilla.suse.com/1174961" source="BUGZILLA"/>
		<reference ref_id="1178021" ref_url="https://bugzilla.suse.com/1178021" source="BUGZILLA"/>
		<reference ref_id="1178351" ref_url="https://bugzilla.suse.com/1178351" source="BUGZILLA"/>
		<reference ref_id="1179009" ref_url="https://bugzilla.suse.com/1179009" source="BUGZILLA"/>
		<reference ref_id="1179699" ref_url="https://bugzilla.suse.com/1179699" source="BUGZILLA"/>
		<reference ref_id="1184839" ref_url="https://bugzilla.suse.com/1184839" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15862" ref_url="https://www.suse.com/security/cve/CVE-2020-15862/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009966.html" source="SUSE-SU"/>
		<description>
This update for net-snmp fixes the following issues:

- CVE-2020-15862: Make extended MIB read-only (bsc#1174961)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1100146">SUSE bug 1100146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145864">SUSE bug 1145864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152968">SUSE bug 1152968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174961">SUSE bug 1174961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178021">SUSE bug 1178021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178351">SUSE bug 1178351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179009">SUSE bug 1179009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179699">SUSE bug 1179699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184839">SUSE bug 1184839</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15862/">CVE-2020-15862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15862">CVE-2020-15862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661606" comment="libsnmp30-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661599" comment="libsnmp30-32bit-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661607" comment="net-snmp-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661608" comment="perl-SNMP-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661609" comment="snmp-mibs-5.7.3-6.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151050" version="1" class="patch">
	<metadata>
		<title>Security update for json-c (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1171479" ref_url="https://bugzilla.suse.com/1171479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12762" ref_url="https://www.suse.com/security/cve/CVE-2020-12762/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012070.html" source="SUSE-SU"/>
		<description>
This update for json-c fixes the following issues:

- CVE-2020-12762: Fixed an integer overflow that could lead to memory
  corruption via a large JSON file (bsc#1171479).

Non-security fixes:

- Updated to version 0.12.1 (jsc#PED-1778).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-02"/>
	<updated date="2022-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171479">SUSE bug 1171479</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12762/">CVE-2020-12762 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12762">CVE-2020-12762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009709434" comment="libjson-c-devel-0.12.1-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708140" comment="libjson-c2-0.12.1-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708131" comment="libjson-c2-32bit-0.12.1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151051" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1202645" ref_url="https://bugzilla.suse.com/1202645" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-38472" ref_url="https://www.suse.com/security/cve/CVE-2022-38472/" source="CVE"/>
		<reference ref_id="CVE-2022-38473" ref_url="https://www.suse.com/security/cve/CVE-2022-38473/" source="CVE"/>
		<reference ref_id="CVE-2022-38478" ref_url="https://www.suse.com/security/cve/CVE-2022-38478/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012071.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.13.0 ESR (bsc#1202645):

- CVE-2022-38472: Fixed a potential address bar spoofing via XSLT error handling.
- CVE-2022-38473: Fixed an issue where cross-origin XSLT documents could inherit the parent's permissions.
- CVE-2022-38478: Fixed various memory safety issues.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-02"/>
	<updated date="2022-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202645">SUSE bug 1202645</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38472/">CVE-2022-38472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38472">CVE-2022-38472 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38473/">CVE-2022-38473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38473">CVE-2022-38473 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38478/">CVE-2022-38478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38478">CVE-2022-38478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707990" comment="MozillaFirefox-91.13.0-112.127.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707991" comment="MozillaFirefox-devel-91.13.0-112.127.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707992" comment="MozillaFirefox-translations-common-91.13.0-112.127.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151052" version="1" class="patch">
	<metadata>
		<title>Security update for libgda (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1189849" ref_url="https://bugzilla.suse.com/1189849" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39359" ref_url="https://www.suse.com/security/cve/CVE-2021-39359/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012076.html" source="SUSE-SU"/>
		<description>
This update for libgda fixes the following issues:

- CVE-2021-39359: Enabled TLS certificate verification (bsc#1189849).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-05"/>
	<updated date="2022-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189849">SUSE bug 1189849</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39359/">CVE-2021-39359 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39359">CVE-2021-39359 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009708315" comment="libgda-5_0-4-5.2.4-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708316" comment="libgda-5_0-mysql-5.2.4-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708317" comment="libgda-5_0-postgres-5.2.4-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708318" comment="libgda-5_0-sqlite-5.2.4-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708319" comment="libgda-ui-5_0-4-5.2.4-9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151053" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1202169" ref_url="https://bugzilla.suse.com/1202169" source="BUGZILLA"/>
		<reference ref_id="1202807" ref_url="https://bugzilla.suse.com/1202807" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32893" ref_url="https://www.suse.com/security/cve/CVE-2022-32893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012140.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Updated to version 2.36.7 (bsc#1202807):
  - CVE-2022-32893: Fixed an issue that would be triggered when
    processing malicious web content and that could lead to arbitrary
    code execution.
  - Fixed several crashes and rendering issues.

- Updated to version 2.36.6:
  - Fixed handling of touchpad scrolling on GTK4 builds
  - Fixed WebKitGTK not allowing to be used from non-main threads
    (bsc#1202169).
  - Fixed several crashes and rendering issues
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-07"/>
	<updated date="2022-09-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202169">SUSE bug 1202169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202807">SUSE bug 1202807</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32893/">CVE-2022-32893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32893">CVE-2022-32893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009708306" comment="libjavascriptcoregtk-4_0-18-2.36.7-2.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708307" comment="libwebkit2gtk-4_0-37-2.36.7-2.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708308" comment="typelib-1_0-JavaScriptCore-4_0-2.36.7-2.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708309" comment="typelib-1_0-WebKit2-4_0-2.36.7-2.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708311" comment="webkit2gtk-4_0-injected-bundles-2.36.7-2.110.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151054" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1202986" ref_url="https://bugzilla.suse.com/1202986" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:3139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012156.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

clamav was updated to 0.103.7 (bsc#1202986)

* Upgrade the vendored UnRAR library to version 6.1.7.
* Fix logical signature 'Intermediates' feature.
* Relax constraints on slightly malformed zip archives that
  contain overlapping file entries.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-07"/>
	<updated date="2022-09-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202986">SUSE bug 1202986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709610" comment="clamav-0.103.7-33.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151055" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1201684" ref_url="https://bugzilla.suse.com/1201684" source="BUGZILLA"/>
		<reference ref_id="1201685" ref_url="https://bugzilla.suse.com/1201685" source="BUGZILLA"/>
		<reference ref_id="1201692" ref_url="https://bugzilla.suse.com/1201692" source="BUGZILLA"/>
		<reference ref_id="1201694" ref_url="https://bugzilla.suse.com/1201694" source="BUGZILLA"/>
		<reference ref_id="1202427" ref_url="https://bugzilla.suse.com/1202427" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-21549" ref_url="https://www.suse.com/security/cve/CVE-2022-21549/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012164.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Note: the issues listed below were NOT fixed with the previous update (8.0-7.11).

- Update to Java 8.0 Service Refresh 7 Fix Pack 15 (bsc#1202427):
  - CVE-2022-34169: Fixed an integer truncation issue in the Xalan
    Java XSLT library that occurred when processing malicious
    stylesheets (bsc#1201684).
  - CVE-2022-21549: Fixed an issue that could lead to computing
    negative random exponentials (bsc#1201685).
  - CVE-2022-21541: Fixed a potential bypass of sandbox restrictions
    in the Hotspot component (bsc#1201692).
  - CVE-2022-21540: Fixed a potential bypass of sandbox restrictions
    in the Hotspot component (bsc#1201694)..
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-07"/>
	<updated date="2022-09-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201684">SUSE bug 1201684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201685">SUSE bug 1201685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201692">SUSE bug 1201692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201694">SUSE bug 1201694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202427">SUSE bug 1202427</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21549/">CVE-2022-21549 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21549">CVE-2022-21549 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009708313" comment="java-1_8_0-ibm-1.8.0_sr7.15-30.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708244" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708314" comment="java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708245" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151056" version="1" class="patch">
	<metadata>
		<title>Security update for udisks2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1098797" ref_url="https://bugzilla.suse.com/1098797" source="BUGZILLA"/>
		<reference ref_id="1190606" ref_url="https://bugzilla.suse.com/1190606" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3802" ref_url="https://www.suse.com/security/cve/CVE-2021-3802/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012166.html" source="SUSE-SU"/>
		<description>
This update for udisks2 fixes the following issues:

- CVE-2021-3802: Fixed insecure defaults in user-accessible mount helpers (bsc#1190606).
- Fixed vulnerability that allowed mounting ext4 devices over existing entries in fstab (bsc#1098797).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-07"/>
	<updated date="2022-09-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1098797">SUSE bug 1098797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190606">SUSE bug 1190606</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3802/">CVE-2021-3802 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3802">CVE-2021-3802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710058" comment="libudisks2-0-2.1.3-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710059" comment="udisks2-2.1.3-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709942" comment="udisks2-lang-2.1.3-3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151057" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1198166" ref_url="https://bugzilla.suse.com/1198166" source="BUGZILLA"/>
		<reference ref_id="1202368" ref_url="https://bugzilla.suse.com/1202368" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012192.html" source="SUSE-SU"/>
		<description>
This update for postgresql12 fixes the following issues:

- Update to 12.12:
- CVE-2022-2625: Fixed an issue where extension scripts would replace objects not belonging to that extension (bsc#1202368).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-08"/>
	<updated date="2022-09-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198166">SUSE bug 1198166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202368">SUSE bug 1202368</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2625">CVE-2022-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009708220" comment="postgresql-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708221" comment="postgresql-contrib-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708222" comment="postgresql-docs-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708223" comment="postgresql-plperl-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708224" comment="postgresql-plpython-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708225" comment="postgresql-pltcl-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708226" comment="postgresql-server-14-4.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151058" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1133374" ref_url="https://bugzilla.suse.com/1133374" source="BUGZILLA"/>
		<reference ref_id="1191881" ref_url="https://bugzilla.suse.com/1191881" source="BUGZILLA"/>
		<reference ref_id="1196616" ref_url="https://bugzilla.suse.com/1196616" source="BUGZILLA"/>
		<reference ref_id="1201420" ref_url="https://bugzilla.suse.com/1201420" source="BUGZILLA"/>
		<reference ref_id="1201726" ref_url="https://bugzilla.suse.com/1201726" source="BUGZILLA"/>
		<reference ref_id="1201948" ref_url="https://bugzilla.suse.com/1201948" source="BUGZILLA"/>
		<reference ref_id="1202096" ref_url="https://bugzilla.suse.com/1202096" source="BUGZILLA"/>
		<reference ref_id="1202346" ref_url="https://bugzilla.suse.com/1202346" source="BUGZILLA"/>
		<reference ref_id="1202347" ref_url="https://bugzilla.suse.com/1202347" source="BUGZILLA"/>
		<reference ref_id="1202393" ref_url="https://bugzilla.suse.com/1202393" source="BUGZILLA"/>
		<reference ref_id="1202897" ref_url="https://bugzilla.suse.com/1202897" source="BUGZILLA"/>
		<reference ref_id="1202898" ref_url="https://bugzilla.suse.com/1202898" source="BUGZILLA"/>
		<reference ref_id="1203098" ref_url="https://bugzilla.suse.com/1203098" source="BUGZILLA"/>
		<reference ref_id="1203107" ref_url="https://bugzilla.suse.com/1203107" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3900" ref_url="https://www.suse.com/security/cve/CVE-2019-3900/" source="CVE"/>
		<reference ref_id="CVE-2020-36516" ref_url="https://www.suse.com/security/cve/CVE-2020-36516/" source="CVE"/>
		<reference ref_id="CVE-2022-20368" ref_url="https://www.suse.com/security/cve/CVE-2022-20368/" source="CVE"/>
		<reference ref_id="CVE-2022-20369" ref_url="https://www.suse.com/security/cve/CVE-2022-20369/" source="CVE"/>
		<reference ref_id="CVE-2022-21385" ref_url="https://www.suse.com/security/cve/CVE-2022-21385/" source="CVE"/>
		<reference ref_id="CVE-2022-2588" ref_url="https://www.suse.com/security/cve/CVE-2022-2588/" source="CVE"/>
		<reference ref_id="CVE-2022-26373" ref_url="https://www.suse.com/security/cve/CVE-2022-26373/" source="CVE"/>
		<reference ref_id="CVE-2022-2991" ref_url="https://www.suse.com/security/cve/CVE-2022-2991/" source="CVE"/>
		<reference ref_id="CVE-2022-3028" ref_url="https://www.suse.com/security/cve/CVE-2022-3028/" source="CVE"/>
		<reference ref_id="CVE-2022-36879" ref_url="https://www.suse.com/security/cve/CVE-2022-36879/" source="CVE"/>
		<reference ref_id="CVE-2022-39188" ref_url="https://www.suse.com/security/cve/CVE-2022-39188/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012222.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).
- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).
- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).
- CVE-2022-2991: Fixed an heap-based overflow in the lightnvm implemenation (bsc#1201420).
- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).
- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).
- CVE-2022-21385: Fixed a flaw in net_rds_alloc_sgs() that allowed unprivileged local users to crash the machine (bnc#1202897).
- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).
- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).
- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim's TCP session (bnc#1196616).
- CVE-2019-3900: Fixed infinite loop the vhost_net kernel module that could result in a DoS scenario (bnc#1133374).

The following non-security bugs were fixed:

- net_sched: cls_route: Disallowed handle of 0 (bsc#1202393).
- mm, rmap: Fixed anon_vma-&gt;degree ambiguity leading to double-reuse (bsc#1203098).
- lightnvm: Removed lightnvm implemenation (bsc#1191881).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-14"/>
	<updated date="2022-09-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133374">SUSE bug 1133374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191881">SUSE bug 1191881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196616">SUSE bug 1196616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201420">SUSE bug 1201420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201726">SUSE bug 1201726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201948">SUSE bug 1201948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202096">SUSE bug 1202096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202346">SUSE bug 1202346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202347">SUSE bug 1202347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202393">SUSE bug 1202393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202897">SUSE bug 1202897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202898">SUSE bug 1202898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203098">SUSE bug 1203098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203107">SUSE bug 1203107</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3900/">CVE-2019-3900 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3900">CVE-2019-3900 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36516/">CVE-2020-36516 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36516">CVE-2020-36516 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20368/">CVE-2022-20368 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20368">CVE-2022-20368 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20369/">CVE-2022-20369 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20369">CVE-2022-20369 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21385/">CVE-2022-21385 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21385">CVE-2022-21385 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2588/">CVE-2022-2588 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2588">CVE-2022-2588 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26373/">CVE-2022-26373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26373">CVE-2022-26373 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2991/">CVE-2022-2991 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2991">CVE-2022-2991 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3028/">CVE-2022-3028 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3028">CVE-2022-3028 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36879/">CVE-2022-36879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36879">CVE-2022-36879 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-39188/">CVE-2022-39188 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39188">CVE-2022-39188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009711101" comment="kernel-default-4.4.180-94.174.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711102" comment="kernel-default-base-4.4.180-94.174.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711103" comment="kernel-default-devel-4.4.180-94.174.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711104" comment="kernel-devel-4.4.180-94.174.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711105" comment="kernel-macros-4.4.180-94.174.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711106" comment="kernel-source-4.4.180-94.174.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711107" comment="kernel-syms-4.4.180-94.174.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151059" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1198166" ref_url="https://bugzilla.suse.com/1198166" source="BUGZILLA"/>
		<reference ref_id="1200437" ref_url="https://bugzilla.suse.com/1200437" source="BUGZILLA"/>
		<reference ref_id="1202368" ref_url="https://bugzilla.suse.com/1202368" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012228.html" source="SUSE-SU"/>
		<description>
This update for postgresql14 fixes the following issues:

- Upgrade to version 14.5:
- CVE-2022-2625: Fixed an issue where extension scripts would replace objects not belonging to that extension (bsc#1202368).

- Upgrade to version 14.4 (bsc#1200437)
- Release notes: https://www.postgresql.org/docs/release/14.4/
- Release announcement: https://www.postgresql.org/about/news/p-2470/
- Prevent possible corruption of indexes created or rebuilt with the CONCURRENTLY option (bsc#1200437)
- Pin to llvm13 until the next patchlevel update (bsc#1198166)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-14"/>
	<updated date="2022-09-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198166">SUSE bug 1198166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200437">SUSE bug 1200437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202368">SUSE bug 1202368</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2625">CVE-2022-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710356" comment="libecpg6-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710357" comment="libpq5-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710351" comment="libpq5-32bit-14.5-3.14.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151060" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1200793" ref_url="https://bugzilla.suse.com/1200793" source="BUGZILLA"/>
		<reference ref_id="1201758" ref_url="https://bugzilla.suse.com/1201758" source="BUGZILLA"/>
		<reference ref_id="1202645" ref_url="https://bugzilla.suse.com/1202645" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-2505" ref_url="https://www.suse.com/security/cve/CVE-2022-2505/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34469" ref_url="https://www.suse.com/security/cve/CVE-2022-34469/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34471" ref_url="https://www.suse.com/security/cve/CVE-2022-34471/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34473" ref_url="https://www.suse.com/security/cve/CVE-2022-34473/" source="CVE"/>
		<reference ref_id="CVE-2022-34474" ref_url="https://www.suse.com/security/cve/CVE-2022-34474/" source="CVE"/>
		<reference ref_id="CVE-2022-34475" ref_url="https://www.suse.com/security/cve/CVE-2022-34475/" source="CVE"/>
		<reference ref_id="CVE-2022-34476" ref_url="https://www.suse.com/security/cve/CVE-2022-34476/" source="CVE"/>
		<reference ref_id="CVE-2022-34477" ref_url="https://www.suse.com/security/cve/CVE-2022-34477/" source="CVE"/>
		<reference ref_id="CVE-2022-34478" ref_url="https://www.suse.com/security/cve/CVE-2022-34478/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34480" ref_url="https://www.suse.com/security/cve/CVE-2022-34480/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34482" ref_url="https://www.suse.com/security/cve/CVE-2022-34482/" source="CVE"/>
		<reference ref_id="CVE-2022-34483" ref_url="https://www.suse.com/security/cve/CVE-2022-34483/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<reference ref_id="CVE-2022-34485" ref_url="https://www.suse.com/security/cve/CVE-2022-34485/" source="CVE"/>
		<reference ref_id="CVE-2022-36314" ref_url="https://www.suse.com/security/cve/CVE-2022-36314/" source="CVE"/>
		<reference ref_id="CVE-2022-36318" ref_url="https://www.suse.com/security/cve/CVE-2022-36318/" source="CVE"/>
		<reference ref_id="CVE-2022-36319" ref_url="https://www.suse.com/security/cve/CVE-2022-36319/" source="CVE"/>
		<reference ref_id="CVE-2022-38472" ref_url="https://www.suse.com/security/cve/CVE-2022-38472/" source="CVE"/>
		<reference ref_id="CVE-2022-38473" ref_url="https://www.suse.com/security/cve/CVE-2022-38473/" source="CVE"/>
		<reference ref_id="CVE-2022-38476" ref_url="https://www.suse.com/security/cve/CVE-2022-38476/" source="CVE"/>
		<reference ref_id="CVE-2022-38477" ref_url="https://www.suse.com/security/cve/CVE-2022-38477/" source="CVE"/>
		<reference ref_id="CVE-2022-38478" ref_url="https://www.suse.com/security/cve/CVE-2022-38478/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Mozilla Firefox was updated to 102.2.0esr ESR:

* Fixed: Various stability, functionality, and security fixes.

- MFSA 2022-34 (bsc#1202645)

  * CVE-2022-38472 (bmo#1769155)
    Address bar spoofing via XSLT error handling
  * CVE-2022-38473 (bmo#1771685)
    Cross-origin XSLT Documents would have inherited the parent's
    permissions
  * CVE-2022-38476 (bmo#1760998)
    Data race and potential use-after-free in PK11_ChangePW
  * CVE-2022-38477 (bmo#1760611, bmo#1770219, bmo#1771159,
    bmo#1773363)
    Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2
  * CVE-2022-38478 (bmo#1770630, bmo#1776658)
    Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2,
    and Firefox ESR 91.13

Firefox Extended Support Release 102.1 ESR

  * Fixed: Various stability, functionality, and security fixes.

- MFSA 2022-30 (bsc#1201758)

  * CVE-2022-36319 (bmo#1737722)
    Mouse Position spoofing with CSS transforms
  * CVE-2022-36318 (bmo#1771774)
    Directory indexes for bundled resources reflected URL
    parameters
  * CVE-2022-36314 (bmo#1773894)
    Opening local &lt;code&gt;.lnk&lt;/code&gt; files could cause unexpected
    network loads
  * CVE-2022-2505 (bmo#1769739, bmo#1772824)
    Memory safety bugs fixed in Firefox 103 and 102.1

- Firefox Extended Support Release 102.0.1 ESR

  * Fixed: Fixed bookmark shortcut creation by dragging to
    Windows File Explorer and dropping partially broken
    (bmo#1774683)
  * Fixed: Fixed bookmarks sidebar flashing white when opened in
    dark mode (bmo#1776157)
  * Fixed: Fixed multilingual spell checking not working with
    content in both English and a non-Latin alphabet
    (bmo#1773802)
  * Fixed: Developer tools:  Fixed an issue where the console
    output keep getting scrolled to the bottom when the last
    visible message is an evaluation result (bmo#1776262)
  * Fixed: Fixed *Delete cookies and site data when Firefox is
    closed* checkbox getting disabled on startup (bmo#1777419)
  * Fixed: Various stability fixes

Firefox 102.0 ESR:

* New: 

  - We now provide more secure connections: Firefox can
    now automatically upgrade to HTTPS using HTTPS RR as Alt-Svc
    headers.
  - For added viewing pleasure, full-range color levels are now
    supported for video playback on many systems.
  - Find it easier now! Mac users can now access the macOS
    share options from the Firefox File menu.
  - Voil?! Support for images containing ICC v4 profiles is
    enabled on macOS.
  - Firefox now supports the new AVIF image format, which is
    based on the modern and royalty-free AV1 video codec. It
    offers significant bandwidth savings for sites compared to
    existing image formats. It also supports transparency and
    other advanced features.
  - Firefox PDF viewer now supports filling more forms (e.g.,
    XFA-based forms, used by multiple governments and banks).
    Learn more.
  - When available system memory is critically low, Firefox on
    Windows will automatically unload tabs based on their last
    access time, memory usage, and other attributes. This helps
    to reduce Firefox out-of-memory crashes. Forgot something?
    Switching to an unloaded tab automatically reloads it.
  - To prevent session loss for macOS users who are running
    Firefox from a mounted .dmg file, they’ll now be prompted to
    finish installation. Bear in mind, this permission prompt
    only appears the first time these users run Firefox on their
    computer.
  - For your safety, Firefox now blocks downloads that rely on
    insecure connections, protecting against potentially
    malicious or unsafe downloads. Learn more and see where to
    find downloads in Firefox.
  - Improved web compatibility for privacy protections with
    SmartBlock 3.0: In Private Browsing and Strict Tracking
    Protection, Firefox goes to great lengths to protect your web
    browsing activity from trackers. As part of this, the built-
    in content blocking will automatically block third-party
    scripts, images, and other content from being loaded from
    cross-site tracking companies reported by Disconnect. Learn
    more.
  - Introducing a new referrer tracking protection in Strict
    Tracking Protection and Private Browsing. This feature
    prevents sites from unknowingly leaking private information
    to trackers. Learn more.
  - Introducing Firefox Suggest, a feature that provides
    website suggestions as you type into the address bar. Learn
    more about this faster way to navigate the web and locale-
    specific features.
  - Firefox macOS now uses Apple's low-power mode for
    fullscreen video on sites such as YouTube and Twitch. This
    meaningfully extends battery life in long viewing sessions.
    Now your kids can find out what the fox says on a loop
    without you ever missing a beat…
  - With this release, power users can use about:unloads to
    release system resources by manually unloading tabs without
    closing them.
  - On Windows, there will now be fewer interruptions because
    Firefox won’t prompt you for updates. Instead, a background
    agent will download and install updates even if Firefox is
    closed.
  - On Linux, we’ve improved WebGL performance and reduced
    power consumption for many users.
  - To better protect all Firefox users against side-channel
    attacks, such as Spectre, we introduced Site Isolation.
  - Firefox no longer warns you by default when you exit the
    browser or close a window using a menu, button, or three-key
    command. This should cut back on unwelcome notifications,
    which is always nice—however, if you prefer a bit of notice,
    you’ll still have full control over the quit/close modal
    behavior. All warnings can be managed within Firefox
    Settings. No worries! More details here.
  - Firefox supports the new Snap Layouts menus when running on
    Windows 11.
  - RLBox—a new technology that hardens Firefox against
    potential security vulnerabilities in third-party
    libraries—is now enabled on all platforms.
  - We’ve reduced CPU usage on macOS in Firefox and
    WindowServer during event processing.
  - We’ve also reduced the power usage of software decoded
    video on macOS, especially in fullscreen. This includes
    streaming sites such as Netflix and Amazon Prime Video.
  - You can now move the Picture-in-Picture toggle button to
    the opposite side of the video. Simply look for the new
    context menu option Move Picture-in-Picture Toggle to Left
    (Right) Side.
  - We’ve made significant improvements in noise suppression
    and auto-gain-control, as well as slight improvements in
    echo-cancellation to provide you with a better overall
    experience.
  - We’ve also significantly reduced main-thread load.
  - When printing, you can now choose to print only the
    odd/even pages.
  - Firefox now supports and displays the new style of
    scrollbars on Windows 11.
  - Firefox has a new optimized download flow. Instead of
    prompting every time, files will download automatically.
    However, they can still be opened from the downloads panel
    with just one click. Easy! More information
  - Firefox no longer asks what to do for each file by default.
    You won’t be prompted to choose a helper application or save
    to disk before downloading a file unless you have changed
    your download action setting for that type of file.
 -  Any files you download will be immediately saved on your
    disk. Depending on the current configuration, they’ll be
    saved in your preferred download folder, or you’ll be asked
    to select a location for each download. Windows and Linux
    users will find their downloaded files in the destination
    folder. They’ll no longer be put in the Temp folder.
  - Firefox allows users to choose from a number of built-in
    search engines to set as their default. In this release, some
    users who had previously configured a default engine might
    notice their default search engine has changed since Mozilla
    was unable to secure formal permission to continue including
    certain search engines in Firefox.
  - You can now toggle Narrate in ReaderMode with the keyboard
    shortcut 'n.'
  - You can find added support for search—with or without
    diacritics—in the PDF viewer.
  - The Linux sandbox has been strengthened: processes exposed
    to web content no longer have access to the X Window system
    (X11).
  - Firefox now supports credit card autofill and capture in
    Germany, France, and the United Kingdom.
  - We now support captions/subtitles display on YouTube, Prime
    Video, and Netflix videos you watch in Picture-in-Picture.
    Just turn on the subtitles on the in-page video player, and
    they will appear in PiP.
  - Picture-in-Picture now also supports video captions on
    websites that use Web Video Text Track (WebVTT) format (e.g.,
    Coursera.org, Canadian Broadcasting Corporation, and many
    more).
  - On the first run after install, Firefox detects when its
    language does not match the operating system language and
    offers the user a choice between the two languages.
  - Firefox spell checking now checks spelling in multiple
    languages. To enable additional languages, select them in the
    text field’s context menu.
  - HDR video is now supported in Firefox on Mac—starting with
    YouTube! Firefox users on macOS 11+ (with HDR-compatible
    screens) can enjoy higher-fidelity video content. No need to
    manually flip any preferences to turn HDR video support
    on—just make sure battery preferences are NOT set to
    “optimize video streaming while on battery”.
  - Hardware-accelerated AV1 video decoding is enabled on
    Windows with supported GPUs (Intel Gen 11+, AMD RDNA 2
    Excluding Navi 24, GeForce 30). Installing the AV1 Video
    Extension from the Microsoft Store may also be required.
  - Video overlay is enabled on Windows for Intel GPUs,
    reducing power usage during video playback.
  - Improved fairness between painting and handling other
    events. This noticeably improves the performance of the
    volume slider on Twitch.
  - Scrollbars on Linux and Windows 11 won't take space by
    default. On Linux, users can change this in Settings. On
    Windows, Firefox follows the system setting (System Settings
    &gt; Accessibility &gt; Visual Effects &gt; Always show scrollbars).
  - Firefox now ignores less restricted referrer
    policies—including unsafe-url, no-referrer-when-downgrade,
    and origin-when-cross-origin—for cross-site
    subresource/iframe requests to prevent privacy leaks from the
    referrer.
  - Reading is now easier with the prefers-contrast media
    query, which allows sites to detect if the user has requested
    that web content is presented with a higher (or lower)
    contrast.
  - All non-configured MIME types can now be assigned a custom
    action upon download completion.
  - Firefox now allows users to use as many microphones as they
    want, at the same time, during video conferencing. The most
    exciting benefit is that you can easily switch your
    microphones at any time (if your conferencing service
    provider enables this flexibility).
  - Print preview has been updated.

  * Fixed: Various security fixes.

- MFSA 2022-24 (bsc#1200793)

  * CVE-2022-34479 (bmo#1745595)
    A popup window could be resized in a way to overlay the
    address bar with web content
  * CVE-2022-34470 (bmo#1765951)
    Use-after-free in nsSHistory
  * CVE-2022-34468 (bmo#1768537)
    CSP sandbox header without `allow-scripts` can be bypassed
    via retargeted javascript: URI
  * CVE-2022-34482 (bmo#845880)
    Drag and drop of malicious image could have led to malicious
    executable and potential code execution
  * CVE-2022-34483 (bmo#1335845)
    Drag and drop of malicious image could have led to malicious
    executable and potential code execution
  * CVE-2022-34476 (bmo#1387919)
    ASN.1 parser could have been tricked into accepting malformed
    ASN.1
  * CVE-2022-34481 (bmo#1483699, bmo#1497246)
    Potential integer overflow in ReplaceElementsAt
  * CVE-2022-34474 (bmo#1677138)
    Sandboxed iframes could redirect to external schemes
  * CVE-2022-34469 (bmo#1721220)
    TLS certificate errors on HSTS-protected domains could be
    bypassed by the user on Firefox for Android
  * CVE-2022-34471 (bmo#1766047)
    Compromised server could trick a browser into an addon
    downgrade
  * CVE-2022-34472 (bmo#1770123)
    Unavailable PAC file resulted in OCSP requests being blocked
  * CVE-2022-34478 (bmo#1773717)
    Microsoft protocols can be attacked if a user accepts a
    prompt
  * CVE-2022-2200 (bmo#1771381)
    Undesired attributes could be set as part of prototype
    pollution
  * CVE-2022-34480 (bmo#1454072)
    Free of uninitialized pointer in lg_init
  * CVE-2022-34477 (bmo#1731614)
    MediaError message property leaked information on cross-
    origin same-site pages
  * CVE-2022-34475 (bmo#1757210)
    HTML Sanitizer could have been bypassed via same-origin
    script via use tags
  * CVE-2022-34473 (bmo#1770888)
    HTML Sanitizer could have been bypassed via use tags
  * CVE-2022-34484 (bmo#1763634, bmo#1772651)
    Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11
  * CVE-2022-34485 (bmo#1768409, bmo#1768578)
    Memory safety bugs fixed in Firefox 102
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-14"/>
	<updated date="2022-09-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201758">SUSE bug 1201758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202645">SUSE bug 1202645</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2200">CVE-2022-2200 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2505/">CVE-2022-2505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2505">CVE-2022-2505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34468">CVE-2022-34468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34469/">CVE-2022-34469 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34469">CVE-2022-34469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34470">CVE-2022-34470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34471/">CVE-2022-34471 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34471">CVE-2022-34471 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34472">CVE-2022-34472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34473/">CVE-2022-34473 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34473">CVE-2022-34473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34474/">CVE-2022-34474 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34474">CVE-2022-34474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34475/">CVE-2022-34475 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34475">CVE-2022-34475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34476/">CVE-2022-34476 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34476">CVE-2022-34476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34477/">CVE-2022-34477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34477">CVE-2022-34477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34478/">CVE-2022-34478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34478">CVE-2022-34478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34479">CVE-2022-34479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34480/">CVE-2022-34480 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34480">CVE-2022-34480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34481">CVE-2022-34481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34482/">CVE-2022-34482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34482">CVE-2022-34482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34483/">CVE-2022-34483 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34483">CVE-2022-34483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34484">CVE-2022-34484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34485/">CVE-2022-34485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34485">CVE-2022-34485 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36314/">CVE-2022-36314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36314">CVE-2022-36314 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36318/">CVE-2022-36318 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36318">CVE-2022-36318 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36319/">CVE-2022-36319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36319">CVE-2022-36319 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38472/">CVE-2022-38472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38472">CVE-2022-38472 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38473/">CVE-2022-38473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38473">CVE-2022-38473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38476/">CVE-2022-38476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38476">CVE-2022-38476 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38477/">CVE-2022-38477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38477">CVE-2022-38477 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38478/">CVE-2022-38478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38478">CVE-2022-38478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710358" comment="MozillaFirefox-102.2.0-112.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710359" comment="MozillaFirefox-branding-SLE-102-35.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710360" comment="MozillaFirefox-devel-102.2.0-112.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710361" comment="MozillaFirefox-translations-common-102.2.0-112.130.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151061" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1194006" ref_url="https://bugzilla.suse.com/1194006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009971.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-4156: Fixed heap buffer overflow in flac_buffer_copy that 
could potentially lead to heap exploitation (bsc#1194006).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4156">CVE-2021-4156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662498" comment="libsndfile1-1.0.25-36.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662485" comment="libsndfile1-32bit-1.0.25-36.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151062" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1189802" ref_url="https://bugzilla.suse.com/1189802" source="BUGZILLA"/>
		<reference ref_id="1195773" ref_url="https://bugzilla.suse.com/1195773" source="BUGZILLA"/>
		<reference ref_id="1201783" ref_url="https://bugzilla.suse.com/1201783" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36690" ref_url="https://www.suse.com/security/cve/CVE-2021-36690/" source="CVE"/>
		<reference ref_id="CVE-2022-35737" ref_url="https://www.suse.com/security/cve/CVE-2022-35737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012378.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issues fixed:

- CVE-2022-35737: Fixed an array-bounds overflow if billions of bytes are used in a string argument to a C API (bnc#1201783).
- CVE-2021-36690: Fixed an issue with the SQLite Expert extension when a column has no collating sequence (bsc#1189802).
  
- Package the Tcl bindings here again so that we only ship one copy of SQLite (bsc#1195773).

sqlite3 was update to 3.39.3:

* Use a statement journal on DML statement affecting two or more
  database rows if the statement makes use of a SQL functions
  that might abort.
* Use a mutex to protect the PRAGMA temp_store_directory and
  PRAGMA data_store_directory statements, even though they are
  decremented and documented as not being threadsafe.

Update to 3.39.2:

* Fix a performance regression in the query planner associated
  with rearranging the order of FROM clause terms in the
  presences of a LEFT JOIN.
* Apply fixes for CVE-2022-35737, Chromium bugs 1343348 and
  1345947, forum post 3607259d3c, and other minor problems
  discovered by internal testing. [boo#1201783]

Update to 3.39.1:

* Fix an incorrect result from a query that uses a view that
  contains a compound SELECT in which only one arm contains a
  RIGHT JOIN and where the view is not the first FROM clause term
  of the query that contains the view
* Fix a long-standing problem with ALTER TABLE RENAME that can
  only arise if the sqlite3_limit(SQLITE_LIMIT_SQL_LENGTH) is set
  to a very small value.
* Fix a long-standing problem in FTS3 that can only arise when
  compiled with the SQLITE_ENABLE_FTS3_PARENTHESIS compile-time
  option.
* Fix the initial-prefix optimization for the REGEXP extension so
  that it works correctly even if the prefix contains characters
  that require a 3-byte UTF8 encoding.
* Enhance the sqlite_stmt virtual table so that it buffers all of
  its output. 

Update to 3.39.0:

* Add (long overdue) support for RIGHT and FULL OUTER JOIN
* Add new binary comparison operators IS NOT DISTINCT FROM and 
  IS DISTINCT FROM that are equivalent to IS and IS NOT, 
  respective, for compatibility with PostgreSQL and SQL standards
* Add a new return code (value '3') from the sqlite3_vtab_distinct()
  interface that indicates a query that has both DISTINCT and 
  ORDER BY clauses
* Added the sqlite3_db_name() interface
* The unix os interface resolves all symbolic links in database
  filenames to create a canonical name for the database before
  the file is opened
* Defer materializing views until the materialization is actually
  needed, thus avoiding unnecessary work if the materialization
  turns out to never be used
* The HAVING clause of a SELECT statement is now allowed on any
  aggregate query, even queries that do not have a GROUP BY
  clause
* Many microoptimizations collectively reduce CPU cycles by about
  2.3%. 

Update to 3.38.5:

* Fix a blunder in the CLI of the 3.38.4 release

Update to 3.38.4:

* fix a byte-code problem in the Bloom filter pull-down
  optimization added by release 3.38.0 in which an error in the
  byte code causes the byte code engine to enter an infinite loop
  when the pull-down optimization encounters a NULL key   

Update to 3.38.3:

* Fix a case of the query planner be overly aggressive with
  optimizing automatic-index and Bloom-filter construction,
  using inappropriate ON clause terms to restrict the size of the
  automatic-index or Bloom filter, and resulting in missing rows
  in the output.
* Other minor patches. See the timeline for details. 

Update to 3.38.2:

* Fix a problem with the Bloom filter optimization that might
  cause an incorrect answer when doing a LEFT JOIN with a WHERE
  clause constraint that says that one of the columns on the
  right table of the LEFT JOIN is NULL.
* Other minor patches.

- Package the Tcl bindings here again so that we only ship one copy
of SQLite (bsc#1195773).

Update to 3.38.1:

* Fix problems with the new Bloom filter optimization that might
  cause some obscure queries to get an incorrect answer.
* Fix the localtime modifier of the date and time functions so
  that it preserves fractional seconds.
* Fix the sqlite_offset SQL function so that it works correctly
  even in corner cases such as when the argument is a virtual
  column or the column of a view.
* Fix row value IN operator constraints on virtual tables so that
  they work correctly even if the virtual table implementation
  relies on bytecode to filter rows that do not satisfy the
  constraint.
* Other minor fixes to assert() statements, test cases, and
  documentation. See the source code timeline for details.

Update to 3.38.0

* Add the -&gt; and -&gt;&gt; operators for easier processing of JSON
* The JSON functions are now built-ins
* Enhancements to date and time functions
* Rename the printf() SQL function to format() for better
  compatibility, with alias for backwards compatibility.
* Add the sqlite3_error_offset() interface for helping localize
  an SQL error to a specific character in the input SQL text 
* Enhance the interface to virtual tables 
* CLI columnar output modes are enhanced to correctly handle tabs
  and newlines embedded in text, and add options like '--wrap N',
  '--wordwrap on', and '--quote' to the columnar output modes.
* Query planner enhancements using a Bloom filter to speed up 
  large analytic queries, and a balanced merge tree to evaluate
  UNION or UNION ALL compound SELECT statements that have an
  ORDER BY clause.
* The ALTER TABLE statement is changed to silently ignores
  entries in the sqlite_schema table that do not parse when
  PRAGMA writable_schema=ON

Update to 3.37.2:

* Fix a bug introduced in version 3.35.0 (2021-03-12) that can
  cause database corruption if a SAVEPOINT is rolled back while
  in PRAGMA temp_store=MEMORY mode, and other changes are made,
  and then the outer transaction commits
* Fix a long-standing problem with ON DELETE CASCADE and ON 
  UPDATE CASCADE in which a cache of the bytecode used to
  implement the cascading change was not being reset following a
  local DDL change

Update to 3.37.1:

* Fix a bug introduced by the UPSERT enhancements of version
  3.35.0 that can cause incorrect byte-code to be generated for
  some obscure but valid SQL, possibly resulting in a NULL-
  pointer dereference.
* Fix an OOB read that can occur in FTS5 when reading corrupt
  database files.
* Improved robustness of the --safe option in the CLI.
* Other minor fixes to assert() statements and test cases. 

Update to 3.37.0:

* STRICT tables provide a prescriptive style of data type
  management, for developers who prefer that kind of thing.
* When adding columns that contain a CHECK constraint or a
  generated column containing a NOT NULL constraint, the
  ALTER TABLE ADD COLUMN now checks new constraints against
  preexisting rows in the database and will only proceed if no
  constraints are violated.
* Added the PRAGMA table_list statement.
* Add the .connection command, allowing the CLI to keep multiple
  database connections open at the same time.
* Add the --safe command-line option that disables dot-commands
  and SQL statements that might cause side-effects that extend
  beyond the single database file named on the command-line.
* CLI: Performance improvements when reading SQL statements that
  span many lines.
* Added the sqlite3_autovacuum_pages() interface.
* The sqlite3_deserialize() does not and has never worked
  for the TEMP database. That limitation is now noted in the
  documentation.
* The query planner now omits ORDER BY clauses on subqueries and
  views if removing those clauses does not change the semantics
  of the query.
* The generate_series table-valued function extension is modified
  so that the first parameter ('START') is now required. This is
  done as a way to demonstrate how to write table-valued
  functions with required parameters. The legacy behavior is
  available using the -DZERO_ARGUMENT_GENERATE_SERIES
  compile-time option.
* Added new sqlite3_changes64() and sqlite3_total_changes64()
  interfaces.
* Added the SQLITE_OPEN_EXRESCODE flag option to sqlite3_open_v2().
* Use less memory to hold the database schema.
* bsc#1189802, CVE-2021-36690: Fix an issue with the SQLite Expert
  extension when a column has no collating sequence.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-26"/>
	<updated date="2022-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189802">SUSE bug 1189802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195773">SUSE bug 1195773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201783">SUSE bug 1201783</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36690/">CVE-2021-36690 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36690">CVE-2021-36690 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35737/">CVE-2022-35737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35737">CVE-2022-35737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009711108" comment="libsqlite3-0-3.39.3-9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711109" comment="libsqlite3-0-32bit-3.39.3-9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711110" comment="sqlite3-3.39.3-9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711111" comment="sqlite3-devel-3.39.3-9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714672" comment="sqlite3-tcl-3.39.3-9.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151063" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1203477" ref_url="https://bugzilla.suse.com/1203477" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40956" ref_url="https://www.suse.com/security/cve/CVE-2022-40956/" source="CVE"/>
		<reference ref_id="CVE-2022-40957" ref_url="https://www.suse.com/security/cve/CVE-2022-40957/" source="CVE"/>
		<reference ref_id="CVE-2022-40958" ref_url="https://www.suse.com/security/cve/CVE-2022-40958/" source="CVE"/>
		<reference ref_id="CVE-2022-40959" ref_url="https://www.suse.com/security/cve/CVE-2022-40959/" source="CVE"/>
		<reference ref_id="CVE-2022-40960" ref_url="https://www.suse.com/security/cve/CVE-2022-40960/" source="CVE"/>
		<reference ref_id="CVE-2022-40962" ref_url="https://www.suse.com/security/cve/CVE-2022-40962/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012406.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

  Mozilla Firefox was updated from 102.2.0esr to 102.3.0esr (bsc#1203477):

  - CVE-2022-40959: Fixed bypassing FeaturePolicy restrictions on transient pages.
  - CVE-2022-40960: Fixed data-race when parsing non-UTF-8 URLs in threads.
  - CVE-2022-40958: Fixed bypassing secure context restriction for cookies with __Host and __Secure prefix.
  - CVE-2022-40956: Fixed content-security-policy base-uri bypass.
  - CVE-2022-40957: Fixed incoherent instruction cache when building WASM on ARM64.
  - CVE-2022-40962: Fixed memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3.
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-27"/>
	<updated date="2022-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203477">SUSE bug 1203477</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40956/">CVE-2022-40956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40956">CVE-2022-40956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40957/">CVE-2022-40957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40957">CVE-2022-40957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40958/">CVE-2022-40958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40958">CVE-2022-40958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40959/">CVE-2022-40959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40959">CVE-2022-40959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40960/">CVE-2022-40960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40960">CVE-2022-40960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40962/">CVE-2022-40962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40962">CVE-2022-40962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009714304" comment="MozillaFirefox-102.3.0-112.133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714305" comment="MozillaFirefox-devel-102.3.0-112.133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714306" comment="MozillaFirefox-translations-common-102.3.0-112.133.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151064" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1203438" ref_url="https://bugzilla.suse.com/1203438" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40674" ref_url="https://www.suse.com/security/cve/CVE-2022-40674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012447.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-40674: Fixed use-after-free in the doContent function in xmlparse.c (bsc#1203438).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-29"/>
	<updated date="2022-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203438">SUSE bug 1203438</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40674/">CVE-2022-40674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009715903" comment="expat-2.1.0-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715904" comment="libexpat1-2.1.0-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715899" comment="libexpat1-32bit-2.1.0-21.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151065" version="1" class="patch">
	<metadata>
		<title>Security update for krb5-appl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1203759" ref_url="https://bugzilla.suse.com/1203759" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-39028" ref_url="https://www.suse.com/security/cve/CVE-2022-39028/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012454.html" source="SUSE-SU"/>
		<description>
This update for krb5-appl fixes the following issues:

- CVE-2022-39028: Fixed NULL pointer dereference in krb5-appl telnetd (bsc#1203759).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-29"/>
	<updated date="2022-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203759">SUSE bug 1203759</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39028/">CVE-2022-39028 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39028">CVE-2022-39028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009715905" comment="krb5-appl-clients-1.0.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715906" comment="krb5-appl-servers-1.0.3-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151066" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1203530" ref_url="https://bugzilla.suse.com/1203530" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32886" ref_url="https://www.suse.com/security/cve/CVE-2022-32886/" source="CVE"/>
		<reference ref_id="CVE-2022-32912" ref_url="https://www.suse.com/security/cve/CVE-2022-32912/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012478.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Updated to version 2.36.8 (bsc#1203530):
  - CVE-2022-32886: Fixed a buffer overflow issue that could potentially lead to code execution.
  - CVE-2022-32912: Fixed an out-of-bounds read that could potentially lead to code execution.

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-03"/>
	<updated date="2022-10-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203530">SUSE bug 1203530</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32886/">CVE-2022-32886 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32886">CVE-2022-32886 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32912/">CVE-2022-32912 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32912">CVE-2022-32912 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009715764" comment="libjavascriptcoregtk-4_0-18-2.36.8-2.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715765" comment="libwebkit2gtk-4_0-37-2.36.8-2.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715766" comment="typelib-1_0-JavaScriptCore-4_0-2.36.8-2.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715767" comment="typelib-1_0-WebKit2-4_0-2.36.8-2.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715769" comment="webkit2gtk-4_0-injected-bundles-2.36.8-2.113.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151067" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1203614" ref_url="https://bugzilla.suse.com/1203614" source="BUGZILLA"/>
		<reference ref_id="1203619" ref_url="https://bugzilla.suse.com/1203619" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2795" ref_url="https://www.suse.com/security/cve/CVE-2022-2795/" source="CVE"/>
		<reference ref_id="CVE-2022-38177" ref_url="https://www.suse.com/security/cve/CVE-2022-38177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012484.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

  - CVE-2022-2795: Fixed potential performance degredation due to missing database lookup limits when processing large delegations (bsc#1203614).
  - CVE-2022-38177: Fixed a memory leak that could be externally triggered in the DNSSEC verification code for the ECDSA algorithm (bsc#1203619).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-04"/>
	<updated date="2022-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203614">SUSE bug 1203614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203619">SUSE bug 1203619</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2795/">CVE-2022-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2795">CVE-2022-2795 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38177/">CVE-2022-38177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38177">CVE-2022-38177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009715758" comment="bind-9.9.9P1-63.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715759" comment="bind-chrootenv-9.9.9P1-63.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715760" comment="bind-doc-9.9.9P1-63.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715761" comment="bind-libs-9.9.9P1-63.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715762" comment="bind-libs-32bit-9.9.9P1-63.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715763" comment="bind-utils-9.9.9P1-63.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151068" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1202624" ref_url="https://bugzilla.suse.com/1202624" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28861" ref_url="https://www.suse.com/security/cve/CVE-2021-28861/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012593.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2021-28861: Fixed an open redirection vulnerability in the HTTP server when an URI path starts with // (bsc#1202624).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-20"/>
	<updated date="2022-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202624">SUSE bug 1202624</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28861/">CVE-2021-28861 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28861">CVE-2021-28861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009714370" comment="libpython3_4m1_0-3.4.10-25.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714371" comment="python3-3.4.10-25.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714372" comment="python3-base-3.4.10-25.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714373" comment="python3-curses-3.4.10-25.96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151069" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1203677" ref_url="https://bugzilla.suse.com/1203677" source="BUGZILLA"/>
		<reference ref_id="1203680" ref_url="https://bugzilla.suse.com/1203680" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41317" ref_url="https://www.suse.com/security/cve/CVE-2022-41317/" source="CVE"/>
		<reference ref_id="CVE-2022-41318" ref_url="https://www.suse.com/security/cve/CVE-2022-41318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012502.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

  - CVE-2022-41317: Fixed exposure of sensitive information in cache manager (bsc#1203677).
  - CVE-2022-41318: Fixed buffer overread in SSPI and SMB Authentication (bsc#1203680).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-06"/>
	<updated date="2022-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203677">SUSE bug 1203677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203680">SUSE bug 1203680</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41317/">CVE-2022-41317 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41317">CVE-2022-41317 at NVD</cve>
	<cve impact="high" cvss3="8.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-41318/">CVE-2022-41318 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41318">CVE-2022-41318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715902" comment="squid-3.5.21-26.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151070" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql-jdbc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1202170" ref_url="https://bugzilla.suse.com/1202170" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31197" ref_url="https://www.suse.com/security/cve/CVE-2022-31197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012504.html" source="SUSE-SU"/>
		<description>
This update for postgresql-jdbc fixes the following issues:

- CVE-2022-31197: Fixed SQL injection vulnerability (bsc#1202170).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-06"/>
	<updated date="2022-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202170">SUSE bug 1202170</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-31197/">CVE-2022-31197 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31197">CVE-2022-31197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716256" comment="postgresql-jdbc-9.4-3.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151071" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010197.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-09"/>
	<updated date="2022-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20698">CVE-2022-20698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664693" comment="clamav-0.103.5-33.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151072" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1194581" ref_url="https://bugzilla.suse.com/1194581" source="BUGZILLA"/>
		<reference ref_id="1194588" ref_url="https://bugzilla.suse.com/1194588" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23034" ref_url="https://www.suse.com/security/cve/CVE-2022-23034/" source="CVE"/>
		<reference ref_id="CVE-2022-23035" ref_url="https://www.suse.com/security/cve/CVE-2022-23035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010198.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-23034: Fixed possible DoS by a PV guest Xen while unmapping a grant. (XSA-394) (bsc#1194581)
- CVE-2022-23035: Fixed insufficient cleanup of passed-through device IRQs. (XSA-395) (bsc#1194588)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-09"/>
	<updated date="2022-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194581">SUSE bug 1194581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194588">SUSE bug 1194588</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23034/">CVE-2022-23034 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23034">CVE-2022-23034 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23035/">CVE-2022-23035 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23035">CVE-2022-23035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666154" comment="xen-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666155" comment="xen-doc-html-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666156" comment="xen-libs-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666157" comment="xen-libs-32bit-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666158" comment="xen-tools-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666159" comment="xen-tools-domU-4.9.4_26-3.100.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151073" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1202677" ref_url="https://bugzilla.suse.com/1202677" source="BUGZILLA"/>
		<reference ref_id="1202960" ref_url="https://bugzilla.suse.com/1202960" source="BUGZILLA"/>
		<reference ref_id="1203552" ref_url="https://bugzilla.suse.com/1203552" source="BUGZILLA"/>
		<reference ref_id="1203769" ref_url="https://bugzilla.suse.com/1203769" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2503" ref_url="https://www.suse.com/security/cve/CVE-2022-2503/" source="CVE"/>
		<reference ref_id="CVE-2022-3239" ref_url="https://www.suse.com/security/cve/CVE-2022-3239/" source="CVE"/>
		<reference ref_id="CVE-2022-3303" ref_url="https://www.suse.com/security/cve/CVE-2022-3303/" source="CVE"/>
		<reference ref_id="CVE-2022-41218" ref_url="https://www.suse.com/security/cve/CVE-2022-41218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012549.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated.

The following security bugs were fixed:

- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).
- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).
- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).
- CVE-2022-2503: Fixed a vulnerability that allowed root to bypass LoadPin and load untrusted and unverified kernel modules and firmware (bnc#1202677).

The following non-security bugs were fixed:

- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still be possible to do so that the mitigation can still be disabled on Intel who do not use the return thunks but IBRS.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-17"/>
	<updated date="2022-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202677">SUSE bug 1202677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202960">SUSE bug 1202960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203552">SUSE bug 1203552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203769">SUSE bug 1203769</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2503/">CVE-2022-2503 at SUSE</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2503">CVE-2022-2503 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3239/">CVE-2022-3239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3239">CVE-2022-3239 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3303/">CVE-2022-3303 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3303">CVE-2022-3303 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41218/">CVE-2022-41218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41218">CVE-2022-41218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716917" comment="kernel-default-4.4.180-94.177.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716918" comment="kernel-default-base-4.4.180-94.177.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716919" comment="kernel-default-devel-4.4.180-94.177.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716920" comment="kernel-devel-4.4.180-94.177.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716921" comment="kernel-macros-4.4.180-94.177.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716922" comment="kernel-source-4.4.180-94.177.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716923" comment="kernel-syms-4.4.180-94.177.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151074" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1183696" ref_url="https://bugzilla.suse.com/1183696" source="BUGZILLA"/>
		<reference ref_id="1186207" ref_url="https://bugzilla.suse.com/1186207" source="BUGZILLA"/>
		<reference ref_id="1192032" ref_url="https://bugzilla.suse.com/1192032" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192847" ref_url="https://bugzilla.suse.com/1192847" source="BUGZILLA"/>
		<reference ref_id="1192877" ref_url="https://bugzilla.suse.com/1192877" source="BUGZILLA"/>
		<reference ref_id="1192946" ref_url="https://bugzilla.suse.com/1192946" source="BUGZILLA"/>
		<reference ref_id="1193157" ref_url="https://bugzilla.suse.com/1193157" source="BUGZILLA"/>
		<reference ref_id="1193440" ref_url="https://bugzilla.suse.com/1193440" source="BUGZILLA"/>
		<reference ref_id="1193442" ref_url="https://bugzilla.suse.com/1193442" source="BUGZILLA"/>
		<reference ref_id="1193507" ref_url="https://bugzilla.suse.com/1193507" source="BUGZILLA"/>
		<reference ref_id="1193575" ref_url="https://bugzilla.suse.com/1193575" source="BUGZILLA"/>
		<reference ref_id="1193669" ref_url="https://bugzilla.suse.com/1193669" source="BUGZILLA"/>
		<reference ref_id="1193727" ref_url="https://bugzilla.suse.com/1193727" source="BUGZILLA"/>
		<reference ref_id="1193861" ref_url="https://bugzilla.suse.com/1193861" source="BUGZILLA"/>
		<reference ref_id="1193864" ref_url="https://bugzilla.suse.com/1193864" source="BUGZILLA"/>
		<reference ref_id="1193867" ref_url="https://bugzilla.suse.com/1193867" source="BUGZILLA"/>
		<reference ref_id="1194001" ref_url="https://bugzilla.suse.com/1194001" source="BUGZILLA"/>
		<reference ref_id="1194087" ref_url="https://bugzilla.suse.com/1194087" source="BUGZILLA"/>
		<reference ref_id="1194094" ref_url="https://bugzilla.suse.com/1194094" source="BUGZILLA"/>
		<reference ref_id="1194272" ref_url="https://bugzilla.suse.com/1194272" source="BUGZILLA"/>
		<reference ref_id="1194302" ref_url="https://bugzilla.suse.com/1194302" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1194529" ref_url="https://bugzilla.suse.com/1194529" source="BUGZILLA"/>
		<reference ref_id="1194880" ref_url="https://bugzilla.suse.com/1194880" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25020" ref_url="https://www.suse.com/security/cve/CVE-2018-25020/" source="CVE"/>
		<reference ref_id="CVE-2019-0136" ref_url="https://www.suse.com/security/cve/CVE-2019-0136/" source="CVE"/>
		<reference ref_id="CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519/" source="CVE"/>
		<reference ref_id="CVE-2021-0935" ref_url="https://www.suse.com/security/cve/CVE-2021-0935/" source="CVE"/>
		<reference ref_id="CVE-2021-28711" ref_url="https://www.suse.com/security/cve/CVE-2021-28711/" source="CVE"/>
		<reference ref_id="CVE-2021-28712" ref_url="https://www.suse.com/security/cve/CVE-2021-28712/" source="CVE"/>
		<reference ref_id="CVE-2021-28713" ref_url="https://www.suse.com/security/cve/CVE-2021-28713/" source="CVE"/>
		<reference ref_id="CVE-2021-28715" ref_url="https://www.suse.com/security/cve/CVE-2021-28715/" source="CVE"/>
		<reference ref_id="CVE-2021-33098" ref_url="https://www.suse.com/security/cve/CVE-2021-33098/" source="CVE"/>
		<reference ref_id="CVE-2021-3564" ref_url="https://www.suse.com/security/cve/CVE-2021-3564/" source="CVE"/>
		<reference ref_id="CVE-2021-39648" ref_url="https://www.suse.com/security/cve/CVE-2021-39648/" source="CVE"/>
		<reference ref_id="CVE-2021-39657" ref_url="https://www.suse.com/security/cve/CVE-2021-39657/" source="CVE"/>
		<reference ref_id="CVE-2021-4002" ref_url="https://www.suse.com/security/cve/CVE-2021-4002/" source="CVE"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4149" ref_url="https://www.suse.com/security/cve/CVE-2021-4149/" source="CVE"/>
		<reference ref_id="CVE-2021-4155" ref_url="https://www.suse.com/security/cve/CVE-2021-4155/" source="CVE"/>
		<reference ref_id="CVE-2021-4197" ref_url="https://www.suse.com/security/cve/CVE-2021-4197/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2021-45485" ref_url="https://www.suse.com/security/cve/CVE-2021-45485/" source="CVE"/>
		<reference ref_id="CVE-2021-45486" ref_url="https://www.suse.com/security/cve/CVE-2021-45486/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 LTSS kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2018-25020: Fixed an overflow in the BPF subsystem due to a mishandling of a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions. This affects kernel/bpf/core.c and net/core/filter.c (bnc#1193575).
- CVE-2019-0136: Fixed insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver that may have allowed an unauthenticated user to potentially enable denial of service via adjacent access (bnc#1193157).
- CVE-2020-35519: Fixed out-of-bounds memory access in x25_bind in net/x25/af_x25.c. A bounds check failure allowed a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information (bnc#1183696).
- CVE-2021-0935: Fixed possible out of bounds write in ip6_xmit of ip6_output.c due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192032).
- CVE-2021-28711: Fixed issue with xen/blkfront to harden blkfront against event channel storms (XSA-391) (bsc#1193440).
- CVE-2021-28712: Fixed issue with xen/netfront to harden netfront against event channel storms (XSA-391) (bsc#1193440).
- CVE-2021-28713: Fixed issue with xen/console to harden hvc_xen against event channel storms (XSA-391) (bsc#1193440).
- CVE-2021-28715: Fixed issue with xen/netback to do not queue unlimited number of packages (XSA-392) (bsc#1193442).
- CVE-2021-33098: Fixed improper input validation in the Intel(R) Ethernet ixgbe driver that may have allowed an authenticated user to potentially cause denial of service via local access (bnc#1192877).
- CVE-2021-3564: Fixed double-free memory corruption in the Linux kernel HCI device initialization subsystem that could have been used by attaching malicious HCI TTY Bluetooth devices. A local user could use this flaw to crash the system (bnc#1186207).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-4002: Fixed incorrect TLBs flush in hugetlbfs after huge_pmd_unshare (bsc#1192946).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1193727).
- CVE-2021-4149: Fixed btrfs unlock newly allocated extent buffer after error (bsc#1194001).
- CVE-2021-4155: Fixed XFS map issue when unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate (bsc#1194272).
- CVE-2021-4197: Use cgroup open-time credentials for process migraton perm checks (bsc#1194302).
- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194529).
- CVE-2021-43976: Fixed insufficient access control in drivers/net/wireless/marvell/mwifiex/usb.c that allowed an attacker who connect a crafted USB device to cause denial of service (bnc#1192847).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2021-45485: Fixed information leak in the IPv6 implementation in net/ipv6/output_core.c (bnc#1194094).
- CVE-2021-45486: Fixed information leak inside the IPv4 implementation caused by very small hash table (bnc#1194087).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).


The following non-security bugs were fixed:

- fget: clarify and improve __fget_files() implementation (bsc#1193727).
- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (bsc#1193507).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193507).
- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- memstick: rtsx_usb_ms: fix UAF
- moxart: fix potential use-after-free on remove path (bsc1194516).
- net/x25: fix a race in x25_bind() (networking-stable-19_03_15).
- net: mana: Add RX fencing (bsc#1193507).
- net: mana: Allow setting the number of queues while the NIC is down (bsc#1193507).
- net: mana: Fix spelling mistake 'calledd' -&gt; 'called' (bsc#1193507).
- net: mana: Fix the netdev_err()'s vPort argument in mana_init_port() (bsc#1193507).
- net: mana: Improve the HWC error handling (bsc#1193507).
- net: mana: Support hibernation and kexec (bsc#1193507).
- net: mana: Use kcalloc() instead of kzalloc() (bsc#1193507).
- recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267).
- recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc#1192267).
- ring-buffer: Protect ring_buffer_reset() from reentrancy (bsc#1179960).
- tty: hvc: replace BUG_ON() with negative return value (git-fixes).
- xen-netfront: do not assume sk_buff_head list is empty in error handling (git-fixes).
- xen-netfront: do not use ~0U as error return value for xennet_fill_frags() (git-fixes).
- xen/blkfront: do not take local copy of a request from the ring page (git-fixes).
- xen/blkfront: do not trust the backend response data blindly (git-fixes).
- xen/blkfront: read response from backend only once (git-fixes).
- xen/netfront: disentangle tx_skb_freelist (git-fixes).
- xen/netfront: do not bug in case of too many frags (bnc#1012382).
- xen/netfront: do not cache skb_shinfo() (bnc#1012382).
- xen/netfront: do not read data from request on the ring page (git-fixes).
- xen/netfront: do not trust the backend response data blindly (git-fixes).
- xen/netfront: read response from backend only once (git-fixes).
- xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-10"/>
	<updated date="2022-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183696">SUSE bug 1183696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186207">SUSE bug 1186207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192032">SUSE bug 1192032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192847">SUSE bug 1192847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192877">SUSE bug 1192877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192946">SUSE bug 1192946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193157">SUSE bug 1193157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193440">SUSE bug 1193440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193442">SUSE bug 1193442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193507">SUSE bug 1193507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193575">SUSE bug 1193575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193669">SUSE bug 1193669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193727">SUSE bug 1193727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193861">SUSE bug 1193861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193864">SUSE bug 1193864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194001">SUSE bug 1194001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194087">SUSE bug 1194087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194094">SUSE bug 1194094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194272">SUSE bug 1194272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194302">SUSE bug 1194302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194529">SUSE bug 1194529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194880">SUSE bug 1194880</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25020/">CVE-2018-25020 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25020">CVE-2018-25020 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0136/">CVE-2019-0136 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0136">CVE-2019-0136 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35519">CVE-2020-35519 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0935/">CVE-2021-0935 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0935">CVE-2021-0935 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28711/">CVE-2021-28711 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28711">CVE-2021-28711 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28712/">CVE-2021-28712 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28712">CVE-2021-28712 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28713/">CVE-2021-28713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28713">CVE-2021-28713 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28715/">CVE-2021-28715 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28715">CVE-2021-28715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33098/">CVE-2021-33098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33098">CVE-2021-33098 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3564/">CVE-2021-3564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3564">CVE-2021-3564 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39648/">CVE-2021-39648 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39648">CVE-2021-39648 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39657/">CVE-2021-39657 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39657">CVE-2021-39657 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4002/">CVE-2021-4002 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4002">CVE-2021-4002 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">CVE-2021-4083 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4149/">CVE-2021-4149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4149">CVE-2021-4149 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4155/">CVE-2021-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4155">CVE-2021-4155 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4197/">CVE-2021-4197 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4197">CVE-2021-4197 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4202">CVE-2021-4202 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43976">CVE-2021-43976 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45095">CVE-2021-45095 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45485/">CVE-2021-45485 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45485">CVE-2021-45485 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45486/">CVE-2021-45486 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45486">CVE-2021-45486 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666922" comment="kernel-default-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666923" comment="kernel-default-base-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666924" comment="kernel-default-devel-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666898" comment="kernel-devel-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666899" comment="kernel-macros-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666900" comment="kernel-source-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666925" comment="kernel-syms-4.4.180-94.153.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151075" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1201723" ref_url="https://bugzilla.suse.com/1201723" source="BUGZILLA"/>
		<reference ref_id="1201971" ref_url="https://bugzilla.suse.com/1201971" source="BUGZILLA"/>
		<reference ref_id="1202026" ref_url="https://bugzilla.suse.com/1202026" source="BUGZILLA"/>
		<reference ref_id="1202466" ref_url="https://bugzilla.suse.com/1202466" source="BUGZILLA"/>
		<reference ref_id="1202467" ref_url="https://bugzilla.suse.com/1202467" source="BUGZILLA"/>
		<reference ref_id="1202468" ref_url="https://bugzilla.suse.com/1202468" source="BUGZILLA"/>
		<reference ref_id="1202968" ref_url="https://bugzilla.suse.com/1202968" source="BUGZILLA"/>
		<reference ref_id="1202971" ref_url="https://bugzilla.suse.com/1202971" source="BUGZILLA"/>
		<reference ref_id="1202973" ref_url="https://bugzilla.suse.com/1202973" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0561" ref_url="https://www.suse.com/security/cve/CVE-2022-0561/" source="CVE"/>
		<reference ref_id="CVE-2022-2519" ref_url="https://www.suse.com/security/cve/CVE-2022-2519/" source="CVE"/>
		<reference ref_id="CVE-2022-2520" ref_url="https://www.suse.com/security/cve/CVE-2022-2520/" source="CVE"/>
		<reference ref_id="CVE-2022-2521" ref_url="https://www.suse.com/security/cve/CVE-2022-2521/" source="CVE"/>
		<reference ref_id="CVE-2022-2867" ref_url="https://www.suse.com/security/cve/CVE-2022-2867/" source="CVE"/>
		<reference ref_id="CVE-2022-2868" ref_url="https://www.suse.com/security/cve/CVE-2022-2868/" source="CVE"/>
		<reference ref_id="CVE-2022-2869" ref_url="https://www.suse.com/security/cve/CVE-2022-2869/" source="CVE"/>
		<reference ref_id="CVE-2022-34266" ref_url="https://www.suse.com/security/cve/CVE-2022-34266/" source="CVE"/>
		<reference ref_id="CVE-2022-34526" ref_url="https://www.suse.com/security/cve/CVE-2022-34526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012592.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2022-2519: Fixed a double free in rotateImage() (bsc#1202968).
- CVE-2022-2520: Fixed a assertion failure in rotateImage() (bsc#1202973).
- CVE-2022-2521: Fixed invalid free in TIFFClose() (bsc#1202971).
- CVE-2022-2867: Fixed out of bounds read and write in tiffcrop.c (bsc#1202466).
- CVE-2022-2868: Fixed out of bounds read in reverseSamples16bits() (bsc#1202467).
- CVE-2022-2869: Fixed out of bounds read and write in extractContigSamples8bits() (bsc#1202468).
- CVE-2022-34526: Fixed stack overflow in the _TIFFVGetField function of Tiffsplit (bsc#1202026).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-20"/>
	<updated date="2022-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201723">SUSE bug 1201723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201971">SUSE bug 1201971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202026">SUSE bug 1202026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202466">SUSE bug 1202466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202467">SUSE bug 1202467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202468">SUSE bug 1202468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202968">SUSE bug 1202968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202971">SUSE bug 1202971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202973">SUSE bug 1202973</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0561/">CVE-2022-0561 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0561">CVE-2022-0561 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2519/">CVE-2022-2519 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2519">CVE-2022-2519 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2520/">CVE-2022-2520 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2520">CVE-2022-2520 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2521/">CVE-2022-2521 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2521">CVE-2022-2521 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2867/">CVE-2022-2867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2867">CVE-2022-2867 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2868/">CVE-2022-2868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2868">CVE-2022-2868 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2869/">CVE-2022-2869 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2869">CVE-2022-2869 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-34266/">CVE-2022-34266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34266">CVE-2022-34266 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34526/">CVE-2022-34526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34526">CVE-2022-34526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009718791" comment="libtiff5-4.0.9-44.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718789" comment="libtiff5-32bit-4.0.9-44.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718792" comment="tiff-4.0.9-44.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151076" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1204357" ref_url="https://bugzilla.suse.com/1204357" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3515" ref_url="https://www.suse.com/security/cve/CVE-2022-3515/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012596.html" source="SUSE-SU"/>
		<description>
This update for libksba fixes the following issues:

  - CVE-2022-3515: Fixed a possible overflow in the TLV parser (bsc#1204357).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-21"/>
	<updated date="2022-10-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1204357">SUSE bug 1204357</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3515/">CVE-2022-3515 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3515">CVE-2022-3515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718649" comment="libksba8-1.3.0-24.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151077" version="1" class="patch">
	<metadata>
		<title>Security update for multipath-tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1118495" ref_url="https://bugzilla.suse.com/1118495" source="BUGZILLA"/>
		<reference ref_id="1125145" ref_url="https://bugzilla.suse.com/1125145" source="BUGZILLA"/>
		<reference ref_id="1125507" ref_url="https://bugzilla.suse.com/1125507" source="BUGZILLA"/>
		<reference ref_id="1131789" ref_url="https://bugzilla.suse.com/1131789" source="BUGZILLA"/>
		<reference ref_id="1134648" ref_url="https://bugzilla.suse.com/1134648" source="BUGZILLA"/>
		<reference ref_id="1139369" ref_url="https://bugzilla.suse.com/1139369" source="BUGZILLA"/>
		<reference ref_id="1202616" ref_url="https://bugzilla.suse.com/1202616" source="BUGZILLA"/>
		<reference ref_id="1202739" ref_url="https://bugzilla.suse.com/1202739" source="BUGZILLA"/>
		<reference ref_id="1204325" ref_url="https://bugzilla.suse.com/1204325" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41974" ref_url="https://www.suse.com/security/cve/CVE-2022-41974/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012646.html" source="SUSE-SU"/>
		<description>
This update for multipath-tools fixes the following issues:

- CVE-2022-41974: Fixed an authorization bypass issue in multipathd. (bsc#1202739)
- Avoid linking to libreadline to avoid licensing issue (bsc#1202616)
- Avoid device IO in 'multipath -u' (bsc#1125145, bsc#1131789)
- mpathpersist: optimize for setups with many LUNs (bsc#1134648)
- mpathpersist: add option -f/--batch-file (bsc#1134648)
- libmultipath: get_prio(): really don't reset prio for  inaccessible paths (bsc#1118495)
- Upstream bug fixes from dm-devel (bsc#1139369):
  multipath: call store_pathinfo with DI_BLACKLIST
- hwtable: add Lenovo DE series (bsc#1125507)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-24"/>
	<updated date="2022-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118495">SUSE bug 1118495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125145">SUSE bug 1125145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125507">SUSE bug 1125507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131789">SUSE bug 1131789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134648">SUSE bug 1134648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139369">SUSE bug 1139369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202616">SUSE bug 1202616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202739">SUSE bug 1202739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204325">SUSE bug 1204325</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41974/">CVE-2022-41974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41974">CVE-2022-41974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009720069" comment="kpartx-0.7.1+125+suse.c18e287-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720070" comment="multipath-tools-0.7.1+125+suse.c18e287-2.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151078" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1201978" ref_url="https://bugzilla.suse.com/1201978" source="BUGZILLA"/>
		<reference ref_id="1204366" ref_url="https://bugzilla.suse.com/1204366" source="BUGZILLA"/>
		<reference ref_id="1204367" ref_url="https://bugzilla.suse.com/1204367" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3709" ref_url="https://www.suse.com/security/cve/CVE-2016-3709/" source="CVE"/>
		<reference ref_id="CVE-2022-40303" ref_url="https://www.suse.com/security/cve/CVE-2022-40303/" source="CVE"/>
		<reference ref_id="CVE-2022-40304" ref_url="https://www.suse.com/security/cve/CVE-2022-40304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012663.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

  - CVE-2016-3709: Fixed possible XSS vulnerability (bsc#1201978).    
  - CVE-2022-40303: Fixed integer overflows with XML_PARSE_HUGE (bsc#1204366).    
  - CVE-2022-40304: Fixed dict corruption caused by entity reference cycles (bsc#1204367).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-25"/>
	<updated date="2022-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201978">SUSE bug 1201978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204366">SUSE bug 1204366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204367">SUSE bug 1204367</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-3709/">CVE-2016-3709 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3709">CVE-2016-3709 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40303/">CVE-2022-40303 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40303">CVE-2022-40303 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40304/">CVE-2022-40304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40304">CVE-2022-40304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009719691" comment="libxml2-2-2.9.4-46.59.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719640" comment="libxml2-2-32bit-2.9.4-46.59.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719144" comment="libxml2-doc-2.9.4-46.59.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719692" comment="libxml2-tools-2.9.4-46.59.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719693" comment="python-libxml2-2.9.4-46.59.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151079" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1013885" ref_url="https://bugzilla.suse.com/1013885" source="BUGZILLA"/>
		<reference ref_id="1193237" ref_url="https://bugzilla.suse.com/1193237" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9803" ref_url="https://www.suse.com/security/cve/CVE-2016-9803/" source="CVE"/>
		<reference ref_id="CVE-2019-8921" ref_url="https://www.suse.com/security/cve/CVE-2019-8921/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012661.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

  - CVE-2019-8921: Fixed heap-based buffer overflow via crafted request (bsc#1193237).
  - CVE-2016-9803: Fixed memory leak (bsc#1013885).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-25"/>
	<updated date="2022-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013885">SUSE bug 1013885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193237">SUSE bug 1193237</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9803/">CVE-2016-9803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9803">CVE-2016-9803 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8921/">CVE-2019-8921 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8921">CVE-2019-8921 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009719807" comment="bluez-5.13-5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719808" comment="libbluetooth3-5.13-5.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151080" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1204421" ref_url="https://bugzilla.suse.com/1204421" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42927" ref_url="https://www.suse.com/security/cve/CVE-2022-42927/" source="CVE"/>
		<reference ref_id="CVE-2022-42928" ref_url="https://www.suse.com/security/cve/CVE-2022-42928/" source="CVE"/>
		<reference ref_id="CVE-2022-42929" ref_url="https://www.suse.com/security/cve/CVE-2022-42929/" source="CVE"/>
		<reference ref_id="CVE-2022-42932" ref_url="https://www.suse.com/security/cve/CVE-2022-42932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012664.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

  Updated to version 102.4.0 ESR (bsc#1204421):

  - CVE-2022-42927: Fixed same-origin policy violation that could have leaked cross-origin URLs.
  - CVE-2022-42928: Fixed memory Corruption in JS Engine.
  - CVE-2022-42929: Fixed denial of Service via window.print.
  - CVE-2022-42932: Fixed memory safety bugs.

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-25"/>
	<updated date="2022-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204421">SUSE bug 1204421</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42927/">CVE-2022-42927 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42927">CVE-2022-42927 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42928/">CVE-2022-42928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42928">CVE-2022-42928 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42929/">CVE-2022-42929 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42929">CVE-2022-42929 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42932/">CVE-2022-42932 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42932">CVE-2022-42932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009719758" comment="MozillaFirefox-102.4.0-112.136.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719759" comment="MozillaFirefox-devel-102.4.0-112.136.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719760" comment="MozillaFirefox-translations-common-102.4.0-112.136.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151081" version="1" class="patch">
	<metadata>
		<title>Security update for telnet (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1203759" ref_url="https://bugzilla.suse.com/1203759" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-39028" ref_url="https://www.suse.com/security/cve/CVE-2022-39028/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012695.html" source="SUSE-SU"/>
		<description>
This update for telnet fixes the following issues:

  - CVE-2022-39028: Fixed NULL pointer dereference in telnetd (bsc#1203759).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-26"/>
	<updated date="2022-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203759">SUSE bug 1203759</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39028/">CVE-2022-39028 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39028">CVE-2022-39028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009720752" comment="telnet-1.2-167.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720753" comment="telnet-server-1.2-167.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151082" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1196338" ref_url="https://bugzilla.suse.com/1196338" source="BUGZILLA"/>
		<reference ref_id="1198903" ref_url="https://bugzilla.suse.com/1198903" source="BUGZILLA"/>
		<reference ref_id="1200725" ref_url="https://bugzilla.suse.com/1200725" source="BUGZILLA"/>
		<reference ref_id="1201535" ref_url="https://bugzilla.suse.com/1201535" source="BUGZILLA"/>
		<reference ref_id="1201539" ref_url="https://bugzilla.suse.com/1201539" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<reference ref_id="CVE-2022-31097" ref_url="https://www.suse.com/security/cve/CVE-2022-31097/" source="CVE"/>
		<reference ref_id="CVE-2022-31107" ref_url="https://www.suse.com/security/cve/CVE-2022-31107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012709.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

golang-github-lusitaniae-apache_exporter:

- Update to upstream release 0.11.0 (jsc#SLE-24791)
  * Add TLS support
  * Switch to logger, please check --log.level and --log.format flags
- Update to version 0.10.1
  * Bugfix: Reset ProxyBalancer metrics on each scrape to remove stale data
- Update to version 0.10.0
  * Add Apache Proxy and other metrics
- Update to version 0.8.0
  * Change commandline flags
  * Add metrics: Apache version, request duration total
- Adapted to build on Enterprise Linux 8
- Require building with Go 1.15
- Add %license macro for LICENSE file 

golang-github-prometheus-alertmanager:

- Do not include sources (bsc#1200725)

golang-github-prometheus-node_exporter:

- CVE-2022-21698: Denial of service using InstrumentHandlerCounter. (bsc#1196338, jsc#SLE-24243, jsc#SUMA-114)

grafana:

- Update to version 8.3.10
  + Security:
    * CVE-2022-31097: Cross Site Scripting vulnerability in the Unified Alerting (bsc#1201535)
    * CVE-2022-31107: OAuth account takeover vulnerability (bsc#1201539)
- Update to version 8.3.9
  + Bug fixes:
    * Geomap: Display legend
    * Prometheus: Fix timestamp truncation
- Update to version 8.3.7
  + Bug fix:
    * Provisioning: Ensure that the default value for orgID is set when provisioning datasources to be deleted.
- Update to version 8.3.6
  + Features and enhancements:
    * Cloud Monitoring: Reduce request size when listing labels.
    * Explore: Show scalar data result in a table instead of graph.
    * Snapshots: Updates the default external snapshot server URL.
    * Table: Makes footer not overlap table content.
    * Tempo: Add request histogram to service graph datalink.
    * Tempo: Add time range to tempo search query behind a feature flag.
    * Tempo: Auto-clear results when changing query type.
    * Tempo: Display start time in search results as relative time.
    * CloudMonitoring: Fix resource labels in query editor.
    * Cursor sync: Apply the settings without saving the dashboard.
    * LibraryPanels: Fix for Error while cleaning library panels.
    * Logs Panel: Fix timestamp parsing for string dates without timezone.
    * Prometheus: Fix some of the alerting queries that use reduce/math operation.
    * TablePanel: Fix ad-hoc variables not working on default datasources.
    * Text Panel: Fix alignment of elements.
    * Variables: Fix for constant variables in self referencing links.
- Update to version 8.3.5 (jsc#SLE-23439, jsc#SLE-23422, jsc#SLE-24565)

kiwi-desc-saltboot:

- Update to version 0.1.1661440542.6cbe0da
  * Use standard susemanager.conf
  * Use salt bundle
  * Add support fo VirtIO disks

mgr-daemon:

- Version 4.3.6-1
  * Update translation strings

spacecmd:

- Version 4.3.15-1
  * Process date values in spacecmd api calls (bsc#1198903)

spacewalk-client-tools:

- Version 4.3.12-1
  * Update translation strings

uyuni-common-libs:

- Version 4.3.6-1
  * Do not allow creating path if nonexistent user or group in fileutils.

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-26"/>
	<updated date="2022-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196338">SUSE bug 1196338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198903">SUSE bug 1198903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200725">SUSE bug 1200725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201535">SUSE bug 1201535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201539">SUSE bug 1201539</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21698">CVE-2022-21698 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-31097/">CVE-2022-31097 at SUSE</cve>
	<cve impact="high" cvss3="8.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31097">CVE-2022-31097 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31107/">CVE-2022-31107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31107">CVE-2022-31107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717032" comment="golang-github-prometheus-node_exporter-1.3.0-1.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151083" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1204383" ref_url="https://bugzilla.suse.com/1204383" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32221" ref_url="https://www.suse.com/security/cve/CVE-2022-32221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012697.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

  - CVE-2022-32221: Fixed POST following PUT confusion (bsc#1204383).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-26"/>
	<updated date="2022-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204383">SUSE bug 1204383</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32221/">CVE-2022-32221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32221">CVE-2022-32221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721649" comment="curl-7.37.0-37.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721650" comment="libcurl4-7.37.0-37.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721651" comment="libcurl4-32bit-7.37.0-37.85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151084" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1200800" ref_url="https://bugzilla.suse.com/1200800" source="BUGZILLA"/>
		<reference ref_id="1201680" ref_url="https://bugzilla.suse.com/1201680" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46828" ref_url="https://www.suse.com/security/cve/CVE-2021-46828/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012722.html" source="SUSE-SU"/>
		<description>
This update for libtirpc fixes the following issues:

- CVE-2021-46828: Fixed denial of service vulnerability with lots of connections (bsc#1201680).

- Exclude ipv6 addresses in client protocol version 2 code (bsc#1200800)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2022-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200800">SUSE bug 1200800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201680">SUSE bug 1201680</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46828/">CVE-2021-46828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46828">CVE-2021-46828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716290" comment="libtirpc-netconfig-1.0.1-17.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716291" comment="libtirpc3-1.0.1-17.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716289" comment="libtirpc3-32bit-1.0.1-17.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151085" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1149789" ref_url="https://bugzilla.suse.com/1149789" source="BUGZILLA"/>
		<reference ref_id="1179821" ref_url="https://bugzilla.suse.com/1179821" source="BUGZILLA"/>
		<reference ref_id="1180043" ref_url="https://bugzilla.suse.com/1180043" source="BUGZILLA"/>
		<reference ref_id="1180044" ref_url="https://bugzilla.suse.com/1180044" source="BUGZILLA"/>
		<reference ref_id="1180046" ref_url="https://bugzilla.suse.com/1180046" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-21010" ref_url="https://www.suse.com/security/cve/CVE-2018-21010/" source="CVE"/>
		<reference ref_id="CVE-2020-27824" ref_url="https://www.suse.com/security/cve/CVE-2020-27824/" source="CVE"/>
		<reference ref_id="CVE-2020-27842" ref_url="https://www.suse.com/security/cve/CVE-2020-27842/" source="CVE"/>
		<reference ref_id="CVE-2020-27843" ref_url="https://www.suse.com/security/cve/CVE-2020-27843/" source="CVE"/>
		<reference ref_id="CVE-2020-27845" ref_url="https://www.suse.com/security/cve/CVE-2020-27845/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012730.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes the following issues:

  - CVE-2018-21010: Fixed heap buffer overflow in color_apply_icc_profile in bin/common/color.c (bsc#1149789).
  - CVE-2020-27824: Fixed OOB read in opj_dwt_calc_explicit_stepsizes() (bsc#1179821).
  - CVE-2020-27842: Fixed null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c (bsc#1180043).
  - CVE-2020-27843: Fixed out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c (bsc#1180044).
  - CVE-2020-27845: Fixed heap-based buffer over-read in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c (bsc#1180046).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2022-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149789">SUSE bug 1149789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179821">SUSE bug 1179821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180043">SUSE bug 1180043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180044">SUSE bug 1180044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180046">SUSE bug 1180046</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-21010/">CVE-2018-21010 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21010">CVE-2018-21010 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27824/">CVE-2020-27824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27824">CVE-2020-27824 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27842/">CVE-2020-27842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27842">CVE-2020-27842 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27843/">CVE-2020-27843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27843">CVE-2020-27843 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27845/">CVE-2020-27845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27845">CVE-2020-27845 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721408" comment="libopenjp2-7-2.1.0-4.18.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151086" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1087072" ref_url="https://bugzilla.suse.com/1087072" source="BUGZILLA"/>
		<reference ref_id="1204111" ref_url="https://bugzilla.suse.com/1204111" source="BUGZILLA"/>
		<reference ref_id="1204112" ref_url="https://bugzilla.suse.com/1204112" source="BUGZILLA"/>
		<reference ref_id="1204113" ref_url="https://bugzilla.suse.com/1204113" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42010" ref_url="https://www.suse.com/security/cve/CVE-2022-42010/" source="CVE"/>
		<reference ref_id="CVE-2022-42011" ref_url="https://www.suse.com/security/cve/CVE-2022-42011/" source="CVE"/>
		<reference ref_id="CVE-2022-42012" ref_url="https://www.suse.com/security/cve/CVE-2022-42012/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012728.html" source="SUSE-SU"/>
		<description>
This update for dbus-1 fixes the following issues:

  - CVE-2022-42010: Fixed potential crash that could be triggered by an invalid signature (bsc#1204111).
  - CVE-2022-42011: Fixed an out of bounds read caused by a fixed length array (bsc#1204112).
  - CVE-2022-42012: Fixed a use-after-free that could be trigged by a message in non-native endianness with out-of-band Unix file descriptor (bsc#1204113).

  Bugfixes:

  - Disable asserts (bsc#1087072).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2022-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087072">SUSE bug 1087072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204111">SUSE bug 1204111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204112">SUSE bug 1204112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204113">SUSE bug 1204113</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-42010/">CVE-2022-42010 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42010">CVE-2022-42010 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-42011/">CVE-2022-42011 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42011">CVE-2022-42011 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-42012/">CVE-2022-42012 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42012">CVE-2022-42012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009717584" comment="dbus-1-1.8.22-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717585" comment="dbus-1-x11-1.8.22-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717586" comment="libdbus-1-3-1.8.22-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717583" comment="libdbus-1-3-32bit-1.8.22-29.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151087" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1204690" ref_url="https://bugzilla.suse.com/1204690" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46848" ref_url="https://www.suse.com/security/cve/CVE-2021-46848/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012773.html" source="SUSE-SU"/>
		<description>
This update for libtasn1 fixes the following issues:

- CVE-2021-46848: Fixed off-by-one array size check that affects asn1_encode_simple_der (bsc#1204690). 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-31"/>
	<updated date="2022-10-31"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1204690">SUSE bug 1204690</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46848/">CVE-2021-46848 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46848">CVE-2021-46848 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721409" comment="libtasn1-4.9-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721410" comment="libtasn1-6-4.9-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721404" comment="libtasn1-6-32bit-4.9-3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151088" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1204412" ref_url="https://bugzilla.suse.com/1204412" source="BUGZILLA"/>
		<reference ref_id="1204416" ref_url="https://bugzilla.suse.com/1204416" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3550" ref_url="https://www.suse.com/security/cve/CVE-2022-3550/" source="CVE"/>
		<reference ref_id="CVE-2022-3551" ref_url="https://www.suse.com/security/cve/CVE-2022-3551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012790.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

  - CVE-2022-3550: Fixed out of bounds read/write in _GetCountedString() (bsc#1204412).
  - CVE-2022-3551: Fixed various leaks of the return value of GetComponentSpec() (bsc#1204416).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-01"/>
	<updated date="2022-11-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204412">SUSE bug 1204412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204416">SUSE bug 1204416</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3550/">CVE-2022-3550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3550">CVE-2022-3550 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3551/">CVE-2022-3551 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3551">CVE-2022-3551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009719030" comment="xorg-x11-server-7.6_1.18.3-76.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719031" comment="xorg-x11-server-extra-7.6_1.18.3-76.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151089" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1204708" ref_url="https://bugzilla.suse.com/1204708" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-43680" ref_url="https://www.suse.com/security/cve/CVE-2022-43680/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012811.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

  - CVE-2022-43680: Fixed use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate (bsc#1204708).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-04"/>
	<updated date="2022-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204708">SUSE bug 1204708</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43680/">CVE-2022-43680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43680">CVE-2022-43680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721928" comment="expat-2.1.0-21.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721929" comment="libexpat1-2.1.0-21.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721927" comment="libexpat1-32bit-2.1.0-21.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151090" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1202624" ref_url="https://bugzilla.suse.com/1202624" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28861" ref_url="https://www.suse.com/security/cve/CVE-2021-28861/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026107.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2021-28861: Fixed an open redirection vulnerability in the HTTP server when an URI path starts with // BaseHTTPServer (bsc#1202624).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-10"/>
	<updated date="2022-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202624">SUSE bug 1202624</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28861/">CVE-2021-28861 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28861">CVE-2021-28861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009724304" comment="libpython2_7-1_0-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724305" comment="libpython2_7-1_0-32bit-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724306" comment="python-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724307" comment="python-32bit-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724308" comment="python-base-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724309" comment="python-base-32bit-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724310" comment="python-curses-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724311" comment="python-demo-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724318" comment="python-devel-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724312" comment="python-doc-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724313" comment="python-doc-pdf-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724314" comment="python-gdbm-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724315" comment="python-idle-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724316" comment="python-tk-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724317" comment="python-xml-2.7.18-28.90.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151091" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1204482" ref_url="https://bugzilla.suse.com/1204482" source="BUGZILLA"/>
		<reference ref_id="1204485" ref_url="https://bugzilla.suse.com/1204485" source="BUGZILLA"/>
		<reference ref_id="1204487" ref_url="https://bugzilla.suse.com/1204487" source="BUGZILLA"/>
		<reference ref_id="1204488" ref_url="https://bugzilla.suse.com/1204488" source="BUGZILLA"/>
		<reference ref_id="1204489" ref_url="https://bugzilla.suse.com/1204489" source="BUGZILLA"/>
		<reference ref_id="1204490" ref_url="https://bugzilla.suse.com/1204490" source="BUGZILLA"/>
		<reference ref_id="1204494" ref_url="https://bugzilla.suse.com/1204494" source="BUGZILLA"/>
		<reference ref_id="1204496" ref_url="https://bugzilla.suse.com/1204496" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42309" ref_url="https://www.suse.com/security/cve/CVE-2022-42309/" source="CVE"/>
		<reference ref_id="CVE-2022-42310" ref_url="https://www.suse.com/security/cve/CVE-2022-42310/" source="CVE"/>
		<reference ref_id="CVE-2022-42311" ref_url="https://www.suse.com/security/cve/CVE-2022-42311/" source="CVE"/>
		<reference ref_id="CVE-2022-42312" ref_url="https://www.suse.com/security/cve/CVE-2022-42312/" source="CVE"/>
		<reference ref_id="CVE-2022-42313" ref_url="https://www.suse.com/security/cve/CVE-2022-42313/" source="CVE"/>
		<reference ref_id="CVE-2022-42314" ref_url="https://www.suse.com/security/cve/CVE-2022-42314/" source="CVE"/>
		<reference ref_id="CVE-2022-42315" ref_url="https://www.suse.com/security/cve/CVE-2022-42315/" source="CVE"/>
		<reference ref_id="CVE-2022-42316" ref_url="https://www.suse.com/security/cve/CVE-2022-42316/" source="CVE"/>
		<reference ref_id="CVE-2022-42317" ref_url="https://www.suse.com/security/cve/CVE-2022-42317/" source="CVE"/>
		<reference ref_id="CVE-2022-42318" ref_url="https://www.suse.com/security/cve/CVE-2022-42318/" source="CVE"/>
		<reference ref_id="CVE-2022-42319" ref_url="https://www.suse.com/security/cve/CVE-2022-42319/" source="CVE"/>
		<reference ref_id="CVE-2022-42320" ref_url="https://www.suse.com/security/cve/CVE-2022-42320/" source="CVE"/>
		<reference ref_id="CVE-2022-42321" ref_url="https://www.suse.com/security/cve/CVE-2022-42321/" source="CVE"/>
		<reference ref_id="CVE-2022-42322" ref_url="https://www.suse.com/security/cve/CVE-2022-42322/" source="CVE"/>
		<reference ref_id="CVE-2022-42323" ref_url="https://www.suse.com/security/cve/CVE-2022-42323/" source="CVE"/>
		<reference ref_id="CVE-2022-42325" ref_url="https://www.suse.com/security/cve/CVE-2022-42325/" source="CVE"/>
		<reference ref_id="CVE-2022-42326" ref_url="https://www.suse.com/security/cve/CVE-2022-42326/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012903.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-42311, CVE-2022-42312, CVE-2022-42313, CVE-2022-42314, CVE-2022-42315, CVE-2022-42316, CVE-2022-42317, CVE-2022-42318: xen: Xenstore: Guests can let xenstored run out of memory (bsc#1204482)
- CVE-2022-42309: xen: Xenstore: Guests can crash xenstored (bsc#1204485)
- CVE-2022-42310: xen: Xenstore: Guests can create orphaned Xenstore nodes (bsc#1204487)
- CVE-2022-42319: xen: Xenstore: Guests can cause Xenstore to not free temporary memory (bsc#1204488)
- CVE-2022-42320: xen: Xenstore: Guests can get access to Xenstore nodes of deleted domains (bsc#1204489)
- CVE-2022-42321: xen: Xenstore: Guests can crash xenstored via exhausting the stack (bsc#1204490)
- CVE-2022-42322,CVE-2022-42323: xen: Xenstore: cooperating guests can create arbitrary numbers of nodes (bsc#1204494)
- CVE-2022-42325,CVE-2022-42326: xen: Xenstore: Guests can create arbitrary number of nodes via transactions (bsc#1204496)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-11"/>
	<updated date="2022-11-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204482">SUSE bug 1204482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204485">SUSE bug 1204485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204487">SUSE bug 1204487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204488">SUSE bug 1204488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204489">SUSE bug 1204489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204490">SUSE bug 1204490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204494">SUSE bug 1204494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204496">SUSE bug 1204496</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42309/">CVE-2022-42309 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42309">CVE-2022-42309 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42310/">CVE-2022-42310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42310">CVE-2022-42310 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42311/">CVE-2022-42311 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42311">CVE-2022-42311 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42312/">CVE-2022-42312 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42312">CVE-2022-42312 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42313/">CVE-2022-42313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42313">CVE-2022-42313 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42314/">CVE-2022-42314 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42314">CVE-2022-42314 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42315/">CVE-2022-42315 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42315">CVE-2022-42315 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42316/">CVE-2022-42316 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42316">CVE-2022-42316 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42317/">CVE-2022-42317 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42317">CVE-2022-42317 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42318/">CVE-2022-42318 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42318">CVE-2022-42318 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42319/">CVE-2022-42319 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42319">CVE-2022-42319 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42320/">CVE-2022-42320 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42320">CVE-2022-42320 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42321/">CVE-2022-42321 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42321">CVE-2022-42321 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42322/">CVE-2022-42322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42322">CVE-2022-42322 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42323/">CVE-2022-42323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42323">CVE-2022-42323 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42325/">CVE-2022-42325 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42325">CVE-2022-42325 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42326/">CVE-2022-42326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42326">CVE-2022-42326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009724758" comment="xen-4.9.4_34-3.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724759" comment="xen-doc-html-4.9.4_34-3.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724760" comment="xen-libs-4.9.4_34-3.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724761" comment="xen-libs-32bit-4.9.4_34-3.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724762" comment="xen-tools-4.9.4_34-3.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724763" comment="xen-tools-domU-4.9.4_34-3.114.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151092" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1192876" ref_url="https://bugzilla.suse.com/1192876" source="BUGZILLA"/>
		<reference ref_id="1193981" ref_url="https://bugzilla.suse.com/1193981" source="BUGZILLA"/>
		<reference ref_id="1194041" ref_url="https://bugzilla.suse.com/1194041" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3975" ref_url="https://www.suse.com/security/cve/CVE-2021-3975/" source="CVE"/>
		<reference ref_id="CVE-2021-4147" ref_url="https://www.suse.com/security/cve/CVE-2021-4147/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009983.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2021-4147: libxl: Fix libvirtd deadlocks and segfaults. (bsc#1194041)
- CVE-2021-3975: Add missing lock in qemuProcessHandleMonitorEOF. (bsc#1192876)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-10"/>
	<updated date="2022-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192876">SUSE bug 1192876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193981">SUSE bug 1193981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194041">SUSE bug 1194041</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3975/">CVE-2021-3975 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3975">CVE-2021-3975 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4147/">CVE-2021-4147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4147">CVE-2021-4147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662251" comment="libvirt-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662252" comment="libvirt-admin-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662253" comment="libvirt-client-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662254" comment="libvirt-daemon-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662255" comment="libvirt-daemon-config-network-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662256" comment="libvirt-daemon-config-nwfilter-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662257" comment="libvirt-daemon-driver-interface-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662170" comment="libvirt-daemon-driver-libxl-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662258" comment="libvirt-daemon-driver-lxc-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662259" comment="libvirt-daemon-driver-network-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662260" comment="libvirt-daemon-driver-nodedev-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662261" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662262" comment="libvirt-daemon-driver-qemu-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662263" comment="libvirt-daemon-driver-secret-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662264" comment="libvirt-daemon-driver-storage-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662265" comment="libvirt-daemon-driver-storage-core-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662266" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662267" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662268" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662269" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662183" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662270" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662271" comment="libvirt-daemon-hooks-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662272" comment="libvirt-daemon-lxc-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662273" comment="libvirt-daemon-qemu-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662188" comment="libvirt-daemon-xen-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662274" comment="libvirt-doc-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662275" comment="libvirt-libs-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662276" comment="libvirt-lock-sanlock-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662277" comment="libvirt-nss-3.3.0-5.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151093" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1205178" ref_url="https://bugzilla.suse.com/1205178" source="BUGZILLA"/>
		<reference ref_id="1205182" ref_url="https://bugzilla.suse.com/1205182" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2601" ref_url="https://www.suse.com/security/cve/CVE-2022-2601/" source="CVE"/>
		<reference ref_id="CVE-2022-3775" ref_url="https://www.suse.com/security/cve/CVE-2022-3775/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013046.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

Security Fixes:
    
- CVE-2022-2601: Fixed buffer overflow in grub_font_construct_glyph (bsc#1205178).
- CVE-2022-3775: Fixed integer underflow in blit_comb() (bsc#1205182).
    
Other:

- Bump upstream SBAT generation to 3
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-21"/>
	<updated date="2022-11-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205178">SUSE bug 1205178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205182">SUSE bug 1205182</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2601/">CVE-2022-2601 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2601">CVE-2022-2601 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3775/">CVE-2022-3775 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3775">CVE-2022-3775 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726355" comment="grub2-2.02-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726356" comment="grub2-i386-pc-2.02-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726357" comment="grub2-snapper-plugin-2.02-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726358" comment="grub2-systemd-sleep-plugin-2.02-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726359" comment="grub2-x86_64-efi-2.02-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726360" comment="grub2-x86_64-xen-2.02-142.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151094" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1204918" ref_url="https://bugzilla.suse.com/1204918" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42252" ref_url="https://www.suse.com/security/cve/CVE-2022-42252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013091.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2022-42252: Fixed a request smuggling (bsc#1204918).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-23"/>
	<updated date="2022-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204918">SUSE bug 1204918</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42252/">CVE-2022-42252 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42252">CVE-2022-42252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726575" comment="tomcat-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726576" comment="tomcat-admin-webapps-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726577" comment="tomcat-docs-webapp-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726578" comment="tomcat-el-3_0-api-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726579" comment="tomcat-javadoc-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726580" comment="tomcat-jsp-2_3-api-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726581" comment="tomcat-lib-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726582" comment="tomcat-servlet-3_1-api-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726583" comment="tomcat-webapps-8.0.53-29.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151095" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1197998" ref_url="https://bugzilla.suse.com/1197998" source="BUGZILLA"/>
		<reference ref_id="1203201" ref_url="https://bugzilla.suse.com/1203201" source="BUGZILLA"/>
		<reference ref_id="1204986" ref_url="https://bugzilla.suse.com/1204986" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-43995" ref_url="https://www.suse.com/security/cve/CVE-2022-43995/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013119.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:
  
Security fixes:

- CVE-2022-43995: Fixed a potential heap-based buffer over-read when entering a password of seven characters or fewer and using the crypt() password backend (bsc#1204986).

Other:
    
- Make sure SIGCHLD is not ignored when sudo is executed; fixes race condition (bsc#1203201).
- Change sudo-ldap schema from ASCII to UTF8 (bsc#1197998).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-28"/>
	<updated date="2022-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197998">SUSE bug 1197998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203201">SUSE bug 1203201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204986">SUSE bug 1204986</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-43995/">CVE-2022-43995 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43995">CVE-2022-43995 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726584" comment="sudo-1.8.20p2-3.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151096" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1205270" ref_url="https://bugzilla.suse.com/1205270" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45403" ref_url="https://www.suse.com/security/cve/CVE-2022-45403/" source="CVE"/>
		<reference ref_id="CVE-2022-45404" ref_url="https://www.suse.com/security/cve/CVE-2022-45404/" source="CVE"/>
		<reference ref_id="CVE-2022-45405" ref_url="https://www.suse.com/security/cve/CVE-2022-45405/" source="CVE"/>
		<reference ref_id="CVE-2022-45406" ref_url="https://www.suse.com/security/cve/CVE-2022-45406/" source="CVE"/>
		<reference ref_id="CVE-2022-45408" ref_url="https://www.suse.com/security/cve/CVE-2022-45408/" source="CVE"/>
		<reference ref_id="CVE-2022-45409" ref_url="https://www.suse.com/security/cve/CVE-2022-45409/" source="CVE"/>
		<reference ref_id="CVE-2022-45410" ref_url="https://www.suse.com/security/cve/CVE-2022-45410/" source="CVE"/>
		<reference ref_id="CVE-2022-45411" ref_url="https://www.suse.com/security/cve/CVE-2022-45411/" source="CVE"/>
		<reference ref_id="CVE-2022-45412" ref_url="https://www.suse.com/security/cve/CVE-2022-45412/" source="CVE"/>
		<reference ref_id="CVE-2022-45416" ref_url="https://www.suse.com/security/cve/CVE-2022-45416/" source="CVE"/>
		<reference ref_id="CVE-2022-45418" ref_url="https://www.suse.com/security/cve/CVE-2022-45418/" source="CVE"/>
		<reference ref_id="CVE-2022-45420" ref_url="https://www.suse.com/security/cve/CVE-2022-45420/" source="CVE"/>
		<reference ref_id="CVE-2022-45421" ref_url="https://www.suse.com/security/cve/CVE-2022-45421/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 102.5.0 ESR (MFSA 2022-48, bsc#1205270):

- CVE-2022-45403: Service Workers might have learned size of cross-origin media files
- CVE-2022-45404: Fullscreen notification bypass
- CVE-2022-45405: Use-after-free in InputStream implementation
- CVE-2022-45406: Use-after-free of a JavaScript Realm
- CVE-2022-45408: Fullscreen notification bypass via windowName
- CVE-2022-45409: Use-after-free in Garbage Collection
- CVE-2022-45410: ServiceWorker-intercepted requests bypassed SameSite cookie policy
- CVE-2022-45411: Cross-Site Tracing was possible via non-standard override headers
- CVE-2022-45412: Symlinks may resolve to partially uninitialized buffers
- CVE-2022-45416: Keystroke Side-Channel Leakage
- CVE-2022-45418: Custom mouse cursor could have been drawn over browser UI
- CVE-2022-45420: Iframe contents could be rendered outside the iframe
- CVE-2022-45421: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-28"/>
	<updated date="2022-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45403/">CVE-2022-45403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45403">CVE-2022-45403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45404/">CVE-2022-45404 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45404">CVE-2022-45404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45405/">CVE-2022-45405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45405">CVE-2022-45405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45406/">CVE-2022-45406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45406">CVE-2022-45406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45408/">CVE-2022-45408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45408">CVE-2022-45408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45409/">CVE-2022-45409 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45409">CVE-2022-45409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45410/">CVE-2022-45410 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45410">CVE-2022-45410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45411/">CVE-2022-45411 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45411">CVE-2022-45411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45412/">CVE-2022-45412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45412">CVE-2022-45412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45416/">CVE-2022-45416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45416">CVE-2022-45416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45418/">CVE-2022-45418 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45418">CVE-2022-45418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45420/">CVE-2022-45420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45420">CVE-2022-45420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45421/">CVE-2022-45421 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45421">CVE-2022-45421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725294" comment="MozillaFirefox-102.5.0-112.139.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725295" comment="MozillaFirefox-devel-102.5.0-112.139.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725296" comment="MozillaFirefox-translations-common-102.5.0-112.139.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151097" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1204641" ref_url="https://bugzilla.suse.com/1204641" source="BUGZILLA"/>
		<reference ref_id="1204643" ref_url="https://bugzilla.suse.com/1204643" source="BUGZILLA"/>
		<reference ref_id="1204644" ref_url="https://bugzilla.suse.com/1204644" source="BUGZILLA"/>
		<reference ref_id="1204645" ref_url="https://bugzilla.suse.com/1204645" source="BUGZILLA"/>
		<reference ref_id="1205392" ref_url="https://bugzilla.suse.com/1205392" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3597" ref_url="https://www.suse.com/security/cve/CVE-2022-3597/" source="CVE"/>
		<reference ref_id="CVE-2022-3599" ref_url="https://www.suse.com/security/cve/CVE-2022-3599/" source="CVE"/>
		<reference ref_id="CVE-2022-3626" ref_url="https://www.suse.com/security/cve/CVE-2022-3626/" source="CVE"/>
		<reference ref_id="CVE-2022-3627" ref_url="https://www.suse.com/security/cve/CVE-2022-3627/" source="CVE"/>
		<reference ref_id="CVE-2022-3970" ref_url="https://www.suse.com/security/cve/CVE-2022-3970/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013120.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2022-3597: Fixed out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c (bnc#1204641).
- CVE-2022-3599: Fixed out-of-bounds read in writeSingleSection in tools/tiffcrop.c (bnc#1204643).
- CVE-2022-3626: Fixed out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c (bnc#1204644)
- CVE-2022-3627: Fixed out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c (bnc#1204645).
- CVE-2022-3970: Fixed unsigned integer overflow in TIFFReadRGBATileExt() (bnc#1205392).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-28"/>
	<updated date="2022-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204641">SUSE bug 1204641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204643">SUSE bug 1204643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204644">SUSE bug 1204644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204645">SUSE bug 1204645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205392">SUSE bug 1205392</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3597/">CVE-2022-3597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3597">CVE-2022-3597 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3599/">CVE-2022-3599 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3599">CVE-2022-3599 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3626/">CVE-2022-3626 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3626">CVE-2022-3626 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3627/">CVE-2022-3627 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3627">CVE-2022-3627 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3970/">CVE-2022-3970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3970">CVE-2022-3970 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725583" comment="libtiff5-4.0.9-44.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725575" comment="libtiff5-32bit-4.0.9-44.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725584" comment="tiff-4.0.9-44.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151098" version="1" class="patch">
	<metadata>
		<title>Security update for pixman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1205033" ref_url="https://bugzilla.suse.com/1205033" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-44638" ref_url="https://www.suse.com/security/cve/CVE-2022-44638/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013121.html" source="SUSE-SU"/>
		<description>
This update for pixman fixes the following issues:
  
- CVE-2022-44638: Fixed an integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write (bsc#1205033).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-28"/>
	<updated date="2022-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205033">SUSE bug 1205033</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-44638/">CVE-2022-44638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44638">CVE-2022-44638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725088" comment="libpixman-1-0-0.34.0-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725083" comment="libpixman-1-0-32bit-0.34.0-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151099" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1203125" ref_url="https://bugzilla.suse.com/1203125" source="BUGZILLA"/>
		<reference ref_id="1205244" ref_url="https://bugzilla.suse.com/1205244" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10735" ref_url="https://www.suse.com/security/cve/CVE-2020-10735/" source="CVE"/>
		<reference ref_id="CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013125.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2020-10735: Fixed possible DoS when converting text to int and vice versa (bsc#1203125).
- CVE-2022-45061: Fixed possible DoS when IDNA decoding extremely long domain names (bsc#1205244).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-28"/>
	<updated date="2022-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203125">SUSE bug 1203125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205244">SUSE bug 1205244</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10735/">CVE-2020-10735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10735">CVE-2020-10735 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725084" comment="libpython3_4m1_0-3.4.10-25.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725085" comment="python3-3.4.10-25.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725086" comment="python3-base-3.4.10-25.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725087" comment="python3-curses-3.4.10-25.102.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151100" version="1" class="patch">
	<metadata>
		<title>Security update for exiv2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1119562" ref_url="https://bugzilla.suse.com/1119562" source="BUGZILLA"/>
		<reference ref_id="1142681" ref_url="https://bugzilla.suse.com/1142681" source="BUGZILLA"/>
		<reference ref_id="1185002" ref_url="https://bugzilla.suse.com/1185002" source="BUGZILLA"/>
		<reference ref_id="1186231" ref_url="https://bugzilla.suse.com/1186231" source="BUGZILLA"/>
		<reference ref_id="1188733" ref_url="https://bugzilla.suse.com/1188733" source="BUGZILLA"/>
		<reference ref_id="1189332" ref_url="https://bugzilla.suse.com/1189332" source="BUGZILLA"/>
		<reference ref_id="1189337" ref_url="https://bugzilla.suse.com/1189337" source="BUGZILLA"/>
		<reference ref_id="1189338" ref_url="https://bugzilla.suse.com/1189338" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20097" ref_url="https://www.suse.com/security/cve/CVE-2018-20097/" source="CVE"/>
		<reference ref_id="CVE-2019-13112" ref_url="https://www.suse.com/security/cve/CVE-2019-13112/" source="CVE"/>
		<reference ref_id="CVE-2021-29457" ref_url="https://www.suse.com/security/cve/CVE-2021-29457/" source="CVE"/>
		<reference ref_id="CVE-2021-29473" ref_url="https://www.suse.com/security/cve/CVE-2021-29473/" source="CVE"/>
		<reference ref_id="CVE-2021-31291" ref_url="https://www.suse.com/security/cve/CVE-2021-31291/" source="CVE"/>
		<reference ref_id="CVE-2021-32815" ref_url="https://www.suse.com/security/cve/CVE-2021-32815/" source="CVE"/>
		<reference ref_id="CVE-2021-34334" ref_url="https://www.suse.com/security/cve/CVE-2021-34334/" source="CVE"/>
		<reference ref_id="CVE-2021-37620" ref_url="https://www.suse.com/security/cve/CVE-2021-37620/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013131.html" source="SUSE-SU"/>
		<description>
This update for exiv2 fixes the following issues:

- CVE-2019-13112: Fixed an uncontrolled memory allocation in PngChunk:parseChunkContent causing denial of service. (bsc#1142681)
- CVE-2021-37620: Fixed out-of-bounds read in XmpTextValue:read(). (bsc#1189332)
- CVE-2021-34334: Fixed a DoS due to integer overflow in loop counter. (bsc#1189338)
- CVE-2021-31291: Fixed a heap-based buffer overflow vulnerability in jp2image.cpp may lead to a denial of service via crafted metadata (bsc#1188733).
- CVE-2021-32815: Fixed a deny-of-service due to assertion failure in crwimage_int.cpp (bsc#1189337).
- CVE-2018-20097: Fixed SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroupsu (bsc#1119562).
- CVE-2021-29457: Fixed a heap buffer overflow when write metadata into a crafted image file (bsc#1185002).
- CVE-2021-29473: Fixed out-of-bounds read in Exiv2::Jp2Image:doWriteMetadata (bsc#1186231).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-28"/>
	<updated date="2022-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119562">SUSE bug 1119562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142681">SUSE bug 1142681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185002">SUSE bug 1185002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186231">SUSE bug 1186231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188733">SUSE bug 1188733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189332">SUSE bug 1189332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189337">SUSE bug 1189337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189338">SUSE bug 1189338</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20097/">CVE-2018-20097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20097">CVE-2018-20097 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13112/">CVE-2019-13112 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13112">CVE-2019-13112 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29457/">CVE-2021-29457 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29457">CVE-2021-29457 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29473/">CVE-2021-29473 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29473">CVE-2021-29473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31291/">CVE-2021-31291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-31291">CVE-2021-31291 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32815/">CVE-2021-32815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32815">CVE-2021-32815 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34334/">CVE-2021-34334 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34334">CVE-2021-34334 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-37620/">CVE-2021-37620 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37620">CVE-2021-37620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725415" comment="libexiv2-12-0.23-12.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151101" version="1" class="patch">
	<metadata>
		<title>Security update for busybox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1029961" ref_url="https://bugzilla.suse.com/1029961" source="BUGZILLA"/>
		<reference ref_id="1064976" ref_url="https://bugzilla.suse.com/1064976" source="BUGZILLA"/>
		<reference ref_id="1064978" ref_url="https://bugzilla.suse.com/1064978" source="BUGZILLA"/>
		<reference ref_id="1069412" ref_url="https://bugzilla.suse.com/1069412" source="BUGZILLA"/>
		<reference ref_id="1099260" ref_url="https://bugzilla.suse.com/1099260" source="BUGZILLA"/>
		<reference ref_id="1099263" ref_url="https://bugzilla.suse.com/1099263" source="BUGZILLA"/>
		<reference ref_id="1102912" ref_url="https://bugzilla.suse.com/1102912" source="BUGZILLA"/>
		<reference ref_id="1121426" ref_url="https://bugzilla.suse.com/1121426" source="BUGZILLA"/>
		<reference ref_id="1121428" ref_url="https://bugzilla.suse.com/1121428" source="BUGZILLA"/>
		<reference ref_id="1184522" ref_url="https://bugzilla.suse.com/1184522" source="BUGZILLA"/>
		<reference ref_id="1191514" ref_url="https://bugzilla.suse.com/1191514" source="BUGZILLA"/>
		<reference ref_id="1192869" ref_url="https://bugzilla.suse.com/1192869" source="BUGZILLA"/>
		<reference ref_id="914660" ref_url="https://bugzilla.suse.com/914660" source="BUGZILLA"/>
		<reference ref_id="951562" ref_url="https://bugzilla.suse.com/951562" source="BUGZILLA"/>
		<reference ref_id="970662" ref_url="https://bugzilla.suse.com/970662" source="BUGZILLA"/>
		<reference ref_id="970663" ref_url="https://bugzilla.suse.com/970663" source="BUGZILLA"/>
		<reference ref_id="991940" ref_url="https://bugzilla.suse.com/991940" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-5325" ref_url="https://www.suse.com/security/cve/CVE-2011-5325/" source="CVE"/>
		<reference ref_id="CVE-2014-9645" ref_url="https://www.suse.com/security/cve/CVE-2014-9645/" source="CVE"/>
		<reference ref_id="CVE-2015-9261" ref_url="https://www.suse.com/security/cve/CVE-2015-9261/" source="CVE"/>
		<reference ref_id="CVE-2016-2147" ref_url="https://www.suse.com/security/cve/CVE-2016-2147/" source="CVE"/>
		<reference ref_id="CVE-2016-2148" ref_url="https://www.suse.com/security/cve/CVE-2016-2148/" source="CVE"/>
		<reference ref_id="CVE-2016-6301" ref_url="https://www.suse.com/security/cve/CVE-2016-6301/" source="CVE"/>
		<reference ref_id="CVE-2017-15873" ref_url="https://www.suse.com/security/cve/CVE-2017-15873/" source="CVE"/>
		<reference ref_id="CVE-2017-15874" ref_url="https://www.suse.com/security/cve/CVE-2017-15874/" source="CVE"/>
		<reference ref_id="CVE-2017-16544" ref_url="https://www.suse.com/security/cve/CVE-2017-16544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000500" ref_url="https://www.suse.com/security/cve/CVE-2018-1000500/" source="CVE"/>
		<reference ref_id="CVE-2018-1000517" ref_url="https://www.suse.com/security/cve/CVE-2018-1000517/" source="CVE"/>
		<reference ref_id="CVE-2018-20679" ref_url="https://www.suse.com/security/cve/CVE-2018-20679/" source="CVE"/>
		<reference ref_id="CVE-2019-5747" ref_url="https://www.suse.com/security/cve/CVE-2019-5747/" source="CVE"/>
		<reference ref_id="CVE-2021-28831" ref_url="https://www.suse.com/security/cve/CVE-2021-28831/" source="CVE"/>
		<reference ref_id="CVE-2021-42373" ref_url="https://www.suse.com/security/cve/CVE-2021-42373/" source="CVE"/>
		<reference ref_id="CVE-2021-42374" ref_url="https://www.suse.com/security/cve/CVE-2021-42374/" source="CVE"/>
		<reference ref_id="CVE-2021-42375" ref_url="https://www.suse.com/security/cve/CVE-2021-42375/" source="CVE"/>
		<reference ref_id="CVE-2021-42376" ref_url="https://www.suse.com/security/cve/CVE-2021-42376/" source="CVE"/>
		<reference ref_id="CVE-2021-42377" ref_url="https://www.suse.com/security/cve/CVE-2021-42377/" source="CVE"/>
		<reference ref_id="CVE-2021-42378" ref_url="https://www.suse.com/security/cve/CVE-2021-42378/" source="CVE"/>
		<reference ref_id="CVE-2021-42379" ref_url="https://www.suse.com/security/cve/CVE-2021-42379/" source="CVE"/>
		<reference ref_id="CVE-2021-42380" ref_url="https://www.suse.com/security/cve/CVE-2021-42380/" source="CVE"/>
		<reference ref_id="CVE-2021-42381" ref_url="https://www.suse.com/security/cve/CVE-2021-42381/" source="CVE"/>
		<reference ref_id="CVE-2021-42382" ref_url="https://www.suse.com/security/cve/CVE-2021-42382/" source="CVE"/>
		<reference ref_id="CVE-2021-42383" ref_url="https://www.suse.com/security/cve/CVE-2021-42383/" source="CVE"/>
		<reference ref_id="CVE-2021-42384" ref_url="https://www.suse.com/security/cve/CVE-2021-42384/" source="CVE"/>
		<reference ref_id="CVE-2021-42385" ref_url="https://www.suse.com/security/cve/CVE-2021-42385/" source="CVE"/>
		<reference ref_id="CVE-2021-42386" ref_url="https://www.suse.com/security/cve/CVE-2021-42386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013126.html" source="SUSE-SU"/>
		<description>
This update for busybox fixes the following issues:

- CVE-2014-9645: Fixed loading of unwanted modules with / (bsc#914660).
- CVE-2017-16544: Fixed insufficient sanitization of filenames when autocompleting  (bsc#1069412).
- CVE-2015-9261: Fixed huft_build misuses a pointer, causing segfaults (bsc#1102912).
- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).
- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).
- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).
- CVE-2017-15873: Fixed integer overflow in  get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).
- CVE-2017-15874: Fixed integer overflow in archival/libarchive/decompress_unlzma (bsc#1064978).
- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).
- CVE-2021-42373, CVE-2021-42374, CVE-2021-42375, CVE-2021-42376, CVE-2021-42377, CVE-2021-42378, CVE-2021-42379, CVE-2021-42380, CVE-2021-42381, CVE-2021-42382, CVE-2021-42383, CVE-2021-42384, CVE-2021-42385, CVE-2021-42386: v1.34.0 bugfixes (bsc#1192869).
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).
- CVE-2018-1000500: Fixed missing SSL certificate validation in wget (bsc#1099263).
  
- Update to 1.35.0
  - awk: fix printf %%, fix read beyond end of buffer
  - chrt: silence analyzer warning
  - libarchive: remove duplicate forward declaration
  - mount: 'mount -o rw ....' should not fall back to RO mount
  - ps: fix -o pid=PID,args interpreting entire 'PID,args' as header
  - tar: prevent malicious archives with long name sizes causing OOM
  - udhcpc6: fix udhcp_find_option to actually find DHCP6 options
  - xxd: fix -p -r
  - support for new optoins added to basename, cpio, date, find, 
    mktemp, wget and others

- Enable fdisk (jsc#CAR-16)

- Update to 1.34.1:
  * build system: use SOURCE_DATE_EPOCH for timestamp if available
  * many bug fixes and new features
  * touch: make FEATURE_TOUCH_NODEREF unconditional
  
- update to 1.33.1:
  * httpd: fix sendfile
  * ash: fix HISTFILE corruptio
  * ash: fix unset variable pattern expansion
  * traceroute: fix option parsing
  * gunzip: fix for archive corruption

- Update to version 1.33.0
  - many bug fixes and new features

- Update to version 1.32.1
  - fixes a case where in ash, 'wait' never finishes. 

- prepare usrmerge (bsc#1029961)

- Enable testsuite and package it for later rerun (for QA, jsc#CAR-15)

- Update to version 1.31.1:
  + Bug fix release. 1.30.1 has fixes for dc, ash (PS1 expansion
    fix), hush, dpkg-deb, telnet and wget.
- Changes from version 1.31.0:
  + many bugfixes and new features.
- Add busybox-no-stime.patch: stime() has been deprecated in glibc
  2.31 and replaced with clock_settime().

- update to 1.25.1:
  * fixes for hush, gunzip, ip route, ntpd
- includes changes from 1.25.0:
  * many added and expanded implementations of command options
- includes changes from 1.24.2:
  * fixes for build system (static build with glibc fixed),
    truncate, gunzip and unzip. 

- Update to version 1.24.1
  * for a full list of changes see http://www.busybox.net/news.html
- Refresh busybox.install.patch 

- Update to 1.23.2
  * for a full list of changes see http://www.busybox.net/news.html
- Cleaned up spec file with spec-cleaner
- Refreshed patches

- update to 1.22.1:
  Many updates and fixes for most included tools, see
  see http://www.busybox.net/news.html
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-28"/>
	<updated date="2022-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1029961">SUSE bug 1029961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064976">SUSE bug 1064976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064978">SUSE bug 1064978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069412">SUSE bug 1069412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099260">SUSE bug 1099260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099263">SUSE bug 1099263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102912">SUSE bug 1102912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121426">SUSE bug 1121426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121428">SUSE bug 1121428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184522">SUSE bug 1184522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191514">SUSE bug 1191514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192869">SUSE bug 1192869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914660">SUSE bug 914660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951562">SUSE bug 951562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970662">SUSE bug 970662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970663">SUSE bug 970663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991940">SUSE bug 991940</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5325/">CVE-2011-5325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2011-5325">CVE-2011-5325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9645/">CVE-2014-9645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9645">CVE-2014-9645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9261/">CVE-2015-9261 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9261">CVE-2015-9261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2147/">CVE-2016-2147 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2147">CVE-2016-2147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2148/">CVE-2016-2148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2148">CVE-2016-2148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6301/">CVE-2016-6301 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6301">CVE-2016-6301 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15873/">CVE-2017-15873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15873">CVE-2017-15873 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15874/">CVE-2017-15874 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15874">CVE-2017-15874 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16544/">CVE-2017-16544 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16544">CVE-2017-16544 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000500/">CVE-2018-1000500 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000500">CVE-2018-1000500 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000517/">CVE-2018-1000517 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000517">CVE-2018-1000517 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20679/">CVE-2018-20679 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20679">CVE-2018-20679 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5747/">CVE-2019-5747 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5747">CVE-2019-5747 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28831/">CVE-2021-28831 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28831">CVE-2021-28831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42373/">CVE-2021-42373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42373">CVE-2021-42373 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42374/">CVE-2021-42374 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42374">CVE-2021-42374 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42375/">CVE-2021-42375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42375">CVE-2021-42375 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42376/">CVE-2021-42376 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42376">CVE-2021-42376 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42377/">CVE-2021-42377 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42377">CVE-2021-42377 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42378/">CVE-2021-42378 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42378">CVE-2021-42378 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42379/">CVE-2021-42379 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42379">CVE-2021-42379 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42380/">CVE-2021-42380 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42380">CVE-2021-42380 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42381/">CVE-2021-42381 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42381">CVE-2021-42381 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42382/">CVE-2021-42382 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42382">CVE-2021-42382 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42383/">CVE-2021-42383 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42383">CVE-2021-42383 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42384/">CVE-2021-42384 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42384">CVE-2021-42384 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42385/">CVE-2021-42385 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42385">CVE-2021-42385 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42386/">CVE-2021-42386 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42386">CVE-2021-42386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726003" comment="busybox-1.35.0-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151102" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1142579" ref_url="https://bugzilla.suse.com/1142579" source="BUGZILLA"/>
		<reference ref_id="1185597" ref_url="https://bugzilla.suse.com/1185597" source="BUGZILLA"/>
		<reference ref_id="1185712" ref_url="https://bugzilla.suse.com/1185712" source="BUGZILLA"/>
		<reference ref_id="1188374" ref_url="https://bugzilla.suse.com/1188374" source="BUGZILLA"/>
		<reference ref_id="1191473" ref_url="https://bugzilla.suse.com/1191473" source="BUGZILLA"/>
		<reference ref_id="1191908" ref_url="https://bugzilla.suse.com/1191908" source="BUGZILLA"/>
		<reference ref_id="1193929" ref_url="https://bugzilla.suse.com/1193929" source="BUGZILLA"/>
		<reference ref_id="1194783" ref_url="https://bugzilla.suse.com/1194783" source="BUGZILLA"/>
		<reference ref_id="1197592" ref_url="https://bugzilla.suse.com/1197592" source="BUGZILLA"/>
		<reference ref_id="1198237" ref_url="https://bugzilla.suse.com/1198237" source="BUGZILLA"/>
		<reference ref_id="1198458" ref_url="https://bugzilla.suse.com/1198458" source="BUGZILLA"/>
		<reference ref_id="1202816" ref_url="https://bugzilla.suse.com/1202816" source="BUGZILLA"/>
		<reference ref_id="1202966" ref_url="https://bugzilla.suse.com/1202966" source="BUGZILLA"/>
		<reference ref_id="1202967" ref_url="https://bugzilla.suse.com/1202967" source="BUGZILLA"/>
		<reference ref_id="1202969" ref_url="https://bugzilla.suse.com/1202969" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010204" ref_url="https://www.suse.com/security/cve/CVE-2019-1010204/" source="CVE"/>
		<reference ref_id="CVE-2021-3530" ref_url="https://www.suse.com/security/cve/CVE-2021-3530/" source="CVE"/>
		<reference ref_id="CVE-2021-3648" ref_url="https://www.suse.com/security/cve/CVE-2021-3648/" source="CVE"/>
		<reference ref_id="CVE-2021-3826" ref_url="https://www.suse.com/security/cve/CVE-2021-3826/" source="CVE"/>
		<reference ref_id="CVE-2021-45078" ref_url="https://www.suse.com/security/cve/CVE-2021-45078/" source="CVE"/>
		<reference ref_id="CVE-2021-46195" ref_url="https://www.suse.com/security/cve/CVE-2021-46195/" source="CVE"/>
		<reference ref_id="CVE-2022-27943" ref_url="https://www.suse.com/security/cve/CVE-2022-27943/" source="CVE"/>
		<reference ref_id="CVE-2022-38126" ref_url="https://www.suse.com/security/cve/CVE-2022-38126/" source="CVE"/>
		<reference ref_id="CVE-2022-38127" ref_url="https://www.suse.com/security/cve/CVE-2022-38127/" source="CVE"/>
		<reference ref_id="CVE-2022-38533" ref_url="https://www.suse.com/security/cve/CVE-2022-38533/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013145.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:
The following security bugs were fixed:

- CVE-2019-1010204: Fixed out-of-bounds read in elfcpp/elfcpp_file.h (bsc#1142579).
- CVE-2021-3530: Fixed stack-based buffer overflow in demangle_path() in rust-demangle.c (bsc#1185597).
- CVE-2021-3648: Fixed infinite loop while demangling rust symbols (bsc#1188374).
- CVE-2021-3826: Fixed heap/stack buffer overflow in the dlang_lname function in d-demangle.c (bsc#1202969).
- CVE-2021-45078: Fixed out-of-bounds write in stab_xcoff_builtin_type() in stabs.c (bsc#1193929).
- CVE-2021-46195: Fixed uncontrolled recursion in libiberty/rust-demangle.c (bsc#1194783).
- CVE-2022-27943: Fixed stack exhaustion in demangle_const in (bsc#1197592).
- CVE-2022-38126: Fixed assertion fail in the display_debug_names() function in binutils/dwarf.c (bsc#1202966).
- CVE-2022-38127: Fixed NULL pointer dereference in the read_and_display_attr_value() function in binutils/dwarf.c (bsc#1202967).
- CVE-2022-38533: Fixed heap out-of-bounds read in bfd_getl32 (bsc#1202816).


The following non-security bugs were fixed:
  
- SLE toolchain update of binutils, update to 2.39 from 2.37.
- Update to 2.39:  
  * The ELF linker will now generate a warning message if the stack is made
    executable.  Similarly it will warn if the output binary contains a
    segment with all three of the read, write and execute permission
    bits set.  These warnings are intended to help developers identify
    programs which might be vulnerable to attack via these executable
    memory regions.
    The warnings are enabled by default but can be disabled via a command
    line option.  It is also possible to build a linker with the warnings
    disabled, should that be necessary.
  * The ELF linker now supports a --package-metadata option that allows
    embedding a JSON payload in accordance to the Package Metadata
    specification. 
  * In linker scripts it is now possible to use TYPE=&lt;type&gt; in an output
    section description to set the section type value.
  * The objdump program now supports coloured/colored syntax
    highlighting of its disassembler output for some architectures.
    (Currently: AVR, RiscV, s390, x86, x86_64).
  * The nm program now supports a --no-weak/-W option to make it ignore
    weak symbols.
  * The readelf and objdump programs now support a -wE option to prevent
    them from attempting to access debuginfod servers when following
    links.
  * The objcopy program's --weaken, --weaken-symbol, and
    --weaken-symbols options now works with unique symbols as well.

- Update to 2.38:
  * elfedit: Add --output-abiversion option to update ABIVERSION.
  * Add support for the LoongArch instruction set.
  * Tools which display symbols or strings (readelf, strings, nm, objdump)
    have a new command line option which controls how unicode characters are
    handled.  By default they are treated as normal for the tool.  Using
    --unicode=locale will display them according to the current locale.
    Using --unicode=hex will display them as hex byte values, whilst
    --unicode=escape will display them as escape sequences.  In addition
    using --unicode=highlight will display them as unicode escape sequences
    highlighted in red (if supported by the output device).
  * readelf -r dumps RELR relative relocations now.
  * Support for efi-app-aarch64, efi-rtdrv-aarch64 and efi-bsdrv-aarch64 has been
    added to objcopy in order to enable UEFI development using binutils (bsc#1198458).
  * ar: Add --thin for creating thin archives. -T is a deprecated alias without
    diagnostics. In many ar implementations -T has a different meaning, as
    specified by X/Open System Interface.
  * Add support for AArch64 system registers that were missing in previous
    releases.
  * Add support for the LoongArch instruction set.
  * Add a command-line option, -muse-unaligned-vector-move, for x86 target
    to encode aligned vector move as unaligned vector move.
  * Add support for Cortex-R52+ for Arm.
  * Add support for Cortex-A510, Cortex-A710, Cortex-X2 for AArch64.
  * Add support for Cortex-A710 for Arm.
  * Add support for Scalable Matrix Extension (SME) for AArch64.
  * The --multibyte-handling=[allow|warn|warn-sym-only] option tells the
    assembler what to when it encoutners multibyte characters in the input.  The
    default is to allow them.  Setting the option to 'warn' will generate a
    warning message whenever any multibyte character is encountered.  Using the
    option to 'warn-sym-only' will make the assembler generate a warning whenever a
    symbol is defined containing multibyte characters.  (References to undefined
    symbols will not generate warnings).
  * Outputs of .ds.x directive and .tfloat directive with hex input from
    x86 assembler have been reduced from 12 bytes to 10 bytes to match the
    output of .tfloat directive.
  * Add support for 'armv8.8-a', 'armv9-a', 'armv9.1-a', 'armv9.2-a' and
    'armv9.3-a' for -march in AArch64 GAS.
  * Add support for 'armv8.7-a', 'armv8.8-a', 'armv9-a', 'armv9.1-a',
    'armv9.2-a' and 'armv9.3-a' for -march in Arm GAS.
  * Add support for Intel AVX512_FP16 instructions.
  * Add -z pack-relative-relocs/-z no pack-relative-relocs to x86 ELF
    linker to pack relative relocations in the DT_RELR section.
  * Add support for the LoongArch architecture.
  * Add -z indirect-extern-access/-z noindirect-extern-access to x86 ELF
    linker to control canonical function pointers and copy relocation.
  * Add --max-cache-size=SIZE to set the the maximum cache size to SIZE
    bytes.

- Fixed regression that prevented .ko.debug to be loaded in crash tool (bsc#1191908).
- Explicitly enable --enable-warn-execstack=yes and --enable-warn-rwx-segments=yes.
- Add gprofng subpackage.
- Include recognition of 'z16' name for 'arch14' on s390. (bsc#1198237).
- Add back fix for bsc#1191473, which got lost in the update to 2.38.
- Install symlinks for all target specific tools on arm-eabi-none (bsc#1185712).
- Enable PRU architecture for AM335x CPU (Beagle Bone Black board)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2022-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1142579">SUSE bug 1142579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185597">SUSE bug 1185597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185712">SUSE bug 1185712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188374">SUSE bug 1188374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191473">SUSE bug 1191473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191908">SUSE bug 1191908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193929">SUSE bug 1193929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194783">SUSE bug 1194783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197592">SUSE bug 1197592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198237">SUSE bug 1198237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198458">SUSE bug 1198458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202816">SUSE bug 1202816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202966">SUSE bug 1202966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202967">SUSE bug 1202967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202969">SUSE bug 1202969</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010204/">CVE-2019-1010204 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010204">CVE-2019-1010204 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3530/">CVE-2021-3530 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3530">CVE-2021-3530 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3648/">CVE-2021-3648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3648">CVE-2021-3648 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3826/">CVE-2021-3826 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3826">CVE-2021-3826 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45078/">CVE-2021-45078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45078">CVE-2021-45078 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46195/">CVE-2021-46195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46195">CVE-2021-46195 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27943/">CVE-2022-27943 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27943">CVE-2022-27943 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38126/">CVE-2022-38126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38126">CVE-2022-38126 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38127/">CVE-2022-38127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38127">CVE-2022-38127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-38533/">CVE-2022-38533 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38533">CVE-2022-38533 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725587" comment="binutils-2.39-9.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725588" comment="binutils-devel-2.39-9.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725589" comment="libctf-nobfd0-2.39-9.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725590" comment="libctf0-2.39-9.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151103" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1205120" ref_url="https://bugzilla.suse.com/1205120" source="BUGZILLA"/>
		<reference ref_id="1205121" ref_url="https://bugzilla.suse.com/1205121" source="BUGZILLA"/>
		<reference ref_id="1205122" ref_url="https://bugzilla.suse.com/1205122" source="BUGZILLA"/>
		<reference ref_id="1205123" ref_url="https://bugzilla.suse.com/1205123" source="BUGZILLA"/>
		<reference ref_id="1205124" ref_url="https://bugzilla.suse.com/1205124" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32888" ref_url="https://www.suse.com/security/cve/CVE-2022-32888/" source="CVE"/>
		<reference ref_id="CVE-2022-32923" ref_url="https://www.suse.com/security/cve/CVE-2022-32923/" source="CVE"/>
		<reference ref_id="CVE-2022-42799" ref_url="https://www.suse.com/security/cve/CVE-2022-42799/" source="CVE"/>
		<reference ref_id="CVE-2022-42823" ref_url="https://www.suse.com/security/cve/CVE-2022-42823/" source="CVE"/>
		<reference ref_id="CVE-2022-42824" ref_url="https://www.suse.com/security/cve/CVE-2022-42824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013157.html" source="SUSE-SU"/>
		<description>

Security fixes:

- CVE-2022-32888: Fixed possible arbitrary code execution via maliciously crafted web content (bsc#1205121).
- CVE-2022-32923: Fixed possible information leak via maliciously crafted web content (bsc#1205122).
- CVE-2022-42799: Fixed user interface spoofing when visiting a malicious website (bsc#1205123).
- CVE-2022-42823: Fixed possible arbitrary code execution via maliciously crafted web content (bsc#1205120).
- CVE-2022-42824: Fixed possible sensitive user information leak via maliciously crafted web content (bsc#1205124).

Update to version 2.38.2:

  - Fix scrolling issues in some sites having fixed background.
  - Fix prolonged buffering during progressive live playback.
  - Fix the build with accessibility disabled.
  - Fix several crashes and rendering issues.
    
Update to version 2.38.1:

  - Make xdg-dbus-proxy work if host session bus address is an
    abstract socket.
  - Use a single xdg-dbus-proxy process when sandbox is enabled.
  - Fix high resolution video playback due to unimplemented
    changeType operation.
  - Ensure GSubprocess uses posix_spawn() again and inherit file
    descriptors.
  - Fix player stucking in buffering (paused) state for progressive
    streaming.
  - Do not try to preconnect on link click when link preconnect
    setting is disabled.
  - Fix close status code returned when the client closes a
    WebSocket in some cases.
  - Fix media player duration calculation.
  - Fix several crashes and rendering issues.

Update to version 2.38.0:

  - New media controls UI style.
  - Add new API to set WebView's Content-Security-Policy for web
    extensions support.
  - Make it possible to use the remote inspector from other
    browsers using WEBKIT_INSPECTOR_HTTP_SERVER env var.
  - MediaSession is enabled by default, allowing remote media
    control using MPRIS.
  - Add support for PDF documents using PDF.js.
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2022-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205120">SUSE bug 1205120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205121">SUSE bug 1205121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205122">SUSE bug 1205122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205123">SUSE bug 1205123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205124">SUSE bug 1205124</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32888/">CVE-2022-32888 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32888">CVE-2022-32888 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32923/">CVE-2022-32923 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32923">CVE-2022-32923 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42799/">CVE-2022-42799 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42799">CVE-2022-42799 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42823/">CVE-2022-42823 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42823">CVE-2022-42823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42824/">CVE-2022-42824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42824">CVE-2022-42824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726568" comment="libjavascriptcoregtk-4_0-18-2.38.2-2.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726569" comment="libwebkit2gtk-4_0-37-2.38.2-2.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726570" comment="typelib-1_0-JavaScriptCore-4_0-2.38.2-2.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726571" comment="typelib-1_0-WebKit2-4_0-2.38.2-2.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726573" comment="webkit2gtk-4_0-injected-bundles-2.38.2-2.120.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151104" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1204468" ref_url="https://bugzilla.suse.com/1204468" source="BUGZILLA"/>
		<reference ref_id="1204471" ref_url="https://bugzilla.suse.com/1204471" source="BUGZILLA"/>
		<reference ref_id="1204472" ref_url="https://bugzilla.suse.com/1204472" source="BUGZILLA"/>
		<reference ref_id="1204473" ref_url="https://bugzilla.suse.com/1204473" source="BUGZILLA"/>
		<reference ref_id="1204475" ref_url="https://bugzilla.suse.com/1204475" source="BUGZILLA"/>
		<reference ref_id="1204480" ref_url="https://bugzilla.suse.com/1204480" source="BUGZILLA"/>
		<reference ref_id="1205302" ref_url="https://bugzilla.suse.com/1205302" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21618" ref_url="https://www.suse.com/security/cve/CVE-2022-21618/" source="CVE"/>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<reference ref_id="CVE-2022-39399" ref_url="https://www.suse.com/security/cve/CVE-2022-39399/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013160.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- CVE-2022-21626: An unauthenticated attacker with network access via HTTPS can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1204471).
- CVE-2022-21618: An unauthenticated attacker with network access via Kerberos can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1204468).
- CVE-2022-21619: An unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE (bsc#1204473).
- CVE-2022-21628: An unauthenticated attacker with network access via HTTP can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1204472).
- CVE-2022-21624: An unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise (bsc#1204475).
- CVE-2022-39399: An unauthenticated attacker with network access via HTTP can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1204480).

- Update to Java 8.0 Service Refresh 7 Fix Pack 20 [bsc#1205302]
  * Security:
    - The IBM ORB Does Not Support Object-Serialisation Data Filtering
    - Large Allocation In CipherSuite
    - Avoid Evaluating Sslalgorithmconstraints Twice
    - Cache The Results Of Constraint Checks
    - An incorrect ShortBufferException is thrown by IBMJCEPlus,
      IBMJCEPlusFIPS during cipher update operation
    - Disable SHA-1 Signed Jars For Ea
    - JSSE Performance Improvement
    - Oracle Road Map Kerberos Deprecation Of 3DES And RC4 Encryption
  * Java 8/Orb:
    - Upgrade ibmcfw.jar To Version o2228.02
  * Class Libraries:
    - Crash In Libjsor.So During An Rdma Failover
    - High CPU Consumption Observed In ZosEventPort$EventHandlerTask.run
    - Update Timezone Information To The Latest tzdata2022c
  * Jit Compiler:
    - Crash During JIT Compilation
    - Incorrect JIT Optimization Of Java Code
    - Incorrect Return From Class.isArray()
    - Unexpected ClassCastException
    - Performance Regression When Calling VM Helper Code On X86
  * X/Os Extentions:
    - Add RSA-OAEP Cipher Function To IBMJCECCA

- Update to Java 8.0 Service Refresh 7 Fix Pack 16
  * Java Virtual Machine
    - Assertion failure at ClassLoaderRememberedSet.cpp
	- Assertion failure at StandardAccessBarrier.cpp when
	  -Xgc:concurrentScavenge is set.
    - GC can have unflushed ownable synchronizer objects which
	  can eventually lead to heap corruption and failure when
	  -Xgc:concurrentScavenge is set.
  *	JIT Compiler:
    - Incorrect JIT optimization of Java code
    - JAVA JIT Power: JIT compile time assert on AIX or LINUXPPC
  *	Reliability and Serviceability:
    - javacore with 'kill -3' SIGQUIT signal freezes Java process
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2022-11-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204468">SUSE bug 1204468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204471">SUSE bug 1204471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204472">SUSE bug 1204472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204473">SUSE bug 1204473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204475">SUSE bug 1204475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204480">SUSE bug 1204480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205302">SUSE bug 1205302</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21618/">CVE-2022-21618 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21618">CVE-2022-21618 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21619">CVE-2022-21619 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21624">CVE-2022-21624 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21626">CVE-2022-21626 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39399/">CVE-2022-39399 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39399">CVE-2022-39399 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725585" comment="java-1_8_0-ibm-1.8.0_sr7.20-30.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725550" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.20-30.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725586" comment="java-1_8_0-ibm-devel-1.8.0_sr7.20-30.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725551" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.20-30.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151105" version="1" class="patch">
	<metadata>
		<title>Security update for supportutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1203818" ref_url="https://bugzilla.suse.com/1203818" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:4294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013154.html" source="SUSE-SU"/>
		<description>
This update for supportutils fixes the following issues:

Security issues fixed:

- Passwords correctly removed from email.txt, updates.txt and fs-iscsi.txt (bsc#1203818)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2022-11-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203818">SUSE bug 1203818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726814" comment="supportutils-3.0.10-95.51.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151106" version="1" class="patch">
	<metadata>
		<title>Security update for emacs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1205822" ref_url="https://bugzilla.suse.com/1205822" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45939" ref_url="https://www.suse.com/security/cve/CVE-2022-45939/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013182.html" source="SUSE-SU"/>
		<description>
This update for emacs fixes the following issues:

- CVE-2022-45939: Fixed shell command injection via source code files when using ctags (bsc#1205822).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-01"/>
	<updated date="2022-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205822">SUSE bug 1205822</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45939/">CVE-2022-45939 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45939">CVE-2022-45939 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727481" comment="emacs-24.3-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727418" comment="emacs-el-24.3-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727419" comment="emacs-info-24.3-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727482" comment="emacs-nox-24.3-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727483" comment="emacs-x11-24.3-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727484" comment="etags-24.3-25.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151107" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1205126" ref_url="https://bugzilla.suse.com/1205126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42898" ref_url="https://www.suse.com/security/cve/CVE-2022-42898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013194.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

- CVE-2022-42898: Fixed integer overflow in PAC parsing (bsc#1205126).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-06"/>
	<updated date="2022-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205126">SUSE bug 1205126</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-42898/">CVE-2022-42898 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42898">CVE-2022-42898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726342" comment="krb5-1.12.5-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726334" comment="krb5-32bit-1.12.5-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726343" comment="krb5-client-1.12.5-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726344" comment="krb5-doc-1.12.5-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726345" comment="krb5-plugin-kdb-ldap-1.12.5-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726346" comment="krb5-plugin-preauth-otp-1.12.5-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726347" comment="krb5-plugin-preauth-pkinit-1.12.5-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726348" comment="krb5-server-1.12.5-40.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151108" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1204471" ref_url="https://bugzilla.suse.com/1204471" source="BUGZILLA"/>
		<reference ref_id="1204472" ref_url="https://bugzilla.suse.com/1204472" source="BUGZILLA"/>
		<reference ref_id="1204473" ref_url="https://bugzilla.suse.com/1204473" source="BUGZILLA"/>
		<reference ref_id="1204475" ref_url="https://bugzilla.suse.com/1204475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013207.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u352 (icedtea-3.25.0):

- CVE-2022-21619,CVE-2022-21624: Fixed difficult to exploit vulnerability allows unauthenticated attacker with network access and can cause unauthorized update, insert or delete access via multiple protocols (bsc#1204473,bsc#1204475).
- CVE-2022-21626: Fixed easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to cause partial denial of service (bsc#1204471).
- CVE-2022-21628: Fixed easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to cause partial denial of service (bsc#1204472).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-08"/>
	<updated date="2022-12-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204471">SUSE bug 1204471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204472">SUSE bug 1204472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204473">SUSE bug 1204473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204475">SUSE bug 1204475</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21619">CVE-2022-21619 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21624">CVE-2022-21624 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21626">CVE-2022-21626 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727636" comment="java-1_8_0-openjdk-1.8.0.352-27.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727637" comment="java-1_8_0-openjdk-demo-1.8.0.352-27.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727638" comment="java-1_8_0-openjdk-devel-1.8.0.352-27.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727639" comment="java-1_8_0-openjdk-headless-1.8.0.352-27.81.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151109" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1206242" ref_url="https://bugzilla.suse.com/1206242" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-46872" ref_url="https://www.suse.com/security/cve/CVE-2022-46872/" source="CVE"/>
		<reference ref_id="CVE-2022-46874" ref_url="https://www.suse.com/security/cve/CVE-2022-46874/" source="CVE"/>
		<reference ref_id="CVE-2022-46875" ref_url="https://www.suse.com/security/cve/CVE-2022-46875/" source="CVE"/>
		<reference ref_id="CVE-2022-46878" ref_url="https://www.suse.com/security/cve/CVE-2022-46878/" source="CVE"/>
		<reference ref_id="CVE-2022-46880" ref_url="https://www.suse.com/security/cve/CVE-2022-46880/" source="CVE"/>
		<reference ref_id="CVE-2022-46881" ref_url="https://www.suse.com/security/cve/CVE-2022-46881/" source="CVE"/>
		<reference ref_id="CVE-2022-46882" ref_url="https://www.suse.com/security/cve/CVE-2022-46882/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013230.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 102.6.0 ESR (bsc#1206242):

- CVE-2022-46880: Use-after-free in WebGL
- CVE-2022-46872: Arbitrary file read from a compromised content process
- CVE-2022-46881: Memory corruption in WebGL
- CVE-2022-46874: Drag and Dropped Filenames could have been truncated to malicious extensions
- CVE-2022-46875: Download Protections were bypassed by .atloc and .ftploc files on Mac OS
- CVE-2022-46882: Use-after-free in WebGL
- CVE-2022-46878: Memory safety bugs fixed in Firefox 108 and Firefox ESR 102.6
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-13"/>
	<updated date="2022-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206242">SUSE bug 1206242</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46872/">CVE-2022-46872 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46872">CVE-2022-46872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46874/">CVE-2022-46874 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46874">CVE-2022-46874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46875/">CVE-2022-46875 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46875">CVE-2022-46875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46878/">CVE-2022-46878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46878">CVE-2022-46878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46880/">CVE-2022-46880 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46880">CVE-2022-46880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46881/">CVE-2022-46881 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46881">CVE-2022-46881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46882/">CVE-2022-46882 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46882">CVE-2022-46882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009728194" comment="MozillaFirefox-102.6.0-112.142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728195" comment="MozillaFirefox-devel-102.6.0-112.142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728196" comment="MozillaFirefox-translations-common-102.6.0-112.142.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151110" version="1" class="patch">
	<metadata>
		<title>Security update for zabbix (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1206083" ref_url="https://bugzilla.suse.com/1206083" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-43515" ref_url="https://www.suse.com/security/cve/CVE-2022-43515/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013237.html" source="SUSE-SU"/>
		<description>
This update for zabbix fixes the following issues:

- CVE-2022-43515: X-Forwarded-For header is active by default causes access to Zabbix sites in maintenance mode (bsc#1206083).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-14"/>
	<updated date="2022-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206083">SUSE bug 1206083</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-43515/">CVE-2022-43515 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43515">CVE-2022-43515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728058" comment="zabbix-agent-4.0.12-4.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151111" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1205874" ref_url="https://bugzilla.suse.com/1205874" source="BUGZILLA"/>
		<reference ref_id="1205875" ref_url="https://bugzilla.suse.com/1205875" source="BUGZILLA"/>
		<reference ref_id="1205876" ref_url="https://bugzilla.suse.com/1205876" source="BUGZILLA"/>
		<reference ref_id="1205877" ref_url="https://bugzilla.suse.com/1205877" source="BUGZILLA"/>
		<reference ref_id="1205878" ref_url="https://bugzilla.suse.com/1205878" source="BUGZILLA"/>
		<reference ref_id="1205879" ref_url="https://bugzilla.suse.com/1205879" source="BUGZILLA"/>
		<reference ref_id="1206017" ref_url="https://bugzilla.suse.com/1206017" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4283" ref_url="https://www.suse.com/security/cve/CVE-2022-4283/" source="CVE"/>
		<reference ref_id="CVE-2022-46340" ref_url="https://www.suse.com/security/cve/CVE-2022-46340/" source="CVE"/>
		<reference ref_id="CVE-2022-46341" ref_url="https://www.suse.com/security/cve/CVE-2022-46341/" source="CVE"/>
		<reference ref_id="CVE-2022-46342" ref_url="https://www.suse.com/security/cve/CVE-2022-46342/" source="CVE"/>
		<reference ref_id="CVE-2022-46343" ref_url="https://www.suse.com/security/cve/CVE-2022-46343/" source="CVE"/>
		<reference ref_id="CVE-2022-46344" ref_url="https://www.suse.com/security/cve/CVE-2022-46344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013238.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2022-46340: Server XTestSwapFakeInput stack overflow (bsc#1205874)
- CVE-2022-46341: Server XIPassiveUngrabDevice out-of-bounds access (bsc#1205877)
- CVE-2022-46342: Server XvdiSelectVideoNotify use-after-free (bsc#1205879)
- CVE-2022-46343: Server ScreenSaverSetAttributes use-after-free (bsc#1205878)
- CVE-2022-46344: Server XIChangeProperty out-of-bounds access (bsc#1205876)
- CVE-2022-4283: Reset the radio_groups pointer to NULL after freeing it (bsc#1206017)
- Xi: return an error from XI property changes if verification failed (bsc#1205875)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-14"/>
	<updated date="2022-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205874">SUSE bug 1205874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205875">SUSE bug 1205875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205876">SUSE bug 1205876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205877">SUSE bug 1205877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205878">SUSE bug 1205878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205879">SUSE bug 1205879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206017">SUSE bug 1206017</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4283/">CVE-2022-4283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4283">CVE-2022-4283 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46340/">CVE-2022-46340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46340">CVE-2022-46340 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46341/">CVE-2022-46341 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46341">CVE-2022-46341 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-46342/">CVE-2022-46342 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46342">CVE-2022-46342 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-46343/">CVE-2022-46343 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46343">CVE-2022-46343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46344/">CVE-2022-46344 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46344">CVE-2022-46344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009728989" comment="xorg-x11-server-7.6_1.18.3-76.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728990" comment="xorg-x11-server-extra-7.6_1.18.3-76.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151112" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1129898" ref_url="https://bugzilla.suse.com/1129898" source="BUGZILLA"/>
		<reference ref_id="1177282" ref_url="https://bugzilla.suse.com/1177282" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1198702" ref_url="https://bugzilla.suse.com/1198702" source="BUGZILLA"/>
		<reference ref_id="1201309" ref_url="https://bugzilla.suse.com/1201309" source="BUGZILLA"/>
		<reference ref_id="1202097" ref_url="https://bugzilla.suse.com/1202097" source="BUGZILLA"/>
		<reference ref_id="1202686" ref_url="https://bugzilla.suse.com/1202686" source="BUGZILLA"/>
		<reference ref_id="1203008" ref_url="https://bugzilla.suse.com/1203008" source="BUGZILLA"/>
		<reference ref_id="1203290" ref_url="https://bugzilla.suse.com/1203290" source="BUGZILLA"/>
		<reference ref_id="1203322" ref_url="https://bugzilla.suse.com/1203322" source="BUGZILLA"/>
		<reference ref_id="1203514" ref_url="https://bugzilla.suse.com/1203514" source="BUGZILLA"/>
		<reference ref_id="1203960" ref_url="https://bugzilla.suse.com/1203960" source="BUGZILLA"/>
		<reference ref_id="1203987" ref_url="https://bugzilla.suse.com/1203987" source="BUGZILLA"/>
		<reference ref_id="1204166" ref_url="https://bugzilla.suse.com/1204166" source="BUGZILLA"/>
		<reference ref_id="1204168" ref_url="https://bugzilla.suse.com/1204168" source="BUGZILLA"/>
		<reference ref_id="1204170" ref_url="https://bugzilla.suse.com/1204170" source="BUGZILLA"/>
		<reference ref_id="1204354" ref_url="https://bugzilla.suse.com/1204354" source="BUGZILLA"/>
		<reference ref_id="1204402" ref_url="https://bugzilla.suse.com/1204402" source="BUGZILLA"/>
		<reference ref_id="1204414" ref_url="https://bugzilla.suse.com/1204414" source="BUGZILLA"/>
		<reference ref_id="1204431" ref_url="https://bugzilla.suse.com/1204431" source="BUGZILLA"/>
		<reference ref_id="1204432" ref_url="https://bugzilla.suse.com/1204432" source="BUGZILLA"/>
		<reference ref_id="1204439" ref_url="https://bugzilla.suse.com/1204439" source="BUGZILLA"/>
		<reference ref_id="1204479" ref_url="https://bugzilla.suse.com/1204479" source="BUGZILLA"/>
		<reference ref_id="1204574" ref_url="https://bugzilla.suse.com/1204574" source="BUGZILLA"/>
		<reference ref_id="1204576" ref_url="https://bugzilla.suse.com/1204576" source="BUGZILLA"/>
		<reference ref_id="1204631" ref_url="https://bugzilla.suse.com/1204631" source="BUGZILLA"/>
		<reference ref_id="1204635" ref_url="https://bugzilla.suse.com/1204635" source="BUGZILLA"/>
		<reference ref_id="1204636" ref_url="https://bugzilla.suse.com/1204636" source="BUGZILLA"/>
		<reference ref_id="1204646" ref_url="https://bugzilla.suse.com/1204646" source="BUGZILLA"/>
		<reference ref_id="1204647" ref_url="https://bugzilla.suse.com/1204647" source="BUGZILLA"/>
		<reference ref_id="1204653" ref_url="https://bugzilla.suse.com/1204653" source="BUGZILLA"/>
		<reference ref_id="1204868" ref_url="https://bugzilla.suse.com/1204868" source="BUGZILLA"/>
		<reference ref_id="1205128" ref_url="https://bugzilla.suse.com/1205128" source="BUGZILLA"/>
		<reference ref_id="1205130" ref_url="https://bugzilla.suse.com/1205130" source="BUGZILLA"/>
		<reference ref_id="1205220" ref_url="https://bugzilla.suse.com/1205220" source="BUGZILLA"/>
		<reference ref_id="1205514" ref_url="https://bugzilla.suse.com/1205514" source="BUGZILLA"/>
		<reference ref_id="1205671" ref_url="https://bugzilla.suse.com/1205671" source="BUGZILLA"/>
		<reference ref_id="1205796" ref_url="https://bugzilla.suse.com/1205796" source="BUGZILLA"/>
		<reference ref_id="1206164" ref_url="https://bugzilla.suse.com/1206164" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3874" ref_url="https://www.suse.com/security/cve/CVE-2019-3874/" source="CVE"/>
		<reference ref_id="CVE-2020-26541" ref_url="https://www.suse.com/security/cve/CVE-2020-26541/" source="CVE"/>
		<reference ref_id="CVE-2021-4037" ref_url="https://www.suse.com/security/cve/CVE-2021-4037/" source="CVE"/>
		<reference ref_id="CVE-2022-2663" ref_url="https://www.suse.com/security/cve/CVE-2022-2663/" source="CVE"/>
		<reference ref_id="CVE-2022-28748" ref_url="https://www.suse.com/security/cve/CVE-2022-28748/" source="CVE"/>
		<reference ref_id="CVE-2022-2964" ref_url="https://www.suse.com/security/cve/CVE-2022-2964/" source="CVE"/>
		<reference ref_id="CVE-2022-3169" ref_url="https://www.suse.com/security/cve/CVE-2022-3169/" source="CVE"/>
		<reference ref_id="CVE-2022-3424" ref_url="https://www.suse.com/security/cve/CVE-2022-3424/" source="CVE"/>
		<reference ref_id="CVE-2022-3524" ref_url="https://www.suse.com/security/cve/CVE-2022-3524/" source="CVE"/>
		<reference ref_id="CVE-2022-3542" ref_url="https://www.suse.com/security/cve/CVE-2022-3542/" source="CVE"/>
		<reference ref_id="CVE-2022-3565" ref_url="https://www.suse.com/security/cve/CVE-2022-3565/" source="CVE"/>
		<reference ref_id="CVE-2022-3567" ref_url="https://www.suse.com/security/cve/CVE-2022-3567/" source="CVE"/>
		<reference ref_id="CVE-2022-3586" ref_url="https://www.suse.com/security/cve/CVE-2022-3586/" source="CVE"/>
		<reference ref_id="CVE-2022-3594" ref_url="https://www.suse.com/security/cve/CVE-2022-3594/" source="CVE"/>
		<reference ref_id="CVE-2022-3621" ref_url="https://www.suse.com/security/cve/CVE-2022-3621/" source="CVE"/>
		<reference ref_id="CVE-2022-3628" ref_url="https://www.suse.com/security/cve/CVE-2022-3628/" source="CVE"/>
		<reference ref_id="CVE-2022-3629" ref_url="https://www.suse.com/security/cve/CVE-2022-3629/" source="CVE"/>
		<reference ref_id="CVE-2022-3635" ref_url="https://www.suse.com/security/cve/CVE-2022-3635/" source="CVE"/>
		<reference ref_id="CVE-2022-3646" ref_url="https://www.suse.com/security/cve/CVE-2022-3646/" source="CVE"/>
		<reference ref_id="CVE-2022-3649" ref_url="https://www.suse.com/security/cve/CVE-2022-3649/" source="CVE"/>
		<reference ref_id="CVE-2022-3903" ref_url="https://www.suse.com/security/cve/CVE-2022-3903/" source="CVE"/>
		<reference ref_id="CVE-2022-40307" ref_url="https://www.suse.com/security/cve/CVE-2022-40307/" source="CVE"/>
		<reference ref_id="CVE-2022-40768" ref_url="https://www.suse.com/security/cve/CVE-2022-40768/" source="CVE"/>
		<reference ref_id="CVE-2022-4095" ref_url="https://www.suse.com/security/cve/CVE-2022-4095/" source="CVE"/>
		<reference ref_id="CVE-2022-41848" ref_url="https://www.suse.com/security/cve/CVE-2022-41848/" source="CVE"/>
		<reference ref_id="CVE-2022-41850" ref_url="https://www.suse.com/security/cve/CVE-2022-41850/" source="CVE"/>
		<reference ref_id="CVE-2022-41858" ref_url="https://www.suse.com/security/cve/CVE-2022-41858/" source="CVE"/>
		<reference ref_id="CVE-2022-42703" ref_url="https://www.suse.com/security/cve/CVE-2022-42703/" source="CVE"/>
		<reference ref_id="CVE-2022-43750" ref_url="https://www.suse.com/security/cve/CVE-2022-43750/" source="CVE"/>
		<reference ref_id="CVE-2022-43945" ref_url="https://www.suse.com/security/cve/CVE-2022-43945/" source="CVE"/>
		<reference ref_id="CVE-2022-45934" ref_url="https://www.suse.com/security/cve/CVE-2022-45934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).
- CVE-2022-3424: Fixed use-after-free in gru_set_context_option(), gru_fault() and gru_handle_user_call_os() that could lead to kernel panic (bsc#1204166).
- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).
- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).
- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).
- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).
- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).
- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).
- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).
- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).
- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).
- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bsc#1198702).
- CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space client to corrupt the monitor's internal memory (bsc#1204653).
- CVE-2020-26541: Enforce the secure boot forbidden signature database (aka dbx) protection mechanism (bsc#1177282).
- CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c (bsc#1204402).
- CVE-2022-3629: Fixed memory leak in vsock_connect() in net/vmw_vsock/af_vsock.c (bsc#1204635).
- CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/segment.c (bsc#1204646).
- CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/inode.c (bsc#1204647).
- CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bsc#1204574).
- CVE-2022-3594: Fixed excessive data logging in intr_callback() in drivers/net/usb/r8152.c (bsc#1204479).
- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).
- CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/l1oip_core.c (bsc#1204431).
- CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6 handler (bsc#1204354).
- CVE-2022-2663: Fixed an issue which allowed a firewall to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured (bsc#1202097).
- CVE-2022-40768: Fixed information leak in the scsi driver which allowed local users to obtain sensitive information from kernel memory (bsc#1203514).
- CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf anon_vma double reuse (bsc#1204168).
- CVE-2022-3169: Fixed an denial of service though request to NVME_IOCTL_RESET and NVME_IOCTL_SUBSYS_RESET (bsc#1203290).
- CVE-2022-40307: Fixed a race condition that could had been exploited to trigger a use-after-free in the efi firmware capsule-loader.c (bsc#1203322).
- CVE-2022-41848: Fixed a race condition in drivers/char/pcmcia/synclink_cs.c mgslpc_ioctl and mgslpc_detach (bsc#1203987).

The following non-security bugs were fixed:

- net: mana: Add rmb after checking owner bits (git-fixes).
- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).
- x86/hyperv: Output host build info as normal Windows version number (git-fixes).
- x86/hyperv: Set pv_info.name to 'Hyper-V' (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-23"/>
	<updated date="2022-12-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129898">SUSE bug 1129898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177282">SUSE bug 1177282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198702">SUSE bug 1198702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201309">SUSE bug 1201309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202097">SUSE bug 1202097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202686">SUSE bug 1202686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203008">SUSE bug 1203008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203290">SUSE bug 1203290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203322">SUSE bug 1203322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203514">SUSE bug 1203514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203960">SUSE bug 1203960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203987">SUSE bug 1203987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204166">SUSE bug 1204166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204168">SUSE bug 1204168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204170">SUSE bug 1204170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204354">SUSE bug 1204354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204402">SUSE bug 1204402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204414">SUSE bug 1204414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204431">SUSE bug 1204431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204432">SUSE bug 1204432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204439">SUSE bug 1204439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204479">SUSE bug 1204479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204574">SUSE bug 1204574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204576">SUSE bug 1204576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204631">SUSE bug 1204631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204635">SUSE bug 1204635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204636">SUSE bug 1204636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204646">SUSE bug 1204646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204647">SUSE bug 1204647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204653">SUSE bug 1204653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204868">SUSE bug 1204868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205128">SUSE bug 1205128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205130">SUSE bug 1205130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205220">SUSE bug 1205220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205514">SUSE bug 1205514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205671">SUSE bug 1205671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205796">SUSE bug 1205796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206164">SUSE bug 1206164</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3874/">CVE-2019-3874 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3874">CVE-2019-3874 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26541/">CVE-2020-26541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26541">CVE-2020-26541 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4037/">CVE-2021-4037 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4037">CVE-2021-4037 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2663/">CVE-2022-2663 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2663">CVE-2022-2663 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28748/">CVE-2022-28748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-28748">CVE-2022-28748 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2964/">CVE-2022-2964 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2964">CVE-2022-2964 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3169/">CVE-2022-3169 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3169">CVE-2022-3169 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3424/">CVE-2022-3424 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3424">CVE-2022-3424 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3524/">CVE-2022-3524 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3524">CVE-2022-3524 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3542/">CVE-2022-3542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3542">CVE-2022-3542 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3565/">CVE-2022-3565 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3565">CVE-2022-3565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3567/">CVE-2022-3567 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3567">CVE-2022-3567 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3586/">CVE-2022-3586 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3586">CVE-2022-3586 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3594/">CVE-2022-3594 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3594">CVE-2022-3594 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3621/">CVE-2022-3621 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3621">CVE-2022-3621 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3628/">CVE-2022-3628 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3628">CVE-2022-3628 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3629/">CVE-2022-3629 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3629">CVE-2022-3629 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3635/">CVE-2022-3635 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3635">CVE-2022-3635 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3646/">CVE-2022-3646 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3646">CVE-2022-3646 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3649/">CVE-2022-3649 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3649">CVE-2022-3649 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3903/">CVE-2022-3903 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3903">CVE-2022-3903 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40307/">CVE-2022-40307 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40307">CVE-2022-40307 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40768/">CVE-2022-40768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40768">CVE-2022-40768 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4095/">CVE-2022-4095 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4095">CVE-2022-4095 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41848/">CVE-2022-41848 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41848">CVE-2022-41848 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-41850/">CVE-2022-41850 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41850">CVE-2022-41850 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41858/">CVE-2022-41858 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41858">CVE-2022-41858 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42703/">CVE-2022-42703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42703">CVE-2022-42703 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43750/">CVE-2022-43750 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43750">CVE-2022-43750 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43945/">CVE-2022-43945 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43945">CVE-2022-43945 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45934/">CVE-2022-45934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009728397" comment="kernel-default-4.4.180-94.182.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728398" comment="kernel-default-base-4.4.180-94.182.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728399" comment="kernel-default-devel-4.4.180-94.182.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728400" comment="kernel-devel-4.4.180-94.182.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728401" comment="kernel-macros-4.4.180-94.182.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728402" comment="kernel-source-4.4.180-94.182.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728403" comment="kernel-syms-4.4.180-94.182.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151113" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1070955" ref_url="https://bugzilla.suse.com/1070955" source="BUGZILLA"/>
		<reference ref_id="1173256" ref_url="https://bugzilla.suse.com/1173256" source="BUGZILLA"/>
		<reference ref_id="1174564" ref_url="https://bugzilla.suse.com/1174564" source="BUGZILLA"/>
		<reference ref_id="1176549" ref_url="https://bugzilla.suse.com/1176549" source="BUGZILLA"/>
		<reference ref_id="1182324" ref_url="https://bugzilla.suse.com/1182324" source="BUGZILLA"/>
		<reference ref_id="1190533" ref_url="https://bugzilla.suse.com/1190533" source="BUGZILLA"/>
		<reference ref_id="1190570" ref_url="https://bugzilla.suse.com/1190570" source="BUGZILLA"/>
		<reference ref_id="1191770" ref_url="https://bugzilla.suse.com/1191770" source="BUGZILLA"/>
		<reference ref_id="1191893" ref_url="https://bugzilla.suse.com/1191893" source="BUGZILLA"/>
		<reference ref_id="1192167" ref_url="https://bugzilla.suse.com/1192167" source="BUGZILLA"/>
		<reference ref_id="1192478" ref_url="https://bugzilla.suse.com/1192478" source="BUGZILLA"/>
		<reference ref_id="1192481" ref_url="https://bugzilla.suse.com/1192481" source="BUGZILLA"/>
		<reference ref_id="1192902" ref_url="https://bugzilla.suse.com/1192902" source="BUGZILLA"/>
		<reference ref_id="1192903" ref_url="https://bugzilla.suse.com/1192903" source="BUGZILLA"/>
		<reference ref_id="1192904" ref_url="https://bugzilla.suse.com/1192904" source="BUGZILLA"/>
		<reference ref_id="1193294" ref_url="https://bugzilla.suse.com/1193294" source="BUGZILLA"/>
		<reference ref_id="1193298" ref_url="https://bugzilla.suse.com/1193298" source="BUGZILLA"/>
		<reference ref_id="1193466" ref_url="https://bugzilla.suse.com/1193466" source="BUGZILLA"/>
		<reference ref_id="1193905" ref_url="https://bugzilla.suse.com/1193905" source="BUGZILLA"/>
		<reference ref_id="1194093" ref_url="https://bugzilla.suse.com/1194093" source="BUGZILLA"/>
		<reference ref_id="1194216" ref_url="https://bugzilla.suse.com/1194216" source="BUGZILLA"/>
		<reference ref_id="1194217" ref_url="https://bugzilla.suse.com/1194217" source="BUGZILLA"/>
		<reference ref_id="1194388" ref_url="https://bugzilla.suse.com/1194388" source="BUGZILLA"/>
		<reference ref_id="1194556" ref_url="https://bugzilla.suse.com/1194556" source="BUGZILLA"/>
		<reference ref_id="1194872" ref_url="https://bugzilla.suse.com/1194872" source="BUGZILLA"/>
		<reference ref_id="1194885" ref_url="https://bugzilla.suse.com/1194885" source="BUGZILLA"/>
		<reference ref_id="1195004" ref_url="https://bugzilla.suse.com/1195004" source="BUGZILLA"/>
		<reference ref_id="1195066" ref_url="https://bugzilla.suse.com/1195066" source="BUGZILLA"/>
		<reference ref_id="1195126" ref_url="https://bugzilla.suse.com/1195126" source="BUGZILLA"/>
		<reference ref_id="1195202" ref_url="https://bugzilla.suse.com/1195202" source="BUGZILLA"/>
		<reference ref_id="1195203" ref_url="https://bugzilla.suse.com/1195203" source="BUGZILLA"/>
		<reference ref_id="1195332" ref_url="https://bugzilla.suse.com/1195332" source="BUGZILLA"/>
		<reference ref_id="1195354" ref_url="https://bugzilla.suse.com/1195354" source="BUGZILLA"/>
		<reference ref_id="1195356" ref_url="https://bugzilla.suse.com/1195356" source="BUGZILLA"/>
		<reference ref_id="1196361" ref_url="https://bugzilla.suse.com/1196361" source="BUGZILLA"/>
		<reference ref_id="1198596" ref_url="https://bugzilla.suse.com/1198596" source="BUGZILLA"/>
		<reference ref_id="1198748" ref_url="https://bugzilla.suse.com/1198748" source="BUGZILLA"/>
		<reference ref_id="1199331" ref_url="https://bugzilla.suse.com/1199331" source="BUGZILLA"/>
		<reference ref_id="1199333" ref_url="https://bugzilla.suse.com/1199333" source="BUGZILLA"/>
		<reference ref_id="1199334" ref_url="https://bugzilla.suse.com/1199334" source="BUGZILLA"/>
		<reference ref_id="1199651" ref_url="https://bugzilla.suse.com/1199651" source="BUGZILLA"/>
		<reference ref_id="1199655" ref_url="https://bugzilla.suse.com/1199655" source="BUGZILLA"/>
		<reference ref_id="1199693" ref_url="https://bugzilla.suse.com/1199693" source="BUGZILLA"/>
		<reference ref_id="1199745" ref_url="https://bugzilla.suse.com/1199745" source="BUGZILLA"/>
		<reference ref_id="1199747" ref_url="https://bugzilla.suse.com/1199747" source="BUGZILLA"/>
		<reference ref_id="1199936" ref_url="https://bugzilla.suse.com/1199936" source="BUGZILLA"/>
		<reference ref_id="1200010" ref_url="https://bugzilla.suse.com/1200010" source="BUGZILLA"/>
		<reference ref_id="1200011" ref_url="https://bugzilla.suse.com/1200011" source="BUGZILLA"/>
		<reference ref_id="1200012" ref_url="https://bugzilla.suse.com/1200012" source="BUGZILLA"/>
		<reference ref_id="1200270" ref_url="https://bugzilla.suse.com/1200270" source="BUGZILLA"/>
		<reference ref_id="1200697" ref_url="https://bugzilla.suse.com/1200697" source="BUGZILLA"/>
		<reference ref_id="1200698" ref_url="https://bugzilla.suse.com/1200698" source="BUGZILLA"/>
		<reference ref_id="1200700" ref_url="https://bugzilla.suse.com/1200700" source="BUGZILLA"/>
		<reference ref_id="1200701" ref_url="https://bugzilla.suse.com/1200701" source="BUGZILLA"/>
		<reference ref_id="1200732" ref_url="https://bugzilla.suse.com/1200732" source="BUGZILLA"/>
		<reference ref_id="1200884" ref_url="https://bugzilla.suse.com/1200884" source="BUGZILLA"/>
		<reference ref_id="1200902" ref_url="https://bugzilla.suse.com/1200902" source="BUGZILLA"/>
		<reference ref_id="1200903" ref_url="https://bugzilla.suse.com/1200903" source="BUGZILLA"/>
		<reference ref_id="1200904" ref_url="https://bugzilla.suse.com/1200904" source="BUGZILLA"/>
		<reference ref_id="1201132" ref_url="https://bugzilla.suse.com/1201132" source="BUGZILLA"/>
		<reference ref_id="1201133" ref_url="https://bugzilla.suse.com/1201133" source="BUGZILLA"/>
		<reference ref_id="1201134" ref_url="https://bugzilla.suse.com/1201134" source="BUGZILLA"/>
		<reference ref_id="1201135" ref_url="https://bugzilla.suse.com/1201135" source="BUGZILLA"/>
		<reference ref_id="1201136" ref_url="https://bugzilla.suse.com/1201136" source="BUGZILLA"/>
		<reference ref_id="1201150" ref_url="https://bugzilla.suse.com/1201150" source="BUGZILLA"/>
		<reference ref_id="1201151" ref_url="https://bugzilla.suse.com/1201151" source="BUGZILLA"/>
		<reference ref_id="1201152" ref_url="https://bugzilla.suse.com/1201152" source="BUGZILLA"/>
		<reference ref_id="1201153" ref_url="https://bugzilla.suse.com/1201153" source="BUGZILLA"/>
		<reference ref_id="1201154" ref_url="https://bugzilla.suse.com/1201154" source="BUGZILLA"/>
		<reference ref_id="1201155" ref_url="https://bugzilla.suse.com/1201155" source="BUGZILLA"/>
		<reference ref_id="1201249" ref_url="https://bugzilla.suse.com/1201249" source="BUGZILLA"/>
		<reference ref_id="1201356" ref_url="https://bugzilla.suse.com/1201356" source="BUGZILLA"/>
		<reference ref_id="1201359" ref_url="https://bugzilla.suse.com/1201359" source="BUGZILLA"/>
		<reference ref_id="1201363" ref_url="https://bugzilla.suse.com/1201363" source="BUGZILLA"/>
		<reference ref_id="1201620" ref_url="https://bugzilla.suse.com/1201620" source="BUGZILLA"/>
		<reference ref_id="1201863" ref_url="https://bugzilla.suse.com/1201863" source="BUGZILLA"/>
		<reference ref_id="1202046" ref_url="https://bugzilla.suse.com/1202046" source="BUGZILLA"/>
		<reference ref_id="1202049" ref_url="https://bugzilla.suse.com/1202049" source="BUGZILLA"/>
		<reference ref_id="1202050" ref_url="https://bugzilla.suse.com/1202050" source="BUGZILLA"/>
		<reference ref_id="1202051" ref_url="https://bugzilla.suse.com/1202051" source="BUGZILLA"/>
		<reference ref_id="1202414" ref_url="https://bugzilla.suse.com/1202414" source="BUGZILLA"/>
		<reference ref_id="1202420" ref_url="https://bugzilla.suse.com/1202420" source="BUGZILLA"/>
		<reference ref_id="1202421" ref_url="https://bugzilla.suse.com/1202421" source="BUGZILLA"/>
		<reference ref_id="1202511" ref_url="https://bugzilla.suse.com/1202511" source="BUGZILLA"/>
		<reference ref_id="1202512" ref_url="https://bugzilla.suse.com/1202512" source="BUGZILLA"/>
		<reference ref_id="1202515" ref_url="https://bugzilla.suse.com/1202515" source="BUGZILLA"/>
		<reference ref_id="1202552" ref_url="https://bugzilla.suse.com/1202552" source="BUGZILLA"/>
		<reference ref_id="1202599" ref_url="https://bugzilla.suse.com/1202599" source="BUGZILLA"/>
		<reference ref_id="1202687" ref_url="https://bugzilla.suse.com/1202687" source="BUGZILLA"/>
		<reference ref_id="1202689" ref_url="https://bugzilla.suse.com/1202689" source="BUGZILLA"/>
		<reference ref_id="1202862" ref_url="https://bugzilla.suse.com/1202862" source="BUGZILLA"/>
		<reference ref_id="1202962" ref_url="https://bugzilla.suse.com/1202962" source="BUGZILLA"/>
		<reference ref_id="1203110" ref_url="https://bugzilla.suse.com/1203110" source="BUGZILLA"/>
		<reference ref_id="1203152" ref_url="https://bugzilla.suse.com/1203152" source="BUGZILLA"/>
		<reference ref_id="1203155" ref_url="https://bugzilla.suse.com/1203155" source="BUGZILLA"/>
		<reference ref_id="1203194" ref_url="https://bugzilla.suse.com/1203194" source="BUGZILLA"/>
		<reference ref_id="1203272" ref_url="https://bugzilla.suse.com/1203272" source="BUGZILLA"/>
		<reference ref_id="1203508" ref_url="https://bugzilla.suse.com/1203508" source="BUGZILLA"/>
		<reference ref_id="1203509" ref_url="https://bugzilla.suse.com/1203509" source="BUGZILLA"/>
		<reference ref_id="1203796" ref_url="https://bugzilla.suse.com/1203796" source="BUGZILLA"/>
		<reference ref_id="1203797" ref_url="https://bugzilla.suse.com/1203797" source="BUGZILLA"/>
		<reference ref_id="1203799" ref_url="https://bugzilla.suse.com/1203799" source="BUGZILLA"/>
		<reference ref_id="1203820" ref_url="https://bugzilla.suse.com/1203820" source="BUGZILLA"/>
		<reference ref_id="1203924" ref_url="https://bugzilla.suse.com/1203924" source="BUGZILLA"/>
		<reference ref_id="1204779" ref_url="https://bugzilla.suse.com/1204779" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0316" ref_url="https://www.suse.com/security/cve/CVE-2009-0316/" source="CVE"/>
		<reference ref_id="CVE-2016-1248" ref_url="https://www.suse.com/security/cve/CVE-2016-1248/" source="CVE"/>
		<reference ref_id="CVE-2017-17087" ref_url="https://www.suse.com/security/cve/CVE-2017-17087/" source="CVE"/>
		<reference ref_id="CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953/" source="CVE"/>
		<reference ref_id="CVE-2017-6349" ref_url="https://www.suse.com/security/cve/CVE-2017-6349/" source="CVE"/>
		<reference ref_id="CVE-2017-6350" ref_url="https://www.suse.com/security/cve/CVE-2017-6350/" source="CVE"/>
		<reference ref_id="CVE-2021-3778" ref_url="https://www.suse.com/security/cve/CVE-2021-3778/" source="CVE"/>
		<reference ref_id="CVE-2021-3796" ref_url="https://www.suse.com/security/cve/CVE-2021-3796/" source="CVE"/>
		<reference ref_id="CVE-2021-3872" ref_url="https://www.suse.com/security/cve/CVE-2021-3872/" source="CVE"/>
		<reference ref_id="CVE-2021-3875" ref_url="https://www.suse.com/security/cve/CVE-2021-3875/" source="CVE"/>
		<reference ref_id="CVE-2021-3903" ref_url="https://www.suse.com/security/cve/CVE-2021-3903/" source="CVE"/>
		<reference ref_id="CVE-2021-3927" ref_url="https://www.suse.com/security/cve/CVE-2021-3927/" source="CVE"/>
		<reference ref_id="CVE-2021-3928" ref_url="https://www.suse.com/security/cve/CVE-2021-3928/" source="CVE"/>
		<reference ref_id="CVE-2021-3968" ref_url="https://www.suse.com/security/cve/CVE-2021-3968/" source="CVE"/>
		<reference ref_id="CVE-2021-3973" ref_url="https://www.suse.com/security/cve/CVE-2021-3973/" source="CVE"/>
		<reference ref_id="CVE-2021-3974" ref_url="https://www.suse.com/security/cve/CVE-2021-3974/" source="CVE"/>
		<reference ref_id="CVE-2021-3984" ref_url="https://www.suse.com/security/cve/CVE-2021-3984/" source="CVE"/>
		<reference ref_id="CVE-2021-4019" ref_url="https://www.suse.com/security/cve/CVE-2021-4019/" source="CVE"/>
		<reference ref_id="CVE-2021-4069" ref_url="https://www.suse.com/security/cve/CVE-2021-4069/" source="CVE"/>
		<reference ref_id="CVE-2021-4136" ref_url="https://www.suse.com/security/cve/CVE-2021-4136/" source="CVE"/>
		<reference ref_id="CVE-2021-4166" ref_url="https://www.suse.com/security/cve/CVE-2021-4166/" source="CVE"/>
		<reference ref_id="CVE-2021-4192" ref_url="https://www.suse.com/security/cve/CVE-2021-4192/" source="CVE"/>
		<reference ref_id="CVE-2021-4193" ref_url="https://www.suse.com/security/cve/CVE-2021-4193/" source="CVE"/>
		<reference ref_id="CVE-2021-46059" ref_url="https://www.suse.com/security/cve/CVE-2021-46059/" source="CVE"/>
		<reference ref_id="CVE-2022-0128" ref_url="https://www.suse.com/security/cve/CVE-2022-0128/" source="CVE"/>
		<reference ref_id="CVE-2022-0213" ref_url="https://www.suse.com/security/cve/CVE-2022-0213/" source="CVE"/>
		<reference ref_id="CVE-2022-0261" ref_url="https://www.suse.com/security/cve/CVE-2022-0261/" source="CVE"/>
		<reference ref_id="CVE-2022-0318" ref_url="https://www.suse.com/security/cve/CVE-2022-0318/" source="CVE"/>
		<reference ref_id="CVE-2022-0319" ref_url="https://www.suse.com/security/cve/CVE-2022-0319/" source="CVE"/>
		<reference ref_id="CVE-2022-0351" ref_url="https://www.suse.com/security/cve/CVE-2022-0351/" source="CVE"/>
		<reference ref_id="CVE-2022-0359" ref_url="https://www.suse.com/security/cve/CVE-2022-0359/" source="CVE"/>
		<reference ref_id="CVE-2022-0361" ref_url="https://www.suse.com/security/cve/CVE-2022-0361/" source="CVE"/>
		<reference ref_id="CVE-2022-0392" ref_url="https://www.suse.com/security/cve/CVE-2022-0392/" source="CVE"/>
		<reference ref_id="CVE-2022-0407" ref_url="https://www.suse.com/security/cve/CVE-2022-0407/" source="CVE"/>
		<reference ref_id="CVE-2022-0413" ref_url="https://www.suse.com/security/cve/CVE-2022-0413/" source="CVE"/>
		<reference ref_id="CVE-2022-0696" ref_url="https://www.suse.com/security/cve/CVE-2022-0696/" source="CVE"/>
		<reference ref_id="CVE-2022-1381" ref_url="https://www.suse.com/security/cve/CVE-2022-1381/" source="CVE"/>
		<reference ref_id="CVE-2022-1420" ref_url="https://www.suse.com/security/cve/CVE-2022-1420/" source="CVE"/>
		<reference ref_id="CVE-2022-1616" ref_url="https://www.suse.com/security/cve/CVE-2022-1616/" source="CVE"/>
		<reference ref_id="CVE-2022-1619" ref_url="https://www.suse.com/security/cve/CVE-2022-1619/" source="CVE"/>
		<reference ref_id="CVE-2022-1620" ref_url="https://www.suse.com/security/cve/CVE-2022-1620/" source="CVE"/>
		<reference ref_id="CVE-2022-1720" ref_url="https://www.suse.com/security/cve/CVE-2022-1720/" source="CVE"/>
		<reference ref_id="CVE-2022-1733" ref_url="https://www.suse.com/security/cve/CVE-2022-1733/" source="CVE"/>
		<reference ref_id="CVE-2022-1735" ref_url="https://www.suse.com/security/cve/CVE-2022-1735/" source="CVE"/>
		<reference ref_id="CVE-2022-1771" ref_url="https://www.suse.com/security/cve/CVE-2022-1771/" source="CVE"/>
		<reference ref_id="CVE-2022-1785" ref_url="https://www.suse.com/security/cve/CVE-2022-1785/" source="CVE"/>
		<reference ref_id="CVE-2022-1796" ref_url="https://www.suse.com/security/cve/CVE-2022-1796/" source="CVE"/>
		<reference ref_id="CVE-2022-1851" ref_url="https://www.suse.com/security/cve/CVE-2022-1851/" source="CVE"/>
		<reference ref_id="CVE-2022-1897" ref_url="https://www.suse.com/security/cve/CVE-2022-1897/" source="CVE"/>
		<reference ref_id="CVE-2022-1898" ref_url="https://www.suse.com/security/cve/CVE-2022-1898/" source="CVE"/>
		<reference ref_id="CVE-2022-1927" ref_url="https://www.suse.com/security/cve/CVE-2022-1927/" source="CVE"/>
		<reference ref_id="CVE-2022-1968" ref_url="https://www.suse.com/security/cve/CVE-2022-1968/" source="CVE"/>
		<reference ref_id="CVE-2022-2124" ref_url="https://www.suse.com/security/cve/CVE-2022-2124/" source="CVE"/>
		<reference ref_id="CVE-2022-2125" ref_url="https://www.suse.com/security/cve/CVE-2022-2125/" source="CVE"/>
		<reference ref_id="CVE-2022-2126" ref_url="https://www.suse.com/security/cve/CVE-2022-2126/" source="CVE"/>
		<reference ref_id="CVE-2022-2129" ref_url="https://www.suse.com/security/cve/CVE-2022-2129/" source="CVE"/>
		<reference ref_id="CVE-2022-2175" ref_url="https://www.suse.com/security/cve/CVE-2022-2175/" source="CVE"/>
		<reference ref_id="CVE-2022-2182" ref_url="https://www.suse.com/security/cve/CVE-2022-2182/" source="CVE"/>
		<reference ref_id="CVE-2022-2183" ref_url="https://www.suse.com/security/cve/CVE-2022-2183/" source="CVE"/>
		<reference ref_id="CVE-2022-2206" ref_url="https://www.suse.com/security/cve/CVE-2022-2206/" source="CVE"/>
		<reference ref_id="CVE-2022-2207" ref_url="https://www.suse.com/security/cve/CVE-2022-2207/" source="CVE"/>
		<reference ref_id="CVE-2022-2208" ref_url="https://www.suse.com/security/cve/CVE-2022-2208/" source="CVE"/>
		<reference ref_id="CVE-2022-2210" ref_url="https://www.suse.com/security/cve/CVE-2022-2210/" source="CVE"/>
		<reference ref_id="CVE-2022-2231" ref_url="https://www.suse.com/security/cve/CVE-2022-2231/" source="CVE"/>
		<reference ref_id="CVE-2022-2257" ref_url="https://www.suse.com/security/cve/CVE-2022-2257/" source="CVE"/>
		<reference ref_id="CVE-2022-2264" ref_url="https://www.suse.com/security/cve/CVE-2022-2264/" source="CVE"/>
		<reference ref_id="CVE-2022-2284" ref_url="https://www.suse.com/security/cve/CVE-2022-2284/" source="CVE"/>
		<reference ref_id="CVE-2022-2285" ref_url="https://www.suse.com/security/cve/CVE-2022-2285/" source="CVE"/>
		<reference ref_id="CVE-2022-2286" ref_url="https://www.suse.com/security/cve/CVE-2022-2286/" source="CVE"/>
		<reference ref_id="CVE-2022-2287" ref_url="https://www.suse.com/security/cve/CVE-2022-2287/" source="CVE"/>
		<reference ref_id="CVE-2022-2304" ref_url="https://www.suse.com/security/cve/CVE-2022-2304/" source="CVE"/>
		<reference ref_id="CVE-2022-2343" ref_url="https://www.suse.com/security/cve/CVE-2022-2343/" source="CVE"/>
		<reference ref_id="CVE-2022-2344" ref_url="https://www.suse.com/security/cve/CVE-2022-2344/" source="CVE"/>
		<reference ref_id="CVE-2022-2345" ref_url="https://www.suse.com/security/cve/CVE-2022-2345/" source="CVE"/>
		<reference ref_id="CVE-2022-2522" ref_url="https://www.suse.com/security/cve/CVE-2022-2522/" source="CVE"/>
		<reference ref_id="CVE-2022-2571" ref_url="https://www.suse.com/security/cve/CVE-2022-2571/" source="CVE"/>
		<reference ref_id="CVE-2022-2580" ref_url="https://www.suse.com/security/cve/CVE-2022-2580/" source="CVE"/>
		<reference ref_id="CVE-2022-2581" ref_url="https://www.suse.com/security/cve/CVE-2022-2581/" source="CVE"/>
		<reference ref_id="CVE-2022-2598" ref_url="https://www.suse.com/security/cve/CVE-2022-2598/" source="CVE"/>
		<reference ref_id="CVE-2022-2816" ref_url="https://www.suse.com/security/cve/CVE-2022-2816/" source="CVE"/>
		<reference ref_id="CVE-2022-2817" ref_url="https://www.suse.com/security/cve/CVE-2022-2817/" source="CVE"/>
		<reference ref_id="CVE-2022-2819" ref_url="https://www.suse.com/security/cve/CVE-2022-2819/" source="CVE"/>
		<reference ref_id="CVE-2022-2845" ref_url="https://www.suse.com/security/cve/CVE-2022-2845/" source="CVE"/>
		<reference ref_id="CVE-2022-2849" ref_url="https://www.suse.com/security/cve/CVE-2022-2849/" source="CVE"/>
		<reference ref_id="CVE-2022-2862" ref_url="https://www.suse.com/security/cve/CVE-2022-2862/" source="CVE"/>
		<reference ref_id="CVE-2022-2874" ref_url="https://www.suse.com/security/cve/CVE-2022-2874/" source="CVE"/>
		<reference ref_id="CVE-2022-2889" ref_url="https://www.suse.com/security/cve/CVE-2022-2889/" source="CVE"/>
		<reference ref_id="CVE-2022-2923" ref_url="https://www.suse.com/security/cve/CVE-2022-2923/" source="CVE"/>
		<reference ref_id="CVE-2022-2946" ref_url="https://www.suse.com/security/cve/CVE-2022-2946/" source="CVE"/>
		<reference ref_id="CVE-2022-2980" ref_url="https://www.suse.com/security/cve/CVE-2022-2980/" source="CVE"/>
		<reference ref_id="CVE-2022-2982" ref_url="https://www.suse.com/security/cve/CVE-2022-2982/" source="CVE"/>
		<reference ref_id="CVE-2022-3016" ref_url="https://www.suse.com/security/cve/CVE-2022-3016/" source="CVE"/>
		<reference ref_id="CVE-2022-3037" ref_url="https://www.suse.com/security/cve/CVE-2022-3037/" source="CVE"/>
		<reference ref_id="CVE-2022-3099" ref_url="https://www.suse.com/security/cve/CVE-2022-3099/" source="CVE"/>
		<reference ref_id="CVE-2022-3134" ref_url="https://www.suse.com/security/cve/CVE-2022-3134/" source="CVE"/>
		<reference ref_id="CVE-2022-3153" ref_url="https://www.suse.com/security/cve/CVE-2022-3153/" source="CVE"/>
		<reference ref_id="CVE-2022-3234" ref_url="https://www.suse.com/security/cve/CVE-2022-3234/" source="CVE"/>
		<reference ref_id="CVE-2022-3235" ref_url="https://www.suse.com/security/cve/CVE-2022-3235/" source="CVE"/>
		<reference ref_id="CVE-2022-3278" ref_url="https://www.suse.com/security/cve/CVE-2022-3278/" source="CVE"/>
		<reference ref_id="CVE-2022-3296" ref_url="https://www.suse.com/security/cve/CVE-2022-3296/" source="CVE"/>
		<reference ref_id="CVE-2022-3297" ref_url="https://www.suse.com/security/cve/CVE-2022-3297/" source="CVE"/>
		<reference ref_id="CVE-2022-3324" ref_url="https://www.suse.com/security/cve/CVE-2022-3324/" source="CVE"/>
		<reference ref_id="CVE-2022-3352" ref_url="https://www.suse.com/security/cve/CVE-2022-3352/" source="CVE"/>
		<reference ref_id="CVE-2022-3705" ref_url="https://www.suse.com/security/cve/CVE-2022-3705/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

Updated to version 9.0.0814:

  * Fixing bsc#1192478 VUL-1: CVE-2021-3928: vim: vim is vulnerable to Stack-based Buffer Overflow
  * Fixing bsc#1203508 VUL-0: CVE-2022-3234: vim: Heap-based Buffer Overflow prior to 9.0.0483.
  * Fixing bsc#1203509 VUL-1: CVE-2022-3235: vim: Use After Free in GitHub prior to 9.0.0490.
  * Fixing bsc#1203820 VUL-0: CVE-2022-3324: vim: Stack-based Buffer Overflow in prior to 9.0.0598.
  * Fixing bsc#1204779 VUL-0: CVE-2022-3705: vim: use after free in function qf_update_buffer of the file quickfix.c
  * Fixing bsc#1203152 VUL-1: CVE-2022-2982: vim: use after free in qf_fill_buffer()
  * Fixing bsc#1203796 VUL-1: CVE-2022-3296: vim: stack out of bounds read in ex_finally() in ex_eval.c
  * Fixing bsc#1203797 VUL-1: CVE-2022-3297: vim: use-after-free in process_next_cpt_value() at insexpand.c
  * Fixing bsc#1203110 VUL-1: CVE-2022-3099: vim: Use After Free in ex_docmd.c
  * Fixing bsc#1203194 VUL-1: CVE-2022-3134: vim: use after free in do_tag()
  * Fixing bsc#1203272 VUL-1: CVE-2022-3153: vim: NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.
  * Fixing bsc#1203799 VUL-1: CVE-2022-3278: vim: NULL pointer dereference in eval_next_non_blank() in eval.c
  * Fixing bsc#1203924 VUL-1: CVE-2022-3352: vim: vim: use after free
  * Fixing bsc#1203155 VUL-1: CVE-2022-2980: vim: null pointer dereference in do_mouse()
  * Fixing bsc#1202962 VUL-1: CVE-2022-3037: vim: Use After Free in vim prior to 9.0.0321
  * Fixing bsc#1200884 Vim: Error on startup
  * Fixing bsc#1200902 VUL-0: CVE-2022-2183: vim: Out-of-bounds Read through get_lisp_indent() Mon 13:32
  * Fixing bsc#1200903 VUL-0: CVE-2022-2182: vim: Heap-based Buffer Overflow through parse_cmd_address() Tue 08:37
  * Fixing bsc#1200904 VUL-0: CVE-2022-2175: vim: Buffer Over-read through cmdline_insert_reg() Tue 08:37
  * Fixing bsc#1201249 VUL-0: CVE-2022-2304: vim: stack buffer overflow in spell_dump_compl()
  * Fixing bsc#1201356 VUL-1: CVE-2022-2343: vim: Heap-based Buffer Overflow in GitHub repository vim prior to 9.0.0044
  * Fixing bsc#1201359 VUL-1: CVE-2022-2344: vim: Another Heap-based Buffer Overflow vim prior to 9.0.0045
  * Fixing bsc#1201363 VUL-1: CVE-2022-2345: vim: Use After Free in GitHub repository vim prior to 9.0.0046.
  * Fixing bsc#1201620 vim: SLE-15-SP4-Full-x86_64-GM-Media1 and vim-plugin-tlib-1.27-bp154.2.18.noarch issue
  * Fixing bsc#1202414 VUL-1: CVE-2022-2819: vim: Heap-based Buffer Overflow in compile_lock_unlock()
  * Fixing bsc#1202552 VUL-1: CVE-2022-2874: vim: NULL Pointer Dereference in generate_loadvar()
  * Fixing bsc#1200270 VUL-1: CVE-2022-1968: vim: use after free in utf_ptr2char
  * Fixing bsc#1200697 VUL-1: CVE-2022-2124: vim: out of bounds read in current_quote()
  * Fixing bsc#1200698 VUL-1: CVE-2022-2125: vim: out of bounds read in get_lisp_indent()
  * Fixing bsc#1200700 VUL-1: CVE-2022-2126: vim: out of bounds read in suggest_trie_walk()
  * Fixing bsc#1200701 VUL-1: CVE-2022-2129: vim: out of bounds write in vim_regsub_both()
  * Fixing bsc#1200732 VUL-1: CVE-2022-1720: vim: out of bounds read in grab_file_name()
  * Fixing bsc#1201132 VUL-1: CVE-2022-2264: vim: out of bounds read in inc()
  * Fixing bsc#1201133 VUL-1: CVE-2022-2284: vim: out of bounds read in utfc_ptr2len()
  * Fixing bsc#1201134 VUL-1: CVE-2022-2285: vim: negative size passed to memmove() due to integer overflow
  * Fixing bsc#1201135 VUL-1: CVE-2022-2286: vim: out of bounds read in ins_bytes()
  * Fixing bsc#1201136 VUL-1: CVE-2022-2287: vim: out of bounds read in suggest_trie_walk()
  * Fixing bsc#1201150 VUL-1: CVE-2022-2231: vim: null pointer dereference skipwhite()
  * Fixing bsc#1201151 VUL-1: CVE-2022-2210: vim: out of bounds read in ml_append_int()
  * Fixing bsc#1201152 VUL-1: CVE-2022-2208: vim: null pointer dereference in diff_check()
  * Fixing bsc#1201153 VUL-1: CVE-2022-2207: vim: out of bounds read in ins_bs()
  * Fixing bsc#1201154 VUL-1: CVE-2022-2257: vim: out of bounds read in msg_outtrans_special()
  * Fixing bsc#1201155 VUL-1: CVE-2022-2206: vim: out of bounds read in msg_outtrans_attr()
  * Fixing bsc#1201863 VUL-1: CVE-2022-2522: vim: out of bounds read via nested autocommand
  * Fixing bsc#1202046 VUL-1: CVE-2022-2571: vim: Heap-based Buffer Overflow related to ins_comp_get_next_word_or_line()
  * Fixing bsc#1202049 VUL-1: CVE-2022-2580: vim: Heap-based Buffer Overflow related to eval_string()
  * Fixing bsc#1202050 VUL-1: CVE-2022-2581: vim: Out-of-bounds Read related to cstrchr()
  * Fixing bsc#1202051 VUL-1: CVE-2022-2598: vim: Undefined Behavior for Input to API related to diff_mark_adjust_tp() and ex_diffgetput()
  * Fixing bsc#1202420 VUL-1: CVE-2022-2817: vim: Use After Free in f_assert_fails()
  * Fixing bsc#1202421 VUL-1: CVE-2022-2816: vim: Out-of-bounds Read in check_vim9_unlet()
  * Fixing bsc#1202511 VUL-1: CVE-2022-2862: vim: use-after-free in compile_nested_function()
  * Fixing bsc#1202512 VUL-1: CVE-2022-2849: vim: Invalid memory access related to mb_ptr2len()
  * Fixing bsc#1202515 VUL-1: CVE-2022-2845: vim: Buffer Over-read related to display_dollar()
  * Fixing bsc#1202599 VUL-1: CVE-2022-2889: vim: use-after-free in find_var_also_in_script() in evalvars.c
  * Fixing bsc#1202687 VUL-1: CVE-2022-2923: vim: NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240
  * Fixing bsc#1202689 VUL-1: CVE-2022-2946: vim: use after free in function vim_vsnprintf_typval
  * Fixing bsc#1202862 VUL-1: CVE-2022-3016: vim: Use After Free in vim prior to 9.0.0285 Mon 12:00
  * Fixing bsc#1191770 VUL-0: CVE-2021-3875: vim: heap-based buffer overflow 
  * Fixing bsc#1192167 VUL-0: CVE-2021-3903: vim: heap-based buffer overflow 
  * Fixing bsc#1192902 VUL-0: CVE-2021-3968: vim: vim is vulnerable to 
    Heap-based Buffer Overflow 
  * Fixing bsc#1192903 VUL-0: CVE-2021-3973: vim: vim is vulnerable to 
    Heap-based Buffer Overflow 
  * Fixing bsc#1192904 VUL-0: CVE-2021-3974: vim: vim is vulnerable to Use
    After Free 
  * Fixing bsc#1193466 VUL-1: CVE-2021-4069: vim: use-after-free in ex_open()
    in src/ex_docmd.c 
  * Fixing bsc#1193905 VUL-0: CVE-2021-4136: vim: vim is vulnerable to
    Heap-based Buffer Overflow 
  * Fixing bsc#1194093 VUL-1: CVE-2021-4166: vim: vim is vulnerable to
    Out-of-bounds Read 
  * Fixing bsc#1194216 VUL-1: CVE-2021-4193: vim: vulnerable to 
    Out-of-bounds Read 
  * Fixing bsc#1194217 VUL-0: CVE-2021-4192: vim: vulnerable to Use After Free
  * Fixing bsc#1194872 VUL-0: CVE-2022-0261: vim: Heap-based Buffer Overflow
    in vim prior to 8.2. 
  * Fixing bsc#1194885 VUL-0: CVE-2022-0213: vim: vim is vulnerable to
    Heap-based Buffer Overflow 
  * Fixing bsc#1195004 VUL-0: CVE-2022-0318: vim: Heap-based Buffer Overflow in
    vim prior to 8.2. 
  * Fixing bsc#1195203 VUL-0: CVE-2022-0359: vim: heap-based buffer overflow in
    init_ccline() in ex_getln.c 
  * Fixing bsc#1195354 VUL-0: CVE-2022-0407: vim: Heap-based Buffer Overflow in
    Conda vim prior to 8.2. 
  * Fixing bsc#1198596 VUL-0: CVE-2022-1381: vim: global heap buffer overflow
    in skip_range 
  * Fixing bsc#1199331 VUL-0: CVE-2022-1616: vim: Use after free in
    append_command 
  * Fixing bsc#1199333 VUL-0: CVE-2022-1619: vim: Heap-based Buffer Overflow in
    function cmdline_erase_chars 
  * Fixing bsc#1199334 VUL-0: CVE-2022-1620: vim: NULL Pointer Dereference in
    function vim_regexec_string 
  * Fixing bsc#1199747 VUL-0: CVE-2022-1796: vim: Use After in
    find_pattern_in_path 
  * Fixing bsc#1200010 VUL-0: CVE-2022-1897: vim: Out-of-bounds Write in vim 
  * Fixing bsc#1200011 VUL-0: CVE-2022-1898: vim: Use After Free in vim prior
    to 8.2 
  * Fixing bsc#1200012 VUL-0: CVE-2022-1927: vim: Buffer Over-read in vim prior
    to 8.2 
  * Fixing bsc#1070955 VUL-1: CVE-2017-17087: vim: Sets the group ownership of a
    .swp file to the editor's primary group, which allows local users to obtain
    sensitive information 
  * Fixing bsc#1194388 VUL-1: CVE-2022-0128: vim: vim is vulnerable to
    Out-of-bounds Read 
  * Fixing bsc#1195332 VUL-1: CVE-2022-0392: vim: Heap-based Buffer Overflow
    in vim prior to 8.2 
  * Fixing bsc#1196361 VUL-1: CVE-2022-0696: vim: NULL Pointer Dereference in
    vim prior to 8.2 
  * Fixing bsc#1198748 VUL-1: CVE-2022-1420: vim: Out-of-range Pointer Offset 
  * Fixing bsc#1199651 VUL-1: CVE-2022-1735: vim: heap buffer overflow 
  * Fixing bsc#1199655 VUL-1: CVE-2022-1733: vim: Heap-based Buffer Overflow in
    cindent.c 
  * Fixing bsc#1199693 VUL-1: CVE-2022-1771: vim: stack exhaustion in vim prior
    to 8.2. 
  * Fixing bsc#1199745 VUL-1: CVE-2022-1785: vim: Out-of-bounds Write 
  * Fixing bsc#1199936 VUL-1: CVE-2022-1851: vim: out of bounds read 
  * Fixing bsc#1195004 - (CVE-2022-0318) VUL-0: CVE-2022-0318: vim: Heap-based Buffer Overflow in vim prior to 8.2.
  * Fixing bsc#1190570 CVE-2021-3796: vim: use-after-free in nv_replace() in normal.c
  * Fixing bsc#1191893 CVE-2021-3872: vim: heap-based buffer overflow in win_redr_status() drawscreen.c
  * Fixing bsc#1192481 CVE-2021-3927: vim: vim is vulnerable to Heap-based Buffer Overflow
  * Fixing bsc#1192478 CVE-2021-3928: vim: vim is vulnerable to Stack-based Buffer Overflow
  * Fixing bsc#1193294 CVE-2021-4019: vim: vim is vulnerable to Heap-based Buffer Overflow
  * Fixing bsc#1193298 CVE-2021-3984: vim: illegal memory access when C-indenting could lead to Heap Buffer Overflow
  * Fixing bsc#1190533 CVE-2021-3778: vim: Heap-based Buffer Overflow in regexp_nfa.c
  *  Fixing bsc#1194216 CVE-2021-4193: vim: vulnerable to Out-of-bounds Read
  * Fixing bsc#1194556 CVE-2021-46059: vim: A Pointer Dereference vulnerability 
    exists in Vim 8.2.3883 via the vim_regexec_multi function at regexp.c, which causes a denial of service. 
  * Fixing bsc#1195066 CVE-2022-0319: vim: Out-of-bounds Read in vim/vim prior to 8.2.
  * Fixing bsc#1195126 CVE-2022-0351: vim: uncontrolled recursion in eval7()
  * Fixing bsc#1195202 CVE-2022-0361: vim: Heap-based Buffer Overflow in vim prior to 8.2.
  * Fixing bsc#1195356 CVE-2022-0413: vim: use after free in src/ex_cmds.c
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-27"/>
	<updated date="2022-12-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1070955">SUSE bug 1070955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173256">SUSE bug 1173256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174564">SUSE bug 1174564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176549">SUSE bug 1176549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182324">SUSE bug 1182324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190533">SUSE bug 1190533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190570">SUSE bug 1190570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191770">SUSE bug 1191770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191893">SUSE bug 1191893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192167">SUSE bug 1192167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192478">SUSE bug 1192478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192481">SUSE bug 1192481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192902">SUSE bug 1192902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192903">SUSE bug 1192903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192904">SUSE bug 1192904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193294">SUSE bug 1193294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193298">SUSE bug 1193298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193466">SUSE bug 1193466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193905">SUSE bug 1193905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194093">SUSE bug 1194093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194216">SUSE bug 1194216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194217">SUSE bug 1194217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194388">SUSE bug 1194388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194556">SUSE bug 1194556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194872">SUSE bug 1194872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194885">SUSE bug 1194885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195004">SUSE bug 1195004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195066">SUSE bug 1195066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195126">SUSE bug 1195126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195202">SUSE bug 1195202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195203">SUSE bug 1195203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195332">SUSE bug 1195332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195354">SUSE bug 1195354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195356">SUSE bug 1195356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196361">SUSE bug 1196361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198596">SUSE bug 1198596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198748">SUSE bug 1198748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199331">SUSE bug 1199331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199333">SUSE bug 1199333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199334">SUSE bug 1199334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199651">SUSE bug 1199651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199655">SUSE bug 1199655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199693">SUSE bug 1199693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199745">SUSE bug 1199745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199747">SUSE bug 1199747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199936">SUSE bug 1199936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200010">SUSE bug 1200010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200011">SUSE bug 1200011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200012">SUSE bug 1200012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200270">SUSE bug 1200270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200697">SUSE bug 1200697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200698">SUSE bug 1200698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200700">SUSE bug 1200700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200701">SUSE bug 1200701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200732">SUSE bug 1200732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200884">SUSE bug 1200884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200902">SUSE bug 1200902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200903">SUSE bug 1200903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200904">SUSE bug 1200904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201132">SUSE bug 1201132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201133">SUSE bug 1201133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201134">SUSE bug 1201134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201135">SUSE bug 1201135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201136">SUSE bug 1201136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201150">SUSE bug 1201150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201151">SUSE bug 1201151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201152">SUSE bug 1201152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201153">SUSE bug 1201153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201154">SUSE bug 1201154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201155">SUSE bug 1201155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201249">SUSE bug 1201249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201356">SUSE bug 1201356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201359">SUSE bug 1201359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201363">SUSE bug 1201363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201620">SUSE bug 1201620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201863">SUSE bug 1201863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202046">SUSE bug 1202046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202049">SUSE bug 1202049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202050">SUSE bug 1202050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202051">SUSE bug 1202051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202414">SUSE bug 1202414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202420">SUSE bug 1202420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202421">SUSE bug 1202421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202511">SUSE bug 1202511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202512">SUSE bug 1202512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202515">SUSE bug 1202515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202552">SUSE bug 1202552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202599">SUSE bug 1202599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202687">SUSE bug 1202687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202689">SUSE bug 1202689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202862">SUSE bug 1202862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202962">SUSE bug 1202962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203110">SUSE bug 1203110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203152">SUSE bug 1203152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203155">SUSE bug 1203155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203194">SUSE bug 1203194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203272">SUSE bug 1203272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203508">SUSE bug 1203508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203509">SUSE bug 1203509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203796">SUSE bug 1203796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203797">SUSE bug 1203797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203799">SUSE bug 1203799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203820">SUSE bug 1203820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203924">SUSE bug 1203924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204779">SUSE bug 1204779</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0316/">CVE-2009-0316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0316">CVE-2009-0316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1248/">CVE-2016-1248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1248">CVE-2016-1248 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17087/">CVE-2017-17087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17087">CVE-2017-17087 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5953">CVE-2017-5953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6349/">CVE-2017-6349 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6349">CVE-2017-6349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6350/">CVE-2017-6350 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6350">CVE-2017-6350 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3778/">CVE-2021-3778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3778">CVE-2021-3778 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3796/">CVE-2021-3796 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3796">CVE-2021-3796 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3872/">CVE-2021-3872 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3872">CVE-2021-3872 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3875/">CVE-2021-3875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3875">CVE-2021-3875 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3903/">CVE-2021-3903 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3903">CVE-2021-3903 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3927/">CVE-2021-3927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3927">CVE-2021-3927 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3928/">CVE-2021-3928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3928">CVE-2021-3928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3968/">CVE-2021-3968 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3968">CVE-2021-3968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3973/">CVE-2021-3973 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3973">CVE-2021-3973 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3974/">CVE-2021-3974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3974">CVE-2021-3974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3984/">CVE-2021-3984 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3984">CVE-2021-3984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4019/">CVE-2021-4019 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4019">CVE-2021-4019 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4069/">CVE-2021-4069 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4069">CVE-2021-4069 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4136/">CVE-2021-4136 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4136">CVE-2021-4136 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4166/">CVE-2021-4166 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4166">CVE-2021-4166 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4192/">CVE-2021-4192 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4192">CVE-2021-4192 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4193/">CVE-2021-4193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4193">CVE-2021-4193 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46059/">CVE-2021-46059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-46059">CVE-2021-46059 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0128/">CVE-2022-0128 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0128">CVE-2022-0128 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0213/">CVE-2022-0213 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0213">CVE-2022-0213 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0261/">CVE-2022-0261 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0261">CVE-2022-0261 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0318/">CVE-2022-0318 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0318">CVE-2022-0318 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0319/">CVE-2022-0319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0319">CVE-2022-0319 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0351/">CVE-2022-0351 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0351">CVE-2022-0351 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0359/">CVE-2022-0359 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0359">CVE-2022-0359 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0361/">CVE-2022-0361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0361">CVE-2022-0361 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0392/">CVE-2022-0392 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0392">CVE-2022-0392 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0407/">CVE-2022-0407 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0407">CVE-2022-0407 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0413/">CVE-2022-0413 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0413">CVE-2022-0413 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0696/">CVE-2022-0696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0696">CVE-2022-0696 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1381/">CVE-2022-1381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1381">CVE-2022-1381 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1420/">CVE-2022-1420 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">CVE-2022-1420 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1616/">CVE-2022-1616 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1616">CVE-2022-1616 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1619/">CVE-2022-1619 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1619">CVE-2022-1619 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1620/">CVE-2022-1620 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1620">CVE-2022-1620 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1720/">CVE-2022-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1720">CVE-2022-1720 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1733/">CVE-2022-1733 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1733">CVE-2022-1733 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1735/">CVE-2022-1735 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1735">CVE-2022-1735 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1771/">CVE-2022-1771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1771">CVE-2022-1771 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1785/">CVE-2022-1785 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">CVE-2022-1785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1796/">CVE-2022-1796 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1796">CVE-2022-1796 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1851/">CVE-2022-1851 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1851">CVE-2022-1851 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1897/">CVE-2022-1897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1897">CVE-2022-1897 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1898/">CVE-2022-1898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1898">CVE-2022-1898 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-1927/">CVE-2022-1927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1927">CVE-2022-1927 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1968/">CVE-2022-1968 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1968">CVE-2022-1968 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2124/">CVE-2022-2124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2124">CVE-2022-2124 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2125/">CVE-2022-2125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2125">CVE-2022-2125 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2126/">CVE-2022-2126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2126">CVE-2022-2126 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2129/">CVE-2022-2129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2129">CVE-2022-2129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2175/">CVE-2022-2175 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2175">CVE-2022-2175 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2182/">CVE-2022-2182 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2182">CVE-2022-2182 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2183/">CVE-2022-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2183">CVE-2022-2183 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2206/">CVE-2022-2206 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2206">CVE-2022-2206 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2207/">CVE-2022-2207 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2207">CVE-2022-2207 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2208/">CVE-2022-2208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2208">CVE-2022-2208 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2210/">CVE-2022-2210 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2210">CVE-2022-2210 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2231/">CVE-2022-2231 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2231">CVE-2022-2231 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2257/">CVE-2022-2257 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2257">CVE-2022-2257 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2264/">CVE-2022-2264 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2264">CVE-2022-2264 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2284/">CVE-2022-2284 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2284">CVE-2022-2284 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2285/">CVE-2022-2285 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2285">CVE-2022-2285 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2286/">CVE-2022-2286 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2286">CVE-2022-2286 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2287/">CVE-2022-2287 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2287">CVE-2022-2287 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2304/">CVE-2022-2304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2304">CVE-2022-2304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2343/">CVE-2022-2343 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2343">CVE-2022-2343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2344/">CVE-2022-2344 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2344">CVE-2022-2344 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2345/">CVE-2022-2345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2345">CVE-2022-2345 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2522/">CVE-2022-2522 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2522">CVE-2022-2522 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2571/">CVE-2022-2571 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2571">CVE-2022-2571 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2580/">CVE-2022-2580 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2580">CVE-2022-2580 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2581/">CVE-2022-2581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2581">CVE-2022-2581 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2598/">CVE-2022-2598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2598">CVE-2022-2598 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2816/">CVE-2022-2816 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2816">CVE-2022-2816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2817/">CVE-2022-2817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2817">CVE-2022-2817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2819/">CVE-2022-2819 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2819">CVE-2022-2819 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2845/">CVE-2022-2845 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2845">CVE-2022-2845 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2849/">CVE-2022-2849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2849">CVE-2022-2849 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2862/">CVE-2022-2862 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2862">CVE-2022-2862 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2874/">CVE-2022-2874 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2874">CVE-2022-2874 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2889/">CVE-2022-2889 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2889">CVE-2022-2889 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2923/">CVE-2022-2923 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2923">CVE-2022-2923 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2946/">CVE-2022-2946 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2946">CVE-2022-2946 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2980/">CVE-2022-2980 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2980">CVE-2022-2980 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2982/">CVE-2022-2982 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2982">CVE-2022-2982 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3016/">CVE-2022-3016 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3016">CVE-2022-3016 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3037/">CVE-2022-3037 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3037">CVE-2022-3037 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3099/">CVE-2022-3099 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3099">CVE-2022-3099 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3134/">CVE-2022-3134 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3134">CVE-2022-3134 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3153/">CVE-2022-3153 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3153">CVE-2022-3153 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3234/">CVE-2022-3234 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3234">CVE-2022-3234 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3235/">CVE-2022-3235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3235">CVE-2022-3235 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3278/">CVE-2022-3278 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3278">CVE-2022-3278 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-3296/">CVE-2022-3296 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3296">CVE-2022-3296 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3297/">CVE-2022-3297 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3297">CVE-2022-3297 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3324/">CVE-2022-3324 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3324">CVE-2022-3324 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3352/">CVE-2022-3352 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3352">CVE-2022-3352 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3705/">CVE-2022-3705 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3705">CVE-2022-3705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009728192" comment="gvim-9.0.0814-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728193" comment="vim-9.0.0814-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728128" comment="vim-data-9.0.0814-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728129" comment="vim-data-common-9.0.0814-17.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151114" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1195389" ref_url="https://bugzilla.suse.com/1195389" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0135" ref_url="https://www.suse.com/security/cve/CVE-2022-0135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010244.html" source="SUSE-SU"/>
		<description>
This update for virglrenderer fixes the following issues:

- CVE-2022-0135: Fixed out-of-bonds write in read_transfer_data() (bsc#1195389).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195389">SUSE bug 1195389</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0135/">CVE-2022-0135 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0135">CVE-2022-0135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667335" comment="libvirglrenderer0-0.5.0-12.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151115" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1195054" ref_url="https://bugzilla.suse.com/1195054" source="BUGZILLA"/>
		<reference ref_id="1195217" ref_url="https://bugzilla.suse.com/1195217" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010253.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">CVE-2022-23852 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23990">CVE-2022-23990 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666236" comment="expat-2.1.0-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666237" comment="libexpat1-2.1.0-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666209" comment="libexpat1-32bit-2.1.0-21.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151116" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1071031" ref_url="https://bugzilla.suse.com/1071031" source="BUGZILLA"/>
		<reference ref_id="1154365" ref_url="https://bugzilla.suse.com/1154365" source="BUGZILLA"/>
		<reference ref_id="1182808" ref_url="https://bugzilla.suse.com/1182808" source="BUGZILLA"/>
		<reference ref_id="1182809" ref_url="https://bugzilla.suse.com/1182809" source="BUGZILLA"/>
		<reference ref_id="1182811" ref_url="https://bugzilla.suse.com/1182811" source="BUGZILLA"/>
		<reference ref_id="1182812" ref_url="https://bugzilla.suse.com/1182812" source="BUGZILLA"/>
		<reference ref_id="1190312" ref_url="https://bugzilla.suse.com/1190312" source="BUGZILLA"/>
		<reference ref_id="1194539" ref_url="https://bugzilla.suse.com/1194539" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17095" ref_url="https://www.suse.com/security/cve/CVE-2017-17095/" source="CVE"/>
		<reference ref_id="CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546/" source="CVE"/>
		<reference ref_id="CVE-2020-19131" ref_url="https://www.suse.com/security/cve/CVE-2020-19131/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<reference ref_id="CVE-2022-22844" ref_url="https://www.suse.com/security/cve/CVE-2022-22844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010261.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2017-17095: Fixed DoS in tools/pal2rgb.c in pal2rgb (bsc#1071031).
- CVE-2019-17546: Fixed integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image (bsc#1154365).
- CVE-2020-19131: Fixed buffer overflow in tiffcrop that may cause DoS via the invertImage() function (bsc#1190312).
- CVE-2020-35521: Fixed memory allocation failure in tif_read.c (bsc#1182808).
- CVE-2020-35522: Fixed memory allocation failure in tif_pixarlog.c (bsc#1182809).
- CVE-2020-35523: Fixed integer overflow in tif_getimage.c (bsc#1182811).
- CVE-2020-35524: Fixed heap-based buffer overflow in TIFF2PDF tool (bsc#1182812).
- CVE-2022-22844: Fixed out-of-bounds read in _TIFFmemcpy in tif_unix.c (bsc#1194539).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071031">SUSE bug 1071031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154365">SUSE bug 1154365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182808">SUSE bug 1182808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182809">SUSE bug 1182809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182811">SUSE bug 1182811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182812">SUSE bug 1182812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190312">SUSE bug 1190312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194539">SUSE bug 1194539</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17095/">CVE-2017-17095 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17095">CVE-2017-17095 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17546">CVE-2019-17546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-19131/">CVE-2020-19131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19131">CVE-2020-19131 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35521">CVE-2020-35521 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35522">CVE-2020-35522 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35523">CVE-2020-35523 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35524">CVE-2020-35524 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22844/">CVE-2022-22844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22844">CVE-2022-22844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666234" comment="libtiff5-4.0.9-44.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666205" comment="libtiff5-32bit-4.0.9-44.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666235" comment="tiff-4.0.9-44.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151117" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1195825" ref_url="https://bugzilla.suse.com/1195825" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010269.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2018-16301: Fixed segfault when handling large files (bsc#1195825).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668119" comment="tcpdump-4.9.2-14.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151118" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1195108" ref_url="https://bugzilla.suse.com/1195108" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010280.html" source="SUSE-SU"/>
		<description>
This update for xerces-j2 fixes the following issues:

- CVE-2022-23437: Fixed infinite loop within Apache XercesJ xml parser (bsc#1195108).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-21"/>
	<updated date="2022-02-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23437">CVE-2022-23437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667934" comment="xerces-j2-2.8.1-268.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667935" comment="xerces-j2-xml-apis-2.8.1-268.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667936" comment="xerces-j2-xml-resolver-2.8.1-268.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151119" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1195230" ref_url="https://bugzilla.suse.com/1195230" source="BUGZILLA"/>
		<reference ref_id="1195682" ref_url="https://bugzilla.suse.com/1195682" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010302.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682)

- CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via Maintenance Service
- CVE-2022-22754: Extensions could have bypassed permission confirmation during update
- CVE-2022-22756: Drag and dropping an image could have resulted in the dropped object being an executable
- CVE-2022-22759: Sandboxed iframes could have executed script if the parent appended elements
- CVE-2022-22760: Cross-Origin responses could be distinguished between script and non-script content-types
- CVE-2022-22761: frame-ancestors Content Security Policy directive was not enforced for framed extension pages
- CVE-2022-22763: Script Execution during invalid object state
- CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6


Firefox Extended Support Release 91.5.1 ESR (bsc#1195230)

- Fixed an issue that allowed unexpected data to be submitted in some of our search telemetry
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-24"/>
	<updated date="2022-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195230">SUSE bug 1195230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22753">CVE-2022-22753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22754">CVE-2022-22754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22756">CVE-2022-22756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22759">CVE-2022-22759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22760">CVE-2022-22760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22761">CVE-2022-22761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22763">CVE-2022-22763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22764">CVE-2022-22764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668887" comment="MozillaFirefox-91.6.0-112.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668888" comment="MozillaFirefox-devel-91.6.0-112.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668889" comment="MozillaFirefox-translations-common-91.6.0-112.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151120" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1192615" ref_url="https://bugzilla.suse.com/1192615" source="BUGZILLA"/>
		<reference ref_id="1195779" ref_url="https://bugzilla.suse.com/1195779" source="BUGZILLA"/>
		<reference ref_id="1195780" ref_url="https://bugzilla.suse.com/1195780" source="BUGZILLA"/>
		<reference ref_id="1195781" ref_url="https://bugzilla.suse.com/1195781" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0127" ref_url="https://www.suse.com/security/cve/CVE-2021-0127/" source="CVE"/>
		<reference ref_id="CVE-2021-0145" ref_url="https://www.suse.com/security/cve/CVE-2021-0145/" source="CVE"/>
		<reference ref_id="CVE-2021-0146" ref_url="https://www.suse.com/security/cve/CVE-2021-0146/" source="CVE"/>
		<reference ref_id="CVE-2021-33120" ref_url="https://www.suse.com/security/cve/CVE-2021-33120/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010308.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220207 release.

- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)
- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)
- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)
- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)

- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)
- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-25"/>
	<updated date="2022-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192615">SUSE bug 1192615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195779">SUSE bug 1195779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195780">SUSE bug 1195780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195781">SUSE bug 1195781</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0127/">CVE-2021-0127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0127">CVE-2021-0127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0145/">CVE-2021-0145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0145">CVE-2021-0145 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0146/">CVE-2021-0146 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0146">CVE-2021-0146 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33120/">CVE-2021-33120 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33120">CVE-2021-33120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667937" comment="ucode-intel-20220207-13.93.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151121" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1193942" ref_url="https://bugzilla.suse.com/1193942" source="BUGZILLA"/>
		<reference ref_id="1193943" ref_url="https://bugzilla.suse.com/1193943" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44224" ref_url="https://www.suse.com/security/cve/CVE-2021-44224/" source="CVE"/>
		<reference ref_id="CVE-2021-44790" ref_url="https://www.suse.com/security/cve/CVE-2021-44790/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010001.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-44224: Fixed NULL dereference or SSRF in forward proxy configurations. (bsc#1193943)
- CVE-2021-44790: Fixed buffer overflow when parsing multipart content in mod_lua. (bsc#1193942)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-12"/>
	<updated date="2022-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193942">SUSE bug 1193942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193943">SUSE bug 1193943</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44224/">CVE-2021-44224 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44224">CVE-2021-44224 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44790/">CVE-2021-44790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44790">CVE-2021-44790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663078" comment="apache2-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663071" comment="apache2-doc-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663079" comment="apache2-example-pages-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663080" comment="apache2-prefork-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663081" comment="apache2-utils-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663082" comment="apache2-worker-2.4.23-29.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151122" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010322.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

-  CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24407">CVE-2022-24407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669342" comment="cyrus-sasl-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669310" comment="cyrus-sasl-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669343" comment="cyrus-sasl-crammd5-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669312" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669344" comment="cyrus-sasl-digestmd5-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669345" comment="cyrus-sasl-gssapi-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669315" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669346" comment="cyrus-sasl-otp-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669317" comment="cyrus-sasl-otp-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669347" comment="cyrus-sasl-plain-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669319" comment="cyrus-sasl-plain-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669348" comment="libsasl2-3-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669321" comment="libsasl2-3-32bit-2.1.26-8.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151123" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1195064" ref_url="https://bugzilla.suse.com/1195064" source="BUGZILLA"/>
		<reference ref_id="1195735" ref_url="https://bugzilla.suse.com/1195735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30934" ref_url="https://www.suse.com/security/cve/CVE-2021-30934/" source="CVE"/>
		<reference ref_id="CVE-2021-30936" ref_url="https://www.suse.com/security/cve/CVE-2021-30936/" source="CVE"/>
		<reference ref_id="CVE-2021-30951" ref_url="https://www.suse.com/security/cve/CVE-2021-30951/" source="CVE"/>
		<reference ref_id="CVE-2021-30952" ref_url="https://www.suse.com/security/cve/CVE-2021-30952/" source="CVE"/>
		<reference ref_id="CVE-2021-30953" ref_url="https://www.suse.com/security/cve/CVE-2021-30953/" source="CVE"/>
		<reference ref_id="CVE-2021-30954" ref_url="https://www.suse.com/security/cve/CVE-2021-30954/" source="CVE"/>
		<reference ref_id="CVE-2021-30984" ref_url="https://www.suse.com/security/cve/CVE-2021-30984/" source="CVE"/>
		<reference ref_id="CVE-2021-45481" ref_url="https://www.suse.com/security/cve/CVE-2021-45481/" source="CVE"/>
		<reference ref_id="CVE-2021-45482" ref_url="https://www.suse.com/security/cve/CVE-2021-45482/" source="CVE"/>
		<reference ref_id="CVE-2021-45483" ref_url="https://www.suse.com/security/cve/CVE-2021-45483/" source="CVE"/>
		<reference ref_id="CVE-2022-22589" ref_url="https://www.suse.com/security/cve/CVE-2022-22589/" source="CVE"/>
		<reference ref_id="CVE-2022-22590" ref_url="https://www.suse.com/security/cve/CVE-2022-22590/" source="CVE"/>
		<reference ref_id="CVE-2022-22592" ref_url="https://www.suse.com/security/cve/CVE-2022-22592/" source="CVE"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010335.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.34.5 (bsc#1195735):

- CVE-2022-22589: A validation issue was addressed with improved input sanitization.
- CVE-2022-22590: A use after free issue was addressed with improved memory management.
- CVE-2022-22592: A logic issue was addressed with improved state management.

Update to version 2.34.4 (bsc#1195064):

- CVE-2021-30934: A buffer overflow issue was addressed with improved memory handling.
- CVE-2021-30936: A use after free issue was addressed with improved memory management.
- CVE-2021-30951: A use after free issue was addressed with improved memory management.
- CVE-2021-30952: An integer overflow was addressed with improved input validation.
- CVE-2021-30953: An out-of-bounds read was addressed with improved bounds checking.
- CVE-2021-30954: A type confusion issue was addressed with improved memory handling.
- CVE-2021-30984: A race condition was addressed with improved state handling.
- CVE-2022-22594: A cross-origin issue in the IndexDB API was addressed with improved input validation.

The following CVEs were addressed in a previous update:

- CVE-2021-45481: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create.
- CVE-2021-45482: A use-after-free in WebCore::ContainerNode::firstChild.
- CVE-2021-45483: A use-after-free in WebCore::Frame::page.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195735">SUSE bug 1195735</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30934/">CVE-2021-30934 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30934">CVE-2021-30934 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30936/">CVE-2021-30936 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30936">CVE-2021-30936 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30951/">CVE-2021-30951 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30951">CVE-2021-30951 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30952/">CVE-2021-30952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30952">CVE-2021-30952 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30953/">CVE-2021-30953 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30953">CVE-2021-30953 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30954/">CVE-2021-30954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30954">CVE-2021-30954 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30984/">CVE-2021-30984 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30984">CVE-2021-30984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45481/">CVE-2021-45481 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45481">CVE-2021-45481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45482/">CVE-2021-45482 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45482">CVE-2021-45482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45483/">CVE-2021-45483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45483">CVE-2021-45483 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-22589/">CVE-2022-22589 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22589">CVE-2022-22589 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22590/">CVE-2022-22590 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22590">CVE-2022-22590 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22592/">CVE-2022-22592 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22592">CVE-2022-22592 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22594">CVE-2022-22594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669696" comment="libjavascriptcoregtk-4_0-18-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669697" comment="libwebkit2gtk-4_0-37-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669698" comment="typelib-1_0-JavaScriptCore-4_0-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669699" comment="typelib-1_0-WebKit2-4_0-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669701" comment="webkit2gtk-4_0-injected-bundles-2.34.5-2.85.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151124" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196026" ref_url="https://bugzilla.suse.com/1196026" source="BUGZILLA"/>
		<reference ref_id="1196168" ref_url="https://bugzilla.suse.com/1196168" source="BUGZILLA"/>
		<reference ref_id="1196169" ref_url="https://bugzilla.suse.com/1196169" source="BUGZILLA"/>
		<reference ref_id="1196171" ref_url="https://bugzilla.suse.com/1196171" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010336.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">CVE-2022-25313 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25314">CVE-2022-25314 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669382" comment="expat-2.1.0-21.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669383" comment="libexpat1-2.1.0-21.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669384" comment="libexpat1-32bit-2.1.0-21.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151125" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1089030" ref_url="https://bugzilla.suse.com/1089030" source="BUGZILLA"/>
		<reference ref_id="1163882" ref_url="https://bugzilla.suse.com/1163882" source="BUGZILLA"/>
		<reference ref_id="1196435" ref_url="https://bugzilla.suse.com/1196435" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1100" ref_url="https://www.suse.com/security/cve/CVE-2018-1100/" source="CVE"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<reference ref_id="CVE-2021-45444" ref_url="https://www.suse.com/security/cve/CVE-2021-45444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010368.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2021-45444: Fixed a vulnerability where arbitrary shell commands could be 
  executed related to prompt expansion (bsc#1196435).
- CVE-2019-20044: Fixed a vulnerability where shell privileges would not be
  properly dropped when unsetting the PRIVILEGED option (bsc#1163882).
- CVE-2018-1100: Fixed a potential code execution via a stack-based buffer
  overflow in utils.c:checkmailpath() (bsc#1089030).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1089030">SUSE bug 1089030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196435">SUSE bug 1196435</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1100/">CVE-2018-1100 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1100">CVE-2018-1100 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20044">CVE-2019-20044 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45444/">CVE-2021-45444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45444">CVE-2021-45444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670824" comment="zsh-5.0.5-6.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151126" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1146312" ref_url="https://bugzilla.suse.com/1146312" source="BUGZILLA"/>
		<reference ref_id="1185973" ref_url="https://bugzilla.suse.com/1185973" source="BUGZILLA"/>
		<reference ref_id="1191580" ref_url="https://bugzilla.suse.com/1191580" source="BUGZILLA"/>
		<reference ref_id="1193731" ref_url="https://bugzilla.suse.com/1193731" source="BUGZILLA"/>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="1195536" ref_url="https://bugzilla.suse.com/1195536" source="BUGZILLA"/>
		<reference ref_id="1195543" ref_url="https://bugzilla.suse.com/1195543" source="BUGZILLA"/>
		<reference ref_id="1195612" ref_url="https://bugzilla.suse.com/1195612" source="BUGZILLA"/>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195939" ref_url="https://bugzilla.suse.com/1195939" source="BUGZILLA"/>
		<reference ref_id="1196079" ref_url="https://bugzilla.suse.com/1196079" source="BUGZILLA"/>
		<reference ref_id="1196612" ref_url="https://bugzilla.suse.com/1196612" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10905" ref_url="https://www.suse.com/security/cve/CVE-2016-10905/" source="CVE"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.


Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc (bsc#1193731).
- CVE-2016-10905: Fixed a use-after-free is gfs2_clear_rgrpd() and read_rindex_entry() (bsc#1146312).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-08"/>
	<updated date="2022-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146312">SUSE bug 1146312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185973">SUSE bug 1185973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193731">SUSE bug 1193731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195536">SUSE bug 1195536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195612">SUSE bug 1195612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195939">SUSE bug 1195939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10905/">CVE-2016-10905 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10905">CVE-2016-10905 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0920">CVE-2021-0920 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0002">CVE-2022-0002 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0617">CVE-2022-0617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24448">CVE-2022-24448 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671801" comment="kernel-default-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671802" comment="kernel-default-base-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671803" comment="kernel-default-devel-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671768" comment="kernel-devel-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671769" comment="kernel-macros-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671770" comment="kernel-source-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671804" comment="kernel-syms-4.4.180-94.156.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151127" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1196809" ref_url="https://bugzilla.suse.com/1196809" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010408.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):

- CVE-2022-26485: Use-after-free in XSLT parameter processing
- CVE-2022-26486: Use-after-free in WebGPU IPC Framework
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26485">CVE-2022-26485 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26486">CVE-2022-26486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671783" comment="MozillaFirefox-91.6.1-112.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671784" comment="MozillaFirefox-devel-91.6.1-112.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671785" comment="MozillaFirefox-translations-common-91.6.1-112.92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151128" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22620" ref_url="https://www.suse.com/security/cve/CVE-2022-22620/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010419.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.34.6 (bsc#1196133):

- CVE-2022-22620: Processing maliciously crafted web content may have lead to arbitrary code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-11"/>
	<updated date="2022-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22620/">CVE-2022-22620 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22620">CVE-2022-22620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670816" comment="libjavascriptcoregtk-4_0-18-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670817" comment="libwebkit2gtk-4_0-37-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670818" comment="typelib-1_0-JavaScriptCore-4_0-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670819" comment="typelib-1_0-WebKit2-4_0-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670821" comment="webkit2gtk-4_0-injected-bundles-2.34.6-2.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151129" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1184751" ref_url="https://bugzilla.suse.com/1184751" source="BUGZILLA"/>
		<reference ref_id="1184752" ref_url="https://bugzilla.suse.com/1184752" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010432.html" source="SUSE-SU"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-30498, CVE-2021-30499: If an image has a size of 0x0, when exporting, no 
  data is written and space is allocated for the header only, not taking into
  account that sprintf appends a NUL byte (bsc#1184751, bsc#1184752).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184751">SUSE bug 1184751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184752">SUSE bug 1184752</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30498">CVE-2021-30498 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30499">CVE-2021-30499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670823" comment="libcaca0-0.99.beta18-14.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151130" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1196900" ref_url="https://bugzilla.suse.com/1196900" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010434.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):

- CVE-2022-26383: Browser window spoof using fullscreen mode
- CVE-2022-26384: iframe allow-scripts sandbox bypass
- CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures
- CVE-2022-26381: Use-after-free in text reflows
- CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26381">CVE-2022-26381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26383">CVE-2022-26383 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26384">CVE-2022-26384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26386">CVE-2022-26386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26387">CVE-2022-26387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672571" comment="MozillaFirefox-91.7.0-112.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672572" comment="MozillaFirefox-devel-91.7.0-112.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672573" comment="MozillaFirefox-translations-common-91.7.0-112.95.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151131" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196784" ref_url="https://bugzilla.suse.com/1196784" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010442.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671277" comment="expat-2.1.0-21.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671278" comment="libexpat1-2.1.0-21.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671275" comment="libexpat1-32bit-2.1.0-21.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151132" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010449.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673055" comment="libopenssl-devel-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673056" comment="libopenssl1_0_0-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673023" comment="libopenssl1_0_0-32bit-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673057" comment="libopenssl1_0_0-hmac-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673025" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673058" comment="openssl-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673027" comment="openssl-doc-1.0.2j-60.75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151133" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1193314" ref_url="https://bugzilla.suse.com/1193314" source="BUGZILLA"/>
		<reference ref_id="1193444" ref_url="https://bugzilla.suse.com/1193444" source="BUGZILLA"/>
		<reference ref_id="1193491" ref_url="https://bugzilla.suse.com/1193491" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1195163" ref_url="https://bugzilla.suse.com/1195163" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u322 (icedtea-3.22.0)

Including the following security fixes:

- CVE-2022-21248, bsc#1194926: Enhance cross VM serialization
- CVE-2022-21283, bsc#1194937: Better String matching
- CVE-2022-21293, bsc#1194935: Improve String constructions
- CVE-2022-21294, bsc#1194934: Enhance construction of Identity maps
- CVE-2022-21282, bsc#1194933: Better resolution of URIs
- CVE-2022-21296, bsc#1194932: Improve SAX Parser configuration management
- CVE-2022-21299, bsc#1194931: Improved scanning of XML entities
- CVE-2022-21305, bsc#1194939: Better array indexing
- CVE-2022-21340, bsc#1194940: Verify Jar Verification
- CVE-2022-21341, bsc#1194941: Improve serial forms for transport
- CVE-2022-21349: Improve Solaris font rendering
- CVE-2022-21360, bsc#1194929: Enhance BMP image support
- CVE-2022-21365, bsc#1194928: Enhanced BMP processing
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193314">SUSE bug 1193314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193444">SUSE bug 1193444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193491">SUSE bug 1193491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195163">SUSE bug 1195163</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21349">CVE-2022-21349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672567" comment="java-1_8_0-openjdk-1.8.0.322-27.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672568" comment="java-1_8_0-openjdk-demo-1.8.0.322-27.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672569" comment="java-1_8_0-openjdk-devel-1.8.0.322-27.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672570" comment="java-1_8_0-openjdk-headless-1.8.0.322-27.72.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151134" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1194640" ref_url="https://bugzilla.suse.com/1194640" source="BUGZILLA"/>
		<reference ref_id="1194768" ref_url="https://bugzilla.suse.com/1194768" source="BUGZILLA"/>
		<reference ref_id="1194770" ref_url="https://bugzilla.suse.com/1194770" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010485.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2022-23219: Fixed buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768)
- CVE-2022-23218: Fixed buffer overflow in sunrpc svcunix_create (bsc#1194770)
- CVE-2021-3999: Fixed getcwd to set errno to ERANGE for size == 1 (bsc#1194640)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3999">CVE-2021-3999 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">CVE-2022-23218 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">CVE-2022-23219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673031" comment="glibc-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673010" comment="glibc-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673032" comment="glibc-devel-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673012" comment="glibc-devel-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673013" comment="glibc-html-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673014" comment="glibc-i18ndata-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673015" comment="glibc-info-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673033" comment="glibc-locale-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673017" comment="glibc-locale-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673034" comment="glibc-profile-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673019" comment="glibc-profile-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673035" comment="nscd-2.22-119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151135" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1197091" ref_url="https://bugzilla.suse.com/1197091" source="BUGZILLA"/>
		<reference ref_id="1197095" ref_url="https://bugzilla.suse.com/1197095" source="BUGZILLA"/>
		<reference ref_id="1197096" ref_url="https://bugzilla.suse.com/1197096" source="BUGZILLA"/>
		<reference ref_id="1197098" ref_url="https://bugzilla.suse.com/1197098" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22719" ref_url="https://www.suse.com/security/cve/CVE-2022-22719/" source="CVE"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<reference ref_id="CVE-2022-23943" ref_url="https://www.suse.com/security/cve/CVE-2022-23943/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010494.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-23943: heap out-of-bounds write in mod_sed (bsc#1197098).
- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22719: use of uninitialized value of in r:parsebody in mod_lua (bsc#1197091).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197091">SUSE bug 1197091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197098">SUSE bug 1197098</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22719/">CVE-2022-22719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22719">CVE-2022-22719 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22720">CVE-2022-22720 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22721">CVE-2022-22721 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23943/">CVE-2022-23943 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23943">CVE-2022-23943 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673758" comment="apache2-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673736" comment="apache2-doc-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673759" comment="apache2-example-pages-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673760" comment="apache2-prefork-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673761" comment="apache2-utils-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673762" comment="apache2-worker-2.4.23-29.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151136" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-BCL</platform>
		</affected>
		<reference ref_id="1122729" ref_url="https://bugzilla.suse.com/1122729" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10739" ref_url="https://www.suse.com/security/cve/CVE-2016-10739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013417.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2016-10739: getaddrinfo: Fully parse IPv4 address strings (bsc#1122729)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-03"/>
	<updated date="2023-01-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122729">SUSE bug 1122729</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10739/">CVE-2016-10739 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10739">CVE-2016-10739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009722236" comment="SUSE Linux Enterprise Server 12 SP3-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727624" comment="glibc-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727625" comment="glibc-32bit-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727626" comment="glibc-devel-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727627" comment="glibc-devel-32bit-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727628" comment="glibc-html-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727629" comment="glibc-i18ndata-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727630" comment="glibc-info-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727631" comment="glibc-locale-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727632" comment="glibc-locale-32bit-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727633" comment="glibc-profile-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727634" comment="glibc-profile-32bit-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727635" comment="nscd-2.22-133.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151137" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1136570" ref_url="https://bugzilla.suse.com/1136570" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issues:

- Fix the previous fix for CVE-2019-3860 (bsc#1136570, bsc#1128481)
  (Out-of-bounds reads with specially crafted SFTP packets)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-21"/>
	<updated date="2019-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3860">CVE-2019-3860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555946" comment="libssh2-1-1.4.3-20.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521924" comment="libssh2-1-32bit-1.4.3-20.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151138" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1138034" ref_url="https://bugzilla.suse.com/1138034" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164/" source="CVE"/>
		<description>
This update for postgresql10 to version 10.9 fixes the following issue:

Security issue fixed:	  

- CVE-2019-10164: Fixed buffer-overflow vulnerabilities in SCRAM verifier parsing (bsc#1138034).

More information at https://www.postgresql.org/docs/10/release-10-9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-16"/>
	<updated date="2019-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138034">SUSE bug 1138034</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10164">CVE-2019-10164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555947" comment="libecpg6-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555948" comment="libpq5-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521938" comment="libpq5-32bit-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555949" comment="postgresql10-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555950" comment="postgresql10-contrib-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530576" comment="postgresql10-docs-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555951" comment="postgresql10-plperl-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555952" comment="postgresql10-plpython-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555953" comment="postgresql10-pltcl-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555954" comment="postgresql10-server-10.9-1.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151139" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1139959" ref_url="https://bugzilla.suse.com/1139959" source="BUGZILLA"/>
		<reference ref_id="1140122" ref_url="https://bugzilla.suse.com/1140122" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13012" ref_url="https://www.suse.com/security/cve/CVE-2019-13012/" source="CVE"/>
		<description>
This update for glib2 fixes the following issues:

Security issue fixed:

- CVE-2019-13012: Fixed improper restriction of file permissions when creating directories (bsc#1139959).

Non-security issue fixed:

- Added explicit requires between libglib2 and libgio2 (bsc#1140122).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-16"/>
	<updated date="2019-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139959">SUSE bug 1139959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140122">SUSE bug 1140122</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13012/">CVE-2019-13012 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13012">CVE-2019-13012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521943" comment="glib2-lang-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555955" comment="glib2-tools-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555956" comment="libgio-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521946" comment="libgio-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555957" comment="libglib-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521949" comment="libglib-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555958" comment="libgmodule-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521951" comment="libgmodule-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555959" comment="libgobject-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521953" comment="libgobject-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555960" comment="libgthread-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521955" comment="libgthread-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151140" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes the following issues:

MozillaFirefox to version ESR 60.8:

- CVE-2019-9811: Sandbox escape via installation of malicious language pack (bsc#1140868).
- CVE-2019-11711: Script injection within domain through inner window reuse (bsc#1140868).
- CVE-2019-11712: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (bsc#1140868).
- CVE-2019-11713: Use-after-free with HTTP/2 cached stream (bsc#1140868).
- CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (bsc#1140868).
- CVE-2019-11715: HTML parsing error can contribute to content XSS (bsc#1140868).
- CVE-2019-11717: Caret character improperly escaped in origins (bsc#1140868).
- CVE-2019-11719: Out-of-bounds read when importing curve25519 private key (bsc#1140868).
- CVE-2019-11730: Same-origin policy treats all files in a directory as having the same-origin (bsc#1140868).
- CVE-2019-11709: Multiple Memory safety bugs fixed (bsc#1140868).

mozilla-nss to version 3.44.1:

* Added IPSEC IKE support to softoken 
* Many new FIPS test cases
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-16"/>
	<updated date="2019-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555961" comment="MozillaFirefox-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555962" comment="MozillaFirefox-translations-common-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555963" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555964" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530591" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555965" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555966" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530593" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555967" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555968" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555969" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555970" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151141" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

---- updated platforms ------------------------------------
SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061d-&gt;0000061f Xeon E3/E5, Core X
SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000714-&gt;00000718 Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-16"/>
	<updated date="2019-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151142" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1127223" ref_url="https://bugzilla.suse.com/1127223" source="BUGZILLA"/>
		<reference ref_id="1127308" ref_url="https://bugzilla.suse.com/1127308" source="BUGZILLA"/>
		<reference ref_id="1128574" ref_url="https://bugzilla.suse.com/1128574" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155/" source="CVE"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2019-9169: Fixed a heap-based buffer over-read via an attempted case-insensitive regular-expression match (bsc#1127308).
- CVE-2009-5155: Fixed a denial of service in parse_reg_exp() (bsc#1127223).

Non-security issues fixed:

- Added cfi information for start routines in order to stop unwinding on S390 (bsc#1128574).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-16"/>
	<updated date="2019-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127223">SUSE bug 1127223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127308">SUSE bug 1127308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128574">SUSE bug 1128574</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-5155">CVE-2009-5155 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9169">CVE-2019-9169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555971" comment="glibc-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530596" comment="glibc-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555972" comment="glibc-devel-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530598" comment="glibc-devel-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530599" comment="glibc-html-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530600" comment="glibc-i18ndata-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530601" comment="glibc-info-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555973" comment="glibc-locale-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530603" comment="glibc-locale-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555974" comment="glibc-profile-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530605" comment="glibc-profile-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555975" comment="nscd-2.22-62.22.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151143" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This update for bzip2 fixes the following issues:

- Fixed a regression with the fix for CVE-2019-12900, which caused incompatibilities
  with files that used many selectors (bsc#1139083).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-16"/>
	<updated date="2019-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555976" comment="bzip2-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530613" comment="bzip2-doc-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555977" comment="libbz2-1-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522029" comment="libbz2-1-32bit-1.0.6-30.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151144" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1121826" ref_url="https://bugzilla.suse.com/1121826" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<description>
This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2019-6133: Fixed improper caching of auth decisions, which could bypass 
  uid checking in the interactive backend (bsc#1121826).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-16"/>
	<updated date="2019-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6133">CVE-2019-6133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555978" comment="libpolkit0-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555979" comment="polkit-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555980" comment="typelib-1_0-Polkit-1_0-0.113-5.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151145" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1115375" ref_url="https://bugzilla.suse.com/1115375" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141784" ref_url="https://bugzilla.suse.com/1141784" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141786" ref_url="https://bugzilla.suse.com/1141786" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2842" ref_url="https://www.suse.com/security/cve/CVE-2019-2842/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk to version 8u222 fixes the following issues:

Security issues fixed:

- CVE-2019-2745: Improved ECC Implementation (bsc#1141784).
- CVE-2019-2762: Exceptional throw cases (bsc#1141782).
- CVE-2019-2766: Improve file protocol handling (bsc#1141789).
- CVE-2019-2769: Better copies of CopiesList (bsc#1141783).
- CVE-2019-2786: More limited privilege usage (bsc#1141787).
- CVE-2019-2816: Normalize normalization (bsc#1141785).
- CVE-2019-2842: Extended AES support (bsc#1141786).
- CVE-2019-7317: Improve PNG support (bsc#1141780).
- Certificate validation improvements

Non-security issue fixed:

- Fixed an issue where the installation failed when the manpages are not present (bsc#1115375)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-16"/>
	<updated date="2019-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115375">SUSE bug 1115375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141784">SUSE bug 1141784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141786">SUSE bug 1141786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2745">CVE-2019-2745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2786">CVE-2019-2786 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2842/">CVE-2019-2842 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2842">CVE-2019-2842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555981" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555982" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555983" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555984" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151146" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1109663" ref_url="https://bugzilla.suse.com/1109663" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-14647: Fixed a denial of service vulnerability caused by a crafted XML document (bsc#1109847).
- CVE-2018-1000802: Fixed a command injection in the shutil module (bsc#1109663).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-16"/>
	<updated date="2019-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000802">CVE-2018-1000802 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555985" comment="libpython3_4m1_0-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555986" comment="python3-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555987" comment="python3-base-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555988" comment="python3-curses-3.4.6-25.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151147" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1133037" ref_url="https://bugzilla.suse.com/1133037" source="BUGZILLA"/>
		<reference ref_id="1141619" ref_url="https://bugzilla.suse.com/1141619" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<description>
This update for evince fixes the following issues:

Security issues fixed: 	  

- CVE-2019-11459: Fixed an improper error handling in which could have led to use of uninitialized use of memory (bsc#1133037).
- CVE-2019-1010006: Fixed a buffer overflow in backend/tiff/tiff-document.c (bsc#1141619).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-16"/>
	<updated date="2019-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141619">SUSE bug 1141619</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010006">CVE-2019-1010006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11459">CVE-2019-11459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555989" comment="evince-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555990" comment="evince-browser-plugin-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522054" comment="evince-lang-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555991" comment="evince-plugin-djvudocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555992" comment="evince-plugin-dvidocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555993" comment="evince-plugin-pdfdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555994" comment="evince-plugin-psdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555995" comment="evince-plugin-tiffdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555996" comment="evince-plugin-xpsdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555997" comment="libevdocument3-4-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555998" comment="libevview3-3-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555999" comment="nautilus-evince-3.20.2-6.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151148" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1140738" ref_url="https://bugzilla.suse.com/1140738" source="BUGZILLA"/>
		<reference ref_id="1141329" ref_url="https://bugzilla.suse.com/1141329" source="BUGZILLA"/>
		<reference ref_id="1141332" ref_url="https://bugzilla.suse.com/1141332" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525/" source="CVE"/>
		<reference ref_id="CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529/" source="CVE"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

Security issue fixed:

- CVE-2019-12529: Fixed a potential denial of service associated with HTTP Basic Authentication credentials (bsc#1141329).
- CVE-2019-12525: Fixed a denial of service during processing of HTTP Digest Authentication credentials (bsc#1141332).
- CVE-2019-13345: Fixed a cross site scripting vulnerability via user_name or auth parameter in cachemgr.cgi (bsc#1140738).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-16"/>
	<updated date="2019-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141329">SUSE bug 1141329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141332">SUSE bug 1141332</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12525">CVE-2019-12525 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12529">CVE-2019-12529 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13345">CVE-2019-13345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556000" comment="squid-3.5.21-26.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151149" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-20852: Fixed an information leak where cookies could be send to the wrong server because of incorrect domain validation (bsc#1141853).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-23"/>
	<updated date="2019-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556001" comment="libpython2_7-1_0-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522068" comment="libpython2_7-1_0-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556002" comment="python-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530623" comment="python-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556003" comment="python-base-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530624" comment="python-base-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556004" comment="python-curses-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556005" comment="python-demo-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556006" comment="python-devel-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530626" comment="python-doc-2.7.13-28.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530627" comment="python-doc-pdf-2.7.13-28.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556007" comment="python-gdbm-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556008" comment="python-idle-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556009" comment="python-tk-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556010" comment="python-xml-2.7.13-28.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151150" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<description>
This update for postgresql96 fixes the following issues:                    
                                                                                          
Security issue fixed:                                                                                 
                                                                                  
- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-10208">CVE-2019-10208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556011" comment="postgresql96-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556012" comment="postgresql96-contrib-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530673" comment="postgresql96-docs-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556013" comment="postgresql96-plperl-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556014" comment="postgresql96-plpython-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556015" comment="postgresql96-pltcl-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556016" comment="postgresql96-server-9.6.15-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151151" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1133719" ref_url="https://bugzilla.suse.com/1133719" source="BUGZILLA"/>
		<reference ref_id="1138301" ref_url="https://bugzilla.suse.com/1138301" source="BUGZILLA"/>
		<reference ref_id="1138303" ref_url="https://bugzilla.suse.com/1138303" source="BUGZILLA"/>
		<reference ref_id="1138734" ref_url="https://bugzilla.suse.com/1138734" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<reference ref_id="CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path
  parameter pointing anywhere on the system and potentially leading to execution
  of a malicious file with root privileges by libvirtd (bsc#1138301).
- CVE-2019-10167: Fixed an issue with virConnectGetDomainCapabilities API which
  could have been used to execute arbitrary emulators (bsc#1138303).

Non-security issues fixed:

- Fixed an issue with short bitmaps when setting vcpu affinity using the vcpupin (bsc#1138734).
- Added support for overriding max threads per process limit (bsc#1133719)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-11"/>
	<updated date="2019-09-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133719">SUSE bug 1133719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138303">SUSE bug 1138303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138734">SUSE bug 1138734</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10161">CVE-2019-10161 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10167">CVE-2019-10167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556017" comment="libvirt-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556018" comment="libvirt-admin-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556019" comment="libvirt-client-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556020" comment="libvirt-daemon-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556021" comment="libvirt-daemon-config-network-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556022" comment="libvirt-daemon-config-nwfilter-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556023" comment="libvirt-daemon-driver-interface-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538264" comment="libvirt-daemon-driver-libxl-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556024" comment="libvirt-daemon-driver-lxc-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556025" comment="libvirt-daemon-driver-network-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556026" comment="libvirt-daemon-driver-nodedev-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556027" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556028" comment="libvirt-daemon-driver-qemu-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556029" comment="libvirt-daemon-driver-secret-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556030" comment="libvirt-daemon-driver-storage-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556031" comment="libvirt-daemon-driver-storage-core-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556032" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556033" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556034" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556035" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554322" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556036" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556037" comment="libvirt-daemon-hooks-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556038" comment="libvirt-daemon-lxc-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556039" comment="libvirt-daemon-qemu-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538282" comment="libvirt-daemon-xen-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556040" comment="libvirt-doc-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556041" comment="libvirt-libs-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556042" comment="libvirt-lock-sanlock-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556043" comment="libvirt-nss-3.3.0-5.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151152" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1106061" ref_url="https://bugzilla.suse.com/1106061" source="BUGZILLA"/>
		<reference ref_id="1123161" ref_url="https://bugzilla.suse.com/1123161" source="BUGZILLA"/>
		<reference ref_id="1125674" ref_url="https://bugzilla.suse.com/1125674" source="BUGZILLA"/>
		<reference ref_id="1127034" ref_url="https://bugzilla.suse.com/1127034" source="BUGZILLA"/>
		<reference ref_id="1128977" ref_url="https://bugzilla.suse.com/1128977" source="BUGZILLA"/>
		<reference ref_id="1130972" ref_url="https://bugzilla.suse.com/1130972" source="BUGZILLA"/>
		<reference ref_id="1133860" ref_url="https://bugzilla.suse.com/1133860" source="BUGZILLA"/>
		<reference ref_id="1134399" ref_url="https://bugzilla.suse.com/1134399" source="BUGZILLA"/>
		<reference ref_id="1135335" ref_url="https://bugzilla.suse.com/1135335" source="BUGZILLA"/>
		<reference ref_id="1135365" ref_url="https://bugzilla.suse.com/1135365" source="BUGZILLA"/>
		<reference ref_id="1137584" ref_url="https://bugzilla.suse.com/1137584" source="BUGZILLA"/>
		<reference ref_id="1139358" ref_url="https://bugzilla.suse.com/1139358" source="BUGZILLA"/>
		<reference ref_id="1139826" ref_url="https://bugzilla.suse.com/1139826" source="BUGZILLA"/>
		<reference ref_id="1140652" ref_url="https://bugzilla.suse.com/1140652" source="BUGZILLA"/>
		<reference ref_id="1140903" ref_url="https://bugzilla.suse.com/1140903" source="BUGZILLA"/>
		<reference ref_id="1140945" ref_url="https://bugzilla.suse.com/1140945" source="BUGZILLA"/>
		<reference ref_id="1141181" ref_url="https://bugzilla.suse.com/1141181" source="BUGZILLA"/>
		<reference ref_id="1141401" ref_url="https://bugzilla.suse.com/1141401" source="BUGZILLA"/>
		<reference ref_id="1141402" ref_url="https://bugzilla.suse.com/1141402" source="BUGZILLA"/>
		<reference ref_id="1141452" ref_url="https://bugzilla.suse.com/1141452" source="BUGZILLA"/>
		<reference ref_id="1141453" ref_url="https://bugzilla.suse.com/1141453" source="BUGZILLA"/>
		<reference ref_id="1141454" ref_url="https://bugzilla.suse.com/1141454" source="BUGZILLA"/>
		<reference ref_id="1142023" ref_url="https://bugzilla.suse.com/1142023" source="BUGZILLA"/>
		<reference ref_id="1142254" ref_url="https://bugzilla.suse.com/1142254" source="BUGZILLA"/>
		<reference ref_id="1142857" ref_url="https://bugzilla.suse.com/1142857" source="BUGZILLA"/>
		<reference ref_id="1143045" ref_url="https://bugzilla.suse.com/1143045" source="BUGZILLA"/>
		<reference ref_id="1143048" ref_url="https://bugzilla.suse.com/1143048" source="BUGZILLA"/>
		<reference ref_id="1143189" ref_url="https://bugzilla.suse.com/1143189" source="BUGZILLA"/>
		<reference ref_id="1143191" ref_url="https://bugzilla.suse.com/1143191" source="BUGZILLA"/>
		<reference ref_id="1143333" ref_url="https://bugzilla.suse.com/1143333" source="BUGZILLA"/>
		<reference ref_id="1144257" ref_url="https://bugzilla.suse.com/1144257" source="BUGZILLA"/>
		<reference ref_id="1144273" ref_url="https://bugzilla.suse.com/1144273" source="BUGZILLA"/>
		<reference ref_id="1144288" ref_url="https://bugzilla.suse.com/1144288" source="BUGZILLA"/>
		<reference ref_id="1144920" ref_url="https://bugzilla.suse.com/1144920" source="BUGZILLA"/>
		<reference ref_id="1145920" ref_url="https://bugzilla.suse.com/1145920" source="BUGZILLA"/>
		<reference ref_id="1145922" ref_url="https://bugzilla.suse.com/1145922" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20855" ref_url="https://www.suse.com/security/cve/CVE-2018-20855/" source="CVE"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10207" ref_url="https://www.suse.com/security/cve/CVE-2019-10207/" source="CVE"/>
		<reference ref_id="CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125/" source="CVE"/>
		<reference ref_id="CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810/" source="CVE"/>
		<reference ref_id="CVE-2019-13631" ref_url="https://www.suse.com/security/cve/CVE-2019-13631/" source="CVE"/>
		<reference ref_id="CVE-2019-13648" ref_url="https://www.suse.com/security/cve/CVE-2019-13648/" source="CVE"/>
		<reference ref_id="CVE-2019-14283" ref_url="https://www.suse.com/security/cve/CVE-2019-14283/" source="CVE"/>
		<reference ref_id="CVE-2019-14284" ref_url="https://www.suse.com/security/cve/CVE-2019-14284/" source="CVE"/>
		<reference ref_id="CVE-2019-15117" ref_url="https://www.suse.com/security/cve/CVE-2019-15117/" source="CVE"/>
		<reference ref_id="CVE-2019-15118" ref_url="https://www.suse.com/security/cve/CVE-2019-15118/" source="CVE"/>
		<reference ref_id="CVE-2019-3819" ref_url="https://www.suse.com/security/cve/CVE-2019-3819/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).
- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).
- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).
- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).
- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c (bnc#1142254).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).
- CVE-2019-15118: Fixed kernel stack exhaustion in check_input_term in sound/usb/mixer.c via mishandled recursion (bnc#1145922).
- CVE-2019-15117: Fixed out-of-bounds memory access in parse_audio_mixer_unit in sound/usb/mixer.c via mishandled short descriptor (bnc#1145920).
- CVE-2019-3819: A flaw was fixed in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may have enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') could have caused a system lock up and a denial of service (bnc#1123161).
- CVE-2019-10207: Check for missing tty operations in bluetooth/hci_uart (bsc#1142857).
- CVE-2018-20856: Fixed a use-after-free issue in block/blk-core.c, where certain error case are mishandled (bnc#1143048).

The following non-security bugs were fixed:

- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1125674).
- dlm: Fix saving of NULL callbacks (bsc#1135365).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652, bsc#1144288).
- bcache: Revert 'bcache: free heap cache_set-&gt;flush_btree in bch_journal_free' (bsc#1140652, bsc#1144288).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652, bsc#1144288).
- bcache: fix race in btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1130972, bsc#1144257).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1130972, bsc#1144273).
- bcache: performance improvement for btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652, bsc#1144288).
- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
- clocksource: Defer override invalidation unless clock is unstable (bsc#1139826).
- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
- kvmclock: fix TSC calibration for nested guests (bsc#1133860, jsc#PM-1211).
- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945, bsc#1141401, bsc#1141402, bsc#1141452, bsc#1141453, bsc#1141454).
- qla2xxx: performance degradation when enabling blk-mq (bsc#1128977).
- qlge: Deduplicate lbq_buf_size (bsc#1106061).
- qlge: Deduplicate rx buffer queue management (bsc#1106061).
- qlge: Factor out duplicated expression (bsc#1106061).
- qlge: Fix dma_sync_single calls (bsc#1106061).
- qlge: Fix irq masking in INTx mode (bsc#1106061).
- qlge: Refill empty buffer queues from wq (bsc#1106061).
- qlge: Refill rx buffers up to multiple of 16 (bsc#1106061).
- qlge: Remove bq_desc.maplen (bsc#1106061).
- qlge: Remove irq_cnt (bsc#1106061).
- qlge: Remove page_chunk.last_flag (bsc#1106061).
- qlge: Remove qlge_bq.len size (bsc#1106061).
- qlge: Remove rx_ring.sbq_buf_size (bsc#1106061).
- qlge: Remove rx_ring.type (bsc#1106061).
- qlge: Remove useless dma synchronization calls (bsc#1106061).
- qlge: Remove useless memset (bsc#1106061).
- qlge: Replace memset with assignment (bsc#1106061).
- qlge: Update buffer queue prod index despite oom (bsc#1106061).
- rbd: flush rbd_dev-&gt;watch_dwork after watch is unregistered (bsc#1143333).
- rbd: retry watch re-registration periodically (bsc#1143333).
- sched/fair: Do not free p-&gt;numa_faults with concurrent readers (bsc#1144920).
- sched/fair: Use RCU accessors consistently for -&gt;numa_group (bsc#1144920).
- scsi: virtio_scsi: let host do exception handling (bsc#1141181).
- x86: mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- x86: tsc: Add X86_FEATURE_TSC_KNOWN_FREQ flag (bsc#1133860, jsc#PM-1211).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (XSA-300).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106061">SUSE bug 1106061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123161">SUSE bug 1123161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125674">SUSE bug 1125674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127034">SUSE bug 1127034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128977">SUSE bug 1128977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130972">SUSE bug 1130972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133860">SUSE bug 1133860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134399">SUSE bug 1134399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135335">SUSE bug 1135335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135365">SUSE bug 1135365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137584">SUSE bug 1137584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139358">SUSE bug 1139358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139826">SUSE bug 1139826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140652">SUSE bug 1140652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140903">SUSE bug 1140903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140945">SUSE bug 1140945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141181">SUSE bug 1141181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141401">SUSE bug 1141401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141402">SUSE bug 1141402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141452">SUSE bug 1141452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141453">SUSE bug 1141453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141454">SUSE bug 1141454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142023">SUSE bug 1142023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142254">SUSE bug 1142254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142857">SUSE bug 1142857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143045">SUSE bug 1143045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143048">SUSE bug 1143048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143189">SUSE bug 1143189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143333">SUSE bug 1143333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144257">SUSE bug 1144257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144273">SUSE bug 1144273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144288">SUSE bug 1144288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144920">SUSE bug 1144920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145920">SUSE bug 1145920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145922">SUSE bug 1145922</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20855/">CVE-2018-20855 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20855">CVE-2018-20855 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20856">CVE-2018-20856 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10207/">CVE-2019-10207 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10207">CVE-2019-10207 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1125">CVE-2019-1125 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11810">CVE-2019-11810 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13631/">CVE-2019-13631 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13631">CVE-2019-13631 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13648/">CVE-2019-13648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13648">CVE-2019-13648 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14283/">CVE-2019-14283 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14283">CVE-2019-14283 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14284/">CVE-2019-14284 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14284">CVE-2019-14284 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15117/">CVE-2019-15117 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15117">CVE-2019-15117 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15118/">CVE-2019-15118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15118">CVE-2019-15118 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3819/">CVE-2019-3819 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3819">CVE-2019-3819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556044" comment="kernel-default-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556045" comment="kernel-default-base-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556046" comment="kernel-default-devel-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538290" comment="kernel-devel-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538291" comment="kernel-macros-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538292" comment="kernel-source-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556047" comment="kernel-syms-4.4.180-94.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556048" comment="kgraft-patch-4_4_180-94_103-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151153" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1114674" ref_url="https://bugzilla.suse.com/1114674" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311/" source="CVE"/>
		<description>
This update for perl fixes the following issues:

Security issue fixed:

- CVE-2018-18311: Fixed integer overflow with oversize environment (bsc#1114674).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1114674">SUSE bug 1114674</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18311">CVE-2018-18311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556049" comment="perl-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522097" comment="perl-32bit-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556050" comment="perl-base-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522099" comment="perl-doc-5.18.2-12.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151154" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp, zypper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1049825" ref_url="https://bugzilla.suse.com/1049825" source="BUGZILLA"/>
		<reference ref_id="1109893" ref_url="https://bugzilla.suse.com/1109893" source="BUGZILLA"/>
		<reference ref_id="1110542" ref_url="https://bugzilla.suse.com/1110542" source="BUGZILLA"/>
		<reference ref_id="1111319" ref_url="https://bugzilla.suse.com/1111319" source="BUGZILLA"/>
		<reference ref_id="1112911" ref_url="https://bugzilla.suse.com/1112911" source="BUGZILLA"/>
		<reference ref_id="1113296" ref_url="https://bugzilla.suse.com/1113296" source="BUGZILLA"/>
		<reference ref_id="1116995" ref_url="https://bugzilla.suse.com/1116995" source="BUGZILLA"/>
		<reference ref_id="1120629" ref_url="https://bugzilla.suse.com/1120629" source="BUGZILLA"/>
		<reference ref_id="1120630" ref_url="https://bugzilla.suse.com/1120630" source="BUGZILLA"/>
		<reference ref_id="1120631" ref_url="https://bugzilla.suse.com/1120631" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1131823" ref_url="https://bugzilla.suse.com/1131823" source="BUGZILLA"/>
		<reference ref_id="1134226" ref_url="https://bugzilla.suse.com/1134226" source="BUGZILLA"/>
		<reference ref_id="1137977" ref_url="https://bugzilla.suse.com/1137977" source="BUGZILLA"/>
		<reference ref_id="1140039" ref_url="https://bugzilla.suse.com/1140039" source="BUGZILLA"/>
		<reference ref_id="1145521" ref_url="https://bugzilla.suse.com/1145521" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<description>
This update for libsolv, libzypp and zypper fixes the following issues:

libsolv was updated to version 0.6.36 and fixes the following issues:

Security issues fixed:

- CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629).
- CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630).
- CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631).

Non-security issues fixed:

- Made cleandeps jobs on patterns work (bsc#1137977).
- Fixed an issue multiversion packages that obsolete their own name (bsc#1127155).
- Keep consistent package name if there are multiple alternatives (bsc#1131823).

Fixes for libzypp:

- Fixes a bug where locking the kernel was not possible (bsc#1113296)
- Fixes a file descriptor leak (bsc#1116995)
- Will now run file conflict check on dry-run (best with download-only) (bsc#1140039)

Fixes for zypper:

- Fixes a bug where the wrong exit code was set when refreshing repos if --root was used (bsc#1134226)
- Improved the displaying of locks (bsc#1112911)
- Fixes an issue where `https` repository urls caused an error prompt to appear twice (bsc#1110542)
- zypper will now always warn when no repositories are defined (bsc#1109893)
- Fixes bash completion option detection (bsc#1049825)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049825">SUSE bug 1049825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109893">SUSE bug 1109893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110542">SUSE bug 1110542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111319">SUSE bug 1111319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112911">SUSE bug 1112911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113296">SUSE bug 1113296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116995">SUSE bug 1116995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131823">SUSE bug 1131823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134226">SUSE bug 1134226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137977">SUSE bug 1137977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140039">SUSE bug 1140039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145521">SUSE bug 1145521</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20532">CVE-2018-20532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20533">CVE-2018-20533 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20534">CVE-2018-20534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556051" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556052" comment="libzypp-16.20.2-27.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556053" comment="perl-solv-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556054" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556055" comment="zypper-1.13.54-18.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151155" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update to Java 7.1 Service Refresh 4 Fix Pack 50.

Security issues fixed:

- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-09"/>
	<updated date="2019-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11771">CVE-2019-11771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11775">CVE-2019-11775 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-4473">CVE-2019-4473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530688" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530691" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151156" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1149496" ref_url="https://bugzilla.suse.com/1149496" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5482: Fixed TFTP small blocksize heap buffer overflow (bsc#1149496).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-12"/>
	<updated date="2019-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5482">CVE-2019-5482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556056" comment="curl-7.37.0-37.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556057" comment="libcurl4-7.37.0-37.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530695" comment="libcurl4-32bit-7.37.0-37.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151157" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1135715" ref_url="https://bugzilla.suse.com/1135715" source="BUGZILLA"/>
		<reference ref_id="1148931" ref_url="https://bugzilla.suse.com/1148931" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595/" source="CVE"/>
		<reference ref_id="CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607/" source="CVE"/>
		<reference ref_id="CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615/" source="CVE"/>
		<reference ref_id="CVE-2019-8644" ref_url="https://www.suse.com/security/cve/CVE-2019-8644/" source="CVE"/>
		<reference ref_id="CVE-2019-8649" ref_url="https://www.suse.com/security/cve/CVE-2019-8649/" source="CVE"/>
		<reference ref_id="CVE-2019-8658" ref_url="https://www.suse.com/security/cve/CVE-2019-8658/" source="CVE"/>
		<reference ref_id="CVE-2019-8666" ref_url="https://www.suse.com/security/cve/CVE-2019-8666/" source="CVE"/>
		<reference ref_id="CVE-2019-8669" ref_url="https://www.suse.com/security/cve/CVE-2019-8669/" source="CVE"/>
		<reference ref_id="CVE-2019-8671" ref_url="https://www.suse.com/security/cve/CVE-2019-8671/" source="CVE"/>
		<reference ref_id="CVE-2019-8672" ref_url="https://www.suse.com/security/cve/CVE-2019-8672/" source="CVE"/>
		<reference ref_id="CVE-2019-8673" ref_url="https://www.suse.com/security/cve/CVE-2019-8673/" source="CVE"/>
		<reference ref_id="CVE-2019-8676" ref_url="https://www.suse.com/security/cve/CVE-2019-8676/" source="CVE"/>
		<reference ref_id="CVE-2019-8677" ref_url="https://www.suse.com/security/cve/CVE-2019-8677/" source="CVE"/>
		<reference ref_id="CVE-2019-8678" ref_url="https://www.suse.com/security/cve/CVE-2019-8678/" source="CVE"/>
		<reference ref_id="CVE-2019-8679" ref_url="https://www.suse.com/security/cve/CVE-2019-8679/" source="CVE"/>
		<reference ref_id="CVE-2019-8680" ref_url="https://www.suse.com/security/cve/CVE-2019-8680/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8683" ref_url="https://www.suse.com/security/cve/CVE-2019-8683/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8686" ref_url="https://www.suse.com/security/cve/CVE-2019-8686/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Updated to version 2.24.4 (bsc#1148931).

Security issues fixed:
	  
- CVE-2019-8644, CVE-2019-8649, CVE-2019-8658, CVE-2019-8669, CVE-2019-8678,
  CVE-2019-8680, CVE-2019-8683, CVE-2019-8684, CVE-2019-8688, CVE-2019-8595,
  CVE-2019-8607, CVE-2019-8615, CVE-2019-8644, CVE-2019-8649, CVE-2019-8658,
  CVE-2019-8666, CVE-2019-8669, CVE-2019-8671, CVE-2019-8672, CVE-2019-8673,
  CVE-2019-8676, CVE-2019-8677, CVE-2019-8678, CVE-2019-8679, CVE-2019-8680,
  CVE-2019-8681, CVE-2019-8683, CVE-2019-8684, CVE-2019-8686, CVE-2019-8687,
  CVE-2019-8688, CVE-2019-8689, CVE-2019-8690

Non-security issues fixed:
	  
- Improved loading of multimedia streams to avoid memory exhaustion due to excessive caching.
- Updated the user agent string to make happy certain websites which would claim that the browser being used was unsupported.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-11"/>
	<updated date="2019-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8595">CVE-2019-8595 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8607">CVE-2019-8607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8615">CVE-2019-8615 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8644/">CVE-2019-8644 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8644">CVE-2019-8644 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8649/">CVE-2019-8649 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8649">CVE-2019-8649 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8658/">CVE-2019-8658 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8658">CVE-2019-8658 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8666/">CVE-2019-8666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8666">CVE-2019-8666 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8669/">CVE-2019-8669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8669">CVE-2019-8669 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8671/">CVE-2019-8671 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8671">CVE-2019-8671 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8672/">CVE-2019-8672 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8672">CVE-2019-8672 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8673/">CVE-2019-8673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8673">CVE-2019-8673 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8676/">CVE-2019-8676 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8676">CVE-2019-8676 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8677/">CVE-2019-8677 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8677">CVE-2019-8677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8678/">CVE-2019-8678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8678">CVE-2019-8678 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8679/">CVE-2019-8679 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8679">CVE-2019-8679 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8680/">CVE-2019-8680 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8680">CVE-2019-8680 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8681">CVE-2019-8681 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8683/">CVE-2019-8683 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8683">CVE-2019-8683 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8684">CVE-2019-8684 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8686/">CVE-2019-8686 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8686">CVE-2019-8686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8687">CVE-2019-8687 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8688">CVE-2019-8688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8689">CVE-2019-8689 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8690">CVE-2019-8690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556058" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556059" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556060" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556061" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556062" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151158" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1122292" ref_url="https://bugzilla.suse.com/1122292" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11772" ref_url="https://www.suse.com/security/cve/CVE-2019-11772/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2449" ref_url="https://www.suse.com/security/cve/CVE-2019-2449/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 5 Fix Pack 40.

Security issues fixed:

- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11772: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
- CVE-2019-2786: Fixed issue inside Component Security (bsc#1141787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-12"/>
	<updated date="2019-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122292">SUSE bug 1122292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11771">CVE-2019-11771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11772/">CVE-2019-11772 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11772">CVE-2019-11772 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11775">CVE-2019-11775 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2449/">CVE-2019-2449 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2449">CVE-2019-2449 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2786">CVE-2019-2786 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-4473">CVE-2019-4473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530698" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151159" version="1" class="patch">
	<metadata>
		<title>Security update for ibus (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1150011" ref_url="https://bugzilla.suse.com/1150011" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14822" ref_url="https://www.suse.com/security/cve/CVE-2019-14822/" source="CVE"/>
		<description>
This update for ibus fixes the following issues:

Security issue fixed:

- CVE-2019-14822: Fixed a misconfiguration of the DBus server that allowed an unprivileged user to monitor and send method calls to the ibus bus of another user. (bsc#1150011)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150011">SUSE bug 1150011</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14822/">CVE-2019-14822 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14822">CVE-2019-14822 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556063" comment="ibus-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556064" comment="ibus-gtk-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556065" comment="ibus-gtk3-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522148" comment="ibus-lang-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556066" comment="libibus-1_0-5-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556067" comment="typelib-1_0-IBus-1_0-1.5.13-15.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151160" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

- CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance (bsc#1150003).
- CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-20"/>
	<updated date="2019-09-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1547">CVE-2019-1547 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1563">CVE-2019-1563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556068" comment="libopenssl-devel-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556069" comment="libopenssl1_0_0-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530704" comment="libopenssl1_0_0-32bit-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556070" comment="libopenssl1_0_0-hmac-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530706" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556071" comment="openssl-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530708" comment="openssl-doc-1.0.2j-60.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151161" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1149294" ref_url="https://bugzilla.suse.com/1149294" source="BUGZILLA"/>
		<reference ref_id="1149295" ref_url="https://bugzilla.suse.com/1149295" source="BUGZILLA"/>
		<reference ref_id="1149296" ref_url="https://bugzilla.suse.com/1149296" source="BUGZILLA"/>
		<reference ref_id="1149297" ref_url="https://bugzilla.suse.com/1149297" source="BUGZILLA"/>
		<reference ref_id="1149298" ref_url="https://bugzilla.suse.com/1149298" source="BUGZILLA"/>
		<reference ref_id="1149299" ref_url="https://bugzilla.suse.com/1149299" source="BUGZILLA"/>
		<reference ref_id="1149303" ref_url="https://bugzilla.suse.com/1149303" source="BUGZILLA"/>
		<reference ref_id="1149304" ref_url="https://bugzilla.suse.com/1149304" source="BUGZILLA"/>
		<reference ref_id="1149324" ref_url="https://bugzilla.suse.com/1149324" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<description>
This update for MozillaFirefox to ESR 60.9 fixes the following issues:

Security issues fixed:

- CVE-2019-11742: Fixed a same-origin policy violation involving SVG filters and canvas to steal cross-origin images. (bsc#1149303)
- CVE-2019-11746: Fixed a use-after-free while manipulating video. (bsc#1149297)
- CVE-2019-11744: Fixed an XSS caused by breaking out of title and textarea elements using innerHTML. (bsc#1149304)
- CVE-2019-11753: Fixed a privilege escalation with Mozilla Maintenance Service in custom Firefox installation location. (bsc#1149295)
- CVE-2019-11752: Fixed a use-after-free while extracting a key value in IndexedDB. (bsc#1149296)
- CVE-2019-11743: Fixed a timing side-channel attack on cross-origin information, utilizing unload event attributes. (bsc#1149298)
- CVE-2019-11740: Fixed several memory safety bugs. (bsc#1149299)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-23"/>
	<updated date="2019-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149294">SUSE bug 1149294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149295">SUSE bug 1149295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149296">SUSE bug 1149296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149297">SUSE bug 1149297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149298">SUSE bug 1149298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149299">SUSE bug 1149299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149303">SUSE bug 1149303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149304">SUSE bug 1149304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11753">CVE-2019-11753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556072" comment="MozillaFirefox-60.9.0-109.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556073" comment="MozillaFirefox-translations-common-60.9.0-109.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151162" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1145559" ref_url="https://bugzilla.suse.com/1145559" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11500" ref_url="https://www.suse.com/security/cve/CVE-2019-11500/" source="CVE"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2019-11500: Fixed a potential remote code execution in the IMAP and ManageSieve protocol parsers (bsc#1145559).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145559">SUSE bug 1145559</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11500/">CVE-2019-11500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11500">CVE-2019-11500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556074" comment="dovecot22-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556075" comment="dovecot22-backend-mysql-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556076" comment="dovecot22-backend-pgsql-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556077" comment="dovecot22-backend-sqlite-2.2.31-19.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151163" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1129180" ref_url="https://bugzilla.suse.com/1129180" source="BUGZILLA"/>
		<reference ref_id="1131863" ref_url="https://bugzilla.suse.com/1131863" source="BUGZILLA"/>
		<reference ref_id="1134156" ref_url="https://bugzilla.suse.com/1134156" source="BUGZILLA"/>
		<reference ref_id="1140359" ref_url="https://bugzilla.suse.com/1140359" source="BUGZILLA"/>
		<reference ref_id="1146882" ref_url="https://bugzilla.suse.com/1146882" source="BUGZILLA"/>
		<reference ref_id="1146884" ref_url="https://bugzilla.suse.com/1146884" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12973" ref_url="https://www.suse.com/security/cve/CVE-2019-12973/" source="CVE"/>
		<reference ref_id="CVE-2019-14811" ref_url="https://www.suse.com/security/cve/CVE-2019-14811/" source="CVE"/>
		<reference ref_id="CVE-2019-14812" ref_url="https://www.suse.com/security/cve/CVE-2019-14812/" source="CVE"/>
		<reference ref_id="CVE-2019-14813" ref_url="https://www.suse.com/security/cve/CVE-2019-14813/" source="CVE"/>
		<reference ref_id="CVE-2019-14817" ref_url="https://www.suse.com/security/cve/CVE-2019-14817/" source="CVE"/>
		<reference ref_id="CVE-2019-3835" ref_url="https://www.suse.com/security/cve/CVE-2019-3835/" source="CVE"/>
		<reference ref_id="CVE-2019-3839" ref_url="https://www.suse.com/security/cve/CVE-2019-3839/" source="CVE"/>
		<description>
This update for ghostscript to 9.27 fixes the following issues:

Security issues fixed:

- CVE-2019-3835: Fixed an unauthorized file system access caused by an available superexec operator.  (bsc#1129180)
- CVE-2019-3839: Fixed an unauthorized file system access caused by available privileged operators. (bsc#1134156)
- CVE-2019-12973: Fixed a denial-of-service vulnerability in the OpenJPEG function opj_t1_encode_cblks. (bsc#1140359)
- CVE-2019-14811: Fixed a safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator. (bsc#1146882)
- CVE-2019-14812: Fixed a safer mode bypass by .forceput exposure in setuserparams. (bsc#1146882)
- CVE-2019-14813: Fixed a safer mode bypass by .forceput exposure in setsystemparams. (bsc#1146882)
- CVE-2019-14817: Fixed a safer mode bypass by .forceput exposure in .pdfexectoken and other procedures. (bsc#1146884)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-26"/>
	<updated date="2019-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129180">SUSE bug 1129180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131863">SUSE bug 1131863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134156">SUSE bug 1134156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140359">SUSE bug 1140359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146884">SUSE bug 1146884</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12973/">CVE-2019-12973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12973">CVE-2019-12973 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14811/">CVE-2019-14811 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14811">CVE-2019-14811 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14812/">CVE-2019-14812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14812">CVE-2019-14812 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14813/">CVE-2019-14813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14813">CVE-2019-14813 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14817/">CVE-2019-14817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14817">CVE-2019-14817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3835/">CVE-2019-3835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3835">CVE-2019-3835 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3839/">CVE-2019-3839 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3839">CVE-2019-3839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556078" comment="ghostscript-9.27-23.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556079" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151164" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1148987" ref_url="https://bugzilla.suse.com/1148987" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627/" source="CVE"/>
		<description>
This update for libgcrypt fixes the following issues:

Security issues fixed:
	  
- CVE-2019-13627: Mitigated ECDSA timing attack. (bsc#1148987)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-01"/>
	<updated date="2019-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1148987">SUSE bug 1148987</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13627">CVE-2019-13627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556080" comment="libgcrypt20-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522237" comment="libgcrypt20-32bit-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556081" comment="libgcrypt20-hmac-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530715" comment="libgcrypt20-hmac-32bit-1.6.1-16.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151165" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1145604" ref_url="https://bugzilla.suse.com/1145604" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.156-94_61 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2017-18379: Fixed an out of boundary access that happened in drivers/nvme/target/fc.c (bsc#1145604).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145604">SUSE bug 1145604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721146" comment="kernel-default 4.4.156-94.61 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719413" comment="kgraft-patch-4_4_156-94_61-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556082" comment="kgraft-patch-4_4_156-94_61-default-8-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151166" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1145604" ref_url="https://bugzilla.suse.com/1145604" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.156-94_57 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2017-18379: Fixed an out of boundary access that happened in drivers/nvme/target/fc.c (bsc#1145604).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145604">SUSE bug 1145604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721145" comment="kernel-default 4.4.156-94.57 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719412" comment="kgraft-patch-4_4_156-94_57-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556083" comment="kgraft-patch-4_4_156-94_57-default-8-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151167" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1145604" ref_url="https://bugzilla.suse.com/1145604" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.162-94_72 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2017-18379: Fixed an out of boundary access that happened in drivers/nvme/target/fc.c (bsc#1145604).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145604">SUSE bug 1145604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721149" comment="kernel-default 4.4.162-94.72 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719416" comment="kgraft-patch-4_4_162-94_72-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556084" comment="kgraft-patch-4_4_162-94_72-default-6-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151168" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1145604" ref_url="https://bugzilla.suse.com/1145604" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.162-94_69 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2017-18379: Fixed an out of boundary access that happened in drivers/nvme/target/fc.c (bsc#1145604).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145604">SUSE bug 1145604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721152" comment="kernel-default 4.4.162-94.69 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719419" comment="kgraft-patch-4_4_162-94_69-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556085" comment="kgraft-patch-4_4_162-94_69-default-6-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151169" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1145604" ref_url="https://bugzilla.suse.com/1145604" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.156-94_64 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2017-18379: Fixed an out of boundary access that happened in drivers/nvme/target/fc.c (bsc#1145604).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145604">SUSE bug 1145604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721147" comment="kernel-default 4.4.156-94.64 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719414" comment="kgraft-patch-4_4_156-94_64-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556086" comment="kgraft-patch-4_4_156-94_64-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151170" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1145604" ref_url="https://bugzilla.suse.com/1145604" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.176-94_88 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2017-18379: Fixed an out of boundary access that happened in drivers/nvme/target/fc.c (bsc#1145604).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145604">SUSE bug 1145604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721148" comment="kernel-default 4.4.176-94.88 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719415" comment="kgraft-patch-4_4_176-94_88-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556087" comment="kgraft-patch-4_4_176-94_88-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151171" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1145604" ref_url="https://bugzilla.suse.com/1145604" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.175-94_79 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2017-18379: Fixed an out of boundary access that happened in drivers/nvme/target/fc.c (bsc#1145604).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145604">SUSE bug 1145604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721151" comment="kernel-default 4.4.175-94.79 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719418" comment="kgraft-patch-4_4_175-94_79-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556088" comment="kgraft-patch-4_4_175-94_79-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151172" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1145604" ref_url="https://bugzilla.suse.com/1145604" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_103 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2017-18379: Fixed an out of boundary access that happened in drivers/nvme/target/fc.c (bsc#1145604).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145604">SUSE bug 1145604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721277" comment="kernel-default 4.4.180-94.103 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719602" comment="kgraft-patch-4_4_180-94_103-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556089" comment="kgraft-patch-4_4_180-94_103-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151173" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1145604" ref_url="https://bugzilla.suse.com/1145604" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_100 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2017-18379: Fixed an out of boundary access that happened in drivers/nvme/target/fc.c (bsc#1145604).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145604">SUSE bug 1145604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721278" comment="kernel-default 4.4.180-94.100 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719604" comment="kgraft-patch-4_4_180-94_100-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556090" comment="kgraft-patch-4_4_180-94_100-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151174" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1145604" ref_url="https://bugzilla.suse.com/1145604" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_97 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2017-18379: Fixed an out of boundary access that happened in drivers/nvme/target/fc.c (bsc#1145604).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145604">SUSE bug 1145604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721153" comment="kernel-default 4.4.180-94.97 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719420" comment="kgraft-patch-4_4_180-94_97-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556091" comment="kgraft-patch-4_4_180-94_97-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151175" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1145604" ref_url="https://bugzilla.suse.com/1145604" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.178-94_91 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2017-18379: Fixed an out of boundary access that happened in drivers/nvme/target/fc.c (bsc#1145604).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145604">SUSE bug 1145604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721150" comment="kernel-default 4.4.178-94.91 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719417" comment="kgraft-patch-4_4_178-94_91-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556092" comment="kgraft-patch-4_4_178-94_91-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151176" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1087200" ref_url="https://bugzilla.suse.com/1087200" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1117473" ref_url="https://bugzilla.suse.com/1117473" source="BUGZILLA"/>
		<reference ref_id="1123482" ref_url="https://bugzilla.suse.com/1123482" source="BUGZILLA"/>
		<reference ref_id="1124525" ref_url="https://bugzilla.suse.com/1124525" source="BUGZILLA"/>
		<reference ref_id="1133810" ref_url="https://bugzilla.suse.com/1133810" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="1145665" ref_url="https://bugzilla.suse.com/1145665" source="BUGZILLA"/>
		<reference ref_id="1149323" ref_url="https://bugzilla.suse.com/1149323" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Updated to new ESR version 68.1 (bsc#1149323).

In addition to the already fixed vulnerabilities released in previous ESR updates,
the following were also fixed:
    CVE-2019-11751, CVE-2019-11736, CVE-2019-9812, CVE-2019-11748, CVE-2019-11749,
    CVE-2019-11750, CVE-2019-11738, CVE-2019-11747, CVE-2019-11735.

Several run-time issues were also resolved (bsc#1117473, bsc#1124525, bsc#1133810).

The version displayed in Help &gt; About is now correct (bsc#1087200).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-09"/>
	<updated date="2019-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087200">SUSE bug 1087200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117473">SUSE bug 1117473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123482">SUSE bug 1123482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124525">SUSE bug 1124525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133810">SUSE bug 1133810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145665">SUSE bug 1145665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11710">CVE-2019-11710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11714">CVE-2019-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11716">CVE-2019-11716 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11718">CVE-2019-11718 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11720">CVE-2019-11720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11721">CVE-2019-11721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11723">CVE-2019-11723 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11724">CVE-2019-11724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11725">CVE-2019-11725 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11727">CVE-2019-11727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11728">CVE-2019-11728 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11733">CVE-2019-11733 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11735">CVE-2019-11735 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11736">CVE-2019-11736 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11738">CVE-2019-11738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11747">CVE-2019-11747 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11748">CVE-2019-11748 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11749">CVE-2019-11749 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11750">CVE-2019-11750 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11751">CVE-2019-11751 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11753">CVE-2019-11753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556093" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556094" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556095" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151177" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1109412" ref_url="https://bugzilla.suse.com/1109412" source="BUGZILLA"/>
		<reference ref_id="1109413" ref_url="https://bugzilla.suse.com/1109413" source="BUGZILLA"/>
		<reference ref_id="1109414" ref_url="https://bugzilla.suse.com/1109414" source="BUGZILLA"/>
		<reference ref_id="1111996" ref_url="https://bugzilla.suse.com/1111996" source="BUGZILLA"/>
		<reference ref_id="1112534" ref_url="https://bugzilla.suse.com/1112534" source="BUGZILLA"/>
		<reference ref_id="1112535" ref_url="https://bugzilla.suse.com/1112535" source="BUGZILLA"/>
		<reference ref_id="1113247" ref_url="https://bugzilla.suse.com/1113247" source="BUGZILLA"/>
		<reference ref_id="1113252" ref_url="https://bugzilla.suse.com/1113252" source="BUGZILLA"/>
		<reference ref_id="1113255" ref_url="https://bugzilla.suse.com/1113255" source="BUGZILLA"/>
		<reference ref_id="1116827" ref_url="https://bugzilla.suse.com/1116827" source="BUGZILLA"/>
		<reference ref_id="1118830" ref_url="https://bugzilla.suse.com/1118830" source="BUGZILLA"/>
		<reference ref_id="1118831" ref_url="https://bugzilla.suse.com/1118831" source="BUGZILLA"/>
		<reference ref_id="1120640" ref_url="https://bugzilla.suse.com/1120640" source="BUGZILLA"/>
		<reference ref_id="1121034" ref_url="https://bugzilla.suse.com/1121034" source="BUGZILLA"/>
		<reference ref_id="1121035" ref_url="https://bugzilla.suse.com/1121035" source="BUGZILLA"/>
		<reference ref_id="1121056" ref_url="https://bugzilla.suse.com/1121056" source="BUGZILLA"/>
		<reference ref_id="1133131" ref_url="https://bugzilla.suse.com/1133131" source="BUGZILLA"/>
		<reference ref_id="1133232" ref_url="https://bugzilla.suse.com/1133232" source="BUGZILLA"/>
		<reference ref_id="1141913" ref_url="https://bugzilla.suse.com/1141913" source="BUGZILLA"/>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000876" ref_url="https://www.suse.com/security/cve/CVE-2018-1000876/" source="CVE"/>
		<reference ref_id="CVE-2018-17358" ref_url="https://www.suse.com/security/cve/CVE-2018-17358/" source="CVE"/>
		<reference ref_id="CVE-2018-17359" ref_url="https://www.suse.com/security/cve/CVE-2018-17359/" source="CVE"/>
		<reference ref_id="CVE-2018-17360" ref_url="https://www.suse.com/security/cve/CVE-2018-17360/" source="CVE"/>
		<reference ref_id="CVE-2018-17985" ref_url="https://www.suse.com/security/cve/CVE-2018-17985/" source="CVE"/>
		<reference ref_id="CVE-2018-18309" ref_url="https://www.suse.com/security/cve/CVE-2018-18309/" source="CVE"/>
		<reference ref_id="CVE-2018-18483" ref_url="https://www.suse.com/security/cve/CVE-2018-18483/" source="CVE"/>
		<reference ref_id="CVE-2018-18484" ref_url="https://www.suse.com/security/cve/CVE-2018-18484/" source="CVE"/>
		<reference ref_id="CVE-2018-18605" ref_url="https://www.suse.com/security/cve/CVE-2018-18605/" source="CVE"/>
		<reference ref_id="CVE-2018-18606" ref_url="https://www.suse.com/security/cve/CVE-2018-18606/" source="CVE"/>
		<reference ref_id="CVE-2018-18607" ref_url="https://www.suse.com/security/cve/CVE-2018-18607/" source="CVE"/>
		<reference ref_id="CVE-2018-19931" ref_url="https://www.suse.com/security/cve/CVE-2018-19931/" source="CVE"/>
		<reference ref_id="CVE-2018-19932" ref_url="https://www.suse.com/security/cve/CVE-2018-19932/" source="CVE"/>
		<reference ref_id="CVE-2018-20623" ref_url="https://www.suse.com/security/cve/CVE-2018-20623/" source="CVE"/>
		<reference ref_id="CVE-2018-20651" ref_url="https://www.suse.com/security/cve/CVE-2018-20651/" source="CVE"/>
		<reference ref_id="CVE-2018-20671" ref_url="https://www.suse.com/security/cve/CVE-2018-20671/" source="CVE"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<description>
This update for binutils fixes the following issues:

binutils was updated to current 2.32 branch @7b468db3 [jsc#ECO-368]:

Includes the following security fixes:

- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)
- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)
- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)
- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)
- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)
- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)
- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)
- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)
- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)
- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)
- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)
- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)
- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)
- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)
- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in  load_specific_debug_section in objdump.c (bsc#1121056)
- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)
- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)

- Enable xtensa architecture (Tensilica lc6 and related)
- Use -ffat-lto-objects in order to provide assembly for static libs
  (bsc#1141913).
- Fixed some LTO problems (bsc#1133131 bsc#1133232).
- riscv: Don't check ABI flags if no code section

Update to binutils 2.32:

* The binutils now support for the C-SKY processor series.
* The x86 assembler now supports a -mvexwig=[0|1] option to control
  encoding of VEX.W-ignored (WIG) VEX instructions.
  It also has a new -mx86-used-note=[yes|no] option to generate (or
  not) x86 GNU property notes.
* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),
  the Loongson EXTensions (EXT) instructions, the Loongson Content
  Address Memory (CAM) ASE and the Loongson MultiMedia extensions
  Instructions (MMI) ASE.
* The addr2line, c++filt, nm and objdump tools now have a default
  limit on the maximum amount of recursion that is allowed whilst
  demangling strings.  This limit can be disabled if necessary.
* Objdump's --disassemble option can now take a parameter,
  specifying the starting symbol for disassembly.  Disassembly will
  continue from this symbol up to the next symbol or the end of the
  function.
* The BFD linker will now report property change in linker map file
  when merging GNU properties.
* The BFD linker's -t option now doesn't report members within
  archives, unless -t is given twice.  This makes it more useful
  when generating a list of files that should be packaged for a
  linker bug report.
* The GOLD linker has improved warning messages for relocations that
  refer to discarded sections.

- Improve relro support on s390 [fate#326356]
- Handle ELF compressed header alignment correctly.

  		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-14"/>
	<updated date="2019-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109412">SUSE bug 1109412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109413">SUSE bug 1109413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109414">SUSE bug 1109414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111996">SUSE bug 1111996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112534">SUSE bug 1112534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112535">SUSE bug 1112535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113247">SUSE bug 1113247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113252">SUSE bug 1113252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113255">SUSE bug 1113255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116827">SUSE bug 1116827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118830">SUSE bug 1118830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118831">SUSE bug 1118831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120640">SUSE bug 1120640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121034">SUSE bug 1121034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121035">SUSE bug 1121035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121056">SUSE bug 1121056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133131">SUSE bug 1133131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133232">SUSE bug 1133232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141913">SUSE bug 1141913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000876/">CVE-2018-1000876 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000876">CVE-2018-1000876 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17358/">CVE-2018-17358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17358">CVE-2018-17358 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17359/">CVE-2018-17359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17359">CVE-2018-17359 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17360/">CVE-2018-17360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17360">CVE-2018-17360 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17985/">CVE-2018-17985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17985">CVE-2018-17985 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18309/">CVE-2018-18309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18309">CVE-2018-18309 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18483/">CVE-2018-18483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18483">CVE-2018-18483 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18484/">CVE-2018-18484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18484">CVE-2018-18484 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18605/">CVE-2018-18605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18605">CVE-2018-18605 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18606/">CVE-2018-18606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18606">CVE-2018-18606 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18607/">CVE-2018-18607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18607">CVE-2018-18607 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19931/">CVE-2018-19931 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19931">CVE-2018-19931 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19932/">CVE-2018-19932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19932">CVE-2018-19932 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20623/">CVE-2018-20623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20623">CVE-2018-20623 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20651/">CVE-2018-20651 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20651">CVE-2018-20651 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20671/">CVE-2018-20671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20671">CVE-2018-20671 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010180">CVE-2019-1010180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556096" comment="binutils-2.32-9.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151178" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1153674" ref_url="https://bugzilla.suse.com/1153674" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<description>
This update for sudo fixes the following issues:

Security issue fixed: 	  

- CVE-2019-14287: Fixed an issue where a user with sudo privileges
  that allowed them to run commands with an arbitrary uid, could
  run commands as root, despite being forbidden to do so in sudoers
  (bsc#1153674).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14287">CVE-2019-14287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556097" comment="sudo-1.8.20p2-3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151179" version="1" class="patch">
	<metadata>
		<title>Security update for libpcap (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1153332" ref_url="https://bugzilla.suse.com/1153332" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2019-15165" ref_url="https://www.suse.com/security/cve/CVE-2019-15165/" source="CVE"/>
		<description>
This update for libpcap fixes the following issues:

- CVE-2019-15165: Added sanity checks for PHB header length before allocating memory (bsc#1153332).
- CVE-2018-16301: Fixed a buffer overflow (bsc#1153332).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15165/">CVE-2019-15165 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15165">CVE-2019-15165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556098" comment="libpcap1-1.8.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556099" comment="tcpdump-4.9.2-14.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151180" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126197" ref_url="https://bugzilla.suse.com/1126197" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1133818" ref_url="https://bugzilla.suse.com/1133818" source="BUGZILLA"/>
		<reference ref_id="1143797" ref_url="https://bugzilla.suse.com/1143797" source="BUGZILLA"/>
		<reference ref_id="1146874" ref_url="https://bugzilla.suse.com/1146874" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-17340" ref_url="https://www.suse.com/security/cve/CVE-2019-17340/" source="CVE"/>
		<reference ref_id="CVE-2019-17341" ref_url="https://www.suse.com/security/cve/CVE-2019-17341/" source="CVE"/>
		<reference ref_id="CVE-2019-17342" ref_url="https://www.suse.com/security/cve/CVE-2019-17342/" source="CVE"/>
		<reference ref_id="CVE-2019-17343" ref_url="https://www.suse.com/security/cve/CVE-2019-17343/" source="CVE"/>
		<reference ref_id="CVE-2019-17344" ref_url="https://www.suse.com/security/cve/CVE-2019-17344/" source="CVE"/>
		<reference ref_id="CVE-2019-17345" ref_url="https://www.suse.com/security/cve/CVE-2019-17345/" source="CVE"/>
		<reference ref_id="CVE-2019-17346" ref_url="https://www.suse.com/security/cve/CVE-2019-17346/" source="CVE"/>
		<reference ref_id="CVE-2019-17347" ref_url="https://www.suse.com/security/cve/CVE-2019-17347/" source="CVE"/>
		<reference ref_id="CVE-2019-17348" ref_url="https://www.suse.com/security/cve/CVE-2019-17348/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed: 	  

- CVE-2019-15890: Fixed a use-after-free in SLiRP networking implementation of QEMU emulator
  which could have led to Denial of Service (bsc#1149813).
- CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite loop and denial of 
  service (bsc#1146874).
- CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking implementation of QEMU 
  emulator which could have led to execution of  arbitrary code with privileges of the 
  QEMU process (bsc#1143797).

Other issue fixed: 

- Fixed an issue where libxenlight could not restore domain vsa6535522 on live migration (bsc#1133818).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-24"/>
	<updated date="2019-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126197">SUSE bug 1126197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133818">SUSE bug 1133818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146874">SUSE bug 1146874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12068">CVE-2019-12068 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14378">CVE-2019-14378 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17340/">CVE-2019-17340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17340">CVE-2019-17340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17341/">CVE-2019-17341 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17341">CVE-2019-17341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17342/">CVE-2019-17342 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17342">CVE-2019-17342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17343/">CVE-2019-17343 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17343">CVE-2019-17343 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17344/">CVE-2019-17344 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17344">CVE-2019-17344 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17345/">CVE-2019-17345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17345">CVE-2019-17345 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17346/">CVE-2019-17346 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17346">CVE-2019-17346 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17347/">CVE-2019-17347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17347">CVE-2019-17347 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17348/">CVE-2019-17348 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17348">CVE-2019-17348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538307" comment="xen-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538308" comment="xen-doc-html-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538309" comment="xen-libs-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538310" comment="xen-libs-32bit-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538311" comment="xen-tools-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538312" comment="xen-tools-domU-4.9.4_04-3.56.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151181" version="1" class="patch">
	<metadata>
		<title>Security update for nfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1150733" ref_url="https://bugzilla.suse.com/1150733" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3689" ref_url="https://www.suse.com/security/cve/CVE-2019-3689/" source="CVE"/>
		<description>
This update for nfs-utils fixes the following issues:

- CVE-2019-3689: Fixed root-owned files stored in insecure /var/lib/nfs. (bsc#1150733)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-25"/>
	<updated date="2019-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150733">SUSE bug 1150733</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3689/">CVE-2019-3689 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3689">CVE-2019-3689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556100" comment="nfs-client-1.3.0-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556101" comment="nfs-doc-1.3.0-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556102" comment="nfs-kernel-server-1.3.0-34.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151182" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.156-94_64 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721147" comment="kernel-default 4.4.156-94.64 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719414" comment="kgraft-patch-4_4_156-94_64-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556103" comment="kgraft-patch-4_4_156-94_64-default-8-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151183" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.162-94_69 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721152" comment="kernel-default 4.4.162-94.69 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719419" comment="kgraft-patch-4_4_162-94_69-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556104" comment="kgraft-patch-4_4_162-94_69-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151184" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.162-94_72 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721149" comment="kernel-default 4.4.162-94.72 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719416" comment="kgraft-patch-4_4_162-94_72-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556105" comment="kgraft-patch-4_4_162-94_72-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151185" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.175-94_79 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721151" comment="kernel-default 4.4.175-94.79 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719418" comment="kgraft-patch-4_4_175-94_79-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556106" comment="kgraft-patch-4_4_175-94_79-default-6-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151186" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.176-94_88 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721148" comment="kernel-default 4.4.176-94.88 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719415" comment="kgraft-patch-4_4_176-94_88-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556107" comment="kgraft-patch-4_4_176-94_88-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151187" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.178-94_91 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721150" comment="kernel-default 4.4.178-94.91 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719417" comment="kgraft-patch-4_4_178-94_91-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556108" comment="kgraft-patch-4_4_178-94_91-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151188" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_97 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721153" comment="kernel-default 4.4.180-94.97 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719420" comment="kgraft-patch-4_4_180-94_97-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556109" comment="kgraft-patch-4_4_180-94_97-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151189" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_100 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721278" comment="kernel-default 4.4.180-94.100 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719604" comment="kgraft-patch-4_4_180-94_100-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556110" comment="kgraft-patch-4_4_180-94_100-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151190" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_103 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721277" comment="kernel-default 4.4.180-94.103 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719602" comment="kgraft-patch-4_4_180-94_103-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556111" comment="kgraft-patch-4_4_180-94_103-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151191" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1010399" ref_url="https://bugzilla.suse.com/1010399" source="BUGZILLA"/>
		<reference ref_id="1010405" ref_url="https://bugzilla.suse.com/1010405" source="BUGZILLA"/>
		<reference ref_id="1010406" ref_url="https://bugzilla.suse.com/1010406" source="BUGZILLA"/>
		<reference ref_id="1010408" ref_url="https://bugzilla.suse.com/1010408" source="BUGZILLA"/>
		<reference ref_id="1010409" ref_url="https://bugzilla.suse.com/1010409" source="BUGZILLA"/>
		<reference ref_id="1010421" ref_url="https://bugzilla.suse.com/1010421" source="BUGZILLA"/>
		<reference ref_id="1010423" ref_url="https://bugzilla.suse.com/1010423" source="BUGZILLA"/>
		<reference ref_id="1010424" ref_url="https://bugzilla.suse.com/1010424" source="BUGZILLA"/>
		<reference ref_id="1010425" ref_url="https://bugzilla.suse.com/1010425" source="BUGZILLA"/>
		<reference ref_id="1010426" ref_url="https://bugzilla.suse.com/1010426" source="BUGZILLA"/>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1043008" ref_url="https://bugzilla.suse.com/1043008" source="BUGZILLA"/>
		<reference ref_id="1047281" ref_url="https://bugzilla.suse.com/1047281" source="BUGZILLA"/>
		<reference ref_id="1074235" ref_url="https://bugzilla.suse.com/1074235" source="BUGZILLA"/>
		<reference ref_id="1092611" ref_url="https://bugzilla.suse.com/1092611" source="BUGZILLA"/>
		<reference ref_id="1120374" ref_url="https://bugzilla.suse.com/1120374" source="BUGZILLA"/>
		<reference ref_id="1137990" ref_url="https://bugzilla.suse.com/1137990" source="BUGZILLA"/>
		<reference ref_id="1149429" ref_url="https://bugzilla.suse.com/1149429" source="BUGZILLA"/>
		<reference ref_id="1154738" ref_url="https://bugzilla.suse.com/1154738" source="BUGZILLA"/>
		<reference ref_id="959933" ref_url="https://bugzilla.suse.com/959933" source="BUGZILLA"/>
		<reference ref_id="983922" ref_url="https://bugzilla.suse.com/983922" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-5289" ref_url="https://www.suse.com/security/cve/CVE-2016-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-5292" ref_url="https://www.suse.com/security/cve/CVE-2016-5292/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2016-9067" ref_url="https://www.suse.com/security/cve/CVE-2016-9067/" source="CVE"/>
		<reference ref_id="CVE-2016-9068" ref_url="https://www.suse.com/security/cve/CVE-2016-9068/" source="CVE"/>
		<reference ref_id="CVE-2016-9069" ref_url="https://www.suse.com/security/cve/CVE-2016-9069/" source="CVE"/>
		<reference ref_id="CVE-2016-9071" ref_url="https://www.suse.com/security/cve/CVE-2016-9071/" source="CVE"/>
		<reference ref_id="CVE-2016-9073" ref_url="https://www.suse.com/security/cve/CVE-2016-9073/" source="CVE"/>
		<reference ref_id="CVE-2016-9075" ref_url="https://www.suse.com/security/cve/CVE-2016-9075/" source="CVE"/>
		<reference ref_id="CVE-2016-9076" ref_url="https://www.suse.com/security/cve/CVE-2016-9076/" source="CVE"/>
		<reference ref_id="CVE-2016-9077" ref_url="https://www.suse.com/security/cve/CVE-2016-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-7789" ref_url="https://www.suse.com/security/cve/CVE-2017-7789/" source="CVE"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5151" ref_url="https://www.suse.com/security/cve/CVE-2018-5151/" source="CVE"/>
		<reference ref_id="CVE-2018-5152" ref_url="https://www.suse.com/security/cve/CVE-2018-5152/" source="CVE"/>
		<reference ref_id="CVE-2018-5153" ref_url="https://www.suse.com/security/cve/CVE-2018-5153/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5160" ref_url="https://www.suse.com/security/cve/CVE-2018-5160/" source="CVE"/>
		<reference ref_id="CVE-2018-5163" ref_url="https://www.suse.com/security/cve/CVE-2018-5163/" source="CVE"/>
		<reference ref_id="CVE-2018-5164" ref_url="https://www.suse.com/security/cve/CVE-2018-5164/" source="CVE"/>
		<reference ref_id="CVE-2018-5165" ref_url="https://www.suse.com/security/cve/CVE-2018-5165/" source="CVE"/>
		<reference ref_id="CVE-2018-5166" ref_url="https://www.suse.com/security/cve/CVE-2018-5166/" source="CVE"/>
		<reference ref_id="CVE-2018-5167" ref_url="https://www.suse.com/security/cve/CVE-2018-5167/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5169" ref_url="https://www.suse.com/security/cve/CVE-2018-5169/" source="CVE"/>
		<reference ref_id="CVE-2018-5172" ref_url="https://www.suse.com/security/cve/CVE-2018-5172/" source="CVE"/>
		<reference ref_id="CVE-2018-5173" ref_url="https://www.suse.com/security/cve/CVE-2018-5173/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5175" ref_url="https://www.suse.com/security/cve/CVE-2018-5175/" source="CVE"/>
		<reference ref_id="CVE-2018-5176" ref_url="https://www.suse.com/security/cve/CVE-2018-5176/" source="CVE"/>
		<reference ref_id="CVE-2018-5177" ref_url="https://www.suse.com/security/cve/CVE-2018-5177/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5179" ref_url="https://www.suse.com/security/cve/CVE-2018-5179/" source="CVE"/>
		<reference ref_id="CVE-2018-5180" ref_url="https://www.suse.com/security/cve/CVE-2018-5180/" source="CVE"/>
		<reference ref_id="CVE-2018-5181" ref_url="https://www.suse.com/security/cve/CVE-2018-5181/" source="CVE"/>
		<reference ref_id="CVE-2018-5182" ref_url="https://www.suse.com/security/cve/CVE-2018-5182/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<description>
This update for MozillaFirefox to 68.2.0 ESR fixes the following issues:

Mozilla Firefox was updated to version 68.2.0 ESR (bsc#1154738).

Security issues fixed:

-  CVE-2019-15903: Fixed a heap overflow in the expat library (bsc#1149429).
-  CVE-2019-11757: Fixed a use-after-free when creating index updates in IndexedDB (bsc#1154738).
-  CVE-2019-11758: Fixed a potentially exploitable crash due to 360 Total Security (bsc#1154738).
-  CVE-2019-11759: Fixed a stack buffer overflow in HKDF output (bsc#1154738).
-  CVE-2019-11760: Fixed a stack buffer overflow in WebRTC networking (bsc#1154738).
-  CVE-2019-11761: Fixed an unintended access to a privileged JSONView object (bsc#1154738).
-  CVE-2019-11762: Fixed a same-origin-property violation (bsc#1154738).
-  CVE-2019-11763: Fixed an XSS bypass (bsc#1154738).
-  CVE-2019-11764: Fixed several memory safety bugs (bsc#1154738).

Non-security issues fixed:

- Firefox 60.7 ESR changed the user interface language (bsc#1137990).
- Wrong Firefox GUI Language (bsc#1120374).
- Fixed an inadvertent crash report transmission without user opt-in (bsc#1074235).
- Firefox hangs randomly when browsing and scrolling (bsc#1043008).
- Firefox stops loading page until mouse is moved (bsc#1025108).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-31"/>
	<updated date="2019-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010399">SUSE bug 1010399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010405">SUSE bug 1010405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010406">SUSE bug 1010406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010408">SUSE bug 1010408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010409">SUSE bug 1010409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010421">SUSE bug 1010421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010423">SUSE bug 1010423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010424">SUSE bug 1010424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010425">SUSE bug 1010425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010426">SUSE bug 1010426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043008">SUSE bug 1043008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047281">SUSE bug 1047281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074235">SUSE bug 1074235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120374">SUSE bug 1120374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137990">SUSE bug 1137990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959933">SUSE bug 959933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983922">SUSE bug 983922</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2830">CVE-2016-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5289/">CVE-2016-5289 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5289">CVE-2016-5289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5292/">CVE-2016-5292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5292">CVE-2016-5292 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9067/">CVE-2016-9067 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9067">CVE-2016-9067 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9068/">CVE-2016-9068 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9068">CVE-2016-9068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9069/">CVE-2016-9069 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9069">CVE-2016-9069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9071/">CVE-2016-9071 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9071">CVE-2016-9071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9073/">CVE-2016-9073 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9073">CVE-2016-9073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9075/">CVE-2016-9075 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9075">CVE-2016-9075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9076/">CVE-2016-9076 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9076">CVE-2016-9076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9077/">CVE-2016-9077 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9077">CVE-2016-9077 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7789/">CVE-2017-7789 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7789">CVE-2017-7789 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5150">CVE-2018-5150 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5151/">CVE-2018-5151 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5151">CVE-2018-5151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5152/">CVE-2018-5152 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5152">CVE-2018-5152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5153/">CVE-2018-5153 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5153">CVE-2018-5153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5154">CVE-2018-5154 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5155">CVE-2018-5155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5157">CVE-2018-5157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5158">CVE-2018-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5159">CVE-2018-5159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5160/">CVE-2018-5160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5160">CVE-2018-5160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5163/">CVE-2018-5163 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5163">CVE-2018-5163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5164/">CVE-2018-5164 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5164">CVE-2018-5164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5165/">CVE-2018-5165 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5165">CVE-2018-5165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5166/">CVE-2018-5166 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5166">CVE-2018-5166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5167/">CVE-2018-5167 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5167">CVE-2018-5167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5168">CVE-2018-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5169/">CVE-2018-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5169">CVE-2018-5169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5172/">CVE-2018-5172 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5172">CVE-2018-5172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5173/">CVE-2018-5173 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5173">CVE-2018-5173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5174">CVE-2018-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5175/">CVE-2018-5175 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5175">CVE-2018-5175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5176/">CVE-2018-5176 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5176">CVE-2018-5176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5177/">CVE-2018-5177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5177">CVE-2018-5177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5178">CVE-2018-5178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5179/">CVE-2018-5179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5179">CVE-2018-5179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5180/">CVE-2018-5180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5180">CVE-2018-5180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5181/">CVE-2018-5181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5181">CVE-2018-5181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5182/">CVE-2018-5182 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5182">CVE-2018-5182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5183">CVE-2018-5183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11757">CVE-2019-11757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11758">CVE-2019-11758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11759">CVE-2019-11759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11760">CVE-2019-11760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11761">CVE-2019-11761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11762">CVE-2019-11762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11763">CVE-2019-11763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11764">CVE-2019-11764 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556112" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556113" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151192" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1144902" ref_url="https://bugzilla.suse.com/1144902" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2019-10218: Client code can return filenames containing path separators (bsc#1144902).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-04"/>
	<updated date="2019-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10218">CVE-2019-10218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556114" comment="libdcerpc-binding0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522303" comment="libdcerpc-binding0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556115" comment="libdcerpc0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522305" comment="libdcerpc0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556116" comment="libndr-krb5pac0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522307" comment="libndr-krb5pac0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556117" comment="libndr-nbt0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522309" comment="libndr-nbt0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556118" comment="libndr-standard0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522311" comment="libndr-standard0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556119" comment="libndr0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522313" comment="libndr0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556120" comment="libnetapi0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522315" comment="libnetapi0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556121" comment="libsamba-credentials0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522317" comment="libsamba-credentials0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556122" comment="libsamba-errors0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522319" comment="libsamba-errors0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556123" comment="libsamba-hostconfig0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522321" comment="libsamba-hostconfig0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556124" comment="libsamba-passdb0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522323" comment="libsamba-passdb0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556125" comment="libsamba-util0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522325" comment="libsamba-util0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556126" comment="libsamdb0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522327" comment="libsamdb0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556127" comment="libsmbclient0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522329" comment="libsmbclient0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556128" comment="libsmbconf0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522331" comment="libsmbconf0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556129" comment="libsmbldap0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522333" comment="libsmbldap0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556130" comment="libtevent-util0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522335" comment="libtevent-util0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556131" comment="libwbclient0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522337" comment="libwbclient0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556132" comment="samba-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556133" comment="samba-client-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522340" comment="samba-client-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522341" comment="samba-doc-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556134" comment="samba-libs-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522343" comment="samba-libs-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556135" comment="samba-winbind-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522345" comment="samba-winbind-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151193" version="1" class="patch">
	<metadata>
		<title>Security update for gdb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1115034" ref_url="https://bugzilla.suse.com/1115034" source="BUGZILLA"/>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="1145692" ref_url="https://bugzilla.suse.com/1145692" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<description>
This update for gdb fixes the following issues:

Update to gdb 8.3.1: (jsc#ECO-368)

Security issues fixed:

- CVE-2019-1010180: Fixed a potential buffer overflow when loading ELF sections larger than the file. (bsc#1142772)

Upgrade libipt from v2.0 to v2.0.1.

- Enable librpm for version &gt; librpm.so.3 [bsc#1145692]:
  * Allow any librpm.so.x
  * Add %build test to check for 'zypper install &lt;rpm-packagename&gt;'
    message

- Copy gdbinit from fedora master @ 25caf28.  Add
  gdbinit.without-python, and use it for --without=python.

Rebase to 8.3 release (as in fedora 30 @ 1e222a3).

* DWARF index cache: GDB can now automatically save indices of DWARF
  symbols on disk to speed up further loading of the same binaries.
* Ada task switching is now supported on aarch64-elf targets when
  debugging a program using the Ravenscar Profile.
* Terminal styling is now available for the CLI and the TUI.
* Removed support for old demangling styles arm, edg, gnu, hp and
  lucid.
* Support for new native configuration RISC-V GNU/Linux (riscv*-*-linux*).

- Implemented access to more POWER8 registers.  [fate#326120, fate#325178]
- Also handle most new s390 arch13 instructions.  [fate#327369, jsc#ECO-368]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-07"/>
	<updated date="2019-11-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1115034">SUSE bug 1115034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145692">SUSE bug 1145692</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010180">CVE-2019-1010180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556136" comment="gdb-8.3.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151194" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1154862" ref_url="https://bugzilla.suse.com/1154862" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issue:

- CVE-2019-17498: Fixed an integer overflow in a bounds check that might have led to the disclosure of sensitive information or a denial of service (bsc#1154862).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-08"/>
	<updated date="2019-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">CVE-2019-17498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556137" comment="libssh2-1-1.4.3-20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522351" comment="libssh2-1-32bit-1.4.3-20.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151195" version="1" class="patch">
	<metadata>
		<title>Security update for libseccomp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1128828" ref_url="https://bugzilla.suse.com/1128828" source="BUGZILLA"/>
		<reference ref_id="1142614" ref_url="https://bugzilla.suse.com/1142614" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9893" ref_url="https://www.suse.com/security/cve/CVE-2019-9893/" source="CVE"/>
		<description>
This update for libseccomp fixes the following issues:

Update to new upstream release 2.4.1:

* Fix a BPF generation bug where the optimizer mistakenly
  identified duplicate BPF code blocks.

Updated to 2.4.0 (bsc#1128828 CVE-2019-9893):

* Update the syscall table for Linux v5.0-rc5
* Added support for the SCMP_ACT_KILL_PROCESS action
* Added support for the SCMP_ACT_LOG action and SCMP_FLTATR_CTL_LOG attribute
* Added explicit 32-bit (SCMP_AX_32(...)) and 64-bit (SCMP_AX_64(...)) argument comparison macros to help protect against unexpected sign extension
* Added support for the parisc and parisc64 architectures
* Added the ability to query and set the libseccomp API level via seccomp_api_get(3) and seccomp_api_set(3)
* Return -EDOM on an endian mismatch when adding an architecture to a filter
* Renumber the pseudo syscall number for subpage_prot() so it no longer conflicts with spu_run()
* Fix PFC generation when a syscall is prioritized, but no rule exists
* Numerous fixes to the seccomp-bpf filter generation code
* Switch our internal hashing function to jhash/Lookup3 to MurmurHash3
* Numerous tests added to the included test suite, coverage now at ~92%
* Update our Travis CI configuration to use Ubuntu 16.04
* Numerous documentation fixes and updates

Update to release 2.3.3:

* Updated the syscall table for Linux v4.15-rc7

Update to release 2.3.2:

* Achieved full compliance with the CII Best Practices program
* Added Travis CI builds to the GitHub repository
* Added code coverage reporting with the '--enable-code-coverage' configure
  flag and added Coveralls to the GitHub repository
* Updated the syscall tables to match Linux v4.10-rc6+
* Support for building with Python v3.x
* Allow rules with the -1 syscall if the SCMP\_FLTATR\_API\_TSKIP attribute is
  set to true
* Several small documentation fixes

- ignore make check error for ppc64/ppc64le, bypass bsc#1142614
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128828">SUSE bug 1128828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142614">SUSE bug 1142614</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9893/">CVE-2019-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9893">CVE-2019-9893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556138" comment="libseccomp2-2.4.1-11.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522353" comment="libseccomp2-32bit-2.4.1-11.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151196" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1084878" ref_url="https://bugzilla.suse.com/1084878" source="BUGZILLA"/>
		<reference ref_id="1117665" ref_url="https://bugzilla.suse.com/1117665" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1133140" ref_url="https://bugzilla.suse.com/1133140" source="BUGZILLA"/>
		<reference ref_id="1135966" ref_url="https://bugzilla.suse.com/1135966" source="BUGZILLA"/>
		<reference ref_id="1135967" ref_url="https://bugzilla.suse.com/1135967" source="BUGZILLA"/>
		<reference ref_id="1136261" ref_url="https://bugzilla.suse.com/1136261" source="BUGZILLA"/>
		<reference ref_id="1137865" ref_url="https://bugzilla.suse.com/1137865" source="BUGZILLA"/>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1140671" ref_url="https://bugzilla.suse.com/1140671" source="BUGZILLA"/>
		<reference ref_id="1141013" ref_url="https://bugzilla.suse.com/1141013" source="BUGZILLA"/>
		<reference ref_id="1141054" ref_url="https://bugzilla.suse.com/1141054" source="BUGZILLA"/>
		<reference ref_id="1142458" ref_url="https://bugzilla.suse.com/1142458" source="BUGZILLA"/>
		<reference ref_id="1143187" ref_url="https://bugzilla.suse.com/1143187" source="BUGZILLA"/>
		<reference ref_id="1144123" ref_url="https://bugzilla.suse.com/1144123" source="BUGZILLA"/>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1145477" ref_url="https://bugzilla.suse.com/1145477" source="BUGZILLA"/>
		<reference ref_id="1146042" ref_url="https://bugzilla.suse.com/1146042" source="BUGZILLA"/>
		<reference ref_id="1146163" ref_url="https://bugzilla.suse.com/1146163" source="BUGZILLA"/>
		<reference ref_id="1146285" ref_url="https://bugzilla.suse.com/1146285" source="BUGZILLA"/>
		<reference ref_id="1146361" ref_url="https://bugzilla.suse.com/1146361" source="BUGZILLA"/>
		<reference ref_id="1146378" ref_url="https://bugzilla.suse.com/1146378" source="BUGZILLA"/>
		<reference ref_id="1146391" ref_url="https://bugzilla.suse.com/1146391" source="BUGZILLA"/>
		<reference ref_id="1146413" ref_url="https://bugzilla.suse.com/1146413" source="BUGZILLA"/>
		<reference ref_id="1146425" ref_url="https://bugzilla.suse.com/1146425" source="BUGZILLA"/>
		<reference ref_id="1146512" ref_url="https://bugzilla.suse.com/1146512" source="BUGZILLA"/>
		<reference ref_id="1146514" ref_url="https://bugzilla.suse.com/1146514" source="BUGZILLA"/>
		<reference ref_id="1146516" ref_url="https://bugzilla.suse.com/1146516" source="BUGZILLA"/>
		<reference ref_id="1146519" ref_url="https://bugzilla.suse.com/1146519" source="BUGZILLA"/>
		<reference ref_id="1146524" ref_url="https://bugzilla.suse.com/1146524" source="BUGZILLA"/>
		<reference ref_id="1146526" ref_url="https://bugzilla.suse.com/1146526" source="BUGZILLA"/>
		<reference ref_id="1146529" ref_url="https://bugzilla.suse.com/1146529" source="BUGZILLA"/>
		<reference ref_id="1146540" ref_url="https://bugzilla.suse.com/1146540" source="BUGZILLA"/>
		<reference ref_id="1146543" ref_url="https://bugzilla.suse.com/1146543" source="BUGZILLA"/>
		<reference ref_id="1146547" ref_url="https://bugzilla.suse.com/1146547" source="BUGZILLA"/>
		<reference ref_id="1146550" ref_url="https://bugzilla.suse.com/1146550" source="BUGZILLA"/>
		<reference ref_id="1146584" ref_url="https://bugzilla.suse.com/1146584" source="BUGZILLA"/>
		<reference ref_id="1146589" ref_url="https://bugzilla.suse.com/1146589" source="BUGZILLA"/>
		<reference ref_id="1147022" ref_url="https://bugzilla.suse.com/1147022" source="BUGZILLA"/>
		<reference ref_id="1147122" ref_url="https://bugzilla.suse.com/1147122" source="BUGZILLA"/>
		<reference ref_id="1148394" ref_url="https://bugzilla.suse.com/1148394" source="BUGZILLA"/>
		<reference ref_id="1148938" ref_url="https://bugzilla.suse.com/1148938" source="BUGZILLA"/>
		<reference ref_id="1149083" ref_url="https://bugzilla.suse.com/1149083" source="BUGZILLA"/>
		<reference ref_id="1149376" ref_url="https://bugzilla.suse.com/1149376" source="BUGZILLA"/>
		<reference ref_id="1149522" ref_url="https://bugzilla.suse.com/1149522" source="BUGZILLA"/>
		<reference ref_id="1149527" ref_url="https://bugzilla.suse.com/1149527" source="BUGZILLA"/>
		<reference ref_id="1149555" ref_url="https://bugzilla.suse.com/1149555" source="BUGZILLA"/>
		<reference ref_id="1149612" ref_url="https://bugzilla.suse.com/1149612" source="BUGZILLA"/>
		<reference ref_id="1150025" ref_url="https://bugzilla.suse.com/1150025" source="BUGZILLA"/>
		<reference ref_id="1150112" ref_url="https://bugzilla.suse.com/1150112" source="BUGZILLA"/>
		<reference ref_id="1150452" ref_url="https://bugzilla.suse.com/1150452" source="BUGZILLA"/>
		<reference ref_id="1150457" ref_url="https://bugzilla.suse.com/1150457" source="BUGZILLA"/>
		<reference ref_id="1150465" ref_url="https://bugzilla.suse.com/1150465" source="BUGZILLA"/>
		<reference ref_id="1150727" ref_url="https://bugzilla.suse.com/1150727" source="BUGZILLA"/>
		<reference ref_id="1150942" ref_url="https://bugzilla.suse.com/1150942" source="BUGZILLA"/>
		<reference ref_id="1151347" ref_url="https://bugzilla.suse.com/1151347" source="BUGZILLA"/>
		<reference ref_id="1151350" ref_url="https://bugzilla.suse.com/1151350" source="BUGZILLA"/>
		<reference ref_id="1152685" ref_url="https://bugzilla.suse.com/1152685" source="BUGZILLA"/>
		<reference ref_id="1152782" ref_url="https://bugzilla.suse.com/1152782" source="BUGZILLA"/>
		<reference ref_id="1152788" ref_url="https://bugzilla.suse.com/1152788" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153263" ref_url="https://bugzilla.suse.com/1153263" source="BUGZILLA"/>
		<reference ref_id="1154103" ref_url="https://bugzilla.suse.com/1154103" source="BUGZILLA"/>
		<reference ref_id="1154372" ref_url="https://bugzilla.suse.com/1154372" source="BUGZILLA"/>
		<reference ref_id="1155131" ref_url="https://bugzilla.suse.com/1155131" source="BUGZILLA"/>
		<reference ref_id="1155671" ref_url="https://bugzilla.suse.com/1155671" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10906" ref_url="https://www.suse.com/security/cve/CVE-2016-10906/" source="CVE"/>
		<reference ref_id="CVE-2017-18379" ref_url="https://www.suse.com/security/cve/CVE-2017-18379/" source="CVE"/>
		<reference ref_id="CVE-2017-18509" ref_url="https://www.suse.com/security/cve/CVE-2017-18509/" source="CVE"/>
		<reference ref_id="CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551/" source="CVE"/>
		<reference ref_id="CVE-2017-18595" ref_url="https://www.suse.com/security/cve/CVE-2017-18595/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-20976" ref_url="https://www.suse.com/security/cve/CVE-2018-20976/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15211" ref_url="https://www.suse.com/security/cve/CVE-2019-15211/" source="CVE"/>
		<reference ref_id="CVE-2019-15212" ref_url="https://www.suse.com/security/cve/CVE-2019-15212/" source="CVE"/>
		<reference ref_id="CVE-2019-15214" ref_url="https://www.suse.com/security/cve/CVE-2019-15214/" source="CVE"/>
		<reference ref_id="CVE-2019-15215" ref_url="https://www.suse.com/security/cve/CVE-2019-15215/" source="CVE"/>
		<reference ref_id="CVE-2019-15216" ref_url="https://www.suse.com/security/cve/CVE-2019-15216/" source="CVE"/>
		<reference ref_id="CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217/" source="CVE"/>
		<reference ref_id="CVE-2019-15218" ref_url="https://www.suse.com/security/cve/CVE-2019-15218/" source="CVE"/>
		<reference ref_id="CVE-2019-15219" ref_url="https://www.suse.com/security/cve/CVE-2019-15219/" source="CVE"/>
		<reference ref_id="CVE-2019-15220" ref_url="https://www.suse.com/security/cve/CVE-2019-15220/" source="CVE"/>
		<reference ref_id="CVE-2019-15221" ref_url="https://www.suse.com/security/cve/CVE-2019-15221/" source="CVE"/>
		<reference ref_id="CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15505" ref_url="https://www.suse.com/security/cve/CVE-2019-15505/" source="CVE"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2019-15807" ref_url="https://www.suse.com/security/cve/CVE-2019-15807/" source="CVE"/>
		<reference ref_id="CVE-2019-15902" ref_url="https://www.suse.com/security/cve/CVE-2019-15902/" source="CVE"/>
		<reference ref_id="CVE-2019-15924" ref_url="https://www.suse.com/security/cve/CVE-2019-15924/" source="CVE"/>
		<reference ref_id="CVE-2019-15926" ref_url="https://www.suse.com/security/cve/CVE-2019-15926/" source="CVE"/>
		<reference ref_id="CVE-2019-15927" ref_url="https://www.suse.com/security/cve/CVE-2019-15927/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-16413" ref_url="https://www.suse.com/security/cve/CVE-2019-16413/" source="CVE"/>
		<reference ref_id="CVE-2019-16995" ref_url="https://www.suse.com/security/cve/CVE-2019-16995/" source="CVE"/>
		<reference ref_id="CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055/" source="CVE"/>
		<reference ref_id="CVE-2019-17056" ref_url="https://www.suse.com/security/cve/CVE-2019-17056/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-9456" ref_url="https://www.suse.com/security/cve/CVE-2019-9456/" source="CVE"/>
		<reference ref_id="CVE-2019-9506" ref_url="https://www.suse.com/security/cve/CVE-2019-9506/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 12-SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
  condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
  Exception during Page Size Change, causing the CPU core to be non-functional.

  The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in
  executable pages by splitting / merging huge pages into small pages as
  needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7023735

- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port
  failed to add a port, which may have caused denial of service (bsc#1152685).

- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
  Transactional Memory support could be used to facilitate sidechannel
  information leaks out of microarchitectural buffers, similar to the
  previously described 'Microarchitectural Data Sampling' attack.

  The Linux kernel was supplemented with the option to disable TSX operation
  altogether (requiring CPU Microcode updates on older systems) and better
  flushing of microarchitectural buffers (VERW).

  The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251

- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the
  alloc_workqueue return value, leading to a NULL pointer dereference.
  (bsc#1150457).

- CVE-2019-10220: Added sanity checks on the pathnames passed to the user
  space. (bsc#1144903).

- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).

- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,
  leading to a Buffer Overflow (bsc#1153158).

- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell
  libertas driver (bsc#1150465).

- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return
  value, leading to a NULL pointer dereference. (bsc#1150452).

- CVE-2019-17055: The AF_ISDN network module in the Linux kernel did not
  enforce CAP_NET_RAW, which meant that unprivileged users could create a raw
  socket (bnc#1152782).

- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which
  meant that unprivileged users could create a raw socket (bsc#1152788).

- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly,
  which caused an i_size_read() infinite loop and denial of service on SMP
  systems (bnc#1151347).

- CVE-2019-15902: A backporting issue was discovered that re-introduced the
  Spectre vulnerability it had aimed to eliminate. This occurred because the
  backport process depends on cherry picking specific commits, and because two
  (correctly ordered) code lines were swapped (bnc#1149376).

- CVE-2019-15291: Fixed a NULL pointer dereference issue that could be caused
  by a malicious USB device (bnc#1146519).

- CVE-2019-15807: Fixed a memory leak in the SCSI module that could be abused
  to cause denial of service (bnc#1148938).

- CVE-2019-13272: Fixed a mishandled the recording of the credentials of a
  process that wants to create a ptrace relationship, which allowed local users
  to obtain root access by leveraging certain scenarios with a parent-child
  process relationship, where a parent drops privileges and calls execve
  (potentially allowing control by an attacker). (bnc#1140671).

- CVE-2019-14821: An out-of-bounds access issue was fixed in the kernel's KVM
  hypervisor. An unprivileged host user or process with access to '/dev/kvm'
  device could use this flaw to crash the host kernel, resulting in a denial of
  service or potentially escalating privileges on the system (bnc#1151350).

- CVE-2019-15505: An out-of-bounds issue had been fixed that could be caused by
  crafted USB device traffic (bnc#1147122).

- CVE-2017-18595: A double free in allocate_trace_buffer was fixed
  (bnc#1149555).

- CVE-2019-14835: A buffer overflow flaw was found in the kernel's vhost
  functionality that translates virtqueue buffers to IOVs. A privileged guest
  user able to pass descriptors with invalid length to the host could use this
  flaw to increase their privileges on the host (bnc#1150112).

- CVE-2019-15216: A NULL pointer dereference was fixed that could be malicious
  USB device (bnc#1146361).

- CVE-2019-15924: A a NULL pointer dereference has been fixed in the
  drivers/net/ethernet/intel/fm10k module (bnc#1149612).

- CVE-2019-9456: An out-of-bounds write in the USB monitor driver has been
  fixed. This issue could lead to local escalation of privilege with System
  execution privileges needed. (bnc#1150025).

- CVE-2019-15926: An out-of-bounds access was fixed in the
  drivers/net/wireless/ath/ath6kl module. (bnc#1149527).

- CVE-2019-15927: An out-of-bounds access was fixed in the sound/usb/mixer
  module (bnc#1149522).

- CVE-2019-15666: There was an out-of-bounds array access in the net/xfrm
  module that could cause denial of service (bnc#1148394).

- CVE-2017-18379: An out-of-boundary access was fixed in the
  drivers/nvme/target module (bnc#1143187).

- CVE-2019-15219: A NULL pointer dereference was fixed that could be abused by
  a malicious USB device (bnc#1146519 1146524).

- CVE-2019-15220: A use-after-free issue was fixed that could be caused by a
  malicious USB device (bnc#1146519 1146526).

- CVE-2019-15221: A NULL pointer dereference was fixed that could be caused by
  a malicious USB device (bnc#1146519 1146529).

- CVE-2019-14814: A heap-based buffer overflow was fixed in the marvell wifi
  chip driver. That issue allowed local users to cause a denial of service
  (system crash) or possibly execute arbitrary code (bnc#1146512).

- CVE-2019-14815: A missing length check while parsing WMM IEs was fixed
  (bsc#1146512, bsc#1146514, bsc#1146516).

- CVE-2019-14816: A heap-based buffer overflow in the marvell wifi chip driver
  was fixed. Local users would have abused this issue to cause a denial of
  service (system crash) or possibly execute arbitrary code (bnc#1146516).

- CVE-2017-18509: An issue in net/ipv6 as fixed. By setting a specific socket
  option, an attacker could control a pointer in kernel land and cause an
  inet_csk_listen_stop general protection fault, or potentially execute
  arbitrary code under certain circumstances. The issue can be triggered as
  root (e.g., inside a default LXC container or with the CAP_NET_ADMIN
  capability) or after namespace unsharing. (bnc#1145477)

- CVE-2019-9506: The Bluetooth BR/EDR specification used to permit sufficiently
  low encryption key length and did not prevent an attacker from influencing
  the key length negotiation. This allowed practical brute-force attacks (aka
  'KNOB') that could decrypt traffic and inject arbitrary ciphertext without
  the victim noticing (bnc#1137865).

- CVE-2019-15098: A NULL pointer dereference in drivers/net/wireless/ath was
  fixed (bnc#1146378).

- CVE-2019-15290: A NULL pointer dereference in ath6kl_usb_alloc_urb_from_pipe
  was fixed (bsc#1146378).

- CVE-2019-15239: A incorrect patch to net/ipv4 was fixed. By adding to a write
  queue between disconnection and re-connection, a local attacker could trigger
  multiple use-after-free conditions. This could result in kernel crashes or
  potentially in privilege escalation. (bnc#1146589)

- CVE-2019-15212: A double-free issue was fixed in drivers/usb driver
  (bnc#1146391).

- CVE-2016-10906: A use-after-free issue was fixed in drivers/net/ethernet/arc
  (bnc#1146584).

- CVE-2019-15211: A use-after-free issue caused by a malicious USB device was
  fixed in the drivers/media/v4l2-core driver (bnc#1146519).

- CVE-2019-15217: A a NULL pointer dereference issue caused by a malicious USB
  device was fixed in the drivers/media/usb/zr364xx driver (bnc#1146519).

- CVE-2019-15214: An a use-after-free issue in the sound subsystem was fixed
  (bnc#1146519).

- CVE-2019-15218: A NULL pointer dereference caused by a malicious USB device
  was fixed in the drivers/media/usb/siano driver (bnc#1146413).

- CVE-2019-15215: A use-after-free issue caused by a malicious USB device was
  fixed in the drivers/media/usb/cpia2 driver (bnc#1146425).

- CVE-2018-20976: A use-after-free issue was fixed in the fs/xfs driver
  (bnc#1146285).

- CVE-2017-18551: An out-of-bounds write was fixed in the drivers/i2c driver
  (bnc#1146163).

- CVE-2019-0154: An unprotected read access to i915 registers has been fixed
  that could have been abused to facilitate a local denial-of-service attack.
  (bsc#1135966)

- CVE-2019-0155: A privilege escalation vulnerability has been fixed in the
  i915 module that allowed batch buffers from user mode to gain super user
  privileges. (bsc#1135967)

The following non-security bugs were fixed:

- array_index_nospec: Sanitize speculative array (bsc#1155671)
- bonding/802.3ad: fix link_failure_count tracking (bsc#1141013).
- bonding/802.3ad: fix slave link initialization transition states (bsc#1141013).
- bonding: correctly update link status during mii-commit phase (bsc#1141013).
- bonding: fix active-backup transition (bsc#1141013).
- bonding: make speed, duplex setting consistent with link state (bsc#1141013).
- bonding: ratelimit failed speed/duplex update warning (bsc#1141013).
- bonding: require speed/duplex only for 802.3ad, alb and tlb (bsc#1141013).
- bonding: set default miimon value for non-arp modes if not set (bsc#1141013).
- bonding: speed/duplex update at NETDEV_UP event (bsc#1141013).
- cifs: fix panic in smb2_reconnect (bsc#1142458).
- cifs: handle netapp error codes (bsc#1136261).
- cpu/speculation: Uninline and export CPU mitigations helpers (bnc#1117665).
- ib/core, ipoib: Do not overreact to SM LID change event (bsc#1154103)
- ib/core: Add mitigation for Spectre V1 (bsc#1155671)
- ixgbe: sync the first fragment unconditionally (bsc#1133140).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: lapic: cap __delay at lapic_timer_advance_ns (bsc#1149083).
- kvm: mmu: drop vcpu param in gpte_access (bsc#1117665).
- kvm: mmu: introduce kvm_mmu_gfn_{allow,disallow}_lpage (bsc#1117665).
- kvm: mmu: rename has_wrprotected_page to mmu_gfn_lpage_is_disallowed (bsc#1117665).
- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- kvm: x86: MMU: Consolidate quickly_check_mmio_pf() and is_mmio_page_fault() (bsc#1117665).
- kvm: x86: MMU: Encapsulate the type of rmap-chain head in a new struct (bsc#1117665).
- kvm: x86: MMU: Move handle_mmio_page_fault() call to kvm_mmu_page_fault() (bsc#1117665).
- kvm: x86: MMU: Move initialization of parent_ptes out from kvm_mmu_alloc_page() (bsc#1117665).
- kvm: x86: MMU: Move parent_pte handling from kvm_mmu_get_page() to link_shadow_page() (bsc#1117665).
- kvm: x86: MMU: Remove unused parameter parent_pte from kvm_mmu_get_page() (bsc#1117665).
- kvm: x86: MMU: always set accessed bit in shadow PTEs (bsc#1117665).
- kvm: x86: Reduce the overhead when lapic_timer_advance is disabled (bsc#1149083).
- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- kvm: x86: extend usage of RET_MMIO_PF_* constants (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT (bnc#1117665).
- kvm: x86: move nsec_to_cycles from x86.c to x86.h (bsc#1149083).
- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- kvm: x86: simplify ept_misconfig (bsc#1117665).
- media: smsusb: better handle optional alignment (bsc#1146413).
- pci: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).
- powerpc/64s: support nospectre_v2 cmdline option (bsc#1131107).
- powerpc/pseries: correctly track irq state in default idle (bsc#1150727 bsc#1150942 ltc#178925 ltc#181484).
- powerpc/rtas: use device model APIs and serialization during LPM (bsc#1144123 ltc#178840).
- powerpc/security: Show powerpc_security_features in debugfs (bsc#1131107).
- scsi: scsi_transport_fc: Drop double list_del() (bsc#1084878) During the backport of 260f4aeddb48 ('scsi: scsi_transport_fc: return -EBUSY for deleted vport') an additional list_del() was introduced. The list entry will be freed in fc_vport_terminate(). Do not free it premature in fc_remove_host().
- swiotlb: Add support for DMA_ATTR_SKIP_CPU_SYNC in Xen-swiotlb unmap path (bsc#1133140).
- vmci: Release resource if the work is already queued (bsc#1051510).
- x86/cpu: Add Atom Tremont (Jacobsville) (bsc#1117665).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084878">SUSE bug 1084878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117665">SUSE bug 1117665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133140">SUSE bug 1133140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135966">SUSE bug 1135966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135967">SUSE bug 1135967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136261">SUSE bug 1136261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137865">SUSE bug 1137865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140671">SUSE bug 1140671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141013">SUSE bug 1141013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141054">SUSE bug 1141054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142458">SUSE bug 1142458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143187">SUSE bug 1143187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144123">SUSE bug 1144123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145477">SUSE bug 1145477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146042">SUSE bug 1146042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146163">SUSE bug 1146163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146285">SUSE bug 1146285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146361">SUSE bug 1146361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146378">SUSE bug 1146378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146391">SUSE bug 1146391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146413">SUSE bug 1146413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146425">SUSE bug 1146425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146512">SUSE bug 1146512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146514">SUSE bug 1146514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146516">SUSE bug 1146516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146524">SUSE bug 1146524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146526">SUSE bug 1146526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146529">SUSE bug 1146529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146540">SUSE bug 1146540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146543">SUSE bug 1146543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146547">SUSE bug 1146547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146550">SUSE bug 1146550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146584">SUSE bug 1146584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146589">SUSE bug 1146589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147022">SUSE bug 1147022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147122">SUSE bug 1147122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148394">SUSE bug 1148394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148938">SUSE bug 1148938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149083">SUSE bug 1149083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149376">SUSE bug 1149376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149522">SUSE bug 1149522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149527">SUSE bug 1149527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149555">SUSE bug 1149555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149612">SUSE bug 1149612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150025">SUSE bug 1150025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150112">SUSE bug 1150112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150452">SUSE bug 1150452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150457">SUSE bug 1150457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150465">SUSE bug 1150465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150727">SUSE bug 1150727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150942">SUSE bug 1150942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151347">SUSE bug 1151347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151350">SUSE bug 1151350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152685">SUSE bug 1152685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152782">SUSE bug 1152782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152788">SUSE bug 1152788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153263">SUSE bug 1153263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154103">SUSE bug 1154103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154372">SUSE bug 1154372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155131">SUSE bug 1155131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155671">SUSE bug 1155671</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10906/">CVE-2016-10906 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10906">CVE-2016-10906 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18379/">CVE-2017-18379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18379">CVE-2017-18379 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18509/">CVE-2017-18509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18509">CVE-2017-18509 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18551">CVE-2017-18551 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18595/">CVE-2017-18595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18595">CVE-2017-18595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20976/">CVE-2018-20976 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20976">CVE-2018-20976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0154">CVE-2019-0154 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0155">CVE-2019-0155 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13272">CVE-2019-13272 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14814">CVE-2019-14814 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14815">CVE-2019-14815 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14816">CVE-2019-14816 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14821">CVE-2019-14821 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15098">CVE-2019-15098 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15211/">CVE-2019-15211 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15211">CVE-2019-15211 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15212/">CVE-2019-15212 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15212">CVE-2019-15212 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15214/">CVE-2019-15214 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15214">CVE-2019-15214 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15215/">CVE-2019-15215 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15215">CVE-2019-15215 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15216/">CVE-2019-15216 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15216">CVE-2019-15216 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15217">CVE-2019-15217 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15218/">CVE-2019-15218 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15218">CVE-2019-15218 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15219/">CVE-2019-15219 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15219">CVE-2019-15219 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15220/">CVE-2019-15220 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15220">CVE-2019-15220 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15221/">CVE-2019-15221 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15221">CVE-2019-15221 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15239">CVE-2019-15239 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15290">CVE-2019-15290 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15291">CVE-2019-15291 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15505/">CVE-2019-15505 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15505">CVE-2019-15505 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15666">CVE-2019-15666 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15807/">CVE-2019-15807 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15807">CVE-2019-15807 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15902/">CVE-2019-15902 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15902">CVE-2019-15902 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15924/">CVE-2019-15924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15924">CVE-2019-15924 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15926/">CVE-2019-15926 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15926">CVE-2019-15926 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15927/">CVE-2019-15927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15927">CVE-2019-15927 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16232">CVE-2019-16232 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16233">CVE-2019-16233 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16234">CVE-2019-16234 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16413/">CVE-2019-16413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-16413">CVE-2019-16413 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16995/">CVE-2019-16995 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16995">CVE-2019-16995 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17055">CVE-2019-17055 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17056/">CVE-2019-17056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-17056">CVE-2019-17056 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17666">CVE-2019-17666 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9456/">CVE-2019-9456 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9456">CVE-2019-9456 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9506/">CVE-2019-9506 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9506">CVE-2019-9506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556139" comment="kernel-default-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556140" comment="kernel-default-base-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556141" comment="kernel-default-devel-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556142" comment="kernel-default-kgraft-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538349" comment="kernel-devel-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538350" comment="kernel-macros-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538351" comment="kernel-source-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556143" comment="kernel-syms-4.4.180-94.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556144" comment="kgraft-patch-4_4_180-94_107-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151197" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to 20191112 security release (bsc#1155988)
  - Processor             Identifier     Version       Products
  - Model        Stepping F-MO-S/PI      Old-&gt;New
  - ---- new platforms ----------------------------------------
  - CML-U62      A0       6-a6-0/80           000000c6 Core Gen10 Mobile
  - CNL-U        D0       6-66-3/80           0000002a Core Gen8 Mobile
  - SKX-SP       B1       6-55-3/97           01000150 Xeon Scalable
  - ICL U/Y      D1       6-7e-5/80           00000046 Core Gen10 Mobile
  - ---- updated platforms ------------------------------------
  - SKL U/Y      D0       6-4e-3/c0 000000cc-&gt;000000d4 Core Gen6 Mobile
  - SKL H/S/E3   R0/N0    6-5e-3/36 000000cc-&gt;000000d4 Core Gen6
  - AML-Y22      H0       6-8e-9/10 000000b4-&gt;000000c6 Core Gen8 Mobile
  - KBL-U/Y      H0       6-8e-9/c0 000000b4-&gt;000000c6 Core Gen7 Mobile
  - CFL-U43e     D0       6-8e-a/c0 000000b4-&gt;000000c6 Core Gen8 Mobile
  - WHL-U        W0       6-8e-b/d0 000000b8-&gt;000000c6 Core Gen8 Mobile
  - AML-Y        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - CML-U42      V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - WHL-U        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen8 Mobile
  - KBL-G/X      H0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7/Gen8
  - KBL-H/S/E3   B0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7; Xeon E3 v6
  - CFL-H/S/E3   U0       6-9e-a/22 000000b4-&gt;000000c6 Core Gen8 Desktop, Mobile, Xeon E
  - CFL-S        B0       6-9e-b/02 000000b4-&gt;000000c6 Core Gen8
  - CFL-H        R0       6-9e-d/22 000000b8-&gt;000000c6 Core Gen9 Mobile
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)

- requires coreutils for the %post script (bsc#1154043)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11139">CVE-2019-11139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522370" comment="ucode-intel-20191112-13.53.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151198" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1156402" ref_url="https://bugzilla.suse.com/1156402" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201/" source="CVE"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2019-2201: Several integer overflow issues and subsequent segfaults occurred in libjpeg-turbo,
  when attempting to compress or decompress gigapixel images. [bsc#1156402]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-14"/>
	<updated date="2019-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156402">SUSE bug 1156402</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2201">CVE-2019-2201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556145" comment="libjpeg-turbo-1.5.3-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556146" comment="libjpeg62-62.2.0-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522376" comment="libjpeg62-32bit-62.2.0-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556147" comment="libjpeg62-turbo-1.5.3-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556148" comment="libjpeg8-8.1.2-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522379" comment="libjpeg8-32bit-8.1.2-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556149" comment="libturbojpeg0-8.1.2-31.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151199" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1156275" ref_url="https://bugzilla.suse.com/1156275" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14869" ref_url="https://www.suse.com/security/cve/CVE-2019-14869/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issue:
	  
- CVE-2019-14869: Fixed a possible  dSAFER escape which could have allowed 
  an attacker to gain high privileges by a specially crafted Postscript 
  code (bsc#1156275).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156275">SUSE bug 1156275</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14869/">CVE-2019-14869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14869">CVE-2019-14869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556150" comment="ghostscript-9.27-23.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556151" comment="ghostscript-x11-9.27-23.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151200" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to 20191112 official security release (bsc#1155988)
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11139">CVE-2019-11139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522383" comment="ucode-intel-20191112a-13.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151201" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1155787" ref_url="https://bugzilla.suse.com/1155787" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2017-2518: Fixed a use-after-free vulnerability which could have 
  led to buffer overflow via a crafted SQL statement (bsc#1155787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155787">SUSE bug 1155787</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2518">CVE-2017-2518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556152" comment="libsqlite3-0-3.8.10.2-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522391" comment="libsqlite3-0-32bit-3.8.10.2-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556153" comment="sqlite3-3.8.10.2-9.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151202" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1146358" ref_url="https://bugzilla.suse.com/1146358" source="BUGZILLA"/>
		<reference ref_id="1146359" ref_url="https://bugzilla.suse.com/1146359" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2019-8675: Fixed a stack buffer overflow in libcups's asn1_get_type function(bsc#1146358). 
- CVE-2019-8696: Fixed a stack buffer overflow in libcups's asn1_get_packed function (bsc#1146359).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146359">SUSE bug 1146359</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8675">CVE-2019-8675 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8696">CVE-2019-8696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556154" comment="cups-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556155" comment="cups-client-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556156" comment="cups-libs-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522396" comment="cups-libs-32bit-1.7.5-20.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151203" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="1151839" ref_url="https://bugzilla.suse.com/1151839" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

Security issue fixed:

- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).

Non-security issues fixed:

- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option (bsc#1144504).
- Increased the startup timeout of clamd to 5 minutes to cater for the grown virus database as a workaround until clamd has learned to talk to systemd to extend the timeout as long as needed (bsc#1151839).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151839">SUSE bug 1151839</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12625">CVE-2019-12625 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556157" comment="clamav-0.100.3-33.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151204" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1154328" ref_url="https://bugzilla.suse.com/1154328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3693" ref_url="https://www.suse.com/security/cve/CVE-2019-3693/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:
	  
- CVE-2019-3693: Fixed a local privilege escalation from wwwrun to root (bsc#1154328).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154328">SUSE bug 1154328</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3693/">CVE-2019-3693 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3693">CVE-2019-3693 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530781" comment="mailman-2.1.17-3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151205" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1152856" ref_url="https://bugzilla.suse.com/1152856" source="BUGZILLA"/>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2894" ref_url="https://www.suse.com/security/cve/CVE-2019-2894/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Security issues fixed (October 2019 CPU  bsc#1154212):	  

- CVE-2019-2933: Windows file handling redux
- CVE-2019-2945: Better socket support
- CVE-2019-2949: Better Kerberos ccache handling
- CVE-2019-2958: Build Better Processes
- CVE-2019-2964: Better support for patterns
- CVE-2019-2962: Better Glyph Images
- CVE-2019-2973: Better pattern compilation
- CVE-2019-2978: Improved handling of jar files
- CVE-2019-2981: Better Path supports
- CVE-2019-2983: Better serial attributes
- CVE-2019-2987: Better rendering of native glyphs
- CVE-2019-2988: Better Graphics2D drawing
- CVE-2019-2989: Improve TLS connection support
- CVE-2019-2992: Enhance font glyph mapping
- CVE-2019-2999: Commentary on Javadoc comments
- CVE-2019-2894: Enhance ECDSA operations (bsc#1152856).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-27"/>
	<updated date="2019-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152856">SUSE bug 1152856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2894/">CVE-2019-2894 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2894">CVE-2019-2894 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2949">CVE-2019-2949 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2958">CVE-2019-2958 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2987">CVE-2019-2987 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556158" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556159" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556160" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556161" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151206" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:
	  
- CVE-2019-15961: Fixed a denial of service which might occur when 
  scanning a specially crafted email file as (bsc#1157763).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15961">CVE-2019-15961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556162" comment="clamav-0.100.3-33.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151207" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1093414" ref_url="https://bugzilla.suse.com/1093414" source="BUGZILLA"/>
		<reference ref_id="1150734" ref_url="https://bugzilla.suse.com/1150734" source="BUGZILLA"/>
		<reference ref_id="1157198" ref_url="https://bugzilla.suse.com/1157198" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3688" ref_url="https://www.suse.com/security/cve/CVE-2019-3688/" source="CVE"/>
		<reference ref_id="CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690/" source="CVE"/>
		<description>
This update for permissions fixes the following issues:

- CVE-2019-3688: Changed wrong ownership in /usr/sbin/pinger to root:squid
  which could have allowed a squid user to gain persistence by changing the 
  binary (bsc#1093414).
- CVE-2019-3690: Fixed a privilege escalation through untrusted symbolic 
  links (bsc#1150734).
- Fixed a regression which caused segmentation fault (bsc#1157198).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1093414">SUSE bug 1093414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150734">SUSE bug 1150734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157198">SUSE bug 1157198</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3688/">CVE-2019-3688 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3688">CVE-2019-3688 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3690">CVE-2019-3690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556163" comment="permissions-2015.09.28.1626-17.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151208" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156317" ref_url="https://bugzilla.suse.com/1156317" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1156331" ref_url="https://bugzilla.suse.com/1156331" source="BUGZILLA"/>
		<reference ref_id="1157770" ref_url="https://bugzilla.suse.com/1157770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_97 fixes several issues.

The following security issues were fixed:

- CVE-2018-20856: Fixed a use-after-free in __blk_drain_queue() due to an improper error handling (bsc#1156331).
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2019-15239: Fixed a vulnerability where a local attacker could have triggered multiple use-after-free conditions resulted in privilege escalation (bsc#1156317).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).

The following bugs were fixed:

- Fixed boot up hang revealed by int3 self test (bsc#1157770).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-10"/>
	<updated date="2019-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156317">SUSE bug 1156317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157770">SUSE bug 1157770</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20856">CVE-2018-20856 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13272">CVE-2019-13272 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15239">CVE-2019-15239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721153" comment="kernel-default 4.4.180-94.97 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719420" comment="kgraft-patch-4_4_180-94_97-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556164" comment="kgraft-patch-4_4_180-94_97-default-6-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151209" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156317" ref_url="https://bugzilla.suse.com/1156317" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1156331" ref_url="https://bugzilla.suse.com/1156331" source="BUGZILLA"/>
		<reference ref_id="1157770" ref_url="https://bugzilla.suse.com/1157770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_100 fixes several issues.

The following security issues were fixed:

- CVE-2018-20856: Fixed a use-after-free in __blk_drain_queue() due to an improper error handling (bsc#1156331).
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2019-15239: Fixed a vulnerability where a local attacker could have triggered multiple use-after-free conditions resulted in privilege escalation (bsc#1156317).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).

The following bugs were fixed:

- Fixed boot up hang revealed by int3 self test (bsc#1157770).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-10"/>
	<updated date="2019-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156317">SUSE bug 1156317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157770">SUSE bug 1157770</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20856">CVE-2018-20856 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13272">CVE-2019-13272 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15239">CVE-2019-15239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721278" comment="kernel-default 4.4.180-94.100 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719604" comment="kgraft-patch-4_4_180-94_100-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556165" comment="kgraft-patch-4_4_180-94_100-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151210" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156317" ref_url="https://bugzilla.suse.com/1156317" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1157770" ref_url="https://bugzilla.suse.com/1157770" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_103 fixes several issues.

The following security issues were fixed:

- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2019-15239: Fixed a vulnerability where a local attacker could have triggered multiple use-after-free conditions resulted in privilege escalation (bsc#1156317).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).

The following bugs were fixed:

- Fixed boot up hang revealed by int3 self test (bsc#1157770).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-10"/>
	<updated date="2019-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156317">SUSE bug 1156317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157770">SUSE bug 1157770</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13272">CVE-2019-13272 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15239">CVE-2019-15239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721277" comment="kernel-default 4.4.180-94.103 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719602" comment="kgraft-patch-4_4_180-94_103-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556166" comment="kgraft-patch-4_4_180-94_103-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151211" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156317" ref_url="https://bugzilla.suse.com/1156317" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1156331" ref_url="https://bugzilla.suse.com/1156331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.175-94_79 fixes several issues.

The following security issues were fixed:

- CVE-2018-20856: Fixed a use-after-free in block/blk-core.c due to improper error handling (bsc#1156331).
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging
  certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2019-15239: Fixed a vulnerability where a local attacker could have triggered multiple use-after-free conditions 
  resulted in privilege escalation (bsc#1156317).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156317">SUSE bug 1156317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20856">CVE-2018-20856 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13272">CVE-2019-13272 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15239">CVE-2019-15239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721151" comment="kernel-default 4.4.175-94.79 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719418" comment="kgraft-patch-4_4_175-94_79-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556167" comment="kgraft-patch-4_4_175-94_79-default-7-2.5 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151212" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156317" ref_url="https://bugzilla.suse.com/1156317" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1156331" ref_url="https://bugzilla.suse.com/1156331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.176-94_88 fixes several issues.

The following security issues were fixed:

- CVE-2018-20856: Fixed a use-after-free in block/blk-core.c due to improper error handling (bsc#1156331).
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging
  certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2019-15239: Fixed a vulnerability where a local attacker could have triggered multiple use-after-free conditions 
  resulted in privilege escalation (bsc#1156317).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156317">SUSE bug 1156317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20856">CVE-2018-20856 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13272">CVE-2019-13272 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15239">CVE-2019-15239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721148" comment="kernel-default 4.4.176-94.88 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719415" comment="kgraft-patch-4_4_176-94_88-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556168" comment="kgraft-patch-4_4_176-94_88-default-6-2.5 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151213" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156317" ref_url="https://bugzilla.suse.com/1156317" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1156331" ref_url="https://bugzilla.suse.com/1156331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.178-94_91 fixes several issues.

The following security issues were fixed:

- CVE-2018-20856: Fixed a use-after-free in block/blk-core.c due to improper error handling (bsc#1156331).
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging
  certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2019-15239: Fixed a vulnerability where a local attacker could have triggered multiple use-after-free conditions 
  resulted in privilege escalation (bsc#1156317).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156317">SUSE bug 1156317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20856">CVE-2018-20856 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13272">CVE-2019-13272 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15239">CVE-2019-15239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721150" comment="kernel-default 4.4.178-94.91 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719417" comment="kgraft-patch-4_4_178-94_91-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556169" comment="kgraft-patch-4_4_178-94_91-default-6-2.5 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151214" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1152497" ref_url="https://bugzilla.suse.com/1152497" source="BUGZILLA"/>
		<reference ref_id="1154448" ref_url="https://bugzilla.suse.com/1154448" source="BUGZILLA"/>
		<reference ref_id="1154456" ref_url="https://bugzilla.suse.com/1154456" source="BUGZILLA"/>
		<reference ref_id="1154458" ref_url="https://bugzilla.suse.com/1154458" source="BUGZILLA"/>
		<reference ref_id="1154460" ref_url="https://bugzilla.suse.com/1154460" source="BUGZILLA"/>
		<reference ref_id="1154461" ref_url="https://bugzilla.suse.com/1154461" source="BUGZILLA"/>
		<reference ref_id="1154464" ref_url="https://bugzilla.suse.com/1154464" source="BUGZILLA"/>
		<reference ref_id="1155945" ref_url="https://bugzilla.suse.com/1155945" source="BUGZILLA"/>
		<reference ref_id="1157888" ref_url="https://bugzilla.suse.com/1157888" source="BUGZILLA"/>
		<reference ref_id="1158003" ref_url="https://bugzilla.suse.com/1158003" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1158007" ref_url="https://bugzilla.suse.com/1158007" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-18420" ref_url="https://www.suse.com/security/cve/CVE-2019-18420/" source="CVE"/>
		<reference ref_id="CVE-2019-18421" ref_url="https://www.suse.com/security/cve/CVE-2019-18421/" source="CVE"/>
		<reference ref_id="CVE-2019-18422" ref_url="https://www.suse.com/security/cve/CVE-2019-18422/" source="CVE"/>
		<reference ref_id="CVE-2019-18423" ref_url="https://www.suse.com/security/cve/CVE-2019-18423/" source="CVE"/>
		<reference ref_id="CVE-2019-18424" ref_url="https://www.suse.com/security/cve/CVE-2019-18424/" source="CVE"/>
		<reference ref_id="CVE-2019-18425" ref_url="https://www.suse.com/security/cve/CVE-2019-18425/" source="CVE"/>
		<reference ref_id="CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19581" ref_url="https://www.suse.com/security/cve/CVE-2019-19581/" source="CVE"/>
		<reference ref_id="CVE-2019-19582" ref_url="https://www.suse.com/security/cve/CVE-2019-19582/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2019-19581: Fixed a potential out of bounds on 32-bit Arm (bsc#1158003 XSA-307).
- CVE-2019-19582: Fixed a potential infinite loop when x86 accesses to bitmaps with 
  a compile time known size of 64 (bsc#1158003 XSA-307).
- CVE-2019-19583: Fixed improper checks which could have allowed HVM/PVH guest userspace 
  code to crash the guest,leading to a guest denial of service (bsc#1158004 XSA-308).
- CVE-2019-19578: Fixed an issue where a malicious or buggy PV guest could have caused
  hypervisor crash resulting in denial of service affecting the entire host (bsc#1158005 XSA-309).
- CVE-2019-19580: Fixed a privilege escalation where a malicious PV guest administrator 
  could have been able to escalate their privilege to that of the host (bsc#1158006 XSA-310).
- CVE-2019-19577: Fixed an issue where a malicious guest administrator could have caused Xen 
  to access data structures while they are being modified leading to a crash (bsc#1158007 XSA-311). 
- CVE-2019-19579: Fixed a privilege escaltion where an untrusted domain with access 
  to a physical device can DMA into host memory (bsc#1157888 XSA-306).
- CVE-2019-18420: Malicious x86 PV guests may have caused a hypervisor crash, 
  resulting in a denial of service (bsc#1154448 XSA-296)
- CVE-2019-18425: 32-bit PV guest user mode could elevate its privileges to that 
  of the guest kernel. (bsc#1154456 XSA-298).
- CVE-2019-18421: A malicious PV guest administrator may have been able to
  escalate their privilege to that of the host. (bsc#1154458 XSA-299).
- CVE-2019-18423: A malicious guest administrator may cause a hypervisor crash,
  resulting in a denial of service  (bsc#1154460 XSA-301).
- CVE-2019-18422: A malicious ARM guest might contrive to arrange for critical 
  Xen code to run with interrupts erroneously enabled. This could lead to data
  corruption, denial of service, or possibly even privilege escalation. However
  a precise attack technique has not been identified. (bsc#1154464 XSA-303)
- CVE-2019-18424: An untrusted domain with access to a physical device can DMA 
  into host memory, leading to privilege escalation. (bsc#1154461 XSA-302).  
- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
  condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
  Exception during Page Size Change, causing the CPU core to be non-functional.
  (bsc#1155945 XSA-304)  
- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
  Transactional Memory support could be used to facilitate sidechannel
  information leaks out of microarchitectural buffers, similar to the
  previously described 'Microarchitectural Data Sampling' attack. (bsc#1152497 XSA-305).  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-13"/>
	<updated date="2019-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152497">SUSE bug 1152497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154448">SUSE bug 1154448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154456">SUSE bug 1154456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154460">SUSE bug 1154460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154461">SUSE bug 1154461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154464">SUSE bug 1154464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155945">SUSE bug 1155945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18420/">CVE-2019-18420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18420">CVE-2019-18420 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18421/">CVE-2019-18421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18421">CVE-2019-18421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18422/">CVE-2019-18422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18422">CVE-2019-18422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18423/">CVE-2019-18423 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18423">CVE-2019-18423 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18424/">CVE-2019-18424 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18424">CVE-2019-18424 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18425/">CVE-2019-18425 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18425">CVE-2019-18425 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19577">CVE-2019-19577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19578">CVE-2019-19578 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19579">CVE-2019-19579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19580">CVE-2019-19580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19581/">CVE-2019-19581 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19581">CVE-2019-19581 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19582/">CVE-2019-19582 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19582">CVE-2019-19582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19583">CVE-2019-19583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538360" comment="xen-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538361" comment="xen-doc-html-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538362" comment="xen-libs-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538363" comment="xen-libs-32bit-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538364" comment="xen-tools-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538365" comment="xen-tools-domU-4.9.4_06-3.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151215" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1158328" ref_url="https://bugzilla.suse.com/1158328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Mozilla Firefox was updated to 68.3esr (MFSA 2019-37 bsc#1158328)	  
	  
Security issues fixed: 

- CVE-2019-17008: Fixed a use-after-free in worker destruction (bmo#1546331)
- CVE-2019-13722: Fixed a stack corruption due to incorrect number of arguments 
  in WebRTC code (bmo#1580156)
- CVE-2019-11745: Fixed an out of bounds write in NSS when encrypting with a 
  block cipher (bmo#1586176)
- CVE-2019-17009: Fixed an issue where updater temporary files accessible to 
  unprivileged processes (bmo#1510494)
- CVE-2019-17010: Fixed a use-after-free when performing device orientation 
  checks (bmo#1581084)
- CVE-2019-17005: Fixed a buffer overflow in plain text serializer (bmo#1584170)
- CVE-2019-17011: Fixed a use-after-free when retrieving a document 
  in antitracking (bmo#1591334)
- CVE-2019-17012: Fixed multiple memmory issues
  (bmo#1449736, bmo#1533957, bmo#1560667,bmo#1567209, bmo#1580288, bmo#1585760, 
  bmo#1592502)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-19"/>
	<updated date="2019-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13722">CVE-2019-13722 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17005">CVE-2019-17005 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17008">CVE-2019-17008 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17009">CVE-2019-17009 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17010">CVE-2019-17010 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17011">CVE-2019-17011 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17012">CVE-2019-17012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556170" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556171" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151216" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1091041" ref_url="https://bugzilla.suse.com/1091041" source="BUGZILLA"/>
		<reference ref_id="1119461" ref_url="https://bugzilla.suse.com/1119461" source="BUGZILLA"/>
		<reference ref_id="1119465" ref_url="https://bugzilla.suse.com/1119465" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1138190" ref_url="https://bugzilla.suse.com/1138190" source="BUGZILLA"/>
		<reference ref_id="1146544" ref_url="https://bugzilla.suse.com/1146544" source="BUGZILLA"/>
		<reference ref_id="1146612" ref_url="https://bugzilla.suse.com/1146612" source="BUGZILLA"/>
		<reference ref_id="1150466" ref_url="https://bugzilla.suse.com/1150466" source="BUGZILLA"/>
		<reference ref_id="1150483" ref_url="https://bugzilla.suse.com/1150483" source="BUGZILLA"/>
		<reference ref_id="1152631" ref_url="https://bugzilla.suse.com/1152631" source="BUGZILLA"/>
		<reference ref_id="1153811" ref_url="https://bugzilla.suse.com/1153811" source="BUGZILLA"/>
		<reference ref_id="1154905" ref_url="https://bugzilla.suse.com/1154905" source="BUGZILLA"/>
		<reference ref_id="1155689" ref_url="https://bugzilla.suse.com/1155689" source="BUGZILLA"/>
		<reference ref_id="1155897" ref_url="https://bugzilla.suse.com/1155897" source="BUGZILLA"/>
		<reference ref_id="1155898" ref_url="https://bugzilla.suse.com/1155898" source="BUGZILLA"/>
		<reference ref_id="1156187" ref_url="https://bugzilla.suse.com/1156187" source="BUGZILLA"/>
		<reference ref_id="1157038" ref_url="https://bugzilla.suse.com/1157038" source="BUGZILLA"/>
		<reference ref_id="1157042" ref_url="https://bugzilla.suse.com/1157042" source="BUGZILLA"/>
		<reference ref_id="1157070" ref_url="https://bugzilla.suse.com/1157070" source="BUGZILLA"/>
		<reference ref_id="1157143" ref_url="https://bugzilla.suse.com/1157143" source="BUGZILLA"/>
		<reference ref_id="1157158" ref_url="https://bugzilla.suse.com/1157158" source="BUGZILLA"/>
		<reference ref_id="1157191" ref_url="https://bugzilla.suse.com/1157191" source="BUGZILLA"/>
		<reference ref_id="1157324" ref_url="https://bugzilla.suse.com/1157324" source="BUGZILLA"/>
		<reference ref_id="1157333" ref_url="https://bugzilla.suse.com/1157333" source="BUGZILLA"/>
		<reference ref_id="1157464" ref_url="https://bugzilla.suse.com/1157464" source="BUGZILLA"/>
		<reference ref_id="1158132" ref_url="https://bugzilla.suse.com/1158132" source="BUGZILLA"/>
		<reference ref_id="1158394" ref_url="https://bugzilla.suse.com/1158394" source="BUGZILLA"/>
		<reference ref_id="1158398" ref_url="https://bugzilla.suse.com/1158398" source="BUGZILLA"/>
		<reference ref_id="1158410" ref_url="https://bugzilla.suse.com/1158410" source="BUGZILLA"/>
		<reference ref_id="1158413" ref_url="https://bugzilla.suse.com/1158413" source="BUGZILLA"/>
		<reference ref_id="1158417" ref_url="https://bugzilla.suse.com/1158417" source="BUGZILLA"/>
		<reference ref_id="1158445" ref_url="https://bugzilla.suse.com/1158445" source="BUGZILLA"/>
		<reference ref_id="1158823" ref_url="https://bugzilla.suse.com/1158823" source="BUGZILLA"/>
		<reference ref_id="1158824" ref_url="https://bugzilla.suse.com/1158824" source="BUGZILLA"/>
		<reference ref_id="1158827" ref_url="https://bugzilla.suse.com/1158827" source="BUGZILLA"/>
		<reference ref_id="1158834" ref_url="https://bugzilla.suse.com/1158834" source="BUGZILLA"/>
		<reference ref_id="1158900" ref_url="https://bugzilla.suse.com/1158900" source="BUGZILLA"/>
		<reference ref_id="1158903" ref_url="https://bugzilla.suse.com/1158903" source="BUGZILLA"/>
		<reference ref_id="1158904" ref_url="https://bugzilla.suse.com/1158904" source="BUGZILLA"/>
		<reference ref_id="1158954" ref_url="https://bugzilla.suse.com/1158954" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-15213" ref_url="https://www.suse.com/security/cve/CVE-2019-15213/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18680" ref_url="https://www.suse.com/security/cve/CVE-2019-18680/" source="CVE"/>
		<reference ref_id="CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683/" source="CVE"/>
		<reference ref_id="CVE-2019-18805" ref_url="https://www.suse.com/security/cve/CVE-2019-18805/" source="CVE"/>
		<reference ref_id="CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19065" ref_url="https://www.suse.com/security/cve/CVE-2019-19065/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19338" ref_url="https://www.suse.com/security/cve/CVE-2019-19338/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525/" source="CVE"/>
		<reference ref_id="CVE-2019-19527" ref_url="https://www.suse.com/security/cve/CVE-2019-19527/" source="CVE"/>
		<reference ref_id="CVE-2019-19530" ref_url="https://www.suse.com/security/cve/CVE-2019-19530/" source="CVE"/>
		<reference ref_id="CVE-2019-19531" ref_url="https://www.suse.com/security/cve/CVE-2019-19531/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533/" source="CVE"/>
		<reference ref_id="CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534/" source="CVE"/>
		<reference ref_id="CVE-2019-19535" ref_url="https://www.suse.com/security/cve/CVE-2019-19535/" source="CVE"/>
		<reference ref_id="CVE-2019-19536" ref_url="https://www.suse.com/security/cve/CVE-2019-19536/" source="CVE"/>
		<reference ref_id="CVE-2019-19537" ref_url="https://www.suse.com/security/cve/CVE-2019-19537/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 12 SP 3 LTSS kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2019-14895: A heap-based buffer overflow was discovered in the Linux kernel in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could have allowed the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).
- CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038).
- CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid in the Linux kernel. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free (bnc#1155897).
- CVE-2019-19062: A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333).
- CVE-2019-19065: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures (bnc#1157191).
- CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324).
- CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157143).
- CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function (bnc#1157070).
- CVE-2019-16231: drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150466).
- CVE-2019-18805: An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel There was a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact (bnc#1156187).
- CVE-2019-18680: An issue was discovered in the Linux kernel. There was a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c that will cause denial of service (bnc#1155898).
- CVE-2019-15213: An use-after-free was fixed caused by malicious USB device in drivers/media/usb/dvb-usb/dvb-usb-init.c (bsc#1146544).
- CVE-2019-19536: An uninitialized Kernel memory can leak to USB devices in drivers/net/can/usb/peak_usb/pcan_usb_pro.c (bsc#1158394).
- CVE-2019-19534: An uninitialized Kernel memory can leak to USB devices in drivers/net/can/usb/peak_usb/pcan_usb_core.c (bsc#1158398).
- CVE-2019-19530: An use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver (bsc#1158410).
- CVE-2019-19524: An use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver (bsc#1158413).
- CVE-2019-19525: An use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver (bsc#1158417).
- CVE-2019-19531: An use-after-free in yurex_delete may lead to denial of service (bsc#1158445).
- CVE-2019-19523: An use-after-free on disconnect in USB adutux (bsc#1158823).
- CVE-2019-19532: An out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers (bsc#1158824).
- CVE-2019-19332: An out-of-bounds memory write via kvm_dev_ioctl_get_cpuid (bsc#1158827).
- CVE-2019-19533: An info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver (bsc#1158834).
- CVE-2019-19527: An use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (bsc#1158900).
- CVE-2019-19535: An info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver (bsc#1158903).
- CVE-2019-19537: Two races in the USB character device registration and deregistration routines (bsc#1158904).
- CVE-2019-19338: An incomplete fix for Transaction Asynchronous Abort (TAA) (bsc#1158954).


The following non-security bugs were fixed:

- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).
- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).
- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).
- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).
- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).
- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).
- sched/fair: WARN() and refuse to set buddy when !se-&gt;on_rq (bsc#1158132).
- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).
- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).
- xen/pv: Fix a boot up hang revealed by int3 self test (bsc#1153811).
- arp: Fix cache issue during Life Partition Migration (bsc#1152631).
- futexes: Fix speed on 4.12 kernel (bsc#1157464).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-21"/>
	<updated date="2019-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1091041">SUSE bug 1091041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119461">SUSE bug 1119461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119465">SUSE bug 1119465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138190">SUSE bug 1138190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146544">SUSE bug 1146544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146612">SUSE bug 1146612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150466">SUSE bug 1150466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150483">SUSE bug 1150483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152631">SUSE bug 1152631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153811">SUSE bug 1153811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154905">SUSE bug 1154905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155689">SUSE bug 1155689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155897">SUSE bug 1155897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155898">SUSE bug 1155898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156187">SUSE bug 1156187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157038">SUSE bug 1157038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157042">SUSE bug 1157042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157070">SUSE bug 1157070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157143">SUSE bug 1157143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157158">SUSE bug 1157158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157191">SUSE bug 1157191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157324">SUSE bug 1157324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157333">SUSE bug 1157333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157464">SUSE bug 1157464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158132">SUSE bug 1158132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158394">SUSE bug 1158394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158398">SUSE bug 1158398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158410">SUSE bug 1158410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158413">SUSE bug 1158413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158417">SUSE bug 1158417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158445">SUSE bug 1158445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158823">SUSE bug 1158823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158824">SUSE bug 1158824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158827">SUSE bug 1158827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158900">SUSE bug 1158900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158903">SUSE bug 1158903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158904">SUSE bug 1158904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158954">SUSE bug 1158954</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14895">CVE-2019-14895 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15213/">CVE-2019-15213 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15213">CVE-2019-15213 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16231">CVE-2019-16231 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18660">CVE-2019-18660 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18680/">CVE-2019-18680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18680">CVE-2019-18680 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18683">CVE-2019-18683 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18805/">CVE-2019-18805 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18805">CVE-2019-18805 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19052">CVE-2019-19052 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19062">CVE-2019-19062 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19065/">CVE-2019-19065 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19065">CVE-2019-19065 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19073">CVE-2019-19073 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19074">CVE-2019-19074 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19332">CVE-2019-19332 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19338/">CVE-2019-19338 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19338">CVE-2019-19338 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19523">CVE-2019-19523 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19524">CVE-2019-19524 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19525">CVE-2019-19525 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19527/">CVE-2019-19527 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19527">CVE-2019-19527 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19530/">CVE-2019-19530 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19530">CVE-2019-19530 at NVD</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19531/">CVE-2019-19531 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19531">CVE-2019-19531 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19532">CVE-2019-19532 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19533">CVE-2019-19533 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19534">CVE-2019-19534 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19535/">CVE-2019-19535 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19535">CVE-2019-19535 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19536/">CVE-2019-19536 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19536">CVE-2019-19536 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19537/">CVE-2019-19537 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19537">CVE-2019-19537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556172" comment="kernel-default-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556173" comment="kernel-default-base-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556174" comment="kernel-default-devel-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556175" comment="kernel-default-kgraft-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538370" comment="kernel-devel-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538371" comment="kernel-macros-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538372" comment="kernel-source-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556176" comment="kernel-syms-4.4.180-94.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556177" comment="kgraft-patch-4_4_180-94_113-default-1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151217" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1144524" ref_url="https://bugzilla.suse.com/1144524" source="BUGZILLA"/>
		<reference ref_id="1146848" ref_url="https://bugzilla.suse.com/1146848" source="BUGZILLA"/>
		<reference ref_id="1166847" ref_url="https://bugzilla.suse.com/1166847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13456" ref_url="https://www.suse.com/security/cve/CVE-2019-13456/" source="CVE"/>
		<reference ref_id="CVE-2019-17185" ref_url="https://www.suse.com/security/cve/CVE-2019-17185/" source="CVE"/>
		<description>
This update for freeradius-server fixes the following issues:

- CVE-2019-13456: Fixed a side-channel password leak in EAP-pwd
  (bsc#1144524).
- CVE-2019-17185: Fixed a debial of service due to multithreaded
  BN_CTX access (bsc#1166847).
- Fixed an issue in TLS-EAP where the OCSP verification, when an 
  intermediate client certificate was not explicitly trusted 
  (bsc#1146848).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-17"/>
	<updated date="2020-04-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144524">SUSE bug 1144524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146848">SUSE bug 1146848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166847">SUSE bug 1166847</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13456/">CVE-2019-13456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13456">CVE-2019-13456 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17185/">CVE-2019-17185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17185">CVE-2019-17185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556178" comment="freeradius-server-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556179" comment="freeradius-server-doc-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556180" comment="freeradius-server-krb5-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556181" comment="freeradius-server-ldap-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556182" comment="freeradius-server-libs-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556183" comment="freeradius-server-mysql-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556184" comment="freeradius-server-perl-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556185" comment="freeradius-server-postgresql-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556186" comment="freeradius-server-python-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556187" comment="freeradius-server-sqlite-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556188" comment="freeradius-server-utils-3.0.15-2.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151218" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1168422" ref_url="https://bugzilla.suse.com/1168422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-3898: Fixed a heap buffer overflow in ppdFindOption() (bsc#1168422).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-23"/>
	<updated date="2020-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3898">CVE-2020-3898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556189" comment="cups-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556190" comment="cups-client-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556191" comment="cups-libs-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530905" comment="cups-libs-32bit-1.7.5-20.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151219" version="1" class="patch">
	<metadata>
		<title>Security update for pam_radius (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1141670" ref_url="https://bugzilla.suse.com/1141670" source="BUGZILLA"/>
		<reference ref_id="1163933" ref_url="https://bugzilla.suse.com/1163933" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9542" ref_url="https://www.suse.com/security/cve/CVE-2015-9542/" source="CVE"/>
		<description>
This update for pam_radius fixes the following issues:

- CVE-2015-9542: Fixed a buffer overflow in password field (bsc#1163933).
- On s390x didn't decrypt passwords correctly (bsc#1141670).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-27"/>
	<updated date="2020-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141670">SUSE bug 1141670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163933">SUSE bug 1163933</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9542/">CVE-2015-9542 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9542">CVE-2015-9542 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556192" comment="pam_radius-1.3.16-239.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530907" comment="pam_radius-32bit-1.3.16-239.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151220" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1155321" ref_url="https://bugzilla.suse.com/1155321" source="BUGZILLA"/>
		<reference ref_id="1156318" ref_url="https://bugzilla.suse.com/1156318" source="BUGZILLA"/>
		<reference ref_id="1159329" ref_url="https://bugzilla.suse.com/1159329" source="BUGZILLA"/>
		<reference ref_id="1161719" ref_url="https://bugzilla.suse.com/1161719" source="BUGZILLA"/>
		<reference ref_id="1163809" ref_url="https://bugzilla.suse.com/1163809" source="BUGZILLA"/>
		<reference ref_id="1165528" ref_url="https://bugzilla.suse.com/1165528" source="BUGZILLA"/>
		<reference ref_id="1169658" ref_url="https://bugzilla.suse.com/1169658" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8625" ref_url="https://www.suse.com/security/cve/CVE-2019-8625/" source="CVE"/>
		<reference ref_id="CVE-2019-8710" ref_url="https://www.suse.com/security/cve/CVE-2019-8710/" source="CVE"/>
		<reference ref_id="CVE-2019-8720" ref_url="https://www.suse.com/security/cve/CVE-2019-8720/" source="CVE"/>
		<reference ref_id="CVE-2019-8743" ref_url="https://www.suse.com/security/cve/CVE-2019-8743/" source="CVE"/>
		<reference ref_id="CVE-2019-8764" ref_url="https://www.suse.com/security/cve/CVE-2019-8764/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8769" ref_url="https://www.suse.com/security/cve/CVE-2019-8769/" source="CVE"/>
		<reference ref_id="CVE-2019-8771" ref_url="https://www.suse.com/security/cve/CVE-2019-8771/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8783" ref_url="https://www.suse.com/security/cve/CVE-2019-8783/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8811" ref_url="https://www.suse.com/security/cve/CVE-2019-8811/" source="CVE"/>
		<reference ref_id="CVE-2019-8812" ref_url="https://www.suse.com/security/cve/CVE-2019-8812/" source="CVE"/>
		<reference ref_id="CVE-2019-8813" ref_url="https://www.suse.com/security/cve/CVE-2019-8813/" source="CVE"/>
		<reference ref_id="CVE-2019-8814" ref_url="https://www.suse.com/security/cve/CVE-2019-8814/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8816" ref_url="https://www.suse.com/security/cve/CVE-2019-8816/" source="CVE"/>
		<reference ref_id="CVE-2019-8819" ref_url="https://www.suse.com/security/cve/CVE-2019-8819/" source="CVE"/>
		<reference ref_id="CVE-2019-8820" ref_url="https://www.suse.com/security/cve/CVE-2019-8820/" source="CVE"/>
		<reference ref_id="CVE-2019-8823" ref_url="https://www.suse.com/security/cve/CVE-2019-8823/" source="CVE"/>
		<reference ref_id="CVE-2019-8835" ref_url="https://www.suse.com/security/cve/CVE-2019-8835/" source="CVE"/>
		<reference ref_id="CVE-2019-8844" ref_url="https://www.suse.com/security/cve/CVE-2019-8844/" source="CVE"/>
		<reference ref_id="CVE-2019-8846" ref_url="https://www.suse.com/security/cve/CVE-2019-8846/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-11793" ref_url="https://www.suse.com/security/cve/CVE-2020-11793/" source="CVE"/>
		<reference ref_id="CVE-2020-3862" ref_url="https://www.suse.com/security/cve/CVE-2020-3862/" source="CVE"/>
		<reference ref_id="CVE-2020-3864" ref_url="https://www.suse.com/security/cve/CVE-2020-3864/" source="CVE"/>
		<reference ref_id="CVE-2020-3865" ref_url="https://www.suse.com/security/cve/CVE-2020-3865/" source="CVE"/>
		<reference ref_id="CVE-2020-3867" ref_url="https://www.suse.com/security/cve/CVE-2020-3867/" source="CVE"/>
		<reference ref_id="CVE-2020-3868" ref_url="https://www.suse.com/security/cve/CVE-2020-3868/" source="CVE"/>
		<description>
This update for webkit2gtk3 to version 2.28.1 fixes the following issues:

Security issues fixed:

- CVE-2020-10018: Fixed a denial of service because the m_deferredFocusedNodeChange data structure was mishandled (bsc#1165528).
- CVE-2020-11793: Fixed a potential arbitrary code execution caused by a use-after-free vulnerability (bsc#1169658).
- CVE-2019-8835: Fixed multiple memory corruption issues (bsc#1161719).
- CVE-2019-8844: Fixed multiple memory corruption issues (bsc#1161719).
- CVE-2019-8846: Fixed a use-after-free issue (bsc#1161719).
- CVE-2020-3862: Fixed a memory handling issue (bsc#1163809).
- CVE-2020-3867: Fixed an XSS issue (bsc#1163809).
- CVE-2020-3868: Fixed multiple memory corruption issues that could have lead to arbitrary code execution (bsc#1163809).
- CVE-2020-3864,CVE-2020-3865: Fixed logic issues in the DOM object context handling (bsc#1163809).

Non-security issues fixed:

- Add API to enable Process Swap on (Cross-site) Navigation.
- Add user messages API for the communication with the web extension.
- Add support for same-site cookies.
- Service workers are enabled by default.
- Add support for Pointer Lock API.
- Add flatpak sandbox support.
- Make ondemand hardware acceleration policy never leave accelerated compositing mode.
- Always use a light theme for rendering form controls.
- Add about:gpu to show information about the graphics stack.
- Fixed issues while trying to play a video on NextCloud.
- Fixed vertical alignment of text containing arabic diacritics.
- Fixed build with icu 65.1.
- Fixed page loading errors with websites using HSTS.
- Fixed web process crash when displaying a KaTeX formula.
- Fixed several crashes and rendering issues.
- Switched to a single web process for Evolution and geary (bsc#1159329).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-29"/>
	<updated date="2020-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159329">SUSE bug 1159329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161719">SUSE bug 1161719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165528">SUSE bug 1165528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169658">SUSE bug 1169658</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8625/">CVE-2019-8625 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8625">CVE-2019-8625 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8710/">CVE-2019-8710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8710">CVE-2019-8710 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8720/">CVE-2019-8720 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8720">CVE-2019-8720 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8743/">CVE-2019-8743 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8743">CVE-2019-8743 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8764/">CVE-2019-8764 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8764">CVE-2019-8764 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8766">CVE-2019-8766 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8769/">CVE-2019-8769 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8769">CVE-2019-8769 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8771/">CVE-2019-8771 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8771">CVE-2019-8771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8782">CVE-2019-8782 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8783/">CVE-2019-8783 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8783">CVE-2019-8783 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8808">CVE-2019-8808 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8811/">CVE-2019-8811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8811">CVE-2019-8811 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8812/">CVE-2019-8812 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8812">CVE-2019-8812 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8813/">CVE-2019-8813 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8813">CVE-2019-8813 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8814/">CVE-2019-8814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8814">CVE-2019-8814 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8815">CVE-2019-8815 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8816/">CVE-2019-8816 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8816">CVE-2019-8816 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8819/">CVE-2019-8819 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8819">CVE-2019-8819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8820/">CVE-2019-8820 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8820">CVE-2019-8820 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8823/">CVE-2019-8823 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8823">CVE-2019-8823 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8835/">CVE-2019-8835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8835">CVE-2019-8835 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8844/">CVE-2019-8844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8844">CVE-2019-8844 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8846/">CVE-2019-8846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8846">CVE-2019-8846 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10018">CVE-2020-10018 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11793/">CVE-2020-11793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11793">CVE-2020-11793 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-3862/">CVE-2020-3862 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3862">CVE-2020-3862 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-3864/">CVE-2020-3864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3864">CVE-2020-3864 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3865/">CVE-2020-3865 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3865">CVE-2020-3865 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3867/">CVE-2020-3867 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3867">CVE-2020-3867 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3868/">CVE-2020-3868 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3868">CVE-2020-3868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556193" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556194" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556195" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556196" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556197" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151221" version="1" class="patch">
	<metadata>
		<title>Security update for shibboleth-sp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1157471" ref_url="https://bugzilla.suse.com/1157471" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19191" ref_url="https://www.suse.com/security/cve/CVE-2019-19191/" source="CVE"/>
		<description>
This update for shibboleth-sp fixes the following issues:

Security issue fixed:

- CVE-2019-19191: Fixed escalation to root by fixing ownership of log files (bsc#1157471).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-16"/>
	<updated date="2020-01-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1157471">SUSE bug 1157471</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19191/">CVE-2019-19191 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19191">CVE-2019-19191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556198" comment="libshibsp-lite6-2.5.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556199" comment="libshibsp6-2.5.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556200" comment="shibboleth-sp-2.5.5-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151222" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1170170" ref_url="https://bugzilla.suse.com/1170170" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12059" ref_url="https://www.suse.com/security/cve/CVE-2020-12059/" source="CVE"/>
		<description>
This update for ceph fixes the following issues:

- CVE-2020-12059: Fixed a denial of service caused by a specially crafted XML payload on POST requests (bsc#1170170).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-30"/>
	<updated date="2020-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170170">SUSE bug 1170170</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12059/">CVE-2020-12059 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12059">CVE-2020-12059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556201" comment="ceph-common-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556202" comment="libcephfs2-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556203" comment="librados2-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556204" comment="libradosstriper1-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556205" comment="librbd1-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556206" comment="librgw2-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556207" comment="python-cephfs-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556208" comment="python-rados-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556209" comment="python-rbd-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556210" comment="python-rgw-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151223" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1155419" ref_url="https://bugzilla.suse.com/1155419" source="BUGZILLA"/>
		<reference ref_id="1160471" ref_url="https://bugzilla.suse.com/1160471" source="BUGZILLA"/>
		<reference ref_id="1170441" ref_url="https://bugzilla.suse.com/1170441" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<reference ref_id="CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2019-15690: Fixed a heap buffer overflow (bsc#1160471).
- CVE-2019-15681: Fixed a memory leak which could have allowed to a remote attacker to read stack memory (bsc#1155419).
- CVE-2019-20788: Fixed a integer overflow and heap-based buffer overflow via a large height or width value (bsc#1170441).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-04"/>
	<updated date="2020-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160471">SUSE bug 1160471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170441">SUSE bug 1170441</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15681">CVE-2019-15681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15690">CVE-2019-15690 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20788">CVE-2019-20788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556211" comment="libvncclient0-0.9.9-17.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556212" comment="libvncserver0-0.9.9-17.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151224" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1166844" ref_url="https://bugzilla.suse.com/1166844" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<description>
This update for icu fixes the following issues:

- CVE-2020-10531: Fixed integer overflow in UnicodeString:doAppend() (bsc#1166844).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1166844">SUSE bug 1166844</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10531">CVE-2020-10531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556213" comment="libicu-doc-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556214" comment="libicu52_1-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530923" comment="libicu52_1-32bit-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556215" comment="libicu52_1-data-52.1-8.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151225" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1170771" ref_url="https://bugzilla.suse.com/1170771" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-12243: Fixed a denial of service related to recursive filters (bsc#1170771).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12243">CVE-2020-12243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556216" comment="libldap-2_4-2-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530926" comment="libldap-2_4-2-32bit-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556217" comment="openldap2-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556218" comment="openldap2-back-meta-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556219" comment="openldap2-client-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530930" comment="openldap2-doc-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556220" comment="openldap2-ppolicy-check-password-1.2-18.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151226" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1170643" ref_url="https://bugzilla.suse.com/1170643" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3899" ref_url="https://www.suse.com/security/cve/CVE-2020-3899/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Security issue fixed:

- CVE-2020-3899: Fixed a memory consumption issue that could have led to remote code execution (bsc#1170643).

Non-security issues fixed:

- Update to version 2.28.2 (bsc#1170643):
  + Fix excessive CPU usage due to GdkFrameClock not being stopped.
  + Fix UI process crash when EGL_WL_bind_wayland_display extension
    is not available.
  + Fix position of select popup menus in X11.
  + Fix playing of Youtube 'live stream'/H264 URLs.
  + Fix a crash under X11 when cairo uses xcb.
  + Fix the build in MIPS64.
  + Fix several crashes and rendering issues.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3899/">CVE-2020-3899 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3899">CVE-2020-3899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556221" comment="libjavascriptcoregtk-4_0-18-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556222" comment="libwebkit2gtk-4_0-37-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530934" comment="libwebkit2gtk3-lang-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556223" comment="typelib-1_0-JavaScriptCore-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556224" comment="typelib-1_0-WebKit2-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556225" comment="webkit2gtk-4_0-injected-bundles-2.28.2-2.53.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151227" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1170603" ref_url="https://bugzilla.suse.com/1170603" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12268" ref_url="https://www.suse.com/security/cve/CVE-2020-12268/" source="CVE"/>
		<description>
This update for ghostscript to version 9.52 fixes the following issues:

- CVE-2020-12268: Fixed a heap-based buffer overflow in jbig2_image_compose (bsc#1170603).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170603">SUSE bug 1170603</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-12268/">CVE-2020-12268 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12268">CVE-2020-12268 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556226" comment="ghostscript-9.52-23.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556227" comment="ghostscript-x11-9.52-23.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556228" comment="libspectre1-0.2.7-12.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151228" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1171186" ref_url="https://bugzilla.suse.com/1171186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388/" source="CVE"/>
		<reference ref_id="CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to version 68.8.0 ESR (bsc#1171186):

- CVE-2020-12387: Use-after-free during worker shutdown
- CVE-2020-12388: Sandbox escape with improperly guarded Access Tokens
- CVE-2020-12389: Sandbox escape with improperly separated process types
- CVE-2020-6831: Buffer overflow in SCTP chunk input validation
- CVE-2020-12392: Arbitrary local file access with 'Copy as cURL'
- CVE-2020-12393: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection
- CVE-2020-12395: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12387">CVE-2020-12387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12388">CVE-2020-12388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12389">CVE-2020-12389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12392">CVE-2020-12392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12393">CVE-2020-12393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12395">CVE-2020-12395 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6831">CVE-2020-6831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556229" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556230" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151229" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1169659" ref_url="https://bugzilla.suse.com/1169659" source="BUGZILLA"/>
		<reference ref_id="1170313" ref_url="https://bugzilla.suse.com/1170313" source="BUGZILLA"/>
		<reference ref_id="1170423" ref_url="https://bugzilla.suse.com/1170423" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519/" source="CVE"/>
		<reference ref_id="CVE-2019-12520" ref_url="https://www.suse.com/security/cve/CVE-2019-12520/" source="CVE"/>
		<reference ref_id="CVE-2019-12521" ref_url="https://www.suse.com/security/cve/CVE-2019-12521/" source="CVE"/>
		<reference ref_id="CVE-2019-12524" ref_url="https://www.suse.com/security/cve/CVE-2019-12524/" source="CVE"/>
		<reference ref_id="CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2019-12519, CVE-2019-12521: fixes incorrect buffer handling that can 
  result in cache poisoning, remote execution, and denial of service attacks
  when processing ESI responses (bsc#1169659).
- CVE-2020-11945: fixes a potential remote execution vulnerability
  when using HTTP Digest Authentication (bsc#1170313).
- CVE-2019-12520, CVE-2019-12524: fixes a potential ACL bypass, cache-bypass
  and cross-site scripting attack when processing invalid HTTP
  Request messages (bsc#1170423).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-08"/>
	<updated date="2020-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169659">SUSE bug 1169659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170313">SUSE bug 1170313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170423">SUSE bug 1170423</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12519">CVE-2019-12519 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12520/">CVE-2019-12520 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12520">CVE-2019-12520 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12521/">CVE-2019-12521 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12521">CVE-2019-12521 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12524/">CVE-2019-12524 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12524">CVE-2019-12524 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11945">CVE-2020-11945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556231" comment="squid-3.5.21-26.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151230" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1168404" ref_url="https://bugzilla.suse.com/1168404" source="BUGZILLA"/>
		<reference ref_id="1168407" ref_url="https://bugzilla.suse.com/1168407" source="BUGZILLA"/>
		<reference ref_id="1169066" ref_url="https://bugzilla.suse.com/1169066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1927" ref_url="https://www.suse.com/security/cve/CVE-2020-1927/" source="CVE"/>
		<reference ref_id="CVE-2020-1934" ref_url="https://www.suse.com/security/cve/CVE-2020-1934/" source="CVE"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-1934: mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server (bsc#1168404).
- CVE-2020-1927: mod_rewrite configurations vulnerable to open redirect (bsc#1168407).
- CVE-2020-1938: mod_proxy_ajp: Add 'secret' parameter to proxy workers to implement legacy AJP13 authentication (bsc#1169066).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-13"/>
	<updated date="2020-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168404">SUSE bug 1168404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168407">SUSE bug 1168407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169066">SUSE bug 1169066</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1927/">CVE-2020-1927 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1927">CVE-2020-1927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1934/">CVE-2020-1934 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1934">CVE-2020-1934 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556232" comment="apache2-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530956" comment="apache2-doc-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556233" comment="apache2-example-pages-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556234" comment="apache2-prefork-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556235" comment="apache2-utils-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556236" comment="apache2-worker-2.4.23-29.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151231" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1056134" ref_url="https://bugzilla.suse.com/1056134" source="BUGZILLA"/>
		<reference ref_id="1087813" ref_url="https://bugzilla.suse.com/1087813" source="BUGZILLA"/>
		<reference ref_id="1120386" ref_url="https://bugzilla.suse.com/1120386" source="BUGZILLA"/>
		<reference ref_id="1133147" ref_url="https://bugzilla.suse.com/1133147" source="BUGZILLA"/>
		<reference ref_id="1137325" ref_url="https://bugzilla.suse.com/1137325" source="BUGZILLA"/>
		<reference ref_id="1145929" ref_url="https://bugzilla.suse.com/1145929" source="BUGZILLA"/>
		<reference ref_id="1149591" ref_url="https://bugzilla.suse.com/1149591" source="BUGZILLA"/>
		<reference ref_id="1154118" ref_url="https://bugzilla.suse.com/1154118" source="BUGZILLA"/>
		<reference ref_id="1154844" ref_url="https://bugzilla.suse.com/1154844" source="BUGZILLA"/>
		<reference ref_id="1155689" ref_url="https://bugzilla.suse.com/1155689" source="BUGZILLA"/>
		<reference ref_id="1157155" ref_url="https://bugzilla.suse.com/1157155" source="BUGZILLA"/>
		<reference ref_id="1157157" ref_url="https://bugzilla.suse.com/1157157" source="BUGZILLA"/>
		<reference ref_id="1157303" ref_url="https://bugzilla.suse.com/1157303" source="BUGZILLA"/>
		<reference ref_id="1157804" ref_url="https://bugzilla.suse.com/1157804" source="BUGZILLA"/>
		<reference ref_id="1158021" ref_url="https://bugzilla.suse.com/1158021" source="BUGZILLA"/>
		<reference ref_id="1158642" ref_url="https://bugzilla.suse.com/1158642" source="BUGZILLA"/>
		<reference ref_id="1158819" ref_url="https://bugzilla.suse.com/1158819" source="BUGZILLA"/>
		<reference ref_id="1159199" ref_url="https://bugzilla.suse.com/1159199" source="BUGZILLA"/>
		<reference ref_id="1159285" ref_url="https://bugzilla.suse.com/1159285" source="BUGZILLA"/>
		<reference ref_id="1159297" ref_url="https://bugzilla.suse.com/1159297" source="BUGZILLA"/>
		<reference ref_id="1159841" ref_url="https://bugzilla.suse.com/1159841" source="BUGZILLA"/>
		<reference ref_id="1159908" ref_url="https://bugzilla.suse.com/1159908" source="BUGZILLA"/>
		<reference ref_id="1159910" ref_url="https://bugzilla.suse.com/1159910" source="BUGZILLA"/>
		<reference ref_id="1159911" ref_url="https://bugzilla.suse.com/1159911" source="BUGZILLA"/>
		<reference ref_id="1159912" ref_url="https://bugzilla.suse.com/1159912" source="BUGZILLA"/>
		<reference ref_id="1160195" ref_url="https://bugzilla.suse.com/1160195" source="BUGZILLA"/>
		<reference ref_id="1161586" ref_url="https://bugzilla.suse.com/1161586" source="BUGZILLA"/>
		<reference ref_id="1162227" ref_url="https://bugzilla.suse.com/1162227" source="BUGZILLA"/>
		<reference ref_id="1162928" ref_url="https://bugzilla.suse.com/1162928" source="BUGZILLA"/>
		<reference ref_id="1162929" ref_url="https://bugzilla.suse.com/1162929" source="BUGZILLA"/>
		<reference ref_id="1162931" ref_url="https://bugzilla.suse.com/1162931" source="BUGZILLA"/>
		<reference ref_id="1163508" ref_url="https://bugzilla.suse.com/1163508" source="BUGZILLA"/>
		<reference ref_id="1163971" ref_url="https://bugzilla.suse.com/1163971" source="BUGZILLA"/>
		<reference ref_id="1164009" ref_url="https://bugzilla.suse.com/1164009" source="BUGZILLA"/>
		<reference ref_id="1164051" ref_url="https://bugzilla.suse.com/1164051" source="BUGZILLA"/>
		<reference ref_id="1164069" ref_url="https://bugzilla.suse.com/1164069" source="BUGZILLA"/>
		<reference ref_id="1164078" ref_url="https://bugzilla.suse.com/1164078" source="BUGZILLA"/>
		<reference ref_id="1164846" ref_url="https://bugzilla.suse.com/1164846" source="BUGZILLA"/>
		<reference ref_id="1165111" ref_url="https://bugzilla.suse.com/1165111" source="BUGZILLA"/>
		<reference ref_id="1165311" ref_url="https://bugzilla.suse.com/1165311" source="BUGZILLA"/>
		<reference ref_id="1165873" ref_url="https://bugzilla.suse.com/1165873" source="BUGZILLA"/>
		<reference ref_id="1165881" ref_url="https://bugzilla.suse.com/1165881" source="BUGZILLA"/>
		<reference ref_id="1165984" ref_url="https://bugzilla.suse.com/1165984" source="BUGZILLA"/>
		<reference ref_id="1165985" ref_url="https://bugzilla.suse.com/1165985" source="BUGZILLA"/>
		<reference ref_id="1167421" ref_url="https://bugzilla.suse.com/1167421" source="BUGZILLA"/>
		<reference ref_id="1167423" ref_url="https://bugzilla.suse.com/1167423" source="BUGZILLA"/>
		<reference ref_id="1167629" ref_url="https://bugzilla.suse.com/1167629" source="BUGZILLA"/>
		<reference ref_id="1168075" ref_url="https://bugzilla.suse.com/1168075" source="BUGZILLA"/>
		<reference ref_id="1168295" ref_url="https://bugzilla.suse.com/1168295" source="BUGZILLA"/>
		<reference ref_id="1168424" ref_url="https://bugzilla.suse.com/1168424" source="BUGZILLA"/>
		<reference ref_id="1168829" ref_url="https://bugzilla.suse.com/1168829" source="BUGZILLA"/>
		<reference ref_id="1168854" ref_url="https://bugzilla.suse.com/1168854" source="BUGZILLA"/>
		<reference ref_id="1170056" ref_url="https://bugzilla.suse.com/1170056" source="BUGZILLA"/>
		<reference ref_id="1170345" ref_url="https://bugzilla.suse.com/1170345" source="BUGZILLA"/>
		<reference ref_id="1170778" ref_url="https://bugzilla.suse.com/1170778" source="BUGZILLA"/>
		<reference ref_id="1170847" ref_url="https://bugzilla.suse.com/1170847" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18255" ref_url="https://www.suse.com/security/cve/CVE-2017-18255/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-21008" ref_url="https://www.suse.com/security/cve/CVE-2018-21008/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="CVE-2019-18675" ref_url="https://www.suse.com/security/cve/CVE-2019-18675/" source="CVE"/>
		<reference ref_id="CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066/" source="CVE"/>
		<reference ref_id="CVE-2019-19319" ref_url="https://www.suse.com/security/cve/CVE-2019-19319/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-19966" ref_url="https://www.suse.com/security/cve/CVE-2019-19966/" source="CVE"/>
		<reference ref_id="CVE-2019-20054" ref_url="https://www.suse.com/security/cve/CVE-2019-20054/" source="CVE"/>
		<reference ref_id="CVE-2019-20096" ref_url="https://www.suse.com/security/cve/CVE-2019-20096/" source="CVE"/>
		<reference ref_id="CVE-2019-3701" ref_url="https://www.suse.com/security/cve/CVE-2019-3701/" source="CVE"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2019-9455" ref_url="https://www.suse.com/security/cve/CVE-2019-9455/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690/" source="CVE"/>
		<reference ref_id="CVE-2020-10720" ref_url="https://www.suse.com/security/cve/CVE-2020-10720/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11494" ref_url="https://www.suse.com/security/cve/CVE-2020-11494/" source="CVE"/>
		<reference ref_id="CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608/" source="CVE"/>
		<reference ref_id="CVE-2020-11609" ref_url="https://www.suse.com/security/cve/CVE-2020-11609/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-8992" ref_url="https://www.suse.com/security/cve/CVE-2020-8992/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-11494: An issue was discovered in slc_bump in drivers/net/can/slcan.c, which allowed attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL (bnc#1168424).
- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bnc#1167629).
- CVE-2020-8647: Fixed a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bnc#1162929).
- CVE-2020-8649: Fixed a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bnc#1162931).
- CVE-2020-9383: Fixed an issue in set_fdc in drivers/block/floppy.c, which leads to a wait_til_ready out-of-bounds read (bnc#1165111).
- CVE-2019-9458: In the video driver there was a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed (bnc#1168295).
- CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a system crash (bnc#1120386).
- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bnc#1159285).
- CVE-2020-11609: Fixed a NULL pointer dereference in the stv06xx subsystem caused by mishandling invalid descriptors (bnc#1168854).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bnc#1170345).
- CVE-2020-11608: Fixed an issue in drivers/media/usb/gspca/ov519.c caused by a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bnc#1168829).
- CVE-2017-18255: The perf_cpu_time_max_percent_handler function in kernel/events/core.c allowed local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation (bnc#1087813).
- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).
- CVE-2020-2732: A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest (bnc#1163971).
- CVE-2019-5108: Fixed a denial-of-service vulnerability caused by triggering AP to send IAPP location updates for stations before the required authentication process has completed (bnc#1159912).
- CVE-2020-8992: ext4_protect_reserved_inode in fs/ext4/block_validity.c allowed attackers to cause a denial of service (soft lockup) via a crafted journal size (bnc#1164069).
- CVE-2018-21008: Fixed a use-after-free which could be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c (bnc#1149591).
- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bnc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bnc#1157155).
- CVE-2019-18675: Fixed an integer overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bnc#1157804).
- CVE-2019-14615: Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may have allowed an unauthenticated user to potentially enable information disclosure via local access (bnc#1160195, bsc#1165881).
- CVE-2019-19965: Fixed a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bnc#1159911).
- CVE-2019-20054: Fixed a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bnc#1159910).
- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bnc#1159908).
- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bnc#1159841).
- CVE-2019-19447: Fixed an issue with mounting a crafted ext4 filesystem image, performing some operations, and unmounting could lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c (bnc#1158819).
- CVE-2019-19319: Fixed an issue with a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call (bnc#1158021).
- CVE-2019-19767: Fixed mishandling of ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c (bnc#1159297).
- CVE-2019-11091,CVE-2018-12126,CVE-2018-12130,CVE-2018-12127: Earlier mitigations for the 'MDS' Microarchitectural Data Sampling attacks were not complete.
  An additional fix was added to the x86_64 fast systemcall path to further mitigate these attacks. (bsc#1164846 bsc#1170847)


The following non-security bugs were fixed:

- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).
- blktrace: fix dereference after null check (bsc#1159285).
- blktrace: fix trace mutex deadlock (bsc#1159285).
- btrfs: fix btrfs_wait_ordered_range() so that it waits for all ordered extents (bsc#1163508).
- btrfs: fix panic during relocation after ENOSPC before writeback happens (bsc#1163508).
- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1158642)
- btrfs: relocation: fix reloc_root lifespan and access (bsc#1164009).
- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).
- fix PageHeadHuge() race with THP split (VM Functionality, bsc#1165311).
- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).
- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).
- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).
- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).
- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).
- input: add safety guards to input_set_keycode() (bsc#1168075).
- ipv4: correct gso_size for UFO (bsc#1154844).
- ipv6: fix memory accounting during ipv6 queue expire (bsc#1162227) (bsc#1162227).
- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).
- md: add mddev-&gt;pers to avoid potential NULL pointer dereference (bsc#1056134).
- md/bitmap: do not read page from device with Bitmap_sync (bsc#1056134).
- md: change the initialization value for a spare device spot to MD_DISK_ROLE_SPARE (bsc#1056134).
- md: Delete gendisk before cleaning up the request queue (bsc#1056134).
- md: do not call bitmap_create() while array is quiesced (bsc#1056134).
- md: do not set In_sync if array is frozen (bsc#1056134).
- md: fix a potential deadlock of raid5/raid10 reshape (bsc#1056134).
- md: md.c: Return -ENODEV when mddev is NULL in rdev_attr_show (bsc#1056134).
- md: notify about new spare disk in the container (bsc#1056134).
- md/raid0: Fix buffer overflow at debug print (bsc#1164051).
- md/raid10: end bio when the device faulty (bsc#1056134).
- md/raid10: Fix raid10 replace hang when new added disk faulty (bsc#1056134).
- md/raid1,raid10: silence warning about wait-within-wait (bsc#1056134).
- md: return -ENODEV if rdev has no mddev assigned (bsc#1056134).
- media: ov519: add missing endpoint sanity checks (bsc#1168829).
- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).
- net: ena: Add PCI shutdown handler to allow safe kexec (bsc#1167421, bsc#1167423).
- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).
- net/ibmvnic: Fix typo in retry check (bsc#1155689 ltc#182047).
- rpm/kernel-binary.spec.in: Replace Novell with SUSE
- sched/fair: Scale bandwidth quota and period without losing quota/period ratio precision (bsc#1161586).
- scsi: core: avoid repetitive logging of device offline messages (bsc#1145929).
- scsi: core: kABI fix already_offline (bsc#1145929).
- tcp: clear tp-&gt;packets_out when purging write queue (bsc#1154118).
- x86/mitigations: Clear CPU buffers on the SYSCALL fast path (bsc#1164846 bsc#1170847).
- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).
- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-14"/>
	<updated date="2020-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056134">SUSE bug 1056134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087813">SUSE bug 1087813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120386">SUSE bug 1120386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133147">SUSE bug 1133147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137325">SUSE bug 1137325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145929">SUSE bug 1145929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149591">SUSE bug 1149591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154118">SUSE bug 1154118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154844">SUSE bug 1154844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155689">SUSE bug 1155689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157155">SUSE bug 1157155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157157">SUSE bug 1157157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157303">SUSE bug 1157303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157804">SUSE bug 1157804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158021">SUSE bug 1158021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158642">SUSE bug 1158642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158819">SUSE bug 1158819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159199">SUSE bug 1159199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159285">SUSE bug 1159285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159297">SUSE bug 1159297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159841">SUSE bug 1159841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159908">SUSE bug 1159908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159910">SUSE bug 1159910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159911">SUSE bug 1159911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159912">SUSE bug 1159912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160195">SUSE bug 1160195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161586">SUSE bug 1161586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162227">SUSE bug 1162227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162928">SUSE bug 1162928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162929">SUSE bug 1162929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162931">SUSE bug 1162931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163508">SUSE bug 1163508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163971">SUSE bug 1163971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164009">SUSE bug 1164009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164051">SUSE bug 1164051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164069">SUSE bug 1164069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164078">SUSE bug 1164078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164846">SUSE bug 1164846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165111">SUSE bug 1165111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165311">SUSE bug 1165311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165873">SUSE bug 1165873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165881">SUSE bug 1165881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165984">SUSE bug 1165984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165985">SUSE bug 1165985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167421">SUSE bug 1167421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167423">SUSE bug 1167423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167629">SUSE bug 1167629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168075">SUSE bug 1168075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168295">SUSE bug 1168295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168424">SUSE bug 1168424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168829">SUSE bug 1168829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168854">SUSE bug 1168854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170056">SUSE bug 1170056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170345">SUSE bug 1170345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170778">SUSE bug 1170778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170847">SUSE bug 1170847</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18255/">CVE-2017-18255 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18255">CVE-2017-18255 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-21008/">CVE-2018-21008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21008">CVE-2018-21008 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14615">CVE-2019-14615 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18675/">CVE-2019-18675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18675">CVE-2019-18675 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19066">CVE-2019-19066 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19319/">CVE-2019-19319 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19319">CVE-2019-19319 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19447">CVE-2019-19447 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19767">CVE-2019-19767 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19768">CVE-2019-19768 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19965">CVE-2019-19965 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19966/">CVE-2019-19966 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19966">CVE-2019-19966 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20054/">CVE-2019-20054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20054">CVE-2019-20054 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20096/">CVE-2019-20096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20096">CVE-2019-20096 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3701/">CVE-2019-3701 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3701">CVE-2019-3701 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5108">CVE-2019-5108 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9455/">CVE-2019-9455 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9455">CVE-2019-9455 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9458">CVE-2019-9458 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10690">CVE-2020-10690 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10720/">CVE-2020-10720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10720">CVE-2020-10720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10942">CVE-2020-10942 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11494/">CVE-2020-11494 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11494">CVE-2020-11494 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11608">CVE-2020-11608 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11609/">CVE-2020-11609 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11609">CVE-2020-11609 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2732">CVE-2020-2732 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8647">CVE-2020-8647 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8648">CVE-2020-8648 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8649">CVE-2020-8649 at NVD</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8992/">CVE-2020-8992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8992">CVE-2020-8992 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9383">CVE-2020-9383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556237" comment="kernel-default-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556238" comment="kernel-default-base-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556239" comment="kernel-default-devel-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556240" comment="kernel-default-kgraft-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538400" comment="kernel-devel-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538401" comment="kernel-macros-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538402" comment="kernel-source-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556241" comment="kernel-syms-4.4.180-94.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556242" comment="kgraft-patch-4_4_180-94_116-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151232" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyYAML (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1165439" ref_url="https://bugzilla.suse.com/1165439" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1747" ref_url="https://www.suse.com/security/cve/CVE-2020-1747/" source="CVE"/>
		<description>
This update for python-PyYAML fixes the following issues:

- CVE-2020-1747: Fixed an arbitrary code execution when YAML files are parsed by FullLoader (bsc#1165439).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-15"/>
	<updated date="2020-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165439">SUSE bug 1165439</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1747/">CVE-2020-1747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1747">CVE-2020-1747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556243" comment="python-PyYAML-5.1.2-26.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556244" comment="python3-PyYAML-5.1.2-26.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151233" version="1" class="patch">
	<metadata>
		<title>Security update for git (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1168930" ref_url="https://bugzilla.suse.com/1168930" source="BUGZILLA"/>
		<reference ref_id="1169605" ref_url="https://bugzilla.suse.com/1169605" source="BUGZILLA"/>
		<reference ref_id="1169786" ref_url="https://bugzilla.suse.com/1169786" source="BUGZILLA"/>
		<reference ref_id="1169936" ref_url="https://bugzilla.suse.com/1169936" source="BUGZILLA"/>
		<reference ref_id="1170302" ref_url="https://bugzilla.suse.com/1170302" source="BUGZILLA"/>
		<reference ref_id="1170741" ref_url="https://bugzilla.suse.com/1170741" source="BUGZILLA"/>
		<reference ref_id="1170939" ref_url="https://bugzilla.suse.com/1170939" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11008" ref_url="https://www.suse.com/security/cve/CVE-2020-11008/" source="CVE"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<description>
This update for git to 2.26.2 fixes the following issues:

Security issue fixed:

- CVE-2020-11008: Specially crafted URLs may have tricked the credentials helper 
  to providing credential information that is not appropriate for the protocol 
  in use and host being contacted (bsc#1169936).

Non-security issue fixed:

- Fixed git-daemon not starting after conversion from sysvinit to systemd service (bsc#1169605).
- Enabled access for git-daemon in firewall configuration (bsc#1170302).
- Fixed problems with recent switch to protocol v2, which caused fetches transferring unreasonable amount of data (bsc#1170741).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-18"/>
	<updated date="2020-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169605">SUSE bug 1169605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169786">SUSE bug 1169786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169936">SUSE bug 1169936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170302">SUSE bug 1170302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170741">SUSE bug 1170741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170939">SUSE bug 1170939</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11008/">CVE-2020-11008 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11008">CVE-2020-11008 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5260">CVE-2020-5260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556245" comment="git-core-2.26.2-27.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151234" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1167068" ref_url="https://bugzilla.suse.com/1167068" source="BUGZILLA"/>
		<reference ref_id="1170558" ref_url="https://bugzilla.suse.com/1170558" source="BUGZILLA"/>
		<reference ref_id="1171363" ref_url="https://bugzilla.suse.com/1171363" source="BUGZILLA"/>
		<reference ref_id="682920" ref_url="https://bugzilla.suse.com/682920" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12108" ref_url="https://www.suse.com/security/cve/CVE-2020-12108/" source="CVE"/>
		<reference ref_id="CVE-2020-12137" ref_url="https://www.suse.com/security/cve/CVE-2020-12137/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2020-12108: Fixed a content injection bug (bsc#1171363).
- CVE-2020-12137: Fixed a XSS vulnerability caused by MIME type confusion (bsc#1170558).

Non-security issue fixed:

- Fixed rights and ownership on /var/lib/mailman/archives (bsc#1167068).
- Don't default to invalid hosts for DEFAULT_EMAIL_HOST (bsc#682920).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-18"/>
	<updated date="2020-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167068">SUSE bug 1167068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170558">SUSE bug 1170558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171363">SUSE bug 1171363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682920">SUSE bug 682920</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12108/">CVE-2020-12108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12108">CVE-2020-12108 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12137/">CVE-2020-12137 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12137">CVE-2020-12137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530963" comment="mailman-2.1.17-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151235" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_113 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721279" comment="kernel-default 4.4.180-94.113 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719606" comment="kgraft-patch-4_4_180-94_113-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556246" comment="kgraft-patch-4_4_180-94_113-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151236" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_107 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721280" comment="kernel-default 4.4.180-94.107 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719608" comment="kgraft-patch-4_4_180-94_107-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556247" comment="kgraft-patch-4_4_180-94_107-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151237" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_103 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721277" comment="kernel-default 4.4.180-94.103 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719602" comment="kgraft-patch-4_4_180-94_103-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556248" comment="kgraft-patch-4_4_180-94_103-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151238" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_100 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721278" comment="kernel-default 4.4.180-94.100 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719604" comment="kgraft-patch-4_4_180-94_100-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556249" comment="kgraft-patch-4_4_180-94_100-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151239" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_97 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721153" comment="kernel-default 4.4.180-94.97 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719420" comment="kgraft-patch-4_4_180-94_97-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556250" comment="kgraft-patch-4_4_180-94_97-default-9-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151240" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.178-94_91 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721150" comment="kernel-default 4.4.178-94.91 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719417" comment="kgraft-patch-4_4_178-94_91-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556251" comment="kgraft-patch-4_4_178-94_91-default-9-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151241" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1136085" ref_url="https://bugzilla.suse.com/1136085" source="BUGZILLA"/>
		<reference ref_id="1159723" ref_url="https://bugzilla.suse.com/1159723" source="BUGZILLA"/>
		<reference ref_id="1159729" ref_url="https://bugzilla.suse.com/1159729" source="BUGZILLA"/>
		<reference ref_id="1164825" ref_url="https://bugzilla.suse.com/1164825" source="BUGZILLA"/>
		<reference ref_id="1171928" ref_url="https://bugzilla.suse.com/1171928" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221/" source="CVE"/>
		<reference ref_id="CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418/" source="CVE"/>
		<reference ref_id="CVE-2019-17563" ref_url="https://www.suse.com/security/cve/CVE-2019-17563/" source="CVE"/>
		<reference ref_id="CVE-2019-17569" ref_url="https://www.suse.com/security/cve/CVE-2019-17569/" source="CVE"/>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

CVE-2020-9484 (bsc#1171928)
Apache Tomcat Remote Code Execution via session persistence

If an attacker was able to control the contents and name of a file on a
server configured to use the PersistenceManager, then the attacker could
have triggered a remote code execution via deserialization of the file under
their control.

CVE-2019-12418 (bsc#1159723)
Local privilege escalation by manipulating the RMI registry and performing a man-in-the-middle attack

When Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files was able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface.
The attacker could then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.

CVE-2019-0221 (bsc#1136085)
The SSI printenv command echoed user provided data without escaping, which
made it vulnerable to XSS.

CVE-2019-17563 (bsc#1159729)
When using FORM authentication there was a narrow window where an attacker could perform a session fixation attack.

CVE-2019-17569 (bsc#1164825)
Invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling
if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-28"/>
	<updated date="2020-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136085">SUSE bug 1136085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159723">SUSE bug 1159723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159729">SUSE bug 1159729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164825">SUSE bug 1164825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171928">SUSE bug 1171928</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0221">CVE-2019-0221 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12418">CVE-2019-12418 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17563/">CVE-2019-17563 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17563">CVE-2019-17563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17569/">CVE-2019-17569 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17569">CVE-2019-17569 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9484">CVE-2020-9484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530964" comment="tomcat-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530965" comment="tomcat-admin-webapps-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530966" comment="tomcat-docs-webapp-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530967" comment="tomcat-el-3_0-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530968" comment="tomcat-javadoc-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530969" comment="tomcat-jsp-2_3-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530970" comment="tomcat-lib-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530971" comment="tomcat-servlet-3_1-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530972" comment="tomcat-webapps-8.0.53-29.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151242" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1027282" ref_url="https://bugzilla.suse.com/1027282" source="BUGZILLA"/>
		<reference ref_id="1041090" ref_url="https://bugzilla.suse.com/1041090" source="BUGZILLA"/>
		<reference ref_id="1042670" ref_url="https://bugzilla.suse.com/1042670" source="BUGZILLA"/>
		<reference ref_id="1073269" ref_url="https://bugzilla.suse.com/1073269" source="BUGZILLA"/>
		<reference ref_id="1073748" ref_url="https://bugzilla.suse.com/1073748" source="BUGZILLA"/>
		<reference ref_id="1078326" ref_url="https://bugzilla.suse.com/1078326" source="BUGZILLA"/>
		<reference ref_id="1078485" ref_url="https://bugzilla.suse.com/1078485" source="BUGZILLA"/>
		<reference ref_id="1081750" ref_url="https://bugzilla.suse.com/1081750" source="BUGZILLA"/>
		<reference ref_id="1084650" ref_url="https://bugzilla.suse.com/1084650" source="BUGZILLA"/>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1153830" ref_url="https://bugzilla.suse.com/1153830" source="BUGZILLA"/>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1159035" ref_url="https://bugzilla.suse.com/1159035" source="BUGZILLA"/>
		<reference ref_id="1162224" ref_url="https://bugzilla.suse.com/1162224" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="1170411" ref_url="https://bugzilla.suse.com/1170411" source="BUGZILLA"/>
		<reference ref_id="1171561" ref_url="https://bugzilla.suse.com/1171561" source="BUGZILLA"/>
		<reference ref_id="945401" ref_url="https://bugzilla.suse.com/945401" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<description>


This update for python to version 2.7.17 fixes the following issues:

Syncing with lots of upstream bug fixes and security fixes.

Bug fixes:

- CVE-2019-9674: Improved the documentation to reflect the dangers of zip-bombs (bsc#1162825).
- CVE-2019-18348: Fixed a CRLF injection via the host part of the url passed to urlopen(). Now an InvalidURL exception is raised (bsc#1155094).
- CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367).
- Fixed mismatches between libpython and python-base versions (bsc#1162224).
- Fixed segfault in libpython2.7.so.1 (bsc#1073748).
- Unified packages among openSUSE:Factory and SLE versions (bsc#1159035).
- Added idle.desktop and idle.appdata.xml to provide IDLE in menus (bsc#1153830).
- Excluded tsl_check files from python-base to prevent file conflict with python-strict-tls-checks package (bsc#945401).
- Changed the name of idle3 icons to idle3.png to avoid collision with Python 2 version (bsc#1165894).

Additionally a new 'shared-python-startup' package is provided containing startup files.

python-rpm-macros was updated to fix:

- Do not write .pyc files for tests (bsc#1171561)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-03"/>
	<updated date="2020-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027282">SUSE bug 1027282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041090">SUSE bug 1041090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042670">SUSE bug 1042670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073269">SUSE bug 1073269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073748">SUSE bug 1073748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078326">SUSE bug 1078326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078485">SUSE bug 1078485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081750">SUSE bug 1081750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084650">SUSE bug 1084650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153830">SUSE bug 1153830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159035">SUSE bug 1159035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162224">SUSE bug 1162224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170411">SUSE bug 1170411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171561">SUSE bug 1171561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945401">SUSE bug 945401</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556252" comment="libpython2_7-1_0-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530974" comment="libpython2_7-1_0-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556253" comment="python-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530976" comment="python-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556254" comment="python-base-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530978" comment="python-base-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556255" comment="python-curses-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556256" comment="python-demo-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556257" comment="python-devel-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530982" comment="python-doc-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530983" comment="python-doc-pdf-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556258" comment="python-gdbm-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556259" comment="python-idle-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530986" comment="python-rpm-macros-20200207.5feb6c1-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556260" comment="python-tk-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556261" comment="python-xml-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530989" comment="shared-python-startup-0.1-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151243" version="1" class="patch">
	<metadata>
		<title>Security update for krb5-appl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1165787" ref_url="https://bugzilla.suse.com/1165787" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10188" ref_url="https://www.suse.com/security/cve/CVE-2020-10188/" source="CVE"/>
		<description>
This update for krb5-appl fixes the following issues:

- CVE-2020-10188: Fixed a remote root execution (bsc#1165787).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165787">SUSE bug 1165787</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10188/">CVE-2020-10188 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10188">CVE-2020-10188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556262" comment="krb5-appl-clients-1.0.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556263" comment="krb5-appl-servers-1.0.3-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151244" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1055857" ref_url="https://bugzilla.suse.com/1055857" source="BUGZILLA"/>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="1171475" ref_url="https://bugzilla.suse.com/1171475" source="BUGZILLA"/>
		<reference ref_id="1171847" ref_url="https://bugzilla.suse.com/1171847" source="BUGZILLA"/>
		<reference ref_id="1172105" ref_url="https://bugzilla.suse.com/1172105" source="BUGZILLA"/>
		<reference ref_id="1172116" ref_url="https://bugzilla.suse.com/1172116" source="BUGZILLA"/>
		<reference ref_id="1172121" ref_url="https://bugzilla.suse.com/1172121" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328/" source="CVE"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="CVE-2020-0093" ref_url="https://www.suse.com/security/cve/CVE-2020-0093/" source="CVE"/>
		<reference ref_id="CVE-2020-12767" ref_url="https://www.suse.com/security/cve/CVE-2020-12767/" source="CVE"/>
		<reference ref_id="CVE-2020-13112" ref_url="https://www.suse.com/security/cve/CVE-2020-13112/" source="CVE"/>
		<reference ref_id="CVE-2020-13113" ref_url="https://www.suse.com/security/cve/CVE-2020-13113/" source="CVE"/>
		<reference ref_id="CVE-2020-13114" ref_url="https://www.suse.com/security/cve/CVE-2020-13114/" source="CVE"/>
		<description>
This update for libexif fixes the following issues:

Security issues fixed:

- CVE-2016-6328: Fixed an integer overflow in parsing MNOTE entry data of the input file (bsc#1055857).
- CVE-2017-7544: Fixed an out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c (bsc#1059893).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2020-0093: Fixed an out-of-bounds read in exif_data_save_data_entry (bsc#1171847).
- CVE-2020-12767: Fixed a divide-by-zero error in exif_entry_get_value (bsc#1171475).
- CVE-2020-13112: Fixed a time consumption DoS when parsing canon array markers (bsc#1172121).
- CVE-2020-13113: Fixed a potential use of uninitialized memory (bsc#1172105).
- CVE-2020-13114: Fixed various buffer overread fixes due to integer overflows in maker notes (bsc#1172116).

Non-security issues fixed:

- libexif was updated to version 0.6.22:
  * New translations: ms
  * Updated translations for most languages
  * Some useful EXIF 2.3 tag added:
    * EXIF_TAG_GAMMA
    * EXIF_TAG_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_IMAGE_NUMBER_OF_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_EXPOSURE_TIMES_OF_COMPOSITE_IMAGE
    * EXIF_TAG_GPS_H_POSITIONING_ERROR
    * EXIF_TAG_CAMERA_OWNER_NAME
    * EXIF_TAG_BODY_SERIAL_NUMBER
    * EXIF_TAG_LENS_SPECIFICATION
    * EXIF_TAG_LENS_MAKE
    * EXIF_TAG_LENS_MODEL
    * EXIF_TAG_LENS_SERIAL_NUMBER
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055857">SUSE bug 1055857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171475">SUSE bug 1171475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171847">SUSE bug 1171847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172105">SUSE bug 1172105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172116">SUSE bug 1172116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172121">SUSE bug 1172121</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6328">CVE-2016-6328 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7544">CVE-2017-7544 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20030">CVE-2018-20030 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9278">CVE-2019-9278 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0093/">CVE-2020-0093 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0093">CVE-2020-0093 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12767/">CVE-2020-12767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12767">CVE-2020-12767 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13112/">CVE-2020-13112 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13112">CVE-2020-13112 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13113/">CVE-2020-13113 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13113">CVE-2020-13113 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13114/">CVE-2020-13114 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13114">CVE-2020-13114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556264" comment="libexif12-0.6.22-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531006" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151245" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="1146873" ref_url="https://bugzilla.suse.com/1146873" source="BUGZILLA"/>
		<reference ref_id="1149811" ref_url="https://bugzilla.suse.com/1149811" source="BUGZILLA"/>
		<reference ref_id="1160024" ref_url="https://bugzilla.suse.com/1160024" source="BUGZILLA"/>
		<reference ref_id="1161066" ref_url="https://bugzilla.suse.com/1161066" source="BUGZILLA"/>
		<reference ref_id="1163018" ref_url="https://bugzilla.suse.com/1163018" source="BUGZILLA"/>
		<reference ref_id="1166240" ref_url="https://bugzilla.suse.com/1166240" source="BUGZILLA"/>
		<reference ref_id="1170940" ref_url="https://bugzilla.suse.com/1170940" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2020-1711: Fixed a potential OOB access in the iSCSI client code (bsc#1166240).
- CVE-2019-12068: Fixed a potential DoS in the LSI SCSI controller emulation (bsc#1146873).
- CVE-2020-1983: Fixed a use-after-free in the ip_reass function of slirp (bsc#1170940).
- CVE-2020-8608: Fixed a potential OOB access in slirp (bsc#1163018).
- CVE-2020-7039: Fixed a potential OOB access in slirp (bsc#1161066).
- CVE-2019-15890: Fixed a use-after-free during packet reassembly in slirp (bsc#1149811).
- Fixed multiple potential DoS issues in SLIRP, similar to CVE-2019-6778 (bsc#1123156).

Non-security issue fixed:

- Make sure that required memory is mapped properly during an incoming migration of a Xen HVM domU (bsc#1160024).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146873">SUSE bug 1146873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149811">SUSE bug 1149811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160024">SUSE bug 1160024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161066">SUSE bug 1161066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163018">SUSE bug 1163018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166240">SUSE bug 1166240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170940">SUSE bug 1170940</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12068">CVE-2019-12068 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1711">CVE-2020-1711 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1983">CVE-2020-1983 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7039">CVE-2020-7039 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556265" comment="qemu-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554744" comment="qemu-arm-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556266" comment="qemu-block-curl-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556267" comment="qemu-block-iscsi-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554747" comment="qemu-block-rbd-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556268" comment="qemu-block-ssh-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556269" comment="qemu-guest-agent-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538419" comment="qemu-ipxe-1.0.0+-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538420" comment="qemu-kvm-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556270" comment="qemu-lang-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538423" comment="qemu-seabios-1.10.2-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538424" comment="qemu-sgabios-8-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556271" comment="qemu-tools-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538426" comment="qemu-vgabios-1.10.2-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538427" comment="qemu-x86-2.9.1-6.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151246" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1172031" ref_url="https://bugzilla.suse.com/1172031" source="BUGZILLA"/>
		<reference ref_id="1172225" ref_url="https://bugzilla.suse.com/1172225" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807/" source="CVE"/>
		<description>
This update for vim fixes the following issues:

- CVE-2019-20807: Fixed an issue where escaping from the restrictive mode of vim 
  was possible using interfaces (bsc#1172225 and bsc#1172031).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172031">SUSE bug 1172031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172225">SUSE bug 1172225</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20807">CVE-2019-20807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556272" comment="gvim-7.4.326-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556273" comment="vim-7.4.326-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531009" comment="vim-data-7.4.326-17.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151247" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1172402" ref_url="https://bugzilla.suse.com/1172402" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- MozillaFirefox was updated to version 68.9.0 Extended Support Release (bsc#1172402).

- CVE-2020-12405: Fixed a use-after-free in SharedWorkerService. 
- CVE-2020-12406: Fixed a JavaScript Type confusion with NativeTypes.
- CVE-2020-12410: Fixed multiple memory safety bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12405">CVE-2020-12405 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12406">CVE-2020-12406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12410">CVE-2020-12410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556274" comment="MozillaFirefox-68.9.0-109.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556275" comment="MozillaFirefox-translations-common-68.9.0-109.123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151248" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1043983" ref_url="https://bugzilla.suse.com/1043983" source="BUGZILLA"/>
		<reference ref_id="1048072" ref_url="https://bugzilla.suse.com/1048072" source="BUGZILLA"/>
		<reference ref_id="1055265" ref_url="https://bugzilla.suse.com/1055265" source="BUGZILLA"/>
		<reference ref_id="1056286" ref_url="https://bugzilla.suse.com/1056286" source="BUGZILLA"/>
		<reference ref_id="1056782" ref_url="https://bugzilla.suse.com/1056782" source="BUGZILLA"/>
		<reference ref_id="1058754" ref_url="https://bugzilla.suse.com/1058754" source="BUGZILLA"/>
		<reference ref_id="1058755" ref_url="https://bugzilla.suse.com/1058755" source="BUGZILLA"/>
		<reference ref_id="1058757" ref_url="https://bugzilla.suse.com/1058757" source="BUGZILLA"/>
		<reference ref_id="1062452" ref_url="https://bugzilla.suse.com/1062452" source="BUGZILLA"/>
		<reference ref_id="1069607" ref_url="https://bugzilla.suse.com/1069607" source="BUGZILLA"/>
		<reference ref_id="1069632" ref_url="https://bugzilla.suse.com/1069632" source="BUGZILLA"/>
		<reference ref_id="1073002" ref_url="https://bugzilla.suse.com/1073002" source="BUGZILLA"/>
		<reference ref_id="1078782" ref_url="https://bugzilla.suse.com/1078782" source="BUGZILLA"/>
		<reference ref_id="1082007" ref_url="https://bugzilla.suse.com/1082007" source="BUGZILLA"/>
		<reference ref_id="1082008" ref_url="https://bugzilla.suse.com/1082008" source="BUGZILLA"/>
		<reference ref_id="1082009" ref_url="https://bugzilla.suse.com/1082009" source="BUGZILLA"/>
		<reference ref_id="1082010" ref_url="https://bugzilla.suse.com/1082010" source="BUGZILLA"/>
		<reference ref_id="1082011" ref_url="https://bugzilla.suse.com/1082011" source="BUGZILLA"/>
		<reference ref_id="1082014" ref_url="https://bugzilla.suse.com/1082014" source="BUGZILLA"/>
		<reference ref_id="1082058" ref_url="https://bugzilla.suse.com/1082058" source="BUGZILLA"/>
		<reference ref_id="1087433" ref_url="https://bugzilla.suse.com/1087433" source="BUGZILLA"/>
		<reference ref_id="1087434" ref_url="https://bugzilla.suse.com/1087434" source="BUGZILLA"/>
		<reference ref_id="1087436" ref_url="https://bugzilla.suse.com/1087436" source="BUGZILLA"/>
		<reference ref_id="1087437" ref_url="https://bugzilla.suse.com/1087437" source="BUGZILLA"/>
		<reference ref_id="1087440" ref_url="https://bugzilla.suse.com/1087440" source="BUGZILLA"/>
		<reference ref_id="1087441" ref_url="https://bugzilla.suse.com/1087441" source="BUGZILLA"/>
		<reference ref_id="1112530" ref_url="https://bugzilla.suse.com/1112530" source="BUGZILLA"/>
		<reference ref_id="1112532" ref_url="https://bugzilla.suse.com/1112532" source="BUGZILLA"/>
		<reference ref_id="1130611" ref_url="https://bugzilla.suse.com/1130611" source="BUGZILLA"/>
		<reference ref_id="1130617" ref_url="https://bugzilla.suse.com/1130617" source="BUGZILLA"/>
		<reference ref_id="1130620" ref_url="https://bugzilla.suse.com/1130620" source="BUGZILLA"/>
		<reference ref_id="1130622" ref_url="https://bugzilla.suse.com/1130622" source="BUGZILLA"/>
		<reference ref_id="1130623" ref_url="https://bugzilla.suse.com/1130623" source="BUGZILLA"/>
		<reference ref_id="1130627" ref_url="https://bugzilla.suse.com/1130627" source="BUGZILLA"/>
		<reference ref_id="1152990" ref_url="https://bugzilla.suse.com/1152990" source="BUGZILLA"/>
		<reference ref_id="1152992" ref_url="https://bugzilla.suse.com/1152992" source="BUGZILLA"/>
		<reference ref_id="1152994" ref_url="https://bugzilla.suse.com/1152994" source="BUGZILLA"/>
		<reference ref_id="1152995" ref_url="https://bugzilla.suse.com/1152995" source="BUGZILLA"/>
		<reference ref_id="1171517" ref_url="https://bugzilla.suse.com/1171517" source="BUGZILLA"/>
		<reference ref_id="1172275" ref_url="https://bugzilla.suse.com/1172275" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9096" ref_url="https://www.suse.com/security/cve/CVE-2015-9096/" source="CVE"/>
		<reference ref_id="CVE-2016-2339" ref_url="https://www.suse.com/security/cve/CVE-2016-2339/" source="CVE"/>
		<reference ref_id="CVE-2016-7798" ref_url="https://www.suse.com/security/cve/CVE-2016-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-0898" ref_url="https://www.suse.com/security/cve/CVE-2017-0898/" source="CVE"/>
		<reference ref_id="CVE-2017-0899" ref_url="https://www.suse.com/security/cve/CVE-2017-0899/" source="CVE"/>
		<reference ref_id="CVE-2017-0900" ref_url="https://www.suse.com/security/cve/CVE-2017-0900/" source="CVE"/>
		<reference ref_id="CVE-2017-0901" ref_url="https://www.suse.com/security/cve/CVE-2017-0901/" source="CVE"/>
		<reference ref_id="CVE-2017-0902" ref_url="https://www.suse.com/security/cve/CVE-2017-0902/" source="CVE"/>
		<reference ref_id="CVE-2017-0903" ref_url="https://www.suse.com/security/cve/CVE-2017-0903/" source="CVE"/>
		<reference ref_id="CVE-2017-10784" ref_url="https://www.suse.com/security/cve/CVE-2017-10784/" source="CVE"/>
		<reference ref_id="CVE-2017-14033" ref_url="https://www.suse.com/security/cve/CVE-2017-14033/" source="CVE"/>
		<reference ref_id="CVE-2017-14064" ref_url="https://www.suse.com/security/cve/CVE-2017-14064/" source="CVE"/>
		<reference ref_id="CVE-2017-17405" ref_url="https://www.suse.com/security/cve/CVE-2017-17405/" source="CVE"/>
		<reference ref_id="CVE-2017-17742" ref_url="https://www.suse.com/security/cve/CVE-2017-17742/" source="CVE"/>
		<reference ref_id="CVE-2017-17790" ref_url="https://www.suse.com/security/cve/CVE-2017-17790/" source="CVE"/>
		<reference ref_id="CVE-2017-9228" ref_url="https://www.suse.com/security/cve/CVE-2017-9228/" source="CVE"/>
		<reference ref_id="CVE-2017-9229" ref_url="https://www.suse.com/security/cve/CVE-2017-9229/" source="CVE"/>
		<reference ref_id="CVE-2018-1000073" ref_url="https://www.suse.com/security/cve/CVE-2018-1000073/" source="CVE"/>
		<reference ref_id="CVE-2018-1000074" ref_url="https://www.suse.com/security/cve/CVE-2018-1000074/" source="CVE"/>
		<reference ref_id="CVE-2018-1000075" ref_url="https://www.suse.com/security/cve/CVE-2018-1000075/" source="CVE"/>
		<reference ref_id="CVE-2018-1000076" ref_url="https://www.suse.com/security/cve/CVE-2018-1000076/" source="CVE"/>
		<reference ref_id="CVE-2018-1000077" ref_url="https://www.suse.com/security/cve/CVE-2018-1000077/" source="CVE"/>
		<reference ref_id="CVE-2018-1000078" ref_url="https://www.suse.com/security/cve/CVE-2018-1000078/" source="CVE"/>
		<reference ref_id="CVE-2018-1000079" ref_url="https://www.suse.com/security/cve/CVE-2018-1000079/" source="CVE"/>
		<reference ref_id="CVE-2018-16395" ref_url="https://www.suse.com/security/cve/CVE-2018-16395/" source="CVE"/>
		<reference ref_id="CVE-2018-16396" ref_url="https://www.suse.com/security/cve/CVE-2018-16396/" source="CVE"/>
		<reference ref_id="CVE-2018-6914" ref_url="https://www.suse.com/security/cve/CVE-2018-6914/" source="CVE"/>
		<reference ref_id="CVE-2018-8777" ref_url="https://www.suse.com/security/cve/CVE-2018-8777/" source="CVE"/>
		<reference ref_id="CVE-2018-8778" ref_url="https://www.suse.com/security/cve/CVE-2018-8778/" source="CVE"/>
		<reference ref_id="CVE-2018-8779" ref_url="https://www.suse.com/security/cve/CVE-2018-8779/" source="CVE"/>
		<reference ref_id="CVE-2018-8780" ref_url="https://www.suse.com/security/cve/CVE-2018-8780/" source="CVE"/>
		<reference ref_id="CVE-2019-15845" ref_url="https://www.suse.com/security/cve/CVE-2019-15845/" source="CVE"/>
		<reference ref_id="CVE-2019-16201" ref_url="https://www.suse.com/security/cve/CVE-2019-16201/" source="CVE"/>
		<reference ref_id="CVE-2019-16254" ref_url="https://www.suse.com/security/cve/CVE-2019-16254/" source="CVE"/>
		<reference ref_id="CVE-2019-16255" ref_url="https://www.suse.com/security/cve/CVE-2019-16255/" source="CVE"/>
		<reference ref_id="CVE-2019-8320" ref_url="https://www.suse.com/security/cve/CVE-2019-8320/" source="CVE"/>
		<reference ref_id="CVE-2019-8321" ref_url="https://www.suse.com/security/cve/CVE-2019-8321/" source="CVE"/>
		<reference ref_id="CVE-2019-8322" ref_url="https://www.suse.com/security/cve/CVE-2019-8322/" source="CVE"/>
		<reference ref_id="CVE-2019-8323" ref_url="https://www.suse.com/security/cve/CVE-2019-8323/" source="CVE"/>
		<reference ref_id="CVE-2019-8324" ref_url="https://www.suse.com/security/cve/CVE-2019-8324/" source="CVE"/>
		<reference ref_id="CVE-2019-8325" ref_url="https://www.suse.com/security/cve/CVE-2019-8325/" source="CVE"/>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<description>
This update for ruby2.1 fixes the following issues:

Security issues fixed:

- CVE-2015-9096: Fixed an SMTP command injection via CRLFsequences in a RCPT TO or MAIL FROM command (bsc#1043983).
- CVE-2016-7798: Fixed an IV Reuse in GCM Mode (bsc#1055265).
- CVE-2017-0898: Fixed a buffer underrun vulnerability in Kernel.sprintf (bsc#1058755).
- CVE-2017-0899: Fixed an issue with malicious gem specifications, insufficient sanitation when printing gem specifications could have included terminal characters (bsc#1056286).
- CVE-2017-0900: Fixed an issue with malicious gem specifications, the query command could have led to a denial of service attack against clients (bsc#1056286).
- CVE-2017-0901: Fixed an issue with malicious gem specifications, potentially overwriting arbitrary files on the client system (bsc#1056286).
- CVE-2017-0902: Fixed an issue with malicious gem specifications, that could have enabled MITM attacks against clients (bsc#1056286).
- CVE-2017-0903: Fixed an unsafe object deserialization vulnerability (bsc#1062452).
- CVE-2017-9228: Fixed a heap out-of-bounds write in bitset_set_range() during regex compilation (bsc#1069607).
- CVE-2017-9229: Fixed an invalid pointer dereference in left_adjust_char_head() in oniguruma (bsc#1069632).
- CVE-2017-10784: Fixed an escape sequence injection vulnerability in the Basic authentication of WEBrick (bsc#1058754).
- CVE-2017-14033: Fixed a buffer underrun vulnerability in OpenSSL ASN1 decode (bsc#1058757).
- CVE-2017-14064: Fixed an arbitrary memory exposure during a JSON.generate call (bsc#1056782).
- CVE-2017-17405: Fixed a command injection vulnerability in Net::FTP (bsc#1073002).
- CVE-2017-17742: Fixed an HTTP response splitting issue in WEBrick (bsc#1087434).
- CVE-2017-17790: Fixed a command injection in lib/resolv.rb:lazy_initialize() (bsc#1078782).
- CVE-2018-6914: Fixed an unintentional file and directory creation with directory traversal in tempfile and tmpdir (bsc#1087441).
- CVE-2018-8777: Fixed a potential DoS caused by large requests in WEBrick (bsc#1087436).
- CVE-2018-8778: Fixed a buffer under-read in String#unpack (bsc#1087433).
- CVE-2018-8779: Fixed an unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket (bsc#1087440).
- CVE-2018-8780: Fixed an unintentional directory traversal by poisoned NUL byte in Dir (bsc#1087437).
- CVE-2018-16395: Fixed an issue with OpenSSL::X509::Name equality checking (bsc#1112530).
- CVE-2018-16396: Fixed an issue with tainted string handling, where the flag was not propagated in Array#pack and String#unpack with some directives (bsc#1112532).
- CVE-2018-1000073: Fixed a path traversal issue (bsc#1082007).
- CVE-2018-1000074: Fixed an unsafe object deserialization vulnerability in gem owner, allowing arbitrary code execution with specially crafted YAML (bsc#1082008).
- CVE-2018-1000075: Fixed an infinite loop vulnerability due to negative size in tar header causes Denial of Service (bsc#1082014).
- CVE-2018-1000076: Fixed an improper verification of signatures in tarballs (bsc#1082009).
- CVE-2018-1000077: Fixed an improper URL validation in the homepage attribute of ruby gems (bsc#1082010).
- CVE-2018-1000078: Fixed a XSS vulnerability in the homepage attribute when displayed via gem server (bsc#1082011).
- CVE-2018-1000079: Fixed a path traversal issue during gem installation allows to write to arbitrary filesystem locations (bsc#1082058).
- CVE-2019-8320: Fixed a directory traversal issue when decompressing tar files (bsc#1130627).
- CVE-2019-8321: Fixed an escape sequence injection vulnerability in verbose (bsc#1130623).
- CVE-2019-8322: Fixed an escape sequence injection vulnerability in gem owner (bsc#1130622).
- CVE-2019-8323: Fixed an escape sequence injection vulnerability in API response handling (bsc#1130620).
- CVE-2019-8324: Fixed an issue with malicious gems that may have led to arbitrary code execution (bsc#1130617).
- CVE-2019-8325: Fixed an escape sequence injection vulnerability in errors (bsc#1130611).
- CVE-2019-15845: Fixed a NUL injection vulnerability in File.fnmatch and File.fnmatch? (bsc#1152994).
- CVE-2019-16201: Fixed a regular expression denial of service vulnerability in WEBrick's digest access authentication (bsc#1152995).
- CVE-2019-16254: Fixed an HTTP response splitting vulnerability in WEBrick (bsc#1152992).
- CVE-2019-16255: Fixed a code injection vulnerability in Shell#[] and Shell#test (bsc#1152990).
- CVE-2020-10663: Fixed an unsafe object creation vulnerability in JSON (bsc#1171517).

Non-security issue fixed:

- Add conflicts to libruby to make sure ruby and ruby-stdlib are also updated when libruby is updated (bsc#1048072).

Also yast2-ruby-bindings on SLES 12 SP2 LTSS was updated to handle the updated ruby interpreter. (bsc#1172275)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1043983">SUSE bug 1043983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048072">SUSE bug 1048072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055265">SUSE bug 1055265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056286">SUSE bug 1056286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056782">SUSE bug 1056782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058754">SUSE bug 1058754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058755">SUSE bug 1058755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058757">SUSE bug 1058757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062452">SUSE bug 1062452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069607">SUSE bug 1069607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069632">SUSE bug 1069632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073002">SUSE bug 1073002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078782">SUSE bug 1078782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082007">SUSE bug 1082007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082008">SUSE bug 1082008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082009">SUSE bug 1082009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082010">SUSE bug 1082010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082011">SUSE bug 1082011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082014">SUSE bug 1082014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082058">SUSE bug 1082058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087433">SUSE bug 1087433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087434">SUSE bug 1087434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087436">SUSE bug 1087436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087437">SUSE bug 1087437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087440">SUSE bug 1087440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087441">SUSE bug 1087441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112530">SUSE bug 1112530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112532">SUSE bug 1112532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130611">SUSE bug 1130611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130617">SUSE bug 1130617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130620">SUSE bug 1130620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130622">SUSE bug 1130622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130623">SUSE bug 1130623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130627">SUSE bug 1130627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152990">SUSE bug 1152990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152992">SUSE bug 1152992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152994">SUSE bug 1152994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152995">SUSE bug 1152995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171517">SUSE bug 1171517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172275">SUSE bug 1172275</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-9096/">CVE-2015-9096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-9096">CVE-2015-9096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2339/">CVE-2016-2339 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2339">CVE-2016-2339 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7798/">CVE-2016-7798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7798">CVE-2016-7798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0898/">CVE-2017-0898 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0898">CVE-2017-0898 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-0899/">CVE-2017-0899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0899">CVE-2017-0899 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-0900/">CVE-2017-0900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0900">CVE-2017-0900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-0901/">CVE-2017-0901 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0901">CVE-2017-0901 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0902/">CVE-2017-0902 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0902">CVE-2017-0902 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0903/">CVE-2017-0903 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0903">CVE-2017-0903 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10784/">CVE-2017-10784 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10784">CVE-2017-10784 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14033/">CVE-2017-14033 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14033">CVE-2017-14033 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14064/">CVE-2017-14064 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14064">CVE-2017-14064 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17405/">CVE-2017-17405 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17405">CVE-2017-17405 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17742/">CVE-2017-17742 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17742">CVE-2017-17742 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17790/">CVE-2017-17790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17790">CVE-2017-17790 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9228/">CVE-2017-9228 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9228">CVE-2017-9228 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9229/">CVE-2017-9229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9229">CVE-2017-9229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000073/">CVE-2018-1000073 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000073">CVE-2018-1000073 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000074/">CVE-2018-1000074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000074">CVE-2018-1000074 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000075/">CVE-2018-1000075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000075">CVE-2018-1000075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000076/">CVE-2018-1000076 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000076">CVE-2018-1000076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000077/">CVE-2018-1000077 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000077">CVE-2018-1000077 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000078/">CVE-2018-1000078 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000078">CVE-2018-1000078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000079/">CVE-2018-1000079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000079">CVE-2018-1000079 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16395/">CVE-2018-16395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16395">CVE-2018-16395 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16396/">CVE-2018-16396 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16396">CVE-2018-16396 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6914/">CVE-2018-6914 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6914">CVE-2018-6914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8777/">CVE-2018-8777 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8777">CVE-2018-8777 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8778/">CVE-2018-8778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8778">CVE-2018-8778 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8779/">CVE-2018-8779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8779">CVE-2018-8779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8780/">CVE-2018-8780 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8780">CVE-2018-8780 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-15845/">CVE-2019-15845 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15845">CVE-2019-15845 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16201/">CVE-2019-16201 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16201">CVE-2019-16201 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16254/">CVE-2019-16254 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16254">CVE-2019-16254 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-16255/">CVE-2019-16255 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16255">CVE-2019-16255 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8320/">CVE-2019-8320 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8320">CVE-2019-8320 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8321/">CVE-2019-8321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8321">CVE-2019-8321 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8322/">CVE-2019-8322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8322">CVE-2019-8322 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8323/">CVE-2019-8323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8323">CVE-2019-8323 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8324/">CVE-2019-8324 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8324">CVE-2019-8324 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8325/">CVE-2019-8325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8325">CVE-2019-8325 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556276" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556277" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556278" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151249" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk to version 7u261 fixes the following issues:

- CVE-2020-2756: Better mapping of serial ENUMs (bsc#1169511)
- CVE-2020-2757: Less Blocking Array Queues (bsc#1169511)
- CVE-2020-2773: Better signatures in XML (bsc#1169511)
- CVE-2020-2781: Improve TLS session handling (bsc#1169511)
- CVE-2020-2800: Better Headings for HTTP Servers (bsc#1169511)
- CVE-2020-2803: Enhance buffering of byte buffers (bsc#1169511)
- CVE-2020-2805: Enhance typing of methods (bsc#1169511)
- CVE-2020-2830: Better Scanner conversions (bsc#1169511)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2773">CVE-2020-2773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556279" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556280" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556281" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556282" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151250" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1159856" ref_url="https://bugzilla.suse.com/1159856" source="BUGZILLA"/>
		<reference ref_id="1159858" ref_url="https://bugzilla.suse.com/1159858" source="BUGZILLA"/>
		<reference ref_id="1159860" ref_url="https://bugzilla.suse.com/1159860" source="BUGZILLA"/>
		<reference ref_id="1160250" ref_url="https://bugzilla.suse.com/1160250" source="BUGZILLA"/>
		<reference ref_id="1160251" ref_url="https://bugzilla.suse.com/1160251" source="BUGZILLA"/>
		<reference ref_id="1160937" ref_url="https://bugzilla.suse.com/1160937" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15691" ref_url="https://www.suse.com/security/cve/CVE-2019-15691/" source="CVE"/>
		<reference ref_id="CVE-2019-15692" ref_url="https://www.suse.com/security/cve/CVE-2019-15692/" source="CVE"/>
		<reference ref_id="CVE-2019-15693" ref_url="https://www.suse.com/security/cve/CVE-2019-15693/" source="CVE"/>
		<reference ref_id="CVE-2019-15694" ref_url="https://www.suse.com/security/cve/CVE-2019-15694/" source="CVE"/>
		<reference ref_id="CVE-2019-15695" ref_url="https://www.suse.com/security/cve/CVE-2019-15695/" source="CVE"/>
		<description>
This update for tigervnc fixes the following issues:

- CVE-2019-15691: Fixed a use-after-return due to incorrect usage of stack memory in ZRLEDecoder (bsc#1159856).
- CVE-2019-15692: Fixed a heap-based buffer overflow in CopyRectDecode (bsc#1160250).
- CVE-2019-15693: Fixed a heap-based buffer overflow in TightDecoder::FilterGradient (bsc#1159858).
- CVE-2019-15694: Fixed a heap-based buffer overflow, caused by improper error handling in processing MemOutStream (bsc#1160251).
- CVE-2019-15695: Fixed a stack-based buffer overflow, which could be triggered from CMsgReader::readSetCursor (bsc#1159860).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159856">SUSE bug 1159856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159858">SUSE bug 1159858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159860">SUSE bug 1159860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160250">SUSE bug 1160250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160251">SUSE bug 1160251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160937">SUSE bug 1160937</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15691/">CVE-2019-15691 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15691">CVE-2019-15691 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15692/">CVE-2019-15692 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15692">CVE-2019-15692 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15693/">CVE-2019-15693 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15693">CVE-2019-15693 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15694/">CVE-2019-15694 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15694">CVE-2019-15694 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15695/">CVE-2019-15695 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15695">CVE-2019-15695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556283" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556284" comment="tigervnc-1.6.0-18.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556285" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151251" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1156353" ref_url="https://bugzilla.suse.com/1156353" source="BUGZILLA"/>
		<reference ref_id="1172466" ref_url="https://bugzilla.suse.com/1172466" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)
  
This update contains security mitigations for:

- CVE-2020-0543: Fixed a side channel attack against special registers
  which could have resulted in leaking of read values to cores other
  than the one which called it.  This attack is known as Special Register
  Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to
  mitigate the Vector Register and L1D Eviction Sampling aka 'CacheOutAttack'
  attacks. (bsc#1156353)

Microcode Table:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  HSW          C0       6-3c-3/32 00000027-&gt;00000028 Core Gen4
  BDW-U/Y      E0/F0    6-3d-4/c0 0000002e-&gt;0000002f Core Gen5
  HSW-U        C0/D0    6-45-1/72 00000025-&gt;00000026 Core Gen4
  HSW-H        C0       6-46-1/32 0000001b-&gt;0000001c Core Gen4
  BDW-H/E3     E0/G0    6-47-1/22 00000021-&gt;00000022 Core Gen5
  SKL-U/Y      D0       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKL-U23e     K1       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKX-SP       B1       6-55-3/97 01000151-&gt;01000157 Xeon Scalable
  SKX-SP       H0/M0/U0 6-55-4/b7 02000065-&gt;02006906 Xeon Scalable
  SKX-D        M1       6-55-4/b7 02000065-&gt;02006906 Xeon D-21xx
  CLX-SP       B0       6-55-6/bf 0400002c-&gt;04002f01 Xeon Scalable Gen2
  CLX-SP       B1       6-55-7/bf 0500002c-&gt;04002f01 Xeon Scalable Gen2
  SKL-H/S      R0/N0    6-5e-3/36 000000d6-&gt;000000dc Core Gen6; Xeon E3 v5
  AML-Y22      H0       6-8e-9/10 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-U/Y      H0       6-8e-9/c0 000000ca-&gt;000000d6 Core Gen7 Mobile
  CFL-U43e     D0       6-8e-a/c0 000000ca-&gt;000000d6 Core Gen8 Mobile
  WHL-U        W0       6-8e-b/d0 000000ca-&gt;000000d6 Core Gen8 Mobile
  AML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  CML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  WHL-U        V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-G/H/S/E3 B0       6-9e-9/2a 000000ca-&gt;000000d6 Core Gen7; Xeon E3 v6
  CFL-H/S/E3   U0       6-9e-a/22 000000ca-&gt;000000d6 Core Gen8 Desktop, Mobile, Xeon E
  CFL-S        B0       6-9e-b/02 000000ca-&gt;000000d6 Core Gen8
  CFL-H/S      P0       6-9e-c/22 000000ca-&gt;000000d6 Core Gen9
  CFL-H        R0       6-9e-d/22 000000ca-&gt;000000d6 Core Gen9 Mobile

Also contains the Intel CPU Microcode update to 20200520:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061f-&gt;00000621 Xeon E3/E5, Core X
  SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000718-&gt;0000071a Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172466">SUSE bug 1172466</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0548">CVE-2020-0548 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0549">CVE-2020-0549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531024" comment="ucode-intel-20200602-13.68.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151252" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1161951" ref_url="https://bugzilla.suse.com/1161951" source="BUGZILLA"/>
		<reference ref_id="1164871" ref_url="https://bugzilla.suse.com/1164871" source="BUGZILLA"/>
		<reference ref_id="1169025" ref_url="https://bugzilla.suse.com/1169025" source="BUGZILLA"/>
		<reference ref_id="1169625" ref_url="https://bugzilla.suse.com/1169625" source="BUGZILLA"/>
		<reference ref_id="1170383" ref_url="https://bugzilla.suse.com/1170383" source="BUGZILLA"/>
		<reference ref_id="1170618" ref_url="https://bugzilla.suse.com/1170618" source="BUGZILLA"/>
		<reference ref_id="1170620" ref_url="https://bugzilla.suse.com/1170620" source="BUGZILLA"/>
		<reference ref_id="1171098" ref_url="https://bugzilla.suse.com/1171098" source="BUGZILLA"/>
		<reference ref_id="1171195" ref_url="https://bugzilla.suse.com/1171195" source="BUGZILLA"/>
		<reference ref_id="1171202" ref_url="https://bugzilla.suse.com/1171202" source="BUGZILLA"/>
		<reference ref_id="1171218" ref_url="https://bugzilla.suse.com/1171218" source="BUGZILLA"/>
		<reference ref_id="1171219" ref_url="https://bugzilla.suse.com/1171219" source="BUGZILLA"/>
		<reference ref_id="1171689" ref_url="https://bugzilla.suse.com/1171689" source="BUGZILLA"/>
		<reference ref_id="1171698" ref_url="https://bugzilla.suse.com/1171698" source="BUGZILLA"/>
		<reference ref_id="1172032" ref_url="https://bugzilla.suse.com/1172032" source="BUGZILLA"/>
		<reference ref_id="1172221" ref_url="https://bugzilla.suse.com/1172221" source="BUGZILLA"/>
		<reference ref_id="1172317" ref_url="https://bugzilla.suse.com/1172317" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="CVE-2020-12114" ref_url="https://www.suse.com/security/cve/CVE-2020-12114/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
  This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12114: Fixed A pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).

The following non-security bugs were fixed:

- can, slip: Protect tty-&gt;disc_data in write_wakeup and close with RCU (bsc#1171698).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).
- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).
- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).
- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).
- Drivers: hv: vmbus: Make panic reporting to be more useful (bsc#1170618).
- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).
- EDAC: Convert to new X86 CPU match macros
- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).
- ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).
- KEYS: reaching the keys quotas correctly (bsc#1171689).
- NFS: Cleanup if nfs_match_client is interrupted (bsc#1169025).
- NFS: Fix a double unlock from nfs_match,get_client (bsc#1169025).
- NFS: make nfs_match_client killable (bsc#1169025).
- NFS: Unlock requests must never fail (bsc#1172032).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (bsc#1161951 ltc#183551).
- scsi: ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).
- x86/dumpstack/64: Handle faults when printing the 'Stack: ' part of an OOPS (bsc#1170383).
- x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170620).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).
- x86: hyperv: report value of misc_features (git fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161951">SUSE bug 1161951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164871">SUSE bug 1164871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169025">SUSE bug 1169025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169625">SUSE bug 1169625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170383">SUSE bug 1170383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170618">SUSE bug 1170618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170620">SUSE bug 1170620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171098">SUSE bug 1171098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171195">SUSE bug 1171195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171202">SUSE bug 1171202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171218">SUSE bug 1171218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171689">SUSE bug 1171689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171698">SUSE bug 1171698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172032">SUSE bug 1172032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172221">SUSE bug 1172221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172317">SUSE bug 1172317</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12114/">CVE-2020-12114 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12114">CVE-2020-12114 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12652">CVE-2020-12652 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12656">CVE-2020-12656 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556286" comment="kernel-default-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556287" comment="kernel-default-base-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556288" comment="kernel-default-devel-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556289" comment="kernel-default-kgraft-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538432" comment="kernel-devel-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538433" comment="kernel-macros-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538434" comment="kernel-source-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556290" comment="kernel-syms-4.4.180-94.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556291" comment="kgraft-patch-4_4_180-94_121-default-1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151253" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1159478" ref_url="https://bugzilla.suse.com/1159478" source="BUGZILLA"/>
		<reference ref_id="1159479" ref_url="https://bugzilla.suse.com/1159479" source="BUGZILLA"/>
		<reference ref_id="1159482" ref_url="https://bugzilla.suse.com/1159482" source="BUGZILLA"/>
		<reference ref_id="1159486" ref_url="https://bugzilla.suse.com/1159486" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18388" ref_url="https://www.suse.com/security/cve/CVE-2019-18388/" source="CVE"/>
		<reference ref_id="CVE-2019-18389" ref_url="https://www.suse.com/security/cve/CVE-2019-18389/" source="CVE"/>
		<reference ref_id="CVE-2019-18390" ref_url="https://www.suse.com/security/cve/CVE-2019-18390/" source="CVE"/>
		<reference ref_id="CVE-2019-18391" ref_url="https://www.suse.com/security/cve/CVE-2019-18391/" source="CVE"/>
		<description>
This update for virglrenderer fixes the following issues:

- CVE-2019-18388: Fixed a null pointer dereference which could have led
   to denial of service (bsc#1159479).
- CVE-2019-18390: Fixed an out of bound read which could have led to
  denial of service (bsc#1159478).
- CVE-2019-18389: Fixed a heap buffer overflow which could have led to
  guest escape or denial of service (bsc#1159482).
- CVE-2019-18391: Fixed a heap based buffer overflow which could have led to
  guest escape or denial of service (bsc#1159486).  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159478">SUSE bug 1159478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159479">SUSE bug 1159479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159482">SUSE bug 1159482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159486">SUSE bug 1159486</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18388/">CVE-2019-18388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18388">CVE-2019-18388 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18389/">CVE-2019-18389 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18389">CVE-2019-18389 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18390/">CVE-2019-18390 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18390">CVE-2019-18390 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18391/">CVE-2019-18391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18391">CVE-2019-18391 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556292" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151254" version="1" class="patch">
	<metadata>
		<title>Security update for adns (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1172265" ref_url="https://bugzilla.suse.com/1172265" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9103" ref_url="https://www.suse.com/security/cve/CVE-2017-9103/" source="CVE"/>
		<reference ref_id="CVE-2017-9104" ref_url="https://www.suse.com/security/cve/CVE-2017-9104/" source="CVE"/>
		<reference ref_id="CVE-2017-9105" ref_url="https://www.suse.com/security/cve/CVE-2017-9105/" source="CVE"/>
		<reference ref_id="CVE-2017-9106" ref_url="https://www.suse.com/security/cve/CVE-2017-9106/" source="CVE"/>
		<reference ref_id="CVE-2017-9107" ref_url="https://www.suse.com/security/cve/CVE-2017-9107/" source="CVE"/>
		<reference ref_id="CVE-2017-9108" ref_url="https://www.suse.com/security/cve/CVE-2017-9108/" source="CVE"/>
		<reference ref_id="CVE-2017-9109" ref_url="https://www.suse.com/security/cve/CVE-2017-9109/" source="CVE"/>
		<description>
This update for adns fixes the following issues:
	  
- CVE-2017-9103,CVE-2017-9104,CVE-2017-9105,CVE-2017-9109: Fixed an issue in local recursive resolver
  which could have led to remote code execution (bsc#1172265).
- CVE-2017-9106: Fixed an issue with upstream DNS data sources which could have led to denial of 
  service (bsc#1172265).
- CVE-2017-9107: Fixed an issue when quering domain names which could have led to denial of service (bsc#1172265).
- CVE-2017-9108: Fixed an issue which could have led to denial of service (bsc#1172265).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-12"/>
	<updated date="2020-06-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9103/">CVE-2017-9103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9103">CVE-2017-9103 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9104/">CVE-2017-9104 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9104">CVE-2017-9104 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9105/">CVE-2017-9105 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9105">CVE-2017-9105 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9106/">CVE-2017-9106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9106">CVE-2017-9106 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9107/">CVE-2017-9107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9107">CVE-2017-9107 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9108/">CVE-2017-9108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9108">CVE-2017-9108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9109/">CVE-2017-9109 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9109">CVE-2017-9109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556293" comment="libadns1-1.4-103.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151255" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1157888" ref_url="https://bugzilla.suse.com/1157888" source="BUGZILLA"/>
		<reference ref_id="1158003" ref_url="https://bugzilla.suse.com/1158003" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1158007" ref_url="https://bugzilla.suse.com/1158007" source="BUGZILLA"/>
		<reference ref_id="1161181" ref_url="https://bugzilla.suse.com/1161181" source="BUGZILLA"/>
		<reference ref_id="1167152" ref_url="https://bugzilla.suse.com/1167152" source="BUGZILLA"/>
		<reference ref_id="1168140" ref_url="https://bugzilla.suse.com/1168140" source="BUGZILLA"/>
		<reference ref_id="1168142" ref_url="https://bugzilla.suse.com/1168142" source="BUGZILLA"/>
		<reference ref_id="1169392" ref_url="https://bugzilla.suse.com/1169392" source="BUGZILLA"/>
		<reference ref_id="1172205" ref_url="https://bugzilla.suse.com/1172205" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19581" ref_url="https://www.suse.com/security/cve/CVE-2019-19581/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-11739" ref_url="https://www.suse.com/security/cve/CVE-2020-11739/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742/" source="CVE"/>
		<reference ref_id="CVE-2020-7211" ref_url="https://www.suse.com/security/cve/CVE-2020-7211/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
  This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1172205).
- CVE-2020-11742: Bad continuation handling in GNTTABOP_copy (bsc#1169392).
- CVE-2020-11740, CVE-2020-11741: xen: XSA-313 multiple xenoprof issues (bsc#1168140).
- CVE-2020-11739: Missing memory barriers in read-write unlock paths (bsc#1168142).
- CVE-2019-19583: Fixed improper checks which could have allowed HVM/PVH guest userspace code to crash the guest, leading to a guest denial of service (bsc#1158004 XSA-308).
- CVE-2019-19581: Fixed a potential out of bounds on 32-bit Arm (bsc#1158003 XSA-307).
- CVE-2019-19580: Fixed a privilege escalation where a malicious PV guest administrator could have been able to escalate their privilege to that of the host (bsc#1158006 XSA-310).
- CVE-2019-19579: Fixed a privilege escalation where an untrusted domain with access to a physical device can DMA into host memory (bsc#1157888 XSA-306).
- CVE-2019-19578: Fixed an issue where a malicious or buggy PV guest could have caused hypervisor crash resulting in denial of service affecting the entire host (bsc#1158005 XSA-309).
- CVE-2019-19577: Fixed an issue where a malicious guest administrator could have caused Xen to access data structures while they are being modified leading to a crash (bsc#1158007 XSA-311). 
- Xenstored Crashed during VM install (bsc#1167152)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-16"/>
	<updated date="2020-06-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161181">SUSE bug 1161181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167152">SUSE bug 1167152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168142">SUSE bug 1168142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19577">CVE-2019-19577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19578">CVE-2019-19578 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19579">CVE-2019-19579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19580">CVE-2019-19580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19581/">CVE-2019-19581 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19581">CVE-2019-19581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19583">CVE-2019-19583 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11739/">CVE-2020-11739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11739">CVE-2020-11739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11740">CVE-2020-11740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11741">CVE-2020-11741 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11742">CVE-2020-11742 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7211/">CVE-2020-7211 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7211">CVE-2020-7211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538437" comment="xen-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538438" comment="xen-doc-html-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538439" comment="xen-libs-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538440" comment="xen-libs-32bit-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538441" comment="xen-tools-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538442" comment="xen-tools-domU-4.9.4_06-3.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151256" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1102840" ref_url="https://bugzilla.suse.com/1102840" source="BUGZILLA"/>
		<reference ref_id="1160039" ref_url="https://bugzilla.suse.com/1160039" source="BUGZILLA"/>
		<reference ref_id="1170601" ref_url="https://bugzilla.suse.com/1170601" source="BUGZILLA"/>
		<reference ref_id="1171863" ref_url="https://bugzilla.suse.com/1171863" source="BUGZILLA"/>
		<reference ref_id="1171864" ref_url="https://bugzilla.suse.com/1171864" source="BUGZILLA"/>
		<reference ref_id="1171866" ref_url="https://bugzilla.suse.com/1171866" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543/" source="CVE"/>
		<reference ref_id="CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878/" source="CVE"/>
		<reference ref_id="CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723/" source="CVE"/>
		<description>
This update for perl fixes the following issues:

- CVE-2020-10543: Fixed a heap buffer overflow in regular expression compiler which could have 
  allowed overwriting of allocated memory with attacker's data (bsc#1171863).
- CVE-2020-10878: Fixed multiple integer overflows which could have allowed the insertion of 
  instructions into the compiled form of Perl regular expression (bsc#1171864).
- CVE-2020-12723: Fixed an attacker's corruption of the intermediate language state of a 
  compiled regular expression (bsc#1171866).
- Fixed utf8 handling in perldoc by useing 'term' instead of 'man' (bsc#1170601).
- Some packages make assumptions about the date and time they are built. 
  This update will solve the issues caused by calling the perl function timelocal
  expressing the year with two digit only instead of four digits. (bsc#1102840) (bsc#1160039)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-18"/>
	<updated date="2020-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102840">SUSE bug 1102840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160039">SUSE bug 1160039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170601">SUSE bug 1170601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171863">SUSE bug 1171863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171864">SUSE bug 1171864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171866">SUSE bug 1171866</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10543">CVE-2020-10543 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10878">CVE-2020-10878 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12723">CVE-2020-12723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556294" comment="perl-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531035" comment="perl-32bit-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556295" comment="perl-base-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531037" comment="perl-doc-5.18.2-12.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151257" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 65 (bsc#1172277 and bsc#1169511)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531038" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531040" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531041" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151258" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

java-1_8_0-ibm was updated to Java 8.0 Service Refresh 6 Fix Pack 10 (bsc#1172277,bsc#1169511,bsc#1160968)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2754: Forwarded references to Nashorn 
- CVE-2020-2755: Improved Nashorn matching 
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
- CVE-2019-2949: Fixed an issue which could have resulted in unauthorized access to critical data 
- Added RSA PSS SUPPORT TO IBMPKCS11IMPL
- The pack200 and unpack200 alternatives should be slaves of java (bsc#1171352).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2949">CVE-2019-2949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2754">CVE-2020-2754 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2755">CVE-2020-2755 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531043" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531045" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151259" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1160398" ref_url="https://bugzilla.suse.com/1160398" source="BUGZILLA"/>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk to version jdk8u252 fixes the following issues:

- CVE-2020-2754: Forward references to Nashorn (bsc#1169511)
- CVE-2020-2755: Improve Nashorn matching (bsc#1169511)
- CVE-2020-2756: Better mapping of serial ENUMs (bsc#1169511)
- CVE-2020-2757: Less Blocking Array Queues (bsc#1169511)
- CVE-2020-2773: Better signatures in XML (bsc#1169511)
- CVE-2020-2781: Improve TLS session handling (bsc#1169511)
- CVE-2020-2800: Better Headings for HTTP Servers (bsc#1169511)
- CVE-2020-2803: Enhance buffering of byte buffers (bsc#1169511)
- CVE-2020-2805: Enhance typing of methods (bsc#1169511)
- CVE-2020-2830: Better Scanner conversions (bsc#1169511)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160398">SUSE bug 1160398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2754">CVE-2020-2754 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2755">CVE-2020-2755 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2773">CVE-2020-2773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556296" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556297" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556298" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556299" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151260" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1172049" ref_url="https://bugzilla.suse.com/1172049" source="BUGZILLA"/>
		<reference ref_id="1172781" ref_url="https://bugzilla.suse.com/1172781" source="BUGZILLA"/>
		<reference ref_id="1172782" ref_url="https://bugzilla.suse.com/1172782" source="BUGZILLA"/>
		<reference ref_id="1172783" ref_url="https://bugzilla.suse.com/1172783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766/" source="CVE"/>
		<reference ref_id="CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767/" source="CVE"/>
		<reference ref_id="CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-10768: Fixed an issue with the prctl() function which could have allowed indirect branch speculation even after it has been disabled (bsc#1172783).
- CVE-2020-10767: Fixed an issue where the Indirect Branch Prediction Barrier (IBPB) would have been disabled when STIBP is unavailable or enhanced IBRS is available making the system vulnerable to spectre v2 (bsc#1172782).
- CVE-2020-10766: Fixed an issue with Linux scheduler which could have allowed an attacker to turn off the SSBD protection (bsc#1172781).

- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1172049).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-23"/>
	<updated date="2020-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172049">SUSE bug 1172049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10766">CVE-2020-10766 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10767">CVE-2020-10767 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10768">CVE-2020-10768 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556300" comment="kernel-default-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556301" comment="kernel-default-base-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556302" comment="kernel-default-devel-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556303" comment="kernel-default-kgraft-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538447" comment="kernel-devel-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538448" comment="kernel-macros-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538449" comment="kernel-source-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556304" comment="kernel-syms-4.4.180-94.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556305" comment="kgraft-patch-4_4_180-94_124-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151261" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1173027" ref_url="https://bugzilla.suse.com/1173027" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious server to overwrite a local file when using the -J option (bsc#1173027).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-24"/>
	<updated date="2020-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8177">CVE-2020-8177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556306" comment="curl-7.37.0-37.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556307" comment="libcurl4-7.37.0-37.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531053" comment="libcurl4-32bit-7.37.0-37.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151262" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1126230" ref_url="https://bugzilla.suse.com/1126230" source="BUGZILLA"/>
		<reference ref_id="1136082" ref_url="https://bugzilla.suse.com/1136082" source="BUGZILLA"/>
		<reference ref_id="1157607" ref_url="https://bugzilla.suse.com/1157607" source="BUGZILLA"/>
		<reference ref_id="1161096" ref_url="https://bugzilla.suse.com/1161096" source="BUGZILLA"/>
		<reference ref_id="1162553" ref_url="https://bugzilla.suse.com/1162553" source="BUGZILLA"/>
		<reference ref_id="1171670" ref_url="https://bugzilla.suse.com/1171670" source="BUGZILLA"/>
		<reference ref_id="1171921" ref_url="https://bugzilla.suse.com/1171921" source="BUGZILLA"/>
		<reference ref_id="1171960" ref_url="https://bugzilla.suse.com/1171960" source="BUGZILLA"/>
		<reference ref_id="1171961" ref_url="https://bugzilla.suse.com/1171961" source="BUGZILLA"/>
		<reference ref_id="1171963" ref_url="https://bugzilla.suse.com/1171963" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10753" ref_url="https://www.suse.com/security/cve/CVE-2020-10753/" source="CVE"/>
		<description>
This is a version update for ceph to version 12.2.13:

Security issue fixed: 	  

- CVE-2020-10753: Fixed an HTTP header injection via CORS ExposeHeader tag (bsc#1171921).

- Notable changes in this update for ceph:
  * mgr: telemetry: backported and now available on SES5.5. Please
    consider enabling via 'ceph telemetry on' (bsc#1171670)
  * OSD heartbeat ping time: new health warning, options and admin
    commands (bsc#1171960)
  * 'osd_calc_pg_upmaps_max_stddev' ceph.conf parameter has been
    removed; use 'upmap_max_deviation' instead (bsc#1171961)
  * Default maximum concurrent bluestore rocksdb compaction threads
    raised from 1 to 2 for improved ability to keep up with rgw
    bucket index workloads (bsc#1171963)

- Bug fixes in this ceph update:
  * mon: Error message displayed when mon_osd_max_split_count would be
    exceeded is not as user-friendly as it could be (bsc#1126230)
  * ceph_volume_client: remove ceph mds calls in favor of ceph fs
    calls (bsc#1136082)
  * rgw: crypt: permit RGW-AUTO/default with SSE-S3 headers
    (bsc#1157607)
  * mon/AuthMonitor: don't validate fs caps on authorize (bsc#1161096)

- Additional bug fixes:
  * ceph-volume: strip _dmcrypt suffix in simple scan json output (bsc#1162553)		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-25"/>
	<updated date="2020-06-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1126230">SUSE bug 1126230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136082">SUSE bug 1136082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157607">SUSE bug 1157607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161096">SUSE bug 1161096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162553">SUSE bug 1162553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171670">SUSE bug 1171670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171921">SUSE bug 1171921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171960">SUSE bug 1171960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171961">SUSE bug 1171961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171963">SUSE bug 1171963</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10753/">CVE-2020-10753 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10753">CVE-2020-10753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556308" comment="ceph-common-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556309" comment="libcephfs2-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556310" comment="librados2-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556311" comment="libradosstriper1-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556312" comment="librbd1-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556313" comment="librgw2-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556314" comment="python-cephfs-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556315" comment="python-rados-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556316" comment="python-rbd-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556317" comment="python-rgw-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151263" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="1172437" ref_url="https://bugzilla.suse.com/1172437" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_116 fixes several issues.

The following security issues were fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171252).
- CVE-2020-1749: Fixed an issue where some ipv6 protocols were not encrypted over ipsec tunnel (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721281" comment="kernel-default 4.4.180-94.116 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719610" comment="kgraft-patch-4_4_180-94_116-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556318" comment="kgraft-patch-4_4_180-94_116-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151264" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1172437" ref_url="https://bugzilla.suse.com/1172437" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_113 fixes one issue.

The following security issue was fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721279" comment="kernel-default 4.4.180-94.113 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719606" comment="kgraft-patch-4_4_180-94_113-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556319" comment="kgraft-patch-4_4_180-94_113-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151265" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1172437" ref_url="https://bugzilla.suse.com/1172437" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_107 fixes one issue.

The following security issue was fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721280" comment="kernel-default 4.4.180-94.107 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719608" comment="kgraft-patch-4_4_180-94_107-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556320" comment="kgraft-patch-4_4_180-94_107-default-6-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151266" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1172140" ref_url="https://bugzilla.suse.com/1172140" source="BUGZILLA"/>
		<reference ref_id="1172437" ref_url="https://bugzilla.suse.com/1172437" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_103 fixes several issues.

The following security issues were fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
- CVE-2019-15666: Fixed an out of bounds read __xfrm_policy_unlink, which could have led to denial of service (bsc#1172140).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172140">SUSE bug 1172140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15666">CVE-2019-15666 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721277" comment="kernel-default 4.4.180-94.103 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719602" comment="kgraft-patch-4_4_180-94_103-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556321" comment="kgraft-patch-4_4_180-94_103-default-8-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151267" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1172140" ref_url="https://bugzilla.suse.com/1172140" source="BUGZILLA"/>
		<reference ref_id="1172437" ref_url="https://bugzilla.suse.com/1172437" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_100 fixes several issues.

The following security issues were fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
- CVE-2019-15666: Fixed an out of bounds read __xfrm_policy_unlink, which could have led to denial of service (bsc#1172140).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172140">SUSE bug 1172140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15666">CVE-2019-15666 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721278" comment="kernel-default 4.4.180-94.100 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719604" comment="kgraft-patch-4_4_180-94_100-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556322" comment="kgraft-patch-4_4_180-94_100-default-8-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151268" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1172140" ref_url="https://bugzilla.suse.com/1172140" source="BUGZILLA"/>
		<reference ref_id="1172437" ref_url="https://bugzilla.suse.com/1172437" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_97 fixes several issues.

The following security issues were fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
- CVE-2019-15666: Fixed an out of bounds read __xfrm_policy_unlink, which could have led to denial of service (bsc#1172140).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172140">SUSE bug 1172140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15666">CVE-2019-15666 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721153" comment="kernel-default 4.4.180-94.97 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719420" comment="kgraft-patch-4_4_180-94_97-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556323" comment="kgraft-patch-4_4_180-94_97-default-10-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151269" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1172405" ref_url="https://bugzilla.suse.com/1172405" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8022" ref_url="https://www.suse.com/security/cve/CVE-2020-8022/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-8022: Fixed a local root exploit due to improper permissions (bsc#1172405)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172405">SUSE bug 1172405</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8022/">CVE-2020-8022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8022">CVE-2020-8022 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531054" comment="tomcat-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531055" comment="tomcat-admin-webapps-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531056" comment="tomcat-docs-webapp-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531057" comment="tomcat-el-3_0-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531058" comment="tomcat-javadoc-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531059" comment="tomcat-jsp-2_3-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531060" comment="tomcat-lib-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531061" comment="tomcat-servlet-3_1-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531062" comment="tomcat-webapps-8.0.53-29.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151270" version="1" class="patch">
	<metadata>
		<title>Security update for python3-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1054413" ref_url="https://bugzilla.suse.com/1054413" source="BUGZILLA"/>
		<reference ref_id="1073879" ref_url="https://bugzilla.suse.com/1073879" source="BUGZILLA"/>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="1122668" ref_url="https://bugzilla.suse.com/1122668" source="BUGZILLA"/>
		<reference ref_id="761500" ref_url="https://bugzilla.suse.com/761500" source="BUGZILLA"/>
		<reference ref_id="922448" ref_url="https://bugzilla.suse.com/922448" source="BUGZILLA"/>
		<reference ref_id="929736" ref_url="https://bugzilla.suse.com/929736" source="BUGZILLA"/>
		<reference ref_id="935252" ref_url="https://bugzilla.suse.com/935252" source="BUGZILLA"/>
		<reference ref_id="945455" ref_url="https://bugzilla.suse.com/945455" source="BUGZILLA"/>
		<reference ref_id="947357" ref_url="https://bugzilla.suse.com/947357" source="BUGZILLA"/>
		<reference ref_id="961596" ref_url="https://bugzilla.suse.com/961596" source="BUGZILLA"/>
		<reference ref_id="967128" ref_url="https://bugzilla.suse.com/967128" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<description>
This update for python3-requests provides the following fix:

python-requests was updated to 2.20.1.

Update to version 2.20.1:

* Fixed bug with unintended Authorization header stripping for
  redirects using default ports (http/80, https/443).

Update to version 2.20.0:

* Bugfixes

  + Content-Type header parsing is now case-insensitive
    (e.g. charset=utf8 v Charset=utf8).
  + Fixed exception leak where certain redirect urls would raise
    uncaught urllib3 exceptions.
  + Requests removes Authorization header from requests redirected
    from https to http on the same hostname. (CVE-2018-18074)
  + should_bypass_proxies now handles URIs without hostnames
    (e.g. files).

Update to version 2.19.1:

* Fixed issue where status_codes.py’s init function failed trying
  to append to a __doc__ value of None.

Update to version 2.19.0:

* Improvements

  + Warn about possible slowdown with cryptography version &lt; 1.3.4
  + Check host in proxy URL, before forwarding request to adapter.
  + Maintain fragments properly across redirects. (RFC7231 7.1.2)
  + Removed use of cgi module to expedite library load time.
  + Added support for SHA-256 and SHA-512 digest auth algorithms.
  + Minor performance improvement to Request.content.

* Bugfixes

  + Parsing empty Link headers with parse_header_links() no longer
    return one bogus entry.
  + Fixed issue where loading the default certificate bundle from
    a zip archive would raise an IOError.
  + Fixed issue with unexpected ImportError on windows system
    which do not support winreg module.
  + DNS resolution in proxy bypass no longer includes the username
    and password in the request. This also fixes the issue of DNS
    queries failing on macOS.
  + Properly normalize adapter prefixes for url comparison.
  + Passing None as a file pointer to the files param no longer
    raises an exception.
  + Calling copy on a RequestsCookieJar will now preserve the
    cookie policy correctly.

Update to version 2.18.4:

* Improvements

  + Error messages for invalid headers now include the header name
    for easier debugging

Update to version 2.18.3:

* Improvements
  + Running $ python -m requests.help now includes the installed
    version of idna.
* Bugfixes
  + Fixed issue where Requests would raise ConnectionError instead
    of SSLError when encountering SSL problems when using urllib3
    v1.22.

- Add ca-certificates (and ca-certificates-mozilla) to dependencies, otherwise https
  connections will fail.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054413">SUSE bug 1054413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073879">SUSE bug 1073879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122668">SUSE bug 1122668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761500">SUSE bug 761500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922448">SUSE bug 922448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929736">SUSE bug 929736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935252">SUSE bug 935252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945455">SUSE bug 945455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947357">SUSE bug 947357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961596">SUSE bug 961596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967128">SUSE bug 967128</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2296">CVE-2015-2296 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009525269" comment="python3-certifi-2018.4.16-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525270" comment="python3-chardet-3.0.4-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531063" comment="python3-requests-2.20.1-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525271" comment="python3-urllib3-1.22-3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151271" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1172906" ref_url="https://bugzilla.suse.com/1172906" source="BUGZILLA"/>
		<reference ref_id="1172935" ref_url="https://bugzilla.suse.com/1172935" source="BUGZILLA"/>
		<reference ref_id="1173197" ref_url="https://bugzilla.suse.com/1173197" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093/" source="CVE"/>
		<reference ref_id="CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154/" source="CVE"/>
		<reference ref_id="CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-14954: Fixed a response injection due to a STARTTLS buffering issue which was
  affecting IMAP, SMTP, and POP3 (bsc#1173197).
- CVE-2020-14093: Fixed a potential IMAP Man-in-the-Middle attack via a PREAUTH response (bsc#1172906, bsc#1172935).
- CVE-2020-14154: Fixed an issue where Mutt was ignoring an expired certificate and was
  proceeding with a connection (bsc#1172906, bsc#1172935).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-29"/>
	<updated date="2020-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173197">SUSE bug 1173197</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14093">CVE-2020-14093 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14154">CVE-2020-14154 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14954">CVE-2020-14954 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556324" comment="mutt-1.10.1-55.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151272" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1167373" ref_url="https://bugzilla.suse.com/1167373" source="BUGZILLA"/>
		<reference ref_id="1173304" ref_url="https://bugzilla.suse.com/1173304" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860/" source="CVE"/>
		<reference ref_id="CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-14059: Fixed an issue where a client could potentially deny the service of a server 
  during TLS Handshake (bsc#1173304).
- CVE-2019-18860: Fixed handling of invalid domain names in cachemgr.cgi (bsc#1167373).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167373">SUSE bug 1167373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173304">SUSE bug 1173304</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18860">CVE-2019-18860 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14059">CVE-2020-14059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556325" comment="squid-3.5.21-26.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151273" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1169740" ref_url="https://bugzilla.suse.com/1169740" source="BUGZILLA"/>
		<reference ref_id="1171355" ref_url="https://bugzilla.suse.com/1171355" source="BUGZILLA"/>
		<reference ref_id="1172651" ref_url="https://bugzilla.suse.com/1172651" source="BUGZILLA"/>
		<reference ref_id="1173334" ref_url="https://bugzilla.suse.com/1173334" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8956" ref_url="https://www.suse.com/security/cve/CVE-2018-8956/" source="CVE"/>
		<reference ref_id="CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868/" source="CVE"/>
		<reference ref_id="CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817/" source="CVE"/>
		<reference ref_id="CVE-2020-15025" ref_url="https://www.suse.com/security/cve/CVE-2020-15025/" source="CVE"/>
		<description>
This update for ntp fixes the following issues:

ntp was updated to 4.2.8p15

- CVE-2020-11868: Fixed an issue which a server mode packet with spoofed source address 
  frequently send to the client ntpd could have caused denial of service (bsc#1169740).
- CVE-2018-8956: Fixed an issue which could have allowed remote attackers to prevent 
  a broadcast client from synchronizing its clock with a broadcast NTP server via spoofed 
  mode 3 and mode 5 packets (bsc#1171355).
- CVE-2020-13817: Fixed an issue which an off-path attacker with the ability to query time 
  from victim's ntpd instance could have modified the victim's clock by a limited amount (bsc#1172651).
- CVE-2020-15025: Fixed an issue which remote attacker could have caused denial of service by consuming 
  the memory when a CMAC key was used andassociated with a CMAC algorithm in the ntp.keys (bsc#1173334).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169740">SUSE bug 1169740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171355">SUSE bug 1171355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172651">SUSE bug 1172651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173334">SUSE bug 1173334</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8956/">CVE-2018-8956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8956">CVE-2018-8956 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11868">CVE-2020-11868 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13817">CVE-2020-13817 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15025/">CVE-2020-15025 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15025">CVE-2020-15025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556326" comment="ntp-4.2.8p15-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556327" comment="ntp-doc-4.2.8p15-88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151274" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_97 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721153" comment="kernel-default 4.4.180-94.97 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719420" comment="kgraft-patch-4_4_180-94_97-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556328" comment="kgraft-patch-4_4_180-94_97-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151275" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="1168669" ref_url="https://bugzilla.suse.com/1168669" source="BUGZILLA"/>
		<reference ref_id="1169746" ref_url="https://bugzilla.suse.com/1169746" source="BUGZILLA"/>
		<reference ref_id="1170908" ref_url="https://bugzilla.suse.com/1170908" source="BUGZILLA"/>
		<reference ref_id="1171978" ref_url="https://bugzilla.suse.com/1171978" source="BUGZILLA"/>
		<reference ref_id="1173022" ref_url="https://bugzilla.suse.com/1173022" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to version 3.53.1

- CVE-2020-12402: Fixed a potential side channel attack during RSA key generation (bsc#1173032).
- CVE-2020-12399: Fixed a timing attack on DSA signature generation (bsc#1171978).
- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- Fixed various FIPS issues in libfreebl3 which were causing segfaults in the test suite of chrony (bsc#1168669).
- Fixed an issue where Firefox tab was crashing (bsc#1170908).

Release notes: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes

mozilla-nspr to version 4.25
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-03"/>
	<updated date="2020-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168669">SUSE bug 1168669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169746">SUSE bug 1169746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170908">SUSE bug 1170908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171978">SUSE bug 1171978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173022">SUSE bug 1173022</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17006">CVE-2019-17006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12399">CVE-2020-12399 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556329" comment="libfreebl3-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531069" comment="libfreebl3-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556330" comment="libfreebl3-hmac-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531071" comment="libfreebl3-hmac-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556331" comment="libsoftokn3-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531073" comment="libsoftokn3-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556332" comment="libsoftokn3-hmac-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531075" comment="libsoftokn3-hmac-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556333" comment="mozilla-nspr-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531077" comment="mozilla-nspr-32bit-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556334" comment="mozilla-nspr-devel-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556335" comment="mozilla-nss-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531079" comment="mozilla-nss-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556336" comment="mozilla-nss-certs-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531081" comment="mozilla-nss-certs-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556337" comment="mozilla-nss-devel-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556338" comment="mozilla-nss-sysinit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531083" comment="mozilla-nss-sysinit-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556339" comment="mozilla-nss-tools-3.53.1-58.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151276" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.178-94_91 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721150" comment="kernel-default 4.4.178-94.91 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719417" comment="kgraft-patch-4_4_178-94_91-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556340" comment="kgraft-patch-4_4_178-94_91-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151277" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1170715" ref_url="https://bugzilla.suse.com/1170715" source="BUGZILLA"/>
		<reference ref_id="1172698" ref_url="https://bugzilla.suse.com/1172698" source="BUGZILLA"/>
		<reference ref_id="1172704" ref_url="https://bugzilla.suse.com/1172704" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8023: Fixed a potential local privilege escalation from ldap to root when OPENLDAP_CONFIG_BACKEND='ldap' was used (bsc#1172698).	  
- Changed DB_CONFIG to root:ldap permissions (bsc#1172704).	 
- Fixed an issue where slapd becomes unresponsive after many failed login/bind attempts(bsc#1170715).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170715">SUSE bug 1170715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172704">SUSE bug 1172704</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8023">CVE-2020-8023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556341" comment="libldap-2_4-2-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531086" comment="libldap-2_4-2-32bit-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556342" comment="openldap2-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556343" comment="openldap2-back-meta-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556344" comment="openldap2-client-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531090" comment="openldap2-doc-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556345" comment="openldap2-ppolicy-check-password-1.2-18.71.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151278" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.176-94_88 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721148" comment="kernel-default 4.4.176-94.88 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719415" comment="kgraft-patch-4_4_176-94_88-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556346" comment="kgraft-patch-4_4_176-94_88-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151279" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1173377" ref_url="https://bugzilla.suse.com/1173377" source="BUGZILLA"/>
		<reference ref_id="1173378" ref_url="https://bugzilla.suse.com/1173378" source="BUGZILLA"/>
		<reference ref_id="1173380" ref_url="https://bugzilla.suse.com/1173380" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15563" ref_url="https://www.suse.com/security/cve/CVE-2020-15563/" source="CVE"/>
		<reference ref_id="CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565/" source="CVE"/>
		<reference ref_id="CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).
- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).
- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-10"/>
	<updated date="2020-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173377">SUSE bug 1173377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173378">SUSE bug 1173378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173380">SUSE bug 1173380</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15563/">CVE-2020-15563 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15563">CVE-2020-15563 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15565">CVE-2020-15565 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15567">CVE-2020-15567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538473" comment="xen-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538474" comment="xen-doc-html-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538475" comment="xen-libs-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538476" comment="xen-libs-32bit-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538477" comment="xen-tools-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538478" comment="xen-tools-domU-4.9.4_08-3.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151280" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.175-94_79 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721151" comment="kernel-default 4.4.175-94.79 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719418" comment="kgraft-patch-4_4_175-94_79-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556347" comment="kgraft-patch-4_4_175-94_79-default-8-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151281" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1167231" ref_url="https://bugzilla.suse.com/1167231" source="BUGZILLA"/>
		<reference ref_id="1173576" ref_url="https://bugzilla.suse.com/1173576" source="BUGZILLA"/>
		<reference ref_id="1173613" ref_url="https://bugzilla.suse.com/1173613" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415/" source="CVE"/>
		<reference ref_id="CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426/" source="CVE"/>
		<description>
This update for MozillaFirefox to version 78.0.1 ESR fixes the following issues:

Security issues fixed:

- CVE-2020-12415: AppCache manifest poisoning due to url encoded character processing (bsc#1173576).
- CVE-2020-12416: Use-after-free in WebRTC VideoBroadcaster (bsc#1173576).
- CVE-2020-12417: Memory corruption due to missing sign-extension for ValueTags on ARM64 (bsc#1173576).
- CVE-2020-12418: Information disclosure due to manipulated URL object (bsc#1173576).
- CVE-2020-12419: Use-after-free in nsGlobalWindowInner (bsc#1173576).
- CVE-2020-12420: Use-After-Free when trying to connect to a STUN server (bsc#1173576).
- CVE-2020-12402: RSA Key Generation vulnerable to side-channel attack (bsc#1173576).
- CVE-2020-12421: Add-On updates did not respect the same certificate trust rules as software updates (bsc#1173576).
- CVE-2020-12422: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (bsc#1173576).
- CVE-2020-12423: DLL Hijacking due to searching %PATH% for a library (bsc#1173576).
- CVE-2020-12424: WebRTC permission prompt could have been bypassed by a compromised content process (bsc#1173576).
- CVE-2020-12425: Out of bound read in Date.parse() (bsc#1173576).
- CVE-2020-12426: Memory safety bugs fixed in Firefox 78 (bsc#1173576).
- FIPS: MozillaFirefox: allow /proc/sys/crypto/fips_enabled (bsc#1167231).

Non-security issues fixed:

- Fixed interaction with freetype6 (bsc#1173613).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-13"/>
	<updated date="2020-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167231">SUSE bug 1167231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173613">SUSE bug 1173613</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12415">CVE-2020-12415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12416">CVE-2020-12416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12417">CVE-2020-12417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12418">CVE-2020-12418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12419">CVE-2020-12419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12420">CVE-2020-12420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12421">CVE-2020-12421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12422">CVE-2020-12422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12423">CVE-2020-12423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12424">CVE-2020-12424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12425">CVE-2020-12425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12426">CVE-2020-12426 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556348" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556349" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556350" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556351" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151282" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1173455" ref_url="https://bugzilla.suse.com/1173455" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-15049.patch: fixes a Cache Poisoning and Request Smuggling
  attack (CVE-2020-15049, bsc#1173455)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173455">SUSE bug 1173455</bugzilla>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15049">CVE-2020-15049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556352" comment="squid-3.5.21-26.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151283" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1113160" ref_url="https://bugzilla.suse.com/1113160" source="BUGZILLA"/>
		<reference ref_id="1134195" ref_url="https://bugzilla.suse.com/1134195" source="BUGZILLA"/>
		<reference ref_id="1138822" ref_url="https://bugzilla.suse.com/1138822" source="BUGZILLA"/>
		<reference ref_id="1141661" ref_url="https://bugzilla.suse.com/1141661" source="BUGZILLA"/>
		<reference ref_id="1142038" ref_url="https://bugzilla.suse.com/1142038" source="BUGZILLA"/>
		<reference ref_id="1143913" ref_url="https://bugzilla.suse.com/1143913" source="BUGZILLA"/>
		<reference ref_id="1148177" ref_url="https://bugzilla.suse.com/1148177" source="BUGZILLA"/>
		<reference ref_id="1153090" ref_url="https://bugzilla.suse.com/1153090" source="BUGZILLA"/>
		<reference ref_id="1153277" ref_url="https://bugzilla.suse.com/1153277" source="BUGZILLA"/>
		<reference ref_id="1154940" ref_url="https://bugzilla.suse.com/1154940" source="BUGZILLA"/>
		<reference ref_id="1154968" ref_url="https://bugzilla.suse.com/1154968" source="BUGZILLA"/>
		<reference ref_id="1155372" ref_url="https://bugzilla.suse.com/1155372" source="BUGZILLA"/>
		<reference ref_id="1163871" ref_url="https://bugzilla.suse.com/1163871" source="BUGZILLA"/>
		<reference ref_id="1165921" ref_url="https://bugzilla.suse.com/1165921" source="BUGZILLA"/>
		<reference ref_id="1168310" ref_url="https://bugzilla.suse.com/1168310" source="BUGZILLA"/>
		<reference ref_id="1170231" ref_url="https://bugzilla.suse.com/1170231" source="BUGZILLA"/>
		<reference ref_id="1170557" ref_url="https://bugzilla.suse.com/1170557" source="BUGZILLA"/>
		<reference ref_id="1171687" ref_url="https://bugzilla.suse.com/1171687" source="BUGZILLA"/>
		<reference ref_id="1172462" ref_url="https://bugzilla.suse.com/1172462" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10215" ref_url="https://www.suse.com/security/cve/CVE-2019-10215/" source="CVE"/>
		<reference ref_id="CVE-2019-15043" ref_url="https://www.suse.com/security/cve/CVE-2019-15043/" source="CVE"/>
		<reference ref_id="CVE-2020-12245" ref_url="https://www.suse.com/security/cve/CVE-2020-12245/" source="CVE"/>
		<reference ref_id="CVE-2020-13379" ref_url="https://www.suse.com/security/cve/CVE-2020-13379/" source="CVE"/>
		<description>

This update fixes the following issues:

cobbler:

- Calculate relative path for kernel and inited when generating
  grub entry (bsc#1170231)
  Added: fix-grub2-entry-paths.diff
- Fix os-release version detection for SUSE
  Modified: sles15.patch
- Jinja2 template library fix (bsc#1141661)
- Removes string replace for textmode fix (bsc#1134195)

golang-github-prometheus-node_exporter:

- Update to 0.18.1
  * [BUGFIX] Fix incorrect sysctl call in BSD meminfo collector, resulting in broken swap metrics on FreeBSD #1345
  * [BUGFIX] Fix rollover bug in mountstats collector #1364
  * Renamed interface label to device in netclass collector for consistency with
  * other network metrics #1224
  * The cpufreq metrics now separate the cpufreq and scaling data based on what the driver provides. #1248
  * The labels for the network_up metric have changed, see issue #1236
  * Bonding collector now uses mii_status instead of operstatus #1124
  * Several systemd metrics have been turned off by default to improve performance #1254
  * These include unit_tasks_current, unit_tasks_max, service_restart_total, and unit_start_time_seconds
  * The systemd collector blacklist now includes automount, device, mount, and slice units by default. #1255
  * [CHANGE] Bonding state uses mii_status #1124
  * [CHANGE] Add a limit to the number of in-flight requests #1166
  * [CHANGE] Renamed interface label to device in netclass collector #1224
  * [CHANGE] Add separate cpufreq and scaling metrics #1248
  * [CHANGE] Several systemd metrics have been turned off by default to improve performance #1254
  * [CHANGE] Expand systemd collector blacklist #1255
  * [CHANGE] Split cpufreq metrics into a separate collector #1253
  * [FEATURE] Add a flag to disable exporter metrics #1148
  * [FEATURE] Add kstat-based Solaris metrics for boottime, cpu and zfs collectors #1197
  * [FEATURE] Add uname collector for FreeBSD #1239
  * [FEATURE] Add diskstats collector for OpenBSD #1250
  * [FEATURE] Add pressure collector exposing pressure stall information for Linux #1174
  * [FEATURE] Add perf exporter for Linux #1274
  * [ENHANCEMENT] Add Infiniband counters #1120
  * [ENHANCEMENT] Add TCPSynRetrans to netstat default filter #1143
  * [ENHANCEMENT] Move network_up labels into new metric network_info #1236
  * [ENHANCEMENT] Use 64-bit counters for Darwin netstat
  * [BUGFIX] Add fallback for missing /proc/1/mounts #1172
  * [BUGFIX] Fix node_textfile_mtime_seconds to work properly on symlinks #1326
- Add network-online (Wants and After) dependency to systemd unit bsc#1143913

golang-github-prometheus-prometheus:

- Update change log and spec file
  + Modified spec file: default to golang 1.14 to avoid 'have choice' build issues in OBS. 
  + Rebase and update patches for version 2.18.0
  + Changed:  
    * 0002-Default-settings.patch Changed
- Update to 2.18.0 
  + Features 
    * Tracing: Added experimental Jaeger support #7148
  + Changes
    * Federation: Only use local TSDB for federation (ignore remote read). #7096
    * Rules: `rule_evaluations_total` and `rule_evaluation_failures_total` have a `rule_group` label now. #7094
  + Enhancements
    * TSDB: Significantly reduce WAL size kept around after a block cut. #7098
    * Discovery: Add `architecture` meta label for EC2. #7000
  + Bug fixes
    * UI: Fixed wrong MinTime reported by /status. #7182
    * React UI: Fixed multiselect legend on OSX. #6880
    * Remote Write: Fixed blocked resharding edge case. #7122
    * Remote Write: Fixed remote write not updating on relabel configs change. #7073
- Changes from 2.17.2
  + Bug fixes
    * Federation: Register federation metrics #7081
    * PromQL: Fix panic in parser error handling #7132
    * Rules: Fix reloads hanging when deleting a rule group that is being evaluated #7138
    * TSDB: Fix a memory leak when prometheus starts with an empty TSDB WAL #7135
    * TSDB: Make isolation more robust to panics in web handlers #7129 #7136
- Changes from 2.17.1
  + Bug fixes
    * TSDB: Fix query performance regression that increased memory and CPU usage #7051
- Changes from 2.17.0
  + Features 
    * TSDB: Support isolation #6841
    * This release implements isolation in TSDB. API queries and recording rules are
      guaranteed to only see full scrapes and full recording rules. This comes with a
      certain overhead in resource usage. Depending on the situation, there might be
      some increase in memory usage, CPU usage, or query latency.
  + Enhancements
    * PromQL: Allow more keywords as metric names #6933
    * React UI: Add normalization of localhost URLs in targets page #6794
    * Remote read: Read from remote storage concurrently #6770
    * Rules: Mark deleted rule series as stale after a reload #6745
    * Scrape: Log scrape append failures as debug rather than warn #6852
    * TSDB: Improve query performance for queries that partially hit the head #6676
    * Consul SD: Expose service health as meta label #5313
    * EC2 SD: Expose EC2 instance lifecycle as meta label #6914
    * Kubernetes SD: Expose service type as meta label for K8s service role #6684
    * Kubernetes SD: Expose label_selector and field_selector #6807
    * Openstack SD: Expose hypervisor id as meta label #6962
  + Bug fixes
    * PromQL: Do not escape HTML-like chars in query log #6834 #6795
    * React UI: Fix data table matrix values #6896
    * React UI: Fix new targets page not loading when using non-ASCII characters #6892
    * Remote read: Fix duplication of metrics read from remote storage with external labels #6967 #7018
    * Remote write: Register WAL watcher and live reader metrics for all remotes, not just the first one #6998
    * Scrape: Prevent removal of metric names upon relabeling #6891
    * Scrape: Fix 'superfluous response.WriteHeader call' errors when scrape fails under some circonstances #6986
    * Scrape: Fix crash when reloads are separated by two scrape intervals #7011
- Changes from 2.16.0
  + Features 
    * React UI: Support local timezone on /graph #6692
    * PromQL: add absent_over_time query function #6490
    * Adding optional logging of queries to their own file #6520
  + Enhancements
    * React UI: Add support for rules page and 'Xs ago' duration displays #6503
    * React UI: alerts page, replace filtering togglers tabs with checkboxes #6543
    * TSDB: Export metric for WAL write errors #6647
    * TSDB: Improve query performance for queries that only touch the most recent 2h of data. #6651
    * PromQL: Refactoring in parser errors to improve error messages #6634
    * PromQL: Support trailing commas in grouping opts #6480
    * Scrape: Reduce memory usage on reloads by reusing scrape cache #6670
    * Scrape: Add metrics to track bytes and entries in the metadata cache #6675
    * promtool: Add support for line-column numbers for invalid rules output #6533
    * Avoid restarting rule groups when it is unnecessary #6450
  + Bug fixes
    * React UI: Send cookies on fetch() on older browsers #6553
    * React UI: adopt grafana flot fix for stacked graphs #6603
    * React UI: broken graph page browser history so that back button works as expected #6659
    * TSDB: ensure compactionsSkipped metric is registered, and log proper error if one is returned from head.Init #6616
    * TSDB: return an error on ingesting series with duplicate labels #6664
    * PromQL: Fix unary operator precedence #6579
    * PromQL: Respect query.timeout even when we reach query.max-concurrency #6712
    * PromQL: Fix string and parentheses handling in engine, which affected React UI #6612
    * PromQL: Remove output labels returned by absent() if they are produced by multiple identical label matchers #6493
    * Scrape: Validate that OpenMetrics input ends with `# EOF` #6505
    * Remote read: return the correct error if configs can't be marshal'd to JSON #6622
    * Remote write: Make remote client `Store` use passed context, which can affect shutdown timing #6673
    * Remote write: Improve sharding calculation in cases where we would always be consistently behind by tracking pendingSamples #6511
    * Ensure prometheus_rule_group metrics are deleted when a rule group is removed #6693
- Changes from 2.15.2
  + Bug fixes
    * TSDB: Fixed support for TSDB blocks built with Prometheus before 2.1.0. #6564
    * TSDB: Fixed block compaction issues on Windows. #6547
- Changes from 2.15.1
  + Bug fixes
    * TSDB: Fixed race on concurrent queries against same data. #6512
- Changes from 2.15.0
  + Features 
    * API: Added new endpoint for exposing per metric metadata `/metadata`. #6420 #6442
  + Changes
    * Discovery: Removed `prometheus_sd_kubernetes_cache_*` metrics. Additionally `prometheus_sd_kubernetes_workqueue_latency_seconds` and `prometheus_sd_kubernetes_workqueue_work_duration_seconds` metrics now show correct values in seconds. #6393
    * Remote write: Changed `query` label on `prometheus_remote_storage_*` metrics to `remote_name` and `url`. #6043
  + Enhancements
    * TSDB: Significantly reduced memory footprint of loaded TSDB blocks. #6418 #6461
    * TSDB: Significantly optimized what we buffer during compaction which should result in lower memory footprint during compaction. #6422 #6452 #6468 #6475
    * TSDB: Improve replay latency. #6230
    * TSDB: WAL size is now used for size based retention calculation. #5886
    * Remote read: Added query grouping and range hints to the remote read request #6401
    * Remote write: Added `prometheus_remote_storage_sent_bytes_total` counter per queue. #6344
    * promql: Improved PromQL parser performance. #6356
    * React UI: Implemented missing pages like `/targets` #6276, TSDB status page #6281 #6267 and many other fixes and performance improvements.
    * promql: Prometheus now accepts spaces between time range and square bracket. e.g `[ 5m]` #6065  
  + Bug fixes
    * Config: Fixed alertmanager configuration to not miss targets when configurations are similar. #6455
    * Remote write: Value of `prometheus_remote_storage_shards_desired` gauge shows raw value of desired shards and it's updated correctly. #6378
    * Rules: Prometheus now fails the evaluation of rules and alerts where metric results collide with labels specified in `labels` field. #6469
    * API: Targets Metadata API `/targets/metadata` now accepts empty `match_targets` parameter as in the spec. #6303
- Changes from 2.14.0
  + Features 
    * API: `/api/v1/status/runtimeinfo` and `/api/v1/status/buildinfo` endpoints added for use by the React UI. #6243
    * React UI: implement the new experimental React based UI. #5694 and many more
      * Can be found by under `/new`.
      * Not all pages are implemented yet.
    * Status: Cardinality statistics added to the Runtime &amp; Build Information page. #6125
  + Enhancements
    * Remote write: fix delays in remote write after a compaction. #6021
    * UI: Alerts can be filtered by state. #5758
  + Bug fixes
    * Ensure warnings from the API are escaped. #6279
    * API: lifecycle endpoints return 403 when not enabled. #6057
    * Build: Fix Solaris build. #6149
    * Promtool: Remove false duplicate rule warnings when checking rule files with alerts. #6270
    * Remote write: restore use of deduplicating logger in remote write. #6113
    * Remote write: do not reshard when unable to send samples. #6111
    * Service discovery: errors are no longer logged on context cancellation. #6116, #6133
    * UI: handle null response from API properly. #6071
- Changes from 2.13.1
  + Bug fixes
    * Fix panic in ARM builds of Prometheus. #6110
    * promql: fix potential panic in the query logger. #6094
    * Multiple errors of http: superfluous response.WriteHeader call in the logs. #6145
- Changes from 2.13.0
  + Enhancements
    * Metrics: renamed prometheus_sd_configs_failed_total to prometheus_sd_failed_configs and changed to Gauge #5254
    * Include the tsdb tool in builds. #6089
    * Service discovery: add new node address types for kubernetes. #5902
    * UI: show warnings if query have returned some warnings. #5964
    * Remote write: reduce memory usage of the series cache. #5849
    * Remote read: use remote read streaming to reduce memory usage. #5703
    * Metrics: added metrics for remote write max/min/desired shards to queue manager. #5787
    * Promtool: show the warnings during label query. #5924
    * Promtool: improve error messages when parsing bad rules. #5965
    * Promtool: more promlint rules. #5515
  + Bug fixes
    * UI: Fix a Stored DOM XSS vulnerability with query history [CVE-2019-10215](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10215). #6098
    * Promtool: fix recording inconsistency due to duplicate labels. #6026
    * UI: fixes service-discovery view when accessed from unhealthy targets. #5915
    * Metrics format: OpenMetrics parser crashes on short input. #5939
    * UI: avoid truncated Y-axis values. #6014
- Changes from 2.12.0
  + Features 
    * Track currently active PromQL queries in a log file. #5794
    * Enable and provide binaries for `mips64` / `mips64le` architectures. #5792
  + Enhancements
    * Improve responsiveness of targets web UI and API endpoint. #5740
    * Improve remote write desired shards calculation. #5763
    * Flush TSDB pages more precisely. tsdb#660
    * Add `prometheus_tsdb_retention_limit_bytes` metric. tsdb#667
    * Add logging during TSDB WAL replay on startup. tsdb#662
    * Improve TSDB memory usage. tsdb#653, tsdb#643, tsdb#654, tsdb#642, tsdb#627
  + Bug fixes
    * Check for duplicate label names in remote read. #5829
    * Mark deleted rules' series as stale on next evaluation. #5759
    * Fix JavaScript error when showing warning about out-of-sync server time. #5833
    * Fix `promtool test rules` panic when providing empty `exp_labels`. #5774
    * Only check last directory when discovering checkpoint number. #5756
    * Fix error propagation in WAL watcher helper functions. #5741
    * Correctly handle empty labels from alert templates. #5845
- Update Uyuni/SUSE Manager service discovery patch
  + Modified 0003-Add-Uyuni-service-discovery.patch:
  + Adapt service discovery to the new Uyuni API endpoints
  + Modified spec file: force golang 1.12 to fix build issues in SLE15SP2
- Update to Prometheus 2.11.2

grafana:

- Update to version 7.0.3
  * Features / Enhancements
    - Stats: include all fields. #24829, @ryantxu
    - Variables: change VariableEditorList row action Icon to IconButton. #25217, @hshoff
  * Bug fixes
    - Cloudwatch: Fix dimensions of DDoSProtection. #25317, @papagian
    - Configuration: Fix env var override of sections containing hyphen. #25178, @marefr
    - Dashboard: Get panels in collapsed rows. #25079, @peterholmberg
    - Do not show alerts tab when alerting is disabled. #25285, @dprokop
    - Jaeger: fixes cascader option label duration value. #25129, @Estrax
    - Transformations: Fixed Transform tab crash &amp; no update after adding first transform. #25152, @torkelo
- Update to version 7.0.2
  * Bug fixes
    - Security: Urgent security patch release to fix CVE-2020-13379
- Update to version 7.0.1
  * Features / Enhancements
    - Datasource/CloudWatch: Makes CloudWatch Logs query history more readable. #24795, @kaydelaney
    - Download CSV: Add date and time formatting. #24992, @ryantxu
    - Table: Make last cell value visible when right aligned. #24921, @peterholmberg
    - TablePanel: Adding sort order persistance. #24705, @torkelo
    - Transformations: Display correct field name when using reduce transformation. #25068, @peterholmberg
    - Transformations: Allow custom number input for binary operations. #24752, @ryantxu
  * Bug fixes
    - Dashboard/Links: Fixes dashboard links by tags not working. #24773, @KamalGalrani
    - Dashboard/Links: Fixes open in new window for dashboard link. #24772, @KamalGalrani
    - Dashboard/Links: Variables are resolved and limits to 100. #25076, @hugohaggmark
    - DataLinks: Bring back variables interpolation in title. #24970, @dprokop
    - Datasource/CloudWatch: Field suggestions no longer limited to prefix-only. #24855, @kaydelaney
    - Explore/Table: Keep existing field types if possible. #24944, @kaydelaney
    - Explore: Fix wrap lines toggle for results of queries with filter expression. #24915, @ivanahuckova
    - Explore: fix undo in query editor. #24797, @zoltanbedi
    - Explore: fix word break in type head info. #25014, @zoltanbedi
    - Graph: Legend decimals now work as expected. #24931, @torkelo
    - LoginPage: Fix hover color for service buttons. #25009, @tskarhed
    - LogsPanel: Fix scrollbar. #24850, @ivanahuckova
    - MoveDashboard: Fix for moving dashboard caused all variables to be lost. #25005, @torkelo
    - Organize transformer: Use display name in field order comparer. #24984, @dprokop
    - Panel: shows correct panel menu items in view mode. #24912, @hugohaggmark
    - PanelEditor Fix missing labels and description if there is only single option in category. #24905, @dprokop
    - PanelEditor: Overrides name matcher still show all original field names even after Field default display name is specified. #24933, @torkelo
    - PanelInspector: Makes sure Data display options are visible. #24902, @hugohaggmark
    - PanelInspector: Hides unsupported data display options for Panel type. #24918, @hugohaggmark
    - PanelMenu: Make menu disappear on button press. #25015, @tskarhed
    - Postgres: Fix add button. #25087, @phemmer
    - Prometheus: Fix recording rules expansion. #24977, @ivanahuckova
    - Stackdriver: Fix creating Service Level Objectives (SLO) datasource query variable. #25023, @papagian
- Update to version 7.0.0 
  * Breaking changes
    - Removed PhantomJS: PhantomJS was deprecated in Grafana v6.4 and starting from Grafana v7.0.0, all PhantomJS support has been removed. This means that Grafana no longer ships with a built-in image renderer, and we advise you to install the Grafana Image Renderer plugin.
    - Dashboard: A global minimum dashboard refresh interval is now enforced and defaults to 5 seconds.
    - Interval calculation: There is now a new option Max data points that controls the auto interval $__interval calculation. Interval was previously calculated by dividing the panel width by the time range. With the new max data points option it is now easy to set $__interval to a dynamic value that is time range agnostic. For example if you set Max data points to 10 Grafana will dynamically set $__interval by dividing the current time range by 10.
    - Datasource/Loki: Support for deprecated Loki endpoints has been removed.
    - Backend plugins: Grafana now requires backend plugins to be signed, otherwise Grafana will not load/start them. This is an additional security measure to make sure backend plugin binaries and files haven't been tampered with. Refer to Upgrade Grafana for more information.
    - @grafana/ui: Forms migration notice, see @grafana/ui changelog
    - @grafana/ui: Select API change for creating custom values, see @grafana/ui changelog
    + Deprecation warnings
      - Scripted dashboards is now deprecated. The feature is not removed but will be in a future release. We hope to address the underlying requirement of dynamic dashboards in a different way. #24059
      - The unofficial first version of backend plugins together with usage of grafana/grafana-plugin-model is now deprecated and support for that will be removed in a future release. Please refer to backend plugins documentation for information about the new officially supported backend plugins.
  * Features / Enhancements
    - Backend plugins: Log deprecation warning when using the unofficial first version of backend plugins. #24675, @marefr
    - Editor: New line on Enter, run query on Shift+Enter. #24654, @davkal
    - Loki: Allow multiple derived fields with the same name. #24437, @aocenas
    - Orgs: Add future deprecation notice. #24502, @torkelo
  * Bug Fixes
    - @grafana/toolkit: Use process.cwd() instead of PWD to get directory. #24677, @zoltanbedi
    - Admin: Makes long settings values line break in settings page. #24559, @hugohaggmark
    - Dashboard: Allow editing provisioned dashboard JSON and add confirmation when JSON is copied to dashboard. #24680, @dprokop
    - Dashboard: Fix for strange 'dashboard not found' errors when opening links in dashboard settings. #24416, @torkelo
    - Dashboard: Fix so default data source is selected when data source can't be found in panel editor. #24526, @mckn
    - Dashboard: Fixed issue changing a panel from transparent back to normal in panel editor. #24483, @torkelo
    - Dashboard: Make header names reflect the field name when exporting to CSV file from the the panel inspector. #24624, @peterholmberg
    - Dashboard: Make sure side pane is displayed with tabs by default in panel editor. #24636, @dprokop
    - Data source: Fix query/annotation help content formatting. #24687, @AgnesToulet
    - Data source: Fixes async mount errors. #24579, @Estrax
    - Data source: Fixes saving a data source without failure when URL doesn't specify a protocol. #24497, @aknuds1
    - Explore/Prometheus: Show results of instant queries only in table. #24508, @ivanahuckova
    - Explore: Fix rendering of react query editors. #24593, @ivanahuckova
    - Explore: Fixes loading more logs in logs context view. #24135, @Estrax
    - Graphite: Fix schema and dedupe strategy in rollup indicators for Metrictank queries. #24685, @torkelo
    - Graphite: Makes query annotations work again. #24556, @hugohaggmark
    - Logs: Clicking 'Load more' from context overlay doesn't expand log row. #24299, @kaydelaney
    - Logs: Fix total bytes process calculation. #24691, @davkal
    - Org/user/team preferences: Fixes so UI Theme can be set back to Default. #24628, @AgnesToulet
    - Plugins: Fix manifest validation. #24573, @aknuds1
    - Provisioning: Use proxy as default access mode in provisioning. #24669, @bergquist
    - Search: Fix select item when pressing enter and Grafana is served using a sub path. #24634, @tskarhed
    - Search: Save folder expanded state. #24496, @Clarity-89
    - Security: Tag value sanitization fix in OpenTSDB data source. #24539, @rotemreiss
    - Table: Do not include angular options in options when switching from angular panel. #24684, @torkelo
    - Table: Fixed persisting column resize for time series fields. #24505, @torkelo
    - Table: Fixes Cannot read property subRows of null. #24578, @hugohaggmark
    - Time picker: Fixed so you can enter a relative range in the time picker without being converted to absolute range. #24534, @mckn
    - Transformations: Make transform dropdowns not cropped. #24615, @dprokop
    - Transformations: Sort order should be preserved as entered by user when using the reduce transformation. #24494, @hugohaggmark
    - Units: Adds scale symbol for currencies with suffixed symbol. #24678, @hugohaggmark
    - Variables: Fixes filtering options with more than 1000 entries. #24614, @hugohaggmark
    - Variables: Fixes so Textbox variables read value from url. #24623, @hugohaggmark
    - Zipkin: Fix error when span contains remoteEndpoint. #24524, @aocenas
    - SAML: Switch from email to login for user login attribute mapping (Enterprise)
- Update Makefile and spec file
  * Remove phantomJS patch from Makefile 
  * Fix multiline strings in Makefile
  * Exclude s390 from SLE12 builds, golang 1.14 is not built for s390
- Add instructions for patching the Grafana javascript frontend.
- BuildRequires golang(API) instead of go metapackage version range
  * BuildRequires:  golang(API) &gt;= 1.14   from
    BuildRequires:  ( go &gt;= 1.14 with go &lt; 1.15 )
- Update to version 6.7.3
  - This version fixes bsc#1170557 and its corresponding CVE-2020-12245
  - Admin: Fix Synced via LDAP message for non-LDAP external users. #23477, @alexanderzobnin
  - Alerting: Fixes notifications for alerts with empty message in Google Hangouts notifier. #23559, @hugohaggmark
  - AuthProxy: Fixes bug where long username could not be cached.. #22926, @jcmcken
  - Dashboard: Fix saving dashboard when editing raw dashboard JSON model. #23314, @peterholmberg
  - Dashboard: Try to parse 8 and 15 digit numbers as timestamps if parsing of time range as date fails. #21694, @jessetan
  - DashboardListPanel: Fixed problem with empty panel after going into edit mode (General folder filter being automatically added) . #23426, @torkelo
  - Data source: Handle datasource withCredentials option properly. #23380, @hvtuananh
  - Security: Fix annotation popup XSS vulnerability. #23813, @torkelo
  - Server: Exit Grafana with status code 0 if no error. #23312, @aknuds1
  - TablePanel: Fix XSS issue in header column rename (backport). #23814, @torkelo
  - Variables: Fixes error when setting adhoc variable values. #23580, @hugohaggmark
- Update to version 6.7.2:
  (see installed changelog for the full list of changes)
  -  BackendSrv: Adds config to response to fix issue for external plugins that used this property . #23032, @torkelo
  -  Dashboard: Fixed issue with saving new dashboard after changing title . #23104, @dprokop
  -  DataLinks: make sure we use the correct datapoint when dataset contains null value.. #22981, @mckn
  -  Plugins: Fixed issue for plugins that imported dateMath util . #23069, @mckn
  -  Security: Fix for dashboard snapshot original dashboard link could contain XSS vulnerability in url. #23254, @torkelo
  -  Variables: Fixes issue with too many queries being issued for nested template variables after value change. #23220, @torkelo
  -  Plugins: Expose promiseToDigest. #23249, @torkelo
  -  Reporting (Enterprise): Fixes issue updating a report created by someone else
- Update to 6.7.1:
  (see installed changelog for the full list of changes)
  Bug Fixes
  - Azure: Fixed dropdowns not showing current value. #22914, @torkelo
  - BackendSrv: only add content-type on POST, PUT requests. #22910, @hugohaggmark
  - Panels: Fixed size issue with panel internal size when exiting panel edit mode. #22912, @torkelo
  - Reporting: fixes migrations compatibility with mysql (Enterprise)
  - Reporting: Reduce default concurrency limit to 4 (Enterprise)
- Update to 6.7.0:
  (see installed changelog for the full list of changes)
  Bug Fixes
  - AngularPanels: Fixed inner height calculation for angular panels . #22796, @torkelo
  - BackendSrv: makes sure provided headers are correctly recognized and set. #22778, @hugohaggmark
  - Forms: Fix input suffix position (caret-down in Select) . #22780, @torkelo
  - Graphite: Fixed issue with query editor and next select metric now showing after selecting metric node . #22856, @torkelo
  - Rich History: UX adjustments and fixes. #22729, @ivanahuckova
- Update to 6.7.0-beta1:
  Breaking changes
  -  Slack: Removed Mention setting and instead introduce Mention Users, Mention Groups, and Mention Channel. The first two settings require user and group IDs, respectively. This change was necessary because the way of mentioning via the Slack API changed and mentions in Slack notifications no longer worked.
  -  Alerting: Reverts the behavior of diff and percent_diff to not always be absolute. Something we introduced by mistake in 6.1.0. Alerting now support diff(), diff_abs(), percent_diff() and percent_diff_abs(). #21338
  - Notice about changes in backendSrv for plugin authors
    In our mission to migrate away from AngularJS to React we have removed all AngularJS dependencies in the core data retrieval service backendSrv.
    Removing the AngularJS dependencies in backendSrv has the unfortunate side effect of AngularJS digest no longer being triggered for any request made with backendSrv. Because of this, external plugins using backendSrv directly may suffer from strange behaviour in the UI.
    To remedy this issue, as a plugin author you need to trigger the digest after a direct call to backendSrv.
  Bug Fixes
    API: Fix redirect issues. #22285, @papagian
    Alerting: Don't include image_url field with Slack message if empty. #22372, @aknuds1
    Alerting: Fixed bad background color for default notifications in alert tab . #22660, @krvajal
    Annotations: In table panel when setting transform to annotation, they will now show up right away without a manual refresh. #22323, @krvajal
    Azure Monitor: Fix app insights source to allow for new __timeFrom and __timeTo. #21879, @ChadNedzlek
    BackendSrv: Fixes POST body for form data. gmark
    CloudWatch: Credentials cache invalidation fix. #22473, @sunker
    CloudWatch: Expand alias variables when query yields no result. #22695, @sunker
    Dashboard: Fix bug with NaN in alerting. #22053, @a-melnyk
    Explore: Fix display of multiline logs in log panel and explore. #22057, @thomasdraebing
    Heatmap: Legend color range is incorrect when using custom min/max. #21748, @sv5d
    Security: Fixed XSS issue in dashboard history diff . #22680, @torkelo
    StatPanel: Fixes base color is being used for null values .
    #22646, @torkelo
- Update to version 6.6.2:
  (see installed changelog for the full list of changes)
- Update to version 6.6.1:
  (see installed changelog for the full list of changes)
- Update to version 6.6.0:
  (see installed changelog for the full list of changes)
- Update to version 6.5.3:
  (see installed changelog for the full list of changes)
- Update to version 6.5.2:
  (see installed changelog for the full list of changes)
- Update to version 6.5.1:
  (see installed changelog for the full list of changes)
- Update to version 6.5.0
  (see installed changelog for the full list of changes)
- Update to version 6.4.5:
  * Create version 6.4.5
  * CloudWatch: Fix high CPU load (#20579)
- Add obs-service-go_modules to download required modules into vendor.tar.gz
- Adjusted spec file to use vendor.tar.gz
- Adjusted Makefile to work with new filenames
- BuildRequire go1.14
- Update to version 6.4.4:
  * DataLinks: Fix blur issues. #19883, @aocenas
  * Docker: Makes it possible to parse timezones in the docker image. #20081, @xlson
  * LDAP: All LDAP servers should be tried even if one of them returns a connection error. #20077, @jongyllen
  * LDAP: No longer shows incorrectly matching groups based on role in debug page. #20018, @xlson
  * Singlestat: Fix no data / null value mapping . #19951, @ryantxu
- Revert the spec file and make script
- Remove PhantomJS dependency
- Update to 6.4.3
  * Bug Fixes
    - Alerting: All notification channels should send even if one fails to send. #19807, @jan25
    - AzureMonitor: Fix slate interference with dropdowns. #19799, @aocenas
    - ContextMenu: make ContextMenu positioning aware of the viewport width. #19699, @krvajal
    - DataLinks: Fix context menu not showing in singlestat-ish visualisations. #19809, @dprokop
    - DataLinks: Fix url field not releasing focus. #19804, @aocenas
    - Datasource: Fixes clicking outside of some query editors required 2 clicks. #19822, @aocenas
    - Panels: Fixes default tab for visualizations without Queries Tab. #19803, @hugohaggmark
    - Singlestat: Fixed issue with mapping null to text. #19689, @torkelo
    - @grafana/toolkit: Don't fail plugin creation when git user.name config is not set. #19821, @dprokop
    - @grafana/toolkit: TSLint line number off by 1. #19782, @fredwangwang
- Update to 6.4.2
  * Bug Fixes
    - CloudWatch: Changes incorrect dimension wmlid to wlmid . #19679, @ATTron
    - Grafana Image Renderer: Fixes plugin page. #19664, @hugohaggmark
    - Graph: Fixes auto decimals logic for y axis ticks that results in too many decimals for high values. #19618, @torkelo
    - Graph: Switching to series mode should re-render graph. #19623, @torkelo
    - Loki: Fix autocomplete on label values. #19579, @aocenas
    - Loki: Removes live option for logs panel. #19533, @davkal
    - Profile: Fix issue with user profile not showing more than sessions sessions in some cases. #19578, @huynhsamha
    - Prometheus: Fixes so results in Panel always are sorted by query order. #19597, @hugohaggmark
    - sted keys in YAML provisioning caused a server crash, #19547
    - ImageRendering: Fixed issue with image rendering in enterprise build (Enterprise)
    - Reporting: Fixed issue with reporting service when STMP was disabled (Enterprise).
- Changes from 6.4.0
  * Features / Enhancements
    - Build: Upgrade go to 1.12.10. #19499, @marefr
    - DataLinks: Suggestions menu improvements. #19396, @dprokop
    - Explore: Take root_url setting into account when redirecting from dashboard to explore. #19447, @ivanahuckova
    - Explore: Update broken link to logql docs. #19510, @ivanahuckova
    - Logs: Adds Logs Panel as a visualization. #19504, @davkal
  * Bug Fixes
    - CLI: Fix version selection for plugin install. #19498, @aocenas
    - Graph: Fixes minor issue with series override color picker and custom color . #19516, @torkelo
- Changes from 6.4.0 Beta 2
  * Features / Enhancements
    - Azure Monitor: Remove support for cross resource queries (#19115)'. #19346, @sunker
    - Docker: Upgrade packages to resolve reported vulnerabilities. #19188, @marefr
    - Graphite: Time range expansion reduced from 1 minute to 1 second. #19246, @torkelo
    - grafana/toolkit: Add plugin creation task. #19207, @dprokop
  * Bug Fixes
    - Alerting: Prevents creating alerts from unsupported queries. #19250, @hugohaggmark
    - Alerting: Truncate PagerDuty summary when greater than 1024 characters. #18730, @nvllsvm
    - Cloudwatch: Fix autocomplete for Gamelift dimensions. #19146, @kevinpz
    - Dashboard: Fix export for sharing when panels use default data source. #19315, @torkelo
    - Database: Rewrite system statistics query to perform better. #19178, @papagian
    - Gauge/BarGauge: Fix issue with [object Object] in titles . #19217, @ryantxu
    - MSSQL: Revert usage of new connectionstring format introduced by #18384. #19203, @marefr
    - Multi-LDAP: Do not fail-fast on invalid credentials. #19261, @gotjosh
    - MySQL, Postgres, MSSQL: Fix validating query with template variables in alert . #19237, @marefr
    - MySQL, Postgres: Update raw sql when query builder updates. #19209, @marefr
    - MySQL: Limit datasource error details returned from the backend. #19373, @marefr
- Changes from 6.4.0 Beta 1
  * Features / Enhancements
    - API: Readonly datasources should not be created via the API. #19006, @papagian
    - Alerting: Include configured AlertRuleTags in Webhooks notifier. #18233, @dominic-miglar
    - Annotations: Add annotations support to Loki. #18949, @aocenas
    - Annotations: Use a single row to represent a region. #17673, @ryantxu
    - Auth: Allow inviting existing users when login form is disabled. #19048, @548017
    - Azure Monitor: Add support for cross resource queries. #19115, @sunker
    - CLI: Allow installing custom binary plugins. #17551, @aocenas
    - Dashboard: Adds Logs Panel (alpha) as visualization option for Dashboards. #18641, @hugohaggmark
    - Dashboard: Reuse query results between panels . #16660, @ryantxu
    - Dashboard: Set time to to 23:59:59 when setting To time using calendar. #18595, @simPod
    - DataLinks: Add DataLinks support to Gauge, BarGauge and SingleStat2 panel. #18605, @ryantxu
    - DataLinks: Enable access to labels &amp; field names. #18918, @torkelo
    - DataLinks: Enable multiple data links per panel. #18434, @dprokop
    - Docker: switch docker image to alpine base with phantomjs support. #18468, @DanCech
    - Elasticsearch: allow templating queries to order by doc_count. #18870, @hackery
    - Explore: Add throttling when doing live queries. #19085, @aocenas
    - Explore: Adds ability to go back to dashboard, optionally with query changes. #17982, @kaydelaney
    - Explore: Reduce default time range to last hour. #18212, @davkal
    - Gauge/BarGauge: Support decimals for min/max. #18368, @ryantxu
    - Graph: New series override transform constant that renders a single point as a line across the whole graph. #19102, @davkal
    - Image rendering: Add deprecation warning when PhantomJS is used for rendering images. #18933, @papagian
    - InfluxDB: Enable interpolation within ad-hoc filter values. #18077, @kvc-code
    - LDAP: Allow an user to be synchronized against LDAP. #18976, @gotjosh
    - Ldap: Add ldap debug page. #18759, @peterholmberg
    - Loki: Remove prefetching of default label values. #18213, @davkal
    - Metrics: Add failed alert notifications metric. #18089, @koorgoo
    - OAuth: Support JMES path lookup when retrieving user email. #14683, @bobmshannon
    - OAuth: return GitLab groups as a part of user info (enable team sync). #18388, @alexanderzobnin
    - Panels: Add unit for electrical charge - ampere-hour. #18950, @anirudh-ramesh
    - Plugin: AzureMonitor - Reapply MetricNamespace support. #17282, @raphaelquati
    - Plugins: better warning when plugins fail to load. #18671, @ryantxu
    - Postgres: Add support for scram sha 256 authentication. #18397, @nonamef
    - RemoteCache: Support SSL with Redis. #18511, @kylebrandt
    - SingleStat: The gauge option in now disabled/hidden (unless it's an old panel with it already enabled) . #18610, @ryantxu
    - Stackdriver: Add extra alignment period options. #18909, @sunker
    - Units: Add South African Rand (ZAR) to currencies. #18893, @jeteon
    - Units: Adding T,P,E,Z,and Y bytes. #18706, @chiqomar
  * Bug Fixes
    - Alerting: Notification is sent when state changes from no_data to ok. #18920, @papagian
    - Alerting: fix duplicate alert states when the alert fails to save to the database. #18216, @kylebrandt
    - Alerting: fix response popover prompt when add notification channels. #18967, @lzdw
    - CloudWatch: Fix alerting for queries with Id (using GetMetricData). #17899, @alex-berger
    - Explore: Fix auto completion on label values for Loki. #18988, @aocenas
    - Explore: Fixes crash using back button with a zoomed in graph. #19122, @hugohaggmark
    - Explore: Fixes so queries in Explore are only run if Graph/Table is shown. #19000, @hugohaggmark
    - MSSQL: Change connectionstring to URL format to fix using passwords with semicolon. #18384, @Russiancold
    - MSSQL: Fix memory leak when debug enabled. #19049, @briangann
    - Provisioning: Allow escaping literal '$' with '$$' in configs to avoid interpolation. #18045, @kylebrandt
    - TimePicker: Fixes hiding time picker dropdown in FireFox. #19154, @hugohaggmark
  * Breaking changes
    + Annotations
      There are some breaking changes in the annotations HTTP API for region annotations. Region annotations are now represented
      using a single event instead of two seperate events. Check breaking changes in HTTP API below and HTTP API documentation for more details.
    + Docker
      Grafana is now using Alpine 3.10 as docker base image.
    + HTTP API
      - GET /api/alert-notifications now requires at least editor access.
        New /api/alert-notifications/lookup returns less information than /api/alert-notifications and can be access by any authenticated user.
      - GET /api/alert-notifiers now requires at least editor access
      - GET /api/org/users now requires org admin role.
        New /api/org/users/lookup returns less information than /api/org/users and can be access by users that are org admins,
        admin in any folder or admin of any team.
      - GET /api/annotations no longer returns regionId property.
      - POST /api/annotations no longer supports isRegion property.
      - PUT /api/annotations/:id no longer supports isRegion property.
      - PATCH /api/annotations/:id no longer supports isRegion property.
      - DELETE /api/annotations/region/:id has been removed.
  * Deprecation notes
    + PhantomJS
      - PhantomJS, which is used for rendering images of dashboards and panels,
        is deprecated and will be removed in a future Grafana release.
        A deprecation warning will from now on be logged when Grafana starts up if PhantomJS is in use.
        Please consider migrating from PhantomJS to the Grafana Image Renderer plugin.
- Changes from 6.3.6
  * Features / Enhancements
    - Metrics: Adds setting for turning off total stats metrics. #19142, @marefr
  * Bug Fixes
    - Database: Rewrite system statistics query to perform better. #19178, @papagian
    - Explore: Fixes error when switching from prometheus to loki data sources. #18599, @kaydelaney
- Rebase package spec. Use mostly from fedora, fix suse specified things and fix some errors.
- Add missing directories provisioning/datasources and provisioning/notifiers
  and sample.yaml as described in packaging/rpm/control from upstream.
  Missing directories are shown in logfiles.
- Version 6.3.5
  * Upgrades
    + Build: Upgrade to go 1.12.9.
  * Bug Fixes
    + Dashboard: Fixes dashboards init failed loading error for dashboards with panel links that had missing properties.
    + Editor: Fixes issue where only entire lines were being copied.
    + Explore: Fixes query field layout in splitted view for Safari browsers.
    + LDAP: multildap + ldap integration.
    + Profile/UserAdmin: Fix for user agent parser crashes grafana-server on 32-bit builds.
    + Prometheus: Prevents panel editor crash when switching to Prometheus datasource.
    + Prometheus: Changes brace-insertion behavior to be less annoying.
- Version 6.3.4
  * Security: CVE-2019-15043 - Parts of the HTTP API allow unauthenticated use.
- Version 6.3.3
  * Bug Fixes
    + Annotations: Fix failing annotation query when time series query is cancelled. #18532 1, @dprokop 1
    + Auth: Do not set SameSite cookie attribute if cookie_samesite is none. #18462 1, @papagian 3
    + DataLinks: Apply scoped variables to data links correctly. #18454 1, @dprokop 1
    + DataLinks: Respect timezone when displaying datapoint’s timestamp in graph context menu. #18461 2, @dprokop 1
    + DataLinks: Use datapoint timestamp correctly when interpolating variables. #18459 1, @dprokop 1
    + Explore: Fix loading error for empty queries. #18488 1, @davkal
    + Graph: Fixes legend issue clicking on series line icon and issue with horizontal scrollbar being visible on windows. #18563 1, @torkelo 2
    + Graphite: Avoid glob of single-value array variables . #18420, @gotjosh
    + Prometheus: Fix queries with label_replace remove the $1 match when loading query editor. #18480 5, @hugohaggmark 3
    + Prometheus: More consistently allows for multi-line queries in editor. #18362 2, @kaydelaney 2
    + TimeSeries: Assume values are all numbers. #18540 4, @ryantxu
- Version 6.3.2
  * Bug Fixes
    + Gauge/BarGauge: Fixes issue with losts thresholds and issue loading Gauge with avg stat. #18375 12
- Version 6.3.1
  * Bug Fixes
    + PanelLinks: Fix crash issue Gauge &amp; Bar Gauge for panels with panel links (drill down links). #18430 2
- Version 6.3.0
  * Features / Enhancements
    + OAuth: Do not set SameSite OAuth cookie if cookie_samesite is None. #18392 4, @papagian 3
    + Auth Proxy: Include additional headers as part of the cache key. #18298 6, @gotjosh
    + Build grafana images consistently. #18224 12, @hassanfarid
    + Docs: SAML. #18069 11, @gotjosh
    + Permissions: Show plugins in nav for non admin users but hide plugin configuration. #18234 1, @aocenas
    + TimePicker: Increase max height of quick range dropdown. #18247 2, @torkelo 2
    + Alerting: Add tags to alert rules. #10989 13, @Thib17 1
    + Alerting: Attempt to send email notifications to all given email addresses. #16881 1, @zhulongcheng
    + Alerting: Improve alert rule testing. #16286 2, @marefr
    + Alerting: Support for configuring content field for Discord alert notifier. #17017 2, @jan25
    + Alertmanager: Replace illegal chars with underscore in label names. #17002 5, @bergquist 1
    + Auth: Allow expiration of API keys. #17678, @papagian 3
    + Auth: Return device, os and browser when listing user auth tokens in HTTP API. #17504, @shavonn 1
    + Auth: Support list and revoke of user auth tokens in UI. #17434 2, @shavonn 1
    + AzureMonitor: change clashing built-in Grafana variables/macro names for Azure Logs. #17140, @shavonn 1
    + CloudWatch: Made region visible for AWS Cloudwatch Expressions. #17243 2, @utkarshcmu
    + Cloudwatch: Add AWS DocDB metrics. #17241, @utkarshcmu
    + Dashboard: Use timezone dashboard setting when exporting to CSV. #18002 1, @dehrax
    + Data links. #17267 11, @torkelo 2
    + Docker: Switch base image to ubuntu:latest from debian:stretch to avoid security issues… #17066 5, @bergquist 1
    + Elasticsearch: Support for visualizing logs in Explore . #17605 7, @marefr
    + Explore: Adds Live option for supported datasources. #17062 1, @hugohaggmark 3
    + Explore: Adds orgId to URL for sharing purposes. #17895 1, @kaydelaney 2
    + Explore: Adds support for new loki ‘start’ and ‘end’ params for labels endpoint. #17512, @kaydelaney 2
    + Explore: Adds support for toggling raw query mode in explore. #17870, @kaydelaney 2
    + Explore: Allow switching between metrics and logs . #16959 2, @marefr
    + Explore: Combines the timestamp and local time columns into one. #17775, @hugohaggmark 3
    + Explore: Display log lines context . #17097, @dprokop 1
    + Explore: Don’t parse log levels if provided by field or label. #17180 1, @marefr
    + Explore: Improves performance of Logs element by limiting re-rendering. #17685, @kaydelaney 2
    + Explore: Support for new LogQL filtering syntax. #16674 4, @davkal
    + Explore: Use new TimePicker from Grafana/UI. #17793, @hugohaggmark 3
    + Explore: handle newlines in LogRow Highlighter. #17425, @rrfeng 1
    + Graph: Added new fill gradient option. #17528 3, @torkelo 2
    + GraphPanel: Don’t sort series when legend table &amp; sort column is not visible . #17095, @shavonn 1
    + InfluxDB: Support for visualizing logs in Explore. #17450 9, @hugohaggmark 3
    + Logging: Login and Logout actions (#17760). #17883 1, @ATTron
    + Logging: Move log package to pkg/infra. #17023, @zhulongcheng
    + Metrics: Expose stats about roles as metrics. #17469 2, @bergquist 1
    + MySQL/Postgres/MSSQL: Add parsing for day, weeks and year intervals in macros. #13086 6, @bernardd
    + MySQL: Add support for periodically reloading client certs. #14892, @tpetr
    + Plugins: replace dataFormats list with skipDataQuery flag in plugin.json. #16984, @ryantxu
    + Prometheus: Take timezone into account for step alignment. #17477, @fxmiii
    + Prometheus: Use overridden panel range for $__range instead of dashboard range. #17352, @patrick246
    + Prometheus: added time range filter to series labels query. #16851 3, @FUSAKLA
    + Provisioning: Support folder that doesn’t exist yet in dashboard provisioning. #17407 1, @Nexucis
    + Refresh picker: Handle empty intervals. #17585 1, @dehrax
    + Singlestat: Add y min/max config to singlestat sparklines. #17527 4, @pitr
    + Snapshot: use given key and deleteKey. #16876, @zhulongcheng
    + Templating: Correctly display __text in multi-value variable after page reload. #17840 1, @EduardSergeev
    + Templating: Support selecting all filtered values of a multi-value variable. #16873 2, @r66ad
    + Tracing: allow propagation with Zipkin headers. #17009 4, @jrockway
    + Users: Disable users removed from LDAP. #16820 2, @alexanderzobnin
  * Bug Fixes
    + PanelLinks: Fix render issue when there is no panel description. #18408 3, @dehrax
    + OAuth: Fix “missing saved state” OAuth login failure due to SameSite cookie policy. #18332 1, @papagian 3
    + cli: fix for recognizing when in dev mode… #18334, @xlson
    + DataLinks: Fixes incorrect interpolation of ${__series_name} . #18251 1, @torkelo 2
    + Loki: Display live tailed logs in correct order in Explore. #18031 3, @kaydelaney 2
    + PhantomJS: Fixes rendering on Debian Buster. #18162 2, @xlson
    + TimePicker: Fixed style issue for custom range popover. #18244, @torkelo 2
    + Timerange: Fixes a bug where custom time ranges didn’t respect UTC. #18248 1, @kaydelaney 2
    + remote_cache: Fix redis connstr parsing. #18204 1, @mblaschke
    + AddPanel: Fix issue when removing moved add panel widget . #17659 2, @dehrax
    + CLI: Fix encrypt-datasource-passwords fails with sql error. #18014, @marefr
    + Elasticsearch: Fix default max concurrent shard requests. #17770 4, @marefr
    + Explore: Fix browsing back to dashboard panel. #17061, @jschill
    + Explore: Fix filter by series level in logs graph. #17798, @marefr
    + Explore: Fix issues when loading and both graph/table are collapsed. #17113, @marefr
    + Explore: Fix selection/copy of log lines. #17121, @marefr
    + Fix: Wrap value of multi variable in array when coming from URL. #16992 1, @aocenas
    + Frontend: Fix for Json tree component not working. #17608, @srid12
    + Graphite: Fix for issue with alias function being moved last. #17791, @torkelo 2
    + Graphite: Fixes issue with seriesByTag &amp; function with variable param. #17795, @torkelo 2
    + Graphite: use POST for /metrics/find requests. #17814 2, @papagian 3
    + HTTP Server: Serve Grafana with a custom URL path prefix. #17048 6, @jan25
    + InfluxDB: Fixes single quotes are not escaped in label value filters. #17398 1, @Panzki
    + Prometheus: Correctly escape ‘|’ literals in interpolated PromQL variables. #16932, @Limess
    + Prometheus: Fix when adding label for metrics which contains colons in Explore. #16760, @tolwi
    + SinglestatPanel: Remove background color when value turns null. #17552 1, @druggieri
- Make phantomjs dependency configurable
- Create plugin directory and clean up (create in %install,
  add to %files) handling of /var/lib/grafana/* and

mgr-cfg:

- Remove commented code in test files
- Replace spacewalk-usix with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)
- Add mgr manpage links

mgr-custom-info:

- Bump version to 4.1.0 (bsc#1154940)

mgr-daemon:

- Bump version to 4.1.0 (bsc#1154940)
- Fix systemd timer configuration on SLE12 (bsc#1142038)

mgr-osad:

- Separate osa-dispatcher and jabberd so it can be disabled independently
- Replace spacewalk-usix with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)
- Move /usr/share/rhn/config-defaults to uyuni-base-common
- Require uyuni-base-common for /etc/rhn (for osa-dispatcher)
- Ensure bytes type when using hashlib to avoid traceback (bsc#1138822)

mgr-push:

- Replace spacewalk-usix and spacewalk-backend-libs with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)

mgr-virtualization:

- Replace spacewalk-usix with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)
- Fix mgr-virtualization timer

rhnlib:

- Fix building
- Fix malformed XML response when data contains non-ASCII chars (bsc#1154968)
- Bump version to 4.1.0 (bsc#1154940)
- Fix bootstrapping SLE11SP4 trad client with SSL enabled (bsc#1148177)

spacecmd:

- Only report real error, not result (bsc#1171687)
- Use defined return values for spacecmd methods so scripts can
  check for failure (bsc#1171687)
- Disable globbing for api subcommand to allow wildcards in filter
  settings (bsc#1163871)
- Bugfix: attempt to purge SSM when it is empty (bsc#1155372)
- Bump version to 4.1.0 (bsc#1154940)
- Prevent error when piping stdout in Python 2 (bsc#1153090)
- Java api expects content as encoded string instead of encoded bytes like before (bsc#1153277)
- Enable building and installing for Ubuntu 16.04 and Ubuntu 18.04
- Add unit test for schedule, errata, user, utils, misc, configchannel
  and kickstart modules
- Multiple minor bugfixes alongside the unit tests
- Bugfix: referenced variable before assignment.
- Add unit test for report, package, org, repo and group

spacewalk-client-tools:

- Add workaround for uptime overflow to spacewalk-update-status as well (bsc#1165921)
- Spell correctly 'successful' and 'successfully'
- Skip dmidecode data on aarch64 to prevent coredump (bsc#1113160)
- Replace spacewalk-usix with uyuni-common-libs
- Return a non-zero exit status on errors in rhn_check
- Bump version to 4.1.0 (bsc#1154940)
- Make a explicit requirement to systemd for spacewalk-client-tools
  when rhnsd timer is installed

spacewalk-koan:

- Bump version to 4.1.0 (bsc#1154940)
- Require commands we use in merge-rd.sh

spacewalk-oscap:

- Bump version to 4.1.0 (bsc#1154940)

spacewalk-remote-utils:

- Update spacewalk-create-channel with RHEL 7.7 channel definitions
- Bump version to 4.1.0 (bsc#1154940)

supportutils-plugin-susemanager-client:

- Bump version to 4.1.0 (bsc#1154940)

suseRegisterInfo:

- SuseRegisterInfo only needs perl-base, not full perl (bsc#1168310)
- Bump version to 4.1.0 (bsc#1154940)

zypp-plugin-spacewalk:

- Prevent issue with non-ASCII characters in Python 2 systems (bsc#1172462)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-21"/>
	<updated date="2020-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1113160">SUSE bug 1113160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134195">SUSE bug 1134195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138822">SUSE bug 1138822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141661">SUSE bug 1141661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142038">SUSE bug 1142038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143913">SUSE bug 1143913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148177">SUSE bug 1148177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153090">SUSE bug 1153090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153277">SUSE bug 1153277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154940">SUSE bug 1154940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154968">SUSE bug 1154968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155372">SUSE bug 1155372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163871">SUSE bug 1163871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165921">SUSE bug 1165921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168310">SUSE bug 1168310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170231">SUSE bug 1170231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170557">SUSE bug 1170557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171687">SUSE bug 1171687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172462">SUSE bug 1172462</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10215/">CVE-2019-10215 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10215">CVE-2019-10215 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15043/">CVE-2019-15043 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15043">CVE-2019-15043 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12245/">CVE-2020-12245 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12245">CVE-2020-12245 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13379/">CVE-2020-13379 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13379">CVE-2020-13379 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556353" comment="golang-github-prometheus-node_exporter-0.18.1-1.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151284" version="1" class="patch">
	<metadata>
		<title>Security update for xrdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1173580" ref_url="https://bugzilla.suse.com/1173580" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-4044" ref_url="https://www.suse.com/security/cve/CVE-2020-4044/" source="CVE"/>
		<description>
This update for xrdp fixes the following issues:

- Security fixes (bsc#1173580, CVE-2020-4044):
  + Add patches:
    * xrdp-cve-2020-4044-fix-0.patch
    * xrdp-cve-2020-4044-fix-1.patch
  + Rebase SLE patch:
    * xrdp-fate318398-change-expired-password.patch
- Update patch:
  + xrdp-Allow-sessions-with-32-bpp.patch.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-21"/>
	<updated date="2020-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173580">SUSE bug 1173580</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-4044/">CVE-2020-4044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4044">CVE-2020-4044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556354" comment="xrdp-0.9.0~git.1456906198.f422461-21.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151285" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_113 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721279" comment="kernel-default 4.4.180-94.113 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719606" comment="kgraft-patch-4_4_180-94_113-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556355" comment="kgraft-patch-4_4_180-94_113-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151286" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1173369" ref_url="https://bugzilla.suse.com/1173369" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15011" ref_url="https://www.suse.com/security/cve/CVE-2020-15011/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2020-15011: Fixed a possible Arbitrary Content Injection via the private archive login page (bsc#1173369).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-24"/>
	<updated date="2020-07-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173369">SUSE bug 1173369</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15011/">CVE-2020-15011 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15011">CVE-2020-15011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531104" comment="mailman-2.1.17-3.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151287" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_107 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721280" comment="kernel-default 4.4.180-94.107 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719608" comment="kgraft-patch-4_4_180-94_107-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556356" comment="kgraft-patch-4_4_180-94_107-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151288" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1173160" ref_url="https://bugzilla.suse.com/1173160" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-10745: Fixed an issue which parsing and packing of NBT and DNS packets containing dots could potentially have consumed excessive CPU (bsc#1173160).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10745">CVE-2020-10745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556357" comment="libdcerpc-binding0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538485" comment="libdcerpc-binding0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556358" comment="libdcerpc0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538487" comment="libdcerpc0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556359" comment="libndr-krb5pac0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538489" comment="libndr-krb5pac0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556360" comment="libndr-nbt0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538491" comment="libndr-nbt0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556361" comment="libndr-standard0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538493" comment="libndr-standard0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556362" comment="libndr0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538495" comment="libndr0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556363" comment="libnetapi0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538497" comment="libnetapi0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556364" comment="libsamba-credentials0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538499" comment="libsamba-credentials0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556365" comment="libsamba-errors0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538501" comment="libsamba-errors0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556366" comment="libsamba-hostconfig0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538503" comment="libsamba-hostconfig0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556367" comment="libsamba-passdb0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538505" comment="libsamba-passdb0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556368" comment="libsamba-util0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538507" comment="libsamba-util0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556369" comment="libsamdb0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538509" comment="libsamdb0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556370" comment="libsmbclient0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538511" comment="libsmbclient0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556371" comment="libsmbconf0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538513" comment="libsmbconf0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556372" comment="libsmbldap0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538515" comment="libsmbldap0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556373" comment="libtevent-util0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538517" comment="libtevent-util0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556374" comment="libwbclient0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538519" comment="libwbclient0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556375" comment="samba-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556376" comment="samba-client-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538522" comment="samba-client-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538523" comment="samba-doc-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556377" comment="samba-libs-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538525" comment="samba-libs-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556378" comment="samba-winbind-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538527" comment="samba-winbind-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151289" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1173998" ref_url="https://bugzilla.suse.com/1173998" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9806" ref_url="https://www.suse.com/security/cve/CVE-2020-9806/" source="CVE"/>
		<reference ref_id="CVE-2020-9807" ref_url="https://www.suse.com/security/cve/CVE-2020-9807/" source="CVE"/>
		<reference ref_id="CVE-2020-9843" ref_url="https://www.suse.com/security/cve/CVE-2020-9843/" source="CVE"/>
		<reference ref_id="CVE-2020-9850" ref_url="https://www.suse.com/security/cve/CVE-2020-9850/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.3 (bsc#1173998):
  + Enable kinetic scrolling with async scrolling.
  + Fix web process hangs on large GitHub pages.
  + Bubblewrap sandbox should not attempt to bind empty paths.
  + Fix threading issues in the media player.
  + Fix several crashes and rendering issues.
  + Security fixes:  CVE-2020-9802, CVE-2020-9803, CVE-2020-9805,
    CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850,
    CVE-2020-13753.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13753">CVE-2020-13753 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9802">CVE-2020-9802 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9803">CVE-2020-9803 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9805">CVE-2020-9805 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9806/">CVE-2020-9806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9806">CVE-2020-9806 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9807/">CVE-2020-9807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9807">CVE-2020-9807 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9843/">CVE-2020-9843 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9843">CVE-2020-9843 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9850/">CVE-2020-9850 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9850">CVE-2020-9850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556379" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556380" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556381" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556382" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556383" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556384" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151290" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1084632" ref_url="https://bugzilla.suse.com/1084632" source="BUGZILLA"/>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1173812" ref_url="https://bugzilla.suse.com/1173812" source="BUGZILLA"/>
		<reference ref_id="1174463" ref_url="https://bugzilla.suse.com/1174463" source="BUGZILLA"/>
		<reference ref_id="1174570" ref_url="https://bugzilla.suse.com/1174570" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308/" source="CVE"/>
		<reference ref_id="CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309/" source="CVE"/>
		<reference ref_id="CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310/" source="CVE"/>
		<reference ref_id="CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311/" source="CVE"/>
		<reference ref_id="CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706/" source="CVE"/>
		<reference ref_id="CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707/" source="CVE"/>
		<description>
This update for grub2 fixes the following issues:

- Fix for CVE-2020-10713 (bsc#1168994)
- Fix for CVE-2020-14308 CVE-2020-14309, CVE-2020-14310, CVE-2020-14311
  (bsc#1173812)
- Fix for CVE-2020-15706 (bsc#1174463)
- Fix for CVE-2020-15707 (bsc#1174570)

- Use overflow checking primitives where the arithmetic expression for buffer
  allocations may include unvalidated data
- Use grub_calloc for overflow check and return NULL when it would occur 
- Use gcc-9 compiler for overflow check builtins
- Backport gcc-9 build fixes
- Fix packed-not-aligned error on GCC 8 (bsc#1084632)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1084632">SUSE bug 1084632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174463">SUSE bug 1174463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174570">SUSE bug 1174570</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14308">CVE-2020-14308 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14309">CVE-2020-14309 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14310">CVE-2020-14310 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14311">CVE-2020-14311 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15706">CVE-2020-15706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15707">CVE-2020-15707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556385" comment="grub2-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554875" comment="grub2-arm64-efi-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538529" comment="grub2-i386-pc-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538531" comment="grub2-snapper-plugin-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538532" comment="grub2-systemd-sleep-plugin-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538533" comment="grub2-x86_64-efi-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538534" comment="grub2-x86_64-xen-2.02-4.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151291" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_103 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721277" comment="kernel-default 4.4.180-94.103 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719602" comment="kgraft-patch-4_4_180-94_103-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556386" comment="kgraft-patch-4_4_180-94_103-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151292" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1174415" ref_url="https://bugzilla.suse.com/1174415" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15900" ref_url="https://www.suse.com/security/cve/CVE-2020-15900/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issues:

- fixed CVE-2020-15900 Memory Corruption (SAFER Sandbox Breakout)
  cf. https://bugs.ghostscript.com/show_bug.cgi?id=702582
  (bsc#1174415)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-30"/>
	<updated date="2020-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174415">SUSE bug 1174415</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15900/">CVE-2020-15900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15900">CVE-2020-15900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556387" comment="ghostscript-9.52-23.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556388" comment="ghostscript-x11-9.52-23.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151293" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1173948" ref_url="https://bugzilla.suse.com/1173948" source="BUGZILLA"/>
		<reference ref_id="1174538" ref_url="https://bugzilla.suse.com/1174538" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.1.0 ESR
  * Fixed: Various stability, functionality, and security fixes (bsc#1174538)
  * CVE-2020-15652: Potential leak of redirect targets when loading scripts in a worker
  * CVE-2020-6514: WebRTC data channel leaks internal address to peer
  * CVE-2020-15655: Extension APIs could be used to bypass Same-Origin Policy
  * CVE-2020-15653: Bypassing iframe sandbox when allowing popups
  * CVE-2020-6463: Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture
  * CVE-2020-15656: Type confusion for special arguments in IonMonkey
  * CVE-2020-15658: Overriding file type when saving to disk
  * CVE-2020-15657: DLL hijacking due to incorrect loading path
  * CVE-2020-15654: Custom cursor can overlay user interface
  * CVE-2020-15659: Memory safety bugs fixed in Firefox 79 and Firefox ESR 78.1
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-31"/>
	<updated date="2020-07-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173948">SUSE bug 1173948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15652">CVE-2020-15652 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15653">CVE-2020-15653 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15654">CVE-2020-15654 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15655">CVE-2020-15655 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15656">CVE-2020-15656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15657">CVE-2020-15657 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15658">CVE-2020-15658 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15659">CVE-2020-15659 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6463">CVE-2020-6463 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6514">CVE-2020-6514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556389" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556390" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556391" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151294" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_100 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721278" comment="kernel-default 4.4.180-94.100 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719604" comment="kgraft-patch-4_4_180-94_100-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556392" comment="kgraft-patch-4_4_180-94_100-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151295" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-04"/>
	<updated date="2020-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556393" comment="libX11-6-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531125" comment="libX11-6-32bit-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531126" comment="libX11-data-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556394" comment="libX11-xcb1-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531128" comment="libX11-xcb1-32bit-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556395" comment="libxcb-dri2-0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531130" comment="libxcb-dri2-0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556396" comment="libxcb-dri3-0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531132" comment="libxcb-dri3-0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556397" comment="libxcb-glx0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531134" comment="libxcb-glx0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556398" comment="libxcb-present0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531136" comment="libxcb-present0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556399" comment="libxcb-randr0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556400" comment="libxcb-render0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531139" comment="libxcb-render0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556401" comment="libxcb-shape0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556402" comment="libxcb-shm0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531142" comment="libxcb-shm0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556403" comment="libxcb-sync1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531144" comment="libxcb-sync1-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556404" comment="libxcb-xf86dri0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556405" comment="libxcb-xfixes0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531147" comment="libxcb-xfixes0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556406" comment="libxcb-xinerama0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556407" comment="libxcb-xkb1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531150" comment="libxcb-xkb1-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556408" comment="libxcb-xv0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556409" comment="libxcb1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531153" comment="libxcb1-32bit-1.10-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151296" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1146351" ref_url="https://bugzilla.suse.com/1146351" source="BUGZILLA"/>
		<reference ref_id="1149652" ref_url="https://bugzilla.suse.com/1149652" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1162002" ref_url="https://bugzilla.suse.com/1162002" source="BUGZILLA"/>
		<reference ref_id="1164910" ref_url="https://bugzilla.suse.com/1164910" source="BUGZILLA"/>
		<reference ref_id="1170011" ref_url="https://bugzilla.suse.com/1170011" source="BUGZILLA"/>
		<reference ref_id="1170618" ref_url="https://bugzilla.suse.com/1170618" source="BUGZILLA"/>
		<reference ref_id="1171078" ref_url="https://bugzilla.suse.com/1171078" source="BUGZILLA"/>
		<reference ref_id="1171189" ref_url="https://bugzilla.suse.com/1171189" source="BUGZILLA"/>
		<reference ref_id="1171191" ref_url="https://bugzilla.suse.com/1171191" source="BUGZILLA"/>
		<reference ref_id="1171220" ref_url="https://bugzilla.suse.com/1171220" source="BUGZILLA"/>
		<reference ref_id="1171732" ref_url="https://bugzilla.suse.com/1171732" source="BUGZILLA"/>
		<reference ref_id="1171988" ref_url="https://bugzilla.suse.com/1171988" source="BUGZILLA"/>
		<reference ref_id="1172453" ref_url="https://bugzilla.suse.com/1172453" source="BUGZILLA"/>
		<reference ref_id="1172458" ref_url="https://bugzilla.suse.com/1172458" source="BUGZILLA"/>
		<reference ref_id="1172775" ref_url="https://bugzilla.suse.com/1172775" source="BUGZILLA"/>
		<reference ref_id="1172999" ref_url="https://bugzilla.suse.com/1172999" source="BUGZILLA"/>
		<reference ref_id="1173280" ref_url="https://bugzilla.suse.com/1173280" source="BUGZILLA"/>
		<reference ref_id="1173658" ref_url="https://bugzilla.suse.com/1173658" source="BUGZILLA"/>
		<reference ref_id="1174115" ref_url="https://bugzilla.suse.com/1174115" source="BUGZILLA"/>
		<reference ref_id="1174462" ref_url="https://bugzilla.suse.com/1174462" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810/" source="CVE"/>
		<reference ref_id="CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135/" source="CVE"/>
		<reference ref_id="CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).
- CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).
- CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).
- CVE-2020-10732: A flaw was found in the implementation of userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed  (bnc#1172999).
- CVE-2020-14416: A race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. (bnc#1172775).
- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).

The following non-security bugs were fixed:

- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170618).
- ibmvnic: Do not process device remove during device reset (bsc#1065729).
- ibmvnic: Do not process reset during or after device removal (bsc#1149652 ltc#179635).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).
- ibmvnic: Unmap DMA address of TX descriptor buffers after use (bsc#1146351 ltc#180726).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1164910).
- net/ibmvnic: Fix missing { in __ibmvnic_reset (bsc#1149652 ltc#179635).
- net/ibmvnic: free reset work of removed device from queue (bsc#1149652 ltc#179635).
- net/ibmvnic: prevent more than one thread from running in reset (bsc#1152457 ltc#174432).
- net/ibmvnic: unlock rtnl_lock in reset so linkwatch_event can run (bsc#1152457 ltc#174432).
- udp: drop corrupt packets earlier to avoid data corruption (bsc#1173658).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146351">SUSE bug 1146351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149652">SUSE bug 1149652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164910">SUSE bug 1164910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170011">SUSE bug 1170011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170618">SUSE bug 1170618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171078">SUSE bug 1171078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171189">SUSE bug 1171189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171191">SUSE bug 1171191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171732">SUSE bug 1171732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171988">SUSE bug 1171988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172453">SUSE bug 1172453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172458">SUSE bug 1172458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173280">SUSE bug 1173280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173658">SUSE bug 1173658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174115">SUSE bug 1174115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20810">CVE-2019-20810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20812">CVE-2019-20812 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0305">CVE-2020-0305 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10135">CVE-2020-10135 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10711">CVE-2020-10711 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10732">CVE-2020-10732 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10751">CVE-2020-10751 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10773">CVE-2020-10773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12771">CVE-2020-12771 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13974">CVE-2020-13974 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14416">CVE-2020-14416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556410" comment="kernel-default-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556411" comment="kernel-default-base-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556412" comment="kernel-default-devel-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556413" comment="kernel-default-kgraft-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538541" comment="kernel-devel-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538542" comment="kernel-macros-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538543" comment="kernel-source-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556414" comment="kernel-syms-4.4.180-94.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556415" comment="kgraft-patch-4_4_180-94_127-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151297" version="1" class="patch">
	<metadata>
		<title>Security update for python-ipaddress (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<description>
This update for python-ipaddress fixes the following issues:

- Add CVE-2020-14422-ipaddress-hash-collision.patch fixing
  CVE-2020-14422 (bsc#1173274, bpo#41004), where hash collisions
  in IPv4Interface and IPv6Interface could lead to DOS. 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14422">CVE-2020-14422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531162" comment="python-ipaddress-1.0.18-3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151298" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1173477" ref_url="https://bugzilla.suse.com/1173477" source="BUGZILLA"/>
		<reference ref_id="1173691" ref_url="https://bugzilla.suse.com/1173691" source="BUGZILLA"/>
		<reference ref_id="1173694" ref_url="https://bugzilla.suse.com/1173694" source="BUGZILLA"/>
		<reference ref_id="1173700" ref_url="https://bugzilla.suse.com/1173700" source="BUGZILLA"/>
		<reference ref_id="1173701" ref_url="https://bugzilla.suse.com/1173701" source="BUGZILLA"/>
		<reference ref_id="1173743" ref_url="https://bugzilla.suse.com/1173743" source="BUGZILLA"/>
		<reference ref_id="1173874" ref_url="https://bugzilla.suse.com/1173874" source="BUGZILLA"/>
		<reference ref_id="1173875" ref_url="https://bugzilla.suse.com/1173875" source="BUGZILLA"/>
		<reference ref_id="1173876" ref_url="https://bugzilla.suse.com/1173876" source="BUGZILLA"/>
		<reference ref_id="1173880" ref_url="https://bugzilla.suse.com/1173880" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922/" source="CVE"/>
		<reference ref_id="CVE-2018-21247" ref_url="https://www.suse.com/security/cve/CVE-2018-21247/" source="CVE"/>
		<reference ref_id="CVE-2019-20839" ref_url="https://www.suse.com/security/cve/CVE-2019-20839/" source="CVE"/>
		<reference ref_id="CVE-2019-20840" ref_url="https://www.suse.com/security/cve/CVE-2019-20840/" source="CVE"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398/" source="CVE"/>
		<reference ref_id="CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399/" source="CVE"/>
		<reference ref_id="CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400/" source="CVE"/>
		<reference ref_id="CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401/" source="CVE"/>
		<reference ref_id="CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402/" source="CVE"/>
		<reference ref_id="CVE-2020-14403" ref_url="https://www.suse.com/security/cve/CVE-2020-14403/" source="CVE"/>
		<reference ref_id="CVE-2020-14404" ref_url="https://www.suse.com/security/cve/CVE-2020-14404/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- security update
  fix CVE-2018-21247 [bsc#1173874], uninitialized memory contents are vulnerable to Information leak
  fix CVE-2019-20839 [bsc#1173875], buffer overflow in ConnectClientToUnixSock()
  fix CVE-2019-20840 [bsc#1173876], unaligned accesses in hybiReadAndDecode can lead to denial of service
  fix CVE-2020-14398 [bsc#1173880], improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c
  fix CVE-2020-14397 [bsc#1173700], NULL pointer dereference in libvncserver/rfbregion.c
  fix CVE-2020-14399 [bsc#1173743], Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c.
  fix CVE-2020-14400 [bsc#1173691], Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c.
  fix CVE-2020-14401 [bsc#1173694], potential integer overflows in libvncserver/scale.c
  fix CVE-2020-14402 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2020-14403 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2020-14404 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2017-18922 [bsc#1173477], preauth buffer overwrite
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-07"/>
	<updated date="2020-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173691">SUSE bug 1173691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173694">SUSE bug 1173694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173700">SUSE bug 1173700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173743">SUSE bug 1173743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173874">SUSE bug 1173874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173875">SUSE bug 1173875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173876">SUSE bug 1173876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173880">SUSE bug 1173880</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18922">CVE-2017-18922 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-21247/">CVE-2018-21247 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21247">CVE-2018-21247 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20839/">CVE-2019-20839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20839">CVE-2019-20839 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20840/">CVE-2019-20840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20840">CVE-2019-20840 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14397">CVE-2020-14397 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14398">CVE-2020-14398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14399">CVE-2020-14399 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14400">CVE-2020-14400 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14401">CVE-2020-14401 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14402">CVE-2020-14402 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14403/">CVE-2020-14403 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14403">CVE-2020-14403 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14404/">CVE-2020-14404 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14404">CVE-2020-14404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556416" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556417" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151299" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- bsc#1174543 - secure boot related fixes
- bsc#1163019 - CVE-2020-8608: Potential OOB access due to unsafe snprintf() usages
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-07"/>
	<updated date="2020-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538546" comment="xen-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538547" comment="xen-doc-html-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538548" comment="xen-libs-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538549" comment="xen-libs-32bit-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538550" comment="xen-tools-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538551" comment="xen-tools-domU-4.9.4_10-3.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151300" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1156146" ref_url="https://bugzilla.suse.com/1156146" source="BUGZILLA"/>
		<reference ref_id="1171477" ref_url="https://bugzilla.suse.com/1171477" source="BUGZILLA"/>
		<reference ref_id="1171930" ref_url="https://bugzilla.suse.com/1171930" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14818" ref_url="https://www.suse.com/security/cve/CVE-2019-14818/" source="CVE"/>
		<reference ref_id="CVE-2020-10722" ref_url="https://www.suse.com/security/cve/CVE-2020-10722/" source="CVE"/>
		<description>
This update for dpdk to version 16.11.9 following issue:

- CVE-2019-14818: Fixed a memory leak vulnerability caused by a malicious container may lead to to denial of service (bsc#1156146).
- CVE-2020-12693: Fixed an authentication bypass via an alternate path or channel (boo#1172004).

- rebuilt with new signing key. (bsc#1174543)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156146">SUSE bug 1156146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171477">SUSE bug 1171477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171930">SUSE bug 1171930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14818/">CVE-2019-14818 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14818">CVE-2019-14818 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10722/">CVE-2020-10722 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10722">CVE-2020-10722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556418" comment="dpdk-16.11.9-8.15.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538553" comment="dpdk-kmp-default-16.11.9_k4.4.180_94.127-8.15.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554903" comment="dpdk-thunderx-16.11.9-8.15.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554904" comment="dpdk-thunderx-kmp-default-16.11.9_k4.4.180_94.127-8.15.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556419" comment="dpdk-tools-16.11.9-8.15.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151301" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556420" comment="libX11-6-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531166" comment="libX11-6-32bit-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531167" comment="libX11-data-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556421" comment="libX11-xcb1-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531169" comment="libX11-xcb1-32bit-1.6.2-12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151302" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1174662" ref_url="https://bugzilla.suse.com/1174662" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-9862" ref_url="https://www.suse.com/security/cve/CVE-2020-9862/" source="CVE"/>
		<reference ref_id="CVE-2020-9893" ref_url="https://www.suse.com/security/cve/CVE-2020-9893/" source="CVE"/>
		<reference ref_id="CVE-2020-9894" ref_url="https://www.suse.com/security/cve/CVE-2020-9894/" source="CVE"/>
		<reference ref_id="CVE-2020-9895" ref_url="https://www.suse.com/security/cve/CVE-2020-9895/" source="CVE"/>
		<reference ref_id="CVE-2020-9915" ref_url="https://www.suse.com/security/cve/CVE-2020-9915/" source="CVE"/>
		<reference ref_id="CVE-2020-9925" ref_url="https://www.suse.com/security/cve/CVE-2020-9925/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.4 (bsc#1174662):
  + Fix several crashes and rendering issues.
  + Security fixes: CVE-2020-9862, CVE-2020-9893, CVE-2020-9894,
    CVE-2020-9895, CVE-2020-9915, CVE-2020-9925.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9862/">CVE-2020-9862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9862">CVE-2020-9862 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9893/">CVE-2020-9893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9893">CVE-2020-9893 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9894/">CVE-2020-9894 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9894">CVE-2020-9894 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9895/">CVE-2020-9895 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9895">CVE-2020-9895 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9915/">CVE-2020-9915 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9915">CVE-2020-9915 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9925/">CVE-2020-9925 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9925">CVE-2020-9925 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556422" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556423" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556424" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556425" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556426" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556427" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151303" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1174922" ref_url="https://bugzilla.suse.com/1174922" source="BUGZILLA"/>
		<reference ref_id="1174923" ref_url="https://bugzilla.suse.com/1174923" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12673" ref_url="https://www.suse.com/security/cve/CVE-2020-12673/" source="CVE"/>
		<reference ref_id="CVE-2020-12674" ref_url="https://www.suse.com/security/cve/CVE-2020-12674/" source="CVE"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2020-12673: improper implementation of NTLM does not check message buffer size (bsc#1174922).
- CVE-2020-12674: improper implementation of RPA mechanism (bsc#1174923).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-19"/>
	<updated date="2020-08-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174922">SUSE bug 1174922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174923">SUSE bug 1174923</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12673/">CVE-2020-12673 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12673">CVE-2020-12673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12674/">CVE-2020-12674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12674">CVE-2020-12674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556428" comment="dovecot22-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556429" comment="dovecot22-backend-mysql-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556430" comment="dovecot22-backend-pgsql-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556431" comment="dovecot22-backend-sqlite-2.2.31-19.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151304" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1172745" ref_url="https://bugzilla.suse.com/1172745" source="BUGZILLA"/>
		<reference ref_id="1174421" ref_url="https://bugzilla.suse.com/1174421" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705/" source="CVE"/>
		<description>
This update for grub2 fixes the following issues:

- CVE-2020-15705: Fail kernel validation without shim protocol (bsc#1174421).
- Add fibre channel device's ofpath support to grub-ofpathname and search hint to speed up root device discovery (bsc#1172745).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172745">SUSE bug 1172745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174421">SUSE bug 1174421</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15705">CVE-2020-15705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556432" comment="grub2-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554919" comment="grub2-arm64-efi-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538556" comment="grub2-i386-pc-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538558" comment="grub2-snapper-plugin-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538559" comment="grub2-systemd-sleep-plugin-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538560" comment="grub2-x86_64-efi-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538561" comment="grub2-x86_64-xen-2.02-4.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151305" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1160888" ref_url="https://bugzilla.suse.com/1160888" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14907" ref_url="https://www.suse.com/security/cve/CVE-2019-14907/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2019-14907: Fixed a Server-side crash after charset conversion failure during NTLMSSP processing (bsc#1160888).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-24"/>
	<updated date="2020-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1160888">SUSE bug 1160888</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14907/">CVE-2019-14907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14907">CVE-2019-14907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556433" comment="libdcerpc-binding0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522552" comment="libdcerpc-binding0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556434" comment="libdcerpc0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522554" comment="libdcerpc0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556435" comment="libndr-krb5pac0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522556" comment="libndr-krb5pac0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556436" comment="libndr-nbt0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522558" comment="libndr-nbt0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556437" comment="libndr-standard0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522560" comment="libndr-standard0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556438" comment="libndr0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522562" comment="libndr0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556439" comment="libnetapi0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522564" comment="libnetapi0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556440" comment="libsamba-credentials0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522566" comment="libsamba-credentials0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556441" comment="libsamba-errors0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522568" comment="libsamba-errors0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556442" comment="libsamba-hostconfig0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522570" comment="libsamba-hostconfig0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556443" comment="libsamba-passdb0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522572" comment="libsamba-passdb0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556444" comment="libsamba-util0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522574" comment="libsamba-util0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556445" comment="libsamdb0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522576" comment="libsamdb0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556446" comment="libsmbclient0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522578" comment="libsmbclient0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556447" comment="libsmbconf0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522580" comment="libsmbconf0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556448" comment="libsmbldap0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522582" comment="libsmbldap0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556449" comment="libtevent-util0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522584" comment="libtevent-util0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556450" comment="libwbclient0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522586" comment="libwbclient0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556451" comment="samba-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556452" comment="samba-client-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522589" comment="samba-client-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522590" comment="samba-doc-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556453" comment="samba-libs-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522592" comment="samba-libs-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556454" comment="samba-winbind-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522594" comment="samba-winbind-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151306" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1174633" ref_url="https://bugzilla.suse.com/1174633" source="BUGZILLA"/>
		<reference ref_id="1174635" ref_url="https://bugzilla.suse.com/1174635" source="BUGZILLA"/>
		<reference ref_id="1174638" ref_url="https://bugzilla.suse.com/1174638" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14346" ref_url="https://www.suse.com/security/cve/CVE-2020-14346/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14347: Leak of uninitialized heap memory from the X server to clients on pixmap allocation (bsc#1174633, ZDI-CAN-11426).
- CVE-2020-14346: XIChangeHierarchy Integer Underflow Privilege Escalation Vulnerability (bsc#1174638, ZDI-CAN-11429).
- CVE-2020-14345: XKB out-of-bounds access privilege escalation vulnerability (bsc#1174635, ZDI-CAN-11428).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-26"/>
	<updated date="2020-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14345">CVE-2020-14345 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14346/">CVE-2020-14346 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14346">CVE-2020-14346 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14347">CVE-2020-14347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556455" comment="xorg-x11-server-7.6_1.18.3-76.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556456" comment="xorg-x11-server-extra-7.6_1.18.3-76.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151307" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17631" ref_url="https://www.suse.com/security/cve/CVE-2019-17631/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2996" ref_url="https://www.suse.com/security/cve/CVE-2019-2996/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2958
    CVE-2019-2962 CVE-2019-2964 CVE-2019-2975
    CVE-2019-2978 CVE-2019-2983 CVE-2019-2988
    CVE-2019-2989 CVE-2019-2992 CVE-2019-2996
    CVE-2019-2999 CVE-2019-2973 CVE-2019-2981
    CVE-2019-17631
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17631/">CVE-2019-17631 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17631">CVE-2019-17631 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2958">CVE-2019-2958 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2975">CVE-2019-2975 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2996/">CVE-2019-2996 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2996">CVE-2019-2996 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151308" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1174910" ref_url="https://bugzilla.suse.com/1174910" source="BUGZILLA"/>
		<reference ref_id="1174913" ref_url="https://bugzilla.suse.com/1174913" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14361: Fix XkbSelectEvents() integer underflow (bsc#1174910 ZDI-CAN-11573).
- CVE-2020-14362: Fix XRecordRegisterClients() Integer underflow (bsc#1174913 ZDI-CAN-11574).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-01"/>
	<updated date="2020-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14361">CVE-2020-14361 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14362">CVE-2020-14362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556457" comment="xorg-x11-server-7.6_1.18.3-76.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556458" comment="xorg-x11-server-extra-7.6_1.18.3-76.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151309" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1175070" ref_url="https://bugzilla.suse.com/1175070" source="BUGZILLA"/>
		<reference ref_id="1175071" ref_url="https://bugzilla.suse.com/1175071" source="BUGZILLA"/>
		<reference ref_id="1175072" ref_url="https://bugzilla.suse.com/1175072" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11985" ref_url="https://www.suse.com/security/cve/CVE-2020-11985/" source="CVE"/>
		<reference ref_id="CVE-2020-11993" ref_url="https://www.suse.com/security/cve/CVE-2020-11993/" source="CVE"/>
		<reference ref_id="CVE-2020-9490" ref_url="https://www.suse.com/security/cve/CVE-2020-9490/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-9490: Fixed a crash caused by a specially crafted value for the 'Cache-Digest' header in a HTTP/2 request (bsc#1175071).
- CVE-2020-11985: IP address spoofing when proxying using mod_remoteip and mod_rewrite (bsc#1175072).
- CVE-2020-11993: When trace/debug was enabled for the HTTP/2 module logging statements were made on the wrong connection (bsc#1175070).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175070">SUSE bug 1175070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175071">SUSE bug 1175071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175072">SUSE bug 1175072</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11985/">CVE-2020-11985 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11985">CVE-2020-11985 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11993/">CVE-2020-11993 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11993">CVE-2020-11993 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-9490/">CVE-2020-9490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9490">CVE-2020-9490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556459" comment="apache2-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531260" comment="apache2-doc-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556460" comment="apache2-example-pages-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556461" comment="apache2-prefork-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556462" comment="apache2-utils-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556463" comment="apache2-worker-2.4.23-29.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151310" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 15 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14581
  CVE-2020-14556 CVE-2020-14621 CVE-2020-14593 CVE-2020-14583
  CVE-2019-17639
  * Class Libraries:
    - JAVA.UTIL.ZIP.DEFLATER OPERATIONS THROW JAVA.LANG.INTERNALERROR
    - JAVA 8 DECODER OBJECTS CONSUME A LARGE AMOUNT OF JAVA HEAP
    - TRANSLATION MESSAGES UPDATE FOR JCL
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Java Virtual Machine:
    - IBM JAVA REGISTERS A HANDLER BY DEFAULT FOR SIGABRT
    - LARGE MEMORY FOOTPRINT HELD BY TRACECONTEXT OBJECT
  * JIT Compiler:
    - CRASH IN THE INTERPRETER AFTER OSR FROM INLINED SYNCHRONIZED METHOD
      IN DEBUGGING MODE
    - INTERMITTENT ASSERTION FAILURE REPORTED
    - CRASH IN RESOLVECLASSREF() DURING AOT LOAD
    - JIT CRASH DURING CLASS UNLOADING IN J9METHOD_HT::ONCLASSUNLOADING()
    - SEGMENTATION FAULT WHILE COMPILING A METHOD
    - UNEXPECTED CLASSCASTEXCEPTION THROWN IN HIGH LEVEL PARALLEL
      APPLICATION ON IBM Z PLATFORM
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
    - CHANGES TO IBMJCE AND IBMJCEPLUS PROVIDERS
    - IBMJCEPLUS FAILS, WHEN THE SECURITY MANAGER IS ENABLED, WITH
      DEFAULT PERMISSIONS, SPECIFIED IN JAVA.POLICY FILE
    - IN CERTAIN INSTANCES, IBMJCEPLUS PROVIDER THROWS EXCEPTION FROM
      KEYFACTORY CLASS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17639">CVE-2019-17639 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531265" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531267" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151311" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="1175665" ref_url="https://bugzilla.suse.com/1175665" source="BUGZILLA"/>
		<reference ref_id="1175671" ref_url="https://bugzilla.suse.com/1175671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811/" source="CVE"/>
		<reference ref_id="CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-24606: Fix livelocking in peerDigestHandleReply (bsc#1175671).
- CVE-2020-15811: Improve Transfer-Encoding handling (bsc#1175665).
- CVE-2020-15810: Enforce token characters for field-name (bsc#1175664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175665">SUSE bug 1175665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175671">SUSE bug 1175671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15810">CVE-2020-15810 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15811">CVE-2020-15811 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24606">CVE-2020-24606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556464" comment="squid-3.5.21-26.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151312" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1175239" ref_url="https://bugzilla.suse.com/1175239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363/" source="CVE"/>
		<description>
This update for libX11 fixes the following issues:

- CVE-2020-14363: Fix an integer overflow in init_om() (bsc#1175239).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175239">SUSE bug 1175239</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14363">CVE-2020-14363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556465" comment="libX11-6-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531271" comment="libX11-6-32bit-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531272" comment="libX11-data-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556466" comment="libX11-xcb1-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531274" comment="libX11-xcb1-32bit-1.6.2-12.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151313" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 70 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14621
  CVE-2020-14593 CVE-2020-14583 CVE-2019-17639
  * Class Libraries:
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17639">CVE-2019-17639 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531275" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531277" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531278" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151314" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1173100" ref_url="https://bugzilla.suse.com/1173100" source="BUGZILLA"/>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173661" ref_url="https://bugzilla.suse.com/1173661" source="BUGZILLA"/>
		<reference ref_id="1173663" ref_url="https://bugzilla.suse.com/1173663" source="BUGZILLA"/>
		<reference ref_id="1173664" ref_url="https://bugzilla.suse.com/1173664" source="BUGZILLA"/>
		<reference ref_id="1173665" ref_url="https://bugzilla.suse.com/1173665" source="BUGZILLA"/>
		<reference ref_id="1173666" ref_url="https://bugzilla.suse.com/1173666" source="BUGZILLA"/>
		<reference ref_id="1173867" ref_url="https://bugzilla.suse.com/1173867" source="BUGZILLA"/>
		<reference ref_id="1173869" ref_url="https://bugzilla.suse.com/1173869" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1173963" ref_url="https://bugzilla.suse.com/1173963" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2019-18680" ref_url="https://www.suse.com/security/cve/CVE-2019-18680/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_103 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-0155: Fixed a privilege escalation in the i915 graphics driver (bsc#1173663).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).
- CVE-2019-18680: Fixed a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c (bsc#1173867).
- CVE-2019-14816: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173666).
- CVE-2019-14814: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173664).
- CVE-2019-14815: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173665).
- CVE-2019-14901: Fixed a heap overflow in the Marvell WiFi driver (bsc#1173661).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173100">SUSE bug 1173100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173661">SUSE bug 1173661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173663">SUSE bug 1173663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173664">SUSE bug 1173664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173665">SUSE bug 1173665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173666">SUSE bug 1173666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173867">SUSE bug 1173867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173869">SUSE bug 1173869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173963">SUSE bug 1173963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0155">CVE-2019-0155 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14814">CVE-2019-14814 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14815">CVE-2019-14815 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14816">CVE-2019-14816 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14895">CVE-2019-14895 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14901">CVE-2019-14901 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18680/">CVE-2019-18680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18680">CVE-2019-18680 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19447">CVE-2019-19447 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9458">CVE-2019-9458 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721277" comment="kernel-default 4.4.180-94.103 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719602" comment="kgraft-patch-4_4_180-94_103-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556467" comment="kgraft-patch-4_4_180-94_103-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151315" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1173100" ref_url="https://bugzilla.suse.com/1173100" source="BUGZILLA"/>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173661" ref_url="https://bugzilla.suse.com/1173661" source="BUGZILLA"/>
		<reference ref_id="1173663" ref_url="https://bugzilla.suse.com/1173663" source="BUGZILLA"/>
		<reference ref_id="1173867" ref_url="https://bugzilla.suse.com/1173867" source="BUGZILLA"/>
		<reference ref_id="1173869" ref_url="https://bugzilla.suse.com/1173869" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1173963" ref_url="https://bugzilla.suse.com/1173963" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2019-18680" ref_url="https://www.suse.com/security/cve/CVE-2019-18680/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_107 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-0155: Fixed a privilege escalation in the i915 graphics driver (bsc#1173663).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).
- CVE-2019-18680: Fixed a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c (bsc#1173867).
- CVE-2019-14901: Fixed a heap overflow in the Marvell WiFi driver (bsc#1173661).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173100">SUSE bug 1173100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173661">SUSE bug 1173661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173663">SUSE bug 1173663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173867">SUSE bug 1173867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173869">SUSE bug 1173869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173963">SUSE bug 1173963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0155">CVE-2019-0155 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14895">CVE-2019-14895 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14901">CVE-2019-14901 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18680/">CVE-2019-18680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18680">CVE-2019-18680 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19447">CVE-2019-19447 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9458">CVE-2019-9458 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721280" comment="kernel-default 4.4.180-94.107 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719608" comment="kgraft-patch-4_4_180-94_107-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556468" comment="kgraft-patch-4_4_180-94_107-default-7-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151316" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1173100" ref_url="https://bugzilla.suse.com/1173100" source="BUGZILLA"/>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173869" ref_url="https://bugzilla.suse.com/1173869" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1173963" ref_url="https://bugzilla.suse.com/1173963" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_113 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173100">SUSE bug 1173100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173869">SUSE bug 1173869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173963">SUSE bug 1173963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14895">CVE-2019-14895 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19447">CVE-2019-19447 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9458">CVE-2019-9458 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721279" comment="kernel-default 4.4.180-94.113 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719606" comment="kgraft-patch-4_4_180-94_113-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556469" comment="kgraft-patch-4_4_180-94_113-default-6-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151317" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_116 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721281" comment="kernel-default 4.4.180-94.116 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719610" comment="kgraft-patch-4_4_180-94_116-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556470" comment="kgraft-patch-4_4_180-94_116-default-3-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151318" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_121 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721282" comment="kernel-default 4.4.180-94.121 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719612" comment="kgraft-patch-4_4_180-94_121-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556471" comment="kgraft-patch-4_4_180-94_121-default-2-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151319" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_124 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721283" comment="kernel-default 4.4.180-94.124 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719614" comment="kgraft-patch-4_4_180-94_124-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556472" comment="kgraft-patch-4_4_180-94_124-default-2-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151320" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556473" comment="kgraft-patch-4_4_180-94_127-default-2-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151321" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1173991" ref_url="https://bugzilla.suse.com/1173991" source="BUGZILLA"/>
		<reference ref_id="1174284" ref_url="https://bugzilla.suse.com/1174284" source="BUGZILLA"/>
		<reference ref_id="1175686" ref_url="https://bugzilla.suse.com/1175686" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.2.0 ESR
  * Fixed: Various stability, functionality, and security fixes
- Mozilla Firefox ESR 78.2
  MFSA 2020-38 (bsc#1175686)
  * CVE-2020-15663 (bmo#1643199)
    Downgrade attack on the Mozilla Maintenance Service could
    have resulted in escalation of privilege
  * CVE-2020-15664 (bmo#1658214)
    Attacker-induced prompt for extension installation
  * CVE-2020-15670 (bmo#1651001, bmo#1651449, bmo#1653626,
    bmo#1656957)
    Memory safety bugs fixed in Firefox 80 and Firefox ESR 78.2

- Fixed Firefox tab crash in FIPS mode (bsc#1174284).

- Fix broken translation-loading. (bsc#1173991) 
  * allow addon sideloading
  * mark signatures for langpacks non-mandatory
  * do not autodisable user profile scopes
- Google API key is not usable for geolocation service any more
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173991">SUSE bug 1173991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174284">SUSE bug 1174284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15663">CVE-2020-15663 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15664">CVE-2020-15664 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15670">CVE-2020-15670 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556474" comment="MozillaFirefox-78.2.0-112.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556475" comment="MozillaFirefox-devel-78.2.0-112.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556476" comment="MozillaFirefox-translations-common-78.2.0-112.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151322" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1152107" ref_url="https://bugzilla.suse.com/1152107" source="BUGZILLA"/>
		<reference ref_id="1173798" ref_url="https://bugzilla.suse.com/1173798" source="BUGZILLA"/>
		<reference ref_id="1174205" ref_url="https://bugzilla.suse.com/1174205" source="BUGZILLA"/>
		<reference ref_id="1174757" ref_url="https://bugzilla.suse.com/1174757" source="BUGZILLA"/>
		<reference ref_id="1174771" ref_url="https://bugzilla.suse.com/1174771" source="BUGZILLA"/>
		<reference ref_id="1175112" ref_url="https://bugzilla.suse.com/1175112" source="BUGZILLA"/>
		<reference ref_id="1175127" ref_url="https://bugzilla.suse.com/1175127" source="BUGZILLA"/>
		<reference ref_id="1175228" ref_url="https://bugzilla.suse.com/1175228" source="BUGZILLA"/>
		<reference ref_id="1175691" ref_url="https://bugzilla.suse.com/1175691" source="BUGZILLA"/>
		<reference ref_id="1176069" ref_url="https://bugzilla.suse.com/1176069" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).
- CVE-2019-16746: Fixed an improper check of the length of variable elements in a beacon head, leading to a buffer overflow (bsc#1152107).
- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).

The following non-security bugs were fixed:

- bonding: fix active-backup failover for current ARP slave (bsc#1174771).
- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1175691).
- ocfs2: add trimfs dlm lock resource (bsc#1175228).
- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).
- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-09"/>
	<updated date="2020-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152107">SUSE bug 1152107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173798">SUSE bug 1173798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174757">SUSE bug 1174757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174771">SUSE bug 1174771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175112">SUSE bug 1175112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175127">SUSE bug 1175127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175228">SUSE bug 1175228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175691">SUSE bug 1175691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14314">CVE-2020-14314 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16166">CVE-2020-16166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556477" comment="kernel-default-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556478" comment="kernel-default-base-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556479" comment="kernel-default-devel-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556480" comment="kernel-default-kgraft-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538595" comment="kernel-devel-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538596" comment="kernel-macros-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538597" comment="kernel-source-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556481" comment="kernel-syms-4.4.180-94.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556482" comment="kgraft-patch-4_4_180-94_130-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151323" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update java-1_8_0-openjdk to version jdk8u242 (icedtea 3.15.0) (January 2020 CPU, bsc#1160968):

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2020-2590: Improve Kerberos interop capabilities
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2601: Better Ticket Granting Services
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support
- CVE-2020-2654: Improve Object Identifier Processing
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-30"/>
	<updated date="2020-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2590">CVE-2020-2590 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2601">CVE-2020-2601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556483" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556484" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556485" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556486" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151324" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1164860" ref_url="https://bugzilla.suse.com/1164860" source="BUGZILLA"/>
		<reference ref_id="1174117" ref_url="https://bugzilla.suse.com/1174117" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13935" ref_url="https://www.suse.com/security/cve/CVE-2020-13935/" source="CVE"/>
		<reference ref_id="CVE-2020-1935" ref_url="https://www.suse.com/security/cve/CVE-2020-1935/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-1935: Fixed an HTTP request smuggling vulnerability (bsc#1164860).
- CVE-2020-13935: Fixed a WebSocket DoS (bsc#1174117).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-11"/>
	<updated date="2020-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1164860">SUSE bug 1164860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174117">SUSE bug 1174117</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13935/">CVE-2020-13935 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13935">CVE-2020-13935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1935/">CVE-2020-1935 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1935">CVE-2020-1935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531293" comment="tomcat-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531294" comment="tomcat-admin-webapps-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531295" comment="tomcat-docs-webapp-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531296" comment="tomcat-el-3_0-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531297" comment="tomcat-javadoc-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531298" comment="tomcat-jsp-2_3-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531299" comment="tomcat-lib-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531300" comment="tomcat-servlet-3_1-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531301" comment="tomcat-webapps-8.0.53-29.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151325" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1175626" ref_url="https://bugzilla.suse.com/1175626" source="BUGZILLA"/>
		<reference ref_id="1175656" ref_url="https://bugzilla.suse.com/1175656" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<description>
This update for shim fixes the following issues:

- Update to the unified shim binary from SUSE Linux Enterprise 15-SP1 (bsc#1168994)

This update addresses the 'BootHole' security issue (master CVE CVE-2020-10713), by
disallowing binaries signed by the previous SUSE UEFI signing key from booting.

This update should only be installed after updates of grub2, the Linux kernel and (if used)
Xen from July / August 2020 are applied.

Additional fixes:

+ shim-install: install MokManager to \EFI\boot to process the pending MOK request (bsc#1175626, bsc#1175656)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-14"/>
	<updated date="2020-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175626">SUSE bug 1175626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175656">SUSE bug 1175656</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538600" comment="shim-15+git47-25.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151326" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1120629" ref_url="https://bugzilla.suse.com/1120629" source="BUGZILLA"/>
		<reference ref_id="1120630" ref_url="https://bugzilla.suse.com/1120630" source="BUGZILLA"/>
		<reference ref_id="1120631" ref_url="https://bugzilla.suse.com/1120631" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1131823" ref_url="https://bugzilla.suse.com/1131823" source="BUGZILLA"/>
		<reference ref_id="1137977" ref_url="https://bugzilla.suse.com/1137977" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<description>
This update for libsolv fixes the following issues:

This is a reissue of an existing libsolv update that also included libsolv-devel for LTSS products.

libsolv was updated to version 0.6.36 fixes the following issues:

Security issues fixed:

- CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629).
- CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630).
- CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631).

Non-security issues fixed:

- Made cleandeps jobs on patterns work (bsc#1137977).
- Fixed an issue multiversion packages that obsolete their own name (bsc#1127155).
- Keep consistent package name if there are multiple alternatives (bsc#1131823).

		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131823">SUSE bug 1131823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137977">SUSE bug 1137977</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20532">CVE-2018-20532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20533">CVE-2018-20533 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20534">CVE-2018-20534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556487" comment="libsolv-devel-0.6.36-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556488" comment="libsolv-tools-0.6.36-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556489" comment="perl-solv-0.6.36-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556490" comment="python-solv-0.6.36-2.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151327" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1176409" ref_url="https://bugzilla.suse.com/1176409" source="BUGZILLA"/>
		<reference ref_id="1176412" ref_url="https://bugzilla.suse.com/1176412" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392/" source="CVE"/>
		<reference ref_id="CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393/" source="CVE"/>
		<description>
This update for perl-DBI fixes the following issues:

Security issues fixed:

- CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated (bsc#1176412).
- CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name (bsc#1176409).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176409">SUSE bug 1176409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176412">SUSE bug 1176412</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14392">CVE-2020-14392 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14393">CVE-2020-14393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556491" comment="perl-DBI-1.628-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151328" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="1130840" ref_url="https://bugzilla.suse.com/1130840" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="1153238" ref_url="https://bugzilla.suse.com/1153238" source="BUGZILLA"/>
		<reference ref_id="1162423" ref_url="https://bugzilla.suse.com/1162423" source="BUGZILLA"/>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="1174701" ref_url="https://bugzilla.suse.com/1174701" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-20907: Fixed denial of service by avoiding possible infinite loop in specifically crafted tarball (bsc#1174091).
- CVE-2020-14422: Fixed an improper computation of hash values in the IPv4Interface and IPv6Interface 
  could have led to denial of service (bsc#1173274).
- CVE-2019-16935: Fixed a reflected XSS in python/Lib/DocXMLRPCServer.py (bsc#1153238).
- CVE-2019-9947: Fixed an issue in urllib2 which allowed CRLF injection if the attacker controls a url parameter (bsc#1130840).
- If the locale is 'C', coerce it to C.UTF-8 (bsc#1162423).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-21"/>
	<updated date="2020-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162423">SUSE bug 1162423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174701">SUSE bug 1174701</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16935">CVE-2019-16935 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14422">CVE-2020-14422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556492" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556493" comment="python3-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556494" comment="python3-base-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556495" comment="python3-curses-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556496" comment="python3-devel-3.4.10-25.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151329" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1174120" ref_url="https://bugzilla.suse.com/1174120" source="BUGZILLA"/>
		<reference ref_id="1174316" ref_url="https://bugzilla.suse.com/1174316" source="BUGZILLA"/>
		<reference ref_id="1176579" ref_url="https://bugzilla.suse.com/1176579" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

-  ZeroLogon: An elevation of privilege was possible with some configurations when an attacker established
a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC) 
(CVE-2020-1472, bsc#1176579).

- Fixed an issue where multiple home folders were created(bsc#1174316, bso#13369).

- Fixed an issue where the net command was unable to negotiate SMB2 (bsc#1174120);
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174120">SUSE bug 1174120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174316">SUSE bug 1174316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176579">SUSE bug 1176579</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1472">CVE-2020-1472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556497" comment="libdcerpc-binding0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538606" comment="libdcerpc-binding0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556498" comment="libdcerpc0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538608" comment="libdcerpc0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556499" comment="libndr-krb5pac0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538610" comment="libndr-krb5pac0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556500" comment="libndr-nbt0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538612" comment="libndr-nbt0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556501" comment="libndr-standard0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538614" comment="libndr-standard0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556502" comment="libndr0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538616" comment="libndr0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556503" comment="libnetapi0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538618" comment="libnetapi0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556504" comment="libsamba-credentials0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538620" comment="libsamba-credentials0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556505" comment="libsamba-errors0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538622" comment="libsamba-errors0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556506" comment="libsamba-hostconfig0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538624" comment="libsamba-hostconfig0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556507" comment="libsamba-passdb0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538626" comment="libsamba-passdb0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556508" comment="libsamba-util0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538628" comment="libsamba-util0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556509" comment="libsamdb0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538630" comment="libsamdb0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556510" comment="libsmbclient0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538632" comment="libsmbclient0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556511" comment="libsmbconf0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538634" comment="libsmbconf0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556512" comment="libsmbldap0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538636" comment="libsmbldap0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556513" comment="libtevent-util0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538638" comment="libtevent-util0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556514" comment="libwbclient0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538640" comment="libwbclient0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556515" comment="samba-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556516" comment="samba-client-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538643" comment="samba-client-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538644" comment="samba-doc-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556517" comment="samba-libs-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538646" comment="samba-libs-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556518" comment="samba-winbind-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538648" comment="samba-winbind-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151330" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1172515" ref_url="https://bugzilla.suse.com/1172515" source="BUGZILLA"/>
		<reference ref_id="1176315" ref_url="https://bugzilla.suse.com/1176315" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507/" source="CVE"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2020-17507: Fixed a buffer overflow in XBM parser (bsc#1176315)
- Made handling of XDG_RUNTIME_DIR more secure (bsc#1172515)	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-25"/>
	<updated date="2020-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172515">SUSE bug 1172515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176315">SUSE bug 1176315</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17507">CVE-2020-17507 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556519" comment="libQt5Concurrent5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556520" comment="libQt5Core5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556521" comment="libQt5DBus5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556522" comment="libQt5Gui5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556523" comment="libQt5Network5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556524" comment="libQt5OpenGL5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556525" comment="libQt5PrintSupport5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556526" comment="libQt5Sql5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556527" comment="libQt5Sql5-mysql-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556528" comment="libQt5Sql5-postgresql-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556529" comment="libQt5Sql5-sqlite-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556530" comment="libQt5Sql5-unixODBC-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556531" comment="libQt5Test5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556532" comment="libQt5Widgets5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556533" comment="libQt5Xml5-5.6.2-6.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151331" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1167976" ref_url="https://bugzilla.suse.com/1167976" source="BUGZILLA"/>
		<reference ref_id="1173986" ref_url="https://bugzilla.suse.com/1173986" source="BUGZILLA"/>
		<reference ref_id="1174420" ref_url="https://bugzilla.suse.com/1174420" source="BUGZILLA"/>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

-Firefox was updated to 78.3.0 ESR (bsc#1176756, MFSA 2020-43)
   - CVE-2020-15677: Download origin spoofing via redirect
   - CVE-2020-15676: Fixed an XSS when pasting attacker-controlled data into a
     contenteditable element 
   - CVE-2020-15678: When recursing through layers while scrolling, an iterator
     may have become invalid, resulting in a potential use-after-free scenario
   - CVE-2020-15673: Fixed memory safety bugs 
- Enhance fix for wayland-detection (bsc#1174420)
- Attempt to fix langpack-parallelization by introducing separate
  obj-dirs for each lang (bsc#1173986, bsc#1167976)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-26"/>
	<updated date="2020-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167976">SUSE bug 1167976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173986">SUSE bug 1173986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174420">SUSE bug 1174420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15673">CVE-2020-15673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15676">CVE-2020-15676 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15677">CVE-2020-15677 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15678">CVE-2020-15678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556534" comment="MozillaFirefox-78.3.0-112.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556535" comment="MozillaFirefox-devel-78.3.0-112.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556536" comment="MozillaFirefox-translations-common-78.3.0-112.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151332" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1176343" ref_url="https://bugzilla.suse.com/1176343" source="BUGZILLA"/>
		<reference ref_id="1176344" ref_url="https://bugzilla.suse.com/1176344" source="BUGZILLA"/>
		<reference ref_id="1176345" ref_url="https://bugzilla.suse.com/1176345" source="BUGZILLA"/>
		<reference ref_id="1176346" ref_url="https://bugzilla.suse.com/1176346" source="BUGZILLA"/>
		<reference ref_id="1176347" ref_url="https://bugzilla.suse.com/1176347" source="BUGZILLA"/>
		<reference ref_id="1176348" ref_url="https://bugzilla.suse.com/1176348" source="BUGZILLA"/>
		<reference ref_id="1176349" ref_url="https://bugzilla.suse.com/1176349" source="BUGZILLA"/>
		<reference ref_id="1176350" ref_url="https://bugzilla.suse.com/1176350" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595/" source="CVE"/>
		<reference ref_id="CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596/" source="CVE"/>
		<reference ref_id="CVE-2020-25597" ref_url="https://www.suse.com/security/cve/CVE-2020-25597/" source="CVE"/>
		<reference ref_id="CVE-2020-25599" ref_url="https://www.suse.com/security/cve/CVE-2020-25599/" source="CVE"/>
		<reference ref_id="CVE-2020-25600" ref_url="https://www.suse.com/security/cve/CVE-2020-25600/" source="CVE"/>
		<reference ref_id="CVE-2020-25601" ref_url="https://www.suse.com/security/cve/CVE-2020-25601/" source="CVE"/>
		<reference ref_id="CVE-2020-25603" ref_url="https://www.suse.com/security/cve/CVE-2020-25603/" source="CVE"/>
		<reference ref_id="CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-25604: Fixed a race condition when migrating timers between x86 
  HVM vCPU-s (bsc#1176343,XSA-336)
- CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers (bsc#1176344,XSA-337)
- CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid (bsc#1176346,XSA-338)
- CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER (bsc#1176345,XSA-339)
- CVE-2020-25603: Fixed an issue due to  missing barriers when accessing/allocating an event channel (bsc#1176347,XSA-340)
- CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains (bsc#1176348,XSA-342)
- CVE-2020-25599: Fixed race conditions with evtchn_reset() (bsc#1176349,XSA-343)
- CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset() / evtchn_destroy() (bsc#1176350,XSA-344)	  
- CVE-2020-14364: Fixed an out-of-bounds read/write access while processing usb packets (bsc#1175534).
- Various bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-29"/>
	<updated date="2020-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176343">SUSE bug 1176343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176344">SUSE bug 1176344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176345">SUSE bug 1176345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176346">SUSE bug 1176346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176347">SUSE bug 1176347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176348">SUSE bug 1176348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176349">SUSE bug 1176349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176350">SUSE bug 1176350</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25595">CVE-2020-25595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25596">CVE-2020-25596 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25597/">CVE-2020-25597 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25597">CVE-2020-25597 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25599/">CVE-2020-25599 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25599">CVE-2020-25599 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25600/">CVE-2020-25600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25600">CVE-2020-25600 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25601/">CVE-2020-25601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25601">CVE-2020-25601 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25603/">CVE-2020-25603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25603">CVE-2020-25603 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25604">CVE-2020-25604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538664" comment="xen-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538665" comment="xen-doc-html-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538666" comment="xen-libs-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538667" comment="xen-libs-32bit-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538668" comment="xen-tools-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538669" comment="xen-tools-domU-4.9.4_12-3.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151333" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1176496" ref_url="https://bugzilla.suse.com/1176496" source="BUGZILLA"/>
		<reference ref_id="1176764" ref_url="https://bugzilla.suse.com/1176764" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7490" ref_url="https://www.suse.com/security/cve/CVE-2013-7490/" source="CVE"/>
		<reference ref_id="CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919/" source="CVE"/>
		<description>
This update for perl-DBI fixes the following issues:

- CVE-2019-20919: Fixed a NULL profile dereference in dbi_profile (bsc#1176764).
- CVE-2013-7490: Fixed memory corruption when using many arguments 
  to methods for CallbacksUsing (bsc#1176496).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176496">SUSE bug 1176496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176764">SUSE bug 1176764</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7490/">CVE-2013-7490 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7490">CVE-2013-7490 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20919">CVE-2019-20919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556537" comment="perl-DBI-1.628-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151334" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- java-1_7_0-openjdk was updated to 2.6.23 (July 2020 CPU, bsc#1174157)
    - JDK-8028431, CVE-2020-14579: NullPointerException in
    - DerValue.equals(DerValue)
    - JDK-8028591, CVE-2020-14578: NegativeArraySizeException in
    - sun.security.util.DerInputStream.getUnalignedBitString()
    - JDK-8230613: Better ASCII conversions
    - JDK-8231800: Better listing of arrays
    - JDK-8232014: Expand DTD support
    - JDK-8233255: Better Swing Buttons
    - JDK-8234032: Improve basic calendar services
    - JDK-8234042: Better factory production of certificates
    - JDK-8234418: Better parsing with CertificateFactory
    - JDK-8234836: Improve serialization handling
    - JDK-8236191: Enhance OID processing
    - JDK-8237592, CVE-2020-14577: Enhance certificate verification
    - JDK-8238002, CVE-2020-14581: Better matrix operations
    - JDK-8238804: Enhance key handling process
    - JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    - JDK-8238843: Enhanced font handing
    - JDK-8238920, CVE-2020-14583: Better Buffer support
    - JDK-8238925: Enhance WAV file playback
    - JDK-8240119, CVE-2020-14593: Less Affine Transformations
    - JDK-8240482: Improved WAV file playback
    - JDK-8241379: Update JCEKS support
    - JDK-8241522: Manifest improved jar headers redux
    - JDK-8242136, CVE-2020-14621: Better XML namespace handling
    - JDK-8040113: File not initialized in src/share/native/sun/awt/giflib/dgif_lib.c
    - JDK-8054446: Repeated offer and remove on ConcurrentLinkedQueue lead to an OutOfMemoryError
    - JDK-8077982: GIFLIB upgrade
    - JDK-8081315: 8077982 giflib upgrade breaks system giflib builds with earlier versions
    - JDK-8147087: Race when reusing PerRegionTable bitmaps may result in dropped remembered set entries
    - JDK-8151582: (ch) test java/nio/channels/AsyncCloseAndInterrupt.java failing due to 'Connection succeeded'
    - JDK-8155691: Update GIFlib library to the latest up-to-date
    - JDK-8181841: A TSA server returns timestamp with precision higher than milliseconds
    - JDK-8203190: SessionId.hashCode generates too many collisions
    - JDK-8217676: Upgrade libpng to 1.6.37
    - JDK-8220495: Update GIFlib library to the 5.1.8
    - JDK-8226892: ActionListeners on JRadioButtons don't get notified when selection is changed with arrow keys
    - JDK-8229899: Make java.io.File.isInvalid() less racy
    - JDK-8230597: Update GIFlib library to the 5.2.1
    - JDK-8230769: BufImg_SetupICM add ReleasePrimitiveArrayCritical call in early return
    - JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a
    - JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion() returns wrong result
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556538" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556539" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556540" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556541" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151335" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1176733" ref_url="https://bugzilla.suse.com/1176733" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26117" ref_url="https://www.suse.com/security/cve/CVE-2020-26117/" source="CVE"/>
		<description>
This update for tigervnc fixes the following issues:

- CVE-2020-26117: Server certificates were stored as certiticate
  authorities, allowing malicious owners of these certificates
  to impersonate any server after a client had added an exception
  (bsc#1176733).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1176733">SUSE bug 1176733</bugzilla>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26117/">CVE-2020-26117 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26117">CVE-2020-26117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556542" comment="libXvnc1-1.6.0-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556543" comment="tigervnc-1.6.0-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556544" comment="xorg-x11-Xvnc-1.6.0-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151336" version="1" class="patch">
	<metadata>
		<title>Security update for libproxy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1176410" ref_url="https://bugzilla.suse.com/1176410" source="BUGZILLA"/>
		<reference ref_id="1177143" ref_url="https://bugzilla.suse.com/1177143" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25219" ref_url="https://www.suse.com/security/cve/CVE-2020-25219/" source="CVE"/>
		<reference ref_id="CVE-2020-26154" ref_url="https://www.suse.com/security/cve/CVE-2020-26154/" source="CVE"/>
		<description>
This update for libproxy fixes the following issues:

- CVE-2020-25219: Rewrote url::recvline to be nonrecursive (bsc#1176410).
- CVE-2020-26154: Fixed a buffer overflow when PAC is enabled (bsc#1177143).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176410">SUSE bug 1176410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177143">SUSE bug 1177143</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25219/">CVE-2020-25219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25219">CVE-2020-25219 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26154/">CVE-2020-26154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26154">CVE-2020-26154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556545" comment="libproxy1-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531385" comment="libproxy1-32bit-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556546" comment="libproxy1-config-gnome3-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531387" comment="libproxy1-config-gnome3-32bit-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556547" comment="libproxy1-networkmanager-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556548" comment="libproxy1-pacrunner-webkit-0.4.13-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151337" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1177914" ref_url="https://bugzilla.suse.com/1177914" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<description>
This update for freetype2 fixes the following issues:

- CVE-2020-15999: fixed a heap buffer overflow found in the handling of embedded PNG bitmaps (bsc#1177914).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-22"/>
	<updated date="2020-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177914">SUSE bug 1177914</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556549" comment="ft2demos-2.6.3-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556550" comment="libfreetype6-2.6.3-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531392" comment="libfreetype6-32bit-2.6.3-7.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151338" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1149332" ref_url="https://bugzilla.suse.com/1149332" source="BUGZILLA"/>
		<reference ref_id="1165784" ref_url="https://bugzilla.suse.com/1165784" source="BUGZILLA"/>
		<reference ref_id="1171878" ref_url="https://bugzilla.suse.com/1171878" source="BUGZILLA"/>
		<reference ref_id="1172085" ref_url="https://bugzilla.suse.com/1172085" source="BUGZILLA"/>
		<reference ref_id="1176013" ref_url="https://bugzilla.suse.com/1176013" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10029" ref_url="https://www.suse.com/security/cve/CVE-2020-10029/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:
	  
- CVE-2020-10029: Fixed a stack corruption from range reduction of pseudo-zero (bsc#1165784)
- Use posix_spawn on popen (bsc#1149332, bsc#1176013)
- Correct locking and cancellation cleanup in syslog functions (bsc#1172085)
- Fixed concurrent changes on nscd aware files (bsc#1171878)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-23"/>
	<updated date="2020-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149332">SUSE bug 1149332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165784">SUSE bug 1165784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171878">SUSE bug 1171878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172085">SUSE bug 1172085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176013">SUSE bug 1176013</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10029/">CVE-2020-10029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">CVE-2020-10029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556551" comment="glibc-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531394" comment="glibc-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556552" comment="glibc-devel-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531396" comment="glibc-devel-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531397" comment="glibc-html-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531398" comment="glibc-i18ndata-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531399" comment="glibc-info-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556553" comment="glibc-locale-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531401" comment="glibc-locale-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556554" comment="glibc-profile-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531403" comment="glibc-profile-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556555" comment="nscd-2.22-113.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151339" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="1177872" ref_url="https://bugzilla.suse.com/1177872" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.0 ESR
  * Fixed: Various stability, functionality, and security fixes MFSA 2020-46 (bsc#1177872, bsc#1176756)
  * CVE-2020-15969 Use-after-free in usersctp
  * CVE-2020-15683 Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4
  * Fixed: Fixed legacy preferences not being properly applied when set via GPO
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-27"/>
	<updated date="2020-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15683">CVE-2020-15683 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15969">CVE-2020-15969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556556" comment="MozillaFirefox-78.4.0-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556557" comment="MozillaFirefox-devel-78.4.0-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556558" comment="MozillaFirefox-translations-common-78.4.0-112.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151340" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1177158" ref_url="https://bugzilla.suse.com/1177158" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<description>
This update for spice fixes the following issues:

- CVE-2020-14355: Fixed multiple buffer overflow vulnerabilities in QUIC image decoding (bsc#1177158).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14355">CVE-2020-14355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556559" comment="libspice-server1-0.12.8-15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151341" version="1" class="patch">
	<metadata>
		<title>Security update for spice-gtk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1177158" ref_url="https://bugzilla.suse.com/1177158" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<description>
This update for spice-gtk fixes the following issues:

- CVE-2020-14355: Fixed multiple buffer overflow vulnerabilities in QUIC image decoding (bsc#1177158).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14355">CVE-2020-14355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556560" comment="libspice-client-glib-2_0-8-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556561" comment="libspice-client-glib-helper-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556562" comment="libspice-client-gtk-3_0-5-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556563" comment="libspice-controller0-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556564" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556565" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151342" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1173902" ref_url="https://bugzilla.suse.com/1173902" source="BUGZILLA"/>
		<reference ref_id="1173994" ref_url="https://bugzilla.suse.com/1173994" source="BUGZILLA"/>
		<reference ref_id="1177613" ref_url="https://bugzilla.suse.com/1177613" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<reference ref_id="CVE-2020-14383" ref_url="https://www.suse.com/security/cve/CVE-2020-14383/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-14383: An authenticated user can crash the DCE/RPC DNS with easily crafted records (bsc#1177613).
- CVE-2020-14323: Unprivileged user can crash winbind (bsc#1173994).
- CVE-2020-14318: Missing permissions check in SMB1/2/3 ChangeNotify (bsc#1173902).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173902">SUSE bug 1173902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173994">SUSE bug 1173994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177613">SUSE bug 1177613</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14318">CVE-2020-14318 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14323">CVE-2020-14323 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14383/">CVE-2020-14383 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14383">CVE-2020-14383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556566" comment="libdcerpc-binding0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538678" comment="libdcerpc-binding0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556567" comment="libdcerpc0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538680" comment="libdcerpc0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556568" comment="libndr-krb5pac0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538682" comment="libndr-krb5pac0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556569" comment="libndr-nbt0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538684" comment="libndr-nbt0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556570" comment="libndr-standard0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538686" comment="libndr-standard0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556571" comment="libndr0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538688" comment="libndr0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556572" comment="libnetapi0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538690" comment="libnetapi0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556573" comment="libsamba-credentials0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538692" comment="libsamba-credentials0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556574" comment="libsamba-errors0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538694" comment="libsamba-errors0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556575" comment="libsamba-hostconfig0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538696" comment="libsamba-hostconfig0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556576" comment="libsamba-passdb0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538698" comment="libsamba-passdb0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556577" comment="libsamba-util0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538700" comment="libsamba-util0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556578" comment="libsamdb0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538702" comment="libsamdb0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556579" comment="libsmbclient0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538704" comment="libsmbclient0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556580" comment="libsmbconf0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538706" comment="libsmbconf0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556581" comment="libsmbldap0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538708" comment="libsmbldap0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556582" comment="libtevent-util0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538710" comment="libtevent-util0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556583" comment="libwbclient0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538712" comment="libwbclient0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556584" comment="samba-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556585" comment="samba-client-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538715" comment="samba-client-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538716" comment="samba-doc-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556586" comment="samba-libs-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538718" comment="samba-libs-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556587" comment="samba-winbind-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538720" comment="samba-winbind-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151343" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1174955" ref_url="https://bugzilla.suse.com/1174955" source="BUGZILLA"/>
		<reference ref_id="1177155" ref_url="https://bugzilla.suse.com/1177155" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15708" ref_url="https://www.suse.com/security/cve/CVE-2020-15708/" source="CVE"/>
		<reference ref_id="CVE-2020-25637" ref_url="https://www.suse.com/security/cve/CVE-2020-25637/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

CVE-2020-15708: Added a note to libvirtd.conf about polkit auth in SUSE distros (bsc#1174955).
CVE-2020-25637: Fixed a double free in qemuAgentGetInterfaces() (bsc#1177155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174955">SUSE bug 1174955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177155">SUSE bug 1177155</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15708/">CVE-2020-15708 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15708">CVE-2020-15708 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25637/">CVE-2020-25637 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25637">CVE-2020-25637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556588" comment="libvirt-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556589" comment="libvirt-admin-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556590" comment="libvirt-client-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556591" comment="libvirt-daemon-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556592" comment="libvirt-daemon-config-network-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556593" comment="libvirt-daemon-config-nwfilter-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556594" comment="libvirt-daemon-driver-interface-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538728" comment="libvirt-daemon-driver-libxl-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556595" comment="libvirt-daemon-driver-lxc-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556596" comment="libvirt-daemon-driver-network-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556597" comment="libvirt-daemon-driver-nodedev-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556598" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556599" comment="libvirt-daemon-driver-qemu-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556600" comment="libvirt-daemon-driver-secret-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556601" comment="libvirt-daemon-driver-storage-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556602" comment="libvirt-daemon-driver-storage-core-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556603" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556604" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556605" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556606" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555139" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556607" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556608" comment="libvirt-daemon-hooks-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556609" comment="libvirt-daemon-lxc-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556610" comment="libvirt-daemon-qemu-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538746" comment="libvirt-daemon-xen-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556611" comment="libvirt-doc-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556612" comment="libvirt-libs-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556613" comment="libvirt-lock-sanlock-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556614" comment="libvirt-nss-3.3.0-5.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151344" version="1" class="patch">
	<metadata>
		<title>Security update for sane-backends (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1172524" ref_url="https://bugzilla.suse.com/1172524" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<reference ref_id="CVE-2020-12861" ref_url="https://www.suse.com/security/cve/CVE-2020-12861/" source="CVE"/>
		<reference ref_id="CVE-2020-12862" ref_url="https://www.suse.com/security/cve/CVE-2020-12862/" source="CVE"/>
		<reference ref_id="CVE-2020-12863" ref_url="https://www.suse.com/security/cve/CVE-2020-12863/" source="CVE"/>
		<reference ref_id="CVE-2020-12864" ref_url="https://www.suse.com/security/cve/CVE-2020-12864/" source="CVE"/>
		<reference ref_id="CVE-2020-12865" ref_url="https://www.suse.com/security/cve/CVE-2020-12865/" source="CVE"/>
		<reference ref_id="CVE-2020-12866" ref_url="https://www.suse.com/security/cve/CVE-2020-12866/" source="CVE"/>
		<reference ref_id="CVE-2020-12867" ref_url="https://www.suse.com/security/cve/CVE-2020-12867/" source="CVE"/>
		<description>
This update for sane-backends fixes the following issues:

- sane-backends version upgrade to 1.0.31:
  * sane-backends version upgrade to 1.0.30
    fixes memory corruption bugs CVE-2020-12861, CVE-2020-12862,
    CVE-2020-12863, CVE-2020-12864, CVE-2020-12865,
    CVE-2020-12866, CVE-2020-12867 (bsc#1172524)
  * sane-backends version upgrade to 1.0.31
    to further improve hardware enablement for scanner devices
    (jsc#SLE-15561 and jsc#SLE-15560 with jsc#ECO-2418)
  * The new escl backend cannot be provided for SLE12 because
    it requires more additional software (avahi-client, libcurl,
    and libpoppler-glib-devel) where in particular for libcurl
    the one that is in SLE12 (via libcurl-devel-7.37.0) is likely
    too old because with that building the escl backend fails with
    'escl/escl.c:1267:34: error: 'CURLOPT_UNIX_SOCKET_PATH'
    undeclared curl_easy_setopt(handle, CURLOPT_UNIX_SOCKET_PATH'
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6318">CVE-2017-6318 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12861/">CVE-2020-12861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12861">CVE-2020-12861 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12862/">CVE-2020-12862 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12862">CVE-2020-12862 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12863/">CVE-2020-12863 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12863">CVE-2020-12863 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12864/">CVE-2020-12864 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12864">CVE-2020-12864 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12865/">CVE-2020-12865 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12865">CVE-2020-12865 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12866/">CVE-2020-12866 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12866">CVE-2020-12866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12867/">CVE-2020-12867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12867">CVE-2020-12867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556615" comment="sane-backends-1.0.31-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151345" version="1" class="patch">
	<metadata>
		<title>Security update for apache-commons-httpclient (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178171" ref_url="https://bugzilla.suse.com/1178171" source="BUGZILLA"/>
		<reference ref_id="945190" ref_url="https://bugzilla.suse.com/945190" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3577" ref_url="https://www.suse.com/security/cve/CVE-2014-3577/" source="CVE"/>
		<reference ref_id="CVE-2015-5262" ref_url="https://www.suse.com/security/cve/CVE-2015-5262/" source="CVE"/>
		<description>
This update for apache-commons-httpclient fixes the following issues:

- http/conn/ssl/SSLConnectionSocketFactory.java ignores the
  http.socket.timeout configuration setting during an SSL handshake,
  which allows remote attackers to cause a denial of service (HTTPS
  call hang) via unspecified vectors. [bsc#945190, CVE-2015-5262]
- org.apache.http.conn.ssl.AbstractVerifier does not properly
  verify that the server hostname matches a domain name in the
  subject's Common Name (CN) or subjectAltName field of the X.509
  certificate, which allows MITM attackers to spoof SSL servers
  via a 'CN=' string in a field in the distinguished name (DN)
  of a certificate. [bsc#1178171, CVE-2014-3577]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-04"/>
	<updated date="2020-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178171">SUSE bug 1178171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945190">SUSE bug 945190</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3577/">CVE-2014-3577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3577">CVE-2014-3577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5262/">CVE-2015-5262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5262">CVE-2015-5262 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531477" comment="apache-commons-httpclient-3.1-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151346" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Fix regression '8250861: Crash in MinINode::Ideal(PhaseGVN*, bool)',
  introduced in October 2020 CPU.

- Update to version jdk8u272 (icedtea 3.17.0) (July 2020 CPU,
  bsc#1174157, and October 2020 CPU, bsc#1177943)
  * New features
    + JDK-8245468: Add TLSv1.3 implementation classes from 11.0.7
    + PR3796: Allow the number of curves supported to be specified
  * Security fixes
    + JDK-8028431, CVE-2020-14579: NullPointerException in
      DerValue.equals(DerValue)
    + JDK-8028591, CVE-2020-14578: NegativeArraySizeException in
      sun.security.util.DerInputStream.getUnalignedBitString()
    + JDK-8230613: Better ASCII conversions
    + JDK-8231800: Better listing of arrays
    + JDK-8232014: Expand DTD support
    + JDK-8233255: Better Swing Buttons
    + JDK-8233624: Enhance JNI linkage
    + JDK-8234032: Improve basic calendar services
    + JDK-8234042: Better factory production of certificates
    + JDK-8234418: Better parsing with CertificateFactory
    + JDK-8234836: Improve serialization handling
    + JDK-8236191: Enhance OID processing
    + JDK-8236196: Improve string pooling
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237117, CVE-2020-14556: Better ForkJoinPool behavior
    + JDK-8237592, CVE-2020-14577: Enhance certificate verification
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8238002, CVE-2020-14581: Better matrix operations
    + JDK-8238804: Enhance key handling process
    + JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    + JDK-8238843: Enhanced font handing
    + JDK-8238920, CVE-2020-14583: Better Buffer support
    + JDK-8238925: Enhance WAV file playback
    + JDK-8240119, CVE-2020-14593: Less Affine Transformations
    + JDK-8240124: Better VM Interning
    + JDK-8240482: Improved WAV file playback
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8241379: Update JCEKS support
    + JDK-8241522: Manifest improved jar headers redux
    + JDK-8242136, CVE-2020-14621: Better XML namespace handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Import of OpenJDK 8 u262 build 01
    + JDK-4949105: Access Bridge lacks html tags parsing
    + JDK-8003209: JFR events for network utilization
    + JDK-8030680: 292 cleanup from default method code assessment
    + JDK-8035633: TEST_BUG: java/net/NetworkInterface/Equals.java
      and some tests failed on windows intermittently
    + JDK-8041626: Shutdown tracing event
    + JDK-8141056: Erroneous assignment in HeapRegionSet.cpp
    + JDK-8149338: JVM Crash caused by Marlin renderer not handling
       NaN coordinates
    + JDK-8151582: (ch) test java/nio/channels/
      /AsyncCloseAndInterrupt.java failing due to 'Connection
      succeeded'
    + JDK-8165675: Trace event for thread park has incorrect unit
       for timeout
    + JDK-8176182: 4 security tests are not run
    + JDK-8178910: Problemlist sample tests
    + JDK-8183925: Decouple crash protection from watcher thread
    + JDK-8191393: Random crashes during cfree+0x1c
    + JDK-8195817: JFR.stop should require name of recording
    + JDK-8195818: JFR.start should increase autogenerated name by
       one
    + JDK-8195819: Remove recording=x from jcmd JFR.check output
    + JDK-8199712: Flight Recorder
    + JDK-8202578: Revisit location for class unload events
    + JDK-8202835: jfr/event/os/TestSystemProcess.java fails on
      missing events
    + JDK-8203287: Zero fails to build after JDK-8199712 (Flight
      Recorder)
    + JDK-8203346: JFR: Inconsistent signature of
      jfr_add_string_constant
    + JDK-8203664: JFR start failure after AppCDS archive created
      with JFR StartFlightRecording
    + JDK-8203921: JFR thread sampling is missing fixes from
      JDK-8194552
    + JDK-8203929: Limit amount of data for JFR.dump
    + JDK-8205516: JFR tool
    + JDK-8207392: [PPC64] Implement JFR profiling
    + JDK-8207829: FlightRecorderMXBeanImpl is leaking the first
      classloader which calls it
    + JDK-8209960: -Xlog:jfr* doesn't work with the JFR
    + JDK-8210024: JFR calls virtual is_Java_thread from ~Thread()
    + JDK-8210776: Upgrade X Window System 6.8.2 to the latest XWD
      1.0.7
    + JDK-8211239: Build fails without JFR: empty JFR events
      signatures mismatch
    + JDK-8212232: Wrong metadata for the configuration of the
      cutoff for old object sample events
    + JDK-8213015: Inconsistent settings between JFR.configure and
      -XX:FlightRecorderOptions
    + JDK-8213421: Line number information for execution samples
      always 0
    + JDK-8213617: JFR should record the PID of the recorded process
    + JDK-8213734: SAXParser.parse(File, ..) does not close
      resources when Exception occurs.
    + JDK-8213914: [TESTBUG] Several JFR VM events are not covered
      by tests
    + JDK-8213917: [TESTBUG] Shutdown JFR event is not covered by
      test
    + JDK-8213966: The ZGC JFR events should be marked as
      experimental
    + JDK-8214542: JFR: Old Object Sample event slow on a deep heap
      in debug builds
    + JDK-8214750: Unnecessary &lt;p&gt; tags in jfr classes
    + JDK-8214896: JFR Tool left files behind
    + JDK-8214906: [TESTBUG] jfr/event/sampling/TestNative.java
      fails with UnsatisfiedLinkError
    + JDK-8214925: JFR tool fails to execute
    + JDK-8215175: Inconsistencies in JFR event metadata
    + JDK-8215237: jdk.jfr.Recording javadoc does not compile
    + JDK-8215284: Reduce noise induced by periodic task
      getFileSize()
    + JDK-8215355: Object monitor deadlock with no threads holding
      the monitor (using jemalloc 5.1)
    + JDK-8215362: JFR GTest JfrTestNetworkUtilization fails
    + JDK-8215771: The jfr tool should pretty print reference chains
    + JDK-8216064: -XX:StartFlightRecording:settings= doesn't work
      properly
    + JDK-8216486: Possibility of integer overflow in
      JfrThreadSampler::run()
    + JDK-8216528: test/jdk/java/rmi/transport/
       /runtimeThreadInheritanceLeak/
       /RuntimeThreadInheritanceLeak.java failing with Xcomp
    + JDK-8216559: [JFR] Native libraries not correctly parsed from
      /proc/self/maps
    + JDK-8216578: Remove unused/obsolete method in JFR code
    + JDK-8216995: Clean up JFR command line processing
    + JDK-8217744: [TESTBUG] JFR TestShutdownEvent fails on some
      systems due to process surviving SIGINT
    + JDK-8217748: [TESTBUG] Exclude TestSig test case from JFR
      TestShutdownEvent
    + JDK-8218935: Make jfr strncpy uses GCC 8.x friendly
    + JDK-8223147: JFR Backport
    + JDK-8223689: Add JFR Thread Sampling Support
    + JDK-8223690: Add JFR BiasedLock Event Support
    + JDK-8223691: Add JFR G1 Region Type Change Event Support
    + JDK-8223692: Add JFR G1 Heap Summary Event Support
    + JDK-8224172: assert(jfr_is_event_enabled(id)) failed:
      invariant
    + JDK-8224475: JTextPane does not show images in HTML rendering
    + JDK-8226253: JAWS reports wrong number of radio buttons when
      buttons are hidden.
    + JDK-8226779: [TESTBUG] Test JFR API from Java agent
    + JDK-8226892: ActionListeners on JRadioButtons don't get
      notified when selection is changed with arrow keys
    + JDK-8227011: Starting a JFR recording in response to JVMTI
      VMInit and / or Java agent premain corrupts memory
    + JDK-8227605: Kitchensink fails 'assert((((klass)-&gt;trace_id()
      &amp; (JfrTraceIdEpoch::leakp_in_use_this_epoch_bit())) != 0))
      failed: invariant'
    + JDK-8229366: JFR backport allows unchecked writing to memory
    + JDK-8229401: Fix JFR code cache test failures
    + JDK-8229708: JFR backport code does not initialize
    + JDK-8229873: 8229401 broke jdk8u-jfr-incubator
    + JDK-8230448: [test] JFRSecurityTestSuite.java is failing on
      Windows
    + JDK-8230707: JFR related tests are failing
    + JDK-8230782: Robot.createScreenCapture() fails if
      'awt.robot.gtk' is set to false
    + JDK-8230856: Java_java_net_NetworkInterface_getByName0 on
       unix misses ReleaseStringUTFChars in early return
    + JDK-8230947: TestLookForUntestedEvents.java is failing after
      JDK-8230707
    + JDK-8231995: two jtreg tests failed after 8229366 is fixed
    + JDK-8233623: Add classpath exception to copyright in
      EventHandlerProxyCreator.java file
    + JDK-8236002: CSR for JFR backport suggests not leaving out
      the package-info
    + JDK-8236008: Some backup files were accidentally left in the
      hotspot tree
    + JDK-8236074: Missed package-info
    + JDK-8236174: Should update javadoc since tags
    + JDK-8238076: Fix OpenJDK 7 Bootstrap Broken by JFR Backport
    + JDK-8238452: Keytool generates wrong expiration date if
      validity is set to 2050/01/01
    + JDK-8238555: Allow Initialization of SunPKCS11 with NSS when
      there are external FIPS modules in the NSSDB
    + JDK-8238589: Necessary code cleanup in JFR for JDK8u
    + JDK-8238590: Enable JFR by default during compilation in 8u
    + JDK-8239055: Wrong implementation of VMState.hasListener
    + JDK-8239476: JDK-8238589 broke windows build by moving
      OrderedPair
    + JDK-8239479: minimal1 and zero builds are failing
    + JDK-8239867: correct over use of INCLUDE_JFR macro
    + JDK-8240375: Disable JFR by default for July 2020 release
    + JDK-8241444: Metaspace::_class_vsm not initialized if
      compressed class pointers are disabled
    + JDK-8241902: AIX Build broken after integration of
      JDK-8223147 (JFR Backport)
    + JDK-8242788: Non-PCH build is broken after JDK-8191393
  * Import of OpenJDK 8 u262 build 02
    + JDK-8130737: AffineTransformOp can't handle child raster with
      non-zero x-offset
    + JDK-8172559: [PIT][TEST_BUG] Move @test to be 1st annotation
      in java/awt/image/Raster/TestChildRasterOp.java
    + JDK-8230926: [macosx] Two apostrophes are entered instead of
      one with 'U.S. International - PC' layout
    + JDK-8240576: JVM crashes after transformation in C2
      IdealLoopTree::merge_many_backedges
    + JDK-8242883: Incomplete backport of JDK-8078268: backport
      test part
  * Import of OpenJDK 8 u262 build 03
    + JDK-8037866: Replace the Fun class in tests with lambdas
    + JDK-8146612: C2: Precedence edges specification violated
    + JDK-8150986: serviceability/sa/jmap-hprof/
       /JMapHProfLargeHeapTest.java failing because expects HPROF
      JAVA PROFILE 1.0.1 file format
    + JDK-8229888: (zipfs) Updating an existing zip file does not
      preserve original permissions
    + JDK-8230597: Update GIFlib library to the 5.2.1
    + JDK-8230769: BufImg_SetupICM add
      ReleasePrimitiveArrayCritical call in early return
    + JDK-8233880, PR3798: Support compilers with multi-digit major
      version numbers
    + JDK-8239852: java/util/concurrent tests fail with
      -XX:+VerifyGraphEdges: assert(!VerifyGraphEdges) failed:
      verification should have failed
    + JDK-8241638: launcher time metrics always report 1 on Linux
      when _JAVA_LAUNCHER_DEBUG set
    + JDK-8243059: Build fails when --with-vendor-name contains a
      comma
    + JDK-8243474: [TESTBUG] removed three tests of 0 bytes
    + JDK-8244461: [JDK 8u] Build fails with glibc 2.32
    + JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion()
      returns wrong result
  * Import of OpenJDK 8 u262 build 04
    + JDK-8067796: (process) Process.waitFor(timeout, unit) doesn't
      throw NPE if timeout is less than, or equal to zero when unit
      == null
    + JDK-8148886: SEGV in sun.java2d.marlin.Renderer._endRendering
    + JDK-8171934:
      ObjectSizeCalculator.getEffectiveMemoryLayoutSpecification()
      does not recognize OpenJDK's HotSpot VM
    + JDK-8196969: JTreg Failure:
      serviceability/sa/ClhsdbJstack.java causes NPE
    + JDK-8243539: Copyright info (Year) should be updated for fix
      of 8241638
    + JDK-8244777: ClassLoaderStats VM Op uses constant hash value
  * Import of OpenJDK 8 u262 build 05
    + JDK-7147060: com/sun/org/apache/xml/internal/security/
      /transforms/ClassLoaderTest.java doesn't run in agentvm mode
    + JDK-8178374: Problematic ByteBuffer handling in
      CipherSpi.bufferCrypt method
    + JDK-8181841: A TSA server returns timestamp with precision
      higher than milliseconds
    + JDK-8227269: Slow class loading when running with JDWP
    + JDK-8229899: Make java.io.File.isInvalid() less racy
    + JDK-8236996: Incorrect Roboto font rendering on Windows with
      subpixel antialiasing
    + JDK-8241750: x86_32 build failure after JDK-8227269
    + JDK-8244407: JVM crashes after transformation in C2
      IdealLoopTree::split_fall_in
    + JDK-8244843: JapanEraNameCompatTest fails
  * Import of OpenJDK 8 u262 build 06
    + JDK-8246223: Windows build fails after JDK-8227269
  * Import of OpenJDK 8 u262 build 07
    + JDK-8233197: Invert JvmtiExport::post_vm_initialized() and
      Jfr:on_vm_start() start-up order for correct option parsing
    + JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a
    + JDK-8245167: Top package in method profiling shows null in JMC
    + JDK-8246703: [TESTBUG] Add test for JDK-8233197
  * Import of OpenJDK 8 u262 build 08
    + JDK-8220293: Deadlock in JFR string pool
    + JDK-8225068: Remove DocuSign root certificate that is
      expiring in May 2020
    + JDK-8225069: Remove Comodo root certificate that is expiring
      in May 2020
  * Import of OpenJDK 8 u262 build 09
    + JDK-8248399: Build installs jfr binary when JFR is disabled
  * Import of OpenJDK 8 u262 build 10
    + JDK-8248715: New JavaTimeSupplementary localisation for 'in'
      installed in wrong package
  * Import of OpenJDK 8 u265 build 01
    + JDK-8249677: Regression in 8u after JDK-8237117: Better
      ForkJoinPool behavior
    + JDK-8250546: Expect changed behaviour reported in JDK-8249846
  * Import of OpenJDK 8 u272 build 01
    + JDK-8006205: [TESTBUG] NEED_TEST: please JTREGIFY
      test/compiler/7177917/Test7177917.java
    + JDK-8035493: JVMTI PopFrame capability must instruct
      compilers not to prune locals
    + JDK-8036088: Replace strtok() with its safe equivalent
      strtok_s() in DefaultProxySelector.c
    + JDK-8039082: [TEST_BUG] Test java/awt/dnd/
      /BadSerializationTest/BadSerializationTest.java fails
    + JDK-8075774: Small readability and performance improvements
      for zipfs
    + JDK-8132206: move ScanTest.java into OpenJDK
    + JDK-8132376: Add @requires os.family to the client tests with
      access to internal OS-specific API
    + JDK-8132745: minor cleanup of java/util/Scanner/ScanTest.java
    + JDK-8137087: [TEST_BUG] Cygwin failure of java/awt/
      /appletviewer/IOExceptionIfEncodedURLTest/
      /IOExceptionIfEncodedURLTest.sh
    + JDK-8145808: java/awt/Graphics2D/MTGraphicsAccessTest/
      /MTGraphicsAccessTest.java hangs on Win. 8
    + JDK-8151788: NullPointerException from ntlm.Client.type3
    + JDK-8151834: Test SmallPrimeExponentP.java times out
      intermittently
    + JDK-8153430: jdk regression test MletParserLocaleTest,
      ParserInfiniteLoopTest reduce default timeout
    + JDK-8153583: Make OutputAnalyzer.reportDiagnosticSummary
      public
    + JDK-8156169: Some sound tests rarely hangs because of
      incorrect synchronization
    + JDK-8165936: Potential Heap buffer overflow when seaching
      timezone info files
    + JDK-8166148: Fix for JDK-8165936 broke solaris builds
    + JDK-8167300: Scheduling failures during gcm should be fatal
    + JDK-8167615: Opensource unit/regression tests for JavaSound
    + JDK-8172012: [TEST_BUG] delays needed in
      javax/swing/JTree/4633594/bug4633594.java
    + JDK-8177628: Opensource unit/regression tests for ImageIO
    + JDK-8183341: Better cleanup for javax/imageio/AllowSearch.java
    + JDK-8183351: Better cleanup for jdk/test/javax/imageio/spi/
      /AppletContextTest/BadPluginConfigurationTest.sh
    + JDK-8193137: Nashorn crashes when given an empty script file
    + JDK-8194298: Add support for per Socket configuration of TCP
      keepalive
    + JDK-8198004: javax/swing/JFileChooser/6868611/bug6868611.java
      throws error
    + JDK-8200313: java/awt/Gtk/GtkVersionTest/GtkVersionTest.java
      fails
    + JDK-8210147: adjust some WSAGetLastError usages in windows
      network coding
    + JDK-8211714: Need to update vm_version.cpp to recognise
      VS2017 minor versions
    + JDK-8214862: assert(proj != __null) at compile.cpp:3251
    + JDK-8217606: LdapContext#reconnect always opens a new
      connection
    + JDK-8217647: JFR: recordings on 32-bit systems unreadable
    + JDK-8226697: Several tests which need the @key headful
      keyword are missing it.
    + JDK-8229378: jdwp library loader in linker_md.c quietly
      truncates on buffer overflow
    + JDK-8230303: JDB hangs when running monitor command
    + JDK-8230711: ConnectionGraph::unique_java_object(Node* N)
      return NULL if n is not in the CG
    + JDK-8234617: C1: Incorrect result of field load due to
      missing narrowing conversion
    + JDK-8235243: handle VS2017 15.9 and VS2019 in
      abstract_vm_version
    + JDK-8235325: build failure on Linux after 8235243
    + JDK-8235687: Contents/MacOS/libjli.dylib cannot be a symlink
    + JDK-8237951: CTW: C2 compilation fails with 'malformed
      control flow'
    + JDK-8238225: Issues reported after replacing symlink at
      Contents/MacOS/libjli.dylib with binary
    + JDK-8239385: KerberosTicket client name refers wrongly to
      sAMAccountName in AD
    + JDK-8239819: XToolkit: Misread of screen information memory
    + JDK-8240295: hs_err elapsed time in seconds is not accurate
      enough
    + JDK-8241888: Mirror jdk.security.allowNonCaAnchor system
      property with a security one
    + JDK-8242498: Invalid 'sun.awt.TimedWindowEvent' object leads
      to JVM crash
    + JDK-8243489: Thread CPU Load event may contain wrong data for
      CPU time under certain conditions
    + JDK-8244818: Java2D Queue Flusher crash while moving
      application window to external monitor
    + JDK-8246310: Clean commented-out code about ModuleEntry
      and PackageEntry in JFR
    + JDK-8246384: Enable JFR by default on supported architectures
      for October 2020 release
    + JDK-8248643: Remove extra leading space in JDK-8240295 8u
      backport
    + JDK-8249610: Make
      sun.security.krb5.Config.getBooleanObject(String... keys)
      method public
  * Import of OpenJDK 8 u272 build 02
    + JDK-8023697: failed class resolution reports different class
      name in detail message for the first and subsequent times
    + JDK-8025886: replace [[ and == bash extensions in regtest
    + JDK-8046274: Removing dependency on jakarta-regexp
    + JDK-8048933: -XX:+TraceExceptions output should include the
      message
    + JDK-8076151: [TESTBUG] Test java/awt/FontClass/CreateFont/
      /fileaccess/FontFile.java fails
    + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'
      treated by JVM as an equivalent
    + JDK-8154313: Generated javadoc scattered all over the place
    + JDK-8163251: Hard coded loop limit prevents reading of smart
      card data greater than 8k
    + JDK-8173300: [TESTBUG]compiler/tiered/NonTieredLevelsTest.java
      fails with compiler.whitebox.SimpleTestCaseHelper(int) must be
      compiled
    + JDK-8183349: Better cleanup for jdk/test/javax/imageio/
      /plugins/shared/CanWriteSequence.java and WriteAfterAbort.java
    + JDK-8191678: [TESTBUG] Add keyword headful in java/awt
      FocusTransitionTest test.
    + JDK-8201633: Problems with AES-GCM native acceleration
    + JDK-8211049: Second parameter of 'initialize' method is not
          used
    + JDK-8219566: JFR did not collect call stacks when
      MaxJavaStackTraceDepth is set to zero
    + JDK-8220165: Encryption using GCM results in
      RuntimeException- input length out of bound
    + JDK-8220555: JFR tool shows potentially misleading message
      when it cannot access a file
    + JDK-8224217: RecordingInfo should use textual representation
      of path
    + JDK-8231779: crash
      HeapWord*ParallelScavengeHeap::failed_mem_allocate
    + JDK-8238380, PR3798: java.base/unix/native/libjava/childproc.c
      'multiple definition' link errors with GCC10
    + JDK-8238386, PR3798: (sctp) jdk.sctp/unix/native/libsctp/
      /SctpNet.c 'multiple definition' link errors with GCC10
    + JDK-8238388, PR3798: libj2gss/NativeFunc.o 'multiple
      definition' link errors with GCC10
    + JDK-8242556: Cannot load RSASSA-PSS public key with non-null
      params from byte array
    + JDK-8250755: Better cleanup for jdk/test/javax/imageio/
      /plugins/shared/CanWriteSequence.java
  * Import of OpenJDK 8 u272 build 03
    + JDK-6574989: TEST_BUG:
      javax/sound/sampled/Clip/bug5070081.java fails sometimes
    + JDK-8148754: C2 loop unrolling fails due to unexpected graph
      shape
    + JDK-8192953: sun/management/jmxremote/bootstrap/*.sh tests
      fail with error : revokeall.exe: Permission denied
    + JDK-8203357: Container Metrics
    + JDK-8209113: Use WeakReference for lastFontStrike for created
      Fonts
    + JDK-8216283: Allow shorter method sampling interval than 10 ms
    + JDK-8221569: JFR tool produces incorrect output when both
      --categories and --events are specified
    + JDK-8233097: Fontmetrics for large Fonts has zero width
    + JDK-8248851: CMS: Missing memory fences between free chunk
      check and klass read
    + JDK-8250875: Incorrect parameter type for update_number in
      JDK_Version::jdk_update
  * Import of OpenJDK 8 u272 build 04
    + JDK-8061616: HotspotDiagnosticMXBean.getVMOption() throws
      IllegalArgumentException for flags of type double
    + JDK-8177334: Update xmldsig implementation to Apache
      Santuario 2.1.1
    + JDK-8217878: ENVELOPING XML signature no longer works in JDK
      11
    + JDK-8218629: XML Digital Signature throws NAMESPACE_ERR
      exception on OpenJDK 11, works 8/9/10
    + JDK-8243138: Enhance BaseLdapServer to support starttls
      extended request
  * Import of OpenJDK 8 u272 build 05
    + JDK-8026236: Add PrimeTest for BigInteger
    + JDK-8057003: Large reference arrays cause extremely long
      synchronization times
    + JDK-8060721: Test runtime/SharedArchiveFile/
      /LimitSharedSizes.java fails in jdk 9 fcs new
      platforms/compiler
    + JDK-8152077: (cal) Calendar.roll does not always roll the
      hours during daylight savings
    + JDK-8168517: java/lang/ProcessBuilder/Basic.java failed
    + JDK-8211163: UNIX version of Java_java_io_Console_echo does
      not return a clean boolean
    + JDK-8220674: [TESTBUG] MetricsMemoryTester failcount test in
      docker container only works with debug JVMs
    + JDK-8231213: Migrate SimpleDateFormatConstTest to JDK Repo
    + JDK-8236645: JDK 8u231 introduces a regression with
      incompatible handling of XML messages
    + JDK-8240676: Meet not symmetric failure when running lucene
      on jdk8
    + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA
      program
    + JDK-8249158: THREAD_START and THREAD_END event posted in
      primordial phase
    + JDK-8250627: Use -XX:+/-UseContainerSupport for
      enabling/disabling Java container metrics
    + JDK-8251546: 8u backport of JDK-8194298 breaks AIX and
      Solaris builds
    + JDK-8252084: Minimal VM fails to bootcycle: undefined symbol:
      AgeTableTracer::is_tenuring_distribution_event_enabled
  * Import of OpenJDK 8 u272 build 06
    + JDK-8064319: Need to enable -XX:+TraceExceptions in release
      builds
    + JDK-8080462, PR3801: Update SunPKCS11 provider with PKCS11
      v2.40 support
    + JDK-8160768: Add capability to custom resolve host/domain
      names within the default JNDI LDAP provider
    + JDK-8161973: PKIXRevocationChecker.getSoftFailExceptions()
      not working
    + JDK-8169925, PR3801: PKCS #11 Cryptographic Token Interface
      license
    + JDK-8184762: ZapStackSegments should use optimized memset
    + JDK-8193234: When using -Xcheck:jni an internally allocated
      buffer can leak
    + JDK-8219919: RuntimeStub name lost with
      PrintFrameConverterAssembly
    + JDK-8220313: [TESTBUG] Update base image for Docker testing
      to OL 7.6
    + JDK-8222079: Don't use memset to initialize fields decode_env
      constructor in disassembler.cpp
    + JDK-8225695: 32-bit build failures after JDK-8080462 (Update
      SunPKCS11 provider with PKCS11 v2.40 support)
    + JDK-8226575: OperatingSystemMXBean should be made container
      aware
    + JDK-8226809: Circular reference in printed stack trace is not
      correctly indented &amp; ambiguous
    + JDK-8228835: Memory leak in PKCS11 provider when using AES GCM
    + JDK-8233621: Mismatch in jsse.enableMFLNExtension property
      name
    + JDK-8238898, PR3801: Missing hash characters for header on
      license file
    + JDK-8243320: Add SSL root certificates to Oracle Root CA
      program
    + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest
      release 1.8.26
    + JDK-8245467: Remove 8u TLSv1.2 implementation files
    + JDK-8245469: Remove DTLS protocol implementation
    + JDK-8245470: Fix JDK8 compatibility issues
    + JDK-8245471: Revert JDK-8148188
    + JDK-8245472: Backport JDK-8038893 to JDK8
    + JDK-8245473: OCSP stapling support
    + JDK-8245474: Add TLS_KRB5 cipher suites support according to
      RFC-2712
    + JDK-8245476: Disable TLSv1.3 protocol in the ClientHello
      message by default
    + JDK-8245477: Adjust TLS tests location
    + JDK-8245653: Remove 8u TLS tests
    + JDK-8245681: Add TLSv1.3 regression test from 11.0.7
    + JDK-8251117: Cannot check P11Key size in P11Cipher and
      P11AEADCipher
    + JDK-8251120, PR3793: [8u] HotSpot build assumes ENABLE_JFR is
      set to either true or false
    + JDK-8251341: Minimal Java specification change
    + JDK-8251478: Backport TLSv1.3 regression tests to JDK8u
  * Import of OpenJDK 8 u272 build 07
    + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ
  * Import of OpenJDK 8 u272 build 08
    + JDK-8062947: Fix exception message to correctly represent
      LDAP connection failure
    + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed
      due to timeout on DeadServerNoTimeoutTest is incorrect
    + JDK-8252573: 8u: Windows build failed after 8222079 backport
  * Import of OpenJDK 8 u272 build 09
    + JDK-8252886: [TESTBUG] sun/security/ec/TestEC.java :
      Compilation failed
  * Import of OpenJDK 8 u272 build 10
    + JDK-8254673: Call to JvmtiExport::post_vm_start() was removed
      by the fix for JDK-8249158
    + JDK-8254937: Revert JDK-8148854 for 8u272
  * Backports
    + JDK-8038723, PR3806: Openup some PrinterJob tests
    + JDK-8041480, PR3806: ArrayIndexOutOfBoundsException when
      JTable contains certain string
    + JDK-8058779, PR3805: Faster implementation of
      String.replace(CharSequence, CharSequence)
    + JDK-8130125, PR3806: [TEST_BUG] add @modules to the several
      client tests unaffected by the automated bulk update
    + JDK-8144015, PR3806: [PIT] failures of text layout font tests
    + JDK-8144023, PR3806: [PIT] failure of text measurements in
      javax/swing/text/html/parser/Parser/6836089/bug6836089.java
    + JDK-8144240, PR3806: [macosx][PIT] AIOOB in
      closed/javax/swing/text/GlyphPainter2/6427244/bug6427244.java
    + JDK-8145542, PR3806: The case failed automatically and thrown
      java.lang.ArrayIndexOutOfBoundsException exception
    + JDK-8151725, PR3806: [macosx] ArrayIndexOOB exception when
      displaying Devanagari text in JEditorPane
    + JDK-8152358, PR3800: code and comment cleanups found during
      the hunt for 8077392
    + JDK-8152545, PR3804: Use preprocessor instead of compiling a
      program to generate native nio constants
    + JDK-8152680, PR3806: Regression in
      GlyphVector.getGlyphCharIndex behaviour
    + JDK-8158924, PR3806: Incorrect i18n text document layout
    + JDK-8166003, PR3806: [PIT][TEST_BUG] missing helper for
      javax/swing/text/GlyphPainter2/6427244/bug6427244.java
    + JDK-8166068, PR3806: test/java/awt/font/GlyphVector/
      /GetGlyphCharIndexTest.java does not compile
    + JDK-8169879, PR3806: [TEST_BUG] javax/swing/text/
      /GlyphPainter2/6427244/bug6427244.java - compilation failed
    + JDK-8191512, PR3806: T2K font rasterizer code removal
    + JDK-8191522, PR3806: Remove Bigelow&amp;Holmes Lucida fonts from
      JDK sources
    + JDK-8236512, PR3801: PKCS11 Connection closed after
      Cipher.doFinal and NoPadding
    + JDK-8254177, PR3809: (tz) Upgrade time-zone data to
      tzdata2020b
  * Bug fixes
    + PR3798: Fix format-overflow error on GCC 10, caused by
      passing NULL to a '%s' directive
    + PR3795: ECDSAUtils for XML digital signatures should support
      the same curve set as the rest of the JDK
    + PR3799: Adapt elliptic curve patches to JDK-8245468: Add
      TLSv1.3 implementation classes from 11.0.7
    + PR3808: IcedTea does not install the JFR *.jfc files
    + PR3810: Enable JFR on x86 (32-bit) now that JDK-8252096 has
      fixed its use with Shenandoah
    + PR3811: Don't attempt to install JFR files when JFR is
      disabled
  * Shenandoah
    + [backport] 8221435: Shenandoah should not mark through weak
      roots
    + [backport] 8221629: Shenandoah: Cleanup class unloading logic
    + [backport] 8222992: Shenandoah: Pre-evacuate all roots
    + [backport] 8223215: Shenandoah: Support verifying subset of
      roots
    + [backport] 8223774: Shenandoah: Refactor
      ShenandoahRootProcessor and family
    + [backport] 8224210: Shenandoah: Refactor
      ShenandoahRootScanner to support scanning CSet codecache roots
    + [backport] 8224508: Shenandoah: Need to update thread roots
      in final mark for piggyback ref update cycle
    + [backport] 8224579: ResourceMark not declared in
      shenandoahRootProcessor.inline.hpp with
      --disable-precompiled-headers
    + [backport] 8224679: Shenandoah: Make
      ShenandoahParallelCodeCacheIterator noncopyable
    + [backport] 8224751: Shenandoah: Shenandoah Verifier should
      select proper roots according to current GC cycle
    + [backport] 8225014: Separate ShenandoahRootScanner method for
      object_iterate
    + [backport] 8225216: gc/logging/TestMetaSpaceLog.java doesn't
      work for Shenandoah
    + [backport] 8225573: Shenandoah: Enhance ShenandoahVerifier to
      ensure roots to-space invariant
    + [backport] 8225590: Shenandoah: Refactor
      ShenandoahClassLoaderDataRoots API
    + [backport] 8226413: Shenandoah: Separate root scanner for
      SH::object_iterate()
    + [backport] 8230853: Shenandoah: replace leftover
      assert(is_in(...)) with rich asserts
    + [backport] 8231198: Shenandoah: heap walking should visit all
      roots most of the time
    + [backport] 8231244: Shenandoah: all-roots heap walking misses
      some weak roots
    + [backport] 8237632: Shenandoah: accept NULL fwdptr to
      cooperate with JVMTI and JFR
    + [backport] 8239786: Shenandoah: print per-cycle statistics
    + [backport] 8239926: Shenandoah: Shenandoah needs to mark
      nmethod's metadata
    + [backport] 8240671: Shenandoah: refactor
      ShenandoahPhaseTimings
    + [backport] 8240749: Shenandoah: refactor ShenandoahUtils
    + [backport] 8240750: Shenandoah: remove leftover files and
      mentions of ShenandoahAllocTracker
    + [backport] 8240868: Shenandoah: remove CM-with-UR
      piggybacking cycles
    + [backport] 8240872: Shenandoah: Avoid updating new regions
      from start of evacuation
    + [backport] 8240873: Shenandoah: Short-cut arraycopy barriers
    + [backport] 8240915: Shenandoah: Remove unused fields in init
      mark tasks
    + [backport] 8240948: Shenandoah: cleanup not-forwarded-objects
      paths after JDK-8240868
    + [backport] 8241007: Shenandoah: remove
      ShenandoahCriticalControlThreadPriority support
    + [backport] 8241062: Shenandoah: rich asserts trigger 'empty
      statement' inspection
    + [backport] 8241081: Shenandoah: Do not modify
      update-watermark concurrently
    + [backport] 8241093: Shenandoah: editorial changes in flag
      descriptions
    + [backport] 8241139: Shenandoah: distribute mark-compact work
      exactly to minimize fragmentation
    + [backport] 8241142: Shenandoah: should not use parallel
      reference processing with single GC thread
    + [backport] 8241351: Shenandoah: fragmentation metrics overhaul
    + [backport] 8241435: Shenandoah: avoid disabling pacing with
      'aggressive'
    + [backport] 8241520: Shenandoah: simplify region sequence
      numbers handling
    + [backport] 8241534: Shenandoah: region status should include
      update watermark
    + [backport] 8241574: Shenandoah: remove
      ShenandoahAssertToSpaceClosure
    + [backport] 8241583: Shenandoah: turn heap lock asserts into
      macros
    + [backport] 8241668: Shenandoah: make ShenandoahHeapRegion not
      derive from ContiguousSpace
    + [backport] 8241673: Shenandoah: refactor anti-false-sharing
      padding
    + [backport] 8241675: Shenandoah: assert(n-&gt;outcnt() &gt; 0) at
      shenandoahSupport.cpp:2858 with
      java/util/Collections/FindSubList.java
    + [backport] 8241692: Shenandoah: remove
      ShenandoahHeapRegion::_reserved
    + [backport] 8241700: Shenandoah: Fold
      ShenandoahKeepAliveBarrier flag into ShenandoahSATBBarrier
    + [backport] 8241740: Shenandoah: remove
      ShenandoahHeapRegion::_heap
    + [backport] 8241743: Shenandoah: refactor and inline
      ShenandoahHeap::heap()
    + [backport] 8241748: Shenandoah: inline MarkingContext TAMS
      methods
    + [backport] 8241838: Shenandoah: no need to trash cset during
      final mark
    + [backport] 8241841: Shenandoah: ditch one of allocation type
      counters in ShenandoahHeapRegion
    + [backport] 8241842: Shenandoah: inline
      ShenandoahHeapRegion::region_number
    + [backport] 8241844: Shenandoah: rename
      ShenandoahHeapRegion::region_number
    + [backport] 8241845: Shenandoah: align ShenandoahHeapRegions
      to cache lines
    + [backport] 8241926: Shenandoah: only print heap changes for
      operations that directly affect it
    + [backport] 8241983: Shenandoah: simplify FreeSet logging
    + [backport] 8241985: Shenandoah: simplify collectable garbage
      logging
    + [backport] 8242040: Shenandoah: print allocation failure type
    + [backport] 8242041: Shenandoah: adaptive heuristics should
      account evac reserve in free target
    + [backport] 8242042: Shenandoah: tune down
      ShenandoahGarbageThreshold
    + [backport] 8242054: Shenandoah: New incremental-update mode
    + [backport] 8242075: Shenandoah: rename
      ShenandoahHeapRegionSize flag
    + [backport] 8242082: Shenandoah: Purge Traversal mode
    + [backport] 8242083: Shenandoah: split 'Prepare Evacuation'
      tracking into cset/freeset counters
    + [backport] 8242089: Shenandoah: per-worker stats should be
      summed up, not averaged
    + [backport] 8242101: Shenandoah: coalesce and parallelise heap
      region walks during the pauses
    + [backport] 8242114: Shenandoah: remove
      ShenandoahHeapRegion::reset_alloc_metadata_to_shared
    + [backport] 8242130: Shenandoah: Simplify arraycopy-barrier
      dispatching
    + [backport] 8242211: Shenandoah: remove
      ShenandoahHeuristics::RegionData::_seqnum_last_alloc
    + [backport] 8242212: Shenandoah: initialize
      ShenandoahHeuristics::_region_data eagerly
    + [backport] 8242213: Shenandoah: remove
      ShenandoahHeuristics::_bytes_in_cset
    + [backport] 8242217: Shenandoah: Enable GC mode to be
      diagnostic/experimental and have a name
    + [backport] 8242227: Shenandoah: transit regions to cset state
      when adding to collection set
    + [backport] 8242228: Shenandoah: remove unused
      ShenandoahCollectionSet methods
    + [backport] 8242229: Shenandoah: inline ShenandoahHeapRegion
      liveness-related methods
    + [backport] 8242267: Shenandoah: regions space needs to be
      aligned by os::vm_allocation_granularity()
    + [backport] 8242271: Shenandoah: add test to verify GC mode
      unlock
    + [backport] 8242273: Shenandoah: accept either SATB or IU
      barriers, but not both
    + [backport] 8242301: Shenandoah: Inline LRB runtime call
    + [backport] 8242316: Shenandoah: Turn NULL-check into assert
      in SATB slow-path entry
    + [backport] 8242353: Shenandoah: micro-optimize region
      liveness handling
    + [backport] 8242365: Shenandoah: use uint16_t instead of
      jushort for liveness cache
    + [backport] 8242375: Shenandoah: Remove
      ShenandoahHeuristic::record_gc_start/end methods
    + [backport] 8242641: Shenandoah: clear live data and update
      TAMS optimistically
    + [backport] 8243238: Shenandoah: explicit GC request should
      wait for a complete GC cycle
    + [backport] 8243301: Shenandoah: ditch
      ShenandoahAllowMixedAllocs
    + [backport] 8243307: Shenandoah: remove
      ShCollectionSet::live_data
    + [backport] 8243395: Shenandoah: demote guarantee in
      ShenandoahPhaseTimings::record_workers_end
    + [backport] 8243463: Shenandoah: ditch total_pause counters
    + [backport] 8243464: Shenandoah: print statistic counters in
      time order
    + [backport] 8243465: Shenandoah: ditch unused pause_other,
      conc_other counters
    + [backport] 8243487: Shenandoah: make _num_phases illegal
      phase type
    + [backport] 8243494: Shenandoah: set counters once per cycle
    + [backport] 8243573: Shenandoah: rename GCParPhases and
      related code
    + [backport] 8243848: Shenandoah: Windows build fails after
      JDK-8239786
    + [backport] 8244180: Shenandoah: carry Phase to
      ShWorkerTimingsTracker explicitly
    + [backport] 8244200: Shenandoah: build breakages after
      JDK-8241743
    + [backport] 8244226: Shenandoah: per-cycle statistics contain
      worker data from previous cycles
    + [backport] 8244326: Shenandoah: global statistics should not
      accept bogus samples
    + [backport] 8244509: Shenandoah: refactor
      ShenandoahBarrierC2Support::test_* methods
    + [backport] 8244551: Shenandoah: Fix racy update of
      update_watermark
    + [backport] 8244667: Shenandoah: SBC2Support::test_gc_state
      takes loop for wrong control
    + [backport] 8244730: Shenandoah: gc/shenandoah/options/
      /TestHeuristicsUnlock.java should only verify the heuristics
    + [backport] 8244732: Shenandoah: move heuristics code to
      gc/shenandoah/heuristics
    + [backport] 8244737: Shenandoah: move mode code to
      gc/shenandoah/mode
    + [backport] 8244739: Shenandoah: break superclass dependency
      on ShenandoahNormalMode
    + [backport] 8244740: Shenandoah: rename ShenandoahNormalMode
      to ShenandoahSATBMode
    + [backport] 8245461: Shenandoah: refine mode name()-s
    + [backport] 8245463: Shenandoah: refine ShenandoahPhaseTimings
      constructor arguments
    + [backport] 8245464: Shenandoah: allocate collection set
      bitmap at lower addresses
    + [backport] 8245465: Shenandoah: test_in_cset can use more
      efficient encoding
    + [backport] 8245726: Shenandoah: lift/cleanup
      ShenandoahHeuristics names and properties
    + [backport] 8245754: Shenandoah: ditch ShenandoahAlwaysPreTouch
    + [backport] 8245757: Shenandoah: AlwaysPreTouch should not
      disable heap resizing or uncommits
    + [backport] 8245773: Shenandoah: Windows assertion failure
      after JDK-8245464
    + [backport] 8245812: Shenandoah: compute root phase parallelism
    + [backport] 8245814: Shenandoah: reconsider format specifiers
      for stats
    + [backport] 8245825: Shenandoah: Remove diagnostic flag
      ShenandoahConcurrentScanCodeRoots
    + [backport] 8246162: Shenandoah: full GC does not mark code
      roots when class unloading is off
    + [backport] 8247310: Shenandoah: pacer should not affect
      interrupt status
    + [backport] 8247358: Shenandoah: reconsider free budget slice
      for marking
    + [backport] 8247367: Shenandoah: pacer should wait on lock
      instead of exponential backoff
    + [backport] 8247474: Shenandoah: Windows build warning after
      JDK-8247310
    + [backport] 8247560: Shenandoah: heap iteration holds root
      locks all the time
    + [backport] 8247593: Shenandoah: should not block pacing
      reporters
    + [backport] 8247751: Shenandoah: options tests should run with
      smaller heaps
    + [backport] 8247754: Shenandoah: mxbeans tests can be shorter
    + [backport] 8247757: Shenandoah: split heavy tests by
      heuristics to improve parallelism
    + [backport] 8247860: Shenandoah: add update watermark line in
      rich assert failure message
    + [backport] 8248041: Shenandoah: pre-Full GC root updates may
      miss some roots
    + [backport] 8248652: Shenandoah: SATB buffer handling may
      assume no forwarded objects
    + [backport] 8249560: Shenandoah: Fix racy GC request handling
    + [backport] 8249649: Shenandoah: provide per-cycle pacing stats
    + [backport] 8249801: Shenandoah: Clear soft-refs on requested
      GC cycle
    + [backport] 8249953: Shenandoah: gc/shenandoah/mxbeans tests
      should account for corner cases
    + Fix slowdebug build after JDK-8230853 backport
    + JDK-8252096: Shenandoah: adjust SerialPageShiftCount for
      x86_32 and JFR
    + JDK-8252366: Shenandoah: revert/cleanup changes in
      graphKit.cpp
    + Shenandoah: add JFR roots to root processor after JFR
      integration
    + Shenandoah: add root statistics for string dedup table/queues
    + Shenandoah: enable low-frequency STW class unloading
    + Shenandoah: fix build failures after JDK-8244737 backport
    + Shenandoah: Fix build failure with +JFR -PCH
    + Shenandoah: fix forceful pacer claim
    + Shenandoah: fix formats in
      ShenandoahStringSymbolTableUnlinkTask
    + Shenandoah: fix runtime linking failure due to non-compiled
      shenandoahBarrierSetC1
    + Shenandoah: hook statistics printing to PrintGCDetails, not
      PrintGC
    + Shenandoah: JNI weak roots are always cleared before Full GC
      mark
    + Shenandoah: missing SystemDictionary roots in
      ShenandoahHeapIterationRootScanner
    + Shenandoah: move barrier sets to their proper locations
    + Shenandoah: move parallelCleaning.* to shenandoah/
    + Shenandoah: pacer should use proper Atomics for intptr_t
    + Shenandoah: properly deallocates class loader metadata
    + Shenandoah: specialize String Table scans for better pause
      performance
    + Shenandoah: Zero build fails after recent Atomic cleanup in
      Pacer
  * AArch64 port
    + JDK-8161072, PR3797: AArch64: jtreg
      compiler/uncommontrap/TestDeoptOOM failure
    + JDK-8171537, PR3797: aarch64: compiler/c1/Test6849574.java
      generates guarantee failure in C1
    + JDK-8183925, PR3797: [AArch64] Decouple crash protection from
      watcher thread
    + JDK-8199712, PR3797: [AArch64] Flight Recorder
    + JDK-8203481, PR3797: Incorrect constraint for unextended_sp
      in frame:safe_for_sender
    + JDK-8203699, PR3797: java/lang/invoke/SpecialInterfaceCall
      fails with SIGILL on aarch64
    + JDK-8209413, PR3797: AArch64: NPE in clhsdb jstack command
    + JDK-8215961, PR3797: jdk/jfr/event/os/TestCPUInformation.java
      fails on AArch64
    + JDK-8216989, PR3797:
      CardTableBarrierSetAssembler::gen_write_ref_array_post_barrier()
      does not check for zero length on AARCH64
    + JDK-8217368, PR3797: AArch64: C2 recursive stack locking
      optimisation not triggered
    + JDK-8221658, PR3797: aarch64: add necessary predicate for
      ubfx patterns
    + JDK-8237512, PR3797: AArch64: aarch64TestHook leaks a
      BufferBlob
    + JDK-8246482, PR3797: Build failures with +JFR -PCH
    + JDK-8247979, PR3797: aarch64: missing side effect of killing
      flags for clearArray_reg_reg
    + JDK-8248219, PR3797: aarch64: missing memory barrier in
      fast_storefield and fast_accessfield

- Ignore whitespaces after the header or footer in PEM X.509 cert
  (bsc#1171352)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556616" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556617" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556618" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556619" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151347" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_124 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721283" comment="kernel-default 4.4.180-94.124 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719614" comment="kgraft-patch-4_4_180-94_124-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556620" comment="kgraft-patch-4_4_180-94_124-default-3-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151348" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_121 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721282" comment="kernel-default 4.4.180-94.121 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719612" comment="kgraft-patch-4_4_180-94_121-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556621" comment="kgraft-patch-4_4_180-94_121-default-3-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151349" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_116 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721281" comment="kernel-default 4.4.180-94.116 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719610" comment="kgraft-patch-4_4_180-94_116-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556622" comment="kgraft-patch-4_4_180-94_116-default-4-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151350" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-11668: Fixed an out of bounds write to the heap in drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) caused by mishandling invalid descriptors (bsc#1168952).
- CVE-2020-1749: A flaw was found in the implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link, rather sending the data unencrypted. This would have allowed anyone in between the two endpoints to read the traffic unencrypted. (bsc#1165629)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556623" comment="kgraft-patch-4_4_180-94_130-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151351" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_113 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721279" comment="kernel-default 4.4.180-94.113 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719606" comment="kgraft-patch-4_4_180-94_113-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556624" comment="kgraft-patch-4_4_180-94_113-default-7-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151352" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556625" comment="kgraft-patch-4_4_180-94_127-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151353" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_107 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721280" comment="kernel-default 4.4.180-94.107 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719608" comment="kgraft-patch-4_4_180-94_107-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556626" comment="kgraft-patch-4_4_180-94_107-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151354" version="1" class="patch">
	<metadata>
		<title>Security update for gcc10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1172798" ref_url="https://bugzilla.suse.com/1172798" source="BUGZILLA"/>
		<reference ref_id="1172846" ref_url="https://bugzilla.suse.com/1172846" source="BUGZILLA"/>
		<reference ref_id="1173972" ref_url="https://bugzilla.suse.com/1173972" source="BUGZILLA"/>
		<reference ref_id="1174753" ref_url="https://bugzilla.suse.com/1174753" source="BUGZILLA"/>
		<reference ref_id="1174817" ref_url="https://bugzilla.suse.com/1174817" source="BUGZILLA"/>
		<reference ref_id="1175168" ref_url="https://bugzilla.suse.com/1175168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844/" source="CVE"/>
		<description>
This update for gcc10 fixes the following issues:
This update provides the GCC10 compiler suite and runtime libraries.

The base SUSE Linux Enterprise libraries libgcc_s1, libstdc++6 are replaced by
the gcc10 variants.

The new compiler variants are available with '-10' suffix, you can specify them
via:

        CC=gcc-10
        CXX=g++-10

or similar commands.

For a detailed changelog check out https://gcc.gnu.org/gcc-10/changes.html
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-10"/>
	<updated date="2020-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172798">SUSE bug 1172798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172846">SUSE bug 1172846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173972">SUSE bug 1173972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174753">SUSE bug 1174753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174817">SUSE bug 1174817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175168">SUSE bug 1175168</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13844">CVE-2020-13844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556627" comment="libasan6-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531498" comment="libasan6-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556628" comment="libatomic1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531500" comment="libatomic1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556629" comment="libgcc_s1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531502" comment="libgcc_s1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556630" comment="libgfortran5-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531504" comment="libgfortran5-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556631" comment="libgo16-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531506" comment="libgo16-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556632" comment="libgomp1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531508" comment="libgomp1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556633" comment="libitm1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531510" comment="libitm1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556634" comment="liblsan0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556635" comment="libobjc4-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531513" comment="libobjc4-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531514" comment="libquadmath0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531515" comment="libquadmath0-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556636" comment="libstdc++6-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531517" comment="libstdc++6-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556637" comment="libstdc++6-locale-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556638" comment="libstdc++6-pp-gcc10-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531520" comment="libstdc++6-pp-gcc10-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556639" comment="libtsan0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556640" comment="libubsan1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531523" comment="libubsan1-32bit-10.2.1+git583-1.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151355" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

- Intel CPU Microcode updated to 20201027 prerelease 
- CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) (bsc#1170446)
- CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)

# New Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  # Updated Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531524" comment="ucode-intel-20201027-13.76.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151356" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1106383" ref_url="https://bugzilla.suse.com/1106383" source="BUGZILLA"/>
		<reference ref_id="1133495" ref_url="https://bugzilla.suse.com/1133495" source="BUGZILLA"/>
		<reference ref_id="1139459" ref_url="https://bugzilla.suse.com/1139459" source="BUGZILLA"/>
		<reference ref_id="1151377" ref_url="https://bugzilla.suse.com/1151377" source="BUGZILLA"/>
		<reference ref_id="1151506" ref_url="https://bugzilla.suse.com/1151506" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1155574" ref_url="https://bugzilla.suse.com/1155574" source="BUGZILLA"/>
		<reference ref_id="1156482" ref_url="https://bugzilla.suse.com/1156482" source="BUGZILLA"/>
		<reference ref_id="1159814" ref_url="https://bugzilla.suse.com/1159814" source="BUGZILLA"/>
		<reference ref_id="1162108" ref_url="https://bugzilla.suse.com/1162108" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1712" ref_url="https://www.suse.com/security/cve/CVE-2020-1712/" source="CVE"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2020-1712 (bsc#bsc#1162108)
  Fix a heap use-after-free vulnerability, when asynchronous
  Polkit queries were performed while handling Dbus messages. A local
  unprivileged attacker could have abused this flaw to crash systemd services or
  potentially execute code and elevate their privileges, by sending specially
  crafted Dbus messages.

- Unconfirmed fix for prevent hanging of systemctl during restart. (bsc#1139459)
- Fix warnings thrown during package installation. (bsc#1154043)
- Fix for system-udevd prevent crash within OES2018. (bsc#1151506)
- Fragments of masked units ought not be considered for 'NeedDaemonReload'. (bsc#1156482)
- Wait for workers to finish when exiting. (bsc#1106383)
- Improve log message when inotify limit is reached. (bsc#1155574)
- Mention in the man pages that alias names are only effective after command 'systemctl enable'. (bsc#1151377)
- Introduce function for reading virtual files in 'sysfs' and 'procfs'. (bsc#1133495, bsc#1159814)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106383">SUSE bug 1106383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133495">SUSE bug 1133495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139459">SUSE bug 1139459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151377">SUSE bug 1151377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151506">SUSE bug 1151506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155574">SUSE bug 1155574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156482">SUSE bug 1156482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159814">SUSE bug 1159814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162108">SUSE bug 1162108</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1712/">CVE-2020-1712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1712">CVE-2020-1712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556641" comment="libsystemd0-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522620" comment="libsystemd0-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556642" comment="libudev-devel-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556643" comment="libudev1-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522622" comment="libudev1-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556644" comment="systemd-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522624" comment="systemd-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522625" comment="systemd-bash-completion-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556645" comment="systemd-sysvinit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556646" comment="udev-228-150.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151357" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.24 - OpenJDK 7u281 (October 2020 CPU, bsc#1177943)
  * Security fixes
    + JDK-8233624: Enhance JNI linkage
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8240124: Better VM Interning
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Import of OpenJDK 7 u281 build 1
    + JDK-8145096: Undefined behaviour in HotSpot
    + JDK-8215265: C2: range check elimination may allow illegal
      out of bound access
  * Backports
    + JDK-8250861, PR3812: Crash in MinINode::Ideal(PhaseGVN*, bool)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556647" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556648" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556649" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556650" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151358" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178387" ref_url="https://bugzilla.suse.com/1178387" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25692">CVE-2020-25692 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556651" comment="libldap-2_4-2-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531531" comment="libldap-2_4-2-32bit-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556652" comment="openldap2-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556653" comment="openldap2-back-meta-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556654" comment="openldap2-client-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531535" comment="openldap2-doc-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556655" comment="openldap2-ppolicy-check-password-1.2-18.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151359" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178588" ref_url="https://bugzilla.suse.com/1178588" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-49 (bsc#1178588)
  * CVE-2020-26950 (bmo#1675905)
    Write side effects in MCallGetProperty opcode not accounted
    for
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178588">SUSE bug 1178588</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26950">CVE-2020-26950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556656" comment="MozillaFirefox-78.4.1-112.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556657" comment="MozillaFirefox-devel-78.4.1-112.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556658" comment="MozillaFirefox-translations-common-78.4.1-112.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151360" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql96, postgresql10 and postgresql12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1171924" ref_url="https://bugzilla.suse.com/1171924" source="BUGZILLA"/>
		<description>


This update changes the internal packaging for postgresql, and so contains
all currently maintained postgresql versions across our SUSE Linux Enterprise 12
products.


* postgresql12 is shipped new in version 12.3 (bsc#1171924).

  The server and client packages only on SUSE Linux Enterprise Server 12 SP5,
  the libraries on SUSE Linux Enterprise Server 12 SP2 LTSS up to 12 SP5.

  + https://www.postgresql.org/about/news/2038/
  + https://www.postgresql.org/docs/12/release-12-3.html


* postgresql10 is updated to 10.13 (bsc#1171924).

  On SUSE Linux Enterprise Server 12 SP2 LTSS up to 12 SP5.

  +  https://www.postgresql.org/about/news/2038/
  +  https://www.postgresql.org/docs/10/release-10-13.html


* postgresql96 is updated to 9.6.18 (bsc#1171924):

  +  https://www.postgresql.org/about/news/2038/
  +  https://www.postgresql.org/docs/9.6/release-9-6-18.html

  On SUSE Linux Enterprise Server 12-SP2 and 12-SP3 LTSS only.

* postgresql 9.4 is updated to 9.4.26:

  +  https://www.postgresql.org/about/news/2011/
  +  https://www.postgresql.org/docs/9.4/release-9-4-26.html
  +  https://www.postgresql.org/about/news/1994/
  +  https://www.postgresql.org/docs/9.4/release-9-4-25.html

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171924">SUSE bug 1171924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556659" comment="libecpg6-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556660" comment="libpq5-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531548" comment="libpq5-32bit-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531549" comment="postgresql-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531550" comment="postgresql-contrib-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531551" comment="postgresql-docs-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531552" comment="postgresql-plperl-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531553" comment="postgresql-plpython-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531554" comment="postgresql-pltcl-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531555" comment="postgresql-server-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556661" comment="postgresql10-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556662" comment="postgresql10-contrib-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531558" comment="postgresql10-docs-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556663" comment="postgresql10-plperl-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556664" comment="postgresql10-plpython-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556665" comment="postgresql10-pltcl-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556666" comment="postgresql10-server-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556667" comment="postgresql96-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556668" comment="postgresql96-contrib-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531572" comment="postgresql96-docs-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556669" comment="postgresql96-plperl-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556670" comment="postgresql96-plpython-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556671" comment="postgresql96-pltcl-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556672" comment="postgresql96-server-9.6.19-6.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151361" version="1" class="patch">
	<metadata>
		<title>Security update for raptor (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178593" ref_url="https://bugzilla.suse.com/1178593" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18926" ref_url="https://www.suse.com/security/cve/CVE-2017-18926/" source="CVE"/>
		<description>
This update for raptor fixes the following issues:

- Fixed a heap overflow vulnerability (bsc#1178593, CVE-2017-18926).
- Update raptor to version 2.0.15
  * Made several fixes to Turtle / N-Triples family of parsers and serializers
  * Added utility functions for re-entrant sorting of objects and sequences.
  * Made other fixes and improvements including fixing reported issues:
    0000574, 0000575, 0000576, 0000577, 0000579, 0000581 and 0000584.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178593">SUSE bug 1178593</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18926/">CVE-2017-18926 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18926">CVE-2017-18926 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556673" comment="libraptor2-0-2.0.15-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151362" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178671" ref_url="https://bugzilla.suse.com/1178671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12321" ref_url="https://www.suse.com/security/cve/CVE-2020-12321/" source="CVE"/>
		<description>
This update for kernel-firmware fixes the following issue:

- CVE-2020-12321: Updated the Intel Bluetooth firmware for buffer overflow security bugs (bsc#1178671).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-17"/>
	<updated date="2020-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178671">SUSE bug 1178671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12321/">CVE-2020-12321 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12321">CVE-2020-12321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531578" comment="kernel-firmware-20170530-21.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531579" comment="ucode-amd-20170530-21.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151363" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178512" ref_url="https://bugzilla.suse.com/1178512" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28196" ref_url="https://www.suse.com/security/cve/CVE-2020-28196/" source="CVE"/>
		<description>
This update for krb5 fixes the following security issue:

- CVE-2020-28196: Fixed an unbounded recursion via an ASN.1-encoded Kerberos message (bsc#1178512).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178512">SUSE bug 1178512</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28196/">CVE-2020-28196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28196">CVE-2020-28196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556674" comment="krb5-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531585" comment="krb5-32bit-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556675" comment="krb5-client-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556676" comment="krb5-doc-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556677" comment="krb5-plugin-kdb-ldap-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556678" comment="krb5-plugin-preauth-otp-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556679" comment="krb5-plugin-preauth-pkinit-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556680" comment="krb5-server-1.12.5-40.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151364" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556681" comment="kgraft-patch-4_4_180-94_130-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151365" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556682" comment="kgraft-patch-4_4_180-94_127-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151366" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_124 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721283" comment="kernel-default 4.4.180-94.124 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719614" comment="kgraft-patch-4_4_180-94_124-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556683" comment="kgraft-patch-4_4_180-94_124-default-4-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151367" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_121 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721282" comment="kernel-default 4.4.180-94.121 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719612" comment="kgraft-patch-4_4_180-94_121-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556684" comment="kgraft-patch-4_4_180-94_121-default-4-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151368" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_116 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721281" comment="kernel-default 4.4.180-94.116 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719610" comment="kgraft-patch-4_4_180-94_116-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556685" comment="kgraft-patch-4_4_180-94_116-default-5-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151369" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_113 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721279" comment="kernel-default 4.4.180-94.113 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719606" comment="kgraft-patch-4_4_180-94_113-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556686" comment="kgraft-patch-4_4_180-94_113-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151370" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_107 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721280" comment="kernel-default 4.4.180-94.107 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719608" comment="kgraft-patch-4_4_180-94_107-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556687" comment="kgraft-patch-4_4_180-94_107-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151371" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

Upgrade to version 10.15:

  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/10/release-10-15.html

Update to 10.14:

  * CVE-2020-14349, bsc#1175193: Set a secure search_path in
    logical replication walsenders and apply workers
  * CVE-2020-14350, bsc#1175194: Make contrib modules' installation
    scripts more secure.
  * https://www.postgresql.org/docs/10/release-10-14.html

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14349">CVE-2020-14349 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556688" comment="postgresql10-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556689" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556690" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556691" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556692" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556693" comment="postgresql10-server-10.15-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151372" version="1" class="patch">
	<metadata>
		<title>Security update for u-boot (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1134157" ref_url="https://bugzilla.suse.com/1134157" source="BUGZILLA"/>
		<reference ref_id="1134853" ref_url="https://bugzilla.suse.com/1134853" source="BUGZILLA"/>
		<reference ref_id="1143463" ref_url="https://bugzilla.suse.com/1143463" source="BUGZILLA"/>
		<reference ref_id="1143777" ref_url="https://bugzilla.suse.com/1143777" source="BUGZILLA"/>
		<reference ref_id="1143817" ref_url="https://bugzilla.suse.com/1143817" source="BUGZILLA"/>
		<reference ref_id="1143818" ref_url="https://bugzilla.suse.com/1143818" source="BUGZILLA"/>
		<reference ref_id="1143819" ref_url="https://bugzilla.suse.com/1143819" source="BUGZILLA"/>
		<reference ref_id="1143820" ref_url="https://bugzilla.suse.com/1143820" source="BUGZILLA"/>
		<reference ref_id="1143821" ref_url="https://bugzilla.suse.com/1143821" source="BUGZILLA"/>
		<reference ref_id="1143823" ref_url="https://bugzilla.suse.com/1143823" source="BUGZILLA"/>
		<reference ref_id="1143824" ref_url="https://bugzilla.suse.com/1143824" source="BUGZILLA"/>
		<reference ref_id="1143825" ref_url="https://bugzilla.suse.com/1143825" source="BUGZILLA"/>
		<reference ref_id="1143827" ref_url="https://bugzilla.suse.com/1143827" source="BUGZILLA"/>
		<reference ref_id="1143828" ref_url="https://bugzilla.suse.com/1143828" source="BUGZILLA"/>
		<reference ref_id="1143830" ref_url="https://bugzilla.suse.com/1143830" source="BUGZILLA"/>
		<reference ref_id="1143831" ref_url="https://bugzilla.suse.com/1143831" source="BUGZILLA"/>
		<reference ref_id="1167209" ref_url="https://bugzilla.suse.com/1167209" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11059" ref_url="https://www.suse.com/security/cve/CVE-2019-11059/" source="CVE"/>
		<reference ref_id="CVE-2019-11690" ref_url="https://www.suse.com/security/cve/CVE-2019-11690/" source="CVE"/>
		<reference ref_id="CVE-2019-13103" ref_url="https://www.suse.com/security/cve/CVE-2019-13103/" source="CVE"/>
		<reference ref_id="CVE-2019-14192" ref_url="https://www.suse.com/security/cve/CVE-2019-14192/" source="CVE"/>
		<reference ref_id="CVE-2019-14193" ref_url="https://www.suse.com/security/cve/CVE-2019-14193/" source="CVE"/>
		<reference ref_id="CVE-2019-14194" ref_url="https://www.suse.com/security/cve/CVE-2019-14194/" source="CVE"/>
		<reference ref_id="CVE-2019-14195" ref_url="https://www.suse.com/security/cve/CVE-2019-14195/" source="CVE"/>
		<reference ref_id="CVE-2019-14196" ref_url="https://www.suse.com/security/cve/CVE-2019-14196/" source="CVE"/>
		<reference ref_id="CVE-2019-14197" ref_url="https://www.suse.com/security/cve/CVE-2019-14197/" source="CVE"/>
		<reference ref_id="CVE-2019-14198" ref_url="https://www.suse.com/security/cve/CVE-2019-14198/" source="CVE"/>
		<reference ref_id="CVE-2019-14200" ref_url="https://www.suse.com/security/cve/CVE-2019-14200/" source="CVE"/>
		<reference ref_id="CVE-2019-14201" ref_url="https://www.suse.com/security/cve/CVE-2019-14201/" source="CVE"/>
		<reference ref_id="CVE-2019-14202" ref_url="https://www.suse.com/security/cve/CVE-2019-14202/" source="CVE"/>
		<reference ref_id="CVE-2019-14203" ref_url="https://www.suse.com/security/cve/CVE-2019-14203/" source="CVE"/>
		<reference ref_id="CVE-2019-14204" ref_url="https://www.suse.com/security/cve/CVE-2019-14204/" source="CVE"/>
		<reference ref_id="CVE-2019-14299" ref_url="https://www.suse.com/security/cve/CVE-2019-14299/" source="CVE"/>
		<reference ref_id="CVE-2020-10648" ref_url="https://www.suse.com/security/cve/CVE-2020-10648/" source="CVE"/>
		<description>
This update for u-boot fixes the following issues:

Work around CVE-2019-11059 by disabling 64Bit descritptor size (bsc#1134853)

CVE-2019-11690 (bsc#1134157), CVE-2020-10648 (bsc#1167209), CVE-2019-13103 (bsc#1143463),
CVE-2019-14197 (bsc#1143821), CVE-2019-14200 (bsc#1143825), CVE-2019-14201 (bsc#1143827),
CVE-2019-14202 (bsc#1143828), CVE-2019-14203 (bsc#1143830), CVE-2019-14204 (bsc#1143831),
CVE-2019-14194 (bsc#1143818), CVE-2019-14198 (bsc#1143823), CVE-2019-14195 (bsc#1143819),
CVE-2019-14196 (bsc#1143820), CVE-2019-14299 (bsc#1143824), CVE-2019-14192 (bsc#1143777),
CVE-2019-14193 (bsc#1143817).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-20"/>
	<updated date="2020-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1134157">SUSE bug 1134157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134853">SUSE bug 1134853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143463">SUSE bug 1143463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143777">SUSE bug 1143777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143817">SUSE bug 1143817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143818">SUSE bug 1143818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143819">SUSE bug 1143819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143820">SUSE bug 1143820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143821">SUSE bug 1143821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143823">SUSE bug 1143823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143824">SUSE bug 1143824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143825">SUSE bug 1143825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143827">SUSE bug 1143827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143828">SUSE bug 1143828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143830">SUSE bug 1143830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143831">SUSE bug 1143831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167209">SUSE bug 1167209</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-11059/">CVE-2019-11059 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11059">CVE-2019-11059 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11690/">CVE-2019-11690 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11690">CVE-2019-11690 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-13103/">CVE-2019-13103 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13103">CVE-2019-13103 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14192/">CVE-2019-14192 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14192">CVE-2019-14192 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14193/">CVE-2019-14193 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14193">CVE-2019-14193 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14194/">CVE-2019-14194 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14194">CVE-2019-14194 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14195/">CVE-2019-14195 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14195">CVE-2019-14195 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14196/">CVE-2019-14196 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14196">CVE-2019-14196 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14197/">CVE-2019-14197 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14197">CVE-2019-14197 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14198/">CVE-2019-14198 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14198">CVE-2019-14198 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14200/">CVE-2019-14200 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14200">CVE-2019-14200 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14201/">CVE-2019-14201 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14201">CVE-2019-14201 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14202/">CVE-2019-14202 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14202">CVE-2019-14202 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14203/">CVE-2019-14203 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14203">CVE-2019-14203 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14204/">CVE-2019-14204 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14204">CVE-2019-14204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14299/">CVE-2019-14299 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14299">CVE-2019-14299 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10648/">CVE-2020-10648 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10648">CVE-2020-10648 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555224" comment="u-boot-rpi3-2016.07-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555225" comment="u-boot-tools-2016.07-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151373" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<description>
This update for postgresql96 fixes the following issues:

Upgrade to version 9.6.20:

  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/9.6/release-9-6-20.html

Changes from 9.6.19:

  * CVE-2020-14350, bsc#1175194: Make contrib modules installation
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556694" comment="postgresql96-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556695" comment="postgresql96-contrib-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531601" comment="postgresql96-docs-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556696" comment="postgresql96-plperl-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556697" comment="postgresql96-plpython-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556698" comment="postgresql96-pltcl-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556699" comment="postgresql96-server-9.6.20-6.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151374" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1083244" ref_url="https://bugzilla.suse.com/1083244" source="BUGZILLA"/>
		<reference ref_id="1121826" ref_url="https://bugzilla.suse.com/1121826" source="BUGZILLA"/>
		<reference ref_id="1121872" ref_url="https://bugzilla.suse.com/1121872" source="BUGZILLA"/>
		<reference ref_id="1157298" ref_url="https://bugzilla.suse.com/1157298" source="BUGZILLA"/>
		<reference ref_id="1160917" ref_url="https://bugzilla.suse.com/1160917" source="BUGZILLA"/>
		<reference ref_id="1170415" ref_url="https://bugzilla.suse.com/1170415" source="BUGZILLA"/>
		<reference ref_id="1175228" ref_url="https://bugzilla.suse.com/1175228" source="BUGZILLA"/>
		<reference ref_id="1175306" ref_url="https://bugzilla.suse.com/1175306" source="BUGZILLA"/>
		<reference ref_id="1175721" ref_url="https://bugzilla.suse.com/1175721" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1176011" ref_url="https://bugzilla.suse.com/1176011" source="BUGZILLA"/>
		<reference ref_id="1176069" ref_url="https://bugzilla.suse.com/1176069" source="BUGZILLA"/>
		<reference ref_id="1176235" ref_url="https://bugzilla.suse.com/1176235" source="BUGZILLA"/>
		<reference ref_id="1176253" ref_url="https://bugzilla.suse.com/1176253" source="BUGZILLA"/>
		<reference ref_id="1176278" ref_url="https://bugzilla.suse.com/1176278" source="BUGZILLA"/>
		<reference ref_id="1176381" ref_url="https://bugzilla.suse.com/1176381" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176423" ref_url="https://bugzilla.suse.com/1176423" source="BUGZILLA"/>
		<reference ref_id="1176482" ref_url="https://bugzilla.suse.com/1176482" source="BUGZILLA"/>
		<reference ref_id="1176721" ref_url="https://bugzilla.suse.com/1176721" source="BUGZILLA"/>
		<reference ref_id="1176722" ref_url="https://bugzilla.suse.com/1176722" source="BUGZILLA"/>
		<reference ref_id="1176725" ref_url="https://bugzilla.suse.com/1176725" source="BUGZILLA"/>
		<reference ref_id="1176816" ref_url="https://bugzilla.suse.com/1176816" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176990" ref_url="https://bugzilla.suse.com/1176990" source="BUGZILLA"/>
		<reference ref_id="1177027" ref_url="https://bugzilla.suse.com/1177027" source="BUGZILLA"/>
		<reference ref_id="1177086" ref_url="https://bugzilla.suse.com/1177086" source="BUGZILLA"/>
		<reference ref_id="1177121" ref_url="https://bugzilla.suse.com/1177121" source="BUGZILLA"/>
		<reference ref_id="1177165" ref_url="https://bugzilla.suse.com/1177165" source="BUGZILLA"/>
		<reference ref_id="1177206" ref_url="https://bugzilla.suse.com/1177206" source="BUGZILLA"/>
		<reference ref_id="1177226" ref_url="https://bugzilla.suse.com/1177226" source="BUGZILLA"/>
		<reference ref_id="1177410" ref_url="https://bugzilla.suse.com/1177410" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177511" ref_url="https://bugzilla.suse.com/1177511" source="BUGZILLA"/>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="1177725" ref_url="https://bugzilla.suse.com/1177725" source="BUGZILLA"/>
		<reference ref_id="1177766" ref_url="https://bugzilla.suse.com/1177766" source="BUGZILLA"/>
		<reference ref_id="1177816" ref_url="https://bugzilla.suse.com/1177816" source="BUGZILLA"/>
		<reference ref_id="1178123" ref_url="https://bugzilla.suse.com/1178123" source="BUGZILLA"/>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178782" ref_url="https://bugzilla.suse.com/1178782" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18204" ref_url="https://www.suse.com/security/cve/CVE-2017-18204/" source="CVE"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-25641" ref_url="https://www.suse.com/security/cve/CVE-2020-25641/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bug fixes.


The following security bugs were fixed:

- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-25212: Fixed A TOCTOU mismatch in the NFS client code which could have been used by local attackers to corrupt memory (bsc#1176381).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).
- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2019-19063: Fixed two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c, which could have allowed an attacker to cause a denial of service (memory consumption) (bsc#1157298).
- CVE-2019-6133: In PolicyKit (aka polkit), the 'start time' protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c (bsc#1121872).
- CVE-2017-18204: Fixed a denial of service in the ocfs2_setattr function of fs/ocfs2/file.c (bnc#1083244).

The following non-security bugs were fixed:

- hv: vmbus: Add timeout to vmbus_wait_for_unload (bsc#1177816).
- hyperv_fb: disable superfluous VERSION_WIN10_V5 case (bsc#1175306).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1176816).
- net/packet: fix overflow in tpacket_rcv (bsc#1176069).
- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083244">SUSE bug 1083244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121872">SUSE bug 1121872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157298">SUSE bug 1157298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160917">SUSE bug 1160917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175228">SUSE bug 1175228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175306">SUSE bug 1175306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176011">SUSE bug 1176011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176253">SUSE bug 1176253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176721">SUSE bug 1176721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176725">SUSE bug 1176725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176816">SUSE bug 1176816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176990">SUSE bug 1176990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177027">SUSE bug 1177027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177086">SUSE bug 1177086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177121">SUSE bug 1177121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177165">SUSE bug 1177165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177226">SUSE bug 1177226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177410">SUSE bug 1177410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177725">SUSE bug 1177725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177816">SUSE bug 1177816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178782">SUSE bug 1178782</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18204/">CVE-2017-18204 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18204">CVE-2017-18204 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19063">CVE-2019-19063 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6133">CVE-2019-6133 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0404">CVE-2020-0404 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0427">CVE-2020-0427 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0432">CVE-2020-0432 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12352">CVE-2020-12352 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14351">CVE-2020-14351 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14390">CVE-2020-14390 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25284">CVE-2020-25284 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25641/">CVE-2020-25641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25641">CVE-2020-25641 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25643">CVE-2020-25643 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25656">CVE-2020-25656 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26088">CVE-2020-26088 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556700" comment="kernel-default-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556701" comment="kernel-default-base-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556702" comment="kernel-default-devel-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556703" comment="kernel-default-kgraft-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538784" comment="kernel-devel-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538785" comment="kernel-macros-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538786" comment="kernel-source-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556704" comment="kernel-syms-4.4.180-94.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556705" comment="kgraft-patch-4_4_180-94_135-default-1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151375" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173592" ref_url="https://bugzilla.suse.com/1173592" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="1178971" ref_url="https://bugzilla.suse.com/1178971" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated Intel CPU Microcode to 20201118 official release. (bsc#1178971)
 - Removed TGL/06-8c-01/80 due to functional issues with some OEM platforms.
 - CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) INTEL-SA-00389 (bsc#1170446)
 - CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)
 - CVE-2020-8696: Vector Register Sampling Active INTEL-SA-00381 (bsc#1173592)

- Release notes:
  - Security updates for [INTEL-SA-00381](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html).
  - Security updates for [INTEL-SA-00389](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html).
  - Update for functional issues. Refer to [Second Generation Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
  - Update for functional issues. Refer to [10th Gen Intel? Core™ Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
  - Update for functional issues. Refer to [8th and 9th Gen Intel? Core™ Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
  - Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel? Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
  - Update for functional issues. Refer to [6th Gen Intel? Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

  ### New Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | LKF            | B2/B3    | 06-8a-01/10 |          | 00000028 | Core w/Hybrid Technology
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  ### Updated Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173592">SUSE bug 1173592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178971">SUSE bug 1178971</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8696">CVE-2020-8696 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531614" comment="ucode-intel-20201118-13.81.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151376" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1166751" ref_url="https://bugzilla.suse.com/1166751" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0556" ref_url="https://www.suse.com/security/cve/CVE-2020-0556/" source="CVE"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2020-0556: Fixed improper access control which may lead to escalation of privilege and denial of service by an unauthenticated user (bsc#1166751).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166751">SUSE bug 1166751</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-0556/">CVE-2020-0556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0556">CVE-2020-0556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556706" comment="bluez-5.13-5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556707" comment="libbluetooth3-5.13-5.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151377" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178824" ref_url="https://bugzilla.suse.com/1178824" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.5.0 ESR (bsc#1178824)
  * CVE-2020-26951: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code
  * CVE-2020-16012: Variable time processing of cross-origin images during drawImage calls
  * CVE-2020-26953: Fullscreen could be enabled without displaying the security UI
  * CVE-2020-26956: XSS through paste (manual and clipboard API)
  * CVE-2020-26958: Requests intercepted through ServiceWorkers lacked MIME type restrictions
  * CVE-2020-26959: Use-after-free in WebRequestService
  * CVE-2020-26960: Potential use-after-free in uses of nsTArray
  * CVE-2020-15999: Heap buffer overflow in freetype
  * CVE-2020-26961: DoH did not filter IPv4 mapped IP Addresses
  * CVE-2020-26965: Software keyboards may have remembered typed passwords
  * CVE-2020-26966: Single-word search queries were also broadcast to local network
  * CVE-2020-26968: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-27"/>
	<updated date="2020-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16012">CVE-2020-16012 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26951">CVE-2020-26951 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26953">CVE-2020-26953 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26956">CVE-2020-26956 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26958">CVE-2020-26958 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26959">CVE-2020-26959 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26960">CVE-2020-26960 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26961">CVE-2020-26961 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26965">CVE-2020-26965 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26966">CVE-2020-26966 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26968">CVE-2020-26968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556708" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556709" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556710" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151378" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178682" ref_url="https://bugzilla.suse.com/1178682" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2020-25708 [bsc#1178682], libvncserver/rfbserver.c has a divide by zero which could result in DoS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-27"/>
	<updated date="2020-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178682">SUSE bug 1178682</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25708">CVE-2020-25708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556711" comment="libvncclient0-0.9.9-17.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556712" comment="libvncserver0-0.9.9-17.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151379" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1174908" ref_url="https://bugzilla.suse.com/1174908" source="BUGZILLA"/>
		<reference ref_id="1177596" ref_url="https://bugzilla.suse.com/1177596" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to privilege escalation (bsc#1177596).
- CVE-2020-14360: Fixed an out of bounds memory accesses on too short request which could lead to denial of service (bsc#1174908).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14360">CVE-2020-14360 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25712">CVE-2020-25712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556713" comment="xorg-x11-server-7.6_1.18.3-76.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556714" comment="xorg-x11-server-extra-7.6_1.18.3-76.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151380" version="1" class="patch">
	<metadata>
		<title>Security update for python-setuptools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
This update for python-setuptools fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009524556" comment="python-setuptools-40.6.2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525277" comment="python3-setuptools-40.6.2-4.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151381" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556715" comment="libpython3_4m1_0-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556716" comment="python3-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556717" comment="python3-base-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556718" comment="python3-curses-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556719" comment="python3-devel-3.4.10-25.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151382" version="1" class="patch">
	<metadata>
		<title>Security update for gdm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178150" ref_url="https://bugzilla.suse.com/1178150" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16125" ref_url="https://www.suse.com/security/cve/CVE-2020-16125/" source="CVE"/>
		<description>
This update for gdm fixes the following issues:

- CVE-2020-16125: Fixed a privilege escalation (bsc#1178150).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178150">SUSE bug 1178150</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16125/">CVE-2020-16125 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16125">CVE-2020-16125 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556720" comment="gdm-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531630" comment="gdm-lang-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531631" comment="gdmflexiserver-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556721" comment="libgdm1-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556722" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151383" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178168" ref_url="https://bugzilla.suse.com/1178168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659/" source="CVE"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-25659: Attempted to mitigate Bleichenbacher attacks on RSA decryption (bsc#1178168).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178168">SUSE bug 1178168</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25659">CVE-2020-25659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556723" comment="python-cryptography-2.1.4-7.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556724" comment="python3-cryptography-2.1.4-7.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151384" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<description>

This update for postgresql12 fixes the following issues:

Upgrade to version 12.5:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/12/release-12-5.html

The previous postgresql12 update already addressed:

Update to 12.4:

* CVE-2020-14349, bsc#1175193: Set a secure search_path in logical replication walsenders and apply workers
* CVE-2020-14350, bsc#1175194: Make contrib modules' installation scripts more secure.

* https://www.postgresql.org/docs/12/release-12-4.html

  		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14349">CVE-2020-14349 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556725" comment="libecpg6-12.5-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556726" comment="libpq5-12.5-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531638" comment="libpq5-32bit-12.5-3.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151385" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1177409" ref_url="https://bugzilla.suse.com/1177409" source="BUGZILLA"/>
		<reference ref_id="1177412" ref_url="https://bugzilla.suse.com/1177412" source="BUGZILLA"/>
		<reference ref_id="1177413" ref_url="https://bugzilla.suse.com/1177413" source="BUGZILLA"/>
		<reference ref_id="1177414" ref_url="https://bugzilla.suse.com/1177414" source="BUGZILLA"/>
		<reference ref_id="1178591" ref_url="https://bugzilla.suse.com/1178591" source="BUGZILLA"/>
		<reference ref_id="1178963" ref_url="https://bugzilla.suse.com/1178963" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674/" source="CVE"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- bsc#1178963 - stack corruption from XSA-346 change (XSA-355) 
- bsc#1177409 - CVE-2020-27674: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286)
- bsc#1177412 - CVE-2020-27672: Race condition in Xen mapping code (XSA-345)
- bsc#1177413 - CVE-2020-27671: undue deferral of IOMMU TLB flushes (XSA-346)
- bsc#1177414 - CVE-2020-27670: unsafe AMD IOMMU page table updates (XSA-347)
- bsc#1178591 - CVE-2020-28368: Intel RAPL sidechannel attack aka PLATYPUS attack aka XSA-351
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177413">SUSE bug 1177413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178963">SUSE bug 1178963</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27670">CVE-2020-27670 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27671">CVE-2020-27671 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27672">CVE-2020-27672 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27674">CVE-2020-27674 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28368">CVE-2020-28368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538789" comment="xen-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538790" comment="xen-doc-html-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538791" comment="xen-libs-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538792" comment="xen-libs-32bit-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538793" comment="xen-tools-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538794" comment="xen-tools-domU-4.9.4_14-3.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151386" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1179035" ref_url="https://bugzilla.suse.com/1179035" source="BUGZILLA"/>
		<reference ref_id="1179113" ref_url="https://bugzilla.suse.com/1179113" source="BUGZILLA"/>
		<reference ref_id="1179461" ref_url="https://bugzilla.suse.com/1179461" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

- Find and display the content of messages properly. (bsc#1179461)
- CVE-2020-28896: incomplete connection termination could send credentials over unencrypted connections. (bsc#1179035)
- Avoid that message with a million tiny parts can freeze MUA for several minutes. (bsc#1179113)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179035">SUSE bug 1179035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179113">SUSE bug 1179113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179461">SUSE bug 1179461</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28896">CVE-2020-28896 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556727" comment="mutt-1.10.1-55.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151387" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_113 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721279" comment="kernel-default 4.4.180-94.113 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719606" comment="kgraft-patch-4_4_180-94_113-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556728" comment="kgraft-patch-4_4_180-94_113-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151388" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_116 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721281" comment="kernel-default 4.4.180-94.116 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719610" comment="kgraft-patch-4_4_180-94_116-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556729" comment="kgraft-patch-4_4_180-94_116-default-6-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151389" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_121 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721282" comment="kernel-default 4.4.180-94.121 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719612" comment="kgraft-patch-4_4_180-94_121-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556730" comment="kgraft-patch-4_4_180-94_121-default-5-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151390" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_124 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721283" comment="kernel-default 4.4.180-94.124 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719614" comment="kgraft-patch-4_4_180-94_124-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556731" comment="kgraft-patch-4_4_180-94_124-default-5-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151391" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556732" comment="kgraft-patch-4_4_180-94_127-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151392" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556733" comment="kgraft-patch-4_4_180-94_130-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151393" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177513).
- CVE-2020-0429: Fixed a memory corruption due to a use after free which could have led to to local privilege escalation (bsc#1176931).
- CVE-2020-11668: Fixed an issue where the Xirlink camera USB driver mishandled invalid descriptors (bsc#1173942).
- CVE-2020-1749: Use ip6_dst_lookup_flow instead of  ip6_dst_lookup (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556734" comment="kgraft-patch-4_4_180-94_135-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151394" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1137832" ref_url="https://bugzilla.suse.com/1137832" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<description>
This update for dbus-1 fixes the following issues:
	  
Security issue fixed:     
    
- CVE-2019-12749: Fixed an implementation flaw in DBUS_COOKIE_SHA1 which 
  could have allowed local attackers to bypass authentication (bsc#1137832).   
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-18"/>
	<updated date="2020-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12749">CVE-2019-12749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556735" comment="dbus-1-1.8.22-29.17.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556736" comment="dbus-1-x11-1.8.22-29.17.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556737" comment="libdbus-1-3-1.8.22-29.17.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522637" comment="libdbus-1-3-32bit-1.8.22-29.17.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151395" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1179491" ref_url="https://bugzilla.suse.com/1179491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2020-1971: Fixed a null pointer dereference in EDIPARTYNAME (bsc#1179491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">CVE-2020-1971 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556738" comment="libopenssl-devel-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556739" comment="libopenssl1_0_0-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531648" comment="libopenssl1_0_0-32bit-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556740" comment="libopenssl1_0_0-hmac-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531650" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556741" comment="openssl-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531652" comment="openssl-doc-1.0.2j-60.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151396" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556742" comment="libpython2_7-1_0-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531654" comment="libpython2_7-1_0-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556743" comment="python-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531656" comment="python-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556744" comment="python-base-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531658" comment="python-base-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556745" comment="python-curses-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556746" comment="python-demo-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556747" comment="python-devel-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531662" comment="python-doc-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531663" comment="python-doc-pdf-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556748" comment="python-gdbm-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556749" comment="python-idle-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556750" comment="python-tk-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556751" comment="python-xml-2.7.17-28.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151397" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1161799" ref_url="https://bugzilla.suse.com/1161799" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.5.0 ESR
  * CVE-2020-6796 (bmo#1610426)
    Missing bounds check on shared memory read in the parent
    process
  * CVE-2020-6797 (bmo#1596668)
    Extensions granted downloads.open permission could open
    arbitrary applications on Mac OSX
  * CVE-2020-6798 (bmo#1602944)
    Incorrect parsing of template tag could result in JavaScript
    injection
  * CVE-2020-6799 (bmo#1606596)
    Arbitrary code execution when opening pdf links from other
    applications, when Firefox is configured as default pdf
    reader
  * CVE-2020-6800 (bmo#1595786, bmo#1596706, bmo#1598543,
    bmo#1604851, bmo#1605777, bmo#1608580, bmo#1608785)
    Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
  * Fixed: Fixed various issues opening files with spaces in
    their path (bmo#1601905, bmo#1602726)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-17"/>
	<updated date="2020-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161799">SUSE bug 1161799</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6796">CVE-2020-6796 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6797">CVE-2020-6797 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6798">CVE-2020-6798 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6799">CVE-2020-6799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6800">CVE-2020-6800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556752" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556753" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151398" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1180039" ref_url="https://bugzilla.suse.com/1180039" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2020-55 (bsc#1180039)
  * CVE-2020-16042 (bmo#1679003)
    Operations on a BigInt could have caused uninitialized memory
    to be exposed
  * CVE-2020-26971 (bmo#1663466)
    Heap buffer overflow in WebGL
  * CVE-2020-26973 (bmo#1680084)
    CSS Sanitizer performed incorrect sanitization
  * CVE-2020-26974 (bmo#1681022)
    Incorrect cast of StyleGenericFlexBasis resulted in a heap
    use-after-free
  * CVE-2020-26978 (bmo#1677047)
    Internal network hosts could have been probed by a malicious
    webpage
  * CVE-2020-35111 (bmo#1657916)
    The proxy.onRequest API did not catch view-source URLs
  * CVE-2020-35112 (bmo#1661365)
    Opening an extension-less download may have inadvertently
    launched an executable instead
  * CVE-2020-35113 (bmo#1664831, bmo#1673589)
    Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16042">CVE-2020-16042 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26971">CVE-2020-26971 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26973">CVE-2020-26973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26974">CVE-2020-26974 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26978">CVE-2020-26978 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35111">CVE-2020-35111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35112">CVE-2020-35112 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35113">CVE-2020-35113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556754" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556755" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556756" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151399" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1118459" ref_url="https://bugzilla.suse.com/1118459" source="BUGZILLA"/>
		<reference ref_id="1119353" ref_url="https://bugzilla.suse.com/1119353" source="BUGZILLA"/>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="1171981" ref_url="https://bugzilla.suse.com/1171981" source="BUGZILLA"/>
		<reference ref_id="1174250" ref_url="https://bugzilla.suse.com/1174250" source="BUGZILLA"/>
		<reference ref_id="1174255" ref_url="https://bugzilla.suse.com/1174255" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123/" source="CVE"/>
		<reference ref_id="CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327/" source="CVE"/>
		<reference ref_id="CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341/" source="CVE"/>
		<reference ref_id="CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350/" source="CVE"/>
		<reference ref_id="CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

clamav was updated to 0.103.0 to implement jsc#ECO-3010 and bsc#1118459.

* clamd can now reload the signature database without blocking
  scanning. This multi-threaded database reload improvement was made
  possible thanks to a community effort.
  - Non-blocking database reloads are now the default behavior. Some
    systems that are more constrained on RAM may need to disable
    non-blocking reloads as it will temporarily consume two times as
    much memory. We added a new clamd config option
    ConcurrentDatabaseReload, which may be set to no.
* Fix clamav-milter.service (requires clamd.service to run)
* bsc#1119353, clamav-fips.patch: Fix freshclam crash in FIPS mode.
* Partial sync with SLE15.

Update to version 0.102.4

Accumulated security fixes:

* CVE-2020-3350: Fix a vulnerability wherein a malicious user could
  replace a scan target's directory with a symlink to another path
  to trick clamscan, clamdscan, or clamonacc into removing or moving
  a different file (eg. a critical system file). The issue would
  affect users that use the --move or --remove options for clamscan,
  clamdscan, and clamonacc. (bsc#1174255)
* CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
  module in ClamAV 0.102.3 that could cause a Denial-of-Service
  (DoS) condition. Improper bounds checking results in an
  out-of-bounds read which could cause a crash. The previous fix for
  this CVE in 0.102.3 was incomplete. This fix correctly resolves
  the issue.
* CVE-2020-3481: Fix a vulnerability in the EGG archive module in
  ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)
  condition. Improper error handling may result in a crash due to a
  NULL pointer dereference. This vulnerability is mitigated for
  those using the official ClamAV signature databases because the
  file type signatures in daily.cvd will not enable the EGG archive
  parser in versions affected by the vulnerability. (bsc#1174250)
* CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
  ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
  condition. Improper size checking of a buffer used to initialize AES
  decryption routines results in an out-of-bounds read which may cause
  a crash. (bsc#1171981)
* CVE-2020-3123: A denial-of-service (DoS) condition may occur when
  using the optional credit card data-loss-prevention (DLP) feature.
  Improper bounds checking of an unsigned variable resulted in an
  out-of-bounds read, which causes a crash.
* CVE-2019-15961: A Denial-of-Service (DoS) vulnerability may
  occur when scanning a specially crafted email file as a result
  of excessively long scan times. The issue is resolved by
  implementing several maximums in parsing MIME messages and by
  optimizing use of memory allocation. (bsc#1157763).
* CVE-2019-12900: An out of bounds write in the NSIS bzip2
  (bsc#1149458)
* CVE-2019-12625: Introduce a configurable time limit to mitigate
  zip bomb vulnerability completely. Default is 2 minutes,
  configurable useing the clamscan --max-scantime and for clamd
  using the MaxScanTime config option (bsc#1144504)

Update to version 0.101.3:

* ZIP bomb causes extreme CPU spikes (bsc#1144504)

Update to version 0.101.2 (bsc#1118459):

* Support for RAR v5 archive extraction.
* Incompatible changes to the arguments of cl_scandesc,
  cl_scandesc_callback, and cl_scanmap_callback.
* Scanning options have been converted from a single flag
  bit-field into a structure of multiple categorized flag
  bit-fields.
* The CL_SCAN_HEURISTIC_ENCRYPTED scan option was replaced by
  2 new scan options: CL_SCAN_HEURISTIC_ENCRYPTED_ARCHIVE, and
  CL_SCAN_HEURISTIC_ENCRYPTED_DOC
* Incompatible clamd.conf and command line interface changes.
* Heuristic Alerts' (aka 'Algorithmic Detection') options have
  been changed to make the names more consistent. The original
  options are deprecated in 0.101, and will be removed in a
  future feature release.
* For details, see https://blog.clamav.net/2018/12/clamav-01010-has-been-released.html		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118459">SUSE bug 1118459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119353">SUSE bug 1119353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171981">SUSE bug 1171981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174255">SUSE bug 1174255</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15961">CVE-2019-15961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3123">CVE-2020-3123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3327">CVE-2020-3327 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3341">CVE-2020-3341 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3350">CVE-2020-3350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3481">CVE-2020-3481 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556757" comment="clamav-0.103.0-33.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151400" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1159635" ref_url="https://bugzilla.suse.com/1159635" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2019-19906: Fixed an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet (bsc#1159635).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-28"/>
	<updated date="2020-12-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159635">SUSE bug 1159635</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19906">CVE-2019-19906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556758" comment="cyrus-sasl-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531688" comment="cyrus-sasl-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556759" comment="cyrus-sasl-crammd5-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531690" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556760" comment="cyrus-sasl-digestmd5-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556761" comment="cyrus-sasl-gssapi-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531693" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556762" comment="cyrus-sasl-otp-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531695" comment="cyrus-sasl-otp-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556763" comment="cyrus-sasl-plain-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531697" comment="cyrus-sasl-plain-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556764" comment="libsasl2-3-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531699" comment="libsasl2-3-32bit-2.1.26-8.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151401" version="1" class="patch">
	<metadata>
		<title>Security update for gcc9 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1114592" ref_url="https://bugzilla.suse.com/1114592" source="BUGZILLA"/>
		<reference ref_id="1135254" ref_url="https://bugzilla.suse.com/1135254" source="BUGZILLA"/>
		<reference ref_id="1141897" ref_url="https://bugzilla.suse.com/1141897" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1142654" ref_url="https://bugzilla.suse.com/1142654" source="BUGZILLA"/>
		<reference ref_id="1148517" ref_url="https://bugzilla.suse.com/1148517" source="BUGZILLA"/>
		<reference ref_id="1149145" ref_url="https://bugzilla.suse.com/1149145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-15847" ref_url="https://www.suse.com/security/cve/CVE-2019-15847/" source="CVE"/>
		<description>
This update for gcc9 fixes the following issues:

The GNU Compiler Collection is shipped in version 9.

A detailed changelog on what changed in GCC 9 is available at https://gcc.gnu.org/gcc-9/changes.html

The compilers have been added to the SUSE Linux Enterprise Toolchain Module.

To use these compilers, install e.g. gcc9, gcc9-c++ and build with CC=gcc-9
CXX=g++-9 set.


For SUSE Linux Enterprise base products, the libstdc++6, libgcc_s1 and
other compiler libraries have been switched from their gcc8 variants to
their gcc9 variants.

Security issues fixed:

- CVE-2019-15847: Fixed a miscompilation in the POWER9 back end, that optimized multiple calls of the __builtin_darn intrinsic into a single call. (bsc#1149145)
- CVE-2019-14250: Fixed a heap overflow in the LTO linker. (bsc#1142649)

Non-security issues fixed:

- Split out libstdc++ pretty-printers into a separate package supplementing gdb and the installed runtime. (bsc#1135254)
- Fixed miscompilation for vector shift on s390. (bsc#1141897)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-14"/>
	<updated date="2020-04-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114592">SUSE bug 1114592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135254">SUSE bug 1135254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141897">SUSE bug 1141897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142654">SUSE bug 1142654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148517">SUSE bug 1148517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149145">SUSE bug 1149145</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14250">CVE-2019-14250 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15847/">CVE-2019-15847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15847">CVE-2019-15847 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556765" comment="libasan5-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531701" comment="libasan5-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556766" comment="libatomic1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531703" comment="libatomic1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556767" comment="libgcc_s1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531705" comment="libgcc_s1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556768" comment="libgfortran5-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531707" comment="libgfortran5-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556769" comment="libgo14-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531709" comment="libgo14-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556770" comment="libgomp1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531711" comment="libgomp1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556771" comment="libitm1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531713" comment="libitm1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556772" comment="liblsan0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531715" comment="libquadmath0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531716" comment="libquadmath0-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556773" comment="libstdc++6-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531718" comment="libstdc++6-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556774" comment="libstdc++6-locale-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556775" comment="libtsan0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556776" comment="libubsan1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531722" comment="libubsan1-32bit-9.2.1+r275327-1.3.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151402" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1176782" ref_url="https://bugzilla.suse.com/1176782" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1179496" ref_url="https://bugzilla.suse.com/1179496" source="BUGZILLA"/>
		<reference ref_id="1179498" ref_url="https://bugzilla.suse.com/1179498" source="BUGZILLA"/>
		<reference ref_id="1179501" ref_url="https://bugzilla.suse.com/1179501" source="BUGZILLA"/>
		<reference ref_id="1179502" ref_url="https://bugzilla.suse.com/1179502" source="BUGZILLA"/>
		<reference ref_id="1179506" ref_url="https://bugzilla.suse.com/1179506" source="BUGZILLA"/>
		<reference ref_id="1179514" ref_url="https://bugzilla.suse.com/1179514" source="BUGZILLA"/>
		<reference ref_id="1179516" ref_url="https://bugzilla.suse.com/1179516" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480/" source="CVE"/>
		<reference ref_id="CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481/" source="CVE"/>
		<reference ref_id="CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483/" source="CVE"/>
		<reference ref_id="CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484/" source="CVE"/>
		<reference ref_id="CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566/" source="CVE"/>
		<reference ref_id="CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570/" source="CVE"/>
		<reference ref_id="CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-29480: Fixed an issue which could have allowed leak of non-sensitive data to administrator guests (bsc#117949 XSA-115).
- CVE-2020-29481: Fixed an issue which could have allowd to new domains to inherit existing node permissions (bsc#1179498 XSA-322). 
- CVE-2020-29483: Fixed an issue where guests could disturb domain cleanup (bsc#1179502 XSA-325).
- CVE-2020-29484: Fixed an issue where guests could crash xenstored via watchs (bsc#1179501 XSA-324). 
- CVE-2020-29566: Fixed an undue recursion in x86 HVM context switch code (bsc#1179506 XSA-348).
- CVE-2020-29570: Fixed an issue where FIFO event channels control block related ordering (bsc#1179514 XSA-358).
- CVE-2020-29571: Fixed an issue where FIFO event channels control structure ordering (bsc#1179516 XSA-359).
- CVE-2020-29130: Fixed an out-of-bounds access while processing ARP packets (bsc#1179477). 
- Fixed an issue where dump-core shows missing nr_pages during core (bsc#1176782).
- Multiple other bugs (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-29"/>
	<updated date="2020-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176782">SUSE bug 1176782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179496">SUSE bug 1179496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179498">SUSE bug 1179498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179501">SUSE bug 1179501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179502">SUSE bug 1179502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179506">SUSE bug 1179506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179514">SUSE bug 1179514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179516">SUSE bug 1179516</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29480">CVE-2020-29480 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29481">CVE-2020-29481 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29483">CVE-2020-29483 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29484">CVE-2020-29484 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29566">CVE-2020-29566 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29570">CVE-2020-29570 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29571">CVE-2020-29571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538805" comment="xen-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538806" comment="xen-doc-html-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538807" comment="xen-libs-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538808" comment="xen-libs-32bit-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538809" comment="xen-tools-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538810" comment="xen-tools-domU-4.9.4_16-3.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151403" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1162202" ref_url="https://bugzilla.suse.com/1162202" source="BUGZILLA"/>
		<reference ref_id="1162675" ref_url="https://bugzilla.suse.com/1162675" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634/" source="CVE"/>
		<description>
This update for sudo fixes the following issues:

Security issue fixed:

- CVE-2019-18634: Fixed a buffer overflow in the passphrase prompt that could occur when pwfeedback was enabled in /etc/sudoers (bsc#1162202).

Non-security issue fixed:

- Fixed an issue where sudo -l would ask for a password even though `listpw` was set to `never` (bsc#1162675).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-19"/>
	<updated date="2020-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162202">SUSE bug 1162202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162675">SUSE bug 1162675</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18634">CVE-2019-18634 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556777" comment="sudo-1.8.20p2-3.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151404" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Java was updated to 7.1 Service Refresh 4 Fix Pack 60 [bsc#1162972, bsc#1160968].

Security issues fixed:

- CVE-2020-2583: Fixed a serialization vulnerability in BeanContextSupport (bsc#1162972).
- CVE-2020-2593: Fixed an incorrect check in isBuiltinStreamHandler, causing URL normalization issues (bsc#1162972).
- CVE-2020-2604: Fixed a serialization issue in jdk.serialFilter (bsc#1162972).
- CVE-2020-2659: Fixed the incomplete enforcement of the maxDatagramSockets limit in DatagramChannelImpl (bsc#1162972).

Non-security issues fixed:

* Class Libraries:
  IJ22333 HANG IN JAVA_JAVA_NET_SOCKETINPUTSTREAM_SOCKETREAD0 EVEN
          WHEN TIMEOUT IS SET
  IJ22350 JAVA 7 AND JAVA 8 NOT WORKING WELL WITH TRADITIONAL/SIMPLIFIED
          CHINESE EDITION OF WINDOWS CLIENT SYSTEM
  IJ22337 THE NAME OF THE REPUBLIC OF BELARUS IN THE RUSSIAN LOCALE
          INCONSISTENT WITH CLDR
  IJ22349 UPDATE TIMEZONE INFORMATION TO TZDATA2019C
* JIT Compiler:
  IJ11368 JAVA JIT PPC: CRASH IN JIT COMPILED CODE ON PPC MACHINES
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-07"/>
	<updated date="2020-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531724" comment="java-1_7_1-ibm-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531725" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531726" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531727" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531728" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-38.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151405" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20030">CVE-2018-20030 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9278">CVE-2019-9278 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556778" comment="libexif12-0.6.21-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522650" comment="libexif12-32bit-0.6.21-8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151406" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1158809" ref_url="https://bugzilla.suse.com/1158809" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

Security issue fixed:

- CVE-2019-1551: Fixed an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli (bsc#1158809).

Non-security issue fixed:

- Fixed a crash in BN_copy (bsc#1160163).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158809">SUSE bug 1158809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1551">CVE-2019-1551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556779" comment="libopenssl-devel-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556780" comment="libopenssl1_0_0-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531731" comment="libopenssl1_0_0-32bit-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556781" comment="libopenssl1_0_0-hmac-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531733" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556782" comment="openssl-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531735" comment="openssl-doc-1.0.2j-60.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151407" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1162610" ref_url="https://bugzilla.suse.com/1162610" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<description>
This update for ppp fixes the following security issue:

- CVE-2020-8597: Fixed a buffer overflow in the eap_request and eap_response functions (bsc#1162610).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-26"/>
	<updated date="2020-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162610">SUSE bug 1162610</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8597">CVE-2020-8597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556783" comment="ppp-2.4.7-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151408" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="1159208" ref_url="https://bugzilla.suse.com/1159208" source="BUGZILLA"/>
		<reference ref_id="1159623" ref_url="https://bugzilla.suse.com/1159623" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-4472" ref_url="https://www.suse.com/security/cve/CVE-2016-4472/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

Update to 3.4.10 (jsc#SLE-9427, bsc#1159208) from 3.4.6:

Security issues fixed:

- Update expat copy from 2.1.1 to 2.2.0 to fix the following issues:
  CVE-2012-0876, CVE-2016-0718, CVE-2016-4472, CVE-2017-9233, CVE-2016-9063
- CVE-2017-1000158: Fix an integer overflow in thePyString_DecodeEscape function in stringobject.c, resulting in heap-based bufferoverflow (bsc#1068664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-20"/>
	<updated date="2020-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159208">SUSE bug 1159208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159623">SUSE bug 1159623</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0876">CVE-2012-0876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0718">CVE-2016-0718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4472/">CVE-2016-4472 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4472">CVE-2016-4472 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000158">CVE-2017-1000158 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9233">CVE-2017-9233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556784" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556785" comment="python3-3.4.10-25.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556786" comment="python3-base-3.4.10-25.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556787" comment="python3-curses-3.4.10-25.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556788" comment="python3-devel-3.4.10-25.39.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151409" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1154162" ref_url="https://bugzilla.suse.com/1154162" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<description>
This update for mariadb fixes the following issues:

Security issue fixed:

- CVE-2019-2974: Fixed Server Optimizer (bsc#1154162).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2974">CVE-2019-2974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556789" comment="libmysqlclient18-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531738" comment="libmysqlclient18-32bit-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556790" comment="mariadb-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556791" comment="mariadb-client-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556792" comment="mariadb-errormessages-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556793" comment="mariadb-tools-10.0.40.2-29.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151410" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to 7.1 Service Refresh 4 Fix Pack 55 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2962 CVE-2019-2964
    CVE-2019-2978 CVE-2019-2983 CVE-2019-2989 CVE-2019-2992
    CVE-2019-2999 CVE-2019-2973 CVE-2019-2981
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531743" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531746" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151411" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-4732" ref_url="https://www.suse.com/security/cve/CVE-2019-4732/" source="CVE"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Java 8.0 was updated to Service Refresh 6 Fix Pack 5 (bsc#1162972, bsc#1160968)

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2019-4732: Untrusted DLL search path vulnerability 
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-4732/">CVE-2019-4732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-4732">CVE-2019-4732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531748" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531750" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151412" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1159646" ref_url="https://bugzilla.suse.com/1159646" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571/" source="CVE"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2019-17571: Fixed a remote code execution by deserialization of untrusted data in SocketServer (bsc#1159646).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159646">SUSE bug 1159646</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17571">CVE-2019-17571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531752" comment="log4j-1.2.15-126.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151413" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1123886" ref_url="https://bugzilla.suse.com/1123886" source="BUGZILLA"/>
		<reference ref_id="1160594" ref_url="https://bugzilla.suse.com/1160594" source="BUGZILLA"/>
		<reference ref_id="1160764" ref_url="https://bugzilla.suse.com/1160764" source="BUGZILLA"/>
		<reference ref_id="1161779" ref_url="https://bugzilla.suse.com/1161779" source="BUGZILLA"/>
		<reference ref_id="1163922" ref_url="https://bugzilla.suse.com/1163922" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8013" ref_url="https://www.suse.com/security/cve/CVE-2020-8013/" source="CVE"/>
		<description>
This update for permissions fixes the following issues:

Security issues fixed:

- CVE-2020-8013: Fixed an issue where chkstat set unintended setuid/capabilities for mrsh and wodim (bsc#1163922).

Non-security issues fixed:

- Fixed a regression where chkstat broke when /proc was not available (bsc#1160764, bsc#1160594).
- Fixed capability handling when doing multiple permission changes at once (bsc#1161779).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-28"/>
	<updated date="2020-02-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123886">SUSE bug 1123886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160594">SUSE bug 1160594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160764">SUSE bug 1160764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161779">SUSE bug 1161779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163922">SUSE bug 1163922</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8013/">CVE-2020-8013 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8013">CVE-2020-8013 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556794" comment="permissions-2015.09.28.1626-17.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151414" version="1" class="patch">
	<metadata>
		<title>Security update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="1122668" ref_url="https://bugzilla.suse.com/1122668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<description>
This update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer, python-jsonpatch, python-jsonpointer, python-scandir, python-PyYAML fixes the following issues:

python-cfn-lint was included as a new package in 0.21.4.


python-aws-sam-translator was updated to 1.11.0:

  * Add ReservedConcurrentExecutions to globals
  * Fix ElasticsearchHttpPostPolicy resource reference
  * Support using AWS::Region in Ref and Sub
  * Documentation and examples updates
  * Add VersionDescription property to Serverless::Function
  * Update ServerlessRepoReadWriteAccessPolicy
  * Add additional template validation

Upgrade to 1.10.0:

  * Add GSIs to DynamoDBReadPolicy and DynamoDBCrudPolicy
  * Add DynamoDBReconfigurePolicy
  * Add CostExplorerReadOnlyPolicy and OrganizationsListAccountsPolicy
  * Add EKSDescribePolicy
  * Add SESBulkTemplatedCrudPolicy
  * Add FilterLogEventsPolicy
  * Add SSMParameterReadPolicy
  * Add SESEmailTemplateCrudPolicy
  * Add s3:PutObjectAcl to S3CrudPolicy
  * Add allow_credentials CORS option
  * Add support for AccessLogSetting and CanarySetting Serverless::Api properties
  * Add support for X-Ray in Serverless::Api
  * Add support for MinimumCompressionSize in Serverless::Api
  * Add Auth to Serverless::Api globals
  * Remove trailing slashes from APIGW permissions
  * Add SNS FilterPolicy and an example application
  * Add Enabled property to Serverless::Function event sources
  * Add support for PermissionsBoundary in Serverless::Function
  * Fix boto3 client initialization
  * Add PublicAccessBlockConfiguration property to S3 bucket resource
  * Make PAY_PER_REQUEST default mode for Serverless::SimpleTable
  * Add limited support for resolving intrinsics in Serverless::LayerVersion
  * SAM now uses Flake8
  * Add example application for S3 Events written in Go
  * Updated several example applications

- Initial build
  + Version 1.9.0
- Add patch to drop compatible releases operator from setup.py,
  required for SLES12 as the setuptools version is too old
  + ast_drop-compatible-releases-operator.patch


python-jsonschema was updated to 2.6.0:

* Improved performance on CPython by adding caching around ref resolution

Update to version 2.5.0:

* Improved performance on CPython by adding caching around ref
  resolution (#203)

Update to version 2.4.0:

* Added a CLI (#134)
* Added absolute path and absolute schema path to errors (#120)
* Added ``relevance``
* Meta-schemas are now loaded via ``pkgutil``
* Added ``by_relevance`` and ``best_match`` (#91)
* Fixed ``format`` to allow adding formats for non-strings (#125)
* Fixed the ``uri`` format to reject URI references (#131)

- Install /usr/bin/jsonschema with update-alternatives support

python-nose2 was updated to 0.9.1:

* the prof plugin now uses cProfile instead of hotshot for profiling
* skipped tests now include the user's reason in junit XML's message field
* the prettyassert plugin mishandled multi-line function definitions
* Using a plugin's CLI flag when the plugin is already enabled via config
  no longer errors
* nose2.plugins.prettyassert, enabled with --pretty-assert
* Cleanup code for EOLed python versions
* Dropped support for distutils.
* Result reporter respects failure status set by other plugins
* JUnit XML plugin now includes the skip reason in its output

Upgrade to 0.8.0:

List of changes is too long to show here, see
https://github.com/nose-devs/nose2/blob/master/docs/changelog.rst
changes between 0.6.5 and 0.8.0

Update to 0.7.0:

* Added parameterized_class feature, for parameterizing entire test
  classes (many thanks to @TobyLL for their suggestions and help testing!)
* Fix DeprecationWarning on `inspect.getargs` (thanks @brettdh;
  https://github.com/wolever/parameterized/issues/67)
* Make sure that `setUp` and `tearDown` methods work correctly (#40)
* Raise a ValueError when input is empty (thanks @danielbradburn;
  https://github.com/wolever/parameterized/pull/48)
* Fix the order when number of cases exceeds 10 (thanks @ntflc;
  https://github.com/wolever/parameterized/pull/49)

python-scandir was included in version 2.3.2.

python-requests was updated to version 2.20.1 (bsc#1111622)

* Fixed bug with unintended Authorization header stripping for
  redirects using default ports (http/80, https/443).


* remove restriction for urllib3 &lt; 1.24

Update to version 2.20.0:

* Bugfixes
  + Content-Type header parsing is now case-insensitive
    (e.g. charset=utf8 v Charset=utf8).
  + Fixed exception leak where certain redirect urls would raise
    uncaught urllib3 exceptions.
  + Requests removes Authorization header from requests redirected
    from https to http on the same hostname. (CVE-2018-18074)
  + should_bypass_proxies now handles URIs without hostnames
    (e.g. files).
* Dependencies
  + Requests now supports urllib3 v1.24.
* Deprecations
  + Requests has officially stopped support for Python 2.6.

Update to version 2.19.1:

* Fixed issue where status_codes.py’s init function failed trying
  to append to a __doc__ value of None.

Update to version 2.19.0:

* Improvements
  + Warn about possible slowdown with cryptography version &lt; 1.3.4
  + Check host in proxy URL, before forwarding request to adapter.
  + Maintain fragments properly across redirects. (RFC7231 7.1.2)
  + Removed use of cgi module to expedite library load time.
  + Added support for SHA-256 and SHA-512 digest auth algorithms.
  + Minor performance improvement to Request.content.
  + Migrate to using collections.abc for 3.7 compatibility.
* Bugfixes
  + Parsing empty Link headers with parse_header_links() no longer
    return one bogus entry.
  + Fixed issue where loading the default certificate bundle from
    a zip archive would raise an IOError.
  + Fixed issue with unexpected ImportError on windows system
    which do not support winreg module.
  + DNS resolution in proxy bypass no longer includes the username
    and password in the request. This also fixes the issue of DNS
    queries failing on macOS.
  + Properly normalize adapter prefixes for url comparison.
  + Passing None as a file pointer to the files param no longer
    raises an exception.
  + Calling copy on a RequestsCookieJar will now preserve the
    cookie policy correctly.
* We now support idna v2.7 and urllib3 v1.23.

update to version 2.18.4:

* Improvements
  + Error messages for invalid headers now include the header name
    for easier debugging
* Dependencies
  + We now support idna v2.6.

update to version 2.18.3:

* Improvements
  + Running $ python -m requests.help now includes the installed
    version of idna.
* Bugfixes
  + Fixed issue where Requests would raise ConnectionError instead
    of SSLError when encountering SSL problems when using urllib3
    v1.22.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-02"/>
	<updated date="2020-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122668">SUSE bug 1122668</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556795" comment="python-PyYAML-5.1.2-26.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522744" comment="python-asn1crypto-0.24.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522745" comment="python-packaging-17.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556796" comment="python3-PyYAML-5.1.2-26.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522747" comment="python3-asn1crypto-0.24.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522748" comment="python3-packaging-17.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151415" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<description>
This update for postgresql96 fixes the following issues:

PostgreSQL was updated to version 9.6.17.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-04"/>
	<updated date="2020-03-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1720">CVE-2020-1720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556797" comment="postgresql96-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556798" comment="postgresql96-contrib-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531756" comment="postgresql96-docs-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556799" comment="postgresql96-plperl-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556800" comment="postgresql96-plpython-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556801" comment="postgresql96-pltcl-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556802" comment="postgresql96-server-9.6.17-3.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151416" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Update java-1_7_0-openjdk to version jdk7u251 (January 2020 CPU, bsc#1160968):

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2020-2590: Improve Kerberos interop capabilities
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2601: Better Ticket Granting Services
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support
- CVE-2020-2654: Improve Object Identifier Processing	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-10"/>
	<updated date="2020-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2590">CVE-2020-2590 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2601">CVE-2020-2601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556803" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556804" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556805" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556806" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151417" version="1" class="patch">
	<metadata>
		<title>Security update for ipmitool (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1085469" ref_url="https://bugzilla.suse.com/1085469" source="BUGZILLA"/>
		<reference ref_id="1163026" ref_url="https://bugzilla.suse.com/1163026" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-5208" ref_url="https://www.suse.com/security/cve/CVE-2020-5208/" source="CVE"/>
		<description>
This update for ipmitool fixes the following issues:

- CVE-2020-5208: Fixed multiple remote code executtion vulnerabilities (bsc#1163026).	  
- picmg discover messages are now DEBUG and not INFO messages (bsc#1085469).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-10"/>
	<updated date="2020-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085469">SUSE bug 1085469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163026">SUSE bug 1163026</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5208/">CVE-2020-5208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5208">CVE-2020-5208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556807" comment="ipmitool-1.8.18-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151418" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1156323" ref_url="https://bugzilla.suse.com/1156323" source="BUGZILLA"/>
		<reference ref_id="1156324" ref_url="https://bugzilla.suse.com/1156324" source="BUGZILLA"/>
		<reference ref_id="1156326" ref_url="https://bugzilla.suse.com/1156326" source="BUGZILLA"/>
		<reference ref_id="1156328" ref_url="https://bugzilla.suse.com/1156328" source="BUGZILLA"/>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1162687" ref_url="https://bugzilla.suse.com/1162687" source="BUGZILLA"/>
		<reference ref_id="1162689" ref_url="https://bugzilla.suse.com/1162689" source="BUGZILLA"/>
		<reference ref_id="1162691" ref_url="https://bugzilla.suse.com/1162691" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526/" source="CVE"/>
		<reference ref_id="CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677/" source="CVE"/>
		<reference ref_id="CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678/" source="CVE"/>
		<reference ref_id="CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679/" source="CVE"/>
		<reference ref_id="CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449/" source="CVE"/>
		<reference ref_id="CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450/" source="CVE"/>
		<reference ref_id="CVE-2020-8517" ref_url="https://www.suse.com/security/cve/CVE-2020-8517/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2019-12528: Fixed an information disclosure flaw in the FTP gateway (bsc#1162689). 
- CVE-2019-12526: Fixed potential remote code execution during URN processing (bsc#1156326).
- CVE-2019-12523,CVE-2019-18676: Fixed multiple improper validations in URI processing (bsc#1156329).
- CVE-2019-18677: Fixed Cross-Site Request Forgery in HTTP Request processing (bsc#1156328).
- CVE-2019-18678: Fixed incorrect message parsing which could have led to HTTP request splitting issue (bsc#1156323).
- CVE-2019-18679: Fixed information disclosure when processing HTTP Digest Authentication (bsc#1156324).
- CVE-2020-8449: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
- CVE-2020-8450: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
- CVE-2020-8517: Fixed a buffer overflow in ext_lm_group_acl when processing NTLM Authentication credentials (bsc#1162691).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-12"/>
	<updated date="2020-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156323">SUSE bug 1156323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156324">SUSE bug 1156324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156326">SUSE bug 1156326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156328">SUSE bug 1156328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162689">SUSE bug 1162689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162691">SUSE bug 1162691</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12523">CVE-2019-12523 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12526">CVE-2019-12526 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12528">CVE-2019-12528 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18676">CVE-2019-18676 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18677">CVE-2019-18677 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18678">CVE-2019-18678 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18679">CVE-2019-18679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8449">CVE-2020-8449 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8450">CVE-2020-8450 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8517/">CVE-2020-8517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8517">CVE-2020-8517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556808" comment="squid-3.5.21-26.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151419" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1160305" ref_url="https://bugzilla.suse.com/1160305" source="BUGZILLA"/>
		<reference ref_id="1160498" ref_url="https://bugzilla.suse.com/1160498" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-03 (bsc#1160498)
  * CVE-2019-17026 (bmo#1607443)
    IonMonkey type confusion with StoreElementHole and
    FallibleStoreElement 

- Firefox Extended Support Release 68.4.0 ESR
  * Fixed: Various security fixes
  MFSA 2020-02 (bsc#1160305)
  * CVE-2019-17015 (bmo#1599005)
    Memory corruption in parent process during new content
    process initialization on Windows
  * CVE-2019-17016 (bmo#1599181)
    Bypass of @namespace CSS sanitization during pasting
  * CVE-2019-17017 (bmo#1603055)
    Type Confusion in XPCVariant.cpp
  * CVE-2019-17021 (bmo#1599008)
    Heap address disclosure in parent process during content
    process initialization on Windows
  * CVE-2019-17022 (bmo#1602843)
    CSS sanitization does not escape HTML tags
  * CVE-2019-17024 (bmo#1507180, bmo#1595470, bmo#1598605,
    bmo#1601826)
    Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-10"/>
	<updated date="2020-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160498">SUSE bug 1160498</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17015">CVE-2019-17015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17016">CVE-2019-17016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17017">CVE-2019-17017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17021">CVE-2019-17021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17022">CVE-2019-17022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17024">CVE-2019-17024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17026">CVE-2019-17026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556809" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556810" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151420" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

PostgreSQL was updated to version 10.12.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1720">CVE-2020-1720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556811" comment="libecpg6-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556812" comment="libpq5-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522672" comment="libpq5-32bit-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556813" comment="postgresql10-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556814" comment="postgresql10-contrib-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531766" comment="postgresql10-docs-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556815" comment="postgresql10-plperl-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556816" comment="postgresql10-plpython-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556817" comment="postgresql10-pltcl-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556818" comment="postgresql10-server-10.12-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151421" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1132665" ref_url="https://bugzilla.suse.com/1132665" source="BUGZILLA"/>
		<reference ref_id="1166238" ref_url="https://bugzilla.suse.com/1166238" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to 68.6.0 ESR (MFSA 2020-09 bsc#1132665 bsc#1166238)
          
- CVE-2020-6805: Fixed a use-after-free when removing data about origins
- CVE-2020-6806: Fixed improper protections against state confusion
- CVE-2020-6807: Fixed a use-after-free in cubeb during stream destruction 
- CVE-2020-6811: Fixed an issue where copy as cURL' feature did not fully 
  escape website-controlled data potentially leading to command injection 
- CVE-2019-20503: Fixed out of bounds reads in sctp_load_addresses_from_init 
- CVE-2020-6812: Fixed an issue where the names of AirPods with personally 
  identifiable information were exposed to websites with camera or microphone 
  permission     
- CVE-2020-6814: Fixed multiple memory safety bugs
- Fixed an issue with minimizing a window (bsc#1132665).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-19"/>
	<updated date="2020-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132665">SUSE bug 1132665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20503">CVE-2019-20503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6805">CVE-2020-6805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6806">CVE-2020-6806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6807">CVE-2020-6807 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6811">CVE-2020-6811 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6812">CVE-2020-6812 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6814">CVE-2020-6814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556819" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556820" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151422" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1164692" ref_url="https://bugzilla.suse.com/1164692" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-1938: Fixed a file contents disclosure vulnerability (bsc#1164692).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-19"/>
	<updated date="2020-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1164692">SUSE bug 1164692</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531774" comment="tomcat-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531775" comment="tomcat-admin-webapps-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531776" comment="tomcat-docs-webapp-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531777" comment="tomcat-el-3_0-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531778" comment="tomcat-javadoc-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531779" comment="tomcat-jsp-2_3-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531780" comment="tomcat-lib-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531781" comment="tomcat-servlet-3_1-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531782" comment="tomcat-webapps-8.0.53-29.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151423" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1158763" ref_url="https://bugzilla.suse.com/1158763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18900" ref_url="https://www.suse.com/security/cve/CVE-2019-18900/" source="CVE"/>
		<description>
This update for libzypp fixes the following issues:

Security issue fixed:

- CVE-2019-18900: Fixed assert cookie file that was world readable (bsc#1158763).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1158763">SUSE bug 1158763</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18900/">CVE-2019-18900 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18900">CVE-2019-18900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556821" comment="libzypp-16.21.2-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556822" comment="libzypp-devel-16.21.2-2.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151424" version="1" class="patch">
	<metadata>
		<title>Security update for python-cffi, python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1055478" ref_url="https://bugzilla.suse.com/1055478" source="BUGZILLA"/>
		<reference ref_id="1070737" ref_url="https://bugzilla.suse.com/1070737" source="BUGZILLA"/>
		<reference ref_id="1101820" ref_url="https://bugzilla.suse.com/1101820" source="BUGZILLA"/>
		<reference ref_id="1111657" ref_url="https://bugzilla.suse.com/1111657" source="BUGZILLA"/>
		<reference ref_id="1138748" ref_url="https://bugzilla.suse.com/1138748" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="981848" ref_url="https://bugzilla.suse.com/981848" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10903" ref_url="https://www.suse.com/security/cve/CVE-2018-10903/" source="CVE"/>
		<description>
This update for python-cffi, python-cryptography fixes the following issues:

Security issue fixed:

- CVE-2018-10903: Fixed GCM tag forgery via truncated tag in finalize_with_tag API (bsc#1101820).

Non-security issues fixed:

python-cffi was updated to 1.11.2 (bsc#1138748, jsc#ECO-1256, jsc#PM-1598):

- fixed a build failure on i586 (bsc#1111657)
- Salt was unable to highstate in snapshot 20171129 (bsc#1070737)

- Update pytest in spec to add c directory tests in addition to 
  testing directory.

- update to version 1.11.2:
  * Fix Windows issue with managing the thread-state on CPython 3.0 to
    3.5

- Update pytest in spec to add c directory tests in addition to 
  testing directory.
- Omit test_init_once_multithread tests as they rely on multiple
  threads finishing in a given time. Returns sporadic pass/fail
  within build.
- Update to 1.11.1:
  * Fix tests, remove deprecated C API usage
  * Fix (hack) for 3.6.0/3.6.1/3.6.2 giving incompatible binary
    extensions (cpython issue #29943)
  * Fix for 3.7.0a1+

- Update to 1.11.0:
  * Support the modern standard types char16_t and char32_t. These
    work like wchar_t: they represent one unicode character, or when
    used as charN_t * or charN_t[] they represent a unicode string.
    The difference with wchar_t is that they have a known, fixed
    size. They should work at all places that used to work with
    wchar_t (please report an issue if I missed something). Note
    that with set_source(), you need to make sure that these types
    are actually defined by the C source you provide (if used in
    cdef()).
  * Support the C99 types float _Complex and double _Complex. Note
    that libffi doesn't support them, which means that in the ABI
    mode you still cannot call C functions that take complex
    numbers directly as arguments or return type.
  * Fixed a rare race condition when creating multiple FFI instances
    from multiple threads. (Note that you aren't meant to create
    many FFI instances: in inline mode, you should write
    ffi = cffi.FFI() at module level just after import cffi; and in
    out-of-line mode you don't instantiate FFI explicitly at all.)
  * Windows: using callbacks can be messy because the CFFI internal
    error messages show up to stderr-but stderr goes nowhere in many
    applications. This makes it particularly hard to get started
    with the embedding mode. (Once you get started, you can at least
    use @ffi.def_extern(onerror=...) and send the error logs where
    it makes sense for your application, or record them in log
    files, and so on.) So what is new in CFFI is that now, on
    Windows CFFI will try to open a non-modal MessageBox (in addition
    to sending raw messages to stderr). The MessageBox is only
    visible if the process stays alive: typically, console
    applications that crash close immediately, but that is also the
    situation where stderr should be visible anyway.
  * Progress on support for callbacks in NetBSD.
  * Functions returning booleans would in some case still return 0
    or 1 instead of False or True. Fixed.
  * ffi.gc() now takes an optional third parameter, which gives an
    estimate of the size (in bytes) of the object. So far, this is
    only used by PyPy, to make the next GC occur more quickly
    (issue #320). In the future, this might have an effect on
    CPython too (provided the CPython issue 31105 is addressed).
  * Add a note to the documentation: the ABI mode gives function
    objects that are slower to call than the API mode does. For
    some reason it is often thought to be faster. It is not!
- Update to 1.10.1:
  * Fixed the line numbers reported in case of cdef() errors. Also,
    I just noticed, but pycparser always supported the preprocessor
    directive # 42 'foo.h' to mean 'from the next line, we're in
    file foo.h starting from line 42';, which it puts in the error
    messages. 

- update to 1.10.0:
 * Issue #295: use calloc() directly instead of PyObject_Malloc()+memset()
   to handle ffi.new() with a default allocator. Speeds up ffi.new(large-array)
   where most of the time you never touch most of the array.
  * Some OS/X build fixes ('only with Xcode but without CLT';).
  * Improve a couple of error messages: when getting mismatched versions of
    cffi and its backend; and when calling functions which cannot be called with
    libffi because an argument is a struct that is 'too complicated'; (and not
    a struct pointer, which always works).
  * Add support for some unusual compilers (non-msvc, non-gcc, non-icc, non-clang)
  * Implemented the remaining cases for ffi.from_buffer. Now all
    buffer/memoryview objects can be passed. The one remaining check is against
    passing unicode strings in Python 2. (They support the buffer interface, but
    that gives the raw bytes behind the UTF16/UCS4 storage, which is most of the
    times not what you expect. In Python 3 this has been fixed and the unicode
    strings don't support the memoryview interface any more.)
  * The C type _Bool or bool now converts to a Python boolean when reading,
    instead of the content of the byte as an integer. The potential
    incompatibility here is what occurs if the byte contains a value different
    from 0 and 1. Previously, it would just return it; with this change, CFFI
    raises an exception in this case. But this case means 'undefined behavior';
    in C; if you really have to interface with a library relying on this,
    don't use bool in the CFFI side. Also, it is still valid to use a byte
    string as initializer for a bool[], but now it must only contain \x00 or
    \x01. As an aside, ffi.string() no longer works on bool[] (but it never made
    much sense, as this function stops at the first zero).
  * ffi.buffer is now the name of cffi's buffer type, and ffi.buffer() works
    like before but is the constructor of that type.
  * ffi.addressof(lib, 'name') now works also in in-line mode, not only in
    out-of-line mode. This is useful for taking the address of global variables.
  * Issue #255: cdata objects of a primitive type (integers, floats, char) are
    now compared and ordered by value. For example, &lt;cdata 'int' 42&gt; compares
    equal to 42 and &lt;cdata 'char' b'A'&gt; compares equal to b'A'. Unlike C,
    &lt;cdata 'int' -1&gt; does not compare equal to ffi.cast('unsigned int', -1): it
    compares smaller, because -1 &lt; 4294967295.
  * PyPy: ffi.new() and ffi.new_allocator()() did not record 'memory pressure';,
    causing the GC to run too infrequently if you call ffi.new() very often
    and/or with large arrays. Fixed in PyPy 5.7.
  * Support in ffi.cdef() for numeric expressions with + or -. Assumes that
    there is no overflow; it should be fixed first before we add more general
    support for arbitrary arithmetic on constants.

- do not generate HTML documentation for packages that are indirect
  dependencies of Sphinx
  (see docs at https://cffi.readthedocs.org/ )

- update to 1.9.1
  - Structs with variable-sized arrays as their last field: now we track the
    length of the array after ffi.new() is called, just like we always tracked
    the length of ffi.new('int[]', 42). This lets us detect out-of-range
    accesses to array items. This also lets us display a better repr(), and
    have the total size returned by ffi.sizeof() and ffi.buffer(). Previously
    both functions would return a result based on the size of the declared
    structure type, with an assumed empty array. (Thanks andrew for starting
    this refactoring.)
  - Add support in cdef()/set_source() for unspecified-length arrays in
    typedefs: typedef int foo_t[...];. It was already supported for global
    variables or structure fields.
  - I turned in v1.8 a warning from cffi/model.py into an error: 'enum xxx' has
    no values explicitly defined: refusing to guess which integer type it is
    meant to be (unsigned/signed, int/long). Now I'm turning it back to a
    warning again; it seems that guessing that the enum has size int is a
    99%-safe bet. (But not 100%, so it stays as a warning.)
  - Fix leaks in the code handling FILE * arguments. In CPython 3 there is a
    remaining issue that is hard to fix: if you pass a Python file object to a
    FILE * argument, then os.dup() is used and the new file descriptor is only
    closed when the GC reclaims the Python file object-and not at the earlier
    time when you call close(), which only closes the original file descriptor.
    If this is an issue, you should avoid this automatic convertion of Python
    file objects: instead, explicitly manipulate file descriptors and call
    fdopen() from C (...via cffi).
  - When passing a void * argument to a function with a different pointer type,
    or vice-versa, the cast occurs automatically, like in C. The same occurs
    for initialization with ffi.new() and a few other places. However, I
    thought that char * had the same property-but I was mistaken. In C you get
    the usual warning if you try to give a char * to a char ** argument, for
    example. Sorry about the confusion. This has been fixed in CFFI by giving
    for now a warning, too. It will turn into an error in a future version.
  - Issue #283: fixed ffi.new() on structures/unions with nested anonymous
    structures/unions, when there is at least one union in the mix. When
    initialized with a list or a dict, it should now behave more closely like
    the { } syntax does in GCC.
  - CPython 3.x: experimental: the generated C extension modules now use the
    'limited API';, which means that, as a compiled .so/.dll, it should work
    directly on any version of CPython &gt;= 3.2. The name produced by distutils
    is still version-specific. To get the version-independent name, you can
    rename it manually to NAME.abi3.so, or use the very recent setuptools 26.
  - Added ffi.compile(debug=...), similar to python setup.py build --debug but
    defaulting to True if we are running a debugging version of Python itself.
  - Removed the restriction that ffi.from_buffer() cannot be used on byte
    strings. Now you can get a char * out of a byte string, which is valid as
    long as the string object is kept alive. (But don't use it to modify the
    string object! If you need this, use bytearray or other official
    techniques.)
  - PyPy 5.4 can now pass a byte string directly to a char * argument (in older
    versions, a copy would be made). This used to be a CPython-only
    optimization.
  - ffi.gc(p, None) removes the destructor on an object previously created by
    another call to ffi.gc()
  - bool(ffi.cast('primitive type', x)) now returns False if the value is zero
    (including -0.0), and True otherwise. Previously this would only return
    False for cdata objects of a pointer type when the pointer is NULL.
  - bytearrays: ffi.from_buffer(bytearray-object) is now supported. (The reason
    it was not supported was that it was hard to do in PyPy, but it works since
    PyPy 5.3.) To call a C function with a char * argument from a buffer
    object-now including bytearrays-you write lib.foo(ffi.from_buffer(x)).
    Additionally, this is now supported: p[0:length] = bytearray-object. The
    problem with this was that a iterating over bytearrays gives numbers
    instead of characters. (Now it is implemented with just a memcpy, of
    course, not actually iterating over the characters.)
  - C++: compiling the generated C code with C++ was supposed to work, but
    failed if you make use the bool type (because that is rendered as the C
    _Bool type, which doesn't exist in C++).
  - help(lib) and help(lib.myfunc) now give useful information, as well as
    dir(p) where p is a struct or pointer-to-struct.

- update for multipython build

- disable 'negative left shift' warning in test suite to prevent
  failures with gcc6, until upstream fixes the undefined code
  in question (bsc#981848)

- Update to version 1.6.0:
  * ffi.list_types()
  * ffi.unpack()
  * extern 'Python+C';
  * in API mode, lib.foo.__doc__ contains the C signature now.
  * Yet another attempt at robustness of ffi.def_extern() against
    CPython's interpreter shutdown logic.
- Update in SLE-12 (bsc#1138748, jsc#ECO-1256, jsc#PM-1598)

- Make this version of the package compatible with OpenSSL 1.1.1d, thus fixing bsc#1149792.

- bsc#1101820 CVE-2018-10903 GCM tag forgery via truncated tag in
  finalize_with_tag API

- Add proper conditional for the python2, the ifpython works only
  for the requires/etc

- add missing dependency on python ssl

- update to version 2.1.4:
  * Added X509_up_ref for an upcoming pyOpenSSL release.

- update to version 2.1.3:
  * Updated Windows, macOS, and manylinux1 wheels to be compiled with
    OpenSSL 1.1.0g.

- update to version 2.1.2:
  * Corrected a bug with the manylinux1 wheels where OpenSSL's stack
    was marked executable.

- fix BuildRequires conditions for python3

- update to 2.1.1

- Fix cffi version requirement.

- Disable memleak tests to fix build with OpenSSL 1.1 (bsc#1055478)


- update to 2.0.3

- update to 2.0.2

- update to 2.0

- update to 1.9

- add python-packaging to requirements explicitly instead of relying
  on setuptools to pull it in

- Switch to singlespec approach

- update to 1.8.1
- Adust Requires and BuildRequires		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-25"/>
	<updated date="2020-03-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055478">SUSE bug 1055478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070737">SUSE bug 1070737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101820">SUSE bug 1101820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111657">SUSE bug 1111657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138748">SUSE bug 1138748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981848">SUSE bug 981848</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10903/">CVE-2018-10903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10903">CVE-2018-10903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556823" comment="python-cffi-1.11.2-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556824" comment="python-cryptography-2.1.4-7.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556825" comment="python-xattr-0.7.5-6.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556826" comment="python3-cffi-1.11.2-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556827" comment="python3-cryptography-2.1.4-7.28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151425" version="1" class="patch">
	<metadata>
		<title>Security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1118987" ref_url="https://bugzilla.suse.com/1118987" source="BUGZILLA"/>
		<reference ref_id="1162197" ref_url="https://bugzilla.suse.com/1162197" source="BUGZILLA"/>
		<reference ref_id="1162200" ref_url="https://bugzilla.suse.com/1162200" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11805" ref_url="https://www.suse.com/security/cve/CVE-2018-11805/" source="CVE"/>
		<reference ref_id="CVE-2020-1930" ref_url="https://www.suse.com/security/cve/CVE-2020-1930/" source="CVE"/>
		<reference ref_id="CVE-2020-1931" ref_url="https://www.suse.com/security/cve/CVE-2020-1931/" source="CVE"/>
		<description>
This update for spamassassin fixes the following issues:

- CVE-2018-11805: Fixed an issue with delimiter handling in rule files 
  related to is_regexp_valid() (bsc#1118987).
- CVE-2020-1930: Fixed an issue with rule configuration (.cf) files which 
  can be configured to run system commands (bsc#1162197).
- CVE-2020-1931: Fixed an issue with rule configuration (.cf) files which 
  can be configured to run system commands with warnings (bsc#1162200).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-30"/>
	<updated date="2020-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118987">SUSE bug 1118987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162197">SUSE bug 1162197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162200">SUSE bug 1162200</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11805/">CVE-2018-11805 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11805">CVE-2018-11805 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1930/">CVE-2020-1930 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1930">CVE-2020-1930 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1931/">CVE-2020-1931 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1931">CVE-2020-1931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556828" comment="perl-Mail-SpamAssassin-3.4.2-44.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556829" comment="spamassassin-3.4.2-44.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151426" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1162224" ref_url="https://bugzilla.suse.com/1162224" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<description>
This update for python3 fixes the following issue:

- CVE-2019-18348: Fixed a CRLF injection via the host part 
  of the url passed to urlopen(). Now an InvalidURL exception 
  is raised (bsc#1155094).
- CVE-2019-9674: Improved the documentation to reflect the 
  dangers of zip-bombs (bsc#1162825).
- CVE-2020-8492: Fixed a regular expression in urllib that 
  was prone to denial of service via HTTP (bsc#1162367).
- Fixed an issue with version missmatch (bsc#1162224).
- Rename idle icons to idle3 in order to not conflict with python2
  variant of the package. (bsc#1165894)
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-02"/>
	<updated date="2020-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162224">SUSE bug 1162224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556830" comment="libpython3_4m1_0-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556831" comment="python3-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556832" comment="python3-base-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556833" comment="python3-curses-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556834" comment="python3-devel-3.4.10-25.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151427" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.176-94_88 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5108">CVE-2019-5108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721148" comment="kernel-default 4.4.176-94.88 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719415" comment="kgraft-patch-4_4_176-94_88-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556835" comment="kgraft-patch-4_4_176-94_88-default-8-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151428" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1141322" ref_url="https://bugzilla.suse.com/1141322" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to NSS 3.47.1:

Security issues fixed:

- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- CVE-2019-11745: EncryptUpdate should use maxout, not block size (bsc#1158527).
- CVE-2019-11727: Fixed vulnerability sign CertificateVerify with PKCS#1 v1.5 signatures issue (bsc#1141322).

mozilla-nspr was updated to version 4.23:

- Whitespace in C files was cleaned up and no longer uses tab characters for indenting.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-13"/>
	<updated date="2020-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141322">SUSE bug 1141322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17006">CVE-2019-17006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556836" comment="libfreebl3-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522676" comment="libfreebl3-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556837" comment="libfreebl3-hmac-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531796" comment="libfreebl3-hmac-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556838" comment="libsoftokn3-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522678" comment="libsoftokn3-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556839" comment="libsoftokn3-hmac-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531798" comment="libsoftokn3-hmac-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556840" comment="mozilla-nspr-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522680" comment="mozilla-nspr-32bit-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556841" comment="mozilla-nspr-devel-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556842" comment="mozilla-nss-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522682" comment="mozilla-nss-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556843" comment="mozilla-nss-certs-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522684" comment="mozilla-nss-certs-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556844" comment="mozilla-nss-devel-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556845" comment="mozilla-nss-sysinit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522686" comment="mozilla-nss-sysinit-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556846" comment="mozilla-nss-tools-3.47.1-58.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151429" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_113 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5108">CVE-2019-5108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721279" comment="kernel-default 4.4.180-94.113 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719606" comment="kgraft-patch-4_4_180-94_113-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556847" comment="kgraft-patch-4_4_180-94_113-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151430" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_107 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5108">CVE-2019-5108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721280" comment="kernel-default 4.4.180-94.107 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719608" comment="kgraft-patch-4_4_180-94_107-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556848" comment="kgraft-patch-4_4_180-94_107-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151431" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_103 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5108">CVE-2019-5108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721277" comment="kernel-default 4.4.180-94.103 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719602" comment="kgraft-patch-4_4_180-94_103-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556849" comment="kgraft-patch-4_4_180-94_103-default-6-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151432" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_100 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5108">CVE-2019-5108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721278" comment="kernel-default 4.4.180-94.100 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719604" comment="kgraft-patch-4_4_180-94_100-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556850" comment="kgraft-patch-4_4_180-94_100-default-6-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151433" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_97 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5108">CVE-2019-5108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721153" comment="kernel-default 4.4.180-94.97 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719420" comment="kgraft-patch-4_4_180-94_97-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556851" comment="kgraft-patch-4_4_180-94_97-default-8-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151434" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.178-94_91 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5108">CVE-2019-5108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721150" comment="kernel-default 4.4.178-94.91 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719417" comment="kgraft-patch-4_4_178-94_91-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556852" comment="kgraft-patch-4_4_178-94_91-default-8-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151435" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1154609" ref_url="https://bugzilla.suse.com/1154609" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<description>
This update for libxslt fixes the following issue:

- CVE-2019-18197: Fixed a dangling pointer in xsltCopyText which may have led to information disclosure (bsc#1154609).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-26"/>
	<updated date="2020-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154609">SUSE bug 1154609</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18197">CVE-2019-18197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556853" comment="libxslt-tools-1.1.28-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556854" comment="libxslt1-1.1.28-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531801" comment="libxslt1-32bit-1.1.28-17.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151436" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1168630" ref_url="https://bugzilla.suse.com/1168630" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Mozilla Firefox 68.6.1esr
  MFSA 2020-11 (bsc#1168630)
  * CVE-2020-6819 (bmo#1620818)
    Use-after-free while running the nsDocShell destructor
  * CVE-2020-6820 (bmo#1626728)
    Use-after-free when handling a ReadableStream
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-06"/>
	<updated date="2020-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6819">CVE-2020-6819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6820">CVE-2020-6820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556855" comment="MozillaFirefox-68.6.1-109.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556856" comment="MozillaFirefox-translations-common-68.6.1-109.113.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151437" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1168874" ref_url="https://bugzilla.suse.com/1168874" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6827" ref_url="https://www.suse.com/security/cve/CVE-2020-6827/" source="CVE"/>
		<reference ref_id="CVE-2020-6828" ref_url="https://www.suse.com/security/cve/CVE-2020-6828/" source="CVE"/>
		<description>
This update for MozillaFirefox to version 68.7.0 ESR fixes the following issues:

- CVE-2020-6821: Uninitialized memory could be read when using the WebGL copyTexSubImage method (bsc#1168874).
- CVE-2020-6822: Fixed out of bounds write in GMPDecodeData when processing large images (bsc#1168874).
- CVE-2020-6825: Fixed Memory safety bugs (bsc#1168874).
- CVE-2020-6827: Custom Tabs could have the URI spoofed (bsc#1168874).
- CVE-2020-6828: Preference overwrite via crafted Intent (bsc#1168874).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-09"/>
	<updated date="2020-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6821">CVE-2020-6821 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6822">CVE-2020-6822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6825">CVE-2020-6825 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6827/">CVE-2020-6827 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6827">CVE-2020-6827 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6828/">CVE-2020-6828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6828">CVE-2020-6828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556857" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556858" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151438" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1167890" ref_url="https://bugzilla.suse.com/1167890" source="BUGZILLA"/>
		<reference ref_id="1168930" ref_url="https://bugzilla.suse.com/1168930" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<description>
This update for git fixes the following issues:

Security issue fixed:

- CVE-2020-5260: With a crafted URL that contains a newline in it, the credential
  helper machinery can be fooled to give credential information for a wrong host (bsc#1168930). 

Non-security issue fixed: 

git was updated to 2.26.0 for SHA256 support (bsc#1167890, jsc#SLE-11608):

- the xinetd snippet was removed
- the System V init script for the git-daemon was replaced by a systemd
  service file of the same name.

git 2.26.0:

* 'git rebase' now uses a different backend that is based on the
  'merge' machinery by default. The 'rebase.backend' configuration
   variable reverts to old behaviour when set to  'apply'
* Improved handling of sparse checkouts
* Improvements to many commands and internal features

git 2.25.1:

* 'git commit' now honors advise.statusHints
* various updates, bug fixes and documentation updates

git 2.25.0:

* The branch description ('git branch --edit-description') has been
  used to fill the body of the cover letters by the format-patch
  command; this has been enhanced so that the subject can also be
  filled.
* A few commands learned to take the pathspec from the standard input
  or a named file, instead of taking it as the command line
  arguments, with the '--pathspec-from-file' option.
* Test updates to prepare for SHA-2 transition continues.
* Redo 'git name-rev' to avoid recursive calls.
* When all files from some subdirectory were renamed to the root
  directory, the directory rename heuristics would fail to detect that
  as a rename/merge of the subdirectory to the root directory, which has
  been corrected.
* HTTP transport had possible allocator/deallocator mismatch, which
  has been corrected.

git 2.24.1:

* CVE-2019-1348: The --export-marks option of fast-import is
  exposed also via the in-stream command feature export-marks=...
  and it allows overwriting arbitrary paths (bsc#1158785)
* CVE-2019-1349: on Windows, when submodules are cloned
  recursively, under certain circumstances Git could be fooled
  into using the same Git directory twice (bsc#1158787)
* CVE-2019-1350: Incorrect quoting of command-line arguments
  allowed remote code execution during a recursive clone in
  conjunction with SSH URLs (bsc#1158788)
* CVE-2019-1351: on Windows mistakes drive letters outside of
  the US-English alphabet as relative paths (bsc#1158789)
* CVE-2019-1352: on Windows was unaware of NTFS Alternate Data
  Streams (bsc#1158790)
* CVE-2019-1353: when run in the Windows Subsystem for Linux
  while accessing a working directory on a regular Windows
  drive, none of the NTFS protections were active (bsc#1158791)
* CVE-2019-1354: on Windows refuses to write tracked files with
  filenames that contain backslashes (bsc#1158792)
* CVE-2019-1387: Recursive clones vulnerability that is caused
  by too-lax validation of submodule names, allowing very
  targeted attacks via remote code execution in recursive
  clones (bsc#1158793)
* CVE-2019-19604: a recursive clone followed by a submodule
  update could execute code contained within the repository
  without the user explicitly having asked for that (bsc#1158795)

- Fix building with asciidoctor and without DocBook4 stylesheets.

git 2.24.0

* The command line parser learned '--end-of-options' notation.
* A mechanism to affect the default setting for a (related) group of
  configuration variables is introduced.
* 'git fetch' learned '--set-upstream' option to help those who first
  clone from their private fork they intend to push to, add the true
  upstream via 'git remote add' and then 'git fetch' from it.
* fixes and improvements to UI, workflow and features, bash completion fixes
* part of it merged upstream
* the Makefile attempted to download some documentation, banned

git 2.23.0:

* The '--base' option of 'format-patch' computed the patch-ids for
  prerequisite patches in an unstable way, which has been updated
  to compute in a way that is compatible with 'git patch-id
  --stable'.
* The 'git log' command by default behaves as if the --mailmap
  option was given.
* fixes and improvements to UI, workflow and features

git 2.22.1:

* A relative pathname given to 'git init --template=&lt;path&gt; &lt;repo&gt;'
  ought to be relative to the directory 'git init' gets invoked in,
  but it instead was made relative to the repository, which has been
  corrected.
* 'git worktree add' used to fail when another worktree connected to
  the same repository was corrupt, which has been corrected.
* 'git am -i --resolved' segfaulted after trying to see a commit as
  if it were a tree, which has been corrected.
* 'git merge --squash' is designed to update the working tree and the
  index without creating the commit, and this cannot be countermanded
  by adding the '--commit' option; the command now refuses to work
  when both options are given.
* Update to Unicode 12.1 width table.
* 'git request-pull' learned to warn when the ref we ask them to pull
  from in the local repository and in the published repository are
  different.
* 'git fetch' into a lazy clone forgot to fetch base objects that are
  necessary to complete delta in a thin packfile, which has been
  corrected.
* The URL decoding code has been updated to avoid going past the end
  of the string while parsing %-&lt;hex&gt;-&lt;hex&gt; sequence.
* 'git clean' silently skipped a path when it cannot lstat() it; now
  it gives a warning.
* 'git rm' to resolve a conflicted path leaked an internal message
  'needs merge' before actually removing the path, which was
  confusing. This has been corrected.
* Many more bugfixes and code cleanups.

- removal of SuSEfirewall2 service, since SuSEfirewall2 has been replaced by
  firewalld, see [1].
  [1]: https://lists.opensuse.org/opensuse-factory/2019-01/msg00490.html

git 2.22.0:

* The filter specification '--filter=sparse:path=&lt;path&gt;' used to
  create a lazy/partial clone has been removed. Using a blob that is
  part of the project as sparse specification is still supported with
  the '--filter=sparse:oid=&lt;blob&gt;' option
* 'git checkout --no-overlay' can be used to trigger a new mode of
  checking out paths out of the tree-ish, that allows paths that
  match the pathspec that are in the current index and working tree
  and are not in the tree-ish.
* Four new configuration variables {author,committer}.{name,email}
  have been introduced to override user.{name,email} in more specific
  cases.
* 'git branch' learned a new subcommand '--show-current'.
* The command line completion (in contrib/) has been taught to
  complete more subcommand parameters.
* The completion helper code now pays attention to repository-local
  configuration (when available), which allows --list-cmds to honour
  a repository specific setting of completion.commands, for example.
* The list of conflicted paths shown in the editor while concluding a
  conflicted merge was shown above the scissors line when the
  clean-up mode is set to 'scissors', even though it was commented
  out just like the list of updated paths and other information to
  help the user explain the merge better.
* 'git rebase' that was reimplemented in C did not set ORIG_HEAD
  correctly, which has been corrected.
* 'git worktree add' used to do a 'find an available name with stat
  and then mkdir', which is race-prone. This has been fixed by using
  mkdir and reacting to EEXIST in a loop. 

- update git-web AppArmor profile for bash and tar usrMerge (bsc#1132350)

git 2.21.0:

* Historically, the '-m' (mainline) option can only be used for 'git
  cherry-pick' and 'git revert' when working with a merge commit.
  This version of Git no longer warns or errors out when working with
  a single-parent commit, as long as the argument to the '-m' option
  is 1 (i.e. it has only one parent, and the request is to pick or
  revert relative to that first parent). Scripts that relied on the
  behaviour may get broken with this change.
* Small fixes and features for fast-export and fast-import.
* The 'http.version' configuration variable can be used with recent
  enough versions of cURL library to force the version of HTTP used
  to talk when fetching and pushing.
* 'git push $there $src:$dst' rejects when $dst is not a fully
  qualified refname and it is not clear what the end user meant.
* Update 'git multimail' from the upstream.
* A new date format '--date=human' that morphs its output depending
  on how far the time is from the current time has been introduced.
  '--date=auto:human' can be used to use this new format (or any
  existing format) when the output is going to the pager or to the
  terminal, and otherwise the default format.

- Fix worktree creation race (bsc#1114225).

git 2.20.1:

* portability fixes
* 'git help -a' did not work well when an overly long alias was
  defined
* no longer squelched an error message when the run_command API
  failed to run a missing command

git 2.20.0:

* 'git help -a' now gives verbose output (same as 'git help -av').
  Those who want the old output may say 'git help --no-verbose -a'..
* 'git send-email' learned to grab address-looking string on any
  trailer whose name ends with '-by'.
* 'git format-patch' learned new '--interdiff' and '--range-diff'
  options to explain the difference between this version and the
  previous attempt in the cover letter (or after the three-dashes as
  a comment).
* Developer builds now use -Wunused-function compilation option.
* Fix a bug in which the same path could be registered under multiple
  worktree entries if the path was missing (for instance, was removed
  manually).  Also, as a convenience, expand the number of cases in
  which --force is applicable.
* The overly large Documentation/config.txt file have been split into
  million little pieces.  This potentially allows each individual piece
  to be included into the manual page of the command it affects more easily.
* Malformed or crafted data in packstream can make our code attempt
  to read or write past the allocated buffer and abort, instead of
  reporting an error, which has been fixed.
* Fix for a long-standing bug that leaves the index file corrupt when
  it shrinks during a partial commit.
* 'git merge' and 'git pull' that merges into an unborn branch used
  to completely ignore '--verify-signatures', which has been
  corrected.
* ...and much more features and fixes

- fix CVE-2018-19486 (bsc#1117257)

git 2.19.2:

* various bug fixes for multiple subcommands and operations

git 2.19.1:

* CVE-2018-17456: Specially crafted .gitmodules files may have
  allowed arbitrary code execution when the repository is cloned
  with --recurse-submodules (bsc#1110949)

git 2.19.0:

* 'git diff' compares the index and the working tree.  For paths
   added with intent-to-add bit, the command shows the full contents
   of them as added, but the paths themselves were not marked as new
   files.  They are now shown as new by default.
* 'git apply' learned the '--intent-to-add' option so that an
   otherwise working-tree-only application of a patch will add new
   paths to the index marked with the 'intent-to-add' bit.
* 'git grep' learned the '--column' option that gives not just the
   line number but the column number of the hit.
* The '-l' option in 'git branch -l' is an unfortunate short-hand for
   '--create-reflog', but many users, both old and new, somehow expect
   it to be something else, perhaps '--list'.  This step warns when '-l'
   is used as a short-hand for '--create-reflog' and warns about the
   future repurposing of the it when it is used.
* The userdiff pattern for .php has been updated.
* The content-transfer-encoding of the message 'git send-email' sends
   out by default was 8bit, which can cause trouble when there is an
   overlong line to bust RFC 5322/2822 limit.  A new option 'auto' to
   automatically switch to quoted-printable when there is such a line
   in the payload has been introduced and is made the default.
* 'git checkout' and 'git worktree add' learned to honor
   checkout.defaultRemote when auto-vivifying a local branch out of a
   remote tracking branch in a repository with multiple remotes that
   have tracking branches that share the same names.
   (merge 8d7b558bae ab/checkout-default-remote later to maint).
* 'git grep' learned the '--only-matching' option.
* 'git rebase --rebase-merges' mode now handles octopus merges as
   well.
* Add a server-side knob to skip commits in exponential/fibbonacci
  stride in an attempt to cover wider swath of history with a smaller
  number of iterations, potentially accepting a larger packfile
  transfer, instead of going back one commit a time during common
  ancestor discovery during the 'git fetch' transaction.
  (merge 42cc7485a2 jt/fetch-negotiator-skipping later to maint).
* A new configuration variable core.usereplacerefs has been added,
  primarily to help server installations that want to ignore the
  replace mechanism altogether.
* Teach 'git tag -s' etc. a few configuration variables (gpg.format
  that can be set to 'openpgp' or 'x509', and gpg.&lt;format&gt;.program
  that is used to specify what program to use to deal with the format)
  to allow x.509 certs with CMS via 'gpgsm' to be used instead of
  openpgp via 'gnupg'.
* Many more strings are prepared for l10n.
* 'git p4 submit' learns to ask its own pre-submit hook if it should
  continue with submitting.
* The test performed at the receiving end of 'git push' to prevent
  bad objects from entering repository can be customized via
  receive.fsck.* configuration variables; we now have gained a
  counterpart to do the same on the 'git fetch' side, with
  fetch.fsck.* configuration variables.
* 'git pull --rebase=interactive' learned 'i' as a short-hand for
  'interactive'.
* 'git instaweb' has been adjusted to run better with newer Apache on
  RedHat based distros.
* 'git range-diff' is a reimplementation of 'git tbdiff' that lets us
  compare individual patches in two iterations of a topic.
* The sideband code learned to optionally paint selected keywords at
  the beginning of incoming lines on the receiving end.
* 'git branch --list' learned to take the default sort order from the
  'branch.sort' configuration variable, just like 'git tag --list'
  pays attention to 'tag.sort'.
* 'git worktree' command learned '--quiet' option to make it less
  verbose.

git 2.18.0:

* improvements to rename detection logic
* When built with more recent cURL, GIT_SSL_VERSION can now
  specify 'tlsv1.3' as its value.
* 'git mergetools' learned talking to guiffy.
* various other workflow improvements and fixes
* performance improvements and other developer visible fixes

Update to git 2.16.4: security fix release

git 2.17.1:

* Submodule 'names' come from the untrusted .gitmodules file, but
  we blindly append them to $GIT_DIR/modules to create our on-disk
  repo paths. This means you can do bad things by putting '../'
  into the name. We now enforce some rules for submodule names
  which will cause Git to ignore these malicious names
  (CVE-2018-11235, bsc#1095219)
* It was possible to trick the code that sanity-checks paths on
  NTFS into reading random piece of memory
  (CVE-2018-11233, bsc#1095218)
* Support on the server side to reject pushes to repositories
  that attempt to create such problematic .gitmodules file etc.
  as tracked contents, to help hosting sites protect their
  customers by preventing malicious contents from spreading.

git 2.17.0:

* 'diff' family of commands learned '--find-object=&lt;object-id&gt;' option
  to limit the findings to changes that involve the named object.
* 'git format-patch' learned to give 72-cols to diffstat, which is
  consistent with other line length limits the subcommand uses for
  its output meant for e-mails.
* The log from 'git daemon' can be redirected with a new option; one
  relevant use case is to send the log to standard error (instead of
  syslog) when running it from inetd.
* 'git rebase' learned to take '--allow-empty-message' option.
* 'git am' has learned the '--quit' option, in addition to the
  existing '--abort' option; having the pair mirrors a few other
  commands like 'rebase' and 'cherry-pick'.
* 'git worktree add' learned to run the post-checkout hook, just like
  'git clone' runs it upon the initial checkout.
* 'git tag' learned an explicit '--edit' option that allows the
  message given via '-m' and '-F' to be further edited.
* 'git fetch --prune-tags' may be used as a handy short-hand for
  getting rid of stale tags that are locally held.
* The new '--show-current-patch' option gives an end-user facing way
  to get the diff being applied when 'git rebase' (and 'git am')
  stops with a conflict.
* 'git add -p' used to offer '/' (look for a matching hunk) as a
  choice, even there was only one hunk, which has been corrected.
  Also the single-key help is now given only for keys that are
  enabled (e.g. help for '/' won't be shown when there is only one
  hunk).
* Since Git 1.7.9, 'git merge' defaulted to --no-ff (i.e. even when
  the side branch being merged is a descendant of the current commit,
  create a merge commit instead of fast-forwarding) when merging a
  tag object.  This was appropriate default for integrators who pull
  signed tags from their downstream contributors, but caused an
  unnecessary merges when used by downstream contributors who
  habitually 'catch up' their topic branches with tagged releases
  from the upstream.  Update 'git merge' to default to --no-ff only
  when merging a tag object that does *not* sit at its usual place in
  refs/tags/ hierarchy, and allow fast-forwarding otherwise, to
  mitigate the problem.
* 'git status' can spend a lot of cycles to compute the relation
  between the current branch and its upstream, which can now be
  disabled with '--no-ahead-behind' option.
* 'git diff' and friends learned funcname patterns for Go language
  source files.
* 'git send-email' learned '--reply-to=&lt;address&gt;' option.
* Funcname pattern used for C# now recognizes 'async' keyword.
* In a way similar to how 'git tag' learned to honor the pager
  setting only in the list mode, 'git config' learned to ignore the
  pager setting when it is used for setting values (i.e. when the
  purpose of the operation is not to 'show').
- Use %license instead of %doc [bsc#1082318]

git 2.16.3:

* 'git status' after moving a path in the working tree (hence
  making it appear 'removed') and then adding with the -N option
  (hence making that appear 'added') detected it as a rename, but
  did not report the  old and new pathnames correctly.
* 'git commit --fixup' did not allow '-m&lt;message&gt;' option to be
  used at the same time; allow it to annotate resulting commit
  with more text.
* When resetting the working tree files recursively, the working
  tree of submodules are now also reset to match.
* Fix for a commented-out code to adjust it to a rather old API
  change around object ID.
* When there are too many changed paths, 'git diff' showed a
  warning message but in the middle of a line.
* The http tracing code, often used to debug connection issues,
  learned to redact potentially sensitive information from its
  output so that it can be more safely sharable.
* Crash fix for a corner case where an error codepath tried to
  unlock what it did not acquire lock on.
* The split-index mode had a few corner case bugs fixed.
* Assorted fixes to 'git daemon'.
* Completion of 'git merge -s&lt;strategy&gt;' (in contrib/) did not
  work well in non-C locale.
* Workaround for segfault with more recent versions of SVN.
* Recently introduced leaks in fsck have been plugged.
* Travis CI integration now builds the executable in 'script'
  phase to follow the established practice, rather than during
  'before_script' phase.  This allows the CI categorize the
  failures better ('failed' is project's fault, 'errored' is
  build environment's).

- Drop superfluous xinetd snippet, no longer used (bsc#1084460)

- Build with asciidoctor for the recent distros (bsc#1075764)

- Move %{?systemd_requires} to daemon subpackage
- Create subpackage for libsecret credential helper.

git 2.16.2:

* An old regression in 'git describe --all $annotated_tag^0' has
  been fixed.
* 'git svn dcommit' did not take into account the fact that a
  svn+ssh:// URL with a username@ (typically used for pushing)
  refers to the same SVN repository without the username@ and
  failed when svn.pushmergeinfo option is set.
* 'git merge -Xours/-Xtheirs' learned to use our/their version
  when resolving a conflicting updates to a symbolic link.
* 'git clone $there $here' is allowed even when here directory
  exists as long as it is an empty directory, but the command
   incorrectly removed it upon a failure of the operation.
* 'git stash -- &lt;pathspec&gt;' incorrectly blew away untracked files
  in the directory that matched the pathspec, which has been
  corrected.
* 'git add -p' was taught to ignore local changes to submodules
  as they do not interfere with the partial addition of regular
  changes anyway.

git 2.16.1:

* 'git clone' segfaulted when cloning a project that happens to
  track two paths that differ only in case on a case insensitive
  filesystem

git 2.16.0 (CVE-2017-15298, bsc#1063412):

* See https://raw.github.com/git/git/master/Documentation/RelNotes/2.16.0.txt

git 2.15.1:

* fix 'auto' column output 
* fixes to moved lines diffing
* documentation updates
* fix use of repositories immediately under the root directory
* improve usage of libsecret
* fixes to various error conditions in git commands

- Rewrite from sysv init to systemd unit file for git-daemon
  (bsc#1069803)

- Replace references to /var/adm/fillup-templates with new 
  %_fillupdir macro (bsc#1069468)

- split off p4 to a subpackage (bsc#1067502)

- Build with the external libsha1detectcoll (bsc#1042644)

git 2.15.0:

* Use of an empty string as a pathspec element that is used for
 'everything matches' is still warned and Git asks users to use a
  more explicit '.' for that instead. Removal scheduled for 2.16
* Git now avoids blindly falling back to '.git' when the setup
  sequence said we are _not_ in Git repository (another corner
  case removed)
* 'branch --set-upstream' was retired, deprecated since 1.8
* many other improvements and updates

git 2.14.3:

* git send-email understands more cc: formats
* fixes so gitk --bisect
* git commit-tree fixed to handle -F file alike
* Prevent segfault in 'git cat-file --textconv'
* Fix function header parsing for HTML
* Various small fixes to user commands and and internal functions

git 2.14.2:

* fixes to color output
* http.{sslkey,sslCert} now interpret '~[username]/' prefix
* fixes to walking of reflogs via 'log -g' and friends
* various fixes to output correctness
* 'git push --recurse-submodules $there HEAD:$target' is now
  propagated down to the submodules
* 'git clone --recurse-submodules --quiet' c$how propagates quiet
  option down to submodules.
* 'git svn --localtime' correctness fixes
* 'git grep -L' and 'git grep --quiet -L' now report same exit code
* fixes to 'git apply' when converting line endings
* Various Perl scripts did not use safe_pipe_capture() instead 
  of backticks, leaving them susceptible to end-user input.
  CVE-2017-14867 bsc#1061041
* 'git cvsserver' no longer is invoked by 'git daemon' by
  default 

git 2.14.1 (bsc#1052481):
* Security fix for CVE-2017-1000117: A malicious third-party can
  give a crafted 'ssh://...' URL to an unsuspecting victim, and
  an attempt to visit the URL can result in any program that
  exists on the victim's machine being executed. Such a URL could
  be placed in the .gitmodules file of a malicious project, and
  an unsuspecting victim could be tricked into running
  'git clone --recurse-submodules' to trigger the vulnerability.
* A 'ssh://...' URL can result in a 'ssh' command line with a
  hostname that begins with a dash '-', which would cause the
  'ssh' command to instead (mis)treat it as an option. This is
  now prevented by forbidding such a hostname (which should not
  impact any real-world usage).
* Similarly, when GIT_PROXY_COMMAND is configured, the command
  is run with host and port that are parsed out from 'ssh://...'
  URL; a poorly written GIT_PROXY_COMMAND could be tricked into
  treating a string that begins with a dash '-' as an option.
  This is now prevented by forbidding such a hostname and port
  number (again, which should not impact any real-world usage).
* In the same spirit, a repository name that begins with a dash
  '-' is also forbidden now.

git 2.14.0:

* Use of an empty string as a pathspec element that is used for
  'everything matches' is deprecated, use '.'
* Avoid blindly falling back to '.git' when the setup sequence
  indicates operation not on a Git repository
* 'indent heuristics' are now the default.
* Builds with pcre2
* Many bug fixes, improvements and updates

git 2.13.4:

* Update the character width tables.
* Fix an alias that contained an uppercase letter
* Progress meter fixes
* git gc concurrency fixes

git 2.13.3:

* various internal bug fixes
* Fix a  regression to 'git rebase -i'
* Correct unaligned 32-bit access in pack-bitmap code
* Tighten error checks for invalid 'git apply' input
* The split index code did not honor core.sharedrepository setting
  correctly
* Fix 'git branch --list' handling of color.branch.local

git 2.13.2:

* 'collision detecting' SHA-1 update for platform fixes
* 'git checkout --recurse-submodules' did not quite work with a
  submodule that itself has submodules.
* The 'run-command' API implementation has been made more robust
  against dead-locking in a threaded environment.
* 'git clean -d' now only cleans ignored files with '-x'
* 'git status --ignored'  did not list ignored and untracked files
  without '-uall'
* 'git pull --rebase --autostash' didn't auto-stash when the local
  history fast-forwards to the upstream.
* 'git describe --contains' gives as much weight to lightweight
  tags as annotated tags
* Fix 'git stash push &lt;pathspec&gt;' from a subdirectory

git 2.13.1:

* Setting 'log.decorate=false' in the configuration file did not
  take effect in v2.13, which has been corrected.
* corrections to documentation and command help output
* garbage collection fixes
* memory leaks fixed
* receive-pack now makes sure that the push certificate records
  the same set of push options used for pushing
* shell completion corrections for git stash
* fix 'git clone --config var=val' with empty strings
* internal efficiency improvements
* Update sha1 collision detection code for big-endian platforms
  and platforms not supporting unaligned fetches

- Fix packaging of documentation

git 2.13.0:

* empty string as a pathspec element for 'everything matches'
  is still warned, for future removal.
* deprecated argument order 'git merge &lt;msg&gt; HEAD &lt;commit&gt;...'
  was removed
* default location '~/.git-credential-cache/socket' for the
  socket used to communicate with the credential-cache daemon 
  moved to '~/.cache/git/credential/socket'.
* now avoid blindly falling back to '.git' when the setup
  sequence indicated otherwise
* many workflow features, improvements and bug fixes
* add a hardened implementation of SHA1 in response to practical
  collision attacks (CVE-2005-4900, bsc#1042640)
* CVE-2017-8386: On a server running git-shell as login shell to
  restrict user to git commands, remote users may have been able
  to have git service programs spawn an interactive pager
  and thus escape the shell restrictions. (bsc#1038395)

Changes in pcre2:

- Include the libraries, development and tools packages.
  
  git uses only libpcre2-8 so far, but this allows further
  application usage of pcre2.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-14"/>
	<updated date="2020-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167890">SUSE bug 1167890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5260">CVE-2020-5260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556859" comment="git-core-2.26.0-27.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556860" comment="libpcre2-16-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556861" comment="libpcre2-32-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556862" comment="libpcre2-8-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556863" comment="libpcre2-posix2-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531814" comment="perl-CGI-4.38-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151439" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_116 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721281" comment="kernel-default 4.4.180-94.116 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719610" comment="kgraft-patch-4_4_180-94_116-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556864" comment="kgraft-patch-4_4_180-94_116-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151440" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_121 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721282" comment="kernel-default 4.4.180-94.121 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719612" comment="kgraft-patch-4_4_180-94_121-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556865" comment="kgraft-patch-4_4_180-94_121-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151441" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_124 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721283" comment="kernel-default 4.4.180-94.124 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719614" comment="kgraft-patch-4_4_180-94_124-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556866" comment="kgraft-patch-4_4_180-94_124-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151442" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556867" comment="kgraft-patch-4_4_180-94_127-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151443" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556868" comment="kgraft-patch-4_4_180-94_130-default-7-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151444" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556869" comment="kgraft-patch-4_4_180-94_135-default-5-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151445" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556870" comment="kgraft-patch-4_4_180-94_138-default-3-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151446" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bsc#1177513).
- CVE-2020-0429: Fixed a memory corruption due to a use after free which could have led to local escalation of privilege with System execution privileges needed (bsc#1176931).
- CVE-2020-1749:  Use ip6_dst_lookup_flow instead of  ip6_dst_lookup (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556871" comment="kgraft-patch-4_4_180-94_141-default-2-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151447" version="1" class="patch">
	<metadata>
		<title>Security update for fwupdate (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<description>
This update for fwupdate fixes the following issues:

- Add SBAT section to EFI images (bsc#1182057)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-08"/>
	<updated date="2021-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538834" comment="fwupdate-0.5-10.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538835" comment="fwupdate-efi-0.5-10.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538836" comment="libfwup0-0.5-10.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151448" version="1" class="patch">
	<metadata>
		<title>Security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1159133" ref_url="https://bugzilla.suse.com/1159133" source="BUGZILLA"/>
		<reference ref_id="1184221" ref_url="https://bugzilla.suse.com/1184221" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12420" ref_url="https://www.suse.com/security/cve/CVE-2019-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-1946" ref_url="https://www.suse.com/security/cve/CVE-2020-1946/" source="CVE"/>
		<description>
This update for spamassassin fixes the following issues:

- spamassassin was updated to version 3.4.5
- CVE-2019-12420: memory leak via crafted messages (bsc#1159133)
- CVE-2020-1946: security update (bsc#1184221)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-12"/>
	<updated date="2021-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159133">SUSE bug 1159133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184221">SUSE bug 1184221</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12420/">CVE-2019-12420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12420">CVE-2019-12420 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1946/">CVE-2020-1946 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1946">CVE-2020-1946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556872" comment="perl-Mail-SpamAssassin-3.4.5-44.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556873" comment="spamassassin-3.4.5-44.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151449" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1180128" ref_url="https://bugzilla.suse.com/1180128" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-3472: XChangeFeedbackControl Integer Underflow Privilege Escalation (bsc#1180128)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180128">SUSE bug 1180128</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3472">CVE-2021-3472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556874" comment="xorg-x11-server-7.6_1.18.3-76.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556875" comment="xorg-x11-server-extra-7.6_1.18.3-76.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151450" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1181256" ref_url="https://bugzilla.suse.com/1181256" source="BUGZILLA"/>
		<reference ref_id="1184532" ref_url="https://bugzilla.suse.com/1184532" source="BUGZILLA"/>
		<reference ref_id="1184533" ref_url="https://bugzilla.suse.com/1184533" source="BUGZILLA"/>
		<reference ref_id="1184534" ref_url="https://bugzilla.suse.com/1184534" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-1252" ref_url="https://www.suse.com/security/cve/CVE-2021-1252/" source="CVE"/>
		<reference ref_id="CVE-2021-1404" ref_url="https://www.suse.com/security/cve/CVE-2021-1404/" source="CVE"/>
		<reference ref_id="CVE-2021-1405" ref_url="https://www.suse.com/security/cve/CVE-2021-1405/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2021-1252: Fix for Excel XLM parser infinite loop. (bsc#1184532)
- CVE-2021-1404: Fix for PDF parser buffer over-read; possible crash. (bsc#1184533)
- CVE-2021-1405: Fix for mail parser NULL-dereference crash. (bsc#1184534)
- Fix errors when scanning files &gt; 4G (bsc#1181256)
- Update clamav.keyring
- Update to 0.103.2
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181256">SUSE bug 1181256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184532">SUSE bug 1184532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184533">SUSE bug 1184533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184534">SUSE bug 1184534</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1252/">CVE-2021-1252 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1252">CVE-2021-1252 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1404/">CVE-2021-1404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1404">CVE-2021-1404 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1405/">CVE-2021-1405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1405">CVE-2021-1405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556876" comment="clamav-0.103.2-33.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151451" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1172383" ref_url="https://bugzilla.suse.com/1172383" source="BUGZILLA"/>
		<reference ref_id="1172384" ref_url="https://bugzilla.suse.com/1172384" source="BUGZILLA"/>
		<reference ref_id="1172385" ref_url="https://bugzilla.suse.com/1172385" source="BUGZILLA"/>
		<reference ref_id="1172386" ref_url="https://bugzilla.suse.com/1172386" source="BUGZILLA"/>
		<reference ref_id="1172478" ref_url="https://bugzilla.suse.com/1172478" source="BUGZILLA"/>
		<reference ref_id="1173612" ref_url="https://bugzilla.suse.com/1173612" source="BUGZILLA"/>
		<reference ref_id="1174386" ref_url="https://bugzilla.suse.com/1174386" source="BUGZILLA"/>
		<reference ref_id="1174641" ref_url="https://bugzilla.suse.com/1174641" source="BUGZILLA"/>
		<reference ref_id="1175441" ref_url="https://bugzilla.suse.com/1175441" source="BUGZILLA"/>
		<reference ref_id="1176673" ref_url="https://bugzilla.suse.com/1176673" source="BUGZILLA"/>
		<reference ref_id="1176682" ref_url="https://bugzilla.suse.com/1176682" source="BUGZILLA"/>
		<reference ref_id="1176684" ref_url="https://bugzilla.suse.com/1176684" source="BUGZILLA"/>
		<reference ref_id="1178174" ref_url="https://bugzilla.suse.com/1178174" source="BUGZILLA"/>
		<reference ref_id="1178934" ref_url="https://bugzilla.suse.com/1178934" source="BUGZILLA"/>
		<reference ref_id="1179467" ref_url="https://bugzilla.suse.com/1179467" source="BUGZILLA"/>
		<reference ref_id="1179468" ref_url="https://bugzilla.suse.com/1179468" source="BUGZILLA"/>
		<reference ref_id="1180523" ref_url="https://bugzilla.suse.com/1180523" source="BUGZILLA"/>
		<reference ref_id="1181108" ref_url="https://bugzilla.suse.com/1181108" source="BUGZILLA"/>
		<reference ref_id="1181639" ref_url="https://bugzilla.suse.com/1181639" source="BUGZILLA"/>
		<reference ref_id="1182137" ref_url="https://bugzilla.suse.com/1182137" source="BUGZILLA"/>
		<reference ref_id="1182425" ref_url="https://bugzilla.suse.com/1182425" source="BUGZILLA"/>
		<reference ref_id="1182577" ref_url="https://bugzilla.suse.com/1182577" source="BUGZILLA"/>
		<reference ref_id="1182968" ref_url="https://bugzilla.suse.com/1182968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11947" ref_url="https://www.suse.com/security/cve/CVE-2020-11947/" source="CVE"/>
		<reference ref_id="CVE-2020-12829" ref_url="https://www.suse.com/security/cve/CVE-2020-12829/" source="CVE"/>
		<reference ref_id="CVE-2020-13361" ref_url="https://www.suse.com/security/cve/CVE-2020-13361/" source="CVE"/>
		<reference ref_id="CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362/" source="CVE"/>
		<reference ref_id="CVE-2020-13659" ref_url="https://www.suse.com/security/cve/CVE-2020-13659/" source="CVE"/>
		<reference ref_id="CVE-2020-13765" ref_url="https://www.suse.com/security/cve/CVE-2020-13765/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-15469" ref_url="https://www.suse.com/security/cve/CVE-2020-15469/" source="CVE"/>
		<reference ref_id="CVE-2020-15863" ref_url="https://www.suse.com/security/cve/CVE-2020-15863/" source="CVE"/>
		<reference ref_id="CVE-2020-16092" ref_url="https://www.suse.com/security/cve/CVE-2020-16092/" source="CVE"/>
		<reference ref_id="CVE-2020-25084" ref_url="https://www.suse.com/security/cve/CVE-2020-25084/" source="CVE"/>
		<reference ref_id="CVE-2020-25624" ref_url="https://www.suse.com/security/cve/CVE-2020-25624/" source="CVE"/>
		<reference ref_id="CVE-2020-25625" ref_url="https://www.suse.com/security/cve/CVE-2020-25625/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-27617" ref_url="https://www.suse.com/security/cve/CVE-2020-27617/" source="CVE"/>
		<reference ref_id="CVE-2020-28916" ref_url="https://www.suse.com/security/cve/CVE-2020-28916/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29443" ref_url="https://www.suse.com/security/cve/CVE-2020-29443/" source="CVE"/>
		<reference ref_id="CVE-2021-20181" ref_url="https://www.suse.com/security/cve/CVE-2021-20181/" source="CVE"/>
		<reference ref_id="CVE-2021-20203" ref_url="https://www.suse.com/security/cve/CVE-2021-20203/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-3416" ref_url="https://www.suse.com/security/cve/CVE-2021-3416/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

- Fix OOB access in sm501 device emulation (CVE-2020-12829, bsc#1172385)
- Fix OOB access possibility in MegaRAID SAS 8708EM2 emulation (CVE-2020-13362 bsc#1172383)
- Fix use-after-free in usb xhci packet handling (CVE-2020-25723, bsc#1178934)
- Fix use-after-free in usb ehci packet handling (CVE-2020-25084, bsc#1176673)
- Fix OOB access in usb hcd-ohci emulation (CVE-2020-25624, bsc#1176682)
- Fix infinite loop (DoS) in usb hcd-ohci emulation (CVE-2020-25625, bsc#1176684)
- Fix guest triggerable assert in shared network handling code (CVE-2020-27617, bsc#1178174)
- Fix infinite loop (DoS) in e1000e device emulation (CVE-2020-28916, bsc#1179468)
- Fix OOB access in atapi emulation (CVE-2020-29443, bsc#1181108)
- Fix null pointer deref. (DoS) in mmio ops (CVE-2020-15469, bsc#1173612)
- Fix infinite loop (DoS) in e1000 device emulation (CVE-2021-20257, bsc#1182577)
- Fix OOB access (stack overflow) in rtl8139 NIC emulation (CVE-2021-3416, bsc#1182968)
- Fix OOB access (stack overflow) in other NIC emulations (CVE-2021-3416)
- Fix OOB access in SLIRP ARP packet processing (CVE-2020-29130, bsc#1179467)
- Fix null pointer dereference possibility (DoS) in MegaRAID SAS 8708EM2 emulation (CVE-2020-13659 bsc#1172386
- Fix OOB access in iscsi (CVE-2020-11947 bsc#1180523)
- Fix OOB access in vmxnet3 emulation (CVE-2021-20203 bsc#1181639)
- Fix buffer overflow in the XGMAC device (CVE-2020-15863, bsc#1174386)
- Fix DoS in packet processing of various emulated NICs (CVE-2020-16092 bsc#1174641)
- Fix OOB access while processing USB packets (CVE-2020-14364 bsc#1175441)
- Fix package scripts to not use hard coded paths for temporary working directories and log files (bsc#1182425)
- Fix potential privilege escalation in virtfs (CVE-2021-20181 bsc#1182137)
- Fix OOB access possibility in ES1370 audio device emulation (CVE-2020-13361 bsc#1172384)
- Fix OOB access in ROM loading (CVE-2020-13765 bsc#1172478)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-16"/>
	<updated date="2021-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172383">SUSE bug 1172383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172384">SUSE bug 1172384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172385">SUSE bug 1172385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172386">SUSE bug 1172386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172478">SUSE bug 1172478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173612">SUSE bug 1173612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174386">SUSE bug 1174386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174641">SUSE bug 1174641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175441">SUSE bug 1175441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176673">SUSE bug 1176673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176682">SUSE bug 1176682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176684">SUSE bug 1176684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178174">SUSE bug 1178174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178934">SUSE bug 1178934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179468">SUSE bug 1179468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180523">SUSE bug 1180523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181108">SUSE bug 1181108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181639">SUSE bug 1181639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182137">SUSE bug 1182137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182425">SUSE bug 1182425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182577">SUSE bug 1182577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182968">SUSE bug 1182968</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11947/">CVE-2020-11947 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11947">CVE-2020-11947 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12829/">CVE-2020-12829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12829">CVE-2020-12829 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13361/">CVE-2020-13361 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13361">CVE-2020-13361 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13362">CVE-2020-13362 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13659/">CVE-2020-13659 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13659">CVE-2020-13659 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13765/">CVE-2020-13765 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13765">CVE-2020-13765 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15469/">CVE-2020-15469 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15469">CVE-2020-15469 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15863/">CVE-2020-15863 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15863">CVE-2020-15863 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16092/">CVE-2020-16092 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16092">CVE-2020-16092 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25084/">CVE-2020-25084 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25084">CVE-2020-25084 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25624/">CVE-2020-25624 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25624">CVE-2020-25624 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25625/">CVE-2020-25625 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25625">CVE-2020-25625 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25723">CVE-2020-25723 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27617/">CVE-2020-27617 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27617">CVE-2020-27617 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28916/">CVE-2020-28916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28916">CVE-2020-28916 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29443/">CVE-2020-29443 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29443">CVE-2020-29443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20181/">CVE-2021-20181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20181">CVE-2021-20181 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20203/">CVE-2021-20203 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20203">CVE-2021-20203 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3416/">CVE-2021-3416 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3416">CVE-2021-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556877" comment="qemu-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555367" comment="qemu-arm-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556878" comment="qemu-block-curl-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556879" comment="qemu-block-iscsi-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555370" comment="qemu-block-rbd-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556880" comment="qemu-block-ssh-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556881" comment="qemu-guest-agent-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538848" comment="qemu-ipxe-1.0.0+-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538849" comment="qemu-kvm-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556882" comment="qemu-lang-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538852" comment="qemu-seabios-1.10.2_0_g5f4c7b1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538853" comment="qemu-sgabios-8-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556883" comment="qemu-tools-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538855" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538856" comment="qemu-x86-2.9.1-6.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151452" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182431" ref_url="https://bugzilla.suse.com/1182431" source="BUGZILLA"/>
		<reference ref_id="1182846" ref_url="https://bugzilla.suse.com/1182846" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-27379" ref_url="https://www.suse.com/security/cve/CVE-2021-27379/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-20257: xen: infinite loop issue in the e1000 NIC emulator (bsc#1182846).
- CVE-2021-27379: Fixed an issue where entries in the IOMMU were not being updated 
  under certain circumstances due to improper backport of XSA-321 (XSA-366, bsc#1182431).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-19"/>
	<updated date="2021-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182431">SUSE bug 1182431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27379/">CVE-2021-27379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27379">CVE-2021-27379 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538857" comment="xen-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538858" comment="xen-doc-html-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538859" comment="xen-libs-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538860" comment="xen-libs-32bit-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538861" comment="xen-tools-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538862" comment="xen-tools-domU-4.9.4_16-3.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151453" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1183936" ref_url="https://bugzilla.suse.com/1183936" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<description>
This update for sudo fixes the following issues:

- L3: Tenable Scan reports sudo is vulnerable to CVE-2021-3156 (bsc#1183936)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183936">SUSE bug 1183936</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3156">CVE-2021-3156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556884" comment="sudo-1.8.20p2-3.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151454" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1184960" ref_url="https://bugzilla.suse.com/1184960" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.10.0 ESR (bsc#1184960)
  * CVE-2021-23994: Out of bound write due to lazy initialization
  * CVE-2021-23995: Use-after-free in Responsive Design Mode
  * CVE-2021-23998: Secure Lock icon could have been spoofed
  * CVE-2021-23961: More internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23999: Blob URLs may have been granted additional privileges
  * CVE-2021-24002: Arbitrary FTP command execution on FTP servers using an encoded URL
  * CVE-2021-29945: Incorrect size computation in WebAssembly JIT could lead to null-reads
  * CVE-2021-29946: Port blocking could be bypassed
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-27"/>
	<updated date="2021-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23961">CVE-2021-23961 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23994">CVE-2021-23994 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23995">CVE-2021-23995 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23998">CVE-2021-23998 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23999">CVE-2021-23999 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24002">CVE-2021-24002 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29945">CVE-2021-29945 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29946">CVE-2021-29946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556885" comment="MozillaFirefox-78.10.0-112.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556886" comment="MozillaFirefox-devel-78.10.0-112.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556887" comment="MozillaFirefox-translations-common-78.10.0-112.57.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151455" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_124 fixes one issue.

The following security issues were fixed:

- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721283" comment="kernel-default 4.4.180-94.124 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719614" comment="kgraft-patch-4_4_180-94_124-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556888" comment="kgraft-patch-4_4_180-94_124-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151456" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes one issue.

The following security issues were fixed:

- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556889" comment="kgraft-patch-4_4_180-94_127-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151457" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes one issue.

The following security issues were fixed:

- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556890" comment="kgraft-patch-4_4_180-94_130-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151458" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes one issue.

The following security issues were fixed:

- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556891" comment="kgraft-patch-4_4_180-94_138-default-4-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151459" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes one issue.

The following security issue was fixed:

- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556892" comment="kgraft-patch-4_4_180-94_141-default-3-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151460" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_116 fixes one issue.

The following security issues were fixed:

- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721281" comment="kernel-default 4.4.180-94.116 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719610" comment="kgraft-patch-4_4_180-94_116-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556893" comment="kgraft-patch-4_4_180-94_116-default-10-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151461" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_121 fixes one issue.

The following security issues were fixed:

- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721282" comment="kernel-default 4.4.180-94.121 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719612" comment="kgraft-patch-4_4_180-94_121-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556894" comment="kgraft-patch-4_4_180-94_121-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151462" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes one issue.

The following security issues were fixed:

- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556895" comment="kgraft-patch-4_4_180-94_135-default-6-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151463" version="1" class="patch">
	<metadata>
		<title>Security update for libnettle (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1183835" ref_url="https://bugzilla.suse.com/1183835" source="BUGZILLA"/>
		<reference ref_id="1184401" ref_url="https://bugzilla.suse.com/1184401" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20305" ref_url="https://www.suse.com/security/cve/CVE-2021-20305/" source="CVE"/>
		<description>
This update for libnettle fixes the following issues:

- CVE-2021-20305: Fixed the multiply function which was being called with out-of-range scalars (bsc#1184401, bsc#1183835).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183835">SUSE bug 1183835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184401">SUSE bug 1184401</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20305/">CVE-2021-20305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20305">CVE-2021-20305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556896" comment="libhogweed2-2.7.1-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538876" comment="libhogweed2-32bit-2.7.1-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556897" comment="libnettle4-2.7.1-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538878" comment="libnettle4-32bit-2.7.1-13.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151464" version="1" class="patch">
	<metadata>
		<title>Security update for gdm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1184456" ref_url="https://bugzilla.suse.com/1184456" source="BUGZILLA"/>
		<description>
This update for gdm fixes the following issues:

-  Avoid the signal SIGTRAP when gdm exits (bsc#1184456).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184456">SUSE bug 1184456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556898" comment="gdm-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538880" comment="gdm-lang-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538881" comment="gdmflexiserver-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556899" comment="libgdm1-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556900" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151465" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182909" ref_url="https://bugzilla.suse.com/1182909" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25329" ref_url="https://www.suse.com/security/cve/CVE-2021-25329/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2021-25329: Complete fix for CVE-2020-9484 (bsc#1182909)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182909">SUSE bug 1182909</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25329/">CVE-2021-25329 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25329">CVE-2021-25329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538884" comment="tomcat-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538885" comment="tomcat-admin-webapps-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538886" comment="tomcat-docs-webapp-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538887" comment="tomcat-el-3_0-api-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538888" comment="tomcat-javadoc-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538889" comment="tomcat-jsp-2_3-api-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538890" comment="tomcat-lib-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538891" comment="tomcat-servlet-3_1-api-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538892" comment="tomcat-webapps-8.0.53-29.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151466" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.25 - OpenJDK 7u291 (January 2021 CPU, bsc#1181239)
  * Security fixes
    + JDK-8247619: Improve Direct Buffering of Characters
  * Import of OpenJDK 7 u291 build 1
    + JDK-8254177: (tz) Upgrade time-zone data to tzdata2020b
    + JDK-8254982: (tz) Upgrade time-zone data to tzdata2020c
    + JDK-8255226: (tz) Upgrade time-zone data to tzdata2020d
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556901" comment="java-1_7_0-openjdk-1.7.0.291-43.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556902" comment="java-1_7_0-openjdk-demo-1.7.0.291-43.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556903" comment="java-1_7_0-openjdk-devel-1.7.0.291-43.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556904" comment="java-1_7_0-openjdk-headless-1.7.0.291-43.47.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151467" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1184161" ref_url="https://bugzilla.suse.com/1184161" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25317" ref_url="https://www.suse.com/security/cve/CVE-2021-25317/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2021-25317: ownership of /var/log/cups could allow privilege escalation from lp user to root via symlink attacks (bsc#1184161)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184161">SUSE bug 1184161</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-25317/">CVE-2021-25317 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25317">CVE-2021-25317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556905" comment="cups-1.7.5-20.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556906" comment="cups-client-1.7.5-20.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556907" comment="cups-libs-1.7.5-20.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538900" comment="cups-libs-32bit-1.7.5-20.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151468" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1181495" ref_url="https://bugzilla.suse.com/1181495" source="BUGZILLA"/>
		<reference ref_id="1185345" ref_url="https://bugzilla.suse.com/1185345" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214/" source="CVE"/>
		<reference ref_id="CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215/" source="CVE"/>
		<reference ref_id="CVE-2021-25216" ref_url="https://www.suse.com/security/cve/CVE-2021-25216/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25214: Fixed a broken inbound incremental zone update (IXFR) which could have caused named to terminate unexpectedly (bsc#1185345).
- CVE-2021-25215: Fixed an assertion check which could have failed while answering queries for DNAME records that required the DNAME to be processed to resolve itself (bsc#1185345).
- CVE-2021-25216: Fixed an issue where policy negotiation can be targeted by a buffer overflow attack (bsc#1185345).
- MD5 warning message using host, dig, nslookup (bind-utils) with FIPS enabled (bsc#1181495).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181495">SUSE bug 1181495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25214">CVE-2021-25214 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25215">CVE-2021-25215 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25216/">CVE-2021-25216 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25216">CVE-2021-25216 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556908" comment="bind-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556909" comment="bind-chrootenv-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538903" comment="bind-doc-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556910" comment="bind-libs-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538905" comment="bind-libs-32bit-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556911" comment="bind-utils-9.9.9P1-63.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151469" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178469" ref_url="https://bugzilla.suse.com/1178469" source="BUGZILLA"/>
		<reference ref_id="1179156" ref_url="https://bugzilla.suse.com/1179156" source="BUGZILLA"/>
		<reference ref_id="1184677" ref_url="https://bugzilla.suse.com/1184677" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-20254: Fixed a buffer overrun in sids_to_unixids() (bsc#1184677).
- Avoid free'ing our own pointer in memcache when memcache_trim attempts to reduce cache size (bsc#1179156).
- Adjust smbcacls '--propagate-inheritance' feature to align with upstream (bsc#1178469).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178469">SUSE bug 1178469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179156">SUSE bug 1179156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184677">SUSE bug 1184677</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20254">CVE-2021-20254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556912" comment="libdcerpc-binding0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538908" comment="libdcerpc-binding0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556913" comment="libdcerpc0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538910" comment="libdcerpc0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556914" comment="libndr-krb5pac0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538912" comment="libndr-krb5pac0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556915" comment="libndr-nbt0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538914" comment="libndr-nbt0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556916" comment="libndr-standard0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538916" comment="libndr-standard0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556917" comment="libndr0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538918" comment="libndr0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556918" comment="libnetapi0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538920" comment="libnetapi0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556919" comment="libsamba-credentials0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538922" comment="libsamba-credentials0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556920" comment="libsamba-errors0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538924" comment="libsamba-errors0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556921" comment="libsamba-hostconfig0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538926" comment="libsamba-hostconfig0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556922" comment="libsamba-passdb0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538928" comment="libsamba-passdb0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556923" comment="libsamba-util0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538930" comment="libsamba-util0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556924" comment="libsamdb0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538932" comment="libsamdb0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556925" comment="libsmbclient0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538934" comment="libsmbclient0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556926" comment="libsmbconf0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538936" comment="libsmbconf0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556927" comment="libsmbldap0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538938" comment="libsmbldap0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556928" comment="libtevent-util0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538940" comment="libtevent-util0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556929" comment="libwbclient0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538942" comment="libwbclient0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556930" comment="samba-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556931" comment="samba-client-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538945" comment="samba-client-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538946" comment="samba-doc-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556932" comment="samba-libs-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538948" comment="samba-libs-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556933" comment="samba-winbind-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538950" comment="samba-winbind-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151470" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1184521" ref_url="https://bugzilla.suse.com/1184521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468/" source="CVE"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2021-3468: avoid infinite loop by handling  HUP event in client_work (bsc#1184521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-03"/>
	<updated date="2021-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184521">SUSE bug 1184521</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3468">CVE-2021-3468 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556934" comment="avahi-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538952" comment="avahi-lang-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556935" comment="avahi-utils-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556936" comment="libavahi-client3-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538955" comment="libavahi-client3-32bit-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556937" comment="libavahi-common3-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538957" comment="libavahi-common3-32bit-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556938" comment="libavahi-core7-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556939" comment="libavahi-glib1-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538960" comment="libavahi-glib1-32bit-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556940" comment="libdns_sd-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538962" comment="libdns_sd-32bit-0.6.32-32.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151471" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="CVE-2020-27619" ref_url="https://www.suse.com/security/cve/CVE-2020-27619/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

Security issues fixed:

- CVE-2020-27619: where Lib/test/multibytecodec_support calls eval() on content retrieved via HTTP. (bsc#1178009)

Other fixes:

- Make sure to close the 'import_failed.map' file after the exception
  has been raised in order to avoid ResourceWarnings when the
  failing import is part of a try...except block
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-17"/>
	<updated date="2021-05-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27619/">CVE-2020-27619 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27619">CVE-2020-27619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556941" comment="libpython3_4m1_0-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556942" comment="python3-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556943" comment="python3-base-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556944" comment="python3-curses-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556945" comment="python3-devel-3.4.10-25.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151472" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1120163" ref_url="https://bugzilla.suse.com/1120163" source="BUGZILLA"/>
		<reference ref_id="1152974" ref_url="https://bugzilla.suse.com/1152974" source="BUGZILLA"/>
		<reference ref_id="1152975" ref_url="https://bugzilla.suse.com/1152975" source="BUGZILLA"/>
		<reference ref_id="1155179" ref_url="https://bugzilla.suse.com/1155179" source="BUGZILLA"/>
		<reference ref_id="1155184" ref_url="https://bugzilla.suse.com/1155184" source="BUGZILLA"/>
		<reference ref_id="1155186" ref_url="https://bugzilla.suse.com/1155186" source="BUGZILLA"/>
		<reference ref_id="1159483" ref_url="https://bugzilla.suse.com/1159483" source="BUGZILLA"/>
		<reference ref_id="1165629" ref_url="https://bugzilla.suse.com/1165629" source="BUGZILLA"/>
		<reference ref_id="1165823" ref_url="https://bugzilla.suse.com/1165823" source="BUGZILLA"/>
		<reference ref_id="1172247" ref_url="https://bugzilla.suse.com/1172247" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1176720" ref_url="https://bugzilla.suse.com/1176720" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177855" ref_url="https://bugzilla.suse.com/1177855" source="BUGZILLA"/>
		<reference ref_id="1177856" ref_url="https://bugzilla.suse.com/1177856" source="BUGZILLA"/>
		<reference ref_id="1178181" ref_url="https://bugzilla.suse.com/1178181" source="BUGZILLA"/>
		<reference ref_id="1178634" ref_url="https://bugzilla.suse.com/1178634" source="BUGZILLA"/>
		<reference ref_id="1179575" ref_url="https://bugzilla.suse.com/1179575" source="BUGZILLA"/>
		<reference ref_id="1182047" ref_url="https://bugzilla.suse.com/1182047" source="BUGZILLA"/>
		<reference ref_id="1182261" ref_url="https://bugzilla.suse.com/1182261" source="BUGZILLA"/>
		<reference ref_id="1182715" ref_url="https://bugzilla.suse.com/1182715" source="BUGZILLA"/>
		<reference ref_id="1182716" ref_url="https://bugzilla.suse.com/1182716" source="BUGZILLA"/>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183022" ref_url="https://bugzilla.suse.com/1183022" source="BUGZILLA"/>
		<reference ref_id="1183069" ref_url="https://bugzilla.suse.com/1183069" source="BUGZILLA"/>
		<reference ref_id="1183593" ref_url="https://bugzilla.suse.com/1183593" source="BUGZILLA"/>
		<reference ref_id="1184120" ref_url="https://bugzilla.suse.com/1184120" source="BUGZILLA"/>
		<reference ref_id="1184167" ref_url="https://bugzilla.suse.com/1184167" source="BUGZILLA"/>
		<reference ref_id="1184168" ref_url="https://bugzilla.suse.com/1184168" source="BUGZILLA"/>
		<reference ref_id="1184194" ref_url="https://bugzilla.suse.com/1184194" source="BUGZILLA"/>
		<reference ref_id="1184198" ref_url="https://bugzilla.suse.com/1184198" source="BUGZILLA"/>
		<reference ref_id="1184208" ref_url="https://bugzilla.suse.com/1184208" source="BUGZILLA"/>
		<reference ref_id="1184211" ref_url="https://bugzilla.suse.com/1184211" source="BUGZILLA"/>
		<reference ref_id="1184391" ref_url="https://bugzilla.suse.com/1184391" source="BUGZILLA"/>
		<reference ref_id="1184393" ref_url="https://bugzilla.suse.com/1184393" source="BUGZILLA"/>
		<reference ref_id="1184397" ref_url="https://bugzilla.suse.com/1184397" source="BUGZILLA"/>
		<reference ref_id="1184509" ref_url="https://bugzilla.suse.com/1184509" source="BUGZILLA"/>
		<reference ref_id="1184583" ref_url="https://bugzilla.suse.com/1184583" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1185248" ref_url="https://bugzilla.suse.com/1185248" source="BUGZILLA"/>
		<reference ref_id="1185555" ref_url="https://bugzilla.suse.com/1185555" source="BUGZILLA"/>
		<reference ref_id="1185556" ref_url="https://bugzilla.suse.com/1185556" source="BUGZILLA"/>
		<reference ref_id="1185557" ref_url="https://bugzilla.suse.com/1185557" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0433" ref_url="https://www.suse.com/security/cve/CVE-2020-0433/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-27673" ref_url="https://www.suse.com/security/cve/CVE-2020-27673/" source="CVE"/>
		<reference ref_id="CVE-2020-36312" ref_url="https://www.suse.com/security/cve/CVE-2020-36312/" source="CVE"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-20219" ref_url="https://www.suse.com/security/cve/CVE-2021-20219/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28038" ref_url="https://www.suse.com/security/cve/CVE-2021-28038/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950/" source="CVE"/>
		<reference ref_id="CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-29264" ref_url="https://www.suse.com/security/cve/CVE-2021-29264/" source="CVE"/>
		<reference ref_id="CVE-2021-29265" ref_url="https://www.suse.com/security/cve/CVE-2021-29265/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-36312: Fixed an issue in virt/kvm/kvm_main.c that had a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure (bnc#1184509).
- CVE-2021-29650: Fixed an issue inside the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).
- CVE-2020-27673: Fixed an issue in Xen where a guest OS users could have caused a denial of service (host OS hang) via a high rate of events to dom0 (bnc#1177411, bnc#1184583).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bnc#1184391).
- CVE-2020-25673: Fixed NFC endless loops caused by repeated llcp_sock_connect() (bsc#1178181).
- CVE-2020-25672: Fixed NFC memory leak in llcp_sock_connect() (bsc#1178181).
- CVE-2020-25671: Fixed NFC refcount leak in llcp_sock_connect() (bsc#1178181).
- CVE-2020-25670: Fixed NFC refcount leak in llcp_sock_bind() (bsc#1178181).
- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h where a 'stall on CPU' could have occured because a retry loop continually finds the same bad inode (bnc#1184194, bnc#1184211).
- CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bnc#1184211).
- CVE-2021-30002: Fixed a memory leak issue when a webcam device exists (bnc#1184120).
- CVE-2021-3483: Fixed a use-after-free bug in nosy_ioctl() (bsc#1184393).
- CVE-2021-20219: Fixed a denial of service vulnerability in drivers/tty/n_tty.c of the Linux kernel. In this flaw a local attacker with a normal user privilege could have delayed the loop and cause a threat to the system availability (bnc#1184397).
- CVE-2021-29265: Fixed an issue in usbip_sockfd_store in drivers/usb/usbip/stub_dev.c that allowed attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status (bnc#1184167).
- CVE-2021-29264: Fixed an issue in drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver that allowed attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled (bnc#1184168).
- CVE-2021-28972: Fixed an issue in drivers/pci/hotplug/rpadlpar_sysfs.c where the RPA PCI Hotplug driver had a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\0' termination (bnc#1184198).
- CVE-2021-28660: Fixed rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c that allowed writing beyond the end of the ssid array (bnc#1183593).
- CVE-2020-0433: Fixed blk_mq_queue_tag_busy_iter of blk-mq-tag.c, where a possible use after free due to improper locking could have happened. This could have led to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1176720).
- CVE-2021-28038: Fixed an issue with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931 (bnc#1183022, bnc#1183069).
- CVE-2021-27365: Fixed an issue inside the iSCSI data structures that does not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bnc#1182715).
- CVE-2021-27363: Fixed an issue with a kernel pointer leak that could have been used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables (bnc#1182716).
- CVE-2021-27364: Fixed an issue in drivers/scsi/scsi_transport_iscsi.c where an unprivileged user can craft Netlink messages (bnc#1182717).
- CVE-2020-1749: Fixed a flaw inside of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality (bnc#1165629).

The following non-security bugs were fixed:

- bluetooth: eliminate the potential race condition when removing the HCI controller (bsc#1184611).
- Btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).
- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).
- btrfs: Cleanup try_flush_qgroup (bsc#1182047).
- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: drop unused parameter qgroup_reserved (bsc#1182261).
- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1182261).
- btrfs: fix qgroup_free wrong num_bytes in btrfs_subvolume_reserve_metadata (bsc#1182261).
- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).
- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).
- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).
- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).
- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).
- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).
- btrfs: qgroup: Do not hold qgroup_ioctl_lock in btrfs_qgroup_inherit() (bsc#1165823).
- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).
- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).
- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).
- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).
- btrfs: qgroup: Fix reserved data space leak if we have multiple reserve calls (bsc#1152975).
- btrfs: qgroup: Fix the wrong target io_tree when freeing reserved data space (bsc#1152974).
- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).
- btrfs: qgroup: mark qgroup inconsistent if we're inherting snapshot to a new qgroup (bsc#1165823).
- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).
- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).
- btrfs: remove unused parameter from btrfs_subvolume_release_metadata (bsc#1182261).
- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).
- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- hv_netvsc: remove ndo_poll_controller (bsc#1185248).
- KVM: Add proper lockdep assertion in I/O bus unregister (bsc#1185555).
- KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU (bsc#1185556).
- KVM: Stop looking for coalesced MMIO zones if the bus is destroyed (bsc#1185557).
- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).
- Xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-18"/>
	<updated date="2021-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120163">SUSE bug 1120163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152974">SUSE bug 1152974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152975">SUSE bug 1152975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155179">SUSE bug 1155179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155184">SUSE bug 1155184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155186">SUSE bug 1155186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159483">SUSE bug 1159483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165629">SUSE bug 1165629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165823">SUSE bug 1165823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172247">SUSE bug 1172247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176720">SUSE bug 1176720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177855">SUSE bug 1177855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177856">SUSE bug 1177856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178634">SUSE bug 1178634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179575">SUSE bug 1179575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182047">SUSE bug 1182047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182261">SUSE bug 1182261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183069">SUSE bug 1183069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183593">SUSE bug 1183593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184120">SUSE bug 1184120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184167">SUSE bug 1184167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184168">SUSE bug 1184168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184194">SUSE bug 1184194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184393">SUSE bug 1184393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184397">SUSE bug 1184397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184509">SUSE bug 1184509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184583">SUSE bug 1184583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185248">SUSE bug 1185248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185555">SUSE bug 1185555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185556">SUSE bug 1185556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185557">SUSE bug 1185557</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0433/">CVE-2020-0433 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0433">CVE-2020-0433 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25670">CVE-2020-25670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25671">CVE-2020-25671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25672">CVE-2020-25672 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25673">CVE-2020-25673 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27673/">CVE-2020-27673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27673">CVE-2020-27673 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36312/">CVE-2020-36312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36312">CVE-2020-36312 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20219/">CVE-2021-20219 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20219">CVE-2021-20219 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28038/">CVE-2021-28038 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28038">CVE-2021-28038 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28660">CVE-2021-28660 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28950">CVE-2021-28950 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28972">CVE-2021-28972 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29264/">CVE-2021-29264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29264">CVE-2021-29264 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29265/">CVE-2021-29265 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29265">CVE-2021-29265 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29650">CVE-2021-29650 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30002">CVE-2021-30002 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3483">CVE-2021-3483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556946" comment="kernel-default-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556947" comment="kernel-default-base-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556948" comment="kernel-default-devel-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556949" comment="kernel-default-kgraft-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538972" comment="kernel-devel-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538973" comment="kernel-macros-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538974" comment="kernel-source-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556950" comment="kernel-syms-4.4.180-94.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556951" comment="kgraft-patch-4_4_180-94_144-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151473" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1185900" ref_url="https://bugzilla.suse.com/1185900" source="BUGZILLA"/>
		<reference ref_id="1185904" ref_url="https://bugzilla.suse.com/1185904" source="BUGZILLA"/>
		<reference ref_id="1185905" ref_url="https://bugzilla.suse.com/1185905" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18804" ref_url="https://www.suse.com/security/cve/CVE-2019-18804/" source="CVE"/>
		<reference ref_id="CVE-2021-32491" ref_url="https://www.suse.com/security/cve/CVE-2021-32491/" source="CVE"/>
		<reference ref_id="CVE-2021-32492" ref_url="https://www.suse.com/security/cve/CVE-2021-32492/" source="CVE"/>
		<reference ref_id="CVE-2021-32493" ref_url="https://www.suse.com/security/cve/CVE-2021-32493/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

Security issues fixed:

- CVE-2021-32491 [bsc#1185900]: Integer overflow in function render() in tools/ddjvu via crafted djvu file
- CVE-2021-32492 [bsc#1185904]: Out of bounds read in function DJVU:DataPool:has_data() via crafted djvu file
- CVE-2021-32493 [bsc#1185905]: Heap buffer overflow in function DJVU:GBitmap:decode() via crafted djvu file
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185900">SUSE bug 1185900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185904">SUSE bug 1185904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185905">SUSE bug 1185905</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18804/">CVE-2019-18804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18804">CVE-2019-18804 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32491/">CVE-2021-32491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32491">CVE-2021-32491 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32492/">CVE-2021-32492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32492">CVE-2021-32492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32493/">CVE-2021-32493 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32493">CVE-2021-32493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556952" comment="libdjvulibre21-3.5.25.3-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151474" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1185833" ref_url="https://bugzilla.suse.com/1185833" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-18032" ref_url="https://www.suse.com/security/cve/CVE-2020-18032/" source="CVE"/>
		<description>
This update for graphviz fixes the following issues:

- CVE-2020-18032: Fixed possible remote code execution via buffer overflow (bsc#1185833).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185833">SUSE bug 1185833</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-18032/">CVE-2020-18032 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18032">CVE-2020-18032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556953" comment="graphviz-2.28.0-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556954" comment="graphviz-gd-2.28.0-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556955" comment="graphviz-gnome-2.28.0-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556956" comment="graphviz-tcl-2.28.0-29.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151475" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="1185698" ref_url="https://bugzilla.suse.com/1185698" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:

CVE-2021-3537: NULL pointer dereference in valid.c:xmlValidBuildAContentModel (bsc#1185698)
- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in entities.c:xmlEncodeEntitiesInternal (bsc#1185409).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185698">SUSE bug 1185698</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">CVE-2021-3537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556957" comment="libxml2-2-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538983" comment="libxml2-2-32bit-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538984" comment="libxml2-doc-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556958" comment="libxml2-tools-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556959" comment="python-libxml2-2.9.4-46.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151476" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1176076" ref_url="https://bugzilla.suse.com/1176076" source="BUGZILLA"/>
		<reference ref_id="1177077" ref_url="https://bugzilla.suse.com/1177077" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681/" source="CVE"/>
		<reference ref_id="CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682/" source="CVE"/>
		<reference ref_id="CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683/" source="CVE"/>
		<reference ref_id="CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684/" source="CVE"/>
		<reference ref_id="CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685/" source="CVE"/>
		<reference ref_id="CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686/" source="CVE"/>
		<reference ref_id="CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687/" source="CVE"/>
		<description>
This update for dnsmasq fixes the following issues:

- bsc#1177077: Fixed DNSpooq vulnerabilities
- CVE-2020-25684, CVE-2020-25685, CVE-2020-25686:
  Fixed multiple Cache Poisoning attacks.
- CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687:
  Fixed multiple potential Heap-based overflows when DNSSEC is
  enabled.

- Retry query to other servers on receipt of SERVFAIL rcode
  (bsc#1176076)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-19"/>
	<updated date="2021-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176076">SUSE bug 1176076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25681">CVE-2020-25681 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25682">CVE-2020-25682 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25683">CVE-2020-25683 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25684">CVE-2020-25684 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25685">CVE-2020-25685 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25686">CVE-2020-25686 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25687">CVE-2020-25687 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556960" comment="dnsmasq-2.78-18.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151477" version="1" class="patch">
	<metadata>
		<title>Security update for flac (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1180099" ref_url="https://bugzilla.suse.com/1180099" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0499" ref_url="https://www.suse.com/security/cve/CVE-2020-0499/" source="CVE"/>
		<description>
This update for flac fixes the following issues:

- CVE-2020-0499: Fixed an out-of-bounds access (bsc#1180099).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180099">SUSE bug 1180099</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0499/">CVE-2020-0499 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0499">CVE-2020-0499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556961" comment="libFLAC++6-1.3.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556962" comment="libFLAC8-1.3.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531827" comment="libFLAC8-32bit-1.3.0-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151478" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1180405" ref_url="https://bugzilla.suse.com/1180405" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24386" ref_url="https://www.suse.com/security/cve/CVE-2020-24386/" source="CVE"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2020-24386: Fixed an issue with IMAP hibernation that allowed users to access other users' emails (bsc#1180405).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180405">SUSE bug 1180405</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24386/">CVE-2020-24386 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24386">CVE-2020-24386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556963" comment="dovecot22-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556964" comment="dovecot22-backend-mysql-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556965" comment="dovecot22-backend-pgsql-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556966" comment="dovecot22-backend-sqlite-2.2.31-19.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151479" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1186253" ref_url="https://bugzilla.suse.com/1186253" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3500" ref_url="https://www.suse.com/security/cve/CVE-2021-3500/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3500: Stack overflow in function DJVU:DjVuDocument:get_djvu_file() via crafted djvu file (bsc#1186253)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-31"/>
	<updated date="2021-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186253">SUSE bug 1186253</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3500/">CVE-2021-3500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3500">CVE-2021-3500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556967" comment="libdjvulibre21-3.5.25.3-5.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151480" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1186382" ref_url="https://bugzilla.suse.com/1186382" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217/" source="CVE"/>
		<description>
This update for dhcp fixes the following issues:

- CVE-2021-25217: A buffer overrun in lease file parsing code can be used to exploit a common vulnerability shared by dhcpd and dhclient (bsc#1186382)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-01"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186382">SUSE bug 1186382</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25217">CVE-2021-25217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556968" comment="dhcp-4.3.3-10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556969" comment="dhcp-client-4.3.3-10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556970" comment="dhcp-relay-4.3.3-10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556971" comment="dhcp-server-4.3.3-10.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151481" version="1" class="patch">
	<metadata>
		<title>Security update for libwebp (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1185652" ref_url="https://bugzilla.suse.com/1185652" source="BUGZILLA"/>
		<reference ref_id="1185654" ref_url="https://bugzilla.suse.com/1185654" source="BUGZILLA"/>
		<reference ref_id="1185673" ref_url="https://bugzilla.suse.com/1185673" source="BUGZILLA"/>
		<reference ref_id="1185674" ref_url="https://bugzilla.suse.com/1185674" source="BUGZILLA"/>
		<reference ref_id="1185685" ref_url="https://bugzilla.suse.com/1185685" source="BUGZILLA"/>
		<reference ref_id="1185686" ref_url="https://bugzilla.suse.com/1185686" source="BUGZILLA"/>
		<reference ref_id="1185690" ref_url="https://bugzilla.suse.com/1185690" source="BUGZILLA"/>
		<reference ref_id="1185691" ref_url="https://bugzilla.suse.com/1185691" source="BUGZILLA"/>
		<reference ref_id="1186247" ref_url="https://bugzilla.suse.com/1186247" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25009" ref_url="https://www.suse.com/security/cve/CVE-2018-25009/" source="CVE"/>
		<reference ref_id="CVE-2018-25010" ref_url="https://www.suse.com/security/cve/CVE-2018-25010/" source="CVE"/>
		<reference ref_id="CVE-2018-25011" ref_url="https://www.suse.com/security/cve/CVE-2018-25011/" source="CVE"/>
		<reference ref_id="CVE-2018-25012" ref_url="https://www.suse.com/security/cve/CVE-2018-25012/" source="CVE"/>
		<reference ref_id="CVE-2018-25013" ref_url="https://www.suse.com/security/cve/CVE-2018-25013/" source="CVE"/>
		<reference ref_id="CVE-2020-36329" ref_url="https://www.suse.com/security/cve/CVE-2020-36329/" source="CVE"/>
		<reference ref_id="CVE-2020-36330" ref_url="https://www.suse.com/security/cve/CVE-2020-36330/" source="CVE"/>
		<reference ref_id="CVE-2020-36331" ref_url="https://www.suse.com/security/cve/CVE-2020-36331/" source="CVE"/>
		<reference ref_id="CVE-2020-36332" ref_url="https://www.suse.com/security/cve/CVE-2020-36332/" source="CVE"/>
		<description>
This update for libwebp fixes the following issues:

- CVE-2018-25010: Fixed heap-based buffer overflow in ApplyFilter() (bsc#1185685).
- CVE-2020-36330: Fixed heap-based buffer overflow in ChunkVerifyAndAssign() (bsc#1185691).
- CVE-2020-36332: Fixed extreme memory allocation when reading a file (bsc#1185674).
- CVE-2020-36329: Fixed use-after-free in EmitFancyRGB() (bsc#1185652).
- CVE-2018-25012: Fixed heap-based buffer overflow in GetLE24() (bsc#1185690).
- CVE-2018-25013: Fixed heap-based buffer overflow in ShiftBytes() (bsc#1185654).
- CVE-2020-36331: Fixed heap-based buffer overflow in ChunkAssignData() (bsc#1185686).
- CVE-2018-25009: Fixed heap-based buffer overflow in GetLE16() (bsc#1185673).
- CVE-2018-25011: Fixed fail on multiple image chunks (bsc#1186247).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-02"/>
	<updated date="2021-06-02"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185652">SUSE bug 1185652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185654">SUSE bug 1185654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185673">SUSE bug 1185673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185674">SUSE bug 1185674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185685">SUSE bug 1185685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185686">SUSE bug 1185686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185690">SUSE bug 1185690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185691">SUSE bug 1185691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186247">SUSE bug 1186247</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25009/">CVE-2018-25009 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25009">CVE-2018-25009 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25010/">CVE-2018-25010 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25010">CVE-2018-25010 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25011/">CVE-2018-25011 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25011">CVE-2018-25011 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25012/">CVE-2018-25012 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25012">CVE-2018-25012 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25013/">CVE-2018-25013 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25013">CVE-2018-25013 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36329/">CVE-2020-36329 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36329">CVE-2020-36329 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36330/">CVE-2020-36330 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36330">CVE-2020-36330 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36331/">CVE-2020-36331 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36331">CVE-2020-36331 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36332/">CVE-2020-36332 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36332">CVE-2020-36332 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556972" comment="libwebp5-0.4.3-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538993" comment="libwebp5-32bit-0.4.3-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556973" comment="libwebpdemux1-0.4.3-4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151482" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1186497" ref_url="https://bugzilla.suse.com/1186497" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3560" ref_url="https://www.suse.com/security/cve/CVE-2021-3560/" source="CVE"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-3560: Fixed a local privilege escalation using polkit_system_bus_name_get_creds_sync() (bsc#1186497).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-03"/>
	<updated date="2021-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186497">SUSE bug 1186497</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3560/">CVE-2021-3560 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3560">CVE-2021-3560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556974" comment="libpolkit0-0.113-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556975" comment="polkit-0.113-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556976" comment="typelib-1_0-Polkit-1_0-0.113-5.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151483" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="1186235" ref_url="https://bugzilla.suse.com/1186235" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- Fix a kernel warning during sysfs read (bsc#1186235)
- CVE-2020-36322: An issue was discovered in the FUSE filesystem implementation in the Linux kernel aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: BPF JIT compilers in the Linux kernel have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186235">SUSE bug 1186235</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556977" comment="kgraft-patch-4_4_180-94_135-default-7-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151484" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="1186235" ref_url="https://bugzilla.suse.com/1186235" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

- Fix a kernel warning during sysfs read (bsc#1186235)
- CVE-2020-36322: An issue was discovered in the FUSE filesystem implementation in the Linux kernel aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: BPF JIT compilers in the Linux kernel have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186235">SUSE bug 1186235</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556978" comment="kgraft-patch-4_4_180-94_130-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151485" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="1186235" ref_url="https://bugzilla.suse.com/1186235" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.

The following security issues were fixed:

- Fix a kernel warning during sysfs read (bsc#1186235)
- CVE-2020-36322: An issue was discovered in the FUSE filesystem implementation in the Linux kernel aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: BPF JIT compilers in the Linux kernel have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186235">SUSE bug 1186235</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556979" comment="kgraft-patch-4_4_180-94_127-default-10-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151486" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="1186235" ref_url="https://bugzilla.suse.com/1186235" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_124 fixes several issues.

The following security issues were fixed:

- Fix a kernel warning during sysfs read (bsc#1186235)
- CVE-2020-36322: An issue was discovered in the FUSE filesystem implementation in the Linux kernel aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: BPF JIT compilers in the Linux kernel have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186235">SUSE bug 1186235</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721283" comment="kernel-default 4.4.180-94.124 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719614" comment="kgraft-patch-4_4_180-94_124-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556980" comment="kgraft-patch-4_4_180-94_124-default-10-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151487" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="1186235" ref_url="https://bugzilla.suse.com/1186235" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_121 fixes several issues.

The following security issues were fixed:

- Fix a kernel warning during sysfs read (bsc#1186235)
- CVE-2020-36322: An issue was discovered in the FUSE filesystem implementation in the Linux kernel aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: BPF JIT compilers in the Linux kernel have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186235">SUSE bug 1186235</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721282" comment="kernel-default 4.4.180-94.121 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719612" comment="kgraft-patch-4_4_180-94_121-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556981" comment="kgraft-patch-4_4_180-94_121-default-10-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151488" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.

The following security issues were fixed:

- CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556982" comment="kgraft-patch-4_4_180-94_141-default-4-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151489" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following security issues were fixed:

- CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009556983" comment="kgraft-patch-4_4_180-94_138-default-5-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151490" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1181255" ref_url="https://bugzilla.suse.com/1181255" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<description>
This update for gstreamer-plugins-bad fixes the following issues:

- CVE-2021-3185: Fixed buffer overflow in gst_h264_slice_parse_dec_ref_pic_marking (bsc#1181255).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-07"/>
	<updated date="2021-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181255">SUSE bug 1181255</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3185">CVE-2021-3185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556984" comment="gstreamer-plugins-bad-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539006" comment="gstreamer-plugins-bad-lang-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556985" comment="libgstadaptivedemux-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556986" comment="libgstbadaudio-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556987" comment="libgstbadbase-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556988" comment="libgstbadvideo-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556989" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556990" comment="libgstcodecparsers-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556991" comment="libgstgl-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556992" comment="libgstmpegts-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556993" comment="libgstphotography-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556994" comment="libgsturidownloader-1_0-0-1.8.3-18.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151491" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1185633" ref_url="https://bugzilla.suse.com/1185633" source="BUGZILLA"/>
		<reference ref_id="1186696" ref_url="https://bugzilla.suse.com/1186696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29951" ref_url="https://www.suse.com/security/cve/CVE-2021-29951/" source="CVE"/>
		<reference ref_id="CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.11.0 ESR (bsc#1186696)

  * CVE-2021-29964: Out of bounds-read when parsing a `WM_COPYDATA` message
  * CVE-2021-29967: Memory safety bugs fixed in Firefox
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185633">SUSE bug 1185633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186696">SUSE bug 1186696</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29951/">CVE-2021-29951 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29951">CVE-2021-29951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29964">CVE-2021-29964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29967">CVE-2021-29967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556995" comment="MozillaFirefox-78.11.0-112.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556996" comment="MozillaFirefox-devel-78.11.0-112.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556997" comment="MozillaFirefox-translations-common-78.11.0-112.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151492" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1186643" ref_url="https://bugzilla.suse.com/1186643" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<description>
This update for libX11 fixes the following issues:

- Regression in the fix for CVE-2021-31535, causing segfaults for xforms applications like fdesign (bsc#1186643)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186643">SUSE bug 1186643</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31535">CVE-2021-31535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009556998" comment="libX11-6-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539021" comment="libX11-6-32bit-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539022" comment="libX11-data-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009556999" comment="libX11-xcb1-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539024" comment="libX11-xcb1-32bit-1.6.2-12.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151493" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1094725" ref_url="https://bugzilla.suse.com/1094725" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1172380" ref_url="https://bugzilla.suse.com/1172380" source="BUGZILLA"/>
		<reference ref_id="1172382" ref_url="https://bugzilla.suse.com/1172382" source="BUGZILLA"/>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1178683" ref_url="https://bugzilla.suse.com/1178683" source="BUGZILLA"/>
		<reference ref_id="1178935" ref_url="https://bugzilla.suse.com/1178935" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1181933" ref_url="https://bugzilla.suse.com/1181933" source="BUGZILLA"/>
		<reference ref_id="1182846" ref_url="https://bugzilla.suse.com/1182846" source="BUGZILLA"/>
		<reference ref_id="1182975" ref_url="https://bugzilla.suse.com/1182975" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756/" source="CVE"/>
		<reference ref_id="CVE-2020-13754" ref_url="https://www.suse.com/security/cve/CVE-2020-13754/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-25707" ref_url="https://www.suse.com/security/cve/CVE-2020-25707/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="CVE-2021-20221" ref_url="https://www.suse.com/security/cve/CVE-2021-20221/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-3419" ref_url="https://www.suse.com/security/cve/CVE-2021-3419/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

- Fix OOB access during mmio operations (CVE-2020-13754, bsc#1172382)
- Fix out-of-bounds read information disclosure in icmp6_send_echoreply (CVE-2020-10756, bsc#1172380)
- Fix out-of-bound heap buffer access via an interrupt ID field (CVE-2021-20221, bsc#1181933)
- For the record, these issues are fixed in this package already.
  Most are alternate references to previously mentioned issues:
  (CVE-2019-15890, bsc#1149813, CVE-2020-8608, bsc#1163019,
  CVE-2020-14364, bsc#1175534, CVE-2020-25707, bsc#1178683,
  CVE-2020-25723, bsc#1178935, CVE-2020-29130, bsc#1179477,
  CVE-2021-20257, bsc#1182846, CVE-2021-3419, bsc#1182975,
  bsc#1094725)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1094725">SUSE bug 1094725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172380">SUSE bug 1172380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172382">SUSE bug 1172382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178683">SUSE bug 1178683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178935">SUSE bug 1178935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181933">SUSE bug 1181933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182975">SUSE bug 1182975</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10756">CVE-2020-10756 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13754/">CVE-2020-13754 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13754">CVE-2020-13754 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25707/">CVE-2020-25707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-25707">CVE-2020-25707 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25723">CVE-2020-25723 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20221/">CVE-2021-20221 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20221">CVE-2021-20221 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3419/">CVE-2021-3419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3419">CVE-2021-3419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557000" comment="qemu-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555503" comment="qemu-arm-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557001" comment="qemu-block-curl-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557002" comment="qemu-block-iscsi-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555506" comment="qemu-block-rbd-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557003" comment="qemu-block-ssh-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557004" comment="qemu-guest-agent-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539031" comment="qemu-ipxe-1.0.0+-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539032" comment="qemu-kvm-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557005" comment="qemu-lang-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539035" comment="qemu-seabios-1.10.2_0_g5f4c7b1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539036" comment="qemu-sgabios-8-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557006" comment="qemu-tools-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539038" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539039" comment="qemu-x86-2.9.1-6.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151494" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 75 [bsc#1180063, bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14782 CVE-2020-14781
  CVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class Libraries:
    - Z/OS specific C function send_file is changing the file pointer position
  * Security:
    - Add the new oracle signer certificate
    - Certificate parsing error
    - JVM memory growth can be caused by the IBMPKCS11IMPL crypto provider
    - Remove check for websphere signed jars
    - sessionid.hashcode generates too many collisions
    - The Java 8 IBM certpath provider does not honor the user
      specified system property for CLR connect timeout
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531832" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531834" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531835" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151495" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1181686" ref_url="https://bugzilla.suse.com/1181686" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20201" ref_url="https://www.suse.com/security/cve/CVE-2021-20201/" source="CVE"/>
		<description>
This update for spice fixes the following issues:

- CVE-2021-20201: client initiated renegotiation causing denial of service (bsc#1181686)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181686">SUSE bug 1181686</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20201/">CVE-2021-20201 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20201">CVE-2021-20201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557007" comment="libspice-server1-0.12.8-18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151496" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1179833" ref_url="https://bugzilla.suse.com/1179833" source="BUGZILLA"/>
		<reference ref_id="1179836" ref_url="https://bugzilla.suse.com/1179836" source="BUGZILLA"/>
		<reference ref_id="1179837" ref_url="https://bugzilla.suse.com/1179837" source="BUGZILLA"/>
		<reference ref_id="1179839" ref_url="https://bugzilla.suse.com/1179839" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489/" source="CVE"/>
		<reference ref_id="CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511/" source="CVE"/>
		<reference ref_id="CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512/" source="CVE"/>
		<reference ref_id="CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20210608 release.

- CVE-2020-24513: A domain bypass transient execution vulnerability was discovered on some Intel Atom processors that use a micro-architectural incident channel. (INTEL-SA-00465 bsc#1179833)

  See also: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html

- CVE-2020-24511: The IBRS feature to mitigate Spectre variant 2 transient execution side channel vulnerabilities may not fully prevent non-root (guest) branches from controlling the branch predictions of the root (host) (INTEL-SA-00464 bsc#1179836)

  See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html)

- CVE-2020-24512: Fixed trivial data value cache-lines such as all-zero value cache-lines may lead to changes in cache-allocation or write-back behavior for such cache-lines (bsc#1179837 INTEL-SA-00464)

  See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html)

- CVE-2020-24489: Fixed Intel VT-d device pass through potential local privilege escalation (INTEL-SA-00442 bsc#1179839)

  See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html

Other fixes:

- Update for functional issues. Refer to [Third Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780)for details.
- Update for functional issues. Refer to [Second Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
- Update for functional issues. Refer to [Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
- Update for functional issues. Refer to [Intel Xeon Processor D-1500, D-1500 NS and D-1600 NS Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-d-1500-specification-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon E7-8800 and E7-4800 v3 Processor Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e7-v3-spec-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
- Update for functional issues. Refer to [10th Gen Intel Core Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
- Update for functional issues. Refer to [8th and 9th Gen Intel Core Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
- Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
- Update for functional issues. Refer to [6th Gen Intel Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
- Update for functional issues. Refer to [Intel Xeon E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

- New platforms:

| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| CLX-SP         | A0       | 06-55-05/b7 |          | 03000010 | Xeon Scalable Gen2
| ICX-SP         | C0       | 06-6a-05/87 |          | 0c0002f0 | Xeon Scalable Gen3
| ICX-SP         | D0       | 06-6a-06/87 |          | 0d0002a0 | Xeon Scalable Gen3
| SNR            | B0       | 06-86-04/01 |          | 0b00000f | Atom P59xxB
| SNR            | B1       | 06-86-05/01 |          | 0b00000f | Atom P59xxB
| TGL            | B1       | 06-8c-01/80 |          | 00000088 | Core Gen11 Mobile
| TGL-R          | C0       | 06-8c-02/c2 |          | 00000016 | Core Gen11 Mobile
| TGL-H          | R0       | 06-8d-01/c2 |          | 0000002c | Core Gen11 Mobile
| EHL            | B1       | 06-96-01/01 |          | 00000011 | Pentium J6426/N6415, Celeron J6412/J6413/N6210/N6211, Atom x6000E
| JSL            | A0/A1    | 06-9c-00/01 |          | 0000001d | Pentium N6000/N6005, Celeron N4500/N4505/N5100/N5105
| RKL-S          | B0       | 06-a7-01/02 |          | 00000040 | Core Gen11

- Updated platforms:

| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000044 | 00000046 | Core Gen4 X series; Xeon E5 v3
| HSX-EX         | E0       | 06-3f-04/80 | 00000016 | 00000019 | Xeon E7 v3
| SKL-U/Y        | D0       | 06-4e-03/c0 | 000000e2 | 000000ea | Core Gen6 Mobile
| SKL-U23e       | K1       | 06-4e-03/c0 | 000000e2 | 000000ea | Core Gen6 Mobile
| BDX-ML         | B0/M0/R0 | 06-4f-01/ef | 0b000038 | 0b00003e | Xeon E5/E7 v4; Core i7-69xx/68xx
| SKX-SP         | B1       | 06-55-03/97 | 01000159 | 0100015b | Xeon Scalable
| SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006a0a | 02006b06 | Xeon Scalable
| SKX-D          | M1       | 06-55-04/b7 | 02006a0a | 02006b06 | Xeon D-21xx
| CLX-SP         | B0       | 06-55-06/bf | 04003006 | 04003102 | Xeon Scalable Gen2
| CLX-SP         | B1       | 06-55-07/bf | 05003006 | 05003102 | Xeon Scalable Gen2
| CPX-SP         | A1       | 06-55-0b/bf | 0700001e | 07002302 | Xeon Scalable Gen3
| BDX-DE         | V2/V3    | 06-56-03/10 | 07000019 | 0700001b | Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
| BDX-DE         | Y0       | 06-56-04/10 | 0f000017 | 0f000019 | Xeon D-1557/59/67/71/77/81/87
| BDX-NS         | A0       | 06-56-05/10 | 0e00000f | 0e000012 | Xeon D-1513N/23/33/43/53
| APL            | D0       | 06-5c-09/03 | 00000040 | 00000044 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
| APL            | E0       | 06-5c-0a/03 | 0000001e | 00000020 | Atom x5-E39xx
| SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000e2 | 000000ea | Core Gen6; Xeon E3 v5
| DNV            | B0       | 06-5f-01/01 | 0000002e | 00000034 | Atom C Series
| GLK            | B0       | 06-7a-01/01 | 00000034 | 00000036 | Pentium Silver N/J5xxx, Celeron N/J4xxx
| GKL-R          | R0       | 06-7a-08/01 | 00000018 | 0000001a | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
| ICL-U/Y        | D1       | 06-7e-05/80 | 000000a0 | 000000a6 | Core Gen10 Mobile
| LKF            | B2/B3    | 06-8a-01/10 | 00000028 | 0000002a | Core w/Hybrid Technology
| AML-Y22        | H0       | 06-8e-09/10 | 000000de | 000000ea | Core Gen8 Mobile
| KBL-U/Y        | H0       | 06-8e-09/c0 | 000000de | 000000ea | Core Gen7 Mobile
| CFL-U43e       | D0       | 06-8e-0a/c0 | 000000e0 | 000000ea | Core Gen8 Mobile
| WHL-U          | W0       | 06-8e-0b/d0 | 000000de | 000000ea | Core Gen8 Mobile
| AML-Y42        | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen10 Mobile
| CML-Y42        | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen10 Mobile
| WHL-U          | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen8 Mobile
| KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000de | 000000ea | Core Gen7; Xeon E3 v6
| CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000de | 000000ea | Core Gen8 Desktop, Mobile, Xeon E
| CFL-S          | B0       | 06-9e-0b/02 | 000000de | 000000ea | Core Gen8
| CFL-H/S        | P0       | 06-9e-0c/22 | 000000de | 000000ea | Core Gen9
| CFL-H          | R0       | 06-9e-0d/22 | 000000de | 000000ea | Core Gen9 Mobile
| CML-H          | R1       | 06-a5-02/20 | 000000e0 | 000000ea | Core Gen10 Mobile
| CML-S62        | G1       | 06-a5-03/22 | 000000e0 | 000000ea | Core Gen10
| CML-S102       | Q0       | 06-a5-05/22 | 000000e0 | 000000ec | Core Gen10
| CML-U62        | A0       | 06-a6-00/80 | 000000e0 | 000000e8 | Core Gen10 Mobile
| CML-U62 V2     | K0       | 06-a6-01/80 | 000000e0 | 000000ea | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-10"/>
	<updated date="2021-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179833">SUSE bug 1179833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179836">SUSE bug 1179836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179837">SUSE bug 1179837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179839">SUSE bug 1179839</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24489">CVE-2020-24489 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24511">CVE-2020-24511 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24512">CVE-2020-24512 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24513">CVE-2020-24513 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539041" comment="ucode-intel-20210525-13.90.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151497" version="1" class="patch">
	<metadata>
		<title>Security update for caribou (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1186617" ref_url="https://bugzilla.suse.com/1186617" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3567" ref_url="https://www.suse.com/security/cve/CVE-2021-3567/" source="CVE"/>
		<description>
This update for caribou fixes the following issues:

Security issue fixed:

- CVE-2021-3567: Fixed a segfault when attempting to use shifted characters (bsc#1186617).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-10"/>
	<updated date="2021-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186617">SUSE bug 1186617</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3567/">CVE-2021-3567 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3567">CVE-2021-3567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557008" comment="caribou-common-0.4.21-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557009" comment="libcaribou0-0.4.21-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557010" comment="typelib-1_0-Caribou-1_0-0.4.21-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151498" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1184016" ref_url="https://bugzilla.suse.com/1184016" source="BUGZILLA"/>
		<description>
This update for freeradius-server fixes the following issues:

- Do not log passwords in logfiles (bsc#1184016)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-11"/>
	<updated date="2021-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184016">SUSE bug 1184016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557011" comment="freeradius-server-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557012" comment="freeradius-server-doc-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557013" comment="freeradius-server-krb5-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557014" comment="freeradius-server-ldap-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557015" comment="freeradius-server-libs-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557016" comment="freeradius-server-mysql-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557017" comment="freeradius-server-perl-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557018" comment="freeradius-server-postgresql-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557019" comment="freeradius-server-python-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557020" comment="freeradius-server-sqlite-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557021" comment="freeradius-server-utils-3.0.15-2.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151499" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u292 (icedtea 3.19.0).
- CVE-2021-2161: Fixed incomplete enforcement of JAR signing disabled algorithms (bsc#1185055).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-15"/>
	<updated date="2021-06-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557022" comment="java-1_8_0-openjdk-1.8.0.292-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557023" comment="java-1_8_0-openjdk-demo-1.8.0.292-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557024" comment="java-1_8_0-openjdk-devel-1.8.0.292-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557025" comment="java-1_8_0-openjdk-headless-1.8.0.292-27.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151500" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1179103" ref_url="https://bugzilla.suse.com/1179103" source="BUGZILLA"/>
		<reference ref_id="1179202" ref_url="https://bugzilla.suse.com/1179202" source="BUGZILLA"/>
		<reference ref_id="1179208" ref_url="https://bugzilla.suse.com/1179208" source="BUGZILLA"/>
		<reference ref_id="1179212" ref_url="https://bugzilla.suse.com/1179212" source="BUGZILLA"/>
		<reference ref_id="1179223" ref_url="https://bugzilla.suse.com/1179223" source="BUGZILLA"/>
		<reference ref_id="1179240" ref_url="https://bugzilla.suse.com/1179240" source="BUGZILLA"/>
		<reference ref_id="1179244" ref_url="https://bugzilla.suse.com/1179244" source="BUGZILLA"/>
		<reference ref_id="1179260" ref_url="https://bugzilla.suse.com/1179260" source="BUGZILLA"/>
		<reference ref_id="1179268" ref_url="https://bugzilla.suse.com/1179268" source="BUGZILLA"/>
		<reference ref_id="1179269" ref_url="https://bugzilla.suse.com/1179269" source="BUGZILLA"/>
		<reference ref_id="1179278" ref_url="https://bugzilla.suse.com/1179278" source="BUGZILLA"/>
		<reference ref_id="1179281" ref_url="https://bugzilla.suse.com/1179281" source="BUGZILLA"/>
		<reference ref_id="1179285" ref_url="https://bugzilla.suse.com/1179285" source="BUGZILLA"/>
		<reference ref_id="1179311" ref_url="https://bugzilla.suse.com/1179311" source="BUGZILLA"/>
		<reference ref_id="1179312" ref_url="https://bugzilla.suse.com/1179312" source="BUGZILLA"/>
		<reference ref_id="1179313" ref_url="https://bugzilla.suse.com/1179313" source="BUGZILLA"/>
		<reference ref_id="1179315" ref_url="https://bugzilla.suse.com/1179315" source="BUGZILLA"/>
		<reference ref_id="1179317" ref_url="https://bugzilla.suse.com/1179317" source="BUGZILLA"/>
		<reference ref_id="1179321" ref_url="https://bugzilla.suse.com/1179321" source="BUGZILLA"/>
		<reference ref_id="1179322" ref_url="https://bugzilla.suse.com/1179322" source="BUGZILLA"/>
		<reference ref_id="1179327" ref_url="https://bugzilla.suse.com/1179327" source="BUGZILLA"/>
		<reference ref_id="1179333" ref_url="https://bugzilla.suse.com/1179333" source="BUGZILLA"/>
		<reference ref_id="1179336" ref_url="https://bugzilla.suse.com/1179336" source="BUGZILLA"/>
		<reference ref_id="1179338" ref_url="https://bugzilla.suse.com/1179338" source="BUGZILLA"/>
		<reference ref_id="1179339" ref_url="https://bugzilla.suse.com/1179339" source="BUGZILLA"/>
		<reference ref_id="1179343" ref_url="https://bugzilla.suse.com/1179343" source="BUGZILLA"/>
		<reference ref_id="1179345" ref_url="https://bugzilla.suse.com/1179345" source="BUGZILLA"/>
		<reference ref_id="1179346" ref_url="https://bugzilla.suse.com/1179346" source="BUGZILLA"/>
		<reference ref_id="1179347" ref_url="https://bugzilla.suse.com/1179347" source="BUGZILLA"/>
		<reference ref_id="1179361" ref_url="https://bugzilla.suse.com/1179361" source="BUGZILLA"/>
		<reference ref_id="1179362" ref_url="https://bugzilla.suse.com/1179362" source="BUGZILLA"/>
		<reference ref_id="1179397" ref_url="https://bugzilla.suse.com/1179397" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667/" source="CVE"/>
		<reference ref_id="CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664/" source="CVE"/>
		<reference ref_id="CVE-2020-25665" ref_url="https://www.suse.com/security/cve/CVE-2020-25665/" source="CVE"/>
		<reference ref_id="CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666/" source="CVE"/>
		<reference ref_id="CVE-2020-25674" ref_url="https://www.suse.com/security/cve/CVE-2020-25674/" source="CVE"/>
		<reference ref_id="CVE-2020-25675" ref_url="https://www.suse.com/security/cve/CVE-2020-25675/" source="CVE"/>
		<reference ref_id="CVE-2020-25676" ref_url="https://www.suse.com/security/cve/CVE-2020-25676/" source="CVE"/>
		<reference ref_id="CVE-2020-27750" ref_url="https://www.suse.com/security/cve/CVE-2020-27750/" source="CVE"/>
		<reference ref_id="CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751/" source="CVE"/>
		<reference ref_id="CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752/" source="CVE"/>
		<reference ref_id="CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753/" source="CVE"/>
		<reference ref_id="CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754/" source="CVE"/>
		<reference ref_id="CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755/" source="CVE"/>
		<reference ref_id="CVE-2020-27757" ref_url="https://www.suse.com/security/cve/CVE-2020-27757/" source="CVE"/>
		<reference ref_id="CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759/" source="CVE"/>
		<reference ref_id="CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760/" source="CVE"/>
		<reference ref_id="CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761/" source="CVE"/>
		<reference ref_id="CVE-2020-27762" ref_url="https://www.suse.com/security/cve/CVE-2020-27762/" source="CVE"/>
		<reference ref_id="CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763/" source="CVE"/>
		<reference ref_id="CVE-2020-27764" ref_url="https://www.suse.com/security/cve/CVE-2020-27764/" source="CVE"/>
		<reference ref_id="CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765/" source="CVE"/>
		<reference ref_id="CVE-2020-27766" ref_url="https://www.suse.com/security/cve/CVE-2020-27766/" source="CVE"/>
		<reference ref_id="CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767/" source="CVE"/>
		<reference ref_id="CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768/" source="CVE"/>
		<reference ref_id="CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769/" source="CVE"/>
		<reference ref_id="CVE-2020-27770" ref_url="https://www.suse.com/security/cve/CVE-2020-27770/" source="CVE"/>
		<reference ref_id="CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771/" source="CVE"/>
		<reference ref_id="CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772/" source="CVE"/>
		<reference ref_id="CVE-2020-27773" ref_url="https://www.suse.com/security/cve/CVE-2020-27773/" source="CVE"/>
		<reference ref_id="CVE-2020-27774" ref_url="https://www.suse.com/security/cve/CVE-2020-27774/" source="CVE"/>
		<reference ref_id="CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775/" source="CVE"/>
		<reference ref_id="CVE-2020-27776" ref_url="https://www.suse.com/security/cve/CVE-2020-27776/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103).
- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202).
- CVE-2020-25665: Fixed a heap-based buffer overflow in WritePALMImage (bsc#1179208).
- CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212).
- CVE-2020-25674: Fixed a heap-based buffer overflow in WriteOnePNGImage (bsc#1179223).
- CVE-2020-25675: Fixed an outside the range of representable values of type 'long' and integer overflow (bsc#1179240).
- CVE-2020-25676: Fixed an outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c (bsc#1179244).
- CVE-2020-27750: Fixed an division by zero in MagickCore/colorspace-private.h (bsc#1179260).
- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397).
- CVE-2020-27754: Fixed an outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336).
- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345).
- CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
- CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313).
- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281).
- CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315).
- CVE-2020-27762: Fixed an outside the range of representable values of type 'unsigned char' (bsc#1179278).
- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312).
- CVE-2020-27764: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179317).
- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311).
- CVE-2020-27766: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179361).
- CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322).
- CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
- CVE-2020-27769: Fixed an outside the range of representable values of type 'float' at MagickCore/quantize.c (bsc#1179321).
- CVE-2020-27770: Fixed an unsigned offset overflowed at MagickCore/string.c (bsc#1179343).
- CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327).
- CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347).
- CVE-2020-27773: Fixed a division by zero at MagickCore/gem-private.h (bsc#1179285).
- CVE-2020-27774: Fixed an integer overflow at MagickCore/statistic.c (bsc#1179333).
- CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
- CVE-2020-27776: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179362).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-22"/>
	<updated date="2021-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179103">SUSE bug 1179103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179208">SUSE bug 1179208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179212">SUSE bug 1179212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179223">SUSE bug 1179223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179240">SUSE bug 1179240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179244">SUSE bug 1179244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179260">SUSE bug 1179260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179268">SUSE bug 1179268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179278">SUSE bug 1179278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179281">SUSE bug 1179281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179285">SUSE bug 1179285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179311">SUSE bug 1179311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179312">SUSE bug 1179312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179315">SUSE bug 1179315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179317">SUSE bug 1179317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179327">SUSE bug 1179327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179338">SUSE bug 1179338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179339">SUSE bug 1179339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179343">SUSE bug 1179343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179345">SUSE bug 1179345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179347">SUSE bug 1179347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179361">SUSE bug 1179361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179362">SUSE bug 1179362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179397">SUSE bug 1179397</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19667">CVE-2020-19667 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25664">CVE-2020-25664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25665/">CVE-2020-25665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25665">CVE-2020-25665 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25666">CVE-2020-25666 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25674/">CVE-2020-25674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25674">CVE-2020-25674 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25675/">CVE-2020-25675 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25675">CVE-2020-25675 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25676/">CVE-2020-25676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25676">CVE-2020-25676 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27750/">CVE-2020-27750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27750">CVE-2020-27750 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27751">CVE-2020-27751 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27752">CVE-2020-27752 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27753">CVE-2020-27753 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27754">CVE-2020-27754 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27755">CVE-2020-27755 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27757/">CVE-2020-27757 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27757">CVE-2020-27757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27759">CVE-2020-27759 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27760">CVE-2020-27760 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27761">CVE-2020-27761 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27762/">CVE-2020-27762 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27762">CVE-2020-27762 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27763">CVE-2020-27763 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27764/">CVE-2020-27764 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27764">CVE-2020-27764 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27765">CVE-2020-27765 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27766/">CVE-2020-27766 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27766">CVE-2020-27766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27767">CVE-2020-27767 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27768">CVE-2020-27768 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27769">CVE-2020-27769 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27770/">CVE-2020-27770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27770">CVE-2020-27770 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27771">CVE-2020-27771 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27772">CVE-2020-27772 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27773/">CVE-2020-27773 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27773">CVE-2020-27773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27774/">CVE-2020-27774 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27774">CVE-2020-27774 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27775">CVE-2020-27775 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27776/">CVE-2020-27776 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27776">CVE-2020-27776 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557032" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557033" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557034" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557035" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151501" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1177087" ref_url="https://bugzilla.suse.com/1177087" source="BUGZILLA"/>
		<reference ref_id="1179122" ref_url="https://bugzilla.suse.com/1179122" source="BUGZILLA"/>
		<reference ref_id="1179451" ref_url="https://bugzilla.suse.com/1179451" source="BUGZILLA"/>
		<reference ref_id="1182286" ref_url="https://bugzilla.suse.com/1182286" source="BUGZILLA"/>
		<reference ref_id="1184155" ref_url="https://bugzilla.suse.com/1184155" source="BUGZILLA"/>
		<reference ref_id="1184262" ref_url="https://bugzilla.suse.com/1184262" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13543" ref_url="https://www.suse.com/security/cve/CVE-2020-13543/" source="CVE"/>
		<reference ref_id="CVE-2020-13558" ref_url="https://www.suse.com/security/cve/CVE-2020-13558/" source="CVE"/>
		<reference ref_id="CVE-2020-13584" ref_url="https://www.suse.com/security/cve/CVE-2020-13584/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9983" ref_url="https://www.suse.com/security/cve/CVE-2020-9983/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1789" ref_url="https://www.suse.com/security/cve/CVE-2021-1789/" source="CVE"/>
		<reference ref_id="CVE-2021-1799" ref_url="https://www.suse.com/security/cve/CVE-2021-1799/" source="CVE"/>
		<reference ref_id="CVE-2021-1801" ref_url="https://www.suse.com/security/cve/CVE-2021-1801/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1870" ref_url="https://www.suse.com/security/cve/CVE-2021-1870/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.1:
  + Improve handling of Media Capture devices.
  + Improve WebAudio playback.
  + Improve video orientation handling.
  + Improve seeking support for MSE playback.
  + Improve flush support in EME decryptors.
  + Fix HTTP status codes for requests done through a custom URI handler.
  + Fix the Bubblewrap sandbox in certain 32-bit systems.
  + Fix inconsistencies between the WebKitWebView.is-muted property
    state and values returned by
    webkit_web_view_is_playing_audio().
  + Fix the build with ENABLE_VIDEO=OFF.
  + Fix wrong timestamps for long-lived cookies.
  + Fix UI process crash when failing to load favicons.
  + Fix several crashes and rendering issues.
- Including Security fixes for: CVE-2021-1788, CVE-2021-1844, CVE-2021-1871,
    CVE-2020-27918, CVE-2020-29623, CVE-2021-1765, CVE-2021-1789, CVE-2021-1799,
    CVE-2021-1801, CVE-2021-1870, CVE-2020-13558, CVE-2020-13584, CVE-2020-9983, 
    CVE-2020-13543, CVE-2020-9947, CVE-2020-9948, CVE-2020-9951.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177087">SUSE bug 1177087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179122">SUSE bug 1179122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179451">SUSE bug 1179451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182286">SUSE bug 1182286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184155">SUSE bug 1184155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13543/">CVE-2020-13543 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13543">CVE-2020-13543 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13558/">CVE-2020-13558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13558">CVE-2020-13558 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13584/">CVE-2020-13584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13584">CVE-2020-13584 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27918">CVE-2020-27918 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29623">CVE-2020-29623 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9947">CVE-2020-9947 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9948">CVE-2020-9948 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9951">CVE-2020-9951 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9983/">CVE-2020-9983 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9983">CVE-2020-9983 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1765">CVE-2021-1765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1788">CVE-2021-1788 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1789/">CVE-2021-1789 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1789">CVE-2021-1789 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1799/">CVE-2021-1799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1799">CVE-2021-1799 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1801/">CVE-2021-1801 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1801">CVE-2021-1801 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1844">CVE-2021-1844 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1870/">CVE-2021-1870 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1870">CVE-2021-1870 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1871">CVE-2021-1871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557036" comment="libjavascriptcoregtk-4_0-18-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557037" comment="libwebkit2gtk-4_0-37-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539068" comment="libwebkit2gtk3-lang-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557038" comment="typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557039" comment="typelib-1_0-WebKit2-4_0-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557040" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557041" comment="webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151502" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1186922" ref_url="https://bugzilla.suse.com/1186922" source="BUGZILLA"/>
		<reference ref_id="1186923" ref_url="https://bugzilla.suse.com/1186923" source="BUGZILLA"/>
		<reference ref_id="1186924" ref_url="https://bugzilla.suse.com/1186924" source="BUGZILLA"/>
		<reference ref_id="1187017" ref_url="https://bugzilla.suse.com/1187017" source="BUGZILLA"/>
		<reference ref_id="1187174" ref_url="https://bugzilla.suse.com/1187174" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35452" ref_url="https://www.suse.com/security/cve/CVE-2020-35452/" source="CVE"/>
		<reference ref_id="CVE-2021-26690" ref_url="https://www.suse.com/security/cve/CVE-2021-26690/" source="CVE"/>
		<reference ref_id="CVE-2021-26691" ref_url="https://www.suse.com/security/cve/CVE-2021-26691/" source="CVE"/>
		<reference ref_id="CVE-2021-30641" ref_url="https://www.suse.com/security/cve/CVE-2021-30641/" source="CVE"/>
		<reference ref_id="CVE-2021-31618" ref_url="https://www.suse.com/security/cve/CVE-2021-31618/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- fixed CVE-2021-30641 [bsc#1187174]: MergeSlashes regression
- fixed CVE-2021-31618 [bsc#1186924]: NULL pointer dereference on specially crafted HTTP/2 request
- fixed CVE-2020-35452 [bsc#1186922]: Single zero byte stack overflow in mod_auth_digest 
- fixed CVE-2021-26690 [bsc#1186923]: mod_session NULL pointer dereference in parser
- fixed CVE-2021-26691 [bsc#1187017]: Heap overflow in mod_session
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186922">SUSE bug 1186922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186923">SUSE bug 1186923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186924">SUSE bug 1186924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187017">SUSE bug 1187017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187174">SUSE bug 1187174</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35452/">CVE-2020-35452 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35452">CVE-2020-35452 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26690/">CVE-2021-26690 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26690">CVE-2021-26690 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26691/">CVE-2021-26691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26691">CVE-2021-26691 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30641/">CVE-2021-30641 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30641">CVE-2021-30641 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31618/">CVE-2021-31618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31618">CVE-2021-31618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557042" comment="apache2-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539074" comment="apache2-doc-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557043" comment="apache2-example-pages-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557044" comment="apache2-prefork-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557045" comment="apache2-utils-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557046" comment="apache2-worker-2.4.23-29.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151503" version="1" class="patch">
	<metadata>
		<title>Security update for xterm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182091" ref_url="https://bugzilla.suse.com/1182091" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135/" source="CVE"/>
		<description>
This update for xterm fixes the following issues:

- CVE-2021-27135: Fixed buffer-overflow when clicking on selected utf8 text. (bsc#1182091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182091">SUSE bug 1182091</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27135">CVE-2021-27135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557047" comment="xterm-308-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151504" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="1186235" ref_url="https://bugzilla.suse.com/1186235" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes several issues.

The following issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-28688: Fixed an issue introduced by XSA-365, leaving around zombie domains after xen guest has died (bsc#1183646).
- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. (bsc#1176724).
- Fixed a regression with the last livepatch which caused a kernel warning during sysfs read (bsc#1186235).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186235">SUSE bug 1186235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009557048" comment="kgraft-patch-4_4_180-94_144-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151505" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186235" ref_url="https://bugzilla.suse.com/1186235" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.

The following issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- Fixed a regression with the last livepatch which caused a kernel warning during sysfs read (bsc#1186235).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186235">SUSE bug 1186235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009557049" comment="kgraft-patch-4_4_180-94_141-default-5-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151506" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186235" ref_url="https://bugzilla.suse.com/1186235" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- Fixed a regression with the last livepatch which caused a kernel warning during sysfs read (bsc#1186235).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186235">SUSE bug 1186235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009557050" comment="kgraft-patch-4_4_180-94_138-default-6-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151507" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009557051" comment="kgraft-patch-4_4_180-94_135-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151508" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009557052" comment="kgraft-patch-4_4_180-94_130-default-10-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151509" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.

The following security issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009557053" comment="kgraft-patch-4_4_180-94_127-default-11-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151510" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_124 fixes several issues.

The following security issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721283" comment="kernel-default 4.4.180-94.124 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719614" comment="kgraft-patch-4_4_180-94_124-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009557054" comment="kgraft-patch-4_4_180-94_124-default-11-2.3 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151511" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1186151" ref_url="https://bugzilla.suse.com/1186151" source="BUGZILLA"/>
		<description>
This update for ovmf fixes the following issues:

- Fixed a possible  buffer overflow in IScsiDxe (bsc#1186151)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-22"/>
	<updated date="2021-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186151">SUSE bug 1186151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555551" comment="ovmf-2017+git1492060560.b6d11d7c46-4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555552" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539089" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555553" comment="qemu-uefi-aarch64-2017+git1492060560.b6d11d7c46-4.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151512" version="1" class="patch">
	<metadata>
		<title>Security update for libnettle (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1187060" ref_url="https://bugzilla.suse.com/1187060" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3580" ref_url="https://www.suse.com/security/cve/CVE-2021-3580/" source="CVE"/>
		<description>
This update for libnettle fixes the following issues:

- CVE-2021-3580: Fixed a remote denial of service in the RSA decryption via manipulated ciphertext (bsc#1187060).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-23"/>
	<updated date="2021-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187060">SUSE bug 1187060</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3580/">CVE-2021-3580 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3580">CVE-2021-3580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557055" comment="libhogweed2-2.7.1-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539091" comment="libhogweed2-32bit-2.7.1-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557056" comment="libnettle4-2.7.1-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539093" comment="libnettle4-32bit-2.7.1-13.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151513" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1187212" ref_url="https://bugzilla.suse.com/1187212" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560/" source="CVE"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2021-33560: Fixed a side-channel against ElGamal encryption, caused by missing exponent blinding (bsc#1187212).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-24"/>
	<updated date="2021-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187212">SUSE bug 1187212</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">CVE-2021-33560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557057" comment="libgcrypt20-1.6.1-16.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539096" comment="libgcrypt20-32bit-1.6.1-16.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557058" comment="libgcrypt20-hmac-1.6.1-16.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539098" comment="libgcrypt20-hmac-32bit-1.6.1-16.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151514" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1184354" ref_url="https://bugzilla.suse.com/1184354" source="BUGZILLA"/>
		<reference ref_id="1187310" ref_url="https://bugzilla.suse.com/1187310" source="BUGZILLA"/>
		<reference ref_id="1187395" ref_url="https://bugzilla.suse.com/1187395" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3479" ref_url="https://www.suse.com/security/cve/CVE-2021-3479/" source="CVE"/>
		<reference ref_id="CVE-2021-3598" ref_url="https://www.suse.com/security/cve/CVE-2021-3598/" source="CVE"/>
		<reference ref_id="CVE-2021-3605" ref_url="https://www.suse.com/security/cve/CVE-2021-3605/" source="CVE"/>
		<description>
This update for openexr fixes the following issues:

- Fixed CVE-2021-3479 [bsc#1184354]: Out-of-memory caused by allocation of a very large buffer
- Fixed CVE-2021-3605 [bsc#1187395]: Heap buffer overflow in the rleUncompress function
- Fixed CVE-2021-3598 [bsc#1187310]: Heap buffer overflow in Imf_3_1:CharPtrIO:readChars
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-24"/>
	<updated date="2021-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184354">SUSE bug 1184354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187310">SUSE bug 1187310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187395">SUSE bug 1187395</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3479/">CVE-2021-3479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3479">CVE-2021-3479 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3598/">CVE-2021-3598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3598">CVE-2021-3598 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3605/">CVE-2021-3605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3605">CVE-2021-3605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557059" comment="libIlmImf-Imf_2_1-21-2.1.0-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557060" comment="openexr-2.1.0-6.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151515" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql12, postgresql13 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="1178961" ref_url="https://bugzilla.suse.com/1178961" source="BUGZILLA"/>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<description>
This update for postgresql, postgresql12, postgresql13 fixes the following issues:

Initial packaging of PostgreSQL 13:

* https://www.postgresql.org/about/news/2077/
* https://www.postgresql.org/docs/13/release-13.html

Changes in postgresql:

- Bump postgresql major version to 13.

Changes in postgresql12:

- %ghost the symlinks to pg_config and ecpg. (bsc#1178961)
- BuildRequire libpq5 and libecpg6 when not building them to avoid dangling symlinks in the devel package. (bsc#1179765)
- Fix a DST problem in the test suite.

Changes in postgresql13:

- Add postgresql-icu68.patch: fix build with ICU 68

- %ghost the symlinks to pg_config and ecpg. (bsc#1178961)
- BuildRequire libpq5 and libecpg6 when not building them to avoid dangling symlinks in the devel package. (bsc#1179765)

Upgrade to version 13.1:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/13/release-13-1.html

- Fix a DST problem in the test suite.

  		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-26"/>
	<updated date="2021-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178961">SUSE bug 1178961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557061" comment="libecpg6-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557062" comment="libpq5-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531843" comment="libpq5-32bit-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531844" comment="postgresql-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531845" comment="postgresql-contrib-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531846" comment="postgresql-docs-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531847" comment="postgresql-plperl-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531848" comment="postgresql-plpython-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531849" comment="postgresql-pltcl-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531850" comment="postgresql-server-13-4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151516" version="1" class="patch">
	<metadata>
		<title>Security update for arpwatch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1186240" ref_url="https://bugzilla.suse.com/1186240" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25321" ref_url="https://www.suse.com/security/cve/CVE-2021-25321/" source="CVE"/>
		<description>
This update for arpwatch fixes the following issues:

- CVE-2021-25321: Fixed local privilege escalation from runtime user to root (bsc#1186240).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186240">SUSE bug 1186240</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25321/">CVE-2021-25321 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25321">CVE-2021-25321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615945" comment="arpwatch-2.1a15-159.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151517" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1161510" ref_url="https://bugzilla.suse.com/1161510" source="BUGZILLA"/>
		<reference ref_id="1186229" ref_url="https://bugzilla.suse.com/1186229" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20387" ref_url="https://www.suse.com/security/cve/CVE-2019-20387/" source="CVE"/>
		<reference ref_id="CVE-2021-3200" ref_url="https://www.suse.com/security/cve/CVE-2021-3200/" source="CVE"/>
		<description>
This update for libsolv fixes the following issues:

Security issues fixed:

- CVE-2019-20387: Fixed heap-buffer-overflow in repodata_schema2id (bsc#1161510)
- CVE-2021-3200: testcase_read: error out if repos are added or the system is changed too late (bsc#1186229)

Other issues fixed:

- backport support for blacklisted packages to support ptf packages and retracted patches
- fix ruleinfo of complex dependencies returning the wrong origin
- fix SOLVER_FLAG_FOCUS_BEST updateing packages without reason
- fix add_complex_recommends() selecting conflicted packages in rare cases
- fix potential segfault in resolve_jobrules
- fix solv_zchunk decoding error if large chunks are used
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161510">SUSE bug 1161510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186229">SUSE bug 1186229</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20387/">CVE-2019-20387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20387">CVE-2019-20387 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3200/">CVE-2021-3200 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3200">CVE-2021-3200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009615946" comment="libsolv-devel-0.6.37-2.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615947" comment="libsolv-tools-0.6.37-2.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615948" comment="libzypp-16.21.4-2.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615949" comment="libzypp-devel-16.21.4-2.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615950" comment="perl-solv-0.6.37-2.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615951" comment="python-solv-0.6.37-2.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151518" version="1" class="patch">
	<metadata>
		<title>Recommended update for the Azure and AWS SDKs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1125671" ref_url="https://bugzilla.suse.com/1125671" source="BUGZILLA"/>
		<reference ref_id="1154393" ref_url="https://bugzilla.suse.com/1154393" source="BUGZILLA"/>
		<reference ref_id="1175289" ref_url="https://bugzilla.suse.com/1175289" source="BUGZILLA"/>
		<reference ref_id="1176784" ref_url="https://bugzilla.suse.com/1176784" source="BUGZILLA"/>
		<reference ref_id="1176785" ref_url="https://bugzilla.suse.com/1176785" source="BUGZILLA"/>
		<reference ref_id="1182421" ref_url="https://bugzilla.suse.com/1182421" source="BUGZILLA"/>
		<reference ref_id="1187045" ref_url="https://bugzilla.suse.com/1187045" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33503" ref_url="https://www.suse.com/security/cve/CVE-2021-33503/" source="CVE"/>
		<description>
This update for the SLE Public Cloud module provides the following fixes:

Azure SDK update:
This update for the Azure SDK and CLI adds support for the AHB (Azure Hybrid Benefit).
(bsc#1176784, jsc#ECO-3105)

AWS SDK update:
This update for the AWS SDK updates python-boto3 to version 1.17.9 and aws-cli to 1.19.9.
(bsc#1182421, jsc#ECO-3352)

Security fix for python-urllib3:

- Improve performance of sub-authority splitting in URL. (bsc#1187045, CVE-2021-33503)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1125671">SUSE bug 1125671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154393">SUSE bug 1154393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175289">SUSE bug 1175289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176784">SUSE bug 1176784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176785">SUSE bug 1176785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182421">SUSE bug 1182421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187045">SUSE bug 1187045</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33503/">CVE-2021-33503 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33503">CVE-2021-33503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009616195" comment="python-six-1.14.0-13.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616449" comment="python3-requests-2.24.0-8.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616438" comment="python3-six-1.14.0-13.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616441" comment="python3-urllib3-1.25.10-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151519" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1173513" ref_url="https://bugzilla.suse.com/1173513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14145" ref_url="https://www.suse.com/security/cve/CVE-2020-14145/" source="CVE"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2020-14145: Fixed a potential information leak during host key exchange (bsc#1173513).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173513">SUSE bug 1173513</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14145/">CVE-2020-14145 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14145">CVE-2020-14145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557063" comment="openssh-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557064" comment="openssh-askpass-gnome-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557065" comment="openssh-fips-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557066" comment="openssh-helpers-7.2p2-74.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151520" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1180684" ref_url="https://bugzilla.suse.com/1180684" source="BUGZILLA"/>
		<reference ref_id="1180685" ref_url="https://bugzilla.suse.com/1180685" source="BUGZILLA"/>
		<reference ref_id="1180687" ref_url="https://bugzilla.suse.com/1180687" source="BUGZILLA"/>
		<reference ref_id="1181090" ref_url="https://bugzilla.suse.com/1181090" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23239" ref_url="https://www.suse.com/security/cve/CVE-2021-23239/" source="CVE"/>
		<reference ref_id="CVE-2021-23240" ref_url="https://www.suse.com/security/cve/CVE-2021-23240/" source="CVE"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<description>
This update for sudo fixes the following issues:

- A Heap-based buffer overflow in sudo could be exploited to allow a user to gain root privileges 
  [bsc#1181090,CVE-2021-3156]
- It was possible for a user to test for the existence of a directory due to a Race Condition in `sudoedit`
  [bsc#1180684,CVE-2021-23239]
- A Possible Symlink Attack vector existed in `sudoedit` if SELinux was running in permissive mode [bsc#1180685,
  CVE-2021-23240]
- It was possible for a User to enable Debug Settings not Intended for them [bsc#1180687]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-26"/>
	<updated date="2021-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180684">SUSE bug 1180684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180685">SUSE bug 1180685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180687">SUSE bug 1180687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181090">SUSE bug 1181090</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23239/">CVE-2021-23239 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23239">CVE-2021-23239 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23240/">CVE-2021-23240 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23240">CVE-2021-23240 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3156">CVE-2021-3156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557067" comment="sudo-1.8.20p2-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151521" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1188275" ref_url="https://bugzilla.suse.com/1188275" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.12.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-29 (bsc#1188275)

* CVE-2021-29970: Use-after-free in accessibility features of a document
* CVE-2021-30547: Out of bounds write in ANGLE
* CVE-2021-29976: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29970">CVE-2021-29970 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29976">CVE-2021-29976 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30547">CVE-2021-30547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625448" comment="MozillaFirefox-78.12.0-112.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625449" comment="MozillaFirefox-devel-78.12.0-112.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625450" comment="MozillaFirefox-translations-common-78.12.0-112.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151522" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1181414" ref_url="https://bugzilla.suse.com/1181414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.7.0 ESR  (MFSA 2021-04, bsc#1181414)
  * CVE-2021-23953: Fixed a Cross-origin information leakage via redirected PDF requests
  * CVE-2021-23954: Fixed a type confusion when using logical assignment operators in JavaScript switch statements
  * CVE-2020-26976: Fixed an issue where HTTPS pages could have been intercepted by a registered service worker when they should not have been
  * CVE-2021-23960: Fixed a use-after-poison for incorrectly redeclared JavaScript variables during GC
  * CVE-2021-23964: Fixed Memory safety bugs 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-29"/>
	<updated date="2021-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26976">CVE-2020-26976 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23953">CVE-2021-23953 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23954">CVE-2021-23954 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23960">CVE-2021-23960 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23964">CVE-2021-23964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557068" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557069" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557070" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151523" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178561" ref_url="https://bugzilla.suse.com/1178561" source="BUGZILLA"/>
		<reference ref_id="1184761" ref_url="https://bugzilla.suse.com/1184761" source="BUGZILLA"/>
		<reference ref_id="1184967" ref_url="https://bugzilla.suse.com/1184967" source="BUGZILLA"/>
		<reference ref_id="1185046" ref_url="https://bugzilla.suse.com/1185046" source="BUGZILLA"/>
		<reference ref_id="1185331" ref_url="https://bugzilla.suse.com/1185331" source="BUGZILLA"/>
		<reference ref_id="1185807" ref_url="https://bugzilla.suse.com/1185807" source="BUGZILLA"/>
		<reference ref_id="1188063" ref_url="https://bugzilla.suse.com/1188063" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33910" ref_url="https://www.suse.com/security/cve/CVE-2021-33910/" source="CVE"/>
		<description>
This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2021-33910: Fixed a denial of service (stack exhaustion) in systemd (PID 1) (bsc#1188063)

Other fixes:

- mount-util: shorten the loop a bit (#7545)
- mount-util: do not use the official MAX_HANDLE_SZ (#7523)
- mount-util: tape over name_to_handle_at() flakiness (#7517) (bsc#1184761)
- mount-util: fix bad indenting
- mount-util: EOVERFLOW might have other causes than buffer size issues
- mount-util: fix error propagation in fd_fdinfo_mnt_id()
- mount-util: drop exponential buffer growing in name_to_handle_at_loop()
- udev: port udev_has_devtmpfs() to use path_get_mnt_id()
- mount-util: add new path_get_mnt_id() call that queries the mnt ID of a path
- mount-util: add name_to_handle_at_loop() wrapper around name_to_handle_at()
- mount-util: accept that name_to_handle_at() might fail with EPERM (#5499)
- basic: fallback to the fstat if we don't have access to the /proc/self/fdinfo
- sysusers: use the usual comment style
- test/TEST-21-SYSUSERS: add tests for new functionality
- sysusers: allow admin/runtime overrides to command-line config
- basic/strv: add function to insert items at position
- sysusers: allow the shell to be specified
- sysusers: move various user credential validity checks to src/basic/
- man: reformat table in sysusers.d(5)
- sysusers: take configuration as positional arguments
- sysusers: emit a bit more info at debug level when locking fails
- sysusers: allow force reusing existing user/group IDs (#8037)
- sysusers: ensure GID in uid:gid syntax exists
- sysusers: make ADD_GROUP always create a group
- test: add TEST-21-SYSUSERS test
- sysuser: use OrderedHashmap
- sysusers: allow uid:gid in sysusers.conf files
- sysusers: fix memleak (#4430)
- These commits implement the option '--replace' for systemd-sysusers
  so %sysusers_create_package can be introduced in SLE and packages
  can rely on this rpm macro without wondering whether the macro is
  available on the different target the package is submitted to.
- Expect 644 permissions for /usr/lib/udev/compat-symlink-generation (bsc#1185807)
- systemctl: add --value option
- execute: make sure to call into PAM after initializing resource limits (bsc#1184967)
- rlimit-util: introduce setrlimit_closest_all()
- system-conf: drop reference to ShutdownWatchdogUsec=
- core: rename ShutdownWatchdogSec to RebootWatchdogSec (bsc#1185331)
- Return -EAGAIN instead of -EALREADY from unit_reload (bsc#1185046)
- rules: don't ignore Xen virtual interfaces anymore (bsc#1178561)
- write_net_rules: set execute bits (bsc#1178561)
- udev: rework network device renaming
- Revert 'Revert 'udev: network device renaming - immediately give up if the target name isn't available''
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178561">SUSE bug 1178561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184761">SUSE bug 1184761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184967">SUSE bug 1184967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185046">SUSE bug 1185046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185331">SUSE bug 1185331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185807">SUSE bug 1185807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33910/">CVE-2021-33910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33910">CVE-2021-33910 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626126" comment="libsystemd0-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625743" comment="libsystemd0-32bit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626127" comment="libudev-devel-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626128" comment="libudev1-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625746" comment="libudev1-32bit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626129" comment="systemd-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625748" comment="systemd-32bit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625749" comment="systemd-bash-completion-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626130" comment="systemd-devel-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626131" comment="systemd-sysvinit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626132" comment="udev-228-150.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151524" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="1187687" ref_url="https://bugzilla.suse.com/1187687" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes several issues.

The following security issues were fixed:

- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187687)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187687">SUSE bug 1187687</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0605">CVE-2021-0605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009626133" comment="kgraft-patch-4_4_180-94_144-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151525" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="1187687" ref_url="https://bugzilla.suse.com/1187687" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.

The following security issues were fixed:

- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187687)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187687">SUSE bug 1187687</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0605">CVE-2021-0605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009626134" comment="kgraft-patch-4_4_180-94_141-default-6-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151526" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="1187687" ref_url="https://bugzilla.suse.com/1187687" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following security issues were fixed:

- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187687)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187687">SUSE bug 1187687</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0605">CVE-2021-0605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009626135" comment="kgraft-patch-4_4_180-94_138-default-7-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151527" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="1187687" ref_url="https://bugzilla.suse.com/1187687" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187687)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187687">SUSE bug 1187687</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0605">CVE-2021-0605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009626136" comment="kgraft-patch-4_4_180-94_135-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151528" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="1187687" ref_url="https://bugzilla.suse.com/1187687" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187687)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187687">SUSE bug 1187687</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0605">CVE-2021-0605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009626137" comment="kgraft-patch-4_4_180-94_130-default-11-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151529" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="1187687" ref_url="https://bugzilla.suse.com/1187687" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.

The following security issues were fixed:

- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187687)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187687">SUSE bug 1187687</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0605">CVE-2021-0605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009626138" comment="kgraft-patch-4_4_180-94_127-default-12-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151530" version="1" class="patch">
	<metadata>
		<title>Security update for linuxptp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1187646" ref_url="https://bugzilla.suse.com/1187646" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3570" ref_url="https://www.suse.com/security/cve/CVE-2021-3570/" source="CVE"/>
		<description>
This update for linuxptp fixes the following issues:

- CVE-2021-3570: Validate the messageLength field of incoming messages. (bsc#1187646)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187646">SUSE bug 1187646</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3570/">CVE-2021-3570 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3570">CVE-2021-3570 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626139" comment="linuxptp-1.4-15.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151531" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1115026" ref_url="https://bugzilla.suse.com/1115026" source="BUGZILLA"/>
		<reference ref_id="1175462" ref_url="https://bugzilla.suse.com/1175462" source="BUGZILLA"/>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1185724" ref_url="https://bugzilla.suse.com/1185724" source="BUGZILLA"/>
		<reference ref_id="1185859" ref_url="https://bugzilla.suse.com/1185859" source="BUGZILLA"/>
		<reference ref_id="1185860" ref_url="https://bugzilla.suse.com/1185860" source="BUGZILLA"/>
		<reference ref_id="1185861" ref_url="https://bugzilla.suse.com/1185861" source="BUGZILLA"/>
		<reference ref_id="1185862" ref_url="https://bugzilla.suse.com/1185862" source="BUGZILLA"/>
		<reference ref_id="1185863" ref_url="https://bugzilla.suse.com/1185863" source="BUGZILLA"/>
		<reference ref_id="1185898" ref_url="https://bugzilla.suse.com/1185898" source="BUGZILLA"/>
		<reference ref_id="1185987" ref_url="https://bugzilla.suse.com/1185987" source="BUGZILLA"/>
		<reference ref_id="1186060" ref_url="https://bugzilla.suse.com/1186060" source="BUGZILLA"/>
		<reference ref_id="1186062" ref_url="https://bugzilla.suse.com/1186062" source="BUGZILLA"/>
		<reference ref_id="1186111" ref_url="https://bugzilla.suse.com/1186111" source="BUGZILLA"/>
		<reference ref_id="1186235" ref_url="https://bugzilla.suse.com/1186235" source="BUGZILLA"/>
		<reference ref_id="1186390" ref_url="https://bugzilla.suse.com/1186390" source="BUGZILLA"/>
		<reference ref_id="1186463" ref_url="https://bugzilla.suse.com/1186463" source="BUGZILLA"/>
		<reference ref_id="1187038" ref_url="https://bugzilla.suse.com/1187038" source="BUGZILLA"/>
		<reference ref_id="1187050" ref_url="https://bugzilla.suse.com/1187050" source="BUGZILLA"/>
		<reference ref_id="1187193" ref_url="https://bugzilla.suse.com/1187193" source="BUGZILLA"/>
		<reference ref_id="1187215" ref_url="https://bugzilla.suse.com/1187215" source="BUGZILLA"/>
		<reference ref_id="1187388" ref_url="https://bugzilla.suse.com/1187388" source="BUGZILLA"/>
		<reference ref_id="1187452" ref_url="https://bugzilla.suse.com/1187452" source="BUGZILLA"/>
		<reference ref_id="1187595" ref_url="https://bugzilla.suse.com/1187595" source="BUGZILLA"/>
		<reference ref_id="1187601" ref_url="https://bugzilla.suse.com/1187601" source="BUGZILLA"/>
		<reference ref_id="1187934" ref_url="https://bugzilla.suse.com/1187934" source="BUGZILLA"/>
		<reference ref_id="1188062" ref_url="https://bugzilla.suse.com/1188062" source="BUGZILLA"/>
		<reference ref_id="1188063" ref_url="https://bugzilla.suse.com/1188063" source="BUGZILLA"/>
		<reference ref_id="1188116" ref_url="https://bugzilla.suse.com/1188116" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141/" source="CVE"/>
		<reference ref_id="CVE-2020-26145" ref_url="https://www.suse.com/security/cve/CVE-2020-26145/" source="CVE"/>
		<reference ref_id="CVE-2020-26147" ref_url="https://www.suse.com/security/cve/CVE-2020-26147/" source="CVE"/>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)
- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)
- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)
- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)
- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)
- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bsc#1186463)
- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bsc#1179610)
- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)
- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861)
- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)
- CVE-2021-33034: Fixed an issue in net/bluetooth/hci_event.c where a use-after-free leads to writing an arbitrary value. (bsc#1186111)
- CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1186062)
- CVE-2021-23134: Fixed a use After Free vulnerability in nfc sockets which allows local attackers to elevate their privileges. (bsc#1186060)
- CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859)
- CVE-2020-26141: Fixed a flaw that could allows an adversary to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bsc#1185987)
- CVE-2020-26145: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject arbitrary network packets. (bsc#1185860)
- CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862)
- CVE-2020-26147: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames. (bsc#1185987)

The following non-security bugs were fixed:

- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).
- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).
- hv_netvsc: Add handlers for ethtool get/set msg level (bsc#1175462).
- hv_netvsc: avoid retry on send during shutdown (bsc#1175462).
- hv_netvsc: avoid unnecessary wakeups on subchannel creation (bsc#1175462).
- hv_netvsc: cancel subchannel setup before halting device (bsc#1175462).
- hv_netvsc: change GPAD teardown order on older versions (bsc#1175462).
- hv_netvsc: common detach logic (bsc#1175462).
- hv_netvsc: delay setup of VF device (bsc#1175462).
- hv_netvsc: disable NAPI before channel close (bsc#1175462).
- hv_netvsc: Ensure correct teardown message sequence order (bsc#1175462).
- hv_netvsc: Fix a deadlock by getting rtnl lock earlier in netvsc_probe() (bsc#1175462).
- hv_netvsc: Fix a network regression after ifdown/ifup (bsc#1175462).
- hv_netvsc: fix deadlock on hotplug (bsc#1175462).
- hv_netvsc: Fix error handling in netvsc_attach() (bsc#1175462).
- hv_netvsc: fix error unwind handling if vmbus_open fails (bsc#1175462).
- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (bsc#1175462).
- hv_netvsc: fix handling of fallback to single queue mode (bsc#1175462).
- hv_netvsc: Fix hash key value reset after other ops (bsc#1175462).
- hv_netvsc: Fix IP header checksum for coalesced packets (bsc#1175462).
- hv_netvsc: Fix net device attach on older Windows hosts (bsc#1175462).
- hv_netvsc: fix network namespace issues with VF support (bsc#1175462).
- hv_netvsc: Fix NULL dereference at single queue mode fallback (bsc#1175462).
- hv_netvsc: fix race during initialization (bsc#1175462).
- hv_netvsc: fix race on sub channel creation (bsc#1175462).
- hv_netvsc: fix race that may miss tx queue wakeup (bsc#1175462).
- hv_netvsc: fix schedule in RCU context (bsc#1175462).
- hv_netvsc: Fix the variable sizes in ipsecv2 and rsc offload (bsc#1175462).
- hv_netvsc: Fix tx_table init in rndis_set_subchannel() (bsc#1175462).
- hv_netvsc: Fix unwanted wakeup after tx_disable (bsc#1175462).
- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (bsc#1175462).
- hv_netvsc: flag software created hash value (bsc#1175462).
- hv_netvsc: netvsc_teardown_gpadl() split (bsc#1175462).
- hv_netvsc: only wake transmit queue if link is up (bsc#1175462).
- hv_netvsc: pass netvsc_device to rndis halt (bsc#1175462).
- hv_netvsc: preserve hw_features on mtu/channels/ringparam changes (bsc#1175462).
- hv_netvsc: Refactor assignments of struct netvsc_device_info (bsc#1175462).
- hv_netvsc: set master device (bsc#1175462).
- hv_netvsc: Set tx_table to equal weight after subchannels open (bsc#1175462).
- hv_netvsc: Simplify num_chn checking in rndis_filter_device_add() (bsc#1175462).
- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() (bsc#1175462).
- hv_netvsc: split sub-channel setup into async and sync (bsc#1175462).
- hv_netvsc: typo in NDIS RSS parameters structure (bsc#1175462).
- hv_netvsc: use RCU to fix concurrent rx and queue changes (bsc#1175462).
- hv_netvsc: use reciprocal divide to speed up percent calculation (bsc#1175462).
- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown (bsc#1175462).
- kgraft: truncate the output from state_show() sysfs attr (bsc#1186235).
- mm, memory_hotplug: do not clear numa_node association after hot_remove (bsc#1115026).
- mm: consider __HW_POISON pages when allocating from pcp lists (bsc#1187388).
- scsi: storvsc: Enable scatterlist entry lengths &gt; 4Kbytes (bsc#1187193).
- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-22"/>
	<updated date="2021-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115026">SUSE bug 1115026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175462">SUSE bug 1175462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185724">SUSE bug 1185724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185860">SUSE bug 1185860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185861">SUSE bug 1185861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185862">SUSE bug 1185862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185863">SUSE bug 1185863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185898">SUSE bug 1185898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185987">SUSE bug 1185987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186060">SUSE bug 1186060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186062">SUSE bug 1186062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186111">SUSE bug 1186111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186235">SUSE bug 1186235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186390">SUSE bug 1186390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187193">SUSE bug 1187193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187388">SUSE bug 1187388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187601">SUSE bug 1187601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187934">SUSE bug 1187934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188116">SUSE bug 1188116</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24586">CVE-2020-24586 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24587">CVE-2020-24587 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24588">CVE-2020-24588 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26139">CVE-2020-26139 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26141">CVE-2020-26141 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26145/">CVE-2020-26145 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26145">CVE-2020-26145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26147/">CVE-2020-26147 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26147">CVE-2020-26147 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26558">CVE-2020-26558 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36386">CVE-2020-36386 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0129">CVE-2021-0129 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0605">CVE-2021-0605 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23134">CVE-2021-23134 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34693">CVE-2021-34693 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626309" comment="kernel-default-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626310" comment="kernel-default-base-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626311" comment="kernel-default-devel-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626312" comment="kernel-default-kgraft-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625761" comment="kernel-devel-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625762" comment="kernel-macros-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625763" comment="kernel-source-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626313" comment="kernel-syms-4.4.180-94.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626314" comment="kgraft-patch-4_4_180-94_147-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151532" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009626866" comment="kgraft-patch-4_4_180-94_144-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151533" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009626867" comment="kgraft-patch-4_4_180-94_141-default-7-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151534" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009626868" comment="kgraft-patch-4_4_180-94_138-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151535" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009626869" comment="kgraft-patch-4_4_180-94_135-default-10-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151536" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009626870" comment="kgraft-patch-4_4_180-94_130-default-12-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151537" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009626871" comment="kgraft-patch-4_4_180-94_127-default-13-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151538" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1187364" ref_url="https://bugzilla.suse.com/1187364" source="BUGZILLA"/>
		<reference ref_id="1187365" ref_url="https://bugzilla.suse.com/1187365" source="BUGZILLA"/>
		<reference ref_id="1187366" ref_url="https://bugzilla.suse.com/1187366" source="BUGZILLA"/>
		<reference ref_id="1187367" ref_url="https://bugzilla.suse.com/1187367" source="BUGZILLA"/>
		<reference ref_id="1187529" ref_url="https://bugzilla.suse.com/1187529" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3593" ref_url="https://www.suse.com/security/cve/CVE-2021-3593/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<reference ref_id="CVE-2021-3611" ref_url="https://www.suse.com/security/cve/CVE-2021-3611/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2021-3595: Fixed slirp: invalid pointer initialization may lead to information disclosure (tftp) (bsc#1187366)
- CVE-2021-3592: Fix for slirp: invalid pointer initialization may lead to information disclosure (bootp) (bsc#1187364)
- CVE-2021-3594: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp) (bsc#1187367)
- CVE-2021-3593: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp6) (bsc#1187365)
- CVE-2021-3611: Fix intel-hda segmentation fault due to stack overflow (bsc#1187529)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-29"/>
	<updated date="2021-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187365">SUSE bug 1187365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187366">SUSE bug 1187366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187529">SUSE bug 1187529</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3593/">CVE-2021-3593 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3593">CVE-2021-3593 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3595">CVE-2021-3595 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3611/">CVE-2021-3611 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3611">CVE-2021-3611 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627033" comment="qemu-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625033" comment="qemu-arm-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627034" comment="qemu-block-curl-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627035" comment="qemu-block-iscsi-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627027" comment="qemu-block-rbd-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627036" comment="qemu-block-ssh-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627037" comment="qemu-guest-agent-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624979" comment="qemu-ipxe-1.0.0+-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624980" comment="qemu-kvm-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627038" comment="qemu-lang-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624983" comment="qemu-seabios-1.10.2_0_g5f4c7b1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624984" comment="qemu-sgabios-8-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627039" comment="qemu-tools-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624986" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624987" comment="qemu-x86-2.9.1-6.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151539" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1172505" ref_url="https://bugzilla.suse.com/1172505" source="BUGZILLA"/>
		<reference ref_id="1187105" ref_url="https://bugzilla.suse.com/1187105" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12049" ref_url="https://www.suse.com/security/cve/CVE-2020-12049/" source="CVE"/>
		<reference ref_id="CVE-2020-35512" ref_url="https://www.suse.com/security/cve/CVE-2020-35512/" source="CVE"/>
		<description>
This update for dbus-1 fixes the following issues:

- CVE-2020-35512: Fixed a bug where users with the same numeric UID could lead to use-after-free and undefined behaviour. (bsc#1187105)
- CVE-2020-12049: Fixed a bug where a truncated messages lead to resource exhaustion. (bsc#1172505)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-02"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172505">SUSE bug 1172505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187105">SUSE bug 1187105</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12049/">CVE-2020-12049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12049">CVE-2020-12049 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35512/">CVE-2020-35512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35512">CVE-2020-35512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627335" comment="dbus-1-1.8.22-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627336" comment="dbus-1-x11-1.8.22-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627337" comment="libdbus-1-3-1.8.22-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625756" comment="libdbus-1-3-32bit-1.8.22-29.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151540" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1188697" ref_url="https://bugzilla.suse.com/1188697" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21775" ref_url="https://www.suse.com/security/cve/CVE-2021-21775/" source="CVE"/>
		<reference ref_id="CVE-2021-21779" ref_url="https://www.suse.com/security/cve/CVE-2021-21779/" source="CVE"/>
		<reference ref_id="CVE-2021-30663" ref_url="https://www.suse.com/security/cve/CVE-2021-30663/" source="CVE"/>
		<reference ref_id="CVE-2021-30665" ref_url="https://www.suse.com/security/cve/CVE-2021-30665/" source="CVE"/>
		<reference ref_id="CVE-2021-30689" ref_url="https://www.suse.com/security/cve/CVE-2021-30689/" source="CVE"/>
		<reference ref_id="CVE-2021-30720" ref_url="https://www.suse.com/security/cve/CVE-2021-30720/" source="CVE"/>
		<reference ref_id="CVE-2021-30734" ref_url="https://www.suse.com/security/cve/CVE-2021-30734/" source="CVE"/>
		<reference ref_id="CVE-2021-30744" ref_url="https://www.suse.com/security/cve/CVE-2021-30744/" source="CVE"/>
		<reference ref_id="CVE-2021-30749" ref_url="https://www.suse.com/security/cve/CVE-2021-30749/" source="CVE"/>
		<reference ref_id="CVE-2021-30758" ref_url="https://www.suse.com/security/cve/CVE-2021-30758/" source="CVE"/>
		<reference ref_id="CVE-2021-30795" ref_url="https://www.suse.com/security/cve/CVE-2021-30795/" source="CVE"/>
		<reference ref_id="CVE-2021-30797" ref_url="https://www.suse.com/security/cve/CVE-2021-30797/" source="CVE"/>
		<reference ref_id="CVE-2021-30799" ref_url="https://www.suse.com/security/cve/CVE-2021-30799/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.32.3:

- CVE-2021-21775: Fixed a use-after-free vulnerability in the way certain events are processed for ImageLoader objects. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. (bsc#1188697)
- CVE-2021-21779: Fixed a use-after-free vulnerability in the way that WebKit GraphicsContext handles certain events. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. (bsc#1188697)
- CVE-2021-30663: An integer overflow was addressed with improved input validation. (bsc#1188697)
- CVE-2021-30665: A memory corruption issue was addressed with improved state management. (bsc#1188697)
- CVE-2021-30689: A logic issue was addressed with improved state management. (bsc#1188697)
- CVE-2021-30720: A logic issue was addressed with improved restrictions. (bsc#1188697)
- CVE-2021-30734: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
- CVE-2021-30744: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. (bsc#1188697)
- CVE-2021-30749: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
- CVE-2021-30758: A type confusion issue was addressed with improved state handling. (bsc#1188697)
- CVE-2021-30795: A use after free issue was addressed with improved memory management. (bsc#1188697)
- CVE-2021-30797: This issue was addressed with improved checks. (bsc#1188697)
- CVE-2021-30799: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-03"/>
	<updated date="2021-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21775/">CVE-2021-21775 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21775">CVE-2021-21775 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21779/">CVE-2021-21779 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21779">CVE-2021-21779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30663/">CVE-2021-30663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30663">CVE-2021-30663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30665/">CVE-2021-30665 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30665">CVE-2021-30665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30689/">CVE-2021-30689 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30689">CVE-2021-30689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30720/">CVE-2021-30720 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30720">CVE-2021-30720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30734/">CVE-2021-30734 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30734">CVE-2021-30734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30744/">CVE-2021-30744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30744">CVE-2021-30744 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30749/">CVE-2021-30749 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30749">CVE-2021-30749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30758/">CVE-2021-30758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30758">CVE-2021-30758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30795/">CVE-2021-30795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30795">CVE-2021-30795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30797/">CVE-2021-30797 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30797">CVE-2021-30797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30799/">CVE-2021-30799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30799">CVE-2021-30799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627819" comment="libjavascriptcoregtk-4_0-18-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627820" comment="libwebkit2gtk-4_0-37-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627305" comment="libwebkit2gtk3-lang-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627821" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627822" comment="typelib-1_0-WebKit2-4_0-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627823" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627824" comment="webkit2gtk-4_0-injected-bundles-2.32.3-2.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151541" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3630: out-of-bounds write in DJVU:DjVuTXT:decode() in DjVuText.cpp (bsc#1187869)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3630">CVE-2021-3630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628148" comment="libdjvulibre21-3.5.25.3-5.19.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151542" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1189206" ref_url="https://bugzilla.suse.com/1189206" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<description>
This update for cpio fixes the following issues:

  It was possible to trigger Remote code execution due to a integer overflow (CVE-2021-38185, bsc#1189206)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-14"/>
	<updated date="2021-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189206">SUSE bug 1189206</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630922" comment="cpio-2.11-36.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630610" comment="cpio-lang-2.11-36.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151543" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1188881" ref_url="https://bugzilla.suse.com/1188881" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<description>
This update for libcares2 fixes the following issues:

- CVE-2021-3672: Fixed input validation on hostnames (bsc#1188881).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3672">CVE-2021-3672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631063" comment="libcares2-1.9.1-9.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151544" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.13.0 ESR (MFSA 2021-34, bsc#1188891):

- CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
- CVE-2021-29988: Memory corruption as a result of incorrect style treatment
- CVE-2021-29984: Incorrect instruction reordering during JIT optimization
- CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
- CVE-2021-29985: Use-after-free media channels
- CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631064" comment="MozillaFirefox-78.13.0-112.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631065" comment="MozillaFirefox-devel-78.13.0-112.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631066" comment="MozillaFirefox-translations-common-78.13.0-112.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151545" version="1" class="patch">
	<metadata>
		<title>Recommended update for cpio (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1189465" ref_url="https://bugzilla.suse.com/1189465" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<description>
This update for cpio fixes the following issues:

- A regression in the previous update could lead to crashes (bsc#1189465)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-19"/>
	<updated date="2021-08-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1189465">SUSE bug 1189465</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631321" comment="cpio-2.11-36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631320" comment="cpio-lang-2.11-36.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151546" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1185056" ref_url="https://bugzilla.suse.com/1185056" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188566" ref_url="https://bugzilla.suse.com/1188566" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2161" ref_url="https://www.suse.com/security/cve/CVE-2021-2161/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u302 (icedtea 3.20.0)
- CVE-2021-2341: Improve file transfers. (bsc#1188564)
- CVE-2021-2369: Better jar file validation. (bsc#1188565)
- CVE-2021-2388: Enhance compiler validation. (bsc#1188566)
- CVE-2021-2161: Less ambiguous processing. (bsc#1185056)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185056">SUSE bug 1185056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188566">SUSE bug 1188566</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2161/">CVE-2021-2161 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2161">CVE-2021-2161 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2388">CVE-2021-2388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631417" comment="java-1_8_0-openjdk-1.8.0.302-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631418" comment="java-1_8_0-openjdk-demo-1.8.0.302-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631419" comment="java-1_8_0-openjdk-devel-1.8.0.302-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631420" comment="java-1_8_0-openjdk-headless-1.8.0.302-27.63.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151547" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1189465" ref_url="https://bugzilla.suse.com/1189465" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<description>
This update for cpio fixes the following issues:

- A patch previously applied to remedy CVE-2021-38185 introduced a regression
  that had the potential to cause a segmentation fault in cpio. [bsc#1189465]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189465">SUSE bug 1189465</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631581" comment="cpio-2.11-36.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631541" comment="cpio-lang-2.11-36.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151548" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyYAML (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1174514" ref_url="https://bugzilla.suse.com/1174514" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14343" ref_url="https://www.suse.com/security/cve/CVE-2020-14343/" source="CVE"/>
		<description>

This update for python-PyYAML fixes the following issues:

- Update to 5.3.1.

- CVE-2020-14343: A vulnerability was discovered in the PyYAML library,
  where it was susceptible to arbitrary code execution when it processes
  untrusted YAML files through the full_load method or with the FullLoader
  loader. Applications that use the library to process untrusted input
  may be vulnerable to this flaw. This flaw allows an attacker to
  execute arbitrary code on the system by abusing the python/object/new
  constructor. This flaw is due to an incomplete fix for CVE-2020-1747.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174514">SUSE bug 1174514</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14343/">CVE-2020-14343 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14343">CVE-2020-14343 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631706" comment="python-PyYAML-5.3.1-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631707" comment="python3-PyYAML-5.3.1-28.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151549" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
This update for openssl fixes the following security issue:

- CVE-2021-3712: a bug in the code for printing certificate details could lead
  to a buffer overrun that a malicious actor could exploit to crash the
  application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631708" comment="libopenssl-devel-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631709" comment="libopenssl1_0_0-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631678" comment="libopenssl1_0_0-32bit-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631710" comment="libopenssl1_0_0-hmac-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631680" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631711" comment="openssl-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631682" comment="openssl-doc-1.0.2j-60.69.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151550" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1117483" ref_url="https://bugzilla.suse.com/1117483" source="BUGZILLA"/>
		<reference ref_id="1181345" ref_url="https://bugzilla.suse.com/1181345" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27827" ref_url="https://www.suse.com/security/cve/CVE-2020-27827/" source="CVE"/>
		<description>
This update for openvswitch fixes the following issues:
	  
- openvswitch was updated to 2.7.12
- CVE-2020-27827: Fixed a memory leak when parsing lldp packets (bsc#1181345)	  
A lot more minor bugs have been fixed with this openvswitch version. Please refer to the changelog of
the openvswitch.rpm file in order to obtain a list of all changes.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-02"/>
	<updated date="2021-02-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1117483">SUSE bug 1117483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181345">SUSE bug 1181345</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27827/">CVE-2020-27827 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27827">CVE-2020-27827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557071" comment="openvswitch-2.7.12-3.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151551" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.

The following security issues were fixed:

- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009631829" comment="kgraft-patch-4_4_180-94_127-default-14-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151552" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009631830" comment="kgraft-patch-4_4_180-94_130-default-13-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151553" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009631831" comment="kgraft-patch-4_4_180-94_135-default-11-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151554" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following security issues were fixed:

- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009631832" comment="kgraft-patch-4_4_180-94_138-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151555" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.

The following security issues were fixed:

- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009631833" comment="kgraft-patch-4_4_180-94_141-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151556" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes several issues.

The following security issues were fixed:

- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009631834" comment="kgraft-patch-4_4_180-94_144-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151557" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes several issues.

The following security issues were fixed:

- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-28688: The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. (bsc#1183646)
- CVE-2020-0429: Fixed a potential local privilege escalation in l2tp_session_delete and related functions of l2tp_core.c (bsc#1176724).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009631835" comment="kgraft-patch-4_4_180-94_147-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151558" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1188576" ref_url="https://bugzilla.suse.com/1188576" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25051" ref_url="https://www.suse.com/security/cve/CVE-2019-25051/" source="CVE"/>
		<description>
This update for aspell fixes the following issues:

- CVE-2019-25051: Fixed heap-buffer-overflow in acommon:ObjStack:dup_top (bsc#1188576).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188576">SUSE bug 1188576</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25051/">CVE-2019-25051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25051">CVE-2019-25051 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631836" comment="aspell-0.60.6.1-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631837" comment="aspell-ispell-0.60.6.1-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631838" comment="libaspell15-0.60.6.1-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627791" comment="libaspell15-32bit-0.60.6.1-18.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151559" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1175443" ref_url="https://bugzilla.suse.com/1175443" source="BUGZILLA"/>
		<reference ref_id="1188888" ref_url="https://bugzilla.suse.com/1188888" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8622" ref_url="https://www.suse.com/security/cve/CVE-2020-8622/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8622: A truncated TSIG response can lead to an assertion failure (bsc#1175443).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-30"/>
	<updated date="2021-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188888">SUSE bug 1188888</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8622/">CVE-2020-8622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8622">CVE-2020-8622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632085" comment="bind-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632086" comment="bind-chrootenv-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627784" comment="bind-doc-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632087" comment="bind-libs-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627786" comment="bind-libs-32bit-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632088" comment="bind-utils-9.9.9P1-63.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151560" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1188457" ref_url="https://bugzilla.suse.com/1188457" source="BUGZILLA"/>
		<reference ref_id="1188458" ref_url="https://bugzilla.suse.com/1188458" source="BUGZILLA"/>
		<reference ref_id="1188459" ref_url="https://bugzilla.suse.com/1188459" source="BUGZILLA"/>
		<reference ref_id="1188460" ref_url="https://bugzilla.suse.com/1188460" source="BUGZILLA"/>
		<reference ref_id="1188461" ref_url="https://bugzilla.suse.com/1188461" source="BUGZILLA"/>
		<reference ref_id="1188462" ref_url="https://bugzilla.suse.com/1188462" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20298" ref_url="https://www.suse.com/security/cve/CVE-2021-20298/" source="CVE"/>
		<reference ref_id="CVE-2021-20299" ref_url="https://www.suse.com/security/cve/CVE-2021-20299/" source="CVE"/>
		<reference ref_id="CVE-2021-20300" ref_url="https://www.suse.com/security/cve/CVE-2021-20300/" source="CVE"/>
		<reference ref_id="CVE-2021-20302" ref_url="https://www.suse.com/security/cve/CVE-2021-20302/" source="CVE"/>
		<reference ref_id="CVE-2021-20303" ref_url="https://www.suse.com/security/cve/CVE-2021-20303/" source="CVE"/>
		<reference ref_id="CVE-2021-20304" ref_url="https://www.suse.com/security/cve/CVE-2021-20304/" source="CVE"/>
		<reference ref_id="CVE-2021-3476" ref_url="https://www.suse.com/security/cve/CVE-2021-3476/" source="CVE"/>
		<description>
This update for openexr fixes the following issues:

- CVE-2021-20298 [bsc#1188460]: Fixed Out-of-memory in B44Compressor
- CVE-2021-20299 [bsc#1188459]: Fixed Null-dereference READ in Imf_2_5:Header:operator
- CVE-2021-20300 [bsc#1188458]: Fixed Integer-overflow in Imf_2_5:hufUncompress
- CVE-2021-20302 [bsc#1188462]: Fixed Floating-point-exception in Imf_2_5:precalculateTileInfot
- CVE-2021-20303 [bsc#1188457]: Fixed Heap-buffer-overflow in Imf_2_5::copyIntoFrameBuffer
- CVE-2021-20304 [bsc#1188461]: Fixed Undefined-shift in Imf_2_5:hufDecode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188457">SUSE bug 1188457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188458">SUSE bug 1188458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188459">SUSE bug 1188459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188460">SUSE bug 1188460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188461">SUSE bug 1188461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188462">SUSE bug 1188462</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20298/">CVE-2021-20298 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20298">CVE-2021-20298 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20299/">CVE-2021-20299 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20299">CVE-2021-20299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20300/">CVE-2021-20300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20300">CVE-2021-20300 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20302/">CVE-2021-20302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20302">CVE-2021-20302 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-20303/">CVE-2021-20303 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20303">CVE-2021-20303 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20304/">CVE-2021-20304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20304">CVE-2021-20304 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3476/">CVE-2021-3476 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3476">CVE-2021-3476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632300" comment="libIlmImf-Imf_2_1-21-2.1.0-6.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632301" comment="openexr-2.1.0-6.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151561" version="1" class="patch">
	<metadata>
		<title>Security update for libesmtp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1160462" ref_url="https://bugzilla.suse.com/1160462" source="BUGZILLA"/>
		<reference ref_id="1189097" ref_url="https://bugzilla.suse.com/1189097" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19977" ref_url="https://www.suse.com/security/cve/CVE-2019-19977/" source="CVE"/>
		<description>
This update for libesmtp fixes the following issues:

- CVE-2019-19977: Fix stack-based buffer over-read in ntlm/ntlmstruct.c (bsc#1160462).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160462">SUSE bug 1160462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189097">SUSE bug 1189097</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19977/">CVE-2019-19977 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19977">CVE-2019-19977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632302" comment="libesmtp-1.0.6-17.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151562" version="1" class="patch">
	<metadata>
		<title>Security update for file (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1154661" ref_url="https://bugzilla.suse.com/1154661" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18218" ref_url="https://www.suse.com/security/cve/CVE-2019-18218/" source="CVE"/>
		<description>
This update for file fixes the following issues:

- CVE-2019-18218: Fixed heap-based buffer overflow in cdf_read_property_info in cdf.c (bsc#1154661).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154661">SUSE bug 1154661</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18218/">CVE-2019-18218 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18218">CVE-2019-18218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632303" comment="file-5.22-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632304" comment="file-magic-5.22-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632305" comment="libmagic1-5.22-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628154" comment="libmagic1-32bit-5.22-10.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151563" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182654" ref_url="https://bugzilla.suse.com/1182654" source="BUGZILLA"/>
		<reference ref_id="1186429" ref_url="https://bugzilla.suse.com/1186429" source="BUGZILLA"/>
		<reference ref_id="1186433" ref_url="https://bugzilla.suse.com/1186433" source="BUGZILLA"/>
		<reference ref_id="1186434" ref_url="https://bugzilla.suse.com/1186434" source="BUGZILLA"/>
		<reference ref_id="1187369" ref_url="https://bugzilla.suse.com/1187369" source="BUGZILLA"/>
		<reference ref_id="1187376" ref_url="https://bugzilla.suse.com/1187376" source="BUGZILLA"/>
		<reference ref_id="1187378" ref_url="https://bugzilla.suse.com/1187378" source="BUGZILLA"/>
		<reference ref_id="1189373" ref_url="https://bugzilla.suse.com/1189373" source="BUGZILLA"/>
		<reference ref_id="1189376" ref_url="https://bugzilla.suse.com/1189376" source="BUGZILLA"/>
		<reference ref_id="1189378" ref_url="https://bugzilla.suse.com/1189378" source="BUGZILLA"/>
		<reference ref_id="1189380" ref_url="https://bugzilla.suse.com/1189380" source="BUGZILLA"/>
		<reference ref_id="1189882" ref_url="https://bugzilla.suse.com/1189882" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0089" ref_url="https://www.suse.com/security/cve/CVE-2021-0089/" source="CVE"/>
		<reference ref_id="CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255/" source="CVE"/>
		<reference ref_id="CVE-2021-28690" ref_url="https://www.suse.com/security/cve/CVE-2021-28690/" source="CVE"/>
		<reference ref_id="CVE-2021-28692" ref_url="https://www.suse.com/security/cve/CVE-2021-28692/" source="CVE"/>
		<reference ref_id="CVE-2021-28694" ref_url="https://www.suse.com/security/cve/CVE-2021-28694/" source="CVE"/>
		<reference ref_id="CVE-2021-28695" ref_url="https://www.suse.com/security/cve/CVE-2021-28695/" source="CVE"/>
		<reference ref_id="CVE-2021-28696" ref_url="https://www.suse.com/security/cve/CVE-2021-28696/" source="CVE"/>
		<reference ref_id="CVE-2021-28697" ref_url="https://www.suse.com/security/cve/CVE-2021-28697/" source="CVE"/>
		<reference ref_id="CVE-2021-28698" ref_url="https://www.suse.com/security/cve/CVE-2021-28698/" source="CVE"/>
		<reference ref_id="CVE-2021-28699" ref_url="https://www.suse.com/security/cve/CVE-2021-28699/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-3594: slirp: invalid pointer initialization may lead to information disclosure (udp)(bsc#1187378).
- CVE-2021-3595: slirp: invalid pointer initialization may lead to information disclosure (tftp)(bsc#1187376).
- CVE-2021-28698: long running loops in grant table handling (XSA-380)(bsc#1189378).
- CVE-2021-28699: inadequate grant-v2 status frames array bounds check (XSA-382)(bsc#1189380).
- CVE-2021-20255: Fixed stack overflow via infinite recursion in eepro100 (bsc#1182654)
- CVE-2021-28690: xen: x86: TSX Async Abort protections not restored after S3 (bsc#1186434)
- CVE-2021-28692: xen: inappropriate x86 IOMMU timeout detection / handling (bsc#1186429)
- CVE-2021-28694,CVE-2021-28695,CVE-2021-28696: IOMMU page mapping issues on x86 (XSA-378)(bsc#1189373).
- CVE-2021-0089: xen: Speculative Code Store Bypass (bsc#1186433)
- CVE-2021-28697: grant table v2 status pages may remain accessible after de-allocation (XSA-379)(bsc#1189376).
- CVE-2021-3592: slirp: invalid pointer initialization may lead to information disclosure (bootp)(bsc#1187369).

- Prevent superpage allocation in the LAPIC and ACPI_INFO range (bsc#1189882).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-06"/>
	<updated date="2021-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182654">SUSE bug 1182654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186429">SUSE bug 1186429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186433">SUSE bug 1186433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186434">SUSE bug 1186434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187369">SUSE bug 1187369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187376">SUSE bug 1187376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187378">SUSE bug 1187378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189376">SUSE bug 1189376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189378">SUSE bug 1189378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189380">SUSE bug 1189380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189882">SUSE bug 1189882</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0089/">CVE-2021-0089 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0089">CVE-2021-0089 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20255">CVE-2021-20255 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28690/">CVE-2021-28690 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28690">CVE-2021-28690 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-28692/">CVE-2021-28692 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28692">CVE-2021-28692 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28694/">CVE-2021-28694 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28694">CVE-2021-28694 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28695/">CVE-2021-28695 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28695">CVE-2021-28695 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28696/">CVE-2021-28696 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28696">CVE-2021-28696 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28697/">CVE-2021-28697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28697">CVE-2021-28697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28698/">CVE-2021-28698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28698">CVE-2021-28698 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28699/">CVE-2021-28699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28699">CVE-2021-28699 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3595">CVE-2021-3595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632286" comment="xen-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632287" comment="xen-doc-html-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632288" comment="xen-libs-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632289" comment="xen-libs-32bit-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632290" comment="xen-tools-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632291" comment="xen-tools-domU-4.9.4_20-3.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151564" version="1" class="patch">
	<metadata>
		<title>Recommended update for mozilla-nspr, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1029961" ref_url="https://bugzilla.suse.com/1029961" source="BUGZILLA"/>
		<reference ref_id="1174697" ref_url="https://bugzilla.suse.com/1174697" source="BUGZILLA"/>
		<reference ref_id="1176206" ref_url="https://bugzilla.suse.com/1176206" source="BUGZILLA"/>
		<reference ref_id="1176934" ref_url="https://bugzilla.suse.com/1176934" source="BUGZILLA"/>
		<reference ref_id="1179382" ref_url="https://bugzilla.suse.com/1179382" source="BUGZILLA"/>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12400" ref_url="https://www.suse.com/security/cve/CVE-2020-12400/" source="CVE"/>
		<reference ref_id="CVE-2020-12401" ref_url="https://www.suse.com/security/cve/CVE-2020-12401/" source="CVE"/>
		<reference ref_id="CVE-2020-12403" ref_url="https://www.suse.com/security/cve/CVE-2020-12403/" source="CVE"/>
		<reference ref_id="CVE-2020-25648" ref_url="https://www.suse.com/security/cve/CVE-2020-25648/" source="CVE"/>
		<reference ref_id="CVE-2020-6829" ref_url="https://www.suse.com/security/cve/CVE-2020-6829/" source="CVE"/>
		<description>
This update for mozilla-nspr fixes the following issues:

mozilla-nspr was updated to version 4.32:

* implement new socket option PR_SockOpt_DontFrag
* support larger DNS records by increasing the default buffer
  size for DNS queries 
* Lock access to PRCallOnceType members in PR_CallOnce* for
  thread safety bmo#1686138
* PR_GetSystemInfo supports a new flag PR_SI_RELEASE_BUILD to get
  information about the operating system build version.


Mozilla NSS was updated to version 3.68:

* bmo#1713562 - Fix test leak.
* bmo#1717452 - NSS 3.68 should depend on NSPR 4.32.
* bmo#1693206 - Implement PKCS8 export of ECDSA keys.
* bmo#1712883 - DTLS 1.3 draft-43.
* bmo#1655493 - Support SHA2 HW acceleration using Intel SHA Extension.
* bmo#1713562 - Validate ECH public names.
* bmo#1717610 - Add function to get seconds from epoch from pkix::Time.

update to NSS 3.67

* bmo#1683710 - Add a means to disable ALPN.
* bmo#1715720 - Fix nssckbi version number in NSS 3.67 (was supposed to be incremented in 3.66).
* bmo#1714719 - Set NSS_USE_64 on riscv64 target when using GYP/Ninja.
* bmo#1566124 - Fix counter increase in ppc-gcm-wrap.c.
* bmo#1566124 - Fix AES_GCM mode on ppc64le for messages of length more than 255-byte.

update to NSS 3.66

* bmo#1710716 - Remove Expired Sonera Class2 CA from NSS.
* bmo#1710716 - Remove Expired Root Certificates from NSS - QuoVadis Root Certification Authority.
* bmo#1708307 - Remove Trustis FPS Root CA from NSS.
* bmo#1707097 - Add Certum Trusted Root CA to NSS.
* bmo#1707097 - Add Certum EC-384 CA to NSS.
* bmo#1703942 - Add ANF Secure Server Root CA to NSS.
* bmo#1697071 - Add GLOBALTRUST 2020 root cert to NSS.
* bmo#1712184 - NSS tools manpages need to be updated to reflect that sqlite is the default database.
* bmo#1712230 - Don't build ppc-gcm.s with clang integrated assembler.
* bmo#1712211 - Strict prototype error when trying to compile nss code that includes blapi.h.
* bmo#1710773 - NSS needs FIPS 180-3 FIPS indicators.
* bmo#1709291 - Add VerifyCodeSigningCertificateChain.

update to NSS 3.65

* bmo#1709654 - Update for NetBSD configuration.
* bmo#1709750 - Disable HPKE test when fuzzing.
* bmo#1566124 - Optimize AES-GCM for ppc64le.
* bmo#1699021 - Add AES-256-GCM to HPKE.
* bmo#1698419 - ECH -10 updates.
* bmo#1692930 - Update HPKE to final version.
* bmo#1707130 - NSS should use modern algorithms in PKCS#12 files by default.
* bmo#1703936 - New coverity/cpp scanner errors.
* bmo#1697303 - NSS needs to update it's csp clearing to FIPS 180-3 standards.
* bmo#1702663 - Need to support RSA PSS with Hashing PKCS #11 Mechanisms.
* bmo#1705119 - Deadlock when using GCM and non-thread safe tokens.

update to NSS 3.64

* bmo#1705286 - Properly detect mips64.
* bmo#1687164 - Introduce NSS_DISABLE_CRYPTO_VSX and
		disable_crypto_vsx.
* bmo#1698320 - replace __builtin_cpu_supports('vsx') with
		ppc_crypto_support() for clang.
* bmo#1613235 - Add POWER ChaCha20 stream cipher vector
		acceleration.

Fixed in 3.63

* bmo#1697380 - Make a clang-format run on top of helpful contributions.
* bmo#1683520 - ECCKiila P384, change syntax of nested structs
		initialization to prevent build isses with GCC 4.8.
* bmo#1683520 - [lib/freebl/ecl] P-384: allow zero scalars in dual
		scalar multiplication.
* bmo#1683520 - ECCKiila P521, change syntax of nested structs
		initialization to prevent build isses with GCC 4.8.
* bmo#1683520 - [lib/freebl/ecl] P-521: allow zero scalars in dual
		scalar multiplication.
* bmo#1696800 - HACL* update March 2021 - c95ab70fcb2bc21025d8845281bc4bc8987ca683.
* bmo#1694214 - tstclnt can't enable middlebox compat mode.
* bmo#1694392 - NSS does not work with PKCS #11 modules not supporting
		profiles.
* bmo#1685880 - Minor fix to prevent unused variable on early return.
* bmo#1685880 - Fix for the gcc compiler version 7 to support setenv
		with nss build.
* bmo#1693217 - Increase nssckbi.h version number for March 2021 batch
		of root CA changes, CA list version 2.48.
* bmo#1692094 - Set email distrust after to 21-03-01 for Camerfirma's
		'Chambers of Commerce' and 'Global Chambersign' roots.
* bmo#1618407 - Symantec root certs - Set CKA_NSS_EMAIL_DISTRUST_AFTER.
* bmo#1693173 - Add GlobalSign R45, E45, R46, and E46 root certs to NSS.
* bmo#1683738 - Add AC RAIZ FNMT-RCM SERVIDORES SEGUROS root cert to NSS.
* bmo#1686854 - Remove GeoTrust PCA-G2 and VeriSign Universal root certs
		from NSS.
* bmo#1687822 - Turn off Websites trust bit for the “Staat der
		Nederlanden Root CA - G3” root cert in NSS.
* bmo#1692094 - Turn off Websites Trust Bit for 'Chambers of Commerce
		Root - 2008' and 'Global Chambersign Root - 2008’.
* bmo#1694291 - Tracing fixes for ECH.

update to NSS 3.62

* bmo#1688374 - Fix parallel build NSS-3.61 with make
* bmo#1682044 - pkix_Build_GatherCerts() + pkix_CacheCert_Add()
		can corrupt 'cachedCertTable'
* bmo#1690583 - Fix CH padding extension size calculation
* bmo#1690421 - Adjust 3.62 ABI report formatting for new libabigail
* bmo#1690421 - Install packaged libabigail in docker-builds image
* bmo#1689228 - Minor ECH -09 fixes for interop testing, fuzzing
* bmo#1674819 - Fixup a51fae403328, enum type may be signed
* bmo#1681585 - Add ECH support to selfserv
* bmo#1681585 - Update ECH to Draft-09
* bmo#1678398 - Add Export/Import functions for HPKE context
* bmo#1678398 - Update HPKE to draft-07

update to NSS 3.61

* bmo#1682071 - Fix issue with IKE Quick mode deriving incorrect key
		values under certain conditions.
* bmo#1684300 - Fix default PBE iteration count when NSS is compiled
		with NSS_DISABLE_DBM.
* bmo#1651411 - Improve constant-timeness in RSA operations.
* bmo#1677207 - Upgrade Google Test version to latest release.
* bmo#1654332 - Add aarch64-make target to nss-try.

Update to NSS 3.60.1:

Notable changes in NSS 3.60:
* TLS 1.3 Encrypted Client Hello (draft-ietf-tls-esni-08) support
  has been added, replacing the previous ESNI (draft-ietf-tls-esni-01)
  implementation. See bmo#1654332 for more information.
* December 2020 batch of Root CA changes, builtins library updated
  to version 2.46. See bmo#1678189, bmo#1678166, and bmo#1670769
  for more information.

Update to NSS 3.59.1:

* bmo#1679290 - Fix potential deadlock with certain third-party
		PKCS11 modules

Update to NSS 3.59:

Notable changes:

* Exported two existing functions from libnss:
  CERT_AddCertToListHeadWithData and CERT_AddCertToListTailWithData

Bugfixes

* bmo#1607449 - Lock cert-&gt;nssCertificate to prevent a potential data race
* bmo#1672823 - Add Wycheproof test cases for HMAC, HKDF, and DSA
* bmo#1663661 - Guard against NULL token in nssSlot_IsTokenPresent
* bmo#1670835 - Support enabling and disabling signatures via Crypto Policy
* bmo#1672291 - Resolve libpkix OCSP failures on SHA1 self-signed
		root certs when SHA1 signatures are disabled.
* bmo#1644209 - Fix broken SelectedCipherSuiteReplacer filter to
		solve some test intermittents
* bmo#1672703 - Tolerate the first CCS in TLS 1.3 to fix a regression in
		our CVE-2020-25648 fix that broke purple-discord
		(boo#1179382)
* bmo#1666891 - Support key wrap/unwrap with RSA-OAEP
* bmo#1667989 - Fix gyp linking on Solaris
* bmo#1668123 - Export CERT_AddCertToListHeadWithData and
		CERT_AddCertToListTailWithData from libnss
* bmo#1634584 - Set CKA_NSS_SERVER_DISTRUST_AFTER for Trustis FPS Root CA
* bmo#1663091 - Remove unnecessary assertions in the streaming
		ASN.1 decoder that affected decoding certain PKCS8
		private keys when using NSS debug builds
*  bmo#670839 - Use ARM crypto extension for AES, SHA1 and SHA2 on MacOS.

update to NSS 3.58

Bugs fixed:

* bmo#1641480 (CVE-2020-25648)
  Tighten CCS handling for middlebox compatibility mode.
* bmo#1631890 - Add support for Hybrid Public Key Encryption
  (draft-irtf-cfrg-hpke) support for TLS Encrypted Client Hello
  (draft-ietf-tls-esni).
* bmo#1657255 - Add CI tests that disable SHA1/SHA2 ARM crypto
  extensions.
* bmo#1668328 - Handle spaces in the Python path name when using
  gyp on Windows.
* bmo#1667153 - Add PK11_ImportDataKey for data object import.
* bmo#1665715 - Pass the embedded SCT list extension (if present)
  to TrustDomain::CheckRevocation instead of the notBefore value.

update to NSS 3.57

* The following CA certificates were Added:
  bmo#1663049 - CN=Trustwave Global Certification Authority
      SHA-256 Fingerprint: 97552015F5DDFC3C8788C006944555408894450084F100867086BC1A2BB58DC8
  bmo#1663049 - CN=Trustwave Global ECC P256 Certification Authority
      SHA-256 Fingerprint: 945BBC825EA554F489D1FD51A73DDF2EA624AC7019A05205225C22A78CCFA8B4
  bmo#1663049 - CN=Trustwave Global ECC P384 Certification Authority
      SHA-256 Fingerprint: 55903859C8C0C3EBB8759ECE4E2557225FF5758BBD38EBD48276601E1BD58097
* The following CA certificates were Removed:
  bmo#1651211 - CN=EE Certification Centre Root CA
      SHA-256 Fingerprint: 3E84BA4342908516E77573C0992F0979CA084E4685681FF195CCBA8A229B8A76
  bmo#1656077 - O=Government Root Certification Authority; C=TW
      SHA-256 Fingerprint: 7600295EEFE85B9E1FD624DB76062AAAAE59818A54D2774CD4C0B2C01131E1B3
* Trust settings for the following CA certificates were Modified:
  bmo#1653092 - CN=OISTE WISeKey Global Root GA CA
      Websites (server authentication) trust bit removed.
* https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.57_release_notes

update to NSS 3.56

Notable changes

* bmo#1650702 - Support SHA-1 HW acceleration on ARMv8
* bmo#1656981 - Use MPI comba and mulq optimizations on x86-64 MacOS.
* bmo#1654142 - Add CPU feature detection for Intel SHA extension.
* bmo#1648822 - Add stricter validation of DH keys in FIPS mode.
* bmo#1656986 - Properly detect arm64 during GYP build architecture
		detection.
* bmo#1652729 - Add build flag to disable RC2 and relocate to
		lib/freebl/deprecated.
* bmo#1656429 - Correct RTT estimate used in 0-RTT anti-replay.
* bmo#1588941 - Send empty certificate message when scheme selection
		fails.
* bmo#1652032 - Fix failure to build in Windows arm64 makefile
		cross-compilation.
* bmo#1625791 - Fix deadlock issue in nssSlot_IsTokenPresent.
* bmo#1653975 - Fix 3.53 regression by setting 'all' as the default
		makefile target.
* bmo#1659792 - Fix broken libpkix tests with unexpired PayPal cert.
* bmo#1659814 - Fix interop.sh failures with newer tls-interop
		commit and dependencies.
* bmo#1656519 - NSPR dependency updated to 4.28

update to NSS 3.55

Notable changes
* P384 and P521 elliptic curve implementations are replaced with
  verifiable implementations from Fiat-Crypto [0] and ECCKiila [1].
* PK11_FindCertInSlot is added. With this function, a given slot
  can be queried with a DER-Encoded certificate, providing performance
  and usability improvements over other mechanisms. (bmo#1649633)
* DTLS 1.3 implementation is updated to draft-38. (bmo#1647752)

Relevant Bugfixes

* bmo#1631583 (CVE-2020-6829, CVE-2020-12400) - Replace P384 and
  P521 with new, verifiable implementations from Fiat-Crypto and ECCKiila.
* bmo#1649487 - Move overzealous assertion in VFY_EndWithSignature.
* bmo#1631573 (CVE-2020-12401) - Remove unnecessary scalar padding.
* bmo#1636771 (CVE-2020-12403) - Explicitly disable multi-part
  ChaCha20 (which was not functioning correctly) and more strictly
  enforce tag length.
* bmo#1649648 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1649316 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1649322 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1653202 - Fix initialization bug in blapitest when compiled
  with NSS_DISABLE_DEPRECATED_SEED.
* bmo#1646594 - Fix AVX2 detection in makefile builds.
* bmo#1649633 - Add PK11_FindCertInSlot to search a given slot
  for a DER-encoded certificate.
* bmo#1651520 - Fix slotLock race in NSC_GetTokenInfo.
* bmo#1647752 - Update DTLS 1.3 implementation to draft-38.
* bmo#1649190 - Run cipher, sdr, and ocsp tests under standard test cycle in CI.
* bmo#1649226 - Add Wycheproof ECDSA tests.
* bmo#1637222 - Consistently enforce IV requirements for DES and 3DES.
* bmo#1067214 - Enforce minimum PKCS#1 v1.5 padding length in
  RSA_CheckSignRecover.
* bmo#1646324 - Advertise PKCS#1 schemes for certificates in the
  signature_algorithms extension.

update to NSS 3.54

Notable changes

* Support for TLS 1.3 external pre-shared keys (bmo#1603042).
* Use ARM Cryptography Extension for SHA256, when available
  (bmo#1528113)
* The following CA certificates were Added:
  bmo#1645186 - certSIGN Root CA G2.
  bmo#1645174 - e-Szigno Root CA 2017.
  bmo#1641716 - Microsoft ECC Root Certificate Authority 2017.
  bmo#1641716 - Microsoft RSA Root Certificate Authority 2017.
* The following CA certificates were Removed:
  bmo#1645199 - AddTrust Class 1 CA Root.
  bmo#1645199 - AddTrust External CA Root.
  bmo#1641718 - LuxTrust Global Root 2.
  bmo#1639987 - Staat der Nederlanden Root CA - G2.
  bmo#1618402 - Symantec Class 2 Public Primary Certification Authority - G4.
  bmo#1618402 - Symantec Class 1 Public Primary Certification Authority - G4.
  bmo#1618402 - VeriSign Class 3 Public Primary Certification Authority - G3.

* A number of certificates had their Email trust bit disabled.
  See bmo#1618402 for a complete list.

Bugs fixed

* bmo#1528113 - Use ARM Cryptography Extension for SHA256.
* bmo#1603042 - Add TLS 1.3 external PSK support.
* bmo#1642802 - Add uint128 support for HACL* curve25519 on Windows.
* bmo#1645186 - Add 'certSIGN Root CA G2' root certificate.
* bmo#1645174 - Add Microsec's 'e-Szigno Root CA 2017' root certificate.
* bmo#1641716 - Add Microsoft's non-EV root certificates.
* bmo1621151 - Disable email trust bit for 'O=Government
	       Root Certification Authority; C=TW' root.
* bmo#1645199 - Remove AddTrust root certificates.
* bmo#1641718 - Remove 'LuxTrust Global Root 2' root certificate.
* bmo#1639987 - Remove 'Staat der Nederlanden Root CA - G2' root
		certificate.
* bmo#1618402 - Remove Symantec root certificates and disable email trust
		bit.
* bmo#1640516 - NSS 3.54 should depend on NSPR 4.26.
* bmo#1642146 - Fix undefined reference to `PORT_ZAlloc_stub' in seed.c.
* bmo#1642153 - Fix infinite recursion building NSS.
* bmo#1642638 - Fix fuzzing assertion crash.
* bmo#1642871 - Enable SSL_SendSessionTicket after resumption.
* bmo#1643123 - Support SSL_ExportEarlyKeyingMaterial with External PSKs.
* bmo#1643557 - Fix numerous compile warnings in NSS.
* bmo#1644774 - SSL gtests to use ClearServerCache when resetting
		self-encrypt keys.
* bmo#1645479 - Don't use SECITEM_MakeItem in secutil.c.
* bmo#1646520 - Stricter enforcement of ASN.1 INTEGER encoding.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029961">SUSE bug 1029961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174697">SUSE bug 1174697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176206">SUSE bug 1176206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176934">SUSE bug 1176934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179382">SUSE bug 1179382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12400/">CVE-2020-12400 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12400">CVE-2020-12400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12401/">CVE-2020-12401 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12401">CVE-2020-12401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12403/">CVE-2020-12403 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12403">CVE-2020-12403 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25648/">CVE-2020-25648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25648">CVE-2020-25648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6829/">CVE-2020-6829 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6829">CVE-2020-6829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633061" comment="libfreebl3-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633045" comment="libfreebl3-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633062" comment="libfreebl3-hmac-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633047" comment="libfreebl3-hmac-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633063" comment="libsoftokn3-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633049" comment="libsoftokn3-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633064" comment="libsoftokn3-hmac-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633051" comment="libsoftokn3-hmac-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633065" comment="mozilla-nspr-4.32-19.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633053" comment="mozilla-nspr-32bit-4.32-19.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633066" comment="mozilla-nspr-devel-4.32-19.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633067" comment="mozilla-nss-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633055" comment="mozilla-nss-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633068" comment="mozilla-nss-certs-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633057" comment="mozilla-nss-certs-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633069" comment="mozilla-nss-devel-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633070" comment="mozilla-nss-sysinit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633059" comment="mozilla-nss-sysinit-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633071" comment="mozilla-nss-tools-3.68-58.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151565" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1136882" ref_url="https://bugzilla.suse.com/1136882" source="BUGZILLA"/>
		<reference ref_id="1159130" ref_url="https://bugzilla.suse.com/1159130" source="BUGZILLA"/>
		<reference ref_id="1159293" ref_url="https://bugzilla.suse.com/1159293" source="BUGZILLA"/>
		<reference ref_id="1161698" ref_url="https://bugzilla.suse.com/1161698" source="BUGZILLA"/>
		<reference ref_id="1186329" ref_url="https://bugzilla.suse.com/1186329" source="BUGZILLA"/>
		<reference ref_id="1189325" ref_url="https://bugzilla.suse.com/1189325" source="BUGZILLA"/>
		<reference ref_id="1189343" ref_url="https://bugzilla.suse.com/1189343" source="BUGZILLA"/>
		<reference ref_id="1189345" ref_url="https://bugzilla.suse.com/1189345" source="BUGZILLA"/>
		<reference ref_id="1189346" ref_url="https://bugzilla.suse.com/1189346" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19555" ref_url="https://www.suse.com/security/cve/CVE-2019-19555/" source="CVE"/>
		<reference ref_id="CVE-2019-19746" ref_url="https://www.suse.com/security/cve/CVE-2019-19746/" source="CVE"/>
		<reference ref_id="CVE-2019-19797" ref_url="https://www.suse.com/security/cve/CVE-2019-19797/" source="CVE"/>
		<reference ref_id="CVE-2020-21680" ref_url="https://www.suse.com/security/cve/CVE-2020-21680/" source="CVE"/>
		<reference ref_id="CVE-2020-21681" ref_url="https://www.suse.com/security/cve/CVE-2020-21681/" source="CVE"/>
		<reference ref_id="CVE-2020-21682" ref_url="https://www.suse.com/security/cve/CVE-2020-21682/" source="CVE"/>
		<reference ref_id="CVE-2020-21683" ref_url="https://www.suse.com/security/cve/CVE-2020-21683/" source="CVE"/>
		<reference ref_id="CVE-2021-3561" ref_url="https://www.suse.com/security/cve/CVE-2021-3561/" source="CVE"/>
		<description>
This update for transfig fixes the following issues:

Update to version 3.2.8, including fixes for

- CVE-2021-3561: overflow in fig2dev/read.c in function read_colordef() (bsc#1186329).
- CVE-2020-21683: Fixed buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c (bsc#1189325).
- CVE-2020-21682: Fixed buffer overflow in the set_fill component in genge.c (bsc#1189346).
- CVE-2020-21681: Fixed buffer overflow in the set_color component in genge.c (bsc#1189345).
- CVE-2020-21680: Fixed stack-based buffer overflow in the put_arrow() component in genpict2e.c (bsc#1189343).
- CVE-2019-19797: out-of-bounds write in read_colordef in read.c (bsc#1159293).
- CVE-2019-19555: stack-based buffer overflow because of an incorrect sscanf (bsc#1161698).
- CVE-2019-19746: segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type (bsc#1159130).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1136882">SUSE bug 1136882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159130">SUSE bug 1159130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159293">SUSE bug 1159293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161698">SUSE bug 1161698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186329">SUSE bug 1186329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189325">SUSE bug 1189325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189343">SUSE bug 1189343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189345">SUSE bug 1189345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189346">SUSE bug 1189346</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19555/">CVE-2019-19555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19555">CVE-2019-19555 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19746/">CVE-2019-19746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19746">CVE-2019-19746 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19797/">CVE-2019-19797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19797">CVE-2019-19797 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21680/">CVE-2020-21680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21680">CVE-2020-21680 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21681/">CVE-2020-21681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21681">CVE-2020-21681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21682/">CVE-2020-21682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21682">CVE-2020-21682 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21683/">CVE-2020-21683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21683">CVE-2020-21683 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3561/">CVE-2021-3561 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3561">CVE-2021-3561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633022" comment="transfig-3.2.8a-2.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151566" version="1" class="patch">
	<metadata>
		<title>Security update for gtk-vnc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1024266" ref_url="https://bugzilla.suse.com/1024266" source="BUGZILLA"/>
		<reference ref_id="1024268" ref_url="https://bugzilla.suse.com/1024268" source="BUGZILLA"/>
		<reference ref_id="1046782" ref_url="https://bugzilla.suse.com/1046782" source="BUGZILLA"/>
		<reference ref_id="1188292" ref_url="https://bugzilla.suse.com/1188292" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5884" ref_url="https://www.suse.com/security/cve/CVE-2017-5884/" source="CVE"/>
		<reference ref_id="CVE-2017-5885" ref_url="https://www.suse.com/security/cve/CVE-2017-5885/" source="CVE"/>
		<description>
This update for gtk-vnc fixes the following issues:

- CVE-2017-5885: Correctly validate color map range indexes (bsc#1024268).
- CVE-2017-5884: Fix bounds checking for RRE, hextile &amp; copyrect encodings (bsc#1024266).
- Fix crash when opening connection from a GSocketAddress (bsc#1046782).
- Fix possible crash on connection failure (bsc#1188292).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024266">SUSE bug 1024266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024268">SUSE bug 1024268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046782">SUSE bug 1046782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188292">SUSE bug 1188292</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5884/">CVE-2017-5884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5884">CVE-2017-5884 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5885/">CVE-2017-5885 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5885">CVE-2017-5885 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633023" comment="libgtk-vnc-1_0-0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633024" comment="libgtk-vnc-2_0-0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633025" comment="libgvnc-1_0-0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633026" comment="python-gtk-vnc-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633027" comment="typelib-1_0-GVnc-1_0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633028" comment="typelib-1_0-GtkVnc-2_0-0.6.0-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151567" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712. 
  Read buffer overruns processing ASN.1 strings (bsc#1189521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-20"/>
	<updated date="2021-09-20"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633638" comment="libopenssl-devel-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633639" comment="libopenssl1_0_0-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632401" comment="libopenssl1_0_0-32bit-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633640" comment="libopenssl1_0_0-hmac-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632403" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633641" comment="openssl-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632405" comment="openssl-doc-1.0.2j-60.72.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151568" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1190381" ref_url="https://bugzilla.suse.com/1190381" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3781" ref_url="https://www.suse.com/security/cve/CVE-2021-3781/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2021-3781: Fixed a trivial -dSAFER bypass command injection (bsc#1190381)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-21"/>
	<updated date="2021-09-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1190381">SUSE bug 1190381</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3781/">CVE-2021-3781 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3781">CVE-2021-3781 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633669" comment="ghostscript-9.52-23.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633670" comment="ghostscript-devel-9.52-23.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633671" comment="ghostscript-x11-9.52-23.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633672" comment="libspectre-devel-0.2.7-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633673" comment="libspectre1-0.2.7-12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151569" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.1.0 ESR.

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-22"/>
	<updated date="2021-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29981">CVE-2021-29981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29982">CVE-2021-29982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29983">CVE-2021-29983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29987">CVE-2021-29987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29990">CVE-2021-29990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29991">CVE-2021-29991 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38492">CVE-2021-38492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38495">CVE-2021-38495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633854" comment="MozillaFirefox-91.1.0-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633855" comment="MozillaFirefox-branding-SLE-91-35.6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633856" comment="MozillaFirefox-devel-91.1.0-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633857" comment="MozillaFirefox-translations-common-91.1.0-112.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151570" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009633919" comment="kgraft-patch-4_4_180-94_135-default-12-2.3 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151571" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009633920" comment="kgraft-patch-4_4_180-94_147-default-3-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151572" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009633921" comment="kgraft-patch-4_4_180-94_144-default-6-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151573" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009633922" comment="kgraft-patch-4_4_180-94_141-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151574" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009633923" comment="kgraft-patch-4_4_180-94_138-default-10-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151575" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 20 [bsc#1180063,bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14781 CVE-2020-14779
  CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class libraries:
    - SOCKETADAPTOR$SOCKETINPUTSTREAM.READ is blocking for more time
      that the set timeout
    - Z/OS specific C function send_file is changing the file pointer
      position
  * Java Virtual Machine:
    - Crash on iterate java stack
    - Java process hang on SIGTERM
  * JIT Compiler:
    - JMS performance regression from JDK8 SR5 FP40 TO FP41

  * Class Libraries:
    - z15 high utilization following Z/VM and Linux migration from
      z14 To z15
  * Java Virtual Machine:
    - Assertion failed when trying to write a class file
    - Assertion failure at modronapi.cpp
    - Improve the performance of defining and finding classes
  * JIT Compiler:
    - An assert in ppcbinaryencoding.cpp may trigger when running
      with traps disabled on power
    - AOT field offset off by n bytes
    - Segmentation fault in jit module on ibm z platform		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531863" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531865" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151576" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009633924" comment="kgraft-patch-4_4_180-94_130-default-14-2.3 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151577" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1189373" ref_url="https://bugzilla.suse.com/1189373" source="BUGZILLA"/>
		<reference ref_id="1189378" ref_url="https://bugzilla.suse.com/1189378" source="BUGZILLA"/>
		<reference ref_id="1189632" ref_url="https://bugzilla.suse.com/1189632" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28701" ref_url="https://www.suse.com/security/cve/CVE-2021-28701/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-28701: Fixed race condition in XENMAPSPACE_grant_table handling (XSA-384) (bsc#1189632).

- Integrate bugfixes (bsc#1189373, bsc#1189378).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189378">SUSE bug 1189378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189632">SUSE bug 1189632</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28701/">CVE-2021-28701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28701">CVE-2021-28701 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633441" comment="xen-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633442" comment="xen-doc-html-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633443" comment="xen-libs-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633444" comment="xen-libs-32bit-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633445" comment="xen-tools-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633446" comment="xen-tools-domU-4.9.4_22-3.94.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151578" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1157818" ref_url="https://bugzilla.suse.com/1157818" source="BUGZILLA"/>
		<reference ref_id="1158812" ref_url="https://bugzilla.suse.com/1158812" source="BUGZILLA"/>
		<reference ref_id="1158958" ref_url="https://bugzilla.suse.com/1158958" source="BUGZILLA"/>
		<reference ref_id="1158959" ref_url="https://bugzilla.suse.com/1158959" source="BUGZILLA"/>
		<reference ref_id="1158960" ref_url="https://bugzilla.suse.com/1158960" source="BUGZILLA"/>
		<reference ref_id="1159491" ref_url="https://bugzilla.suse.com/1159491" source="BUGZILLA"/>
		<reference ref_id="1159715" ref_url="https://bugzilla.suse.com/1159715" source="BUGZILLA"/>
		<reference ref_id="1159847" ref_url="https://bugzilla.suse.com/1159847" source="BUGZILLA"/>
		<reference ref_id="1159850" ref_url="https://bugzilla.suse.com/1159850" source="BUGZILLA"/>
		<reference ref_id="1160309" ref_url="https://bugzilla.suse.com/1160309" source="BUGZILLA"/>
		<reference ref_id="1160438" ref_url="https://bugzilla.suse.com/1160438" source="BUGZILLA"/>
		<reference ref_id="1160439" ref_url="https://bugzilla.suse.com/1160439" source="BUGZILLA"/>
		<reference ref_id="1164719" ref_url="https://bugzilla.suse.com/1164719" source="BUGZILLA"/>
		<reference ref_id="1172091" ref_url="https://bugzilla.suse.com/1172091" source="BUGZILLA"/>
		<reference ref_id="1172115" ref_url="https://bugzilla.suse.com/1172115" source="BUGZILLA"/>
		<reference ref_id="1172234" ref_url="https://bugzilla.suse.com/1172234" source="BUGZILLA"/>
		<reference ref_id="1172236" ref_url="https://bugzilla.suse.com/1172236" source="BUGZILLA"/>
		<reference ref_id="1172240" ref_url="https://bugzilla.suse.com/1172240" source="BUGZILLA"/>
		<reference ref_id="1173641" ref_url="https://bugzilla.suse.com/1173641" source="BUGZILLA"/>
		<reference ref_id="928700" ref_url="https://bugzilla.suse.com/928700" source="BUGZILLA"/>
		<reference ref_id="928701" ref_url="https://bugzilla.suse.com/928701" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3414" ref_url="https://www.suse.com/security/cve/CVE-2015-3414/" source="CVE"/>
		<reference ref_id="CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415/" source="CVE"/>
		<reference ref_id="CVE-2016-6153" ref_url="https://www.suse.com/security/cve/CVE-2016-6153/" source="CVE"/>
		<reference ref_id="CVE-2017-10989" ref_url="https://www.suse.com/security/cve/CVE-2017-10989/" source="CVE"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<reference ref_id="CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740/" source="CVE"/>
		<reference ref_id="CVE-2019-16168" ref_url="https://www.suse.com/security/cve/CVE-2019-16168/" source="CVE"/>
		<reference ref_id="CVE-2019-19244" ref_url="https://www.suse.com/security/cve/CVE-2019-19244/" source="CVE"/>
		<reference ref_id="CVE-2019-19317" ref_url="https://www.suse.com/security/cve/CVE-2019-19317/" source="CVE"/>
		<reference ref_id="CVE-2019-19603" ref_url="https://www.suse.com/security/cve/CVE-2019-19603/" source="CVE"/>
		<reference ref_id="CVE-2019-19645" ref_url="https://www.suse.com/security/cve/CVE-2019-19645/" source="CVE"/>
		<reference ref_id="CVE-2019-19646" ref_url="https://www.suse.com/security/cve/CVE-2019-19646/" source="CVE"/>
		<reference ref_id="CVE-2019-19880" ref_url="https://www.suse.com/security/cve/CVE-2019-19880/" source="CVE"/>
		<reference ref_id="CVE-2019-19923" ref_url="https://www.suse.com/security/cve/CVE-2019-19923/" source="CVE"/>
		<reference ref_id="CVE-2019-19924" ref_url="https://www.suse.com/security/cve/CVE-2019-19924/" source="CVE"/>
		<reference ref_id="CVE-2019-19925" ref_url="https://www.suse.com/security/cve/CVE-2019-19925/" source="CVE"/>
		<reference ref_id="CVE-2019-19926" ref_url="https://www.suse.com/security/cve/CVE-2019-19926/" source="CVE"/>
		<reference ref_id="CVE-2019-19959" ref_url="https://www.suse.com/security/cve/CVE-2019-19959/" source="CVE"/>
		<reference ref_id="CVE-2019-20218" ref_url="https://www.suse.com/security/cve/CVE-2019-20218/" source="CVE"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<reference ref_id="CVE-2020-13434" ref_url="https://www.suse.com/security/cve/CVE-2020-13434/" source="CVE"/>
		<reference ref_id="CVE-2020-13435" ref_url="https://www.suse.com/security/cve/CVE-2020-13435/" source="CVE"/>
		<reference ref_id="CVE-2020-13630" ref_url="https://www.suse.com/security/cve/CVE-2020-13630/" source="CVE"/>
		<reference ref_id="CVE-2020-13631" ref_url="https://www.suse.com/security/cve/CVE-2020-13631/" source="CVE"/>
		<reference ref_id="CVE-2020-13632" ref_url="https://www.suse.com/security/cve/CVE-2020-13632/" source="CVE"/>
		<reference ref_id="CVE-2020-15358" ref_url="https://www.suse.com/security/cve/CVE-2020-15358/" source="CVE"/>
		<reference ref_id="CVE-2020-9327" ref_url="https://www.suse.com/security/cve/CVE-2020-9327/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

sqlite3 is sync version 3.36.0 from Factory (jsc#SLE-16032).

The following CVEs have been fixed in upstream releases up to
this point, but were not mentioned in the change log so far:

* bsc#1173641, CVE-2020-15358: heap-based buffer overflow in
  multiSelectOrderBy due to mishandling of query-flattener
  optimization
* bsc#1164719, CVE-2020-9327: NULL pointer dereference and
  segmentation fault because of generated column optimizations in
  isAuxiliaryVtabOperator
* bsc#1160439, CVE-2019-20218: selectExpander in select.c proceeds
  with WITH stack unwinding even after a parsing error
* bsc#1160438, CVE-2019-19959: memory-management error via
  ext/misc/zipfile.c involving embedded '\0' input
* bsc#1160309, CVE-2019-19923: improper handling  of  certain uses
  of SELECT DISTINCT in flattenSubquery may lead to null pointer
  dereference
* bsc#1159850, CVE-2019-19924: improper error handling in
  sqlite3WindowRewrite()
* bsc#1159847, CVE-2019-19925: improper handling of NULL pathname
  during an update of a ZIP archive
* bsc#1159715, CVE-2019-19926: improper handling  of certain
  errors during parsing  multiSelect in select.c
* bsc#1159491, CVE-2019-19880: exprListAppendList in window.c
  allows attackers to trigger an invalid pointer dereference
* bsc#1158960, CVE-2019-19603: during handling of CREATE TABLE
  and CREATE VIEW statements, does not consider confusion with
  a shadow table name
* bsc#1158959, CVE-2019-19646: pragma.c mishandles NOT NULL in an
  integrity_check PRAGMA command in certain cases of generated
  columns
* bsc#1158958, CVE-2019-19645: alter.c allows attackers to trigger
  infinite recursion via certain types of self-referential views
  in conjunction with ALTER TABLE statements
* bsc#1158812, CVE-2019-19317: lookupName in resolve.c omits bits
  from the colUsed bitmask in the case of a generated column,
  which allows attackers to cause a denial of service
* bsc#1157818, CVE-2019-19244: sqlite3,sqlite2,sqlite: The
  function sqlite3Select in select.c allows a crash if a
  sub-select uses both DISTINCT and window functions, and also
  has certain ORDER BY usage
* bsc#928701, CVE-2015-3415: sqlite3VdbeExec comparison operator
  vulnerability
* bsc#928700, CVE-2015-3414: sqlite3,sqlite2: dequoting of
  collation-sequence names
* CVE-2020-13434 bsc#1172115: integer overflow in
  sqlite3_str_vappendf
* CVE-2020-13630 bsc#1172234: use-after-free in fts3EvalNextRow
* CVE-2020-13631 bsc#1172236: virtual table allowed to be renamed
  to one of its shadow tables
* CVE-2020-13632 bsc#1172240: NULL pointer dereference via
  crafted matchinfo() query
* CVE-2020-13435: Malicious SQL statements could have crashed the
  process that is running SQLite (bsc#1172091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157818">SUSE bug 1157818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158812">SUSE bug 1158812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158958">SUSE bug 1158958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158959">SUSE bug 1158959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158960">SUSE bug 1158960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159491">SUSE bug 1159491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159715">SUSE bug 1159715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159847">SUSE bug 1159847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159850">SUSE bug 1159850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160309">SUSE bug 1160309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160438">SUSE bug 1160438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160439">SUSE bug 1160439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164719">SUSE bug 1164719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172091">SUSE bug 1172091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172115">SUSE bug 1172115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172234">SUSE bug 1172234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172236">SUSE bug 1172236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172240">SUSE bug 1172240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173641">SUSE bug 1173641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3414/">CVE-2015-3414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3414">CVE-2015-3414 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3415">CVE-2015-3415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6153/">CVE-2016-6153 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6153">CVE-2016-6153 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10989/">CVE-2017-10989 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10989">CVE-2017-10989 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2518">CVE-2017-2518 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20346">CVE-2018-20346 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8740">CVE-2018-8740 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16168/">CVE-2019-16168 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16168">CVE-2019-16168 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19244/">CVE-2019-19244 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19244">CVE-2019-19244 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19317/">CVE-2019-19317 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19317">CVE-2019-19317 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19603/">CVE-2019-19603 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19603">CVE-2019-19603 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19645/">CVE-2019-19645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19645">CVE-2019-19645 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19646/">CVE-2019-19646 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19646">CVE-2019-19646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19880/">CVE-2019-19880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19880">CVE-2019-19880 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19923/">CVE-2019-19923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19923">CVE-2019-19923 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19924/">CVE-2019-19924 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19924">CVE-2019-19924 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19925/">CVE-2019-19925 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19925">CVE-2019-19925 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19926/">CVE-2019-19926 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19926">CVE-2019-19926 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19959/">CVE-2019-19959 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19959">CVE-2019-19959 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20218/">CVE-2019-20218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20218">CVE-2019-20218 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8457">CVE-2019-8457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13434/">CVE-2020-13434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13434">CVE-2020-13434 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13435/">CVE-2020-13435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13435">CVE-2020-13435 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13630/">CVE-2020-13630 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13630">CVE-2020-13630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13631/">CVE-2020-13631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13631">CVE-2020-13631 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13632/">CVE-2020-13632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13632">CVE-2020-13632 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15358/">CVE-2020-15358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15358">CVE-2020-15358 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-9327/">CVE-2020-9327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9327">CVE-2020-9327 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633925" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633926" comment="sqlite3-3.36.0-9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633927" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151579" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1177120" ref_url="https://bugzilla.suse.com/1177120" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<description>

This update for python-urllib3 fixes the following security issue:

- CVE-2020-26137: A CRLF injection via HTTP request method was fixed (bsc#1177120)

Note that this was fixed in a previous version update to 1.25.9, this update just complements the tracking.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-29"/>
	<updated date="2021-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26137">CVE-2020-26137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631062" comment="python3-urllib3-1.25.10-3.31.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151580" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1117993" ref_url="https://bugzilla.suse.com/1117993" source="BUGZILLA"/>
		<reference ref_id="1186489" ref_url="https://bugzilla.suse.com/1186489" source="BUGZILLA"/>
		<reference ref_id="1187911" ref_url="https://bugzilla.suse.com/1187911" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574/" source="CVE"/>
		<reference ref_id="CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2021-35942: wordexp: handle overflow in positional parameter number (bsc#1187911)
- CVE-2021-33574: Use __pthread_attr_copy in mq_notify (bsc#1186489)

Also the following bug was fixed:

- Avoid concurrency problem in ldconfig (bsc#1117993)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117993">SUSE bug 1117993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186489">SUSE bug 1186489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187911">SUSE bug 1187911</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">CVE-2021-33574 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">CVE-2021-35942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651268" comment="glibc-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651115" comment="glibc-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651269" comment="glibc-devel-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651117" comment="glibc-devel-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651118" comment="glibc-html-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651119" comment="glibc-i18ndata-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651120" comment="glibc-info-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651270" comment="glibc-locale-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651122" comment="glibc-locale-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651271" comment="glibc-profile-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651124" comment="glibc-profile-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651272" comment="nscd-2.22-116.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151581" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1188697" ref_url="https://bugzilla.suse.com/1188697" source="BUGZILLA"/>
		<reference ref_id="1190701" ref_url="https://bugzilla.suse.com/1190701" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21806" ref_url="https://www.suse.com/security/cve/CVE-2021-21806/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.4
- CVE-2021-30858: Fixed a security bug that could allow maliciously crafted web content to achieve arbitrary code execution. (bsc#1190701)
- CVE-2021-21806: Fixed an exploitable use-after-free vulnerability via specially crafted HTML web page. (bsc#1188697)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190701">SUSE bug 1190701</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21806/">CVE-2021-21806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21806">CVE-2021-21806 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30858">CVE-2021-30858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651273" comment="libjavascriptcoregtk-4_0-18-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651274" comment="libwebkit2gtk-4_0-37-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634365" comment="libwebkit2gtk3-lang-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651275" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651276" comment="typelib-1_0-WebKit2-4_0-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651277" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651278" comment="webkit2gtk-4_0-injected-bundles-2.32.4-2.71.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151582" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1190666" ref_url="https://bugzilla.suse.com/1190666" source="BUGZILLA"/>
		<reference ref_id="1190669" ref_url="https://bugzilla.suse.com/1190669" source="BUGZILLA"/>
		<reference ref_id="1190703" ref_url="https://bugzilla.suse.com/1190703" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34798" ref_url="https://www.suse.com/security/cve/CVE-2021-34798/" source="CVE"/>
		<reference ref_id="CVE-2021-39275" ref_url="https://www.suse.com/security/cve/CVE-2021-39275/" source="CVE"/>
		<reference ref_id="CVE-2021-40438" ref_url="https://www.suse.com/security/cve/CVE-2021-40438/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-40438: Fixed a SRF via a crafted request uri-path. (bsc#1190703)
- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)
- CVE-2021-34798: Fixed a NULL pointer dereference via malformed requests. (bsc#1190669)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190666">SUSE bug 1190666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190669">SUSE bug 1190669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190703">SUSE bug 1190703</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34798/">CVE-2021-34798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34798">CVE-2021-34798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39275/">CVE-2021-39275 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39275">CVE-2021-39275 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40438/">CVE-2021-40438 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40438">CVE-2021-40438 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651279" comment="apache2-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633898" comment="apache2-doc-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651280" comment="apache2-example-pages-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651281" comment="apache2-prefork-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651282" comment="apache2-utils-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651283" comment="apache2-worker-2.4.23-29.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151583" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-08"/>
	<updated date="2021-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557072" comment="libpython3_4m1_0-3.4.10-25.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557073" comment="python3-3.4.10-25.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557074" comment="python3-base-3.4.10-25.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557075" comment="python3-curses-3.4.10-25.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557076" comment="python3-devel-3.4.10-25.63.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151584" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1190710" ref_url="https://bugzilla.suse.com/1190710" source="BUGZILLA"/>
		<reference ref_id="1191332" ref_url="https://bugzilla.suse.com/1191332" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.2.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-45 (bsc#1191332)

* CVE-2021-38496: Use-after-free in MessageTask
* CVE-2021-38497: Validation message could have been overlaid on another origin
* CVE-2021-38498: Use-after-free of nsLanguageAtomService object
* CVE-2021-32810: Fixed Data race in crossbeam-deque
* CVE-2021-38500: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2
* CVE-2021-38501: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2

- Fixed crash in FIPS mode (bsc#1190710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-15"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190710">SUSE bug 1190710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32810">CVE-2021-32810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38496">CVE-2021-38496 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38497">CVE-2021-38497 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38498">CVE-2021-38498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38500">CVE-2021-38500 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38501">CVE-2021-38501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652541" comment="MozillaFirefox-91.2.0-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652542" comment="MozillaFirefox-devel-91.2.0-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652543" comment="MozillaFirefox-translations-common-91.2.0-112.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151585" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="1190350" ref_url="https://bugzilla.suse.com/1190350" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes several issues.

The following security issues were fixed:

- CVE-2021-3715: Fixed a user-after-free in the Linux kernel's Traffic Control networking subsystem which could lead to local privilege escalation. (bsc#1190350).
- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190350">SUSE bug 1190350</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3573">CVE-2021-3573 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3715">CVE-2021-3715 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160">CVE-2021-38160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009652626" comment="kgraft-patch-4_4_180-94_144-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151586" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="1190350" ref_url="https://bugzilla.suse.com/1190350" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes several issues.

The following security issues were fixed:

- CVE-2021-3715: Fixed a user-after-free in the Linux kernel's Traffic Control networking subsystem which could lead to local privilege escalation. (bsc#1190350).
- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190350">SUSE bug 1190350</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3573">CVE-2021-3573 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3715">CVE-2021-3715 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160">CVE-2021-38160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009652627" comment="kgraft-patch-4_4_180-94_147-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151587" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="1190350" ref_url="https://bugzilla.suse.com/1190350" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- CVE-2021-3715: Fixed a user-after-free in the Linux kernel's Traffic Control networking subsystem which could lead to local privilege escalation. (bsc#1190350).
- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190350">SUSE bug 1190350</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3573">CVE-2021-3573 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3715">CVE-2021-3715 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160">CVE-2021-38160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009652628" comment="kgraft-patch-4_4_180-94_135-default-13-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151588" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="1190350" ref_url="https://bugzilla.suse.com/1190350" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following security issues were fixed:

- CVE-2021-3715: Fixed a user-after-free in the Linux kernel's Traffic Control networking subsystem which could lead to local privilege escalation. (bsc#1190350).
- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190350">SUSE bug 1190350</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3573">CVE-2021-3573 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3715">CVE-2021-3715 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160">CVE-2021-38160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009652629" comment="kgraft-patch-4_4_180-94_138-default-11-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151589" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="1190350" ref_url="https://bugzilla.suse.com/1190350" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.

The following security issues were fixed:

- CVE-2021-3715: Fixed a user-after-free in the Linux kernel's Traffic Control networking subsystem which could lead to local privilege escalation. (bsc#1190350).
- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190350">SUSE bug 1190350</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3573">CVE-2021-3573 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3715">CVE-2021-3715 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160">CVE-2021-38160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009652630" comment="kgraft-patch-4_4_180-94_141-default-10-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151590" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1081947" ref_url="https://bugzilla.suse.com/1081947" source="BUGZILLA"/>
		<reference ref_id="1082293" ref_url="https://bugzilla.suse.com/1082293" source="BUGZILLA"/>
		<reference ref_id="1084671" ref_url="https://bugzilla.suse.com/1084671" source="BUGZILLA"/>
		<reference ref_id="1085196" ref_url="https://bugzilla.suse.com/1085196" source="BUGZILLA"/>
		<reference ref_id="1106214" ref_url="https://bugzilla.suse.com/1106214" source="BUGZILLA"/>
		<reference ref_id="1122417" ref_url="https://bugzilla.suse.com/1122417" source="BUGZILLA"/>
		<reference ref_id="1125886" ref_url="https://bugzilla.suse.com/1125886" source="BUGZILLA"/>
		<reference ref_id="1135534" ref_url="https://bugzilla.suse.com/1135534" source="BUGZILLA"/>
		<reference ref_id="1135708" ref_url="https://bugzilla.suse.com/1135708" source="BUGZILLA"/>
		<reference ref_id="1151708" ref_url="https://bugzilla.suse.com/1151708" source="BUGZILLA"/>
		<reference ref_id="1168235" ref_url="https://bugzilla.suse.com/1168235" source="BUGZILLA"/>
		<reference ref_id="1168389" ref_url="https://bugzilla.suse.com/1168389" source="BUGZILLA"/>
		<reference ref_id="1169006" ref_url="https://bugzilla.suse.com/1169006" source="BUGZILLA"/>
		<reference ref_id="1174942" ref_url="https://bugzilla.suse.com/1174942" source="BUGZILLA"/>
		<reference ref_id="1175514" ref_url="https://bugzilla.suse.com/1175514" source="BUGZILLA"/>
		<reference ref_id="1175623" ref_url="https://bugzilla.suse.com/1175623" source="BUGZILLA"/>
		<reference ref_id="1178236" ref_url="https://bugzilla.suse.com/1178236" source="BUGZILLA"/>
		<reference ref_id="1178554" ref_url="https://bugzilla.suse.com/1178554" source="BUGZILLA"/>
		<reference ref_id="1178825" ref_url="https://bugzilla.suse.com/1178825" source="BUGZILLA"/>
		<reference ref_id="1188921" ref_url="https://bugzilla.suse.com/1188921" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37600" ref_url="https://www.suse.com/security/cve/CVE-2021-37600/" source="CVE"/>
		<description>
This update for util-linux fixes the following issues:

- CVE-2021-37600: Fixed an integer overflow which could lead to buffer overflow in get_sem_elements. (bsc#1188921)
- Prevent outdated pam files (bsc#1082293, bsc#1081947#c68).
- Do not trim read-only volumes (bsc#1106214).
- libmount: To prevent incorrect behavior, recognize more pseudofs and netfs (bsc#1122417).
- raw.service: Add RemainAfterExit=yes (bsc#1135534).
- agetty: Reload issue only if it is really needed (bsc#1085196)
- agetty: Return previous response of agetty for special characters (bsc#1085196, bsc#1125886)
- blockdev: Do not fail --report on kpartx-style partitions on multipath. (bsc#1168235)
- nologin: Add support for -c to prevent error from su -c. (bsc#1151708)
- Avoid triggering autofs in lookup_umount_fs_by_statfs. (bsc#1168389)
- libblkid: Do not trigger CDROM autoclose. (bsc#1084671)
- Avoid sulogin failing on not existing or not functional console devices. (bsc#1175514)
- Build with libudev support to support non-root users. (bsc#1169006)
- lscpu: avoid segfault on PowerPC systems with valid hardware configurations. (bsc#1175623, bsc#1178554, bsc#1178825)
- Fix for warning on mounts to CIFS with mount. (SG#57988, bsc#1174942)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081947">SUSE bug 1081947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082293">SUSE bug 1082293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084671">SUSE bug 1084671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085196">SUSE bug 1085196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106214">SUSE bug 1106214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122417">SUSE bug 1122417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125886">SUSE bug 1125886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135534">SUSE bug 1135534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135708">SUSE bug 1135708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151708">SUSE bug 1151708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168235">SUSE bug 1168235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168389">SUSE bug 1168389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169006">SUSE bug 1169006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174942">SUSE bug 1174942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175514">SUSE bug 1175514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175623">SUSE bug 1175623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178236">SUSE bug 1178236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178554">SUSE bug 1178554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178825">SUSE bug 1178825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188921">SUSE bug 1188921</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37600/">CVE-2021-37600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">CVE-2021-37600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652825" comment="libblkid1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652487" comment="libblkid1-32bit-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652826" comment="libfdisk1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652827" comment="libmount1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652490" comment="libmount1-32bit-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652828" comment="libsmartcols1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652829" comment="libuuid1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652493" comment="libuuid1-32bit-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652830" comment="python-libmount-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652831" comment="util-linux-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652496" comment="util-linux-lang-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652832" comment="util-linux-systemd-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652833" comment="uuidd-2.29.2-3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151591" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1191435" ref_url="https://bugzilla.suse.com/1191435" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41991" ref_url="https://www.suse.com/security/cve/CVE-2021-41991/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191435">SUSE bug 1191435</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41991/">CVE-2021-41991 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41991">CVE-2021-41991 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652834" comment="strongswan-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652801" comment="strongswan-doc-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652835" comment="strongswan-hmac-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652836" comment="strongswan-ipsec-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652837" comment="strongswan-libs0-5.1.3-26.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151592" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178961" ref_url="https://bugzilla.suse.com/1178961" source="BUGZILLA"/>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1183118" ref_url="https://bugzilla.suse.com/1183118" source="BUGZILLA"/>
		<reference ref_id="1183168" ref_url="https://bugzilla.suse.com/1183168" source="BUGZILLA"/>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="1185952" ref_url="https://bugzilla.suse.com/1185952" source="BUGZILLA"/>
		<reference ref_id="1187751" ref_url="https://bugzilla.suse.com/1187751" source="BUGZILLA"/>
		<reference ref_id="1190177" ref_url="https://bugzilla.suse.com/1190177" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

- Fix for build with llvm12 on s390x. (bsc#1185952)
- Re-enable 'icu' for PostgreSQL 10. (bsc#1179945)
- Add postgresqlXX-server-devel as a dependency for postgresql13-server-devel. (bsc#1187751)
- Upgrade to version 10.18. (bsc#1190177)

Upgrade to version 10.17 (already released for SUSE Linux Enterprise 12 SP5):

- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).

- Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).
- Re-enable build of the llvmjit subpackage on SLE, but it will only be delivered on PackageHub for now (bsc#1183118).
- Disable icu for PostgreSQL 10 (and older) on TW (bsc#1179945).
- Fixed an issue droping irregular warning messages by removing the package. (bsc#1178961)
- Fixed an issue when build does not build the requiements to avoid dangling symlinks in the devel package. (bsc#1179765)
- Fix recently-added timetz test case so it works when the USA is not observing daylight savings time.

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178961">SUSE bug 1178961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183118">SUSE bug 1183118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183168">SUSE bug 1183168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185952">SUSE bug 1185952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187751">SUSE bug 1187751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190177">SUSE bug 1190177</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652883" comment="postgresql10-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652884" comment="postgresql10-contrib-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652158" comment="postgresql10-docs-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652885" comment="postgresql10-plperl-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652886" comment="postgresql10-plpython-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652887" comment="postgresql10-pltcl-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652888" comment="postgresql10-server-10.18-4.19.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151593" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1191957" ref_url="https://bugzilla.suse.com/1191957" source="BUGZILLA"/>
		<reference ref_id="1191992" ref_url="https://bugzilla.suse.com/1191992" source="BUGZILLA"/>
		<reference ref_id="1192000" ref_url="https://bugzilla.suse.com/1192000" source="BUGZILLA"/>
		<reference ref_id="1192005" ref_url="https://bugzilla.suse.com/1192005" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42779" ref_url="https://www.suse.com/security/cve/CVE-2021-42779/" source="CVE"/>
		<reference ref_id="CVE-2021-42780" ref_url="https://www.suse.com/security/cve/CVE-2021-42780/" source="CVE"/>
		<reference ref_id="CVE-2021-42781" ref_url="https://www.suse.com/security/cve/CVE-2021-42781/" source="CVE"/>
		<reference ref_id="CVE-2021-42782" ref_url="https://www.suse.com/security/cve/CVE-2021-42782/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2021-42780: Fixed use after return in insert_pin() (bsc#1192005).
- CVE-2021-42779: Fixed use after free in sc_file_valid() (bsc#1191992).
- CVE-2021-42781: Fixed multiple heap buffer overflows in pkcs15-oberthur.c (bsc#1192000).
- CVE-2021-42782: Stack buffer overflow issues in various places (bsc#1191957).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191957">SUSE bug 1191957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191992">SUSE bug 1191992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192000">SUSE bug 1192000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192005">SUSE bug 1192005</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42779/">CVE-2021-42779 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42779">CVE-2021-42779 at NVD</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-42780/">CVE-2021-42780 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42780">CVE-2021-42780 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42781/">CVE-2021-42781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42781">CVE-2021-42781 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42782/">CVE-2021-42782 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42782">CVE-2021-42782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653690" comment="opensc-0.13.0-3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151594" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1190607" ref_url="https://bugzilla.suse.com/1190607" source="BUGZILLA"/>
		<reference ref_id="1190611" ref_url="https://bugzilla.suse.com/1190611" source="BUGZILLA"/>
		<reference ref_id="1190612" ref_url="https://bugzilla.suse.com/1190612" source="BUGZILLA"/>
		<reference ref_id="1190615" ref_url="https://bugzilla.suse.com/1190615" source="BUGZILLA"/>
		<reference ref_id="1190616" ref_url="https://bugzilla.suse.com/1190616" source="BUGZILLA"/>
		<reference ref_id="1190617" ref_url="https://bugzilla.suse.com/1190617" source="BUGZILLA"/>
		<reference ref_id="1190618" ref_url="https://bugzilla.suse.com/1190618" source="BUGZILLA"/>
		<reference ref_id="1192019" ref_url="https://bugzilla.suse.com/1192019" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-21529" ref_url="https://www.suse.com/security/cve/CVE-2020-21529/" source="CVE"/>
		<reference ref_id="CVE-2020-21530" ref_url="https://www.suse.com/security/cve/CVE-2020-21530/" source="CVE"/>
		<reference ref_id="CVE-2020-21531" ref_url="https://www.suse.com/security/cve/CVE-2020-21531/" source="CVE"/>
		<reference ref_id="CVE-2020-21532" ref_url="https://www.suse.com/security/cve/CVE-2020-21532/" source="CVE"/>
		<reference ref_id="CVE-2020-21533" ref_url="https://www.suse.com/security/cve/CVE-2020-21533/" source="CVE"/>
		<reference ref_id="CVE-2020-21534" ref_url="https://www.suse.com/security/cve/CVE-2020-21534/" source="CVE"/>
		<reference ref_id="CVE-2020-21535" ref_url="https://www.suse.com/security/cve/CVE-2020-21535/" source="CVE"/>
		<reference ref_id="CVE-2021-32280" ref_url="https://www.suse.com/security/cve/CVE-2021-32280/" source="CVE"/>
		<description>
This update for transfig fixes the following issues:

Update to fig2dev version 3.2.8 Patchlevel 8b (Aug 2021)

- bsc#1190618, CVE-2020-21529: stack buffer overflow in the bezier_spline function in genepic.c.
- bsc#1190615, CVE-2020-21530: segmentation fault in the read_objects function in read.c.
- bsc#1190617, CVE-2020-21531: global buffer overflow in the conv_pattern_index function in gencgm.c.
- bsc#1190616, CVE-2020-21532: global buffer overflow in the setfigfont function in genepic.c.
- bsc#1190612, CVE-2020-21533: stack buffer overflow in the read_textobject function in read.c.
- bsc#1190611, CVE-2020-21534: global buffer overflow in the get_line function in read.c.
- bsc#1190607, CVE-2020-21535: segmentation fault in the gencgm_start function in gencgm.c.
- bsc#1192019, CVE-2021-32280: NULL pointer dereference in compute_closed_spline() in trans_spline.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190607">SUSE bug 1190607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190611">SUSE bug 1190611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190612">SUSE bug 1190612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190615">SUSE bug 1190615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190616">SUSE bug 1190616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190617">SUSE bug 1190617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190618">SUSE bug 1190618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192019">SUSE bug 1192019</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21529/">CVE-2020-21529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21529">CVE-2020-21529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21530/">CVE-2020-21530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21530">CVE-2020-21530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21531/">CVE-2020-21531 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21531">CVE-2020-21531 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21532/">CVE-2020-21532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21532">CVE-2020-21532 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21533/">CVE-2020-21533 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21533">CVE-2020-21533 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21534/">CVE-2020-21534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21534">CVE-2020-21534 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21535/">CVE-2020-21535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21535">CVE-2020-21535 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32280/">CVE-2021-32280 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32280">CVE-2021-32280 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653691" comment="transfig-3.2.8b-2.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151595" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1126826" ref_url="https://bugzilla.suse.com/1126826" source="BUGZILLA"/>
		<reference ref_id="1126829" ref_url="https://bugzilla.suse.com/1126829" source="BUGZILLA"/>
		<reference ref_id="1126831" ref_url="https://bugzilla.suse.com/1126831" source="BUGZILLA"/>
		<reference ref_id="1140126" ref_url="https://bugzilla.suse.com/1140126" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1143609" ref_url="https://bugzilla.suse.com/1143609" source="BUGZILLA"/>
		<reference ref_id="1153768" ref_url="https://bugzilla.suse.com/1153768" source="BUGZILLA"/>
		<reference ref_id="1153770" ref_url="https://bugzilla.suse.com/1153770" source="BUGZILLA"/>
		<reference ref_id="1157755" ref_url="https://bugzilla.suse.com/1157755" source="BUGZILLA"/>
		<reference ref_id="1160254" ref_url="https://bugzilla.suse.com/1160254" source="BUGZILLA"/>
		<reference ref_id="1160590" ref_url="https://bugzilla.suse.com/1160590" source="BUGZILLA"/>
		<reference ref_id="1163333" ref_url="https://bugzilla.suse.com/1163333" source="BUGZILLA"/>
		<reference ref_id="1163744" ref_url="https://bugzilla.suse.com/1163744" source="BUGZILLA"/>
		<reference ref_id="1179036" ref_url="https://bugzilla.suse.com/1179036" source="BUGZILLA"/>
		<reference ref_id="1179341" ref_url="https://bugzilla.suse.com/1179341" source="BUGZILLA"/>
		<reference ref_id="1179898" ref_url="https://bugzilla.suse.com/1179898" source="BUGZILLA"/>
		<reference ref_id="1179899" ref_url="https://bugzilla.suse.com/1179899" source="BUGZILLA"/>
		<reference ref_id="1179900" ref_url="https://bugzilla.suse.com/1179900" source="BUGZILLA"/>
		<reference ref_id="1179901" ref_url="https://bugzilla.suse.com/1179901" source="BUGZILLA"/>
		<reference ref_id="1179902" ref_url="https://bugzilla.suse.com/1179902" source="BUGZILLA"/>
		<reference ref_id="1179903" ref_url="https://bugzilla.suse.com/1179903" source="BUGZILLA"/>
		<reference ref_id="1180451" ref_url="https://bugzilla.suse.com/1180451" source="BUGZILLA"/>
		<reference ref_id="1180454" ref_url="https://bugzilla.suse.com/1180454" source="BUGZILLA"/>
		<reference ref_id="1180461" ref_url="https://bugzilla.suse.com/1180461" source="BUGZILLA"/>
		<reference ref_id="1181452" ref_url="https://bugzilla.suse.com/1181452" source="BUGZILLA"/>
		<reference ref_id="1182252" ref_url="https://bugzilla.suse.com/1182252" source="BUGZILLA"/>
		<reference ref_id="1183511" ref_url="https://bugzilla.suse.com/1183511" source="BUGZILLA"/>
		<reference ref_id="1184620" ref_url="https://bugzilla.suse.com/1184620" source="BUGZILLA"/>
		<reference ref_id="1184794" ref_url="https://bugzilla.suse.com/1184794" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12972" ref_url="https://www.suse.com/security/cve/CVE-2019-12972/" source="CVE"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-14444" ref_url="https://www.suse.com/security/cve/CVE-2019-14444/" source="CVE"/>
		<reference ref_id="CVE-2019-17450" ref_url="https://www.suse.com/security/cve/CVE-2019-17450/" source="CVE"/>
		<reference ref_id="CVE-2019-17451" ref_url="https://www.suse.com/security/cve/CVE-2019-17451/" source="CVE"/>
		<reference ref_id="CVE-2019-9074" ref_url="https://www.suse.com/security/cve/CVE-2019-9074/" source="CVE"/>
		<reference ref_id="CVE-2019-9075" ref_url="https://www.suse.com/security/cve/CVE-2019-9075/" source="CVE"/>
		<reference ref_id="CVE-2019-9077" ref_url="https://www.suse.com/security/cve/CVE-2019-9077/" source="CVE"/>
		<reference ref_id="CVE-2020-16590" ref_url="https://www.suse.com/security/cve/CVE-2020-16590/" source="CVE"/>
		<reference ref_id="CVE-2020-16591" ref_url="https://www.suse.com/security/cve/CVE-2020-16591/" source="CVE"/>
		<reference ref_id="CVE-2020-16592" ref_url="https://www.suse.com/security/cve/CVE-2020-16592/" source="CVE"/>
		<reference ref_id="CVE-2020-16593" ref_url="https://www.suse.com/security/cve/CVE-2020-16593/" source="CVE"/>
		<reference ref_id="CVE-2020-16598" ref_url="https://www.suse.com/security/cve/CVE-2020-16598/" source="CVE"/>
		<reference ref_id="CVE-2020-16599" ref_url="https://www.suse.com/security/cve/CVE-2020-16599/" source="CVE"/>
		<reference ref_id="CVE-2020-35448" ref_url="https://www.suse.com/security/cve/CVE-2020-35448/" source="CVE"/>
		<reference ref_id="CVE-2020-35493" ref_url="https://www.suse.com/security/cve/CVE-2020-35493/" source="CVE"/>
		<reference ref_id="CVE-2020-35496" ref_url="https://www.suse.com/security/cve/CVE-2020-35496/" source="CVE"/>
		<reference ref_id="CVE-2020-35507" ref_url="https://www.suse.com/security/cve/CVE-2020-35507/" source="CVE"/>
		<reference ref_id="CVE-2021-20197" ref_url="https://www.suse.com/security/cve/CVE-2021-20197/" source="CVE"/>
		<reference ref_id="CVE-2021-20284" ref_url="https://www.suse.com/security/cve/CVE-2021-20284/" source="CVE"/>
		<reference ref_id="CVE-2021-3487" ref_url="https://www.suse.com/security/cve/CVE-2021-3487/" source="CVE"/>
		<description>
This update for binutils fixes the following issues:

Update to binutils 2.37:

* The GNU Binutils sources now requires a C99 compiler and library to
  build.
* Support for the arm-symbianelf format has been removed.
* Support for Realm Management Extension (RME) for AArch64 has been
  added.
* A new linker option '-z report-relative-reloc' for x86 ELF targets
  has been added to report dynamic relative relocations.
* A new linker option '-z start-stop-gc' has been added to disable
  special treatment of __start_*/__stop_* references when
  --gc-sections.
* A new linker options '-Bno-symbolic' has been added which will
  cancel the '-Bsymbolic' and '-Bsymbolic-functions' options.
* The readelf tool has a new command line option which can be used to
  specify how the numeric values of symbols are reported.
  --sym-base=0|8|10|16 tells readelf to display the values in base 8,
  base 10 or base 16.  A sym base of 0 represents the default action
  of displaying values under 10000 in base 10 and values above that in
  base 16.
* A new format has been added to the nm program.  Specifying
  '--format=just-symbols' (or just using -j) will tell the program to
  only display symbol names and nothing else.
* A new command line option '--keep-section-symbols' has been added to
  objcopy and strip.  This stops the removal of unused section symbols
  when the file is copied.  Removing these symbols saves space, but
  sometimes they are needed by other tools.
* The '--weaken', '--weaken-symbol' and '--weaken-symbols' options
  supported by objcopy now make undefined symbols weak on targets that
  support weak symbols. 
* Readelf and objdump can now display and use the contents of .debug_sup
  sections.
* Readelf and objdump will now follow links to separate debug info
  files by default.  This behaviour can be stopped via the use of the
  new '-wN' or '--debug-dump=no-follow-links' options for readelf and
  the '-WN' or '--dwarf=no-follow-links' options for objdump.  Also
  the old behaviour can be restored by the use of the
  '--enable-follow-debug-links=no' configure time option.

  The semantics of the =follow-links option have also been slightly
  changed.  When enabled, the option allows for the loading of symbol
  tables and string tables from the separate files which can be used
  to enhance the information displayed when dumping other sections,
  but it does not automatically imply that information from the
  separate files should be displayed.

  If other debug section display options are also enabled (eg
  '--debug-dump=info') then the contents of matching sections in both
  the main file and the separate debuginfo file *will* be displayed.
  This is because in most cases the debug section will only be present
  in one of the files.

  If however non-debug section display options are enabled (eg
  '--sections') then the contents of matching parts of the separate
  debuginfo file will *not* be displayed.  This is because in most
  cases the user probably only wanted to load the symbol information
  from the separate debuginfo file.  In order to change this behaviour
  a new command line option --process-links can be used.  This will
  allow di0pslay options to applied to both the main file and any
  separate debuginfo files.
* Nm has a new command line option: '--quiet'.  This suppresses 'no
  symbols' diagnostic.

Update to binutils 2.36:

 New features in the Assembler:

  General:

   * When setting the link order attribute of ELF sections, it is now
     possible to use a numeric section index instead of symbol name.
   * Added a .nop directive to generate a single no-op instruction in
     a target neutral manner.  This instruction does have an effect on
     DWARF line number generation, if that is active.
   * Removed --reduce-memory-overheads and --hash-size as gas now
     uses hash tables that can be expand and shrink automatically.

   X86/x86_64:

     * Add support for AVX VNNI, HRESET, UINTR, TDX, AMX and Key
       Locker instructions. 
     * Support non-absolute segment values for lcall and ljmp.
     * Add {disp16} pseudo prefix to x86 assembler.
     * Configure with --enable-x86-used-note by default for Linux/x86.

   ARM/AArch64:

     * Add support for Cortex-A78, Cortex-A78AE and Cortex-X1,
       Cortex-R82, Neoverse V1, and Neoverse N2 cores.
     * Add support for ETMv4 (Embedded Trace Macrocell), ETE (Embedded
       Trace Extension), TRBE (Trace Buffer Extension), CSRE (Call
       Stack Recorder Extension) and BRBE (Branch Record Buffer
       Extension) system registers.
     * Add support for Armv8-R and Armv8.7-A ISA extensions.
     * Add support for DSB memory nXS barrier, WFET and WFIT
       instruction for Armv8.7.
     * Add support for +csre feature for -march. Add CSR PDEC
       instruction for CSRE feature in AArch64.
     * Add support for +flagm feature for -march in Armv8.4 AArch64.
     * Add support for +ls64 feature for -march in Armv8.7
       AArch64. Add atomic 64-byte load/store instructions for this
       feature. 
     * Add support for +pauth (Pointer Authentication) feature for
       -march in AArch64.

  New features in the Linker:

    * Add --error-handling-script=&lt;NAME&gt; command line option to allow
      a helper script to be invoked when an undefined symbol or a
      missing library is encountered.  This option can be suppressed
      via the configure time switch: --enable-error-handling-script=no.
    * Add -z x86-64-{baseline|v[234]} to the x86 ELF linker to mark
      x86-64-{baseline|v[234]} ISA level as needed.
    * Add -z unique-symbol to avoid duplicated local symbol names.
    * The creation of PE format DLLs now defaults to using a more
      secure set of DLL characteristics.
    * The linker now deduplicates the types in .ctf sections.  The new 
       command-line option --ctf-share-types describes how to do this:
       its default value, share-unconflicted, produces the most compact
       output.
    * The linker now omits the 'variable section' from .ctf sections
      by default, saving space.  This is almost certainly what you
      want unless you are working on a project that has its own
      analogue of symbol tables that are not reflected in the ELF
      symtabs.

New features in other binary tools:

    * The ar tool's previously unused l modifier is now used for
      specifying dependencies of a static library. The arguments of
      this option (or --record-libdeps long form option) will be
      stored verbatim in the __.LIBDEP member of the archive, which
      the linker may read at link time.
    * Readelf can now display the contents of LTO symbol table
      sections when asked to do so via the --lto-syms command line
      option.
    * Readelf now accepts the -C command line option to enable the
      demangling of symbol names.  In addition the --demangle=&lt;style&gt;,
      --no-demangle, --recurse-limit and --no-recurse-limit options
      are also now availale.

Update to binutils 2.35.1:

* This is a point release over the previous 2.35 version, containing bug
  fixes, and as an exception to the usual rule, one new feature.  The
  new feature is the support for a new directive in the assembler:
  '.nop'.  This directive creates a single no-op instruction in whatever
  encoding is correct for the target architecture.  Unlike the .space or
  .fill this is a real instruction, and it does affect the generation of
  DWARF line number tables, should they be enabled.

Update to binutils 2.35:

* The assembler can now produce DWARF-5 format line number tables.
* Readelf now has a 'lint' mode to enable extra checks of the files it is processing.
* Readelf will now display '[...]' when it has to truncate a symbol name.  
  The old behaviour - of displaying as many characters as possible, up to
  the 80 column limit - can be restored by the use of the --silent-truncation
  option.
* The linker can now produce a dependency file listing the inputs that it
  has processed, much like the -M -MP option supported by the compiler.

Update to binutils 2.34:

* The disassembler (objdump --disassemble) now has an option to
  generate ascii art thats show the arcs between that start and end
  points of control flow instructions.
* The binutils tools now have support for debuginfod.  Debuginfod is a 
  HTTP service for distributing ELF/DWARF debugging information as
  well as source code.  The tools can now connect to debuginfod
  servers in order to download debug information about the files that
  they are processing.
* The assembler and linker now support the generation of ELF format
  files for the Z80 architecture.

Update to binutils 2.33.1:

* Adds support for the Arm Scalable Vector Extension version 2
  (SVE2) instructions, the Arm Transactional Memory Extension (TME)
  instructions and the Armv8.1-M Mainline and M-profile Vector
  Extension (MVE) instructions.
* Adds support for the Arm Cortex-A76AE, Cortex-A77 and Cortex-M35P
  processors and the AArch64 Cortex-A34, Cortex-A65, Cortex-A65AE,
  Cortex-A76AE, and Cortex-A77 processors.
* Adds a .float16 directive for both Arm and AArch64 to allow
  encoding of 16-bit floating point literals.
* For MIPS, Add -m[no-]fix-loongson3-llsc option to fix (or not)
  Loongson3 LLSC Errata.  Add a --enable-mips-fix-loongson3-llsc=[yes|no]
  configure time option to set the default behavior. Set the default
  if the configure option is not used to 'no'.
* The Cortex-A53 Erratum 843419 workaround now supports a choice of
  which workaround to use.  The option --fix-cortex-a53-843419 now
  takes an optional argument --fix-cortex-a53-843419[=full|adr|adrp]
  which can be used to force a particular workaround to be used.
  See --help for AArch64 for more details.
* Add support for GNU_PROPERTY_AARCH64_FEATURE_1_BTI and
  GNU_PROPERTY_AARCH64_FEATURE_1_PAC  in ELF GNU program properties
  in the AArch64 ELF linker. 
* Add -z force-bti for AArch64 to enable GNU_PROPERTY_AARCH64_FEATURE_1_BTI
  on output while warning about missing GNU_PROPERTY_AARCH64_FEATURE_1_BTI 
  on inputs and use PLTs protected with BTI.
* Add -z pac-plt for AArch64 to pick PAC enabled PLTs.
* Add --source-comment[=&lt;txt&gt;] option to objdump which if present,
  provides a prefix to source code lines displayed in a disassembly.
* Add --set-section-alignment &lt;section-name&gt;=&lt;power-of-2-align&gt;
  option to objcopy to allow the changing of section alignments.
* Add --verilog-data-width option to objcopy for verilog targets to
  control width of data elements in verilog hex format.
* The separate debug info file options of readelf (--debug-dump=links
  and --debug-dump=follow) and objdump (--dwarf=links and
  --dwarf=follow-links) will now display and/or follow multiple
  links if more than one are present in a file.  (This usually
  happens when gcc's -gsplit-dwarf option is used).
  In addition objdump's --dwarf=follow-links now also affects its
  other display options, so that for example, when combined with
  --syms it will cause the symbol tables in any linked debug info
  files to also be displayed.  In addition when combined with
  --disassemble the --dwarf= follow-links option will ensure that
  any symbol tables in the linked files are read and used when
  disassembling code in the main file.
* Add support for dumping types encoded in the Compact Type Format
  to objdump and readelf.

The following security fixes are addressed by the update:

- CVE-2021-20197: Fixed a race condition which allows users to own arbitrary files (bsc#1181452).
- CVE-2021-20284: Fixed a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c (bsc#1183511).
- CVE-2021-3487: Fixed a denial of service via excessive debug section size causing excessive memory consumption in bfd's dwarf2.c read_section() (bsc#1184620).
- CVE-2020-35448: Fixed a heap-based buffer over-read in bfd_getl_signed_32() in libbfd.c (bsc#1184794).
- CVE-2020-16590: Fixed a double free vulnerability in process_symbol_table() (bsc#1179898).
- CVE-2020-16591: Fixed an invalid read in process_symbol_table() (bsc#1179899).
- CVE-2020-16592: Fixed an use-after-free in bfd_hash_lookup() (bsc#1179900).
- CVE-2020-16593: Fixed a null pointer dereference in scan_unit_for_symbols() (bsc#1179901).
- CVE-2020-16598: Fixed a null pointer dereference in debug_get_real_type() (bsc#1179902).
- CVE-2020-16599: Fixed a null pointer dereference in _bfd_elf_get_symbol_version_string() (bsc#1179903)
- CVE-2020-35493: Fixed heap-based buffer overflow in bfd_pef_parse_function_stubs function in bfd/pef.c via crafted PEF file (bsc#1180451).
- CVE-2020-35496: Fixed multiple null pointer dereferences in bfd module due to not checking return value of bfd_malloc (bsc#1180454).
- CVE-2020-35507: Fixed a null pointer dereference in bfd_pef_parse_function_stubs() (bsc#1180461).
- CVE-2019-17451: Fixed an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line() in dwarf2.c (bsc#1153768).
- CVE-2019-17450: Fixed a potential denial of service in find_abstract_instance() in dwarf2.c (bsc#1153770).
- CVE-2019-9077: Fixed a heap-based buffer overflow in process_mips_specific() in readelf.c via a malformed MIPS option section (bsc#1126826).
- CVE-2019-9075: Fixed a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap() in archive64.c (bsc#1126829).
- CVE-2019-9074: Fixed a out-of-bounds read leading to a SEGV in bfd_getl32() in libbfd.c (bsc#1126831).
- CVE-2019-12972: Fixed a heap-based buffer over-read in _bfd_doprnt() in bfd.c (bsc#1140126).
- CVE-2019-14444: Fixed an integer overflow apply_relocations() in readelf.c (bsc#1143609).
- CVE-2019-14250: Fixed an integer overflow in simple_object_elf_match() in simple-object-elf.c (bsc#1142649).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-02"/>
	<updated date="2021-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126826">SUSE bug 1126826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126829">SUSE bug 1126829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126831">SUSE bug 1126831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140126">SUSE bug 1140126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143609">SUSE bug 1143609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153768">SUSE bug 1153768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153770">SUSE bug 1153770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157755">SUSE bug 1157755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160254">SUSE bug 1160254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160590">SUSE bug 1160590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163333">SUSE bug 1163333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163744">SUSE bug 1163744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179036">SUSE bug 1179036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179341">SUSE bug 1179341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179898">SUSE bug 1179898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179899">SUSE bug 1179899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179900">SUSE bug 1179900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179901">SUSE bug 1179901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179902">SUSE bug 1179902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179903">SUSE bug 1179903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180451">SUSE bug 1180451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180454">SUSE bug 1180454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180461">SUSE bug 1180461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181452">SUSE bug 1181452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182252">SUSE bug 1182252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183511">SUSE bug 1183511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184620">SUSE bug 1184620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184794">SUSE bug 1184794</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12972/">CVE-2019-12972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12972">CVE-2019-12972 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14250">CVE-2019-14250 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14444/">CVE-2019-14444 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14444">CVE-2019-14444 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17450/">CVE-2019-17450 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17450">CVE-2019-17450 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17451/">CVE-2019-17451 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17451">CVE-2019-17451 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9074/">CVE-2019-9074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9074">CVE-2019-9074 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9075/">CVE-2019-9075 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9075">CVE-2019-9075 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9077/">CVE-2019-9077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9077">CVE-2019-9077 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16590/">CVE-2020-16590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16590">CVE-2020-16590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16591/">CVE-2020-16591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16591">CVE-2020-16591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16592/">CVE-2020-16592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16592">CVE-2020-16592 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16593/">CVE-2020-16593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16593">CVE-2020-16593 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16598/">CVE-2020-16598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16598">CVE-2020-16598 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16599/">CVE-2020-16599 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16599">CVE-2020-16599 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-35448/">CVE-2020-35448 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35448">CVE-2020-35448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35493/">CVE-2020-35493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35493">CVE-2020-35493 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35496/">CVE-2020-35496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35496">CVE-2020-35496 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35507/">CVE-2020-35507 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35507">CVE-2020-35507 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20197/">CVE-2021-20197 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20197">CVE-2021-20197 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20284/">CVE-2021-20284 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20284">CVE-2021-20284 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3487/">CVE-2021-3487 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3487">CVE-2021-3487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653890" comment="binutils-2.37-9.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653891" comment="binutils-devel-2.37-9.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653892" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653893" comment="libctf0-2.37-9.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151596" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1183909" ref_url="https://bugzilla.suse.com/1183909" source="BUGZILLA"/>
		<reference ref_id="1184519" ref_url="https://bugzilla.suse.com/1184519" source="BUGZILLA"/>
		<reference ref_id="1188941" ref_url="https://bugzilla.suse.com/1188941" source="BUGZILLA"/>
		<reference ref_id="1191473" ref_url="https://bugzilla.suse.com/1191473" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20294" ref_url="https://www.suse.com/security/cve/CVE-2021-20294/" source="CVE"/>
		<description>
This update for binutils fixes the following issues:

- For compatibility on old code stream that expect 'brcl 0,label' to
  not be disassembled as 'jgnop label' on s390x.  (bsc#1192267)
  This reverts IBM zSeries HLASM support for now.
- Fixed that ppc64 optflags did not enable LTO (bsc#1188941).
- Fix empty man-pages from broken release tarball
- Fixed a memory corruption with rpath option (bsc#1191473).

- Fixed slow performance of stripping some binaries (bsc#1183909).

Security issue fixed:

- CVE-2021-20294: Fixed out-of-bounds write in print_dynamic_symbol in readelf (bnc#1184519)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183909">SUSE bug 1183909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184519">SUSE bug 1184519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188941">SUSE bug 1188941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191473">SUSE bug 1191473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20294/">CVE-2021-20294 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20294">CVE-2021-20294 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654626" comment="binutils-2.37-9.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654627" comment="binutils-devel-2.37-9.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654628" comment="libctf-nobfd0-2.37-9.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654629" comment="libctf0-2.37-9.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151597" version="1" class="patch">
	<metadata>
		<title>Security update for pcre (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1025709" ref_url="https://bugzilla.suse.com/1025709" source="BUGZILLA"/>
		<reference ref_id="1030066" ref_url="https://bugzilla.suse.com/1030066" source="BUGZILLA"/>
		<reference ref_id="1030803" ref_url="https://bugzilla.suse.com/1030803" source="BUGZILLA"/>
		<reference ref_id="1030805" ref_url="https://bugzilla.suse.com/1030805" source="BUGZILLA"/>
		<reference ref_id="1030807" ref_url="https://bugzilla.suse.com/1030807" source="BUGZILLA"/>
		<reference ref_id="1172973" ref_url="https://bugzilla.suse.com/1172973" source="BUGZILLA"/>
		<reference ref_id="1172974" ref_url="https://bugzilla.suse.com/1172974" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6004" ref_url="https://www.suse.com/security/cve/CVE-2017-6004/" source="CVE"/>
		<reference ref_id="CVE-2017-7186" ref_url="https://www.suse.com/security/cve/CVE-2017-7186/" source="CVE"/>
		<reference ref_id="CVE-2017-7244" ref_url="https://www.suse.com/security/cve/CVE-2017-7244/" source="CVE"/>
		<reference ref_id="CVE-2017-7245" ref_url="https://www.suse.com/security/cve/CVE-2017-7245/" source="CVE"/>
		<reference ref_id="CVE-2017-7246" ref_url="https://www.suse.com/security/cve/CVE-2017-7246/" source="CVE"/>
		<reference ref_id="CVE-2019-20838" ref_url="https://www.suse.com/security/cve/CVE-2019-20838/" source="CVE"/>
		<reference ref_id="CVE-2020-14155" ref_url="https://www.suse.com/security/cve/CVE-2020-14155/" source="CVE"/>
		<description>
This update for pcre fixes the following issues:

Update pcre to version 8.45:

- CVE-2020-14155: Fixed integer overflow via a large number after a '(?C' substring (bsc#1172974).
- CVE-2019-20838: Fixed buffer over-read in JIT compiler (bsc#1172973).
- CVE-2017-7244: Fixed invalid read in _pcre32_xclass() (bsc#1030807).
- CVE-2017-7245: Fixed buffer overflow in the pcre32_copy_substring (bsc#1030805).
- CVE-2017-7246: Fixed another buffer overflow in the pcre32_copy_substring (bsc#1030803).
- CVE-2017-7186: Fixed denial of service caused by an invalid Unicode property lookup (bsc#1030066).
- CVE-2017-6004: Fixed denial of service via crafted regular expression (bsc#1025709).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-10"/>
	<updated date="2021-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025709">SUSE bug 1025709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030066">SUSE bug 1030066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030803">SUSE bug 1030803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030805">SUSE bug 1030805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030807">SUSE bug 1030807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172973">SUSE bug 1172973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172974">SUSE bug 1172974</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6004/">CVE-2017-6004 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6004">CVE-2017-6004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7186/">CVE-2017-7186 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7186">CVE-2017-7186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7244/">CVE-2017-7244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7244">CVE-2017-7244 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7245/">CVE-2017-7245 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7245">CVE-2017-7245 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7246/">CVE-2017-7246 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7246">CVE-2017-7246 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20838/">CVE-2019-20838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20838">CVE-2019-20838 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14155/">CVE-2020-14155 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">CVE-2020-14155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655259" comment="libpcre1-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653016" comment="libpcre1-32bit-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655260" comment="libpcre16-0-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655261" comment="libpcrecpp0-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655262" comment="libpcreposix0-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655263" comment="pcre-devel-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653349" comment="selinux-policy-20140730-36.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653350" comment="selinux-policy-devel-20140730-36.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653351" comment="selinux-policy-minimum-20140730-36.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151598" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1189702" ref_url="https://bugzilla.suse.com/1189702" source="BUGZILLA"/>
		<reference ref_id="1189938" ref_url="https://bugzilla.suse.com/1189938" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3713" ref_url="https://www.suse.com/security/cve/CVE-2021-3713/" source="CVE"/>
		<reference ref_id="CVE-2021-3748" ref_url="https://www.suse.com/security/cve/CVE-2021-3748/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- Fix out-of-bounds write in UAS (USB Attached SCSI) device emulation (bsc#1189702, CVE-2021-3713)
- Fix heap use-after-free in virtio_net_receive_rcu (bsc#1189938, CVE-2021-3748)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-10"/>
	<updated date="2021-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189702">SUSE bug 1189702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189938">SUSE bug 1189938</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3713/">CVE-2021-3713 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3713">CVE-2021-3713 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3748/">CVE-2021-3748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3748">CVE-2021-3748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655264" comment="qemu-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653201" comment="qemu-arm-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655265" comment="qemu-block-curl-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655266" comment="qemu-block-iscsi-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655253" comment="qemu-block-rbd-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655267" comment="qemu-block-ssh-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655268" comment="qemu-guest-agent-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653159" comment="qemu-ipxe-1.0.0+-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653160" comment="qemu-kvm-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655269" comment="qemu-lang-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653163" comment="qemu-seabios-1.10.2_0_g5f4c7b1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653164" comment="qemu-sgabios-8-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655270" comment="qemu-tools-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653166" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653167" comment="qemu-x86-2.9.1-43.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151599" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1192250" ref_url="https://bugzilla.suse.com/1192250" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38505" ref_url="https://www.suse.com/security/cve/CVE-2021-38505/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<reference ref_id="CVE-2021-38510" ref_url="https://www.suse.com/security/cve/CVE-2021-38510/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to Extended Support Release 91.3.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-49 (bsc#1192250)

  * CVE-2021-38503: iframe sandbox rules did not apply to XSLT stylesheets
  * CVE-2021-38504: Use-after-free in file picker dialog
  * CVE-2021-38505: Windows 10 Cloud Clipboard may have recorded sensitive user data
  * CVE-2021-38506: Firefox could be coaxed into going into fullscreen mode without notification or warning
  * CVE-2021-38507: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports
  * CVE-2021-38508: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing
  * CVE-2021-38509: Javascript alert box could have been spoofed onto an arbitrary domain
  * CVE-2021-38510: Download Protections were bypassed by .inetloc files on Mac OS
  * MOZ-2021-0008: Use-after-free in HTTP2 Session object
  * MOZ-2021-0007: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38503">CVE-2021-38503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38504">CVE-2021-38504 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38505/">CVE-2021-38505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38505">CVE-2021-38505 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38506">CVE-2021-38506 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38507">CVE-2021-38507 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38508">CVE-2021-38508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38509">CVE-2021-38509 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38510/">CVE-2021-38510 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38510">CVE-2021-38510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656909" comment="MozillaFirefox-91.3.0-112.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656910" comment="MozillaFirefox-devel-91.3.0-112.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656911" comment="MozillaFirefox-translations-common-91.3.0-112.80.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151600" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1014440" ref_url="https://bugzilla.suse.com/1014440" source="BUGZILLA"/>
		<reference ref_id="1192284" ref_url="https://bugzilla.suse.com/1192284" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124/" source="CVE"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<description>
This update for samba fixes the following issues:
	  
- CVE-2016-2124: Fixed not to fallback to non spnego authentication if we require kerberos (bsc#1014440).
- CVE-2020-25717: Fixed privilege escalation inside an AD Domain where a user could become root on domain members (bsc#1192284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014440">SUSE bug 1014440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192284">SUSE bug 1192284</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2124">CVE-2016-2124 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25717">CVE-2020-25717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657099" comment="libdcerpc-binding0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655588" comment="libdcerpc-binding0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657100" comment="libdcerpc0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655590" comment="libdcerpc0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657101" comment="libndr-krb5pac0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655592" comment="libndr-krb5pac0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657102" comment="libndr-nbt0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655594" comment="libndr-nbt0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657103" comment="libndr-standard0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655596" comment="libndr-standard0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657104" comment="libndr0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655598" comment="libndr0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657105" comment="libnetapi0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655600" comment="libnetapi0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657106" comment="libsamba-credentials0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655602" comment="libsamba-credentials0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657107" comment="libsamba-errors0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655604" comment="libsamba-errors0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657108" comment="libsamba-hostconfig0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655606" comment="libsamba-hostconfig0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657109" comment="libsamba-passdb0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655608" comment="libsamba-passdb0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657110" comment="libsamba-util0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655610" comment="libsamba-util0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657111" comment="libsamdb0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655612" comment="libsamdb0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657112" comment="libsmbclient0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655614" comment="libsmbclient0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657113" comment="libsmbconf0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655616" comment="libsmbconf0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657114" comment="libsmbldap0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655618" comment="libsmbldap0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657115" comment="libtevent-util0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655620" comment="libtevent-util0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657116" comment="libwbclient0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655622" comment="libwbclient0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657117" comment="samba-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657118" comment="samba-client-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655625" comment="samba-client-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655626" comment="samba-doc-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657119" comment="samba-libs-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655628" comment="samba-libs-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657120" comment="samba-winbind-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655630" comment="samba-winbind-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151601" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1192042" ref_url="https://bugzilla.suse.com/1192042" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0935" ref_url="https://www.suse.com/security/cve/CVE-2021-0935/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- CVE-2021-0935: Fixed use after free that could lead to local escalation of privilege in ip6_xmit of ip6_output.c (bsc#1192042).
- CVE-2021-3752: Fixed vulnerability in the linux kernel Bluetooth uaf module (bsc#1190432).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192042">SUSE bug 1192042</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0935/">CVE-2021-0935 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0935">CVE-2021-0935 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3752">CVE-2021-3752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009657121" comment="kgraft-patch-4_4_180-94_135-default-14-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151602" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1192042" ref_url="https://bugzilla.suse.com/1192042" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0935" ref_url="https://www.suse.com/security/cve/CVE-2021-0935/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following security issues were fixed:

- CVE-2021-0935: Fixed use after free that could lead to local escalation of privilege in ip6_xmit of ip6_output.c (bsc#1192042).
- CVE-2021-3752: Fixed vulnerability in the linux kernel Bluetooth uaf module (bsc#1190432).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192042">SUSE bug 1192042</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0935/">CVE-2021-0935 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0935">CVE-2021-0935 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3752">CVE-2021-3752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009657122" comment="kgraft-patch-4_4_180-94_138-default-12-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151603" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1192042" ref_url="https://bugzilla.suse.com/1192042" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0935" ref_url="https://www.suse.com/security/cve/CVE-2021-0935/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.

The following security issues were fixed:

- CVE-2021-0935: Fixed use after free that could lead to local escalation of privilege in ip6_xmit of ip6_output.c (bsc#1192042).
- CVE-2021-3752: Fixed vulnerability in the linux kernel Bluetooth uaf module (bsc#1190432).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192042">SUSE bug 1192042</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0935/">CVE-2021-0935 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0935">CVE-2021-0935 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3752">CVE-2021-3752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009657123" comment="kgraft-patch-4_4_180-94_141-default-11-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151604" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1192042" ref_url="https://bugzilla.suse.com/1192042" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0935" ref_url="https://www.suse.com/security/cve/CVE-2021-0935/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes several issues.

The following security issues were fixed:

- CVE-2021-0935: Fixed use after free that could lead to local escalation of privilege in ip6_xmit of ip6_output.c (bsc#1192042).
- CVE-2021-3752: Fixed vulnerability in the linux kernel Bluetooth uaf module (bsc#1190432).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192042">SUSE bug 1192042</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0935/">CVE-2021-0935 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0935">CVE-2021-0935 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3752">CVE-2021-3752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009657124" comment="kgraft-patch-4_4_180-94_144-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151605" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1192042" ref_url="https://bugzilla.suse.com/1192042" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0935" ref_url="https://www.suse.com/security/cve/CVE-2021-0935/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes several issues.

The following security issues were fixed:

- CVE-2021-0935: Fixed use after free that could lead to local escalation of privilege in ip6_xmit of ip6_output.c (bsc#1192042).
- CVE-2021-3752: Fixed vulnerability in the linux kernel Bluetooth uaf module (bsc#1190432).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192042">SUSE bug 1192042</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0935/">CVE-2021-0935 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0935">CVE-2021-0935 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3752">CVE-2021-3752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009657125" comment="kgraft-patch-4_4_180-94_147-default-5-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151606" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql13, postgresql14  (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<description>
This update for postgresql, postgresql13 and postgresql14 fixes the following issues:

Security issues fixed:

- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).

This update also ships postgresql14 to SUSE Linux Enterprise 12 SP5. (jsc#SLE-22673)
On older service packs only libpq5 and libecpg6 are being replaced by the postgresql14 variants.

Feature changes in postgresql14:

- https://www.postgresql.org/about/news/postgresql-14-released-2318/
- https://www.postgresql.org/docs/14/release-14.html

		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-20"/>
	<updated date="2021-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657155" comment="libecpg6-14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657156" comment="libpq5-14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656229" comment="libpq5-32bit-14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656230" comment="postgresql-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656231" comment="postgresql-contrib-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656232" comment="postgresql-docs-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656233" comment="postgresql-plperl-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656234" comment="postgresql-plpython-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656235" comment="postgresql-pltcl-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656236" comment="postgresql-server-14-4.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151607" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<description>
This update for postgresql96 fixes the following issues:

- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657364" comment="postgresql96-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657365" comment="postgresql96-contrib-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656857" comment="postgresql96-docs-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657366" comment="postgresql96-plperl-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657367" comment="postgresql96-plpython-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657368" comment="postgresql96-pltcl-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657369" comment="postgresql96-server-9.6.24-6.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151608" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:
          
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657370" comment="postgresql10-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657371" comment="postgresql10-contrib-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656534" comment="postgresql10-docs-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657372" comment="postgresql10-plperl-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657373" comment="postgresql10-plpython-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657374" comment="postgresql10-pltcl-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657375" comment="postgresql10-server-10.19-4.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151609" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1191937" ref_url="https://bugzilla.suse.com/1191937" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42762" ref_url="https://www.suse.com/security/cve/CVE-2021-42762/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2021-42762: Updated seccomp rules with latest changes from flatpak (bsc#1191937).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-23"/>
	<updated date="2021-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191937">SUSE bug 1191937</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42762/">CVE-2021-42762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42762">CVE-2021-42762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657562" comment="libjavascriptcoregtk-4_0-18-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657563" comment="libwebkit2gtk-4_0-37-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657332" comment="libwebkit2gtk3-lang-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657564" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657565" comment="typelib-1_0-WebKit2-4_0-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657566" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657567" comment="webkit2gtk-4_0-injected-bundles-2.32.4-2.74.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151610" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1191901" ref_url="https://bugzilla.suse.com/1191901" source="BUGZILLA"/>
		<reference ref_id="1191903" ref_url="https://bugzilla.suse.com/1191903" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191906" ref_url="https://bugzilla.suse.com/1191906" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version OpenJDK 8u312 (October 2021 CPU):
  
- CVE-2021-35550: Fixed weak ciphers preferred over stronger ones for TLS (bsc#1191901).
- CVE-2021-35556: Fixed excessive memory allocation in RTFParser (bsc#1191910).
- CVE-2021-35559: Fixed excessive memory allocation in RTFReader (bsc#1191911).
- CVE-2021-35561: Fixed excessive memory allocation in HashMap and HashSet (bsc#1191912).
- CVE-2021-35564: Fixed certificates with end dates too far in the future can corrupt keystore (bsc#1191913).
- CVE-2021-35565: Fixed loop in HttpsServer triggered during TLS session close (bsc#1191909).
- CVE-2021-35567: Fixed incorrect principal selection when using Kerberos Constrained Delegation (bsc#1191903).
- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake (bsc#1191904).
- CVE-2021-35586: Fixed excessive memory allocation in BMPImageReader (bsc#1191914).
- CVE-2021-35588: Fixed incomplete validation of inner class references in ClassFileParser (bsc#1191905)
- CVE-2021-35603: Fixed non-constant comparison during TLS handshakes (bsc#1191906).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-23"/>
	<updated date="2021-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191903">SUSE bug 1191903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35550">CVE-2021-35550 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35567">CVE-2021-35567 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657568" comment="java-1_8_0-openjdk-1.8.0.312-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657569" comment="java-1_8_0-openjdk-demo-1.8.0.312-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657570" comment="java-1_8_0-openjdk-devel-1.8.0.312-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657571" comment="java-1_8_0-openjdk-headless-1.8.0.312-27.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151611" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1191901" ref_url="https://bugzilla.suse.com/1191901" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191906" ref_url="https://bugzilla.suse.com/1191906" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:


Update to OpenJDK 7u321 (October 2021 CPU):

- CVE-2021-35550: Fixed weak ciphers preferred over stronger ones for TLS (bsc#1191901).
- CVE-2021-35556: Fixed excessive memory allocation in RTFParser (bsc#1191910).
- CVE-2021-35559: Fixed excessive memory allocation in RTFReader (bsc#1191911).
- CVE-2021-35561: Fixed excessive memory allocation in HashMap and HashSet (bsc#1191912).
- CVE-2021-35564: Fixed certificates with end dates too far in the future can corrupt keystore (bsc#1191913).
- CVE-2021-35565: Fixed loop in HttpsServer triggered during TLS session close (bsc#1191909).
- CVE-2021-35586: Fixed excessive memory allocation in BMPImageReader (bsc#1191914).
- CVE-2021-35588: Fixed incomplete validation of inner class references in ClassFileParser (bsc#1191905)
- CVE-2021-35603: Fixed non-constant comparison during TLS handshakes (bsc#1191906).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35550">CVE-2021-35550 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657879" comment="java-1_7_0-openjdk-1.7.0.321-43.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657880" comment="java-1_7_0-openjdk-demo-1.7.0.321-43.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657881" comment="java-1_7_0-openjdk-devel-1.7.0.321-43.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657882" comment="java-1_7_0-openjdk-headless-1.7.0.321-43.53.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151612" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1177125" ref_url="https://bugzilla.suse.com/1177125" source="BUGZILLA"/>
		<reference ref_id="1188160" ref_url="https://bugzilla.suse.com/1188160" source="BUGZILLA"/>
		<reference ref_id="1188161" ref_url="https://bugzilla.suse.com/1188161" source="BUGZILLA"/>
		<reference ref_id="1190375" ref_url="https://bugzilla.suse.com/1190375" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25613" ref_url="https://www.suse.com/security/cve/CVE-2020-25613/" source="CVE"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<description>
This update for ruby2.1 fixes the following issues:

- CVE-2020-25613: Fixed potential HTTP request smuggling in WEBrick (bsc#1177125).
- CVE-2021-31799: Fixed Command injection vulnerability in RDoc (bsc#1190375).
- CVE-2021-31810: Fixed trusting FTP PASV responses vulnerability in Net:FTP (bsc#1188161).
- CVE-2021-32066: Fixed StartTLS stripping vulnerability in Net:IMAP (bsc#1188160).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177125">SUSE bug 1177125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188160">SUSE bug 1188160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188161">SUSE bug 1188161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190375">SUSE bug 1190375</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25613/">CVE-2020-25613 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25613">CVE-2020-25613 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31799">CVE-2021-31799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31810">CVE-2021-31810 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32066">CVE-2021-32066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658829" comment="libruby2_1-2_1-2.1.9-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658830" comment="ruby2.1-2.1.9-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658831" comment="ruby2.1-stdlib-2.1.9-19.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151613" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1192554" ref_url="https://bugzilla.suse.com/1192554" source="BUGZILLA"/>
		<reference ref_id="1192557" ref_url="https://bugzilla.suse.com/1192557" source="BUGZILLA"/>
		<reference ref_id="1192559" ref_url="https://bugzilla.suse.com/1192559" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28704" ref_url="https://www.suse.com/security/cve/CVE-2021-28704/" source="CVE"/>
		<reference ref_id="CVE-2021-28705" ref_url="https://www.suse.com/security/cve/CVE-2021-28705/" source="CVE"/>
		<reference ref_id="CVE-2021-28706" ref_url="https://www.suse.com/security/cve/CVE-2021-28706/" source="CVE"/>
		<reference ref_id="CVE-2021-28707" ref_url="https://www.suse.com/security/cve/CVE-2021-28707/" source="CVE"/>
		<reference ref_id="CVE-2021-28708" ref_url="https://www.suse.com/security/cve/CVE-2021-28708/" source="CVE"/>
		<reference ref_id="CVE-2021-28709" ref_url="https://www.suse.com/security/cve/CVE-2021-28709/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-28704, CVE-2021-28707, CVE-2021-28708: Fixed PoD operations on misaligned GFNs (XSA-388) (bsc#1192557).
- CVE-2021-28705, CVE-2021-28709: Fixed issues with partially successful P2M updates on x86 (XSA-389) (bsc#1192559).
- CVE-2021-28706: Fixed guests may exceed their designated memory limit (XSA-385) (bsc#1192554).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192554">SUSE bug 1192554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192557">SUSE bug 1192557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192559">SUSE bug 1192559</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28704/">CVE-2021-28704 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28704">CVE-2021-28704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28705/">CVE-2021-28705 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28705">CVE-2021-28705 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28706/">CVE-2021-28706 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28706">CVE-2021-28706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28707/">CVE-2021-28707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28707">CVE-2021-28707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28708/">CVE-2021-28708 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28708">CVE-2021-28708 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28709/">CVE-2021-28709 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28709">CVE-2021-28709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658666" comment="xen-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658667" comment="xen-doc-html-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658668" comment="xen-libs-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658669" comment="xen-libs-32bit-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658670" comment="xen-tools-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658671" comment="xen-tools-domU-4.9.4_24-3.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151614" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1103032" ref_url="https://bugzilla.suse.com/1103032" source="BUGZILLA"/>
		<reference ref_id="1188284" ref_url="https://bugzilla.suse.com/1188284" source="BUGZILLA"/>
		<reference ref_id="1192346" ref_url="https://bugzilla.suse.com/1192346" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2018-14679: Fixed off-by-one issue in embedded libmspack that could lead to denial of service (bsc#1103032). 
  
- Update to 0.103.4 (bsc#1192346).
- Update to 0.103.3 (bsc#1188284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188284">SUSE bug 1188284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192346">SUSE bug 1192346</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14679">CVE-2018-14679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658832" comment="clamav-0.103.4-33.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151615" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1192063" ref_url="https://bugzilla.suse.com/1192063" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2021-30846: Fixed memory corruption issue that could lead to arbitrary code execution when processing maliciously crafted web content (bsc#1192063).
- CVE-2021-30851: Fixed memory corruption vulnerability that could lead to arbitrary code execution when processing maliciously crafted web content (bsc#1192063).   
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192063">SUSE bug 1192063</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30846">CVE-2021-30846 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30851">CVE-2021-30851 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658833" comment="libjavascriptcoregtk-4_0-18-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658834" comment="libwebkit2gtk-4_0-37-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658196" comment="libwebkit2gtk3-lang-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658835" comment="typelib-1_0-JavaScriptCore-4_0-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658836" comment="typelib-1_0-WebKit2-4_0-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658837" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658838" comment="webkit2gtk-4_0-injected-bundles-2.34.1-2.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151616" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1073928" ref_url="https://bugzilla.suse.com/1073928" source="BUGZILLA"/>
		<reference ref_id="1098425" ref_url="https://bugzilla.suse.com/1098425" source="BUGZILLA"/>
		<reference ref_id="1100416" ref_url="https://bugzilla.suse.com/1100416" source="BUGZILLA"/>
		<reference ref_id="1119934" ref_url="https://bugzilla.suse.com/1119934" source="BUGZILLA"/>
		<reference ref_id="1129735" ref_url="https://bugzilla.suse.com/1129735" source="BUGZILLA"/>
		<reference ref_id="1171217" ref_url="https://bugzilla.suse.com/1171217" source="BUGZILLA"/>
		<reference ref_id="1171420" ref_url="https://bugzilla.suse.com/1171420" source="BUGZILLA"/>
		<reference ref_id="1173346" ref_url="https://bugzilla.suse.com/1173346" source="BUGZILLA"/>
		<reference ref_id="1176724" ref_url="https://bugzilla.suse.com/1176724" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1181158" ref_url="https://bugzilla.suse.com/1181158" source="BUGZILLA"/>
		<reference ref_id="1181854" ref_url="https://bugzilla.suse.com/1181854" source="BUGZILLA"/>
		<reference ref_id="1181855" ref_url="https://bugzilla.suse.com/1181855" source="BUGZILLA"/>
		<reference ref_id="1183089" ref_url="https://bugzilla.suse.com/1183089" source="BUGZILLA"/>
		<reference ref_id="1184673" ref_url="https://bugzilla.suse.com/1184673" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185727" ref_url="https://bugzilla.suse.com/1185727" source="BUGZILLA"/>
		<reference ref_id="1185758" ref_url="https://bugzilla.suse.com/1185758" source="BUGZILLA"/>
		<reference ref_id="1185973" ref_url="https://bugzilla.suse.com/1185973" source="BUGZILLA"/>
		<reference ref_id="1186109" ref_url="https://bugzilla.suse.com/1186109" source="BUGZILLA"/>
		<reference ref_id="1186390" ref_url="https://bugzilla.suse.com/1186390" source="BUGZILLA"/>
		<reference ref_id="1188172" ref_url="https://bugzilla.suse.com/1188172" source="BUGZILLA"/>
		<reference ref_id="1188563" ref_url="https://bugzilla.suse.com/1188563" source="BUGZILLA"/>
		<reference ref_id="1188601" ref_url="https://bugzilla.suse.com/1188601" source="BUGZILLA"/>
		<reference ref_id="1188838" ref_url="https://bugzilla.suse.com/1188838" source="BUGZILLA"/>
		<reference ref_id="1188876" ref_url="https://bugzilla.suse.com/1188876" source="BUGZILLA"/>
		<reference ref_id="1188983" ref_url="https://bugzilla.suse.com/1188983" source="BUGZILLA"/>
		<reference ref_id="1188985" ref_url="https://bugzilla.suse.com/1188985" source="BUGZILLA"/>
		<reference ref_id="1189057" ref_url="https://bugzilla.suse.com/1189057" source="BUGZILLA"/>
		<reference ref_id="1189262" ref_url="https://bugzilla.suse.com/1189262" source="BUGZILLA"/>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189291" ref_url="https://bugzilla.suse.com/1189291" source="BUGZILLA"/>
		<reference ref_id="1189399" ref_url="https://bugzilla.suse.com/1189399" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="1189706" ref_url="https://bugzilla.suse.com/1189706" source="BUGZILLA"/>
		<reference ref_id="1190022" ref_url="https://bugzilla.suse.com/1190022" source="BUGZILLA"/>
		<reference ref_id="1190023" ref_url="https://bugzilla.suse.com/1190023" source="BUGZILLA"/>
		<reference ref_id="1190025" ref_url="https://bugzilla.suse.com/1190025" source="BUGZILLA"/>
		<reference ref_id="1190067" ref_url="https://bugzilla.suse.com/1190067" source="BUGZILLA"/>
		<reference ref_id="1190117" ref_url="https://bugzilla.suse.com/1190117" source="BUGZILLA"/>
		<reference ref_id="1190159" ref_url="https://bugzilla.suse.com/1190159" source="BUGZILLA"/>
		<reference ref_id="1190194" ref_url="https://bugzilla.suse.com/1190194" source="BUGZILLA"/>
		<reference ref_id="1190349" ref_url="https://bugzilla.suse.com/1190349" source="BUGZILLA"/>
		<reference ref_id="1190351" ref_url="https://bugzilla.suse.com/1190351" source="BUGZILLA"/>
		<reference ref_id="1190601" ref_url="https://bugzilla.suse.com/1190601" source="BUGZILLA"/>
		<reference ref_id="1190717" ref_url="https://bugzilla.suse.com/1190717" source="BUGZILLA"/>
		<reference ref_id="1191193" ref_url="https://bugzilla.suse.com/1191193" source="BUGZILLA"/>
		<reference ref_id="1191315" ref_url="https://bugzilla.suse.com/1191315" source="BUGZILLA"/>
		<reference ref_id="1191790" ref_url="https://bugzilla.suse.com/1191790" source="BUGZILLA"/>
		<reference ref_id="1191801" ref_url="https://bugzilla.suse.com/1191801" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1191961" ref_url="https://bugzilla.suse.com/1191961" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192400" ref_url="https://bugzilla.suse.com/1192400" source="BUGZILLA"/>
		<reference ref_id="1192775" ref_url="https://bugzilla.suse.com/1192775" source="BUGZILLA"/>
		<reference ref_id="1192781" ref_url="https://bugzilla.suse.com/1192781" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17862" ref_url="https://www.suse.com/security/cve/CVE-2017-17862/" source="CVE"/>
		<reference ref_id="CVE-2017-17864" ref_url="https://www.suse.com/security/cve/CVE-2017-17864/" source="CVE"/>
		<reference ref_id="CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405/" source="CVE"/>
		<reference ref_id="CVE-2018-16882" ref_url="https://www.suse.com/security/cve/CVE-2018-16882/" source="CVE"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-12655" ref_url="https://www.suse.com/security/cve/CVE-2020-12655/" source="CVE"/>
		<reference ref_id="CVE-2020-14305" ref_url="https://www.suse.com/security/cve/CVE-2020-14305/" source="CVE"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<reference ref_id="CVE-2021-20265" ref_url="https://www.suse.com/security/cve/CVE-2021-20265/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="CVE-2021-31916" ref_url="https://www.suse.com/security/cve/CVE-2021-31916/" source="CVE"/>
		<reference ref_id="CVE-2021-33033" ref_url="https://www.suse.com/security/cve/CVE-2021-33033/" source="CVE"/>
		<reference ref_id="CVE-2021-34556" ref_url="https://www.suse.com/security/cve/CVE-2021-34556/" source="CVE"/>
		<reference ref_id="CVE-2021-34981" ref_url="https://www.suse.com/security/cve/CVE-2021-34981/" source="CVE"/>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<reference ref_id="CVE-2021-35477" ref_url="https://www.suse.com/security/cve/CVE-2021-35477/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655/" source="CVE"/>
		<reference ref_id="CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159/" source="CVE"/>
		<reference ref_id="CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="CVE-2021-3760" ref_url="https://www.suse.com/security/cve/CVE-2021-3760/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="CVE-2021-38204" ref_url="https://www.suse.com/security/cve/CVE-2021-38204/" source="CVE"/>
		<reference ref_id="CVE-2021-3896" ref_url="https://www.suse.com/security/cve/CVE-2021-3896/" source="CVE"/>
		<reference ref_id="CVE-2021-40490" ref_url="https://www.suse.com/security/cve/CVE-2021-40490/" source="CVE"/>
		<reference ref_id="CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<description>


The SUSE Linux Enterprise 12 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)

  You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails  (bsc#1191961).
- CVE-2020-12655: An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767 (bnc#1171217).
- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).
- CVE-2021-34556: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack (bnc#1188983).
- CVE-2021-35477: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation did not necessarily occur before a store operation that has an attacker-controlled value (bnc#1188985).
- CVE-2017-17862: kernel/bpf/verifier.c in the Linux kernel ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service (bnc#1073928).
- CVE-2017-17864: kernel/bpf/verifier.c in the Linux kernel mishandled states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allowed local users to obtain potentially sensitive address information, aka a 'pointer leak (bnc#1073928).
- CVE-2021-20265: A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allowed an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability (bnc#1183089).
- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
- CVE-2021-3655: Missing size validations on inbound SCTP packets may have allowed the kernel to read uninitialized memory (bnc#1188563).
- CVE-2018-13405: The inode_init_owner function in fs/inode.c in the Linux kernel allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416 bnc#1129735).
- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-&gt;rf_conn_info object (bsc#1190067).
- CVE-2021-42739: The firewire subsystem in the Linux kernel has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bnc#1184673).
- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).
- CVE-2021-33033: The Linux kernel has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value (bnc#1186109 bnc#1186390 bnc#1188876).
- CVE-2020-14305: An out-of-bounds memory write flaw was found in how the Linux kernel&amp;#8217;s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allowed an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability (bnc#1173346).
- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).
- CVE-2021-3896: Fixed a array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (bsc#1191958).
- CVE-2021-42008: The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access (bnc#1191315).
- CVE-2020-3702: Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic (bnc#1191193).
- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel's bluetooth module. (bsc#1190023)
- CVE-2021-40490: A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel (bnc#1190159 bnc#1192775)
- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)
- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).
- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).
- CVE-2021-3653: A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the 'int_ctl' field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7 (bnc#1189399 bnc#1189420).
- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262 bnc#1189278).
- CVE-2021-38204: drivers/usb/host/max3421-hcd.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).
- CVE-2021-3679: A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).
- CVE-2018-16882: A use-after-free issue was found in the way the Linux kernel's KVM hypervisor processed posted interrupts when nested(=1) virtualization is enabled. In nested_get_vmcs12_pages(), in case of an error while processing posted interrupt address, it unmaps the 'pi_desc_page' without resetting 'pi_desc' descriptor address, which is later used in pi_test_and_clear_on(). A guest user/process could use this flaw to crash the host kernel resulting in DoS or potentially gain privileged access to a system. Kernel versions and are vulnerable (bnc#1119934).
- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1176724).
- CVE-2020-4788: IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296 (bnc#1177666 bnc#1181158).
- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).
- CVE-2021-37576: arch/powerpc/kvm/book3s_rtas.c in the Linux kernel on the powerpc platform allowed KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e (bnc#1188838).

The following non-security bugs were fixed:

- PCI: hv: Use expected affinity when unmasking IRQ (bsc#1185973).
- SUNRPC: improve error response to over-size gss credential (bsc#1190022).
- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
- blacklist.conf: Drop a line that was added by mistake
- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22918)
- bpf: Disallow unprivileged bpf by default (jsc#SLE-22918).
- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).
- config: disable unprivileged BPF by default (jsc#SLE-22918)
- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758,bsc#1192400).
- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).
- hv: mana: adjust mana_select_queue to old API (jsc#SLE-18779, bsc#1185727).
- hv: mana: declare vzalloc (jsc#SLE-18779, bsc#1185726).
- hv: mana: fake bitmap API (jsc#SLE-18779, bsc#1185726).
- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185727).
- kABI: protect struct bpf_map (kabi).
- mm: replace open coded page to virt conversion with page_to_virt() (jsc#SLE-18779, bsc#1185727).
- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854 bsc#1181855).
- net/mlx4_en: Handle TX error CQE (bsc#1181854 bsc#1181855).
- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185727).
- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185727).
- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185727).
- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185727).
- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191801).
- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185727).
- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185727).
- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185727).
- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185727).
- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (bsc#1190601).
- s390/bpf: Fix branch shortening during codegen pass (bsc#1190601).
- s390/bpf: Fix optimizing out zero-extensions (bsc#1190601).
- s390/bpf: Wrap JIT macro parameter usages in parentheses (bsc#1190601).
- s390: bpf: implement jitting of BPF_ALU | BPF_ARSH | BPF_* (bsc#1190601).
- scsi: sg: add sg_remove_request in sg_write (bsc#1171420 CVE2020-12770).
- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).
- sctp: fully initialize v4 addr in some functions (bsc#1188563).
- sctp: simplify addr copy (bsc#1188563).
- x86/CPU: Add more Icelake model numbers (bsc#1185758,bsc#1192400).
- x86/tlb: Flush global mappings when KAISER is disabled (bsc#1190194).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073928">SUSE bug 1073928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098425">SUSE bug 1098425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100416">SUSE bug 1100416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119934">SUSE bug 1119934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129735">SUSE bug 1129735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171217">SUSE bug 1171217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171420">SUSE bug 1171420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173346">SUSE bug 1173346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176724">SUSE bug 1176724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181854">SUSE bug 1181854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181855">SUSE bug 1181855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183089">SUSE bug 1183089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185727">SUSE bug 1185727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185758">SUSE bug 1185758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185973">SUSE bug 1185973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186109">SUSE bug 1186109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186390">SUSE bug 1186390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188838">SUSE bug 1188838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188983">SUSE bug 1188983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188985">SUSE bug 1188985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189291">SUSE bug 1189291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189706">SUSE bug 1189706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190022">SUSE bug 1190022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190023">SUSE bug 1190023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190067">SUSE bug 1190067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190159">SUSE bug 1190159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190194">SUSE bug 1190194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190349">SUSE bug 1190349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190601">SUSE bug 1190601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190717">SUSE bug 1190717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191193">SUSE bug 1191193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191801">SUSE bug 1191801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191961">SUSE bug 1191961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192400">SUSE bug 1192400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192775">SUSE bug 1192775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192781">SUSE bug 1192781</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17862/">CVE-2017-17862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17862">CVE-2017-17862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17864/">CVE-2017-17864 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17864">CVE-2017-17864 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13405">CVE-2018-13405 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16882/">CVE-2018-16882 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16882">CVE-2018-16882 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12655/">CVE-2020-12655 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12655">CVE-2020-12655 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14305/">CVE-2020-14305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14305">CVE-2020-14305 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3702">CVE-2020-3702 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4788">CVE-2020-4788 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20265/">CVE-2021-20265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20265">CVE-2021-20265 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20322">CVE-2021-20322 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31916/">CVE-2021-31916 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31916">CVE-2021-31916 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33033/">CVE-2021-33033 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33033">CVE-2021-33033 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34556/">CVE-2021-34556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34556">CVE-2021-34556 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34981/">CVE-2021-34981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-34981">CVE-2021-34981 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3542">CVE-2021-3542 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35477/">CVE-2021-35477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35477">CVE-2021-35477 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3655">CVE-2021-3655 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3659">CVE-2021-3659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3679">CVE-2021-3679 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3715">CVE-2021-3715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37159">CVE-2021-37159 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3732">CVE-2021-3732 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3752">CVE-2021-3752 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3753">CVE-2021-3753 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3760/">CVE-2021-3760 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3760">CVE-2021-3760 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3772">CVE-2021-3772 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160">CVE-2021-38160 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38204/">CVE-2021-38204 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38204">CVE-2021-38204 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3896/">CVE-2021-3896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3896">CVE-2021-3896 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40490/">CVE-2021-40490 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40490">CVE-2021-40490 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42008">CVE-2021-42008 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43389">CVE-2021-43389 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659136" comment="kernel-default-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659137" comment="kernel-default-base-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659138" comment="kernel-default-devel-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659139" comment="kernel-default-kgraft-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657858" comment="kernel-devel-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657859" comment="kernel-macros-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657860" comment="kernel-source-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659140" comment="kernel-syms-4.4.180-94.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659141" comment="kgraft-patch-4_4_180-94_150-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151617" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1193170" ref_url="https://bugzilla.suse.com/1193170" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<description>
This update for mozilla-nss fixes the following issues:

Update to version 3.68.1:

- CVE-2021-43527: Fixed a Heap overflow in NSS when verifying DER-encoded DSA or RSA-PSS signatures (bsc#1193170).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659142" comment="libfreebl3-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659086" comment="libfreebl3-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659143" comment="libfreebl3-hmac-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659088" comment="libfreebl3-hmac-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659144" comment="libsoftokn3-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659090" comment="libsoftokn3-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659145" comment="libsoftokn3-hmac-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659092" comment="libsoftokn3-hmac-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659146" comment="mozilla-nss-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659094" comment="mozilla-nss-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659147" comment="mozilla-nss-certs-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659096" comment="mozilla-nss-certs-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659148" comment="mozilla-nss-devel-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659149" comment="mozilla-nss-sysinit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659099" comment="mozilla-nss-sysinit-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659150" comment="mozilla-nss-tools-3.68.1-58.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151618" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1190975" ref_url="https://bugzilla.suse.com/1190975" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<description>
This update for openssh fixes the following issues:
  
- CVE-2021-41617: Fixed privilege escalation when AuthorizedKeysCommand/AuthorizedPrincipalsCommand are configured (bsc#1190975).  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190975">SUSE bug 1190975</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41617">CVE-2021-41617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659151" comment="openssh-7.2p2-74.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659152" comment="openssh-askpass-gnome-7.2p2-74.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659153" comment="openssh-fips-7.2p2-74.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659154" comment="openssh-helpers-7.2p2-74.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151619" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1193321" ref_url="https://bugzilla.suse.com/1193321" source="BUGZILLA"/>
		<reference ref_id="1193485" ref_url="https://bugzilla.suse.com/1193485" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:
                                                                                                                    
Update to Extended Support Release 91.4.0 (bsc#1193485):                                                            
                                                                                                                    
- CVE-2021-43536: URL leakage when navigating while executing asynchronous function
- CVE-2021-43537: Heap buffer overflow when using structured clone                         
- CVE-2021-43538: Missing fullscreen and pointer lock notification when requesting both
- CVE-2021-43539: GC rooting failure when calling wasm instance methods 
- CVE-2021-43541: External protocol handler parameters were unescaped                                                  
- CVE-2021-43542: XMLHttpRequest error codes could have leaked the existence of an external protocol handler           
- CVE-2021-43543: Bypass of CSP sandbox directive when embedding                                                       
- CVE-2021-43545: Denial of Service when using the Location API in a loop                                              
- CVE-2021-43546: Cursor spoofing could overlay user interface when native cursor is zoomed                         
- Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4                                                       
- Removed x-scheme-handler/ftp from MozillaFirefox.desktop (bsc#1193321)                                            
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-12"/>
	<updated date="2021-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193321">SUSE bug 1193321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43536">CVE-2021-43536 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43537">CVE-2021-43537 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43538">CVE-2021-43538 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43539">CVE-2021-43539 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43541">CVE-2021-43541 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43542">CVE-2021-43542 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43543">CVE-2021-43543 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43545">CVE-2021-43545 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43546">CVE-2021-43546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659604" comment="MozillaFirefox-91.4.0-112.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659605" comment="MozillaFirefox-devel-91.4.0-112.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659606" comment="MozillaFirefox-translations-common-91.4.0-112.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151620" version="1" class="patch">
	<metadata>
		<title>Security update for glib-networking (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1172460" ref_url="https://bugzilla.suse.com/1172460" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13645" ref_url="https://www.suse.com/security/cve/CVE-2020-13645/" source="CVE"/>
		<description>
This update for glib-networking fixes the following issues:

- CVE-2020-13645: Fixed a connection failure when the server identity is unset (bsc#1172460).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-13"/>
	<updated date="2021-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172460">SUSE bug 1172460</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13645/">CVE-2020-13645 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13645">CVE-2020-13645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659749" comment="glib-networking-2.48.2-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659084" comment="glib-networking-lang-2.48.2-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151621" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">CVE-2020-29569 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009557077" comment="kgraft-patch-4_4_180-94_135-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151622" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">CVE-2020-29569 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009557078" comment="kgraft-patch-4_4_180-94_130-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151623" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="1192042" ref_url="https://bugzilla.suse.com/1192042" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0935" ref_url="https://www.suse.com/security/cve/CVE-2021-0935/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_150 fixes several issues.

The following security issues were fixed:

- CVE-2021-0935: In ip6_xmit of ip6_output.c, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (bsc#1192032)
- CVE-2021-28688: The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. (bsc#1183646) 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192042">SUSE bug 1192042</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0935/">CVE-2021-0935 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0935">CVE-2021-0935 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721291" comment="kernel-default 4.4.180-94.150 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719630" comment="kgraft-patch-4_4_180-94_150-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009659893" comment="kgraft-patch-4_4_180-94_150-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151624" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1191813" ref_url="https://bugzilla.suse.com/1191813" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes one issue.

The following security issue was fixed:

- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20322">CVE-2021-20322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009659894" comment="kgraft-patch-4_4_180-94_147-default-6-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151625" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1191813" ref_url="https://bugzilla.suse.com/1191813" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes one issue.

The following security issue was fixed:

- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20322">CVE-2021-20322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009659895" comment="kgraft-patch-4_4_180-94_144-default-9-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151626" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1191813" ref_url="https://bugzilla.suse.com/1191813" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes one issue.

The following security issue was fixed:

- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20322">CVE-2021-20322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009659896" comment="kgraft-patch-4_4_180-94_141-default-12-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151627" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1191813" ref_url="https://bugzilla.suse.com/1191813" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes one issue.

The following security issue was fixed:

- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20322">CVE-2021-20322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009659897" comment="kgraft-patch-4_4_180-94_138-default-13-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151628" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.

The following security issues were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">CVE-2020-29569 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009557079" comment="kgraft-patch-4_4_180-94_127-default-6-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151629" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1193030" ref_url="https://bugzilla.suse.com/1193030" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:
 
- CVE-2021-4008: Fixed Privilege Escalation Vulnerability via Out-Of-Bounds Access in SProcRenderCompositeGlyphs (bsc#1193030).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193030">SUSE bug 1193030</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4008">CVE-2021-4008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659898" comment="xorg-x11-server-7.6_1.18.3-76.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659899" comment="xorg-x11-server-extra-7.6_1.18.3-76.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151630" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_124 fixes several issues.

The following security issues were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">CVE-2020-29569 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721283" comment="kernel-default 4.4.180-94.124 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719614" comment="kgraft-patch-4_4_180-94_124-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009557080" comment="kgraft-patch-4_4_180-94_124-default-6-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151631" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_121 fixes several issues.

The following security issues were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">CVE-2020-29569 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721282" comment="kernel-default 4.4.180-94.121 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719612" comment="kgraft-patch-4_4_180-94_121-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009557081" comment="kgraft-patch-4_4_180-94_121-default-6-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151632" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_116 fixes several issues.

The following security issues were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">CVE-2020-29569 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721281" comment="kernel-default 4.4.180-94.116 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719610" comment="kgraft-patch-4_4_180-94_116-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009557082" comment="kgraft-patch-4_4_180-94_116-default-7-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151633" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<description>
This update for log4j fixes the following issue:

- CVE-2021-4104: Disable the JMSAppender class from log4j to protect against
  the log4jshell vulnerability. [bsc#1193662]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-17"/>
	<updated date="2021-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">CVE-2021-4104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660148" comment="log4j-1.2.15-126.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151634" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1190487" ref_url="https://bugzilla.suse.com/1190487" source="BUGZILLA"/>
		<reference ref_id="1190489" ref_url="https://bugzilla.suse.com/1190489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009/" source="CVE"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4009: The handler for the CreatePointerBarrier request of the XFixes 
  extension does not properly validate the request length leading to out of 
  bounds memory write. (bsc#1190487)
- CVE-2021-4011: The handlers for the RecordCreateContext and RecordRegisterClients
  requests of the Record extension do not properly validate the request
  length leading to out of bounds memory write. (bsc#1190489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-20"/>
	<updated date="2021-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190487">SUSE bug 1190487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4009">CVE-2021-4009 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4011">CVE-2021-4011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660802" comment="xorg-x11-server-7.6_1.18.3-76.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660803" comment="xorg-x11-server-extra-7.6_1.18.3-76.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151635" version="1" class="patch">
	<metadata>
		<title>Recommended update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1192849" ref_url="https://bugzilla.suse.com/1192849" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

The username map advice from the CVE-2020-25717 advisory
note has undesired side effects for the local nt token. Fallback
to a SID/UID based mapping if the name based lookup fails (bsc#1192849).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-20"/>
	<updated date="2021-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192849">SUSE bug 1192849</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25717">CVE-2020-25717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660855" comment="libdcerpc-binding0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660812" comment="libdcerpc-binding0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660856" comment="libdcerpc0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660814" comment="libdcerpc0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660857" comment="libndr-krb5pac0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660816" comment="libndr-krb5pac0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660858" comment="libndr-nbt0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660818" comment="libndr-nbt0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660859" comment="libndr-standard0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660820" comment="libndr-standard0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660860" comment="libndr0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660822" comment="libndr0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660861" comment="libnetapi0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660824" comment="libnetapi0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660862" comment="libsamba-credentials0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660826" comment="libsamba-credentials0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660863" comment="libsamba-errors0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660828" comment="libsamba-errors0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660864" comment="libsamba-hostconfig0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660830" comment="libsamba-hostconfig0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660865" comment="libsamba-passdb0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660832" comment="libsamba-passdb0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660866" comment="libsamba-util0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660834" comment="libsamba-util0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660867" comment="libsamdb0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660836" comment="libsamdb0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660868" comment="libsmbclient0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660838" comment="libsmbclient0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660869" comment="libsmbconf0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660840" comment="libsmbconf0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660870" comment="libsmbldap0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660842" comment="libsmbldap0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660871" comment="libtevent-util0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660844" comment="libtevent-util0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660872" comment="libwbclient0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660846" comment="libwbclient0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660873" comment="samba-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660874" comment="samba-client-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660849" comment="samba-client-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660850" comment="samba-doc-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660875" comment="samba-libs-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660852" comment="samba-libs-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660876" comment="samba-winbind-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660854" comment="samba-winbind-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151636" version="1" class="patch">
	<metadata>
		<title>Security update for chrony (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1063704" ref_url="https://bugzilla.suse.com/1063704" source="BUGZILLA"/>
		<reference ref_id="1069468" ref_url="https://bugzilla.suse.com/1069468" source="BUGZILLA"/>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1083597" ref_url="https://bugzilla.suse.com/1083597" source="BUGZILLA"/>
		<reference ref_id="1099272" ref_url="https://bugzilla.suse.com/1099272" source="BUGZILLA"/>
		<reference ref_id="1115529" ref_url="https://bugzilla.suse.com/1115529" source="BUGZILLA"/>
		<reference ref_id="1128846" ref_url="https://bugzilla.suse.com/1128846" source="BUGZILLA"/>
		<reference ref_id="1156884" ref_url="https://bugzilla.suse.com/1156884" source="BUGZILLA"/>
		<reference ref_id="1159840" ref_url="https://bugzilla.suse.com/1159840" source="BUGZILLA"/>
		<reference ref_id="1161119" ref_url="https://bugzilla.suse.com/1161119" source="BUGZILLA"/>
		<reference ref_id="1162964" ref_url="https://bugzilla.suse.com/1162964" source="BUGZILLA"/>
		<reference ref_id="1171806" ref_url="https://bugzilla.suse.com/1171806" source="BUGZILLA"/>
		<reference ref_id="1172113" ref_url="https://bugzilla.suse.com/1172113" source="BUGZILLA"/>
		<reference ref_id="1173277" ref_url="https://bugzilla.suse.com/1173277" source="BUGZILLA"/>
		<reference ref_id="1173760" ref_url="https://bugzilla.suse.com/1173760" source="BUGZILLA"/>
		<reference ref_id="1174075" ref_url="https://bugzilla.suse.com/1174075" source="BUGZILLA"/>
		<reference ref_id="1174911" ref_url="https://bugzilla.suse.com/1174911" source="BUGZILLA"/>
		<reference ref_id="1180689" ref_url="https://bugzilla.suse.com/1180689" source="BUGZILLA"/>
		<reference ref_id="1181826" ref_url="https://bugzilla.suse.com/1181826" source="BUGZILLA"/>
		<reference ref_id="1183783" ref_url="https://bugzilla.suse.com/1183783" source="BUGZILLA"/>
		<reference ref_id="1184400" ref_url="https://bugzilla.suse.com/1184400" source="BUGZILLA"/>
		<reference ref_id="1187906" ref_url="https://bugzilla.suse.com/1187906" source="BUGZILLA"/>
		<reference ref_id="1190926" ref_url="https://bugzilla.suse.com/1190926" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14367" ref_url="https://www.suse.com/security/cve/CVE-2020-14367/" source="CVE"/>
		<description>
This update for chrony fixes the following issues:

Chrony was updated to 4.1:

* Add support for NTS servers specified by IP address (matching
  Subject Alternative Name in server certificate)
* Add source-specific configuration of trusted certificates
* Allow multiple files and directories with trusted certificates
* Allow multiple pairs of server keys and certificates
* Add copy option to server/pool directive
* Increase PPS lock limit to 40% of pulse interval
* Perform source selection immediately after loading dump files
* Reload dump files for addresses negotiated by NTS-KE server
* Update seccomp filter and add less restrictive level
* Restart ongoing name resolution on online command
* Fix dump files to not include uncorrected offset
* Fix initstepslew to accept time from own NTP clients
* Reset NTP address and port when no longer negotiated by NTS-KE
  server
- Update clknetsim to snapshot f89702d.

- Ensure the correct pool packages are installed for openSUSE and SLE (bsc#1180689).

- Enable syscallfilter unconditionally (bsc#1181826).

Chrony was updated to 4.0:

Enhancements

- Add support for Network Time Security (NTS) authentication
- Add support for AES-CMAC keys (AES128, AES256) with Nettle
- Add authselectmode directive to control selection of
  unauthenticated sources
- Add binddevice, bindacqdevice, bindcmddevice directives
- Add confdir directive to better support fragmented
  configuration
- Add sourcedir directive and 'reload sources' command to
  support dynamic NTP sources specified in files
- Add clockprecision directive
- Add dscp directive to set Differentiated Services Code Point
  (DSCP)
- Add -L option to limit log messages by severity
- Add -p option to print whole configuration with included
  files
- Add -U option to allow start under non-root user
- Allow maxsamples to be set to 1 for faster update with -q/-Q
  option
- Avoid replacing NTP sources with sources that have
  unreachable address
- Improve pools to repeat name resolution to get 'maxsources'
  sources
- Improve source selection with trusted sources
- Improve NTP loop test to prevent synchronisation to itself
- Repeat iburst when NTP source is switched from offline state
  to online
- Update clock synchronisation status and leap status more
  frequently
- Update seccomp filter
- Add 'add pool' command
- Add 'reset sources' command to drop all measurements
- Add authdata command to print details about NTP
  authentication
- Add selectdata command to print details about source
  selection
- Add -N option and sourcename command to print original names
  of sources
- Add -a option to some commands to print also unresolved
  sources
- Add -k, -p, -r options to clients command to select, limit,
  reset data
- Bug fixes
- Don’t set interface for NTP responses to allow asymmetric
  routing
- Handle RTCs that don’t support interrupts
- Respond to command requests with correct address on
  multihomed hosts
- Removed features
- Drop support for RIPEMD keys (RMD128, RMD160, RMD256, RMD320)
- Drop support for long (non-standard) MACs in NTPv4 packets
  (chrony 2.x clients using non-MD5/SHA1 keys need to use
  option 'version 3')

- By default we don't write log files but log to journald, so
  only recommend logrotate.

- Adjust and rename the sysconfig file, so that it matches the
  expectations of chronyd.service (bsc#1173277).

Chrony was updated to 3.5.1:

* Create new file when writing pidfile (CVE-2020-14367, bsc#1174911)

- Add chrony-pool-suse and chrony-pool-openSUSE subpackages that
  preconfigure chrony to use NTP servers from the  respective
  pools for SUSE and openSUSE (bsc#1156884, SLE-11424).
- Add chrony-pool-empty to still allow installing chrony without
  preconfigured servers.
- Use iburst in the default pool statements to speed up initial
  synchronisation (bsc#1172113).

- Update clknetsim to version 79ffe44 (fixes bsc#1162964).

Update to 3.5:

+ Add support for more accurate reading of PHC on Linux 5.0
+ Add support for hardware timestamping on interfaces with read-only timestamping configuration
+ Add support for memory locking and real-time priority on FreeBSD, NetBSD, Solaris
+ Update seccomp filter to work on more architectures
+ Validate refclock driver options
+ Fix bindaddress directive on FreeBSD
+ Fix transposition of hardware RX timestamp on Linux 4.13 and later
+ Fix building on non-glibc systems

- Fix location of helper script in chrony-dnssrv@.service (bsc#1128846).

- Read runtime servers from /var/run/netconfig/chrony.servers (bsc#1099272)
- Move chrony-helper to /usr/lib/chrony/helper, because there should be no executables in /usr/share.
- Remove discrepancies between spec file and chrony-tmpfiles (bsc#1115529) 

Update to version 3.4

* Enhancements

  + Add filter option to server/pool/peer directive
  + Add minsamples and maxsamples options to hwtimestamp directive
  + Add support for faster frequency adjustments in Linux 4.19
  + Change default pidfile to /var/run/chrony/chronyd.pid to allow chronyd 
    without root privileges to remove it on exit
  + Disable sub-second polling intervals for distant NTP sources
  + Extend range of supported sub-second polling intervals
  + Get/set IPv4 destination/source address of NTP packets on FreeBSD
  + Make burst options and command useful with short polling intervals
  + Modify auto_offline option to activate when sending request failed
  + Respond from interface that received NTP request if possible
  + Add onoffline command to switch between online and offline state 
    according to current system network configuration
  + Improve example NetworkManager dispatcher script

* Bug fixes

  + Avoid waiting in Linux getrandom system call
  + Fix PPS support on FreeBSD and NetBSD

Update to version 3.3

* Enhancements:

  + Add burst option to server/pool directive
  + Add stratum and tai options to refclock directive
  + Add support for Nettle crypto library
  + Add workaround for missing kernel receive timestamps on Linux
  + Wait for late hardware transmit timestamps
  + Improve source selection with unreachable sources
  + Improve protection against replay attacks on symmetric mode
  + Allow PHC refclock to use socket in /var/run/chrony
  + Add shutdown command to stop chronyd
  + Simplify format of response to manual list command
  + Improve handling of unknown responses in chronyc

* Bug fixes:

  + Respond to NTPv1 client requests with zero mode
  + Fix -x option to not require CAP_SYS_TIME under non-root user
  + Fix acquisitionport directive to work with privilege separation
  + Fix handling of socket errors on Linux to avoid high CPU usage
  + Fix chronyc to not get stuck in infinite loop after clock step

- Added /etc/chrony.d/ directory to the package (bsc#1083597) Modifed default chrony.conf to add 'include /etc/chrony.d/*'

- Enable pps support

Upgraded to version 3.2:

Enhancements

* Improve stability with NTP sources and reference clocks
* Improve stability with hardware timestamping
* Improve support for NTP interleaved modes
* Control frequency of system clock on macOS 10.13 and later
* Set TAI-UTC offset of system clock with leapsectz directive
* Minimise data in client requests to improve privacy
* Allow transmit-only hardware timestamping
* Add support for new timestamping options introduced in Linux 4.13
* Add root delay, root dispersion and maximum error to tracking log
* Add mindelay and asymmetry options to server/peer/pool directive
* Add extpps option to PHC refclock to timestamp external PPS signal
* Add pps option to refclock directive to treat any refclock as PPS
* Add width option to refclock directive to filter wrong pulse edges
* Add rxfilter option to hwtimestamp directive
* Add -x option to disable control of system clock
* Add -l option to log to specified file instead of syslog
* Allow multiple command-line options to be specified together
* Allow starting without root privileges with -Q option
* Update seccomp filter for new glibc versions
* Dump history on exit by default with dumpdir directive
* Use hardening compiler options by default

Bug fixes

* Don't drop PHC samples with low-resolution system clock
* Ignore outliers in PHC tracking, RTC tracking, manual input
* Increase polling interval when peer is not responding
* Exit with error message when include directive fails
* Don't allow slash after hostname in allow/deny directive/command
* Try to connect to all addresses in chronyc before giving up

Upgraded to version 3.1:

- Enhancements

  - Add support for precise cross timestamping of PHC on Linux
  - Add minpoll, precision, nocrossts options to hwtimestamp directive
  - Add rawmeasurements option to log directive and modify measurements
    option to log only valid measurements from synchronised sources
  - Allow sub-second polling interval with NTP sources

- Bug fixes

  - Fix time smoothing in interleaved mode

Upgraded to version 3.0:

- Enhancements

  - Add support for software and hardware timestamping on Linux
  - Add support for client/server and symmetric interleaved modes
  - Add support for MS-SNTP authentication in Samba
  - Add support for truncated MACs in NTPv4 packets
  - Estimate and correct for asymmetric network jitter
  - Increase default minsamples and polltarget to improve stability with very low jitter
  - Add maxjitter directive to limit source selection by jitter
  - Add offset option to server/pool/peer directive
  - Add maxlockage option to refclock directive
  - Add -t option to chronyd to exit after specified time
  - Add partial protection against replay attacks on symmetric mode
  - Don't reset polling interval when switching sources to online state
  - Allow rate limiting with very short intervals
  - Improve maximum server throughput on Linux and NetBSD
  - Remove dump files after start
  - Add tab-completion to chronyc with libedit/readline
  - Add ntpdata command to print details about NTP measurements
  - Allow all source options to be set in add server/peer command
  - Indicate truncated addresses/hostnames in chronyc output
  - Print reference IDs as hexadecimal numbers to avoid confusion with IPv4 addresses

- Bug fixes

  - Fix crash with disabled asynchronous name resolving

Upgraded to version 2.4.1:

- Bug fixes

  - Fix processing of kernel timestamps on non-Linux systems
  - Fix crash with smoothtime directive
  - Fix validation of refclock sample times
  - Fix parsing of refclock directive

update to 2.4:

- Enhancements

  - Add orphan option to local directive for orphan mode
    compatible with ntpd
  - Add distance option to local directive to set activation
    threshold (1 second by default)
  - Add maxdrift directive to set maximum allowed drift of system
    clock
  - Try to replace NTP sources exceeding maximum distance
  - Randomise source replacement to avoid getting stuck with bad
    sources
  - Randomise selection of sources from pools on start
  - Ignore reference timestamp as ntpd doesn't always set it
    correctly
  - Modify tracking report to use same values as seen by NTP
    clients
  - Add -c option to chronyc to write reports in CSV format
  - Provide detailed manual pages

- Bug fixes

  - Fix SOCK refclock to work correctly when not specified as
    last refclock
  - Fix initstepslew and -q/-Q options to accept time from own
    NTP clients
  - Fix authentication with keys using 512-bit hash functions
  - Fix crash on exit when multiple signals are received
  - Fix conversion of very small floating-point numbers in
    command packets
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1063704">SUSE bug 1063704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069468">SUSE bug 1069468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083597">SUSE bug 1083597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099272">SUSE bug 1099272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115529">SUSE bug 1115529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128846">SUSE bug 1128846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156884">SUSE bug 1156884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159840">SUSE bug 1159840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161119">SUSE bug 1161119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162964">SUSE bug 1162964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171806">SUSE bug 1171806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172113">SUSE bug 1172113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173277">SUSE bug 1173277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173760">SUSE bug 1173760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174075">SUSE bug 1174075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174911">SUSE bug 1174911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180689">SUSE bug 1180689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181826">SUSE bug 1181826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183783">SUSE bug 1183783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184400">SUSE bug 1184400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187906">SUSE bug 1187906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190926">SUSE bug 1190926</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14367/">CVE-2020-14367 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14367">CVE-2020-14367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661619" comment="chrony-4.1-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151637" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- buffer overflow in PyCArg_repr in _ctypes/callproc.c,
  which may lead to remote code execution (bsc#1181126, CVE-2021-3177).
- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-11"/>
	<updated date="2021-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557083" comment="libpython2_7-1_0-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531873" comment="libpython2_7-1_0-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557084" comment="python-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531875" comment="python-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557085" comment="python-base-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531877" comment="python-base-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557086" comment="python-curses-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557087" comment="python-demo-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557088" comment="python-devel-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531881" comment="python-doc-2.7.17-28.64.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531882" comment="python-doc-pdf-2.7.17-28.64.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557089" comment="python-gdbm-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557090" comment="python-idle-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557091" comment="python-tk-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557092" comment="python-xml-2.7.17-28.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151638" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1181742" ref_url="https://bugzilla.suse.com/1181742" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35498" ref_url="https://www.suse.com/security/cve/CVE-2020-35498/" source="CVE"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2020-35498: Fixed a denial of service related to the handling of Ethernet padding (bsc#1181742).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-12"/>
	<updated date="2021-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181742">SUSE bug 1181742</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35498/">CVE-2020-35498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35498">CVE-2020-35498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557093" comment="openvswitch-2.7.12-3.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151639" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1105322" ref_url="https://bugzilla.suse.com/1105322" source="BUGZILLA"/>
		<reference ref_id="1105323" ref_url="https://bugzilla.suse.com/1105323" source="BUGZILLA"/>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1168952" ref_url="https://bugzilla.suse.com/1168952" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1175306" ref_url="https://bugzilla.suse.com/1175306" source="BUGZILLA"/>
		<reference ref_id="1176395" ref_url="https://bugzilla.suse.com/1176395" source="BUGZILLA"/>
		<reference ref_id="1176485" ref_url="https://bugzilla.suse.com/1176485" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1178182" ref_url="https://bugzilla.suse.com/1178182" source="BUGZILLA"/>
		<reference ref_id="1178272" ref_url="https://bugzilla.suse.com/1178272" source="BUGZILLA"/>
		<reference ref_id="1178589" ref_url="https://bugzilla.suse.com/1178589" source="BUGZILLA"/>
		<reference ref_id="1178886" ref_url="https://bugzilla.suse.com/1178886" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179140" ref_url="https://bugzilla.suse.com/1179140" source="BUGZILLA"/>
		<reference ref_id="1179141" ref_url="https://bugzilla.suse.com/1179141" source="BUGZILLA"/>
		<reference ref_id="1179204" ref_url="https://bugzilla.suse.com/1179204" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179508" ref_url="https://bugzilla.suse.com/1179508" source="BUGZILLA"/>
		<reference ref_id="1179509" ref_url="https://bugzilla.suse.com/1179509" source="BUGZILLA"/>
		<reference ref_id="1179601" ref_url="https://bugzilla.suse.com/1179601" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1179663" ref_url="https://bugzilla.suse.com/1179663" source="BUGZILLA"/>
		<reference ref_id="1179666" ref_url="https://bugzilla.suse.com/1179666" source="BUGZILLA"/>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1179878" ref_url="https://bugzilla.suse.com/1179878" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1179961" ref_url="https://bugzilla.suse.com/1179961" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180027" ref_url="https://bugzilla.suse.com/1180027" source="BUGZILLA"/>
		<reference ref_id="1180028" ref_url="https://bugzilla.suse.com/1180028" source="BUGZILLA"/>
		<reference ref_id="1180029" ref_url="https://bugzilla.suse.com/1180029" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180031" ref_url="https://bugzilla.suse.com/1180031" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180052" ref_url="https://bugzilla.suse.com/1180052" source="BUGZILLA"/>
		<reference ref_id="1180086" ref_url="https://bugzilla.suse.com/1180086" source="BUGZILLA"/>
		<reference ref_id="1180559" ref_url="https://bugzilla.suse.com/1180559" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="1180815" ref_url="https://bugzilla.suse.com/1180815" source="BUGZILLA"/>
		<reference ref_id="1181096" ref_url="https://bugzilla.suse.com/1181096" source="BUGZILLA"/>
		<reference ref_id="1181158" ref_url="https://bugzilla.suse.com/1181158" source="BUGZILLA"/>
		<reference ref_id="1181349" ref_url="https://bugzilla.suse.com/1181349" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="969755" ref_url="https://bugzilla.suse.com/969755" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2019-20934" ref_url="https://www.suse.com/security/cve/CVE-2019-20934/" source="CVE"/>
		<reference ref_id="CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444/" source="CVE"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2020-27835" ref_url="https://www.suse.com/security/cve/CVE-2020-27835/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2020-25211: Fixed a buffer overflow in ctnetlink_parse_tuple_filter() which could be triggered by a local attackers by injecting conntrack netlink configuration (bnc#1176395).
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation (bnc#1105322).

The following non-security bugs were fixed:

- cifs: do not revalidate mountpoint dentries (bsc#1177440).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: ignore revalidate failures in case of process gets signaled (bsc#1177440).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- futex: Avoid freeing an active timer (bsc#969755).
- futex: Avoid violating the 10th rule of futex (bsc#969755).
- futex: Change locking rules (bsc#969755).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#969755).
- futex: Drop hb-&gt;lock before enqueueing on the rtmutex (bsc#969755).
- futex: Fix incorrect should_fail_futex() handling (bsc#969755).
- futex: Fix more put_pi_state() vs. exit_pi_state_list() races (bsc#969755).
- futex: Fix OWNER_DEAD fixup (bsc#969755).
- futex: Fix pi_state-&gt;owner serialization (bsc#969755).
- futex: Fix small (and harmless looking) inconsistencies (bsc#969755).
- futex: Futex_unlock_pi() determinism (bsc#969755).
- futex: Handle early deadlock return correctly (bsc#969755).
- futex: Handle transient 'ownerless' rtmutex state correctly (bsc#969755).
- futex: Pull rt_mutex_futex_unlock() out from under hb-&gt;lock (bsc#969755).
- futex: Rework futex_lock_pi() to use rt_mutex_*_proxy_lock() (bsc#969755).
- futex: Rework inconsistent rt_mutex/futex_q state (bsc#969755).
- futex,rt_mutex: Fix rt_mutex_cleanup_proxy_lock() (bsc#969755).
- futex,rt_mutex: Introduce rt_mutex_init_waiter() (bsc#969755).
- futex,rt_mutex: Provide futex specific rt_mutex API (bsc#969755).
- futex,rt_mutex: Restructure rt_mutex_finish_proxy_lock() (bsc#969755).
- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- IB/hfi1: Clean up hfi1_user_exp_rcv_setup function (bsc#1179878).
- IB/hfi1: Clean up pin_vector_pages() function (bsc#1179878).
- IB/hfi1: Fix the bail out code in pin_vector_pages() function (bsc#1179878).
- IB/hfi1: Move structure definitions from user_exp_rcv.c to user_exp_rcv.h (bsc#1179878).
- IB/hfi1: Name function prototype parameters (bsc#1179878).
- IB/hfi1: Use filedata rather than filepointer (bsc#1179878).
- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#969755).
- mm/userfaultfd: do not access vma-&gt;vm_mm after calling handle_userfault() (bsc#1179204).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1178272).
- Use r3 instead of r13 for l1d fallback flush in do_uaccess_fush (bsc#1181096 ltc#190883).
- video: hyperv_fb: include vmalloc.h (bsc#1175306).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-12"/>
	<updated date="2021-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175306">SUSE bug 1175306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178272">SUSE bug 1178272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179204">SUSE bug 1179204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179508">SUSE bug 1179508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179509">SUSE bug 1179509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179663">SUSE bug 1179663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179666">SUSE bug 1179666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179878">SUSE bug 1179878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179961">SUSE bug 1179961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180027">SUSE bug 1180027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180028">SUSE bug 1180028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180031">SUSE bug 1180031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180052">SUSE bug 1180052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180815">SUSE bug 1180815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181096">SUSE bug 1181096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969755">SUSE bug 969755</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10902">CVE-2018-10902 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20934/">CVE-2019-20934 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20934">CVE-2019-20934 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0444">CVE-2020-0444 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15436">CVE-2020-15436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15437">CVE-2020-15437 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25211">CVE-2020-25211 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25285">CVE-2020-25285 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25669">CVE-2020-25669 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27068">CVE-2020-27068 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27777">CVE-2020-27777 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27825">CVE-2020-27825 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27835/">CVE-2020-27835 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27835">CVE-2020-27835 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28915">CVE-2020-28915 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28974">CVE-2020-28974 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29568">CVE-2020-29568 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">CVE-2020-29569 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4788">CVE-2020-4788 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557094" comment="kernel-default-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557095" comment="kernel-default-base-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557096" comment="kernel-default-devel-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557097" comment="kernel-default-kgraft-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539114" comment="kernel-devel-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539115" comment="kernel-macros-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539116" comment="kernel-source-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557098" comment="kernel-syms-4.4.180-94.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557099" comment="kgraft-patch-4_4_180-94_138-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151640" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1150934" ref_url="https://bugzilla.suse.com/1150934" source="BUGZILLA"/>
		<reference ref_id="1181777" ref_url="https://bugzilla.suse.com/1181777" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16275" ref_url="https://www.suse.com/security/cve/CVE-2019-16275/" source="CVE"/>
		<reference ref_id="CVE-2021-0326" ref_url="https://www.suse.com/security/cve/CVE-2021-0326/" source="CVE"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-0326: P2P group information processing vulnerability (bsc#1181777).
- CVE-2019-16275: AP mode PMF disconnection protection bypass (bsc#1150934)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-15"/>
	<updated date="2021-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150934">SUSE bug 1150934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181777">SUSE bug 1181777</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16275/">CVE-2019-16275 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16275">CVE-2019-16275 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0326/">CVE-2021-0326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0326">CVE-2021-0326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557100" comment="wpa_supplicant-2.6-15.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151641" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1179748" ref_url="https://bugzilla.suse.com/1179748" source="BUGZILLA"/>
		<reference ref_id="1181483" ref_url="https://bugzilla.suse.com/1181483" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- bsc#1179748 CVE-2020-27828: Fix heap overflow by checking maxrlvls
- bsc#1181483 CVE-2021-3272: Fix buffer over-read in jp2_decode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179748">SUSE bug 1179748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181483">SUSE bug 1181483</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27828">CVE-2020-27828 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3272">CVE-2021-3272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557101" comment="libjasper1-1.900.14-195.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531901" comment="libjasper1-32bit-1.900.14-195.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151642" version="1" class="patch">
	<metadata>
		<title>Security update for screen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182092" ref_url="https://bugzilla.suse.com/1182092" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26937" ref_url="https://www.suse.com/security/cve/CVE-2021-26937/" source="CVE"/>
		<description>
This update for screen fixes the following issues:

- CVE-2021-26937: Fixed double width combining char handling that could lead to a denial of service or code execution (bsc#1182092).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-17"/>
	<updated date="2021-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182092">SUSE bug 1182092</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26937/">CVE-2021-26937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26937">CVE-2021-26937 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557102" comment="screen-4.0.4-23.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151643" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182246" ref_url="https://bugzilla.suse.com/1182246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy
  negotiation can be targeted by a buffer overflow attack [bsc#1182246, CVE-2020-8625]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182246">SUSE bug 1182246</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8625">CVE-2020-8625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557103" comment="bind-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557104" comment="bind-chrootenv-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531905" comment="bind-doc-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557105" comment="bind-libs-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531907" comment="bind-libs-32bit-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557106" comment="bind-utils-9.9.9P1-63.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151644" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 80
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27221">CVE-2020-27221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531909" comment="java-1_7_1-ibm-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531910" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531911" comment="java-1_7_1-ibm-devel-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531912" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531913" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.80-38.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151645" version="1" class="patch">
	<metadata>
		<title>Security update for krb5-appl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1131109" ref_url="https://bugzilla.suse.com/1131109" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25017" ref_url="https://www.suse.com/security/cve/CVE-2019-25017/" source="CVE"/>
		<reference ref_id="CVE-2019-25018" ref_url="https://www.suse.com/security/cve/CVE-2019-25018/" source="CVE"/>
		<description>
This update for krb5-appl fixes the following issues:

- CVE-2019-25017: Check the filenames sent by the server match those requested by the client (bsc#1131109).
- CVE-2019-25018: Disallow empty incoming filename or ones that refer to the current directory (bsc#1131109).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131109">SUSE bug 1131109</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25017/">CVE-2019-25017 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25017">CVE-2019-25017 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25018/">CVE-2019-25018 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25018">CVE-2019-25018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557107" comment="krb5-appl-clients-1.0.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557108" comment="krb5-appl-servers-1.0.3-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151646" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u282 (icedtea 3.18.0)
  * January 2021 CPU (bsc#1181239)
  * Security fixes
    + JDK-8247619: Improve Direct Buffering of Characters (CVE-2020-14803)
  * Import of OpenJDK 8 u282 build 01
    + JDK-6962725: Regtest javax/swing/JFileChooser/6738668/
      /bug6738668.java fails under Linux
    + JDK-8025936: Windows .pdb and .map files does not have proper
      dependencies setup
    + JDK-8030350: Enable additional compiler warnings for GCC
    + JDK-8031423: Test java/awt/dnd/DisposeFrameOnDragCrash/
      /DisposeFrameOnDragTest.java fails by Timeout on Windows
    + JDK-8036122: Fix warning 'format not a string literal'
    + JDK-8051853: new
      URI('x/').resolve('..').getSchemeSpecificPart() returns null!
    + JDK-8132664: closed/javax/swing/DataTransfer/DefaultNoDrop/
      /DefaultNoDrop.java locks on Windows
    + JDK-8134632: Mark javax/sound/midi/Devices/
      /InitializationHang.java as headful
    + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'
      treated by JVM as an equivalent
    + JDK-8148916: Mark bug6400879.java as intermittently failing
    + JDK-8148983: Fix extra comma in changes for JDK-8148916
    + JDK-8160438: javax/swing/plaf/nimbus/8057791/bug8057791.java
      fails
    + JDK-8165808: Add release barriers when allocating objects
      with concurrent collection
    + JDK-8185003: JMX: Add a version of
      ThreadMXBean.dumpAllThreads with a maxDepth argument
    + JDK-8202076: test/jdk/java/io/File/WinSpecialFiles.java on
      windows with VS2017
    + JDK-8207766: [testbug] Adapt tests for Aix.
    + JDK-8212070: Introduce diagnostic flag to abort VM on failed
      JIT compilation
    + JDK-8213448: [TESTBUG] enhance jfr/jvm/TestDumpOnCrash
    + JDK-8215727: Restore JFR thread sampler loop to old /
      previous behavior
    + JDK-8220657: JFR.dump does not work when filename is set
    + JDK-8221342: [TESTBUG] Generate Dockerfile for docker testing
    + JDK-8224502: [TESTBUG] JDK docker test TestSystemMetrics.java
      fails with access issues and OOM
    + JDK-8231209: [REDO] ThreadMXBean::getThreadAllocatedBytes()
      can be quicker for self thread
    + JDK-8231968: getCurrentThreadAllocatedBytes default
      implementation s/b getThreadAllocatedBytes
    + JDK-8232114: JVM crashed at imjpapi.dll in native code
    + JDK-8234270: [REDO] JDK-8204128 NMT might report incorrect
      numbers for Compiler area
    + JDK-8234339: replace JLI_StrTok in java_md_solinux.c
    + JDK-8238448: RSASSA-PSS signature verification fail when
      using certain odd key sizes
    + JDK-8242335: Additional Tests for RSASSA-PSS
    + JDK-8244225: stringop-overflow warning on strncpy call from
      compile_the_world_in
    + JDK-8245400: Upgrade to LittleCMS 2.11
    + JDK-8248214: Add paddings for TaskQueueSuper to reduce
      false-sharing cache contention
    + JDK-8249176: Update GlobalSignR6CA test certificates
    + JDK-8250665: Wrong translation for the month name of May in
      ar_JO,LB,SY
    + JDK-8250928: JFR: Improve hash algorithm for stack traces
    + JDK-8251469: Better cleanup for
      test/jdk/javax/imageio/SetOutput.java
    + JDK-8251840: Java_sun_awt_X11_XToolkit_getDefaultScreenData
      should not be in make/mapfiles/libawt_xawt/mapfile-vers
    + JDK-8252384: [TESTBUG] Some tests refer to COMPAT provider
      rather than JRE
    + JDK-8252395: [8u] --with-native-debug-symbols=external
      doesn't include debuginfo files for binaries
    + JDK-8252497: Incorrect numeric currency code for ROL
    + JDK-8252754: Hash code calculation of JfrStackTrace is
      inconsistent
    + JDK-8252904: VM crashes when JFR is used and JFR event class
      is transformed
    + JDK-8252975: [8u] JDK-8252395 breaks the build for
      --with-native-debug-symbols=internal
    + JDK-8253284: Zero OrderAccess barrier mappings are incorrect
    + JDK-8253550: [8u] JDK-8252395 breaks the build for make
      STRIP_POLICY=no_strip
    + JDK-8253752: test/sun/management/jmxremote/bootstrap/
      /RmiBootstrapTest.java fails randomly
    + JDK-8254081: java/security/cert/PolicyNode/
      /GetPolicyQualifiers.java fails due to an expired certificate
    + JDK-8254144: Non-x86 Zero builds fail with return-type
      warning in os_linux_zero.cpp
    + JDK-8254166: Zero: return-type warning in
       zeroInterpreter_zero.cpp
    + JDK-8254683: [TEST_BUG] jdk/test/sun/tools/jconsole/
      /WorkerDeadlockTest.java fails
    + JDK-8255003: Build failures on Solaris
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557109" comment="java-1_8_0-openjdk-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557110" comment="java-1_8_0-openjdk-demo-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557111" comment="java-1_8_0-openjdk-devel-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557112" comment="java-1_8_0-openjdk-headless-1.8.0.282-27.56.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151647" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 25
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27221">CVE-2020-27221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531920" comment="java-1_8_0-ibm-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531921" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531922" comment="java-1_8_0-ibm-devel-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531923" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.25-30.81.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151648" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-Twig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1008644" ref_url="https://bugzilla.suse.com/1008644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9180" ref_url="https://www.suse.com/security/cve/CVE-2016-9180/" source="CVE"/>
		<description>
This update for perl-XML-Twig fixes the following issues:

- Security fix [bsc#1008644, CVE-2016-9180]
  * Added: the no_xxe option to XML::Twig::new, which causes the
    parse to fail if external entities are used (to prevent
    malicious XML to access the filesystem).
  * Setting expand_external_ents to 0 or -1 currently doesn't work
    as expected; To completely turn off expanding external entities
    use no_xxe.
  * Update documentation for XML::Twig to mention problems with
    expand_external_ents and add information about new no_xxe argument
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008644">SUSE bug 1008644</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9180/">CVE-2016-9180 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9180">CVE-2016-9180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531924" comment="perl-XML-Twig-3.44-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151649" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182357" ref_url="https://bugzilla.suse.com/1182357" source="BUGZILLA"/>
		<reference ref_id="1182614" ref_url="https://bugzilla.suse.com/1182614" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.8.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2021-08 (bsc#1182614)
  * CVE-2021-23969: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23968: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23973: MediaError message property could have leaked information about cross-origin resources
  * CVE-2021-23978: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182357">SUSE bug 1182357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23968">CVE-2021-23968 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23969">CVE-2021-23969 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23973">CVE-2021-23973 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23978">CVE-2021-23978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557113" comment="MozillaFirefox-78.8.0-112.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557114" comment="MozillaFirefox-devel-78.8.0-112.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557115" comment="MozillaFirefox-translations-common-78.8.0-112.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151650" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182066" ref_url="https://bugzilla.suse.com/1182066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242/" source="CVE"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-36242: Using the Fernet class to symmetrically encrypt multi gigabyte
  values could result in an integer overflow and buffer overflow (bsc#1182066).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182066">SUSE bug 1182066</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36242">CVE-2020-36242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557116" comment="python-cryptography-2.1.4-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557117" comment="python3-cryptography-2.1.4-7.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151651" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1175970" ref_url="https://bugzilla.suse.com/1175970" source="BUGZILLA"/>
		<reference ref_id="1176711" ref_url="https://bugzilla.suse.com/1176711" source="BUGZILLA"/>
		<reference ref_id="1177883" ref_url="https://bugzilla.suse.com/1177883" source="BUGZILLA"/>
		<reference ref_id="1179264" ref_url="https://bugzilla.suse.com/1179264" source="BUGZILLA"/>
		<reference ref_id="1179265" ref_url="https://bugzilla.suse.com/1179265" source="BUGZILLA"/>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="1182262" ref_url="https://bugzilla.suse.com/1182262" source="BUGZILLA"/>
		<reference ref_id="1182263" ref_url="https://bugzilla.suse.com/1182263" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<description>
This update for grub2 fixes the following issues:

grub2 now implements the new 'SBAT' method for SHIM based secure boot revocation. (bsc#1182057)

Following security issues are fixed that can violate secure boot constraints:

- CVE-2020-25632: Fixed a use-after-free in rmmod command (bsc#1176711)
- CVE-2020-25647: Fixed an out-of-bound write in grub_usb_device_initialize() (bsc#1177883)
- CVE-2020-27749: Fixed a stack buffer overflow in grub_parser_split_cmdline (bsc#1179264)
- CVE-2020-27779, CVE-2020-14372: Disallow cutmem and acpi commands in secure boot mode (bsc#1179265 bsc#1175970)
- CVE-2021-20225: Fixed a heap out-of-bounds write in short form option parser (bsc#1182262)
- CVE-2021-20233: Fixed a heap out-of-bound write due to mis-calculation of space required for quoting (bsc#1182263)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175970">SUSE bug 1175970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176711">SUSE bug 1176711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177883">SUSE bug 1177883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179264">SUSE bug 1179264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179265">SUSE bug 1179265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182262">SUSE bug 1182262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182263">SUSE bug 1182263</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14372">CVE-2020-14372 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25632">CVE-2020-25632 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25647">CVE-2020-25647 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27749">CVE-2020-27749 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27779">CVE-2020-27779 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20225">CVE-2021-20225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20233">CVE-2021-20233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557118" comment="grub2-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555608" comment="grub2-arm64-efi-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539120" comment="grub2-i386-pc-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539122" comment="grub2-snapper-plugin-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539123" comment="grub2-systemd-sleep-plugin-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539124" comment="grub2-x86_64-efi-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539125" comment="grub2-x86_64-xen-2.02-4.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151652" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182279" ref_url="https://bugzilla.suse.com/1182279" source="BUGZILLA"/>
		<reference ref_id="1182408" ref_url="https://bugzilla.suse.com/1182408" source="BUGZILLA"/>
		<reference ref_id="1182411" ref_url="https://bugzilla.suse.com/1182411" source="BUGZILLA"/>
		<reference ref_id="1182412" ref_url="https://bugzilla.suse.com/1182412" source="BUGZILLA"/>
		<reference ref_id="1182413" ref_url="https://bugzilla.suse.com/1182413" source="BUGZILLA"/>
		<reference ref_id="1182415" ref_url="https://bugzilla.suse.com/1182415" source="BUGZILLA"/>
		<reference ref_id="1182416" ref_url="https://bugzilla.suse.com/1182416" source="BUGZILLA"/>
		<reference ref_id="1182417" ref_url="https://bugzilla.suse.com/1182417" source="BUGZILLA"/>
		<reference ref_id="1182418" ref_url="https://bugzilla.suse.com/1182418" source="BUGZILLA"/>
		<reference ref_id="1182419" ref_url="https://bugzilla.suse.com/1182419" source="BUGZILLA"/>
		<reference ref_id="1182420" ref_url="https://bugzilla.suse.com/1182420" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch-&gt;bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-03"/>
	<updated date="2021-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36221">CVE-2020-36221 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36222">CVE-2020-36222 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36223">CVE-2020-36223 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36224">CVE-2020-36224 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36225">CVE-2020-36225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36226">CVE-2020-36226 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36227">CVE-2020-36227 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36228">CVE-2020-36228 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36229">CVE-2020-36229 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36230">CVE-2020-36230 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27212">CVE-2021-27212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557119" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557120" comment="openldap2-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557121" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557122" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557123" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151653" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1178372" ref_url="https://bugzilla.suse.com/1178372" source="BUGZILLA"/>
		<reference ref_id="1181747" ref_url="https://bugzilla.suse.com/1181747" source="BUGZILLA"/>
		<reference ref_id="1181753" ref_url="https://bugzilla.suse.com/1181753" source="BUGZILLA"/>
		<reference ref_id="1181843" ref_url="https://bugzilla.suse.com/1181843" source="BUGZILLA"/>
		<reference ref_id="1182175" ref_url="https://bugzilla.suse.com/1182175" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used
  by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).

The following non-security bugs were fixed:

- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178372">SUSE bug 1178372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181747">SUSE bug 1181747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181753">SUSE bug 1181753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181843">SUSE bug 1181843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182175">SUSE bug 1182175</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26932">CVE-2021-26932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557124" comment="kernel-default-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557125" comment="kernel-default-base-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557126" comment="kernel-default-devel-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557127" comment="kernel-default-kgraft-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539130" comment="kernel-devel-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539131" comment="kernel-macros-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539132" comment="kernel-source-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557128" comment="kernel-syms-4.4.180-94.141.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557129" comment="kgraft-patch-4_4_180-94_141-default-1-4.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151654" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182805" ref_url="https://bugzilla.suse.com/1182805" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27803" ref_url="https://www.suse.com/security/cve/CVE-2021-27803/" source="CVE"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-27803: P2P provision discovery processing vulnerability (bsc#1182805) 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182805">SUSE bug 1182805</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27803/">CVE-2021-27803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27803">CVE-2021-27803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557130" comment="wpa_supplicant-2.6-15.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151655" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1183026" ref_url="https://bugzilla.suse.com/1183026" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21300" ref_url="https://www.suse.com/security/cve/CVE-2021-21300/" source="CVE"/>
		<description>
This update for git fixes the following issues:

- On case-insensitive filesystems, with support for symbolic links,
  if Git is configured globally to apply delay-capable clean/smudge
  filters (such as Git LFS), Git could be fooled into running
  remote code during a clone. (bsc#1183026, CVE-2021-21300)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183026">SUSE bug 1183026</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21300/">CVE-2021-21300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21300">CVE-2021-21300 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557131" comment="git-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557132" comment="git-core-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557133" comment="git-cvs-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557134" comment="git-daemon-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557135" comment="git-email-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557136" comment="git-gui-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557137" comment="git-svn-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557138" comment="git-web-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557139" comment="gitk-2.26.2-27.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151656" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- python27 was upgraded to 2.7.18
- CVE-2021-23336: Fixed a potential web cache poisoning by using a semicolon in query parameters use of semicolon as a query string separator (bsc#1182379).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-16"/>
	<updated date="2021-03-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557140" comment="libpython2_7-1_0-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531963" comment="libpython2_7-1_0-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557141" comment="python-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531965" comment="python-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557142" comment="python-base-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531967" comment="python-base-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557143" comment="python-curses-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557144" comment="python-demo-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557145" comment="python-devel-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531971" comment="python-doc-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531972" comment="python-doc-pdf-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557146" comment="python-gdbm-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557147" comment="python-idle-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557148" comment="python-tk-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557149" comment="python-xml-2.7.18-28.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151657" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1180623" ref_url="https://bugzilla.suse.com/1180623" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.1 ESR
  * Fixed: Critical security issue MFSA 2021-01 (bsc#1180623)
  * CVE-2020-16044
    Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180623">SUSE bug 1180623</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16044">CVE-2020-16044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557150" comment="MozillaFirefox-78.6.1-112.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557151" comment="MozillaFirefox-devel-78.6.1-112.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557152" comment="MozillaFirefox-translations-common-78.6.1-112.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151658" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182328" ref_url="https://bugzilla.suse.com/1182328" source="BUGZILLA"/>
		<reference ref_id="1182362" ref_url="https://bugzilla.suse.com/1182362" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27218" ref_url="https://www.suse.com/security/cve/CVE-2021-27218/" source="CVE"/>
		<reference ref_id="CVE-2021-27219" ref_url="https://www.suse.com/security/cve/CVE-2021-27219/" source="CVE"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2021-27218: g_byte_array_new_take takes a gsize as length but stores in a guint, this patch will refuse if the length is larger than guint. (bsc#1182328)
- CVE-2021-27219: g_memdup takes a guint as parameter and sometimes leads into an integer overflow, so add a g_memdup2 function which uses gsize to replace it. (bsc#1182362)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-16"/>
	<updated date="2021-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182328">SUSE bug 1182328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182362">SUSE bug 1182362</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-27218/">CVE-2021-27218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27218">CVE-2021-27218 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27219/">CVE-2021-27219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27219">CVE-2021-27219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531980" comment="glib2-lang-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557153" comment="glib2-tools-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557154" comment="libgio-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531983" comment="libgio-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557155" comment="libglib-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531985" comment="libglib-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557156" comment="libgmodule-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531987" comment="libgmodule-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557157" comment="libgobject-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531989" comment="libgobject-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557158" comment="libgthread-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531991" comment="libgthread-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151659" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following security issues were fixed:

- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
- CVE-2020-25645: Fixed an issue where the traffic between two Geneve endpoints may have been unencrypted when IPsec was configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177513).
- CVE-2020-0429: Fixed a potential memory corruption due to a use after free which could have led local escalation of privilege with System execution privileges needed (bsc#1176931).
- CVE-2020-1749: Fixed an issue in some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6 where the kernel was not correctly routing tunneled data over the encrypted link rather sending the data unencrypted (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0429">CVE-2020-0429 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009557159" comment="kgraft-patch-4_4_180-94_138-default-2-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151660" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_135 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721286" comment="kernel-default 4.4.180-94.135 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719620" comment="kgraft-patch-4_4_180-94_135-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009557160" comment="kgraft-patch-4_4_180-94_135-default-4-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151661" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721285" comment="kernel-default 4.4.180-94.130 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719618" comment="kgraft-patch-4_4_180-94_130-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009557161" comment="kgraft-patch-4_4_180-94_130-default-6-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151662" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721284" comment="kernel-default 4.4.180-94.127 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719616" comment="kgraft-patch-4_4_180-94_127-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009557162" comment="kgraft-patch-4_4_180-94_127-default-7-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151663" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_124 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721283" comment="kernel-default 4.4.180-94.124 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719614" comment="kgraft-patch-4_4_180-94_124-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009557163" comment="kgraft-patch-4_4_180-94_124-default-7-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151664" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_121 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721282" comment="kernel-default 4.4.180-94.121 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719612" comment="kgraft-patch-4_4_180-94_121-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009557164" comment="kgraft-patch-4_4_180-94_121-default-7-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151665" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_116 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721281" comment="kernel-default 4.4.180-94.116 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719610" comment="kgraft-patch-4_4_180-94_116-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009557165" comment="kgraft-patch-4_4_180-94_116-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151666" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1180414" ref_url="https://bugzilla.suse.com/1180414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738/" source="CVE"/>
		<description>
This update for wavpack fixes the following issues:
	
- CVE-2020-35738: Fixed an out-of-bounds write in WavpackPackSamples (bsc#1180414). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180414">SUSE bug 1180414</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35738">CVE-2020-35738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557166" comment="libwavpack1-4.60.99-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151667" version="1" class="patch">
	<metadata>
		<title>Security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1088639" ref_url="https://bugzilla.suse.com/1088639" source="BUGZILLA"/>
		<reference ref_id="1112438" ref_url="https://bugzilla.suse.com/1112438" source="BUGZILLA"/>
		<reference ref_id="1125689" ref_url="https://bugzilla.suse.com/1125689" source="BUGZILLA"/>
		<reference ref_id="1134616" ref_url="https://bugzilla.suse.com/1134616" source="BUGZILLA"/>
		<reference ref_id="1146182" ref_url="https://bugzilla.suse.com/1146182" source="BUGZILLA"/>
		<reference ref_id="1146184" ref_url="https://bugzilla.suse.com/1146184" source="BUGZILLA"/>
		<reference ref_id="1181358" ref_url="https://bugzilla.suse.com/1181358" source="BUGZILLA"/>
		<reference ref_id="962914" ref_url="https://bugzilla.suse.com/962914" source="BUGZILLA"/>
		<reference ref_id="964140" ref_url="https://bugzilla.suse.com/964140" source="BUGZILLA"/>
		<reference ref_id="966514" ref_url="https://bugzilla.suse.com/966514" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1544" ref_url="https://www.suse.com/security/cve/CVE-2016-1544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080/" source="CVE"/>
		<description>
This update for nghttp2 fixes the following issues:

Security issues fixed:

- CVE-2020-11080: HTTP/2 Large Settings Frame DoS (bsc#1181358).
- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service (bsc#1146184).
- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146182).
- CVE-2018-1000168: Fixed ALTSVC frame client side denial of service (bsc#1088639).
- CVE-2016-1544: Fixed out of memory due to unlimited incoming HTTP header fields (bsc#966514).

Bug fixes and enhancements:

- Packages must not mark license files as %doc (bsc#1082318)
- Typo in description of libnghttp2_asio1 (bsc#962914)
- Fixed mistake in spec file (bsc#1125689)
- Fixed build issue with boost 1.70.0 (bsc#1134616)
- Fixed build issue with GCC 6 (bsc#964140)
- Feature: Add W&amp;S module (FATE#326776, bsc#1112438)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088639">SUSE bug 1088639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112438">SUSE bug 1112438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125689">SUSE bug 1125689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134616">SUSE bug 1134616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146182">SUSE bug 1146182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146184">SUSE bug 1146184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181358">SUSE bug 1181358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962914">SUSE bug 962914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964140">SUSE bug 964140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966514">SUSE bug 966514</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1544/">CVE-2016-1544 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1544">CVE-2016-1544 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000168">CVE-2018-1000168 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9511">CVE-2019-9511 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9513">CVE-2019-9513 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11080">CVE-2020-11080 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557167" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151668" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841">CVE-2021-23841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557168" comment="libopenssl-devel-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557169" comment="libopenssl1_0_0-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531998" comment="libopenssl1_0_0-32bit-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557170" comment="libopenssl1_0_0-hmac-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532000" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557171" comment="openssl-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532002" comment="openssl-doc-1.0.2j-60.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151669" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1183942" ref_url="https://bugzilla.suse.com/1183942" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.9.0 ESR  (MFSA 2021-11, bsc#1183942)
  * CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read
  * CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23984: Malicious extensions could have spoofed popup information
  * CVE-2021-23987: Memory safety bugs
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-31"/>
	<updated date="2021-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23981">CVE-2021-23981 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23982">CVE-2021-23982 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23984">CVE-2021-23984 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23987">CVE-2021-23987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557172" comment="MozillaFirefox-78.9.0-112.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557173" comment="MozillaFirefox-devel-78.9.0-112.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557174" comment="MozillaFirefox-translations-common-78.9.0-112.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151670" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195949" ref_url="https://bugzilla.suse.com/1195949" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes several issues.

The following security issues were fixed:

- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0487">CVE-2022-0487 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009677145" comment="kgraft-patch-4_4_180-94_144-default-13-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151671" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195949" ref_url="https://bugzilla.suse.com/1195949" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes several issues.

The following security issues were fixed:

- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0487">CVE-2022-0487 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009677146" comment="kgraft-patch-4_4_180-94_147-default-10-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151672" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195949" ref_url="https://bugzilla.suse.com/1195949" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_150 fixes several issues.

The following security issues were fixed:

- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0487">CVE-2022-0487 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721291" comment="kernel-default 4.4.180-94.150 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719630" comment="kgraft-patch-4_4_180-94_150-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009677147" comment="kgraft-patch-4_4_180-94_150-default-6-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151673" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 43 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_156 fixes one issue.

The following security issue was fixed:

- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721292" comment="kernel-default 4.4.180-94.156 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719632" comment="kgraft-patch-4_4_180-94_156-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009677148" comment="kgraft-patch-4_4_180-94_156-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151674" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1197341" ref_url="https://bugzilla.suse.com/1197341" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0547" ref_url="https://www.suse.com/security/cve/CVE-2022-0547/" source="CVE"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2022-0547: Fixed possible authentication bypass in external authentication plug-in (bsc#1197341).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197341">SUSE bug 1197341</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0547/">CVE-2022-0547 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0547">CVE-2022-0547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677149" comment="openvpn-2.3.8-16.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677150" comment="openvpn-auth-pam-plugin-2.3.8-16.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151675" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1196500" ref_url="https://bugzilla.suse.com/1196500" source="BUGZILLA"/>
		<reference ref_id="1197126" ref_url="https://bugzilla.suse.com/1197126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update Java 7.1 to Service Refresh 7 Fix Pack 5 (bsc#1197126).

Including fixes for the following vulnerabilities: 

  CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349,
  CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277,
  CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294,
  CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248,
  CVE-2022-21271.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21271">CVE-2022-21271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21349">CVE-2022-21349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151676" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1195146" ref_url="https://bugzilla.suse.com/1195146" source="BUGZILLA"/>
		<reference ref_id="1196500" ref_url="https://bugzilla.suse.com/1196500" source="BUGZILLA"/>
		<reference ref_id="1197126" ref_url="https://bugzilla.suse.com/1197126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update Java 8.0 to Service Refresh 7 Fix Pack 5 (bsc#1197126).

Including fixes for the following vulnerabilities: 

  CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349,
  CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277,
  CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294,
  CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248,
  CVE-2022-21271.

Non-securtiy fix:

- Fixed a broken symlink for javaws (bsc#1195146).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195146">SUSE bug 1195146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21271">CVE-2022-21271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21349">CVE-2022-21349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151677" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 42 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_153 fixes one issue.

The following security issue was fixed:

- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721293" comment="kernel-default 4.4.180-94.153 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719634" comment="kgraft-patch-4_4_180-94_153-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009677650" comment="kgraft-patch-4_4_180-94_153-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151678" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1197459" ref_url="https://bugzilla.suse.com/1197459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677651" comment="libz1-1.2.8-12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677109" comment="libz1-32bit-1.2.8-12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677652" comment="zlib-devel-1.2.8-12.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151679" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1191902" ref_url="https://bugzilla.suse.com/1191902" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35560" ref_url="https://www.suse.com/security/cve/CVE-2021-35560/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 7 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
- CVE-2021-35560: Fixed a vulnerability in the component Deployment. (bsc#1191902)
- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake. (bsc#1191904)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191902">SUSE bug 1191902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35560/">CVE-2021-35560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35560">CVE-2021-35560 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41035">CVE-2021-41035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662502" comment="java-1_8_0-ibm-1.8.0_sr7.0-30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662492" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662503" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662494" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-30.84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151680" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.3 (bsc#1197903):
  - CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11
    tokens are removed while in use.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-05"/>
	<updated date="2022-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678488" comment="libfreebl3-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678251" comment="libfreebl3-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678489" comment="libfreebl3-hmac-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678253" comment="libfreebl3-hmac-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678490" comment="libsoftokn3-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678255" comment="libsoftokn3-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678491" comment="libsoftokn3-hmac-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678257" comment="libsoftokn3-hmac-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678492" comment="mozilla-nss-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678259" comment="mozilla-nss-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678493" comment="mozilla-nss-certs-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678261" comment="mozilla-nss-certs-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678494" comment="mozilla-nss-devel-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678495" comment="mozilla-nss-sysinit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678264" comment="mozilla-nss-sysinit-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678496" comment="mozilla-nss-tools-3.68.3-58.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151681" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.8.0 ESR (bsc#1197903):

MFSA 2022-14 (bsc#1197903)

* CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11 tokens are removed while in use
* CVE-2022-28281: Fixed an out of bounds write due to unexpected WebAuthN Extensions
* CVE-2022-1196: Fixed a use-after-free after VR Process destruction
* CVE-2022-28282: Fixed a use-after-free in DocumentL10n::TranslateDocument
* CVE-2022-28285: Fixed incorrect AliasSet used in JIT Codegen
* CVE-2022-28286: Fixed that iframe contents could be rendered outside the border
* CVE-2022-24713: Fixed a denial of service via complex regular expressions
* CVE-2022-28289: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1196">CVE-2022-1196 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28281">CVE-2022-28281 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28282">CVE-2022-28282 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28285">CVE-2022-28285 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28286">CVE-2022-28286 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28289">CVE-2022-28289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678500" comment="MozillaFirefox-91.8.0-112.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678501" comment="MozillaFirefox-devel-91.8.0-112.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678502" comment="MozillaFirefox-translations-common-91.8.0-112.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151682" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1167631" ref_url="https://bugzilla.suse.com/1167631" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1752" ref_url="https://www.suse.com/security/cve/CVE-2020-1752/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2020-1752: Fix use-after-free in glob when expanding ~user (bsc#1167631)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167631">SUSE bug 1167631</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1752/">CVE-2020-1752 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">CVE-2020-1752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678625" comment="glibc-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677550" comment="glibc-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678626" comment="glibc-devel-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677552" comment="glibc-devel-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677553" comment="glibc-html-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677554" comment="glibc-i18ndata-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677555" comment="glibc-info-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678627" comment="glibc-locale-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677557" comment="glibc-locale-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678628" comment="glibc-profile-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677559" comment="glibc-profile-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678629" comment="nscd-2.22-123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151683" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1102016" ref_url="https://bugzilla.suse.com/1102016" source="BUGZILLA"/>
		<reference ref_id="1106881" ref_url="https://bugzilla.suse.com/1106881" source="BUGZILLA"/>
		<reference ref_id="1106882" ref_url="https://bugzilla.suse.com/1106882" source="BUGZILLA"/>
		<reference ref_id="1140130" ref_url="https://bugzilla.suse.com/1140130" source="BUGZILLA"/>
		<reference ref_id="1140205" ref_url="https://bugzilla.suse.com/1140205" source="BUGZILLA"/>
		<reference ref_id="1162090" ref_url="https://bugzilla.suse.com/1162090" source="BUGZILLA"/>
		<reference ref_id="1173578" ref_url="https://bugzilla.suse.com/1173578" source="BUGZILLA"/>
		<reference ref_id="1180457" ref_url="https://bugzilla.suse.com/1180457" source="BUGZILLA"/>
		<reference ref_id="1184774" ref_url="https://bugzilla.suse.com/1184774" source="BUGZILLA"/>
		<reference ref_id="1197738" ref_url="https://bugzilla.suse.com/1197738" source="BUGZILLA"/>
		<reference ref_id="971617" ref_url="https://bugzilla.suse.com/971617" source="BUGZILLA"/>
		<reference ref_id="980504" ref_url="https://bugzilla.suse.com/980504" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1924" ref_url="https://www.suse.com/security/cve/CVE-2016-1924/" source="CVE"/>
		<reference ref_id="CVE-2016-3183" ref_url="https://www.suse.com/security/cve/CVE-2016-3183/" source="CVE"/>
		<reference ref_id="CVE-2016-4797" ref_url="https://www.suse.com/security/cve/CVE-2016-4797/" source="CVE"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16375" ref_url="https://www.suse.com/security/cve/CVE-2018-16375/" source="CVE"/>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2018-20845" ref_url="https://www.suse.com/security/cve/CVE-2018-20845/" source="CVE"/>
		<reference ref_id="CVE-2018-20846" ref_url="https://www.suse.com/security/cve/CVE-2018-20846/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="CVE-2022-1122" ref_url="https://www.suse.com/security/cve/CVE-2022-1122/" source="CVE"/>
		<description>
This update for openjpeg2 fixes the following issues:

- CVE-2016-1924: Fixed heap buffer overflow (bsc#980504).
- CVE-2016-3183: Fixed out-of-bounds read in sycc422_to_rgb function (bsc#971617).
- CVE-2016-4797: Fixed heap buffer overflow (bsc#980504).
- CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016).
- CVE-2018-16375: Fixed missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c (bsc#1106882).
- CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881).
- CVE-2018-20845: Fixed division-by-zero in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c (bsc#1140130).
- CVE-2018-20846: Fixed out-of-bounds accesses in pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c (bsc#1140205).
- CVE-2020-8112: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090).
- CVE-2020-15389: Fixed use-after-free if t a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578).
- CVE-2020-27823: Fixed heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457).
- CVE-2021-29338: Fixed integer overflow that allows remote attackers to crash the application (bsc#1184774).
- CVE-2022-1122: Fixed segmentation fault in opj2_decompress due to uninitialized pointer (bsc#1197738).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-07"/>
	<updated date="2022-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102016">SUSE bug 1102016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106881">SUSE bug 1106881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106882">SUSE bug 1106882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140130">SUSE bug 1140130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140205">SUSE bug 1140205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180457">SUSE bug 1180457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184774">SUSE bug 1184774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197738">SUSE bug 1197738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971617">SUSE bug 971617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980504">SUSE bug 980504</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1924/">CVE-2016-1924 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1924">CVE-2016-1924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3183/">CVE-2016-3183 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3183">CVE-2016-3183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-4797/">CVE-2016-4797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4797">CVE-2016-4797 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14423">CVE-2018-14423 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16375/">CVE-2018-16375 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16375">CVE-2018-16375 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16376">CVE-2018-16376 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20845/">CVE-2018-20845 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20845">CVE-2018-20845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20846/">CVE-2018-20846 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20846">CVE-2018-20846 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15389">CVE-2020-15389 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27823">CVE-2020-27823 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8112">CVE-2020-8112 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29338">CVE-2021-29338 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1122/">CVE-2022-1122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1122">CVE-2022-1122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678750" comment="libopenjp2-7-2.1.0-4.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151684" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194547" ref_url="https://bugzilla.suse.com/1194547" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- CVE-2021-4140: Fixed iframe sandbox bypass with XSLT (bsc#1194547).
- CVE-2022-22737: Fixed race condition when playing audio files (bsc#1194547).
- CVE-2022-22738: Fixed heap-buffer-overflow in blendGaussianBlur (bsc#1194547).
- CVE-2022-22739: Fixed missing throttling on external protocol launch dialog (bsc#1194547).
- CVE-2022-22740: Fixed use-after-free of ChannelEventQueue::mOwner (bsc#1194547).
- CVE-2022-22741: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22742: Fixed out-of-bounds memory access when inserting text in edit mode (bsc#1194547).
- CVE-2022-22743: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22744: Fixed possible command injection via the 'Copy as curl' feature in DevTools (bsc#1194547).
- CVE-2022-22745: Fixed leaking cross-origin URLs through securitypolicyviolation event (bsc#1194547).
- CVE-2022-22746: Fixed calling into reportValidity could have lead to fullscreen window spoof (bsc#1194547).
- CVE-2022-22747: Fixed crash when handling empty pkcs7 sequence(bsc#1194547).
- CVE-2022-22748: Fixed spoofed origin on external protocol launch dialog (bsc#1194547).
- CVE-2022-22751: Fixed memory safety bugs (bsc#1194547).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4140">CVE-2021-4140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22737">CVE-2022-22737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22738">CVE-2022-22738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22739">CVE-2022-22739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22740">CVE-2022-22740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22741">CVE-2022-22741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22742">CVE-2022-22742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22743">CVE-2022-22743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22744">CVE-2022-22744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22745">CVE-2022-22745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22746">CVE-2022-22746 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22747">CVE-2022-22747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22748">CVE-2022-22748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22751">CVE-2022-22751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663995" comment="MozillaFirefox-91.5.0-112.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663996" comment="MozillaFirefox-devel-91.5.0-112.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663997" comment="MozillaFirefox-translations-common-91.5.0-112.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151685" version="1" class="patch">
	<metadata>
		<title>Security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679323" comment="liblzma5-5.0.5-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679278" comment="liblzma5-32bit-5.0.5-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679324" comment="xz-5.0.5-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679280" comment="xz-lang-5.0.5-6.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151686" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1172768" ref_url="https://bugzilla.suse.com/1172768" source="BUGZILLA"/>
		<reference ref_id="1172802" ref_url="https://bugzilla.suse.com/1172802" source="BUGZILLA"/>
		<reference ref_id="1178479" ref_url="https://bugzilla.suse.com/1178479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0181" ref_url="https://www.suse.com/security/cve/CVE-2020-0181/" source="CVE"/>
		<reference ref_id="CVE-2020-0198" ref_url="https://www.suse.com/security/cve/CVE-2020-0198/" source="CVE"/>
		<reference ref_id="CVE-2020-0452" ref_url="https://www.suse.com/security/cve/CVE-2020-0452/" source="CVE"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2020-0181: Fixed an integer overflow that could lead to denial of service
  (bsc#1172802).
- CVE-2020-0198: Fixed and unsigned integer overflow that could lead to denial
  of service (bsc#1172768).
- CVE-2020-0452: Fixed a buffer overflow check that could be optimized away
  by the compiler (bsc#1178479).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172768">SUSE bug 1172768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172802">SUSE bug 1172802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178479">SUSE bug 1178479</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0181/">CVE-2020-0181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0181">CVE-2020-0181 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0198/">CVE-2020-0198 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0198">CVE-2020-0198 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0452/">CVE-2020-0452 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0452">CVE-2020-0452 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679325" comment="libexif12-0.6.22-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677562" comment="libexif12-32bit-0.6.22-8.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151687" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196488" ref_url="https://bugzilla.suse.com/1196488" source="BUGZILLA"/>
		<reference ref_id="1196761" ref_url="https://bugzilla.suse.com/1196761" source="BUGZILLA"/>
		<reference ref_id="1196830" ref_url="https://bugzilla.suse.com/1196830" source="BUGZILLA"/>
		<reference ref_id="1196836" ref_url="https://bugzilla.suse.com/1196836" source="BUGZILLA"/>
		<reference ref_id="1197227" ref_url="https://bugzilla.suse.com/1197227" source="BUGZILLA"/>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1197366" ref_url="https://bugzilla.suse.com/1197366" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868/" source="CVE"/>
		<reference ref_id="CVE-2022-0850" ref_url="https://www.suse.com/security/cve/CVE-2022-0850/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-23036" ref_url="https://www.suse.com/security/cve/CVE-2022-23036/" source="CVE"/>
		<reference ref_id="CVE-2022-23037" ref_url="https://www.suse.com/security/cve/CVE-2022-23037/" source="CVE"/>
		<reference ref_id="CVE-2022-23038" ref_url="https://www.suse.com/security/cve/CVE-2022-23038/" source="CVE"/>
		<reference ref_id="CVE-2022-23039" ref_url="https://www.suse.com/security/cve/CVE-2022-23039/" source="CVE"/>
		<reference ref_id="CVE-2022-23040" ref_url="https://www.suse.com/security/cve/CVE-2022-23040/" source="CVE"/>
		<reference ref_id="CVE-2022-23041" ref_url="https://www.suse.com/security/cve/CVE-2022-23041/" source="CVE"/>
		<reference ref_id="CVE-2022-23042" ref_url="https://www.suse.com/security/cve/CVE-2022-23042/" source="CVE"/>
		<reference ref_id="CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490/" source="CVE"/>
		<reference ref_id="CVE-2022-26966" ref_url="https://www.suse.com/security/cve/CVE-2022-26966/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated.

The following security bugs were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331)
- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)
- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device. (bsc#1196836)
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)

The following non-security bugs were fixed:

- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018).
- clocksource: Initialize cs-&gt;wd_list (git-fixes)
- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).
- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).
- net: usb: ax88179_178a: fix packet alignment padding (bsc#1196018).
- sched/autogroup: Fix possible Spectre-v1 indexing for (git-fixes)
- sr9700: sanity check for packet length (bsc#1196836).
- usb: host: xen-hcd: add missing unlock in error path (git-fixes).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196488">SUSE bug 1196488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196761">SUSE bug 1196761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196830">SUSE bug 1196830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196836">SUSE bug 1196836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197227">SUSE bug 1197227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197366">SUSE bug 1197366</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45868">CVE-2021-45868 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0850/">CVE-2022-0850 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0850">CVE-2022-0850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23036/">CVE-2022-23036 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23036">CVE-2022-23036 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23037/">CVE-2022-23037 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23037">CVE-2022-23037 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23038/">CVE-2022-23038 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23038">CVE-2022-23038 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23039/">CVE-2022-23039 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23039">CVE-2022-23039 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23040/">CVE-2022-23040 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23040">CVE-2022-23040 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23041/">CVE-2022-23041 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23041">CVE-2022-23041 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23042/">CVE-2022-23042 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23042">CVE-2022-23042 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26490">CVE-2022-26490 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26966/">CVE-2022-26966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26966">CVE-2022-26966 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680625" comment="kernel-default-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680626" comment="kernel-default-base-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680627" comment="kernel-default-devel-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680628" comment="kernel-default-kgraft-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679285" comment="kernel-devel-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679286" comment="kernel-macros-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679287" comment="kernel-source-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680629" comment="kernel-syms-4.4.180-94.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680630" comment="kgraft-patch-4_4_180-94_161-default-1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151688" version="1" class="patch">
	<metadata>
		<title>Security update for gzip (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
This update for gzip fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680631" comment="gzip-1.6-9.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151689" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1183709" ref_url="https://bugzilla.suse.com/1183709" source="BUGZILLA"/>
		<reference ref_id="1197872" ref_url="https://bugzilla.suse.com/1197872" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3448" ref_url="https://www.suse.com/security/cve/CVE-2021-3448/" source="CVE"/>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2021-3448: Fixed a potential DNS cache poisoning issue due to a constant
  outgoing port being used when for certain use cases of the --server option
  (bsc#1183709).
- CVE-2022-0934: Fixed an invalid memory access that could lead to remote denial
  of service via crafted packet (bsc#1197872).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183709">SUSE bug 1183709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197872">SUSE bug 1197872</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3448/">CVE-2021-3448 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3448">CVE-2021-3448 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0934">CVE-2022-0934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680632" comment="dnsmasq-2.78-18.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151690" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1196137" ref_url="https://bugzilla.suse.com/1196137" source="BUGZILLA"/>
		<reference ref_id="1198136" ref_url="https://bugzilla.suse.com/1198136" source="BUGZILLA"/>
		<description>
This update for tomcat fixes the following issues:

- Remove the log4j dependency as it is not used by the tomcat package (bsc#1196137)
    
Security hardening, related to Spring Framework vulnerabilities:    
- Deprecate getResources() and always return null (bsc#1198136).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196137">SUSE bug 1196137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198136">SUSE bug 1198136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680633" comment="javapackages-filesystem-5.3.1-14.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679528" comment="tomcat-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679529" comment="tomcat-admin-webapps-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679530" comment="tomcat-docs-webapp-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679531" comment="tomcat-el-3_0-api-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679532" comment="tomcat-javadoc-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679533" comment="tomcat-jsp-2_3-api-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679534" comment="tomcat-lib-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679535" comment="tomcat-servlet-3_1-api-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679536" comment="tomcat-webapps-8.0.53-29.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151691" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1198234" ref_url="https://bugzilla.suse.com/1198234" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<description>
This update for git fixes the following issues:

- CVE-2022-24765: Fixed a potential command injection via git worktree (bsc#1198234).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198234">SUSE bug 1198234</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24765">CVE-2022-24765 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680634" comment="git-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680635" comment="git-core-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680636" comment="git-cvs-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680637" comment="git-daemon-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680638" comment="git-email-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680639" comment="git-gui-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680640" comment="git-svn-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680641" comment="git-web-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680642" comment="gitk-2.26.2-27.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151692" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1196490" ref_url="https://bugzilla.suse.com/1196490" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-23308: Fixed use-after-free of ID and IDREF attributes. (bsc#1196490)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680643" comment="libxml2-2-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679983" comment="libxml2-2-32bit-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679984" comment="libxml2-doc-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680644" comment="libxml2-tools-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680645" comment="python-libxml2-2.9.4-46.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151693" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<description>
This update for SDL fixes the following issues:

- CVE-2020-14409: Fixed an integer overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c. (bsc#1181202)
- CVE-2020-14410: Fixed a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c. (bsc#1181201)
- CVE-2021-33657: Fixed a Heap overflow problem in video/SDL_pixels.c. (bsc#1198001)
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14409">CVE-2020-14409 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14410">CVE-2020-14410 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33657">CVE-2021-33657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680646" comment="libSDL-1_2-0-1.2.15-15.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679539" comment="libSDL-1_2-0-32bit-1.2.15-15.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151694" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1196915" ref_url="https://bugzilla.suse.com/1196915" source="BUGZILLA"/>
		<reference ref_id="1197423" ref_url="https://bugzilla.suse.com/1197423" source="BUGZILLA"/>
		<reference ref_id="1197425" ref_url="https://bugzilla.suse.com/1197425" source="BUGZILLA"/>
		<reference ref_id="1197426" ref_url="https://bugzilla.suse.com/1197426" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26401" ref_url="https://www.suse.com/security/cve/CVE-2021-26401/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-26356" ref_url="https://www.suse.com/security/cve/CVE-2022-26356/" source="CVE"/>
		<reference ref_id="CVE-2022-26357" ref_url="https://www.suse.com/security/cve/CVE-2022-26357/" source="CVE"/>
		<reference ref_id="CVE-2022-26358" ref_url="https://www.suse.com/security/cve/CVE-2022-26358/" source="CVE"/>
		<reference ref_id="CVE-2022-26359" ref_url="https://www.suse.com/security/cve/CVE-2022-26359/" source="CVE"/>
		<reference ref_id="CVE-2022-26360" ref_url="https://www.suse.com/security/cve/CVE-2022-26360/" source="CVE"/>
		<reference ref_id="CVE-2022-26361" ref_url="https://www.suse.com/security/cve/CVE-2022-26361/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that
  could cause a denial of service in the host (bsc#1197423).
- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts
  using VT-d IOMMU hardware, which could lead to a denial of service in the host
  (bsc#1197425).
- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory
  corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be
  leveraged by an attacker to cause a denial of service in the host (bsc#1197426).
- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue
  mitigations (bsc#1196915).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-26"/>
	<updated date="2022-04-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196915">SUSE bug 1196915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197423">SUSE bug 1197423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197425">SUSE bug 1197425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26401/">CVE-2021-26401 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26401">CVE-2021-26401 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0002">CVE-2022-0002 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26356/">CVE-2022-26356 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26356">CVE-2022-26356 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26357/">CVE-2022-26357 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26357">CVE-2022-26357 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26358/">CVE-2022-26358 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26358">CVE-2022-26358 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26359/">CVE-2022-26359 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26359">CVE-2022-26359 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26360/">CVE-2022-26360 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26360">CVE-2022-26360 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26361/">CVE-2022-26361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26361">CVE-2022-26361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680580" comment="xen-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680581" comment="xen-doc-html-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680582" comment="xen-libs-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680583" comment="xen-libs-32bit-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680584" comment="xen-tools-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680585" comment="xen-tools-domU-4.9.4_28-3.103.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151695" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194019" ref_url="https://bugzilla.suse.com/1194019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8518" ref_url="https://www.suse.com/security/cve/CVE-2018-8518/" source="CVE"/>
		<reference ref_id="CVE-2018-8523" ref_url="https://www.suse.com/security/cve/CVE-2018-8523/" source="CVE"/>
		<reference ref_id="CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551/" source="CVE"/>
		<reference ref_id="CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558/" source="CVE"/>
		<reference ref_id="CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559/" source="CVE"/>
		<reference ref_id="CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563/" source="CVE"/>
		<reference ref_id="CVE-2019-8674" ref_url="https://www.suse.com/security/cve/CVE-2019-8674/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<reference ref_id="CVE-2019-8707" ref_url="https://www.suse.com/security/cve/CVE-2019-8707/" source="CVE"/>
		<reference ref_id="CVE-2019-8719" ref_url="https://www.suse.com/security/cve/CVE-2019-8719/" source="CVE"/>
		<reference ref_id="CVE-2019-8726" ref_url="https://www.suse.com/security/cve/CVE-2019-8726/" source="CVE"/>
		<reference ref_id="CVE-2019-8733" ref_url="https://www.suse.com/security/cve/CVE-2019-8733/" source="CVE"/>
		<reference ref_id="CVE-2019-8763" ref_url="https://www.suse.com/security/cve/CVE-2019-8763/" source="CVE"/>
		<reference ref_id="CVE-2019-8765" ref_url="https://www.suse.com/security/cve/CVE-2019-8765/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8768" ref_url="https://www.suse.com/security/cve/CVE-2019-8768/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8821" ref_url="https://www.suse.com/security/cve/CVE-2019-8821/" source="CVE"/>
		<reference ref_id="CVE-2019-8822" ref_url="https://www.suse.com/security/cve/CVE-2019-8822/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-3885" ref_url="https://www.suse.com/security/cve/CVE-2020-3885/" source="CVE"/>
		<reference ref_id="CVE-2020-3894" ref_url="https://www.suse.com/security/cve/CVE-2020-3894/" source="CVE"/>
		<reference ref_id="CVE-2020-3895" ref_url="https://www.suse.com/security/cve/CVE-2020-3895/" source="CVE"/>
		<reference ref_id="CVE-2020-3897" ref_url="https://www.suse.com/security/cve/CVE-2020-3897/" source="CVE"/>
		<reference ref_id="CVE-2020-3900" ref_url="https://www.suse.com/security/cve/CVE-2020-3900/" source="CVE"/>
		<reference ref_id="CVE-2020-3901" ref_url="https://www.suse.com/security/cve/CVE-2020-3901/" source="CVE"/>
		<reference ref_id="CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9952" ref_url="https://www.suse.com/security/cve/CVE-2020-9952/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1817" ref_url="https://www.suse.com/security/cve/CVE-2021-1817/" source="CVE"/>
		<reference ref_id="CVE-2021-1820" ref_url="https://www.suse.com/security/cve/CVE-2021-1820/" source="CVE"/>
		<reference ref_id="CVE-2021-1825" ref_url="https://www.suse.com/security/cve/CVE-2021-1825/" source="CVE"/>
		<reference ref_id="CVE-2021-1826" ref_url="https://www.suse.com/security/cve/CVE-2021-1826/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="CVE-2021-30661" ref_url="https://www.suse.com/security/cve/CVE-2021-30661/" source="CVE"/>
		<reference ref_id="CVE-2021-30666" ref_url="https://www.suse.com/security/cve/CVE-2021-30666/" source="CVE"/>
		<reference ref_id="CVE-2021-30682" ref_url="https://www.suse.com/security/cve/CVE-2021-30682/" source="CVE"/>
		<reference ref_id="CVE-2021-30761" ref_url="https://www.suse.com/security/cve/CVE-2021-30761/" source="CVE"/>
		<reference ref_id="CVE-2021-30762" ref_url="https://www.suse.com/security/cve/CVE-2021-30762/" source="CVE"/>
		<reference ref_id="CVE-2021-30809" ref_url="https://www.suse.com/security/cve/CVE-2021-30809/" source="CVE"/>
		<reference ref_id="CVE-2021-30818" ref_url="https://www.suse.com/security/cve/CVE-2021-30818/" source="CVE"/>
		<reference ref_id="CVE-2021-30823" ref_url="https://www.suse.com/security/cve/CVE-2021-30823/" source="CVE"/>
		<reference ref_id="CVE-2021-30836" ref_url="https://www.suse.com/security/cve/CVE-2021-30836/" source="CVE"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30848" ref_url="https://www.suse.com/security/cve/CVE-2021-30848/" source="CVE"/>
		<reference ref_id="CVE-2021-30849" ref_url="https://www.suse.com/security/cve/CVE-2021-30849/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="CVE-2021-30884" ref_url="https://www.suse.com/security/cve/CVE-2021-30884/" source="CVE"/>
		<reference ref_id="CVE-2021-30887" ref_url="https://www.suse.com/security/cve/CVE-2021-30887/" source="CVE"/>
		<reference ref_id="CVE-2021-30888" ref_url="https://www.suse.com/security/cve/CVE-2021-30888/" source="CVE"/>
		<reference ref_id="CVE-2021-30889" ref_url="https://www.suse.com/security/cve/CVE-2021-30889/" source="CVE"/>
		<reference ref_id="CVE-2021-30890" ref_url="https://www.suse.com/security/cve/CVE-2021-30890/" source="CVE"/>
		<reference ref_id="CVE-2021-30897" ref_url="https://www.suse.com/security/cve/CVE-2021-30897/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.34.3 (bsc#1194019).
- CVE-2021-30887: Fixed logic issue allowing unexpectedly unenforced Content Security Policy when processing maliciously crafted web content.
- CVE-2021-30890: Fixed logic issue allowing universal cross site scripting when processing maliciously crafted web content.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8518/">CVE-2018-8518 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8518">CVE-2018-8518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8523/">CVE-2018-8523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-8523">CVE-2018-8523 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8551">CVE-2019-8551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8558">CVE-2019-8558 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8559">CVE-2019-8559 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8563">CVE-2019-8563 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8674/">CVE-2019-8674 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8674">CVE-2019-8674 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8681">CVE-2019-8681 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8684">CVE-2019-8684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8687">CVE-2019-8687 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8688">CVE-2019-8688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8689">CVE-2019-8689 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8690">CVE-2019-8690 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8707/">CVE-2019-8707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8707">CVE-2019-8707 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8719/">CVE-2019-8719 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8719">CVE-2019-8719 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8726/">CVE-2019-8726 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8726">CVE-2019-8726 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8733/">CVE-2019-8733 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8733">CVE-2019-8733 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8763/">CVE-2019-8763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8763">CVE-2019-8763 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8765/">CVE-2019-8765 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8765">CVE-2019-8765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8766">CVE-2019-8766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8768/">CVE-2019-8768 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8768">CVE-2019-8768 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8782">CVE-2019-8782 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8808">CVE-2019-8808 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8815">CVE-2019-8815 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8821/">CVE-2019-8821 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8821">CVE-2019-8821 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8822/">CVE-2019-8822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8822">CVE-2019-8822 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10018">CVE-2020-10018 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13753">CVE-2020-13753 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27918">CVE-2020-27918 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29623">CVE-2020-29623 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3885/">CVE-2020-3885 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3885">CVE-2020-3885 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3894/">CVE-2020-3894 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3894">CVE-2020-3894 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3895/">CVE-2020-3895 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3895">CVE-2020-3895 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3897/">CVE-2020-3897 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3897">CVE-2020-3897 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3900/">CVE-2020-3900 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3900">CVE-2020-3900 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3901/">CVE-2020-3901 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3901">CVE-2020-3901 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3902">CVE-2020-3902 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9802">CVE-2020-9802 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9803">CVE-2020-9803 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9805">CVE-2020-9805 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9947">CVE-2020-9947 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9948">CVE-2020-9948 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9951">CVE-2020-9951 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-9952/">CVE-2020-9952 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9952">CVE-2020-9952 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1765">CVE-2021-1765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1788">CVE-2021-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1817/">CVE-2021-1817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1817">CVE-2021-1817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1820/">CVE-2021-1820 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1820">CVE-2021-1820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1825/">CVE-2021-1825 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1825">CVE-2021-1825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1826/">CVE-2021-1826 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1826">CVE-2021-1826 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1844">CVE-2021-1844 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1871">CVE-2021-1871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30661/">CVE-2021-30661 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30661">CVE-2021-30661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30666/">CVE-2021-30666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30666">CVE-2021-30666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30682/">CVE-2021-30682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30682">CVE-2021-30682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30761/">CVE-2021-30761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30761">CVE-2021-30761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30762/">CVE-2021-30762 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30762">CVE-2021-30762 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30809/">CVE-2021-30809 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30809">CVE-2021-30809 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30818/">CVE-2021-30818 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30818">CVE-2021-30818 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30823/">CVE-2021-30823 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30823">CVE-2021-30823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30836/">CVE-2021-30836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30836">CVE-2021-30836 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30846">CVE-2021-30846 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30848/">CVE-2021-30848 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30848">CVE-2021-30848 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30849/">CVE-2021-30849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30849">CVE-2021-30849 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30851">CVE-2021-30851 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30858">CVE-2021-30858 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30884/">CVE-2021-30884 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30884">CVE-2021-30884 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30887/">CVE-2021-30887 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30887">CVE-2021-30887 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30888/">CVE-2021-30888 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30888">CVE-2021-30888 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30889/">CVE-2021-30889 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30889">CVE-2021-30889 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30890/">CVE-2021-30890 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30890">CVE-2021-30890 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30897/">CVE-2021-30897 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30897">CVE-2021-30897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664241" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664242" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664243" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664244" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664245" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664246" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151696" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1197216" ref_url="https://bugzilla.suse.com/1197216" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2022-27239: Fixed a buffer overflow in the command line ip option (bsc#1197216).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197216">SUSE bug 1197216</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27239">CVE-2022-27239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681237" comment="cifs-utils-6.9-9.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151697" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 43 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1197211" ref_url="https://bugzilla.suse.com/1197211" source="BUGZILLA"/>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39713" ref_url="https://www.suse.com/security/cve/CVE-2021-39713/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_156 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free (bsc#1197211).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197211">SUSE bug 1197211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39713/">CVE-2021-39713 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39713">CVE-2021-39713 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721292" comment="kernel-default 4.4.180-94.156 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719632" comment="kgraft-patch-4_4_180-94_156-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009681238" comment="kgraft-patch-4_4_180-94_156-default-3-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151698" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 42 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1197211" ref_url="https://bugzilla.suse.com/1197211" source="BUGZILLA"/>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39713" ref_url="https://www.suse.com/security/cve/CVE-2021-39713/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_153 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free (bsc#1197211).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197211">SUSE bug 1197211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39713/">CVE-2021-39713 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39713">CVE-2021-39713 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721293" comment="kernel-default 4.4.180-94.153 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719634" comment="kgraft-patch-4_4_180-94_153-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009681239" comment="kgraft-patch-4_4_180-94_153-default-4-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151699" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1197211" ref_url="https://bugzilla.suse.com/1197211" source="BUGZILLA"/>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39713" ref_url="https://www.suse.com/security/cve/CVE-2021-39713/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_150 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free (bsc#1197211).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197211">SUSE bug 1197211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39713/">CVE-2021-39713 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39713">CVE-2021-39713 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721291" comment="kernel-default 4.4.180-94.150 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719630" comment="kgraft-patch-4_4_180-94_150-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009681240" comment="kgraft-patch-4_4_180-94_150-default-7-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151700" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1197211" ref_url="https://bugzilla.suse.com/1197211" source="BUGZILLA"/>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39713" ref_url="https://www.suse.com/security/cve/CVE-2021-39713/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free (bsc#1197211).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197211">SUSE bug 1197211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39713/">CVE-2021-39713 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39713">CVE-2021-39713 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009681241" comment="kgraft-patch-4_4_180-94_147-default-11-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151701" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1197211" ref_url="https://bugzilla.suse.com/1197211" source="BUGZILLA"/>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39713" ref_url="https://www.suse.com/security/cve/CVE-2021-39713/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free (bsc#1197211).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197211">SUSE bug 1197211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39713/">CVE-2021-39713 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39713">CVE-2021-39713 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009681242" comment="kgraft-patch-4_4_180-94_144-default-14-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151702" version="1" class="patch">
	<metadata>
		<title>Security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194735" ref_url="https://bugzilla.suse.com/1194735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<description>
This update for aide fixes the following issues:

- CVE-2021-45417: Fix a bufferoverflow in base64 functions (bsc#1194735)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45417">CVE-2021-45417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664247" comment="aide-0.16-20.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151703" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.1.0 ESR.

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-09"/>
	<updated date="2022-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29981">CVE-2021-29981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29982">CVE-2021-29982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29983">CVE-2021-29983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29987">CVE-2021-29987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29990">CVE-2021-29990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29991">CVE-2021-29991 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38492">CVE-2021-38492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38495">CVE-2021-38495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682660" comment="MozillaFirefox-91.9.0-112.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682661" comment="MozillaFirefox-devel-91.9.0-112.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682662" comment="MozillaFirefox-translations-common-91.9.0-112.104.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151704" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1107294" ref_url="https://bugzilla.suse.com/1107294" source="BUGZILLA"/>
		<reference ref_id="1107296" ref_url="https://bugzilla.suse.com/1107296" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0502" ref_url="https://www.suse.com/security/cve/CVE-2018-0502/" source="CVE"/>
		<reference ref_id="CVE-2018-13259" ref_url="https://www.suse.com/security/cve/CVE-2018-13259/" source="CVE"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2018-0502: Fixed execve call vulnerability to program named on the second line when the beginning of a #! script file was mishandled. (bsc#1107296, bsc#1107294)
- CVE-2018-13259: Fixed execve call vulnerability to program name that is a substring of the intended one. (bsc#1107296, bsc#1107294)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-24"/>
	<updated date="2022-01-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107294">SUSE bug 1107294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107296">SUSE bug 1107296</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0502/">CVE-2018-0502 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0502">CVE-2018-0502 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13259/">CVE-2018-13259 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13259">CVE-2018-13259 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664698" comment="zsh-5.0.5-6.12.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151705" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1197135" ref_url="https://bugzilla.suse.com/1197135" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25220: Fixed potentially incorrect answers by cached forwarders (bsc#1197135).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197135">SUSE bug 1197135</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25220">CVE-2021-25220 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696559" comment="bind-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696560" comment="bind-chrootenv-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682677" comment="bind-doc-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696561" comment="bind-libs-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682679" comment="bind-libs-32bit-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696562" comment="bind-utils-9.9.9P1-63.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151706" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1195950" ref_url="https://bugzilla.suse.com/1195950" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes one issue.

The following security issue was fixed:

- CVE-2022-0330: A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allowed a local user to crash the system or escalate their privileges on the system. (bsc#1195950)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-11"/>
	<updated date="2022-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195950">SUSE bug 1195950</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009683236" comment="kgraft-patch-4_4_180-94_144-default-15-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151707" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1195950" ref_url="https://bugzilla.suse.com/1195950" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes one issue.

The following security issue was fixed:

- CVE-2022-0330: A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allowed a local user to crash the system or escalate their privileges on the system. (bsc#1195950)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-11"/>
	<updated date="2022-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195950">SUSE bug 1195950</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009683237" comment="kgraft-patch-4_4_180-94_147-default-12-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151708" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1195950" ref_url="https://bugzilla.suse.com/1195950" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_150 fixes one issue.

The following security issue was fixed:

- CVE-2022-0330: A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allowed a local user to crash the system or escalate their privileges on the system. (bsc#1195950)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-11"/>
	<updated date="2022-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195950">SUSE bug 1195950</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721291" comment="kernel-default 4.4.180-94.150 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719630" comment="kgraft-patch-4_4_180-94_150-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009683238" comment="kgraft-patch-4_4_180-94_150-default-8-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151709" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 44 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="1197211" ref_url="https://bugzilla.suse.com/1197211" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-39713" ref_url="https://www.suse.com/security/cve/CVE-2021-39713/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_161 fixes several issues.

The following security issues were fixed:

- CVE-2022-1011: A use-after-free flaw was found in the FUSE filesystem in the way a user triggers write(). This flaw allowed a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation. (bsc#1197344)
- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free. (bsc#1197211)
- CVE-2021-28688: The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11 (bsc#1182294)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-11"/>
	<updated date="2022-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197211">SUSE bug 1197211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39713/">CVE-2021-39713 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39713">CVE-2021-39713 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721294" comment="kernel-default 4.4.180-94.161 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719636" comment="kgraft-patch-4_4_180-94_161-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009683239" comment="kgraft-patch-4_4_180-94_161-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151710" version="1" class="patch">
	<metadata>
		<title>Security update for e2fsprogs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1198446" ref_url="https://bugzilla.suse.com/1198446" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1304" ref_url="https://www.suse.com/security/cve/CVE-2022-1304/" source="CVE"/>
		<description>
This update for e2fsprogs fixes the following issues:

- CVE-2022-1304: Fixed out-of-bounds read/write leading to segmentation fault
  and possibly arbitrary code execution. (bsc#1198446)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-12"/>
	<updated date="2022-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198446">SUSE bug 1198446</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1304/">CVE-2022-1304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">CVE-2022-1304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683240" comment="e2fsprogs-1.42.11-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683241" comment="libcom_err2-1.42.11-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682310" comment="libcom_err2-32bit-1.42.11-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683242" comment="libext2fs2-1.42.11-16.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151711" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188568" ref_url="https://bugzilla.suse.com/1188568" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2432" ref_url="https://www.suse.com/security/cve/CVE-2021-2432/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 5 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2432: Fixed a vulnerability in the omponent JNDI. (bsc#1188568)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-24"/>
	<updated date="2022-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188568">SUSE bug 1188568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-2432/">CVE-2021-2432 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2432">CVE-2021-2432 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41035">CVE-2021-41035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662499" comment="java-1_7_1-ibm-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662487" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662500" comment="java-1_7_1-ibm-devel-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662501" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662490" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.0-38.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151712" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1198383" ref_url="https://bugzilla.suse.com/1198383" source="BUGZILLA"/>
		<reference ref_id="1199240" ref_url="https://bugzilla.suse.com/1199240" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29155" ref_url="https://www.suse.com/security/cve/CVE-2022-29155/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2022-29155: Fixed SQL injection in back-sql (bsc#1199240).
- Fixed issue with SASL init that crashed slapd at startup under certain conditions (bsc#1198383).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198383">SUSE bug 1198383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199240">SUSE bug 1199240</bugzilla>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29155/">CVE-2022-29155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29155">CVE-2022-29155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683712" comment="libldap-2_4-2-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682621" comment="libldap-2_4-2-32bit-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683713" comment="openldap2-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683714" comment="openldap2-back-meta-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683715" comment="openldap2-client-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682625" comment="openldap2-doc-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683716" comment="openldap2-ppolicy-check-password-1.2-18.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151713" version="1" class="patch">
	<metadata>
		<title>Security update for gzip (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
This update for gzip fixes the following issues:

- CVE-2022-1271: Add hardening for zgrep. (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683717" comment="gzip-1.6-9.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151714" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="1198290" ref_url="https://bugzilla.suse.com/1198290" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<reference ref_id="CVE-2022-22624" ref_url="https://www.suse.com/security/cve/CVE-2022-22624/" source="CVE"/>
		<reference ref_id="CVE-2022-22628" ref_url="https://www.suse.com/security/cve/CVE-2022-22628/" source="CVE"/>
		<reference ref_id="CVE-2022-22629" ref_url="https://www.suse.com/security/cve/CVE-2022-22629/" source="CVE"/>
		<reference ref_id="CVE-2022-22637" ref_url="https://www.suse.com/security/cve/CVE-2022-22637/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.0 (bsc#1198290):

- CVE-2022-22624: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22628: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22629: Fixed a buffer overflow that may lead to arbitrary code execution.
- CVE-2022-22637: Fixed an unexpected cross-origin behavior due to a logic error.

Missing CVE reference for the update to 2.34.6 (bsc#1196133):

- CVE-2022-22594: Fixed a cross-origin issue in the IndexDB API.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198290">SUSE bug 1198290</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22594">CVE-2022-22594 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22624/">CVE-2022-22624 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22624">CVE-2022-22624 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22628/">CVE-2022-22628 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22628">CVE-2022-22628 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22629/">CVE-2022-22629 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22629">CVE-2022-22629 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22637/">CVE-2022-22637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22637">CVE-2022-22637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683718" comment="libjavascriptcoregtk-4_0-18-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683719" comment="libwebkit2gtk-4_0-37-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681309" comment="libwebkit2gtk3-lang-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683720" comment="typelib-1_0-JavaScriptCore-4_0-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683721" comment="typelib-1_0-WebKit2-4_0-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683722" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683723" comment="webkit2gtk-4_0-injected-bundles-2.36.0-2.96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151715" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1199223" ref_url="https://bugzilla.suse.com/1199223" source="BUGZILLA"/>
		<reference ref_id="1199224" ref_url="https://bugzilla.suse.com/1199224" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27781" ref_url="https://www.suse.com/security/cve/CVE-2022-27781/" source="CVE"/>
		<reference ref_id="CVE-2022-27782" ref_url="https://www.suse.com/security/cve/CVE-2022-27782/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-27781: Fixed CERTINFO never-ending busy-loop (bsc#1199223)
- CVE-2022-27782: Fixed TLS and SSH connection too eager reuse (bsc#1199224)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-18"/>
	<updated date="2022-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199223">SUSE bug 1199223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199224">SUSE bug 1199224</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-27781/">CVE-2022-27781 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27781">CVE-2022-27781 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27782/">CVE-2022-27782 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27782">CVE-2022-27782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684092" comment="curl-7.37.0-37.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684093" comment="libcurl4-7.37.0-37.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684074" comment="libcurl4-32bit-7.37.0-37.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151716" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1198717" ref_url="https://bugzilla.suse.com/1198717" source="BUGZILLA"/>
		<reference ref_id="1199423" ref_url="https://bugzilla.suse.com/1199423" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21151" ref_url="https://www.suse.com/security/cve/CVE-2022-21151/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220510 release. (bsc#1199423)
Updated to Intel CPU Microcode 20220419 release. (bsc#1198717)

- CVE-2022-21151: Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access (bsc#1199423).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198717">SUSE bug 1198717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199423">SUSE bug 1199423</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21151/">CVE-2022-21151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21151">CVE-2022-21151 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683677" comment="ucode-intel-20220510-13.97.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151717" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1198970" ref_url="https://bugzilla.suse.com/1198970" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909/" source="CVE"/>
		<reference ref_id="CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911/" source="CVE"/>
		<reference ref_id="CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912/" source="CVE"/>
		<reference ref_id="CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914/" source="CVE"/>
		<reference ref_id="CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916/" source="CVE"/>
		<reference ref_id="CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.9.0 ESR (MFSA 2022-17)(bsc#1198970):

- CVE-2022-29914: Fullscreen notification bypass using popups
- CVE-2022-29909: Bypassing permission prompt in nested browsing contexts
- CVE-2022-29916: Leaking browser history with CSS variables
- CVE-2022-29911: iframe Sandbox bypass
- CVE-2022-29912: Reader mode bypassed SameSite cookies
- CVE-2022-29917: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29909">CVE-2022-29909 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29911">CVE-2022-29911 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29912">CVE-2022-29912 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29914">CVE-2022-29914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29916">CVE-2022-29916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29917">CVE-2022-29917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696563" comment="MozillaFirefox-91.9.0-112.108.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696564" comment="MozillaFirefox-devel-91.9.0-112.108.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696565" comment="MozillaFirefox-translations-common-91.9.0-112.108.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151718" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194251" ref_url="https://bugzilla.suse.com/1194251" source="BUGZILLA"/>
		<reference ref_id="1194362" ref_url="https://bugzilla.suse.com/1194362" source="BUGZILLA"/>
		<reference ref_id="1194474" ref_url="https://bugzilla.suse.com/1194474" source="BUGZILLA"/>
		<reference ref_id="1194476" ref_url="https://bugzilla.suse.com/1194476" source="BUGZILLA"/>
		<reference ref_id="1194477" ref_url="https://bugzilla.suse.com/1194477" source="BUGZILLA"/>
		<reference ref_id="1194478" ref_url="https://bugzilla.suse.com/1194478" source="BUGZILLA"/>
		<reference ref_id="1194479" ref_url="https://bugzilla.suse.com/1194479" source="BUGZILLA"/>
		<reference ref_id="1194480" ref_url="https://bugzilla.suse.com/1194480" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2021-45960: Fixed left shift in the storeAtts function in xmlparse.c that can lead to realloc misbehavior (bsc#1194251).
- CVE-2021-46143: Fixed integer overflow in m_groupSize in doProlog (bsc#1194362).
- CVE-2022-22822: Fixed integer overflow in addBinding in xmlparse.c (bsc#1194474).
- CVE-2022-22823: Fixed integer overflow in build_model in xmlparse.c (bsc#1194476).
- CVE-2022-22824: Fixed integer overflow in defineAttribute in xmlparse.c (bsc#1194477).
- CVE-2022-22825: Fixed integer overflow in lookup in xmlparse.c (bsc#1194478).
- CVE-2022-22826: Fixed integer overflow in nextScaffoldPart in xmlparse.c (bsc#1194479).
- CVE-2022-22827: Fixed integer overflow in storeAtts in xmlparse.c (bsc#1194480).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">CVE-2021-45960 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">CVE-2021-46143 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">CVE-2022-22825 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">CVE-2022-22826 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">CVE-2022-22827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664699" comment="expat-2.1.0-21.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664700" comment="libexpat1-2.1.0-21.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664105" comment="libexpat1-32bit-2.1.0-21.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151719" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1199475" ref_url="https://bugzilla.suse.com/1199475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:
 
- CVE-2022-1552: Confine additional operations within 'security restricted operation' sandboxes (bsc#1199475).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199475">SUSE bug 1199475</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696566" comment="postgresql10-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696567" comment="postgresql10-contrib-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696064" comment="postgresql10-docs-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696568" comment="postgresql10-plperl-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696569" comment="postgresql10-plpython-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696570" comment="postgresql10-pltcl-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696571" comment="postgresql10-server-10.21-4.28.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151720" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1199768" ref_url="https://bugzilla.suse.com/1199768" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1529" ref_url="https://www.suse.com/security/cve/CVE-2022-1529/" source="CVE"/>
		<reference ref_id="CVE-2022-1802" ref_url="https://www.suse.com/security/cve/CVE-2022-1802/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.9.1 ESR - MFSA 2022-19 (bsc#1199768):

- CVE-2022-1802: Prototype pollution in Top-Level Await implementation
- CVE-2022-1529: Untrusted input used in JavaScript object indexing, leading to prototype pollution
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199768">SUSE bug 1199768</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1529/">CVE-2022-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1529">CVE-2022-1529 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1802/">CVE-2022-1802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1802">CVE-2022-1802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696572" comment="MozillaFirefox-91.9.1-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696573" comment="MozillaFirefox-devel-91.9.1-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696574" comment="MozillaFirefox-translations-common-91.9.1-112.111.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151721" version="1" class="patch">
	<metadata>
		<title>Security update for python-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<description>
This update for python-requests fixes the following issues:

- CVE-2018-18074: Fixed to prevent the package to send an HTTP Authorization header to an http URI
  upon receiving a same-hostname https-to-http redirect. (bsc#1111622) 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595040" comment="python-requests-2.11.1-6.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151722" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1069689" ref_url="https://bugzilla.suse.com/1069689" source="BUGZILLA"/>
		<reference ref_id="1199132" ref_url="https://bugzilla.suse.com/1199132" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16932" ref_url="https://www.suse.com/security/cve/CVE-2017-16932/" source="CVE"/>
		<reference ref_id="CVE-2022-29824" ref_url="https://www.suse.com/security/cve/CVE-2022-29824/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-29824: Fixed integer overflow leading to out-of-bounds write in buf.c and tree.c (bsc#1199132).
- CVE-2017-16932: Prevent infinite recursion in parameter entities (bsc#1069689).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-24"/>
	<updated date="2022-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1069689">SUSE bug 1069689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199132">SUSE bug 1199132</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16932/">CVE-2017-16932 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16932">CVE-2017-16932 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29824/">CVE-2022-29824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824">CVE-2022-29824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696575" comment="libxml2-2-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696073" comment="libxml2-2-32bit-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696074" comment="libxml2-doc-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696576" comment="libxml2-tools-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696577" comment="python-libxml2-2.9.4-46.54.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151723" version="1" class="patch">
	<metadata>
		<title>Security update for pcre2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1199232" ref_url="https://bugzilla.suse.com/1199232" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1586" ref_url="https://www.suse.com/security/cve/CVE-2022-1586/" source="CVE"/>
		<description>
This update for pcre2 fixes the following issues:

- CVE-2022-1586: Fixed out-of-bounds read via missing Unicode property matching issue in JIT compiled regular expressions (bsc#1199232).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-25"/>
	<updated date="2022-05-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199232">SUSE bug 1199232</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1586/">CVE-2022-1586 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">CVE-2022-1586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696578" comment="libpcre2-16-0-10.34-1.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696579" comment="libpcre2-32-0-10.34-1.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696580" comment="libpcre2-8-0-10.34-1.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696581" comment="libpcre2-posix2-10.34-1.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151724" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1131644" ref_url="https://bugzilla.suse.com/1131644" source="BUGZILLA"/>
		<reference ref_id="1131868" ref_url="https://bugzilla.suse.com/1131868" source="BUGZILLA"/>
		<reference ref_id="1131870" ref_url="https://bugzilla.suse.com/1131870" source="BUGZILLA"/>
		<reference ref_id="1131871" ref_url="https://bugzilla.suse.com/1131871" source="BUGZILLA"/>
		<reference ref_id="1131872" ref_url="https://bugzilla.suse.com/1131872" source="BUGZILLA"/>
		<reference ref_id="1131874" ref_url="https://bugzilla.suse.com/1131874" source="BUGZILLA"/>
		<reference ref_id="1133640" ref_url="https://bugzilla.suse.com/1133640" source="BUGZILLA"/>
		<reference ref_id="1144443" ref_url="https://bugzilla.suse.com/1144443" source="BUGZILLA"/>
		<reference ref_id="1156920" ref_url="https://bugzilla.suse.com/1156920" source="BUGZILLA"/>
		<reference ref_id="1165266" ref_url="https://bugzilla.suse.com/1165266" source="BUGZILLA"/>
		<reference ref_id="1166933" ref_url="https://bugzilla.suse.com/1166933" source="BUGZILLA"/>
		<reference ref_id="1167331" ref_url="https://bugzilla.suse.com/1167331" source="BUGZILLA"/>
		<reference ref_id="1182805" ref_url="https://bugzilla.suse.com/1182805" source="BUGZILLA"/>
		<reference ref_id="1194732" ref_url="https://bugzilla.suse.com/1194732" source="BUGZILLA"/>
		<reference ref_id="1194733" ref_url="https://bugzilla.suse.com/1194733" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8041" ref_url="https://www.suse.com/security/cve/CVE-2015-8041/" source="CVE"/>
		<reference ref_id="CVE-2017-13077" ref_url="https://www.suse.com/security/cve/CVE-2017-13077/" source="CVE"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-13082" ref_url="https://www.suse.com/security/cve/CVE-2017-13082/" source="CVE"/>
		<reference ref_id="CVE-2017-13086" ref_url="https://www.suse.com/security/cve/CVE-2017-13086/" source="CVE"/>
		<reference ref_id="CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087/" source="CVE"/>
		<reference ref_id="CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088/" source="CVE"/>
		<reference ref_id="CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526/" source="CVE"/>
		<reference ref_id="CVE-2019-11555" ref_url="https://www.suse.com/security/cve/CVE-2019-11555/" source="CVE"/>
		<reference ref_id="CVE-2019-13377" ref_url="https://www.suse.com/security/cve/CVE-2019-13377/" source="CVE"/>
		<reference ref_id="CVE-2019-9494" ref_url="https://www.suse.com/security/cve/CVE-2019-9494/" source="CVE"/>
		<reference ref_id="CVE-2019-9495" ref_url="https://www.suse.com/security/cve/CVE-2019-9495/" source="CVE"/>
		<reference ref_id="CVE-2019-9497" ref_url="https://www.suse.com/security/cve/CVE-2019-9497/" source="CVE"/>
		<reference ref_id="CVE-2019-9498" ref_url="https://www.suse.com/security/cve/CVE-2019-9498/" source="CVE"/>
		<reference ref_id="CVE-2019-9499" ref_url="https://www.suse.com/security/cve/CVE-2019-9499/" source="CVE"/>
		<reference ref_id="CVE-2022-23303" ref_url="https://www.suse.com/security/cve/CVE-2022-23303/" source="CVE"/>
		<reference ref_id="CVE-2022-23304" ref_url="https://www.suse.com/security/cve/CVE-2022-23304/" source="CVE"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2022-23303, CVE-2022-23304: Fixed SAE/EAP-pwd side-channel attacks (bsc#1194732, bsc#1194733)
- CVE-2021-0326: Fixed P2P group information processing vulnerability (bsc#1181777)

- Fix systemd device ready dependencies in wpa_supplicant@.service file. (bsc#1182805)

- Limit P2P_DEVICE name to appropriate ifname size
- Enable SAE support(jsc#SLE-14992).
- Fix wicked wlan (bsc#1156920)
- Change wpa_supplicant.service to ensure wpa_supplicant gets started before
  network. Fix WLAN config on boot with wicked. (bsc#1166933)

- Adjust the service to start after network.target wrt bsc#1165266

Update to 2.9 release:

* SAE changes
  - disable use of groups using Brainpool curves
  - improved protection against side channel attacks
  [https://w1.fi/security/2019-6/]
* EAP-pwd changes
  - disable use of groups using Brainpool curves
  - allow the set of groups to be configured (eap_pwd_groups)
  - improved protection against side channel attacks
  [https://w1.fi/security/2019-6/]
* fixed FT-EAP initial mobility domain association using PMKSA caching
  (disabled by default for backwards compatibility; can be enabled
  with ft_eap_pmksa_caching=1)
* fixed a regression in OpenSSL 1.1+ engine loading
* added validation of RSNE in (Re)Association Response frames
* fixed DPP bootstrapping URI parser of channel list
* extended EAP-SIM/AKA fast re-authentication to allow use with FILS
* extended ca_cert_blob to support PEM format
* improved robustness of P2P Action frame scheduling
* added support for EAP-SIM/AKA using anonymous@realm identity
* fixed Hotspot 2.0 credential selection based on roaming consortium
  to ignore credentials without a specific EAP method
* added experimental support for EAP-TEAP peer (RFC 7170)
* added experimental support for EAP-TLS peer with TLS v1.3
* fixed a regression in WMM parameter configuration for a TDLS peer
* fixed a regression in operation with drivers that offload 802.1X
  4-way handshake
* fixed an ECDH operation corner case with OpenSSL
* SAE changes
  - added support for SAE Password Identifier
  - changed default configuration to enable only groups 19, 20, 21
    (i.e., disable groups 25 and 26) and disable all unsuitable groups
    completely based on REVmd changes
  - do not regenerate PWE unnecessarily when the AP uses the
    anti-clogging token mechanisms
  - fixed some association cases where both SAE and FT-SAE were enabled
    on both the station and the selected AP
  - started to prefer FT-SAE over SAE AKM if both are enabled
  - started to prefer FT-SAE over FT-PSK if both are enabled
  - fixed FT-SAE when SAE PMKSA caching is used
  - reject use of unsuitable groups based on new implementation guidance
    in REVmd (allow only FFC groups with prime &gt;= 3072 bits and ECC
    groups with prime &gt;= 256)
  - minimize timing and memory use differences in PWE derivation
    [https://w1.fi/security/2019-1/] (CVE-2019-9494, bsc#1131868)
* EAP-pwd changes
  - minimize timing and memory use differences in PWE derivation
    [https://w1.fi/security/2019-2/] (CVE-2019-9495, bsc#1131870)
  - verify server scalar/element
    [https://w1.fi/security/2019-4/] (CVE-2019-9497, CVE-2019-9498,
    CVE-2019-9499, bsc#1131874, bsc#1131872, bsc#1131871, bsc#1131644)
  - fix message reassembly issue with unexpected fragment
    [https://w1.fi/security/2019-5/] (CVE-2019-11555, bsc#1133640)
  - enforce rand,mask generation rules more strictly
  - fix a memory leak in PWE derivation
  - disallow ECC groups with a prime under 256 bits (groups 25, 26, and
    27)
  - SAE/EAP-pwd side-channel attack update
    [https://w1.fi/security/2019-6/] (CVE-2019-13377, bsc#1144443)
* fixed CONFIG_IEEE80211R=y (FT) build without CONFIG_FILS=y
* Hotspot 2.0 changes
  - do not indicate release number that is higher than the one
    AP supports
  - added support for release number 3
  - enable PMF automatically for network profiles created from
    credentials
* fixed OWE network profile saving
* fixed DPP network profile saving
* added support for RSN operating channel validation
  (CONFIG_OCV=y and network profile parameter ocv=1)
* added Multi-AP backhaul STA support
* fixed build with LibreSSL
* number of MKA/MACsec fixes and extensions
* extended domain_match and domain_suffix_match to allow list of values
* fixed dNSName matching in domain_match and domain_suffix_match when
  using wolfSSL
* started to prefer FT-EAP-SHA384 over WPA-EAP-SUITE-B-192 AKM if both
  are enabled
* extended nl80211 Connect and external authentication to support
  SAE, FT-SAE, FT-EAP-SHA384
* fixed KEK2 derivation for FILS+FT
* extended client_cert file to allow loading of a chain of PEM
  encoded certificates
* extended beacon reporting functionality
* extended D-Bus interface with number of new properties
* fixed a regression in FT-over-DS with mac80211-based drivers
* OpenSSL: allow systemwide policies to be overridden
* extended driver flags indication for separate 802.1X and PSK
  4-way handshake offload capability
* added support for random P2P Device/Interface Address use
* extended PEAP to derive EMSK to enable use with ERP/FILS
* extended WPS to allow SAE configuration to be added automatically
  for PSK (wps_cred_add_sae=1)
* removed support for the old D-Bus interface (CONFIG_CTRL_IFACE_DBUS)
* extended domain_match and domain_suffix_match to allow list of values
* added a RSN workaround for misbehaving PMF APs that advertise
  IGTK/BIP KeyID using incorrect byte order
* fixed PTK rekeying with FILS and FT
* fixed WPA packet number reuse with replayed messages and key
  reinstallation
  [https://w1.fi/security/2017-1/] (CVE-2017-13077, CVE-2017-13078,
  CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082,
  CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)
* fixed unauthenticated EAPOL-Key decryption in wpa_supplicant
  [https://w1.fi/security/2018-1/] (CVE-2018-14526)
* added support for FILS (IEEE 802.11ai) shared key authentication
* added support for OWE (Opportunistic Wireless Encryption, RFC 8110;
  and transition mode defined by WFA)
* added support for DPP (Wi-Fi Device Provisioning Protocol)
* added support for RSA 3k key case with Suite B 192-bit level
* fixed Suite B PMKSA caching not to update PMKID during each 4-way
  handshake
* fixed EAP-pwd pre-processing with PasswordHashHash
* added EAP-pwd client support for salted passwords
* fixed a regression in TDLS prohibited bit validation
* started to use estimated throughput to avoid undesired signal
  strength based roaming decision
* MACsec/MKA:
  - new macsec_linux driver interface support for the Linux
    kernel macsec module
  - number of fixes and extensions
* added support for external persistent storage of PMKSA cache
  (PMKSA_GET/PMKSA_ADD control interface commands; and
   MESH_PMKSA_GET/MESH_PMKSA_SET for the mesh case)
* fixed mesh channel configuration pri/sec switch case
* added support for beacon report
* large number of other fixes, cleanup, and extensions
* added support for randomizing local address for GAS queries
  (gas_rand_mac_addr parameter)
* fixed EAP-SIM/AKA/AKA' ext auth cases within TLS tunnel
* added option for using random WPS UUID (auto_uuid=1)
* added SHA256-hash support for OCSP certificate matching
* fixed EAP-AKA' to add AT_KDF into Synchronization-Failure
* fixed a regression in RSN pre-authentication candidate selection
* added option to configure allowed group management cipher suites
  (group_mgmt network profile parameter)
* removed all PeerKey functionality
* fixed nl80211 AP and mesh mode configuration regression with
  Linux 4.15 and newer
* added ap_isolate configuration option for AP mode
* added support for nl80211 to offload 4-way handshake into the driver
* added support for using wolfSSL cryptographic library
* SAE
  - added support for configuring SAE password separately of the
    WPA2 PSK/passphrase
  - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection
    for SAE;
    note: this is not backwards compatible, i.e., both the AP and
    station side implementations will need to be update at the same
    time to maintain interoperability
  - added support for Password Identifier
  - fixed FT-SAE PMKID matching
* Hotspot 2.0
  - added support for fetching of Operator Icon Metadata ANQP-element
  - added support for Roaming Consortium Selection element
  - added support for Terms and Conditions
  - added support for OSEN connection in a shared RSN BSS
  - added support for fetching Venue URL information
* added support for using OpenSSL 1.1.1
* FT
  - disabled PMKSA caching with FT since it is not fully functional
  - added support for SHA384 based AKM
  - added support for BIP ciphers BIP-CMAC-256, BIP-GMAC-128,
    BIP-GMAC-256 in addition to previously supported BIP-CMAC-128
  - fixed additional IE inclusion in Reassociation Request frame when
    using FT protocol

- CVE-2015-8041: Using O_WRONLY flag [http://w1.fi/security/2015-5/]		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-26"/>
	<updated date="2022-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131644">SUSE bug 1131644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131868">SUSE bug 1131868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131870">SUSE bug 1131870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131871">SUSE bug 1131871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131872">SUSE bug 1131872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131874">SUSE bug 1131874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133640">SUSE bug 1133640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144443">SUSE bug 1144443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156920">SUSE bug 1156920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165266">SUSE bug 1165266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166933">SUSE bug 1166933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167331">SUSE bug 1167331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182805">SUSE bug 1182805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194732">SUSE bug 1194732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194733">SUSE bug 1194733</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8041/">CVE-2015-8041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8041">CVE-2015-8041 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13077/">CVE-2017-13077 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13077">CVE-2017-13077 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13078">CVE-2017-13078 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13079">CVE-2017-13079 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13081">CVE-2017-13081 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13082/">CVE-2017-13082 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13082">CVE-2017-13082 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13086/">CVE-2017-13086 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13086">CVE-2017-13086 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13087">CVE-2017-13087 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13088">CVE-2017-13088 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14526">CVE-2018-14526 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11555/">CVE-2019-11555 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11555">CVE-2019-11555 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13377/">CVE-2019-13377 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13377">CVE-2019-13377 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9494/">CVE-2019-9494 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9494">CVE-2019-9494 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9495/">CVE-2019-9495 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9495">CVE-2019-9495 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9497/">CVE-2019-9497 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9497">CVE-2019-9497 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9498/">CVE-2019-9498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9498">CVE-2019-9498 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9499/">CVE-2019-9499 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9499">CVE-2019-9499 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23303/">CVE-2022-23303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23303">CVE-2022-23303 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23304/">CVE-2022-23304 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23304">CVE-2022-23304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696582" comment="wpa_supplicant-2.9-15.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151725" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1199475" ref_url="https://bugzilla.suse.com/1199475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<description>
This update for postgresql14 fixes the following issues:
 
- CVE-2022-1552: Confine additional operations within 'security restricted operation' sandboxes (bsc#1199475).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-27"/>
	<updated date="2022-05-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199475">SUSE bug 1199475</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696583" comment="libecpg6-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696584" comment="libpq5-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696084" comment="libpq5-32bit-14.3-3.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151726" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1198351" ref_url="https://bugzilla.suse.com/1198351" source="BUGZILLA"/>
		<reference ref_id="1199350" ref_url="https://bugzilla.suse.com/1199350" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1270" ref_url="https://www.suse.com/security/cve/CVE-2022-1270/" source="CVE"/>
		<reference ref_id="CVE-2022-28463" ref_url="https://www.suse.com/security/cve/CVE-2022-28463/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2022-1270: Fixed a memory corruption issue when parsing MIFF files (bsc#1198351).
- CVE-2022-28463: Fixed buffer overflow in coders/cin.c (bsc#1199350).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198351">SUSE bug 1198351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199350">SUSE bug 1199350</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-1270/">CVE-2022-1270 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1270">CVE-2022-1270 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28463/">CVE-2022-28463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28463">CVE-2022-28463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696585" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696586" comment="ImageMagick-config-6-upstream-6.8.8.1-71.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696587" comment="libMagickCore-6_Q16-1-6.8.8.1-71.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696588" comment="libMagickWand-6_Q16-1-6.8.8.1-71.172.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151727" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1191959" ref_url="https://bugzilla.suse.com/1191959" source="BUGZILLA"/>
		<reference ref_id="1192735" ref_url="https://bugzilla.suse.com/1192735" source="BUGZILLA"/>
		<reference ref_id="1192741" ref_url="https://bugzilla.suse.com/1192741" source="BUGZILLA"/>
		<reference ref_id="1193316" ref_url="https://bugzilla.suse.com/1193316" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42096" ref_url="https://www.suse.com/security/cve/CVE-2021-42096/" source="CVE"/>
		<reference ref_id="CVE-2021-43331" ref_url="https://www.suse.com/security/cve/CVE-2021-43331/" source="CVE"/>
		<reference ref_id="CVE-2021-43332" ref_url="https://www.suse.com/security/cve/CVE-2021-43332/" source="CVE"/>
		<reference ref_id="CVE-2021-44227" ref_url="https://www.suse.com/security/cve/CVE-2021-44227/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2021-44227: Preventing list moderator or list member accessing the admin UI (bsc#1193316).
- CVE-2021-43332: Preventing list moderator from cracking the list admin password encrypted in a CSRF token (bsc#1192741).
- CVE-2021-43331: Fixed XSS in Cgi/options.py (bsc#1192735).
- CVE-2021-42096: Add protection against remote privilege escalation via csrf_token derived from admin password (bsc#1191959).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191959">SUSE bug 1191959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192735">SUSE bug 1192735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192741">SUSE bug 1192741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193316">SUSE bug 1193316</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-42096/">CVE-2021-42096 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42096">CVE-2021-42096 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43331/">CVE-2021-43331 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43331">CVE-2021-43331 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43332/">CVE-2021-43332 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43332">CVE-2021-43332 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-44227/">CVE-2021-44227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44227">CVE-2021-44227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696356" comment="mailman-2.1.17-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151728" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194568" ref_url="https://bugzilla.suse.com/1194568" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4034" ref_url="https://www.suse.com/security/cve/CVE-2021-4034/" source="CVE"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-4034: Fixed a local privilege escalation in pkexec (bsc#1194568).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194568">SUSE bug 1194568</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4034/">CVE-2021-4034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4034">CVE-2021-4034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664701" comment="libpolkit0-0.113-5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664702" comment="polkit-0.113-5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664703" comment="typelib-1_0-Polkit-1_0-0.113-5.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151729" version="1" class="patch">
	<metadata>
		<title>Security update for librelp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1086730" ref_url="https://bugzilla.suse.com/1086730" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000140" ref_url="https://www.suse.com/security/cve/CVE-2018-1000140/" source="CVE"/>
		<description>
This update for librelp fixes the following issues:

- CVE-2018-1000140: Fixed remote attack via specially crafted x509 certificates when connecting to rsyslog to trigger a stack buffer overflow and run arbitrary code (bsc#1086730).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086730">SUSE bug 1086730</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000140/">CVE-2018-1000140 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000140">CVE-2018-1000140 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696589" comment="librelp0-1.2.15-3.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151730" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1200027" ref_url="https://bugzilla.suse.com/1200027" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31736" ref_url="https://www.suse.com/security/cve/CVE-2022-31736/" source="CVE"/>
		<reference ref_id="CVE-2022-31737" ref_url="https://www.suse.com/security/cve/CVE-2022-31737/" source="CVE"/>
		<reference ref_id="CVE-2022-31738" ref_url="https://www.suse.com/security/cve/CVE-2022-31738/" source="CVE"/>
		<reference ref_id="CVE-2022-31739" ref_url="https://www.suse.com/security/cve/CVE-2022-31739/" source="CVE"/>
		<reference ref_id="CVE-2022-31740" ref_url="https://www.suse.com/security/cve/CVE-2022-31740/" source="CVE"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="CVE-2022-31742" ref_url="https://www.suse.com/security/cve/CVE-2022-31742/" source="CVE"/>
		<reference ref_id="CVE-2022-31747" ref_url="https://www.suse.com/security/cve/CVE-2022-31747/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.10.0 ESR (MFSA 2022-21)(bsc#1200027)

- CVE-2022-31736: Cross-Origin resource's length leaked
- CVE-2022-31737: Heap buffer overflow in WebGL
- CVE-2022-31738: Browser window spoof using fullscreen mode
- CVE-2022-31739: Attacker-influenced path traversal when saving downloaded files
- CVE-2022-31740: Register allocation problem in WASM on arm64
- CVE-2022-31741: Uninitialized variable leads to invalid memory read
- CVE-2022-31742: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information
- CVE-2022-31747: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-02"/>
	<updated date="2022-06-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31736/">CVE-2022-31736 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31736">CVE-2022-31736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31737/">CVE-2022-31737 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31737">CVE-2022-31737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31738/">CVE-2022-31738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31738">CVE-2022-31738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31739/">CVE-2022-31739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31739">CVE-2022-31739 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31740/">CVE-2022-31740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31740">CVE-2022-31740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31742/">CVE-2022-31742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31742">CVE-2022-31742 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31747/">CVE-2022-31747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31747">CVE-2022-31747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696590" comment="MozillaFirefox-91.10.0-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696591" comment="MozillaFirefox-devel-91.10.0-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696592" comment="MozillaFirefox-translations-common-91.10.0-112.114.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151731" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1197597" ref_url="https://bugzilla.suse.com/1197597" source="BUGZILLA"/>
		<reference ref_id="1199602" ref_url="https://bugzilla.suse.com/1199602" source="BUGZILLA"/>
		<reference ref_id="1199834" ref_url="https://bugzilla.suse.com/1199834" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes several issues.

The following security issues were fixed:

- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock (bsc#1197597).
- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199602).
- Add missing module_mutex lock to module notifier for previous live patches (bsc#1199834).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-07"/>
	<updated date="2022-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197597">SUSE bug 1197597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199602">SUSE bug 1199602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199834">SUSE bug 1199834</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009696593" comment="kgraft-patch-4_4_180-94_147-default-13-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151732" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1197597" ref_url="https://bugzilla.suse.com/1197597" source="BUGZILLA"/>
		<reference ref_id="1199602" ref_url="https://bugzilla.suse.com/1199602" source="BUGZILLA"/>
		<reference ref_id="1199834" ref_url="https://bugzilla.suse.com/1199834" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_150 fixes several issues.

The following security issues were fixed:

- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock (bsc#1197597).
- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199602).
- Add missing module_mutex lock to module notifier for previous live patches (bsc#1199834).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-07"/>
	<updated date="2022-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197597">SUSE bug 1197597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199602">SUSE bug 1199602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199834">SUSE bug 1199834</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721291" comment="kernel-default 4.4.180-94.150 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719630" comment="kgraft-patch-4_4_180-94_150-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009696594" comment="kgraft-patch-4_4_180-94_150-default-9-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151733" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 42 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1197597" ref_url="https://bugzilla.suse.com/1197597" source="BUGZILLA"/>
		<reference ref_id="1199602" ref_url="https://bugzilla.suse.com/1199602" source="BUGZILLA"/>
		<reference ref_id="1199834" ref_url="https://bugzilla.suse.com/1199834" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_153 fixes several issues.

The following security issues were fixed:

- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock (bsc#1197597).
- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199602).
- Add missing module_mutex lock to module notifier for previous live patches (bsc#1199834).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-07"/>
	<updated date="2022-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197597">SUSE bug 1197597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199602">SUSE bug 1199602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199834">SUSE bug 1199834</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721293" comment="kernel-default 4.4.180-94.153 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719634" comment="kgraft-patch-4_4_180-94_153-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009696595" comment="kgraft-patch-4_4_180-94_153-default-5-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151734" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 43 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1197597" ref_url="https://bugzilla.suse.com/1197597" source="BUGZILLA"/>
		<reference ref_id="1199602" ref_url="https://bugzilla.suse.com/1199602" source="BUGZILLA"/>
		<reference ref_id="1199834" ref_url="https://bugzilla.suse.com/1199834" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_156 fixes several issues.

The following security issues were fixed:

- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock (bsc#1197597).
- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199602).
- Add missing module_mutex lock to module notifier for previous live patches (bsc#1199834).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-07"/>
	<updated date="2022-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197597">SUSE bug 1197597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199602">SUSE bug 1199602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199834">SUSE bug 1199834</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721292" comment="kernel-default 4.4.180-94.156 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719632" comment="kgraft-patch-4_4_180-94_156-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009696596" comment="kgraft-patch-4_4_180-94_156-default-4-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151735" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 44 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1199602" ref_url="https://bugzilla.suse.com/1199602" source="BUGZILLA"/>
		<reference ref_id="1199834" ref_url="https://bugzilla.suse.com/1199834" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_161 fixes several issues.

The following security issue was fixed:

- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199602).
- Add missing module_mutex lock to module notifier for previous live patches (bsc#1199834).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-07"/>
	<updated date="2022-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199602">SUSE bug 1199602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199834">SUSE bug 1199834</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721294" comment="kernel-default 4.4.180-94.161 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719636" comment="kgraft-patch-4_4_180-94_161-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009696597" comment="kgraft-patch-4_4_180-94_161-default-3-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151736" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194471" ref_url="https://bugzilla.suse.com/1194471" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194471">SUSE bug 1194471</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45079">CVE-2021-45079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664941" comment="strongswan-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664929" comment="strongswan-doc-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664942" comment="strongswan-hmac-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664943" comment="strongswan-ipsec-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664944" comment="strongswan-libs0-5.1.3-26.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151737" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1200027" ref_url="https://bugzilla.suse.com/1200027" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.4 (bsc#1200027)

* CVE-2022-31741: Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple.  (bmo#1767590)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-09"/>
	<updated date="2022-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696598" comment="libfreebl3-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696100" comment="libfreebl3-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696599" comment="libfreebl3-hmac-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696102" comment="libfreebl3-hmac-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696600" comment="libsoftokn3-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696104" comment="libsoftokn3-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696601" comment="libsoftokn3-hmac-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696106" comment="libsoftokn3-hmac-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696602" comment="mozilla-nss-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696108" comment="mozilla-nss-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696603" comment="mozilla-nss-certs-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696110" comment="mozilla-nss-certs-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696604" comment="mozilla-nss-devel-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696605" comment="mozilla-nss-sysinit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696113" comment="mozilla-nss-sysinit-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696606" comment="mozilla-nss-tools-3.68.4-58.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151738" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1191184" ref_url="https://bugzilla.suse.com/1191184" source="BUGZILLA"/>
		<reference ref_id="1191185" ref_url="https://bugzilla.suse.com/1191185" source="BUGZILLA"/>
		<reference ref_id="1191186" ref_url="https://bugzilla.suse.com/1191186" source="BUGZILLA"/>
		<reference ref_id="1193282" ref_url="https://bugzilla.suse.com/1193282" source="BUGZILLA"/>
		<reference ref_id="1197948" ref_url="https://bugzilla.suse.com/1197948" source="BUGZILLA"/>
		<reference ref_id="1198460" ref_url="https://bugzilla.suse.com/1198460" source="BUGZILLA"/>
		<reference ref_id="1198493" ref_url="https://bugzilla.suse.com/1198493" source="BUGZILLA"/>
		<reference ref_id="1198496" ref_url="https://bugzilla.suse.com/1198496" source="BUGZILLA"/>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3695" ref_url="https://www.suse.com/security/cve/CVE-2021-3695/" source="CVE"/>
		<reference ref_id="CVE-2021-3696" ref_url="https://www.suse.com/security/cve/CVE-2021-3696/" source="CVE"/>
		<reference ref_id="CVE-2021-3697" ref_url="https://www.suse.com/security/cve/CVE-2021-3697/" source="CVE"/>
		<reference ref_id="CVE-2022-28733" ref_url="https://www.suse.com/security/cve/CVE-2022-28733/" source="CVE"/>
		<reference ref_id="CVE-2022-28734" ref_url="https://www.suse.com/security/cve/CVE-2022-28734/" source="CVE"/>
		<reference ref_id="CVE-2022-28736" ref_url="https://www.suse.com/security/cve/CVE-2022-28736/" source="CVE"/>
		<description>
This update for grub2 fixes the following issues:

Security fixes and hardenings for boothole 3 / boothole 2022 (bsc#1198581)

- CVE-2021-3695: Fixed that a crafted PNG grayscale image could lead to out-of-bounds write in heap (bsc#1191184)
- CVE-2021-3696: Fixed that a crafted PNG image could lead to out-of-bound write during huffman table handling (bsc#1191185)
- CVE-2021-3697: Fixed that a crafted JPEG image could lead to buffer underflow write in the heap (bsc#1191186)
- CVE-2022-28733: Fixed fragmentation math in net/ip (bsc#1198460)
- CVE-2022-28734: Fixed an out-of-bound write for split http headers (bsc#1198493)
- CVE-2022-28736: Fixed a use-after-free in chainloader command (bsc#1198496)
- Update SBAT security contact (bsc#1193282)
- Bump grub's SBAT generation to 2

- Use boot disks in OpenFirmware, fixing regression caused when the root LV is completely in the boot LUN (bsc#1197948)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-10"/>
	<updated date="2022-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191184">SUSE bug 1191184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191185">SUSE bug 1191185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191186">SUSE bug 1191186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193282">SUSE bug 1193282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197948">SUSE bug 1197948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198460">SUSE bug 1198460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198493">SUSE bug 1198493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198496">SUSE bug 1198496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3695/">CVE-2021-3695 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3695">CVE-2021-3695 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3696/">CVE-2021-3696 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3696">CVE-2021-3696 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3697/">CVE-2021-3697 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3697">CVE-2021-3697 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28733/">CVE-2022-28733 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28733">CVE-2022-28733 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-28734/">CVE-2022-28734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28734">CVE-2022-28734 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28736/">CVE-2022-28736 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28736">CVE-2022-28736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696607" comment="grub2-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696470" comment="grub2-arm64-efi-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696116" comment="grub2-i386-pc-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696118" comment="grub2-snapper-plugin-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696119" comment="grub2-systemd-sleep-plugin-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696120" comment="grub2-x86_64-efi-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696121" comment="grub2-x86_64-xen-2.02-137.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151739" version="1" class="patch">
	<metadata>
		<title>Security update for u-boot (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1200363" ref_url="https://bugzilla.suse.com/1200363" source="BUGZILLA"/>
		<reference ref_id="1200364" ref_url="https://bugzilla.suse.com/1200364" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-30552" ref_url="https://www.suse.com/security/cve/CVE-2022-30552/" source="CVE"/>
		<reference ref_id="CVE-2022-30790" ref_url="https://www.suse.com/security/cve/CVE-2022-30790/" source="CVE"/>
		<description>
This update for u-boot fixes the following issues:

- A large buffer overflow could have lead to a denial of service in the IP Packet deframentation code. 
(CVE-2022-30552, bsc#1200363)
- A Hole Descriptor Overwrite could have lead to an arbitrary out of bounds write primitive. 
(CVE-2022-30790, bsc#1200364)

  		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-13"/>
	<updated date="2022-06-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200363">SUSE bug 1200363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200364">SUSE bug 1200364</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-30552/">CVE-2022-30552 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30552">CVE-2022-30552 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30790/">CVE-2022-30790 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30790">CVE-2022-30790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696472" comment="u-boot-rpi3-2016.07-12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696473" comment="u-boot-tools-2016.07-12.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151740" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1051510" ref_url="https://bugzilla.suse.com/1051510" source="BUGZILLA"/>
		<reference ref_id="1055710" ref_url="https://bugzilla.suse.com/1055710" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1084513" ref_url="https://bugzilla.suse.com/1084513" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1126703" ref_url="https://bugzilla.suse.com/1126703" source="BUGZILLA"/>
		<reference ref_id="1158266" ref_url="https://bugzilla.suse.com/1158266" source="BUGZILLA"/>
		<reference ref_id="1173265" ref_url="https://bugzilla.suse.com/1173265" source="BUGZILLA"/>
		<reference ref_id="1182171" ref_url="https://bugzilla.suse.com/1182171" source="BUGZILLA"/>
		<reference ref_id="1183646" ref_url="https://bugzilla.suse.com/1183646" source="BUGZILLA"/>
		<reference ref_id="1183723" ref_url="https://bugzilla.suse.com/1183723" source="BUGZILLA"/>
		<reference ref_id="1187055" ref_url="https://bugzilla.suse.com/1187055" source="BUGZILLA"/>
		<reference ref_id="1191647" ref_url="https://bugzilla.suse.com/1191647" source="BUGZILLA"/>
		<reference ref_id="1195651" ref_url="https://bugzilla.suse.com/1195651" source="BUGZILLA"/>
		<reference ref_id="1196426" ref_url="https://bugzilla.suse.com/1196426" source="BUGZILLA"/>
		<reference ref_id="1197343" ref_url="https://bugzilla.suse.com/1197343" source="BUGZILLA"/>
		<reference ref_id="1198031" ref_url="https://bugzilla.suse.com/1198031" source="BUGZILLA"/>
		<reference ref_id="1198032" ref_url="https://bugzilla.suse.com/1198032" source="BUGZILLA"/>
		<reference ref_id="1198516" ref_url="https://bugzilla.suse.com/1198516" source="BUGZILLA"/>
		<reference ref_id="1198577" ref_url="https://bugzilla.suse.com/1198577" source="BUGZILLA"/>
		<reference ref_id="1198660" ref_url="https://bugzilla.suse.com/1198660" source="BUGZILLA"/>
		<reference ref_id="1198687" ref_url="https://bugzilla.suse.com/1198687" source="BUGZILLA"/>
		<reference ref_id="1198742" ref_url="https://bugzilla.suse.com/1198742" source="BUGZILLA"/>
		<reference ref_id="1198962" ref_url="https://bugzilla.suse.com/1198962" source="BUGZILLA"/>
		<reference ref_id="1198997" ref_url="https://bugzilla.suse.com/1198997" source="BUGZILLA"/>
		<reference ref_id="1199012" ref_url="https://bugzilla.suse.com/1199012" source="BUGZILLA"/>
		<reference ref_id="1199063" ref_url="https://bugzilla.suse.com/1199063" source="BUGZILLA"/>
		<reference ref_id="1199314" ref_url="https://bugzilla.suse.com/1199314" source="BUGZILLA"/>
		<reference ref_id="1199426" ref_url="https://bugzilla.suse.com/1199426" source="BUGZILLA"/>
		<reference ref_id="1199505" ref_url="https://bugzilla.suse.com/1199505" source="BUGZILLA"/>
		<reference ref_id="1199507" ref_url="https://bugzilla.suse.com/1199507" source="BUGZILLA"/>
		<reference ref_id="1199605" ref_url="https://bugzilla.suse.com/1199605" source="BUGZILLA"/>
		<reference ref_id="1199650" ref_url="https://bugzilla.suse.com/1199650" source="BUGZILLA"/>
		<reference ref_id="1199785" ref_url="https://bugzilla.suse.com/1199785" source="BUGZILLA"/>
		<reference ref_id="1200143" ref_url="https://bugzilla.suse.com/1200143" source="BUGZILLA"/>
		<reference ref_id="1200144" ref_url="https://bugzilla.suse.com/1200144" source="BUGZILLA"/>
		<reference ref_id="1200249" ref_url="https://bugzilla.suse.com/1200249" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13695" ref_url="https://www.suse.com/security/cve/CVE-2017-13695/" source="CVE"/>
		<reference ref_id="CVE-2018-20784" ref_url="https://www.suse.com/security/cve/CVE-2018-20784/" source="CVE"/>
		<reference ref_id="CVE-2018-7755" ref_url="https://www.suse.com/security/cve/CVE-2018-7755/" source="CVE"/>
		<reference ref_id="CVE-2019-19377" ref_url="https://www.suse.com/security/cve/CVE-2019-19377/" source="CVE"/>
		<reference ref_id="CVE-2020-10769" ref_url="https://www.suse.com/security/cve/CVE-2020-10769/" source="CVE"/>
		<reference ref_id="CVE-2021-20292" ref_url="https://www.suse.com/security/cve/CVE-2021-20292/" source="CVE"/>
		<reference ref_id="CVE-2021-20321" ref_url="https://www.suse.com/security/cve/CVE-2021-20321/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-33061" ref_url="https://www.suse.com/security/cve/CVE-2021-33061/" source="CVE"/>
		<reference ref_id="CVE-2021-38208" ref_url="https://www.suse.com/security/cve/CVE-2021-38208/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1184" ref_url="https://www.suse.com/security/cve/CVE-2022-1184/" source="CVE"/>
		<reference ref_id="CVE-2022-1353" ref_url="https://www.suse.com/security/cve/CVE-2022-1353/" source="CVE"/>
		<reference ref_id="CVE-2022-1419" ref_url="https://www.suse.com/security/cve/CVE-2022-1419/" source="CVE"/>
		<reference ref_id="CVE-2022-1516" ref_url="https://www.suse.com/security/cve/CVE-2022-1516/" source="CVE"/>
		<reference ref_id="CVE-2022-1652" ref_url="https://www.suse.com/security/cve/CVE-2022-1652/" source="CVE"/>
		<reference ref_id="CVE-2022-1729" ref_url="https://www.suse.com/security/cve/CVE-2022-1729/" source="CVE"/>
		<reference ref_id="CVE-2022-1734" ref_url="https://www.suse.com/security/cve/CVE-2022-1734/" source="CVE"/>
		<reference ref_id="CVE-2022-1974" ref_url="https://www.suse.com/security/cve/CVE-2022-1974/" source="CVE"/>
		<reference ref_id="CVE-2022-1975" ref_url="https://www.suse.com/security/cve/CVE-2022-1975/" source="CVE"/>
		<reference ref_id="CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123/" source="CVE"/>
		<reference ref_id="CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125/" source="CVE"/>
		<reference ref_id="CVE-2022-21127" ref_url="https://www.suse.com/security/cve/CVE-2022-21127/" source="CVE"/>
		<reference ref_id="CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166/" source="CVE"/>
		<reference ref_id="CVE-2022-21180" ref_url="https://www.suse.com/security/cve/CVE-2022-21180/" source="CVE"/>
		<reference ref_id="CVE-2022-21499" ref_url="https://www.suse.com/security/cve/CVE-2022-21499/" source="CVE"/>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to 3.12.31 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-1975: Fixed a bug that allows an attacker to crash the linux kernel by simulating nfc device from user-space. (bsc#1200143)
- CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144)
- CVE-2019-19377: Fixed an user-after-free that could be triggered when an attacker mounts a crafted btrfs filesystem image. (bnc#1158266)
- CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).
- CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)
- CVE-2022-21499: Reinforce the kernel lockdown feature, until now it's been trivial to break out of it with kgdb or kdb. (bsc#1199426)
- CVE-2017-13695: Fixed a bug that caused a stack dump allowing local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted ACPI table. (bnc#1055710)
- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).
- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)
- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).
- CVE-2021-28688: Fixed XSA-365 that includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains (bnc#1183646).
- CVE-2020-10769: Fixed a buffer over-read flaw in the IPsec Cryptographic algorithm's module. This flaw allowed a local attacker with user privileges to cause a denial of service. (bnc#1173265)
- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).
- CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012).
- CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc#1191647).
- CVE-2018-7755: Fixed an issue in the fd_locked_ioctl function in drivers/block/floppy.c. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR (bnc#1084513).
- CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742).
- CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055).
- CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c. (bnc#1198516)
- CVE-2018-20784: Fixed a denial of service (infinite loop in update_blocked_averages) by mishandled leaf cfs_rq in kernel/sched/fair.c (bnc#1126703).
- CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc#1183723).
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel (bnc#1198032).
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bnc#1197343)

The following non-security bugs were fixed:

- btrfs: tree-checker: fix incorrect printk format (bsc#1200249).
- net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651).
- net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651).
- PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314).
- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900 bsc#1198660 ltc#197803).
- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729 bsc#1198660 ltc#197803).
- vmbus: do not return values for uninitalized channels (bsc#1051510 bsc#1198997).
- vt: vt_ioctl: fix race in VT_RESIZEX (bsc#1199785).
- x86/hyperv: Read TSC frequency from a synthetic MSR (bsc#1198962).
- x86/speculation: Fix redundant MDS mitigation message (bsc#1199650).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-14"/>
	<updated date="2022-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051510">SUSE bug 1051510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055710">SUSE bug 1055710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084513">SUSE bug 1084513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126703">SUSE bug 1126703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158266">SUSE bug 1158266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173265">SUSE bug 1173265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182171">SUSE bug 1182171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183646">SUSE bug 1183646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183723">SUSE bug 1183723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187055">SUSE bug 1187055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191647">SUSE bug 1191647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195651">SUSE bug 1195651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196426">SUSE bug 1196426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197343">SUSE bug 1197343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198031">SUSE bug 1198031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198032">SUSE bug 1198032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198516">SUSE bug 1198516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198577">SUSE bug 1198577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198660">SUSE bug 1198660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198687">SUSE bug 1198687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198742">SUSE bug 1198742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198962">SUSE bug 1198962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198997">SUSE bug 1198997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199012">SUSE bug 1199012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199063">SUSE bug 1199063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199314">SUSE bug 1199314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199426">SUSE bug 1199426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199505">SUSE bug 1199505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199507">SUSE bug 1199507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199605">SUSE bug 1199605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199650">SUSE bug 1199650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199785">SUSE bug 1199785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200143">SUSE bug 1200143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200144">SUSE bug 1200144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200249">SUSE bug 1200249</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13695/">CVE-2017-13695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13695">CVE-2017-13695 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20784/">CVE-2018-20784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20784">CVE-2018-20784 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7755/">CVE-2018-7755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7755">CVE-2018-7755 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19377/">CVE-2019-19377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19377">CVE-2019-19377 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10769/">CVE-2020-10769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10769">CVE-2020-10769 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20292/">CVE-2021-20292 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20292">CVE-2021-20292 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20321/">CVE-2021-20321 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20321">CVE-2021-20321 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33061/">CVE-2021-33061 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33061">CVE-2021-33061 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38208/">CVE-2021-38208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38208">CVE-2021-38208 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1184/">CVE-2022-1184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1184">CVE-2022-1184 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1353/">CVE-2022-1353 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1353">CVE-2022-1353 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1419/">CVE-2022-1419 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1419">CVE-2022-1419 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1516/">CVE-2022-1516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1516">CVE-2022-1516 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1652/">CVE-2022-1652 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1652">CVE-2022-1652 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1729/">CVE-2022-1729 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1729">CVE-2022-1729 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1734/">CVE-2022-1734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1974/">CVE-2022-1974 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1974">CVE-2022-1974 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1975/">CVE-2022-1975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1975">CVE-2022-1975 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123">CVE-2022-21123 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21125">CVE-2022-21125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21127/">CVE-2022-21127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21127">CVE-2022-21127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166">CVE-2022-21166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21180/">CVE-2022-21180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21180">CVE-2022-21180 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21499/">CVE-2022-21499 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21499">CVE-2022-21499 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28388">CVE-2022-28388 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28390">CVE-2022-28390 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696608" comment="kernel-default-4.4.180-94.164.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696609" comment="kernel-default-base-4.4.180-94.164.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696610" comment="kernel-default-devel-4.4.180-94.164.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696611" comment="kernel-default-kgraft-4.4.180-94.164.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696126" comment="kernel-devel-4.4.180-94.164.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696127" comment="kernel-macros-4.4.180-94.164.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696128" comment="kernel-source-4.4.180-94.164.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696612" comment="kernel-syms-4.4.180-94.164.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696613" comment="kgraft-patch-4_4_180-94_164-default-1-4.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151741" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1199287" ref_url="https://bugzilla.suse.com/1199287" source="BUGZILLA"/>
		<reference ref_id="1200106" ref_url="https://bugzilla.suse.com/1200106" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26700" ref_url="https://www.suse.com/security/cve/CVE-2022-26700/" source="CVE"/>
		<reference ref_id="CVE-2022-26709" ref_url="https://www.suse.com/security/cve/CVE-2022-26709/" source="CVE"/>
		<reference ref_id="CVE-2022-26716" ref_url="https://www.suse.com/security/cve/CVE-2022-26716/" source="CVE"/>
		<reference ref_id="CVE-2022-26717" ref_url="https://www.suse.com/security/cve/CVE-2022-26717/" source="CVE"/>
		<reference ref_id="CVE-2022-26719" ref_url="https://www.suse.com/security/cve/CVE-2022-26719/" source="CVE"/>
		<reference ref_id="CVE-2022-30293" ref_url="https://www.suse.com/security/cve/CVE-2022-30293/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.3 (bsc#1200106)

- CVE-2022-30293: Fixed heap-based buffer overflow in WebCore::TextureMapperLayer::setContentsLayer (bsc#1199287).
- CVE-2022-26700: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26709: Fixed use after free issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26716: Fixed use after free issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26717: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26719: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-15"/>
	<updated date="2022-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199287">SUSE bug 1199287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200106">SUSE bug 1200106</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26700/">CVE-2022-26700 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26700">CVE-2022-26700 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26709/">CVE-2022-26709 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26709">CVE-2022-26709 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26716/">CVE-2022-26716 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26716">CVE-2022-26716 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26717/">CVE-2022-26717 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26717">CVE-2022-26717 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26719/">CVE-2022-26719 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26719">CVE-2022-26719 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30293/">CVE-2022-30293 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30293">CVE-2022-30293 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696614" comment="libjavascriptcoregtk-4_0-18-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696615" comment="libwebkit2gtk-4_0-37-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696133" comment="libwebkit2gtk3-lang-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696616" comment="typelib-1_0-JavaScriptCore-4_0-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696617" comment="typelib-1_0-WebKit2-4_0-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696618" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696619" comment="webkit2gtk-4_0-injected-bundles-2.36.3-2.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151742" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1199166" ref_url="https://bugzilla.suse.com/1199166" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1292" ref_url="https://www.suse.com/security/cve/CVE-2022-1292/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:
	  
- CVE-2022-1292: Fixed command injection in c_rehash (bsc#1199166).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-16"/>
	<updated date="2022-06-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199166">SUSE bug 1199166</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1292/">CVE-2022-1292 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696620" comment="libopenssl-devel-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696621" comment="libopenssl1_0_0-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696140" comment="libopenssl1_0_0-32bit-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696622" comment="libopenssl1_0_0-hmac-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696142" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696623" comment="openssl-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696144" comment="openssl-doc-1.0.2j-60.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151743" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1200338" ref_url="https://bugzilla.suse.com/1200338" source="BUGZILLA"/>
		<reference ref_id="1200340" ref_url="https://bugzilla.suse.com/1200340" source="BUGZILLA"/>
		<reference ref_id="1200341" ref_url="https://bugzilla.suse.com/1200341" source="BUGZILLA"/>
		<reference ref_id="1200345" ref_url="https://bugzilla.suse.com/1200345" source="BUGZILLA"/>
		<reference ref_id="1200348" ref_url="https://bugzilla.suse.com/1200348" source="BUGZILLA"/>
		<reference ref_id="1200350" ref_url="https://bugzilla.suse.com/1200350" source="BUGZILLA"/>
		<reference ref_id="1200352" ref_url="https://bugzilla.suse.com/1200352" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26377" ref_url="https://www.suse.com/security/cve/CVE-2022-26377/" source="CVE"/>
		<reference ref_id="CVE-2022-28614" ref_url="https://www.suse.com/security/cve/CVE-2022-28614/" source="CVE"/>
		<reference ref_id="CVE-2022-28615" ref_url="https://www.suse.com/security/cve/CVE-2022-28615/" source="CVE"/>
		<reference ref_id="CVE-2022-29404" ref_url="https://www.suse.com/security/cve/CVE-2022-29404/" source="CVE"/>
		<reference ref_id="CVE-2022-30522" ref_url="https://www.suse.com/security/cve/CVE-2022-30522/" source="CVE"/>
		<reference ref_id="CVE-2022-30556" ref_url="https://www.suse.com/security/cve/CVE-2022-30556/" source="CVE"/>
		<reference ref_id="CVE-2022-31813" ref_url="https://www.suse.com/security/cve/CVE-2022-31813/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-26377: Fixed possible request smuggling in mod_proxy_ajp (bsc#1200338)
- CVE-2022-28614: Fixed read beyond bounds via ap_rwrite() (bsc#1200340)
- CVE-2022-28615: Fixed read beyond bounds in ap_strcmp_match() (bsc#1200341)
- CVE-2022-29404: Fixed denial of service in mod_lua r:parsebody (bsc#1200345)
- CVE-2022-30556: Fixed information disclosure in mod_lua with websockets (bsc#1200350)
- CVE-2022-30522: Fixed mod_sed denial of service (bsc#1200352)
- CVE-2022-31813: Fixed mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism (bsc#1200348)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-16"/>
	<updated date="2022-06-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200338">SUSE bug 1200338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200340">SUSE bug 1200340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200341">SUSE bug 1200341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200345">SUSE bug 1200345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200348">SUSE bug 1200348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200350">SUSE bug 1200350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200352">SUSE bug 1200352</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-26377/">CVE-2022-26377 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26377">CVE-2022-26377 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28614/">CVE-2022-28614 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28614">CVE-2022-28614 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28615/">CVE-2022-28615 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28615">CVE-2022-28615 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29404/">CVE-2022-29404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29404">CVE-2022-29404 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30522/">CVE-2022-30522 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30522">CVE-2022-30522 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30556/">CVE-2022-30556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30556">CVE-2022-30556 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-31813/">CVE-2022-31813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31813">CVE-2022-31813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696624" comment="apache2-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696146" comment="apache2-doc-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696625" comment="apache2-example-pages-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696626" comment="apache2-prefork-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696627" comment="apache2-utils-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696628" comment="apache2-worker-2.4.23-29.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151744" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2022-23307: Fix deserialization issue by removing the chainsaw sub-package. (bsc#1194844)
- CVE-2022-23305: Fix SQL injection by removing src/main/java/org/apache/log4j/jdbc/JDBCAppender.java. (bsc#1194843)
- CVE-2022-23302: Fix remote code execution by removing src/main/java/org/apache/log4j/net/JMSSink.java. (bsc#1194842)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-27"/>
	<updated date="2022-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23302">CVE-2022-23302 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23305">CVE-2022-23305 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23307">CVE-2022-23307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664687" comment="log4j-1.2.15-126.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151745" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1181223" ref_url="https://bugzilla.suse.com/1181223" source="BUGZILLA"/>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1190462" ref_url="https://bugzilla.suse.com/1190462" source="BUGZILLA"/>
		<reference ref_id="1190535" ref_url="https://bugzilla.suse.com/1190535" source="BUGZILLA"/>
		<reference ref_id="1193600" ref_url="https://bugzilla.suse.com/1193600" source="BUGZILLA"/>
		<reference ref_id="1194873" ref_url="https://bugzilla.suse.com/1194873" source="BUGZILLA"/>
		<reference ref_id="1195726" ref_url="https://bugzilla.suse.com/1195726" source="BUGZILLA"/>
		<reference ref_id="1195727" ref_url="https://bugzilla.suse.com/1195727" source="BUGZILLA"/>
		<reference ref_id="1195728" ref_url="https://bugzilla.suse.com/1195728" source="BUGZILLA"/>
		<reference ref_id="1196338" ref_url="https://bugzilla.suse.com/1196338" source="BUGZILLA"/>
		<reference ref_id="1196704" ref_url="https://bugzilla.suse.com/1196704" source="BUGZILLA"/>
		<reference ref_id="1197507" ref_url="https://bugzilla.suse.com/1197507" source="BUGZILLA"/>
		<reference ref_id="1197689" ref_url="https://bugzilla.suse.com/1197689" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36222" ref_url="https://www.suse.com/security/cve/CVE-2021-36222/" source="CVE"/>
		<reference ref_id="CVE-2021-3711" ref_url="https://www.suse.com/security/cve/CVE-2021-3711/" source="CVE"/>
		<reference ref_id="CVE-2021-39226" ref_url="https://www.suse.com/security/cve/CVE-2021-39226/" source="CVE"/>
		<reference ref_id="CVE-2021-41174" ref_url="https://www.suse.com/security/cve/CVE-2021-41174/" source="CVE"/>
		<reference ref_id="CVE-2021-41244" ref_url="https://www.suse.com/security/cve/CVE-2021-41244/" source="CVE"/>
		<reference ref_id="CVE-2021-43798" ref_url="https://www.suse.com/security/cve/CVE-2021-43798/" source="CVE"/>
		<reference ref_id="CVE-2021-43813" ref_url="https://www.suse.com/security/cve/CVE-2021-43813/" source="CVE"/>
		<reference ref_id="CVE-2021-43815" ref_url="https://www.suse.com/security/cve/CVE-2021-43815/" source="CVE"/>
		<reference ref_id="CVE-2022-21673" ref_url="https://www.suse.com/security/cve/CVE-2022-21673/" source="CVE"/>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<reference ref_id="CVE-2022-21702" ref_url="https://www.suse.com/security/cve/CVE-2022-21702/" source="CVE"/>
		<reference ref_id="CVE-2022-21703" ref_url="https://www.suse.com/security/cve/CVE-2022-21703/" source="CVE"/>
		<reference ref_id="CVE-2022-21713" ref_url="https://www.suse.com/security/cve/CVE-2022-21713/" source="CVE"/>
		<description>
This update fixes the following issues:

golang-github-QubitProducts-exporter_exporter:

- Adapted to build on Enterprise Linux.
- Fix build for RedHat 7
- Require Go &gt;= 1.14 also for CentOS
- Add support for CentOS
- Replace %{?systemd_requires} with %{?systemd_ordering}

golang-github-prometheus-alertmanager:

- CVE-2022-21698: Denial of service using InstrumentHandlerCounter.
  * Update vendor tarball with prometheus/client_golang 1.11.1  (bsc#1196338, jsc#SLE-24077)
- Update required Go version to 1.16
- Update to version 0.23.0:
  * amtool: Detect version drift and warn users (#2672)
  * Add ability to skip TLS verification for amtool (#2663)
  * Fix empty isEqual in amtool. (#2668)
  * Fix main tests (#2670)
  * cli: add new template render command (#2538)
  * OpsGenie: refer to alert instead of incident (#2609)
  * Docs: target_match and source_match are DEPRECATED (#2665)
  * Fix test not waiting for cluster member to be ready
- Added hardening to systemd service(s) (bsc#1181400)

golang-github-prometheus-node_exporter:

- CVE-2022-21698: Denial of service using InstrumentHandlerCounter.
  * Update vendor tarball with prometheus/client_golang 1.11.1
  (bsc#1196338, jsc#SLE-24238, jsc#SLE-24239)
- Update to 1.3.0
  * [CHANGE] Add path label to rapl collector #2146
  * [CHANGE] Exclude filesystems under /run/credentials #2157
  * [CHANGE] Add TCPTimeouts to netstat default filter #2189
  * [FEATURE] Add lnstat collector for metrics from /proc/net/stat/ #1771
  * [FEATURE] Add darwin powersupply collector #1777
  * [FEATURE] Add support for monitoring GPUs on Linux #1998
  * [FEATURE] Add Darwin thermal collector #2032
  * [FEATURE] Add os release collector #2094
  * [FEATURE] Add netdev.address-info collector #2105
  * [FEATURE] Add clocksource metrics to time collector #2197
  * [ENHANCEMENT] Support glob textfile collector directories #1985
  * [ENHANCEMENT] ethtool: Expose node_ethtool_info metric #2080
  * [ENHANCEMENT] Use include/exclude flags for ethtool filtering #2165
  * [ENHANCEMENT] Add flag to disable guest CPU metrics #2123
  * [ENHANCEMENT] Add DMI collector #2131
  * [ENHANCEMENT] Add threads metrics to processes collector #2164
  * [ENHANCMMENT] Reduce timer GC delays in the Linux filesystem collector #2169
  * [ENHANCMMENT] Add TCPTimeouts to netstat default filter #2189
  * [ENHANCMMENT] Use SysctlTimeval for boottime collector on BSD #2208
  * [BUGFIX] ethtool: Sanitize metric names #2093
  * [BUGFIX] Fix ethtool collector for multiple interfaces #2126
  * [BUGFIX] Fix possible panic on macOS #2133
  * [BUGFIX] Collect flag_info and bug_info only for one core #2156
  * [BUGFIX] Prevent duplicate ethtool metric names #2187
- Update to 1.2.2
  * Bug fixes
     Fix processes collector long int parsing #2112
- Update to 1.2.1
  * Removed
     Remove obsolete capture permission denied error patch that is already included upstream
     Fix zoneinfo parsing prometheus/procfs#386
     Fix nvme collector log noise #2091
     Fix rapl collector log noise #2092
- Update to 1.2.0
  * Changes
     Rename filesystem collector flags to match other collectors #2012
     Make node_exporter print usage to STDOUT #203
  * Features
     Add conntrack statistics metrics #1155
     Add ethtool stats collector #1832
     Add flag to ignore network speed if it is unknown #1989
     Add tapestats collector for Linux #2044
     Add nvme collector #2062
  * Enhancements
     Add ErrorLog plumbing to promhttp #1887
     Add more Infiniband counters #2019
     netclass: retrieve interface names and filter before parsing #2033
     Add time zone offset metric #2060
     Handle errors from disabled PSI subsystem #1983
     Fix panic when using backwards compatible flags #2000
     Fix wrong value for OpenBSD memory buffer cache #2015
     Only initiate collectors once #2048
     Handle small backwards jumps in CPU idle #2067
- Apply patch to capture permission denied error for 'energy_uj' file (bsc#1190535)

grafana:

- Update to version 8.3.5 (jsc#SLE-23439, jsc#SLE-23422)
  + Security:
    * Fixes XSS vulnerability in handling data sources
      (bsc#1195726, CVE-2022-21702)
    * Fixes cross-origin request forgery vulnerability
      (bsc#1195727, CVE-2022-21703)
    * Fixes Insecure Direct Object Reference vulnerability in Teams
      API (bsc#1195728, CVE-2022-21713)
- Update to Go 1.17.
- Add build-time dependency on `wire`.
- Update license to GNU Affero General Public License v3.0.
- Update to version 8.3.4
    * GetUserInfo: return an error if no user was found
      (bsc#1194873, CVE-2022-21673)
  + Features and enhancements:
    * Alerting: Allow configuration of non-ready alertmanagers.
    * Alerting: Allow customization of Google chat message.
    * AppPlugins: Support app plugins with only default nav.
    * InfluxDB: query editor: skip fields in metadata queries.
    * Postgres/MySQL/MSSQL: Cancel in-flight SQL query if user
      cancels query in grafana.
    * Prometheus: Forward oauth tokens after prometheus datasource
      migration.
  + Bug fixes:
    * Azure Monitor: Bug fix for variable interpolations in metrics
      dropdowns.
    * Azure Monitor: Improved error messages for variable queries.
    * CloudMonitoring: Fixes broken variable queries that use group
      bys.
    * Configuration: You can now see your expired API keys if you
      have no active ones.
    * Elasticsearch: Fix handling multiple datalinks for a single
      field.
    * Export: Fix error being thrown when exporting dashboards
      using query variables that reference the default datasource.
    * ImportDashboard: Fixes issue with importing dashboard and
      name ending up in uid.
    * Login: Page no longer overflows on mobile.
    * Plugins: Set backend metadata property for core plugins.
    * Prometheus: Fill missing steps with null values.
    * Prometheus: Fix interpolation of $__rate_interval variable.
    * Prometheus: Interpolate variables with curly brackets syntax.
    * Prometheus: Respect the http-method data source setting.
    * Table: Fixes issue with field config applied to wrong fields
      when hiding columns.
    * Toolkit: Fix bug with rootUrls not being properly parsed when
      signing a private plugin.
    * Variables: Fix so data source variables are added to adhoc
      configuration.
  + Plugin development fixes &amp; changes:
    * Toolkit: Revert build config so tslib is bundled with plugins
      to prevent plugins from crashing.
- Update to version 8.3.3:
    * BarChart: Use new data error view component to show actions
      in panel edit.
    * CloudMonitor: Iterate over pageToken for resources.
    * Macaron: Prevent WriteHeader invalid HTTP status code panic.
    * AnnoListPanel: Fix interpolation of variables in tags.
    * CloudWatch: Allow queries to have no dimensions specified.
    * CloudWatch: Fix broken queries for users migrating from
      8.2.4/8.2.5 to 8.3.0.
    * CloudWatch: Make sure MatchExact flag gets the right value.
    * Dashboards: Fix so that empty folders can be deleted from the
      manage dashboards/folders page.
    * InfluxDB: Improve handling of metadata query errors in
      InfluxQL.
    * Loki: Fix adding of ad hoc filters for queries with parser
      and line_format expressions.
    * Prometheus: Fix running of exemplar queries for non-histogram
      metrics.
    * Prometheus: Interpolate template variables in interval.
    * StateTimeline: Fix toolitp not showing when for frames with
      multiple fields.
    * TraceView: Fix virtualized scrolling when trace view is
      opened in right pane in Explore.
    * Variables: Fix repeating panels for on time range changed
      variables.
    * Variables: Fix so queryparam option works for scoped
- Update to version 8.3.2
  + Security: Fixes CVE-2021-43813 and CVE-2021-43815.
- Update to version 8.3.1
  + Security: Fixes CVE-2021-43798.
- Update to version 8.3.0
    * Alerting: Prevent folders from being deleted when they
      contain alerts.
    * Alerting: Show full preview value in tooltip.
    * BarGauge: Limit title width when name is really long.
    * CloudMonitoring: Avoid to escape regexps in filters.
    * CloudWatch: Add support for AWS Metric Insights.
    * TooltipPlugin: Remove other panels' shared tooltip in edit
      panel.
    * Visualizations: Limit y label width to 40% of visualization
      width.
    * Alerting: Clear alerting rule evaluation errors after
      intermittent failures.
    * Alerting: Fix refresh on legacy Alert List panel.
    * Dashboard: Fix queries for panels with non-integer widths.
    * Explore: Fix url update inconsistency.
    * Prometheus: Fix range variables interpolation for time ranges
      smaller than 1 second.
    * ValueMappings: Fixes issue with regex value mapping that only
      sets color.
- Update to version 8.3.0-beta2
  + Breaking changes:
    * Grafana 8 Alerting enabled by default for installations that
      do not use legacy alerting.
    * Keep Last State for 'If execution error or timeout' when
      upgrading to Grafana 8 alerting.
    * Alerting: Create DatasourceError alert if evaluation returns
      error.
    * Alerting: Make Unified Alerting enabled by default for those
      who do not use legacy alerting.
    * Alerting: Support mute timings configuration through the api
      for the embedded alert manager.
    * CloudWatch: Add missing AWS/Events metrics.
    * Docs: Add easier to find deprecation notices to certain data
      sources and to the changelog.
    * Plugins Catalog: Enable install controls based on the
      pluginAdminEnabled flag.
    * Table: Add space between values for the DefaultCell and
      JSONViewCell.
    * Tracing: Make query editors available in dashboard for Tempo
      and Zipkin.
    * AccessControl: Renamed orgs roles, removed fixed:orgs:reader
      introduced in beta1.
    * Azure Monitor: Add trap focus for modals in grafana/ui and
      other small a11y fixes for Azure Monitor.
    * CodeEditor: Prevent suggestions from being clipped.
    * Dashboard: Fix cache timeout persistence.
    * Datasource: Fix stable sort order of query responses.
    * Explore: Fix error in query history when removing last item.
    * Logs: Fix requesting of older logs when flipped order.
    * Prometheus: Fix running of health check query based on access
      mode.
    * TextPanel: Fix suggestions for existing panels.
    * Tracing: Fix incorrect indentations due to reoccurring
      spanIDs.
    * Tracing: Show start time of trace with milliseconds
      precision.
    * Variables: Make renamed or missing variable section
      expandable.
    * Select: Select menus now properly scroll during keyboard
      navigation.
- Update to version 8.3.0-beta1
    * Alerting: Add UI for contact point testing with custom
      annotations and labels.
    * Alerting: Make alert state indicator in panel header work
      with Grafana 8 alerts.
    * Alerting: Option for Discord notifier to use webhook name.
    * Annotations: Deprecate AnnotationsSrv.
    * Auth: Omit all base64 paddings in JWT tokens for the JWT
      auth.
    * Azure Monitor: Clean up fields when editing Metrics.
    * AzureMonitor: Add new starter dashboards.
    * AzureMonitor: Add starter dashboard for app monitoring with
      Application Insights.
    * Barchart/Time series: Allow x axis label.
    * CLI: Improve error handling for installing plugins.
    * CloudMonitoring: Migrate to use backend plugin SDK contracts.
    * CloudWatch Logs: Add retry strategy for hitting max
      concurrent queries.
    * CloudWatch: Add AWS RoboMaker metrics and dimension.
    * CloudWatch: Add AWS Transfer metrics and dimension.
    * Dashboard: replace datasource name with a reference object.
    * Dashboards: Show logs on time series when hovering.
    * Elasticsearch: Add support for Elasticsearch 8.0 (Beta).
    * Elasticsearch: Add time zone setting to Date Histogram
      aggregation.
    * Elasticsearch: Enable full range log volume histogram.
    * Elasticsearch: Full range logs volume.
    * Explore: Allow changing the graph type.
    * Explore: Show ANSI colors when highlighting matched words in
      the logs panel.
    * Graph(old) panel: Listen to events from Time series panel.
    * Import: Load gcom dashboards from URL.
    * LibraryPanels: Improves export and import of library panels
      between orgs.
    * OAuth: Support PKCE.
    * Panel edit: Overrides now highlight correctly when searching.
    * PanelEdit: Display drag indicators on draggable sections.
    * Plugins: Refactor Plugin Management.
    * Prometheus: Add custom query parameters when creating
      PromLink url.
    * Prometheus: Remove limits on metrics, labels, and values in
      Metrics Browser.
    * StateTimeline: Share cursor with rest of the panels.
    * Tempo: Add error details when json upload fails.
    * Tempo: Add filtering for service graph query.
    * Tempo: Add links to nodes in Service Graph pointing to
      Prometheus metrics.
    * Time series/Bar chart panel: Add ability to sort series via
      legend.
    * TimeSeries: Allow multiple axes for the same unit.
    * TraceView: Allow span links defined on dataFrame.
    * Transformations: Support a rows mode in labels to fields.
    * ValueMappings: Don't apply field config defaults to time
      fields.
    * Variables: Only update panels that are impacted by variable
      change.
    * API: Fix dashboard quota limit for imports.
    * Alerting: Fix rule editor issues with Azure Monitor data
      source.
    * Azure monitor: Make sure alert rule editor is not enabled
      when template variables are being used.
    * CloudMonitoring: Fix annotation queries.
    * CodeEditor: Trigger the latest getSuggestions() passed to
      CodeEditor.
    * Dashboard: Remove the current panel from the list of options
      in the Dashboard datasource.
    * Encryption: Fix decrypting secrets in alerting migration.
    * InfluxDB: Fix corner case where index is too large in ALIAS
    * NavBar: Order App plugins alphabetically.
    * NodeGraph: Fix zooming sensitivity on touchpads.
    * Plugins: Add OAuth pass-through logic to api/ds/query
      endpoint.
    * Snapshots: Fix panel inspector for snapshot data.
    * Tempo: Fix basic auth password reset on adding tag.
    * ValueMapping: Fixes issue with regex mappings.
    * grafana/ui: Enable slider marks display.
- Update to version 8.2.7
- Update to version 8.2.6
    * Security: Upgrade Docker base image to Alpine 3.14.3.
    * Security: Upgrade Go to 1.17.2.
    * TimeSeries: Fix fillBelowTo wrongly affecting fills of
      unrelated series.
- Update to version 8.2.5
    * Fix No Data behaviour in Legacy Alerting.
    * Alerting: Fix a bug where the metric in the evaluation string
      was not correctly populated.
    * Alerting: Fix no data behaviour in Legacy Alerting for alert
      rules using the AND operator.
    * CloudMonitoring: Ignore min and max aggregation in MQL
      queries.
    * Dashboards: 'Copy' is no longer added to new dashboard
      titles.
    * DataProxy: Fix overriding response body when response is a
      WebSocket upgrade.
    * Elasticsearch: Use field configured in query editor as field
      for date_histogram aggregations.
    * Explore: Fix running queries without a datasource property
      set.
    * InfluxDB: Fix numeric aliases in queries.
    * Plugins: Ensure consistent plugin settings list response.
    * Tempo: Fix validation of float durations.
    * Tracing: Correct tags for each span are shown.
- Update to version 8.2.4
  + Security: Fixes CVE-2021-41244.
- Update to version 8.2.3
  + Security: Fixes CVE-2021-41174.
- Update to version 8.2.2
    * Annotations: We have improved tag search performance.
    * Application: You can now configure an error-template title.
    * AzureMonitor: We removed a restriction from the resource
      filter query.
    * Packaging: We removed the ProcSubset option in systemd. This
      option prevented Grafana from starting in LXC environments.
    * Prometheus: We removed the autocomplete limit for metrics.
    * Table: We improved the styling of the type icons to make them
      more distinct from column / field name.
    * ValueMappings: You can now use value mapping in stat, gauge,
      bar gauge, and pie chart visualizations.
    * Alerting: Fix panic when Slack's API sends unexpected
      response.
    * Alerting: The Create Alert button now appears on the
      dashboard panel when you are working with a default
      datasource.
    * Explore: We fixed the problem where the Explore log panel
      disappears when an Elasticsearch logs query returns no
      results.
    * Graph: You can now see annotation descriptions on hover.
    * Logs: The system now uses the JSON parser only if the line is
      parsed to an object.
    * Prometheus: We fixed the issue where the system did not reuse
      TCP connections when querying from Grafana alerting.
    * Prometheus: We fixed the problem that resulted in an error
      when a user created a query with a $__interval min step.
    * RowsToFields: We fixed the issue where the system was not
      properly interpreting number values.
    * Scale: We fixed how the system handles NaN percent when data
      min = data max.
    * Table panel: You can now create a filter that includes
      special characters.
- Update to version 8.2.1
    * Dashboard: Fix rendering of repeating panels.
    * Datasources: Fix deletion of data source if plugin is not
      found.
    * Packaging: Remove systemcallfilters sections from systemd
      unit files.
    * Prometheus: Add Headers to HTTP client options.
- Update to version 8.2.0
    * AWS: Updated AWS authentication documentation.
    * Alerting: Added support Alertmanager data source for upstream
      Prometheus AM implementation.
    * Alerting: Allows more characters in label names so
      notifications are sent.
    * Alerting: Get alert rules for a dashboard or a panel using
      /api/v1/rules endpoints.
    * Annotations: Improved rendering performance of event markers.
    * CloudWatch Logs: Skip caching for log queries.
    * Explore: Added an opt-in configuration for Node Graph in
      Jaeger, Zipkin, and Tempo.
    * Packaging: Add stricter systemd unit options.
    * Prometheus: Metrics browser can now handle label values with
    * CodeEditor: Ensure that we trigger the latest onSave callback
      provided to the component.
    * DashboardList/AlertList: Fix for missing All folder value.
    * Plugins: Create a mock icon component to prevent console
      errors.
- Update to version 8.2.0-beta2
    * AccessControl: Document new permissions restricting data
      source access.
    * TimePicker: Add fiscal years and search to time picker.
    * Alerting: Added support for Unified Alerting with Grafana HA.
    * Alerting: Added support for tune rule evaluation using
      configuration options.
    * Alerting: Cleanups alertmanager namespace from key-value
      store when disabling Grafana 8 alerts.
    * Alerting: Remove ngalert feature toggle and introduce two new
      settings for enabling Grafana 8 alerts and disabling them for
      specific organisations.
    * CloudWatch: Introduced new math expression where it is
      necessary to specify the period field.
    * InfluxDB: Added support for $__interval and $__interval_ms in
      Flux queries for alerting.
    * InfluxDB: Flux queries can use more precise start and end
      timestamps with nanosecond-precision.
    * Plugins Catalog: Make the catalog the default way to interact
      with plugins.
    * Prometheus: Removed autocomplete limit for metrics.
    * Alerting: Fixed an issue where the edit page crashes if you
      tried to preview an alert without a condition set.
    * Alerting: Fixed rules migration to keep existing Grafana 8
      alert rules.
    * Alerting: Fixed the silence file content generated during
    * Analytics: Fixed an issue related to interaction event
      propagation in Azure Application Insights.
    * BarGauge: Fixed an issue where the cell color was lit even
      though there was no data.
    * BarGauge: Improved handling of streaming data.
    * CloudMonitoring: Fixed INT64 label unmarshal error.
    * ConfirmModal: Fixes confirm button focus on modal open.
    * Dashboard: Add option to generate short URL for variables
      with values containing spaces.
    * Explore: No longer hides errors containing refId property.
    * Fixed an issue that produced State timeline panel tooltip
      error when data was not in sync.
    * InfluxDB: InfluxQL query editor is set to always use
      resultFormat.
    * Loki: Fixed creating context query for logs with parsed
      labels.
    * PageToolbar: Fixed alignment of titles.
    * Plugins Catalog: Update to the list of available panels after
      an install, update or uninstall.
    * TimeSeries: Fixed an issue where the shared cursor was not
      showing when hovering over in old Graph panel.
    * Variables: Fixed issues related to change of focus or refresh
      pages when pressing enter in a text box variable input.
    * Variables: Panel no longer crash when using the adhoc
      variable in data links.
- Update to version 8.2.0-beta1
    * AccessControl: Introduce new permissions to restrict access
      for reloading provisioning configuration.
    * Alerting: Add UI to edit Cortex/Loki namespace, group names,
      and group evaluation interval.
    * Alerting: Add a Test button to test contact point.
    * Alerting: Allow creating/editing recording rules for Loki and
      Cortex.
    * Alerting: Metrics should have the label org instead of user.
    * Alerting: Sort notification channels by name to make them
      easier to locate.
    * Alerting: Support org level isolation of notification
    * AzureMonitor: Add data links to deep link to Azure Portal
      Azure Resource Graph.
    * AzureMonitor: Add support for annotations from Azure Monitor
      Metrics and Azure Resource Graph services.
    * AzureMonitor: Show error message when subscriptions request
      fails in ConfigEditor.
    * Chore: Update to Golang 1.16.7.
    * CloudWatch Logs: Add link to X-Ray data source for trace IDs
      in logs.
    * CloudWatch Logs: Disable query path using websockets (Live)
      feature.
    * CloudWatch/Logs: Don't group dataframes for non time series
    * Cloudwatch: Migrate queries that use multiple stats to one
      query per stat.
    * Dashboard: Keep live timeseries moving left (v2).
    * Datasources: Introduce response_limit for datasource
      responses.
    * Explore: Add filter by trace or span ID to trace to logs
    * Explore: Download traces as JSON in Explore Inspector.
    * Explore: Reuse Dashboard's QueryRows component.
    * Explore: Support custom display label for derived fields
      buttons for Loki datasource.
    * Grafana UI: Update monaco-related dependencies.
    * Graphite: Deprecate browser access mode.
    * InfluxDB: Improve handling of intervals in alerting.
    * InfluxDB: InfluxQL query editor: Handle unusual characters in
      tag values better.
    * Jaeger: Add ability to upload JSON file for trace data.
    * LibraryElements: Enable specifying UID for new and existing
      library elements.
    * LibraryPanels: Remove library panel icon from the panel
      header so you can no longer tell that a panel is a library
      panel from the dashboard view.
    * Logs panel: Scroll to the bottom on page refresh when sorting
      in ascending order.
    * Loki: Add fuzzy search to label browser.
    * Navigation: Implement active state for items in the Sidemenu.
    * Packaging: Update PID file location from /var/run to /run.
    * Plugins: Add Hide OAuth Forward config option.
    * Postgres/MySQL/MSSQL: Add setting to limit the maximum number
      of rows processed.
    * Prometheus: Add browser access mode deprecation warning.
    * Prometheus: Add interpolation for built-in-time variables to
      backend.
    * Tempo: Add ability to upload trace data in JSON format.
    * TimeSeries/XYChart: Allow grid lines visibility control in
      XYChart and TimeSeries panels.
    * Transformations: Convert field types to time string number or
      boolean.
    * Value mappings: Add regular-expression based value mapping.
    * Zipkin: Add ability to upload trace JSON.
    * Admin: Prevent user from deleting user's current/active
      organization.
    * LibraryPanels: Fix library panel getting saved in the
      dashboard's folder.
    * OAuth: Make generic teams URL and JMES path configurable.
    * QueryEditor: Fix broken copy-paste for mouse middle-click
    * Thresholds: Fix undefined color in 'Add threshold'.
    * Timeseries: Add wide-to-long, and fix multi-frame output.
    * TooltipPlugin: Fix behavior of Shared Crosshair when Tooltip
      is set to All.
    * Grafana UI: Fix TS error property css is missing in type.
- Update to version 8.1.8
- Update to version 8.1.7
    * Alerting: Fix alerts with evaluation interval more than 30
      seconds resolving before notification.
    * Elasticsearch/Prometheus: Fix usage of proper SigV4 service
      namespace.
- Update to version 8.1.6
  + Security: Fixes CVE-2021-39226.
- Update to version 8.1.5
    * BarChart: Fixes panel error that happens on second refresh.
- Update to version 8.1.4
  + Features and enhancements
    * Explore: Ensure logs volume bar colors match legend colors.
    * LDAP: Search all DNs for users.
    * Alerting: Fix notification channel migration.
    * Annotations: Fix blank panels for queries with unknown data
      sources.
    * BarChart: Fix stale values and x axis labels.
    * Graph: Make old graph panel thresholds work even if ngalert
      is enabled.
    * InfluxDB: Fix regex to identify / as separator.
    * LibraryPanels: Fix update issues related to library panels in
      rows.
    * Variables: Fix variables not updating inside a Panel when the
      preceding Row uses 'Repeat For'.
- Update to version 8.1.3
  + Bug fixes
    * Alerting: Fix alert flapping in the internal alertmanager.
    * Alerting: Fix request handler failed to convert dataframe
      'results' to plugins.DataTimeSeriesSlice: input frame is not
      recognized as a time series.
    * Dashboard: Fix UIDs are not preserved when importing/creating
      dashboards thru importing .json file.
    * Dashboard: Forces panel re-render when exiting panel edit.
    * Dashboard: Prevent folder from changing when navigating to
      general settings.
    * Docker: Force use of libcrypto1.1 and libssl1.1 versions to
      fix CVE-2021-3711.
    * Elasticsearch: Fix metric names for alert queries.
    * Elasticsearch: Limit Histogram field parameter to numeric
      values.
    * Elasticsearch: Prevent pipeline aggregations to show up in
      terms order by options.
    * LibraryPanels: Prevent duplicate repeated panels from being
      created.
    * Loki: Fix ad-hoc filter in dashboard when used with parser.
    * Plugins: Track signed files + add warn log for plugin assets
      which are not signed.
    * Postgres/MySQL/MSSQL: Fix region annotations not displayed
      correctly.
    * Prometheus: Fix validate selector in metrics browser.
    * Security: Fix stylesheet injection vulnerability.
    * Security: Fix short URL vulnerability.
- Update to version 8.1.2
    * AzureMonitor: Add support for PostgreSQL and MySQL Flexible
      Servers.
    * Datasource: Change HTTP status code for failed datasource
      health check to 400.
    * Explore: Add span duration to left panel in trace viewer.
    * Plugins: Use file extension allowlist when serving plugin
      assets instead of checking for UNIX executable.
    * Profiling: Add support for binding pprof server to custom
      network interfaces.
    * Search: Make search icon keyboard navigable.
    * Template variables: Keyboard navigation improvements.
    * Tooltip: Display ms within minute time range.
    * Alerting: Fix saving LINE contact point.
    * Annotations: Fix alerting annotation coloring.
    * Annotations: Alert annotations are now visible in the correct
      Panel.
    * Auth: Hide SigV4 config UI and disable middleware when its
      config flag is disabled.
    * Dashboard: Prevent incorrect panel layout by comparing window
      width against theme breakpoints.
    * Explore: Fix showing of full log context.
    * PanelEdit: Fix 'Actual' size by passing the correct panel
      size to Dashboard.
    * Plugins: Fix TLS datasource settings.
    * Variables: Fix issue with empty drop downs on navigation.
    * Variables: Fix URL util converting false into true.
    * Toolkit: Fix matchMedia not found error.
- Update to version 8.1.1
    * CloudWatch Logs: Fix crash when no region is selected.
- Update to version 8.1.0
    * Alerting: Deduplicate receivers during migration.
    * ColorPicker: Display colors as RGBA.
    * Select: Make portalling the menu opt-in, but opt-in
      everywhere.
    * TimeRangePicker: Improve accessibility.
    * Annotations: Correct annotations that are displayed upon page
      refresh.
    * Annotations: Fix Enabled button that disappeared from Grafana
      v8.0.6.
    * Annotations: Fix data source template variable that was not
      available for annotations.
    * AzureMonitor: Fix annotations query editor that does not
      load.
    * Geomap: Fix scale calculations.
    * GraphNG: Fix y-axis autosizing.
    * Live: Display stream rate and fix duplicate channels in list
    * Loki: Update labels in log browser when time range changes in
      dashboard.
    * NGAlert: Send resolve signal to alertmanager on alerting -&gt;
      Normal.
    * PasswordField: Prevent a password from being displayed when
      you click the Enter button.
    * Renderer: Remove debug.log file when Grafana is stopped.
    * Security: Update dependencies to fix CVE-2021-36222.
- Update to version 8.1.0-beta3
    * Alerting: Support label matcher syntax in alert rule list
      filter.
    * IconButton: Put tooltip text as aria-label.
    * Live: Experimental HA with Redis.
    * UI: FileDropzone component.
    * CloudWatch: Add AWS LookoutMetrics.
    * Docker: Fix builds by delaying go mod verify until all
      required files are copied over.
    * Exemplars: Fix disable exemplars only on the query that
      failed.
    * SQL: Fix SQL dataframe resampling (fill mode + time
      intervals).
- Update to version 8.1.0-beta2
    * Alerting: Expand the value string in alert annotations and
    * Auth: Add Azure HTTP authentication middleware.
    * Auth: Auth: Pass user role when using the authentication
      proxy.
    * Gazetteer: Update countries.json file to allow for linking to
      3-letter country codes.
    * Config: Fix Docker builds by correcting formatting in
      sample.ini.
    * Explore: Fix encoding of internal URLs.
- Update to version 8.1.0-beta1
    * Alerting: Add Alertmanager notifications tab.
    * Alerting: Add button to deactivate current Alertmanager
    * Alerting: Add toggle in Loki/Prometheus data source
      configuration to opt out of alerting UI.
    * Alerting: Allow any 'evaluate for' value &gt;=0 in the alert
      rule form.
    * Alerting: Load default configuration from status endpoint, if
      Cortex Alertmanager returns empty user configuration. 
    * Alerting: view to display alert rule and its underlying data.
    * Annotation panel: Release the annotation panel.
    * Annotations: Add typeahead support for tags in built-in
      annotations.
    * AzureMonitor: Add curated dashboards for Azure services.
    * AzureMonitor: Add support for deep links to Microsoft Azure
      portal for Metrics.
    * AzureMonitor: Remove support for different credentials for
      Azure Monitor Logs.
    * AzureMonitor: Support querying any Resource for Logs queries.
    * Elasticsearch: Add frozen indices search support.
    * Elasticsearch: Name fields after template variables values
      instead of their name.
    * Elasticsearch: add rate aggregation.
    * Email: Allow configuration of content types for email
      notifications.
    * Explore: Add more meta information when line limit is hit.
    * Explore: UI improvements to trace view.
    * FieldOverrides: Added support to change display name in an
      override field and have it be matched by a later rule.
    * HTTP Client: Introduce dataproxy_max_idle_connections config
      variable.
    * InfluxDB: InfluxQL: adds tags to timeseries data.
    * InfluxDB: InfluxQL: make measurement search case insensitive.
      Legacy Alerting: Replace simplejson with a struct in webhook
      notification channel.
    * Legend: Updates display name for Last (not null) to just
      Last*.
    * Logs panel: Add option to show common labels.
    * Loki: Add $__range variable.
    * Loki: Add support for 'label_values(log stream selector,
      label)' in templating.
    * Loki: Add support for ad-hoc filtering in dashboard.
    * MySQL Datasource: Add timezone parameter.
    * NodeGraph: Show gradient fields in legend.
    * PanelOptions: Don't mutate panel options/field config object
      when updating.
    * PieChart: Make pie gradient more subtle to match other
      charts.
    * Prometheus: Update PromQL typeahead and highlighting.
    * Prometheus: interpolate variable for step field.
    * Provisioning: Improve validation by validating across all
      dashboard providers.
    * SQL Datasources: Allow multiple string/labels columns with
      time series.
    * Select: Portal select menu to document.body.
    * Team Sync: Add group mapping to support team sync in the
      Generic OAuth provider.
    * Tooltip: Make active series more noticeable.
    * Tracing: Add support to configure trace to logs start and end
      time.
    * Transformations: Skip merge when there is only a single data
      frame.
    * ValueMapping: Added support for mapping text to color,
      boolean values, NaN and Null. Improved UI for value mapping.
    * Visualizations: Dynamically set any config (min, max, unit,
      color, thresholds) from query results.
    * live: Add support to handle origin without a value for the
      port when matching with root_url.
    * Alerting: Handle marshaling Inf values.
    * AzureMonitor: Fix macro resolution for template variables.
    * AzureMonitor: Fix queries with Microsoft.NetApp/../../volumes
      resources.
    * AzureMonitor: Request and concat subsequent resource pages.
    * Bug: Fix parse duration for day.
    * Datasources: Improve error handling for error messages.
    * Explore: Correct the functionality of shift-enter shortcut
      across all uses.
    * Explore: Show all dataFrames in data tab in Inspector.
    * GraphNG: Fix Tooltip mode 'All' for XYChart.
    * Loki: Fix highlight of logs when using filter expressions
      with backticks.
    * Modal: Force modal content to overflow with scroll.
    * Plugins: Ignore symlinked folders when verifying plugin
      signature.
    * Toolkit: Improve error messages when tasks fail.
- Update to version 8.0.7
- Update to version 8.0.6
    * Alerting: Add annotation upon alert state change.
    * Alerting: Allow space in label and annotation names.
    * InfluxDB: Improve legend labels for InfluxDB query results.
    * Alerting: Fix improper alert by changing the handling of
      empty labels.
    * CloudWatch/Logs: Reestablish Cloud Watch alert behavior.
    * Dashboard: Avoid migration breaking on fieldConfig without
      defaults field in folded panel.
    * DashboardList: Fix issue not re-fetching dashboard list after
      variable change.
    * Database: Fix incorrect format of isolation level
      configuration parameter for MySQL.
    * InfluxDB: Correct tag filtering on InfluxDB data.
    * Links: Fix links that caused a full page reload.
    * Live: Fix HTTP error when InfluxDB metrics have an incomplete
      or asymmetrical field set.
    * Postgres/MySQL/MSSQL: Change time field to 'Time' for time
      series queries.
    * Postgres: Fix the handling of a null return value in query
    * Tempo: Show hex strings instead of uints for IDs.
    * TimeSeries: Improve tooltip positioning when tooltip
      overflows.
    * Transformations: Add 'prepare time series' transformer.
- Update to version 8.0.5
    * Cloudwatch Logs: Send error down to client.
    * Folders: Return 409 Conflict status when folder already
      exists.
    * TimeSeries: Do not show series in tooltip if it's hidden in
      the viz.
    * AzureMonitor: Fix issue where resource group name is missing
      on the resource picker button.
    * Chore: Fix AWS auth assuming role with workspace IAM.
    * DashboardQueryRunner: Fixes unrestrained subscriptions being
    * DateFormats: Fix reading correct setting key for
      use_browser_locale.
    * Links: Fix links to other apps outside Grafana when under sub
      path.
    * Snapshots: Fix snapshot absolute time range issue.
    * Table: Fix data link color.
    * Time Series: Fix X-axis time format when tick increment is
      larger than a year.
    * Tooltip Plugin: Prevent tooltip render if field is undefined.
- Update to version 8.0.4
    * Live: Rely on app url for origin check.
    * PieChart: Sort legend descending, update placeholder.
    * TimeSeries panel: Do not reinitialize plot when thresholds
      mode change.
    * Elasticsearch: Allow case sensitive custom options in
      date_histogram interval.
    * Elasticsearch: Restore previous field naming strategy when
      using variables.
    * Explore: Fix import of queries between SQL data sources.
    * InfluxDB: InfluxQL query editor: fix retention policy
      handling.
    * Loki: Send correct time range in template variable queries.
    * TimeSeries: Preserve RegExp series overrides when migrating
      from old graph panel.
- Update to version 8.0.3
    * Alerting: Increase alertmanager_conf column if MySQL.
    * Time series/Bar chart panel: Handle infinite numbers as nulls
      when converting to plot array.
    * TimeSeries: Ensure series overrides that contain color are
      migrated, and migrate the previous fieldConfig when changing
      the panel type.
    * ValueMappings: Improve singlestat value mappings migration.
    * Annotations: Fix annotation line and marker colors.
    * AzureMonitor: Fix KQL template variable queries without
      default workspace.
    * CloudWatch/Logs: Fix missing response data for log queries.
    * LibraryPanels: Fix crash in library panels list when panel
      plugin is not found.
    * LogsPanel: Fix performance drop when moving logs panel in
    * Loki: Parse log levels when ANSI coloring is enabled.
    * MSSQL: Fix issue with hidden queries still being executed.
    * PanelEdit: Display the VisualizationPicker that was not
      displayed if a panel has an unknown panel plugin.
    * Plugins: Fix loading symbolically linked plugins.
    * Prometheus: Fix issue where legend name was replaced with
      name Value in stat and gauge panels.
    * State Timeline: Fix crash when hovering over panel.
- Update to version 8.0.2
    * Datasource: Add support for max_conns_per_host in dataproxy
      settings.
    * Configuration: Fix changing org preferences in FireFox.
    * PieChart: Fix legend dimension limits.
    * Postgres/MySQL/MSSQL: Fix panic in concurrent map writes.
    * Variables: Hide default data source if missing from regex.
- Update to version 8.0.1
    * Alerting/SSE: Fix 'count_non_null' reducer validation.
    * Cloudwatch: Fix duplicated time series.
    * Cloudwatch: Fix missing defaultRegion.
    * Dashboard: Fix Dashboard init failed error on dashboards with
      old singlestat panels in collapsed rows.
    * Datasource: Fix storing timeout option as numeric.
    * Postgres/MySQL/MSSQL: Fix annotation parsing for empty
    * Postgres/MySQL/MSSQL: Numeric/non-string values are now
      returned from query variables.
    * Postgres: Fix an error that was thrown when the annotation
      query did not return any results.
    * StatPanel: Fix an issue with the appearance of the graph when
      switching color mode.
    * Visualizations: Fix an issue in the
      Stat/BarGauge/Gauge/PieChart panels where all values mode
      were showing the same name if they had the same value.
    * Toolkit: Resolve external fonts when Grafana is served from a
      sub path.
- Update to version 8.0.0
    * The following endpoints were deprecated for Grafana v5.0 and
      support for them has now been removed:
      GET /dashboards/db/:slug
      GET /dashboard-solo/db/:slug
      GET /api/dashboard/db/:slug
      DELETE /api/dashboards/db/:slug
    * AzureMonitor: Require default subscription for workspaces()
      template variable query.
    * AzureMonitor: Use resource type display names in the UI.
    * Dashboard: Remove support for loading and deleting dashboard
      by slug.
    * InfluxDB: Deprecate direct browser access in data source.
    * VizLegend: Add a read-only property.
    * AzureMonitor: Fix Azure Resource Graph queries in Azure
      China.
    * Checkbox: Fix vertical layout issue with checkboxes due to
      fixed height.
    * Dashboard: Fix Table view when editing causes the panel data
      to not update.
    * Dashboard: Fix issues where unsaved-changes warning is not
      displayed.
    * Login: Fixes Unauthorized message showing when on login page
      or snapshot page.
    * NodeGraph: Fix sorting markers in grid view.
    * Short URL: Include orgId in generated short URLs.
    * Variables: Support raw values of boolean type.
- Update to version 8.0.0-beta3
    * The default HTTP method for Prometheus data source is now
      POST.
    * API: Support folder UID in dashboards API.
    * Alerting: Add support for configuring avatar URL for the
      Discord notifier.
    * Alerting: Clarify that Threema Gateway Alerts support only
      Basic IDs.
    * Azure: Expose Azure settings to external plugins.
    * AzureMonitor: Deprecate using separate credentials for Azure
      Monitor Logs.
    * AzureMonitor: Display variables in resource picker for Azure
    * AzureMonitor: Hide application insights for data sources not
      using it.
    * AzureMonitor: Support querying subscriptions and resource
      groups in Azure Monitor Logs.
    * AzureMonitor: remove requirement for default subscription.
    * CloudWatch: Add Lambda@Edge Amazon CloudFront metrics.
    * CloudWatch: Add missing AWS AppSync metrics.
    * ConfirmModal: Auto focus delete button.
    * Explore: Add caching for queries that are run from logs
    * Loki: Add formatting for annotations.
    * Loki: Bring back processed bytes as meta information.
    * NodeGraph: Display node graph collapsed by default with trace
      view.
    * Overrides: Include a manual override option to hide something
      from visualization.
    * PieChart: Support row data in pie charts.
    * Prometheus: Update default HTTP method to POST for existing
      data sources.
    * Time series panel: Position tooltip correctly when window is
      scrolled or resized.
    * Admin: Fix infinite loading edit on the profile page.
    * Color: Fix issues with random colors in string and date
    * Dashboard: Fix issue with title or folder change has no
      effect after exiting settings view.
    * DataLinks: Fix an issue __series.name is not working in data
      link.
    * Datasource: Fix dataproxy timeout should always be applied
      for outgoing data source HTTP requests.
    * Elasticsearch: Fix NewClient not passing httpClientProvider
      to client impl.
    * Explore: Fix Browser title not updated on Navigation to
      Explore.
    * GraphNG: Remove fieldName and hideInLegend properties from
      UPlotSeriesBuilder.
    * OAuth: Fix fallback to auto_assign_org_role setting for Azure
      AD OAuth when no role claims exists.
    * PanelChrome: Fix issue with empty panel after adding a non
      data panel and coming back from panel edit.
    * StatPanel: Fix data link tooltip not showing for single
      value.
    * Table: Fix sorting for number fields.
    * Table: Have text underline for datalink, and add support for
      image datalink.
    * Transformations: Prevent FilterByValue transform from
      crashing panel edit.
- Update to version 8.0.0-beta2
    * AppPlugins: Expose react-router to apps.
    * AzureMonitor: Add Azure Resource Graph.
    * AzureMonitor: Managed Identity configuration UI.
    * AzureMonitor: Token provider with support for Managed
      Identities.
    * AzureMonitor: Update Logs workspace() template variable query
      to return resource URIs.
    * BarChart: Value label sizing.
    * CloudMonitoring: Add support for preprocessing.
    * CloudWatch: Add AWS/EFS StorageBytes metric.
    * CloudWatch: Allow use of missing AWS namespaces using custom
    * Datasource: Shared HTTP client provider for core backend data
      sources and any data source using the data source proxy.
    * InfluxDB: InfluxQL: allow empty tag values in the query
      editor.
    * Instrumentation: Instrument incoming HTTP request with
      histograms by default.
    * Library Panels: Add name endpoint &amp; unique name validation to
      AddLibraryPanelModal.
    * Logs panel: Support details view.
    * PieChart: Always show the calculation options dropdown in the
    * PieChart: Remove beta flag.
    * Plugins: Enforce signing for all plugins.
    * Plugins: Remove support for deprecated backend plugin
      protocol version.
    * Tempo/Jaeger: Add better display name to legend.
    * Timeline: Add time range zoom.
    * Timeline: Adds opacity &amp; line width option.
    * Timeline: Value text alignment option.
    * ValueMappings: Add duplicate action, and disable dismiss on
      backdrop click.
    * Zipkin: Add node graph view to trace response.
    * Annotations panel: Remove subpath from dashboard links.
    * Content Security Policy: Allow all image sources by default.
    * Content Security Policy: Relax default template wrt. loading
      of scripts, due to nonces not working.
    * Datasource: Fix tracing propagation for alert execution by
      introducing HTTP client outgoing tracing middleware.
    * InfluxDB: InfluxQL always apply time interval end.
    * Library Panels: Fixes 'error while loading library panels'.
    * NewsPanel: Fixes rendering issue in Safari.
    * PanelChrome: Fix queries being issued again when scrolling in
      and out of view.
    * Plugins: Fix Azure token provider cache panic and auth param
      nil value.
    * Snapshots: Fix key and deleteKey being ignored when creating
      an external snapshot.
    * Table: Fix issue with cell border not showing with colored
      background cells.
    * Table: Makes tooltip scrollable for long JSON values.
    * TimeSeries: Fix for Connected null values threshold toggle
      during panel editing.
    * Variables: Fixes inconsistent selected states on dashboard
    * Variables: Refreshes all panels even if panel is full screen.
    * QueryField: Remove carriage return character from pasted text.
- Update to version 8.0.0-beta1
  + License update:
    * AGPL License: Update license from Apache 2.0 to the GNU
      Affero General Public License (AGPL).
    * Removes the never refresh option for Query variables.
    * Removes the experimental Tags feature for Variables.
  + Deprecations:
    * The InfoBox &amp; FeatureInfoBox are now deprecated please use
      the Alert component instead with severity info.
    * API: Add org users with pagination.
    * API: Return 404 when deleting nonexistent API key.
    * API: Return query results as JSON rather than base64 encoded
      Arrow.
    * Alerting: Allow sending notification tags to Opsgenie as
      extra properties.
    * Alerts: Replaces all uses of InfoBox &amp; FeatureInfoBox with
      Alert.
    * Auth: Add support for JWT Authentication.
    * AzureMonitor: Add support for
      Microsoft.SignalRService/SignalR metrics.
    * AzureMonitor: Azure settings in Grafana server config.
    * AzureMonitor: Migrate Metrics query editor to React.
    * BarChart panel: enable series toggling via legend.
    * BarChart panel: Adds support for Tooltip in BarChartPanel.
    * PieChart panel: Change look of highlighted pie slices.
    * CloudMonitoring: Migrate config editor from angular to react.
    * CloudWatch: Add Amplify Console metrics and dimensions.
    * CloudWatch: Add missing Redshift metrics to CloudWatch data
    * CloudWatch: Add metrics for managed RabbitMQ service.
    * DashboardList: Enable templating on search tag input.
    * Datasource config: correctly remove single custom http
      header.
    * Elasticsearch: Add generic support for template variables.
    * Elasticsearch: Allow omitting field when metric supports
      inline script.
    * Elasticsearch: Allow setting a custom limit for log queries.
    * Elasticsearch: Guess field type from first non-empty value.
    * Elasticsearch: Use application/x-ndjson content type for
      multisearch requests.
    * Elasticsearch: Use semver strings to identify ES version.
    * Explore: Add logs navigation to request more logs.
    * Explore: Map Graphite queries to Loki.
    * Explore: Scroll split panes in Explore independently.
    * Explore: Wrap each panel in separate error boundary.
    * FieldDisplay: Smarter naming of stat values when visualising
      row values (all values) in stat panels.
    * Graphite: Expand metric names for variables.
    * Graphite: Handle unknown Graphite functions without breaking
      the visual editor.
    * Graphite: Show graphite functions descriptions.
    * Graphite: Support request cancellation properly (Uses new
      backendSrv.fetch Observable request API).
    * InfluxDB: Flux: Improve handling of complex
      response-structures.
    * InfluxDB: Support region annotations.
    * Inspector: Download logs for manual processing.
    * Jaeger: Add node graph view for trace.
    * Jaeger: Search traces.
    * Loki: Use data source settings for alerting queries.
    * NodeGraph: Exploration mode.
    * OAuth: Add support for empty scopes.
    * PanelChrome: New logic-less emotion based component with no
      dependency on PanelModel or DashboardModel.
    * PanelEdit: Adds a table view toggle to quickly view data in
      table form.
    * PanelEdit: Highlight matched words when searching options.
    * PanelEdit: UX improvements.
    * Plugins: PanelRenderer and simplified QueryRunner to be used
      from plugins.
    * Plugins: AuthType in route configuration and params
      interpolation.
    * Plugins: Enable plugin runtime install/uninstall
      capabilities.
    * Plugins: Support set body content in plugin routes.
    * Plugins: Introduce marketplace app.
    * Plugins: Moving the DataSourcePicker to grafana/runtime so it
      can be reused in plugins.
    * Prometheus: Add custom query params for alert and exemplars
    * Prometheus: Use fuzzy string matching to autocomplete metric
      names and label.
    * Routing: Replace Angular routing with react-router.
    * Slack: Use chat.postMessage API by default.
    * Tempo: Search for Traces by querying Loki directly from
      Tempo.
    * Tempo: Show graph view of the trace.
    * Themes: Switch theme without reload using global shortcut.
    * TimeSeries panel: Add support for shared cursor.
    * TimeSeries panel: Do not crash the panel if there is no time
      series data in the response.
    * Variables: Do not save repeated panels, rows and scopedVars.
    * Variables: Removes experimental Tags feature.
    * Variables: Removes the never refresh option.
    * Visualizations: Unify tooltip options across visualizations.
    * Visualizations: Refactor and unify option creation between
      new visualizations.
    * Visualizations: Remove singlestat panel.
    * APIKeys: Fixes issue with adding first api key.
    * Alerting: Add checks for non supported units - disable
      defaulting to seconds.
    * Alerting: Fix issue where Slack notifications won't link to
      user IDs.
    * Alerting: Omit empty message in PagerDuty notifier.
    * AzureMonitor: Fix migration error from older versions of App
      Insights queries.
    * CloudWatch: Fix AWS/Connect dimensions.
    * CloudWatch: Fix broken AWS/MediaTailor dimension name.
    * Dashboards: Allow string manipulation as advanced variable
      format option.
    * DataLinks: Includes harmless extended characters like
      Cyrillic characters.
    * Drawer: Fixes title overflowing its container.
    * Explore: Fix issue when some query errors were not shown.
    * Generic OAuth: Prevent adding duplicated users.
    * Graphite: Handle invalid annotations.
    * Graphite: Fix autocomplete when tags are not available.
    * InfluxDB: Fix Cannot read property 'length' of undefined in
      when parsing response.
    * Instrumentation: Enable tracing when Jaeger host and port are
    * Instrumentation: Prefix metrics with grafana.
    * MSSQL: By default let driver choose port.
    * OAuth: Add optional strict parsing of role_attribute_path.
    * Panel: Fixes description markdown with inline code being
      rendered on newlines and full width.
    * PanelChrome: Ignore data updates &amp; errors for non data
      panels.
    * Permissions: Fix inherited folder permissions can prevent new
      permissions being added to a dashboard.
    * Plugins: Remove pre-existing plugin installs when installing
      with grafana-cli.
    * Plugins: Support installing to folders with whitespace and
      fix pluginUrl trailing and leading whitespace failures.
    * Postgres/MySQL/MSSQL: Don't return connection failure details
      to the client.
    * Postgres: Fix ms precision of interval in time group macro
      when TimescaleDB is enabled.
    * Provisioning: Use dashboard checksum field as change
      indicator.
    * SQL: Fix so that all captured errors are returned from sql
      engine.
    * Shortcuts: Fixes panel shortcuts so they always work.
    * Table: Fixes so border is visible for cells with links.
    * Variables: Clear query when data source type changes.
    * Variables: Filters out builtin variables from unknown list.
    * Button: Introduce buttonStyle prop.
    * DataQueryRequest: Remove deprecated props showingGraph and
      showingTabel and exploreMode.
    * grafana/ui: Update React Hook Form to v7.
    * IconButton: Introduce variant for red and blue icon buttons.
    * Plugins: Expose the getTimeZone function to be able to get
      the current selected timeZone.
    * TagsInput: Add className to TagsInput.
    * VizLegend: Move onSeriesColorChanged to PanelContext
      (breaking change).
- Update to version 7.5.13
    * Alerting: Fix NoDataFound for alert rules using AND operator.

mgr-cfg:

- Version 4.3.6-1
  * Corrected source URL in spec file
  * Fix installation problem for SLE15SP4 due missing python-selinux
  * Fix python selinux package name depending on build target (bsc#1193600)
  * Do not build python 2 package for SLE15SP4 and higher
  * Remove unused legacy code

mgr-custom-info:

- Version 4.3.3-1
  * Remove unused legacy code

mgr-daemon:

- Version 4.3.4-1
  * Corrected source URLs in spec file
  * Update translation strings

mgr-osad:

- Version 4.3.6-1
  * Corrected source URL in spec file.
  * Do not build python 2 package for SLE15SP4 and higher
  * Removed spacewalk-selinux dependencies.
  * Updated source url.

mgr-push:

- Version 4.3.4-1
  * Corrected source URLs in spec file

mgr-virtualization:

- Version 4.3.5-1
  * Corrected source URLs in spec file.
  * Do not build python 2 package for SLE15SP4 and higher

prometheus-blackbox_exporter:

- Enhanced to build on Enterprise Linux 8

prometheus-postgres_exporter:

- Updated for RHEL8.

python-hwdata:

- Require python macros for building

rhnlib:

- Version 4.3.4-1
  * Reorganize python files

spacecmd:

- Version 4.3.11-1
  * on full system update call schedulePackageUpdate API (bsc#1197507)
  * parse boolean paramaters correctly (bsc#1197689)
  * Add parameter to set containerized proxy SSH port
  * Add proxy config generation subcommand
  * Option 'org_createfirst' added to perform initial organization and user creation
  * Added gettext build requirement for RHEL.
  * Removed RHEL 5 references.
  * Include group formulas configuration in spacecmd group_backup and
    spacecmd group_restore. This changes backup format to json,
    previously used plain text is still supported for reading (bsc#1190462)
  * Update translation strings
  * Improved event history listing and added new system_eventdetails 
    command to retrieve the details of an event
  * Make schedule_deletearchived to get all actions without display limit
  * Allow passing a date limit for schedule_deletearchived on spacecmd (bsc#1181223)

spacewalk-client-tools:

- Version 4.3.9-1
  * Corrected source URLs in spec file.
  * do not build python 2 package for SLE15
  * Remove unused legacy code
  * Update translation strings

spacewalk-koan:

- Version 4.3.5-1
  * Corrected source URLs in spec file.

spacewalk-oscap:

- Version 4.3.5-1
  * Corrected source URLs in spec file.
  * Do not build python 2 package for SLE15SP4 and higher

spacewalk-remote-utils:

- Version 4.3.3-1
  * Adapt the package for changes in rhnlib

supportutils-plugin-susemanager-client:

- Version 4.3.2-1
  * Add proxy containers config and logs

suseRegisterInfo:

- Version 4.3.3-1
  * Bump version to 4.3.0

supportutils-plugin-salt:

- Add support for Salt Bundle

uyuni-common-libs:

- Version 4.3.4-1
  * implement more decompression algorithms for reposync (bsc#1196704)
  * Reorganize python files
  * Add decompression of zck files to fileutils

		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-20"/>
	<updated date="2022-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181223">SUSE bug 1181223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190462">SUSE bug 1190462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190535">SUSE bug 1190535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193600">SUSE bug 1193600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194873">SUSE bug 1194873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195726">SUSE bug 1195726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195727">SUSE bug 1195727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195728">SUSE bug 1195728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196338">SUSE bug 1196338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196704">SUSE bug 1196704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197507">SUSE bug 1197507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197689">SUSE bug 1197689</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36222/">CVE-2021-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">CVE-2021-36222 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3711/">CVE-2021-3711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3711">CVE-2021-3711 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-39226/">CVE-2021-39226 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39226">CVE-2021-39226 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-41174/">CVE-2021-41174 at SUSE</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41174">CVE-2021-41174 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41244/">CVE-2021-41244 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41244">CVE-2021-41244 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43798/">CVE-2021-43798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43798">CVE-2021-43798 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43813/">CVE-2021-43813 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43813">CVE-2021-43813 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43815/">CVE-2021-43815 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43815">CVE-2021-43815 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21673/">CVE-2022-21673 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21673">CVE-2022-21673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21698">CVE-2022-21698 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21702/">CVE-2022-21702 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21702">CVE-2022-21702 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21703/">CVE-2022-21703 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21703">CVE-2022-21703 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21713/">CVE-2022-21713 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21713">CVE-2022-21713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696629" comment="golang-github-prometheus-node_exporter-1.3.0-1.15.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151746" version="1" class="patch">
	<metadata>
		<title>Security update for fwupdate (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<description>

This update of fwupdate fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-22"/>
	<updated date="2022-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696152" comment="fwupdate-0.5-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696153" comment="fwupdate-efi-0.5-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696154" comment="libfwup0-0.5-10.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151747" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1070738" ref_url="https://bugzilla.suse.com/1070738" source="BUGZILLA"/>
		<reference ref_id="1198511" ref_url="https://bugzilla.suse.com/1198511" source="BUGZILLA"/>
		<reference ref_id="1199441" ref_url="https://bugzilla.suse.com/1199441" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2015-20107: avoid command injection in the mailcap module (bsc#1198511).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-23"/>
	<updated date="2022-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070738">SUSE bug 1070738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198511">SUSE bug 1198511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199441">SUSE bug 1199441</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696630" comment="libpython3_4m1_0-3.4.10-25.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696631" comment="python3-3.4.10-25.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696632" comment="python3-base-3.4.10-25.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696633" comment="python3-curses-3.4.10-25.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696634" comment="python3-devel-3.4.10-25.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151748" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1200550" ref_url="https://bugzilla.suse.com/1200550" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2068" ref_url="https://www.suse.com/security/cve/CVE-2022-2068/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-2068: Fixed more shell code injection issues in c_rehash. (bsc#1200550)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-24"/>
	<updated date="2022-06-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1200550">SUSE bug 1200550</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2068/">CVE-2022-2068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">CVE-2022-2068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696635" comment="libopenssl-devel-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696636" comment="libopenssl1_0_0-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696162" comment="libopenssl1_0_0-32bit-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696637" comment="libopenssl1_0_0-hmac-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696164" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696638" comment="openssl-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696166" comment="openssl-doc-1.0.2j-60.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151749" version="1" class="patch">
	<metadata>
		<title>Security update for oracleasm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<description>

This update of oracleasm fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-28"/>
	<updated date="2022-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696639" comment="oracleasm-kmp-default-2.0.8_k4.4.180_94.164-3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151750" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1198511" ref_url="https://bugzilla.suse.com/1198511" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2015-20107: avoid command injection in the mailcap module (bsc#1198511).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-04"/>
	<updated date="2022-07-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198511">SUSE bug 1198511</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700141" comment="libpython2_7-1_0-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696171" comment="libpython2_7-1_0-32bit-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700142" comment="python-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696173" comment="python-32bit-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700143" comment="python-base-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696175" comment="python-base-32bit-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700144" comment="python-curses-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700145" comment="python-demo-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700146" comment="python-devel-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696179" comment="python-doc-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696180" comment="python-doc-pdf-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700147" comment="python-gdbm-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700148" comment="python-idle-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700149" comment="python-tk-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700150" comment="python-xml-2.7.18-28.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151751" version="1" class="patch">
	<metadata>
		<title>Security update for sysstat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1144923" ref_url="https://bugzilla.suse.com/1144923" source="BUGZILLA"/>
		<reference ref_id="1159104" ref_url="https://bugzilla.suse.com/1159104" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19725" ref_url="https://www.suse.com/security/cve/CVE-2019-19725/" source="CVE"/>
		<description>
This update for sysstat fixes the following issues:

Security issue fixed:                                                                                                                                                               
                                                                                                                                                                                   
- CVE-2019-19725: Fixed double free in check_file_actlst in sa_common.c (bsc#1159104).                                                                                    

Bug fixes:

- Enable log information of starting/stoping services. (bsc#1144923, jsc#SLE-5958)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-04"/>
	<updated date="2022-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144923">SUSE bug 1144923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159104">SUSE bug 1159104</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19725/">CVE-2019-19725 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19725">CVE-2019-19725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700151" comment="sysstat-12.0.2-10.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700152" comment="sysstat-isag-12.0.2-10.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151752" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<description>

This update of dpdk fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-05"/>
	<updated date="2022-07-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700153" comment="dpdk-16.11.9-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696196" comment="dpdk-kmp-default-16.11.9_k4.4.180_94.164-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696661" comment="dpdk-thunderx-16.11.9-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696662" comment="dpdk-thunderx-kmp-default-16.11.9_k4.4.180_94.164-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700154" comment="dpdk-tools-16.11.9-8.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151753" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1199606" ref_url="https://bugzilla.suse.com/1199606" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1734" ref_url="https://www.suse.com/security/cve/CVE-2022-1734/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes one issue.

The following security issue was fixed:

- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-06"/>
	<updated date="2022-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199606">SUSE bug 1199606</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1734/">CVE-2022-1734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009700155" comment="kgraft-patch-4_4_180-94_147-default-14-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151754" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1199606" ref_url="https://bugzilla.suse.com/1199606" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1734" ref_url="https://www.suse.com/security/cve/CVE-2022-1734/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_150 fixes one issue.

The following security issue was fixed:

- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-06"/>
	<updated date="2022-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199606">SUSE bug 1199606</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1734/">CVE-2022-1734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721291" comment="kernel-default 4.4.180-94.150 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719630" comment="kgraft-patch-4_4_180-94_150-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009700156" comment="kgraft-patch-4_4_180-94_150-default-10-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151755" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 42 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1199606" ref_url="https://bugzilla.suse.com/1199606" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1734" ref_url="https://www.suse.com/security/cve/CVE-2022-1734/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_153 fixes one issue.

The following security issue was fixed:

- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-06"/>
	<updated date="2022-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199606">SUSE bug 1199606</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1734/">CVE-2022-1734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721293" comment="kernel-default 4.4.180-94.153 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719634" comment="kgraft-patch-4_4_180-94_153-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009700157" comment="kgraft-patch-4_4_180-94_153-default-6-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151756" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 43 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1199606" ref_url="https://bugzilla.suse.com/1199606" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1734" ref_url="https://www.suse.com/security/cve/CVE-2022-1734/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_156 fixes one issue.

The following security issue was fixed:

- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-06"/>
	<updated date="2022-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199606">SUSE bug 1199606</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1734/">CVE-2022-1734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721292" comment="kernel-default 4.4.180-94.156 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719632" comment="kgraft-patch-4_4_180-94_156-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009700158" comment="kgraft-patch-4_4_180-94_156-default-5-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151757" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 44 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1199606" ref_url="https://bugzilla.suse.com/1199606" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1734" ref_url="https://www.suse.com/security/cve/CVE-2022-1734/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_161 fixes one issue.

The following security issue was fixed:

- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-06"/>
	<updated date="2022-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199606">SUSE bug 1199606</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1734/">CVE-2022-1734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721294" comment="kernel-default 4.4.180-94.161 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719636" comment="kgraft-patch-4_4_180-94_161-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009700159" comment="kgraft-patch-4_4_180-94_161-default-4-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151758" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 45 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1197211" ref_url="https://bugzilla.suse.com/1197211" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39713" ref_url="https://www.suse.com/security/cve/CVE-2021-39713/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_164 fixes one issue.

The following security issue was fixed:

- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free. (bnc#1196973)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-06"/>
	<updated date="2022-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197211">SUSE bug 1197211</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39713/">CVE-2021-39713 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39713">CVE-2021-39713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721295" comment="kernel-default 4.4.180-94.164 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719638" comment="kgraft-patch-4_4_180-94_164-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009700160" comment="kgraft-patch-4_4_180-94_164-default-2-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151759" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1200793" ref_url="https://bugzilla.suse.com/1200793" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-31744" ref_url="https://www.suse.com/security/cve/CVE-2022-31744/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34478" ref_url="https://www.suse.com/security/cve/CVE-2022-34478/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 91.11.0 ESR (MFSA 2022-25) (bsc#1200793):

- CVE-2022-2200: Undesired attributes could be set as part of prototype pollution (bmo#1771381)
- CVE-2022-31744: CSP bypass enabling stylesheet injection (bmo#1757604)
- CVE-2022-34468: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI (bmo#1768537)
- CVE-2022-34470: Use-after-free in nsSHistory (bmo#1765951)
- CVE-2022-34472: Unavailable PAC file resulted in OCSP requests being blocked (bmo#1770123)
- CVE-2022-34478: Microsoft protocols can be attacked if a user accepts a prompt (bmo#1773717)
- CVE-2022-34479: A popup window could be resized in a way to overlay the address bar with web content (bmo#1745595)
- CVE-2022-34481: Potential integer overflow in ReplaceElementsAt (bmo#1497246)
- CVE-2022-34484: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 (bmo#1763634, bmo#1772651)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-06"/>
	<updated date="2022-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2200">CVE-2022-2200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31744/">CVE-2022-31744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31744">CVE-2022-31744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34468">CVE-2022-34468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34470">CVE-2022-34470 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34472">CVE-2022-34472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34478/">CVE-2022-34478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34478">CVE-2022-34478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34479">CVE-2022-34479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34481">CVE-2022-34481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34484">CVE-2022-34484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700161" comment="MozillaFirefox-91.11.0-112.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700162" comment="MozillaFirefox-devel-91.11.0-112.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700163" comment="MozillaFirefox-translations-common-91.11.0-112.119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151760" version="1" class="patch">
	<metadata>
		<title>Security update for rsyslog (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1199061" ref_url="https://bugzilla.suse.com/1199061" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24903" ref_url="https://www.suse.com/security/cve/CVE-2022-24903/" source="CVE"/>
		<description>
This update for rsyslog fixes the following issues:

- CVE-2022-24903: fix potential heap buffer overflow in modules for TCP syslog reception (bsc#1199061)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-07"/>
	<updated date="2022-07-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199061">SUSE bug 1199061</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24903/">CVE-2022-24903 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24903">CVE-2022-24903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700164" comment="rsyslog-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700165" comment="rsyslog-diag-tools-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700166" comment="rsyslog-doc-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700167" comment="rsyslog-module-gssapi-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700168" comment="rsyslog-module-gtls-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700169" comment="rsyslog-module-mysql-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700170" comment="rsyslog-module-pgsql-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700171" comment="rsyslog-module-relp-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700172" comment="rsyslog-module-snmp-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700173" comment="rsyslog-module-udpspoof-8.24.0-3.58.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151761" version="1" class="patch">
	<metadata>
		<title>Security update for pcre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1199232" ref_url="https://bugzilla.suse.com/1199232" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1586" ref_url="https://www.suse.com/security/cve/CVE-2022-1586/" source="CVE"/>
		<description>
This update for pcre fixes the following issues:
	  
- CVE-2022-1586: Fixed unicode property matching issue. (bsc#1199232)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-08"/>
	<updated date="2022-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199232">SUSE bug 1199232</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1586/">CVE-2022-1586 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">CVE-2022-1586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700174" comment="libpcre1-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696199" comment="libpcre1-32bit-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700175" comment="libpcre16-0-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700176" comment="libpcrecpp0-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700177" comment="libpcreposix0-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700178" comment="pcre-devel-8.45-8.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151762" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194859" ref_url="https://bugzilla.suse.com/1194859" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44142" ref_url="https://www.suse.com/security/cve/CVE-2021-44142/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-44142: Fixed out-of-Bound Read/Write on Samba vfs_fruit module. (bsc#1194859)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-01"/>
	<updated date="2022-02-01"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194859">SUSE bug 1194859</bugzilla>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44142/">CVE-2021-44142 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44142">CVE-2021-44142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666728" comment="libdcerpc-binding0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666161" comment="libdcerpc-binding0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666729" comment="libdcerpc0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666163" comment="libdcerpc0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666730" comment="libndr-krb5pac0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666165" comment="libndr-krb5pac0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666731" comment="libndr-nbt0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666167" comment="libndr-nbt0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666732" comment="libndr-standard0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666169" comment="libndr-standard0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666733" comment="libndr0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666171" comment="libndr0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666734" comment="libnetapi0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666173" comment="libnetapi0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666735" comment="libsamba-credentials0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666175" comment="libsamba-credentials0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666736" comment="libsamba-errors0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666177" comment="libsamba-errors0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666737" comment="libsamba-hostconfig0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666179" comment="libsamba-hostconfig0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666738" comment="libsamba-passdb0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666181" comment="libsamba-passdb0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666739" comment="libsamba-util0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666183" comment="libsamba-util0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666740" comment="libsamdb0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666185" comment="libsamdb0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666741" comment="libsmbclient0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666187" comment="libsmbclient0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666742" comment="libsmbconf0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666189" comment="libsmbconf0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666743" comment="libsmbldap0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666191" comment="libsmbldap0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666744" comment="libtevent-util0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666193" comment="libtevent-util0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666745" comment="libwbclient0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666195" comment="libwbclient0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666746" comment="samba-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666747" comment="samba-client-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666198" comment="samba-client-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666199" comment="samba-doc-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666748" comment="samba-libs-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666201" comment="samba-libs-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666749" comment="samba-winbind-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666203" comment="samba-winbind-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151763" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1100146" ref_url="https://bugzilla.suse.com/1100146" source="BUGZILLA"/>
		<reference ref_id="1145864" ref_url="https://bugzilla.suse.com/1145864" source="BUGZILLA"/>
		<reference ref_id="1152968" ref_url="https://bugzilla.suse.com/1152968" source="BUGZILLA"/>
		<reference ref_id="1174961" ref_url="https://bugzilla.suse.com/1174961" source="BUGZILLA"/>
		<reference ref_id="1178021" ref_url="https://bugzilla.suse.com/1178021" source="BUGZILLA"/>
		<reference ref_id="1178351" ref_url="https://bugzilla.suse.com/1178351" source="BUGZILLA"/>
		<reference ref_id="1179009" ref_url="https://bugzilla.suse.com/1179009" source="BUGZILLA"/>
		<reference ref_id="1179699" ref_url="https://bugzilla.suse.com/1179699" source="BUGZILLA"/>
		<reference ref_id="1184839" ref_url="https://bugzilla.suse.com/1184839" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15862" ref_url="https://www.suse.com/security/cve/CVE-2020-15862/" source="CVE"/>
		<description>
This update for net-snmp fixes the following issues:

- CVE-2020-15862: Make extended MIB read-only (bsc#1174961)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1100146">SUSE bug 1100146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145864">SUSE bug 1145864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152968">SUSE bug 1152968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174961">SUSE bug 1174961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178021">SUSE bug 1178021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178351">SUSE bug 1178351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179009">SUSE bug 1179009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179699">SUSE bug 1179699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184839">SUSE bug 1184839</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15862/">CVE-2020-15862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15862">CVE-2020-15862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662573" comment="libsnmp30-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661599" comment="libsnmp30-32bit-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662574" comment="net-snmp-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662575" comment="perl-SNMP-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662576" comment="snmp-mibs-5.7.3-6.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151764" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1186061" ref_url="https://bugzilla.suse.com/1186061" source="BUGZILLA"/>
		<reference ref_id="1191529" ref_url="https://bugzilla.suse.com/1191529" source="BUGZILLA"/>
		<reference ref_id="1192036" ref_url="https://bugzilla.suse.com/1192036" source="BUGZILLA"/>
		<reference ref_id="1193161" ref_url="https://bugzilla.suse.com/1193161" source="BUGZILLA"/>
		<reference ref_id="1193863" ref_url="https://bugzilla.suse.com/1193863" source="BUGZILLA"/>
		<reference ref_id="1194680" ref_url="https://bugzilla.suse.com/1194680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25020" ref_url="https://www.suse.com/security/cve/CVE-2018-25020/" source="CVE"/>
		<reference ref_id="CVE-2019-0136" ref_url="https://www.suse.com/security/cve/CVE-2019-0136/" source="CVE"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following security issues were fixed:

- CVE-2018-25020: Fixed an issue in the BPF subsystem in the Linux kernel mishandled situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. (bsc#1193575)
- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)
- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673, CVE-2021-23134: Fixed multiple bugs in NFC subsytem (bsc#1178181, bsc#1186060).
- CVE-2019-0136: Fixed an insufficient access control which allow an unauthenticated user to execute a denial of service. (bsc#1193157)
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-04"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191529">SUSE bug 1191529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193161">SUSE bug 1193161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193863">SUSE bug 1193863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194680">SUSE bug 1194680</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25020/">CVE-2018-25020 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25020">CVE-2018-25020 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0136/">CVE-2019-0136 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0136">CVE-2019-0136 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25670">CVE-2020-25670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25671">CVE-2020-25671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25672">CVE-2020-25672 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25673">CVE-2020-25673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3702">CVE-2020-3702 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23134">CVE-2021-23134 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009667089" comment="kgraft-patch-4_4_180-94_138-default-14-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151765" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1186061" ref_url="https://bugzilla.suse.com/1186061" source="BUGZILLA"/>
		<reference ref_id="1191529" ref_url="https://bugzilla.suse.com/1191529" source="BUGZILLA"/>
		<reference ref_id="1192036" ref_url="https://bugzilla.suse.com/1192036" source="BUGZILLA"/>
		<reference ref_id="1193161" ref_url="https://bugzilla.suse.com/1193161" source="BUGZILLA"/>
		<reference ref_id="1193863" ref_url="https://bugzilla.suse.com/1193863" source="BUGZILLA"/>
		<reference ref_id="1194680" ref_url="https://bugzilla.suse.com/1194680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25020" ref_url="https://www.suse.com/security/cve/CVE-2018-25020/" source="CVE"/>
		<reference ref_id="CVE-2019-0136" ref_url="https://www.suse.com/security/cve/CVE-2019-0136/" source="CVE"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.

The following security issues were fixed:

- CVE-2018-25020: Fixed an issue in the BPF subsystem in the Linux kernel mishandled situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. (bsc#1193575)
- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)
- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673, CVE-2021-23134: Fixed multiple bugs in NFC subsytem (bsc#1178181, bsc#1186060).
- CVE-2019-0136: Fixed an insufficient access control which allow an unauthenticated user to execute a denial of service. (bsc#1193157)
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-04"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191529">SUSE bug 1191529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193161">SUSE bug 1193161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193863">SUSE bug 1193863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194680">SUSE bug 1194680</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25020/">CVE-2018-25020 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25020">CVE-2018-25020 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0136/">CVE-2019-0136 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0136">CVE-2019-0136 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25670">CVE-2020-25670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25671">CVE-2020-25671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25672">CVE-2020-25672 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25673">CVE-2020-25673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3702">CVE-2020-3702 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23134">CVE-2021-23134 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009667090" comment="kgraft-patch-4_4_180-94_141-default-13-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151766" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1186061" ref_url="https://bugzilla.suse.com/1186061" source="BUGZILLA"/>
		<reference ref_id="1191529" ref_url="https://bugzilla.suse.com/1191529" source="BUGZILLA"/>
		<reference ref_id="1192036" ref_url="https://bugzilla.suse.com/1192036" source="BUGZILLA"/>
		<reference ref_id="1193161" ref_url="https://bugzilla.suse.com/1193161" source="BUGZILLA"/>
		<reference ref_id="1193863" ref_url="https://bugzilla.suse.com/1193863" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25020" ref_url="https://www.suse.com/security/cve/CVE-2018-25020/" source="CVE"/>
		<reference ref_id="CVE-2019-0136" ref_url="https://www.suse.com/security/cve/CVE-2019-0136/" source="CVE"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes several issues.

The following security issues were fixed:

- CVE-2018-25020: Fixed an issue in the BPF subsystem in the Linux kernel mishandled situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. (bsc#1193575)
- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)
- CVE-2021-23134: Fixed a use After Free vulnerability in nfc sockets which allows local attackers to elevate their privileges. (bsc#1186060)
- CVE-2019-0136: Fixed an insufficient access control which allow an unauthenticated user to execute a denial of service. (bsc#1193157)
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-04"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191529">SUSE bug 1191529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193161">SUSE bug 1193161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193863">SUSE bug 1193863</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25020/">CVE-2018-25020 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25020">CVE-2018-25020 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0136/">CVE-2019-0136 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0136">CVE-2019-0136 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3702">CVE-2020-3702 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23134">CVE-2021-23134 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009667091" comment="kgraft-patch-4_4_180-94_144-default-10-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151767" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1191529" ref_url="https://bugzilla.suse.com/1191529" source="BUGZILLA"/>
		<reference ref_id="1192036" ref_url="https://bugzilla.suse.com/1192036" source="BUGZILLA"/>
		<reference ref_id="1193161" ref_url="https://bugzilla.suse.com/1193161" source="BUGZILLA"/>
		<reference ref_id="1193863" ref_url="https://bugzilla.suse.com/1193863" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25020" ref_url="https://www.suse.com/security/cve/CVE-2018-25020/" source="CVE"/>
		<reference ref_id="CVE-2019-0136" ref_url="https://www.suse.com/security/cve/CVE-2019-0136/" source="CVE"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes several issues.

The following security issues were fixed:

- CVE-2018-25020: Fixed an issue in the BPF subsystem in the Linux kernel mishandled situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. (bsc#1193575)
- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)
- CVE-2019-0136: Fixed an insufficient access control which allow an unauthenticated user to execute a denial of service. (bsc#1193157)
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-04"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191529">SUSE bug 1191529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193161">SUSE bug 1193161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193863">SUSE bug 1193863</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25020/">CVE-2018-25020 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25020">CVE-2018-25020 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0136/">CVE-2019-0136 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0136">CVE-2019-0136 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3702">CVE-2020-3702 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009667092" comment="kgraft-patch-4_4_180-94_147-default-7-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151768" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1193161" ref_url="https://bugzilla.suse.com/1193161" source="BUGZILLA"/>
		<reference ref_id="1193863" ref_url="https://bugzilla.suse.com/1193863" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25020" ref_url="https://www.suse.com/security/cve/CVE-2018-25020/" source="CVE"/>
		<reference ref_id="CVE-2019-0136" ref_url="https://www.suse.com/security/cve/CVE-2019-0136/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_150 fixes several issues.

The following security issues were fixed:

- CVE-2018-25020: Fixed an issue in the BPF subsystem in the Linux kernel mishandled situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. (bsc#1193575)
- CVE-2019-0136: Fixed an insufficient access control which allow an unauthenticated user to execute a denial of service. (bsc#1193157)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-04"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193161">SUSE bug 1193161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193863">SUSE bug 1193863</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25020/">CVE-2018-25020 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25020">CVE-2018-25020 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0136/">CVE-2019-0136 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0136">CVE-2019-0136 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721291" comment="kernel-default 4.4.180-94.150 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719630" comment="kgraft-patch-4_4_180-94_150-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009667093" comment="kgraft-patch-4_4_180-94_150-default-3-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151769" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194006" ref_url="https://bugzilla.suse.com/1194006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-4156: Fixed heap buffer overflow in flac_buffer_copy that 
could potentially lead to heap exploitation (bsc#1194006).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4156">CVE-2021-4156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662577" comment="libsndfile1-1.0.25-36.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662485" comment="libsndfile1-32bit-1.0.25-36.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151770" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-09"/>
	<updated date="2022-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20698">CVE-2022-20698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667360" comment="clamav-0.103.5-33.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151771" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194581" ref_url="https://bugzilla.suse.com/1194581" source="BUGZILLA"/>
		<reference ref_id="1194588" ref_url="https://bugzilla.suse.com/1194588" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23034" ref_url="https://www.suse.com/security/cve/CVE-2022-23034/" source="CVE"/>
		<reference ref_id="CVE-2022-23035" ref_url="https://www.suse.com/security/cve/CVE-2022-23035/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-23034: Fixed possible DoS by a PV guest Xen while unmapping a grant. (XSA-394) (bsc#1194581)
- CVE-2022-23035: Fixed insufficient cleanup of passed-through device IRQs. (XSA-395) (bsc#1194588)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-09"/>
	<updated date="2022-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194581">SUSE bug 1194581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194588">SUSE bug 1194588</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23034/">CVE-2022-23034 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23034">CVE-2022-23034 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23035/">CVE-2022-23035 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23035">CVE-2022-23035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666154" comment="xen-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666155" comment="xen-doc-html-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666156" comment="xen-libs-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666157" comment="xen-libs-32bit-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666158" comment="xen-tools-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666159" comment="xen-tools-domU-4.9.4_26-3.100.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151772" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1183696" ref_url="https://bugzilla.suse.com/1183696" source="BUGZILLA"/>
		<reference ref_id="1186207" ref_url="https://bugzilla.suse.com/1186207" source="BUGZILLA"/>
		<reference ref_id="1192032" ref_url="https://bugzilla.suse.com/1192032" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192847" ref_url="https://bugzilla.suse.com/1192847" source="BUGZILLA"/>
		<reference ref_id="1192877" ref_url="https://bugzilla.suse.com/1192877" source="BUGZILLA"/>
		<reference ref_id="1192946" ref_url="https://bugzilla.suse.com/1192946" source="BUGZILLA"/>
		<reference ref_id="1193157" ref_url="https://bugzilla.suse.com/1193157" source="BUGZILLA"/>
		<reference ref_id="1193440" ref_url="https://bugzilla.suse.com/1193440" source="BUGZILLA"/>
		<reference ref_id="1193442" ref_url="https://bugzilla.suse.com/1193442" source="BUGZILLA"/>
		<reference ref_id="1193507" ref_url="https://bugzilla.suse.com/1193507" source="BUGZILLA"/>
		<reference ref_id="1193575" ref_url="https://bugzilla.suse.com/1193575" source="BUGZILLA"/>
		<reference ref_id="1193669" ref_url="https://bugzilla.suse.com/1193669" source="BUGZILLA"/>
		<reference ref_id="1193727" ref_url="https://bugzilla.suse.com/1193727" source="BUGZILLA"/>
		<reference ref_id="1193861" ref_url="https://bugzilla.suse.com/1193861" source="BUGZILLA"/>
		<reference ref_id="1193864" ref_url="https://bugzilla.suse.com/1193864" source="BUGZILLA"/>
		<reference ref_id="1193867" ref_url="https://bugzilla.suse.com/1193867" source="BUGZILLA"/>
		<reference ref_id="1194001" ref_url="https://bugzilla.suse.com/1194001" source="BUGZILLA"/>
		<reference ref_id="1194087" ref_url="https://bugzilla.suse.com/1194087" source="BUGZILLA"/>
		<reference ref_id="1194094" ref_url="https://bugzilla.suse.com/1194094" source="BUGZILLA"/>
		<reference ref_id="1194272" ref_url="https://bugzilla.suse.com/1194272" source="BUGZILLA"/>
		<reference ref_id="1194302" ref_url="https://bugzilla.suse.com/1194302" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1194529" ref_url="https://bugzilla.suse.com/1194529" source="BUGZILLA"/>
		<reference ref_id="1194880" ref_url="https://bugzilla.suse.com/1194880" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25020" ref_url="https://www.suse.com/security/cve/CVE-2018-25020/" source="CVE"/>
		<reference ref_id="CVE-2019-0136" ref_url="https://www.suse.com/security/cve/CVE-2019-0136/" source="CVE"/>
		<reference ref_id="CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519/" source="CVE"/>
		<reference ref_id="CVE-2021-0935" ref_url="https://www.suse.com/security/cve/CVE-2021-0935/" source="CVE"/>
		<reference ref_id="CVE-2021-28711" ref_url="https://www.suse.com/security/cve/CVE-2021-28711/" source="CVE"/>
		<reference ref_id="CVE-2021-28712" ref_url="https://www.suse.com/security/cve/CVE-2021-28712/" source="CVE"/>
		<reference ref_id="CVE-2021-28713" ref_url="https://www.suse.com/security/cve/CVE-2021-28713/" source="CVE"/>
		<reference ref_id="CVE-2021-28715" ref_url="https://www.suse.com/security/cve/CVE-2021-28715/" source="CVE"/>
		<reference ref_id="CVE-2021-33098" ref_url="https://www.suse.com/security/cve/CVE-2021-33098/" source="CVE"/>
		<reference ref_id="CVE-2021-3564" ref_url="https://www.suse.com/security/cve/CVE-2021-3564/" source="CVE"/>
		<reference ref_id="CVE-2021-39648" ref_url="https://www.suse.com/security/cve/CVE-2021-39648/" source="CVE"/>
		<reference ref_id="CVE-2021-39657" ref_url="https://www.suse.com/security/cve/CVE-2021-39657/" source="CVE"/>
		<reference ref_id="CVE-2021-4002" ref_url="https://www.suse.com/security/cve/CVE-2021-4002/" source="CVE"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4149" ref_url="https://www.suse.com/security/cve/CVE-2021-4149/" source="CVE"/>
		<reference ref_id="CVE-2021-4155" ref_url="https://www.suse.com/security/cve/CVE-2021-4155/" source="CVE"/>
		<reference ref_id="CVE-2021-4197" ref_url="https://www.suse.com/security/cve/CVE-2021-4197/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2021-45485" ref_url="https://www.suse.com/security/cve/CVE-2021-45485/" source="CVE"/>
		<reference ref_id="CVE-2021-45486" ref_url="https://www.suse.com/security/cve/CVE-2021-45486/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 12 SP3 LTSS kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2018-25020: Fixed an overflow in the BPF subsystem due to a mishandling of a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions. This affects kernel/bpf/core.c and net/core/filter.c (bnc#1193575).
- CVE-2019-0136: Fixed insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver that may have allowed an unauthenticated user to potentially enable denial of service via adjacent access (bnc#1193157).
- CVE-2020-35519: Fixed out-of-bounds memory access in x25_bind in net/x25/af_x25.c. A bounds check failure allowed a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information (bnc#1183696).
- CVE-2021-0935: Fixed possible out of bounds write in ip6_xmit of ip6_output.c due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192032).
- CVE-2021-28711: Fixed issue with xen/blkfront to harden blkfront against event channel storms (XSA-391) (bsc#1193440).
- CVE-2021-28712: Fixed issue with xen/netfront to harden netfront against event channel storms (XSA-391) (bsc#1193440).
- CVE-2021-28713: Fixed issue with xen/console to harden hvc_xen against event channel storms (XSA-391) (bsc#1193440).
- CVE-2021-28715: Fixed issue with xen/netback to do not queue unlimited number of packages (XSA-392) (bsc#1193442).
- CVE-2021-33098: Fixed improper input validation in the Intel(R) Ethernet ixgbe driver that may have allowed an authenticated user to potentially cause denial of service via local access (bnc#1192877).
- CVE-2021-3564: Fixed double-free memory corruption in the Linux kernel HCI device initialization subsystem that could have been used by attaching malicious HCI TTY Bluetooth devices. A local user could use this flaw to crash the system (bnc#1186207).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-4002: Fixed incorrect TLBs flush in hugetlbfs after huge_pmd_unshare (bsc#1192946).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1193727).
- CVE-2021-4149: Fixed btrfs unlock newly allocated extent buffer after error (bsc#1194001).
- CVE-2021-4155: Fixed XFS map issue when unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate (bsc#1194272).
- CVE-2021-4197: Use cgroup open-time credentials for process migraton perm checks (bsc#1194302).
- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194529).
- CVE-2021-43976: Fixed insufficient access control in drivers/net/wireless/marvell/mwifiex/usb.c that allowed an attacker who connect a crafted USB device to cause denial of service (bnc#1192847).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2021-45485: Fixed information leak in the IPv6 implementation in net/ipv6/output_core.c (bnc#1194094).
- CVE-2021-45486: Fixed information leak inside the IPv4 implementation caused by very small hash table (bnc#1194087).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).


The following non-security bugs were fixed:

- fget: clarify and improve __fget_files() implementation (bsc#1193727).
- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (bsc#1193507).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193507).
- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- memstick: rtsx_usb_ms: fix UAF
- moxart: fix potential use-after-free on remove path (bsc1194516).
- net/x25: fix a race in x25_bind() (networking-stable-19_03_15).
- net: mana: Add RX fencing (bsc#1193507).
- net: mana: Allow setting the number of queues while the NIC is down (bsc#1193507).
- net: mana: Fix spelling mistake 'calledd' -&gt; 'called' (bsc#1193507).
- net: mana: Fix the netdev_err()'s vPort argument in mana_init_port() (bsc#1193507).
- net: mana: Improve the HWC error handling (bsc#1193507).
- net: mana: Support hibernation and kexec (bsc#1193507).
- net: mana: Use kcalloc() instead of kzalloc() (bsc#1193507).
- recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267).
- recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc#1192267).
- ring-buffer: Protect ring_buffer_reset() from reentrancy (bsc#1179960).
- tty: hvc: replace BUG_ON() with negative return value (git-fixes).
- xen-netfront: do not assume sk_buff_head list is empty in error handling (git-fixes).
- xen-netfront: do not use ~0U as error return value for xennet_fill_frags() (git-fixes).
- xen/blkfront: do not take local copy of a request from the ring page (git-fixes).
- xen/blkfront: do not trust the backend response data blindly (git-fixes).
- xen/blkfront: read response from backend only once (git-fixes).
- xen/netfront: disentangle tx_skb_freelist (git-fixes).
- xen/netfront: do not bug in case of too many frags (bnc#1012382).
- xen/netfront: do not cache skb_shinfo() (bnc#1012382).
- xen/netfront: do not read data from request on the ring page (git-fixes).
- xen/netfront: do not trust the backend response data blindly (git-fixes).
- xen/netfront: read response from backend only once (git-fixes).
- xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-10"/>
	<updated date="2022-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183696">SUSE bug 1183696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186207">SUSE bug 1186207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192032">SUSE bug 1192032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192847">SUSE bug 1192847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192877">SUSE bug 1192877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192946">SUSE bug 1192946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193157">SUSE bug 1193157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193440">SUSE bug 1193440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193442">SUSE bug 1193442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193507">SUSE bug 1193507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193575">SUSE bug 1193575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193669">SUSE bug 1193669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193727">SUSE bug 1193727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193861">SUSE bug 1193861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193864">SUSE bug 1193864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194001">SUSE bug 1194001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194087">SUSE bug 1194087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194094">SUSE bug 1194094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194272">SUSE bug 1194272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194302">SUSE bug 1194302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194529">SUSE bug 1194529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194880">SUSE bug 1194880</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25020/">CVE-2018-25020 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25020">CVE-2018-25020 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0136/">CVE-2019-0136 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0136">CVE-2019-0136 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35519">CVE-2020-35519 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0935/">CVE-2021-0935 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0935">CVE-2021-0935 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28711/">CVE-2021-28711 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28711">CVE-2021-28711 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28712/">CVE-2021-28712 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28712">CVE-2021-28712 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28713/">CVE-2021-28713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28713">CVE-2021-28713 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28715/">CVE-2021-28715 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28715">CVE-2021-28715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33098/">CVE-2021-33098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33098">CVE-2021-33098 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3564/">CVE-2021-3564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3564">CVE-2021-3564 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39648/">CVE-2021-39648 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39648">CVE-2021-39648 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39657/">CVE-2021-39657 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39657">CVE-2021-39657 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4002/">CVE-2021-4002 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4002">CVE-2021-4002 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">CVE-2021-4083 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4149/">CVE-2021-4149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4149">CVE-2021-4149 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4155/">CVE-2021-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4155">CVE-2021-4155 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4197/">CVE-2021-4197 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4197">CVE-2021-4197 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4202">CVE-2021-4202 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43976">CVE-2021-43976 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45095">CVE-2021-45095 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45485/">CVE-2021-45485 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45485">CVE-2021-45485 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45486/">CVE-2021-45486 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45486">CVE-2021-45486 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667638" comment="kernel-default-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667639" comment="kernel-default-base-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667640" comment="kernel-default-devel-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667641" comment="kernel-default-kgraft-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666898" comment="kernel-devel-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666899" comment="kernel-macros-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666900" comment="kernel-source-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667642" comment="kernel-syms-4.4.180-94.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667643" comment="kgraft-patch-4_4_180-94_153-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151773" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1192876" ref_url="https://bugzilla.suse.com/1192876" source="BUGZILLA"/>
		<reference ref_id="1193981" ref_url="https://bugzilla.suse.com/1193981" source="BUGZILLA"/>
		<reference ref_id="1194041" ref_url="https://bugzilla.suse.com/1194041" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3975" ref_url="https://www.suse.com/security/cve/CVE-2021-3975/" source="CVE"/>
		<reference ref_id="CVE-2021-4147" ref_url="https://www.suse.com/security/cve/CVE-2021-4147/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2021-4147: libxl: Fix libvirtd deadlocks and segfaults. (bsc#1194041)
- CVE-2021-3975: Add missing lock in qemuProcessHandleMonitorEOF. (bsc#1192876)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-10"/>
	<updated date="2022-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192876">SUSE bug 1192876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193981">SUSE bug 1193981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194041">SUSE bug 1194041</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3975/">CVE-2021-3975 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3975">CVE-2021-3975 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4147/">CVE-2021-4147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4147">CVE-2021-4147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662723" comment="libvirt-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662724" comment="libvirt-admin-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662725" comment="libvirt-client-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662726" comment="libvirt-daemon-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662727" comment="libvirt-daemon-config-network-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662728" comment="libvirt-daemon-config-nwfilter-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662729" comment="libvirt-daemon-driver-interface-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662170" comment="libvirt-daemon-driver-libxl-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662730" comment="libvirt-daemon-driver-lxc-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662731" comment="libvirt-daemon-driver-network-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662732" comment="libvirt-daemon-driver-nodedev-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662733" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662734" comment="libvirt-daemon-driver-qemu-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662735" comment="libvirt-daemon-driver-secret-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662736" comment="libvirt-daemon-driver-storage-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662737" comment="libvirt-daemon-driver-storage-core-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662738" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662739" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662740" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662741" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662714" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662742" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662743" comment="libvirt-daemon-hooks-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662744" comment="libvirt-daemon-lxc-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662745" comment="libvirt-daemon-qemu-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662188" comment="libvirt-daemon-xen-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662746" comment="libvirt-doc-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662747" comment="libvirt-libs-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662748" comment="libvirt-lock-sanlock-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662749" comment="libvirt-nss-3.3.0-5.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151774" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1195389" ref_url="https://bugzilla.suse.com/1195389" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0135" ref_url="https://www.suse.com/security/cve/CVE-2022-0135/" source="CVE"/>
		<description>
This update for virglrenderer fixes the following issues:

- CVE-2022-0135: Fixed out-of-bonds write in read_transfer_data() (bsc#1195389).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195389">SUSE bug 1195389</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0135/">CVE-2022-0135 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0135">CVE-2022-0135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668227" comment="libvirglrenderer0-0.5.0-12.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151775" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1195054" ref_url="https://bugzilla.suse.com/1195054" source="BUGZILLA"/>
		<reference ref_id="1195217" ref_url="https://bugzilla.suse.com/1195217" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">CVE-2022-23852 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23990">CVE-2022-23990 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668374" comment="expat-2.1.0-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668375" comment="libexpat1-2.1.0-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666209" comment="libexpat1-32bit-2.1.0-21.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151776" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1071031" ref_url="https://bugzilla.suse.com/1071031" source="BUGZILLA"/>
		<reference ref_id="1154365" ref_url="https://bugzilla.suse.com/1154365" source="BUGZILLA"/>
		<reference ref_id="1182808" ref_url="https://bugzilla.suse.com/1182808" source="BUGZILLA"/>
		<reference ref_id="1182809" ref_url="https://bugzilla.suse.com/1182809" source="BUGZILLA"/>
		<reference ref_id="1182811" ref_url="https://bugzilla.suse.com/1182811" source="BUGZILLA"/>
		<reference ref_id="1182812" ref_url="https://bugzilla.suse.com/1182812" source="BUGZILLA"/>
		<reference ref_id="1190312" ref_url="https://bugzilla.suse.com/1190312" source="BUGZILLA"/>
		<reference ref_id="1194539" ref_url="https://bugzilla.suse.com/1194539" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17095" ref_url="https://www.suse.com/security/cve/CVE-2017-17095/" source="CVE"/>
		<reference ref_id="CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546/" source="CVE"/>
		<reference ref_id="CVE-2020-19131" ref_url="https://www.suse.com/security/cve/CVE-2020-19131/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<reference ref_id="CVE-2022-22844" ref_url="https://www.suse.com/security/cve/CVE-2022-22844/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2017-17095: Fixed DoS in tools/pal2rgb.c in pal2rgb (bsc#1071031).
- CVE-2019-17546: Fixed integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image (bsc#1154365).
- CVE-2020-19131: Fixed buffer overflow in tiffcrop that may cause DoS via the invertImage() function (bsc#1190312).
- CVE-2020-35521: Fixed memory allocation failure in tif_read.c (bsc#1182808).
- CVE-2020-35522: Fixed memory allocation failure in tif_pixarlog.c (bsc#1182809).
- CVE-2020-35523: Fixed integer overflow in tif_getimage.c (bsc#1182811).
- CVE-2020-35524: Fixed heap-based buffer overflow in TIFF2PDF tool (bsc#1182812).
- CVE-2022-22844: Fixed out-of-bounds read in _TIFFmemcpy in tif_unix.c (bsc#1194539).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071031">SUSE bug 1071031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154365">SUSE bug 1154365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182808">SUSE bug 1182808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182809">SUSE bug 1182809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182811">SUSE bug 1182811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182812">SUSE bug 1182812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190312">SUSE bug 1190312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194539">SUSE bug 1194539</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17095/">CVE-2017-17095 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17095">CVE-2017-17095 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17546">CVE-2019-17546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-19131/">CVE-2020-19131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19131">CVE-2020-19131 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35521">CVE-2020-35521 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35522">CVE-2020-35522 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35523">CVE-2020-35523 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35524">CVE-2020-35524 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22844/">CVE-2022-22844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22844">CVE-2022-22844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668376" comment="libtiff5-4.0.9-44.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666205" comment="libtiff5-32bit-4.0.9-44.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668377" comment="tiff-4.0.9-44.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151777" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1195825" ref_url="https://bugzilla.suse.com/1195825" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2018-16301: Fixed segfault when handling large files (bsc#1195825).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668378" comment="tcpdump-4.9.2-14.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151778" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1195108" ref_url="https://bugzilla.suse.com/1195108" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<description>
This update for xerces-j2 fixes the following issues:

- CVE-2022-23437: Fixed infinite loop within Apache XercesJ xml parser (bsc#1195108).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-21"/>
	<updated date="2022-02-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23437">CVE-2022-23437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667934" comment="xerces-j2-2.8.1-268.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667935" comment="xerces-j2-xml-apis-2.8.1-268.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667936" comment="xerces-j2-xml-resolver-2.8.1-268.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151779" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194460" ref_url="https://bugzilla.suse.com/1194460" source="BUGZILLA"/>
		<reference ref_id="1194533" ref_url="https://bugzilla.suse.com/1194533" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.

The following security issues were fixed:

- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-22"/>
	<updated date="2022-02-22"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">CVE-2021-4083 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4202">CVE-2021-4202 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009669109" comment="kgraft-patch-4_4_180-94_141-default-14-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151780" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194460" ref_url="https://bugzilla.suse.com/1194460" source="BUGZILLA"/>
		<reference ref_id="1194533" ref_url="https://bugzilla.suse.com/1194533" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes several issues.

The following security issues were fixed:

- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-22"/>
	<updated date="2022-02-22"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">CVE-2021-4083 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4202">CVE-2021-4202 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009669110" comment="kgraft-patch-4_4_180-94_144-default-11-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151781" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194460" ref_url="https://bugzilla.suse.com/1194460" source="BUGZILLA"/>
		<reference ref_id="1194533" ref_url="https://bugzilla.suse.com/1194533" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes several issues.

The following security issues were fixed:

- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-22"/>
	<updated date="2022-02-22"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">CVE-2021-4083 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4202">CVE-2021-4202 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009669111" comment="kgraft-patch-4_4_180-94_147-default-8-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151782" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194460" ref_url="https://bugzilla.suse.com/1194460" source="BUGZILLA"/>
		<reference ref_id="1194533" ref_url="https://bugzilla.suse.com/1194533" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_150 fixes several issues.

The following security issues were fixed:

- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-22"/>
	<updated date="2022-02-22"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">CVE-2021-4083 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4202">CVE-2021-4202 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721291" comment="kernel-default 4.4.180-94.150 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719630" comment="kgraft-patch-4_4_180-94_150-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009669112" comment="kgraft-patch-4_4_180-94_150-default-4-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151783" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194460" ref_url="https://bugzilla.suse.com/1194460" source="BUGZILLA"/>
		<reference ref_id="1194533" ref_url="https://bugzilla.suse.com/1194533" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_138 fixes several issues.

The following security issues were fixed:

- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-22"/>
	<updated date="2022-02-22"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">CVE-2021-4083 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4202">CVE-2021-4202 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721287" comment="kernel-default 4.4.180-94.138 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719622" comment="kgraft-patch-4_4_180-94_138-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009669113" comment="kgraft-patch-4_4_180-94_138-default-15-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151784" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1195230" ref_url="https://bugzilla.suse.com/1195230" source="BUGZILLA"/>
		<reference ref_id="1195682" ref_url="https://bugzilla.suse.com/1195682" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682)

- CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via Maintenance Service
- CVE-2022-22754: Extensions could have bypassed permission confirmation during update
- CVE-2022-22756: Drag and dropping an image could have resulted in the dropped object being an executable
- CVE-2022-22759: Sandboxed iframes could have executed script if the parent appended elements
- CVE-2022-22760: Cross-Origin responses could be distinguished between script and non-script content-types
- CVE-2022-22761: frame-ancestors Content Security Policy directive was not enforced for framed extension pages
- CVE-2022-22763: Script Execution during invalid object state
- CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6


Firefox Extended Support Release 91.5.1 ESR (bsc#1195230)

- Fixed an issue that allowed unexpected data to be submitted in some of our search telemetry
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-24"/>
	<updated date="2022-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195230">SUSE bug 1195230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22753">CVE-2022-22753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22754">CVE-2022-22754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22756">CVE-2022-22756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22759">CVE-2022-22759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22760">CVE-2022-22760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22761">CVE-2022-22761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22763">CVE-2022-22763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22764">CVE-2022-22764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669715" comment="MozillaFirefox-91.6.0-112.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669716" comment="MozillaFirefox-devel-91.6.0-112.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669717" comment="MozillaFirefox-translations-common-91.6.0-112.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151785" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1192615" ref_url="https://bugzilla.suse.com/1192615" source="BUGZILLA"/>
		<reference ref_id="1195779" ref_url="https://bugzilla.suse.com/1195779" source="BUGZILLA"/>
		<reference ref_id="1195780" ref_url="https://bugzilla.suse.com/1195780" source="BUGZILLA"/>
		<reference ref_id="1195781" ref_url="https://bugzilla.suse.com/1195781" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0127" ref_url="https://www.suse.com/security/cve/CVE-2021-0127/" source="CVE"/>
		<reference ref_id="CVE-2021-0145" ref_url="https://www.suse.com/security/cve/CVE-2021-0145/" source="CVE"/>
		<reference ref_id="CVE-2021-0146" ref_url="https://www.suse.com/security/cve/CVE-2021-0146/" source="CVE"/>
		<reference ref_id="CVE-2021-33120" ref_url="https://www.suse.com/security/cve/CVE-2021-33120/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220207 release.

- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)
- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)
- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)
- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)

- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)
- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-25"/>
	<updated date="2022-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192615">SUSE bug 1192615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195779">SUSE bug 1195779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195780">SUSE bug 1195780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195781">SUSE bug 1195781</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0127/">CVE-2021-0127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0127">CVE-2021-0127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0145/">CVE-2021-0145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0145">CVE-2021-0145 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0146/">CVE-2021-0146 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0146">CVE-2021-0146 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33120/">CVE-2021-33120 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33120">CVE-2021-33120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667937" comment="ucode-intel-20220207-13.93.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151786" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1193942" ref_url="https://bugzilla.suse.com/1193942" source="BUGZILLA"/>
		<reference ref_id="1193943" ref_url="https://bugzilla.suse.com/1193943" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44224" ref_url="https://www.suse.com/security/cve/CVE-2021-44224/" source="CVE"/>
		<reference ref_id="CVE-2021-44790" ref_url="https://www.suse.com/security/cve/CVE-2021-44790/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-44224: Fixed NULL dereference or SSRF in forward proxy configurations. (bsc#1193943)
- CVE-2021-44790: Fixed buffer overflow when parsing multipart content in mod_lua. (bsc#1193942)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-12"/>
	<updated date="2022-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193942">SUSE bug 1193942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193943">SUSE bug 1193943</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44224/">CVE-2021-44224 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44224">CVE-2021-44224 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44790/">CVE-2021-44790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44790">CVE-2021-44790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663246" comment="apache2-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663071" comment="apache2-doc-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663247" comment="apache2-example-pages-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663248" comment="apache2-prefork-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663249" comment="apache2-utils-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663250" comment="apache2-worker-2.4.23-29.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151787" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<description>
This update for cyrus-sasl fixes the following issues:

-  CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24407">CVE-2022-24407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670423" comment="cyrus-sasl-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669310" comment="cyrus-sasl-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670424" comment="cyrus-sasl-crammd5-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669312" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670425" comment="cyrus-sasl-digestmd5-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670426" comment="cyrus-sasl-gssapi-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669315" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670427" comment="cyrus-sasl-otp-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669317" comment="cyrus-sasl-otp-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670428" comment="cyrus-sasl-plain-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669319" comment="cyrus-sasl-plain-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670429" comment="libsasl2-3-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669321" comment="libsasl2-3-32bit-2.1.26-8.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151788" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 42 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_153 fixes several issues.

The following security issues were fixed:

- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
- CVE-2021-28688: Fixed XSA-365 that includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains (bsc#1182294).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0920">CVE-2021-0920 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721293" comment="kernel-default 4.4.180-94.153 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719634" comment="kgraft-patch-4_4_180-94_153-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009670560" comment="kgraft-patch-4_4_180-94_153-default-2-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151789" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_150 fixes one issue.

The following security issue was fixed:

- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0920">CVE-2021-0920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721291" comment="kernel-default 4.4.180-94.150 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719630" comment="kgraft-patch-4_4_180-94_150-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009670561" comment="kgraft-patch-4_4_180-94_150-default-5-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151790" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_147 fixes one issue.

The following security issue was fixed:

- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0920">CVE-2021-0920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721290" comment="kernel-default 4.4.180-94.147 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719628" comment="kgraft-patch-4_4_180-94_147-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009670562" comment="kgraft-patch-4_4_180-94_147-default-9-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151791" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_144 fixes one issue.

The following security issue was fixed:

- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0920">CVE-2021-0920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721289" comment="kernel-default 4.4.180-94.144 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719626" comment="kgraft-patch-4_4_180-94_144-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009670563" comment="kgraft-patch-4_4_180-94_144-default-12-2.1 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151792" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.180-94_141 fixes one issue.

The following security issue was fixed:

- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0920">CVE-2021-0920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criteria operator="AND">
				<criterion test_ref="oval:org.opensuse.security:tst:2009721288" comment="kernel-default 4.4.180-94.141 is running"/>
				<criteria operator="OR">
					<criterion test_ref="oval:org.opensuse.security:tst:2009719624" comment="kgraft-patch-4_4_180-94_141-default is not installed"/>
					<criterion test_ref="oval:org.opensuse.security:tst:2009670564" comment="kgraft-patch-4_4_180-94_141-default-15-2.2 is installed"/>
				</criteria>
			</criteria>

	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151793" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1195064" ref_url="https://bugzilla.suse.com/1195064" source="BUGZILLA"/>
		<reference ref_id="1195735" ref_url="https://bugzilla.suse.com/1195735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30934" ref_url="https://www.suse.com/security/cve/CVE-2021-30934/" source="CVE"/>
		<reference ref_id="CVE-2021-30936" ref_url="https://www.suse.com/security/cve/CVE-2021-30936/" source="CVE"/>
		<reference ref_id="CVE-2021-30951" ref_url="https://www.suse.com/security/cve/CVE-2021-30951/" source="CVE"/>
		<reference ref_id="CVE-2021-30952" ref_url="https://www.suse.com/security/cve/CVE-2021-30952/" source="CVE"/>
		<reference ref_id="CVE-2021-30953" ref_url="https://www.suse.com/security/cve/CVE-2021-30953/" source="CVE"/>
		<reference ref_id="CVE-2021-30954" ref_url="https://www.suse.com/security/cve/CVE-2021-30954/" source="CVE"/>
		<reference ref_id="CVE-2021-30984" ref_url="https://www.suse.com/security/cve/CVE-2021-30984/" source="CVE"/>
		<reference ref_id="CVE-2021-45481" ref_url="https://www.suse.com/security/cve/CVE-2021-45481/" source="CVE"/>
		<reference ref_id="CVE-2021-45482" ref_url="https://www.suse.com/security/cve/CVE-2021-45482/" source="CVE"/>
		<reference ref_id="CVE-2021-45483" ref_url="https://www.suse.com/security/cve/CVE-2021-45483/" source="CVE"/>
		<reference ref_id="CVE-2022-22589" ref_url="https://www.suse.com/security/cve/CVE-2022-22589/" source="CVE"/>
		<reference ref_id="CVE-2022-22590" ref_url="https://www.suse.com/security/cve/CVE-2022-22590/" source="CVE"/>
		<reference ref_id="CVE-2022-22592" ref_url="https://www.suse.com/security/cve/CVE-2022-22592/" source="CVE"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.34.5 (bsc#1195735):

- CVE-2022-22589: A validation issue was addressed with improved input sanitization.
- CVE-2022-22590: A use after free issue was addressed with improved memory management.
- CVE-2022-22592: A logic issue was addressed with improved state management.

Update to version 2.34.4 (bsc#1195064):

- CVE-2021-30934: A buffer overflow issue was addressed with improved memory handling.
- CVE-2021-30936: A use after free issue was addressed with improved memory management.
- CVE-2021-30951: A use after free issue was addressed with improved memory management.
- CVE-2021-30952: An integer overflow was addressed with improved input validation.
- CVE-2021-30953: An out-of-bounds read was addressed with improved bounds checking.
- CVE-2021-30954: A type confusion issue was addressed with improved memory handling.
- CVE-2021-30984: A race condition was addressed with improved state handling.
- CVE-2022-22594: A cross-origin issue in the IndexDB API was addressed with improved input validation.

The following CVEs were addressed in a previous update:

- CVE-2021-45481: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create.
- CVE-2021-45482: A use-after-free in WebCore::ContainerNode::firstChild.
- CVE-2021-45483: A use-after-free in WebCore::Frame::page.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195735">SUSE bug 1195735</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30934/">CVE-2021-30934 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30934">CVE-2021-30934 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30936/">CVE-2021-30936 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30936">CVE-2021-30936 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30951/">CVE-2021-30951 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30951">CVE-2021-30951 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30952/">CVE-2021-30952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30952">CVE-2021-30952 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30953/">CVE-2021-30953 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30953">CVE-2021-30953 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30954/">CVE-2021-30954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30954">CVE-2021-30954 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30984/">CVE-2021-30984 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30984">CVE-2021-30984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45481/">CVE-2021-45481 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45481">CVE-2021-45481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45482/">CVE-2021-45482 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45482">CVE-2021-45482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45483/">CVE-2021-45483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45483">CVE-2021-45483 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-22589/">CVE-2022-22589 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22589">CVE-2022-22589 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22590/">CVE-2022-22590 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22590">CVE-2022-22590 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22592/">CVE-2022-22592 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22592">CVE-2022-22592 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22594">CVE-2022-22594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670840" comment="libjavascriptcoregtk-4_0-18-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670841" comment="libwebkit2gtk-4_0-37-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669688" comment="libwebkit2gtk3-lang-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670842" comment="typelib-1_0-JavaScriptCore-4_0-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670843" comment="typelib-1_0-WebKit2-4_0-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670844" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670845" comment="webkit2gtk-4_0-injected-bundles-2.34.5-2.85.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151794" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196026" ref_url="https://bugzilla.suse.com/1196026" source="BUGZILLA"/>
		<reference ref_id="1196168" ref_url="https://bugzilla.suse.com/1196168" source="BUGZILLA"/>
		<reference ref_id="1196169" ref_url="https://bugzilla.suse.com/1196169" source="BUGZILLA"/>
		<reference ref_id="1196171" ref_url="https://bugzilla.suse.com/1196171" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">CVE-2022-25313 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25314">CVE-2022-25314 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670846" comment="expat-2.1.0-21.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670847" comment="libexpat1-2.1.0-21.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669384" comment="libexpat1-32bit-2.1.0-21.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151795" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1089030" ref_url="https://bugzilla.suse.com/1089030" source="BUGZILLA"/>
		<reference ref_id="1163882" ref_url="https://bugzilla.suse.com/1163882" source="BUGZILLA"/>
		<reference ref_id="1196435" ref_url="https://bugzilla.suse.com/1196435" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1100" ref_url="https://www.suse.com/security/cve/CVE-2018-1100/" source="CVE"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<reference ref_id="CVE-2021-45444" ref_url="https://www.suse.com/security/cve/CVE-2021-45444/" source="CVE"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2021-45444: Fixed a vulnerability where arbitrary shell commands could be 
  executed related to prompt expansion (bsc#1196435).
- CVE-2019-20044: Fixed a vulnerability where shell privileges would not be
  properly dropped when unsetting the PRIVILEGED option (bsc#1163882).
- CVE-2018-1100: Fixed a potential code execution via a stack-based buffer
  overflow in utils.c:checkmailpath() (bsc#1089030).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1089030">SUSE bug 1089030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196435">SUSE bug 1196435</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1100/">CVE-2018-1100 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1100">CVE-2018-1100 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20044">CVE-2019-20044 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45444/">CVE-2021-45444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45444">CVE-2021-45444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670848" comment="zsh-5.0.5-6.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151796" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1146312" ref_url="https://bugzilla.suse.com/1146312" source="BUGZILLA"/>
		<reference ref_id="1185973" ref_url="https://bugzilla.suse.com/1185973" source="BUGZILLA"/>
		<reference ref_id="1191580" ref_url="https://bugzilla.suse.com/1191580" source="BUGZILLA"/>
		<reference ref_id="1193731" ref_url="https://bugzilla.suse.com/1193731" source="BUGZILLA"/>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="1195536" ref_url="https://bugzilla.suse.com/1195536" source="BUGZILLA"/>
		<reference ref_id="1195543" ref_url="https://bugzilla.suse.com/1195543" source="BUGZILLA"/>
		<reference ref_id="1195612" ref_url="https://bugzilla.suse.com/1195612" source="BUGZILLA"/>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195939" ref_url="https://bugzilla.suse.com/1195939" source="BUGZILLA"/>
		<reference ref_id="1196079" ref_url="https://bugzilla.suse.com/1196079" source="BUGZILLA"/>
		<reference ref_id="1196612" ref_url="https://bugzilla.suse.com/1196612" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10905" ref_url="https://www.suse.com/security/cve/CVE-2016-10905/" source="CVE"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.


Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc (bsc#1193731).
- CVE-2016-10905: Fixed a use-after-free is gfs2_clear_rgrpd() and read_rindex_entry() (bsc#1146312).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-08"/>
	<updated date="2022-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146312">SUSE bug 1146312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185973">SUSE bug 1185973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193731">SUSE bug 1193731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195536">SUSE bug 1195536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195612">SUSE bug 1195612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195939">SUSE bug 1195939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10905/">CVE-2016-10905 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10905">CVE-2016-10905 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0920">CVE-2021-0920 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0002">CVE-2022-0002 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0617">CVE-2022-0617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24448">CVE-2022-24448 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671808" comment="kernel-default-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671809" comment="kernel-default-base-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671810" comment="kernel-default-devel-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671811" comment="kernel-default-kgraft-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671768" comment="kernel-devel-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671769" comment="kernel-macros-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671770" comment="kernel-source-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671812" comment="kernel-syms-4.4.180-94.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671813" comment="kgraft-patch-4_4_180-94_156-default-1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151797" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1196809" ref_url="https://bugzilla.suse.com/1196809" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):

- CVE-2022-26485: Use-after-free in XSLT parameter processing
- CVE-2022-26486: Use-after-free in WebGPU IPC Framework
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26485">CVE-2022-26485 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26486">CVE-2022-26486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672449" comment="MozillaFirefox-91.6.1-112.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672450" comment="MozillaFirefox-devel-91.6.1-112.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672451" comment="MozillaFirefox-translations-common-91.6.1-112.92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151798" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22620" ref_url="https://www.suse.com/security/cve/CVE-2022-22620/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.34.6 (bsc#1196133):

- CVE-2022-22620: Processing maliciously crafted web content may have lead to arbitrary code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-11"/>
	<updated date="2022-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22620/">CVE-2022-22620 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22620">CVE-2022-22620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673343" comment="libjavascriptcoregtk-4_0-18-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673344" comment="libwebkit2gtk-4_0-37-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670802" comment="libwebkit2gtk3-lang-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673345" comment="typelib-1_0-JavaScriptCore-4_0-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673346" comment="typelib-1_0-WebKit2-4_0-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673347" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673348" comment="webkit2gtk-4_0-injected-bundles-2.34.6-2.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151799" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1184751" ref_url="https://bugzilla.suse.com/1184751" source="BUGZILLA"/>
		<reference ref_id="1184752" ref_url="https://bugzilla.suse.com/1184752" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-30498, CVE-2021-30499: If an image has a size of 0x0, when exporting, no 
  data is written and space is allocated for the header only, not taking into
  account that sprintf appends a NUL byte (bsc#1184751, bsc#1184752).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184751">SUSE bug 1184751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184752">SUSE bug 1184752</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30498">CVE-2021-30498 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30499">CVE-2021-30499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673349" comment="libcaca0-0.99.beta18-14.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151800" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1196900" ref_url="https://bugzilla.suse.com/1196900" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):

- CVE-2022-26383: Browser window spoof using fullscreen mode
- CVE-2022-26384: iframe allow-scripts sandbox bypass
- CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures
- CVE-2022-26381: Use-after-free in text reflows
- CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26381">CVE-2022-26381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26383">CVE-2022-26383 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26384">CVE-2022-26384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26386">CVE-2022-26386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26387">CVE-2022-26387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673350" comment="MozillaFirefox-91.7.0-112.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673351" comment="MozillaFirefox-devel-91.7.0-112.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673352" comment="MozillaFirefox-translations-common-91.7.0-112.95.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151801" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196784" ref_url="https://bugzilla.suse.com/1196784" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673353" comment="expat-2.1.0-21.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673354" comment="libexpat1-2.1.0-21.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671275" comment="libexpat1-32bit-2.1.0-21.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151802" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673355" comment="libopenssl-devel-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673356" comment="libopenssl1_0_0-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673023" comment="libopenssl1_0_0-32bit-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673357" comment="libopenssl1_0_0-hmac-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673025" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673358" comment="openssl-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673027" comment="openssl-doc-1.0.2j-60.75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151803" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1193314" ref_url="https://bugzilla.suse.com/1193314" source="BUGZILLA"/>
		<reference ref_id="1193444" ref_url="https://bugzilla.suse.com/1193444" source="BUGZILLA"/>
		<reference ref_id="1193491" ref_url="https://bugzilla.suse.com/1193491" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1195163" ref_url="https://bugzilla.suse.com/1195163" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u322 (icedtea-3.22.0)

Including the following security fixes:

- CVE-2022-21248, bsc#1194926: Enhance cross VM serialization
- CVE-2022-21283, bsc#1194937: Better String matching
- CVE-2022-21293, bsc#1194935: Improve String constructions
- CVE-2022-21294, bsc#1194934: Enhance construction of Identity maps
- CVE-2022-21282, bsc#1194933: Better resolution of URIs
- CVE-2022-21296, bsc#1194932: Improve SAX Parser configuration management
- CVE-2022-21299, bsc#1194931: Improved scanning of XML entities
- CVE-2022-21305, bsc#1194939: Better array indexing
- CVE-2022-21340, bsc#1194940: Verify Jar Verification
- CVE-2022-21341, bsc#1194941: Improve serial forms for transport
- CVE-2022-21349: Improve Solaris font rendering
- CVE-2022-21360, bsc#1194929: Enhance BMP image support
- CVE-2022-21365, bsc#1194928: Enhanced BMP processing
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193314">SUSE bug 1193314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193444">SUSE bug 1193444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193491">SUSE bug 1193491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195163">SUSE bug 1195163</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21349">CVE-2022-21349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673359" comment="java-1_8_0-openjdk-1.8.0.322-27.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673360" comment="java-1_8_0-openjdk-demo-1.8.0.322-27.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673361" comment="java-1_8_0-openjdk-devel-1.8.0.322-27.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673362" comment="java-1_8_0-openjdk-headless-1.8.0.322-27.72.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151804" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1194640" ref_url="https://bugzilla.suse.com/1194640" source="BUGZILLA"/>
		<reference ref_id="1194768" ref_url="https://bugzilla.suse.com/1194768" source="BUGZILLA"/>
		<reference ref_id="1194770" ref_url="https://bugzilla.suse.com/1194770" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2022-23219: Fixed buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768)
- CVE-2022-23218: Fixed buffer overflow in sunrpc svcunix_create (bsc#1194770)
- CVE-2021-3999: Fixed getcwd to set errno to ERANGE for size == 1 (bsc#1194640)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3999">CVE-2021-3999 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">CVE-2022-23218 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">CVE-2022-23219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674051" comment="glibc-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673010" comment="glibc-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674052" comment="glibc-devel-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673012" comment="glibc-devel-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673013" comment="glibc-html-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673014" comment="glibc-i18ndata-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673015" comment="glibc-info-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674053" comment="glibc-locale-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673017" comment="glibc-locale-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674054" comment="glibc-profile-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673019" comment="glibc-profile-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674055" comment="nscd-2.22-119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151805" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-ESPOS</platform>
		</affected>
		<reference ref_id="1197091" ref_url="https://bugzilla.suse.com/1197091" source="BUGZILLA"/>
		<reference ref_id="1197095" ref_url="https://bugzilla.suse.com/1197095" source="BUGZILLA"/>
		<reference ref_id="1197096" ref_url="https://bugzilla.suse.com/1197096" source="BUGZILLA"/>
		<reference ref_id="1197098" ref_url="https://bugzilla.suse.com/1197098" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22719" ref_url="https://www.suse.com/security/cve/CVE-2022-22719/" source="CVE"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<reference ref_id="CVE-2022-23943" ref_url="https://www.suse.com/security/cve/CVE-2022-23943/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-23943: heap out-of-bounds write in mod_sed (bsc#1197098).
- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22719: use of uninitialized value of in r:parsebody in mod_lua (bsc#1197091).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197091">SUSE bug 1197091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197098">SUSE bug 1197098</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22719/">CVE-2022-22719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22719">CVE-2022-22719 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22720">CVE-2022-22720 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22721">CVE-2022-22721 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23943/">CVE-2022-23943 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23943">CVE-2022-23943 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132443" comment="SUSE Linux Enterprise Server 12 SP3-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674056" comment="apache2-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673736" comment="apache2-doc-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674057" comment="apache2-example-pages-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674058" comment="apache2-prefork-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674059" comment="apache2-utils-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674060" comment="apache2-worker-2.4.23-29.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151806" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1092874" ref_url="https://bugzilla.suse.com/1092874" source="BUGZILLA"/>
		<reference ref_id="1094932" ref_url="https://bugzilla.suse.com/1094932" source="BUGZILLA"/>
		<reference ref_id="1096748" ref_url="https://bugzilla.suse.com/1096748" source="BUGZILLA"/>
		<reference ref_id="1099162" ref_url="https://bugzilla.suse.com/1099162" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10861" ref_url="https://www.suse.com/security/cve/CVE-2018-10861/" source="CVE"/>
		<reference ref_id="CVE-2018-1128" ref_url="https://www.suse.com/security/cve/CVE-2018-1128/" source="CVE"/>
		<reference ref_id="CVE-2018-1129" ref_url="https://www.suse.com/security/cve/CVE-2018-1129/" source="CVE"/>
		<description>
This update for ceph fixes the following issues:

- Update to version 12.2.7-420-gc0ef85b854:
    * https://ceph.com/releases/12-2-7-luminous-released/
    * luminous: osd: eternal stuck PG in 'unfound_recovery' (bsc#1094932)
    * bluestore: db.slow used when db is not full (bsc#1092874)

    * CVE-2018-10861: Ensure that ceph-mon does perform authorization on all OSD pool ops (bsc#1099162).
    * CVE-2018-1129: cephx signature check bypass (bsc#1096748).
    * CVE-2018-1128: cephx protocol was vulnerable to replay attack (bsc#1096748).

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-03"/>
	<updated date="2018-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092874">SUSE bug 1092874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094932">SUSE bug 1094932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096748">SUSE bug 1096748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099162">SUSE bug 1099162</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10861/">CVE-2018-10861 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10861">CVE-2018-10861 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-1128/">CVE-2018-1128 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1128">CVE-2018-1128 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1129/">CVE-2018-1129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1129">CVE-2018-1129 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519863" comment="ceph-common-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519864" comment="libcephfs2-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519865" comment="librados2-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519866" comment="libradosstriper1-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519867" comment="librbd1-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519868" comment="librgw2-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519869" comment="python-cephfs-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519870" comment="python-rados-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519871" comment="python-rbd-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519872" comment="python-rgw-12.2.7+git.1531910353.c0ef85b854-2.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151807" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1052916" ref_url="https://bugzilla.suse.com/1052916" source="BUGZILLA"/>
		<reference ref_id="1086036" ref_url="https://bugzilla.suse.com/1086036" source="BUGZILLA"/>
		<reference ref_id="1100097" ref_url="https://bugzilla.suse.com/1100097" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2885" ref_url="https://www.suse.com/security/cve/CVE-2017-2885/" source="CVE"/>
		<reference ref_id="CVE-2018-12910" ref_url="https://www.suse.com/security/cve/CVE-2018-12910/" source="CVE"/>
		<description>
This update for libsoup fixes the following issues:

Security issue fixed:

- CVE-2018-12910: Fix crash when handling empty hostnames (bsc#1100097).
- CVE-2017-2885: Fix chunk decoding buffer overrun that could be exploited against either clients or servers (bsc#1052916).

Bug fixes:

- bsc#1086036: translation-update-upstream commented out for Leap
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-06"/>
	<updated date="2018-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1052916">SUSE bug 1052916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086036">SUSE bug 1086036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100097">SUSE bug 1100097</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2885/">CVE-2017-2885 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2885">CVE-2017-2885 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12910/">CVE-2018-12910 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12910">CVE-2018-12910 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519873" comment="libsoup-2_4-1-2.62.2-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519874" comment="libsoup-2_4-1-32bit-2.62.2-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519875" comment="libsoup-lang-2.62.2-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519876" comment="typelib-1_0-Soup-2_4-2.62.2-5.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151808" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1067700" ref_url="https://bugzilla.suse.com/1067700" source="BUGZILLA"/>
		<reference ref_id="1068059" ref_url="https://bugzilla.suse.com/1068059" source="BUGZILLA"/>
		<reference ref_id="1087303" ref_url="https://bugzilla.suse.com/1087303" source="BUGZILLA"/>
		<reference ref_id="1103411" ref_url="https://bugzilla.suse.com/1103411" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

The following security vulnerability was fixed:

- CVE-2018-10858: Fixed insufficient input validation on client directory
  listing in libsmbclient; (bsc#1103411);

The following other change was made:

- s3: winbind: Fix 'winbind normalize names' in wb_getpwsid();
- winbind: honor 'winbind use default domain' with empty domain (bsc#1087303)
- winbind: do not modify credentials in NTLM passthru (bsc#1068059)
- net: fix net ads keytab handling (bsc#1067700)
- fix vfs_ceph flock stub
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1067700">SUSE bug 1067700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068059">SUSE bug 1068059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087303">SUSE bug 1087303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10858">CVE-2018-10858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519907" comment="libdcerpc-binding0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519908" comment="libdcerpc-binding0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519909" comment="libdcerpc0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519910" comment="libdcerpc0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519911" comment="libndr-krb5pac0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519912" comment="libndr-krb5pac0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519913" comment="libndr-nbt0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519914" comment="libndr-nbt0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519915" comment="libndr-standard0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519916" comment="libndr-standard0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519917" comment="libndr0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519918" comment="libndr0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519919" comment="libnetapi0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519920" comment="libnetapi0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519921" comment="libsamba-credentials0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519922" comment="libsamba-credentials0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519923" comment="libsamba-errors0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519924" comment="libsamba-errors0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519925" comment="libsamba-hostconfig0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519926" comment="libsamba-hostconfig0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519927" comment="libsamba-passdb0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519928" comment="libsamba-passdb0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519929" comment="libsamba-util0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519930" comment="libsamba-util0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519931" comment="libsamdb0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519932" comment="libsamdb0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519933" comment="libsmbclient0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519934" comment="libsmbclient0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519935" comment="libsmbconf0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519936" comment="libsmbconf0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519937" comment="libsmbldap0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519938" comment="libsmbldap0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519939" comment="libtevent-util0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519940" comment="libtevent-util0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519941" comment="libwbclient0-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519942" comment="libwbclient0-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519943" comment="samba-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519944" comment="samba-client-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519945" comment="samba-client-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519946" comment="samba-doc-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519947" comment="samba-libs-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519948" comment="samba-libs-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519949" comment="samba-winbind-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519950" comment="samba-winbind-32bit-4.6.14+git.157.c2d53c2b191-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151809" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1098998" ref_url="https://bugzilla.suse.com/1098998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12368" ref_url="https://www.suse.com/security/cve/CVE-2018-12368/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<description>
This update for MozillaFirefox to version ESR 52.9 fixes the following issues:

- CVE-2018-5188: Various memory safety bugs (bsc#1098998)
- CVE-2018-12368: No warning when opening executable SettingContent-ms files
- CVE-2018-12366: Invalid data handling during QCMS transformations
- CVE-2018-12365: Compromised IPC child process can list local filenames
- CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins
- CVE-2018-12363: Use-after-free when appending DOM nodes
- CVE-2018-12362: Integer overflow in SSSE3 scaler
- CVE-2018-12360: Use-after-free when using focus()
- CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture
- CVE-2018-12359: Buffer overflow using computed size of canvas element
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12359">CVE-2018-12359 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12360">CVE-2018-12360 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12362">CVE-2018-12362 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12363">CVE-2018-12363 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12364">CVE-2018-12364 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12365">CVE-2018-12365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12366">CVE-2018-12366 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12368/">CVE-2018-12368 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12368">CVE-2018-12368 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5156">CVE-2018-5156 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5188">CVE-2018-5188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519952" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151810" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1082858" ref_url="https://bugzilla.suse.com/1082858" source="BUGZILLA"/>
		<reference ref_id="1101410" ref_url="https://bugzilla.suse.com/1101410" source="BUGZILLA"/>
		<reference ref_id="1101412" ref_url="https://bugzilla.suse.com/1101412" source="BUGZILLA"/>
		<reference ref_id="1101654" ref_url="https://bugzilla.suse.com/1101654" source="BUGZILLA"/>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0360" ref_url="https://www.suse.com/security/cve/CVE-2018-0360/" source="CVE"/>
		<reference ref_id="CVE-2018-0361" ref_url="https://www.suse.com/security/cve/CVE-2018-0361/" source="CVE"/>
		<reference ref_id="CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085/" source="CVE"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<description>
This update for clamav to version 0.100.1 fixes the following issues:
  
The following security vulnerabilities were addressed:
  
- CVE-2018-0360: HWP integer overflow, infinite loop vulnerability (bsc#1101410)
- CVE-2018-0361: PDF object length check, unreasonably long time to parse relatively small file (bsc#1101412)
- CVE-2018-1000085: Fixed a out-of-bounds heap read in XAR parser (bsc#1082858)
- CVE-2018-14679: Libmspack heap buffer over-read in CHM parser (bsc#1103040)
- Buffer over-read in unRAR code due to missing max value checks in table initialization
- PDF parser bugs

The following other changes were made:

- Disable YARA support for licensing reasons (bsc#1101654).
- Add HTTPS support for clamsubmit
- Fix for DNS resolution for users on IPv4-only machines where IPv6 is not
  available or is link-local only
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082858">SUSE bug 1082858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101410">SUSE bug 1101410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101412">SUSE bug 1101412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101654">SUSE bug 1101654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0360/">CVE-2018-0360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0360">CVE-2018-0360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0361/">CVE-2018-0361 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0361">CVE-2018-0361 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000085">CVE-2018-1000085 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14679">CVE-2018-14679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519953" comment="clamav-0.100.1-33.15.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151811" version="1" class="patch">
	<metadata>
		<title>Security update to ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1104134" ref_url="https://bugzilla.suse.com/1104134" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<description>

ucode-intel was updated to the 20180807 release.

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and is
part of the mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646
(L1 Terminal fault).
(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)

 Processor             Identifier     Version       Products

 Model        Stepping F-MO-S/PI      Old-&gt;New

 ---- new platforms ----------------------------------------
 WSM-EP/WS    U1       6-2c-2/03           0000001f Xeon E/L/X56xx, W36xx
 NHM-EX       D0       6-2e-6/04           0000000d Xeon E/L/X65xx/75xx
 BXT          C0       6-5c-2/01           00000014 Atom T5500/5700
 APL          E0       6-5c-a/03           0000000c Atom x5-E39xx
 DVN          B0       6-5f-1/01           00000024 Atom C3xxx
 ---- updated platforms ------------------------------------
 NHM-EP/WS    D0       6-1a-5/03 00000019-&gt;0000001d Xeon E/L/X/W55xx
 NHM          B1       6-1e-5/13 00000007-&gt;0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx
 WSM          B1       6-25-2/12 0000000e-&gt;00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406
 WSM          K0       6-25-5/92 00000004-&gt;00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx
 SNB          D2       6-2a-7/12 0000002d-&gt;0000002e Core Gen2; Xeon E3
 WSM-EX       A2       6-2f-2/05 00000037-&gt;0000003b Xeon E7
 IVB          E2       6-3a-9/12 0000001f-&gt;00000020 Core Gen3 Mobile
 HSW-H/S/E3   Cx/Dx    6-3c-3/32 00000024-&gt;00000025 Core Gen4 Desktop; Xeon E3 v3
 BDW-U/Y      E/F      6-3d-4/c0 0000002a-&gt;0000002b Core Gen5 Mobile
 HSW-ULT      Cx/Dx    6-45-1/72 00000023-&gt;00000024 Core Gen4 Mobile and derived Pentium/Celeron
 HSW-H        Cx       6-46-1/32 00000019-&gt;0000001a Core Extreme i7-5xxxX
 BDW-H/E3     E/G      6-47-1/22 0000001d-&gt;0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4
 SKL-U/Y      D0       6-4e-3/c0 000000c2-&gt;000000c6 Core Gen6 Mobile
 BDX-DE       V1       6-56-2/10 00000015-&gt;00000017 Xeon D-1520/40
 BDX-DE       V2/3     6-56-3/10 07000012-&gt;07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
 BDX-DE       Y0       6-56-4/10 0f000011-&gt;0f000012 Xeon D-1557/59/67/71/77/81/87
 APL          D0       6-5c-9/03 0000002c-&gt;00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
 SKL-H/S/E3   R0       6-5e-3/36 000000c2-&gt;000000c6 Core Gen6; Xeon E3 v5
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-15"/>
	<updated date="2018-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104134">SUSE bug 1104134</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3640">CVE-2018-3640 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519961" comment="ucode-intel-20180807-13.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151812" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1101689" ref_url="https://bugzilla.suse.com/1101689" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1333" ref_url="https://www.suse.com/security/cve/CVE-2018-1333/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

The following security vulnerability were fixed:

- CVE-2018-1333: Fixed a worker exhaustion that could have lead to a denial
  of service via specially crafted HTTP/2 requests (bsc#1101689).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-15"/>
	<updated date="2018-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101689">SUSE bug 1101689</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1333/">CVE-2018-1333 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1333">CVE-2018-1333 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557175" comment="apache2-2.4.23-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553085" comment="apache2-doc-2.4.23-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557176" comment="apache2-example-pages-2.4.23-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557177" comment="apache2-prefork-2.4.23-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557178" comment="apache2-utils-2.4.23-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557179" comment="apache2-worker-2.4.23-29.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151813" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1039291" ref_url="https://bugzilla.suse.com/1039291" source="BUGZILLA"/>
		<reference ref_id="1042657" ref_url="https://bugzilla.suse.com/1042657" source="BUGZILLA"/>
		<reference ref_id="956357" ref_url="https://bugzilla.suse.com/956357" source="BUGZILLA"/>
		<reference ref_id="964458" ref_url="https://bugzilla.suse.com/964458" source="BUGZILLA"/>
		<reference ref_id="982826" ref_url="https://bugzilla.suse.com/982826" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10040" ref_url="https://www.suse.com/security/cve/CVE-2016-10040/" source="CVE"/>
		<description>

This update for libqt4 fixes the following issues:

LibQt4 was updated to 4.8.7 (bsc#1039291, CVE-2016-10040):

See
	http://download.qt.io/official_releases/qt/4.8/4.8.7/changes-4.8.7
for more details.

Also libQtWebkit4 was updated to 2.3.4 to match libqt4.

Also following bugs were fixed:

- Enable libqt4-devel-32bit (bsc#982826)
- Fixed bolder font in Qt4 apps (boo#956357)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039291">SUSE bug 1039291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042657">SUSE bug 1042657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956357">SUSE bug 956357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964458">SUSE bug 964458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982826">SUSE bug 982826</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10040/">CVE-2016-10040 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10040">CVE-2016-10040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557180" comment="libQtWebKit4-4.8.7+2.3.4-4.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557181" comment="libQtWebKit4-32bit-4.8.7+2.3.4-4.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557182" comment="libqca2-2.0.3-17.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557183" comment="libqca2-32bit-2.0.3-17.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557184" comment="libqt4-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557185" comment="libqt4-32bit-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557186" comment="libqt4-qt3support-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557187" comment="libqt4-qt3support-32bit-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557188" comment="libqt4-sql-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557189" comment="libqt4-sql-32bit-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557190" comment="libqt4-sql-mysql-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557191" comment="libqt4-sql-sqlite-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557192" comment="libqt4-x11-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557193" comment="libqt4-x11-32bit-4.8.7-8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557194" comment="qt4-x11-tools-4.8.7-8.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151814" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1077330" ref_url="https://bugzilla.suse.com/1077330" source="BUGZILLA"/>
		<reference ref_id="1094290" ref_url="https://bugzilla.suse.com/1094290" source="BUGZILLA"/>
		<reference ref_id="1094291" ref_url="https://bugzilla.suse.com/1094291" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<description>
This update for ovmf provide the following fix:

Security issues fixed:

- CVE-2018-0739: Update openssl to 1.0.2o to limit ASN.1 constructed types
  recursive definition depth (bsc#1094290, bsc#1094291).

Bug fixes:

- Only use SLES-UEFI-CA-Certificate-2048.crt for the SUSE flavor to provide the
  better compatibility. (bsc#1077330)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077330">SUSE bug 1077330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094290">SUSE bug 1094290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094291">SUSE bug 1094291</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739">CVE-2018-0739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557195" comment="ovmf-2017+git1492060560.b6d11d7c46-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557196" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557197" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151815" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1050082" ref_url="https://bugzilla.suse.com/1050082" source="BUGZILLA"/>
		<reference ref_id="1061066" ref_url="https://bugzilla.suse.com/1061066" source="BUGZILLA"/>
		<reference ref_id="1087018" ref_url="https://bugzilla.suse.com/1087018" source="BUGZILLA"/>
		<reference ref_id="1096405" ref_url="https://bugzilla.suse.com/1096405" source="BUGZILLA"/>
		<reference ref_id="1096406" ref_url="https://bugzilla.suse.com/1096406" source="BUGZILLA"/>
		<reference ref_id="1096407" ref_url="https://bugzilla.suse.com/1096407" source="BUGZILLA"/>
		<reference ref_id="1096408" ref_url="https://bugzilla.suse.com/1096408" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18248" ref_url="https://www.suse.com/security/cve/CVE-2017-18248/" source="CVE"/>
		<reference ref_id="CVE-2018-4180" ref_url="https://www.suse.com/security/cve/CVE-2018-4180/" source="CVE"/>
		<reference ref_id="CVE-2018-4181" ref_url="https://www.suse.com/security/cve/CVE-2018-4181/" source="CVE"/>
		<reference ref_id="CVE-2018-4182" ref_url="https://www.suse.com/security/cve/CVE-2018-4182/" source="CVE"/>
		<reference ref_id="CVE-2018-4183" ref_url="https://www.suse.com/security/cve/CVE-2018-4183/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

The following security vulnerabilities were fixed:

- CVE-2017-18248: Handle invalid characters properly in printing jobs. This fixes a problem that
  was causing the DBUS library to abort the calling process. (bsc#1061066 bsc#1087018)
- Fixed a local privilege escalation to root and sandbox bypasses in the
  scheduler
- CVE-2018-4180: Fixed a local privilege escalation to root in dnssd backend
  (bsc#1096405)
- CVE-2018-4181: Limited local file reads as root via cupsd.conf include
  directive (bsc#1096406)
- CVE-2018-4182: Fixed a sandbox bypass due to insecure error handling
  (bsc#1096407)
- CVE-2018-4183: Fixed a sandbox bypass due to profile misconfiguration
  (bsc#1096408)

The following other issue was fixed:

- Fixed authorization check for clients (like samba) connected through the
  local socket when Kerberos authentication is enabled (bsc#1050082)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050082">SUSE bug 1050082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061066">SUSE bug 1061066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087018">SUSE bug 1087018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096405">SUSE bug 1096405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096406">SUSE bug 1096406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096407">SUSE bug 1096407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096408">SUSE bug 1096408</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18248/">CVE-2017-18248 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18248">CVE-2017-18248 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4180/">CVE-2018-4180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4180">CVE-2018-4180 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4181/">CVE-2018-4181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4181">CVE-2018-4181 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4182/">CVE-2018-4182 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4182">CVE-2018-4182 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4183/">CVE-2018-4183 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4183">CVE-2018-4183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557198" comment="cups-1.7.5-20.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557199" comment="cups-client-1.7.5-20.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557200" comment="cups-libs-1.7.5-20.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557201" comment="cups-libs-32bit-1.7.5-20.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151816" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1064455" ref_url="https://bugzilla.suse.com/1064455" source="BUGZILLA"/>
		<reference ref_id="1090766" ref_url="https://bugzilla.suse.com/1090766" source="BUGZILLA"/>
		<reference ref_id="1097410" ref_url="https://bugzilla.suse.com/1097410" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<description>
This update for libgcrypt fixes the following issues:

The following security vulnerability was addressed:

- CVE-2018-0495: Mitigate a novel side-channel attack by enabling blinding for
  ECDSA signatures (bsc#1097410).

The following other issues were fixed:

- Extended the fipsdrv dsa-sign and dsa-verify commands with the
  --algo parameter for the FIPS testing of DSA SigVer and SigGen (bsc#1064455).
- Ensure libgcrypt20-hmac and libgcrypt20 are installed in the correct order. (bsc#1090766)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064455">SUSE bug 1064455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090766">SUSE bug 1090766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097410">SUSE bug 1097410</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0495">CVE-2018-0495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557202" comment="libgcrypt20-1.6.1-16.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557203" comment="libgcrypt20-32bit-1.6.1-16.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557204" comment="libgcrypt20-hmac-1.6.1-16.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557205" comment="libgcrypt20-hmac-32bit-1.6.1-16.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151817" version="1" class="patch">
	<metadata>
		<title>Security update for nautilus (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1060031" ref_url="https://bugzilla.suse.com/1060031" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14604" ref_url="https://www.suse.com/security/cve/CVE-2017-14604/" source="CVE"/>
		<description>
This update for nautilus fixes the following issues:

Security issue fixed:

- CVE-2017-14604: Add a metadata::trusted metadata to the file once the user
  acknowledges the file as trusted, and also remove the 'trusted' content in the
  desktop file (bsc#1060031).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1060031">SUSE bug 1060031</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14604/">CVE-2017-14604 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14604">CVE-2017-14604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557206" comment="gnome-shell-search-provider-nautilus-3.20.3-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557207" comment="libnautilus-extension1-3.20.3-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557208" comment="nautilus-3.20.3-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557209" comment="nautilus-lang-3.20.3-23.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151818" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1083507" ref_url="https://bugzilla.suse.com/1083507" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<description>
This update for python fixes the following issues:

The following security vulnerabilities were addressed:

- Add a check to Lib/wave.py that verifies that at least one channel is
  provided. Prior to this, attackers could cause a denial of service via a
  crafted wav format audio file. [bsc#1083507, CVE-2017-18207]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083507">SUSE bug 1083507</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18207">CVE-2017-18207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557210" comment="libpython2_7-1_0-2.7.13-28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557211" comment="libpython2_7-1_0-32bit-2.7.13-28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557212" comment="python-2.7.13-28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557213" comment="python-32bit-2.7.13-28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557214" comment="python-base-2.7.13-28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557215" comment="python-base-32bit-2.7.13-28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557216" comment="python-curses-2.7.13-28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557217" comment="python-demo-2.7.13-28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557218" comment="python-doc-2.7.13-28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557219" comment="python-doc-pdf-2.7.13-28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557220" comment="python-gdbm-2.7.13-28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557221" comment="python-idle-2.7.13-28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557222" comment="python-tk-2.7.13-28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557223" comment="python-xml-2.7.13-28.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151819" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1071767" ref_url="https://bugzilla.suse.com/1071767" source="BUGZILLA"/>
		<reference ref_id="1071777" ref_url="https://bugzilla.suse.com/1071777" source="BUGZILLA"/>
		<reference ref_id="1100167" ref_url="https://bugzilla.suse.com/1100167" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17456" ref_url="https://www.suse.com/security/cve/CVE-2017-17456/" source="CVE"/>
		<reference ref_id="CVE-2017-17457" ref_url="https://www.suse.com/security/cve/CVE-2017-17457/" source="CVE"/>
		<reference ref_id="CVE-2018-13139" ref_url="https://www.suse.com/security/cve/CVE-2018-13139/" source="CVE"/>
		<description>
This update for libsndfile fixes the following issues:

Security issues fixed:

- CVE-2018-13139: Fix a stack-based buffer overflow in psf_memset in common.c that allows remote attackers to cause a denial of service (bsc#1100167).
- CVE-2017-17456: Prevent segmentation fault in the function d2alaw_array() that may have lead to a remote DoS (bsc#1071777)
- CVE-2017-17457: Prevent segmentation fault in the function d2ulaw_array() that may have lead to a remote DoS, a different vulnerability than CVE-2017-14246 (bsc#1071767)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1071767">SUSE bug 1071767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071777">SUSE bug 1071777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100167">SUSE bug 1100167</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17456/">CVE-2017-17456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17456">CVE-2017-17456 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17457/">CVE-2017-17457 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17457">CVE-2017-17457 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13139/">CVE-2018-13139 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13139">CVE-2018-13139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557224" comment="libsndfile1-1.0.25-36.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557225" comment="libsndfile1-32bit-1.0.25-36.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151820" version="1" class="patch">
	<metadata>
		<title>Security update for rsyslog (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="935393" ref_url="https://bugzilla.suse.com/935393" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3243" ref_url="https://www.suse.com/security/cve/CVE-2015-3243/" source="CVE"/>
		<description>
This update for rsyslog fixes the following issues:

The following security vulnerability was addressed:

CVE-2015-3243: Make sure that log files are not created world-readable (bsc#935393)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935393">SUSE bug 935393</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-3243/">CVE-2015-3243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3243">CVE-2015-3243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557226" comment="rsyslog-8.24.0-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557227" comment="rsyslog-diag-tools-8.24.0-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557228" comment="rsyslog-doc-8.24.0-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557229" comment="rsyslog-module-gssapi-8.24.0-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557230" comment="rsyslog-module-gtls-8.24.0-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557231" comment="rsyslog-module-mysql-8.24.0-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557232" comment="rsyslog-module-pgsql-8.24.0-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557233" comment="rsyslog-module-relp-8.24.0-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557234" comment="rsyslog-module-snmp-8.24.0-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557235" comment="rsyslog-module-udpspoof-8.24.0-3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151821" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1072947" ref_url="https://bugzilla.suse.com/1072947" source="BUGZILLA"/>
		<reference ref_id="1078662" ref_url="https://bugzilla.suse.com/1078662" source="BUGZILLA"/>
		<reference ref_id="1080740" ref_url="https://bugzilla.suse.com/1080740" source="BUGZILLA"/>
		<reference ref_id="1084300" ref_url="https://bugzilla.suse.com/1084300" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7738" ref_url="https://www.suse.com/security/cve/CVE-2018-7738/" source="CVE"/>
		<description>
This update for util-linux fixes the following issues:

This non-security issue was fixed:

- CVE-2018-7738: bash-completion/umount allowed local users to gain privileges
  by embedding shell commands in a mountpoint name, which was mishandled during a
  umount command by a different user (bsc#1084300).

These non-security issues were fixed:

- Fixed crash loop in lscpu (bsc#1072947).
- Fixed possible segfault of umount -a
- Fixed mount -a on NFS bind mounts (bsc#1080740).
- Fixed lsblk on NVMe (bsc#1078662).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-27"/>
	<updated date="2018-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1072947">SUSE bug 1072947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078662">SUSE bug 1078662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080740">SUSE bug 1080740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084300">SUSE bug 1084300</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7738/">CVE-2018-7738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7738">CVE-2018-7738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519962" comment="libblkid1-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519963" comment="libblkid1-32bit-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519964" comment="libfdisk1-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519965" comment="libmount1-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519966" comment="libmount1-32bit-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519967" comment="libsmartcols1-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519969" comment="libuuid1-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519970" comment="libuuid1-32bit-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519971" comment="python-libmount-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519972" comment="util-linux-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519973" comment="util-linux-lang-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519974" comment="util-linux-systemd-2.29.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519975" comment="uuidd-2.29.2-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151822" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1076957" ref_url="https://bugzilla.suse.com/1076957" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10708" ref_url="https://www.suse.com/security/cve/CVE-2016-10708/" source="CVE"/>
		<description>
This update for openssh fixes the following issues:

Security issue fixed:

- CVE-2016-10708: Prevent DoS due to crashes caused by out-of-sequence NEWKEYS message (bsc#1076957).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076957">SUSE bug 1076957</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10708/">CVE-2016-10708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10708">CVE-2016-10708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557236" comment="openssh-7.2p2-74.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557237" comment="openssh-askpass-gnome-7.2p2-74.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557238" comment="openssh-fips-7.2p2-74.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557239" comment="openssh-helpers-7.2p2-74.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151823" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1099310" ref_url="https://bugzilla.suse.com/1099310" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6252" ref_url="https://www.suse.com/security/cve/CVE-2016-6252/" source="CVE"/>
		<description>
This update for shadow fixes the following issues:

- CVE-2016-6252: Incorrect integer handling could results in local privilege escalation (bsc#1099310)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1099310">SUSE bug 1099310</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6252/">CVE-2016-6252 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6252">CVE-2016-6252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557240" comment="shadow-4.2.1-27.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151824" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1099031" ref_url="https://bugzilla.suse.com/1099031" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1116" ref_url="https://www.suse.com/security/cve/CVE-2018-1116/" source="CVE"/>
		<description>
This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2018-1116: Fix uid comparison lacking in polkit_backend_interactive_authority_check_authorization (bsc#1099031).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099031">SUSE bug 1099031</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1116/">CVE-2018-1116 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1116">CVE-2018-1116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557241" comment="libpolkit0-0.113-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557242" comment="polkit-0.113-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557243" comment="typelib-1_0-Polkit-1_0-0.113-5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151825" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1072183" ref_url="https://bugzilla.suse.com/1072183" source="BUGZILLA"/>
		<reference ref_id="968175" ref_url="https://bugzilla.suse.com/968175" source="BUGZILLA"/>
		<description>
This update for libtirpc fixes the following issues:

Security issue fixed:

- bsc#968175: Fix remote crash of RPC services.

Bug fixes:

- bsc#1072183: Send RPC getport call as specified via parameter.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1072183">SUSE bug 1072183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968175">SUSE bug 968175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557244" comment="libtirpc-netconfig-1.0.1-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557245" comment="libtirpc3-1.0.1-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557246" comment="libtirpc3-32bit-1.0.1-17.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151826" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1061343" ref_url="https://bugzilla.suse.com/1061343" source="BUGZILLA"/>
		<reference ref_id="1094717" ref_url="https://bugzilla.suse.com/1094717" source="BUGZILLA"/>
		<reference ref_id="1101428" ref_url="https://bugzilla.suse.com/1101428" source="BUGZILLA"/>
		<reference ref_id="1101566" ref_url="https://bugzilla.suse.com/1101566" source="BUGZILLA"/>
		<reference ref_id="1101567" ref_url="https://bugzilla.suse.com/1101567" source="BUGZILLA"/>
		<reference ref_id="1101568" ref_url="https://bugzilla.suse.com/1101568" source="BUGZILLA"/>
		<reference ref_id="1101569" ref_url="https://bugzilla.suse.com/1101569" source="BUGZILLA"/>
		<reference ref_id="1101570" ref_url="https://bugzilla.suse.com/1101570" source="BUGZILLA"/>
		<reference ref_id="1101571" ref_url="https://bugzilla.suse.com/1101571" source="BUGZILLA"/>
		<reference ref_id="1101573" ref_url="https://bugzilla.suse.com/1101573" source="BUGZILLA"/>
		<reference ref_id="1101576" ref_url="https://bugzilla.suse.com/1101576" source="BUGZILLA"/>
		<reference ref_id="1101577" ref_url="https://bugzilla.suse.com/1101577" source="BUGZILLA"/>
		<reference ref_id="1101578" ref_url="https://bugzilla.suse.com/1101578" source="BUGZILLA"/>
		<reference ref_id="1101581" ref_url="https://bugzilla.suse.com/1101581" source="BUGZILLA"/>
		<reference ref_id="1101582" ref_url="https://bugzilla.suse.com/1101582" source="BUGZILLA"/>
		<reference ref_id="1101583" ref_url="https://bugzilla.suse.com/1101583" source="BUGZILLA"/>
		<reference ref_id="1101588" ref_url="https://bugzilla.suse.com/1101588" source="BUGZILLA"/>
		<reference ref_id="1101589" ref_url="https://bugzilla.suse.com/1101589" source="BUGZILLA"/>
		<reference ref_id="980830" ref_url="https://bugzilla.suse.com/980830" source="BUGZILLA"/>
		<reference ref_id="982129" ref_url="https://bugzilla.suse.com/982129" source="BUGZILLA"/>
		<reference ref_id="986534" ref_url="https://bugzilla.suse.com/986534" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9116" ref_url="https://www.suse.com/security/cve/CVE-2014-9116/" source="CVE"/>
		<reference ref_id="CVE-2018-14349" ref_url="https://www.suse.com/security/cve/CVE-2018-14349/" source="CVE"/>
		<reference ref_id="CVE-2018-14350" ref_url="https://www.suse.com/security/cve/CVE-2018-14350/" source="CVE"/>
		<reference ref_id="CVE-2018-14351" ref_url="https://www.suse.com/security/cve/CVE-2018-14351/" source="CVE"/>
		<reference ref_id="CVE-2018-14352" ref_url="https://www.suse.com/security/cve/CVE-2018-14352/" source="CVE"/>
		<reference ref_id="CVE-2018-14353" ref_url="https://www.suse.com/security/cve/CVE-2018-14353/" source="CVE"/>
		<reference ref_id="CVE-2018-14354" ref_url="https://www.suse.com/security/cve/CVE-2018-14354/" source="CVE"/>
		<reference ref_id="CVE-2018-14355" ref_url="https://www.suse.com/security/cve/CVE-2018-14355/" source="CVE"/>
		<reference ref_id="CVE-2018-14356" ref_url="https://www.suse.com/security/cve/CVE-2018-14356/" source="CVE"/>
		<reference ref_id="CVE-2018-14357" ref_url="https://www.suse.com/security/cve/CVE-2018-14357/" source="CVE"/>
		<reference ref_id="CVE-2018-14358" ref_url="https://www.suse.com/security/cve/CVE-2018-14358/" source="CVE"/>
		<reference ref_id="CVE-2018-14359" ref_url="https://www.suse.com/security/cve/CVE-2018-14359/" source="CVE"/>
		<reference ref_id="CVE-2018-14360" ref_url="https://www.suse.com/security/cve/CVE-2018-14360/" source="CVE"/>
		<reference ref_id="CVE-2018-14361" ref_url="https://www.suse.com/security/cve/CVE-2018-14361/" source="CVE"/>
		<reference ref_id="CVE-2018-14362" ref_url="https://www.suse.com/security/cve/CVE-2018-14362/" source="CVE"/>
		<reference ref_id="CVE-2018-14363" ref_url="https://www.suse.com/security/cve/CVE-2018-14363/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

Security issues fixed:

- bsc#1101428: Mutt 1.10.1 security release update.
- CVE-2018-14351: Fix imap/command.c that mishandles long IMAP status mailbox literal count size (bsc#1101583).
- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).
- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).
- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).
- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).
- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).
- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).
- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).
- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).
- CVE-2018-14363: Fix newsrc.c that does not properlyrestrict '/' characters that may have unsafe interaction with cache pathnames (bsc#1101566).
- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).
- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).
- CVE-2018-14360: Fix nntp_add_group in newsrc.c that has a stack-based buffer overflow because of incorrect sscanf usage (bsc#1101569).
- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).
- CVE-2018-14361: Fix that nntp.c proceeds even if memory allocation fails for messages data (bsc#1101568).

Bug fixes:

- mutt reports as neomutt and incorrect version (bsc#1094717)
- No sidebar available in mutt 1.6.1 from Tumbleweed snapshot 20160517 (bsc#980830)
- mutt-1.6.1 unusable when built with --enable-sidebar (bsc#982129)
- (neo)mutt displaying times in Zulu time (bsc#1061343)
- mutt unconditionally segfaults when displaying a message (bsc#986534)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1061343">SUSE bug 1061343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094717">SUSE bug 1094717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101566">SUSE bug 1101566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101567">SUSE bug 1101567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101568">SUSE bug 1101568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101569">SUSE bug 1101569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101570">SUSE bug 1101570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101571">SUSE bug 1101571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101573">SUSE bug 1101573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101576">SUSE bug 1101576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101577">SUSE bug 1101577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101578">SUSE bug 1101578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101581">SUSE bug 1101581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101582">SUSE bug 1101582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101583">SUSE bug 1101583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101588">SUSE bug 1101588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980830">SUSE bug 980830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982129">SUSE bug 982129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986534">SUSE bug 986534</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9116/">CVE-2014-9116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9116">CVE-2014-9116 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14349/">CVE-2018-14349 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14349">CVE-2018-14349 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14350/">CVE-2018-14350 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14350">CVE-2018-14350 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14351/">CVE-2018-14351 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14351">CVE-2018-14351 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14352/">CVE-2018-14352 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14352">CVE-2018-14352 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14353/">CVE-2018-14353 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14353">CVE-2018-14353 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14354/">CVE-2018-14354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14354">CVE-2018-14354 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14355/">CVE-2018-14355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14355">CVE-2018-14355 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14356/">CVE-2018-14356 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14356">CVE-2018-14356 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14357/">CVE-2018-14357 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14357">CVE-2018-14357 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14358/">CVE-2018-14358 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14358">CVE-2018-14358 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14359/">CVE-2018-14359 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14359">CVE-2018-14359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14360/">CVE-2018-14360 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14360">CVE-2018-14360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14361/">CVE-2018-14361 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14361">CVE-2018-14361 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14362/">CVE-2018-14362 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14362">CVE-2018-14362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14363/">CVE-2018-14363 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14363">CVE-2018-14363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521146" comment="mutt-1.10.1-55.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151827" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Archive-Zip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1099497" ref_url="https://bugzilla.suse.com/1099497" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10860" ref_url="https://www.suse.com/security/cve/CVE-2018-10860/" source="CVE"/>
		<description>
This update for perl-Archive-Zip fixes the following security issue:

- CVE-2018-10860: Prevent directory traversal caused by not properly sanitizing
  paths while extracting zip files. An attacker able to provide a specially
  crafted archive for processing could have used this flaw to write or overwrite
  arbitrary files in the context of the perl interpreter (bsc#1099497)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099497">SUSE bug 1099497</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10860/">CVE-2018-10860 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10860">CVE-2018-10860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519976" comment="perl-Archive-Zip-1.34-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151828" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1103276" ref_url="https://bugzilla.suse.com/1103276" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<description>
This update for xen fixes the following security issues:

- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
  and address translations may have allowed unauthorized disclosure of
  information residing in the L1 data cache to an attacker with local user access
  with guest OS privilege via a terminal page fault and a side-channel analysis
  (bsc#1091107, bsc#1027519).
- Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a malicious or
  buggy guest administrator can lock up the entire host (bsc#1103276)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103276">SUSE bug 1103276</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519977" comment="xen-4.9.2_10-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553107" comment="xen-doc-html-4.9.2_10-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519978" comment="xen-libs-4.9.2_10-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519979" comment="xen-libs-32bit-4.9.2_10-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553108" comment="xen-tools-4.9.2_10-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553109" comment="xen-tools-domU-4.9.2_10-3.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151829" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1044946" ref_url="https://bugzilla.suse.com/1044946" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000381" ref_url="https://www.suse.com/security/cve/CVE-2017-1000381/" source="CVE"/>
		<description>
This update for libcares2 fixes the following issues:

- CVE-2017-1000381: A NAPTR parser out of bounds access was fixed that could lead to crashes. (bsc#1044946)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044946">SUSE bug 1044946</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000381/">CVE-2017-1000381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000381">CVE-2017-1000381 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557247" comment="libcares2-1.9.1-9.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151830" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1053417" ref_url="https://bugzilla.suse.com/1053417" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<description>
This update for gdk-pixbuf fixes the following issues:

Security issue fixed:

- CVE-2015-4491: Fix integer multiplication overflow that allows for DoS or potentially RCE (bsc#1053417).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1053417">SUSE bug 1053417</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4491">CVE-2015-4491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557248" comment="gdk-pixbuf-lang-2.34.0-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557249" comment="gdk-pixbuf-query-loaders-2.34.0-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557250" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557251" comment="libgdk_pixbuf-2_0-0-2.34.0-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557252" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557253" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151831" version="1" class="patch">
	<metadata>
		<title>Security update for procps (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1092100" ref_url="https://bugzilla.suse.com/1092100" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<description>
This update for procps fixes the following security issues:

- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top
  with HOME unset in an attacker-controlled directory, the attacker could have
  achieved privilege escalation by exploiting one of several vulnerabilities in
  the config_file() function (bsc#1092100).
- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.
  Inbuilt protection in ps maped a guard page at the end of the overflowed
  buffer, ensuring that the impact of this flaw is limited to a crash (temporary
  denial of service) (bsc#1092100).
- CVE-2018-1124: Prevent multiple integer overflows leading to a heap
  corruption in file2strvec function. This allowed a privilege escalation for a
  local attacker who can create entries in procfs by starting processes, which
  could result in crashes or arbitrary code execution in proc utilities run by
  other users (bsc#1092100).
- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was
  mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent
  truncation/integer overflow issues (bsc#1092100).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-26"/>
	<updated date="2018-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1122">CVE-2018-1122 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1123">CVE-2018-1123 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1124">CVE-2018-1124 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1125">CVE-2018-1125 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1126">CVE-2018-1126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519980" comment="libprocps3-3.3.9-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519981" comment="procps-3.3.9-11.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151832" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1064455" ref_url="https://bugzilla.suse.com/1064455" source="BUGZILLA"/>
		<reference ref_id="1090766" ref_url="https://bugzilla.suse.com/1090766" source="BUGZILLA"/>
		<reference ref_id="1097410" ref_url="https://bugzilla.suse.com/1097410" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<description>
This update for libgcrypt fixes the following issues:

The following security vulnerability was addressed:

- CVE-2018-0495: Mitigate a novel side-channel attack by enabling blinding for
  ECDSA signatures (bsc#1097410).

The following other issues were fixed:

- Extended the fipsdrv dsa-sign and dsa-verify commands with the
  --algo parameter for the FIPS testing of DSA SigVer and SigGen (bsc#1064455).
- Ensure libgcrypt20-hmac and libgcrypt20 are installed in the correct order. (bsc#1090766)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-23"/>
	<updated date="2018-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064455">SUSE bug 1064455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090766">SUSE bug 1090766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097410">SUSE bug 1097410</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0495">CVE-2018-0495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519982" comment="libgcrypt20-1.6.1-16.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519983" comment="libgcrypt20-32bit-1.6.1-16.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557254" comment="libgcrypt20-hmac-1.6.1-16.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557255" comment="libgcrypt20-hmac-32bit-1.6.1-16.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151833" version="1" class="patch">
	<metadata>
		<title>Security update for libcgroup (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1100365" ref_url="https://bugzilla.suse.com/1100365" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14348" ref_url="https://www.suse.com/security/cve/CVE-2018-14348/" source="CVE"/>
		<description>
This update for libcgroup fixes the following issues:

Security issue fixed:

- CVE-2018-14348: Fix daemon that creates /var/log/cgred with mode 0666 (bsc#1100365).

This updates also sets the permissions of already existing log files to proper values.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-21"/>
	<updated date="2018-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100365">SUSE bug 1100365</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14348/">CVE-2018-14348 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14348">CVE-2018-14348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557256" comment="libcgroup-tools-0.41.rc1-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519984" comment="libcgroup1-0.41.rc1-10.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151834" version="1" class="patch">
	<metadata>
		<title>Security update for gdm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1103737" ref_url="https://bugzilla.suse.com/1103737" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14424" ref_url="https://www.suse.com/security/cve/CVE-2018-14424/" source="CVE"/>
		<description>
This update for gdm fixes the following security issue:

- CVE-2018-14424: The daemon in GDM did not properly unexport display objects
  from its D-Bus interface when they are destroyed, which allowed a local
  attacker to trigger a use-after-free via a specially crafted sequence of D-Bus
  method calls, resulting in a denial of service or potential code execution
  (bsc#1103737).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-27"/>
	<updated date="2018-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103737">SUSE bug 1103737</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14424/">CVE-2018-14424 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14424">CVE-2018-14424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520035" comment="gdm-3.10.0.1-54.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520036" comment="gdm-lang-3.10.0.1-54.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520037" comment="gdmflexiserver-3.10.0.1-54.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520038" comment="libgdm1-3.10.0.1-54.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520039" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151835" version="1" class="patch">
	<metadata>
		<title>Security update for spice-gtk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1101295" ref_url="https://bugzilla.suse.com/1101295" source="BUGZILLA"/>
		<reference ref_id="1104448" ref_url="https://bugzilla.suse.com/1104448" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<description>
This update for spice-gtk fixes the following issues:

Security issues fixed:

- CVE-2018-10873: Fix potential heap corruption when demarshalling (bsc#1104448)
- CVE-2018-10893: Avoid buffer overflow on image lz checks (bsc#1101295)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-03"/>
	<updated date="2018-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101295">SUSE bug 1101295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104448">SUSE bug 1104448</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10873">CVE-2018-10873 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10893">CVE-2018-10893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520040" comment="libspice-client-glib-2_0-8-0.33-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520041" comment="libspice-client-glib-helper-0.33-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520042" comment="libspice-client-gtk-3_0-5-0.33-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520043" comment="libspice-controller0-0.33-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520044" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520045" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151836" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1101295" ref_url="https://bugzilla.suse.com/1101295" source="BUGZILLA"/>
		<reference ref_id="1104448" ref_url="https://bugzilla.suse.com/1104448" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<description>
This update for spice fixes the following issues:

Security issues fixed:

- CVE-2018-10873: Fix potential heap corruption when demarshalling (bsc#1104448)
- CVE-2018-10893: Avoid buffer overflow on image lz checks (bsc#1101295)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-03"/>
	<updated date="2018-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101295">SUSE bug 1101295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104448">SUSE bug 1104448</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10873">CVE-2018-10873 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10893">CVE-2018-10893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520046" comment="libspice-server1-0.12.8-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151837" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1082828" ref_url="https://bugzilla.suse.com/1082828" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15130" ref_url="https://www.suse.com/security/cve/CVE-2017-15130/" source="CVE"/>
		<description>
This update for dovecot22 fixes the following issues:

Security issue fixed:

- CVE-2017-15130: Fixed a potential denial of service via TLS SNI config
  lookups, which would slow the process down and could have led to exhaustive
  memory allocation and/or process restarts (bsc#1082828)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-06"/>
	<updated date="2018-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082828">SUSE bug 1082828</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15130/">CVE-2017-15130 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15130">CVE-2017-15130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530236" comment="dovecot22-2.2.31-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530237" comment="dovecot22-backend-mysql-2.2.31-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530238" comment="dovecot22-backend-pgsql-2.2.31-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530239" comment="dovecot22-backend-sqlite-2.2.31-19.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151838" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104668" ref_url="https://bugzilla.suse.com/1104668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12539" ref_url="https://www.suse.com/security/cve/CVE-2018-12539/" source="CVE"/>
		<reference ref_id="CVE-2018-1517" ref_url="https://www.suse.com/security/cve/CVE-2018-1517/" source="CVE"/>
		<reference ref_id="CVE-2018-1656" ref_url="https://www.suse.com/security/cve/CVE-2018-1656/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Security issues fixed:
  
- CVE-2018-1517: Fixed a flaw in the java.math component in IBM SDK, which may
  allow an attacker to inflict a denial-of-service attack with specially
  crafted String data.
- CVE-2018-1656: Protect against path traversal attacks when extracting
  compressed dump files.
- CVE-2018-2940: Fixed an easily exploitable vulnerability in the libraries
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to
  unauthorized read access.
- CVE-2018-2952: Fixed an easily exploitable vulnerability in the concurrency
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to denial of
  service.
- CVE-2018-2973: Fixed a difficult to exploit vulnerability in the JSSE
  subcomponent, which allowed unauthenticated attackers with network access
  via SSL/TLS to compromise the Java SE, leading to unauthorized creation,
  deletion or modification access to critical data.
- CVE-2018-12539: Fixed a vulnerability in which users other than the process
  owner may be able to use Java Attach API to connect to the IBM JVM on the
  same machine and use Attach API operations, including the ability to execute
  untrusted arbitrary code.

Other changes made:

- Various JIT/JVM crash fixes
- Version update to 7.1.4.30 (bsc#1104668)

You can find detailed information about this update [here](https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_August_2018).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-07"/>
	<updated date="2018-09-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104668">SUSE bug 1104668</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12539/">CVE-2018-12539 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12539">CVE-2018-12539 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1517/">CVE-2018-1517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1517">CVE-2018-1517 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1656/">CVE-2018-1656 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1656">CVE-2018-1656 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2940">CVE-2018-2940 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2952">CVE-2018-2952 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2973">CVE-2018-2973 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530240" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530243" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151839" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="1107030" ref_url="https://bugzilla.suse.com/1107030" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<description>
This update for python3 provides the following fixes:

These security issues were fixed:

- CVE-2018-1061: Prevent catastrophic backtracking in the difflib.IS_LINE_JUNK
  method. An attacker could have used this flaw to cause denial of service
  (bsc#1088004).
- CVE-2018-1060: Prevent catastrophic backtracking in pop3lib's apop() method.
  An attacker could have used this flaw to cause denial of service (bsc#1088009).

These non-security issues were fixed:

- Sort files and directories when creating tarfile archives so that they are created in a
  more predictable way. (bsc#1086001)
- Add -fwrapv to OPTS (bsc#1107030)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-12"/>
	<updated date="2018-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107030">SUSE bug 1107030</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1060">CVE-2018-1060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1061">CVE-2018-1061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520049" comment="libpython3_4m1_0-3.4.6-25.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520050" comment="python3-3.4.6-25.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520051" comment="python3-base-3.4.6-25.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520052" comment="python3-curses-3.4.6-25.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151840" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1067720" ref_url="https://bugzilla.suse.com/1067720" source="BUGZILLA"/>
		<reference ref_id="1093697" ref_url="https://bugzilla.suse.com/1093697" source="BUGZILLA"/>
		<reference ref_id="1095472" ref_url="https://bugzilla.suse.com/1095472" source="BUGZILLA"/>
		<reference ref_id="1102379" ref_url="https://bugzilla.suse.com/1102379" source="BUGZILLA"/>
		<reference ref_id="1102400" ref_url="https://bugzilla.suse.com/1102400" source="BUGZILLA"/>
		<reference ref_id="1102410" ref_url="https://bugzilla.suse.com/1102410" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1336" ref_url="https://www.suse.com/security/cve/CVE-2018-1336/" source="CVE"/>
		<reference ref_id="CVE-2018-8014" ref_url="https://www.suse.com/security/cve/CVE-2018-8014/" source="CVE"/>
		<reference ref_id="CVE-2018-8034" ref_url="https://www.suse.com/security/cve/CVE-2018-8034/" source="CVE"/>
		<reference ref_id="CVE-2018-8037" ref_url="https://www.suse.com/security/cve/CVE-2018-8037/" source="CVE"/>
		<description>
This update for tomcat to 8.0.53 fixes the following issues:

Security issue fixed:

- CVE-2018-1336: An improper handing of overflow in the UTF-8 decoder with
  supplementary characters could have lead to an infinite loop in the decoder
  causing a Denial of Service (bsc#1102400).
- CVE-2018-8034: The host name verification when using TLS with the WebSocket
  client was missing. It is now enabled by default (bsc#1102379).
- CVE-2018-8037: If an async request was completed by the application at the
  same time as the container triggered the async timeout, a race condition
  existed that could have resulted in a user seeing a response intended for a
  different user. An additional issue was present in the NIO and NIO2 connectors
  that did not correctly track the closure of the connection when an async
  request was completed by the application and timed out by the container at the
  same time. This could also have resulted in a user seeing a response intended
  for another user (bsc#1102410).
- CVE-2018-8014: Fix insecure default CORS filter settings (bsc#1093697).

Bug fixes:

- bsc#1067720: Avoid overwriting of customer's configuration during update.
- bsc#1095472: Add Obsoletes for tomcat6 packages.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-13"/>
	<updated date="2018-09-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1067720">SUSE bug 1067720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093697">SUSE bug 1093697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095472">SUSE bug 1095472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102379">SUSE bug 1102379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102400">SUSE bug 1102400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102410">SUSE bug 1102410</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1336/">CVE-2018-1336 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1336">CVE-2018-1336 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8014/">CVE-2018-8014 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8014">CVE-2018-8014 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8034/">CVE-2018-8034 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8034">CVE-2018-8034 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-8037/">CVE-2018-8037 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8037">CVE-2018-8037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553132" comment="tomcat-8.0.53-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553133" comment="tomcat-admin-webapps-8.0.53-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553134" comment="tomcat-docs-webapp-8.0.53-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553135" comment="tomcat-el-3_0-api-8.0.53-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553136" comment="tomcat-javadoc-8.0.53-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553137" comment="tomcat-jsp-2_3-api-8.0.53-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553138" comment="tomcat-lib-8.0.53-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553139" comment="tomcat-servlet-3_1-api-8.0.53-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553140" comment="tomcat-webapps-8.0.53-29.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151841" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1089533" ref_url="https://bugzilla.suse.com/1089533" source="BUGZILLA"/>
		<reference ref_id="1106019" ref_url="https://bugzilla.suse.com/1106019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14618" ref_url="https://www.suse.com/security/cve/CVE-2018-14618/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

This security issue was fixed:

- CVE-2018-14618: Prevent integer overflow in the NTLM authentication code (bsc#1106019)

This non-security issue was fixed:

- Fixed erroneous debug message when paired with OpenSSL (bsc#1089533)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-14"/>
	<updated date="2018-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089533">SUSE bug 1089533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106019">SUSE bug 1106019</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14618/">CVE-2018-14618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14618">CVE-2018-14618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520053" comment="curl-7.37.0-37.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520054" comment="libcurl4-7.37.0-37.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520055" comment="libcurl4-32bit-7.37.0-37.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151842" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638)
- Prevent out of bounds reads in message parsing
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17833">CVE-2017-17833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520063" comment="openslp-2.0.0-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520064" comment="openslp-32bit-2.0.0-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530248" comment="openslp-server-2.0.0-18.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151843" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1102003" ref_url="https://bugzilla.suse.com/1102003" source="BUGZILLA"/>
		<reference ref_id="1102004" ref_url="https://bugzilla.suse.com/1102004" source="BUGZILLA"/>
		<reference ref_id="1102005" ref_url="https://bugzilla.suse.com/1102005" source="BUGZILLA"/>
		<reference ref_id="1102007" ref_url="https://bugzilla.suse.com/1102007" source="BUGZILLA"/>
		<reference ref_id="1105592" ref_url="https://bugzilla.suse.com/1105592" source="BUGZILLA"/>
		<reference ref_id="1106855" ref_url="https://bugzilla.suse.com/1106855" source="BUGZILLA"/>
		<reference ref_id="1106858" ref_url="https://bugzilla.suse.com/1106858" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14434" ref_url="https://www.suse.com/security/cve/CVE-2018-14434/" source="CVE"/>
		<reference ref_id="CVE-2018-14435" ref_url="https://www.suse.com/security/cve/CVE-2018-14435/" source="CVE"/>
		<reference ref_id="CVE-2018-14436" ref_url="https://www.suse.com/security/cve/CVE-2018-14436/" source="CVE"/>
		<reference ref_id="CVE-2018-14437" ref_url="https://www.suse.com/security/cve/CVE-2018-14437/" source="CVE"/>
		<reference ref_id="CVE-2018-16323" ref_url="https://www.suse.com/security/cve/CVE-2018-16323/" source="CVE"/>
		<reference ref_id="CVE-2018-16329" ref_url="https://www.suse.com/security/cve/CVE-2018-16329/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

The following security vulnerabilities were fixed:

- CVE-2018-16329: Prevent NULL pointer dereference in the GetMagickProperty
  function leading to DoS (bsc#1106858)
- CVE-2018-16323: ReadXBMImage left data uninitialized when processing an XBM
  file that has a negative pixel value. If the affected code was used as a
  library loaded into a process that includes sensitive information, that
  information sometimes can be leaked via the image data (bsc#1106855)
- CVE-2018-14434: Fixed a memory leak for a colormap in WriteMPCImage 
  (bsc#1102003)
- CVE-2018-14435: Fixed a memory leak in DecodeImage in coders/pcd.c
  (bsc#1102007)
- CVE-2018-14436: Fixed a memory leak in ReadMIFFImage in coders/miff.c
  (bsc#1102005)
- CVE-2018-14437: Fixed a memory leak in parse8BIM in coders/meta.c
  (bsc#1102004)
- Disable PS, PS2, PS3, XPS and PDF coders in default policy.xml (bsc#1105592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1102003">SUSE bug 1102003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102004">SUSE bug 1102004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102005">SUSE bug 1102005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102007">SUSE bug 1102007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106855">SUSE bug 1106855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106858">SUSE bug 1106858</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14434/">CVE-2018-14434 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14434">CVE-2018-14434 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14435/">CVE-2018-14435 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14435">CVE-2018-14435 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14436/">CVE-2018-14436 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14436">CVE-2018-14436 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14437/">CVE-2018-14437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14437">CVE-2018-14437 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16323/">CVE-2018-16323 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16323">CVE-2018-16323 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16329/">CVE-2018-16329 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16329">CVE-2018-16329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520067" comment="libMagickCore-6_Q16-1-6.8.8.1-71.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520069" comment="libMagickWand-6_Q16-1-6.8.8.1-71.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151844" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1095189" ref_url="https://bugzilla.suse.com/1095189" source="BUGZILLA"/>
		<reference ref_id="1095825" ref_url="https://bugzilla.suse.com/1095825" source="BUGZILLA"/>
		<reference ref_id="1095826" ref_url="https://bugzilla.suse.com/1095826" source="BUGZILLA"/>
		<reference ref_id="1095827" ref_url="https://bugzilla.suse.com/1095827" source="BUGZILLA"/>
		<reference ref_id="1095945" ref_url="https://bugzilla.suse.com/1095945" source="BUGZILLA"/>
		<reference ref_id="1097103" ref_url="https://bugzilla.suse.com/1097103" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11440" ref_url="https://www.suse.com/security/cve/CVE-2018-11440/" source="CVE"/>
		<reference ref_id="CVE-2018-11577" ref_url="https://www.suse.com/security/cve/CVE-2018-11577/" source="CVE"/>
		<reference ref_id="CVE-2018-11683" ref_url="https://www.suse.com/security/cve/CVE-2018-11683/" source="CVE"/>
		<reference ref_id="CVE-2018-11684" ref_url="https://www.suse.com/security/cve/CVE-2018-11684/" source="CVE"/>
		<reference ref_id="CVE-2018-11685" ref_url="https://www.suse.com/security/cve/CVE-2018-11685/" source="CVE"/>
		<reference ref_id="CVE-2018-12085" ref_url="https://www.suse.com/security/cve/CVE-2018-12085/" source="CVE"/>
		<description>
This update for liblouis, python-louis, python3-louis fixes the
following issues:

Security issues fixed:

- CVE-2018-11440: Fixed a stack-based buffer overflow in the function
  parseChars() in compileTranslationTable.c (bsc#1095189)
- CVE-2018-11577: Fixed a segmentation fault in lou_logPrint in logging.c
  (bsc#1095945)
- CVE-2018-11683: Fixed a stack-based buffer overflow in the function
  parseChars() in compileTranslationTable.c (different vulnerability than
  CVE-2018-11440) (bsc#1095827)
- CVE-2018-11684: Fixed stack-based buffer overflow in the function
  includeFile() in compileTranslationTable.c (bsc#1095826)
- CVE-2018-11685: Fixed a stack-based buffer overflow in the function
  compileHyphenation() in compileTranslationTable.c (bsc#1095825)
- CVE-2018-12085: Fixed a stack-based buffer overflow in the function
  parseChars() in compileTranslationTable.c (different vulnerability than
  CVE-2018-11440) (bsc#1097103)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095189">SUSE bug 1095189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095825">SUSE bug 1095825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095826">SUSE bug 1095826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095827">SUSE bug 1095827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095945">SUSE bug 1095945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097103">SUSE bug 1097103</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11440/">CVE-2018-11440 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11440">CVE-2018-11440 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11577/">CVE-2018-11577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11577">CVE-2018-11577 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11683/">CVE-2018-11683 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11683">CVE-2018-11683 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11684/">CVE-2018-11684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11684">CVE-2018-11684 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11685/">CVE-2018-11685 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11685">CVE-2018-11685 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12085/">CVE-2018-12085 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12085">CVE-2018-12085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520070" comment="liblouis-data-2.6.4-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520071" comment="liblouis9-2.6.4-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557257" comment="python-louis-2.6.4-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520072" comment="python3-louis-2.6.4-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151845" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp, zypper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1036304" ref_url="https://bugzilla.suse.com/1036304" source="BUGZILLA"/>
		<reference ref_id="1045735" ref_url="https://bugzilla.suse.com/1045735" source="BUGZILLA"/>
		<reference ref_id="1049825" ref_url="https://bugzilla.suse.com/1049825" source="BUGZILLA"/>
		<reference ref_id="1070851" ref_url="https://bugzilla.suse.com/1070851" source="BUGZILLA"/>
		<reference ref_id="1076192" ref_url="https://bugzilla.suse.com/1076192" source="BUGZILLA"/>
		<reference ref_id="1088705" ref_url="https://bugzilla.suse.com/1088705" source="BUGZILLA"/>
		<reference ref_id="1091624" ref_url="https://bugzilla.suse.com/1091624" source="BUGZILLA"/>
		<reference ref_id="1092413" ref_url="https://bugzilla.suse.com/1092413" source="BUGZILLA"/>
		<reference ref_id="1096803" ref_url="https://bugzilla.suse.com/1096803" source="BUGZILLA"/>
		<reference ref_id="1099847" ref_url="https://bugzilla.suse.com/1099847" source="BUGZILLA"/>
		<reference ref_id="1100028" ref_url="https://bugzilla.suse.com/1100028" source="BUGZILLA"/>
		<reference ref_id="1101349" ref_url="https://bugzilla.suse.com/1101349" source="BUGZILLA"/>
		<reference ref_id="1102429" ref_url="https://bugzilla.suse.com/1102429" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-7685" ref_url="https://www.suse.com/security/cve/CVE-2018-7685/" source="CVE"/>
		<description>
This update for libzypp, zypper fixes the following issues:

Update libzypp to version 16.17.20:

Security issues fixed:

- PackageProvider: Validate deta rpms before caching (bsc#1091624,
  bsc#1088705, CVE-2018-7685)
- PackageProvider: Validate downloaded rpm package signatures before
  caching (bsc#1091624, bsc#1088705, CVE-2018-7685)

Other bugs fixed:

- lsof: use '-K i' if lsof supports it (bsc#1099847, bsc#1036304)
- Handle http error 502 Bad Gateway in curl backend (bsc#1070851)
- RepoManager: Explicitly request repo2solv to generate application
  pseudo packages.
- libzypp-devel should not require cmake (bsc#1101349)
- HardLocksFile: Prevent against empty commit without Target having
  been been loaded (bsc#1096803)
- Avoid zombie tar processes (bsc#1076192)

Update to zypper to version 1.13.45:

Security issues fixed:

- Improve signature check callback messages (bsc#1045735, CVE-2017-9269)
- add/modify repo: Add options to tune the GPG check settings
  (bsc#1045735, CVE-2017-9269)

Other bugs fixed:

- XML &lt;install-summary&gt; attribute `packages-to-change` added (bsc#1102429)
- man: Strengthen that `--config FILE' affects zypper.conf,
  not zypp.conf (bsc#1100028)
- Prevent nested calls to exit() if aborted by a signal (bsc#1092413)
- ansi.h: Prevent ESC sequence strings from going out of scope (bsc#1092413)
- Fix: zypper bash completion expands non-existing options (bsc#1049825)
- Improve signature check callback messages (bsc#1045735)
- add/modify repo: Add options to tune the GPG check settings (bsc#1045735)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036304">SUSE bug 1036304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049825">SUSE bug 1049825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070851">SUSE bug 1070851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076192">SUSE bug 1076192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088705">SUSE bug 1088705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091624">SUSE bug 1091624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092413">SUSE bug 1092413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096803">SUSE bug 1096803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099847">SUSE bug 1099847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100028">SUSE bug 1100028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101349">SUSE bug 1101349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102429">SUSE bug 1102429</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9269">CVE-2017-9269 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7685/">CVE-2018-7685 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7685">CVE-2018-7685 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520073" comment="libzypp-16.17.20-2.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520074" comment="zypper-1.13.45-21.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520075" comment="zypper-log-1.13.45-21.21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151846" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1016715" ref_url="https://bugzilla.suse.com/1016715" source="BUGZILLA"/>
		<reference ref_id="1104826" ref_url="https://bugzilla.suse.com/1104826" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4975" ref_url="https://www.suse.com/security/cve/CVE-2016-4975/" source="CVE"/>
		<reference ref_id="CVE-2016-8743" ref_url="https://www.suse.com/security/cve/CVE-2016-8743/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

Security issues fixed:

- CVE-2016-8743: Fixed liberal whitespace interpretation accepted from requests
  and sent in response lines and headers. Accepting these different behaviors
  represented a security concern when httpd participates in any chain of
  proxies or interacts with back-end application servers, either through
  mod_proxy or using conventional CGI mechanisms, and may result in request
  smuggling, response splitting and cache pollution. (bsc#1016715)
- CVE-2016-4975: Fixed possible CRLF injection allowing HTTP response splitting
  attacks for sites which use mod_userdir. This issue was mitigated by changes
  which prohibit CR or LF injection into the 'Location' or other outbound
  header key or value. (bsc#1104826)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016715">SUSE bug 1016715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104826">SUSE bug 1104826</bugzilla>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-4975/">CVE-2016-4975 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4975">CVE-2016-4975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8743/">CVE-2016-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8743">CVE-2016-8743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530249" comment="apache2-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530250" comment="apache2-doc-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530251" comment="apache2-example-pages-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530252" comment="apache2-prefork-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530253" comment="apache2-utils-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530254" comment="apache2-worker-2.4.23-29.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151847" version="1" class="patch">
	<metadata>
		<title>Security update for libXcursor (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1103511" ref_url="https://bugzilla.suse.com/1103511" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9262" ref_url="https://www.suse.com/security/cve/CVE-2015-9262/" source="CVE"/>
		<description>
This update for libXcursor fixes the following security issue:

- CVE-2015-9262: _XcursorThemeInherits allowed remote attackers to cause denial
  of service or potentially code execution via a one-byte heap overflow
  (bsc#1103511).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103511">SUSE bug 1103511</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-9262/">CVE-2015-9262 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9262">CVE-2015-9262 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520076" comment="libXcursor1-1.1.14-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520077" comment="libXcursor1-32bit-1.1.14-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151848" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104668" ref_url="https://bugzilla.suse.com/1104668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2018-12539" ref_url="https://www.suse.com/security/cve/CVE-2018-12539/" source="CVE"/>
		<reference ref_id="CVE-2018-1517" ref_url="https://www.suse.com/security/cve/CVE-2018-1517/" source="CVE"/>
		<reference ref_id="CVE-2018-1656" ref_url="https://www.suse.com/security/cve/CVE-2018-1656/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2964" ref_url="https://www.suse.com/security/cve/CVE-2018-2964/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm to 8.0.5.20 fixes the following security issues:

- CVE-2018-2952: Vulnerability in subcomponent: Concurrency. Difficult to
  exploit vulnerability allowed unauthenticated attacker with network access via
  multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful
  attacks of this vulnerability can result in unauthorized ability to cause a
  partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit
  (bsc#1104668)
- CVE-2018-2940: Vulnerability in subcomponent: Libraries. Easily exploitable
  vulnerability allowed unauthenticated attacker with network access via multiple
  protocols to compromise Java SE, Java SE Embedded. Successful attacks require
  human interaction from a person other than the attacker. Successful attacks of
  this vulnerability can result in unauthorized read access to a subset of Java
  SE, Java SE Embedded accessible data (bsc#1104668)
- CVE-2018-2973: Vulnerability in subcomponent: JSSE. Difficult to exploit
  vulnerability allowed unauthenticated attacker with network access via SSL/TLS
  to compromise Java SE, Java SE Embedded. Successful attacks of this
  vulnerability can result in unauthorized creation, deletion or modification
  access to critical data or all Java SE, Java SE Embedded accessible data
  (bsc#1104668)
- CVE-2018-2964: Vulnerability in subcomponent: Deployment. Difficult to
  exploit vulnerability allowed unauthenticated attacker with network access via
  multiple protocols to compromise Java SE. Successful attacks require human
  interaction from a person other than the attacker. Successful attacks of this
  vulnerability can result in takeover of Java SE. (bsc#1104668)
- CVE-2016-0705: Prevent double free in the dsa_priv_decode function that
  allowed remote attackers to cause a denial of service (memory corruption) or
  possibly have unspecified other impact via a malformed DSA private key
  (bsc#1104668)
- CVE-2017-3732: Prevent carry propagating bug in the x86_64 Montgomery
  squaring procedure (bsc#1104668)
- CVE-2017-3736: Prevent carry propagating bug in the x86_64 Montgomery
  squaring procedure (bsc#1104668)
- CVE-2018-1517: Unspecified vulnerability (bsc#1104668)
- CVE-2018-1656: Unspecified vulnerability (bsc#1104668)
- CVE-2018-12539: Users other than the process owner might have been able to
  use Java Attach API to connect to an IBM JVM on the same machine and use Attach
  API operations, which includes the ability to execute untrusted native code
  (bsc#1104668)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104668">SUSE bug 1104668</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0705">CVE-2016-0705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3732">CVE-2017-3732 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3736">CVE-2017-3736 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12539/">CVE-2018-12539 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12539">CVE-2018-12539 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1517/">CVE-2018-1517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1517">CVE-2018-1517 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1656/">CVE-2018-1656 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1656">CVE-2018-1656 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2940">CVE-2018-2940 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2952">CVE-2018-2952 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2964/">CVE-2018-2964 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2964">CVE-2018-2964 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2973">CVE-2018-2973 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530259" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151849" version="1" class="patch">
	<metadata>
		<title>Security update for ant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1100053" ref_url="https://bugzilla.suse.com/1100053" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10886" ref_url="https://www.suse.com/security/cve/CVE-2018-10886/" source="CVE"/>
		<description>
This update for ant fixes the following issues:

Security issue fixed:

- CVE-2018-10886: Fixed a path traversal vulnerability in malformed zip file
  paths, which allowed arbitrary file writes and could potentially lead to
  code execution (bsc#1100053)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100053">SUSE bug 1100053</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10886/">CVE-2018-10886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-10886">CVE-2018-10886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541627" comment="ant-1.9.4-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151850" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1074186" ref_url="https://bugzilla.suse.com/1074186" source="BUGZILLA"/>
		<reference ref_id="1092480" ref_url="https://bugzilla.suse.com/1092480" source="BUGZILLA"/>
		<reference ref_id="983440" ref_url="https://bugzilla.suse.com/983440" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5319" ref_url="https://www.suse.com/security/cve/CVE-2016-5319/" source="CVE"/>
		<reference ref_id="CVE-2017-17942" ref_url="https://www.suse.com/security/cve/CVE-2017-17942/" source="CVE"/>
		<reference ref_id="CVE-2018-10779" ref_url="https://www.suse.com/security/cve/CVE-2018-10779/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2018-10779: Fixed a heap-based buffer overflow in TIFFWriteScanline()
  in tif_write.c (bsc#1092480)
- CVE-2017-17942: Fixed a heap-based buffer overflow in the function
  PackBitsEncode in tif_packbits.c. (bsc#1074186)
- CVE-2016-5319: Fixed a beap-based buffer overflow in bmp2tiff (bsc#983440)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074186">SUSE bug 1074186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092480">SUSE bug 1092480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983440">SUSE bug 983440</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5319/">CVE-2016-5319 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5319">CVE-2016-5319 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17942/">CVE-2017-17942 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17942">CVE-2017-17942 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10779/">CVE-2018-10779 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10779">CVE-2018-10779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520078" comment="libtiff5-4.0.9-44.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520079" comment="libtiff5-32bit-4.0.9-44.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557258" comment="tiff-4.0.9-44.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151851" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047002" ref_url="https://bugzilla.suse.com/1047002" source="BUGZILLA"/>
		<reference ref_id="1105437" ref_url="https://bugzilla.suse.com/1105437" source="BUGZILLA"/>
		<reference ref_id="1105459" ref_url="https://bugzilla.suse.com/1105459" source="BUGZILLA"/>
		<reference ref_id="1105460" ref_url="https://bugzilla.suse.com/1105460" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10790" ref_url="https://www.suse.com/security/cve/CVE-2017-10790/" source="CVE"/>
		<reference ref_id="CVE-2018-10844" ref_url="https://www.suse.com/security/cve/CVE-2018-10844/" source="CVE"/>
		<reference ref_id="CVE-2018-10845" ref_url="https://www.suse.com/security/cve/CVE-2018-10845/" source="CVE"/>
		<reference ref_id="CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846/" source="CVE"/>
		<description>
This update for gnutls fixes the following issues:

Security issues fixed:

- Improved mitigations against Lucky 13 class of attacks
  - 'Just in Time' PRIME + PROBE cache-based side channel attack can lead to plaintext recovery (CVE-2018-10846, bsc#1105460)
  - HMAC-SHA-384 vulnerable to Lucky thirteen attack due to use of wrong constant (CVE-2018-10845, bsc#1105459)
  - HMAC-SHA-256 vulnerable to Lucky thirteen attack due to not enough dummy function calls (CVE-2018-10844, bsc#1105437)
- The _asn1_check_identifier function in Libtasn1 caused a NULL pointer dereference and crash (CVE-2017-10790, bsc#1047002)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047002">SUSE bug 1047002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105437">SUSE bug 1105437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105459">SUSE bug 1105459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105460">SUSE bug 1105460</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10790/">CVE-2017-10790 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10790">CVE-2017-10790 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10844/">CVE-2018-10844 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10844">CVE-2018-10844 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10845/">CVE-2018-10845 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10845">CVE-2018-10845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10846">CVE-2018-10846 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520080" comment="gnutls-3.3.27-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557259" comment="libgnutls-openssl27-3.3.27-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520081" comment="libgnutls28-3.3.27-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520082" comment="libgnutls28-32bit-3.3.27-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151852" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1105434" ref_url="https://bugzilla.suse.com/1105434" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000222" ref_url="https://www.suse.com/security/cve/CVE-2018-1000222/" source="CVE"/>
		<description>
This update for gd fixes the following issues:

Security issue fixed:

- CVE-2018-1000222: Fixed a double free vulnerability in gdImageBmpPtr() that
  could result in remote code execution. This could have been exploited via a
  specially crafted JPEG image files. (bsc#1105434)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1105434">SUSE bug 1105434</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000222/">CVE-2018-1000222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000222">CVE-2018-1000222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520083" comment="gd-2.1.0-24.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151853" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1106914" ref_url="https://bugzilla.suse.com/1106914" source="BUGZILLA"/>
		<description>
This update for shadow fixes the following security issue:

- Prevent useradd from creating intermediate directories with mode 0777 (bsc#1106914)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106914">SUSE bug 1106914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520085" comment="shadow-4.2.1-27.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151854" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1094301" ref_url="https://bugzilla.suse.com/1094301" source="BUGZILLA"/>
		<reference ref_id="1101776" ref_url="https://bugzilla.suse.com/1101776" source="BUGZILLA"/>
		<reference ref_id="1101777" ref_url="https://bugzilla.suse.com/1101777" source="BUGZILLA"/>
		<reference ref_id="1101786" ref_url="https://bugzilla.suse.com/1101786" source="BUGZILLA"/>
		<reference ref_id="1101788" ref_url="https://bugzilla.suse.com/1101788" source="BUGZILLA"/>
		<reference ref_id="1101791" ref_url="https://bugzilla.suse.com/1101791" source="BUGZILLA"/>
		<reference ref_id="1101794" ref_url="https://bugzilla.suse.com/1101794" source="BUGZILLA"/>
		<reference ref_id="1101800" ref_url="https://bugzilla.suse.com/1101800" source="BUGZILLA"/>
		<reference ref_id="1101802" ref_url="https://bugzilla.suse.com/1101802" source="BUGZILLA"/>
		<reference ref_id="1101804" ref_url="https://bugzilla.suse.com/1101804" source="BUGZILLA"/>
		<reference ref_id="1101810" ref_url="https://bugzilla.suse.com/1101810" source="BUGZILLA"/>
		<reference ref_id="1106514" ref_url="https://bugzilla.suse.com/1106514" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11354" ref_url="https://www.suse.com/security/cve/CVE-2018-11354/" source="CVE"/>
		<reference ref_id="CVE-2018-11355" ref_url="https://www.suse.com/security/cve/CVE-2018-11355/" source="CVE"/>
		<reference ref_id="CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356/" source="CVE"/>
		<reference ref_id="CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357/" source="CVE"/>
		<reference ref_id="CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358/" source="CVE"/>
		<reference ref_id="CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359/" source="CVE"/>
		<reference ref_id="CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360/" source="CVE"/>
		<reference ref_id="CVE-2018-11361" ref_url="https://www.suse.com/security/cve/CVE-2018-11361/" source="CVE"/>
		<reference ref_id="CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362/" source="CVE"/>
		<reference ref_id="CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339/" source="CVE"/>
		<reference ref_id="CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340/" source="CVE"/>
		<reference ref_id="CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341/" source="CVE"/>
		<reference ref_id="CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342/" source="CVE"/>
		<reference ref_id="CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343/" source="CVE"/>
		<reference ref_id="CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344/" source="CVE"/>
		<reference ref_id="CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367/" source="CVE"/>
		<reference ref_id="CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368/" source="CVE"/>
		<reference ref_id="CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369/" source="CVE"/>
		<reference ref_id="CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370/" source="CVE"/>
		<reference ref_id="CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056/" source="CVE"/>
		<reference ref_id="CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057/" source="CVE"/>
		<reference ref_id="CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058/" source="CVE"/>
		<description>
This update for wireshark to version 2.4.9 fixes the following issues:

Wireshark was updated to 2.4.9 (bsc#1094301, bsc#1106514).

Security issues fixed:

- CVE-2018-16058: Bluetooth AVDTP dissector crash (wnpa-sec-2018-44)
- CVE-2018-16056: Bluetooth Attribute Protocol dissector crash (wnpa-sec-2018-45)
- CVE-2018-16057: Radiotap dissector crash (wnpa-sec-2018-46)
- CVE-2018-11355: Fix RTCP dissector crash (bsc#1094301).
- CVE-2018-14370: IEEE 802.11 dissector crash (wnpa-sec-2018-43, bsc#1101802)
- CVE-2018-14368: Bazaar dissector infinite loop (wnpa-sec-2018-40, bsc#1101794)
- CVE-2018-11362: Fix LDSS dissector crash (bsc#1094301).
- CVE-2018-11361: Fix IEEE 802.11 dissector crash (bsc#1094301).
- CVE-2018-11360: Fix GSM A DTAP dissector crash (bsc#1094301).
- CVE-2018-14342: BGP dissector large loop (wnpa-sec-2018-34, bsc#1101777)
- CVE-2018-14343: ASN.1 BER dissector crash (wnpa-sec-2018-37, bsc#1101786)
- CVE-2018-14340: Multiple dissectors could crash (wnpa-sec-2018-36, bsc#1101804)
- CVE-2018-14341: DICOM dissector crash (wnpa-sec-2018-39, bsc#1101776)
- CVE-2018-11358: Fix Q.931 dissector crash (bsc#1094301).
- CVE-2018-14344: ISMP dissector crash (wnpa-sec-2018-35, bsc#1101788)
- CVE-2018-11359: Fix multiple dissectors crashs (bsc#1094301).
- CVE-2018-11356: Fix DNS dissector crash (bsc#1094301).
- CVE-2018-14339: MMSE dissector infinite loop (wnpa-sec-2018-38, bsc#1101810)
- CVE-2018-11357: Fix multiple dissectors that could consume excessive memory (bsc#1094301).
- CVE-2018-14367: CoAP dissector crash (wnpa-sec-2018-42, bsc#1101791)
- CVE-2018-11354: Fix IEEE 1905.1a dissector crash (bsc#1094301).
- CVE-2018-14369: HTTP2 dissector crash (wnpa-sec-2018-41, bsc#1101800)

Further bug fixes and updated protocol support as listed in:
  https://www.wireshark.org/docs/relnotes/wireshark-2.4.9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-27"/>
	<updated date="2018-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101776">SUSE bug 1101776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101777">SUSE bug 1101777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101786">SUSE bug 1101786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101788">SUSE bug 1101788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101791">SUSE bug 1101791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101794">SUSE bug 1101794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101800">SUSE bug 1101800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101802">SUSE bug 1101802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101804">SUSE bug 1101804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101810">SUSE bug 1101810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11354/">CVE-2018-11354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11354">CVE-2018-11354 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11355/">CVE-2018-11355 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11355">CVE-2018-11355 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11356">CVE-2018-11356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11357">CVE-2018-11357 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11358">CVE-2018-11358 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11359">CVE-2018-11359 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11360">CVE-2018-11360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11361/">CVE-2018-11361 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11361">CVE-2018-11361 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11362">CVE-2018-11362 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14339">CVE-2018-14339 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14340">CVE-2018-14340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14341">CVE-2018-14341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14342">CVE-2018-14342 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14343">CVE-2018-14343 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14344">CVE-2018-14344 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14367">CVE-2018-14367 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14368">CVE-2018-14368 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14369">CVE-2018-14369 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14370">CVE-2018-14370 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16056">CVE-2018-16056 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16057">CVE-2018-16057 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16058">CVE-2018-16058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151855" version="1" class="patch">
	<metadata>
		<title>Security update for smt, yast2-smt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1006984" ref_url="https://bugzilla.suse.com/1006984" source="BUGZILLA"/>
		<reference ref_id="1006989" ref_url="https://bugzilla.suse.com/1006989" source="BUGZILLA"/>
		<reference ref_id="1037811" ref_url="https://bugzilla.suse.com/1037811" source="BUGZILLA"/>
		<reference ref_id="1097560" ref_url="https://bugzilla.suse.com/1097560" source="BUGZILLA"/>
		<reference ref_id="1097824" ref_url="https://bugzilla.suse.com/1097824" source="BUGZILLA"/>
		<reference ref_id="1103809" ref_url="https://bugzilla.suse.com/1103809" source="BUGZILLA"/>
		<reference ref_id="1103810" ref_url="https://bugzilla.suse.com/1103810" source="BUGZILLA"/>
		<reference ref_id="1104076" ref_url="https://bugzilla.suse.com/1104076" source="BUGZILLA"/>
		<reference ref_id="977043" ref_url="https://bugzilla.suse.com/977043" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12470" ref_url="https://www.suse.com/security/cve/CVE-2018-12470/" source="CVE"/>
		<reference ref_id="CVE-2018-12471" ref_url="https://www.suse.com/security/cve/CVE-2018-12471/" source="CVE"/>
		<reference ref_id="CVE-2018-12472" ref_url="https://www.suse.com/security/cve/CVE-2018-12472/" source="CVE"/>
		<description>
This update for yast2-smt to 3.0.14 and smt to 3.0.37 fixes the following issues:

These security issues were fixed in SMT:

- CVE-2018-12471: Xml External Entity processing in the RegistrationSharing
  modules allowed to read arbitrary file read (bsc#1103809).
- CVE-2018-12470: SQL injection in RegistrationSharing module allows remote
  attackers to run arbitrary SQL statements (bsc#1103810).
- CVE-2018-12472: Authentication bypass in sibling check facilitated further
  attacks on SMT (bsc#1104076).

SUSE would like to thank Jake Miller for reporting these issues to us.

These non-security issues were fixed in SMT:

- Fix cron jobs randomization (bsc#1097560)
- Fix duplicate migration paths (bsc#1097824)

This non-security issue was fixed in yast2-smt:

- Remove cron job rescheduling (bsc#1097560)
- Added missing translation marks (bsc#1037811)
- Explicitly mention 'Organization Credentials' (fate#321759)
- Rearrange the SMT set-up dialog (bsc#977043)
- Make the Filter button default (bsc#1006984)
- Prevent exiting the repo selection dialog via hitting Enter in
  the repository filter (bsc#1006984)
- report when error occurs during repo mirroring (bsc#1006989)
- Use TextEntry-based filter for repos (fate#319777)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-27"/>
	<updated date="2018-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1006984">SUSE bug 1006984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006989">SUSE bug 1006989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037811">SUSE bug 1037811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097560">SUSE bug 1097560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097824">SUSE bug 1097824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103809">SUSE bug 1103809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103810">SUSE bug 1103810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104076">SUSE bug 1104076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977043">SUSE bug 977043</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12470/">CVE-2018-12470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12470">CVE-2018-12470 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12471/">CVE-2018-12471 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12471">CVE-2018-12471 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12472/">CVE-2018-12472 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12472">CVE-2018-12472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530263" comment="res-signingkeys-3.0.37-52.23.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530264" comment="smt-3.0.37-52.23.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530265" comment="smt-support-3.0.37-52.23.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151856" version="1" class="patch">
	<metadata>
		<title>Security update for yast2-smt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1097560" ref_url="https://bugzilla.suse.com/1097560" source="BUGZILLA"/>
		<description>
This update fixes the following issue in yast2-smt:

- Remove cron job rescheduling (bsc#1097560)

This update is a requirement for the security update for SMT. Because of that it is
tagged as security to ensure that all users, even those that only install security updates,
install it.
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-27"/>
	<updated date="2018-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097560">SUSE bug 1097560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553217" comment="yast2-smt-3.0.14-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151857" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1089039" ref_url="https://bugzilla.suse.com/1089039" source="BUGZILLA"/>
		<reference ref_id="1101246" ref_url="https://bugzilla.suse.com/1101246" source="BUGZILLA"/>
		<reference ref_id="1101470" ref_url="https://bugzilla.suse.com/1101470" source="BUGZILLA"/>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1106197" ref_url="https://bugzilla.suse.com/1106197" source="BUGZILLA"/>
		<reference ref_id="997043" ref_url="https://bugzilla.suse.com/997043" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

These security issues were fixed:

- Prevent One&amp;Done side-channel attack on RSA that allowed physically near
  attackers to use EM emanations to recover information (bsc#1104789)
- CVE-2018-0737: The RSA Key generation algorithm has been shown to be
  vulnerable to a cache timing side channel attack. An attacker with sufficient
  access to mount cache timing attacks during the RSA key generation process
  could have recovered the private key (bsc#1089039)

These non-security issues were fixed:

- Add openssl(cli) Provide so the packages that require the openssl
  binary can require this instead of the new openssl meta package
  (bsc#1101470)
- Fixed path to the engines which are under /lib64 on SLE-12 (bsc#1101246,
  bsc#997043)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-28"/>
	<updated date="2018-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101246">SUSE bug 1101246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101470">SUSE bug 1101470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106197">SUSE bug 1106197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997043">SUSE bug 997043</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0737">CVE-2018-0737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520119" comment="libopenssl-devel-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520120" comment="libopenssl1_0_0-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520121" comment="libopenssl1_0_0-32bit-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530267" comment="libopenssl1_0_0-hmac-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530268" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520122" comment="openssl-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530269" comment="openssl-doc-1.0.2j-60.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151858" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1013992" ref_url="https://bugzilla.suse.com/1013992" source="BUGZILLA"/>
		<reference ref_id="1013993" ref_url="https://bugzilla.suse.com/1013993" source="BUGZILLA"/>
		<reference ref_id="1080074" ref_url="https://bugzilla.suse.com/1080074" source="BUGZILLA"/>
		<reference ref_id="910683" ref_url="https://bugzilla.suse.com/910683" source="BUGZILLA"/>
		<reference ref_id="914442" ref_url="https://bugzilla.suse.com/914442" source="BUGZILLA"/>
		<reference ref_id="950110" ref_url="https://bugzilla.suse.com/950110" source="BUGZILLA"/>
		<reference ref_id="950111" ref_url="https://bugzilla.suse.com/950111" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<reference ref_id="CVE-2014-9913" ref_url="https://www.suse.com/security/cve/CVE-2014-9913/" source="CVE"/>
		<reference ref_id="CVE-2015-7696" ref_url="https://www.suse.com/security/cve/CVE-2015-7696/" source="CVE"/>
		<reference ref_id="CVE-2015-7697" ref_url="https://www.suse.com/security/cve/CVE-2015-7697/" source="CVE"/>
		<reference ref_id="CVE-2016-9844" ref_url="https://www.suse.com/security/cve/CVE-2016-9844/" source="CVE"/>
		<reference ref_id="CVE-2018-1000035" ref_url="https://www.suse.com/security/cve/CVE-2018-1000035/" source="CVE"/>
		<description>
This update for unzip fixes the following security issues:

- CVE-2014-9913: Specially crafted zip files could trigger invalid memory
  writes possibly resulting in DoS or corruption (bsc#1013993)
- CVE-2015-7696: Specially crafted zip files with password protection could
  trigger a crash and lead to denial of service (bsc#950110)
- CVE-2015-7697: Specially crafted zip files could trigger an endless loop and
  lead to denial of service (bsc#950111)
- CVE-2016-9844: Specially crafted zip files could trigger invalid memory
  writes possibly resulting in DoS or corruption (bsc#1013992)
- CVE-2018-1000035: Prevent heap-based buffer overflow in the processing of
  password-protected archives that allowed an attacker to perform a denial of
  service or to possibly achieve code execution (bsc#1080074).
- CVE-2014-9636: Prevent denial of service (out-of-bounds read or write and
  crash) via an extra field with an uncompressed size smaller than the compressed
  field size in a zip archive that advertises STORED method compression
  (bsc#914442).

This non-security issue was fixed:

+- Allow processing of Windows zip64 archives (Windows archivers set
  total_disks field to 0 but per standard, valid values are 1 and higher)
  (bnc#910683)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-02"/>
	<updated date="2018-10-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013992">SUSE bug 1013992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013993">SUSE bug 1013993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080074">SUSE bug 1080074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910683">SUSE bug 910683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914442">SUSE bug 914442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950110">SUSE bug 950110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950111">SUSE bug 950111</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9636">CVE-2014-9636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9913/">CVE-2014-9913 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9913">CVE-2014-9913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7696/">CVE-2015-7696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7696">CVE-2015-7696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7697/">CVE-2015-7697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7697">CVE-2015-7697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9844/">CVE-2016-9844 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9844">CVE-2016-9844 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000035/">CVE-2018-1000035 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000035">CVE-2018-1000035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520123" comment="unzip-6.00-33.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151859" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1106171" ref_url="https://bugzilla.suse.com/1106171" source="BUGZILLA"/>
		<reference ref_id="1106172" ref_url="https://bugzilla.suse.com/1106172" source="BUGZILLA"/>
		<reference ref_id="1106173" ref_url="https://bugzilla.suse.com/1106173" source="BUGZILLA"/>
		<reference ref_id="1106195" ref_url="https://bugzilla.suse.com/1106195" source="BUGZILLA"/>
		<reference ref_id="1107410" ref_url="https://bugzilla.suse.com/1107410" source="BUGZILLA"/>
		<reference ref_id="1107411" ref_url="https://bugzilla.suse.com/1107411" source="BUGZILLA"/>
		<reference ref_id="1107412" ref_url="https://bugzilla.suse.com/1107412" source="BUGZILLA"/>
		<reference ref_id="1107413" ref_url="https://bugzilla.suse.com/1107413" source="BUGZILLA"/>
		<reference ref_id="1107420" ref_url="https://bugzilla.suse.com/1107420" source="BUGZILLA"/>
		<reference ref_id="1107421" ref_url="https://bugzilla.suse.com/1107421" source="BUGZILLA"/>
		<reference ref_id="1107422" ref_url="https://bugzilla.suse.com/1107422" source="BUGZILLA"/>
		<reference ref_id="1107423" ref_url="https://bugzilla.suse.com/1107423" source="BUGZILLA"/>
		<reference ref_id="1107426" ref_url="https://bugzilla.suse.com/1107426" source="BUGZILLA"/>
		<reference ref_id="1107581" ref_url="https://bugzilla.suse.com/1107581" source="BUGZILLA"/>
		<reference ref_id="1108027" ref_url="https://bugzilla.suse.com/1108027" source="BUGZILLA"/>
		<reference ref_id="1109105" ref_url="https://bugzilla.suse.com/1109105" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15908" ref_url="https://www.suse.com/security/cve/CVE-2018-15908/" source="CVE"/>
		<reference ref_id="CVE-2018-15909" ref_url="https://www.suse.com/security/cve/CVE-2018-15909/" source="CVE"/>
		<reference ref_id="CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910/" source="CVE"/>
		<reference ref_id="CVE-2018-15911" ref_url="https://www.suse.com/security/cve/CVE-2018-15911/" source="CVE"/>
		<reference ref_id="CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509/" source="CVE"/>
		<reference ref_id="CVE-2018-16510" ref_url="https://www.suse.com/security/cve/CVE-2018-16510/" source="CVE"/>
		<reference ref_id="CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511/" source="CVE"/>
		<reference ref_id="CVE-2018-16513" ref_url="https://www.suse.com/security/cve/CVE-2018-16513/" source="CVE"/>
		<reference ref_id="CVE-2018-16539" ref_url="https://www.suse.com/security/cve/CVE-2018-16539/" source="CVE"/>
		<reference ref_id="CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540/" source="CVE"/>
		<reference ref_id="CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542/" source="CVE"/>
		<reference ref_id="CVE-2018-16543" ref_url="https://www.suse.com/security/cve/CVE-2018-16543/" source="CVE"/>
		<reference ref_id="CVE-2018-16585" ref_url="https://www.suse.com/security/cve/CVE-2018-16585/" source="CVE"/>
		<reference ref_id="CVE-2018-16802" ref_url="https://www.suse.com/security/cve/CVE-2018-16802/" source="CVE"/>
		<reference ref_id="CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183/" source="CVE"/>
		<description>
This update for ghostscript to version 9.25 fixes the following issues:

These security issues were fixed:

- CVE-2018-17183: Remote attackers were be able to supply crafted PostScript to
  potentially overwrite or replace error handlers to inject code (bsc#1109105)
- CVE-2018-15909: Prevent type confusion using the .shfill operator that could
  have been used by attackers able to supply crafted PostScript files to crash
  the interpreter or potentially execute code (bsc#1106172).
- CVE-2018-15908: Prevent attackers that are able to supply malicious
  PostScript files to bypass .tempfile restrictions and write files
  (bsc#1106171).
- CVE-2018-15910: Prevent a type confusion in the LockDistillerParams parameter
  that could have been used to crash the interpreter or execute code
  (bsc#1106173).
- CVE-2018-15911: Prevent use uninitialized memory access in the aesdecode
  operator that could have been used to crash the interpreter or potentially
  execute code (bsc#1106195).
- CVE-2018-16513: Prevent a type confusion in the setcolor function that could
  have been used to crash the interpreter or possibly have unspecified other
  impact (bsc#1107412).
- CVE-2018-16509: Incorrect 'restoration of privilege' checking during handling
  of /invalidaccess exceptions could be have been used by attackers able to
  supply crafted PostScript to execute code using the 'pipe' instruction
  (bsc#1107410).
- CVE-2018-16510: Incorrect exec stack handling in the 'CS' and 'SC' PDF
  primitives could have been used by remote attackers able to supply crafted PDFs
  to crash the interpreter or possibly have unspecified other impact
  (bsc#1107411).
- CVE-2018-16542: Prevent attackers able to supply crafted PostScript files
  from using insufficient interpreter stack-size checking during error handling
  to crash the interpreter (bsc#1107413).
- CVE-2018-16541: Prevent attackers able to supply crafted PostScript files
  from using incorrect free logic in pagedevice replacement to crash the
  interpreter (bsc#1107421).
- CVE-2018-16540: Prevent use-after-free in copydevice handling that could have
  been used to crash the interpreter or possibly have unspecified other impact
  (bsc#1107420).
- CVE-2018-16539: Prevent attackers able to supply crafted PostScript files
  from using incorrect access checking in temp file handling to disclose contents
  of files on the system otherwise not readable (bsc#1107422).
- CVE-2018-16543: gssetresolution and gsgetresolution allowed attackers to have
  an unspecified impact (bsc#1107423).
- CVE-2018-16511: A type confusion in 'ztype' could have been used by remote
  attackers able to supply crafted PostScript to crash the interpreter or
  possibly have unspecified other impact (bsc#1107426).
- CVE-2018-16585: The .setdistillerkeys PostScript command was accepted even
  though it is not intended for use during document processing (e.g., after the
  startup phase). This lead to memory corruption, allowing remote attackers able
  to supply crafted PostScript to crash the interpreter or possibly have
  unspecified other impact (bsc#1107581).
- CVE-2018-16802: Incorrect 'restoration of privilege' checking when running
  out of stack during exception handling could have been used by attackers able
  to supply crafted PostScript to execute code using the 'pipe' instruction. This
  is due to an incomplete fix for CVE-2018-16509 (bsc#1108027).

These non-security issues were fixed:

* Fixes problems with argument handling, some unintended results of the
  security fixes to the SAFER file access restrictions (specifically accessing
  ICC profile files).
* Avoid that ps2epsi fails with 'Error: /undefined in --setpagedevice--'

For additional changes please check http://www.ghostscript.com/doc/9.25/News.htm
and the changes file of the package.
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-02"/>
	<updated date="2018-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106171">SUSE bug 1106171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106172">SUSE bug 1106172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106173">SUSE bug 1106173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106195">SUSE bug 1106195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107410">SUSE bug 1107410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107411">SUSE bug 1107411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107412">SUSE bug 1107412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107413">SUSE bug 1107413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107420">SUSE bug 1107420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107421">SUSE bug 1107421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107422">SUSE bug 1107422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107423">SUSE bug 1107423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107426">SUSE bug 1107426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107581">SUSE bug 1107581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15908/">CVE-2018-15908 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15908">CVE-2018-15908 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15909/">CVE-2018-15909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15909">CVE-2018-15909 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15910">CVE-2018-15910 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15911/">CVE-2018-15911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15911">CVE-2018-15911 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16509">CVE-2018-16509 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16510/">CVE-2018-16510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16510">CVE-2018-16510 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16511">CVE-2018-16511 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16513/">CVE-2018-16513 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16513">CVE-2018-16513 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16539/">CVE-2018-16539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16539">CVE-2018-16539 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16540">CVE-2018-16540 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16541">CVE-2018-16541 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16542">CVE-2018-16542 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16543/">CVE-2018-16543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16543">CVE-2018-16543 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16585/">CVE-2018-16585 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16585">CVE-2018-16585 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16802/">CVE-2018-16802 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16802">CVE-2018-16802 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17183">CVE-2018-17183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151860" version="1" class="patch">
	<metadata>
		<title>Security update for mgetty (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1108752" ref_url="https://bugzilla.suse.com/1108752" source="BUGZILLA"/>
		<reference ref_id="1108756" ref_url="https://bugzilla.suse.com/1108756" source="BUGZILLA"/>
		<reference ref_id="1108757" ref_url="https://bugzilla.suse.com/1108757" source="BUGZILLA"/>
		<reference ref_id="1108761" ref_url="https://bugzilla.suse.com/1108761" source="BUGZILLA"/>
		<reference ref_id="1108762" ref_url="https://bugzilla.suse.com/1108762" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16741" ref_url="https://www.suse.com/security/cve/CVE-2018-16741/" source="CVE"/>
		<reference ref_id="CVE-2018-16742" ref_url="https://www.suse.com/security/cve/CVE-2018-16742/" source="CVE"/>
		<reference ref_id="CVE-2018-16743" ref_url="https://www.suse.com/security/cve/CVE-2018-16743/" source="CVE"/>
		<reference ref_id="CVE-2018-16744" ref_url="https://www.suse.com/security/cve/CVE-2018-16744/" source="CVE"/>
		<reference ref_id="CVE-2018-16745" ref_url="https://www.suse.com/security/cve/CVE-2018-16745/" source="CVE"/>
		<description>
This update for mgetty fixes the following security issues:

- CVE-2018-16741: The function do_activate() did not properly sanitize shell
  metacharacters to prevent command injection (bsc#1108752)
- CVE-2018-16745: The mail_to parameter was not sanitized, leading to a buffer
  overflow if long untrusted input reached it (bsc#1108756)
- CVE-2018-16744: The mail_to parameter was not sanitized, leading to command
  injection if untrusted input reached reach it (bsc#1108757)
- CVE-2018-16742: Prevent stack-based buffer overflow that could have been
  triggered via a command-line parameter (bsc#1108762)
- CVE-2018-16743: The command-line parameter username wsa passed unsanitized to
  strcpy(), which could have caused a stack-based buffer overflow (bsc#1108761)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-02"/>
	<updated date="2018-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1108752">SUSE bug 1108752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108756">SUSE bug 1108756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108757">SUSE bug 1108757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108761">SUSE bug 1108761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108762">SUSE bug 1108762</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16741/">CVE-2018-16741 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16741">CVE-2018-16741 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16742/">CVE-2018-16742 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16742">CVE-2018-16742 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16743/">CVE-2018-16743 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16743">CVE-2018-16743 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16744/">CVE-2018-16744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16744">CVE-2018-16744 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16745/">CVE-2018-16745 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16745">CVE-2018-16745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520126" comment="g3utils-1.1.36-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520127" comment="mgetty-1.1.36-58.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151861" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638)
- Prevent out of bounds reads in message parsing
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-04"/>
	<updated date="2018-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17833">CVE-2017-17833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520128" comment="openslp-2.0.0-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520129" comment="openslp-32bit-2.0.0-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530283" comment="openslp-server-2.0.0-18.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151862" version="1" class="patch">
	<metadata>
		<title>Security update for texlive (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1109673" ref_url="https://bugzilla.suse.com/1109673" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17407" ref_url="https://www.suse.com/security/cve/CVE-2018-17407/" source="CVE"/>
		<description>
This update for texlive fixes the following issue:

- CVE-2018-17407: Prevent buffer overflow when handling of Type 1 fonts allowed
  arbitrary code execution when a malicious font was loaded by one of the
  vulnerable tools: pdflatex, pdftex, dvips, or luatex (bsc#1109673)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-05"/>
	<updated date="2018-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109673">SUSE bug 1109673</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17407/">CVE-2018-17407 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17407">CVE-2018-17407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520140" comment="libkpathsea6-6.2.0dev-22.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151863" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1101644" ref_url="https://bugzilla.suse.com/1101644" source="BUGZILLA"/>
		<reference ref_id="1101645" ref_url="https://bugzilla.suse.com/1101645" source="BUGZILLA"/>
		<reference ref_id="1101651" ref_url="https://bugzilla.suse.com/1101651" source="BUGZILLA"/>
		<reference ref_id="1101656" ref_url="https://bugzilla.suse.com/1101656" source="BUGZILLA"/>
		<reference ref_id="1106812" ref_url="https://bugzilla.suse.com/1106812" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2938" ref_url="https://www.suse.com/security/cve/CVE-2018-2938/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk to the jdk8u181 (icedtea 3.9.0) release fixes the following issues:

These security issues were fixed:

- CVE-2018-2938: Difficult to exploit vulnerability allowed unauthenticated
  attacker with network access via multiple protocols to compromise Java SE.
  Successful attacks of this vulnerability can result in takeover of Java SE
  (bsc#1101644).
- CVE-2018-2940: Vulnerability in subcomponent: Libraries. Easily exploitable
  vulnerability allowed unauthenticated attacker with network access via multiple
  protocols to compromise Java SE, Java SE Embedded. Successful attacks require
  human interaction from a person other than the attacker. Successful attacks of
  this vulnerability can result in unauthorized read access to a subset of Java
  SE, Java SE Embedded accessible data (bsc#1101645)
- CVE-2018-2952: Vulnerability in subcomponent: Concurrency. Difficult to
  exploit vulnerability allowed unauthenticated attacker with network access via
  multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful
  attacks of this vulnerability can result in unauthorized ability to cause a
  partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit
  (bsc#1101651)
- CVE-2018-2973: Vulnerability in subcomponent: JSSE. Difficult to exploit
  vulnerability allowed unauthenticated attacker with network access via SSL/TLS
  to compromise Java SE, Java SE Embedded. Successful attacks of this
  vulnerability can result in unauthorized creation, deletion or modification
  access to critical data or all Java SE, Java SE Embedded accessible data
  (bsc#1101656)

These non-security issues were fixed:

- Improve desktop file usage
- Better Internet address support
- speculative traps break when classes are redefined
- sun/security/pkcs11/ec/ReadCertificates.java fails intermittently
- Clean up code that saves the previous versions of redefined classes
- Prevent SIGSEGV in ReceiverTypeData::clean_weak_klass_links
- RedefineClasses() tests fail assert(((Metadata*)obj)-&gt;is_valid()) failed: obj is valid
- NMT is not enabled if NMT option is specified after class path specifiers
- EndEntityChecker should not process custom extensions after PKIX validation
- SupportedDSAParamGen.java failed with timeout
- Montgomery multiply intrinsic should use correct name
- When determining the ciphersuite lists, there is no debug output for disabled suites.
- sun/security/mscapi/SignedObjectChain.java fails on Windows
- On Windows Swing changes keyboard layout on a window activation
- IfNode::range_check_trap_proj() should handler dying subgraph with single if proj
- Even better Internet address support
- Newlines in JAXB string values of SOAP-requests are escaped to '&amp;#xa;'
- TestFlushableGZIPOutputStream failing with IndexOutOfBoundsException
- Unable to use JDWP API in JDK 8 to debug JDK 9 VM
- Hotspot crash on Cassandra 3.11.1 startup with libnuma 2.0.3
- Performance drop with Java JDK 1.8.0_162-b32
- Upgrade time-zone data to tzdata2018d
- Fix potential crash in BufImg_SetupICM
- JDK 8u181 l10n resource file update
- Remove debug print statements from RMI fix
- (tz) Upgrade time-zone data to tzdata2018e
- ObjectInputStream filterCheck method throws NullPointerException
- adjust reflective access checks
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-08"/>
	<updated date="2018-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101644">SUSE bug 1101644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101651">SUSE bug 1101651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106812">SUSE bug 1106812</bugzilla>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2938/">CVE-2018-2938 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2938">CVE-2018-2938 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2940">CVE-2018-2940 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2952">CVE-2018-2952 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2973">CVE-2018-2973 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520141" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530284" comment="java-1_8_0-openjdk-demo-1.8.0.181-27.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530285" comment="java-1_8_0-openjdk-devel-1.8.0.181-27.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520142" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151864" version="1" class="patch">
	<metadata>
		<title>Security update for qpdf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1040311" ref_url="https://bugzilla.suse.com/1040311" source="BUGZILLA"/>
		<reference ref_id="1040312" ref_url="https://bugzilla.suse.com/1040312" source="BUGZILLA"/>
		<reference ref_id="1040313" ref_url="https://bugzilla.suse.com/1040313" source="BUGZILLA"/>
		<reference ref_id="1050577" ref_url="https://bugzilla.suse.com/1050577" source="BUGZILLA"/>
		<reference ref_id="1050578" ref_url="https://bugzilla.suse.com/1050578" source="BUGZILLA"/>
		<reference ref_id="1050579" ref_url="https://bugzilla.suse.com/1050579" source="BUGZILLA"/>
		<reference ref_id="1050581" ref_url="https://bugzilla.suse.com/1050581" source="BUGZILLA"/>
		<reference ref_id="1055960" ref_url="https://bugzilla.suse.com/1055960" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11624" ref_url="https://www.suse.com/security/cve/CVE-2017-11624/" source="CVE"/>
		<reference ref_id="CVE-2017-11625" ref_url="https://www.suse.com/security/cve/CVE-2017-11625/" source="CVE"/>
		<reference ref_id="CVE-2017-11626" ref_url="https://www.suse.com/security/cve/CVE-2017-11626/" source="CVE"/>
		<reference ref_id="CVE-2017-11627" ref_url="https://www.suse.com/security/cve/CVE-2017-11627/" source="CVE"/>
		<reference ref_id="CVE-2017-12595" ref_url="https://www.suse.com/security/cve/CVE-2017-12595/" source="CVE"/>
		<reference ref_id="CVE-2017-9208" ref_url="https://www.suse.com/security/cve/CVE-2017-9208/" source="CVE"/>
		<reference ref_id="CVE-2017-9209" ref_url="https://www.suse.com/security/cve/CVE-2017-9209/" source="CVE"/>
		<reference ref_id="CVE-2017-9210" ref_url="https://www.suse.com/security/cve/CVE-2017-9210/" source="CVE"/>
		<description>

  
This update for qpdf fixes the following issues:

qpdf was updated to 7.1.1.

Security issues fixed:

- CVE-2017-11627: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050577).
- CVE-2017-11625: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050579).
- CVE-2017-11626: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050578).
- CVE-2017-11624: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050581).
- CVE-2017-12595: Stack overflow when processing deeply nested arrays and dictionaries (bsc#1055960).
- CVE-2017-9209: Remote attackers can cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document (bsc#1040312).
- CVE-2017-9210: Remote attackers can cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document (bsc#1040313).
- CVE-2017-9208: Remote attackers can cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document (bsc#1040311).

  * Check release notes for detailed bug fixes.
  * http://qpdf.sourceforge.net/files/qpdf-manual.html#ref.release-notes

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-08"/>
	<updated date="2018-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040311">SUSE bug 1040311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040312">SUSE bug 1040312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040313">SUSE bug 1040313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050577">SUSE bug 1050577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050578">SUSE bug 1050578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050579">SUSE bug 1050579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050581">SUSE bug 1050581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055960">SUSE bug 1055960</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11624/">CVE-2017-11624 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11624">CVE-2017-11624 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11625/">CVE-2017-11625 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11625">CVE-2017-11625 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11626/">CVE-2017-11626 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11626">CVE-2017-11626 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11627/">CVE-2017-11627 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11627">CVE-2017-11627 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12595/">CVE-2017-12595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12595">CVE-2017-12595 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9208/">CVE-2017-9208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9208">CVE-2017-9208 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9209/">CVE-2017-9209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9209">CVE-2017-9209 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9210/">CVE-2017-9210 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9210">CVE-2017-9210 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520143" comment="cups-filters-1.0.58-19.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520144" comment="cups-filters-cups-browsed-1.0.58-19.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520145" comment="cups-filters-foomatic-rip-1.0.58-19.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520146" comment="cups-filters-ghostscript-1.0.58-19.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520147" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530290" comment="qpdf-7.1.1-3.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151865" version="1" class="patch">
	<metadata>
		<title>Security update for soundtouch (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1103676" ref_url="https://bugzilla.suse.com/1103676" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000223" ref_url="https://www.suse.com/security/cve/CVE-2018-1000223/" source="CVE"/>
		<description>
This update for soundtouch fixes the following security issue:

- CVE-2018-1000223: Prevent buffer overflow in WavInFile::readHeaderBlock()
  that could have resulted in arbitrary code execution when opening maliocius
  file in soundstretch utility (bsc#1103676)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-08"/>
	<updated date="2018-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103676">SUSE bug 1103676</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000223/">CVE-2018-1000223 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000223">CVE-2018-1000223 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520148" comment="libSoundTouch0-1.7.1-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151866" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1108308" ref_url="https://bugzilla.suse.com/1108308" source="BUGZILLA"/>
		<description>

This update for brings postgresql10 version 10.5 to SUSE Linux Enterprise 12 SP3. (FATE#325659 bnc#1108308)

This release marks the change of the versioning scheme for PostgreSQL
to a 'x.y' format. This means the next minor releases of PostgreSQL
will be 10.1, 10.2, ... and the next major release will be 11.

* Logical Replication

Logical replication extends the current replication features of
PostgreSQL with the ability to send modifications on a per-database
and per-table level to different PostgreSQL databases. Users can now
fine-tune the data replicated to various database clusters and will
have the ability to perform zero-downtime upgrades to future major
PostgreSQL versions.

* Declarative Table Partitioning

Table partitioning has existed for years in PostgreSQL but required a
user to maintain a nontrivial set of rules and triggers for the
partitioning to work. PostgreSQL 10 introduces a table partitioning
syntax that lets users easily create and maintain range and list
partitioned tables.

* Improved Query Parallelism

PostgreSQL 10 provides better support for parallelized queries by
allowing more parts of the query execution process to be
parallelized. Improvements include additional types of data scans that
are parallelized as well as optimizations when the data is recombined,
such as pre-sorting. These enhancements allow results to be returned
more quickly.

* Quorum Commit for Synchronous Replication

PostgreSQL 10 introduces quorum commit for synchronous replication,
which allows for flexibility in how a primary database receives
acknowledgement that changes were successfully written to remote
replicas.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-08"/>
	<updated date="2018-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108308">SUSE bug 1108308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520151" comment="libecpg6-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520152" comment="libpq5-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520153" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530291" comment="postgresql-init-10-17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520154" comment="postgresql10-10.5-1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530292" comment="postgresql10-contrib-10.5-1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530293" comment="postgresql10-docs-10.5-1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530294" comment="postgresql10-server-10.5-1.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151867" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1088279" ref_url="https://bugzilla.suse.com/1088279" source="BUGZILLA"/>
		<reference ref_id="1088601" ref_url="https://bugzilla.suse.com/1088601" source="BUGZILLA"/>
		<reference ref_id="1102046" ref_url="https://bugzilla.suse.com/1102046" source="BUGZILLA"/>
		<reference ref_id="1105166" ref_url="https://bugzilla.suse.com/1105166" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18258" ref_url="https://www.suse.com/security/cve/CVE-2017-18258/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="CVE-2018-14567" ref_url="https://www.suse.com/security/cve/CVE-2018-14567/" source="CVE"/>
		<reference ref_id="CVE-2018-9251" ref_url="https://www.suse.com/security/cve/CVE-2018-9251/" source="CVE"/>
		<description>
This update for libxml2 fixes the following security issues:

- CVE-2018-9251: The xz_decomp function allowed remote attackers to cause a
  denial of service (infinite loop) via a crafted XML file that triggers
  LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint (bsc#1088279).
- CVE-2018-14567: Prevent denial of service (infinite loop) via a crafted XML
  file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint
  (bsc#1105166).
- CVE-2018-14404: Prevent NULL pointer dereference in the xmlXPathCompOpEval()
  function when parsing an invalid XPath expression in the XPATH_OP_AND or
  XPATH_OP_OR case leading to a denial of service attack (bsc#1102046).
- CVE-2017-18258: The xz_head function allowed remote attackers to cause a
  denial of service (memory consumption) via a crafted LZMA file, because the
  decoder functionality did not restrict memory usage to what is required for a
  legitimate file (bsc#1088601).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-09"/>
	<updated date="2018-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1088279">SUSE bug 1088279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088601">SUSE bug 1088601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102046">SUSE bug 1102046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105166">SUSE bug 1105166</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18258/">CVE-2017-18258 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18258">CVE-2017-18258 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14404">CVE-2018-14404 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14567/">CVE-2018-14567 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14567">CVE-2018-14567 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9251/">CVE-2018-9251 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9251">CVE-2018-9251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520155" comment="libxml2-2-2.9.4-46.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520156" comment="libxml2-2-32bit-2.9.4-46.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553255" comment="libxml2-doc-2.9.4-46.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520157" comment="libxml2-tools-2.9.4-46.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520158" comment="python-libxml2-2.9.4-46.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151868" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1050129" ref_url="https://bugzilla.suse.com/1050129" source="BUGZILLA"/>
		<reference ref_id="1105592" ref_url="https://bugzilla.suse.com/1105592" source="BUGZILLA"/>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1107604" ref_url="https://bugzilla.suse.com/1107604" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1107612" ref_url="https://bugzilla.suse.com/1107612" source="BUGZILLA"/>
		<reference ref_id="1107616" ref_url="https://bugzilla.suse.com/1107616" source="BUGZILLA"/>
		<reference ref_id="1107619" ref_url="https://bugzilla.suse.com/1107619" source="BUGZILLA"/>
		<reference ref_id="1108282" ref_url="https://bugzilla.suse.com/1108282" source="BUGZILLA"/>
		<reference ref_id="1108283" ref_url="https://bugzilla.suse.com/1108283" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11532" ref_url="https://www.suse.com/security/cve/CVE-2017-11532/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16640" ref_url="https://www.suse.com/security/cve/CVE-2018-16640/" source="CVE"/>
		<reference ref_id="CVE-2018-16642" ref_url="https://www.suse.com/security/cve/CVE-2018-16642/" source="CVE"/>
		<reference ref_id="CVE-2018-16643" ref_url="https://www.suse.com/security/cve/CVE-2018-16643/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-16645" ref_url="https://www.suse.com/security/cve/CVE-2018-16645/" source="CVE"/>
		<reference ref_id="CVE-2018-16749" ref_url="https://www.suse.com/security/cve/CVE-2018-16749/" source="CVE"/>
		<reference ref_id="CVE-2018-16750" ref_url="https://www.suse.com/security/cve/CVE-2018-16750/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following security issues:

- CVE-2017-11532: Prevent a memory leak vulnerability in the WriteMPCImage()
  function in coders/mpc.c via a crafted file allowing for DoS (bsc#1050129)
- CVE-2018-16750: Prevent memory leak in the formatIPTCfromBuffer function
  (bsc#1108283)
- CVE-2018-16749: Added missing NULL check in ReadOneJNGImage that allowed an
  attacker to cause a denial of service (WriteBlob assertion failure and
  application exit) via a crafted file (bsc#1108282)
- CVE-2018-16642: The function InsertRow allowed remote attackers to cause a
  denial of service via a crafted image file due to an out-of-bounds write
  (bsc#1107616)
- CVE-2018-16640: Prevent memory leak in the function ReadOneJNGImage
  (bsc#1107619)
- CVE-2018-16643: The functions ReadDCMImage, ReadPWPImage, ReadCALSImage, and
  ReadPICTImage did check the return value of the fputc function, which allowed
  remote attackers to cause a denial of service via a crafted image file
  (bsc#1107612)
- CVE-2018-16644: Added missing check for length in the functions ReadDCMImage
  and ReadPICTImage, which allowed remote attackers to cause a denial of service
  via a crafted image (bsc#1107609)
- CVE-2018-16645: Prevent excessive memory allocation issue in the functions
  ReadBMPImage and ReadDIBImage, which allowed remote attackers to cause a denial
  of service via a crafted image file (bsc#1107604)
- CVE-2018-16413: Prevent heap-based buffer over-read in the PushShortPixel
  function leading to DoS (bsc#1106989)

This update also relaxes the restrictions of use of Postscript like formats to
'write' only. (bsc#1105592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-10"/>
	<updated date="2018-10-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050129">SUSE bug 1050129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107604">SUSE bug 1107604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107612">SUSE bug 1107612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107616">SUSE bug 1107616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107619">SUSE bug 1107619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108282">SUSE bug 1108282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108283">SUSE bug 1108283</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11532/">CVE-2017-11532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11532">CVE-2017-11532 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16413">CVE-2018-16413 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16640/">CVE-2018-16640 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16640">CVE-2018-16640 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16642/">CVE-2018-16642 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16642">CVE-2018-16642 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16643/">CVE-2018-16643 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16643">CVE-2018-16643 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16644">CVE-2018-16644 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16645/">CVE-2018-16645 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16645">CVE-2018-16645 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16749/">CVE-2018-16749 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16749">CVE-2018-16749 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16750/">CVE-2018-16750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16750">CVE-2018-16750 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520161" comment="libMagickCore-6_Q16-1-6.8.8.1-71.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520163" comment="libMagickWand-6_Q16-1-6.8.8.1-71.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151869" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 and libxcb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1094327" ref_url="https://bugzilla.suse.com/1094327" source="BUGZILLA"/>
		<reference ref_id="1102062" ref_url="https://bugzilla.suse.com/1102062" source="BUGZILLA"/>
		<reference ref_id="1102068" ref_url="https://bugzilla.suse.com/1102068" source="BUGZILLA"/>
		<reference ref_id="1102073" ref_url="https://bugzilla.suse.com/1102073" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14598" ref_url="https://www.suse.com/security/cve/CVE-2018-14598/" source="CVE"/>
		<reference ref_id="CVE-2018-14599" ref_url="https://www.suse.com/security/cve/CVE-2018-14599/" source="CVE"/>
		<reference ref_id="CVE-2018-14600" ref_url="https://www.suse.com/security/cve/CVE-2018-14600/" source="CVE"/>
		<description>
This update for libX11 and libxcb fixes the following issue:

libX11:

These security issues were fixed:

- CVE-2018-14599: The function XListExtensions was vulnerable to an off-by-one
  error caused by malicious server responses, leading to DoS or possibly
  unspecified other impact (bsc#1102062).
- CVE-2018-14600: The function XListExtensions interpreted a variable as signed
  instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes),
  leading to DoS or remote code execution (bsc#1102068).
- CVE-2018-14598: A malicious server could have sent a reply in which the first
  string overflows, causing a variable to be set to NULL that will be freed later
  on, leading to DoS (segmentation fault) (bsc#1102073).

This non-security issue was fixed:

- Make use of the new 64-bit sequence number API in XCB 1.11.1 to avoid the 32-bit
  sequence number wrap in libX11 (bsc#1094327).

libxcb:

- Expose 64-bit sequence number from XCB API so that Xlib and others can use it even
  on 32-bit environment. (bsc#1094327)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-11"/>
	<updated date="2018-10-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094327">SUSE bug 1094327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102062">SUSE bug 1102062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102068">SUSE bug 1102068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102073">SUSE bug 1102073</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14598/">CVE-2018-14598 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14598">CVE-2018-14598 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14599/">CVE-2018-14599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14599">CVE-2018-14599 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14600/">CVE-2018-14600 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14600">CVE-2018-14600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520164" comment="libX11-6-1.6.2-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520165" comment="libX11-6-32bit-1.6.2-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520166" comment="libX11-data-1.6.2-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520167" comment="libX11-xcb1-1.6.2-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520168" comment="libX11-xcb1-32bit-1.6.2-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520169" comment="libxcb-dri2-0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520170" comment="libxcb-dri2-0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520171" comment="libxcb-dri3-0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520172" comment="libxcb-dri3-0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520173" comment="libxcb-glx0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520174" comment="libxcb-glx0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520175" comment="libxcb-present0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520176" comment="libxcb-present0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520177" comment="libxcb-randr0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520178" comment="libxcb-render0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520179" comment="libxcb-render0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520180" comment="libxcb-shape0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520181" comment="libxcb-shm0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520182" comment="libxcb-shm0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520183" comment="libxcb-sync1-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520184" comment="libxcb-sync1-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520185" comment="libxcb-xf86dri0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520186" comment="libxcb-xfixes0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520187" comment="libxcb-xfixes0-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520188" comment="libxcb-xinerama0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520189" comment="libxcb-xkb1-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520190" comment="libxcb-xkb1-32bit-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520191" comment="libxcb-xv0-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520192" comment="libxcb1-1.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520193" comment="libxcb1-32bit-1.10-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151870" version="1" class="patch">
	<metadata>
		<title>Security update for axis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1103658" ref_url="https://bugzilla.suse.com/1103658" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8032" ref_url="https://www.suse.com/security/cve/CVE-2018-8032/" source="CVE"/>
		<description>
This update for axis fixes the following security issue:

- CVE-2018-8032: Prevent cross-site scripting (XSS) attack in the default
  servlet/services (bsc#1103658).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-12"/>
	<updated date="2018-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103658">SUSE bug 1103658</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8032/">CVE-2018-8032 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8032">CVE-2018-8032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553286" comment="axis-1.4-290.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151871" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1068059" ref_url="https://bugzilla.suse.com/1068059" source="BUGZILLA"/>
		<reference ref_id="1087931" ref_url="https://bugzilla.suse.com/1087931" source="BUGZILLA"/>
		<reference ref_id="1095057" ref_url="https://bugzilla.suse.com/1095057" source="BUGZILLA"/>
		<reference ref_id="1102230" ref_url="https://bugzilla.suse.com/1102230" source="BUGZILLA"/>
		<reference ref_id="1110943" ref_url="https://bugzilla.suse.com/1110943" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10919" ref_url="https://www.suse.com/security/cve/CVE-2018-10919/" source="CVE"/>
		<description>


Samba was updated to 4.6.15, bringing bug and security fixes. (bsc#1110943)

Following security issues were fixed:

- CVE-2018-10919: Fix unauthorized attribute access via searches. (bsc#1095057);

Non-security bugs fixed:

- Fix ctdb_mutex_ceph_rados_helper deadlock (bsc#1102230).
- Allow idmap_rid to have primary group other than 'Domain Users' (bsc#1087931).
- winbind: avoid using fstrcpy in _dual_init_connection.
- Fix ntlm authentications with 'winbind use default domain = yes' (bsc#1068059).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068059">SUSE bug 1068059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087931">SUSE bug 1087931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095057">SUSE bug 1095057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102230">SUSE bug 1102230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110943">SUSE bug 1110943</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10919/">CVE-2018-10919 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10919">CVE-2018-10919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520194" comment="libdcerpc-binding0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520195" comment="libdcerpc-binding0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520196" comment="libdcerpc0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520197" comment="libdcerpc0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520198" comment="libndr-krb5pac0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520199" comment="libndr-krb5pac0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520200" comment="libndr-nbt0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520201" comment="libndr-nbt0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520202" comment="libndr-standard0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520203" comment="libndr-standard0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520204" comment="libndr0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520205" comment="libndr0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520206" comment="libnetapi0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520207" comment="libnetapi0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520208" comment="libsamba-credentials0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520209" comment="libsamba-credentials0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520210" comment="libsamba-errors0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520211" comment="libsamba-errors0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520212" comment="libsamba-hostconfig0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520213" comment="libsamba-hostconfig0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520214" comment="libsamba-passdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520215" comment="libsamba-passdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520216" comment="libsamba-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520217" comment="libsamba-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520218" comment="libsamdb0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520219" comment="libsamdb0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520220" comment="libsmbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520221" comment="libsmbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520222" comment="libsmbconf0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520223" comment="libsmbconf0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520224" comment="libsmbldap0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520225" comment="libsmbldap0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520226" comment="libtevent-util0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520227" comment="libtevent-util0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520228" comment="libwbclient0-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520229" comment="libwbclient0-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520230" comment="samba-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520231" comment="samba-client-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520232" comment="samba-client-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520233" comment="samba-doc-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520234" comment="samba-libs-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520235" comment="samba-libs-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520236" comment="samba-winbind-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520237" comment="samba-winbind-32bit-4.6.16+git.124.aee309c5c18-3.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151872" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1098545" ref_url="https://bugzilla.suse.com/1098545" source="BUGZILLA"/>
		<reference ref_id="1098546" ref_url="https://bugzilla.suse.com/1098546" source="BUGZILLA"/>
		<reference ref_id="1110746" ref_url="https://bugzilla.suse.com/1110746" source="BUGZILLA"/>
		<reference ref_id="1110747" ref_url="https://bugzilla.suse.com/1110747" source="BUGZILLA"/>
		<reference ref_id="1111069" ref_url="https://bugzilla.suse.com/1111069" source="BUGZILLA"/>
		<reference ref_id="1111072" ref_url="https://bugzilla.suse.com/1111072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13058" ref_url="https://www.suse.com/security/cve/CVE-2017-13058/" source="CVE"/>
		<reference ref_id="CVE-2018-12599" ref_url="https://www.suse.com/security/cve/CVE-2018-12599/" source="CVE"/>
		<reference ref_id="CVE-2018-12600" ref_url="https://www.suse.com/security/cve/CVE-2018-12600/" source="CVE"/>
		<reference ref_id="CVE-2018-17965" ref_url="https://www.suse.com/security/cve/CVE-2018-17965/" source="CVE"/>
		<reference ref_id="CVE-2018-17966" ref_url="https://www.suse.com/security/cve/CVE-2018-17966/" source="CVE"/>
		<reference ref_id="CVE-2018-18016" ref_url="https://www.suse.com/security/cve/CVE-2018-18016/" source="CVE"/>
		<reference ref_id="CVE-2018-18024" ref_url="https://www.suse.com/security/cve/CVE-2018-18024/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2018-18024: Fixed an infinite loop in the ReadBMPImage function of
  the coders/bmp.c file. Remote attackers could leverage this vulnerability
  to cause a denial of service via a crafted bmp file. (bsc#1111069)
- CVE-2018-18016: Fixed a memory leak in WritePCXImage (bsc#1111072).
- CVE-2018-17965: Fixed a memory leak in WriteSGIImage (bsc#1110747).
- CVE-2018-17966: Fixed a memory leak in WritePDBImage (bsc#1110746).
- CVE-2018-12600: ReadDIBImage and WriteDIBImage allowed attackers to
  cause an out of bounds write via a crafted file. (bsc#1098545)
- CVE-2018-12599: ReadBMPImage and WriteBMPImage allowed attackers to
  cause an out of bounds write via a crafted file. (bsc#1098546)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-17"/>
	<updated date="2018-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1098545">SUSE bug 1098545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098546">SUSE bug 1098546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110746">SUSE bug 1110746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110747">SUSE bug 1110747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111069">SUSE bug 1111069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111072">SUSE bug 1111072</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13058/">CVE-2017-13058 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13058">CVE-2017-13058 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12599/">CVE-2018-12599 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12599">CVE-2018-12599 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12600/">CVE-2018-12600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12600">CVE-2018-12600 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17965/">CVE-2018-17965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17965">CVE-2018-17965 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17966/">CVE-2018-17966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17966">CVE-2018-17966 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18016/">CVE-2018-18016 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18016">CVE-2018-18016 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18024/">CVE-2018-18024 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18024">CVE-2018-18024 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520240" comment="libMagickCore-6_Q16-1-6.8.8.1-71.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520242" comment="libMagickWand-6_Q16-1-6.8.8.1-71.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151873" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1029907" ref_url="https://bugzilla.suse.com/1029907" source="BUGZILLA"/>
		<reference ref_id="1029908" ref_url="https://bugzilla.suse.com/1029908" source="BUGZILLA"/>
		<reference ref_id="1029909" ref_url="https://bugzilla.suse.com/1029909" source="BUGZILLA"/>
		<reference ref_id="1030296" ref_url="https://bugzilla.suse.com/1030296" source="BUGZILLA"/>
		<reference ref_id="1030297" ref_url="https://bugzilla.suse.com/1030297" source="BUGZILLA"/>
		<reference ref_id="1030298" ref_url="https://bugzilla.suse.com/1030298" source="BUGZILLA"/>
		<reference ref_id="1030584" ref_url="https://bugzilla.suse.com/1030584" source="BUGZILLA"/>
		<reference ref_id="1030585" ref_url="https://bugzilla.suse.com/1030585" source="BUGZILLA"/>
		<reference ref_id="1030588" ref_url="https://bugzilla.suse.com/1030588" source="BUGZILLA"/>
		<reference ref_id="1030589" ref_url="https://bugzilla.suse.com/1030589" source="BUGZILLA"/>
		<reference ref_id="1031590" ref_url="https://bugzilla.suse.com/1031590" source="BUGZILLA"/>
		<reference ref_id="1031593" ref_url="https://bugzilla.suse.com/1031593" source="BUGZILLA"/>
		<reference ref_id="1031595" ref_url="https://bugzilla.suse.com/1031595" source="BUGZILLA"/>
		<reference ref_id="1031638" ref_url="https://bugzilla.suse.com/1031638" source="BUGZILLA"/>
		<reference ref_id="1031644" ref_url="https://bugzilla.suse.com/1031644" source="BUGZILLA"/>
		<reference ref_id="1031656" ref_url="https://bugzilla.suse.com/1031656" source="BUGZILLA"/>
		<reference ref_id="1037052" ref_url="https://bugzilla.suse.com/1037052" source="BUGZILLA"/>
		<reference ref_id="1037057" ref_url="https://bugzilla.suse.com/1037057" source="BUGZILLA"/>
		<reference ref_id="1037061" ref_url="https://bugzilla.suse.com/1037061" source="BUGZILLA"/>
		<reference ref_id="1037066" ref_url="https://bugzilla.suse.com/1037066" source="BUGZILLA"/>
		<reference ref_id="1037273" ref_url="https://bugzilla.suse.com/1037273" source="BUGZILLA"/>
		<reference ref_id="1044891" ref_url="https://bugzilla.suse.com/1044891" source="BUGZILLA"/>
		<reference ref_id="1044897" ref_url="https://bugzilla.suse.com/1044897" source="BUGZILLA"/>
		<reference ref_id="1044901" ref_url="https://bugzilla.suse.com/1044901" source="BUGZILLA"/>
		<reference ref_id="1044909" ref_url="https://bugzilla.suse.com/1044909" source="BUGZILLA"/>
		<reference ref_id="1044925" ref_url="https://bugzilla.suse.com/1044925" source="BUGZILLA"/>
		<reference ref_id="1044927" ref_url="https://bugzilla.suse.com/1044927" source="BUGZILLA"/>
		<reference ref_id="1065643" ref_url="https://bugzilla.suse.com/1065643" source="BUGZILLA"/>
		<reference ref_id="1065689" ref_url="https://bugzilla.suse.com/1065689" source="BUGZILLA"/>
		<reference ref_id="1065693" ref_url="https://bugzilla.suse.com/1065693" source="BUGZILLA"/>
		<reference ref_id="1068640" ref_url="https://bugzilla.suse.com/1068640" source="BUGZILLA"/>
		<reference ref_id="1068643" ref_url="https://bugzilla.suse.com/1068643" source="BUGZILLA"/>
		<reference ref_id="1068887" ref_url="https://bugzilla.suse.com/1068887" source="BUGZILLA"/>
		<reference ref_id="1068888" ref_url="https://bugzilla.suse.com/1068888" source="BUGZILLA"/>
		<reference ref_id="1068950" ref_url="https://bugzilla.suse.com/1068950" source="BUGZILLA"/>
		<reference ref_id="1069176" ref_url="https://bugzilla.suse.com/1069176" source="BUGZILLA"/>
		<reference ref_id="1069202" ref_url="https://bugzilla.suse.com/1069202" source="BUGZILLA"/>
		<reference ref_id="1074741" ref_url="https://bugzilla.suse.com/1074741" source="BUGZILLA"/>
		<reference ref_id="1077745" ref_url="https://bugzilla.suse.com/1077745" source="BUGZILLA"/>
		<reference ref_id="1079103" ref_url="https://bugzilla.suse.com/1079103" source="BUGZILLA"/>
		<reference ref_id="1079741" ref_url="https://bugzilla.suse.com/1079741" source="BUGZILLA"/>
		<reference ref_id="1080556" ref_url="https://bugzilla.suse.com/1080556" source="BUGZILLA"/>
		<reference ref_id="1081527" ref_url="https://bugzilla.suse.com/1081527" source="BUGZILLA"/>
		<reference ref_id="1083528" ref_url="https://bugzilla.suse.com/1083528" source="BUGZILLA"/>
		<reference ref_id="1083532" ref_url="https://bugzilla.suse.com/1083532" source="BUGZILLA"/>
		<reference ref_id="1085784" ref_url="https://bugzilla.suse.com/1085784" source="BUGZILLA"/>
		<reference ref_id="1086608" ref_url="https://bugzilla.suse.com/1086608" source="BUGZILLA"/>
		<reference ref_id="1086784" ref_url="https://bugzilla.suse.com/1086784" source="BUGZILLA"/>
		<reference ref_id="1086786" ref_url="https://bugzilla.suse.com/1086786" source="BUGZILLA"/>
		<reference ref_id="1086788" ref_url="https://bugzilla.suse.com/1086788" source="BUGZILLA"/>
		<reference ref_id="1090997" ref_url="https://bugzilla.suse.com/1090997" source="BUGZILLA"/>
		<reference ref_id="1091015" ref_url="https://bugzilla.suse.com/1091015" source="BUGZILLA"/>
		<reference ref_id="1091365" ref_url="https://bugzilla.suse.com/1091365" source="BUGZILLA"/>
		<reference ref_id="1091368" ref_url="https://bugzilla.suse.com/1091368" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9939" ref_url="https://www.suse.com/security/cve/CVE-2014-9939/" source="CVE"/>
		<reference ref_id="CVE-2017-15938" ref_url="https://www.suse.com/security/cve/CVE-2017-15938/" source="CVE"/>
		<reference ref_id="CVE-2017-15939" ref_url="https://www.suse.com/security/cve/CVE-2017-15939/" source="CVE"/>
		<reference ref_id="CVE-2017-15996" ref_url="https://www.suse.com/security/cve/CVE-2017-15996/" source="CVE"/>
		<reference ref_id="CVE-2017-16826" ref_url="https://www.suse.com/security/cve/CVE-2017-16826/" source="CVE"/>
		<reference ref_id="CVE-2017-16827" ref_url="https://www.suse.com/security/cve/CVE-2017-16827/" source="CVE"/>
		<reference ref_id="CVE-2017-16828" ref_url="https://www.suse.com/security/cve/CVE-2017-16828/" source="CVE"/>
		<reference ref_id="CVE-2017-16829" ref_url="https://www.suse.com/security/cve/CVE-2017-16829/" source="CVE"/>
		<reference ref_id="CVE-2017-16830" ref_url="https://www.suse.com/security/cve/CVE-2017-16830/" source="CVE"/>
		<reference ref_id="CVE-2017-16831" ref_url="https://www.suse.com/security/cve/CVE-2017-16831/" source="CVE"/>
		<reference ref_id="CVE-2017-16832" ref_url="https://www.suse.com/security/cve/CVE-2017-16832/" source="CVE"/>
		<reference ref_id="CVE-2017-6965" ref_url="https://www.suse.com/security/cve/CVE-2017-6965/" source="CVE"/>
		<reference ref_id="CVE-2017-6966" ref_url="https://www.suse.com/security/cve/CVE-2017-6966/" source="CVE"/>
		<reference ref_id="CVE-2017-6969" ref_url="https://www.suse.com/security/cve/CVE-2017-6969/" source="CVE"/>
		<reference ref_id="CVE-2017-7209" ref_url="https://www.suse.com/security/cve/CVE-2017-7209/" source="CVE"/>
		<reference ref_id="CVE-2017-7210" ref_url="https://www.suse.com/security/cve/CVE-2017-7210/" source="CVE"/>
		<reference ref_id="CVE-2017-7223" ref_url="https://www.suse.com/security/cve/CVE-2017-7223/" source="CVE"/>
		<reference ref_id="CVE-2017-7224" ref_url="https://www.suse.com/security/cve/CVE-2017-7224/" source="CVE"/>
		<reference ref_id="CVE-2017-7225" ref_url="https://www.suse.com/security/cve/CVE-2017-7225/" source="CVE"/>
		<reference ref_id="CVE-2017-7226" ref_url="https://www.suse.com/security/cve/CVE-2017-7226/" source="CVE"/>
		<reference ref_id="CVE-2017-7299" ref_url="https://www.suse.com/security/cve/CVE-2017-7299/" source="CVE"/>
		<reference ref_id="CVE-2017-7300" ref_url="https://www.suse.com/security/cve/CVE-2017-7300/" source="CVE"/>
		<reference ref_id="CVE-2017-7301" ref_url="https://www.suse.com/security/cve/CVE-2017-7301/" source="CVE"/>
		<reference ref_id="CVE-2017-7302" ref_url="https://www.suse.com/security/cve/CVE-2017-7302/" source="CVE"/>
		<reference ref_id="CVE-2017-7303" ref_url="https://www.suse.com/security/cve/CVE-2017-7303/" source="CVE"/>
		<reference ref_id="CVE-2017-7304" ref_url="https://www.suse.com/security/cve/CVE-2017-7304/" source="CVE"/>
		<reference ref_id="CVE-2017-8392" ref_url="https://www.suse.com/security/cve/CVE-2017-8392/" source="CVE"/>
		<reference ref_id="CVE-2017-8393" ref_url="https://www.suse.com/security/cve/CVE-2017-8393/" source="CVE"/>
		<reference ref_id="CVE-2017-8394" ref_url="https://www.suse.com/security/cve/CVE-2017-8394/" source="CVE"/>
		<reference ref_id="CVE-2017-8396" ref_url="https://www.suse.com/security/cve/CVE-2017-8396/" source="CVE"/>
		<reference ref_id="CVE-2017-8421" ref_url="https://www.suse.com/security/cve/CVE-2017-8421/" source="CVE"/>
		<reference ref_id="CVE-2017-9746" ref_url="https://www.suse.com/security/cve/CVE-2017-9746/" source="CVE"/>
		<reference ref_id="CVE-2017-9747" ref_url="https://www.suse.com/security/cve/CVE-2017-9747/" source="CVE"/>
		<reference ref_id="CVE-2017-9748" ref_url="https://www.suse.com/security/cve/CVE-2017-9748/" source="CVE"/>
		<reference ref_id="CVE-2017-9750" ref_url="https://www.suse.com/security/cve/CVE-2017-9750/" source="CVE"/>
		<reference ref_id="CVE-2017-9755" ref_url="https://www.suse.com/security/cve/CVE-2017-9755/" source="CVE"/>
		<reference ref_id="CVE-2017-9756" ref_url="https://www.suse.com/security/cve/CVE-2017-9756/" source="CVE"/>
		<reference ref_id="CVE-2018-10372" ref_url="https://www.suse.com/security/cve/CVE-2018-10372/" source="CVE"/>
		<reference ref_id="CVE-2018-10373" ref_url="https://www.suse.com/security/cve/CVE-2018-10373/" source="CVE"/>
		<reference ref_id="CVE-2018-10534" ref_url="https://www.suse.com/security/cve/CVE-2018-10534/" source="CVE"/>
		<reference ref_id="CVE-2018-10535" ref_url="https://www.suse.com/security/cve/CVE-2018-10535/" source="CVE"/>
		<reference ref_id="CVE-2018-6323" ref_url="https://www.suse.com/security/cve/CVE-2018-6323/" source="CVE"/>
		<reference ref_id="CVE-2018-6543" ref_url="https://www.suse.com/security/cve/CVE-2018-6543/" source="CVE"/>
		<reference ref_id="CVE-2018-6759" ref_url="https://www.suse.com/security/cve/CVE-2018-6759/" source="CVE"/>
		<reference ref_id="CVE-2018-6872" ref_url="https://www.suse.com/security/cve/CVE-2018-6872/" source="CVE"/>
		<reference ref_id="CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208/" source="CVE"/>
		<reference ref_id="CVE-2018-7568" ref_url="https://www.suse.com/security/cve/CVE-2018-7568/" source="CVE"/>
		<reference ref_id="CVE-2018-7569" ref_url="https://www.suse.com/security/cve/CVE-2018-7569/" source="CVE"/>
		<reference ref_id="CVE-2018-7570" ref_url="https://www.suse.com/security/cve/CVE-2018-7570/" source="CVE"/>
		<reference ref_id="CVE-2018-7642" ref_url="https://www.suse.com/security/cve/CVE-2018-7642/" source="CVE"/>
		<reference ref_id="CVE-2018-7643" ref_url="https://www.suse.com/security/cve/CVE-2018-7643/" source="CVE"/>
		<reference ref_id="CVE-2018-8945" ref_url="https://www.suse.com/security/cve/CVE-2018-8945/" source="CVE"/>
		<description>
This update for binutils to 2.31 fixes the following issues:

These security issues were fixed:

- CVE-2017-15996: readelf allowed remote attackers to cause a denial of service
  (excessive memory allocation) or possibly have unspecified other impact via a
  crafted ELF file that triggered a buffer overflow on fuzzed archive header
  (bsc#1065643).
- CVE-2017-15939: Binary File Descriptor (BFD) library (aka libbfd) mishandled
  NULL files in a .debug_line file table, which allowed remote attackers to cause
  a denial of service (NULL pointer dereference and application crash) via a
  crafted ELF file, related to concat_filename (bsc#1065689).
- CVE-2017-15938: the Binary File Descriptor (BFD) library (aka libbfd)
  miscalculated DW_FORM_ref_addr die refs in the case of a relocatable object
  file, which allowed remote attackers to cause a denial of service
  (find_abstract_instance_name invalid memory read, segmentation fault, and
  application crash) (bsc#1065693).
- CVE-2017-16826: The coff_slurp_line_table function the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (invalid memory access and application crash) or possibly have
  unspecified other impact via a crafted PE file (bsc#1068640).
- CVE-2017-16832: The pe_bfd_read_buildid function in the Binary File
  Descriptor (BFD) library (aka libbfd) did not validate size and offset values
  in the data dictionary, which allowed remote attackers to cause a denial of
  service (segmentation violation and application crash) or possibly have
  unspecified other impact via a crafted PE file (bsc#1068643).
- CVE-2017-16831: Binary File Descriptor (BFD) library (aka libbfd) did not
  validate the symbol count, which allowed remote attackers to cause a denial of
  service (integer overflow and application crash, or excessive memory
  allocation) or possibly have unspecified other impact via a crafted PE file
  (bsc#1068887).
- CVE-2017-16830: The print_gnu_property_note function did not have
  integer-overflow protection on 32-bit platforms, which allowed remote attackers
  to cause a denial of service (segmentation violation and application crash) or
  possibly have unspecified other impact via a crafted ELF file (bsc#1068888).
- CVE-2017-16829: The _bfd_elf_parse_gnu_properties function in the Binary File
  Descriptor (BFD) library (aka libbfd) did not prevent negative pointers, which
  allowed remote attackers to cause a denial of service (out-of-bounds read and
  application crash) or possibly have unspecified other impact via a crafted ELF
  file (bsc#1068950).
- CVE-2017-16828: The display_debug_frames function allowed remote attackers to
  cause a denial of service (integer overflow and heap-based buffer over-read,
  and application crash) or possibly have unspecified other impact via a crafted
  ELF file (bsc#1069176).
- CVE-2017-16827: The aout_get_external_symbols function in the Binary File
  Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a
  denial of service (slurp_symtab invalid free and application crash) or possibly
  have unspecified other impact via a crafted ELF file (bsc#1069202).
- CVE-2018-6323: The elf_object_p function in the Binary File Descriptor (BFD)
  library (aka libbfd) had an unsigned integer overflow because bfd_size_type
  multiplication is not used. A crafted ELF file allowed remote attackers to
  cause a denial of service (application crash) or possibly have unspecified
  other impact (bsc#1077745).
- CVE-2018-6543: Prevent integer overflow in the function
  load_specific_debug_section() which resulted in `malloc()` with 0 size. A
  crafted ELF file allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact (bsc#1079103).
- CVE-2018-6759: The bfd_get_debug_link_info_1 function in the Binary File
  Descriptor (BFD) library (aka libbfd) had an unchecked strnlen operation.
  Remote attackers could have leveraged this vulnerability to cause a denial of
  service (segmentation fault) via a crafted ELF file (bsc#1079741).
- CVE-2018-6872: The elf_parse_notes function in the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (out-of-bounds read and segmentation violation) via a note with a large
  alignment (bsc#1080556).
- CVE-2018-7208: In the coff_pointerize_aux function in the Binary File
  Descriptor (BFD) library (aka libbfd) an index was not validated, which allowed
  remote attackers to cause a denial of service (segmentation fault) or possibly
  have unspecified other impact via a crafted file, as demonstrated by objcopy of
  a COFF object (bsc#1081527).
- CVE-2018-7570: The assign_file_positions_for_non_load_sections function in
  the Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers
  to cause a denial of service (NULL pointer dereference and application crash)
  via an ELF file with a RELRO segment that lacks a matching LOAD segment, as
  demonstrated by objcopy (bsc#1083528).
- CVE-2018-7569: The Binary File Descriptor (BFD) library (aka libbfd) allowed
  remote attackers to cause a denial of service (integer underflow or overflow,
  and application crash) via an ELF file with a corrupt DWARF FORM block, as
  demonstrated by nm (bsc#1083532).
- CVE-2018-8945: The bfd_section_from_shdr function in the Binary File
  Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a
  denial of service (segmentation fault) via a large attribute section
  (bsc#1086608).
- CVE-2018-7643: The display_debug_ranges function allowed remote attackers to
  cause a denial of service (integer overflow and application crash) or possibly
  have unspecified other impact via a crafted ELF file, as demonstrated by
  objdump (bsc#1086784).
- CVE-2018-7642: The swap_std_reloc_in function in the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (aout_32_swap_std_reloc_out NULL pointer dereference and application
  crash) via a crafted ELF file, as demonstrated by objcopy (bsc#1086786).
- CVE-2018-7568: The parse_die function in the Binary File Descriptor (BFD)
  library (aka libbfd) allowed remote attackers to cause a denial of service
  (integer overflow and application crash) via an ELF file with corrupt dwarf1
  debug information, as demonstrated by nm (bsc#1086788).
- CVE-2018-10373: concat_filename in the Binary File Descriptor (BFD) library
  (aka libbfd) allowed remote attackers to cause a denial of service (NULL
  pointer dereference and application crash) via a crafted binary file, as
  demonstrated by nm-new (bsc#1090997).
- CVE-2018-10372: process_cu_tu_index allowed remote attackers to cause a
  denial of service (heap-based buffer over-read and application crash) via a
  crafted binary file, as demonstrated by readelf (bsc#1091015).
- CVE-2018-10535: The ignore_section_sym function in the Binary File Descriptor
  (BFD) library (aka libbfd) did not validate the output_section pointer in the
  case of a symtab entry with a 'SECTION' type that has a '0' value, which
  allowed remote attackers to cause a denial of service (NULL pointer dereference
  and application crash) via a crafted file, as demonstrated by objcopy
  (bsc#1091365).
- CVE-2018-10534: The _bfd_XX_bfd_copy_private_bfd_data_common function in the
  Binary File Descriptor (BFD) library (aka libbfd) processesed a negative Data
  Directory size with an unbounded loop that increased the value of
  (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeded its own
  memory region, resulting in an out-of-bounds memory write, as demonstrated by
  objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common
  in pex64igen.c (bsc#1091368).

These non-security issues were fixed:

- The AArch64 port now supports showing disassembly notes which are emitted
  when inconsistencies are found with the instruction that may result in the
  instruction being invalid. These can be turned on with the option -M notes
  to objdump.
- The AArch64 port now emits warnings when a combination of an instruction and
  a named register could be invalid.
- Added O modifier to ar to display member offsets inside an archive
- The ADR and ADRL pseudo-instructions supported by the ARM assembler
  now only set the bottom bit of the address of thumb function symbols
  if the -mthumb-interwork command line option is active.
- Add --generate-missing-build-notes=[yes|no] option to create (or not) GNU
  Build Attribute notes if none are present in the input sources.  Add a
  --enable-generate-build-notes=[yes|no] configure time option to set the
  default behaviour.  Set the default if the configure option is not used
  to 'no'.
- Remove -mold-gcc command-line option for x86 targets.
- Add -O[2|s] command-line options to x86 assembler to enable alternate
  shorter instruction encoding.
- Add support for .nops directive.  It is currently supported only for
  x86 targets.
- Speed up direct linking with DLLs for Cygwin and Mingw targets.
- Add a configure option --enable-separate-code to decide whether
  -z separate-code should be enabled in ELF linker by default.  Default
  to yes for Linux/x86 targets. Note that -z separate-code can increase
  disk and memory size.
- RISC-V: Fix symbol address problem with versioned symbols 
- Restore riscv64-elf cross prefix via symlinks
- RISC-V: Don't enable relaxation in relocatable link
- Prevent linking faiures on i386 with assertion (bsc#1085784)
- Fix symbol size bug when relaxation deletes bytes
- Add --debug-dump=links option to readelf and --dwarf=links option to objdump
  which displays the contents of any .gnu_debuglink or .gnu_debugaltlink
  sections.
  Add a --debug-dump=follow-links option to readelf and a --dwarf=follow-links
  option to objdump which causes indirect links into separate debug info files
  to be followed when dumping other DWARF sections.
- Add support for loaction views in DWARF debug line information.
- Add -z separate-code to generate separate code PT_LOAD segment.
- Add '-z undefs' command line option as the inverse of the '-z defs' option.
- Add -z globalaudit command line option to force audit libraries to be run
  for every dynamic object loaded by an executable - provided that the loader
  supports this functionality.
- Tighten linker script grammar around file name specifiers to prevent the use
  of SORT_BY_ALIGNMENT and SORT_BY_INIT_PRIORITY on filenames.  These would
  previously be accepted but had no effect.
- The EXCLUDE_FILE directive can now be placed within any SORT_* directive
  within input section lists.
- Fix linker relaxation with --wrap
- Add arm-none-eabi symlinks (bsc#1074741)

Former updates of binutils also fixed the following security issues, for which
there was not CVE assigned at the time the update was released or no mapping
between code change and CVE existed:

- CVE-2014-9939: Prevent stack buffer overflow when printing bad bytes in Intel
  Hex objects (bsc#1030296).
- CVE-2017-7225: The find_nearest_line function in addr2line did not handle the
  case where the main file name and the directory name are both empty, triggering
  a NULL pointer dereference and an invalid write, and leading to a program crash
  (bsc#1030585).
- CVE-2017-7224: The find_nearest_line function in objdump was vulnerable to an
  invalid write (of size 1) while disassembling a corrupt binary that contains an
  empty function name, leading to a program crash (bsc#1030588).
- CVE-2017-7223: GNU assembler in was vulnerable to a global buffer overflow
  (of size 1) while attempting to unget an EOF character from the input stream,
  potentially leading to a program crash (bsc#1030589).
- CVE-2017-7226: The pe_ILF_object_p function in the Binary File Descriptor
  (BFD) library (aka libbfd) was vulnerable to a heap-based buffer over-read of
  size 4049 because it used the strlen function instead of strnlen, leading to
  program crashes in several utilities such as addr2line, size, and strings. It
  could lead to information disclosure as well (bsc#1030584).
- CVE-2017-7299: The Binary File Descriptor (BFD) library (aka libbfd) had an
  invalid read (of size 8) because the code to emit relocs (bfd_elf_final_link
  function in bfd/elflink.c) did not check the format of the input file trying to
  read the ELF reloc section header. The vulnerability leads to a GNU linker (ld)
  program crash (bsc#1031644).
- CVE-2017-7300: The Binary File Descriptor (BFD) library (aka libbfd) had an
  aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a
  heap-based buffer over-read (off-by-one) because of an incomplete check for
  invalid string offsets while loading symbols, leading to a GNU linker (ld)
  program crash (bsc#1031656).
- CVE-2017-7302: The Binary File Descriptor (BFD) library (aka libbfd) had a
  swap_std_reloc_out function in bfd/aoutx.h that is vulnerable to an invalid
  read (of size 4) because of missing checks for relocs that could not be
  recognised. This vulnerability caused Binutils utilities like strip to crash
  (bsc#1031595).
- CVE-2017-7303: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read (of size 4) because of missing a check (in the
  find_link function) for null headers attempting to match them. This
  vulnerability caused Binutils utilities like strip to crash (bsc#1031593).
- CVE-2017-7301: The Binary File Descriptor (BFD) library (aka libbfd) had an
  aout_link_add_symbols function in bfd/aoutx.h that has an off-by-one
  vulnerability because it did not carefully check the string offset. The
  vulnerability could lead to a GNU linker (ld) program crash (bsc#1031638).
- CVE-2017-7304: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read (of size 8) because of missing a check (in the
  copy_special_section_fields function) for an invalid sh_link field attempting
  to follow it. This vulnerability caused Binutils utilities like strip to crash
  (bsc#1031590).
- CVE-2017-8392: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read of size 8 because of missing a check to determine
  whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This
  vulnerability caused programs that conduct an analysis of binary programs using
  the libbfd library, such as objdump, to crash (bsc#1037052).
- CVE-2017-8393: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to a global buffer over-read error because of an assumption made by
  code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always
  named starting with a .rel/.rela prefix. This vulnerability caused programs
  that conduct an analysis of binary programs using the libbfd library, such as
  objcopy and strip, to crash (bsc#1037057).
- CVE-2017-8394: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of
  _bfd_elf_large_com_section. This vulnerability caused programs that conduct an
  analysis of binary programs using the libbfd library, such as objcopy, to crash
  (bsc#1037061).
- CVE-2017-8396: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read of size 1 because the existing reloc offset range
  tests didn't catch small negative offsets less than the size of the reloc
  field. This vulnerability caused programs that conduct an analysis of binary
  programs using the libbfd library, such as objdump, to crash (bsc#1037066).
- CVE-2017-8421: The function coff_set_alignment_hook in Binary File Descriptor
  (BFD) library (aka libbfd) had a memory leak vulnerability which can cause
  memory exhaustion in objdump via a crafted PE file (bsc#1037273).
- CVE-2017-9746: The disassemble_bytes function in objdump.c allowed remote
  attackers to cause a denial of service (buffer overflow and application crash)
  or possibly have unspecified other impact via a crafted binary file, as
  demonstrated by mishandling of rae insns printing for this file during 'objdump
  -D' execution (bsc#1044891).
- CVE-2017-9747: The ieee_archive_p function in the Binary File Descriptor
  (BFD) library (aka libbfd) might have allowed remote attackers to cause a
  denial of service (buffer overflow and application crash) or possibly have
  unspecified other impact via a crafted binary file, as demonstrated by
  mishandling of this file during 'objdump -D' execution (bsc#1044897).
- CVE-2017-9748: The ieee_object_p function in the Binary File Descriptor (BFD)
  library (aka libbfd) might have allowed remote attackers to cause a denial of
  service (buffer overflow and application crash) or possibly have unspecified
  other impact via a crafted binary file, as demonstrated by mishandling of this
  file during 'objdump -D' execution (bsc#1044901).
- CVE-2017-9750: opcodes/rx-decode.opc lacked bounds checks for certain scale
  arrays, which allowed remote attackers to cause a denial of service (buffer
  overflow and application crash) or possibly have unspecified other impact via a
  crafted binary file, as demonstrated by mishandling of this file during
  'objdump -D' execution (bsc#1044909).
- CVE-2017-9755: Not considering the the number of registers for bnd mode
  allowed remote attackers to cause a denial of service (buffer overflow and
  application crash) or possibly have unspecified other impact via a crafted
  binary file, as demonstrated by mishandling of this file during 'objdump -D'
  execution (bsc#1044925).
- CVE-2017-9756: The aarch64_ext_ldst_reglist function allowed remote attackers
  to cause a denial of service (buffer overflow and application crash) or
  possibly have unspecified other impact via a crafted binary file, as
  demonstrated by mishandling of this file during 'objdump -D' execution
  (bsc#1044927).
- CVE-2017-7209: The dump_section_as_bytes function in readelf accessed a NULL
  pointer while reading section contents in a corrupt binary, leading to a
  program crash (bsc#1030298).
- CVE-2017-6965: readelf wrote to illegal addresses while processing corrupt
  input files containing symbol-difference relocations, leading to a heap-based
  buffer overflow (bsc#1029909).
- CVE-2017-6966: readelf had a use-after-free (specifically read-after-free)
  error while processing multiple, relocated sections in an MSP430 binary. This
  is caused by mishandling of an invalid symbol index, and mishandling of state
  across invocations (bsc#1029908).
- CVE-2017-6969: readelf was vulnerable to a heap-based buffer over-read while
  processing corrupt RL78 binaries. The vulnerability can trigger program
  crashes. It may lead to an information leak as well (bsc#1029907).
- CVE-2017-7210: objdump was vulnerable to multiple heap-based buffer
  over-reads (of size 1 and size 8) while handling corrupt STABS enum type
  strings in a crafted object file, leading to program crash (bsc#1030297).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-17"/>
	<updated date="2018-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029907">SUSE bug 1029907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029908">SUSE bug 1029908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029909">SUSE bug 1029909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030297">SUSE bug 1030297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030298">SUSE bug 1030298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030584">SUSE bug 1030584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030585">SUSE bug 1030585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030588">SUSE bug 1030588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030589">SUSE bug 1030589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031590">SUSE bug 1031590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031593">SUSE bug 1031593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031595">SUSE bug 1031595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031638">SUSE bug 1031638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031644">SUSE bug 1031644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031656">SUSE bug 1031656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037052">SUSE bug 1037052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037057">SUSE bug 1037057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037061">SUSE bug 1037061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037066">SUSE bug 1037066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037273">SUSE bug 1037273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044891">SUSE bug 1044891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044897">SUSE bug 1044897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044901">SUSE bug 1044901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044909">SUSE bug 1044909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044925">SUSE bug 1044925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044927">SUSE bug 1044927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065643">SUSE bug 1065643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065689">SUSE bug 1065689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065693">SUSE bug 1065693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068640">SUSE bug 1068640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068643">SUSE bug 1068643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068887">SUSE bug 1068887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068888">SUSE bug 1068888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068950">SUSE bug 1068950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069176">SUSE bug 1069176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069202">SUSE bug 1069202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074741">SUSE bug 1074741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077745">SUSE bug 1077745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079103">SUSE bug 1079103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079741">SUSE bug 1079741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080556">SUSE bug 1080556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081527">SUSE bug 1081527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083528">SUSE bug 1083528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083532">SUSE bug 1083532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085784">SUSE bug 1085784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086608">SUSE bug 1086608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086784">SUSE bug 1086784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086786">SUSE bug 1086786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086788">SUSE bug 1086788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090997">SUSE bug 1090997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091015">SUSE bug 1091015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091365">SUSE bug 1091365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091368">SUSE bug 1091368</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9939/">CVE-2014-9939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9939">CVE-2014-9939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15938/">CVE-2017-15938 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15938">CVE-2017-15938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15939/">CVE-2017-15939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15939">CVE-2017-15939 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15996/">CVE-2017-15996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15996">CVE-2017-15996 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16826/">CVE-2017-16826 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16826">CVE-2017-16826 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16827/">CVE-2017-16827 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16827">CVE-2017-16827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16828/">CVE-2017-16828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16828">CVE-2017-16828 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16829/">CVE-2017-16829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16829">CVE-2017-16829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-16830/">CVE-2017-16830 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16830">CVE-2017-16830 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16831/">CVE-2017-16831 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16831">CVE-2017-16831 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16832/">CVE-2017-16832 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16832">CVE-2017-16832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6965/">CVE-2017-6965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6965">CVE-2017-6965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6966/">CVE-2017-6966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6966">CVE-2017-6966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6969/">CVE-2017-6969 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6969">CVE-2017-6969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7209/">CVE-2017-7209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7209">CVE-2017-7209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7210/">CVE-2017-7210 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7210">CVE-2017-7210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7223/">CVE-2017-7223 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7223">CVE-2017-7223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7224/">CVE-2017-7224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7224">CVE-2017-7224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7225/">CVE-2017-7225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7225">CVE-2017-7225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7226/">CVE-2017-7226 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7226">CVE-2017-7226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7299/">CVE-2017-7299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7299">CVE-2017-7299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7300/">CVE-2017-7300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7300">CVE-2017-7300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7301/">CVE-2017-7301 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7301">CVE-2017-7301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7302/">CVE-2017-7302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7302">CVE-2017-7302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7303/">CVE-2017-7303 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7303">CVE-2017-7303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7304/">CVE-2017-7304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7304">CVE-2017-7304 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8392/">CVE-2017-8392 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8392">CVE-2017-8392 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8393/">CVE-2017-8393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8393">CVE-2017-8393 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8394/">CVE-2017-8394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8394">CVE-2017-8394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8396/">CVE-2017-8396 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8396">CVE-2017-8396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8421/">CVE-2017-8421 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8421">CVE-2017-8421 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9746/">CVE-2017-9746 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9746">CVE-2017-9746 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9747/">CVE-2017-9747 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9747">CVE-2017-9747 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9748/">CVE-2017-9748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9748">CVE-2017-9748 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9750/">CVE-2017-9750 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9750">CVE-2017-9750 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9755/">CVE-2017-9755 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9755">CVE-2017-9755 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9756/">CVE-2017-9756 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9756">CVE-2017-9756 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10372/">CVE-2018-10372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10372">CVE-2018-10372 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10373/">CVE-2018-10373 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10373">CVE-2018-10373 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10534/">CVE-2018-10534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10534">CVE-2018-10534 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10535/">CVE-2018-10535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10535">CVE-2018-10535 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6323/">CVE-2018-6323 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6323">CVE-2018-6323 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6543/">CVE-2018-6543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6543">CVE-2018-6543 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6759/">CVE-2018-6759 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6759">CVE-2018-6759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6872/">CVE-2018-6872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6872">CVE-2018-6872 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7208">CVE-2018-7208 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7568/">CVE-2018-7568 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7568">CVE-2018-7568 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7569/">CVE-2018-7569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7569">CVE-2018-7569 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7570/">CVE-2018-7570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7570">CVE-2018-7570 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7642/">CVE-2018-7642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7642">CVE-2018-7642 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7643/">CVE-2018-7643 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7643">CVE-2018-7643 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8945/">CVE-2018-8945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8945">CVE-2018-8945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151874" version="1" class="patch">
	<metadata>
		<title>Security update for fuse (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1101797" ref_url="https://bugzilla.suse.com/1101797" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10906" ref_url="https://www.suse.com/security/cve/CVE-2018-10906/" source="CVE"/>
		<description>
This update for fuse fixes the following security issue:

- CVE-2018-10906: fusermount was vulnerable to a restriction bypass when
  SELinux is active. This allowed non-root users to mount a FUSE file system with
  the 'allow_other' mount option regardless of whether 'user_allow_other' is set
  in the fuse configuration. An attacker may use this flaw to mount a FUSE file
  system, accessible by other users, and trick them into accessing files on that
  file system, possibly causing Denial of Service or other unspecified effects
  (bsc#1101797)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101797">SUSE bug 1101797</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10906/">CVE-2018-10906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10906">CVE-2018-10906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520244" comment="fuse-2.9.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520245" comment="libfuse2-2.9.3-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151875" version="1" class="patch">
	<metadata>
		<title>Security update for rpm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1077692" ref_url="https://bugzilla.suse.com/1077692" source="BUGZILLA"/>
		<reference ref_id="943457" ref_url="https://bugzilla.suse.com/943457" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7500" ref_url="https://www.suse.com/security/cve/CVE-2017-7500/" source="CVE"/>
		<reference ref_id="CVE-2017-7501" ref_url="https://www.suse.com/security/cve/CVE-2017-7501/" source="CVE"/>
		<description>
This update for rpm fixes the following issues:

These security issues were fixed:

- CVE-2017-7500: rpm did not properly handle RPM installations when a
  destination path was a symbolic link to a directory, possibly changing
  ownership and permissions of an arbitrary directory, and RPM files being placed
  in an arbitrary destination (bsc#943457).
- CVE-2017-7501: rpm used temporary files with predictable names when
  installing an RPM. An attacker with ability to write in a directory where files
  will be installed could create symbolic links to an arbitrary location and
  modify content, and possibly permissions to arbitrary files, which could be
  used for denial of service or possibly privilege escalation (bsc#943457)

This non-security issue was fixed:

- Use ksym-provides tool [bsc#1077692]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-22"/>
	<updated date="2018-10-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077692">SUSE bug 1077692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943457">SUSE bug 943457</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7500/">CVE-2017-7500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7500">CVE-2017-7500 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7501/">CVE-2017-7501 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7501">CVE-2017-7501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557260" comment="python3-rpm-4.11.2-16.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520251" comment="rpm-4.11.2-16.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520252" comment="rpm-32bit-4.11.2-16.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520253" comment="rpm-build-4.11.2-16.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520254" comment="rpm-python-4.11.2-16.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151876" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1106853" ref_url="https://bugzilla.suse.com/1106853" source="BUGZILLA"/>
		<reference ref_id="1108627" ref_url="https://bugzilla.suse.com/1108627" source="BUGZILLA"/>
		<reference ref_id="1108637" ref_url="https://bugzilla.suse.com/1108637" source="BUGZILLA"/>
		<reference ref_id="1110358" ref_url="https://bugzilla.suse.com/1110358" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<reference ref_id="CVE-2018-16335" ref_url="https://www.suse.com/security/cve/CVE-2018-16335/" source="CVE"/>
		<reference ref_id="CVE-2018-17100" ref_url="https://www.suse.com/security/cve/CVE-2018-17100/" source="CVE"/>
		<reference ref_id="CVE-2018-17101" ref_url="https://www.suse.com/security/cve/CVE-2018-17101/" source="CVE"/>
		<reference ref_id="CVE-2018-17795" ref_url="https://www.suse.com/security/cve/CVE-2018-17795/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2018-17100: There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file. (bsc#1108637)
- CVE-2018-17101: There are two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c, which can cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file. (bsc#1108627)
- CVE-2018-17795: The function t2p_write_pdf in tiff2pdf.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, a similar issue to CVE-2017-9935. (bsc#1110358)
- CVE-2018-16335: newoffsets handling in ChopUpSingleUncompressedStrip in tif_dirread.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf. This is a different vulnerability than CVE-2018-15209. (bsc#1106853)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-22"/>
	<updated date="2018-10-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106853">SUSE bug 1106853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108627">SUSE bug 1108627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108637">SUSE bug 1108637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110358">SUSE bug 1110358</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11613">CVE-2017-11613 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9935">CVE-2017-9935 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16335/">CVE-2018-16335 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16335">CVE-2018-16335 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17100/">CVE-2018-17100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17100">CVE-2018-17100 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17101/">CVE-2018-17101 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17101">CVE-2018-17101 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17795/">CVE-2018-17795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17795">CVE-2018-17795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520255" comment="libtiff5-4.0.9-44.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520256" comment="libtiff5-32bit-4.0.9-44.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557261" comment="tiff-4.0.9-44.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151877" version="1" class="patch">
	<metadata>
		<title>Security update for pam_pkcs11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1049219" ref_url="https://bugzilla.suse.com/1049219" source="BUGZILLA"/>
		<reference ref_id="1105012" ref_url="https://bugzilla.suse.com/1105012" source="BUGZILLA"/>
		<description>
This update for pam_pkcs11 provides the following fixes:

Security issues fixed (bsc#1105012):

- Fixed a logic bug in pampkcs11.c, leading to an authentication replay vulnerability
- Fixed a stack-based buffer overflow in opensshmapper.c
- Make sure memory is properly cleaned before invoking free()

Other changes:

- Add a systemd service file. (bsc#1049219)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049219">SUSE bug 1049219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105012">SUSE bug 1105012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520257" comment="pam_pkcs11-0.6.8-7.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520258" comment="pam_pkcs11-32bit-0.6.8-7.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151878" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1098531" ref_url="https://bugzilla.suse.com/1098531" source="BUGZILLA"/>
		<reference ref_id="1111853" ref_url="https://bugzilla.suse.com/1111853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12327" ref_url="https://www.suse.com/security/cve/CVE-2018-12327/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<description>

  
NTP was updated to 4.2.8p12 (bsc#1111853):

- CVE-2018-12327: Fixed stack buffer overflow in the openhost() command-line call of NTPQ/NTPDC. (bsc#1098531)
- CVE-2018-7170: Add further tweaks to improve the fix for the ephemeral association time spoofing additional protection (bsc#1083424)

Please also see https://www.nwtime.org/network-time-foundation-publishes-ntp-4-2-8p12/ for more information.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098531">SUSE bug 1098531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111853">SUSE bug 1111853</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12327/">CVE-2018-12327 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12327">CVE-2018-12327 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7170">CVE-2018-7170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520262" comment="ntp-4.2.8p12-64.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520263" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151879" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104199" ref_url="https://bugzilla.suse.com/1104199" source="BUGZILLA"/>
		<reference ref_id="1104202" ref_url="https://bugzilla.suse.com/1104202" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915/" source="CVE"/>
		<reference ref_id="CVE-2018-10925" ref_url="https://www.suse.com/security/cve/CVE-2018-10925/" source="CVE"/>
		<description>
This update for postgresql96 to 9.6.10 fixes the following issues:

These security issues were fixed:

- CVE-2018-10915: libpq failed to properly reset its internal state between
  connections. If an affected version of libpq was used with 'host' or 'hostaddr'
  connection parameters from untrusted input, attackers could have bypassed
  client-side connection security features, obtain access to higher privileged
  connections or potentially cause other impact SQL injection, by causing the
  PQescape() functions to malfunction (bsc#1104199)
- CVE-2018-10925: Add missing authorization check on certain statements
  involved with 'INSERT ... ON CONFLICT DO UPDATE'. An attacker with 'CREATE
  TABLE' privileges could have exploited this to read arbitrary bytes server
  memory. If the attacker also had certain 'INSERT' and limited 'UPDATE'
  privileges to a particular table, they could have exploited this to update
  other columns in the same table (bsc#1104202)

For addition details please see
https://www.postgresql.org/docs/current/static/release-9-6-10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-24"/>
	<updated date="2018-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104199">SUSE bug 1104199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104202">SUSE bug 1104202</bugzilla>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10915">CVE-2018-10915 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10925/">CVE-2018-10925 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10925">CVE-2018-10925 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520265" comment="postgresql96-9.6.10-3.22.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530311" comment="postgresql96-contrib-9.6.10-3.22.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530312" comment="postgresql96-docs-9.6.10-3.22.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530313" comment="postgresql96-server-9.6.10-3.22.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151880" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1110850" ref_url="https://bugzilla.suse.com/1110850" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11784" ref_url="https://www.suse.com/security/cve/CVE-2018-11784/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2018-11784: When the default servlet in Apache Tomcat returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice. (bsc#1110850)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-24"/>
	<updated date="2018-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1110850">SUSE bug 1110850</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-11784/">CVE-2018-11784 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11784">CVE-2018-11784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009553356" comment="tomcat-8.0.53-29.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553357" comment="tomcat-admin-webapps-8.0.53-29.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553358" comment="tomcat-docs-webapp-8.0.53-29.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553359" comment="tomcat-el-3_0-api-8.0.53-29.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553360" comment="tomcat-javadoc-8.0.53-29.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553361" comment="tomcat-jsp-2_3-api-8.0.53-29.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553362" comment="tomcat-lib-8.0.53-29.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553363" comment="tomcat-servlet-3_1-api-8.0.53-29.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553364" comment="tomcat-webapps-8.0.53-29.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151881" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1075775" ref_url="https://bugzilla.suse.com/1075775" source="BUGZILLA"/>
		<reference ref_id="1077535" ref_url="https://bugzilla.suse.com/1077535" source="BUGZILLA"/>
		<reference ref_id="1079512" ref_url="https://bugzilla.suse.com/1079512" source="BUGZILLA"/>
		<reference ref_id="1088182" ref_url="https://bugzilla.suse.com/1088182" source="BUGZILLA"/>
		<reference ref_id="1088932" ref_url="https://bugzilla.suse.com/1088932" source="BUGZILLA"/>
		<reference ref_id="1092278" ref_url="https://bugzilla.suse.com/1092278" source="BUGZILLA"/>
		<reference ref_id="1092279" ref_url="https://bugzilla.suse.com/1092279" source="BUGZILLA"/>
		<reference ref_id="1092280" ref_url="https://bugzilla.suse.com/1092280" source="BUGZILLA"/>
		<reference ref_id="1095611" ref_url="https://bugzilla.suse.com/1095611" source="BUGZILLA"/>
		<reference ref_id="1096060" ref_url="https://bugzilla.suse.com/1096060" source="BUGZILLA"/>
		<reference ref_id="1096061" ref_url="https://bugzilla.suse.com/1096061" source="BUGZILLA"/>
		<reference ref_id="1097693" ref_url="https://bugzilla.suse.com/1097693" source="BUGZILLA"/>
		<reference ref_id="1101999" ref_url="https://bugzilla.suse.com/1101999" source="BUGZILLA"/>
		<reference ref_id="1102530" ref_url="https://bugzilla.suse.com/1102530" source="BUGZILLA"/>
		<reference ref_id="1104169" ref_url="https://bugzilla.suse.com/1104169" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13884" ref_url="https://www.suse.com/security/cve/CVE-2017-13884/" source="CVE"/>
		<reference ref_id="CVE-2017-13885" ref_url="https://www.suse.com/security/cve/CVE-2017-13885/" source="CVE"/>
		<reference ref_id="CVE-2017-7153" ref_url="https://www.suse.com/security/cve/CVE-2017-7153/" source="CVE"/>
		<reference ref_id="CVE-2017-7160" ref_url="https://www.suse.com/security/cve/CVE-2017-7160/" source="CVE"/>
		<reference ref_id="CVE-2017-7161" ref_url="https://www.suse.com/security/cve/CVE-2017-7161/" source="CVE"/>
		<reference ref_id="CVE-2017-7165" ref_url="https://www.suse.com/security/cve/CVE-2017-7165/" source="CVE"/>
		<reference ref_id="CVE-2018-11646" ref_url="https://www.suse.com/security/cve/CVE-2018-11646/" source="CVE"/>
		<reference ref_id="CVE-2018-11712" ref_url="https://www.suse.com/security/cve/CVE-2018-11712/" source="CVE"/>
		<reference ref_id="CVE-2018-11713" ref_url="https://www.suse.com/security/cve/CVE-2018-11713/" source="CVE"/>
		<reference ref_id="CVE-2018-12911" ref_url="https://www.suse.com/security/cve/CVE-2018-12911/" source="CVE"/>
		<reference ref_id="CVE-2018-4088" ref_url="https://www.suse.com/security/cve/CVE-2018-4088/" source="CVE"/>
		<reference ref_id="CVE-2018-4096" ref_url="https://www.suse.com/security/cve/CVE-2018-4096/" source="CVE"/>
		<reference ref_id="CVE-2018-4101" ref_url="https://www.suse.com/security/cve/CVE-2018-4101/" source="CVE"/>
		<reference ref_id="CVE-2018-4113" ref_url="https://www.suse.com/security/cve/CVE-2018-4113/" source="CVE"/>
		<reference ref_id="CVE-2018-4114" ref_url="https://www.suse.com/security/cve/CVE-2018-4114/" source="CVE"/>
		<reference ref_id="CVE-2018-4117" ref_url="https://www.suse.com/security/cve/CVE-2018-4117/" source="CVE"/>
		<reference ref_id="CVE-2018-4118" ref_url="https://www.suse.com/security/cve/CVE-2018-4118/" source="CVE"/>
		<reference ref_id="CVE-2018-4119" ref_url="https://www.suse.com/security/cve/CVE-2018-4119/" source="CVE"/>
		<reference ref_id="CVE-2018-4120" ref_url="https://www.suse.com/security/cve/CVE-2018-4120/" source="CVE"/>
		<reference ref_id="CVE-2018-4121" ref_url="https://www.suse.com/security/cve/CVE-2018-4121/" source="CVE"/>
		<reference ref_id="CVE-2018-4122" ref_url="https://www.suse.com/security/cve/CVE-2018-4122/" source="CVE"/>
		<reference ref_id="CVE-2018-4125" ref_url="https://www.suse.com/security/cve/CVE-2018-4125/" source="CVE"/>
		<reference ref_id="CVE-2018-4127" ref_url="https://www.suse.com/security/cve/CVE-2018-4127/" source="CVE"/>
		<reference ref_id="CVE-2018-4128" ref_url="https://www.suse.com/security/cve/CVE-2018-4128/" source="CVE"/>
		<reference ref_id="CVE-2018-4129" ref_url="https://www.suse.com/security/cve/CVE-2018-4129/" source="CVE"/>
		<reference ref_id="CVE-2018-4133" ref_url="https://www.suse.com/security/cve/CVE-2018-4133/" source="CVE"/>
		<reference ref_id="CVE-2018-4146" ref_url="https://www.suse.com/security/cve/CVE-2018-4146/" source="CVE"/>
		<reference ref_id="CVE-2018-4161" ref_url="https://www.suse.com/security/cve/CVE-2018-4161/" source="CVE"/>
		<reference ref_id="CVE-2018-4162" ref_url="https://www.suse.com/security/cve/CVE-2018-4162/" source="CVE"/>
		<reference ref_id="CVE-2018-4163" ref_url="https://www.suse.com/security/cve/CVE-2018-4163/" source="CVE"/>
		<reference ref_id="CVE-2018-4165" ref_url="https://www.suse.com/security/cve/CVE-2018-4165/" source="CVE"/>
		<reference ref_id="CVE-2018-4190" ref_url="https://www.suse.com/security/cve/CVE-2018-4190/" source="CVE"/>
		<reference ref_id="CVE-2018-4199" ref_url="https://www.suse.com/security/cve/CVE-2018-4199/" source="CVE"/>
		<reference ref_id="CVE-2018-4200" ref_url="https://www.suse.com/security/cve/CVE-2018-4200/" source="CVE"/>
		<reference ref_id="CVE-2018-4204" ref_url="https://www.suse.com/security/cve/CVE-2018-4204/" source="CVE"/>
		<reference ref_id="CVE-2018-4218" ref_url="https://www.suse.com/security/cve/CVE-2018-4218/" source="CVE"/>
		<reference ref_id="CVE-2018-4222" ref_url="https://www.suse.com/security/cve/CVE-2018-4222/" source="CVE"/>
		<reference ref_id="CVE-2018-4232" ref_url="https://www.suse.com/security/cve/CVE-2018-4232/" source="CVE"/>
		<reference ref_id="CVE-2018-4233" ref_url="https://www.suse.com/security/cve/CVE-2018-4233/" source="CVE"/>
		<reference ref_id="CVE-2018-4246" ref_url="https://www.suse.com/security/cve/CVE-2018-4246/" source="CVE"/>
		<description>
This update for webkit2gtk3 to version 2.20.3 fixes the issues:

The following security vulnerabilities were addressed:

- CVE-2018-12911: Fixed an off-by-one error in xdg_mime_get_simple_globs
  (boo#1101999)
- CVE-2017-13884: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1075775).
- CVE-2017-13885: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1075775).
- CVE-2017-7153: An unspecified issue allowed remote attackers to spoof
  user-interface information (about whether the entire content is derived from a
  valid TLS session) via a crafted web site that sends a 401 Unauthorized
  redirect (bsc#1077535).
- CVE-2017-7160: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1075775).
- CVE-2017-7161: An unspecified issue allowed remote attackers to execute
  arbitrary code via special characters that trigger command injection
  (bsc#1075775, bsc#1077535).
- CVE-2017-7165: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1075775).
- CVE-2018-4088: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1075775).
- CVE-2018-4096: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1075775).
- CVE-2018-4200: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site that triggers a
  WebCore::jsElementScrollHeightGetter use-after-free (bsc#1092280).
- CVE-2018-4204: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1092279).
- CVE-2018-4101: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4113: An issue in the JavaScriptCore function in the 'WebKit'
  component allowed attackers to trigger an assertion failure by leveraging
  improper array indexing (bsc#1088182)
- CVE-2018-4114: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182) 
- CVE-2018-4117: An unspecified issue allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web site
  (bsc#1088182, bsc#1102530).
- CVE-2018-4118: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182) 
- CVE-2018-4119: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182) 
- CVE-2018-4120: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4121: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1092278).
- CVE-2018-4122: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4125: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4127: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4128: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4129: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4146: An unspecified issue allowed attackers to cause a denial of
  service (memory corruption) via a crafted web site (bsc#1088182).
- CVE-2018-4161: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4162: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4163: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4165: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1088182).
- CVE-2018-4190: An unspecified issue allowed remote attackers to obtain
  sensitive credential information that is transmitted during a CSS mask-image
  fetch (bsc#1097693)
- CVE-2018-4199: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (buffer overflow and application
  crash) via a crafted web site (bsc#1097693)
- CVE-2018-4218: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site that triggers an @generatorState use-after-free
  (bsc#1097693)
- CVE-2018-4222: An unspecified issue allowed remote attackers to execute
  arbitrary code via a crafted web site that leverages a getWasmBufferFromValue
  out-of-bounds read during WebAssembly compilation (bsc#1097693) 
- CVE-2018-4232: An unspecified issue allowed remote attackers to overwrite
  cookies via a crafted web site (bsc#1097693) 
- CVE-2018-4233: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1097693) 
- CVE-2018-4246: An unspecified issue allowed remote attackers to execute
  arbitrary code via a crafted web site that leverages type confusion
  (bsc#1104169) 
- CVE-2018-11646: webkitFaviconDatabaseSetIconForPageURL and
  webkitFaviconDatabaseSetIconURLForPageURL mishandled an unset pageURL, leading
  to an application crash (bsc#1095611)
- CVE-2018-4133: A Safari cross-site scripting (XSS) vulnerability allowed
  remote attackers to inject arbitrary web script or HTML via a crafted URL
  (bsc#1088182).
- CVE-2018-11713: The libsoup network backend of WebKit unexpectedly failed to
  use system proxy settings for WebSocket connections. As a result, users could
  be deanonymized by crafted web sites via a WebSocket connection (bsc#1096060).
- CVE-2018-11712: The libsoup network backend of WebKit failed to perform TLS
  certificate verification for WebSocket connections (bsc#1096061).


This update for webkit2gtk3 fixes the following issues:

- Fixed a crash when atk_object_ref_state_set is called on an AtkObject that's
  being destroyed (bsc#1088932).
- Fixed crash when using Wayland with QXL/virtio (bsc#1079512)
- Disable Gigacage if mmap fails to allocate in Linux.
- Add user agent quirk for paypal website.
- Properly detect compiler flags, needed libs, and fallbacks for
  usage of 64-bit atomic operations.
- Fix a network process crash when trying to get cookies of
  about:blank page.
- Fix UI process crash when closing the window under Wayland.
- Fix several crashes and rendering issues.
- Do TLS error checking on GTlsConnection::accept-certificate to
  finish the load earlier in case of errors.
- Properly close the connection to the nested wayland compositor
  in the Web Process.
- Avoid painting backing stores for zero-opacity layers.
- Fix downloads started by context menu failing in some websites
  due to missing user agent HTTP header.
- Fix video unpause when GStreamerGL is disabled.
- Fix several GObject introspection annotations.
- Update user agent quiks to fix Outlook.com and Chase.com.
- Fix several crashes and rendering issues.
- Improve error message when Gigacage cannot allocate virtual memory.
- Add missing WebKitWebProcessEnumTypes.h to webkit-web-extension.h.
- Improve web process memory monitor thresholds.
- Fix a web process crash when the web view is created and destroyed quickly.
- Fix a network process crash when load is cancelled while searching for
  stored HTTP auth credentials.
- Fix the build when ENABLE_VIDEO, ENABLE_WEB_AUDIO and
  ENABLE_XSLT are disabled.
- New API to retrieve and delete cookies with WebKitCookieManager.
- New web process API to detect when form is submitted via JavaScript.
- Several improvements and fixes in the touch/gestures support.
- Support for the “system” CSS font family.
- Complex text rendering improvements and fixes.
- More complete and spec compliant WebDriver implementation.
- Ensure DNS prefetching cannot be re-enabled if disabled by settings.
- Fix seek sometimes not working.
- Fix rendering of emojis that were using the wrong scale factor
  in some cases.
- Fix rendering of combining enclosed keycap.
- Fix rendering scale of some layers in HiDPI.
- Fix a crash in Wayland when closing the web view.
- Fix crashes upower crashes when running inside a chroot or on
  systems with broken dbus/upower.
- Fix memory leaks in GStreamer media backend when using
  GStreamer 1.14.
- Fix several crashes and rendering issues.
- Add ENABLE_ADDRESS_SANITIZER to make it easier to build with
  asan support.
- Fix a crash a under Wayland when using mesa software
  rasterization.
- Make fullscreen video work again.
- Fix handling of missing GStreamer elements.
- Fix rendering when webm video is played twice.
- Fix kinetic scrolling sometimes jumping around.
- Fix build with ICU configured without collation support.
- WebSockets use system proxy settings now (requires libsoup 2.61.90).
- Show the context menu on long-press gesture.
- Add support for Shift + mouse scroll to scroll horizontally.
- Fix zoom gesture to actually zoom instead of changing the page
  scale.
- Implement support for Graphics ARIA roles.
- Make sleep inhibitors work under Flatpak.
- Add get element CSS value command to WebDriver.
- Fix a crash aftter a swipe gesture.
- Fix several crashes and rendering issues.
- Fix crashes due to duplicated symbols in libjavascriptcoregtk
  and libwebkit2gtk.
- Fix parsing of timeout values in WebDriver.
- Implement get timeouts command in WebDriver.
- Fix deadlock in GStreamer video sink during shutdown when
  accelerated compositing is disabled.
- Fix several crashes and rendering issues.
- Add web process API to detect when form is submitted via
  JavaScript.
- Add new API to replace
  webkit_form_submission_request_get_text_fields() that is now
  deprecated.
- Add WebKitWebView::web-process-terminated signal and deprecate
  web-process-crashed.
- Fix rendering issues when editing text areas.
- Use FastMalloc based GstAllocator for GStreamer.
- Fix web process crash at startup in bmalloc.
- Fix several memory leaks in GStreamer media backend.
- WebKitWebDriver process no longer links to
  libjavascriptcoregtk.
- Fix several crashes and rendering issues.
- Add new API to add, retrieve and delete cookies via
  WebKitCookieManager.
- Add functions to WebSettings to convert font sizes between
  points and pixels.
- Ensure cookie operations take effect when they happen before a
  web process has been spawned.
- Automatically adjust font size when GtkSettings:gtk-xft-dpi
  changes.
- Add initial resource load statistics support.
- Add API to expose availability of certain editing commands in
  WebKitEditorState.
- Add API to query whether a WebKitNavigationAction is a redirect
  or not.
- Improve complex text rendering.
- Add support for the 'system' CSS font family.
- Disable USE_GSTREAMER_GL
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-24"/>
	<updated date="2018-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1075775">SUSE bug 1075775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077535">SUSE bug 1077535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079512">SUSE bug 1079512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088182">SUSE bug 1088182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088932">SUSE bug 1088932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092278">SUSE bug 1092278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092279">SUSE bug 1092279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092280">SUSE bug 1092280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095611">SUSE bug 1095611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096060">SUSE bug 1096060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096061">SUSE bug 1096061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097693">SUSE bug 1097693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101999">SUSE bug 1101999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102530">SUSE bug 1102530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13884/">CVE-2017-13884 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13884">CVE-2017-13884 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13885/">CVE-2017-13885 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13885">CVE-2017-13885 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7153/">CVE-2017-7153 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7153">CVE-2017-7153 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7160/">CVE-2017-7160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7160">CVE-2017-7160 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7161/">CVE-2017-7161 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7161">CVE-2017-7161 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7165/">CVE-2017-7165 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7165">CVE-2017-7165 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11646/">CVE-2018-11646 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11646">CVE-2018-11646 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11712/">CVE-2018-11712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11712">CVE-2018-11712 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11713/">CVE-2018-11713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11713">CVE-2018-11713 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12911/">CVE-2018-12911 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12911">CVE-2018-12911 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4088/">CVE-2018-4088 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4088">CVE-2018-4088 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4096/">CVE-2018-4096 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4096">CVE-2018-4096 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4101/">CVE-2018-4101 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4101">CVE-2018-4101 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4113/">CVE-2018-4113 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4113">CVE-2018-4113 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4114/">CVE-2018-4114 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4114">CVE-2018-4114 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4117/">CVE-2018-4117 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4117">CVE-2018-4117 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4118/">CVE-2018-4118 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4118">CVE-2018-4118 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4119/">CVE-2018-4119 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4119">CVE-2018-4119 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4120/">CVE-2018-4120 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4120">CVE-2018-4120 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4121/">CVE-2018-4121 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4121">CVE-2018-4121 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4122/">CVE-2018-4122 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4122">CVE-2018-4122 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4125/">CVE-2018-4125 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4125">CVE-2018-4125 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4127/">CVE-2018-4127 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4127">CVE-2018-4127 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4128/">CVE-2018-4128 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4128">CVE-2018-4128 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4129/">CVE-2018-4129 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4129">CVE-2018-4129 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4133/">CVE-2018-4133 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4133">CVE-2018-4133 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-4146/">CVE-2018-4146 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4146">CVE-2018-4146 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4161/">CVE-2018-4161 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4161">CVE-2018-4161 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4162/">CVE-2018-4162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4162">CVE-2018-4162 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4163/">CVE-2018-4163 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4163">CVE-2018-4163 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4165/">CVE-2018-4165 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4165">CVE-2018-4165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4190/">CVE-2018-4190 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4190">CVE-2018-4190 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4199/">CVE-2018-4199 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4199">CVE-2018-4199 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4200/">CVE-2018-4200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4200">CVE-2018-4200 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4204/">CVE-2018-4204 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4204">CVE-2018-4204 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4218/">CVE-2018-4218 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4218">CVE-2018-4218 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4222/">CVE-2018-4222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4222">CVE-2018-4222 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4232/">CVE-2018-4232 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4232">CVE-2018-4232 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4233/">CVE-2018-4233 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4233">CVE-2018-4233 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4246/">CVE-2018-4246 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4246">CVE-2018-4246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520266" comment="libjavascriptcoregtk-4_0-18-2.20.3-2.23.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520267" comment="libwebkit2gtk-4_0-37-2.20.3-2.23.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520269" comment="typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520270" comment="typelib-1_0-WebKit2-4_0-2.20.3-2.23.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520271" comment="webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151882" version="1" class="patch">
	<metadata>
		<title>Security update for exempi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1085295" ref_url="https://bugzilla.suse.com/1085295" source="BUGZILLA"/>
		<reference ref_id="1085297" ref_url="https://bugzilla.suse.com/1085297" source="BUGZILLA"/>
		<reference ref_id="1085583" ref_url="https://bugzilla.suse.com/1085583" source="BUGZILLA"/>
		<reference ref_id="1085584" ref_url="https://bugzilla.suse.com/1085584" source="BUGZILLA"/>
		<reference ref_id="1085585" ref_url="https://bugzilla.suse.com/1085585" source="BUGZILLA"/>
		<reference ref_id="1085589" ref_url="https://bugzilla.suse.com/1085589" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18233" ref_url="https://www.suse.com/security/cve/CVE-2017-18233/" source="CVE"/>
		<reference ref_id="CVE-2017-18234" ref_url="https://www.suse.com/security/cve/CVE-2017-18234/" source="CVE"/>
		<reference ref_id="CVE-2017-18236" ref_url="https://www.suse.com/security/cve/CVE-2017-18236/" source="CVE"/>
		<reference ref_id="CVE-2017-18238" ref_url="https://www.suse.com/security/cve/CVE-2017-18238/" source="CVE"/>
		<reference ref_id="CVE-2018-7728" ref_url="https://www.suse.com/security/cve/CVE-2018-7728/" source="CVE"/>
		<reference ref_id="CVE-2018-7730" ref_url="https://www.suse.com/security/cve/CVE-2018-7730/" source="CVE"/>
		<description>
This update for exempi fixes the following security issues:

- CVE-2017-18233: Prevent integer overflow in the Chunk class that allowed
  remote attackers to cause a denial of service (infinite loop) via crafted XMP
  data in a .avi file (bsc#1085584).
- CVE-2017-18238: The TradQT_Manager::ParseCachedBoxes function allowed remote
  attackers to cause a denial of service (infinite loop) via crafted XMP data in
  a .qt file (bsc#1085583).
- CVE-2018-7728: Fixed heap-based buffer overflow, which allowed denial of
  service via crafted TIFF image (bsc#1085297).
- CVE-2018-7730: Fixed heap-based buffer overflow in
  XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp (bsc#1085295).
- CVE-2017-18236: The ASF_Support::ReadHeaderObject function allowed remote
  attackers to cause a denial of service (infinite loop) via a crafted .asf file
  (bsc#1085589).
- CVE-2017-18234: Prevent use-after-free that allowed remote attackers to cause
  a denial of service or possibly have unspecified other impact via a .pdf file
  containing JPEG data (bsc#1085585).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-24"/>
	<updated date="2018-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085295">SUSE bug 1085295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085297">SUSE bug 1085297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085583">SUSE bug 1085583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085584">SUSE bug 1085584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085589">SUSE bug 1085589</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18233/">CVE-2017-18233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18233">CVE-2017-18233 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18234/">CVE-2017-18234 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18234">CVE-2017-18234 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18236/">CVE-2017-18236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18236">CVE-2017-18236 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18238/">CVE-2017-18238 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18238">CVE-2017-18238 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7728/">CVE-2018-7728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7728">CVE-2018-7728 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7730/">CVE-2018-7730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7730">CVE-2018-7730 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520272" comment="libexempi3-2.2.1-5.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151883" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="1104457" ref_url="https://bugzilla.suse.com/1104457" source="BUGZILLA"/>
		<reference ref_id="1110723" ref_url="https://bugzilla.suse.com/1110723" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<reference ref_id="CVE-2018-15378" ref_url="https://www.suse.com/security/cve/CVE-2018-15378/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

clamav was updated to version 0.100.2:

- CVE-2018-15378: Vulnerability in ClamAV's MEW unpacking feature that
  could allow an unauthenticated, remote attacker to cause a denial of
  service (DoS) condition on an affected device. (bsc#1110723)
- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682: more fixes for embedded
  libmspack. (bsc#1103040)

- Make freshclam more robust against lagging signature mirrors.
- On-Access 'Extra Scanning', an opt-in minor feature of
  OnAccess scanning on Linux systems, has been disabled due to a
  known issue with resource cleanup OnAccessExtraScanning will
  be re-enabled in a future release when the issue is
  resolved. In the mean-time, users who enabled the feature in
  clamd.conf will see a warning informing them that the feature
  is not active. For details, see:
  https://bugzilla.clamav.net/show_bug.cgi?id=12048

- Restore exit code compatibility of freshclam with versions before
  0.100.0 when the virus database is already up to date
  (bsc#1104457).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104457">SUSE bug 1104457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110723">SUSE bug 1110723</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14680">CVE-2018-14680 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14681">CVE-2018-14681 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14682">CVE-2018-14682 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15378/">CVE-2018-15378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15378">CVE-2018-15378 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520273" comment="clamav-0.100.2-33.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151884" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027353" ref_url="https://bugzilla.suse.com/1027353" source="BUGZILLA"/>
		<reference ref_id="1081164" ref_url="https://bugzilla.suse.com/1081164" source="BUGZILLA"/>
		<reference ref_id="1102775" ref_url="https://bugzilla.suse.com/1102775" source="BUGZILLA"/>
		<reference ref_id="1111122" ref_url="https://bugzilla.suse.com/1111122" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18065" ref_url="https://www.suse.com/security/cve/CVE-2018-18065/" source="CVE"/>
		<description>
This update for net-snmp fixes the following issues:

Security issues fixed:

- CVE-2018-18065: _set_key in agent/helpers/table_container.c had a NULL Pointer Exception bug that can be used by an authenticated attacker to remotely cause the instance to crash via a crafted UDP packet, resulting in Denial of Service. (bsc#1111122)

Non-security issues fixed:

- swintst_rpm: Protect against unspecified Group name (bsc#1102775)
- Add tsm and tlstm MIBs and the USM security module. (bsc#1081164)
- Fix agentx freezing on timeout (bsc#1027353)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027353">SUSE bug 1027353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081164">SUSE bug 1081164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102775">SUSE bug 1102775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111122">SUSE bug 1111122</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18065/">CVE-2018-18065 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18065">CVE-2018-18065 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520274" comment="libsnmp30-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520275" comment="libsnmp30-32bit-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520276" comment="net-snmp-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520277" comment="perl-SNMP-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520278" comment="snmp-mibs-5.7.3-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151885" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1112399" ref_url="https://bugzilla.suse.com/1112399" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14997" ref_url="https://www.suse.com/security/cve/CVE-2017-14997/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2017-14997: GraphicsMagick allowed remote attackers to cause a denial of service (excessive memory allocation) because of an integer underflow in ReadPICTImage in coders/pict.c.  [bsc#1112399]
- CVE-2018-16644: An regression in the security fix for the pict coder was fixed (bsc#1107609)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112399">SUSE bug 1112399</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14997/">CVE-2017-14997 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14997">CVE-2017-14997 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16644">CVE-2018-16644 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520281" comment="libMagickCore-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520283" comment="libMagickWand-6_Q16-1-6.8.8.1-71.85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151886" version="1" class="patch">
	<metadata>
		<title>Security update for smt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104076" ref_url="https://bugzilla.suse.com/1104076" source="BUGZILLA"/>
		<reference ref_id="1111056" ref_url="https://bugzilla.suse.com/1111056" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12472" ref_url="https://www.suse.com/security/cve/CVE-2018-12472/" source="CVE"/>
		<description>


SMT was updated to version 3.0.38.

Following security issue was fixed:

- CVE-2018-12472: Harden hostname check during sibling check by forcing double
  reverse lookup (bsc#1104076)

Following non security issues were fixed:

- Add migration path check when registration sharing is enabled
- Fix sibling sync errors (bsc#1111056):
  - Synchronize all registered products
  - Handle duplicate registrations when syncing
  - Force resync to the sibling instance in `upgrade` and
    `synchronize` API calls
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104076">SUSE bug 1104076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111056">SUSE bug 1111056</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12472/">CVE-2018-12472 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12472">CVE-2018-12472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530314" comment="res-signingkeys-3.0.38-52.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530315" comment="smt-3.0.38-52.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530316" comment="smt-support-3.0.38-52.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151887" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1078292" ref_url="https://bugzilla.suse.com/1078292" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1094508" ref_url="https://bugzilla.suse.com/1094508" source="BUGZILLA"/>
		<reference ref_id="1103275" ref_url="https://bugzilla.suse.com/1103275" source="BUGZILLA"/>
		<reference ref_id="1103276" ref_url="https://bugzilla.suse.com/1103276" source="BUGZILLA"/>
		<reference ref_id="1103279" ref_url="https://bugzilla.suse.com/1103279" source="BUGZILLA"/>
		<reference ref_id="1106263" ref_url="https://bugzilla.suse.com/1106263" source="BUGZILLA"/>
		<reference ref_id="1111014" ref_url="https://bugzilla.suse.com/1111014" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15468" ref_url="https://www.suse.com/security/cve/CVE-2018-15468/" source="CVE"/>
		<reference ref_id="CVE-2018-15469" ref_url="https://www.suse.com/security/cve/CVE-2018-15469/" source="CVE"/>
		<reference ref_id="CVE-2018-15470" ref_url="https://www.suse.com/security/cve/CVE-2018-15470/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

XEN was updated to the Xen 4.9.3 bug fix only release (bsc#1027519)

- CVE-2018-17963: qemu_deliver_packet_iov accepted packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111014)
- CVE-2018-15470: oxenstored might not have enforced the configured quota-maxentity. This allowed a malicious or buggy guest to write as many xenstore entries as it wishes, causing unbounded memory usage in oxenstored. This can lead to a system-wide DoS.  (XSA-272) (bsc#1103279)
- CVE-2018-15469: ARM never properly implemented grant table v2, either in the hypervisor or in Linux. Unfortunately, an ARM guest can still request v2 grant tables; they will simply not be properly set up, resulting in subsequent grant-related hypercalls hitting BUG() checks. An unprivileged guest can cause a BUG() check in the hypervisor, resulting in a denial-of-service (crash). (XSA-268) (bsc#1103275)
  Note that SUSE does not ship ARM Xen, so we are not affected.
- CVE-2018-15468: The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service. (XSA-269) (bsc#1103276)
- CVE-2018-3646: Systems with microprocessors utilizing speculative execution and address translations may have allowed unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis. (XSA-273) (bsc#1091107)

Non security issues fixed:

- The affinity reporting via 'xl vcpu-list' was broken (bsc#1106263)
- Kernel oops in fs/dcache.c called by d_materialise_unique() (bsc#1094508)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-26"/>
	<updated date="2018-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078292">SUSE bug 1078292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094508">SUSE bug 1094508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103275">SUSE bug 1103275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103276">SUSE bug 1103276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103279">SUSE bug 1103279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106263">SUSE bug 1106263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111014">SUSE bug 1111014</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15468/">CVE-2018-15468 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15468">CVE-2018-15468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-15469/">CVE-2018-15469 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15469">CVE-2018-15469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-15470/">CVE-2018-15470 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15470">CVE-2018-15470 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17963">CVE-2018-17963 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520284" comment="xen-4.9.3_03-3.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553381" comment="xen-doc-html-4.9.3_03-3.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520285" comment="xen-libs-4.9.3_03-3.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520286" comment="xen-libs-32bit-4.9.3_03-3.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553382" comment="xen-tools-4.9.3_03-3.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553383" comment="xen-tools-domU-4.9.3_03-3.44.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151888" version="1" class="patch">
	<metadata>
		<title>Security update for lcms2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1021364" ref_url="https://bugzilla.suse.com/1021364" source="BUGZILLA"/>
		<reference ref_id="1026649" ref_url="https://bugzilla.suse.com/1026649" source="BUGZILLA"/>
		<reference ref_id="1026650" ref_url="https://bugzilla.suse.com/1026650" source="BUGZILLA"/>
		<reference ref_id="1108813" ref_url="https://bugzilla.suse.com/1108813" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<description>
This update for lcms2 fixes the following security issues:

- CVE-2016-10165: The Type_MLU_Read function allowed remote attackers to obtain
  sensitive information or cause a denial of service via an image with a crafted
  ICC profile, which triggered an out-of-bounds heap read (bsc#1021364).
- CVE-2018-16435: A integer overflow was fixed in the AllocateDataSet
  function in cmscgats.c, that could lead to a heap-based buffer overflow
  in the SetData function via a crafted file in the second argument to
  cmsIT8LoadFromFile. (bsc#1108813)
- Ensure that LUT stages match channel count (bsc#1026649).
- sanitize input and output channels on MPE profiles (bsc#1026650).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-29"/>
	<updated date="2018-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021364">SUSE bug 1021364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026649">SUSE bug 1026649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026650">SUSE bug 1026650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108813">SUSE bug 1108813</bugzilla>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10165">CVE-2016-10165 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16435">CVE-2018-16435 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520287" comment="lcms2-2.7-9.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520288" comment="liblcms2-2-2.7-9.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520289" comment="liblcms2-2-32bit-2.7-9.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151889" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="1094725" ref_url="https://bugzilla.suse.com/1094725" source="BUGZILLA"/>
		<reference ref_id="1096223" ref_url="https://bugzilla.suse.com/1096223" source="BUGZILLA"/>
		<reference ref_id="1098735" ref_url="https://bugzilla.suse.com/1098735" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

These security issues were fixed:

- CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have
  been exploited by sending a crafted QMP command (including guest-file-read with
  a large count value) to the agent via the listening socket causing DoS
  (bsc#1098735).
- CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented
  datagrams (bsc#1096223).

With this release the mitigations for Spectre v4 are moved the the patches from
upstream (CVE-2018-3639, bsc#1092885).

This feature was added:

- Add support for block resize support for disks through the monitor (bsc#1094725).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-29"/>
	<updated date="2018-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094725">SUSE bug 1094725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096223">SUSE bug 1096223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098735">SUSE bug 1098735</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11806">CVE-2018-11806 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12617">CVE-2018-12617 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520290" comment="qemu-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520291" comment="qemu-block-curl-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557262" comment="qemu-block-iscsi-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557263" comment="qemu-block-rbd-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557264" comment="qemu-block-ssh-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557265" comment="qemu-guest-agent-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520292" comment="qemu-ipxe-1.0.0-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520293" comment="qemu-kvm-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557266" comment="qemu-lang-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520294" comment="qemu-seabios-1.10.2-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520295" comment="qemu-sgabios-8-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520296" comment="qemu-tools-2.9.1-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520297" comment="qemu-vgabios-1.10.2-6.19.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520298" comment="qemu-x86-2.9.1-6.19.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151890" version="1" class="patch">
	<metadata>
		<title>Security update for python, python-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="1109663" ref_url="https://bugzilla.suse.com/1109663" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<description>
This update for python, python-base fixes the following issues:

Security issues fixed:

- CVE-2018-1000802: Prevent command injection in shutil module (make_archive
  function) via passage of unfiltered user input (bsc#1109663).
- CVE-2018-1061: Fixed DoS via regular expression backtracking in
  difflib.IS_LINE_JUNK method in difflib (bsc#1088004).
- CVE-2018-1060: Fixed DoS via regular expression catastrophic backtracking in
  apop() method in pop3lib (bsc#1088009).

Bug fixes:

- bsc#1086001: python tarfile uses random order.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-29"/>
	<updated date="2018-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000802">CVE-2018-1000802 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1060">CVE-2018-1060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1061">CVE-2018-1061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520299" comment="libpython2_7-1_0-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520300" comment="libpython2_7-1_0-32bit-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520301" comment="python-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557267" comment="python-32bit-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520302" comment="python-base-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557268" comment="python-base-32bit-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520303" comment="python-curses-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557269" comment="python-demo-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553407" comment="python-doc-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553408" comment="python-doc-pdf-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557270" comment="python-gdbm-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557271" comment="python-idle-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520305" comment="python-tk-2.7.13-28.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520306" comment="python-xml-2.7.13-28.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151891" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1109961" ref_url="https://bugzilla.suse.com/1109961" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11763" ref_url="https://www.suse.com/security/cve/CVE-2018-11763/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

Security issues fixed:

- CVE-2018-11763: In Apache HTTP Server by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. (bsc#1109961)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-30"/>
	<updated date="2018-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109961">SUSE bug 1109961</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11763/">CVE-2018-11763 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11763">CVE-2018-11763 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530317" comment="apache2-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530318" comment="apache2-doc-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530319" comment="apache2-example-pages-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530320" comment="apache2-prefork-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530321" comment="apache2-utils-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530322" comment="apache2-worker-2.4.23-29.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151892" version="1" class="patch">
	<metadata>
		<title>Security update for audiofile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111586" ref_url="https://bugzilla.suse.com/1111586" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17095" ref_url="https://www.suse.com/security/cve/CVE-2018-17095/" source="CVE"/>
		<description>
This update for audiofile fixes the following issues:

- CVE-2018-17095: A heap-based buffer overflow in Expand3To4Module::run could occurred when running sfconvert leading to crashes or code execution when handling untrusted soundfiles (bsc#1111586).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-31"/>
	<updated date="2018-10-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111586">SUSE bug 1111586</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17095/">CVE-2018-17095 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17095">CVE-2018-17095 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520307" comment="audiofile-0.3.6-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520308" comment="libaudiofile1-0.3.6-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520309" comment="libaudiofile1-32bit-0.3.6-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151893" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111647" ref_url="https://bugzilla.suse.com/1111647" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12086" ref_url="https://www.suse.com/security/cve/CVE-2018-12086/" source="CVE"/>
		<reference ref_id="CVE-2018-18227" ref_url="https://www.suse.com/security/cve/CVE-2018-18227/" source="CVE"/>
		<description>
This update for wireshark fixes the following issues:

Wireshark was updated to 2.4.10 (bsc#1111647).

Following security issues were fixed:

- CVE-2018-18227: MS-WSP dissector crash (wnpa-sec-2018-47)
- CVE-2018-12086: OpcUA dissector crash (wnpa-sec-2018-50)

Further bug fixes and updated protocol support that were done are listed in:

  https://www.wireshark.org/docs/relnotes/wireshark-2.4.10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-31"/>
	<updated date="2018-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111647">SUSE bug 1111647</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12086/">CVE-2018-12086 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12086">CVE-2018-12086 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18227/">CVE-2018-18227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18227">CVE-2018-18227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520313" comment="libwireshark9-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520314" comment="libwiretap7-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520315" comment="libwscodecs1-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520316" comment="libwsutil8-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520317" comment="wireshark-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520318" comment="wireshark-gtk-2.4.10-48.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151894" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1012260" ref_url="https://bugzilla.suse.com/1012260" source="BUGZILLA"/>
		<reference ref_id="1021577" ref_url="https://bugzilla.suse.com/1021577" source="BUGZILLA"/>
		<reference ref_id="1026191" ref_url="https://bugzilla.suse.com/1026191" source="BUGZILLA"/>
		<reference ref_id="1041469" ref_url="https://bugzilla.suse.com/1041469" source="BUGZILLA"/>
		<reference ref_id="1041894" ref_url="https://bugzilla.suse.com/1041894" source="BUGZILLA"/>
		<reference ref_id="1049703" ref_url="https://bugzilla.suse.com/1049703" source="BUGZILLA"/>
		<reference ref_id="1061204" ref_url="https://bugzilla.suse.com/1061204" source="BUGZILLA"/>
		<reference ref_id="1064786" ref_url="https://bugzilla.suse.com/1064786" source="BUGZILLA"/>
		<reference ref_id="1065464" ref_url="https://bugzilla.suse.com/1065464" source="BUGZILLA"/>
		<reference ref_id="1066489" ref_url="https://bugzilla.suse.com/1066489" source="BUGZILLA"/>
		<reference ref_id="1073210" ref_url="https://bugzilla.suse.com/1073210" source="BUGZILLA"/>
		<reference ref_id="1078436" ref_url="https://bugzilla.suse.com/1078436" source="BUGZILLA"/>
		<reference ref_id="1091551" ref_url="https://bugzilla.suse.com/1091551" source="BUGZILLA"/>
		<reference ref_id="1092697" ref_url="https://bugzilla.suse.com/1092697" source="BUGZILLA"/>
		<reference ref_id="1094767" ref_url="https://bugzilla.suse.com/1094767" source="BUGZILLA"/>
		<reference ref_id="1096515" ref_url="https://bugzilla.suse.com/1096515" source="BUGZILLA"/>
		<reference ref_id="1107343" ref_url="https://bugzilla.suse.com/1107343" source="BUGZILLA"/>
		<reference ref_id="1108771" ref_url="https://bugzilla.suse.com/1108771" source="BUGZILLA"/>
		<reference ref_id="1108986" ref_url="https://bugzilla.suse.com/1108986" source="BUGZILLA"/>
		<reference ref_id="1109363" ref_url="https://bugzilla.suse.com/1109363" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1110506" ref_url="https://bugzilla.suse.com/1110506" source="BUGZILLA"/>
		<reference ref_id="1110507" ref_url="https://bugzilla.suse.com/1110507" source="BUGZILLA"/>
		<reference ref_id="703591" ref_url="https://bugzilla.suse.com/703591" source="BUGZILLA"/>
		<reference ref_id="839074" ref_url="https://bugzilla.suse.com/839074" source="BUGZILLA"/>
		<reference ref_id="857131" ref_url="https://bugzilla.suse.com/857131" source="BUGZILLA"/>
		<reference ref_id="893359" ref_url="https://bugzilla.suse.com/893359" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16541" ref_url="https://www.suse.com/security/cve/CVE-2017-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-12376" ref_url="https://www.suse.com/security/cve/CVE-2018-12376/" source="CVE"/>
		<reference ref_id="CVE-2018-12377" ref_url="https://www.suse.com/security/cve/CVE-2018-12377/" source="CVE"/>
		<reference ref_id="CVE-2018-12378" ref_url="https://www.suse.com/security/cve/CVE-2018-12378/" source="CVE"/>
		<reference ref_id="CVE-2018-12379" ref_url="https://www.suse.com/security/cve/CVE-2018-12379/" source="CVE"/>
		<reference ref_id="CVE-2018-12381" ref_url="https://www.suse.com/security/cve/CVE-2018-12381/" source="CVE"/>
		<reference ref_id="CVE-2018-12383" ref_url="https://www.suse.com/security/cve/CVE-2018-12383/" source="CVE"/>
		<reference ref_id="CVE-2018-12385" ref_url="https://www.suse.com/security/cve/CVE-2018-12385/" source="CVE"/>
		<reference ref_id="CVE-2018-12386" ref_url="https://www.suse.com/security/cve/CVE-2018-12386/" source="CVE"/>
		<reference ref_id="CVE-2018-12387" ref_url="https://www.suse.com/security/cve/CVE-2018-12387/" source="CVE"/>
		<description>
This update for MozillaFirefox to ESR 60.2.2 fixes several issues.

These general changes are part of the version 60 release.

- New browser engine with speed improvements
- Redesigned graphical user interface elements
- Unified address and search bar for new installations
- New tab page listing top visited, recently visited and recommended pages
- Support for configuration policies in enterprise deployments via JSON files
- Support for Web Authentication, allowing the use of USB tokens for
  authentication to web sites

The following changes affect compatibility:
    
- Now exclusively supports extensions built using the WebExtension API.
- Unsupported legacy extensions will no longer work in Firefox 60 ESR
- TLS certificates issued by Symantec before June 1st, 2016 are no longer trusted 
  The 'security.pki.distrust_ca_policy' preference can be set to 0 to reinstate
  trust in those certificates

The following issues affect performance:

- new format for storing private keys, certificates and certificate trust
  If the user home or data directory is on a network file system, it is
  recommended that users set the following environment variable to avoid
  slowdowns: NSS_SDB_USE_CACHE=yes
  This setting is not recommended for local, fast file systems. 

These security issues were fixed:

- CVE-2018-12381: Dragging and dropping Outlook email message results in page navigation (bsc#1107343).
- CVE-2017-16541: Proxy bypass using automount and autofs (bsc#1107343).
- CVE-2018-12376: Various memory safety bugs (bsc#1107343).
- CVE-2018-12377: Use-after-free in refresh driver timers (bsc#1107343).
- CVE-2018-12378: Use-after-free in IndexedDB (bsc#1107343).
- CVE-2018-12379: Out-of-bounds write with malicious MAR file (bsc#1107343).
- CVE-2018-12386: Type confusion in JavaScript allowed remote code execution (bsc#1110506)
- CVE-2018-12387: Array.prototype.push stack pointer vulnerability may enable exploits in the sandboxed content process (bsc#1110507)
- CVE-2018-12385: Crash in TransportSecurityInfo due to cached data  (bsc#1109363)
- CVE-2018-12383: Setting a master password did not delete unencrypted previously stored passwords  (bsc#1107343)

This update for mozilla-nspr to version 4.19 fixes the follwing issues

- Added TCP Fast Open functionality
- A socket without PR_NSPR_IO_LAYER will no longer trigger
  an assertion when polling

This update for mozilla-nss to version 3.36.4 fixes the follwing issues

- Connecting to a server that was recently upgraded to TLS 1.3
  would result in a SSL_RX_MALFORMED_SERVER_HELLO error.
- Fix a rare bug with PKCS#12 files.
- Replaces existing vectorized ChaCha20 code with verified
  HACL* implementation.
- TLS 1.3 support has been updated to draft -23.
- Added formally verified implementations of non-vectorized Chacha20
  and non-vectorized Poly1305 64-bit.
- The following CA certificates were Removed:
  OU = Security Communication EV RootCA1
  CN = CA Disig Root R1
  CN = DST ACES CA X6
  Certum CA, O=Unizeto Sp. z o.o.
  StartCom Certification Authority
  StartCom Certification Authority G2
  T?BİTAK UEKAE K?k Sertifika Hizmet Sağlayıcısı - S?r?m 3
  ACEDICOM Root
  Certinomis - Autorit? Racine
  T?RKTRUST Elektronik Sertifika Hizmet Sağlayıcısı
  PSCProcert
  CA 沃通根证书, O=WoSign CA Limited
  Certification Authority of WoSign
  Certification Authority of WoSign G2
  CA WoSign ECC Root
  Subject CN = VeriSign Class 3 Secure Server CA - G2
  O = Japanese Government, OU = ApplicationCA
  CN = WellsSecure Public Root Certificate Authority
  CN = T?RKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6
  CN = Microsec e-Szigno Root
* The following CA certificates were Removed:
  AddTrust Public CA Root
  AddTrust Qualified CA Root
  China Internet Network Information Center EV Certificates Root
  CNNIC ROOT
  ComSign Secured CA
  GeoTrust Global CA 2
  Secure Certificate Services
  Swisscom Root CA 1
  Swisscom Root EV CA 2
  Trusted Certificate Services
  UTN-USERFirst-Hardware
  UTN-USERFirst-Object
* The following CA certificates were Added
  CN = D-TRUST Root CA 3 2013
  CN = TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1
  GDCA TrustAUTH R5 ROOT
  SSL.com Root Certification Authority RSA
  SSL.com Root Certification Authority ECC
  SSL.com EV Root Certification Authority RSA R2
  SSL.com EV Root Certification Authority ECC
  TrustCor RootCert CA-1
  TrustCor RootCert CA-2
  TrustCor ECA-1
* The Websites (TLS/SSL) trust bit was turned off for the following
  CA certificates:
  CN = Chambers of Commerce Root
  CN = Global Chambersign Root
* TLS servers are able to handle a ClientHello statelessly, if the
  client supports TLS 1.3.  If the server sends a HelloRetryRequest,
  it is possible to discard the server socket, and make a new socket
  to handle any subsequent ClientHello. This better enables stateless
  server operation. (This feature is added in support of QUIC, but it
  also has utility for DTLS 1.3 servers.)

Due to the update of mozilla-nss apache2-mod_nss needs to be updated to 
change to the SQLite certificate database, which is now the default (bsc#1108771)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-31"/>
	<updated date="2018-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012260">SUSE bug 1012260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021577">SUSE bug 1021577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026191">SUSE bug 1026191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041469">SUSE bug 1041469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041894">SUSE bug 1041894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049703">SUSE bug 1049703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061204">SUSE bug 1061204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064786">SUSE bug 1064786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065464">SUSE bug 1065464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066489">SUSE bug 1066489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073210">SUSE bug 1073210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078436">SUSE bug 1078436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091551">SUSE bug 1091551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092697">SUSE bug 1092697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094767">SUSE bug 1094767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096515">SUSE bug 1096515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108771">SUSE bug 1108771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108986">SUSE bug 1108986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109363">SUSE bug 1109363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110506">SUSE bug 1110506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110507">SUSE bug 1110507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703591">SUSE bug 703591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839074">SUSE bug 839074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857131">SUSE bug 857131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893359">SUSE bug 893359</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16541/">CVE-2017-16541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16541">CVE-2017-16541 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-12376/">CVE-2018-12376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12376">CVE-2018-12376 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12377/">CVE-2018-12377 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12377">CVE-2018-12377 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12378/">CVE-2018-12378 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12378">CVE-2018-12378 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12379/">CVE-2018-12379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12379">CVE-2018-12379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12381/">CVE-2018-12381 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12381">CVE-2018-12381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12383/">CVE-2018-12383 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12383">CVE-2018-12383 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12385/">CVE-2018-12385 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12385">CVE-2018-12385 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12386/">CVE-2018-12386 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12386">CVE-2018-12386 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12387/">CVE-2018-12387 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12387">CVE-2018-12387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530324" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530325" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530326" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530327" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530328" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151895" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1112758" ref_url="https://bugzilla.suse.com/1112758" source="BUGZILLA"/>
		<reference ref_id="1113660" ref_url="https://bugzilla.suse.com/1113660" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16840" ref_url="https://www.suse.com/security/cve/CVE-2018-16840/" source="CVE"/>
		<reference ref_id="CVE-2018-16842" ref_url="https://www.suse.com/security/cve/CVE-2018-16842/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-16840: A use after free in closing SASL handles was fixed (bsc#1112758)
- CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which could lead to crashes (bsc#1113660)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-02"/>
	<updated date="2018-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113660">SUSE bug 1113660</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16840/">CVE-2018-16840 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16840">CVE-2018-16840 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16842/">CVE-2018-16842 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16842">CVE-2018-16842 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520335" comment="curl-7.37.0-37.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520336" comment="libcurl4-7.37.0-37.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520337" comment="libcurl4-32bit-7.37.0-37.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151896" version="1" class="patch">
	<metadata>
		<title>Security update for soundtouch (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1108630" ref_url="https://bugzilla.suse.com/1108630" source="BUGZILLA"/>
		<reference ref_id="1108631" ref_url="https://bugzilla.suse.com/1108631" source="BUGZILLA"/>
		<reference ref_id="1108632" ref_url="https://bugzilla.suse.com/1108632" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17096" ref_url="https://www.suse.com/security/cve/CVE-2018-17096/" source="CVE"/>
		<reference ref_id="CVE-2018-17097" ref_url="https://www.suse.com/security/cve/CVE-2018-17097/" source="CVE"/>
		<reference ref_id="CVE-2018-17098" ref_url="https://www.suse.com/security/cve/CVE-2018-17098/" source="CVE"/>
		<description>
This update for soundtouch fixes the following issues:

- CVE-2018-17098: The WavFileBase class allowed remote attackers to cause a denial of service (heap corruption from size inconsistency) or possibly have unspecified other impact, as demonstrated by SoundStretch. (bsc#1108632)
- CVE-2018-17097: The WavFileBase class allowed remote attackers to cause a denial of service (double free) or possibly have unspecified other impact, as demonstrated by SoundStretch. (double free) (bsc#1108631)
- CVE-2018-17096: The BPMDetect class allowed remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch. (bsc#1108630)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-02"/>
	<updated date="2018-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108630">SUSE bug 1108630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108631">SUSE bug 1108631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108632">SUSE bug 1108632</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17096/">CVE-2018-17096 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17096">CVE-2018-17096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17097/">CVE-2018-17097 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17097">CVE-2018-17097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17098/">CVE-2018-17098 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17098">CVE-2018-17098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520338" comment="libSoundTouch0-1.7.1-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151897" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104812" ref_url="https://bugzilla.suse.com/1104812" source="BUGZILLA"/>
		<reference ref_id="1106998" ref_url="https://bugzilla.suse.com/1106998" source="BUGZILLA"/>
		<reference ref_id="1106999" ref_url="https://bugzilla.suse.com/1106999" source="BUGZILLA"/>
		<reference ref_id="1107033" ref_url="https://bugzilla.suse.com/1107033" source="BUGZILLA"/>
		<reference ref_id="1107034" ref_url="https://bugzilla.suse.com/1107034" source="BUGZILLA"/>
		<reference ref_id="1107037" ref_url="https://bugzilla.suse.com/1107037" source="BUGZILLA"/>
		<reference ref_id="1107038" ref_url="https://bugzilla.suse.com/1107038" source="BUGZILLA"/>
		<reference ref_id="1107039" ref_url="https://bugzilla.suse.com/1107039" source="BUGZILLA"/>
		<reference ref_id="1107097" ref_url="https://bugzilla.suse.com/1107097" source="BUGZILLA"/>
		<reference ref_id="1107107" ref_url="https://bugzilla.suse.com/1107107" source="BUGZILLA"/>
		<reference ref_id="1108318" ref_url="https://bugzilla.suse.com/1108318" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16391" ref_url="https://www.suse.com/security/cve/CVE-2018-16391/" source="CVE"/>
		<reference ref_id="CVE-2018-16392" ref_url="https://www.suse.com/security/cve/CVE-2018-16392/" source="CVE"/>
		<reference ref_id="CVE-2018-16393" ref_url="https://www.suse.com/security/cve/CVE-2018-16393/" source="CVE"/>
		<reference ref_id="CVE-2018-16418" ref_url="https://www.suse.com/security/cve/CVE-2018-16418/" source="CVE"/>
		<reference ref_id="CVE-2018-16419" ref_url="https://www.suse.com/security/cve/CVE-2018-16419/" source="CVE"/>
		<reference ref_id="CVE-2018-16420" ref_url="https://www.suse.com/security/cve/CVE-2018-16420/" source="CVE"/>
		<reference ref_id="CVE-2018-16422" ref_url="https://www.suse.com/security/cve/CVE-2018-16422/" source="CVE"/>
		<reference ref_id="CVE-2018-16423" ref_url="https://www.suse.com/security/cve/CVE-2018-16423/" source="CVE"/>
		<reference ref_id="CVE-2018-16426" ref_url="https://www.suse.com/security/cve/CVE-2018-16426/" source="CVE"/>
		<reference ref_id="CVE-2018-16427" ref_url="https://www.suse.com/security/cve/CVE-2018-16427/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2018-16391: Fixed a denial of service when handling responses from a Muscle Card (bsc#1106998)
- CVE-2018-16392: Fixed a denial of service when handling responses from a TCOS Card (bsc#1106999)
- CVE-2018-16393: Fixed buffer overflows when handling responses from Gemsafe V1 Smartcards (bsc#1108318)
- CVE-2018-16418: Fixed buffer overflow when handling string concatenation in util_acl_to_str (bsc#1107039)
- CVE-2018-16419: Fixed several buffer overflows when handling responses from a Cryptoflex card (bsc#1107107)
- CVE-2018-16420: Fixed buffer overflows when handling responses from an ePass 2003 Card (bsc#1107097)
- CVE-2018-16422: Fixed single byte buffer overflow when handling responses from an esteid Card (bsc#1107038)
- CVE-2018-16423: Fixed double free when handling responses from a smartcard (bsc#1107037)
- CVE-2018-16426: Fixed endless recursion when handling responses from an IAS-ECC card (bsc#1107034)
- CVE-2018-16427: Fixed out of bounds reads when handling responses in OpenSC (bsc#1107033)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-05"/>
	<updated date="2018-11-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104812">SUSE bug 1104812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106998">SUSE bug 1106998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106999">SUSE bug 1106999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107033">SUSE bug 1107033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107034">SUSE bug 1107034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107037">SUSE bug 1107037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107038">SUSE bug 1107038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107039">SUSE bug 1107039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107097">SUSE bug 1107097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107107">SUSE bug 1107107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108318">SUSE bug 1108318</bugzilla>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16391/">CVE-2018-16391 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16391">CVE-2018-16391 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16392/">CVE-2018-16392 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16392">CVE-2018-16392 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16393/">CVE-2018-16393 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16393">CVE-2018-16393 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16418/">CVE-2018-16418 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16418">CVE-2018-16418 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16419/">CVE-2018-16419 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16419">CVE-2018-16419 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16420/">CVE-2018-16420 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16420">CVE-2018-16420 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16422/">CVE-2018-16422 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16422">CVE-2018-16422 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16423/">CVE-2018-16423 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16423">CVE-2018-16423 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16426/">CVE-2018-16426 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16426">CVE-2018-16426 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16427/">CVE-2018-16427 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16427">CVE-2018-16427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520341" comment="opensc-0.13.0-3.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151898" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1032089" ref_url="https://bugzilla.suse.com/1032089" source="BUGZILLA"/>
		<reference ref_id="1037008" ref_url="https://bugzilla.suse.com/1037008" source="BUGZILLA"/>
		<reference ref_id="1037009" ref_url="https://bugzilla.suse.com/1037009" source="BUGZILLA"/>
		<reference ref_id="1057514" ref_url="https://bugzilla.suse.com/1057514" source="BUGZILLA"/>
		<reference ref_id="1059100" ref_url="https://bugzilla.suse.com/1059100" source="BUGZILLA"/>
		<reference ref_id="1059134" ref_url="https://bugzilla.suse.com/1059134" source="BUGZILLA"/>
		<reference ref_id="1059139" ref_url="https://bugzilla.suse.com/1059139" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10209" ref_url="https://www.suse.com/security/cve/CVE-2016-10209/" source="CVE"/>
		<reference ref_id="CVE-2016-10349" ref_url="https://www.suse.com/security/cve/CVE-2016-10349/" source="CVE"/>
		<reference ref_id="CVE-2016-10350" ref_url="https://www.suse.com/security/cve/CVE-2016-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-14166" ref_url="https://www.suse.com/security/cve/CVE-2017-14166/" source="CVE"/>
		<reference ref_id="CVE-2017-14501" ref_url="https://www.suse.com/security/cve/CVE-2017-14501/" source="CVE"/>
		<reference ref_id="CVE-2017-14502" ref_url="https://www.suse.com/security/cve/CVE-2017-14502/" source="CVE"/>
		<reference ref_id="CVE-2017-14503" ref_url="https://www.suse.com/security/cve/CVE-2017-14503/" source="CVE"/>
		<description>
This update for libarchive fixes the following issues:

- CVE-2016-10209: The archive_wstring_append_from_mbs function in archive_string.c allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted archive file. (bsc#1032089)
- CVE-2016-10349: The archive_le32dec function in archive_endian.h allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. (bsc#1037008)
- CVE-2016-10350: The archive_read_format_cab_read_header function in archive_read_support_format_cab.c allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. (bsc#1037009)
- CVE-2017-14166: libarchive allowed remote attackers to cause a denial of service (xml_data heap-based buffer over-read and application crash) via a crafted xar archive, related to the mishandling of empty strings in the atol8 function in archive_read_support_format_xar.c. (bsc#1057514)
- CVE-2017-14501: An out-of-bounds read flaw existed in parse_file_info in archive_read_support_format_iso9660.c when extracting a specially crafted iso9660 iso file, related to archive_read_format_iso9660_read_header. (bsc#1059139)
- CVE-2017-14502: read_header in archive_read_support_format_rar.c suffered from an off-by-one error for UTF-16 names in RAR archives, leading to an out-of-bounds read in archive_read_format_rar_read_header. (bsc#1059134)
- CVE-2017-14503: libarchive suffered from an out-of-bounds read within lha_read_data_none() in archive_read_support_format_lha.c when extracting a specially crafted lha archive, related to lha_crc16. (bsc#1059100)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-07"/>
	<updated date="2018-11-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1032089">SUSE bug 1032089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037008">SUSE bug 1037008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037009">SUSE bug 1037009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057514">SUSE bug 1057514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059100">SUSE bug 1059100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059134">SUSE bug 1059134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059139">SUSE bug 1059139</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10209/">CVE-2016-10209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10209">CVE-2016-10209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10349/">CVE-2016-10349 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10349">CVE-2016-10349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10350/">CVE-2016-10350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10350">CVE-2016-10350 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14166/">CVE-2017-14166 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14166">CVE-2017-14166 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14501/">CVE-2017-14501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14501">CVE-2017-14501 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14502/">CVE-2017-14502 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14502">CVE-2017-14502 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14503/">CVE-2017-14503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14503">CVE-2017-14503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520342" comment="libarchive13-3.1.2-26.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151899" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1112852" ref_url="https://bugzilla.suse.com/1112852" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12389" ref_url="https://www.suse.com/security/cve/CVE-2018-12389/" source="CVE"/>
		<reference ref_id="CVE-2018-12390" ref_url="https://www.suse.com/security/cve/CVE-2018-12390/" source="CVE"/>
		<reference ref_id="CVE-2018-12392" ref_url="https://www.suse.com/security/cve/CVE-2018-12392/" source="CVE"/>
		<reference ref_id="CVE-2018-12393" ref_url="https://www.suse.com/security/cve/CVE-2018-12393/" source="CVE"/>
		<reference ref_id="CVE-2018-12395" ref_url="https://www.suse.com/security/cve/CVE-2018-12395/" source="CVE"/>
		<reference ref_id="CVE-2018-12396" ref_url="https://www.suse.com/security/cve/CVE-2018-12396/" source="CVE"/>
		<reference ref_id="CVE-2018-12397" ref_url="https://www.suse.com/security/cve/CVE-2018-12397/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

- Update to Mozilla Firefox 60.3.0esr: MFSA 2018-27 (bsc#1112852)
- CVE-2018-12392: Crash with nested event loops.
- CVE-2018-12393: Integer overflow during Unicode conversion while loading JavaScript.
- CVE-2018-12395: WebExtension bypass of domain restrictions through header rewriting.
- CVE-2018-12396: WebExtension content scripts can execute in disallowed contexts.
- CVE-2018-12397: WebExtension local file access vulnerability.
- CVE-2018-12389: Memory safety bugs fixed in Firefox ESR 60.3.
- CVE-2018-12390: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-13"/>
	<updated date="2018-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12389/">CVE-2018-12389 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12389">CVE-2018-12389 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12390/">CVE-2018-12390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12390">CVE-2018-12390 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12392/">CVE-2018-12392 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12392">CVE-2018-12392 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12393/">CVE-2018-12393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12393">CVE-2018-12393 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12395/">CVE-2018-12395 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12395">CVE-2018-12395 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12396/">CVE-2018-12396 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12396">CVE-2018-12396 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12397/">CVE-2018-12397 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12397">CVE-2018-12397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520350" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520351" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151900" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1106923" ref_url="https://bugzilla.suse.com/1106923" source="BUGZILLA"/>
		<reference ref_id="1108835" ref_url="https://bugzilla.suse.com/1108835" source="BUGZILLA"/>
		<reference ref_id="1109252" ref_url="https://bugzilla.suse.com/1109252" source="BUGZILLA"/>
		<reference ref_id="1110445" ref_url="https://bugzilla.suse.com/1110445" source="BUGZILLA"/>
		<reference ref_id="1111278" ref_url="https://bugzilla.suse.com/1111278" source="BUGZILLA"/>
		<reference ref_id="1112024" ref_url="https://bugzilla.suse.com/1112024" source="BUGZILLA"/>
		<reference ref_id="1113083" ref_url="https://bugzilla.suse.com/1113083" source="BUGZILLA"/>
		<reference ref_id="1113632" ref_url="https://bugzilla.suse.com/1113632" source="BUGZILLA"/>
		<reference ref_id="1113665" ref_url="https://bugzilla.suse.com/1113665" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15686" ref_url="https://www.suse.com/security/cve/CVE-2018-15686/" source="CVE"/>
		<reference ref_id="CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688/" source="CVE"/>
		<description>

This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2018-15688: A buffer overflow vulnerability in the dhcp6 client of systemd allowed a malicious dhcp6 server to overwrite heap memory in systemd-networkd. (bsc#1113632)
- CVE-2018-15686: A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. (bsc#1113665)

Non-security issues fixed:

- dhcp6: split assert_return() to be more debuggable when hit
- core: skip unit deserialization and move to the next one when unit_deserialize() fails
- core: properly handle deserialization of unknown unit types (#6476)
- core: don't create Requires for workdir if 'missing ok' (bsc#1113083)
- logind: use manager_get_user_by_pid() where appropriate
- logind: rework manager_get_{user|session}_by_pid() a bit
- login: fix user@.service case, so we don't allow nested sessions (#8051) (bsc#1112024)
- core: be more defensive if we can't determine per-connection socket peer (#7329)
- socket-util: introduce port argument in sockaddr_port()
- service: fixup ExecStop for socket-activated shutdown (#4120)
- service: Continue shutdown on socket activated unit on termination (#4108) (bsc#1106923)
- cryptsetup: build fixes for 'add support for sector-size= option'
- udev-rules: IMPORT cmdline does not recognize keys with similar names (bsc#1111278)
- core: keep the kernel coredump defaults when systemd-coredump is disabled
- core: shorten main() a bit, split out coredump initialization
- core: set RLIMIT_CORE to unlimited by default (bsc#1108835)
- core/mount: fstype may be NULL
- journald: don't ship systemd-journald-audit.socket (bsc#1109252)
- core: make 'tmpfs' dependencies on swapfs a 'default' dep, not an 'implicit' (bsc#1110445)
- mount: make sure we unmount tmpfs mounts before we deactivate swaps (#7076)
- tmp.mount.hm4: After swap.target (#3087)

- Ship systemd-sysv-install helper via the main package
  This script was part of systemd-sysvinit sub-package but it was
  wrong since systemd-sysv-install is a script used to redirect
  enable/disable operations to chkconfig when the unit targets are
  sysv init scripts. Therefore it's never been a SySV init tool.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-14"/>
	<updated date="2018-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106923">SUSE bug 1106923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108835">SUSE bug 1108835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109252">SUSE bug 1109252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110445">SUSE bug 1110445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111278">SUSE bug 1111278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112024">SUSE bug 1112024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113083">SUSE bug 1113083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113632">SUSE bug 1113632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113665">SUSE bug 1113665</bugzilla>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15686/">CVE-2018-15686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15686">CVE-2018-15686 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15688">CVE-2018-15688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520352" comment="libsystemd0-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520353" comment="libsystemd0-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520354" comment="libudev1-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520355" comment="libudev1-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520356" comment="systemd-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520357" comment="systemd-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520358" comment="systemd-bash-completion-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520359" comment="systemd-sysvinit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520360" comment="udev-228-150.53.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151901" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1114837" ref_url="https://bugzilla.suse.com/1114837" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16850" ref_url="https://www.suse.com/security/cve/CVE-2018-16850/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

Security issue fixed:

- CVE-2018-16850: Fixed improper quoting of transition table names when pg_dump emits CREATE TRIGGER could have caused privilege escalation (bsc#1114837).

Non-security issues fixed:

- Update to release 10.6:
  * https://www.postgresql.org/docs/current/static/release-10-6.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-15"/>
	<updated date="2018-11-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114837">SUSE bug 1114837</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16850/">CVE-2018-16850 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16850">CVE-2018-16850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520361" comment="libecpg6-10.6-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520362" comment="libpq5-10.6-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520363" comment="libpq5-32bit-10.6-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520364" comment="postgresql10-10.6-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557272" comment="postgresql10-contrib-10.6-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553465" comment="postgresql10-docs-10.6-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557273" comment="postgresql10-server-10.6-1.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151902" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1112066" ref_url="https://bugzilla.suse.com/1112066" source="BUGZILLA"/>
		<reference ref_id="1112695" ref_url="https://bugzilla.suse.com/1112695" source="BUGZILLA"/>
		<reference ref_id="1113668" ref_url="https://bugzilla.suse.com/1113668" source="BUGZILLA"/>
		<reference ref_id="1113669" ref_url="https://bugzilla.suse.com/1113669" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19131" ref_url="https://www.suse.com/security/cve/CVE-2018-19131/" source="CVE"/>
		<reference ref_id="CVE-2018-19132" ref_url="https://www.suse.com/security/cve/CVE-2018-19132/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

Security issues fixed:

- CVE-2018-19131: Fixed Cross-Site-Scripting vulnerability in the TLS error handling (bsc#1113668).
- CVE-2018-19132: Fixed small memory leak in processing of SNMP packets (bsc#1113669).

Non-security issues fixed:

- Create runtime directories needed when SMP mode is enabled (bsc#1112695, bsc#1112066).
- Install license correctly (bsc#1082318).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-15"/>
	<updated date="2018-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112066">SUSE bug 1112066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112695">SUSE bug 1112695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113668">SUSE bug 1113668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113669">SUSE bug 1113669</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19131/">CVE-2018-19131 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19131">CVE-2018-19131 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19132/">CVE-2018-19132 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19132">CVE-2018-19132 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557274" comment="squid-3.5.21-26.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151903" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1112209" ref_url="https://bugzilla.suse.com/1112209" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="1113742" ref_url="https://bugzilla.suse.com/1113742" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- Add missing timing side channel patch for DSA signature generation (bsc#1113742).

Non-security issues fixed:

- Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-22"/>
	<updated date="2018-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112209">SUSE bug 1112209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113742">SUSE bug 1113742</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0734">CVE-2018-0734 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5407">CVE-2018-5407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520373" comment="libopenssl-devel-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520374" comment="libopenssl1_0_0-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520375" comment="libopenssl1_0_0-32bit-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530330" comment="libopenssl1_0_0-hmac-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530331" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520376" comment="openssl-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530332" comment="openssl-doc-1.0.2j-60.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151904" version="1" class="patch">
	<metadata>
		<title>Security update for rpm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="943457" ref_url="https://bugzilla.suse.com/943457" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7500" ref_url="https://www.suse.com/security/cve/CVE-2017-7500/" source="CVE"/>
		<reference ref_id="CVE-2017-7501" ref_url="https://www.suse.com/security/cve/CVE-2017-7501/" source="CVE"/>
		<description>
This update for rpm fixes the following issues:

These security issues were fixed:

- CVE-2017-7500: rpm did not properly handle RPM installations when a
  destination path was a symbolic link to a directory, possibly changing
  ownership and permissions of an arbitrary directory, and RPM files being placed
  in an arbitrary destination (bsc#943457).
- CVE-2017-7501: rpm used temporary files with predictable names when
  installing an RPM. An attacker with ability to write in a directory where files
  will be installed could create symbolic links to an arbitrary location and
  modify content, and possibly permissions to arbitrary files, which could be
  used for denial of service or possibly privilege escalation (bsc#943457)

This is a reissue of the above security fixes for SUSE Linux Enterprise 12 GA, SP1 and SP2 LTSS,
they have already been released for SUSE Linux Enterprise Server 12 SP3.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-23"/>
	<updated date="2018-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/943457">SUSE bug 943457</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7500/">CVE-2017-7500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7500">CVE-2017-7500 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7501/">CVE-2017-7501 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7501">CVE-2017-7501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521784" comment="python3-rpm-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520377" comment="rpm-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520378" comment="rpm-32bit-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520379" comment="rpm-build-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520380" comment="rpm-python-4.11.2-16.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151905" version="1" class="patch">
	<metadata>
		<title>Security update for exiv2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1050257" ref_url="https://bugzilla.suse.com/1050257" source="BUGZILLA"/>
		<reference ref_id="1051188" ref_url="https://bugzilla.suse.com/1051188" source="BUGZILLA"/>
		<reference ref_id="1060995" ref_url="https://bugzilla.suse.com/1060995" source="BUGZILLA"/>
		<reference ref_id="1060996" ref_url="https://bugzilla.suse.com/1060996" source="BUGZILLA"/>
		<reference ref_id="1061000" ref_url="https://bugzilla.suse.com/1061000" source="BUGZILLA"/>
		<reference ref_id="1072928" ref_url="https://bugzilla.suse.com/1072928" source="BUGZILLA"/>
		<reference ref_id="1092952" ref_url="https://bugzilla.suse.com/1092952" source="BUGZILLA"/>
		<reference ref_id="1093095" ref_url="https://bugzilla.suse.com/1093095" source="BUGZILLA"/>
		<reference ref_id="1095070" ref_url="https://bugzilla.suse.com/1095070" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11591" ref_url="https://www.suse.com/security/cve/CVE-2017-11591/" source="CVE"/>
		<reference ref_id="CVE-2017-11683" ref_url="https://www.suse.com/security/cve/CVE-2017-11683/" source="CVE"/>
		<reference ref_id="CVE-2017-14859" ref_url="https://www.suse.com/security/cve/CVE-2017-14859/" source="CVE"/>
		<reference ref_id="CVE-2017-14862" ref_url="https://www.suse.com/security/cve/CVE-2017-14862/" source="CVE"/>
		<reference ref_id="CVE-2017-14864" ref_url="https://www.suse.com/security/cve/CVE-2017-14864/" source="CVE"/>
		<reference ref_id="CVE-2017-17669" ref_url="https://www.suse.com/security/cve/CVE-2017-17669/" source="CVE"/>
		<reference ref_id="CVE-2018-10958" ref_url="https://www.suse.com/security/cve/CVE-2018-10958/" source="CVE"/>
		<reference ref_id="CVE-2018-10998" ref_url="https://www.suse.com/security/cve/CVE-2018-10998/" source="CVE"/>
		<reference ref_id="CVE-2018-11531" ref_url="https://www.suse.com/security/cve/CVE-2018-11531/" source="CVE"/>
		<description>
This update for exiv2 fixes the following issues:

- CVE-2017-11591: A floating point exception in the Exiv2::ValueType function could lead to a remote denial of service attack via crafted input. (bsc#1050257)
- CVE-2017-14864: An invalid memory address dereference was discovered in Exiv2::getULong in types.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1060995)
- CVE-2017-14862: An invalid memory address dereference was discovered in Exiv2::DataValue::read in value.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1060996)
- CVE-2017-14859: An invalid memory address dereference was discovered in Exiv2::StringValueBase::read in value.cpp. The vulnerability caused a segmentation fault and application crash, which lead to denial of service. (bsc#1061000)
- CVE-2017-11683: There is a reachable assertion in the Internal::TiffReader::visitDirectory function in tiffvisitor.cpp that could lead to a remote denial of service attack via crafted input. (bsc#1051188)
- CVE-2017-17669: There is a heap-based buffer over-read in the Exiv2::Internal::PngChunk::keyTXTChunk function of pngchunk_int.cpp. A crafted PNG file would lead to a remote denial of service attack. (bsc#1072928)
- CVE-2018-10958: In types.cpp a large size value might have lead to a SIGABRT during an attempt at memory allocation for an Exiv2::Internal::PngChunk::zlibUncompress call. (bsc#1092952)
- CVE-2018-10998: readMetadata in jp2image.cpp allowed remote attackers to cause a denial of service (SIGABRT) by triggering an incorrect Safe::add call. (bsc#1093095)
- CVE-2018-11531: Exiv2 had a heap-based buffer overflow in getData in preview.cpp. (bsc#1095070)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-23"/>
	<updated date="2018-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050257">SUSE bug 1050257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051188">SUSE bug 1051188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060995">SUSE bug 1060995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060996">SUSE bug 1060996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061000">SUSE bug 1061000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072928">SUSE bug 1072928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092952">SUSE bug 1092952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093095">SUSE bug 1093095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095070">SUSE bug 1095070</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11591/">CVE-2017-11591 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11591">CVE-2017-11591 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11683/">CVE-2017-11683 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11683">CVE-2017-11683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14859/">CVE-2017-14859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14859">CVE-2017-14859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14862/">CVE-2017-14862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14862">CVE-2017-14862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14864/">CVE-2017-14864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14864">CVE-2017-14864 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17669/">CVE-2017-17669 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17669">CVE-2017-17669 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10958/">CVE-2018-10958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10958">CVE-2018-10958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10998/">CVE-2018-10998 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10998">CVE-2018-10998 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11531/">CVE-2018-11531 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11531">CVE-2018-11531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520381" comment="libexiv2-12-0.23-12.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151906" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1099257" ref_url="https://bugzilla.suse.com/1099257" source="BUGZILLA"/>
		<reference ref_id="1113094" ref_url="https://bugzilla.suse.com/1113094" source="BUGZILLA"/>
		<reference ref_id="1113672" ref_url="https://bugzilla.suse.com/1113672" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12900" ref_url="https://www.suse.com/security/cve/CVE-2018-12900/" source="CVE"/>
		<reference ref_id="CVE-2018-18557" ref_url="https://www.suse.com/security/cve/CVE-2018-18557/" source="CVE"/>
		<reference ref_id="CVE-2018-18661" ref_url="https://www.suse.com/security/cve/CVE-2018-18661/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2018-12900: Fixed heap-based buffer overflow in the cpSeparateBufToContigBuf (bsc#1099257).                                                                                             
- CVE-2018-18661: Fixed NULL pointer dereference in the function LZWDecode in the file tif_lzw.c (bsc#1113672).                                                                               
- CVE-2018-18557: Fixed JBIG decode can lead to out-of-bounds write (bsc#1113094).

Non-security issues fixed:

- asan_build: build ASAN included
- debug_build: build more suitable for debugging
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-26"/>
	<updated date="2018-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099257">SUSE bug 1099257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113094">SUSE bug 1113094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113672">SUSE bug 1113672</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12900/">CVE-2018-12900 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12900">CVE-2018-12900 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18557/">CVE-2018-18557 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18557">CVE-2018-18557 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18661/">CVE-2018-18661 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18661">CVE-2018-18661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520382" comment="libtiff5-4.0.9-44.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520383" comment="libtiff5-32bit-4.0.9-44.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557275" comment="tiff-4.0.9-44.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151907" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1091396" ref_url="https://bugzilla.suse.com/1091396" source="BUGZILLA"/>
		<reference ref_id="1105010" ref_url="https://bugzilla.suse.com/1105010" source="BUGZILLA"/>
		<reference ref_id="964336" ref_url="https://bugzilla.suse.com/964336" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473/" source="CVE"/>
		<description>
This update for openssh fixes the following issues:

Following security issues have been fixed:

- CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. (bsc#1105010)

The following non-security issues were fixed:

- Stop leaking File descriptors (bsc#964336)
- sftp-client.c returns wrong error code upon failure [bsc#1091396]

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-26"/>
	<updated date="2018-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091396">SUSE bug 1091396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964336">SUSE bug 964336</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15473">CVE-2018-15473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520384" comment="openssh-7.2p2-74.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520385" comment="openssh-askpass-gnome-7.2p2-74.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530337" comment="openssh-fips-7.2p2-74.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520386" comment="openssh-helpers-7.2p2-74.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151908" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1116574" ref_url="https://bugzilla.suse.com/1116574" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<description>

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 35 (bsc#1116574):

* Consumability

  - IJ10515 AIX JAVA 7.1.3.10 GENERAL PROTECTION FAULT WHEN ATTEMPTING TO USE HEALTH CENTER API

* Class Libraries

  - IJ10934 CVE-2018-13785
  - IJ10935 CVE-2018-3136
  - IJ10895 CVE-2018-3139
  - IJ10932 CVE-2018-3149
  - IJ10894 CVE-2018-3180
  - IJ10933 CVE-2018-3214
  - IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
  - IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS NOT IDENTIFYING TRT
  - IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN 2GB ON AIX PLATFORM
  - IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS.

* Java Virtual Machine

  - IJ10931 CVE-2018-3169
  - IV91132 SOME CORE PATTERN SPECIFIERS ARE NOT HANDLED BY THE JVM ON LINUX

* JIT Compiler

  - IJ08205 CRASH WHILE COMPILING
  - IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND BIGDECIMAL.{FLOAT/DOUBLE }VALUE()

* ORB

  - IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION

* Security

  - IJ10492 'EC KEYSIZE &lt; 384' IS NOT HONORED USING THE 'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
  - IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER DOFINAL( ) AND INIT( )
  - IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO JKS KEYSTORE
  - IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH SECP521R1 SIGNATURE ON Z/OS
  - IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON Z/OS AND Z/LINUX
  - IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR THE RSA/ECB/PKCS1PADDING CIPHER
  - IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
  - IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’ IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS

* z/OS Extentions

  - PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING IBMJCEHYBRID
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-28"/>
	<updated date="2018-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13785">CVE-2018-13785 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3136">CVE-2018-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3139">CVE-2018-3139 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3149">CVE-2018-3149 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3169">CVE-2018-3169 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3180">CVE-2018-3180 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3214">CVE-2018-3214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530338" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530341" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151909" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1115929" ref_url="https://bugzilla.suse.com/1115929" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19211" ref_url="https://www.suse.com/security/cve/CVE-2018-19211/" source="CVE"/>
		<description>
This update for ncurses fixes the following issue:

Security issue fixed:

- CVE-2018-19211: Fixed denial of service issue that was triggered by a NULL pointer dereference at function _nc_parse_entry (bsc#1115929).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115929">SUSE bug 1115929</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19211/">CVE-2018-19211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19211">CVE-2018-19211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520387" comment="libncurses5-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520388" comment="libncurses5-32bit-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520389" comment="libncurses6-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520390" comment="libncurses6-32bit-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520391" comment="ncurses-devel-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557276" comment="ncurses-devel-32bit-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520392" comment="ncurses-utils-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520393" comment="tack-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520394" comment="terminfo-5.9-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520395" comment="terminfo-base-5.9-61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151910" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1057246" ref_url="https://bugzilla.suse.com/1057246" source="BUGZILLA"/>
		<reference ref_id="1113064" ref_url="https://bugzilla.suse.com/1113064" source="BUGZILLA"/>
		<reference ref_id="1117463" ref_url="https://bugzilla.suse.com/1117463" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18544" ref_url="https://www.suse.com/security/cve/CVE-2018-18544/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2018-18544: Fixed memory leak in the function WriteMSLImage (bsc#1113064).


Non-security issues fixed:

- Improve import documentation (bsc#1057246).
- Allow override system security policy (bsc#1117463).
- asan_build: build ASAN included
- debug_build: build more suitable for debugging
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-07"/>
	<updated date="2018-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1057246">SUSE bug 1057246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113064">SUSE bug 1113064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18544/">CVE-2018-18544 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18544">CVE-2018-18544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520398" comment="libMagickCore-6_Q16-1-6.8.8.1-71.93.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520400" comment="libMagickWand-6_Q16-1-6.8.8.1-71.93.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151911" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography, python-pyOpenSSL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1021578" ref_url="https://bugzilla.suse.com/1021578" source="BUGZILLA"/>
		<reference ref_id="1111634" ref_url="https://bugzilla.suse.com/1111634" source="BUGZILLA"/>
		<reference ref_id="1111635" ref_url="https://bugzilla.suse.com/1111635" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000807" ref_url="https://www.suse.com/security/cve/CVE-2018-1000807/" source="CVE"/>
		<reference ref_id="CVE-2018-1000808" ref_url="https://www.suse.com/security/cve/CVE-2018-1000808/" source="CVE"/>
		<description>

This update for python-cryptography, python-pyOpenSSL fixes the following issues:

Security issues fixed:

- CVE-2018-1000808: A memory leak due to missing reference checking in PKCS#12 store handling was fixed (bsc#1111634)
- CVE-2018-1000807: A use-after-free in X509 object handling was fixed (bsc#1111635)

- avoid bad interaction with python-cryptography package. (bsc#1021578)

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021578">SUSE bug 1021578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111634">SUSE bug 1111634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111635">SUSE bug 1111635</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000807/">CVE-2018-1000807 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000807">CVE-2018-1000807 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000808/">CVE-2018-1000808 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000808">CVE-2018-1000808 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520401" comment="python-cryptography-1.3.1-7.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520402" comment="python-pyOpenSSL-16.0.0-4.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520403" comment="python-setuptools-18.0.1-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521791" comment="python3-cryptography-1.3.1-7.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521792" comment="python3-pyOpenSSL-16.0.0-4.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520404" comment="python3-setuptools-18.0.1-4.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151912" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1116574" ref_url="https://bugzilla.suse.com/1116574" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<description>

java-1_8_0-ibm was updated to Java 8.0 Service Refresh 5 Fix Pack 25 (bsc#1116574)

* Class Libraries:

  - IJ10934 CVE-2018-13785
  - IJ10935 CVE-2018-3136
  - IJ10895 CVE-2018-3139
  - IJ10932 CVE-2018-3149
  - IJ10894 CVE-2018-3180
  - IJ10930 CVE-2018-3183
  - IJ10933 CVE-2018-3214
  - IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
  - IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS NOT IDENTIFYING TRT
  - IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS.
  - IJ10566 SUPPORT EBCDIC CODE PAGE IBM-274 – BELGIUM EBCDIC

* Java Virtual Machine

  - IJ08730 APPLICATION SIGNAL HANDLER NOT INVOKED FOR SIGABRT
  - IJ10453 ASSERTION FAILURE AT CLASSPATHITEM.CPP
  - IJ09574 CLASSLOADER DEFINED THROUGH SYSTEM PROPERTY ‘JAVA.SYSTEM.CLASS.LOADE R’ IS NOT HONORED.
  - IJ10931 CVE-2018-3169
  - IJ10618 GPU SORT: UNSPECIFIED LAUNCH FAILURE
  - IJ10619 INCORRECT ILLEGALARGUMENTEXCEPTION BECAUSE OBJECT IS NOT AN INSTANCE OF DECLARING CLASS ON REFLECTIVE INVOCATION
  - IJ10135 JVM HUNG IN GARBAGECOLLECTORMXBEAN.G ETLASTGCINFO() API
  - IJ10680 RECURRENT ABORTED SCAVENGE

* ORB

  - IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION

* Reliability and Serviceability

  - IJ09600 DTFJ AND JDMPVIEW FAIL TO PARSE WIDE REGISTER VALUES

* Security

  - IJ10492 'EC KEYSIZE &lt; 384' IS NOT HONORED USING THE 'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
  - IJ10310 ADD NULL CHECKING ON THE ENCRYPTION TYPES LIST TO CREDENTIALS.GETDEFAULTNA TIVECREDS() METHOD
  - IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER DOFINAL( ) AND INIT( )
  - IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO JKS KEYSTORE
  - IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH SECP521R1 SIGNATURE ON Z/OS
  - IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON Z/OS AND Z/LINUX
  - IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR THE RSA/ECB/PKCS1PADDING CIPHER
  - IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
  - IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’ IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS

* z/OS Extentions

  - PH03889 ADD SUPPORT FOR TRY-WITH-RESOURCES TO COM.IBM.JZOS.ENQUEUE
  - PH03414 ROLLOVER FROM SYE TO SAE FOR ICSF REASON CODE 3059
  - PH04008 ZERTJSSE – Z SYSTEMS ENCRYPTION READINESS TOOL (ZERT) NEW SUPPORT IN THE Z/OS JAVA SDK

This includes the update to Java 8.0 Service Refresh 5 Fix Pack 22:

* Java Virtual Machine

  - IJ09139 CUDA4J NOT AVAILABLE ON ALL PLATFORMS

* JIT Compiler

  - IJ09089 CRASH DURING COMPILATION IN USEREGISTER ON X86-32
  - IJ08655 FLOATING POINT ERROR (SIGFPE) IN ZJ9SYM1 OR ANY VM/JIT MODULE ON AN INSTRUCTION FOLLOWING A VECTOR INSTRUCTION
  - IJ08850 CRASH IN ARRAYLIST$ITR.NEXT()
  - IJ09601 JVM CRASHES ON A SIGBUS SIGNAL WHEN ACCESSING A DIRECTBYTEBUFFER

* z/OS Extentions

  - PH02999 JZOS data management classes accept dataset names in code pages supported by z/OS system services
  - PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING IBMJCEHYBRID

Also the update to Java 8.0 Service Refresh 5 Fix Pack 21

* Class Libraries

  - IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN 2GB ON AIX PLATFORM
  - IJ08570 JAVA.LANG.UNSATISFIEDLIN KERROR WITH JAVA OPTION -DSUN.JAVA2D.CMM=SUN.JAV A2D.CMM.KCMS.KCMSSERVICE PROVIDER ON AIX PLATFORM

* Java Virtual Machine

  - IJ08001 30% THROUGHPUT DROP FOR CERTAIN SYNCHRONIZATION WORKLOADS
  - IJ07997 TRACEASSERT IN GARBAGE COLLECTOR(MEMORYSUBSPACE)

* JIT Compiler

  - IJ08503 ASSERTION IS HIT DUE TO UNEXPECTED STACK HEIGHT IN DEBUGGING MODE
  - IJ08375 CRASH DURING HARDWARE GENERATED GUARDED STORAGE EVENT WITHIN A TRANSACTIONAL EXECUTION REGION WHEN RUNNING WITH -XGC:CONCURRENTS
  - IJ08205 CRASH WHILE COMPILING
  - IJ09575 INCORRECT RESULT WHEN USING JAVA.LANG.MATH.MIN OR MAX ON 31-BIT JVM
  - IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND BIGDECIMAL.{FLOAT/DOUBLE }VALUE()
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13785">CVE-2018-13785 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3136">CVE-2018-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3139">CVE-2018-3139 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3149">CVE-2018-3149 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3169">CVE-2018-3169 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3180">CVE-2018-3180 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3183">CVE-2018-3183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3214">CVE-2018-3214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530343" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151913" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1108940" ref_url="https://bugzilla.suse.com/1108940" source="BUGZILLA"/>
		<reference ref_id="1114405" ref_url="https://bugzilla.suse.com/1114405" source="BUGZILLA"/>
		<reference ref_id="1114423" ref_url="https://bugzilla.suse.com/1114423" source="BUGZILLA"/>
		<reference ref_id="1115040" ref_url="https://bugzilla.suse.com/1115040" source="BUGZILLA"/>
		<reference ref_id="1115045" ref_url="https://bugzilla.suse.com/1115045" source="BUGZILLA"/>
		<reference ref_id="1115047" ref_url="https://bugzilla.suse.com/1115047" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="CVE-2018-18883" ref_url="https://www.suse.com/security/cve/CVE-2018-18883/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed:

- CVE-2018-18849: Fixed an out of bounds memory access issue was found in the LSI53C895A SCSI Host Bus Adapter emulation while writing a message in lsi_do_msgin (bsc#1114423).
- CVE-2018-18883: Fixed a NULL pointer dereference that could have been triggered by nested VT-x that where not properly restricted (XSA-278)(bsc#1114405).
- CVE-2018-19965: Fixed denial of service issue from attempting to use INVPCID with a non-canonical addresses (XSA-279)(bsc#1115045).
- CVE-2018-19966: Fixed issue introduced by XSA-240 that could have caused conflicts with shadow paging (XSA-280)(bsc#1115047).
- CVE-2018-19961 CVE-2018-19962: Fixed insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275)(bsc#1115040).

Non-security issues fixed:

- Added upstream bug fixes (bsc#1027519).
- Fixed XEN SLE12-SP1 domU hang on SLE12-SP3 HV (bsc#1108940).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-11"/>
	<updated date="2018-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108940">SUSE bug 1108940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114405">SUSE bug 1114405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114423">SUSE bug 1114423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18849">CVE-2018-18849 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18883/">CVE-2018-18883 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18883">CVE-2018-18883 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19961">CVE-2018-19961 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19962">CVE-2018-19962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19965">CVE-2018-19965 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19966">CVE-2018-19966 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520407" comment="xen-4.9.3_03-3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553506" comment="xen-doc-html-4.9.3_03-3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520408" comment="xen-libs-4.9.3_03-3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520409" comment="xen-libs-32bit-4.9.3_03-3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553507" comment="xen-tools-4.9.3_03-3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553508" comment="xen-tools-domU-4.9.3_03-3.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151914" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1109105" ref_url="https://bugzilla.suse.com/1109105" source="BUGZILLA"/>
		<reference ref_id="1111479" ref_url="https://bugzilla.suse.com/1111479" source="BUGZILLA"/>
		<reference ref_id="1111480" ref_url="https://bugzilla.suse.com/1111480" source="BUGZILLA"/>
		<reference ref_id="1112229" ref_url="https://bugzilla.suse.com/1112229" source="BUGZILLA"/>
		<reference ref_id="1117022" ref_url="https://bugzilla.suse.com/1117022" source="BUGZILLA"/>
		<reference ref_id="1117274" ref_url="https://bugzilla.suse.com/1117274" source="BUGZILLA"/>
		<reference ref_id="1117313" ref_url="https://bugzilla.suse.com/1117313" source="BUGZILLA"/>
		<reference ref_id="1117327" ref_url="https://bugzilla.suse.com/1117327" source="BUGZILLA"/>
		<reference ref_id="1117331" ref_url="https://bugzilla.suse.com/1117331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183/" source="CVE"/>
		<reference ref_id="CVE-2018-17961" ref_url="https://www.suse.com/security/cve/CVE-2018-17961/" source="CVE"/>
		<reference ref_id="CVE-2018-18073" ref_url="https://www.suse.com/security/cve/CVE-2018-18073/" source="CVE"/>
		<reference ref_id="CVE-2018-18284" ref_url="https://www.suse.com/security/cve/CVE-2018-18284/" source="CVE"/>
		<reference ref_id="CVE-2018-19409" ref_url="https://www.suse.com/security/cve/CVE-2018-19409/" source="CVE"/>
		<reference ref_id="CVE-2018-19475" ref_url="https://www.suse.com/security/cve/CVE-2018-19475/" source="CVE"/>
		<reference ref_id="CVE-2018-19476" ref_url="https://www.suse.com/security/cve/CVE-2018-19476/" source="CVE"/>
		<reference ref_id="CVE-2018-19477" ref_url="https://www.suse.com/security/cve/CVE-2018-19477/" source="CVE"/>
		<description>
This update for ghostscript to version 9.26 fixes the following issues:

Security issues fixed:

- CVE-2018-19475: Fixed bypass of an intended access restriction in psi/zdevice2.c (bsc#1117327)
- CVE-2018-19476: Fixed bypass of an intended access restriction in psi/zicc.c (bsc#1117313)
- CVE-2018-19477: Fixed bypass of an intended access restriction in psi/zfjbig2.c (bsc#1117274)
- CVE-2018-19409: Check if another device is used correctly in LockSafetyParams (bsc#1117022)
- CVE-2018-18284: Fixed potential sandbox escape through 1Policy operator (bsc#1112229)
- CVE-2018-18073: Fixed leaks through operator in saved execution stacks (bsc#1111480)
- CVE-2018-17961: Fixed a -dSAFER sandbox escape by bypassing executeonly (bsc#1111479)
- CVE-2018-17183: Fixed a potential code injection by specially crafted PostScript files (bsc#1109105)

Version update to 9.26 (bsc#1117331):

- Security issues have been the primary focus
- Minor bug fixes and improvements
- For release summary see: http://www.ghostscript.com/doc/9.26/News.htm
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117274">SUSE bug 1117274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117313">SUSE bug 1117313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117327">SUSE bug 1117327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17183">CVE-2018-17183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-17961/">CVE-2018-17961 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17961">CVE-2018-17961 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18073/">CVE-2018-18073 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18073">CVE-2018-18073 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18284/">CVE-2018-18284 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18284">CVE-2018-18284 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19409/">CVE-2018-19409 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19409">CVE-2018-19409 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19475/">CVE-2018-19475 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19475">CVE-2018-19475 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19476/">CVE-2018-19476 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19476">CVE-2018-19476 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19477/">CVE-2018-19477 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19477">CVE-2018-19477 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520410" comment="ghostscript-9.26-23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520411" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520412" comment="libspectre1-0.2.7-12.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151915" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1115750" ref_url="https://bugzilla.suse.com/1115750" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4700" ref_url="https://www.suse.com/security/cve/CVE-2018-4700/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

Security issue fixed:

- CVE-2018-4700: Fixed extremely predictable cookie generation that is effectively breaking the CSRF protection of the CUPS web interface (bsc#1115750).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115750">SUSE bug 1115750</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4700/">CVE-2018-4700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-4700">CVE-2018-4700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520413" comment="cups-1.7.5-20.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520414" comment="cups-client-1.7.5-20.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520415" comment="cups-libs-1.7.5-20.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520416" comment="cups-libs-32bit-1.7.5-20.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151916" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1110949" ref_url="https://bugzilla.suse.com/1110949" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17456" ref_url="https://www.suse.com/security/cve/CVE-2018-17456/" source="CVE"/>
		<description>
This update for git fixes the following issue:

- CVE-2018-17456: Git allowed remote code execution during processing of a recursive 'git clone' of a superproject if a .gitmodules file has a URL field beginning with a '-' character. (boo#1110949).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1110949">SUSE bug 1110949</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17456/">CVE-2018-17456 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17456">CVE-2018-17456 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530347" comment="git-core-2.12.3-27.17.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151917" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104467" ref_url="https://bugzilla.suse.com/1104467" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17204" ref_url="https://www.suse.com/security/cve/CVE-2018-17204/" source="CVE"/>
		<reference ref_id="CVE-2018-17205" ref_url="https://www.suse.com/security/cve/CVE-2018-17205/" source="CVE"/>
		<reference ref_id="CVE-2018-17206" ref_url="https://www.suse.com/security/cve/CVE-2018-17206/" source="CVE"/>
		<description>
This update for openvswitch to version 2.7.6 fixes the following issues:

These security issues were fixed:

- CVE-2018-17205: Prevent OVS crash when reverting old flows in bundle commit
  (bsc#1104467).
- CVE-2018-17206: Avoid buffer overread in BUNDLE action decoding
  (bsc#1104467).
- CVE-2018-17204:When decoding a group mod, it validated the group type and
  command after the whole group mod has been decoded. The OF1.5 decoder, however,
  tried to use the type and command earlier, when it might still be invalid. This
  caused an assertion failure (via OVS_NOT_REACHED) (bsc#1104467).

These non-security issues were fixed:

- ofproto/bond: Fix bond reconfiguration race condition.
- ofproto/bond: Fix bond post recirc rule leak.
- ofproto/bond: fix interal flow leak of tcp-balance bond
- systemd: Restart openvswitch service if a daemon crashes
- conntrack: Fix checks for TCP, UDP, and IPv6 header sizes.
- ofp-actions: Fix translation of set_field for nw_ecn
- netdev-dpdk: Fix mempool segfault.
- ofproto-dpif-upcall: Fix flow setup/delete race.
- learn: Fix memory leak in learn_parse_sepc()
- netdev-dpdk: fix mempool_configure error state
- vswitchd: Add --cleanup option to the 'appctl exit' command
- ofp-parse: Fix memory leak on error path in parse_ofp_group_mod_file().
- actions: Fix memory leak on error path in parse_ct_lb_action().
- dpif-netdev: Fix use-after-free error in reconfigure_datapath().
- bridge: Fix memory leak in bridge_aa_update_trunks().
- dpif-netlink: Fix multiple-free and fd leak on error path.
- ofp-print: Avoid array overread in print_table_instruction_features().
- flow: Fix buffer overread in flow_hash_symmetric_l3l4().
- systemd: start vswitchd after udev
- ofp-util: Check length of buckets in ofputil_pull_ofp15_group_mod().
- ovsdb-types: Fix memory leak on error path.
- tnl-ports: Fix loss of tunneling upon removal of a single tunnel port.
- netdev: check for NULL fields in netdev_get_addrs
- netdev-dpdk: vhost get stats fix.
- netdev-dpdk: use 64-bit arithmetic when converting rates.
- ofp-util: Fix buffer overread in ofputil_decode_bundle_add().
- ofp-util: Fix memory leaks on error cases in ofputil_decode_group_mod().
- ofp-util: Fix memory leaks when parsing OF1.5 group properties.
- ofp-actions: Fix buffer overread in decode_LEARN_specs().
- flow: Fix buffer overread for crafted IPv6 packets.
- ofp-actions: Properly interpret 'output:in_port'.
- ovs-ofctl: Avoid read overrun in ofperr_decode_msg().
- odp-util: Avoid misaligned references to ip6_hdr.
- ofproto-dpif-upcall: Fix action attr iteration.
- ofproto-dpif-upcall: Fix key attr iteration.
- netdev-dpdk: vhost get stats fix.
- netdev-dpdk: use 64-bit arithmetic when converting rates.
- ofp-util: Fix buffer overread in ofputil_decode_bundle_add().
- ofp-util: Fix memory leaks on error cases in ofputil_decode_group_mod().
- ofp-util: Fix memory leaks when parsing OF1.5 group properties.
- odp-util: Fix buffer overread in parsing string form of ODP flows.
- ovs-vsctl: Fix segfault when attempting to del-port from parent bridge.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104467">SUSE bug 1104467</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17204/">CVE-2018-17204 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17204">CVE-2018-17204 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17205/">CVE-2018-17205 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17205">CVE-2018-17205 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17206/">CVE-2018-17206 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17206">CVE-2018-17206 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557277" comment="openvswitch-2.7.6-3.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151918" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1100408" ref_url="https://bugzilla.suse.com/1100408" source="BUGZILLA"/>
		<reference ref_id="1106222" ref_url="https://bugzilla.suse.com/1106222" source="BUGZILLA"/>
		<reference ref_id="1110910" ref_url="https://bugzilla.suse.com/1110910" source="BUGZILLA"/>
		<reference ref_id="1111006" ref_url="https://bugzilla.suse.com/1111006" source="BUGZILLA"/>
		<reference ref_id="1111010" ref_url="https://bugzilla.suse.com/1111010" source="BUGZILLA"/>
		<reference ref_id="1111013" ref_url="https://bugzilla.suse.com/1111013" source="BUGZILLA"/>
		<reference ref_id="1114422" ref_url="https://bugzilla.suse.com/1114422" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2018-10839: Fixed NE2000 NIC emulation support that is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS (bsc#1110910).
- CVE-2018-15746: Fixed qemu-seccomp.c that might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread (bsc#1106222).
- CVE-2018-17958: Fixed a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used (bsc#1111006).
- CVE-2018-17962: Fixed a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used (bsc#1111010).
- CVE-2018-17963: Fixed qemu_deliver_packet_iov in net/net.c that accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111013)
- CVE-2018-18849: Fixed an out of bounds memory access issue that was found in the LSI53C895A SCSI Host Bus Adapter emulation while writing a message in lsi_do_msgin. It could occur during migration if the 'msg_len' field has an invalid value. A user/process could use this flaw to crash the Qemu process resulting in DoS (bsc#1114422).

Non-security issues fixed:

- Improving disk performance for qemu on xen (bsc#1100408)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100408">SUSE bug 1100408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106222">SUSE bug 1106222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110910">SUSE bug 1110910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111006">SUSE bug 1111006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111010">SUSE bug 1111010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111013">SUSE bug 1111013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114422">SUSE bug 1114422</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10839">CVE-2018-10839 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15746">CVE-2018-15746 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17958">CVE-2018-17958 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17962">CVE-2018-17962 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17963">CVE-2018-17963 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18849">CVE-2018-18849 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520417" comment="qemu-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520418" comment="qemu-block-curl-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557278" comment="qemu-block-iscsi-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557279" comment="qemu-block-rbd-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557280" comment="qemu-block-ssh-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557281" comment="qemu-guest-agent-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520419" comment="qemu-ipxe-1.0.0+-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520420" comment="qemu-kvm-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557282" comment="qemu-lang-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520421" comment="qemu-seabios-1.10.2-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520422" comment="qemu-sgabios-8-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520423" comment="qemu-tools-2.9.1-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520424" comment="qemu-vgabios-1.10.2-6.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520425" comment="qemu-x86-2.9.1-6.22.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151919" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1117267" ref_url="https://bugzilla.suse.com/1117267" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19519" ref_url="https://www.suse.com/security/cve/CVE-2018-19519/" source="CVE"/>
		<description>
This update for tcpdump fixes the following issues:

Security issues fixed:

- CVE-2018-19519: Fixed a stack-based buffer over-read in the print_prefix function (bsc#1117267)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-17"/>
	<updated date="2018-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117267">SUSE bug 1117267</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19519/">CVE-2018-19519 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19519">CVE-2018-19519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520426" comment="tcpdump-4.9.2-14.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151920" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1073313" ref_url="https://bugzilla.suse.com/1073313" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17740" ref_url="https://www.suse.com/security/cve/CVE-2017-17740/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

Security issue fixed:

- CVE-2017-17740: When both the nops module and the memberof overlay
  are enabled, attempts to free a buffer that was allocated on the stack,
  which allows remote attackers to cause a denial of service (slapd crash)
  via a member MODDN operation.  (bsc#1073313)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-17"/>
	<updated date="2018-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1073313">SUSE bug 1073313</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17740/">CVE-2017-17740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17740">CVE-2017-17740 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520427" comment="libldap-2_4-2-2.4.41-18.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520428" comment="libldap-2_4-2-32bit-2.4.41-18.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557283" comment="openldap2-2.4.41-18.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557284" comment="openldap2-back-meta-2.4.41-18.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520429" comment="openldap2-client-2.4.41-18.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151921" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1118595" ref_url="https://bugzilla.suse.com/1118595" source="BUGZILLA"/>
		<reference ref_id="1118596" ref_url="https://bugzilla.suse.com/1118596" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15518" ref_url="https://www.suse.com/security/cve/CVE-2018-15518/" source="CVE"/>
		<reference ref_id="CVE-2018-19873" ref_url="https://www.suse.com/security/cve/CVE-2018-19873/" source="CVE"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

Security issues fixed:

- CVE-2018-15518: Fixed double free in QXmlStreamReader (bsc#1118595)
- CVE-2018-19873: Fixed Denial of Service on malformed BMP file in QBmpHandler (bsc#1118596)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-18"/>
	<updated date="2018-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118595">SUSE bug 1118595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118596">SUSE bug 1118596</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15518/">CVE-2018-15518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15518">CVE-2018-15518 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19873/">CVE-2018-19873 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19873">CVE-2018-19873 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520430" comment="libQt5Concurrent5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520431" comment="libQt5Core5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520432" comment="libQt5DBus5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520433" comment="libQt5Gui5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520434" comment="libQt5Network5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520435" comment="libQt5OpenGL5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520436" comment="libQt5PrintSupport5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520437" comment="libQt5Sql5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520438" comment="libQt5Sql5-mysql-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520439" comment="libQt5Sql5-postgresql-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520440" comment="libQt5Sql5-sqlite-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520441" comment="libQt5Sql5-unixODBC-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520442" comment="libQt5Test5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520443" comment="libQt5Widgets5-5.6.2-6.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520444" comment="libQt5Xml5-5.6.2-6.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151922" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1013721" ref_url="https://bugzilla.suse.com/1013721" source="BUGZILLA"/>
		<reference ref_id="1013732" ref_url="https://bugzilla.suse.com/1013732" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9800" ref_url="https://www.suse.com/security/cve/CVE-2016-9800/" source="CVE"/>
		<reference ref_id="CVE-2016-9801" ref_url="https://www.suse.com/security/cve/CVE-2016-9801/" source="CVE"/>
		<description>
This update for bluez fixes the following issues:

Security issues fixed:

- CVE-2016-9800: Fixed a buffer overflow in the pin_code_reply_dump function (bsc#1013721)
- CVE-2016-9801: Fixed a buffer overflow in the set_ext_ctrl function (bsc#1013732)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-19"/>
	<updated date="2018-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013721">SUSE bug 1013721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013732">SUSE bug 1013732</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9800/">CVE-2016-9800 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9800">CVE-2016-9800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9801/">CVE-2016-9801 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9801">CVE-2016-9801 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520445" comment="bluez-5.13-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520447" comment="libbluetooth3-5.13-5.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151923" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1017693" ref_url="https://bugzilla.suse.com/1017693" source="BUGZILLA"/>
		<reference ref_id="1054594" ref_url="https://bugzilla.suse.com/1054594" source="BUGZILLA"/>
		<reference ref_id="1115717" ref_url="https://bugzilla.suse.com/1115717" source="BUGZILLA"/>
		<reference ref_id="990460" ref_url="https://bugzilla.suse.com/990460" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10092" ref_url="https://www.suse.com/security/cve/CVE-2016-10092/" source="CVE"/>
		<reference ref_id="CVE-2016-10093" ref_url="https://www.suse.com/security/cve/CVE-2016-10093/" source="CVE"/>
		<reference ref_id="CVE-2016-10094" ref_url="https://www.suse.com/security/cve/CVE-2016-10094/" source="CVE"/>
		<reference ref_id="CVE-2016-6223" ref_url="https://www.suse.com/security/cve/CVE-2016-6223/" source="CVE"/>
		<reference ref_id="CVE-2017-12944" ref_url="https://www.suse.com/security/cve/CVE-2017-12944/" source="CVE"/>
		<reference ref_id="CVE-2018-19210" ref_url="https://www.suse.com/security/cve/CVE-2018-19210/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:                                   
    
- CVE-2018-19210: Fixed NULL pointer dereference in the TIFFWriteDirectorySec function (bsc#1115717).
- CVE-2017-12944: Fixed denial of service issue in the TIFFReadDirEntryArray function (bsc#1054594).
- CVE-2016-10094: Fixed heap-based buffer overflow in the _tiffWriteProc function (bsc#1017693).
- CVE-2016-10093: Fixed heap-based buffer overflow in the _TIFFmemcpy function (bsc#1017693).
- CVE-2016-10092: Fixed heap-based buffer overflow in the TIFFReverseBits function (bsc#1017693).
- CVE-2016-6223: Fixed out-of-bounds read on memory-mapped files in TIFFReadRawStrip1() and TIFFReadRawTile1() (bsc#990460).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-19"/>
	<updated date="2018-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054594">SUSE bug 1054594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115717">SUSE bug 1115717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990460">SUSE bug 990460</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10092/">CVE-2016-10092 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10092">CVE-2016-10092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10093/">CVE-2016-10093 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10093">CVE-2016-10093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10094/">CVE-2016-10094 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10094">CVE-2016-10094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6223/">CVE-2016-6223 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6223">CVE-2016-6223 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12944/">CVE-2017-12944 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12944">CVE-2017-12944 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19210/">CVE-2018-19210 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19210">CVE-2018-19210 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520448" comment="libtiff5-4.0.9-44.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520449" comment="libtiff5-32bit-4.0.9-44.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557285" comment="tiff-4.0.9-44.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151924" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1115916" ref_url="https://bugzilla.suse.com/1115916" source="BUGZILLA"/>
		<reference ref_id="1115917" ref_url="https://bugzilla.suse.com/1115917" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5731" ref_url="https://www.suse.com/security/cve/CVE-2017-5731/" source="CVE"/>
		<reference ref_id="CVE-2017-5732" ref_url="https://www.suse.com/security/cve/CVE-2017-5732/" source="CVE"/>
		<reference ref_id="CVE-2017-5733" ref_url="https://www.suse.com/security/cve/CVE-2017-5733/" source="CVE"/>
		<reference ref_id="CVE-2017-5734" ref_url="https://www.suse.com/security/cve/CVE-2017-5734/" source="CVE"/>
		<reference ref_id="CVE-2017-5735" ref_url="https://www.suse.com/security/cve/CVE-2017-5735/" source="CVE"/>
		<reference ref_id="CVE-2018-3613" ref_url="https://www.suse.com/security/cve/CVE-2018-3613/" source="CVE"/>
		<description>
This update for ovmf fixes the following issues:

Security issues fixed:

- CVE-2018-3613: Fixed AuthVariable Timestamp zeroing issue on APPEND_WRITE (bsc#1115916).
- CVE-2017-5731: Fixed privilege escalation via processing of malformed files in TianoCompress.c (bsc#1115917).
- CVE-2017-5732: Fixed privilege escalation via processing of malformed files in BaseUefiDecompressLib.c (bsc#1115917).
- CVE-2017-5733: Fixed privilege escalation via heap-based buffer overflow in MakeTable() function (bsc#1115917).
- CVE-2017-5734: Fixed privilege escalation via stack-based buffer overflow in MakeTable() function (bsc#1115917).
- CVE-2017-5735: Fixed privilege escalation via heap-based buffer overflow in Decode() function (bsc#1115917).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-20"/>
	<updated date="2018-12-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1115916">SUSE bug 1115916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115917">SUSE bug 1115917</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5731/">CVE-2017-5731 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5731">CVE-2017-5731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5732/">CVE-2017-5732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5732">CVE-2017-5732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5733/">CVE-2017-5733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5733">CVE-2017-5733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5734/">CVE-2017-5734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5734">CVE-2017-5734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5735/">CVE-2017-5735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5735">CVE-2017-5735 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3613/">CVE-2018-3613 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3613">CVE-2018-3613 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557286" comment="ovmf-2017+git1492060560.b6d11d7c46-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557287" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553557" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151925" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr and mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1097410" ref_url="https://bugzilla.suse.com/1097410" source="BUGZILLA"/>
		<reference ref_id="1106873" ref_url="https://bugzilla.suse.com/1106873" source="BUGZILLA"/>
		<reference ref_id="1119069" ref_url="https://bugzilla.suse.com/1119069" source="BUGZILLA"/>
		<reference ref_id="1119105" ref_url="https://bugzilla.suse.com/1119105" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="CVE-2018-12384" ref_url="https://www.suse.com/security/cve/CVE-2018-12384/" source="CVE"/>
		<reference ref_id="CVE-2018-12404" ref_url="https://www.suse.com/security/cve/CVE-2018-12404/" source="CVE"/>
		<reference ref_id="CVE-2018-12405" ref_url="https://www.suse.com/security/cve/CVE-2018-12405/" source="CVE"/>
		<reference ref_id="CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466/" source="CVE"/>
		<reference ref_id="CVE-2018-18492" ref_url="https://www.suse.com/security/cve/CVE-2018-18492/" source="CVE"/>
		<reference ref_id="CVE-2018-18493" ref_url="https://www.suse.com/security/cve/CVE-2018-18493/" source="CVE"/>
		<reference ref_id="CVE-2018-18494" ref_url="https://www.suse.com/security/cve/CVE-2018-18494/" source="CVE"/>
		<reference ref_id="CVE-2018-18498" ref_url="https://www.suse.com/security/cve/CVE-2018-18498/" source="CVE"/>
		<description>
This update for MozillaFirefox, mozilla-nss and mozilla-nspr fixes the following issues:

Issues fixed in MozillaFirefox:

- Update to Firefox ESR 60.4 (bsc#1119105)
- CVE-2018-17466: Fixed a buffer overflow and out-of-bounds read in ANGLE library with TextureStorage11
- CVE-2018-18492: Fixed a use-after-free with select element
- CVE-2018-18493: Fixed a buffer overflow in accelerated 2D canvas with Skia
- CVE-2018-18494: Fixed a Same-origin policy violation using location attribute and performance.getEntries
  to steal cross-origin URLs
- CVE-2018-18498: Fixed a integer overflow when calculating buffer sizes for images
- CVE-2018-12405: Fixed a few memory safety bugs

Issues fixed in mozilla-nss:

- Update to NSS 3.40.1 (bsc#1119105)
- CVE-2018-12404: Fixed a cache side-channel variant of the Bleichenbacher attack (bsc#1119069)
- CVE-2018-12384: Fixed an issue in the SSL handshake. NSS responded to an
  SSLv2-compatible ClientHello with a ServerHello that had an all-zero random. (bsc#1106873)
- CVE-2018-0495: Fixed a memory-cache side-channel attack with ECDSA signatures (bsc#1097410)
- Fixed a decryption failure during FFDHE key exchange
- Various security fixes in the ASN.1 code

Issues fixed in mozilla-nspr:

- Update mozilla-nspr to 4.20 (bsc#1119105)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-21"/>
	<updated date="2018-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097410">SUSE bug 1097410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106873">SUSE bug 1106873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119069">SUSE bug 1119069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0495">CVE-2018-0495 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12384/">CVE-2018-12384 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12384">CVE-2018-12384 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12404/">CVE-2018-12404 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12404">CVE-2018-12404 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12405/">CVE-2018-12405 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12405">CVE-2018-12405 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17466">CVE-2018-17466 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18492/">CVE-2018-18492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18492">CVE-2018-18492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18493/">CVE-2018-18493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18493">CVE-2018-18493 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18494/">CVE-2018-18494 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18494">CVE-2018-18494 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18498/">CVE-2018-18498 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18498">CVE-2018-18498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151926" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1077358" ref_url="https://bugzilla.suse.com/1077358" source="BUGZILLA"/>
		<reference ref_id="1099510" ref_url="https://bugzilla.suse.com/1099510" source="BUGZILLA"/>
		<reference ref_id="1101288" ref_url="https://bugzilla.suse.com/1101288" source="BUGZILLA"/>
		<reference ref_id="925502" ref_url="https://bugzilla.suse.com/925502" source="BUGZILLA"/>
		<reference ref_id="995352" ref_url="https://bugzilla.suse.com/995352" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2775" ref_url="https://www.suse.com/security/cve/CVE-2015-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<reference ref_id="CVE-2018-0618" ref_url="https://www.suse.com/security/cve/CVE-2018-0618/" source="CVE"/>
		<reference ref_id="CVE-2018-13796" ref_url="https://www.suse.com/security/cve/CVE-2018-13796/" source="CVE"/>
		<reference ref_id="CVE-2018-5950" ref_url="https://www.suse.com/security/cve/CVE-2018-5950/" source="CVE"/>
		<description>
This update for mailman fixes the following security vulnerabilities:

- Fixed a XSS vulnerability and information leak in user options CGI, which
  could be used to execute arbitrary scripts in the user's browser via
  specially encoded URLs (bsc#1077358 CVE-2018-5950)
- Fixed a directory traversal vulnerability in MTA transports when using the
  recommended Mailman Transport for Exim (bsc#925502 CVE-2015-2775)
- Fixed a XSS vulnerability, which allowed malicious listowners to inject
  scripts into the listinfo pages (bsc#1099510 CVE-2018-0618)
- Fixed arbitrary text injection vulnerability in several mailman CGIs
  (CVE-2018-13796 bsc#1101288)
- Fixed a CSRF vulnerability on the user options page (CVE-2016-6893 bsc#995352)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-28"/>
	<updated date="2018-12-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077358">SUSE bug 1077358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099510">SUSE bug 1099510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101288">SUSE bug 1101288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925502">SUSE bug 925502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995352">SUSE bug 995352</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-2775/">CVE-2015-2775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2775">CVE-2015-2775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6893">CVE-2016-6893 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0618/">CVE-2018-0618 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0618">CVE-2018-0618 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13796/">CVE-2018-13796 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13796">CVE-2018-13796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5950/">CVE-2018-5950 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5950">CVE-2018-5950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530378" comment="mailman-2.1.17-3.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151927" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1117740" ref_url="https://bugzilla.suse.com/1117740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19622" ref_url="https://www.suse.com/security/cve/CVE-2018-19622/" source="CVE"/>
		<reference ref_id="CVE-2018-19623" ref_url="https://www.suse.com/security/cve/CVE-2018-19623/" source="CVE"/>
		<reference ref_id="CVE-2018-19624" ref_url="https://www.suse.com/security/cve/CVE-2018-19624/" source="CVE"/>
		<reference ref_id="CVE-2018-19625" ref_url="https://www.suse.com/security/cve/CVE-2018-19625/" source="CVE"/>
		<reference ref_id="CVE-2018-19626" ref_url="https://www.suse.com/security/cve/CVE-2018-19626/" source="CVE"/>
		<reference ref_id="CVE-2018-19627" ref_url="https://www.suse.com/security/cve/CVE-2018-19627/" source="CVE"/>
		<description>
This update for wireshark fixes the following issues:

Update to Wireshark 2.4.11 (bsc#1117740).

Security issues fixed:

- CVE-2018-19625: The Wireshark dissection engine could crash (wnpa-sec-2018-51)
- CVE-2018-19626: The DCOM dissector could crash (wnpa-sec-2018-52)
- CVE-2018-19623: The LBMPDM dissector could crash (wnpa-sec-2018-53) 
- CVE-2018-19622: The MMSE dissector could go into an infinite loop (wnpa-sec-2018-54)
- CVE-2018-19627: The IxVeriWave file parser could crash (wnpa-sec-2018-55) 
- CVE-2018-19624: The PVFS dissector could crash (wnpa-sec-2018-56)

Further bug fixes and updated protocol support as listed in:

- https://www.wireshark.org/docs/relnotes/wireshark-2.4.11.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-28"/>
	<updated date="2018-12-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117740">SUSE bug 1117740</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19622/">CVE-2018-19622 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19622">CVE-2018-19622 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19623/">CVE-2018-19623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19623">CVE-2018-19623 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19624/">CVE-2018-19624 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19624">CVE-2018-19624 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19625/">CVE-2018-19625 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19625">CVE-2018-19625 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19626/">CVE-2018-19626 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19626">CVE-2018-19626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19627/">CVE-2018-19627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19627">CVE-2018-19627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520519" comment="libwireshark9-2.4.11-48.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520520" comment="libwiretap7-2.4.11-48.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520521" comment="libwscodecs1-2.4.11-48.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520522" comment="libwsutil8-2.4.11-48.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520523" comment="wireshark-2.4.11-48.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520524" comment="wireshark-gtk-2.4.11-48.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151928" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1126768" ref_url="https://bugzilla.suse.com/1126768" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8375" ref_url="https://www.suse.com/security/cve/CVE-2019-8375/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Security issue fixed: 

- CVE-2019-8375: Fixed an issue in UIProcess subsystem which could allow the script dialog
  size to exceed the web view size leading to Buffer Overflow or other unspecified impact (bsc#1126768).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126768">SUSE bug 1126768</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8375/">CVE-2019-8375 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8375">CVE-2019-8375 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521027" comment="libjavascriptcoregtk-4_0-18-2.24.0-2.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521028" comment="libwebkit2gtk-4_0-37-2.24.0-2.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521030" comment="typelib-1_0-JavaScriptCore-4_0-2.24.0-2.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521031" comment="typelib-1_0-WebKit2-4_0-2.24.0-2.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521032" comment="webkit2gtk-4_0-injected-bundles-2.24.0-2.38.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151929" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1106996" ref_url="https://bugzilla.suse.com/1106996" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1120381" ref_url="https://bugzilla.suse.com/1120381" source="BUGZILLA"/>
		<reference ref_id="1122033" ref_url="https://bugzilla.suse.com/1122033" source="BUGZILLA"/>
		<reference ref_id="1124365" ref_url="https://bugzilla.suse.com/1124365" source="BUGZILLA"/>
		<reference ref_id="1124366" ref_url="https://bugzilla.suse.com/1124366" source="BUGZILLA"/>
		<reference ref_id="1124368" ref_url="https://bugzilla.suse.com/1124368" source="BUGZILLA"/>
		<reference ref_id="1128649" ref_url="https://bugzilla.suse.com/1128649" source="BUGZILLA"/>
		<reference ref_id="1130330" ref_url="https://bugzilla.suse.com/1130330" source="BUGZILLA"/>
		<reference ref_id="1131317" ref_url="https://bugzilla.suse.com/1131317" source="BUGZILLA"/>
		<reference ref_id="1132053" ref_url="https://bugzilla.suse.com/1132053" source="BUGZILLA"/>
		<reference ref_id="1132054" ref_url="https://bugzilla.suse.com/1132054" source="BUGZILLA"/>
		<reference ref_id="1132060" ref_url="https://bugzilla.suse.com/1132060" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16412" ref_url="https://www.suse.com/security/cve/CVE-2018-16412/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467/" source="CVE"/>
		<reference ref_id="CVE-2019-10650" ref_url="https://www.suse.com/security/cve/CVE-2019-10650/" source="CVE"/>
		<reference ref_id="CVE-2019-11007" ref_url="https://www.suse.com/security/cve/CVE-2019-11007/" source="CVE"/>
		<reference ref_id="CVE-2019-11008" ref_url="https://www.suse.com/security/cve/CVE-2019-11008/" source="CVE"/>
		<reference ref_id="CVE-2019-11009" ref_url="https://www.suse.com/security/cve/CVE-2019-11009/" source="CVE"/>
		<reference ref_id="CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175/" source="CVE"/>
		<reference ref_id="CVE-2019-7395" ref_url="https://www.suse.com/security/cve/CVE-2019-7395/" source="CVE"/>
		<reference ref_id="CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<reference ref_id="CVE-2019-9956" ref_url="https://www.suse.com/security/cve/CVE-2019-9956/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-9956: Fixed a stack-based buffer overflow in PopHexPixel() (bsc#1130330).
- CVE-2019-10650: Fixed a heap-based buffer over-read in WriteTIFFImage() (bsc#1131317).
- CVE-2019-7175: Fixed multiple memory leaks in DecodeImage function (bsc#1128649).
- CVE-2018-20467: Fixed infinite loop in coders/bmp.c (bsc#1120381).
- CVE-2019-7398: Fixed a memory leak in the function WriteDIBImage (bsc#1124365).
- CVE-2019-7397: Fixed a memory leak in the function WritePDFImage (bsc#1124366).
- CVE-2019-7395: Fixed a memory leak in the function WritePSDChannel (bsc#1124368).
- CVE-2018-16413: Fixed a heap-based buffer over-read in PushShortPixel() (bsc#1106989).
- CVE-2018-16412: Fixed a heap-based buffer over-read in ParseImageResourceBlocks() (bsc#1106996).
- CVE-2018-16644: Fixed a regression in dcm coder (bsc#1107609).
- CVE-2019-11007: Fixed a heap-based buffer overflow in ReadMNGImage() (bsc#1132060).
- CVE-2019-11008: Fixed a heap-based buffer overflow in WriteXWDImage() (bsc#1132054).
- CVE-2019-11009: Fixed a heap-based buffer over-read in ReadXWDImage() (bsc#1132053).

- Added extra -config- packages with Postscript/EPS/PDF readers still enabled.

  Removing the PS decoders is used to harden ImageMagick against security issues within
  ghostscript. Enabling them might impact security. (bsc#1122033)

  These are two packages that can be selected:

  - ImageMagick-config-6-SUSE: This has the PS decoders disabled.
  - ImageMagick-config-6-upstream: This has the PS decoders enabled.

  Depending on your local needs install either one of them. The default is the -SUSE configuration.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120381">SUSE bug 1120381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122033">SUSE bug 1122033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124365">SUSE bug 1124365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124366">SUSE bug 1124366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124368">SUSE bug 1124368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128649">SUSE bug 1128649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130330">SUSE bug 1130330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131317">SUSE bug 1131317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132053">SUSE bug 1132053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132054">SUSE bug 1132054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132060">SUSE bug 1132060</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16412/">CVE-2018-16412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16412">CVE-2018-16412 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16413">CVE-2018-16413 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16644">CVE-2018-16644 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20467">CVE-2018-20467 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10650/">CVE-2019-10650 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10650">CVE-2019-10650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11007/">CVE-2019-11007 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11007">CVE-2019-11007 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11008/">CVE-2019-11008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11008">CVE-2019-11008 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11009/">CVE-2019-11009 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11009">CVE-2019-11009 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7175">CVE-2019-7175 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7395/">CVE-2019-7395 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7395">CVE-2019-7395 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7397">CVE-2019-7397 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7398">CVE-2019-7398 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9956/">CVE-2019-9956 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9956">CVE-2019-9956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151930" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1099590" ref_url="https://bugzilla.suse.com/1099590" source="BUGZILLA"/>
		<reference ref_id="1123755" ref_url="https://bugzilla.suse.com/1123755" source="BUGZILLA"/>
		<reference ref_id="1124223" ref_url="https://bugzilla.suse.com/1124223" source="BUGZILLA"/>
		<reference ref_id="1127153" ref_url="https://bugzilla.suse.com/1127153" source="BUGZILLA"/>
		<reference ref_id="1131060" ref_url="https://bugzilla.suse.com/1131060" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

Security issue fixed:

- CVE-2019-3880: Fixed a path/symlink traversal vulnerability, which allowed an unprivileged user to save registry files outside a share (bsc#1131060).

Non-security issues fixed:

- Fix vfs_ceph ftruncate and fallocate handling (bsc#1127153).
- Abide by load_printers smb.conf parameter (bsc#1124223).
- s3:winbindd: let normalize_name_map() call find_domain_from_name_noinit() (bsc#1123755).
- s3:passdb: Do not return OK if we don't have pinfo set up (bsc#1099590).
- s3:winbind: Fix regression (bsc#1123755).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099590">SUSE bug 1099590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123755">SUSE bug 1123755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124223">SUSE bug 1124223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127153">SUSE bug 1127153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3880">CVE-2019-3880 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521040" comment="libdcerpc-binding0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521041" comment="libdcerpc-binding0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521042" comment="libdcerpc0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521043" comment="libdcerpc0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521044" comment="libndr-krb5pac0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521045" comment="libndr-krb5pac0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521046" comment="libndr-nbt0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521047" comment="libndr-nbt0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521048" comment="libndr-standard0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521049" comment="libndr-standard0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521050" comment="libndr0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521051" comment="libndr0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521052" comment="libnetapi0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521053" comment="libnetapi0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521054" comment="libsamba-credentials0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521055" comment="libsamba-credentials0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521056" comment="libsamba-errors0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521057" comment="libsamba-errors0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521058" comment="libsamba-hostconfig0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521059" comment="libsamba-hostconfig0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521060" comment="libsamba-passdb0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521061" comment="libsamba-passdb0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521062" comment="libsamba-util0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521063" comment="libsamba-util0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521064" comment="libsamdb0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521065" comment="libsamdb0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521066" comment="libsmbclient0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521067" comment="libsmbclient0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521068" comment="libsmbconf0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521069" comment="libsmbconf0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521070" comment="libsmbldap0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521071" comment="libsmbldap0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521072" comment="libtevent-util0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521073" comment="libtevent-util0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521074" comment="libwbclient0-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521075" comment="libwbclient0-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521076" comment="samba-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521077" comment="samba-client-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521078" comment="samba-client-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521079" comment="samba-doc-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521080" comment="samba-libs-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521081" comment="samba-libs-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521082" comment="samba-winbind-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521083" comment="samba-winbind-32bit-4.6.16+git.154.2998451b912-3.40.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151931" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1131945" ref_url="https://bugzilla.suse.com/1131945" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10894" ref_url="https://www.suse.com/security/cve/CVE-2019-10894/" source="CVE"/>
		<reference ref_id="CVE-2019-10895" ref_url="https://www.suse.com/security/cve/CVE-2019-10895/" source="CVE"/>
		<reference ref_id="CVE-2019-10896" ref_url="https://www.suse.com/security/cve/CVE-2019-10896/" source="CVE"/>
		<reference ref_id="CVE-2019-10899" ref_url="https://www.suse.com/security/cve/CVE-2019-10899/" source="CVE"/>
		<reference ref_id="CVE-2019-10901" ref_url="https://www.suse.com/security/cve/CVE-2019-10901/" source="CVE"/>
		<reference ref_id="CVE-2019-10903" ref_url="https://www.suse.com/security/cve/CVE-2019-10903/" source="CVE"/>
		<description>
This update for wireshark to version 2.4.14 fixes the following issues:

Security issues fixed:

- CVE-2019-10895: NetScaler file parser crash.
- CVE-2019-10899: SRVLOC dissector crash.
- CVE-2019-10894: GSS-API dissector crash.
- CVE-2019-10896: DOF dissector crash.
- CVE-2019-10901: LDSS dissector crash.
- CVE-2019-10903: DCERPC SPOOLSS dissector crash.

Non-security issue fixed:

- Update to version 2.4.14 (bsc#1131945).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1131945">SUSE bug 1131945</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10894/">CVE-2019-10894 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10894">CVE-2019-10894 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10895/">CVE-2019-10895 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10895">CVE-2019-10895 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10896/">CVE-2019-10896 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10896">CVE-2019-10896 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10899/">CVE-2019-10899 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10899">CVE-2019-10899 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10901/">CVE-2019-10901 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10901">CVE-2019-10901 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10903/">CVE-2019-10903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10903">CVE-2019-10903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521084" comment="libwireshark9-2.4.14-48.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521085" comment="libwiretap7-2.4.14-48.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521086" comment="libwscodecs1-2.4.14-48.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521087" comment="libwsutil8-2.4.14-48.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521088" comment="wireshark-2.4.14-48.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521089" comment="wireshark-gtk-2.4.14-48.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151932" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120813" ref_url="https://bugzilla.suse.com/1120813" source="BUGZILLA"/>
		<reference ref_id="1126325" ref_url="https://bugzilla.suse.com/1126325" source="BUGZILLA"/>
		<reference ref_id="1127458" ref_url="https://bugzilla.suse.com/1127458" source="BUGZILLA"/>
		<reference ref_id="1131595" ref_url="https://bugzilla.suse.com/1131595" source="BUGZILLA"/>
		<reference ref_id="1131955" ref_url="https://bugzilla.suse.com/1131955" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3840" ref_url="https://www.suse.com/security/cve/CVE-2019-3840/" source="CVE"/>
		<reference ref_id="CVE-2019-3886" ref_url="https://www.suse.com/security/cve/CVE-2019-3886/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed: 

- CVE-2019-3840: Fixed a null pointer dereference vulnerability in virJSONValueObjectHasKey function which could 
  have resulted in a remote denial of service via the guest agent (bsc#1127458).  
- CVE-2019-3886: Fixed an information leak which allowed to retrieve the guest
  hostname under readonly mode (bsc#1131595).

Other issue addressed: 

- cpu: add Skylake-Server and Skylake-Server-IBRS CPU models (FATE#327261, bsc#1131955)
- libxl: save current memory value after successful balloon (bsc#1120813).
- libxl: support Xen's max_grant_frames setting with maxGrantFrames attribute on the xenbus controller (bsc#1126325).
- conf: add new 'xenbus' controller type
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-26"/>
	<updated date="2019-04-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120813">SUSE bug 1120813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126325">SUSE bug 1126325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127458">SUSE bug 1127458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131595">SUSE bug 1131595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131955">SUSE bug 1131955</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3840/">CVE-2019-3840 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3840">CVE-2019-3840 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3886/">CVE-2019-3886 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3886">CVE-2019-3886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521090" comment="libvirt-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521091" comment="libvirt-admin-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521092" comment="libvirt-client-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521093" comment="libvirt-daemon-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521094" comment="libvirt-daemon-config-network-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521095" comment="libvirt-daemon-config-nwfilter-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521096" comment="libvirt-daemon-driver-interface-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521097" comment="libvirt-daemon-driver-libxl-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521098" comment="libvirt-daemon-driver-lxc-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521099" comment="libvirt-daemon-driver-network-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521100" comment="libvirt-daemon-driver-nodedev-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521101" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521102" comment="libvirt-daemon-driver-qemu-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521103" comment="libvirt-daemon-driver-secret-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521104" comment="libvirt-daemon-driver-storage-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521105" comment="libvirt-daemon-driver-storage-core-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521106" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521107" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521108" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521109" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521110" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521111" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557288" comment="libvirt-daemon-hooks-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521112" comment="libvirt-daemon-lxc-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521113" comment="libvirt-daemon-qemu-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521114" comment="libvirt-daemon-xen-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521115" comment="libvirt-doc-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521116" comment="libvirt-libs-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557289" comment="libvirt-lock-sanlock-3.3.0-5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557290" comment="libvirt-nss-3.3.0-5.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151933" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1130103" ref_url="https://bugzilla.suse.com/1130103" source="BUGZILLA"/>
		<reference ref_id="1133528" ref_url="https://bugzilla.suse.com/1133528" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issues:

 - Incorrect upstream fix for CVE-2019-3859 broke public key authentication [bsc#1133528, bsc#1130103]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-27"/>
	<updated date="2019-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133528">SUSE bug 1133528</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3859">CVE-2019-3859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521117" comment="libssh2-1-1.4.3-20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521118" comment="libssh2-1-32bit-1.4.3-20.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151934" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104205" ref_url="https://bugzilla.suse.com/1104205" source="BUGZILLA"/>
		<reference ref_id="1109209" ref_url="https://bugzilla.suse.com/1109209" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526/" source="CVE"/>
		<description>
This update for wpa_supplicant fixes the following issues:

This security issue was fixed:

- CVE-2018-14526: Under certain conditions, the integrity of EAPOL-Key messages
  was not checked, leading to a decryption oracle. An attacker within range of
  the Access Point and client could have abused the vulnerability to recover
  sensitive information (bsc#1104205).

This non-security issue was fixed:

- Enabled PWD as EAP method. This allows for password-based authentication,
  which is easier to setup than most of the other methods, and is used by the
  Eduroam network (bsc#1109209).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-29"/>
	<updated date="2019-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104205">SUSE bug 1104205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109209">SUSE bug 1109209</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14526">CVE-2018-14526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521119" comment="wpa_supplicant-2.6-15.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151935" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1133114" ref_url="https://bugzilla.suse.com/1133114" source="BUGZILLA"/>
		<reference ref_id="1133145" ref_url="https://bugzilla.suse.com/1133145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11365" ref_url="https://www.suse.com/security/cve/CVE-2019-11365/" source="CVE"/>
		<reference ref_id="CVE-2019-11366" ref_url="https://www.suse.com/security/cve/CVE-2019-11366/" source="CVE"/>
		<description>
This update for atftp fixes the following issues:

Security issues fixed:

- CVE-2019-11366: Fixed a denial of service caused by a NULL pointer dereference because thread_list_mutex was not locked (bsc#1133145).
- CVE-2019-11365: Fixed a buffer overflow which could lead to remote code execution caused by an insecure use of strncpy() (bsc#1133114).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-29"/>
	<updated date="2019-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133114">SUSE bug 1133114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133145">SUSE bug 1133145</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11365/">CVE-2019-11365 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11365">CVE-2019-11365 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11366/">CVE-2019-11366 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11366">CVE-2019-11366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521120" comment="atftp-0.7.0-160.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151936" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120489" ref_url="https://bugzilla.suse.com/1120489" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20217" ref_url="https://www.suse.com/security/cve/CVE-2018-20217/" source="CVE"/>
		<description>
This update for krb5 fixes the following issues:

Security issue fixed:

- CVE-2018-20217: Fixed an assertion issue with older encryption types (bsc#1120489)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-17"/>
	<updated date="2019-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120489">SUSE bug 1120489</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20217/">CVE-2018-20217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20217">CVE-2018-20217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521121" comment="krb5-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521122" comment="krb5-32bit-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521123" comment="krb5-client-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530427" comment="krb5-doc-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530428" comment="krb5-plugin-kdb-ldap-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530429" comment="krb5-plugin-preauth-otp-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530430" comment="krb5-plugin-preauth-pkinit-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530431" comment="krb5-server-1.12.5-40.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151937" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1096209" ref_url="https://bugzilla.suse.com/1096209" source="BUGZILLA"/>
		<reference ref_id="1098155" ref_url="https://bugzilla.suse.com/1098155" source="BUGZILLA"/>
		<reference ref_id="1128712" ref_url="https://bugzilla.suse.com/1128712" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1152" ref_url="https://www.suse.com/security/cve/CVE-2018-1152/" source="CVE"/>
		<reference ref_id="CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813/" source="CVE"/>
		<reference ref_id="CVE-2018-14498" ref_url="https://www.suse.com/security/cve/CVE-2018-14498/" source="CVE"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2018-14498: Fixed a heap-based buffer over read in get_8bit_row function
  which could allow to an attacker to cause denial of service (bsc#1128712).
- CVE-2018-11813: Fixed the end-of-file mishandling in read_pixel in rdtarga.c,
  which allowed remote attackers to cause a denial-of-service via crafted JPG
  files due to a large loop (bsc#1096209)
- CVE-2018-1152: Fixed a denial of service in start_input_bmp() rdbmp.c caused
  by a divide by zero when processing a crafted BMP image (bsc#1098155)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-30"/>
	<updated date="2019-04-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096209">SUSE bug 1096209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098155">SUSE bug 1098155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128712">SUSE bug 1128712</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1152/">CVE-2018-1152 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1152">CVE-2018-1152 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11813">CVE-2018-11813 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14498/">CVE-2018-14498 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14498">CVE-2018-14498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521124" comment="libjpeg-turbo-1.5.3-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521125" comment="libjpeg62-62.2.0-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521126" comment="libjpeg62-32bit-62.2.0-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521127" comment="libjpeg62-turbo-1.5.3-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521128" comment="libjpeg8-8.1.2-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521129" comment="libjpeg8-32bit-8.1.2-31.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521130" comment="libturbojpeg0-8.1.2-31.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151938" version="1" class="patch">
	<metadata>
		<title>Security update for hostinfo, supportutils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1054979" ref_url="https://bugzilla.suse.com/1054979" source="BUGZILLA"/>
		<reference ref_id="1099498" ref_url="https://bugzilla.suse.com/1099498" source="BUGZILLA"/>
		<reference ref_id="1115245" ref_url="https://bugzilla.suse.com/1115245" source="BUGZILLA"/>
		<reference ref_id="1117751" ref_url="https://bugzilla.suse.com/1117751" source="BUGZILLA"/>
		<reference ref_id="1117776" ref_url="https://bugzilla.suse.com/1117776" source="BUGZILLA"/>
		<reference ref_id="1118460" ref_url="https://bugzilla.suse.com/1118460" source="BUGZILLA"/>
		<reference ref_id="1118462" ref_url="https://bugzilla.suse.com/1118462" source="BUGZILLA"/>
		<reference ref_id="1118463" ref_url="https://bugzilla.suse.com/1118463" source="BUGZILLA"/>
		<reference ref_id="1125623" ref_url="https://bugzilla.suse.com/1125623" source="BUGZILLA"/>
		<reference ref_id="1125666" ref_url="https://bugzilla.suse.com/1125666" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19636" ref_url="https://www.suse.com/security/cve/CVE-2018-19636/" source="CVE"/>
		<reference ref_id="CVE-2018-19637" ref_url="https://www.suse.com/security/cve/CVE-2018-19637/" source="CVE"/>
		<reference ref_id="CVE-2018-19638" ref_url="https://www.suse.com/security/cve/CVE-2018-19638/" source="CVE"/>
		<reference ref_id="CVE-2018-19639" ref_url="https://www.suse.com/security/cve/CVE-2018-19639/" source="CVE"/>
		<reference ref_id="CVE-2018-19640" ref_url="https://www.suse.com/security/cve/CVE-2018-19640/" source="CVE"/>
		<description>
This update for hostinfo, supportutils fixes the following issues:
	  
Security issues fixed for supportutils:

- CVE-2018-19640: Fixed an issue where  users could kill arbitrary processes (bsc#1118463).
- CVE-2018-19638: Fixed an issue where users could overwrite arbitrary log files (bsc#1118460).
- CVE-2018-19639: Fixed a code execution if run with -v (bsc#1118462).
- CVE-2018-19637: Fixed an issue where static temporary filename could allow overwriting of files (bsc#1117776).
- CVE-2018-19636: Fixed a local root exploit via inclusion of attacker controlled shell script (bsc#1117751).

Other issues fixed for supportutils:

- Fixed invalid exit code commands (bsc#1125666)
- SUSE separation in supportconfig (bsc#1125623)
- Clarified supportconfig(8) -x option (bsc#1115245)
- supportconfig: 3.0.127
- btrfs filesystem usage
- List products.d
- Dump lsof errors
- Added ha commands for corosync
- Dumped find errors in ib_info

Issues fixed in hostinfo:
- Removed extra kernel install dates (bsc#1099498)
- Resolved network bond issue (bsc#1054979)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-30"/>
	<updated date="2019-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1054979">SUSE bug 1054979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099498">SUSE bug 1099498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115245">SUSE bug 1115245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117751">SUSE bug 1117751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117776">SUSE bug 1117776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118460">SUSE bug 1118460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118462">SUSE bug 1118462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118463">SUSE bug 1118463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125623">SUSE bug 1125623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125666">SUSE bug 1125666</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19636/">CVE-2018-19636 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19636">CVE-2018-19636 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19637/">CVE-2018-19637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19637">CVE-2018-19637 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19638/">CVE-2018-19638 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19638">CVE-2018-19638 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19639/">CVE-2018-19639 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19639">CVE-2018-19639 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19640/">CVE-2018-19640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19640">CVE-2018-19640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530432" comment="hostinfo-1.0.1-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521131" comment="supportutils-3.0-95.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151939" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<description>
This update for openssl fixes the following issues:

- Reject invalid EC point coordinates (bsc#1131291)

  This helps openssl using services that do not do this verification on their own.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-03"/>
	<updated date="2019-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521132" comment="libopenssl-devel-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521133" comment="libopenssl1_0_0-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521134" comment="libopenssl1_0_0-32bit-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530433" comment="libopenssl1_0_0-hmac-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530434" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521135" comment="openssl-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530435" comment="openssl-doc-1.0.2j-60.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151940" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1132256" ref_url="https://bugzilla.suse.com/1132256" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11070" ref_url="https://www.suse.com/security/cve/CVE-2019-11070/" source="CVE"/>
		<reference ref_id="CVE-2019-6201" ref_url="https://www.suse.com/security/cve/CVE-2019-6201/" source="CVE"/>
		<reference ref_id="CVE-2019-6251" ref_url="https://www.suse.com/security/cve/CVE-2019-6251/" source="CVE"/>
		<reference ref_id="CVE-2019-7285" ref_url="https://www.suse.com/security/cve/CVE-2019-7285/" source="CVE"/>
		<reference ref_id="CVE-2019-7292" ref_url="https://www.suse.com/security/cve/CVE-2019-7292/" source="CVE"/>
		<reference ref_id="CVE-2019-8503" ref_url="https://www.suse.com/security/cve/CVE-2019-8503/" source="CVE"/>
		<reference ref_id="CVE-2019-8506" ref_url="https://www.suse.com/security/cve/CVE-2019-8506/" source="CVE"/>
		<reference ref_id="CVE-2019-8515" ref_url="https://www.suse.com/security/cve/CVE-2019-8515/" source="CVE"/>
		<reference ref_id="CVE-2019-8524" ref_url="https://www.suse.com/security/cve/CVE-2019-8524/" source="CVE"/>
		<reference ref_id="CVE-2019-8535" ref_url="https://www.suse.com/security/cve/CVE-2019-8535/" source="CVE"/>
		<reference ref_id="CVE-2019-8536" ref_url="https://www.suse.com/security/cve/CVE-2019-8536/" source="CVE"/>
		<reference ref_id="CVE-2019-8544" ref_url="https://www.suse.com/security/cve/CVE-2019-8544/" source="CVE"/>
		<reference ref_id="CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551/" source="CVE"/>
		<reference ref_id="CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558/" source="CVE"/>
		<reference ref_id="CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559/" source="CVE"/>
		<reference ref_id="CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563/" source="CVE"/>
		<description>
This update for webkit2gtk3 to version 2.24.1 fixes the following issues:

Security issues fixed:

- CVE-2019-6201, CVE-2019-6251, CVE-2019-7285, CVE-2019-7292, CVE-2019-8503, CVE-2019-8506,
  CVE-2019-8515, CVE-2019-8524, CVE-2019-8535, CVE-2019-8536, CVE-2019-8544, CVE-2019-8551,
  CVE-2019-8558, CVE-2019-8559, CVE-2019-8563, CVE-2019-11070 (bsc#1132256).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-06"/>
	<updated date="2019-05-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11070/">CVE-2019-11070 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11070">CVE-2019-11070 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6201/">CVE-2019-6201 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6201">CVE-2019-6201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6251/">CVE-2019-6251 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6251">CVE-2019-6251 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7285/">CVE-2019-7285 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7285">CVE-2019-7285 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7292/">CVE-2019-7292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7292">CVE-2019-7292 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8503/">CVE-2019-8503 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8503">CVE-2019-8503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8506/">CVE-2019-8506 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8506">CVE-2019-8506 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8515/">CVE-2019-8515 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8515">CVE-2019-8515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8524/">CVE-2019-8524 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8524">CVE-2019-8524 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8535/">CVE-2019-8535 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8535">CVE-2019-8535 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8536/">CVE-2019-8536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8536">CVE-2019-8536 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8544/">CVE-2019-8544 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8544">CVE-2019-8544 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8551">CVE-2019-8551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8558">CVE-2019-8558 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8559">CVE-2019-8559 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8563">CVE-2019-8563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151941" version="1" class="patch">
	<metadata>
		<title>Security update for audit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1042781" ref_url="https://bugzilla.suse.com/1042781" source="BUGZILLA"/>
		<reference ref_id="1085003" ref_url="https://bugzilla.suse.com/1085003" source="BUGZILLA"/>
		<reference ref_id="1125535" ref_url="https://bugzilla.suse.com/1125535" source="BUGZILLA"/>
		<reference ref_id="941922" ref_url="https://bugzilla.suse.com/941922" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5186" ref_url="https://www.suse.com/security/cve/CVE-2015-5186/" source="CVE"/>
		<description>

This update for audit fixes the following issues:

Audit on SUSE Linux Enterprise 12 SP3 was updated to 2.8.1 to bring
new features and bugfixes.  (bsc#1125535 FATE#326346)

* Many features were added to auparse_normalize
* cli option added to auditd and audispd for setting config dir
* In auditd, restore the umask after creating a log file
* Option added to auditd for skipping email verification

The full changelog can be found here: http://people.redhat.com/sgrubb/audit/ChangeLog


- Change openldap dependency to client only (bsc#1085003)

Minor security issue fixed:

- CVE-2015-5186: Audit: log terminal emulator escape sequences handling (bsc#941922)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-07"/>
	<updated date="2019-05-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042781">SUSE bug 1042781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085003">SUSE bug 1085003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125535">SUSE bug 1125535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941922">SUSE bug 941922</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5186/">CVE-2015-5186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5186">CVE-2015-5186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521142" comment="audit-2.8.1-8.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557291" comment="audit-audispd-plugins-2.8.1-8.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521143" comment="libaudit1-2.8.1-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521144" comment="libaudit1-32bit-2.8.1-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521145" comment="libauparse0-2.8.1-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151942" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1132549" ref_url="https://bugzilla.suse.com/1132549" source="BUGZILLA"/>
		<reference ref_id="1132664" ref_url="https://bugzilla.suse.com/1132664" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11234" ref_url="https://www.suse.com/security/cve/CVE-2019-11234/" source="CVE"/>
		<reference ref_id="CVE-2019-11235" ref_url="https://www.suse.com/security/cve/CVE-2019-11235/" source="CVE"/>
		<description>
This update for freeradius-server fixes the following issues:

Security issues fixed:

- CVE-2019-11235: Fixed an authentication bypass related to the EAP-PWD Commit frame and insufficent validation of elliptic curve points (bsc#1132549).
- CVE-2019-11234: Fixed an authentication bypass caused by reflecting privous values back to the server (bsc#1132664).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-07"/>
	<updated date="2019-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132549">SUSE bug 1132549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132664">SUSE bug 1132664</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11234/">CVE-2019-11234 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11234">CVE-2019-11234 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11235/">CVE-2019-11235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11235">CVE-2019-11235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557292" comment="freeradius-server-3.0.15-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557293" comment="freeradius-server-doc-3.0.15-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557294" comment="freeradius-server-krb5-3.0.15-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557295" comment="freeradius-server-ldap-3.0.15-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557296" comment="freeradius-server-libs-3.0.15-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557297" comment="freeradius-server-mysql-3.0.15-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557298" comment="freeradius-server-perl-3.0.15-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557299" comment="freeradius-server-postgresql-3.0.15-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557300" comment="freeradius-server-python-3.0.15-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557301" comment="freeradius-server-sqlite-3.0.15-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557302" comment="freeradius-server-utils-3.0.15-2.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151943" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1131361" ref_url="https://bugzilla.suse.com/1131361" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0161" ref_url="https://www.suse.com/security/cve/CVE-2019-0161/" source="CVE"/>
		<description>
This update for ovmf fixes the following issues:

Security issue fixed:

- CVE-2019-0161: Fixed a stack overflow in UsbBusDxe and UsbBusPei, which could 
  potentially be triggered by a local unauthenticated user (bsc#1131361).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1131361">SUSE bug 1131361</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0161/">CVE-2019-0161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0161">CVE-2019-0161 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557303" comment="ovmf-2017+git1492060560.b6d11d7c46-4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557304" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009553973" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151944" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1085790" ref_url="https://bugzilla.suse.com/1085790" source="BUGZILLA"/>
		<reference ref_id="1132045" ref_url="https://bugzilla.suse.com/1132045" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10989" ref_url="https://www.suse.com/security/cve/CVE-2017-10989/" source="CVE"/>
		<reference ref_id="CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issue fixed:

- CVE-2018-8740: Fixed a NULL pointer dereference related to corrupted databases schemas (bsc#1085790).
- CVE-2017-10989: Fixed a heap-based buffer over-read in getNodeSize() (bsc#1132045).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085790">SUSE bug 1085790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132045">SUSE bug 1132045</bugzilla>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10989/">CVE-2017-10989 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10989">CVE-2017-10989 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8740">CVE-2018-8740 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521147" comment="libsqlite3-0-3.8.10.2-9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521148" comment="libsqlite3-0-32bit-3.8.10.2-9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521149" comment="sqlite3-3.8.10.2-9.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151945" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-fileupload (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1128829" ref_url="https://bugzilla.suse.com/1128829" source="BUGZILLA"/>
		<reference ref_id="1128963" ref_url="https://bugzilla.suse.com/1128963" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1000031" ref_url="https://www.suse.com/security/cve/CVE-2016-1000031/" source="CVE"/>
		<description>
This update for jakarta-commons-fileupload fixes the following issue:

Security issue fixed:

- CVE-2016-1000031: Fixed remote execution (bsc#1128963, bsc#1128829).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1128829">SUSE bug 1128829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128963">SUSE bug 1128963</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1000031/">CVE-2016-1000031 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000031">CVE-2016-1000031 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530483" comment="jakarta-commons-fileupload-1.1.1-122.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530484" comment="jakarta-commons-fileupload-javadoc-1.1.1-122.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151946" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1133135" ref_url="https://bugzilla.suse.com/1133135" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk to version 8u212 fixes the following issues:

Security issues fixed:

- CVE-2019-2602: Better String parsing (bsc#1132728).
- CVE-2019-2684: More dynamic RMI interactions (bsc#1132732).
- CVE-2019-2698: Fuzzing TrueType fonts - setCurrGlyphID() (bsc#1132729).
- CVE-2019-2422: Better FileChannel (bsc#1122293).
- CVE-2018-11212: Improve JPEG (bsc#1122299).

Non-Security issue fixed:

- Disable LTO (bsc#1133135).
- Added Japanese new era name.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-13"/>
	<updated date="2019-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133135">SUSE bug 1133135</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2422">CVE-2019-2422 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2426">CVE-2019-2426 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2602">CVE-2019-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2684">CVE-2019-2684 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2698">CVE-2019-2698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521150" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530485" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530486" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521151" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151947" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1132160" ref_url="https://bugzilla.suse.com/1132160" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<description>
This update for libxslt fixes the following issues:

- CVE-2019-11068: Fixed a protection mechanism bypass where callers of 
  xsltCheckRead() and xsltCheckWrite() would permit access upon receiving an
  error (bsc#1132160).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1132160">SUSE bug 1132160</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521152" comment="libxslt-tools-1.1.28-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521153" comment="libxslt1-1.1.28-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521154" comment="libxslt1-32bit-1.1.28-17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151948" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

- Processor             Identifier     Version       Products
- Model        Stepping F-MO-S/PI      Old-&gt;New
- ---- new platforms ----------------------------------------
- CLX-SP       B1       6-55-7/bf           05000021 Xeon Scalable Gen2
- ---- updated platforms ------------------------------------
- SNB          D2/G1/Q0 6-2a-7/12 0000002e-&gt;0000002f Core Gen2
- IVB          E1/L1    6-3a-9/12 00000020-&gt;00000021 Core Gen3
- HSW          C0       6-3c-3/32 00000025-&gt;00000027 Core Gen4
- BDW-U/Y      E0/F0    6-3d-4/c0 0000002b-&gt;0000002d Core Gen5
- IVB-E/EP     C1/M1/S1 6-3e-4/ed 0000042e-&gt;0000042f Core Gen3 X Series; Xeon E5 v2
- IVB-EX       D1       6-3e-7/ed 00000714-&gt;00000715 Xeon E7 v2
- HSX-E/EP     Cx/M1    6-3f-2/6f 00000041-&gt;00000043 Core Gen4 X series; Xeon E5 v3
- HSX-EX       E0       6-3f-4/80 00000013-&gt;00000014 Xeon E7 v3
- HSW-U        C0/D0    6-45-1/72 00000024-&gt;00000025 Core Gen4
- HSW-H        C0       6-46-1/32 0000001a-&gt;0000001b Core Gen4
- BDW-H/E3     E0/G0    6-47-1/22 0000001e-&gt;00000020 Core Gen5
- SKL-U/Y      D0/K1    6-4e-3/c0 000000c6-&gt;000000cc Core Gen6      
- SKX-SP       H0/M0/U0 6-55-4/b7 0200005a-&gt;0000005e Xeon Scalable
- SKX-D        M1       6-55-4/b7 0200005a-&gt;0000005e Xeon D-21xx
- BDX-DE       V1       6-56-2/10 00000019-&gt;0000001a Xeon D-1520/40
- BDX-DE       V2/3     6-56-3/10 07000016-&gt;07000017 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
- BDX-DE       Y0       6-56-4/10 0f000014-&gt;0f000015 Xeon D-1557/59/67/71/77/81/87
- BDX-NS       A0       6-56-5/10 0e00000c-&gt;0e00000d Xeon D-1513N/23/33/43/53
- APL          D0       6-5c-9/03 00000036-&gt;00000038 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
- SKL-H/S      R0/N0    6-5e-3/36 000000c6-&gt;000000cc Core Gen6; Xeon E3 v5
- DNV          B0       6-5f-1/01 00000024-&gt;0000002e Atom Processor C Series
- GLK          B0       6-7a-1/01 0000002c-&gt;0000002e Pentium Silver N/J5xxx, Celeron N/J4xxx
- AML-Y22      H0       6-8e-9/10 0000009e-&gt;000000b4 Core Gen8 Mobile
- KBL-U/Y      H0       6-8e-9/c0 0000009a-&gt;000000b4 Core Gen7 Mobile
- CFL-U43e     D0       6-8e-a/c0 0000009e-&gt;000000b4 Core Gen8 Mobile
- WHL-U        W0       6-8e-b/d0 000000a4-&gt;000000b8 Core Gen8 Mobile
- WHL-U        V0       6-8e-d/94 000000b2-&gt;000000b8 Core Gen8 Mobile
- KBL-G/H/S/E3 B0       6-9e-9/2a 0000009a-&gt;000000b4 Core Gen7; Xeon E3 v6
- CFL-H/S/E3   U0       6-9e-a/22 000000aa-&gt;000000b4 Core Gen8 Desktop, Mobile, Xeon E
- CFL-S        B0       6-9e-b/02 000000aa-&gt;000000b4 Core Gen8
- CFL-H/S      P0       6-9e-c/22 000000a2-&gt;000000ae Core Gen9
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521155" comment="ucode-intel-20190507-13.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151949" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature 'md-clear' (bsc#1111331)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521156" comment="qemu-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521157" comment="qemu-block-curl-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557305" comment="qemu-block-iscsi-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557306" comment="qemu-block-rbd-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557307" comment="qemu-block-ssh-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557308" comment="qemu-guest-agent-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521158" comment="qemu-ipxe-1.0.0+-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521159" comment="qemu-kvm-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557309" comment="qemu-lang-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521160" comment="qemu-seabios-1.10.2-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521161" comment="qemu-sgabios-8-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521162" comment="qemu-tools-2.9.1-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521163" comment="qemu-vgabios-1.10.2-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521164" comment="qemu-x86-2.9.1-6.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151950" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1120095" ref_url="https://bugzilla.suse.com/1120095" source="BUGZILLA"/>
		<reference ref_id="1130680" ref_url="https://bugzilla.suse.com/1130680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the XEN Hypervisor adjustments, that additionaly also use CPU Microcode updates.

The mitigation can be controlled via the 'mds' commandline option, see the documentation.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Security issue fixed:

- CVE-2018-20815: Fixed a heap buffer overflow while loading device tree blob (bsc#1130680)

Other fixes:

- Added code to change LIBXL_HOTPLUG_TIMEOUT at runtime.

  The included README has details about the impact of this change (bsc#1120095)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120095">SUSE bug 1120095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130680">SUSE bug 1130680</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20815">CVE-2018-20815 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521172" comment="xen-4.9.4_04-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554008" comment="xen-doc-html-4.9.4_04-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521173" comment="xen-libs-4.9.4_04-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521174" comment="xen-libs-32bit-4.9.4_04-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554009" comment="xen-tools-4.9.4_04-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554010" comment="xen-tools-domU-4.9.4_04-3.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151951" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1080919" ref_url="https://bugzilla.suse.com/1080919" source="BUGZILLA"/>
		<reference ref_id="1121563" ref_url="https://bugzilla.suse.com/1121563" source="BUGZILLA"/>
		<reference ref_id="1125352" ref_url="https://bugzilla.suse.com/1125352" source="BUGZILLA"/>
		<reference ref_id="1126056" ref_url="https://bugzilla.suse.com/1126056" source="BUGZILLA"/>
		<reference ref_id="1127557" ref_url="https://bugzilla.suse.com/1127557" source="BUGZILLA"/>
		<reference ref_id="1128657" ref_url="https://bugzilla.suse.com/1128657" source="BUGZILLA"/>
		<reference ref_id="1130230" ref_url="https://bugzilla.suse.com/1130230" source="BUGZILLA"/>
		<reference ref_id="1132348" ref_url="https://bugzilla.suse.com/1132348" source="BUGZILLA"/>
		<reference ref_id="1132400" ref_url="https://bugzilla.suse.com/1132400" source="BUGZILLA"/>
		<reference ref_id="1132721" ref_url="https://bugzilla.suse.com/1132721" source="BUGZILLA"/>
		<reference ref_id="955942" ref_url="https://bugzilla.suse.com/955942" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6954" ref_url="https://www.suse.com/security/cve/CVE-2018-6954/" source="CVE"/>
		<reference ref_id="CVE-2019-3842" ref_url="https://www.suse.com/security/cve/CVE-2019-3842/" source="CVE"/>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<description>
This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2018-6954: Fixed a vulnerability in the symlink handling of systemd-tmpfiles 
  which allowed a local user to obtain ownership of arbitrary files (bsc#1080919).
- CVE-2019-3842: Fixed a vulnerability in pam_systemd which allowed a local user to escalate privileges (bsc#1132348).
- CVE-2019-6454: Fixed a denial of service caused by long dbus messages (bsc#1125352).

Non-security issues fixed:

- systemd-coredump: generate a stack trace of all core dumps (jsc#SLE-5933)
- udevd: notify when max number value of children is reached only once per batch of events (bsc#1132400)
- sd-bus: bump message queue size again (bsc#1132721)
- core: only watch processes when it's really necessary (bsc#955942 bsc#1128657)
- rules: load drivers only on 'add' events (bsc#1126056)
- sysctl: Don't pass null directive argument to '%s' (bsc#1121563)
- Do not automatically online memory on s390x (bsc#1127557)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-16"/>
	<updated date="2019-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1080919">SUSE bug 1080919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121563">SUSE bug 1121563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125352">SUSE bug 1125352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126056">SUSE bug 1126056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127557">SUSE bug 1127557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128657">SUSE bug 1128657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130230">SUSE bug 1130230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132348">SUSE bug 1132348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132400">SUSE bug 1132400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132721">SUSE bug 1132721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955942">SUSE bug 955942</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6954/">CVE-2018-6954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6954">CVE-2018-6954 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3842/">CVE-2019-3842 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3842">CVE-2019-3842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6454">CVE-2019-6454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521175" comment="libsystemd0-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521176" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521177" comment="libudev1-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521178" comment="libudev1-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521179" comment="systemd-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521180" comment="systemd-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521182" comment="systemd-sysvinit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521183" comment="udev-228-150.66.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151952" version="1" class="patch">
	<metadata>
		<title>Security update for PackageKit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1038425" ref_url="https://bugzilla.suse.com/1038425" source="BUGZILLA"/>
		<description>
This update for PackageKit fixes the following issues:

- Fixed displaying the license agreement pop up window during package update (bsc#1038425).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-18"/>
	<updated date="2019-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038425">SUSE bug 1038425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521185" comment="PackageKit-1.1.3-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521186" comment="PackageKit-backend-zypp-1.1.3-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521189" comment="PackageKit-lang-1.1.3-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521190" comment="libpackagekit-glib2-18-1.1.3-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521191" comment="typelib-1_0-PackageKitGlib-1_0-1.1.3-24.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151953" version="1" class="patch">
	<metadata>
		<title>Security update for nmap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104139" ref_url="https://bugzilla.suse.com/1104139" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15173" ref_url="https://www.suse.com/security/cve/CVE-2018-15173/" source="CVE"/>
		<description>
This update for nmap fixes the following issues:

Security issue fixed:

- CVE-2018-15173: Fixed a remote denial of service attack via a crafted TCP-based service (bsc#1104139).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-17"/>
	<updated date="2019-05-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104139">SUSE bug 1104139</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15173/">CVE-2018-15173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15173">CVE-2018-15173 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557310" comment="nmap-6.46-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151954" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

ucode-intel was updated to official QSR 2019.1 microcode release (bsc#1111331
  CVE-2018-12126 CVE-2018-12130 CVE-2018-12127 CVE-2019-11091)

---- new platforms ----------------------------------------
VLV          C0       6-37-8/02           00000838 Atom Z series
VLV          C0       6-37-8/0C           00000838 Celeron N2xxx, Pentium N35xx
VLV          D0       6-37-9/0F           0000090c Atom E38xx
CHV          C0       6-4c-3/01           00000368 Atom X series
CHV          D0       6-4c-4/01           00000411 Atom X series

Readded Broadwell CPU ucode that was missing in last update:

BDX-ML       B0/M0/R0 6-4f-1/ef 0b00002e-&gt;00000036 Xeon E5/E7 v4; Core i7-69xx/68xx
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-21"/>
	<updated date="2019-05-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521192" comment="ucode-intel-20190514-13.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151955" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1121571" ref_url="https://bugzilla.suse.com/1121571" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121818" ref_url="https://bugzilla.suse.com/1121818" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685/" source="CVE"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6110" ref_url="https://www.suse.com/security/cve/CVE-2019-6110/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<description>
This update for openssh fixes the following issues:

Security issue fixed:

- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)
- CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)
- CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)
- CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-21"/>
	<updated date="2019-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20685">CVE-2018-20685 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6109">CVE-2019-6109 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6110/">CVE-2019-6110 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6110">CVE-2019-6110 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6111">CVE-2019-6111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521193" comment="openssh-7.2p2-74.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521194" comment="openssh-askpass-gnome-7.2p2-74.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530509" comment="openssh-fips-7.2p2-74.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521195" comment="openssh-helpers-7.2p2-74.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151956" version="1" class="patch">
	<metadata>
		<title>Security update for sysstat (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1117001" ref_url="https://bugzilla.suse.com/1117001" source="BUGZILLA"/>
		<reference ref_id="1117260" ref_url="https://bugzilla.suse.com/1117260" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19416" ref_url="https://www.suse.com/security/cve/CVE-2018-19416/" source="CVE"/>
		<reference ref_id="CVE-2018-19517" ref_url="https://www.suse.com/security/cve/CVE-2018-19517/" source="CVE"/>
		<description>
This update for sysstat fixes the following issues:

Security issues fixed:

- CVE-2018-19416: Fixed out-of-bounds read during a memmove call inside the remap_struct function (bsc#1117001).
- CVE-2018-19517: Fixed out-of-bounds read during a memset call inside the remap_struct function (bsc#1117260).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-23"/>
	<updated date="2019-05-23"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1117001">SUSE bug 1117001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117260">SUSE bug 1117260</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19416/">CVE-2018-19416 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19416">CVE-2018-19416 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19517/">CVE-2018-19517 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19517">CVE-2018-19517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521196" comment="sysstat-12.0.2-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557311" comment="sysstat-isag-12.0.2-10.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151957" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1013708" ref_url="https://bugzilla.suse.com/1013708" source="BUGZILLA"/>
		<reference ref_id="1013712" ref_url="https://bugzilla.suse.com/1013712" source="BUGZILLA"/>
		<reference ref_id="1013893" ref_url="https://bugzilla.suse.com/1013893" source="BUGZILLA"/>
		<reference ref_id="1015171" ref_url="https://bugzilla.suse.com/1015171" source="BUGZILLA"/>
		<reference ref_id="1015173" ref_url="https://bugzilla.suse.com/1015173" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9797" ref_url="https://www.suse.com/security/cve/CVE-2016-9797/" source="CVE"/>
		<reference ref_id="CVE-2016-9798" ref_url="https://www.suse.com/security/cve/CVE-2016-9798/" source="CVE"/>
		<reference ref_id="CVE-2016-9802" ref_url="https://www.suse.com/security/cve/CVE-2016-9802/" source="CVE"/>
		<reference ref_id="CVE-2016-9917" ref_url="https://www.suse.com/security/cve/CVE-2016-9917/" source="CVE"/>
		<reference ref_id="CVE-2016-9918" ref_url="https://www.suse.com/security/cve/CVE-2016-9918/" source="CVE"/>
		<description>
This update for bluez fixes the following issues:

Security vulnerability addressed:

- CVE-2016-9797: Fixed a buffer over-read in l2cap_dump() (bsc#1013708).
- CVE-2016-9798: Fixed a use-after-free in conf_opt() (bsc#1013712).
- CVE-2016-9917: Fixed a heap-based buffer overflow in read_n() (bsc#1015171).
- CVE-2016-9802: Fixed a buffer over-read in l2cap_packet() (bsc#1013893).
- CVE-2016-9918: Fixed an out-of-bounds stack read in packet_hexdump(),
  which could be triggered by processing a corrupted dump file and will result
  in a crash of the hcidump tool (bsc#1015173)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013708">SUSE bug 1013708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013712">SUSE bug 1013712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013893">SUSE bug 1013893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015171">SUSE bug 1015171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015173">SUSE bug 1015173</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9797/">CVE-2016-9797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9797">CVE-2016-9797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9798/">CVE-2016-9798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9798">CVE-2016-9798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9802/">CVE-2016-9802 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9802">CVE-2016-9802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9917/">CVE-2016-9917 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9917">CVE-2016-9917 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-9918/">CVE-2016-9918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9918">CVE-2016-9918 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521197" comment="bluez-5.13-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521199" comment="libbluetooth3-5.13-5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151958" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1132734" ref_url="https://bugzilla.suse.com/1132734" source="BUGZILLA"/>
		<reference ref_id="1134718" ref_url="https://bugzilla.suse.com/1134718" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10245" ref_url="https://www.suse.com/security/cve/CVE-2019-10245/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2697" ref_url="https://www.suse.com/security/cve/CVE-2019-2697/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update to Java 7.1 Service Refresh 4 Fix Pack 45.

Security issues fixed:

- CVE-2019-10245: Fixed Java bytecode verifier issue causing crashes (bsc#1134718).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2697: Fixed flaw inside the 2D component (bsc#1132734).
- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw was found in the RMI registry implementation (bsc#1132732).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132734">SUSE bug 1132734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10245/">CVE-2019-10245 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10245">CVE-2019-10245 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2602">CVE-2019-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2684">CVE-2019-2684 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2697/">CVE-2019-2697 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2697">CVE-2019-2697 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2698">CVE-2019-2698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530510" comment="java-1_7_1-ibm-1.7.1_sr4.45-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530511" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530513" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530514" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-38.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151959" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1005023" ref_url="https://bugzilla.suse.com/1005023" source="BUGZILLA"/>
		<reference ref_id="1076696" ref_url="https://bugzilla.suse.com/1076696" source="BUGZILLA"/>
		<reference ref_id="1101591" ref_url="https://bugzilla.suse.com/1101591" source="BUGZILLA"/>
		<reference ref_id="1114981" ref_url="https://bugzilla.suse.com/1114981" source="BUGZILLA"/>
		<reference ref_id="1115518" ref_url="https://bugzilla.suse.com/1115518" source="BUGZILLA"/>
		<reference ref_id="1119971" ref_url="https://bugzilla.suse.com/1119971" source="BUGZILLA"/>
		<reference ref_id="1120323" ref_url="https://bugzilla.suse.com/1120323" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16864" ref_url="https://www.suse.com/security/cve/CVE-2018-16864/" source="CVE"/>
		<reference ref_id="CVE-2018-16865" ref_url="https://www.suse.com/security/cve/CVE-2018-16865/" source="CVE"/>
		<reference ref_id="CVE-2018-16866" ref_url="https://www.suse.com/security/cve/CVE-2018-16866/" source="CVE"/>
		<description>
This update for systemd provides the following fixes:

Security issues fixed:

- CVE-2018-16864, CVE-2018-16865: Fixed two memory corruptions through attacker-controlled alloca()s (bsc#1120323)
- CVE-2018-16866: Fixed an information leak in journald (bsc#1120323)
- Fixed an issue during system startup in relation to encrypted swap disks (bsc#1119971)

Non-security issues fixed:

- core: Queue loading transient units after setting their properties. (bsc#1115518)
- logind: Stop managing VT switches if no sessions are registered on that VT. (bsc#1101591)
- terminal-util: introduce vt_release() and vt_restore() helpers.
- terminal: Unify code for resetting kbd utf8 mode a bit.
- terminal Reset should honour default_utf8 kernel setting.
- logind: Make session_restore_vt() static.
- udev: Downgrade message when settting inotify watch up fails. (bsc#1005023)
- log: Never log into foreign fd #2 in PID 1 or its pre-execve() children. (bsc#1114981)
- udev: Ignore the exit code of systemd-detect-virt for memory hot-add.  In SLE-12-SP3,
  80-hotplug-cpu-mem.rules has a memory hot-add rule that uses systemd-detect-virt to
  detect non-zvm environment. The systemd-detect-virt returns exit failure code when it
  detected _none_ state.  The exit failure code causes that the hot-add memory block can
  not be set to online. (bsc#1076696)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-21"/>
	<updated date="2019-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005023">SUSE bug 1005023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076696">SUSE bug 1076696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101591">SUSE bug 1101591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114981">SUSE bug 1114981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115518">SUSE bug 1115518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119971">SUSE bug 1119971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16864/">CVE-2018-16864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16864">CVE-2018-16864 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16865/">CVE-2018-16865 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16865">CVE-2018-16865 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16866/">CVE-2018-16866 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16866">CVE-2018-16866 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521202" comment="libsystemd0-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521203" comment="libsystemd0-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521204" comment="libudev1-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521205" comment="libudev1-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521206" comment="systemd-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521207" comment="systemd-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521208" comment="systemd-bash-completion-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521209" comment="systemd-sysvinit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521210" comment="udev-228-150.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151960" version="1" class="patch">
	<metadata>
		<title>Security update for screen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1130831" ref_url="https://bugzilla.suse.com/1130831" source="BUGZILLA"/>
		<reference ref_id="944458" ref_url="https://bugzilla.suse.com/944458" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6806" ref_url="https://www.suse.com/security/cve/CVE-2015-6806/" source="CVE"/>
		<description>
This update for screen fixes the following issues:

Security issue fixed:

- CVE-2015-6806: Fixed a stack overflow due to deep recursion (bsc#944458).

Non-security issue fixed:

- Fixed segmentation faults related to altscreen and resizing screen (bsc#1130831).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1130831">SUSE bug 1130831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944458">SUSE bug 944458</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-6806/">CVE-2015-6806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6806">CVE-2015-6806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521211" comment="screen-4.0.4-23.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151961" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1135170" ref_url="https://bugzilla.suse.com/1135170" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5436: Fixed a heap buffer overflow exists in tftp_receive_packet that receives data from a TFTP server (bsc#1135170).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-28"/>
	<updated date="2019-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5436">CVE-2019-5436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521212" comment="curl-7.37.0-37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521213" comment="libcurl4-7.37.0-37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521214" comment="libcurl4-32bit-7.37.0-37.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151962" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1040621" ref_url="https://bugzilla.suse.com/1040621" source="BUGZILLA"/>
		<reference ref_id="1105435" ref_url="https://bugzilla.suse.com/1105435" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6891" ref_url="https://www.suse.com/security/cve/CVE-2017-6891/" source="CVE"/>
		<reference ref_id="CVE-2018-1000654" ref_url="https://www.suse.com/security/cve/CVE-2018-1000654/" source="CVE"/>
		<description>
This update for libtasn1 fixes the following issues:

Security issues fixed:

- CVE-2018-1000654: Fixed a denial of service in the asn1 parser (bsc#1105435).
- CVE-2017-6891: Fixed a stack overflow in asn1_find_node() (bsc#1040621).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-29"/>
	<updated date="2019-05-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040621">SUSE bug 1040621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105435">SUSE bug 1105435</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6891/">CVE-2017-6891 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6891">CVE-2017-6891 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000654/">CVE-2018-1000654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000654">CVE-2018-1000654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521215" comment="libtasn1-4.9-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521216" comment="libtasn1-6-4.9-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521217" comment="libtasn1-6-32bit-4.9-3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151963" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1121232" ref_url="https://bugzilla.suse.com/1121232" source="BUGZILLA"/>
		<reference ref_id="1121233" ref_url="https://bugzilla.suse.com/1121233" source="BUGZILLA"/>
		<reference ref_id="1121234" ref_url="https://bugzilla.suse.com/1121234" source="BUGZILLA"/>
		<reference ref_id="1121235" ref_url="https://bugzilla.suse.com/1121235" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5717" ref_url="https://www.suse.com/security/cve/CVE-2019-5717/" source="CVE"/>
		<reference ref_id="CVE-2019-5718" ref_url="https://www.suse.com/security/cve/CVE-2019-5718/" source="CVE"/>
		<reference ref_id="CVE-2019-5719" ref_url="https://www.suse.com/security/cve/CVE-2019-5719/" source="CVE"/>
		<reference ref_id="CVE-2019-5721" ref_url="https://www.suse.com/security/cve/CVE-2019-5721/" source="CVE"/>
		<description>
This update for wireshark to version 2.4.12 fixes the following issues:

Security issues fixed:

- CVE-2019-5717: Fixed a denial of service in the P_MUL dissector (bsc#1121232)
- CVE-2019-5718: Fixed a denial of service in the RTSE dissector and other dissectors (bsc#1121233)
- CVE-2019-5719: Fixed a denial of service in the ISAKMP dissector (bsc#1121234)
- CVE-2019-5721: Fixed a denial of service in the ISAKMP dissector (bsc#1121235)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-21"/>
	<updated date="2019-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1121232">SUSE bug 1121232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121233">SUSE bug 1121233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121234">SUSE bug 1121234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121235">SUSE bug 1121235</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5717/">CVE-2019-5717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5717">CVE-2019-5717 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5718/">CVE-2019-5718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5718">CVE-2019-5718 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5719/">CVE-2019-5719 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5719">CVE-2019-5719 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5721/">CVE-2019-5721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5721">CVE-2019-5721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521218" comment="libwireshark9-2.4.12-48.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521219" comment="libwiretap7-2.4.12-48.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521220" comment="libwscodecs1-2.4.12-48.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521221" comment="libwsutil8-2.4.12-48.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521222" comment="wireshark-2.4.12-48.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521223" comment="wireshark-gtk-2.4.12-48.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151964" version="1" class="patch">
	<metadata>
		<title>Security update for axis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1134598" ref_url="https://bugzilla.suse.com/1134598" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5784" ref_url="https://www.suse.com/security/cve/CVE-2012-5784/" source="CVE"/>
		<reference ref_id="CVE-2014-3596" ref_url="https://www.suse.com/security/cve/CVE-2014-3596/" source="CVE"/>
		<description>
This update for axis fixes the following issues:

Security issue fixed:

- CVE-2012-5784, CVE-2014-3596: Fixed missing connection hostname check against X.509 certificate name (bsc#1134598).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-30"/>
	<updated date="2019-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1134598">SUSE bug 1134598</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2012-5784/">CVE-2012-5784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5784">CVE-2012-5784 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3596/">CVE-2014-3596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3596">CVE-2014-3596 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554046" comment="axis-1.4-290.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151965" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1135824" ref_url="https://bugzilla.suse.com/1135824" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691/" source="CVE"/>
		<reference ref_id="CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692/" source="CVE"/>
		<reference ref_id="CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693/" source="CVE"/>
		<reference ref_id="CVE-2019-11694" ref_url="https://www.suse.com/security/cve/CVE-2019-11694/" source="CVE"/>
		<reference ref_id="CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800/" source="CVE"/>
		<reference ref_id="CVE-2019-9815" ref_url="https://www.suse.com/security/cve/CVE-2019-9815/" source="CVE"/>
		<reference ref_id="CVE-2019-9816" ref_url="https://www.suse.com/security/cve/CVE-2019-9816/" source="CVE"/>
		<reference ref_id="CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817/" source="CVE"/>
		<reference ref_id="CVE-2019-9818" ref_url="https://www.suse.com/security/cve/CVE-2019-9818/" source="CVE"/>
		<reference ref_id="CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819/" source="CVE"/>
		<reference ref_id="CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

- CVE-2019-11691: Use-after-free in XMLHttpRequest
- CVE-2019-11692: Use-after-free removing listeners in the event listener manager
- CVE-2019-11693: Buffer overflow in WebGL bufferdata on Linux
- CVE-2019-11694: Uninitialized memory memory leakage in Windows sandbox
- CVE-2019-11698: Theft of user history data through drag and drop of hyperlinks to and from bookmarks
- CVE-2019-7317: Use-after-free in png_image_free of libpng library
- CVE-2019-9800: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7
- CVE-2019-9815: Disable hyperthreading on content JavaScript threads on macOS
- CVE-2019-9816: Type confusion with object groups and UnboxedObjects
- CVE-2019-9817: Stealing of cross-domain images using canvas
- CVE-2019-9818: Use-after-free in crash generation server
- CVE-2019-9819: Compartment mismatch with fetch API
- CVE-2019-9820: Use-after-free of ChromeEventHandler by DocShell

Non-security issues fixed:

- Font and date adjustments to accommodate the new Reiwa era in Japan
- Update to Firefox ESR 60.7 (bsc#1135824)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11691">CVE-2019-11691 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11692">CVE-2019-11692 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11693">CVE-2019-11693 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11694/">CVE-2019-11694 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11694">CVE-2019-11694 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11698">CVE-2019-11698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9800">CVE-2019-9800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9815/">CVE-2019-9815 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9815">CVE-2019-9815 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9816/">CVE-2019-9816 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9816">CVE-2019-9816 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9817">CVE-2019-9817 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9818/">CVE-2019-9818 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9818">CVE-2019-9818 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9819">CVE-2019-9819 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9820">CVE-2019-9820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151966" version="1" class="patch">
	<metadata>
		<title>Security update for gnome-shell (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1124493" ref_url="https://bugzilla.suse.com/1124493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3820" ref_url="https://www.suse.com/security/cve/CVE-2019-3820/" source="CVE"/>
		<description>
This update for gnome-shell fixes the following issues:

Security issue fixed:

- CVE-2019-3820: Fixed a partial lock screen bypass (bsc#1124493).

Fixed bugs:

- Remove sessionList of endSessionDialog for security reasons (jsc#SLE-6660).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124493">SUSE bug 1124493</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3820/">CVE-2019-3820 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3820">CVE-2019-3820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521226" comment="gnome-shell-3.20.4-77.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521227" comment="gnome-shell-browser-plugin-3.20.4-77.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521229" comment="gnome-shell-lang-3.20.4-77.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151967" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1134297" ref_url="https://bugzilla.suse.com/1134297" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Update to 2.6.18 - OpenJDK 7u221 (April 2019 CPU)

Security issues fixed:

- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw inside the RMI registry implementation (bsc#1132732).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2422: Fixed memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed a Divide By Zero in alloc_sarray function in jmemmgr.c (bsc#1122299).
- CVE-2019-2426: Improve web server connections (bsc#1134297).

Bug fixes:

- Please check the package Changelog for detailed information.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134297">SUSE bug 1134297</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2422">CVE-2019-2422 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2426">CVE-2019-2426 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2602">CVE-2019-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2684">CVE-2019-2684 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2698">CVE-2019-2698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521232" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530522" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530523" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521233" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151968" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_jk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1114612" ref_url="https://bugzilla.suse.com/1114612" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11759" ref_url="https://www.suse.com/security/cve/CVE-2018-11759/" source="CVE"/>
		<description>
This update for apache2-mod_jk fixes the following issue:

Security issue fixed:

- CVE-2018-11759: Fixed connector path traversal due to mishandled HTTP requests in httpd (bsc#1114612).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1114612">SUSE bug 1114612</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11759/">CVE-2018-11759 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11759">CVE-2018-11759 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557312" comment="apache2-mod_jk-1.2.40-7.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151969" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104129" ref_url="https://bugzilla.suse.com/1104129" source="BUGZILLA"/>
		<reference ref_id="1126068" ref_url="https://bugzilla.suse.com/1126068" source="BUGZILLA"/>
		<reference ref_id="1126069" ref_url="https://bugzilla.suse.com/1126069" source="BUGZILLA"/>
		<reference ref_id="1133185" ref_url="https://bugzilla.suse.com/1133185" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5740" ref_url="https://www.suse.com/security/cve/CVE-2018-5740/" source="CVE"/>
		<reference ref_id="CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743/" source="CVE"/>
		<reference ref_id="CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745/" source="CVE"/>
		<reference ref_id="CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

Security issues fixed:

- CVE-2018-5740: Fixed a denial of service vulnerability in the 'deny-answer-aliases' feature (bsc#1104129).
- CVE-2019-6465: Fixed an issue where controls for zone transfers may not be properly applied to Dynamically Loadable Zones (bsc#1126069).
- CVE-2018-5745: An assertion failure can occur if a trust anchor rolls over to an unsupported key algorithm when using managed-keys. (bsc#1126068)
- CVE-2018-5743: Limiting simultaneous TCP clients is ineffective. (bsc#1133185)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-03"/>
	<updated date="2019-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104129">SUSE bug 1104129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126068">SUSE bug 1126068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126069">SUSE bug 1126069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133185">SUSE bug 1133185</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5740/">CVE-2018-5740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5740">CVE-2018-5740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5743">CVE-2018-5743 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-5745">CVE-2018-5745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6465">CVE-2019-6465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530524" comment="bind-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530525" comment="bind-chrootenv-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530526" comment="bind-doc-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521234" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521235" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151970" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130847" ref_url="https://bugzilla.suse.com/1130847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-9948: Fixed a 'file:' blacklist bypass in URIs by using the 'local-file:' scheme instead (bsc#1130847).
- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-06"/>
	<updated date="2019-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636">CVE-2019-9636 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9948">CVE-2019-9948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521236" comment="libpython2_7-1_0-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521237" comment="libpython2_7-1_0-32bit-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521238" comment="python-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530548" comment="python-32bit-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521239" comment="python-base-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530549" comment="python-base-32bit-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521240" comment="python-curses-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530550" comment="python-demo-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530551" comment="python-doc-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530552" comment="python-doc-pdf-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530553" comment="python-gdbm-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530554" comment="python-idle-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521242" comment="python-tk-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521243" comment="python-xml-2.7.13-28.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151971" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122319" ref_url="https://bugzilla.suse.com/1122319" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6116" ref_url="https://www.suse.com/security/cve/CVE-2019-6116/" source="CVE"/>
		<description>
This update for ghostscript to version 9.26a fixes the following issues:

Security issue fixed:

- CVE-2019-6116: subroutines within pseudo-operators must themselves be pseudo-operators (bsc#1122319)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-23"/>
	<updated date="2019-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122319">SUSE bug 1122319</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6116/">CVE-2019-6116 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6116">CVE-2019-6116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521244" comment="ghostscript-9.26a-23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521245" comment="ghostscript-x11-9.26a-23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521246" comment="libspectre1-0.2.7-12.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151972" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1137443" ref_url="https://bugzilla.suse.com/1137443" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<description>
This update for vim fixes the following issue:

Security issue fixed: 

- CVE-2019-12735: Fixed a potential arbitrary code execution vulnerability in getchar.c (bsc#1137443).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137443">SUSE bug 1137443</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12735">CVE-2019-12735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521427" comment="gvim-7.4.326-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521428" comment="vim-7.4.326-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521429" comment="vim-data-7.4.326-17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151973" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1119553" ref_url="https://bugzilla.suse.com/1119553" source="BUGZILLA"/>
		<reference ref_id="1119554" ref_url="https://bugzilla.suse.com/1119554" source="BUGZILLA"/>
		<reference ref_id="1119555" ref_url="https://bugzilla.suse.com/1119555" source="BUGZILLA"/>
		<reference ref_id="1119556" ref_url="https://bugzilla.suse.com/1119556" source="BUGZILLA"/>
		<reference ref_id="1119557" ref_url="https://bugzilla.suse.com/1119557" source="BUGZILLA"/>
		<reference ref_id="1119558" ref_url="https://bugzilla.suse.com/1119558" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4437" ref_url="https://www.suse.com/security/cve/CVE-2018-4437/" source="CVE"/>
		<reference ref_id="CVE-2018-4438" ref_url="https://www.suse.com/security/cve/CVE-2018-4438/" source="CVE"/>
		<reference ref_id="CVE-2018-4441" ref_url="https://www.suse.com/security/cve/CVE-2018-4441/" source="CVE"/>
		<reference ref_id="CVE-2018-4442" ref_url="https://www.suse.com/security/cve/CVE-2018-4442/" source="CVE"/>
		<reference ref_id="CVE-2018-4443" ref_url="https://www.suse.com/security/cve/CVE-2018-4443/" source="CVE"/>
		<reference ref_id="CVE-2018-4464" ref_url="https://www.suse.com/security/cve/CVE-2018-4464/" source="CVE"/>
		<description>
This update for webkit2gtk3 to version 2.22.5 fixes the following issues:

Security issues fixed:

- CVE-2018-4438: Fixed a logic issue which lead to memory corruption (bsc#1119554)
- CVE-2018-4437, CVE-2018-4441, CVE-2018-4442, CVE-2018-4443, CVE-2018-4464: 
  Fixed multiple memory corruption issues with improved memory handling 
  (bsc#1119553, bsc#1119555, bsc#1119556, bsc#1119557, bsc#1119558)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-23"/>
	<updated date="2019-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119553">SUSE bug 1119553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119554">SUSE bug 1119554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119555">SUSE bug 1119555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119556">SUSE bug 1119556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119557">SUSE bug 1119557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119558">SUSE bug 1119558</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4437/">CVE-2018-4437 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4437">CVE-2018-4437 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4438/">CVE-2018-4438 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4438">CVE-2018-4438 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4441/">CVE-2018-4441 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4441">CVE-2018-4441 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4442/">CVE-2018-4442 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4442">CVE-2018-4442 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4443/">CVE-2018-4443 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4443">CVE-2018-4443 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4464/">CVE-2018-4464 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4464">CVE-2018-4464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521430" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521431" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521433" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521434" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521435" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151974" version="1" class="patch">
	<metadata>
		<title>Security update for libcroco (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1034481" ref_url="https://bugzilla.suse.com/1034481" source="BUGZILLA"/>
		<reference ref_id="1034482" ref_url="https://bugzilla.suse.com/1034482" source="BUGZILLA"/>
		<reference ref_id="1043898" ref_url="https://bugzilla.suse.com/1043898" source="BUGZILLA"/>
		<reference ref_id="1043899" ref_url="https://bugzilla.suse.com/1043899" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7960" ref_url="https://www.suse.com/security/cve/CVE-2017-7960/" source="CVE"/>
		<reference ref_id="CVE-2017-7961" ref_url="https://www.suse.com/security/cve/CVE-2017-7961/" source="CVE"/>
		<reference ref_id="CVE-2017-8834" ref_url="https://www.suse.com/security/cve/CVE-2017-8834/" source="CVE"/>
		<reference ref_id="CVE-2017-8871" ref_url="https://www.suse.com/security/cve/CVE-2017-8871/" source="CVE"/>
		<description>
This update for libcroco fixes the following issues:

Security issues fixed:

- CVE-2017-7960: Fixed heap overflow (input: check end of input before reading a byte) (bsc#1034481).                                                                    
- CVE-2017-7961: Fixed undefined behavior (tknzr: support only max long rgb values) (bsc#1034482).                                                                       
- CVE-2017-8834: Fixed denial of service (memory allocation error) via a crafted CSS file (bsc#1043898).
- CVE-2017-8871: Fixed denial of service (infinite loop and CPU consumption) via a crafted CSS file (bsc#1043899).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-12"/>
	<updated date="2019-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034481">SUSE bug 1034481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034482">SUSE bug 1034482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043898">SUSE bug 1043898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043899">SUSE bug 1043899</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7960/">CVE-2017-7960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7960">CVE-2017-7960 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7961/">CVE-2017-7961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7961">CVE-2017-7961 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8834/">CVE-2017-8834 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8834">CVE-2017-8834 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8871/">CVE-2017-8871 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8871">CVE-2017-8871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521436" comment="libcroco-0_6-3-0.6.11-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521437" comment="libcroco-0_6-3-32bit-0.6.11-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151975" version="1" class="patch">
	<metadata>
		<title>Security update for sssd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1124194" ref_url="https://bugzilla.suse.com/1124194" source="BUGZILLA"/>
		<reference ref_id="1132879" ref_url="https://bugzilla.suse.com/1132879" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16838" ref_url="https://www.suse.com/security/cve/CVE-2018-16838/" source="CVE"/>
		<description>
This update for sssd fixes the following issues:

Security issue fixed:

- CVE-2018-16838: Fixed an authentication bypass related to the Group Policy Objects implementation (bsc#1124194).

Non-security issue fixed:

- Create directory to download and cache GPOs (bsc#1132879)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-12"/>
	<updated date="2019-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124194">SUSE bug 1124194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132879">SUSE bug 1132879</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16838/">CVE-2018-16838 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16838">CVE-2018-16838 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521438" comment="libipa_hbac0-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521439" comment="libsss_idmap0-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521440" comment="libsss_nss_idmap0-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521441" comment="libsss_sudo-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521442" comment="python-sssd-config-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521443" comment="sssd-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521444" comment="sssd-ad-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521445" comment="sssd-ipa-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521446" comment="sssd-krb5-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521447" comment="sssd-krb5-common-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521448" comment="sssd-ldap-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521449" comment="sssd-proxy-1.13.4-34.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521450" comment="sssd-tools-1.13.4-34.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151976" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1134689" ref_url="https://bugzilla.suse.com/1134689" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10130" ref_url="https://www.suse.com/security/cve/CVE-2019-10130/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

Security issue fixed:

- CVE-2019-10130: Prevent row-level security policies from being bypassed via selectivity estimators (bsc#1134689).

Bug fixes:

- For a complete list of fixes check the release notes.
  * https://www.postgresql.org/docs/10/release-10-8.html
  * https://www.postgresql.org/docs/10/release-10-7.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-14"/>
	<updated date="2019-06-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1134689">SUSE bug 1134689</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10130/">CVE-2019-10130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10130">CVE-2019-10130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521451" comment="libecpg6-10.8-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521452" comment="libpq5-10.8-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521453" comment="libpq5-32bit-10.8-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521454" comment="postgresql10-10.8-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557313" comment="postgresql10-contrib-10.8-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554105" comment="postgresql10-docs-10.8-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557314" comment="postgresql10-server-10.8-1.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151977" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1065237" ref_url="https://bugzilla.suse.com/1065237" source="BUGZILLA"/>
		<reference ref_id="1090671" ref_url="https://bugzilla.suse.com/1090671" source="BUGZILLA"/>
		<reference ref_id="1119183" ref_url="https://bugzilla.suse.com/1119183" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="1131709" ref_url="https://bugzilla.suse.com/1131709" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<description>
This update for openssh fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6109: Fixed an character encoding issue in the progress display of
  the scp client that could be used to manipulate client output, allowing
  for spoofing during file transfers (bsc#1121816).
- CVE-2019-6111: Properly validate object names received by the scp client to
  prevent arbitrary file overwrites when interacting with a malicious SSH server
  (bsc#1121821).

Other issues fixed: 

- Fixed two race conditions in sshd relating to SIGHUP (bsc#1119183).
- Returned proper reason for port forwarding failures (bsc#1090671).
- Fixed a double free() in the KDF CAVS testing tool (bsc#1065237).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-17"/>
	<updated date="2019-06-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1065237">SUSE bug 1065237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090671">SUSE bug 1090671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119183">SUSE bug 1119183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131709">SUSE bug 1131709</bugzilla>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6109">CVE-2019-6109 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6111">CVE-2019-6111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521455" comment="openssh-7.2p2-74.42.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521456" comment="openssh-askpass-gnome-7.2p2-74.42.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530557" comment="openssh-fips-7.2p2-74.42.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521457" comment="openssh-helpers-7.2p2-74.42.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151978" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1135273" ref_url="https://bugzilla.suse.com/1135273" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Sampling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the libvirt adjustments, that pass through the new 'md-clear' CPU flag (bsc#1135273).

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-18"/>
	<updated date="2019-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135273">SUSE bug 1135273</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521465" comment="libvirt-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521466" comment="libvirt-admin-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521467" comment="libvirt-client-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521468" comment="libvirt-daemon-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521469" comment="libvirt-daemon-config-network-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521470" comment="libvirt-daemon-config-nwfilter-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521471" comment="libvirt-daemon-driver-interface-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521472" comment="libvirt-daemon-driver-libxl-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521473" comment="libvirt-daemon-driver-lxc-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521474" comment="libvirt-daemon-driver-network-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521475" comment="libvirt-daemon-driver-nodedev-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521476" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521477" comment="libvirt-daemon-driver-qemu-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521478" comment="libvirt-daemon-driver-secret-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521479" comment="libvirt-daemon-driver-storage-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521480" comment="libvirt-daemon-driver-storage-core-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521481" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521482" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521483" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521484" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521485" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521486" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557315" comment="libvirt-daemon-hooks-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521487" comment="libvirt-daemon-lxc-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521488" comment="libvirt-daemon-qemu-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521489" comment="libvirt-daemon-xen-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521490" comment="libvirt-doc-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521491" comment="libvirt-libs-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557316" comment="libvirt-lock-sanlock-3.3.0-5.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557317" comment="libvirt-nss-3.3.0-5.33.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151979" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1133375" ref_url="https://bugzilla.suse.com/1133375" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<description>
This update for gstreamer-plugins-base fixes the following issue:
Security issue fixed:

- CVE-2019-9928: Fixed a heap-based overflow in the rtsp connection parser (bsc#1133375).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9928">CVE-2019-9928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521493" comment="gstreamer-plugins-base-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521494" comment="gstreamer-plugins-base-lang-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521495" comment="libgstallocators-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521496" comment="libgstapp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521497" comment="libgstapp-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521498" comment="libgstaudio-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521499" comment="libgstaudio-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521500" comment="libgstfft-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521502" comment="libgstpbutils-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521503" comment="libgstpbutils-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521504" comment="libgstriff-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521505" comment="libgstrtp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521506" comment="libgstrtsp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521507" comment="libgstsdp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521508" comment="libgsttag-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521509" comment="libgsttag-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521510" comment="libgstvideo-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521511" comment="libgstvideo-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151980" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1136976" ref_url="https://bugzilla.suse.com/1136976" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issue fixed:	  

- CVE-2019-8457: Fixed a Heap out-of-bound read in rtreenode() when handling invalid rtree tables (bsc#1136976).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136976">SUSE bug 1136976</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8457">CVE-2019-8457 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521516" comment="libsqlite3-0-3.8.10.2-9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521517" comment="libsqlite3-0-32bit-3.8.10.2-9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521518" comment="sqlite3-3.8.10.2-9.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151981" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1136570" ref_url="https://bugzilla.suse.com/1136570" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issues:

- Fix the previous fix for CVE-2019-3860 (bsc#1136570, bsc#1128481)
  (Out-of-bounds reads with specially crafted SFTP packets)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-21"/>
	<updated date="2019-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3860">CVE-2019-3860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521526" comment="libssh2-1-1.4.3-20.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521924" comment="libssh2-1-32bit-1.4.3-20.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151982" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1136021" ref_url="https://bugzilla.suse.com/1136021" source="BUGZILLA"/>
		<description>
This update for wireshark to version 2.4.15 fixes the following issues:

Security issue fixed:

- Fixed a denial of service in the dissection engine (bsc#1136021). 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1136021">SUSE bug 1136021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521528" comment="libwireshark9-2.4.15-48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521529" comment="libwiretap7-2.4.15-48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521530" comment="libwscodecs1-2.4.15-48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521531" comment="libwsutil8-2.4.15-48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521532" comment="wireshark-2.4.15-48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521533" comment="wireshark-gtk-2.4.15-48.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151983" version="1" class="patch">
	<metadata>
		<title>Recommended update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1137792" ref_url="https://bugzilla.suse.com/1137792" source="BUGZILLA"/>
		<reference ref_id="1138614" ref_url="https://bugzilla.suse.com/1138614" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707/" source="CVE"/>
		<description>
This update for MozillaFirefox to version 60.7.1 fixes the following issues:

Security issue fixed:    

- CVE-2019-11707: Fixed a type confusion vulnerability in Arrary.pop (bsc#1138614)    

Other issue addressed: 

- Fixed broken language plugins (bsc#1137792)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1137792">SUSE bug 1137792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138614">SUSE bug 1138614</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11707">CVE-2019-11707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562509" comment="MozillaFirefox-60.7.1-109.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562510" comment="MozillaFirefox-translations-common-60.7.1-109.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151984" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1132734" ref_url="https://bugzilla.suse.com/1132734" source="BUGZILLA"/>
		<reference ref_id="1134718" ref_url="https://bugzilla.suse.com/1134718" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10245" ref_url="https://www.suse.com/security/cve/CVE-2019-10245/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2697" ref_url="https://www.suse.com/security/cve/CVE-2019-2697/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 5 Fix Pack 35.

Security issues fixed:

- CVE-2019-10245: Fixed Java bytecode verifier issue causing crashes (bsc#1134718).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2697: Fixed flaw inside the 2D component (bsc#1132734).
- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw was found in the RMI registry implementation (bsc#1132732).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132734">SUSE bug 1132734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10245/">CVE-2019-10245 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10245">CVE-2019-10245 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2602">CVE-2019-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2684">CVE-2019-2684 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2697/">CVE-2019-2697 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2697">CVE-2019-2697 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2698">CVE-2019-2698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530570" comment="java-1_8_0-ibm-1.8.0_sr5.35-30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530571" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.35-30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530573" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.35-30.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151985" version="1" class="patch">
	<metadata>
		<title>Security update for netpbm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1024288" ref_url="https://bugzilla.suse.com/1024288" source="BUGZILLA"/>
		<reference ref_id="1024291" ref_url="https://bugzilla.suse.com/1024291" source="BUGZILLA"/>
		<reference ref_id="1086777" ref_url="https://bugzilla.suse.com/1086777" source="BUGZILLA"/>
		<reference ref_id="1136936" ref_url="https://bugzilla.suse.com/1136936" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2579" ref_url="https://www.suse.com/security/cve/CVE-2017-2579/" source="CVE"/>
		<reference ref_id="CVE-2017-2580" ref_url="https://www.suse.com/security/cve/CVE-2017-2580/" source="CVE"/>
		<reference ref_id="CVE-2018-8975" ref_url="https://www.suse.com/security/cve/CVE-2018-8975/" source="CVE"/>
		<description>
This update for netpbm fixes the following issues:

Security issues fixed:

- CVE-2018-8975: The pm_mallocarray2 function allowed remote attackers to cause
  a denial of service (heap-based buffer over-read) via a crafted image file (bsc#1086777).
- CVE-2017-2579: Fixed out-of-bounds read in expandCodeOntoStack() (bsc#1024288).
- CVE-2017-2580: Fixed out-of-bounds write of heap data in addPixelToRaster() function (bsc#1024291).

- create netpbm-vulnerable subpackage and move pstopnm there (bsc#1136936)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024288">SUSE bug 1024288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024291">SUSE bug 1024291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086777">SUSE bug 1086777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136936">SUSE bug 1136936</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2579/">CVE-2017-2579 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2579">CVE-2017-2579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2580/">CVE-2017-2580 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2580">CVE-2017-2580 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8975/">CVE-2018-8975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8975">CVE-2018-8975 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521534" comment="libnetpbm11-10.66.3-8.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521535" comment="libnetpbm11-32bit-10.66.3-8.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521536" comment="netpbm-10.66.3-8.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151986" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1138872" ref_url="https://bugzilla.suse.com/1138872" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Mozilla Firefox Firefox 60.7.2
  MFSA 2019-19 (bsc#1138872)

- CVE-2019-11708: Fix sandbox escape using Prompt:Open.
  * Insufficient vetting of parameters passed with the Prompt:Open IPC
    message between child and parent processes could result in the non-sandboxed
    parent process opening web content chosen by a compromised child process.
    When combined with additional vulnerabilities this could result in executing
    arbitrary code on the user's computer.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-22"/>
	<updated date="2019-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138872">SUSE bug 1138872</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11708">CVE-2019-11708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521537" comment="MozillaFirefox-60.7.2-109.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521538" comment="MozillaFirefox-translations-common-60.7.2-109.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151987" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1134689" ref_url="https://bugzilla.suse.com/1134689" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10130" ref_url="https://www.suse.com/security/cve/CVE-2019-10130/" source="CVE"/>
		<description>
This update for postgresql96 fixes the following issues:

Security issue fixed:

- CVE-2019-10130: Prevent row-level security policies from being bypassed via selectivity estimators (bsc#1134689).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-24"/>
	<updated date="2019-06-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1134689">SUSE bug 1134689</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10130/">CVE-2019-10130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10130">CVE-2019-10130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521539" comment="postgresql96-9.6.13-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557318" comment="postgresql96-contrib-9.6.13-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554181" comment="postgresql96-docs-9.6.13-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557319" comment="postgresql96-server-9.6.13-3.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151988" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1133204" ref_url="https://bugzilla.suse.com/1133204" source="BUGZILLA"/>
		<reference ref_id="1133205" ref_url="https://bugzilla.suse.com/1133205" source="BUGZILLA"/>
		<reference ref_id="1133498" ref_url="https://bugzilla.suse.com/1133498" source="BUGZILLA"/>
		<reference ref_id="1133501" ref_url="https://bugzilla.suse.com/1133501" source="BUGZILLA"/>
		<reference ref_id="1134075" ref_url="https://bugzilla.suse.com/1134075" source="BUGZILLA"/>
		<reference ref_id="1135232" ref_url="https://bugzilla.suse.com/1135232" source="BUGZILLA"/>
		<reference ref_id="1135236" ref_url="https://bugzilla.suse.com/1135236" source="BUGZILLA"/>
		<reference ref_id="1136183" ref_url="https://bugzilla.suse.com/1136183" source="BUGZILLA"/>
		<reference ref_id="1136732" ref_url="https://bugzilla.suse.com/1136732" source="BUGZILLA"/>
		<reference ref_id="1138425" ref_url="https://bugzilla.suse.com/1138425" source="BUGZILLA"/>
		<reference ref_id="1138464" ref_url="https://bugzilla.suse.com/1138464" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12805" ref_url="https://www.suse.com/security/cve/CVE-2017-12805/" source="CVE"/>
		<reference ref_id="CVE-2017-12806" ref_url="https://www.suse.com/security/cve/CVE-2017-12806/" source="CVE"/>
		<reference ref_id="CVE-2019-10131" ref_url="https://www.suse.com/security/cve/CVE-2019-10131/" source="CVE"/>
		<reference ref_id="CVE-2019-11470" ref_url="https://www.suse.com/security/cve/CVE-2019-11470/" source="CVE"/>
		<reference ref_id="CVE-2019-11472" ref_url="https://www.suse.com/security/cve/CVE-2019-11472/" source="CVE"/>
		<reference ref_id="CVE-2019-11505" ref_url="https://www.suse.com/security/cve/CVE-2019-11505/" source="CVE"/>
		<reference ref_id="CVE-2019-11506" ref_url="https://www.suse.com/security/cve/CVE-2019-11506/" source="CVE"/>
		<reference ref_id="CVE-2019-11597" ref_url="https://www.suse.com/security/cve/CVE-2019-11597/" source="CVE"/>
		<reference ref_id="CVE-2019-11598" ref_url="https://www.suse.com/security/cve/CVE-2019-11598/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-11597: Fixed a heap-based buffer over-read in the WriteTIFFImage() (bsc#1138464).
- Fixed a file content disclosure via SVG and WMF decoding (bsc#1138425).- CVE-2019-11472: Fixed a denial of service in ReadXWDImage() (bsc#1133204).
- CVE-2019-11470: Fixed a denial of service in ReadCINImage() (bsc#1133205).
- CVE-2019-11506: Fixed a heap-based buffer overflow in the WriteMATLABImage() (bsc#1133498).
- CVE-2019-11505: Fixed a heap-based buffer overflow in the WritePDBImage() (bsc#1133501).
- CVE-2019-10131: Fixed a off-by-one read in formatIPTCfromBuffer function in coders/meta.c (bsc#1134075).
- CVE-2017-12806: Fixed a denial of service through memory exhaustion in format8BIM() (bsc#1135232).
- CVE-2017-12805: Fixed a denial of service through memory exhaustion in ReadTIFFImage() (bsc#1135236).
- CVE-2019-11598: Fixed a heap-based buffer over-read in WritePNMImage() (bsc#1136732)
    
We also now disable PCL in the -SUSE configuration, as it also uses ghostscript for decoding (bsc#1136183)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-25"/>
	<updated date="2019-06-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133205">SUSE bug 1133205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133498">SUSE bug 1133498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133501">SUSE bug 1133501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134075">SUSE bug 1134075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135232">SUSE bug 1135232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135236">SUSE bug 1135236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136183">SUSE bug 1136183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136732">SUSE bug 1136732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138425">SUSE bug 1138425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138464">SUSE bug 1138464</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12805/">CVE-2017-12805 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12805">CVE-2017-12805 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12806/">CVE-2017-12806 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12806">CVE-2017-12806 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10131/">CVE-2019-10131 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10131">CVE-2019-10131 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11470/">CVE-2019-11470 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11470">CVE-2019-11470 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11472/">CVE-2019-11472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11472">CVE-2019-11472 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11505/">CVE-2019-11505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11505">CVE-2019-11505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11506/">CVE-2019-11506 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11506">CVE-2019-11506 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11597/">CVE-2019-11597 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11597">CVE-2019-11597 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11598/">CVE-2019-11598 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11598">CVE-2019-11598 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521541" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.123.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521542" comment="ImageMagick-config-6-upstream-6.8.8.1-71.123.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521544" comment="libMagickCore-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521546" comment="libMagickWand-6_Q16-1-6.8.8.1-71.123.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151989" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1054429" ref_url="https://bugzilla.suse.com/1054429" source="BUGZILLA"/>
		<reference ref_id="1076958" ref_url="https://bugzilla.suse.com/1076958" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15107" ref_url="https://www.suse.com/security/cve/CVE-2017-15107/" source="CVE"/>
		<description>
This update for dnsmasq fixes the following issues:

Security issue fixed:

- CVE-2017-15107: Fixed a vulnerability in DNSSEC implementation. Processing of
  wildcard synthesized NSEC records may result improper validation for non-existance. (bsc#1076958)

Non-security issue fixed:

- Reload system dbus to pick up policy change on install (bsc#1054429).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-02"/>
	<updated date="2019-07-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054429">SUSE bug 1054429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076958">SUSE bug 1076958</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15107/">CVE-2017-15107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15107">CVE-2017-15107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521547" comment="dnsmasq-2.78-18.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151990" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1061599" ref_url="https://bugzilla.suse.com/1061599" source="BUGZILLA"/>
		<reference ref_id="1107116" ref_url="https://bugzilla.suse.com/1107116" source="BUGZILLA"/>
		<reference ref_id="1107121" ref_url="https://bugzilla.suse.com/1107121" source="BUGZILLA"/>
		<reference ref_id="1137001" ref_url="https://bugzilla.suse.com/1137001" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16428" ref_url="https://www.suse.com/security/cve/CVE-2018-16428/" source="CVE"/>
		<reference ref_id="CVE-2018-16429" ref_url="https://www.suse.com/security/cve/CVE-2018-16429/" source="CVE"/>
		<reference ref_id="CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450/" source="CVE"/>
		<description>
This update for glib2 provides the following fix:


Security issues fixed:

- CVE-2019-12450: Fixed an improper file permission when copy operation
  takes place (bsc#1137001).     
- CVE-2018-16428: Avoid a null pointer dereference that could crash glib2 users in markup processing (bnc#1107121).
- CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116).

Non-security issues fixed:

- Install dummy *-mimeapps.list files to prevent dead symlinks. (bsc#1061599)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-02"/>
	<updated date="2019-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1061599">SUSE bug 1061599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107116">SUSE bug 1107116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107121">SUSE bug 1107121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137001">SUSE bug 1137001</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16428/">CVE-2018-16428 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16428">CVE-2018-16428 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16429/">CVE-2018-16429 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16429">CVE-2018-16429 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12450">CVE-2019-12450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521548" comment="glib2-lang-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521549" comment="glib2-tools-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521550" comment="libgio-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521551" comment="libgio-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521553" comment="libglib-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521554" comment="libglib-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521555" comment="libgmodule-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521556" comment="libgmodule-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521557" comment="libgobject-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521558" comment="libgobject-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521559" comment="libgthread-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521560" comment="libgthread-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151991" version="1" class="patch">
	<metadata>
		<title>Security update for elfutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1030472" ref_url="https://bugzilla.suse.com/1030472" source="BUGZILLA"/>
		<reference ref_id="1030476" ref_url="https://bugzilla.suse.com/1030476" source="BUGZILLA"/>
		<reference ref_id="1033084" ref_url="https://bugzilla.suse.com/1033084" source="BUGZILLA"/>
		<reference ref_id="1033085" ref_url="https://bugzilla.suse.com/1033085" source="BUGZILLA"/>
		<reference ref_id="1033087" ref_url="https://bugzilla.suse.com/1033087" source="BUGZILLA"/>
		<reference ref_id="1033088" ref_url="https://bugzilla.suse.com/1033088" source="BUGZILLA"/>
		<reference ref_id="1033089" ref_url="https://bugzilla.suse.com/1033089" source="BUGZILLA"/>
		<reference ref_id="1033090" ref_url="https://bugzilla.suse.com/1033090" source="BUGZILLA"/>
		<reference ref_id="1106390" ref_url="https://bugzilla.suse.com/1106390" source="BUGZILLA"/>
		<reference ref_id="1107067" ref_url="https://bugzilla.suse.com/1107067" source="BUGZILLA"/>
		<reference ref_id="1111973" ref_url="https://bugzilla.suse.com/1111973" source="BUGZILLA"/>
		<reference ref_id="1112723" ref_url="https://bugzilla.suse.com/1112723" source="BUGZILLA"/>
		<reference ref_id="1112726" ref_url="https://bugzilla.suse.com/1112726" source="BUGZILLA"/>
		<reference ref_id="1123685" ref_url="https://bugzilla.suse.com/1123685" source="BUGZILLA"/>
		<reference ref_id="1125007" ref_url="https://bugzilla.suse.com/1125007" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10254" ref_url="https://www.suse.com/security/cve/CVE-2016-10254/" source="CVE"/>
		<reference ref_id="CVE-2016-10255" ref_url="https://www.suse.com/security/cve/CVE-2016-10255/" source="CVE"/>
		<reference ref_id="CVE-2017-7607" ref_url="https://www.suse.com/security/cve/CVE-2017-7607/" source="CVE"/>
		<reference ref_id="CVE-2017-7608" ref_url="https://www.suse.com/security/cve/CVE-2017-7608/" source="CVE"/>
		<reference ref_id="CVE-2017-7610" ref_url="https://www.suse.com/security/cve/CVE-2017-7610/" source="CVE"/>
		<reference ref_id="CVE-2017-7611" ref_url="https://www.suse.com/security/cve/CVE-2017-7611/" source="CVE"/>
		<reference ref_id="CVE-2017-7612" ref_url="https://www.suse.com/security/cve/CVE-2017-7612/" source="CVE"/>
		<reference ref_id="CVE-2017-7613" ref_url="https://www.suse.com/security/cve/CVE-2017-7613/" source="CVE"/>
		<reference ref_id="CVE-2018-16062" ref_url="https://www.suse.com/security/cve/CVE-2018-16062/" source="CVE"/>
		<reference ref_id="CVE-2018-16403" ref_url="https://www.suse.com/security/cve/CVE-2018-16403/" source="CVE"/>
		<reference ref_id="CVE-2018-18310" ref_url="https://www.suse.com/security/cve/CVE-2018-18310/" source="CVE"/>
		<reference ref_id="CVE-2018-18520" ref_url="https://www.suse.com/security/cve/CVE-2018-18520/" source="CVE"/>
		<reference ref_id="CVE-2018-18521" ref_url="https://www.suse.com/security/cve/CVE-2018-18521/" source="CVE"/>
		<reference ref_id="CVE-2019-7150" ref_url="https://www.suse.com/security/cve/CVE-2019-7150/" source="CVE"/>
		<reference ref_id="CVE-2019-7665" ref_url="https://www.suse.com/security/cve/CVE-2019-7665/" source="CVE"/>
		<description>
This update for elfutils fixes the following issues:

Security issues fixed: 	  

- CVE-2018-16403: Fixed a heap-based buffer over-read that could have led to Denial of Service (bsc#1107067).  
- CVE-2016-10254: Fixed a memory allocation failure in alloxate_elf (bsc#1030472).
- CVE-2019-7665: NT_PLATFORM core file note should be a zero terminated string (bsc#1125007).
- CVE-2016-10255: Fixed a memory allocation failure in libelf_set_rawdata_wrlock (bsc#1030476).
- CVE-2019-7150: Added a missing check in dwfl_segment_report_module which could have allowed truncated files 
  to be read (bsc#1123685).
- CVE-2018-16062: Fixed a heap-buffer-overflow (bsc#1106390).
- CVE-2017-7611: Fixed a heap-based buffer over-read that could have led to Denial of Service (bsc#1033088).
- CVE-2017-7613: Fixed denial of service caused by the missing validation of the number of sections 
  and the number of segments in a crafted ELF file (bsc#1033090).
- CVE-2017-7607: Fixed a heap-based buffer overflow in handle_gnu_hash (bsc#1033084).
- CVE-2017-7608: Fixed a heap-based buffer overflow in ebl_object_note_type_name() (bsc#1033085).
- CVE-2017-7610: Fixed a heap-based buffer overflow in check_group (bsc#1033087).
- CVE-2018-18521: Fixed multiple divide-by-zero vulnerabilities in function arlib_add_symbols() (bsc#1112723).
- CVE-2017-7612: Fixed a denial of service in check_sysv_hash() via a crafted ELF file (bsc#1033089).
- CVE-2018-18310: Fixed an invalid address read in dwfl_segment_report_module.c (bsc#1111973).
- CVE-2018-18520: Fixed bad handling of ar files inside are files (bsc#1112726).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-03"/>
	<updated date="2019-07-03"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1030472">SUSE bug 1030472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030476">SUSE bug 1030476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033084">SUSE bug 1033084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033085">SUSE bug 1033085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033087">SUSE bug 1033087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033088">SUSE bug 1033088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033089">SUSE bug 1033089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033090">SUSE bug 1033090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106390">SUSE bug 1106390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107067">SUSE bug 1107067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111973">SUSE bug 1111973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112723">SUSE bug 1112723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112726">SUSE bug 1112726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123685">SUSE bug 1123685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125007">SUSE bug 1125007</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10254/">CVE-2016-10254 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10254">CVE-2016-10254 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10255/">CVE-2016-10255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10255">CVE-2016-10255 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7607/">CVE-2017-7607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7607">CVE-2017-7607 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7608/">CVE-2017-7608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7608">CVE-2017-7608 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7610/">CVE-2017-7610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7610">CVE-2017-7610 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7611/">CVE-2017-7611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7611">CVE-2017-7611 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7612/">CVE-2017-7612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7612">CVE-2017-7612 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7613/">CVE-2017-7613 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7613">CVE-2017-7613 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16062/">CVE-2018-16062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16062">CVE-2018-16062 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16403/">CVE-2018-16403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16403">CVE-2018-16403 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18310/">CVE-2018-18310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18310">CVE-2018-18310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18520/">CVE-2018-18520 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18520">CVE-2018-18520 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18521/">CVE-2018-18521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18521">CVE-2018-18521 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7150/">CVE-2019-7150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7150">CVE-2019-7150 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7665/">CVE-2019-7665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7665">CVE-2019-7665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521561" comment="elfutils-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521562" comment="libasm1-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557320" comment="libasm1-32bit-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521563" comment="libdw1-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521564" comment="libdw1-32bit-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521565" comment="libebl1-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521566" comment="libebl1-32bit-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521567" comment="libelf1-0.158-7.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521568" comment="libelf1-32bit-0.158-7.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151992" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1138034" ref_url="https://bugzilla.suse.com/1138034" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164/" source="CVE"/>
		<description>
This update for postgresql10 to version 10.9 fixes the following issue:

Security issue fixed:	  

- CVE-2019-10164: Fixed buffer-overflow vulnerabilities in SCRAM verifier parsing (bsc#1138034).

More information at https://www.postgresql.org/docs/10/release-10-9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-09"/>
	<updated date="2019-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138034">SUSE bug 1138034</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10164">CVE-2019-10164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521936" comment="libecpg6-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521937" comment="libpq5-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521938" comment="libpq5-32bit-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521939" comment="postgresql10-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530575" comment="postgresql10-contrib-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530576" comment="postgresql10-docs-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530580" comment="postgresql10-server-10.9-1.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151993" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120281" ref_url="https://bugzilla.suse.com/1120281" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000845" ref_url="https://www.suse.com/security/cve/CVE-2018-1000845/" source="CVE"/>
		<description>
This update for avahi fixes the following issues:

Security issue fixed:

- CVE-2018-1000845: Fixed DNS amplification and reflection to spoofed addresses (DOS) (bsc#1120281)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-25"/>
	<updated date="2019-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120281">SUSE bug 1120281</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000845/">CVE-2018-1000845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000845">CVE-2018-1000845 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521569" comment="avahi-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521570" comment="avahi-lang-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557321" comment="avahi-utils-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521571" comment="libavahi-client3-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521572" comment="libavahi-client3-32bit-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521573" comment="libavahi-common3-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521574" comment="libavahi-common3-32bit-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521575" comment="libavahi-core7-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521576" comment="libavahi-glib1-0.6.32-32.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521577" comment="libavahi-glib1-32bit-0.6.32-32.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521581" comment="libdns_sd-0.6.32-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521582" comment="libdns_sd-32bit-0.6.32-32.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151994" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1139959" ref_url="https://bugzilla.suse.com/1139959" source="BUGZILLA"/>
		<reference ref_id="1140122" ref_url="https://bugzilla.suse.com/1140122" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13012" ref_url="https://www.suse.com/security/cve/CVE-2019-13012/" source="CVE"/>
		<description>
This update for glib2 fixes the following issues:

Security issue fixed:

- CVE-2019-13012: Fixed improper restriction of file permissions when creating directories (bsc#1139959).

Non-security issue fixed:

- Added explicit requires between libglib2 and libgio2 (bsc#1140122).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-12"/>
	<updated date="2019-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139959">SUSE bug 1139959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140122">SUSE bug 1140122</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13012/">CVE-2019-13012 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13012">CVE-2019-13012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521943" comment="glib2-lang-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521944" comment="glib2-tools-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521945" comment="libgio-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521946" comment="libgio-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521948" comment="libglib-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521949" comment="libglib-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521950" comment="libgmodule-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521951" comment="libgmodule-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521952" comment="libgobject-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521953" comment="libgobject-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521954" comment="libgthread-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521955" comment="libgthread-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151995" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1139937" ref_url="https://bugzilla.suse.com/1139937" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20843" ref_url="https://www.suse.com/security/cve/CVE-2018-20843/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

Security issue fixed:

- CVE-2018-20843: Fixed a denial of service triggered by high resource consumption 
  in the XML parser when XML names contain a large amount of colons (bsc#1139937).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-12"/>
	<updated date="2019-07-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1139937">SUSE bug 1139937</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20843/">CVE-2018-20843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20843">CVE-2018-20843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521956" comment="expat-2.1.0-21.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521957" comment="libexpat1-2.1.0-21.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521958" comment="libexpat1-32bit-2.1.0-21.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151996" version="1" class="patch">
	<metadata>
		<title>Security update for xrdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1014524" ref_url="https://bugzilla.suse.com/1014524" source="BUGZILLA"/>
		<reference ref_id="1015567" ref_url="https://bugzilla.suse.com/1015567" source="BUGZILLA"/>
		<reference ref_id="1029912" ref_url="https://bugzilla.suse.com/1029912" source="BUGZILLA"/>
		<reference ref_id="1060644" ref_url="https://bugzilla.suse.com/1060644" source="BUGZILLA"/>
		<reference ref_id="1069591" ref_url="https://bugzilla.suse.com/1069591" source="BUGZILLA"/>
		<reference ref_id="1090174" ref_url="https://bugzilla.suse.com/1090174" source="BUGZILLA"/>
		<reference ref_id="1100453" ref_url="https://bugzilla.suse.com/1100453" source="BUGZILLA"/>
		<reference ref_id="1101506" ref_url="https://bugzilla.suse.com/1101506" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1430" ref_url="https://www.suse.com/security/cve/CVE-2013-1430/" source="CVE"/>
		<reference ref_id="CVE-2017-16927" ref_url="https://www.suse.com/security/cve/CVE-2017-16927/" source="CVE"/>
		<reference ref_id="CVE-2017-6967" ref_url="https://www.suse.com/security/cve/CVE-2017-6967/" source="CVE"/>
		<description>
This update for xrdp fixes the following issues:

These security issues were fixed:

- CVE-2013-1430:  When successfully logging in using RDP into an xrdp session, 
  the file ~/.vnc/sesman_${username}_passwd was created. Its content was the equivalent 
  of the user's cleartext password, DES encrypted with a known key (bsc#1015567).
- CVE-2017-16927: The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager 
  in xrdp through used an untrusted integer as a write length, which could lead to a 
  local denial of service (bsc#1069591).
- CVE-2017-6967: Fixed call of the PAM function auth_start_session(). This lead
  to to PAM session modules not being properly initialized, with a potential
  consequence of incorrect configurations or elevation of privileges, aka a
  pam_limits.so bypass (bsc#1029912).

These non-security issues were fixed:

- The KillDisconnected option for TigerVNC Xvnc sessions is now supported (bsc#1101506)
- Fixed an issue with delayed X KeyRelease events (bsc#1100453)    
- Force xrdp-sesman.service to start after xrdp.service. (bsc#1014524)
- Avoid use of hard-coded sesman port. (bsc#1060644)
- Fixed a regression connecting from Windows 10. (bsc#1090174)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-15"/>
	<updated date="2019-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014524">SUSE bug 1014524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015567">SUSE bug 1015567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029912">SUSE bug 1029912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060644">SUSE bug 1060644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069591">SUSE bug 1069591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090174">SUSE bug 1090174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100453">SUSE bug 1100453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101506">SUSE bug 1101506</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2013-1430/">CVE-2013-1430 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1430">CVE-2013-1430 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16927/">CVE-2017-16927 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16927">CVE-2017-16927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6967/">CVE-2017-6967 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6967">CVE-2017-6967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521959" comment="xrdp-0.9.0~git.1456906198.f422461-21.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151997" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1133291" ref_url="https://bugzilla.suse.com/1133291" source="BUGZILLA"/>
		<reference ref_id="1135715" ref_url="https://bugzilla.suse.com/1135715" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6237" ref_url="https://www.suse.com/security/cve/CVE-2019-6237/" source="CVE"/>
		<reference ref_id="CVE-2019-8571" ref_url="https://www.suse.com/security/cve/CVE-2019-8571/" source="CVE"/>
		<reference ref_id="CVE-2019-8583" ref_url="https://www.suse.com/security/cve/CVE-2019-8583/" source="CVE"/>
		<reference ref_id="CVE-2019-8584" ref_url="https://www.suse.com/security/cve/CVE-2019-8584/" source="CVE"/>
		<reference ref_id="CVE-2019-8586" ref_url="https://www.suse.com/security/cve/CVE-2019-8586/" source="CVE"/>
		<reference ref_id="CVE-2019-8587" ref_url="https://www.suse.com/security/cve/CVE-2019-8587/" source="CVE"/>
		<reference ref_id="CVE-2019-8594" ref_url="https://www.suse.com/security/cve/CVE-2019-8594/" source="CVE"/>
		<reference ref_id="CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595/" source="CVE"/>
		<reference ref_id="CVE-2019-8596" ref_url="https://www.suse.com/security/cve/CVE-2019-8596/" source="CVE"/>
		<reference ref_id="CVE-2019-8597" ref_url="https://www.suse.com/security/cve/CVE-2019-8597/" source="CVE"/>
		<reference ref_id="CVE-2019-8601" ref_url="https://www.suse.com/security/cve/CVE-2019-8601/" source="CVE"/>
		<reference ref_id="CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607/" source="CVE"/>
		<reference ref_id="CVE-2019-8608" ref_url="https://www.suse.com/security/cve/CVE-2019-8608/" source="CVE"/>
		<reference ref_id="CVE-2019-8609" ref_url="https://www.suse.com/security/cve/CVE-2019-8609/" source="CVE"/>
		<reference ref_id="CVE-2019-8610" ref_url="https://www.suse.com/security/cve/CVE-2019-8610/" source="CVE"/>
		<reference ref_id="CVE-2019-8611" ref_url="https://www.suse.com/security/cve/CVE-2019-8611/" source="CVE"/>
		<reference ref_id="CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615/" source="CVE"/>
		<reference ref_id="CVE-2019-8619" ref_url="https://www.suse.com/security/cve/CVE-2019-8619/" source="CVE"/>
		<reference ref_id="CVE-2019-8622" ref_url="https://www.suse.com/security/cve/CVE-2019-8622/" source="CVE"/>
		<reference ref_id="CVE-2019-8623" ref_url="https://www.suse.com/security/cve/CVE-2019-8623/" source="CVE"/>
		<description>
This update for webkit2gtk3 to version 2.24.2 fixes the following issues:

Security issues fixed:

- CVE-2019-6237, CVE-2019-8571, CVE-2019-8583, CVE-2019-8584, CVE-2019-8586,
  CVE-2019-8587, CVE-2019-8594, CVE-2019-8595, CVE-2019-8596, CVE-2019-8597,
  CVE-2019-8601, CVE-2019-8607, CVE-2019-8608, CVE-2019-8609, CVE-2019-8610,
  CVE-2019-8615, CVE-2019-8611, CVE-2019-8619, CVE-2019-8622, CVE-2019-8623 (bsc#1135715).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-15"/>
	<updated date="2019-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133291">SUSE bug 1133291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6237/">CVE-2019-6237 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6237">CVE-2019-6237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8571/">CVE-2019-8571 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8571">CVE-2019-8571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8583/">CVE-2019-8583 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8583">CVE-2019-8583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8584/">CVE-2019-8584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8584">CVE-2019-8584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8586/">CVE-2019-8586 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8586">CVE-2019-8586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8587/">CVE-2019-8587 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8587">CVE-2019-8587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8594/">CVE-2019-8594 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8594">CVE-2019-8594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8595">CVE-2019-8595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8596/">CVE-2019-8596 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8596">CVE-2019-8596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8597/">CVE-2019-8597 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8597">CVE-2019-8597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8601/">CVE-2019-8601 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8601">CVE-2019-8601 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8607">CVE-2019-8607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8608/">CVE-2019-8608 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8608">CVE-2019-8608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8609/">CVE-2019-8609 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8609">CVE-2019-8609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8610/">CVE-2019-8610 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8610">CVE-2019-8610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8611/">CVE-2019-8611 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8611">CVE-2019-8611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8615">CVE-2019-8615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8619/">CVE-2019-8619 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8619">CVE-2019-8619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8622/">CVE-2019-8622 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8622">CVE-2019-8622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8623/">CVE-2019-8623 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8623">CVE-2019-8623 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521961" comment="libjavascriptcoregtk-4_0-18-2.24.2-2.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521962" comment="libwebkit2gtk-4_0-37-2.24.2-2.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521964" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-2.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521965" comment="typelib-1_0-WebKit2-4_0-2.24.2-2.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521966" comment="webkit2gtk-4_0-injected-bundles-2.24.2-2.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151998" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes the following issues:

MozillaFirefox to version ESR 60.8:

- CVE-2019-9811: Sandbox escape via installation of malicious language pack (bsc#1140868).
- CVE-2019-11711: Script injection within domain through inner window reuse (bsc#1140868).
- CVE-2019-11712: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (bsc#1140868).
- CVE-2019-11713: Use-after-free with HTTP/2 cached stream (bsc#1140868).
- CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (bsc#1140868).
- CVE-2019-11715: HTML parsing error can contribute to content XSS (bsc#1140868).
- CVE-2019-11717: Caret character improperly escaped in origins (bsc#1140868).
- CVE-2019-11719: Out-of-bounds read when importing curve25519 private key (bsc#1140868).
- CVE-2019-11730: Same-origin policy treats all files in a directory as having the same-origin (bsc#1140868).
- CVE-2019-11709: Multiple Memory safety bugs fixed (bsc#1140868).

mozilla-nss to version 3.44.1:

* Added IPSEC IKE support to softoken 
* Many new FIPS test cases
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-17"/>
	<updated date="2019-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521974" comment="MozillaFirefox-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521975" comment="MozillaFirefox-translations-common-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530590" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530591" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530592" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530593" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151999" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1140095" ref_url="https://bugzilla.suse.com/1140095" source="BUGZILLA"/>
		<reference ref_id="1140101" ref_url="https://bugzilla.suse.com/1140101" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13117" ref_url="https://www.suse.com/security/cve/CVE-2019-13117/" source="CVE"/>
		<reference ref_id="CVE-2019-13118" ref_url="https://www.suse.com/security/cve/CVE-2019-13118/" source="CVE"/>
		<description>
This update for libxslt fixes the following issues:

Security issues fixed:

- CVE-2019-13118: Fixed a read of uninitialized stack data (bsc#1140101).
- CVE-2019-13117: Fixed a uninitialized read which allowed to discern whether a byte on the stack contains certain special characters (bsc#1140095).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-17"/>
	<updated date="2019-07-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140095">SUSE bug 1140095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140101">SUSE bug 1140101</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13117/">CVE-2019-13117 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13117">CVE-2019-13117 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13118/">CVE-2019-13118 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13118">CVE-2019-13118 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521987" comment="libxslt-tools-1.1.28-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521988" comment="libxslt1-1.1.28-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521989" comment="libxslt1-32bit-1.1.28-17.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152000" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1110146" ref_url="https://bugzilla.suse.com/1110146" source="BUGZILLA"/>
		<reference ref_id="1126613" ref_url="https://bugzilla.suse.com/1126613" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

Issue fixed:

- Fixed a bug related to the fix for CVE-2016-9318 which allowed xsltproc to access 
  the internet even when --nonet was given and also was making docbook-xsl-stylesheets to have 
  incomplete xml catalog file (bsc#1010675, bsc#1126613 and bsc#1110146).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-18"/>
	<updated date="2019-07-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110146">SUSE bug 1110146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126613">SUSE bug 1126613</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9318">CVE-2016-9318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521990" comment="libxml2-2-2.9.4-46.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521991" comment="libxml2-2-32bit-2.9.4-46.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557322" comment="libxml2-doc-2.9.4-46.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521992" comment="libxml2-tools-2.9.4-46.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521993" comment="python-libxml2-2.9.4-46.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152001" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1118277" ref_url="https://bugzilla.suse.com/1118277" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19788" ref_url="https://www.suse.com/security/cve/CVE-2018-19788/" source="CVE"/>
		<description>
This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2018-19788: Fixed handling of UIDs over MAX_UINT (bsc#1118277)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-04"/>
	<updated date="2019-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118277">SUSE bug 1118277</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19788/">CVE-2018-19788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19788">CVE-2018-19788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521590" comment="libpolkit0-0.113-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521592" comment="polkit-0.113-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521593" comment="typelib-1_0-Polkit-1_0-0.113-5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152002" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

---- updated platforms ------------------------------------
SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061d-&gt;0000061f Xeon E3/E5, Core X
SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000714-&gt;00000718 Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152003" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="985657" ref_url="https://bugzilla.suse.com/985657" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This update for bzip2 fixes the following issues:

Security issue fixed:

- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1139083).
- CVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985657">SUSE bug 985657</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3189">CVE-2016-3189 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521995" comment="bzip2-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530594" comment="bzip2-doc-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521996" comment="libbz2-1-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521997" comment="libbz2-1-32bit-1.0.6-30.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152004" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1127223" ref_url="https://bugzilla.suse.com/1127223" source="BUGZILLA"/>
		<reference ref_id="1127308" ref_url="https://bugzilla.suse.com/1127308" source="BUGZILLA"/>
		<reference ref_id="1128574" ref_url="https://bugzilla.suse.com/1128574" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155/" source="CVE"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2019-9169: Fixed a heap-based buffer over-read via an attempted case-insensitive regular-expression match (bsc#1127308).
- CVE-2009-5155: Fixed a denial of service in parse_reg_exp() (bsc#1127223).

Non-security issues fixed:

- Added cfi information for start routines in order to stop unwinding on S390 (bsc#1128574).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127223">SUSE bug 1127223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127308">SUSE bug 1127308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128574">SUSE bug 1128574</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-5155">CVE-2009-5155 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9169">CVE-2019-9169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530595" comment="glibc-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530596" comment="glibc-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530597" comment="glibc-devel-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530598" comment="glibc-devel-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530599" comment="glibc-html-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530600" comment="glibc-i18ndata-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530601" comment="glibc-info-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530602" comment="glibc-locale-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530603" comment="glibc-locale-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530604" comment="glibc-profile-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530605" comment="glibc-profile-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530606" comment="nscd-2.22-62.22.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152005" version="1" class="patch">
	<metadata>
		<title>Security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1108745" ref_url="https://bugzilla.suse.com/1108745" source="BUGZILLA"/>
		<reference ref_id="1108748" ref_url="https://bugzilla.suse.com/1108748" source="BUGZILLA"/>
		<reference ref_id="1108750" ref_url="https://bugzilla.suse.com/1108750" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<reference ref_id="CVE-2017-15705" ref_url="https://www.suse.com/security/cve/CVE-2017-15705/" source="CVE"/>
		<reference ref_id="CVE-2018-11780" ref_url="https://www.suse.com/security/cve/CVE-2018-11780/" source="CVE"/>
		<reference ref_id="CVE-2018-11781" ref_url="https://www.suse.com/security/cve/CVE-2018-11781/" source="CVE"/>
		<description>
This update for spamassassin to version 3.4.2 fixes the following issues:

Security issues fixed:

- CVE-2017-15705: Fixed denial of service via unclosed tags in crafted emails (bsc#1108745).
- CVE-2018-11781: Fixed a code injection in the meta rule syntax by local users (bsc#1108748).
- CVE-2018-11780: Fixed a potential remote code execution vulnerability in PDFInfo plugin (bsc#1108750).

Non-security issues fixed:

- Added four new plugins (disabled by default): HashBL, ResourceLimits, FromNameSpoof, Phishing
- sa-update script: optional support for SHA-256 / SHA-512 been added for better validation of rules
- GeoIP2 support has been added to RelayCountry and URILocalBL plugins
- Several new or enhanced configuration options
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-24"/>
	<updated date="2019-07-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1108745">SUSE bug 1108745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108748">SUSE bug 1108748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108750">SUSE bug 1108750</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1238">CVE-2016-1238 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15705/">CVE-2017-15705 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15705">CVE-2017-15705 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11780/">CVE-2018-11780 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11780">CVE-2018-11780 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11781/">CVE-2018-11781 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11781">CVE-2018-11781 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522005" comment="perl-Mail-SpamAssassin-3.4.2-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522006" comment="spamassassin-3.4.2-44.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152006" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1040109" ref_url="https://bugzilla.suse.com/1040109" source="BUGZILLA"/>
		<reference ref_id="1040112" ref_url="https://bugzilla.suse.com/1040112" source="BUGZILLA"/>
		<reference ref_id="1040113" ref_url="https://bugzilla.suse.com/1040113" source="BUGZILLA"/>
		<reference ref_id="1040115" ref_url="https://bugzilla.suse.com/1040115" source="BUGZILLA"/>
		<reference ref_id="1113455" ref_url="https://bugzilla.suse.com/1113455" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9111" ref_url="https://www.suse.com/security/cve/CVE-2017-9111/" source="CVE"/>
		<reference ref_id="CVE-2017-9112" ref_url="https://www.suse.com/security/cve/CVE-2017-9112/" source="CVE"/>
		<reference ref_id="CVE-2017-9113" ref_url="https://www.suse.com/security/cve/CVE-2017-9113/" source="CVE"/>
		<reference ref_id="CVE-2017-9115" ref_url="https://www.suse.com/security/cve/CVE-2017-9115/" source="CVE"/>
		<reference ref_id="CVE-2018-18444" ref_url="https://www.suse.com/security/cve/CVE-2018-18444/" source="CVE"/>
		<description>
This update for openexr fixes the following issues:

Security issue fixed:

- CVE-2017-9111: Fixed an invalid write of size 8 in the storeSSE function in ImfOptimizedPixelReading.h (bsc#1040109).
- CVE-2017-9113: Fixed an invalid write of size 1 in the bufferedReadPixels function in ImfInputFile.cpp (bsc#1040113).
- CVE-2017-9115: Fixed an invalid write of size 2 in the = operator function inhalf.h (bsc#1040115).
- CVE-2018-18444: Fixed Out-of-bounds write in makeMultiView.cpp (bsc#1113455).
- CVE-2017-9112: Fixed invalid read of size 1 in the getBits function in ImfHuf.cpp (bsc#1040112).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-24"/>
	<updated date="2019-07-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040109">SUSE bug 1040109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040112">SUSE bug 1040112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040113">SUSE bug 1040113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040115">SUSE bug 1040115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113455">SUSE bug 1113455</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9111/">CVE-2017-9111 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9111">CVE-2017-9111 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9112/">CVE-2017-9112 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9112">CVE-2017-9112 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9113/">CVE-2017-9113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9113">CVE-2017-9113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9115/">CVE-2017-9115 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9115">CVE-2017-9115 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18444/">CVE-2018-18444 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18444">CVE-2018-18444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522007" comment="libIlmImf-Imf_2_1-21-2.1.0-6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522009" comment="openexr-2.1.0-6.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152007" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp, zypper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1109893" ref_url="https://bugzilla.suse.com/1109893" source="BUGZILLA"/>
		<reference ref_id="1110542" ref_url="https://bugzilla.suse.com/1110542" source="BUGZILLA"/>
		<reference ref_id="1111319" ref_url="https://bugzilla.suse.com/1111319" source="BUGZILLA"/>
		<reference ref_id="1112911" ref_url="https://bugzilla.suse.com/1112911" source="BUGZILLA"/>
		<reference ref_id="1113296" ref_url="https://bugzilla.suse.com/1113296" source="BUGZILLA"/>
		<reference ref_id="1120629" ref_url="https://bugzilla.suse.com/1120629" source="BUGZILLA"/>
		<reference ref_id="1120630" ref_url="https://bugzilla.suse.com/1120630" source="BUGZILLA"/>
		<reference ref_id="1120631" ref_url="https://bugzilla.suse.com/1120631" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1131823" ref_url="https://bugzilla.suse.com/1131823" source="BUGZILLA"/>
		<reference ref_id="1134226" ref_url="https://bugzilla.suse.com/1134226" source="BUGZILLA"/>
		<reference ref_id="1137977" ref_url="https://bugzilla.suse.com/1137977" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<description>
This update for libsolv, libzypp and zypper fixes the following issues:

libsolv was updated to version 0.6.36 fixes the following issues:

Security issues fixed:

- CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629).
- CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630).
- CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631).

Non-security issues fixed:

- Made cleandeps jobs on patterns work (bsc#1137977).
- Fixed an issue multiversion packages that obsolete their own name (bsc#1127155).
- Keep consistent package name if there are multiple alternatives (bsc#1131823).

libzypp received following fixes:

- Fixes a bug where locking the kernel was not possible (bsc#1113296)

zypper received following fixes:

- Fixes a bug where the wrong exit code was set when refreshing
  repos if --root was used (bsc#1134226)
- Improved the displaying of locks (bsc#1112911)
- Fixes an issue where `https` repository urls caused an error prompt to
   appear twice (bsc#1110542)
- zypper will now always warn when no repositories are defined (bsc#1109893)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-25"/>
	<updated date="2019-07-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109893">SUSE bug 1109893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110542">SUSE bug 1110542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111319">SUSE bug 1111319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112911">SUSE bug 1112911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113296">SUSE bug 1113296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131823">SUSE bug 1131823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134226">SUSE bug 1134226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137977">SUSE bug 1137977</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20532">CVE-2018-20532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20533">CVE-2018-20533 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20534">CVE-2018-20534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522010" comment="libsolv-tools-0.6.36-2.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522011" comment="libzypp-16.20.0-2.39.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557323" comment="perl-solv-0.6.36-2.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522012" comment="python-solv-0.6.36-2.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522013" comment="zypper-1.13.51-21.26.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522014" comment="zypper-log-1.13.51-21.26.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152008" version="1" class="patch">
	<metadata>
		<title>Security update for cronie (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1128935" ref_url="https://bugzilla.suse.com/1128935" source="BUGZILLA"/>
		<reference ref_id="1128937" ref_url="https://bugzilla.suse.com/1128937" source="BUGZILLA"/>
		<reference ref_id="1130746" ref_url="https://bugzilla.suse.com/1130746" source="BUGZILLA"/>
		<reference ref_id="1133100" ref_url="https://bugzilla.suse.com/1133100" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9704" ref_url="https://www.suse.com/security/cve/CVE-2019-9704/" source="CVE"/>
		<reference ref_id="CVE-2019-9705" ref_url="https://www.suse.com/security/cve/CVE-2019-9705/" source="CVE"/>
		<description>
This update for cronie fixes the following issues:
	  
Security issues fixed:

- CVE-2019-9704: Fixed an insufficient check in the return value of calloc which
  could allow a local user to create Denial of Service by crashing the deamon (bsc#1128937).
- CVE-2019-9705: Fixed an implementation vulnerability which could allow a local user to
  exhaust the memory resulting in Denial of Service (bsc#1128935).  

Bug fixes:

- Manual start of cron is possible even when it's already started using systemd (bsc#1133100).
- Cron schedules only one job of crontab (bsc#1130746).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-26"/>
	<updated date="2019-07-26"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1128935">SUSE bug 1128935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128937">SUSE bug 1128937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130746">SUSE bug 1130746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133100">SUSE bug 1133100</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9704/">CVE-2019-9704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9704">CVE-2019-9704 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9705/">CVE-2019-9705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9705">CVE-2019-9705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522015" comment="cron-4.2-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522016" comment="cronie-1.4.11-59.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152009" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1139885" ref_url="https://bugzilla.suse.com/1139885" source="BUGZILLA"/>
		<reference ref_id="1139886" ref_url="https://bugzilla.suse.com/1139886" source="BUGZILLA"/>
		<reference ref_id="1140100" ref_url="https://bugzilla.suse.com/1140100" source="BUGZILLA"/>
		<reference ref_id="1140102" ref_url="https://bugzilla.suse.com/1140102" source="BUGZILLA"/>
		<reference ref_id="1140103" ref_url="https://bugzilla.suse.com/1140103" source="BUGZILLA"/>
		<reference ref_id="1140106" ref_url="https://bugzilla.suse.com/1140106" source="BUGZILLA"/>
		<reference ref_id="1140110" ref_url="https://bugzilla.suse.com/1140110" source="BUGZILLA"/>
		<reference ref_id="1140111" ref_url="https://bugzilla.suse.com/1140111" source="BUGZILLA"/>
		<reference ref_id="1140501" ref_url="https://bugzilla.suse.com/1140501" source="BUGZILLA"/>
		<reference ref_id="1140513" ref_url="https://bugzilla.suse.com/1140513" source="BUGZILLA"/>
		<reference ref_id="1140534" ref_url="https://bugzilla.suse.com/1140534" source="BUGZILLA"/>
		<reference ref_id="1140538" ref_url="https://bugzilla.suse.com/1140538" source="BUGZILLA"/>
		<reference ref_id="1140554" ref_url="https://bugzilla.suse.com/1140554" source="BUGZILLA"/>
		<reference ref_id="1140664" ref_url="https://bugzilla.suse.com/1140664" source="BUGZILLA"/>
		<reference ref_id="1140666" ref_url="https://bugzilla.suse.com/1140666" source="BUGZILLA"/>
		<reference ref_id="1140669" ref_url="https://bugzilla.suse.com/1140669" source="BUGZILLA"/>
		<reference ref_id="1140673" ref_url="https://bugzilla.suse.com/1140673" source="BUGZILLA"/>
		<reference ref_id="1141171" ref_url="https://bugzilla.suse.com/1141171" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12974" ref_url="https://www.suse.com/security/cve/CVE-2019-12974/" source="CVE"/>
		<reference ref_id="CVE-2019-12975" ref_url="https://www.suse.com/security/cve/CVE-2019-12975/" source="CVE"/>
		<reference ref_id="CVE-2019-12976" ref_url="https://www.suse.com/security/cve/CVE-2019-12976/" source="CVE"/>
		<reference ref_id="CVE-2019-12978" ref_url="https://www.suse.com/security/cve/CVE-2019-12978/" source="CVE"/>
		<reference ref_id="CVE-2019-12979" ref_url="https://www.suse.com/security/cve/CVE-2019-12979/" source="CVE"/>
		<reference ref_id="CVE-2019-13133" ref_url="https://www.suse.com/security/cve/CVE-2019-13133/" source="CVE"/>
		<reference ref_id="CVE-2019-13134" ref_url="https://www.suse.com/security/cve/CVE-2019-13134/" source="CVE"/>
		<reference ref_id="CVE-2019-13135" ref_url="https://www.suse.com/security/cve/CVE-2019-13135/" source="CVE"/>
		<reference ref_id="CVE-2019-13295" ref_url="https://www.suse.com/security/cve/CVE-2019-13295/" source="CVE"/>
		<reference ref_id="CVE-2019-13297" ref_url="https://www.suse.com/security/cve/CVE-2019-13297/" source="CVE"/>
		<reference ref_id="CVE-2019-13300" ref_url="https://www.suse.com/security/cve/CVE-2019-13300/" source="CVE"/>
		<reference ref_id="CVE-2019-13301" ref_url="https://www.suse.com/security/cve/CVE-2019-13301/" source="CVE"/>
		<reference ref_id="CVE-2019-13307" ref_url="https://www.suse.com/security/cve/CVE-2019-13307/" source="CVE"/>
		<reference ref_id="CVE-2019-13308" ref_url="https://www.suse.com/security/cve/CVE-2019-13308/" source="CVE"/>
		<reference ref_id="CVE-2019-13310" ref_url="https://www.suse.com/security/cve/CVE-2019-13310/" source="CVE"/>
		<reference ref_id="CVE-2019-13311" ref_url="https://www.suse.com/security/cve/CVE-2019-13311/" source="CVE"/>
		<reference ref_id="CVE-2019-13391" ref_url="https://www.suse.com/security/cve/CVE-2019-13391/" source="CVE"/>
		<reference ref_id="CVE-2019-13454" ref_url="https://www.suse.com/security/cve/CVE-2019-13454/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2019-13301: Fixed a memory leak in AcquireMagickMemory() (bsc#1140554).
- CVE-2019-13310: Fixed a memory leak at AcquireMagickMemory because of an error in MagickWand/mogrify.c (bsc#1140501).
- CVE-2019-13311: Fixed a memory leak at AcquireMagickMemory because of a wand/mogrify.c error (bsc#1140513).
- CVE-2019-13454: Fixed a division by zero in RemoveDuplicateLayers in MagickCore/layer.c (bsc#1141171).
- CVE-2019-13295: Fixed a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage (bsc#1140664).
- CVE-2019-13297: Fixed a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage (bsc#1140666).
- CVE-2019-12979: Fixed the use of uninitialized values in SyncImageSettings() (bsc#1139886).
- CVE-2019-13391: Fixed a heap-based buffer over-read in MagickCore/fourier.c (bsc#1140673).
- CVE-2019-13308: Fixed a heap-based buffer overflow in MagickCore/fourier.c (bsc#1140534).
- CVE-2019-13300: Fixed a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages (bsc#1140669).
- CVE-2019-13307: Fixed a heap-based buffer overflow at MagickCore/statistic.c (bsc#1140538).
- CVE-2019-12975: Fixed a memory leak in the WriteDPXImage() in coders/dpx.c (bsc#1140106).
- CVE-2019-13135: Fixed the use of uninitialized values in ReadCUTImage() (bsc#1140103).
- CVE-2019-12978: Fixed the use of uninitialized values in ReadPANGOImage() (bsc#1139885).
- CVE-2019-12974: Fixed a NULL pointer dereference in the ReadPANGOImage() (bsc#1140111).
- CVE-2019-13133: Fixed a memory leak in the ReadBMPImage() (bsc#1140100).
- CVE-2019-13134: Fixed a memory leak in the ReadVIFFImage() (bsc#1140102).
- CVE-2019-12976: Fixed a memory leak in the ReadPCLImage() in coders/pcl.c(bsc#1140110).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-29"/>
	<updated date="2019-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1139885">SUSE bug 1139885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139886">SUSE bug 1139886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140100">SUSE bug 1140100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140102">SUSE bug 1140102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140103">SUSE bug 1140103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140106">SUSE bug 1140106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140110">SUSE bug 1140110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140111">SUSE bug 1140111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140501">SUSE bug 1140501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140513">SUSE bug 1140513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140534">SUSE bug 1140534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140538">SUSE bug 1140538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140554">SUSE bug 1140554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140664">SUSE bug 1140664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140666">SUSE bug 1140666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140669">SUSE bug 1140669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140673">SUSE bug 1140673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141171">SUSE bug 1141171</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12974/">CVE-2019-12974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12974">CVE-2019-12974 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12975/">CVE-2019-12975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12975">CVE-2019-12975 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12976/">CVE-2019-12976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12976">CVE-2019-12976 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12978/">CVE-2019-12978 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12978">CVE-2019-12978 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12979/">CVE-2019-12979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12979">CVE-2019-12979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13133/">CVE-2019-13133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13133">CVE-2019-13133 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13134/">CVE-2019-13134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13134">CVE-2019-13134 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13135/">CVE-2019-13135 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13135">CVE-2019-13135 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13295/">CVE-2019-13295 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13295">CVE-2019-13295 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13297/">CVE-2019-13297 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13297">CVE-2019-13297 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13300/">CVE-2019-13300 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13300">CVE-2019-13300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13301/">CVE-2019-13301 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13301">CVE-2019-13301 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13307/">CVE-2019-13307 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13307">CVE-2019-13307 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13308/">CVE-2019-13308 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13308">CVE-2019-13308 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13310/">CVE-2019-13310 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13310">CVE-2019-13310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13311/">CVE-2019-13311 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13311">CVE-2019-13311 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13391/">CVE-2019-13391 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13391">CVE-2019-13391 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13454/">CVE-2019-13454 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13454">CVE-2019-13454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522021" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522022" comment="ImageMagick-config-6-upstream-6.8.8.1-71.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522024" comment="libMagickCore-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522026" comment="libMagickWand-6_Q16-1-6.8.8.1-71.126.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152010" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This update for bzip2 fixes the following issues:

- Fixed a regression with the fix for CVE-2019-12900, which caused incompatibilities
  with files that used many selectors (bsc#1139083).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-29"/>
	<updated date="2019-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522027" comment="bzip2-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530613" comment="bzip2-doc-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522028" comment="libbz2-1-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522029" comment="libbz2-1-32bit-1.0.6-30.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152011" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1061305" ref_url="https://bugzilla.suse.com/1061305" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14988" ref_url="https://www.suse.com/security/cve/CVE-2017-14988/" source="CVE"/>
		<description>
This update for openexr fixes the following issues:

- CVE-2017-14988: Fixed a denial of service in Header::readfrom() (bsc#1061305).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-29"/>
	<updated date="2019-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061305">SUSE bug 1061305</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14988/">CVE-2017-14988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14988">CVE-2017-14988 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522030" comment="libIlmImf-Imf_2_1-21-2.1.0-6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522032" comment="openexr-2.1.0-6.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152012" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1134297" ref_url="https://bugzilla.suse.com/1134297" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141784" ref_url="https://bugzilla.suse.com/1141784" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141786" ref_url="https://bugzilla.suse.com/1141786" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2842" ref_url="https://www.suse.com/security/cve/CVE-2019-2842/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk to version 7u231 fixes the following issues:

Security issues fixed:

- CVE_2019-2426: Improve web server connections (bsc#1134297).
- CVE-2019-2745: Improved ECC Implementation (bsc#1141784).
- CVE-2019-2762: Exceptional throw cases (bsc#1141782).
- CVE-2019-2766: Improve file protocol handling (bsc#1141789).
- CVE-2019-2769: Better copies of CopiesList (bsc#1141783).
- CVE-2019-2786: More limited privilege usage (bsc#1141787).
- CVE-2019-2816: Normalize normalization (bsc#1141785).
- CVE-2019-2842: Extended AES support (bsc#1141786).
- CVE-2019-7317: Improve PNG support (bsc#1141780).
- CVE-2018-3639: fix revision to prefer PR_SPEC_DISABLE_NOEXEC to PR_SPEC_DISABLE (bsc#1087082).
- Certificate validation improvements
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-31"/>
	<updated date="2019-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134297">SUSE bug 1134297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141784">SUSE bug 1141784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141786">SUSE bug 1141786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2426">CVE-2019-2426 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2745">CVE-2019-2745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2786">CVE-2019-2786 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2842/">CVE-2019-2842 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2842">CVE-2019-2842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522033" comment="java-1_7_0-openjdk-1.7.0.231-43.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557324" comment="java-1_7_0-openjdk-demo-1.7.0.231-43.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557325" comment="java-1_7_0-openjdk-devel-1.7.0.231-43.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522034" comment="java-1_7_0-openjdk-headless-1.7.0.231-43.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152013" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1121826" ref_url="https://bugzilla.suse.com/1121826" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<description>
This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2019-6133: Fixed improper caching of auth decisions, which could bypass 
  uid checking in the interactive backend (bsc#1121826).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-01"/>
	<updated date="2019-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6133">CVE-2019-6133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522035" comment="libpolkit0-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522037" comment="polkit-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522038" comment="typelib-1_0-Polkit-1_0-0.113-5.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152014" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1115375" ref_url="https://bugzilla.suse.com/1115375" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141784" ref_url="https://bugzilla.suse.com/1141784" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141786" ref_url="https://bugzilla.suse.com/1141786" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2842" ref_url="https://www.suse.com/security/cve/CVE-2019-2842/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk to version 8u222 fixes the following issues:

Security issues fixed:

- CVE-2019-2745: Improved ECC Implementation (bsc#1141784).
- CVE-2019-2762: Exceptional throw cases (bsc#1141782).
- CVE-2019-2766: Improve file protocol handling (bsc#1141789).
- CVE-2019-2769: Better copies of CopiesList (bsc#1141783).
- CVE-2019-2786: More limited privilege usage (bsc#1141787).
- CVE-2019-2816: Normalize normalization (bsc#1141785).
- CVE-2019-2842: Extended AES support (bsc#1141786).
- CVE-2019-7317: Improve PNG support (bsc#1141780).
- Certificate validation improvements

Non-security issue fixed:

- Fixed an issue where the installation failed when the manpages are not present (bsc#1115375)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-01"/>
	<updated date="2019-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115375">SUSE bug 1115375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141784">SUSE bug 1141784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141786">SUSE bug 1141786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2745">CVE-2019-2745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2786">CVE-2019-2786 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2842/">CVE-2019-2842 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2842">CVE-2019-2842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530614" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530615" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152015" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="1101676" ref_url="https://bugzilla.suse.com/1101676" source="BUGZILLA"/>
		<reference ref_id="1101677" ref_url="https://bugzilla.suse.com/1101677" source="BUGZILLA"/>
		<reference ref_id="1101678" ref_url="https://bugzilla.suse.com/1101678" source="BUGZILLA"/>
		<reference ref_id="1103342" ref_url="https://bugzilla.suse.com/1103342" source="BUGZILLA"/>
		<reference ref_id="1112368" ref_url="https://bugzilla.suse.com/1112368" source="BUGZILLA"/>
		<reference ref_id="1112397" ref_url="https://bugzilla.suse.com/1112397" source="BUGZILLA"/>
		<reference ref_id="1112417" ref_url="https://bugzilla.suse.com/1112417" source="BUGZILLA"/>
		<reference ref_id="1112421" ref_url="https://bugzilla.suse.com/1112421" source="BUGZILLA"/>
		<reference ref_id="1112432" ref_url="https://bugzilla.suse.com/1112432" source="BUGZILLA"/>
		<reference ref_id="1116686" ref_url="https://bugzilla.suse.com/1116686" source="BUGZILLA"/>
		<reference ref_id="1118754" ref_url="https://bugzilla.suse.com/1118754" source="BUGZILLA"/>
		<reference ref_id="1132666" ref_url="https://bugzilla.suse.com/1132666" source="BUGZILLA"/>
		<reference ref_id="1136037" ref_url="https://bugzilla.suse.com/1136037" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063/" source="CVE"/>
		<reference ref_id="CVE-2018-3064" ref_url="https://www.suse.com/security/cve/CVE-2018-3064/" source="CVE"/>
		<reference ref_id="CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066/" source="CVE"/>
		<reference ref_id="CVE-2018-3143" ref_url="https://www.suse.com/security/cve/CVE-2018-3143/" source="CVE"/>
		<reference ref_id="CVE-2018-3156" ref_url="https://www.suse.com/security/cve/CVE-2018-3156/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3251" ref_url="https://www.suse.com/security/cve/CVE-2018-3251/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="CVE-2019-2529" ref_url="https://www.suse.com/security/cve/CVE-2019-2529/" source="CVE"/>
		<reference ref_id="CVE-2019-2537" ref_url="https://www.suse.com/security/cve/CVE-2019-2537/" source="CVE"/>
		<description>
This update for mariadb fixes the following issues:

Update to MariaDB 10.0.38 GA (bsc#1136037).

Security issues fixed:

- CVE-2019-2537: Denial of service via multiple protocols (bsc#1136037)
- CVE-2019-2529: Denial of service via multiple protocols (bsc#1136037)
- CVE-2018-3282: Server Storage Engines unspecified vulnerability (CPU Oct 2018) (bsc#1112432)
- CVE-2018-3251: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112397)
- CVE-2018-3174: Client programs unspecified vulnerability (CPU Oct 2018) (bsc#1112368)
- CVE-2018-3156: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112417)
- CVE-2018-3143: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112421)
- CVE-2018-3066: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent Server Options). (bsc#1101678)
- CVE-2018-3064: InnoDB unspecified vulnerability (CPU Jul 2018) (bsc#1103342)
- CVE-2018-3063: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent Server Security Privileges). (bsc#1101677)
- CVE-2018-3058: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent MyISAM). (bsc#1101676)
- CVE-2016-9843: Big-endian out-of-bounds pointer (bsc#1013882)

Non-security changes:

- Removed PerconaFT from the package as it has AGPL licence (bsc#1118754).
- Do not just remove tokudb plugin but don't build it at all (missing jemalloc dependency).
- Fixed reading options for multiple instances if my${INSTANCE}.cnf is used (bsc#1132666).
- Removed 'umask 077' from mysql-systemd-helper that caused new datadirs created 
  with wrong permissions (bsc#1132666).

Release notes and changelog:

- https://kb.askmonty.org/en/mariadb-10038-release-notes
- https://kb.askmonty.org/en/mariadb-10038-changelog
- https://kb.askmonty.org/en/mariadb-10037-release-notes
- https://kb.askmonty.org/en/mariadb-10037-changelog
- https://kb.askmonty.org/en/mariadb-10036-release-notes
- https://kb.askmonty.org/en/mariadb-10036-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-05"/>
	<updated date="2019-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101676">SUSE bug 1101676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101677">SUSE bug 1101677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101678">SUSE bug 1101678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103342">SUSE bug 1103342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112368">SUSE bug 1112368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112397">SUSE bug 1112397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112417">SUSE bug 1112417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112421">SUSE bug 1112421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112432">SUSE bug 1112432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118754">SUSE bug 1118754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132666">SUSE bug 1132666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136037">SUSE bug 1136037</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3058">CVE-2018-3058 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3063">CVE-2018-3063 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3064/">CVE-2018-3064 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3064">CVE-2018-3064 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3066">CVE-2018-3066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3143/">CVE-2018-3143 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3143">CVE-2018-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3156/">CVE-2018-3156 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3156">CVE-2018-3156 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3174">CVE-2018-3174 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3251/">CVE-2018-3251 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3251">CVE-2018-3251 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3282">CVE-2018-3282 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2529/">CVE-2019-2529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2529">CVE-2019-2529 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2537/">CVE-2019-2537 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2537">CVE-2019-2537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530616" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530617" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530618" comment="mariadb-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530619" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530620" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530621" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152016" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1109663" ref_url="https://bugzilla.suse.com/1109663" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-14647: Fixed a denial of service vulnerability caused by a crafted XML document (bsc#1109847).
- CVE-2018-1000802: Fixed a command injection in the shutil module (bsc#1109663).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-06"/>
	<updated date="2019-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000802">CVE-2018-1000802 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522041" comment="libpython3_4m1_0-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522042" comment="python3-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522043" comment="python3-base-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522044" comment="python3-curses-3.4.6-25.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152017" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1133037" ref_url="https://bugzilla.suse.com/1133037" source="BUGZILLA"/>
		<reference ref_id="1141619" ref_url="https://bugzilla.suse.com/1141619" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<description>
This update for evince fixes the following issues:

Security issues fixed: 	  

- CVE-2019-11459: Fixed an improper error handling in which could have led to use of uninitialized use of memory (bsc#1133037).
- CVE-2019-1010006: Fixed a buffer overflow in backend/tiff/tiff-document.c (bsc#1141619).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-07"/>
	<updated date="2019-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141619">SUSE bug 1141619</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010006">CVE-2019-1010006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11459">CVE-2019-11459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522052" comment="evince-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522053" comment="evince-browser-plugin-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522054" comment="evince-lang-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522055" comment="evince-plugin-djvudocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522056" comment="evince-plugin-dvidocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522057" comment="evince-plugin-pdfdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522058" comment="evince-plugin-psdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522059" comment="evince-plugin-tiffdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522060" comment="evince-plugin-xpsdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522061" comment="libevdocument3-4-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522062" comment="libevview3-3-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522063" comment="nautilus-evince-3.20.2-6.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152018" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1068716" ref_url="https://bugzilla.suse.com/1068716" source="BUGZILLA"/>
		<reference ref_id="1142439" ref_url="https://bugzilla.suse.com/1142439" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16808" ref_url="https://www.suse.com/security/cve/CVE-2017-16808/" source="CVE"/>
		<reference ref_id="CVE-2019-1010220" ref_url="https://www.suse.com/security/cve/CVE-2019-1010220/" source="CVE"/>
		<description>
This update for tcpdump fixes the following issues:

Security issues fixed:

- CVE-2019-1010220: Fixed a buffer over-read in print_prefix() which may expose data (bsc#1142439).
- CVE-2017-16808: Fixed a heap-based buffer over-read related to aoe_print() and lookup_emem() (bsc#1068716).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-07"/>
	<updated date="2019-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068716">SUSE bug 1068716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142439">SUSE bug 1142439</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16808/">CVE-2017-16808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16808">CVE-2017-16808 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1010220/">CVE-2019-1010220 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010220">CVE-2019-1010220 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522066" comment="tcpdump-4.9.2-14.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152019" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1140738" ref_url="https://bugzilla.suse.com/1140738" source="BUGZILLA"/>
		<reference ref_id="1141329" ref_url="https://bugzilla.suse.com/1141329" source="BUGZILLA"/>
		<reference ref_id="1141332" ref_url="https://bugzilla.suse.com/1141332" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525/" source="CVE"/>
		<reference ref_id="CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529/" source="CVE"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

Security issue fixed:

- CVE-2019-12529: Fixed a potential denial of service associated with HTTP Basic Authentication credentials (bsc#1141329).
- CVE-2019-12525: Fixed a denial of service during processing of HTTP Digest Authentication credentials (bsc#1141332).
- CVE-2019-13345: Fixed a cross site scripting vulnerability via user_name or auth parameter in cachemgr.cgi (bsc#1140738).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-08"/>
	<updated date="2019-08-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141329">SUSE bug 1141329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141332">SUSE bug 1141332</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12525">CVE-2019-12525 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12529">CVE-2019-12529 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13345">CVE-2019-13345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530622" comment="squid-3.5.21-26.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152020" version="1" class="patch">
	<metadata>
		<title>Security update for rsyslog (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1123164" ref_url="https://bugzilla.suse.com/1123164" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16881" ref_url="https://www.suse.com/security/cve/CVE-2018-16881/" source="CVE"/>
		<description>
This update for rsyslog fixes the following issues:

Security issue fixed:

- CVE-2018-16881: Fixed a denial of service when both the imtcp module and Octet-Counted TCP Framing is enabled (bsc#1123164).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-31"/>
	<updated date="2019-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1123164">SUSE bug 1123164</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16881/">CVE-2018-16881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16881">CVE-2018-16881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521595" comment="rsyslog-8.24.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557326" comment="rsyslog-diag-tools-8.24.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557327" comment="rsyslog-doc-8.24.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557328" comment="rsyslog-module-gssapi-8.24.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557329" comment="rsyslog-module-gtls-8.24.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557330" comment="rsyslog-module-mysql-8.24.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557331" comment="rsyslog-module-pgsql-8.24.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557332" comment="rsyslog-module-relp-8.24.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557333" comment="rsyslog-module-snmp-8.24.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557334" comment="rsyslog-module-udpspoof-8.24.0-3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152021" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-20852: Fixed an information leak where cookies could be send to the wrong server because of incorrect domain validation (bsc#1141853).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-23"/>
	<updated date="2019-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522067" comment="libpython2_7-1_0-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522068" comment="libpython2_7-1_0-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522069" comment="python-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530623" comment="python-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522070" comment="python-base-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530624" comment="python-base-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522071" comment="python-curses-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530625" comment="python-demo-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522072" comment="python-devel-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530626" comment="python-doc-2.7.13-28.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530627" comment="python-doc-pdf-2.7.13-28.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530628" comment="python-gdbm-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530629" comment="python-idle-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522073" comment="python-tk-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522074" comment="python-xml-2.7.13-28.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152022" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1141980" ref_url="https://bugzilla.suse.com/1141980" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13619" ref_url="https://www.suse.com/security/cve/CVE-2019-13619/" source="CVE"/>
		<description>
This update for wireshark to version 2.4.16 fixes the following issues:

Security issue fixed:

- CVE-2019-13619: ASN.1 BER and related dissectors crash (bsc#1141980).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-09"/>
	<updated date="2019-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141980">SUSE bug 1141980</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13619/">CVE-2019-13619 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13619">CVE-2019-13619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522075" comment="libwireshark9-2.4.16-48.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522076" comment="libwiretap7-2.4.16-48.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522077" comment="libwscodecs1-2.4.16-48.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522078" comment="libwsutil8-2.4.16-48.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522079" comment="wireshark-2.4.16-48.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522080" comment="wireshark-gtk-2.4.16-48.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152023" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="962522" ref_url="https://bugzilla.suse.com/962522" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1923" ref_url="https://www.suse.com/security/cve/CVE-2016-1923/" source="CVE"/>
		<description>
This update for openjpeg2 fixes the following issues:

Security issue fixed:

- CVE-2016-1923: Fixed anout of bounds read int opj_j2k_update_image_data() and opj_tgt_reset () (bsc#962522).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-15"/>
	<updated date="2019-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/962522">SUSE bug 962522</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1923/">CVE-2016-1923 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1923">CVE-2016-1923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522086" comment="libopenjp2-7-2.1.0-4.12.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152024" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<description>
This update for postgresql96 fixes the following issues:                    
                                                                                          
Security issue fixed:                                                                                 
                                                                                  
- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-10208">CVE-2019-10208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530671" comment="postgresql96-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530672" comment="postgresql96-contrib-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530673" comment="postgresql96-docs-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530674" comment="postgresql96-plperl-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530675" comment="postgresql96-plpython-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530676" comment="postgresql96-pltcl-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530677" comment="postgresql96-server-9.6.15-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152025" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1119376" ref_url="https://bugzilla.suse.com/1119376" source="BUGZILLA"/>
		<reference ref_id="1129071" ref_url="https://bugzilla.suse.com/1129071" source="BUGZILLA"/>
		<reference ref_id="1132663" ref_url="https://bugzilla.suse.com/1132663" source="BUGZILLA"/>
		<reference ref_id="1132900" ref_url="https://bugzilla.suse.com/1132900" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20060" ref_url="https://www.suse.com/security/cve/CVE-2018-20060/" source="CVE"/>
		<reference ref_id="CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236/" source="CVE"/>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<description>
This update for python-urllib3 fixes the following issues:

Security issues fixed:

- CVE-2019-9740: Fixed CRLF injection issue (bsc#1129071).
- CVE-2019-11324: Fixed invalid CA certificat verification (bsc#1132900).
- CVE-2019-11236: Fixed CRLF injection via request parameter (bsc#1132663).
- CVE-2018-20060: Remove Authorization header when redirecting cross-host (bsc#1119376).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-19"/>
	<updated date="2019-08-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1119376">SUSE bug 1119376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129071">SUSE bug 1129071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132663">SUSE bug 1132663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132900">SUSE bug 1132900</bugzilla>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20060/">CVE-2018-20060 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20060">CVE-2018-20060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11236">CVE-2019-11236 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">CVE-2019-11324 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9740">CVE-2019-9740 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557335" comment="python-urllib3-1.22-7.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152026" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1133719" ref_url="https://bugzilla.suse.com/1133719" source="BUGZILLA"/>
		<reference ref_id="1138301" ref_url="https://bugzilla.suse.com/1138301" source="BUGZILLA"/>
		<reference ref_id="1138303" ref_url="https://bugzilla.suse.com/1138303" source="BUGZILLA"/>
		<reference ref_id="1138734" ref_url="https://bugzilla.suse.com/1138734" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<reference ref_id="CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path
  parameter pointing anywhere on the system and potentially leading to execution
  of a malicious file with root privileges by libvirtd (bsc#1138301).
- CVE-2019-10167: Fixed an issue with virConnectGetDomainCapabilities API which
  could have been used to execute arbitrary emulators (bsc#1138303).

Non-security issues fixed:

- Fixed an issue with short bitmaps when setting vcpu affinity using the vcpupin (bsc#1138734).
- Added support for overriding max threads per process limit (bsc#1133719)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-28"/>
	<updated date="2019-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133719">SUSE bug 1133719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138303">SUSE bug 1138303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138734">SUSE bug 1138734</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10161">CVE-2019-10161 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10167">CVE-2019-10167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555647" comment="libvirt-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555648" comment="libvirt-admin-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555649" comment="libvirt-client-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555650" comment="libvirt-daemon-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555651" comment="libvirt-daemon-config-network-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555652" comment="libvirt-daemon-config-nwfilter-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555653" comment="libvirt-daemon-driver-interface-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538264" comment="libvirt-daemon-driver-libxl-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555654" comment="libvirt-daemon-driver-lxc-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555655" comment="libvirt-daemon-driver-network-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555656" comment="libvirt-daemon-driver-nodedev-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555657" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555658" comment="libvirt-daemon-driver-qemu-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555659" comment="libvirt-daemon-driver-secret-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555660" comment="libvirt-daemon-driver-storage-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555661" comment="libvirt-daemon-driver-storage-core-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555662" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555663" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555664" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555665" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538277" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555666" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555667" comment="libvirt-daemon-hooks-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555668" comment="libvirt-daemon-lxc-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555669" comment="libvirt-daemon-qemu-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538282" comment="libvirt-daemon-xen-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555670" comment="libvirt-doc-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555671" comment="libvirt-libs-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555672" comment="libvirt-lock-sanlock-3.3.0-5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555673" comment="libvirt-nss-3.3.0-5.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152027" version="1" class="patch">
	<metadata>
		<title>Security update for apache-commons-beanutils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1146657" ref_url="https://bugzilla.suse.com/1146657" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10086" ref_url="https://www.suse.com/security/cve/CVE-2019-10086/" source="CVE"/>
		<description>
This update for apache-commons-beanutils fixes the following issues:

Security issue fixed:

- CVE-2019-10086: Added special BeanIntrospector class which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects (bsc#1146657).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-28"/>
	<updated date="2019-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146657">SUSE bug 1146657</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10086/">CVE-2019-10086 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10086">CVE-2019-10086 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557336" comment="apache-commons-beanutils-1.9.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557337" comment="apache-commons-beanutils-javadoc-1.9.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152028" version="1" class="patch">
	<metadata>
		<title>Recommended update for NetworkManager (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="990204" ref_url="https://bugzilla.suse.com/990204" source="BUGZILLA"/>
		<description>
This update for NetworkManager fixes the following issues:

Security issue fixed:

- Fixed that passwords are not echoed on terminal when asking for them (bsc#990204).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/990204">SUSE bug 990204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522089" comment="libnm-glib-vpn1-1.0.12-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522090" comment="libnm-glib4-1.0.12-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522091" comment="libnm-util2-1.0.12-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522092" comment="libnm0-1.0.12-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522094" comment="typelib-1_0-NMClient-1_0-1.0.12-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522095" comment="typelib-1_0-NetworkManager-1_0-1.0.12-13.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152029" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1114674" ref_url="https://bugzilla.suse.com/1114674" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311/" source="CVE"/>
		<description>
This update for perl fixes the following issues:

Security issue fixed:

- CVE-2018-18311: Fixed integer overflow with oversize environment (bsc#1114674).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1114674">SUSE bug 1114674</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18311">CVE-2018-18311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522096" comment="perl-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522097" comment="perl-32bit-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522098" comment="perl-base-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522099" comment="perl-doc-5.18.2-12.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152030" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp, zypper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1049825" ref_url="https://bugzilla.suse.com/1049825" source="BUGZILLA"/>
		<reference ref_id="1109893" ref_url="https://bugzilla.suse.com/1109893" source="BUGZILLA"/>
		<reference ref_id="1110542" ref_url="https://bugzilla.suse.com/1110542" source="BUGZILLA"/>
		<reference ref_id="1111319" ref_url="https://bugzilla.suse.com/1111319" source="BUGZILLA"/>
		<reference ref_id="1112911" ref_url="https://bugzilla.suse.com/1112911" source="BUGZILLA"/>
		<reference ref_id="1113296" ref_url="https://bugzilla.suse.com/1113296" source="BUGZILLA"/>
		<reference ref_id="1116995" ref_url="https://bugzilla.suse.com/1116995" source="BUGZILLA"/>
		<reference ref_id="1120629" ref_url="https://bugzilla.suse.com/1120629" source="BUGZILLA"/>
		<reference ref_id="1120630" ref_url="https://bugzilla.suse.com/1120630" source="BUGZILLA"/>
		<reference ref_id="1120631" ref_url="https://bugzilla.suse.com/1120631" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1131823" ref_url="https://bugzilla.suse.com/1131823" source="BUGZILLA"/>
		<reference ref_id="1134226" ref_url="https://bugzilla.suse.com/1134226" source="BUGZILLA"/>
		<reference ref_id="1137977" ref_url="https://bugzilla.suse.com/1137977" source="BUGZILLA"/>
		<reference ref_id="1140039" ref_url="https://bugzilla.suse.com/1140039" source="BUGZILLA"/>
		<reference ref_id="1145521" ref_url="https://bugzilla.suse.com/1145521" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<description>
This update for libsolv, libzypp and zypper fixes the following issues:

libsolv was updated to version 0.6.36 and fixes the following issues:

Security issues fixed:

- CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629).
- CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630).
- CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631).

Non-security issues fixed:

- Made cleandeps jobs on patterns work (bsc#1137977).
- Fixed an issue multiversion packages that obsolete their own name (bsc#1127155).
- Keep consistent package name if there are multiple alternatives (bsc#1131823).

Fixes for libzypp:

- Fixes a bug where locking the kernel was not possible (bsc#1113296)
- Fixes a file descriptor leak (bsc#1116995)
- Will now run file conflict check on dry-run (best with download-only) (bsc#1140039)

Fixes for zypper:

- Fixes a bug where the wrong exit code was set when refreshing repos if --root was used (bsc#1134226)
- Improved the displaying of locks (bsc#1112911)
- Fixes an issue where `https` repository urls caused an error prompt to appear twice (bsc#1110542)
- zypper will now always warn when no repositories are defined (bsc#1109893)
- Fixes bash completion option detection (bsc#1049825)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049825">SUSE bug 1049825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109893">SUSE bug 1109893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110542">SUSE bug 1110542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111319">SUSE bug 1111319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112911">SUSE bug 1112911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113296">SUSE bug 1113296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116995">SUSE bug 1116995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131823">SUSE bug 1131823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134226">SUSE bug 1134226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137977">SUSE bug 1137977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140039">SUSE bug 1140039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145521">SUSE bug 1145521</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20532">CVE-2018-20532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20533">CVE-2018-20533 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20534">CVE-2018-20534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522100" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522101" comment="libzypp-16.20.2-27.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530678" comment="perl-solv-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522102" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522103" comment="zypper-1.13.54-18.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152031" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

Security issue fixed:

- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-10208">CVE-2019-10208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522105" comment="libecpg6-10.10-1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522106" comment="libpq5-10.10-1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522107" comment="libpq5-32bit-10.10-1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522108" comment="postgresql10-10.10-1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557338" comment="postgresql10-contrib-10.10-1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557339" comment="postgresql10-docs-10.10-1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557340" comment="postgresql10-server-10.10-1.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152032" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1127077" ref_url="https://bugzilla.suse.com/1127077" source="BUGZILLA"/>
		<reference ref_id="1135902" ref_url="https://bugzilla.suse.com/1135902" source="BUGZILLA"/>
		<reference ref_id="1139926" ref_url="https://bugzilla.suse.com/1139926" source="BUGZILLA"/>
		<reference ref_id="1140402" ref_url="https://bugzilla.suse.com/1140402" source="BUGZILLA"/>
		<reference ref_id="1143794" ref_url="https://bugzilla.suse.com/1143794" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-13164" ref_url="https://www.suse.com/security/cve/CVE-2019-13164/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2019-14378: Security fix for heap overflow in ip_reass on big packet input (bsc#1143794).
- CVE-2019-12155: Security fix for null pointer dereference while releasing spice resources (bsc#1135902).
- CVE-2019-13164: Security fix for qemu-bridge-helper ACL can be bypassed when names are too long (bsc#1140402).

Bug fixes:

- Provide qcow2 L2 caching improvements, which allows for better storage performance in certain configurations (bsc#1139926, ECO-130).
- Fix setting speed of migration while vm uses hugepages (bsc#1127077).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-04"/>
	<updated date="2019-09-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127077">SUSE bug 1127077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135902">SUSE bug 1135902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139926">SUSE bug 1139926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140402">SUSE bug 1140402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143794">SUSE bug 1143794</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12155">CVE-2019-12155 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13164/">CVE-2019-13164 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13164">CVE-2019-13164 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14378">CVE-2019-14378 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557341" comment="qemu-2.9.1-6.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557342" comment="qemu-block-curl-2.9.1-6.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557343" comment="qemu-block-iscsi-2.9.1-6.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557344" comment="qemu-block-rbd-2.9.1-6.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557345" comment="qemu-block-ssh-2.9.1-6.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557346" comment="qemu-guest-agent-2.9.1-6.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557347" comment="qemu-ipxe-1.0.0+-6.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557348" comment="qemu-kvm-2.9.1-6.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557349" comment="qemu-lang-2.9.1-6.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557350" comment="qemu-seabios-1.10.2-6.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557351" comment="qemu-sgabios-8-6.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557352" comment="qemu-tools-2.9.1-6.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557353" comment="qemu-vgabios-1.10.2-6.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557354" comment="qemu-x86-2.9.1-6.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152033" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1145575" ref_url="https://bugzilla.suse.com/1145575" source="BUGZILLA"/>
		<reference ref_id="1145738" ref_url="https://bugzilla.suse.com/1145738" source="BUGZILLA"/>
		<reference ref_id="1145740" ref_url="https://bugzilla.suse.com/1145740" source="BUGZILLA"/>
		<reference ref_id="1145741" ref_url="https://bugzilla.suse.com/1145741" source="BUGZILLA"/>
		<reference ref_id="1145742" ref_url="https://bugzilla.suse.com/1145742" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10081" ref_url="https://www.suse.com/security/cve/CVE-2019-10081/" source="CVE"/>
		<reference ref_id="CVE-2019-10082" ref_url="https://www.suse.com/security/cve/CVE-2019-10082/" source="CVE"/>
		<reference ref_id="CVE-2019-10092" ref_url="https://www.suse.com/security/cve/CVE-2019-10092/" source="CVE"/>
		<reference ref_id="CVE-2019-10098" ref_url="https://www.suse.com/security/cve/CVE-2019-10098/" source="CVE"/>
		<reference ref_id="CVE-2019-9517" ref_url="https://www.suse.com/security/cve/CVE-2019-9517/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

Security issues fixed:

- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1145575).
- CVE-2019-10081: Fixed mod_http2 that is vulnerable to memory corruption on early pushes (bsc#1145742).
- CVE-2019-10082: Fixed mod_http2 that is vulnerable to read-after-free in h2 connection shutdown (bsc#1145741).
- CVE-2019-10092: Fixed limited cross-site scripting in mod_proxy (bsc#1145740).
- CVE-2019-10098: Fixed mod_rewrite configuration vulnerablility to open redirect (bsc#1145738).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-06"/>
	<updated date="2019-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145575">SUSE bug 1145575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145738">SUSE bug 1145738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145740">SUSE bug 1145740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145741">SUSE bug 1145741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145742">SUSE bug 1145742</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10081/">CVE-2019-10081 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10081">CVE-2019-10081 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10082/">CVE-2019-10082 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10082">CVE-2019-10082 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10092/">CVE-2019-10092 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10092">CVE-2019-10092 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10098/">CVE-2019-10098 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10098">CVE-2019-10098 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9517/">CVE-2019-9517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9517">CVE-2019-9517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557355" comment="apache2-2.4.23-29.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557356" comment="apache2-doc-2.4.23-29.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557357" comment="apache2-example-pages-2.4.23-29.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557358" comment="apache2-prefork-2.4.23-29.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557359" comment="apache2-utils-2.4.23-29.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557360" comment="apache2-worker-2.4.23-29.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152034" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update to Java 7.1 Service Refresh 4 Fix Pack 50.

Security issues fixed:

- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-09"/>
	<updated date="2019-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11771">CVE-2019-11771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11775">CVE-2019-11775 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-4473">CVE-2019-4473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530688" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530691" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152035" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1149496" ref_url="https://bugzilla.suse.com/1149496" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5482: Fixed TFTP small blocksize heap buffer overflow (bsc#1149496).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-12"/>
	<updated date="2019-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5482">CVE-2019-5482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530693" comment="curl-7.37.0-37.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530694" comment="libcurl4-7.37.0-37.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530695" comment="libcurl4-32bit-7.37.0-37.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152036" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1135715" ref_url="https://bugzilla.suse.com/1135715" source="BUGZILLA"/>
		<reference ref_id="1148931" ref_url="https://bugzilla.suse.com/1148931" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595/" source="CVE"/>
		<reference ref_id="CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607/" source="CVE"/>
		<reference ref_id="CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615/" source="CVE"/>
		<reference ref_id="CVE-2019-8644" ref_url="https://www.suse.com/security/cve/CVE-2019-8644/" source="CVE"/>
		<reference ref_id="CVE-2019-8649" ref_url="https://www.suse.com/security/cve/CVE-2019-8649/" source="CVE"/>
		<reference ref_id="CVE-2019-8658" ref_url="https://www.suse.com/security/cve/CVE-2019-8658/" source="CVE"/>
		<reference ref_id="CVE-2019-8666" ref_url="https://www.suse.com/security/cve/CVE-2019-8666/" source="CVE"/>
		<reference ref_id="CVE-2019-8669" ref_url="https://www.suse.com/security/cve/CVE-2019-8669/" source="CVE"/>
		<reference ref_id="CVE-2019-8671" ref_url="https://www.suse.com/security/cve/CVE-2019-8671/" source="CVE"/>
		<reference ref_id="CVE-2019-8672" ref_url="https://www.suse.com/security/cve/CVE-2019-8672/" source="CVE"/>
		<reference ref_id="CVE-2019-8673" ref_url="https://www.suse.com/security/cve/CVE-2019-8673/" source="CVE"/>
		<reference ref_id="CVE-2019-8676" ref_url="https://www.suse.com/security/cve/CVE-2019-8676/" source="CVE"/>
		<reference ref_id="CVE-2019-8677" ref_url="https://www.suse.com/security/cve/CVE-2019-8677/" source="CVE"/>
		<reference ref_id="CVE-2019-8678" ref_url="https://www.suse.com/security/cve/CVE-2019-8678/" source="CVE"/>
		<reference ref_id="CVE-2019-8679" ref_url="https://www.suse.com/security/cve/CVE-2019-8679/" source="CVE"/>
		<reference ref_id="CVE-2019-8680" ref_url="https://www.suse.com/security/cve/CVE-2019-8680/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8683" ref_url="https://www.suse.com/security/cve/CVE-2019-8683/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8686" ref_url="https://www.suse.com/security/cve/CVE-2019-8686/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Updated to version 2.24.4 (bsc#1148931).

Security issues fixed:
	  
- CVE-2019-8644, CVE-2019-8649, CVE-2019-8658, CVE-2019-8669, CVE-2019-8678,
  CVE-2019-8680, CVE-2019-8683, CVE-2019-8684, CVE-2019-8688, CVE-2019-8595,
  CVE-2019-8607, CVE-2019-8615, CVE-2019-8644, CVE-2019-8649, CVE-2019-8658,
  CVE-2019-8666, CVE-2019-8669, CVE-2019-8671, CVE-2019-8672, CVE-2019-8673,
  CVE-2019-8676, CVE-2019-8677, CVE-2019-8678, CVE-2019-8679, CVE-2019-8680,
  CVE-2019-8681, CVE-2019-8683, CVE-2019-8684, CVE-2019-8686, CVE-2019-8687,
  CVE-2019-8688, CVE-2019-8689, CVE-2019-8690

Non-security issues fixed:
	  
- Improved loading of multimedia streams to avoid memory exhaustion due to excessive caching.
- Updated the user agent string to make happy certain websites which would claim that the browser being used was unsupported.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-10"/>
	<updated date="2019-09-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8595">CVE-2019-8595 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8607">CVE-2019-8607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8615">CVE-2019-8615 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8644/">CVE-2019-8644 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8644">CVE-2019-8644 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8649/">CVE-2019-8649 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8649">CVE-2019-8649 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8658/">CVE-2019-8658 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8658">CVE-2019-8658 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8666/">CVE-2019-8666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8666">CVE-2019-8666 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8669/">CVE-2019-8669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8669">CVE-2019-8669 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8671/">CVE-2019-8671 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8671">CVE-2019-8671 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8672/">CVE-2019-8672 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8672">CVE-2019-8672 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8673/">CVE-2019-8673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8673">CVE-2019-8673 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8676/">CVE-2019-8676 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8676">CVE-2019-8676 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8677/">CVE-2019-8677 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8677">CVE-2019-8677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8678/">CVE-2019-8678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8678">CVE-2019-8678 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8679/">CVE-2019-8679 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8679">CVE-2019-8679 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8680/">CVE-2019-8680 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8680">CVE-2019-8680 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8681">CVE-2019-8681 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8683/">CVE-2019-8683 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8683">CVE-2019-8683 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8684">CVE-2019-8684 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8686/">CVE-2019-8686 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8686">CVE-2019-8686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8687">CVE-2019-8687 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8688">CVE-2019-8688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8689">CVE-2019-8689 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8690">CVE-2019-8690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152037" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1144621" ref_url="https://bugzilla.suse.com/1144621" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10216" ref_url="https://www.suse.com/security/cve/CVE-2019-10216/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issues:

Security issue fixed:

- CVE-2019-10216: Fix privilege escalation via specially crafted PostScript file (bsc#1144621).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-10"/>
	<updated date="2019-09-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144621">SUSE bug 1144621</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10216/">CVE-2019-10216 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10216">CVE-2019-10216 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522120" comment="ghostscript-9.26a-23.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522121" comment="ghostscript-x11-9.26a-23.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152038" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1121567" ref_url="https://bugzilla.suse.com/1121567" source="BUGZILLA"/>
		<reference ref_id="1149961" ref_url="https://bugzilla.suse.com/1149961" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16889" ref_url="https://www.suse.com/security/cve/CVE-2018-16889/" source="CVE"/>
		<description>
This update for ceph to version 12.2.12-594-g02236657ca fixes the following issues:

Security issues fixed:

- CVE-2018-16889: Fixed missing sanitation of customer encryption keys from log output in v4 auth. (bsc#1121567)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-12"/>
	<updated date="2019-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1121567">SUSE bug 1121567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149961">SUSE bug 1149961</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16889/">CVE-2018-16889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16889">CVE-2018-16889 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522131" comment="ceph-common-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522132" comment="libcephfs2-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522133" comment="librados2-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522134" comment="libradosstriper1-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522135" comment="librbd1-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522136" comment="librgw2-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522137" comment="python-cephfs-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522138" comment="python-rados-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522139" comment="python-rbd-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522140" comment="python-rgw-12.2.12+git.1568024032.02236657ca-2.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152039" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122292" ref_url="https://bugzilla.suse.com/1122292" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11772" ref_url="https://www.suse.com/security/cve/CVE-2019-11772/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2449" ref_url="https://www.suse.com/security/cve/CVE-2019-2449/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 5 Fix Pack 40.

Security issues fixed:

- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11772: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
- CVE-2019-2786: Fixed issue inside Component Security (bsc#1141787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-12"/>
	<updated date="2019-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122292">SUSE bug 1122292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11771">CVE-2019-11771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11772/">CVE-2019-11772 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11772">CVE-2019-11772 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11775">CVE-2019-11775 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2449/">CVE-2019-2449 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2449">CVE-2019-2449 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2766">CVE-2019-2766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2786">CVE-2019-2786 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-4473">CVE-2019-4473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530698" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152040" version="1" class="patch">
	<metadata>
		<title>Security update for ibus (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1150011" ref_url="https://bugzilla.suse.com/1150011" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14822" ref_url="https://www.suse.com/security/cve/CVE-2019-14822/" source="CVE"/>
		<description>
This update for ibus fixes the following issues:

Security issue fixed:

- CVE-2019-14822: Fixed a misconfiguration of the DBus server that allowed an unprivileged user to monitor and send method calls to the ibus bus of another user. (bsc#1150011)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150011">SUSE bug 1150011</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14822/">CVE-2019-14822 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14822">CVE-2019-14822 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522144" comment="ibus-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522145" comment="ibus-gtk-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522146" comment="ibus-gtk3-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522148" comment="ibus-lang-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522149" comment="libibus-1_0-5-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522152" comment="typelib-1_0-IBus-1_0-1.5.13-15.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152041" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1143194" ref_url="https://bugzilla.suse.com/1143194" source="BUGZILLA"/>
		<reference ref_id="1143273" ref_url="https://bugzilla.suse.com/1143273" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13057" ref_url="https://www.suse.com/security/cve/CVE-2019-13057/" source="CVE"/>
		<reference ref_id="CVE-2019-13565" ref_url="https://www.suse.com/security/cve/CVE-2019-13565/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

Security issues fixed:

- CVE-2019-13565: Fixed ssf memory reuse that leads to incorrect authorization of another connection, granting excess connection rights (ssf) (bsc#1143194).
- CVE-2019-13057: Fixed rootDN of a backend that may proxyauth incorrectly to another backend, violating multi-tenant isolation (bsc#1143273).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1143194">SUSE bug 1143194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143273">SUSE bug 1143273</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13057/">CVE-2019-13057 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13057">CVE-2019-13057 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13565/">CVE-2019-13565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13565">CVE-2019-13565 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522153" comment="libldap-2_4-2-2.4.41-18.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522154" comment="libldap-2_4-2-32bit-2.4.41-18.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557361" comment="openldap2-2.4.41-18.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557362" comment="openldap2-back-meta-2.4.41-18.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522155" comment="openldap2-client-2.4.41-18.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522156" comment="openldap2-doc-2.4.41-18.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152042" version="1" class="patch">
	<metadata>
		<title>Security update for python36 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1137942" ref_url="https://bugzilla.suse.com/1137942" source="BUGZILLA"/>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<description>
This update for python36 fixes the following issues:

Security issue fixed:

- CVE-2019-16056: Fixed a parser issue in the email module. (bsc#1149955)

Non-security issue fixed:

- bsc#1137942: Avoid duplicate files with python3* packages (https://fate.suse.com/327309)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-18"/>
	<updated date="2019-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1137942">SUSE bug 1137942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557363" comment="libpython3_6m1_0-3.6.8-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557364" comment="python36-3.6.8-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557365" comment="python36-base-3.6.8-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557366" comment="python36-curses-3.6.8-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557367" comment="python36-dbm-3.6.8-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557368" comment="python36-devel-3.6.8-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557369" comment="python36-doc-3.6.8-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557370" comment="python36-idle-3.6.8-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557371" comment="python36-testsuite-3.6.8-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557372" comment="python36-tk-3.6.8-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557373" comment="python36-tools-3.6.8-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152043" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122706" ref_url="https://bugzilla.suse.com/1122706" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3813" ref_url="https://www.suse.com/security/cve/CVE-2019-3813/" source="CVE"/>
		<description>
This update for spice fixes the following issues:

Security issue fixed:

- CVE-2019-3813: Fixed a out-of-bounds read in the memslot_get_virt function that could lead to denial-of-service or code-execution (bsc#1122706).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-05"/>
	<updated date="2019-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122706">SUSE bug 1122706</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3813/">CVE-2019-3813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3813">CVE-2019-3813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521596" comment="libspice-server1-0.12.8-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152044" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

- CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance (bsc#1150003).
- CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-20"/>
	<updated date="2019-09-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1547">CVE-2019-1547 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1563">CVE-2019-1563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530702" comment="libopenssl-devel-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530703" comment="libopenssl1_0_0-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530704" comment="libopenssl1_0_0-32bit-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530705" comment="libopenssl1_0_0-hmac-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530706" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530707" comment="openssl-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530708" comment="openssl-doc-1.0.2j-60.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152045" version="1" class="patch">
	<metadata>
		<title>Security update for nmap (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1135350" ref_url="https://bugzilla.suse.com/1135350" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15173" ref_url="https://www.suse.com/security/cve/CVE-2018-15173/" source="CVE"/>
		<description>
This update for nmap fixes the following issues:
	  
- Fixed a regression in the version scanner, caused by the fix for CVE-2018-15173. (bsc#1135350)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-20"/>
	<updated date="2019-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135350">SUSE bug 1135350</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15173/">CVE-2018-15173 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15173">CVE-2018-15173 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557374" comment="nmap-6.46-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152046" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120644" ref_url="https://bugzilla.suse.com/1120644" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

Security issue fixed:

- CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509 certificate parser (bsc#1122191)
- CVE-2018-20406: Fixed a integer overflow via a large LONG_BINPUT (bsc#1120644)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-05"/>
	<updated date="2019-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120644">SUSE bug 1120644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20406">CVE-2018-20406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521597" comment="libpython3_4m1_0-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521598" comment="python3-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521599" comment="python3-base-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521600" comment="python3-curses-3.4.6-25.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152047" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1149294" ref_url="https://bugzilla.suse.com/1149294" source="BUGZILLA"/>
		<reference ref_id="1149295" ref_url="https://bugzilla.suse.com/1149295" source="BUGZILLA"/>
		<reference ref_id="1149296" ref_url="https://bugzilla.suse.com/1149296" source="BUGZILLA"/>
		<reference ref_id="1149297" ref_url="https://bugzilla.suse.com/1149297" source="BUGZILLA"/>
		<reference ref_id="1149298" ref_url="https://bugzilla.suse.com/1149298" source="BUGZILLA"/>
		<reference ref_id="1149299" ref_url="https://bugzilla.suse.com/1149299" source="BUGZILLA"/>
		<reference ref_id="1149303" ref_url="https://bugzilla.suse.com/1149303" source="BUGZILLA"/>
		<reference ref_id="1149304" ref_url="https://bugzilla.suse.com/1149304" source="BUGZILLA"/>
		<reference ref_id="1149324" ref_url="https://bugzilla.suse.com/1149324" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<description>
This update for MozillaFirefox to ESR 60.9 fixes the following issues:

Security issues fixed:

- CVE-2019-11742: Fixed a same-origin policy violation involving SVG filters and canvas to steal cross-origin images. (bsc#1149303)
- CVE-2019-11746: Fixed a use-after-free while manipulating video. (bsc#1149297)
- CVE-2019-11744: Fixed an XSS caused by breaking out of title and textarea elements using innerHTML. (bsc#1149304)
- CVE-2019-11753: Fixed a privilege escalation with Mozilla Maintenance Service in custom Firefox installation location. (bsc#1149295)
- CVE-2019-11752: Fixed a use-after-free while extracting a key value in IndexedDB. (bsc#1149296)
- CVE-2019-11743: Fixed a timing side-channel attack on cross-origin information, utilizing unload event attributes. (bsc#1149298)
- CVE-2019-11740: Fixed several memory safety bugs. (bsc#1149299)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-23"/>
	<updated date="2019-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149294">SUSE bug 1149294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149295">SUSE bug 1149295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149296">SUSE bug 1149296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149297">SUSE bug 1149297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149298">SUSE bug 1149298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149299">SUSE bug 1149299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149303">SUSE bug 1149303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149304">SUSE bug 1149304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11753">CVE-2019-11753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522212" comment="MozillaFirefox-60.9.0-109.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522213" comment="MozillaFirefox-translations-common-60.9.0-109.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152048" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1149429" ref_url="https://bugzilla.suse.com/1149429" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

Security issue fixed:

- CVE-2019-15903: Fixed a heap-based buffer over-read caused by crafted XML documents. (bsc#1149429)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-23"/>
	<updated date="2019-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522214" comment="expat-2.1.0-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522215" comment="libexpat1-2.1.0-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522216" comment="libexpat1-32bit-2.1.0-21.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152049" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1146569" ref_url="https://bugzilla.suse.com/1146569" source="BUGZILLA"/>
		<reference ref_id="1146571" ref_url="https://bugzilla.suse.com/1146571" source="BUGZILLA"/>
		<reference ref_id="1146572" ref_url="https://bugzilla.suse.com/1146572" source="BUGZILLA"/>
		<reference ref_id="1146702" ref_url="https://bugzilla.suse.com/1146702" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15142" ref_url="https://www.suse.com/security/cve/CVE-2019-15142/" source="CVE"/>
		<reference ref_id="CVE-2019-15143" ref_url="https://www.suse.com/security/cve/CVE-2019-15143/" source="CVE"/>
		<reference ref_id="CVE-2019-15144" ref_url="https://www.suse.com/security/cve/CVE-2019-15144/" source="CVE"/>
		<reference ref_id="CVE-2019-15145" ref_url="https://www.suse.com/security/cve/CVE-2019-15145/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

Security issues fixed:

- CVE-2019-15142: Fixed heap-based buffer over-read (bsc#1146702).
- CVE-2019-15143: Fixed resource exhaustion caused by corrupted image files (bsc#1146569).
- CVE-2019-15144: Fixed denial-of-service caused by crafted PBM image files (bsc#1146571).
- CVE-2019-15145: Fixed out-of-bounds read caused by corrupted JB2 image files (bsc#1146572).
- Fixed segfault when libtiff encounters corrupted TIFF (upstream issue #295).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1146569">SUSE bug 1146569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146571">SUSE bug 1146571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146572">SUSE bug 1146572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146702">SUSE bug 1146702</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15142/">CVE-2019-15142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15142">CVE-2019-15142 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15143/">CVE-2019-15143 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15143">CVE-2019-15143 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15144/">CVE-2019-15144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15144">CVE-2019-15144 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15145/">CVE-2019-15145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15145">CVE-2019-15145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522217" comment="libdjvulibre21-3.5.25.3-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152050" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1145559" ref_url="https://bugzilla.suse.com/1145559" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11500" ref_url="https://www.suse.com/security/cve/CVE-2019-11500/" source="CVE"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2019-11500: Fixed a potential remote code execution in the IMAP and ManageSieve protocol parsers (bsc#1145559).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145559">SUSE bug 1145559</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11500/">CVE-2019-11500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11500">CVE-2019-11500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530710" comment="dovecot22-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530711" comment="dovecot22-backend-mysql-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530712" comment="dovecot22-backend-pgsql-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530713" comment="dovecot22-backend-sqlite-2.2.31-19.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152051" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1127027" ref_url="https://bugzilla.suse.com/1127027" source="BUGZILLA"/>
		<reference ref_id="1132826" ref_url="https://bugzilla.suse.com/1132826" source="BUGZILLA"/>
		<reference ref_id="1141798" ref_url="https://bugzilla.suse.com/1141798" source="BUGZILLA"/>
		<reference ref_id="1142058" ref_url="https://bugzilla.suse.com/1142058" source="BUGZILLA"/>
		<reference ref_id="1143215" ref_url="https://bugzilla.suse.com/1143215" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2614" ref_url="https://www.suse.com/security/cve/CVE-2019-2614/" source="CVE"/>
		<reference ref_id="CVE-2019-2627" ref_url="https://www.suse.com/security/cve/CVE-2019-2627/" source="CVE"/>
		<reference ref_id="CVE-2019-2737" ref_url="https://www.suse.com/security/cve/CVE-2019-2737/" source="CVE"/>
		<reference ref_id="CVE-2019-2739" ref_url="https://www.suse.com/security/cve/CVE-2019-2739/" source="CVE"/>
		<reference ref_id="CVE-2019-2740" ref_url="https://www.suse.com/security/cve/CVE-2019-2740/" source="CVE"/>
		<reference ref_id="CVE-2019-2805" ref_url="https://www.suse.com/security/cve/CVE-2019-2805/" source="CVE"/>
		<description>
This update for mariadb fixes the following issues:

Updated to MariaDB 10.0.40-1.

Security issues fixed:

- CVE-2019-2805, CVE-2019-2740, CVE-2019-2739, CVE-2019-2737, 
  CVE-2019-2614, CVE-2019-2627. (bsc#1132826) (bsc#1141798).

Non-security issues fixed:

- Adjusted mysql-systemd-helper ('shutdown protected MySQL' section)
  so it checks both ping response and the pid in a process list
  as it can take some time till the process is terminated.
  Otherwise it can lead to 'found left-over process' situation
  when regular mariadb is started. (bsc#1143215)
- Fixed IP resolving in mysql_install_db script. (bsc#1142058, bsc#1127027, MDEV-18526)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-25"/>
	<updated date="2019-09-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127027">SUSE bug 1127027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142058">SUSE bug 1142058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143215">SUSE bug 1143215</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2614/">CVE-2019-2614 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2614">CVE-2019-2614 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2627/">CVE-2019-2627 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2627">CVE-2019-2627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2737/">CVE-2019-2737 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2737">CVE-2019-2737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2739/">CVE-2019-2739 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2739">CVE-2019-2739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2740/">CVE-2019-2740 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2740">CVE-2019-2740 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2805/">CVE-2019-2805 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2805">CVE-2019-2805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557375" comment="libmysqlclient18-10.0.40.1-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557376" comment="libmysqlclient18-32bit-10.0.40.1-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557377" comment="mariadb-10.0.40.1-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557378" comment="mariadb-client-10.0.40.1-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557379" comment="mariadb-errormessages-10.0.40.1-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557380" comment="mariadb-tools-10.0.40.1-29.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152052" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1129180" ref_url="https://bugzilla.suse.com/1129180" source="BUGZILLA"/>
		<reference ref_id="1131863" ref_url="https://bugzilla.suse.com/1131863" source="BUGZILLA"/>
		<reference ref_id="1134156" ref_url="https://bugzilla.suse.com/1134156" source="BUGZILLA"/>
		<reference ref_id="1140359" ref_url="https://bugzilla.suse.com/1140359" source="BUGZILLA"/>
		<reference ref_id="1146882" ref_url="https://bugzilla.suse.com/1146882" source="BUGZILLA"/>
		<reference ref_id="1146884" ref_url="https://bugzilla.suse.com/1146884" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12973" ref_url="https://www.suse.com/security/cve/CVE-2019-12973/" source="CVE"/>
		<reference ref_id="CVE-2019-14811" ref_url="https://www.suse.com/security/cve/CVE-2019-14811/" source="CVE"/>
		<reference ref_id="CVE-2019-14812" ref_url="https://www.suse.com/security/cve/CVE-2019-14812/" source="CVE"/>
		<reference ref_id="CVE-2019-14813" ref_url="https://www.suse.com/security/cve/CVE-2019-14813/" source="CVE"/>
		<reference ref_id="CVE-2019-14817" ref_url="https://www.suse.com/security/cve/CVE-2019-14817/" source="CVE"/>
		<reference ref_id="CVE-2019-3835" ref_url="https://www.suse.com/security/cve/CVE-2019-3835/" source="CVE"/>
		<reference ref_id="CVE-2019-3839" ref_url="https://www.suse.com/security/cve/CVE-2019-3839/" source="CVE"/>
		<description>
This update for ghostscript to 9.27 fixes the following issues:

Security issues fixed:

- CVE-2019-3835: Fixed an unauthorized file system access caused by an available superexec operator.  (bsc#1129180)
- CVE-2019-3839: Fixed an unauthorized file system access caused by available privileged operators. (bsc#1134156)
- CVE-2019-12973: Fixed a denial-of-service vulnerability in the OpenJPEG function opj_t1_encode_cblks. (bsc#1140359)
- CVE-2019-14811: Fixed a safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator. (bsc#1146882)
- CVE-2019-14812: Fixed a safer mode bypass by .forceput exposure in setuserparams. (bsc#1146882)
- CVE-2019-14813: Fixed a safer mode bypass by .forceput exposure in setsystemparams. (bsc#1146882)
- CVE-2019-14817: Fixed a safer mode bypass by .forceput exposure in .pdfexectoken and other procedures. (bsc#1146884)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-26"/>
	<updated date="2019-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129180">SUSE bug 1129180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131863">SUSE bug 1131863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134156">SUSE bug 1134156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140359">SUSE bug 1140359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146884">SUSE bug 1146884</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12973/">CVE-2019-12973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12973">CVE-2019-12973 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14811/">CVE-2019-14811 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14811">CVE-2019-14811 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14812/">CVE-2019-14812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14812">CVE-2019-14812 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14813/">CVE-2019-14813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14813">CVE-2019-14813 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14817/">CVE-2019-14817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14817">CVE-2019-14817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3835/">CVE-2019-3835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3835">CVE-2019-3835 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3839/">CVE-2019-3839 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3839">CVE-2019-3839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522218" comment="ghostscript-9.27-23.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522219" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152053" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1124847" ref_url="https://bugzilla.suse.com/1124847" source="BUGZILLA"/>
		<reference ref_id="1141093" ref_url="https://bugzilla.suse.com/1141093" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13050" ref_url="https://www.suse.com/security/cve/CVE-2019-13050/" source="CVE"/>
		<description>
This update for gpg2 fixes the following issues:

Security issue fixed:

- CVE-2019-13050: Fixed denial-of-service attacks via big keys. (bsc#1141093)

Non-security issue fixed:

- Allow coredumps in X11 desktop sessions (bsc#1124847).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-27"/>
	<updated date="2019-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124847">SUSE bug 1124847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141093">SUSE bug 1141093</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13050/">CVE-2019-13050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13050">CVE-2019-13050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522220" comment="gpg2-2.0.24-9.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522221" comment="gpg2-lang-2.0.24-9.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152054" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1123371" ref_url="https://bugzilla.suse.com/1123371" source="BUGZILLA"/>
		<reference ref_id="1123377" ref_url="https://bugzilla.suse.com/1123377" source="BUGZILLA"/>
		<reference ref_id="1123378" ref_url="https://bugzilla.suse.com/1123378" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16890" ref_url="https://www.suse.com/security/cve/CVE-2018-16890/" source="CVE"/>
		<reference ref_id="CVE-2019-3822" ref_url="https://www.suse.com/security/cve/CVE-2019-3822/" source="CVE"/>
		<reference ref_id="CVE-2019-3823" ref_url="https://www.suse.com/security/cve/CVE-2019-3823/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2019-3823: Fixed a heap out-of-bounds read in the code handling the end-of-response for SMTP (bsc#1123378).
- CVE-2019-3822: Fixed a stack based buffer overflow in the function creating an outgoing NTLM type-3 message (bsc#1123377).
- CVE-2018-16890: Fixed a heap buffer out-of-bounds read in the function handling incoming NTLM type-2 messages (bsc#1123371).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-06"/>
	<updated date="2019-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1123371">SUSE bug 1123371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123377">SUSE bug 1123377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123378">SUSE bug 1123378</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16890/">CVE-2018-16890 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16890">CVE-2018-16890 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3822/">CVE-2019-3822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3822">CVE-2019-3822 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3823/">CVE-2019-3823 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3823">CVE-2019-3823 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521601" comment="curl-7.37.0-37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521602" comment="libcurl4-7.37.0-37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521603" comment="libcurl4-32bit-7.37.0-37.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152055" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1148987" ref_url="https://bugzilla.suse.com/1148987" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627/" source="CVE"/>
		<description>
This update for libgcrypt fixes the following issues:

Security issues fixed:
	  
- CVE-2019-13627: Mitigated ECDSA timing attack. (bsc#1148987)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-01"/>
	<updated date="2019-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1148987">SUSE bug 1148987</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13627">CVE-2019-13627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522236" comment="libgcrypt20-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522237" comment="libgcrypt20-32bit-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530714" comment="libgcrypt20-hmac-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530715" comment="libgcrypt20-hmac-32bit-1.6.1-16.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152056" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010783" ref_url="https://bugzilla.suse.com/1010783" source="BUGZILLA"/>
		<reference ref_id="1117505" ref_url="https://bugzilla.suse.com/1117505" source="BUGZILLA"/>
		<reference ref_id="1117507" ref_url="https://bugzilla.suse.com/1117507" source="BUGZILLA"/>
		<reference ref_id="1117508" ref_url="https://bugzilla.suse.com/1117508" source="BUGZILLA"/>
		<reference ref_id="1117511" ref_url="https://bugzilla.suse.com/1117511" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9396" ref_url="https://www.suse.com/security/cve/CVE-2016-9396/" source="CVE"/>
		<reference ref_id="CVE-2018-19539" ref_url="https://www.suse.com/security/cve/CVE-2018-19539/" source="CVE"/>
		<reference ref_id="CVE-2018-19540" ref_url="https://www.suse.com/security/cve/CVE-2018-19540/" source="CVE"/>
		<reference ref_id="CVE-2018-19541" ref_url="https://www.suse.com/security/cve/CVE-2018-19541/" source="CVE"/>
		<reference ref_id="CVE-2018-19542" ref_url="https://www.suse.com/security/cve/CVE-2018-19542/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

Security issues fixed:

- CVE-2018-19540: Fixed  a heap based overflow in jas_icctxtdesc_input (bsc#1117508).
- CVE-2018-19541: Fix heap based overread in jas_image_depalettize (bsc#1117507).
- CVE-2018-19542: Fixed a denial of service in jp2_decode (bsc#1117505).
- CVE-2018-19539: Fixed a denial of service in jas_image_readcmpt (bsc#1117511).
- CVE-2016-9396: Fixed a denial of service in jpc_cox_getcompparms (bsc#1010783).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-02"/>
	<updated date="2019-10-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010783">SUSE bug 1010783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117505">SUSE bug 1117505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117507">SUSE bug 1117507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117508">SUSE bug 1117508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117511">SUSE bug 1117511</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9396/">CVE-2016-9396 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9396">CVE-2016-9396 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19539/">CVE-2018-19539 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19539">CVE-2018-19539 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19540/">CVE-2018-19540 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19540">CVE-2018-19540 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19541/">CVE-2018-19541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19541">CVE-2018-19541 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19542/">CVE-2018-19542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19542">CVE-2018-19542 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522238" comment="libjasper1-1.900.14-195.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522239" comment="libjasper1-32bit-1.900.14-195.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152057" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1150137" ref_url="https://bugzilla.suse.com/1150137" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16168" ref_url="https://www.suse.com/security/cve/CVE-2019-16168/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issue fixed:

- CVE-2019-16168: Fixed improper validation of sqlite_stat1 field that could lead to denial of service (bsc#1150137).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-03"/>
	<updated date="2019-10-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150137">SUSE bug 1150137</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16168/">CVE-2019-16168 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16168">CVE-2019-16168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522240" comment="libsqlite3-0-3.8.10.2-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522241" comment="libsqlite3-0-32bit-3.8.10.2-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522242" comment="sqlite3-3.8.10.2-9.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152058" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1087200" ref_url="https://bugzilla.suse.com/1087200" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1117473" ref_url="https://bugzilla.suse.com/1117473" source="BUGZILLA"/>
		<reference ref_id="1123482" ref_url="https://bugzilla.suse.com/1123482" source="BUGZILLA"/>
		<reference ref_id="1124525" ref_url="https://bugzilla.suse.com/1124525" source="BUGZILLA"/>
		<reference ref_id="1133810" ref_url="https://bugzilla.suse.com/1133810" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="1145665" ref_url="https://bugzilla.suse.com/1145665" source="BUGZILLA"/>
		<reference ref_id="1149323" ref_url="https://bugzilla.suse.com/1149323" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Updated to new ESR version 68.1 (bsc#1149323).

In addition to the already fixed vulnerabilities released in previous ESR updates,
the following were also fixed:
    CVE-2019-11751, CVE-2019-11736, CVE-2019-9812, CVE-2019-11748, CVE-2019-11749,
    CVE-2019-11750, CVE-2019-11738, CVE-2019-11747, CVE-2019-11735.

Several run-time issues were also resolved (bsc#1117473, bsc#1124525, bsc#1133810).

The version displayed in Help &gt; About is now correct (bsc#1087200).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-09"/>
	<updated date="2019-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087200">SUSE bug 1087200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117473">SUSE bug 1117473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123482">SUSE bug 1123482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124525">SUSE bug 1124525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133810">SUSE bug 1133810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145665">SUSE bug 1145665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11710">CVE-2019-11710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11714">CVE-2019-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11716">CVE-2019-11716 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11718">CVE-2019-11718 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11720">CVE-2019-11720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11721">CVE-2019-11721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11723">CVE-2019-11723 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11724">CVE-2019-11724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11725">CVE-2019-11725 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11727">CVE-2019-11727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11728">CVE-2019-11728 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11733">CVE-2019-11733 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11735">CVE-2019-11735 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11736">CVE-2019-11736 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11738">CVE-2019-11738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11747">CVE-2019-11747 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11748">CVE-2019-11748 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11749">CVE-2019-11749 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11750">CVE-2019-11750 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11751">CVE-2019-11751 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11753">CVE-2019-11753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152059" version="1" class="patch">
	<metadata>
		<title>Recommended update for python-setuptools and dependend packages (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1024540" ref_url="https://bugzilla.suse.com/1024540" source="BUGZILLA"/>
		<reference ref_id="1054413" ref_url="https://bugzilla.suse.com/1054413" source="BUGZILLA"/>
		<reference ref_id="1074247" ref_url="https://bugzilla.suse.com/1074247" source="BUGZILLA"/>
		<reference ref_id="1075812" ref_url="https://bugzilla.suse.com/1075812" source="BUGZILLA"/>
		<reference ref_id="1088358" ref_url="https://bugzilla.suse.com/1088358" source="BUGZILLA"/>
		<reference ref_id="1091826" ref_url="https://bugzilla.suse.com/1091826" source="BUGZILLA"/>
		<reference ref_id="1110422" ref_url="https://bugzilla.suse.com/1110422" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9015" ref_url="https://www.suse.com/security/cve/CVE-2016-9015/" source="CVE"/>
		<description>

All changes necessary for upgrade of python-setuptools to 40.6.2 (bsc#1075812)

New packages:
- python-cachetools
- python-google-auth
- python-packaging

Rebuilt without source changes:

- python-cffi
- python-cliff
- python-mock
- python-oauthlib
- python-pbr
- python-PyJWT
- python-pytest

Added python3 packages:

- python-hgtools
- python-pyasn1-modules
- python-rsa

Updated:

- python-kubernetes
  Updated to version 6.0

- python-pyparsing

  Was updated to version 2.2.0.

- python-setuptools

  Was upgraded to version 40.6.2.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-11"/>
	<updated date="2019-10-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024540">SUSE bug 1024540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054413">SUSE bug 1054413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074247">SUSE bug 1074247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075812">SUSE bug 1075812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088358">SUSE bug 1088358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091826">SUSE bug 1091826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110422">SUSE bug 1110422</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9015/">CVE-2016-9015 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9015">CVE-2016-9015 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009561941" comment="python-setuptools-40.6.2-4.12.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009561942" comment="python3-setuptools-40.6.2-4.12.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152060" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1109412" ref_url="https://bugzilla.suse.com/1109412" source="BUGZILLA"/>
		<reference ref_id="1109413" ref_url="https://bugzilla.suse.com/1109413" source="BUGZILLA"/>
		<reference ref_id="1109414" ref_url="https://bugzilla.suse.com/1109414" source="BUGZILLA"/>
		<reference ref_id="1111996" ref_url="https://bugzilla.suse.com/1111996" source="BUGZILLA"/>
		<reference ref_id="1112534" ref_url="https://bugzilla.suse.com/1112534" source="BUGZILLA"/>
		<reference ref_id="1112535" ref_url="https://bugzilla.suse.com/1112535" source="BUGZILLA"/>
		<reference ref_id="1113247" ref_url="https://bugzilla.suse.com/1113247" source="BUGZILLA"/>
		<reference ref_id="1113252" ref_url="https://bugzilla.suse.com/1113252" source="BUGZILLA"/>
		<reference ref_id="1113255" ref_url="https://bugzilla.suse.com/1113255" source="BUGZILLA"/>
		<reference ref_id="1116827" ref_url="https://bugzilla.suse.com/1116827" source="BUGZILLA"/>
		<reference ref_id="1118830" ref_url="https://bugzilla.suse.com/1118830" source="BUGZILLA"/>
		<reference ref_id="1118831" ref_url="https://bugzilla.suse.com/1118831" source="BUGZILLA"/>
		<reference ref_id="1120640" ref_url="https://bugzilla.suse.com/1120640" source="BUGZILLA"/>
		<reference ref_id="1121034" ref_url="https://bugzilla.suse.com/1121034" source="BUGZILLA"/>
		<reference ref_id="1121035" ref_url="https://bugzilla.suse.com/1121035" source="BUGZILLA"/>
		<reference ref_id="1121056" ref_url="https://bugzilla.suse.com/1121056" source="BUGZILLA"/>
		<reference ref_id="1133131" ref_url="https://bugzilla.suse.com/1133131" source="BUGZILLA"/>
		<reference ref_id="1133232" ref_url="https://bugzilla.suse.com/1133232" source="BUGZILLA"/>
		<reference ref_id="1141913" ref_url="https://bugzilla.suse.com/1141913" source="BUGZILLA"/>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000876" ref_url="https://www.suse.com/security/cve/CVE-2018-1000876/" source="CVE"/>
		<reference ref_id="CVE-2018-17358" ref_url="https://www.suse.com/security/cve/CVE-2018-17358/" source="CVE"/>
		<reference ref_id="CVE-2018-17359" ref_url="https://www.suse.com/security/cve/CVE-2018-17359/" source="CVE"/>
		<reference ref_id="CVE-2018-17360" ref_url="https://www.suse.com/security/cve/CVE-2018-17360/" source="CVE"/>
		<reference ref_id="CVE-2018-17985" ref_url="https://www.suse.com/security/cve/CVE-2018-17985/" source="CVE"/>
		<reference ref_id="CVE-2018-18309" ref_url="https://www.suse.com/security/cve/CVE-2018-18309/" source="CVE"/>
		<reference ref_id="CVE-2018-18483" ref_url="https://www.suse.com/security/cve/CVE-2018-18483/" source="CVE"/>
		<reference ref_id="CVE-2018-18484" ref_url="https://www.suse.com/security/cve/CVE-2018-18484/" source="CVE"/>
		<reference ref_id="CVE-2018-18605" ref_url="https://www.suse.com/security/cve/CVE-2018-18605/" source="CVE"/>
		<reference ref_id="CVE-2018-18606" ref_url="https://www.suse.com/security/cve/CVE-2018-18606/" source="CVE"/>
		<reference ref_id="CVE-2018-18607" ref_url="https://www.suse.com/security/cve/CVE-2018-18607/" source="CVE"/>
		<reference ref_id="CVE-2018-19931" ref_url="https://www.suse.com/security/cve/CVE-2018-19931/" source="CVE"/>
		<reference ref_id="CVE-2018-19932" ref_url="https://www.suse.com/security/cve/CVE-2018-19932/" source="CVE"/>
		<reference ref_id="CVE-2018-20623" ref_url="https://www.suse.com/security/cve/CVE-2018-20623/" source="CVE"/>
		<reference ref_id="CVE-2018-20651" ref_url="https://www.suse.com/security/cve/CVE-2018-20651/" source="CVE"/>
		<reference ref_id="CVE-2018-20671" ref_url="https://www.suse.com/security/cve/CVE-2018-20671/" source="CVE"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<description>
This update for binutils fixes the following issues:

binutils was updated to current 2.32 branch @7b468db3 [jsc#ECO-368]:

Includes the following security fixes:

- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)
- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)
- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)
- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)
- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)
- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)
- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)
- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)
- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)
- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)
- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)
- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)
- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)
- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)
- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in  load_specific_debug_section in objdump.c (bsc#1121056)
- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)
- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)

- Enable xtensa architecture (Tensilica lc6 and related)
- Use -ffat-lto-objects in order to provide assembly for static libs
  (bsc#1141913).
- Fixed some LTO problems (bsc#1133131 bsc#1133232).
- riscv: Don't check ABI flags if no code section

Update to binutils 2.32:

* The binutils now support for the C-SKY processor series.
* The x86 assembler now supports a -mvexwig=[0|1] option to control
  encoding of VEX.W-ignored (WIG) VEX instructions.
  It also has a new -mx86-used-note=[yes|no] option to generate (or
  not) x86 GNU property notes.
* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),
  the Loongson EXTensions (EXT) instructions, the Loongson Content
  Address Memory (CAM) ASE and the Loongson MultiMedia extensions
  Instructions (MMI) ASE.
* The addr2line, c++filt, nm and objdump tools now have a default
  limit on the maximum amount of recursion that is allowed whilst
  demangling strings.  This limit can be disabled if necessary.
* Objdump's --disassemble option can now take a parameter,
  specifying the starting symbol for disassembly.  Disassembly will
  continue from this symbol up to the next symbol or the end of the
  function.
* The BFD linker will now report property change in linker map file
  when merging GNU properties.
* The BFD linker's -t option now doesn't report members within
  archives, unless -t is given twice.  This makes it more useful
  when generating a list of files that should be packaged for a
  linker bug report.
* The GOLD linker has improved warning messages for relocations that
  refer to discarded sections.

- Improve relro support on s390 [fate#326356]
- Handle ELF compressed header alignment correctly.

  		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-14"/>
	<updated date="2019-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109412">SUSE bug 1109412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109413">SUSE bug 1109413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109414">SUSE bug 1109414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111996">SUSE bug 1111996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112534">SUSE bug 1112534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112535">SUSE bug 1112535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113247">SUSE bug 1113247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113252">SUSE bug 1113252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113255">SUSE bug 1113255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116827">SUSE bug 1116827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118830">SUSE bug 1118830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118831">SUSE bug 1118831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120640">SUSE bug 1120640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121034">SUSE bug 1121034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121035">SUSE bug 1121035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121056">SUSE bug 1121056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133131">SUSE bug 1133131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133232">SUSE bug 1133232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141913">SUSE bug 1141913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000876/">CVE-2018-1000876 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000876">CVE-2018-1000876 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17358/">CVE-2018-17358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17358">CVE-2018-17358 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17359/">CVE-2018-17359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17359">CVE-2018-17359 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17360/">CVE-2018-17360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17360">CVE-2018-17360 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17985/">CVE-2018-17985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17985">CVE-2018-17985 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18309/">CVE-2018-18309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18309">CVE-2018-18309 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18483/">CVE-2018-18483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18483">CVE-2018-18483 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18484/">CVE-2018-18484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18484">CVE-2018-18484 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18605/">CVE-2018-18605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18605">CVE-2018-18605 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18606/">CVE-2018-18606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18606">CVE-2018-18606 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18607/">CVE-2018-18607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18607">CVE-2018-18607 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19931/">CVE-2018-19931 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19931">CVE-2018-19931 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19932/">CVE-2018-19932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19932">CVE-2018-19932 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20623/">CVE-2018-20623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20623">CVE-2018-20623 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20651/">CVE-2018-20651 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20651">CVE-2018-20651 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20671/">CVE-2018-20671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20671">CVE-2018-20671 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010180">CVE-2019-1010180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152061" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1153674" ref_url="https://bugzilla.suse.com/1153674" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<description>
This update for sudo fixes the following issues:

Security issue fixed: 	  

- CVE-2019-14287: Fixed an issue where a user with sudo privileges
  that allowed them to run commands with an arbitrary uid, could
  run commands as root, despite being forbidden to do so in sudoers
  (bsc#1153674).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14287">CVE-2019-14287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522249" comment="sudo-1.8.20p2-3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152062" version="1" class="patch">
	<metadata>
		<title>Security update for libpcap (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1153332" ref_url="https://bugzilla.suse.com/1153332" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2019-15165" ref_url="https://www.suse.com/security/cve/CVE-2019-15165/" source="CVE"/>
		<description>
This update for libpcap fixes the following issues:

- CVE-2019-15165: Added sanity checks for PHB header length before allocating memory (bsc#1153332).
- CVE-2018-16301: Fixed a buffer overflow (bsc#1153332).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15165/">CVE-2019-15165 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15165">CVE-2019-15165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522250" comment="libpcap1-1.8.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522252" comment="tcpdump-4.9.2-14.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152063" version="1" class="patch">
	<metadata>
		<title>Security update for python-xdg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="859835" ref_url="https://bugzilla.suse.com/859835" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1624" ref_url="https://www.suse.com/security/cve/CVE-2014-1624/" source="CVE"/>
		<description>
This update for python-xdg fixes the following issues:

Security issue fixed:

- CVE-2014-1624: Fixed a TOCTOU race condition in get_runtime_dir(). (bsc#859835)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-18"/>
	<updated date="2019-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/859835">SUSE bug 859835</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-1624/">CVE-2014-1624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1624">CVE-2014-1624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522258" comment="python-xdg-0.25-9.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152064" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1089524" ref_url="https://bugzilla.suse.com/1089524" source="BUGZILLA"/>
		<reference ref_id="1134078" ref_url="https://bugzilla.suse.com/1134078" source="BUGZILLA"/>
		<reference ref_id="1136572" ref_url="https://bugzilla.suse.com/1136572" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6470" ref_url="https://www.suse.com/security/cve/CVE-2019-6470/" source="CVE"/>
		<description>
This update for dhcp fixes the following issues:

Secuirty issue fixed:

- CVE-2019-6470: Fixed DHCPv6 server crashes (bsc#1134078).

Bug fixes:

- Add compile option --enable-secs-byteorder to avoid duplicate lease warnings (bsc#1089524).
- Use IPv6 when called as dhclient6, dhcpd6, and dhcrelay6 (bsc#1136572).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-21"/>
	<updated date="2019-10-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089524">SUSE bug 1089524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134078">SUSE bug 1134078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136572">SUSE bug 1136572</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6470/">CVE-2019-6470 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6470">CVE-2019-6470 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522259" comment="dhcp-4.3.3-10.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522260" comment="dhcp-client-4.3.3-10.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557381" comment="dhcp-relay-4.3.3-10.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557382" comment="dhcp-server-4.3.3-10.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152065" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120470" ref_url="https://bugzilla.suse.com/1120470" source="BUGZILLA"/>
		<reference ref_id="1120502" ref_url="https://bugzilla.suse.com/1120502" source="BUGZILLA"/>
		<reference ref_id="1120503" ref_url="https://bugzilla.suse.com/1120503" source="BUGZILLA"/>
		<reference ref_id="1120504" ref_url="https://bugzilla.suse.com/1120504" source="BUGZILLA"/>
		<reference ref_id="1120584" ref_url="https://bugzilla.suse.com/1120584" source="BUGZILLA"/>
		<reference ref_id="1120589" ref_url="https://bugzilla.suse.com/1120589" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20544" ref_url="https://www.suse.com/security/cve/CVE-2018-20544/" source="CVE"/>
		<reference ref_id="CVE-2018-20545" ref_url="https://www.suse.com/security/cve/CVE-2018-20545/" source="CVE"/>
		<reference ref_id="CVE-2018-20546" ref_url="https://www.suse.com/security/cve/CVE-2018-20546/" source="CVE"/>
		<reference ref_id="CVE-2018-20547" ref_url="https://www.suse.com/security/cve/CVE-2018-20547/" source="CVE"/>
		<reference ref_id="CVE-2018-20548" ref_url="https://www.suse.com/security/cve/CVE-2018-20548/" source="CVE"/>
		<reference ref_id="CVE-2018-20549" ref_url="https://www.suse.com/security/cve/CVE-2018-20549/" source="CVE"/>
		<description>
This update for libcaca fixes the following issues:

Security issues fixed:

- CVE-2018-20544: Fixed a floating point exception at caca/dither.c (bsc#1120502)
- CVE-2018-20545: Fixed a WRITE memory access in the load_image function at common-image.c for 4bpp (bsc#1120584)
- CVE-2018-20546: Fixed a READ memory access in the get_rgba_default function at caca/dither.c for bpp (bsc#1120503)
- CVE-2018-20547: Fixed a READ memory access in the get_rgba_default function at caca/dither.c for 24bpp (bsc#1120504)
- CVE-2018-20548: Fixed a WRITE memory access in the load_image function at common-image.c for 1bpp (bsc#1120589)
- CVE-2018-20549: Fixed a WRITE memory access in the caca_file_read function at caca/file.c (bsc#1120470)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-22"/>
	<updated date="2019-10-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120470">SUSE bug 1120470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120502">SUSE bug 1120502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120503">SUSE bug 1120503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120504">SUSE bug 1120504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120584">SUSE bug 1120584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120589">SUSE bug 1120589</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20544/">CVE-2018-20544 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20544">CVE-2018-20544 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20545/">CVE-2018-20545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20545">CVE-2018-20545 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20546/">CVE-2018-20546 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20546">CVE-2018-20546 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20547/">CVE-2018-20547 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20547">CVE-2018-20547 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20548/">CVE-2018-20548 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20548">CVE-2018-20548 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20549/">CVE-2018-20549 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20549">CVE-2018-20549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522263" comment="libcaca0-0.99.beta18-14.3.27 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152066" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="1153238" ref_url="https://bugzilla.suse.com/1153238" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<description>
This update for python fixes the following issues:

Security issue fixed:

- CVE-2019-16056: Fixed a parser issue in the email module (bsc#1149955).
- CVE-2019-16935: Fixed a reflected XSS in python/Lib/DocXMLRPCServer.py (bsc#1153238).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-23"/>
	<updated date="2019-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16935">CVE-2019-16935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522264" comment="libpython2_7-1_0-2.7.13-28.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522265" comment="libpython2_7-1_0-32bit-2.7.13-28.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522266" comment="python-2.7.13-28.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557383" comment="python-32bit-2.7.13-28.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522267" comment="python-base-2.7.13-28.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557384" comment="python-base-32bit-2.7.13-28.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522268" comment="python-curses-2.7.13-28.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557385" comment="python-demo-2.7.13-28.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522269" comment="python-devel-2.7.13-28.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557386" comment="python-doc-2.7.13-28.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557387" comment="python-doc-pdf-2.7.13-28.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557388" comment="python-gdbm-2.7.13-28.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557389" comment="python-idle-2.7.13-28.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522270" comment="python-tk-2.7.13-28.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522271" comment="python-xml-2.7.13-28.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152067" version="1" class="patch">
	<metadata>
		<title>Security update for sysstat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1150114" ref_url="https://bugzilla.suse.com/1150114" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16167" ref_url="https://www.suse.com/security/cve/CVE-2019-16167/" source="CVE"/>
		<description>
This update for sysstat fixes the following issue:

- CVE-2019-16167: Fixed a memory corruption due to an integer overflow. (bsc#1150114)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-23"/>
	<updated date="2019-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150114">SUSE bug 1150114</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16167/">CVE-2019-16167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16167">CVE-2019-16167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522272" comment="sysstat-12.0.2-10.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557390" comment="sysstat-isag-12.0.2-10.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152068" version="1" class="patch">
	<metadata>
		<title>Security update for python36 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1153238" ref_url="https://bugzilla.suse.com/1153238" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<description>
This update for python36 fixes the following issue:

- CVE-2019-16935: Fixed a reflected XSS in python/Lib/DocXMLRPCServer.py (bsc#1153238).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-23"/>
	<updated date="2019-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16935">CVE-2019-16935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557391" comment="libpython3_6m1_0-3.6.8-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557392" comment="python36-3.6.8-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557393" comment="python36-base-3.6.8-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557394" comment="python36-curses-3.6.8-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557395" comment="python36-dbm-3.6.8-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557396" comment="python36-devel-3.6.8-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557397" comment="python36-doc-3.6.8-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557398" comment="python36-idle-3.6.8-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557399" comment="python36-testsuite-3.6.8-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557400" comment="python36-tk-3.6.8-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557401" comment="python36-tools-3.6.8-6.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152069" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126197" ref_url="https://bugzilla.suse.com/1126197" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1133818" ref_url="https://bugzilla.suse.com/1133818" source="BUGZILLA"/>
		<reference ref_id="1143797" ref_url="https://bugzilla.suse.com/1143797" source="BUGZILLA"/>
		<reference ref_id="1146874" ref_url="https://bugzilla.suse.com/1146874" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-17340" ref_url="https://www.suse.com/security/cve/CVE-2019-17340/" source="CVE"/>
		<reference ref_id="CVE-2019-17341" ref_url="https://www.suse.com/security/cve/CVE-2019-17341/" source="CVE"/>
		<reference ref_id="CVE-2019-17342" ref_url="https://www.suse.com/security/cve/CVE-2019-17342/" source="CVE"/>
		<reference ref_id="CVE-2019-17343" ref_url="https://www.suse.com/security/cve/CVE-2019-17343/" source="CVE"/>
		<reference ref_id="CVE-2019-17344" ref_url="https://www.suse.com/security/cve/CVE-2019-17344/" source="CVE"/>
		<reference ref_id="CVE-2019-17345" ref_url="https://www.suse.com/security/cve/CVE-2019-17345/" source="CVE"/>
		<reference ref_id="CVE-2019-17346" ref_url="https://www.suse.com/security/cve/CVE-2019-17346/" source="CVE"/>
		<reference ref_id="CVE-2019-17347" ref_url="https://www.suse.com/security/cve/CVE-2019-17347/" source="CVE"/>
		<reference ref_id="CVE-2019-17348" ref_url="https://www.suse.com/security/cve/CVE-2019-17348/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed: 	  

- CVE-2019-15890: Fixed a use-after-free in SLiRP networking implementation of QEMU emulator
  which could have led to Denial of Service (bsc#1149813).
- CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite loop and denial of 
  service (bsc#1146874).
- CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking implementation of QEMU 
  emulator which could have led to execution of  arbitrary code with privileges of the 
  QEMU process (bsc#1143797).

Other issue fixed: 

- Fixed an issue where libxenlight could not restore domain vsa6535522 on live migration (bsc#1133818).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-24"/>
	<updated date="2019-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126197">SUSE bug 1126197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133818">SUSE bug 1133818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146874">SUSE bug 1146874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12068">CVE-2019-12068 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14378">CVE-2019-14378 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17340/">CVE-2019-17340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17340">CVE-2019-17340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17341/">CVE-2019-17341 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17341">CVE-2019-17341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17342/">CVE-2019-17342 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17342">CVE-2019-17342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17343/">CVE-2019-17343 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17343">CVE-2019-17343 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17344/">CVE-2019-17344 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17344">CVE-2019-17344 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17345/">CVE-2019-17345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17345">CVE-2019-17345 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17346/">CVE-2019-17346 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17346">CVE-2019-17346 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17347/">CVE-2019-17347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17347">CVE-2019-17347 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17348/">CVE-2019-17348 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17348">CVE-2019-17348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538307" comment="xen-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538308" comment="xen-doc-html-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538309" comment="xen-libs-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538310" comment="xen-libs-32bit-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538311" comment="xen-tools-4.9.4_04-3.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538312" comment="xen-tools-domU-4.9.4_04-3.56.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152070" version="1" class="patch">
	<metadata>
		<title>Security update for accountsservice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1099699" ref_url="https://bugzilla.suse.com/1099699" source="BUGZILLA"/>
		<reference ref_id="1139487" ref_url="https://bugzilla.suse.com/1139487" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14036" ref_url="https://www.suse.com/security/cve/CVE-2018-14036/" source="CVE"/>
		<description>
This update for accountsservice fixes the following issues:

Security issue fixed:

- CVE-2018-14036: Prevent directory traversal caused by an insufficient path
  check in user_change_icon_file_authorized_cb() (bsc#1099699).

Non-security issue fixed:

- Improved wtmp io performance (bsc#1139487).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-24"/>
	<updated date="2019-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099699">SUSE bug 1099699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139487">SUSE bug 1139487</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14036/">CVE-2018-14036 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14036">CVE-2018-14036 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522276" comment="accountsservice-0.6.42-16.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522277" comment="accountsservice-lang-0.6.42-16.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522278" comment="libaccountsservice0-0.6.42-16.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522279" comment="typelib-1_0-AccountsService-1_0-0.6.42-16.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152071" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1146068" ref_url="https://bugzilla.suse.com/1146068" source="BUGZILLA"/>
		<reference ref_id="1146211" ref_url="https://bugzilla.suse.com/1146211" source="BUGZILLA"/>
		<reference ref_id="1146212" ref_url="https://bugzilla.suse.com/1146212" source="BUGZILLA"/>
		<reference ref_id="1146213" ref_url="https://bugzilla.suse.com/1146213" source="BUGZILLA"/>
		<reference ref_id="1151781" ref_url="https://bugzilla.suse.com/1151781" source="BUGZILLA"/>
		<reference ref_id="1151782" ref_url="https://bugzilla.suse.com/1151782" source="BUGZILLA"/>
		<reference ref_id="1151783" ref_url="https://bugzilla.suse.com/1151783" source="BUGZILLA"/>
		<reference ref_id="1151784" ref_url="https://bugzilla.suse.com/1151784" source="BUGZILLA"/>
		<reference ref_id="1151785" ref_url="https://bugzilla.suse.com/1151785" source="BUGZILLA"/>
		<reference ref_id="1151786" ref_url="https://bugzilla.suse.com/1151786" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14980" ref_url="https://www.suse.com/security/cve/CVE-2019-14980/" source="CVE"/>
		<reference ref_id="CVE-2019-15139" ref_url="https://www.suse.com/security/cve/CVE-2019-15139/" source="CVE"/>
		<reference ref_id="CVE-2019-15140" ref_url="https://www.suse.com/security/cve/CVE-2019-15140/" source="CVE"/>
		<reference ref_id="CVE-2019-15141" ref_url="https://www.suse.com/security/cve/CVE-2019-15141/" source="CVE"/>
		<reference ref_id="CVE-2019-16708" ref_url="https://www.suse.com/security/cve/CVE-2019-16708/" source="CVE"/>
		<reference ref_id="CVE-2019-16709" ref_url="https://www.suse.com/security/cve/CVE-2019-16709/" source="CVE"/>
		<reference ref_id="CVE-2019-16710" ref_url="https://www.suse.com/security/cve/CVE-2019-16710/" source="CVE"/>
		<reference ref_id="CVE-2019-16711" ref_url="https://www.suse.com/security/cve/CVE-2019-16711/" source="CVE"/>
		<reference ref_id="CVE-2019-16712" ref_url="https://www.suse.com/security/cve/CVE-2019-16712/" source="CVE"/>
		<reference ref_id="CVE-2019-16713" ref_url="https://www.suse.com/security/cve/CVE-2019-16713/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-15139: Fixed a denial-of-service vulnerability in ReadXWDImage. (bsc#1146213)
- CVE-2019-15140: Fixed a use-after-free bug in the Matlab image parser. (bsc#1146212)
- CVE-2019-15141: Fixed a divide-by-zero vulnerability in the MeanShiftImage function. (bsc#1146211)
- CVE-2019-14980: Fixed an application crash resulting from a heap-based buffer over-read in WriteTIFFImage. (bsc#1146068)
- CVE-2019-16708: Fixed a memory leak in magick/xwindow.c (bsc#1151781).
- CVE-2019-16709: Fixed a memory leak in coders/dps.c (bsc#1151782).
- CVE-2019-16710: Fixed a memory leak in coders/dot.c (bsc#1151783).
- CVE-2019-16711: Fixed a memory leak in Huffman2DEncodeImage in coders/ps2.c (bsc#1151784).
- CVE-2019-16712: Fixed a memory leak in Huffman2DEncodeImage in coders/ps3.c (bsc#1151785).
- CVE-2019-16713: Fixed a memory leak in coders/dot.c (bsc#1151786).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-25"/>
	<updated date="2019-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1146068">SUSE bug 1146068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146211">SUSE bug 1146211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146212">SUSE bug 1146212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146213">SUSE bug 1146213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151781">SUSE bug 1151781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151782">SUSE bug 1151782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151783">SUSE bug 1151783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151784">SUSE bug 1151784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151785">SUSE bug 1151785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151786">SUSE bug 1151786</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14980/">CVE-2019-14980 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14980">CVE-2019-14980 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15139/">CVE-2019-15139 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15139">CVE-2019-15139 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15140/">CVE-2019-15140 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15140">CVE-2019-15140 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15141/">CVE-2019-15141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15141">CVE-2019-15141 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16708/">CVE-2019-16708 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16708">CVE-2019-16708 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16709/">CVE-2019-16709 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16709">CVE-2019-16709 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16710/">CVE-2019-16710 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16710">CVE-2019-16710 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16711/">CVE-2019-16711 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16711">CVE-2019-16711 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16712/">CVE-2019-16712 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16712">CVE-2019-16712 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16713/">CVE-2019-16713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16713">CVE-2019-16713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522283" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522284" comment="ImageMagick-config-6-upstream-6.8.8.1-71.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522286" comment="libMagickCore-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522288" comment="libMagickWand-6_Q16-1-6.8.8.1-71.131.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152072" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-16056: Fixed a parser issue in the email module. (bsc#1149955)
- CVE-2018-20852: Fixed an incorrect domain validation that could lead to cookies being sent to the wrong server. (bsc#1141853)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-28"/>
	<updated date="2019-10-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522289" comment="libpython3_4m1_0-3.4.6-25.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522290" comment="python3-3.4.6-25.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522291" comment="python3-base-3.4.6-25.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522292" comment="python3-curses-3.4.6-25.34.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152073" version="1" class="patch">
	<metadata>
		<title>Recommended update for rsyslog (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1149094" ref_url="https://bugzilla.suse.com/1149094" source="BUGZILLA"/>
		<reference ref_id="1153451" ref_url="https://bugzilla.suse.com/1153451" source="BUGZILLA"/>
		<reference ref_id="1153459" ref_url="https://bugzilla.suse.com/1153459" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17041" ref_url="https://www.suse.com/security/cve/CVE-2019-17041/" source="CVE"/>
		<reference ref_id="CVE-2019-17042" ref_url="https://www.suse.com/security/cve/CVE-2019-17042/" source="CVE"/>
		<description>
This update for rsyslog fixes the following issues:

Security issues fixed:

- CVE-2019-17041: Fixed a heap overflow in the parser for AIX log messages (bsc#1153451).
- CVE-2019-17042: Fixed a heap overflow in the parser for Cisco log messages (bsc#1153459).

Non-security issue fixed:

- imudp: fix segfault in ratelimit code (bsc#1149094)
  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-29"/>
	<updated date="2019-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149094">SUSE bug 1149094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153451">SUSE bug 1153451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153459">SUSE bug 1153459</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17041/">CVE-2019-17041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17041">CVE-2019-17041 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17042/">CVE-2019-17042 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17042">CVE-2019-17042 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562585" comment="rsyslog-8.24.0-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562586" comment="rsyslog-diag-tools-8.24.0-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562587" comment="rsyslog-doc-8.24.0-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562588" comment="rsyslog-module-gssapi-8.24.0-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562589" comment="rsyslog-module-gtls-8.24.0-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562590" comment="rsyslog-module-mysql-8.24.0-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562591" comment="rsyslog-module-pgsql-8.24.0-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562592" comment="rsyslog-module-relp-8.24.0-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562593" comment="rsyslog-module-snmp-8.24.0-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562594" comment="rsyslog-module-udpspoof-8.24.0-3.33.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152074" version="1" class="patch">
	<metadata>
		<title>Security update for libunwind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122012" ref_url="https://bugzilla.suse.com/1122012" source="BUGZILLA"/>
		<reference ref_id="936786" ref_url="https://bugzilla.suse.com/936786" source="BUGZILLA"/>
		<reference ref_id="976955" ref_url="https://bugzilla.suse.com/976955" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3239" ref_url="https://www.suse.com/security/cve/CVE-2015-3239/" source="CVE"/>
		<description>
This update for libunwind fixes the following issues:

Security issues fixed:

- CVE-2015-3239: Fixed a off-by-one in the dwarf_to_unw_regnum function (bsc#936786)

Non-security issues fixed:

- Fixed a dependency issue with libzmq5 (bsc#1122012)
- Fixed build on armv7 (bsc#976955)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-07"/>
	<updated date="2019-02-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122012">SUSE bug 1122012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936786">SUSE bug 936786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976955">SUSE bug 976955</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-3239/">CVE-2015-3239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3239">CVE-2015-3239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521604" comment="libunwind-1.1-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557402" comment="libunwind-devel-1.1-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152075" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010399" ref_url="https://bugzilla.suse.com/1010399" source="BUGZILLA"/>
		<reference ref_id="1010405" ref_url="https://bugzilla.suse.com/1010405" source="BUGZILLA"/>
		<reference ref_id="1010406" ref_url="https://bugzilla.suse.com/1010406" source="BUGZILLA"/>
		<reference ref_id="1010408" ref_url="https://bugzilla.suse.com/1010408" source="BUGZILLA"/>
		<reference ref_id="1010409" ref_url="https://bugzilla.suse.com/1010409" source="BUGZILLA"/>
		<reference ref_id="1010421" ref_url="https://bugzilla.suse.com/1010421" source="BUGZILLA"/>
		<reference ref_id="1010423" ref_url="https://bugzilla.suse.com/1010423" source="BUGZILLA"/>
		<reference ref_id="1010424" ref_url="https://bugzilla.suse.com/1010424" source="BUGZILLA"/>
		<reference ref_id="1010425" ref_url="https://bugzilla.suse.com/1010425" source="BUGZILLA"/>
		<reference ref_id="1010426" ref_url="https://bugzilla.suse.com/1010426" source="BUGZILLA"/>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1043008" ref_url="https://bugzilla.suse.com/1043008" source="BUGZILLA"/>
		<reference ref_id="1047281" ref_url="https://bugzilla.suse.com/1047281" source="BUGZILLA"/>
		<reference ref_id="1074235" ref_url="https://bugzilla.suse.com/1074235" source="BUGZILLA"/>
		<reference ref_id="1092611" ref_url="https://bugzilla.suse.com/1092611" source="BUGZILLA"/>
		<reference ref_id="1120374" ref_url="https://bugzilla.suse.com/1120374" source="BUGZILLA"/>
		<reference ref_id="1137990" ref_url="https://bugzilla.suse.com/1137990" source="BUGZILLA"/>
		<reference ref_id="1149429" ref_url="https://bugzilla.suse.com/1149429" source="BUGZILLA"/>
		<reference ref_id="1154738" ref_url="https://bugzilla.suse.com/1154738" source="BUGZILLA"/>
		<reference ref_id="959933" ref_url="https://bugzilla.suse.com/959933" source="BUGZILLA"/>
		<reference ref_id="983922" ref_url="https://bugzilla.suse.com/983922" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-5289" ref_url="https://www.suse.com/security/cve/CVE-2016-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-5292" ref_url="https://www.suse.com/security/cve/CVE-2016-5292/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2016-9067" ref_url="https://www.suse.com/security/cve/CVE-2016-9067/" source="CVE"/>
		<reference ref_id="CVE-2016-9068" ref_url="https://www.suse.com/security/cve/CVE-2016-9068/" source="CVE"/>
		<reference ref_id="CVE-2016-9069" ref_url="https://www.suse.com/security/cve/CVE-2016-9069/" source="CVE"/>
		<reference ref_id="CVE-2016-9071" ref_url="https://www.suse.com/security/cve/CVE-2016-9071/" source="CVE"/>
		<reference ref_id="CVE-2016-9073" ref_url="https://www.suse.com/security/cve/CVE-2016-9073/" source="CVE"/>
		<reference ref_id="CVE-2016-9075" ref_url="https://www.suse.com/security/cve/CVE-2016-9075/" source="CVE"/>
		<reference ref_id="CVE-2016-9076" ref_url="https://www.suse.com/security/cve/CVE-2016-9076/" source="CVE"/>
		<reference ref_id="CVE-2016-9077" ref_url="https://www.suse.com/security/cve/CVE-2016-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-7789" ref_url="https://www.suse.com/security/cve/CVE-2017-7789/" source="CVE"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5151" ref_url="https://www.suse.com/security/cve/CVE-2018-5151/" source="CVE"/>
		<reference ref_id="CVE-2018-5152" ref_url="https://www.suse.com/security/cve/CVE-2018-5152/" source="CVE"/>
		<reference ref_id="CVE-2018-5153" ref_url="https://www.suse.com/security/cve/CVE-2018-5153/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5160" ref_url="https://www.suse.com/security/cve/CVE-2018-5160/" source="CVE"/>
		<reference ref_id="CVE-2018-5163" ref_url="https://www.suse.com/security/cve/CVE-2018-5163/" source="CVE"/>
		<reference ref_id="CVE-2018-5164" ref_url="https://www.suse.com/security/cve/CVE-2018-5164/" source="CVE"/>
		<reference ref_id="CVE-2018-5165" ref_url="https://www.suse.com/security/cve/CVE-2018-5165/" source="CVE"/>
		<reference ref_id="CVE-2018-5166" ref_url="https://www.suse.com/security/cve/CVE-2018-5166/" source="CVE"/>
		<reference ref_id="CVE-2018-5167" ref_url="https://www.suse.com/security/cve/CVE-2018-5167/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5169" ref_url="https://www.suse.com/security/cve/CVE-2018-5169/" source="CVE"/>
		<reference ref_id="CVE-2018-5172" ref_url="https://www.suse.com/security/cve/CVE-2018-5172/" source="CVE"/>
		<reference ref_id="CVE-2018-5173" ref_url="https://www.suse.com/security/cve/CVE-2018-5173/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5175" ref_url="https://www.suse.com/security/cve/CVE-2018-5175/" source="CVE"/>
		<reference ref_id="CVE-2018-5176" ref_url="https://www.suse.com/security/cve/CVE-2018-5176/" source="CVE"/>
		<reference ref_id="CVE-2018-5177" ref_url="https://www.suse.com/security/cve/CVE-2018-5177/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5179" ref_url="https://www.suse.com/security/cve/CVE-2018-5179/" source="CVE"/>
		<reference ref_id="CVE-2018-5180" ref_url="https://www.suse.com/security/cve/CVE-2018-5180/" source="CVE"/>
		<reference ref_id="CVE-2018-5181" ref_url="https://www.suse.com/security/cve/CVE-2018-5181/" source="CVE"/>
		<reference ref_id="CVE-2018-5182" ref_url="https://www.suse.com/security/cve/CVE-2018-5182/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<description>
This update for MozillaFirefox to 68.2.0 ESR fixes the following issues:

Mozilla Firefox was updated to version 68.2.0 ESR (bsc#1154738).

Security issues fixed:

-  CVE-2019-15903: Fixed a heap overflow in the expat library (bsc#1149429).
-  CVE-2019-11757: Fixed a use-after-free when creating index updates in IndexedDB (bsc#1154738).
-  CVE-2019-11758: Fixed a potentially exploitable crash due to 360 Total Security (bsc#1154738).
-  CVE-2019-11759: Fixed a stack buffer overflow in HKDF output (bsc#1154738).
-  CVE-2019-11760: Fixed a stack buffer overflow in WebRTC networking (bsc#1154738).
-  CVE-2019-11761: Fixed an unintended access to a privileged JSONView object (bsc#1154738).
-  CVE-2019-11762: Fixed a same-origin-property violation (bsc#1154738).
-  CVE-2019-11763: Fixed an XSS bypass (bsc#1154738).
-  CVE-2019-11764: Fixed several memory safety bugs (bsc#1154738).

Non-security issues fixed:

- Firefox 60.7 ESR changed the user interface language (bsc#1137990).
- Wrong Firefox GUI Language (bsc#1120374).
- Fixed an inadvertent crash report transmission without user opt-in (bsc#1074235).
- Firefox hangs randomly when browsing and scrolling (bsc#1043008).
- Firefox stops loading page until mouse is moved (bsc#1025108).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-31"/>
	<updated date="2019-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010399">SUSE bug 1010399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010405">SUSE bug 1010405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010406">SUSE bug 1010406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010408">SUSE bug 1010408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010409">SUSE bug 1010409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010421">SUSE bug 1010421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010423">SUSE bug 1010423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010424">SUSE bug 1010424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010425">SUSE bug 1010425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010426">SUSE bug 1010426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043008">SUSE bug 1043008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047281">SUSE bug 1047281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074235">SUSE bug 1074235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120374">SUSE bug 1120374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137990">SUSE bug 1137990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959933">SUSE bug 959933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983922">SUSE bug 983922</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2830">CVE-2016-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5289/">CVE-2016-5289 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5289">CVE-2016-5289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5292/">CVE-2016-5292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5292">CVE-2016-5292 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9067/">CVE-2016-9067 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9067">CVE-2016-9067 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9068/">CVE-2016-9068 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9068">CVE-2016-9068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9069/">CVE-2016-9069 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9069">CVE-2016-9069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9071/">CVE-2016-9071 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9071">CVE-2016-9071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9073/">CVE-2016-9073 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9073">CVE-2016-9073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9075/">CVE-2016-9075 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9075">CVE-2016-9075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9076/">CVE-2016-9076 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9076">CVE-2016-9076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9077/">CVE-2016-9077 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9077">CVE-2016-9077 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7789/">CVE-2017-7789 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7789">CVE-2017-7789 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5150">CVE-2018-5150 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5151/">CVE-2018-5151 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5151">CVE-2018-5151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5152/">CVE-2018-5152 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5152">CVE-2018-5152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5153/">CVE-2018-5153 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5153">CVE-2018-5153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5154">CVE-2018-5154 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5155">CVE-2018-5155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5157">CVE-2018-5157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5158">CVE-2018-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5159">CVE-2018-5159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5160/">CVE-2018-5160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5160">CVE-2018-5160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5163/">CVE-2018-5163 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5163">CVE-2018-5163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5164/">CVE-2018-5164 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5164">CVE-2018-5164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5165/">CVE-2018-5165 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5165">CVE-2018-5165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5166/">CVE-2018-5166 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5166">CVE-2018-5166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5167/">CVE-2018-5167 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5167">CVE-2018-5167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5168">CVE-2018-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5169/">CVE-2018-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5169">CVE-2018-5169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5172/">CVE-2018-5172 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5172">CVE-2018-5172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5173/">CVE-2018-5173 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5173">CVE-2018-5173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5174">CVE-2018-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5175/">CVE-2018-5175 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5175">CVE-2018-5175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5176/">CVE-2018-5176 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5176">CVE-2018-5176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5177/">CVE-2018-5177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5177">CVE-2018-5177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5178">CVE-2018-5178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5179/">CVE-2018-5179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5179">CVE-2018-5179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5180/">CVE-2018-5180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5180">CVE-2018-5180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5181/">CVE-2018-5181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5181">CVE-2018-5181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5182/">CVE-2018-5182 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5182">CVE-2018-5182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5183">CVE-2018-5183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11757">CVE-2019-11757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11758">CVE-2019-11758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11759">CVE-2019-11759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11760">CVE-2019-11760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11761">CVE-2019-11761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11762">CVE-2019-11762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11763">CVE-2019-11763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11764">CVE-2019-11764 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152076" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1144902" ref_url="https://bugzilla.suse.com/1144902" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2019-10218: Client code can return filenames containing path separators (bsc#1144902).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-04"/>
	<updated date="2019-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10218">CVE-2019-10218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522302" comment="libdcerpc-binding0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522303" comment="libdcerpc-binding0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522304" comment="libdcerpc0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522305" comment="libdcerpc0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522306" comment="libndr-krb5pac0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522307" comment="libndr-krb5pac0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522308" comment="libndr-nbt0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522309" comment="libndr-nbt0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522310" comment="libndr-standard0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522311" comment="libndr-standard0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522312" comment="libndr0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522313" comment="libndr0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522314" comment="libnetapi0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522315" comment="libnetapi0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522316" comment="libsamba-credentials0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522317" comment="libsamba-credentials0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522318" comment="libsamba-errors0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522319" comment="libsamba-errors0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522320" comment="libsamba-hostconfig0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522321" comment="libsamba-hostconfig0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522322" comment="libsamba-passdb0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522323" comment="libsamba-passdb0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522324" comment="libsamba-util0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522325" comment="libsamba-util0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522326" comment="libsamdb0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522327" comment="libsamdb0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522328" comment="libsmbclient0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522329" comment="libsmbclient0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522330" comment="libsmbconf0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522331" comment="libsmbconf0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522332" comment="libsmbldap0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522333" comment="libsmbldap0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522334" comment="libtevent-util0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522335" comment="libtevent-util0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522336" comment="libwbclient0-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522337" comment="libwbclient0-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522338" comment="samba-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522339" comment="samba-client-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522340" comment="samba-client-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522341" comment="samba-doc-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522342" comment="samba-libs-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522343" comment="samba-libs-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522344" comment="samba-winbind-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522345" comment="samba-winbind-32bit-4.6.16+git.169.064abe062be-3.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152077" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1013712" ref_url="https://bugzilla.suse.com/1013712" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9798" ref_url="https://www.suse.com/security/cve/CVE-2016-9798/" source="CVE"/>
		<description>
This update for bluez fixes the following issue:

- CVE-2016-9798: Fixed a use-after-free in conf_opt (bsc#1013712).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-07"/>
	<updated date="2019-11-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013712">SUSE bug 1013712</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9798/">CVE-2016-9798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9798">CVE-2016-9798 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522346" comment="bluez-5.13-5.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522348" comment="libbluetooth3-5.13-5.15.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152078" version="1" class="patch">
	<metadata>
		<title>Security update for gdb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1115034" ref_url="https://bugzilla.suse.com/1115034" source="BUGZILLA"/>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="1145692" ref_url="https://bugzilla.suse.com/1145692" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<description>
This update for gdb fixes the following issues:

Update to gdb 8.3.1: (jsc#ECO-368)

Security issues fixed:

- CVE-2019-1010180: Fixed a potential buffer overflow when loading ELF sections larger than the file. (bsc#1142772)

Upgrade libipt from v2.0 to v2.0.1.

- Enable librpm for version &gt; librpm.so.3 [bsc#1145692]:
  * Allow any librpm.so.x
  * Add %build test to check for 'zypper install &lt;rpm-packagename&gt;'
    message

- Copy gdbinit from fedora master @ 25caf28.  Add
  gdbinit.without-python, and use it for --without=python.

Rebase to 8.3 release (as in fedora 30 @ 1e222a3).

* DWARF index cache: GDB can now automatically save indices of DWARF
  symbols on disk to speed up further loading of the same binaries.
* Ada task switching is now supported on aarch64-elf targets when
  debugging a program using the Ravenscar Profile.
* Terminal styling is now available for the CLI and the TUI.
* Removed support for old demangling styles arm, edg, gnu, hp and
  lucid.
* Support for new native configuration RISC-V GNU/Linux (riscv*-*-linux*).

- Implemented access to more POWER8 registers.  [fate#326120, fate#325178]
- Also handle most new s390 arch13 instructions.  [fate#327369, jsc#ECO-368]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-07"/>
	<updated date="2019-11-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1115034">SUSE bug 1115034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145692">SUSE bug 1145692</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010180">CVE-2019-1010180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522349" comment="gdb-8.3.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152079" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154862" ref_url="https://bugzilla.suse.com/1154862" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issue:

- CVE-2019-17498: Fixed an integer overflow in a bounds check that might have led to the disclosure of sensitive information or a denial of service (bsc#1154862).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-08"/>
	<updated date="2019-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">CVE-2019-17498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522350" comment="libssh2-1-1.4.3-20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522351" comment="libssh2-1-32bit-1.4.3-20.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152080" version="1" class="patch">
	<metadata>
		<title>Security update for libseccomp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1128828" ref_url="https://bugzilla.suse.com/1128828" source="BUGZILLA"/>
		<reference ref_id="1142614" ref_url="https://bugzilla.suse.com/1142614" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9893" ref_url="https://www.suse.com/security/cve/CVE-2019-9893/" source="CVE"/>
		<description>
This update for libseccomp fixes the following issues:

Update to new upstream release 2.4.1:

* Fix a BPF generation bug where the optimizer mistakenly
  identified duplicate BPF code blocks.

Updated to 2.4.0 (bsc#1128828 CVE-2019-9893):

* Update the syscall table for Linux v5.0-rc5
* Added support for the SCMP_ACT_KILL_PROCESS action
* Added support for the SCMP_ACT_LOG action and SCMP_FLTATR_CTL_LOG attribute
* Added explicit 32-bit (SCMP_AX_32(...)) and 64-bit (SCMP_AX_64(...)) argument comparison macros to help protect against unexpected sign extension
* Added support for the parisc and parisc64 architectures
* Added the ability to query and set the libseccomp API level via seccomp_api_get(3) and seccomp_api_set(3)
* Return -EDOM on an endian mismatch when adding an architecture to a filter
* Renumber the pseudo syscall number for subpage_prot() so it no longer conflicts with spu_run()
* Fix PFC generation when a syscall is prioritized, but no rule exists
* Numerous fixes to the seccomp-bpf filter generation code
* Switch our internal hashing function to jhash/Lookup3 to MurmurHash3
* Numerous tests added to the included test suite, coverage now at ~92%
* Update our Travis CI configuration to use Ubuntu 16.04
* Numerous documentation fixes and updates

Update to release 2.3.3:

* Updated the syscall table for Linux v4.15-rc7

Update to release 2.3.2:

* Achieved full compliance with the CII Best Practices program
* Added Travis CI builds to the GitHub repository
* Added code coverage reporting with the '--enable-code-coverage' configure
  flag and added Coveralls to the GitHub repository
* Updated the syscall tables to match Linux v4.10-rc6+
* Support for building with Python v3.x
* Allow rules with the -1 syscall if the SCMP\_FLTATR\_API\_TSKIP attribute is
  set to true
* Several small documentation fixes

- ignore make check error for ppc64/ppc64le, bypass bsc#1142614
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128828">SUSE bug 1128828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142614">SUSE bug 1142614</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9893/">CVE-2019-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9893">CVE-2019-9893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522352" comment="libseccomp2-2.4.1-11.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522353" comment="libseccomp2-32bit-2.4.1-11.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152081" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to 20191112 security release (bsc#1155988)
  - Processor             Identifier     Version       Products
  - Model        Stepping F-MO-S/PI      Old-&gt;New
  - ---- new platforms ----------------------------------------
  - CML-U62      A0       6-a6-0/80           000000c6 Core Gen10 Mobile
  - CNL-U        D0       6-66-3/80           0000002a Core Gen8 Mobile
  - SKX-SP       B1       6-55-3/97           01000150 Xeon Scalable
  - ICL U/Y      D1       6-7e-5/80           00000046 Core Gen10 Mobile
  - ---- updated platforms ------------------------------------
  - SKL U/Y      D0       6-4e-3/c0 000000cc-&gt;000000d4 Core Gen6 Mobile
  - SKL H/S/E3   R0/N0    6-5e-3/36 000000cc-&gt;000000d4 Core Gen6
  - AML-Y22      H0       6-8e-9/10 000000b4-&gt;000000c6 Core Gen8 Mobile
  - KBL-U/Y      H0       6-8e-9/c0 000000b4-&gt;000000c6 Core Gen7 Mobile
  - CFL-U43e     D0       6-8e-a/c0 000000b4-&gt;000000c6 Core Gen8 Mobile
  - WHL-U        W0       6-8e-b/d0 000000b8-&gt;000000c6 Core Gen8 Mobile
  - AML-Y        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - CML-U42      V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - WHL-U        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen8 Mobile
  - KBL-G/X      H0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7/Gen8
  - KBL-H/S/E3   B0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7; Xeon E3 v6
  - CFL-H/S/E3   U0       6-9e-a/22 000000b4-&gt;000000c6 Core Gen8 Desktop, Mobile, Xeon E
  - CFL-S        B0       6-9e-b/02 000000b4-&gt;000000c6 Core Gen8
  - CFL-H        R0       6-9e-d/22 000000b8-&gt;000000c6 Core Gen9 Mobile
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)

- requires coreutils for the %post script (bsc#1154043)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11139">CVE-2019-11139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522370" comment="ucode-intel-20191112-13.53.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152082" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1156402" ref_url="https://bugzilla.suse.com/1156402" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201/" source="CVE"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2019-2201: Several integer overflow issues and subsequent segfaults occurred in libjpeg-turbo,
  when attempting to compress or decompress gigapixel images. [bsc#1156402]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-14"/>
	<updated date="2019-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156402">SUSE bug 1156402</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2201">CVE-2019-2201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522374" comment="libjpeg-turbo-1.5.3-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522375" comment="libjpeg62-62.2.0-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522376" comment="libjpeg62-32bit-62.2.0-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522377" comment="libjpeg62-turbo-1.5.3-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522378" comment="libjpeg8-8.1.2-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522379" comment="libjpeg8-32bit-8.1.2-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522380" comment="libturbojpeg0-8.1.2-31.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152083" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1156275" ref_url="https://bugzilla.suse.com/1156275" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14869" ref_url="https://www.suse.com/security/cve/CVE-2019-14869/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issue:
	  
- CVE-2019-14869: Fixed a possible  dSAFER escape which could have allowed 
  an attacker to gain high privileges by a specially crafted Postscript 
  code (bsc#1156275).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156275">SUSE bug 1156275</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14869/">CVE-2019-14869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14869">CVE-2019-14869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522381" comment="ghostscript-9.27-23.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522382" comment="ghostscript-x11-9.27-23.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152084" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to 20191112 official security release (bsc#1155988)
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11139">CVE-2019-11139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522383" comment="ucode-intel-20191112a-13.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152085" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1156146" ref_url="https://bugzilla.suse.com/1156146" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14818" ref_url="https://www.suse.com/security/cve/CVE-2019-14818/" source="CVE"/>
		<description>
This update for dpdk to version 16.11.9 fixes the following issues:

- CVE-2019-14818: Fixed a memory leak vulnerability caused by a malicious
  container may lead to to denial of service (bsc#1156146).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-21"/>
	<updated date="2019-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156146">SUSE bug 1156146</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14818/">CVE-2019-14818 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14818">CVE-2019-14818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557403" comment="dpdk-16.11.9-11.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557404" comment="dpdk-kmp-default-16.11.9_k4.4.140_96.45.TDC-11.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557405" comment="dpdk-tools-16.11.9-11.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152086" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1153892" ref_url="https://bugzilla.suse.com/1153892" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17544" ref_url="https://www.suse.com/security/cve/CVE-2019-17544/" source="CVE"/>
		<description>
This update for aspell fixes the following issues:

- CVE-2019-17544: Fixed a stack-based buffer over-read in acommon:unescape in common/getdata.cpp via an isolated backslash (bsc#1153892).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-21"/>
	<updated date="2019-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153892">SUSE bug 1153892</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17544/">CVE-2019-17544 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17544">CVE-2019-17544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522387" comment="aspell-0.60.6.1-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557406" comment="aspell-ispell-0.60.6.1-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522388" comment="libaspell15-0.60.6.1-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522389" comment="libaspell15-32bit-0.60.6.1-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152087" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1155787" ref_url="https://bugzilla.suse.com/1155787" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2017-2518: Fixed a use-after-free vulnerability which could have 
  led to buffer overflow via a crafted SQL statement (bsc#1155787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155787">SUSE bug 1155787</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2518">CVE-2017-2518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522390" comment="libsqlite3-0-3.8.10.2-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522391" comment="libsqlite3-0-32bit-3.8.10.2-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522392" comment="sqlite3-3.8.10.2-9.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152088" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1146358" ref_url="https://bugzilla.suse.com/1146358" source="BUGZILLA"/>
		<reference ref_id="1146359" ref_url="https://bugzilla.suse.com/1146359" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2019-8675: Fixed a stack buffer overflow in libcups's asn1_get_type function(bsc#1146358). 
- CVE-2019-8696: Fixed a stack buffer overflow in libcups's asn1_get_packed function (bsc#1146359).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146359">SUSE bug 1146359</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8675">CVE-2019-8675 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8696">CVE-2019-8696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522393" comment="cups-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522394" comment="cups-client-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522395" comment="cups-libs-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522396" comment="cups-libs-32bit-1.7.5-20.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152089" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1108606" ref_url="https://bugzilla.suse.com/1108606" source="BUGZILLA"/>
		<reference ref_id="1121626" ref_url="https://bugzilla.suse.com/1121626" source="BUGZILLA"/>
		<reference ref_id="1125113" ref_url="https://bugzilla.suse.com/1125113" source="BUGZILLA"/>
		<reference ref_id="1146608" ref_url="https://bugzilla.suse.com/1146608" source="BUGZILLA"/>
		<reference ref_id="983268" ref_url="https://bugzilla.suse.com/983268" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5102" ref_url="https://www.suse.com/security/cve/CVE-2016-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-17000" ref_url="https://www.suse.com/security/cve/CVE-2018-17000/" source="CVE"/>
		<reference ref_id="CVE-2019-14973" ref_url="https://www.suse.com/security/cve/CVE-2019-14973/" source="CVE"/>
		<reference ref_id="CVE-2019-6128" ref_url="https://www.suse.com/security/cve/CVE-2019-6128/" source="CVE"/>
		<reference ref_id="CVE-2019-7663" ref_url="https://www.suse.com/security/cve/CVE-2019-7663/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2019-14973: Fixed an improper check which was depended on the compiler
  which could have led to integer overflow (bsc#1146608).
- CVE-2016-5102: Fixed a buffer overflow in readgifimage() (bsc#983268)
- CVE-2018-17000: Fixed a NULL pointer dereference in the _TIFFmemcmp function (bsc#1108606).
- CVE-2019-6128: Fixed a memory leak in the TIFFFdOpen function in tif_unix.c (bsc#1121626).
- CVE-2019-7663: Fixed an invalid address dereference in the
  TIFFWriteDirectoryTagTransfer function in libtiff/tif_dirwrite.c (bsc#1125113)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108606">SUSE bug 1108606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121626">SUSE bug 1121626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125113">SUSE bug 1125113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146608">SUSE bug 1146608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983268">SUSE bug 983268</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5102/">CVE-2016-5102 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5102">CVE-2016-5102 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17000/">CVE-2018-17000 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17000">CVE-2018-17000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14973/">CVE-2019-14973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14973">CVE-2019-14973 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6128/">CVE-2019-6128 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6128">CVE-2019-6128 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7663/">CVE-2019-7663 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7663">CVE-2019-7663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522397" comment="libtiff5-4.0.9-44.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522398" comment="libtiff5-32bit-4.0.9-44.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557407" comment="tiff-4.0.9-44.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152090" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1155199" ref_url="https://bugzilla.suse.com/1155199" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14866" ref_url="https://www.suse.com/security/cve/CVE-2019-14866/" source="CVE"/>
		<description>
This update for cpio fixes the following issues:
	  
- CVE-2019-14866: Fixed an improper validation of the values written 
  in the header of a TAR file through the to_oct() function which could 
  have led to unexpected TAR generation (bsc#1155199).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155199">SUSE bug 1155199</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14866/">CVE-2019-14866 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14866">CVE-2019-14866 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522399" comment="cpio-2.11-36.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522400" comment="cpio-lang-2.11-36.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152091" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="1151839" ref_url="https://bugzilla.suse.com/1151839" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

Security issue fixed:

- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).

Non-security issues fixed:

- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option (bsc#1144504).
- Increased the startup timeout of clamd to 5 minutes to cater for the grown virus database as a workaround until clamd has learned to talk to systemd to extend the timeout as long as needed (bsc#1151839).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151839">SUSE bug 1151839</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12625">CVE-2019-12625 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522401" comment="clamav-0.100.3-33.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152092" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154328" ref_url="https://bugzilla.suse.com/1154328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3693" ref_url="https://www.suse.com/security/cve/CVE-2019-3693/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:
	  
- CVE-2019-3693: Fixed a local privilege escalation from wwwrun to root (bsc#1154328).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154328">SUSE bug 1154328</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3693/">CVE-2019-3693 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3693">CVE-2019-3693 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530781" comment="mailman-2.1.17-3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152093" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1152856" ref_url="https://bugzilla.suse.com/1152856" source="BUGZILLA"/>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2894" ref_url="https://www.suse.com/security/cve/CVE-2019-2894/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Security issues fixed (October 2019 CPU  bsc#1154212):	  

- CVE-2019-2933: Windows file handling redux
- CVE-2019-2945: Better socket support
- CVE-2019-2949: Better Kerberos ccache handling
- CVE-2019-2958: Build Better Processes
- CVE-2019-2964: Better support for patterns
- CVE-2019-2962: Better Glyph Images
- CVE-2019-2973: Better pattern compilation
- CVE-2019-2978: Improved handling of jar files
- CVE-2019-2981: Better Path supports
- CVE-2019-2983: Better serial attributes
- CVE-2019-2987: Better rendering of native glyphs
- CVE-2019-2988: Better Graphics2D drawing
- CVE-2019-2989: Improve TLS connection support
- CVE-2019-2992: Enhance font glyph mapping
- CVE-2019-2999: Commentary on Javadoc comments
- CVE-2019-2894: Enhance ECDSA operations (bsc#1152856).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-27"/>
	<updated date="2019-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152856">SUSE bug 1152856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2894/">CVE-2019-2894 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2894">CVE-2019-2894 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2949">CVE-2019-2949 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2958">CVE-2019-2958 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2987">CVE-2019-2987 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530782" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530783" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152094" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1123919" ref_url="https://bugzilla.suse.com/1123919" source="BUGZILLA"/>
		<description>
This update for libxml2 doesn't fix any additional security issues, but correct the rpm changelog to reflect
all CVEs that have been fixed over the past.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-28"/>
	<updated date="2019-11-28"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522406" comment="libxml2-2-2.9.4-46.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522407" comment="libxml2-2-32bit-2.9.4-46.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557408" comment="libxml2-doc-2.9.4-46.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522408" comment="libxml2-tools-2.9.4-46.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522409" comment="python-libxml2-2.9.4-46.23.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152095" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1032089" ref_url="https://bugzilla.suse.com/1032089" source="BUGZILLA"/>
		<reference ref_id="1037008" ref_url="https://bugzilla.suse.com/1037008" source="BUGZILLA"/>
		<reference ref_id="1037009" ref_url="https://bugzilla.suse.com/1037009" source="BUGZILLA"/>
		<reference ref_id="1059134" ref_url="https://bugzilla.suse.com/1059134" source="BUGZILLA"/>
		<reference ref_id="1059139" ref_url="https://bugzilla.suse.com/1059139" source="BUGZILLA"/>
		<reference ref_id="1120653" ref_url="https://bugzilla.suse.com/1120653" source="BUGZILLA"/>
		<reference ref_id="1120654" ref_url="https://bugzilla.suse.com/1120654" source="BUGZILLA"/>
		<reference ref_id="1124341" ref_url="https://bugzilla.suse.com/1124341" source="BUGZILLA"/>
		<reference ref_id="1124342" ref_url="https://bugzilla.suse.com/1124342" source="BUGZILLA"/>
		<reference ref_id="1155079" ref_url="https://bugzilla.suse.com/1155079" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10209" ref_url="https://www.suse.com/security/cve/CVE-2016-10209/" source="CVE"/>
		<reference ref_id="CVE-2016-10349" ref_url="https://www.suse.com/security/cve/CVE-2016-10349/" source="CVE"/>
		<reference ref_id="CVE-2016-10350" ref_url="https://www.suse.com/security/cve/CVE-2016-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-14501" ref_url="https://www.suse.com/security/cve/CVE-2017-14501/" source="CVE"/>
		<reference ref_id="CVE-2017-14502" ref_url="https://www.suse.com/security/cve/CVE-2017-14502/" source="CVE"/>
		<reference ref_id="CVE-2018-1000877" ref_url="https://www.suse.com/security/cve/CVE-2018-1000877/" source="CVE"/>
		<reference ref_id="CVE-2018-1000878" ref_url="https://www.suse.com/security/cve/CVE-2018-1000878/" source="CVE"/>
		<reference ref_id="CVE-2019-1000019" ref_url="https://www.suse.com/security/cve/CVE-2019-1000019/" source="CVE"/>
		<reference ref_id="CVE-2019-1000020" ref_url="https://www.suse.com/security/cve/CVE-2019-1000020/" source="CVE"/>
		<reference ref_id="CVE-2019-18408" ref_url="https://www.suse.com/security/cve/CVE-2019-18408/" source="CVE"/>
		<description>
This update for libarchive fixes the following issues:

Security issues fixed:

- CVE-2018-1000877: Fixed a double free vulnerability in RAR decoder (bsc#1120653).
- CVE-2018-1000878: Fixed a Use-After-Free vulnerability in RAR decoder (bsc#1120654).
- CVE-2019-1000019: Fixed an Out-Of-Bounds Read vulnerability in 7zip decompression (bsc#1124341).
- CVE-2019-1000020: Fixed an Infinite Loop vulnerability in ISO9660 parser (bsc#1124342).
- CVE-2019-18408: Fixed a use-after-free in RAR format support (bsc#1155079).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-28"/>
	<updated date="2019-11-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1032089">SUSE bug 1032089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037008">SUSE bug 1037008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037009">SUSE bug 1037009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059134">SUSE bug 1059134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059139">SUSE bug 1059139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120653">SUSE bug 1120653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120654">SUSE bug 1120654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124341">SUSE bug 1124341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124342">SUSE bug 1124342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155079">SUSE bug 1155079</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10209/">CVE-2016-10209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10209">CVE-2016-10209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10349/">CVE-2016-10349 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10349">CVE-2016-10349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10350/">CVE-2016-10350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10350">CVE-2016-10350 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14501/">CVE-2017-14501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14501">CVE-2017-14501 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14502/">CVE-2017-14502 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14502">CVE-2017-14502 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000877/">CVE-2018-1000877 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000877">CVE-2018-1000877 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000878/">CVE-2018-1000878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000878">CVE-2018-1000878 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000019/">CVE-2019-1000019 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1000019">CVE-2019-1000019 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000020/">CVE-2019-1000020 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1000020">CVE-2019-1000020 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18408/">CVE-2019-18408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-18408">CVE-2019-18408 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522410" comment="libarchive13-3.1.2-26.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152096" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1131830" ref_url="https://bugzilla.suse.com/1131830" source="BUGZILLA"/>
		<reference ref_id="1134550" ref_url="https://bugzilla.suse.com/1134550" source="BUGZILLA"/>
		<reference ref_id="1154036" ref_url="https://bugzilla.suse.com/1154036" source="BUGZILLA"/>
		<reference ref_id="1154037" ref_url="https://bugzilla.suse.com/1154037" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10754" ref_url="https://www.suse.com/security/cve/CVE-2018-10754/" source="CVE"/>
		<reference ref_id="CVE-2019-17594" ref_url="https://www.suse.com/security/cve/CVE-2019-17594/" source="CVE"/>
		<reference ref_id="CVE-2019-17595" ref_url="https://www.suse.com/security/cve/CVE-2019-17595/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issue fixed:

- CVE-2018-10754: Fixed a denial of service caused by a NULL Pointer Dereference in the _nc_parse_entry() (bsc#1131830).
- CVE-2019-17594: Fixed a heap-based buffer over-read in _nc_find_entry function in tinfo/comp_hash.c (bsc#1154036).
- CVE-2019-17595: Fixed a heap-based buffer over-read in fmt_entry function in tinfo/comp_hash.c (bsc#1154037).

Bug fixes:

- Fixed ppc64le build configuration (bsc#1134550).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-28"/>
	<updated date="2019-11-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1131830">SUSE bug 1131830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134550">SUSE bug 1134550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154036">SUSE bug 1154036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154037">SUSE bug 1154037</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10754/">CVE-2018-10754 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10754">CVE-2018-10754 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17594/">CVE-2019-17594 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17594">CVE-2019-17594 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17595/">CVE-2019-17595 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17595">CVE-2019-17595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522411" comment="libncurses5-5.9-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522412" comment="libncurses5-32bit-5.9-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522413" comment="libncurses6-5.9-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522414" comment="libncurses6-32bit-5.9-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522415" comment="ncurses-devel-5.9-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557409" comment="ncurses-devel-32bit-5.9-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522416" comment="ncurses-utils-5.9-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522417" comment="tack-5.9-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522418" comment="terminfo-5.9-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522419" comment="terminfo-base-5.9-69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152097" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1123823" ref_url="https://bugzilla.suse.com/1123823" source="BUGZILLA"/>
		<reference ref_id="1123828" ref_url="https://bugzilla.suse.com/1123828" source="BUGZILLA"/>
		<reference ref_id="1123832" ref_url="https://bugzilla.suse.com/1123832" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20748" ref_url="https://www.suse.com/security/cve/CVE-2018-20748/" source="CVE"/>
		<reference ref_id="CVE-2018-20749" ref_url="https://www.suse.com/security/cve/CVE-2018-20749/" source="CVE"/>
		<reference ref_id="CVE-2018-20750" ref_url="https://www.suse.com/security/cve/CVE-2018-20750/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:
	  
Security issues fixed:

- CVE-2018-20749: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123828)
- CVE-2018-20750: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123832)
- CVE-2018-20748: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1123823)  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-09"/>
	<updated date="2019-02-09"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1123823">SUSE bug 1123823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123828">SUSE bug 1123828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123832">SUSE bug 1123832</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20748/">CVE-2018-20748 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20748">CVE-2018-20748 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20749/">CVE-2018-20749 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20749">CVE-2018-20749 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20750/">CVE-2018-20750 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20750">CVE-2018-20750 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530784" comment="libvncclient0-0.9.9-17.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530785" comment="libvncserver0-0.9.9-17.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152098" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:
	  
- CVE-2019-15961: Fixed a denial of service which might occur when 
  scanning a specially crafted email file as (bsc#1157763).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15961">CVE-2019-15961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522421" comment="clamav-0.100.3-33.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152099" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1093414" ref_url="https://bugzilla.suse.com/1093414" source="BUGZILLA"/>
		<reference ref_id="1150734" ref_url="https://bugzilla.suse.com/1150734" source="BUGZILLA"/>
		<reference ref_id="1157198" ref_url="https://bugzilla.suse.com/1157198" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3688" ref_url="https://www.suse.com/security/cve/CVE-2019-3688/" source="CVE"/>
		<reference ref_id="CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690/" source="CVE"/>
		<description>
This update for permissions fixes the following issues:

- CVE-2019-3688: Changed wrong ownership in /usr/sbin/pinger to root:squid
  which could have allowed a squid user to gain persistence by changing the 
  binary (bsc#1093414).
- CVE-2019-3690: Fixed a privilege escalation through untrusted symbolic 
  links (bsc#1150734).
- Fixed a regression which caused segmentation fault (bsc#1157198).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1093414">SUSE bug 1093414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150734">SUSE bug 1150734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157198">SUSE bug 1157198</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3688/">CVE-2019-3688 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3688">CVE-2019-3688 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3690">CVE-2019-3690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530786" comment="permissions-2015.09.28.1626-17.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152100" version="1" class="patch">
	<metadata>
		<title>Security update for Mesa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1156015" ref_url="https://bugzilla.suse.com/1156015" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5068" ref_url="https://www.suse.com/security/cve/CVE-2019-5068/" source="CVE"/>
		<description>
This update for Mesa fixes the following issues:

Security issue fixed:

- CVE-2019-5068: Fixed exploitable shared memory permissions vulnerability (bsc#1156015).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156015">SUSE bug 1156015</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5068/">CVE-2019-5068 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5068">CVE-2019-5068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557410" comment="Mesa-17.0.5-117.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557411" comment="Mesa-32bit-17.0.5-117.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557412" comment="Mesa-libEGL1-17.0.5-117.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557413" comment="Mesa-libEGL1-32bit-17.0.5-117.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557414" comment="Mesa-libGL1-17.0.5-117.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557415" comment="Mesa-libGL1-32bit-17.0.5-117.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557416" comment="Mesa-libGLESv2-2-17.0.5-117.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557417" comment="Mesa-libglapi0-17.0.5-117.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557418" comment="Mesa-libglapi0-32bit-17.0.5-117.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557419" comment="libgbm1-17.0.5-117.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557420" comment="libgbm1-32bit-17.0.5-117.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557421" comment="libxatracker2-1.0.0-117.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152101" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1091625" ref_url="https://bugzilla.suse.com/1091625" source="BUGZILLA"/>
		<reference ref_id="1156944" ref_url="https://bugzilla.suse.com/1156944" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2767" ref_url="https://www.suse.com/security/cve/CVE-2011-2767/" source="CVE"/>
		<description>
This update for apache2-mod_perl fixes the following issues:

Security issue fixed: 

- CVE-2011-2767: Fixed a vulnerability which could have allowed 
  perl code execution in the context of user account (bsc#1156944).

Other issue addressed:

- Restore process name after sv_setpv_mg() call. (bsc#1091625)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-10"/>
	<updated date="2019-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091625">SUSE bug 1091625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156944">SUSE bug 1156944</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2011-2767/">CVE-2011-2767 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2767">CVE-2011-2767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557422" comment="apache2-mod_perl-2.0.8-13.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152102" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1009254" ref_url="https://bugzilla.suse.com/1009254" source="BUGZILLA"/>
		<reference ref_id="1071853" ref_url="https://bugzilla.suse.com/1071853" source="BUGZILLA"/>
		<reference ref_id="1093536" ref_url="https://bugzilla.suse.com/1093536" source="BUGZILLA"/>
		<reference ref_id="1094462" ref_url="https://bugzilla.suse.com/1094462" source="BUGZILLA"/>
		<reference ref_id="1107874" ref_url="https://bugzilla.suse.com/1107874" source="BUGZILLA"/>
		<reference ref_id="1109845" ref_url="https://bugzilla.suse.com/1109845" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10811" ref_url="https://www.suse.com/security/cve/CVE-2018-10811/" source="CVE"/>
		<reference ref_id="CVE-2018-16151" ref_url="https://www.suse.com/security/cve/CVE-2018-16151/" source="CVE"/>
		<reference ref_id="CVE-2018-16152" ref_url="https://www.suse.com/security/cve/CVE-2018-16152/" source="CVE"/>
		<reference ref_id="CVE-2018-17540" ref_url="https://www.suse.com/security/cve/CVE-2018-17540/" source="CVE"/>
		<reference ref_id="CVE-2018-5388" ref_url="https://www.suse.com/security/cve/CVE-2018-5388/" source="CVE"/>
		<description>
This update for strongswan provides the following fixes:
	  
Security issues fixed: 

- CVE-2018-5388: Fixed a buffer underflow which may allow to a remote attacker 
  with local user credentials to resource exhaustion and denial of service while 
  reading from the socket (bsc#1094462).
- CVE-2018-10811: Fixed a denial of service during  the IKEv2 key derivation if 
  the openssl plugin is used in FIPS mode and HMAC-MD5 is negotiated as PRF 
  (bsc#1093536).
- CVE-2018-16151,CVE-2018-16152: Fixed multiple flaws in the gmp plugin which 
  might lead to authorization bypass (bsc#1107874).
- CVE-2018-17540: Fixed an improper input validation in gmp plugin (bsc#1109845).  

Other issues addressed:

- Fixed some client fails when the scep server URL is used with HTTPS protocol (bsc#1071853).
- Reject Diffie-Hellman key exchanges using primes smaller than 1024 bit.
- Handle unexpected informational message from SonicWall. (bsc#1009254)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009254">SUSE bug 1009254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071853">SUSE bug 1071853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093536">SUSE bug 1093536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094462">SUSE bug 1094462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109845">SUSE bug 1109845</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10811/">CVE-2018-10811 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10811">CVE-2018-10811 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16151/">CVE-2018-16151 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16151">CVE-2018-16151 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16152/">CVE-2018-16152 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16152">CVE-2018-16152 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17540/">CVE-2018-17540 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17540">CVE-2018-17540 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5388/">CVE-2018-5388 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5388">CVE-2018-5388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522423" comment="strongswan-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552195" comment="strongswan-hmac-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522425" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522426" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152103" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1152497" ref_url="https://bugzilla.suse.com/1152497" source="BUGZILLA"/>
		<reference ref_id="1154448" ref_url="https://bugzilla.suse.com/1154448" source="BUGZILLA"/>
		<reference ref_id="1154456" ref_url="https://bugzilla.suse.com/1154456" source="BUGZILLA"/>
		<reference ref_id="1154458" ref_url="https://bugzilla.suse.com/1154458" source="BUGZILLA"/>
		<reference ref_id="1154460" ref_url="https://bugzilla.suse.com/1154460" source="BUGZILLA"/>
		<reference ref_id="1154461" ref_url="https://bugzilla.suse.com/1154461" source="BUGZILLA"/>
		<reference ref_id="1154464" ref_url="https://bugzilla.suse.com/1154464" source="BUGZILLA"/>
		<reference ref_id="1155945" ref_url="https://bugzilla.suse.com/1155945" source="BUGZILLA"/>
		<reference ref_id="1157888" ref_url="https://bugzilla.suse.com/1157888" source="BUGZILLA"/>
		<reference ref_id="1158003" ref_url="https://bugzilla.suse.com/1158003" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1158007" ref_url="https://bugzilla.suse.com/1158007" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-18420" ref_url="https://www.suse.com/security/cve/CVE-2019-18420/" source="CVE"/>
		<reference ref_id="CVE-2019-18421" ref_url="https://www.suse.com/security/cve/CVE-2019-18421/" source="CVE"/>
		<reference ref_id="CVE-2019-18422" ref_url="https://www.suse.com/security/cve/CVE-2019-18422/" source="CVE"/>
		<reference ref_id="CVE-2019-18423" ref_url="https://www.suse.com/security/cve/CVE-2019-18423/" source="CVE"/>
		<reference ref_id="CVE-2019-18424" ref_url="https://www.suse.com/security/cve/CVE-2019-18424/" source="CVE"/>
		<reference ref_id="CVE-2019-18425" ref_url="https://www.suse.com/security/cve/CVE-2019-18425/" source="CVE"/>
		<reference ref_id="CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19581" ref_url="https://www.suse.com/security/cve/CVE-2019-19581/" source="CVE"/>
		<reference ref_id="CVE-2019-19582" ref_url="https://www.suse.com/security/cve/CVE-2019-19582/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2019-19581: Fixed a potential out of bounds on 32-bit Arm (bsc#1158003 XSA-307).
- CVE-2019-19582: Fixed a potential infinite loop when x86 accesses to bitmaps with 
  a compile time known size of 64 (bsc#1158003 XSA-307).
- CVE-2019-19583: Fixed improper checks which could have allowed HVM/PVH guest userspace 
  code to crash the guest,leading to a guest denial of service (bsc#1158004 XSA-308).
- CVE-2019-19578: Fixed an issue where a malicious or buggy PV guest could have caused
  hypervisor crash resulting in denial of service affecting the entire host (bsc#1158005 XSA-309).
- CVE-2019-19580: Fixed a privilege escalation where a malicious PV guest administrator 
  could have been able to escalate their privilege to that of the host (bsc#1158006 XSA-310).
- CVE-2019-19577: Fixed an issue where a malicious guest administrator could have caused Xen 
  to access data structures while they are being modified leading to a crash (bsc#1158007 XSA-311). 
- CVE-2019-19579: Fixed a privilege escaltion where an untrusted domain with access 
  to a physical device can DMA into host memory (bsc#1157888 XSA-306).
- CVE-2019-18420: Malicious x86 PV guests may have caused a hypervisor crash, 
  resulting in a denial of service (bsc#1154448 XSA-296)
- CVE-2019-18425: 32-bit PV guest user mode could elevate its privileges to that 
  of the guest kernel. (bsc#1154456 XSA-298).
- CVE-2019-18421: A malicious PV guest administrator may have been able to
  escalate their privilege to that of the host. (bsc#1154458 XSA-299).
- CVE-2019-18423: A malicious guest administrator may cause a hypervisor crash,
  resulting in a denial of service  (bsc#1154460 XSA-301).
- CVE-2019-18422: A malicious ARM guest might contrive to arrange for critical 
  Xen code to run with interrupts erroneously enabled. This could lead to data
  corruption, denial of service, or possibly even privilege escalation. However
  a precise attack technique has not been identified. (bsc#1154464 XSA-303)
- CVE-2019-18424: An untrusted domain with access to a physical device can DMA 
  into host memory, leading to privilege escalation. (bsc#1154461 XSA-302).  
- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
  condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
  Exception during Page Size Change, causing the CPU core to be non-functional.
  (bsc#1155945 XSA-304)  
- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
  Transactional Memory support could be used to facilitate sidechannel
  information leaks out of microarchitectural buffers, similar to the
  previously described 'Microarchitectural Data Sampling' attack. (bsc#1152497 XSA-305).  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-13"/>
	<updated date="2019-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152497">SUSE bug 1152497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154448">SUSE bug 1154448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154456">SUSE bug 1154456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154460">SUSE bug 1154460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154461">SUSE bug 1154461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154464">SUSE bug 1154464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155945">SUSE bug 1155945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18420/">CVE-2019-18420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18420">CVE-2019-18420 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18421/">CVE-2019-18421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18421">CVE-2019-18421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18422/">CVE-2019-18422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18422">CVE-2019-18422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18423/">CVE-2019-18423 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18423">CVE-2019-18423 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18424/">CVE-2019-18424 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18424">CVE-2019-18424 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18425/">CVE-2019-18425 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18425">CVE-2019-18425 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19577">CVE-2019-19577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19578">CVE-2019-19578 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19579">CVE-2019-19579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19580">CVE-2019-19580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19581/">CVE-2019-19581 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19581">CVE-2019-19581 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19582/">CVE-2019-19582 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19582">CVE-2019-19582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19583">CVE-2019-19583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538360" comment="xen-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538361" comment="xen-doc-html-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538362" comment="xen-libs-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538363" comment="xen-libs-32bit-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538364" comment="xen-tools-4.9.4_06-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538365" comment="xen-tools-domU-4.9.4_06-3.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152104" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1082023" ref_url="https://bugzilla.suse.com/1082023" source="BUGZILLA"/>
		<reference ref_id="1158785" ref_url="https://bugzilla.suse.com/1158785" source="BUGZILLA"/>
		<reference ref_id="1158787" ref_url="https://bugzilla.suse.com/1158787" source="BUGZILLA"/>
		<reference ref_id="1158788" ref_url="https://bugzilla.suse.com/1158788" source="BUGZILLA"/>
		<reference ref_id="1158789" ref_url="https://bugzilla.suse.com/1158789" source="BUGZILLA"/>
		<reference ref_id="1158790" ref_url="https://bugzilla.suse.com/1158790" source="BUGZILLA"/>
		<reference ref_id="1158791" ref_url="https://bugzilla.suse.com/1158791" source="BUGZILLA"/>
		<reference ref_id="1158792" ref_url="https://bugzilla.suse.com/1158792" source="BUGZILLA"/>
		<reference ref_id="1158793" ref_url="https://bugzilla.suse.com/1158793" source="BUGZILLA"/>
		<reference ref_id="1158795" ref_url="https://bugzilla.suse.com/1158795" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1348" ref_url="https://www.suse.com/security/cve/CVE-2019-1348/" source="CVE"/>
		<reference ref_id="CVE-2019-1349" ref_url="https://www.suse.com/security/cve/CVE-2019-1349/" source="CVE"/>
		<reference ref_id="CVE-2019-1350" ref_url="https://www.suse.com/security/cve/CVE-2019-1350/" source="CVE"/>
		<reference ref_id="CVE-2019-1351" ref_url="https://www.suse.com/security/cve/CVE-2019-1351/" source="CVE"/>
		<reference ref_id="CVE-2019-1352" ref_url="https://www.suse.com/security/cve/CVE-2019-1352/" source="CVE"/>
		<reference ref_id="CVE-2019-1353" ref_url="https://www.suse.com/security/cve/CVE-2019-1353/" source="CVE"/>
		<reference ref_id="CVE-2019-1354" ref_url="https://www.suse.com/security/cve/CVE-2019-1354/" source="CVE"/>
		<reference ref_id="CVE-2019-1387" ref_url="https://www.suse.com/security/cve/CVE-2019-1387/" source="CVE"/>
		<reference ref_id="CVE-2019-19604" ref_url="https://www.suse.com/security/cve/CVE-2019-19604/" source="CVE"/>
		<description>
This update for git fixes the following issues:

Security issues fixed:

- CVE-2019-1349: Fixed issue on Windows, when submodules are cloned recursively, under certain circumstances Git could be fooled into using the same Git directory twice (bsc#1158787).
- CVE-2019-19604: Fixed a recursive clone followed by a submodule update could execute code contained within the repository without the user explicitly having asked for that (bsc#1158795).
- CVE-2019-1387: Fixed recursive clones that are currently affected by a vulnerability that is caused by too-lax validation of submodule names, allowing very targeted attacks via remote code execution in recursive clones (bsc#1158793).
- CVE-2019-1354: Fixed issue on Windows that refuses to write tracked files with filenames that contain backslashes (bsc#1158792).
- CVE-2019-1353: Fixed issue when run in the Windows Subsystem for Linux while accessing a working directory on a regular Windows drive, none of the NTFS protections were active (bsc#1158791).
- CVE-2019-1352: Fixed issue on Windows was unaware of NTFS Alternate Data Streams (bsc#1158790).
- CVE-2019-1351: Fixed issue on Windows mistakes drive letters outside of the US-English alphabet as relative paths (bsc#1158789).
- CVE-2019-1350: Fixed incorrect quoting of command-line arguments allowed remote code execution during a recursive clone in conjunction with SSH URLs (bsc#1158788).
- CVE-2019-1348: Fixed the --export-marks option of fast-import is exposed also via  the in-stream command feature export-marks=... and it allows overwriting arbitrary paths (bsc#1158785).
- Fixed an issue where git send-email fails to authenticate with SMTP server (bsc#1082023)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-16"/>
	<updated date="2019-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082023">SUSE bug 1082023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158787">SUSE bug 1158787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158788">SUSE bug 1158788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158789">SUSE bug 1158789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158790">SUSE bug 1158790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158791">SUSE bug 1158791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158792">SUSE bug 1158792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158793">SUSE bug 1158793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158795">SUSE bug 1158795</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-1348/">CVE-2019-1348 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1348">CVE-2019-1348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1349/">CVE-2019-1349 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1349">CVE-2019-1349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1350/">CVE-2019-1350 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1350">CVE-2019-1350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1351/">CVE-2019-1351 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1351">CVE-2019-1351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1352/">CVE-2019-1352 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1352">CVE-2019-1352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1353/">CVE-2019-1353 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1353">CVE-2019-1353 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1354/">CVE-2019-1354 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1354">CVE-2019-1354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1387/">CVE-2019-1387 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1387">CVE-2019-1387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19604/">CVE-2019-19604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19604">CVE-2019-19604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530787" comment="git-core-2.12.3-27.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152105" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1158328" ref_url="https://bugzilla.suse.com/1158328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Mozilla Firefox was updated to 68.3esr (MFSA 2019-37 bsc#1158328)	  
	  
Security issues fixed: 

- CVE-2019-17008: Fixed a use-after-free in worker destruction (bmo#1546331)
- CVE-2019-13722: Fixed a stack corruption due to incorrect number of arguments 
  in WebRTC code (bmo#1580156)
- CVE-2019-11745: Fixed an out of bounds write in NSS when encrypting with a 
  block cipher (bmo#1586176)
- CVE-2019-17009: Fixed an issue where updater temporary files accessible to 
  unprivileged processes (bmo#1510494)
- CVE-2019-17010: Fixed a use-after-free when performing device orientation 
  checks (bmo#1581084)
- CVE-2019-17005: Fixed a buffer overflow in plain text serializer (bmo#1584170)
- CVE-2019-17011: Fixed a use-after-free when retrieving a document 
  in antitracking (bmo#1591334)
- CVE-2019-17012: Fixed multiple memmory issues
  (bmo#1449736, bmo#1533957, bmo#1560667,bmo#1567209, bmo#1580288, bmo#1585760, 
  bmo#1592502)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-19"/>
	<updated date="2019-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13722">CVE-2019-13722 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17005">CVE-2019-17005 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17008">CVE-2019-17008 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17009">CVE-2019-17009 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17010">CVE-2019-17010 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17011">CVE-2019-17011 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17012">CVE-2019-17012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152106" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120374" ref_url="https://bugzilla.suse.com/1120374" source="BUGZILLA"/>
		<reference ref_id="1122983" ref_url="https://bugzilla.suse.com/1122983" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18500" ref_url="https://www.suse.com/security/cve/CVE-2018-18500/" source="CVE"/>
		<reference ref_id="CVE-2018-18501" ref_url="https://www.suse.com/security/cve/CVE-2018-18501/" source="CVE"/>
		<reference ref_id="CVE-2018-18505" ref_url="https://www.suse.com/security/cve/CVE-2018-18505/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

CVE-2018-18500: Fixed a use-after-free parsing HTML5 stream (boo#1122983).
CVE-2018-18501: Fixed multiple memory safety bugs (boo#1122983).
CVE-2018-18505: Fixed a privilege escalation through IPC channel messages (boo#1122983).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-12"/>
	<updated date="2019-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120374">SUSE bug 1120374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18500/">CVE-2018-18500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18500">CVE-2018-18500 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18501/">CVE-2018-18501 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18501">CVE-2018-18501 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18505/">CVE-2018-18505 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18505">CVE-2018-18505 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521605" comment="MozillaFirefox-60.5.0esr-109.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521606" comment="MozillaFirefox-branding-SLE-60-32.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521607" comment="MozillaFirefox-translations-common-60.5.0esr-109.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521608" comment="libfreebl3-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521609" comment="libfreebl3-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530791" comment="libfreebl3-hmac-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530792" comment="libfreebl3-hmac-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521610" comment="libsoftokn3-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521611" comment="libsoftokn3-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530793" comment="libsoftokn3-hmac-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530794" comment="libsoftokn3-hmac-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521612" comment="mozilla-nss-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521613" comment="mozilla-nss-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521614" comment="mozilla-nss-certs-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521615" comment="mozilla-nss-certs-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521616" comment="mozilla-nss-sysinit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521617" comment="mozilla-nss-sysinit-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521618" comment="mozilla-nss-tools-3.41.1-58.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152107" version="1" class="patch">
	<metadata>
		<title>Security update for python-numpy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122208" ref_url="https://bugzilla.suse.com/1122208" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446/" source="CVE"/>
		<description>
This update for python-numpy fixes the following issue:

Security issue fixed:

- CVE-2019-6446: Set allow_pickle to false by default to restrict loading untrusted content (bsc#1122208).
  With this update we decrease the possibility of allowing remote attackers to execute arbitrary code by
  misusing numpy.load(). A warning during runtime will show-up when the allow_pickle is not explicitly set.  

NOTE: By applying this update the behavior of python-numpy changes, which might break your application.
In order to get the old behaviour back, you have to explicitly set `allow_pickle` to True. Be aware
that this should only be done for trusted input, as loading untrusted input might lead to arbitrary code
execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-18"/>
	<updated date="2019-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122208">SUSE bug 1122208</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6446">CVE-2019-6446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521620" comment="python-numpy-1.8.0-5.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152108" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111498" ref_url="https://bugzilla.suse.com/1111498" source="BUGZILLA"/>
		<reference ref_id="1117025" ref_url="https://bugzilla.suse.com/1117025" source="BUGZILLA"/>
		<reference ref_id="1117382" ref_url="https://bugzilla.suse.com/1117382" source="BUGZILLA"/>
		<reference ref_id="1120658" ref_url="https://bugzilla.suse.com/1120658" source="BUGZILLA"/>
		<reference ref_id="1122000" ref_url="https://bugzilla.suse.com/1122000" source="BUGZILLA"/>
		<reference ref_id="1122344" ref_url="https://bugzilla.suse.com/1122344" source="BUGZILLA"/>
		<reference ref_id="1123333" ref_url="https://bugzilla.suse.com/1123333" source="BUGZILLA"/>
		<reference ref_id="1123892" ref_url="https://bugzilla.suse.com/1123892" source="BUGZILLA"/>
		<reference ref_id="1125352" ref_url="https://bugzilla.suse.com/1125352" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<description>
This update for systemd fixes the following issues:

Security vulnerability fixed:

- CVE-2019-6454: Fixed a crash of PID1 by sending specially crafted D-BUS
  message on the system bus by an unprivileged user (bsc#1125352)

Other bug fixes and changes:

- journal-remote: set a limit on the number of fields in a message
- journal-remote: verify entry length from header
- journald: set a limit on the number of fields (1k)
- journald: do not store the iovec entry for process commandline on stack
- core: include Found state in device dumps
- device: fix serialization and deserialization of DeviceFound
- fix path in btrfs rule (#6844)
- assemble multidevice btrfs volumes without external tools (#6607) (bsc#1117025)
- Update systemd-system.conf.xml (bsc#1122000)
- units: inform user that the default target is started after exiting from rescue or emergency mode
- manager: don't skip sigchld handler for main and control pid for services (#3738)
- core: Add helper functions unit_{main, control}_pid
- manager: Fixing a debug printf formatting mistake (#3640)
- manager: Only invoke a single sigchld per unit within a cleanup cycle (bsc#1117382)
- core: update invoke_sigchld_event() to handle NULL -&gt;sigchld_event()
- sd-event: expose the event loop iteration counter via sd_event_get_iteration() (#3631)
- unit: rework a bit how we keep the service fdstore from being destroyed during service restart (bsc#1122344)
- core: when restarting services, don't close fds
- cryptsetup: Add dependency on loopback setup to generated units
- journal-gateway: use localStorage['cursor'] only when it has valid value
- journal-gateway: explicitly declare local variables
- analyze: actually select longest activated-time of services
- sd-bus: fix implicit downcast of bitfield reported by LGTM
- core: free lines after reading them (bsc#1123892)
- pam_systemd: reword message about not creating a session (bsc#1111498)
- pam_systemd: suppress LOG_DEBUG log messages if debugging is off (bsc#1111498)
- main: improve RLIMIT_NOFILE handling (#5795) (bsc#1120658)
- sd-bus: if we receive an invalid dbus message, ignore and proceeed
- automount: don't pass non-blocking pipe to kernel.
- units: make sure initrd-cleanup.service terminates before switching to rootfs (bsc#1123333)
- units: add Wants=initrd-cleanup.service to initrd-switch-root.target (#4345) (bsc#1123333)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-19"/>
	<updated date="2019-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111498">SUSE bug 1111498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117025">SUSE bug 1117025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117382">SUSE bug 1117382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120658">SUSE bug 1120658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122000">SUSE bug 1122000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122344">SUSE bug 1122344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123333">SUSE bug 1123333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123892">SUSE bug 1123892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125352">SUSE bug 1125352</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6454">CVE-2019-6454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521621" comment="libsystemd0-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521622" comment="libsystemd0-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521623" comment="libudev1-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521624" comment="libudev1-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521625" comment="systemd-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521626" comment="systemd-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521627" comment="systemd-bash-completion-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521628" comment="systemd-sysvinit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521629" comment="udev-228-150.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152109" version="1" class="patch">
	<metadata>
		<title>Security update for procps (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1092100" ref_url="https://bugzilla.suse.com/1092100" source="BUGZILLA"/>
		<reference ref_id="1121753" ref_url="https://bugzilla.suse.com/1121753" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<description>

  
This update for procps fixes the following security issues:

- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top
  with HOME unset in an attacker-controlled directory, the attacker could have
  achieved privilege escalation by exploiting one of several vulnerabilities in
  the config_file() function (bsc#1092100).
- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.
  Inbuilt protection in ps maped a guard page at the end of the overflowed
  buffer, ensuring that the impact of this flaw is limited to a crash (temporary
  denial of service) (bsc#1092100).
- CVE-2018-1124: Prevent multiple integer overflows leading to a heap
  corruption in file2strvec function. This allowed a privilege escalation for a
  local attacker who can create entries in procfs by starting processes, which
  could result in crashes or arbitrary code execution in proc utilities run by
  other users (bsc#1092100).
- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was
  mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent
  truncation/integer overflow issues (bsc#1092100).

(These issues were previously released for SUSE Linux Enterprise 12 SP3 and SP4.)

Also the following non-security issue was fixed:

- Fix CPU summary showing old data. (bsc#1121753)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-20"/>
	<updated date="2019-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121753">SUSE bug 1121753</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1122">CVE-2018-1122 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1123">CVE-2018-1123 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1124">CVE-2018-1124 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1125">CVE-2018-1125 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1126">CVE-2018-1126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521630" comment="libprocps3-3.3.9-11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521631" comment="procps-3.3.9-11.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152110" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1073748" ref_url="https://bugzilla.suse.com/1073748" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509 certificate parser (bsc#1122191).
- CVE-2018-14647: Fixed a denial-of-service vulnerability in Expat (bsc#1109847).

Non-security issue fixed:

- Fixed a bug where PyWeakReference struct was not initialized correctly leading to a crash (bsc#1073748).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-25"/>
	<updated date="2019-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073748">SUSE bug 1073748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521634" comment="libpython2_7-1_0-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521635" comment="libpython2_7-1_0-32bit-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521636" comment="python-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530816" comment="python-32bit-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521637" comment="python-base-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530817" comment="python-base-32bit-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521638" comment="python-curses-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530818" comment="python-demo-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530819" comment="python-doc-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530820" comment="python-doc-pdf-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530821" comment="python-gdbm-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530822" comment="python-idle-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521640" comment="python-tk-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521641" comment="python-xml-2.7.13-28.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152111" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1101644" ref_url="https://bugzilla.suse.com/1101644" source="BUGZILLA"/>
		<reference ref_id="1101645" ref_url="https://bugzilla.suse.com/1101645" source="BUGZILLA"/>
		<reference ref_id="1101651" ref_url="https://bugzilla.suse.com/1101651" source="BUGZILLA"/>
		<reference ref_id="1101656" ref_url="https://bugzilla.suse.com/1101656" source="BUGZILLA"/>
		<reference ref_id="1112142" ref_url="https://bugzilla.suse.com/1112142" source="BUGZILLA"/>
		<reference ref_id="1112143" ref_url="https://bugzilla.suse.com/1112143" source="BUGZILLA"/>
		<reference ref_id="1112144" ref_url="https://bugzilla.suse.com/1112144" source="BUGZILLA"/>
		<reference ref_id="1112146" ref_url="https://bugzilla.suse.com/1112146" source="BUGZILLA"/>
		<reference ref_id="1112147" ref_url="https://bugzilla.suse.com/1112147" source="BUGZILLA"/>
		<reference ref_id="1112152" ref_url="https://bugzilla.suse.com/1112152" source="BUGZILLA"/>
		<reference ref_id="1112153" ref_url="https://bugzilla.suse.com/1112153" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<reference ref_id="CVE-2018-2938" ref_url="https://www.suse.com/security/cve/CVE-2018-2938/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk to version 7u201 fixes the following issues:

Security issues fixed:

- CVE-2018-3136: Manifest better support (bsc#1112142)
- CVE-2018-3139: Better HTTP Redirection (bsc#1112143)
- CVE-2018-3149: Enhance JNDI lookups (bsc#1112144)
- CVE-2018-3169: Improve field accesses (bsc#1112146)
- CVE-2018-3180: Improve TLS connections stability (bsc#1112147)
- CVE-2018-3214: Better RIFF reading support (bsc#1112152)
- CVE-2018-13785: Upgrade JDK 8u to libpng 1.6.35 (bsc#1112153)
- CVE-2018-16435: heap-based buffer overflow in SetData function in cmsIT8LoadFromFile
- CVE-2018-2938: Support Derby connections (bsc#1101644)
- CVE-2018-2940: Better stack walking (bsc#1101645)
- CVE-2018-2952: Exception to Pattern Syntax (bsc#1101651)
- CVE-2018-2973: Improve LDAP support (bsc#1101656)
- CVE-2018-3639 cpu speculative store bypass mitigation
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-09"/>
	<updated date="2019-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101644">SUSE bug 1101644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101651">SUSE bug 1101651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112147">SUSE bug 1112147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112153">SUSE bug 1112153</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13785">CVE-2018-13785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16435">CVE-2018-16435 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2938/">CVE-2018-2938 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2938">CVE-2018-2938 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2940">CVE-2018-2940 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2952">CVE-2018-2952 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2973">CVE-2018-2973 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3136">CVE-2018-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3139">CVE-2018-3139 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3149">CVE-2018-3149 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3169">CVE-2018-3169 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3180">CVE-2018-3180 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3214">CVE-2018-3214 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530836" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530837" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152112" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1121086" ref_url="https://bugzilla.suse.com/1121086" source="BUGZILLA"/>
		<reference ref_id="1122838" ref_url="https://bugzilla.suse.com/1122838" source="BUGZILLA"/>
		<reference ref_id="1122839" ref_url="https://bugzilla.suse.com/1122839" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17189" ref_url="https://www.suse.com/security/cve/CVE-2018-17189/" source="CVE"/>
		<reference ref_id="CVE-2018-17199" ref_url="https://www.suse.com/security/cve/CVE-2018-17199/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

Security issues fixed:

- CVE-2018-17189: Fixed a denial of service in mod_http2, via slow and unneeded request bodies (bsc#1122838)
- CVE-2018-17199: Fixed that mod_session_cookie did not respect expiry time (bsc#1122839)

Non-security issue fixed:

- sysconfig.d is not created anymore if it already exists (bsc#1121086)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-26"/>
	<updated date="2019-02-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1121086">SUSE bug 1121086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122838">SUSE bug 1122838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122839">SUSE bug 1122839</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17189/">CVE-2018-17189 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17189">CVE-2018-17189 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17199/">CVE-2018-17199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17199">CVE-2018-17199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557423" comment="apache2-2.4.23-29.34.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554502" comment="apache2-doc-2.4.23-29.34.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557424" comment="apache2-example-pages-2.4.23-29.34.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557425" comment="apache2-prefork-2.4.23-29.34.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557426" comment="apache2-utils-2.4.23-29.34.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557427" comment="apache2-worker-2.4.23-29.34.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152113" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111177" ref_url="https://bugzilla.suse.com/1111177" source="BUGZILLA"/>
		<reference ref_id="1113246" ref_url="https://bugzilla.suse.com/1113246" source="BUGZILLA"/>
		<reference ref_id="1114710" ref_url="https://bugzilla.suse.com/1114710" source="BUGZILLA"/>
		<reference ref_id="1121567" ref_url="https://bugzilla.suse.com/1121567" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14662" ref_url="https://www.suse.com/security/cve/CVE-2018-14662/" source="CVE"/>
		<reference ref_id="CVE-2018-16846" ref_url="https://www.suse.com/security/cve/CVE-2018-16846/" source="CVE"/>
		<reference ref_id="CVE-2018-16889" ref_url="https://www.suse.com/security/cve/CVE-2018-16889/" source="CVE"/>
		<description>
This update for ceph fixes the following issues:

Security issues fixed:

- CVE-2018-14662: mon: limit caps allowed to access the config store (bsc#1111177)
- CVE-2018-16846: rgw: enforce bounds on max-keys/max-uploads/max-parts (bsc#1114710)
- CVE-2018-16889: rgw: sanitize customer encryption keys from log output in v4 auth (bsc#1121567)

Non-security issue fixed:

- os/bluestore: avoid frequent allocator dump on bluefs rebalance failure (bsc#1113246)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-26"/>
	<updated date="2019-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111177">SUSE bug 1111177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113246">SUSE bug 1113246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114710">SUSE bug 1114710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121567">SUSE bug 1121567</bugzilla>
	<cve impact="low" cvss3="1.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14662/">CVE-2018-14662 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14662">CVE-2018-14662 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16846/">CVE-2018-16846 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16846">CVE-2018-16846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16889/">CVE-2018-16889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16889">CVE-2018-16889 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521644" comment="ceph-common-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521645" comment="libcephfs2-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521646" comment="librados2-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521647" comment="libradosstriper1-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521648" comment="librbd1-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521649" comment="librgw2-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521650" comment="python-cephfs-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521651" comment="python-rados-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521652" comment="python-rbd-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521653" comment="python-rgw-12.2.10+git.1549630712.bb089269ea-2.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152114" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1124937" ref_url="https://bugzilla.suse.com/1124937" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6212" ref_url="https://www.suse.com/security/cve/CVE-2019-6212/" source="CVE"/>
		<reference ref_id="CVE-2019-6215" ref_url="https://www.suse.com/security/cve/CVE-2019-6215/" source="CVE"/>
		<reference ref_id="CVE-2019-6216" ref_url="https://www.suse.com/security/cve/CVE-2019-6216/" source="CVE"/>
		<reference ref_id="CVE-2019-6217" ref_url="https://www.suse.com/security/cve/CVE-2019-6217/" source="CVE"/>
		<reference ref_id="CVE-2019-6226" ref_url="https://www.suse.com/security/cve/CVE-2019-6226/" source="CVE"/>
		<reference ref_id="CVE-2019-6227" ref_url="https://www.suse.com/security/cve/CVE-2019-6227/" source="CVE"/>
		<reference ref_id="CVE-2019-6229" ref_url="https://www.suse.com/security/cve/CVE-2019-6229/" source="CVE"/>
		<reference ref_id="CVE-2019-6233" ref_url="https://www.suse.com/security/cve/CVE-2019-6233/" source="CVE"/>
		<reference ref_id="CVE-2019-6234" ref_url="https://www.suse.com/security/cve/CVE-2019-6234/" source="CVE"/>
		<description>
This update for webkit2gtk3 to version 2.22.6 fixes the following issues:

Security issues fixed:

- CVE-2019-6212: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6215: Fixed a type confusion vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6216: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content. 
- CVE-2019-6217: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content. 
- CVE-2019-6226: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content.  
- CVE-2019-6227: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6229: Fixed a logic issue by improving validation which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6233: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6234: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.

Other issues addressed:   
- Update to version 2.22.6 (bsc#1124937).
- Kinetic scrolling slow down smoothly when reaching the ends of pages, instead of abruptly, to better match the GTK+ behaviour.
- Fixed Web inspector magnifier under Wayland.
- Fixed garbled rendering of some websites (e.g. YouTube) while scrolling under X11.
- Fixed several crashes, race conditions, and rendering issues.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-28"/>
	<updated date="2019-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6212/">CVE-2019-6212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6212">CVE-2019-6212 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6215/">CVE-2019-6215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6215">CVE-2019-6215 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6216/">CVE-2019-6216 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6216">CVE-2019-6216 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6217/">CVE-2019-6217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6217">CVE-2019-6217 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6226/">CVE-2019-6226 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6226">CVE-2019-6226 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6227/">CVE-2019-6227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6227">CVE-2019-6227 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6229/">CVE-2019-6229 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6229">CVE-2019-6229 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6233/">CVE-2019-6233 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6233">CVE-2019-6233 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6234/">CVE-2019-6234 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6234">CVE-2019-6234 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152115" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1112142" ref_url="https://bugzilla.suse.com/1112142" source="BUGZILLA"/>
		<reference ref_id="1112143" ref_url="https://bugzilla.suse.com/1112143" source="BUGZILLA"/>
		<reference ref_id="1112144" ref_url="https://bugzilla.suse.com/1112144" source="BUGZILLA"/>
		<reference ref_id="1112146" ref_url="https://bugzilla.suse.com/1112146" source="BUGZILLA"/>
		<reference ref_id="1112147" ref_url="https://bugzilla.suse.com/1112147" source="BUGZILLA"/>
		<reference ref_id="1112148" ref_url="https://bugzilla.suse.com/1112148" source="BUGZILLA"/>
		<reference ref_id="1112152" ref_url="https://bugzilla.suse.com/1112152" source="BUGZILLA"/>
		<reference ref_id="1112153" ref_url="https://bugzilla.suse.com/1112153" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk to version 8u191 fixes the following issues:

Security issues fixed:

- CVE-2018-3136: Manifest better support (bsc#1112142)
- CVE-2018-3139: Better HTTP Redirection (bsc#1112143)
- CVE-2018-3149: Enhance JNDI lookups (bsc#1112144)
- CVE-2018-3169: Improve field accesses (bsc#1112146)
- CVE-2018-3180: Improve TLS connections stability (bsc#1112147)
- CVE-2018-3214: Better RIFF reading support (bsc#1112152)
- CVE-2018-13785: Upgrade JDK 8u to libpng 1.6.35 (bsc#1112153)
- CVE-2018-3183: Improve script engine support (bsc#1112148)
- CVE-2018-16435: heap-based buffer overflow in SetData function in cmsIT8LoadFromFile
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112147">SUSE bug 1112147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112153">SUSE bug 1112153</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13785">CVE-2018-13785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16435">CVE-2018-16435 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3136">CVE-2018-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3139">CVE-2018-3139 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3149">CVE-2018-3149 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3169">CVE-2018-3169 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3180">CVE-2018-3180 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3183">CVE-2018-3183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3214">CVE-2018-3214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530861" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530862" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152116" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1127820" ref_url="https://bugzilla.suse.com/1127820" source="BUGZILLA"/>
		<reference ref_id="1127821" ref_url="https://bugzilla.suse.com/1127821" source="BUGZILLA"/>
		<reference ref_id="1127822" ref_url="https://bugzilla.suse.com/1127822" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12178" ref_url="https://www.suse.com/security/cve/CVE-2018-12178/" source="CVE"/>
		<reference ref_id="CVE-2018-12180" ref_url="https://www.suse.com/security/cve/CVE-2018-12180/" source="CVE"/>
		<reference ref_id="CVE-2018-3630" ref_url="https://www.suse.com/security/cve/CVE-2018-3630/" source="CVE"/>
		<description>
This update for ovmf fixes the following issues:

Security issues fixed: 

- CVE-2018-12180: Fixed a buffer overflow in BlockIo service, which could lead 
  to memory read/write overrun (bsc#1127820).
- CVE-2018-12178: Fixed an improper DNS check upon receiving a new DNS packet (bsc#1127821).
- CVE-2018-3630: Fixed a logic error in FV parsing which could allow a local attacker to 
  bypass the chain of trust checks (bsc#1127822).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-11"/>
	<updated date="2019-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1127820">SUSE bug 1127820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127821">SUSE bug 1127821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127822">SUSE bug 1127822</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12178/">CVE-2018-12178 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12178">CVE-2018-12178 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12180/">CVE-2018-12180 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12180">CVE-2018-12180 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3630/">CVE-2018-3630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-3630">CVE-2018-3630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557428" comment="ovmf-2017+git1492060560.b6d11d7c46-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557429" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554533" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152117" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1056334" ref_url="https://bugzilla.suse.com/1056334" source="BUGZILLA"/>
		<reference ref_id="1056386" ref_url="https://bugzilla.suse.com/1056386" source="BUGZILLA"/>
		<reference ref_id="1084604" ref_url="https://bugzilla.suse.com/1084604" source="BUGZILLA"/>
		<reference ref_id="1113231" ref_url="https://bugzilla.suse.com/1113231" source="BUGZILLA"/>
		<reference ref_id="1114957" ref_url="https://bugzilla.suse.com/1114957" source="BUGZILLA"/>
		<reference ref_id="1116717" ref_url="https://bugzilla.suse.com/1116717" source="BUGZILLA"/>
		<reference ref_id="1117275" ref_url="https://bugzilla.suse.com/1117275" source="BUGZILLA"/>
		<reference ref_id="1119493" ref_url="https://bugzilla.suse.com/1119493" source="BUGZILLA"/>
		<reference ref_id="1121600" ref_url="https://bugzilla.suse.com/1121600" source="BUGZILLA"/>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-13673" ref_url="https://www.suse.com/security/cve/CVE-2017-13673/" source="CVE"/>
		<reference ref_id="CVE-2018-16872" ref_url="https://www.suse.com/security/cve/CVE-2018-16872/" source="CVE"/>
		<reference ref_id="CVE-2018-18954" ref_url="https://www.suse.com/security/cve/CVE-2018-18954/" source="CVE"/>
		<reference ref_id="CVE-2018-19364" ref_url="https://www.suse.com/security/cve/CVE-2018-19364/" source="CVE"/>
		<reference ref_id="CVE-2018-19489" ref_url="https://www.suse.com/security/cve/CVE-2018-19489/" source="CVE"/>
		<reference ref_id="CVE-2018-7858" ref_url="https://www.suse.com/security/cve/CVE-2018-7858/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6778: Fixed an out-of-bounds access in slirp (bsc#1123156)
- CVE-2018-16872: Fixed a host security vulnerability related to handling symlinks in usb-mtp (bsc#1119493)
- CVE-2018-19489: Fixed a Denial-of-Service in virtfs (bsc#1117275)
- CVE-2018-19364: Fixed an use-after-free vulnerability if virtfs interface is deliberately abused (bsc#1116717)
- CVE-2018-18954: Fixed an out-of-bounds access performing PowerNV memory operations (bsc#1114957)
- CVE-2017-13673: Fixed a reachable assert failure during during display update (bsc#1056386)
- CVE-2017-13672: Fixed an out-of-bounds read access during display update (bsc#1056334)
- CVE-2018-7858: Fixed an out-of-bounds access in cirrus when updating vga display allowing for Denial-of-Service (bsc#1084604)

Other bug fixes and changes:

- Fix pwrite64/pread64/write to return 0 over -1 for a zero length NULL buffer in qemu (bsc#1121600)
- Fix bad guest time after migration (bsc#1113231)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-11"/>
	<updated date="2019-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056334">SUSE bug 1056334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056386">SUSE bug 1056386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084604">SUSE bug 1084604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113231">SUSE bug 1113231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114957">SUSE bug 1114957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116717">SUSE bug 1116717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117275">SUSE bug 1117275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119493">SUSE bug 1119493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121600">SUSE bug 1121600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13672">CVE-2017-13672 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13673/">CVE-2017-13673 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13673">CVE-2017-13673 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16872/">CVE-2018-16872 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16872">CVE-2018-16872 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18954/">CVE-2018-18954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18954">CVE-2018-18954 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19364/">CVE-2018-19364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19364">CVE-2018-19364 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19489/">CVE-2018-19489 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19489">CVE-2018-19489 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7858/">CVE-2018-7858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7858">CVE-2018-7858 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521669" comment="qemu-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521670" comment="qemu-block-curl-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557430" comment="qemu-block-iscsi-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557431" comment="qemu-block-rbd-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557432" comment="qemu-block-ssh-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557433" comment="qemu-guest-agent-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521671" comment="qemu-ipxe-1.0.0+-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521672" comment="qemu-kvm-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557434" comment="qemu-lang-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521673" comment="qemu-seabios-1.10.2-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521674" comment="qemu-sgabios-8-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521675" comment="qemu-tools-2.9.1-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521676" comment="qemu-vgabios-1.10.2-6.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521677" comment="qemu-x86-2.9.1-6.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152118" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1110279" ref_url="https://bugzilla.suse.com/1110279" source="BUGZILLA"/>
		<reference ref_id="1116998" ref_url="https://bugzilla.suse.com/1116998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4191" ref_url="https://www.suse.com/security/cve/CVE-2018-4191/" source="CVE"/>
		<reference ref_id="CVE-2018-4197" ref_url="https://www.suse.com/security/cve/CVE-2018-4197/" source="CVE"/>
		<reference ref_id="CVE-2018-4207" ref_url="https://www.suse.com/security/cve/CVE-2018-4207/" source="CVE"/>
		<reference ref_id="CVE-2018-4208" ref_url="https://www.suse.com/security/cve/CVE-2018-4208/" source="CVE"/>
		<reference ref_id="CVE-2018-4209" ref_url="https://www.suse.com/security/cve/CVE-2018-4209/" source="CVE"/>
		<reference ref_id="CVE-2018-4210" ref_url="https://www.suse.com/security/cve/CVE-2018-4210/" source="CVE"/>
		<reference ref_id="CVE-2018-4212" ref_url="https://www.suse.com/security/cve/CVE-2018-4212/" source="CVE"/>
		<reference ref_id="CVE-2018-4213" ref_url="https://www.suse.com/security/cve/CVE-2018-4213/" source="CVE"/>
		<reference ref_id="CVE-2018-4261" ref_url="https://www.suse.com/security/cve/CVE-2018-4261/" source="CVE"/>
		<reference ref_id="CVE-2018-4262" ref_url="https://www.suse.com/security/cve/CVE-2018-4262/" source="CVE"/>
		<reference ref_id="CVE-2018-4263" ref_url="https://www.suse.com/security/cve/CVE-2018-4263/" source="CVE"/>
		<reference ref_id="CVE-2018-4264" ref_url="https://www.suse.com/security/cve/CVE-2018-4264/" source="CVE"/>
		<reference ref_id="CVE-2018-4265" ref_url="https://www.suse.com/security/cve/CVE-2018-4265/" source="CVE"/>
		<reference ref_id="CVE-2018-4266" ref_url="https://www.suse.com/security/cve/CVE-2018-4266/" source="CVE"/>
		<reference ref_id="CVE-2018-4267" ref_url="https://www.suse.com/security/cve/CVE-2018-4267/" source="CVE"/>
		<reference ref_id="CVE-2018-4270" ref_url="https://www.suse.com/security/cve/CVE-2018-4270/" source="CVE"/>
		<reference ref_id="CVE-2018-4272" ref_url="https://www.suse.com/security/cve/CVE-2018-4272/" source="CVE"/>
		<reference ref_id="CVE-2018-4273" ref_url="https://www.suse.com/security/cve/CVE-2018-4273/" source="CVE"/>
		<reference ref_id="CVE-2018-4278" ref_url="https://www.suse.com/security/cve/CVE-2018-4278/" source="CVE"/>
		<reference ref_id="CVE-2018-4284" ref_url="https://www.suse.com/security/cve/CVE-2018-4284/" source="CVE"/>
		<reference ref_id="CVE-2018-4299" ref_url="https://www.suse.com/security/cve/CVE-2018-4299/" source="CVE"/>
		<reference ref_id="CVE-2018-4306" ref_url="https://www.suse.com/security/cve/CVE-2018-4306/" source="CVE"/>
		<reference ref_id="CVE-2018-4309" ref_url="https://www.suse.com/security/cve/CVE-2018-4309/" source="CVE"/>
		<reference ref_id="CVE-2018-4312" ref_url="https://www.suse.com/security/cve/CVE-2018-4312/" source="CVE"/>
		<reference ref_id="CVE-2018-4314" ref_url="https://www.suse.com/security/cve/CVE-2018-4314/" source="CVE"/>
		<reference ref_id="CVE-2018-4315" ref_url="https://www.suse.com/security/cve/CVE-2018-4315/" source="CVE"/>
		<reference ref_id="CVE-2018-4316" ref_url="https://www.suse.com/security/cve/CVE-2018-4316/" source="CVE"/>
		<reference ref_id="CVE-2018-4317" ref_url="https://www.suse.com/security/cve/CVE-2018-4317/" source="CVE"/>
		<reference ref_id="CVE-2018-4318" ref_url="https://www.suse.com/security/cve/CVE-2018-4318/" source="CVE"/>
		<reference ref_id="CVE-2018-4319" ref_url="https://www.suse.com/security/cve/CVE-2018-4319/" source="CVE"/>
		<reference ref_id="CVE-2018-4323" ref_url="https://www.suse.com/security/cve/CVE-2018-4323/" source="CVE"/>
		<reference ref_id="CVE-2018-4328" ref_url="https://www.suse.com/security/cve/CVE-2018-4328/" source="CVE"/>
		<reference ref_id="CVE-2018-4345" ref_url="https://www.suse.com/security/cve/CVE-2018-4345/" source="CVE"/>
		<reference ref_id="CVE-2018-4358" ref_url="https://www.suse.com/security/cve/CVE-2018-4358/" source="CVE"/>
		<reference ref_id="CVE-2018-4359" ref_url="https://www.suse.com/security/cve/CVE-2018-4359/" source="CVE"/>
		<reference ref_id="CVE-2018-4361" ref_url="https://www.suse.com/security/cve/CVE-2018-4361/" source="CVE"/>
		<reference ref_id="CVE-2018-4372" ref_url="https://www.suse.com/security/cve/CVE-2018-4372/" source="CVE"/>
		<reference ref_id="CVE-2018-4373" ref_url="https://www.suse.com/security/cve/CVE-2018-4373/" source="CVE"/>
		<reference ref_id="CVE-2018-4375" ref_url="https://www.suse.com/security/cve/CVE-2018-4375/" source="CVE"/>
		<reference ref_id="CVE-2018-4376" ref_url="https://www.suse.com/security/cve/CVE-2018-4376/" source="CVE"/>
		<reference ref_id="CVE-2018-4378" ref_url="https://www.suse.com/security/cve/CVE-2018-4378/" source="CVE"/>
		<reference ref_id="CVE-2018-4382" ref_url="https://www.suse.com/security/cve/CVE-2018-4382/" source="CVE"/>
		<reference ref_id="CVE-2018-4386" ref_url="https://www.suse.com/security/cve/CVE-2018-4386/" source="CVE"/>
		<reference ref_id="CVE-2018-4392" ref_url="https://www.suse.com/security/cve/CVE-2018-4392/" source="CVE"/>
		<reference ref_id="CVE-2018-4416" ref_url="https://www.suse.com/security/cve/CVE-2018-4416/" source="CVE"/>
		<description>
This update for webkit2gtk3 to version 2.22.4 fixes the following issues:

Security issues fixed:

  CVE-2018-4191, CVE-2018-4197, CVE-2018-4299, CVE-2018-4306, CVE-2018-4309, CVE-2018-4392,
  CVE-2018-4312, CVE-2018-4314, CVE-2018-4315, CVE-2018-4316, CVE-2018-4317, CVE-2018-4318,
  CVE-2018-4319, CVE-2018-4323, CVE-2018-4328, CVE-2018-4358, CVE-2018-4359, CVE-2018-4361,
  CVE-2018-4345, CVE-2018-4372, CVE-2018-4373, CVE-2018-4375, CVE-2018-4376, CVE-2018-4416,
  CVE-2018-4378, CVE-2018-4382, CVE-2018-4386 (bsc#1110279, bsc#1116998). 
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4191/">CVE-2018-4191 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4191">CVE-2018-4191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4197/">CVE-2018-4197 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4197">CVE-2018-4197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4207/">CVE-2018-4207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4207">CVE-2018-4207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4208/">CVE-2018-4208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4208">CVE-2018-4208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4209/">CVE-2018-4209 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4209">CVE-2018-4209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4210/">CVE-2018-4210 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4210">CVE-2018-4210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4212/">CVE-2018-4212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4212">CVE-2018-4212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4213/">CVE-2018-4213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4213">CVE-2018-4213 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4261/">CVE-2018-4261 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4261">CVE-2018-4261 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4262/">CVE-2018-4262 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4262">CVE-2018-4262 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4263/">CVE-2018-4263 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4263">CVE-2018-4263 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4264/">CVE-2018-4264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4264">CVE-2018-4264 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4265/">CVE-2018-4265 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4265">CVE-2018-4265 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4266/">CVE-2018-4266 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4266">CVE-2018-4266 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4267/">CVE-2018-4267 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4267">CVE-2018-4267 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4270/">CVE-2018-4270 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4270">CVE-2018-4270 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4272/">CVE-2018-4272 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4272">CVE-2018-4272 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4273/">CVE-2018-4273 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4273">CVE-2018-4273 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4278/">CVE-2018-4278 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4278">CVE-2018-4278 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4284/">CVE-2018-4284 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4284">CVE-2018-4284 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4299/">CVE-2018-4299 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4299">CVE-2018-4299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4306/">CVE-2018-4306 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4306">CVE-2018-4306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4309/">CVE-2018-4309 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4309">CVE-2018-4309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4312/">CVE-2018-4312 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4312">CVE-2018-4312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4314/">CVE-2018-4314 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4314">CVE-2018-4314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4315/">CVE-2018-4315 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4315">CVE-2018-4315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4316/">CVE-2018-4316 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4316">CVE-2018-4316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4317/">CVE-2018-4317 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4317">CVE-2018-4317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4318/">CVE-2018-4318 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4318">CVE-2018-4318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4319/">CVE-2018-4319 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4319">CVE-2018-4319 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4323/">CVE-2018-4323 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4323">CVE-2018-4323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4328/">CVE-2018-4328 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4328">CVE-2018-4328 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4345/">CVE-2018-4345 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4345">CVE-2018-4345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4358/">CVE-2018-4358 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4358">CVE-2018-4358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4359/">CVE-2018-4359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4359">CVE-2018-4359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-4361/">CVE-2018-4361 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4361">CVE-2018-4361 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4372/">CVE-2018-4372 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4372">CVE-2018-4372 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4373/">CVE-2018-4373 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4373">CVE-2018-4373 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4375/">CVE-2018-4375 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4375">CVE-2018-4375 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4376/">CVE-2018-4376 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4376">CVE-2018-4376 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4378/">CVE-2018-4378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4378">CVE-2018-4378 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4382/">CVE-2018-4382 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4382">CVE-2018-4382 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4386/">CVE-2018-4386 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4386">CVE-2018-4386 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4392/">CVE-2018-4392 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4392">CVE-2018-4392 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4416/">CVE-2018-4416 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4416">CVE-2018-4416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152119" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120114" ref_url="https://bugzilla.suse.com/1120114" source="BUGZILLA"/>
		<reference ref_id="1120115" ref_url="https://bugzilla.suse.com/1120115" source="BUGZILLA"/>
		<reference ref_id="1120116" ref_url="https://bugzilla.suse.com/1120116" source="BUGZILLA"/>
		<reference ref_id="1120117" ref_url="https://bugzilla.suse.com/1120117" source="BUGZILLA"/>
		<reference ref_id="1120118" ref_url="https://bugzilla.suse.com/1120118" source="BUGZILLA"/>
		<reference ref_id="1120119" ref_url="https://bugzilla.suse.com/1120119" source="BUGZILLA"/>
		<reference ref_id="1120120" ref_url="https://bugzilla.suse.com/1120120" source="BUGZILLA"/>
		<reference ref_id="1120121" ref_url="https://bugzilla.suse.com/1120121" source="BUGZILLA"/>
		<reference ref_id="1120122" ref_url="https://bugzilla.suse.com/1120122" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15126" ref_url="https://www.suse.com/security/cve/CVE-2018-15126/" source="CVE"/>
		<reference ref_id="CVE-2018-15127" ref_url="https://www.suse.com/security/cve/CVE-2018-15127/" source="CVE"/>
		<reference ref_id="CVE-2018-20019" ref_url="https://www.suse.com/security/cve/CVE-2018-20019/" source="CVE"/>
		<reference ref_id="CVE-2018-20020" ref_url="https://www.suse.com/security/cve/CVE-2018-20020/" source="CVE"/>
		<reference ref_id="CVE-2018-20021" ref_url="https://www.suse.com/security/cve/CVE-2018-20021/" source="CVE"/>
		<reference ref_id="CVE-2018-20022" ref_url="https://www.suse.com/security/cve/CVE-2018-20022/" source="CVE"/>
		<reference ref_id="CVE-2018-20023" ref_url="https://www.suse.com/security/cve/CVE-2018-20023/" source="CVE"/>
		<reference ref_id="CVE-2018-20024" ref_url="https://www.suse.com/security/cve/CVE-2018-20024/" source="CVE"/>
		<reference ref_id="CVE-2018-6307" ref_url="https://www.suse.com/security/cve/CVE-2018-6307/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-15126: Fixed use-after-free in file transfer extension (bsc#1120114)
- CVE-2018-6307: Fixed use-after-free in file transfer extension server code (bsc#1120115)
- CVE-2018-20020: Fixed heap out-of-bound write inside structure in VNC client code (bsc#1120116)
- CVE-2018-15127: Fixed heap out-of-bounds write in rfbserver.c (bsc#1120117)
- CVE-2018-20019: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1120118)
- CVE-2018-20023: Fixed information disclosure through improper initialization in VNC Repeater client code (bsc#1120119)
- CVE-2018-20022: Fixed information disclosure through improper initialization in VNC client code (bsc#1120120)
- CVE-2018-20024: Fixed NULL pointer dereference in VNC client code (bsc#1120121)
- CVE-2018-20021: Fixed infinite loop in VNC client code (bsc#1120122)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120114">SUSE bug 1120114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120115">SUSE bug 1120115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120116">SUSE bug 1120116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120117">SUSE bug 1120117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120118">SUSE bug 1120118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120119">SUSE bug 1120119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120120">SUSE bug 1120120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120121">SUSE bug 1120121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120122">SUSE bug 1120122</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15126/">CVE-2018-15126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15126">CVE-2018-15126 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15127/">CVE-2018-15127 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15127">CVE-2018-15127 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20019/">CVE-2018-20019 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20019">CVE-2018-20019 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20020/">CVE-2018-20020 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20020">CVE-2018-20020 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20021/">CVE-2018-20021 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20021">CVE-2018-20021 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20022/">CVE-2018-20022 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20022">CVE-2018-20022 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20023/">CVE-2018-20023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20023">CVE-2018-20023 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20024/">CVE-2018-20024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20024">CVE-2018-20024 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6307/">CVE-2018-6307 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6307">CVE-2018-6307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530863" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530864" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152120" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm to version 7.1.4.40 fixes the following issues:

Security issues fixed: 

- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).	  

More information: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_February_2019
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-13"/>
	<updated date="2019-03-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2422">CVE-2019-2422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530865" comment="java-1_7_1-ibm-1.7.1_sr4.40-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530866" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530868" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530869" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152121" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122292" ref_url="https://bugzilla.suse.com/1122292" source="BUGZILLA"/>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1128158" ref_url="https://bugzilla.suse.com/1128158" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-1890" ref_url="https://www.suse.com/security/cve/CVE-2018-1890/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2449" ref_url="https://www.suse.com/security/cve/CVE-2019-2449/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm to version 8.0.5.30 fixes the following issues:

Security issues fixed:

- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).
- CVE-2018-1890: Fixed a local privilege escalation via RPATHs (bsc#1128158).
- CVE-2019-2449: Fixed a vulnerabilit which could allow remote atackers to delete arbitrary files (bsc#1122292). 

More information: https://www-01.ibm.com/support/docview.wss?uid=ibm10873332	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-15"/>
	<updated date="2019-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122292">SUSE bug 1122292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128158">SUSE bug 1128158</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1890/">CVE-2018-1890 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1890">CVE-2018-1890 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2422">CVE-2019-2422 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2449/">CVE-2019-2449 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2449">CVE-2019-2449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530870" comment="java-1_8_0-ibm-1.8.0_sr5.30-30.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530871" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530873" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152122" version="1" class="patch">
	<metadata>
		<title>Security update for lftp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1103367" ref_url="https://bugzilla.suse.com/1103367" source="BUGZILLA"/>
		<reference ref_id="1120946" ref_url="https://bugzilla.suse.com/1120946" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10916" ref_url="https://www.suse.com/security/cve/CVE-2018-10916/" source="CVE"/>
		<description>
This update for lftp fixes the following issues:

Security issue fixed: 

- CVE-2018-10916: Fixed an improper file name sanitization which could lead to loss of integrity of 
  the local system (bsc#1103367).
  
Other issue addressed:

- The SSH login handling code detects password prompts more reliably (bsc#1120946).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-19"/>
	<updated date="2019-03-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103367">SUSE bug 1103367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120946">SUSE bug 1120946</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10916/">CVE-2018-10916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10916">CVE-2018-10916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521684" comment="lftp-4.7.4-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152123" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1091236" ref_url="https://bugzilla.suse.com/1091236" source="BUGZILLA"/>
		<reference ref_id="1128471" ref_url="https://bugzilla.suse.com/1128471" source="BUGZILLA"/>
		<reference ref_id="1128472" ref_url="https://bugzilla.suse.com/1128472" source="BUGZILLA"/>
		<reference ref_id="1128474" ref_url="https://bugzilla.suse.com/1128474" source="BUGZILLA"/>
		<reference ref_id="1128476" ref_url="https://bugzilla.suse.com/1128476" source="BUGZILLA"/>
		<reference ref_id="1128480" ref_url="https://bugzilla.suse.com/1128480" source="BUGZILLA"/>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1128490" ref_url="https://bugzilla.suse.com/1128490" source="BUGZILLA"/>
		<reference ref_id="1128492" ref_url="https://bugzilla.suse.com/1128492" source="BUGZILLA"/>
		<reference ref_id="1128493" ref_url="https://bugzilla.suse.com/1128493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issues:

Security issues fixed: 	  

- CVE-2019-3861: Fixed Out-of-bounds reads with specially crafted SSH packets (bsc#1128490).
- CVE-2019-3862: Fixed Out-of-bounds memory comparison with specially crafted message channel request packet (bsc#1128492).
- CVE-2019-3860: Fixed Out-of-bounds reads with specially crafted SFTP packets (bsc#1128481).
- CVE-2019-3863: Fixed an Integer overflow in user authenticate keyboard interactive which could allow out-of-bounds writes 
  with specially crafted keyboard responses (bsc#1128493).
- CVE-2019-3856: Fixed a potential Integer overflow in keyboard interactive handling which could allow out-of-bounds write 
  with specially crafted payload (bsc#1128472).
- CVE-2019-3859: Fixed Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require 
  and _libssh2_packet_requirev (bsc#1128480).
- CVE-2019-3855: Fixed a potential Integer overflow in transport read which could allow out-of-bounds write with specially 
  crafted payload (bsc#1128471).
- CVE-2019-3858: Fixed a potential zero-byte allocation which could lead to an out-of-bounds read with a specially crafted 
  SFTP packet (bsc#1128476).
- CVE-2019-3857: Fixed a potential Integer overflow which could lead to zero-byte allocation and out-of-bounds with specially 
  crafted message channel request SSH packet (bsc#1128474).

Other issue addressed: 

- Libbssh2 will stop using keys unsupported types in the known_hosts file (bsc#1091236).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-20"/>
	<updated date="2019-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091236">SUSE bug 1091236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128480">SUSE bug 1128480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3855">CVE-2019-3855 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3856">CVE-2019-3856 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3857">CVE-2019-3857 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3858">CVE-2019-3858 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3859">CVE-2019-3859 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3860">CVE-2019-3860 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3861">CVE-2019-3861 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3862">CVE-2019-3862 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3863">CVE-2019-3863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521685" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521686" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152124" version="1" class="patch">
	<metadata>
		<title>Security update for openwsman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122623" ref_url="https://bugzilla.suse.com/1122623" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3816" ref_url="https://www.suse.com/security/cve/CVE-2019-3816/" source="CVE"/>
		<reference ref_id="CVE-2019-3833" ref_url="https://www.suse.com/security/cve/CVE-2019-3833/" source="CVE"/>
		<description>
This update for openwsman fixes the following issues:

Security issues fixed:

- CVE-2019-3816: Fixed a vulnerability in openwsmand deamon which could lead to arbitary file disclosure (bsc#1122623).
- CVE-2019-3833: Fixed a vulnerability in process_connection() which could allow an attacker to trigger an infinite
  loop which leads to Denial of Service (bsc#1122623).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-20"/>
	<updated date="2019-03-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122623">SUSE bug 1122623</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3816/">CVE-2019-3816 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3816">CVE-2019-3816 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3833/">CVE-2019-3833 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3833">CVE-2019-3833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521687" comment="libwsman1-2.4.11-21.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521688" comment="libwsman_clientpp1-2.4.11-21.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521689" comment="openwsman-server-2.4.11-21.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152125" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1127367" ref_url="https://bugzilla.suse.com/1127367" source="BUGZILLA"/>
		<reference ref_id="1127369" ref_url="https://bugzilla.suse.com/1127369" source="BUGZILLA"/>
		<reference ref_id="1127370" ref_url="https://bugzilla.suse.com/1127370" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9208" ref_url="https://www.suse.com/security/cve/CVE-2019-9208/" source="CVE"/>
		<reference ref_id="CVE-2019-9209" ref_url="https://www.suse.com/security/cve/CVE-2019-9209/" source="CVE"/>
		<reference ref_id="CVE-2019-9214" ref_url="https://www.suse.com/security/cve/CVE-2019-9214/" source="CVE"/>
		<description>
This update for wireshark to version 2.4.13 fixes the following issues:

Security issues fixed:

- CVE-2019-9214: Avoided a dereference of a null coversation which could make RPCAP 
  dissector crash (bsc#1127367).
- CVE-2019-9209: Fixed a buffer overflow in time values which could make ASN.1 BER 
  and related dissectors crash (bsc#1127369).
- CVE-2019-9208: Fixed a null pointer dereference which could make TCAP dissector 
  crash (bsc#1127370).

Release notes: https://www.wireshark.org/docs/relnotes/wireshark-2.4.13.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127367">SUSE bug 1127367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127369">SUSE bug 1127369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127370">SUSE bug 1127370</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9208/">CVE-2019-9208 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9208">CVE-2019-9208 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9209/">CVE-2019-9209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9209">CVE-2019-9209 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9214/">CVE-2019-9214 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9214">CVE-2019-9214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521690" comment="libwireshark9-2.4.13-48.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521691" comment="libwiretap7-2.4.13-48.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521692" comment="libwscodecs1-2.4.13-48.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521693" comment="libwsutil8-2.4.13-48.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521694" comment="wireshark-2.4.13-48.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521695" comment="wireshark-gtk-2.4.13-48.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152126" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1129186" ref_url="https://bugzilla.suse.com/1129186" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issue:
	  
Security issue fixed:

- CVE-2019-3838: Fixed a vulnerability which made forceput operator in DefineResource to be still accessible
  which could allow access to file system outside of the constraints of -dSAFER (bsc#1129186).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-22"/>
	<updated date="2019-03-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3838">CVE-2019-3838 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521696" comment="ghostscript-9.26a-23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521697" comment="ghostscript-x11-9.26a-23.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152127" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1129231" ref_url="https://bugzilla.suse.com/1129231" source="BUGZILLA"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to the 20190312 bundle release (bsc#1129231)

New Platforms:

- AML-Y22      H0       6-8e-9/10           0000009e Core Gen8 Mobile
- WHL-U        W0       6-8e-b/d0           000000a4 Core Gen8 Mobile
- WHL-U        V0       6-8e-d/94           000000b2 Core Gen8 Mobile
- CFL-S        P0       6-9e-c/22           000000a2 Core Gen9 Desktop
- CFL-H        R0       6-9e-d/22           000000b0 Core Gen9 Mobile

Updated Platforms:

- HSX-E/EP     Cx/M1    6-3f-2/6f 0000003d-&gt;00000041 Core Gen4 X series; Xeon E5 v3
- HSX-EX       E0       6-3f-4/80 00000012-&gt;00000013 Xeon E7 v3
- SKX-SP       H0/M0/U0 6-55-4/b7 0200004d-&gt;0000005a Xeon Scalable
- SKX-D        M1       6-55-4/b7 0200004d-&gt;0000005a Xeon D-21xx
- BDX-DE       V1       6-56-2/10 00000017-&gt;00000019 Xeon D-1520/40
- BDX-DE       V2/3     6-56-3/10 07000013-&gt;07000016 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
- BDX-DE       Y0       6-56-4/10 0f000012-&gt;0f000014 Xeon D-1557/59/67/71/77/81/87
- BDX-NS       A0       6-56-5/10 0e00000a-&gt;0e00000c Xeon D-1513N/23/33/43/53
- APL          D0       6-5c-9/03 00000032-&gt;00000036 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
- APL          E0       6-5c-a/03 0000000c-&gt;00000010 Atom x5/7-E39xx
- GLK          B0       6-7a-1/01 00000028-&gt;0000002c Pentium Silver N/J5xxx, Celeron N/J4xxx
- KBL-U/Y      H0       6-8e-9/c0 0000008e-&gt;0000009a Core Gen7 Mobile
- CFL-U43e     D0       6-8e-a/c0 00000096-&gt;0000009e Core Gen8 Mobile
- KBL-H/S/E3   B0       6-9e-9/2a 0000008e-&gt;0000009a Core Gen7; Xeon E3 v6
- CFL-H/S/E3   U0       6-9e-a/22 00000096-&gt;000000aa Core Gen8 Desktop, Mobile, Xeon E
- CFL-S B0 6-9e-b/02 0000008e-&gt;000000aa Core Gen8

		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-25"/>
	<updated date="2019-03-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1129231">SUSE bug 1129231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521698" comment="ucode-intel-20190312-13.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152128" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1128503" ref_url="https://bugzilla.suse.com/1128503" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12181" ref_url="https://www.suse.com/security/cve/CVE-2018-12181/" source="CVE"/>
		<description>
This update for ovmf fixes the following issue:

Security issue fixed: 

- CVE-2018-12181: Fixed a stack buffer overflow in the HII database when a corrupted Bitmap was used (bsc#1128503).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-26"/>
	<updated date="2019-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128503">SUSE bug 1128503</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12181/">CVE-2018-12181 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12181">CVE-2018-12181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557435" comment="ovmf-2017+git1492060560.b6d11d7c46-4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557436" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554569" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152129" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1123361" ref_url="https://bugzilla.suse.com/1123361" source="BUGZILLA"/>
		<reference ref_id="1123522" ref_url="https://bugzilla.suse.com/1123522" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6977" ref_url="https://www.suse.com/security/cve/CVE-2019-6977/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<description>
This update for gd fixes the following issues:

Security issues fixed:

- CVE-2019-6977: Fixed a heap-based buffer overflow the GD Graphics Library used in the imagecolormatch function (bsc#1123361).
- CVE-2019-6978: Fixed a double free in the gdImage*Ptr() functions (bsc#1123522).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-26"/>
	<updated date="2019-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123361">SUSE bug 1123361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123522">SUSE bug 1123522</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6977/">CVE-2019-6977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6977">CVE-2019-6977 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6978">CVE-2019-6978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521699" comment="gd-2.1.0-24.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152130" version="1" class="patch">
	<metadata>
		<title>Security update for w3m (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1077559" ref_url="https://bugzilla.suse.com/1077559" source="BUGZILLA"/>
		<reference ref_id="1077568" ref_url="https://bugzilla.suse.com/1077568" source="BUGZILLA"/>
		<reference ref_id="1077572" ref_url="https://bugzilla.suse.com/1077572" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6196" ref_url="https://www.suse.com/security/cve/CVE-2018-6196/" source="CVE"/>
		<reference ref_id="CVE-2018-6197" ref_url="https://www.suse.com/security/cve/CVE-2018-6197/" source="CVE"/>
		<reference ref_id="CVE-2018-6198" ref_url="https://www.suse.com/security/cve/CVE-2018-6198/" source="CVE"/>
		<description>
This update for w3m fixes several issues.

These security issues were fixed:

- CVE-2018-6196: Prevent infinite recursion in HTMLlineproc0 caused by the feed_table_block_tag function which did not prevent a negative indent value (bsc#1077559)
- CVE-2018-6197: Prevent NULL pointer dereference in formUpdateBuffer (bsc#1077568)
- CVE-2018-6198: w3m did not properly handle temporary files when the ~/.w3m directory is unwritable, which allowed a local attacker to craft a symlink attack to overwrite arbitrary files (bsc#1077572)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077559">SUSE bug 1077559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077568">SUSE bug 1077568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077572">SUSE bug 1077572</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6196/">CVE-2018-6196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6196">CVE-2018-6196 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6197/">CVE-2018-6197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6197">CVE-2018-6197 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6198/">CVE-2018-6198 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6198">CVE-2018-6198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521701" comment="w3m-0.5.3.git20161120-161.3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152131" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1125401" ref_url="https://bugzilla.suse.com/1125401" source="BUGZILLA"/>
		<reference ref_id="1128525" ref_url="https://bugzilla.suse.com/1128525" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8936" ref_url="https://www.suse.com/security/cve/CVE-2019-8936/" source="CVE"/>
		<description>
This update for ntp fixes the following issues:

Security issue fixed: 	  

- CVE-2019-8936: Fixed a null pointer exception which could allow an authenticated attcker to cause 
  segmentation fault to ntpd (bsc#1128525).

Other isses addressed:

- Fixed an issue which caused openSSL mismatch (bsc#1125401)
- Fixed several bugs in the BANCOMM reclock driver.
- Fixed ntp_loopfilter.c snprintf compilation warnings.
- Fixed spurious initgroups() error message.
- Fixed STA_NANO struct timex units.
- Fixed GPS week rollover in libparse.
- Fixed incorrect poll interval in packet.
- Added a missing check for ENABLE_CMAC.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-28"/>
	<updated date="2019-03-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1125401">SUSE bug 1125401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128525">SUSE bug 1128525</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8936/">CVE-2019-8936 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8936">CVE-2019-8936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521702" comment="ntp-4.2.8p13-85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521703" comment="ntp-doc-4.2.8p13-85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152132" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1100078" ref_url="https://bugzilla.suse.com/1100078" source="BUGZILLA"/>
		<reference ref_id="1113975" ref_url="https://bugzilla.suse.com/1113975" source="BUGZILLA"/>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed: 

- The 9 Lives of Bleichenbacher's CAT: Cache Attacks on TLS Implementations (bsc#1117951)
- CVE-2019-1559: Fixed OpenSSL 0-byte Record Padding Oracle which under certain circumstances
  a TLS server can be forced to respond differently to a client and lead to the decryption of the data (bsc#1127080).

Other issues addressed: 

- Fixed IV handling in SHAEXT paths: aes/asm/aesni-sha*-x86_64.pl (bsc#1113975).
- Set TLS version to 0 in msg_callback for record messages to avoid confusing applications (bsc#1100078).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100078">SUSE bug 1100078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113975">SUSE bug 1113975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1559">CVE-2019-1559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521711" comment="libopenssl-devel-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521712" comment="libopenssl1_0_0-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521713" comment="libopenssl1_0_0-32bit-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530874" comment="libopenssl1_0_0-hmac-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530875" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521714" comment="openssl-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530876" comment="openssl-doc-1.0.2j-60.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152133" version="1" class="patch">
	<metadata>
		<title>Recommended update for adcli, sssd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1109849" ref_url="https://bugzilla.suse.com/1109849" source="BUGZILLA"/>
		<reference ref_id="1110121" ref_url="https://bugzilla.suse.com/1110121" source="BUGZILLA"/>
		<reference ref_id="1121759" ref_url="https://bugzilla.suse.com/1121759" source="BUGZILLA"/>
		<reference ref_id="1125617" ref_url="https://bugzilla.suse.com/1125617" source="BUGZILLA"/>
		<reference ref_id="1127670" ref_url="https://bugzilla.suse.com/1127670" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3811" ref_url="https://www.suse.com/security/cve/CVE-2019-3811/" source="CVE"/>
		<description>

This update for adcli and sssd provides the following improvement:

Security vulnerability fixed:

- CVE-2019-3811: Fix fallback_homedir returning '/' for empty home directories
  (bsc#1121759)

Other fixes:

- Add an option to disable checking for trusted domains in the subdomains provider (bsc#1125617)
- Clear pid file in corner cases (bsc#1127670)
- Fix child unable to write to log file after SIGHUP (bsc#1127670)
- Include adcli in SUSE Linux Enterprise 12 SP3 for sssd-ad. (fate#326619, bsc#1109849)

The adcli enables sssd to do password renewal when using Active Directory.
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109849">SUSE bug 1109849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110121">SUSE bug 1110121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121759">SUSE bug 1121759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125617">SUSE bug 1125617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127670">SUSE bug 1127670</bugzilla>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3811/">CVE-2019-3811 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3811">CVE-2019-3811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521715" comment="adcli-0.8.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521716" comment="libipa_hbac0-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521717" comment="libsss_idmap0-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521718" comment="libsss_nss_idmap0-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521719" comment="libsss_sudo-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521720" comment="python-sssd-config-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521721" comment="sssd-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521722" comment="sssd-32bit-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521723" comment="sssd-ad-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521724" comment="sssd-ipa-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521725" comment="sssd-krb5-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521726" comment="sssd-krb5-common-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521727" comment="sssd-ldap-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521728" comment="sssd-proxy-1.13.4-34.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521729" comment="sssd-tools-1.13.4-34.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152134" version="1" class="patch">
	<metadata>
		<title>Security update for sssd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010700" ref_url="https://bugzilla.suse.com/1010700" source="BUGZILLA"/>
		<reference ref_id="1072728" ref_url="https://bugzilla.suse.com/1072728" source="BUGZILLA"/>
		<reference ref_id="1080156" ref_url="https://bugzilla.suse.com/1080156" source="BUGZILLA"/>
		<reference ref_id="1087320" ref_url="https://bugzilla.suse.com/1087320" source="BUGZILLA"/>
		<reference ref_id="1098377" ref_url="https://bugzilla.suse.com/1098377" source="BUGZILLA"/>
		<reference ref_id="1101877" ref_url="https://bugzilla.suse.com/1101877" source="BUGZILLA"/>
		<reference ref_id="1110299" ref_url="https://bugzilla.suse.com/1110299" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10852" ref_url="https://www.suse.com/security/cve/CVE-2018-10852/" source="CVE"/>
		<description>
This update for sssd provides the following fixes:

This security issue was fixed:

- CVE-2018-10852: Set stricter permissions on /var/lib/sss/pipes/sudo to prevent the disclosure of sudo rules for arbitrary users (bsc#1098377)

These non-security issues were fixed:

- Fix a segmentation fault in sss_cache command. (bsc#1072728)
- Fix a failure in autofs initialisation sequence upon system boot. (bsc#1010700)
- Fix race condition on boot between SSSD and autofs. (bsc#1010700)
- Fix a bug where file descriptors were not closed (bsc#1080156)
- Fix an issue where sssd logs were not rotated properly (bsc#1080156)
- Remove whitespaces from netgroup entries (bsc#1087320)
- Remove misleading log messages (bsc#1101877)
- exit() the forked process if exec()-ing a child process fails (bsc#1110299)
- Do not schedule the machine renewal task if adcli is not executable (bsc#1110299)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-11"/>
	<updated date="2019-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010700">SUSE bug 1010700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072728">SUSE bug 1072728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080156">SUSE bug 1080156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087320">SUSE bug 1087320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098377">SUSE bug 1098377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101877">SUSE bug 1101877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110299">SUSE bug 1110299</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10852/">CVE-2018-10852 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10852">CVE-2018-10852 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521730" comment="libipa_hbac0-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521731" comment="libsss_idmap0-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521732" comment="libsss_nss_idmap0-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521733" comment="libsss_sudo-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521734" comment="python-sssd-config-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521735" comment="sssd-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521736" comment="sssd-32bit-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521737" comment="sssd-ad-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521738" comment="sssd-ipa-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521739" comment="sssd-krb5-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521740" comment="sssd-krb5-common-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521741" comment="sssd-ldap-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521742" comment="sssd-proxy-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521743" comment="sssd-tools-1.13.4-34.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152135" version="1" class="patch">
	<metadata>
		<title>Optional update for php72 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1126314" ref_url="https://bugzilla.suse.com/1126314" source="BUGZILLA"/>
		<reference ref_id="1129032" ref_url="https://bugzilla.suse.com/1129032" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20783" ref_url="https://www.suse.com/security/cve/CVE-2018-20783/" source="CVE"/>
		<reference ref_id="CVE-2019-9020" ref_url="https://www.suse.com/security/cve/CVE-2019-9020/" source="CVE"/>
		<reference ref_id="CVE-2019-9021" ref_url="https://www.suse.com/security/cve/CVE-2019-9021/" source="CVE"/>
		<reference ref_id="CVE-2019-9022" ref_url="https://www.suse.com/security/cve/CVE-2019-9022/" source="CVE"/>
		<reference ref_id="CVE-2019-9023" ref_url="https://www.suse.com/security/cve/CVE-2019-9023/" source="CVE"/>
		<reference ref_id="CVE-2019-9024" ref_url="https://www.suse.com/security/cve/CVE-2019-9024/" source="CVE"/>
		<reference ref_id="CVE-2019-9641" ref_url="https://www.suse.com/security/cve/CVE-2019-9641/" source="CVE"/>
		<description>

This update provides PHP 7.2 and subpackages to the SUSE Linux Enterprise 12 Web and Scripting Module.

It is a replacement of the php7 packages, the packages do not co-exist.

The mcrypt extensions was removed in PHP 7.2.
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126314">SUSE bug 1126314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129032">SUSE bug 1129032</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20783/">CVE-2018-20783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20783">CVE-2018-20783 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9020/">CVE-2019-9020 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9020">CVE-2019-9020 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9021/">CVE-2019-9021 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9021">CVE-2019-9021 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9022/">CVE-2019-9022 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9022">CVE-2019-9022 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9023/">CVE-2019-9023 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9023">CVE-2019-9023 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9024/">CVE-2019-9024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9024">CVE-2019-9024 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9641/">CVE-2019-9641 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9641">CVE-2019-9641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562490" comment="libmemcached-1.0.18-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562491" comment="libmemcached11-1.0.18-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562492" comment="libmemcachedutil2-1.0.18-3.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152136" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1130324" ref_url="https://bugzilla.suse.com/1130324" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9924" ref_url="https://www.suse.com/security/cve/CVE-2019-9924/" source="CVE"/>
		<description>
This update for bash fixes the following issues:
	  
Security issue fixed: 

- CVE-2019-9924: Fixed a vulnerability in which shell did not prevent user BASH_CMDS 
  allowing the user to execute any command with the permissions of the shell (bsc#1130324).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-02"/>
	<updated date="2019-04-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130324">SUSE bug 1130324</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9924/">CVE-2019-9924 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9924">CVE-2019-9924 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521744" comment="bash-4.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521745" comment="bash-doc-4.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521747" comment="libreadline6-6.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521748" comment="libreadline6-32bit-6.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521749" comment="readline-doc-6.3-83.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152137" version="1" class="patch">
	<metadata>
		<title>Security update for file (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1096974" ref_url="https://bugzilla.suse.com/1096974" source="BUGZILLA"/>
		<reference ref_id="1096984" ref_url="https://bugzilla.suse.com/1096984" source="BUGZILLA"/>
		<reference ref_id="1126117" ref_url="https://bugzilla.suse.com/1126117" source="BUGZILLA"/>
		<reference ref_id="1126118" ref_url="https://bugzilla.suse.com/1126118" source="BUGZILLA"/>
		<reference ref_id="1126119" ref_url="https://bugzilla.suse.com/1126119" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10360" ref_url="https://www.suse.com/security/cve/CVE-2018-10360/" source="CVE"/>
		<reference ref_id="CVE-2019-8905" ref_url="https://www.suse.com/security/cve/CVE-2019-8905/" source="CVE"/>
		<reference ref_id="CVE-2019-8906" ref_url="https://www.suse.com/security/cve/CVE-2019-8906/" source="CVE"/>
		<reference ref_id="CVE-2019-8907" ref_url="https://www.suse.com/security/cve/CVE-2019-8907/" source="CVE"/>
		<description>
This update for file fixes the following issues:

The following security vulnerabilities were addressed:

- Fixed an out-of-bounds read in the function do_core_note in readelf.c, which
  allowed remote attackers to cause a denial of service (application crash) via
  a crafted ELF file (bsc#1096974 CVE-2018-10360).
- CVE-2019-8905: Fixed a stack-based buffer over-read in do_core_note in readelf.c
  (bsc#1126118)
- CVE-2019-8906: Fixed an out-of-bounds read in do_core_note in readelf. c
  (bsc#1126119)
- CVE-2019-8907: Fixed a stack corruption in do_core_note in readelf.c
  (bsc#1126117)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-02"/>
	<updated date="2019-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096974">SUSE bug 1096974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096984">SUSE bug 1096984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126117">SUSE bug 1126117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126118">SUSE bug 1126118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126119">SUSE bug 1126119</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10360/">CVE-2018-10360 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10360">CVE-2018-10360 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8905/">CVE-2019-8905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8905">CVE-2019-8905 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8906/">CVE-2019-8906 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8906">CVE-2019-8906 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8907/">CVE-2019-8907 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8907">CVE-2019-8907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521750" comment="file-5.22-10.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521751" comment="file-magic-5.22-10.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521752" comment="libmagic1-5.22-10.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521753" comment="libmagic1-32bit-5.22-10.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152138" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1125330" ref_url="https://bugzilla.suse.com/1125330" source="BUGZILLA"/>
		<reference ref_id="1127987" ref_url="https://bugzilla.suse.com/1127987" source="BUGZILLA"/>
		<reference ref_id="1129821" ref_url="https://bugzilla.suse.com/1129821" source="BUGZILLA"/>
		<reference ref_id="1130262" ref_url="https://bugzilla.suse.com/1130262" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18335" ref_url="https://www.suse.com/security/cve/CVE-2018-18335/" source="CVE"/>
		<reference ref_id="CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356/" source="CVE"/>
		<reference ref_id="CVE-2018-18506" ref_url="https://www.suse.com/security/cve/CVE-2018-18506/" source="CVE"/>
		<reference ref_id="CVE-2019-5785" ref_url="https://www.suse.com/security/cve/CVE-2019-5785/" source="CVE"/>
		<reference ref_id="CVE-2019-9788" ref_url="https://www.suse.com/security/cve/CVE-2019-9788/" source="CVE"/>
		<reference ref_id="CVE-2019-9790" ref_url="https://www.suse.com/security/cve/CVE-2019-9790/" source="CVE"/>
		<reference ref_id="CVE-2019-9791" ref_url="https://www.suse.com/security/cve/CVE-2019-9791/" source="CVE"/>
		<reference ref_id="CVE-2019-9792" ref_url="https://www.suse.com/security/cve/CVE-2019-9792/" source="CVE"/>
		<reference ref_id="CVE-2019-9793" ref_url="https://www.suse.com/security/cve/CVE-2019-9793/" source="CVE"/>
		<reference ref_id="CVE-2019-9794" ref_url="https://www.suse.com/security/cve/CVE-2019-9794/" source="CVE"/>
		<reference ref_id="CVE-2019-9795" ref_url="https://www.suse.com/security/cve/CVE-2019-9795/" source="CVE"/>
		<reference ref_id="CVE-2019-9796" ref_url="https://www.suse.com/security/cve/CVE-2019-9796/" source="CVE"/>
		<reference ref_id="CVE-2019-9801" ref_url="https://www.suse.com/security/cve/CVE-2019-9801/" source="CVE"/>
		<reference ref_id="CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810/" source="CVE"/>
		<reference ref_id="CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issuess addressed:	  

- update to Firefox ESR 60.6.1 (bsc#1130262):

- CVE-2019-9813: Fixed Ionmonkey type confusion with __proto__ mutations
- CVE-2019-9810: Fixed IonMonkey MArraySlice incorrect alias information

- Update to Firefox ESR 60.6 (bsc#1129821):

- CVE-2018-18506: Fixed an issue with Proxy Auto-Configuration file 
- CVE-2019-9801: Fixed an issue which could allow Windows programs to be exposed to web content
- CVE-2019-9788: Fixed multiple memory safety bugs
- CVE-2019-9790: Fixed a Use-after-free vulnerability when removing in-use DOM elements
- CVE-2019-9791: Fixed an incorrect Type inference for constructors entered through on-stack replacement 
  with IonMonkey
- CVE-2019-9792: Fixed an issue where IonMonkey leaks JS_OPTIMIZED_OUT magic value to script
- CVE-2019-9793: Fixed multiple improper bounds checks when Spectre mitigations are disabled
- CVE-2019-9794: Fixed an issue where command line arguments not discarded during execution
- CVE-2019-9795: Fixed a Type-confusion vulnerability in IonMonkey JIT compiler
- CVE-2019-9796: Fixed a Use-after-free vulnerability in SMIL animation controller


- Update to Firefox ESR 60.5.1 (bsc#1125330):

- CVE-2018-18356: Fixed a use-after-free vulnerability in the Skia library which can occur when
    creating a path, leading to a potentially exploitable crash.
- CVE-2019-5785: Fixed an integer overflow vulnerability in the Skia library which can occur
  after specific transform operations, leading to a potentially exploitable crash.
- CVE-2018-18335: Fixed a buffer overflow vulnerability in the Skia library which can occur with
  Canvas 2D acceleration on macOS. This issue was addressed by disabling Canvas 2D acceleration 
  in Firefox ESR.  Note: this does not affect other versions and platforms where Canvas 2D
  acceleration is already disabled by default.

Other issue addressed: 

- Fixed an issue with MozillaFirefox-translations-common which was causing error on update (bsc#1127987).

Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-12/
Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-08/
Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-03"/>
	<updated date="2019-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1125330">SUSE bug 1125330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127987">SUSE bug 1127987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130262">SUSE bug 1130262</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18335/">CVE-2018-18335 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18335">CVE-2018-18335 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18356">CVE-2018-18356 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18506/">CVE-2018-18506 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18506">CVE-2018-18506 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5785/">CVE-2019-5785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5785">CVE-2019-5785 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9788/">CVE-2019-9788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9788">CVE-2019-9788 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9790/">CVE-2019-9790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9790">CVE-2019-9790 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9791/">CVE-2019-9791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9791">CVE-2019-9791 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9792/">CVE-2019-9792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9792">CVE-2019-9792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9793/">CVE-2019-9793 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9793">CVE-2019-9793 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9794/">CVE-2019-9794 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9794">CVE-2019-9794 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9795/">CVE-2019-9795 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9795">CVE-2019-9795 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9796/">CVE-2019-9796 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9796">CVE-2019-9796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9801/">CVE-2019-9801 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9801">CVE-2019-9801 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9810">CVE-2019-9810 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9813">CVE-2019-9813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152139" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1131233" ref_url="https://bugzilla.suse.com/1131233" source="BUGZILLA"/>
		<reference ref_id="1131237" ref_url="https://bugzilla.suse.com/1131237" source="BUGZILLA"/>
		<reference ref_id="1131239" ref_url="https://bugzilla.suse.com/1131239" source="BUGZILLA"/>
		<reference ref_id="1131241" ref_url="https://bugzilla.suse.com/1131241" source="BUGZILLA"/>
		<reference ref_id="1131245" ref_url="https://bugzilla.suse.com/1131245" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0196" ref_url="https://www.suse.com/security/cve/CVE-2019-0196/" source="CVE"/>
		<reference ref_id="CVE-2019-0197" ref_url="https://www.suse.com/security/cve/CVE-2019-0197/" source="CVE"/>
		<reference ref_id="CVE-2019-0211" ref_url="https://www.suse.com/security/cve/CVE-2019-0211/" source="CVE"/>
		<reference ref_id="CVE-2019-0217" ref_url="https://www.suse.com/security/cve/CVE-2019-0217/" source="CVE"/>
		<reference ref_id="CVE-2019-0220" ref_url="https://www.suse.com/security/cve/CVE-2019-0220/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

* CVE-2019-0220: The Apache HTTP server did not use a consistent strategy for
  URL normalization throughout all of its components. In particular,
  consecutive slashes were not always collapsed. Attackers could potentially
  abuse these inconsistencies to by-pass access control mechanisms and thus
  gain unauthorized access to protected parts of the service. [bsc#1131241]

* CVE-2019-0217: A race condition in Apache's 'mod_auth_digest' when running in
  a threaded server could have allowed users with valid credentials to
  authenticate using another username, bypassing configured access control
  restrictions. [bsc#1131239]

* CVE-2019-0211: A flaw in the Apache HTTP Server allowed less-privileged child
  processes or threads to execute arbitrary code with the privileges of the
  parent process. Attackers with control over CGI scripts or extension modules
  run by the server could have abused this issue to potentially gain super user
  privileges. [bsc#1131233]

* CVE-2019-0197: When HTTP/2 support was enabled in the Apache server for a
  'http' host or H2Upgrade was enabled for h2 on a 'https' host, an Upgrade
  request from http/1.1 to http/2 that was not the first request on a
  connection could lead to a misconfiguration and crash. This issue could have
  been abused to mount a denial-of-service attack. Servers that never enabled
  the h2 protocol or that only enabled it for https: and did not configure the
  'H2Upgrade on' are unaffected. [bsc#1131245]

* CVE-2019-0196: Through specially crafted network input the Apache's http/2
  request handler could be lead to access previously freed memory while
  determining the method of a request. This resulted in the request being
  misclassified and thus being processed incorrectly. [bsc#1131237]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-04"/>
	<updated date="2019-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131233">SUSE bug 1131233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131237">SUSE bug 1131237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131239">SUSE bug 1131239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131241">SUSE bug 1131241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131245">SUSE bug 1131245</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0196/">CVE-2019-0196 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0196">CVE-2019-0196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-0197/">CVE-2019-0197 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0197">CVE-2019-0197 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0211/">CVE-2019-0211 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0211">CVE-2019-0211 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-0217/">CVE-2019-0217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0217">CVE-2019-0217 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0220/">CVE-2019-0220 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0220">CVE-2019-0220 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530886" comment="apache2-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530887" comment="apache2-doc-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530888" comment="apache2-example-pages-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530889" comment="apache2-prefork-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530890" comment="apache2-utils-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530891" comment="apache2-worker-2.4.23-29.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152140" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1130721" ref_url="https://bugzilla.suse.com/1130721" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787/" source="CVE"/>
		<reference ref_id="CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788/" source="CVE"/>
		<reference ref_id="CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789/" source="CVE"/>
		<description>
This update for clamav to version 0.100.3 fixes the following issues:

Security issues fixed (bsc#1130721): 	  

- CVE-2019-1787: Fixed an out-of-bounds heap read condition which may occur
  when scanning PDF documents.   
- CVE-2019-1789: Fixed an out-of-bounds heap read condition which may occur
  when scanning PE files (i.e. Windows EXE and DLL files).
- CVE-2019-1788: Fixed an out-of-bounds heap write condition which may occur
  when scanning OLE2 files such as Microsoft Office 97-2003 documents. 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-08"/>
	<updated date="2019-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1787">CVE-2019-1787 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1788">CVE-2019-1788 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1789">CVE-2019-1789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521756" comment="clamav-0.100.3-33.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152141" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1124799" ref_url="https://bugzilla.suse.com/1124799" source="BUGZILLA"/>
		<reference ref_id="1124800" ref_url="https://bugzilla.suse.com/1124800" source="BUGZILLA"/>
		<reference ref_id="1124802" ref_url="https://bugzilla.suse.com/1124802" source="BUGZILLA"/>
		<reference ref_id="1124803" ref_url="https://bugzilla.suse.com/1124803" source="BUGZILLA"/>
		<reference ref_id="1124805" ref_url="https://bugzilla.suse.com/1124805" source="BUGZILLA"/>
		<reference ref_id="1124806" ref_url="https://bugzilla.suse.com/1124806" source="BUGZILLA"/>
		<reference ref_id="1124824" ref_url="https://bugzilla.suse.com/1124824" source="BUGZILLA"/>
		<reference ref_id="1124825" ref_url="https://bugzilla.suse.com/1124825" source="BUGZILLA"/>
		<reference ref_id="1124826" ref_url="https://bugzilla.suse.com/1124826" source="BUGZILLA"/>
		<reference ref_id="1124827" ref_url="https://bugzilla.suse.com/1124827" source="BUGZILLA"/>
		<reference ref_id="1125099" ref_url="https://bugzilla.suse.com/1125099" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7576" ref_url="https://www.suse.com/security/cve/CVE-2019-7576/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<description>
This update for SDL fixes the following issues:
	  
Security issues fixed:	  

- CVE-2019-7572: Fixed a buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c.(bsc#1124806).
- CVE-2019-7578: Fixed a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c (bsc#1125099).
- CVE-2019-7576: Fixed heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124799).
- CVE-2019-7573: Fixed a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124805).
- CVE-2019-7635: Fixed a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c. (bsc#1124827).
- CVE-2019-7636: Fixed a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c (bsc#1124826).
- CVE-2019-7638: Fixed a heap-based buffer over-read in Map1toN in video/SDL_pixels.c (bsc#1124824).
- CVE-2019-7574: Fixed a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c (bsc#1124803).
- CVE-2019-7575: Fixed a heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c (bsc#1124802).
- CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect function in SDL_surface.c (bsc#1124825).
- CVE-2019-7577: Fixed a buffer over read in SDL_LoadWAV_RW in audio/SDL_wave.c (bsc#1124800). 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-08"/>
	<updated date="2019-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124799">SUSE bug 1124799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124800">SUSE bug 1124800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124802">SUSE bug 1124802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124803">SUSE bug 1124803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124805">SUSE bug 1124805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124806">SUSE bug 1124806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124824">SUSE bug 1124824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124826">SUSE bug 1124826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124827">SUSE bug 1124827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125099">SUSE bug 1125099</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7572">CVE-2019-7572 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7573">CVE-2019-7573 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7574">CVE-2019-7574 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7575">CVE-2019-7575 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7576/">CVE-2019-7576 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7576">CVE-2019-7576 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7577">CVE-2019-7577 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7578">CVE-2019-7578 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7635">CVE-2019-7635 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7636">CVE-2019-7636 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7637">CVE-2019-7637 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7638">CVE-2019-7638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521757" comment="libSDL-1_2-0-1.2.15-15.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557437" comment="libSDL-1_2-0-32bit-1.2.15-15.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152142" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111789" ref_url="https://bugzilla.suse.com/1111789" source="BUGZILLA"/>
		<reference ref_id="1123022" ref_url="https://bugzilla.suse.com/1123022" source="BUGZILLA"/>
		<reference ref_id="1130116" ref_url="https://bugzilla.suse.com/1130116" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3814" ref_url="https://www.suse.com/security/cve/CVE-2019-3814/" source="CVE"/>
		<reference ref_id="CVE-2019-7524" ref_url="https://www.suse.com/security/cve/CVE-2019-7524/" source="CVE"/>
		<description>
This update for dovecot22 fixes the following issues:

Security issues fixed: 

- CVE-2019-7524: Fixed an improper file handling which could result in stack overflow allowing 
  local root escalation (bsc#1130116).
- CVE-2019-3814: Fixed a vulnerability related to SSL client certificate authentication (bsc#1123022).

Other issue fixed: 
- Fixed handling of command continuation(bsc#1111789)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-08"/>
	<updated date="2019-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111789">SUSE bug 1111789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123022">SUSE bug 1123022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130116">SUSE bug 1130116</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-3814/">CVE-2019-3814 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3814">CVE-2019-3814 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7524/">CVE-2019-7524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7524">CVE-2019-7524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530892" comment="dovecot22-2.2.31-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530893" comment="dovecot22-backend-mysql-2.2.31-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530894" comment="dovecot22-backend-pgsql-2.2.31-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530895" comment="dovecot22-backend-sqlite-2.2.31-19.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152143" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1119687" ref_url="https://bugzilla.suse.com/1119687" source="BUGZILLA"/>
		<reference ref_id="1131576" ref_url="https://bugzilla.suse.com/1131576" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<reference ref_id="CVE-2018-20506" ref_url="https://www.suse.com/security/cve/CVE-2018-20506/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issues fixed: 

- CVE-2018-20346: Fixed a remote code execution vulnerability in FTS3 (Magellan) (bsc#1119687).
- CVE-2018-20506: Fixed an integer overflow when FTS3 extension is enabled (bsc#1131576).    
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1119687">SUSE bug 1119687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131576">SUSE bug 1131576</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20346">CVE-2018-20346 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20506/">CVE-2018-20506 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20506">CVE-2018-20506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521758" comment="libsqlite3-0-3.8.10.2-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521759" comment="libsqlite3-0-32bit-3.8.10.2-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521760" comment="sqlite3-3.8.10.2-9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152144" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1026236" ref_url="https://bugzilla.suse.com/1026236" source="BUGZILLA"/>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1069468" ref_url="https://bugzilla.suse.com/1069468" source="BUGZILLA"/>
		<reference ref_id="1105528" ref_url="https://bugzilla.suse.com/1105528" source="BUGZILLA"/>
		<reference ref_id="1114988" ref_url="https://bugzilla.suse.com/1114988" source="BUGZILLA"/>
		<reference ref_id="1115040" ref_url="https://bugzilla.suse.com/1115040" source="BUGZILLA"/>
		<reference ref_id="1115045" ref_url="https://bugzilla.suse.com/1115045" source="BUGZILLA"/>
		<reference ref_id="1115047" ref_url="https://bugzilla.suse.com/1115047" source="BUGZILLA"/>
		<reference ref_id="1116380" ref_url="https://bugzilla.suse.com/1116380" source="BUGZILLA"/>
		<reference ref_id="1117756" ref_url="https://bugzilla.suse.com/1117756" source="BUGZILLA"/>
		<reference ref_id="1119161" ref_url="https://bugzilla.suse.com/1119161" source="BUGZILLA"/>
		<reference ref_id="1123157" ref_url="https://bugzilla.suse.com/1123157" source="BUGZILLA"/>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126197" ref_url="https://bugzilla.suse.com/1126197" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1126325" ref_url="https://bugzilla.suse.com/1126325" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1129623" ref_url="https://bugzilla.suse.com/1129623" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19665" ref_url="https://www.suse.com/security/cve/CVE-2018-19665/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<reference ref_id="CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed: 

- CVE-2018-19967: Fixed HLE constructs that allowed guests to lock up the host,
  resulting in a Denial of Service (DoS). (XSA-282) (bsc#1114988)
- CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() found in slirp (bsc#1123157).
- Fixed an issue which could allow malicious or buggy guests with passed through PCI devices to  be able to 
  escalate their privileges, crash the host, or access data belonging to other guests. Additionally memory 
  leaks were also possible (bsc#1126140).
- Fixed a race condition issue which could allow malicious PV guests to escalate their privilege to that 
  of the hypervisor (bsc#1126141).
- Fixed an issue which could allow a malicious unprivileged guest userspace process to escalate its privilege 
  to that of other userspace processes in the same guest and potentially thereby to that 
  of the guest operating system (bsc#1126201).
- CVE-2019-9824: Fixed an information leak in SLiRP networking implementation which could allow a user/process 
  to read uninitialised stack memory contents (bsc#1129623).
- CVE-2018-19961 CVE-2018-19962: Fixed insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275)(bsc#1115040).
- CVE-2018-19965: Fixed denial of service issue from attempting to use INVPCID with a non-canonical addresses (XSA-279)(bsc#1115045).
- CVE-2018-19966: Fixed issue introduced by XSA-240 that could have caused conflicts with shadow paging (XSA-280)(bsc#1115047).
- Fixed an issue which could allow malicious PV guests may cause a host crash or
  gain access to data pertaining to other guests.Additionally, vulnerable configurations
  are likely to be unstable even in the absence of an attack (bsc#1126198).
- Fixed multiple access violations introduced by XENMEM_exchange hypercall which could allow
  a single PV guest to leak arbitrary amounts of memory, leading to a denial of service (bsc#1126192).
- Fixed an issue which could allow malicious 64bit PV guests to cause a host crash (bsc#1127400).
- Fixed an issue which could allow malicious or buggy x86 PV guest kernels to mount a Denial of Service
  attack affecting the whole system (bsc#1126197).
- Fixed an issue which could allow an untrusted PV domain with access to a physical device to DMA into its own 
  pagetables leading to privilege escalation (bsc#1126195).
- Fixed an issue which could allow a malicious or buggy x86 PV guest kernels can mount a Denial of Service
  attack affecting the whole system (bsc#1126196).

Other issues addressed: 

- Upstream bug fixes (bsc#1027519)
- Fixed an issue where live migrations were failing when spectre was enabled on xen boot cmdline (bsc#1116380).
- Fixed an issue where setup of grant_tables and other variables may fail (bsc#1126325).
- Fixed a building issue (bsc#1119161).
- Fixed an issue where xpti=no-dom0 was not working as expected (bsc#1105528).
- Packages should no longer use /var/adm/fillup-templates (bsc#1069468). 
- Added Xen cmdline option 'suse_vtsc_tolerance' to avoid TSC emulation for HVM domUs (bsc#1026236).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1026236">SUSE bug 1026236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069468">SUSE bug 1069468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105528">SUSE bug 1105528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114988">SUSE bug 1114988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116380">SUSE bug 1116380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117756">SUSE bug 1117756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119161">SUSE bug 1119161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123157">SUSE bug 1123157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126197">SUSE bug 1126197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126325">SUSE bug 1126325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129623">SUSE bug 1129623</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19665/">CVE-2018-19665 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19665">CVE-2018-19665 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19961">CVE-2018-19961 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19962">CVE-2018-19962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19965">CVE-2018-19965 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19966">CVE-2018-19966 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19967">CVE-2018-19967 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9824">CVE-2019-9824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521761" comment="xen-4.9.4_02-3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554639" comment="xen-doc-html-4.9.4_02-3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521762" comment="xen-libs-4.9.4_02-3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521763" comment="xen-libs-32bit-4.9.4_02-3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554640" comment="xen-tools-4.9.4_02-3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009554641" comment="xen-tools-domU-4.9.4_02-3.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152145" version="1" class="patch">
	<metadata>
		<title>Security update for xmltooling (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1129537" ref_url="https://bugzilla.suse.com/1129537" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9628" ref_url="https://www.suse.com/security/cve/CVE-2019-9628/" source="CVE"/>
		<description>
This update for xmltooling fixes the following issue:

Security issue fixed: 	  

- CVE-2019-9628: Fixed an improper handling of exception in XMLTooling library which could result in
denial of service against the application using XMLTooling (bsc#1129537).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-10"/>
	<updated date="2019-04-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1129537">SUSE bug 1129537</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9628/">CVE-2019-9628 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9628">CVE-2019-9628 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557438" comment="libxmltooling6-1.5.6-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557439" comment="xmltooling-schemas-1.5.6-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152146" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1131493" ref_url="https://bugzilla.suse.com/1131493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5953" ref_url="https://www.suse.com/security/cve/CVE-2019-5953/" source="CVE"/>
		<description>
This update for wget fixes the following issues:

Security issue fixed:

- CVE-2019-5953: Fixed a buffer overflow vulnerability which might cause code execution (bsc#1131493).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131493">SUSE bug 1131493</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5953/">CVE-2019-5953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5953">CVE-2019-5953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521764" comment="wget-1.14-21.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152147" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1118900" ref_url="https://bugzilla.suse.com/1118900" source="BUGZILLA"/>
		<reference ref_id="1125721" ref_url="https://bugzilla.suse.com/1125721" source="BUGZILLA"/>
		<reference ref_id="1126455" ref_url="https://bugzilla.suse.com/1126455" source="BUGZILLA"/>
		<reference ref_id="1129622" ref_url="https://bugzilla.suse.com/1129622" source="BUGZILLA"/>
		<reference ref_id="1130675" ref_url="https://bugzilla.suse.com/1130675" source="BUGZILLA"/>
		<reference ref_id="1131955" ref_url="https://bugzilla.suse.com/1131955" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-3812" ref_url="https://www.suse.com/security/cve/CVE-2019-3812/" source="CVE"/>
		<reference ref_id="CVE-2019-8934" ref_url="https://www.suse.com/security/cve/CVE-2019-8934/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2019-9824: Fixed information leak in slirp (bsc#1129622).
- CVE-2019-8934: Added method to specify whether or not to expose certain ppc64 hostinformation (bsc#1126455).
- CVE-2019-3812: Fixed Out-of-bounds memory access and information leak in virtual monitor interface (bsc#1125721).
- CVE-2018-20815: Fixed a denial of service possibility in device tree processing (bsc#1130675).

Non-security issue fixed:

- Backported Skylake-Server vcpu model support from qemu v2.11 (FATE#327261 bsc#1131955).
- Added ability to set virtqueue size using virtqueue_size parameter (FATE#327255 bsc#1118900).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118900">SUSE bug 1118900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125721">SUSE bug 1125721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126455">SUSE bug 1126455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129622">SUSE bug 1129622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130675">SUSE bug 1130675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131955">SUSE bug 1131955</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20815">CVE-2018-20815 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3812/">CVE-2019-3812 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3812">CVE-2019-3812 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8934/">CVE-2019-8934 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8934">CVE-2019-8934 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9824">CVE-2019-9824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521765" comment="qemu-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521766" comment="qemu-block-curl-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557440" comment="qemu-block-iscsi-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557441" comment="qemu-block-rbd-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557442" comment="qemu-block-ssh-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557443" comment="qemu-guest-agent-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521767" comment="qemu-ipxe-1.0.0+-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521768" comment="qemu-kvm-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557444" comment="qemu-lang-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521769" comment="qemu-seabios-1.10.2-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521770" comment="qemu-sgabios-8-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521771" comment="qemu-tools-2.9.1-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521772" comment="qemu-vgabios-1.10.2-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521773" comment="qemu-x86-2.9.1-6.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152148" version="1" class="patch">
	<metadata>
		<title>Security update for soundtouch (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1108631" ref_url="https://bugzilla.suse.com/1108631" source="BUGZILLA"/>
		<reference ref_id="1108632" ref_url="https://bugzilla.suse.com/1108632" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17097" ref_url="https://www.suse.com/security/cve/CVE-2018-17097/" source="CVE"/>
		<reference ref_id="CVE-2018-17098" ref_url="https://www.suse.com/security/cve/CVE-2018-17098/" source="CVE"/>
		<description>
This update for soundtouch fixes the following issues:

Security issues fixed:

- CVE-2018-17098: Fixed a heap corruption from size inconsistency, which
  allowed remote attackers to cause a denial of service or possibly have
  other unspecified impact (bsc#1108632)
- CVE-2018-17097: Fixed a double free, which allowed remote attackers to cause
  a denial of service or possibly have other unspecified impact  (bsc#1108631)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-15"/>
	<updated date="2019-01-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108631">SUSE bug 1108631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108632">SUSE bug 1108632</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17097/">CVE-2018-17097 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17097">CVE-2018-17097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17098/">CVE-2018-17098 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17098">CVE-2018-17098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521774" comment="libSoundTouch0-1.7.1-5.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152149" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

Security issue fixed:

- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636">CVE-2019-9636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521777" comment="libpython3_4m1_0-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521778" comment="python3-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521779" comment="python3-base-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521780" comment="python3-curses-3.4.6-25.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152150" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1112758" ref_url="https://bugzilla.suse.com/1112758" source="BUGZILLA"/>
		<reference ref_id="1131886" ref_url="https://bugzilla.suse.com/1131886" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16839" ref_url="https://www.suse.com/security/cve/CVE-2018-16839/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2018-16839: Fixed a buffer overflow in the SASL authentication code (bsc#1112758).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-23"/>
	<updated date="2019-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131886">SUSE bug 1131886</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16839/">CVE-2018-16839 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16839">CVE-2018-16839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521781" comment="curl-7.37.0-37.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521782" comment="libcurl4-7.37.0-37.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521783" comment="libcurl4-32bit-7.37.0-37.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152151" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1144524" ref_url="https://bugzilla.suse.com/1144524" source="BUGZILLA"/>
		<reference ref_id="1146848" ref_url="https://bugzilla.suse.com/1146848" source="BUGZILLA"/>
		<reference ref_id="1166847" ref_url="https://bugzilla.suse.com/1166847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13456" ref_url="https://www.suse.com/security/cve/CVE-2019-13456/" source="CVE"/>
		<reference ref_id="CVE-2019-17185" ref_url="https://www.suse.com/security/cve/CVE-2019-17185/" source="CVE"/>
		<description>
This update for freeradius-server fixes the following issues:

- CVE-2019-13456: Fixed a side-channel password leak in EAP-pwd
  (bsc#1144524).
- CVE-2019-17185: Fixed a debial of service due to multithreaded
  BN_CTX access (bsc#1166847).
- Fixed an issue in TLS-EAP where the OCSP verification, when an 
  intermediate client certificate was not explicitly trusted 
  (bsc#1146848).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-17"/>
	<updated date="2020-04-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144524">SUSE bug 1144524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146848">SUSE bug 1146848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166847">SUSE bug 1166847</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13456/">CVE-2019-13456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13456">CVE-2019-13456 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17185/">CVE-2019-17185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17185">CVE-2019-17185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555686" comment="freeradius-server-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555687" comment="freeradius-server-doc-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555688" comment="freeradius-server-krb5-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555689" comment="freeradius-server-ldap-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555690" comment="freeradius-server-libs-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555691" comment="freeradius-server-mysql-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555692" comment="freeradius-server-perl-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555693" comment="freeradius-server-postgresql-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555694" comment="freeradius-server-python-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555695" comment="freeradius-server-sqlite-3.0.15-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555696" comment="freeradius-server-utils-3.0.15-2.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152152" version="1" class="patch">
	<metadata>
		<title>Security update for man (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159105" ref_url="https://bugzilla.suse.com/1159105" source="BUGZILLA"/>
		<description>
This update for man fixes the following issues:

- Skip using 'safe-rm' in cron job below cache directory (bsc#1159105).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-14"/>
	<updated date="2020-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159105">SUSE bug 1159105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522532" comment="man-2.6.6-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152153" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1118595" ref_url="https://bugzilla.suse.com/1118595" source="BUGZILLA"/>
		<reference ref_id="1118596" ref_url="https://bugzilla.suse.com/1118596" source="BUGZILLA"/>
		<reference ref_id="1118599" ref_url="https://bugzilla.suse.com/1118599" source="BUGZILLA"/>
		<reference ref_id="1121214" ref_url="https://bugzilla.suse.com/1121214" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15518" ref_url="https://www.suse.com/security/cve/CVE-2018-15518/" source="CVE"/>
		<reference ref_id="CVE-2018-19869" ref_url="https://www.suse.com/security/cve/CVE-2018-19869/" source="CVE"/>
		<reference ref_id="CVE-2018-19873" ref_url="https://www.suse.com/security/cve/CVE-2018-19873/" source="CVE"/>
		<description>
This update for libqt4 fixes the following issues:

- CVE-2018-15518: Fixed a double free in QXmlStreamReader (bsc#1118595)
- CVE-2018-19873: Fixed a segmantation fault via a malformed 
  BMP file (bsc#1118596).
- CVE-2018-19869: Fixed an improper checking which might lead to
  a crach via a malformed url reference (bsc#1118599).
- Added stricter toplevel asm parsing by dropping volatile 
  qualification that has no effect (bsc#1121214).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-17"/>
	<updated date="2020-04-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118595">SUSE bug 1118595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118596">SUSE bug 1118596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118599">SUSE bug 1118599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121214">SUSE bug 1121214</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15518/">CVE-2018-15518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15518">CVE-2018-15518 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19869/">CVE-2018-19869 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19869">CVE-2018-19869 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19873/">CVE-2018-19873 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19873">CVE-2018-19873 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557445" comment="libqt4-4.8.7-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557446" comment="libqt4-32bit-4.8.7-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557447" comment="libqt4-qt3support-4.8.7-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557448" comment="libqt4-qt3support-32bit-4.8.7-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557449" comment="libqt4-sql-4.8.7-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557450" comment="libqt4-sql-32bit-4.8.7-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557451" comment="libqt4-sql-mysql-4.8.7-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557452" comment="libqt4-sql-sqlite-4.8.7-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557453" comment="libqt4-x11-4.8.7-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557454" comment="libqt4-x11-32bit-4.8.7-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557455" comment="qt4-x11-tools-4.8.7-8.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152154" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1168422" ref_url="https://bugzilla.suse.com/1168422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-3898: Fixed a heap buffer overflow in ppdFindOption() (bsc#1168422).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-23"/>
	<updated date="2020-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3898">CVE-2020-3898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530902" comment="cups-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530903" comment="cups-client-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530904" comment="cups-libs-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530905" comment="cups-libs-32bit-1.7.5-20.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152155" version="1" class="patch">
	<metadata>
		<title>Security update for file-roller (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1151585" ref_url="https://bugzilla.suse.com/1151585" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16680" ref_url="https://www.suse.com/security/cve/CVE-2019-16680/" source="CVE"/>
		<description>
This update for file-roller fixes the following issues:

- CVE-2019-16680: Fixed a path traversal vulnerability which could have allowed
  an overwriting of a file during extraction (bsc#1151585). 	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-23"/>
	<updated date="2020-04-23"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1151585">SUSE bug 1151585</bugzilla>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16680/">CVE-2019-16680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-16680">CVE-2019-16680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557456" comment="file-roller-3.20.3-15.3.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557457" comment="file-roller-lang-3.20.3-15.3.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557458" comment="nautilus-file-roller-3.20.3-15.3.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152156" version="1" class="patch">
	<metadata>
		<title>Security update for pam_radius (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1141670" ref_url="https://bugzilla.suse.com/1141670" source="BUGZILLA"/>
		<reference ref_id="1163933" ref_url="https://bugzilla.suse.com/1163933" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9542" ref_url="https://www.suse.com/security/cve/CVE-2015-9542/" source="CVE"/>
		<description>
This update for pam_radius fixes the following issues:

- CVE-2015-9542: Fixed a buffer overflow in password field (bsc#1163933).
- On s390x didn't decrypt passwords correctly (bsc#1141670).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-27"/>
	<updated date="2020-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141670">SUSE bug 1141670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163933">SUSE bug 1163933</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9542/">CVE-2015-9542 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9542">CVE-2015-9542 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530906" comment="pam_radius-1.3.16-239.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530907" comment="pam_radius-32bit-1.3.16-239.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152157" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1155321" ref_url="https://bugzilla.suse.com/1155321" source="BUGZILLA"/>
		<reference ref_id="1156318" ref_url="https://bugzilla.suse.com/1156318" source="BUGZILLA"/>
		<reference ref_id="1159329" ref_url="https://bugzilla.suse.com/1159329" source="BUGZILLA"/>
		<reference ref_id="1161719" ref_url="https://bugzilla.suse.com/1161719" source="BUGZILLA"/>
		<reference ref_id="1163809" ref_url="https://bugzilla.suse.com/1163809" source="BUGZILLA"/>
		<reference ref_id="1165528" ref_url="https://bugzilla.suse.com/1165528" source="BUGZILLA"/>
		<reference ref_id="1169658" ref_url="https://bugzilla.suse.com/1169658" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8625" ref_url="https://www.suse.com/security/cve/CVE-2019-8625/" source="CVE"/>
		<reference ref_id="CVE-2019-8710" ref_url="https://www.suse.com/security/cve/CVE-2019-8710/" source="CVE"/>
		<reference ref_id="CVE-2019-8720" ref_url="https://www.suse.com/security/cve/CVE-2019-8720/" source="CVE"/>
		<reference ref_id="CVE-2019-8743" ref_url="https://www.suse.com/security/cve/CVE-2019-8743/" source="CVE"/>
		<reference ref_id="CVE-2019-8764" ref_url="https://www.suse.com/security/cve/CVE-2019-8764/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8769" ref_url="https://www.suse.com/security/cve/CVE-2019-8769/" source="CVE"/>
		<reference ref_id="CVE-2019-8771" ref_url="https://www.suse.com/security/cve/CVE-2019-8771/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8783" ref_url="https://www.suse.com/security/cve/CVE-2019-8783/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8811" ref_url="https://www.suse.com/security/cve/CVE-2019-8811/" source="CVE"/>
		<reference ref_id="CVE-2019-8812" ref_url="https://www.suse.com/security/cve/CVE-2019-8812/" source="CVE"/>
		<reference ref_id="CVE-2019-8813" ref_url="https://www.suse.com/security/cve/CVE-2019-8813/" source="CVE"/>
		<reference ref_id="CVE-2019-8814" ref_url="https://www.suse.com/security/cve/CVE-2019-8814/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8816" ref_url="https://www.suse.com/security/cve/CVE-2019-8816/" source="CVE"/>
		<reference ref_id="CVE-2019-8819" ref_url="https://www.suse.com/security/cve/CVE-2019-8819/" source="CVE"/>
		<reference ref_id="CVE-2019-8820" ref_url="https://www.suse.com/security/cve/CVE-2019-8820/" source="CVE"/>
		<reference ref_id="CVE-2019-8823" ref_url="https://www.suse.com/security/cve/CVE-2019-8823/" source="CVE"/>
		<reference ref_id="CVE-2019-8835" ref_url="https://www.suse.com/security/cve/CVE-2019-8835/" source="CVE"/>
		<reference ref_id="CVE-2019-8844" ref_url="https://www.suse.com/security/cve/CVE-2019-8844/" source="CVE"/>
		<reference ref_id="CVE-2019-8846" ref_url="https://www.suse.com/security/cve/CVE-2019-8846/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-11793" ref_url="https://www.suse.com/security/cve/CVE-2020-11793/" source="CVE"/>
		<reference ref_id="CVE-2020-3862" ref_url="https://www.suse.com/security/cve/CVE-2020-3862/" source="CVE"/>
		<reference ref_id="CVE-2020-3864" ref_url="https://www.suse.com/security/cve/CVE-2020-3864/" source="CVE"/>
		<reference ref_id="CVE-2020-3865" ref_url="https://www.suse.com/security/cve/CVE-2020-3865/" source="CVE"/>
		<reference ref_id="CVE-2020-3867" ref_url="https://www.suse.com/security/cve/CVE-2020-3867/" source="CVE"/>
		<reference ref_id="CVE-2020-3868" ref_url="https://www.suse.com/security/cve/CVE-2020-3868/" source="CVE"/>
		<description>
This update for webkit2gtk3 to version 2.28.1 fixes the following issues:

Security issues fixed:

- CVE-2020-10018: Fixed a denial of service because the m_deferredFocusedNodeChange data structure was mishandled (bsc#1165528).
- CVE-2020-11793: Fixed a potential arbitrary code execution caused by a use-after-free vulnerability (bsc#1169658).
- CVE-2019-8835: Fixed multiple memory corruption issues (bsc#1161719).
- CVE-2019-8844: Fixed multiple memory corruption issues (bsc#1161719).
- CVE-2019-8846: Fixed a use-after-free issue (bsc#1161719).
- CVE-2020-3862: Fixed a memory handling issue (bsc#1163809).
- CVE-2020-3867: Fixed an XSS issue (bsc#1163809).
- CVE-2020-3868: Fixed multiple memory corruption issues that could have lead to arbitrary code execution (bsc#1163809).
- CVE-2020-3864,CVE-2020-3865: Fixed logic issues in the DOM object context handling (bsc#1163809).

Non-security issues fixed:

- Add API to enable Process Swap on (Cross-site) Navigation.
- Add user messages API for the communication with the web extension.
- Add support for same-site cookies.
- Service workers are enabled by default.
- Add support for Pointer Lock API.
- Add flatpak sandbox support.
- Make ondemand hardware acceleration policy never leave accelerated compositing mode.
- Always use a light theme for rendering form controls.
- Add about:gpu to show information about the graphics stack.
- Fixed issues while trying to play a video on NextCloud.
- Fixed vertical alignment of text containing arabic diacritics.
- Fixed build with icu 65.1.
- Fixed page loading errors with websites using HSTS.
- Fixed web process crash when displaying a KaTeX formula.
- Fixed several crashes and rendering issues.
- Switched to a single web process for Evolution and geary (bsc#1159329).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-29"/>
	<updated date="2020-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159329">SUSE bug 1159329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161719">SUSE bug 1161719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165528">SUSE bug 1165528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169658">SUSE bug 1169658</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8625/">CVE-2019-8625 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8625">CVE-2019-8625 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8710/">CVE-2019-8710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8710">CVE-2019-8710 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8720/">CVE-2019-8720 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8720">CVE-2019-8720 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8743/">CVE-2019-8743 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8743">CVE-2019-8743 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8764/">CVE-2019-8764 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8764">CVE-2019-8764 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8766">CVE-2019-8766 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8769/">CVE-2019-8769 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8769">CVE-2019-8769 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8771/">CVE-2019-8771 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8771">CVE-2019-8771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8782">CVE-2019-8782 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8783/">CVE-2019-8783 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8783">CVE-2019-8783 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8808">CVE-2019-8808 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8811/">CVE-2019-8811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8811">CVE-2019-8811 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8812/">CVE-2019-8812 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8812">CVE-2019-8812 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8813/">CVE-2019-8813 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8813">CVE-2019-8813 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8814/">CVE-2019-8814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8814">CVE-2019-8814 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8815">CVE-2019-8815 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8816/">CVE-2019-8816 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8816">CVE-2019-8816 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8819/">CVE-2019-8819 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8819">CVE-2019-8819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8820/">CVE-2019-8820 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8820">CVE-2019-8820 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8823/">CVE-2019-8823 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8823">CVE-2019-8823 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8835/">CVE-2019-8835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8835">CVE-2019-8835 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8844/">CVE-2019-8844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8844">CVE-2019-8844 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8846/">CVE-2019-8846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8846">CVE-2019-8846 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10018">CVE-2020-10018 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11793/">CVE-2020-11793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11793">CVE-2020-11793 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-3862/">CVE-2020-3862 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3862">CVE-2020-3862 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-3864/">CVE-2020-3864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3864">CVE-2020-3864 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3865/">CVE-2020-3865 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3865">CVE-2020-3865 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3867/">CVE-2020-3867 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3867">CVE-2020-3867 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3868/">CVE-2020-3868 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3868">CVE-2020-3868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152158" version="1" class="patch">
	<metadata>
		<title>Security update for shibboleth-sp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1157471" ref_url="https://bugzilla.suse.com/1157471" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19191" ref_url="https://www.suse.com/security/cve/CVE-2019-19191/" source="CVE"/>
		<description>
This update for shibboleth-sp fixes the following issues:

Security issue fixed:

- CVE-2019-19191: Fixed escalation to root by fixing ownership of log files (bsc#1157471).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-16"/>
	<updated date="2020-01-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1157471">SUSE bug 1157471</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19191/">CVE-2019-19191 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19191">CVE-2019-19191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530916" comment="libshibsp-lite6-2.5.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530917" comment="libshibsp6-2.5.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530918" comment="shibboleth-sp-2.5.5-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152159" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1170170" ref_url="https://bugzilla.suse.com/1170170" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12059" ref_url="https://www.suse.com/security/cve/CVE-2020-12059/" source="CVE"/>
		<description>
This update for ceph fixes the following issues:

- CVE-2020-12059: Fixed a denial of service caused by a specially crafted XML payload on POST requests (bsc#1170170).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-30"/>
	<updated date="2020-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170170">SUSE bug 1170170</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12059/">CVE-2020-12059 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12059">CVE-2020-12059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555697" comment="ceph-common-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555698" comment="libcephfs2-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555699" comment="librados2-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555700" comment="libradosstriper1-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555701" comment="librbd1-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555702" comment="librgw2-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555703" comment="python-cephfs-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555704" comment="python-rados-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555705" comment="python-rbd-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555706" comment="python-rgw-12.2.12+git.1587570958.35d78d0243-2.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152160" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1155419" ref_url="https://bugzilla.suse.com/1155419" source="BUGZILLA"/>
		<reference ref_id="1160471" ref_url="https://bugzilla.suse.com/1160471" source="BUGZILLA"/>
		<reference ref_id="1170441" ref_url="https://bugzilla.suse.com/1170441" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<reference ref_id="CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2019-15690: Fixed a heap buffer overflow (bsc#1160471).
- CVE-2019-15681: Fixed a memory leak which could have allowed to a remote attacker to read stack memory (bsc#1155419).
- CVE-2019-20788: Fixed a integer overflow and heap-based buffer overflow via a large height or width value (bsc#1170441).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-04"/>
	<updated date="2020-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160471">SUSE bug 1160471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170441">SUSE bug 1170441</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15681">CVE-2019-15681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15690">CVE-2019-15690 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20788">CVE-2019-20788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530919" comment="libvncclient0-0.9.9-17.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530920" comment="libvncserver0-0.9.9-17.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152161" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1166844" ref_url="https://bugzilla.suse.com/1166844" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<description>
This update for icu fixes the following issues:

- CVE-2020-10531: Fixed integer overflow in UnicodeString:doAppend() (bsc#1166844).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1166844">SUSE bug 1166844</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10531">CVE-2020-10531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530921" comment="libicu-doc-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530922" comment="libicu52_1-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530923" comment="libicu52_1-32bit-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530924" comment="libicu52_1-data-52.1-8.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152162" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1170771" ref_url="https://bugzilla.suse.com/1170771" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-12243: Fixed a denial of service related to recursive filters (bsc#1170771).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12243">CVE-2020-12243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530925" comment="libldap-2_4-2-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530926" comment="libldap-2_4-2-32bit-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530927" comment="openldap2-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530928" comment="openldap2-back-meta-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530929" comment="openldap2-client-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530930" comment="openldap2-doc-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530931" comment="openldap2-ppolicy-check-password-1.2-18.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152163" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1170643" ref_url="https://bugzilla.suse.com/1170643" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3899" ref_url="https://www.suse.com/security/cve/CVE-2020-3899/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Security issue fixed:

- CVE-2020-3899: Fixed a memory consumption issue that could have led to remote code execution (bsc#1170643).

Non-security issues fixed:

- Update to version 2.28.2 (bsc#1170643):
  + Fix excessive CPU usage due to GdkFrameClock not being stopped.
  + Fix UI process crash when EGL_WL_bind_wayland_display extension
    is not available.
  + Fix position of select popup menus in X11.
  + Fix playing of Youtube 'live stream'/H264 URLs.
  + Fix a crash under X11 when cairo uses xcb.
  + Fix the build in MIPS64.
  + Fix several crashes and rendering issues.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3899/">CVE-2020-3899 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3899">CVE-2020-3899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530932" comment="libjavascriptcoregtk-4_0-18-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530933" comment="libwebkit2gtk-4_0-37-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530935" comment="typelib-1_0-JavaScriptCore-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530936" comment="typelib-1_0-WebKit2-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530938" comment="webkit2gtk-4_0-injected-bundles-2.28.2-2.53.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152164" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1170603" ref_url="https://bugzilla.suse.com/1170603" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12268" ref_url="https://www.suse.com/security/cve/CVE-2020-12268/" source="CVE"/>
		<description>
This update for ghostscript to version 9.52 fixes the following issues:

- CVE-2020-12268: Fixed a heap-based buffer overflow in jbig2_image_compose (bsc#1170603).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170603">SUSE bug 1170603</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-12268/">CVE-2020-12268 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12268">CVE-2020-12268 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530940" comment="ghostscript-9.52-23.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530941" comment="ghostscript-x11-9.52-23.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530942" comment="libspectre1-0.2.7-12.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152165" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1171186" ref_url="https://bugzilla.suse.com/1171186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388/" source="CVE"/>
		<reference ref_id="CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to version 68.8.0 ESR (bsc#1171186):

- CVE-2020-12387: Use-after-free during worker shutdown
- CVE-2020-12388: Sandbox escape with improperly guarded Access Tokens
- CVE-2020-12389: Sandbox escape with improperly separated process types
- CVE-2020-6831: Buffer overflow in SCTP chunk input validation
- CVE-2020-12392: Arbitrary local file access with 'Copy as cURL'
- CVE-2020-12393: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection
- CVE-2020-12395: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12387">CVE-2020-12387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12388">CVE-2020-12388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12389">CVE-2020-12389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12392">CVE-2020-12392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12393">CVE-2020-12393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12395">CVE-2020-12395 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6831">CVE-2020-6831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530943" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530945" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152166" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1169659" ref_url="https://bugzilla.suse.com/1169659" source="BUGZILLA"/>
		<reference ref_id="1170313" ref_url="https://bugzilla.suse.com/1170313" source="BUGZILLA"/>
		<reference ref_id="1170423" ref_url="https://bugzilla.suse.com/1170423" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519/" source="CVE"/>
		<reference ref_id="CVE-2019-12520" ref_url="https://www.suse.com/security/cve/CVE-2019-12520/" source="CVE"/>
		<reference ref_id="CVE-2019-12521" ref_url="https://www.suse.com/security/cve/CVE-2019-12521/" source="CVE"/>
		<reference ref_id="CVE-2019-12524" ref_url="https://www.suse.com/security/cve/CVE-2019-12524/" source="CVE"/>
		<reference ref_id="CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2019-12519, CVE-2019-12521: fixes incorrect buffer handling that can 
  result in cache poisoning, remote execution, and denial of service attacks
  when processing ESI responses (bsc#1169659).
- CVE-2020-11945: fixes a potential remote execution vulnerability
  when using HTTP Digest Authentication (bsc#1170313).
- CVE-2019-12520, CVE-2019-12524: fixes a potential ACL bypass, cache-bypass
  and cross-site scripting attack when processing invalid HTTP
  Request messages (bsc#1170423).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-08"/>
	<updated date="2020-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169659">SUSE bug 1169659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170313">SUSE bug 1170313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170423">SUSE bug 1170423</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12519">CVE-2019-12519 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12520/">CVE-2019-12520 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12520">CVE-2019-12520 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12521/">CVE-2019-12521 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12521">CVE-2019-12521 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12524/">CVE-2019-12524 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12524">CVE-2019-12524 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11945">CVE-2020-11945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530946" comment="squid-3.5.21-26.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152167" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1168404" ref_url="https://bugzilla.suse.com/1168404" source="BUGZILLA"/>
		<reference ref_id="1168407" ref_url="https://bugzilla.suse.com/1168407" source="BUGZILLA"/>
		<reference ref_id="1169066" ref_url="https://bugzilla.suse.com/1169066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1927" ref_url="https://www.suse.com/security/cve/CVE-2020-1927/" source="CVE"/>
		<reference ref_id="CVE-2020-1934" ref_url="https://www.suse.com/security/cve/CVE-2020-1934/" source="CVE"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-1934: mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server (bsc#1168404).
- CVE-2020-1927: mod_rewrite configurations vulnerable to open redirect (bsc#1168407).
- CVE-2020-1938: mod_proxy_ajp: Add 'secret' parameter to proxy workers to implement legacy AJP13 authentication (bsc#1169066).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-13"/>
	<updated date="2020-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168404">SUSE bug 1168404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168407">SUSE bug 1168407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169066">SUSE bug 1169066</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1927/">CVE-2020-1927 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1927">CVE-2020-1927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1934/">CVE-2020-1934 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1934">CVE-2020-1934 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530955" comment="apache2-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530956" comment="apache2-doc-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530957" comment="apache2-example-pages-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530958" comment="apache2-prefork-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530959" comment="apache2-utils-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530960" comment="apache2-worker-2.4.23-29.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152168" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyYAML (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1165439" ref_url="https://bugzilla.suse.com/1165439" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1747" ref_url="https://www.suse.com/security/cve/CVE-2020-1747/" source="CVE"/>
		<description>
This update for python-PyYAML fixes the following issues:

- CVE-2020-1747: Fixed an arbitrary code execution when YAML files are parsed by FullLoader (bsc#1165439).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-15"/>
	<updated date="2020-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165439">SUSE bug 1165439</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1747/">CVE-2020-1747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1747">CVE-2020-1747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009524550" comment="python-PyYAML-5.1.2-26.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530070" comment="python3-PyYAML-5.1.2-26.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152169" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1146648" ref_url="https://bugzilla.suse.com/1146648" source="BUGZILLA"/>
		<reference ref_id="1169573" ref_url="https://bugzilla.suse.com/1169573" source="BUGZILLA"/>
		<reference ref_id="1169574" ref_url="https://bugzilla.suse.com/1169574" source="BUGZILLA"/>
		<reference ref_id="1169576" ref_url="https://bugzilla.suse.com/1169576" source="BUGZILLA"/>
		<reference ref_id="1169580" ref_url="https://bugzilla.suse.com/1169580" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11758" ref_url="https://www.suse.com/security/cve/CVE-2020-11758/" source="CVE"/>
		<reference ref_id="CVE-2020-11760" ref_url="https://www.suse.com/security/cve/CVE-2020-11760/" source="CVE"/>
		<reference ref_id="CVE-2020-11763" ref_url="https://www.suse.com/security/cve/CVE-2020-11763/" source="CVE"/>
		<reference ref_id="CVE-2020-11764" ref_url="https://www.suse.com/security/cve/CVE-2020-11764/" source="CVE"/>
		<description>
This update for openexr provides the following fix:

Security issues fixed:

- CVE-2020-11764: Fixed an out-of-bounds write in copyIntoFrameBuffer in ImfMisc.cpp (bsc#1169574).
- CVE-2020-11763: Fixed an out-of-bounds read and write, as demonstrated by ImfTileOffsets.cpp (bsc#1169576).
- CVE-2020-11758: Fixed an out-of-bounds read in ImfOptimizedPixelReading.h (bsc#1169573).
- CVE-2020-11760: Fixed an out-of-bounds read during RLE uncompression in rleUncompress in ImfRle.cpp (bsc#1169580).

Non-security issue fixed:

- Enable tests when building the package on x86_64. (bsc#1146648)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-18"/>
	<updated date="2020-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1146648">SUSE bug 1146648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169573">SUSE bug 1169573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169574">SUSE bug 1169574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169576">SUSE bug 1169576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169580">SUSE bug 1169580</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11758/">CVE-2020-11758 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11758">CVE-2020-11758 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11760/">CVE-2020-11760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11760">CVE-2020-11760 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11763/">CVE-2020-11763 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11763">CVE-2020-11763 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11764/">CVE-2020-11764 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11764">CVE-2020-11764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557459" comment="libIlmImf-Imf_2_1-21-2.1.0-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557460" comment="openexr-2.1.0-6.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152170" version="1" class="patch">
	<metadata>
		<title>Security update for git (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1168930" ref_url="https://bugzilla.suse.com/1168930" source="BUGZILLA"/>
		<reference ref_id="1169605" ref_url="https://bugzilla.suse.com/1169605" source="BUGZILLA"/>
		<reference ref_id="1169786" ref_url="https://bugzilla.suse.com/1169786" source="BUGZILLA"/>
		<reference ref_id="1169936" ref_url="https://bugzilla.suse.com/1169936" source="BUGZILLA"/>
		<reference ref_id="1170302" ref_url="https://bugzilla.suse.com/1170302" source="BUGZILLA"/>
		<reference ref_id="1170741" ref_url="https://bugzilla.suse.com/1170741" source="BUGZILLA"/>
		<reference ref_id="1170939" ref_url="https://bugzilla.suse.com/1170939" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11008" ref_url="https://www.suse.com/security/cve/CVE-2020-11008/" source="CVE"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<description>
This update for git to 2.26.2 fixes the following issues:

Security issue fixed:

- CVE-2020-11008: Specially crafted URLs may have tricked the credentials helper 
  to providing credential information that is not appropriate for the protocol 
  in use and host being contacted (bsc#1169936).

Non-security issue fixed:

- Fixed git-daemon not starting after conversion from sysvinit to systemd service (bsc#1169605).
- Enabled access for git-daemon in firewall configuration (bsc#1170302).
- Fixed problems with recent switch to protocol v2, which caused fetches transferring unreasonable amount of data (bsc#1170741).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-18"/>
	<updated date="2020-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169605">SUSE bug 1169605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169786">SUSE bug 1169786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169936">SUSE bug 1169936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170302">SUSE bug 1170302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170741">SUSE bug 1170741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170939">SUSE bug 1170939</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11008/">CVE-2020-11008 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11008">CVE-2020-11008 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5260">CVE-2020-5260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530961" comment="git-core-2.26.2-27.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152171" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1167068" ref_url="https://bugzilla.suse.com/1167068" source="BUGZILLA"/>
		<reference ref_id="1170558" ref_url="https://bugzilla.suse.com/1170558" source="BUGZILLA"/>
		<reference ref_id="1171363" ref_url="https://bugzilla.suse.com/1171363" source="BUGZILLA"/>
		<reference ref_id="682920" ref_url="https://bugzilla.suse.com/682920" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12108" ref_url="https://www.suse.com/security/cve/CVE-2020-12108/" source="CVE"/>
		<reference ref_id="CVE-2020-12137" ref_url="https://www.suse.com/security/cve/CVE-2020-12137/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2020-12108: Fixed a content injection bug (bsc#1171363).
- CVE-2020-12137: Fixed a XSS vulnerability caused by MIME type confusion (bsc#1170558).

Non-security issue fixed:

- Fixed rights and ownership on /var/lib/mailman/archives (bsc#1167068).
- Don't default to invalid hosts for DEFAULT_EMAIL_HOST (bsc#682920).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-18"/>
	<updated date="2020-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167068">SUSE bug 1167068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170558">SUSE bug 1170558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171363">SUSE bug 1171363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682920">SUSE bug 682920</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12108/">CVE-2020-12108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12108">CVE-2020-12108 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12137/">CVE-2020-12137 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12137">CVE-2020-12137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530963" comment="mailman-2.1.17-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152172" version="1" class="patch">
	<metadata>
		<title>Security update for ant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1100053" ref_url="https://bugzilla.suse.com/1100053" source="BUGZILLA"/>
		<reference ref_id="1133997" ref_url="https://bugzilla.suse.com/1133997" source="BUGZILLA"/>
		<reference ref_id="1134001" ref_url="https://bugzilla.suse.com/1134001" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10886" ref_url="https://www.suse.com/security/cve/CVE-2018-10886/" source="CVE"/>
		<description>
This update for ant fixes the following issues:

Security issue fixed:

- CVE-2018-10886: Fixed a path traversal vulnerability in malformed zip file paths, which allowed arbitrary file writes and could potentially lead to code execution (bsc#1100053).

Non-security issues fixed:

- Add rhino to the ant-apache-bsf optional tasks (bsc#1134001).
- Remove jakarta-commons-logging dependencies (bsc#1133997).
- Use apache-commons-logging in optional tasks
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-20"/>
	<updated date="2020-05-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100053">SUSE bug 1100053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133997">SUSE bug 1133997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134001">SUSE bug 1134001</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10886/">CVE-2018-10886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-10886">CVE-2018-10886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542425" comment="ant-1.9.4-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152173" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1171477" ref_url="https://bugzilla.suse.com/1171477" source="BUGZILLA"/>
		<reference ref_id="1171930" ref_url="https://bugzilla.suse.com/1171930" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10722" ref_url="https://www.suse.com/security/cve/CVE-2020-10722/" source="CVE"/>
		<description>
This update for dpdk fixes the following issues:

Security issue fixed:

- CVE-2020-10722: Fixed an integer overflow in vhost_user_set_log_base() (bsc#1171477 bsc#1171930).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-25"/>
	<updated date="2020-05-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171477">SUSE bug 1171477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171930">SUSE bug 1171930</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10722/">CVE-2020-10722 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10722">CVE-2020-10722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557461" comment="dpdk-16.11.9-11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557462" comment="dpdk-kmp-default-16.11.9_k4.4.140_96.58.TDC-11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557463" comment="dpdk-tools-16.11.9-11.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152174" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1136085" ref_url="https://bugzilla.suse.com/1136085" source="BUGZILLA"/>
		<reference ref_id="1159723" ref_url="https://bugzilla.suse.com/1159723" source="BUGZILLA"/>
		<reference ref_id="1159729" ref_url="https://bugzilla.suse.com/1159729" source="BUGZILLA"/>
		<reference ref_id="1164825" ref_url="https://bugzilla.suse.com/1164825" source="BUGZILLA"/>
		<reference ref_id="1171928" ref_url="https://bugzilla.suse.com/1171928" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221/" source="CVE"/>
		<reference ref_id="CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418/" source="CVE"/>
		<reference ref_id="CVE-2019-17563" ref_url="https://www.suse.com/security/cve/CVE-2019-17563/" source="CVE"/>
		<reference ref_id="CVE-2019-17569" ref_url="https://www.suse.com/security/cve/CVE-2019-17569/" source="CVE"/>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

CVE-2020-9484 (bsc#1171928)
Apache Tomcat Remote Code Execution via session persistence

If an attacker was able to control the contents and name of a file on a
server configured to use the PersistenceManager, then the attacker could
have triggered a remote code execution via deserialization of the file under
their control.

CVE-2019-12418 (bsc#1159723)
Local privilege escalation by manipulating the RMI registry and performing a man-in-the-middle attack

When Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files was able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface.
The attacker could then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.

CVE-2019-0221 (bsc#1136085)
The SSI printenv command echoed user provided data without escaping, which
made it vulnerable to XSS.

CVE-2019-17563 (bsc#1159729)
When using FORM authentication there was a narrow window where an attacker could perform a session fixation attack.

CVE-2019-17569 (bsc#1164825)
Invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling
if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-28"/>
	<updated date="2020-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136085">SUSE bug 1136085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159723">SUSE bug 1159723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159729">SUSE bug 1159729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164825">SUSE bug 1164825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171928">SUSE bug 1171928</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0221">CVE-2019-0221 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12418">CVE-2019-12418 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17563/">CVE-2019-17563 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17563">CVE-2019-17563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17569/">CVE-2019-17569 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17569">CVE-2019-17569 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9484">CVE-2020-9484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530964" comment="tomcat-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530965" comment="tomcat-admin-webapps-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530966" comment="tomcat-docs-webapp-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530967" comment="tomcat-el-3_0-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530968" comment="tomcat-javadoc-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530969" comment="tomcat-jsp-2_3-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530970" comment="tomcat-lib-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530971" comment="tomcat-servlet-3_1-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530972" comment="tomcat-webapps-8.0.53-29.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152175" version="1" class="patch">
	<metadata>
		<title>Security update for file-roller (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1169428" ref_url="https://bugzilla.suse.com/1169428" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11736" ref_url="https://www.suse.com/security/cve/CVE-2020-11736/" source="CVE"/>
		<description>
This update for file-roller fixes the following issues:

Security issue fixed:

- CVE-2020-11736: Fixed a directory traversal vulnerability due to improper checking whether a file's parent is an external symlink (bsc#1169428).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-29"/>
	<updated date="2020-05-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169428">SUSE bug 1169428</bugzilla>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-11736/">CVE-2020-11736 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11736">CVE-2020-11736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557464" comment="file-roller-3.20.3-15.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557465" comment="file-roller-lang-3.20.3-15.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557466" comment="nautilus-file-roller-3.20.3-15.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152176" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027282" ref_url="https://bugzilla.suse.com/1027282" source="BUGZILLA"/>
		<reference ref_id="1041090" ref_url="https://bugzilla.suse.com/1041090" source="BUGZILLA"/>
		<reference ref_id="1042670" ref_url="https://bugzilla.suse.com/1042670" source="BUGZILLA"/>
		<reference ref_id="1073269" ref_url="https://bugzilla.suse.com/1073269" source="BUGZILLA"/>
		<reference ref_id="1073748" ref_url="https://bugzilla.suse.com/1073748" source="BUGZILLA"/>
		<reference ref_id="1078326" ref_url="https://bugzilla.suse.com/1078326" source="BUGZILLA"/>
		<reference ref_id="1078485" ref_url="https://bugzilla.suse.com/1078485" source="BUGZILLA"/>
		<reference ref_id="1081750" ref_url="https://bugzilla.suse.com/1081750" source="BUGZILLA"/>
		<reference ref_id="1084650" ref_url="https://bugzilla.suse.com/1084650" source="BUGZILLA"/>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1153830" ref_url="https://bugzilla.suse.com/1153830" source="BUGZILLA"/>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1159035" ref_url="https://bugzilla.suse.com/1159035" source="BUGZILLA"/>
		<reference ref_id="1162224" ref_url="https://bugzilla.suse.com/1162224" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="1170411" ref_url="https://bugzilla.suse.com/1170411" source="BUGZILLA"/>
		<reference ref_id="1171561" ref_url="https://bugzilla.suse.com/1171561" source="BUGZILLA"/>
		<reference ref_id="945401" ref_url="https://bugzilla.suse.com/945401" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<description>


This update for python to version 2.7.17 fixes the following issues:

Syncing with lots of upstream bug fixes and security fixes.

Bug fixes:

- CVE-2019-9674: Improved the documentation to reflect the dangers of zip-bombs (bsc#1162825).
- CVE-2019-18348: Fixed a CRLF injection via the host part of the url passed to urlopen(). Now an InvalidURL exception is raised (bsc#1155094).
- CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367).
- Fixed mismatches between libpython and python-base versions (bsc#1162224).
- Fixed segfault in libpython2.7.so.1 (bsc#1073748).
- Unified packages among openSUSE:Factory and SLE versions (bsc#1159035).
- Added idle.desktop and idle.appdata.xml to provide IDLE in menus (bsc#1153830).
- Excluded tsl_check files from python-base to prevent file conflict with python-strict-tls-checks package (bsc#945401).
- Changed the name of idle3 icons to idle3.png to avoid collision with Python 2 version (bsc#1165894).

Additionally a new 'shared-python-startup' package is provided containing startup files.

python-rpm-macros was updated to fix:

- Do not write .pyc files for tests (bsc#1171561)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-03"/>
	<updated date="2020-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027282">SUSE bug 1027282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041090">SUSE bug 1041090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042670">SUSE bug 1042670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073269">SUSE bug 1073269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073748">SUSE bug 1073748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078326">SUSE bug 1078326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078485">SUSE bug 1078485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081750">SUSE bug 1081750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084650">SUSE bug 1084650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153830">SUSE bug 1153830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159035">SUSE bug 1159035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162224">SUSE bug 1162224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170411">SUSE bug 1170411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171561">SUSE bug 1171561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945401">SUSE bug 945401</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530973" comment="libpython2_7-1_0-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530974" comment="libpython2_7-1_0-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530975" comment="python-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530976" comment="python-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530977" comment="python-base-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530978" comment="python-base-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530979" comment="python-curses-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530980" comment="python-demo-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530981" comment="python-devel-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530982" comment="python-doc-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530983" comment="python-doc-pdf-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530984" comment="python-gdbm-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530985" comment="python-idle-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530986" comment="python-rpm-macros-20200207.5feb6c1-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530987" comment="python-tk-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530988" comment="python-xml-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530989" comment="shared-python-startup-0.1-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152177" version="1" class="patch">
	<metadata>
		<title>Security update for krb5-appl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1165787" ref_url="https://bugzilla.suse.com/1165787" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10188" ref_url="https://www.suse.com/security/cve/CVE-2020-10188/" source="CVE"/>
		<description>
This update for krb5-appl fixes the following issues:

- CVE-2020-10188: Fixed a remote root execution (bsc#1165787).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165787">SUSE bug 1165787</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10188/">CVE-2020-10188 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10188">CVE-2020-10188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531003" comment="krb5-appl-clients-1.0.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531004" comment="krb5-appl-servers-1.0.3-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152178" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1055857" ref_url="https://bugzilla.suse.com/1055857" source="BUGZILLA"/>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="1171475" ref_url="https://bugzilla.suse.com/1171475" source="BUGZILLA"/>
		<reference ref_id="1171847" ref_url="https://bugzilla.suse.com/1171847" source="BUGZILLA"/>
		<reference ref_id="1172105" ref_url="https://bugzilla.suse.com/1172105" source="BUGZILLA"/>
		<reference ref_id="1172116" ref_url="https://bugzilla.suse.com/1172116" source="BUGZILLA"/>
		<reference ref_id="1172121" ref_url="https://bugzilla.suse.com/1172121" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328/" source="CVE"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="CVE-2020-0093" ref_url="https://www.suse.com/security/cve/CVE-2020-0093/" source="CVE"/>
		<reference ref_id="CVE-2020-12767" ref_url="https://www.suse.com/security/cve/CVE-2020-12767/" source="CVE"/>
		<reference ref_id="CVE-2020-13112" ref_url="https://www.suse.com/security/cve/CVE-2020-13112/" source="CVE"/>
		<reference ref_id="CVE-2020-13113" ref_url="https://www.suse.com/security/cve/CVE-2020-13113/" source="CVE"/>
		<reference ref_id="CVE-2020-13114" ref_url="https://www.suse.com/security/cve/CVE-2020-13114/" source="CVE"/>
		<description>
This update for libexif fixes the following issues:

Security issues fixed:

- CVE-2016-6328: Fixed an integer overflow in parsing MNOTE entry data of the input file (bsc#1055857).
- CVE-2017-7544: Fixed an out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c (bsc#1059893).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2020-0093: Fixed an out-of-bounds read in exif_data_save_data_entry (bsc#1171847).
- CVE-2020-12767: Fixed a divide-by-zero error in exif_entry_get_value (bsc#1171475).
- CVE-2020-13112: Fixed a time consumption DoS when parsing canon array markers (bsc#1172121).
- CVE-2020-13113: Fixed a potential use of uninitialized memory (bsc#1172105).
- CVE-2020-13114: Fixed various buffer overread fixes due to integer overflows in maker notes (bsc#1172116).

Non-security issues fixed:

- libexif was updated to version 0.6.22:
  * New translations: ms
  * Updated translations for most languages
  * Some useful EXIF 2.3 tag added:
    * EXIF_TAG_GAMMA
    * EXIF_TAG_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_IMAGE_NUMBER_OF_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_EXPOSURE_TIMES_OF_COMPOSITE_IMAGE
    * EXIF_TAG_GPS_H_POSITIONING_ERROR
    * EXIF_TAG_CAMERA_OWNER_NAME
    * EXIF_TAG_BODY_SERIAL_NUMBER
    * EXIF_TAG_LENS_SPECIFICATION
    * EXIF_TAG_LENS_MAKE
    * EXIF_TAG_LENS_MODEL
    * EXIF_TAG_LENS_SERIAL_NUMBER
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055857">SUSE bug 1055857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171475">SUSE bug 1171475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171847">SUSE bug 1171847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172105">SUSE bug 1172105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172116">SUSE bug 1172116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172121">SUSE bug 1172121</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6328">CVE-2016-6328 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7544">CVE-2017-7544 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20030">CVE-2018-20030 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9278">CVE-2019-9278 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0093/">CVE-2020-0093 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0093">CVE-2020-0093 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12767/">CVE-2020-12767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12767">CVE-2020-12767 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13112/">CVE-2020-13112 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13112">CVE-2020-13112 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13113/">CVE-2020-13113 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13113">CVE-2020-13113 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13114/">CVE-2020-13114 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13114">CVE-2020-13114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531005" comment="libexif12-0.6.22-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531006" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152179" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="1146873" ref_url="https://bugzilla.suse.com/1146873" source="BUGZILLA"/>
		<reference ref_id="1149811" ref_url="https://bugzilla.suse.com/1149811" source="BUGZILLA"/>
		<reference ref_id="1160024" ref_url="https://bugzilla.suse.com/1160024" source="BUGZILLA"/>
		<reference ref_id="1161066" ref_url="https://bugzilla.suse.com/1161066" source="BUGZILLA"/>
		<reference ref_id="1163018" ref_url="https://bugzilla.suse.com/1163018" source="BUGZILLA"/>
		<reference ref_id="1166240" ref_url="https://bugzilla.suse.com/1166240" source="BUGZILLA"/>
		<reference ref_id="1170940" ref_url="https://bugzilla.suse.com/1170940" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2020-1711: Fixed a potential OOB access in the iSCSI client code (bsc#1166240).
- CVE-2019-12068: Fixed a potential DoS in the LSI SCSI controller emulation (bsc#1146873).
- CVE-2020-1983: Fixed a use-after-free in the ip_reass function of slirp (bsc#1170940).
- CVE-2020-8608: Fixed a potential OOB access in slirp (bsc#1163018).
- CVE-2020-7039: Fixed a potential OOB access in slirp (bsc#1161066).
- CVE-2019-15890: Fixed a use-after-free during packet reassembly in slirp (bsc#1149811).
- Fixed multiple potential DoS issues in SLIRP, similar to CVE-2019-6778 (bsc#1123156).

Non-security issue fixed:

- Make sure that required memory is mapped properly during an incoming migration of a Xen HVM domU (bsc#1160024).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146873">SUSE bug 1146873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149811">SUSE bug 1149811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160024">SUSE bug 1160024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161066">SUSE bug 1161066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163018">SUSE bug 1163018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166240">SUSE bug 1166240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170940">SUSE bug 1170940</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12068">CVE-2019-12068 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1711">CVE-2020-1711 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1983">CVE-2020-1983 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7039">CVE-2020-7039 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555711" comment="qemu-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555712" comment="qemu-block-curl-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555713" comment="qemu-block-iscsi-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538416" comment="qemu-block-rbd-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555714" comment="qemu-block-ssh-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555715" comment="qemu-guest-agent-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538419" comment="qemu-ipxe-1.0.0+-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538420" comment="qemu-kvm-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555716" comment="qemu-lang-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538423" comment="qemu-seabios-1.10.2-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538424" comment="qemu-sgabios-8-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555717" comment="qemu-tools-2.9.1-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538426" comment="qemu-vgabios-1.10.2-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538427" comment="qemu-x86-2.9.1-6.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152180" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172031" ref_url="https://bugzilla.suse.com/1172031" source="BUGZILLA"/>
		<reference ref_id="1172225" ref_url="https://bugzilla.suse.com/1172225" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807/" source="CVE"/>
		<description>
This update for vim fixes the following issues:

- CVE-2019-20807: Fixed an issue where escaping from the restrictive mode of vim 
  was possible using interfaces (bsc#1172225 and bsc#1172031).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172031">SUSE bug 1172031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172225">SUSE bug 1172225</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20807">CVE-2019-20807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531007" comment="gvim-7.4.326-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531008" comment="vim-7.4.326-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531009" comment="vim-data-7.4.326-17.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152181" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172402" ref_url="https://bugzilla.suse.com/1172402" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- MozillaFirefox was updated to version 68.9.0 Extended Support Release (bsc#1172402).

- CVE-2020-12405: Fixed a use-after-free in SharedWorkerService. 
- CVE-2020-12406: Fixed a JavaScript Type confusion with NativeTypes.
- CVE-2020-12410: Fixed multiple memory safety bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12405">CVE-2020-12405 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12406">CVE-2020-12406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12410">CVE-2020-12410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531010" comment="MozillaFirefox-68.9.0-109.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531012" comment="MozillaFirefox-translations-common-68.9.0-109.123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152182" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1043983" ref_url="https://bugzilla.suse.com/1043983" source="BUGZILLA"/>
		<reference ref_id="1048072" ref_url="https://bugzilla.suse.com/1048072" source="BUGZILLA"/>
		<reference ref_id="1055265" ref_url="https://bugzilla.suse.com/1055265" source="BUGZILLA"/>
		<reference ref_id="1056286" ref_url="https://bugzilla.suse.com/1056286" source="BUGZILLA"/>
		<reference ref_id="1056782" ref_url="https://bugzilla.suse.com/1056782" source="BUGZILLA"/>
		<reference ref_id="1058754" ref_url="https://bugzilla.suse.com/1058754" source="BUGZILLA"/>
		<reference ref_id="1058755" ref_url="https://bugzilla.suse.com/1058755" source="BUGZILLA"/>
		<reference ref_id="1058757" ref_url="https://bugzilla.suse.com/1058757" source="BUGZILLA"/>
		<reference ref_id="1062452" ref_url="https://bugzilla.suse.com/1062452" source="BUGZILLA"/>
		<reference ref_id="1069607" ref_url="https://bugzilla.suse.com/1069607" source="BUGZILLA"/>
		<reference ref_id="1069632" ref_url="https://bugzilla.suse.com/1069632" source="BUGZILLA"/>
		<reference ref_id="1073002" ref_url="https://bugzilla.suse.com/1073002" source="BUGZILLA"/>
		<reference ref_id="1078782" ref_url="https://bugzilla.suse.com/1078782" source="BUGZILLA"/>
		<reference ref_id="1082007" ref_url="https://bugzilla.suse.com/1082007" source="BUGZILLA"/>
		<reference ref_id="1082008" ref_url="https://bugzilla.suse.com/1082008" source="BUGZILLA"/>
		<reference ref_id="1082009" ref_url="https://bugzilla.suse.com/1082009" source="BUGZILLA"/>
		<reference ref_id="1082010" ref_url="https://bugzilla.suse.com/1082010" source="BUGZILLA"/>
		<reference ref_id="1082011" ref_url="https://bugzilla.suse.com/1082011" source="BUGZILLA"/>
		<reference ref_id="1082014" ref_url="https://bugzilla.suse.com/1082014" source="BUGZILLA"/>
		<reference ref_id="1082058" ref_url="https://bugzilla.suse.com/1082058" source="BUGZILLA"/>
		<reference ref_id="1087433" ref_url="https://bugzilla.suse.com/1087433" source="BUGZILLA"/>
		<reference ref_id="1087434" ref_url="https://bugzilla.suse.com/1087434" source="BUGZILLA"/>
		<reference ref_id="1087436" ref_url="https://bugzilla.suse.com/1087436" source="BUGZILLA"/>
		<reference ref_id="1087437" ref_url="https://bugzilla.suse.com/1087437" source="BUGZILLA"/>
		<reference ref_id="1087440" ref_url="https://bugzilla.suse.com/1087440" source="BUGZILLA"/>
		<reference ref_id="1087441" ref_url="https://bugzilla.suse.com/1087441" source="BUGZILLA"/>
		<reference ref_id="1112530" ref_url="https://bugzilla.suse.com/1112530" source="BUGZILLA"/>
		<reference ref_id="1112532" ref_url="https://bugzilla.suse.com/1112532" source="BUGZILLA"/>
		<reference ref_id="1130611" ref_url="https://bugzilla.suse.com/1130611" source="BUGZILLA"/>
		<reference ref_id="1130617" ref_url="https://bugzilla.suse.com/1130617" source="BUGZILLA"/>
		<reference ref_id="1130620" ref_url="https://bugzilla.suse.com/1130620" source="BUGZILLA"/>
		<reference ref_id="1130622" ref_url="https://bugzilla.suse.com/1130622" source="BUGZILLA"/>
		<reference ref_id="1130623" ref_url="https://bugzilla.suse.com/1130623" source="BUGZILLA"/>
		<reference ref_id="1130627" ref_url="https://bugzilla.suse.com/1130627" source="BUGZILLA"/>
		<reference ref_id="1152990" ref_url="https://bugzilla.suse.com/1152990" source="BUGZILLA"/>
		<reference ref_id="1152992" ref_url="https://bugzilla.suse.com/1152992" source="BUGZILLA"/>
		<reference ref_id="1152994" ref_url="https://bugzilla.suse.com/1152994" source="BUGZILLA"/>
		<reference ref_id="1152995" ref_url="https://bugzilla.suse.com/1152995" source="BUGZILLA"/>
		<reference ref_id="1171517" ref_url="https://bugzilla.suse.com/1171517" source="BUGZILLA"/>
		<reference ref_id="1172275" ref_url="https://bugzilla.suse.com/1172275" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9096" ref_url="https://www.suse.com/security/cve/CVE-2015-9096/" source="CVE"/>
		<reference ref_id="CVE-2016-2339" ref_url="https://www.suse.com/security/cve/CVE-2016-2339/" source="CVE"/>
		<reference ref_id="CVE-2016-7798" ref_url="https://www.suse.com/security/cve/CVE-2016-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-0898" ref_url="https://www.suse.com/security/cve/CVE-2017-0898/" source="CVE"/>
		<reference ref_id="CVE-2017-0899" ref_url="https://www.suse.com/security/cve/CVE-2017-0899/" source="CVE"/>
		<reference ref_id="CVE-2017-0900" ref_url="https://www.suse.com/security/cve/CVE-2017-0900/" source="CVE"/>
		<reference ref_id="CVE-2017-0901" ref_url="https://www.suse.com/security/cve/CVE-2017-0901/" source="CVE"/>
		<reference ref_id="CVE-2017-0902" ref_url="https://www.suse.com/security/cve/CVE-2017-0902/" source="CVE"/>
		<reference ref_id="CVE-2017-0903" ref_url="https://www.suse.com/security/cve/CVE-2017-0903/" source="CVE"/>
		<reference ref_id="CVE-2017-10784" ref_url="https://www.suse.com/security/cve/CVE-2017-10784/" source="CVE"/>
		<reference ref_id="CVE-2017-14033" ref_url="https://www.suse.com/security/cve/CVE-2017-14033/" source="CVE"/>
		<reference ref_id="CVE-2017-14064" ref_url="https://www.suse.com/security/cve/CVE-2017-14064/" source="CVE"/>
		<reference ref_id="CVE-2017-17405" ref_url="https://www.suse.com/security/cve/CVE-2017-17405/" source="CVE"/>
		<reference ref_id="CVE-2017-17742" ref_url="https://www.suse.com/security/cve/CVE-2017-17742/" source="CVE"/>
		<reference ref_id="CVE-2017-17790" ref_url="https://www.suse.com/security/cve/CVE-2017-17790/" source="CVE"/>
		<reference ref_id="CVE-2017-9228" ref_url="https://www.suse.com/security/cve/CVE-2017-9228/" source="CVE"/>
		<reference ref_id="CVE-2017-9229" ref_url="https://www.suse.com/security/cve/CVE-2017-9229/" source="CVE"/>
		<reference ref_id="CVE-2018-1000073" ref_url="https://www.suse.com/security/cve/CVE-2018-1000073/" source="CVE"/>
		<reference ref_id="CVE-2018-1000074" ref_url="https://www.suse.com/security/cve/CVE-2018-1000074/" source="CVE"/>
		<reference ref_id="CVE-2018-1000075" ref_url="https://www.suse.com/security/cve/CVE-2018-1000075/" source="CVE"/>
		<reference ref_id="CVE-2018-1000076" ref_url="https://www.suse.com/security/cve/CVE-2018-1000076/" source="CVE"/>
		<reference ref_id="CVE-2018-1000077" ref_url="https://www.suse.com/security/cve/CVE-2018-1000077/" source="CVE"/>
		<reference ref_id="CVE-2018-1000078" ref_url="https://www.suse.com/security/cve/CVE-2018-1000078/" source="CVE"/>
		<reference ref_id="CVE-2018-1000079" ref_url="https://www.suse.com/security/cve/CVE-2018-1000079/" source="CVE"/>
		<reference ref_id="CVE-2018-16395" ref_url="https://www.suse.com/security/cve/CVE-2018-16395/" source="CVE"/>
		<reference ref_id="CVE-2018-16396" ref_url="https://www.suse.com/security/cve/CVE-2018-16396/" source="CVE"/>
		<reference ref_id="CVE-2018-6914" ref_url="https://www.suse.com/security/cve/CVE-2018-6914/" source="CVE"/>
		<reference ref_id="CVE-2018-8777" ref_url="https://www.suse.com/security/cve/CVE-2018-8777/" source="CVE"/>
		<reference ref_id="CVE-2018-8778" ref_url="https://www.suse.com/security/cve/CVE-2018-8778/" source="CVE"/>
		<reference ref_id="CVE-2018-8779" ref_url="https://www.suse.com/security/cve/CVE-2018-8779/" source="CVE"/>
		<reference ref_id="CVE-2018-8780" ref_url="https://www.suse.com/security/cve/CVE-2018-8780/" source="CVE"/>
		<reference ref_id="CVE-2019-15845" ref_url="https://www.suse.com/security/cve/CVE-2019-15845/" source="CVE"/>
		<reference ref_id="CVE-2019-16201" ref_url="https://www.suse.com/security/cve/CVE-2019-16201/" source="CVE"/>
		<reference ref_id="CVE-2019-16254" ref_url="https://www.suse.com/security/cve/CVE-2019-16254/" source="CVE"/>
		<reference ref_id="CVE-2019-16255" ref_url="https://www.suse.com/security/cve/CVE-2019-16255/" source="CVE"/>
		<reference ref_id="CVE-2019-8320" ref_url="https://www.suse.com/security/cve/CVE-2019-8320/" source="CVE"/>
		<reference ref_id="CVE-2019-8321" ref_url="https://www.suse.com/security/cve/CVE-2019-8321/" source="CVE"/>
		<reference ref_id="CVE-2019-8322" ref_url="https://www.suse.com/security/cve/CVE-2019-8322/" source="CVE"/>
		<reference ref_id="CVE-2019-8323" ref_url="https://www.suse.com/security/cve/CVE-2019-8323/" source="CVE"/>
		<reference ref_id="CVE-2019-8324" ref_url="https://www.suse.com/security/cve/CVE-2019-8324/" source="CVE"/>
		<reference ref_id="CVE-2019-8325" ref_url="https://www.suse.com/security/cve/CVE-2019-8325/" source="CVE"/>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<description>
This update for ruby2.1 fixes the following issues:

Security issues fixed:

- CVE-2015-9096: Fixed an SMTP command injection via CRLFsequences in a RCPT TO or MAIL FROM command (bsc#1043983).
- CVE-2016-7798: Fixed an IV Reuse in GCM Mode (bsc#1055265).
- CVE-2017-0898: Fixed a buffer underrun vulnerability in Kernel.sprintf (bsc#1058755).
- CVE-2017-0899: Fixed an issue with malicious gem specifications, insufficient sanitation when printing gem specifications could have included terminal characters (bsc#1056286).
- CVE-2017-0900: Fixed an issue with malicious gem specifications, the query command could have led to a denial of service attack against clients (bsc#1056286).
- CVE-2017-0901: Fixed an issue with malicious gem specifications, potentially overwriting arbitrary files on the client system (bsc#1056286).
- CVE-2017-0902: Fixed an issue with malicious gem specifications, that could have enabled MITM attacks against clients (bsc#1056286).
- CVE-2017-0903: Fixed an unsafe object deserialization vulnerability (bsc#1062452).
- CVE-2017-9228: Fixed a heap out-of-bounds write in bitset_set_range() during regex compilation (bsc#1069607).
- CVE-2017-9229: Fixed an invalid pointer dereference in left_adjust_char_head() in oniguruma (bsc#1069632).
- CVE-2017-10784: Fixed an escape sequence injection vulnerability in the Basic authentication of WEBrick (bsc#1058754).
- CVE-2017-14033: Fixed a buffer underrun vulnerability in OpenSSL ASN1 decode (bsc#1058757).
- CVE-2017-14064: Fixed an arbitrary memory exposure during a JSON.generate call (bsc#1056782).
- CVE-2017-17405: Fixed a command injection vulnerability in Net::FTP (bsc#1073002).
- CVE-2017-17742: Fixed an HTTP response splitting issue in WEBrick (bsc#1087434).
- CVE-2017-17790: Fixed a command injection in lib/resolv.rb:lazy_initialize() (bsc#1078782).
- CVE-2018-6914: Fixed an unintentional file and directory creation with directory traversal in tempfile and tmpdir (bsc#1087441).
- CVE-2018-8777: Fixed a potential DoS caused by large requests in WEBrick (bsc#1087436).
- CVE-2018-8778: Fixed a buffer under-read in String#unpack (bsc#1087433).
- CVE-2018-8779: Fixed an unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket (bsc#1087440).
- CVE-2018-8780: Fixed an unintentional directory traversal by poisoned NUL byte in Dir (bsc#1087437).
- CVE-2018-16395: Fixed an issue with OpenSSL::X509::Name equality checking (bsc#1112530).
- CVE-2018-16396: Fixed an issue with tainted string handling, where the flag was not propagated in Array#pack and String#unpack with some directives (bsc#1112532).
- CVE-2018-1000073: Fixed a path traversal issue (bsc#1082007).
- CVE-2018-1000074: Fixed an unsafe object deserialization vulnerability in gem owner, allowing arbitrary code execution with specially crafted YAML (bsc#1082008).
- CVE-2018-1000075: Fixed an infinite loop vulnerability due to negative size in tar header causes Denial of Service (bsc#1082014).
- CVE-2018-1000076: Fixed an improper verification of signatures in tarballs (bsc#1082009).
- CVE-2018-1000077: Fixed an improper URL validation in the homepage attribute of ruby gems (bsc#1082010).
- CVE-2018-1000078: Fixed a XSS vulnerability in the homepage attribute when displayed via gem server (bsc#1082011).
- CVE-2018-1000079: Fixed a path traversal issue during gem installation allows to write to arbitrary filesystem locations (bsc#1082058).
- CVE-2019-8320: Fixed a directory traversal issue when decompressing tar files (bsc#1130627).
- CVE-2019-8321: Fixed an escape sequence injection vulnerability in verbose (bsc#1130623).
- CVE-2019-8322: Fixed an escape sequence injection vulnerability in gem owner (bsc#1130622).
- CVE-2019-8323: Fixed an escape sequence injection vulnerability in API response handling (bsc#1130620).
- CVE-2019-8324: Fixed an issue with malicious gems that may have led to arbitrary code execution (bsc#1130617).
- CVE-2019-8325: Fixed an escape sequence injection vulnerability in errors (bsc#1130611).
- CVE-2019-15845: Fixed a NUL injection vulnerability in File.fnmatch and File.fnmatch? (bsc#1152994).
- CVE-2019-16201: Fixed a regular expression denial of service vulnerability in WEBrick's digest access authentication (bsc#1152995).
- CVE-2019-16254: Fixed an HTTP response splitting vulnerability in WEBrick (bsc#1152992).
- CVE-2019-16255: Fixed a code injection vulnerability in Shell#[] and Shell#test (bsc#1152990).
- CVE-2020-10663: Fixed an unsafe object creation vulnerability in JSON (bsc#1171517).

Non-security issue fixed:

- Add conflicts to libruby to make sure ruby and ruby-stdlib are also updated when libruby is updated (bsc#1048072).

Also yast2-ruby-bindings on SLES 12 SP2 LTSS was updated to handle the updated ruby interpreter. (bsc#1172275)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1043983">SUSE bug 1043983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048072">SUSE bug 1048072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055265">SUSE bug 1055265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056286">SUSE bug 1056286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056782">SUSE bug 1056782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058754">SUSE bug 1058754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058755">SUSE bug 1058755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058757">SUSE bug 1058757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062452">SUSE bug 1062452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069607">SUSE bug 1069607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069632">SUSE bug 1069632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073002">SUSE bug 1073002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078782">SUSE bug 1078782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082007">SUSE bug 1082007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082008">SUSE bug 1082008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082009">SUSE bug 1082009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082010">SUSE bug 1082010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082011">SUSE bug 1082011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082014">SUSE bug 1082014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082058">SUSE bug 1082058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087433">SUSE bug 1087433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087434">SUSE bug 1087434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087436">SUSE bug 1087436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087437">SUSE bug 1087437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087440">SUSE bug 1087440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087441">SUSE bug 1087441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112530">SUSE bug 1112530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112532">SUSE bug 1112532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130611">SUSE bug 1130611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130617">SUSE bug 1130617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130620">SUSE bug 1130620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130622">SUSE bug 1130622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130623">SUSE bug 1130623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130627">SUSE bug 1130627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152990">SUSE bug 1152990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152992">SUSE bug 1152992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152994">SUSE bug 1152994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152995">SUSE bug 1152995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171517">SUSE bug 1171517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172275">SUSE bug 1172275</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-9096/">CVE-2015-9096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-9096">CVE-2015-9096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2339/">CVE-2016-2339 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2339">CVE-2016-2339 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7798/">CVE-2016-7798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7798">CVE-2016-7798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0898/">CVE-2017-0898 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0898">CVE-2017-0898 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-0899/">CVE-2017-0899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0899">CVE-2017-0899 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-0900/">CVE-2017-0900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0900">CVE-2017-0900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-0901/">CVE-2017-0901 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0901">CVE-2017-0901 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0902/">CVE-2017-0902 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0902">CVE-2017-0902 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0903/">CVE-2017-0903 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0903">CVE-2017-0903 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10784/">CVE-2017-10784 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10784">CVE-2017-10784 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14033/">CVE-2017-14033 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14033">CVE-2017-14033 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14064/">CVE-2017-14064 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14064">CVE-2017-14064 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17405/">CVE-2017-17405 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17405">CVE-2017-17405 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17742/">CVE-2017-17742 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17742">CVE-2017-17742 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17790/">CVE-2017-17790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17790">CVE-2017-17790 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9228/">CVE-2017-9228 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9228">CVE-2017-9228 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9229/">CVE-2017-9229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9229">CVE-2017-9229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000073/">CVE-2018-1000073 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000073">CVE-2018-1000073 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000074/">CVE-2018-1000074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000074">CVE-2018-1000074 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000075/">CVE-2018-1000075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000075">CVE-2018-1000075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000076/">CVE-2018-1000076 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000076">CVE-2018-1000076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000077/">CVE-2018-1000077 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000077">CVE-2018-1000077 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000078/">CVE-2018-1000078 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000078">CVE-2018-1000078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000079/">CVE-2018-1000079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000079">CVE-2018-1000079 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16395/">CVE-2018-16395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16395">CVE-2018-16395 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16396/">CVE-2018-16396 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16396">CVE-2018-16396 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6914/">CVE-2018-6914 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6914">CVE-2018-6914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8777/">CVE-2018-8777 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8777">CVE-2018-8777 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8778/">CVE-2018-8778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8778">CVE-2018-8778 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8779/">CVE-2018-8779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8779">CVE-2018-8779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8780/">CVE-2018-8780 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8780">CVE-2018-8780 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-15845/">CVE-2019-15845 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15845">CVE-2019-15845 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16201/">CVE-2019-16201 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16201">CVE-2019-16201 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16254/">CVE-2019-16254 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16254">CVE-2019-16254 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-16255/">CVE-2019-16255 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16255">CVE-2019-16255 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8320/">CVE-2019-8320 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8320">CVE-2019-8320 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8321/">CVE-2019-8321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8321">CVE-2019-8321 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8322/">CVE-2019-8322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8322">CVE-2019-8322 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8323/">CVE-2019-8323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8323">CVE-2019-8323 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8324/">CVE-2019-8324 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8324">CVE-2019-8324 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8325/">CVE-2019-8325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8325">CVE-2019-8325 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152183" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk to version 7u261 fixes the following issues:

- CVE-2020-2756: Better mapping of serial ENUMs (bsc#1169511)
- CVE-2020-2757: Less Blocking Array Queues (bsc#1169511)
- CVE-2020-2773: Better signatures in XML (bsc#1169511)
- CVE-2020-2781: Improve TLS session handling (bsc#1169511)
- CVE-2020-2800: Better Headings for HTTP Servers (bsc#1169511)
- CVE-2020-2803: Enhance buffering of byte buffers (bsc#1169511)
- CVE-2020-2805: Enhance typing of methods (bsc#1169511)
- CVE-2020-2830: Better Scanner conversions (bsc#1169511)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2773">CVE-2020-2773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531017" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531018" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531019" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531020" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152184" version="1" class="patch">
	<metadata>
		<title>Security update for texlive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1138793" ref_url="https://bugzilla.suse.com/1138793" source="BUGZILLA"/>
		<reference ref_id="1158910" ref_url="https://bugzilla.suse.com/1158910" source="BUGZILLA"/>
		<reference ref_id="1159740" ref_url="https://bugzilla.suse.com/1159740" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8016" ref_url="https://www.suse.com/security/cve/CVE-2020-8016/" source="CVE"/>
		<reference ref_id="CVE-2020-8017" ref_url="https://www.suse.com/security/cve/CVE-2020-8017/" source="CVE"/>
		<description>
This update for texlive fixes the following issues:

Security issues fixed:

- CVE-2020-8016: Fixed a race condition in the spec file (bsc#1159740).
- CVE-2020-8017: Fixed a race condition on a cron job (bsc#1158910).
- Fixed an issue where pstopdf was crashing (bsc#1138793).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1138793">SUSE bug 1138793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158910">SUSE bug 1158910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159740">SUSE bug 1159740</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8016/">CVE-2020-8016 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8016">CVE-2020-8016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8017/">CVE-2020-8017 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8017">CVE-2020-8017 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557467" comment="libkpathsea6-6.2.0dev-22.8.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152185" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159856" ref_url="https://bugzilla.suse.com/1159856" source="BUGZILLA"/>
		<reference ref_id="1159858" ref_url="https://bugzilla.suse.com/1159858" source="BUGZILLA"/>
		<reference ref_id="1159860" ref_url="https://bugzilla.suse.com/1159860" source="BUGZILLA"/>
		<reference ref_id="1160250" ref_url="https://bugzilla.suse.com/1160250" source="BUGZILLA"/>
		<reference ref_id="1160251" ref_url="https://bugzilla.suse.com/1160251" source="BUGZILLA"/>
		<reference ref_id="1160937" ref_url="https://bugzilla.suse.com/1160937" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15691" ref_url="https://www.suse.com/security/cve/CVE-2019-15691/" source="CVE"/>
		<reference ref_id="CVE-2019-15692" ref_url="https://www.suse.com/security/cve/CVE-2019-15692/" source="CVE"/>
		<reference ref_id="CVE-2019-15693" ref_url="https://www.suse.com/security/cve/CVE-2019-15693/" source="CVE"/>
		<reference ref_id="CVE-2019-15694" ref_url="https://www.suse.com/security/cve/CVE-2019-15694/" source="CVE"/>
		<reference ref_id="CVE-2019-15695" ref_url="https://www.suse.com/security/cve/CVE-2019-15695/" source="CVE"/>
		<description>
This update for tigervnc fixes the following issues:

- CVE-2019-15691: Fixed a use-after-return due to incorrect usage of stack memory in ZRLEDecoder (bsc#1159856).
- CVE-2019-15692: Fixed a heap-based buffer overflow in CopyRectDecode (bsc#1160250).
- CVE-2019-15693: Fixed a heap-based buffer overflow in TightDecoder::FilterGradient (bsc#1159858).
- CVE-2019-15694: Fixed a heap-based buffer overflow, caused by improper error handling in processing MemOutStream (bsc#1160251).
- CVE-2019-15695: Fixed a stack-based buffer overflow, which could be triggered from CMsgReader::readSetCursor (bsc#1159860).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159856">SUSE bug 1159856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159858">SUSE bug 1159858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159860">SUSE bug 1159860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160250">SUSE bug 1160250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160251">SUSE bug 1160251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160937">SUSE bug 1160937</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15691/">CVE-2019-15691 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15691">CVE-2019-15691 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15692/">CVE-2019-15692 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15692">CVE-2019-15692 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15693/">CVE-2019-15693 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15693">CVE-2019-15693 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15694/">CVE-2019-15694 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15694">CVE-2019-15694 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15695/">CVE-2019-15695 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15695">CVE-2019-15695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531021" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531022" comment="tigervnc-1.6.0-18.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531023" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152186" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1156353" ref_url="https://bugzilla.suse.com/1156353" source="BUGZILLA"/>
		<reference ref_id="1172466" ref_url="https://bugzilla.suse.com/1172466" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)
  
This update contains security mitigations for:

- CVE-2020-0543: Fixed a side channel attack against special registers
  which could have resulted in leaking of read values to cores other
  than the one which called it.  This attack is known as Special Register
  Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to
  mitigate the Vector Register and L1D Eviction Sampling aka 'CacheOutAttack'
  attacks. (bsc#1156353)

Microcode Table:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  HSW          C0       6-3c-3/32 00000027-&gt;00000028 Core Gen4
  BDW-U/Y      E0/F0    6-3d-4/c0 0000002e-&gt;0000002f Core Gen5
  HSW-U        C0/D0    6-45-1/72 00000025-&gt;00000026 Core Gen4
  HSW-H        C0       6-46-1/32 0000001b-&gt;0000001c Core Gen4
  BDW-H/E3     E0/G0    6-47-1/22 00000021-&gt;00000022 Core Gen5
  SKL-U/Y      D0       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKL-U23e     K1       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKX-SP       B1       6-55-3/97 01000151-&gt;01000157 Xeon Scalable
  SKX-SP       H0/M0/U0 6-55-4/b7 02000065-&gt;02006906 Xeon Scalable
  SKX-D        M1       6-55-4/b7 02000065-&gt;02006906 Xeon D-21xx
  CLX-SP       B0       6-55-6/bf 0400002c-&gt;04002f01 Xeon Scalable Gen2
  CLX-SP       B1       6-55-7/bf 0500002c-&gt;04002f01 Xeon Scalable Gen2
  SKL-H/S      R0/N0    6-5e-3/36 000000d6-&gt;000000dc Core Gen6; Xeon E3 v5
  AML-Y22      H0       6-8e-9/10 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-U/Y      H0       6-8e-9/c0 000000ca-&gt;000000d6 Core Gen7 Mobile
  CFL-U43e     D0       6-8e-a/c0 000000ca-&gt;000000d6 Core Gen8 Mobile
  WHL-U        W0       6-8e-b/d0 000000ca-&gt;000000d6 Core Gen8 Mobile
  AML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  CML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  WHL-U        V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-G/H/S/E3 B0       6-9e-9/2a 000000ca-&gt;000000d6 Core Gen7; Xeon E3 v6
  CFL-H/S/E3   U0       6-9e-a/22 000000ca-&gt;000000d6 Core Gen8 Desktop, Mobile, Xeon E
  CFL-S        B0       6-9e-b/02 000000ca-&gt;000000d6 Core Gen8
  CFL-H/S      P0       6-9e-c/22 000000ca-&gt;000000d6 Core Gen9
  CFL-H        R0       6-9e-d/22 000000ca-&gt;000000d6 Core Gen9 Mobile

Also contains the Intel CPU Microcode update to 20200520:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061f-&gt;00000621 Xeon E3/E5, Core X
  SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000718-&gt;0000071a Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172466">SUSE bug 1172466</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0548">CVE-2020-0548 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0549">CVE-2020-0549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531024" comment="ucode-intel-20200602-13.68.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152187" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159478" ref_url="https://bugzilla.suse.com/1159478" source="BUGZILLA"/>
		<reference ref_id="1159479" ref_url="https://bugzilla.suse.com/1159479" source="BUGZILLA"/>
		<reference ref_id="1159482" ref_url="https://bugzilla.suse.com/1159482" source="BUGZILLA"/>
		<reference ref_id="1159486" ref_url="https://bugzilla.suse.com/1159486" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18388" ref_url="https://www.suse.com/security/cve/CVE-2019-18388/" source="CVE"/>
		<reference ref_id="CVE-2019-18389" ref_url="https://www.suse.com/security/cve/CVE-2019-18389/" source="CVE"/>
		<reference ref_id="CVE-2019-18390" ref_url="https://www.suse.com/security/cve/CVE-2019-18390/" source="CVE"/>
		<reference ref_id="CVE-2019-18391" ref_url="https://www.suse.com/security/cve/CVE-2019-18391/" source="CVE"/>
		<description>
This update for virglrenderer fixes the following issues:

- CVE-2019-18388: Fixed a null pointer dereference which could have led
   to denial of service (bsc#1159479).
- CVE-2019-18390: Fixed an out of bound read which could have led to
  denial of service (bsc#1159478).
- CVE-2019-18389: Fixed a heap buffer overflow which could have led to
  guest escape or denial of service (bsc#1159482).
- CVE-2019-18391: Fixed a heap based buffer overflow which could have led to
  guest escape or denial of service (bsc#1159486).  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159478">SUSE bug 1159478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159479">SUSE bug 1159479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159482">SUSE bug 1159482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159486">SUSE bug 1159486</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18388/">CVE-2019-18388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18388">CVE-2019-18388 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18389/">CVE-2019-18389 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18389">CVE-2019-18389 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18390/">CVE-2019-18390 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18390">CVE-2019-18390 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18391/">CVE-2019-18391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18391">CVE-2019-18391 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522550" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152188" version="1" class="patch">
	<metadata>
		<title>Security update for ed (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1019807" ref_url="https://bugzilla.suse.com/1019807" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5357" ref_url="https://www.suse.com/security/cve/CVE-2017-5357/" source="CVE"/>
		<description>

This update for ed fixes the following security issue:

- CVE-2017-5357: An invalid free in the regular expression handling 
  of the 'ed' command processing could allow local users to crash ed. (bsc#1019807)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-11"/>
	<updated date="2020-06-11"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1019807">SUSE bug 1019807</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5357/">CVE-2017-5357 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5357">CVE-2017-5357 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557468" comment="ed-1.9-4.4.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152189" version="1" class="patch">
	<metadata>
		<title>Security update for adns (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172265" ref_url="https://bugzilla.suse.com/1172265" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9103" ref_url="https://www.suse.com/security/cve/CVE-2017-9103/" source="CVE"/>
		<reference ref_id="CVE-2017-9104" ref_url="https://www.suse.com/security/cve/CVE-2017-9104/" source="CVE"/>
		<reference ref_id="CVE-2017-9105" ref_url="https://www.suse.com/security/cve/CVE-2017-9105/" source="CVE"/>
		<reference ref_id="CVE-2017-9106" ref_url="https://www.suse.com/security/cve/CVE-2017-9106/" source="CVE"/>
		<reference ref_id="CVE-2017-9107" ref_url="https://www.suse.com/security/cve/CVE-2017-9107/" source="CVE"/>
		<reference ref_id="CVE-2017-9108" ref_url="https://www.suse.com/security/cve/CVE-2017-9108/" source="CVE"/>
		<reference ref_id="CVE-2017-9109" ref_url="https://www.suse.com/security/cve/CVE-2017-9109/" source="CVE"/>
		<description>
This update for adns fixes the following issues:
	  
- CVE-2017-9103,CVE-2017-9104,CVE-2017-9105,CVE-2017-9109: Fixed an issue in local recursive resolver
  which could have led to remote code execution (bsc#1172265).
- CVE-2017-9106: Fixed an issue with upstream DNS data sources which could have led to denial of 
  service (bsc#1172265).
- CVE-2017-9107: Fixed an issue when quering domain names which could have led to denial of service (bsc#1172265).
- CVE-2017-9108: Fixed an issue which could have led to denial of service (bsc#1172265).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-12"/>
	<updated date="2020-06-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9103/">CVE-2017-9103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9103">CVE-2017-9103 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9104/">CVE-2017-9104 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9104">CVE-2017-9104 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9105/">CVE-2017-9105 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9105">CVE-2017-9105 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9106/">CVE-2017-9106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9106">CVE-2017-9106 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9107/">CVE-2017-9107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9107">CVE-2017-9107 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9108/">CVE-2017-9108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9108">CVE-2017-9108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9109/">CVE-2017-9109 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9109">CVE-2017-9109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531033" comment="libadns1-1.4-103.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152190" version="1" class="patch">
	<metadata>
		<title>Security update for audiofile (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1100523" ref_url="https://bugzilla.suse.com/1100523" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13440" ref_url="https://www.suse.com/security/cve/CVE-2018-13440/" source="CVE"/>
		<description>
This update for audiofile fixes the following issues:

Security issue fixed:

- CVE-2018-13440: Return AF_FAIL instead of causing NULL pointer dereferences later (bsc#1100523).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-12"/>
	<updated date="2020-06-12"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1100523">SUSE bug 1100523</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13440/">CVE-2018-13440 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13440">CVE-2018-13440 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557469" comment="audiofile-0.3.6-11.7.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557470" comment="libaudiofile1-0.3.6-11.7.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557471" comment="libaudiofile1-32bit-0.3.6-11.7.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152191" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1171550" ref_url="https://bugzilla.suse.com/1171550" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2752" ref_url="https://www.suse.com/security/cve/CVE-2020-2752/" source="CVE"/>
		<reference ref_id="CVE-2020-2812" ref_url="https://www.suse.com/security/cve/CVE-2020-2812/" source="CVE"/>
		<description>
This update for mariadb fixes the following issues:

mariadb was updated to version 10.0.44 (bsc#1171550)

- CVE-2020-2752: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.
- CVE-2020-2812: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-16"/>
	<updated date="2020-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171550">SUSE bug 1171550</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2752/">CVE-2020-2752 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2752">CVE-2020-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2812/">CVE-2020-2812 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2812">CVE-2020-2812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557472" comment="libmysqlclient18-10.0.40.4-29.41.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557473" comment="libmysqlclient18-32bit-10.0.40.4-29.41.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557474" comment="mariadb-10.0.40.4-29.41.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557475" comment="mariadb-client-10.0.40.4-29.41.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557476" comment="mariadb-errormessages-10.0.40.4-29.41.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557477" comment="mariadb-tools-10.0.40.4-29.41.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152192" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1157888" ref_url="https://bugzilla.suse.com/1157888" source="BUGZILLA"/>
		<reference ref_id="1158003" ref_url="https://bugzilla.suse.com/1158003" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1158007" ref_url="https://bugzilla.suse.com/1158007" source="BUGZILLA"/>
		<reference ref_id="1161181" ref_url="https://bugzilla.suse.com/1161181" source="BUGZILLA"/>
		<reference ref_id="1167152" ref_url="https://bugzilla.suse.com/1167152" source="BUGZILLA"/>
		<reference ref_id="1168140" ref_url="https://bugzilla.suse.com/1168140" source="BUGZILLA"/>
		<reference ref_id="1168142" ref_url="https://bugzilla.suse.com/1168142" source="BUGZILLA"/>
		<reference ref_id="1169392" ref_url="https://bugzilla.suse.com/1169392" source="BUGZILLA"/>
		<reference ref_id="1172205" ref_url="https://bugzilla.suse.com/1172205" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19581" ref_url="https://www.suse.com/security/cve/CVE-2019-19581/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-11739" ref_url="https://www.suse.com/security/cve/CVE-2020-11739/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742/" source="CVE"/>
		<reference ref_id="CVE-2020-7211" ref_url="https://www.suse.com/security/cve/CVE-2020-7211/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
  This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1172205).
- CVE-2020-11742: Bad continuation handling in GNTTABOP_copy (bsc#1169392).
- CVE-2020-11740, CVE-2020-11741: xen: XSA-313 multiple xenoprof issues (bsc#1168140).
- CVE-2020-11739: Missing memory barriers in read-write unlock paths (bsc#1168142).
- CVE-2019-19583: Fixed improper checks which could have allowed HVM/PVH guest userspace code to crash the guest, leading to a guest denial of service (bsc#1158004 XSA-308).
- CVE-2019-19581: Fixed a potential out of bounds on 32-bit Arm (bsc#1158003 XSA-307).
- CVE-2019-19580: Fixed a privilege escalation where a malicious PV guest administrator could have been able to escalate their privilege to that of the host (bsc#1158006 XSA-310).
- CVE-2019-19579: Fixed a privilege escalation where an untrusted domain with access to a physical device can DMA into host memory (bsc#1157888 XSA-306).
- CVE-2019-19578: Fixed an issue where a malicious or buggy PV guest could have caused hypervisor crash resulting in denial of service affecting the entire host (bsc#1158005 XSA-309).
- CVE-2019-19577: Fixed an issue where a malicious guest administrator could have caused Xen to access data structures while they are being modified leading to a crash (bsc#1158007 XSA-311). 
- Xenstored Crashed during VM install (bsc#1167152)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-16"/>
	<updated date="2020-06-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161181">SUSE bug 1161181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167152">SUSE bug 1167152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168142">SUSE bug 1168142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19577">CVE-2019-19577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19578">CVE-2019-19578 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19579">CVE-2019-19579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19580">CVE-2019-19580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19581/">CVE-2019-19581 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19581">CVE-2019-19581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19583">CVE-2019-19583 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11739/">CVE-2020-11739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11739">CVE-2020-11739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11740">CVE-2020-11740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11741">CVE-2020-11741 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11742">CVE-2020-11742 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7211/">CVE-2020-7211 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7211">CVE-2020-7211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538437" comment="xen-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538438" comment="xen-doc-html-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538439" comment="xen-libs-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538440" comment="xen-libs-32bit-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538441" comment="xen-tools-4.9.4_06-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538442" comment="xen-tools-domU-4.9.4_06-3.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152193" version="1" class="patch">
	<metadata>
		<title>Security update for gnuplot (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1044638" ref_url="https://bugzilla.suse.com/1044638" source="BUGZILLA"/>
		<reference ref_id="1117463" ref_url="https://bugzilla.suse.com/1117463" source="BUGZILLA"/>
		<reference ref_id="1117464" ref_url="https://bugzilla.suse.com/1117464" source="BUGZILLA"/>
		<reference ref_id="1117465" ref_url="https://bugzilla.suse.com/1117465" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9670" ref_url="https://www.suse.com/security/cve/CVE-2017-9670/" source="CVE"/>
		<reference ref_id="CVE-2018-19490" ref_url="https://www.suse.com/security/cve/CVE-2018-19490/" source="CVE"/>
		<reference ref_id="CVE-2018-19491" ref_url="https://www.suse.com/security/cve/CVE-2018-19491/" source="CVE"/>
		<reference ref_id="CVE-2018-19492" ref_url="https://www.suse.com/security/cve/CVE-2018-19492/" source="CVE"/>
		<description>
This update for gnuplot fixes the following issues:

Following security issues were fixed:

- CVE-2018-19492: Fixed a buffer overflow in cairotrm_options function (bsc#1117463)
- CVE-2018-19491: Fixed a buffer overlow in the PS_options function (bsc#1117464)
- CVE-2018-19490: Fixed a heap-based buffer overflow in the df_generate_ascii_array_entry function (bsc#1117465)
- CVE-2017-9670: Fixed a uninitialized stack variable vulnerability which could lead to a Denial of Service (bsc#1044638)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-18"/>
	<updated date="2020-06-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044638">SUSE bug 1044638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117464">SUSE bug 1117464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117465">SUSE bug 1117465</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9670/">CVE-2017-9670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9670">CVE-2017-9670 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19490/">CVE-2018-19490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19490">CVE-2018-19490 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19491/">CVE-2018-19491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19491">CVE-2018-19491 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19492/">CVE-2018-19492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19492">CVE-2018-19492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557478" comment="gnuplot-4.6.5-3.3.74 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152194" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1102840" ref_url="https://bugzilla.suse.com/1102840" source="BUGZILLA"/>
		<reference ref_id="1160039" ref_url="https://bugzilla.suse.com/1160039" source="BUGZILLA"/>
		<reference ref_id="1170601" ref_url="https://bugzilla.suse.com/1170601" source="BUGZILLA"/>
		<reference ref_id="1171863" ref_url="https://bugzilla.suse.com/1171863" source="BUGZILLA"/>
		<reference ref_id="1171864" ref_url="https://bugzilla.suse.com/1171864" source="BUGZILLA"/>
		<reference ref_id="1171866" ref_url="https://bugzilla.suse.com/1171866" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543/" source="CVE"/>
		<reference ref_id="CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878/" source="CVE"/>
		<reference ref_id="CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723/" source="CVE"/>
		<description>
This update for perl fixes the following issues:

- CVE-2020-10543: Fixed a heap buffer overflow in regular expression compiler which could have 
  allowed overwriting of allocated memory with attacker's data (bsc#1171863).
- CVE-2020-10878: Fixed multiple integer overflows which could have allowed the insertion of 
  instructions into the compiled form of Perl regular expression (bsc#1171864).
- CVE-2020-12723: Fixed an attacker's corruption of the intermediate language state of a 
  compiled regular expression (bsc#1171866).
- Fixed utf8 handling in perldoc by useing 'term' instead of 'man' (bsc#1170601).
- Some packages make assumptions about the date and time they are built. 
  This update will solve the issues caused by calling the perl function timelocal
  expressing the year with two digit only instead of four digits. (bsc#1102840) (bsc#1160039)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-18"/>
	<updated date="2020-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102840">SUSE bug 1102840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160039">SUSE bug 1160039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170601">SUSE bug 1170601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171863">SUSE bug 1171863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171864">SUSE bug 1171864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171866">SUSE bug 1171866</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10543">CVE-2020-10543 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10878">CVE-2020-10878 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12723">CVE-2020-12723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531034" comment="perl-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531035" comment="perl-32bit-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531036" comment="perl-base-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531037" comment="perl-doc-5.18.2-12.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152195" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 65 (bsc#1172277 and bsc#1169511)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531038" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531040" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531041" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152196" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

java-1_8_0-ibm was updated to Java 8.0 Service Refresh 6 Fix Pack 10 (bsc#1172277,bsc#1169511,bsc#1160968)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2754: Forwarded references to Nashorn 
- CVE-2020-2755: Improved Nashorn matching 
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
- CVE-2019-2949: Fixed an issue which could have resulted in unauthorized access to critical data 
- Added RSA PSS SUPPORT TO IBMPKCS11IMPL
- The pack200 and unpack200 alternatives should be slaves of java (bsc#1171352).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2949">CVE-2019-2949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2754">CVE-2020-2754 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2755">CVE-2020-2755 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531043" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531045" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152197" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1160398" ref_url="https://bugzilla.suse.com/1160398" source="BUGZILLA"/>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk to version jdk8u252 fixes the following issues:

- CVE-2020-2754: Forward references to Nashorn (bsc#1169511)
- CVE-2020-2755: Improve Nashorn matching (bsc#1169511)
- CVE-2020-2756: Better mapping of serial ENUMs (bsc#1169511)
- CVE-2020-2757: Less Blocking Array Queues (bsc#1169511)
- CVE-2020-2773: Better signatures in XML (bsc#1169511)
- CVE-2020-2781: Improve TLS session handling (bsc#1169511)
- CVE-2020-2800: Better Headings for HTTP Servers (bsc#1169511)
- CVE-2020-2803: Enhance buffering of byte buffers (bsc#1169511)
- CVE-2020-2805: Enhance typing of methods (bsc#1169511)
- CVE-2020-2830: Better Scanner conversions (bsc#1169511)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160398">SUSE bug 1160398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2754">CVE-2020-2754 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2755">CVE-2020-2755 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2773">CVE-2020-2773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531047" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531048" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531049" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531050" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152198" version="1" class="patch">
	<metadata>
		<title>Security update for libgxps (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1092125" ref_url="https://bugzilla.suse.com/1092125" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10733" ref_url="https://www.suse.com/security/cve/CVE-2018-10733/" source="CVE"/>
		<description>
This update for libgxps fixes the following issues:

- CVE-2018-10733: Fixed a heap-based buffer over-read issue in ft_font_face_hash (bsc#1092125).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092125">SUSE bug 1092125</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10733/">CVE-2018-10733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10733">CVE-2018-10733 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557479" comment="libgxps2-0.2.2-10.3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152199" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173027" ref_url="https://bugzilla.suse.com/1173027" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious server to overwrite a local file when using the -J option (bsc#1173027).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-24"/>
	<updated date="2020-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8177">CVE-2020-8177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531051" comment="curl-7.37.0-37.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531052" comment="libcurl4-7.37.0-37.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531053" comment="libcurl4-32bit-7.37.0-37.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152200" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1126230" ref_url="https://bugzilla.suse.com/1126230" source="BUGZILLA"/>
		<reference ref_id="1136082" ref_url="https://bugzilla.suse.com/1136082" source="BUGZILLA"/>
		<reference ref_id="1157607" ref_url="https://bugzilla.suse.com/1157607" source="BUGZILLA"/>
		<reference ref_id="1161096" ref_url="https://bugzilla.suse.com/1161096" source="BUGZILLA"/>
		<reference ref_id="1162553" ref_url="https://bugzilla.suse.com/1162553" source="BUGZILLA"/>
		<reference ref_id="1171670" ref_url="https://bugzilla.suse.com/1171670" source="BUGZILLA"/>
		<reference ref_id="1171921" ref_url="https://bugzilla.suse.com/1171921" source="BUGZILLA"/>
		<reference ref_id="1171960" ref_url="https://bugzilla.suse.com/1171960" source="BUGZILLA"/>
		<reference ref_id="1171961" ref_url="https://bugzilla.suse.com/1171961" source="BUGZILLA"/>
		<reference ref_id="1171963" ref_url="https://bugzilla.suse.com/1171963" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10753" ref_url="https://www.suse.com/security/cve/CVE-2020-10753/" source="CVE"/>
		<description>
This is a version update for ceph to version 12.2.13:

Security issue fixed: 	  

- CVE-2020-10753: Fixed an HTTP header injection via CORS ExposeHeader tag (bsc#1171921).

- Notable changes in this update for ceph:
  * mgr: telemetry: backported and now available on SES5.5. Please
    consider enabling via 'ceph telemetry on' (bsc#1171670)
  * OSD heartbeat ping time: new health warning, options and admin
    commands (bsc#1171960)
  * 'osd_calc_pg_upmaps_max_stddev' ceph.conf parameter has been
    removed; use 'upmap_max_deviation' instead (bsc#1171961)
  * Default maximum concurrent bluestore rocksdb compaction threads
    raised from 1 to 2 for improved ability to keep up with rgw
    bucket index workloads (bsc#1171963)

- Bug fixes in this ceph update:
  * mon: Error message displayed when mon_osd_max_split_count would be
    exceeded is not as user-friendly as it could be (bsc#1126230)
  * ceph_volume_client: remove ceph mds calls in favor of ceph fs
    calls (bsc#1136082)
  * rgw: crypt: permit RGW-AUTO/default with SSE-S3 headers
    (bsc#1157607)
  * mon/AuthMonitor: don't validate fs caps on authorize (bsc#1161096)

- Additional bug fixes:
  * ceph-volume: strip _dmcrypt suffix in simple scan json output (bsc#1162553)		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-25"/>
	<updated date="2020-06-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1126230">SUSE bug 1126230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136082">SUSE bug 1136082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157607">SUSE bug 1157607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161096">SUSE bug 1161096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162553">SUSE bug 1162553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171670">SUSE bug 1171670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171921">SUSE bug 1171921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171960">SUSE bug 1171960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171961">SUSE bug 1171961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171963">SUSE bug 1171963</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10753/">CVE-2020-10753 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10753">CVE-2020-10753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555726" comment="ceph-common-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555727" comment="libcephfs2-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555728" comment="librados2-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555729" comment="libradosstriper1-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555730" comment="librbd1-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555731" comment="librgw2-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555732" comment="python-cephfs-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555733" comment="python-rados-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555734" comment="python-rbd-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555735" comment="python-rgw-12.2.13+git.1592168685.85110a3e9d-2.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152201" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172405" ref_url="https://bugzilla.suse.com/1172405" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8022" ref_url="https://www.suse.com/security/cve/CVE-2020-8022/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-8022: Fixed a local root exploit due to improper permissions (bsc#1172405)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172405">SUSE bug 1172405</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8022/">CVE-2020-8022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8022">CVE-2020-8022 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531054" comment="tomcat-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531055" comment="tomcat-admin-webapps-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531056" comment="tomcat-docs-webapp-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531057" comment="tomcat-el-3_0-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531058" comment="tomcat-javadoc-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531059" comment="tomcat-jsp-2_3-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531060" comment="tomcat-lib-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531061" comment="tomcat-servlet-3_1-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531062" comment="tomcat-webapps-8.0.53-29.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152202" version="1" class="patch">
	<metadata>
		<title>Security update for python3-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1054413" ref_url="https://bugzilla.suse.com/1054413" source="BUGZILLA"/>
		<reference ref_id="1073879" ref_url="https://bugzilla.suse.com/1073879" source="BUGZILLA"/>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="1122668" ref_url="https://bugzilla.suse.com/1122668" source="BUGZILLA"/>
		<reference ref_id="761500" ref_url="https://bugzilla.suse.com/761500" source="BUGZILLA"/>
		<reference ref_id="922448" ref_url="https://bugzilla.suse.com/922448" source="BUGZILLA"/>
		<reference ref_id="929736" ref_url="https://bugzilla.suse.com/929736" source="BUGZILLA"/>
		<reference ref_id="935252" ref_url="https://bugzilla.suse.com/935252" source="BUGZILLA"/>
		<reference ref_id="945455" ref_url="https://bugzilla.suse.com/945455" source="BUGZILLA"/>
		<reference ref_id="947357" ref_url="https://bugzilla.suse.com/947357" source="BUGZILLA"/>
		<reference ref_id="961596" ref_url="https://bugzilla.suse.com/961596" source="BUGZILLA"/>
		<reference ref_id="967128" ref_url="https://bugzilla.suse.com/967128" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<description>
This update for python3-requests provides the following fix:

python-requests was updated to 2.20.1.

Update to version 2.20.1:

* Fixed bug with unintended Authorization header stripping for
  redirects using default ports (http/80, https/443).

Update to version 2.20.0:

* Bugfixes

  + Content-Type header parsing is now case-insensitive
    (e.g. charset=utf8 v Charset=utf8).
  + Fixed exception leak where certain redirect urls would raise
    uncaught urllib3 exceptions.
  + Requests removes Authorization header from requests redirected
    from https to http on the same hostname. (CVE-2018-18074)
  + should_bypass_proxies now handles URIs without hostnames
    (e.g. files).

Update to version 2.19.1:

* Fixed issue where status_codes.py’s init function failed trying
  to append to a __doc__ value of None.

Update to version 2.19.0:

* Improvements

  + Warn about possible slowdown with cryptography version &lt; 1.3.4
  + Check host in proxy URL, before forwarding request to adapter.
  + Maintain fragments properly across redirects. (RFC7231 7.1.2)
  + Removed use of cgi module to expedite library load time.
  + Added support for SHA-256 and SHA-512 digest auth algorithms.
  + Minor performance improvement to Request.content.

* Bugfixes

  + Parsing empty Link headers with parse_header_links() no longer
    return one bogus entry.
  + Fixed issue where loading the default certificate bundle from
    a zip archive would raise an IOError.
  + Fixed issue with unexpected ImportError on windows system
    which do not support winreg module.
  + DNS resolution in proxy bypass no longer includes the username
    and password in the request. This also fixes the issue of DNS
    queries failing on macOS.
  + Properly normalize adapter prefixes for url comparison.
  + Passing None as a file pointer to the files param no longer
    raises an exception.
  + Calling copy on a RequestsCookieJar will now preserve the
    cookie policy correctly.

Update to version 2.18.4:

* Improvements

  + Error messages for invalid headers now include the header name
    for easier debugging

Update to version 2.18.3:

* Improvements
  + Running $ python -m requests.help now includes the installed
    version of idna.
* Bugfixes
  + Fixed issue where Requests would raise ConnectionError instead
    of SSLError when encountering SSL problems when using urllib3
    v1.22.

- Add ca-certificates (and ca-certificates-mozilla) to dependencies, otherwise https
  connections will fail.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054413">SUSE bug 1054413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073879">SUSE bug 1073879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122668">SUSE bug 1122668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761500">SUSE bug 761500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922448">SUSE bug 922448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929736">SUSE bug 929736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935252">SUSE bug 935252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945455">SUSE bug 945455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947357">SUSE bug 947357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961596">SUSE bug 961596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967128">SUSE bug 967128</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2296">CVE-2015-2296 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009525269" comment="python3-certifi-2018.4.16-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525270" comment="python3-chardet-3.0.4-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531063" comment="python3-requests-2.20.1-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525271" comment="python3-urllib3-1.22-3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152203" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172906" ref_url="https://bugzilla.suse.com/1172906" source="BUGZILLA"/>
		<reference ref_id="1172935" ref_url="https://bugzilla.suse.com/1172935" source="BUGZILLA"/>
		<reference ref_id="1173197" ref_url="https://bugzilla.suse.com/1173197" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093/" source="CVE"/>
		<reference ref_id="CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154/" source="CVE"/>
		<reference ref_id="CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-14954: Fixed a response injection due to a STARTTLS buffering issue which was
  affecting IMAP, SMTP, and POP3 (bsc#1173197).
- CVE-2020-14093: Fixed a potential IMAP Man-in-the-Middle attack via a PREAUTH response (bsc#1172906, bsc#1172935).
- CVE-2020-14154: Fixed an issue where Mutt was ignoring an expired certificate and was
  proceeding with a connection (bsc#1172906, bsc#1172935).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-29"/>
	<updated date="2020-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173197">SUSE bug 1173197</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14093">CVE-2020-14093 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14154">CVE-2020-14154 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14954">CVE-2020-14954 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531064" comment="mutt-1.10.1-55.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152204" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1110194" ref_url="https://bugzilla.suse.com/1110194" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18384" ref_url="https://www.suse.com/security/cve/CVE-2018-18384/" source="CVE"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2018-18384: Fixed a buffer overflow when listing files (bsc#1110194)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-29"/>
	<updated date="2020-06-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1110194">SUSE bug 1110194</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18384/">CVE-2018-18384 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18384">CVE-2018-18384 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557480" comment="unzip-6.00-33.13.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152205" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1167373" ref_url="https://bugzilla.suse.com/1167373" source="BUGZILLA"/>
		<reference ref_id="1173304" ref_url="https://bugzilla.suse.com/1173304" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860/" source="CVE"/>
		<reference ref_id="CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-14059: Fixed an issue where a client could potentially deny the service of a server 
  during TLS Handshake (bsc#1173304).
- CVE-2019-18860: Fixed handling of invalid domain names in cachemgr.cgi (bsc#1167373).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167373">SUSE bug 1167373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173304">SUSE bug 1173304</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18860">CVE-2019-18860 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14059">CVE-2020-14059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531065" comment="squid-3.5.21-26.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152206" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1169740" ref_url="https://bugzilla.suse.com/1169740" source="BUGZILLA"/>
		<reference ref_id="1171355" ref_url="https://bugzilla.suse.com/1171355" source="BUGZILLA"/>
		<reference ref_id="1172651" ref_url="https://bugzilla.suse.com/1172651" source="BUGZILLA"/>
		<reference ref_id="1173334" ref_url="https://bugzilla.suse.com/1173334" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8956" ref_url="https://www.suse.com/security/cve/CVE-2018-8956/" source="CVE"/>
		<reference ref_id="CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868/" source="CVE"/>
		<reference ref_id="CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817/" source="CVE"/>
		<reference ref_id="CVE-2020-15025" ref_url="https://www.suse.com/security/cve/CVE-2020-15025/" source="CVE"/>
		<description>
This update for ntp fixes the following issues:

ntp was updated to 4.2.8p15

- CVE-2020-11868: Fixed an issue which a server mode packet with spoofed source address 
  frequently send to the client ntpd could have caused denial of service (bsc#1169740).
- CVE-2018-8956: Fixed an issue which could have allowed remote attackers to prevent 
  a broadcast client from synchronizing its clock with a broadcast NTP server via spoofed 
  mode 3 and mode 5 packets (bsc#1171355).
- CVE-2020-13817: Fixed an issue which an off-path attacker with the ability to query time 
  from victim's ntpd instance could have modified the victim's clock by a limited amount (bsc#1172651).
- CVE-2020-15025: Fixed an issue which remote attacker could have caused denial of service by consuming 
  the memory when a CMAC key was used andassociated with a CMAC algorithm in the ntp.keys (bsc#1173334).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169740">SUSE bug 1169740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171355">SUSE bug 1171355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172651">SUSE bug 1172651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173334">SUSE bug 1173334</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8956/">CVE-2018-8956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8956">CVE-2018-8956 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11868">CVE-2020-11868 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13817">CVE-2020-13817 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15025/">CVE-2020-15025 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15025">CVE-2020-15025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531066" comment="ntp-4.2.8p15-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531067" comment="ntp-doc-4.2.8p15-88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152207" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1106531" ref_url="https://bugzilla.suse.com/1106531" source="BUGZILLA"/>
		<reference ref_id="1143650" ref_url="https://bugzilla.suse.com/1143650" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16140" ref_url="https://www.suse.com/security/cve/CVE-2018-16140/" source="CVE"/>
		<reference ref_id="CVE-2019-14275" ref_url="https://www.suse.com/security/cve/CVE-2019-14275/" source="CVE"/>
		<description>
This update for transfig fixes the following issues:

Security issue fixed:

- CVE-2019-14275: Fixed stack-based buffer overflow in the calc_arrow function (bsc#1143650).
- CVE-2018-16140: Fixed a buffer underwrite vulnerability in get_line() in
  read.c, which allowed an attacker to write prior to the beginning of the
  buffer via specially crafted .fig file (bsc#1106531)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1106531">SUSE bug 1106531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143650">SUSE bug 1143650</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16140/">CVE-2018-16140 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16140">CVE-2018-16140 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14275/">CVE-2019-14275 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14275">CVE-2019-14275 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557481" comment="transfig-3.2.5e-2.8.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152208" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="1168669" ref_url="https://bugzilla.suse.com/1168669" source="BUGZILLA"/>
		<reference ref_id="1169746" ref_url="https://bugzilla.suse.com/1169746" source="BUGZILLA"/>
		<reference ref_id="1170908" ref_url="https://bugzilla.suse.com/1170908" source="BUGZILLA"/>
		<reference ref_id="1171978" ref_url="https://bugzilla.suse.com/1171978" source="BUGZILLA"/>
		<reference ref_id="1173022" ref_url="https://bugzilla.suse.com/1173022" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to version 3.53.1

- CVE-2020-12402: Fixed a potential side channel attack during RSA key generation (bsc#1173032).
- CVE-2020-12399: Fixed a timing attack on DSA signature generation (bsc#1171978).
- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- Fixed various FIPS issues in libfreebl3 which were causing segfaults in the test suite of chrony (bsc#1168669).
- Fixed an issue where Firefox tab was crashing (bsc#1170908).

Release notes: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes

mozilla-nspr to version 4.25
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-03"/>
	<updated date="2020-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168669">SUSE bug 1168669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169746">SUSE bug 1169746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170908">SUSE bug 1170908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171978">SUSE bug 1171978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173022">SUSE bug 1173022</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17006">CVE-2019-17006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12399">CVE-2020-12399 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531068" comment="libfreebl3-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531069" comment="libfreebl3-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531070" comment="libfreebl3-hmac-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531071" comment="libfreebl3-hmac-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531072" comment="libsoftokn3-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531073" comment="libsoftokn3-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531074" comment="libsoftokn3-hmac-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531075" comment="libsoftokn3-hmac-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531076" comment="mozilla-nspr-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531077" comment="mozilla-nspr-32bit-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531078" comment="mozilla-nss-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531079" comment="mozilla-nss-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531080" comment="mozilla-nss-certs-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531081" comment="mozilla-nss-certs-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531082" comment="mozilla-nss-sysinit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531083" comment="mozilla-nss-sysinit-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531084" comment="mozilla-nss-tools-3.53.1-58.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152209" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1084671" ref_url="https://bugzilla.suse.com/1084671" source="BUGZILLA"/>
		<reference ref_id="1154256" ref_url="https://bugzilla.suse.com/1154256" source="BUGZILLA"/>
		<reference ref_id="1157315" ref_url="https://bugzilla.suse.com/1157315" source="BUGZILLA"/>
		<reference ref_id="1161262" ref_url="https://bugzilla.suse.com/1161262" source="BUGZILLA"/>
		<reference ref_id="1161436" ref_url="https://bugzilla.suse.com/1161436" source="BUGZILLA"/>
		<reference ref_id="1162698" ref_url="https://bugzilla.suse.com/1162698" source="BUGZILLA"/>
		<reference ref_id="1164538" ref_url="https://bugzilla.suse.com/1164538" source="BUGZILLA"/>
		<reference ref_id="1165633" ref_url="https://bugzilla.suse.com/1165633" source="BUGZILLA"/>
		<reference ref_id="1167622" ref_url="https://bugzilla.suse.com/1167622" source="BUGZILLA"/>
		<reference ref_id="1171145" ref_url="https://bugzilla.suse.com/1171145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20386" ref_url="https://www.suse.com/security/cve/CVE-2019-20386/" source="CVE"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2019-20386: Fixed a memory leak when executing the udevadm trigger command (bsc#1161436).
- Renamed the persistent link for ATA devices (bsc#1164538)
- shared/install: try harder to find enablement symlinks when disabling a unit (bsc#1157315)
- tmpfiles: removed unnecessary assert (bsc#1171145)
- pid1: by default make user units inherit their umask from the user manager (bsc#1162698)
- manager: fixed job mode when signalled to shutdown etc (bsc#1161262)
- coredump: fixed bug that loses core dump files when core dumps are compressed and disk space is low. (bsc#1167622)
- udev: inform systemd how many workers we can potentially spawn (#4036) (bsc#1165633)
- libblkid: open device in nonblock mode. (bsc#1084671)
- udev/cdrom_id: Do not open CD-rom in exclusive mode. (bsc#1154256)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-03"/>
	<updated date="2020-07-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1084671">SUSE bug 1084671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154256">SUSE bug 1154256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157315">SUSE bug 1157315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161262">SUSE bug 1161262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161436">SUSE bug 1161436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162698">SUSE bug 1162698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164538">SUSE bug 1164538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165633">SUSE bug 1165633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167622">SUSE bug 1167622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171145">SUSE bug 1171145</bugzilla>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20386/">CVE-2019-20386 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20386">CVE-2019-20386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557482" comment="libsystemd0-228-150.86.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557483" comment="libsystemd0-32bit-228-150.86.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557484" comment="libudev1-228-150.86.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557485" comment="libudev1-32bit-228-150.86.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557486" comment="systemd-228-150.86.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557487" comment="systemd-32bit-228-150.86.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557488" comment="systemd-bash-completion-228-150.86.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557489" comment="systemd-devel-228-150.86.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557490" comment="systemd-sysvinit-228-150.86.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557491" comment="udev-228-150.86.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152210" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1170715" ref_url="https://bugzilla.suse.com/1170715" source="BUGZILLA"/>
		<reference ref_id="1172698" ref_url="https://bugzilla.suse.com/1172698" source="BUGZILLA"/>
		<reference ref_id="1172704" ref_url="https://bugzilla.suse.com/1172704" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8023: Fixed a potential local privilege escalation from ldap to root when OPENLDAP_CONFIG_BACKEND='ldap' was used (bsc#1172698).	  
- Changed DB_CONFIG to root:ldap permissions (bsc#1172704).	 
- Fixed an issue where slapd becomes unresponsive after many failed login/bind attempts(bsc#1170715).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170715">SUSE bug 1170715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172704">SUSE bug 1172704</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8023">CVE-2020-8023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531085" comment="libldap-2_4-2-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531086" comment="libldap-2_4-2-32bit-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531087" comment="openldap2-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531088" comment="openldap2-back-meta-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531089" comment="openldap2-client-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531090" comment="openldap2-doc-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531091" comment="openldap2-ppolicy-check-password-1.2-18.71.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152211" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173377" ref_url="https://bugzilla.suse.com/1173377" source="BUGZILLA"/>
		<reference ref_id="1173378" ref_url="https://bugzilla.suse.com/1173378" source="BUGZILLA"/>
		<reference ref_id="1173380" ref_url="https://bugzilla.suse.com/1173380" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15563" ref_url="https://www.suse.com/security/cve/CVE-2020-15563/" source="CVE"/>
		<reference ref_id="CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565/" source="CVE"/>
		<reference ref_id="CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).
- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).
- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-10"/>
	<updated date="2020-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173377">SUSE bug 1173377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173378">SUSE bug 1173378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173380">SUSE bug 1173380</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15563/">CVE-2020-15563 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15563">CVE-2020-15563 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15565">CVE-2020-15565 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15567">CVE-2020-15567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538473" comment="xen-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538474" comment="xen-doc-html-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538475" comment="xen-libs-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538476" comment="xen-libs-32bit-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538477" comment="xen-tools-4.9.4_08-3.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538478" comment="xen-tools-domU-4.9.4_08-3.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152212" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1167231" ref_url="https://bugzilla.suse.com/1167231" source="BUGZILLA"/>
		<reference ref_id="1173576" ref_url="https://bugzilla.suse.com/1173576" source="BUGZILLA"/>
		<reference ref_id="1173613" ref_url="https://bugzilla.suse.com/1173613" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415/" source="CVE"/>
		<reference ref_id="CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426/" source="CVE"/>
		<description>
This update for MozillaFirefox to version 78.0.1 ESR fixes the following issues:

Security issues fixed:

- CVE-2020-12415: AppCache manifest poisoning due to url encoded character processing (bsc#1173576).
- CVE-2020-12416: Use-after-free in WebRTC VideoBroadcaster (bsc#1173576).
- CVE-2020-12417: Memory corruption due to missing sign-extension for ValueTags on ARM64 (bsc#1173576).
- CVE-2020-12418: Information disclosure due to manipulated URL object (bsc#1173576).
- CVE-2020-12419: Use-after-free in nsGlobalWindowInner (bsc#1173576).
- CVE-2020-12420: Use-After-Free when trying to connect to a STUN server (bsc#1173576).
- CVE-2020-12402: RSA Key Generation vulnerable to side-channel attack (bsc#1173576).
- CVE-2020-12421: Add-On updates did not respect the same certificate trust rules as software updates (bsc#1173576).
- CVE-2020-12422: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (bsc#1173576).
- CVE-2020-12423: DLL Hijacking due to searching %PATH% for a library (bsc#1173576).
- CVE-2020-12424: WebRTC permission prompt could have been bypassed by a compromised content process (bsc#1173576).
- CVE-2020-12425: Out of bound read in Date.parse() (bsc#1173576).
- CVE-2020-12426: Memory safety bugs fixed in Firefox 78 (bsc#1173576).
- FIPS: MozillaFirefox: allow /proc/sys/crypto/fips_enabled (bsc#1167231).

Non-security issues fixed:

- Fixed interaction with freetype6 (bsc#1173613).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-13"/>
	<updated date="2020-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167231">SUSE bug 1167231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173613">SUSE bug 1173613</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12415">CVE-2020-12415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12416">CVE-2020-12416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12417">CVE-2020-12417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12418">CVE-2020-12418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12419">CVE-2020-12419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12420">CVE-2020-12420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12421">CVE-2020-12421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12422">CVE-2020-12422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12423">CVE-2020-12423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12424">CVE-2020-12424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12425">CVE-2020-12425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12426">CVE-2020-12426 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531092" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531093" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531094" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531095" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152213" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1109160" ref_url="https://bugzilla.suse.com/1109160" source="BUGZILLA"/>
		<reference ref_id="1118367" ref_url="https://bugzilla.suse.com/1118367" source="BUGZILLA"/>
		<reference ref_id="1118368" ref_url="https://bugzilla.suse.com/1118368" source="BUGZILLA"/>
		<reference ref_id="1171740" ref_url="https://bugzilla.suse.com/1171740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741/" source="CVE"/>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- Amended documentation referring to rule types 'krb5-subdomain'
  and 'ms-subdomain'. This incorrect documentation could mislead
  operators into believing that policies they had configured were 
  more restrictive than they actually were. [CVE-2018-5741]
- Further limit the number of queries that can be triggered from a
  request.  Root and TLD servers are no longer exempt from 
  max-recursion-queries. Fetches for missing name server address
  records are limited to 4 for any domain. [CVE-2020-8616]
- Replaying a TSIG BADTIME response as a request could trigger an
  assertion failure. [CVE-2020-8617]
  [bsc#1109160, bsc#1171740,
   CVE-2018-5741, bind-CVE-2018-5741.patch,
   CVE-2020-8616, bind-CVE-2020-8616.patch,
   CVE-2020-8617, bind-CVE-2020-8617.patch]

- Don't rely on /etc/insserv.conf anymore for proper dependencies
  against nss-lookup.target in named.service and lwresd.service
  (bsc#1118367 bsc#1118368)
- Using a drop-in file
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118367">SUSE bug 1118367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118368">SUSE bug 1118368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5741">CVE-2018-5741 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8616">CVE-2020-8616 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8617">CVE-2020-8617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531096" comment="bind-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531097" comment="bind-chrootenv-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531098" comment="bind-doc-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531099" comment="bind-libs-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531100" comment="bind-libs-32bit-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531101" comment="bind-utils-9.9.9P1-63.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152214" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173455" ref_url="https://bugzilla.suse.com/1173455" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-15049.patch: fixes a Cache Poisoning and Request Smuggling
  attack (CVE-2020-15049, bsc#1173455)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173455">SUSE bug 1173455</bugzilla>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15049">CVE-2020-15049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531103" comment="squid-3.5.21-26.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152215" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1113160" ref_url="https://bugzilla.suse.com/1113160" source="BUGZILLA"/>
		<reference ref_id="1134195" ref_url="https://bugzilla.suse.com/1134195" source="BUGZILLA"/>
		<reference ref_id="1138822" ref_url="https://bugzilla.suse.com/1138822" source="BUGZILLA"/>
		<reference ref_id="1141661" ref_url="https://bugzilla.suse.com/1141661" source="BUGZILLA"/>
		<reference ref_id="1142038" ref_url="https://bugzilla.suse.com/1142038" source="BUGZILLA"/>
		<reference ref_id="1143913" ref_url="https://bugzilla.suse.com/1143913" source="BUGZILLA"/>
		<reference ref_id="1148177" ref_url="https://bugzilla.suse.com/1148177" source="BUGZILLA"/>
		<reference ref_id="1153090" ref_url="https://bugzilla.suse.com/1153090" source="BUGZILLA"/>
		<reference ref_id="1153277" ref_url="https://bugzilla.suse.com/1153277" source="BUGZILLA"/>
		<reference ref_id="1154940" ref_url="https://bugzilla.suse.com/1154940" source="BUGZILLA"/>
		<reference ref_id="1154968" ref_url="https://bugzilla.suse.com/1154968" source="BUGZILLA"/>
		<reference ref_id="1155372" ref_url="https://bugzilla.suse.com/1155372" source="BUGZILLA"/>
		<reference ref_id="1163871" ref_url="https://bugzilla.suse.com/1163871" source="BUGZILLA"/>
		<reference ref_id="1165921" ref_url="https://bugzilla.suse.com/1165921" source="BUGZILLA"/>
		<reference ref_id="1168310" ref_url="https://bugzilla.suse.com/1168310" source="BUGZILLA"/>
		<reference ref_id="1170231" ref_url="https://bugzilla.suse.com/1170231" source="BUGZILLA"/>
		<reference ref_id="1170557" ref_url="https://bugzilla.suse.com/1170557" source="BUGZILLA"/>
		<reference ref_id="1171687" ref_url="https://bugzilla.suse.com/1171687" source="BUGZILLA"/>
		<reference ref_id="1172462" ref_url="https://bugzilla.suse.com/1172462" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10215" ref_url="https://www.suse.com/security/cve/CVE-2019-10215/" source="CVE"/>
		<reference ref_id="CVE-2019-15043" ref_url="https://www.suse.com/security/cve/CVE-2019-15043/" source="CVE"/>
		<reference ref_id="CVE-2020-12245" ref_url="https://www.suse.com/security/cve/CVE-2020-12245/" source="CVE"/>
		<reference ref_id="CVE-2020-13379" ref_url="https://www.suse.com/security/cve/CVE-2020-13379/" source="CVE"/>
		<description>

This update fixes the following issues:

cobbler:

- Calculate relative path for kernel and inited when generating
  grub entry (bsc#1170231)
  Added: fix-grub2-entry-paths.diff
- Fix os-release version detection for SUSE
  Modified: sles15.patch
- Jinja2 template library fix (bsc#1141661)
- Removes string replace for textmode fix (bsc#1134195)

golang-github-prometheus-node_exporter:

- Update to 0.18.1
  * [BUGFIX] Fix incorrect sysctl call in BSD meminfo collector, resulting in broken swap metrics on FreeBSD #1345
  * [BUGFIX] Fix rollover bug in mountstats collector #1364
  * Renamed interface label to device in netclass collector for consistency with
  * other network metrics #1224
  * The cpufreq metrics now separate the cpufreq and scaling data based on what the driver provides. #1248
  * The labels for the network_up metric have changed, see issue #1236
  * Bonding collector now uses mii_status instead of operstatus #1124
  * Several systemd metrics have been turned off by default to improve performance #1254
  * These include unit_tasks_current, unit_tasks_max, service_restart_total, and unit_start_time_seconds
  * The systemd collector blacklist now includes automount, device, mount, and slice units by default. #1255
  * [CHANGE] Bonding state uses mii_status #1124
  * [CHANGE] Add a limit to the number of in-flight requests #1166
  * [CHANGE] Renamed interface label to device in netclass collector #1224
  * [CHANGE] Add separate cpufreq and scaling metrics #1248
  * [CHANGE] Several systemd metrics have been turned off by default to improve performance #1254
  * [CHANGE] Expand systemd collector blacklist #1255
  * [CHANGE] Split cpufreq metrics into a separate collector #1253
  * [FEATURE] Add a flag to disable exporter metrics #1148
  * [FEATURE] Add kstat-based Solaris metrics for boottime, cpu and zfs collectors #1197
  * [FEATURE] Add uname collector for FreeBSD #1239
  * [FEATURE] Add diskstats collector for OpenBSD #1250
  * [FEATURE] Add pressure collector exposing pressure stall information for Linux #1174
  * [FEATURE] Add perf exporter for Linux #1274
  * [ENHANCEMENT] Add Infiniband counters #1120
  * [ENHANCEMENT] Add TCPSynRetrans to netstat default filter #1143
  * [ENHANCEMENT] Move network_up labels into new metric network_info #1236
  * [ENHANCEMENT] Use 64-bit counters for Darwin netstat
  * [BUGFIX] Add fallback for missing /proc/1/mounts #1172
  * [BUGFIX] Fix node_textfile_mtime_seconds to work properly on symlinks #1326
- Add network-online (Wants and After) dependency to systemd unit bsc#1143913

golang-github-prometheus-prometheus:

- Update change log and spec file
  + Modified spec file: default to golang 1.14 to avoid 'have choice' build issues in OBS. 
  + Rebase and update patches for version 2.18.0
  + Changed:  
    * 0002-Default-settings.patch Changed
- Update to 2.18.0 
  + Features 
    * Tracing: Added experimental Jaeger support #7148
  + Changes
    * Federation: Only use local TSDB for federation (ignore remote read). #7096
    * Rules: `rule_evaluations_total` and `rule_evaluation_failures_total` have a `rule_group` label now. #7094
  + Enhancements
    * TSDB: Significantly reduce WAL size kept around after a block cut. #7098
    * Discovery: Add `architecture` meta label for EC2. #7000
  + Bug fixes
    * UI: Fixed wrong MinTime reported by /status. #7182
    * React UI: Fixed multiselect legend on OSX. #6880
    * Remote Write: Fixed blocked resharding edge case. #7122
    * Remote Write: Fixed remote write not updating on relabel configs change. #7073
- Changes from 2.17.2
  + Bug fixes
    * Federation: Register federation metrics #7081
    * PromQL: Fix panic in parser error handling #7132
    * Rules: Fix reloads hanging when deleting a rule group that is being evaluated #7138
    * TSDB: Fix a memory leak when prometheus starts with an empty TSDB WAL #7135
    * TSDB: Make isolation more robust to panics in web handlers #7129 #7136
- Changes from 2.17.1
  + Bug fixes
    * TSDB: Fix query performance regression that increased memory and CPU usage #7051
- Changes from 2.17.0
  + Features 
    * TSDB: Support isolation #6841
    * This release implements isolation in TSDB. API queries and recording rules are
      guaranteed to only see full scrapes and full recording rules. This comes with a
      certain overhead in resource usage. Depending on the situation, there might be
      some increase in memory usage, CPU usage, or query latency.
  + Enhancements
    * PromQL: Allow more keywords as metric names #6933
    * React UI: Add normalization of localhost URLs in targets page #6794
    * Remote read: Read from remote storage concurrently #6770
    * Rules: Mark deleted rule series as stale after a reload #6745
    * Scrape: Log scrape append failures as debug rather than warn #6852
    * TSDB: Improve query performance for queries that partially hit the head #6676
    * Consul SD: Expose service health as meta label #5313
    * EC2 SD: Expose EC2 instance lifecycle as meta label #6914
    * Kubernetes SD: Expose service type as meta label for K8s service role #6684
    * Kubernetes SD: Expose label_selector and field_selector #6807
    * Openstack SD: Expose hypervisor id as meta label #6962
  + Bug fixes
    * PromQL: Do not escape HTML-like chars in query log #6834 #6795
    * React UI: Fix data table matrix values #6896
    * React UI: Fix new targets page not loading when using non-ASCII characters #6892
    * Remote read: Fix duplication of metrics read from remote storage with external labels #6967 #7018
    * Remote write: Register WAL watcher and live reader metrics for all remotes, not just the first one #6998
    * Scrape: Prevent removal of metric names upon relabeling #6891
    * Scrape: Fix 'superfluous response.WriteHeader call' errors when scrape fails under some circonstances #6986
    * Scrape: Fix crash when reloads are separated by two scrape intervals #7011
- Changes from 2.16.0
  + Features 
    * React UI: Support local timezone on /graph #6692
    * PromQL: add absent_over_time query function #6490
    * Adding optional logging of queries to their own file #6520
  + Enhancements
    * React UI: Add support for rules page and 'Xs ago' duration displays #6503
    * React UI: alerts page, replace filtering togglers tabs with checkboxes #6543
    * TSDB: Export metric for WAL write errors #6647
    * TSDB: Improve query performance for queries that only touch the most recent 2h of data. #6651
    * PromQL: Refactoring in parser errors to improve error messages #6634
    * PromQL: Support trailing commas in grouping opts #6480
    * Scrape: Reduce memory usage on reloads by reusing scrape cache #6670
    * Scrape: Add metrics to track bytes and entries in the metadata cache #6675
    * promtool: Add support for line-column numbers for invalid rules output #6533
    * Avoid restarting rule groups when it is unnecessary #6450
  + Bug fixes
    * React UI: Send cookies on fetch() on older browsers #6553
    * React UI: adopt grafana flot fix for stacked graphs #6603
    * React UI: broken graph page browser history so that back button works as expected #6659
    * TSDB: ensure compactionsSkipped metric is registered, and log proper error if one is returned from head.Init #6616
    * TSDB: return an error on ingesting series with duplicate labels #6664
    * PromQL: Fix unary operator precedence #6579
    * PromQL: Respect query.timeout even when we reach query.max-concurrency #6712
    * PromQL: Fix string and parentheses handling in engine, which affected React UI #6612
    * PromQL: Remove output labels returned by absent() if they are produced by multiple identical label matchers #6493
    * Scrape: Validate that OpenMetrics input ends with `# EOF` #6505
    * Remote read: return the correct error if configs can't be marshal'd to JSON #6622
    * Remote write: Make remote client `Store` use passed context, which can affect shutdown timing #6673
    * Remote write: Improve sharding calculation in cases where we would always be consistently behind by tracking pendingSamples #6511
    * Ensure prometheus_rule_group metrics are deleted when a rule group is removed #6693
- Changes from 2.15.2
  + Bug fixes
    * TSDB: Fixed support for TSDB blocks built with Prometheus before 2.1.0. #6564
    * TSDB: Fixed block compaction issues on Windows. #6547
- Changes from 2.15.1
  + Bug fixes
    * TSDB: Fixed race on concurrent queries against same data. #6512
- Changes from 2.15.0
  + Features 
    * API: Added new endpoint for exposing per metric metadata `/metadata`. #6420 #6442
  + Changes
    * Discovery: Removed `prometheus_sd_kubernetes_cache_*` metrics. Additionally `prometheus_sd_kubernetes_workqueue_latency_seconds` and `prometheus_sd_kubernetes_workqueue_work_duration_seconds` metrics now show correct values in seconds. #6393
    * Remote write: Changed `query` label on `prometheus_remote_storage_*` metrics to `remote_name` and `url`. #6043
  + Enhancements
    * TSDB: Significantly reduced memory footprint of loaded TSDB blocks. #6418 #6461
    * TSDB: Significantly optimized what we buffer during compaction which should result in lower memory footprint during compaction. #6422 #6452 #6468 #6475
    * TSDB: Improve replay latency. #6230
    * TSDB: WAL size is now used for size based retention calculation. #5886
    * Remote read: Added query grouping and range hints to the remote read request #6401
    * Remote write: Added `prometheus_remote_storage_sent_bytes_total` counter per queue. #6344
    * promql: Improved PromQL parser performance. #6356
    * React UI: Implemented missing pages like `/targets` #6276, TSDB status page #6281 #6267 and many other fixes and performance improvements.
    * promql: Prometheus now accepts spaces between time range and square bracket. e.g `[ 5m]` #6065  
  + Bug fixes
    * Config: Fixed alertmanager configuration to not miss targets when configurations are similar. #6455
    * Remote write: Value of `prometheus_remote_storage_shards_desired` gauge shows raw value of desired shards and it's updated correctly. #6378
    * Rules: Prometheus now fails the evaluation of rules and alerts where metric results collide with labels specified in `labels` field. #6469
    * API: Targets Metadata API `/targets/metadata` now accepts empty `match_targets` parameter as in the spec. #6303
- Changes from 2.14.0
  + Features 
    * API: `/api/v1/status/runtimeinfo` and `/api/v1/status/buildinfo` endpoints added for use by the React UI. #6243
    * React UI: implement the new experimental React based UI. #5694 and many more
      * Can be found by under `/new`.
      * Not all pages are implemented yet.
    * Status: Cardinality statistics added to the Runtime &amp; Build Information page. #6125
  + Enhancements
    * Remote write: fix delays in remote write after a compaction. #6021
    * UI: Alerts can be filtered by state. #5758
  + Bug fixes
    * Ensure warnings from the API are escaped. #6279
    * API: lifecycle endpoints return 403 when not enabled. #6057
    * Build: Fix Solaris build. #6149
    * Promtool: Remove false duplicate rule warnings when checking rule files with alerts. #6270
    * Remote write: restore use of deduplicating logger in remote write. #6113
    * Remote write: do not reshard when unable to send samples. #6111
    * Service discovery: errors are no longer logged on context cancellation. #6116, #6133
    * UI: handle null response from API properly. #6071
- Changes from 2.13.1
  + Bug fixes
    * Fix panic in ARM builds of Prometheus. #6110
    * promql: fix potential panic in the query logger. #6094
    * Multiple errors of http: superfluous response.WriteHeader call in the logs. #6145
- Changes from 2.13.0
  + Enhancements
    * Metrics: renamed prometheus_sd_configs_failed_total to prometheus_sd_failed_configs and changed to Gauge #5254
    * Include the tsdb tool in builds. #6089
    * Service discovery: add new node address types for kubernetes. #5902
    * UI: show warnings if query have returned some warnings. #5964
    * Remote write: reduce memory usage of the series cache. #5849
    * Remote read: use remote read streaming to reduce memory usage. #5703
    * Metrics: added metrics for remote write max/min/desired shards to queue manager. #5787
    * Promtool: show the warnings during label query. #5924
    * Promtool: improve error messages when parsing bad rules. #5965
    * Promtool: more promlint rules. #5515
  + Bug fixes
    * UI: Fix a Stored DOM XSS vulnerability with query history [CVE-2019-10215](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10215). #6098
    * Promtool: fix recording inconsistency due to duplicate labels. #6026
    * UI: fixes service-discovery view when accessed from unhealthy targets. #5915
    * Metrics format: OpenMetrics parser crashes on short input. #5939
    * UI: avoid truncated Y-axis values. #6014
- Changes from 2.12.0
  + Features 
    * Track currently active PromQL queries in a log file. #5794
    * Enable and provide binaries for `mips64` / `mips64le` architectures. #5792
  + Enhancements
    * Improve responsiveness of targets web UI and API endpoint. #5740
    * Improve remote write desired shards calculation. #5763
    * Flush TSDB pages more precisely. tsdb#660
    * Add `prometheus_tsdb_retention_limit_bytes` metric. tsdb#667
    * Add logging during TSDB WAL replay on startup. tsdb#662
    * Improve TSDB memory usage. tsdb#653, tsdb#643, tsdb#654, tsdb#642, tsdb#627
  + Bug fixes
    * Check for duplicate label names in remote read. #5829
    * Mark deleted rules' series as stale on next evaluation. #5759
    * Fix JavaScript error when showing warning about out-of-sync server time. #5833
    * Fix `promtool test rules` panic when providing empty `exp_labels`. #5774
    * Only check last directory when discovering checkpoint number. #5756
    * Fix error propagation in WAL watcher helper functions. #5741
    * Correctly handle empty labels from alert templates. #5845
- Update Uyuni/SUSE Manager service discovery patch
  + Modified 0003-Add-Uyuni-service-discovery.patch:
  + Adapt service discovery to the new Uyuni API endpoints
  + Modified spec file: force golang 1.12 to fix build issues in SLE15SP2
- Update to Prometheus 2.11.2

grafana:

- Update to version 7.0.3
  * Features / Enhancements
    - Stats: include all fields. #24829, @ryantxu
    - Variables: change VariableEditorList row action Icon to IconButton. #25217, @hshoff
  * Bug fixes
    - Cloudwatch: Fix dimensions of DDoSProtection. #25317, @papagian
    - Configuration: Fix env var override of sections containing hyphen. #25178, @marefr
    - Dashboard: Get panels in collapsed rows. #25079, @peterholmberg
    - Do not show alerts tab when alerting is disabled. #25285, @dprokop
    - Jaeger: fixes cascader option label duration value. #25129, @Estrax
    - Transformations: Fixed Transform tab crash &amp; no update after adding first transform. #25152, @torkelo
- Update to version 7.0.2
  * Bug fixes
    - Security: Urgent security patch release to fix CVE-2020-13379
- Update to version 7.0.1
  * Features / Enhancements
    - Datasource/CloudWatch: Makes CloudWatch Logs query history more readable. #24795, @kaydelaney
    - Download CSV: Add date and time formatting. #24992, @ryantxu
    - Table: Make last cell value visible when right aligned. #24921, @peterholmberg
    - TablePanel: Adding sort order persistance. #24705, @torkelo
    - Transformations: Display correct field name when using reduce transformation. #25068, @peterholmberg
    - Transformations: Allow custom number input for binary operations. #24752, @ryantxu
  * Bug fixes
    - Dashboard/Links: Fixes dashboard links by tags not working. #24773, @KamalGalrani
    - Dashboard/Links: Fixes open in new window for dashboard link. #24772, @KamalGalrani
    - Dashboard/Links: Variables are resolved and limits to 100. #25076, @hugohaggmark
    - DataLinks: Bring back variables interpolation in title. #24970, @dprokop
    - Datasource/CloudWatch: Field suggestions no longer limited to prefix-only. #24855, @kaydelaney
    - Explore/Table: Keep existing field types if possible. #24944, @kaydelaney
    - Explore: Fix wrap lines toggle for results of queries with filter expression. #24915, @ivanahuckova
    - Explore: fix undo in query editor. #24797, @zoltanbedi
    - Explore: fix word break in type head info. #25014, @zoltanbedi
    - Graph: Legend decimals now work as expected. #24931, @torkelo
    - LoginPage: Fix hover color for service buttons. #25009, @tskarhed
    - LogsPanel: Fix scrollbar. #24850, @ivanahuckova
    - MoveDashboard: Fix for moving dashboard caused all variables to be lost. #25005, @torkelo
    - Organize transformer: Use display name in field order comparer. #24984, @dprokop
    - Panel: shows correct panel menu items in view mode. #24912, @hugohaggmark
    - PanelEditor Fix missing labels and description if there is only single option in category. #24905, @dprokop
    - PanelEditor: Overrides name matcher still show all original field names even after Field default display name is specified. #24933, @torkelo
    - PanelInspector: Makes sure Data display options are visible. #24902, @hugohaggmark
    - PanelInspector: Hides unsupported data display options for Panel type. #24918, @hugohaggmark
    - PanelMenu: Make menu disappear on button press. #25015, @tskarhed
    - Postgres: Fix add button. #25087, @phemmer
    - Prometheus: Fix recording rules expansion. #24977, @ivanahuckova
    - Stackdriver: Fix creating Service Level Objectives (SLO) datasource query variable. #25023, @papagian
- Update to version 7.0.0 
  * Breaking changes
    - Removed PhantomJS: PhantomJS was deprecated in Grafana v6.4 and starting from Grafana v7.0.0, all PhantomJS support has been removed. This means that Grafana no longer ships with a built-in image renderer, and we advise you to install the Grafana Image Renderer plugin.
    - Dashboard: A global minimum dashboard refresh interval is now enforced and defaults to 5 seconds.
    - Interval calculation: There is now a new option Max data points that controls the auto interval $__interval calculation. Interval was previously calculated by dividing the panel width by the time range. With the new max data points option it is now easy to set $__interval to a dynamic value that is time range agnostic. For example if you set Max data points to 10 Grafana will dynamically set $__interval by dividing the current time range by 10.
    - Datasource/Loki: Support for deprecated Loki endpoints has been removed.
    - Backend plugins: Grafana now requires backend plugins to be signed, otherwise Grafana will not load/start them. This is an additional security measure to make sure backend plugin binaries and files haven't been tampered with. Refer to Upgrade Grafana for more information.
    - @grafana/ui: Forms migration notice, see @grafana/ui changelog
    - @grafana/ui: Select API change for creating custom values, see @grafana/ui changelog
    + Deprecation warnings
      - Scripted dashboards is now deprecated. The feature is not removed but will be in a future release. We hope to address the underlying requirement of dynamic dashboards in a different way. #24059
      - The unofficial first version of backend plugins together with usage of grafana/grafana-plugin-model is now deprecated and support for that will be removed in a future release. Please refer to backend plugins documentation for information about the new officially supported backend plugins.
  * Features / Enhancements
    - Backend plugins: Log deprecation warning when using the unofficial first version of backend plugins. #24675, @marefr
    - Editor: New line on Enter, run query on Shift+Enter. #24654, @davkal
    - Loki: Allow multiple derived fields with the same name. #24437, @aocenas
    - Orgs: Add future deprecation notice. #24502, @torkelo
  * Bug Fixes
    - @grafana/toolkit: Use process.cwd() instead of PWD to get directory. #24677, @zoltanbedi
    - Admin: Makes long settings values line break in settings page. #24559, @hugohaggmark
    - Dashboard: Allow editing provisioned dashboard JSON and add confirmation when JSON is copied to dashboard. #24680, @dprokop
    - Dashboard: Fix for strange 'dashboard not found' errors when opening links in dashboard settings. #24416, @torkelo
    - Dashboard: Fix so default data source is selected when data source can't be found in panel editor. #24526, @mckn
    - Dashboard: Fixed issue changing a panel from transparent back to normal in panel editor. #24483, @torkelo
    - Dashboard: Make header names reflect the field name when exporting to CSV file from the the panel inspector. #24624, @peterholmberg
    - Dashboard: Make sure side pane is displayed with tabs by default in panel editor. #24636, @dprokop
    - Data source: Fix query/annotation help content formatting. #24687, @AgnesToulet
    - Data source: Fixes async mount errors. #24579, @Estrax
    - Data source: Fixes saving a data source without failure when URL doesn't specify a protocol. #24497, @aknuds1
    - Explore/Prometheus: Show results of instant queries only in table. #24508, @ivanahuckova
    - Explore: Fix rendering of react query editors. #24593, @ivanahuckova
    - Explore: Fixes loading more logs in logs context view. #24135, @Estrax
    - Graphite: Fix schema and dedupe strategy in rollup indicators for Metrictank queries. #24685, @torkelo
    - Graphite: Makes query annotations work again. #24556, @hugohaggmark
    - Logs: Clicking 'Load more' from context overlay doesn't expand log row. #24299, @kaydelaney
    - Logs: Fix total bytes process calculation. #24691, @davkal
    - Org/user/team preferences: Fixes so UI Theme can be set back to Default. #24628, @AgnesToulet
    - Plugins: Fix manifest validation. #24573, @aknuds1
    - Provisioning: Use proxy as default access mode in provisioning. #24669, @bergquist
    - Search: Fix select item when pressing enter and Grafana is served using a sub path. #24634, @tskarhed
    - Search: Save folder expanded state. #24496, @Clarity-89
    - Security: Tag value sanitization fix in OpenTSDB data source. #24539, @rotemreiss
    - Table: Do not include angular options in options when switching from angular panel. #24684, @torkelo
    - Table: Fixed persisting column resize for time series fields. #24505, @torkelo
    - Table: Fixes Cannot read property subRows of null. #24578, @hugohaggmark
    - Time picker: Fixed so you can enter a relative range in the time picker without being converted to absolute range. #24534, @mckn
    - Transformations: Make transform dropdowns not cropped. #24615, @dprokop
    - Transformations: Sort order should be preserved as entered by user when using the reduce transformation. #24494, @hugohaggmark
    - Units: Adds scale symbol for currencies with suffixed symbol. #24678, @hugohaggmark
    - Variables: Fixes filtering options with more than 1000 entries. #24614, @hugohaggmark
    - Variables: Fixes so Textbox variables read value from url. #24623, @hugohaggmark
    - Zipkin: Fix error when span contains remoteEndpoint. #24524, @aocenas
    - SAML: Switch from email to login for user login attribute mapping (Enterprise)
- Update Makefile and spec file
  * Remove phantomJS patch from Makefile 
  * Fix multiline strings in Makefile
  * Exclude s390 from SLE12 builds, golang 1.14 is not built for s390
- Add instructions for patching the Grafana javascript frontend.
- BuildRequires golang(API) instead of go metapackage version range
  * BuildRequires:  golang(API) &gt;= 1.14   from
    BuildRequires:  ( go &gt;= 1.14 with go &lt; 1.15 )
- Update to version 6.7.3
  - This version fixes bsc#1170557 and its corresponding CVE-2020-12245
  - Admin: Fix Synced via LDAP message for non-LDAP external users. #23477, @alexanderzobnin
  - Alerting: Fixes notifications for alerts with empty message in Google Hangouts notifier. #23559, @hugohaggmark
  - AuthProxy: Fixes bug where long username could not be cached.. #22926, @jcmcken
  - Dashboard: Fix saving dashboard when editing raw dashboard JSON model. #23314, @peterholmberg
  - Dashboard: Try to parse 8 and 15 digit numbers as timestamps if parsing of time range as date fails. #21694, @jessetan
  - DashboardListPanel: Fixed problem with empty panel after going into edit mode (General folder filter being automatically added) . #23426, @torkelo
  - Data source: Handle datasource withCredentials option properly. #23380, @hvtuananh
  - Security: Fix annotation popup XSS vulnerability. #23813, @torkelo
  - Server: Exit Grafana with status code 0 if no error. #23312, @aknuds1
  - TablePanel: Fix XSS issue in header column rename (backport). #23814, @torkelo
  - Variables: Fixes error when setting adhoc variable values. #23580, @hugohaggmark
- Update to version 6.7.2:
  (see installed changelog for the full list of changes)
  -  BackendSrv: Adds config to response to fix issue for external plugins that used this property . #23032, @torkelo
  -  Dashboard: Fixed issue with saving new dashboard after changing title . #23104, @dprokop
  -  DataLinks: make sure we use the correct datapoint when dataset contains null value.. #22981, @mckn
  -  Plugins: Fixed issue for plugins that imported dateMath util . #23069, @mckn
  -  Security: Fix for dashboard snapshot original dashboard link could contain XSS vulnerability in url. #23254, @torkelo
  -  Variables: Fixes issue with too many queries being issued for nested template variables after value change. #23220, @torkelo
  -  Plugins: Expose promiseToDigest. #23249, @torkelo
  -  Reporting (Enterprise): Fixes issue updating a report created by someone else
- Update to 6.7.1:
  (see installed changelog for the full list of changes)
  Bug Fixes
  - Azure: Fixed dropdowns not showing current value. #22914, @torkelo
  - BackendSrv: only add content-type on POST, PUT requests. #22910, @hugohaggmark
  - Panels: Fixed size issue with panel internal size when exiting panel edit mode. #22912, @torkelo
  - Reporting: fixes migrations compatibility with mysql (Enterprise)
  - Reporting: Reduce default concurrency limit to 4 (Enterprise)
- Update to 6.7.0:
  (see installed changelog for the full list of changes)
  Bug Fixes
  - AngularPanels: Fixed inner height calculation for angular panels . #22796, @torkelo
  - BackendSrv: makes sure provided headers are correctly recognized and set. #22778, @hugohaggmark
  - Forms: Fix input suffix position (caret-down in Select) . #22780, @torkelo
  - Graphite: Fixed issue with query editor and next select metric now showing after selecting metric node . #22856, @torkelo
  - Rich History: UX adjustments and fixes. #22729, @ivanahuckova
- Update to 6.7.0-beta1:
  Breaking changes
  -  Slack: Removed Mention setting and instead introduce Mention Users, Mention Groups, and Mention Channel. The first two settings require user and group IDs, respectively. This change was necessary because the way of mentioning via the Slack API changed and mentions in Slack notifications no longer worked.
  -  Alerting: Reverts the behavior of diff and percent_diff to not always be absolute. Something we introduced by mistake in 6.1.0. Alerting now support diff(), diff_abs(), percent_diff() and percent_diff_abs(). #21338
  - Notice about changes in backendSrv for plugin authors
    In our mission to migrate away from AngularJS to React we have removed all AngularJS dependencies in the core data retrieval service backendSrv.
    Removing the AngularJS dependencies in backendSrv has the unfortunate side effect of AngularJS digest no longer being triggered for any request made with backendSrv. Because of this, external plugins using backendSrv directly may suffer from strange behaviour in the UI.
    To remedy this issue, as a plugin author you need to trigger the digest after a direct call to backendSrv.
  Bug Fixes
    API: Fix redirect issues. #22285, @papagian
    Alerting: Don't include image_url field with Slack message if empty. #22372, @aknuds1
    Alerting: Fixed bad background color for default notifications in alert tab . #22660, @krvajal
    Annotations: In table panel when setting transform to annotation, they will now show up right away without a manual refresh. #22323, @krvajal
    Azure Monitor: Fix app insights source to allow for new __timeFrom and __timeTo. #21879, @ChadNedzlek
    BackendSrv: Fixes POST body for form data. gmark
    CloudWatch: Credentials cache invalidation fix. #22473, @sunker
    CloudWatch: Expand alias variables when query yields no result. #22695, @sunker
    Dashboard: Fix bug with NaN in alerting. #22053, @a-melnyk
    Explore: Fix display of multiline logs in log panel and explore. #22057, @thomasdraebing
    Heatmap: Legend color range is incorrect when using custom min/max. #21748, @sv5d
    Security: Fixed XSS issue in dashboard history diff . #22680, @torkelo
    StatPanel: Fixes base color is being used for null values .
    #22646, @torkelo
- Update to version 6.6.2:
  (see installed changelog for the full list of changes)
- Update to version 6.6.1:
  (see installed changelog for the full list of changes)
- Update to version 6.6.0:
  (see installed changelog for the full list of changes)
- Update to version 6.5.3:
  (see installed changelog for the full list of changes)
- Update to version 6.5.2:
  (see installed changelog for the full list of changes)
- Update to version 6.5.1:
  (see installed changelog for the full list of changes)
- Update to version 6.5.0
  (see installed changelog for the full list of changes)
- Update to version 6.4.5:
  * Create version 6.4.5
  * CloudWatch: Fix high CPU load (#20579)
- Add obs-service-go_modules to download required modules into vendor.tar.gz
- Adjusted spec file to use vendor.tar.gz
- Adjusted Makefile to work with new filenames
- BuildRequire go1.14
- Update to version 6.4.4:
  * DataLinks: Fix blur issues. #19883, @aocenas
  * Docker: Makes it possible to parse timezones in the docker image. #20081, @xlson
  * LDAP: All LDAP servers should be tried even if one of them returns a connection error. #20077, @jongyllen
  * LDAP: No longer shows incorrectly matching groups based on role in debug page. #20018, @xlson
  * Singlestat: Fix no data / null value mapping . #19951, @ryantxu
- Revert the spec file and make script
- Remove PhantomJS dependency
- Update to 6.4.3
  * Bug Fixes
    - Alerting: All notification channels should send even if one fails to send. #19807, @jan25
    - AzureMonitor: Fix slate interference with dropdowns. #19799, @aocenas
    - ContextMenu: make ContextMenu positioning aware of the viewport width. #19699, @krvajal
    - DataLinks: Fix context menu not showing in singlestat-ish visualisations. #19809, @dprokop
    - DataLinks: Fix url field not releasing focus. #19804, @aocenas
    - Datasource: Fixes clicking outside of some query editors required 2 clicks. #19822, @aocenas
    - Panels: Fixes default tab for visualizations without Queries Tab. #19803, @hugohaggmark
    - Singlestat: Fixed issue with mapping null to text. #19689, @torkelo
    - @grafana/toolkit: Don't fail plugin creation when git user.name config is not set. #19821, @dprokop
    - @grafana/toolkit: TSLint line number off by 1. #19782, @fredwangwang
- Update to 6.4.2
  * Bug Fixes
    - CloudWatch: Changes incorrect dimension wmlid to wlmid . #19679, @ATTron
    - Grafana Image Renderer: Fixes plugin page. #19664, @hugohaggmark
    - Graph: Fixes auto decimals logic for y axis ticks that results in too many decimals for high values. #19618, @torkelo
    - Graph: Switching to series mode should re-render graph. #19623, @torkelo
    - Loki: Fix autocomplete on label values. #19579, @aocenas
    - Loki: Removes live option for logs panel. #19533, @davkal
    - Profile: Fix issue with user profile not showing more than sessions sessions in some cases. #19578, @huynhsamha
    - Prometheus: Fixes so results in Panel always are sorted by query order. #19597, @hugohaggmark
    - sted keys in YAML provisioning caused a server crash, #19547
    - ImageRendering: Fixed issue with image rendering in enterprise build (Enterprise)
    - Reporting: Fixed issue with reporting service when STMP was disabled (Enterprise).
- Changes from 6.4.0
  * Features / Enhancements
    - Build: Upgrade go to 1.12.10. #19499, @marefr
    - DataLinks: Suggestions menu improvements. #19396, @dprokop
    - Explore: Take root_url setting into account when redirecting from dashboard to explore. #19447, @ivanahuckova
    - Explore: Update broken link to logql docs. #19510, @ivanahuckova
    - Logs: Adds Logs Panel as a visualization. #19504, @davkal
  * Bug Fixes
    - CLI: Fix version selection for plugin install. #19498, @aocenas
    - Graph: Fixes minor issue with series override color picker and custom color . #19516, @torkelo
- Changes from 6.4.0 Beta 2
  * Features / Enhancements
    - Azure Monitor: Remove support for cross resource queries (#19115)'. #19346, @sunker
    - Docker: Upgrade packages to resolve reported vulnerabilities. #19188, @marefr
    - Graphite: Time range expansion reduced from 1 minute to 1 second. #19246, @torkelo
    - grafana/toolkit: Add plugin creation task. #19207, @dprokop
  * Bug Fixes
    - Alerting: Prevents creating alerts from unsupported queries. #19250, @hugohaggmark
    - Alerting: Truncate PagerDuty summary when greater than 1024 characters. #18730, @nvllsvm
    - Cloudwatch: Fix autocomplete for Gamelift dimensions. #19146, @kevinpz
    - Dashboard: Fix export for sharing when panels use default data source. #19315, @torkelo
    - Database: Rewrite system statistics query to perform better. #19178, @papagian
    - Gauge/BarGauge: Fix issue with [object Object] in titles . #19217, @ryantxu
    - MSSQL: Revert usage of new connectionstring format introduced by #18384. #19203, @marefr
    - Multi-LDAP: Do not fail-fast on invalid credentials. #19261, @gotjosh
    - MySQL, Postgres, MSSQL: Fix validating query with template variables in alert . #19237, @marefr
    - MySQL, Postgres: Update raw sql when query builder updates. #19209, @marefr
    - MySQL: Limit datasource error details returned from the backend. #19373, @marefr
- Changes from 6.4.0 Beta 1
  * Features / Enhancements
    - API: Readonly datasources should not be created via the API. #19006, @papagian
    - Alerting: Include configured AlertRuleTags in Webhooks notifier. #18233, @dominic-miglar
    - Annotations: Add annotations support to Loki. #18949, @aocenas
    - Annotations: Use a single row to represent a region. #17673, @ryantxu
    - Auth: Allow inviting existing users when login form is disabled. #19048, @548017
    - Azure Monitor: Add support for cross resource queries. #19115, @sunker
    - CLI: Allow installing custom binary plugins. #17551, @aocenas
    - Dashboard: Adds Logs Panel (alpha) as visualization option for Dashboards. #18641, @hugohaggmark
    - Dashboard: Reuse query results between panels . #16660, @ryantxu
    - Dashboard: Set time to to 23:59:59 when setting To time using calendar. #18595, @simPod
    - DataLinks: Add DataLinks support to Gauge, BarGauge and SingleStat2 panel. #18605, @ryantxu
    - DataLinks: Enable access to labels &amp; field names. #18918, @torkelo
    - DataLinks: Enable multiple data links per panel. #18434, @dprokop
    - Docker: switch docker image to alpine base with phantomjs support. #18468, @DanCech
    - Elasticsearch: allow templating queries to order by doc_count. #18870, @hackery
    - Explore: Add throttling when doing live queries. #19085, @aocenas
    - Explore: Adds ability to go back to dashboard, optionally with query changes. #17982, @kaydelaney
    - Explore: Reduce default time range to last hour. #18212, @davkal
    - Gauge/BarGauge: Support decimals for min/max. #18368, @ryantxu
    - Graph: New series override transform constant that renders a single point as a line across the whole graph. #19102, @davkal
    - Image rendering: Add deprecation warning when PhantomJS is used for rendering images. #18933, @papagian
    - InfluxDB: Enable interpolation within ad-hoc filter values. #18077, @kvc-code
    - LDAP: Allow an user to be synchronized against LDAP. #18976, @gotjosh
    - Ldap: Add ldap debug page. #18759, @peterholmberg
    - Loki: Remove prefetching of default label values. #18213, @davkal
    - Metrics: Add failed alert notifications metric. #18089, @koorgoo
    - OAuth: Support JMES path lookup when retrieving user email. #14683, @bobmshannon
    - OAuth: return GitLab groups as a part of user info (enable team sync). #18388, @alexanderzobnin
    - Panels: Add unit for electrical charge - ampere-hour. #18950, @anirudh-ramesh
    - Plugin: AzureMonitor - Reapply MetricNamespace support. #17282, @raphaelquati
    - Plugins: better warning when plugins fail to load. #18671, @ryantxu
    - Postgres: Add support for scram sha 256 authentication. #18397, @nonamef
    - RemoteCache: Support SSL with Redis. #18511, @kylebrandt
    - SingleStat: The gauge option in now disabled/hidden (unless it's an old panel with it already enabled) . #18610, @ryantxu
    - Stackdriver: Add extra alignment period options. #18909, @sunker
    - Units: Add South African Rand (ZAR) to currencies. #18893, @jeteon
    - Units: Adding T,P,E,Z,and Y bytes. #18706, @chiqomar
  * Bug Fixes
    - Alerting: Notification is sent when state changes from no_data to ok. #18920, @papagian
    - Alerting: fix duplicate alert states when the alert fails to save to the database. #18216, @kylebrandt
    - Alerting: fix response popover prompt when add notification channels. #18967, @lzdw
    - CloudWatch: Fix alerting for queries with Id (using GetMetricData). #17899, @alex-berger
    - Explore: Fix auto completion on label values for Loki. #18988, @aocenas
    - Explore: Fixes crash using back button with a zoomed in graph. #19122, @hugohaggmark
    - Explore: Fixes so queries in Explore are only run if Graph/Table is shown. #19000, @hugohaggmark
    - MSSQL: Change connectionstring to URL format to fix using passwords with semicolon. #18384, @Russiancold
    - MSSQL: Fix memory leak when debug enabled. #19049, @briangann
    - Provisioning: Allow escaping literal '$' with '$$' in configs to avoid interpolation. #18045, @kylebrandt
    - TimePicker: Fixes hiding time picker dropdown in FireFox. #19154, @hugohaggmark
  * Breaking changes
    + Annotations
      There are some breaking changes in the annotations HTTP API for region annotations. Region annotations are now represented
      using a single event instead of two seperate events. Check breaking changes in HTTP API below and HTTP API documentation for more details.
    + Docker
      Grafana is now using Alpine 3.10 as docker base image.
    + HTTP API
      - GET /api/alert-notifications now requires at least editor access.
        New /api/alert-notifications/lookup returns less information than /api/alert-notifications and can be access by any authenticated user.
      - GET /api/alert-notifiers now requires at least editor access
      - GET /api/org/users now requires org admin role.
        New /api/org/users/lookup returns less information than /api/org/users and can be access by users that are org admins,
        admin in any folder or admin of any team.
      - GET /api/annotations no longer returns regionId property.
      - POST /api/annotations no longer supports isRegion property.
      - PUT /api/annotations/:id no longer supports isRegion property.
      - PATCH /api/annotations/:id no longer supports isRegion property.
      - DELETE /api/annotations/region/:id has been removed.
  * Deprecation notes
    + PhantomJS
      - PhantomJS, which is used for rendering images of dashboards and panels,
        is deprecated and will be removed in a future Grafana release.
        A deprecation warning will from now on be logged when Grafana starts up if PhantomJS is in use.
        Please consider migrating from PhantomJS to the Grafana Image Renderer plugin.
- Changes from 6.3.6
  * Features / Enhancements
    - Metrics: Adds setting for turning off total stats metrics. #19142, @marefr
  * Bug Fixes
    - Database: Rewrite system statistics query to perform better. #19178, @papagian
    - Explore: Fixes error when switching from prometheus to loki data sources. #18599, @kaydelaney
- Rebase package spec. Use mostly from fedora, fix suse specified things and fix some errors.
- Add missing directories provisioning/datasources and provisioning/notifiers
  and sample.yaml as described in packaging/rpm/control from upstream.
  Missing directories are shown in logfiles.
- Version 6.3.5
  * Upgrades
    + Build: Upgrade to go 1.12.9.
  * Bug Fixes
    + Dashboard: Fixes dashboards init failed loading error for dashboards with panel links that had missing properties.
    + Editor: Fixes issue where only entire lines were being copied.
    + Explore: Fixes query field layout in splitted view for Safari browsers.
    + LDAP: multildap + ldap integration.
    + Profile/UserAdmin: Fix for user agent parser crashes grafana-server on 32-bit builds.
    + Prometheus: Prevents panel editor crash when switching to Prometheus datasource.
    + Prometheus: Changes brace-insertion behavior to be less annoying.
- Version 6.3.4
  * Security: CVE-2019-15043 - Parts of the HTTP API allow unauthenticated use.
- Version 6.3.3
  * Bug Fixes
    + Annotations: Fix failing annotation query when time series query is cancelled. #18532 1, @dprokop 1
    + Auth: Do not set SameSite cookie attribute if cookie_samesite is none. #18462 1, @papagian 3
    + DataLinks: Apply scoped variables to data links correctly. #18454 1, @dprokop 1
    + DataLinks: Respect timezone when displaying datapoint’s timestamp in graph context menu. #18461 2, @dprokop 1
    + DataLinks: Use datapoint timestamp correctly when interpolating variables. #18459 1, @dprokop 1
    + Explore: Fix loading error for empty queries. #18488 1, @davkal
    + Graph: Fixes legend issue clicking on series line icon and issue with horizontal scrollbar being visible on windows. #18563 1, @torkelo 2
    + Graphite: Avoid glob of single-value array variables . #18420, @gotjosh
    + Prometheus: Fix queries with label_replace remove the $1 match when loading query editor. #18480 5, @hugohaggmark 3
    + Prometheus: More consistently allows for multi-line queries in editor. #18362 2, @kaydelaney 2
    + TimeSeries: Assume values are all numbers. #18540 4, @ryantxu
- Version 6.3.2
  * Bug Fixes
    + Gauge/BarGauge: Fixes issue with losts thresholds and issue loading Gauge with avg stat. #18375 12
- Version 6.3.1
  * Bug Fixes
    + PanelLinks: Fix crash issue Gauge &amp; Bar Gauge for panels with panel links (drill down links). #18430 2
- Version 6.3.0
  * Features / Enhancements
    + OAuth: Do not set SameSite OAuth cookie if cookie_samesite is None. #18392 4, @papagian 3
    + Auth Proxy: Include additional headers as part of the cache key. #18298 6, @gotjosh
    + Build grafana images consistently. #18224 12, @hassanfarid
    + Docs: SAML. #18069 11, @gotjosh
    + Permissions: Show plugins in nav for non admin users but hide plugin configuration. #18234 1, @aocenas
    + TimePicker: Increase max height of quick range dropdown. #18247 2, @torkelo 2
    + Alerting: Add tags to alert rules. #10989 13, @Thib17 1
    + Alerting: Attempt to send email notifications to all given email addresses. #16881 1, @zhulongcheng
    + Alerting: Improve alert rule testing. #16286 2, @marefr
    + Alerting: Support for configuring content field for Discord alert notifier. #17017 2, @jan25
    + Alertmanager: Replace illegal chars with underscore in label names. #17002 5, @bergquist 1
    + Auth: Allow expiration of API keys. #17678, @papagian 3
    + Auth: Return device, os and browser when listing user auth tokens in HTTP API. #17504, @shavonn 1
    + Auth: Support list and revoke of user auth tokens in UI. #17434 2, @shavonn 1
    + AzureMonitor: change clashing built-in Grafana variables/macro names for Azure Logs. #17140, @shavonn 1
    + CloudWatch: Made region visible for AWS Cloudwatch Expressions. #17243 2, @utkarshcmu
    + Cloudwatch: Add AWS DocDB metrics. #17241, @utkarshcmu
    + Dashboard: Use timezone dashboard setting when exporting to CSV. #18002 1, @dehrax
    + Data links. #17267 11, @torkelo 2
    + Docker: Switch base image to ubuntu:latest from debian:stretch to avoid security issues… #17066 5, @bergquist 1
    + Elasticsearch: Support for visualizing logs in Explore . #17605 7, @marefr
    + Explore: Adds Live option for supported datasources. #17062 1, @hugohaggmark 3
    + Explore: Adds orgId to URL for sharing purposes. #17895 1, @kaydelaney 2
    + Explore: Adds support for new loki ‘start’ and ‘end’ params for labels endpoint. #17512, @kaydelaney 2
    + Explore: Adds support for toggling raw query mode in explore. #17870, @kaydelaney 2
    + Explore: Allow switching between metrics and logs . #16959 2, @marefr
    + Explore: Combines the timestamp and local time columns into one. #17775, @hugohaggmark 3
    + Explore: Display log lines context . #17097, @dprokop 1
    + Explore: Don’t parse log levels if provided by field or label. #17180 1, @marefr
    + Explore: Improves performance of Logs element by limiting re-rendering. #17685, @kaydelaney 2
    + Explore: Support for new LogQL filtering syntax. #16674 4, @davkal
    + Explore: Use new TimePicker from Grafana/UI. #17793, @hugohaggmark 3
    + Explore: handle newlines in LogRow Highlighter. #17425, @rrfeng 1
    + Graph: Added new fill gradient option. #17528 3, @torkelo 2
    + GraphPanel: Don’t sort series when legend table &amp; sort column is not visible . #17095, @shavonn 1
    + InfluxDB: Support for visualizing logs in Explore. #17450 9, @hugohaggmark 3
    + Logging: Login and Logout actions (#17760). #17883 1, @ATTron
    + Logging: Move log package to pkg/infra. #17023, @zhulongcheng
    + Metrics: Expose stats about roles as metrics. #17469 2, @bergquist 1
    + MySQL/Postgres/MSSQL: Add parsing for day, weeks and year intervals in macros. #13086 6, @bernardd
    + MySQL: Add support for periodically reloading client certs. #14892, @tpetr
    + Plugins: replace dataFormats list with skipDataQuery flag in plugin.json. #16984, @ryantxu
    + Prometheus: Take timezone into account for step alignment. #17477, @fxmiii
    + Prometheus: Use overridden panel range for $__range instead of dashboard range. #17352, @patrick246
    + Prometheus: added time range filter to series labels query. #16851 3, @FUSAKLA
    + Provisioning: Support folder that doesn’t exist yet in dashboard provisioning. #17407 1, @Nexucis
    + Refresh picker: Handle empty intervals. #17585 1, @dehrax
    + Singlestat: Add y min/max config to singlestat sparklines. #17527 4, @pitr
    + Snapshot: use given key and deleteKey. #16876, @zhulongcheng
    + Templating: Correctly display __text in multi-value variable after page reload. #17840 1, @EduardSergeev
    + Templating: Support selecting all filtered values of a multi-value variable. #16873 2, @r66ad
    + Tracing: allow propagation with Zipkin headers. #17009 4, @jrockway
    + Users: Disable users removed from LDAP. #16820 2, @alexanderzobnin
  * Bug Fixes
    + PanelLinks: Fix render issue when there is no panel description. #18408 3, @dehrax
    + OAuth: Fix “missing saved state” OAuth login failure due to SameSite cookie policy. #18332 1, @papagian 3
    + cli: fix for recognizing when in dev mode… #18334, @xlson
    + DataLinks: Fixes incorrect interpolation of ${__series_name} . #18251 1, @torkelo 2
    + Loki: Display live tailed logs in correct order in Explore. #18031 3, @kaydelaney 2
    + PhantomJS: Fixes rendering on Debian Buster. #18162 2, @xlson
    + TimePicker: Fixed style issue for custom range popover. #18244, @torkelo 2
    + Timerange: Fixes a bug where custom time ranges didn’t respect UTC. #18248 1, @kaydelaney 2
    + remote_cache: Fix redis connstr parsing. #18204 1, @mblaschke
    + AddPanel: Fix issue when removing moved add panel widget . #17659 2, @dehrax
    + CLI: Fix encrypt-datasource-passwords fails with sql error. #18014, @marefr
    + Elasticsearch: Fix default max concurrent shard requests. #17770 4, @marefr
    + Explore: Fix browsing back to dashboard panel. #17061, @jschill
    + Explore: Fix filter by series level in logs graph. #17798, @marefr
    + Explore: Fix issues when loading and both graph/table are collapsed. #17113, @marefr
    + Explore: Fix selection/copy of log lines. #17121, @marefr
    + Fix: Wrap value of multi variable in array when coming from URL. #16992 1, @aocenas
    + Frontend: Fix for Json tree component not working. #17608, @srid12
    + Graphite: Fix for issue with alias function being moved last. #17791, @torkelo 2
    + Graphite: Fixes issue with seriesByTag &amp; function with variable param. #17795, @torkelo 2
    + Graphite: use POST for /metrics/find requests. #17814 2, @papagian 3
    + HTTP Server: Serve Grafana with a custom URL path prefix. #17048 6, @jan25
    + InfluxDB: Fixes single quotes are not escaped in label value filters. #17398 1, @Panzki
    + Prometheus: Correctly escape ‘|’ literals in interpolated PromQL variables. #16932, @Limess
    + Prometheus: Fix when adding label for metrics which contains colons in Explore. #16760, @tolwi
    + SinglestatPanel: Remove background color when value turns null. #17552 1, @druggieri
- Make phantomjs dependency configurable
- Create plugin directory and clean up (create in %install,
  add to %files) handling of /var/lib/grafana/* and

mgr-cfg:

- Remove commented code in test files
- Replace spacewalk-usix with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)
- Add mgr manpage links

mgr-custom-info:

- Bump version to 4.1.0 (bsc#1154940)

mgr-daemon:

- Bump version to 4.1.0 (bsc#1154940)
- Fix systemd timer configuration on SLE12 (bsc#1142038)

mgr-osad:

- Separate osa-dispatcher and jabberd so it can be disabled independently
- Replace spacewalk-usix with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)
- Move /usr/share/rhn/config-defaults to uyuni-base-common
- Require uyuni-base-common for /etc/rhn (for osa-dispatcher)
- Ensure bytes type when using hashlib to avoid traceback (bsc#1138822)

mgr-push:

- Replace spacewalk-usix and spacewalk-backend-libs with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)

mgr-virtualization:

- Replace spacewalk-usix with uyuni-common-libs
- Bump version to 4.1.0 (bsc#1154940)
- Fix mgr-virtualization timer

rhnlib:

- Fix building
- Fix malformed XML response when data contains non-ASCII chars (bsc#1154968)
- Bump version to 4.1.0 (bsc#1154940)
- Fix bootstrapping SLE11SP4 trad client with SSL enabled (bsc#1148177)

spacecmd:

- Only report real error, not result (bsc#1171687)
- Use defined return values for spacecmd methods so scripts can
  check for failure (bsc#1171687)
- Disable globbing for api subcommand to allow wildcards in filter
  settings (bsc#1163871)
- Bugfix: attempt to purge SSM when it is empty (bsc#1155372)
- Bump version to 4.1.0 (bsc#1154940)
- Prevent error when piping stdout in Python 2 (bsc#1153090)
- Java api expects content as encoded string instead of encoded bytes like before (bsc#1153277)
- Enable building and installing for Ubuntu 16.04 and Ubuntu 18.04
- Add unit test for schedule, errata, user, utils, misc, configchannel
  and kickstart modules
- Multiple minor bugfixes alongside the unit tests
- Bugfix: referenced variable before assignment.
- Add unit test for report, package, org, repo and group

spacewalk-client-tools:

- Add workaround for uptime overflow to spacewalk-update-status as well (bsc#1165921)
- Spell correctly 'successful' and 'successfully'
- Skip dmidecode data on aarch64 to prevent coredump (bsc#1113160)
- Replace spacewalk-usix with uyuni-common-libs
- Return a non-zero exit status on errors in rhn_check
- Bump version to 4.1.0 (bsc#1154940)
- Make a explicit requirement to systemd for spacewalk-client-tools
  when rhnsd timer is installed

spacewalk-koan:

- Bump version to 4.1.0 (bsc#1154940)
- Require commands we use in merge-rd.sh

spacewalk-oscap:

- Bump version to 4.1.0 (bsc#1154940)

spacewalk-remote-utils:

- Update spacewalk-create-channel with RHEL 7.7 channel definitions
- Bump version to 4.1.0 (bsc#1154940)

supportutils-plugin-susemanager-client:

- Bump version to 4.1.0 (bsc#1154940)

suseRegisterInfo:

- SuseRegisterInfo only needs perl-base, not full perl (bsc#1168310)
- Bump version to 4.1.0 (bsc#1154940)

zypp-plugin-spacewalk:

- Prevent issue with non-ASCII characters in Python 2 systems (bsc#1172462)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-21"/>
	<updated date="2020-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1113160">SUSE bug 1113160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134195">SUSE bug 1134195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138822">SUSE bug 1138822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141661">SUSE bug 1141661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142038">SUSE bug 1142038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143913">SUSE bug 1143913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148177">SUSE bug 1148177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153090">SUSE bug 1153090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153277">SUSE bug 1153277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154940">SUSE bug 1154940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154968">SUSE bug 1154968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155372">SUSE bug 1155372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163871">SUSE bug 1163871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165921">SUSE bug 1165921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168310">SUSE bug 1168310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170231">SUSE bug 1170231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170557">SUSE bug 1170557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171687">SUSE bug 1171687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172462">SUSE bug 1172462</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10215/">CVE-2019-10215 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10215">CVE-2019-10215 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15043/">CVE-2019-15043 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15043">CVE-2019-15043 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12245/">CVE-2020-12245 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12245">CVE-2020-12245 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13379/">CVE-2020-13379 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13379">CVE-2020-13379 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555736" comment="golang-github-prometheus-node_exporter-0.18.1-1.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152216" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173466" ref_url="https://bugzilla.suse.com/1173466" source="BUGZILLA"/>
		<reference ref_id="1173467" ref_url="https://bugzilla.suse.com/1173467" source="BUGZILLA"/>
		<reference ref_id="1173469" ref_url="https://bugzilla.suse.com/1173469" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15304" ref_url="https://www.suse.com/security/cve/CVE-2020-15304/" source="CVE"/>
		<reference ref_id="CVE-2020-15305" ref_url="https://www.suse.com/security/cve/CVE-2020-15305/" source="CVE"/>
		<reference ref_id="CVE-2020-15306" ref_url="https://www.suse.com/security/cve/CVE-2020-15306/" source="CVE"/>
		<description>
This update for openexr fixes the following issues:

- CVE-2020-15304: Fixed a NULL pointer dereference in TiledInputFile:TiledInputFile() (bsc#1173466).
- CVE-2020-15305: Fixed a use-after-free in DeepScanLineInputFile:DeepScanLineInputFile() (bsc#1173467).
- CVE-2020-15306: Fixed a heap buffer overflow in getChunkOffsetTableSize() (bsc#1173469).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-21"/>
	<updated date="2020-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173466">SUSE bug 1173466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173467">SUSE bug 1173467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173469">SUSE bug 1173469</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15304/">CVE-2020-15304 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15304">CVE-2020-15304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15305/">CVE-2020-15305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15305">CVE-2020-15305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15306/">CVE-2020-15306 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15306">CVE-2020-15306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557492" comment="libIlmImf-Imf_2_1-21-2.1.0-6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557493" comment="openexr-2.1.0-6.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152217" version="1" class="patch">
	<metadata>
		<title>Security update for xrdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173580" ref_url="https://bugzilla.suse.com/1173580" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-4044" ref_url="https://www.suse.com/security/cve/CVE-2020-4044/" source="CVE"/>
		<description>
This update for xrdp fixes the following issues:

- Security fixes (bsc#1173580, CVE-2020-4044):
  + Add patches:
    * xrdp-cve-2020-4044-fix-0.patch
    * xrdp-cve-2020-4044-fix-1.patch
  + Rebase SLE patch:
    * xrdp-fate318398-change-expired-password.patch
- Update patch:
  + xrdp-Allow-sessions-with-32-bpp.patch.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-21"/>
	<updated date="2020-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173580">SUSE bug 1173580</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-4044/">CVE-2020-4044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4044">CVE-2020-4044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555737" comment="xrdp-0.9.0~git.1456906198.f422461-21.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152218" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173369" ref_url="https://bugzilla.suse.com/1173369" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15011" ref_url="https://www.suse.com/security/cve/CVE-2020-15011/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2020-15011: Fixed a possible Arbitrary Content Injection via the private archive login page (bsc#1173369).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-24"/>
	<updated date="2020-07-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173369">SUSE bug 1173369</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15011/">CVE-2020-15011 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15011">CVE-2020-15011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531104" comment="mailman-2.1.17-3.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152219" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173160" ref_url="https://bugzilla.suse.com/1173160" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-10745: Fixed an issue which parsing and packing of NBT and DNS packets containing dots could potentially have consumed excessive CPU (bsc#1173160).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10745">CVE-2020-10745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555738" comment="libdcerpc-binding0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538485" comment="libdcerpc-binding0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555739" comment="libdcerpc0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538487" comment="libdcerpc0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555740" comment="libndr-krb5pac0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538489" comment="libndr-krb5pac0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555741" comment="libndr-nbt0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538491" comment="libndr-nbt0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555742" comment="libndr-standard0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538493" comment="libndr-standard0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555743" comment="libndr0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538495" comment="libndr0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555744" comment="libnetapi0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538497" comment="libnetapi0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555745" comment="libsamba-credentials0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538499" comment="libsamba-credentials0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555746" comment="libsamba-errors0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538501" comment="libsamba-errors0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555747" comment="libsamba-hostconfig0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538503" comment="libsamba-hostconfig0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555748" comment="libsamba-passdb0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538505" comment="libsamba-passdb0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555749" comment="libsamba-util0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538507" comment="libsamba-util0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555750" comment="libsamdb0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538509" comment="libsamdb0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555751" comment="libsmbclient0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538511" comment="libsmbclient0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555752" comment="libsmbconf0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538513" comment="libsmbconf0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555753" comment="libsmbldap0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538515" comment="libsmbldap0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555754" comment="libtevent-util0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538517" comment="libtevent-util0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555755" comment="libwbclient0-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538519" comment="libwbclient0-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555756" comment="samba-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555757" comment="samba-client-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538522" comment="samba-client-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538523" comment="samba-doc-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555758" comment="samba-libs-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538525" comment="samba-libs-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555759" comment="samba-winbind-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538527" comment="samba-winbind-32bit-4.6.16+git.186.c6d77b0d5a6-3.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152220" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173998" ref_url="https://bugzilla.suse.com/1173998" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9806" ref_url="https://www.suse.com/security/cve/CVE-2020-9806/" source="CVE"/>
		<reference ref_id="CVE-2020-9807" ref_url="https://www.suse.com/security/cve/CVE-2020-9807/" source="CVE"/>
		<reference ref_id="CVE-2020-9843" ref_url="https://www.suse.com/security/cve/CVE-2020-9843/" source="CVE"/>
		<reference ref_id="CVE-2020-9850" ref_url="https://www.suse.com/security/cve/CVE-2020-9850/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.3 (bsc#1173998):
  + Enable kinetic scrolling with async scrolling.
  + Fix web process hangs on large GitHub pages.
  + Bubblewrap sandbox should not attempt to bind empty paths.
  + Fix threading issues in the media player.
  + Fix several crashes and rendering issues.
  + Security fixes:  CVE-2020-9802, CVE-2020-9803, CVE-2020-9805,
    CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850,
    CVE-2020-13753.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13753">CVE-2020-13753 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9802">CVE-2020-9802 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9803">CVE-2020-9803 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9805">CVE-2020-9805 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9806/">CVE-2020-9806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9806">CVE-2020-9806 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9807/">CVE-2020-9807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9807">CVE-2020-9807 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9843/">CVE-2020-9843 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9843">CVE-2020-9843 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9850/">CVE-2020-9850 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9850">CVE-2020-9850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531105" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531106" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531108" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531109" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531110" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531111" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152221" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1084632" ref_url="https://bugzilla.suse.com/1084632" source="BUGZILLA"/>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1173812" ref_url="https://bugzilla.suse.com/1173812" source="BUGZILLA"/>
		<reference ref_id="1174463" ref_url="https://bugzilla.suse.com/1174463" source="BUGZILLA"/>
		<reference ref_id="1174570" ref_url="https://bugzilla.suse.com/1174570" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308/" source="CVE"/>
		<reference ref_id="CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309/" source="CVE"/>
		<reference ref_id="CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310/" source="CVE"/>
		<reference ref_id="CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311/" source="CVE"/>
		<reference ref_id="CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706/" source="CVE"/>
		<reference ref_id="CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707/" source="CVE"/>
		<description>
This update for grub2 fixes the following issues:

- Fix for CVE-2020-10713 (bsc#1168994)
- Fix for CVE-2020-14308 CVE-2020-14309, CVE-2020-14310, CVE-2020-14311
  (bsc#1173812)
- Fix for CVE-2020-15706 (bsc#1174463)
- Fix for CVE-2020-15707 (bsc#1174570)

- Use overflow checking primitives where the arithmetic expression for buffer
  allocations may include unvalidated data
- Use grub_calloc for overflow check and return NULL when it would occur 
- Use gcc-9 compiler for overflow check builtins
- Backport gcc-9 build fixes
- Fix packed-not-aligned error on GCC 8 (bsc#1084632)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1084632">SUSE bug 1084632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174463">SUSE bug 1174463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174570">SUSE bug 1174570</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14308">CVE-2020-14308 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14309">CVE-2020-14309 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14310">CVE-2020-14310 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14311">CVE-2020-14311 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15706">CVE-2020-15706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15707">CVE-2020-15707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555760" comment="grub2-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538529" comment="grub2-i386-pc-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538531" comment="grub2-snapper-plugin-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538532" comment="grub2-systemd-sleep-plugin-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538533" comment="grub2-x86_64-efi-2.02-4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538534" comment="grub2-x86_64-xen-2.02-4.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152222" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174415" ref_url="https://bugzilla.suse.com/1174415" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15900" ref_url="https://www.suse.com/security/cve/CVE-2020-15900/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issues:

- fixed CVE-2020-15900 Memory Corruption (SAFER Sandbox Breakout)
  cf. https://bugs.ghostscript.com/show_bug.cgi?id=702582
  (bsc#1174415)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-30"/>
	<updated date="2020-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174415">SUSE bug 1174415</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15900/">CVE-2020-15900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15900">CVE-2020-15900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531119" comment="ghostscript-9.52-23.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531120" comment="ghostscript-x11-9.52-23.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152223" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173948" ref_url="https://bugzilla.suse.com/1173948" source="BUGZILLA"/>
		<reference ref_id="1174538" ref_url="https://bugzilla.suse.com/1174538" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.1.0 ESR
  * Fixed: Various stability, functionality, and security fixes (bsc#1174538)
  * CVE-2020-15652: Potential leak of redirect targets when loading scripts in a worker
  * CVE-2020-6514: WebRTC data channel leaks internal address to peer
  * CVE-2020-15655: Extension APIs could be used to bypass Same-Origin Policy
  * CVE-2020-15653: Bypassing iframe sandbox when allowing popups
  * CVE-2020-6463: Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture
  * CVE-2020-15656: Type confusion for special arguments in IonMonkey
  * CVE-2020-15658: Overriding file type when saving to disk
  * CVE-2020-15657: DLL hijacking due to incorrect loading path
  * CVE-2020-15654: Custom cursor can overlay user interface
  * CVE-2020-15659: Memory safety bugs fixed in Firefox 79 and Firefox ESR 78.1
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-31"/>
	<updated date="2020-07-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173948">SUSE bug 1173948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15652">CVE-2020-15652 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15653">CVE-2020-15653 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15654">CVE-2020-15654 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15655">CVE-2020-15655 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15656">CVE-2020-15656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15657">CVE-2020-15657 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15658">CVE-2020-15658 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15659">CVE-2020-15659 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6463">CVE-2020-6463 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6514">CVE-2020-6514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531121" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531122" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531123" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152224" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-04"/>
	<updated date="2020-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531124" comment="libX11-6-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531125" comment="libX11-6-32bit-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531126" comment="libX11-data-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531127" comment="libX11-xcb1-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531128" comment="libX11-xcb1-32bit-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531129" comment="libxcb-dri2-0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531130" comment="libxcb-dri2-0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531131" comment="libxcb-dri3-0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531132" comment="libxcb-dri3-0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531133" comment="libxcb-glx0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531134" comment="libxcb-glx0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531135" comment="libxcb-present0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531136" comment="libxcb-present0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531137" comment="libxcb-randr0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531138" comment="libxcb-render0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531139" comment="libxcb-render0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531140" comment="libxcb-shape0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531141" comment="libxcb-shm0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531142" comment="libxcb-shm0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531143" comment="libxcb-sync1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531144" comment="libxcb-sync1-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531145" comment="libxcb-xf86dri0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531146" comment="libxcb-xfixes0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531147" comment="libxcb-xfixes0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531148" comment="libxcb-xinerama0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531149" comment="libxcb-xkb1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531150" comment="libxcb-xkb1-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531151" comment="libxcb-xv0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531152" comment="libxcb1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531153" comment="libxcb1-32bit-1.10-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152225" version="1" class="patch">
	<metadata>
		<title>Security update for python-ipaddress (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<description>
This update for python-ipaddress fixes the following issues:

- Add CVE-2020-14422-ipaddress-hash-collision.patch fixing
  CVE-2020-14422 (bsc#1173274, bpo#41004), where hash collisions
  in IPv4Interface and IPv6Interface could lead to DOS. 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14422">CVE-2020-14422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531162" comment="python-ipaddress-1.0.18-3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152226" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173477" ref_url="https://bugzilla.suse.com/1173477" source="BUGZILLA"/>
		<reference ref_id="1173691" ref_url="https://bugzilla.suse.com/1173691" source="BUGZILLA"/>
		<reference ref_id="1173694" ref_url="https://bugzilla.suse.com/1173694" source="BUGZILLA"/>
		<reference ref_id="1173700" ref_url="https://bugzilla.suse.com/1173700" source="BUGZILLA"/>
		<reference ref_id="1173701" ref_url="https://bugzilla.suse.com/1173701" source="BUGZILLA"/>
		<reference ref_id="1173743" ref_url="https://bugzilla.suse.com/1173743" source="BUGZILLA"/>
		<reference ref_id="1173874" ref_url="https://bugzilla.suse.com/1173874" source="BUGZILLA"/>
		<reference ref_id="1173875" ref_url="https://bugzilla.suse.com/1173875" source="BUGZILLA"/>
		<reference ref_id="1173876" ref_url="https://bugzilla.suse.com/1173876" source="BUGZILLA"/>
		<reference ref_id="1173880" ref_url="https://bugzilla.suse.com/1173880" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922/" source="CVE"/>
		<reference ref_id="CVE-2018-21247" ref_url="https://www.suse.com/security/cve/CVE-2018-21247/" source="CVE"/>
		<reference ref_id="CVE-2019-20839" ref_url="https://www.suse.com/security/cve/CVE-2019-20839/" source="CVE"/>
		<reference ref_id="CVE-2019-20840" ref_url="https://www.suse.com/security/cve/CVE-2019-20840/" source="CVE"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398/" source="CVE"/>
		<reference ref_id="CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399/" source="CVE"/>
		<reference ref_id="CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400/" source="CVE"/>
		<reference ref_id="CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401/" source="CVE"/>
		<reference ref_id="CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402/" source="CVE"/>
		<reference ref_id="CVE-2020-14403" ref_url="https://www.suse.com/security/cve/CVE-2020-14403/" source="CVE"/>
		<reference ref_id="CVE-2020-14404" ref_url="https://www.suse.com/security/cve/CVE-2020-14404/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- security update
  fix CVE-2018-21247 [bsc#1173874], uninitialized memory contents are vulnerable to Information leak
  fix CVE-2019-20839 [bsc#1173875], buffer overflow in ConnectClientToUnixSock()
  fix CVE-2019-20840 [bsc#1173876], unaligned accesses in hybiReadAndDecode can lead to denial of service
  fix CVE-2020-14398 [bsc#1173880], improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c
  fix CVE-2020-14397 [bsc#1173700], NULL pointer dereference in libvncserver/rfbregion.c
  fix CVE-2020-14399 [bsc#1173743], Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c.
  fix CVE-2020-14400 [bsc#1173691], Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c.
  fix CVE-2020-14401 [bsc#1173694], potential integer overflows in libvncserver/scale.c
  fix CVE-2020-14402 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2020-14403 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2020-14404 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2017-18922 [bsc#1173477], preauth buffer overwrite
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-07"/>
	<updated date="2020-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173691">SUSE bug 1173691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173694">SUSE bug 1173694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173700">SUSE bug 1173700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173743">SUSE bug 1173743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173874">SUSE bug 1173874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173875">SUSE bug 1173875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173876">SUSE bug 1173876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173880">SUSE bug 1173880</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18922">CVE-2017-18922 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-21247/">CVE-2018-21247 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21247">CVE-2018-21247 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20839/">CVE-2019-20839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20839">CVE-2019-20839 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20840/">CVE-2019-20840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20840">CVE-2019-20840 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14397">CVE-2020-14397 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14398">CVE-2020-14398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14399">CVE-2020-14399 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14400">CVE-2020-14400 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14401">CVE-2020-14401 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14402">CVE-2020-14402 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14403/">CVE-2020-14403 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14403">CVE-2020-14403 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14404/">CVE-2020-14404 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14404">CVE-2020-14404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531163" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531164" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152227" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- bsc#1174543 - secure boot related fixes
- bsc#1163019 - CVE-2020-8608: Potential OOB access due to unsafe snprintf() usages
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-07"/>
	<updated date="2020-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538546" comment="xen-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538547" comment="xen-doc-html-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538548" comment="xen-libs-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538549" comment="xen-libs-32bit-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538550" comment="xen-tools-4.9.4_10-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538551" comment="xen-tools-domU-4.9.4_10-3.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152228" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-Twig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1008644" ref_url="https://bugzilla.suse.com/1008644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9180" ref_url="https://www.suse.com/security/cve/CVE-2016-9180/" source="CVE"/>
		<description>
This update for perl-XML-Twig fixes the following issues:

- Security fix [bsc#1008644, CVE-2016-9180]
  * Added: the no_xxe option to XML::Twig::new, which causes the
    parse to fail if external entities are used (to prevent
    malicious XML to access the filesystem).
  * Setting expand_external_ents to 0 or -1 currently doesn't work
    as expected; To completely turn off expanding external entities
    use no_xxe.
  * Update documentation for XML::Twig to mention problems with
    expand_external_ents and add information about new no_xxe argument
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-07"/>
	<updated date="2020-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008644">SUSE bug 1008644</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9180/">CVE-2016-9180 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9180">CVE-2016-9180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531924" comment="perl-XML-Twig-3.44-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152229" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531165" comment="libX11-6-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531166" comment="libX11-6-32bit-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531167" comment="libX11-data-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531168" comment="libX11-xcb1-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531169" comment="libX11-xcb1-32bit-1.6.2-12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152230" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-c (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1083630" ref_url="https://bugzilla.suse.com/1083630" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12627" ref_url="https://www.suse.com/security/cve/CVE-2017-12627/" source="CVE"/>
		<description>
This update for xerces-c fixes the following issues:

- CVE-2017-12627: Processing of external DTD paths could have resulted in a
  null pointer dereference under certain conditions (bsc#1083630)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083630">SUSE bug 1083630</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12627/">CVE-2017-12627 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12627">CVE-2017-12627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531170" comment="libxerces-c-3_1-3.1.1-13.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531171" comment="libxerces-c-3_1-32bit-3.1.1-13.3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152231" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174662" ref_url="https://bugzilla.suse.com/1174662" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-9862" ref_url="https://www.suse.com/security/cve/CVE-2020-9862/" source="CVE"/>
		<reference ref_id="CVE-2020-9893" ref_url="https://www.suse.com/security/cve/CVE-2020-9893/" source="CVE"/>
		<reference ref_id="CVE-2020-9894" ref_url="https://www.suse.com/security/cve/CVE-2020-9894/" source="CVE"/>
		<reference ref_id="CVE-2020-9895" ref_url="https://www.suse.com/security/cve/CVE-2020-9895/" source="CVE"/>
		<reference ref_id="CVE-2020-9915" ref_url="https://www.suse.com/security/cve/CVE-2020-9915/" source="CVE"/>
		<reference ref_id="CVE-2020-9925" ref_url="https://www.suse.com/security/cve/CVE-2020-9925/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.4 (bsc#1174662):
  + Fix several crashes and rendering issues.
  + Security fixes: CVE-2020-9862, CVE-2020-9893, CVE-2020-9894,
    CVE-2020-9895, CVE-2020-9915, CVE-2020-9925.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9862/">CVE-2020-9862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9862">CVE-2020-9862 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9893/">CVE-2020-9893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9893">CVE-2020-9893 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9894/">CVE-2020-9894 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9894">CVE-2020-9894 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9895/">CVE-2020-9895 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9895">CVE-2020-9895 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9915/">CVE-2020-9915 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9915">CVE-2020-9915 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9925/">CVE-2020-9925 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9925">CVE-2020-9925 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531172" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531173" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531175" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531176" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531177" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531178" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152232" version="1" class="patch">
	<metadata>
		<title>Security update for perl-PlRPC (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="858243" ref_url="https://bugzilla.suse.com/858243" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7284" ref_url="https://www.suse.com/security/cve/CVE-2013-7284/" source="CVE"/>
		<description>
This update for perl-PlRPC fixes the following issues:

- Security notice: [bsc#858243, CVE-2013-7284]
  * Document security vulnerability on Storable and reply attack
- Add perl-PlRPC-CVE-2013-7284.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-14"/>
	<updated date="2020-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/858243">SUSE bug 858243</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7284/">CVE-2013-7284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7284">CVE-2013-7284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557494" comment="perl-PlRPC-0.2020-25.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152233" version="1" class="patch">
	<metadata>
		<title>Security update for zabbix (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174253" ref_url="https://bugzilla.suse.com/1174253" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15803" ref_url="https://www.suse.com/security/cve/CVE-2020-15803/" source="CVE"/>
		<description>
This update for zabbix fixes the following issues:

- Add patches to fix bsc#1174253 (CVE-2020-15803)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-17"/>
	<updated date="2020-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174253">SUSE bug 1174253</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15803/">CVE-2020-15803 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15803">CVE-2020-15803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557495" comment="zabbix-agent-4.0.12-4.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152234" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174922" ref_url="https://bugzilla.suse.com/1174922" source="BUGZILLA"/>
		<reference ref_id="1174923" ref_url="https://bugzilla.suse.com/1174923" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12673" ref_url="https://www.suse.com/security/cve/CVE-2020-12673/" source="CVE"/>
		<reference ref_id="CVE-2020-12674" ref_url="https://www.suse.com/security/cve/CVE-2020-12674/" source="CVE"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2020-12673: improper implementation of NTLM does not check message buffer size (bsc#1174922).
- CVE-2020-12674: improper implementation of RPA mechanism (bsc#1174923).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-19"/>
	<updated date="2020-08-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174922">SUSE bug 1174922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174923">SUSE bug 1174923</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12673/">CVE-2020-12673 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12673">CVE-2020-12673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12674/">CVE-2020-12674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12674">CVE-2020-12674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531186" comment="dovecot22-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531187" comment="dovecot22-backend-mysql-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531188" comment="dovecot22-backend-pgsql-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531189" comment="dovecot22-backend-sqlite-2.2.31-19.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152235" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-20907: Avoid a possible infinite loop caused by specifically crafted tarballs (bsc#1174091).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-19"/>
	<updated date="2020-08-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557496" comment="libpython2_7-1_0-2.7.17-28.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557497" comment="libpython2_7-1_0-32bit-2.7.17-28.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557498" comment="python-2.7.17-28.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557499" comment="python-32bit-2.7.17-28.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557500" comment="python-base-2.7.17-28.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557501" comment="python-base-32bit-2.7.17-28.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557502" comment="python-curses-2.7.17-28.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557503" comment="python-demo-2.7.17-28.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557504" comment="python-devel-2.7.17-28.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557505" comment="python-doc-2.7.17-28.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557506" comment="python-doc-pdf-2.7.17-28.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557507" comment="python-gdbm-2.7.17-28.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557508" comment="python-idle-2.7.17-28.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557509" comment="python-tk-2.7.17-28.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557510" comment="python-xml-2.7.17-28.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152236" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172745" ref_url="https://bugzilla.suse.com/1172745" source="BUGZILLA"/>
		<reference ref_id="1174421" ref_url="https://bugzilla.suse.com/1174421" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705/" source="CVE"/>
		<description>
This update for grub2 fixes the following issues:

- CVE-2020-15705: Fail kernel validation without shim protocol (bsc#1174421).
- Add fibre channel device's ofpath support to grub-ofpathname and search hint to speed up root device discovery (bsc#1172745).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172745">SUSE bug 1172745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174421">SUSE bug 1174421</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15705">CVE-2020-15705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555767" comment="grub2-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538556" comment="grub2-i386-pc-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538558" comment="grub2-snapper-plugin-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538559" comment="grub2-systemd-sleep-plugin-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538560" comment="grub2-x86_64-efi-2.02-4.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538561" comment="grub2-x86_64-xen-2.02-4.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152237" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1160888" ref_url="https://bugzilla.suse.com/1160888" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14907" ref_url="https://www.suse.com/security/cve/CVE-2019-14907/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2019-14907: Fixed a Server-side crash after charset conversion failure during NTLMSSP processing (bsc#1160888).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-24"/>
	<updated date="2020-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1160888">SUSE bug 1160888</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14907/">CVE-2019-14907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14907">CVE-2019-14907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522551" comment="libdcerpc-binding0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522552" comment="libdcerpc-binding0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522553" comment="libdcerpc0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522554" comment="libdcerpc0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522555" comment="libndr-krb5pac0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522556" comment="libndr-krb5pac0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522557" comment="libndr-nbt0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522558" comment="libndr-nbt0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522559" comment="libndr-standard0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522560" comment="libndr-standard0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522561" comment="libndr0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522562" comment="libndr0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522563" comment="libnetapi0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522564" comment="libnetapi0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522565" comment="libsamba-credentials0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522566" comment="libsamba-credentials0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522567" comment="libsamba-errors0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522568" comment="libsamba-errors0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522569" comment="libsamba-hostconfig0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522570" comment="libsamba-hostconfig0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522571" comment="libsamba-passdb0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522572" comment="libsamba-passdb0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522573" comment="libsamba-util0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522574" comment="libsamba-util0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522575" comment="libsamdb0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522576" comment="libsamdb0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522577" comment="libsmbclient0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522578" comment="libsmbclient0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522579" comment="libsmbconf0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522580" comment="libsmbconf0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522581" comment="libsmbldap0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522582" comment="libsmbldap0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522583" comment="libtevent-util0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522584" comment="libtevent-util0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522585" comment="libwbclient0-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522586" comment="libwbclient0-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522587" comment="samba-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522588" comment="samba-client-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522589" comment="samba-client-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522590" comment="samba-doc-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522591" comment="samba-libs-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522592" comment="samba-libs-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522593" comment="samba-winbind-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522594" comment="samba-winbind-32bit-4.6.16+git.174.c2fd2e28c84-3.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152238" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174633" ref_url="https://bugzilla.suse.com/1174633" source="BUGZILLA"/>
		<reference ref_id="1174635" ref_url="https://bugzilla.suse.com/1174635" source="BUGZILLA"/>
		<reference ref_id="1174638" ref_url="https://bugzilla.suse.com/1174638" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14346" ref_url="https://www.suse.com/security/cve/CVE-2020-14346/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14347: Leak of uninitialized heap memory from the X server to clients on pixmap allocation (bsc#1174633, ZDI-CAN-11426).
- CVE-2020-14346: XIChangeHierarchy Integer Underflow Privilege Escalation Vulnerability (bsc#1174638, ZDI-CAN-11429).
- CVE-2020-14345: XKB out-of-bounds access privilege escalation vulnerability (bsc#1174635, ZDI-CAN-11428).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-26"/>
	<updated date="2020-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14345">CVE-2020-14345 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14346/">CVE-2020-14346 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14346">CVE-2020-14346 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14347">CVE-2020-14347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531240" comment="xorg-x11-server-7.6_1.18.3-76.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531241" comment="xorg-x11-server-extra-7.6_1.18.3-76.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152239" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="959714" ref_url="https://bugzilla.suse.com/959714" source="BUGZILLA"/>
		<description>
This update for openvpn fixes the following issues:

- openvpn-2.3.9-Fix-heap-overflow-on-getaddrinfo-result.patch was
  malformed in a way that caused patch(1) to ignore it.
  (bsc#959714)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-27"/>
	<updated date="2020-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959714">SUSE bug 959714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557511" comment="openvpn-2.3.8-16.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557512" comment="openvpn-auth-pam-plugin-2.3.8-16.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152240" version="1" class="patch">
	<metadata>
		<title>Security update for targetcli-fb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172743" ref_url="https://bugzilla.suse.com/1172743" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13867" ref_url="https://www.suse.com/security/cve/CVE-2020-13867/" source="CVE"/>
		<description>
This update for targetcli-fb fixes the following issues:

- CVE-2020-13867: Fixed weak permissions for /etc/target (bsc#1172743).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-28"/>
	<updated date="2020-08-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172743">SUSE bug 1172743</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13867/">CVE-2020-13867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13867">CVE-2020-13867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557513" comment="targetcli-fb-2.1.43-7.9.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152241" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17631" ref_url="https://www.suse.com/security/cve/CVE-2019-17631/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2996" ref_url="https://www.suse.com/security/cve/CVE-2019-2996/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2958
    CVE-2019-2962 CVE-2019-2964 CVE-2019-2975
    CVE-2019-2978 CVE-2019-2983 CVE-2019-2988
    CVE-2019-2989 CVE-2019-2992 CVE-2019-2996
    CVE-2019-2999 CVE-2019-2973 CVE-2019-2981
    CVE-2019-17631
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17631/">CVE-2019-17631 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17631">CVE-2019-17631 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2958">CVE-2019-2958 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2975">CVE-2019-2975 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2996/">CVE-2019-2996 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2996">CVE-2019-2996 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152242" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174910" ref_url="https://bugzilla.suse.com/1174910" source="BUGZILLA"/>
		<reference ref_id="1174913" ref_url="https://bugzilla.suse.com/1174913" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14361: Fix XkbSelectEvents() integer underflow (bsc#1174910 ZDI-CAN-11573).
- CVE-2020-14362: Fix XRecordRegisterClients() Integer underflow (bsc#1174913 ZDI-CAN-11574).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-01"/>
	<updated date="2020-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14361">CVE-2020-14361 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14362">CVE-2020-14362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531257" comment="xorg-x11-server-7.6_1.18.3-76.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531258" comment="xorg-x11-server-extra-7.6_1.18.3-76.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152243" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1175070" ref_url="https://bugzilla.suse.com/1175070" source="BUGZILLA"/>
		<reference ref_id="1175071" ref_url="https://bugzilla.suse.com/1175071" source="BUGZILLA"/>
		<reference ref_id="1175072" ref_url="https://bugzilla.suse.com/1175072" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11985" ref_url="https://www.suse.com/security/cve/CVE-2020-11985/" source="CVE"/>
		<reference ref_id="CVE-2020-11993" ref_url="https://www.suse.com/security/cve/CVE-2020-11993/" source="CVE"/>
		<reference ref_id="CVE-2020-9490" ref_url="https://www.suse.com/security/cve/CVE-2020-9490/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-9490: Fixed a crash caused by a specially crafted value for the 'Cache-Digest' header in a HTTP/2 request (bsc#1175071).
- CVE-2020-11985: IP address spoofing when proxying using mod_remoteip and mod_rewrite (bsc#1175072).
- CVE-2020-11993: When trace/debug was enabled for the HTTP/2 module logging statements were made on the wrong connection (bsc#1175070).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175070">SUSE bug 1175070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175071">SUSE bug 1175071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175072">SUSE bug 1175072</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11985/">CVE-2020-11985 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11985">CVE-2020-11985 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11993/">CVE-2020-11993 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11993">CVE-2020-11993 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-9490/">CVE-2020-9490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9490">CVE-2020-9490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531259" comment="apache2-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531260" comment="apache2-doc-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531261" comment="apache2-example-pages-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531262" comment="apache2-prefork-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531263" comment="apache2-utils-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531264" comment="apache2-worker-2.4.23-29.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152244" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 15 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14581
  CVE-2020-14556 CVE-2020-14621 CVE-2020-14593 CVE-2020-14583
  CVE-2019-17639
  * Class Libraries:
    - JAVA.UTIL.ZIP.DEFLATER OPERATIONS THROW JAVA.LANG.INTERNALERROR
    - JAVA 8 DECODER OBJECTS CONSUME A LARGE AMOUNT OF JAVA HEAP
    - TRANSLATION MESSAGES UPDATE FOR JCL
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Java Virtual Machine:
    - IBM JAVA REGISTERS A HANDLER BY DEFAULT FOR SIGABRT
    - LARGE MEMORY FOOTPRINT HELD BY TRACECONTEXT OBJECT
  * JIT Compiler:
    - CRASH IN THE INTERPRETER AFTER OSR FROM INLINED SYNCHRONIZED METHOD
      IN DEBUGGING MODE
    - INTERMITTENT ASSERTION FAILURE REPORTED
    - CRASH IN RESOLVECLASSREF() DURING AOT LOAD
    - JIT CRASH DURING CLASS UNLOADING IN J9METHOD_HT::ONCLASSUNLOADING()
    - SEGMENTATION FAULT WHILE COMPILING A METHOD
    - UNEXPECTED CLASSCASTEXCEPTION THROWN IN HIGH LEVEL PARALLEL
      APPLICATION ON IBM Z PLATFORM
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
    - CHANGES TO IBMJCE AND IBMJCEPLUS PROVIDERS
    - IBMJCEPLUS FAILS, WHEN THE SECURITY MANAGER IS ENABLED, WITH
      DEFAULT PERMISSIONS, SPECIFIED IN JAVA.POLICY FILE
    - IN CERTAIN INSTANCES, IBMJCEPLUS PROVIDER THROWS EXCEPTION FROM
      KEYFACTORY CLASS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17639">CVE-2019-17639 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531265" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531267" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152245" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="1175665" ref_url="https://bugzilla.suse.com/1175665" source="BUGZILLA"/>
		<reference ref_id="1175671" ref_url="https://bugzilla.suse.com/1175671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811/" source="CVE"/>
		<reference ref_id="CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-24606: Fix livelocking in peerDigestHandleReply (bsc#1175671).
- CVE-2020-15811: Improve Transfer-Encoding handling (bsc#1175665).
- CVE-2020-15810: Enforce token characters for field-name (bsc#1175664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175665">SUSE bug 1175665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175671">SUSE bug 1175671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15810">CVE-2020-15810 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15811">CVE-2020-15811 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24606">CVE-2020-24606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531269" comment="squid-3.5.21-26.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152246" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1175239" ref_url="https://bugzilla.suse.com/1175239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363/" source="CVE"/>
		<description>
This update for libX11 fixes the following issues:

- CVE-2020-14363: Fix an integer overflow in init_om() (bsc#1175239).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175239">SUSE bug 1175239</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14363">CVE-2020-14363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531270" comment="libX11-6-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531271" comment="libX11-6-32bit-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531272" comment="libX11-data-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531273" comment="libX11-xcb1-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531274" comment="libX11-xcb1-32bit-1.6.2-12.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152247" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 70 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14621
  CVE-2020-14593 CVE-2020-14583 CVE-2019-17639
  * Class Libraries:
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17639">CVE-2019-17639 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531275" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531277" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531278" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152248" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1138529" ref_url="https://bugzilla.suse.com/1138529" source="BUGZILLA"/>
		<reference ref_id="1152856" ref_url="https://bugzilla.suse.com/1152856" source="BUGZILLA"/>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2894" ref_url="https://www.suse.com/security/cve/CVE-2019-2894/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u232 (icedtea 3.14.0) (October 2019 CPU, bsc#1154212)

Security issues fixed:

- CVE-2019-2933: Windows file handling redux
- CVE-2019-2945: Better socket support
- CVE-2019-2949: Better Kerberos ccache handling
- CVE-2019-2958: Build Better Processes
- CVE-2019-2964: Better support for patterns
- CVE-2019-2962: Better Glyph Images
- CVE-2019-2973: Better pattern compilation
- CVE-2019-2975: Unexpected exception in jjs
- CVE-2019-2978: Improved handling of jar files
- CVE-2019-2981: Better Path supports
- CVE-2019-2983: Better serial attributes
- CVE-2019-2987: Better rendering of native glyphs
- CVE-2019-2988: Better Graphics2D drawing
- CVE-2019-2989: Improve TLS connection support
- CVE-2019-2992: Enhance font glyph mapping
- CVE-2019-2999: Commentary on Javadoc comments
- CVE-2019-2894: Enhance ECDSA operations (bsc#1152856)

Bug fixes:

- Add patch to fix hotspot-aarch64 (bsc#1138529).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1138529">SUSE bug 1138529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152856">SUSE bug 1152856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2894/">CVE-2019-2894 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2894">CVE-2019-2894 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2949">CVE-2019-2949 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2958">CVE-2019-2958 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2975">CVE-2019-2975 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2987">CVE-2019-2987 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522595" comment="java-1_8_0-openjdk-1.8.0.232-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557514" comment="java-1_8_0-openjdk-demo-1.8.0.232-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557515" comment="java-1_8_0-openjdk-devel-1.8.0.232-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522596" comment="java-1_8_0-openjdk-headless-1.8.0.232-27.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152249" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173991" ref_url="https://bugzilla.suse.com/1173991" source="BUGZILLA"/>
		<reference ref_id="1174284" ref_url="https://bugzilla.suse.com/1174284" source="BUGZILLA"/>
		<reference ref_id="1175686" ref_url="https://bugzilla.suse.com/1175686" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.2.0 ESR
  * Fixed: Various stability, functionality, and security fixes
- Mozilla Firefox ESR 78.2
  MFSA 2020-38 (bsc#1175686)
  * CVE-2020-15663 (bmo#1643199)
    Downgrade attack on the Mozilla Maintenance Service could
    have resulted in escalation of privilege
  * CVE-2020-15664 (bmo#1658214)
    Attacker-induced prompt for extension installation
  * CVE-2020-15670 (bmo#1651001, bmo#1651449, bmo#1653626,
    bmo#1656957)
    Memory safety bugs fixed in Firefox 80 and Firefox ESR 78.2

- Fixed Firefox tab crash in FIPS mode (bsc#1174284).

- Fix broken translation-loading. (bsc#1173991) 
  * allow addon sideloading
  * mark signatures for langpacks non-mandatory
  * do not autodisable user profile scopes
- Google API key is not usable for geolocation service any more
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173991">SUSE bug 1173991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174284">SUSE bug 1174284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15663">CVE-2020-15663 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15664">CVE-2020-15664 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15670">CVE-2020-15670 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531280" comment="MozillaFirefox-78.2.0-112.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531281" comment="MozillaFirefox-devel-78.2.0-112.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531282" comment="MozillaFirefox-translations-common-78.2.0-112.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152250" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172491" ref_url="https://bugzilla.suse.com/1172491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13790" ref_url="https://www.suse.com/security/cve/CVE-2020-13790/" source="CVE"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2020-13790: Fixed a heap-based buffer over-read via a malformed PPM input file (bsc#1172491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-08"/>
	<updated date="2020-09-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172491">SUSE bug 1172491</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13790/">CVE-2020-13790 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13790">CVE-2020-13790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557516" comment="libjpeg-turbo-1.5.3-31.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557517" comment="libjpeg62-62.2.0-31.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557518" comment="libjpeg62-32bit-62.2.0-31.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557519" comment="libjpeg62-turbo-1.5.3-31.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557520" comment="libjpeg8-8.1.2-31.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557521" comment="libjpeg8-32bit-8.1.2-31.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557522" comment="libturbojpeg0-8.1.2-31.22.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152251" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159928" ref_url="https://bugzilla.suse.com/1159928" source="BUGZILLA"/>
		<reference ref_id="1161517" ref_url="https://bugzilla.suse.com/1161517" source="BUGZILLA"/>
		<reference ref_id="1161521" ref_url="https://bugzilla.suse.com/1161521" source="BUGZILLA"/>
		<reference ref_id="1172021" ref_url="https://bugzilla.suse.com/1172021" source="BUGZILLA"/>
		<reference ref_id="1176179" ref_url="https://bugzilla.suse.com/1176179" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2019-20388: Fixed a memory leak in xmlSchemaPreRun (bsc#1161521).
- CVE-2020-7595: Fixed an infinite loop in an EOF situation (bsc#1161517).
- CVE-2020-24977: Fixed a global-buffer-overflow in xmlEncodeEntitiesInternal (bsc#1176179).
- Fixed invalid xmlns references due to CVE-2019-19956 (bsc#1172021).
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-11"/>
	<updated date="2020-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159928">SUSE bug 1159928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161517">SUSE bug 1161517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161521">SUSE bug 1161521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172021">SUSE bug 1172021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176179">SUSE bug 1176179</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19956">CVE-2019-19956 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20388">CVE-2019-20388 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24977">CVE-2020-24977 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557524" comment="libxml2-2-2.9.4-46.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557525" comment="libxml2-2-32bit-2.9.4-46.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557526" comment="libxml2-doc-2.9.4-46.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557527" comment="libxml2-tools-2.9.4-46.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557528" comment="python-libxml2-2.9.4-46.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152252" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update java-1_8_0-openjdk to version jdk8u242 (icedtea 3.15.0) (January 2020 CPU, bsc#1160968):

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2020-2590: Improve Kerberos interop capabilities
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2601: Better Ticket Granting Services
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support
- CVE-2020-2654: Improve Object Identifier Processing
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-30"/>
	<updated date="2020-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2590">CVE-2020-2590 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2601">CVE-2020-2601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522598" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531291" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531292" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522599" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152253" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1164860" ref_url="https://bugzilla.suse.com/1164860" source="BUGZILLA"/>
		<reference ref_id="1174117" ref_url="https://bugzilla.suse.com/1174117" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13935" ref_url="https://www.suse.com/security/cve/CVE-2020-13935/" source="CVE"/>
		<reference ref_id="CVE-2020-1935" ref_url="https://www.suse.com/security/cve/CVE-2020-1935/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-1935: Fixed an HTTP request smuggling vulnerability (bsc#1164860).
- CVE-2020-13935: Fixed a WebSocket DoS (bsc#1174117).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-11"/>
	<updated date="2020-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1164860">SUSE bug 1164860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174117">SUSE bug 1174117</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13935/">CVE-2020-13935 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13935">CVE-2020-13935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1935/">CVE-2020-1935 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1935">CVE-2020-1935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531293" comment="tomcat-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531294" comment="tomcat-admin-webapps-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531295" comment="tomcat-docs-webapp-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531296" comment="tomcat-el-3_0-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531297" comment="tomcat-javadoc-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531298" comment="tomcat-jsp-2_3-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531299" comment="tomcat-lib-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531300" comment="tomcat-servlet-3_1-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531301" comment="tomcat-webapps-8.0.53-29.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152254" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1149164" ref_url="https://bugzilla.suse.com/1149164" source="BUGZILLA"/>
		<reference ref_id="1152930" ref_url="https://bugzilla.suse.com/1152930" source="BUGZILLA"/>
		<reference ref_id="1174477" ref_url="https://bugzilla.suse.com/1174477" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14342" ref_url="https://www.suse.com/security/cve/CVE-2020-14342/" source="CVE"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2020-14342: Fixed a shell command injection vulnerability in mount.cifs (bsc#1174477). 
- Fixed an invalid free in mount.cifs; (bsc#1152930).
- Fixed a double-free in mount.cifs; (bsc#1149164).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-14"/>
	<updated date="2020-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149164">SUSE bug 1149164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152930">SUSE bug 1152930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174477">SUSE bug 1174477</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14342/">CVE-2020-14342 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14342">CVE-2020-14342 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557529" comment="cifs-utils-6.9-9.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152255" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1175476" ref_url="https://bugzilla.suse.com/1175476" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14562" ref_url="https://www.suse.com/security/cve/CVE-2019-14562/" source="CVE"/>
		<description>
This update for ovmf fixes the following issues:

- CVE-2019-14562: Fixed an overflow in DxeImageVerificationHandler (bsc#1175476).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-14"/>
	<updated date="2020-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175476">SUSE bug 1175476</bugzilla>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14562/">CVE-2019-14562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14562">CVE-2019-14562 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557530" comment="ovmf-2017+git1492060560.b6d11d7c46-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557531" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557532" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152256" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1175626" ref_url="https://bugzilla.suse.com/1175626" source="BUGZILLA"/>
		<reference ref_id="1175656" ref_url="https://bugzilla.suse.com/1175656" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<description>
This update for shim fixes the following issues:

- Update to the unified shim binary from SUSE Linux Enterprise 15-SP1 (bsc#1168994)

This update addresses the 'BootHole' security issue (master CVE CVE-2020-10713), by
disallowing binaries signed by the previous SUSE UEFI signing key from booting.

This update should only be installed after updates of grub2, the Linux kernel and (if used)
Xen from July / August 2020 are applied.

Additional fixes:

+ shim-install: install MokManager to \EFI\boot to process the pending MOK request (bsc#1175626, bsc#1175656)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-14"/>
	<updated date="2020-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175626">SUSE bug 1175626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175656">SUSE bug 1175656</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538600" comment="shim-15+git47-25.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152257" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120629" ref_url="https://bugzilla.suse.com/1120629" source="BUGZILLA"/>
		<reference ref_id="1120630" ref_url="https://bugzilla.suse.com/1120630" source="BUGZILLA"/>
		<reference ref_id="1120631" ref_url="https://bugzilla.suse.com/1120631" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1131823" ref_url="https://bugzilla.suse.com/1131823" source="BUGZILLA"/>
		<reference ref_id="1137977" ref_url="https://bugzilla.suse.com/1137977" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<description>
This update for libsolv fixes the following issues:

This is a reissue of an existing libsolv update that also included libsolv-devel for LTSS products.

libsolv was updated to version 0.6.36 fixes the following issues:

Security issues fixed:

- CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629).
- CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630).
- CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631).

Non-security issues fixed:

- Made cleandeps jobs on patterns work (bsc#1137977).
- Fixed an issue multiversion packages that obsolete their own name (bsc#1127155).
- Keep consistent package name if there are multiple alternatives (bsc#1131823).

		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131823">SUSE bug 1131823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137977">SUSE bug 1137977</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20532">CVE-2018-20532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20533">CVE-2018-20533 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20534">CVE-2018-20534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555772" comment="libsolv-devel-0.6.36-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555773" comment="libsolv-tools-0.6.36-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555774" comment="perl-solv-0.6.36-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555775" comment="python-solv-0.6.36-2.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152258" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176409" ref_url="https://bugzilla.suse.com/1176409" source="BUGZILLA"/>
		<reference ref_id="1176412" ref_url="https://bugzilla.suse.com/1176412" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392/" source="CVE"/>
		<reference ref_id="CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393/" source="CVE"/>
		<description>
This update for perl-DBI fixes the following issues:

Security issues fixed:

- CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated (bsc#1176412).
- CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name (bsc#1176409).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176409">SUSE bug 1176409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176412">SUSE bug 1176412</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14392">CVE-2020-14392 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14393">CVE-2020-14393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531302" comment="perl-DBI-1.628-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152259" version="1" class="patch">
	<metadata>
		<title>Security update for less (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="921719" ref_url="https://bugzilla.suse.com/921719" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9488" ref_url="https://www.suse.com/security/cve/CVE-2014-9488/" source="CVE"/>
		<description>
This update for less fixes the following issues:

Security issue fixed:

- CVE-2014-9488: Malformed UTF-8 data could have caused an out of bounds read in 
  the UTF-8 decoding routines, causing an invalid read access (bsc#921719).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-21"/>
	<updated date="2020-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/921719">SUSE bug 921719</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-9488/">CVE-2014-9488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9488">CVE-2014-9488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557533" comment="less-458-7.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152260" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010786" ref_url="https://bugzilla.suse.com/1010786" source="BUGZILLA"/>
		<reference ref_id="1010979" ref_url="https://bugzilla.suse.com/1010979" source="BUGZILLA"/>
		<reference ref_id="1010980" ref_url="https://bugzilla.suse.com/1010980" source="BUGZILLA"/>
		<reference ref_id="1011829" ref_url="https://bugzilla.suse.com/1011829" source="BUGZILLA"/>
		<reference ref_id="1020451" ref_url="https://bugzilla.suse.com/1020451" source="BUGZILLA"/>
		<reference ref_id="1020456" ref_url="https://bugzilla.suse.com/1020456" source="BUGZILLA"/>
		<reference ref_id="1020458" ref_url="https://bugzilla.suse.com/1020458" source="BUGZILLA"/>
		<reference ref_id="1020460" ref_url="https://bugzilla.suse.com/1020460" source="BUGZILLA"/>
		<reference ref_id="1045450" ref_url="https://bugzilla.suse.com/1045450" source="BUGZILLA"/>
		<reference ref_id="1057152" ref_url="https://bugzilla.suse.com/1057152" source="BUGZILLA"/>
		<reference ref_id="1088278" ref_url="https://bugzilla.suse.com/1088278" source="BUGZILLA"/>
		<reference ref_id="1092115" ref_url="https://bugzilla.suse.com/1092115" source="BUGZILLA"/>
		<reference ref_id="1114498" ref_url="https://bugzilla.suse.com/1114498" source="BUGZILLA"/>
		<reference ref_id="1115637" ref_url="https://bugzilla.suse.com/1115637" source="BUGZILLA"/>
		<reference ref_id="1117328" ref_url="https://bugzilla.suse.com/1117328" source="BUGZILLA"/>
		<reference ref_id="1120805" ref_url="https://bugzilla.suse.com/1120805" source="BUGZILLA"/>
		<reference ref_id="1120807" ref_url="https://bugzilla.suse.com/1120807" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9397" ref_url="https://www.suse.com/security/cve/CVE-2016-9397/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9399" ref_url="https://www.suse.com/security/cve/CVE-2016-9399/" source="CVE"/>
		<reference ref_id="CVE-2016-9557" ref_url="https://www.suse.com/security/cve/CVE-2016-9557/" source="CVE"/>
		<reference ref_id="CVE-2017-14132" ref_url="https://www.suse.com/security/cve/CVE-2017-14132/" source="CVE"/>
		<reference ref_id="CVE-2017-5499" ref_url="https://www.suse.com/security/cve/CVE-2017-5499/" source="CVE"/>
		<reference ref_id="CVE-2017-5503" ref_url="https://www.suse.com/security/cve/CVE-2017-5503/" source="CVE"/>
		<reference ref_id="CVE-2017-5504" ref_url="https://www.suse.com/security/cve/CVE-2017-5504/" source="CVE"/>
		<reference ref_id="CVE-2017-5505" ref_url="https://www.suse.com/security/cve/CVE-2017-5505/" source="CVE"/>
		<reference ref_id="CVE-2017-9782" ref_url="https://www.suse.com/security/cve/CVE-2017-9782/" source="CVE"/>
		<reference ref_id="CVE-2018-18873" ref_url="https://www.suse.com/security/cve/CVE-2018-18873/" source="CVE"/>
		<reference ref_id="CVE-2018-19139" ref_url="https://www.suse.com/security/cve/CVE-2018-19139/" source="CVE"/>
		<reference ref_id="CVE-2018-19543" ref_url="https://www.suse.com/security/cve/CVE-2018-19543/" source="CVE"/>
		<reference ref_id="CVE-2018-20570" ref_url="https://www.suse.com/security/cve/CVE-2018-20570/" source="CVE"/>
		<reference ref_id="CVE-2018-20622" ref_url="https://www.suse.com/security/cve/CVE-2018-20622/" source="CVE"/>
		<reference ref_id="CVE-2018-9154" ref_url="https://www.suse.com/security/cve/CVE-2018-9154/" source="CVE"/>
		<reference ref_id="CVE-2018-9252" ref_url="https://www.suse.com/security/cve/CVE-2018-9252/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2016-9398: Improved patch for already fixed issue (bsc#1010979).
- CVE-2016-9399: Fix assert in calcstepsizes (bsc#1010980).
- CVE-2016-9397: Fix assert in jpc_dequantize (bsc#1010786).
- CVE-2016-9557: Fix signed integer overflow (bsc#1011829).
- CVE-2017-5499: Validate component depth bit (bsc#1020451).
- CVE-2017-5503: Check bounds in jas_seq2d_bindsub() (bsc#1020456).
- CVE-2017-5504: Check bounds in jas_seq2d_bindsub() (bsc#1020458).
- CVE-2017-5505: Check bounds in jas_seq2d_bindsub() (bsc#1020460).
- CVE-2017-14132: Fix heap base overflow in by checking components (bsc#1057152).
- CVE-2018-9154: Fixed a potential denial of service in jpc_dec_process_sot() (bsc#1092115).
- CVE-2018-9252: Fix reachable assertion in jpc_abstorelstepsize (bsc#1088278).
- CVE-2018-18873: Fix null pointer deref in ras_putdatastd (bsc#1114498).
- CVE-2018-19139: Fix mem leaks by registering jpc_unk_destroyparms (bsc#1115637).
- CVE-2018-19543, bsc#1045450 CVE-2017-9782: Fix numchans mixup (bsc#1117328).
- CVE-2018-20570: Fix heap based buffer over-read in jp2_encode (bsc#1120807).
- CVE-2018-20622: Fix memory leak in jas_malloc.c (bsc#1120805).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-21"/>
	<updated date="2020-09-21"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1010786">SUSE bug 1010786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010979">SUSE bug 1010979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010980">SUSE bug 1010980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011829">SUSE bug 1011829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020451">SUSE bug 1020451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020456">SUSE bug 1020456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020458">SUSE bug 1020458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020460">SUSE bug 1020460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045450">SUSE bug 1045450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057152">SUSE bug 1057152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088278">SUSE bug 1088278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092115">SUSE bug 1092115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114498">SUSE bug 1114498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115637">SUSE bug 1115637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117328">SUSE bug 1117328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120805">SUSE bug 1120805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120807">SUSE bug 1120807</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9397/">CVE-2016-9397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9397">CVE-2016-9397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9398">CVE-2016-9398 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9399/">CVE-2016-9399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9399">CVE-2016-9399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9557/">CVE-2016-9557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9557">CVE-2016-9557 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14132/">CVE-2017-14132 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14132">CVE-2017-14132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5499/">CVE-2017-5499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5499">CVE-2017-5499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5503/">CVE-2017-5503 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5503">CVE-2017-5503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5504/">CVE-2017-5504 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5504">CVE-2017-5504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5505/">CVE-2017-5505 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5505">CVE-2017-5505 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9782/">CVE-2017-9782 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9782">CVE-2017-9782 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18873/">CVE-2018-18873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18873">CVE-2018-18873 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19139/">CVE-2018-19139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19139">CVE-2018-19139 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19543/">CVE-2018-19543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19543">CVE-2018-19543 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20570/">CVE-2018-20570 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20570">CVE-2018-20570 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20622/">CVE-2018-20622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20622">CVE-2018-20622 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9154/">CVE-2018-9154 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9154">CVE-2018-9154 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9252/">CVE-2018-9252 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9252">CVE-2018-9252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557534" comment="libjasper1-1.900.14-195.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557535" comment="libjasper1-32bit-1.900.14-195.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152261" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="1130840" ref_url="https://bugzilla.suse.com/1130840" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="1153238" ref_url="https://bugzilla.suse.com/1153238" source="BUGZILLA"/>
		<reference ref_id="1162423" ref_url="https://bugzilla.suse.com/1162423" source="BUGZILLA"/>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="1174701" ref_url="https://bugzilla.suse.com/1174701" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-20907: Fixed denial of service by avoiding possible infinite loop in specifically crafted tarball (bsc#1174091).
- CVE-2020-14422: Fixed an improper computation of hash values in the IPv4Interface and IPv6Interface 
  could have led to denial of service (bsc#1173274).
- CVE-2019-16935: Fixed a reflected XSS in python/Lib/DocXMLRPCServer.py (bsc#1153238).
- CVE-2019-9947: Fixed an issue in urllib2 which allowed CRLF injection if the attacker controls a url parameter (bsc#1130840).
- If the locale is 'C', coerce it to C.UTF-8 (bsc#1162423).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-21"/>
	<updated date="2020-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162423">SUSE bug 1162423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174701">SUSE bug 1174701</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16935">CVE-2019-16935 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14422">CVE-2020-14422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531303" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531304" comment="python3-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531305" comment="python3-base-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531306" comment="python3-curses-3.4.10-25.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152262" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1113038" ref_url="https://bugzilla.suse.com/1113038" source="BUGZILLA"/>
		<reference ref_id="1113039" ref_url="https://bugzilla.suse.com/1113039" source="BUGZILLA"/>
		<reference ref_id="1130489" ref_url="https://bugzilla.suse.com/1130489" source="BUGZILLA"/>
		<reference ref_id="1141680" ref_url="https://bugzilla.suse.com/1141680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18584" ref_url="https://www.suse.com/security/cve/CVE-2018-18584/" source="CVE"/>
		<reference ref_id="CVE-2018-18585" ref_url="https://www.suse.com/security/cve/CVE-2018-18585/" source="CVE"/>
		<reference ref_id="CVE-2019-1010305" ref_url="https://www.suse.com/security/cve/CVE-2019-1010305/" source="CVE"/>
		<description>
This update for libmspack fixes the following issues:

Security issues fixed:

- CVE-2019-1010305: Fixed a buffer overflow triggered by a crafted chm file
  which could have led to information disclosure (bsc#1141680).
- CVE-2018-18584: The CAB block input buffer was one byte too small for the 
  maximal Quantum block, leading to an out-of-bounds write. (bsc#1113038)
- CVE-2018-18585: chmd_read_headers accepted a filename that has '\0' as its 
  first or second character (such as the '/\0' name). (bsc#1113039)
- Fix off-by-one bounds check on CHM PMGI/PMGL chunk numbers and reject empty filenames.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-22"/>
	<updated date="2020-09-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1113038">SUSE bug 1113038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113039">SUSE bug 1113039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130489">SUSE bug 1130489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141680">SUSE bug 1141680</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18584/">CVE-2018-18584 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18584">CVE-2018-18584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18585/">CVE-2018-18585 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18585">CVE-2018-18585 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1010305/">CVE-2019-1010305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010305">CVE-2019-1010305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557536" comment="libmspack0-0.4-15.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152263" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174120" ref_url="https://bugzilla.suse.com/1174120" source="BUGZILLA"/>
		<reference ref_id="1174316" ref_url="https://bugzilla.suse.com/1174316" source="BUGZILLA"/>
		<reference ref_id="1176579" ref_url="https://bugzilla.suse.com/1176579" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

-  ZeroLogon: An elevation of privilege was possible with some configurations when an attacker established
a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC) 
(CVE-2020-1472, bsc#1176579).

- Fixed an issue where multiple home folders were created(bsc#1174316, bso#13369).

- Fixed an issue where the net command was unable to negotiate SMB2 (bsc#1174120);
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174120">SUSE bug 1174120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174316">SUSE bug 1174316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176579">SUSE bug 1176579</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1472">CVE-2020-1472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555776" comment="libdcerpc-binding0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538606" comment="libdcerpc-binding0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555777" comment="libdcerpc0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538608" comment="libdcerpc0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555778" comment="libndr-krb5pac0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538610" comment="libndr-krb5pac0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555779" comment="libndr-nbt0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538612" comment="libndr-nbt0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555780" comment="libndr-standard0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538614" comment="libndr-standard0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555781" comment="libndr0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538616" comment="libndr0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555782" comment="libnetapi0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538618" comment="libnetapi0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555783" comment="libsamba-credentials0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538620" comment="libsamba-credentials0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555784" comment="libsamba-errors0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538622" comment="libsamba-errors0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555785" comment="libsamba-hostconfig0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538624" comment="libsamba-hostconfig0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555786" comment="libsamba-passdb0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538626" comment="libsamba-passdb0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555787" comment="libsamba-util0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538628" comment="libsamba-util0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555788" comment="libsamdb0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538630" comment="libsamdb0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555789" comment="libsmbclient0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538632" comment="libsmbclient0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555790" comment="libsmbconf0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538634" comment="libsmbconf0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555791" comment="libsmbldap0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538636" comment="libsmbldap0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555792" comment="libtevent-util0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538638" comment="libtevent-util0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555793" comment="libwbclient0-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538640" comment="libwbclient0-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555794" comment="samba-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555795" comment="samba-client-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538643" comment="samba-client-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538644" comment="samba-doc-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555796" comment="samba-libs-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538646" comment="samba-libs-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555797" comment="samba-winbind-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538648" comment="samba-winbind-32bit-4.6.16+git.237.40a3f495f75-3.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152264" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120930" ref_url="https://bugzilla.suse.com/1120930" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19840" ref_url="https://www.suse.com/security/cve/CVE-2018-19840/" source="CVE"/>
		<description>
This update for wavpack fixes the following issues:

Security issues fixed:

- CVE-2018-19840: Fixed a denial-of-service in the WavpackPackInit function from pack_utils.c (bsc#1120930)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120930">SUSE bug 1120930</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19840/">CVE-2018-19840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19840">CVE-2018-19840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557537" comment="libwavpack1-4.60.99-5.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152265" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047054" ref_url="https://bugzilla.suse.com/1047054" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11527" ref_url="https://www.suse.com/security/cve/CVE-2017-11527/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:
	  
- CVE-2017-11527: Fixed a denial of service inReadDPXImage() (bsc#1047054).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-25"/>
	<updated date="2020-09-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047054">SUSE bug 1047054</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11527/">CVE-2017-11527 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11527">CVE-2017-11527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557538" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.144.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557539" comment="ImageMagick-config-6-upstream-6.8.8.1-71.144.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557540" comment="libMagickCore-6_Q16-1-6.8.8.1-71.144.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557541" comment="libMagickWand-6_Q16-1-6.8.8.1-71.144.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152266" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172515" ref_url="https://bugzilla.suse.com/1172515" source="BUGZILLA"/>
		<reference ref_id="1176315" ref_url="https://bugzilla.suse.com/1176315" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507/" source="CVE"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2020-17507: Fixed a buffer overflow in XBM parser (bsc#1176315)
- Made handling of XDG_RUNTIME_DIR more secure (bsc#1172515)	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-25"/>
	<updated date="2020-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172515">SUSE bug 1172515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176315">SUSE bug 1176315</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17507">CVE-2020-17507 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555798" comment="libQt5Concurrent5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555799" comment="libQt5Core5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555800" comment="libQt5DBus5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555801" comment="libQt5Gui5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555802" comment="libQt5Network5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555803" comment="libQt5OpenGL5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555804" comment="libQt5PrintSupport5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555805" comment="libQt5Sql5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555806" comment="libQt5Sql5-mysql-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555807" comment="libQt5Sql5-postgresql-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555808" comment="libQt5Sql5-sqlite-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555809" comment="libQt5Sql5-unixODBC-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555810" comment="libQt5Test5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555811" comment="libQt5Widgets5-5.6.2-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555812" comment="libQt5Xml5-5.6.2-6.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152267" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1167976" ref_url="https://bugzilla.suse.com/1167976" source="BUGZILLA"/>
		<reference ref_id="1173986" ref_url="https://bugzilla.suse.com/1173986" source="BUGZILLA"/>
		<reference ref_id="1174420" ref_url="https://bugzilla.suse.com/1174420" source="BUGZILLA"/>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

-Firefox was updated to 78.3.0 ESR (bsc#1176756, MFSA 2020-43)
   - CVE-2020-15677: Download origin spoofing via redirect
   - CVE-2020-15676: Fixed an XSS when pasting attacker-controlled data into a
     contenteditable element 
   - CVE-2020-15678: When recursing through layers while scrolling, an iterator
     may have become invalid, resulting in a potential use-after-free scenario
   - CVE-2020-15673: Fixed memory safety bugs 
- Enhance fix for wayland-detection (bsc#1174420)
- Attempt to fix langpack-parallelization by introducing separate
  obj-dirs for each lang (bsc#1173986, bsc#1167976)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-26"/>
	<updated date="2020-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167976">SUSE bug 1167976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173986">SUSE bug 1173986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174420">SUSE bug 1174420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15673">CVE-2020-15673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15676">CVE-2020-15676 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15677">CVE-2020-15677 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15678">CVE-2020-15678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531352" comment="MozillaFirefox-78.3.0-112.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531353" comment="MozillaFirefox-devel-78.3.0-112.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531354" comment="MozillaFirefox-translations-common-78.3.0-112.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152268" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1176343" ref_url="https://bugzilla.suse.com/1176343" source="BUGZILLA"/>
		<reference ref_id="1176344" ref_url="https://bugzilla.suse.com/1176344" source="BUGZILLA"/>
		<reference ref_id="1176345" ref_url="https://bugzilla.suse.com/1176345" source="BUGZILLA"/>
		<reference ref_id="1176346" ref_url="https://bugzilla.suse.com/1176346" source="BUGZILLA"/>
		<reference ref_id="1176347" ref_url="https://bugzilla.suse.com/1176347" source="BUGZILLA"/>
		<reference ref_id="1176348" ref_url="https://bugzilla.suse.com/1176348" source="BUGZILLA"/>
		<reference ref_id="1176349" ref_url="https://bugzilla.suse.com/1176349" source="BUGZILLA"/>
		<reference ref_id="1176350" ref_url="https://bugzilla.suse.com/1176350" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595/" source="CVE"/>
		<reference ref_id="CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596/" source="CVE"/>
		<reference ref_id="CVE-2020-25597" ref_url="https://www.suse.com/security/cve/CVE-2020-25597/" source="CVE"/>
		<reference ref_id="CVE-2020-25599" ref_url="https://www.suse.com/security/cve/CVE-2020-25599/" source="CVE"/>
		<reference ref_id="CVE-2020-25600" ref_url="https://www.suse.com/security/cve/CVE-2020-25600/" source="CVE"/>
		<reference ref_id="CVE-2020-25601" ref_url="https://www.suse.com/security/cve/CVE-2020-25601/" source="CVE"/>
		<reference ref_id="CVE-2020-25603" ref_url="https://www.suse.com/security/cve/CVE-2020-25603/" source="CVE"/>
		<reference ref_id="CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-25604: Fixed a race condition when migrating timers between x86 
  HVM vCPU-s (bsc#1176343,XSA-336)
- CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers (bsc#1176344,XSA-337)
- CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid (bsc#1176346,XSA-338)
- CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER (bsc#1176345,XSA-339)
- CVE-2020-25603: Fixed an issue due to  missing barriers when accessing/allocating an event channel (bsc#1176347,XSA-340)
- CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains (bsc#1176348,XSA-342)
- CVE-2020-25599: Fixed race conditions with evtchn_reset() (bsc#1176349,XSA-343)
- CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset() / evtchn_destroy() (bsc#1176350,XSA-344)	  
- CVE-2020-14364: Fixed an out-of-bounds read/write access while processing usb packets (bsc#1175534).
- Various bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-29"/>
	<updated date="2020-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176343">SUSE bug 1176343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176344">SUSE bug 1176344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176345">SUSE bug 1176345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176346">SUSE bug 1176346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176347">SUSE bug 1176347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176348">SUSE bug 1176348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176349">SUSE bug 1176349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176350">SUSE bug 1176350</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25595">CVE-2020-25595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25596">CVE-2020-25596 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25597/">CVE-2020-25597 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25597">CVE-2020-25597 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25599/">CVE-2020-25599 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25599">CVE-2020-25599 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25600/">CVE-2020-25600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25600">CVE-2020-25600 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25601/">CVE-2020-25601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25601">CVE-2020-25601 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25603/">CVE-2020-25603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25603">CVE-2020-25603 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25604">CVE-2020-25604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538664" comment="xen-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538665" comment="xen-doc-html-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538666" comment="xen-libs-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538667" comment="xen-libs-32bit-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538668" comment="xen-tools-4.9.4_12-3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538669" comment="xen-tools-domU-4.9.4_12-3.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152269" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120610" ref_url="https://bugzilla.suse.com/1120610" source="BUGZILLA"/>
		<reference ref_id="1130496" ref_url="https://bugzilla.suse.com/1130496" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20482" ref_url="https://www.suse.com/security/cve/CVE-2018-20482/" source="CVE"/>
		<reference ref_id="CVE-2019-9923" ref_url="https://www.suse.com/security/cve/CVE-2019-9923/" source="CVE"/>
		<description>
This update for tar fixes the following issues:

Security issues fixed:

- CVE-2019-9923: Fixed a denial of service while parsing certain archives with malformed extended headers in pax_decode_header() (bsc#1130496).
- CVE-2018-20482: Fixed a denial of service when the '--sparse' option mishandles file shrinkage during read access (bsc#1120610).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-30"/>
	<updated date="2020-09-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120610">SUSE bug 1120610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130496">SUSE bug 1130496</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20482/">CVE-2018-20482 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20482">CVE-2018-20482 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9923/">CVE-2019-9923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9923">CVE-2019-9923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557542" comment="tar-1.27.1-15.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557543" comment="tar-lang-1.27.1-15.6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152270" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1161982" ref_url="https://bugzilla.suse.com/1161982" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20433" ref_url="https://www.suse.com/security/cve/CVE-2019-20433/" source="CVE"/>
		<description>
This update for aspell fixes the following security issue:

- CVE-2019-20433: Fixed a buffer over-read when processing strings ending with a single '\0' byte with ucs-2 and ucs-4 encoding (bsc#1161982).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-30"/>
	<updated date="2020-09-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1161982">SUSE bug 1161982</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20433/">CVE-2019-20433 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20433">CVE-2019-20433 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557544" comment="aspell-0.60.6.1-18.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557545" comment="aspell-ispell-0.60.6.1-18.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557546" comment="libaspell15-0.60.6.1-18.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557547" comment="libaspell15-32bit-0.60.6.1-18.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152271" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176496" ref_url="https://bugzilla.suse.com/1176496" source="BUGZILLA"/>
		<reference ref_id="1176764" ref_url="https://bugzilla.suse.com/1176764" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7490" ref_url="https://www.suse.com/security/cve/CVE-2013-7490/" source="CVE"/>
		<reference ref_id="CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919/" source="CVE"/>
		<description>
This update for perl-DBI fixes the following issues:

- CVE-2019-20919: Fixed a NULL profile dereference in dbi_profile (bsc#1176764).
- CVE-2013-7490: Fixed memory corruption when using many arguments 
  to methods for CallbacksUsing (bsc#1176496).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176496">SUSE bug 1176496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176764">SUSE bug 1176764</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7490/">CVE-2013-7490 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7490">CVE-2013-7490 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20919">CVE-2019-20919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531376" comment="perl-DBI-1.628-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152272" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- java-1_7_0-openjdk was updated to 2.6.23 (July 2020 CPU, bsc#1174157)
    - JDK-8028431, CVE-2020-14579: NullPointerException in
    - DerValue.equals(DerValue)
    - JDK-8028591, CVE-2020-14578: NegativeArraySizeException in
    - sun.security.util.DerInputStream.getUnalignedBitString()
    - JDK-8230613: Better ASCII conversions
    - JDK-8231800: Better listing of arrays
    - JDK-8232014: Expand DTD support
    - JDK-8233255: Better Swing Buttons
    - JDK-8234032: Improve basic calendar services
    - JDK-8234042: Better factory production of certificates
    - JDK-8234418: Better parsing with CertificateFactory
    - JDK-8234836: Improve serialization handling
    - JDK-8236191: Enhance OID processing
    - JDK-8237592, CVE-2020-14577: Enhance certificate verification
    - JDK-8238002, CVE-2020-14581: Better matrix operations
    - JDK-8238804: Enhance key handling process
    - JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    - JDK-8238843: Enhanced font handing
    - JDK-8238920, CVE-2020-14583: Better Buffer support
    - JDK-8238925: Enhance WAV file playback
    - JDK-8240119, CVE-2020-14593: Less Affine Transformations
    - JDK-8240482: Improved WAV file playback
    - JDK-8241379: Update JCEKS support
    - JDK-8241522: Manifest improved jar headers redux
    - JDK-8242136, CVE-2020-14621: Better XML namespace handling
    - JDK-8040113: File not initialized in src/share/native/sun/awt/giflib/dgif_lib.c
    - JDK-8054446: Repeated offer and remove on ConcurrentLinkedQueue lead to an OutOfMemoryError
    - JDK-8077982: GIFLIB upgrade
    - JDK-8081315: 8077982 giflib upgrade breaks system giflib builds with earlier versions
    - JDK-8147087: Race when reusing PerRegionTable bitmaps may result in dropped remembered set entries
    - JDK-8151582: (ch) test java/nio/channels/AsyncCloseAndInterrupt.java failing due to 'Connection succeeded'
    - JDK-8155691: Update GIFlib library to the latest up-to-date
    - JDK-8181841: A TSA server returns timestamp with precision higher than milliseconds
    - JDK-8203190: SessionId.hashCode generates too many collisions
    - JDK-8217676: Upgrade libpng to 1.6.37
    - JDK-8220495: Update GIFlib library to the 5.1.8
    - JDK-8226892: ActionListeners on JRadioButtons don't get notified when selection is changed with arrow keys
    - JDK-8229899: Make java.io.File.isInvalid() less racy
    - JDK-8230597: Update GIFlib library to the 5.2.1
    - JDK-8230769: BufImg_SetupICM add ReleasePrimitiveArrayCritical call in early return
    - JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a
    - JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion() returns wrong result
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531377" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531378" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531379" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531380" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152273" version="1" class="patch">
	<metadata>
		<title>Security update for python36 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="1174571" ref_url="https://bugzilla.suse.com/1174571" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<description>
This update for python36 fixes the following issues:

- CVE-2019-20907, bsc#1174091: avoiding possible infinite loop in specifically crafted tarball.
- CVE-2020-14422, bsc#1173274: where hash collisions in IPv4Interface and IPv6Interface could lead to DOS.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-09"/>
	<updated date="2020-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174571">SUSE bug 1174571</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14422">CVE-2020-14422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557548" comment="libpython3_6m1_0-3.6.8-6.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557549" comment="python36-3.6.8-6.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557550" comment="python36-base-3.6.8-6.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557551" comment="python36-curses-3.6.8-6.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557552" comment="python36-dbm-3.6.8-6.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557553" comment="python36-devel-3.6.8-6.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557554" comment="python36-doc-3.6.8-6.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557555" comment="python36-idle-3.6.8-6.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557556" comment="python36-testsuite-3.6.8-6.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557557" comment="python36-tk-3.6.8-6.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557558" comment="python36-tools-3.6.8-6.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152274" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176733" ref_url="https://bugzilla.suse.com/1176733" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26117" ref_url="https://www.suse.com/security/cve/CVE-2020-26117/" source="CVE"/>
		<description>
This update for tigervnc fixes the following issues:

- CVE-2020-26117: Server certificates were stored as certiticate
  authorities, allowing malicious owners of these certificates
  to impersonate any server after a client had added an exception
  (bsc#1176733).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1176733">SUSE bug 1176733</bugzilla>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26117/">CVE-2020-26117 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26117">CVE-2020-26117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531381" comment="libXvnc1-1.6.0-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531382" comment="tigervnc-1.6.0-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531383" comment="xorg-x11-Xvnc-1.6.0-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152275" version="1" class="patch">
	<metadata>
		<title>Security update for libproxy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176410" ref_url="https://bugzilla.suse.com/1176410" source="BUGZILLA"/>
		<reference ref_id="1177143" ref_url="https://bugzilla.suse.com/1177143" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25219" ref_url="https://www.suse.com/security/cve/CVE-2020-25219/" source="CVE"/>
		<reference ref_id="CVE-2020-26154" ref_url="https://www.suse.com/security/cve/CVE-2020-26154/" source="CVE"/>
		<description>
This update for libproxy fixes the following issues:

- CVE-2020-25219: Rewrote url::recvline to be nonrecursive (bsc#1176410).
- CVE-2020-26154: Fixed a buffer overflow when PAC is enabled (bsc#1177143).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176410">SUSE bug 1176410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177143">SUSE bug 1177143</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25219/">CVE-2020-25219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25219">CVE-2020-25219 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26154/">CVE-2020-26154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26154">CVE-2020-26154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531384" comment="libproxy1-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531385" comment="libproxy1-32bit-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531386" comment="libproxy1-config-gnome3-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531387" comment="libproxy1-config-gnome3-32bit-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531388" comment="libproxy1-networkmanager-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531389" comment="libproxy1-pacrunner-webkit-0.4.13-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152276" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtimageformats (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1118598" ref_url="https://bugzilla.suse.com/1118598" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19871" ref_url="https://www.suse.com/security/cve/CVE-2018-19871/" source="CVE"/>
		<description>
This update for libqt5-qtimageformats fixes the following issues:

Security issues fixed:

- CVE-2018-19871: Fixed CPU exhaustion in QTgaFile (bsc#1118598)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-14"/>
	<updated date="2020-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118598">SUSE bug 1118598</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19871/">CVE-2018-19871 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19871">CVE-2018-19871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557559" comment="libqt5-qtimageformats-5.6.2-3.3.110 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152277" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtsvg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1118599" ref_url="https://bugzilla.suse.com/1118599" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19869" ref_url="https://www.suse.com/security/cve/CVE-2018-19869/" source="CVE"/>
		<description>
This update for libqt5-qtsvg fixes the following issues:

Security issues fixed:

- CVE-2018-19869: Fixed Denial of Service when parsing malformed URL reference (bsc#1118599)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-14"/>
	<updated date="2020-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118599">SUSE bug 1118599</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19869/">CVE-2018-19869 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19869">CVE-2018-19869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557560" comment="libQt5Svg5-5.6.2-3.3.110 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152278" version="1" class="patch">
	<metadata>
		<title>Security update for blktrace (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1091942" ref_url="https://bugzilla.suse.com/1091942" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10689" ref_url="https://www.suse.com/security/cve/CVE-2018-10689/" source="CVE"/>
		<description>
blktrace was updated to fix a security issue:

- CVE-2018-10689: Prevent buffer overflow in the dev_map_read function because
  the device and devno arrays were too small (bsc#1091942)
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-16"/>
	<updated date="2020-10-16"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1091942">SUSE bug 1091942</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10689/">CVE-2018-10689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10689">CVE-2018-10689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557561" comment="blktrace-1.0.5-8.5.74 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152279" version="1" class="patch">
	<metadata>
		<title>Security update for hunspell (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1151867" ref_url="https://bugzilla.suse.com/1151867" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16707" ref_url="https://www.suse.com/security/cve/CVE-2019-16707/" source="CVE"/>
		<description>
This update for hunspell fixes the following issues:

- CVE-2019-16707: Fixed an invalid read in SuggestMgr:leftcommonsubstring (bsc#1151867).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-20"/>
	<updated date="2020-10-20"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1151867">SUSE bug 1151867</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16707/">CVE-2019-16707 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16707">CVE-2019-16707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557562" comment="hunspell-1.3.2-19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557563" comment="hunspell-32bit-1.3.2-19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557564" comment="hunspell-tools-1.3.2-19.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152280" version="1" class="patch">
	<metadata>
		<title>Security update for taglib (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1096180" ref_url="https://bugzilla.suse.com/1096180" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11439" ref_url="https://www.suse.com/security/cve/CVE-2018-11439/" source="CVE"/>
		<description>
This update for taglib fixes the following issues:

- CVE-2018-11439: The TagLib::Ogg::FLAC::File::scan function allowed remote
  attackers to cause information disclosure (heap-based buffer over-read) via a
  crafted audio file (bsc#1096180).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-20"/>
	<updated date="2020-10-20"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1096180">SUSE bug 1096180</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11439/">CVE-2018-11439 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11439">CVE-2018-11439 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557565" comment="libtag1-1.9.1-3.4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557566" comment="libtag_c0-1.9.1-3.4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557567" comment="taglib-1.9.1-3.4.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152281" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177914" ref_url="https://bugzilla.suse.com/1177914" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<description>
This update for freetype2 fixes the following issues:

- CVE-2020-15999: fixed a heap buffer overflow found in the handling of embedded PNG bitmaps (bsc#1177914).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-22"/>
	<updated date="2020-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177914">SUSE bug 1177914</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531390" comment="ft2demos-2.6.3-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531391" comment="libfreetype6-2.6.3-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531392" comment="libfreetype6-32bit-2.6.3-7.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152282" version="1" class="patch">
	<metadata>
		<title>Security update for libcdio (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1082821" ref_url="https://bugzilla.suse.com/1082821" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18199" ref_url="https://www.suse.com/security/cve/CVE-2017-18199/" source="CVE"/>
		<description>
This update for libcdio fixes the following issues:

The following security vulnerability was addressed:

- CVE-2017-18199: Fixed a NULL pointer dereference in  realloc_symlink in
  rock.c, which allowed remote attackers to cause a denial of service via a
  crafted ISO file. (bsc#1082821)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-23"/>
	<updated date="2020-10-23"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1082821">SUSE bug 1082821</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18199/">CVE-2017-18199 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18199">CVE-2017-18199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557568" comment="libcdio14-0.90-6.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557569" comment="libcdio14-32bit-0.90-6.6.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152283" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1149332" ref_url="https://bugzilla.suse.com/1149332" source="BUGZILLA"/>
		<reference ref_id="1165784" ref_url="https://bugzilla.suse.com/1165784" source="BUGZILLA"/>
		<reference ref_id="1171878" ref_url="https://bugzilla.suse.com/1171878" source="BUGZILLA"/>
		<reference ref_id="1172085" ref_url="https://bugzilla.suse.com/1172085" source="BUGZILLA"/>
		<reference ref_id="1176013" ref_url="https://bugzilla.suse.com/1176013" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10029" ref_url="https://www.suse.com/security/cve/CVE-2020-10029/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:
	  
- CVE-2020-10029: Fixed a stack corruption from range reduction of pseudo-zero (bsc#1165784)
- Use posix_spawn on popen (bsc#1149332, bsc#1176013)
- Correct locking and cancellation cleanup in syslog functions (bsc#1172085)
- Fixed concurrent changes on nscd aware files (bsc#1171878)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-23"/>
	<updated date="2020-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149332">SUSE bug 1149332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165784">SUSE bug 1165784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171878">SUSE bug 1171878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172085">SUSE bug 1172085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176013">SUSE bug 1176013</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10029/">CVE-2020-10029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">CVE-2020-10029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531393" comment="glibc-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531394" comment="glibc-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531395" comment="glibc-devel-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531396" comment="glibc-devel-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531397" comment="glibc-html-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531398" comment="glibc-i18ndata-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531399" comment="glibc-info-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531400" comment="glibc-locale-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531401" comment="glibc-locale-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531402" comment="glibc-profile-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531403" comment="glibc-profile-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531404" comment="nscd-2.22-113.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152284" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1141844" ref_url="https://bugzilla.suse.com/1141844" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13616" ref_url="https://www.suse.com/security/cve/CVE-2019-13616/" source="CVE"/>
		<description>
This update for SDL fixes the following issues:

Secuirty issue fixed:

- CVE-2019-13616: Fixed heap-based buffer over-read in BlitNtoN in video/SDL_blit_N.c when called from SDL_SoftBlit (bsc#1141844).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-26"/>
	<updated date="2020-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141844">SUSE bug 1141844</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13616/">CVE-2019-13616 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13616">CVE-2019-13616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557570" comment="libSDL-1_2-0-1.2.15-15.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557571" comment="libSDL-1_2-0-32bit-1.2.15-15.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152285" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="1177872" ref_url="https://bugzilla.suse.com/1177872" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.0 ESR
  * Fixed: Various stability, functionality, and security fixes MFSA 2020-46 (bsc#1177872, bsc#1176756)
  * CVE-2020-15969 Use-after-free in usersctp
  * CVE-2020-15683 Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4
  * Fixed: Fixed legacy preferences not being properly applied when set via GPO
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-27"/>
	<updated date="2020-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15683">CVE-2020-15683 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15969">CVE-2020-15969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531405" comment="MozillaFirefox-78.4.0-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531406" comment="MozillaFirefox-devel-78.4.0-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531407" comment="MozillaFirefox-translations-common-78.4.0-112.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152286" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177158" ref_url="https://bugzilla.suse.com/1177158" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<description>
This update for spice fixes the following issues:

- CVE-2020-14355: Fixed multiple buffer overflow vulnerabilities in QUIC image decoding (bsc#1177158).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14355">CVE-2020-14355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555813" comment="libspice-server1-0.12.8-15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152287" version="1" class="patch">
	<metadata>
		<title>Security update for spice-gtk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177158" ref_url="https://bugzilla.suse.com/1177158" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<description>
This update for spice-gtk fixes the following issues:

- CVE-2020-14355: Fixed multiple buffer overflow vulnerabilities in QUIC image decoding (bsc#1177158).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14355">CVE-2020-14355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555814" comment="libspice-client-glib-2_0-8-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555815" comment="libspice-client-glib-helper-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555816" comment="libspice-client-gtk-3_0-5-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555817" comment="libspice-controller0-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555818" comment="typelib-1_0-SpiceClientGlib-2_0-0.33-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555819" comment="typelib-1_0-SpiceClientGtk-3_0-0.33-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152288" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1093447" ref_url="https://bugzilla.suse.com/1093447" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10196" ref_url="https://www.suse.com/security/cve/CVE-2018-10196/" source="CVE"/>
		<description>
This update for graphviz fixes the following issues:

- CVE-2018-10196: Fixed a null dereference in rebuild_vlis (bsc#1093447).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1093447">SUSE bug 1093447</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10196/">CVE-2018-10196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10196">CVE-2018-10196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557572" comment="graphviz-2.28.0-29.3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557573" comment="graphviz-gd-2.28.0-29.3.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557574" comment="graphviz-gnome-2.28.0-29.3.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557575" comment="graphviz-tcl-2.28.0-29.3.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152289" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173902" ref_url="https://bugzilla.suse.com/1173902" source="BUGZILLA"/>
		<reference ref_id="1173994" ref_url="https://bugzilla.suse.com/1173994" source="BUGZILLA"/>
		<reference ref_id="1177613" ref_url="https://bugzilla.suse.com/1177613" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<reference ref_id="CVE-2020-14383" ref_url="https://www.suse.com/security/cve/CVE-2020-14383/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-14383: An authenticated user can crash the DCE/RPC DNS with easily crafted records (bsc#1177613).
- CVE-2020-14323: Unprivileged user can crash winbind (bsc#1173994).
- CVE-2020-14318: Missing permissions check in SMB1/2/3 ChangeNotify (bsc#1173902).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173902">SUSE bug 1173902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173994">SUSE bug 1173994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177613">SUSE bug 1177613</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14318">CVE-2020-14318 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14323">CVE-2020-14323 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14383/">CVE-2020-14383 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14383">CVE-2020-14383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555820" comment="libdcerpc-binding0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538678" comment="libdcerpc-binding0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555821" comment="libdcerpc0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538680" comment="libdcerpc0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555822" comment="libndr-krb5pac0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538682" comment="libndr-krb5pac0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555823" comment="libndr-nbt0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538684" comment="libndr-nbt0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555824" comment="libndr-standard0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538686" comment="libndr-standard0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555825" comment="libndr0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538688" comment="libndr0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555826" comment="libnetapi0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538690" comment="libnetapi0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555827" comment="libsamba-credentials0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538692" comment="libsamba-credentials0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555828" comment="libsamba-errors0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538694" comment="libsamba-errors0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555829" comment="libsamba-hostconfig0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538696" comment="libsamba-hostconfig0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555830" comment="libsamba-passdb0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538698" comment="libsamba-passdb0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555831" comment="libsamba-util0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538700" comment="libsamba-util0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555832" comment="libsamdb0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538702" comment="libsamdb0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555833" comment="libsmbclient0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538704" comment="libsmbclient0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555834" comment="libsmbconf0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538706" comment="libsmbconf0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555835" comment="libsmbldap0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538708" comment="libsmbldap0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555836" comment="libtevent-util0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538710" comment="libtevent-util0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555837" comment="libwbclient0-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538712" comment="libwbclient0-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555838" comment="samba-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555839" comment="samba-client-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538715" comment="samba-client-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538716" comment="samba-doc-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555840" comment="samba-libs-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538718" comment="samba-libs-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555841" comment="samba-winbind-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538720" comment="samba-winbind-32bit-4.6.16+git.248.c833312e640-3.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152290" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174955" ref_url="https://bugzilla.suse.com/1174955" source="BUGZILLA"/>
		<reference ref_id="1177155" ref_url="https://bugzilla.suse.com/1177155" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15708" ref_url="https://www.suse.com/security/cve/CVE-2020-15708/" source="CVE"/>
		<reference ref_id="CVE-2020-25637" ref_url="https://www.suse.com/security/cve/CVE-2020-25637/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

CVE-2020-15708: Added a note to libvirtd.conf about polkit auth in SUSE distros (bsc#1174955).
CVE-2020-25637: Fixed a double free in qemuAgentGetInterfaces() (bsc#1177155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174955">SUSE bug 1174955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177155">SUSE bug 1177155</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15708/">CVE-2020-15708 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15708">CVE-2020-15708 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25637/">CVE-2020-25637 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25637">CVE-2020-25637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555842" comment="libvirt-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555843" comment="libvirt-admin-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555844" comment="libvirt-client-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555845" comment="libvirt-daemon-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555846" comment="libvirt-daemon-config-network-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555847" comment="libvirt-daemon-config-nwfilter-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555848" comment="libvirt-daemon-driver-interface-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538728" comment="libvirt-daemon-driver-libxl-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555849" comment="libvirt-daemon-driver-lxc-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555850" comment="libvirt-daemon-driver-network-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555851" comment="libvirt-daemon-driver-nodedev-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555852" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555853" comment="libvirt-daemon-driver-qemu-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555854" comment="libvirt-daemon-driver-secret-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555855" comment="libvirt-daemon-driver-storage-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555856" comment="libvirt-daemon-driver-storage-core-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555857" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555858" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555859" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555860" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538741" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555861" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555862" comment="libvirt-daemon-hooks-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555863" comment="libvirt-daemon-lxc-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555864" comment="libvirt-daemon-qemu-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538746" comment="libvirt-daemon-xen-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555865" comment="libvirt-doc-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555866" comment="libvirt-libs-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555867" comment="libvirt-lock-sanlock-3.3.0-5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555868" comment="libvirt-nss-3.3.0-5.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152291" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1109319" ref_url="https://bugzilla.suse.com/1109319" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17294" ref_url="https://www.suse.com/security/cve/CVE-2018-17294/" source="CVE"/>
		<description>
This update for liblouis, python-luis and python3-louis fixes the following issue:

Security issue fixed:

- CVE-2018-17294: Fixed an out of bounds read in matchCurrentInput function 
  which could allow a remote attacker to cause Denail of Service (bsc#1109319).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-30"/>
	<updated date="2020-10-30"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1109319">SUSE bug 1109319</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17294/">CVE-2018-17294 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17294">CVE-2018-17294 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557576" comment="liblouis-data-2.6.4-6.9.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557577" comment="liblouis9-2.6.4-6.9.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557578" comment="python-louis-2.6.4-6.9.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557579" comment="python3-louis-2.6.4-6.9.41 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152292" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177211" ref_url="https://bugzilla.suse.com/1177211" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2020-26116: Fixed CRLF injection via HTTP request method (bsc#1177211).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-02"/>
	<updated date="2020-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26116">CVE-2020-26116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557580" comment="libpython2_7-1_0-2.7.17-28.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557581" comment="libpython2_7-1_0-32bit-2.7.17-28.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557582" comment="python-2.7.17-28.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557583" comment="python-32bit-2.7.17-28.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557584" comment="python-base-2.7.17-28.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557585" comment="python-base-32bit-2.7.17-28.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557586" comment="python-curses-2.7.17-28.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557587" comment="python-demo-2.7.17-28.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557588" comment="python-devel-2.7.17-28.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557589" comment="python-doc-2.7.17-28.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557590" comment="python-doc-pdf-2.7.17-28.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557591" comment="python-gdbm-2.7.17-28.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557592" comment="python-idle-2.7.17-28.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557593" comment="python-tk-2.7.17-28.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557594" comment="python-xml-2.7.17-28.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152293" version="1" class="patch">
	<metadata>
		<title>Security update for sane-backends (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172524" ref_url="https://bugzilla.suse.com/1172524" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<reference ref_id="CVE-2020-12861" ref_url="https://www.suse.com/security/cve/CVE-2020-12861/" source="CVE"/>
		<reference ref_id="CVE-2020-12862" ref_url="https://www.suse.com/security/cve/CVE-2020-12862/" source="CVE"/>
		<reference ref_id="CVE-2020-12863" ref_url="https://www.suse.com/security/cve/CVE-2020-12863/" source="CVE"/>
		<reference ref_id="CVE-2020-12864" ref_url="https://www.suse.com/security/cve/CVE-2020-12864/" source="CVE"/>
		<reference ref_id="CVE-2020-12865" ref_url="https://www.suse.com/security/cve/CVE-2020-12865/" source="CVE"/>
		<reference ref_id="CVE-2020-12866" ref_url="https://www.suse.com/security/cve/CVE-2020-12866/" source="CVE"/>
		<reference ref_id="CVE-2020-12867" ref_url="https://www.suse.com/security/cve/CVE-2020-12867/" source="CVE"/>
		<description>
This update for sane-backends fixes the following issues:

- sane-backends version upgrade to 1.0.31:
  * sane-backends version upgrade to 1.0.30
    fixes memory corruption bugs CVE-2020-12861, CVE-2020-12862,
    CVE-2020-12863, CVE-2020-12864, CVE-2020-12865,
    CVE-2020-12866, CVE-2020-12867 (bsc#1172524)
  * sane-backends version upgrade to 1.0.31
    to further improve hardware enablement for scanner devices
    (jsc#SLE-15561 and jsc#SLE-15560 with jsc#ECO-2418)
  * The new escl backend cannot be provided for SLE12 because
    it requires more additional software (avahi-client, libcurl,
    and libpoppler-glib-devel) where in particular for libcurl
    the one that is in SLE12 (via libcurl-devel-7.37.0) is likely
    too old because with that building the escl backend fails with
    'escl/escl.c:1267:34: error: 'CURLOPT_UNIX_SOCKET_PATH'
    undeclared curl_easy_setopt(handle, CURLOPT_UNIX_SOCKET_PATH'
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6318">CVE-2017-6318 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12861/">CVE-2020-12861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12861">CVE-2020-12861 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12862/">CVE-2020-12862 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12862">CVE-2020-12862 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12863/">CVE-2020-12863 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12863">CVE-2020-12863 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12864/">CVE-2020-12864 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12864">CVE-2020-12864 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12865/">CVE-2020-12865 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12865">CVE-2020-12865 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12866/">CVE-2020-12866 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12866">CVE-2020-12866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12867/">CVE-2020-12867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12867">CVE-2020-12867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531452" comment="sane-backends-1.0.31-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152294" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122756" ref_url="https://bugzilla.suse.com/1122756" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6502" ref_url="https://www.suse.com/security/cve/CVE-2019-6502/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

Security issue fixed:

- CVE-2019-6502: Fixed a memory leak in sc_context_create() (bsc#1122756).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1122756">SUSE bug 1122756</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6502/">CVE-2019-6502 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6502">CVE-2019-6502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557595" comment="opensc-0.13.0-3.6.27 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152295" version="1" class="patch">
	<metadata>
		<title>Security update for apache-commons-httpclient (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178171" ref_url="https://bugzilla.suse.com/1178171" source="BUGZILLA"/>
		<reference ref_id="945190" ref_url="https://bugzilla.suse.com/945190" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3577" ref_url="https://www.suse.com/security/cve/CVE-2014-3577/" source="CVE"/>
		<reference ref_id="CVE-2015-5262" ref_url="https://www.suse.com/security/cve/CVE-2015-5262/" source="CVE"/>
		<description>
This update for apache-commons-httpclient fixes the following issues:

- http/conn/ssl/SSLConnectionSocketFactory.java ignores the
  http.socket.timeout configuration setting during an SSL handshake,
  which allows remote attackers to cause a denial of service (HTTPS
  call hang) via unspecified vectors. [bsc#945190, CVE-2015-5262]
- org.apache.http.conn.ssl.AbstractVerifier does not properly
  verify that the server hostname matches a domain name in the
  subject's Common Name (CN) or subjectAltName field of the X.509
  certificate, which allows MITM attackers to spoof SSL servers
  via a 'CN=' string in a field in the distinguished name (DN)
  of a certificate. [bsc#1178171, CVE-2014-3577]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-04"/>
	<updated date="2020-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178171">SUSE bug 1178171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945190">SUSE bug 945190</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3577/">CVE-2014-3577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3577">CVE-2014-3577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5262/">CVE-2015-5262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5262">CVE-2015-5262 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531477" comment="apache-commons-httpclient-3.1-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152296" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178067" ref_url="https://bugzilla.suse.com/1178067" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27560" ref_url="https://www.suse.com/security/cve/CVE-2020-27560/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2020-27560: Fixed potential denial of service in OptimizeLayerFrames function in MagickCore/layer.c (bsc#1178067).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178067">SUSE bug 1178067</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27560/">CVE-2020-27560 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27560">CVE-2020-27560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557596" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557597" comment="ImageMagick-config-6-upstream-6.8.8.1-71.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557598" comment="libMagickCore-6_Q16-1-6.8.8.1-71.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557599" comment="libMagickWand-6_Q16-1-6.8.8.1-71.147.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152297" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1118597" ref_url="https://bugzilla.suse.com/1118597" source="BUGZILLA"/>
		<reference ref_id="1130246" ref_url="https://bugzilla.suse.com/1130246" source="BUGZILLA"/>
		<reference ref_id="1161167" ref_url="https://bugzilla.suse.com/1161167" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19870" ref_url="https://www.suse.com/security/cve/CVE-2018-19870/" source="CVE"/>
		<reference ref_id="CVE-2018-19872" ref_url="https://www.suse.com/security/cve/CVE-2018-19872/" source="CVE"/>
		<reference ref_id="CVE-2020-0569" ref_url="https://www.suse.com/security/cve/CVE-2020-0569/" source="CVE"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

Security issues fixed:	  

- CVE-2020-0569: Fixed a potential local code execution by loading plugins from CWD (bsc#1161167).
- CVE-2018-19870: Fixed an improper check in QImage allocation which could allow Denial of Service
  when opening crafted gif files (bsc#1118597).
- CVE-2018-19872: Fixed an issue which could allow a division by zero leading to crash (bsc#1130246).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-04"/>
	<updated date="2020-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118597">SUSE bug 1118597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130246">SUSE bug 1130246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161167">SUSE bug 1161167</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19870/">CVE-2018-19870 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19870">CVE-2018-19870 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19872/">CVE-2018-19872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19872">CVE-2018-19872 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0569/">CVE-2020-0569 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0569">CVE-2020-0569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522604" comment="libQt5Concurrent5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522605" comment="libQt5Core5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522606" comment="libQt5DBus5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522607" comment="libQt5Gui5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522608" comment="libQt5Network5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522609" comment="libQt5OpenGL5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522610" comment="libQt5PrintSupport5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522611" comment="libQt5Sql5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522612" comment="libQt5Sql5-mysql-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522613" comment="libQt5Sql5-postgresql-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522614" comment="libQt5Sql5-sqlite-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522615" comment="libQt5Sql5-unixODBC-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522616" comment="libQt5Test5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522617" comment="libQt5Widgets5-5.6.2-6.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522618" comment="libQt5Xml5-5.6.2-6.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152298" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Fix regression '8250861: Crash in MinINode::Ideal(PhaseGVN*, bool)',
  introduced in October 2020 CPU.

- Update to version jdk8u272 (icedtea 3.17.0) (July 2020 CPU,
  bsc#1174157, and October 2020 CPU, bsc#1177943)
  * New features
    + JDK-8245468: Add TLSv1.3 implementation classes from 11.0.7
    + PR3796: Allow the number of curves supported to be specified
  * Security fixes
    + JDK-8028431, CVE-2020-14579: NullPointerException in
      DerValue.equals(DerValue)
    + JDK-8028591, CVE-2020-14578: NegativeArraySizeException in
      sun.security.util.DerInputStream.getUnalignedBitString()
    + JDK-8230613: Better ASCII conversions
    + JDK-8231800: Better listing of arrays
    + JDK-8232014: Expand DTD support
    + JDK-8233255: Better Swing Buttons
    + JDK-8233624: Enhance JNI linkage
    + JDK-8234032: Improve basic calendar services
    + JDK-8234042: Better factory production of certificates
    + JDK-8234418: Better parsing with CertificateFactory
    + JDK-8234836: Improve serialization handling
    + JDK-8236191: Enhance OID processing
    + JDK-8236196: Improve string pooling
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237117, CVE-2020-14556: Better ForkJoinPool behavior
    + JDK-8237592, CVE-2020-14577: Enhance certificate verification
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8238002, CVE-2020-14581: Better matrix operations
    + JDK-8238804: Enhance key handling process
    + JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    + JDK-8238843: Enhanced font handing
    + JDK-8238920, CVE-2020-14583: Better Buffer support
    + JDK-8238925: Enhance WAV file playback
    + JDK-8240119, CVE-2020-14593: Less Affine Transformations
    + JDK-8240124: Better VM Interning
    + JDK-8240482: Improved WAV file playback
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8241379: Update JCEKS support
    + JDK-8241522: Manifest improved jar headers redux
    + JDK-8242136, CVE-2020-14621: Better XML namespace handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Import of OpenJDK 8 u262 build 01
    + JDK-4949105: Access Bridge lacks html tags parsing
    + JDK-8003209: JFR events for network utilization
    + JDK-8030680: 292 cleanup from default method code assessment
    + JDK-8035633: TEST_BUG: java/net/NetworkInterface/Equals.java
      and some tests failed on windows intermittently
    + JDK-8041626: Shutdown tracing event
    + JDK-8141056: Erroneous assignment in HeapRegionSet.cpp
    + JDK-8149338: JVM Crash caused by Marlin renderer not handling
       NaN coordinates
    + JDK-8151582: (ch) test java/nio/channels/
      /AsyncCloseAndInterrupt.java failing due to 'Connection
      succeeded'
    + JDK-8165675: Trace event for thread park has incorrect unit
       for timeout
    + JDK-8176182: 4 security tests are not run
    + JDK-8178910: Problemlist sample tests
    + JDK-8183925: Decouple crash protection from watcher thread
    + JDK-8191393: Random crashes during cfree+0x1c
    + JDK-8195817: JFR.stop should require name of recording
    + JDK-8195818: JFR.start should increase autogenerated name by
       one
    + JDK-8195819: Remove recording=x from jcmd JFR.check output
    + JDK-8199712: Flight Recorder
    + JDK-8202578: Revisit location for class unload events
    + JDK-8202835: jfr/event/os/TestSystemProcess.java fails on
      missing events
    + JDK-8203287: Zero fails to build after JDK-8199712 (Flight
      Recorder)
    + JDK-8203346: JFR: Inconsistent signature of
      jfr_add_string_constant
    + JDK-8203664: JFR start failure after AppCDS archive created
      with JFR StartFlightRecording
    + JDK-8203921: JFR thread sampling is missing fixes from
      JDK-8194552
    + JDK-8203929: Limit amount of data for JFR.dump
    + JDK-8205516: JFR tool
    + JDK-8207392: [PPC64] Implement JFR profiling
    + JDK-8207829: FlightRecorderMXBeanImpl is leaking the first
      classloader which calls it
    + JDK-8209960: -Xlog:jfr* doesn't work with the JFR
    + JDK-8210024: JFR calls virtual is_Java_thread from ~Thread()
    + JDK-8210776: Upgrade X Window System 6.8.2 to the latest XWD
      1.0.7
    + JDK-8211239: Build fails without JFR: empty JFR events
      signatures mismatch
    + JDK-8212232: Wrong metadata for the configuration of the
      cutoff for old object sample events
    + JDK-8213015: Inconsistent settings between JFR.configure and
      -XX:FlightRecorderOptions
    + JDK-8213421: Line number information for execution samples
      always 0
    + JDK-8213617: JFR should record the PID of the recorded process
    + JDK-8213734: SAXParser.parse(File, ..) does not close
      resources when Exception occurs.
    + JDK-8213914: [TESTBUG] Several JFR VM events are not covered
      by tests
    + JDK-8213917: [TESTBUG] Shutdown JFR event is not covered by
      test
    + JDK-8213966: The ZGC JFR events should be marked as
      experimental
    + JDK-8214542: JFR: Old Object Sample event slow on a deep heap
      in debug builds
    + JDK-8214750: Unnecessary &lt;p&gt; tags in jfr classes
    + JDK-8214896: JFR Tool left files behind
    + JDK-8214906: [TESTBUG] jfr/event/sampling/TestNative.java
      fails with UnsatisfiedLinkError
    + JDK-8214925: JFR tool fails to execute
    + JDK-8215175: Inconsistencies in JFR event metadata
    + JDK-8215237: jdk.jfr.Recording javadoc does not compile
    + JDK-8215284: Reduce noise induced by periodic task
      getFileSize()
    + JDK-8215355: Object monitor deadlock with no threads holding
      the monitor (using jemalloc 5.1)
    + JDK-8215362: JFR GTest JfrTestNetworkUtilization fails
    + JDK-8215771: The jfr tool should pretty print reference chains
    + JDK-8216064: -XX:StartFlightRecording:settings= doesn't work
      properly
    + JDK-8216486: Possibility of integer overflow in
      JfrThreadSampler::run()
    + JDK-8216528: test/jdk/java/rmi/transport/
       /runtimeThreadInheritanceLeak/
       /RuntimeThreadInheritanceLeak.java failing with Xcomp
    + JDK-8216559: [JFR] Native libraries not correctly parsed from
      /proc/self/maps
    + JDK-8216578: Remove unused/obsolete method in JFR code
    + JDK-8216995: Clean up JFR command line processing
    + JDK-8217744: [TESTBUG] JFR TestShutdownEvent fails on some
      systems due to process surviving SIGINT
    + JDK-8217748: [TESTBUG] Exclude TestSig test case from JFR
      TestShutdownEvent
    + JDK-8218935: Make jfr strncpy uses GCC 8.x friendly
    + JDK-8223147: JFR Backport
    + JDK-8223689: Add JFR Thread Sampling Support
    + JDK-8223690: Add JFR BiasedLock Event Support
    + JDK-8223691: Add JFR G1 Region Type Change Event Support
    + JDK-8223692: Add JFR G1 Heap Summary Event Support
    + JDK-8224172: assert(jfr_is_event_enabled(id)) failed:
      invariant
    + JDK-8224475: JTextPane does not show images in HTML rendering
    + JDK-8226253: JAWS reports wrong number of radio buttons when
      buttons are hidden.
    + JDK-8226779: [TESTBUG] Test JFR API from Java agent
    + JDK-8226892: ActionListeners on JRadioButtons don't get
      notified when selection is changed with arrow keys
    + JDK-8227011: Starting a JFR recording in response to JVMTI
      VMInit and / or Java agent premain corrupts memory
    + JDK-8227605: Kitchensink fails 'assert((((klass)-&gt;trace_id()
      &amp; (JfrTraceIdEpoch::leakp_in_use_this_epoch_bit())) != 0))
      failed: invariant'
    + JDK-8229366: JFR backport allows unchecked writing to memory
    + JDK-8229401: Fix JFR code cache test failures
    + JDK-8229708: JFR backport code does not initialize
    + JDK-8229873: 8229401 broke jdk8u-jfr-incubator
    + JDK-8230448: [test] JFRSecurityTestSuite.java is failing on
      Windows
    + JDK-8230707: JFR related tests are failing
    + JDK-8230782: Robot.createScreenCapture() fails if
      'awt.robot.gtk' is set to false
    + JDK-8230856: Java_java_net_NetworkInterface_getByName0 on
       unix misses ReleaseStringUTFChars in early return
    + JDK-8230947: TestLookForUntestedEvents.java is failing after
      JDK-8230707
    + JDK-8231995: two jtreg tests failed after 8229366 is fixed
    + JDK-8233623: Add classpath exception to copyright in
      EventHandlerProxyCreator.java file
    + JDK-8236002: CSR for JFR backport suggests not leaving out
      the package-info
    + JDK-8236008: Some backup files were accidentally left in the
      hotspot tree
    + JDK-8236074: Missed package-info
    + JDK-8236174: Should update javadoc since tags
    + JDK-8238076: Fix OpenJDK 7 Bootstrap Broken by JFR Backport
    + JDK-8238452: Keytool generates wrong expiration date if
      validity is set to 2050/01/01
    + JDK-8238555: Allow Initialization of SunPKCS11 with NSS when
      there are external FIPS modules in the NSSDB
    + JDK-8238589: Necessary code cleanup in JFR for JDK8u
    + JDK-8238590: Enable JFR by default during compilation in 8u
    + JDK-8239055: Wrong implementation of VMState.hasListener
    + JDK-8239476: JDK-8238589 broke windows build by moving
      OrderedPair
    + JDK-8239479: minimal1 and zero builds are failing
    + JDK-8239867: correct over use of INCLUDE_JFR macro
    + JDK-8240375: Disable JFR by default for July 2020 release
    + JDK-8241444: Metaspace::_class_vsm not initialized if
      compressed class pointers are disabled
    + JDK-8241902: AIX Build broken after integration of
      JDK-8223147 (JFR Backport)
    + JDK-8242788: Non-PCH build is broken after JDK-8191393
  * Import of OpenJDK 8 u262 build 02
    + JDK-8130737: AffineTransformOp can't handle child raster with
      non-zero x-offset
    + JDK-8172559: [PIT][TEST_BUG] Move @test to be 1st annotation
      in java/awt/image/Raster/TestChildRasterOp.java
    + JDK-8230926: [macosx] Two apostrophes are entered instead of
      one with 'U.S. International - PC' layout
    + JDK-8240576: JVM crashes after transformation in C2
      IdealLoopTree::merge_many_backedges
    + JDK-8242883: Incomplete backport of JDK-8078268: backport
      test part
  * Import of OpenJDK 8 u262 build 03
    + JDK-8037866: Replace the Fun class in tests with lambdas
    + JDK-8146612: C2: Precedence edges specification violated
    + JDK-8150986: serviceability/sa/jmap-hprof/
       /JMapHProfLargeHeapTest.java failing because expects HPROF
      JAVA PROFILE 1.0.1 file format
    + JDK-8229888: (zipfs) Updating an existing zip file does not
      preserve original permissions
    + JDK-8230597: Update GIFlib library to the 5.2.1
    + JDK-8230769: BufImg_SetupICM add
      ReleasePrimitiveArrayCritical call in early return
    + JDK-8233880, PR3798: Support compilers with multi-digit major
      version numbers
    + JDK-8239852: java/util/concurrent tests fail with
      -XX:+VerifyGraphEdges: assert(!VerifyGraphEdges) failed:
      verification should have failed
    + JDK-8241638: launcher time metrics always report 1 on Linux
      when _JAVA_LAUNCHER_DEBUG set
    + JDK-8243059: Build fails when --with-vendor-name contains a
      comma
    + JDK-8243474: [TESTBUG] removed three tests of 0 bytes
    + JDK-8244461: [JDK 8u] Build fails with glibc 2.32
    + JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion()
      returns wrong result
  * Import of OpenJDK 8 u262 build 04
    + JDK-8067796: (process) Process.waitFor(timeout, unit) doesn't
      throw NPE if timeout is less than, or equal to zero when unit
      == null
    + JDK-8148886: SEGV in sun.java2d.marlin.Renderer._endRendering
    + JDK-8171934:
      ObjectSizeCalculator.getEffectiveMemoryLayoutSpecification()
      does not recognize OpenJDK's HotSpot VM
    + JDK-8196969: JTreg Failure:
      serviceability/sa/ClhsdbJstack.java causes NPE
    + JDK-8243539: Copyright info (Year) should be updated for fix
      of 8241638
    + JDK-8244777: ClassLoaderStats VM Op uses constant hash value
  * Import of OpenJDK 8 u262 build 05
    + JDK-7147060: com/sun/org/apache/xml/internal/security/
      /transforms/ClassLoaderTest.java doesn't run in agentvm mode
    + JDK-8178374: Problematic ByteBuffer handling in
      CipherSpi.bufferCrypt method
    + JDK-8181841: A TSA server returns timestamp with precision
      higher than milliseconds
    + JDK-8227269: Slow class loading when running with JDWP
    + JDK-8229899: Make java.io.File.isInvalid() less racy
    + JDK-8236996: Incorrect Roboto font rendering on Windows with
      subpixel antialiasing
    + JDK-8241750: x86_32 build failure after JDK-8227269
    + JDK-8244407: JVM crashes after transformation in C2
      IdealLoopTree::split_fall_in
    + JDK-8244843: JapanEraNameCompatTest fails
  * Import of OpenJDK 8 u262 build 06
    + JDK-8246223: Windows build fails after JDK-8227269
  * Import of OpenJDK 8 u262 build 07
    + JDK-8233197: Invert JvmtiExport::post_vm_initialized() and
      Jfr:on_vm_start() start-up order for correct option parsing
    + JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a
    + JDK-8245167: Top package in method profiling shows null in JMC
    + JDK-8246703: [TESTBUG] Add test for JDK-8233197
  * Import of OpenJDK 8 u262 build 08
    + JDK-8220293: Deadlock in JFR string pool
    + JDK-8225068: Remove DocuSign root certificate that is
      expiring in May 2020
    + JDK-8225069: Remove Comodo root certificate that is expiring
      in May 2020
  * Import of OpenJDK 8 u262 build 09
    + JDK-8248399: Build installs jfr binary when JFR is disabled
  * Import of OpenJDK 8 u262 build 10
    + JDK-8248715: New JavaTimeSupplementary localisation for 'in'
      installed in wrong package
  * Import of OpenJDK 8 u265 build 01
    + JDK-8249677: Regression in 8u after JDK-8237117: Better
      ForkJoinPool behavior
    + JDK-8250546: Expect changed behaviour reported in JDK-8249846
  * Import of OpenJDK 8 u272 build 01
    + JDK-8006205: [TESTBUG] NEED_TEST: please JTREGIFY
      test/compiler/7177917/Test7177917.java
    + JDK-8035493: JVMTI PopFrame capability must instruct
      compilers not to prune locals
    + JDK-8036088: Replace strtok() with its safe equivalent
      strtok_s() in DefaultProxySelector.c
    + JDK-8039082: [TEST_BUG] Test java/awt/dnd/
      /BadSerializationTest/BadSerializationTest.java fails
    + JDK-8075774: Small readability and performance improvements
      for zipfs
    + JDK-8132206: move ScanTest.java into OpenJDK
    + JDK-8132376: Add @requires os.family to the client tests with
      access to internal OS-specific API
    + JDK-8132745: minor cleanup of java/util/Scanner/ScanTest.java
    + JDK-8137087: [TEST_BUG] Cygwin failure of java/awt/
      /appletviewer/IOExceptionIfEncodedURLTest/
      /IOExceptionIfEncodedURLTest.sh
    + JDK-8145808: java/awt/Graphics2D/MTGraphicsAccessTest/
      /MTGraphicsAccessTest.java hangs on Win. 8
    + JDK-8151788: NullPointerException from ntlm.Client.type3
    + JDK-8151834: Test SmallPrimeExponentP.java times out
      intermittently
    + JDK-8153430: jdk regression test MletParserLocaleTest,
      ParserInfiniteLoopTest reduce default timeout
    + JDK-8153583: Make OutputAnalyzer.reportDiagnosticSummary
      public
    + JDK-8156169: Some sound tests rarely hangs because of
      incorrect synchronization
    + JDK-8165936: Potential Heap buffer overflow when seaching
      timezone info files
    + JDK-8166148: Fix for JDK-8165936 broke solaris builds
    + JDK-8167300: Scheduling failures during gcm should be fatal
    + JDK-8167615: Opensource unit/regression tests for JavaSound
    + JDK-8172012: [TEST_BUG] delays needed in
      javax/swing/JTree/4633594/bug4633594.java
    + JDK-8177628: Opensource unit/regression tests for ImageIO
    + JDK-8183341: Better cleanup for javax/imageio/AllowSearch.java
    + JDK-8183351: Better cleanup for jdk/test/javax/imageio/spi/
      /AppletContextTest/BadPluginConfigurationTest.sh
    + JDK-8193137: Nashorn crashes when given an empty script file
    + JDK-8194298: Add support for per Socket configuration of TCP
      keepalive
    + JDK-8198004: javax/swing/JFileChooser/6868611/bug6868611.java
      throws error
    + JDK-8200313: java/awt/Gtk/GtkVersionTest/GtkVersionTest.java
      fails
    + JDK-8210147: adjust some WSAGetLastError usages in windows
      network coding
    + JDK-8211714: Need to update vm_version.cpp to recognise
      VS2017 minor versions
    + JDK-8214862: assert(proj != __null) at compile.cpp:3251
    + JDK-8217606: LdapContext#reconnect always opens a new
      connection
    + JDK-8217647: JFR: recordings on 32-bit systems unreadable
    + JDK-8226697: Several tests which need the @key headful
      keyword are missing it.
    + JDK-8229378: jdwp library loader in linker_md.c quietly
      truncates on buffer overflow
    + JDK-8230303: JDB hangs when running monitor command
    + JDK-8230711: ConnectionGraph::unique_java_object(Node* N)
      return NULL if n is not in the CG
    + JDK-8234617: C1: Incorrect result of field load due to
      missing narrowing conversion
    + JDK-8235243: handle VS2017 15.9 and VS2019 in
      abstract_vm_version
    + JDK-8235325: build failure on Linux after 8235243
    + JDK-8235687: Contents/MacOS/libjli.dylib cannot be a symlink
    + JDK-8237951: CTW: C2 compilation fails with 'malformed
      control flow'
    + JDK-8238225: Issues reported after replacing symlink at
      Contents/MacOS/libjli.dylib with binary
    + JDK-8239385: KerberosTicket client name refers wrongly to
      sAMAccountName in AD
    + JDK-8239819: XToolkit: Misread of screen information memory
    + JDK-8240295: hs_err elapsed time in seconds is not accurate
      enough
    + JDK-8241888: Mirror jdk.security.allowNonCaAnchor system
      property with a security one
    + JDK-8242498: Invalid 'sun.awt.TimedWindowEvent' object leads
      to JVM crash
    + JDK-8243489: Thread CPU Load event may contain wrong data for
      CPU time under certain conditions
    + JDK-8244818: Java2D Queue Flusher crash while moving
      application window to external monitor
    + JDK-8246310: Clean commented-out code about ModuleEntry
      and PackageEntry in JFR
    + JDK-8246384: Enable JFR by default on supported architectures
      for October 2020 release
    + JDK-8248643: Remove extra leading space in JDK-8240295 8u
      backport
    + JDK-8249610: Make
      sun.security.krb5.Config.getBooleanObject(String... keys)
      method public
  * Import of OpenJDK 8 u272 build 02
    + JDK-8023697: failed class resolution reports different class
      name in detail message for the first and subsequent times
    + JDK-8025886: replace [[ and == bash extensions in regtest
    + JDK-8046274: Removing dependency on jakarta-regexp
    + JDK-8048933: -XX:+TraceExceptions output should include the
      message
    + JDK-8076151: [TESTBUG] Test java/awt/FontClass/CreateFont/
      /fileaccess/FontFile.java fails
    + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'
      treated by JVM as an equivalent
    + JDK-8154313: Generated javadoc scattered all over the place
    + JDK-8163251: Hard coded loop limit prevents reading of smart
      card data greater than 8k
    + JDK-8173300: [TESTBUG]compiler/tiered/NonTieredLevelsTest.java
      fails with compiler.whitebox.SimpleTestCaseHelper(int) must be
      compiled
    + JDK-8183349: Better cleanup for jdk/test/javax/imageio/
      /plugins/shared/CanWriteSequence.java and WriteAfterAbort.java
    + JDK-8191678: [TESTBUG] Add keyword headful in java/awt
      FocusTransitionTest test.
    + JDK-8201633: Problems with AES-GCM native acceleration
    + JDK-8211049: Second parameter of 'initialize' method is not
          used
    + JDK-8219566: JFR did not collect call stacks when
      MaxJavaStackTraceDepth is set to zero
    + JDK-8220165: Encryption using GCM results in
      RuntimeException- input length out of bound
    + JDK-8220555: JFR tool shows potentially misleading message
      when it cannot access a file
    + JDK-8224217: RecordingInfo should use textual representation
      of path
    + JDK-8231779: crash
      HeapWord*ParallelScavengeHeap::failed_mem_allocate
    + JDK-8238380, PR3798: java.base/unix/native/libjava/childproc.c
      'multiple definition' link errors with GCC10
    + JDK-8238386, PR3798: (sctp) jdk.sctp/unix/native/libsctp/
      /SctpNet.c 'multiple definition' link errors with GCC10
    + JDK-8238388, PR3798: libj2gss/NativeFunc.o 'multiple
      definition' link errors with GCC10
    + JDK-8242556: Cannot load RSASSA-PSS public key with non-null
      params from byte array
    + JDK-8250755: Better cleanup for jdk/test/javax/imageio/
      /plugins/shared/CanWriteSequence.java
  * Import of OpenJDK 8 u272 build 03
    + JDK-6574989: TEST_BUG:
      javax/sound/sampled/Clip/bug5070081.java fails sometimes
    + JDK-8148754: C2 loop unrolling fails due to unexpected graph
      shape
    + JDK-8192953: sun/management/jmxremote/bootstrap/*.sh tests
      fail with error : revokeall.exe: Permission denied
    + JDK-8203357: Container Metrics
    + JDK-8209113: Use WeakReference for lastFontStrike for created
      Fonts
    + JDK-8216283: Allow shorter method sampling interval than 10 ms
    + JDK-8221569: JFR tool produces incorrect output when both
      --categories and --events are specified
    + JDK-8233097: Fontmetrics for large Fonts has zero width
    + JDK-8248851: CMS: Missing memory fences between free chunk
      check and klass read
    + JDK-8250875: Incorrect parameter type for update_number in
      JDK_Version::jdk_update
  * Import of OpenJDK 8 u272 build 04
    + JDK-8061616: HotspotDiagnosticMXBean.getVMOption() throws
      IllegalArgumentException for flags of type double
    + JDK-8177334: Update xmldsig implementation to Apache
      Santuario 2.1.1
    + JDK-8217878: ENVELOPING XML signature no longer works in JDK
      11
    + JDK-8218629: XML Digital Signature throws NAMESPACE_ERR
      exception on OpenJDK 11, works 8/9/10
    + JDK-8243138: Enhance BaseLdapServer to support starttls
      extended request
  * Import of OpenJDK 8 u272 build 05
    + JDK-8026236: Add PrimeTest for BigInteger
    + JDK-8057003: Large reference arrays cause extremely long
      synchronization times
    + JDK-8060721: Test runtime/SharedArchiveFile/
      /LimitSharedSizes.java fails in jdk 9 fcs new
      platforms/compiler
    + JDK-8152077: (cal) Calendar.roll does not always roll the
      hours during daylight savings
    + JDK-8168517: java/lang/ProcessBuilder/Basic.java failed
    + JDK-8211163: UNIX version of Java_java_io_Console_echo does
      not return a clean boolean
    + JDK-8220674: [TESTBUG] MetricsMemoryTester failcount test in
      docker container only works with debug JVMs
    + JDK-8231213: Migrate SimpleDateFormatConstTest to JDK Repo
    + JDK-8236645: JDK 8u231 introduces a regression with
      incompatible handling of XML messages
    + JDK-8240676: Meet not symmetric failure when running lucene
      on jdk8
    + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA
      program
    + JDK-8249158: THREAD_START and THREAD_END event posted in
      primordial phase
    + JDK-8250627: Use -XX:+/-UseContainerSupport for
      enabling/disabling Java container metrics
    + JDK-8251546: 8u backport of JDK-8194298 breaks AIX and
      Solaris builds
    + JDK-8252084: Minimal VM fails to bootcycle: undefined symbol:
      AgeTableTracer::is_tenuring_distribution_event_enabled
  * Import of OpenJDK 8 u272 build 06
    + JDK-8064319: Need to enable -XX:+TraceExceptions in release
      builds
    + JDK-8080462, PR3801: Update SunPKCS11 provider with PKCS11
      v2.40 support
    + JDK-8160768: Add capability to custom resolve host/domain
      names within the default JNDI LDAP provider
    + JDK-8161973: PKIXRevocationChecker.getSoftFailExceptions()
      not working
    + JDK-8169925, PR3801: PKCS #11 Cryptographic Token Interface
      license
    + JDK-8184762: ZapStackSegments should use optimized memset
    + JDK-8193234: When using -Xcheck:jni an internally allocated
      buffer can leak
    + JDK-8219919: RuntimeStub name lost with
      PrintFrameConverterAssembly
    + JDK-8220313: [TESTBUG] Update base image for Docker testing
      to OL 7.6
    + JDK-8222079: Don't use memset to initialize fields decode_env
      constructor in disassembler.cpp
    + JDK-8225695: 32-bit build failures after JDK-8080462 (Update
      SunPKCS11 provider with PKCS11 v2.40 support)
    + JDK-8226575: OperatingSystemMXBean should be made container
      aware
    + JDK-8226809: Circular reference in printed stack trace is not
      correctly indented &amp; ambiguous
    + JDK-8228835: Memory leak in PKCS11 provider when using AES GCM
    + JDK-8233621: Mismatch in jsse.enableMFLNExtension property
      name
    + JDK-8238898, PR3801: Missing hash characters for header on
      license file
    + JDK-8243320: Add SSL root certificates to Oracle Root CA
      program
    + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest
      release 1.8.26
    + JDK-8245467: Remove 8u TLSv1.2 implementation files
    + JDK-8245469: Remove DTLS protocol implementation
    + JDK-8245470: Fix JDK8 compatibility issues
    + JDK-8245471: Revert JDK-8148188
    + JDK-8245472: Backport JDK-8038893 to JDK8
    + JDK-8245473: OCSP stapling support
    + JDK-8245474: Add TLS_KRB5 cipher suites support according to
      RFC-2712
    + JDK-8245476: Disable TLSv1.3 protocol in the ClientHello
      message by default
    + JDK-8245477: Adjust TLS tests location
    + JDK-8245653: Remove 8u TLS tests
    + JDK-8245681: Add TLSv1.3 regression test from 11.0.7
    + JDK-8251117: Cannot check P11Key size in P11Cipher and
      P11AEADCipher
    + JDK-8251120, PR3793: [8u] HotSpot build assumes ENABLE_JFR is
      set to either true or false
    + JDK-8251341: Minimal Java specification change
    + JDK-8251478: Backport TLSv1.3 regression tests to JDK8u
  * Import of OpenJDK 8 u272 build 07
    + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ
  * Import of OpenJDK 8 u272 build 08
    + JDK-8062947: Fix exception message to correctly represent
      LDAP connection failure
    + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed
      due to timeout on DeadServerNoTimeoutTest is incorrect
    + JDK-8252573: 8u: Windows build failed after 8222079 backport
  * Import of OpenJDK 8 u272 build 09
    + JDK-8252886: [TESTBUG] sun/security/ec/TestEC.java :
      Compilation failed
  * Import of OpenJDK 8 u272 build 10
    + JDK-8254673: Call to JvmtiExport::post_vm_start() was removed
      by the fix for JDK-8249158
    + JDK-8254937: Revert JDK-8148854 for 8u272
  * Backports
    + JDK-8038723, PR3806: Openup some PrinterJob tests
    + JDK-8041480, PR3806: ArrayIndexOutOfBoundsException when
      JTable contains certain string
    + JDK-8058779, PR3805: Faster implementation of
      String.replace(CharSequence, CharSequence)
    + JDK-8130125, PR3806: [TEST_BUG] add @modules to the several
      client tests unaffected by the automated bulk update
    + JDK-8144015, PR3806: [PIT] failures of text layout font tests
    + JDK-8144023, PR3806: [PIT] failure of text measurements in
      javax/swing/text/html/parser/Parser/6836089/bug6836089.java
    + JDK-8144240, PR3806: [macosx][PIT] AIOOB in
      closed/javax/swing/text/GlyphPainter2/6427244/bug6427244.java
    + JDK-8145542, PR3806: The case failed automatically and thrown
      java.lang.ArrayIndexOutOfBoundsException exception
    + JDK-8151725, PR3806: [macosx] ArrayIndexOOB exception when
      displaying Devanagari text in JEditorPane
    + JDK-8152358, PR3800: code and comment cleanups found during
      the hunt for 8077392
    + JDK-8152545, PR3804: Use preprocessor instead of compiling a
      program to generate native nio constants
    + JDK-8152680, PR3806: Regression in
      GlyphVector.getGlyphCharIndex behaviour
    + JDK-8158924, PR3806: Incorrect i18n text document layout
    + JDK-8166003, PR3806: [PIT][TEST_BUG] missing helper for
      javax/swing/text/GlyphPainter2/6427244/bug6427244.java
    + JDK-8166068, PR3806: test/java/awt/font/GlyphVector/
      /GetGlyphCharIndexTest.java does not compile
    + JDK-8169879, PR3806: [TEST_BUG] javax/swing/text/
      /GlyphPainter2/6427244/bug6427244.java - compilation failed
    + JDK-8191512, PR3806: T2K font rasterizer code removal
    + JDK-8191522, PR3806: Remove Bigelow&amp;Holmes Lucida fonts from
      JDK sources
    + JDK-8236512, PR3801: PKCS11 Connection closed after
      Cipher.doFinal and NoPadding
    + JDK-8254177, PR3809: (tz) Upgrade time-zone data to
      tzdata2020b
  * Bug fixes
    + PR3798: Fix format-overflow error on GCC 10, caused by
      passing NULL to a '%s' directive
    + PR3795: ECDSAUtils for XML digital signatures should support
      the same curve set as the rest of the JDK
    + PR3799: Adapt elliptic curve patches to JDK-8245468: Add
      TLSv1.3 implementation classes from 11.0.7
    + PR3808: IcedTea does not install the JFR *.jfc files
    + PR3810: Enable JFR on x86 (32-bit) now that JDK-8252096 has
      fixed its use with Shenandoah
    + PR3811: Don't attempt to install JFR files when JFR is
      disabled
  * Shenandoah
    + [backport] 8221435: Shenandoah should not mark through weak
      roots
    + [backport] 8221629: Shenandoah: Cleanup class unloading logic
    + [backport] 8222992: Shenandoah: Pre-evacuate all roots
    + [backport] 8223215: Shenandoah: Support verifying subset of
      roots
    + [backport] 8223774: Shenandoah: Refactor
      ShenandoahRootProcessor and family
    + [backport] 8224210: Shenandoah: Refactor
      ShenandoahRootScanner to support scanning CSet codecache roots
    + [backport] 8224508: Shenandoah: Need to update thread roots
      in final mark for piggyback ref update cycle
    + [backport] 8224579: ResourceMark not declared in
      shenandoahRootProcessor.inline.hpp with
      --disable-precompiled-headers
    + [backport] 8224679: Shenandoah: Make
      ShenandoahParallelCodeCacheIterator noncopyable
    + [backport] 8224751: Shenandoah: Shenandoah Verifier should
      select proper roots according to current GC cycle
    + [backport] 8225014: Separate ShenandoahRootScanner method for
      object_iterate
    + [backport] 8225216: gc/logging/TestMetaSpaceLog.java doesn't
      work for Shenandoah
    + [backport] 8225573: Shenandoah: Enhance ShenandoahVerifier to
      ensure roots to-space invariant
    + [backport] 8225590: Shenandoah: Refactor
      ShenandoahClassLoaderDataRoots API
    + [backport] 8226413: Shenandoah: Separate root scanner for
      SH::object_iterate()
    + [backport] 8230853: Shenandoah: replace leftover
      assert(is_in(...)) with rich asserts
    + [backport] 8231198: Shenandoah: heap walking should visit all
      roots most of the time
    + [backport] 8231244: Shenandoah: all-roots heap walking misses
      some weak roots
    + [backport] 8237632: Shenandoah: accept NULL fwdptr to
      cooperate with JVMTI and JFR
    + [backport] 8239786: Shenandoah: print per-cycle statistics
    + [backport] 8239926: Shenandoah: Shenandoah needs to mark
      nmethod's metadata
    + [backport] 8240671: Shenandoah: refactor
      ShenandoahPhaseTimings
    + [backport] 8240749: Shenandoah: refactor ShenandoahUtils
    + [backport] 8240750: Shenandoah: remove leftover files and
      mentions of ShenandoahAllocTracker
    + [backport] 8240868: Shenandoah: remove CM-with-UR
      piggybacking cycles
    + [backport] 8240872: Shenandoah: Avoid updating new regions
      from start of evacuation
    + [backport] 8240873: Shenandoah: Short-cut arraycopy barriers
    + [backport] 8240915: Shenandoah: Remove unused fields in init
      mark tasks
    + [backport] 8240948: Shenandoah: cleanup not-forwarded-objects
      paths after JDK-8240868
    + [backport] 8241007: Shenandoah: remove
      ShenandoahCriticalControlThreadPriority support
    + [backport] 8241062: Shenandoah: rich asserts trigger 'empty
      statement' inspection
    + [backport] 8241081: Shenandoah: Do not modify
      update-watermark concurrently
    + [backport] 8241093: Shenandoah: editorial changes in flag
      descriptions
    + [backport] 8241139: Shenandoah: distribute mark-compact work
      exactly to minimize fragmentation
    + [backport] 8241142: Shenandoah: should not use parallel
      reference processing with single GC thread
    + [backport] 8241351: Shenandoah: fragmentation metrics overhaul
    + [backport] 8241435: Shenandoah: avoid disabling pacing with
      'aggressive'
    + [backport] 8241520: Shenandoah: simplify region sequence
      numbers handling
    + [backport] 8241534: Shenandoah: region status should include
      update watermark
    + [backport] 8241574: Shenandoah: remove
      ShenandoahAssertToSpaceClosure
    + [backport] 8241583: Shenandoah: turn heap lock asserts into
      macros
    + [backport] 8241668: Shenandoah: make ShenandoahHeapRegion not
      derive from ContiguousSpace
    + [backport] 8241673: Shenandoah: refactor anti-false-sharing
      padding
    + [backport] 8241675: Shenandoah: assert(n-&gt;outcnt() &gt; 0) at
      shenandoahSupport.cpp:2858 with
      java/util/Collections/FindSubList.java
    + [backport] 8241692: Shenandoah: remove
      ShenandoahHeapRegion::_reserved
    + [backport] 8241700: Shenandoah: Fold
      ShenandoahKeepAliveBarrier flag into ShenandoahSATBBarrier
    + [backport] 8241740: Shenandoah: remove
      ShenandoahHeapRegion::_heap
    + [backport] 8241743: Shenandoah: refactor and inline
      ShenandoahHeap::heap()
    + [backport] 8241748: Shenandoah: inline MarkingContext TAMS
      methods
    + [backport] 8241838: Shenandoah: no need to trash cset during
      final mark
    + [backport] 8241841: Shenandoah: ditch one of allocation type
      counters in ShenandoahHeapRegion
    + [backport] 8241842: Shenandoah: inline
      ShenandoahHeapRegion::region_number
    + [backport] 8241844: Shenandoah: rename
      ShenandoahHeapRegion::region_number
    + [backport] 8241845: Shenandoah: align ShenandoahHeapRegions
      to cache lines
    + [backport] 8241926: Shenandoah: only print heap changes for
      operations that directly affect it
    + [backport] 8241983: Shenandoah: simplify FreeSet logging
    + [backport] 8241985: Shenandoah: simplify collectable garbage
      logging
    + [backport] 8242040: Shenandoah: print allocation failure type
    + [backport] 8242041: Shenandoah: adaptive heuristics should
      account evac reserve in free target
    + [backport] 8242042: Shenandoah: tune down
      ShenandoahGarbageThreshold
    + [backport] 8242054: Shenandoah: New incremental-update mode
    + [backport] 8242075: Shenandoah: rename
      ShenandoahHeapRegionSize flag
    + [backport] 8242082: Shenandoah: Purge Traversal mode
    + [backport] 8242083: Shenandoah: split 'Prepare Evacuation'
      tracking into cset/freeset counters
    + [backport] 8242089: Shenandoah: per-worker stats should be
      summed up, not averaged
    + [backport] 8242101: Shenandoah: coalesce and parallelise heap
      region walks during the pauses
    + [backport] 8242114: Shenandoah: remove
      ShenandoahHeapRegion::reset_alloc_metadata_to_shared
    + [backport] 8242130: Shenandoah: Simplify arraycopy-barrier
      dispatching
    + [backport] 8242211: Shenandoah: remove
      ShenandoahHeuristics::RegionData::_seqnum_last_alloc
    + [backport] 8242212: Shenandoah: initialize
      ShenandoahHeuristics::_region_data eagerly
    + [backport] 8242213: Shenandoah: remove
      ShenandoahHeuristics::_bytes_in_cset
    + [backport] 8242217: Shenandoah: Enable GC mode to be
      diagnostic/experimental and have a name
    + [backport] 8242227: Shenandoah: transit regions to cset state
      when adding to collection set
    + [backport] 8242228: Shenandoah: remove unused
      ShenandoahCollectionSet methods
    + [backport] 8242229: Shenandoah: inline ShenandoahHeapRegion
      liveness-related methods
    + [backport] 8242267: Shenandoah: regions space needs to be
      aligned by os::vm_allocation_granularity()
    + [backport] 8242271: Shenandoah: add test to verify GC mode
      unlock
    + [backport] 8242273: Shenandoah: accept either SATB or IU
      barriers, but not both
    + [backport] 8242301: Shenandoah: Inline LRB runtime call
    + [backport] 8242316: Shenandoah: Turn NULL-check into assert
      in SATB slow-path entry
    + [backport] 8242353: Shenandoah: micro-optimize region
      liveness handling
    + [backport] 8242365: Shenandoah: use uint16_t instead of
      jushort for liveness cache
    + [backport] 8242375: Shenandoah: Remove
      ShenandoahHeuristic::record_gc_start/end methods
    + [backport] 8242641: Shenandoah: clear live data and update
      TAMS optimistically
    + [backport] 8243238: Shenandoah: explicit GC request should
      wait for a complete GC cycle
    + [backport] 8243301: Shenandoah: ditch
      ShenandoahAllowMixedAllocs
    + [backport] 8243307: Shenandoah: remove
      ShCollectionSet::live_data
    + [backport] 8243395: Shenandoah: demote guarantee in
      ShenandoahPhaseTimings::record_workers_end
    + [backport] 8243463: Shenandoah: ditch total_pause counters
    + [backport] 8243464: Shenandoah: print statistic counters in
      time order
    + [backport] 8243465: Shenandoah: ditch unused pause_other,
      conc_other counters
    + [backport] 8243487: Shenandoah: make _num_phases illegal
      phase type
    + [backport] 8243494: Shenandoah: set counters once per cycle
    + [backport] 8243573: Shenandoah: rename GCParPhases and
      related code
    + [backport] 8243848: Shenandoah: Windows build fails after
      JDK-8239786
    + [backport] 8244180: Shenandoah: carry Phase to
      ShWorkerTimingsTracker explicitly
    + [backport] 8244200: Shenandoah: build breakages after
      JDK-8241743
    + [backport] 8244226: Shenandoah: per-cycle statistics contain
      worker data from previous cycles
    + [backport] 8244326: Shenandoah: global statistics should not
      accept bogus samples
    + [backport] 8244509: Shenandoah: refactor
      ShenandoahBarrierC2Support::test_* methods
    + [backport] 8244551: Shenandoah: Fix racy update of
      update_watermark
    + [backport] 8244667: Shenandoah: SBC2Support::test_gc_state
      takes loop for wrong control
    + [backport] 8244730: Shenandoah: gc/shenandoah/options/
      /TestHeuristicsUnlock.java should only verify the heuristics
    + [backport] 8244732: Shenandoah: move heuristics code to
      gc/shenandoah/heuristics
    + [backport] 8244737: Shenandoah: move mode code to
      gc/shenandoah/mode
    + [backport] 8244739: Shenandoah: break superclass dependency
      on ShenandoahNormalMode
    + [backport] 8244740: Shenandoah: rename ShenandoahNormalMode
      to ShenandoahSATBMode
    + [backport] 8245461: Shenandoah: refine mode name()-s
    + [backport] 8245463: Shenandoah: refine ShenandoahPhaseTimings
      constructor arguments
    + [backport] 8245464: Shenandoah: allocate collection set
      bitmap at lower addresses
    + [backport] 8245465: Shenandoah: test_in_cset can use more
      efficient encoding
    + [backport] 8245726: Shenandoah: lift/cleanup
      ShenandoahHeuristics names and properties
    + [backport] 8245754: Shenandoah: ditch ShenandoahAlwaysPreTouch
    + [backport] 8245757: Shenandoah: AlwaysPreTouch should not
      disable heap resizing or uncommits
    + [backport] 8245773: Shenandoah: Windows assertion failure
      after JDK-8245464
    + [backport] 8245812: Shenandoah: compute root phase parallelism
    + [backport] 8245814: Shenandoah: reconsider format specifiers
      for stats
    + [backport] 8245825: Shenandoah: Remove diagnostic flag
      ShenandoahConcurrentScanCodeRoots
    + [backport] 8246162: Shenandoah: full GC does not mark code
      roots when class unloading is off
    + [backport] 8247310: Shenandoah: pacer should not affect
      interrupt status
    + [backport] 8247358: Shenandoah: reconsider free budget slice
      for marking
    + [backport] 8247367: Shenandoah: pacer should wait on lock
      instead of exponential backoff
    + [backport] 8247474: Shenandoah: Windows build warning after
      JDK-8247310
    + [backport] 8247560: Shenandoah: heap iteration holds root
      locks all the time
    + [backport] 8247593: Shenandoah: should not block pacing
      reporters
    + [backport] 8247751: Shenandoah: options tests should run with
      smaller heaps
    + [backport] 8247754: Shenandoah: mxbeans tests can be shorter
    + [backport] 8247757: Shenandoah: split heavy tests by
      heuristics to improve parallelism
    + [backport] 8247860: Shenandoah: add update watermark line in
      rich assert failure message
    + [backport] 8248041: Shenandoah: pre-Full GC root updates may
      miss some roots
    + [backport] 8248652: Shenandoah: SATB buffer handling may
      assume no forwarded objects
    + [backport] 8249560: Shenandoah: Fix racy GC request handling
    + [backport] 8249649: Shenandoah: provide per-cycle pacing stats
    + [backport] 8249801: Shenandoah: Clear soft-refs on requested
      GC cycle
    + [backport] 8249953: Shenandoah: gc/shenandoah/mxbeans tests
      should account for corner cases
    + Fix slowdebug build after JDK-8230853 backport
    + JDK-8252096: Shenandoah: adjust SerialPageShiftCount for
      x86_32 and JFR
    + JDK-8252366: Shenandoah: revert/cleanup changes in
      graphKit.cpp
    + Shenandoah: add JFR roots to root processor after JFR
      integration
    + Shenandoah: add root statistics for string dedup table/queues
    + Shenandoah: enable low-frequency STW class unloading
    + Shenandoah: fix build failures after JDK-8244737 backport
    + Shenandoah: Fix build failure with +JFR -PCH
    + Shenandoah: fix forceful pacer claim
    + Shenandoah: fix formats in
      ShenandoahStringSymbolTableUnlinkTask
    + Shenandoah: fix runtime linking failure due to non-compiled
      shenandoahBarrierSetC1
    + Shenandoah: hook statistics printing to PrintGCDetails, not
      PrintGC
    + Shenandoah: JNI weak roots are always cleared before Full GC
      mark
    + Shenandoah: missing SystemDictionary roots in
      ShenandoahHeapIterationRootScanner
    + Shenandoah: move barrier sets to their proper locations
    + Shenandoah: move parallelCleaning.* to shenandoah/
    + Shenandoah: pacer should use proper Atomics for intptr_t
    + Shenandoah: properly deallocates class loader metadata
    + Shenandoah: specialize String Table scans for better pause
      performance
    + Shenandoah: Zero build fails after recent Atomic cleanup in
      Pacer
  * AArch64 port
    + JDK-8161072, PR3797: AArch64: jtreg
      compiler/uncommontrap/TestDeoptOOM failure
    + JDK-8171537, PR3797: aarch64: compiler/c1/Test6849574.java
      generates guarantee failure in C1
    + JDK-8183925, PR3797: [AArch64] Decouple crash protection from
      watcher thread
    + JDK-8199712, PR3797: [AArch64] Flight Recorder
    + JDK-8203481, PR3797: Incorrect constraint for unextended_sp
      in frame:safe_for_sender
    + JDK-8203699, PR3797: java/lang/invoke/SpecialInterfaceCall
      fails with SIGILL on aarch64
    + JDK-8209413, PR3797: AArch64: NPE in clhsdb jstack command
    + JDK-8215961, PR3797: jdk/jfr/event/os/TestCPUInformation.java
      fails on AArch64
    + JDK-8216989, PR3797:
      CardTableBarrierSetAssembler::gen_write_ref_array_post_barrier()
      does not check for zero length on AARCH64
    + JDK-8217368, PR3797: AArch64: C2 recursive stack locking
      optimisation not triggered
    + JDK-8221658, PR3797: aarch64: add necessary predicate for
      ubfx patterns
    + JDK-8237512, PR3797: AArch64: aarch64TestHook leaks a
      BufferBlob
    + JDK-8246482, PR3797: Build failures with +JFR -PCH
    + JDK-8247979, PR3797: aarch64: missing side effect of killing
      flags for clearArray_reg_reg
    + JDK-8248219, PR3797: aarch64: missing memory barrier in
      fast_storefield and fast_accessfield

- Ignore whitespaces after the header or footer in PEM X.509 cert
  (bsc#1171352)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531493" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531494" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531495" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531496" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152299" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177211" ref_url="https://bugzilla.suse.com/1177211" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- bsc#1177211 (CVE-2020-26116) no longer allowing special characters in the method parameter 
  of HTTPConnection.putrequest in httplib, stopping injection of headers.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-10"/>
	<updated date="2020-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26116">CVE-2020-26116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557600" comment="libpython3_4m1_0-3.4.10-25.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557601" comment="python3-3.4.10-25.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557602" comment="python3-base-3.4.10-25.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557603" comment="python3-curses-3.4.10-25.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152300" version="1" class="patch">
	<metadata>
		<title>Security update for gcc10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172798" ref_url="https://bugzilla.suse.com/1172798" source="BUGZILLA"/>
		<reference ref_id="1172846" ref_url="https://bugzilla.suse.com/1172846" source="BUGZILLA"/>
		<reference ref_id="1173972" ref_url="https://bugzilla.suse.com/1173972" source="BUGZILLA"/>
		<reference ref_id="1174753" ref_url="https://bugzilla.suse.com/1174753" source="BUGZILLA"/>
		<reference ref_id="1174817" ref_url="https://bugzilla.suse.com/1174817" source="BUGZILLA"/>
		<reference ref_id="1175168" ref_url="https://bugzilla.suse.com/1175168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844/" source="CVE"/>
		<description>
This update for gcc10 fixes the following issues:
This update provides the GCC10 compiler suite and runtime libraries.

The base SUSE Linux Enterprise libraries libgcc_s1, libstdc++6 are replaced by
the gcc10 variants.

The new compiler variants are available with '-10' suffix, you can specify them
via:

        CC=gcc-10
        CXX=g++-10

or similar commands.

For a detailed changelog check out https://gcc.gnu.org/gcc-10/changes.html
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-10"/>
	<updated date="2020-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172798">SUSE bug 1172798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172846">SUSE bug 1172846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173972">SUSE bug 1173972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174753">SUSE bug 1174753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174817">SUSE bug 1174817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175168">SUSE bug 1175168</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13844">CVE-2020-13844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531497" comment="libasan6-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531498" comment="libasan6-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531499" comment="libatomic1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531500" comment="libatomic1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531501" comment="libgcc_s1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531502" comment="libgcc_s1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531503" comment="libgfortran5-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531504" comment="libgfortran5-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531505" comment="libgo16-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531506" comment="libgo16-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531507" comment="libgomp1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531508" comment="libgomp1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531509" comment="libitm1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531510" comment="libitm1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531511" comment="liblsan0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531512" comment="libobjc4-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531513" comment="libobjc4-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531514" comment="libquadmath0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531515" comment="libquadmath0-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531516" comment="libstdc++6-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531517" comment="libstdc++6-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531518" comment="libstdc++6-locale-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531519" comment="libstdc++6-pp-gcc10-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531520" comment="libstdc++6-pp-gcc10-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531521" comment="libtsan0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531522" comment="libubsan1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531523" comment="libubsan1-32bit-10.2.1+git583-1.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152301" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

- Intel CPU Microcode updated to 20201027 prerelease 
- CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) (bsc#1170446)
- CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)

# New Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  # Updated Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531524" comment="ucode-intel-20201027-13.76.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152302" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1106383" ref_url="https://bugzilla.suse.com/1106383" source="BUGZILLA"/>
		<reference ref_id="1133495" ref_url="https://bugzilla.suse.com/1133495" source="BUGZILLA"/>
		<reference ref_id="1139459" ref_url="https://bugzilla.suse.com/1139459" source="BUGZILLA"/>
		<reference ref_id="1151377" ref_url="https://bugzilla.suse.com/1151377" source="BUGZILLA"/>
		<reference ref_id="1151506" ref_url="https://bugzilla.suse.com/1151506" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1155574" ref_url="https://bugzilla.suse.com/1155574" source="BUGZILLA"/>
		<reference ref_id="1156482" ref_url="https://bugzilla.suse.com/1156482" source="BUGZILLA"/>
		<reference ref_id="1159814" ref_url="https://bugzilla.suse.com/1159814" source="BUGZILLA"/>
		<reference ref_id="1162108" ref_url="https://bugzilla.suse.com/1162108" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1712" ref_url="https://www.suse.com/security/cve/CVE-2020-1712/" source="CVE"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2020-1712 (bsc#bsc#1162108)
  Fix a heap use-after-free vulnerability, when asynchronous
  Polkit queries were performed while handling Dbus messages. A local
  unprivileged attacker could have abused this flaw to crash systemd services or
  potentially execute code and elevate their privileges, by sending specially
  crafted Dbus messages.

- Unconfirmed fix for prevent hanging of systemctl during restart. (bsc#1139459)
- Fix warnings thrown during package installation. (bsc#1154043)
- Fix for system-udevd prevent crash within OES2018. (bsc#1151506)
- Fragments of masked units ought not be considered for 'NeedDaemonReload'. (bsc#1156482)
- Wait for workers to finish when exiting. (bsc#1106383)
- Improve log message when inotify limit is reached. (bsc#1155574)
- Mention in the man pages that alias names are only effective after command 'systemctl enable'. (bsc#1151377)
- Introduce function for reading virtual files in 'sysfs' and 'procfs'. (bsc#1133495, bsc#1159814)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106383">SUSE bug 1106383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133495">SUSE bug 1133495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139459">SUSE bug 1139459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151377">SUSE bug 1151377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151506">SUSE bug 1151506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155574">SUSE bug 1155574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156482">SUSE bug 1156482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159814">SUSE bug 1159814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162108">SUSE bug 1162108</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1712/">CVE-2020-1712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1712">CVE-2020-1712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522619" comment="libsystemd0-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522620" comment="libsystemd0-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522621" comment="libudev1-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522622" comment="libudev1-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522623" comment="systemd-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522624" comment="systemd-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522625" comment="systemd-bash-completion-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522626" comment="systemd-sysvinit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522627" comment="udev-228-150.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152303" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.24 - OpenJDK 7u281 (October 2020 CPU, bsc#1177943)
  * Security fixes
    + JDK-8233624: Enhance JNI linkage
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8240124: Better VM Interning
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Import of OpenJDK 7 u281 build 1
    + JDK-8145096: Undefined behaviour in HotSpot
    + JDK-8215265: C2: range check elimination may allow illegal
      out of bound access
  * Backports
    + JDK-8250861, PR3812: Crash in MinINode::Ideal(PhaseGVN*, bool)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531526" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531527" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531528" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531529" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152304" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178387" ref_url="https://bugzilla.suse.com/1178387" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25692">CVE-2020-25692 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531530" comment="libldap-2_4-2-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531531" comment="libldap-2_4-2-32bit-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531532" comment="openldap2-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531533" comment="openldap2-back-meta-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531534" comment="openldap2-client-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531535" comment="openldap2-doc-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531536" comment="openldap2-ppolicy-check-password-1.2-18.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152305" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178588" ref_url="https://bugzilla.suse.com/1178588" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-49 (bsc#1178588)
  * CVE-2020-26950 (bmo#1675905)
    Write side effects in MCallGetProperty opcode not accounted
    for
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178588">SUSE bug 1178588</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26950">CVE-2020-26950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531537" comment="MozillaFirefox-78.4.1-112.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531538" comment="MozillaFirefox-devel-78.4.1-112.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531539" comment="MozillaFirefox-translations-common-78.4.1-112.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152306" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql96, postgresql10 and postgresql12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1171924" ref_url="https://bugzilla.suse.com/1171924" source="BUGZILLA"/>
		<description>


This update changes the internal packaging for postgresql, and so contains
all currently maintained postgresql versions across our SUSE Linux Enterprise 12
products.


* postgresql12 is shipped new in version 12.3 (bsc#1171924).

  The server and client packages only on SUSE Linux Enterprise Server 12 SP5,
  the libraries on SUSE Linux Enterprise Server 12 SP2 LTSS up to 12 SP5.

  + https://www.postgresql.org/about/news/2038/
  + https://www.postgresql.org/docs/12/release-12-3.html


* postgresql10 is updated to 10.13 (bsc#1171924).

  On SUSE Linux Enterprise Server 12 SP2 LTSS up to 12 SP5.

  +  https://www.postgresql.org/about/news/2038/
  +  https://www.postgresql.org/docs/10/release-10-13.html


* postgresql96 is updated to 9.6.18 (bsc#1171924):

  +  https://www.postgresql.org/about/news/2038/
  +  https://www.postgresql.org/docs/9.6/release-9-6-18.html

  On SUSE Linux Enterprise Server 12-SP2 and 12-SP3 LTSS only.

* postgresql 9.4 is updated to 9.4.26:

  +  https://www.postgresql.org/about/news/2011/
  +  https://www.postgresql.org/docs/9.4/release-9-4-26.html
  +  https://www.postgresql.org/about/news/1994/
  +  https://www.postgresql.org/docs/9.4/release-9-4-25.html

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171924">SUSE bug 1171924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531546" comment="libecpg6-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531547" comment="libpq5-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531548" comment="libpq5-32bit-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531549" comment="postgresql-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531550" comment="postgresql-contrib-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531551" comment="postgresql-docs-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531552" comment="postgresql-plperl-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531553" comment="postgresql-plpython-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531554" comment="postgresql-pltcl-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531555" comment="postgresql-server-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531556" comment="postgresql10-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531557" comment="postgresql10-contrib-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531558" comment="postgresql10-docs-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531562" comment="postgresql10-server-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531570" comment="postgresql96-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531571" comment="postgresql96-contrib-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531572" comment="postgresql96-docs-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531573" comment="postgresql96-plperl-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531574" comment="postgresql96-plpython-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531575" comment="postgresql96-pltcl-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531576" comment="postgresql96-server-9.6.19-6.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152307" version="1" class="patch">
	<metadata>
		<title>Security update for raptor (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178593" ref_url="https://bugzilla.suse.com/1178593" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18926" ref_url="https://www.suse.com/security/cve/CVE-2017-18926/" source="CVE"/>
		<description>
This update for raptor fixes the following issues:

- Fixed a heap overflow vulnerability (bsc#1178593, CVE-2017-18926).
- Update raptor to version 2.0.15
  * Made several fixes to Turtle / N-Triples family of parsers and serializers
  * Added utility functions for re-entrant sorting of objects and sequences.
  * Made other fixes and improvements including fixing reported issues:
    0000574, 0000575, 0000576, 0000577, 0000579, 0000581 and 0000584.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178593">SUSE bug 1178593</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18926/">CVE-2017-18926 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18926">CVE-2017-18926 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531577" comment="libraptor2-0-2.0.15-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152308" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1153098" ref_url="https://bugzilla.suse.com/1153098" source="BUGZILLA"/>
		<reference ref_id="1153332" ref_url="https://bugzilla.suse.com/1153332" source="BUGZILLA"/>
		<reference ref_id="1178466" ref_url="https://bugzilla.suse.com/1178466" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16808" ref_url="https://www.suse.com/security/cve/CVE-2017-16808/" source="CVE"/>
		<reference ref_id="CVE-2018-10103" ref_url="https://www.suse.com/security/cve/CVE-2018-10103/" source="CVE"/>
		<reference ref_id="CVE-2018-10105" ref_url="https://www.suse.com/security/cve/CVE-2018-10105/" source="CVE"/>
		<reference ref_id="CVE-2018-14461" ref_url="https://www.suse.com/security/cve/CVE-2018-14461/" source="CVE"/>
		<reference ref_id="CVE-2018-14462" ref_url="https://www.suse.com/security/cve/CVE-2018-14462/" source="CVE"/>
		<reference ref_id="CVE-2018-14463" ref_url="https://www.suse.com/security/cve/CVE-2018-14463/" source="CVE"/>
		<reference ref_id="CVE-2018-14464" ref_url="https://www.suse.com/security/cve/CVE-2018-14464/" source="CVE"/>
		<reference ref_id="CVE-2018-14465" ref_url="https://www.suse.com/security/cve/CVE-2018-14465/" source="CVE"/>
		<reference ref_id="CVE-2018-14466" ref_url="https://www.suse.com/security/cve/CVE-2018-14466/" source="CVE"/>
		<reference ref_id="CVE-2018-14467" ref_url="https://www.suse.com/security/cve/CVE-2018-14467/" source="CVE"/>
		<reference ref_id="CVE-2018-14468" ref_url="https://www.suse.com/security/cve/CVE-2018-14468/" source="CVE"/>
		<reference ref_id="CVE-2018-14469" ref_url="https://www.suse.com/security/cve/CVE-2018-14469/" source="CVE"/>
		<reference ref_id="CVE-2018-14470" ref_url="https://www.suse.com/security/cve/CVE-2018-14470/" source="CVE"/>
		<reference ref_id="CVE-2018-14879" ref_url="https://www.suse.com/security/cve/CVE-2018-14879/" source="CVE"/>
		<reference ref_id="CVE-2018-14880" ref_url="https://www.suse.com/security/cve/CVE-2018-14880/" source="CVE"/>
		<reference ref_id="CVE-2018-14881" ref_url="https://www.suse.com/security/cve/CVE-2018-14881/" source="CVE"/>
		<reference ref_id="CVE-2018-14882" ref_url="https://www.suse.com/security/cve/CVE-2018-14882/" source="CVE"/>
		<reference ref_id="CVE-2018-16227" ref_url="https://www.suse.com/security/cve/CVE-2018-16227/" source="CVE"/>
		<reference ref_id="CVE-2018-16228" ref_url="https://www.suse.com/security/cve/CVE-2018-16228/" source="CVE"/>
		<reference ref_id="CVE-2018-16229" ref_url="https://www.suse.com/security/cve/CVE-2018-16229/" source="CVE"/>
		<reference ref_id="CVE-2018-16230" ref_url="https://www.suse.com/security/cve/CVE-2018-16230/" source="CVE"/>
		<reference ref_id="CVE-2018-16300" ref_url="https://www.suse.com/security/cve/CVE-2018-16300/" source="CVE"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2018-16451" ref_url="https://www.suse.com/security/cve/CVE-2018-16451/" source="CVE"/>
		<reference ref_id="CVE-2018-16452" ref_url="https://www.suse.com/security/cve/CVE-2018-16452/" source="CVE"/>
		<reference ref_id="CVE-2019-1010220" ref_url="https://www.suse.com/security/cve/CVE-2019-1010220/" source="CVE"/>
		<reference ref_id="CVE-2019-15166" ref_url="https://www.suse.com/security/cve/CVE-2019-15166/" source="CVE"/>
		<reference ref_id="CVE-2019-15167" ref_url="https://www.suse.com/security/cve/CVE-2019-15167/" source="CVE"/>
		<reference ref_id="CVE-2020-8037" ref_url="https://www.suse.com/security/cve/CVE-2020-8037/" source="CVE"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2020-8037: Fixed an issue where PPP decapsulator did not allocate the right buffer size (bsc#1178466).

The previous update of tcpdump already fixed variuous Buffer overflow/overread vulnerabilities [bsc#1153098, bsc#1153332]

- CVE-2017-16808 (AoE)
- CVE-2018-14468 (FrameRelay)
- CVE-2018-14469 (IKEv1)
- CVE-2018-14470 (BABEL)
- CVE-2018-14466 (AFS/RX)
- CVE-2018-14461 (LDP)
- CVE-2018-14462 (ICMP)
- CVE-2018-14465 (RSVP)
- CVE-2018-14464 (LMP)
- CVE-2019-15166 (LMP)
- CVE-2018-14880 (OSPF6)
- CVE-2018-14882 (RPL)
- CVE-2018-16227 (802.11)
- CVE-2018-16229 (DCCP)
- CVE-2018-14467 (BGP)
- CVE-2018-14881 (BGP)
- CVE-2018-16230 (BGP)
- CVE-2018-16300 (BGP)
- CVE-2018-14463 (VRRP)
- CVE-2019-15167 (VRRP)
- CVE-2018-14879 (tcpdump -V)
- CVE-2018-16228 (HNCP) is a duplicate of the already fixed CVE-2019-1010220
- CVE-2018-16301 (fixed in libpcap)
- CVE-2018-16451 (SMB)
- CVE-2018-16452 (SMB)
- CVE-2018-10103 (SMB - partially fixed, but SMB printing disabled)
- CVE-2018-10105 (SMB - too unreliably reproduced, SMB printing disabled)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-17"/>
	<updated date="2020-11-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178466">SUSE bug 1178466</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16808/">CVE-2017-16808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16808">CVE-2017-16808 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10103/">CVE-2018-10103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10103">CVE-2018-10103 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10105/">CVE-2018-10105 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10105">CVE-2018-10105 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14461/">CVE-2018-14461 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14461">CVE-2018-14461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14462/">CVE-2018-14462 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14462">CVE-2018-14462 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14463/">CVE-2018-14463 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14463">CVE-2018-14463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14464/">CVE-2018-14464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14464">CVE-2018-14464 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14465/">CVE-2018-14465 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14465">CVE-2018-14465 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14466/">CVE-2018-14466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14466">CVE-2018-14466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14467/">CVE-2018-14467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14467">CVE-2018-14467 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14468/">CVE-2018-14468 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14468">CVE-2018-14468 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14469/">CVE-2018-14469 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14469">CVE-2018-14469 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14470/">CVE-2018-14470 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14470">CVE-2018-14470 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14879/">CVE-2018-14879 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14879">CVE-2018-14879 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14880/">CVE-2018-14880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14880">CVE-2018-14880 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14881/">CVE-2018-14881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14881">CVE-2018-14881 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14882/">CVE-2018-14882 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14882">CVE-2018-14882 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16227/">CVE-2018-16227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16227">CVE-2018-16227 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16228/">CVE-2018-16228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16228">CVE-2018-16228 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16229/">CVE-2018-16229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16229">CVE-2018-16229 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16230/">CVE-2018-16230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16230">CVE-2018-16230 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16300/">CVE-2018-16300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16300">CVE-2018-16300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16451/">CVE-2018-16451 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16451">CVE-2018-16451 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16452/">CVE-2018-16452 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16452">CVE-2018-16452 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1010220/">CVE-2019-1010220 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010220">CVE-2019-1010220 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15166/">CVE-2019-15166 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15166">CVE-2019-15166 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15167/">CVE-2019-15167 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15167">CVE-2019-15167 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8037/">CVE-2020-8037 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8037">CVE-2020-8037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557604" comment="tcpdump-4.9.2-14.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152309" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178512" ref_url="https://bugzilla.suse.com/1178512" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28196" ref_url="https://www.suse.com/security/cve/CVE-2020-28196/" source="CVE"/>
		<description>
This update for krb5 fixes the following security issue:

- CVE-2020-28196: Fixed an unbounded recursion via an ASN.1-encoded Kerberos message (bsc#1178512).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178512">SUSE bug 1178512</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28196/">CVE-2020-28196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28196">CVE-2020-28196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531584" comment="krb5-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531585" comment="krb5-32bit-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531586" comment="krb5-client-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531587" comment="krb5-doc-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531588" comment="krb5-plugin-kdb-ldap-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531589" comment="krb5-plugin-preauth-otp-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531590" comment="krb5-plugin-preauth-pkinit-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531591" comment="krb5-server-1.12.5-40.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152310" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

Upgrade to version 10.15:

  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/10/release-10-15.html

Update to 10.14:

  * CVE-2020-14349, bsc#1175193: Set a secure search_path in
    logical replication walsenders and apply workers
  * CVE-2020-14350, bsc#1175194: Make contrib modules' installation
    scripts more secure.
  * https://www.postgresql.org/docs/10/release-10-14.html

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14349">CVE-2020-14349 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531592" comment="postgresql10-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531593" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531598" comment="postgresql10-server-10.15-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152311" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<description>
This update for postgresql96 fixes the following issues:

Upgrade to version 9.6.20:

  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/9.6/release-9-6-20.html

Changes from 9.6.19:

  * CVE-2020-14350, bsc#1175194: Make contrib modules installation
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531599" comment="postgresql96-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531600" comment="postgresql96-contrib-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531601" comment="postgresql96-docs-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531602" comment="postgresql96-plperl-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531603" comment="postgresql96-plpython-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531604" comment="postgresql96-pltcl-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531605" comment="postgresql96-server-9.6.20-6.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152312" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173592" ref_url="https://bugzilla.suse.com/1173592" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="1178971" ref_url="https://bugzilla.suse.com/1178971" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated Intel CPU Microcode to 20201118 official release. (bsc#1178971)
 - Removed TGL/06-8c-01/80 due to functional issues with some OEM platforms.
 - CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) INTEL-SA-00389 (bsc#1170446)
 - CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)
 - CVE-2020-8696: Vector Register Sampling Active INTEL-SA-00381 (bsc#1173592)

- Release notes:
  - Security updates for [INTEL-SA-00381](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html).
  - Security updates for [INTEL-SA-00389](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html).
  - Update for functional issues. Refer to [Second Generation Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
  - Update for functional issues. Refer to [10th Gen Intel? Core™ Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
  - Update for functional issues. Refer to [8th and 9th Gen Intel? Core™ Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
  - Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel? Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
  - Update for functional issues. Refer to [6th Gen Intel? Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

  ### New Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | LKF            | B2/B3    | 06-8a-01/10 |          | 00000028 | Core w/Hybrid Technology
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  ### Updated Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173592">SUSE bug 1173592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178971">SUSE bug 1178971</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8696">CVE-2020-8696 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531614" comment="ucode-intel-20201118-13.81.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152313" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1166751" ref_url="https://bugzilla.suse.com/1166751" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0556" ref_url="https://www.suse.com/security/cve/CVE-2020-0556/" source="CVE"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2020-0556: Fixed improper access control which may lead to escalation of privilege and denial of service by an unauthenticated user (bsc#1166751).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166751">SUSE bug 1166751</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-0556/">CVE-2020-0556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0556">CVE-2020-0556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531615" comment="bluez-5.13-5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531616" comment="libbluetooth3-5.13-5.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152314" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178824" ref_url="https://bugzilla.suse.com/1178824" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.5.0 ESR (bsc#1178824)
  * CVE-2020-26951: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code
  * CVE-2020-16012: Variable time processing of cross-origin images during drawImage calls
  * CVE-2020-26953: Fullscreen could be enabled without displaying the security UI
  * CVE-2020-26956: XSS through paste (manual and clipboard API)
  * CVE-2020-26958: Requests intercepted through ServiceWorkers lacked MIME type restrictions
  * CVE-2020-26959: Use-after-free in WebRequestService
  * CVE-2020-26960: Potential use-after-free in uses of nsTArray
  * CVE-2020-15999: Heap buffer overflow in freetype
  * CVE-2020-26961: DoH did not filter IPv4 mapped IP Addresses
  * CVE-2020-26965: Software keyboards may have remembered typed passwords
  * CVE-2020-26966: Single-word search queries were also broadcast to local network
  * CVE-2020-26968: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-27"/>
	<updated date="2020-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16012">CVE-2020-16012 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26951">CVE-2020-26951 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26953">CVE-2020-26953 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26956">CVE-2020-26956 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26958">CVE-2020-26958 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26959">CVE-2020-26959 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26960">CVE-2020-26960 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26961">CVE-2020-26961 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26965">CVE-2020-26965 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26966">CVE-2020-26966 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26968">CVE-2020-26968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531617" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531618" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531619" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152315" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178682" ref_url="https://bugzilla.suse.com/1178682" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2020-25708 [bsc#1178682], libvncserver/rfbserver.c has a divide by zero which could result in DoS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-27"/>
	<updated date="2020-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178682">SUSE bug 1178682</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25708">CVE-2020-25708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531620" comment="libvncclient0-0.9.9-17.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531621" comment="libvncserver0-0.9.9-17.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152316" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174908" ref_url="https://bugzilla.suse.com/1174908" source="BUGZILLA"/>
		<reference ref_id="1177596" ref_url="https://bugzilla.suse.com/1177596" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to privilege escalation (bsc#1177596).
- CVE-2020-14360: Fixed an out of bounds memory accesses on too short request which could lead to denial of service (bsc#1174908).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14360">CVE-2020-14360 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25712">CVE-2020-25712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531622" comment="xorg-x11-server-7.6_1.18.3-76.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531623" comment="xorg-x11-server-extra-7.6_1.18.3-76.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152317" version="1" class="patch">
	<metadata>
		<title>Security update for python-setuptools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
This update for python-setuptools fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009524556" comment="python-setuptools-40.6.2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525277" comment="python3-setuptools-40.6.2-4.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152318" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531624" comment="libpython3_4m1_0-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531625" comment="python3-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531626" comment="python3-base-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531627" comment="python3-curses-3.4.10-25.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152319" version="1" class="patch">
	<metadata>
		<title>Security update for gdm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178150" ref_url="https://bugzilla.suse.com/1178150" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16125" ref_url="https://www.suse.com/security/cve/CVE-2020-16125/" source="CVE"/>
		<description>
This update for gdm fixes the following issues:

- CVE-2020-16125: Fixed a privilege escalation (bsc#1178150).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178150">SUSE bug 1178150</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16125/">CVE-2020-16125 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16125">CVE-2020-16125 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531629" comment="gdm-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531630" comment="gdm-lang-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531631" comment="gdmflexiserver-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531632" comment="libgdm1-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531633" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152320" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178168" ref_url="https://bugzilla.suse.com/1178168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659/" source="CVE"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-25659: Attempted to mitigate Bleichenbacher attacks on RSA decryption (bsc#1178168).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178168">SUSE bug 1178168</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25659">CVE-2020-25659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531634" comment="python-cryptography-2.1.4-7.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531635" comment="python3-cryptography-2.1.4-7.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152321" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<description>

This update for postgresql12 fixes the following issues:

Upgrade to version 12.5:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/12/release-12-5.html

The previous postgresql12 update already addressed:

Update to 12.4:

* CVE-2020-14349, bsc#1175193: Set a secure search_path in logical replication walsenders and apply workers
* CVE-2020-14350, bsc#1175194: Make contrib modules' installation scripts more secure.

* https://www.postgresql.org/docs/12/release-12-4.html

  		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14349">CVE-2020-14349 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531636" comment="libecpg6-12.5-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531637" comment="libpq5-12.5-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531638" comment="libpq5-32bit-12.5-3.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152322" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177409" ref_url="https://bugzilla.suse.com/1177409" source="BUGZILLA"/>
		<reference ref_id="1177412" ref_url="https://bugzilla.suse.com/1177412" source="BUGZILLA"/>
		<reference ref_id="1177413" ref_url="https://bugzilla.suse.com/1177413" source="BUGZILLA"/>
		<reference ref_id="1177414" ref_url="https://bugzilla.suse.com/1177414" source="BUGZILLA"/>
		<reference ref_id="1178591" ref_url="https://bugzilla.suse.com/1178591" source="BUGZILLA"/>
		<reference ref_id="1178963" ref_url="https://bugzilla.suse.com/1178963" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674/" source="CVE"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- bsc#1178963 - stack corruption from XSA-346 change (XSA-355) 
- bsc#1177409 - CVE-2020-27674: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286)
- bsc#1177412 - CVE-2020-27672: Race condition in Xen mapping code (XSA-345)
- bsc#1177413 - CVE-2020-27671: undue deferral of IOMMU TLB flushes (XSA-346)
- bsc#1177414 - CVE-2020-27670: unsafe AMD IOMMU page table updates (XSA-347)
- bsc#1178591 - CVE-2020-28368: Intel RAPL sidechannel attack aka PLATYPUS attack aka XSA-351
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177413">SUSE bug 1177413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178963">SUSE bug 1178963</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27670">CVE-2020-27670 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27671">CVE-2020-27671 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27672">CVE-2020-27672 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27674">CVE-2020-27674 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28368">CVE-2020-28368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538789" comment="xen-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538790" comment="xen-doc-html-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538791" comment="xen-libs-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538792" comment="xen-libs-32bit-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538793" comment="xen-tools-4.9.4_14-3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538794" comment="xen-tools-domU-4.9.4_14-3.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152323" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179035" ref_url="https://bugzilla.suse.com/1179035" source="BUGZILLA"/>
		<reference ref_id="1179113" ref_url="https://bugzilla.suse.com/1179113" source="BUGZILLA"/>
		<reference ref_id="1179461" ref_url="https://bugzilla.suse.com/1179461" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

- Find and display the content of messages properly. (bsc#1179461)
- CVE-2020-28896: incomplete connection termination could send credentials over unencrypted connections. (bsc#1179035)
- Avoid that message with a million tiny parts can freeze MUA for several minutes. (bsc#1179113)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179035">SUSE bug 1179035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179113">SUSE bug 1179113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179461">SUSE bug 1179461</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28896">CVE-2020-28896 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531639" comment="mutt-1.10.1-55.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152324" version="1" class="patch">
	<metadata>
		<title>Security update for LibreOffice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1061210" ref_url="https://bugzilla.suse.com/1061210" source="BUGZILLA"/>
		<reference ref_id="1105173" ref_url="https://bugzilla.suse.com/1105173" source="BUGZILLA"/>
		<reference ref_id="1144522" ref_url="https://bugzilla.suse.com/1144522" source="BUGZILLA"/>
		<reference ref_id="1152684" ref_url="https://bugzilla.suse.com/1152684" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9853" ref_url="https://www.suse.com/security/cve/CVE-2019-9853/" source="CVE"/>
		<description>
This update libreoffice and libraries fixes the following issues:

LibreOffice was updated to 6.3.3 (jsc#SLE-8705), bringing many bug and stability fixes.

More information for the 6.3 release at: https://wiki.documentfoundation.org/ReleaseNotes/6.3	  
	  
Security issue fixed: 

- CVE-2019-9853: Fixed an issue where by executing macros, the security settings 
  could have been bypassed (bsc#1152684).	  
	  
Other issues addressed: 

- Dropped disable-kde4 switch, since it is no longer known by configure
- Disabled gtk2 because it will be removed in future releases 
- librelogo is now a standalone sub-package (bsc#1144522).
- Partial fixes for an issue where Table(s) from  DOCX showed wrong 
  position or color (bsc#1061210).
	  
cmis-client was updated to 0.5.2:

 * Removed header for Uuid's sha1 header(bsc#1105173).
 * Fixed Google Drive login
 * Added support for Google Drive two-factor authentication
 * Fixed access to SharePoint root folder 
 * Limited the maximal number of redirections to 20 
 * Switched library implementation to C++11 (the API remains C++98-compatible)
 * Fixed encoding of OAuth2 credentials
 * Dropped cppcheck run from 'make check'. A new 'make cppcheck' target was created for it
 * Added proper API symbol exporting
 * Speeded up building of tests a bit
 * Fixed a few issues found by coverity and cppcheck

libixion was updated to 0.15.0:

 * Updated for new liborcus
 * Switched to spdlog for compile-time debug log outputs
 * Fixed various issues 

libmwaw was updated 0.3.15:
 
 * Fixed fuzzing issues 

liborcus was updated to 0.15.3:

 * Fixed various xml related bugs
 * Improved performance
 * Fixed multiple parser issues 
 * Added map and structure mode to orcus-json
 * Other improvements and fixes

mdds was updated to 1.5.0:

 * API changed to 1.5
 * Moved the API incompatibility notes from README to the rst doc.
 * Added the overview section for flat_segment_tree.

myspell-dictionaries was updated to 20191016:

 * Updated Slovenian thesaurus
 * Updated the da_DK dictionary
 * Removed the abbreviations from Thai hunspell dictionary
 * Updated the English dictionaries
 * Fixed the logo management for 'ca'

spdlog was updated to 0.16.3: 

 * Fixed sleep issue under MSVC that happens when changing
   the clock backwards 
 * Ensured that macros always expand to expressions 
 * Added global flush_on function 

bluez changes:  

 * lib: Changed bluetooth.h to compile in strict C 

gperf was updated to 3.1:   

 * The generated C code is now in ANSI-C by default.
 * Added option --constants-prefix.
 * Added declaration %define constants-prefix.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-07"/>
	<updated date="2020-02-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061210">SUSE bug 1061210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105173">SUSE bug 1105173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144522">SUSE bug 1144522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152684">SUSE bug 1152684</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9853/">CVE-2019-9853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-9853">CVE-2019-9853 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557605" comment="bluez-5.13-5.20.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557606" comment="libbluetooth3-5.13-5.20.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152325" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1137832" ref_url="https://bugzilla.suse.com/1137832" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<description>
This update for dbus-1 fixes the following issues:
	  
Security issue fixed:     
    
- CVE-2019-12749: Fixed an implementation flaw in DBUS_COOKIE_SHA1 which 
  could have allowed local attackers to bypass authentication (bsc#1137832).   
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-18"/>
	<updated date="2020-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12749">CVE-2019-12749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522634" comment="dbus-1-1.8.22-29.17.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522635" comment="dbus-1-x11-1.8.22-29.17.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522636" comment="libdbus-1-3-1.8.22-29.17.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522637" comment="libdbus-1-3-32bit-1.8.22-29.17.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152326" version="1" class="patch">
	<metadata>
		<title>Security update for python36 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1178009" ref_url="https://bugzilla.suse.com/1178009" source="BUGZILLA"/>
		<reference ref_id="1179630" ref_url="https://bugzilla.suse.com/1179630" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2020-27619" ref_url="https://www.suse.com/security/cve/CVE-2020-27619/" source="CVE"/>
		<description>
This update for python36 fixes the following issues:

- CVE-2020-27619: Fixed an issue where the CJK codec tests call eval() on content retrieved via HTTP (bsc#1178009).
- CVE-2019-20916: Fixed a directory traversal in _download_http_url() (bsc#1176262). 
- Build of python3 documentation is not independent on the version of Sphinx(bsc#1179630).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178009">SUSE bug 1178009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179630">SUSE bug 1179630</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27619/">CVE-2020-27619 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27619">CVE-2020-27619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557607" comment="libpython3_6m1_0-3.6.12-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557608" comment="python36-3.6.12-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557609" comment="python36-base-3.6.12-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557610" comment="python36-curses-3.6.12-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557611" comment="python36-dbm-3.6.12-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557612" comment="python36-devel-3.6.12-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557613" comment="python36-doc-3.6.12-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557614" comment="python36-idle-3.6.12-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557615" comment="python36-testsuite-3.6.12-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557616" comment="python36-tk-3.6.12-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557617" comment="python36-tools-3.6.12-6.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152327" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179491" ref_url="https://bugzilla.suse.com/1179491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2020-1971: Fixed a null pointer dereference in EDIPARTYNAME (bsc#1179491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">CVE-2020-1971 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531646" comment="libopenssl-devel-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531647" comment="libopenssl1_0_0-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531648" comment="libopenssl1_0_0-32bit-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531649" comment="libopenssl1_0_0-hmac-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531650" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531651" comment="openssl-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531652" comment="openssl-doc-1.0.2j-60.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152328" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531653" comment="libpython2_7-1_0-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531654" comment="libpython2_7-1_0-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531655" comment="python-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531656" comment="python-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531657" comment="python-base-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531658" comment="python-base-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531659" comment="python-curses-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531660" comment="python-demo-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531661" comment="python-devel-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531662" comment="python-doc-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531663" comment="python-doc-pdf-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531664" comment="python-gdbm-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531665" comment="python-idle-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531666" comment="python-tk-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531667" comment="python-xml-2.7.17-28.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152329" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1175109" ref_url="https://bugzilla.suse.com/1175109" source="BUGZILLA"/>
		<reference ref_id="1179398" ref_url="https://bugzilla.suse.com/1179398" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8231" ref_url="https://www.suse.com/security/cve/CVE-2020-8231/" source="CVE"/>
		<reference ref_id="CVE-2020-8284" ref_url="https://www.suse.com/security/cve/CVE-2020-8284/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8284: Fixed an issue where a malicius FTP server could make curl connect to a different IP (bsc#1179398).
- CVE-2020-8231: Fixed an issue with trusting FTP PASV responses (bsc#1175109).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-14"/>
	<updated date="2020-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175109">SUSE bug 1175109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179398">SUSE bug 1179398</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8231/">CVE-2020-8231 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8231">CVE-2020-8231 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8284/">CVE-2020-8284 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8284">CVE-2020-8284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557618" comment="curl-7.37.0-37.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557619" comment="libcurl4-7.37.0-37.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557620" comment="libcurl4-32bit-7.37.0-37.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152330" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1161799" ref_url="https://bugzilla.suse.com/1161799" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.5.0 ESR
  * CVE-2020-6796 (bmo#1610426)
    Missing bounds check on shared memory read in the parent
    process
  * CVE-2020-6797 (bmo#1596668)
    Extensions granted downloads.open permission could open
    arbitrary applications on Mac OSX
  * CVE-2020-6798 (bmo#1602944)
    Incorrect parsing of template tag could result in JavaScript
    injection
  * CVE-2020-6799 (bmo#1606596)
    Arbitrary code execution when opening pdf links from other
    applications, when Firefox is configured as default pdf
    reader
  * CVE-2020-6800 (bmo#1595786, bmo#1596706, bmo#1598543,
    bmo#1604851, bmo#1605777, bmo#1608580, bmo#1608785)
    Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
  * Fixed: Fixed various issues opening files with spaces in
    their path (bmo#1601905, bmo#1602726)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-17"/>
	<updated date="2020-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161799">SUSE bug 1161799</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6796">CVE-2020-6796 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6797">CVE-2020-6797 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6798">CVE-2020-6798 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6799">CVE-2020-6799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6800">CVE-2020-6800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522638" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522639" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152331" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177789" ref_url="https://bugzilla.suse.com/1177789" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14584" ref_url="https://www.suse.com/security/cve/CVE-2019-14584/" source="CVE"/>
		<description>
This update for ovmf fixes the following issues:

- CVE-2019-14584: Fixed a null dereference in AuthenticodeVerify() (bsc#1177789).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-16"/>
	<updated date="2020-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177789">SUSE bug 1177789</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14584/">CVE-2019-14584 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14584">CVE-2019-14584 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557621" comment="ovmf-2017+git1492060560.b6d11d7c46-4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557622" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557623" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152332" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179398" ref_url="https://bugzilla.suse.com/1179398" source="BUGZILLA"/>
		<reference ref_id="1179399" ref_url="https://bugzilla.suse.com/1179399" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8284" ref_url="https://www.suse.com/security/cve/CVE-2020-8284/" source="CVE"/>
		<reference ref_id="CVE-2020-8285" ref_url="https://www.suse.com/security/cve/CVE-2020-8285/" source="CVE"/>
		<description>
This update for curl fixes the following issue:

- CVE-2020-8285: Fixed an FTP wildcard stack overflow (bsc#1179399).
- CVE-2020-8284: Adjust trusting FTP PASV responses (bsc#1179398).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-18"/>
	<updated date="2020-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179398">SUSE bug 1179398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179399">SUSE bug 1179399</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8284/">CVE-2020-8284 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8284">CVE-2020-8284 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8285/">CVE-2020-8285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8285">CVE-2020-8285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557624" comment="curl-7.37.0-37.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557625" comment="libcurl4-7.37.0-37.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557626" comment="libcurl4-32bit-7.37.0-37.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152333" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180039" ref_url="https://bugzilla.suse.com/1180039" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2020-55 (bsc#1180039)
  * CVE-2020-16042 (bmo#1679003)
    Operations on a BigInt could have caused uninitialized memory
    to be exposed
  * CVE-2020-26971 (bmo#1663466)
    Heap buffer overflow in WebGL
  * CVE-2020-26973 (bmo#1680084)
    CSS Sanitizer performed incorrect sanitization
  * CVE-2020-26974 (bmo#1681022)
    Incorrect cast of StyleGenericFlexBasis resulted in a heap
    use-after-free
  * CVE-2020-26978 (bmo#1677047)
    Internal network hosts could have been probed by a malicious
    webpage
  * CVE-2020-35111 (bmo#1657916)
    The proxy.onRequest API did not catch view-source URLs
  * CVE-2020-35112 (bmo#1661365)
    Opening an extension-less download may have inadvertently
    launched an executable instead
  * CVE-2020-35113 (bmo#1664831, bmo#1673589)
    Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16042">CVE-2020-16042 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26971">CVE-2020-26971 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26973">CVE-2020-26973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26974">CVE-2020-26974 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26978">CVE-2020-26978 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35111">CVE-2020-35111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35112">CVE-2020-35112 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35113">CVE-2020-35113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531677" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531678" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531679" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152334" version="1" class="patch">
	<metadata>
		<title>Security update for PackageKit (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176930" ref_url="https://bugzilla.suse.com/1176930" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16121" ref_url="https://www.suse.com/security/cve/CVE-2020-16121/" source="CVE"/>
		<description>
This update for PackageKit fixes the following issues:

- CVE-2020-16121: Fixed an information disclosure in InstallFiles, GetFilesLocal and GetDetailsLocal (bsc#1176930).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1176930">SUSE bug 1176930</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16121/">CVE-2020-16121 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16121">CVE-2020-16121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557627" comment="PackageKit-1.1.3-24.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557628" comment="PackageKit-backend-zypp-1.1.3-24.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557629" comment="PackageKit-lang-1.1.3-24.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557630" comment="libpackagekit-glib2-18-1.1.3-24.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557631" comment="typelib-1_0-PackageKitGlib-1_0-1.1.3-24.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152335" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1118459" ref_url="https://bugzilla.suse.com/1118459" source="BUGZILLA"/>
		<reference ref_id="1119353" ref_url="https://bugzilla.suse.com/1119353" source="BUGZILLA"/>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="1171981" ref_url="https://bugzilla.suse.com/1171981" source="BUGZILLA"/>
		<reference ref_id="1174250" ref_url="https://bugzilla.suse.com/1174250" source="BUGZILLA"/>
		<reference ref_id="1174255" ref_url="https://bugzilla.suse.com/1174255" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123/" source="CVE"/>
		<reference ref_id="CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327/" source="CVE"/>
		<reference ref_id="CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341/" source="CVE"/>
		<reference ref_id="CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350/" source="CVE"/>
		<reference ref_id="CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

clamav was updated to 0.103.0 to implement jsc#ECO-3010 and bsc#1118459.

* clamd can now reload the signature database without blocking
  scanning. This multi-threaded database reload improvement was made
  possible thanks to a community effort.
  - Non-blocking database reloads are now the default behavior. Some
    systems that are more constrained on RAM may need to disable
    non-blocking reloads as it will temporarily consume two times as
    much memory. We added a new clamd config option
    ConcurrentDatabaseReload, which may be set to no.
* Fix clamav-milter.service (requires clamd.service to run)
* bsc#1119353, clamav-fips.patch: Fix freshclam crash in FIPS mode.
* Partial sync with SLE15.

Update to version 0.102.4

Accumulated security fixes:

* CVE-2020-3350: Fix a vulnerability wherein a malicious user could
  replace a scan target's directory with a symlink to another path
  to trick clamscan, clamdscan, or clamonacc into removing or moving
  a different file (eg. a critical system file). The issue would
  affect users that use the --move or --remove options for clamscan,
  clamdscan, and clamonacc. (bsc#1174255)
* CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
  module in ClamAV 0.102.3 that could cause a Denial-of-Service
  (DoS) condition. Improper bounds checking results in an
  out-of-bounds read which could cause a crash. The previous fix for
  this CVE in 0.102.3 was incomplete. This fix correctly resolves
  the issue.
* CVE-2020-3481: Fix a vulnerability in the EGG archive module in
  ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)
  condition. Improper error handling may result in a crash due to a
  NULL pointer dereference. This vulnerability is mitigated for
  those using the official ClamAV signature databases because the
  file type signatures in daily.cvd will not enable the EGG archive
  parser in versions affected by the vulnerability. (bsc#1174250)
* CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
  ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
  condition. Improper size checking of a buffer used to initialize AES
  decryption routines results in an out-of-bounds read which may cause
  a crash. (bsc#1171981)
* CVE-2020-3123: A denial-of-service (DoS) condition may occur when
  using the optional credit card data-loss-prevention (DLP) feature.
  Improper bounds checking of an unsigned variable resulted in an
  out-of-bounds read, which causes a crash.
* CVE-2019-15961: A Denial-of-Service (DoS) vulnerability may
  occur when scanning a specially crafted email file as a result
  of excessively long scan times. The issue is resolved by
  implementing several maximums in parsing MIME messages and by
  optimizing use of memory allocation. (bsc#1157763).
* CVE-2019-12900: An out of bounds write in the NSIS bzip2
  (bsc#1149458)
* CVE-2019-12625: Introduce a configurable time limit to mitigate
  zip bomb vulnerability completely. Default is 2 minutes,
  configurable useing the clamscan --max-scantime and for clamd
  using the MaxScanTime config option (bsc#1144504)

Update to version 0.101.3:

* ZIP bomb causes extreme CPU spikes (bsc#1144504)

Update to version 0.101.2 (bsc#1118459):

* Support for RAR v5 archive extraction.
* Incompatible changes to the arguments of cl_scandesc,
  cl_scandesc_callback, and cl_scanmap_callback.
* Scanning options have been converted from a single flag
  bit-field into a structure of multiple categorized flag
  bit-fields.
* The CL_SCAN_HEURISTIC_ENCRYPTED scan option was replaced by
  2 new scan options: CL_SCAN_HEURISTIC_ENCRYPTED_ARCHIVE, and
  CL_SCAN_HEURISTIC_ENCRYPTED_DOC
* Incompatible clamd.conf and command line interface changes.
* Heuristic Alerts' (aka 'Algorithmic Detection') options have
  been changed to make the names more consistent. The original
  options are deprecated in 0.101, and will be removed in a
  future feature release.
* For details, see https://blog.clamav.net/2018/12/clamav-01010-has-been-released.html		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118459">SUSE bug 1118459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119353">SUSE bug 1119353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171981">SUSE bug 1171981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174255">SUSE bug 1174255</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15961">CVE-2019-15961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3123">CVE-2020-3123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3327">CVE-2020-3327 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3341">CVE-2020-3341 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3350">CVE-2020-3350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3481">CVE-2020-3481 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531686" comment="clamav-0.103.0-33.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152336" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179879" ref_url="https://bugzilla.suse.com/1179879" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16587" ref_url="https://www.suse.com/security/cve/CVE-2020-16587/" source="CVE"/>
		<reference ref_id="CVE-2020-16588" ref_url="https://www.suse.com/security/cve/CVE-2020-16588/" source="CVE"/>
		<reference ref_id="CVE-2020-16589" ref_url="https://www.suse.com/security/cve/CVE-2020-16589/" source="CVE"/>
		<description>
This update for openexr fixes the following issues:

Security issues fixed:

- CVE-2020-16587: Fixed a heap-based buffer overflow in chunkOffsetReconstruction in ImfMultiPartInputFile.cpp (bsc#1179879).
- CVE-2020-16588: Fixed a null pointer deference in generatePreview (bsc#1179879).
- CVE-2020-16589: Fixed a heap-based buffer overflow in writeTileData in ImfTiledOutputFile.cpp (bsc#1179879).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-23"/>
	<updated date="2020-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179879">SUSE bug 1179879</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16587/">CVE-2020-16587 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16587">CVE-2020-16587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16588/">CVE-2020-16588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16588">CVE-2020-16588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-16589/">CVE-2020-16589 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16589">CVE-2020-16589 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557632" comment="libIlmImf-Imf_2_1-21-2.1.0-6.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557633" comment="openexr-2.1.0-6.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152337" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159635" ref_url="https://bugzilla.suse.com/1159635" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2019-19906: Fixed an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet (bsc#1159635).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-28"/>
	<updated date="2020-12-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159635">SUSE bug 1159635</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19906">CVE-2019-19906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531687" comment="cyrus-sasl-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531688" comment="cyrus-sasl-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531689" comment="cyrus-sasl-crammd5-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531690" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531691" comment="cyrus-sasl-digestmd5-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531692" comment="cyrus-sasl-gssapi-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531693" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531694" comment="cyrus-sasl-otp-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531695" comment="cyrus-sasl-otp-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531696" comment="cyrus-sasl-plain-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531697" comment="cyrus-sasl-plain-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531698" comment="libsasl2-3-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531699" comment="libsasl2-3-32bit-2.1.26-8.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152338" version="1" class="patch">
	<metadata>
		<title>Security update for gcc9 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1114592" ref_url="https://bugzilla.suse.com/1114592" source="BUGZILLA"/>
		<reference ref_id="1135254" ref_url="https://bugzilla.suse.com/1135254" source="BUGZILLA"/>
		<reference ref_id="1141897" ref_url="https://bugzilla.suse.com/1141897" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1142654" ref_url="https://bugzilla.suse.com/1142654" source="BUGZILLA"/>
		<reference ref_id="1148517" ref_url="https://bugzilla.suse.com/1148517" source="BUGZILLA"/>
		<reference ref_id="1149145" ref_url="https://bugzilla.suse.com/1149145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-15847" ref_url="https://www.suse.com/security/cve/CVE-2019-15847/" source="CVE"/>
		<description>
This update for gcc9 fixes the following issues:

The GNU Compiler Collection is shipped in version 9.

A detailed changelog on what changed in GCC 9 is available at https://gcc.gnu.org/gcc-9/changes.html

The compilers have been added to the SUSE Linux Enterprise Toolchain Module.

To use these compilers, install e.g. gcc9, gcc9-c++ and build with CC=gcc-9
CXX=g++-9 set.


For SUSE Linux Enterprise base products, the libstdc++6, libgcc_s1 and
other compiler libraries have been switched from their gcc8 variants to
their gcc9 variants.

Security issues fixed:

- CVE-2019-15847: Fixed a miscompilation in the POWER9 back end, that optimized multiple calls of the __builtin_darn intrinsic into a single call. (bsc#1149145)
- CVE-2019-14250: Fixed a heap overflow in the LTO linker. (bsc#1142649)

Non-security issues fixed:

- Split out libstdc++ pretty-printers into a separate package supplementing gdb and the installed runtime. (bsc#1135254)
- Fixed miscompilation for vector shift on s390. (bsc#1141897)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-14"/>
	<updated date="2020-04-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114592">SUSE bug 1114592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135254">SUSE bug 1135254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141897">SUSE bug 1141897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142654">SUSE bug 1142654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148517">SUSE bug 1148517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149145">SUSE bug 1149145</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14250">CVE-2019-14250 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15847/">CVE-2019-15847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15847">CVE-2019-15847 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531700" comment="libasan5-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531701" comment="libasan5-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531702" comment="libatomic1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531703" comment="libatomic1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531704" comment="libgcc_s1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531705" comment="libgcc_s1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531706" comment="libgfortran5-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531707" comment="libgfortran5-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531708" comment="libgo14-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531709" comment="libgo14-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531710" comment="libgomp1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531711" comment="libgomp1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531712" comment="libitm1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531713" comment="libitm1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531714" comment="liblsan0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531715" comment="libquadmath0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531716" comment="libquadmath0-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531717" comment="libstdc++6-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531718" comment="libstdc++6-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531719" comment="libstdc++6-locale-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531720" comment="libtsan0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531721" comment="libubsan1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531722" comment="libubsan1-32bit-9.2.1+r275327-1.3.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152339" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1176782" ref_url="https://bugzilla.suse.com/1176782" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1179496" ref_url="https://bugzilla.suse.com/1179496" source="BUGZILLA"/>
		<reference ref_id="1179498" ref_url="https://bugzilla.suse.com/1179498" source="BUGZILLA"/>
		<reference ref_id="1179501" ref_url="https://bugzilla.suse.com/1179501" source="BUGZILLA"/>
		<reference ref_id="1179502" ref_url="https://bugzilla.suse.com/1179502" source="BUGZILLA"/>
		<reference ref_id="1179506" ref_url="https://bugzilla.suse.com/1179506" source="BUGZILLA"/>
		<reference ref_id="1179514" ref_url="https://bugzilla.suse.com/1179514" source="BUGZILLA"/>
		<reference ref_id="1179516" ref_url="https://bugzilla.suse.com/1179516" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480/" source="CVE"/>
		<reference ref_id="CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481/" source="CVE"/>
		<reference ref_id="CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483/" source="CVE"/>
		<reference ref_id="CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484/" source="CVE"/>
		<reference ref_id="CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566/" source="CVE"/>
		<reference ref_id="CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570/" source="CVE"/>
		<reference ref_id="CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-29480: Fixed an issue which could have allowed leak of non-sensitive data to administrator guests (bsc#117949 XSA-115).
- CVE-2020-29481: Fixed an issue which could have allowd to new domains to inherit existing node permissions (bsc#1179498 XSA-322). 
- CVE-2020-29483: Fixed an issue where guests could disturb domain cleanup (bsc#1179502 XSA-325).
- CVE-2020-29484: Fixed an issue where guests could crash xenstored via watchs (bsc#1179501 XSA-324). 
- CVE-2020-29566: Fixed an undue recursion in x86 HVM context switch code (bsc#1179506 XSA-348).
- CVE-2020-29570: Fixed an issue where FIFO event channels control block related ordering (bsc#1179514 XSA-358).
- CVE-2020-29571: Fixed an issue where FIFO event channels control structure ordering (bsc#1179516 XSA-359).
- CVE-2020-29130: Fixed an out-of-bounds access while processing ARP packets (bsc#1179477). 
- Fixed an issue where dump-core shows missing nr_pages during core (bsc#1176782).
- Multiple other bugs (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-29"/>
	<updated date="2020-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176782">SUSE bug 1176782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179496">SUSE bug 1179496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179498">SUSE bug 1179498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179501">SUSE bug 1179501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179502">SUSE bug 1179502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179506">SUSE bug 1179506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179514">SUSE bug 1179514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179516">SUSE bug 1179516</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29480">CVE-2020-29480 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29481">CVE-2020-29481 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29483">CVE-2020-29483 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29484">CVE-2020-29484 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29566">CVE-2020-29566 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29570">CVE-2020-29570 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29571">CVE-2020-29571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538805" comment="xen-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538806" comment="xen-doc-html-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538807" comment="xen-libs-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538808" comment="xen-libs-32bit-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538809" comment="xen-tools-4.9.4_16-3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538810" comment="xen-tools-domU-4.9.4_16-3.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152340" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1162202" ref_url="https://bugzilla.suse.com/1162202" source="BUGZILLA"/>
		<reference ref_id="1162675" ref_url="https://bugzilla.suse.com/1162675" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634/" source="CVE"/>
		<description>
This update for sudo fixes the following issues:

Security issue fixed:

- CVE-2019-18634: Fixed a buffer overflow in the passphrase prompt that could occur when pwfeedback was enabled in /etc/sudoers (bsc#1162202).

Non-security issue fixed:

- Fixed an issue where sudo -l would ask for a password even though `listpw` was set to `never` (bsc#1162675).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-19"/>
	<updated date="2020-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162202">SUSE bug 1162202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162675">SUSE bug 1162675</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18634">CVE-2019-18634 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522640" comment="sudo-1.8.20p2-3.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152341" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159861" ref_url="https://bugzilla.suse.com/1159861" source="BUGZILLA"/>
		<reference ref_id="1160369" ref_url="https://bugzilla.suse.com/1160369" source="BUGZILLA"/>
		<reference ref_id="1161194" ref_url="https://bugzilla.suse.com/1161194" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19948" ref_url="https://www.suse.com/security/cve/CVE-2019-19948/" source="CVE"/>
		<reference ref_id="CVE-2019-19949" ref_url="https://www.suse.com/security/cve/CVE-2019-19949/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issue fixed:

- CVE-2019-19948: Fixed a heap-based buffer overflow in WriteSGIImage() (bsc#1159861).
- CVE-2019-19949: Fixed a heap-based buffer over-read in WritePNGImage() (bsc#1160369).

Non-security issue fixed:

- Fixed an issue where converting tiff to png would lead to unviewable files (bsc#1161194).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-19"/>
	<updated date="2020-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159861">SUSE bug 1159861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160369">SUSE bug 1160369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161194">SUSE bug 1161194</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19948/">CVE-2019-19948 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19948">CVE-2019-19948 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19949/">CVE-2019-19949 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19949">CVE-2019-19949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522642" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522643" comment="ImageMagick-config-6-upstream-6.8.8.1-71.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522645" comment="libMagickCore-6_Q16-1-6.8.8.1-71.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522647" comment="libMagickWand-6_Q16-1-6.8.8.1-71.141.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152342" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1138743" ref_url="https://bugzilla.suse.com/1138743" source="BUGZILLA"/>
		<reference ref_id="1154849" ref_url="https://bugzilla.suse.com/1154849" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14834" ref_url="https://www.suse.com/security/cve/CVE-2019-14834/" source="CVE"/>
		<description>
This update for dnsmasq fixes the following issues:

Security issue fixed:

- CVE-2019-14834: Fixed a memory leak which could have allowed to remote attackers 
  to cause denial of service via DHCP response creation (bsc#1154849)

Other issue addressed:  

- Removed cache size limit (bsc#1138743).

		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-19"/>
	<updated date="2020-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1138743">SUSE bug 1138743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154849">SUSE bug 1154849</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14834/">CVE-2019-14834 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14834">CVE-2019-14834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522648" comment="dnsmasq-2.78-18.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152343" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Java was updated to 7.1 Service Refresh 4 Fix Pack 60 [bsc#1162972, bsc#1160968].

Security issues fixed:

- CVE-2020-2583: Fixed a serialization vulnerability in BeanContextSupport (bsc#1162972).
- CVE-2020-2593: Fixed an incorrect check in isBuiltinStreamHandler, causing URL normalization issues (bsc#1162972).
- CVE-2020-2604: Fixed a serialization issue in jdk.serialFilter (bsc#1162972).
- CVE-2020-2659: Fixed the incomplete enforcement of the maxDatagramSockets limit in DatagramChannelImpl (bsc#1162972).

Non-security issues fixed:

* Class Libraries:
  IJ22333 HANG IN JAVA_JAVA_NET_SOCKETINPUTSTREAM_SOCKETREAD0 EVEN
          WHEN TIMEOUT IS SET
  IJ22350 JAVA 7 AND JAVA 8 NOT WORKING WELL WITH TRADITIONAL/SIMPLIFIED
          CHINESE EDITION OF WINDOWS CLIENT SYSTEM
  IJ22337 THE NAME OF THE REPUBLIC OF BELARUS IN THE RUSSIAN LOCALE
          INCONSISTENT WITH CLDR
  IJ22349 UPDATE TIMEZONE INFORMATION TO TZDATA2019C
* JIT Compiler:
  IJ11368 JAVA JIT PPC: CRASH IN JIT COMPILED CODE ON PPC MACHINES
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-07"/>
	<updated date="2020-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531724" comment="java-1_7_1-ibm-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531725" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531726" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531727" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531728" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-38.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152344" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20030">CVE-2018-20030 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9278">CVE-2019-9278 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522649" comment="libexif12-0.6.21-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522650" comment="libexif12-32bit-0.6.21-8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152345" version="1" class="patch">
	<metadata>
		<title>Security update for libvpx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1160613" ref_url="https://bugzilla.suse.com/1160613" source="BUGZILLA"/>
		<reference ref_id="1160614" ref_url="https://bugzilla.suse.com/1160614" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9232" ref_url="https://www.suse.com/security/cve/CVE-2019-9232/" source="CVE"/>
		<reference ref_id="CVE-2019-9433" ref_url="https://www.suse.com/security/cve/CVE-2019-9433/" source="CVE"/>
		<description>
This update for libvpx fixes the following issues:

- CVE-2019-9232: Fixed an out of bound memory access (bsc#1160613).
- CVE-2019-9433: Fixdd a use-after-free in vp8_deblock() (bsc#1160614).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1160613">SUSE bug 1160613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160614">SUSE bug 1160614</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9232/">CVE-2019-9232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9232">CVE-2019-9232 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9433/">CVE-2019-9433 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9433">CVE-2019-9433 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557634" comment="libvpx1-1.3.0-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152346" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1158809" ref_url="https://bugzilla.suse.com/1158809" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

Security issue fixed:

- CVE-2019-1551: Fixed an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli (bsc#1158809).

Non-security issue fixed:

- Fixed a crash in BN_copy (bsc#1160163).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158809">SUSE bug 1158809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1551">CVE-2019-1551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531729" comment="libopenssl-devel-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531730" comment="libopenssl1_0_0-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531731" comment="libopenssl1_0_0-32bit-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531732" comment="libopenssl1_0_0-hmac-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531733" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531734" comment="openssl-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531735" comment="openssl-doc-1.0.2j-60.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152347" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1162610" ref_url="https://bugzilla.suse.com/1162610" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<description>
This update for ppp fixes the following security issue:

- CVE-2020-8597: Fixed a buffer overflow in the eap_request and eap_response functions (bsc#1162610).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-26"/>
	<updated date="2020-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162610">SUSE bug 1162610</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8597">CVE-2020-8597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522651" comment="ppp-2.4.7-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152348" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1153072" ref_url="https://bugzilla.suse.com/1153072" source="BUGZILLA"/>
		<reference ref_id="1163927" ref_url="https://bugzilla.suse.com/1163927" source="BUGZILLA"/>
		<reference ref_id="1163959" ref_url="https://bugzilla.suse.com/1163959" source="BUGZILLA"/>
		<reference ref_id="1163969" ref_url="https://bugzilla.suse.com/1163969" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14553" ref_url="https://www.suse.com/security/cve/CVE-2019-14553/" source="CVE"/>
		<reference ref_id="CVE-2019-14559" ref_url="https://www.suse.com/security/cve/CVE-2019-14559/" source="CVE"/>
		<reference ref_id="CVE-2019-14563" ref_url="https://www.suse.com/security/cve/CVE-2019-14563/" source="CVE"/>
		<reference ref_id="CVE-2019-14575" ref_url="https://www.suse.com/security/cve/CVE-2019-14575/" source="CVE"/>
		<description>
This update for ovmf fixes the following issues:

Security issues fixed:

- CVE-2019-14563: Fixed a memory corruption caused by insufficient numeric truncation (bsc#1163959).
- CVE-2019-14553: Fixed the TLS certification verification in HTTPS-over-IPv6 boot sequences (bsc#1153072).
- CVE-2019-14559: Fixed a remotely exploitable memory leak in the ARP handling code (bsc#1163927).
- CVE-2019-14575: Fixed an insufficient signature check in the DxeImageVerificationHandler (bsc#1163969).
- Enabled HTTPS-over-IPv6 (bsc#1153072).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-26"/>
	<updated date="2020-02-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153072">SUSE bug 1153072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163927">SUSE bug 1163927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163959">SUSE bug 1163959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163969">SUSE bug 1163969</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14553/">CVE-2019-14553 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14553">CVE-2019-14553 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14559/">CVE-2019-14559 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14559">CVE-2019-14559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-14563/">CVE-2019-14563 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14563">CVE-2019-14563 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14575/">CVE-2019-14575 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14575">CVE-2019-14575 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557635" comment="ovmf-2017+git1492060560.b6d11d7c46-4.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557636" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557637" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.29.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152349" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="1159208" ref_url="https://bugzilla.suse.com/1159208" source="BUGZILLA"/>
		<reference ref_id="1159623" ref_url="https://bugzilla.suse.com/1159623" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-4472" ref_url="https://www.suse.com/security/cve/CVE-2016-4472/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

Update to 3.4.10 (jsc#SLE-9427, bsc#1159208) from 3.4.6:

Security issues fixed:

- Update expat copy from 2.1.1 to 2.2.0 to fix the following issues:
  CVE-2012-0876, CVE-2016-0718, CVE-2016-4472, CVE-2017-9233, CVE-2016-9063
- CVE-2017-1000158: Fix an integer overflow in thePyString_DecodeEscape function in stringobject.c, resulting in heap-based bufferoverflow (bsc#1068664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-20"/>
	<updated date="2020-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159208">SUSE bug 1159208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159623">SUSE bug 1159623</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0876">CVE-2012-0876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0718">CVE-2016-0718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4472/">CVE-2016-4472 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4472">CVE-2016-4472 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000158">CVE-2017-1000158 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9233">CVE-2017-9233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152350" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154162" ref_url="https://bugzilla.suse.com/1154162" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<description>
This update for mariadb fixes the following issues:

Security issue fixed:

- CVE-2019-2974: Fixed Server Optimizer (bsc#1154162).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2974">CVE-2019-2974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531737" comment="libmysqlclient18-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531738" comment="libmysqlclient18-32bit-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531739" comment="mariadb-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531740" comment="mariadb-client-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531741" comment="mariadb-errormessages-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531742" comment="mariadb-tools-10.0.40.2-29.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152351" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to 7.1 Service Refresh 4 Fix Pack 55 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2962 CVE-2019-2964
    CVE-2019-2978 CVE-2019-2983 CVE-2019-2989 CVE-2019-2992
    CVE-2019-2999 CVE-2019-2973 CVE-2019-2981
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2933">CVE-2019-2933 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531743" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531746" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152352" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1077717" ref_url="https://bugzilla.suse.com/1077717" source="BUGZILLA"/>
		<reference ref_id="1160895" ref_url="https://bugzilla.suse.com/1160895" source="BUGZILLA"/>
		<reference ref_id="1160912" ref_url="https://bugzilla.suse.com/1160912" source="BUGZILLA"/>
		<reference ref_id="1162388" ref_url="https://bugzilla.suse.com/1162388" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18901" ref_url="https://www.suse.com/security/cve/CVE-2019-18901/" source="CVE"/>
		<reference ref_id="CVE-2020-2574" ref_url="https://www.suse.com/security/cve/CVE-2020-2574/" source="CVE"/>
		<description>
This update for mariadb fixes the following issues:

MariaDB was updated to version 10.0.40-3 (bsc#1162388).

Security issues fixed:

- CVE-2020-2574: Fixed a difficult to exploit vulnerability that allowed an attacker to crash the client (bsc#1162388).
- CVE-2019-18901: Fixed an unsafe path handling behavior in mysql-systemd-helper (bsc#1160895).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-28"/>
	<updated date="2020-02-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077717">SUSE bug 1077717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160895">SUSE bug 1160895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160912">SUSE bug 1160912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162388">SUSE bug 1162388</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18901/">CVE-2019-18901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18901">CVE-2019-18901 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2574/">CVE-2020-2574 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2574">CVE-2020-2574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557638" comment="libmysqlclient18-10.0.40.3-29.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557639" comment="libmysqlclient18-32bit-10.0.40.3-29.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557640" comment="mariadb-10.0.40.3-29.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557641" comment="mariadb-client-10.0.40.3-29.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557642" comment="mariadb-errormessages-10.0.40.3-29.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557643" comment="mariadb-tools-10.0.40.3-29.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152353" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-4732" ref_url="https://www.suse.com/security/cve/CVE-2019-4732/" source="CVE"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Java 8.0 was updated to Service Refresh 6 Fix Pack 5 (bsc#1162972, bsc#1160968)

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2019-4732: Untrusted DLL search path vulnerability 
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-4732/">CVE-2019-4732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-4732">CVE-2019-4732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531748" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531750" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152354" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159646" ref_url="https://bugzilla.suse.com/1159646" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571/" source="CVE"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2019-17571: Fixed a remote code execution by deserialization of untrusted data in SocketServer (bsc#1159646).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159646">SUSE bug 1159646</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17571">CVE-2019-17571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531752" comment="log4j-1.2.15-126.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152355" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1123886" ref_url="https://bugzilla.suse.com/1123886" source="BUGZILLA"/>
		<reference ref_id="1160594" ref_url="https://bugzilla.suse.com/1160594" source="BUGZILLA"/>
		<reference ref_id="1160764" ref_url="https://bugzilla.suse.com/1160764" source="BUGZILLA"/>
		<reference ref_id="1161779" ref_url="https://bugzilla.suse.com/1161779" source="BUGZILLA"/>
		<reference ref_id="1163922" ref_url="https://bugzilla.suse.com/1163922" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8013" ref_url="https://www.suse.com/security/cve/CVE-2020-8013/" source="CVE"/>
		<description>
This update for permissions fixes the following issues:

Security issues fixed:

- CVE-2020-8013: Fixed an issue where chkstat set unintended setuid/capabilities for mrsh and wodim (bsc#1163922).

Non-security issues fixed:

- Fixed a regression where chkstat broke when /proc was not available (bsc#1160764, bsc#1160594).
- Fixed capability handling when doing multiple permission changes at once (bsc#1161779).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-28"/>
	<updated date="2020-02-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123886">SUSE bug 1123886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160594">SUSE bug 1160594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160764">SUSE bug 1160764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161779">SUSE bug 1161779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163922">SUSE bug 1163922</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8013/">CVE-2020-8013 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8013">CVE-2020-8013 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531753" comment="permissions-2015.09.28.1626-17.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152356" version="1" class="patch">
	<metadata>
		<title>Security update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="1122668" ref_url="https://bugzilla.suse.com/1122668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<description>
This update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer, python-jsonpatch, python-jsonpointer, python-scandir, python-PyYAML fixes the following issues:

python-cfn-lint was included as a new package in 0.21.4.


python-aws-sam-translator was updated to 1.11.0:

  * Add ReservedConcurrentExecutions to globals
  * Fix ElasticsearchHttpPostPolicy resource reference
  * Support using AWS::Region in Ref and Sub
  * Documentation and examples updates
  * Add VersionDescription property to Serverless::Function
  * Update ServerlessRepoReadWriteAccessPolicy
  * Add additional template validation

Upgrade to 1.10.0:

  * Add GSIs to DynamoDBReadPolicy and DynamoDBCrudPolicy
  * Add DynamoDBReconfigurePolicy
  * Add CostExplorerReadOnlyPolicy and OrganizationsListAccountsPolicy
  * Add EKSDescribePolicy
  * Add SESBulkTemplatedCrudPolicy
  * Add FilterLogEventsPolicy
  * Add SSMParameterReadPolicy
  * Add SESEmailTemplateCrudPolicy
  * Add s3:PutObjectAcl to S3CrudPolicy
  * Add allow_credentials CORS option
  * Add support for AccessLogSetting and CanarySetting Serverless::Api properties
  * Add support for X-Ray in Serverless::Api
  * Add support for MinimumCompressionSize in Serverless::Api
  * Add Auth to Serverless::Api globals
  * Remove trailing slashes from APIGW permissions
  * Add SNS FilterPolicy and an example application
  * Add Enabled property to Serverless::Function event sources
  * Add support for PermissionsBoundary in Serverless::Function
  * Fix boto3 client initialization
  * Add PublicAccessBlockConfiguration property to S3 bucket resource
  * Make PAY_PER_REQUEST default mode for Serverless::SimpleTable
  * Add limited support for resolving intrinsics in Serverless::LayerVersion
  * SAM now uses Flake8
  * Add example application for S3 Events written in Go
  * Updated several example applications

- Initial build
  + Version 1.9.0
- Add patch to drop compatible releases operator from setup.py,
  required for SLES12 as the setuptools version is too old
  + ast_drop-compatible-releases-operator.patch


python-jsonschema was updated to 2.6.0:

* Improved performance on CPython by adding caching around ref resolution

Update to version 2.5.0:

* Improved performance on CPython by adding caching around ref
  resolution (#203)

Update to version 2.4.0:

* Added a CLI (#134)
* Added absolute path and absolute schema path to errors (#120)
* Added ``relevance``
* Meta-schemas are now loaded via ``pkgutil``
* Added ``by_relevance`` and ``best_match`` (#91)
* Fixed ``format`` to allow adding formats for non-strings (#125)
* Fixed the ``uri`` format to reject URI references (#131)

- Install /usr/bin/jsonschema with update-alternatives support

python-nose2 was updated to 0.9.1:

* the prof plugin now uses cProfile instead of hotshot for profiling
* skipped tests now include the user's reason in junit XML's message field
* the prettyassert plugin mishandled multi-line function definitions
* Using a plugin's CLI flag when the plugin is already enabled via config
  no longer errors
* nose2.plugins.prettyassert, enabled with --pretty-assert
* Cleanup code for EOLed python versions
* Dropped support for distutils.
* Result reporter respects failure status set by other plugins
* JUnit XML plugin now includes the skip reason in its output

Upgrade to 0.8.0:

List of changes is too long to show here, see
https://github.com/nose-devs/nose2/blob/master/docs/changelog.rst
changes between 0.6.5 and 0.8.0

Update to 0.7.0:

* Added parameterized_class feature, for parameterizing entire test
  classes (many thanks to @TobyLL for their suggestions and help testing!)
* Fix DeprecationWarning on `inspect.getargs` (thanks @brettdh;
  https://github.com/wolever/parameterized/issues/67)
* Make sure that `setUp` and `tearDown` methods work correctly (#40)
* Raise a ValueError when input is empty (thanks @danielbradburn;
  https://github.com/wolever/parameterized/pull/48)
* Fix the order when number of cases exceeds 10 (thanks @ntflc;
  https://github.com/wolever/parameterized/pull/49)

python-scandir was included in version 2.3.2.

python-requests was updated to version 2.20.1 (bsc#1111622)

* Fixed bug with unintended Authorization header stripping for
  redirects using default ports (http/80, https/443).


* remove restriction for urllib3 &lt; 1.24

Update to version 2.20.0:

* Bugfixes
  + Content-Type header parsing is now case-insensitive
    (e.g. charset=utf8 v Charset=utf8).
  + Fixed exception leak where certain redirect urls would raise
    uncaught urllib3 exceptions.
  + Requests removes Authorization header from requests redirected
    from https to http on the same hostname. (CVE-2018-18074)
  + should_bypass_proxies now handles URIs without hostnames
    (e.g. files).
* Dependencies
  + Requests now supports urllib3 v1.24.
* Deprecations
  + Requests has officially stopped support for Python 2.6.

Update to version 2.19.1:

* Fixed issue where status_codes.py’s init function failed trying
  to append to a __doc__ value of None.

Update to version 2.19.0:

* Improvements
  + Warn about possible slowdown with cryptography version &lt; 1.3.4
  + Check host in proxy URL, before forwarding request to adapter.
  + Maintain fragments properly across redirects. (RFC7231 7.1.2)
  + Removed use of cgi module to expedite library load time.
  + Added support for SHA-256 and SHA-512 digest auth algorithms.
  + Minor performance improvement to Request.content.
  + Migrate to using collections.abc for 3.7 compatibility.
* Bugfixes
  + Parsing empty Link headers with parse_header_links() no longer
    return one bogus entry.
  + Fixed issue where loading the default certificate bundle from
    a zip archive would raise an IOError.
  + Fixed issue with unexpected ImportError on windows system
    which do not support winreg module.
  + DNS resolution in proxy bypass no longer includes the username
    and password in the request. This also fixes the issue of DNS
    queries failing on macOS.
  + Properly normalize adapter prefixes for url comparison.
  + Passing None as a file pointer to the files param no longer
    raises an exception.
  + Calling copy on a RequestsCookieJar will now preserve the
    cookie policy correctly.
* We now support idna v2.7 and urllib3 v1.23.

update to version 2.18.4:

* Improvements
  + Error messages for invalid headers now include the header name
    for easier debugging
* Dependencies
  + We now support idna v2.6.

update to version 2.18.3:

* Improvements
  + Running $ python -m requests.help now includes the installed
    version of idna.
* Bugfixes
  + Fixed issue where Requests would raise ConnectionError instead
    of SSLError when encountering SSL problems when using urllib3
    v1.22.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-02"/>
	<updated date="2020-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122668">SUSE bug 1122668</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009524562" comment="python-PyYAML-5.1.2-26.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522744" comment="python-asn1crypto-0.24.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522745" comment="python-packaging-17.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530078" comment="python3-PyYAML-5.1.2-26.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522747" comment="python3-asn1crypto-0.24.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522748" comment="python3-packaging-17.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152357" version="1" class="patch">
	<metadata>
		<title>Security update for libpng16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1124211" ref_url="https://bugzilla.suse.com/1124211" source="BUGZILLA"/>
		<reference ref_id="1141493" ref_url="https://bugzilla.suse.com/1141493" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<description>
This update for libpng16 fixes the following issues:

Security issues fixed:

- CVE-2019-7317: Fixed a use-after-free vulnerability, triggered when
  png_image_free() was called under png_safe_execute (bsc#1124211).
- CVE-2017-12652: Fixed an Input Validation Error related to the length of chunks (bsc#1141493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-03"/>
	<updated date="2020-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124211">SUSE bug 1124211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141493">SUSE bug 1141493</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12652">CVE-2017-12652 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522656" comment="libpng16-16-1.6.8-15.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522657" comment="libpng16-16-32bit-1.6.8-15.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152358" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<description>
This update for postgresql96 fixes the following issues:

PostgreSQL was updated to version 9.6.17.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-04"/>
	<updated date="2020-03-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1720">CVE-2020-1720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531754" comment="postgresql96-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531755" comment="postgresql96-contrib-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531756" comment="postgresql96-docs-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531757" comment="postgresql96-plperl-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531758" comment="postgresql96-plpython-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531759" comment="postgresql96-pltcl-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531760" comment="postgresql96-server-9.6.17-3.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152359" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1162501" ref_url="https://bugzilla.suse.com/1162501" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20446" ref_url="https://www.suse.com/security/cve/CVE-2019-20446/" source="CVE"/>
		<description>
This update for librsvg to version 2.40.21 fixes the following issues:

librsvg was updated to version 2.40.21 fixing the following issues:	  

- CVE-2019-20446: Fixed an issue where a crafted SVG file with nested
  patterns can cause denial of service (bsc#1162501).
  NOTE: Librsvg now has limits on the number of loaded XML elements,
  and the number of referenced elements within an SVG document. 
- Fixed a stack exhaustion with circular references in &lt;use&gt;
  elements.
- Fixed a denial-of-service condition from exponential explosion
  of rendered elements, through nested use of SVG 'use' elements in
  malicious SVGs.  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-06"/>
	<updated date="2020-03-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1162501">SUSE bug 1162501</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20446/">CVE-2019-20446 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20446">CVE-2019-20446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557644" comment="gdk-pixbuf-loader-rsvg-2.40.21-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557645" comment="librsvg-2-2-2.40.21-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557646" comment="librsvg-2-2-32bit-2.40.21-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557647" comment="rsvg-view-2.40.21-5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152360" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1050241" ref_url="https://bugzilla.suse.com/1050241" source="BUGZILLA"/>
		<reference ref_id="1140120" ref_url="https://bugzilla.suse.com/1140120" source="BUGZILLA"/>
		<reference ref_id="1165471" ref_url="https://bugzilla.suse.com/1165471" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7890" ref_url="https://www.suse.com/security/cve/CVE-2017-7890/" source="CVE"/>
		<reference ref_id="CVE-2018-14553" ref_url="https://www.suse.com/security/cve/CVE-2018-14553/" source="CVE"/>
		<reference ref_id="CVE-2019-11038" ref_url="https://www.suse.com/security/cve/CVE-2019-11038/" source="CVE"/>
		<description>
This update for gd fixes the following issues:

- CVE-2017-7890: Fixed a buffer over-read into uninitialized memory (bsc#1050241).
- CVE-2018-14553: Fixed a null pointer dereference in gdImageClone() (bsc#1165471).
- CVE-2019-11038: Fixed a information disclosure in gdImageCreateFromXbm() (bsc#1140120).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-09"/>
	<updated date="2020-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050241">SUSE bug 1050241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140120">SUSE bug 1140120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165471">SUSE bug 1165471</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7890/">CVE-2017-7890 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7890">CVE-2017-7890 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14553/">CVE-2018-14553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14553">CVE-2018-14553 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11038/">CVE-2019-11038 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11038">CVE-2019-11038 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522663" comment="gd-2.1.0-24.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152361" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Update java-1_7_0-openjdk to version jdk7u251 (January 2020 CPU, bsc#1160968):

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2020-2590: Improve Kerberos interop capabilities
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2601: Better Ticket Granting Services
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support
- CVE-2020-2654: Improve Object Identifier Processing	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-10"/>
	<updated date="2020-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2590">CVE-2020-2590 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2601">CVE-2020-2601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522665" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531761" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531762" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522666" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152362" version="1" class="patch">
	<metadata>
		<title>Security update for ipmitool (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1085469" ref_url="https://bugzilla.suse.com/1085469" source="BUGZILLA"/>
		<reference ref_id="1163026" ref_url="https://bugzilla.suse.com/1163026" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-5208" ref_url="https://www.suse.com/security/cve/CVE-2020-5208/" source="CVE"/>
		<description>
This update for ipmitool fixes the following issues:

- CVE-2020-5208: Fixed multiple remote code executtion vulnerabilities (bsc#1163026).	  
- picmg discover messages are now DEBUG and not INFO messages (bsc#1085469).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-10"/>
	<updated date="2020-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085469">SUSE bug 1085469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163026">SUSE bug 1163026</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5208/">CVE-2020-5208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5208">CVE-2020-5208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522667" comment="ipmitool-1.8.18-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152363" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1156323" ref_url="https://bugzilla.suse.com/1156323" source="BUGZILLA"/>
		<reference ref_id="1156324" ref_url="https://bugzilla.suse.com/1156324" source="BUGZILLA"/>
		<reference ref_id="1156326" ref_url="https://bugzilla.suse.com/1156326" source="BUGZILLA"/>
		<reference ref_id="1156328" ref_url="https://bugzilla.suse.com/1156328" source="BUGZILLA"/>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1162687" ref_url="https://bugzilla.suse.com/1162687" source="BUGZILLA"/>
		<reference ref_id="1162689" ref_url="https://bugzilla.suse.com/1162689" source="BUGZILLA"/>
		<reference ref_id="1162691" ref_url="https://bugzilla.suse.com/1162691" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526/" source="CVE"/>
		<reference ref_id="CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677/" source="CVE"/>
		<reference ref_id="CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678/" source="CVE"/>
		<reference ref_id="CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679/" source="CVE"/>
		<reference ref_id="CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449/" source="CVE"/>
		<reference ref_id="CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450/" source="CVE"/>
		<reference ref_id="CVE-2020-8517" ref_url="https://www.suse.com/security/cve/CVE-2020-8517/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2019-12528: Fixed an information disclosure flaw in the FTP gateway (bsc#1162689). 
- CVE-2019-12526: Fixed potential remote code execution during URN processing (bsc#1156326).
- CVE-2019-12523,CVE-2019-18676: Fixed multiple improper validations in URI processing (bsc#1156329).
- CVE-2019-18677: Fixed Cross-Site Request Forgery in HTTP Request processing (bsc#1156328).
- CVE-2019-18678: Fixed incorrect message parsing which could have led to HTTP request splitting issue (bsc#1156323).
- CVE-2019-18679: Fixed information disclosure when processing HTTP Digest Authentication (bsc#1156324).
- CVE-2020-8449: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
- CVE-2020-8450: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
- CVE-2020-8517: Fixed a buffer overflow in ext_lm_group_acl when processing NTLM Authentication credentials (bsc#1162691).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-12"/>
	<updated date="2020-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156323">SUSE bug 1156323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156324">SUSE bug 1156324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156326">SUSE bug 1156326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156328">SUSE bug 1156328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162689">SUSE bug 1162689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162691">SUSE bug 1162691</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12523">CVE-2019-12523 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12526">CVE-2019-12526 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12528">CVE-2019-12528 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18676">CVE-2019-18676 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18677">CVE-2019-18677 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18678">CVE-2019-18678 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18679">CVE-2019-18679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8449">CVE-2020-8449 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8450">CVE-2020-8450 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8517/">CVE-2020-8517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8517">CVE-2020-8517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531763" comment="squid-3.5.21-26.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152364" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1160305" ref_url="https://bugzilla.suse.com/1160305" source="BUGZILLA"/>
		<reference ref_id="1160498" ref_url="https://bugzilla.suse.com/1160498" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-03 (bsc#1160498)
  * CVE-2019-17026 (bmo#1607443)
    IonMonkey type confusion with StoreElementHole and
    FallibleStoreElement 

- Firefox Extended Support Release 68.4.0 ESR
  * Fixed: Various security fixes
  MFSA 2020-02 (bsc#1160305)
  * CVE-2019-17015 (bmo#1599005)
    Memory corruption in parent process during new content
    process initialization on Windows
  * CVE-2019-17016 (bmo#1599181)
    Bypass of @namespace CSS sanitization during pasting
  * CVE-2019-17017 (bmo#1603055)
    Type Confusion in XPCVariant.cpp
  * CVE-2019-17021 (bmo#1599008)
    Heap address disclosure in parent process during content
    process initialization on Windows
  * CVE-2019-17022 (bmo#1602843)
    CSS sanitization does not escape HTML tags
  * CVE-2019-17024 (bmo#1507180, bmo#1595470, bmo#1598605,
    bmo#1601826)
    Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-10"/>
	<updated date="2020-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160498">SUSE bug 1160498</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17015">CVE-2019-17015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17016">CVE-2019-17016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17017">CVE-2019-17017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17021">CVE-2019-17021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17022">CVE-2019-17022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17024">CVE-2019-17024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17026">CVE-2019-17026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522668" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522669" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152365" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

PostgreSQL was updated to version 10.12.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1720">CVE-2020-1720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522670" comment="libecpg6-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522671" comment="libpq5-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522672" comment="libpq5-32bit-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522673" comment="postgresql10-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531765" comment="postgresql10-contrib-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531766" comment="postgresql10-docs-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531770" comment="postgresql10-server-10.12-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152366" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1132665" ref_url="https://bugzilla.suse.com/1132665" source="BUGZILLA"/>
		<reference ref_id="1166238" ref_url="https://bugzilla.suse.com/1166238" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to 68.6.0 ESR (MFSA 2020-09 bsc#1132665 bsc#1166238)
          
- CVE-2020-6805: Fixed a use-after-free when removing data about origins
- CVE-2020-6806: Fixed improper protections against state confusion
- CVE-2020-6807: Fixed a use-after-free in cubeb during stream destruction 
- CVE-2020-6811: Fixed an issue where copy as cURL' feature did not fully 
  escape website-controlled data potentially leading to command injection 
- CVE-2019-20503: Fixed out of bounds reads in sctp_load_addresses_from_init 
- CVE-2020-6812: Fixed an issue where the names of AirPods with personally 
  identifiable information were exposed to websites with camera or microphone 
  permission     
- CVE-2020-6814: Fixed multiple memory safety bugs
- Fixed an issue with minimizing a window (bsc#1132665).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-19"/>
	<updated date="2020-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132665">SUSE bug 1132665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20503">CVE-2019-20503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6805">CVE-2020-6805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6806">CVE-2020-6806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6807">CVE-2020-6807 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6811">CVE-2020-6811 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6812">CVE-2020-6812 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6814">CVE-2020-6814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531771" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531773" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152367" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1164692" ref_url="https://bugzilla.suse.com/1164692" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-1938: Fixed a file contents disclosure vulnerability (bsc#1164692).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-19"/>
	<updated date="2020-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1164692">SUSE bug 1164692</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531774" comment="tomcat-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531775" comment="tomcat-admin-webapps-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531776" comment="tomcat-docs-webapp-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531777" comment="tomcat-el-3_0-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531778" comment="tomcat-javadoc-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531779" comment="tomcat-jsp-2_3-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531780" comment="tomcat-lib-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531781" comment="tomcat-servlet-3_1-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531782" comment="tomcat-webapps-8.0.53-29.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152368" version="1" class="patch">
	<metadata>
		<title>Security update for python36 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027282" ref_url="https://bugzilla.suse.com/1027282" source="BUGZILLA"/>
		<reference ref_id="1029377" ref_url="https://bugzilla.suse.com/1029377" source="BUGZILLA"/>
		<reference ref_id="1029902" ref_url="https://bugzilla.suse.com/1029902" source="BUGZILLA"/>
		<reference ref_id="1040164" ref_url="https://bugzilla.suse.com/1040164" source="BUGZILLA"/>
		<reference ref_id="1042670" ref_url="https://bugzilla.suse.com/1042670" source="BUGZILLA"/>
		<reference ref_id="1049186" ref_url="https://bugzilla.suse.com/1049186" source="BUGZILLA"/>
		<reference ref_id="1050653" ref_url="https://bugzilla.suse.com/1050653" source="BUGZILLA"/>
		<reference ref_id="1070738" ref_url="https://bugzilla.suse.com/1070738" source="BUGZILLA"/>
		<reference ref_id="1070853" ref_url="https://bugzilla.suse.com/1070853" source="BUGZILLA"/>
		<reference ref_id="1077230" ref_url="https://bugzilla.suse.com/1077230" source="BUGZILLA"/>
		<reference ref_id="1079761" ref_url="https://bugzilla.suse.com/1079761" source="BUGZILLA"/>
		<reference ref_id="1081750" ref_url="https://bugzilla.suse.com/1081750" source="BUGZILLA"/>
		<reference ref_id="1083507" ref_url="https://bugzilla.suse.com/1083507" source="BUGZILLA"/>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="1088573" ref_url="https://bugzilla.suse.com/1088573" source="BUGZILLA"/>
		<reference ref_id="1094814" ref_url="https://bugzilla.suse.com/1094814" source="BUGZILLA"/>
		<reference ref_id="1107030" ref_url="https://bugzilla.suse.com/1107030" source="BUGZILLA"/>
		<reference ref_id="1109663" ref_url="https://bugzilla.suse.com/1109663" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="1120644" ref_url="https://bugzilla.suse.com/1120644" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130840" ref_url="https://bugzilla.suse.com/1130840" source="BUGZILLA"/>
		<reference ref_id="1133452" ref_url="https://bugzilla.suse.com/1133452" source="BUGZILLA"/>
		<reference ref_id="1137942" ref_url="https://bugzilla.suse.com/1137942" source="BUGZILLA"/>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="1149121" ref_url="https://bugzilla.suse.com/1149121" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="1151490" ref_url="https://bugzilla.suse.com/1151490" source="BUGZILLA"/>
		<reference ref_id="1153238" ref_url="https://bugzilla.suse.com/1153238" source="BUGZILLA"/>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1159035" ref_url="https://bugzilla.suse.com/1159035" source="BUGZILLA"/>
		<reference ref_id="1159622" ref_url="https://bugzilla.suse.com/1159622" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162423" ref_url="https://bugzilla.suse.com/1162423" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="637176" ref_url="https://bugzilla.suse.com/637176" source="BUGZILLA"/>
		<reference ref_id="658604" ref_url="https://bugzilla.suse.com/658604" source="BUGZILLA"/>
		<reference ref_id="673071" ref_url="https://bugzilla.suse.com/673071" source="BUGZILLA"/>
		<reference ref_id="709442" ref_url="https://bugzilla.suse.com/709442" source="BUGZILLA"/>
		<reference ref_id="743787" ref_url="https://bugzilla.suse.com/743787" source="BUGZILLA"/>
		<reference ref_id="747125" ref_url="https://bugzilla.suse.com/747125" source="BUGZILLA"/>
		<reference ref_id="751718" ref_url="https://bugzilla.suse.com/751718" source="BUGZILLA"/>
		<reference ref_id="754447" ref_url="https://bugzilla.suse.com/754447" source="BUGZILLA"/>
		<reference ref_id="754677" ref_url="https://bugzilla.suse.com/754677" source="BUGZILLA"/>
		<reference ref_id="787526" ref_url="https://bugzilla.suse.com/787526" source="BUGZILLA"/>
		<reference ref_id="809831" ref_url="https://bugzilla.suse.com/809831" source="BUGZILLA"/>
		<reference ref_id="831629" ref_url="https://bugzilla.suse.com/831629" source="BUGZILLA"/>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="867887" ref_url="https://bugzilla.suse.com/867887" source="BUGZILLA"/>
		<reference ref_id="871152" ref_url="https://bugzilla.suse.com/871152" source="BUGZILLA"/>
		<reference ref_id="885662" ref_url="https://bugzilla.suse.com/885662" source="BUGZILLA"/>
		<reference ref_id="885882" ref_url="https://bugzilla.suse.com/885882" source="BUGZILLA"/>
		<reference ref_id="917607" ref_url="https://bugzilla.suse.com/917607" source="BUGZILLA"/>
		<reference ref_id="935856" ref_url="https://bugzilla.suse.com/935856" source="BUGZILLA"/>
		<reference ref_id="942751" ref_url="https://bugzilla.suse.com/942751" source="BUGZILLA"/>
		<reference ref_id="951166" ref_url="https://bugzilla.suse.com/951166" source="BUGZILLA"/>
		<reference ref_id="983582" ref_url="https://bugzilla.suse.com/983582" source="BUGZILLA"/>
		<reference ref_id="984751" ref_url="https://bugzilla.suse.com/984751" source="BUGZILLA"/>
		<reference ref_id="985177" ref_url="https://bugzilla.suse.com/985177" source="BUGZILLA"/>
		<reference ref_id="985348" ref_url="https://bugzilla.suse.com/985348" source="BUGZILLA"/>
		<reference ref_id="989523" ref_url="https://bugzilla.suse.com/989523" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-2667" ref_url="https://www.suse.com/security/cve/CVE-2014-2667/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<description>
This update for python36 fixes the following issues:

Security issues fixed:

- CVE-2019-18348: Fixed a CRLF injection via the host part of the url passed to urlopen(). 
  Now an InvalidURL exception is raised (bsc#1155094).
- CVE-2019-9674: Improved the documentation to reflect the dangers of zip-bombs (bsc#1162825).
- CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367).

Non-security issue fixed:

- If the locale is 'C', coerce it to C.UTF-8 (bsc#1162423).
- Python was updated to 3.6.10 (jsc#SLE-9426, jsc#SLE-9427, bsc#1159035).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-24"/>
	<updated date="2020-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027282">SUSE bug 1027282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029377">SUSE bug 1029377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029902">SUSE bug 1029902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040164">SUSE bug 1040164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042670">SUSE bug 1042670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049186">SUSE bug 1049186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050653">SUSE bug 1050653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070738">SUSE bug 1070738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070853">SUSE bug 1070853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077230">SUSE bug 1077230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079761">SUSE bug 1079761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081750">SUSE bug 1081750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083507">SUSE bug 1083507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088573">SUSE bug 1088573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094814">SUSE bug 1094814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107030">SUSE bug 1107030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120644">SUSE bug 1120644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133452">SUSE bug 1133452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137942">SUSE bug 1137942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149121">SUSE bug 1149121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151490">SUSE bug 1151490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159035">SUSE bug 1159035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159622">SUSE bug 1159622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162423">SUSE bug 1162423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637176">SUSE bug 637176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/658604">SUSE bug 658604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/673071">SUSE bug 673071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/709442">SUSE bug 709442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743787">SUSE bug 743787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747125">SUSE bug 747125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751718">SUSE bug 751718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754447">SUSE bug 754447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754677">SUSE bug 754677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787526">SUSE bug 787526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809831">SUSE bug 809831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831629">SUSE bug 831629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867887">SUSE bug 867887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871152">SUSE bug 871152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885662">SUSE bug 885662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885882">SUSE bug 885882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917607">SUSE bug 917607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935856">SUSE bug 935856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942751">SUSE bug 942751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951166">SUSE bug 951166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983582">SUSE bug 983582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984751">SUSE bug 984751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985177">SUSE bug 985177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985348">SUSE bug 985348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989523">SUSE bug 989523</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4944">CVE-2011-4944 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0845">CVE-2012-0845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1150">CVE-2012-1150 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1752">CVE-2013-1752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4238">CVE-2013-4238 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-2667/">CVE-2014-2667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2667">CVE-2014-2667 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0772">CVE-2016-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000110">CVE-2016-1000110 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5636">CVE-2016-5636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5699">CVE-2016-5699 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18207">CVE-2017-18207 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000802">CVE-2018-1000802 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1060">CVE-2018-1060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1061">CVE-2018-1061 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20406">CVE-2018-20406 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16935">CVE-2019-16935 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636">CVE-2019-9636 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557648" comment="libpython3_6m1_0-3.6.8-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557649" comment="python36-3.6.8-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557650" comment="python36-base-3.6.8-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557651" comment="python36-curses-3.6.8-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557652" comment="python36-dbm-3.6.8-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557653" comment="python36-devel-3.6.8-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557654" comment="python36-doc-3.6.8-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557655" comment="python36-testsuite-3.6.8-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557656" comment="python36-tk-3.6.8-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557657" comment="python36-tools-3.6.8-6.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152369" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1158763" ref_url="https://bugzilla.suse.com/1158763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18900" ref_url="https://www.suse.com/security/cve/CVE-2019-18900/" source="CVE"/>
		<description>
This update for libzypp fixes the following issues:

Security issue fixed:

- CVE-2019-18900: Fixed assert cookie file that was world readable (bsc#1158763).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1158763">SUSE bug 1158763</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18900/">CVE-2019-18900 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18900">CVE-2019-18900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522674" comment="libzypp-16.21.2-2.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555874" comment="libzypp-devel-16.21.2-2.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152370" version="1" class="patch">
	<metadata>
		<title>Security update for python-cffi, python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1055478" ref_url="https://bugzilla.suse.com/1055478" source="BUGZILLA"/>
		<reference ref_id="1070737" ref_url="https://bugzilla.suse.com/1070737" source="BUGZILLA"/>
		<reference ref_id="1101820" ref_url="https://bugzilla.suse.com/1101820" source="BUGZILLA"/>
		<reference ref_id="1111657" ref_url="https://bugzilla.suse.com/1111657" source="BUGZILLA"/>
		<reference ref_id="1138748" ref_url="https://bugzilla.suse.com/1138748" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="981848" ref_url="https://bugzilla.suse.com/981848" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10903" ref_url="https://www.suse.com/security/cve/CVE-2018-10903/" source="CVE"/>
		<description>
This update for python-cffi, python-cryptography fixes the following issues:

Security issue fixed:

- CVE-2018-10903: Fixed GCM tag forgery via truncated tag in finalize_with_tag API (bsc#1101820).

Non-security issues fixed:

python-cffi was updated to 1.11.2 (bsc#1138748, jsc#ECO-1256, jsc#PM-1598):

- fixed a build failure on i586 (bsc#1111657)
- Salt was unable to highstate in snapshot 20171129 (bsc#1070737)

- Update pytest in spec to add c directory tests in addition to 
  testing directory.

- update to version 1.11.2:
  * Fix Windows issue with managing the thread-state on CPython 3.0 to
    3.5

- Update pytest in spec to add c directory tests in addition to 
  testing directory.
- Omit test_init_once_multithread tests as they rely on multiple
  threads finishing in a given time. Returns sporadic pass/fail
  within build.
- Update to 1.11.1:
  * Fix tests, remove deprecated C API usage
  * Fix (hack) for 3.6.0/3.6.1/3.6.2 giving incompatible binary
    extensions (cpython issue #29943)
  * Fix for 3.7.0a1+

- Update to 1.11.0:
  * Support the modern standard types char16_t and char32_t. These
    work like wchar_t: they represent one unicode character, or when
    used as charN_t * or charN_t[] they represent a unicode string.
    The difference with wchar_t is that they have a known, fixed
    size. They should work at all places that used to work with
    wchar_t (please report an issue if I missed something). Note
    that with set_source(), you need to make sure that these types
    are actually defined by the C source you provide (if used in
    cdef()).
  * Support the C99 types float _Complex and double _Complex. Note
    that libffi doesn't support them, which means that in the ABI
    mode you still cannot call C functions that take complex
    numbers directly as arguments or return type.
  * Fixed a rare race condition when creating multiple FFI instances
    from multiple threads. (Note that you aren't meant to create
    many FFI instances: in inline mode, you should write
    ffi = cffi.FFI() at module level just after import cffi; and in
    out-of-line mode you don't instantiate FFI explicitly at all.)
  * Windows: using callbacks can be messy because the CFFI internal
    error messages show up to stderr-but stderr goes nowhere in many
    applications. This makes it particularly hard to get started
    with the embedding mode. (Once you get started, you can at least
    use @ffi.def_extern(onerror=...) and send the error logs where
    it makes sense for your application, or record them in log
    files, and so on.) So what is new in CFFI is that now, on
    Windows CFFI will try to open a non-modal MessageBox (in addition
    to sending raw messages to stderr). The MessageBox is only
    visible if the process stays alive: typically, console
    applications that crash close immediately, but that is also the
    situation where stderr should be visible anyway.
  * Progress on support for callbacks in NetBSD.
  * Functions returning booleans would in some case still return 0
    or 1 instead of False or True. Fixed.
  * ffi.gc() now takes an optional third parameter, which gives an
    estimate of the size (in bytes) of the object. So far, this is
    only used by PyPy, to make the next GC occur more quickly
    (issue #320). In the future, this might have an effect on
    CPython too (provided the CPython issue 31105 is addressed).
  * Add a note to the documentation: the ABI mode gives function
    objects that are slower to call than the API mode does. For
    some reason it is often thought to be faster. It is not!
- Update to 1.10.1:
  * Fixed the line numbers reported in case of cdef() errors. Also,
    I just noticed, but pycparser always supported the preprocessor
    directive # 42 'foo.h' to mean 'from the next line, we're in
    file foo.h starting from line 42';, which it puts in the error
    messages. 

- update to 1.10.0:
 * Issue #295: use calloc() directly instead of PyObject_Malloc()+memset()
   to handle ffi.new() with a default allocator. Speeds up ffi.new(large-array)
   where most of the time you never touch most of the array.
  * Some OS/X build fixes ('only with Xcode but without CLT';).
  * Improve a couple of error messages: when getting mismatched versions of
    cffi and its backend; and when calling functions which cannot be called with
    libffi because an argument is a struct that is 'too complicated'; (and not
    a struct pointer, which always works).
  * Add support for some unusual compilers (non-msvc, non-gcc, non-icc, non-clang)
  * Implemented the remaining cases for ffi.from_buffer. Now all
    buffer/memoryview objects can be passed. The one remaining check is against
    passing unicode strings in Python 2. (They support the buffer interface, but
    that gives the raw bytes behind the UTF16/UCS4 storage, which is most of the
    times not what you expect. In Python 3 this has been fixed and the unicode
    strings don't support the memoryview interface any more.)
  * The C type _Bool or bool now converts to a Python boolean when reading,
    instead of the content of the byte as an integer. The potential
    incompatibility here is what occurs if the byte contains a value different
    from 0 and 1. Previously, it would just return it; with this change, CFFI
    raises an exception in this case. But this case means 'undefined behavior';
    in C; if you really have to interface with a library relying on this,
    don't use bool in the CFFI side. Also, it is still valid to use a byte
    string as initializer for a bool[], but now it must only contain \x00 or
    \x01. As an aside, ffi.string() no longer works on bool[] (but it never made
    much sense, as this function stops at the first zero).
  * ffi.buffer is now the name of cffi's buffer type, and ffi.buffer() works
    like before but is the constructor of that type.
  * ffi.addressof(lib, 'name') now works also in in-line mode, not only in
    out-of-line mode. This is useful for taking the address of global variables.
  * Issue #255: cdata objects of a primitive type (integers, floats, char) are
    now compared and ordered by value. For example, &lt;cdata 'int' 42&gt; compares
    equal to 42 and &lt;cdata 'char' b'A'&gt; compares equal to b'A'. Unlike C,
    &lt;cdata 'int' -1&gt; does not compare equal to ffi.cast('unsigned int', -1): it
    compares smaller, because -1 &lt; 4294967295.
  * PyPy: ffi.new() and ffi.new_allocator()() did not record 'memory pressure';,
    causing the GC to run too infrequently if you call ffi.new() very often
    and/or with large arrays. Fixed in PyPy 5.7.
  * Support in ffi.cdef() for numeric expressions with + or -. Assumes that
    there is no overflow; it should be fixed first before we add more general
    support for arbitrary arithmetic on constants.

- do not generate HTML documentation for packages that are indirect
  dependencies of Sphinx
  (see docs at https://cffi.readthedocs.org/ )

- update to 1.9.1
  - Structs with variable-sized arrays as their last field: now we track the
    length of the array after ffi.new() is called, just like we always tracked
    the length of ffi.new('int[]', 42). This lets us detect out-of-range
    accesses to array items. This also lets us display a better repr(), and
    have the total size returned by ffi.sizeof() and ffi.buffer(). Previously
    both functions would return a result based on the size of the declared
    structure type, with an assumed empty array. (Thanks andrew for starting
    this refactoring.)
  - Add support in cdef()/set_source() for unspecified-length arrays in
    typedefs: typedef int foo_t[...];. It was already supported for global
    variables or structure fields.
  - I turned in v1.8 a warning from cffi/model.py into an error: 'enum xxx' has
    no values explicitly defined: refusing to guess which integer type it is
    meant to be (unsigned/signed, int/long). Now I'm turning it back to a
    warning again; it seems that guessing that the enum has size int is a
    99%-safe bet. (But not 100%, so it stays as a warning.)
  - Fix leaks in the code handling FILE * arguments. In CPython 3 there is a
    remaining issue that is hard to fix: if you pass a Python file object to a
    FILE * argument, then os.dup() is used and the new file descriptor is only
    closed when the GC reclaims the Python file object-and not at the earlier
    time when you call close(), which only closes the original file descriptor.
    If this is an issue, you should avoid this automatic convertion of Python
    file objects: instead, explicitly manipulate file descriptors and call
    fdopen() from C (...via cffi).
  - When passing a void * argument to a function with a different pointer type,
    or vice-versa, the cast occurs automatically, like in C. The same occurs
    for initialization with ffi.new() and a few other places. However, I
    thought that char * had the same property-but I was mistaken. In C you get
    the usual warning if you try to give a char * to a char ** argument, for
    example. Sorry about the confusion. This has been fixed in CFFI by giving
    for now a warning, too. It will turn into an error in a future version.
  - Issue #283: fixed ffi.new() on structures/unions with nested anonymous
    structures/unions, when there is at least one union in the mix. When
    initialized with a list or a dict, it should now behave more closely like
    the { } syntax does in GCC.
  - CPython 3.x: experimental: the generated C extension modules now use the
    'limited API';, which means that, as a compiled .so/.dll, it should work
    directly on any version of CPython &gt;= 3.2. The name produced by distutils
    is still version-specific. To get the version-independent name, you can
    rename it manually to NAME.abi3.so, or use the very recent setuptools 26.
  - Added ffi.compile(debug=...), similar to python setup.py build --debug but
    defaulting to True if we are running a debugging version of Python itself.
  - Removed the restriction that ffi.from_buffer() cannot be used on byte
    strings. Now you can get a char * out of a byte string, which is valid as
    long as the string object is kept alive. (But don't use it to modify the
    string object! If you need this, use bytearray or other official
    techniques.)
  - PyPy 5.4 can now pass a byte string directly to a char * argument (in older
    versions, a copy would be made). This used to be a CPython-only
    optimization.
  - ffi.gc(p, None) removes the destructor on an object previously created by
    another call to ffi.gc()
  - bool(ffi.cast('primitive type', x)) now returns False if the value is zero
    (including -0.0), and True otherwise. Previously this would only return
    False for cdata objects of a pointer type when the pointer is NULL.
  - bytearrays: ffi.from_buffer(bytearray-object) is now supported. (The reason
    it was not supported was that it was hard to do in PyPy, but it works since
    PyPy 5.3.) To call a C function with a char * argument from a buffer
    object-now including bytearrays-you write lib.foo(ffi.from_buffer(x)).
    Additionally, this is now supported: p[0:length] = bytearray-object. The
    problem with this was that a iterating over bytearrays gives numbers
    instead of characters. (Now it is implemented with just a memcpy, of
    course, not actually iterating over the characters.)
  - C++: compiling the generated C code with C++ was supposed to work, but
    failed if you make use the bool type (because that is rendered as the C
    _Bool type, which doesn't exist in C++).
  - help(lib) and help(lib.myfunc) now give useful information, as well as
    dir(p) where p is a struct or pointer-to-struct.

- update for multipython build

- disable 'negative left shift' warning in test suite to prevent
  failures with gcc6, until upstream fixes the undefined code
  in question (bsc#981848)

- Update to version 1.6.0:
  * ffi.list_types()
  * ffi.unpack()
  * extern 'Python+C';
  * in API mode, lib.foo.__doc__ contains the C signature now.
  * Yet another attempt at robustness of ffi.def_extern() against
    CPython's interpreter shutdown logic.
- Update in SLE-12 (bsc#1138748, jsc#ECO-1256, jsc#PM-1598)

- Make this version of the package compatible with OpenSSL 1.1.1d, thus fixing bsc#1149792.

- bsc#1101820 CVE-2018-10903 GCM tag forgery via truncated tag in
  finalize_with_tag API

- Add proper conditional for the python2, the ifpython works only
  for the requires/etc

- add missing dependency on python ssl

- update to version 2.1.4:
  * Added X509_up_ref for an upcoming pyOpenSSL release.

- update to version 2.1.3:
  * Updated Windows, macOS, and manylinux1 wheels to be compiled with
    OpenSSL 1.1.0g.

- update to version 2.1.2:
  * Corrected a bug with the manylinux1 wheels where OpenSSL's stack
    was marked executable.

- fix BuildRequires conditions for python3

- update to 2.1.1

- Fix cffi version requirement.

- Disable memleak tests to fix build with OpenSSL 1.1 (bsc#1055478)


- update to 2.0.3

- update to 2.0.2

- update to 2.0

- update to 1.9

- add python-packaging to requirements explicitly instead of relying
  on setuptools to pull it in

- Switch to singlespec approach

- update to 1.8.1
- Adust Requires and BuildRequires		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-25"/>
	<updated date="2020-03-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055478">SUSE bug 1055478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070737">SUSE bug 1070737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101820">SUSE bug 1101820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111657">SUSE bug 1111657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138748">SUSE bug 1138748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981848">SUSE bug 981848</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10903/">CVE-2018-10903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10903">CVE-2018-10903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531783" comment="python-cffi-1.11.2-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531784" comment="python-cryptography-2.1.4-7.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531785" comment="python-xattr-0.7.5-6.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531786" comment="python3-cffi-1.11.2-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531787" comment="python3-cryptography-2.1.4-7.28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152371" version="1" class="patch">
	<metadata>
		<title>Security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1118987" ref_url="https://bugzilla.suse.com/1118987" source="BUGZILLA"/>
		<reference ref_id="1162197" ref_url="https://bugzilla.suse.com/1162197" source="BUGZILLA"/>
		<reference ref_id="1162200" ref_url="https://bugzilla.suse.com/1162200" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11805" ref_url="https://www.suse.com/security/cve/CVE-2018-11805/" source="CVE"/>
		<reference ref_id="CVE-2020-1930" ref_url="https://www.suse.com/security/cve/CVE-2020-1930/" source="CVE"/>
		<reference ref_id="CVE-2020-1931" ref_url="https://www.suse.com/security/cve/CVE-2020-1931/" source="CVE"/>
		<description>
This update for spamassassin fixes the following issues:

- CVE-2018-11805: Fixed an issue with delimiter handling in rule files 
  related to is_regexp_valid() (bsc#1118987).
- CVE-2020-1930: Fixed an issue with rule configuration (.cf) files which 
  can be configured to run system commands (bsc#1162197).
- CVE-2020-1931: Fixed an issue with rule configuration (.cf) files which 
  can be configured to run system commands with warnings (bsc#1162200).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-30"/>
	<updated date="2020-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118987">SUSE bug 1118987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162197">SUSE bug 1162197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162200">SUSE bug 1162200</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11805/">CVE-2018-11805 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11805">CVE-2018-11805 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1930/">CVE-2020-1930 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1930">CVE-2020-1930 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1931/">CVE-2020-1931 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1931">CVE-2020-1931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531788" comment="perl-Mail-SpamAssassin-3.4.2-44.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531789" comment="spamassassin-3.4.2-44.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152372" version="1" class="patch">
	<metadata>
		<title>Security update for memcached (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1133817" ref_url="https://bugzilla.suse.com/1133817" source="BUGZILLA"/>
		<reference ref_id="1149110" ref_url="https://bugzilla.suse.com/1149110" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11596" ref_url="https://www.suse.com/security/cve/CVE-2019-11596/" source="CVE"/>
		<reference ref_id="CVE-2019-15026" ref_url="https://www.suse.com/security/cve/CVE-2019-15026/" source="CVE"/>
		<description>
This update for memcached fixes the following issues:

Security issue fixed:

- CVE-2019-11596: Fixed a NULL pointer dereference in process_lru_command (bsc#1133817).
- CVE-2019-15026: Fixed a stack-based buffer over-read (bsc#1149110).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-01"/>
	<updated date="2020-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1133817">SUSE bug 1133817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149110">SUSE bug 1149110</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11596/">CVE-2019-11596 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11596">CVE-2019-11596 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15026/">CVE-2019-15026 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15026">CVE-2019-15026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557658" comment="memcached-1.4.39-4.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152373" version="1" class="patch">
	<metadata>
		<title>Security update for mgetty (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1142770" ref_url="https://bugzilla.suse.com/1142770" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010190" ref_url="https://www.suse.com/security/cve/CVE-2019-1010190/" source="CVE"/>
		<description>
This update for mgetty fixes the following issues:

- CVE-2019-1010190: Fixed a denial of service which could be caused by a local attacker in putwhitespan() (bsc#1142770).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-02"/>
	<updated date="2020-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1142770">SUSE bug 1142770</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010190/">CVE-2019-1010190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010190">CVE-2019-1010190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557659" comment="g3utils-1.1.36-58.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557660" comment="mgetty-1.1.36-58.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152374" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1162224" ref_url="https://bugzilla.suse.com/1162224" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<description>
This update for python3 fixes the following issue:

- CVE-2019-18348: Fixed a CRLF injection via the host part 
  of the url passed to urlopen(). Now an InvalidURL exception 
  is raised (bsc#1155094).
- CVE-2019-9674: Improved the documentation to reflect the 
  dangers of zip-bombs (bsc#1162825).
- CVE-2020-8492: Fixed a regular expression in urllib that 
  was prone to denial of service via HTTP (bsc#1162367).
- Fixed an issue with version missmatch (bsc#1162224).
- Rename idle icons to idle3 in order to not conflict with python2
  variant of the package. (bsc#1165894)
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-02"/>
	<updated date="2020-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162224">SUSE bug 1162224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531790" comment="libpython3_4m1_0-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531791" comment="python3-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531792" comment="python3-base-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531793" comment="python3-curses-3.4.10-25.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152375" version="1" class="patch">
	<metadata>
		<title>Security update for e2fsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1160571" ref_url="https://bugzilla.suse.com/1160571" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5188" ref_url="https://www.suse.com/security/cve/CVE-2019-5188/" source="CVE"/>
		<description>
This update for e2fsprogs fixes the following issues:

- CVE-2019-5188: Fixed a code execution vulnerability in the directory rehashing functionality (bsc#1160571).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-13"/>
	<updated date="2020-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1160571">SUSE bug 1160571</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5188/">CVE-2019-5188 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5188">CVE-2019-5188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557661" comment="e2fsprogs-1.42.11-16.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557662" comment="libcom_err2-1.42.11-16.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557663" comment="libcom_err2-32bit-1.42.11-16.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557664" comment="libext2fs2-1.42.11-16.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152376" version="1" class="patch">
	<metadata>
		<title>Security update for exiv2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1040973" ref_url="https://bugzilla.suse.com/1040973" source="BUGZILLA"/>
		<reference ref_id="1110282" ref_url="https://bugzilla.suse.com/1110282" source="BUGZILLA"/>
		<reference ref_id="1142678" ref_url="https://bugzilla.suse.com/1142678" source="BUGZILLA"/>
		<reference ref_id="1142683" ref_url="https://bugzilla.suse.com/1142683" source="BUGZILLA"/>
		<reference ref_id="1153577" ref_url="https://bugzilla.suse.com/1153577" source="BUGZILLA"/>
		<reference ref_id="1161901" ref_url="https://bugzilla.suse.com/1161901" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9239" ref_url="https://www.suse.com/security/cve/CVE-2017-9239/" source="CVE"/>
		<reference ref_id="CVE-2018-17581" ref_url="https://www.suse.com/security/cve/CVE-2018-17581/" source="CVE"/>
		<reference ref_id="CVE-2019-13110" ref_url="https://www.suse.com/security/cve/CVE-2019-13110/" source="CVE"/>
		<reference ref_id="CVE-2019-13113" ref_url="https://www.suse.com/security/cve/CVE-2019-13113/" source="CVE"/>
		<reference ref_id="CVE-2019-17402" ref_url="https://www.suse.com/security/cve/CVE-2019-17402/" source="CVE"/>
		<reference ref_id="CVE-2019-20421" ref_url="https://www.suse.com/security/cve/CVE-2019-20421/" source="CVE"/>
		<description>
This update for exiv2 fixes the following issues:

- CVE-2018-17581: Fixed an excessive stack consumption in CiffDirectory:readDirectory() 
  which might have led to denial of service (bsc#1110282).
- CVE-2019-13110: Fixed an integer overflow and an out of bounds read in 
  CiffDirectory:readDirectory which might have led to denial of service (bsc#1142678).
- CVE-2019-13113: Fixed a potential denial of service via an invalid data location 
  in a CRW image (bsc#1142683).
- CVE-2019-17402: Fixed an improper validation of the relationship of the total 
  size to the offset and size in Exiv2::getULong (bsc#1153577).
- CVE-2019-20421: Fixed an infinite loop triggered via an input file (bsc#1161901).
- CVE-2017-9239: Fixed a segmentation fault in TiffImageEntry::doWriteImage function (bsc#1040973).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040973">SUSE bug 1040973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110282">SUSE bug 1110282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142678">SUSE bug 1142678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142683">SUSE bug 1142683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153577">SUSE bug 1153577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161901">SUSE bug 1161901</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9239/">CVE-2017-9239 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9239">CVE-2017-9239 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17581/">CVE-2018-17581 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17581">CVE-2018-17581 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13110/">CVE-2019-13110 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13110">CVE-2019-13110 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13113/">CVE-2019-13113 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13113">CVE-2019-13113 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17402/">CVE-2019-17402 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17402">CVE-2019-17402 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20421/">CVE-2019-20421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20421">CVE-2019-20421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557665" comment="libexiv2-12-0.23-12.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152377" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1141322" ref_url="https://bugzilla.suse.com/1141322" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to NSS 3.47.1:

Security issues fixed:

- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- CVE-2019-11745: EncryptUpdate should use maxout, not block size (bsc#1158527).
- CVE-2019-11727: Fixed vulnerability sign CertificateVerify with PKCS#1 v1.5 signatures issue (bsc#1141322).

mozilla-nspr was updated to version 4.23:

- Whitespace in C files was cleaned up and no longer uses tab characters for indenting.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-13"/>
	<updated date="2020-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141322">SUSE bug 1141322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17006">CVE-2019-17006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522675" comment="libfreebl3-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522676" comment="libfreebl3-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531795" comment="libfreebl3-hmac-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531796" comment="libfreebl3-hmac-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522677" comment="libsoftokn3-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522678" comment="libsoftokn3-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531797" comment="libsoftokn3-hmac-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531798" comment="libsoftokn3-hmac-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522679" comment="mozilla-nspr-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522680" comment="mozilla-nspr-32bit-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522681" comment="mozilla-nss-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522682" comment="mozilla-nss-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522683" comment="mozilla-nss-certs-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522684" comment="mozilla-nss-certs-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522685" comment="mozilla-nss-sysinit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522686" comment="mozilla-nss-sysinit-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522687" comment="mozilla-nss-tools-3.47.1-58.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152378" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1141493" ref_url="https://bugzilla.suse.com/1141493" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652/" source="CVE"/>
		<description>
This update for libpng12 fixes the following issues:

Security issue fixed:

- CVE-2017-12652: Fixed an Input Validation Error related to the length of chunks (bsc#1141493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141493">SUSE bug 1141493</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12652">CVE-2017-12652 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557666" comment="libpng12-0-1.2.50-20.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557667" comment="libpng12-0-32bit-1.2.50-20.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152379" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154609" ref_url="https://bugzilla.suse.com/1154609" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<description>
This update for libxslt fixes the following issue:

- CVE-2019-18197: Fixed a dangling pointer in xsltCopyText which may have led to information disclosure (bsc#1154609).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154609">SUSE bug 1154609</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18197">CVE-2019-18197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531799" comment="libxslt-tools-1.1.28-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531800" comment="libxslt1-1.1.28-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531801" comment="libxslt1-32bit-1.1.28-17.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152380" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1168630" ref_url="https://bugzilla.suse.com/1168630" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Mozilla Firefox 68.6.1esr
  MFSA 2020-11 (bsc#1168630)
  * CVE-2020-6819 (bmo#1620818)
    Use-after-free while running the nsDocShell destructor
  * CVE-2020-6820 (bmo#1626728)
    Use-after-free when handling a ReadableStream
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-06"/>
	<updated date="2020-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6819">CVE-2020-6819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6820">CVE-2020-6820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531802" comment="MozillaFirefox-68.6.1-109.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531804" comment="MozillaFirefox-translations-common-68.6.1-109.113.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152381" version="1" class="patch">
	<metadata>
		<title>Security update for vino (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1155419" ref_url="https://bugzilla.suse.com/1155419" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<description>
This update for vino fixes the following issues:
	  
- CVE-2019-15681: Fixed a memory leak which could have allowed to a 
  remote attacker to read stack memory (bsc#1155419).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-08"/>
	<updated date="2020-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15681">CVE-2019-15681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557668" comment="vino-3.20.2-7.3.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557669" comment="vino-lang-3.20.2-7.3.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152382" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1166484" ref_url="https://bugzilla.suse.com/1166484" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1760" ref_url="https://www.suse.com/security/cve/CVE-2020-1760/" source="CVE"/>
		<description>
This update for ceph fixes the following issues:

- CVE-2020-1760: Fixed XSS due to RGW GetObject header-splitting (bsc#1166484).

		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-08"/>
	<updated date="2020-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166484">SUSE bug 1166484</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1760/">CVE-2020-1760 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1760">CVE-2020-1760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557670" comment="ceph-common-12.2.12+git.1585658687.363df3a813-2.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557671" comment="libcephfs2-12.2.12+git.1585658687.363df3a813-2.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557672" comment="librados2-12.2.12+git.1585658687.363df3a813-2.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557673" comment="libradosstriper1-12.2.12+git.1585658687.363df3a813-2.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557674" comment="librbd1-12.2.12+git.1585658687.363df3a813-2.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557675" comment="librgw2-12.2.12+git.1585658687.363df3a813-2.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557676" comment="python-cephfs-12.2.12+git.1585658687.363df3a813-2.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557677" comment="python-rados-12.2.12+git.1585658687.363df3a813-2.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557678" comment="python-rbd-12.2.12+git.1585658687.363df3a813-2.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557679" comment="python-rgw-12.2.12+git.1585658687.363df3a813-2.42.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152383" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1156188" ref_url="https://bugzilla.suse.com/1156188" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18804" ref_url="https://www.suse.com/security/cve/CVE-2019-18804/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:
	  
- CVE-2019-18804: Fixed a null pointer dereference (bsc#1156188).

		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-09"/>
	<updated date="2020-04-09"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1156188">SUSE bug 1156188</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18804/">CVE-2019-18804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18804">CVE-2019-18804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557680" comment="libdjvulibre21-3.5.25.3-5.6.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152384" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1163927" ref_url="https://bugzilla.suse.com/1163927" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14559" ref_url="https://www.suse.com/security/cve/CVE-2019-14559/" source="CVE"/>
		<description>
This update for ovmf fixes the following issues:

- CVE-2019-14559: Fixed a memory leak in ArpOnFrameRcvdDpc() (bsc#1163927).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-09"/>
	<updated date="2020-04-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1163927">SUSE bug 1163927</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14559/">CVE-2019-14559 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14559">CVE-2019-14559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557681" comment="ovmf-2017+git1492060560.b6d11d7c46-4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557682" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557683" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152385" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1168874" ref_url="https://bugzilla.suse.com/1168874" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6827" ref_url="https://www.suse.com/security/cve/CVE-2020-6827/" source="CVE"/>
		<reference ref_id="CVE-2020-6828" ref_url="https://www.suse.com/security/cve/CVE-2020-6828/" source="CVE"/>
		<description>
This update for MozillaFirefox to version 68.7.0 ESR fixes the following issues:

- CVE-2020-6821: Uninitialized memory could be read when using the WebGL copyTexSubImage method (bsc#1168874).
- CVE-2020-6822: Fixed out of bounds write in GMPDecodeData when processing large images (bsc#1168874).
- CVE-2020-6825: Fixed Memory safety bugs (bsc#1168874).
- CVE-2020-6827: Custom Tabs could have the URI spoofed (bsc#1168874).
- CVE-2020-6828: Preference overwrite via crafted Intent (bsc#1168874).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-09"/>
	<updated date="2020-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6821">CVE-2020-6821 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6822">CVE-2020-6822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6825">CVE-2020-6825 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6827/">CVE-2020-6827 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6827">CVE-2020-6827 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6828/">CVE-2020-6828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6828">CVE-2020-6828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531805" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531807" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152386" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1167890" ref_url="https://bugzilla.suse.com/1167890" source="BUGZILLA"/>
		<reference ref_id="1168930" ref_url="https://bugzilla.suse.com/1168930" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<description>
This update for git fixes the following issues:

Security issue fixed:

- CVE-2020-5260: With a crafted URL that contains a newline in it, the credential
  helper machinery can be fooled to give credential information for a wrong host (bsc#1168930). 

Non-security issue fixed: 

git was updated to 2.26.0 for SHA256 support (bsc#1167890, jsc#SLE-11608):

- the xinetd snippet was removed
- the System V init script for the git-daemon was replaced by a systemd
  service file of the same name.

git 2.26.0:

* 'git rebase' now uses a different backend that is based on the
  'merge' machinery by default. The 'rebase.backend' configuration
   variable reverts to old behaviour when set to  'apply'
* Improved handling of sparse checkouts
* Improvements to many commands and internal features

git 2.25.1:

* 'git commit' now honors advise.statusHints
* various updates, bug fixes and documentation updates

git 2.25.0:

* The branch description ('git branch --edit-description') has been
  used to fill the body of the cover letters by the format-patch
  command; this has been enhanced so that the subject can also be
  filled.
* A few commands learned to take the pathspec from the standard input
  or a named file, instead of taking it as the command line
  arguments, with the '--pathspec-from-file' option.
* Test updates to prepare for SHA-2 transition continues.
* Redo 'git name-rev' to avoid recursive calls.
* When all files from some subdirectory were renamed to the root
  directory, the directory rename heuristics would fail to detect that
  as a rename/merge of the subdirectory to the root directory, which has
  been corrected.
* HTTP transport had possible allocator/deallocator mismatch, which
  has been corrected.

git 2.24.1:

* CVE-2019-1348: The --export-marks option of fast-import is
  exposed also via the in-stream command feature export-marks=...
  and it allows overwriting arbitrary paths (bsc#1158785)
* CVE-2019-1349: on Windows, when submodules are cloned
  recursively, under certain circumstances Git could be fooled
  into using the same Git directory twice (bsc#1158787)
* CVE-2019-1350: Incorrect quoting of command-line arguments
  allowed remote code execution during a recursive clone in
  conjunction with SSH URLs (bsc#1158788)
* CVE-2019-1351: on Windows mistakes drive letters outside of
  the US-English alphabet as relative paths (bsc#1158789)
* CVE-2019-1352: on Windows was unaware of NTFS Alternate Data
  Streams (bsc#1158790)
* CVE-2019-1353: when run in the Windows Subsystem for Linux
  while accessing a working directory on a regular Windows
  drive, none of the NTFS protections were active (bsc#1158791)
* CVE-2019-1354: on Windows refuses to write tracked files with
  filenames that contain backslashes (bsc#1158792)
* CVE-2019-1387: Recursive clones vulnerability that is caused
  by too-lax validation of submodule names, allowing very
  targeted attacks via remote code execution in recursive
  clones (bsc#1158793)
* CVE-2019-19604: a recursive clone followed by a submodule
  update could execute code contained within the repository
  without the user explicitly having asked for that (bsc#1158795)

- Fix building with asciidoctor and without DocBook4 stylesheets.

git 2.24.0

* The command line parser learned '--end-of-options' notation.
* A mechanism to affect the default setting for a (related) group of
  configuration variables is introduced.
* 'git fetch' learned '--set-upstream' option to help those who first
  clone from their private fork they intend to push to, add the true
  upstream via 'git remote add' and then 'git fetch' from it.
* fixes and improvements to UI, workflow and features, bash completion fixes
* part of it merged upstream
* the Makefile attempted to download some documentation, banned

git 2.23.0:

* The '--base' option of 'format-patch' computed the patch-ids for
  prerequisite patches in an unstable way, which has been updated
  to compute in a way that is compatible with 'git patch-id
  --stable'.
* The 'git log' command by default behaves as if the --mailmap
  option was given.
* fixes and improvements to UI, workflow and features

git 2.22.1:

* A relative pathname given to 'git init --template=&lt;path&gt; &lt;repo&gt;'
  ought to be relative to the directory 'git init' gets invoked in,
  but it instead was made relative to the repository, which has been
  corrected.
* 'git worktree add' used to fail when another worktree connected to
  the same repository was corrupt, which has been corrected.
* 'git am -i --resolved' segfaulted after trying to see a commit as
  if it were a tree, which has been corrected.
* 'git merge --squash' is designed to update the working tree and the
  index without creating the commit, and this cannot be countermanded
  by adding the '--commit' option; the command now refuses to work
  when both options are given.
* Update to Unicode 12.1 width table.
* 'git request-pull' learned to warn when the ref we ask them to pull
  from in the local repository and in the published repository are
  different.
* 'git fetch' into a lazy clone forgot to fetch base objects that are
  necessary to complete delta in a thin packfile, which has been
  corrected.
* The URL decoding code has been updated to avoid going past the end
  of the string while parsing %-&lt;hex&gt;-&lt;hex&gt; sequence.
* 'git clean' silently skipped a path when it cannot lstat() it; now
  it gives a warning.
* 'git rm' to resolve a conflicted path leaked an internal message
  'needs merge' before actually removing the path, which was
  confusing. This has been corrected.
* Many more bugfixes and code cleanups.

- removal of SuSEfirewall2 service, since SuSEfirewall2 has been replaced by
  firewalld, see [1].
  [1]: https://lists.opensuse.org/opensuse-factory/2019-01/msg00490.html

git 2.22.0:

* The filter specification '--filter=sparse:path=&lt;path&gt;' used to
  create a lazy/partial clone has been removed. Using a blob that is
  part of the project as sparse specification is still supported with
  the '--filter=sparse:oid=&lt;blob&gt;' option
* 'git checkout --no-overlay' can be used to trigger a new mode of
  checking out paths out of the tree-ish, that allows paths that
  match the pathspec that are in the current index and working tree
  and are not in the tree-ish.
* Four new configuration variables {author,committer}.{name,email}
  have been introduced to override user.{name,email} in more specific
  cases.
* 'git branch' learned a new subcommand '--show-current'.
* The command line completion (in contrib/) has been taught to
  complete more subcommand parameters.
* The completion helper code now pays attention to repository-local
  configuration (when available), which allows --list-cmds to honour
  a repository specific setting of completion.commands, for example.
* The list of conflicted paths shown in the editor while concluding a
  conflicted merge was shown above the scissors line when the
  clean-up mode is set to 'scissors', even though it was commented
  out just like the list of updated paths and other information to
  help the user explain the merge better.
* 'git rebase' that was reimplemented in C did not set ORIG_HEAD
  correctly, which has been corrected.
* 'git worktree add' used to do a 'find an available name with stat
  and then mkdir', which is race-prone. This has been fixed by using
  mkdir and reacting to EEXIST in a loop. 

- update git-web AppArmor profile for bash and tar usrMerge (bsc#1132350)

git 2.21.0:

* Historically, the '-m' (mainline) option can only be used for 'git
  cherry-pick' and 'git revert' when working with a merge commit.
  This version of Git no longer warns or errors out when working with
  a single-parent commit, as long as the argument to the '-m' option
  is 1 (i.e. it has only one parent, and the request is to pick or
  revert relative to that first parent). Scripts that relied on the
  behaviour may get broken with this change.
* Small fixes and features for fast-export and fast-import.
* The 'http.version' configuration variable can be used with recent
  enough versions of cURL library to force the version of HTTP used
  to talk when fetching and pushing.
* 'git push $there $src:$dst' rejects when $dst is not a fully
  qualified refname and it is not clear what the end user meant.
* Update 'git multimail' from the upstream.
* A new date format '--date=human' that morphs its output depending
  on how far the time is from the current time has been introduced.
  '--date=auto:human' can be used to use this new format (or any
  existing format) when the output is going to the pager or to the
  terminal, and otherwise the default format.

- Fix worktree creation race (bsc#1114225).

git 2.20.1:

* portability fixes
* 'git help -a' did not work well when an overly long alias was
  defined
* no longer squelched an error message when the run_command API
  failed to run a missing command

git 2.20.0:

* 'git help -a' now gives verbose output (same as 'git help -av').
  Those who want the old output may say 'git help --no-verbose -a'..
* 'git send-email' learned to grab address-looking string on any
  trailer whose name ends with '-by'.
* 'git format-patch' learned new '--interdiff' and '--range-diff'
  options to explain the difference between this version and the
  previous attempt in the cover letter (or after the three-dashes as
  a comment).
* Developer builds now use -Wunused-function compilation option.
* Fix a bug in which the same path could be registered under multiple
  worktree entries if the path was missing (for instance, was removed
  manually).  Also, as a convenience, expand the number of cases in
  which --force is applicable.
* The overly large Documentation/config.txt file have been split into
  million little pieces.  This potentially allows each individual piece
  to be included into the manual page of the command it affects more easily.
* Malformed or crafted data in packstream can make our code attempt
  to read or write past the allocated buffer and abort, instead of
  reporting an error, which has been fixed.
* Fix for a long-standing bug that leaves the index file corrupt when
  it shrinks during a partial commit.
* 'git merge' and 'git pull' that merges into an unborn branch used
  to completely ignore '--verify-signatures', which has been
  corrected.
* ...and much more features and fixes

- fix CVE-2018-19486 (bsc#1117257)

git 2.19.2:

* various bug fixes for multiple subcommands and operations

git 2.19.1:

* CVE-2018-17456: Specially crafted .gitmodules files may have
  allowed arbitrary code execution when the repository is cloned
  with --recurse-submodules (bsc#1110949)

git 2.19.0:

* 'git diff' compares the index and the working tree.  For paths
   added with intent-to-add bit, the command shows the full contents
   of them as added, but the paths themselves were not marked as new
   files.  They are now shown as new by default.
* 'git apply' learned the '--intent-to-add' option so that an
   otherwise working-tree-only application of a patch will add new
   paths to the index marked with the 'intent-to-add' bit.
* 'git grep' learned the '--column' option that gives not just the
   line number but the column number of the hit.
* The '-l' option in 'git branch -l' is an unfortunate short-hand for
   '--create-reflog', but many users, both old and new, somehow expect
   it to be something else, perhaps '--list'.  This step warns when '-l'
   is used as a short-hand for '--create-reflog' and warns about the
   future repurposing of the it when it is used.
* The userdiff pattern for .php has been updated.
* The content-transfer-encoding of the message 'git send-email' sends
   out by default was 8bit, which can cause trouble when there is an
   overlong line to bust RFC 5322/2822 limit.  A new option 'auto' to
   automatically switch to quoted-printable when there is such a line
   in the payload has been introduced and is made the default.
* 'git checkout' and 'git worktree add' learned to honor
   checkout.defaultRemote when auto-vivifying a local branch out of a
   remote tracking branch in a repository with multiple remotes that
   have tracking branches that share the same names.
   (merge 8d7b558bae ab/checkout-default-remote later to maint).
* 'git grep' learned the '--only-matching' option.
* 'git rebase --rebase-merges' mode now handles octopus merges as
   well.
* Add a server-side knob to skip commits in exponential/fibbonacci
  stride in an attempt to cover wider swath of history with a smaller
  number of iterations, potentially accepting a larger packfile
  transfer, instead of going back one commit a time during common
  ancestor discovery during the 'git fetch' transaction.
  (merge 42cc7485a2 jt/fetch-negotiator-skipping later to maint).
* A new configuration variable core.usereplacerefs has been added,
  primarily to help server installations that want to ignore the
  replace mechanism altogether.
* Teach 'git tag -s' etc. a few configuration variables (gpg.format
  that can be set to 'openpgp' or 'x509', and gpg.&lt;format&gt;.program
  that is used to specify what program to use to deal with the format)
  to allow x.509 certs with CMS via 'gpgsm' to be used instead of
  openpgp via 'gnupg'.
* Many more strings are prepared for l10n.
* 'git p4 submit' learns to ask its own pre-submit hook if it should
  continue with submitting.
* The test performed at the receiving end of 'git push' to prevent
  bad objects from entering repository can be customized via
  receive.fsck.* configuration variables; we now have gained a
  counterpart to do the same on the 'git fetch' side, with
  fetch.fsck.* configuration variables.
* 'git pull --rebase=interactive' learned 'i' as a short-hand for
  'interactive'.
* 'git instaweb' has been adjusted to run better with newer Apache on
  RedHat based distros.
* 'git range-diff' is a reimplementation of 'git tbdiff' that lets us
  compare individual patches in two iterations of a topic.
* The sideband code learned to optionally paint selected keywords at
  the beginning of incoming lines on the receiving end.
* 'git branch --list' learned to take the default sort order from the
  'branch.sort' configuration variable, just like 'git tag --list'
  pays attention to 'tag.sort'.
* 'git worktree' command learned '--quiet' option to make it less
  verbose.

git 2.18.0:

* improvements to rename detection logic
* When built with more recent cURL, GIT_SSL_VERSION can now
  specify 'tlsv1.3' as its value.
* 'git mergetools' learned talking to guiffy.
* various other workflow improvements and fixes
* performance improvements and other developer visible fixes

Update to git 2.16.4: security fix release

git 2.17.1:

* Submodule 'names' come from the untrusted .gitmodules file, but
  we blindly append them to $GIT_DIR/modules to create our on-disk
  repo paths. This means you can do bad things by putting '../'
  into the name. We now enforce some rules for submodule names
  which will cause Git to ignore these malicious names
  (CVE-2018-11235, bsc#1095219)
* It was possible to trick the code that sanity-checks paths on
  NTFS into reading random piece of memory
  (CVE-2018-11233, bsc#1095218)
* Support on the server side to reject pushes to repositories
  that attempt to create such problematic .gitmodules file etc.
  as tracked contents, to help hosting sites protect their
  customers by preventing malicious contents from spreading.

git 2.17.0:

* 'diff' family of commands learned '--find-object=&lt;object-id&gt;' option
  to limit the findings to changes that involve the named object.
* 'git format-patch' learned to give 72-cols to diffstat, which is
  consistent with other line length limits the subcommand uses for
  its output meant for e-mails.
* The log from 'git daemon' can be redirected with a new option; one
  relevant use case is to send the log to standard error (instead of
  syslog) when running it from inetd.
* 'git rebase' learned to take '--allow-empty-message' option.
* 'git am' has learned the '--quit' option, in addition to the
  existing '--abort' option; having the pair mirrors a few other
  commands like 'rebase' and 'cherry-pick'.
* 'git worktree add' learned to run the post-checkout hook, just like
  'git clone' runs it upon the initial checkout.
* 'git tag' learned an explicit '--edit' option that allows the
  message given via '-m' and '-F' to be further edited.
* 'git fetch --prune-tags' may be used as a handy short-hand for
  getting rid of stale tags that are locally held.
* The new '--show-current-patch' option gives an end-user facing way
  to get the diff being applied when 'git rebase' (and 'git am')
  stops with a conflict.
* 'git add -p' used to offer '/' (look for a matching hunk) as a
  choice, even there was only one hunk, which has been corrected.
  Also the single-key help is now given only for keys that are
  enabled (e.g. help for '/' won't be shown when there is only one
  hunk).
* Since Git 1.7.9, 'git merge' defaulted to --no-ff (i.e. even when
  the side branch being merged is a descendant of the current commit,
  create a merge commit instead of fast-forwarding) when merging a
  tag object.  This was appropriate default for integrators who pull
  signed tags from their downstream contributors, but caused an
  unnecessary merges when used by downstream contributors who
  habitually 'catch up' their topic branches with tagged releases
  from the upstream.  Update 'git merge' to default to --no-ff only
  when merging a tag object that does *not* sit at its usual place in
  refs/tags/ hierarchy, and allow fast-forwarding otherwise, to
  mitigate the problem.
* 'git status' can spend a lot of cycles to compute the relation
  between the current branch and its upstream, which can now be
  disabled with '--no-ahead-behind' option.
* 'git diff' and friends learned funcname patterns for Go language
  source files.
* 'git send-email' learned '--reply-to=&lt;address&gt;' option.
* Funcname pattern used for C# now recognizes 'async' keyword.
* In a way similar to how 'git tag' learned to honor the pager
  setting only in the list mode, 'git config' learned to ignore the
  pager setting when it is used for setting values (i.e. when the
  purpose of the operation is not to 'show').
- Use %license instead of %doc [bsc#1082318]

git 2.16.3:

* 'git status' after moving a path in the working tree (hence
  making it appear 'removed') and then adding with the -N option
  (hence making that appear 'added') detected it as a rename, but
  did not report the  old and new pathnames correctly.
* 'git commit --fixup' did not allow '-m&lt;message&gt;' option to be
  used at the same time; allow it to annotate resulting commit
  with more text.
* When resetting the working tree files recursively, the working
  tree of submodules are now also reset to match.
* Fix for a commented-out code to adjust it to a rather old API
  change around object ID.
* When there are too many changed paths, 'git diff' showed a
  warning message but in the middle of a line.
* The http tracing code, often used to debug connection issues,
  learned to redact potentially sensitive information from its
  output so that it can be more safely sharable.
* Crash fix for a corner case where an error codepath tried to
  unlock what it did not acquire lock on.
* The split-index mode had a few corner case bugs fixed.
* Assorted fixes to 'git daemon'.
* Completion of 'git merge -s&lt;strategy&gt;' (in contrib/) did not
  work well in non-C locale.
* Workaround for segfault with more recent versions of SVN.
* Recently introduced leaks in fsck have been plugged.
* Travis CI integration now builds the executable in 'script'
  phase to follow the established practice, rather than during
  'before_script' phase.  This allows the CI categorize the
  failures better ('failed' is project's fault, 'errored' is
  build environment's).

- Drop superfluous xinetd snippet, no longer used (bsc#1084460)

- Build with asciidoctor for the recent distros (bsc#1075764)

- Move %{?systemd_requires} to daemon subpackage
- Create subpackage for libsecret credential helper.

git 2.16.2:

* An old regression in 'git describe --all $annotated_tag^0' has
  been fixed.
* 'git svn dcommit' did not take into account the fact that a
  svn+ssh:// URL with a username@ (typically used for pushing)
  refers to the same SVN repository without the username@ and
  failed when svn.pushmergeinfo option is set.
* 'git merge -Xours/-Xtheirs' learned to use our/their version
  when resolving a conflicting updates to a symbolic link.
* 'git clone $there $here' is allowed even when here directory
  exists as long as it is an empty directory, but the command
   incorrectly removed it upon a failure of the operation.
* 'git stash -- &lt;pathspec&gt;' incorrectly blew away untracked files
  in the directory that matched the pathspec, which has been
  corrected.
* 'git add -p' was taught to ignore local changes to submodules
  as they do not interfere with the partial addition of regular
  changes anyway.

git 2.16.1:

* 'git clone' segfaulted when cloning a project that happens to
  track two paths that differ only in case on a case insensitive
  filesystem

git 2.16.0 (CVE-2017-15298, bsc#1063412):

* See https://raw.github.com/git/git/master/Documentation/RelNotes/2.16.0.txt

git 2.15.1:

* fix 'auto' column output 
* fixes to moved lines diffing
* documentation updates
* fix use of repositories immediately under the root directory
* improve usage of libsecret
* fixes to various error conditions in git commands

- Rewrite from sysv init to systemd unit file for git-daemon
  (bsc#1069803)

- Replace references to /var/adm/fillup-templates with new 
  %_fillupdir macro (bsc#1069468)

- split off p4 to a subpackage (bsc#1067502)

- Build with the external libsha1detectcoll (bsc#1042644)

git 2.15.0:

* Use of an empty string as a pathspec element that is used for
 'everything matches' is still warned and Git asks users to use a
  more explicit '.' for that instead. Removal scheduled for 2.16
* Git now avoids blindly falling back to '.git' when the setup
  sequence said we are _not_ in Git repository (another corner
  case removed)
* 'branch --set-upstream' was retired, deprecated since 1.8
* many other improvements and updates

git 2.14.3:

* git send-email understands more cc: formats
* fixes so gitk --bisect
* git commit-tree fixed to handle -F file alike
* Prevent segfault in 'git cat-file --textconv'
* Fix function header parsing for HTML
* Various small fixes to user commands and and internal functions

git 2.14.2:

* fixes to color output
* http.{sslkey,sslCert} now interpret '~[username]/' prefix
* fixes to walking of reflogs via 'log -g' and friends
* various fixes to output correctness
* 'git push --recurse-submodules $there HEAD:$target' is now
  propagated down to the submodules
* 'git clone --recurse-submodules --quiet' c$how propagates quiet
  option down to submodules.
* 'git svn --localtime' correctness fixes
* 'git grep -L' and 'git grep --quiet -L' now report same exit code
* fixes to 'git apply' when converting line endings
* Various Perl scripts did not use safe_pipe_capture() instead 
  of backticks, leaving them susceptible to end-user input.
  CVE-2017-14867 bsc#1061041
* 'git cvsserver' no longer is invoked by 'git daemon' by
  default 

git 2.14.1 (bsc#1052481):
* Security fix for CVE-2017-1000117: A malicious third-party can
  give a crafted 'ssh://...' URL to an unsuspecting victim, and
  an attempt to visit the URL can result in any program that
  exists on the victim's machine being executed. Such a URL could
  be placed in the .gitmodules file of a malicious project, and
  an unsuspecting victim could be tricked into running
  'git clone --recurse-submodules' to trigger the vulnerability.
* A 'ssh://...' URL can result in a 'ssh' command line with a
  hostname that begins with a dash '-', which would cause the
  'ssh' command to instead (mis)treat it as an option. This is
  now prevented by forbidding such a hostname (which should not
  impact any real-world usage).
* Similarly, when GIT_PROXY_COMMAND is configured, the command
  is run with host and port that are parsed out from 'ssh://...'
  URL; a poorly written GIT_PROXY_COMMAND could be tricked into
  treating a string that begins with a dash '-' as an option.
  This is now prevented by forbidding such a hostname and port
  number (again, which should not impact any real-world usage).
* In the same spirit, a repository name that begins with a dash
  '-' is also forbidden now.

git 2.14.0:

* Use of an empty string as a pathspec element that is used for
  'everything matches' is deprecated, use '.'
* Avoid blindly falling back to '.git' when the setup sequence
  indicates operation not on a Git repository
* 'indent heuristics' are now the default.
* Builds with pcre2
* Many bug fixes, improvements and updates

git 2.13.4:

* Update the character width tables.
* Fix an alias that contained an uppercase letter
* Progress meter fixes
* git gc concurrency fixes

git 2.13.3:

* various internal bug fixes
* Fix a  regression to 'git rebase -i'
* Correct unaligned 32-bit access in pack-bitmap code
* Tighten error checks for invalid 'git apply' input
* The split index code did not honor core.sharedrepository setting
  correctly
* Fix 'git branch --list' handling of color.branch.local

git 2.13.2:

* 'collision detecting' SHA-1 update for platform fixes
* 'git checkout --recurse-submodules' did not quite work with a
  submodule that itself has submodules.
* The 'run-command' API implementation has been made more robust
  against dead-locking in a threaded environment.
* 'git clean -d' now only cleans ignored files with '-x'
* 'git status --ignored'  did not list ignored and untracked files
  without '-uall'
* 'git pull --rebase --autostash' didn't auto-stash when the local
  history fast-forwards to the upstream.
* 'git describe --contains' gives as much weight to lightweight
  tags as annotated tags
* Fix 'git stash push &lt;pathspec&gt;' from a subdirectory

git 2.13.1:

* Setting 'log.decorate=false' in the configuration file did not
  take effect in v2.13, which has been corrected.
* corrections to documentation and command help output
* garbage collection fixes
* memory leaks fixed
* receive-pack now makes sure that the push certificate records
  the same set of push options used for pushing
* shell completion corrections for git stash
* fix 'git clone --config var=val' with empty strings
* internal efficiency improvements
* Update sha1 collision detection code for big-endian platforms
  and platforms not supporting unaligned fetches

- Fix packaging of documentation

git 2.13.0:

* empty string as a pathspec element for 'everything matches'
  is still warned, for future removal.
* deprecated argument order 'git merge &lt;msg&gt; HEAD &lt;commit&gt;...'
  was removed
* default location '~/.git-credential-cache/socket' for the
  socket used to communicate with the credential-cache daemon 
  moved to '~/.cache/git/credential/socket'.
* now avoid blindly falling back to '.git' when the setup
  sequence indicated otherwise
* many workflow features, improvements and bug fixes
* add a hardened implementation of SHA1 in response to practical
  collision attacks (CVE-2005-4900, bsc#1042640)
* CVE-2017-8386: On a server running git-shell as login shell to
  restrict user to git commands, remote users may have been able
  to have git service programs spawn an interactive pager
  and thus escape the shell restrictions. (bsc#1038395)

Changes in pcre2:

- Include the libraries, development and tools packages.
  
  git uses only libpcre2-8 so far, but this allows further
  application usage of pcre2.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-14"/>
	<updated date="2020-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167890">SUSE bug 1167890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5260">CVE-2020-5260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531808" comment="git-core-2.26.0-27.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531810" comment="libpcre2-16-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531811" comment="libpcre2-32-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531812" comment="libpcre2-8-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531813" comment="libpcre2-posix2-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531814" comment="perl-CGI-4.38-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152387" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184172" ref_url="https://bugzilla.suse.com/1184172" source="BUGZILLA"/>
		<reference ref_id="1184173" ref_url="https://bugzilla.suse.com/1184173" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3475" ref_url="https://www.suse.com/security/cve/CVE-2021-3475/" source="CVE"/>
		<reference ref_id="CVE-2021-3476" ref_url="https://www.suse.com/security/cve/CVE-2021-3476/" source="CVE"/>
		<description>
This update for openexr fixes the following issues:

- CVE-2021-3475: Integer-overflow in Imf_2_5::calculateNumTiles (bsc#1184173)
- CVE-2021-3476: Undefined-shift in Imf_2_5::unpack14 (bsc#1184172)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184172">SUSE bug 1184172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184173">SUSE bug 1184173</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3475/">CVE-2021-3475 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3475">CVE-2021-3475 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3476/">CVE-2021-3476 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3476">CVE-2021-3476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557684" comment="libIlmImf-Imf_2_1-21-2.1.0-6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557685" comment="openexr-2.1.0-6.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152388" version="1" class="patch">
	<metadata>
		<title>Security update for fwupdate (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<description>
This update for fwupdate fixes the following issues:

- Add SBAT section to EFI images (bsc#1182057)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-08"/>
	<updated date="2021-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538834" comment="fwupdate-0.5-10.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538835" comment="fwupdate-efi-0.5-10.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538836" comment="libfwup0-0.5-10.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152389" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184348" ref_url="https://bugzilla.suse.com/1184348" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30004" ref_url="https://www.suse.com/security/cve/CVE-2021-30004/" source="CVE"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-30004: Fixed an issue where forging attacks might have occured because AlgorithmIdentifier 
  parameters are mishandled in tls/pkcs1.c and tls/x509v3.c (bsc#1184348).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-09"/>
	<updated date="2021-04-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184348">SUSE bug 1184348</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30004/">CVE-2021-30004 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30004">CVE-2021-30004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557686" comment="wpa_supplicant-2.6-15.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152390" version="1" class="patch">
	<metadata>
		<title>Security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159133" ref_url="https://bugzilla.suse.com/1159133" source="BUGZILLA"/>
		<reference ref_id="1184221" ref_url="https://bugzilla.suse.com/1184221" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12420" ref_url="https://www.suse.com/security/cve/CVE-2019-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-1946" ref_url="https://www.suse.com/security/cve/CVE-2020-1946/" source="CVE"/>
		<description>
This update for spamassassin fixes the following issues:

- spamassassin was updated to version 3.4.5
- CVE-2019-12420: memory leak via crafted messages (bsc#1159133)
- CVE-2020-1946: security update (bsc#1184221)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-12"/>
	<updated date="2021-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159133">SUSE bug 1159133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184221">SUSE bug 1184221</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12420/">CVE-2019-12420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12420">CVE-2019-12420 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1946/">CVE-2020-1946 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1946">CVE-2020-1946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552206" comment="perl-Mail-SpamAssassin-3.4.5-44.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552207" comment="spamassassin-3.4.5-44.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152391" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1183239" ref_url="https://bugzilla.suse.com/1183239" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20208" ref_url="https://www.suse.com/security/cve/CVE-2021-20208/" source="CVE"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2021-20208: Fixed a potential kerberos auth leak escaping from container (bsc#1183239)	  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-13"/>
	<updated date="2021-04-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183239">SUSE bug 1183239</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20208/">CVE-2021-20208 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20208">CVE-2021-20208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557687" comment="cifs-utils-6.9-9.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152392" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180128" ref_url="https://bugzilla.suse.com/1180128" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-3472: XChangeFeedbackControl Integer Underflow Privilege Escalation (bsc#1180128)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180128">SUSE bug 1180128</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3472">CVE-2021-3472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552208" comment="xorg-x11-server-7.6_1.18.3-76.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552209" comment="xorg-x11-server-extra-7.6_1.18.3-76.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152393" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181256" ref_url="https://bugzilla.suse.com/1181256" source="BUGZILLA"/>
		<reference ref_id="1184532" ref_url="https://bugzilla.suse.com/1184532" source="BUGZILLA"/>
		<reference ref_id="1184533" ref_url="https://bugzilla.suse.com/1184533" source="BUGZILLA"/>
		<reference ref_id="1184534" ref_url="https://bugzilla.suse.com/1184534" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-1252" ref_url="https://www.suse.com/security/cve/CVE-2021-1252/" source="CVE"/>
		<reference ref_id="CVE-2021-1404" ref_url="https://www.suse.com/security/cve/CVE-2021-1404/" source="CVE"/>
		<reference ref_id="CVE-2021-1405" ref_url="https://www.suse.com/security/cve/CVE-2021-1405/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2021-1252: Fix for Excel XLM parser infinite loop. (bsc#1184532)
- CVE-2021-1404: Fix for PDF parser buffer over-read; possible crash. (bsc#1184533)
- CVE-2021-1405: Fix for mail parser NULL-dereference crash. (bsc#1184534)
- Fix errors when scanning files &gt; 4G (bsc#1181256)
- Update clamav.keyring
- Update to 0.103.2
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181256">SUSE bug 1181256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184532">SUSE bug 1184532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184533">SUSE bug 1184533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184534">SUSE bug 1184534</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1252/">CVE-2021-1252 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1252">CVE-2021-1252 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1404/">CVE-2021-1404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1404">CVE-2021-1404 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1405/">CVE-2021-1405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1405">CVE-2021-1405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552210" comment="clamav-0.103.2-33.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152394" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172383" ref_url="https://bugzilla.suse.com/1172383" source="BUGZILLA"/>
		<reference ref_id="1172384" ref_url="https://bugzilla.suse.com/1172384" source="BUGZILLA"/>
		<reference ref_id="1172385" ref_url="https://bugzilla.suse.com/1172385" source="BUGZILLA"/>
		<reference ref_id="1172386" ref_url="https://bugzilla.suse.com/1172386" source="BUGZILLA"/>
		<reference ref_id="1172478" ref_url="https://bugzilla.suse.com/1172478" source="BUGZILLA"/>
		<reference ref_id="1173612" ref_url="https://bugzilla.suse.com/1173612" source="BUGZILLA"/>
		<reference ref_id="1174386" ref_url="https://bugzilla.suse.com/1174386" source="BUGZILLA"/>
		<reference ref_id="1174641" ref_url="https://bugzilla.suse.com/1174641" source="BUGZILLA"/>
		<reference ref_id="1175441" ref_url="https://bugzilla.suse.com/1175441" source="BUGZILLA"/>
		<reference ref_id="1176673" ref_url="https://bugzilla.suse.com/1176673" source="BUGZILLA"/>
		<reference ref_id="1176682" ref_url="https://bugzilla.suse.com/1176682" source="BUGZILLA"/>
		<reference ref_id="1176684" ref_url="https://bugzilla.suse.com/1176684" source="BUGZILLA"/>
		<reference ref_id="1178174" ref_url="https://bugzilla.suse.com/1178174" source="BUGZILLA"/>
		<reference ref_id="1178934" ref_url="https://bugzilla.suse.com/1178934" source="BUGZILLA"/>
		<reference ref_id="1179467" ref_url="https://bugzilla.suse.com/1179467" source="BUGZILLA"/>
		<reference ref_id="1179468" ref_url="https://bugzilla.suse.com/1179468" source="BUGZILLA"/>
		<reference ref_id="1180523" ref_url="https://bugzilla.suse.com/1180523" source="BUGZILLA"/>
		<reference ref_id="1181108" ref_url="https://bugzilla.suse.com/1181108" source="BUGZILLA"/>
		<reference ref_id="1181639" ref_url="https://bugzilla.suse.com/1181639" source="BUGZILLA"/>
		<reference ref_id="1182137" ref_url="https://bugzilla.suse.com/1182137" source="BUGZILLA"/>
		<reference ref_id="1182425" ref_url="https://bugzilla.suse.com/1182425" source="BUGZILLA"/>
		<reference ref_id="1182577" ref_url="https://bugzilla.suse.com/1182577" source="BUGZILLA"/>
		<reference ref_id="1182968" ref_url="https://bugzilla.suse.com/1182968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11947" ref_url="https://www.suse.com/security/cve/CVE-2020-11947/" source="CVE"/>
		<reference ref_id="CVE-2020-12829" ref_url="https://www.suse.com/security/cve/CVE-2020-12829/" source="CVE"/>
		<reference ref_id="CVE-2020-13361" ref_url="https://www.suse.com/security/cve/CVE-2020-13361/" source="CVE"/>
		<reference ref_id="CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362/" source="CVE"/>
		<reference ref_id="CVE-2020-13659" ref_url="https://www.suse.com/security/cve/CVE-2020-13659/" source="CVE"/>
		<reference ref_id="CVE-2020-13765" ref_url="https://www.suse.com/security/cve/CVE-2020-13765/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-15469" ref_url="https://www.suse.com/security/cve/CVE-2020-15469/" source="CVE"/>
		<reference ref_id="CVE-2020-15863" ref_url="https://www.suse.com/security/cve/CVE-2020-15863/" source="CVE"/>
		<reference ref_id="CVE-2020-16092" ref_url="https://www.suse.com/security/cve/CVE-2020-16092/" source="CVE"/>
		<reference ref_id="CVE-2020-25084" ref_url="https://www.suse.com/security/cve/CVE-2020-25084/" source="CVE"/>
		<reference ref_id="CVE-2020-25624" ref_url="https://www.suse.com/security/cve/CVE-2020-25624/" source="CVE"/>
		<reference ref_id="CVE-2020-25625" ref_url="https://www.suse.com/security/cve/CVE-2020-25625/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-27617" ref_url="https://www.suse.com/security/cve/CVE-2020-27617/" source="CVE"/>
		<reference ref_id="CVE-2020-28916" ref_url="https://www.suse.com/security/cve/CVE-2020-28916/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29443" ref_url="https://www.suse.com/security/cve/CVE-2020-29443/" source="CVE"/>
		<reference ref_id="CVE-2021-20181" ref_url="https://www.suse.com/security/cve/CVE-2021-20181/" source="CVE"/>
		<reference ref_id="CVE-2021-20203" ref_url="https://www.suse.com/security/cve/CVE-2021-20203/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-3416" ref_url="https://www.suse.com/security/cve/CVE-2021-3416/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

- Fix OOB access in sm501 device emulation (CVE-2020-12829, bsc#1172385)
- Fix OOB access possibility in MegaRAID SAS 8708EM2 emulation (CVE-2020-13362 bsc#1172383)
- Fix use-after-free in usb xhci packet handling (CVE-2020-25723, bsc#1178934)
- Fix use-after-free in usb ehci packet handling (CVE-2020-25084, bsc#1176673)
- Fix OOB access in usb hcd-ohci emulation (CVE-2020-25624, bsc#1176682)
- Fix infinite loop (DoS) in usb hcd-ohci emulation (CVE-2020-25625, bsc#1176684)
- Fix guest triggerable assert in shared network handling code (CVE-2020-27617, bsc#1178174)
- Fix infinite loop (DoS) in e1000e device emulation (CVE-2020-28916, bsc#1179468)
- Fix OOB access in atapi emulation (CVE-2020-29443, bsc#1181108)
- Fix null pointer deref. (DoS) in mmio ops (CVE-2020-15469, bsc#1173612)
- Fix infinite loop (DoS) in e1000 device emulation (CVE-2021-20257, bsc#1182577)
- Fix OOB access (stack overflow) in rtl8139 NIC emulation (CVE-2021-3416, bsc#1182968)
- Fix OOB access (stack overflow) in other NIC emulations (CVE-2021-3416)
- Fix OOB access in SLIRP ARP packet processing (CVE-2020-29130, bsc#1179467)
- Fix null pointer dereference possibility (DoS) in MegaRAID SAS 8708EM2 emulation (CVE-2020-13659 bsc#1172386
- Fix OOB access in iscsi (CVE-2020-11947 bsc#1180523)
- Fix OOB access in vmxnet3 emulation (CVE-2021-20203 bsc#1181639)
- Fix buffer overflow in the XGMAC device (CVE-2020-15863, bsc#1174386)
- Fix DoS in packet processing of various emulated NICs (CVE-2020-16092 bsc#1174641)
- Fix OOB access while processing USB packets (CVE-2020-14364 bsc#1175441)
- Fix package scripts to not use hard coded paths for temporary working directories and log files (bsc#1182425)
- Fix potential privilege escalation in virtfs (CVE-2021-20181 bsc#1182137)
- Fix OOB access possibility in ES1370 audio device emulation (CVE-2020-13361 bsc#1172384)
- Fix OOB access in ROM loading (CVE-2020-13765 bsc#1172478)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-16"/>
	<updated date="2021-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172383">SUSE bug 1172383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172384">SUSE bug 1172384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172385">SUSE bug 1172385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172386">SUSE bug 1172386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172478">SUSE bug 1172478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173612">SUSE bug 1173612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174386">SUSE bug 1174386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174641">SUSE bug 1174641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175441">SUSE bug 1175441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176673">SUSE bug 1176673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176682">SUSE bug 1176682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176684">SUSE bug 1176684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178174">SUSE bug 1178174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178934">SUSE bug 1178934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179468">SUSE bug 1179468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180523">SUSE bug 1180523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181108">SUSE bug 1181108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181639">SUSE bug 1181639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182137">SUSE bug 1182137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182425">SUSE bug 1182425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182577">SUSE bug 1182577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182968">SUSE bug 1182968</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11947/">CVE-2020-11947 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11947">CVE-2020-11947 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12829/">CVE-2020-12829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12829">CVE-2020-12829 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13361/">CVE-2020-13361 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13361">CVE-2020-13361 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13362">CVE-2020-13362 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13659/">CVE-2020-13659 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13659">CVE-2020-13659 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13765/">CVE-2020-13765 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13765">CVE-2020-13765 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15469/">CVE-2020-15469 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15469">CVE-2020-15469 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15863/">CVE-2020-15863 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15863">CVE-2020-15863 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16092/">CVE-2020-16092 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16092">CVE-2020-16092 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25084/">CVE-2020-25084 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25084">CVE-2020-25084 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25624/">CVE-2020-25624 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25624">CVE-2020-25624 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25625/">CVE-2020-25625 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25625">CVE-2020-25625 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25723">CVE-2020-25723 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27617/">CVE-2020-27617 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27617">CVE-2020-27617 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28916/">CVE-2020-28916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28916">CVE-2020-28916 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29443/">CVE-2020-29443 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29443">CVE-2020-29443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20181/">CVE-2021-20181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20181">CVE-2021-20181 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20203/">CVE-2021-20203 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20203">CVE-2021-20203 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3416/">CVE-2021-3416 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3416">CVE-2021-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555875" comment="qemu-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555876" comment="qemu-block-curl-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555877" comment="qemu-block-iscsi-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538845" comment="qemu-block-rbd-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555878" comment="qemu-block-ssh-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555879" comment="qemu-guest-agent-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538848" comment="qemu-ipxe-1.0.0+-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538849" comment="qemu-kvm-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555880" comment="qemu-lang-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538852" comment="qemu-seabios-1.10.2_0_g5f4c7b1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538853" comment="qemu-sgabios-8-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555881" comment="qemu-tools-2.9.1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538855" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-6.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538856" comment="qemu-x86-2.9.1-6.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152395" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182431" ref_url="https://bugzilla.suse.com/1182431" source="BUGZILLA"/>
		<reference ref_id="1182846" ref_url="https://bugzilla.suse.com/1182846" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-27379" ref_url="https://www.suse.com/security/cve/CVE-2021-27379/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-20257: xen: infinite loop issue in the e1000 NIC emulator (bsc#1182846).
- CVE-2021-27379: Fixed an issue where entries in the IOMMU were not being updated 
  under certain circumstances due to improper backport of XSA-321 (XSA-366, bsc#1182431).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-19"/>
	<updated date="2021-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182431">SUSE bug 1182431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27379/">CVE-2021-27379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27379">CVE-2021-27379 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538857" comment="xen-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538858" comment="xen-doc-html-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538859" comment="xen-libs-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538860" comment="xen-libs-32bit-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538861" comment="xen-tools-4.9.4_16-3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538862" comment="xen-tools-domU-4.9.4_16-3.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152396" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1183936" ref_url="https://bugzilla.suse.com/1183936" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<description>
This update for sudo fixes the following issues:

- L3: Tenable Scan reports sudo is vulnerable to CVE-2021-3156 (bsc#1183936)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183936">SUSE bug 1183936</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3156">CVE-2021-3156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555882" comment="sudo-1.8.20p2-3.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152397" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184624" ref_url="https://bugzilla.suse.com/1184624" source="BUGZILLA"/>
		<reference ref_id="1184626" ref_url="https://bugzilla.suse.com/1184626" source="BUGZILLA"/>
		<reference ref_id="1184627" ref_url="https://bugzilla.suse.com/1184627" source="BUGZILLA"/>
		<reference ref_id="1184628" ref_url="https://bugzilla.suse.com/1184628" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20309" ref_url="https://www.suse.com/security/cve/CVE-2021-20309/" source="CVE"/>
		<reference ref_id="CVE-2021-20311" ref_url="https://www.suse.com/security/cve/CVE-2021-20311/" source="CVE"/>
		<reference ref_id="CVE-2021-20312" ref_url="https://www.suse.com/security/cve/CVE-2021-20312/" source="CVE"/>
		<reference ref_id="CVE-2021-20313" ref_url="https://www.suse.com/security/cve/CVE-2021-20313/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20309: Division by zero in WaveImage() of MagickCore/visual-effects. (bsc#1184624)
- CVE-2021-20311: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c (bsc#1184626)
- CVE-2021-20312: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c (bsc#1184627)
- CVE-2021-20313: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c (bsc#1184628)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184624">SUSE bug 1184624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184626">SUSE bug 1184626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184627">SUSE bug 1184627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184628">SUSE bug 1184628</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20309/">CVE-2021-20309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20309">CVE-2021-20309 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20311/">CVE-2021-20311 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20311">CVE-2021-20311 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20312/">CVE-2021-20312 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20312">CVE-2021-20312 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20313/">CVE-2021-20313 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20313">CVE-2021-20313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557688" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.165.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557689" comment="ImageMagick-config-6-upstream-6.8.8.1-71.165.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557690" comment="libMagickCore-6_Q16-1-6.8.8.1-71.165.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557691" comment="libMagickWand-6_Q16-1-6.8.8.1-71.165.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152398" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178909" ref_url="https://bugzilla.suse.com/1178909" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25709" ref_url="https://www.suse.com/security/cve/CVE-2020-25709/" source="CVE"/>
		<reference ref_id="CVE-2020-25710" ref_url="https://www.suse.com/security/cve/CVE-2020-25710/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25709: Fixed a crash caused by specially crafted network traffic (bsc#1178909).
- CVE-2020-25710: Fixed a crash caused by specially crafted network traffic (bsc#1178909).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-14"/>
	<updated date="2021-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178909">SUSE bug 1178909</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25709/">CVE-2020-25709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25709">CVE-2020-25709 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25710/">CVE-2020-25710 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25710">CVE-2020-25710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557692" comment="libldap-2_4-2-2.4.41-18.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557693" comment="libldap-2_4-2-32bit-2.4.41-18.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557694" comment="openldap2-2.4.41-18.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557695" comment="openldap2-back-meta-2.4.41-18.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557696" comment="openldap2-client-2.4.41-18.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557697" comment="openldap2-doc-2.4.41-18.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557698" comment="openldap2-ppolicy-check-password-1.2-18.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152399" version="1" class="patch">
	<metadata>
		<title>Security update for apache-commons-io (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184755" ref_url="https://bugzilla.suse.com/1184755" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29425" ref_url="https://www.suse.com/security/cve/CVE-2021-29425/" source="CVE"/>
		<description>
This update for apache-commons-io fixes the following issues:

- CVE-2021-29425: Limited path traversal when invoking the method FileNameUtils.normalize 
  with an improper input string (bsc#1184755).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-26"/>
	<updated date="2021-04-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184755">SUSE bug 1184755</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29425/">CVE-2021-29425 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29425">CVE-2021-29425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543102" comment="apache-commons-io-2.4-9.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152400" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184960" ref_url="https://bugzilla.suse.com/1184960" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.10.0 ESR (bsc#1184960)
  * CVE-2021-23994: Out of bound write due to lazy initialization
  * CVE-2021-23995: Use-after-free in Responsive Design Mode
  * CVE-2021-23998: Secure Lock icon could have been spoofed
  * CVE-2021-23961: More internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23999: Blob URLs may have been granted additional privileges
  * CVE-2021-24002: Arbitrary FTP command execution on FTP servers using an encoded URL
  * CVE-2021-29945: Incorrect size computation in WebAssembly JIT could lead to null-reads
  * CVE-2021-29946: Port blocking could be bypassed
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-27"/>
	<updated date="2021-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23961">CVE-2021-23961 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23994">CVE-2021-23994 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23995">CVE-2021-23995 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23998">CVE-2021-23998 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23999">CVE-2021-23999 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24002">CVE-2021-24002 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29945">CVE-2021-29945 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29946">CVE-2021-29946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552225" comment="MozillaFirefox-78.10.0-112.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552226" comment="MozillaFirefox-devel-78.10.0-112.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552227" comment="MozillaFirefox-translations-common-78.10.0-112.57.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152401" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1183933" ref_url="https://bugzilla.suse.com/1183933" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22876" ref_url="https://www.suse.com/security/cve/CVE-2021-22876/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22876: Fixed an issue where the automatic referer was leaking credentials (bsc#1183933).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183933">SUSE bug 1183933</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22876/">CVE-2021-22876 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22876">CVE-2021-22876 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557699" comment="curl-7.37.0-37.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557700" comment="libcurl4-7.37.0-37.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557701" comment="libcurl4-32bit-7.37.0-37.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152402" version="1" class="patch">
	<metadata>
		<title>Security update for libnettle (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1183835" ref_url="https://bugzilla.suse.com/1183835" source="BUGZILLA"/>
		<reference ref_id="1184401" ref_url="https://bugzilla.suse.com/1184401" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20305" ref_url="https://www.suse.com/security/cve/CVE-2021-20305/" source="CVE"/>
		<description>
This update for libnettle fixes the following issues:

- CVE-2021-20305: Fixed the multiply function which was being called with out-of-range scalars (bsc#1184401, bsc#1183835).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183835">SUSE bug 1183835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184401">SUSE bug 1184401</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20305/">CVE-2021-20305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20305">CVE-2021-20305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552228" comment="libhogweed2-2.7.1-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538876" comment="libhogweed2-32bit-2.7.1-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552229" comment="libnettle4-2.7.1-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538878" comment="libnettle4-32bit-2.7.1-13.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152403" version="1" class="patch">
	<metadata>
		<title>Security update for gdm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184456" ref_url="https://bugzilla.suse.com/1184456" source="BUGZILLA"/>
		<description>
This update for gdm fixes the following issues:

-  Avoid the signal SIGTRAP when gdm exits (bsc#1184456).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184456">SUSE bug 1184456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552230" comment="gdm-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538880" comment="gdm-lang-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538881" comment="gdmflexiserver-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552231" comment="libgdm1-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552232" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152404" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182909" ref_url="https://bugzilla.suse.com/1182909" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25329" ref_url="https://www.suse.com/security/cve/CVE-2021-25329/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2021-25329: Complete fix for CVE-2020-9484 (bsc#1182909)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182909">SUSE bug 1182909</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25329/">CVE-2021-25329 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25329">CVE-2021-25329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538884" comment="tomcat-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538885" comment="tomcat-admin-webapps-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538886" comment="tomcat-docs-webapp-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538887" comment="tomcat-el-3_0-api-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538888" comment="tomcat-javadoc-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538889" comment="tomcat-jsp-2_3-api-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538890" comment="tomcat-lib-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538891" comment="tomcat-servlet-3_1-api-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538892" comment="tomcat-webapps-8.0.53-29.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152405" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.25 - OpenJDK 7u291 (January 2021 CPU, bsc#1181239)
  * Security fixes
    + JDK-8247619: Improve Direct Buffering of Characters
  * Import of OpenJDK 7 u291 build 1
    + JDK-8254177: (tz) Upgrade time-zone data to tzdata2020b
    + JDK-8254982: (tz) Upgrade time-zone data to tzdata2020c
    + JDK-8255226: (tz) Upgrade time-zone data to tzdata2020d
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552233" comment="java-1_7_0-openjdk-1.7.0.291-43.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552234" comment="java-1_7_0-openjdk-demo-1.7.0.291-43.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552235" comment="java-1_7_0-openjdk-devel-1.7.0.291-43.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552236" comment="java-1_7_0-openjdk-headless-1.7.0.291-43.47.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152406" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184161" ref_url="https://bugzilla.suse.com/1184161" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25317" ref_url="https://www.suse.com/security/cve/CVE-2021-25317/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2021-25317: ownership of /var/log/cups could allow privilege escalation from lp user to root via symlink attacks (bsc#1184161)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184161">SUSE bug 1184161</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-25317/">CVE-2021-25317 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25317">CVE-2021-25317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552282" comment="cups-1.7.5-20.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552283" comment="cups-client-1.7.5-20.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552284" comment="cups-libs-1.7.5-20.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538900" comment="cups-libs-32bit-1.7.5-20.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152407" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181495" ref_url="https://bugzilla.suse.com/1181495" source="BUGZILLA"/>
		<reference ref_id="1185345" ref_url="https://bugzilla.suse.com/1185345" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214/" source="CVE"/>
		<reference ref_id="CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215/" source="CVE"/>
		<reference ref_id="CVE-2021-25216" ref_url="https://www.suse.com/security/cve/CVE-2021-25216/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25214: Fixed a broken inbound incremental zone update (IXFR) which could have caused named to terminate unexpectedly (bsc#1185345).
- CVE-2021-25215: Fixed an assertion check which could have failed while answering queries for DNAME records that required the DNAME to be processed to resolve itself (bsc#1185345).
- CVE-2021-25216: Fixed an issue where policy negotiation can be targeted by a buffer overflow attack (bsc#1185345).
- MD5 warning message using host, dig, nslookup (bind-utils) with FIPS enabled (bsc#1181495).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181495">SUSE bug 1181495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25214">CVE-2021-25214 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25215">CVE-2021-25215 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25216/">CVE-2021-25216 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25216">CVE-2021-25216 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552285" comment="bind-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552286" comment="bind-chrootenv-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538903" comment="bind-doc-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552287" comment="bind-libs-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538905" comment="bind-libs-32bit-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552288" comment="bind-utils-9.9.9P1-63.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152408" version="1" class="patch">
	<metadata>
		<title>Security update for python36 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1183374" ref_url="https://bugzilla.suse.com/1183374" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3426" ref_url="https://www.suse.com/security/cve/CVE-2021-3426/" source="CVE"/>
		<description>
This update for python36 fixes the following issues:

- CVE-2021-3426: Fixed an information disclosure via pydoc (bsc#1183374).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183374">SUSE bug 1183374</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3426/">CVE-2021-3426 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3426">CVE-2021-3426 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557702" comment="libpython3_6m1_0-3.6.13-6.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557703" comment="python36-3.6.13-6.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557704" comment="python36-base-3.6.13-6.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557705" comment="python36-curses-3.6.13-6.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557706" comment="python36-dbm-3.6.13-6.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557707" comment="python36-devel-3.6.13-6.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557708" comment="python36-doc-3.6.13-6.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557709" comment="python36-idle-3.6.13-6.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557710" comment="python36-testsuite-3.6.13-6.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557711" comment="python36-tk-3.6.13-6.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557712" comment="python36-tools-3.6.13-6.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152409" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178469" ref_url="https://bugzilla.suse.com/1178469" source="BUGZILLA"/>
		<reference ref_id="1179156" ref_url="https://bugzilla.suse.com/1179156" source="BUGZILLA"/>
		<reference ref_id="1184677" ref_url="https://bugzilla.suse.com/1184677" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-20254: Fixed a buffer overrun in sids_to_unixids() (bsc#1184677).
- Avoid free'ing our own pointer in memcache when memcache_trim attempts to reduce cache size (bsc#1179156).
- Adjust smbcacls '--propagate-inheritance' feature to align with upstream (bsc#1178469).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178469">SUSE bug 1178469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179156">SUSE bug 1179156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184677">SUSE bug 1184677</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20254">CVE-2021-20254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555883" comment="libdcerpc-binding0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538908" comment="libdcerpc-binding0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555884" comment="libdcerpc0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538910" comment="libdcerpc0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555885" comment="libndr-krb5pac0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538912" comment="libndr-krb5pac0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555886" comment="libndr-nbt0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538914" comment="libndr-nbt0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555887" comment="libndr-standard0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538916" comment="libndr-standard0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555888" comment="libndr0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538918" comment="libndr0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555889" comment="libnetapi0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538920" comment="libnetapi0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555890" comment="libsamba-credentials0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538922" comment="libsamba-credentials0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555891" comment="libsamba-errors0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538924" comment="libsamba-errors0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555892" comment="libsamba-hostconfig0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538926" comment="libsamba-hostconfig0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555893" comment="libsamba-passdb0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538928" comment="libsamba-passdb0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555894" comment="libsamba-util0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538930" comment="libsamba-util0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555895" comment="libsamdb0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538932" comment="libsamdb0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555896" comment="libsmbclient0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538934" comment="libsmbclient0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555897" comment="libsmbconf0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538936" comment="libsmbconf0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555898" comment="libsmbldap0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538938" comment="libsmbldap0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555899" comment="libtevent-util0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538940" comment="libtevent-util0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555900" comment="libwbclient0-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538942" comment="libwbclient0-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555901" comment="samba-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555902" comment="samba-client-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538945" comment="samba-client-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538946" comment="samba-doc-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555903" comment="samba-libs-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538948" comment="samba-libs-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555904" comment="samba-winbind-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538950" comment="samba-winbind-32bit-4.6.16+git.282.cfafed5922a-3.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152410" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184521" ref_url="https://bugzilla.suse.com/1184521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468/" source="CVE"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2021-3468: avoid infinite loop by handling  HUP event in client_work (bsc#1184521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-03"/>
	<updated date="2021-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184521">SUSE bug 1184521</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3468">CVE-2021-3468 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552289" comment="avahi-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538952" comment="avahi-lang-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552290" comment="avahi-utils-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552291" comment="libavahi-client3-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538955" comment="libavahi-client3-32bit-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552292" comment="libavahi-common3-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538957" comment="libavahi-common3-32bit-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552293" comment="libavahi-core7-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552294" comment="libavahi-glib1-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538960" comment="libavahi-glib1-32bit-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552295" comment="libdns_sd-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538962" comment="libdns_sd-32bit-0.6.32-32.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152411" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in entities.c:xmlEncodeEntitiesInternal (bsc#1185409).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-05"/>
	<updated date="2021-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557713" comment="libxml2-2-2.9.4-46.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557714" comment="libxml2-2-32bit-2.9.4-46.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557715" comment="libxml2-doc-2.9.4-46.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557716" comment="libxml2-tools-2.9.4-46.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557717" comment="python-libxml2-2.9.4-46.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152412" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1085803" ref_url="https://bugzilla.suse.com/1085803" source="BUGZILLA"/>
		<reference ref_id="1185279" ref_url="https://bugzilla.suse.com/1185279" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7544" ref_url="https://www.suse.com/security/cve/CVE-2018-7544/" source="CVE"/>
		<reference ref_id="CVE-2020-15078" ref_url="https://www.suse.com/security/cve/CVE-2020-15078/" source="CVE"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2020-15078: Fixed authentication bypass with deferred authentication (bsc#1185279).
- CVE-2018-7544: Fixed cross-protocol scripting issue that was discovered in the management interface (bsc#1085803).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-12"/>
	<updated date="2021-05-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085803">SUSE bug 1085803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185279">SUSE bug 1185279</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7544/">CVE-2018-7544 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7544">CVE-2018-7544 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15078/">CVE-2020-15078 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15078">CVE-2020-15078 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557718" comment="openvpn-2.3.8-16.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557719" comment="openvpn-auth-pam-plugin-2.3.8-16.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152413" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="CVE-2020-27619" ref_url="https://www.suse.com/security/cve/CVE-2020-27619/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

Security issues fixed:

- CVE-2020-27619: where Lib/test/multibytecodec_support calls eval() on content retrieved via HTTP. (bsc#1178009)

Other fixes:

- Make sure to close the 'import_failed.map' file after the exception
  has been raised in order to avoid ResourceWarnings when the
  failing import is part of a try...except block
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-17"/>
	<updated date="2021-05-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27619/">CVE-2020-27619 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27619">CVE-2020-27619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552303" comment="libpython3_4m1_0-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552304" comment="python3-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552305" comment="python3-base-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552306" comment="python3-curses-3.4.10-25.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152414" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185900" ref_url="https://bugzilla.suse.com/1185900" source="BUGZILLA"/>
		<reference ref_id="1185904" ref_url="https://bugzilla.suse.com/1185904" source="BUGZILLA"/>
		<reference ref_id="1185905" ref_url="https://bugzilla.suse.com/1185905" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18804" ref_url="https://www.suse.com/security/cve/CVE-2019-18804/" source="CVE"/>
		<reference ref_id="CVE-2021-32491" ref_url="https://www.suse.com/security/cve/CVE-2021-32491/" source="CVE"/>
		<reference ref_id="CVE-2021-32492" ref_url="https://www.suse.com/security/cve/CVE-2021-32492/" source="CVE"/>
		<reference ref_id="CVE-2021-32493" ref_url="https://www.suse.com/security/cve/CVE-2021-32493/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

Security issues fixed:

- CVE-2021-32491 [bsc#1185900]: Integer overflow in function render() in tools/ddjvu via crafted djvu file
- CVE-2021-32492 [bsc#1185904]: Out of bounds read in function DJVU:DataPool:has_data() via crafted djvu file
- CVE-2021-32493 [bsc#1185905]: Heap buffer overflow in function DJVU:GBitmap:decode() via crafted djvu file
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185900">SUSE bug 1185900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185904">SUSE bug 1185904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185905">SUSE bug 1185905</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18804/">CVE-2019-18804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18804">CVE-2019-18804 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32491/">CVE-2021-32491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32491">CVE-2021-32491 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32492/">CVE-2021-32492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32492">CVE-2021-32492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32493/">CVE-2021-32493 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32493">CVE-2021-32493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552307" comment="libdjvulibre21-3.5.25.3-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152415" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185833" ref_url="https://bugzilla.suse.com/1185833" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-18032" ref_url="https://www.suse.com/security/cve/CVE-2020-18032/" source="CVE"/>
		<description>
This update for graphviz fixes the following issues:

- CVE-2020-18032: Fixed possible remote code execution via buffer overflow (bsc#1185833).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185833">SUSE bug 1185833</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-18032/">CVE-2020-18032 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18032">CVE-2020-18032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552308" comment="graphviz-2.28.0-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552309" comment="graphviz-gd-2.28.0-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552310" comment="graphviz-gnome-2.28.0-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552311" comment="graphviz-tcl-2.28.0-29.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152416" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="1185698" ref_url="https://bugzilla.suse.com/1185698" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:

CVE-2021-3537: NULL pointer dereference in valid.c:xmlValidBuildAContentModel (bsc#1185698)
- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in entities.c:xmlEncodeEntitiesInternal (bsc#1185409).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185698">SUSE bug 1185698</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">CVE-2021-3537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552312" comment="libxml2-2-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538983" comment="libxml2-2-32bit-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538984" comment="libxml2-doc-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552313" comment="libxml2-tools-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552314" comment="python-libxml2-2.9.4-46.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152417" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176076" ref_url="https://bugzilla.suse.com/1176076" source="BUGZILLA"/>
		<reference ref_id="1177077" ref_url="https://bugzilla.suse.com/1177077" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681/" source="CVE"/>
		<reference ref_id="CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682/" source="CVE"/>
		<reference ref_id="CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683/" source="CVE"/>
		<reference ref_id="CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684/" source="CVE"/>
		<reference ref_id="CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685/" source="CVE"/>
		<reference ref_id="CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686/" source="CVE"/>
		<reference ref_id="CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687/" source="CVE"/>
		<description>
This update for dnsmasq fixes the following issues:

- bsc#1177077: Fixed DNSpooq vulnerabilities
- CVE-2020-25684, CVE-2020-25685, CVE-2020-25686:
  Fixed multiple Cache Poisoning attacks.
- CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687:
  Fixed multiple potential Heap-based overflows when DNSSEC is
  enabled.

- Retry query to other servers on receipt of SERVFAIL rcode
  (bsc#1176076)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-19"/>
	<updated date="2021-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176076">SUSE bug 1176076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25681">CVE-2020-25681 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25682">CVE-2020-25682 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25683">CVE-2020-25683 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25684">CVE-2020-25684 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25685">CVE-2020-25685 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25686">CVE-2020-25686 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25687">CVE-2020-25687 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531824" comment="dnsmasq-2.78-18.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152418" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186114" ref_url="https://bugzilla.suse.com/1186114" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22898: Fixed curl TELNET stack contents disclosure (bsc#1186114).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-26"/>
	<updated date="2021-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186114">SUSE bug 1186114</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">CVE-2021-22898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557720" comment="curl-7.37.0-37.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557721" comment="libcurl4-7.37.0-37.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557722" comment="libcurl4-32bit-7.37.0-37.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152419" version="1" class="patch">
	<metadata>
		<title>Security update for flac (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180099" ref_url="https://bugzilla.suse.com/1180099" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0499" ref_url="https://www.suse.com/security/cve/CVE-2020-0499/" source="CVE"/>
		<description>
This update for flac fixes the following issues:

- CVE-2020-0499: Fixed an out-of-bounds access (bsc#1180099).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180099">SUSE bug 1180099</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0499/">CVE-2020-0499 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0499">CVE-2020-0499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531825" comment="libFLAC++6-1.3.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531826" comment="libFLAC8-1.3.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531827" comment="libFLAC8-32bit-1.3.0-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152420" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Convert-ASN1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1168934" ref_url="https://bugzilla.suse.com/1168934" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7488" ref_url="https://www.suse.com/security/cve/CVE-2013-7488/" source="CVE"/>
		<description>
This update for perl-Convert-ASN1 fixes the following issue:

- CVE-2013-7488: Fixed an infinite loop via unexpected input (bsc#1168934).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-19"/>
	<updated date="2021-01-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168934">SUSE bug 1168934</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-7488/">CVE-2013-7488 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7488">CVE-2013-7488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557723" comment="perl-Convert-ASN1-0.26-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152421" version="1" class="patch">
	<metadata>
		<title>Security update for hivex (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185013" ref_url="https://bugzilla.suse.com/1185013" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3504" ref_url="https://www.suse.com/security/cve/CVE-2021-3504/" source="CVE"/>
		<description>
This update for hivex fixes the following issues:

- CVE-2021-3504: hivex: missing bounds check within hivex_open() (bsc#1185013)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-26"/>
	<updated date="2021-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185013">SUSE bug 1185013</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3504/">CVE-2021-3504 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3504">CVE-2021-3504 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557724" comment="libhivex0-1.3.10-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557725" comment="perl-Win-Hivex-1.3.10-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152422" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182506" ref_url="https://bugzilla.suse.com/1182506" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<description>
This update for libX11 fixes the following issues:

- CVE-2021-31535: Fixed missing request length checks in libX11 (bsc#1182506).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-26"/>
	<updated date="2021-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182506">SUSE bug 1182506</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31535">CVE-2021-31535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557726" comment="libX11-6-1.6.2-12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557727" comment="libX11-6-32bit-1.6.2-12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557728" comment="libX11-data-1.6.2-12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557729" comment="libX11-xcb1-1.6.2-12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557730" comment="libX11-xcb1-32bit-1.6.2-12.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152423" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178961" ref_url="https://bugzilla.suse.com/1178961" source="BUGZILLA"/>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1183118" ref_url="https://bugzilla.suse.com/1183118" source="BUGZILLA"/>
		<reference ref_id="1183168" ref_url="https://bugzilla.suse.com/1183168" source="BUGZILLA"/>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<description>
This update for postgresql96 fixes the following issues:

- Upgrade to version 9.6.22.
- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).

- Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).
- Re-enable build of the llvmjit subpackage on SLE, but it will only be delivered on PackageHub for now (bsc#1183118).
- Disable icu for PostgreSQL 10 (and older) on TW (bsc#1179945).
- Fixed %ghost the symlinks to pg_config and ecpg (bsc#1178961).
- BuildRequire libpq5 and libecpg6 when not building them to avoid dangling symlinks in the devel package (bsc#1179765).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-26"/>
	<updated date="2021-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178961">SUSE bug 1178961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183118">SUSE bug 1183118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183168">SUSE bug 1183168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557731" comment="postgresql96-9.6.22-6.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557732" comment="postgresql96-contrib-9.6.22-6.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557733" comment="postgresql96-docs-9.6.22-6.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557734" comment="postgresql96-plperl-9.6.22-6.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557735" comment="postgresql96-plpython-9.6.22-6.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557736" comment="postgresql96-pltcl-9.6.22-6.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557737" comment="postgresql96-server-9.6.22-6.12.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152424" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1183118" ref_url="https://bugzilla.suse.com/1183118" source="BUGZILLA"/>
		<reference ref_id="1183168" ref_url="https://bugzilla.suse.com/1183168" source="BUGZILLA"/>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

- Upgrade to version 10.17:
- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).

- Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).
- Re-enable build of the llvmjit subpackage on SLE, but it will only be delivered on PackageHub for now (bsc#1183118).
- Disable icu for PostgreSQL 10 (and older) on TW (bsc#1179945).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-27"/>
	<updated date="2021-05-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183118">SUSE bug 1183118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183168">SUSE bug 1183168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557738" comment="postgresql10-10.17-4.16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557739" comment="postgresql10-contrib-10.17-4.16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557740" comment="postgresql10-docs-10.17-4.16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557741" comment="postgresql10-server-10.17-4.16.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152425" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1183118" ref_url="https://bugzilla.suse.com/1183118" source="BUGZILLA"/>
		<reference ref_id="1183168" ref_url="https://bugzilla.suse.com/1183168" source="BUGZILLA"/>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="1185926" ref_url="https://bugzilla.suse.com/1185926" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="CVE-2021-32029" ref_url="https://www.suse.com/security/cve/CVE-2021-32029/" source="CVE"/>
		<description>
This update for postgresql13 fixes the following issues:

- Upgrade to version 13.3:
- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).
- CVE-2021-32029: Fixed possibly-incorrect computation of UPDATE ... RETURNING 'pg_psql_temporary_savepoint' does not exist (bsc#1185926).
 
- Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).
- Re-enable build of the llvmjit subpackage on SLE, but it will only be delivered on PackageHub for now (bsc#1183118).
- Disable icu for PostgreSQL 10 (and older) on TW (bsc#1179945).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-27"/>
	<updated date="2021-05-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183118">SUSE bug 1183118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183168">SUSE bug 1183168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185926">SUSE bug 1185926</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32029/">CVE-2021-32029 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32029">CVE-2021-32029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557742" comment="libecpg6-13.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557743" comment="libpq5-13.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557744" comment="libpq5-32bit-13.3-3.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152426" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180405" ref_url="https://bugzilla.suse.com/1180405" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24386" ref_url="https://www.suse.com/security/cve/CVE-2020-24386/" source="CVE"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2020-24386: Fixed an issue with IMAP hibernation that allowed users to access other users' emails (bsc#1180405).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180405">SUSE bug 1180405</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24386/">CVE-2020-24386 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24386">CVE-2020-24386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531828" comment="dovecot22-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531829" comment="dovecot22-backend-mysql-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531830" comment="dovecot22-backend-pgsql-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531831" comment="dovecot22-backend-sqlite-2.2.31-19.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152427" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186253" ref_url="https://bugzilla.suse.com/1186253" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3500" ref_url="https://www.suse.com/security/cve/CVE-2021-3500/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3500: Stack overflow in function DJVU:DjVuDocument:get_djvu_file() via crafted djvu file (bsc#1186253)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-31"/>
	<updated date="2021-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186253">SUSE bug 1186253</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3500/">CVE-2021-3500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3500">CVE-2021-3500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552315" comment="libdjvulibre21-3.5.25.3-5.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152428" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186382" ref_url="https://bugzilla.suse.com/1186382" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217/" source="CVE"/>
		<description>
This update for dhcp fixes the following issues:

- CVE-2021-25217: A buffer overrun in lease file parsing code can be used to exploit a common vulnerability shared by dhcpd and dhclient (bsc#1186382)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-01"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186382">SUSE bug 1186382</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25217">CVE-2021-25217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552316" comment="dhcp-4.3.3-10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552317" comment="dhcp-client-4.3.3-10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552318" comment="dhcp-relay-4.3.3-10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552319" comment="dhcp-server-4.3.3-10.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152429" version="1" class="patch">
	<metadata>
		<title>Security update for libwebp (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185652" ref_url="https://bugzilla.suse.com/1185652" source="BUGZILLA"/>
		<reference ref_id="1185654" ref_url="https://bugzilla.suse.com/1185654" source="BUGZILLA"/>
		<reference ref_id="1185673" ref_url="https://bugzilla.suse.com/1185673" source="BUGZILLA"/>
		<reference ref_id="1185674" ref_url="https://bugzilla.suse.com/1185674" source="BUGZILLA"/>
		<reference ref_id="1185685" ref_url="https://bugzilla.suse.com/1185685" source="BUGZILLA"/>
		<reference ref_id="1185686" ref_url="https://bugzilla.suse.com/1185686" source="BUGZILLA"/>
		<reference ref_id="1185690" ref_url="https://bugzilla.suse.com/1185690" source="BUGZILLA"/>
		<reference ref_id="1185691" ref_url="https://bugzilla.suse.com/1185691" source="BUGZILLA"/>
		<reference ref_id="1186247" ref_url="https://bugzilla.suse.com/1186247" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25009" ref_url="https://www.suse.com/security/cve/CVE-2018-25009/" source="CVE"/>
		<reference ref_id="CVE-2018-25010" ref_url="https://www.suse.com/security/cve/CVE-2018-25010/" source="CVE"/>
		<reference ref_id="CVE-2018-25011" ref_url="https://www.suse.com/security/cve/CVE-2018-25011/" source="CVE"/>
		<reference ref_id="CVE-2018-25012" ref_url="https://www.suse.com/security/cve/CVE-2018-25012/" source="CVE"/>
		<reference ref_id="CVE-2018-25013" ref_url="https://www.suse.com/security/cve/CVE-2018-25013/" source="CVE"/>
		<reference ref_id="CVE-2020-36329" ref_url="https://www.suse.com/security/cve/CVE-2020-36329/" source="CVE"/>
		<reference ref_id="CVE-2020-36330" ref_url="https://www.suse.com/security/cve/CVE-2020-36330/" source="CVE"/>
		<reference ref_id="CVE-2020-36331" ref_url="https://www.suse.com/security/cve/CVE-2020-36331/" source="CVE"/>
		<reference ref_id="CVE-2020-36332" ref_url="https://www.suse.com/security/cve/CVE-2020-36332/" source="CVE"/>
		<description>
This update for libwebp fixes the following issues:

- CVE-2018-25010: Fixed heap-based buffer overflow in ApplyFilter() (bsc#1185685).
- CVE-2020-36330: Fixed heap-based buffer overflow in ChunkVerifyAndAssign() (bsc#1185691).
- CVE-2020-36332: Fixed extreme memory allocation when reading a file (bsc#1185674).
- CVE-2020-36329: Fixed use-after-free in EmitFancyRGB() (bsc#1185652).
- CVE-2018-25012: Fixed heap-based buffer overflow in GetLE24() (bsc#1185690).
- CVE-2018-25013: Fixed heap-based buffer overflow in ShiftBytes() (bsc#1185654).
- CVE-2020-36331: Fixed heap-based buffer overflow in ChunkAssignData() (bsc#1185686).
- CVE-2018-25009: Fixed heap-based buffer overflow in GetLE16() (bsc#1185673).
- CVE-2018-25011: Fixed fail on multiple image chunks (bsc#1186247).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-02"/>
	<updated date="2021-06-02"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185652">SUSE bug 1185652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185654">SUSE bug 1185654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185673">SUSE bug 1185673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185674">SUSE bug 1185674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185685">SUSE bug 1185685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185686">SUSE bug 1185686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185690">SUSE bug 1185690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185691">SUSE bug 1185691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186247">SUSE bug 1186247</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25009/">CVE-2018-25009 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25009">CVE-2018-25009 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25010/">CVE-2018-25010 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25010">CVE-2018-25010 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25011/">CVE-2018-25011 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25011">CVE-2018-25011 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25012/">CVE-2018-25012 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25012">CVE-2018-25012 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25013/">CVE-2018-25013 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25013">CVE-2018-25013 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36329/">CVE-2020-36329 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36329">CVE-2020-36329 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36330/">CVE-2020-36330 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36330">CVE-2020-36330 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36331/">CVE-2020-36331 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36331">CVE-2020-36331 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36332/">CVE-2020-36332 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36332">CVE-2020-36332 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552333" comment="libwebp5-0.4.3-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538993" comment="libwebp5-32bit-0.4.3-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552334" comment="libwebpdemux1-0.4.3-4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152430" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186497" ref_url="https://bugzilla.suse.com/1186497" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3560" ref_url="https://www.suse.com/security/cve/CVE-2021-3560/" source="CVE"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-3560: Fixed a local privilege escalation using polkit_system_bus_name_get_creds_sync() (bsc#1186497).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-03"/>
	<updated date="2021-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186497">SUSE bug 1186497</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3560/">CVE-2021-3560 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3560">CVE-2021-3560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552335" comment="libpolkit0-0.113-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552336" comment="polkit-0.113-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552337" comment="typelib-1_0-Polkit-1_0-0.113-5.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152431" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181255" ref_url="https://bugzilla.suse.com/1181255" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<description>
This update for gstreamer-plugins-bad fixes the following issues:

- CVE-2021-3185: Fixed buffer overflow in gst_h264_slice_parse_dec_ref_pic_marking (bsc#1181255).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-07"/>
	<updated date="2021-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181255">SUSE bug 1181255</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3185">CVE-2021-3185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552339" comment="gstreamer-plugins-bad-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539006" comment="gstreamer-plugins-bad-lang-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552340" comment="libgstadaptivedemux-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552341" comment="libgstbadaudio-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552342" comment="libgstbadbase-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552343" comment="libgstbadvideo-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552344" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552345" comment="libgstcodecparsers-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552346" comment="libgstgl-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552347" comment="libgstmpegts-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552348" comment="libgstphotography-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552349" comment="libgsturidownloader-1_0-0-1.8.3-18.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152432" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="1185464" ref_url="https://bugzilla.suse.com/1185464" source="BUGZILLA"/>
		<description>
This update for shim fixes the following issues:

- Update to the unified shim binary for SBAT support (bsc#1182057)
- shim-install: Always assume 'removable' for Azure to avoid the endless reset loop (bsc#1185464).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185464">SUSE bug 1185464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557745" comment="shim-15.4-25.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152433" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185633" ref_url="https://bugzilla.suse.com/1185633" source="BUGZILLA"/>
		<reference ref_id="1186696" ref_url="https://bugzilla.suse.com/1186696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29951" ref_url="https://www.suse.com/security/cve/CVE-2021-29951/" source="CVE"/>
		<reference ref_id="CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.11.0 ESR (bsc#1186696)

  * CVE-2021-29964: Out of bounds-read when parsing a `WM_COPYDATA` message
  * CVE-2021-29967: Memory safety bugs fixed in Firefox
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185633">SUSE bug 1185633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186696">SUSE bug 1186696</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29951/">CVE-2021-29951 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29951">CVE-2021-29951 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29964">CVE-2021-29964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29967">CVE-2021-29967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552350" comment="MozillaFirefox-78.11.0-112.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552351" comment="MozillaFirefox-devel-78.11.0-112.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552352" comment="MozillaFirefox-translations-common-78.11.0-112.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152434" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186643" ref_url="https://bugzilla.suse.com/1186643" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<description>
This update for libX11 fixes the following issues:

- Regression in the fix for CVE-2021-31535, causing segfaults for xforms applications like fdesign (bsc#1186643)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186643">SUSE bug 1186643</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31535">CVE-2021-31535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552353" comment="libX11-6-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539021" comment="libX11-6-32bit-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539022" comment="libX11-data-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552354" comment="libX11-xcb1-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539024" comment="libX11-xcb1-32bit-1.6.2-12.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152435" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1094725" ref_url="https://bugzilla.suse.com/1094725" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1172380" ref_url="https://bugzilla.suse.com/1172380" source="BUGZILLA"/>
		<reference ref_id="1172382" ref_url="https://bugzilla.suse.com/1172382" source="BUGZILLA"/>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1178683" ref_url="https://bugzilla.suse.com/1178683" source="BUGZILLA"/>
		<reference ref_id="1178935" ref_url="https://bugzilla.suse.com/1178935" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1181933" ref_url="https://bugzilla.suse.com/1181933" source="BUGZILLA"/>
		<reference ref_id="1182846" ref_url="https://bugzilla.suse.com/1182846" source="BUGZILLA"/>
		<reference ref_id="1182975" ref_url="https://bugzilla.suse.com/1182975" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756/" source="CVE"/>
		<reference ref_id="CVE-2020-13754" ref_url="https://www.suse.com/security/cve/CVE-2020-13754/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-25707" ref_url="https://www.suse.com/security/cve/CVE-2020-25707/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="CVE-2021-20221" ref_url="https://www.suse.com/security/cve/CVE-2021-20221/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-3419" ref_url="https://www.suse.com/security/cve/CVE-2021-3419/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

- Fix OOB access during mmio operations (CVE-2020-13754, bsc#1172382)
- Fix out-of-bounds read information disclosure in icmp6_send_echoreply (CVE-2020-10756, bsc#1172380)
- Fix out-of-bound heap buffer access via an interrupt ID field (CVE-2021-20221, bsc#1181933)
- For the record, these issues are fixed in this package already.
  Most are alternate references to previously mentioned issues:
  (CVE-2019-15890, bsc#1149813, CVE-2020-8608, bsc#1163019,
  CVE-2020-14364, bsc#1175534, CVE-2020-25707, bsc#1178683,
  CVE-2020-25723, bsc#1178935, CVE-2020-29130, bsc#1179477,
  CVE-2021-20257, bsc#1182846, CVE-2021-3419, bsc#1182975,
  bsc#1094725)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1094725">SUSE bug 1094725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172380">SUSE bug 1172380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172382">SUSE bug 1172382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178683">SUSE bug 1178683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178935">SUSE bug 1178935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181933">SUSE bug 1181933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182975">SUSE bug 1182975</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10756">CVE-2020-10756 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13754/">CVE-2020-13754 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13754">CVE-2020-13754 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25707/">CVE-2020-25707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-25707">CVE-2020-25707 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25723">CVE-2020-25723 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20221/">CVE-2021-20221 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20221">CVE-2021-20221 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3419/">CVE-2021-3419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3419">CVE-2021-3419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555909" comment="qemu-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555910" comment="qemu-block-curl-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555911" comment="qemu-block-iscsi-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539028" comment="qemu-block-rbd-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555912" comment="qemu-block-ssh-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555913" comment="qemu-guest-agent-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539031" comment="qemu-ipxe-1.0.0+-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539032" comment="qemu-kvm-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555914" comment="qemu-lang-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539035" comment="qemu-seabios-1.10.2_0_g5f4c7b1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539036" comment="qemu-sgabios-8-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555915" comment="qemu-tools-2.9.1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539038" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-6.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539039" comment="qemu-x86-2.9.1-6.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152436" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 75 [bsc#1180063, bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14782 CVE-2020-14781
  CVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class Libraries:
    - Z/OS specific C function send_file is changing the file pointer position
  * Security:
    - Add the new oracle signer certificate
    - Certificate parsing error
    - JVM memory growth can be caused by the IBMPKCS11IMPL crypto provider
    - Remove check for websphere signed jars
    - sessionid.hashcode generates too many collisions
    - The Java 8 IBM certpath provider does not honor the user
      specified system property for CLR connect timeout
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531832" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531834" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531835" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152437" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181686" ref_url="https://bugzilla.suse.com/1181686" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20201" ref_url="https://www.suse.com/security/cve/CVE-2021-20201/" source="CVE"/>
		<description>
This update for spice fixes the following issues:

- CVE-2021-20201: client initiated renegotiation causing denial of service (bsc#1181686)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181686">SUSE bug 1181686</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20201/">CVE-2021-20201 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20201">CVE-2021-20201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555916" comment="libspice-server1-0.12.8-18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152438" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179833" ref_url="https://bugzilla.suse.com/1179833" source="BUGZILLA"/>
		<reference ref_id="1179836" ref_url="https://bugzilla.suse.com/1179836" source="BUGZILLA"/>
		<reference ref_id="1179837" ref_url="https://bugzilla.suse.com/1179837" source="BUGZILLA"/>
		<reference ref_id="1179839" ref_url="https://bugzilla.suse.com/1179839" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489/" source="CVE"/>
		<reference ref_id="CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511/" source="CVE"/>
		<reference ref_id="CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512/" source="CVE"/>
		<reference ref_id="CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20210608 release.

- CVE-2020-24513: A domain bypass transient execution vulnerability was discovered on some Intel Atom processors that use a micro-architectural incident channel. (INTEL-SA-00465 bsc#1179833)

  See also: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html

- CVE-2020-24511: The IBRS feature to mitigate Spectre variant 2 transient execution side channel vulnerabilities may not fully prevent non-root (guest) branches from controlling the branch predictions of the root (host) (INTEL-SA-00464 bsc#1179836)

  See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html)

- CVE-2020-24512: Fixed trivial data value cache-lines such as all-zero value cache-lines may lead to changes in cache-allocation or write-back behavior for such cache-lines (bsc#1179837 INTEL-SA-00464)

  See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html)

- CVE-2020-24489: Fixed Intel VT-d device pass through potential local privilege escalation (INTEL-SA-00442 bsc#1179839)

  See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html

Other fixes:

- Update for functional issues. Refer to [Third Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780)for details.
- Update for functional issues. Refer to [Second Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
- Update for functional issues. Refer to [Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
- Update for functional issues. Refer to [Intel Xeon Processor D-1500, D-1500 NS and D-1600 NS Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-d-1500-specification-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon E7-8800 and E7-4800 v3 Processor Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e7-v3-spec-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
- Update for functional issues. Refer to [10th Gen Intel Core Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
- Update for functional issues. Refer to [8th and 9th Gen Intel Core Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
- Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
- Update for functional issues. Refer to [6th Gen Intel Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
- Update for functional issues. Refer to [Intel Xeon E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

- New platforms:

| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| CLX-SP         | A0       | 06-55-05/b7 |          | 03000010 | Xeon Scalable Gen2
| ICX-SP         | C0       | 06-6a-05/87 |          | 0c0002f0 | Xeon Scalable Gen3
| ICX-SP         | D0       | 06-6a-06/87 |          | 0d0002a0 | Xeon Scalable Gen3
| SNR            | B0       | 06-86-04/01 |          | 0b00000f | Atom P59xxB
| SNR            | B1       | 06-86-05/01 |          | 0b00000f | Atom P59xxB
| TGL            | B1       | 06-8c-01/80 |          | 00000088 | Core Gen11 Mobile
| TGL-R          | C0       | 06-8c-02/c2 |          | 00000016 | Core Gen11 Mobile
| TGL-H          | R0       | 06-8d-01/c2 |          | 0000002c | Core Gen11 Mobile
| EHL            | B1       | 06-96-01/01 |          | 00000011 | Pentium J6426/N6415, Celeron J6412/J6413/N6210/N6211, Atom x6000E
| JSL            | A0/A1    | 06-9c-00/01 |          | 0000001d | Pentium N6000/N6005, Celeron N4500/N4505/N5100/N5105
| RKL-S          | B0       | 06-a7-01/02 |          | 00000040 | Core Gen11

- Updated platforms:

| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000044 | 00000046 | Core Gen4 X series; Xeon E5 v3
| HSX-EX         | E0       | 06-3f-04/80 | 00000016 | 00000019 | Xeon E7 v3
| SKL-U/Y        | D0       | 06-4e-03/c0 | 000000e2 | 000000ea | Core Gen6 Mobile
| SKL-U23e       | K1       | 06-4e-03/c0 | 000000e2 | 000000ea | Core Gen6 Mobile
| BDX-ML         | B0/M0/R0 | 06-4f-01/ef | 0b000038 | 0b00003e | Xeon E5/E7 v4; Core i7-69xx/68xx
| SKX-SP         | B1       | 06-55-03/97 | 01000159 | 0100015b | Xeon Scalable
| SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006a0a | 02006b06 | Xeon Scalable
| SKX-D          | M1       | 06-55-04/b7 | 02006a0a | 02006b06 | Xeon D-21xx
| CLX-SP         | B0       | 06-55-06/bf | 04003006 | 04003102 | Xeon Scalable Gen2
| CLX-SP         | B1       | 06-55-07/bf | 05003006 | 05003102 | Xeon Scalable Gen2
| CPX-SP         | A1       | 06-55-0b/bf | 0700001e | 07002302 | Xeon Scalable Gen3
| BDX-DE         | V2/V3    | 06-56-03/10 | 07000019 | 0700001b | Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
| BDX-DE         | Y0       | 06-56-04/10 | 0f000017 | 0f000019 | Xeon D-1557/59/67/71/77/81/87
| BDX-NS         | A0       | 06-56-05/10 | 0e00000f | 0e000012 | Xeon D-1513N/23/33/43/53
| APL            | D0       | 06-5c-09/03 | 00000040 | 00000044 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
| APL            | E0       | 06-5c-0a/03 | 0000001e | 00000020 | Atom x5-E39xx
| SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000e2 | 000000ea | Core Gen6; Xeon E3 v5
| DNV            | B0       | 06-5f-01/01 | 0000002e | 00000034 | Atom C Series
| GLK            | B0       | 06-7a-01/01 | 00000034 | 00000036 | Pentium Silver N/J5xxx, Celeron N/J4xxx
| GKL-R          | R0       | 06-7a-08/01 | 00000018 | 0000001a | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
| ICL-U/Y        | D1       | 06-7e-05/80 | 000000a0 | 000000a6 | Core Gen10 Mobile
| LKF            | B2/B3    | 06-8a-01/10 | 00000028 | 0000002a | Core w/Hybrid Technology
| AML-Y22        | H0       | 06-8e-09/10 | 000000de | 000000ea | Core Gen8 Mobile
| KBL-U/Y        | H0       | 06-8e-09/c0 | 000000de | 000000ea | Core Gen7 Mobile
| CFL-U43e       | D0       | 06-8e-0a/c0 | 000000e0 | 000000ea | Core Gen8 Mobile
| WHL-U          | W0       | 06-8e-0b/d0 | 000000de | 000000ea | Core Gen8 Mobile
| AML-Y42        | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen10 Mobile
| CML-Y42        | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen10 Mobile
| WHL-U          | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen8 Mobile
| KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000de | 000000ea | Core Gen7; Xeon E3 v6
| CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000de | 000000ea | Core Gen8 Desktop, Mobile, Xeon E
| CFL-S          | B0       | 06-9e-0b/02 | 000000de | 000000ea | Core Gen8
| CFL-H/S        | P0       | 06-9e-0c/22 | 000000de | 000000ea | Core Gen9
| CFL-H          | R0       | 06-9e-0d/22 | 000000de | 000000ea | Core Gen9 Mobile
| CML-H          | R1       | 06-a5-02/20 | 000000e0 | 000000ea | Core Gen10 Mobile
| CML-S62        | G1       | 06-a5-03/22 | 000000e0 | 000000ea | Core Gen10
| CML-S102       | Q0       | 06-a5-05/22 | 000000e0 | 000000ec | Core Gen10
| CML-U62        | A0       | 06-a6-00/80 | 000000e0 | 000000e8 | Core Gen10 Mobile
| CML-U62 V2     | K0       | 06-a6-01/80 | 000000e0 | 000000ea | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-10"/>
	<updated date="2021-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179833">SUSE bug 1179833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179836">SUSE bug 1179836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179837">SUSE bug 1179837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179839">SUSE bug 1179839</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24489">CVE-2020-24489 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24511">CVE-2020-24511 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24512">CVE-2020-24512 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24513">CVE-2020-24513 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539041" comment="ucode-intel-20210525-13.90.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152439" version="1" class="patch">
	<metadata>
		<title>Security update for caribou (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186617" ref_url="https://bugzilla.suse.com/1186617" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3567" ref_url="https://www.suse.com/security/cve/CVE-2021-3567/" source="CVE"/>
		<description>
This update for caribou fixes the following issues:

Security issue fixed:

- CVE-2021-3567: Fixed a segfault when attempting to use shifted characters (bsc#1186617).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-10"/>
	<updated date="2021-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186617">SUSE bug 1186617</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3567/">CVE-2021-3567 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3567">CVE-2021-3567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552363" comment="caribou-common-0.4.21-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552364" comment="libcaribou0-0.4.21-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552365" comment="typelib-1_0-Caribou-1_0-0.4.21-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152440" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186764" ref_url="https://bugzilla.suse.com/1186764" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17541" ref_url="https://www.suse.com/security/cve/CVE-2020-17541/" source="CVE"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2020-17541: Fixed a stack-based buffer overflow in the 'transform' component (bsc#1186764).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-11"/>
	<updated date="2021-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186764">SUSE bug 1186764</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-17541/">CVE-2020-17541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17541">CVE-2020-17541 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557746" comment="libjpeg-turbo-1.5.3-31.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557747" comment="libjpeg62-62.2.0-31.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557748" comment="libjpeg62-32bit-62.2.0-31.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557749" comment="libjpeg62-turbo-1.5.3-31.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557750" comment="libjpeg8-8.1.2-31.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557751" comment="libjpeg8-32bit-8.1.2-31.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557752" comment="libturbojpeg0-8.1.2-31.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152441" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181221" ref_url="https://bugzilla.suse.com/1181221" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3181" ref_url="https://www.suse.com/security/cve/CVE-2021-3181/" source="CVE"/>
		<description>
This update for mutt fixes the following issue:

- CVE-2021-3181: Fixed a memory leak in recipient parsing (bsc#1181221).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-22"/>
	<updated date="2021-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181221">SUSE bug 1181221</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3181/">CVE-2021-3181 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3181">CVE-2021-3181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557753" comment="mutt-1.10.1-55.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152442" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184016" ref_url="https://bugzilla.suse.com/1184016" source="BUGZILLA"/>
		<description>
This update for freeradius-server fixes the following issues:

- Do not log passwords in logfiles (bsc#1184016)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-11"/>
	<updated date="2021-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184016">SUSE bug 1184016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555917" comment="freeradius-server-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555918" comment="freeradius-server-doc-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555919" comment="freeradius-server-krb5-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555920" comment="freeradius-server-ldap-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555921" comment="freeradius-server-libs-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555922" comment="freeradius-server-mysql-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555923" comment="freeradius-server-perl-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555924" comment="freeradius-server-postgresql-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555925" comment="freeradius-server-python-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555926" comment="freeradius-server-sqlite-3.0.15-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555927" comment="freeradius-server-utils-3.0.15-2.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152443" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u292 (icedtea 3.19.0).
- CVE-2021-2161: Fixed incomplete enforcement of JAR signing disabled algorithms (bsc#1185055).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-15"/>
	<updated date="2021-06-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552366" comment="java-1_8_0-openjdk-1.8.0.292-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552367" comment="java-1_8_0-openjdk-demo-1.8.0.292-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552368" comment="java-1_8_0-openjdk-devel-1.8.0.292-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552369" comment="java-1_8_0-openjdk-headless-1.8.0.292-27.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152444" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179103" ref_url="https://bugzilla.suse.com/1179103" source="BUGZILLA"/>
		<reference ref_id="1179202" ref_url="https://bugzilla.suse.com/1179202" source="BUGZILLA"/>
		<reference ref_id="1179208" ref_url="https://bugzilla.suse.com/1179208" source="BUGZILLA"/>
		<reference ref_id="1179212" ref_url="https://bugzilla.suse.com/1179212" source="BUGZILLA"/>
		<reference ref_id="1179223" ref_url="https://bugzilla.suse.com/1179223" source="BUGZILLA"/>
		<reference ref_id="1179240" ref_url="https://bugzilla.suse.com/1179240" source="BUGZILLA"/>
		<reference ref_id="1179244" ref_url="https://bugzilla.suse.com/1179244" source="BUGZILLA"/>
		<reference ref_id="1179260" ref_url="https://bugzilla.suse.com/1179260" source="BUGZILLA"/>
		<reference ref_id="1179268" ref_url="https://bugzilla.suse.com/1179268" source="BUGZILLA"/>
		<reference ref_id="1179269" ref_url="https://bugzilla.suse.com/1179269" source="BUGZILLA"/>
		<reference ref_id="1179278" ref_url="https://bugzilla.suse.com/1179278" source="BUGZILLA"/>
		<reference ref_id="1179281" ref_url="https://bugzilla.suse.com/1179281" source="BUGZILLA"/>
		<reference ref_id="1179285" ref_url="https://bugzilla.suse.com/1179285" source="BUGZILLA"/>
		<reference ref_id="1179311" ref_url="https://bugzilla.suse.com/1179311" source="BUGZILLA"/>
		<reference ref_id="1179312" ref_url="https://bugzilla.suse.com/1179312" source="BUGZILLA"/>
		<reference ref_id="1179313" ref_url="https://bugzilla.suse.com/1179313" source="BUGZILLA"/>
		<reference ref_id="1179315" ref_url="https://bugzilla.suse.com/1179315" source="BUGZILLA"/>
		<reference ref_id="1179317" ref_url="https://bugzilla.suse.com/1179317" source="BUGZILLA"/>
		<reference ref_id="1179321" ref_url="https://bugzilla.suse.com/1179321" source="BUGZILLA"/>
		<reference ref_id="1179322" ref_url="https://bugzilla.suse.com/1179322" source="BUGZILLA"/>
		<reference ref_id="1179327" ref_url="https://bugzilla.suse.com/1179327" source="BUGZILLA"/>
		<reference ref_id="1179333" ref_url="https://bugzilla.suse.com/1179333" source="BUGZILLA"/>
		<reference ref_id="1179336" ref_url="https://bugzilla.suse.com/1179336" source="BUGZILLA"/>
		<reference ref_id="1179338" ref_url="https://bugzilla.suse.com/1179338" source="BUGZILLA"/>
		<reference ref_id="1179339" ref_url="https://bugzilla.suse.com/1179339" source="BUGZILLA"/>
		<reference ref_id="1179343" ref_url="https://bugzilla.suse.com/1179343" source="BUGZILLA"/>
		<reference ref_id="1179345" ref_url="https://bugzilla.suse.com/1179345" source="BUGZILLA"/>
		<reference ref_id="1179346" ref_url="https://bugzilla.suse.com/1179346" source="BUGZILLA"/>
		<reference ref_id="1179347" ref_url="https://bugzilla.suse.com/1179347" source="BUGZILLA"/>
		<reference ref_id="1179361" ref_url="https://bugzilla.suse.com/1179361" source="BUGZILLA"/>
		<reference ref_id="1179362" ref_url="https://bugzilla.suse.com/1179362" source="BUGZILLA"/>
		<reference ref_id="1179397" ref_url="https://bugzilla.suse.com/1179397" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667/" source="CVE"/>
		<reference ref_id="CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664/" source="CVE"/>
		<reference ref_id="CVE-2020-25665" ref_url="https://www.suse.com/security/cve/CVE-2020-25665/" source="CVE"/>
		<reference ref_id="CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666/" source="CVE"/>
		<reference ref_id="CVE-2020-25674" ref_url="https://www.suse.com/security/cve/CVE-2020-25674/" source="CVE"/>
		<reference ref_id="CVE-2020-25675" ref_url="https://www.suse.com/security/cve/CVE-2020-25675/" source="CVE"/>
		<reference ref_id="CVE-2020-25676" ref_url="https://www.suse.com/security/cve/CVE-2020-25676/" source="CVE"/>
		<reference ref_id="CVE-2020-27750" ref_url="https://www.suse.com/security/cve/CVE-2020-27750/" source="CVE"/>
		<reference ref_id="CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751/" source="CVE"/>
		<reference ref_id="CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752/" source="CVE"/>
		<reference ref_id="CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753/" source="CVE"/>
		<reference ref_id="CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754/" source="CVE"/>
		<reference ref_id="CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755/" source="CVE"/>
		<reference ref_id="CVE-2020-27757" ref_url="https://www.suse.com/security/cve/CVE-2020-27757/" source="CVE"/>
		<reference ref_id="CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759/" source="CVE"/>
		<reference ref_id="CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760/" source="CVE"/>
		<reference ref_id="CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761/" source="CVE"/>
		<reference ref_id="CVE-2020-27762" ref_url="https://www.suse.com/security/cve/CVE-2020-27762/" source="CVE"/>
		<reference ref_id="CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763/" source="CVE"/>
		<reference ref_id="CVE-2020-27764" ref_url="https://www.suse.com/security/cve/CVE-2020-27764/" source="CVE"/>
		<reference ref_id="CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765/" source="CVE"/>
		<reference ref_id="CVE-2020-27766" ref_url="https://www.suse.com/security/cve/CVE-2020-27766/" source="CVE"/>
		<reference ref_id="CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767/" source="CVE"/>
		<reference ref_id="CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768/" source="CVE"/>
		<reference ref_id="CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769/" source="CVE"/>
		<reference ref_id="CVE-2020-27770" ref_url="https://www.suse.com/security/cve/CVE-2020-27770/" source="CVE"/>
		<reference ref_id="CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771/" source="CVE"/>
		<reference ref_id="CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772/" source="CVE"/>
		<reference ref_id="CVE-2020-27773" ref_url="https://www.suse.com/security/cve/CVE-2020-27773/" source="CVE"/>
		<reference ref_id="CVE-2020-27774" ref_url="https://www.suse.com/security/cve/CVE-2020-27774/" source="CVE"/>
		<reference ref_id="CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775/" source="CVE"/>
		<reference ref_id="CVE-2020-27776" ref_url="https://www.suse.com/security/cve/CVE-2020-27776/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103).
- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202).
- CVE-2020-25665: Fixed a heap-based buffer overflow in WritePALMImage (bsc#1179208).
- CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212).
- CVE-2020-25674: Fixed a heap-based buffer overflow in WriteOnePNGImage (bsc#1179223).
- CVE-2020-25675: Fixed an outside the range of representable values of type 'long' and integer overflow (bsc#1179240).
- CVE-2020-25676: Fixed an outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c (bsc#1179244).
- CVE-2020-27750: Fixed an division by zero in MagickCore/colorspace-private.h (bsc#1179260).
- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397).
- CVE-2020-27754: Fixed an outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336).
- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345).
- CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
- CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313).
- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281).
- CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315).
- CVE-2020-27762: Fixed an outside the range of representable values of type 'unsigned char' (bsc#1179278).
- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312).
- CVE-2020-27764: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179317).
- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311).
- CVE-2020-27766: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179361).
- CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322).
- CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
- CVE-2020-27769: Fixed an outside the range of representable values of type 'float' at MagickCore/quantize.c (bsc#1179321).
- CVE-2020-27770: Fixed an unsigned offset overflowed at MagickCore/string.c (bsc#1179343).
- CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327).
- CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347).
- CVE-2020-27773: Fixed a division by zero at MagickCore/gem-private.h (bsc#1179285).
- CVE-2020-27774: Fixed an integer overflow at MagickCore/statistic.c (bsc#1179333).
- CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
- CVE-2020-27776: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179362).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-22"/>
	<updated date="2021-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179103">SUSE bug 1179103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179208">SUSE bug 1179208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179212">SUSE bug 1179212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179223">SUSE bug 1179223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179240">SUSE bug 1179240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179244">SUSE bug 1179244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179260">SUSE bug 1179260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179268">SUSE bug 1179268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179278">SUSE bug 1179278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179281">SUSE bug 1179281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179285">SUSE bug 1179285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179311">SUSE bug 1179311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179312">SUSE bug 1179312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179315">SUSE bug 1179315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179317">SUSE bug 1179317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179327">SUSE bug 1179327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179338">SUSE bug 1179338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179339">SUSE bug 1179339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179343">SUSE bug 1179343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179345">SUSE bug 1179345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179347">SUSE bug 1179347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179361">SUSE bug 1179361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179362">SUSE bug 1179362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179397">SUSE bug 1179397</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19667">CVE-2020-19667 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25664">CVE-2020-25664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25665/">CVE-2020-25665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25665">CVE-2020-25665 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25666">CVE-2020-25666 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25674/">CVE-2020-25674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25674">CVE-2020-25674 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25675/">CVE-2020-25675 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25675">CVE-2020-25675 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25676/">CVE-2020-25676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25676">CVE-2020-25676 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27750/">CVE-2020-27750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27750">CVE-2020-27750 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27751">CVE-2020-27751 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27752">CVE-2020-27752 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27753">CVE-2020-27753 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27754">CVE-2020-27754 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27755">CVE-2020-27755 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27757/">CVE-2020-27757 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27757">CVE-2020-27757 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27759">CVE-2020-27759 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27760">CVE-2020-27760 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27761">CVE-2020-27761 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27762/">CVE-2020-27762 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27762">CVE-2020-27762 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27763">CVE-2020-27763 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27764/">CVE-2020-27764 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27764">CVE-2020-27764 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27765">CVE-2020-27765 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27766/">CVE-2020-27766 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27766">CVE-2020-27766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27767">CVE-2020-27767 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27768">CVE-2020-27768 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27769">CVE-2020-27769 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27770/">CVE-2020-27770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27770">CVE-2020-27770 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27771">CVE-2020-27771 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27772">CVE-2020-27772 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27773/">CVE-2020-27773 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27773">CVE-2020-27773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27774/">CVE-2020-27774 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27774">CVE-2020-27774 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27775">CVE-2020-27775 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27776/">CVE-2020-27776 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27776">CVE-2020-27776 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152445" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177087" ref_url="https://bugzilla.suse.com/1177087" source="BUGZILLA"/>
		<reference ref_id="1179122" ref_url="https://bugzilla.suse.com/1179122" source="BUGZILLA"/>
		<reference ref_id="1179451" ref_url="https://bugzilla.suse.com/1179451" source="BUGZILLA"/>
		<reference ref_id="1182286" ref_url="https://bugzilla.suse.com/1182286" source="BUGZILLA"/>
		<reference ref_id="1184155" ref_url="https://bugzilla.suse.com/1184155" source="BUGZILLA"/>
		<reference ref_id="1184262" ref_url="https://bugzilla.suse.com/1184262" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13543" ref_url="https://www.suse.com/security/cve/CVE-2020-13543/" source="CVE"/>
		<reference ref_id="CVE-2020-13558" ref_url="https://www.suse.com/security/cve/CVE-2020-13558/" source="CVE"/>
		<reference ref_id="CVE-2020-13584" ref_url="https://www.suse.com/security/cve/CVE-2020-13584/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9983" ref_url="https://www.suse.com/security/cve/CVE-2020-9983/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1789" ref_url="https://www.suse.com/security/cve/CVE-2021-1789/" source="CVE"/>
		<reference ref_id="CVE-2021-1799" ref_url="https://www.suse.com/security/cve/CVE-2021-1799/" source="CVE"/>
		<reference ref_id="CVE-2021-1801" ref_url="https://www.suse.com/security/cve/CVE-2021-1801/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1870" ref_url="https://www.suse.com/security/cve/CVE-2021-1870/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.1:
  + Improve handling of Media Capture devices.
  + Improve WebAudio playback.
  + Improve video orientation handling.
  + Improve seeking support for MSE playback.
  + Improve flush support in EME decryptors.
  + Fix HTTP status codes for requests done through a custom URI handler.
  + Fix the Bubblewrap sandbox in certain 32-bit systems.
  + Fix inconsistencies between the WebKitWebView.is-muted property
    state and values returned by
    webkit_web_view_is_playing_audio().
  + Fix the build with ENABLE_VIDEO=OFF.
  + Fix wrong timestamps for long-lived cookies.
  + Fix UI process crash when failing to load favicons.
  + Fix several crashes and rendering issues.
- Including Security fixes for: CVE-2021-1788, CVE-2021-1844, CVE-2021-1871,
    CVE-2020-27918, CVE-2020-29623, CVE-2021-1765, CVE-2021-1789, CVE-2021-1799,
    CVE-2021-1801, CVE-2021-1870, CVE-2020-13558, CVE-2020-13584, CVE-2020-9983, 
    CVE-2020-13543, CVE-2020-9947, CVE-2020-9948, CVE-2020-9951.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177087">SUSE bug 1177087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179122">SUSE bug 1179122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179451">SUSE bug 1179451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182286">SUSE bug 1182286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184155">SUSE bug 1184155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13543/">CVE-2020-13543 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13543">CVE-2020-13543 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13558/">CVE-2020-13558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13558">CVE-2020-13558 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13584/">CVE-2020-13584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13584">CVE-2020-13584 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27918">CVE-2020-27918 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29623">CVE-2020-29623 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9947">CVE-2020-9947 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9948">CVE-2020-9948 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9951">CVE-2020-9951 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9983/">CVE-2020-9983 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9983">CVE-2020-9983 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1765">CVE-2021-1765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1788">CVE-2021-1788 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1789/">CVE-2021-1789 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1789">CVE-2021-1789 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1799/">CVE-2021-1799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1799">CVE-2021-1799 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1801/">CVE-2021-1801 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1801">CVE-2021-1801 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1844">CVE-2021-1844 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1870/">CVE-2021-1870 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1870">CVE-2021-1870 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1871">CVE-2021-1871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552370" comment="libjavascriptcoregtk-4_0-18-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552371" comment="libwebkit2gtk-4_0-37-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552372" comment="typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552373" comment="typelib-1_0-WebKit2-4_0-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552374" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552375" comment="webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152446" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186922" ref_url="https://bugzilla.suse.com/1186922" source="BUGZILLA"/>
		<reference ref_id="1186923" ref_url="https://bugzilla.suse.com/1186923" source="BUGZILLA"/>
		<reference ref_id="1186924" ref_url="https://bugzilla.suse.com/1186924" source="BUGZILLA"/>
		<reference ref_id="1187017" ref_url="https://bugzilla.suse.com/1187017" source="BUGZILLA"/>
		<reference ref_id="1187174" ref_url="https://bugzilla.suse.com/1187174" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35452" ref_url="https://www.suse.com/security/cve/CVE-2020-35452/" source="CVE"/>
		<reference ref_id="CVE-2021-26690" ref_url="https://www.suse.com/security/cve/CVE-2021-26690/" source="CVE"/>
		<reference ref_id="CVE-2021-26691" ref_url="https://www.suse.com/security/cve/CVE-2021-26691/" source="CVE"/>
		<reference ref_id="CVE-2021-30641" ref_url="https://www.suse.com/security/cve/CVE-2021-30641/" source="CVE"/>
		<reference ref_id="CVE-2021-31618" ref_url="https://www.suse.com/security/cve/CVE-2021-31618/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- fixed CVE-2021-30641 [bsc#1187174]: MergeSlashes regression
- fixed CVE-2021-31618 [bsc#1186924]: NULL pointer dereference on specially crafted HTTP/2 request
- fixed CVE-2020-35452 [bsc#1186922]: Single zero byte stack overflow in mod_auth_digest 
- fixed CVE-2021-26690 [bsc#1186923]: mod_session NULL pointer dereference in parser
- fixed CVE-2021-26691 [bsc#1187017]: Heap overflow in mod_session
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186922">SUSE bug 1186922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186923">SUSE bug 1186923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186924">SUSE bug 1186924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187017">SUSE bug 1187017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187174">SUSE bug 1187174</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35452/">CVE-2020-35452 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35452">CVE-2020-35452 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26690/">CVE-2021-26690 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26690">CVE-2021-26690 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26691/">CVE-2021-26691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26691">CVE-2021-26691 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30641/">CVE-2021-30641 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30641">CVE-2021-30641 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31618/">CVE-2021-31618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31618">CVE-2021-31618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552377" comment="apache2-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539074" comment="apache2-doc-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552378" comment="apache2-example-pages-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552379" comment="apache2-prefork-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552380" comment="apache2-utils-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552381" comment="apache2-worker-2.4.23-29.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152447" version="1" class="patch">
	<metadata>
		<title>Security update for xterm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182091" ref_url="https://bugzilla.suse.com/1182091" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135/" source="CVE"/>
		<description>
This update for xterm fixes the following issues:

- CVE-2021-27135: Fixed buffer-overflow when clicking on selected utf8 text. (bsc#1182091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182091">SUSE bug 1182091</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27135">CVE-2021-27135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552382" comment="xterm-308-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152448" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186015" ref_url="https://bugzilla.suse.com/1186015" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3541" ref_url="https://www.suse.com/security/cve/CVE-2021-3541/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2021-3541: Fixed exponential entity expansion attack that could bypass all existing protection mechanisms (bsc#1186015).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186015">SUSE bug 1186015</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3541/">CVE-2021-3541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3541">CVE-2021-3541 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557754" comment="libxml2-2-2.9.4-46.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557755" comment="libxml2-2-32bit-2.9.4-46.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557756" comment="libxml2-doc-2.9.4-46.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557757" comment="libxml2-tools-2.9.4-46.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557758" comment="python-libxml2-2.9.4-46.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152449" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186151" ref_url="https://bugzilla.suse.com/1186151" source="BUGZILLA"/>
		<description>
This update for ovmf fixes the following issues:

- Fixed a possible  buffer overflow in IScsiDxe (bsc#1186151)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-22"/>
	<updated date="2021-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186151">SUSE bug 1186151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009539087" comment="ovmf-2017+git1492060560.b6d11d7c46-4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539088" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539089" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152450" version="1" class="patch">
	<metadata>
		<title>Security update for libnettle (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1187060" ref_url="https://bugzilla.suse.com/1187060" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3580" ref_url="https://www.suse.com/security/cve/CVE-2021-3580/" source="CVE"/>
		<description>
This update for libnettle fixes the following issues:

- CVE-2021-3580: Fixed a remote denial of service in the RSA decryption via manipulated ciphertext (bsc#1187060).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-23"/>
	<updated date="2021-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187060">SUSE bug 1187060</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3580/">CVE-2021-3580 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3580">CVE-2021-3580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552386" comment="libhogweed2-2.7.1-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539091" comment="libhogweed2-32bit-2.7.1-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552387" comment="libnettle4-2.7.1-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539093" comment="libnettle4-32bit-2.7.1-13.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152451" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1187212" ref_url="https://bugzilla.suse.com/1187212" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560/" source="CVE"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2021-33560: Fixed a side-channel against ElGamal encryption, caused by missing exponent blinding (bsc#1187212).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-24"/>
	<updated date="2021-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187212">SUSE bug 1187212</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">CVE-2021-33560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552394" comment="libgcrypt20-1.6.1-16.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539096" comment="libgcrypt20-32bit-1.6.1-16.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552395" comment="libgcrypt20-hmac-1.6.1-16.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539098" comment="libgcrypt20-hmac-32bit-1.6.1-16.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152452" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184354" ref_url="https://bugzilla.suse.com/1184354" source="BUGZILLA"/>
		<reference ref_id="1187310" ref_url="https://bugzilla.suse.com/1187310" source="BUGZILLA"/>
		<reference ref_id="1187395" ref_url="https://bugzilla.suse.com/1187395" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3479" ref_url="https://www.suse.com/security/cve/CVE-2021-3479/" source="CVE"/>
		<reference ref_id="CVE-2021-3598" ref_url="https://www.suse.com/security/cve/CVE-2021-3598/" source="CVE"/>
		<reference ref_id="CVE-2021-3605" ref_url="https://www.suse.com/security/cve/CVE-2021-3605/" source="CVE"/>
		<description>
This update for openexr fixes the following issues:

- Fixed CVE-2021-3479 [bsc#1184354]: Out-of-memory caused by allocation of a very large buffer
- Fixed CVE-2021-3605 [bsc#1187395]: Heap buffer overflow in the rleUncompress function
- Fixed CVE-2021-3598 [bsc#1187310]: Heap buffer overflow in Imf_3_1:CharPtrIO:readChars
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-24"/>
	<updated date="2021-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184354">SUSE bug 1184354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187310">SUSE bug 1187310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187395">SUSE bug 1187395</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3479/">CVE-2021-3479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3479">CVE-2021-3479 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3598/">CVE-2021-3598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3598">CVE-2021-3598 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3605/">CVE-2021-3605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3605">CVE-2021-3605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552396" comment="libIlmImf-Imf_2_1-21-2.1.0-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552397" comment="openexr-2.1.0-6.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152453" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql12, postgresql13 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="1178961" ref_url="https://bugzilla.suse.com/1178961" source="BUGZILLA"/>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<description>
This update for postgresql, postgresql12, postgresql13 fixes the following issues:

Initial packaging of PostgreSQL 13:

* https://www.postgresql.org/about/news/2077/
* https://www.postgresql.org/docs/13/release-13.html

Changes in postgresql:

- Bump postgresql major version to 13.

Changes in postgresql12:

- %ghost the symlinks to pg_config and ecpg. (bsc#1178961)
- BuildRequire libpq5 and libecpg6 when not building them to avoid dangling symlinks in the devel package. (bsc#1179765)
- Fix a DST problem in the test suite.

Changes in postgresql13:

- Add postgresql-icu68.patch: fix build with ICU 68

- %ghost the symlinks to pg_config and ecpg. (bsc#1178961)
- BuildRequire libpq5 and libecpg6 when not building them to avoid dangling symlinks in the devel package. (bsc#1179765)

Upgrade to version 13.1:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/13/release-13-1.html

- Fix a DST problem in the test suite.

  		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-26"/>
	<updated date="2021-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178961">SUSE bug 1178961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531841" comment="libecpg6-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531842" comment="libpq5-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531843" comment="libpq5-32bit-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531844" comment="postgresql-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531845" comment="postgresql-contrib-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531846" comment="postgresql-docs-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531847" comment="postgresql-plperl-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531848" comment="postgresql-plpython-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531849" comment="postgresql-pltcl-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531850" comment="postgresql-server-13-4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152454" version="1" class="patch">
	<metadata>
		<title>Security update for arpwatch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186240" ref_url="https://bugzilla.suse.com/1186240" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25321" ref_url="https://www.suse.com/security/cve/CVE-2021-25321/" source="CVE"/>
		<description>
This update for arpwatch fixes the following issues:

- CVE-2021-25321: Fixed local privilege escalation from runtime user to root (bsc#1186240).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186240">SUSE bug 1186240</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25321/">CVE-2021-25321 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25321">CVE-2021-25321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615943" comment="arpwatch-2.1a15-159.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152455" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1161510" ref_url="https://bugzilla.suse.com/1161510" source="BUGZILLA"/>
		<reference ref_id="1186229" ref_url="https://bugzilla.suse.com/1186229" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20387" ref_url="https://www.suse.com/security/cve/CVE-2019-20387/" source="CVE"/>
		<reference ref_id="CVE-2021-3200" ref_url="https://www.suse.com/security/cve/CVE-2021-3200/" source="CVE"/>
		<description>
This update for libsolv fixes the following issues:

Security issues fixed:

- CVE-2019-20387: Fixed heap-buffer-overflow in repodata_schema2id (bsc#1161510)
- CVE-2021-3200: testcase_read: error out if repos are added or the system is changed too late (bsc#1186229)

Other issues fixed:

- backport support for blacklisted packages to support ptf packages and retracted patches
- fix ruleinfo of complex dependencies returning the wrong origin
- fix SOLVER_FLAG_FOCUS_BEST updateing packages without reason
- fix add_complex_recommends() selecting conflicted packages in rare cases
- fix potential segfault in resolve_jobrules
- fix solv_zchunk decoding error if large chunks are used
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161510">SUSE bug 1161510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186229">SUSE bug 1186229</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20387/">CVE-2019-20387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20387">CVE-2019-20387 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3200/">CVE-2021-3200 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3200">CVE-2021-3200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555928" comment="libsolv-devel-0.6.37-2.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555929" comment="libsolv-tools-0.6.37-2.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555930" comment="libzypp-16.21.4-2.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555931" comment="libzypp-devel-16.21.4-2.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555932" comment="perl-solv-0.6.37-2.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555933" comment="python-solv-0.6.37-2.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152456" version="1" class="patch">
	<metadata>
		<title>Recommended update for the Azure and AWS SDKs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1125671" ref_url="https://bugzilla.suse.com/1125671" source="BUGZILLA"/>
		<reference ref_id="1154393" ref_url="https://bugzilla.suse.com/1154393" source="BUGZILLA"/>
		<reference ref_id="1175289" ref_url="https://bugzilla.suse.com/1175289" source="BUGZILLA"/>
		<reference ref_id="1176784" ref_url="https://bugzilla.suse.com/1176784" source="BUGZILLA"/>
		<reference ref_id="1176785" ref_url="https://bugzilla.suse.com/1176785" source="BUGZILLA"/>
		<reference ref_id="1182421" ref_url="https://bugzilla.suse.com/1182421" source="BUGZILLA"/>
		<reference ref_id="1187045" ref_url="https://bugzilla.suse.com/1187045" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33503" ref_url="https://www.suse.com/security/cve/CVE-2021-33503/" source="CVE"/>
		<description>
This update for the SLE Public Cloud module provides the following fixes:

Azure SDK update:
This update for the Azure SDK and CLI adds support for the AHB (Azure Hybrid Benefit).
(bsc#1176784, jsc#ECO-3105)

AWS SDK update:
This update for the AWS SDK updates python-boto3 to version 1.17.9 and aws-cli to 1.19.9.
(bsc#1182421, jsc#ECO-3352)

Security fix for python-urllib3:

- Improve performance of sub-authority splitting in URL. (bsc#1187045, CVE-2021-33503)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1125671">SUSE bug 1125671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154393">SUSE bug 1154393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175289">SUSE bug 1175289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176784">SUSE bug 1176784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176785">SUSE bug 1176785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182421">SUSE bug 1182421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187045">SUSE bug 1187045</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33503/">CVE-2021-33503 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33503">CVE-2021-33503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009616161" comment="python-boto3-1.17.9-14.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616162" comment="python-botocore-1.20.9-28.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616195" comment="python-six-1.14.0-13.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616449" comment="python3-requests-2.24.0-8.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616438" comment="python3-six-1.14.0-13.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616441" comment="python3-urllib3-1.25.10-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152457" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173513" ref_url="https://bugzilla.suse.com/1173513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14145" ref_url="https://www.suse.com/security/cve/CVE-2020-14145/" source="CVE"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2020-14145: Fixed a potential information leak during host key exchange (bsc#1173513).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173513">SUSE bug 1173513</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14145/">CVE-2020-14145 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14145">CVE-2020-14145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531851" comment="openssh-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531852" comment="openssh-askpass-gnome-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531853" comment="openssh-fips-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531854" comment="openssh-helpers-7.2p2-74.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152458" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180684" ref_url="https://bugzilla.suse.com/1180684" source="BUGZILLA"/>
		<reference ref_id="1180685" ref_url="https://bugzilla.suse.com/1180685" source="BUGZILLA"/>
		<reference ref_id="1180687" ref_url="https://bugzilla.suse.com/1180687" source="BUGZILLA"/>
		<reference ref_id="1181090" ref_url="https://bugzilla.suse.com/1181090" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23239" ref_url="https://www.suse.com/security/cve/CVE-2021-23239/" source="CVE"/>
		<reference ref_id="CVE-2021-23240" ref_url="https://www.suse.com/security/cve/CVE-2021-23240/" source="CVE"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<description>
This update for sudo fixes the following issues:

- A Heap-based buffer overflow in sudo could be exploited to allow a user to gain root privileges 
  [bsc#1181090,CVE-2021-3156]
- It was possible for a user to test for the existence of a directory due to a Race Condition in `sudoedit`
  [bsc#1180684,CVE-2021-23239]
- A Possible Symlink Attack vector existed in `sudoedit` if SELinux was running in permissive mode [bsc#1180685,
  CVE-2021-23240]
- It was possible for a User to enable Debug Settings not Intended for them [bsc#1180687]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-26"/>
	<updated date="2021-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180684">SUSE bug 1180684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180685">SUSE bug 1180685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180687">SUSE bug 1180687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181090">SUSE bug 1181090</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23239/">CVE-2021-23239 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23239">CVE-2021-23239 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23240/">CVE-2021-23240 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23240">CVE-2021-23240 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3156">CVE-2021-3156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555934" comment="sudo-1.8.20p2-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152459" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188275" ref_url="https://bugzilla.suse.com/1188275" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.12.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-29 (bsc#1188275)

* CVE-2021-29970: Use-after-free in accessibility features of a document
* CVE-2021-30547: Out of bounds write in ANGLE
* CVE-2021-29976: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29970">CVE-2021-29970 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29976">CVE-2021-29976 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30547">CVE-2021-30547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625232" comment="MozillaFirefox-78.12.0-112.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625233" comment="MozillaFirefox-devel-78.12.0-112.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625234" comment="MozillaFirefox-translations-common-78.12.0-112.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152460" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181414" ref_url="https://bugzilla.suse.com/1181414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.7.0 ESR  (MFSA 2021-04, bsc#1181414)
  * CVE-2021-23953: Fixed a Cross-origin information leakage via redirected PDF requests
  * CVE-2021-23954: Fixed a type confusion when using logical assignment operators in JavaScript switch statements
  * CVE-2020-26976: Fixed an issue where HTTPS pages could have been intercepted by a registered service worker when they should not have been
  * CVE-2021-23960: Fixed a use-after-poison for incorrectly redeclared JavaScript variables during GC
  * CVE-2021-23964: Fixed Memory safety bugs 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-29"/>
	<updated date="2021-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26976">CVE-2020-26976 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23953">CVE-2021-23953 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23954">CVE-2021-23954 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23960">CVE-2021-23960 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23964">CVE-2021-23964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531856" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531857" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531858" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152461" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188217" ref_url="https://bugzilla.suse.com/1188217" source="BUGZILLA"/>
		<reference ref_id="1188218" ref_url="https://bugzilla.suse.com/1188218" source="BUGZILLA"/>
		<reference ref_id="1188219" ref_url="https://bugzilla.suse.com/1188219" source="BUGZILLA"/>
		<reference ref_id="1188220" ref_url="https://bugzilla.suse.com/1188220" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22922" ref_url="https://www.suse.com/security/cve/CVE-2021-22922/" source="CVE"/>
		<reference ref_id="CVE-2021-22923" ref_url="https://www.suse.com/security/cve/CVE-2021-22923/" source="CVE"/>
		<reference ref_id="CVE-2021-22924" ref_url="https://www.suse.com/security/cve/CVE-2021-22924/" source="CVE"/>
		<reference ref_id="CVE-2021-22925" ref_url="https://www.suse.com/security/cve/CVE-2021-22925/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22925: TELNET stack contents disclosure again. (bsc#1188220)
- CVE-2021-22924: Bad connection reuse due to flawed path name checks. (bsc#1188219)
- CVE-2021-22923: Insufficiently Protected Credentials. (bsc#1188218)
- CVE-2021-22922: Wrong content via metalink not discarded. (bsc#1188217)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188217">SUSE bug 1188217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188218">SUSE bug 1188218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188219">SUSE bug 1188219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188220">SUSE bug 1188220</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22922/">CVE-2021-22922 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">CVE-2021-22922 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22923/">CVE-2021-22923 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">CVE-2021-22923 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22924/">CVE-2021-22924 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">CVE-2021-22924 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22925/">CVE-2021-22925 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22925">CVE-2021-22925 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626142" comment="curl-7.37.0-37.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626143" comment="libcurl4-7.37.0-37.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626144" comment="libcurl4-32bit-7.37.0-37.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152462" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178561" ref_url="https://bugzilla.suse.com/1178561" source="BUGZILLA"/>
		<reference ref_id="1184761" ref_url="https://bugzilla.suse.com/1184761" source="BUGZILLA"/>
		<reference ref_id="1184967" ref_url="https://bugzilla.suse.com/1184967" source="BUGZILLA"/>
		<reference ref_id="1185046" ref_url="https://bugzilla.suse.com/1185046" source="BUGZILLA"/>
		<reference ref_id="1185331" ref_url="https://bugzilla.suse.com/1185331" source="BUGZILLA"/>
		<reference ref_id="1185807" ref_url="https://bugzilla.suse.com/1185807" source="BUGZILLA"/>
		<reference ref_id="1188063" ref_url="https://bugzilla.suse.com/1188063" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33910" ref_url="https://www.suse.com/security/cve/CVE-2021-33910/" source="CVE"/>
		<description>
This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2021-33910: Fixed a denial of service (stack exhaustion) in systemd (PID 1) (bsc#1188063)

Other fixes:

- mount-util: shorten the loop a bit (#7545)
- mount-util: do not use the official MAX_HANDLE_SZ (#7523)
- mount-util: tape over name_to_handle_at() flakiness (#7517) (bsc#1184761)
- mount-util: fix bad indenting
- mount-util: EOVERFLOW might have other causes than buffer size issues
- mount-util: fix error propagation in fd_fdinfo_mnt_id()
- mount-util: drop exponential buffer growing in name_to_handle_at_loop()
- udev: port udev_has_devtmpfs() to use path_get_mnt_id()
- mount-util: add new path_get_mnt_id() call that queries the mnt ID of a path
- mount-util: add name_to_handle_at_loop() wrapper around name_to_handle_at()
- mount-util: accept that name_to_handle_at() might fail with EPERM (#5499)
- basic: fallback to the fstat if we don't have access to the /proc/self/fdinfo
- sysusers: use the usual comment style
- test/TEST-21-SYSUSERS: add tests for new functionality
- sysusers: allow admin/runtime overrides to command-line config
- basic/strv: add function to insert items at position
- sysusers: allow the shell to be specified
- sysusers: move various user credential validity checks to src/basic/
- man: reformat table in sysusers.d(5)
- sysusers: take configuration as positional arguments
- sysusers: emit a bit more info at debug level when locking fails
- sysusers: allow force reusing existing user/group IDs (#8037)
- sysusers: ensure GID in uid:gid syntax exists
- sysusers: make ADD_GROUP always create a group
- test: add TEST-21-SYSUSERS test
- sysuser: use OrderedHashmap
- sysusers: allow uid:gid in sysusers.conf files
- sysusers: fix memleak (#4430)
- These commits implement the option '--replace' for systemd-sysusers
  so %sysusers_create_package can be introduced in SLE and packages
  can rely on this rpm macro without wondering whether the macro is
  available on the different target the package is submitted to.
- Expect 644 permissions for /usr/lib/udev/compat-symlink-generation (bsc#1185807)
- systemctl: add --value option
- execute: make sure to call into PAM after initializing resource limits (bsc#1184967)
- rlimit-util: introduce setrlimit_closest_all()
- system-conf: drop reference to ShutdownWatchdogUsec=
- core: rename ShutdownWatchdogSec to RebootWatchdogSec (bsc#1185331)
- Return -EAGAIN instead of -EALREADY from unit_reload (bsc#1185046)
- rules: don't ignore Xen virtual interfaces anymore (bsc#1178561)
- write_net_rules: set execute bits (bsc#1178561)
- udev: rework network device renaming
- Revert 'Revert 'udev: network device renaming - immediately give up if the target name isn't available''
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178561">SUSE bug 1178561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184761">SUSE bug 1184761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184967">SUSE bug 1184967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185046">SUSE bug 1185046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185331">SUSE bug 1185331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185807">SUSE bug 1185807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33910/">CVE-2021-33910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33910">CVE-2021-33910 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625777" comment="libsystemd0-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625743" comment="libsystemd0-32bit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625778" comment="libudev1-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625746" comment="libudev1-32bit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625779" comment="systemd-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625748" comment="systemd-32bit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625749" comment="systemd-bash-completion-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625780" comment="systemd-devel-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625781" comment="systemd-sysvinit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625782" comment="udev-228-150.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152463" version="1" class="patch">
	<metadata>
		<title>Security update for linuxptp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1187646" ref_url="https://bugzilla.suse.com/1187646" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3570" ref_url="https://www.suse.com/security/cve/CVE-2021-3570/" source="CVE"/>
		<description>
This update for linuxptp fixes the following issues:

- CVE-2021-3570: Validate the messageLength field of incoming messages. (bsc#1187646)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187646">SUSE bug 1187646</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3570/">CVE-2021-3570 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3570">CVE-2021-3570 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626114" comment="linuxptp-1.4-15.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152464" version="1" class="patch">
	<metadata>
		<title>Security update for python36 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180377" ref_url="https://bugzilla.suse.com/1180377" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
This update for python36 fixes the following issues:

- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
- readd --with-fpectl (bsc#1180377)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-01"/>
	<updated date="2021-02-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180377">SUSE bug 1180377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557759" comment="libpython3_6m1_0-3.6.12-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557760" comment="python36-3.6.12-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557761" comment="python36-base-3.6.12-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557762" comment="python36-curses-3.6.12-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557763" comment="python36-dbm-3.6.12-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557764" comment="python36-devel-3.6.12-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557765" comment="python36-doc-3.6.12-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557766" comment="python36-idle-3.6.12-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557767" comment="python36-testsuite-3.6.12-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557768" comment="python36-tk-3.6.12-6.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557769" comment="python36-tools-3.6.12-6.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152465" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1187364" ref_url="https://bugzilla.suse.com/1187364" source="BUGZILLA"/>
		<reference ref_id="1187365" ref_url="https://bugzilla.suse.com/1187365" source="BUGZILLA"/>
		<reference ref_id="1187366" ref_url="https://bugzilla.suse.com/1187366" source="BUGZILLA"/>
		<reference ref_id="1187367" ref_url="https://bugzilla.suse.com/1187367" source="BUGZILLA"/>
		<reference ref_id="1187529" ref_url="https://bugzilla.suse.com/1187529" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3593" ref_url="https://www.suse.com/security/cve/CVE-2021-3593/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<reference ref_id="CVE-2021-3611" ref_url="https://www.suse.com/security/cve/CVE-2021-3611/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2021-3595: Fixed slirp: invalid pointer initialization may lead to information disclosure (tftp) (bsc#1187366)
- CVE-2021-3592: Fix for slirp: invalid pointer initialization may lead to information disclosure (bootp) (bsc#1187364)
- CVE-2021-3594: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp) (bsc#1187367)
- CVE-2021-3593: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp6) (bsc#1187365)
- CVE-2021-3611: Fix intel-hda segmentation fault due to stack overflow (bsc#1187529)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-29"/>
	<updated date="2021-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187365">SUSE bug 1187365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187366">SUSE bug 1187366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187529">SUSE bug 1187529</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3593/">CVE-2021-3593 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3593">CVE-2021-3593 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3595">CVE-2021-3595 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3611/">CVE-2021-3611 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3611">CVE-2021-3611 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625025" comment="qemu-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625026" comment="qemu-block-curl-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625027" comment="qemu-block-iscsi-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624976" comment="qemu-block-rbd-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625028" comment="qemu-block-ssh-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625029" comment="qemu-guest-agent-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624979" comment="qemu-ipxe-1.0.0+-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624980" comment="qemu-kvm-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625030" comment="qemu-lang-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624983" comment="qemu-seabios-1.10.2_0_g5f4c7b1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624984" comment="qemu-sgabios-8-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625031" comment="qemu-tools-2.9.1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624986" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-6.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624987" comment="qemu-x86-2.9.1-6.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152466" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172505" ref_url="https://bugzilla.suse.com/1172505" source="BUGZILLA"/>
		<reference ref_id="1187105" ref_url="https://bugzilla.suse.com/1187105" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12049" ref_url="https://www.suse.com/security/cve/CVE-2020-12049/" source="CVE"/>
		<reference ref_id="CVE-2020-35512" ref_url="https://www.suse.com/security/cve/CVE-2020-35512/" source="CVE"/>
		<description>
This update for dbus-1 fixes the following issues:

- CVE-2020-35512: Fixed a bug where users with the same numeric UID could lead to use-after-free and undefined behaviour. (bsc#1187105)
- CVE-2020-12049: Fixed a bug where a truncated messages lead to resource exhaustion. (bsc#1172505)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-02"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172505">SUSE bug 1172505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187105">SUSE bug 1187105</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12049/">CVE-2020-12049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12049">CVE-2020-12049 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35512/">CVE-2020-35512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35512">CVE-2020-35512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625809" comment="dbus-1-1.8.22-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625810" comment="dbus-1-x11-1.8.22-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625811" comment="libdbus-1-3-1.8.22-29.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625756" comment="libdbus-1-3-32bit-1.8.22-29.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152467" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188697" ref_url="https://bugzilla.suse.com/1188697" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21775" ref_url="https://www.suse.com/security/cve/CVE-2021-21775/" source="CVE"/>
		<reference ref_id="CVE-2021-21779" ref_url="https://www.suse.com/security/cve/CVE-2021-21779/" source="CVE"/>
		<reference ref_id="CVE-2021-30663" ref_url="https://www.suse.com/security/cve/CVE-2021-30663/" source="CVE"/>
		<reference ref_id="CVE-2021-30665" ref_url="https://www.suse.com/security/cve/CVE-2021-30665/" source="CVE"/>
		<reference ref_id="CVE-2021-30689" ref_url="https://www.suse.com/security/cve/CVE-2021-30689/" source="CVE"/>
		<reference ref_id="CVE-2021-30720" ref_url="https://www.suse.com/security/cve/CVE-2021-30720/" source="CVE"/>
		<reference ref_id="CVE-2021-30734" ref_url="https://www.suse.com/security/cve/CVE-2021-30734/" source="CVE"/>
		<reference ref_id="CVE-2021-30744" ref_url="https://www.suse.com/security/cve/CVE-2021-30744/" source="CVE"/>
		<reference ref_id="CVE-2021-30749" ref_url="https://www.suse.com/security/cve/CVE-2021-30749/" source="CVE"/>
		<reference ref_id="CVE-2021-30758" ref_url="https://www.suse.com/security/cve/CVE-2021-30758/" source="CVE"/>
		<reference ref_id="CVE-2021-30795" ref_url="https://www.suse.com/security/cve/CVE-2021-30795/" source="CVE"/>
		<reference ref_id="CVE-2021-30797" ref_url="https://www.suse.com/security/cve/CVE-2021-30797/" source="CVE"/>
		<reference ref_id="CVE-2021-30799" ref_url="https://www.suse.com/security/cve/CVE-2021-30799/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.32.3:

- CVE-2021-21775: Fixed a use-after-free vulnerability in the way certain events are processed for ImageLoader objects. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. (bsc#1188697)
- CVE-2021-21779: Fixed a use-after-free vulnerability in the way that WebKit GraphicsContext handles certain events. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. (bsc#1188697)
- CVE-2021-30663: An integer overflow was addressed with improved input validation. (bsc#1188697)
- CVE-2021-30665: A memory corruption issue was addressed with improved state management. (bsc#1188697)
- CVE-2021-30689: A logic issue was addressed with improved state management. (bsc#1188697)
- CVE-2021-30720: A logic issue was addressed with improved restrictions. (bsc#1188697)
- CVE-2021-30734: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
- CVE-2021-30744: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. (bsc#1188697)
- CVE-2021-30749: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
- CVE-2021-30758: A type confusion issue was addressed with improved state handling. (bsc#1188697)
- CVE-2021-30795: A use after free issue was addressed with improved memory management. (bsc#1188697)
- CVE-2021-30797: This issue was addressed with improved checks. (bsc#1188697)
- CVE-2021-30799: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-03"/>
	<updated date="2021-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21775/">CVE-2021-21775 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21775">CVE-2021-21775 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21779/">CVE-2021-21779 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21779">CVE-2021-21779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30663/">CVE-2021-30663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30663">CVE-2021-30663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30665/">CVE-2021-30665 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30665">CVE-2021-30665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30689/">CVE-2021-30689 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30689">CVE-2021-30689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30720/">CVE-2021-30720 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30720">CVE-2021-30720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30734/">CVE-2021-30734 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30734">CVE-2021-30734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30744/">CVE-2021-30744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30744">CVE-2021-30744 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30749/">CVE-2021-30749 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30749">CVE-2021-30749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30758/">CVE-2021-30758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30758">CVE-2021-30758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30795/">CVE-2021-30795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30795">CVE-2021-30795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30797/">CVE-2021-30797 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30797">CVE-2021-30797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30799/">CVE-2021-30799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30799">CVE-2021-30799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627312" comment="libjavascriptcoregtk-4_0-18-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627313" comment="libwebkit2gtk-4_0-37-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627314" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627315" comment="typelib-1_0-WebKit2-4_0-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627316" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627317" comment="webkit2gtk-4_0-injected-bundles-2.32.3-2.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152468" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1100167" ref_url="https://bugzilla.suse.com/1100167" source="BUGZILLA"/>
		<reference ref_id="1116993" ref_url="https://bugzilla.suse.com/1116993" source="BUGZILLA"/>
		<reference ref_id="1117954" ref_url="https://bugzilla.suse.com/1117954" source="BUGZILLA"/>
		<reference ref_id="1188540" ref_url="https://bugzilla.suse.com/1188540" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13139" ref_url="https://www.suse.com/security/cve/CVE-2018-13139/" source="CVE"/>
		<reference ref_id="CVE-2018-19432" ref_url="https://www.suse.com/security/cve/CVE-2018-19432/" source="CVE"/>
		<reference ref_id="CVE-2018-19758" ref_url="https://www.suse.com/security/cve/CVE-2018-19758/" source="CVE"/>
		<reference ref_id="CVE-2021-3246" ref_url="https://www.suse.com/security/cve/CVE-2021-3246/" source="CVE"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2018-13139: Fixed a stack-based buffer overflow in psf_memset in common.c in libsndfile 1.0.28allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact. (bsc#1100167)
- CVE-2018-19432: Fixed a NULL pointer dereference in the function sf_write_int in sndfile.c, which will lead to a denial of service. (bsc#1116993)
- CVE-2021-3246: Fixed a heap buffer overflow vulnerability in msadpcm_decode_block. (bsc#1188540)
- CVE-2018-19758: Fixed a heap-based buffer over-read at wav.c in wav_write_header in libsndfile 1.0.28 that will cause a denial of service. (bsc#1117954)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1100167">SUSE bug 1100167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116993">SUSE bug 1116993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117954">SUSE bug 1117954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188540">SUSE bug 1188540</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13139/">CVE-2018-13139 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13139">CVE-2018-13139 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19432/">CVE-2018-19432 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19432">CVE-2018-19432 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19758/">CVE-2018-19758 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19758">CVE-2018-19758 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3246/">CVE-2021-3246 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3246">CVE-2021-3246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626903" comment="libsndfile1-1.0.25-36.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626901" comment="libsndfile1-32bit-1.0.25-36.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152469" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3630: out-of-bounds write in DJVU:DjVuTXT:decode() in DjVuText.cpp (bsc#1187869)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3630">CVE-2021-3630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627946" comment="libdjvulibre21-3.5.25.3-5.19.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152470" version="1" class="patch">
	<metadata>
		<title>Security update for fastjar (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188517" ref_url="https://bugzilla.suse.com/1188517" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2322" ref_url="https://www.suse.com/security/cve/CVE-2010-2322/" source="CVE"/>
		<description>
This update for fastjar fixes the following issues:

- CVE-2010-2322: Fixed a directory traversal vulnerabilities. (bsc#1188517)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-06"/>
	<updated date="2021-08-06"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1188517">SUSE bug 1188517</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2010-2322/">CVE-2010-2322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2322">CVE-2010-2322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626538" comment="fastjar-0.98-22.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152471" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189206" ref_url="https://bugzilla.suse.com/1189206" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<description>
This update for cpio fixes the following issues:

  It was possible to trigger Remote code execution due to a integer overflow (CVE-2021-38185, bsc#1189206)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-14"/>
	<updated date="2021-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189206">SUSE bug 1189206</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630615" comment="cpio-2.11-36.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630610" comment="cpio-lang-2.11-36.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152472" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188881" ref_url="https://bugzilla.suse.com/1188881" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<description>
This update for libcares2 fixes the following issues:

- CVE-2021-3672: Fixed input validation on hostnames (bsc#1188881).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3672">CVE-2021-3672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630393" comment="libcares2-1.9.1-9.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152473" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.13.0 ESR (MFSA 2021-34, bsc#1188891):

- CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
- CVE-2021-29988: Memory corruption as a result of incorrect style treatment
- CVE-2021-29984: Incorrect instruction reordering during JIT optimization
- CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
- CVE-2021-29985: Use-after-free media channels
- CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630616" comment="MozillaFirefox-78.13.0-112.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630617" comment="MozillaFirefox-devel-78.13.0-112.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630618" comment="MozillaFirefox-translations-common-78.13.0-112.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152474" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1103032" ref_url="https://bugzilla.suse.com/1103032" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<description>
This update for libmspack fixes the following issues:

- CVE-2018-14681: Bad KWAJ file header extensions could cause a one or two byte overwrite. (bsc#1103032)
- CVE-2018-14682: There is an off-by-one error in the TOLOWER() macro for CHM decompression. (bsc#1103032)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14681">CVE-2018-14681 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14682">CVE-2018-14682 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626140" comment="libmspack0-0.4-15.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152475" version="1" class="patch">
	<metadata>
		<title>Security update for spice-vdagent (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177780" ref_url="https://bugzilla.suse.com/1177780" source="BUGZILLA"/>
		<reference ref_id="1177781" ref_url="https://bugzilla.suse.com/1177781" source="BUGZILLA"/>
		<reference ref_id="1177782" ref_url="https://bugzilla.suse.com/1177782" source="BUGZILLA"/>
		<reference ref_id="1177783" ref_url="https://bugzilla.suse.com/1177783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25650" ref_url="https://www.suse.com/security/cve/CVE-2020-25650/" source="CVE"/>
		<reference ref_id="CVE-2020-25651" ref_url="https://www.suse.com/security/cve/CVE-2020-25651/" source="CVE"/>
		<reference ref_id="CVE-2020-25652" ref_url="https://www.suse.com/security/cve/CVE-2020-25652/" source="CVE"/>
		<reference ref_id="CVE-2020-25653" ref_url="https://www.suse.com/security/cve/CVE-2020-25653/" source="CVE"/>
		<description>
This update for spice-vdagent fixes the following issues:

- CVE-2020-25650: memory DoS via arbitrary entries in `active_xfers` hash table (bsc#1177780)
- CVE-2020-25651: possible file transfer DoS and information leak via `active_xfers` hash map (bsc#1177781)
- CVE-2020-25652: possibility to exhaust file descriptors in `vdagentd` (bsc#1177782) 
- CVE-2020-25653: UNIX domain socket peer PID retrieved via `SO_PEERCRED` is subject to race condition (bsc#1177783) 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177780">SUSE bug 1177780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177781">SUSE bug 1177781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177782">SUSE bug 1177782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177783">SUSE bug 1177783</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25650/">CVE-2020-25650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25650">CVE-2020-25650 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25651/">CVE-2020-25651 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25651">CVE-2020-25651 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25652/">CVE-2020-25652 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25652">CVE-2020-25652 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25653/">CVE-2020-25653 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25653">CVE-2020-25653 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626141" comment="spice-vdagent-0.16.0-8.8.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152476" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1033081" ref_url="https://bugzilla.suse.com/1033081" source="BUGZILLA"/>
		<reference ref_id="1182807" ref_url="https://bugzilla.suse.com/1182807" source="BUGZILLA"/>
		<reference ref_id="1188034" ref_url="https://bugzilla.suse.com/1188034" source="BUGZILLA"/>
		<reference ref_id="1188875" ref_url="https://bugzilla.suse.com/1188875" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36386" ref_url="https://www.suse.com/security/cve/CVE-2021-36386/" source="CVE"/>
		<description>
This update for fetchmail fixes the following issues:

- CVE-2021-36386: DoS or information disclosure in some configurations (bsc#1188875)
- Change PASSWORDLEN from 64 to 256 [bsc#1188034]
- Set the hostname for SNI when using TLS [bsc#1182807]
- Allow --syslog option in daemon mode. (bsc#1033081)
- Set the hostname for SNI when using TLS. (bsc#1182807)
- Change PASSWORDLEN from 64 to 256 (bsc#1188034)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-18"/>
	<updated date="2021-08-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033081">SUSE bug 1033081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182807">SUSE bug 1182807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188034">SUSE bug 1188034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188875">SUSE bug 1188875</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36386/">CVE-2021-36386 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36386">CVE-2021-36386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630872" comment="fetchmail-6.3.26-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630873" comment="fetchmailconf-6.3.26-13.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152477" version="1" class="patch">
	<metadata>
		<title>Recommended update for cpio (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189465" ref_url="https://bugzilla.suse.com/1189465" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<description>
This update for cpio fixes the following issues:

- A regression in the previous update could lead to crashes (bsc#1189465)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-19"/>
	<updated date="2021-08-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1189465">SUSE bug 1189465</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631319" comment="cpio-2.11-36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631320" comment="cpio-lang-2.11-36.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152478" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185056" ref_url="https://bugzilla.suse.com/1185056" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188566" ref_url="https://bugzilla.suse.com/1188566" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2161" ref_url="https://www.suse.com/security/cve/CVE-2021-2161/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u302 (icedtea 3.20.0)
- CVE-2021-2341: Improve file transfers. (bsc#1188564)
- CVE-2021-2369: Better jar file validation. (bsc#1188565)
- CVE-2021-2388: Enhance compiler validation. (bsc#1188566)
- CVE-2021-2161: Less ambiguous processing. (bsc#1185056)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185056">SUSE bug 1185056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188566">SUSE bug 1188566</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2161/">CVE-2021-2161 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2161">CVE-2021-2161 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2388">CVE-2021-2388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627215" comment="java-1_8_0-openjdk-1.8.0.302-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627216" comment="java-1_8_0-openjdk-demo-1.8.0.302-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627217" comment="java-1_8_0-openjdk-devel-1.8.0.302-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627218" comment="java-1_8_0-openjdk-headless-1.8.0.302-27.63.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152479" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189465" ref_url="https://bugzilla.suse.com/1189465" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<description>
This update for cpio fixes the following issues:

- A patch previously applied to remedy CVE-2021-38185 introduced a regression
  that had the potential to cause a segmentation fault in cpio. [bsc#1189465]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189465">SUSE bug 1189465</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631542" comment="cpio-2.11-36.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631541" comment="cpio-lang-2.11-36.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152480" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyYAML (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174514" ref_url="https://bugzilla.suse.com/1174514" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14343" ref_url="https://www.suse.com/security/cve/CVE-2020-14343/" source="CVE"/>
		<description>

This update for python-PyYAML fixes the following issues:

- Update to 5.3.1.

- CVE-2020-14343: A vulnerability was discovered in the PyYAML library,
  where it was susceptible to arbitrary code execution when it processes
  untrusted YAML files through the full_load method or with the FullLoader
  loader. Applications that use the library to process untrusted input
  may be vulnerable to this flaw. This flaw allows an attacker to
  execute arbitrary code on the system by abusing the python/object/new
  constructor. This flaw is due to an incomplete fix for CVE-2020-1747.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174514">SUSE bug 1174514</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14343/">CVE-2020-14343 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14343">CVE-2020-14343 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628223" comment="python-PyYAML-5.3.1-28.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628224" comment="python3-PyYAML-5.3.1-28.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152481" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
This update for openssl fixes the following security issue:

- CVE-2021-3712: a bug in the code for printing certificate details could lead
  to a buffer overrun that a malicious actor could exploit to crash the
  application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631696" comment="libopenssl-devel-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631697" comment="libopenssl1_0_0-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631678" comment="libopenssl1_0_0-32bit-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631698" comment="libopenssl1_0_0-hmac-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631680" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631699" comment="openssl-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631682" comment="openssl-doc-1.0.2j-60.69.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152482" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1046882" ref_url="https://bugzilla.suse.com/1046882" source="BUGZILLA"/>
		<reference ref_id="1054038" ref_url="https://bugzilla.suse.com/1054038" source="BUGZILLA"/>
		<reference ref_id="1187974" ref_url="https://bugzilla.suse.com/1187974" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-12938" ref_url="https://www.suse.com/security/cve/CVE-2017-12938/" source="CVE"/>
		<reference ref_id="CVE-2017-12940" ref_url="https://www.suse.com/security/cve/CVE-2017-12940/" source="CVE"/>
		<reference ref_id="CVE-2017-12941" ref_url="https://www.suse.com/security/cve/CVE-2017-12941/" source="CVE"/>
		<reference ref_id="CVE-2017-12942" ref_url="https://www.suse.com/security/cve/CVE-2017-12942/" source="CVE"/>
		<reference ref_id="CVE-2017-20006" ref_url="https://www.suse.com/security/cve/CVE-2017-20006/" source="CVE"/>
		<description>
This update for unrar to version 5.6.1 fixes several issues.

These security issues were fixed:

- CVE-2017-12938: Prevent remote attackers to bypass a directory-traversal
  protection mechanism via vectors involving a symlink to the . directory, a
  symlink to the .. directory, and a regular file (bsc#1054038).
- CVE-2017-12940: Prevent out-of-bounds read in the EncodeFileName::Decode call
  within the Archive::ReadHeader15 function (bsc#1054038).
- CVE-2017-12941: Prevent an out-of-bounds read in the Unpack::Unpack20
  function (bsc#1054038).
- CVE-2017-12942: Prevent a buffer overflow in the Unpack::LongLZ function
  (bsc#1054038).
- CVE-2017-20006: Fixed heap-based buffer overflow in Unpack:CopyString (bsc#1187974).

These non-security issues were fixed:

- Added extraction support for .LZ archives created by Lzip compressor
- Enable unpacking of files in ZIP archives compressed with XZ algorithm and
  encrypted with AES
- Added support for PAX extended headers inside of TAR archive
- If RAR recovery volumes (.rev files) are present in the same folder as usual
  RAR volumes, archive test command verifies .rev contents after completing
  testing .rar files
- By default unrar skips symbolic links with absolute paths in link target when
  extracting unless -ola command line switch is specified
- Added support for AES-NI CPU instructions
- Support for a new RAR 5.0 archiving format
- Wildcard exclusion mask for folders
- Prevent conditional jumps depending on uninitialised values (bsc#1046882)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046882">SUSE bug 1046882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054038">SUSE bug 1054038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187974">SUSE bug 1187974</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6706">CVE-2012-6706 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12938/">CVE-2017-12938 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12938">CVE-2017-12938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12940/">CVE-2017-12940 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12940">CVE-2017-12940 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12941/">CVE-2017-12941 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12941">CVE-2017-12941 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12942/">CVE-2017-12942 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12942">CVE-2017-12942 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-20006/">CVE-2017-20006 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-20006">CVE-2017-20006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631579" comment="unrar-5.6.1-4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152483" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1117483" ref_url="https://bugzilla.suse.com/1117483" source="BUGZILLA"/>
		<reference ref_id="1181345" ref_url="https://bugzilla.suse.com/1181345" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27827" ref_url="https://www.suse.com/security/cve/CVE-2020-27827/" source="CVE"/>
		<description>
This update for openvswitch fixes the following issues:
	  
- openvswitch was updated to 2.7.12
- CVE-2020-27827: Fixed a memory leak when parsing lldp packets (bsc#1181345)	  
A lot more minor bugs have been fixed with this openvswitch version. Please refer to the changelog of
the openvswitch.rpm file in order to obtain a list of all changes.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-02"/>
	<updated date="2021-02-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1117483">SUSE bug 1117483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181345">SUSE bug 1181345</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27827/">CVE-2020-27827 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27827">CVE-2020-27827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555935" comment="openvswitch-2.7.12-3.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152484" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188576" ref_url="https://bugzilla.suse.com/1188576" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25051" ref_url="https://www.suse.com/security/cve/CVE-2019-25051/" source="CVE"/>
		<description>
This update for aspell fixes the following issues:

- CVE-2019-25051: Fixed heap-buffer-overflow in acommon:ObjStack:dup_top (bsc#1188576).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188576">SUSE bug 1188576</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25051/">CVE-2019-25051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25051">CVE-2019-25051 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627800" comment="aspell-0.60.6.1-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627801" comment="aspell-ispell-0.60.6.1-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627802" comment="libaspell15-0.60.6.1-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627791" comment="libaspell15-32bit-0.60.6.1-18.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152485" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1170671" ref_url="https://bugzilla.suse.com/1170671" source="BUGZILLA"/>
		<reference ref_id="1180520" ref_url="https://bugzilla.suse.com/1180520" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8842" ref_url="https://www.suse.com/security/cve/CVE-2019-8842/" source="CVE"/>
		<reference ref_id="CVE-2020-10001" ref_url="https://www.suse.com/security/cve/CVE-2020-10001/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-10001: Fixed an out-of-bounds read in the ippReadIO function (bsc#1180520).
- CVE-2019-8842: Fixed an out-of-bounds read in an extension field (bsc#1170671).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-02"/>
	<updated date="2021-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170671">SUSE bug 1170671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180520">SUSE bug 1180520</bugzilla>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8842/">CVE-2019-8842 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8842">CVE-2019-8842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10001/">CVE-2020-10001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10001">CVE-2020-10001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557770" comment="cups-1.7.5-20.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557771" comment="cups-client-1.7.5-20.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557772" comment="cups-libs-1.7.5-20.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557773" comment="cups-libs-32bit-1.7.5-20.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152486" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1175443" ref_url="https://bugzilla.suse.com/1175443" source="BUGZILLA"/>
		<reference ref_id="1188888" ref_url="https://bugzilla.suse.com/1188888" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8622" ref_url="https://www.suse.com/security/cve/CVE-2020-8622/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8622: A truncated TSIG response can lead to an assertion failure (bsc#1175443).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-30"/>
	<updated date="2021-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188888">SUSE bug 1188888</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8622/">CVE-2020-8622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8622">CVE-2020-8622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627796" comment="bind-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627797" comment="bind-chrootenv-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627784" comment="bind-doc-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627798" comment="bind-libs-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627786" comment="bind-libs-32bit-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627799" comment="bind-utils-9.9.9P1-63.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152487" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188457" ref_url="https://bugzilla.suse.com/1188457" source="BUGZILLA"/>
		<reference ref_id="1188458" ref_url="https://bugzilla.suse.com/1188458" source="BUGZILLA"/>
		<reference ref_id="1188459" ref_url="https://bugzilla.suse.com/1188459" source="BUGZILLA"/>
		<reference ref_id="1188460" ref_url="https://bugzilla.suse.com/1188460" source="BUGZILLA"/>
		<reference ref_id="1188461" ref_url="https://bugzilla.suse.com/1188461" source="BUGZILLA"/>
		<reference ref_id="1188462" ref_url="https://bugzilla.suse.com/1188462" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20298" ref_url="https://www.suse.com/security/cve/CVE-2021-20298/" source="CVE"/>
		<reference ref_id="CVE-2021-20299" ref_url="https://www.suse.com/security/cve/CVE-2021-20299/" source="CVE"/>
		<reference ref_id="CVE-2021-20300" ref_url="https://www.suse.com/security/cve/CVE-2021-20300/" source="CVE"/>
		<reference ref_id="CVE-2021-20302" ref_url="https://www.suse.com/security/cve/CVE-2021-20302/" source="CVE"/>
		<reference ref_id="CVE-2021-20303" ref_url="https://www.suse.com/security/cve/CVE-2021-20303/" source="CVE"/>
		<reference ref_id="CVE-2021-20304" ref_url="https://www.suse.com/security/cve/CVE-2021-20304/" source="CVE"/>
		<reference ref_id="CVE-2021-3476" ref_url="https://www.suse.com/security/cve/CVE-2021-3476/" source="CVE"/>
		<description>
This update for openexr fixes the following issues:

- CVE-2021-20298 [bsc#1188460]: Fixed Out-of-memory in B44Compressor
- CVE-2021-20299 [bsc#1188459]: Fixed Null-dereference READ in Imf_2_5:Header:operator
- CVE-2021-20300 [bsc#1188458]: Fixed Integer-overflow in Imf_2_5:hufUncompress
- CVE-2021-20302 [bsc#1188462]: Fixed Floating-point-exception in Imf_2_5:precalculateTileInfot
- CVE-2021-20303 [bsc#1188457]: Fixed Heap-buffer-overflow in Imf_2_5::copyIntoFrameBuffer
- CVE-2021-20304 [bsc#1188461]: Fixed Undefined-shift in Imf_2_5:hufDecode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188457">SUSE bug 1188457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188458">SUSE bug 1188458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188459">SUSE bug 1188459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188460">SUSE bug 1188460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188461">SUSE bug 1188461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188462">SUSE bug 1188462</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20298/">CVE-2021-20298 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20298">CVE-2021-20298 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20299/">CVE-2021-20299 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20299">CVE-2021-20299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20300/">CVE-2021-20300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20300">CVE-2021-20300 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20302/">CVE-2021-20302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20302">CVE-2021-20302 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-20303/">CVE-2021-20303 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20303">CVE-2021-20303 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20304/">CVE-2021-20304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20304">CVE-2021-20304 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3476/">CVE-2021-3476 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3476">CVE-2021-3476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627947" comment="libIlmImf-Imf_2_1-21-2.1.0-6.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627948" comment="openexr-2.1.0-6.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152488" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-good (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184739" ref_url="https://bugzilla.suse.com/1184739" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3497" ref_url="https://www.suse.com/security/cve/CVE-2021-3497/" source="CVE"/>
		<description>
This update for gstreamer-plugins-good fixes the following issues:

- CVE-2021-3497: Matroskademux: Fix extraction of multichannel WavPack (bsc#1184739).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184739">SUSE bug 1184739</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3497/">CVE-2021-3497 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3497">CVE-2021-3497 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628149" comment="gstreamer-plugins-good-1.8.3-16.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628150" comment="gstreamer-plugins-good-lang-1.8.3-16.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152489" version="1" class="patch">
	<metadata>
		<title>Security update for libesmtp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1160462" ref_url="https://bugzilla.suse.com/1160462" source="BUGZILLA"/>
		<reference ref_id="1189097" ref_url="https://bugzilla.suse.com/1189097" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19977" ref_url="https://www.suse.com/security/cve/CVE-2019-19977/" source="CVE"/>
		<description>
This update for libesmtp fixes the following issues:

- CVE-2019-19977: Fix stack-based buffer over-read in ntlm/ntlmstruct.c (bsc#1160462).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160462">SUSE bug 1160462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189097">SUSE bug 1189097</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19977/">CVE-2019-19977 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19977">CVE-2019-19977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628213" comment="libesmtp-1.0.6-17.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152490" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189387" ref_url="https://bugzilla.suse.com/1189387" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33193" ref_url="https://www.suse.com/security/cve/CVE-2021-33193/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-33193: Fixed request splitting via HTTP/2 method injection and mod_proxy (bsc#1189387).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189387">SUSE bug 1189387</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33193/">CVE-2021-33193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33193">CVE-2021-33193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631271" comment="apache2-2.4.23-29.77.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631272" comment="apache2-doc-2.4.23-29.77.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631273" comment="apache2-example-pages-2.4.23-29.77.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631274" comment="apache2-prefork-2.4.23-29.77.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631275" comment="apache2-utils-2.4.23-29.77.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631276" comment="apache2-worker-2.4.23-29.77.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152491" version="1" class="patch">
	<metadata>
		<title>Security update for file (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154661" ref_url="https://bugzilla.suse.com/1154661" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18218" ref_url="https://www.suse.com/security/cve/CVE-2019-18218/" source="CVE"/>
		<description>
This update for file fixes the following issues:

- CVE-2019-18218: Fixed heap-based buffer overflow in cdf_read_property_info in cdf.c (bsc#1154661).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154661">SUSE bug 1154661</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18218/">CVE-2019-18218 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18218">CVE-2019-18218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628151" comment="file-5.22-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628152" comment="file-magic-5.22-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628153" comment="libmagic1-5.22-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628154" comment="libmagic1-32bit-5.22-10.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152492" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-c (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159552" ref_url="https://bugzilla.suse.com/1159552" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1311" ref_url="https://www.suse.com/security/cve/CVE-2018-1311/" source="CVE"/>
		<description>
This update for xerces-c fixes the following issues:

- CVE-2018-1311: Fixed use-after-free inside XML parser during the scanning of external DTDs (bsc#1159552).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-03"/>
	<updated date="2021-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159552">SUSE bug 1159552</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1311/">CVE-2018-1311 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1311">CVE-2018-1311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632306" comment="libxerces-c-3_1-3.1.1-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632307" comment="libxerces-c-3_1-32bit-3.1.1-13.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152493" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182654" ref_url="https://bugzilla.suse.com/1182654" source="BUGZILLA"/>
		<reference ref_id="1186429" ref_url="https://bugzilla.suse.com/1186429" source="BUGZILLA"/>
		<reference ref_id="1186433" ref_url="https://bugzilla.suse.com/1186433" source="BUGZILLA"/>
		<reference ref_id="1186434" ref_url="https://bugzilla.suse.com/1186434" source="BUGZILLA"/>
		<reference ref_id="1187369" ref_url="https://bugzilla.suse.com/1187369" source="BUGZILLA"/>
		<reference ref_id="1187376" ref_url="https://bugzilla.suse.com/1187376" source="BUGZILLA"/>
		<reference ref_id="1187378" ref_url="https://bugzilla.suse.com/1187378" source="BUGZILLA"/>
		<reference ref_id="1189373" ref_url="https://bugzilla.suse.com/1189373" source="BUGZILLA"/>
		<reference ref_id="1189376" ref_url="https://bugzilla.suse.com/1189376" source="BUGZILLA"/>
		<reference ref_id="1189378" ref_url="https://bugzilla.suse.com/1189378" source="BUGZILLA"/>
		<reference ref_id="1189380" ref_url="https://bugzilla.suse.com/1189380" source="BUGZILLA"/>
		<reference ref_id="1189882" ref_url="https://bugzilla.suse.com/1189882" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0089" ref_url="https://www.suse.com/security/cve/CVE-2021-0089/" source="CVE"/>
		<reference ref_id="CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255/" source="CVE"/>
		<reference ref_id="CVE-2021-28690" ref_url="https://www.suse.com/security/cve/CVE-2021-28690/" source="CVE"/>
		<reference ref_id="CVE-2021-28692" ref_url="https://www.suse.com/security/cve/CVE-2021-28692/" source="CVE"/>
		<reference ref_id="CVE-2021-28694" ref_url="https://www.suse.com/security/cve/CVE-2021-28694/" source="CVE"/>
		<reference ref_id="CVE-2021-28695" ref_url="https://www.suse.com/security/cve/CVE-2021-28695/" source="CVE"/>
		<reference ref_id="CVE-2021-28696" ref_url="https://www.suse.com/security/cve/CVE-2021-28696/" source="CVE"/>
		<reference ref_id="CVE-2021-28697" ref_url="https://www.suse.com/security/cve/CVE-2021-28697/" source="CVE"/>
		<reference ref_id="CVE-2021-28698" ref_url="https://www.suse.com/security/cve/CVE-2021-28698/" source="CVE"/>
		<reference ref_id="CVE-2021-28699" ref_url="https://www.suse.com/security/cve/CVE-2021-28699/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-3594: slirp: invalid pointer initialization may lead to information disclosure (udp)(bsc#1187378).
- CVE-2021-3595: slirp: invalid pointer initialization may lead to information disclosure (tftp)(bsc#1187376).
- CVE-2021-28698: long running loops in grant table handling (XSA-380)(bsc#1189378).
- CVE-2021-28699: inadequate grant-v2 status frames array bounds check (XSA-382)(bsc#1189380).
- CVE-2021-20255: Fixed stack overflow via infinite recursion in eepro100 (bsc#1182654)
- CVE-2021-28690: xen: x86: TSX Async Abort protections not restored after S3 (bsc#1186434)
- CVE-2021-28692: xen: inappropriate x86 IOMMU timeout detection / handling (bsc#1186429)
- CVE-2021-28694,CVE-2021-28695,CVE-2021-28696: IOMMU page mapping issues on x86 (XSA-378)(bsc#1189373).
- CVE-2021-0089: xen: Speculative Code Store Bypass (bsc#1186433)
- CVE-2021-28697: grant table v2 status pages may remain accessible after de-allocation (XSA-379)(bsc#1189376).
- CVE-2021-3592: slirp: invalid pointer initialization may lead to information disclosure (bootp)(bsc#1187369).

- Prevent superpage allocation in the LAPIC and ACPI_INFO range (bsc#1189882).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-06"/>
	<updated date="2021-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182654">SUSE bug 1182654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186429">SUSE bug 1186429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186433">SUSE bug 1186433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186434">SUSE bug 1186434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187369">SUSE bug 1187369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187376">SUSE bug 1187376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187378">SUSE bug 1187378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189376">SUSE bug 1189376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189378">SUSE bug 1189378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189380">SUSE bug 1189380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189882">SUSE bug 1189882</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0089/">CVE-2021-0089 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0089">CVE-2021-0089 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20255">CVE-2021-20255 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28690/">CVE-2021-28690 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28690">CVE-2021-28690 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-28692/">CVE-2021-28692 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28692">CVE-2021-28692 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28694/">CVE-2021-28694 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28694">CVE-2021-28694 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28695/">CVE-2021-28695 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28695">CVE-2021-28695 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28696/">CVE-2021-28696 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28696">CVE-2021-28696 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28697/">CVE-2021-28697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28697">CVE-2021-28697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28698/">CVE-2021-28698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28698">CVE-2021-28698 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28699/">CVE-2021-28699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28699">CVE-2021-28699 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3595">CVE-2021-3595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632286" comment="xen-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632287" comment="xen-doc-html-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632288" comment="xen-libs-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632289" comment="xen-libs-32bit-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632290" comment="xen-tools-4.9.4_20-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632291" comment="xen-tools-domU-4.9.4_20-3.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152494" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177211" ref_url="https://bugzilla.suse.com/1177211" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<description>
This update for python-urllib3 fixes the following issues:

- Raise ValueError if method contains control characters and thus prevents CRLF
  injection into URLs (bsc#1177211, bpo#39603, CVE-2020-26116,).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-03"/>
	<updated date="2021-02-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26116">CVE-2020-26116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525308" comment="python3-urllib3-1.22-3.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152495" version="1" class="patch">
	<metadata>
		<title>Security update for grilo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189839" ref_url="https://bugzilla.suse.com/1189839" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39365" ref_url="https://www.suse.com/security/cve/CVE-2021-39365/" source="CVE"/>
		<description>
This update for grilo fixes the following issues:

- CVE-2021-39365: Fixed missing TLS certificate verification (bsc#1189839).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-09"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189839">SUSE bug 1189839</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39365/">CVE-2021-39365 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39365">CVE-2021-39365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632583" comment="libgrilo-0_3-0-0.3.2-7.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152496" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1185056" ref_url="https://bugzilla.suse.com/1185056" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188568" ref_url="https://bugzilla.suse.com/1188568" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2021-2161" ref_url="https://www.suse.com/security/cve/CVE-2021-2161/" source="CVE"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2432" ref_url="https://www.suse.com/security/cve/CVE-2021-2432/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.27 - OpenJDK 7u311 (July 2021 CPU)

Security fixes:

- CVE-2021-2341: Improve file transfers (bsc#1188564)
- CVE-2021-2369: Better jar file validation (bsc#1188565)
- CVE-2021-2432: Provide better LDAP provider support (bsc#1188568)
- CVE-2021-2163: Enhance opening JARs (bsc#1185055)
- CVE-2021-2161: Less ambiguous processing (bsc#1185056)
- CVE-2018-3639: Fix revision to prefer
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-09"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185056">SUSE bug 1185056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188568">SUSE bug 1188568</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2161/">CVE-2021-2161 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2161">CVE-2021-2161 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-2432/">CVE-2021-2432 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2432">CVE-2021-2432 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631978" comment="java-1_7_0-openjdk-1.7.0.311-43.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631979" comment="java-1_7_0-openjdk-demo-1.7.0.311-43.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631980" comment="java-1_7_0-openjdk-devel-1.7.0.311-43.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631981" comment="java-1_7_0-openjdk-headless-1.7.0.311-43.50.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152497" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180432" ref_url="https://bugzilla.suse.com/1180432" source="BUGZILLA"/>
		<reference ref_id="1180433" ref_url="https://bugzilla.suse.com/1180433" source="BUGZILLA"/>
		<reference ref_id="1180434" ref_url="https://bugzilla.suse.com/1180434" source="BUGZILLA"/>
		<reference ref_id="1180435" ref_url="https://bugzilla.suse.com/1180435" source="BUGZILLA"/>
		<reference ref_id="1182651" ref_url="https://bugzilla.suse.com/1182651" source="BUGZILLA"/>
		<reference ref_id="1186012" ref_url="https://bugzilla.suse.com/1186012" source="BUGZILLA"/>
		<reference ref_id="1189145" ref_url="https://bugzilla.suse.com/1189145" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35503" ref_url="https://www.suse.com/security/cve/CVE-2020-35503/" source="CVE"/>
		<reference ref_id="CVE-2020-35504" ref_url="https://www.suse.com/security/cve/CVE-2020-35504/" source="CVE"/>
		<reference ref_id="CVE-2020-35505" ref_url="https://www.suse.com/security/cve/CVE-2020-35505/" source="CVE"/>
		<reference ref_id="CVE-2020-35506" ref_url="https://www.suse.com/security/cve/CVE-2020-35506/" source="CVE"/>
		<reference ref_id="CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255/" source="CVE"/>
		<reference ref_id="CVE-2021-3527" ref_url="https://www.suse.com/security/cve/CVE-2021-3527/" source="CVE"/>
		<reference ref_id="CVE-2021-3682" ref_url="https://www.suse.com/security/cve/CVE-2021-3682/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- usbredir: free call on invalid pointer in bufp_alloc (bsc#1189145, CVE-2021-3682)
- NULL pointer dereference in ESP (bsc#1180433, CVE-2020-35504) (bsc#1180434, CVE-2020-35505) (bsc#1180435, CVE-2020-35506)
- NULL pointer dereference issue in megasas-gen2 host bus adapter (bsc#1180432, CVE-2020-35503)
- eepro100: stack overflow via infinite recursion (bsc#1182651, CVE-2021-20255)
- usb: unbounded stack allocation in usbredir (bsc#1186012, CVE-2021-3527)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-09"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180432">SUSE bug 1180432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180433">SUSE bug 1180433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180434">SUSE bug 1180434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180435">SUSE bug 1180435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182651">SUSE bug 1182651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186012">SUSE bug 1186012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189145">SUSE bug 1189145</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35503/">CVE-2020-35503 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35503">CVE-2020-35503 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35504/">CVE-2020-35504 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35504">CVE-2020-35504 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35505/">CVE-2020-35505 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35505">CVE-2020-35505 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-35506/">CVE-2020-35506 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35506">CVE-2020-35506 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20255">CVE-2021-20255 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3527/">CVE-2021-3527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3527">CVE-2021-3527 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3682/">CVE-2021-3682 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3682">CVE-2021-3682 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630627" comment="qemu-2.9.1-6.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630628" comment="qemu-block-curl-2.9.1-6.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630629" comment="qemu-block-iscsi-2.9.1-6.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630630" comment="qemu-block-rbd-2.9.1-6.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630631" comment="qemu-block-ssh-2.9.1-6.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630632" comment="qemu-guest-agent-2.9.1-6.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630633" comment="qemu-ipxe-1.0.0+-6.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630634" comment="qemu-kvm-2.9.1-6.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630635" comment="qemu-lang-2.9.1-6.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630636" comment="qemu-seabios-1.10.2_0_g5f4c7b1-6.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630637" comment="qemu-sgabios-8-6.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630638" comment="qemu-tools-2.9.1-6.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630639" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-6.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630640" comment="qemu-x86-2.9.1-6.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152498" version="1" class="patch">
	<metadata>
		<title>Recommended update for mozilla-nspr, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1029961" ref_url="https://bugzilla.suse.com/1029961" source="BUGZILLA"/>
		<reference ref_id="1174697" ref_url="https://bugzilla.suse.com/1174697" source="BUGZILLA"/>
		<reference ref_id="1176206" ref_url="https://bugzilla.suse.com/1176206" source="BUGZILLA"/>
		<reference ref_id="1176934" ref_url="https://bugzilla.suse.com/1176934" source="BUGZILLA"/>
		<reference ref_id="1179382" ref_url="https://bugzilla.suse.com/1179382" source="BUGZILLA"/>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12400" ref_url="https://www.suse.com/security/cve/CVE-2020-12400/" source="CVE"/>
		<reference ref_id="CVE-2020-12401" ref_url="https://www.suse.com/security/cve/CVE-2020-12401/" source="CVE"/>
		<reference ref_id="CVE-2020-12403" ref_url="https://www.suse.com/security/cve/CVE-2020-12403/" source="CVE"/>
		<reference ref_id="CVE-2020-25648" ref_url="https://www.suse.com/security/cve/CVE-2020-25648/" source="CVE"/>
		<reference ref_id="CVE-2020-6829" ref_url="https://www.suse.com/security/cve/CVE-2020-6829/" source="CVE"/>
		<description>
This update for mozilla-nspr fixes the following issues:

mozilla-nspr was updated to version 4.32:

* implement new socket option PR_SockOpt_DontFrag
* support larger DNS records by increasing the default buffer
  size for DNS queries 
* Lock access to PRCallOnceType members in PR_CallOnce* for
  thread safety bmo#1686138
* PR_GetSystemInfo supports a new flag PR_SI_RELEASE_BUILD to get
  information about the operating system build version.


Mozilla NSS was updated to version 3.68:

* bmo#1713562 - Fix test leak.
* bmo#1717452 - NSS 3.68 should depend on NSPR 4.32.
* bmo#1693206 - Implement PKCS8 export of ECDSA keys.
* bmo#1712883 - DTLS 1.3 draft-43.
* bmo#1655493 - Support SHA2 HW acceleration using Intel SHA Extension.
* bmo#1713562 - Validate ECH public names.
* bmo#1717610 - Add function to get seconds from epoch from pkix::Time.

update to NSS 3.67

* bmo#1683710 - Add a means to disable ALPN.
* bmo#1715720 - Fix nssckbi version number in NSS 3.67 (was supposed to be incremented in 3.66).
* bmo#1714719 - Set NSS_USE_64 on riscv64 target when using GYP/Ninja.
* bmo#1566124 - Fix counter increase in ppc-gcm-wrap.c.
* bmo#1566124 - Fix AES_GCM mode on ppc64le for messages of length more than 255-byte.

update to NSS 3.66

* bmo#1710716 - Remove Expired Sonera Class2 CA from NSS.
* bmo#1710716 - Remove Expired Root Certificates from NSS - QuoVadis Root Certification Authority.
* bmo#1708307 - Remove Trustis FPS Root CA from NSS.
* bmo#1707097 - Add Certum Trusted Root CA to NSS.
* bmo#1707097 - Add Certum EC-384 CA to NSS.
* bmo#1703942 - Add ANF Secure Server Root CA to NSS.
* bmo#1697071 - Add GLOBALTRUST 2020 root cert to NSS.
* bmo#1712184 - NSS tools manpages need to be updated to reflect that sqlite is the default database.
* bmo#1712230 - Don't build ppc-gcm.s with clang integrated assembler.
* bmo#1712211 - Strict prototype error when trying to compile nss code that includes blapi.h.
* bmo#1710773 - NSS needs FIPS 180-3 FIPS indicators.
* bmo#1709291 - Add VerifyCodeSigningCertificateChain.

update to NSS 3.65

* bmo#1709654 - Update for NetBSD configuration.
* bmo#1709750 - Disable HPKE test when fuzzing.
* bmo#1566124 - Optimize AES-GCM for ppc64le.
* bmo#1699021 - Add AES-256-GCM to HPKE.
* bmo#1698419 - ECH -10 updates.
* bmo#1692930 - Update HPKE to final version.
* bmo#1707130 - NSS should use modern algorithms in PKCS#12 files by default.
* bmo#1703936 - New coverity/cpp scanner errors.
* bmo#1697303 - NSS needs to update it's csp clearing to FIPS 180-3 standards.
* bmo#1702663 - Need to support RSA PSS with Hashing PKCS #11 Mechanisms.
* bmo#1705119 - Deadlock when using GCM and non-thread safe tokens.

update to NSS 3.64

* bmo#1705286 - Properly detect mips64.
* bmo#1687164 - Introduce NSS_DISABLE_CRYPTO_VSX and
		disable_crypto_vsx.
* bmo#1698320 - replace __builtin_cpu_supports('vsx') with
		ppc_crypto_support() for clang.
* bmo#1613235 - Add POWER ChaCha20 stream cipher vector
		acceleration.

Fixed in 3.63

* bmo#1697380 - Make a clang-format run on top of helpful contributions.
* bmo#1683520 - ECCKiila P384, change syntax of nested structs
		initialization to prevent build isses with GCC 4.8.
* bmo#1683520 - [lib/freebl/ecl] P-384: allow zero scalars in dual
		scalar multiplication.
* bmo#1683520 - ECCKiila P521, change syntax of nested structs
		initialization to prevent build isses with GCC 4.8.
* bmo#1683520 - [lib/freebl/ecl] P-521: allow zero scalars in dual
		scalar multiplication.
* bmo#1696800 - HACL* update March 2021 - c95ab70fcb2bc21025d8845281bc4bc8987ca683.
* bmo#1694214 - tstclnt can't enable middlebox compat mode.
* bmo#1694392 - NSS does not work with PKCS #11 modules not supporting
		profiles.
* bmo#1685880 - Minor fix to prevent unused variable on early return.
* bmo#1685880 - Fix for the gcc compiler version 7 to support setenv
		with nss build.
* bmo#1693217 - Increase nssckbi.h version number for March 2021 batch
		of root CA changes, CA list version 2.48.
* bmo#1692094 - Set email distrust after to 21-03-01 for Camerfirma's
		'Chambers of Commerce' and 'Global Chambersign' roots.
* bmo#1618407 - Symantec root certs - Set CKA_NSS_EMAIL_DISTRUST_AFTER.
* bmo#1693173 - Add GlobalSign R45, E45, R46, and E46 root certs to NSS.
* bmo#1683738 - Add AC RAIZ FNMT-RCM SERVIDORES SEGUROS root cert to NSS.
* bmo#1686854 - Remove GeoTrust PCA-G2 and VeriSign Universal root certs
		from NSS.
* bmo#1687822 - Turn off Websites trust bit for the “Staat der
		Nederlanden Root CA - G3” root cert in NSS.
* bmo#1692094 - Turn off Websites Trust Bit for 'Chambers of Commerce
		Root - 2008' and 'Global Chambersign Root - 2008’.
* bmo#1694291 - Tracing fixes for ECH.

update to NSS 3.62

* bmo#1688374 - Fix parallel build NSS-3.61 with make
* bmo#1682044 - pkix_Build_GatherCerts() + pkix_CacheCert_Add()
		can corrupt 'cachedCertTable'
* bmo#1690583 - Fix CH padding extension size calculation
* bmo#1690421 - Adjust 3.62 ABI report formatting for new libabigail
* bmo#1690421 - Install packaged libabigail in docker-builds image
* bmo#1689228 - Minor ECH -09 fixes for interop testing, fuzzing
* bmo#1674819 - Fixup a51fae403328, enum type may be signed
* bmo#1681585 - Add ECH support to selfserv
* bmo#1681585 - Update ECH to Draft-09
* bmo#1678398 - Add Export/Import functions for HPKE context
* bmo#1678398 - Update HPKE to draft-07

update to NSS 3.61

* bmo#1682071 - Fix issue with IKE Quick mode deriving incorrect key
		values under certain conditions.
* bmo#1684300 - Fix default PBE iteration count when NSS is compiled
		with NSS_DISABLE_DBM.
* bmo#1651411 - Improve constant-timeness in RSA operations.
* bmo#1677207 - Upgrade Google Test version to latest release.
* bmo#1654332 - Add aarch64-make target to nss-try.

Update to NSS 3.60.1:

Notable changes in NSS 3.60:
* TLS 1.3 Encrypted Client Hello (draft-ietf-tls-esni-08) support
  has been added, replacing the previous ESNI (draft-ietf-tls-esni-01)
  implementation. See bmo#1654332 for more information.
* December 2020 batch of Root CA changes, builtins library updated
  to version 2.46. See bmo#1678189, bmo#1678166, and bmo#1670769
  for more information.

Update to NSS 3.59.1:

* bmo#1679290 - Fix potential deadlock with certain third-party
		PKCS11 modules

Update to NSS 3.59:

Notable changes:

* Exported two existing functions from libnss:
  CERT_AddCertToListHeadWithData and CERT_AddCertToListTailWithData

Bugfixes

* bmo#1607449 - Lock cert-&gt;nssCertificate to prevent a potential data race
* bmo#1672823 - Add Wycheproof test cases for HMAC, HKDF, and DSA
* bmo#1663661 - Guard against NULL token in nssSlot_IsTokenPresent
* bmo#1670835 - Support enabling and disabling signatures via Crypto Policy
* bmo#1672291 - Resolve libpkix OCSP failures on SHA1 self-signed
		root certs when SHA1 signatures are disabled.
* bmo#1644209 - Fix broken SelectedCipherSuiteReplacer filter to
		solve some test intermittents
* bmo#1672703 - Tolerate the first CCS in TLS 1.3 to fix a regression in
		our CVE-2020-25648 fix that broke purple-discord
		(boo#1179382)
* bmo#1666891 - Support key wrap/unwrap with RSA-OAEP
* bmo#1667989 - Fix gyp linking on Solaris
* bmo#1668123 - Export CERT_AddCertToListHeadWithData and
		CERT_AddCertToListTailWithData from libnss
* bmo#1634584 - Set CKA_NSS_SERVER_DISTRUST_AFTER for Trustis FPS Root CA
* bmo#1663091 - Remove unnecessary assertions in the streaming
		ASN.1 decoder that affected decoding certain PKCS8
		private keys when using NSS debug builds
*  bmo#670839 - Use ARM crypto extension for AES, SHA1 and SHA2 on MacOS.

update to NSS 3.58

Bugs fixed:

* bmo#1641480 (CVE-2020-25648)
  Tighten CCS handling for middlebox compatibility mode.
* bmo#1631890 - Add support for Hybrid Public Key Encryption
  (draft-irtf-cfrg-hpke) support for TLS Encrypted Client Hello
  (draft-ietf-tls-esni).
* bmo#1657255 - Add CI tests that disable SHA1/SHA2 ARM crypto
  extensions.
* bmo#1668328 - Handle spaces in the Python path name when using
  gyp on Windows.
* bmo#1667153 - Add PK11_ImportDataKey for data object import.
* bmo#1665715 - Pass the embedded SCT list extension (if present)
  to TrustDomain::CheckRevocation instead of the notBefore value.

update to NSS 3.57

* The following CA certificates were Added:
  bmo#1663049 - CN=Trustwave Global Certification Authority
      SHA-256 Fingerprint: 97552015F5DDFC3C8788C006944555408894450084F100867086BC1A2BB58DC8
  bmo#1663049 - CN=Trustwave Global ECC P256 Certification Authority
      SHA-256 Fingerprint: 945BBC825EA554F489D1FD51A73DDF2EA624AC7019A05205225C22A78CCFA8B4
  bmo#1663049 - CN=Trustwave Global ECC P384 Certification Authority
      SHA-256 Fingerprint: 55903859C8C0C3EBB8759ECE4E2557225FF5758BBD38EBD48276601E1BD58097
* The following CA certificates were Removed:
  bmo#1651211 - CN=EE Certification Centre Root CA
      SHA-256 Fingerprint: 3E84BA4342908516E77573C0992F0979CA084E4685681FF195CCBA8A229B8A76
  bmo#1656077 - O=Government Root Certification Authority; C=TW
      SHA-256 Fingerprint: 7600295EEFE85B9E1FD624DB76062AAAAE59818A54D2774CD4C0B2C01131E1B3
* Trust settings for the following CA certificates were Modified:
  bmo#1653092 - CN=OISTE WISeKey Global Root GA CA
      Websites (server authentication) trust bit removed.
* https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.57_release_notes

update to NSS 3.56

Notable changes

* bmo#1650702 - Support SHA-1 HW acceleration on ARMv8
* bmo#1656981 - Use MPI comba and mulq optimizations on x86-64 MacOS.
* bmo#1654142 - Add CPU feature detection for Intel SHA extension.
* bmo#1648822 - Add stricter validation of DH keys in FIPS mode.
* bmo#1656986 - Properly detect arm64 during GYP build architecture
		detection.
* bmo#1652729 - Add build flag to disable RC2 and relocate to
		lib/freebl/deprecated.
* bmo#1656429 - Correct RTT estimate used in 0-RTT anti-replay.
* bmo#1588941 - Send empty certificate message when scheme selection
		fails.
* bmo#1652032 - Fix failure to build in Windows arm64 makefile
		cross-compilation.
* bmo#1625791 - Fix deadlock issue in nssSlot_IsTokenPresent.
* bmo#1653975 - Fix 3.53 regression by setting 'all' as the default
		makefile target.
* bmo#1659792 - Fix broken libpkix tests with unexpired PayPal cert.
* bmo#1659814 - Fix interop.sh failures with newer tls-interop
		commit and dependencies.
* bmo#1656519 - NSPR dependency updated to 4.28

update to NSS 3.55

Notable changes
* P384 and P521 elliptic curve implementations are replaced with
  verifiable implementations from Fiat-Crypto [0] and ECCKiila [1].
* PK11_FindCertInSlot is added. With this function, a given slot
  can be queried with a DER-Encoded certificate, providing performance
  and usability improvements over other mechanisms. (bmo#1649633)
* DTLS 1.3 implementation is updated to draft-38. (bmo#1647752)

Relevant Bugfixes

* bmo#1631583 (CVE-2020-6829, CVE-2020-12400) - Replace P384 and
  P521 with new, verifiable implementations from Fiat-Crypto and ECCKiila.
* bmo#1649487 - Move overzealous assertion in VFY_EndWithSignature.
* bmo#1631573 (CVE-2020-12401) - Remove unnecessary scalar padding.
* bmo#1636771 (CVE-2020-12403) - Explicitly disable multi-part
  ChaCha20 (which was not functioning correctly) and more strictly
  enforce tag length.
* bmo#1649648 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1649316 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1649322 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1653202 - Fix initialization bug in blapitest when compiled
  with NSS_DISABLE_DEPRECATED_SEED.
* bmo#1646594 - Fix AVX2 detection in makefile builds.
* bmo#1649633 - Add PK11_FindCertInSlot to search a given slot
  for a DER-encoded certificate.
* bmo#1651520 - Fix slotLock race in NSC_GetTokenInfo.
* bmo#1647752 - Update DTLS 1.3 implementation to draft-38.
* bmo#1649190 - Run cipher, sdr, and ocsp tests under standard test cycle in CI.
* bmo#1649226 - Add Wycheproof ECDSA tests.
* bmo#1637222 - Consistently enforce IV requirements for DES and 3DES.
* bmo#1067214 - Enforce minimum PKCS#1 v1.5 padding length in
  RSA_CheckSignRecover.
* bmo#1646324 - Advertise PKCS#1 schemes for certificates in the
  signature_algorithms extension.

update to NSS 3.54

Notable changes

* Support for TLS 1.3 external pre-shared keys (bmo#1603042).
* Use ARM Cryptography Extension for SHA256, when available
  (bmo#1528113)
* The following CA certificates were Added:
  bmo#1645186 - certSIGN Root CA G2.
  bmo#1645174 - e-Szigno Root CA 2017.
  bmo#1641716 - Microsoft ECC Root Certificate Authority 2017.
  bmo#1641716 - Microsoft RSA Root Certificate Authority 2017.
* The following CA certificates were Removed:
  bmo#1645199 - AddTrust Class 1 CA Root.
  bmo#1645199 - AddTrust External CA Root.
  bmo#1641718 - LuxTrust Global Root 2.
  bmo#1639987 - Staat der Nederlanden Root CA - G2.
  bmo#1618402 - Symantec Class 2 Public Primary Certification Authority - G4.
  bmo#1618402 - Symantec Class 1 Public Primary Certification Authority - G4.
  bmo#1618402 - VeriSign Class 3 Public Primary Certification Authority - G3.

* A number of certificates had their Email trust bit disabled.
  See bmo#1618402 for a complete list.

Bugs fixed

* bmo#1528113 - Use ARM Cryptography Extension for SHA256.
* bmo#1603042 - Add TLS 1.3 external PSK support.
* bmo#1642802 - Add uint128 support for HACL* curve25519 on Windows.
* bmo#1645186 - Add 'certSIGN Root CA G2' root certificate.
* bmo#1645174 - Add Microsec's 'e-Szigno Root CA 2017' root certificate.
* bmo#1641716 - Add Microsoft's non-EV root certificates.
* bmo1621151 - Disable email trust bit for 'O=Government
	       Root Certification Authority; C=TW' root.
* bmo#1645199 - Remove AddTrust root certificates.
* bmo#1641718 - Remove 'LuxTrust Global Root 2' root certificate.
* bmo#1639987 - Remove 'Staat der Nederlanden Root CA - G2' root
		certificate.
* bmo#1618402 - Remove Symantec root certificates and disable email trust
		bit.
* bmo#1640516 - NSS 3.54 should depend on NSPR 4.26.
* bmo#1642146 - Fix undefined reference to `PORT_ZAlloc_stub' in seed.c.
* bmo#1642153 - Fix infinite recursion building NSS.
* bmo#1642638 - Fix fuzzing assertion crash.
* bmo#1642871 - Enable SSL_SendSessionTicket after resumption.
* bmo#1643123 - Support SSL_ExportEarlyKeyingMaterial with External PSKs.
* bmo#1643557 - Fix numerous compile warnings in NSS.
* bmo#1644774 - SSL gtests to use ClearServerCache when resetting
		self-encrypt keys.
* bmo#1645479 - Don't use SECITEM_MakeItem in secutil.c.
* bmo#1646520 - Stricter enforcement of ASN.1 INTEGER encoding.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029961">SUSE bug 1029961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174697">SUSE bug 1174697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176206">SUSE bug 1176206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176934">SUSE bug 1176934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179382">SUSE bug 1179382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12400/">CVE-2020-12400 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12400">CVE-2020-12400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12401/">CVE-2020-12401 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12401">CVE-2020-12401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12403/">CVE-2020-12403 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12403">CVE-2020-12403 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25648/">CVE-2020-25648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25648">CVE-2020-25648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6829/">CVE-2020-6829 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6829">CVE-2020-6829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633044" comment="libfreebl3-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633045" comment="libfreebl3-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633046" comment="libfreebl3-hmac-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633047" comment="libfreebl3-hmac-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633048" comment="libsoftokn3-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633049" comment="libsoftokn3-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633050" comment="libsoftokn3-hmac-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633051" comment="libsoftokn3-hmac-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633052" comment="mozilla-nspr-4.32-19.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633053" comment="mozilla-nspr-32bit-4.32-19.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633054" comment="mozilla-nss-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633055" comment="mozilla-nss-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633056" comment="mozilla-nss-certs-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633057" comment="mozilla-nss-certs-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633058" comment="mozilla-nss-sysinit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633059" comment="mozilla-nss-sysinit-32bit-3.68-58.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633060" comment="mozilla-nss-tools-3.68-58.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152499" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1185952" ref_url="https://bugzilla.suse.com/1185952" source="BUGZILLA"/>
		<reference ref_id="1187751" ref_url="https://bugzilla.suse.com/1187751" source="BUGZILLA"/>
		<reference ref_id="1189748" ref_url="https://bugzilla.suse.com/1189748" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3677" ref_url="https://www.suse.com/security/cve/CVE-2021-3677/" source="CVE"/>
		<description>
This update for postgresql13 fixes the following issues:

- CVE-2021-3677: Fixed memory disclosure in certain queries (bsc#1189748).

- Fixed build with llvm12 on s390x (bsc#1185952).
- Re-enabled icu for PostgreSQL 10 (bsc#1179945).
- Made the dependency of postgresqlXX-server-devel on llvm and clang optional (bsc#1187751).
- llvm12 breaks PostgreSQL 11 and 12 on s390x. Use llvm11 as a workaround (bsc#1185952).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185952">SUSE bug 1185952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187751">SUSE bug 1187751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189748">SUSE bug 1189748</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3677/">CVE-2021-3677 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3677">CVE-2021-3677 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632693" comment="libecpg6-13.4-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632694" comment="libpq5-13.4-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632695" comment="libpq5-32bit-13.4-3.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152500" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1136882" ref_url="https://bugzilla.suse.com/1136882" source="BUGZILLA"/>
		<reference ref_id="1159130" ref_url="https://bugzilla.suse.com/1159130" source="BUGZILLA"/>
		<reference ref_id="1159293" ref_url="https://bugzilla.suse.com/1159293" source="BUGZILLA"/>
		<reference ref_id="1161698" ref_url="https://bugzilla.suse.com/1161698" source="BUGZILLA"/>
		<reference ref_id="1186329" ref_url="https://bugzilla.suse.com/1186329" source="BUGZILLA"/>
		<reference ref_id="1189325" ref_url="https://bugzilla.suse.com/1189325" source="BUGZILLA"/>
		<reference ref_id="1189343" ref_url="https://bugzilla.suse.com/1189343" source="BUGZILLA"/>
		<reference ref_id="1189345" ref_url="https://bugzilla.suse.com/1189345" source="BUGZILLA"/>
		<reference ref_id="1189346" ref_url="https://bugzilla.suse.com/1189346" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19555" ref_url="https://www.suse.com/security/cve/CVE-2019-19555/" source="CVE"/>
		<reference ref_id="CVE-2019-19746" ref_url="https://www.suse.com/security/cve/CVE-2019-19746/" source="CVE"/>
		<reference ref_id="CVE-2019-19797" ref_url="https://www.suse.com/security/cve/CVE-2019-19797/" source="CVE"/>
		<reference ref_id="CVE-2020-21680" ref_url="https://www.suse.com/security/cve/CVE-2020-21680/" source="CVE"/>
		<reference ref_id="CVE-2020-21681" ref_url="https://www.suse.com/security/cve/CVE-2020-21681/" source="CVE"/>
		<reference ref_id="CVE-2020-21682" ref_url="https://www.suse.com/security/cve/CVE-2020-21682/" source="CVE"/>
		<reference ref_id="CVE-2020-21683" ref_url="https://www.suse.com/security/cve/CVE-2020-21683/" source="CVE"/>
		<reference ref_id="CVE-2021-3561" ref_url="https://www.suse.com/security/cve/CVE-2021-3561/" source="CVE"/>
		<description>
This update for transfig fixes the following issues:

Update to version 3.2.8, including fixes for

- CVE-2021-3561: overflow in fig2dev/read.c in function read_colordef() (bsc#1186329).
- CVE-2020-21683: Fixed buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c (bsc#1189325).
- CVE-2020-21682: Fixed buffer overflow in the set_fill component in genge.c (bsc#1189346).
- CVE-2020-21681: Fixed buffer overflow in the set_color component in genge.c (bsc#1189345).
- CVE-2020-21680: Fixed stack-based buffer overflow in the put_arrow() component in genpict2e.c (bsc#1189343).
- CVE-2019-19797: out-of-bounds write in read_colordef in read.c (bsc#1159293).
- CVE-2019-19555: stack-based buffer overflow because of an incorrect sscanf (bsc#1161698).
- CVE-2019-19746: segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type (bsc#1159130).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1136882">SUSE bug 1136882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159130">SUSE bug 1159130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159293">SUSE bug 1159293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161698">SUSE bug 1161698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186329">SUSE bug 1186329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189325">SUSE bug 1189325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189343">SUSE bug 1189343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189345">SUSE bug 1189345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189346">SUSE bug 1189346</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19555/">CVE-2019-19555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19555">CVE-2019-19555 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19746/">CVE-2019-19746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19746">CVE-2019-19746 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19797/">CVE-2019-19797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19797">CVE-2019-19797 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21680/">CVE-2020-21680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21680">CVE-2020-21680 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21681/">CVE-2020-21681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21681">CVE-2020-21681 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21682/">CVE-2020-21682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21682">CVE-2020-21682 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21683/">CVE-2020-21683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21683">CVE-2020-21683 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3561/">CVE-2021-3561 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3561">CVE-2021-3561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631268" comment="transfig-3.2.8a-2.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152501" version="1" class="patch">
	<metadata>
		<title>Security update for gtk-vnc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1024266" ref_url="https://bugzilla.suse.com/1024266" source="BUGZILLA"/>
		<reference ref_id="1024268" ref_url="https://bugzilla.suse.com/1024268" source="BUGZILLA"/>
		<reference ref_id="1046782" ref_url="https://bugzilla.suse.com/1046782" source="BUGZILLA"/>
		<reference ref_id="1188292" ref_url="https://bugzilla.suse.com/1188292" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5884" ref_url="https://www.suse.com/security/cve/CVE-2017-5884/" source="CVE"/>
		<reference ref_id="CVE-2017-5885" ref_url="https://www.suse.com/security/cve/CVE-2017-5885/" source="CVE"/>
		<description>
This update for gtk-vnc fixes the following issues:

- CVE-2017-5885: Correctly validate color map range indexes (bsc#1024268).
- CVE-2017-5884: Fix bounds checking for RRE, hextile &amp; copyrect encodings (bsc#1024266).
- Fix crash when opening connection from a GSocketAddress (bsc#1046782).
- Fix possible crash on connection failure (bsc#1188292).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024266">SUSE bug 1024266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024268">SUSE bug 1024268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046782">SUSE bug 1046782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188292">SUSE bug 1188292</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5884/">CVE-2017-5884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5884">CVE-2017-5884 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5885/">CVE-2017-5885 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5885">CVE-2017-5885 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628130" comment="libgtk-vnc-1_0-0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628131" comment="libgtk-vnc-2_0-0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628132" comment="libgvnc-1_0-0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628133" comment="python-gtk-vnc-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628134" comment="typelib-1_0-GVnc-1_0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628135" comment="typelib-1_0-GtkVnc-2_0-0.6.0-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152502" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712. 
  Read buffer overruns processing ASN.1 strings (bsc#1189521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-20"/>
	<updated date="2021-09-20"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632419" comment="libopenssl-devel-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632420" comment="libopenssl1_0_0-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632401" comment="libopenssl1_0_0-32bit-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632421" comment="libopenssl1_0_0-hmac-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632403" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632422" comment="openssl-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632405" comment="openssl-doc-1.0.2j-60.72.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152503" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190373" ref_url="https://bugzilla.suse.com/1190373" source="BUGZILLA"/>
		<reference ref_id="1190374" ref_url="https://bugzilla.suse.com/1190374" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22946" ref_url="https://www.suse.com/security/cve/CVE-2021-22946/" source="CVE"/>
		<reference ref_id="CVE-2021-22947" ref_url="https://www.suse.com/security/cve/CVE-2021-22947/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22947: Fixed STARTTLS protocol injection via MITM (bsc#1190374).
- CVE-2021-22946: Fixed protocol downgrade required TLS bypassed (bsc#1190373).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-21"/>
	<updated date="2021-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190373">SUSE bug 1190373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190374">SUSE bug 1190374</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22946/">CVE-2021-22946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">CVE-2021-22946 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22947/">CVE-2021-22947 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">CVE-2021-22947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633675" comment="curl-7.37.0-37.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633676" comment="libcurl4-7.37.0-37.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633677" comment="libcurl4-32bit-7.37.0-37.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152504" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190381" ref_url="https://bugzilla.suse.com/1190381" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3781" ref_url="https://www.suse.com/security/cve/CVE-2021-3781/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2021-3781: Fixed a trivial -dSAFER bypass command injection (bsc#1190381)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-21"/>
	<updated date="2021-09-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1190381">SUSE bug 1190381</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3781/">CVE-2021-3781 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3781">CVE-2021-3781 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632780" comment="ghostscript-9.52-23.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632781" comment="ghostscript-devel-9.52-23.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632782" comment="ghostscript-x11-9.52-23.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632783" comment="libspectre-devel-0.2.7-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632784" comment="libspectre1-0.2.7-12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152505" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.1.0 ESR.

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-22"/>
	<updated date="2021-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29981">CVE-2021-29981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29982">CVE-2021-29982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29983">CVE-2021-29983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29987">CVE-2021-29987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29990">CVE-2021-29990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29991">CVE-2021-29991 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38492">CVE-2021-38492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38495">CVE-2021-38495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633610" comment="MozillaFirefox-91.1.0-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633611" comment="MozillaFirefox-branding-SLE-91-35.6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633612" comment="MozillaFirefox-devel-91.1.0-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633613" comment="MozillaFirefox-translations-common-91.1.0-112.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152506" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 20 [bsc#1180063,bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14781 CVE-2020-14779
  CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class libraries:
    - SOCKETADAPTOR$SOCKETINPUTSTREAM.READ is blocking for more time
      that the set timeout
    - Z/OS specific C function send_file is changing the file pointer
      position
  * Java Virtual Machine:
    - Crash on iterate java stack
    - Java process hang on SIGTERM
  * JIT Compiler:
    - JMS performance regression from JDK8 SR5 FP40 TO FP41

  * Class Libraries:
    - z15 high utilization following Z/VM and Linux migration from
      z14 To z15
  * Java Virtual Machine:
    - Assertion failed when trying to write a class file
    - Assertion failure at modronapi.cpp
    - Improve the performance of defining and finding classes
  * JIT Compiler:
    - An assert in ppcbinaryencoding.cpp may trigger when running
      with traps disabled on power
    - AOT field offset off by n bytes
    - Segmentation fault in jit module on ibm z platform		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14798">CVE-2020-14798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531863" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531865" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152507" version="1" class="patch">
	<metadata>
		<title>Security update for hivex (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189060" ref_url="https://bugzilla.suse.com/1189060" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3622" ref_url="https://www.suse.com/security/cve/CVE-2021-3622/" source="CVE"/>
		<description>
This update for hivex fixes the following issues:

- CVE-2021-3622: Fixed stack overflow due to recursive call of _get_children() (bsc#1189060).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189060">SUSE bug 1189060</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3622/">CVE-2021-3622 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3622">CVE-2021-3622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633392" comment="libhivex0-1.3.10-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633393" comment="perl-Win-Hivex-1.3.10-5.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152508" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189373" ref_url="https://bugzilla.suse.com/1189373" source="BUGZILLA"/>
		<reference ref_id="1189378" ref_url="https://bugzilla.suse.com/1189378" source="BUGZILLA"/>
		<reference ref_id="1189632" ref_url="https://bugzilla.suse.com/1189632" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28701" ref_url="https://www.suse.com/security/cve/CVE-2021-28701/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-28701: Fixed race condition in XENMAPSPACE_grant_table handling (XSA-384) (bsc#1189632).

- Integrate bugfixes (bsc#1189373, bsc#1189378).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189378">SUSE bug 1189378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189632">SUSE bug 1189632</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28701/">CVE-2021-28701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28701">CVE-2021-28701 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633441" comment="xen-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633442" comment="xen-doc-html-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633443" comment="xen-libs-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633444" comment="xen-libs-32bit-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633445" comment="xen-tools-4.9.4_22-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633446" comment="xen-tools-domU-4.9.4_22-3.94.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152509" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190400" ref_url="https://bugzilla.suse.com/1190400" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-40812" ref_url="https://www.suse.com/security/cve/CVE-2021-40812/" source="CVE"/>
		<description>
This update for gd fixes the following issues:

- CVE-2021-40812: Fixed out-of-bounds read caused by the lack of certain gdGetBuf and gdPutBuf return value checks (bsc#1190400).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190400">SUSE bug 1190400</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40812/">CVE-2021-40812 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40812">CVE-2021-40812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633642" comment="gd-2.1.0-24.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152510" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1157818" ref_url="https://bugzilla.suse.com/1157818" source="BUGZILLA"/>
		<reference ref_id="1158812" ref_url="https://bugzilla.suse.com/1158812" source="BUGZILLA"/>
		<reference ref_id="1158958" ref_url="https://bugzilla.suse.com/1158958" source="BUGZILLA"/>
		<reference ref_id="1158959" ref_url="https://bugzilla.suse.com/1158959" source="BUGZILLA"/>
		<reference ref_id="1158960" ref_url="https://bugzilla.suse.com/1158960" source="BUGZILLA"/>
		<reference ref_id="1159491" ref_url="https://bugzilla.suse.com/1159491" source="BUGZILLA"/>
		<reference ref_id="1159715" ref_url="https://bugzilla.suse.com/1159715" source="BUGZILLA"/>
		<reference ref_id="1159847" ref_url="https://bugzilla.suse.com/1159847" source="BUGZILLA"/>
		<reference ref_id="1159850" ref_url="https://bugzilla.suse.com/1159850" source="BUGZILLA"/>
		<reference ref_id="1160309" ref_url="https://bugzilla.suse.com/1160309" source="BUGZILLA"/>
		<reference ref_id="1160438" ref_url="https://bugzilla.suse.com/1160438" source="BUGZILLA"/>
		<reference ref_id="1160439" ref_url="https://bugzilla.suse.com/1160439" source="BUGZILLA"/>
		<reference ref_id="1164719" ref_url="https://bugzilla.suse.com/1164719" source="BUGZILLA"/>
		<reference ref_id="1172091" ref_url="https://bugzilla.suse.com/1172091" source="BUGZILLA"/>
		<reference ref_id="1172115" ref_url="https://bugzilla.suse.com/1172115" source="BUGZILLA"/>
		<reference ref_id="1172234" ref_url="https://bugzilla.suse.com/1172234" source="BUGZILLA"/>
		<reference ref_id="1172236" ref_url="https://bugzilla.suse.com/1172236" source="BUGZILLA"/>
		<reference ref_id="1172240" ref_url="https://bugzilla.suse.com/1172240" source="BUGZILLA"/>
		<reference ref_id="1173641" ref_url="https://bugzilla.suse.com/1173641" source="BUGZILLA"/>
		<reference ref_id="928700" ref_url="https://bugzilla.suse.com/928700" source="BUGZILLA"/>
		<reference ref_id="928701" ref_url="https://bugzilla.suse.com/928701" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3414" ref_url="https://www.suse.com/security/cve/CVE-2015-3414/" source="CVE"/>
		<reference ref_id="CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415/" source="CVE"/>
		<reference ref_id="CVE-2016-6153" ref_url="https://www.suse.com/security/cve/CVE-2016-6153/" source="CVE"/>
		<reference ref_id="CVE-2017-10989" ref_url="https://www.suse.com/security/cve/CVE-2017-10989/" source="CVE"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<reference ref_id="CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740/" source="CVE"/>
		<reference ref_id="CVE-2019-16168" ref_url="https://www.suse.com/security/cve/CVE-2019-16168/" source="CVE"/>
		<reference ref_id="CVE-2019-19244" ref_url="https://www.suse.com/security/cve/CVE-2019-19244/" source="CVE"/>
		<reference ref_id="CVE-2019-19317" ref_url="https://www.suse.com/security/cve/CVE-2019-19317/" source="CVE"/>
		<reference ref_id="CVE-2019-19603" ref_url="https://www.suse.com/security/cve/CVE-2019-19603/" source="CVE"/>
		<reference ref_id="CVE-2019-19645" ref_url="https://www.suse.com/security/cve/CVE-2019-19645/" source="CVE"/>
		<reference ref_id="CVE-2019-19646" ref_url="https://www.suse.com/security/cve/CVE-2019-19646/" source="CVE"/>
		<reference ref_id="CVE-2019-19880" ref_url="https://www.suse.com/security/cve/CVE-2019-19880/" source="CVE"/>
		<reference ref_id="CVE-2019-19923" ref_url="https://www.suse.com/security/cve/CVE-2019-19923/" source="CVE"/>
		<reference ref_id="CVE-2019-19924" ref_url="https://www.suse.com/security/cve/CVE-2019-19924/" source="CVE"/>
		<reference ref_id="CVE-2019-19925" ref_url="https://www.suse.com/security/cve/CVE-2019-19925/" source="CVE"/>
		<reference ref_id="CVE-2019-19926" ref_url="https://www.suse.com/security/cve/CVE-2019-19926/" source="CVE"/>
		<reference ref_id="CVE-2019-19959" ref_url="https://www.suse.com/security/cve/CVE-2019-19959/" source="CVE"/>
		<reference ref_id="CVE-2019-20218" ref_url="https://www.suse.com/security/cve/CVE-2019-20218/" source="CVE"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<reference ref_id="CVE-2020-13434" ref_url="https://www.suse.com/security/cve/CVE-2020-13434/" source="CVE"/>
		<reference ref_id="CVE-2020-13435" ref_url="https://www.suse.com/security/cve/CVE-2020-13435/" source="CVE"/>
		<reference ref_id="CVE-2020-13630" ref_url="https://www.suse.com/security/cve/CVE-2020-13630/" source="CVE"/>
		<reference ref_id="CVE-2020-13631" ref_url="https://www.suse.com/security/cve/CVE-2020-13631/" source="CVE"/>
		<reference ref_id="CVE-2020-13632" ref_url="https://www.suse.com/security/cve/CVE-2020-13632/" source="CVE"/>
		<reference ref_id="CVE-2020-15358" ref_url="https://www.suse.com/security/cve/CVE-2020-15358/" source="CVE"/>
		<reference ref_id="CVE-2020-9327" ref_url="https://www.suse.com/security/cve/CVE-2020-9327/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

sqlite3 is sync version 3.36.0 from Factory (jsc#SLE-16032).

The following CVEs have been fixed in upstream releases up to
this point, but were not mentioned in the change log so far:

* bsc#1173641, CVE-2020-15358: heap-based buffer overflow in
  multiSelectOrderBy due to mishandling of query-flattener
  optimization
* bsc#1164719, CVE-2020-9327: NULL pointer dereference and
  segmentation fault because of generated column optimizations in
  isAuxiliaryVtabOperator
* bsc#1160439, CVE-2019-20218: selectExpander in select.c proceeds
  with WITH stack unwinding even after a parsing error
* bsc#1160438, CVE-2019-19959: memory-management error via
  ext/misc/zipfile.c involving embedded '\0' input
* bsc#1160309, CVE-2019-19923: improper handling  of  certain uses
  of SELECT DISTINCT in flattenSubquery may lead to null pointer
  dereference
* bsc#1159850, CVE-2019-19924: improper error handling in
  sqlite3WindowRewrite()
* bsc#1159847, CVE-2019-19925: improper handling of NULL pathname
  during an update of a ZIP archive
* bsc#1159715, CVE-2019-19926: improper handling  of certain
  errors during parsing  multiSelect in select.c
* bsc#1159491, CVE-2019-19880: exprListAppendList in window.c
  allows attackers to trigger an invalid pointer dereference
* bsc#1158960, CVE-2019-19603: during handling of CREATE TABLE
  and CREATE VIEW statements, does not consider confusion with
  a shadow table name
* bsc#1158959, CVE-2019-19646: pragma.c mishandles NOT NULL in an
  integrity_check PRAGMA command in certain cases of generated
  columns
* bsc#1158958, CVE-2019-19645: alter.c allows attackers to trigger
  infinite recursion via certain types of self-referential views
  in conjunction with ALTER TABLE statements
* bsc#1158812, CVE-2019-19317: lookupName in resolve.c omits bits
  from the colUsed bitmask in the case of a generated column,
  which allows attackers to cause a denial of service
* bsc#1157818, CVE-2019-19244: sqlite3,sqlite2,sqlite: The
  function sqlite3Select in select.c allows a crash if a
  sub-select uses both DISTINCT and window functions, and also
  has certain ORDER BY usage
* bsc#928701, CVE-2015-3415: sqlite3VdbeExec comparison operator
  vulnerability
* bsc#928700, CVE-2015-3414: sqlite3,sqlite2: dequoting of
  collation-sequence names
* CVE-2020-13434 bsc#1172115: integer overflow in
  sqlite3_str_vappendf
* CVE-2020-13630 bsc#1172234: use-after-free in fts3EvalNextRow
* CVE-2020-13631 bsc#1172236: virtual table allowed to be renamed
  to one of its shadow tables
* CVE-2020-13632 bsc#1172240: NULL pointer dereference via
  crafted matchinfo() query
* CVE-2020-13435: Malicious SQL statements could have crashed the
  process that is running SQLite (bsc#1172091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157818">SUSE bug 1157818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158812">SUSE bug 1158812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158958">SUSE bug 1158958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158959">SUSE bug 1158959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158960">SUSE bug 1158960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159491">SUSE bug 1159491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159715">SUSE bug 1159715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159847">SUSE bug 1159847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159850">SUSE bug 1159850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160309">SUSE bug 1160309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160438">SUSE bug 1160438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160439">SUSE bug 1160439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164719">SUSE bug 1164719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172091">SUSE bug 1172091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172115">SUSE bug 1172115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172234">SUSE bug 1172234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172236">SUSE bug 1172236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172240">SUSE bug 1172240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173641">SUSE bug 1173641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3414/">CVE-2015-3414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3414">CVE-2015-3414 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3415">CVE-2015-3415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6153/">CVE-2016-6153 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6153">CVE-2016-6153 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10989/">CVE-2017-10989 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10989">CVE-2017-10989 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2518">CVE-2017-2518 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20346">CVE-2018-20346 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8740">CVE-2018-8740 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16168/">CVE-2019-16168 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16168">CVE-2019-16168 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19244/">CVE-2019-19244 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19244">CVE-2019-19244 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19317/">CVE-2019-19317 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19317">CVE-2019-19317 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19603/">CVE-2019-19603 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19603">CVE-2019-19603 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19645/">CVE-2019-19645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19645">CVE-2019-19645 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19646/">CVE-2019-19646 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19646">CVE-2019-19646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19880/">CVE-2019-19880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19880">CVE-2019-19880 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19923/">CVE-2019-19923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19923">CVE-2019-19923 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19924/">CVE-2019-19924 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19924">CVE-2019-19924 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19925/">CVE-2019-19925 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19925">CVE-2019-19925 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19926/">CVE-2019-19926 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19926">CVE-2019-19926 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19959/">CVE-2019-19959 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19959">CVE-2019-19959 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20218/">CVE-2019-20218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20218">CVE-2019-20218 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8457">CVE-2019-8457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13434/">CVE-2020-13434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13434">CVE-2020-13434 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13435/">CVE-2020-13435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13435">CVE-2020-13435 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13630/">CVE-2020-13630 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13630">CVE-2020-13630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13631/">CVE-2020-13631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13631">CVE-2020-13631 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13632/">CVE-2020-13632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13632">CVE-2020-13632 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15358/">CVE-2020-15358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15358">CVE-2020-15358 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-9327/">CVE-2020-9327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9327">CVE-2020-9327 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152511" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190522" ref_url="https://bugzilla.suse.com/1190522" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41054" ref_url="https://www.suse.com/security/cve/CVE-2021-41054/" source="CVE"/>
		<description>
This update for atftp fixes the following issues:

- CVE-2021-41054: Fixed buffer overflow caused by combination of data, OACK, and other options (bsc#1190522).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-27"/>
	<updated date="2021-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190522">SUSE bug 1190522</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41054/">CVE-2021-41054 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41054">CVE-2021-41054 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633674" comment="atftp-0.7.0-160.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152512" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177120" ref_url="https://bugzilla.suse.com/1177120" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<description>

This update for python-urllib3 fixes the following security issue:

- CVE-2020-26137: A CRLF injection via HTTP request method was fixed (bsc#1177120)

Note that this was fixed in a previous version update to 1.25.9, this update just complements the tracking.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-29"/>
	<updated date="2021-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26137">CVE-2020-26137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631062" comment="python3-urllib3-1.25.10-3.31.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152513" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1117993" ref_url="https://bugzilla.suse.com/1117993" source="BUGZILLA"/>
		<reference ref_id="1186489" ref_url="https://bugzilla.suse.com/1186489" source="BUGZILLA"/>
		<reference ref_id="1187911" ref_url="https://bugzilla.suse.com/1187911" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574/" source="CVE"/>
		<reference ref_id="CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2021-35942: wordexp: handle overflow in positional parameter number (bsc#1187911)
- CVE-2021-33574: Use __pthread_attr_copy in mq_notify (bsc#1186489)

Also the following bug was fixed:

- Avoid concurrency problem in ldconfig (bsc#1117993)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117993">SUSE bug 1117993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186489">SUSE bug 1186489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187911">SUSE bug 1187911</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">CVE-2021-33574 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">CVE-2021-35942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651126" comment="glibc-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651115" comment="glibc-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651127" comment="glibc-devel-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651117" comment="glibc-devel-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651118" comment="glibc-html-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651119" comment="glibc-i18ndata-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651120" comment="glibc-info-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651128" comment="glibc-locale-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651122" comment="glibc-locale-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651129" comment="glibc-profile-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651124" comment="glibc-profile-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651130" comment="nscd-2.22-116.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152514" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188697" ref_url="https://bugzilla.suse.com/1188697" source="BUGZILLA"/>
		<reference ref_id="1190701" ref_url="https://bugzilla.suse.com/1190701" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21806" ref_url="https://www.suse.com/security/cve/CVE-2021-21806/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.4
- CVE-2021-30858: Fixed a security bug that could allow maliciously crafted web content to achieve arbitrary code execution. (bsc#1190701)
- CVE-2021-21806: Fixed an exploitable use-after-free vulnerability via specially crafted HTML web page. (bsc#1188697)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190701">SUSE bug 1190701</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21806/">CVE-2021-21806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21806">CVE-2021-21806 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30858">CVE-2021-30858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634387" comment="libjavascriptcoregtk-4_0-18-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634388" comment="libwebkit2gtk-4_0-37-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634389" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634390" comment="typelib-1_0-WebKit2-4_0-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634391" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634392" comment="webkit2gtk-4_0-injected-bundles-2.32.4-2.71.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152515" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190666" ref_url="https://bugzilla.suse.com/1190666" source="BUGZILLA"/>
		<reference ref_id="1190669" ref_url="https://bugzilla.suse.com/1190669" source="BUGZILLA"/>
		<reference ref_id="1190703" ref_url="https://bugzilla.suse.com/1190703" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34798" ref_url="https://www.suse.com/security/cve/CVE-2021-34798/" source="CVE"/>
		<reference ref_id="CVE-2021-39275" ref_url="https://www.suse.com/security/cve/CVE-2021-39275/" source="CVE"/>
		<reference ref_id="CVE-2021-40438" ref_url="https://www.suse.com/security/cve/CVE-2021-40438/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-40438: Fixed a SRF via a crafted request uri-path. (bsc#1190703)
- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)
- CVE-2021-34798: Fixed a NULL pointer dereference via malformed requests. (bsc#1190669)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190666">SUSE bug 1190666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190669">SUSE bug 1190669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190703">SUSE bug 1190703</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34798/">CVE-2021-34798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34798">CVE-2021-34798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39275/">CVE-2021-39275 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39275">CVE-2021-39275 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40438/">CVE-2021-40438 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40438">CVE-2021-40438 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633904" comment="apache2-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633898" comment="apache2-doc-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633905" comment="apache2-example-pages-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633906" comment="apache2-prefork-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633907" comment="apache2-utils-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633908" comment="apache2-worker-2.4.23-29.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152516" version="1" class="patch">
	<metadata>
		<title>Security update for python36 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180125" ref_url="https://bugzilla.suse.com/1180125" source="BUGZILLA"/>
		<reference ref_id="1183374" ref_url="https://bugzilla.suse.com/1183374" source="BUGZILLA"/>
		<reference ref_id="1183858" ref_url="https://bugzilla.suse.com/1183858" source="BUGZILLA"/>
		<reference ref_id="1185588" ref_url="https://bugzilla.suse.com/1185588" source="BUGZILLA"/>
		<reference ref_id="1189241" ref_url="https://bugzilla.suse.com/1189241" source="BUGZILLA"/>
		<reference ref_id="1189287" ref_url="https://bugzilla.suse.com/1189287" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3426" ref_url="https://www.suse.com/security/cve/CVE-2021-3426/" source="CVE"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<description>
This update for python36 fixes the following issues:

- Update to 3.6.15:
- CVE-2021-3737: Fixed a DoS caused by infinitely reading potential HTTP headers after a 100 Continue status response from the server. (bsc#1189241)
- CVE-2021-3426: Fixed an information disclosure via pydoc. (bsc#1183374)
- CVE-2021-3733: Fixed a ReDoS in urllib.request. (bsc#1189287)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-09"/>
	<updated date="2021-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180125">SUSE bug 1180125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183374">SUSE bug 1183374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183858">SUSE bug 1183858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185588">SUSE bug 1185588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189241">SUSE bug 1189241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189287">SUSE bug 1189287</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3426/">CVE-2021-3426 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3426">CVE-2021-3426 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3733">CVE-2021-3733 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3737">CVE-2021-3737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651426" comment="libpython3_6m1_0-3.6.15-6.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651427" comment="python36-3.6.15-6.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651428" comment="python36-base-3.6.15-6.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651429" comment="python36-curses-3.6.15-6.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651430" comment="python36-dbm-3.6.15-6.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651431" comment="python36-devel-3.6.15-6.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651432" comment="python36-doc-3.6.15-6.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651433" comment="python36-idle-3.6.15-6.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651434" comment="python36-testsuite-3.6.15-6.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651435" comment="python36-tk-3.6.15-6.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651436" comment="python36-tools-3.6.15-6.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152517" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtsvg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184783" ref_url="https://bugzilla.suse.com/1184783" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3481" ref_url="https://www.suse.com/security/cve/CVE-2021-3481/" source="CVE"/>
		<description>
This update for libqt5-qtsvg fixes the following issues:

- CVE-2021-3481: Fixed an out of bounds read in function QRadialFetchSimd from crafted svg file. (bsc#1184783)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-11"/>
	<updated date="2021-10-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184783">SUSE bug 1184783</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3481/">CVE-2021-3481 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3481">CVE-2021-3481 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634694" comment="libQt5Svg5-5.6.2-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152518" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-08"/>
	<updated date="2021-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531867" comment="libpython3_4m1_0-3.4.10-25.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531868" comment="python3-3.4.10-25.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531869" comment="python3-base-3.4.10-25.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531870" comment="python3-curses-3.4.10-25.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152519" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190710" ref_url="https://bugzilla.suse.com/1190710" source="BUGZILLA"/>
		<reference ref_id="1191332" ref_url="https://bugzilla.suse.com/1191332" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.2.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-45 (bsc#1191332)

* CVE-2021-38496: Use-after-free in MessageTask
* CVE-2021-38497: Validation message could have been overlaid on another origin
* CVE-2021-38498: Use-after-free of nsLanguageAtomService object
* CVE-2021-32810: Fixed Data race in crossbeam-deque
* CVE-2021-38500: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2
* CVE-2021-38501: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2

- Fixed crash in FIPS mode (bsc#1190710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-15"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190710">SUSE bug 1190710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32810">CVE-2021-32810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38496">CVE-2021-38496 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38497">CVE-2021-38497 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38498">CVE-2021-38498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38500">CVE-2021-38500 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38501">CVE-2021-38501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651862" comment="MozillaFirefox-91.2.0-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651863" comment="MozillaFirefox-devel-91.2.0-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651864" comment="MozillaFirefox-translations-common-91.2.0-112.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152520" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1081947" ref_url="https://bugzilla.suse.com/1081947" source="BUGZILLA"/>
		<reference ref_id="1082293" ref_url="https://bugzilla.suse.com/1082293" source="BUGZILLA"/>
		<reference ref_id="1084671" ref_url="https://bugzilla.suse.com/1084671" source="BUGZILLA"/>
		<reference ref_id="1085196" ref_url="https://bugzilla.suse.com/1085196" source="BUGZILLA"/>
		<reference ref_id="1106214" ref_url="https://bugzilla.suse.com/1106214" source="BUGZILLA"/>
		<reference ref_id="1122417" ref_url="https://bugzilla.suse.com/1122417" source="BUGZILLA"/>
		<reference ref_id="1125886" ref_url="https://bugzilla.suse.com/1125886" source="BUGZILLA"/>
		<reference ref_id="1135534" ref_url="https://bugzilla.suse.com/1135534" source="BUGZILLA"/>
		<reference ref_id="1135708" ref_url="https://bugzilla.suse.com/1135708" source="BUGZILLA"/>
		<reference ref_id="1151708" ref_url="https://bugzilla.suse.com/1151708" source="BUGZILLA"/>
		<reference ref_id="1168235" ref_url="https://bugzilla.suse.com/1168235" source="BUGZILLA"/>
		<reference ref_id="1168389" ref_url="https://bugzilla.suse.com/1168389" source="BUGZILLA"/>
		<reference ref_id="1169006" ref_url="https://bugzilla.suse.com/1169006" source="BUGZILLA"/>
		<reference ref_id="1174942" ref_url="https://bugzilla.suse.com/1174942" source="BUGZILLA"/>
		<reference ref_id="1175514" ref_url="https://bugzilla.suse.com/1175514" source="BUGZILLA"/>
		<reference ref_id="1175623" ref_url="https://bugzilla.suse.com/1175623" source="BUGZILLA"/>
		<reference ref_id="1178236" ref_url="https://bugzilla.suse.com/1178236" source="BUGZILLA"/>
		<reference ref_id="1178554" ref_url="https://bugzilla.suse.com/1178554" source="BUGZILLA"/>
		<reference ref_id="1178825" ref_url="https://bugzilla.suse.com/1178825" source="BUGZILLA"/>
		<reference ref_id="1188921" ref_url="https://bugzilla.suse.com/1188921" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37600" ref_url="https://www.suse.com/security/cve/CVE-2021-37600/" source="CVE"/>
		<description>
This update for util-linux fixes the following issues:

- CVE-2021-37600: Fixed an integer overflow which could lead to buffer overflow in get_sem_elements. (bsc#1188921)
- Prevent outdated pam files (bsc#1082293, bsc#1081947#c68).
- Do not trim read-only volumes (bsc#1106214).
- libmount: To prevent incorrect behavior, recognize more pseudofs and netfs (bsc#1122417).
- raw.service: Add RemainAfterExit=yes (bsc#1135534).
- agetty: Reload issue only if it is really needed (bsc#1085196)
- agetty: Return previous response of agetty for special characters (bsc#1085196, bsc#1125886)
- blockdev: Do not fail --report on kpartx-style partitions on multipath. (bsc#1168235)
- nologin: Add support for -c to prevent error from su -c. (bsc#1151708)
- Avoid triggering autofs in lookup_umount_fs_by_statfs. (bsc#1168389)
- libblkid: Do not trigger CDROM autoclose. (bsc#1084671)
- Avoid sulogin failing on not existing or not functional console devices. (bsc#1175514)
- Build with libudev support to support non-root users. (bsc#1169006)
- lscpu: avoid segfault on PowerPC systems with valid hardware configurations. (bsc#1175623, bsc#1178554, bsc#1178825)
- Fix for warning on mounts to CIFS with mount. (SG#57988, bsc#1174942)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081947">SUSE bug 1081947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082293">SUSE bug 1082293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084671">SUSE bug 1084671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085196">SUSE bug 1085196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106214">SUSE bug 1106214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122417">SUSE bug 1122417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125886">SUSE bug 1125886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135534">SUSE bug 1135534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135708">SUSE bug 1135708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151708">SUSE bug 1151708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168235">SUSE bug 1168235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168389">SUSE bug 1168389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169006">SUSE bug 1169006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174942">SUSE bug 1174942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175514">SUSE bug 1175514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175623">SUSE bug 1175623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178236">SUSE bug 1178236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178554">SUSE bug 1178554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178825">SUSE bug 1178825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188921">SUSE bug 1188921</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37600/">CVE-2021-37600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">CVE-2021-37600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652523" comment="libblkid1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652487" comment="libblkid1-32bit-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652524" comment="libfdisk1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652525" comment="libmount1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652490" comment="libmount1-32bit-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652526" comment="libsmartcols1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652527" comment="libuuid1-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652493" comment="libuuid1-32bit-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652528" comment="python-libmount-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652529" comment="util-linux-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652496" comment="util-linux-lang-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652530" comment="util-linux-systemd-2.29.2-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652531" comment="uuidd-2.29.2-3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152521" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1191435" ref_url="https://bugzilla.suse.com/1191435" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41991" ref_url="https://www.suse.com/security/cve/CVE-2021-41991/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191435">SUSE bug 1191435</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41991/">CVE-2021-41991 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41991">CVE-2021-41991 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652805" comment="strongswan-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652801" comment="strongswan-doc-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652806" comment="strongswan-hmac-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652807" comment="strongswan-ipsec-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652808" comment="strongswan-libs0-5.1.3-26.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152522" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1187668" ref_url="https://bugzilla.suse.com/1187668" source="BUGZILLA"/>
		<reference ref_id="1189241" ref_url="https://bugzilla.suse.com/1189241" source="BUGZILLA"/>
		<reference ref_id="1189287" ref_url="https://bugzilla.suse.com/1189287" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2021-3737: Fixed http client infinite line reading (DoS) after a http 100. (bsc#1189241)
- CVE-2021-3733: Fixed ReDoS in urllib.request. (bsc#1189287)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1187668">SUSE bug 1187668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189241">SUSE bug 1189241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189287">SUSE bug 1189287</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3733">CVE-2021-3733 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3737">CVE-2021-3737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651871" comment="libpython3_4m1_0-3.4.10-25.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651872" comment="python3-3.4.10-25.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651873" comment="python3-base-3.4.10-25.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651874" comment="python3-curses-3.4.10-25.80.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152523" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178961" ref_url="https://bugzilla.suse.com/1178961" source="BUGZILLA"/>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1183118" ref_url="https://bugzilla.suse.com/1183118" source="BUGZILLA"/>
		<reference ref_id="1183168" ref_url="https://bugzilla.suse.com/1183168" source="BUGZILLA"/>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="1185952" ref_url="https://bugzilla.suse.com/1185952" source="BUGZILLA"/>
		<reference ref_id="1187751" ref_url="https://bugzilla.suse.com/1187751" source="BUGZILLA"/>
		<reference ref_id="1190177" ref_url="https://bugzilla.suse.com/1190177" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

- Fix for build with llvm12 on s390x. (bsc#1185952)
- Re-enable 'icu' for PostgreSQL 10. (bsc#1179945)
- Add postgresqlXX-server-devel as a dependency for postgresql13-server-devel. (bsc#1187751)
- Upgrade to version 10.18. (bsc#1190177)

Upgrade to version 10.17 (already released for SUSE Linux Enterprise 12 SP5):

- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).

- Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).
- Re-enable build of the llvmjit subpackage on SLE, but it will only be delivered on PackageHub for now (bsc#1183118).
- Disable icu for PostgreSQL 10 (and older) on TW (bsc#1179945).
- Fixed an issue droping irregular warning messages by removing the package. (bsc#1178961)
- Fixed an issue when build does not build the requiements to avoid dangling symlinks in the devel package. (bsc#1179765)
- Fix recently-added timetz test case so it works when the USA is not observing daylight savings time.

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178961">SUSE bug 1178961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183118">SUSE bug 1183118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183168">SUSE bug 1183168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185952">SUSE bug 1185952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187751">SUSE bug 1187751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190177">SUSE bug 1190177</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652164" comment="postgresql10-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652165" comment="postgresql10-contrib-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652158" comment="postgresql10-docs-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652169" comment="postgresql10-server-10.18-4.19.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152524" version="1" class="patch">
	<metadata>
		<title>Security update for git (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189992" ref_url="https://bugzilla.suse.com/1189992" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-40330" ref_url="https://www.suse.com/security/cve/CVE-2021-40330/" source="CVE"/>
		<description>
This update for git fixes the following issues:

- CVE-2021-40330: Fixed unexpected cross-protocol requests via newline character in git_connect_git repository path (bsc#1189992).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189992">SUSE bug 1189992</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-40330/">CVE-2021-40330 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40330">CVE-2021-40330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652544" comment="git-2.26.2-27.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652545" comment="git-core-2.26.2-27.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652546" comment="git-cvs-2.26.2-27.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652547" comment="git-daemon-2.26.2-27.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652548" comment="git-email-2.26.2-27.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652549" comment="git-gui-2.26.2-27.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652550" comment="git-svn-2.26.2-27.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652551" comment="git-web-2.26.2-27.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652552" comment="gitk-2.26.2-27.49.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152525" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190793" ref_url="https://bugzilla.suse.com/1190793" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39537" ref_url="https://www.suse.com/security/cve/CVE-2021-39537/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

- CVE-2021-39537: Fixed an heap-based buffer overflow in _nc_captoinfo. (bsc#1190793)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190793">SUSE bug 1190793</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39537/">CVE-2021-39537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">CVE-2021-39537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652271" comment="libncurses5-5.9-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652272" comment="libncurses5-32bit-5.9-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652273" comment="libncurses6-5.9-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652274" comment="libncurses6-32bit-5.9-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652275" comment="ncurses-devel-5.9-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652276" comment="ncurses-devel-32bit-5.9-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652277" comment="ncurses-utils-5.9-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652278" comment="tack-5.9-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652279" comment="terminfo-5.9-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652280" comment="terminfo-base-5.9-75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152526" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190069" ref_url="https://bugzilla.suse.com/1190069" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39272" ref_url="https://www.suse.com/security/cve/CVE-2021-39272/" source="CVE"/>
		<description>
This update for fetchmail fixes the following issues:

- CVE-2021-39272: Fix failure to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH. (bsc#1190069)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190069">SUSE bug 1190069</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39272/">CVE-2021-39272 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39272">CVE-2021-39272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651875" comment="fetchmail-6.3.26-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651876" comment="fetchmailconf-6.3.26-13.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152527" version="1" class="patch">
	<metadata>
		<title>Security update for cairo (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122321" ref_url="https://bugzilla.suse.com/1122321" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6462" ref_url="https://www.suse.com/security/cve/CVE-2019-6462/" source="CVE"/>
		<description>
This update for cairo fixes the following issues:

- CVE-2019-6462: Fixed a potentially infinite loop (bsc#1122321).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-22"/>
	<updated date="2021-10-22"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1122321">SUSE bug 1122321</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6462/">CVE-2019-6462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6462">CVE-2019-6462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632730" comment="libcairo-gobject2-1.15.2-25.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632731" comment="libcairo-gobject2-32bit-1.15.2-25.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632732" comment="libcairo-script-interpreter2-1.15.2-25.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632733" comment="libcairo2-1.15.2-25.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632734" comment="libcairo2-32bit-1.15.2-25.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152528" version="1" class="patch">
	<metadata>
		<title>Security update for open-lldp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104624" ref_url="https://bugzilla.suse.com/1104624" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10932" ref_url="https://www.suse.com/security/cve/CVE-2018-10932/" source="CVE"/>
		<description>
This update for open-lldp fixes the following issues:

- CVE-2018-10932: Fixed an improper sanitization of shell-escape codes. (bsc#1104624)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-26"/>
	<updated date="2021-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104624">SUSE bug 1104624</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10932/">CVE-2018-10932 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10932">CVE-2018-10932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652553" comment="liblldp_clif1-0.9.46-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652554" comment="open-lldp-0.9.46-7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152529" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189241" ref_url="https://bugzilla.suse.com/1189241" source="BUGZILLA"/>
		<reference ref_id="1189287" ref_url="https://bugzilla.suse.com/1189287" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2021-3737: Fixed http client infinite line reading (DoS) after a http 100. (bsc#1189241)
- CVE-2021-3733: Fixed ReDoS in urllib.request. (bsc#1189287)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-26"/>
	<updated date="2021-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189241">SUSE bug 1189241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189287">SUSE bug 1189287</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3733">CVE-2021-3733 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3737">CVE-2021-3737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651877" comment="libpython2_7-1_0-2.7.18-28.74.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651878" comment="libpython2_7-1_0-32bit-2.7.18-28.74.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651879" comment="python-2.7.18-28.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651880" comment="python-32bit-2.7.18-28.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651881" comment="python-base-2.7.18-28.74.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651882" comment="python-base-32bit-2.7.18-28.74.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651883" comment="python-curses-2.7.18-28.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651884" comment="python-demo-2.7.18-28.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651885" comment="python-devel-2.7.18-28.74.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651886" comment="python-doc-2.7.18-28.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651887" comment="python-doc-pdf-2.7.18-28.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651888" comment="python-gdbm-2.7.18-28.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651889" comment="python-idle-2.7.18-28.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651890" comment="python-tk-2.7.18-28.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651891" comment="python-xml-2.7.18-28.74.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152530" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1191957" ref_url="https://bugzilla.suse.com/1191957" source="BUGZILLA"/>
		<reference ref_id="1191992" ref_url="https://bugzilla.suse.com/1191992" source="BUGZILLA"/>
		<reference ref_id="1192000" ref_url="https://bugzilla.suse.com/1192000" source="BUGZILLA"/>
		<reference ref_id="1192005" ref_url="https://bugzilla.suse.com/1192005" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42779" ref_url="https://www.suse.com/security/cve/CVE-2021-42779/" source="CVE"/>
		<reference ref_id="CVE-2021-42780" ref_url="https://www.suse.com/security/cve/CVE-2021-42780/" source="CVE"/>
		<reference ref_id="CVE-2021-42781" ref_url="https://www.suse.com/security/cve/CVE-2021-42781/" source="CVE"/>
		<reference ref_id="CVE-2021-42782" ref_url="https://www.suse.com/security/cve/CVE-2021-42782/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2021-42780: Fixed use after return in insert_pin() (bsc#1192005).
- CVE-2021-42779: Fixed use after free in sc_file_valid() (bsc#1191992).
- CVE-2021-42781: Fixed multiple heap buffer overflows in pkcs15-oberthur.c (bsc#1192000).
- CVE-2021-42782: Stack buffer overflow issues in various places (bsc#1191957).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191957">SUSE bug 1191957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191992">SUSE bug 1191992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192000">SUSE bug 1192000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192005">SUSE bug 1192005</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42779/">CVE-2021-42779 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42779">CVE-2021-42779 at NVD</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-42780/">CVE-2021-42780 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42780">CVE-2021-42780 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42781/">CVE-2021-42781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42781">CVE-2021-42781 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42782/">CVE-2021-42782 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42782">CVE-2021-42782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653628" comment="opensc-0.13.0-3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152531" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190607" ref_url="https://bugzilla.suse.com/1190607" source="BUGZILLA"/>
		<reference ref_id="1190611" ref_url="https://bugzilla.suse.com/1190611" source="BUGZILLA"/>
		<reference ref_id="1190612" ref_url="https://bugzilla.suse.com/1190612" source="BUGZILLA"/>
		<reference ref_id="1190615" ref_url="https://bugzilla.suse.com/1190615" source="BUGZILLA"/>
		<reference ref_id="1190616" ref_url="https://bugzilla.suse.com/1190616" source="BUGZILLA"/>
		<reference ref_id="1190617" ref_url="https://bugzilla.suse.com/1190617" source="BUGZILLA"/>
		<reference ref_id="1190618" ref_url="https://bugzilla.suse.com/1190618" source="BUGZILLA"/>
		<reference ref_id="1192019" ref_url="https://bugzilla.suse.com/1192019" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-21529" ref_url="https://www.suse.com/security/cve/CVE-2020-21529/" source="CVE"/>
		<reference ref_id="CVE-2020-21530" ref_url="https://www.suse.com/security/cve/CVE-2020-21530/" source="CVE"/>
		<reference ref_id="CVE-2020-21531" ref_url="https://www.suse.com/security/cve/CVE-2020-21531/" source="CVE"/>
		<reference ref_id="CVE-2020-21532" ref_url="https://www.suse.com/security/cve/CVE-2020-21532/" source="CVE"/>
		<reference ref_id="CVE-2020-21533" ref_url="https://www.suse.com/security/cve/CVE-2020-21533/" source="CVE"/>
		<reference ref_id="CVE-2020-21534" ref_url="https://www.suse.com/security/cve/CVE-2020-21534/" source="CVE"/>
		<reference ref_id="CVE-2020-21535" ref_url="https://www.suse.com/security/cve/CVE-2020-21535/" source="CVE"/>
		<reference ref_id="CVE-2021-32280" ref_url="https://www.suse.com/security/cve/CVE-2021-32280/" source="CVE"/>
		<description>
This update for transfig fixes the following issues:

Update to fig2dev version 3.2.8 Patchlevel 8b (Aug 2021)

- bsc#1190618, CVE-2020-21529: stack buffer overflow in the bezier_spline function in genepic.c.
- bsc#1190615, CVE-2020-21530: segmentation fault in the read_objects function in read.c.
- bsc#1190617, CVE-2020-21531: global buffer overflow in the conv_pattern_index function in gencgm.c.
- bsc#1190616, CVE-2020-21532: global buffer overflow in the setfigfont function in genepic.c.
- bsc#1190612, CVE-2020-21533: stack buffer overflow in the read_textobject function in read.c.
- bsc#1190611, CVE-2020-21534: global buffer overflow in the get_line function in read.c.
- bsc#1190607, CVE-2020-21535: segmentation fault in the gencgm_start function in gencgm.c.
- bsc#1192019, CVE-2021-32280: NULL pointer dereference in compute_closed_spline() in trans_spline.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190607">SUSE bug 1190607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190611">SUSE bug 1190611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190612">SUSE bug 1190612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190615">SUSE bug 1190615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190616">SUSE bug 1190616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190617">SUSE bug 1190617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190618">SUSE bug 1190618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192019">SUSE bug 1192019</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21529/">CVE-2020-21529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21529">CVE-2020-21529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21530/">CVE-2020-21530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21530">CVE-2020-21530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21531/">CVE-2020-21531 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21531">CVE-2020-21531 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21532/">CVE-2020-21532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21532">CVE-2020-21532 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21533/">CVE-2020-21533 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21533">CVE-2020-21533 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21534/">CVE-2020-21534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21534">CVE-2020-21534 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21535/">CVE-2020-21535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21535">CVE-2020-21535 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32280/">CVE-2021-32280 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32280">CVE-2021-32280 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653544" comment="transfig-3.2.8b-2.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152532" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1126826" ref_url="https://bugzilla.suse.com/1126826" source="BUGZILLA"/>
		<reference ref_id="1126829" ref_url="https://bugzilla.suse.com/1126829" source="BUGZILLA"/>
		<reference ref_id="1126831" ref_url="https://bugzilla.suse.com/1126831" source="BUGZILLA"/>
		<reference ref_id="1140126" ref_url="https://bugzilla.suse.com/1140126" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1143609" ref_url="https://bugzilla.suse.com/1143609" source="BUGZILLA"/>
		<reference ref_id="1153768" ref_url="https://bugzilla.suse.com/1153768" source="BUGZILLA"/>
		<reference ref_id="1153770" ref_url="https://bugzilla.suse.com/1153770" source="BUGZILLA"/>
		<reference ref_id="1157755" ref_url="https://bugzilla.suse.com/1157755" source="BUGZILLA"/>
		<reference ref_id="1160254" ref_url="https://bugzilla.suse.com/1160254" source="BUGZILLA"/>
		<reference ref_id="1160590" ref_url="https://bugzilla.suse.com/1160590" source="BUGZILLA"/>
		<reference ref_id="1163333" ref_url="https://bugzilla.suse.com/1163333" source="BUGZILLA"/>
		<reference ref_id="1163744" ref_url="https://bugzilla.suse.com/1163744" source="BUGZILLA"/>
		<reference ref_id="1179036" ref_url="https://bugzilla.suse.com/1179036" source="BUGZILLA"/>
		<reference ref_id="1179341" ref_url="https://bugzilla.suse.com/1179341" source="BUGZILLA"/>
		<reference ref_id="1179898" ref_url="https://bugzilla.suse.com/1179898" source="BUGZILLA"/>
		<reference ref_id="1179899" ref_url="https://bugzilla.suse.com/1179899" source="BUGZILLA"/>
		<reference ref_id="1179900" ref_url="https://bugzilla.suse.com/1179900" source="BUGZILLA"/>
		<reference ref_id="1179901" ref_url="https://bugzilla.suse.com/1179901" source="BUGZILLA"/>
		<reference ref_id="1179902" ref_url="https://bugzilla.suse.com/1179902" source="BUGZILLA"/>
		<reference ref_id="1179903" ref_url="https://bugzilla.suse.com/1179903" source="BUGZILLA"/>
		<reference ref_id="1180451" ref_url="https://bugzilla.suse.com/1180451" source="BUGZILLA"/>
		<reference ref_id="1180454" ref_url="https://bugzilla.suse.com/1180454" source="BUGZILLA"/>
		<reference ref_id="1180461" ref_url="https://bugzilla.suse.com/1180461" source="BUGZILLA"/>
		<reference ref_id="1181452" ref_url="https://bugzilla.suse.com/1181452" source="BUGZILLA"/>
		<reference ref_id="1182252" ref_url="https://bugzilla.suse.com/1182252" source="BUGZILLA"/>
		<reference ref_id="1183511" ref_url="https://bugzilla.suse.com/1183511" source="BUGZILLA"/>
		<reference ref_id="1184620" ref_url="https://bugzilla.suse.com/1184620" source="BUGZILLA"/>
		<reference ref_id="1184794" ref_url="https://bugzilla.suse.com/1184794" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12972" ref_url="https://www.suse.com/security/cve/CVE-2019-12972/" source="CVE"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-14444" ref_url="https://www.suse.com/security/cve/CVE-2019-14444/" source="CVE"/>
		<reference ref_id="CVE-2019-17450" ref_url="https://www.suse.com/security/cve/CVE-2019-17450/" source="CVE"/>
		<reference ref_id="CVE-2019-17451" ref_url="https://www.suse.com/security/cve/CVE-2019-17451/" source="CVE"/>
		<reference ref_id="CVE-2019-9074" ref_url="https://www.suse.com/security/cve/CVE-2019-9074/" source="CVE"/>
		<reference ref_id="CVE-2019-9075" ref_url="https://www.suse.com/security/cve/CVE-2019-9075/" source="CVE"/>
		<reference ref_id="CVE-2019-9077" ref_url="https://www.suse.com/security/cve/CVE-2019-9077/" source="CVE"/>
		<reference ref_id="CVE-2020-16590" ref_url="https://www.suse.com/security/cve/CVE-2020-16590/" source="CVE"/>
		<reference ref_id="CVE-2020-16591" ref_url="https://www.suse.com/security/cve/CVE-2020-16591/" source="CVE"/>
		<reference ref_id="CVE-2020-16592" ref_url="https://www.suse.com/security/cve/CVE-2020-16592/" source="CVE"/>
		<reference ref_id="CVE-2020-16593" ref_url="https://www.suse.com/security/cve/CVE-2020-16593/" source="CVE"/>
		<reference ref_id="CVE-2020-16598" ref_url="https://www.suse.com/security/cve/CVE-2020-16598/" source="CVE"/>
		<reference ref_id="CVE-2020-16599" ref_url="https://www.suse.com/security/cve/CVE-2020-16599/" source="CVE"/>
		<reference ref_id="CVE-2020-35448" ref_url="https://www.suse.com/security/cve/CVE-2020-35448/" source="CVE"/>
		<reference ref_id="CVE-2020-35493" ref_url="https://www.suse.com/security/cve/CVE-2020-35493/" source="CVE"/>
		<reference ref_id="CVE-2020-35496" ref_url="https://www.suse.com/security/cve/CVE-2020-35496/" source="CVE"/>
		<reference ref_id="CVE-2020-35507" ref_url="https://www.suse.com/security/cve/CVE-2020-35507/" source="CVE"/>
		<reference ref_id="CVE-2021-20197" ref_url="https://www.suse.com/security/cve/CVE-2021-20197/" source="CVE"/>
		<reference ref_id="CVE-2021-20284" ref_url="https://www.suse.com/security/cve/CVE-2021-20284/" source="CVE"/>
		<reference ref_id="CVE-2021-3487" ref_url="https://www.suse.com/security/cve/CVE-2021-3487/" source="CVE"/>
		<description>
This update for binutils fixes the following issues:

Update to binutils 2.37:

* The GNU Binutils sources now requires a C99 compiler and library to
  build.
* Support for the arm-symbianelf format has been removed.
* Support for Realm Management Extension (RME) for AArch64 has been
  added.
* A new linker option '-z report-relative-reloc' for x86 ELF targets
  has been added to report dynamic relative relocations.
* A new linker option '-z start-stop-gc' has been added to disable
  special treatment of __start_*/__stop_* references when
  --gc-sections.
* A new linker options '-Bno-symbolic' has been added which will
  cancel the '-Bsymbolic' and '-Bsymbolic-functions' options.
* The readelf tool has a new command line option which can be used to
  specify how the numeric values of symbols are reported.
  --sym-base=0|8|10|16 tells readelf to display the values in base 8,
  base 10 or base 16.  A sym base of 0 represents the default action
  of displaying values under 10000 in base 10 and values above that in
  base 16.
* A new format has been added to the nm program.  Specifying
  '--format=just-symbols' (or just using -j) will tell the program to
  only display symbol names and nothing else.
* A new command line option '--keep-section-symbols' has been added to
  objcopy and strip.  This stops the removal of unused section symbols
  when the file is copied.  Removing these symbols saves space, but
  sometimes they are needed by other tools.
* The '--weaken', '--weaken-symbol' and '--weaken-symbols' options
  supported by objcopy now make undefined symbols weak on targets that
  support weak symbols. 
* Readelf and objdump can now display and use the contents of .debug_sup
  sections.
* Readelf and objdump will now follow links to separate debug info
  files by default.  This behaviour can be stopped via the use of the
  new '-wN' or '--debug-dump=no-follow-links' options for readelf and
  the '-WN' or '--dwarf=no-follow-links' options for objdump.  Also
  the old behaviour can be restored by the use of the
  '--enable-follow-debug-links=no' configure time option.

  The semantics of the =follow-links option have also been slightly
  changed.  When enabled, the option allows for the loading of symbol
  tables and string tables from the separate files which can be used
  to enhance the information displayed when dumping other sections,
  but it does not automatically imply that information from the
  separate files should be displayed.

  If other debug section display options are also enabled (eg
  '--debug-dump=info') then the contents of matching sections in both
  the main file and the separate debuginfo file *will* be displayed.
  This is because in most cases the debug section will only be present
  in one of the files.

  If however non-debug section display options are enabled (eg
  '--sections') then the contents of matching parts of the separate
  debuginfo file will *not* be displayed.  This is because in most
  cases the user probably only wanted to load the symbol information
  from the separate debuginfo file.  In order to change this behaviour
  a new command line option --process-links can be used.  This will
  allow di0pslay options to applied to both the main file and any
  separate debuginfo files.
* Nm has a new command line option: '--quiet'.  This suppresses 'no
  symbols' diagnostic.

Update to binutils 2.36:

 New features in the Assembler:

  General:

   * When setting the link order attribute of ELF sections, it is now
     possible to use a numeric section index instead of symbol name.
   * Added a .nop directive to generate a single no-op instruction in
     a target neutral manner.  This instruction does have an effect on
     DWARF line number generation, if that is active.
   * Removed --reduce-memory-overheads and --hash-size as gas now
     uses hash tables that can be expand and shrink automatically.

   X86/x86_64:

     * Add support for AVX VNNI, HRESET, UINTR, TDX, AMX and Key
       Locker instructions. 
     * Support non-absolute segment values for lcall and ljmp.
     * Add {disp16} pseudo prefix to x86 assembler.
     * Configure with --enable-x86-used-note by default for Linux/x86.

   ARM/AArch64:

     * Add support for Cortex-A78, Cortex-A78AE and Cortex-X1,
       Cortex-R82, Neoverse V1, and Neoverse N2 cores.
     * Add support for ETMv4 (Embedded Trace Macrocell), ETE (Embedded
       Trace Extension), TRBE (Trace Buffer Extension), CSRE (Call
       Stack Recorder Extension) and BRBE (Branch Record Buffer
       Extension) system registers.
     * Add support for Armv8-R and Armv8.7-A ISA extensions.
     * Add support for DSB memory nXS barrier, WFET and WFIT
       instruction for Armv8.7.
     * Add support for +csre feature for -march. Add CSR PDEC
       instruction for CSRE feature in AArch64.
     * Add support for +flagm feature for -march in Armv8.4 AArch64.
     * Add support for +ls64 feature for -march in Armv8.7
       AArch64. Add atomic 64-byte load/store instructions for this
       feature. 
     * Add support for +pauth (Pointer Authentication) feature for
       -march in AArch64.

  New features in the Linker:

    * Add --error-handling-script=&lt;NAME&gt; command line option to allow
      a helper script to be invoked when an undefined symbol or a
      missing library is encountered.  This option can be suppressed
      via the configure time switch: --enable-error-handling-script=no.
    * Add -z x86-64-{baseline|v[234]} to the x86 ELF linker to mark
      x86-64-{baseline|v[234]} ISA level as needed.
    * Add -z unique-symbol to avoid duplicated local symbol names.
    * The creation of PE format DLLs now defaults to using a more
      secure set of DLL characteristics.
    * The linker now deduplicates the types in .ctf sections.  The new 
       command-line option --ctf-share-types describes how to do this:
       its default value, share-unconflicted, produces the most compact
       output.
    * The linker now omits the 'variable section' from .ctf sections
      by default, saving space.  This is almost certainly what you
      want unless you are working on a project that has its own
      analogue of symbol tables that are not reflected in the ELF
      symtabs.

New features in other binary tools:

    * The ar tool's previously unused l modifier is now used for
      specifying dependencies of a static library. The arguments of
      this option (or --record-libdeps long form option) will be
      stored verbatim in the __.LIBDEP member of the archive, which
      the linker may read at link time.
    * Readelf can now display the contents of LTO symbol table
      sections when asked to do so via the --lto-syms command line
      option.
    * Readelf now accepts the -C command line option to enable the
      demangling of symbol names.  In addition the --demangle=&lt;style&gt;,
      --no-demangle, --recurse-limit and --no-recurse-limit options
      are also now availale.

Update to binutils 2.35.1:

* This is a point release over the previous 2.35 version, containing bug
  fixes, and as an exception to the usual rule, one new feature.  The
  new feature is the support for a new directive in the assembler:
  '.nop'.  This directive creates a single no-op instruction in whatever
  encoding is correct for the target architecture.  Unlike the .space or
  .fill this is a real instruction, and it does affect the generation of
  DWARF line number tables, should they be enabled.

Update to binutils 2.35:

* The assembler can now produce DWARF-5 format line number tables.
* Readelf now has a 'lint' mode to enable extra checks of the files it is processing.
* Readelf will now display '[...]' when it has to truncate a symbol name.  
  The old behaviour - of displaying as many characters as possible, up to
  the 80 column limit - can be restored by the use of the --silent-truncation
  option.
* The linker can now produce a dependency file listing the inputs that it
  has processed, much like the -M -MP option supported by the compiler.

Update to binutils 2.34:

* The disassembler (objdump --disassemble) now has an option to
  generate ascii art thats show the arcs between that start and end
  points of control flow instructions.
* The binutils tools now have support for debuginfod.  Debuginfod is a 
  HTTP service for distributing ELF/DWARF debugging information as
  well as source code.  The tools can now connect to debuginfod
  servers in order to download debug information about the files that
  they are processing.
* The assembler and linker now support the generation of ELF format
  files for the Z80 architecture.

Update to binutils 2.33.1:

* Adds support for the Arm Scalable Vector Extension version 2
  (SVE2) instructions, the Arm Transactional Memory Extension (TME)
  instructions and the Armv8.1-M Mainline and M-profile Vector
  Extension (MVE) instructions.
* Adds support for the Arm Cortex-A76AE, Cortex-A77 and Cortex-M35P
  processors and the AArch64 Cortex-A34, Cortex-A65, Cortex-A65AE,
  Cortex-A76AE, and Cortex-A77 processors.
* Adds a .float16 directive for both Arm and AArch64 to allow
  encoding of 16-bit floating point literals.
* For MIPS, Add -m[no-]fix-loongson3-llsc option to fix (or not)
  Loongson3 LLSC Errata.  Add a --enable-mips-fix-loongson3-llsc=[yes|no]
  configure time option to set the default behavior. Set the default
  if the configure option is not used to 'no'.
* The Cortex-A53 Erratum 843419 workaround now supports a choice of
  which workaround to use.  The option --fix-cortex-a53-843419 now
  takes an optional argument --fix-cortex-a53-843419[=full|adr|adrp]
  which can be used to force a particular workaround to be used.
  See --help for AArch64 for more details.
* Add support for GNU_PROPERTY_AARCH64_FEATURE_1_BTI and
  GNU_PROPERTY_AARCH64_FEATURE_1_PAC  in ELF GNU program properties
  in the AArch64 ELF linker. 
* Add -z force-bti for AArch64 to enable GNU_PROPERTY_AARCH64_FEATURE_1_BTI
  on output while warning about missing GNU_PROPERTY_AARCH64_FEATURE_1_BTI 
  on inputs and use PLTs protected with BTI.
* Add -z pac-plt for AArch64 to pick PAC enabled PLTs.
* Add --source-comment[=&lt;txt&gt;] option to objdump which if present,
  provides a prefix to source code lines displayed in a disassembly.
* Add --set-section-alignment &lt;section-name&gt;=&lt;power-of-2-align&gt;
  option to objcopy to allow the changing of section alignments.
* Add --verilog-data-width option to objcopy for verilog targets to
  control width of data elements in verilog hex format.
* The separate debug info file options of readelf (--debug-dump=links
  and --debug-dump=follow) and objdump (--dwarf=links and
  --dwarf=follow-links) will now display and/or follow multiple
  links if more than one are present in a file.  (This usually
  happens when gcc's -gsplit-dwarf option is used).
  In addition objdump's --dwarf=follow-links now also affects its
  other display options, so that for example, when combined with
  --syms it will cause the symbol tables in any linked debug info
  files to also be displayed.  In addition when combined with
  --disassemble the --dwarf= follow-links option will ensure that
  any symbol tables in the linked files are read and used when
  disassembling code in the main file.
* Add support for dumping types encoded in the Compact Type Format
  to objdump and readelf.

The following security fixes are addressed by the update:

- CVE-2021-20197: Fixed a race condition which allows users to own arbitrary files (bsc#1181452).
- CVE-2021-20284: Fixed a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c (bsc#1183511).
- CVE-2021-3487: Fixed a denial of service via excessive debug section size causing excessive memory consumption in bfd's dwarf2.c read_section() (bsc#1184620).
- CVE-2020-35448: Fixed a heap-based buffer over-read in bfd_getl_signed_32() in libbfd.c (bsc#1184794).
- CVE-2020-16590: Fixed a double free vulnerability in process_symbol_table() (bsc#1179898).
- CVE-2020-16591: Fixed an invalid read in process_symbol_table() (bsc#1179899).
- CVE-2020-16592: Fixed an use-after-free in bfd_hash_lookup() (bsc#1179900).
- CVE-2020-16593: Fixed a null pointer dereference in scan_unit_for_symbols() (bsc#1179901).
- CVE-2020-16598: Fixed a null pointer dereference in debug_get_real_type() (bsc#1179902).
- CVE-2020-16599: Fixed a null pointer dereference in _bfd_elf_get_symbol_version_string() (bsc#1179903)
- CVE-2020-35493: Fixed heap-based buffer overflow in bfd_pef_parse_function_stubs function in bfd/pef.c via crafted PEF file (bsc#1180451).
- CVE-2020-35496: Fixed multiple null pointer dereferences in bfd module due to not checking return value of bfd_malloc (bsc#1180454).
- CVE-2020-35507: Fixed a null pointer dereference in bfd_pef_parse_function_stubs() (bsc#1180461).
- CVE-2019-17451: Fixed an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line() in dwarf2.c (bsc#1153768).
- CVE-2019-17450: Fixed a potential denial of service in find_abstract_instance() in dwarf2.c (bsc#1153770).
- CVE-2019-9077: Fixed a heap-based buffer overflow in process_mips_specific() in readelf.c via a malformed MIPS option section (bsc#1126826).
- CVE-2019-9075: Fixed a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap() in archive64.c (bsc#1126829).
- CVE-2019-9074: Fixed a out-of-bounds read leading to a SEGV in bfd_getl32() in libbfd.c (bsc#1126831).
- CVE-2019-12972: Fixed a heap-based buffer over-read in _bfd_doprnt() in bfd.c (bsc#1140126).
- CVE-2019-14444: Fixed an integer overflow apply_relocations() in readelf.c (bsc#1143609).
- CVE-2019-14250: Fixed an integer overflow in simple_object_elf_match() in simple-object-elf.c (bsc#1142649).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-02"/>
	<updated date="2021-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126826">SUSE bug 1126826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126829">SUSE bug 1126829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126831">SUSE bug 1126831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140126">SUSE bug 1140126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143609">SUSE bug 1143609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153768">SUSE bug 1153768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153770">SUSE bug 1153770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157755">SUSE bug 1157755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160254">SUSE bug 1160254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160590">SUSE bug 1160590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163333">SUSE bug 1163333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163744">SUSE bug 1163744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179036">SUSE bug 1179036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179341">SUSE bug 1179341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179898">SUSE bug 1179898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179899">SUSE bug 1179899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179900">SUSE bug 1179900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179901">SUSE bug 1179901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179902">SUSE bug 1179902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179903">SUSE bug 1179903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180451">SUSE bug 1180451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180454">SUSE bug 1180454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180461">SUSE bug 1180461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181452">SUSE bug 1181452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182252">SUSE bug 1182252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183511">SUSE bug 1183511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184620">SUSE bug 1184620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184794">SUSE bug 1184794</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12972/">CVE-2019-12972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12972">CVE-2019-12972 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14250">CVE-2019-14250 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14444/">CVE-2019-14444 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14444">CVE-2019-14444 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17450/">CVE-2019-17450 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17450">CVE-2019-17450 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17451/">CVE-2019-17451 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17451">CVE-2019-17451 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9074/">CVE-2019-9074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9074">CVE-2019-9074 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9075/">CVE-2019-9075 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9075">CVE-2019-9075 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9077/">CVE-2019-9077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9077">CVE-2019-9077 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16590/">CVE-2020-16590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16590">CVE-2020-16590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16591/">CVE-2020-16591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16591">CVE-2020-16591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16592/">CVE-2020-16592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16592">CVE-2020-16592 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16593/">CVE-2020-16593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16593">CVE-2020-16593 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16598/">CVE-2020-16598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16598">CVE-2020-16598 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16599/">CVE-2020-16599 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16599">CVE-2020-16599 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-35448/">CVE-2020-35448 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35448">CVE-2020-35448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35493/">CVE-2020-35493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35493">CVE-2020-35493 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35496/">CVE-2020-35496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35496">CVE-2020-35496 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35507/">CVE-2020-35507 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35507">CVE-2020-35507 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20197/">CVE-2021-20197 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20197">CVE-2021-20197 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20284/">CVE-2021-20284 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20284">CVE-2021-20284 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3487/">CVE-2021-3487 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3487">CVE-2021-3487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152533" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185476" ref_url="https://bugzilla.suse.com/1185476" source="BUGZILLA"/>
		<reference ref_id="1188278" ref_url="https://bugzilla.suse.com/1188278" source="BUGZILLA"/>
		<reference ref_id="1188279" ref_url="https://bugzilla.suse.com/1188279" source="BUGZILLA"/>
		<reference ref_id="1190558" ref_url="https://bugzilla.suse.com/1190558" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30640" ref_url="https://www.suse.com/security/cve/CVE-2021-30640/" source="CVE"/>
		<reference ref_id="CVE-2021-33037" ref_url="https://www.suse.com/security/cve/CVE-2021-33037/" source="CVE"/>
		<reference ref_id="CVE-2021-41079" ref_url="https://www.suse.com/security/cve/CVE-2021-41079/" source="CVE"/>
		<description>
This update for tomcat, javapackages-tools fixes the following issue:

Security issue fixed:

- CVE-2021-30640: Escape parameters in JNDI Realm queries (bsc#1188279).
- CVE-2021-33037: Process T-E header from both HTTP 1.0 and HTTP 1.1. clients (bsc#1188278).
- CVE-2021-41079: Fixed a denial of service caused by an unexpected TLS packet (bsc#1190558). 

Non-security issues fixed:

- Add requires and conflicts to avoid the usage of the incompatible 'Java 11' with 'Tomcat'. (bsc#1185476)
- Rebuild javapackages-tools to fix a missing package on s390.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-03"/>
	<updated date="2021-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185476">SUSE bug 1185476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188278">SUSE bug 1188278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188279">SUSE bug 1188279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190558">SUSE bug 1190558</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30640/">CVE-2021-30640 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30640">CVE-2021-30640 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33037/">CVE-2021-33037 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33037">CVE-2021-33037 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41079/">CVE-2021-41079 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41079">CVE-2021-41079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653692" comment="javapackages-tools-2.0.1-13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152534" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192146" ref_url="https://bugzilla.suse.com/1192146" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25219" ref_url="https://www.suse.com/security/cve/CVE-2021-25219/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25219: Fixed lame cache that could have been abused to severely degrade resolver performance (bsc#1192146).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-08"/>
	<updated date="2021-11-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192146">SUSE bug 1192146</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-25219/">CVE-2021-25219 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25219">CVE-2021-25219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654129" comment="bind-9.9.9P1-63.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654130" comment="bind-chrootenv-9.9.9P1-63.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654131" comment="bind-doc-9.9.9P1-63.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654132" comment="bind-libs-9.9.9P1-63.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654133" comment="bind-libs-32bit-9.9.9P1-63.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654134" comment="bind-utils-9.9.9P1-63.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152535" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1183909" ref_url="https://bugzilla.suse.com/1183909" source="BUGZILLA"/>
		<reference ref_id="1184519" ref_url="https://bugzilla.suse.com/1184519" source="BUGZILLA"/>
		<reference ref_id="1188941" ref_url="https://bugzilla.suse.com/1188941" source="BUGZILLA"/>
		<reference ref_id="1191473" ref_url="https://bugzilla.suse.com/1191473" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20294" ref_url="https://www.suse.com/security/cve/CVE-2021-20294/" source="CVE"/>
		<description>
This update for binutils fixes the following issues:

- For compatibility on old code stream that expect 'brcl 0,label' to
  not be disassembled as 'jgnop label' on s390x.  (bsc#1192267)
  This reverts IBM zSeries HLASM support for now.
- Fixed that ppc64 optflags did not enable LTO (bsc#1188941).
- Fix empty man-pages from broken release tarball
- Fixed a memory corruption with rpath option (bsc#1191473).

- Fixed slow performance of stripping some binaries (bsc#1183909).

Security issue fixed:

- CVE-2021-20294: Fixed out-of-bounds write in print_dynamic_symbol in readelf (bnc#1184519)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183909">SUSE bug 1183909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184519">SUSE bug 1184519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188941">SUSE bug 1188941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191473">SUSE bug 1191473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20294/">CVE-2021-20294 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20294">CVE-2021-20294 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654414" comment="binutils-2.37-9.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654415" comment="binutils-devel-2.37-9.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654416" comment="libctf-nobfd0-2.37-9.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654417" comment="libctf0-2.37-9.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152536" version="1" class="patch">
	<metadata>
		<title>Security update for pcre (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1025709" ref_url="https://bugzilla.suse.com/1025709" source="BUGZILLA"/>
		<reference ref_id="1030066" ref_url="https://bugzilla.suse.com/1030066" source="BUGZILLA"/>
		<reference ref_id="1030803" ref_url="https://bugzilla.suse.com/1030803" source="BUGZILLA"/>
		<reference ref_id="1030805" ref_url="https://bugzilla.suse.com/1030805" source="BUGZILLA"/>
		<reference ref_id="1030807" ref_url="https://bugzilla.suse.com/1030807" source="BUGZILLA"/>
		<reference ref_id="1172973" ref_url="https://bugzilla.suse.com/1172973" source="BUGZILLA"/>
		<reference ref_id="1172974" ref_url="https://bugzilla.suse.com/1172974" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6004" ref_url="https://www.suse.com/security/cve/CVE-2017-6004/" source="CVE"/>
		<reference ref_id="CVE-2017-7186" ref_url="https://www.suse.com/security/cve/CVE-2017-7186/" source="CVE"/>
		<reference ref_id="CVE-2017-7244" ref_url="https://www.suse.com/security/cve/CVE-2017-7244/" source="CVE"/>
		<reference ref_id="CVE-2017-7245" ref_url="https://www.suse.com/security/cve/CVE-2017-7245/" source="CVE"/>
		<reference ref_id="CVE-2017-7246" ref_url="https://www.suse.com/security/cve/CVE-2017-7246/" source="CVE"/>
		<reference ref_id="CVE-2019-20838" ref_url="https://www.suse.com/security/cve/CVE-2019-20838/" source="CVE"/>
		<reference ref_id="CVE-2020-14155" ref_url="https://www.suse.com/security/cve/CVE-2020-14155/" source="CVE"/>
		<description>
This update for pcre fixes the following issues:

Update pcre to version 8.45:

- CVE-2020-14155: Fixed integer overflow via a large number after a '(?C' substring (bsc#1172974).
- CVE-2019-20838: Fixed buffer over-read in JIT compiler (bsc#1172973).
- CVE-2017-7244: Fixed invalid read in _pcre32_xclass() (bsc#1030807).
- CVE-2017-7245: Fixed buffer overflow in the pcre32_copy_substring (bsc#1030805).
- CVE-2017-7246: Fixed another buffer overflow in the pcre32_copy_substring (bsc#1030803).
- CVE-2017-7186: Fixed denial of service caused by an invalid Unicode property lookup (bsc#1030066).
- CVE-2017-6004: Fixed denial of service via crafted regular expression (bsc#1025709).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-10"/>
	<updated date="2021-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025709">SUSE bug 1025709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030066">SUSE bug 1030066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030803">SUSE bug 1030803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030805">SUSE bug 1030805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030807">SUSE bug 1030807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172973">SUSE bug 1172973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172974">SUSE bug 1172974</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6004/">CVE-2017-6004 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6004">CVE-2017-6004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7186/">CVE-2017-7186 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7186">CVE-2017-7186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7244/">CVE-2017-7244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7244">CVE-2017-7244 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7245/">CVE-2017-7245 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7245">CVE-2017-7245 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7246/">CVE-2017-7246 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7246">CVE-2017-7246 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20838/">CVE-2019-20838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20838">CVE-2019-20838 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14155/">CVE-2020-14155 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">CVE-2020-14155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653038" comment="libpcre1-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653016" comment="libpcre1-32bit-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653039" comment="libpcre16-0-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653066" comment="libpcrecpp0-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653354" comment="libpcreposix0-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653191" comment="pcre-devel-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653349" comment="selinux-policy-20140730-36.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653350" comment="selinux-policy-devel-20140730-36.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653351" comment="selinux-policy-minimum-20140730-36.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152537" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189702" ref_url="https://bugzilla.suse.com/1189702" source="BUGZILLA"/>
		<reference ref_id="1189938" ref_url="https://bugzilla.suse.com/1189938" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3713" ref_url="https://www.suse.com/security/cve/CVE-2021-3713/" source="CVE"/>
		<reference ref_id="CVE-2021-3748" ref_url="https://www.suse.com/security/cve/CVE-2021-3748/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- Fix out-of-bounds write in UAS (USB Attached SCSI) device emulation (bsc#1189702, CVE-2021-3713)
- Fix heap use-after-free in virtio_net_receive_rcu (bsc#1189938, CVE-2021-3748)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-10"/>
	<updated date="2021-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189702">SUSE bug 1189702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189938">SUSE bug 1189938</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3713/">CVE-2021-3713 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3713">CVE-2021-3713 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3748/">CVE-2021-3748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3748">CVE-2021-3748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653192" comment="qemu-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653193" comment="qemu-block-curl-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653194" comment="qemu-block-iscsi-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653156" comment="qemu-block-rbd-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653195" comment="qemu-block-ssh-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653196" comment="qemu-guest-agent-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653159" comment="qemu-ipxe-1.0.0+-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653160" comment="qemu-kvm-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653197" comment="qemu-lang-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653163" comment="qemu-seabios-1.10.2_0_g5f4c7b1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653164" comment="qemu-sgabios-8-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653198" comment="qemu-tools-2.9.1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653166" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-43.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653167" comment="qemu-x86-2.9.1-43.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152538" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192250" ref_url="https://bugzilla.suse.com/1192250" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38505" ref_url="https://www.suse.com/security/cve/CVE-2021-38505/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<reference ref_id="CVE-2021-38510" ref_url="https://www.suse.com/security/cve/CVE-2021-38510/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to Extended Support Release 91.3.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-49 (bsc#1192250)

  * CVE-2021-38503: iframe sandbox rules did not apply to XSLT stylesheets
  * CVE-2021-38504: Use-after-free in file picker dialog
  * CVE-2021-38505: Windows 10 Cloud Clipboard may have recorded sensitive user data
  * CVE-2021-38506: Firefox could be coaxed into going into fullscreen mode without notification or warning
  * CVE-2021-38507: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports
  * CVE-2021-38508: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing
  * CVE-2021-38509: Javascript alert box could have been spoofed onto an arbitrary domain
  * CVE-2021-38510: Download Protections were bypassed by .inetloc files on Mac OS
  * MOZ-2021-0008: Use-after-free in HTTP2 Session object
  * MOZ-2021-0007: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38503">CVE-2021-38503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38504">CVE-2021-38504 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38505/">CVE-2021-38505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38505">CVE-2021-38505 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38506">CVE-2021-38506 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38507">CVE-2021-38507 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38508">CVE-2021-38508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38509">CVE-2021-38509 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38510/">CVE-2021-38510 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38510">CVE-2021-38510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655637" comment="MozillaFirefox-91.3.0-112.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655638" comment="MozillaFirefox-devel-91.3.0-112.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655639" comment="MozillaFirefox-translations-common-91.3.0-112.80.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152539" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1014440" ref_url="https://bugzilla.suse.com/1014440" source="BUGZILLA"/>
		<reference ref_id="1192284" ref_url="https://bugzilla.suse.com/1192284" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124/" source="CVE"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<description>
This update for samba fixes the following issues:
	  
- CVE-2016-2124: Fixed not to fallback to non spnego authentication if we require kerberos (bsc#1014440).
- CVE-2020-25717: Fixed privilege escalation inside an AD Domain where a user could become root on domain members (bsc#1192284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014440">SUSE bug 1014440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192284">SUSE bug 1192284</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2124">CVE-2016-2124 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25717">CVE-2020-25717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655686" comment="libdcerpc-binding0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655588" comment="libdcerpc-binding0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655687" comment="libdcerpc0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655590" comment="libdcerpc0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655688" comment="libndr-krb5pac0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655592" comment="libndr-krb5pac0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655689" comment="libndr-nbt0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655594" comment="libndr-nbt0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655690" comment="libndr-standard0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655596" comment="libndr-standard0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655691" comment="libndr0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655598" comment="libndr0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655692" comment="libnetapi0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655600" comment="libnetapi0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655693" comment="libsamba-credentials0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655602" comment="libsamba-credentials0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655694" comment="libsamba-errors0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655604" comment="libsamba-errors0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655695" comment="libsamba-hostconfig0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655606" comment="libsamba-hostconfig0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655696" comment="libsamba-passdb0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655608" comment="libsamba-passdb0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655697" comment="libsamba-util0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655610" comment="libsamba-util0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655698" comment="libsamdb0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655612" comment="libsamdb0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655699" comment="libsmbclient0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655614" comment="libsmbclient0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655700" comment="libsmbconf0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655616" comment="libsmbconf0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655701" comment="libsmbldap0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655618" comment="libsmbldap0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655702" comment="libtevent-util0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655620" comment="libtevent-util0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655703" comment="libwbclient0-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655622" comment="libwbclient0-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655704" comment="samba-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655705" comment="samba-client-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655625" comment="samba-client-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655626" comment="samba-doc-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655706" comment="samba-libs-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655628" comment="samba-libs-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655707" comment="samba-winbind-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655630" comment="samba-winbind-32bit-4.6.16+git.307.b3899d08cc6-3.64.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152540" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql13, postgresql14  (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<description>
This update for postgresql, postgresql13 and postgresql14 fixes the following issues:

Security issues fixed:

- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).

This update also ships postgresql14 to SUSE Linux Enterprise 12 SP5. (jsc#SLE-22673)
On older service packs only libpq5 and libecpg6 are being replaced by the postgresql14 variants.

Feature changes in postgresql14:

- https://www.postgresql.org/about/news/postgresql-14-released-2318/
- https://www.postgresql.org/docs/14/release-14.html

		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-20"/>
	<updated date="2021-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656243" comment="libecpg6-14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656244" comment="libpq5-14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656229" comment="libpq5-32bit-14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656230" comment="postgresql-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656231" comment="postgresql-contrib-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656232" comment="postgresql-docs-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656233" comment="postgresql-plperl-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656234" comment="postgresql-plpython-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656235" comment="postgresql-pltcl-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656236" comment="postgresql-server-14-4.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152541" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<description>
This update for postgresql96 fixes the following issues:

- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656863" comment="postgresql96-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656864" comment="postgresql96-contrib-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656857" comment="postgresql96-docs-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656865" comment="postgresql96-plperl-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656866" comment="postgresql96-plpython-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656867" comment="postgresql96-pltcl-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656868" comment="postgresql96-server-9.6.24-6.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152542" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:
          
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656548" comment="postgresql10-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656549" comment="postgresql10-contrib-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656534" comment="postgresql10-docs-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656553" comment="postgresql10-server-10.19-4.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152543" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1191937" ref_url="https://bugzilla.suse.com/1191937" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42762" ref_url="https://www.suse.com/security/cve/CVE-2021-42762/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2021-42762: Updated seccomp rules with latest changes from flatpak (bsc#1191937).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-23"/>
	<updated date="2021-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191937">SUSE bug 1191937</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42762/">CVE-2021-42762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42762">CVE-2021-42762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657339" comment="libjavascriptcoregtk-4_0-18-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657340" comment="libwebkit2gtk-4_0-37-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657341" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657342" comment="typelib-1_0-WebKit2-4_0-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657343" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657344" comment="webkit2gtk-4_0-injected-bundles-2.32.4-2.74.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152544" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1191901" ref_url="https://bugzilla.suse.com/1191901" source="BUGZILLA"/>
		<reference ref_id="1191903" ref_url="https://bugzilla.suse.com/1191903" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191906" ref_url="https://bugzilla.suse.com/1191906" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version OpenJDK 8u312 (October 2021 CPU):
  
- CVE-2021-35550: Fixed weak ciphers preferred over stronger ones for TLS (bsc#1191901).
- CVE-2021-35556: Fixed excessive memory allocation in RTFParser (bsc#1191910).
- CVE-2021-35559: Fixed excessive memory allocation in RTFReader (bsc#1191911).
- CVE-2021-35561: Fixed excessive memory allocation in HashMap and HashSet (bsc#1191912).
- CVE-2021-35564: Fixed certificates with end dates too far in the future can corrupt keystore (bsc#1191913).
- CVE-2021-35565: Fixed loop in HttpsServer triggered during TLS session close (bsc#1191909).
- CVE-2021-35567: Fixed incorrect principal selection when using Kerberos Constrained Delegation (bsc#1191903).
- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake (bsc#1191904).
- CVE-2021-35586: Fixed excessive memory allocation in BMPImageReader (bsc#1191914).
- CVE-2021-35588: Fixed incomplete validation of inner class references in ClassFileParser (bsc#1191905)
- CVE-2021-35603: Fixed non-constant comparison during TLS handshakes (bsc#1191906).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-23"/>
	<updated date="2021-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191903">SUSE bug 1191903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35550">CVE-2021-35550 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35567">CVE-2021-35567 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657044" comment="java-1_8_0-openjdk-1.8.0.312-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657045" comment="java-1_8_0-openjdk-demo-1.8.0.312-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657046" comment="java-1_8_0-openjdk-devel-1.8.0.312-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657047" comment="java-1_8_0-openjdk-headless-1.8.0.312-27.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152545" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1191901" ref_url="https://bugzilla.suse.com/1191901" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191906" ref_url="https://bugzilla.suse.com/1191906" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:


Update to OpenJDK 7u321 (October 2021 CPU):

- CVE-2021-35550: Fixed weak ciphers preferred over stronger ones for TLS (bsc#1191901).
- CVE-2021-35556: Fixed excessive memory allocation in RTFParser (bsc#1191910).
- CVE-2021-35559: Fixed excessive memory allocation in RTFReader (bsc#1191911).
- CVE-2021-35561: Fixed excessive memory allocation in HashMap and HashSet (bsc#1191912).
- CVE-2021-35564: Fixed certificates with end dates too far in the future can corrupt keystore (bsc#1191913).
- CVE-2021-35565: Fixed loop in HttpsServer triggered during TLS session close (bsc#1191909).
- CVE-2021-35586: Fixed excessive memory allocation in BMPImageReader (bsc#1191914).
- CVE-2021-35588: Fixed incomplete validation of inner class references in ClassFileParser (bsc#1191905)
- CVE-2021-35603: Fixed non-constant comparison during TLS handshakes (bsc#1191906).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35550">CVE-2021-35550 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656897" comment="java-1_7_0-openjdk-1.7.0.321-43.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656898" comment="java-1_7_0-openjdk-demo-1.7.0.321-43.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656899" comment="java-1_7_0-openjdk-devel-1.7.0.321-43.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656900" comment="java-1_7_0-openjdk-headless-1.7.0.321-43.53.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152546" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177125" ref_url="https://bugzilla.suse.com/1177125" source="BUGZILLA"/>
		<reference ref_id="1188160" ref_url="https://bugzilla.suse.com/1188160" source="BUGZILLA"/>
		<reference ref_id="1188161" ref_url="https://bugzilla.suse.com/1188161" source="BUGZILLA"/>
		<reference ref_id="1190375" ref_url="https://bugzilla.suse.com/1190375" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25613" ref_url="https://www.suse.com/security/cve/CVE-2020-25613/" source="CVE"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<description>
This update for ruby2.1 fixes the following issues:

- CVE-2020-25613: Fixed potential HTTP request smuggling in WEBrick (bsc#1177125).
- CVE-2021-31799: Fixed Command injection vulnerability in RDoc (bsc#1190375).
- CVE-2021-31810: Fixed trusting FTP PASV responses vulnerability in Net:FTP (bsc#1188161).
- CVE-2021-32066: Fixed StartTLS stripping vulnerability in Net:IMAP (bsc#1188160).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177125">SUSE bug 1177125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188160">SUSE bug 1188160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188161">SUSE bug 1188161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190375">SUSE bug 1190375</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25613/">CVE-2020-25613 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25613">CVE-2020-25613 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31799">CVE-2021-31799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31810">CVE-2021-31810 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32066">CVE-2021-32066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657553" comment="libruby2_1-2_1-2.1.9-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657554" comment="ruby2.1-2.1.9-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657555" comment="ruby2.1-stdlib-2.1.9-19.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152547" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184353" ref_url="https://bugzilla.suse.com/1184353" source="BUGZILLA"/>
		<reference ref_id="1192498" ref_url="https://bugzilla.suse.com/1192498" source="BUGZILLA"/>
		<reference ref_id="1192556" ref_url="https://bugzilla.suse.com/1192556" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3477" ref_url="https://www.suse.com/security/cve/CVE-2021-3477/" source="CVE"/>
		<reference ref_id="CVE-2021-3933" ref_url="https://www.suse.com/security/cve/CVE-2021-3933/" source="CVE"/>
		<reference ref_id="CVE-2021-3941" ref_url="https://www.suse.com/security/cve/CVE-2021-3941/" source="CVE"/>
		<description>
This update for openexr fixes the following issues:
    
- CVE-2021-3477: Fixed Heap-buffer-overflow in Imf_2_5::DeepTiledInputFile::readPixelSampleCounts (bsc#1184353).
- CVE-2021-3941: Fixed divide-by-zero in Imf_3_1:RGBtoXYZ (bsc#1192556).
- CVE-2021-3933: Fixed integer-overflow in Imf_3_1:bytesPerDeepLineTable (bsc#1192498).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184353">SUSE bug 1184353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192498">SUSE bug 1192498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192556">SUSE bug 1192556</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3477/">CVE-2021-3477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3477">CVE-2021-3477 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3933/">CVE-2021-3933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3933">CVE-2021-3933 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3941/">CVE-2021-3941 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3941">CVE-2021-3941 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656881" comment="libIlmImf-Imf_2_1-21-2.1.0-6.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656882" comment="openexr-2.1.0-6.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152548" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192554" ref_url="https://bugzilla.suse.com/1192554" source="BUGZILLA"/>
		<reference ref_id="1192557" ref_url="https://bugzilla.suse.com/1192557" source="BUGZILLA"/>
		<reference ref_id="1192559" ref_url="https://bugzilla.suse.com/1192559" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28704" ref_url="https://www.suse.com/security/cve/CVE-2021-28704/" source="CVE"/>
		<reference ref_id="CVE-2021-28705" ref_url="https://www.suse.com/security/cve/CVE-2021-28705/" source="CVE"/>
		<reference ref_id="CVE-2021-28706" ref_url="https://www.suse.com/security/cve/CVE-2021-28706/" source="CVE"/>
		<reference ref_id="CVE-2021-28707" ref_url="https://www.suse.com/security/cve/CVE-2021-28707/" source="CVE"/>
		<reference ref_id="CVE-2021-28708" ref_url="https://www.suse.com/security/cve/CVE-2021-28708/" source="CVE"/>
		<reference ref_id="CVE-2021-28709" ref_url="https://www.suse.com/security/cve/CVE-2021-28709/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-28704, CVE-2021-28707, CVE-2021-28708: Fixed PoD operations on misaligned GFNs (XSA-388) (bsc#1192557).
- CVE-2021-28705, CVE-2021-28709: Fixed issues with partially successful P2M updates on x86 (XSA-389) (bsc#1192559).
- CVE-2021-28706: Fixed guests may exceed their designated memory limit (XSA-385) (bsc#1192554).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192554">SUSE bug 1192554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192557">SUSE bug 1192557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192559">SUSE bug 1192559</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28704/">CVE-2021-28704 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28704">CVE-2021-28704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28705/">CVE-2021-28705 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28705">CVE-2021-28705 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28706/">CVE-2021-28706 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28706">CVE-2021-28706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28707/">CVE-2021-28707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28707">CVE-2021-28707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28708/">CVE-2021-28708 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28708">CVE-2021-28708 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28709/">CVE-2021-28709 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28709">CVE-2021-28709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658666" comment="xen-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658667" comment="xen-doc-html-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658668" comment="xen-libs-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658669" comment="xen-libs-32bit-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658670" comment="xen-tools-4.9.4_24-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658671" comment="xen-tools-domU-4.9.4_24-3.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152549" version="1" class="patch">
	<metadata>
		<title>Security update for speex (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192580" ref_url="https://bugzilla.suse.com/1192580" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-23903" ref_url="https://www.suse.com/security/cve/CVE-2020-23903/" source="CVE"/>
		<description>
This update for speex fixes the following issues:

- CVE-2020-23903: Fixed zero division error in read_samples (bsc#1192580).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192580">SUSE bug 1192580</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-23903/">CVE-2020-23903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-23903">CVE-2020-23903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656566" comment="libspeex1-1.1.999_1.2rc1-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656567" comment="libspeex1-32bit-1.1.999_1.2rc1-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656568" comment="libspeexdsp1-1.1.999_1.2rc1-24.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152550" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1103032" ref_url="https://bugzilla.suse.com/1103032" source="BUGZILLA"/>
		<reference ref_id="1188284" ref_url="https://bugzilla.suse.com/1188284" source="BUGZILLA"/>
		<reference ref_id="1192346" ref_url="https://bugzilla.suse.com/1192346" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2018-14679: Fixed off-by-one issue in embedded libmspack that could lead to denial of service (bsc#1103032). 
  
- Update to 0.103.4 (bsc#1192346).
- Update to 0.103.3 (bsc#1188284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188284">SUSE bug 1188284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192346">SUSE bug 1192346</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14679">CVE-2018-14679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656968" comment="clamav-0.103.4-33.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152551" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192063" ref_url="https://bugzilla.suse.com/1192063" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2021-30846: Fixed memory corruption issue that could lead to arbitrary code execution when processing maliciously crafted web content (bsc#1192063).
- CVE-2021-30851: Fixed memory corruption vulnerability that could lead to arbitrary code execution when processing maliciously crafted web content (bsc#1192063).   
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192063">SUSE bug 1192063</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30846">CVE-2021-30846 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30851">CVE-2021-30851 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658205" comment="libjavascriptcoregtk-4_0-18-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658206" comment="libwebkit2gtk-4_0-37-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658207" comment="typelib-1_0-JavaScriptCore-4_0-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658208" comment="typelib-1_0-WebKit2-4_0-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658209" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658210" comment="webkit2gtk-4_0-injected-bundles-2.34.1-2.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152552" version="1" class="patch">
	<metadata>
		<title>Security update for gmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192717" ref_url="https://bugzilla.suse.com/1192717" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43618" ref_url="https://www.suse.com/security/cve/CVE-2021-43618/" source="CVE"/>
		<description>
This update for gmp fixes the following issues:

- CVE-2021-43618: Fixed buffer overflow via crafted input in mpz/inp_raw.c (bsc#1192717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-02"/>
	<updated date="2021-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192717">SUSE bug 1192717</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43618/">CVE-2021-43618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43618">CVE-2021-43618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656971" comment="libgmp10-5.1.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656972" comment="libgmp10-32bit-5.1.3-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152553" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193170" ref_url="https://bugzilla.suse.com/1193170" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<description>
This update for mozilla-nss fixes the following issues:

Update to version 3.68.1:

- CVE-2021-43527: Fixed a Heap overflow in NSS when verifying DER-encoded DSA or RSA-PSS signatures (bsc#1193170).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659103" comment="libfreebl3-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659086" comment="libfreebl3-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659104" comment="libfreebl3-hmac-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659088" comment="libfreebl3-hmac-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659105" comment="libsoftokn3-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659090" comment="libsoftokn3-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659106" comment="libsoftokn3-hmac-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659092" comment="libsoftokn3-hmac-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659107" comment="mozilla-nss-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659094" comment="mozilla-nss-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659108" comment="mozilla-nss-certs-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659096" comment="mozilla-nss-certs-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659109" comment="mozilla-nss-sysinit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659099" comment="mozilla-nss-sysinit-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659110" comment="mozilla-nss-tools-3.68.1-58.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152554" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190975" ref_url="https://bugzilla.suse.com/1190975" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<description>
This update for openssh fixes the following issues:
  
- CVE-2021-41617: Fixed privilege escalation when AuthorizedKeysCommand/AuthorizedPrincipalsCommand are configured (bsc#1190975).  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190975">SUSE bug 1190975</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41617">CVE-2021-41617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658348" comment="openssh-7.2p2-74.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658349" comment="openssh-askpass-gnome-7.2p2-74.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658350" comment="openssh-fips-7.2p2-74.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658351" comment="openssh-helpers-7.2p2-74.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152555" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193321" ref_url="https://bugzilla.suse.com/1193321" source="BUGZILLA"/>
		<reference ref_id="1193485" ref_url="https://bugzilla.suse.com/1193485" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:
                                                                                                                    
Update to Extended Support Release 91.4.0 (bsc#1193485):                                                            
                                                                                                                    
- CVE-2021-43536: URL leakage when navigating while executing asynchronous function
- CVE-2021-43537: Heap buffer overflow when using structured clone                         
- CVE-2021-43538: Missing fullscreen and pointer lock notification when requesting both
- CVE-2021-43539: GC rooting failure when calling wasm instance methods 
- CVE-2021-43541: External protocol handler parameters were unescaped                                                  
- CVE-2021-43542: XMLHttpRequest error codes could have leaked the existence of an external protocol handler           
- CVE-2021-43543: Bypass of CSP sandbox directive when embedding                                                       
- CVE-2021-43545: Denial of Service when using the Location API in a loop                                              
- CVE-2021-43546: Cursor spoofing could overlay user interface when native cursor is zoomed                         
- Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4                                                       
- Removed x-scheme-handler/ftp from MozillaFirefox.desktop (bsc#1193321)                                            
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-12"/>
	<updated date="2021-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193321">SUSE bug 1193321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43536">CVE-2021-43536 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43537">CVE-2021-43537 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43538">CVE-2021-43538 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43539">CVE-2021-43539 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43541">CVE-2021-43541 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43542">CVE-2021-43542 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43543">CVE-2021-43543 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43545">CVE-2021-43545 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43546">CVE-2021-43546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659444" comment="MozillaFirefox-91.4.0-112.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659445" comment="MozillaFirefox-devel-91.4.0-112.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659446" comment="MozillaFirefox-translations-common-91.4.0-112.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152556" version="1" class="patch">
	<metadata>
		<title>Security update for glib-networking (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172460" ref_url="https://bugzilla.suse.com/1172460" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13645" ref_url="https://www.suse.com/security/cve/CVE-2020-13645/" source="CVE"/>
		<description>
This update for glib-networking fixes the following issues:

- CVE-2020-13645: Fixed a connection failure when the server identity is unset (bsc#1172460).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-13"/>
	<updated date="2021-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172460">SUSE bug 1172460</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13645/">CVE-2020-13645 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13645">CVE-2020-13645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659102" comment="glib-networking-2.48.2-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659084" comment="glib-networking-lang-2.48.2-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152557" version="1" class="patch">
	<metadata>
		<title>Security update for gettext-runtime (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1113719" ref_url="https://bugzilla.suse.com/1113719" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18751" ref_url="https://www.suse.com/security/cve/CVE-2018-18751/" source="CVE"/>
		<description>
This update for gettext-runtime fixes the following issues:

- CVE-2018-18751: Fixed a double free (bsc#1113719)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1113719">SUSE bug 1113719</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18751/">CVE-2018-18751 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18751">CVE-2018-18751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658360" comment="gettext-runtime-0.19.2-3.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658361" comment="gettext-runtime-32bit-0.19.2-3.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658362" comment="gettext-tools-0.19.2-3.3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152558" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193030" ref_url="https://bugzilla.suse.com/1193030" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:
 
- CVE-2021-4008: Fixed Privilege Escalation Vulnerability via Out-Of-Bounds Access in SProcRenderCompositeGlyphs (bsc#1193030).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193030">SUSE bug 1193030</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4008">CVE-2021-4008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659889" comment="xorg-x11-server-7.6_1.18.3-76.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659890" comment="xorg-x11-server-extra-7.6_1.18.3-76.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152559" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<description>
This update for log4j fixes the following issue:

- CVE-2021-4104: Disable the JMSAppender class from log4j to protect against
  the log4jshell vulnerability. [bsc#1193662]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-17"/>
	<updated date="2021-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">CVE-2021-4104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660148" comment="log4j-1.2.15-126.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152560" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190487" ref_url="https://bugzilla.suse.com/1190487" source="BUGZILLA"/>
		<reference ref_id="1190489" ref_url="https://bugzilla.suse.com/1190489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009/" source="CVE"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4009: The handler for the CreatePointerBarrier request of the XFixes 
  extension does not properly validate the request length leading to out of 
  bounds memory write. (bsc#1190487)
- CVE-2021-4011: The handlers for the RecordCreateContext and RecordRegisterClients
  requests of the Record extension do not properly validate the request
  length leading to out of bounds memory write. (bsc#1190489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-20"/>
	<updated date="2021-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190487">SUSE bug 1190487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4009">CVE-2021-4009 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4011">CVE-2021-4011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660798" comment="xorg-x11-server-7.6_1.18.3-76.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660799" comment="xorg-x11-server-extra-7.6_1.18.3-76.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152561" version="1" class="patch">
	<metadata>
		<title>Recommended update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192849" ref_url="https://bugzilla.suse.com/1192849" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

The username map advice from the CVE-2020-25717 advisory
note has undesired side effects for the local nt token. Fallback
to a SID/UID based mapping if the name based lookup fails (bsc#1192849).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-20"/>
	<updated date="2021-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192849">SUSE bug 1192849</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25717">CVE-2020-25717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660811" comment="libdcerpc-binding0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660812" comment="libdcerpc-binding0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660813" comment="libdcerpc0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660814" comment="libdcerpc0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660815" comment="libndr-krb5pac0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660816" comment="libndr-krb5pac0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660817" comment="libndr-nbt0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660818" comment="libndr-nbt0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660819" comment="libndr-standard0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660820" comment="libndr-standard0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660821" comment="libndr0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660822" comment="libndr0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660823" comment="libnetapi0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660824" comment="libnetapi0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660825" comment="libsamba-credentials0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660826" comment="libsamba-credentials0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660827" comment="libsamba-errors0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660828" comment="libsamba-errors0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660829" comment="libsamba-hostconfig0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660830" comment="libsamba-hostconfig0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660831" comment="libsamba-passdb0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660832" comment="libsamba-passdb0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660833" comment="libsamba-util0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660834" comment="libsamba-util0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660835" comment="libsamdb0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660836" comment="libsamdb0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660837" comment="libsmbclient0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660838" comment="libsmbclient0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660839" comment="libsmbconf0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660840" comment="libsmbconf0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660841" comment="libsmbldap0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660842" comment="libsmbldap0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660843" comment="libtevent-util0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660844" comment="libtevent-util0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660845" comment="libwbclient0-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660846" comment="libwbclient0-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660847" comment="samba-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660848" comment="samba-client-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660849" comment="samba-client-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660850" comment="samba-doc-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660851" comment="samba-libs-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660852" comment="samba-libs-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660853" comment="samba-winbind-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660854" comment="samba-winbind-32bit-4.6.16+git.313.502515a5bfc-3.67.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152562" version="1" class="patch">
	<metadata>
		<title>Security update for chrony (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1063704" ref_url="https://bugzilla.suse.com/1063704" source="BUGZILLA"/>
		<reference ref_id="1069468" ref_url="https://bugzilla.suse.com/1069468" source="BUGZILLA"/>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1083597" ref_url="https://bugzilla.suse.com/1083597" source="BUGZILLA"/>
		<reference ref_id="1099272" ref_url="https://bugzilla.suse.com/1099272" source="BUGZILLA"/>
		<reference ref_id="1115529" ref_url="https://bugzilla.suse.com/1115529" source="BUGZILLA"/>
		<reference ref_id="1128846" ref_url="https://bugzilla.suse.com/1128846" source="BUGZILLA"/>
		<reference ref_id="1156884" ref_url="https://bugzilla.suse.com/1156884" source="BUGZILLA"/>
		<reference ref_id="1159840" ref_url="https://bugzilla.suse.com/1159840" source="BUGZILLA"/>
		<reference ref_id="1161119" ref_url="https://bugzilla.suse.com/1161119" source="BUGZILLA"/>
		<reference ref_id="1162964" ref_url="https://bugzilla.suse.com/1162964" source="BUGZILLA"/>
		<reference ref_id="1171806" ref_url="https://bugzilla.suse.com/1171806" source="BUGZILLA"/>
		<reference ref_id="1172113" ref_url="https://bugzilla.suse.com/1172113" source="BUGZILLA"/>
		<reference ref_id="1173277" ref_url="https://bugzilla.suse.com/1173277" source="BUGZILLA"/>
		<reference ref_id="1173760" ref_url="https://bugzilla.suse.com/1173760" source="BUGZILLA"/>
		<reference ref_id="1174075" ref_url="https://bugzilla.suse.com/1174075" source="BUGZILLA"/>
		<reference ref_id="1174911" ref_url="https://bugzilla.suse.com/1174911" source="BUGZILLA"/>
		<reference ref_id="1180689" ref_url="https://bugzilla.suse.com/1180689" source="BUGZILLA"/>
		<reference ref_id="1181826" ref_url="https://bugzilla.suse.com/1181826" source="BUGZILLA"/>
		<reference ref_id="1183783" ref_url="https://bugzilla.suse.com/1183783" source="BUGZILLA"/>
		<reference ref_id="1184400" ref_url="https://bugzilla.suse.com/1184400" source="BUGZILLA"/>
		<reference ref_id="1187906" ref_url="https://bugzilla.suse.com/1187906" source="BUGZILLA"/>
		<reference ref_id="1190926" ref_url="https://bugzilla.suse.com/1190926" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14367" ref_url="https://www.suse.com/security/cve/CVE-2020-14367/" source="CVE"/>
		<description>
This update for chrony fixes the following issues:

Chrony was updated to 4.1:

* Add support for NTS servers specified by IP address (matching
  Subject Alternative Name in server certificate)
* Add source-specific configuration of trusted certificates
* Allow multiple files and directories with trusted certificates
* Allow multiple pairs of server keys and certificates
* Add copy option to server/pool directive
* Increase PPS lock limit to 40% of pulse interval
* Perform source selection immediately after loading dump files
* Reload dump files for addresses negotiated by NTS-KE server
* Update seccomp filter and add less restrictive level
* Restart ongoing name resolution on online command
* Fix dump files to not include uncorrected offset
* Fix initstepslew to accept time from own NTP clients
* Reset NTP address and port when no longer negotiated by NTS-KE
  server
- Update clknetsim to snapshot f89702d.

- Ensure the correct pool packages are installed for openSUSE and SLE (bsc#1180689).

- Enable syscallfilter unconditionally (bsc#1181826).

Chrony was updated to 4.0:

Enhancements

- Add support for Network Time Security (NTS) authentication
- Add support for AES-CMAC keys (AES128, AES256) with Nettle
- Add authselectmode directive to control selection of
  unauthenticated sources
- Add binddevice, bindacqdevice, bindcmddevice directives
- Add confdir directive to better support fragmented
  configuration
- Add sourcedir directive and 'reload sources' command to
  support dynamic NTP sources specified in files
- Add clockprecision directive
- Add dscp directive to set Differentiated Services Code Point
  (DSCP)
- Add -L option to limit log messages by severity
- Add -p option to print whole configuration with included
  files
- Add -U option to allow start under non-root user
- Allow maxsamples to be set to 1 for faster update with -q/-Q
  option
- Avoid replacing NTP sources with sources that have
  unreachable address
- Improve pools to repeat name resolution to get 'maxsources'
  sources
- Improve source selection with trusted sources
- Improve NTP loop test to prevent synchronisation to itself
- Repeat iburst when NTP source is switched from offline state
  to online
- Update clock synchronisation status and leap status more
  frequently
- Update seccomp filter
- Add 'add pool' command
- Add 'reset sources' command to drop all measurements
- Add authdata command to print details about NTP
  authentication
- Add selectdata command to print details about source
  selection
- Add -N option and sourcename command to print original names
  of sources
- Add -a option to some commands to print also unresolved
  sources
- Add -k, -p, -r options to clients command to select, limit,
  reset data
- Bug fixes
- Don’t set interface for NTP responses to allow asymmetric
  routing
- Handle RTCs that don’t support interrupts
- Respond to command requests with correct address on
  multihomed hosts
- Removed features
- Drop support for RIPEMD keys (RMD128, RMD160, RMD256, RMD320)
- Drop support for long (non-standard) MACs in NTPv4 packets
  (chrony 2.x clients using non-MD5/SHA1 keys need to use
  option 'version 3')

- By default we don't write log files but log to journald, so
  only recommend logrotate.

- Adjust and rename the sysconfig file, so that it matches the
  expectations of chronyd.service (bsc#1173277).

Chrony was updated to 3.5.1:

* Create new file when writing pidfile (CVE-2020-14367, bsc#1174911)

- Add chrony-pool-suse and chrony-pool-openSUSE subpackages that
  preconfigure chrony to use NTP servers from the  respective
  pools for SUSE and openSUSE (bsc#1156884, SLE-11424).
- Add chrony-pool-empty to still allow installing chrony without
  preconfigured servers.
- Use iburst in the default pool statements to speed up initial
  synchronisation (bsc#1172113).

- Update clknetsim to version 79ffe44 (fixes bsc#1162964).

Update to 3.5:

+ Add support for more accurate reading of PHC on Linux 5.0
+ Add support for hardware timestamping on interfaces with read-only timestamping configuration
+ Add support for memory locking and real-time priority on FreeBSD, NetBSD, Solaris
+ Update seccomp filter to work on more architectures
+ Validate refclock driver options
+ Fix bindaddress directive on FreeBSD
+ Fix transposition of hardware RX timestamp on Linux 4.13 and later
+ Fix building on non-glibc systems

- Fix location of helper script in chrony-dnssrv@.service (bsc#1128846).

- Read runtime servers from /var/run/netconfig/chrony.servers (bsc#1099272)
- Move chrony-helper to /usr/lib/chrony/helper, because there should be no executables in /usr/share.
- Remove discrepancies between spec file and chrony-tmpfiles (bsc#1115529) 

Update to version 3.4

* Enhancements

  + Add filter option to server/pool/peer directive
  + Add minsamples and maxsamples options to hwtimestamp directive
  + Add support for faster frequency adjustments in Linux 4.19
  + Change default pidfile to /var/run/chrony/chronyd.pid to allow chronyd 
    without root privileges to remove it on exit
  + Disable sub-second polling intervals for distant NTP sources
  + Extend range of supported sub-second polling intervals
  + Get/set IPv4 destination/source address of NTP packets on FreeBSD
  + Make burst options and command useful with short polling intervals
  + Modify auto_offline option to activate when sending request failed
  + Respond from interface that received NTP request if possible
  + Add onoffline command to switch between online and offline state 
    according to current system network configuration
  + Improve example NetworkManager dispatcher script

* Bug fixes

  + Avoid waiting in Linux getrandom system call
  + Fix PPS support on FreeBSD and NetBSD

Update to version 3.3

* Enhancements:

  + Add burst option to server/pool directive
  + Add stratum and tai options to refclock directive
  + Add support for Nettle crypto library
  + Add workaround for missing kernel receive timestamps on Linux
  + Wait for late hardware transmit timestamps
  + Improve source selection with unreachable sources
  + Improve protection against replay attacks on symmetric mode
  + Allow PHC refclock to use socket in /var/run/chrony
  + Add shutdown command to stop chronyd
  + Simplify format of response to manual list command
  + Improve handling of unknown responses in chronyc

* Bug fixes:

  + Respond to NTPv1 client requests with zero mode
  + Fix -x option to not require CAP_SYS_TIME under non-root user
  + Fix acquisitionport directive to work with privilege separation
  + Fix handling of socket errors on Linux to avoid high CPU usage
  + Fix chronyc to not get stuck in infinite loop after clock step

- Added /etc/chrony.d/ directory to the package (bsc#1083597) Modifed default chrony.conf to add 'include /etc/chrony.d/*'

- Enable pps support

Upgraded to version 3.2:

Enhancements

* Improve stability with NTP sources and reference clocks
* Improve stability with hardware timestamping
* Improve support for NTP interleaved modes
* Control frequency of system clock on macOS 10.13 and later
* Set TAI-UTC offset of system clock with leapsectz directive
* Minimise data in client requests to improve privacy
* Allow transmit-only hardware timestamping
* Add support for new timestamping options introduced in Linux 4.13
* Add root delay, root dispersion and maximum error to tracking log
* Add mindelay and asymmetry options to server/peer/pool directive
* Add extpps option to PHC refclock to timestamp external PPS signal
* Add pps option to refclock directive to treat any refclock as PPS
* Add width option to refclock directive to filter wrong pulse edges
* Add rxfilter option to hwtimestamp directive
* Add -x option to disable control of system clock
* Add -l option to log to specified file instead of syslog
* Allow multiple command-line options to be specified together
* Allow starting without root privileges with -Q option
* Update seccomp filter for new glibc versions
* Dump history on exit by default with dumpdir directive
* Use hardening compiler options by default

Bug fixes

* Don't drop PHC samples with low-resolution system clock
* Ignore outliers in PHC tracking, RTC tracking, manual input
* Increase polling interval when peer is not responding
* Exit with error message when include directive fails
* Don't allow slash after hostname in allow/deny directive/command
* Try to connect to all addresses in chronyc before giving up

Upgraded to version 3.1:

- Enhancements

  - Add support for precise cross timestamping of PHC on Linux
  - Add minpoll, precision, nocrossts options to hwtimestamp directive
  - Add rawmeasurements option to log directive and modify measurements
    option to log only valid measurements from synchronised sources
  - Allow sub-second polling interval with NTP sources

- Bug fixes

  - Fix time smoothing in interleaved mode

Upgraded to version 3.0:

- Enhancements

  - Add support for software and hardware timestamping on Linux
  - Add support for client/server and symmetric interleaved modes
  - Add support for MS-SNTP authentication in Samba
  - Add support for truncated MACs in NTPv4 packets
  - Estimate and correct for asymmetric network jitter
  - Increase default minsamples and polltarget to improve stability with very low jitter
  - Add maxjitter directive to limit source selection by jitter
  - Add offset option to server/pool/peer directive
  - Add maxlockage option to refclock directive
  - Add -t option to chronyd to exit after specified time
  - Add partial protection against replay attacks on symmetric mode
  - Don't reset polling interval when switching sources to online state
  - Allow rate limiting with very short intervals
  - Improve maximum server throughput on Linux and NetBSD
  - Remove dump files after start
  - Add tab-completion to chronyc with libedit/readline
  - Add ntpdata command to print details about NTP measurements
  - Allow all source options to be set in add server/peer command
  - Indicate truncated addresses/hostnames in chronyc output
  - Print reference IDs as hexadecimal numbers to avoid confusion with IPv4 addresses

- Bug fixes

  - Fix crash with disabled asynchronous name resolving

Upgraded to version 2.4.1:

- Bug fixes

  - Fix processing of kernel timestamps on non-Linux systems
  - Fix crash with smoothtime directive
  - Fix validation of refclock sample times
  - Fix parsing of refclock directive

update to 2.4:

- Enhancements

  - Add orphan option to local directive for orphan mode
    compatible with ntpd
  - Add distance option to local directive to set activation
    threshold (1 second by default)
  - Add maxdrift directive to set maximum allowed drift of system
    clock
  - Try to replace NTP sources exceeding maximum distance
  - Randomise source replacement to avoid getting stuck with bad
    sources
  - Randomise selection of sources from pools on start
  - Ignore reference timestamp as ntpd doesn't always set it
    correctly
  - Modify tracking report to use same values as seen by NTP
    clients
  - Add -c option to chronyc to write reports in CSV format
  - Provide detailed manual pages

- Bug fixes

  - Fix SOCK refclock to work correctly when not specified as
    last refclock
  - Fix initstepslew and -q/-Q options to accept time from own
    NTP clients
  - Fix authentication with keys using 512-bit hash functions
  - Fix crash on exit when multiple signals are received
  - Fix conversion of very small floating-point numbers in
    command packets
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1063704">SUSE bug 1063704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069468">SUSE bug 1069468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083597">SUSE bug 1083597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099272">SUSE bug 1099272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115529">SUSE bug 1115529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128846">SUSE bug 1128846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156884">SUSE bug 1156884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159840">SUSE bug 1159840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161119">SUSE bug 1161119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162964">SUSE bug 1162964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171806">SUSE bug 1171806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172113">SUSE bug 1172113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173277">SUSE bug 1173277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173760">SUSE bug 1173760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174075">SUSE bug 1174075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174911">SUSE bug 1174911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180689">SUSE bug 1180689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181826">SUSE bug 1181826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183783">SUSE bug 1183783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184400">SUSE bug 1184400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187906">SUSE bug 1187906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190926">SUSE bug 1190926</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14367/">CVE-2020-14367 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14367">CVE-2020-14367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659981" comment="chrony-4.1-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152563" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176315" ref_url="https://bugzilla.suse.com/1176315" source="BUGZILLA"/>
		<reference ref_id="1184783" ref_url="https://bugzilla.suse.com/1184783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507/" source="CVE"/>
		<reference ref_id="CVE-2021-3481" ref_url="https://www.suse.com/security/cve/CVE-2021-3481/" source="CVE"/>
		<description>
This update for libqt4 fixes the following issues:

- CVE-2021-3481: Fixed out of bounds read in QRadialFetchSimd() from
  crafted svg file (bsc#1184783).
- CVE-2020-17507: Fixed buffer over-read in read_xbm_body() (bsc#1176315).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176315">SUSE bug 1176315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184783">SUSE bug 1184783</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17507">CVE-2020-17507 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3481/">CVE-2021-3481 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3481">CVE-2021-3481 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659974" comment="libqt4-4.8.7-8.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659954" comment="libqt4-32bit-4.8.7-8.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659975" comment="libqt4-qt3support-4.8.7-8.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659956" comment="libqt4-qt3support-32bit-4.8.7-8.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659976" comment="libqt4-sql-4.8.7-8.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659958" comment="libqt4-sql-32bit-4.8.7-8.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659977" comment="libqt4-sql-mysql-4.8.7-8.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659978" comment="libqt4-sql-sqlite-4.8.7-8.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659979" comment="libqt4-x11-4.8.7-8.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659962" comment="libqt4-x11-32bit-4.8.7-8.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659980" comment="qt4-x11-tools-4.8.7-8.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152564" version="1" class="patch">
	<metadata>
		<title>Security update for libvpx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1166066" ref_url="https://bugzilla.suse.com/1166066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0034" ref_url="https://www.suse.com/security/cve/CVE-2020-0034/" source="CVE"/>
		<description>
This update for libvpx fixes the following issues:

- CVE-2020-0034: Fixed out-of-bounds read on truncated key frames (bsc#1166066)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1166066">SUSE bug 1166066</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0034/">CVE-2020-0034 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0034">CVE-2020-0034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660151" comment="libvpx1-1.3.0-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152565" version="1" class="patch">
	<metadata>
		<title>Security update for python36 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<description>
This update for python36 fixes the following issues:

- buffer overflow in PyCArg_repr in _ctypes/callproc.c,
  which may lead to remote code execution (bsc#1181126, CVE-2021-3177).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557774" comment="libpython3_6m1_0-3.6.12-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557775" comment="python36-3.6.12-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557776" comment="python36-base-3.6.12-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557777" comment="python36-curses-3.6.12-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557778" comment="python36-dbm-3.6.12-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557779" comment="python36-devel-3.6.12-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557780" comment="python36-doc-3.6.12-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557781" comment="python36-idle-3.6.12-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557782" comment="python36-testsuite-3.6.12-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557783" comment="python36-tk-3.6.12-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557784" comment="python36-tools-3.6.12-6.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152566" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181848" ref_url="https://bugzilla.suse.com/1181848" source="BUGZILLA"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.7.1 ESR (bsc#1181848)

- Fixed: Prevent access to NTFS special paths that could lead to filesystem corruption. 
- Buffer overflow in depth pitch calculations for compressed textures 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1181848">SUSE bug 1181848</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557785" comment="MozillaFirefox-78.7.1-112.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557786" comment="MozillaFirefox-devel-78.7.1-112.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557787" comment="MozillaFirefox-translations-common-78.7.1-112.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152567" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- buffer overflow in PyCArg_repr in _ctypes/callproc.c,
  which may lead to remote code execution (bsc#1181126, CVE-2021-3177).
- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-11"/>
	<updated date="2021-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531872" comment="libpython2_7-1_0-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531873" comment="libpython2_7-1_0-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531874" comment="python-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531875" comment="python-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531876" comment="python-base-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531877" comment="python-base-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531878" comment="python-curses-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531879" comment="python-demo-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531880" comment="python-devel-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531881" comment="python-doc-2.7.17-28.64.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531882" comment="python-doc-pdf-2.7.17-28.64.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531883" comment="python-gdbm-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531884" comment="python-idle-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531885" comment="python-tk-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531886" comment="python-xml-2.7.17-28.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152568" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181742" ref_url="https://bugzilla.suse.com/1181742" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35498" ref_url="https://www.suse.com/security/cve/CVE-2020-35498/" source="CVE"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2020-35498: Fixed a denial of service related to the handling of Ethernet padding (bsc#1181742).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-12"/>
	<updated date="2021-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181742">SUSE bug 1181742</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35498/">CVE-2020-35498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35498">CVE-2020-35498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009555936" comment="openvswitch-2.7.12-3.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152569" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1150934" ref_url="https://bugzilla.suse.com/1150934" source="BUGZILLA"/>
		<reference ref_id="1181777" ref_url="https://bugzilla.suse.com/1181777" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16275" ref_url="https://www.suse.com/security/cve/CVE-2019-16275/" source="CVE"/>
		<reference ref_id="CVE-2021-0326" ref_url="https://www.suse.com/security/cve/CVE-2021-0326/" source="CVE"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-0326: P2P group information processing vulnerability (bsc#1181777).
- CVE-2019-16275: AP mode PMF disconnection protection bypass (bsc#1150934)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-15"/>
	<updated date="2021-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150934">SUSE bug 1150934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181777">SUSE bug 1181777</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16275/">CVE-2019-16275 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16275">CVE-2019-16275 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0326/">CVE-2021-0326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0326">CVE-2021-0326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531899" comment="wpa_supplicant-2.6-15.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152570" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179748" ref_url="https://bugzilla.suse.com/1179748" source="BUGZILLA"/>
		<reference ref_id="1181483" ref_url="https://bugzilla.suse.com/1181483" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- bsc#1179748 CVE-2020-27828: Fix heap overflow by checking maxrlvls
- bsc#1181483 CVE-2021-3272: Fix buffer over-read in jp2_decode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179748">SUSE bug 1179748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181483">SUSE bug 1181483</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27828">CVE-2020-27828 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3272">CVE-2021-3272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531900" comment="libjasper1-1.900.14-195.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531901" comment="libjasper1-32bit-1.900.14-195.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152571" version="1" class="patch">
	<metadata>
		<title>Security update for screen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182092" ref_url="https://bugzilla.suse.com/1182092" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26937" ref_url="https://www.suse.com/security/cve/CVE-2021-26937/" source="CVE"/>
		<description>
This update for screen fixes the following issues:

- CVE-2021-26937: Fixed double width combining char handling that could lead to a denial of service or code execution (bsc#1182092).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-17"/>
	<updated date="2021-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182092">SUSE bug 1182092</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26937/">CVE-2021-26937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26937">CVE-2021-26937 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531902" comment="screen-4.0.4-23.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152572" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182246" ref_url="https://bugzilla.suse.com/1182246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy
  negotiation can be targeted by a buffer overflow attack [bsc#1182246, CVE-2020-8625]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182246">SUSE bug 1182246</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8625">CVE-2020-8625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531903" comment="bind-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531904" comment="bind-chrootenv-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531905" comment="bind-doc-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531906" comment="bind-libs-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531907" comment="bind-libs-32bit-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531908" comment="bind-utils-9.9.9P1-63.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152573" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 80
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27221">CVE-2020-27221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531909" comment="java-1_7_1-ibm-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531910" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531911" comment="java-1_7_1-ibm-devel-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531912" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531913" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.80-38.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152574" version="1" class="patch">
	<metadata>
		<title>Security update for krb5-appl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1131109" ref_url="https://bugzilla.suse.com/1131109" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25017" ref_url="https://www.suse.com/security/cve/CVE-2019-25017/" source="CVE"/>
		<reference ref_id="CVE-2019-25018" ref_url="https://www.suse.com/security/cve/CVE-2019-25018/" source="CVE"/>
		<description>
This update for krb5-appl fixes the following issues:

- CVE-2019-25017: Check the filenames sent by the server match those requested by the client (bsc#1131109).
- CVE-2019-25018: Disallow empty incoming filename or ones that refer to the current directory (bsc#1131109).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131109">SUSE bug 1131109</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25017/">CVE-2019-25017 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25017">CVE-2019-25017 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25018/">CVE-2019-25018 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25018">CVE-2019-25018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531914" comment="krb5-appl-clients-1.0.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531915" comment="krb5-appl-servers-1.0.3-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152575" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179322" ref_url="https://bugzilla.suse.com/1179322" source="BUGZILLA"/>
		<reference ref_id="1181836" ref_url="https://bugzilla.suse.com/1181836" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767/" source="CVE"/>
		<reference ref_id="CVE-2021-20176" ref_url="https://www.suse.com/security/cve/CVE-2021-20176/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20176: Fixed an issue where processing a crafted file could lead to division by zero (bsc#1181836).
- CVE-2020-27767: outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181836">SUSE bug 1181836</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27767">CVE-2020-27767 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20176/">CVE-2021-20176 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20176">CVE-2021-20176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557788" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.159.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557789" comment="ImageMagick-config-6-upstream-6.8.8.1-71.159.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557790" comment="libMagickCore-6_Q16-1-6.8.8.1-71.159.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557791" comment="libMagickWand-6_Q16-1-6.8.8.1-71.159.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152576" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u282 (icedtea 3.18.0)
  * January 2021 CPU (bsc#1181239)
  * Security fixes
    + JDK-8247619: Improve Direct Buffering of Characters (CVE-2020-14803)
  * Import of OpenJDK 8 u282 build 01
    + JDK-6962725: Regtest javax/swing/JFileChooser/6738668/
      /bug6738668.java fails under Linux
    + JDK-8025936: Windows .pdb and .map files does not have proper
      dependencies setup
    + JDK-8030350: Enable additional compiler warnings for GCC
    + JDK-8031423: Test java/awt/dnd/DisposeFrameOnDragCrash/
      /DisposeFrameOnDragTest.java fails by Timeout on Windows
    + JDK-8036122: Fix warning 'format not a string literal'
    + JDK-8051853: new
      URI('x/').resolve('..').getSchemeSpecificPart() returns null!
    + JDK-8132664: closed/javax/swing/DataTransfer/DefaultNoDrop/
      /DefaultNoDrop.java locks on Windows
    + JDK-8134632: Mark javax/sound/midi/Devices/
      /InitializationHang.java as headful
    + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'
      treated by JVM as an equivalent
    + JDK-8148916: Mark bug6400879.java as intermittently failing
    + JDK-8148983: Fix extra comma in changes for JDK-8148916
    + JDK-8160438: javax/swing/plaf/nimbus/8057791/bug8057791.java
      fails
    + JDK-8165808: Add release barriers when allocating objects
      with concurrent collection
    + JDK-8185003: JMX: Add a version of
      ThreadMXBean.dumpAllThreads with a maxDepth argument
    + JDK-8202076: test/jdk/java/io/File/WinSpecialFiles.java on
      windows with VS2017
    + JDK-8207766: [testbug] Adapt tests for Aix.
    + JDK-8212070: Introduce diagnostic flag to abort VM on failed
      JIT compilation
    + JDK-8213448: [TESTBUG] enhance jfr/jvm/TestDumpOnCrash
    + JDK-8215727: Restore JFR thread sampler loop to old /
      previous behavior
    + JDK-8220657: JFR.dump does not work when filename is set
    + JDK-8221342: [TESTBUG] Generate Dockerfile for docker testing
    + JDK-8224502: [TESTBUG] JDK docker test TestSystemMetrics.java
      fails with access issues and OOM
    + JDK-8231209: [REDO] ThreadMXBean::getThreadAllocatedBytes()
      can be quicker for self thread
    + JDK-8231968: getCurrentThreadAllocatedBytes default
      implementation s/b getThreadAllocatedBytes
    + JDK-8232114: JVM crashed at imjpapi.dll in native code
    + JDK-8234270: [REDO] JDK-8204128 NMT might report incorrect
      numbers for Compiler area
    + JDK-8234339: replace JLI_StrTok in java_md_solinux.c
    + JDK-8238448: RSASSA-PSS signature verification fail when
      using certain odd key sizes
    + JDK-8242335: Additional Tests for RSASSA-PSS
    + JDK-8244225: stringop-overflow warning on strncpy call from
      compile_the_world_in
    + JDK-8245400: Upgrade to LittleCMS 2.11
    + JDK-8248214: Add paddings for TaskQueueSuper to reduce
      false-sharing cache contention
    + JDK-8249176: Update GlobalSignR6CA test certificates
    + JDK-8250665: Wrong translation for the month name of May in
      ar_JO,LB,SY
    + JDK-8250928: JFR: Improve hash algorithm for stack traces
    + JDK-8251469: Better cleanup for
      test/jdk/javax/imageio/SetOutput.java
    + JDK-8251840: Java_sun_awt_X11_XToolkit_getDefaultScreenData
      should not be in make/mapfiles/libawt_xawt/mapfile-vers
    + JDK-8252384: [TESTBUG] Some tests refer to COMPAT provider
      rather than JRE
    + JDK-8252395: [8u] --with-native-debug-symbols=external
      doesn't include debuginfo files for binaries
    + JDK-8252497: Incorrect numeric currency code for ROL
    + JDK-8252754: Hash code calculation of JfrStackTrace is
      inconsistent
    + JDK-8252904: VM crashes when JFR is used and JFR event class
      is transformed
    + JDK-8252975: [8u] JDK-8252395 breaks the build for
      --with-native-debug-symbols=internal
    + JDK-8253284: Zero OrderAccess barrier mappings are incorrect
    + JDK-8253550: [8u] JDK-8252395 breaks the build for make
      STRIP_POLICY=no_strip
    + JDK-8253752: test/sun/management/jmxremote/bootstrap/
      /RmiBootstrapTest.java fails randomly
    + JDK-8254081: java/security/cert/PolicyNode/
      /GetPolicyQualifiers.java fails due to an expired certificate
    + JDK-8254144: Non-x86 Zero builds fail with return-type
      warning in os_linux_zero.cpp
    + JDK-8254166: Zero: return-type warning in
       zeroInterpreter_zero.cpp
    + JDK-8254683: [TEST_BUG] jdk/test/sun/tools/jconsole/
      /WorkerDeadlockTest.java fails
    + JDK-8255003: Build failures on Solaris
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531916" comment="java-1_8_0-openjdk-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531917" comment="java-1_8_0-openjdk-demo-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531918" comment="java-1_8_0-openjdk-devel-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531919" comment="java-1_8_0-openjdk-headless-1.8.0.282-27.56.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152577" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182039" ref_url="https://bugzilla.suse.com/1182039" source="BUGZILLA"/>
		<reference ref_id="1182040" ref_url="https://bugzilla.suse.com/1182040" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20229" ref_url="https://www.suse.com/security/cve/CVE-2021-20229/" source="CVE"/>
		<reference ref_id="CVE-2021-3393" ref_url="https://www.suse.com/security/cve/CVE-2021-3393/" source="CVE"/>
		<description>
This update for postgresql13 fixes the following issues:

Upgrade to version 13.2:

- Updating stored views and reindexing might be needed after applying this update.
- CVE-2021-3393, bsc#1182040: Fix information leakage in constraint-violation error messages.
- CVE-2021-20229, bsc#1182039: Fix failure to check per-column SELECT privileges in some join queries.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-22"/>
	<updated date="2021-02-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182039">SUSE bug 1182039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182040">SUSE bug 1182040</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20229/">CVE-2021-20229 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20229">CVE-2021-20229 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3393/">CVE-2021-3393 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3393">CVE-2021-3393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557792" comment="libecpg6-13.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557793" comment="libpq5-13.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557794" comment="libpq5-32bit-13.2-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152578" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180525" ref_url="https://bugzilla.suse.com/1180525" source="BUGZILLA"/>
		<description>
This update for freeradius-server fixes the following issues:

- move logrotate options into specific parts for each log as 'global' options
  will persist past and clobber global options in the main logrotate config (bsc#1180525)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-22"/>
	<updated date="2021-02-22"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1180525">SUSE bug 1180525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557795" comment="freeradius-server-3.0.15-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557796" comment="freeradius-server-doc-3.0.15-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557797" comment="freeradius-server-krb5-3.0.15-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557798" comment="freeradius-server-ldap-3.0.15-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557799" comment="freeradius-server-libs-3.0.15-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557800" comment="freeradius-server-mysql-3.0.15-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557801" comment="freeradius-server-perl-3.0.15-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557802" comment="freeradius-server-postgresql-3.0.15-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557803" comment="freeradius-server-python-3.0.15-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557804" comment="freeradius-server-sqlite-3.0.15-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557805" comment="freeradius-server-utils-3.0.15-2.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152579" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180827" ref_url="https://bugzilla.suse.com/1180827" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26720" ref_url="https://www.suse.com/security/cve/CVE-2021-26720/" source="CVE"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2021-26720: drop privileges when invoking avahi-daemon-check-dns.sh (bsc#1180827)
- Add sudo to requires: used to drop privileges.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-23"/>
	<updated date="2021-02-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180827">SUSE bug 1180827</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26720/">CVE-2021-26720 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26720">CVE-2021-26720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557806" comment="avahi-0.6.32-32.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557807" comment="avahi-lang-0.6.32-32.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557808" comment="avahi-utils-0.6.32-32.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557809" comment="libavahi-client3-0.6.32-32.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557810" comment="libavahi-client3-32bit-0.6.32-32.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557811" comment="libavahi-common3-0.6.32-32.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557812" comment="libavahi-common3-32bit-0.6.32-32.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557813" comment="libavahi-core7-0.6.32-32.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557814" comment="libavahi-glib1-0.6.32-32.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557815" comment="libavahi-glib1-32bit-0.6.32-32.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557816" comment="libdns_sd-0.6.32-32.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557817" comment="libdns_sd-32bit-0.6.32-32.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152580" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180947" ref_url="https://bugzilla.suse.com/1180947" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-24122" ref_url="https://www.suse.com/security/cve/CVE-2021-24122/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2021-24122: Added logging if file access is blocked due to symlinks (bsc#1180947).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180947">SUSE bug 1180947</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24122/">CVE-2021-24122 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24122">CVE-2021-24122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557818" comment="tomcat-8.0.53-29.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557819" comment="tomcat-admin-webapps-8.0.53-29.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557820" comment="tomcat-docs-webapp-8.0.53-29.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557821" comment="tomcat-el-3_0-api-8.0.53-29.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557822" comment="tomcat-javadoc-8.0.53-29.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557823" comment="tomcat-jsp-2_3-api-8.0.53-29.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557824" comment="tomcat-lib-8.0.53-29.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557825" comment="tomcat-servlet-3_1-api-8.0.53-29.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557826" comment="tomcat-webapps-8.0.53-29.43.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152581" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql-jdbc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172746" ref_url="https://bugzilla.suse.com/1172746" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13692" ref_url="https://www.suse.com/security/cve/CVE-2020-13692/" source="CVE"/>
		<description>
This update for postgresql-jdbc fixes the following issues:

- CVE-2020-13692: Fixed a XML External Entity vulnerability (bsc#1172746) .
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172746">SUSE bug 1172746</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13692/">CVE-2020-13692 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13692">CVE-2020-13692 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557827" comment="postgresql-jdbc-9.4-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152582" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182325" ref_url="https://bugzilla.suse.com/1182325" source="BUGZILLA"/>
		<reference ref_id="1182336" ref_url="https://bugzilla.suse.com/1182336" source="BUGZILLA"/>
		<reference ref_id="1182337" ref_url="https://bugzilla.suse.com/1182337" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20243" ref_url="https://www.suse.com/security/cve/CVE-2021-20243/" source="CVE"/>
		<reference ref_id="CVE-2021-20244" ref_url="https://www.suse.com/security/cve/CVE-2021-20244/" source="CVE"/>
		<reference ref_id="CVE-2021-20246" ref_url="https://www.suse.com/security/cve/CVE-2021-20246/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

_ CVE-2021-20243 [bsc#1182336]: Division by zero in GetResizeFilterWeight in MagickCore/resize.c
_ CVE-2021-20244 [bsc#1182325]: Division by zero in ImplodeImage in MagickCore/visual-effects.c
_ CVE-2021-20246 [bsc#1182337]: Division by zero in ScaleResampleFilter in MagickCore/resample.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182325">SUSE bug 1182325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182336">SUSE bug 1182336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182337">SUSE bug 1182337</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20243/">CVE-2021-20243 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20243">CVE-2021-20243 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20244/">CVE-2021-20244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20244">CVE-2021-20244 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20246/">CVE-2021-20246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20246">CVE-2021-20246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557828" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.162.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557829" comment="ImageMagick-config-6-upstream-6.8.8.1-71.162.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557830" comment="libMagickCore-6_Q16-1-6.8.8.1-71.162.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557831" comment="libMagickWand-6_Q16-1-6.8.8.1-71.162.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152583" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 25
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27221">CVE-2020-27221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531920" comment="java-1_8_0-ibm-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531921" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531922" comment="java-1_8_0-ibm-devel-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531923" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.25-30.81.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152584" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182357" ref_url="https://bugzilla.suse.com/1182357" source="BUGZILLA"/>
		<reference ref_id="1182614" ref_url="https://bugzilla.suse.com/1182614" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.8.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2021-08 (bsc#1182614)
  * CVE-2021-23969: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23968: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23973: MediaError message property could have leaked information about cross-origin resources
  * CVE-2021-23978: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182357">SUSE bug 1182357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23968">CVE-2021-23968 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23969">CVE-2021-23969 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23973">CVE-2021-23973 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23978">CVE-2021-23978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531925" comment="MozillaFirefox-78.8.0-112.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531926" comment="MozillaFirefox-devel-78.8.0-112.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531927" comment="MozillaFirefox-translations-common-78.8.0-112.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152585" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182066" ref_url="https://bugzilla.suse.com/1182066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242/" source="CVE"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-36242: Using the Fernet class to symmetrically encrypt multi gigabyte
  values could result in an integer overflow and buffer overflow (bsc#1182066).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182066">SUSE bug 1182066</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36242">CVE-2020-36242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531928" comment="python-cryptography-2.1.4-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531929" comment="python3-cryptography-2.1.4-7.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152586" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1175970" ref_url="https://bugzilla.suse.com/1175970" source="BUGZILLA"/>
		<reference ref_id="1176711" ref_url="https://bugzilla.suse.com/1176711" source="BUGZILLA"/>
		<reference ref_id="1177883" ref_url="https://bugzilla.suse.com/1177883" source="BUGZILLA"/>
		<reference ref_id="1179264" ref_url="https://bugzilla.suse.com/1179264" source="BUGZILLA"/>
		<reference ref_id="1179265" ref_url="https://bugzilla.suse.com/1179265" source="BUGZILLA"/>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="1182262" ref_url="https://bugzilla.suse.com/1182262" source="BUGZILLA"/>
		<reference ref_id="1182263" ref_url="https://bugzilla.suse.com/1182263" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<description>
This update for grub2 fixes the following issues:

grub2 now implements the new 'SBAT' method for SHIM based secure boot revocation. (bsc#1182057)

Following security issues are fixed that can violate secure boot constraints:

- CVE-2020-25632: Fixed a use-after-free in rmmod command (bsc#1176711)
- CVE-2020-25647: Fixed an out-of-bound write in grub_usb_device_initialize() (bsc#1177883)
- CVE-2020-27749: Fixed a stack buffer overflow in grub_parser_split_cmdline (bsc#1179264)
- CVE-2020-27779, CVE-2020-14372: Disallow cutmem and acpi commands in secure boot mode (bsc#1179265 bsc#1175970)
- CVE-2021-20225: Fixed a heap out-of-bounds write in short form option parser (bsc#1182262)
- CVE-2021-20233: Fixed a heap out-of-bound write due to mis-calculation of space required for quoting (bsc#1182263)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175970">SUSE bug 1175970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176711">SUSE bug 1176711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177883">SUSE bug 1177883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179264">SUSE bug 1179264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179265">SUSE bug 1179265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182262">SUSE bug 1182262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182263">SUSE bug 1182263</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14372">CVE-2020-14372 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25632">CVE-2020-25632 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25647">CVE-2020-25647 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27749">CVE-2020-27749 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27779">CVE-2020-27779 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20225">CVE-2021-20225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20233">CVE-2021-20233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009555941" comment="grub2-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539120" comment="grub2-i386-pc-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539122" comment="grub2-snapper-plugin-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539123" comment="grub2-systemd-sleep-plugin-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539124" comment="grub2-x86_64-efi-2.02-4.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539125" comment="grub2-x86_64-xen-2.02-4.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152587" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182279" ref_url="https://bugzilla.suse.com/1182279" source="BUGZILLA"/>
		<reference ref_id="1182408" ref_url="https://bugzilla.suse.com/1182408" source="BUGZILLA"/>
		<reference ref_id="1182411" ref_url="https://bugzilla.suse.com/1182411" source="BUGZILLA"/>
		<reference ref_id="1182412" ref_url="https://bugzilla.suse.com/1182412" source="BUGZILLA"/>
		<reference ref_id="1182413" ref_url="https://bugzilla.suse.com/1182413" source="BUGZILLA"/>
		<reference ref_id="1182415" ref_url="https://bugzilla.suse.com/1182415" source="BUGZILLA"/>
		<reference ref_id="1182416" ref_url="https://bugzilla.suse.com/1182416" source="BUGZILLA"/>
		<reference ref_id="1182417" ref_url="https://bugzilla.suse.com/1182417" source="BUGZILLA"/>
		<reference ref_id="1182418" ref_url="https://bugzilla.suse.com/1182418" source="BUGZILLA"/>
		<reference ref_id="1182419" ref_url="https://bugzilla.suse.com/1182419" source="BUGZILLA"/>
		<reference ref_id="1182420" ref_url="https://bugzilla.suse.com/1182420" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch-&gt;bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-03"/>
	<updated date="2021-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36221">CVE-2020-36221 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36222">CVE-2020-36222 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36223">CVE-2020-36223 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36224">CVE-2020-36224 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36225">CVE-2020-36225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36226">CVE-2020-36226 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36227">CVE-2020-36227 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36228">CVE-2020-36228 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36229">CVE-2020-36229 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36230">CVE-2020-36230 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27212">CVE-2021-27212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531942" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152588" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182805" ref_url="https://bugzilla.suse.com/1182805" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27803" ref_url="https://www.suse.com/security/cve/CVE-2021-27803/" source="CVE"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-27803: P2P provision discovery processing vulnerability (bsc#1182805) 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182805">SUSE bug 1182805</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27803/">CVE-2021-27803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27803">CVE-2021-27803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531951" comment="wpa_supplicant-2.6-15.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152589" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1183026" ref_url="https://bugzilla.suse.com/1183026" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21300" ref_url="https://www.suse.com/security/cve/CVE-2021-21300/" source="CVE"/>
		<description>
This update for git fixes the following issues:

- On case-insensitive filesystems, with support for symbolic links,
  if Git is configured globally to apply delay-capable clean/smudge
  filters (such as Git LFS), Git could be fooled into running
  remote code during a clone. (bsc#1183026, CVE-2021-21300)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183026">SUSE bug 1183026</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21300/">CVE-2021-21300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21300">CVE-2021-21300 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531952" comment="git-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531953" comment="git-core-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531954" comment="git-cvs-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531955" comment="git-daemon-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531957" comment="git-email-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531958" comment="git-gui-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531959" comment="git-svn-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531960" comment="git-web-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531961" comment="gitk-2.26.2-27.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152590" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1145740" ref_url="https://bugzilla.suse.com/1145740" source="BUGZILLA"/>
		<reference ref_id="1182703" ref_url="https://bugzilla.suse.com/1182703" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10092" ref_url="https://www.suse.com/security/cve/CVE-2019-10092/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- Fixed potential content spoofing with default error pages(bsc#118270)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-12"/>
	<updated date="2021-03-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1145740">SUSE bug 1145740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182703">SUSE bug 1182703</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10092/">CVE-2019-10092 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10092">CVE-2019-10092 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557832" comment="apache2-2.4.23-29.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557833" comment="apache2-doc-2.4.23-29.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557834" comment="apache2-example-pages-2.4.23-29.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557835" comment="apache2-prefork-2.4.23-29.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557836" comment="apache2-utils-2.4.23-29.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557837" comment="apache2-worker-2.4.23-29.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152591" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- python27 was upgraded to 2.7.18
- CVE-2021-23336: Fixed a potential web cache poisoning by using a semicolon in query parameters use of semicolon as a query string separator (bsc#1182379).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-16"/>
	<updated date="2021-03-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531962" comment="libpython2_7-1_0-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531963" comment="libpython2_7-1_0-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531964" comment="python-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531965" comment="python-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531966" comment="python-base-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531967" comment="python-base-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531968" comment="python-curses-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531969" comment="python-demo-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531970" comment="python-devel-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531971" comment="python-doc-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531972" comment="python-doc-pdf-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531973" comment="python-gdbm-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531974" comment="python-idle-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531975" comment="python-tk-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531976" comment="python-xml-2.7.18-28.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152592" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180623" ref_url="https://bugzilla.suse.com/1180623" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.1 ESR
  * Fixed: Critical security issue MFSA 2021-01 (bsc#1180623)
  * CVE-2020-16044
    Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180623">SUSE bug 1180623</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16044">CVE-2020-16044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531977" comment="MozillaFirefox-78.6.1-112.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531978" comment="MozillaFirefox-devel-78.6.1-112.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531979" comment="MozillaFirefox-translations-common-78.6.1-112.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152593" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182328" ref_url="https://bugzilla.suse.com/1182328" source="BUGZILLA"/>
		<reference ref_id="1182362" ref_url="https://bugzilla.suse.com/1182362" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27218" ref_url="https://www.suse.com/security/cve/CVE-2021-27218/" source="CVE"/>
		<reference ref_id="CVE-2021-27219" ref_url="https://www.suse.com/security/cve/CVE-2021-27219/" source="CVE"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2021-27218: g_byte_array_new_take takes a gsize as length but stores in a guint, this patch will refuse if the length is larger than guint. (bsc#1182328)
- CVE-2021-27219: g_memdup takes a guint as parameter and sometimes leads into an integer overflow, so add a g_memdup2 function which uses gsize to replace it. (bsc#1182362)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-16"/>
	<updated date="2021-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182328">SUSE bug 1182328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182362">SUSE bug 1182362</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-27218/">CVE-2021-27218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27218">CVE-2021-27218 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27219/">CVE-2021-27219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27219">CVE-2021-27219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531980" comment="glib2-lang-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531981" comment="glib2-tools-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531982" comment="libgio-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531983" comment="libgio-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531984" comment="libglib-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531985" comment="libglib-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531986" comment="libgmodule-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531987" comment="libgmodule-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531988" comment="libgobject-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531989" comment="libgobject-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531990" comment="libgthread-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531991" comment="libgthread-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152594" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2021-23336: Fixed a potential web cache poisoning by using a semicolon in query parameters use of semicolon as a query string separator (bsc#1182379).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-19"/>
	<updated date="2021-03-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557838" comment="libpython3_4m1_0-3.4.10-25.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557839" comment="python3-3.4.10-25.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557840" comment="python3-base-3.4.10-25.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557841" comment="python3-curses-3.4.10-25.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152595" version="1" class="patch">
	<metadata>
		<title>Security update for python36 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179756" ref_url="https://bugzilla.suse.com/1179756" source="BUGZILLA"/>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<description>
This update for python36 fixes the following issues:

- python36 was updated to 3.6.13
   - CVE-2021-23336: Fixed a potential web cache poisoning by using a semicolon in query parameters use of semicolon as a query string separator (bsc#1182379).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-19"/>
	<updated date="2021-03-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179756">SUSE bug 1179756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557842" comment="libpython3_6m1_0-3.6.13-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557843" comment="python36-3.6.13-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557844" comment="python36-base-3.6.13-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557845" comment="python36-curses-3.6.13-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557846" comment="python36-dbm-3.6.13-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557847" comment="python36-devel-3.6.13-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557848" comment="python36-doc-3.6.13-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557849" comment="python36-idle-3.6.13-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557850" comment="python36-testsuite-3.6.13-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557851" comment="python36-tk-3.6.13-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557852" comment="python36-tools-3.6.13-6.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152596" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180414" ref_url="https://bugzilla.suse.com/1180414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738/" source="CVE"/>
		<description>
This update for wavpack fixes the following issues:
	
- CVE-2020-35738: Fixed an out-of-bounds write in WavpackPackSamples (bsc#1180414). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180414">SUSE bug 1180414</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35738">CVE-2020-35738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531994" comment="libwavpack1-4.60.99-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152597" version="1" class="patch">
	<metadata>
		<title>Security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1088639" ref_url="https://bugzilla.suse.com/1088639" source="BUGZILLA"/>
		<reference ref_id="1112438" ref_url="https://bugzilla.suse.com/1112438" source="BUGZILLA"/>
		<reference ref_id="1125689" ref_url="https://bugzilla.suse.com/1125689" source="BUGZILLA"/>
		<reference ref_id="1134616" ref_url="https://bugzilla.suse.com/1134616" source="BUGZILLA"/>
		<reference ref_id="1146182" ref_url="https://bugzilla.suse.com/1146182" source="BUGZILLA"/>
		<reference ref_id="1146184" ref_url="https://bugzilla.suse.com/1146184" source="BUGZILLA"/>
		<reference ref_id="1181358" ref_url="https://bugzilla.suse.com/1181358" source="BUGZILLA"/>
		<reference ref_id="962914" ref_url="https://bugzilla.suse.com/962914" source="BUGZILLA"/>
		<reference ref_id="964140" ref_url="https://bugzilla.suse.com/964140" source="BUGZILLA"/>
		<reference ref_id="966514" ref_url="https://bugzilla.suse.com/966514" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1544" ref_url="https://www.suse.com/security/cve/CVE-2016-1544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080/" source="CVE"/>
		<description>
This update for nghttp2 fixes the following issues:

Security issues fixed:

- CVE-2020-11080: HTTP/2 Large Settings Frame DoS (bsc#1181358).
- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service (bsc#1146184).
- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146182).
- CVE-2018-1000168: Fixed ALTSVC frame client side denial of service (bsc#1088639).
- CVE-2016-1544: Fixed out of memory due to unlimited incoming HTTP header fields (bsc#966514).

Bug fixes and enhancements:

- Packages must not mark license files as %doc (bsc#1082318)
- Typo in description of libnghttp2_asio1 (bsc#962914)
- Fixed mistake in spec file (bsc#1125689)
- Fixed build issue with boost 1.70.0 (bsc#1134616)
- Fixed build issue with GCC 6 (bsc#964140)
- Feature: Add W&amp;S module (FATE#326776, bsc#1112438)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088639">SUSE bug 1088639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112438">SUSE bug 1112438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125689">SUSE bug 1125689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134616">SUSE bug 1134616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146182">SUSE bug 1146182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146184">SUSE bug 1146184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181358">SUSE bug 1181358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962914">SUSE bug 962914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964140">SUSE bug 964140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966514">SUSE bug 966514</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1544/">CVE-2016-1544 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1544">CVE-2016-1544 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000168">CVE-2018-1000168 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9511">CVE-2019-9511 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9513">CVE-2019-9513 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11080">CVE-2020-11080 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531995" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152598" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841">CVE-2021-23841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531996" comment="libopenssl-devel-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531997" comment="libopenssl1_0_0-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531998" comment="libopenssl1_0_0-32bit-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531999" comment="libopenssl1_0_0-hmac-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532000" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532001" comment="openssl-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532002" comment="openssl-doc-1.0.2j-60.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152599" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1183578" ref_url="https://bugzilla.suse.com/1183578" source="BUGZILLA"/>
		<reference ref_id="1183579" ref_url="https://bugzilla.suse.com/1183579" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28210" ref_url="https://www.suse.com/security/cve/CVE-2021-28210/" source="CVE"/>
		<reference ref_id="CVE-2021-28211" ref_url="https://www.suse.com/security/cve/CVE-2021-28211/" source="CVE"/>
		<description>
This update for ovmf fixes the following issues:

- CVE-2021-28211: ovmf: edk2: possible heap corruption with LzmaUefiDecompressGetInfo (bsc#1183578)
- CVE-2021-28210: ovmf: unlimited FV recursion, round 2 (bsc#1183579)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-29"/>
	<updated date="2021-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183578">SUSE bug 1183578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183579">SUSE bug 1183579</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-28210/">CVE-2021-28210 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28210">CVE-2021-28210 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28211/">CVE-2021-28211 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28211">CVE-2021-28211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557853" comment="ovmf-2017+git1492060560.b6d11d7c46-4.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557854" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557855" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152600" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181131" ref_url="https://bugzilla.suse.com/1181131" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20193" ref_url="https://www.suse.com/security/cve/CVE-2021-20193/" source="CVE"/>
		<description>
This update for tar fixes the following issues:

CVE-2021-20193: Memory leak in read_header() in list.c (bsc#1181131) 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-29"/>
	<updated date="2021-03-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1181131">SUSE bug 1181131</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20193/">CVE-2021-20193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20193">CVE-2021-20193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009557856" comment="tar-1.27.1-15.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557857" comment="tar-lang-1.27.1-15.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152601" version="1" class="patch">
	<metadata>
		<title>Security update for zabbix (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1158321" ref_url="https://bugzilla.suse.com/1158321" source="BUGZILLA"/>
		<reference ref_id="1183014" ref_url="https://bugzilla.suse.com/1183014" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7484" ref_url="https://www.suse.com/security/cve/CVE-2013-7484/" source="CVE"/>
		<reference ref_id="CVE-2021-27927" ref_url="https://www.suse.com/security/cve/CVE-2021-27927/" source="CVE"/>
		<description>
This update for zabbix fixes the following issues:
	  
- CVE-2021-27927: Fixed an improper CSRF protection mechanism (bsc#1183014).
- CVE-2013-7484: Fixed an issue where passwords in the users table were unsalted (bsc#1158321).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-30"/>
	<updated date="2021-03-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1158321">SUSE bug 1158321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183014">SUSE bug 1183014</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2013-7484/">CVE-2013-7484 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7484">CVE-2013-7484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-27927/">CVE-2021-27927 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27927">CVE-2021-27927 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557858" comment="zabbix-agent-4.0.12-4.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152602" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1149746" ref_url="https://bugzilla.suse.com/1149746" source="BUGZILLA"/>
		<reference ref_id="1149747" ref_url="https://bugzilla.suse.com/1149747" source="BUGZILLA"/>
		<reference ref_id="1158256" ref_url="https://bugzilla.suse.com/1158256" source="BUGZILLA"/>
		<reference ref_id="1177364" ref_url="https://bugzilla.suse.com/1177364" source="BUGZILLA"/>
		<reference ref_id="1177378" ref_url="https://bugzilla.suse.com/1177378" source="BUGZILLA"/>
		<reference ref_id="1177380" ref_url="https://bugzilla.suse.com/1177380" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15945" ref_url="https://www.suse.com/security/cve/CVE-2019-15945/" source="CVE"/>
		<reference ref_id="CVE-2019-15946" ref_url="https://www.suse.com/security/cve/CVE-2019-15946/" source="CVE"/>
		<reference ref_id="CVE-2019-19479" ref_url="https://www.suse.com/security/cve/CVE-2019-19479/" source="CVE"/>
		<reference ref_id="CVE-2020-26570" ref_url="https://www.suse.com/security/cve/CVE-2020-26570/" source="CVE"/>
		<reference ref_id="CVE-2020-26571" ref_url="https://www.suse.com/security/cve/CVE-2020-26571/" source="CVE"/>
		<reference ref_id="CVE-2020-26572" ref_url="https://www.suse.com/security/cve/CVE-2020-26572/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2020-26571: gemsafe GPK smart card software driver stack-based buffer overflow (bsc#1177380)
- CVE-2019-15946: out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry (bsc#1149747)
- CVE-2019-15945: out-of-bounds access of an ASN.1 Bitstring in decode_bit_string (bsc#1149746)
- CVE-2019-19479: incorrect read operation during parsing of a SETCOS file attribute (bsc#1158256)
- CVE-2020-26572: Prevent out of bounds write (bsc#1177378)
- CVE-2020-26570: Fix buffer overflow in sc_oberthur_read_file (bsc#1177364)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-31"/>
	<updated date="2021-03-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149746">SUSE bug 1149746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149747">SUSE bug 1149747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158256">SUSE bug 1158256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177364">SUSE bug 1177364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177378">SUSE bug 1177378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177380">SUSE bug 1177380</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15945/">CVE-2019-15945 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15945">CVE-2019-15945 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15946/">CVE-2019-15946 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15946">CVE-2019-15946 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19479/">CVE-2019-19479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19479">CVE-2019-19479 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26570/">CVE-2020-26570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26570">CVE-2020-26570 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26571/">CVE-2020-26571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26571">CVE-2020-26571 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26572/">CVE-2020-26572 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26572">CVE-2020-26572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557859" comment="opensc-0.13.0-3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152603" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1183942" ref_url="https://bugzilla.suse.com/1183942" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.9.0 ESR  (MFSA 2021-11, bsc#1183942)
  * CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read
  * CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23984: Malicious extensions could have spoofed popup information
  * CVE-2021-23987: Memory safety bugs
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-31"/>
	<updated date="2021-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23981">CVE-2021-23981 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23982">CVE-2021-23982 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23984">CVE-2021-23984 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23987">CVE-2021-23987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009532003" comment="MozillaFirefox-78.9.0-112.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532004" comment="MozillaFirefox-devel-78.9.0-112.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532005" comment="MozillaFirefox-translations-common-78.9.0-112.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152604" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197341" ref_url="https://bugzilla.suse.com/1197341" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0547" ref_url="https://www.suse.com/security/cve/CVE-2022-0547/" source="CVE"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2022-0547: Fixed possible authentication bypass in external authentication plug-in (bsc#1197341).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197341">SUSE bug 1197341</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0547/">CVE-2022-0547 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0547">CVE-2022-0547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009676877" comment="openvpn-2.3.8-16.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676878" comment="openvpn-auth-pam-plugin-2.3.8-16.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152605" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1196500" ref_url="https://bugzilla.suse.com/1196500" source="BUGZILLA"/>
		<reference ref_id="1197126" ref_url="https://bugzilla.suse.com/1197126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update Java 7.1 to Service Refresh 7 Fix Pack 5 (bsc#1197126).

Including fixes for the following vulnerabilities: 

  CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349,
  CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277,
  CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294,
  CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248,
  CVE-2022-21271.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21271">CVE-2022-21271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21349">CVE-2022-21349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152606" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1195146" ref_url="https://bugzilla.suse.com/1195146" source="BUGZILLA"/>
		<reference ref_id="1196500" ref_url="https://bugzilla.suse.com/1196500" source="BUGZILLA"/>
		<reference ref_id="1197126" ref_url="https://bugzilla.suse.com/1197126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update Java 8.0 to Service Refresh 7 Fix Pack 5 (bsc#1197126).

Including fixes for the following vulnerabilities: 

  CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349,
  CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277,
  CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294,
  CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248,
  CVE-2022-21271.

Non-securtiy fix:

- Fixed a broken symlink for javaws (bsc#1195146).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195146">SUSE bug 1195146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21271">CVE-2022-21271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21349">CVE-2022-21349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152607" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197459" ref_url="https://bugzilla.suse.com/1197459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677126" comment="libz1-1.2.8-12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677109" comment="libz1-32bit-1.2.8-12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677127" comment="zlib-devel-1.2.8-12.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152608" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186819" ref_url="https://bugzilla.suse.com/1186819" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2021-3572: Fixed an improper handling of unicode characters in pip (bsc#1186819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186819">SUSE bug 1186819</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3572">CVE-2021-3572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677036" comment="libpython3_4m1_0-3.4.10-25.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677037" comment="python3-3.4.10-25.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677038" comment="python3-base-3.4.10-25.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677039" comment="python3-curses-3.4.10-25.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152609" version="1" class="patch">
	<metadata>
		<title>Feature update for python36 stack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1002168" ref_url="https://bugzilla.suse.com/1002168" source="BUGZILLA"/>
		<reference ref_id="1002895" ref_url="https://bugzilla.suse.com/1002895" source="BUGZILLA"/>
		<reference ref_id="1007084" ref_url="https://bugzilla.suse.com/1007084" source="BUGZILLA"/>
		<reference ref_id="1015776" ref_url="https://bugzilla.suse.com/1015776" source="BUGZILLA"/>
		<reference ref_id="1027705" ref_url="https://bugzilla.suse.com/1027705" source="BUGZILLA"/>
		<reference ref_id="1037032" ref_url="https://bugzilla.suse.com/1037032" source="BUGZILLA"/>
		<reference ref_id="1039394" ref_url="https://bugzilla.suse.com/1039394" source="BUGZILLA"/>
		<reference ref_id="1044370" ref_url="https://bugzilla.suse.com/1044370" source="BUGZILLA"/>
		<reference ref_id="1052927" ref_url="https://bugzilla.suse.com/1052927" source="BUGZILLA"/>
		<reference ref_id="1054413" ref_url="https://bugzilla.suse.com/1054413" source="BUGZILLA"/>
		<reference ref_id="1055478" ref_url="https://bugzilla.suse.com/1055478" source="BUGZILLA"/>
		<reference ref_id="1057496" ref_url="https://bugzilla.suse.com/1057496" source="BUGZILLA"/>
		<reference ref_id="1065275" ref_url="https://bugzilla.suse.com/1065275" source="BUGZILLA"/>
		<reference ref_id="1066528" ref_url="https://bugzilla.suse.com/1066528" source="BUGZILLA"/>
		<reference ref_id="1069697" ref_url="https://bugzilla.suse.com/1069697" source="BUGZILLA"/>
		<reference ref_id="1070737" ref_url="https://bugzilla.suse.com/1070737" source="BUGZILLA"/>
		<reference ref_id="1073845" ref_url="https://bugzilla.suse.com/1073845" source="BUGZILLA"/>
		<reference ref_id="1073879" ref_url="https://bugzilla.suse.com/1073879" source="BUGZILLA"/>
		<reference ref_id="1074247" ref_url="https://bugzilla.suse.com/1074247" source="BUGZILLA"/>
		<reference ref_id="1075263" ref_url="https://bugzilla.suse.com/1075263" source="BUGZILLA"/>
		<reference ref_id="1075812" ref_url="https://bugzilla.suse.com/1075812" source="BUGZILLA"/>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1088310" ref_url="https://bugzilla.suse.com/1088310" source="BUGZILLA"/>
		<reference ref_id="1092493" ref_url="https://bugzilla.suse.com/1092493" source="BUGZILLA"/>
		<reference ref_id="1095041" ref_url="https://bugzilla.suse.com/1095041" source="BUGZILLA"/>
		<reference ref_id="1099308" ref_url="https://bugzilla.suse.com/1099308" source="BUGZILLA"/>
		<reference ref_id="1101820" ref_url="https://bugzilla.suse.com/1101820" source="BUGZILLA"/>
		<reference ref_id="1105988" ref_url="https://bugzilla.suse.com/1105988" source="BUGZILLA"/>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="1111634" ref_url="https://bugzilla.suse.com/1111634" source="BUGZILLA"/>
		<reference ref_id="1111635" ref_url="https://bugzilla.suse.com/1111635" source="BUGZILLA"/>
		<reference ref_id="1111657" ref_url="https://bugzilla.suse.com/1111657" source="BUGZILLA"/>
		<reference ref_id="1113302" ref_url="https://bugzilla.suse.com/1113302" source="BUGZILLA"/>
		<reference ref_id="1117074" ref_url="https://bugzilla.suse.com/1117074" source="BUGZILLA"/>
		<reference ref_id="1118021" ref_url="https://bugzilla.suse.com/1118021" source="BUGZILLA"/>
		<reference ref_id="1118024" ref_url="https://bugzilla.suse.com/1118024" source="BUGZILLA"/>
		<reference ref_id="1118027" ref_url="https://bugzilla.suse.com/1118027" source="BUGZILLA"/>
		<reference ref_id="1118099" ref_url="https://bugzilla.suse.com/1118099" source="BUGZILLA"/>
		<reference ref_id="1122668" ref_url="https://bugzilla.suse.com/1122668" source="BUGZILLA"/>
		<reference ref_id="1123064" ref_url="https://bugzilla.suse.com/1123064" source="BUGZILLA"/>
		<reference ref_id="1128323" ref_url="https://bugzilla.suse.com/1128323" source="BUGZILLA"/>
		<reference ref_id="1129071" ref_url="https://bugzilla.suse.com/1129071" source="BUGZILLA"/>
		<reference ref_id="1129696" ref_url="https://bugzilla.suse.com/1129696" source="BUGZILLA"/>
		<reference ref_id="1132663" ref_url="https://bugzilla.suse.com/1132663" source="BUGZILLA"/>
		<reference ref_id="1132900" ref_url="https://bugzilla.suse.com/1132900" source="BUGZILLA"/>
		<reference ref_id="1136184" ref_url="https://bugzilla.suse.com/1136184" source="BUGZILLA"/>
		<reference ref_id="1138666" ref_url="https://bugzilla.suse.com/1138666" source="BUGZILLA"/>
		<reference ref_id="1138715" ref_url="https://bugzilla.suse.com/1138715" source="BUGZILLA"/>
		<reference ref_id="1138746" ref_url="https://bugzilla.suse.com/1138746" source="BUGZILLA"/>
		<reference ref_id="1138748" ref_url="https://bugzilla.suse.com/1138748" source="BUGZILLA"/>
		<reference ref_id="1140565" ref_url="https://bugzilla.suse.com/1140565" source="BUGZILLA"/>
		<reference ref_id="1143893" ref_url="https://bugzilla.suse.com/1143893" source="BUGZILLA"/>
		<reference ref_id="1146853" ref_url="https://bugzilla.suse.com/1146853" source="BUGZILLA"/>
		<reference ref_id="1146854" ref_url="https://bugzilla.suse.com/1146854" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1150895" ref_url="https://bugzilla.suse.com/1150895" source="BUGZILLA"/>
		<reference ref_id="1161770" ref_url="https://bugzilla.suse.com/1161770" source="BUGZILLA"/>
		<reference ref_id="1165439" ref_url="https://bugzilla.suse.com/1165439" source="BUGZILLA"/>
		<reference ref_id="1166139" ref_url="https://bugzilla.suse.com/1166139" source="BUGZILLA"/>
		<reference ref_id="1166924" ref_url="https://bugzilla.suse.com/1166924" source="BUGZILLA"/>
		<reference ref_id="1167732" ref_url="https://bugzilla.suse.com/1167732" source="BUGZILLA"/>
		<reference ref_id="1168943" ref_url="https://bugzilla.suse.com/1168943" source="BUGZILLA"/>
		<reference ref_id="1170175" ref_url="https://bugzilla.suse.com/1170175" source="BUGZILLA"/>
		<reference ref_id="1171561" ref_url="https://bugzilla.suse.com/1171561" source="BUGZILLA"/>
		<reference ref_id="1172389" ref_url="https://bugzilla.suse.com/1172389" source="BUGZILLA"/>
		<reference ref_id="1174035" ref_url="https://bugzilla.suse.com/1174035" source="BUGZILLA"/>
		<reference ref_id="1174514" ref_url="https://bugzilla.suse.com/1174514" source="BUGZILLA"/>
		<reference ref_id="1175147" ref_url="https://bugzilla.suse.com/1175147" source="BUGZILLA"/>
		<reference ref_id="1175148" ref_url="https://bugzilla.suse.com/1175148" source="BUGZILLA"/>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1176389" ref_url="https://bugzilla.suse.com/1176389" source="BUGZILLA"/>
		<reference ref_id="1176784" ref_url="https://bugzilla.suse.com/1176784" source="BUGZILLA"/>
		<reference ref_id="1176785" ref_url="https://bugzilla.suse.com/1176785" source="BUGZILLA"/>
		<reference ref_id="1177120" ref_url="https://bugzilla.suse.com/1177120" source="BUGZILLA"/>
		<reference ref_id="1178168" ref_url="https://bugzilla.suse.com/1178168" source="BUGZILLA"/>
		<reference ref_id="1179805" ref_url="https://bugzilla.suse.com/1179805" source="BUGZILLA"/>
		<reference ref_id="1182066" ref_url="https://bugzilla.suse.com/1182066" source="BUGZILLA"/>
		<reference ref_id="1182421" ref_url="https://bugzilla.suse.com/1182421" source="BUGZILLA"/>
		<reference ref_id="1182422" ref_url="https://bugzilla.suse.com/1182422" source="BUGZILLA"/>
		<reference ref_id="1184505" ref_url="https://bugzilla.suse.com/1184505" source="BUGZILLA"/>
		<reference ref_id="1186819" ref_url="https://bugzilla.suse.com/1186819" source="BUGZILLA"/>
		<reference ref_id="1186870" ref_url="https://bugzilla.suse.com/1186870" source="BUGZILLA"/>
		<reference ref_id="1187045" ref_url="https://bugzilla.suse.com/1187045" source="BUGZILLA"/>
		<reference ref_id="1195351" ref_url="https://bugzilla.suse.com/1195351" source="BUGZILLA"/>
		<reference ref_id="428177" ref_url="https://bugzilla.suse.com/428177" source="BUGZILLA"/>
		<reference ref_id="564366" ref_url="https://bugzilla.suse.com/564366" source="BUGZILLA"/>
		<reference ref_id="715423" ref_url="https://bugzilla.suse.com/715423" source="BUGZILLA"/>
		<reference ref_id="761500" ref_url="https://bugzilla.suse.com/761500" source="BUGZILLA"/>
		<reference ref_id="799119" ref_url="https://bugzilla.suse.com/799119" source="BUGZILLA"/>
		<reference ref_id="839107" ref_url="https://bugzilla.suse.com/839107" source="BUGZILLA"/>
		<reference ref_id="842516" ref_url="https://bugzilla.suse.com/842516" source="BUGZILLA"/>
		<reference ref_id="855666" ref_url="https://bugzilla.suse.com/855666" source="BUGZILLA"/>
		<reference ref_id="902598" ref_url="https://bugzilla.suse.com/902598" source="BUGZILLA"/>
		<reference ref_id="905354" ref_url="https://bugzilla.suse.com/905354" source="BUGZILLA"/>
		<reference ref_id="913229" ref_url="https://bugzilla.suse.com/913229" source="BUGZILLA"/>
		<reference ref_id="922448" ref_url="https://bugzilla.suse.com/922448" source="BUGZILLA"/>
		<reference ref_id="929736" ref_url="https://bugzilla.suse.com/929736" source="BUGZILLA"/>
		<reference ref_id="930189" ref_url="https://bugzilla.suse.com/930189" source="BUGZILLA"/>
		<reference ref_id="935595" ref_url="https://bugzilla.suse.com/935595" source="BUGZILLA"/>
		<reference ref_id="940812" ref_url="https://bugzilla.suse.com/940812" source="BUGZILLA"/>
		<reference ref_id="944204" ref_url="https://bugzilla.suse.com/944204" source="BUGZILLA"/>
		<reference ref_id="945455" ref_url="https://bugzilla.suse.com/945455" source="BUGZILLA"/>
		<reference ref_id="947357" ref_url="https://bugzilla.suse.com/947357" source="BUGZILLA"/>
		<reference ref_id="947679" ref_url="https://bugzilla.suse.com/947679" source="BUGZILLA"/>
		<reference ref_id="948198" ref_url="https://bugzilla.suse.com/948198" source="BUGZILLA"/>
		<reference ref_id="949877" ref_url="https://bugzilla.suse.com/949877" source="BUGZILLA"/>
		<reference ref_id="954690" ref_url="https://bugzilla.suse.com/954690" source="BUGZILLA"/>
		<reference ref_id="958686" ref_url="https://bugzilla.suse.com/958686" source="BUGZILLA"/>
		<reference ref_id="960680" ref_url="https://bugzilla.suse.com/960680" source="BUGZILLA"/>
		<reference ref_id="962170" ref_url="https://bugzilla.suse.com/962170" source="BUGZILLA"/>
		<reference ref_id="967128" ref_url="https://bugzilla.suse.com/967128" source="BUGZILLA"/>
		<reference ref_id="974705" ref_url="https://bugzilla.suse.com/974705" source="BUGZILLA"/>
		<reference ref_id="974993" ref_url="https://bugzilla.suse.com/974993" source="BUGZILLA"/>
		<reference ref_id="975875" ref_url="https://bugzilla.suse.com/975875" source="BUGZILLA"/>
		<reference ref_id="975949" ref_url="https://bugzilla.suse.com/975949" source="BUGZILLA"/>
		<reference ref_id="981848" ref_url="https://bugzilla.suse.com/981848" source="BUGZILLA"/>
		<reference ref_id="985858" ref_url="https://bugzilla.suse.com/985858" source="BUGZILLA"/>
		<reference ref_id="993968" ref_url="https://bugzilla.suse.com/993968" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4314" ref_url="https://www.suse.com/security/cve/CVE-2013-4314/" source="CVE"/>
		<reference ref_id="CVE-2013-5123" ref_url="https://www.suse.com/security/cve/CVE-2013-5123/" source="CVE"/>
		<reference ref_id="CVE-2014-1829" ref_url="https://www.suse.com/security/cve/CVE-2014-1829/" source="CVE"/>
		<reference ref_id="CVE-2014-1830" ref_url="https://www.suse.com/security/cve/CVE-2014-1830/" source="CVE"/>
		<reference ref_id="CVE-2014-8991" ref_url="https://www.suse.com/security/cve/CVE-2014-8991/" source="CVE"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<reference ref_id="CVE-2016-9015" ref_url="https://www.suse.com/security/cve/CVE-2016-9015/" source="CVE"/>
		<reference ref_id="CVE-2017-18342" ref_url="https://www.suse.com/security/cve/CVE-2017-18342/" source="CVE"/>
		<reference ref_id="CVE-2018-1000807" ref_url="https://www.suse.com/security/cve/CVE-2018-1000807/" source="CVE"/>
		<reference ref_id="CVE-2018-1000808" ref_url="https://www.suse.com/security/cve/CVE-2018-1000808/" source="CVE"/>
		<reference ref_id="CVE-2018-10903" ref_url="https://www.suse.com/security/cve/CVE-2018-10903/" source="CVE"/>
		<reference ref_id="CVE-2018-15869" ref_url="https://www.suse.com/security/cve/CVE-2018-15869/" source="CVE"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236/" source="CVE"/>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<reference ref_id="CVE-2020-13757" ref_url="https://www.suse.com/security/cve/CVE-2020-13757/" source="CVE"/>
		<reference ref_id="CVE-2020-14343" ref_url="https://www.suse.com/security/cve/CVE-2020-14343/" source="CVE"/>
		<reference ref_id="CVE-2020-1747" ref_url="https://www.suse.com/security/cve/CVE-2020-1747/" source="CVE"/>
		<reference ref_id="CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659/" source="CVE"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<reference ref_id="CVE-2020-29651" ref_url="https://www.suse.com/security/cve/CVE-2020-29651/" source="CVE"/>
		<reference ref_id="CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242/" source="CVE"/>
		<reference ref_id="CVE-2021-33503" ref_url="https://www.suse.com/security/cve/CVE-2021-33503/" source="CVE"/>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<description>
This update for python36 stack provides the following changes:

aws-cli-py36:

- Introduce aws-cli-py36 version 1.19.9 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (bsc#1146853, bsc#1182422, bsc#1066528, bsc#1168943, bsc#1117074, bsc#1175148, 
  bsc#985858, bsc#949877, bsc#1044370, bsc#1105988, bsc#1182421, bsc#902598, bsc#974993, bsc#905354, bsc#1092493,
  bsc#1088310, bsc#1118099, bsc#958686, bsc#1015776, bsc#1118024, bsc#1118021, bsc#1175147, bsc#1166924,
  CVE-2018-15869, fate#318337, fate#315990)

python36:

- Security fixes:
  * CVE-2021-3572: update the bundled pip wheel to the latest SUSE Linux Enterprise version. (bsc#1186819)
- Non security changes:
  * Don't use appstream-glib on SUSE Linux Enterprise 12.
  * Skip documentation generation on SUSE Linux Enterprise 12.
  * Skip tests because of patched OpenSSL.
  * Suppress Sphinx warnings
  * Support Expat &gt;= 2.4.5 and be more strict with the executed build tests.

python36-appdirs:

- Introduce python36-appdirs version 1.4.3 and provide python36 needed dependencies. (jsc#SLE-22179)

python36-asn1crypto:

- Introduce python36-asn1crypto version 0.24.0 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (fate#323875, bsc#1054413)

python36-atomicwrites:

- Introduce python36-atomicwrites version 1.4.0 and provide python36 needed dependencies. (jsc#SLE-22179)
- Do not provide the documentation for this package as it does not build properly with the current version of Sphinx.

python36-attrs:

- Introduce python36-attrs version 19.3.0 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (bsc#1073845)

python36-boto3:

- Introduce python36-boto3 version 1.17.9 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (jsc#ECO-3352, jsc#PM-2485, jsc#PM-1447, jsc#ECO-2362, jsc#PM-2069, bsc#974705, 
  bsc#1168943, bsc#1118021, bsc#1122668, bsc#1075263, bsc#1146853, bsc#1146854, bsc#1166924, bsc#1118027,
  bsc#1069697, bsc#962170, bsc#1175148, bsc#1175147, bsc#1182422, bsc#1182421, bsc#1118024, bsc#1007084, bsc#1015776,
  fate#326950, fate#320335)

python36-botocore:

- Introduce python36-botocore version 1.20.9 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (jsc#PM-2069, jsc#ECO-2362, jsc#ECO-3352, jsc#PM-2485, bsc#1044370, bsc#1182421, 
  bsc#1129696, bsc#949877, bsc#1118024, bsc#1075263, bsc#905354, bsc#985858, bsc#1146853, bsc#1175148, 
  bsc#1007084, bsc#1168943, bsc#1146854, bsc#1088310, bsc#1182422, bsc#958686, bsc#1175147, bsc#1118021, 
  bsc#1015776, bsc#1136184, bsc#1066528, bsc#1118027, bsc#974705, bsc#1095041, bsc#1166924, fate#318337, fate#315990)

python36-certifi:

- Introduce python36-certifi version 2018.1.18 and provide python36 needed dependencies. (jsc#SLE-22179)

python36-cffi:

- Introduce python36-cffi version 1.11.5 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (jsc#ECO-1256, jsc#ECO-3105, fate#324435, fate#323875, fate#318838,
  bsc#1138748, bsc#948198, bsc#981848, bsc#1070737, bsc#1111657, bsc#1176784)

python36-chardet:

- Introduce python36-chardet version 3.0.4 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (bsc#1002895, fate#321630)

python36-colorama:

- Introduce python36-colorama version 0.4.4 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (jsc#PM-2352, bnc#1176785).

python36-cryptography:

- Introduce python36-cryptography version 2.8 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (jsc#ECO-3105, jsc#ECO-1256, fate#324191, fate#318838, fate#323875, fate#324435,
  CVE-2020-25659, CVE-2020-36242, CVE-2018-1000808, CVE-2018-10903, CVE-2018-1000807,
  bsc#1178168, bsc#1065275, bsc#1149792, bsc#1111635, bsc#1101820, bsc#947679, bsc#944204, bsc#1052927, bsc#1002168,
  bsc#1073879, bsc#1138748, bsc#1111634, bsc#948198, bsc#1182066, bsc#1055478, bsc#1176784)

python36-cryptography-vectors:

- Introduce python36-cryptography-vectors version 2.8 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (jsc#ECO-3105, bsc#1176784)

python36-docutils:

- Introduce python36-docutils version 0.14 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (bsc#1039394, bsc#564366)

python36-idna:

- Introduce python36-idna version 2.6 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (fate#323875, fate#323875, bsc#1054413)

python36-importlib-metadata:

- Introduce python36-importlib-metadata version 1.5.0 and provide python36 needed dependencies. (jsc#SLE-22179)

python36-iso8601:

- Introduce python36-iso8601 version 0.1.10 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (fate#324191, fate#316168, bsc#1065275)

python36-jmespath:

- Introduce python36-jmespath version 0.9.3 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (bsc#905354)

python36-more-itertools:

- Introduce python36-more-itertools version 5.0.0 and provide python36 needed dependencies. (jsc#SLE-22179)

python36-packaging:

- Introduce python36-packaging version 17.1  and provide python36 needed dependencies. (jsc#SLE-22179)

python36-pip:

- Introduce python36-pip version 9.0.1 and provide python36 needed dependencies. (jsc#SLE-22179)
- Resolve a conflict between python3-pip and python36-pip. (bsc#1195351)
  * This package provides only `/usr/bin/pip3.6` and the users has to create their own symlinks if 
  they want something else.
- Mention existing old fixes. (CVE-2013-5123, CVE-2014-8991, CVE-2015-2296, bsc#842516)

python36-pluggy:

- Introduce python36-pluggy version 0.13.1 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (bsc#1073845)

python36-ply:

- Introduce python36-ply version 3.10 and provide python36 needed dependencies. (jsc#SLE-22179)

python36-pretend:

- Introduce python36-pretend version 1.0.9 and provide python36 needed dependencies. (jsc#SLE-22179)

python36-py:

- Introduce python36-py version 1.8.1 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (CVE-2020-29651, bsc#1184505, bsc#1138666, bsc#1179805)

python36-pyasn1:

- Introduce python36-pyasn1 version 0.1.9 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (fate#323875, fate#318838)

python36-pyasn1-modules:

- Introduce python36-pyasn1-modules version 0.0.5 and provide python36 needed dependencies. (jsc#SLE-22179)

python36-pycparser:

- Introduce python36-pycparser version 2.10 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (bsc#1073879, fate#324435)

python36-pyOpenSSL:

- Introduce python36-pyOpenSSL version 17.1.0 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (bsc#855666, bsc#1073879, bsc#715423, bsc#839107, bsc#1065275, bsc#1138748, 
  fate#324191, fate#324435, CVE-2013-4314, jsc#ECO-1256)

python36-pyparsing:

- Introduce python36-pyparsing version 2.4.7 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (bsc#1186870)

python36-pytest:

- Introduce python36-pytest version 3.10.1 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (bsc#1167732)

python36-python-dateutil:

- Introduce python36-python-dateutil version 2.7.3 and provide python36 needed dependencies. (jsc#SLE-22179)

python36-PyYAML:

- Introduce python36-PyYAML version 5.3.1 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (jsc#ECO-3105, jsc#PM-2352, CVE-2017-18342, CVE-2020-14343, CVE-2020-1747,
  bsc#1099308, bsc#1176785, bsc#1082318, bsc#1140565, bsc#1165439, bsc#1174514)

python36-requests:

- Introduce python36-requests version 2.24.0 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (jsc#ECO-3105, jsc#PM-2352, bsc#922448, bsc#1170175, bsc#945455, bsc#799119, bsc#947357,
  bsc#929736, bsc#1111622, bsc#967128, bsc#1176785, bsc#761500, CVE-2015-2296, CVE-2018-18074, CVE-2014-1829, 
  CVE-2014-1830)

python36-rpm-macros: 

- Introduce python36-rpm-macros version 20200207.5feb6c1 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (bsc#1171561, bsc#1161770, bsc#1128323)

python36-rsa:

- Introduce python36-rsa version 3.4.2 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (CVE-2020-13757, bsc#1172389, bsc#954690, bsc#935595, bsc#960680, fate#319904)

python36-s3transfer:

- Introduce python36-s3transfer version 0.3.3 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (bsc#1168943, bsc#1146854, bsc#974993, bsc#1007084, bsc#975949, fate#320748)

python36-setuptools:

- Introduce python36-setuptools version 40.6.2 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (bsc#1176262, bsc#1174035, bsc#1075812, bsc#993968, bsc#930189, bsc#913229, bsc#428177, 
  bsc#428177, CVE-2019-20916, FATE#323875, FATE#319032, FATE#318137)

python36-setuptools_scm:

- Introduce python36-setuptools_scm version 1.15.6 and provide python36 needed dependencies. (jsc#SLE-22179)

python36-simplejson:

- Introduce python36-simplejson version 3.8.2 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (fate#324435, bsc#1073879)

python36-six:

- Introduce python36-six version 1.14.0 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (jsc#ECO-3105, fate#326838, fate#324435, fate#315990, fate#319030, fate#318838
  bsc#1113302, bsc#940812, bsc#1166139, bsc#1176784, bsc#1057496, bsc#1073879, bsc#1123064, bsc#1143893)

python36-pytz:

- Introduce python36-pytz version 2016.10 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (bsc#1027705, bsc#975875)

python36-urllib3:

- Introduce python36-urllib3 version 1.25.10 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (jsc#PM-2485, jsc#ECO-3352, CVE-2020-26137, CVE-2019-11324, CVE-2016-9015, CVE-2019-11236,
  CVE-2019-9740, CVE-2021-33503, bsc#1138715, bsc#1177120, bsc#1132663, bsc#1187045, bsc#1132900, bsc#1074247,
  bsc#1129071, bsc#1176389, bsc#1182422, bsc#1138746, bsc#1150895, fate#321630)

python36-wheel:

- Introduce python36-wheel version 0.32.3 and provide python36 needed dependencies. (jsc#SLE-22179)
- Mention existing old fixes. (bsc#1037032)

python36-zipp:

- Introduce python36-zipp version 0.6.0 and provide python36 needed dependencies. (jsc#SLE-22179)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-31"/>
	<updated date="2022-03-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002168">SUSE bug 1002168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002895">SUSE bug 1002895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007084">SUSE bug 1007084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015776">SUSE bug 1015776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027705">SUSE bug 1027705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037032">SUSE bug 1037032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039394">SUSE bug 1039394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044370">SUSE bug 1044370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052927">SUSE bug 1052927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054413">SUSE bug 1054413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055478">SUSE bug 1055478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057496">SUSE bug 1057496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065275">SUSE bug 1065275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066528">SUSE bug 1066528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069697">SUSE bug 1069697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070737">SUSE bug 1070737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073845">SUSE bug 1073845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073879">SUSE bug 1073879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074247">SUSE bug 1074247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075263">SUSE bug 1075263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075812">SUSE bug 1075812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088310">SUSE bug 1088310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092493">SUSE bug 1092493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095041">SUSE bug 1095041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099308">SUSE bug 1099308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101820">SUSE bug 1101820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105988">SUSE bug 1105988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111634">SUSE bug 1111634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111635">SUSE bug 1111635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111657">SUSE bug 1111657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113302">SUSE bug 1113302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117074">SUSE bug 1117074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118021">SUSE bug 1118021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118024">SUSE bug 1118024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118027">SUSE bug 1118027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118099">SUSE bug 1118099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122668">SUSE bug 1122668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123064">SUSE bug 1123064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128323">SUSE bug 1128323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129071">SUSE bug 1129071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129696">SUSE bug 1129696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132663">SUSE bug 1132663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132900">SUSE bug 1132900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136184">SUSE bug 1136184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138666">SUSE bug 1138666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138715">SUSE bug 1138715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138746">SUSE bug 1138746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138748">SUSE bug 1138748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140565">SUSE bug 1140565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143893">SUSE bug 1143893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146853">SUSE bug 1146853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146854">SUSE bug 1146854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150895">SUSE bug 1150895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161770">SUSE bug 1161770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165439">SUSE bug 1165439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166139">SUSE bug 1166139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166924">SUSE bug 1166924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167732">SUSE bug 1167732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168943">SUSE bug 1168943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170175">SUSE bug 1170175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171561">SUSE bug 1171561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172389">SUSE bug 1172389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174035">SUSE bug 1174035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174514">SUSE bug 1174514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175147">SUSE bug 1175147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175148">SUSE bug 1175148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176389">SUSE bug 1176389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176784">SUSE bug 1176784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176785">SUSE bug 1176785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178168">SUSE bug 1178168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179805">SUSE bug 1179805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182066">SUSE bug 1182066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182421">SUSE bug 1182421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182422">SUSE bug 1182422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184505">SUSE bug 1184505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186819">SUSE bug 1186819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186870">SUSE bug 1186870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187045">SUSE bug 1187045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195351">SUSE bug 1195351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/428177">SUSE bug 428177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/564366">SUSE bug 564366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/715423">SUSE bug 715423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761500">SUSE bug 761500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799119">SUSE bug 799119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839107">SUSE bug 839107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842516">SUSE bug 842516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855666">SUSE bug 855666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902598">SUSE bug 902598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905354">SUSE bug 905354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913229">SUSE bug 913229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922448">SUSE bug 922448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929736">SUSE bug 929736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930189">SUSE bug 930189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935595">SUSE bug 935595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940812">SUSE bug 940812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944204">SUSE bug 944204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945455">SUSE bug 945455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947357">SUSE bug 947357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947679">SUSE bug 947679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948198">SUSE bug 948198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949877">SUSE bug 949877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954690">SUSE bug 954690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958686">SUSE bug 958686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960680">SUSE bug 960680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962170">SUSE bug 962170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967128">SUSE bug 967128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974705">SUSE bug 974705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974993">SUSE bug 974993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975875">SUSE bug 975875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975949">SUSE bug 975949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981848">SUSE bug 981848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985858">SUSE bug 985858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993968">SUSE bug 993968</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4314/">CVE-2013-4314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4314">CVE-2013-4314 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2013-5123/">CVE-2013-5123 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5123">CVE-2013-5123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1829/">CVE-2014-1829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1829">CVE-2014-1829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1830/">CVE-2014-1830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1830">CVE-2014-1830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-8991/">CVE-2014-8991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8991">CVE-2014-8991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2296">CVE-2015-2296 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9015/">CVE-2016-9015 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9015">CVE-2016-9015 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18342/">CVE-2017-18342 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18342">CVE-2017-18342 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000807/">CVE-2018-1000807 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000807">CVE-2018-1000807 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000808/">CVE-2018-1000808 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000808">CVE-2018-1000808 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10903/">CVE-2018-10903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10903">CVE-2018-10903 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15869/">CVE-2018-15869 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15869">CVE-2018-15869 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11236">CVE-2019-11236 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">CVE-2019-11324 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9740">CVE-2019-9740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13757/">CVE-2020-13757 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13757">CVE-2020-13757 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14343/">CVE-2020-14343 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14343">CVE-2020-14343 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1747/">CVE-2020-1747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1747">CVE-2020-1747 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25659">CVE-2020-25659 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26137">CVE-2020-26137 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29651/">CVE-2020-29651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29651">CVE-2020-29651 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36242">CVE-2020-36242 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33503/">CVE-2021-33503 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33503">CVE-2021-33503 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3572">CVE-2021-3572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677781" comment="aws-cli-py36-1.19.9-6.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677782" comment="libpython3_6m1_0-3.6.15-6.61.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677783" comment="python36-3.6.15-6.61.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677784" comment="python36-PyYAML-5.3.1-6.5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677785" comment="python36-appdirs-1.4.3-6.3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677786" comment="python36-asn1crypto-0.24.0-6.3.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677787" comment="python36-base-3.6.15-6.61.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677788" comment="python36-boto3-1.17.9-6.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677789" comment="python36-botocore-1.20.9-6.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677790" comment="python36-certifi-2018.1.18-6.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677791" comment="python36-cffi-1.11.5-6.3.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677792" comment="python36-chardet-3.0.4-6.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677793" comment="python36-colorama-0.4.4-6.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677794" comment="python36-cryptography-2.8-6.3.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677795" comment="python36-curses-3.6.15-6.61.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677796" comment="python36-dbm-3.6.15-6.61.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677797" comment="python36-devel-3.6.15-6.61.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677798" comment="python36-docutils-0.14-6.3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677799" comment="python36-idle-3.6.15-6.61.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677800" comment="python36-idna-2.6-6.5.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677801" comment="python36-jmespath-0.9.3-6.3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677802" comment="python36-packaging-17.1-6.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677803" comment="python36-ply-3.10-6.3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677804" comment="python36-ply-doc-3.10-6.3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677805" comment="python36-py-1.8.1-6.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677806" comment="python36-pyOpenSSL-17.1.0-6.3.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677807" comment="python36-pyasn1-0.1.9-6.3.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677808" comment="python36-pycparser-2.10-6.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677809" comment="python36-pyparsing-2.4.7-6.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677810" comment="python36-pyparsing-doc-2.4.7-6.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677811" comment="python36-python-dateutil-2.7.3-6.3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677812" comment="python36-requests-2.24.0-6.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677813" comment="python36-rpm-generators-20200207.5feb6c1-6.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677814" comment="python36-rpm-macros-20200207.5feb6c1-6.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677815" comment="python36-rsa-3.4.2-6.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677816" comment="python36-s3transfer-0.3.3-6.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677817" comment="python36-setuptools-44.1.1-9.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677818" comment="python36-setuptools-test-44.1.1-6.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677819" comment="python36-setuptools-wheel-44.1.1-6.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677820" comment="python36-simplejson-3.8.2-6.3.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677821" comment="python36-six-1.14.0-6.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677822" comment="python36-six-doc-1.14.0-6.7.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677823" comment="python36-testsuite-3.6.15-6.61.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677824" comment="python36-tk-3.6.15-6.61.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677825" comment="python36-tools-3.6.15-6.61.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677826" comment="python36-urllib3-1.25.10-6.3.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152610" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1191902" ref_url="https://bugzilla.suse.com/1191902" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35560" ref_url="https://www.suse.com/security/cve/CVE-2021-35560/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 7 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
- CVE-2021-35560: Fixed a vulnerability in the component Deployment. (bsc#1191902)
- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake. (bsc#1191904)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191902">SUSE bug 1191902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35560/">CVE-2021-35560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35560">CVE-2021-35560 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41035">CVE-2021-41035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662502" comment="java-1_8_0-ibm-1.8.0_sr7.0-30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662492" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662503" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662494" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-30.84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152611" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194601" ref_url="https://bugzilla.suse.com/1194601" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0175" ref_url="https://www.suse.com/security/cve/CVE-2022-0175/" source="CVE"/>
		<description>
This update for virglrenderer fixes the following issues:
	  
- CVE-2022-0175: Fixed missing initialization of res-&gt;ptr (bsc#1194601).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194601">SUSE bug 1194601</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0175/">CVE-2022-0175 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0175">CVE-2022-0175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663809" comment="libvirglrenderer0-0.5.0-12.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152612" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.3 (bsc#1197903):
  - CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11
    tokens are removed while in use.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-05"/>
	<updated date="2022-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678285" comment="libfreebl3-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678251" comment="libfreebl3-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678286" comment="libfreebl3-hmac-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678253" comment="libfreebl3-hmac-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678287" comment="libsoftokn3-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678255" comment="libsoftokn3-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678288" comment="libsoftokn3-hmac-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678257" comment="libsoftokn3-hmac-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678289" comment="mozilla-nss-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678259" comment="mozilla-nss-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678290" comment="mozilla-nss-certs-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678261" comment="mozilla-nss-certs-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678291" comment="mozilla-nss-sysinit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678264" comment="mozilla-nss-sysinit-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678292" comment="mozilla-nss-tools-3.68.3-58.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152613" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.8.0 ESR (bsc#1197903):

MFSA 2022-14 (bsc#1197903)

* CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11 tokens are removed while in use
* CVE-2022-28281: Fixed an out of bounds write due to unexpected WebAuthN Extensions
* CVE-2022-1196: Fixed a use-after-free after VR Process destruction
* CVE-2022-28282: Fixed a use-after-free in DocumentL10n::TranslateDocument
* CVE-2022-28285: Fixed incorrect AliasSet used in JIT Codegen
* CVE-2022-28286: Fixed that iframe contents could be rendered outside the border
* CVE-2022-24713: Fixed a denial of service via complex regular expressions
* CVE-2022-28289: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1196">CVE-2022-1196 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28281">CVE-2022-28281 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28282">CVE-2022-28282 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28285">CVE-2022-28285 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28286">CVE-2022-28286 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28289">CVE-2022-28289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678497" comment="MozillaFirefox-91.8.0-112.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678498" comment="MozillaFirefox-devel-91.8.0-112.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678499" comment="MozillaFirefox-translations-common-91.8.0-112.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152614" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1167631" ref_url="https://bugzilla.suse.com/1167631" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1752" ref_url="https://www.suse.com/security/cve/CVE-2020-1752/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2020-1752: Fix use-after-free in glob when expanding ~user (bsc#1167631)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167631">SUSE bug 1167631</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1752/">CVE-2020-1752 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">CVE-2020-1752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677624" comment="glibc-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677550" comment="glibc-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677625" comment="glibc-devel-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677552" comment="glibc-devel-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677553" comment="glibc-html-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677554" comment="glibc-i18ndata-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677555" comment="glibc-info-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677626" comment="glibc-locale-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677557" comment="glibc-locale-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677627" comment="glibc-profile-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677559" comment="glibc-profile-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677628" comment="nscd-2.22-123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152615" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1102016" ref_url="https://bugzilla.suse.com/1102016" source="BUGZILLA"/>
		<reference ref_id="1106881" ref_url="https://bugzilla.suse.com/1106881" source="BUGZILLA"/>
		<reference ref_id="1106882" ref_url="https://bugzilla.suse.com/1106882" source="BUGZILLA"/>
		<reference ref_id="1140130" ref_url="https://bugzilla.suse.com/1140130" source="BUGZILLA"/>
		<reference ref_id="1140205" ref_url="https://bugzilla.suse.com/1140205" source="BUGZILLA"/>
		<reference ref_id="1162090" ref_url="https://bugzilla.suse.com/1162090" source="BUGZILLA"/>
		<reference ref_id="1173578" ref_url="https://bugzilla.suse.com/1173578" source="BUGZILLA"/>
		<reference ref_id="1180457" ref_url="https://bugzilla.suse.com/1180457" source="BUGZILLA"/>
		<reference ref_id="1184774" ref_url="https://bugzilla.suse.com/1184774" source="BUGZILLA"/>
		<reference ref_id="1197738" ref_url="https://bugzilla.suse.com/1197738" source="BUGZILLA"/>
		<reference ref_id="971617" ref_url="https://bugzilla.suse.com/971617" source="BUGZILLA"/>
		<reference ref_id="980504" ref_url="https://bugzilla.suse.com/980504" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1924" ref_url="https://www.suse.com/security/cve/CVE-2016-1924/" source="CVE"/>
		<reference ref_id="CVE-2016-3183" ref_url="https://www.suse.com/security/cve/CVE-2016-3183/" source="CVE"/>
		<reference ref_id="CVE-2016-4797" ref_url="https://www.suse.com/security/cve/CVE-2016-4797/" source="CVE"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16375" ref_url="https://www.suse.com/security/cve/CVE-2018-16375/" source="CVE"/>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2018-20845" ref_url="https://www.suse.com/security/cve/CVE-2018-20845/" source="CVE"/>
		<reference ref_id="CVE-2018-20846" ref_url="https://www.suse.com/security/cve/CVE-2018-20846/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="CVE-2022-1122" ref_url="https://www.suse.com/security/cve/CVE-2022-1122/" source="CVE"/>
		<description>
This update for openjpeg2 fixes the following issues:

- CVE-2016-1924: Fixed heap buffer overflow (bsc#980504).
- CVE-2016-3183: Fixed out-of-bounds read in sycc422_to_rgb function (bsc#971617).
- CVE-2016-4797: Fixed heap buffer overflow (bsc#980504).
- CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016).
- CVE-2018-16375: Fixed missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c (bsc#1106882).
- CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881).
- CVE-2018-20845: Fixed division-by-zero in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c (bsc#1140130).
- CVE-2018-20846: Fixed out-of-bounds accesses in pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c (bsc#1140205).
- CVE-2020-8112: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090).
- CVE-2020-15389: Fixed use-after-free if t a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578).
- CVE-2020-27823: Fixed heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457).
- CVE-2021-29338: Fixed integer overflow that allows remote attackers to crash the application (bsc#1184774).
- CVE-2022-1122: Fixed segmentation fault in opj2_decompress due to uninitialized pointer (bsc#1197738).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-07"/>
	<updated date="2022-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102016">SUSE bug 1102016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106881">SUSE bug 1106881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106882">SUSE bug 1106882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140130">SUSE bug 1140130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140205">SUSE bug 1140205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180457">SUSE bug 1180457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184774">SUSE bug 1184774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197738">SUSE bug 1197738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971617">SUSE bug 971617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980504">SUSE bug 980504</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1924/">CVE-2016-1924 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1924">CVE-2016-1924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3183/">CVE-2016-3183 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3183">CVE-2016-3183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-4797/">CVE-2016-4797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4797">CVE-2016-4797 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14423">CVE-2018-14423 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16375/">CVE-2018-16375 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16375">CVE-2018-16375 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16376">CVE-2018-16376 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20845/">CVE-2018-20845 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20845">CVE-2018-20845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20846/">CVE-2018-20846 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20846">CVE-2018-20846 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15389">CVE-2020-15389 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27823">CVE-2020-27823 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8112">CVE-2020-8112 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29338">CVE-2021-29338 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1122/">CVE-2022-1122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1122">CVE-2022-1122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677943" comment="libopenjp2-7-2.1.0-4.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152616" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194547" ref_url="https://bugzilla.suse.com/1194547" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- CVE-2021-4140: Fixed iframe sandbox bypass with XSLT (bsc#1194547).
- CVE-2022-22737: Fixed race condition when playing audio files (bsc#1194547).
- CVE-2022-22738: Fixed heap-buffer-overflow in blendGaussianBlur (bsc#1194547).
- CVE-2022-22739: Fixed missing throttling on external protocol launch dialog (bsc#1194547).
- CVE-2022-22740: Fixed use-after-free of ChannelEventQueue::mOwner (bsc#1194547).
- CVE-2022-22741: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22742: Fixed out-of-bounds memory access when inserting text in edit mode (bsc#1194547).
- CVE-2022-22743: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22744: Fixed possible command injection via the 'Copy as curl' feature in DevTools (bsc#1194547).
- CVE-2022-22745: Fixed leaking cross-origin URLs through securitypolicyviolation event (bsc#1194547).
- CVE-2022-22746: Fixed calling into reportValidity could have lead to fullscreen window spoof (bsc#1194547).
- CVE-2022-22747: Fixed crash when handling empty pkcs7 sequence(bsc#1194547).
- CVE-2022-22748: Fixed spoofed origin on external protocol launch dialog (bsc#1194547).
- CVE-2022-22751: Fixed memory safety bugs (bsc#1194547).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4140">CVE-2021-4140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22737">CVE-2022-22737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22738">CVE-2022-22738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22739">CVE-2022-22739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22740">CVE-2022-22740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22741">CVE-2022-22741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22742">CVE-2022-22742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22743">CVE-2022-22743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22744">CVE-2022-22744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22745">CVE-2022-22745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22746">CVE-2022-22746 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22747">CVE-2022-22747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22748">CVE-2022-22748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22751">CVE-2022-22751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663799" comment="MozillaFirefox-91.5.0-112.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663800" comment="MozillaFirefox-devel-91.5.0-112.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663801" comment="MozillaFirefox-translations-common-91.5.0-112.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152617" version="1" class="patch">
	<metadata>
		<title>Security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679302" comment="liblzma5-5.0.5-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679278" comment="liblzma5-32bit-5.0.5-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679303" comment="xz-5.0.5-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679280" comment="xz-lang-5.0.5-6.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152618" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172768" ref_url="https://bugzilla.suse.com/1172768" source="BUGZILLA"/>
		<reference ref_id="1172802" ref_url="https://bugzilla.suse.com/1172802" source="BUGZILLA"/>
		<reference ref_id="1178479" ref_url="https://bugzilla.suse.com/1178479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0181" ref_url="https://www.suse.com/security/cve/CVE-2020-0181/" source="CVE"/>
		<reference ref_id="CVE-2020-0198" ref_url="https://www.suse.com/security/cve/CVE-2020-0198/" source="CVE"/>
		<reference ref_id="CVE-2020-0452" ref_url="https://www.suse.com/security/cve/CVE-2020-0452/" source="CVE"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2020-0181: Fixed an integer overflow that could lead to denial of service
  (bsc#1172802).
- CVE-2020-0198: Fixed and unsigned integer overflow that could lead to denial
  of service (bsc#1172768).
- CVE-2020-0452: Fixed a buffer overflow check that could be optimized away
  by the compiler (bsc#1178479).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172768">SUSE bug 1172768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172802">SUSE bug 1172802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178479">SUSE bug 1178479</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0181/">CVE-2020-0181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0181">CVE-2020-0181 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0198/">CVE-2020-0198 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0198">CVE-2020-0198 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0452/">CVE-2020-0452 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0452">CVE-2020-0452 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677635" comment="libexif12-0.6.22-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677562" comment="libexif12-32bit-0.6.22-8.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152619" version="1" class="patch">
	<metadata>
		<title>Security update for python-numpy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193907" ref_url="https://bugzilla.suse.com/1193907" source="BUGZILLA"/>
		<reference ref_id="1193913" ref_url="https://bugzilla.suse.com/1193913" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33430" ref_url="https://www.suse.com/security/cve/CVE-2021-33430/" source="CVE"/>
		<reference ref_id="CVE-2021-41496" ref_url="https://www.suse.com/security/cve/CVE-2021-41496/" source="CVE"/>
		<description>
This update for python-numpy fixes the following issues:

- CVE-2021-33430: Fixed buffer overflow that could lead to DoS in PyArray_NewFromDescr_int function of ctors.c (bsc#1193913).
- CVE-2021-41496: Fixed buffer overflow that could lead to DoS in array_from_pyobj function of fortranobject.c (bsc#1193907).  
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193907">SUSE bug 1193907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193913">SUSE bug 1193913</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33430/">CVE-2021-33430 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33430">CVE-2021-33430 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41496/">CVE-2021-41496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41496">CVE-2021-41496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663808" comment="python-numpy-1.8.0-5.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152620" version="1" class="patch">
	<metadata>
		<title>Security update for zabbix (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196944" ref_url="https://bugzilla.suse.com/1196944" source="BUGZILLA"/>
		<reference ref_id="1196945" ref_url="https://bugzilla.suse.com/1196945" source="BUGZILLA"/>
		<reference ref_id="1196946" ref_url="https://bugzilla.suse.com/1196946" source="BUGZILLA"/>
		<reference ref_id="1196947" ref_url="https://bugzilla.suse.com/1196947" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24349" ref_url="https://www.suse.com/security/cve/CVE-2022-24349/" source="CVE"/>
		<reference ref_id="CVE-2022-24917" ref_url="https://www.suse.com/security/cve/CVE-2022-24917/" source="CVE"/>
		<reference ref_id="CVE-2022-24918" ref_url="https://www.suse.com/security/cve/CVE-2022-24918/" source="CVE"/>
		<reference ref_id="CVE-2022-24919" ref_url="https://www.suse.com/security/cve/CVE-2022-24919/" source="CVE"/>
		<description>
This update for zabbix fixes the following issues:

- CVE-2022-24349: Fixed a reflected XSS in the action configuration window (bsc#1196944).
- CVE-2022-24917: Fixed a reflected XSS in the service configuration window (bsc#1196945).
- CVE-2022-24918: Fixed a reflected XSS in the item configuration window (bsc#1196946).
- CVE-2022-24919: Fixed a reflected XSS in the graph configuration window (bsc#1196947).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196944">SUSE bug 1196944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196945">SUSE bug 1196945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196946">SUSE bug 1196946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196947">SUSE bug 1196947</bugzilla>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-24349/">CVE-2022-24349 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24349">CVE-2022-24349 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-24917/">CVE-2022-24917 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24917">CVE-2022-24917 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-24918/">CVE-2022-24918 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24918">CVE-2022-24918 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-24919/">CVE-2022-24919 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24919">CVE-2022-24919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674061" comment="zabbix-agent-4.0.12-4.15.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152621" version="1" class="patch">
	<metadata>
		<title>Security update for gzip (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
This update for gzip fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679548" comment="gzip-1.6-9.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152622" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1183709" ref_url="https://bugzilla.suse.com/1183709" source="BUGZILLA"/>
		<reference ref_id="1197872" ref_url="https://bugzilla.suse.com/1197872" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3448" ref_url="https://www.suse.com/security/cve/CVE-2021-3448/" source="CVE"/>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2021-3448: Fixed a potential DNS cache poisoning issue due to a constant
  outgoing port being used when for certain use cases of the --server option
  (bsc#1183709).
- CVE-2022-0934: Fixed an invalid memory access that could lead to remote denial
  of service via crafted packet (bsc#1197872).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183709">SUSE bug 1183709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197872">SUSE bug 1197872</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3448/">CVE-2021-3448 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3448">CVE-2021-3448 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0934">CVE-2022-0934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679550" comment="dnsmasq-2.78-18.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152623" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198234" ref_url="https://bugzilla.suse.com/1198234" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<description>
This update for git fixes the following issues:

- CVE-2022-24765: Fixed a potential command injection via git worktree (bsc#1198234).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198234">SUSE bug 1198234</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24765">CVE-2022-24765 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680006" comment="git-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680007" comment="git-core-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680008" comment="git-cvs-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680009" comment="git-daemon-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680010" comment="git-email-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680011" comment="git-gui-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680012" comment="git-svn-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680013" comment="git-web-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680014" comment="gitk-2.26.2-27.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152624" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196490" ref_url="https://bugzilla.suse.com/1196490" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-23308: Fixed use-after-free of ID and IDREF attributes. (bsc#1196490)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680015" comment="libxml2-2-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679983" comment="libxml2-2-32bit-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679984" comment="libxml2-doc-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680016" comment="libxml2-tools-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680017" comment="python-libxml2-2.9.4-46.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152625" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<description>
This update for SDL fixes the following issues:

- CVE-2020-14409: Fixed an integer overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c. (bsc#1181202)
- CVE-2020-14410: Fixed a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c. (bsc#1181201)
- CVE-2021-33657: Fixed a Heap overflow problem in video/SDL_pixels.c. (bsc#1198001)
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14409">CVE-2020-14409 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14410">CVE-2020-14410 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33657">CVE-2021-33657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679549" comment="libSDL-1_2-0-1.2.15-15.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679539" comment="libSDL-1_2-0-32bit-1.2.15-15.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152626" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196915" ref_url="https://bugzilla.suse.com/1196915" source="BUGZILLA"/>
		<reference ref_id="1197423" ref_url="https://bugzilla.suse.com/1197423" source="BUGZILLA"/>
		<reference ref_id="1197425" ref_url="https://bugzilla.suse.com/1197425" source="BUGZILLA"/>
		<reference ref_id="1197426" ref_url="https://bugzilla.suse.com/1197426" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26401" ref_url="https://www.suse.com/security/cve/CVE-2021-26401/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-26356" ref_url="https://www.suse.com/security/cve/CVE-2022-26356/" source="CVE"/>
		<reference ref_id="CVE-2022-26357" ref_url="https://www.suse.com/security/cve/CVE-2022-26357/" source="CVE"/>
		<reference ref_id="CVE-2022-26358" ref_url="https://www.suse.com/security/cve/CVE-2022-26358/" source="CVE"/>
		<reference ref_id="CVE-2022-26359" ref_url="https://www.suse.com/security/cve/CVE-2022-26359/" source="CVE"/>
		<reference ref_id="CVE-2022-26360" ref_url="https://www.suse.com/security/cve/CVE-2022-26360/" source="CVE"/>
		<reference ref_id="CVE-2022-26361" ref_url="https://www.suse.com/security/cve/CVE-2022-26361/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that
  could cause a denial of service in the host (bsc#1197423).
- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts
  using VT-d IOMMU hardware, which could lead to a denial of service in the host
  (bsc#1197425).
- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory
  corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be
  leveraged by an attacker to cause a denial of service in the host (bsc#1197426).
- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue
  mitigations (bsc#1196915).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-26"/>
	<updated date="2022-04-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196915">SUSE bug 1196915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197423">SUSE bug 1197423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197425">SUSE bug 1197425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26401/">CVE-2021-26401 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26401">CVE-2021-26401 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0002">CVE-2022-0002 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26356/">CVE-2022-26356 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26356">CVE-2022-26356 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26357/">CVE-2022-26357 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26357">CVE-2022-26357 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26358/">CVE-2022-26358 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26358">CVE-2022-26358 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26359/">CVE-2022-26359 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26359">CVE-2022-26359 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26360/">CVE-2022-26360 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26360">CVE-2022-26360 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26361/">CVE-2022-26361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26361">CVE-2022-26361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680580" comment="xen-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680581" comment="xen-doc-html-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680582" comment="xen-libs-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680583" comment="xen-libs-32bit-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680584" comment="xen-tools-4.9.4_28-3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680585" comment="xen-tools-domU-4.9.4_28-3.103.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152627" version="1" class="patch">
	<metadata>
		<title>Security update for ant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188468" ref_url="https://bugzilla.suse.com/1188468" source="BUGZILLA"/>
		<reference ref_id="1188469" ref_url="https://bugzilla.suse.com/1188469" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36373" ref_url="https://www.suse.com/security/cve/CVE-2021-36373/" source="CVE"/>
		<reference ref_id="CVE-2021-36374" ref_url="https://www.suse.com/security/cve/CVE-2021-36374/" source="CVE"/>
		<description>
This update for ant fixes the following issues:

- CVE-2021-36373: Fixed an excessive memory allocation when reading a specially
  crafted TAR archive (bsc#1188468).
- CVE-2021-36374: Fixed an excessive memory allocation when reading a specially
  crafted ZIP archive (bsc#1188469).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188468">SUSE bug 1188468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188469">SUSE bug 1188469</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36373/">CVE-2021-36373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36373">CVE-2021-36373 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36374/">CVE-2021-36374 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36374">CVE-2021-36374 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677593" comment="ant-1.9.4-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152628" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194019" ref_url="https://bugzilla.suse.com/1194019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8518" ref_url="https://www.suse.com/security/cve/CVE-2018-8518/" source="CVE"/>
		<reference ref_id="CVE-2018-8523" ref_url="https://www.suse.com/security/cve/CVE-2018-8523/" source="CVE"/>
		<reference ref_id="CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551/" source="CVE"/>
		<reference ref_id="CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558/" source="CVE"/>
		<reference ref_id="CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559/" source="CVE"/>
		<reference ref_id="CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563/" source="CVE"/>
		<reference ref_id="CVE-2019-8674" ref_url="https://www.suse.com/security/cve/CVE-2019-8674/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<reference ref_id="CVE-2019-8707" ref_url="https://www.suse.com/security/cve/CVE-2019-8707/" source="CVE"/>
		<reference ref_id="CVE-2019-8719" ref_url="https://www.suse.com/security/cve/CVE-2019-8719/" source="CVE"/>
		<reference ref_id="CVE-2019-8726" ref_url="https://www.suse.com/security/cve/CVE-2019-8726/" source="CVE"/>
		<reference ref_id="CVE-2019-8733" ref_url="https://www.suse.com/security/cve/CVE-2019-8733/" source="CVE"/>
		<reference ref_id="CVE-2019-8763" ref_url="https://www.suse.com/security/cve/CVE-2019-8763/" source="CVE"/>
		<reference ref_id="CVE-2019-8765" ref_url="https://www.suse.com/security/cve/CVE-2019-8765/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8768" ref_url="https://www.suse.com/security/cve/CVE-2019-8768/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8821" ref_url="https://www.suse.com/security/cve/CVE-2019-8821/" source="CVE"/>
		<reference ref_id="CVE-2019-8822" ref_url="https://www.suse.com/security/cve/CVE-2019-8822/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-3885" ref_url="https://www.suse.com/security/cve/CVE-2020-3885/" source="CVE"/>
		<reference ref_id="CVE-2020-3894" ref_url="https://www.suse.com/security/cve/CVE-2020-3894/" source="CVE"/>
		<reference ref_id="CVE-2020-3895" ref_url="https://www.suse.com/security/cve/CVE-2020-3895/" source="CVE"/>
		<reference ref_id="CVE-2020-3897" ref_url="https://www.suse.com/security/cve/CVE-2020-3897/" source="CVE"/>
		<reference ref_id="CVE-2020-3900" ref_url="https://www.suse.com/security/cve/CVE-2020-3900/" source="CVE"/>
		<reference ref_id="CVE-2020-3901" ref_url="https://www.suse.com/security/cve/CVE-2020-3901/" source="CVE"/>
		<reference ref_id="CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9952" ref_url="https://www.suse.com/security/cve/CVE-2020-9952/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1817" ref_url="https://www.suse.com/security/cve/CVE-2021-1817/" source="CVE"/>
		<reference ref_id="CVE-2021-1820" ref_url="https://www.suse.com/security/cve/CVE-2021-1820/" source="CVE"/>
		<reference ref_id="CVE-2021-1825" ref_url="https://www.suse.com/security/cve/CVE-2021-1825/" source="CVE"/>
		<reference ref_id="CVE-2021-1826" ref_url="https://www.suse.com/security/cve/CVE-2021-1826/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="CVE-2021-30661" ref_url="https://www.suse.com/security/cve/CVE-2021-30661/" source="CVE"/>
		<reference ref_id="CVE-2021-30666" ref_url="https://www.suse.com/security/cve/CVE-2021-30666/" source="CVE"/>
		<reference ref_id="CVE-2021-30682" ref_url="https://www.suse.com/security/cve/CVE-2021-30682/" source="CVE"/>
		<reference ref_id="CVE-2021-30761" ref_url="https://www.suse.com/security/cve/CVE-2021-30761/" source="CVE"/>
		<reference ref_id="CVE-2021-30762" ref_url="https://www.suse.com/security/cve/CVE-2021-30762/" source="CVE"/>
		<reference ref_id="CVE-2021-30809" ref_url="https://www.suse.com/security/cve/CVE-2021-30809/" source="CVE"/>
		<reference ref_id="CVE-2021-30818" ref_url="https://www.suse.com/security/cve/CVE-2021-30818/" source="CVE"/>
		<reference ref_id="CVE-2021-30823" ref_url="https://www.suse.com/security/cve/CVE-2021-30823/" source="CVE"/>
		<reference ref_id="CVE-2021-30836" ref_url="https://www.suse.com/security/cve/CVE-2021-30836/" source="CVE"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30848" ref_url="https://www.suse.com/security/cve/CVE-2021-30848/" source="CVE"/>
		<reference ref_id="CVE-2021-30849" ref_url="https://www.suse.com/security/cve/CVE-2021-30849/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="CVE-2021-30884" ref_url="https://www.suse.com/security/cve/CVE-2021-30884/" source="CVE"/>
		<reference ref_id="CVE-2021-30887" ref_url="https://www.suse.com/security/cve/CVE-2021-30887/" source="CVE"/>
		<reference ref_id="CVE-2021-30888" ref_url="https://www.suse.com/security/cve/CVE-2021-30888/" source="CVE"/>
		<reference ref_id="CVE-2021-30889" ref_url="https://www.suse.com/security/cve/CVE-2021-30889/" source="CVE"/>
		<reference ref_id="CVE-2021-30890" ref_url="https://www.suse.com/security/cve/CVE-2021-30890/" source="CVE"/>
		<reference ref_id="CVE-2021-30897" ref_url="https://www.suse.com/security/cve/CVE-2021-30897/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.34.3 (bsc#1194019).
- CVE-2021-30887: Fixed logic issue allowing unexpectedly unenforced Content Security Policy when processing maliciously crafted web content.
- CVE-2021-30890: Fixed logic issue allowing universal cross site scripting when processing maliciously crafted web content.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8518/">CVE-2018-8518 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8518">CVE-2018-8518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-8523/">CVE-2018-8523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-8523">CVE-2018-8523 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8551">CVE-2019-8551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8558">CVE-2019-8558 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8559">CVE-2019-8559 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8563">CVE-2019-8563 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8674/">CVE-2019-8674 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8674">CVE-2019-8674 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8681">CVE-2019-8681 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8684">CVE-2019-8684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8687">CVE-2019-8687 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8688">CVE-2019-8688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8689">CVE-2019-8689 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8690">CVE-2019-8690 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8707/">CVE-2019-8707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8707">CVE-2019-8707 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8719/">CVE-2019-8719 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8719">CVE-2019-8719 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8726/">CVE-2019-8726 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8726">CVE-2019-8726 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8733/">CVE-2019-8733 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8733">CVE-2019-8733 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8763/">CVE-2019-8763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8763">CVE-2019-8763 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8765/">CVE-2019-8765 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8765">CVE-2019-8765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8766">CVE-2019-8766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8768/">CVE-2019-8768 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8768">CVE-2019-8768 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8782">CVE-2019-8782 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8808">CVE-2019-8808 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8815">CVE-2019-8815 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8821/">CVE-2019-8821 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8821">CVE-2019-8821 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8822/">CVE-2019-8822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8822">CVE-2019-8822 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10018">CVE-2020-10018 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13753">CVE-2020-13753 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27918">CVE-2020-27918 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29623">CVE-2020-29623 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3885/">CVE-2020-3885 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3885">CVE-2020-3885 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3894/">CVE-2020-3894 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3894">CVE-2020-3894 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3895/">CVE-2020-3895 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3895">CVE-2020-3895 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3897/">CVE-2020-3897 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3897">CVE-2020-3897 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3900/">CVE-2020-3900 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3900">CVE-2020-3900 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3901/">CVE-2020-3901 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3901">CVE-2020-3901 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3902">CVE-2020-3902 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9802">CVE-2020-9802 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9803">CVE-2020-9803 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9805">CVE-2020-9805 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9947">CVE-2020-9947 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9948">CVE-2020-9948 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9951">CVE-2020-9951 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-9952/">CVE-2020-9952 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9952">CVE-2020-9952 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1765">CVE-2021-1765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1788">CVE-2021-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1817/">CVE-2021-1817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1817">CVE-2021-1817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1820/">CVE-2021-1820 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1820">CVE-2021-1820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1825/">CVE-2021-1825 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1825">CVE-2021-1825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1826/">CVE-2021-1826 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1826">CVE-2021-1826 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1844">CVE-2021-1844 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1871">CVE-2021-1871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30661/">CVE-2021-30661 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30661">CVE-2021-30661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30666/">CVE-2021-30666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30666">CVE-2021-30666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30682/">CVE-2021-30682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30682">CVE-2021-30682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30761/">CVE-2021-30761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30761">CVE-2021-30761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30762/">CVE-2021-30762 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30762">CVE-2021-30762 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30809/">CVE-2021-30809 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30809">CVE-2021-30809 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30818/">CVE-2021-30818 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30818">CVE-2021-30818 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30823/">CVE-2021-30823 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30823">CVE-2021-30823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30836/">CVE-2021-30836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30836">CVE-2021-30836 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30846">CVE-2021-30846 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30848/">CVE-2021-30848 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30848">CVE-2021-30848 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30849/">CVE-2021-30849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30849">CVE-2021-30849 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30851">CVE-2021-30851 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30858">CVE-2021-30858 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30884/">CVE-2021-30884 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30884">CVE-2021-30884 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30887/">CVE-2021-30887 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30887">CVE-2021-30887 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30888/">CVE-2021-30888 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30888">CVE-2021-30888 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30889/">CVE-2021-30889 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30889">CVE-2021-30889 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30890/">CVE-2021-30890 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30890">CVE-2021-30890 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30897/">CVE-2021-30897 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30897">CVE-2021-30897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152629" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197216" ref_url="https://bugzilla.suse.com/1197216" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2022-27239: Fixed a buffer overflow in the command line ip option (bsc#1197216).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197216">SUSE bug 1197216</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27239">CVE-2022-27239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681235" comment="cifs-utils-6.9-9.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152630" version="1" class="patch">
	<metadata>
		<title>Security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194735" ref_url="https://bugzilla.suse.com/1194735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<description>
This update for aide fixes the following issues:

- CVE-2021-45417: Fix a bufferoverflow in base64 functions (bsc#1194735)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45417">CVE-2021-45417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664239" comment="aide-0.16-20.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152631" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182104" ref_url="https://bugzilla.suse.com/1182104" source="BUGZILLA"/>
		<reference ref_id="1182105" ref_url="https://bugzilla.suse.com/1182105" source="BUGZILLA"/>
		<reference ref_id="1184757" ref_url="https://bugzilla.suse.com/1184757" source="BUGZILLA"/>
		<reference ref_id="1184798" ref_url="https://bugzilla.suse.com/1184798" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26926" ref_url="https://www.suse.com/security/cve/CVE-2021-26926/" source="CVE"/>
		<reference ref_id="CVE-2021-26927" ref_url="https://www.suse.com/security/cve/CVE-2021-26927/" source="CVE"/>
		<reference ref_id="CVE-2021-3443" ref_url="https://www.suse.com/security/cve/CVE-2021-3443/" source="CVE"/>
		<reference ref_id="CVE-2021-3467" ref_url="https://www.suse.com/security/cve/CVE-2021-3467/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2021-3467: Fixed NULL pointer deref in jp2_decode() (bsc#1184757). 
- CVE-2021-3443: Fixed NULL pointer deref in jp2_decode() (bsc#1184798).
- CVE-2021-26927: Fixed NULL pointer deref in jp2_decode() (bsc#1182104).
- CVE-2021-26926: Fixed an out of bounds read in jp2_decode() (bsc#1182105).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-29"/>
	<updated date="2022-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182104">SUSE bug 1182104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182105">SUSE bug 1182105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184757">SUSE bug 1184757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184798">SUSE bug 1184798</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26926/">CVE-2021-26926 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26926">CVE-2021-26926 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26927/">CVE-2021-26927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26927">CVE-2021-26927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3443/">CVE-2021-3443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3443">CVE-2021-3443 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3467/">CVE-2021-3467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3467">CVE-2021-3467 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680651" comment="libjasper1-1.900.14-195.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680652" comment="libjasper1-32bit-1.900.14-195.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152632" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198518" ref_url="https://bugzilla.suse.com/1198518" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1328" ref_url="https://www.suse.com/security/cve/CVE-2022-1328/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2022-1328: Fixed an invalid memory access when reading untrusted uuencoded
  data. This could result in including private memory in replies (bsc#1198518).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-29"/>
	<updated date="2022-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198518">SUSE bug 1198518</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1328/">CVE-2022-1328 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1328">CVE-2022-1328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680043" comment="mutt-1.10.1-55.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152633" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197028" ref_url="https://bugzilla.suse.com/1197028" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0856" ref_url="https://www.suse.com/security/cve/CVE-2022-0856/" source="CVE"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2022-0856: Fixed a divide by zero issue which could be exploited to cause
  an application crash (bsc#1197028).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-03"/>
	<updated date="2022-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197028">SUSE bug 1197028</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0856/">CVE-2022-0856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0856">CVE-2022-0856 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681243" comment="libcaca0-0.99.beta18-14.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152634" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197636" ref_url="https://bugzilla.suse.com/1197636" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0897" ref_url="https://www.suse.com/security/cve/CVE-2022-0897/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2022-0897: Fixed a crash in nwfilter when counting number of network filters (bsc#1197636).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-04"/>
	<updated date="2022-05-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197636">SUSE bug 1197636</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0897/">CVE-2022-0897 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0897">CVE-2022-0897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678754" comment="libvirt-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678755" comment="libvirt-admin-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678756" comment="libvirt-client-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678757" comment="libvirt-daemon-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678758" comment="libvirt-daemon-config-network-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678759" comment="libvirt-daemon-config-nwfilter-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678760" comment="libvirt-daemon-driver-interface-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678761" comment="libvirt-daemon-driver-libxl-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678762" comment="libvirt-daemon-driver-lxc-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678763" comment="libvirt-daemon-driver-network-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678764" comment="libvirt-daemon-driver-nodedev-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678765" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678766" comment="libvirt-daemon-driver-qemu-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678767" comment="libvirt-daemon-driver-secret-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678768" comment="libvirt-daemon-driver-storage-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678769" comment="libvirt-daemon-driver-storage-core-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678770" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678771" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678772" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678773" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678774" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678775" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678776" comment="libvirt-daemon-hooks-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678777" comment="libvirt-daemon-lxc-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678778" comment="libvirt-daemon-qemu-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678779" comment="libvirt-daemon-xen-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678780" comment="libvirt-doc-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678781" comment="libvirt-libs-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678782" comment="libvirt-lock-sanlock-3.3.0-5.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678783" comment="libvirt-nss-3.3.0-5.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152635" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198614" ref_url="https://bugzilla.suse.com/1198614" source="BUGZILLA"/>
		<reference ref_id="1198766" ref_url="https://bugzilla.suse.com/1198766" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22576" ref_url="https://www.suse.com/security/cve/CVE-2022-22576/" source="CVE"/>
		<reference ref_id="CVE-2022-27776" ref_url="https://www.suse.com/security/cve/CVE-2022-27776/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-27776: Fixed Auth/cookie leak on redirect (bsc#1198766)
- CVE-2022-22576: Fixed OAUTH2 bearer bypass in connection re-use (bsc#1198614)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-06"/>
	<updated date="2022-05-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198614">SUSE bug 1198614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198766">SUSE bug 1198766</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22576/">CVE-2022-22576 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22576">CVE-2022-22576 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27776/">CVE-2022-27776 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27776">CVE-2022-27776 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682672" comment="curl-7.37.0-37.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682673" comment="libcurl4-7.37.0-37.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682674" comment="libcurl4-32bit-7.37.0-37.73.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152636" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.1.0 ESR.

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-09"/>
	<updated date="2022-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29981">CVE-2021-29981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29982">CVE-2021-29982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29983">CVE-2021-29983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29987">CVE-2021-29987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29990">CVE-2021-29990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29991">CVE-2021-29991 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38492">CVE-2021-38492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38495">CVE-2021-38495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682635" comment="MozillaFirefox-91.9.0-112.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682636" comment="MozillaFirefox-devel-91.9.0-112.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682637" comment="MozillaFirefox-translations-common-91.9.0-112.104.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152637" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1107294" ref_url="https://bugzilla.suse.com/1107294" source="BUGZILLA"/>
		<reference ref_id="1107296" ref_url="https://bugzilla.suse.com/1107296" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0502" ref_url="https://www.suse.com/security/cve/CVE-2018-0502/" source="CVE"/>
		<reference ref_id="CVE-2018-13259" ref_url="https://www.suse.com/security/cve/CVE-2018-13259/" source="CVE"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2018-0502: Fixed execve call vulnerability to program named on the second line when the beginning of a #! script file was mishandled. (bsc#1107296, bsc#1107294)
- CVE-2018-13259: Fixed execve call vulnerability to program name that is a substring of the intended one. (bsc#1107296, bsc#1107294)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-24"/>
	<updated date="2022-01-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107294">SUSE bug 1107294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107296">SUSE bug 1107296</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0502/">CVE-2018-0502 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0502">CVE-2018-0502 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13259/">CVE-2018-13259 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13259">CVE-2018-13259 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663987" comment="zsh-5.0.5-6.12.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152638" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197135" ref_url="https://bugzilla.suse.com/1197135" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25220: Fixed potentially incorrect answers by cached forwarders (bsc#1197135).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-10"/>
	<updated date="2022-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197135">SUSE bug 1197135</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25220">CVE-2021-25220 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682675" comment="bind-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682676" comment="bind-chrootenv-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682677" comment="bind-doc-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682678" comment="bind-libs-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682679" comment="bind-libs-32bit-9.9.9P1-63.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682680" comment="bind-utils-9.9.9P1-63.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152639" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199242" ref_url="https://bugzilla.suse.com/1199242" source="BUGZILLA"/>
		<reference ref_id="1199244" ref_url="https://bugzilla.suse.com/1199244" source="BUGZILLA"/>
		<reference ref_id="1199245" ref_url="https://bugzilla.suse.com/1199245" source="BUGZILLA"/>
		<reference ref_id="1199246" ref_url="https://bugzilla.suse.com/1199246" source="BUGZILLA"/>
		<reference ref_id="1199274" ref_url="https://bugzilla.suse.com/1199274" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20770" ref_url="https://www.suse.com/security/cve/CVE-2022-20770/" source="CVE"/>
		<reference ref_id="CVE-2022-20771" ref_url="https://www.suse.com/security/cve/CVE-2022-20771/" source="CVE"/>
		<reference ref_id="CVE-2022-20785" ref_url="https://www.suse.com/security/cve/CVE-2022-20785/" source="CVE"/>
		<reference ref_id="CVE-2022-20792" ref_url="https://www.suse.com/security/cve/CVE-2022-20792/" source="CVE"/>
		<reference ref_id="CVE-2022-20796" ref_url="https://www.suse.com/security/cve/CVE-2022-20796/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20770: Fixed a possible infinite loop vulnerability in the CHM file parser (bsc#1199242).
- CVE-2022-20796: Fixed a possible NULL-pointer dereference crash in the scan verdict cache check (bsc#1199246).
- CVE-2022-20771: Fixed a possible infinite loop vulnerability in the TIFF file parser (bsc#1199244).
- CVE-2022-20785: Fixed a possible memory leak in the HTML file parser / Javascript normalizer (bsc#1199245).
- CVE-2022-20792: Fixed a possible multi-byte heap buffer overflow write vulnerability in the signature database load module (bsc#1199274).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-12"/>
	<updated date="2022-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199242">SUSE bug 1199242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199244">SUSE bug 1199244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199245">SUSE bug 1199245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199246">SUSE bug 1199246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199274">SUSE bug 1199274</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20770/">CVE-2022-20770 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20770">CVE-2022-20770 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20771/">CVE-2022-20771 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20771">CVE-2022-20771 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20785/">CVE-2022-20785 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20785">CVE-2022-20785 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20792/">CVE-2022-20792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20792">CVE-2022-20792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20796/">CVE-2022-20796 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20796">CVE-2022-20796 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682681" comment="clamav-0.103.6-33.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152640" version="1" class="patch">
	<metadata>
		<title>Security update for e2fsprogs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198446" ref_url="https://bugzilla.suse.com/1198446" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1304" ref_url="https://www.suse.com/security/cve/CVE-2022-1304/" source="CVE"/>
		<description>
This update for e2fsprogs fixes the following issues:

- CVE-2022-1304: Fixed out-of-bounds read/write leading to segmentation fault
  and possibly arbitrary code execution. (bsc#1198446)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-12"/>
	<updated date="2022-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198446">SUSE bug 1198446</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1304/">CVE-2022-1304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">CVE-2022-1304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682319" comment="e2fsprogs-1.42.11-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682320" comment="libcom_err2-1.42.11-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682310" comment="libcom_err2-32bit-1.42.11-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682321" comment="libext2fs2-1.42.11-16.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152641" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188568" ref_url="https://bugzilla.suse.com/1188568" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2432" ref_url="https://www.suse.com/security/cve/CVE-2021-2432/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 5 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2432: Fixed a vulnerability in the omponent JNDI. (bsc#1188568)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-24"/>
	<updated date="2022-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188568">SUSE bug 1188568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-2432/">CVE-2021-2432 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2432">CVE-2021-2432 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41035">CVE-2021-41035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662499" comment="java-1_7_1-ibm-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662487" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662500" comment="java-1_7_1-ibm-devel-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662501" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662490" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.0-38.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152642" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1195964" ref_url="https://bugzilla.suse.com/1195964" source="BUGZILLA"/>
		<reference ref_id="1195965" ref_url="https://bugzilla.suse.com/1195965" source="BUGZILLA"/>
		<reference ref_id="1197066" ref_url="https://bugzilla.suse.com/1197066" source="BUGZILLA"/>
		<reference ref_id="1197068" ref_url="https://bugzilla.suse.com/1197068" source="BUGZILLA"/>
		<reference ref_id="1197072" ref_url="https://bugzilla.suse.com/1197072" source="BUGZILLA"/>
		<reference ref_id="1197073" ref_url="https://bugzilla.suse.com/1197073" source="BUGZILLA"/>
		<reference ref_id="1197074" ref_url="https://bugzilla.suse.com/1197074" source="BUGZILLA"/>
		<reference ref_id="1197631" ref_url="https://bugzilla.suse.com/1197631" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0561" ref_url="https://www.suse.com/security/cve/CVE-2022-0561/" source="CVE"/>
		<reference ref_id="CVE-2022-0562" ref_url="https://www.suse.com/security/cve/CVE-2022-0562/" source="CVE"/>
		<reference ref_id="CVE-2022-0865" ref_url="https://www.suse.com/security/cve/CVE-2022-0865/" source="CVE"/>
		<reference ref_id="CVE-2022-0891" ref_url="https://www.suse.com/security/cve/CVE-2022-0891/" source="CVE"/>
		<reference ref_id="CVE-2022-0908" ref_url="https://www.suse.com/security/cve/CVE-2022-0908/" source="CVE"/>
		<reference ref_id="CVE-2022-0909" ref_url="https://www.suse.com/security/cve/CVE-2022-0909/" source="CVE"/>
		<reference ref_id="CVE-2022-0924" ref_url="https://www.suse.com/security/cve/CVE-2022-0924/" source="CVE"/>
		<reference ref_id="CVE-2022-1056" ref_url="https://www.suse.com/security/cve/CVE-2022-1056/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2022-0561: Fixed null source pointer passed as an argument to memcpy() within TIFFFetchStripThing() in tif_dirread.c (bsc#1195964).
- CVE-2022-0562: Fixed null source pointer passed as an argument to memcpy() within TIFFReadDirectory() in tif_dirread.c (bsc#1195965).
- CVE-2022-0865: Fixed assertion failure in TIFFReadAndRealloc (bsc#1197066).
- CVE-2022-0909: Fixed divide by zero error in tiffcrop that could have led to a denial-of-service via a crafted tiff file (bsc#1197072).
- CVE-2022-0924: Fixed out-of-bounds read error in tiffcp that could have led to a denial-of-service via a crafted tiff file (bsc#1197073).
- CVE-2022-0908: Fixed null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() (bsc#1197074).
- CVE-2022-1056: Fixed out-of-bounds read error in tiffcrop that could have led to a denial-of-service via a crafted tiff file (bsc#1197631).
- CVE-2022-0891: Fixed heap buffer overflow in extractImageSection (bsc#1197068).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195964">SUSE bug 1195964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195965">SUSE bug 1195965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197066">SUSE bug 1197066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197068">SUSE bug 1197068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197072">SUSE bug 1197072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197073">SUSE bug 1197073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197074">SUSE bug 1197074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197631">SUSE bug 1197631</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0561/">CVE-2022-0561 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0561">CVE-2022-0561 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0562/">CVE-2022-0562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0562">CVE-2022-0562 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0865/">CVE-2022-0865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0865">CVE-2022-0865 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0891/">CVE-2022-0891 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0891">CVE-2022-0891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0908/">CVE-2022-0908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0908">CVE-2022-0908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0909/">CVE-2022-0909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0909">CVE-2022-0909 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0924/">CVE-2022-0924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0924">CVE-2022-0924 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1056/">CVE-2022-1056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1056">CVE-2022-1056 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683244" comment="libtiff5-4.0.9-44.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683245" comment="libtiff5-32bit-4.0.9-44.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683246" comment="tiff-4.0.9-44.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152643" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198383" ref_url="https://bugzilla.suse.com/1198383" source="BUGZILLA"/>
		<reference ref_id="1199240" ref_url="https://bugzilla.suse.com/1199240" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29155" ref_url="https://www.suse.com/security/cve/CVE-2022-29155/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2022-29155: Fixed SQL injection in back-sql (bsc#1199240).
- Fixed issue with SASL init that crashed slapd at startup under certain conditions (bsc#1198383).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198383">SUSE bug 1198383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199240">SUSE bug 1199240</bugzilla>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29155/">CVE-2022-29155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29155">CVE-2022-29155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682642" comment="libldap-2_4-2-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682621" comment="libldap-2_4-2-32bit-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682643" comment="openldap2-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682644" comment="openldap2-back-meta-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682645" comment="openldap2-client-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682625" comment="openldap2-doc-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682659" comment="openldap2-ppolicy-check-password-1.2-18.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152644" version="1" class="patch">
	<metadata>
		<title>Security update for gzip (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
This update for gzip fixes the following issues:

- CVE-2022-1271: Add hardening for zgrep. (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682638" comment="gzip-1.6-9.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152645" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="1198290" ref_url="https://bugzilla.suse.com/1198290" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<reference ref_id="CVE-2022-22624" ref_url="https://www.suse.com/security/cve/CVE-2022-22624/" source="CVE"/>
		<reference ref_id="CVE-2022-22628" ref_url="https://www.suse.com/security/cve/CVE-2022-22628/" source="CVE"/>
		<reference ref_id="CVE-2022-22629" ref_url="https://www.suse.com/security/cve/CVE-2022-22629/" source="CVE"/>
		<reference ref_id="CVE-2022-22637" ref_url="https://www.suse.com/security/cve/CVE-2022-22637/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.0 (bsc#1198290):

- CVE-2022-22624: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22628: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22629: Fixed a buffer overflow that may lead to arbitrary code execution.
- CVE-2022-22637: Fixed an unexpected cross-origin behavior due to a logic error.

Missing CVE reference for the update to 2.34.6 (bsc#1196133):

- CVE-2022-22594: Fixed a cross-origin issue in the IndexDB API.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198290">SUSE bug 1198290</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22594">CVE-2022-22594 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22624/">CVE-2022-22624 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22624">CVE-2022-22624 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22628/">CVE-2022-22628 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22628">CVE-2022-22628 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22629/">CVE-2022-22629 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22629">CVE-2022-22629 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22637/">CVE-2022-22637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22637">CVE-2022-22637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681316" comment="libjavascriptcoregtk-4_0-18-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681317" comment="libwebkit2gtk-4_0-37-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681318" comment="typelib-1_0-JavaScriptCore-4_0-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681319" comment="typelib-1_0-WebKit2-4_0-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681320" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681321" comment="webkit2gtk-4_0-injected-bundles-2.36.0-2.96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152646" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1124150" ref_url="https://bugzilla.suse.com/1124150" source="BUGZILLA"/>
		<reference ref_id="1129202" ref_url="https://bugzilla.suse.com/1129202" source="BUGZILLA"/>
		<reference ref_id="1130229" ref_url="https://bugzilla.suse.com/1130229" source="BUGZILLA"/>
		<reference ref_id="1131696" ref_url="https://bugzilla.suse.com/1131696" source="BUGZILLA"/>
		<reference ref_id="1131722" ref_url="https://bugzilla.suse.com/1131722" source="BUGZILLA"/>
		<reference ref_id="1142465" ref_url="https://bugzilla.suse.com/1142465" source="BUGZILLA"/>
		<reference ref_id="1143950" ref_url="https://bugzilla.suse.com/1143950" source="BUGZILLA"/>
		<reference ref_id="1179163" ref_url="https://bugzilla.suse.com/1179163" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10871" ref_url="https://www.suse.com/security/cve/CVE-2019-10871/" source="CVE"/>
		<reference ref_id="CVE-2019-10872" ref_url="https://www.suse.com/security/cve/CVE-2019-10872/" source="CVE"/>
		<reference ref_id="CVE-2019-14494" ref_url="https://www.suse.com/security/cve/CVE-2019-14494/" source="CVE"/>
		<reference ref_id="CVE-2019-7310" ref_url="https://www.suse.com/security/cve/CVE-2019-7310/" source="CVE"/>
		<reference ref_id="CVE-2019-9631" ref_url="https://www.suse.com/security/cve/CVE-2019-9631/" source="CVE"/>
		<reference ref_id="CVE-2019-9903" ref_url="https://www.suse.com/security/cve/CVE-2019-9903/" source="CVE"/>
		<reference ref_id="CVE-2019-9959" ref_url="https://www.suse.com/security/cve/CVE-2019-9959/" source="CVE"/>
		<reference ref_id="CVE-2020-27778" ref_url="https://www.suse.com/security/cve/CVE-2020-27778/" source="CVE"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2020-27778: Fixed a buffer overflow in pdftohtml (bsc#1179163).
- CVE-2019-14494: Fixed a divide-by-zero error in pdftoppm (bsc#1143950).
- CVE-2019-9959: Fixed an integer overflow in pdftocairo (bsc#1142465).
- CVE-2019-10871: Fixed an invalid memory access in pdftops (bsc#1131696).
- CVE-2019-10872: Fixed an invalid memory access in pdftoppm (bsc#1131722).
- CVE-2019-9903: Fixed a buffer overflow in pdfunite (bsc#1130229).
- CVE-2019-7310: Fixed an application crash in pdftocairo (bsc#1124150).
- CVE-2019-9631: Fixed an invalid memory access in pdftocairo (bsc#1129202).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-18"/>
	<updated date="2022-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124150">SUSE bug 1124150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129202">SUSE bug 1129202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130229">SUSE bug 1130229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131696">SUSE bug 1131696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131722">SUSE bug 1131722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142465">SUSE bug 1142465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143950">SUSE bug 1143950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179163">SUSE bug 1179163</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10871/">CVE-2019-10871 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10871">CVE-2019-10871 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10872/">CVE-2019-10872 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10872">CVE-2019-10872 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14494/">CVE-2019-14494 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14494">CVE-2019-14494 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7310/">CVE-2019-7310 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7310">CVE-2019-7310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9631/">CVE-2019-9631 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9631">CVE-2019-9631 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9903/">CVE-2019-9903 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9903">CVE-2019-9903 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9959/">CVE-2019-9959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9959">CVE-2019-9959 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27778/">CVE-2020-27778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27778">CVE-2020-27778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680647" comment="libpoppler-glib8-0.43.0-16.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680648" comment="libpoppler-qt4-4-0.43.0-16.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680649" comment="libpoppler60-0.43.0-16.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680650" comment="poppler-tools-0.43.0-16.19.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152647" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199223" ref_url="https://bugzilla.suse.com/1199223" source="BUGZILLA"/>
		<reference ref_id="1199224" ref_url="https://bugzilla.suse.com/1199224" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27781" ref_url="https://www.suse.com/security/cve/CVE-2022-27781/" source="CVE"/>
		<reference ref_id="CVE-2022-27782" ref_url="https://www.suse.com/security/cve/CVE-2022-27782/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-27781: Fixed CERTINFO never-ending busy-loop (bsc#1199223)
- CVE-2022-27782: Fixed TLS and SSH connection too eager reuse (bsc#1199224)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-18"/>
	<updated date="2022-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199223">SUSE bug 1199223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199224">SUSE bug 1199224</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-27781/">CVE-2022-27781 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27781">CVE-2022-27781 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27782/">CVE-2022-27782 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27782">CVE-2022-27782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684081" comment="curl-7.37.0-37.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684082" comment="libcurl4-7.37.0-37.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684074" comment="libcurl4-32bit-7.37.0-37.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152648" version="1" class="patch">
	<metadata>
		<title>Security update for libyajl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198405" ref_url="https://bugzilla.suse.com/1198405" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24795" ref_url="https://www.suse.com/security/cve/CVE-2022-24795/" source="CVE"/>
		<description>

This update for libyajl fixes the following issue:

- CVE-2022-24795: Fixed a heap-based buffer overflow when handling large inputs due to an integer overflow (bsc#1198405)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-14"/>
	<updated date="2022-06-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198405">SUSE bug 1198405</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24795/">CVE-2022-24795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24795">CVE-2022-24795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696672" comment="libyajl2-2.0.1-18.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696673" comment="libyajl2-32bit-2.0.1-18.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152649" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198717" ref_url="https://bugzilla.suse.com/1198717" source="BUGZILLA"/>
		<reference ref_id="1199423" ref_url="https://bugzilla.suse.com/1199423" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21151" ref_url="https://www.suse.com/security/cve/CVE-2022-21151/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220510 release. (bsc#1199423)
Updated to Intel CPU Microcode 20220419 release. (bsc#1198717)

- CVE-2022-21151: Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access (bsc#1199423).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198717">SUSE bug 1198717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199423">SUSE bug 1199423</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21151/">CVE-2022-21151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21151">CVE-2022-21151 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683677" comment="ucode-intel-20220510-13.97.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152650" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198970" ref_url="https://bugzilla.suse.com/1198970" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909/" source="CVE"/>
		<reference ref_id="CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911/" source="CVE"/>
		<reference ref_id="CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912/" source="CVE"/>
		<reference ref_id="CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914/" source="CVE"/>
		<reference ref_id="CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916/" source="CVE"/>
		<reference ref_id="CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.9.0 ESR (MFSA 2022-17)(bsc#1198970):

- CVE-2022-29914: Fullscreen notification bypass using popups
- CVE-2022-29909: Bypassing permission prompt in nested browsing contexts
- CVE-2022-29916: Leaking browser history with CSS variables
- CVE-2022-29911: iframe Sandbox bypass
- CVE-2022-29912: Reader mode bypassed SameSite cookies
- CVE-2022-29917: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29909">CVE-2022-29909 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29911">CVE-2022-29911 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29912">CVE-2022-29912 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29914">CVE-2022-29914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29916">CVE-2022-29916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29917">CVE-2022-29917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684083" comment="MozillaFirefox-91.9.0-112.108.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684084" comment="MozillaFirefox-devel-91.9.0-112.108.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684085" comment="MozillaFirefox-translations-common-91.9.0-112.108.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152651" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1183533" ref_url="https://bugzilla.suse.com/1183533" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28153" ref_url="https://www.suse.com/security/cve/CVE-2021-28153/" source="CVE"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2021-28153: Fixed a dangling symlink when g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION (bsc#1183533).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1183533">SUSE bug 1183533</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28153/">CVE-2021-28153 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28153">CVE-2021-28153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681100" comment="glib2-lang-2.48.2-12.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681101" comment="glib2-tools-2.48.2-12.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681102" comment="libgio-2_0-0-2.48.2-12.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681103" comment="libgio-2_0-0-32bit-2.48.2-12.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681104" comment="libglib-2_0-0-2.48.2-12.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681105" comment="libglib-2_0-0-32bit-2.48.2-12.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681106" comment="libgmodule-2_0-0-2.48.2-12.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681107" comment="libgmodule-2_0-0-32bit-2.48.2-12.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681108" comment="libgobject-2_0-0-2.48.2-12.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681109" comment="libgobject-2_0-0-32bit-2.48.2-12.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681110" comment="libgthread-2_0-0-2.48.2-12.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681111" comment="libgthread-2_0-0-32bit-2.48.2-12.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152652" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199349" ref_url="https://bugzilla.suse.com/1199349" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-30333" ref_url="https://www.suse.com/security/cve/CVE-2022-30333/" source="CVE"/>
		<description>
This update for unrar fixes the following issues:

- CVE-2022-30333: Fixed directory traversal issue that allowed writing to non-designated paths (bsc#1199349).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1199349">SUSE bug 1199349</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-30333/">CVE-2022-30333 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30333">CVE-2022-30333 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683728" comment="unrar-5.6.1-4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152653" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194251" ref_url="https://bugzilla.suse.com/1194251" source="BUGZILLA"/>
		<reference ref_id="1194362" ref_url="https://bugzilla.suse.com/1194362" source="BUGZILLA"/>
		<reference ref_id="1194474" ref_url="https://bugzilla.suse.com/1194474" source="BUGZILLA"/>
		<reference ref_id="1194476" ref_url="https://bugzilla.suse.com/1194476" source="BUGZILLA"/>
		<reference ref_id="1194477" ref_url="https://bugzilla.suse.com/1194477" source="BUGZILLA"/>
		<reference ref_id="1194478" ref_url="https://bugzilla.suse.com/1194478" source="BUGZILLA"/>
		<reference ref_id="1194479" ref_url="https://bugzilla.suse.com/1194479" source="BUGZILLA"/>
		<reference ref_id="1194480" ref_url="https://bugzilla.suse.com/1194480" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2021-45960: Fixed left shift in the storeAtts function in xmlparse.c that can lead to realloc misbehavior (bsc#1194251).
- CVE-2021-46143: Fixed integer overflow in m_groupSize in doProlog (bsc#1194362).
- CVE-2022-22822: Fixed integer overflow in addBinding in xmlparse.c (bsc#1194474).
- CVE-2022-22823: Fixed integer overflow in build_model in xmlparse.c (bsc#1194476).
- CVE-2022-22824: Fixed integer overflow in defineAttribute in xmlparse.c (bsc#1194477).
- CVE-2022-22825: Fixed integer overflow in lookup in xmlparse.c (bsc#1194478).
- CVE-2022-22826: Fixed integer overflow in nextScaffoldPart in xmlparse.c (bsc#1194479).
- CVE-2022-22827: Fixed integer overflow in storeAtts in xmlparse.c (bsc#1194480).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">CVE-2021-45960 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">CVE-2021-46143 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">CVE-2022-22825 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">CVE-2022-22826 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">CVE-2022-22827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664107" comment="expat-2.1.0-21.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664108" comment="libexpat1-2.1.0-21.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664105" comment="libexpat1-32bit-2.1.0-21.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152654" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199475" ref_url="https://bugzilla.suse.com/1199475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:
 
- CVE-2022-1552: Confine additional operations within 'security restricted operation' sandboxes (bsc#1199475).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199475">SUSE bug 1199475</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696333" comment="postgresql10-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696334" comment="postgresql10-contrib-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696064" comment="postgresql10-docs-10.21-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696338" comment="postgresql10-server-10.21-4.28.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152655" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199768" ref_url="https://bugzilla.suse.com/1199768" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1529" ref_url="https://www.suse.com/security/cve/CVE-2022-1529/" source="CVE"/>
		<reference ref_id="CVE-2022-1802" ref_url="https://www.suse.com/security/cve/CVE-2022-1802/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.9.1 ESR - MFSA 2022-19 (bsc#1199768):

- CVE-2022-1802: Prototype pollution in Top-Level Await implementation
- CVE-2022-1529: Untrusted input used in JavaScript object indexing, leading to prototype pollution
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199768">SUSE bug 1199768</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1529/">CVE-2022-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1529">CVE-2022-1529 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1802/">CVE-2022-1802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1802">CVE-2022-1802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696339" comment="MozillaFirefox-91.9.1-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696340" comment="MozillaFirefox-devel-91.9.1-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696341" comment="MozillaFirefox-translations-common-91.9.1-112.111.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152656" version="1" class="patch">
	<metadata>
		<title>Security update for python-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<description>
This update for python-requests fixes the following issues:

- CVE-2018-18074: Fixed to prevent the package to send an HTTP Authorization header to an http URI
  upon receiving a same-hostname https-to-http redirect. (bsc#1111622) 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595040" comment="python-requests-2.11.1-6.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152657" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1069689" ref_url="https://bugzilla.suse.com/1069689" source="BUGZILLA"/>
		<reference ref_id="1199132" ref_url="https://bugzilla.suse.com/1199132" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16932" ref_url="https://www.suse.com/security/cve/CVE-2017-16932/" source="CVE"/>
		<reference ref_id="CVE-2022-29824" ref_url="https://www.suse.com/security/cve/CVE-2022-29824/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-29824: Fixed integer overflow leading to out-of-bounds write in buf.c and tree.c (bsc#1199132).
- CVE-2017-16932: Prevent infinite recursion in parameter entities (bsc#1069689).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-24"/>
	<updated date="2022-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1069689">SUSE bug 1069689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199132">SUSE bug 1199132</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16932/">CVE-2017-16932 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16932">CVE-2017-16932 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29824/">CVE-2022-29824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824">CVE-2022-29824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696342" comment="libxml2-2-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696073" comment="libxml2-2-32bit-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696074" comment="libxml2-doc-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696343" comment="libxml2-tools-2.9.4-46.54.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696344" comment="python-libxml2-2.9.4-46.54.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152658" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199475" ref_url="https://bugzilla.suse.com/1199475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<description>
This update for postgresql13 fixes the following issues:
 
- CVE-2022-1552: Confine additional operations within 'security restricted operation' sandboxes (bsc#1199475).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-25"/>
	<updated date="2022-05-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199475">SUSE bug 1199475</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696674" comment="postgresql13-13.7-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696675" comment="postgresql13-contrib-13.7-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696676" comment="postgresql13-docs-13.7-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696677" comment="postgresql13-plperl-13.7-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696678" comment="postgresql13-plpython-13.7-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696679" comment="postgresql13-pltcl-13.7-3.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696680" comment="postgresql13-server-13.7-3.21.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152659" version="1" class="patch">
	<metadata>
		<title>Security update for pcre2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199232" ref_url="https://bugzilla.suse.com/1199232" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1586" ref_url="https://www.suse.com/security/cve/CVE-2022-1586/" source="CVE"/>
		<description>
This update for pcre2 fixes the following issues:

- CVE-2022-1586: Fixed out-of-bounds read via missing Unicode property matching issue in JIT compiled regular expressions (bsc#1199232).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-25"/>
	<updated date="2022-05-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199232">SUSE bug 1199232</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1586/">CVE-2022-1586 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">CVE-2022-1586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696345" comment="libpcre2-16-0-10.34-1.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696346" comment="libpcre2-32-0-10.34-1.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696347" comment="libpcre2-8-0-10.34-1.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696348" comment="libpcre2-posix2-10.34-1.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152660" version="1" class="patch">
	<metadata>
		<title>Security update for fribidi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196147" ref_url="https://bugzilla.suse.com/1196147" source="BUGZILLA"/>
		<reference ref_id="1196148" ref_url="https://bugzilla.suse.com/1196148" source="BUGZILLA"/>
		<reference ref_id="1196150" ref_url="https://bugzilla.suse.com/1196150" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25308" ref_url="https://www.suse.com/security/cve/CVE-2022-25308/" source="CVE"/>
		<reference ref_id="CVE-2022-25309" ref_url="https://www.suse.com/security/cve/CVE-2022-25309/" source="CVE"/>
		<reference ref_id="CVE-2022-25310" ref_url="https://www.suse.com/security/cve/CVE-2022-25310/" source="CVE"/>
		<description>
This update for fribidi fixes the following issues:

- CVE-2022-25308: Fixed stack out of bounds read (bsc#1196147).
- CVE-2022-25309: Fixed heap-buffer-overflow in fribidi_cap_rtl_to_unicode (bsc#1196148).
- CVE-2022-25310: Fixed NULL pointer dereference in fribidi_remove_bidi_marks (bsc#1196150).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-25"/>
	<updated date="2022-05-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196147">SUSE bug 1196147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196148">SUSE bug 1196148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196150">SUSE bug 1196150</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25308/">CVE-2022-25308 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25308">CVE-2022-25308 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-25309/">CVE-2022-25309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25309">CVE-2022-25309 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25310/">CVE-2022-25310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25310">CVE-2022-25310 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696681" comment="fribidi-0.19.2-14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696682" comment="fribidi-32bit-0.19.2-14.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152661" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1131644" ref_url="https://bugzilla.suse.com/1131644" source="BUGZILLA"/>
		<reference ref_id="1131868" ref_url="https://bugzilla.suse.com/1131868" source="BUGZILLA"/>
		<reference ref_id="1131870" ref_url="https://bugzilla.suse.com/1131870" source="BUGZILLA"/>
		<reference ref_id="1131871" ref_url="https://bugzilla.suse.com/1131871" source="BUGZILLA"/>
		<reference ref_id="1131872" ref_url="https://bugzilla.suse.com/1131872" source="BUGZILLA"/>
		<reference ref_id="1131874" ref_url="https://bugzilla.suse.com/1131874" source="BUGZILLA"/>
		<reference ref_id="1133640" ref_url="https://bugzilla.suse.com/1133640" source="BUGZILLA"/>
		<reference ref_id="1144443" ref_url="https://bugzilla.suse.com/1144443" source="BUGZILLA"/>
		<reference ref_id="1156920" ref_url="https://bugzilla.suse.com/1156920" source="BUGZILLA"/>
		<reference ref_id="1165266" ref_url="https://bugzilla.suse.com/1165266" source="BUGZILLA"/>
		<reference ref_id="1166933" ref_url="https://bugzilla.suse.com/1166933" source="BUGZILLA"/>
		<reference ref_id="1167331" ref_url="https://bugzilla.suse.com/1167331" source="BUGZILLA"/>
		<reference ref_id="1182805" ref_url="https://bugzilla.suse.com/1182805" source="BUGZILLA"/>
		<reference ref_id="1194732" ref_url="https://bugzilla.suse.com/1194732" source="BUGZILLA"/>
		<reference ref_id="1194733" ref_url="https://bugzilla.suse.com/1194733" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8041" ref_url="https://www.suse.com/security/cve/CVE-2015-8041/" source="CVE"/>
		<reference ref_id="CVE-2017-13077" ref_url="https://www.suse.com/security/cve/CVE-2017-13077/" source="CVE"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-13082" ref_url="https://www.suse.com/security/cve/CVE-2017-13082/" source="CVE"/>
		<reference ref_id="CVE-2017-13086" ref_url="https://www.suse.com/security/cve/CVE-2017-13086/" source="CVE"/>
		<reference ref_id="CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087/" source="CVE"/>
		<reference ref_id="CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088/" source="CVE"/>
		<reference ref_id="CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526/" source="CVE"/>
		<reference ref_id="CVE-2019-11555" ref_url="https://www.suse.com/security/cve/CVE-2019-11555/" source="CVE"/>
		<reference ref_id="CVE-2019-13377" ref_url="https://www.suse.com/security/cve/CVE-2019-13377/" source="CVE"/>
		<reference ref_id="CVE-2019-9494" ref_url="https://www.suse.com/security/cve/CVE-2019-9494/" source="CVE"/>
		<reference ref_id="CVE-2019-9495" ref_url="https://www.suse.com/security/cve/CVE-2019-9495/" source="CVE"/>
		<reference ref_id="CVE-2019-9497" ref_url="https://www.suse.com/security/cve/CVE-2019-9497/" source="CVE"/>
		<reference ref_id="CVE-2019-9498" ref_url="https://www.suse.com/security/cve/CVE-2019-9498/" source="CVE"/>
		<reference ref_id="CVE-2019-9499" ref_url="https://www.suse.com/security/cve/CVE-2019-9499/" source="CVE"/>
		<reference ref_id="CVE-2022-23303" ref_url="https://www.suse.com/security/cve/CVE-2022-23303/" source="CVE"/>
		<reference ref_id="CVE-2022-23304" ref_url="https://www.suse.com/security/cve/CVE-2022-23304/" source="CVE"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2022-23303, CVE-2022-23304: Fixed SAE/EAP-pwd side-channel attacks (bsc#1194732, bsc#1194733)
- CVE-2021-0326: Fixed P2P group information processing vulnerability (bsc#1181777)

- Fix systemd device ready dependencies in wpa_supplicant@.service file. (bsc#1182805)

- Limit P2P_DEVICE name to appropriate ifname size
- Enable SAE support(jsc#SLE-14992).
- Fix wicked wlan (bsc#1156920)
- Change wpa_supplicant.service to ensure wpa_supplicant gets started before
  network. Fix WLAN config on boot with wicked. (bsc#1166933)

- Adjust the service to start after network.target wrt bsc#1165266

Update to 2.9 release:

* SAE changes
  - disable use of groups using Brainpool curves
  - improved protection against side channel attacks
  [https://w1.fi/security/2019-6/]
* EAP-pwd changes
  - disable use of groups using Brainpool curves
  - allow the set of groups to be configured (eap_pwd_groups)
  - improved protection against side channel attacks
  [https://w1.fi/security/2019-6/]
* fixed FT-EAP initial mobility domain association using PMKSA caching
  (disabled by default for backwards compatibility; can be enabled
  with ft_eap_pmksa_caching=1)
* fixed a regression in OpenSSL 1.1+ engine loading
* added validation of RSNE in (Re)Association Response frames
* fixed DPP bootstrapping URI parser of channel list
* extended EAP-SIM/AKA fast re-authentication to allow use with FILS
* extended ca_cert_blob to support PEM format
* improved robustness of P2P Action frame scheduling
* added support for EAP-SIM/AKA using anonymous@realm identity
* fixed Hotspot 2.0 credential selection based on roaming consortium
  to ignore credentials without a specific EAP method
* added experimental support for EAP-TEAP peer (RFC 7170)
* added experimental support for EAP-TLS peer with TLS v1.3
* fixed a regression in WMM parameter configuration for a TDLS peer
* fixed a regression in operation with drivers that offload 802.1X
  4-way handshake
* fixed an ECDH operation corner case with OpenSSL
* SAE changes
  - added support for SAE Password Identifier
  - changed default configuration to enable only groups 19, 20, 21
    (i.e., disable groups 25 and 26) and disable all unsuitable groups
    completely based on REVmd changes
  - do not regenerate PWE unnecessarily when the AP uses the
    anti-clogging token mechanisms
  - fixed some association cases where both SAE and FT-SAE were enabled
    on both the station and the selected AP
  - started to prefer FT-SAE over SAE AKM if both are enabled
  - started to prefer FT-SAE over FT-PSK if both are enabled
  - fixed FT-SAE when SAE PMKSA caching is used
  - reject use of unsuitable groups based on new implementation guidance
    in REVmd (allow only FFC groups with prime &gt;= 3072 bits and ECC
    groups with prime &gt;= 256)
  - minimize timing and memory use differences in PWE derivation
    [https://w1.fi/security/2019-1/] (CVE-2019-9494, bsc#1131868)
* EAP-pwd changes
  - minimize timing and memory use differences in PWE derivation
    [https://w1.fi/security/2019-2/] (CVE-2019-9495, bsc#1131870)
  - verify server scalar/element
    [https://w1.fi/security/2019-4/] (CVE-2019-9497, CVE-2019-9498,
    CVE-2019-9499, bsc#1131874, bsc#1131872, bsc#1131871, bsc#1131644)
  - fix message reassembly issue with unexpected fragment
    [https://w1.fi/security/2019-5/] (CVE-2019-11555, bsc#1133640)
  - enforce rand,mask generation rules more strictly
  - fix a memory leak in PWE derivation
  - disallow ECC groups with a prime under 256 bits (groups 25, 26, and
    27)
  - SAE/EAP-pwd side-channel attack update
    [https://w1.fi/security/2019-6/] (CVE-2019-13377, bsc#1144443)
* fixed CONFIG_IEEE80211R=y (FT) build without CONFIG_FILS=y
* Hotspot 2.0 changes
  - do not indicate release number that is higher than the one
    AP supports
  - added support for release number 3
  - enable PMF automatically for network profiles created from
    credentials
* fixed OWE network profile saving
* fixed DPP network profile saving
* added support for RSN operating channel validation
  (CONFIG_OCV=y and network profile parameter ocv=1)
* added Multi-AP backhaul STA support
* fixed build with LibreSSL
* number of MKA/MACsec fixes and extensions
* extended domain_match and domain_suffix_match to allow list of values
* fixed dNSName matching in domain_match and domain_suffix_match when
  using wolfSSL
* started to prefer FT-EAP-SHA384 over WPA-EAP-SUITE-B-192 AKM if both
  are enabled
* extended nl80211 Connect and external authentication to support
  SAE, FT-SAE, FT-EAP-SHA384
* fixed KEK2 derivation for FILS+FT
* extended client_cert file to allow loading of a chain of PEM
  encoded certificates
* extended beacon reporting functionality
* extended D-Bus interface with number of new properties
* fixed a regression in FT-over-DS with mac80211-based drivers
* OpenSSL: allow systemwide policies to be overridden
* extended driver flags indication for separate 802.1X and PSK
  4-way handshake offload capability
* added support for random P2P Device/Interface Address use
* extended PEAP to derive EMSK to enable use with ERP/FILS
* extended WPS to allow SAE configuration to be added automatically
  for PSK (wps_cred_add_sae=1)
* removed support for the old D-Bus interface (CONFIG_CTRL_IFACE_DBUS)
* extended domain_match and domain_suffix_match to allow list of values
* added a RSN workaround for misbehaving PMF APs that advertise
  IGTK/BIP KeyID using incorrect byte order
* fixed PTK rekeying with FILS and FT
* fixed WPA packet number reuse with replayed messages and key
  reinstallation
  [https://w1.fi/security/2017-1/] (CVE-2017-13077, CVE-2017-13078,
  CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082,
  CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)
* fixed unauthenticated EAPOL-Key decryption in wpa_supplicant
  [https://w1.fi/security/2018-1/] (CVE-2018-14526)
* added support for FILS (IEEE 802.11ai) shared key authentication
* added support for OWE (Opportunistic Wireless Encryption, RFC 8110;
  and transition mode defined by WFA)
* added support for DPP (Wi-Fi Device Provisioning Protocol)
* added support for RSA 3k key case with Suite B 192-bit level
* fixed Suite B PMKSA caching not to update PMKID during each 4-way
  handshake
* fixed EAP-pwd pre-processing with PasswordHashHash
* added EAP-pwd client support for salted passwords
* fixed a regression in TDLS prohibited bit validation
* started to use estimated throughput to avoid undesired signal
  strength based roaming decision
* MACsec/MKA:
  - new macsec_linux driver interface support for the Linux
    kernel macsec module
  - number of fixes and extensions
* added support for external persistent storage of PMKSA cache
  (PMKSA_GET/PMKSA_ADD control interface commands; and
   MESH_PMKSA_GET/MESH_PMKSA_SET for the mesh case)
* fixed mesh channel configuration pri/sec switch case
* added support for beacon report
* large number of other fixes, cleanup, and extensions
* added support for randomizing local address for GAS queries
  (gas_rand_mac_addr parameter)
* fixed EAP-SIM/AKA/AKA' ext auth cases within TLS tunnel
* added option for using random WPS UUID (auto_uuid=1)
* added SHA256-hash support for OCSP certificate matching
* fixed EAP-AKA' to add AT_KDF into Synchronization-Failure
* fixed a regression in RSN pre-authentication candidate selection
* added option to configure allowed group management cipher suites
  (group_mgmt network profile parameter)
* removed all PeerKey functionality
* fixed nl80211 AP and mesh mode configuration regression with
  Linux 4.15 and newer
* added ap_isolate configuration option for AP mode
* added support for nl80211 to offload 4-way handshake into the driver
* added support for using wolfSSL cryptographic library
* SAE
  - added support for configuring SAE password separately of the
    WPA2 PSK/passphrase
  - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection
    for SAE;
    note: this is not backwards compatible, i.e., both the AP and
    station side implementations will need to be update at the same
    time to maintain interoperability
  - added support for Password Identifier
  - fixed FT-SAE PMKID matching
* Hotspot 2.0
  - added support for fetching of Operator Icon Metadata ANQP-element
  - added support for Roaming Consortium Selection element
  - added support for Terms and Conditions
  - added support for OSEN connection in a shared RSN BSS
  - added support for fetching Venue URL information
* added support for using OpenSSL 1.1.1
* FT
  - disabled PMKSA caching with FT since it is not fully functional
  - added support for SHA384 based AKM
  - added support for BIP ciphers BIP-CMAC-256, BIP-GMAC-128,
    BIP-GMAC-256 in addition to previously supported BIP-CMAC-128
  - fixed additional IE inclusion in Reassociation Request frame when
    using FT protocol

- CVE-2015-8041: Using O_WRONLY flag [http://w1.fi/security/2015-5/]		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-26"/>
	<updated date="2022-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131644">SUSE bug 1131644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131868">SUSE bug 1131868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131870">SUSE bug 1131870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131871">SUSE bug 1131871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131872">SUSE bug 1131872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131874">SUSE bug 1131874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133640">SUSE bug 1133640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144443">SUSE bug 1144443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156920">SUSE bug 1156920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165266">SUSE bug 1165266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166933">SUSE bug 1166933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167331">SUSE bug 1167331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182805">SUSE bug 1182805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194732">SUSE bug 1194732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194733">SUSE bug 1194733</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8041/">CVE-2015-8041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8041">CVE-2015-8041 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13077/">CVE-2017-13077 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13077">CVE-2017-13077 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13078">CVE-2017-13078 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13079">CVE-2017-13079 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13081">CVE-2017-13081 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13082/">CVE-2017-13082 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13082">CVE-2017-13082 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13086/">CVE-2017-13086 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13086">CVE-2017-13086 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13087">CVE-2017-13087 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13088">CVE-2017-13088 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14526">CVE-2018-14526 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11555/">CVE-2019-11555 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11555">CVE-2019-11555 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13377/">CVE-2019-13377 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13377">CVE-2019-13377 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9494/">CVE-2019-9494 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9494">CVE-2019-9494 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9495/">CVE-2019-9495 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9495">CVE-2019-9495 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9497/">CVE-2019-9497 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9497">CVE-2019-9497 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9498/">CVE-2019-9498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9498">CVE-2019-9498 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9499/">CVE-2019-9499 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9499">CVE-2019-9499 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23303/">CVE-2022-23303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23303">CVE-2022-23303 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23304/">CVE-2022-23304 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23304">CVE-2022-23304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696349" comment="wpa_supplicant-2.9-15.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152662" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199475" ref_url="https://bugzilla.suse.com/1199475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<description>
This update for postgresql12 fixes the following issues:

- CVE-2022-1552: Confine additional operations within 'security restricted operation' sandboxes (bsc#1199475).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-27"/>
	<updated date="2022-05-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199475">SUSE bug 1199475</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696683" comment="postgresql12-12.11-3.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696684" comment="postgresql12-contrib-12.11-3.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696685" comment="postgresql12-devel-12.11-3.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696686" comment="postgresql12-docs-12.11-3.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696687" comment="postgresql12-llvmjit-devel-12.11-3.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696688" comment="postgresql12-plperl-12.11-3.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696689" comment="postgresql12-plpython-12.11-3.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696690" comment="postgresql12-pltcl-12.11-3.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696691" comment="postgresql12-server-12.11-3.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696692" comment="postgresql12-server-devel-12.11-3.27.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152663" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199475" ref_url="https://bugzilla.suse.com/1199475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<description>
This update for postgresql14 fixes the following issues:
 
- CVE-2022-1552: Confine additional operations within 'security restricted operation' sandboxes (bsc#1199475).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-27"/>
	<updated date="2022-05-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199475">SUSE bug 1199475</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696350" comment="libecpg6-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696693" comment="libecpg6-32bit-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696351" comment="libpq5-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696084" comment="libpq5-32bit-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696694" comment="postgresql14-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696695" comment="postgresql14-contrib-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696696" comment="postgresql14-devel-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696697" comment="postgresql14-devel-mini-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696698" comment="postgresql14-docs-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696699" comment="postgresql14-llvmjit-devel-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696700" comment="postgresql14-plperl-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696701" comment="postgresql14-plpython-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696702" comment="postgresql14-pltcl-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696703" comment="postgresql14-server-14.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696704" comment="postgresql14-server-devel-14.3-3.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152664" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198351" ref_url="https://bugzilla.suse.com/1198351" source="BUGZILLA"/>
		<reference ref_id="1199350" ref_url="https://bugzilla.suse.com/1199350" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1270" ref_url="https://www.suse.com/security/cve/CVE-2022-1270/" source="CVE"/>
		<reference ref_id="CVE-2022-28463" ref_url="https://www.suse.com/security/cve/CVE-2022-28463/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2022-1270: Fixed a memory corruption issue when parsing MIFF files (bsc#1198351).
- CVE-2022-28463: Fixed buffer overflow in coders/cin.c (bsc#1199350).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198351">SUSE bug 1198351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199350">SUSE bug 1199350</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-1270/">CVE-2022-1270 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1270">CVE-2022-1270 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28463/">CVE-2022-28463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28463">CVE-2022-28463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696352" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696353" comment="ImageMagick-config-6-upstream-6.8.8.1-71.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696354" comment="libMagickCore-6_Q16-1-6.8.8.1-71.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696355" comment="libMagickWand-6_Q16-1-6.8.8.1-71.172.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152665" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1191959" ref_url="https://bugzilla.suse.com/1191959" source="BUGZILLA"/>
		<reference ref_id="1192735" ref_url="https://bugzilla.suse.com/1192735" source="BUGZILLA"/>
		<reference ref_id="1192741" ref_url="https://bugzilla.suse.com/1192741" source="BUGZILLA"/>
		<reference ref_id="1193316" ref_url="https://bugzilla.suse.com/1193316" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42096" ref_url="https://www.suse.com/security/cve/CVE-2021-42096/" source="CVE"/>
		<reference ref_id="CVE-2021-43331" ref_url="https://www.suse.com/security/cve/CVE-2021-43331/" source="CVE"/>
		<reference ref_id="CVE-2021-43332" ref_url="https://www.suse.com/security/cve/CVE-2021-43332/" source="CVE"/>
		<reference ref_id="CVE-2021-44227" ref_url="https://www.suse.com/security/cve/CVE-2021-44227/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2021-44227: Preventing list moderator or list member accessing the admin UI (bsc#1193316).
- CVE-2021-43332: Preventing list moderator from cracking the list admin password encrypted in a CSRF token (bsc#1192741).
- CVE-2021-43331: Fixed XSS in Cgi/options.py (bsc#1192735).
- CVE-2021-42096: Add protection against remote privilege escalation via csrf_token derived from admin password (bsc#1191959).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191959">SUSE bug 1191959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192735">SUSE bug 1192735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192741">SUSE bug 1192741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193316">SUSE bug 1193316</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-42096/">CVE-2021-42096 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42096">CVE-2021-42096 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43331/">CVE-2021-43331 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43331">CVE-2021-43331 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43332/">CVE-2021-43332 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43332">CVE-2021-43332 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-44227/">CVE-2021-44227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44227">CVE-2021-44227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696356" comment="mailman-2.1.17-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152666" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194568" ref_url="https://bugzilla.suse.com/1194568" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4034" ref_url="https://www.suse.com/security/cve/CVE-2021-4034/" source="CVE"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-4034: Fixed a local privilege escalation in pkexec (bsc#1194568).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194568">SUSE bug 1194568</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4034/">CVE-2021-4034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4034">CVE-2021-4034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664690" comment="libpolkit0-0.113-5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664691" comment="polkit-0.113-5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664692" comment="typelib-1_0-Polkit-1_0-0.113-5.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152667" version="1" class="patch">
	<metadata>
		<title>Security update for librelp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1086730" ref_url="https://bugzilla.suse.com/1086730" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000140" ref_url="https://www.suse.com/security/cve/CVE-2018-1000140/" source="CVE"/>
		<description>
This update for librelp fixes the following issues:

- CVE-2018-1000140: Fixed remote attack via specially crafted x509 certificates when connecting to rsyslog to trigger a stack buffer overflow and run arbitrary code (bsc#1086730).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086730">SUSE bug 1086730</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000140/">CVE-2018-1000140 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000140">CVE-2018-1000140 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696535" comment="librelp0-1.2.15-3.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152668" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1200027" ref_url="https://bugzilla.suse.com/1200027" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31736" ref_url="https://www.suse.com/security/cve/CVE-2022-31736/" source="CVE"/>
		<reference ref_id="CVE-2022-31737" ref_url="https://www.suse.com/security/cve/CVE-2022-31737/" source="CVE"/>
		<reference ref_id="CVE-2022-31738" ref_url="https://www.suse.com/security/cve/CVE-2022-31738/" source="CVE"/>
		<reference ref_id="CVE-2022-31739" ref_url="https://www.suse.com/security/cve/CVE-2022-31739/" source="CVE"/>
		<reference ref_id="CVE-2022-31740" ref_url="https://www.suse.com/security/cve/CVE-2022-31740/" source="CVE"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="CVE-2022-31742" ref_url="https://www.suse.com/security/cve/CVE-2022-31742/" source="CVE"/>
		<reference ref_id="CVE-2022-31747" ref_url="https://www.suse.com/security/cve/CVE-2022-31747/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.10.0 ESR (MFSA 2022-21)(bsc#1200027)

- CVE-2022-31736: Cross-Origin resource's length leaked
- CVE-2022-31737: Heap buffer overflow in WebGL
- CVE-2022-31738: Browser window spoof using fullscreen mode
- CVE-2022-31739: Attacker-influenced path traversal when saving downloaded files
- CVE-2022-31740: Register allocation problem in WASM on arm64
- CVE-2022-31741: Uninitialized variable leads to invalid memory read
- CVE-2022-31742: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information
- CVE-2022-31747: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-02"/>
	<updated date="2022-06-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31736/">CVE-2022-31736 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31736">CVE-2022-31736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31737/">CVE-2022-31737 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31737">CVE-2022-31737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31738/">CVE-2022-31738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31738">CVE-2022-31738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31739/">CVE-2022-31739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31739">CVE-2022-31739 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31740/">CVE-2022-31740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31740">CVE-2022-31740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31742/">CVE-2022-31742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31742">CVE-2022-31742 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31747/">CVE-2022-31747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31747">CVE-2022-31747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696357" comment="MozillaFirefox-91.10.0-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696358" comment="MozillaFirefox-devel-91.10.0-112.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696359" comment="MozillaFirefox-translations-common-91.10.0-112.114.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152669" version="1" class="patch">
	<metadata>
		<title>Security update for patch (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1080985" ref_url="https://bugzilla.suse.com/1080985" source="BUGZILLA"/>
		<reference ref_id="1092500" ref_url="https://bugzilla.suse.com/1092500" source="BUGZILLA"/>
		<reference ref_id="1142041" ref_url="https://bugzilla.suse.com/1142041" source="BUGZILLA"/>
		<reference ref_id="1198106" ref_url="https://bugzilla.suse.com/1198106" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6952" ref_url="https://www.suse.com/security/cve/CVE-2018-6952/" source="CVE"/>
		<reference ref_id="CVE-2019-13636" ref_url="https://www.suse.com/security/cve/CVE-2019-13636/" source="CVE"/>
		<description>
This update for patch fixes the following issues:

Security fixes:

- CVE-2019-13636: Fixed mishandled following of symlinks in certain cases other than input files (bsc#1142041).
- CVE-2018-6952: Fixed double free of memory in pch.c:another_hunk() (bsc#1080985).

Bugfixes:

- Pass the correct stat to backup files (bsc#1198106).
- Fix temporary file leak when applying ed-style patches (bsc#1092500).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-03"/>
	<updated date="2022-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1080985">SUSE bug 1080985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092500">SUSE bug 1092500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142041">SUSE bug 1142041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198106">SUSE bug 1198106</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6952/">CVE-2018-6952 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6952">CVE-2018-6952 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13636/">CVE-2019-13636 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13636">CVE-2019-13636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696705" comment="patch-2.7.5-8.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152670" version="1" class="patch">
	<metadata>
		<title>Security update for gcc48 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1161913" ref_url="https://bugzilla.suse.com/1161913" source="BUGZILLA"/>
		<reference ref_id="1177947" ref_url="https://bugzilla.suse.com/1177947" source="BUGZILLA"/>
		<reference ref_id="1178675" ref_url="https://bugzilla.suse.com/1178675" source="BUGZILLA"/>
		<reference ref_id="1185395" ref_url="https://bugzilla.suse.com/1185395" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<description>
This update for gcc48 fixes the following issues:

- CVE-2019-14250: Fixed an integer overflow that could lead to an invalid memory
  access (bsc#1142649).

Non-security fixes:

- Fixed an issue with manual page builds (bsc#1185395).
- Fixed an issue with static initializers (bsc#1177947).
- Fixed an issue with exception handling on s390x (bsc#1161913).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-08"/>
	<updated date="2022-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161913">SUSE bug 1161913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177947">SUSE bug 1177947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178675">SUSE bug 1178675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185395">SUSE bug 1185395</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14250">CVE-2019-14250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678318" comment="cpp48-4.8.5-31.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678319" comment="gcc48-4.8.5-31.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678320" comment="gcc48-32bit-4.8.5-31.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678321" comment="gcc48-c++-4.8.5-31.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678271" comment="gcc48-info-4.8.5-31.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678322" comment="gcc48-locale-4.8.5-31.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678323" comment="libasan0-4.8.5-31.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678324" comment="libasan0-32bit-4.8.5-31.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678325" comment="libstdc++48-devel-4.8.5-31.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678326" comment="libstdc++48-devel-32bit-4.8.5-31.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152671" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194471" ref_url="https://bugzilla.suse.com/1194471" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194471">SUSE bug 1194471</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45079">CVE-2021-45079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664933" comment="strongswan-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664929" comment="strongswan-doc-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664934" comment="strongswan-hmac-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664935" comment="strongswan-ipsec-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664936" comment="strongswan-libs0-5.1.3-26.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152672" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1200027" ref_url="https://bugzilla.suse.com/1200027" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.4 (bsc#1200027)

* CVE-2022-31741: Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple.  (bmo#1767590)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-09"/>
	<updated date="2022-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696360" comment="libfreebl3-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696100" comment="libfreebl3-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696361" comment="libfreebl3-hmac-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696102" comment="libfreebl3-hmac-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696362" comment="libsoftokn3-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696104" comment="libsoftokn3-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696363" comment="libsoftokn3-hmac-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696106" comment="libsoftokn3-hmac-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696364" comment="mozilla-nss-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696108" comment="mozilla-nss-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696365" comment="mozilla-nss-certs-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696110" comment="mozilla-nss-certs-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696366" comment="mozilla-nss-sysinit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696113" comment="mozilla-nss-sysinit-32bit-3.68.4-58.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696367" comment="mozilla-nss-tools-3.68.4-58.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152673" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1191184" ref_url="https://bugzilla.suse.com/1191184" source="BUGZILLA"/>
		<reference ref_id="1191185" ref_url="https://bugzilla.suse.com/1191185" source="BUGZILLA"/>
		<reference ref_id="1191186" ref_url="https://bugzilla.suse.com/1191186" source="BUGZILLA"/>
		<reference ref_id="1193282" ref_url="https://bugzilla.suse.com/1193282" source="BUGZILLA"/>
		<reference ref_id="1197948" ref_url="https://bugzilla.suse.com/1197948" source="BUGZILLA"/>
		<reference ref_id="1198460" ref_url="https://bugzilla.suse.com/1198460" source="BUGZILLA"/>
		<reference ref_id="1198493" ref_url="https://bugzilla.suse.com/1198493" source="BUGZILLA"/>
		<reference ref_id="1198496" ref_url="https://bugzilla.suse.com/1198496" source="BUGZILLA"/>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3695" ref_url="https://www.suse.com/security/cve/CVE-2021-3695/" source="CVE"/>
		<reference ref_id="CVE-2021-3696" ref_url="https://www.suse.com/security/cve/CVE-2021-3696/" source="CVE"/>
		<reference ref_id="CVE-2021-3697" ref_url="https://www.suse.com/security/cve/CVE-2021-3697/" source="CVE"/>
		<reference ref_id="CVE-2022-28733" ref_url="https://www.suse.com/security/cve/CVE-2022-28733/" source="CVE"/>
		<reference ref_id="CVE-2022-28734" ref_url="https://www.suse.com/security/cve/CVE-2022-28734/" source="CVE"/>
		<reference ref_id="CVE-2022-28736" ref_url="https://www.suse.com/security/cve/CVE-2022-28736/" source="CVE"/>
		<description>
This update for grub2 fixes the following issues:

Security fixes and hardenings for boothole 3 / boothole 2022 (bsc#1198581)

- CVE-2021-3695: Fixed that a crafted PNG grayscale image could lead to out-of-bounds write in heap (bsc#1191184)
- CVE-2021-3696: Fixed that a crafted PNG image could lead to out-of-bound write during huffman table handling (bsc#1191185)
- CVE-2021-3697: Fixed that a crafted JPEG image could lead to buffer underflow write in the heap (bsc#1191186)
- CVE-2022-28733: Fixed fragmentation math in net/ip (bsc#1198460)
- CVE-2022-28734: Fixed an out-of-bound write for split http headers (bsc#1198493)
- CVE-2022-28736: Fixed a use-after-free in chainloader command (bsc#1198496)
- Update SBAT security contact (bsc#1193282)
- Bump grub's SBAT generation to 2

- Use boot disks in OpenFirmware, fixing regression caused when the root LV is completely in the boot LUN (bsc#1197948)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-10"/>
	<updated date="2022-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191184">SUSE bug 1191184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191185">SUSE bug 1191185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191186">SUSE bug 1191186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193282">SUSE bug 1193282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197948">SUSE bug 1197948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198460">SUSE bug 1198460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198493">SUSE bug 1198493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198496">SUSE bug 1198496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3695/">CVE-2021-3695 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3695">CVE-2021-3695 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3696/">CVE-2021-3696 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3696">CVE-2021-3696 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3697/">CVE-2021-3697 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3697">CVE-2021-3697 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28733/">CVE-2022-28733 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28733">CVE-2022-28733 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-28734/">CVE-2022-28734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28734">CVE-2022-28734 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28736/">CVE-2022-28736 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28736">CVE-2022-28736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696536" comment="grub2-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696116" comment="grub2-i386-pc-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696118" comment="grub2-snapper-plugin-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696119" comment="grub2-systemd-sleep-plugin-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696120" comment="grub2-x86_64-efi-2.02-137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696121" comment="grub2-x86_64-xen-2.02-137.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152674" version="1" class="patch">
	<metadata>
		<title>Security update for python36 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198511" ref_url="https://bugzilla.suse.com/1198511" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<description>
This update for python36 fixes the following issues:

- CVE-2015-20107: avoid command injection in the mailcap module (bsc#1198511).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-13"/>
	<updated date="2022-06-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198511">SUSE bug 1198511</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696706" comment="libpython3_6m1_0-3.6.15-6.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696707" comment="python36-3.6.15-6.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696708" comment="python36-base-3.6.15-6.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696709" comment="python36-curses-3.6.15-6.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696710" comment="python36-dbm-3.6.15-6.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696711" comment="python36-devel-3.6.15-6.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696712" comment="python36-idle-3.6.15-6.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696713" comment="python36-testsuite-3.6.15-6.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696714" comment="python36-tk-3.6.15-6.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696715" comment="python36-tools-3.6.15-6.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152675" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199287" ref_url="https://bugzilla.suse.com/1199287" source="BUGZILLA"/>
		<reference ref_id="1200106" ref_url="https://bugzilla.suse.com/1200106" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26700" ref_url="https://www.suse.com/security/cve/CVE-2022-26700/" source="CVE"/>
		<reference ref_id="CVE-2022-26709" ref_url="https://www.suse.com/security/cve/CVE-2022-26709/" source="CVE"/>
		<reference ref_id="CVE-2022-26716" ref_url="https://www.suse.com/security/cve/CVE-2022-26716/" source="CVE"/>
		<reference ref_id="CVE-2022-26717" ref_url="https://www.suse.com/security/cve/CVE-2022-26717/" source="CVE"/>
		<reference ref_id="CVE-2022-26719" ref_url="https://www.suse.com/security/cve/CVE-2022-26719/" source="CVE"/>
		<reference ref_id="CVE-2022-30293" ref_url="https://www.suse.com/security/cve/CVE-2022-30293/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.3 (bsc#1200106)

- CVE-2022-30293: Fixed heap-based buffer overflow in WebCore::TextureMapperLayer::setContentsLayer (bsc#1199287).
- CVE-2022-26700: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26709: Fixed use after free issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26716: Fixed use after free issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26717: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26719: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-15"/>
	<updated date="2022-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199287">SUSE bug 1199287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200106">SUSE bug 1200106</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26700/">CVE-2022-26700 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26700">CVE-2022-26700 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26709/">CVE-2022-26709 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26709">CVE-2022-26709 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26716/">CVE-2022-26716 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26716">CVE-2022-26716 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26717/">CVE-2022-26717 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26717">CVE-2022-26717 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26719/">CVE-2022-26719 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26719">CVE-2022-26719 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30293/">CVE-2022-30293 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30293">CVE-2022-30293 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696381" comment="libjavascriptcoregtk-4_0-18-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696382" comment="libwebkit2gtk-4_0-37-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696383" comment="typelib-1_0-JavaScriptCore-4_0-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696384" comment="typelib-1_0-WebKit2-4_0-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696385" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.3-2.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696386" comment="webkit2gtk-4_0-injected-bundles-2.36.3-2.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152676" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199166" ref_url="https://bugzilla.suse.com/1199166" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1292" ref_url="https://www.suse.com/security/cve/CVE-2022-1292/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:
	  
- CVE-2022-1292: Fixed command injection in c_rehash (bsc#1199166).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-16"/>
	<updated date="2022-06-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199166">SUSE bug 1199166</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1292/">CVE-2022-1292 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696388" comment="libopenssl-devel-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696389" comment="libopenssl1_0_0-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696140" comment="libopenssl1_0_0-32bit-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696390" comment="libopenssl1_0_0-hmac-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696142" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696391" comment="openssl-1.0.2j-60.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696144" comment="openssl-doc-1.0.2j-60.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152677" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1200338" ref_url="https://bugzilla.suse.com/1200338" source="BUGZILLA"/>
		<reference ref_id="1200340" ref_url="https://bugzilla.suse.com/1200340" source="BUGZILLA"/>
		<reference ref_id="1200341" ref_url="https://bugzilla.suse.com/1200341" source="BUGZILLA"/>
		<reference ref_id="1200345" ref_url="https://bugzilla.suse.com/1200345" source="BUGZILLA"/>
		<reference ref_id="1200348" ref_url="https://bugzilla.suse.com/1200348" source="BUGZILLA"/>
		<reference ref_id="1200350" ref_url="https://bugzilla.suse.com/1200350" source="BUGZILLA"/>
		<reference ref_id="1200352" ref_url="https://bugzilla.suse.com/1200352" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26377" ref_url="https://www.suse.com/security/cve/CVE-2022-26377/" source="CVE"/>
		<reference ref_id="CVE-2022-28614" ref_url="https://www.suse.com/security/cve/CVE-2022-28614/" source="CVE"/>
		<reference ref_id="CVE-2022-28615" ref_url="https://www.suse.com/security/cve/CVE-2022-28615/" source="CVE"/>
		<reference ref_id="CVE-2022-29404" ref_url="https://www.suse.com/security/cve/CVE-2022-29404/" source="CVE"/>
		<reference ref_id="CVE-2022-30522" ref_url="https://www.suse.com/security/cve/CVE-2022-30522/" source="CVE"/>
		<reference ref_id="CVE-2022-30556" ref_url="https://www.suse.com/security/cve/CVE-2022-30556/" source="CVE"/>
		<reference ref_id="CVE-2022-31813" ref_url="https://www.suse.com/security/cve/CVE-2022-31813/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-26377: Fixed possible request smuggling in mod_proxy_ajp (bsc#1200338)
- CVE-2022-28614: Fixed read beyond bounds via ap_rwrite() (bsc#1200340)
- CVE-2022-28615: Fixed read beyond bounds in ap_strcmp_match() (bsc#1200341)
- CVE-2022-29404: Fixed denial of service in mod_lua r:parsebody (bsc#1200345)
- CVE-2022-30556: Fixed information disclosure in mod_lua with websockets (bsc#1200350)
- CVE-2022-30522: Fixed mod_sed denial of service (bsc#1200352)
- CVE-2022-31813: Fixed mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism (bsc#1200348)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-16"/>
	<updated date="2022-06-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200338">SUSE bug 1200338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200340">SUSE bug 1200340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200341">SUSE bug 1200341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200345">SUSE bug 1200345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200348">SUSE bug 1200348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200350">SUSE bug 1200350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200352">SUSE bug 1200352</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-26377/">CVE-2022-26377 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26377">CVE-2022-26377 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28614/">CVE-2022-28614 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28614">CVE-2022-28614 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28615/">CVE-2022-28615 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28615">CVE-2022-28615 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29404/">CVE-2022-29404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29404">CVE-2022-29404 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30522/">CVE-2022-30522 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30522">CVE-2022-30522 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30556/">CVE-2022-30556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30556">CVE-2022-30556 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-31813/">CVE-2022-31813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31813">CVE-2022-31813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696392" comment="apache2-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696146" comment="apache2-doc-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696393" comment="apache2-example-pages-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696394" comment="apache2-prefork-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696395" comment="apache2-utils-2.4.23-29.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696396" comment="apache2-worker-2.4.23-29.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152678" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2022-23307: Fix deserialization issue by removing the chainsaw sub-package. (bsc#1194844)
- CVE-2022-23305: Fix SQL injection by removing src/main/java/org/apache/log4j/jdbc/JDBCAppender.java. (bsc#1194843)
- CVE-2022-23302: Fix remote code execution by removing src/main/java/org/apache/log4j/net/JMSSink.java. (bsc#1194842)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-27"/>
	<updated date="2022-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23302">CVE-2022-23302 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23305">CVE-2022-23305 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23307">CVE-2022-23307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664687" comment="log4j-1.2.15-126.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152679" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181223" ref_url="https://bugzilla.suse.com/1181223" source="BUGZILLA"/>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1190462" ref_url="https://bugzilla.suse.com/1190462" source="BUGZILLA"/>
		<reference ref_id="1190535" ref_url="https://bugzilla.suse.com/1190535" source="BUGZILLA"/>
		<reference ref_id="1193600" ref_url="https://bugzilla.suse.com/1193600" source="BUGZILLA"/>
		<reference ref_id="1194873" ref_url="https://bugzilla.suse.com/1194873" source="BUGZILLA"/>
		<reference ref_id="1195726" ref_url="https://bugzilla.suse.com/1195726" source="BUGZILLA"/>
		<reference ref_id="1195727" ref_url="https://bugzilla.suse.com/1195727" source="BUGZILLA"/>
		<reference ref_id="1195728" ref_url="https://bugzilla.suse.com/1195728" source="BUGZILLA"/>
		<reference ref_id="1196338" ref_url="https://bugzilla.suse.com/1196338" source="BUGZILLA"/>
		<reference ref_id="1196704" ref_url="https://bugzilla.suse.com/1196704" source="BUGZILLA"/>
		<reference ref_id="1197507" ref_url="https://bugzilla.suse.com/1197507" source="BUGZILLA"/>
		<reference ref_id="1197689" ref_url="https://bugzilla.suse.com/1197689" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36222" ref_url="https://www.suse.com/security/cve/CVE-2021-36222/" source="CVE"/>
		<reference ref_id="CVE-2021-3711" ref_url="https://www.suse.com/security/cve/CVE-2021-3711/" source="CVE"/>
		<reference ref_id="CVE-2021-39226" ref_url="https://www.suse.com/security/cve/CVE-2021-39226/" source="CVE"/>
		<reference ref_id="CVE-2021-41174" ref_url="https://www.suse.com/security/cve/CVE-2021-41174/" source="CVE"/>
		<reference ref_id="CVE-2021-41244" ref_url="https://www.suse.com/security/cve/CVE-2021-41244/" source="CVE"/>
		<reference ref_id="CVE-2021-43798" ref_url="https://www.suse.com/security/cve/CVE-2021-43798/" source="CVE"/>
		<reference ref_id="CVE-2021-43813" ref_url="https://www.suse.com/security/cve/CVE-2021-43813/" source="CVE"/>
		<reference ref_id="CVE-2021-43815" ref_url="https://www.suse.com/security/cve/CVE-2021-43815/" source="CVE"/>
		<reference ref_id="CVE-2022-21673" ref_url="https://www.suse.com/security/cve/CVE-2022-21673/" source="CVE"/>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<reference ref_id="CVE-2022-21702" ref_url="https://www.suse.com/security/cve/CVE-2022-21702/" source="CVE"/>
		<reference ref_id="CVE-2022-21703" ref_url="https://www.suse.com/security/cve/CVE-2022-21703/" source="CVE"/>
		<reference ref_id="CVE-2022-21713" ref_url="https://www.suse.com/security/cve/CVE-2022-21713/" source="CVE"/>
		<description>
This update fixes the following issues:

golang-github-QubitProducts-exporter_exporter:

- Adapted to build on Enterprise Linux.
- Fix build for RedHat 7
- Require Go &gt;= 1.14 also for CentOS
- Add support for CentOS
- Replace %{?systemd_requires} with %{?systemd_ordering}

golang-github-prometheus-alertmanager:

- CVE-2022-21698: Denial of service using InstrumentHandlerCounter.
  * Update vendor tarball with prometheus/client_golang 1.11.1  (bsc#1196338, jsc#SLE-24077)
- Update required Go version to 1.16
- Update to version 0.23.0:
  * amtool: Detect version drift and warn users (#2672)
  * Add ability to skip TLS verification for amtool (#2663)
  * Fix empty isEqual in amtool. (#2668)
  * Fix main tests (#2670)
  * cli: add new template render command (#2538)
  * OpsGenie: refer to alert instead of incident (#2609)
  * Docs: target_match and source_match are DEPRECATED (#2665)
  * Fix test not waiting for cluster member to be ready
- Added hardening to systemd service(s) (bsc#1181400)

golang-github-prometheus-node_exporter:

- CVE-2022-21698: Denial of service using InstrumentHandlerCounter.
  * Update vendor tarball with prometheus/client_golang 1.11.1
  (bsc#1196338, jsc#SLE-24238, jsc#SLE-24239)
- Update to 1.3.0
  * [CHANGE] Add path label to rapl collector #2146
  * [CHANGE] Exclude filesystems under /run/credentials #2157
  * [CHANGE] Add TCPTimeouts to netstat default filter #2189
  * [FEATURE] Add lnstat collector for metrics from /proc/net/stat/ #1771
  * [FEATURE] Add darwin powersupply collector #1777
  * [FEATURE] Add support for monitoring GPUs on Linux #1998
  * [FEATURE] Add Darwin thermal collector #2032
  * [FEATURE] Add os release collector #2094
  * [FEATURE] Add netdev.address-info collector #2105
  * [FEATURE] Add clocksource metrics to time collector #2197
  * [ENHANCEMENT] Support glob textfile collector directories #1985
  * [ENHANCEMENT] ethtool: Expose node_ethtool_info metric #2080
  * [ENHANCEMENT] Use include/exclude flags for ethtool filtering #2165
  * [ENHANCEMENT] Add flag to disable guest CPU metrics #2123
  * [ENHANCEMENT] Add DMI collector #2131
  * [ENHANCEMENT] Add threads metrics to processes collector #2164
  * [ENHANCMMENT] Reduce timer GC delays in the Linux filesystem collector #2169
  * [ENHANCMMENT] Add TCPTimeouts to netstat default filter #2189
  * [ENHANCMMENT] Use SysctlTimeval for boottime collector on BSD #2208
  * [BUGFIX] ethtool: Sanitize metric names #2093
  * [BUGFIX] Fix ethtool collector for multiple interfaces #2126
  * [BUGFIX] Fix possible panic on macOS #2133
  * [BUGFIX] Collect flag_info and bug_info only for one core #2156
  * [BUGFIX] Prevent duplicate ethtool metric names #2187
- Update to 1.2.2
  * Bug fixes
     Fix processes collector long int parsing #2112
- Update to 1.2.1
  * Removed
     Remove obsolete capture permission denied error patch that is already included upstream
     Fix zoneinfo parsing prometheus/procfs#386
     Fix nvme collector log noise #2091
     Fix rapl collector log noise #2092
- Update to 1.2.0
  * Changes
     Rename filesystem collector flags to match other collectors #2012
     Make node_exporter print usage to STDOUT #203
  * Features
     Add conntrack statistics metrics #1155
     Add ethtool stats collector #1832
     Add flag to ignore network speed if it is unknown #1989
     Add tapestats collector for Linux #2044
     Add nvme collector #2062
  * Enhancements
     Add ErrorLog plumbing to promhttp #1887
     Add more Infiniband counters #2019
     netclass: retrieve interface names and filter before parsing #2033
     Add time zone offset metric #2060
     Handle errors from disabled PSI subsystem #1983
     Fix panic when using backwards compatible flags #2000
     Fix wrong value for OpenBSD memory buffer cache #2015
     Only initiate collectors once #2048
     Handle small backwards jumps in CPU idle #2067
- Apply patch to capture permission denied error for 'energy_uj' file (bsc#1190535)

grafana:

- Update to version 8.3.5 (jsc#SLE-23439, jsc#SLE-23422)
  + Security:
    * Fixes XSS vulnerability in handling data sources
      (bsc#1195726, CVE-2022-21702)
    * Fixes cross-origin request forgery vulnerability
      (bsc#1195727, CVE-2022-21703)
    * Fixes Insecure Direct Object Reference vulnerability in Teams
      API (bsc#1195728, CVE-2022-21713)
- Update to Go 1.17.
- Add build-time dependency on `wire`.
- Update license to GNU Affero General Public License v3.0.
- Update to version 8.3.4
    * GetUserInfo: return an error if no user was found
      (bsc#1194873, CVE-2022-21673)
  + Features and enhancements:
    * Alerting: Allow configuration of non-ready alertmanagers.
    * Alerting: Allow customization of Google chat message.
    * AppPlugins: Support app plugins with only default nav.
    * InfluxDB: query editor: skip fields in metadata queries.
    * Postgres/MySQL/MSSQL: Cancel in-flight SQL query if user
      cancels query in grafana.
    * Prometheus: Forward oauth tokens after prometheus datasource
      migration.
  + Bug fixes:
    * Azure Monitor: Bug fix for variable interpolations in metrics
      dropdowns.
    * Azure Monitor: Improved error messages for variable queries.
    * CloudMonitoring: Fixes broken variable queries that use group
      bys.
    * Configuration: You can now see your expired API keys if you
      have no active ones.
    * Elasticsearch: Fix handling multiple datalinks for a single
      field.
    * Export: Fix error being thrown when exporting dashboards
      using query variables that reference the default datasource.
    * ImportDashboard: Fixes issue with importing dashboard and
      name ending up in uid.
    * Login: Page no longer overflows on mobile.
    * Plugins: Set backend metadata property for core plugins.
    * Prometheus: Fill missing steps with null values.
    * Prometheus: Fix interpolation of $__rate_interval variable.
    * Prometheus: Interpolate variables with curly brackets syntax.
    * Prometheus: Respect the http-method data source setting.
    * Table: Fixes issue with field config applied to wrong fields
      when hiding columns.
    * Toolkit: Fix bug with rootUrls not being properly parsed when
      signing a private plugin.
    * Variables: Fix so data source variables are added to adhoc
      configuration.
  + Plugin development fixes &amp; changes:
    * Toolkit: Revert build config so tslib is bundled with plugins
      to prevent plugins from crashing.
- Update to version 8.3.3:
    * BarChart: Use new data error view component to show actions
      in panel edit.
    * CloudMonitor: Iterate over pageToken for resources.
    * Macaron: Prevent WriteHeader invalid HTTP status code panic.
    * AnnoListPanel: Fix interpolation of variables in tags.
    * CloudWatch: Allow queries to have no dimensions specified.
    * CloudWatch: Fix broken queries for users migrating from
      8.2.4/8.2.5 to 8.3.0.
    * CloudWatch: Make sure MatchExact flag gets the right value.
    * Dashboards: Fix so that empty folders can be deleted from the
      manage dashboards/folders page.
    * InfluxDB: Improve handling of metadata query errors in
      InfluxQL.
    * Loki: Fix adding of ad hoc filters for queries with parser
      and line_format expressions.
    * Prometheus: Fix running of exemplar queries for non-histogram
      metrics.
    * Prometheus: Interpolate template variables in interval.
    * StateTimeline: Fix toolitp not showing when for frames with
      multiple fields.
    * TraceView: Fix virtualized scrolling when trace view is
      opened in right pane in Explore.
    * Variables: Fix repeating panels for on time range changed
      variables.
    * Variables: Fix so queryparam option works for scoped
- Update to version 8.3.2
  + Security: Fixes CVE-2021-43813 and CVE-2021-43815.
- Update to version 8.3.1
  + Security: Fixes CVE-2021-43798.
- Update to version 8.3.0
    * Alerting: Prevent folders from being deleted when they
      contain alerts.
    * Alerting: Show full preview value in tooltip.
    * BarGauge: Limit title width when name is really long.
    * CloudMonitoring: Avoid to escape regexps in filters.
    * CloudWatch: Add support for AWS Metric Insights.
    * TooltipPlugin: Remove other panels' shared tooltip in edit
      panel.
    * Visualizations: Limit y label width to 40% of visualization
      width.
    * Alerting: Clear alerting rule evaluation errors after
      intermittent failures.
    * Alerting: Fix refresh on legacy Alert List panel.
    * Dashboard: Fix queries for panels with non-integer widths.
    * Explore: Fix url update inconsistency.
    * Prometheus: Fix range variables interpolation for time ranges
      smaller than 1 second.
    * ValueMappings: Fixes issue with regex value mapping that only
      sets color.
- Update to version 8.3.0-beta2
  + Breaking changes:
    * Grafana 8 Alerting enabled by default for installations that
      do not use legacy alerting.
    * Keep Last State for 'If execution error or timeout' when
      upgrading to Grafana 8 alerting.
    * Alerting: Create DatasourceError alert if evaluation returns
      error.
    * Alerting: Make Unified Alerting enabled by default for those
      who do not use legacy alerting.
    * Alerting: Support mute timings configuration through the api
      for the embedded alert manager.
    * CloudWatch: Add missing AWS/Events metrics.
    * Docs: Add easier to find deprecation notices to certain data
      sources and to the changelog.
    * Plugins Catalog: Enable install controls based on the
      pluginAdminEnabled flag.
    * Table: Add space between values for the DefaultCell and
      JSONViewCell.
    * Tracing: Make query editors available in dashboard for Tempo
      and Zipkin.
    * AccessControl: Renamed orgs roles, removed fixed:orgs:reader
      introduced in beta1.
    * Azure Monitor: Add trap focus for modals in grafana/ui and
      other small a11y fixes for Azure Monitor.
    * CodeEditor: Prevent suggestions from being clipped.
    * Dashboard: Fix cache timeout persistence.
    * Datasource: Fix stable sort order of query responses.
    * Explore: Fix error in query history when removing last item.
    * Logs: Fix requesting of older logs when flipped order.
    * Prometheus: Fix running of health check query based on access
      mode.
    * TextPanel: Fix suggestions for existing panels.
    * Tracing: Fix incorrect indentations due to reoccurring
      spanIDs.
    * Tracing: Show start time of trace with milliseconds
      precision.
    * Variables: Make renamed or missing variable section
      expandable.
    * Select: Select menus now properly scroll during keyboard
      navigation.
- Update to version 8.3.0-beta1
    * Alerting: Add UI for contact point testing with custom
      annotations and labels.
    * Alerting: Make alert state indicator in panel header work
      with Grafana 8 alerts.
    * Alerting: Option for Discord notifier to use webhook name.
    * Annotations: Deprecate AnnotationsSrv.
    * Auth: Omit all base64 paddings in JWT tokens for the JWT
      auth.
    * Azure Monitor: Clean up fields when editing Metrics.
    * AzureMonitor: Add new starter dashboards.
    * AzureMonitor: Add starter dashboard for app monitoring with
      Application Insights.
    * Barchart/Time series: Allow x axis label.
    * CLI: Improve error handling for installing plugins.
    * CloudMonitoring: Migrate to use backend plugin SDK contracts.
    * CloudWatch Logs: Add retry strategy for hitting max
      concurrent queries.
    * CloudWatch: Add AWS RoboMaker metrics and dimension.
    * CloudWatch: Add AWS Transfer metrics and dimension.
    * Dashboard: replace datasource name with a reference object.
    * Dashboards: Show logs on time series when hovering.
    * Elasticsearch: Add support for Elasticsearch 8.0 (Beta).
    * Elasticsearch: Add time zone setting to Date Histogram
      aggregation.
    * Elasticsearch: Enable full range log volume histogram.
    * Elasticsearch: Full range logs volume.
    * Explore: Allow changing the graph type.
    * Explore: Show ANSI colors when highlighting matched words in
      the logs panel.
    * Graph(old) panel: Listen to events from Time series panel.
    * Import: Load gcom dashboards from URL.
    * LibraryPanels: Improves export and import of library panels
      between orgs.
    * OAuth: Support PKCE.
    * Panel edit: Overrides now highlight correctly when searching.
    * PanelEdit: Display drag indicators on draggable sections.
    * Plugins: Refactor Plugin Management.
    * Prometheus: Add custom query parameters when creating
      PromLink url.
    * Prometheus: Remove limits on metrics, labels, and values in
      Metrics Browser.
    * StateTimeline: Share cursor with rest of the panels.
    * Tempo: Add error details when json upload fails.
    * Tempo: Add filtering for service graph query.
    * Tempo: Add links to nodes in Service Graph pointing to
      Prometheus metrics.
    * Time series/Bar chart panel: Add ability to sort series via
      legend.
    * TimeSeries: Allow multiple axes for the same unit.
    * TraceView: Allow span links defined on dataFrame.
    * Transformations: Support a rows mode in labels to fields.
    * ValueMappings: Don't apply field config defaults to time
      fields.
    * Variables: Only update panels that are impacted by variable
      change.
    * API: Fix dashboard quota limit for imports.
    * Alerting: Fix rule editor issues with Azure Monitor data
      source.
    * Azure monitor: Make sure alert rule editor is not enabled
      when template variables are being used.
    * CloudMonitoring: Fix annotation queries.
    * CodeEditor: Trigger the latest getSuggestions() passed to
      CodeEditor.
    * Dashboard: Remove the current panel from the list of options
      in the Dashboard datasource.
    * Encryption: Fix decrypting secrets in alerting migration.
    * InfluxDB: Fix corner case where index is too large in ALIAS
    * NavBar: Order App plugins alphabetically.
    * NodeGraph: Fix zooming sensitivity on touchpads.
    * Plugins: Add OAuth pass-through logic to api/ds/query
      endpoint.
    * Snapshots: Fix panel inspector for snapshot data.
    * Tempo: Fix basic auth password reset on adding tag.
    * ValueMapping: Fixes issue with regex mappings.
    * grafana/ui: Enable slider marks display.
- Update to version 8.2.7
- Update to version 8.2.6
    * Security: Upgrade Docker base image to Alpine 3.14.3.
    * Security: Upgrade Go to 1.17.2.
    * TimeSeries: Fix fillBelowTo wrongly affecting fills of
      unrelated series.
- Update to version 8.2.5
    * Fix No Data behaviour in Legacy Alerting.
    * Alerting: Fix a bug where the metric in the evaluation string
      was not correctly populated.
    * Alerting: Fix no data behaviour in Legacy Alerting for alert
      rules using the AND operator.
    * CloudMonitoring: Ignore min and max aggregation in MQL
      queries.
    * Dashboards: 'Copy' is no longer added to new dashboard
      titles.
    * DataProxy: Fix overriding response body when response is a
      WebSocket upgrade.
    * Elasticsearch: Use field configured in query editor as field
      for date_histogram aggregations.
    * Explore: Fix running queries without a datasource property
      set.
    * InfluxDB: Fix numeric aliases in queries.
    * Plugins: Ensure consistent plugin settings list response.
    * Tempo: Fix validation of float durations.
    * Tracing: Correct tags for each span are shown.
- Update to version 8.2.4
  + Security: Fixes CVE-2021-41244.
- Update to version 8.2.3
  + Security: Fixes CVE-2021-41174.
- Update to version 8.2.2
    * Annotations: We have improved tag search performance.
    * Application: You can now configure an error-template title.
    * AzureMonitor: We removed a restriction from the resource
      filter query.
    * Packaging: We removed the ProcSubset option in systemd. This
      option prevented Grafana from starting in LXC environments.
    * Prometheus: We removed the autocomplete limit for metrics.
    * Table: We improved the styling of the type icons to make them
      more distinct from column / field name.
    * ValueMappings: You can now use value mapping in stat, gauge,
      bar gauge, and pie chart visualizations.
    * Alerting: Fix panic when Slack's API sends unexpected
      response.
    * Alerting: The Create Alert button now appears on the
      dashboard panel when you are working with a default
      datasource.
    * Explore: We fixed the problem where the Explore log panel
      disappears when an Elasticsearch logs query returns no
      results.
    * Graph: You can now see annotation descriptions on hover.
    * Logs: The system now uses the JSON parser only if the line is
      parsed to an object.
    * Prometheus: We fixed the issue where the system did not reuse
      TCP connections when querying from Grafana alerting.
    * Prometheus: We fixed the problem that resulted in an error
      when a user created a query with a $__interval min step.
    * RowsToFields: We fixed the issue where the system was not
      properly interpreting number values.
    * Scale: We fixed how the system handles NaN percent when data
      min = data max.
    * Table panel: You can now create a filter that includes
      special characters.
- Update to version 8.2.1
    * Dashboard: Fix rendering of repeating panels.
    * Datasources: Fix deletion of data source if plugin is not
      found.
    * Packaging: Remove systemcallfilters sections from systemd
      unit files.
    * Prometheus: Add Headers to HTTP client options.
- Update to version 8.2.0
    * AWS: Updated AWS authentication documentation.
    * Alerting: Added support Alertmanager data source for upstream
      Prometheus AM implementation.
    * Alerting: Allows more characters in label names so
      notifications are sent.
    * Alerting: Get alert rules for a dashboard or a panel using
      /api/v1/rules endpoints.
    * Annotations: Improved rendering performance of event markers.
    * CloudWatch Logs: Skip caching for log queries.
    * Explore: Added an opt-in configuration for Node Graph in
      Jaeger, Zipkin, and Tempo.
    * Packaging: Add stricter systemd unit options.
    * Prometheus: Metrics browser can now handle label values with
    * CodeEditor: Ensure that we trigger the latest onSave callback
      provided to the component.
    * DashboardList/AlertList: Fix for missing All folder value.
    * Plugins: Create a mock icon component to prevent console
      errors.
- Update to version 8.2.0-beta2
    * AccessControl: Document new permissions restricting data
      source access.
    * TimePicker: Add fiscal years and search to time picker.
    * Alerting: Added support for Unified Alerting with Grafana HA.
    * Alerting: Added support for tune rule evaluation using
      configuration options.
    * Alerting: Cleanups alertmanager namespace from key-value
      store when disabling Grafana 8 alerts.
    * Alerting: Remove ngalert feature toggle and introduce two new
      settings for enabling Grafana 8 alerts and disabling them for
      specific organisations.
    * CloudWatch: Introduced new math expression where it is
      necessary to specify the period field.
    * InfluxDB: Added support for $__interval and $__interval_ms in
      Flux queries for alerting.
    * InfluxDB: Flux queries can use more precise start and end
      timestamps with nanosecond-precision.
    * Plugins Catalog: Make the catalog the default way to interact
      with plugins.
    * Prometheus: Removed autocomplete limit for metrics.
    * Alerting: Fixed an issue where the edit page crashes if you
      tried to preview an alert without a condition set.
    * Alerting: Fixed rules migration to keep existing Grafana 8
      alert rules.
    * Alerting: Fixed the silence file content generated during
    * Analytics: Fixed an issue related to interaction event
      propagation in Azure Application Insights.
    * BarGauge: Fixed an issue where the cell color was lit even
      though there was no data.
    * BarGauge: Improved handling of streaming data.
    * CloudMonitoring: Fixed INT64 label unmarshal error.
    * ConfirmModal: Fixes confirm button focus on modal open.
    * Dashboard: Add option to generate short URL for variables
      with values containing spaces.
    * Explore: No longer hides errors containing refId property.
    * Fixed an issue that produced State timeline panel tooltip
      error when data was not in sync.
    * InfluxDB: InfluxQL query editor is set to always use
      resultFormat.
    * Loki: Fixed creating context query for logs with parsed
      labels.
    * PageToolbar: Fixed alignment of titles.
    * Plugins Catalog: Update to the list of available panels after
      an install, update or uninstall.
    * TimeSeries: Fixed an issue where the shared cursor was not
      showing when hovering over in old Graph panel.
    * Variables: Fixed issues related to change of focus or refresh
      pages when pressing enter in a text box variable input.
    * Variables: Panel no longer crash when using the adhoc
      variable in data links.
- Update to version 8.2.0-beta1
    * AccessControl: Introduce new permissions to restrict access
      for reloading provisioning configuration.
    * Alerting: Add UI to edit Cortex/Loki namespace, group names,
      and group evaluation interval.
    * Alerting: Add a Test button to test contact point.
    * Alerting: Allow creating/editing recording rules for Loki and
      Cortex.
    * Alerting: Metrics should have the label org instead of user.
    * Alerting: Sort notification channels by name to make them
      easier to locate.
    * Alerting: Support org level isolation of notification
    * AzureMonitor: Add data links to deep link to Azure Portal
      Azure Resource Graph.
    * AzureMonitor: Add support for annotations from Azure Monitor
      Metrics and Azure Resource Graph services.
    * AzureMonitor: Show error message when subscriptions request
      fails in ConfigEditor.
    * Chore: Update to Golang 1.16.7.
    * CloudWatch Logs: Add link to X-Ray data source for trace IDs
      in logs.
    * CloudWatch Logs: Disable query path using websockets (Live)
      feature.
    * CloudWatch/Logs: Don't group dataframes for non time series
    * Cloudwatch: Migrate queries that use multiple stats to one
      query per stat.
    * Dashboard: Keep live timeseries moving left (v2).
    * Datasources: Introduce response_limit for datasource
      responses.
    * Explore: Add filter by trace or span ID to trace to logs
    * Explore: Download traces as JSON in Explore Inspector.
    * Explore: Reuse Dashboard's QueryRows component.
    * Explore: Support custom display label for derived fields
      buttons for Loki datasource.
    * Grafana UI: Update monaco-related dependencies.
    * Graphite: Deprecate browser access mode.
    * InfluxDB: Improve handling of intervals in alerting.
    * InfluxDB: InfluxQL query editor: Handle unusual characters in
      tag values better.
    * Jaeger: Add ability to upload JSON file for trace data.
    * LibraryElements: Enable specifying UID for new and existing
      library elements.
    * LibraryPanels: Remove library panel icon from the panel
      header so you can no longer tell that a panel is a library
      panel from the dashboard view.
    * Logs panel: Scroll to the bottom on page refresh when sorting
      in ascending order.
    * Loki: Add fuzzy search to label browser.
    * Navigation: Implement active state for items in the Sidemenu.
    * Packaging: Update PID file location from /var/run to /run.
    * Plugins: Add Hide OAuth Forward config option.
    * Postgres/MySQL/MSSQL: Add setting to limit the maximum number
      of rows processed.
    * Prometheus: Add browser access mode deprecation warning.
    * Prometheus: Add interpolation for built-in-time variables to
      backend.
    * Tempo: Add ability to upload trace data in JSON format.
    * TimeSeries/XYChart: Allow grid lines visibility control in
      XYChart and TimeSeries panels.
    * Transformations: Convert field types to time string number or
      boolean.
    * Value mappings: Add regular-expression based value mapping.
    * Zipkin: Add ability to upload trace JSON.
    * Admin: Prevent user from deleting user's current/active
      organization.
    * LibraryPanels: Fix library panel getting saved in the
      dashboard's folder.
    * OAuth: Make generic teams URL and JMES path configurable.
    * QueryEditor: Fix broken copy-paste for mouse middle-click
    * Thresholds: Fix undefined color in 'Add threshold'.
    * Timeseries: Add wide-to-long, and fix multi-frame output.
    * TooltipPlugin: Fix behavior of Shared Crosshair when Tooltip
      is set to All.
    * Grafana UI: Fix TS error property css is missing in type.
- Update to version 8.1.8
- Update to version 8.1.7
    * Alerting: Fix alerts with evaluation interval more than 30
      seconds resolving before notification.
    * Elasticsearch/Prometheus: Fix usage of proper SigV4 service
      namespace.
- Update to version 8.1.6
  + Security: Fixes CVE-2021-39226.
- Update to version 8.1.5
    * BarChart: Fixes panel error that happens on second refresh.
- Update to version 8.1.4
  + Features and enhancements
    * Explore: Ensure logs volume bar colors match legend colors.
    * LDAP: Search all DNs for users.
    * Alerting: Fix notification channel migration.
    * Annotations: Fix blank panels for queries with unknown data
      sources.
    * BarChart: Fix stale values and x axis labels.
    * Graph: Make old graph panel thresholds work even if ngalert
      is enabled.
    * InfluxDB: Fix regex to identify / as separator.
    * LibraryPanels: Fix update issues related to library panels in
      rows.
    * Variables: Fix variables not updating inside a Panel when the
      preceding Row uses 'Repeat For'.
- Update to version 8.1.3
  + Bug fixes
    * Alerting: Fix alert flapping in the internal alertmanager.
    * Alerting: Fix request handler failed to convert dataframe
      'results' to plugins.DataTimeSeriesSlice: input frame is not
      recognized as a time series.
    * Dashboard: Fix UIDs are not preserved when importing/creating
      dashboards thru importing .json file.
    * Dashboard: Forces panel re-render when exiting panel edit.
    * Dashboard: Prevent folder from changing when navigating to
      general settings.
    * Docker: Force use of libcrypto1.1 and libssl1.1 versions to
      fix CVE-2021-3711.
    * Elasticsearch: Fix metric names for alert queries.
    * Elasticsearch: Limit Histogram field parameter to numeric
      values.
    * Elasticsearch: Prevent pipeline aggregations to show up in
      terms order by options.
    * LibraryPanels: Prevent duplicate repeated panels from being
      created.
    * Loki: Fix ad-hoc filter in dashboard when used with parser.
    * Plugins: Track signed files + add warn log for plugin assets
      which are not signed.
    * Postgres/MySQL/MSSQL: Fix region annotations not displayed
      correctly.
    * Prometheus: Fix validate selector in metrics browser.
    * Security: Fix stylesheet injection vulnerability.
    * Security: Fix short URL vulnerability.
- Update to version 8.1.2
    * AzureMonitor: Add support for PostgreSQL and MySQL Flexible
      Servers.
    * Datasource: Change HTTP status code for failed datasource
      health check to 400.
    * Explore: Add span duration to left panel in trace viewer.
    * Plugins: Use file extension allowlist when serving plugin
      assets instead of checking for UNIX executable.
    * Profiling: Add support for binding pprof server to custom
      network interfaces.
    * Search: Make search icon keyboard navigable.
    * Template variables: Keyboard navigation improvements.
    * Tooltip: Display ms within minute time range.
    * Alerting: Fix saving LINE contact point.
    * Annotations: Fix alerting annotation coloring.
    * Annotations: Alert annotations are now visible in the correct
      Panel.
    * Auth: Hide SigV4 config UI and disable middleware when its
      config flag is disabled.
    * Dashboard: Prevent incorrect panel layout by comparing window
      width against theme breakpoints.
    * Explore: Fix showing of full log context.
    * PanelEdit: Fix 'Actual' size by passing the correct panel
      size to Dashboard.
    * Plugins: Fix TLS datasource settings.
    * Variables: Fix issue with empty drop downs on navigation.
    * Variables: Fix URL util converting false into true.
    * Toolkit: Fix matchMedia not found error.
- Update to version 8.1.1
    * CloudWatch Logs: Fix crash when no region is selected.
- Update to version 8.1.0
    * Alerting: Deduplicate receivers during migration.
    * ColorPicker: Display colors as RGBA.
    * Select: Make portalling the menu opt-in, but opt-in
      everywhere.
    * TimeRangePicker: Improve accessibility.
    * Annotations: Correct annotations that are displayed upon page
      refresh.
    * Annotations: Fix Enabled button that disappeared from Grafana
      v8.0.6.
    * Annotations: Fix data source template variable that was not
      available for annotations.
    * AzureMonitor: Fix annotations query editor that does not
      load.
    * Geomap: Fix scale calculations.
    * GraphNG: Fix y-axis autosizing.
    * Live: Display stream rate and fix duplicate channels in list
    * Loki: Update labels in log browser when time range changes in
      dashboard.
    * NGAlert: Send resolve signal to alertmanager on alerting -&gt;
      Normal.
    * PasswordField: Prevent a password from being displayed when
      you click the Enter button.
    * Renderer: Remove debug.log file when Grafana is stopped.
    * Security: Update dependencies to fix CVE-2021-36222.
- Update to version 8.1.0-beta3
    * Alerting: Support label matcher syntax in alert rule list
      filter.
    * IconButton: Put tooltip text as aria-label.
    * Live: Experimental HA with Redis.
    * UI: FileDropzone component.
    * CloudWatch: Add AWS LookoutMetrics.
    * Docker: Fix builds by delaying go mod verify until all
      required files are copied over.
    * Exemplars: Fix disable exemplars only on the query that
      failed.
    * SQL: Fix SQL dataframe resampling (fill mode + time
      intervals).
- Update to version 8.1.0-beta2
    * Alerting: Expand the value string in alert annotations and
    * Auth: Add Azure HTTP authentication middleware.
    * Auth: Auth: Pass user role when using the authentication
      proxy.
    * Gazetteer: Update countries.json file to allow for linking to
      3-letter country codes.
    * Config: Fix Docker builds by correcting formatting in
      sample.ini.
    * Explore: Fix encoding of internal URLs.
- Update to version 8.1.0-beta1
    * Alerting: Add Alertmanager notifications tab.
    * Alerting: Add button to deactivate current Alertmanager
    * Alerting: Add toggle in Loki/Prometheus data source
      configuration to opt out of alerting UI.
    * Alerting: Allow any 'evaluate for' value &gt;=0 in the alert
      rule form.
    * Alerting: Load default configuration from status endpoint, if
      Cortex Alertmanager returns empty user configuration. 
    * Alerting: view to display alert rule and its underlying data.
    * Annotation panel: Release the annotation panel.
    * Annotations: Add typeahead support for tags in built-in
      annotations.
    * AzureMonitor: Add curated dashboards for Azure services.
    * AzureMonitor: Add support for deep links to Microsoft Azure
      portal for Metrics.
    * AzureMonitor: Remove support for different credentials for
      Azure Monitor Logs.
    * AzureMonitor: Support querying any Resource for Logs queries.
    * Elasticsearch: Add frozen indices search support.
    * Elasticsearch: Name fields after template variables values
      instead of their name.
    * Elasticsearch: add rate aggregation.
    * Email: Allow configuration of content types for email
      notifications.
    * Explore: Add more meta information when line limit is hit.
    * Explore: UI improvements to trace view.
    * FieldOverrides: Added support to change display name in an
      override field and have it be matched by a later rule.
    * HTTP Client: Introduce dataproxy_max_idle_connections config
      variable.
    * InfluxDB: InfluxQL: adds tags to timeseries data.
    * InfluxDB: InfluxQL: make measurement search case insensitive.
      Legacy Alerting: Replace simplejson with a struct in webhook
      notification channel.
    * Legend: Updates display name for Last (not null) to just
      Last*.
    * Logs panel: Add option to show common labels.
    * Loki: Add $__range variable.
    * Loki: Add support for 'label_values(log stream selector,
      label)' in templating.
    * Loki: Add support for ad-hoc filtering in dashboard.
    * MySQL Datasource: Add timezone parameter.
    * NodeGraph: Show gradient fields in legend.
    * PanelOptions: Don't mutate panel options/field config object
      when updating.
    * PieChart: Make pie gradient more subtle to match other
      charts.
    * Prometheus: Update PromQL typeahead and highlighting.
    * Prometheus: interpolate variable for step field.
    * Provisioning: Improve validation by validating across all
      dashboard providers.
    * SQL Datasources: Allow multiple string/labels columns with
      time series.
    * Select: Portal select menu to document.body.
    * Team Sync: Add group mapping to support team sync in the
      Generic OAuth provider.
    * Tooltip: Make active series more noticeable.
    * Tracing: Add support to configure trace to logs start and end
      time.
    * Transformations: Skip merge when there is only a single data
      frame.
    * ValueMapping: Added support for mapping text to color,
      boolean values, NaN and Null. Improved UI for value mapping.
    * Visualizations: Dynamically set any config (min, max, unit,
      color, thresholds) from query results.
    * live: Add support to handle origin without a value for the
      port when matching with root_url.
    * Alerting: Handle marshaling Inf values.
    * AzureMonitor: Fix macro resolution for template variables.
    * AzureMonitor: Fix queries with Microsoft.NetApp/../../volumes
      resources.
    * AzureMonitor: Request and concat subsequent resource pages.
    * Bug: Fix parse duration for day.
    * Datasources: Improve error handling for error messages.
    * Explore: Correct the functionality of shift-enter shortcut
      across all uses.
    * Explore: Show all dataFrames in data tab in Inspector.
    * GraphNG: Fix Tooltip mode 'All' for XYChart.
    * Loki: Fix highlight of logs when using filter expressions
      with backticks.
    * Modal: Force modal content to overflow with scroll.
    * Plugins: Ignore symlinked folders when verifying plugin
      signature.
    * Toolkit: Improve error messages when tasks fail.
- Update to version 8.0.7
- Update to version 8.0.6
    * Alerting: Add annotation upon alert state change.
    * Alerting: Allow space in label and annotation names.
    * InfluxDB: Improve legend labels for InfluxDB query results.
    * Alerting: Fix improper alert by changing the handling of
      empty labels.
    * CloudWatch/Logs: Reestablish Cloud Watch alert behavior.
    * Dashboard: Avoid migration breaking on fieldConfig without
      defaults field in folded panel.
    * DashboardList: Fix issue not re-fetching dashboard list after
      variable change.
    * Database: Fix incorrect format of isolation level
      configuration parameter for MySQL.
    * InfluxDB: Correct tag filtering on InfluxDB data.
    * Links: Fix links that caused a full page reload.
    * Live: Fix HTTP error when InfluxDB metrics have an incomplete
      or asymmetrical field set.
    * Postgres/MySQL/MSSQL: Change time field to 'Time' for time
      series queries.
    * Postgres: Fix the handling of a null return value in query
    * Tempo: Show hex strings instead of uints for IDs.
    * TimeSeries: Improve tooltip positioning when tooltip
      overflows.
    * Transformations: Add 'prepare time series' transformer.
- Update to version 8.0.5
    * Cloudwatch Logs: Send error down to client.
    * Folders: Return 409 Conflict status when folder already
      exists.
    * TimeSeries: Do not show series in tooltip if it's hidden in
      the viz.
    * AzureMonitor: Fix issue where resource group name is missing
      on the resource picker button.
    * Chore: Fix AWS auth assuming role with workspace IAM.
    * DashboardQueryRunner: Fixes unrestrained subscriptions being
    * DateFormats: Fix reading correct setting key for
      use_browser_locale.
    * Links: Fix links to other apps outside Grafana when under sub
      path.
    * Snapshots: Fix snapshot absolute time range issue.
    * Table: Fix data link color.
    * Time Series: Fix X-axis time format when tick increment is
      larger than a year.
    * Tooltip Plugin: Prevent tooltip render if field is undefined.
- Update to version 8.0.4
    * Live: Rely on app url for origin check.
    * PieChart: Sort legend descending, update placeholder.
    * TimeSeries panel: Do not reinitialize plot when thresholds
      mode change.
    * Elasticsearch: Allow case sensitive custom options in
      date_histogram interval.
    * Elasticsearch: Restore previous field naming strategy when
      using variables.
    * Explore: Fix import of queries between SQL data sources.
    * InfluxDB: InfluxQL query editor: fix retention policy
      handling.
    * Loki: Send correct time range in template variable queries.
    * TimeSeries: Preserve RegExp series overrides when migrating
      from old graph panel.
- Update to version 8.0.3
    * Alerting: Increase alertmanager_conf column if MySQL.
    * Time series/Bar chart panel: Handle infinite numbers as nulls
      when converting to plot array.
    * TimeSeries: Ensure series overrides that contain color are
      migrated, and migrate the previous fieldConfig when changing
      the panel type.
    * ValueMappings: Improve singlestat value mappings migration.
    * Annotations: Fix annotation line and marker colors.
    * AzureMonitor: Fix KQL template variable queries without
      default workspace.
    * CloudWatch/Logs: Fix missing response data for log queries.
    * LibraryPanels: Fix crash in library panels list when panel
      plugin is not found.
    * LogsPanel: Fix performance drop when moving logs panel in
    * Loki: Parse log levels when ANSI coloring is enabled.
    * MSSQL: Fix issue with hidden queries still being executed.
    * PanelEdit: Display the VisualizationPicker that was not
      displayed if a panel has an unknown panel plugin.
    * Plugins: Fix loading symbolically linked plugins.
    * Prometheus: Fix issue where legend name was replaced with
      name Value in stat and gauge panels.
    * State Timeline: Fix crash when hovering over panel.
- Update to version 8.0.2
    * Datasource: Add support for max_conns_per_host in dataproxy
      settings.
    * Configuration: Fix changing org preferences in FireFox.
    * PieChart: Fix legend dimension limits.
    * Postgres/MySQL/MSSQL: Fix panic in concurrent map writes.
    * Variables: Hide default data source if missing from regex.
- Update to version 8.0.1
    * Alerting/SSE: Fix 'count_non_null' reducer validation.
    * Cloudwatch: Fix duplicated time series.
    * Cloudwatch: Fix missing defaultRegion.
    * Dashboard: Fix Dashboard init failed error on dashboards with
      old singlestat panels in collapsed rows.
    * Datasource: Fix storing timeout option as numeric.
    * Postgres/MySQL/MSSQL: Fix annotation parsing for empty
    * Postgres/MySQL/MSSQL: Numeric/non-string values are now
      returned from query variables.
    * Postgres: Fix an error that was thrown when the annotation
      query did not return any results.
    * StatPanel: Fix an issue with the appearance of the graph when
      switching color mode.
    * Visualizations: Fix an issue in the
      Stat/BarGauge/Gauge/PieChart panels where all values mode
      were showing the same name if they had the same value.
    * Toolkit: Resolve external fonts when Grafana is served from a
      sub path.
- Update to version 8.0.0
    * The following endpoints were deprecated for Grafana v5.0 and
      support for them has now been removed:
      GET /dashboards/db/:slug
      GET /dashboard-solo/db/:slug
      GET /api/dashboard/db/:slug
      DELETE /api/dashboards/db/:slug
    * AzureMonitor: Require default subscription for workspaces()
      template variable query.
    * AzureMonitor: Use resource type display names in the UI.
    * Dashboard: Remove support for loading and deleting dashboard
      by slug.
    * InfluxDB: Deprecate direct browser access in data source.
    * VizLegend: Add a read-only property.
    * AzureMonitor: Fix Azure Resource Graph queries in Azure
      China.
    * Checkbox: Fix vertical layout issue with checkboxes due to
      fixed height.
    * Dashboard: Fix Table view when editing causes the panel data
      to not update.
    * Dashboard: Fix issues where unsaved-changes warning is not
      displayed.
    * Login: Fixes Unauthorized message showing when on login page
      or snapshot page.
    * NodeGraph: Fix sorting markers in grid view.
    * Short URL: Include orgId in generated short URLs.
    * Variables: Support raw values of boolean type.
- Update to version 8.0.0-beta3
    * The default HTTP method for Prometheus data source is now
      POST.
    * API: Support folder UID in dashboards API.
    * Alerting: Add support for configuring avatar URL for the
      Discord notifier.
    * Alerting: Clarify that Threema Gateway Alerts support only
      Basic IDs.
    * Azure: Expose Azure settings to external plugins.
    * AzureMonitor: Deprecate using separate credentials for Azure
      Monitor Logs.
    * AzureMonitor: Display variables in resource picker for Azure
    * AzureMonitor: Hide application insights for data sources not
      using it.
    * AzureMonitor: Support querying subscriptions and resource
      groups in Azure Monitor Logs.
    * AzureMonitor: remove requirement for default subscription.
    * CloudWatch: Add Lambda@Edge Amazon CloudFront metrics.
    * CloudWatch: Add missing AWS AppSync metrics.
    * ConfirmModal: Auto focus delete button.
    * Explore: Add caching for queries that are run from logs
    * Loki: Add formatting for annotations.
    * Loki: Bring back processed bytes as meta information.
    * NodeGraph: Display node graph collapsed by default with trace
      view.
    * Overrides: Include a manual override option to hide something
      from visualization.
    * PieChart: Support row data in pie charts.
    * Prometheus: Update default HTTP method to POST for existing
      data sources.
    * Time series panel: Position tooltip correctly when window is
      scrolled or resized.
    * Admin: Fix infinite loading edit on the profile page.
    * Color: Fix issues with random colors in string and date
    * Dashboard: Fix issue with title or folder change has no
      effect after exiting settings view.
    * DataLinks: Fix an issue __series.name is not working in data
      link.
    * Datasource: Fix dataproxy timeout should always be applied
      for outgoing data source HTTP requests.
    * Elasticsearch: Fix NewClient not passing httpClientProvider
      to client impl.
    * Explore: Fix Browser title not updated on Navigation to
      Explore.
    * GraphNG: Remove fieldName and hideInLegend properties from
      UPlotSeriesBuilder.
    * OAuth: Fix fallback to auto_assign_org_role setting for Azure
      AD OAuth when no role claims exists.
    * PanelChrome: Fix issue with empty panel after adding a non
      data panel and coming back from panel edit.
    * StatPanel: Fix data link tooltip not showing for single
      value.
    * Table: Fix sorting for number fields.
    * Table: Have text underline for datalink, and add support for
      image datalink.
    * Transformations: Prevent FilterByValue transform from
      crashing panel edit.
- Update to version 8.0.0-beta2
    * AppPlugins: Expose react-router to apps.
    * AzureMonitor: Add Azure Resource Graph.
    * AzureMonitor: Managed Identity configuration UI.
    * AzureMonitor: Token provider with support for Managed
      Identities.
    * AzureMonitor: Update Logs workspace() template variable query
      to return resource URIs.
    * BarChart: Value label sizing.
    * CloudMonitoring: Add support for preprocessing.
    * CloudWatch: Add AWS/EFS StorageBytes metric.
    * CloudWatch: Allow use of missing AWS namespaces using custom
    * Datasource: Shared HTTP client provider for core backend data
      sources and any data source using the data source proxy.
    * InfluxDB: InfluxQL: allow empty tag values in the query
      editor.
    * Instrumentation: Instrument incoming HTTP request with
      histograms by default.
    * Library Panels: Add name endpoint &amp; unique name validation to
      AddLibraryPanelModal.
    * Logs panel: Support details view.
    * PieChart: Always show the calculation options dropdown in the
    * PieChart: Remove beta flag.
    * Plugins: Enforce signing for all plugins.
    * Plugins: Remove support for deprecated backend plugin
      protocol version.
    * Tempo/Jaeger: Add better display name to legend.
    * Timeline: Add time range zoom.
    * Timeline: Adds opacity &amp; line width option.
    * Timeline: Value text alignment option.
    * ValueMappings: Add duplicate action, and disable dismiss on
      backdrop click.
    * Zipkin: Add node graph view to trace response.
    * Annotations panel: Remove subpath from dashboard links.
    * Content Security Policy: Allow all image sources by default.
    * Content Security Policy: Relax default template wrt. loading
      of scripts, due to nonces not working.
    * Datasource: Fix tracing propagation for alert execution by
      introducing HTTP client outgoing tracing middleware.
    * InfluxDB: InfluxQL always apply time interval end.
    * Library Panels: Fixes 'error while loading library panels'.
    * NewsPanel: Fixes rendering issue in Safari.
    * PanelChrome: Fix queries being issued again when scrolling in
      and out of view.
    * Plugins: Fix Azure token provider cache panic and auth param
      nil value.
    * Snapshots: Fix key and deleteKey being ignored when creating
      an external snapshot.
    * Table: Fix issue with cell border not showing with colored
      background cells.
    * Table: Makes tooltip scrollable for long JSON values.
    * TimeSeries: Fix for Connected null values threshold toggle
      during panel editing.
    * Variables: Fixes inconsistent selected states on dashboard
    * Variables: Refreshes all panels even if panel is full screen.
    * QueryField: Remove carriage return character from pasted text.
- Update to version 8.0.0-beta1
  + License update:
    * AGPL License: Update license from Apache 2.0 to the GNU
      Affero General Public License (AGPL).
    * Removes the never refresh option for Query variables.
    * Removes the experimental Tags feature for Variables.
  + Deprecations:
    * The InfoBox &amp; FeatureInfoBox are now deprecated please use
      the Alert component instead with severity info.
    * API: Add org users with pagination.
    * API: Return 404 when deleting nonexistent API key.
    * API: Return query results as JSON rather than base64 encoded
      Arrow.
    * Alerting: Allow sending notification tags to Opsgenie as
      extra properties.
    * Alerts: Replaces all uses of InfoBox &amp; FeatureInfoBox with
      Alert.
    * Auth: Add support for JWT Authentication.
    * AzureMonitor: Add support for
      Microsoft.SignalRService/SignalR metrics.
    * AzureMonitor: Azure settings in Grafana server config.
    * AzureMonitor: Migrate Metrics query editor to React.
    * BarChart panel: enable series toggling via legend.
    * BarChart panel: Adds support for Tooltip in BarChartPanel.
    * PieChart panel: Change look of highlighted pie slices.
    * CloudMonitoring: Migrate config editor from angular to react.
    * CloudWatch: Add Amplify Console metrics and dimensions.
    * CloudWatch: Add missing Redshift metrics to CloudWatch data
    * CloudWatch: Add metrics for managed RabbitMQ service.
    * DashboardList: Enable templating on search tag input.
    * Datasource config: correctly remove single custom http
      header.
    * Elasticsearch: Add generic support for template variables.
    * Elasticsearch: Allow omitting field when metric supports
      inline script.
    * Elasticsearch: Allow setting a custom limit for log queries.
    * Elasticsearch: Guess field type from first non-empty value.
    * Elasticsearch: Use application/x-ndjson content type for
      multisearch requests.
    * Elasticsearch: Use semver strings to identify ES version.
    * Explore: Add logs navigation to request more logs.
    * Explore: Map Graphite queries to Loki.
    * Explore: Scroll split panes in Explore independently.
    * Explore: Wrap each panel in separate error boundary.
    * FieldDisplay: Smarter naming of stat values when visualising
      row values (all values) in stat panels.
    * Graphite: Expand metric names for variables.
    * Graphite: Handle unknown Graphite functions without breaking
      the visual editor.
    * Graphite: Show graphite functions descriptions.
    * Graphite: Support request cancellation properly (Uses new
      backendSrv.fetch Observable request API).
    * InfluxDB: Flux: Improve handling of complex
      response-structures.
    * InfluxDB: Support region annotations.
    * Inspector: Download logs for manual processing.
    * Jaeger: Add node graph view for trace.
    * Jaeger: Search traces.
    * Loki: Use data source settings for alerting queries.
    * NodeGraph: Exploration mode.
    * OAuth: Add support for empty scopes.
    * PanelChrome: New logic-less emotion based component with no
      dependency on PanelModel or DashboardModel.
    * PanelEdit: Adds a table view toggle to quickly view data in
      table form.
    * PanelEdit: Highlight matched words when searching options.
    * PanelEdit: UX improvements.
    * Plugins: PanelRenderer and simplified QueryRunner to be used
      from plugins.
    * Plugins: AuthType in route configuration and params
      interpolation.
    * Plugins: Enable plugin runtime install/uninstall
      capabilities.
    * Plugins: Support set body content in plugin routes.
    * Plugins: Introduce marketplace app.
    * Plugins: Moving the DataSourcePicker to grafana/runtime so it
      can be reused in plugins.
    * Prometheus: Add custom query params for alert and exemplars
    * Prometheus: Use fuzzy string matching to autocomplete metric
      names and label.
    * Routing: Replace Angular routing with react-router.
    * Slack: Use chat.postMessage API by default.
    * Tempo: Search for Traces by querying Loki directly from
      Tempo.
    * Tempo: Show graph view of the trace.
    * Themes: Switch theme without reload using global shortcut.
    * TimeSeries panel: Add support for shared cursor.
    * TimeSeries panel: Do not crash the panel if there is no time
      series data in the response.
    * Variables: Do not save repeated panels, rows and scopedVars.
    * Variables: Removes experimental Tags feature.
    * Variables: Removes the never refresh option.
    * Visualizations: Unify tooltip options across visualizations.
    * Visualizations: Refactor and unify option creation between
      new visualizations.
    * Visualizations: Remove singlestat panel.
    * APIKeys: Fixes issue with adding first api key.
    * Alerting: Add checks for non supported units - disable
      defaulting to seconds.
    * Alerting: Fix issue where Slack notifications won't link to
      user IDs.
    * Alerting: Omit empty message in PagerDuty notifier.
    * AzureMonitor: Fix migration error from older versions of App
      Insights queries.
    * CloudWatch: Fix AWS/Connect dimensions.
    * CloudWatch: Fix broken AWS/MediaTailor dimension name.
    * Dashboards: Allow string manipulation as advanced variable
      format option.
    * DataLinks: Includes harmless extended characters like
      Cyrillic characters.
    * Drawer: Fixes title overflowing its container.
    * Explore: Fix issue when some query errors were not shown.
    * Generic OAuth: Prevent adding duplicated users.
    * Graphite: Handle invalid annotations.
    * Graphite: Fix autocomplete when tags are not available.
    * InfluxDB: Fix Cannot read property 'length' of undefined in
      when parsing response.
    * Instrumentation: Enable tracing when Jaeger host and port are
    * Instrumentation: Prefix metrics with grafana.
    * MSSQL: By default let driver choose port.
    * OAuth: Add optional strict parsing of role_attribute_path.
    * Panel: Fixes description markdown with inline code being
      rendered on newlines and full width.
    * PanelChrome: Ignore data updates &amp; errors for non data
      panels.
    * Permissions: Fix inherited folder permissions can prevent new
      permissions being added to a dashboard.
    * Plugins: Remove pre-existing plugin installs when installing
      with grafana-cli.
    * Plugins: Support installing to folders with whitespace and
      fix pluginUrl trailing and leading whitespace failures.
    * Postgres/MySQL/MSSQL: Don't return connection failure details
      to the client.
    * Postgres: Fix ms precision of interval in time group macro
      when TimescaleDB is enabled.
    * Provisioning: Use dashboard checksum field as change
      indicator.
    * SQL: Fix so that all captured errors are returned from sql
      engine.
    * Shortcuts: Fixes panel shortcuts so they always work.
    * Table: Fixes so border is visible for cells with links.
    * Variables: Clear query when data source type changes.
    * Variables: Filters out builtin variables from unknown list.
    * Button: Introduce buttonStyle prop.
    * DataQueryRequest: Remove deprecated props showingGraph and
      showingTabel and exploreMode.
    * grafana/ui: Update React Hook Form to v7.
    * IconButton: Introduce variant for red and blue icon buttons.
    * Plugins: Expose the getTimeZone function to be able to get
      the current selected timeZone.
    * TagsInput: Add className to TagsInput.
    * VizLegend: Move onSeriesColorChanged to PanelContext
      (breaking change).
- Update to version 7.5.13
    * Alerting: Fix NoDataFound for alert rules using AND operator.

mgr-cfg:

- Version 4.3.6-1
  * Corrected source URL in spec file
  * Fix installation problem for SLE15SP4 due missing python-selinux
  * Fix python selinux package name depending on build target (bsc#1193600)
  * Do not build python 2 package for SLE15SP4 and higher
  * Remove unused legacy code

mgr-custom-info:

- Version 4.3.3-1
  * Remove unused legacy code

mgr-daemon:

- Version 4.3.4-1
  * Corrected source URLs in spec file
  * Update translation strings

mgr-osad:

- Version 4.3.6-1
  * Corrected source URL in spec file.
  * Do not build python 2 package for SLE15SP4 and higher
  * Removed spacewalk-selinux dependencies.
  * Updated source url.

mgr-push:

- Version 4.3.4-1
  * Corrected source URLs in spec file

mgr-virtualization:

- Version 4.3.5-1
  * Corrected source URLs in spec file.
  * Do not build python 2 package for SLE15SP4 and higher

prometheus-blackbox_exporter:

- Enhanced to build on Enterprise Linux 8

prometheus-postgres_exporter:

- Updated for RHEL8.

python-hwdata:

- Require python macros for building

rhnlib:

- Version 4.3.4-1
  * Reorganize python files

spacecmd:

- Version 4.3.11-1
  * on full system update call schedulePackageUpdate API (bsc#1197507)
  * parse boolean paramaters correctly (bsc#1197689)
  * Add parameter to set containerized proxy SSH port
  * Add proxy config generation subcommand
  * Option 'org_createfirst' added to perform initial organization and user creation
  * Added gettext build requirement for RHEL.
  * Removed RHEL 5 references.
  * Include group formulas configuration in spacecmd group_backup and
    spacecmd group_restore. This changes backup format to json,
    previously used plain text is still supported for reading (bsc#1190462)
  * Update translation strings
  * Improved event history listing and added new system_eventdetails 
    command to retrieve the details of an event
  * Make schedule_deletearchived to get all actions without display limit
  * Allow passing a date limit for schedule_deletearchived on spacecmd (bsc#1181223)

spacewalk-client-tools:

- Version 4.3.9-1
  * Corrected source URLs in spec file.
  * do not build python 2 package for SLE15
  * Remove unused legacy code
  * Update translation strings

spacewalk-koan:

- Version 4.3.5-1
  * Corrected source URLs in spec file.

spacewalk-oscap:

- Version 4.3.5-1
  * Corrected source URLs in spec file.
  * Do not build python 2 package for SLE15SP4 and higher

spacewalk-remote-utils:

- Version 4.3.3-1
  * Adapt the package for changes in rhnlib

supportutils-plugin-susemanager-client:

- Version 4.3.2-1
  * Add proxy containers config and logs

suseRegisterInfo:

- Version 4.3.3-1
  * Bump version to 4.3.0

supportutils-plugin-salt:

- Add support for Salt Bundle

uyuni-common-libs:

- Version 4.3.4-1
  * implement more decompression algorithms for reposync (bsc#1196704)
  * Reorganize python files
  * Add decompression of zck files to fileutils

		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-20"/>
	<updated date="2022-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181223">SUSE bug 1181223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190462">SUSE bug 1190462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190535">SUSE bug 1190535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193600">SUSE bug 1193600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194873">SUSE bug 1194873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195726">SUSE bug 1195726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195727">SUSE bug 1195727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195728">SUSE bug 1195728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196338">SUSE bug 1196338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196704">SUSE bug 1196704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197507">SUSE bug 1197507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197689">SUSE bug 1197689</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36222/">CVE-2021-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">CVE-2021-36222 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3711/">CVE-2021-3711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3711">CVE-2021-3711 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-39226/">CVE-2021-39226 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39226">CVE-2021-39226 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-41174/">CVE-2021-41174 at SUSE</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41174">CVE-2021-41174 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41244/">CVE-2021-41244 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41244">CVE-2021-41244 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43798/">CVE-2021-43798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43798">CVE-2021-43798 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43813/">CVE-2021-43813 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43813">CVE-2021-43813 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43815/">CVE-2021-43815 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43815">CVE-2021-43815 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21673/">CVE-2022-21673 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21673">CVE-2022-21673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21698">CVE-2022-21698 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21702/">CVE-2022-21702 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21702">CVE-2022-21702 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21703/">CVE-2022-21703 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21703">CVE-2022-21703 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21713/">CVE-2022-21713 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21713">CVE-2022-21713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696541" comment="golang-github-prometheus-node_exporter-1.3.0-1.15.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152680" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<description>

This update of dpdk fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-22"/>
	<updated date="2022-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696716" comment="dpdk-16.11.9-11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696717" comment="dpdk-kmp-default-16.11.9_k4.4.140_96.103.TDC-11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696718" comment="dpdk-tools-16.11.9-11.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152681" version="1" class="patch">
	<metadata>
		<title>Security update for fwupdate (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<description>

This update of fwupdate fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-22"/>
	<updated date="2022-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696152" comment="fwupdate-0.5-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696153" comment="fwupdate-efi-0.5-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696154" comment="libfwup0-0.5-10.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152682" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1070738" ref_url="https://bugzilla.suse.com/1070738" source="BUGZILLA"/>
		<reference ref_id="1198511" ref_url="https://bugzilla.suse.com/1198511" source="BUGZILLA"/>
		<reference ref_id="1199441" ref_url="https://bugzilla.suse.com/1199441" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2015-20107: avoid command injection in the mailcap module (bsc#1198511).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-23"/>
	<updated date="2022-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070738">SUSE bug 1070738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198511">SUSE bug 1198511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199441">SUSE bug 1199441</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696400" comment="libpython3_4m1_0-3.4.10-25.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696401" comment="python3-3.4.10-25.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696402" comment="python3-base-3.4.10-25.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696403" comment="python3-curses-3.4.10-25.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152683" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1200550" ref_url="https://bugzilla.suse.com/1200550" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2068" ref_url="https://www.suse.com/security/cve/CVE-2022-2068/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-2068: Fixed more shell code injection issues in c_rehash. (bsc#1200550)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-24"/>
	<updated date="2022-06-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1200550">SUSE bug 1200550</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2068/">CVE-2022-2068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">CVE-2022-2068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696404" comment="libopenssl-devel-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696405" comment="libopenssl1_0_0-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696162" comment="libopenssl1_0_0-32bit-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696406" comment="libopenssl1_0_0-hmac-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696164" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696407" comment="openssl-1.0.2j-60.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696166" comment="openssl-doc-1.0.2j-60.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152684" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198511" ref_url="https://bugzilla.suse.com/1198511" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2015-20107: avoid command injection in the mailcap module (bsc#1198511).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-04"/>
	<updated date="2022-07-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198511">SUSE bug 1198511</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696408" comment="libpython2_7-1_0-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696171" comment="libpython2_7-1_0-32bit-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696409" comment="python-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696173" comment="python-32bit-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696410" comment="python-base-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696175" comment="python-base-32bit-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696411" comment="python-curses-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696412" comment="python-demo-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696543" comment="python-devel-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696179" comment="python-doc-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696180" comment="python-doc-pdf-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696413" comment="python-gdbm-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696414" comment="python-idle-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696415" comment="python-tk-2.7.18-28.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696416" comment="python-xml-2.7.18-28.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152685" version="1" class="patch">
	<metadata>
		<title>Security update for sysstat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1144923" ref_url="https://bugzilla.suse.com/1144923" source="BUGZILLA"/>
		<reference ref_id="1159104" ref_url="https://bugzilla.suse.com/1159104" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19725" ref_url="https://www.suse.com/security/cve/CVE-2019-19725/" source="CVE"/>
		<description>
This update for sysstat fixes the following issues:

Security issue fixed:                                                                                                                                                               
                                                                                                                                                                                   
- CVE-2019-19725: Fixed double free in check_file_actlst in sa_common.c (bsc#1159104).                                                                                    

Bug fixes:

- Enable log information of starting/stoping services. (bsc#1144923, jsc#SLE-5958)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-04"/>
	<updated date="2022-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144923">SUSE bug 1144923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159104">SUSE bug 1159104</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19725/">CVE-2019-19725 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19725">CVE-2019-19725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522597" comment="sysstat-12.0.2-10.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009557523" comment="sysstat-isag-12.0.2-10.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152686" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1153866" ref_url="https://bugzilla.suse.com/1153866" source="BUGZILLA"/>
		<reference ref_id="1200387" ref_url="https://bugzilla.suse.com/1200387" source="BUGZILLA"/>
		<reference ref_id="1200388" ref_url="https://bugzilla.suse.com/1200388" source="BUGZILLA"/>
		<reference ref_id="1200389" ref_url="https://bugzilla.suse.com/1200389" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17540" ref_url="https://www.suse.com/security/cve/CVE-2019-17540/" source="CVE"/>
		<reference ref_id="CVE-2022-32545" ref_url="https://www.suse.com/security/cve/CVE-2022-32545/" source="CVE"/>
		<reference ref_id="CVE-2022-32546" ref_url="https://www.suse.com/security/cve/CVE-2022-32546/" source="CVE"/>
		<reference ref_id="CVE-2022-32547" ref_url="https://www.suse.com/security/cve/CVE-2022-32547/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:
 
  - CVE-2019-17540: Fixed heap-based buffer overflow in ReadPSInfo in coders/ps.c. (bsc#1153866)
  - CVE-2022-32545: Fixed an outside the range of representable values of type. (bsc#1200388)
  - CVE-2022-32546: Fixed an outside the range of representable values of type. (bsc#1200389)
  - CVE-2022-32547: Fixed a load of misaligned address at MagickCore/property.c. (bsc#1200387)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-05"/>
	<updated date="2022-07-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153866">SUSE bug 1153866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200387">SUSE bug 1200387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200388">SUSE bug 1200388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200389">SUSE bug 1200389</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17540/">CVE-2019-17540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-17540">CVE-2019-17540 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-32545/">CVE-2022-32545 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32545">CVE-2022-32545 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-32546/">CVE-2022-32546 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32546">CVE-2022-32546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32547/">CVE-2022-32547 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32547">CVE-2022-32547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696720" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.177.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696721" comment="ImageMagick-config-6-upstream-6.8.8.1-71.177.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696722" comment="libMagickCore-6_Q16-1-6.8.8.1-71.177.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696723" comment="libMagickWand-6_Q16-1-6.8.8.1-71.177.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152687" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1200793" ref_url="https://bugzilla.suse.com/1200793" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-31744" ref_url="https://www.suse.com/security/cve/CVE-2022-31744/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34478" ref_url="https://www.suse.com/security/cve/CVE-2022-34478/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 91.11.0 ESR (MFSA 2022-25) (bsc#1200793):

- CVE-2022-2200: Undesired attributes could be set as part of prototype pollution (bmo#1771381)
- CVE-2022-31744: CSP bypass enabling stylesheet injection (bmo#1757604)
- CVE-2022-34468: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI (bmo#1768537)
- CVE-2022-34470: Use-after-free in nsSHistory (bmo#1765951)
- CVE-2022-34472: Unavailable PAC file resulted in OCSP requests being blocked (bmo#1770123)
- CVE-2022-34478: Microsoft protocols can be attacked if a user accepts a prompt (bmo#1773717)
- CVE-2022-34479: A popup window could be resized in a way to overlay the address bar with web content (bmo#1745595)
- CVE-2022-34481: Potential integer overflow in ReplaceElementsAt (bmo#1497246)
- CVE-2022-34484: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 (bmo#1763634, bmo#1772651)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-06"/>
	<updated date="2022-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2200">CVE-2022-2200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31744/">CVE-2022-31744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31744">CVE-2022-31744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34468">CVE-2022-34468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34470">CVE-2022-34470 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34472">CVE-2022-34472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34478/">CVE-2022-34478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34478">CVE-2022-34478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34479">CVE-2022-34479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34481">CVE-2022-34481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34484">CVE-2022-34484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700049" comment="MozillaFirefox-91.11.0-112.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700050" comment="MozillaFirefox-devel-91.11.0-112.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700051" comment="MozillaFirefox-translations-common-91.11.0-112.119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152688" version="1" class="patch">
	<metadata>
		<title>Security update for crash (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<description>

This update of crash fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-07"/>
	<updated date="2022-07-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700179" comment="crash-7.1.8-7.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700180" comment="crash-gcore-7.1.8-7.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700181" comment="crash-kmp-default-7.1.8_k4.4.140_96.103.TDC-7.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152689" version="1" class="patch">
	<metadata>
		<title>Security update for rsyslog (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199061" ref_url="https://bugzilla.suse.com/1199061" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24903" ref_url="https://www.suse.com/security/cve/CVE-2022-24903/" source="CVE"/>
		<description>
This update for rsyslog fixes the following issues:

- CVE-2022-24903: fix potential heap buffer overflow in modules for TCP syslog reception (bsc#1199061)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-07"/>
	<updated date="2022-07-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199061">SUSE bug 1199061</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24903/">CVE-2022-24903 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24903">CVE-2022-24903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696544" comment="rsyslog-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696545" comment="rsyslog-diag-tools-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696546" comment="rsyslog-doc-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696547" comment="rsyslog-module-gssapi-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696548" comment="rsyslog-module-gtls-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696549" comment="rsyslog-module-mysql-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696550" comment="rsyslog-module-pgsql-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696551" comment="rsyslog-module-relp-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696552" comment="rsyslog-module-snmp-8.24.0-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696553" comment="rsyslog-module-udpspoof-8.24.0-3.58.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152690" version="1" class="patch">
	<metadata>
		<title>Security update for pcre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199232" ref_url="https://bugzilla.suse.com/1199232" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1586" ref_url="https://www.suse.com/security/cve/CVE-2022-1586/" source="CVE"/>
		<description>
This update for pcre fixes the following issues:
	  
- CVE-2022-1586: Fixed unicode property matching issue. (bsc#1199232)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-08"/>
	<updated date="2022-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199232">SUSE bug 1199232</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1586/">CVE-2022-1586 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">CVE-2022-1586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009696418" comment="libpcre1-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696199" comment="libpcre1-32bit-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696419" comment="libpcre16-0-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696556" comment="libpcrecpp0-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696557" comment="libpcreposix0-8.45-8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696558" comment="pcre-devel-8.45-8.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152691" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1200737" ref_url="https://bugzilla.suse.com/1200737" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32208" ref_url="https://www.suse.com/security/cve/CVE-2022-32208/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-32208: FTP-KRB bad message verification (bsc#1200737)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-11"/>
	<updated date="2022-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200737">SUSE bug 1200737</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32208/">CVE-2022-32208 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32208">CVE-2022-32208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700062" comment="curl-7.37.0-37.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700063" comment="libcurl4-7.37.0-37.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700064" comment="libcurl4-32bit-7.37.0-37.79.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700062" comment="curl-7.37.0-37.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700063" comment="libcurl4-7.37.0-37.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700064" comment="libcurl4-32bit-7.37.0-37.79.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152692" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194179" ref_url="https://bugzilla.suse.com/1194179" source="BUGZILLA"/>
		<reference ref_id="1194181" ref_url="https://bugzilla.suse.com/1194181" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2319" ref_url="https://www.suse.com/security/cve/CVE-2022-2319/" source="CVE"/>
		<reference ref_id="CVE-2022-2320" ref_url="https://www.suse.com/security/cve/CVE-2022-2320/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2022-2319: Fixed out-of-bounds access in _CheckSetSections() (ZDI-CAN-16062) (bsc#1194179).
- CVE-2022-2320: Fixed out-of-bounds access in CheckSetDeviceIndicators() (ZDI-CAN-16070) (bsc#1194181).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-12"/>
	<updated date="2022-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194179">SUSE bug 1194179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194181">SUSE bug 1194181</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2319/">CVE-2022-2319 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2319">CVE-2022-2319 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2320/">CVE-2022-2320 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2320">CVE-2022-2320 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700065" comment="xorg-x11-server-7.6_1.18.3-76.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700066" comment="xorg-x11-server-extra-7.6_1.18.3-76.49.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700065" comment="xorg-x11-server-7.6_1.18.3-76.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700066" comment="xorg-x11-server-extra-7.6_1.18.3-76.49.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152693" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1183436" ref_url="https://bugzilla.suse.com/1183436" source="BUGZILLA"/>
		<reference ref_id="1185921" ref_url="https://bugzilla.suse.com/1185921" source="BUGZILLA"/>
		<reference ref_id="1200907" ref_url="https://bugzilla.suse.com/1200907" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25097" ref_url="https://www.suse.com/security/cve/CVE-2020-25097/" source="CVE"/>
		<reference ref_id="CVE-2021-28651" ref_url="https://www.suse.com/security/cve/CVE-2021-28651/" source="CVE"/>
		<reference ref_id="CVE-2021-46784" ref_url="https://www.suse.com/security/cve/CVE-2021-46784/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-25097: Fixed HTTP Request Smuggling (bsc#1183436)
- CVE-2021-28651: Fixed DoS in URN processing (bsc#1185921)
- CVE-2021-46784: Fixed DoS when processing gopher server responses (bsc#1200907)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-13"/>
	<updated date="2022-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183436">SUSE bug 1183436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185921">SUSE bug 1185921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200907">SUSE bug 1200907</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25097/">CVE-2020-25097 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25097">CVE-2020-25097 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28651/">CVE-2021-28651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28651">CVE-2021-28651 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46784/">CVE-2021-46784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46784">CVE-2021-46784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700074" comment="squid-3.5.21-26.35.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700074" comment="squid-3.5.21-26.35.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152694" version="1" class="patch">
	<metadata>
		<title>Security update for logrotate (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192449" ref_url="https://bugzilla.suse.com/1192449" source="BUGZILLA"/>
		<reference ref_id="1200278" ref_url="https://bugzilla.suse.com/1200278" source="BUGZILLA"/>
		<reference ref_id="1200802" ref_url="https://bugzilla.suse.com/1200802" source="BUGZILLA"/>
		<description>
This update for logrotate fixes the following issues:

Security issues fixed:

- Improved coredump handing for SUID binaries (bsc#1192449).

Non-security issues fixed:

- Fixed 'logrotate emits unintended warning: keyword size not properly separated, found 0x3d' (bsc#1200278, bsc#1200802).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-14"/>
	<updated date="2022-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192449">SUSE bug 1192449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200278">SUSE bug 1200278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200802">SUSE bug 1200802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700182" comment="logrotate-3.11.0-2.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152695" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201221" ref_url="https://bugzilla.suse.com/1201221" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22662" ref_url="https://www.suse.com/security/cve/CVE-2022-22662/" source="CVE"/>
		<reference ref_id="CVE-2022-22677" ref_url="https://www.suse.com/security/cve/CVE-2022-22677/" source="CVE"/>
		<reference ref_id="CVE-2022-26710" ref_url="https://www.suse.com/security/cve/CVE-2022-26710/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.4 (bsc#1201221):

- CVE-2022-22662: Processing maliciously crafted web content may disclose sensitive user information.
- CVE-2022-22677: The video in a webRTC call may be interrupted if the audio capture gets interrupted.
- CVE-2022-26710: Processing maliciously crafted web content may lead to arbitrary code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-22"/>
	<updated date="2022-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201221">SUSE bug 1201221</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22662/">CVE-2022-22662 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22662">CVE-2022-22662 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22677/">CVE-2022-22677 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22677">CVE-2022-22677 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26710/">CVE-2022-26710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26710">CVE-2022-26710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700091" comment="libjavascriptcoregtk-4_0-18-2.36.4-2.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700092" comment="libwebkit2gtk-4_0-37-2.36.4-2.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700008" comment="libwebkit2gtk3-lang-2.36.4-2.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700093" comment="typelib-1_0-JavaScriptCore-4_0-2.36.4-2.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700094" comment="typelib-1_0-WebKit2-4_0-2.36.4-2.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700095" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.4-2.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700096" comment="webkit2gtk-4_0-injected-bundles-2.36.4-2.102.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700091" comment="libjavascriptcoregtk-4_0-18-2.36.4-2.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700092" comment="libwebkit2gtk-4_0-37-2.36.4-2.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700008" comment="libwebkit2gtk3-lang-2.36.4-2.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700093" comment="typelib-1_0-JavaScriptCore-4_0-2.36.4-2.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700094" comment="typelib-1_0-WebKit2-4_0-2.36.4-2.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700095" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.4-2.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700096" comment="webkit2gtk-4_0-injected-bundles-2.36.4-2.102.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152696" version="1" class="patch">
	<metadata>
		<title>Security update for python-M2Crypto (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178829" ref_url="https://bugzilla.suse.com/1178829" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25657" ref_url="https://www.suse.com/security/cve/CVE-2020-25657/" source="CVE"/>
		<description>
This update for python-M2Crypto fixes the following issues:

- CVE-2020-25657: Fixed Bleichenbacher timing attacks in the RSA decryption API (bsc#1178829).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-22"/>
	<updated date="2022-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178829">SUSE bug 1178829</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25657/">CVE-2020-25657 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25657">CVE-2020-25657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700102" comment="python-M2Crypto-0.29.0-23.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700103" comment="python3-M2Crypto-0.29.0-23.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700102" comment="python-M2Crypto-0.29.0-23.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700103" comment="python3-M2Crypto-0.29.0-23.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152697" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201225" ref_url="https://bugzilla.suse.com/1201225" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-34903" ref_url="https://www.suse.com/security/cve/CVE-2022-34903/" source="CVE"/>
		<description>
This update for gpg2 fixes the following issues:

- CVE-2022-34903: Fixed a status injection vulnerability (bsc#1201225).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-22"/>
	<updated date="2022-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201225">SUSE bug 1201225</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34903/">CVE-2022-34903 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34903">CVE-2022-34903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009701178" comment="gpg2-2.0.24-9.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701176" comment="gpg2-lang-2.0.24-9.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009701178" comment="gpg2-2.0.24-9.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701176" comment="gpg2-lang-2.0.24-9.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152698" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198671" ref_url="https://bugzilla.suse.com/1198671" source="BUGZILLA"/>
		<reference ref_id="1198672" ref_url="https://bugzilla.suse.com/1198672" source="BUGZILLA"/>
		<reference ref_id="1198673" ref_url="https://bugzilla.suse.com/1198673" source="BUGZILLA"/>
		<reference ref_id="1198674" ref_url="https://bugzilla.suse.com/1198674" source="BUGZILLA"/>
		<reference ref_id="1198675" ref_url="https://bugzilla.suse.com/1198675" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u332 - April 2022 CPU (icedtea-3.23.0)

- CVE-2022-21426: Better XPath expression handling (bsc#1198672)
- CVE-2022-21443: Improved Object Identification (bsc#1198675)
- CVE-2022-21434: Better invocation handler handling (bsc#1198674)
- CVE-2022-21476: Improve Santuario processing (bsc#1198671)
- CVE-2022-21496: Improve URL supports (bsc#1198673)

And further Security fixes, Import of OpenJDK 8 u332, Backports and Bug fixes.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-22"/>
	<updated date="2022-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198671">SUSE bug 1198671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198672">SUSE bug 1198672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198673">SUSE bug 1198673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198674">SUSE bug 1198674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198675">SUSE bug 1198675</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700075" comment="java-1_8_0-openjdk-1.8.0.332-27.75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700076" comment="java-1_8_0-openjdk-demo-1.8.0.332-27.75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700077" comment="java-1_8_0-openjdk-devel-1.8.0.332-27.75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700078" comment="java-1_8_0-openjdk-headless-1.8.0.332-27.75.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700075" comment="java-1_8_0-openjdk-1.8.0.332-27.75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700076" comment="java-1_8_0-openjdk-demo-1.8.0.332-27.75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700077" comment="java-1_8_0-openjdk-devel-1.8.0.332-27.75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700078" comment="java-1_8_0-openjdk-headless-1.8.0.332-27.75.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152699" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1191546" ref_url="https://bugzilla.suse.com/1191546" source="BUGZILLA"/>
		<reference ref_id="1192079" ref_url="https://bugzilla.suse.com/1192079" source="BUGZILLA"/>
		<reference ref_id="1192080" ref_url="https://bugzilla.suse.com/1192080" source="BUGZILLA"/>
		<reference ref_id="1192086" ref_url="https://bugzilla.suse.com/1192086" source="BUGZILLA"/>
		<reference ref_id="1192087" ref_url="https://bugzilla.suse.com/1192087" source="BUGZILLA"/>
		<reference ref_id="1192228" ref_url="https://bugzilla.suse.com/1192228" source="BUGZILLA"/>
		<reference ref_id="1193170" ref_url="https://bugzilla.suse.com/1193170" source="BUGZILLA"/>
		<reference ref_id="1195040" ref_url="https://bugzilla.suse.com/1195040" source="BUGZILLA"/>
		<reference ref_id="1198486" ref_url="https://bugzilla.suse.com/1198486" source="BUGZILLA"/>
		<reference ref_id="1198980" ref_url="https://bugzilla.suse.com/1198980" source="BUGZILLA"/>
		<reference ref_id="1200325" ref_url="https://bugzilla.suse.com/1200325" source="BUGZILLA"/>
		<reference ref_id="1201298" ref_url="https://bugzilla.suse.com/1201298" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to fix various issues:

FIPS 140-3 enablement patches were backported from SUSE Linux Enterprise 15.

- FIPS: add on-demand integrity tests through sftk_FIPSRepeatIntegrityCheck() (bsc#1198980).
- FIPS: mark algorithms as approved/non-approved according to security policy (bsc#1191546, bsc#1201298).
- FISP: remove hard disabling of unapproved algorithms. This requirement is now
  fulfilled by the service level indicator (bsc#1200325).

Version update to NSS 3.79

- Use PK11_GetSlotInfo instead of raw C_GetSlotInfo calls.
- Update mercurial in clang-format docker image.
- Use of uninitialized pointer in lg_init after alloc fail.
- selfserv and tstclnt should use PR_GetPrefLoopbackAddrInfo.
- Add SECMOD_LockedModuleHasRemovableSlots.
- Fix secasn1d parsing of indefinite SEQUENCE inside indefinite GROUP.
- Added RFC8422 compliant TLS &lt;= 1.2 undefined/compressed ECPointFormat extension alerts.
- TLS 1.3 Server: Send protocol_version alert on unsupported ClientHello.legacy_version.
- Correct invalid record inner and outer content type alerts.
- NSS does not properly import or export pkcs12 files with large passwords and pkcs5v2 encoding.
- improve error handling after nssCKFWInstance_CreateObjectHandle.
- Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple.
- NSS 3.79 should depend on NSPR 4.34   

Update to NSS 3.78.1

- Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple

update to NSS 3.78

- Added TLS 1.3 zero-length inner plaintext checks and tests, zero-length record/fragment handling tests.
- Reworked overlong record size checks and added TLS1.3 specific boundaries.
- Add ECH Grease Support to tstclnt
- Add a strict variant of moz::pkix::CheckCertHostname.
- Change SSL_REUSE_SERVER_ECDHE_KEY default to false.
- Make SEC_PKCS12EnableCipher succeed
- Update zlib in NSS to 1.2.12.

Update to NSS 3.77:

- resolve mpitests build failure on Windows.
- Fix link to TLS page on wireshark wiki
- Add two D-TRUST 2020 root certificates.
- Add Telia Root CA v2 root certificate.
- Remove expired explicitly distrusted certificates from certdata.txt.
- support specific RSA-PSS parameters in mozilla::pkix
- Remove obsolete stateEnd check in SEC_ASN1DecoderUpdate.
- Remove token member from NSSSlot struct.
- Provide secure variants of mpp_pprime and mpp_make_prime.
- Support UTF-8 library path in the module spec string.
- Update nssUTF8_Length to RFC 3629 and fix buffer overrun.
- Add a CI Target for gcc-11.
- Change to makefiles for gcc-4.8.
- Update googletest to 1.11.0
- Add SetTls13GreaseEchSize to experimental API.
- TLS 1.3 Illegal legacy_version handling/alerts.
- Fix calculation of ECH HRR Transcript.
- Allow ld path to be set as environment variable.
- Ensure we don't read uninitialized memory in ssl gtests.
- Fix DataBuffer Move Assignment.
- internal_error alert on Certificate Request with sha1+ecdsa in TLS 1.3
- rework signature verification in mozilla::pkix

update to NSS 3.76.1

- Remove token member from NSSSlot struct.

NSS 3.76

- Hold tokensLock through nssToken_GetSlot calls in nssTrustDomain_GetActiveSlots.
- Check return value of PK11Slot_GetNSSToken.
- Use Wycheproof JSON for RSASSA-PSS
- Add SHA256 fingerprint comments to old certdata.txt entries.
- Avoid truncating files in nss-release-helper.py.
- Throw illegal_parameter alert for illegal extensions in handshake message.

update to NSS 3.75

- Make DottedOIDToCode.py compatible with python3.
- Avoid undefined shift in SSL_CERT_IS while fuzzing.
- Remove redundant key type check.
- Update ABI expectations to match ECH changes.
- Enable CKM_CHACHA20.
- check return on NSS_NoDB_Init and NSS_Shutdown.
- real move assignment operator.
- Run ECDSA test vectors from bltest as part of the CI tests.
- Add ECDSA test vectors to the bltest command line tool.
- Allow to build using clang's integrated assembler.
- Allow to override python for the build.
- test HKDF output rather than input.
- Use ASSERT macros to end failed tests early.
- move assignment operator for DataBuffer.
- Add test cases for ECH compression and unexpected extensions in SH.
- Update tests for ECH-13.
- Tidy up error handling.
- Add tests for ECH HRR Changes.
- Server only sends GREASE HRR extension if enabled by preference.
- Update generation of the Associated Data for ECH-13.
- When ECH is accepted, reject extensions which were only advertised in the Outer Client Hello.
- Allow for compressed, non-contiguous, extensions.
- Scramble the PSK extension in CHOuter.
- Split custom extension handling for ECH.
- Add ECH-13 HRR Handling.
- Client side ECH padding.
- Stricter ClientHelloInner Decompression.
- Remove ECH_inner extension, use new enum format.
- Update the version number for ECH-13 and adjust the ECHConfig size.

Update to NSS 3.74:

- mozilla::pkix: support SHA-2 hashes in CertIDs in OCSP responses
- Ensure clients offer consistent ciphersuites after HRR
- NSS does not properly restrict server keys based on policy
- Set nssckbi version number to 2.54
- Replace Google Trust Services LLC (GTS) R4 root certificate
- Replace Google Trust Services LLC (GTS) R3 root certificate
- Replace Google Trust Services LLC (GTS) R2 root certificate
- Replace Google Trust Services LLC (GTS) R1 root certificate
- Replace GlobalSign ECC Root CA R4
- Remove Expired Root Certificates - DST Root CA X3
- Remove Expiring Cybertrust Global Root and GlobalSign root certificates
- Add renewed Autoridad de Certificacion Firmaprofesional CIF A62634068 root certificate
- Add iTrusChina ECC root certificate
- Add iTrusChina RSA root certificate
- Add ISRG Root X2 root certificate
- Add Chunghwa Telecom's HiPKI Root CA - G1 root certificate
- Avoid a clang 13 unused variable warning in opt build
- Check for missing signedData field
- Ensure DER encoded signatures are within size limits
- enable key logging option (bsc#1195040)

Update to NSS 3.73.1:

- Add SHA-2 support to mozilla::pkix's OSCP implementation

Update to NSS 3.73

- check for missing signedData field.
- Ensure DER encoded signatures are within size limits.
- NSS needs FiPS 140-3 version indicators.
- pkix_CacheCert_Lookup doesn't return cached certs
- sunset Coverity from NSS

MFSA 2021-51 (bsc#1193170) CVE-2021-43527: Memory corruption via DER-encoded DSA and RSA-PSS signatures

Update to NSS 3.72

- Fix nsinstall parallel failure.
- Increase KDF cache size to mitigate perf regression in about:logins

Update to NSS 3.71

- Set nssckbi version number to 2.52.
- Respect server requirements of tlsfuzzer/test-tls13-signature-algorithms.py
- Import of PKCS#12 files with Camellia encryption is not supported
- Add HARICA Client ECC Root CA 2021.
- Add HARICA Client RSA Root CA 2021.
- Add HARICA TLS ECC Root CA 2021.
- Add HARICA TLS RSA Root CA 2021.
- Add TunTrust Root CA certificate to NSS.

update to NSS 3.70

- Update test case to verify fix.
- Explicitly disable downgrade check in TlsConnectStreamTls13.EchOuterWith12Max
- Explicitly disable downgrade check in TlsConnectTest.DisableFalseStartOnFallback
- Avoid using a lookup table in nssb64d.
- Use HW accelerated SHA2 on AArch64 Big Endian.
- Change default value of enableHelloDowngradeCheck to true.
- Cache additional PBE entries.
- Read HPKE vectors from official JSON.

Update to NSS 3.69.1

- Disable DTLS 1.0 and 1.1 by default
- integrity checks in key4.db not happening on private components with AES_CBC

NSS 3.69

- Disable DTLS 1.0 and 1.1 by default (backed out again)
- integrity checks in key4.db not happening on private components with AES_CBC (backed out again)
- SSL handling of signature algorithms ignores environmental invalid algorithms.
- sqlite 3.34 changed it's open semantics, causing nss failures.
- Gtest update changed the gtest reports, losing gtest details in all.sh reports.
- NSS incorrectly accepting 1536 bit DH primes in FIPS mode
- SQLite calls could timeout in starvation situations.
- Coverity/cpp scanner errors found in nss 3.67
- Import the NSS documentation from MDN in nss/doc.
- NSS using a tempdir to measure sql performance not active

- FIPS: scan LD_LIBRARY_PATH for external libraries to be checksummed.
- Run test suite at build time, and make it pass (bsc#1198486).
- Enable FIPS during test certificate creation and disables the library checksum
  validation during same.
- FIPS: allow checksumming to be disabled, but only if we entered FIPS mode
  due to NSS_FIPS being set, not if it came from /proc.
- FIPS: This makes the PBKDF known answer test compliant with NIST SP800-132.
- FIPS: update validation string to version-release format. (bsc#1192079). 
- FIPS: remove XCBC MAC from list of FIPS approved algorithms.
- Enable NSS_ENABLE_FIPS_INDICATORS and set NSS_FIPS_MODULE_ID
  for build.
- FIPS: claim 3DES unapproved in FIPS mode (bsc#1192080).
- FIPS: allow testing of unapproved algorithms (bsc#1192228).
- FIPS: adds FIPS version indicators. (bmo#1729550, bsc#1192086).
- FIPS: Add CSP clearing (bmo#1697303, bsc#1192087).

mozilla-nspr was updated to version 4.34:

* add an API that returns a preferred loopback IP on hosts that
  have two IP stacks available.

update to 4.33:
* fixes to build system and export of private symbols

		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-22"/>
	<updated date="2022-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1191546">SUSE bug 1191546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192079">SUSE bug 1192079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192080">SUSE bug 1192080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192086">SUSE bug 1192086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192087">SUSE bug 1192087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192228">SUSE bug 1192228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195040">SUSE bug 1195040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198486">SUSE bug 1198486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198980">SUSE bug 1198980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200325">SUSE bug 1200325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201298">SUSE bug 1201298</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700938" comment="libfreebl3-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700918" comment="libfreebl3-32bit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700939" comment="libfreebl3-hmac-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700920" comment="libfreebl3-hmac-32bit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700940" comment="libsoftokn3-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700922" comment="libsoftokn3-32bit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700941" comment="libsoftokn3-hmac-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700924" comment="libsoftokn3-hmac-32bit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700942" comment="mozilla-nspr-4.34-19.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700926" comment="mozilla-nspr-32bit-4.34-19.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700947" comment="mozilla-nspr-devel-4.34-19.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700943" comment="mozilla-nss-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700929" comment="mozilla-nss-32bit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700944" comment="mozilla-nss-certs-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700931" comment="mozilla-nss-certs-32bit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700948" comment="mozilla-nss-devel-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700945" comment="mozilla-nss-sysinit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700934" comment="mozilla-nss-sysinit-32bit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700946" comment="mozilla-nss-tools-3.79-58.75.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700938" comment="libfreebl3-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700918" comment="libfreebl3-32bit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700939" comment="libfreebl3-hmac-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700920" comment="libfreebl3-hmac-32bit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700940" comment="libsoftokn3-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700922" comment="libsoftokn3-32bit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700941" comment="libsoftokn3-hmac-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700924" comment="libsoftokn3-hmac-32bit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700942" comment="mozilla-nspr-4.34-19.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700926" comment="mozilla-nspr-32bit-4.34-19.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700947" comment="mozilla-nspr-devel-4.34-19.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700943" comment="mozilla-nss-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700929" comment="mozilla-nss-32bit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700944" comment="mozilla-nss-certs-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700931" comment="mozilla-nss-certs-32bit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700948" comment="mozilla-nss-devel-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700945" comment="mozilla-nss-sysinit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700934" comment="mozilla-nss-sysinit-32bit-3.79-58.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700946" comment="mozilla-nss-tools-3.79-58.75.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152700" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1200119" ref_url="https://bugzilla.suse.com/1200119" source="BUGZILLA"/>
		<reference ref_id="1201431" ref_url="https://bugzilla.suse.com/1201431" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29187" ref_url="https://www.suse.com/security/cve/CVE-2022-29187/" source="CVE"/>
		<description>
This update for git fixes the following issues:

- CVE-2022-29187: Incomplete fix for CVE-2022-24765: potential command injection via git worktree (bsc#1201431).
- Allow to opt-out from the check added in the security fix for CVE-2022-24765 (bsc#1200119)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-22"/>
	<updated date="2022-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200119">SUSE bug 1200119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201431">SUSE bug 1201431</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29187/">CVE-2022-29187 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29187">CVE-2022-29187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700082" comment="git-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700083" comment="git-core-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700084" comment="git-cvs-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700085" comment="git-daemon-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700086" comment="git-email-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700087" comment="git-gui-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700088" comment="git-svn-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700089" comment="git-web-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700090" comment="gitk-2.26.2-27.57.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700082" comment="git-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700083" comment="git-core-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700084" comment="git-cvs-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700085" comment="git-daemon-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700086" comment="git-email-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700087" comment="git-gui-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700088" comment="git-svn-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700089" comment="git-web-2.26.2-27.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700090" comment="gitk-2.26.2-27.57.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152701" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1198670" ref_url="https://bugzilla.suse.com/1198670" source="BUGZILLA"/>
		<reference ref_id="1198671" ref_url="https://bugzilla.suse.com/1198671" source="BUGZILLA"/>
		<reference ref_id="1198672" ref_url="https://bugzilla.suse.com/1198672" source="BUGZILLA"/>
		<reference ref_id="1198673" ref_url="https://bugzilla.suse.com/1198673" source="BUGZILLA"/>
		<reference ref_id="1198674" ref_url="https://bugzilla.suse.com/1198674" source="BUGZILLA"/>
		<reference ref_id="1198675" ref_url="https://bugzilla.suse.com/1198675" source="BUGZILLA"/>
		<reference ref_id="1201643" ref_url="https://bugzilla.suse.com/1201643" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21449" ref_url="https://www.suse.com/security/cve/CVE-2022-21449/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update to Java 7.1 Service Refresh 5 Fix Pack 10 (bsc#1201643), including fixes for:
  
- CVE-2022-21476 (bsc#1198671), CVE-2022-21449 (bsc#1198670),
  CVE-2022-21496 (bsc#1198673), CVE-2022-21434 (bsc#1198674),
  CVE-2022-21426 (bsc#1198672), CVE-2022-21443 (bsc#1198675),
  CVE-2021-35561 (bsc#1191912), CVE-2022-21299 (bsc#1194931).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-23"/>
	<updated date="2022-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198670">SUSE bug 1198670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198671">SUSE bug 1198671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198672">SUSE bug 1198672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198673">SUSE bug 1198673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198674">SUSE bug 1198674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198675">SUSE bug 1198675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201643">SUSE bug 1201643</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21449/">CVE-2022-21449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21449">CVE-2022-21449 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009701366" comment="java-1_7_1-ibm-1.7.1_sr5.10-38.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701351" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.10-38.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701367" comment="java-1_7_1-ibm-devel-1.7.1_sr5.10-38.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701368" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.10-38.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701354" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.10-38.71.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009701366" comment="java-1_7_1-ibm-1.7.1_sr5.10-38.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701351" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.10-38.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701367" comment="java-1_7_1-ibm-devel-1.7.1_sr5.10-38.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701368" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.10-38.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701354" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.10-38.71.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152702" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1198670" ref_url="https://bugzilla.suse.com/1198670" source="BUGZILLA"/>
		<reference ref_id="1198671" ref_url="https://bugzilla.suse.com/1198671" source="BUGZILLA"/>
		<reference ref_id="1198672" ref_url="https://bugzilla.suse.com/1198672" source="BUGZILLA"/>
		<reference ref_id="1198673" ref_url="https://bugzilla.suse.com/1198673" source="BUGZILLA"/>
		<reference ref_id="1198674" ref_url="https://bugzilla.suse.com/1198674" source="BUGZILLA"/>
		<reference ref_id="1198675" ref_url="https://bugzilla.suse.com/1198675" source="BUGZILLA"/>
		<reference ref_id="1201643" ref_url="https://bugzilla.suse.com/1201643" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21449" ref_url="https://www.suse.com/security/cve/CVE-2022-21449/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 7 Fix Pack 10 (bsc#1201643), including fixes for:

- CVE-2022-21476 (bsc#1198671), CVE-2022-21449 (bsc#1198670),
  CVE-2022-21496 (bsc#1198673), CVE-2022-21434 (bsc#1198674),
  CVE-2022-21426 (bsc#1198672), CVE-2022-21443 (bsc#1198675),
  CVE-2021-35561 (bsc#1191912), CVE-2022-21299 (bsc#1194931).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-23"/>
	<updated date="2022-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198670">SUSE bug 1198670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198671">SUSE bug 1198671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198672">SUSE bug 1198672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198673">SUSE bug 1198673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198674">SUSE bug 1198674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198675">SUSE bug 1198675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201643">SUSE bug 1201643</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21449/">CVE-2022-21449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21449">CVE-2022-21449 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009701364" comment="java-1_8_0-ibm-1.8.0_sr7.10-30.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701347" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.10-30.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701365" comment="java-1_8_0-ibm-devel-1.8.0_sr7.10-30.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701349" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.10-30.90.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009701364" comment="java-1_8_0-ibm-1.8.0_sr7.10-30.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701347" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.10-30.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701365" comment="java-1_8_0-ibm-devel-1.8.0_sr7.10-30.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701349" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.10-30.90.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152703" version="1" class="patch">
	<metadata>
		<title>Security update for pcre2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199235" ref_url="https://bugzilla.suse.com/1199235" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1587" ref_url="https://www.suse.com/security/cve/CVE-2022-1587/" source="CVE"/>
		<description>
This update for pcre2 fixes the following issues:

- CVE-2022-1587: Fixed out-of-bounds read due to bug in recursions (bsc#1199235).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-27"/>
	<updated date="2022-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199235">SUSE bug 1199235</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1587/">CVE-2022-1587 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1587">CVE-2022-1587 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009701369" comment="libpcre2-16-0-10.34-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701370" comment="libpcre2-32-0-10.34-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701371" comment="libpcre2-8-0-10.34-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701372" comment="libpcre2-posix2-10.34-1.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009701369" comment="libpcre2-16-0-10.34-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701370" comment="libpcre2-32-0-10.34-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701371" comment="libpcre2-8-0-10.34-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701372" comment="libpcre2-posix2-10.34-1.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152704" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199965" ref_url="https://bugzilla.suse.com/1199965" source="BUGZILLA"/>
		<reference ref_id="1199966" ref_url="https://bugzilla.suse.com/1199966" source="BUGZILLA"/>
		<reference ref_id="1200549" ref_url="https://bugzilla.suse.com/1200549" source="BUGZILLA"/>
		<reference ref_id="1201394" ref_url="https://bugzilla.suse.com/1201394" source="BUGZILLA"/>
		<reference ref_id="1201469" ref_url="https://bugzilla.suse.com/1201469" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123/" source="CVE"/>
		<reference ref_id="CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125/" source="CVE"/>
		<reference ref_id="CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166/" source="CVE"/>
		<reference ref_id="CVE-2022-23816" ref_url="https://www.suse.com/security/cve/CVE-2022-23816/" source="CVE"/>
		<reference ref_id="CVE-2022-23825" ref_url="https://www.suse.com/security/cve/CVE-2022-23825/" source="CVE"/>
		<reference ref_id="CVE-2022-26362" ref_url="https://www.suse.com/security/cve/CVE-2022-26362/" source="CVE"/>
		<reference ref_id="CVE-2022-26363" ref_url="https://www.suse.com/security/cve/CVE-2022-26363/" source="CVE"/>
		<reference ref_id="CVE-2022-26364" ref_url="https://www.suse.com/security/cve/CVE-2022-26364/" source="CVE"/>
		<reference ref_id="CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900/" source="CVE"/>
		<reference ref_id="CVE-2022-33745" ref_url="https://www.suse.com/security/cve/CVE-2022-33745/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-26363, CVE-2022-26364: Fixed insufficient care with non-coherent mappings (XSA-402) (bsc#1199966).
- CVE-2022-21123, CVE-2022-21125, CVE-2022-21166: Fixed MMIO stale data vulnerabilities on x86 (XSA-404) (bsc#1200549).
- CVE-2022-26362: Fixed a race condition in typeref acquisition (XSA-401) (bsc#1199965).
- CVE-2022-33745: Fixed insufficient TLB flush for x86 PV guests in shadow mode (XSA-408) (bsc#1201394).
- CVE-2022-23816, CVE-2022-23825, CVE-2022-29900: Fixed RETBLEED vulnerability, arbitrary speculative code execution with return instructions (XSA-407) (bsc#1201469).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-28"/>
	<updated date="2022-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199965">SUSE bug 1199965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199966">SUSE bug 1199966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200549">SUSE bug 1200549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201394">SUSE bug 1201394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201469">SUSE bug 1201469</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123">CVE-2022-21123 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21125">CVE-2022-21125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166">CVE-2022-21166 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23816/">CVE-2022-23816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-23816">CVE-2022-23816 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23825/">CVE-2022-23825 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23825">CVE-2022-23825 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26362/">CVE-2022-26362 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26362">CVE-2022-26362 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26363/">CVE-2022-26363 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26363">CVE-2022-26363 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26364/">CVE-2022-26364 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26364">CVE-2022-26364 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-33745/">CVE-2022-33745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33745">CVE-2022-33745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009702582" comment="xen-4.9.4_30-3.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702583" comment="xen-doc-html-4.9.4_30-3.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702584" comment="xen-libs-4.9.4_30-3.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702585" comment="xen-libs-32bit-4.9.4_30-3.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702586" comment="xen-tools-4.9.4_30-3.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702587" comment="xen-tools-domU-4.9.4_30-3.106.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009702582" comment="xen-4.9.4_30-3.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702583" comment="xen-doc-html-4.9.4_30-3.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702584" comment="xen-libs-4.9.4_30-3.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702585" comment="xen-libs-32bit-4.9.4_30-3.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702586" comment="xen-tools-4.9.4_30-3.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702587" comment="xen-tools-domU-4.9.4_30-3.106.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152705" version="1" class="patch">
	<metadata>
		<title>Security update for crash (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<description>

This update of crash fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-28"/>
	<updated date="2022-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700131" comment="crash-7.1.8-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700132" comment="crash-gcore-7.1.8-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700133" comment="crash-kmp-default-7.1.8_k4.4.180_94.164-4.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152706" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201496" ref_url="https://bugzilla.suse.com/1201496" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32742" ref_url="https://www.suse.com/security/cve/CVE-2022-32742/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2022-32742: Fixed incorrect length check in SMB1write, SMB1write_and_close, SMB1write_and_unlock (bsc#1201496).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-29"/>
	<updated date="2022-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201496">SUSE bug 1201496</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32742/">CVE-2022-32742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32742">CVE-2022-32742 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009703728" comment="libdcerpc-binding0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703668" comment="libdcerpc-binding0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703729" comment="libdcerpc0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703670" comment="libdcerpc0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703730" comment="libndr-krb5pac0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703672" comment="libndr-krb5pac0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703731" comment="libndr-nbt0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703674" comment="libndr-nbt0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703732" comment="libndr-standard0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703676" comment="libndr-standard0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703733" comment="libndr0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703678" comment="libndr0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703734" comment="libnetapi0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703680" comment="libnetapi0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703735" comment="libsamba-credentials0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703682" comment="libsamba-credentials0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703736" comment="libsamba-errors0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703684" comment="libsamba-errors0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703737" comment="libsamba-hostconfig0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703686" comment="libsamba-hostconfig0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703738" comment="libsamba-passdb0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703688" comment="libsamba-passdb0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703739" comment="libsamba-util0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703690" comment="libsamba-util0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703740" comment="libsamdb0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703692" comment="libsamdb0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703741" comment="libsmbclient0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703694" comment="libsmbclient0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703742" comment="libsmbconf0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703696" comment="libsmbconf0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703743" comment="libsmbldap0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703698" comment="libsmbldap0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703744" comment="libtevent-util0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703700" comment="libtevent-util0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703745" comment="libwbclient0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703702" comment="libwbclient0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703746" comment="samba-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703747" comment="samba-client-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703705" comment="samba-client-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703706" comment="samba-doc-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703748" comment="samba-libs-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703708" comment="samba-libs-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703749" comment="samba-winbind-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703710" comment="samba-winbind-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009703728" comment="libdcerpc-binding0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703668" comment="libdcerpc-binding0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703729" comment="libdcerpc0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703670" comment="libdcerpc0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703730" comment="libndr-krb5pac0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703672" comment="libndr-krb5pac0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703731" comment="libndr-nbt0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703674" comment="libndr-nbt0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703732" comment="libndr-standard0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703676" comment="libndr-standard0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703733" comment="libndr0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703678" comment="libndr0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703734" comment="libnetapi0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703680" comment="libnetapi0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703735" comment="libsamba-credentials0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703682" comment="libsamba-credentials0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703736" comment="libsamba-errors0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703684" comment="libsamba-errors0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703737" comment="libsamba-hostconfig0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703686" comment="libsamba-hostconfig0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703738" comment="libsamba-passdb0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703688" comment="libsamba-passdb0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703739" comment="libsamba-util0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703690" comment="libsamba-util0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703740" comment="libsamdb0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703692" comment="libsamdb0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703741" comment="libsmbclient0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703694" comment="libsmbclient0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703742" comment="libsmbconf0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703696" comment="libsmbconf0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703743" comment="libsmbldap0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703698" comment="libsmbldap0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703744" comment="libtevent-util0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703700" comment="libtevent-util0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703745" comment="libwbclient0-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703702" comment="libwbclient0-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703746" comment="samba-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703747" comment="samba-client-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703705" comment="samba-client-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703706" comment="samba-doc-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703748" comment="samba-libs-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703708" comment="samba-libs-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703749" comment="samba-winbind-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703710" comment="samba-winbind-32bit-4.6.16+git.324.6bba9ddab76-3.73.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152707" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201758" ref_url="https://bugzilla.suse.com/1201758" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-36318" ref_url="https://www.suse.com/security/cve/CVE-2022-36318/" source="CVE"/>
		<reference ref_id="CVE-2022-36319" ref_url="https://www.suse.com/security/cve/CVE-2022-36319/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.12.0 ESR (bsc#1201758):

- CVE-2022-36319: Mouse Position spoofing with CSS transforms
- CVE-2022-36318: Directory indexes for bundled resources reflected URL parameters
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-29"/>
	<updated date="2022-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201758">SUSE bug 1201758</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36318/">CVE-2022-36318 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36318">CVE-2022-36318 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36319/">CVE-2022-36319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36319">CVE-2022-36319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009703725" comment="MozillaFirefox-91.12.0-112.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703726" comment="MozillaFirefox-devel-91.12.0-112.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703727" comment="MozillaFirefox-translations-common-91.12.0-112.124.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009703725" comment="MozillaFirefox-91.12.0-112.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703726" comment="MozillaFirefox-devel-91.12.0-112.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703727" comment="MozillaFirefox-translations-common-91.12.0-112.124.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152708" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201267" ref_url="https://bugzilla.suse.com/1201267" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-30550" ref_url="https://www.suse.com/security/cve/CVE-2022-30550/" source="CVE"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2022-30550: Fixed privilege escalation in dovecot when similar master and non-master passdbs are used (bsc#1201267).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-01"/>
	<updated date="2022-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201267">SUSE bug 1201267</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-30550/">CVE-2022-30550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30550">CVE-2022-30550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700098" comment="dovecot22-2.2.31-19.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700099" comment="dovecot22-backend-mysql-2.2.31-19.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700100" comment="dovecot22-backend-pgsql-2.2.31-19.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700101" comment="dovecot22-backend-sqlite-2.2.31-19.29.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700098" comment="dovecot22-2.2.31-19.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700099" comment="dovecot22-backend-mysql-2.2.31-19.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700100" comment="dovecot22-backend-pgsql-2.2.31-19.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700101" comment="dovecot22-backend-sqlite-2.2.31-19.29.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152709" version="1" class="patch">
	<metadata>
		<title>Security update for xscreensaver (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186918" ref_url="https://bugzilla.suse.com/1186918" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34557" ref_url="https://www.suse.com/security/cve/CVE-2021-34557/" source="CVE"/>
		<description>
This update for xscreensaver fixes the following issues:

- CVE-2021-34557: Fixed potential crash and unlock while disconnecting video output with more than 10 monitors (bsc#1186918)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-03"/>
	<updated date="2022-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186918">SUSE bug 1186918</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34557/">CVE-2021-34557 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34557">CVE-2021-34557 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700185" comment="xscreensaver-5.22-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700186" comment="xscreensaver-data-5.22-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152710" version="1" class="patch">
	<metadata>
		<title>Security update for python-numpy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193911" ref_url="https://bugzilla.suse.com/1193911" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41495" ref_url="https://www.suse.com/security/cve/CVE-2021-41495/" source="CVE"/>
		<description>
This update for python-numpy fixes the following issues:

- CVE-2021-41495: Fixed Null Pointer Dereference in numpy.sort (bsc#1193911).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-03"/>
	<updated date="2022-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193911">SUSE bug 1193911</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41495/">CVE-2021-41495 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41495">CVE-2021-41495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700184" comment="python-numpy-1.8.0-5.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152711" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201174" ref_url="https://bugzilla.suse.com/1201174" source="BUGZILLA"/>
		<reference ref_id="1201175" ref_url="https://bugzilla.suse.com/1201175" source="BUGZILLA"/>
		<reference ref_id="1201176" ref_url="https://bugzilla.suse.com/1201176" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2056" ref_url="https://www.suse.com/security/cve/CVE-2022-2056/" source="CVE"/>
		<reference ref_id="CVE-2022-2057" ref_url="https://www.suse.com/security/cve/CVE-2022-2057/" source="CVE"/>
		<reference ref_id="CVE-2022-2058" ref_url="https://www.suse.com/security/cve/CVE-2022-2058/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2022-2056: Fixed a division by zero denial of service (bsc#1201176).
- CVE-2022-2057: Fixed a division by zero denial of service (bsc#1201175).
- CVE-2022-2058: Fixed a division by zero denial of service (bsc#1201174).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-03"/>
	<updated date="2022-08-03"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1201174">SUSE bug 1201174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201175">SUSE bug 1201175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201176">SUSE bug 1201176</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2056/">CVE-2022-2056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2056">CVE-2022-2056 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2057/">CVE-2022-2057 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2057">CVE-2022-2057 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2058/">CVE-2022-2058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2058">CVE-2022-2058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700187" comment="libtiff5-4.0.9-44.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700188" comment="libtiff5-32bit-4.0.9-44.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700189" comment="tiff-4.0.9-44.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152712" version="1" class="patch">
	<metadata>
		<title>Security update for qpdf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188514" ref_url="https://bugzilla.suse.com/1188514" source="BUGZILLA"/>
		<reference ref_id="1201830" ref_url="https://bugzilla.suse.com/1201830" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36978" ref_url="https://www.suse.com/security/cve/CVE-2021-36978/" source="CVE"/>
		<reference ref_id="CVE-2022-34503" ref_url="https://www.suse.com/security/cve/CVE-2022-34503/" source="CVE"/>
		<description>
This update for qpdf fixes the following issues:

- CVE-2022-34503: Fixed a heap buffer overflow via the function QPDF::processXRefStream (bsc#1201830).
- CVE-2021-36978: Fixed heap-based buffer overflow in Pl_ASCII85Decoder::write (bsc#1188514).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-04"/>
	<updated date="2022-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188514">SUSE bug 1188514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201830">SUSE bug 1201830</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36978/">CVE-2021-36978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36978">CVE-2021-36978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-34503/">CVE-2022-34503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34503">CVE-2022-34503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009703723" comment="libqpdf18-7.1.1-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703724" comment="qpdf-7.1.1-3.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009703723" comment="libqpdf18-7.1.1-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703724" comment="qpdf-7.1.1-3.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152713" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201716" ref_url="https://bugzilla.suse.com/1201716" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2476" ref_url="https://www.suse.com/security/cve/CVE-2022-2476/" source="CVE"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2022-2476: Fixed a Null pointer dereference in wvunpack (bsc#1201716).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-05"/>
	<updated date="2022-08-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1201716">SUSE bug 1201716</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2476/">CVE-2022-2476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2476">CVE-2022-2476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701478" comment="libwavpack1-4.60.99-5.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152714" version="1" class="patch">
	<metadata>
		<title>Security update for dpkg (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199944" ref_url="https://bugzilla.suse.com/1199944" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1664" ref_url="https://www.suse.com/security/cve/CVE-2022-1664/" source="CVE"/>
		<description>
This update for dpkg fixes the following issues:

- CVE-2022-1664: Fixed directory traversal vulnerability in Dpkg::Source::Archive (bsc#1199944).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-05"/>
	<updated date="2022-08-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1199944">SUSE bug 1199944</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1664/">CVE-2022-1664 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1664">CVE-2022-1664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700183" comment="update-alternatives-1.18.4-16.3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152715" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194859" ref_url="https://bugzilla.suse.com/1194859" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44142" ref_url="https://www.suse.com/security/cve/CVE-2021-44142/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-44142: Fixed out-of-Bound Read/Write on Samba vfs_fruit module. (bsc#1194859)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-01"/>
	<updated date="2022-02-01"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194859">SUSE bug 1194859</bugzilla>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44142/">CVE-2021-44142 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44142">CVE-2021-44142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666331" comment="libdcerpc-binding0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666161" comment="libdcerpc-binding0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666332" comment="libdcerpc0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666163" comment="libdcerpc0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666333" comment="libndr-krb5pac0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666165" comment="libndr-krb5pac0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666334" comment="libndr-nbt0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666167" comment="libndr-nbt0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666335" comment="libndr-standard0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666169" comment="libndr-standard0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666336" comment="libndr0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666171" comment="libndr0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666337" comment="libnetapi0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666173" comment="libnetapi0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666338" comment="libsamba-credentials0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666175" comment="libsamba-credentials0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666339" comment="libsamba-errors0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666177" comment="libsamba-errors0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666340" comment="libsamba-hostconfig0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666179" comment="libsamba-hostconfig0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666341" comment="libsamba-passdb0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666181" comment="libsamba-passdb0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666342" comment="libsamba-util0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666183" comment="libsamba-util0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666343" comment="libsamdb0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666185" comment="libsamdb0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666344" comment="libsmbclient0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666187" comment="libsmbclient0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666345" comment="libsmbconf0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666189" comment="libsmbconf0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666346" comment="libsmbldap0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666191" comment="libsmbldap0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666347" comment="libtevent-util0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666193" comment="libtevent-util0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666348" comment="libwbclient0-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666195" comment="libwbclient0-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666349" comment="samba-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666350" comment="samba-client-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666198" comment="samba-client-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666199" comment="samba-doc-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666351" comment="samba-libs-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666201" comment="samba-libs-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666352" comment="samba-winbind-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666203" comment="samba-winbind-32bit-4.6.16+git.320.a2d80a7efef-3.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152716" version="1" class="patch">
	<metadata>
		<title>Security update for mokutil (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198458" ref_url="https://bugzilla.suse.com/1198458" source="BUGZILLA"/>
		<description>
This update for mokutil fixes the following issues:

- Adds SBAT revocation support to mokutil. (bsc#1198458)

New options added (see manpage):

- mokutil --sbat

  List all entries in SBAT.

- mokutil --set-sbat-policy  (latest | previous | delete)
  To set the SBAT acceptance policy.

- mokutil --list-sbat-revocations

  To list the current SBAT revocations.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-09"/>
	<updated date="2022-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198458">SUSE bug 1198458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696169" comment="mokutil-0.2.0-12.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009696169" comment="mokutil-0.2.0-12.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152717" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198627" ref_url="https://bugzilla.suse.com/1198627" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29458" ref_url="https://www.suse.com/security/cve/CVE-2022-29458/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

- CVE-2022-29458: Fixed segfaulting out-of-bounds read in convert_strings in tinfo/read_entry.c (bsc#1198627).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-09"/>
	<updated date="2022-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198627">SUSE bug 1198627</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29458/">CVE-2022-29458 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">CVE-2022-29458 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009701179" comment="libncurses5-5.9-78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701180" comment="libncurses5-32bit-5.9-78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701181" comment="libncurses6-5.9-78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701182" comment="libncurses6-32bit-5.9-78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701183" comment="ncurses-devel-5.9-78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701184" comment="ncurses-devel-32bit-5.9-78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701185" comment="ncurses-utils-5.9-78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701186" comment="tack-5.9-78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701187" comment="terminfo-5.9-78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701188" comment="terminfo-base-5.9-78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152718" version="1" class="patch">
	<metadata>
		<title>Recommended update for python36 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<description>
This update for python36 fixes the following issues:

- Rename patch to unify it with other packages.
- Skip failing tests on s390x.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-11"/>
	<updated date="2022-08-11"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706390" comment="libpython3_6m1_0-3.6.15-6.67.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706391" comment="python36-3.6.15-6.67.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706392" comment="python36-base-3.6.15-6.67.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706393" comment="python36-curses-3.6.15-6.67.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706394" comment="python36-dbm-3.6.15-6.67.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706395" comment="python36-devel-3.6.15-6.67.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706396" comment="python36-idle-3.6.15-6.67.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706397" comment="python36-testsuite-3.6.15-6.67.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706398" comment="python36-tk-3.6.15-6.67.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706399" comment="python36-tools-3.6.15-6.67.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152719" version="1" class="patch">
	<metadata>
		<title>Security update for open-iscsi (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179908" ref_url="https://bugzilla.suse.com/1179908" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13987" ref_url="https://www.suse.com/security/cve/CVE-2020-13987/" source="CVE"/>
		<reference ref_id="CVE-2020-13988" ref_url="https://www.suse.com/security/cve/CVE-2020-13988/" source="CVE"/>
		<reference ref_id="CVE-2020-17437" ref_url="https://www.suse.com/security/cve/CVE-2020-17437/" source="CVE"/>
		<description>
This update for open-iscsi fixes the following issues:

Fixed various vulnerabilities in the embedded TCP/IP stack (bsc#1179908):
 - CVE-2020-13987: Fixed an out of bounds memory access when
   calculating the checksums for IP packets.
 - CVE-2020-13988: Fixed an integer overflow when parsing TCP MSS
   options of IPv4 network packets.
 - CVE-2020-17437: Fixed an out of bounds memory access when the TCP
   urgent flag is set.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-15"/>
	<updated date="2022-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179908">SUSE bug 1179908</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-13987/">CVE-2020-13987 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13987">CVE-2020-13987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13988/">CVE-2020-13988 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13988">CVE-2020-13988 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-17437/">CVE-2020-17437 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17437">CVE-2020-17437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704786" comment="iscsiuio-0.7.8.2-53.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704787" comment="libopeniscsiusr0_2_0-2.0.876-53.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704788" comment="open-iscsi-2.0.876-53.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704786" comment="iscsiuio-0.7.8.2-53.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704787" comment="libopeniscsiusr0_2_0-2.0.876-53.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704788" comment="open-iscsi-2.0.876-53.34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152720" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1195163" ref_url="https://bugzilla.suse.com/1195163" source="BUGZILLA"/>
		<reference ref_id="1201684" ref_url="https://bugzilla.suse.com/1201684" source="BUGZILLA"/>
		<reference ref_id="1201692" ref_url="https://bugzilla.suse.com/1201692" source="BUGZILLA"/>
		<reference ref_id="1201694" ref_url="https://bugzilla.suse.com/1201694" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Updated to version jdk8u345 (icedtea-3.24.0)
    - CVE-2022-21540: Fixed a potential Java sandbox bypass (bsc#1201694).
    - CVE-2022-21541: Fixed a potential Java sandbox bypass (bsc#1201692).
    - CVE-2022-34169: Fixed an issue where arbitrary bytecode could
      be executed via a malicious stylesheet (bsc#1201684).

- Non-security fixes:
    - Allowed for customization of PKCS12 keystores (bsc#1195163).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-16"/>
	<updated date="2022-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195163">SUSE bug 1195163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201684">SUSE bug 1201684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201692">SUSE bug 1201692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201694">SUSE bug 1201694</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704778" comment="java-1_8_0-openjdk-1.8.0.345-27.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704779" comment="java-1_8_0-openjdk-demo-1.8.0.345-27.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704780" comment="java-1_8_0-openjdk-devel-1.8.0.345-27.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704781" comment="java-1_8_0-openjdk-headless-1.8.0.345-27.78.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704778" comment="java-1_8_0-openjdk-1.8.0.345-27.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704779" comment="java-1_8_0-openjdk-demo-1.8.0.345-27.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704780" comment="java-1_8_0-openjdk-devel-1.8.0.345-27.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704781" comment="java-1_8_0-openjdk-headless-1.8.0.345-27.78.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152721" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201727" ref_url="https://bugzilla.suse.com/1201727" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21233" ref_url="https://www.suse.com/security/cve/CVE-2022-21233/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220809 release (bsc#1201727):

- CVE-2022-21233: Fixed an issue where stale data may have been leaked from the legacy xAPIC MMIO region, which could be used to compromise an SGX enclave (INTEL-SA-00657).
    See also: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html

Other fixes:

- Update for functional issues.
    See also: https://www.intel.com/content/www/us/en/processors/xeon/scalable/xeon-scalable-spec-update.html?wapkw=processor+specification+update

- Updated Platforms:

  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | SKX-SP         | B1       | 06-55-03/97 | 0100015d | 0100015e | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006d05 | 02006e05 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006d05 | 02006e05 | Xeon D-21xx
  | ICX-SP         | D0       | 06-6a-06/87 | 0d000363 | 0d000375 | Xeon Scalable Gen3
  | GLK            | B0       | 06-7a-01/01 | 0000003a | 0000003c | Pentium Silver N/J5xxx, Celeron N/J4xxx
  | GLK-R          | R0       | 06-7a-08/01 | 0000001e | 00000020 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-U/Y        | D1       | 06-7e-05/80 | 000000b0 | 000000b2 | Core Gen10 Mobile
  | TGL-R          | C0       | 06-8c-02/c2 | 00000026 | 00000028 | Core Gen11 Mobile
  | TGL-H          | R0       | 06-8d-01/c2 | 0000003e | 00000040 | Core Gen11 Mobile
  | RKL-S          | B0       | 06-a7-01/02 | 00000053 | 00000054 | Core Gen11
  | ADL            | C0       | 06-97-02/03 | 0000001f | 00000022 | Core Gen12
  | ADL            | C0       | 06-97-05/03 | 0000001f | 00000022 | Core Gen12
  | ADL            | L0       | 06-9a-03/80 | 0000041c | 00000421 | Core Gen12
  | ADL            | L0       | 06-9a-04/80 | 0000041c | 00000421 | Core Gen12
  | ADL            | C0       | 06-bf-02/03 | 0000001f | 00000022 | Core Gen12
  | ADL            | C0       | 06-bf-05/03 | 0000001f | 00000022 | Core Gen12
  ------------------------------------------------------------------
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-18"/>
	<updated date="2022-08-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201727">SUSE bug 1201727</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21233/">CVE-2022-21233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21233">CVE-2022-21233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707017" comment="ucode-intel-20220809-13.101.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707017" comment="ucode-intel-20220809-13.101.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152722" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202175" ref_url="https://bugzilla.suse.com/1202175" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-37434" ref_url="https://www.suse.com/security/cve/CVE-2022-37434/" source="CVE"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2022-37434: Fixed heap-based buffer over-read or buffer overflow via large gzip header extra field (bsc#1202175).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-18"/>
	<updated date="2022-08-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202175">SUSE bug 1202175</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37434/">CVE-2022-37434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706364" comment="libz1-1.2.8-12.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706365" comment="libz1-32bit-1.2.8-12.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706366" comment="zlib-devel-1.2.8-12.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706364" comment="libz1-1.2.8-12.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706365" comment="libz1-32bit-1.2.8-12.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706366" comment="zlib-devel-1.2.8-12.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152723" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201840" ref_url="https://bugzilla.suse.com/1201840" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29154" ref_url="https://www.suse.com/security/cve/CVE-2022-29154/" source="CVE"/>
		<description>
This update for rsync fixes the following issues:

- CVE-2022-29154: Fixed an arbitrary file write issue that could be
  triggered by a malicious remote server (bsc#1201840).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-19"/>
	<updated date="2022-08-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201840">SUSE bug 1201840</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29154/">CVE-2022-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29154">CVE-2022-29154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707023" comment="rsync-3.1.0-13.19.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707023" comment="rsync-3.1.0-13.19.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152724" version="1" class="patch">
	<metadata>
		<title>Security update for perl-HTTP-Daemon (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201157" ref_url="https://bugzilla.suse.com/1201157" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31081" ref_url="https://www.suse.com/security/cve/CVE-2022-31081/" source="CVE"/>
		<description>
This update for perl-HTTP-Daemon fixes the following issues:

- CVE-2022-31081: Fixed request smuggling in HTTP::Daemon (bsc#1201157).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-23"/>
	<updated date="2022-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201157">SUSE bug 1201157</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31081/">CVE-2022-31081 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31081">CVE-2022-31081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701125" comment="perl-HTTP-Daemon-6.01-9.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152725" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027496" ref_url="https://bugzilla.suse.com/1027496" source="BUGZILLA"/>
		<reference ref_id="1178386" ref_url="https://bugzilla.suse.com/1178386" source="BUGZILLA"/>
		<reference ref_id="1179694" ref_url="https://bugzilla.suse.com/1179694" source="BUGZILLA"/>
		<reference ref_id="1179721" ref_url="https://bugzilla.suse.com/1179721" source="BUGZILLA"/>
		<reference ref_id="1181505" ref_url="https://bugzilla.suse.com/1181505" source="BUGZILLA"/>
		<reference ref_id="1182117" ref_url="https://bugzilla.suse.com/1182117" source="BUGZILLA"/>
		<reference ref_id="941234" ref_url="https://bugzilla.suse.com/941234" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180/" source="CVE"/>
		<reference ref_id="CVE-2016-10228" ref_url="https://www.suse.com/security/cve/CVE-2016-10228/" source="CVE"/>
		<reference ref_id="CVE-2019-25013" ref_url="https://www.suse.com/security/cve/CVE-2019-25013/" source="CVE"/>
		<reference ref_id="CVE-2020-27618" ref_url="https://www.suse.com/security/cve/CVE-2020-27618/" source="CVE"/>
		<reference ref_id="CVE-2020-29562" ref_url="https://www.suse.com/security/cve/CVE-2020-29562/" source="CVE"/>
		<reference ref_id="CVE-2020-29573" ref_url="https://www.suse.com/security/cve/CVE-2020-29573/" source="CVE"/>
		<reference ref_id="CVE-2021-3326" ref_url="https://www.suse.com/security/cve/CVE-2021-3326/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2015-5180: Fix crash with internal QTYPE in resolv (bsc#941234, BZ #18784)
- CVE-2016-10228: Rewrite iconv option parsing (bsc#1027496, BZ #19519)
- CVE-2019-25013: Fix buffer overrun in EUC-KR conversion module (bsc#1182117, BZ #24973)
- CVE-2020-27618: Accept redundant shift sequences in IBM1364 iconv module (bsc#1178386, BZ #26224)
- CVE-2020-29562: Fix incorrect UCS4 inner loop bounds in iconv (bsc#1179694, BZ #26923)
- CVE-2020-29573: Hardened printf against non-normal long double values (bsc#1179721, BZ #26649)
- CVE-2021-3326: Fix assertion failure in ISO-2022-JP-3 gconv module (bsc#1181505, BZ #27256)

- Recognize ppc64p7 arch to build for power7
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2022-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027496">SUSE bug 1027496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178386">SUSE bug 1178386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179694">SUSE bug 1179694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179721">SUSE bug 1179721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181505">SUSE bug 1181505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182117">SUSE bug 1182117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941234">SUSE bug 941234</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5180">CVE-2015-5180 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10228/">CVE-2016-10228 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10228">CVE-2016-10228 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-25013/">CVE-2019-25013 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">CVE-2019-25013 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27618/">CVE-2020-27618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">CVE-2020-27618 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29562/">CVE-2020-29562 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29562">CVE-2020-29562 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29573/">CVE-2020-29573 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29573">CVE-2020-29573 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3326/">CVE-2021-3326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">CVE-2021-3326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706213" comment="glibc-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706214" comment="glibc-32bit-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706215" comment="glibc-devel-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706216" comment="glibc-devel-32bit-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706217" comment="glibc-html-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706218" comment="glibc-i18ndata-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706219" comment="glibc-info-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706220" comment="glibc-locale-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706221" comment="glibc-locale-32bit-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706222" comment="glibc-profile-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706223" comment="glibc-profile-32bit-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706224" comment="nscd-2.22-126.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706213" comment="glibc-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706214" comment="glibc-32bit-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706215" comment="glibc-devel-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706216" comment="glibc-devel-32bit-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706217" comment="glibc-html-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706218" comment="glibc-i18ndata-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706219" comment="glibc-info-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706220" comment="glibc-locale-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706221" comment="glibc-locale-32bit-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706222" comment="glibc-profile-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706223" comment="glibc-profile-32bit-2.22-126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706224" comment="nscd-2.22-126.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152726" version="1" class="patch">
	<metadata>
		<title>Security update for raptor (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178903" ref_url="https://bugzilla.suse.com/1178903" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25713" ref_url="https://www.suse.com/security/cve/CVE-2020-25713/" source="CVE"/>
		<description>
This update for raptor fixes the following issues:

- CVE-2020-25713: Fixed an out of bounds access triggered via a
  malformed input file (bsc#1178903).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-25"/>
	<updated date="2022-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178903">SUSE bug 1178903</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25713/">CVE-2020-25713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25713">CVE-2020-25713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706367" comment="libraptor2-0-2.0.15-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152727" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201684" ref_url="https://bugzilla.suse.com/1201684" source="BUGZILLA"/>
		<reference ref_id="1201685" ref_url="https://bugzilla.suse.com/1201685" source="BUGZILLA"/>
		<reference ref_id="1201692" ref_url="https://bugzilla.suse.com/1201692" source="BUGZILLA"/>
		<reference ref_id="1201694" ref_url="https://bugzilla.suse.com/1201694" source="BUGZILLA"/>
		<reference ref_id="1202427" ref_url="https://bugzilla.suse.com/1202427" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-21549" ref_url="https://www.suse.com/security/cve/CVE-2022-21549/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Updated to Java 7.1 Service Refresh 5 Fix Pack 15 (bsc#1202427):
  - CVE-2022-34169: Fixed an integer truncation issue in the Xalan
    Java XSLT library that occurred when processing malicious
    stylesheets (bsc#1201684).
  - CVE-2022-21549: Fixed an issue that could lead to computing
    negative random exponentials (bsc#1201685).
  - CVE-2022-21541: Fixed a potential bypass of sandbox restrictions
    in the Hotspot component (bsc#1201692).
  - CVE-2022-21540: Fixed a potential bypass of sandbox restrictions
    in the Hotspot component (bsc#1201694).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-25"/>
	<updated date="2022-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201684">SUSE bug 1201684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201685">SUSE bug 1201685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201692">SUSE bug 1201692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201694">SUSE bug 1201694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202427">SUSE bug 1202427</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21549/">CVE-2022-21549 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21549">CVE-2022-21549 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707298" comment="java-1_7_1-ibm-1.7.1_sr5.15-38.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707276" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707299" comment="java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707300" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707279" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707298" comment="java-1_7_1-ibm-1.7.1_sr5.15-38.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707276" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707299" comment="java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707300" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707279" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152728" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201684" ref_url="https://bugzilla.suse.com/1201684" source="BUGZILLA"/>
		<reference ref_id="1201685" ref_url="https://bugzilla.suse.com/1201685" source="BUGZILLA"/>
		<reference ref_id="1201692" ref_url="https://bugzilla.suse.com/1201692" source="BUGZILLA"/>
		<reference ref_id="1201694" ref_url="https://bugzilla.suse.com/1201694" source="BUGZILLA"/>
		<reference ref_id="1202427" ref_url="https://bugzilla.suse.com/1202427" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-21549" ref_url="https://www.suse.com/security/cve/CVE-2022-21549/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 7 Fix Pack 11 (bsc#1202427):
  - CVE-2022-34169: Fixed an integer truncation issue in the Xalan
    Java XSLT library that occurred when processing malicious
    stylesheets (bsc#1201684).
  - CVE-2022-21549: Fixed an issue that could lead to computing
    negative random exponentials (bsc#1201685).
  - CVE-2022-21541: Fixed a potential bypass of sandbox restrictions
    in the Hotspot component (bsc#1201692).
  - CVE-2022-21540: Fixed a potential bypass of sandbox restrictions
    in the Hotspot component (bsc#1201694).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-25"/>
	<updated date="2022-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201684">SUSE bug 1201684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201685">SUSE bug 1201685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201692">SUSE bug 1201692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201694">SUSE bug 1201694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202427">SUSE bug 1202427</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21549/">CVE-2022-21549 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21549">CVE-2022-21549 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707301" comment="java-1_8_0-ibm-1.8.0_sr7.11-30.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707281" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707302" comment="java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707283" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707301" comment="java-1_8_0-ibm-1.8.0_sr7.11-30.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707281" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707302" comment="java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707283" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152729" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193227" ref_url="https://bugzilla.suse.com/1193227" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8922" ref_url="https://www.suse.com/security/cve/CVE-2019-8922/" source="CVE"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2019-8922: Fixed a buffer overflow in the implementation of the
  Service Discovery Protocol (bsc#1193227).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-25"/>
	<updated date="2022-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193227">SUSE bug 1193227</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8922/">CVE-2019-8922 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8922">CVE-2019-8922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707303" comment="bluez-5.13-5.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707304" comment="libbluetooth3-5.13-5.26.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707303" comment="bluez-5.13-5.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707304" comment="libbluetooth3-5.13-5.26.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152730" version="1" class="patch">
	<metadata>
		<title>Security update for libcroco (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1171685" ref_url="https://bugzilla.suse.com/1171685" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12825" ref_url="https://www.suse.com/security/cve/CVE-2020-12825/" source="CVE"/>
		<description>
This update for libcroco fixes the following issues:

- CVE-2020-12825: Fixed an uncontrolled recursion issue (bsc#1171685).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-26"/>
	<updated date="2022-08-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171685">SUSE bug 1171685</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12825/">CVE-2020-12825 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12825">CVE-2020-12825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707620" comment="libcroco-0_6-3-0.6.11-12.6.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707617" comment="libcroco-0_6-3-32bit-0.6.11-12.6.45 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707620" comment="libcroco-0_6-3-0.6.11-12.6.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707617" comment="libcroco-0_6-3-32bit-0.6.11-12.6.45 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152731" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-good (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201688" ref_url="https://bugzilla.suse.com/1201688" source="BUGZILLA"/>
		<reference ref_id="1201693" ref_url="https://bugzilla.suse.com/1201693" source="BUGZILLA"/>
		<reference ref_id="1201702" ref_url="https://bugzilla.suse.com/1201702" source="BUGZILLA"/>
		<reference ref_id="1201704" ref_url="https://bugzilla.suse.com/1201704" source="BUGZILLA"/>
		<reference ref_id="1201706" ref_url="https://bugzilla.suse.com/1201706" source="BUGZILLA"/>
		<reference ref_id="1201707" ref_url="https://bugzilla.suse.com/1201707" source="BUGZILLA"/>
		<reference ref_id="1201708" ref_url="https://bugzilla.suse.com/1201708" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1920" ref_url="https://www.suse.com/security/cve/CVE-2022-1920/" source="CVE"/>
		<reference ref_id="CVE-2022-1921" ref_url="https://www.suse.com/security/cve/CVE-2022-1921/" source="CVE"/>
		<reference ref_id="CVE-2022-1922" ref_url="https://www.suse.com/security/cve/CVE-2022-1922/" source="CVE"/>
		<reference ref_id="CVE-2022-1923" ref_url="https://www.suse.com/security/cve/CVE-2022-1923/" source="CVE"/>
		<reference ref_id="CVE-2022-1924" ref_url="https://www.suse.com/security/cve/CVE-2022-1924/" source="CVE"/>
		<reference ref_id="CVE-2022-1925" ref_url="https://www.suse.com/security/cve/CVE-2022-1925/" source="CVE"/>
		<reference ref_id="CVE-2022-2122" ref_url="https://www.suse.com/security/cve/CVE-2022-2122/" source="CVE"/>
		<description>
This update for gstreamer-plugins-good fixes the following issues:

- CVE-2022-1920: Fixed integer overflow in WavPack header handling code (bsc#1201688).
- CVE-2022-1921: Fixed integer overflow resulting in heap corruption in avidemux element (bsc#1201693).
- CVE-2022-1922: Fixed integer overflows in mkv demuxing (bsc#1201702).
- CVE-2022-1923: Fixed integer overflows in mkv demuxing using bzip (bsc#1201704).
- CVE-2022-1924: Fixed integer overflows in mkv demuxing using lzo (bsc#1201706).
- CVE-2022-1925: Fixed integer overflows in mkv demuxing using HEADERSTRIP (bsc#1201707).
- CVE-2022-2122: Fixed integer overflows in qtdemux using zlib (bsc#1201708).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-26"/>
	<updated date="2022-08-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201688">SUSE bug 1201688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201693">SUSE bug 1201693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201702">SUSE bug 1201702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201704">SUSE bug 1201704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201706">SUSE bug 1201706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201707">SUSE bug 1201707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201708">SUSE bug 1201708</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1920/">CVE-2022-1920 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1920">CVE-2022-1920 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1921/">CVE-2022-1921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1921">CVE-2022-1921 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1922/">CVE-2022-1922 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1922">CVE-2022-1922 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1923/">CVE-2022-1923 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1923">CVE-2022-1923 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1924/">CVE-2022-1924 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1924">CVE-2022-1924 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1925/">CVE-2022-1925 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1925">CVE-2022-1925 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-2122/">CVE-2022-2122 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2122">CVE-2022-2122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707466" comment="gstreamer-plugins-good-1.8.3-16.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707462" comment="gstreamer-plugins-good-lang-1.8.3-16.6.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707466" comment="gstreamer-plugins-good-1.8.3-16.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707462" comment="gstreamer-plugins-good-lang-1.8.3-16.6.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152732" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198166" ref_url="https://bugzilla.suse.com/1198166" source="BUGZILLA"/>
		<reference ref_id="1202368" ref_url="https://bugzilla.suse.com/1202368" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<description>
This update for postgresql13 fixes the following issues:

- Update to 13.8:
- CVE-2022-2625: Fixed an issue where extension scripts would replace objects not belonging to that extension (bsc#1202368).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-26"/>
	<updated date="2022-08-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198166">SUSE bug 1198166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202368">SUSE bug 1202368</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2625">CVE-2022-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707305" comment="postgresql13-13.8-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707306" comment="postgresql13-contrib-13.8-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707307" comment="postgresql13-docs-13.8-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707308" comment="postgresql13-plperl-13.8-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707309" comment="postgresql13-plpython-13.8-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707310" comment="postgresql13-pltcl-13.8-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707311" comment="postgresql13-server-13.8-3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152733" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202368" ref_url="https://bugzilla.suse.com/1202368" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

- Upgrade to 10.22:
- CVE-2022-2625: Fixed an issue where extension scripts would replace objects not belonging to that extension (bsc#1202368).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-26"/>
	<updated date="2022-08-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202368">SUSE bug 1202368</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2625">CVE-2022-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707292" comment="postgresql10-10.22-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707293" comment="postgresql10-contrib-10.22-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707270" comment="postgresql10-docs-10.22-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707294" comment="postgresql10-plperl-10.22-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707295" comment="postgresql10-plpython-10.22-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707296" comment="postgresql10-pltcl-10.22-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707297" comment="postgresql10-server-10.22-4.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707292" comment="postgresql10-10.22-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707293" comment="postgresql10-contrib-10.22-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707270" comment="postgresql10-docs-10.22-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707294" comment="postgresql10-plperl-10.22-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707295" comment="postgresql10-plpython-10.22-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707296" comment="postgresql10-pltcl-10.22-4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707297" comment="postgresql10-server-10.22-4.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152734" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201980" ref_url="https://bugzilla.suse.com/1201980" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32792" ref_url="https://www.suse.com/security/cve/CVE-2022-32792/" source="CVE"/>
		<reference ref_id="CVE-2022-32816" ref_url="https://www.suse.com/security/cve/CVE-2022-32816/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.36.5 (bsc#1201980):
  - Add support for PAC proxy in the WebDriver implementation.
  - Fix video playback when loaded through custom URIs, this fixes
    video playback in the Yelp documentation browser.
  - Fix WebKitWebView::context-menu when using GTK4.
  - Fix LTO builds with GCC.
  - Fix several crashes and rendering issues.

- Security fixes: 
  - CVE-2022-32792: Fixed processing maliciously crafted web content may lead to
    arbitrary code execution.
  - CVE-2022-32816: Fixed visiting a website that frames malicious content may lead to
    UI spoofing.

		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-26"/>
	<updated date="2022-08-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201980">SUSE bug 1201980</bugzilla>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32792/">CVE-2022-32792 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32792">CVE-2022-32792 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32816/">CVE-2022-32816 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32816">CVE-2022-32816 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706633" comment="libjavascriptcoregtk-4_0-18-2.36.5-2.107.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706634" comment="libwebkit2gtk-4_0-37-2.36.5-2.107.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706626" comment="libwebkit2gtk3-lang-2.36.5-2.107.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706635" comment="typelib-1_0-JavaScriptCore-4_0-2.36.5-2.107.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706636" comment="typelib-1_0-WebKit2-4_0-2.36.5-2.107.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706637" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.5-2.107.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706638" comment="webkit2gtk-4_0-injected-bundles-2.36.5-2.107.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706633" comment="libjavascriptcoregtk-4_0-18-2.36.5-2.107.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706634" comment="libwebkit2gtk-4_0-37-2.36.5-2.107.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706626" comment="libwebkit2gtk3-lang-2.36.5-2.107.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706635" comment="typelib-1_0-JavaScriptCore-4_0-2.36.5-2.107.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706636" comment="typelib-1_0-WebKit2-4_0-2.36.5-2.107.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706637" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.5-2.107.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706638" comment="webkit2gtk-4_0-injected-bundles-2.36.5-2.107.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152735" version="1" class="patch">
	<metadata>
		<title>Security update for open-vm-tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202657" ref_url="https://bugzilla.suse.com/1202657" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31676" ref_url="https://www.suse.com/security/cve/CVE-2022-31676/" source="CVE"/>
		<description>
This update for open-vm-tools fixes the following issues:

- CVE-2022-31676: Fixed an issue that could allow unprivileged users
  inside a virtual machine to escalate privileges (bsc#1202657).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-01"/>
	<updated date="2022-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202657">SUSE bug 1202657</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31676/">CVE-2022-31676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31676">CVE-2022-31676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707897" comment="libvmtools0-10.3.10-3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707898" comment="open-vm-tools-10.3.10-3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707899" comment="open-vm-tools-desktop-10.3.10-3.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707897" comment="libvmtools0-10.3.10-3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707898" comment="open-vm-tools-10.3.10-3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707899" comment="open-vm-tools-desktop-10.3.10-3.34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152736" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1100146" ref_url="https://bugzilla.suse.com/1100146" source="BUGZILLA"/>
		<reference ref_id="1145864" ref_url="https://bugzilla.suse.com/1145864" source="BUGZILLA"/>
		<reference ref_id="1152968" ref_url="https://bugzilla.suse.com/1152968" source="BUGZILLA"/>
		<reference ref_id="1174961" ref_url="https://bugzilla.suse.com/1174961" source="BUGZILLA"/>
		<reference ref_id="1178021" ref_url="https://bugzilla.suse.com/1178021" source="BUGZILLA"/>
		<reference ref_id="1178351" ref_url="https://bugzilla.suse.com/1178351" source="BUGZILLA"/>
		<reference ref_id="1179009" ref_url="https://bugzilla.suse.com/1179009" source="BUGZILLA"/>
		<reference ref_id="1179699" ref_url="https://bugzilla.suse.com/1179699" source="BUGZILLA"/>
		<reference ref_id="1184839" ref_url="https://bugzilla.suse.com/1184839" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15862" ref_url="https://www.suse.com/security/cve/CVE-2020-15862/" source="CVE"/>
		<description>
This update for net-snmp fixes the following issues:

- CVE-2020-15862: Make extended MIB read-only (bsc#1174961)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1100146">SUSE bug 1100146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145864">SUSE bug 1145864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152968">SUSE bug 1152968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174961">SUSE bug 1174961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178021">SUSE bug 1178021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178351">SUSE bug 1178351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179009">SUSE bug 1179009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179699">SUSE bug 1179699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184839">SUSE bug 1184839</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15862/">CVE-2020-15862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15862">CVE-2020-15862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661606" comment="libsnmp30-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661599" comment="libsnmp30-32bit-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661607" comment="net-snmp-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661608" comment="perl-SNMP-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661609" comment="snmp-mibs-5.7.3-6.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152737" version="1" class="patch">
	<metadata>
		<title>Security update for json-c (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1171479" ref_url="https://bugzilla.suse.com/1171479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12762" ref_url="https://www.suse.com/security/cve/CVE-2020-12762/" source="CVE"/>
		<description>
This update for json-c fixes the following issues:

- CVE-2020-12762: Fixed an integer overflow that could lead to memory
  corruption via a large JSON file (bsc#1171479).

Non-security fixes:

- Updated to version 0.12.1 (jsc#PED-1778).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-02"/>
	<updated date="2022-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171479">SUSE bug 1171479</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12762/">CVE-2020-12762 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12762">CVE-2020-12762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009709434" comment="libjson-c-devel-0.12.1-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708140" comment="libjson-c2-0.12.1-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708131" comment="libjson-c2-32bit-0.12.1-4.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009709434" comment="libjson-c-devel-0.12.1-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708140" comment="libjson-c2-0.12.1-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708131" comment="libjson-c2-32bit-0.12.1-4.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152738" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202645" ref_url="https://bugzilla.suse.com/1202645" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-38472" ref_url="https://www.suse.com/security/cve/CVE-2022-38472/" source="CVE"/>
		<reference ref_id="CVE-2022-38473" ref_url="https://www.suse.com/security/cve/CVE-2022-38473/" source="CVE"/>
		<reference ref_id="CVE-2022-38478" ref_url="https://www.suse.com/security/cve/CVE-2022-38478/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.13.0 ESR (bsc#1202645):

- CVE-2022-38472: Fixed a potential address bar spoofing via XSLT error handling.
- CVE-2022-38473: Fixed an issue where cross-origin XSLT documents could inherit the parent's permissions.
- CVE-2022-38478: Fixed various memory safety issues.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-02"/>
	<updated date="2022-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202645">SUSE bug 1202645</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38472/">CVE-2022-38472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38472">CVE-2022-38472 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38473/">CVE-2022-38473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38473">CVE-2022-38473 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38478/">CVE-2022-38478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38478">CVE-2022-38478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707990" comment="MozillaFirefox-91.13.0-112.127.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707991" comment="MozillaFirefox-devel-91.13.0-112.127.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707992" comment="MozillaFirefox-translations-common-91.13.0-112.127.4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707990" comment="MozillaFirefox-91.13.0-112.127.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707991" comment="MozillaFirefox-devel-91.13.0-112.127.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707992" comment="MozillaFirefox-translations-common-91.13.0-112.127.4 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152739" version="1" class="patch">
	<metadata>
		<title>Security update for libgda (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189849" ref_url="https://bugzilla.suse.com/1189849" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39359" ref_url="https://www.suse.com/security/cve/CVE-2021-39359/" source="CVE"/>
		<description>
This update for libgda fixes the following issues:

- CVE-2021-39359: Enabled TLS certificate verification (bsc#1189849).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-05"/>
	<updated date="2022-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189849">SUSE bug 1189849</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39359/">CVE-2021-39359 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39359">CVE-2021-39359 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009708315" comment="libgda-5_0-4-5.2.4-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708316" comment="libgda-5_0-mysql-5.2.4-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708317" comment="libgda-5_0-postgres-5.2.4-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708318" comment="libgda-5_0-sqlite-5.2.4-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708319" comment="libgda-ui-5_0-4-5.2.4-9.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009708315" comment="libgda-5_0-4-5.2.4-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708316" comment="libgda-5_0-mysql-5.2.4-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708317" comment="libgda-5_0-postgres-5.2.4-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708318" comment="libgda-5_0-sqlite-5.2.4-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708319" comment="libgda-ui-5_0-4-5.2.4-9.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152740" version="1" class="patch">
	<metadata>
		<title>Security update for zabbix (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201290" ref_url="https://bugzilla.suse.com/1201290" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-35230" ref_url="https://www.suse.com/security/cve/CVE-2022-35230/" source="CVE"/>
		<description>
This update for zabbix fixes the following issues:

- CVE-2022-35230: Javascript embedded in links for graphs page will be executed (bsc#1201290).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-06"/>
	<updated date="2022-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201290">SUSE bug 1201290</bugzilla>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-35230/">CVE-2022-35230 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35230">CVE-2022-35230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702122" comment="zabbix-agent-4.0.12-4.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152741" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202169" ref_url="https://bugzilla.suse.com/1202169" source="BUGZILLA"/>
		<reference ref_id="1202807" ref_url="https://bugzilla.suse.com/1202807" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32893" ref_url="https://www.suse.com/security/cve/CVE-2022-32893/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Updated to version 2.36.7 (bsc#1202807):
  - CVE-2022-32893: Fixed an issue that would be triggered when
    processing malicious web content and that could lead to arbitrary
    code execution.
  - Fixed several crashes and rendering issues.

- Updated to version 2.36.6:
  - Fixed handling of touchpad scrolling on GTK4 builds
  - Fixed WebKitGTK not allowing to be used from non-main threads
    (bsc#1202169).
  - Fixed several crashes and rendering issues
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-07"/>
	<updated date="2022-09-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202169">SUSE bug 1202169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202807">SUSE bug 1202807</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32893/">CVE-2022-32893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32893">CVE-2022-32893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009708306" comment="libjavascriptcoregtk-4_0-18-2.36.7-2.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708307" comment="libwebkit2gtk-4_0-37-2.36.7-2.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708239" comment="libwebkit2gtk3-lang-2.36.7-2.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708308" comment="typelib-1_0-JavaScriptCore-4_0-2.36.7-2.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708309" comment="typelib-1_0-WebKit2-4_0-2.36.7-2.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708310" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.7-2.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708311" comment="webkit2gtk-4_0-injected-bundles-2.36.7-2.110.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009708306" comment="libjavascriptcoregtk-4_0-18-2.36.7-2.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708307" comment="libwebkit2gtk-4_0-37-2.36.7-2.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708239" comment="libwebkit2gtk3-lang-2.36.7-2.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708308" comment="typelib-1_0-JavaScriptCore-4_0-2.36.7-2.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708309" comment="typelib-1_0-WebKit2-4_0-2.36.7-2.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708310" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.7-2.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708311" comment="webkit2gtk-4_0-injected-bundles-2.36.7-2.110.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152742" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202800" ref_url="https://bugzilla.suse.com/1202800" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20224" ref_url="https://www.suse.com/security/cve/CVE-2021-20224/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20224: Fixed an integer overflow that could be triggered
  via a crafted file (bsc#1202800).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-07"/>
	<updated date="2022-09-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1202800">SUSE bug 1202800</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20224/">CVE-2021-20224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20224">CVE-2021-20224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009708141" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.180.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708142" comment="ImageMagick-config-6-upstream-6.8.8.1-71.180.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708143" comment="libMagickCore-6_Q16-1-6.8.8.1-71.180.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708144" comment="libMagickWand-6_Q16-1-6.8.8.1-71.180.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152743" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202986" ref_url="https://bugzilla.suse.com/1202986" source="BUGZILLA"/>
		<description>
This update for clamav fixes the following issues:

clamav was updated to 0.103.7 (bsc#1202986)

* Upgrade the vendored UnRAR library to version 6.1.7.
* Fix logical signature 'Intermediates' feature.
* Relax constraints on slightly malformed zip archives that
  contain overlapping file entries.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-07"/>
	<updated date="2022-09-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202986">SUSE bug 1202986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709610" comment="clamav-0.103.7-33.50.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709610" comment="clamav-0.103.7-33.50.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152744" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193951" ref_url="https://bugzilla.suse.com/1193951" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-21913" ref_url="https://www.suse.com/security/cve/CVE-2020-21913/" source="CVE"/>
		<description>
This update for icu fixes the following issues:

- CVE-2020-21913: Fixed a memory safety issue that could lead to use
  after free (bsc#1193951).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-07"/>
	<updated date="2022-09-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193951">SUSE bug 1193951</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21913/">CVE-2020-21913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21913">CVE-2020-21913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707477" comment="libicu-doc-52.1-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707478" comment="libicu52_1-52.1-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707479" comment="libicu52_1-32bit-52.1-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707480" comment="libicu52_1-data-52.1-8.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152745" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201684" ref_url="https://bugzilla.suse.com/1201684" source="BUGZILLA"/>
		<reference ref_id="1201685" ref_url="https://bugzilla.suse.com/1201685" source="BUGZILLA"/>
		<reference ref_id="1201692" ref_url="https://bugzilla.suse.com/1201692" source="BUGZILLA"/>
		<reference ref_id="1201694" ref_url="https://bugzilla.suse.com/1201694" source="BUGZILLA"/>
		<reference ref_id="1202427" ref_url="https://bugzilla.suse.com/1202427" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-21549" ref_url="https://www.suse.com/security/cve/CVE-2022-21549/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Note: the issues listed below were NOT fixed with the previous update (8.0-7.11).

- Update to Java 8.0 Service Refresh 7 Fix Pack 15 (bsc#1202427):
  - CVE-2022-34169: Fixed an integer truncation issue in the Xalan
    Java XSLT library that occurred when processing malicious
    stylesheets (bsc#1201684).
  - CVE-2022-21549: Fixed an issue that could lead to computing
    negative random exponentials (bsc#1201685).
  - CVE-2022-21541: Fixed a potential bypass of sandbox restrictions
    in the Hotspot component (bsc#1201692).
  - CVE-2022-21540: Fixed a potential bypass of sandbox restrictions
    in the Hotspot component (bsc#1201694)..
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-07"/>
	<updated date="2022-09-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201684">SUSE bug 1201684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201685">SUSE bug 1201685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201692">SUSE bug 1201692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201694">SUSE bug 1201694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202427">SUSE bug 1202427</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21549/">CVE-2022-21549 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21549">CVE-2022-21549 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009708313" comment="java-1_8_0-ibm-1.8.0_sr7.15-30.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708244" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708314" comment="java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708245" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009708313" comment="java-1_8_0-ibm-1.8.0_sr7.15-30.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708244" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708314" comment="java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708245" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152746" version="1" class="patch">
	<metadata>
		<title>Security update for udisks2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1098797" ref_url="https://bugzilla.suse.com/1098797" source="BUGZILLA"/>
		<reference ref_id="1190606" ref_url="https://bugzilla.suse.com/1190606" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3802" ref_url="https://www.suse.com/security/cve/CVE-2021-3802/" source="CVE"/>
		<description>
This update for udisks2 fixes the following issues:

- CVE-2021-3802: Fixed insecure defaults in user-accessible mount helpers (bsc#1190606).
- Fixed vulnerability that allowed mounting ext4 devices over existing entries in fstab (bsc#1098797).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-07"/>
	<updated date="2022-09-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1098797">SUSE bug 1098797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190606">SUSE bug 1190606</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3802/">CVE-2021-3802 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3802">CVE-2021-3802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710058" comment="libudisks2-0-2.1.3-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710059" comment="udisks2-2.1.3-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709942" comment="udisks2-lang-2.1.3-3.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710058" comment="libudisks2-0-2.1.3-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710059" comment="udisks2-2.1.3-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709942" comment="udisks2-lang-2.1.3-3.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152747" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198166" ref_url="https://bugzilla.suse.com/1198166" source="BUGZILLA"/>
		<reference ref_id="1202368" ref_url="https://bugzilla.suse.com/1202368" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<description>
This update for postgresql12 fixes the following issues:

- Update to 12.12:
- CVE-2022-2625: Fixed an issue where extension scripts would replace objects not belonging to that extension (bsc#1202368).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-08"/>
	<updated date="2022-09-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198166">SUSE bug 1198166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202368">SUSE bug 1202368</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2625">CVE-2022-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009708220" comment="postgresql-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708221" comment="postgresql-contrib-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708209" comment="postgresql-devel-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708222" comment="postgresql-docs-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708223" comment="postgresql-plperl-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708224" comment="postgresql-plpython-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708225" comment="postgresql-pltcl-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708226" comment="postgresql-server-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708210" comment="postgresql-server-devel-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708320" comment="postgresql12-12.12-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708321" comment="postgresql12-contrib-12.12-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708322" comment="postgresql12-devel-12.12-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708229" comment="postgresql12-docs-12.12-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708323" comment="postgresql12-llvmjit-devel-12.12-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708324" comment="postgresql12-plperl-12.12-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708325" comment="postgresql12-plpython-12.12-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708326" comment="postgresql12-pltcl-12.12-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708327" comment="postgresql12-server-12.12-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708328" comment="postgresql12-server-devel-12.12-3.30.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009708220" comment="postgresql-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708221" comment="postgresql-contrib-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708209" comment="postgresql-devel-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708222" comment="postgresql-docs-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708223" comment="postgresql-plperl-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708224" comment="postgresql-plpython-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708225" comment="postgresql-pltcl-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708226" comment="postgresql-server-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708210" comment="postgresql-server-devel-14-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708320" comment="postgresql12-12.12-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708321" comment="postgresql12-contrib-12.12-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708322" comment="postgresql12-devel-12.12-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708229" comment="postgresql12-docs-12.12-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708323" comment="postgresql12-llvmjit-devel-12.12-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708324" comment="postgresql12-plperl-12.12-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708325" comment="postgresql12-plpython-12.12-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708326" comment="postgresql12-pltcl-12.12-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708327" comment="postgresql12-server-12.12-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708328" comment="postgresql12-server-devel-12.12-3.30.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152748" version="1" class="patch">
	<metadata>
		<title>Security update for libnl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1020123" ref_url="https://bugzilla.suse.com/1020123" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0386" ref_url="https://www.suse.com/security/cve/CVE-2017-0386/" source="CVE"/>
		<description>
This update for libnl-1_1 fixes the following issues:

- CVE-2017-0386: Fixed an issue that could enable a local malicious
  application to execute arbitrary code within the context of a
  different process. This only affects setups were libnl is passed
  untrusted arguments. (bsc#1020123)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-08"/>
	<updated date="2022-09-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1020123">SUSE bug 1020123</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0386/">CVE-2017-0386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0386">CVE-2017-0386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705611" comment="libnl1-1.1.4-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705612" comment="libnl1-32bit-1.1.4-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152749" version="1" class="patch">
	<metadata>
		<title>Security update for libnl3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1020123" ref_url="https://bugzilla.suse.com/1020123" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0386" ref_url="https://www.suse.com/security/cve/CVE-2017-0386/" source="CVE"/>
		<description>
This update for libnl3 fixes the following issues:

- CVE-2017-0386: Fixed an issue that could enable a local malicious
  application to execute arbitrary code within the context of a
  different process. This only affects setups were libnl is passed
  untrusted arguments. (bsc#1020123)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-08"/>
	<updated date="2022-09-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1020123">SUSE bug 1020123</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0386/">CVE-2017-0386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0386">CVE-2017-0386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705608" comment="libnl-config-3.2.23-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705609" comment="libnl3-200-3.2.23-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705610" comment="libnl3-200-32bit-3.2.23-4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152750" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198166" ref_url="https://bugzilla.suse.com/1198166" source="BUGZILLA"/>
		<reference ref_id="1200437" ref_url="https://bugzilla.suse.com/1200437" source="BUGZILLA"/>
		<reference ref_id="1202368" ref_url="https://bugzilla.suse.com/1202368" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<description>
This update for postgresql14 fixes the following issues:

- Upgrade to version 14.5:
- CVE-2022-2625: Fixed an issue where extension scripts would replace objects not belonging to that extension (bsc#1202368).

- Upgrade to version 14.4 (bsc#1200437)
- Release notes: https://www.postgresql.org/docs/release/14.4/
- Release announcement: https://www.postgresql.org/about/news/p-2470/
- Prevent possible corruption of indexes created or rebuilt with the CONCURRENTLY option (bsc#1200437)
- Pin to llvm13 until the next patchlevel update (bsc#1198166)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-14"/>
	<updated date="2022-09-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198166">SUSE bug 1198166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200437">SUSE bug 1200437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202368">SUSE bug 1202368</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2625">CVE-2022-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710356" comment="libecpg6-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710362" comment="libecpg6-32bit-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710357" comment="libpq5-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710351" comment="libpq5-32bit-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710363" comment="postgresql14-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710364" comment="postgresql14-contrib-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710365" comment="postgresql14-devel-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710284" comment="postgresql14-docs-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710366" comment="postgresql14-llvmjit-devel-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710367" comment="postgresql14-plperl-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710368" comment="postgresql14-plpython-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710369" comment="postgresql14-pltcl-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710370" comment="postgresql14-server-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710371" comment="postgresql14-server-devel-14.5-3.14.9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710356" comment="libecpg6-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710362" comment="libecpg6-32bit-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710357" comment="libpq5-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710351" comment="libpq5-32bit-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710363" comment="postgresql14-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710364" comment="postgresql14-contrib-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710365" comment="postgresql14-devel-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710284" comment="postgresql14-docs-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710366" comment="postgresql14-llvmjit-devel-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710367" comment="postgresql14-plperl-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710368" comment="postgresql14-plpython-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710369" comment="postgresql14-pltcl-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710370" comment="postgresql14-server-14.5-3.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710371" comment="postgresql14-server-devel-14.5-3.14.9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152751" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1200793" ref_url="https://bugzilla.suse.com/1200793" source="BUGZILLA"/>
		<reference ref_id="1201758" ref_url="https://bugzilla.suse.com/1201758" source="BUGZILLA"/>
		<reference ref_id="1202645" ref_url="https://bugzilla.suse.com/1202645" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-2505" ref_url="https://www.suse.com/security/cve/CVE-2022-2505/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34469" ref_url="https://www.suse.com/security/cve/CVE-2022-34469/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34471" ref_url="https://www.suse.com/security/cve/CVE-2022-34471/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34473" ref_url="https://www.suse.com/security/cve/CVE-2022-34473/" source="CVE"/>
		<reference ref_id="CVE-2022-34474" ref_url="https://www.suse.com/security/cve/CVE-2022-34474/" source="CVE"/>
		<reference ref_id="CVE-2022-34475" ref_url="https://www.suse.com/security/cve/CVE-2022-34475/" source="CVE"/>
		<reference ref_id="CVE-2022-34476" ref_url="https://www.suse.com/security/cve/CVE-2022-34476/" source="CVE"/>
		<reference ref_id="CVE-2022-34477" ref_url="https://www.suse.com/security/cve/CVE-2022-34477/" source="CVE"/>
		<reference ref_id="CVE-2022-34478" ref_url="https://www.suse.com/security/cve/CVE-2022-34478/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34480" ref_url="https://www.suse.com/security/cve/CVE-2022-34480/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34482" ref_url="https://www.suse.com/security/cve/CVE-2022-34482/" source="CVE"/>
		<reference ref_id="CVE-2022-34483" ref_url="https://www.suse.com/security/cve/CVE-2022-34483/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<reference ref_id="CVE-2022-34485" ref_url="https://www.suse.com/security/cve/CVE-2022-34485/" source="CVE"/>
		<reference ref_id="CVE-2022-36314" ref_url="https://www.suse.com/security/cve/CVE-2022-36314/" source="CVE"/>
		<reference ref_id="CVE-2022-36318" ref_url="https://www.suse.com/security/cve/CVE-2022-36318/" source="CVE"/>
		<reference ref_id="CVE-2022-36319" ref_url="https://www.suse.com/security/cve/CVE-2022-36319/" source="CVE"/>
		<reference ref_id="CVE-2022-38472" ref_url="https://www.suse.com/security/cve/CVE-2022-38472/" source="CVE"/>
		<reference ref_id="CVE-2022-38473" ref_url="https://www.suse.com/security/cve/CVE-2022-38473/" source="CVE"/>
		<reference ref_id="CVE-2022-38476" ref_url="https://www.suse.com/security/cve/CVE-2022-38476/" source="CVE"/>
		<reference ref_id="CVE-2022-38477" ref_url="https://www.suse.com/security/cve/CVE-2022-38477/" source="CVE"/>
		<reference ref_id="CVE-2022-38478" ref_url="https://www.suse.com/security/cve/CVE-2022-38478/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Mozilla Firefox was updated to 102.2.0esr ESR:

* Fixed: Various stability, functionality, and security fixes.

- MFSA 2022-34 (bsc#1202645)

  * CVE-2022-38472 (bmo#1769155)
    Address bar spoofing via XSLT error handling
  * CVE-2022-38473 (bmo#1771685)
    Cross-origin XSLT Documents would have inherited the parent's
    permissions
  * CVE-2022-38476 (bmo#1760998)
    Data race and potential use-after-free in PK11_ChangePW
  * CVE-2022-38477 (bmo#1760611, bmo#1770219, bmo#1771159,
    bmo#1773363)
    Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2
  * CVE-2022-38478 (bmo#1770630, bmo#1776658)
    Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2,
    and Firefox ESR 91.13

Firefox Extended Support Release 102.1 ESR

  * Fixed: Various stability, functionality, and security fixes.

- MFSA 2022-30 (bsc#1201758)

  * CVE-2022-36319 (bmo#1737722)
    Mouse Position spoofing with CSS transforms
  * CVE-2022-36318 (bmo#1771774)
    Directory indexes for bundled resources reflected URL
    parameters
  * CVE-2022-36314 (bmo#1773894)
    Opening local &lt;code&gt;.lnk&lt;/code&gt; files could cause unexpected
    network loads
  * CVE-2022-2505 (bmo#1769739, bmo#1772824)
    Memory safety bugs fixed in Firefox 103 and 102.1

- Firefox Extended Support Release 102.0.1 ESR

  * Fixed: Fixed bookmark shortcut creation by dragging to
    Windows File Explorer and dropping partially broken
    (bmo#1774683)
  * Fixed: Fixed bookmarks sidebar flashing white when opened in
    dark mode (bmo#1776157)
  * Fixed: Fixed multilingual spell checking not working with
    content in both English and a non-Latin alphabet
    (bmo#1773802)
  * Fixed: Developer tools:  Fixed an issue where the console
    output keep getting scrolled to the bottom when the last
    visible message is an evaluation result (bmo#1776262)
  * Fixed: Fixed *Delete cookies and site data when Firefox is
    closed* checkbox getting disabled on startup (bmo#1777419)
  * Fixed: Various stability fixes

Firefox 102.0 ESR:

* New: 

  - We now provide more secure connections: Firefox can
    now automatically upgrade to HTTPS using HTTPS RR as Alt-Svc
    headers.
  - For added viewing pleasure, full-range color levels are now
    supported for video playback on many systems.
  - Find it easier now! Mac users can now access the macOS
    share options from the Firefox File menu.
  - Voil?! Support for images containing ICC v4 profiles is
    enabled on macOS.
  - Firefox now supports the new AVIF image format, which is
    based on the modern and royalty-free AV1 video codec. It
    offers significant bandwidth savings for sites compared to
    existing image formats. It also supports transparency and
    other advanced features.
  - Firefox PDF viewer now supports filling more forms (e.g.,
    XFA-based forms, used by multiple governments and banks).
    Learn more.
  - When available system memory is critically low, Firefox on
    Windows will automatically unload tabs based on their last
    access time, memory usage, and other attributes. This helps
    to reduce Firefox out-of-memory crashes. Forgot something?
    Switching to an unloaded tab automatically reloads it.
  - To prevent session loss for macOS users who are running
    Firefox from a mounted .dmg file, they’ll now be prompted to
    finish installation. Bear in mind, this permission prompt
    only appears the first time these users run Firefox on their
    computer.
  - For your safety, Firefox now blocks downloads that rely on
    insecure connections, protecting against potentially
    malicious or unsafe downloads. Learn more and see where to
    find downloads in Firefox.
  - Improved web compatibility for privacy protections with
    SmartBlock 3.0: In Private Browsing and Strict Tracking
    Protection, Firefox goes to great lengths to protect your web
    browsing activity from trackers. As part of this, the built-
    in content blocking will automatically block third-party
    scripts, images, and other content from being loaded from
    cross-site tracking companies reported by Disconnect. Learn
    more.
  - Introducing a new referrer tracking protection in Strict
    Tracking Protection and Private Browsing. This feature
    prevents sites from unknowingly leaking private information
    to trackers. Learn more.
  - Introducing Firefox Suggest, a feature that provides
    website suggestions as you type into the address bar. Learn
    more about this faster way to navigate the web and locale-
    specific features.
  - Firefox macOS now uses Apple's low-power mode for
    fullscreen video on sites such as YouTube and Twitch. This
    meaningfully extends battery life in long viewing sessions.
    Now your kids can find out what the fox says on a loop
    without you ever missing a beat…
  - With this release, power users can use about:unloads to
    release system resources by manually unloading tabs without
    closing them.
  - On Windows, there will now be fewer interruptions because
    Firefox won’t prompt you for updates. Instead, a background
    agent will download and install updates even if Firefox is
    closed.
  - On Linux, we’ve improved WebGL performance and reduced
    power consumption for many users.
  - To better protect all Firefox users against side-channel
    attacks, such as Spectre, we introduced Site Isolation.
  - Firefox no longer warns you by default when you exit the
    browser or close a window using a menu, button, or three-key
    command. This should cut back on unwelcome notifications,
    which is always nice—however, if you prefer a bit of notice,
    you’ll still have full control over the quit/close modal
    behavior. All warnings can be managed within Firefox
    Settings. No worries! More details here.
  - Firefox supports the new Snap Layouts menus when running on
    Windows 11.
  - RLBox—a new technology that hardens Firefox against
    potential security vulnerabilities in third-party
    libraries—is now enabled on all platforms.
  - We’ve reduced CPU usage on macOS in Firefox and
    WindowServer during event processing.
  - We’ve also reduced the power usage of software decoded
    video on macOS, especially in fullscreen. This includes
    streaming sites such as Netflix and Amazon Prime Video.
  - You can now move the Picture-in-Picture toggle button to
    the opposite side of the video. Simply look for the new
    context menu option Move Picture-in-Picture Toggle to Left
    (Right) Side.
  - We’ve made significant improvements in noise suppression
    and auto-gain-control, as well as slight improvements in
    echo-cancellation to provide you with a better overall
    experience.
  - We’ve also significantly reduced main-thread load.
  - When printing, you can now choose to print only the
    odd/even pages.
  - Firefox now supports and displays the new style of
    scrollbars on Windows 11.
  - Firefox has a new optimized download flow. Instead of
    prompting every time, files will download automatically.
    However, they can still be opened from the downloads panel
    with just one click. Easy! More information
  - Firefox no longer asks what to do for each file by default.
    You won’t be prompted to choose a helper application or save
    to disk before downloading a file unless you have changed
    your download action setting for that type of file.
 -  Any files you download will be immediately saved on your
    disk. Depending on the current configuration, they’ll be
    saved in your preferred download folder, or you’ll be asked
    to select a location for each download. Windows and Linux
    users will find their downloaded files in the destination
    folder. They’ll no longer be put in the Temp folder.
  - Firefox allows users to choose from a number of built-in
    search engines to set as their default. In this release, some
    users who had previously configured a default engine might
    notice their default search engine has changed since Mozilla
    was unable to secure formal permission to continue including
    certain search engines in Firefox.
  - You can now toggle Narrate in ReaderMode with the keyboard
    shortcut 'n.'
  - You can find added support for search—with or without
    diacritics—in the PDF viewer.
  - The Linux sandbox has been strengthened: processes exposed
    to web content no longer have access to the X Window system
    (X11).
  - Firefox now supports credit card autofill and capture in
    Germany, France, and the United Kingdom.
  - We now support captions/subtitles display on YouTube, Prime
    Video, and Netflix videos you watch in Picture-in-Picture.
    Just turn on the subtitles on the in-page video player, and
    they will appear in PiP.
  - Picture-in-Picture now also supports video captions on
    websites that use Web Video Text Track (WebVTT) format (e.g.,
    Coursera.org, Canadian Broadcasting Corporation, and many
    more).
  - On the first run after install, Firefox detects when its
    language does not match the operating system language and
    offers the user a choice between the two languages.
  - Firefox spell checking now checks spelling in multiple
    languages. To enable additional languages, select them in the
    text field’s context menu.
  - HDR video is now supported in Firefox on Mac—starting with
    YouTube! Firefox users on macOS 11+ (with HDR-compatible
    screens) can enjoy higher-fidelity video content. No need to
    manually flip any preferences to turn HDR video support
    on—just make sure battery preferences are NOT set to
    “optimize video streaming while on battery”.
  - Hardware-accelerated AV1 video decoding is enabled on
    Windows with supported GPUs (Intel Gen 11+, AMD RDNA 2
    Excluding Navi 24, GeForce 30). Installing the AV1 Video
    Extension from the Microsoft Store may also be required.
  - Video overlay is enabled on Windows for Intel GPUs,
    reducing power usage during video playback.
  - Improved fairness between painting and handling other
    events. This noticeably improves the performance of the
    volume slider on Twitch.
  - Scrollbars on Linux and Windows 11 won't take space by
    default. On Linux, users can change this in Settings. On
    Windows, Firefox follows the system setting (System Settings
    &gt; Accessibility &gt; Visual Effects &gt; Always show scrollbars).
  - Firefox now ignores less restricted referrer
    policies—including unsafe-url, no-referrer-when-downgrade,
    and origin-when-cross-origin—for cross-site
    subresource/iframe requests to prevent privacy leaks from the
    referrer.
  - Reading is now easier with the prefers-contrast media
    query, which allows sites to detect if the user has requested
    that web content is presented with a higher (or lower)
    contrast.
  - All non-configured MIME types can now be assigned a custom
    action upon download completion.
  - Firefox now allows users to use as many microphones as they
    want, at the same time, during video conferencing. The most
    exciting benefit is that you can easily switch your
    microphones at any time (if your conferencing service
    provider enables this flexibility).
  - Print preview has been updated.

  * Fixed: Various security fixes.

- MFSA 2022-24 (bsc#1200793)

  * CVE-2022-34479 (bmo#1745595)
    A popup window could be resized in a way to overlay the
    address bar with web content
  * CVE-2022-34470 (bmo#1765951)
    Use-after-free in nsSHistory
  * CVE-2022-34468 (bmo#1768537)
    CSP sandbox header without `allow-scripts` can be bypassed
    via retargeted javascript: URI
  * CVE-2022-34482 (bmo#845880)
    Drag and drop of malicious image could have led to malicious
    executable and potential code execution
  * CVE-2022-34483 (bmo#1335845)
    Drag and drop of malicious image could have led to malicious
    executable and potential code execution
  * CVE-2022-34476 (bmo#1387919)
    ASN.1 parser could have been tricked into accepting malformed
    ASN.1
  * CVE-2022-34481 (bmo#1483699, bmo#1497246)
    Potential integer overflow in ReplaceElementsAt
  * CVE-2022-34474 (bmo#1677138)
    Sandboxed iframes could redirect to external schemes
  * CVE-2022-34469 (bmo#1721220)
    TLS certificate errors on HSTS-protected domains could be
    bypassed by the user on Firefox for Android
  * CVE-2022-34471 (bmo#1766047)
    Compromised server could trick a browser into an addon
    downgrade
  * CVE-2022-34472 (bmo#1770123)
    Unavailable PAC file resulted in OCSP requests being blocked
  * CVE-2022-34478 (bmo#1773717)
    Microsoft protocols can be attacked if a user accepts a
    prompt
  * CVE-2022-2200 (bmo#1771381)
    Undesired attributes could be set as part of prototype
    pollution
  * CVE-2022-34480 (bmo#1454072)
    Free of uninitialized pointer in lg_init
  * CVE-2022-34477 (bmo#1731614)
    MediaError message property leaked information on cross-
    origin same-site pages
  * CVE-2022-34475 (bmo#1757210)
    HTML Sanitizer could have been bypassed via same-origin
    script via use tags
  * CVE-2022-34473 (bmo#1770888)
    HTML Sanitizer could have been bypassed via use tags
  * CVE-2022-34484 (bmo#1763634, bmo#1772651)
    Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11
  * CVE-2022-34485 (bmo#1768409, bmo#1768578)
    Memory safety bugs fixed in Firefox 102
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-14"/>
	<updated date="2022-09-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201758">SUSE bug 1201758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202645">SUSE bug 1202645</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2200">CVE-2022-2200 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2505/">CVE-2022-2505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2505">CVE-2022-2505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34468">CVE-2022-34468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34469/">CVE-2022-34469 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34469">CVE-2022-34469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34470">CVE-2022-34470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34471/">CVE-2022-34471 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34471">CVE-2022-34471 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34472">CVE-2022-34472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34473/">CVE-2022-34473 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34473">CVE-2022-34473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34474/">CVE-2022-34474 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34474">CVE-2022-34474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34475/">CVE-2022-34475 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34475">CVE-2022-34475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34476/">CVE-2022-34476 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34476">CVE-2022-34476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34477/">CVE-2022-34477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34477">CVE-2022-34477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34478/">CVE-2022-34478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34478">CVE-2022-34478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34479">CVE-2022-34479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34480/">CVE-2022-34480 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34480">CVE-2022-34480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34481">CVE-2022-34481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34482/">CVE-2022-34482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34482">CVE-2022-34482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34483/">CVE-2022-34483 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34483">CVE-2022-34483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34484">CVE-2022-34484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34485/">CVE-2022-34485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34485">CVE-2022-34485 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36314/">CVE-2022-36314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36314">CVE-2022-36314 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36318/">CVE-2022-36318 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36318">CVE-2022-36318 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36319/">CVE-2022-36319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36319">CVE-2022-36319 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38472/">CVE-2022-38472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38472">CVE-2022-38472 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38473/">CVE-2022-38473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38473">CVE-2022-38473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38476/">CVE-2022-38476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38476">CVE-2022-38476 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38477/">CVE-2022-38477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38477">CVE-2022-38477 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38478/">CVE-2022-38478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38478">CVE-2022-38478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710358" comment="MozillaFirefox-102.2.0-112.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710359" comment="MozillaFirefox-branding-SLE-102-35.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710360" comment="MozillaFirefox-devel-102.2.0-112.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710361" comment="MozillaFirefox-translations-common-102.2.0-112.130.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710358" comment="MozillaFirefox-102.2.0-112.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710359" comment="MozillaFirefox-branding-SLE-102-35.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710360" comment="MozillaFirefox-devel-102.2.0-112.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710361" comment="MozillaFirefox-translations-common-102.2.0-112.130.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152752" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192425" ref_url="https://bugzilla.suse.com/1192425" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23177" ref_url="https://www.suse.com/security/cve/CVE-2021-23177/" source="CVE"/>
		<description>
This update for libarchive fixes the following issues:

- CVE-2021-23177: Fixed symlink ACL extraction that modifies ACLs of the target system (bsc#1192425).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-15"/>
	<updated date="2022-09-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192425">SUSE bug 1192425</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-23177/">CVE-2021-23177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23177">CVE-2021-23177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711116" comment="libarchive13-3.3.3-26.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152753" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203018" ref_url="https://bugzilla.suse.com/1203018" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31252" ref_url="https://www.suse.com/security/cve/CVE-2022-31252/" source="CVE"/>
		<description>
This update for permissions fixes the following issues:

- CVE-2022-31252: Fixed chkstat group controlled paths (bsc#1203018).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-15"/>
	<updated date="2022-09-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203018">SUSE bug 1203018</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31252/">CVE-2022-31252 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31252">CVE-2022-31252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713865" comment="permissions-2015.09.28.1626-17.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152754" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202593" ref_url="https://bugzilla.suse.com/1202593" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-35252" ref_url="https://www.suse.com/security/cve/CVE-2022-35252/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-35252: Fixed DoS caused by misusing control codes in cookies (bsc#1202593).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-16"/>
	<updated date="2022-09-16"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1202593">SUSE bug 1202593</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-35252/">CVE-2022-35252 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35252">CVE-2022-35252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009713916" comment="curl-7.37.0-37.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713917" comment="libcurl4-7.37.0-37.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713918" comment="libcurl4-32bit-7.37.0-37.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152755" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198976" ref_url="https://bugzilla.suse.com/1198976" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29869" ref_url="https://www.suse.com/security/cve/CVE-2022-29869/" source="CVE"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2022-29869: Fixed verbose messages on option parsing (bsc#1198976).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-21"/>
	<updated date="2022-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198976">SUSE bug 1198976</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29869/">CVE-2022-29869 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29869">CVE-2022-29869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714307" comment="cifs-utils-6.9-9.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152756" version="1" class="patch">
	<metadata>
		<title>Security update for python36 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202624" ref_url="https://bugzilla.suse.com/1202624" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28861" ref_url="https://www.suse.com/security/cve/CVE-2021-28861/" source="CVE"/>
		<description>
This update for python36 fixes the following issues:

- CVE-2021-28861: Fixed an open redirection vulnerability in the HTTP server when an URI path starts with // (bsc#1202624).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-21"/>
	<updated date="2022-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1202624">SUSE bug 1202624</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28861/">CVE-2021-28861 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28861">CVE-2021-28861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009714374" comment="libpython3_6m1_0-3.6.15-6.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714375" comment="python36-3.6.15-6.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714376" comment="python36-base-3.6.15-6.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714377" comment="python36-curses-3.6.15-6.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714378" comment="python36-dbm-3.6.15-6.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714379" comment="python36-devel-3.6.15-6.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714380" comment="python36-idle-3.6.15-6.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714381" comment="python36-testsuite-3.6.15-6.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714382" comment="python36-tk-3.6.15-6.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714383" comment="python36-tools-3.6.15-6.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152757" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196177" ref_url="https://bugzilla.suse.com/1196177" source="BUGZILLA"/>
		<reference ref_id="1196180" ref_url="https://bugzilla.suse.com/1196180" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0529" ref_url="https://www.suse.com/security/cve/CVE-2022-0529/" source="CVE"/>
		<reference ref_id="CVE-2022-0530" ref_url="https://www.suse.com/security/cve/CVE-2022-0530/" source="CVE"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2022-0530: Fixed SIGSEGV during the conversion of an utf-8 string to a local string (bsc#1196177).
- CVE-2022-0529: Fixed heap out-of-bound writes and reads during conversion of wide string to local string (bsc#1196180).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-26"/>
	<updated date="2022-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196177">SUSE bug 1196177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196180">SUSE bug 1196180</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0529/">CVE-2022-0529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0529">CVE-2022-0529 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0530/">CVE-2022-0530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0530">CVE-2022-0530 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714474" comment="unzip-6.00-33.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152758" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194006" ref_url="https://bugzilla.suse.com/1194006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-4156: Fixed heap buffer overflow in flac_buffer_copy that 
could potentially lead to heap exploitation (bsc#1194006).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4156">CVE-2021-4156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662498" comment="libsndfile1-1.0.25-36.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662485" comment="libsndfile1-32bit-1.0.25-36.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152759" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189802" ref_url="https://bugzilla.suse.com/1189802" source="BUGZILLA"/>
		<reference ref_id="1195773" ref_url="https://bugzilla.suse.com/1195773" source="BUGZILLA"/>
		<reference ref_id="1201783" ref_url="https://bugzilla.suse.com/1201783" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36690" ref_url="https://www.suse.com/security/cve/CVE-2021-36690/" source="CVE"/>
		<reference ref_id="CVE-2022-35737" ref_url="https://www.suse.com/security/cve/CVE-2022-35737/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issues fixed:

- CVE-2022-35737: Fixed an array-bounds overflow if billions of bytes are used in a string argument to a C API (bnc#1201783).
- CVE-2021-36690: Fixed an issue with the SQLite Expert extension when a column has no collating sequence (bsc#1189802).
  
- Package the Tcl bindings here again so that we only ship one copy of SQLite (bsc#1195773).

sqlite3 was update to 3.39.3:

* Use a statement journal on DML statement affecting two or more
  database rows if the statement makes use of a SQL functions
  that might abort.
* Use a mutex to protect the PRAGMA temp_store_directory and
  PRAGMA data_store_directory statements, even though they are
  decremented and documented as not being threadsafe.

Update to 3.39.2:

* Fix a performance regression in the query planner associated
  with rearranging the order of FROM clause terms in the
  presences of a LEFT JOIN.
* Apply fixes for CVE-2022-35737, Chromium bugs 1343348 and
  1345947, forum post 3607259d3c, and other minor problems
  discovered by internal testing. [boo#1201783]

Update to 3.39.1:

* Fix an incorrect result from a query that uses a view that
  contains a compound SELECT in which only one arm contains a
  RIGHT JOIN and where the view is not the first FROM clause term
  of the query that contains the view
* Fix a long-standing problem with ALTER TABLE RENAME that can
  only arise if the sqlite3_limit(SQLITE_LIMIT_SQL_LENGTH) is set
  to a very small value.
* Fix a long-standing problem in FTS3 that can only arise when
  compiled with the SQLITE_ENABLE_FTS3_PARENTHESIS compile-time
  option.
* Fix the initial-prefix optimization for the REGEXP extension so
  that it works correctly even if the prefix contains characters
  that require a 3-byte UTF8 encoding.
* Enhance the sqlite_stmt virtual table so that it buffers all of
  its output. 

Update to 3.39.0:

* Add (long overdue) support for RIGHT and FULL OUTER JOIN
* Add new binary comparison operators IS NOT DISTINCT FROM and 
  IS DISTINCT FROM that are equivalent to IS and IS NOT, 
  respective, for compatibility with PostgreSQL and SQL standards
* Add a new return code (value '3') from the sqlite3_vtab_distinct()
  interface that indicates a query that has both DISTINCT and 
  ORDER BY clauses
* Added the sqlite3_db_name() interface
* The unix os interface resolves all symbolic links in database
  filenames to create a canonical name for the database before
  the file is opened
* Defer materializing views until the materialization is actually
  needed, thus avoiding unnecessary work if the materialization
  turns out to never be used
* The HAVING clause of a SELECT statement is now allowed on any
  aggregate query, even queries that do not have a GROUP BY
  clause
* Many microoptimizations collectively reduce CPU cycles by about
  2.3%. 

Update to 3.38.5:

* Fix a blunder in the CLI of the 3.38.4 release

Update to 3.38.4:

* fix a byte-code problem in the Bloom filter pull-down
  optimization added by release 3.38.0 in which an error in the
  byte code causes the byte code engine to enter an infinite loop
  when the pull-down optimization encounters a NULL key   

Update to 3.38.3:

* Fix a case of the query planner be overly aggressive with
  optimizing automatic-index and Bloom-filter construction,
  using inappropriate ON clause terms to restrict the size of the
  automatic-index or Bloom filter, and resulting in missing rows
  in the output.
* Other minor patches. See the timeline for details. 

Update to 3.38.2:

* Fix a problem with the Bloom filter optimization that might
  cause an incorrect answer when doing a LEFT JOIN with a WHERE
  clause constraint that says that one of the columns on the
  right table of the LEFT JOIN is NULL.
* Other minor patches.

- Package the Tcl bindings here again so that we only ship one copy
of SQLite (bsc#1195773).

Update to 3.38.1:

* Fix problems with the new Bloom filter optimization that might
  cause some obscure queries to get an incorrect answer.
* Fix the localtime modifier of the date and time functions so
  that it preserves fractional seconds.
* Fix the sqlite_offset SQL function so that it works correctly
  even in corner cases such as when the argument is a virtual
  column or the column of a view.
* Fix row value IN operator constraints on virtual tables so that
  they work correctly even if the virtual table implementation
  relies on bytecode to filter rows that do not satisfy the
  constraint.
* Other minor fixes to assert() statements, test cases, and
  documentation. See the source code timeline for details.

Update to 3.38.0

* Add the -&gt; and -&gt;&gt; operators for easier processing of JSON
* The JSON functions are now built-ins
* Enhancements to date and time functions
* Rename the printf() SQL function to format() for better
  compatibility, with alias for backwards compatibility.
* Add the sqlite3_error_offset() interface for helping localize
  an SQL error to a specific character in the input SQL text 
* Enhance the interface to virtual tables 
* CLI columnar output modes are enhanced to correctly handle tabs
  and newlines embedded in text, and add options like '--wrap N',
  '--wordwrap on', and '--quote' to the columnar output modes.
* Query planner enhancements using a Bloom filter to speed up 
  large analytic queries, and a balanced merge tree to evaluate
  UNION or UNION ALL compound SELECT statements that have an
  ORDER BY clause.
* The ALTER TABLE statement is changed to silently ignores
  entries in the sqlite_schema table that do not parse when
  PRAGMA writable_schema=ON

Update to 3.37.2:

* Fix a bug introduced in version 3.35.0 (2021-03-12) that can
  cause database corruption if a SAVEPOINT is rolled back while
  in PRAGMA temp_store=MEMORY mode, and other changes are made,
  and then the outer transaction commits
* Fix a long-standing problem with ON DELETE CASCADE and ON 
  UPDATE CASCADE in which a cache of the bytecode used to
  implement the cascading change was not being reset following a
  local DDL change

Update to 3.37.1:

* Fix a bug introduced by the UPSERT enhancements of version
  3.35.0 that can cause incorrect byte-code to be generated for
  some obscure but valid SQL, possibly resulting in a NULL-
  pointer dereference.
* Fix an OOB read that can occur in FTS5 when reading corrupt
  database files.
* Improved robustness of the --safe option in the CLI.
* Other minor fixes to assert() statements and test cases. 

Update to 3.37.0:

* STRICT tables provide a prescriptive style of data type
  management, for developers who prefer that kind of thing.
* When adding columns that contain a CHECK constraint or a
  generated column containing a NOT NULL constraint, the
  ALTER TABLE ADD COLUMN now checks new constraints against
  preexisting rows in the database and will only proceed if no
  constraints are violated.
* Added the PRAGMA table_list statement.
* Add the .connection command, allowing the CLI to keep multiple
  database connections open at the same time.
* Add the --safe command-line option that disables dot-commands
  and SQL statements that might cause side-effects that extend
  beyond the single database file named on the command-line.
* CLI: Performance improvements when reading SQL statements that
  span many lines.
* Added the sqlite3_autovacuum_pages() interface.
* The sqlite3_deserialize() does not and has never worked
  for the TEMP database. That limitation is now noted in the
  documentation.
* The query planner now omits ORDER BY clauses on subqueries and
  views if removing those clauses does not change the semantics
  of the query.
* The generate_series table-valued function extension is modified
  so that the first parameter ('START') is now required. This is
  done as a way to demonstrate how to write table-valued
  functions with required parameters. The legacy behavior is
  available using the -DZERO_ARGUMENT_GENERATE_SERIES
  compile-time option.
* Added new sqlite3_changes64() and sqlite3_total_changes64()
  interfaces.
* Added the SQLITE_OPEN_EXRESCODE flag option to sqlite3_open_v2().
* Use less memory to hold the database schema.
* bsc#1189802, CVE-2021-36690: Fix an issue with the SQLite Expert
  extension when a column has no collating sequence.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-26"/>
	<updated date="2022-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189802">SUSE bug 1189802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195773">SUSE bug 1195773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201783">SUSE bug 1201783</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36690/">CVE-2021-36690 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36690">CVE-2021-36690 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35737/">CVE-2022-35737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35737">CVE-2022-35737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009711108" comment="libsqlite3-0-3.39.3-9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711109" comment="libsqlite3-0-32bit-3.39.3-9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711110" comment="sqlite3-3.39.3-9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711111" comment="sqlite3-devel-3.39.3-9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714672" comment="sqlite3-tcl-3.39.3-9.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009711108" comment="libsqlite3-0-3.39.3-9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711109" comment="libsqlite3-0-32bit-3.39.3-9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711110" comment="sqlite3-3.39.3-9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711111" comment="sqlite3-devel-3.39.3-9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714672" comment="sqlite3-tcl-3.39.3-9.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152760" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182731" ref_url="https://bugzilla.suse.com/1182731" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3410" ref_url="https://www.suse.com/security/cve/CVE-2021-3410/" source="CVE"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-3410: Fixed overflow when multiplying large ints (bsc#1182731).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-27"/>
	<updated date="2022-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182731">SUSE bug 1182731</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3410/">CVE-2021-3410 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3410">CVE-2021-3410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714097" comment="libcaca0-0.99.beta18-14.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152761" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203477" ref_url="https://bugzilla.suse.com/1203477" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40956" ref_url="https://www.suse.com/security/cve/CVE-2022-40956/" source="CVE"/>
		<reference ref_id="CVE-2022-40957" ref_url="https://www.suse.com/security/cve/CVE-2022-40957/" source="CVE"/>
		<reference ref_id="CVE-2022-40958" ref_url="https://www.suse.com/security/cve/CVE-2022-40958/" source="CVE"/>
		<reference ref_id="CVE-2022-40959" ref_url="https://www.suse.com/security/cve/CVE-2022-40959/" source="CVE"/>
		<reference ref_id="CVE-2022-40960" ref_url="https://www.suse.com/security/cve/CVE-2022-40960/" source="CVE"/>
		<reference ref_id="CVE-2022-40962" ref_url="https://www.suse.com/security/cve/CVE-2022-40962/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

  Mozilla Firefox was updated from 102.2.0esr to 102.3.0esr (bsc#1203477):

  - CVE-2022-40959: Fixed bypassing FeaturePolicy restrictions on transient pages.
  - CVE-2022-40960: Fixed data-race when parsing non-UTF-8 URLs in threads.
  - CVE-2022-40958: Fixed bypassing secure context restriction for cookies with __Host and __Secure prefix.
  - CVE-2022-40956: Fixed content-security-policy base-uri bypass.
  - CVE-2022-40957: Fixed incoherent instruction cache when building WASM on ARM64.
  - CVE-2022-40962: Fixed memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3.
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-27"/>
	<updated date="2022-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203477">SUSE bug 1203477</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40956/">CVE-2022-40956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40956">CVE-2022-40956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40957/">CVE-2022-40957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40957">CVE-2022-40957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40958/">CVE-2022-40958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40958">CVE-2022-40958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40959/">CVE-2022-40959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40959">CVE-2022-40959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40960/">CVE-2022-40960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40960">CVE-2022-40960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40962/">CVE-2022-40962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40962">CVE-2022-40962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009714304" comment="MozillaFirefox-102.3.0-112.133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714305" comment="MozillaFirefox-devel-102.3.0-112.133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714306" comment="MozillaFirefox-translations-common-102.3.0-112.133.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009714304" comment="MozillaFirefox-102.3.0-112.133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714305" comment="MozillaFirefox-devel-102.3.0-112.133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714306" comment="MozillaFirefox-translations-common-102.3.0-112.133.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152762" version="1" class="patch">
	<metadata>
		<title>Security update for python3-lxml (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179534" ref_url="https://bugzilla.suse.com/1179534" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27783" ref_url="https://www.suse.com/security/cve/CVE-2020-27783/" source="CVE"/>
		<description>
This update for python3-lxml fixes the following issues:

- CVE-2020-27783: Fixed XSS due to the use of improper parser (bsc#1179534).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-29"/>
	<updated date="2022-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179534">SUSE bug 1179534</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-27783/">CVE-2020-27783 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27783">CVE-2020-27783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715907" comment="python3-lxml-3.3.5-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152763" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203438" ref_url="https://bugzilla.suse.com/1203438" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40674" ref_url="https://www.suse.com/security/cve/CVE-2022-40674/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-40674: Fixed use-after-free in the doContent function in xmlparse.c (bsc#1203438).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-29"/>
	<updated date="2022-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203438">SUSE bug 1203438</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40674/">CVE-2022-40674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009715903" comment="expat-2.1.0-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715904" comment="libexpat1-2.1.0-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715899" comment="libexpat1-32bit-2.1.0-21.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009715903" comment="expat-2.1.0-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715904" comment="libexpat1-2.1.0-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715899" comment="libexpat1-32bit-2.1.0-21.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152764" version="1" class="patch">
	<metadata>
		<title>Security update for krb5-appl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203759" ref_url="https://bugzilla.suse.com/1203759" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-39028" ref_url="https://www.suse.com/security/cve/CVE-2022-39028/" source="CVE"/>
		<description>
This update for krb5-appl fixes the following issues:

- CVE-2022-39028: Fixed NULL pointer dereference in krb5-appl telnetd (bsc#1203759).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-29"/>
	<updated date="2022-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203759">SUSE bug 1203759</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39028/">CVE-2022-39028 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39028">CVE-2022-39028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009715905" comment="krb5-appl-clients-1.0.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715906" comment="krb5-appl-servers-1.0.3-3.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009715905" comment="krb5-appl-clients-1.0.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715906" comment="krb5-appl-servers-1.0.3-3.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152765" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202915" ref_url="https://bugzilla.suse.com/1202915" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35538" ref_url="https://www.suse.com/security/cve/CVE-2020-35538/" source="CVE"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2020-35538: Fixed null pointer dereference in jcopy_sample_rows() function (bsc#1202915).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-30"/>
	<updated date="2022-09-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1202915">SUSE bug 1202915</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35538/">CVE-2020-35538 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35538">CVE-2020-35538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710374" comment="libjpeg-turbo-1.5.3-31.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710375" comment="libjpeg62-62.2.0-31.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710376" comment="libjpeg62-32bit-62.2.0-31.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710377" comment="libjpeg62-turbo-1.5.3-31.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710378" comment="libjpeg8-8.1.2-31.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710379" comment="libjpeg8-32bit-8.1.2-31.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710380" comment="libturbojpeg0-8.1.2-31.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152766" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203865" ref_url="https://bugzilla.suse.com/1203865" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32166" ref_url="https://www.suse.com/security/cve/CVE-2022-32166/" source="CVE"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2022-32166: Fixed out of bounds read in minimask_equal() (bsc#1203865).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-30"/>
	<updated date="2022-09-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203865">SUSE bug 1203865</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32166/">CVE-2022-32166 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32166">CVE-2022-32166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716293" comment="openvswitch-2.7.12-3.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152767" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203530" ref_url="https://bugzilla.suse.com/1203530" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32886" ref_url="https://www.suse.com/security/cve/CVE-2022-32886/" source="CVE"/>
		<reference ref_id="CVE-2022-32912" ref_url="https://www.suse.com/security/cve/CVE-2022-32912/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Updated to version 2.36.8 (bsc#1203530):
  - CVE-2022-32886: Fixed a buffer overflow issue that could potentially lead to code execution.
  - CVE-2022-32912: Fixed an out-of-bounds read that could potentially lead to code execution.

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-03"/>
	<updated date="2022-10-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203530">SUSE bug 1203530</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32886/">CVE-2022-32886 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32886">CVE-2022-32886 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32912/">CVE-2022-32912 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32912">CVE-2022-32912 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009715764" comment="libjavascriptcoregtk-4_0-18-2.36.8-2.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715765" comment="libwebkit2gtk-4_0-37-2.36.8-2.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715641" comment="libwebkit2gtk3-lang-2.36.8-2.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715766" comment="typelib-1_0-JavaScriptCore-4_0-2.36.8-2.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715767" comment="typelib-1_0-WebKit2-4_0-2.36.8-2.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715768" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.8-2.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715769" comment="webkit2gtk-4_0-injected-bundles-2.36.8-2.113.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009715764" comment="libjavascriptcoregtk-4_0-18-2.36.8-2.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715765" comment="libwebkit2gtk-4_0-37-2.36.8-2.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715641" comment="libwebkit2gtk3-lang-2.36.8-2.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715766" comment="typelib-1_0-JavaScriptCore-4_0-2.36.8-2.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715767" comment="typelib-1_0-WebKit2-4_0-2.36.8-2.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715768" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.8-2.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715769" comment="webkit2gtk-4_0-injected-bundles-2.36.8-2.113.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152768" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203614" ref_url="https://bugzilla.suse.com/1203614" source="BUGZILLA"/>
		<reference ref_id="1203619" ref_url="https://bugzilla.suse.com/1203619" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2795" ref_url="https://www.suse.com/security/cve/CVE-2022-2795/" source="CVE"/>
		<reference ref_id="CVE-2022-38177" ref_url="https://www.suse.com/security/cve/CVE-2022-38177/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

  - CVE-2022-2795: Fixed potential performance degredation due to missing database lookup limits when processing large delegations (bsc#1203614).
  - CVE-2022-38177: Fixed a memory leak that could be externally triggered in the DNSSEC verification code for the ECDSA algorithm (bsc#1203619).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-04"/>
	<updated date="2022-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203614">SUSE bug 1203614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203619">SUSE bug 1203619</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2795/">CVE-2022-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2795">CVE-2022-2795 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38177/">CVE-2022-38177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38177">CVE-2022-38177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009715758" comment="bind-9.9.9P1-63.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715759" comment="bind-chrootenv-9.9.9P1-63.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715760" comment="bind-doc-9.9.9P1-63.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715761" comment="bind-libs-9.9.9P1-63.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715762" comment="bind-libs-32bit-9.9.9P1-63.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715763" comment="bind-utils-9.9.9P1-63.37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009715758" comment="bind-9.9.9P1-63.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715759" comment="bind-chrootenv-9.9.9P1-63.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715760" comment="bind-doc-9.9.9P1-63.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715761" comment="bind-libs-9.9.9P1-63.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715762" comment="bind-libs-32bit-9.9.9P1-63.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715763" comment="bind-utils-9.9.9P1-63.37.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152769" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202624" ref_url="https://bugzilla.suse.com/1202624" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28861" ref_url="https://www.suse.com/security/cve/CVE-2021-28861/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2021-28861: Fixed an open redirection vulnerability in the HTTP server when an URI path starts with // (bsc#1202624).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-20"/>
	<updated date="2022-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202624">SUSE bug 1202624</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28861/">CVE-2021-28861 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28861">CVE-2021-28861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009714370" comment="libpython3_4m1_0-3.4.10-25.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714371" comment="python3-3.4.10-25.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714372" comment="python3-base-3.4.10-25.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714373" comment="python3-curses-3.4.10-25.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716684" comment="python3-devel-3.4.10-25.96.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009714370" comment="libpython3_4m1_0-3.4.10-25.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714371" comment="python3-3.4.10-25.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714372" comment="python3-base-3.4.10-25.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714373" comment="python3-curses-3.4.10-25.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716684" comment="python3-devel-3.4.10-25.96.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152770" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203677" ref_url="https://bugzilla.suse.com/1203677" source="BUGZILLA"/>
		<reference ref_id="1203680" ref_url="https://bugzilla.suse.com/1203680" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41317" ref_url="https://www.suse.com/security/cve/CVE-2022-41317/" source="CVE"/>
		<reference ref_id="CVE-2022-41318" ref_url="https://www.suse.com/security/cve/CVE-2022-41318/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

  - CVE-2022-41317: Fixed exposure of sensitive information in cache manager (bsc#1203677).
  - CVE-2022-41318: Fixed buffer overread in SSPI and SMB Authentication (bsc#1203680).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-06"/>
	<updated date="2022-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203677">SUSE bug 1203677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203680">SUSE bug 1203680</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41317/">CVE-2022-41317 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41317">CVE-2022-41317 at NVD</cve>
	<cve impact="high" cvss3="8.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-41318/">CVE-2022-41318 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41318">CVE-2022-41318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715902" comment="squid-3.5.21-26.38.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715902" comment="squid-3.5.21-26.38.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152771" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql-jdbc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202170" ref_url="https://bugzilla.suse.com/1202170" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31197" ref_url="https://www.suse.com/security/cve/CVE-2022-31197/" source="CVE"/>
		<description>
This update for postgresql-jdbc fixes the following issues:

- CVE-2022-31197: Fixed SQL injection vulnerability (bsc#1202170).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-06"/>
	<updated date="2022-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202170">SUSE bug 1202170</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-31197/">CVE-2022-31197 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31197">CVE-2022-31197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716256" comment="postgresql-jdbc-9.4-3.6.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716256" comment="postgresql-jdbc-9.4-3.6.3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152772" version="1" class="patch">
	<metadata>
		<title>Security update for exiv2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186192" ref_url="https://bugzilla.suse.com/1186192" source="BUGZILLA"/>
		<reference ref_id="1188733" ref_url="https://bugzilla.suse.com/1188733" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31291" ref_url="https://www.suse.com/security/cve/CVE-2021-31291/" source="CVE"/>
		<reference ref_id="CVE-2021-32617" ref_url="https://www.suse.com/security/cve/CVE-2021-32617/" source="CVE"/>
		<description>
This update for exiv2 fixes the following issues:

- CVE-2021-31291: Fixed heap-based buffer overflow vulnerability in jp2image.cpp may lead to a denial of service (bsc#1188733).
- CVE-2021-32617: Fixed denial of service inside inefficient algorithm (quadratic complexity) (bsc#1186192).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-06"/>
	<updated date="2022-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186192">SUSE bug 1186192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188733">SUSE bug 1188733</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31291/">CVE-2021-31291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-31291">CVE-2021-31291 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32617/">CVE-2021-32617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32617">CVE-2021-32617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716292" comment="libexiv2-12-0.23-12.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152773" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-09"/>
	<updated date="2022-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20698">CVE-2022-20698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664693" comment="clamav-0.103.5-33.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152774" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194581" ref_url="https://bugzilla.suse.com/1194581" source="BUGZILLA"/>
		<reference ref_id="1194588" ref_url="https://bugzilla.suse.com/1194588" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23034" ref_url="https://www.suse.com/security/cve/CVE-2022-23034/" source="CVE"/>
		<reference ref_id="CVE-2022-23035" ref_url="https://www.suse.com/security/cve/CVE-2022-23035/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-23034: Fixed possible DoS by a PV guest Xen while unmapping a grant. (XSA-394) (bsc#1194581)
- CVE-2022-23035: Fixed insufficient cleanup of passed-through device IRQs. (XSA-395) (bsc#1194588)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-09"/>
	<updated date="2022-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194581">SUSE bug 1194581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194588">SUSE bug 1194588</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23034/">CVE-2022-23034 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23034">CVE-2022-23034 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23035/">CVE-2022-23035 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23035">CVE-2022-23035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666154" comment="xen-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666155" comment="xen-doc-html-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666156" comment="xen-libs-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666157" comment="xen-libs-32bit-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666158" comment="xen-tools-4.9.4_26-3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666159" comment="xen-tools-domU-4.9.4_26-3.100.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152775" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193625" ref_url="https://bugzilla.suse.com/1193625" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8985" ref_url="https://www.suse.com/security/cve/CVE-2015-8985/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2015-8985: Fixed assertion failure in pop_fail_stack when executing
  a malformed regexp (bsc#1193625)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-19"/>
	<updated date="2022-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193625">SUSE bug 1193625</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8985/">CVE-2015-8985 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8985">CVE-2015-8985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009717587" comment="glibc-2.22-129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717588" comment="glibc-32bit-2.22-129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717589" comment="glibc-devel-2.22-129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717590" comment="glibc-devel-32bit-2.22-129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717591" comment="glibc-html-2.22-129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717592" comment="glibc-i18ndata-2.22-129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717593" comment="glibc-info-2.22-129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717594" comment="glibc-locale-2.22-129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717595" comment="glibc-locale-32bit-2.22-129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717596" comment="glibc-profile-2.22-129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717597" comment="glibc-profile-32bit-2.22-129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717598" comment="nscd-2.22-129.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152776" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202642" ref_url="https://bugzilla.suse.com/1202642" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2963" ref_url="https://www.suse.com/security/cve/CVE-2022-2963/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2022-2963: Fixed memory leaks in function cmdopts_parse (bsc#1202642).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-20"/>
	<updated date="2022-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1202642">SUSE bug 1202642</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2963/">CVE-2022-2963 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2963">CVE-2022-2963 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009714095" comment="libjasper1-1.900.14-195.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714096" comment="libjasper1-32bit-1.900.14-195.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152777" version="1" class="patch">
	<metadata>
		<title>Security update for clone-master-clean-up (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181050" ref_url="https://bugzilla.suse.com/1181050" source="BUGZILLA"/>
		<reference ref_id="1203651" ref_url="https://bugzilla.suse.com/1203651" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32000" ref_url="https://www.suse.com/security/cve/CVE-2021-32000/" source="CVE"/>
		<description>
This update for clone-master-clean-up fixes the following issues:

  - CVE-2021-32000: Fixed some potentially dangerous file system operations (bsc#1181050).

  Bugfixes:

  - Fixed failures to remove btrfs snapshots (bsc#1203651).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-20"/>
	<updated date="2022-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181050">SUSE bug 1181050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203651">SUSE bug 1203651</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32000/">CVE-2021-32000 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32000">CVE-2021-32000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717360" comment="clone-master-clean-up-1.8-4.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152778" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201723" ref_url="https://bugzilla.suse.com/1201723" source="BUGZILLA"/>
		<reference ref_id="1201971" ref_url="https://bugzilla.suse.com/1201971" source="BUGZILLA"/>
		<reference ref_id="1202026" ref_url="https://bugzilla.suse.com/1202026" source="BUGZILLA"/>
		<reference ref_id="1202466" ref_url="https://bugzilla.suse.com/1202466" source="BUGZILLA"/>
		<reference ref_id="1202467" ref_url="https://bugzilla.suse.com/1202467" source="BUGZILLA"/>
		<reference ref_id="1202468" ref_url="https://bugzilla.suse.com/1202468" source="BUGZILLA"/>
		<reference ref_id="1202968" ref_url="https://bugzilla.suse.com/1202968" source="BUGZILLA"/>
		<reference ref_id="1202971" ref_url="https://bugzilla.suse.com/1202971" source="BUGZILLA"/>
		<reference ref_id="1202973" ref_url="https://bugzilla.suse.com/1202973" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0561" ref_url="https://www.suse.com/security/cve/CVE-2022-0561/" source="CVE"/>
		<reference ref_id="CVE-2022-2519" ref_url="https://www.suse.com/security/cve/CVE-2022-2519/" source="CVE"/>
		<reference ref_id="CVE-2022-2520" ref_url="https://www.suse.com/security/cve/CVE-2022-2520/" source="CVE"/>
		<reference ref_id="CVE-2022-2521" ref_url="https://www.suse.com/security/cve/CVE-2022-2521/" source="CVE"/>
		<reference ref_id="CVE-2022-2867" ref_url="https://www.suse.com/security/cve/CVE-2022-2867/" source="CVE"/>
		<reference ref_id="CVE-2022-2868" ref_url="https://www.suse.com/security/cve/CVE-2022-2868/" source="CVE"/>
		<reference ref_id="CVE-2022-2869" ref_url="https://www.suse.com/security/cve/CVE-2022-2869/" source="CVE"/>
		<reference ref_id="CVE-2022-34266" ref_url="https://www.suse.com/security/cve/CVE-2022-34266/" source="CVE"/>
		<reference ref_id="CVE-2022-34526" ref_url="https://www.suse.com/security/cve/CVE-2022-34526/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2022-2519: Fixed a double free in rotateImage() (bsc#1202968).
- CVE-2022-2520: Fixed a assertion failure in rotateImage() (bsc#1202973).
- CVE-2022-2521: Fixed invalid free in TIFFClose() (bsc#1202971).
- CVE-2022-2867: Fixed out of bounds read and write in tiffcrop.c (bsc#1202466).
- CVE-2022-2868: Fixed out of bounds read in reverseSamples16bits() (bsc#1202467).
- CVE-2022-2869: Fixed out of bounds read and write in extractContigSamples8bits() (bsc#1202468).
- CVE-2022-34526: Fixed stack overflow in the _TIFFVGetField function of Tiffsplit (bsc#1202026).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-20"/>
	<updated date="2022-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201723">SUSE bug 1201723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201971">SUSE bug 1201971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202026">SUSE bug 1202026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202466">SUSE bug 1202466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202467">SUSE bug 1202467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202468">SUSE bug 1202468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202968">SUSE bug 1202968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202971">SUSE bug 1202971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202973">SUSE bug 1202973</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0561/">CVE-2022-0561 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0561">CVE-2022-0561 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2519/">CVE-2022-2519 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2519">CVE-2022-2519 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2520/">CVE-2022-2520 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2520">CVE-2022-2520 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2521/">CVE-2022-2521 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2521">CVE-2022-2521 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2867/">CVE-2022-2867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2867">CVE-2022-2867 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2868/">CVE-2022-2868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2868">CVE-2022-2868 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2869/">CVE-2022-2869 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2869">CVE-2022-2869 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-34266/">CVE-2022-34266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34266">CVE-2022-34266 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34526/">CVE-2022-34526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34526">CVE-2022-34526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009718791" comment="libtiff5-4.0.9-44.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718789" comment="libtiff5-32bit-4.0.9-44.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718792" comment="tiff-4.0.9-44.56.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009718791" comment="libtiff5-4.0.9-44.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718789" comment="libtiff5-32bit-4.0.9-44.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718792" comment="tiff-4.0.9-44.56.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152779" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204357" ref_url="https://bugzilla.suse.com/1204357" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3515" ref_url="https://www.suse.com/security/cve/CVE-2022-3515/" source="CVE"/>
		<description>
This update for libksba fixes the following issues:

  - CVE-2022-3515: Fixed a possible overflow in the TLV parser (bsc#1204357).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-21"/>
	<updated date="2022-10-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1204357">SUSE bug 1204357</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3515/">CVE-2022-3515 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3515">CVE-2022-3515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718649" comment="libksba8-1.3.0-24.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718649" comment="libksba8-1.3.0-24.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152780" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192426" ref_url="https://bugzilla.suse.com/1192426" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31566" ref_url="https://www.suse.com/security/cve/CVE-2021-31566/" source="CVE"/>
		<description>
This update for libarchive fixes the following issues:

  - CVE-2021-31566: Fixed vulnerability where libarchive modifies file flags of symlink target (bsc#1192426)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-24"/>
	<updated date="2022-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192426">SUSE bug 1192426</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-31566/">CVE-2021-31566 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31566">CVE-2021-31566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720763" comment="libarchive13-3.3.3-26.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152781" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<description>
This update for squid fixes the following issues:

This update ships squid 4.17 (jsc#SLE-24797, jsc#SLE-24799)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-24"/>
	<updated date="2022-10-24"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717599" comment="squid-4.17-30.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152782" version="1" class="patch">
	<metadata>
		<title>Security update for multipath-tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1118495" ref_url="https://bugzilla.suse.com/1118495" source="BUGZILLA"/>
		<reference ref_id="1125145" ref_url="https://bugzilla.suse.com/1125145" source="BUGZILLA"/>
		<reference ref_id="1125507" ref_url="https://bugzilla.suse.com/1125507" source="BUGZILLA"/>
		<reference ref_id="1131789" ref_url="https://bugzilla.suse.com/1131789" source="BUGZILLA"/>
		<reference ref_id="1134648" ref_url="https://bugzilla.suse.com/1134648" source="BUGZILLA"/>
		<reference ref_id="1139369" ref_url="https://bugzilla.suse.com/1139369" source="BUGZILLA"/>
		<reference ref_id="1202616" ref_url="https://bugzilla.suse.com/1202616" source="BUGZILLA"/>
		<reference ref_id="1202739" ref_url="https://bugzilla.suse.com/1202739" source="BUGZILLA"/>
		<reference ref_id="1204325" ref_url="https://bugzilla.suse.com/1204325" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41974" ref_url="https://www.suse.com/security/cve/CVE-2022-41974/" source="CVE"/>
		<description>
This update for multipath-tools fixes the following issues:

- CVE-2022-41974: Fixed an authorization bypass issue in multipathd. (bsc#1202739)
- Avoid linking to libreadline to avoid licensing issue (bsc#1202616)
- Avoid device IO in 'multipath -u' (bsc#1125145, bsc#1131789)
- mpathpersist: optimize for setups with many LUNs (bsc#1134648)
- mpathpersist: add option -f/--batch-file (bsc#1134648)
- libmultipath: get_prio(): really don't reset prio for  inaccessible paths (bsc#1118495)
- Upstream bug fixes from dm-devel (bsc#1139369):
  multipath: call store_pathinfo with DI_BLACKLIST
- hwtable: add Lenovo DE series (bsc#1125507)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-24"/>
	<updated date="2022-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118495">SUSE bug 1118495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125145">SUSE bug 1125145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125507">SUSE bug 1125507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131789">SUSE bug 1131789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134648">SUSE bug 1134648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139369">SUSE bug 1139369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202616">SUSE bug 1202616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202739">SUSE bug 1202739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204325">SUSE bug 1204325</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41974/">CVE-2022-41974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41974">CVE-2022-41974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009720069" comment="kpartx-0.7.1+125+suse.c18e287-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720070" comment="multipath-tools-0.7.1+125+suse.c18e287-2.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009720069" comment="kpartx-0.7.1+125+suse.c18e287-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720070" comment="multipath-tools-0.7.1+125+suse.c18e287-2.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152783" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201978" ref_url="https://bugzilla.suse.com/1201978" source="BUGZILLA"/>
		<reference ref_id="1204366" ref_url="https://bugzilla.suse.com/1204366" source="BUGZILLA"/>
		<reference ref_id="1204367" ref_url="https://bugzilla.suse.com/1204367" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3709" ref_url="https://www.suse.com/security/cve/CVE-2016-3709/" source="CVE"/>
		<reference ref_id="CVE-2022-40303" ref_url="https://www.suse.com/security/cve/CVE-2022-40303/" source="CVE"/>
		<reference ref_id="CVE-2022-40304" ref_url="https://www.suse.com/security/cve/CVE-2022-40304/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

  - CVE-2016-3709: Fixed possible XSS vulnerability (bsc#1201978).    
  - CVE-2022-40303: Fixed integer overflows with XML_PARSE_HUGE (bsc#1204366).    
  - CVE-2022-40304: Fixed dict corruption caused by entity reference cycles (bsc#1204367).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-25"/>
	<updated date="2022-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201978">SUSE bug 1201978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204366">SUSE bug 1204366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204367">SUSE bug 1204367</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-3709/">CVE-2016-3709 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3709">CVE-2016-3709 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40303/">CVE-2022-40303 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40303">CVE-2022-40303 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40304/">CVE-2022-40304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40304">CVE-2022-40304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009719691" comment="libxml2-2-2.9.4-46.59.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719640" comment="libxml2-2-32bit-2.9.4-46.59.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719144" comment="libxml2-doc-2.9.4-46.59.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719692" comment="libxml2-tools-2.9.4-46.59.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719693" comment="python-libxml2-2.9.4-46.59.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009719691" comment="libxml2-2-2.9.4-46.59.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719640" comment="libxml2-2-32bit-2.9.4-46.59.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719144" comment="libxml2-doc-2.9.4-46.59.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719692" comment="libxml2-tools-2.9.4-46.59.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719693" comment="python-libxml2-2.9.4-46.59.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152784" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1013885" ref_url="https://bugzilla.suse.com/1013885" source="BUGZILLA"/>
		<reference ref_id="1193237" ref_url="https://bugzilla.suse.com/1193237" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9803" ref_url="https://www.suse.com/security/cve/CVE-2016-9803/" source="CVE"/>
		<reference ref_id="CVE-2019-8921" ref_url="https://www.suse.com/security/cve/CVE-2019-8921/" source="CVE"/>
		<description>
This update for bluez fixes the following issues:

  - CVE-2019-8921: Fixed heap-based buffer overflow via crafted request (bsc#1193237).
  - CVE-2016-9803: Fixed memory leak (bsc#1013885).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-25"/>
	<updated date="2022-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013885">SUSE bug 1013885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193237">SUSE bug 1193237</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9803/">CVE-2016-9803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9803">CVE-2016-9803 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8921/">CVE-2019-8921 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8921">CVE-2019-8921 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009719807" comment="bluez-5.13-5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719808" comment="libbluetooth3-5.13-5.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009719807" comment="bluez-5.13-5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719808" comment="libbluetooth3-5.13-5.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152785" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204421" ref_url="https://bugzilla.suse.com/1204421" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42927" ref_url="https://www.suse.com/security/cve/CVE-2022-42927/" source="CVE"/>
		<reference ref_id="CVE-2022-42928" ref_url="https://www.suse.com/security/cve/CVE-2022-42928/" source="CVE"/>
		<reference ref_id="CVE-2022-42929" ref_url="https://www.suse.com/security/cve/CVE-2022-42929/" source="CVE"/>
		<reference ref_id="CVE-2022-42932" ref_url="https://www.suse.com/security/cve/CVE-2022-42932/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

  Updated to version 102.4.0 ESR (bsc#1204421):

  - CVE-2022-42927: Fixed same-origin policy violation that could have leaked cross-origin URLs.
  - CVE-2022-42928: Fixed memory Corruption in JS Engine.
  - CVE-2022-42929: Fixed denial of Service via window.print.
  - CVE-2022-42932: Fixed memory safety bugs.

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-25"/>
	<updated date="2022-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204421">SUSE bug 1204421</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42927/">CVE-2022-42927 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42927">CVE-2022-42927 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42928/">CVE-2022-42928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42928">CVE-2022-42928 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42929/">CVE-2022-42929 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42929">CVE-2022-42929 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42932/">CVE-2022-42932 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42932">CVE-2022-42932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009719758" comment="MozillaFirefox-102.4.0-112.136.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719759" comment="MozillaFirefox-devel-102.4.0-112.136.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719760" comment="MozillaFirefox-translations-common-102.4.0-112.136.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009719758" comment="MozillaFirefox-102.4.0-112.136.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719759" comment="MozillaFirefox-devel-102.4.0-112.136.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719760" comment="MozillaFirefox-translations-common-102.4.0-112.136.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152786" version="1" class="patch">
	<metadata>
		<title>Security update for telnet (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203759" ref_url="https://bugzilla.suse.com/1203759" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-39028" ref_url="https://www.suse.com/security/cve/CVE-2022-39028/" source="CVE"/>
		<description>
This update for telnet fixes the following issues:

  - CVE-2022-39028: Fixed NULL pointer dereference in telnetd (bsc#1203759).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-26"/>
	<updated date="2022-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203759">SUSE bug 1203759</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39028/">CVE-2022-39028 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39028">CVE-2022-39028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009720752" comment="telnet-1.2-167.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720753" comment="telnet-server-1.2-167.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009720752" comment="telnet-1.2-167.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720753" comment="telnet-server-1.2-167.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152787" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196338" ref_url="https://bugzilla.suse.com/1196338" source="BUGZILLA"/>
		<reference ref_id="1198903" ref_url="https://bugzilla.suse.com/1198903" source="BUGZILLA"/>
		<reference ref_id="1200725" ref_url="https://bugzilla.suse.com/1200725" source="BUGZILLA"/>
		<reference ref_id="1201535" ref_url="https://bugzilla.suse.com/1201535" source="BUGZILLA"/>
		<reference ref_id="1201539" ref_url="https://bugzilla.suse.com/1201539" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<reference ref_id="CVE-2022-31097" ref_url="https://www.suse.com/security/cve/CVE-2022-31097/" source="CVE"/>
		<reference ref_id="CVE-2022-31107" ref_url="https://www.suse.com/security/cve/CVE-2022-31107/" source="CVE"/>
		<description>

This update fixes the following issues:

golang-github-lusitaniae-apache_exporter:

- Update to upstream release 0.11.0 (jsc#SLE-24791)
  * Add TLS support
  * Switch to logger, please check --log.level and --log.format flags
- Update to version 0.10.1
  * Bugfix: Reset ProxyBalancer metrics on each scrape to remove stale data
- Update to version 0.10.0
  * Add Apache Proxy and other metrics
- Update to version 0.8.0
  * Change commandline flags
  * Add metrics: Apache version, request duration total
- Adapted to build on Enterprise Linux 8
- Require building with Go 1.15
- Add %license macro for LICENSE file 

golang-github-prometheus-alertmanager:

- Do not include sources (bsc#1200725)

golang-github-prometheus-node_exporter:

- CVE-2022-21698: Denial of service using InstrumentHandlerCounter. (bsc#1196338, jsc#SLE-24243, jsc#SUMA-114)

grafana:

- Update to version 8.3.10
  + Security:
    * CVE-2022-31097: Cross Site Scripting vulnerability in the Unified Alerting (bsc#1201535)
    * CVE-2022-31107: OAuth account takeover vulnerability (bsc#1201539)
- Update to version 8.3.9
  + Bug fixes:
    * Geomap: Display legend
    * Prometheus: Fix timestamp truncation
- Update to version 8.3.7
  + Bug fix:
    * Provisioning: Ensure that the default value for orgID is set when provisioning datasources to be deleted.
- Update to version 8.3.6
  + Features and enhancements:
    * Cloud Monitoring: Reduce request size when listing labels.
    * Explore: Show scalar data result in a table instead of graph.
    * Snapshots: Updates the default external snapshot server URL.
    * Table: Makes footer not overlap table content.
    * Tempo: Add request histogram to service graph datalink.
    * Tempo: Add time range to tempo search query behind a feature flag.
    * Tempo: Auto-clear results when changing query type.
    * Tempo: Display start time in search results as relative time.
    * CloudMonitoring: Fix resource labels in query editor.
    * Cursor sync: Apply the settings without saving the dashboard.
    * LibraryPanels: Fix for Error while cleaning library panels.
    * Logs Panel: Fix timestamp parsing for string dates without timezone.
    * Prometheus: Fix some of the alerting queries that use reduce/math operation.
    * TablePanel: Fix ad-hoc variables not working on default datasources.
    * Text Panel: Fix alignment of elements.
    * Variables: Fix for constant variables in self referencing links.
- Update to version 8.3.5 (jsc#SLE-23439, jsc#SLE-23422, jsc#SLE-24565)

kiwi-desc-saltboot:

- Update to version 0.1.1661440542.6cbe0da
  * Use standard susemanager.conf
  * Use salt bundle
  * Add support fo VirtIO disks

mgr-daemon:

- Version 4.3.6-1
  * Update translation strings

spacecmd:

- Version 4.3.15-1
  * Process date values in spacecmd api calls (bsc#1198903)

spacewalk-client-tools:

- Version 4.3.12-1
  * Update translation strings

uyuni-common-libs:

- Version 4.3.6-1
  * Do not allow creating path if nonexistent user or group in fileutils.

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-26"/>
	<updated date="2022-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196338">SUSE bug 1196338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198903">SUSE bug 1198903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200725">SUSE bug 1200725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201535">SUSE bug 1201535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201539">SUSE bug 1201539</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21698">CVE-2022-21698 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-31097/">CVE-2022-31097 at SUSE</cve>
	<cve impact="high" cvss3="8.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31097">CVE-2022-31097 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31107/">CVE-2022-31107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31107">CVE-2022-31107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717032" comment="golang-github-prometheus-node_exporter-1.3.0-1.21.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717032" comment="golang-github-prometheus-node_exporter-1.3.0-1.21.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152788" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204383" ref_url="https://bugzilla.suse.com/1204383" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32221" ref_url="https://www.suse.com/security/cve/CVE-2022-32221/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

  - CVE-2022-32221: Fixed POST following PUT confusion (bsc#1204383).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-26"/>
	<updated date="2022-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204383">SUSE bug 1204383</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32221/">CVE-2022-32221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32221">CVE-2022-32221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721649" comment="curl-7.37.0-37.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721650" comment="libcurl4-7.37.0-37.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721651" comment="libcurl4-32bit-7.37.0-37.85.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721649" comment="curl-7.37.0-37.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721650" comment="libcurl4-7.37.0-37.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721651" comment="libcurl4-32bit-7.37.0-37.85.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152789" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185104" ref_url="https://bugzilla.suse.com/1185104" source="BUGZILLA"/>
		<reference ref_id="1203806" ref_url="https://bugzilla.suse.com/1203806" source="BUGZILLA"/>
		<reference ref_id="1203807" ref_url="https://bugzilla.suse.com/1203807" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28689" ref_url="https://www.suse.com/security/cve/CVE-2021-28689/" source="CVE"/>
		<reference ref_id="CVE-2022-33746" ref_url="https://www.suse.com/security/cve/CVE-2022-33746/" source="CVE"/>
		<reference ref_id="CVE-2022-33748" ref_url="https://www.suse.com/security/cve/CVE-2022-33748/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

  - CVE-2022-33746: Fixed DoS due to excessively long P2M pool freeing (bsc#1203806). 
  - CVE-2022-33748: Fixed DoS due to race in locking (bsc#1203807).
  - CVE-2021-28689: Fixed speculative vulnerabilities with bare (non-shim) 32-bit PV guests (bsc#1185104).
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-26"/>
	<updated date="2022-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185104">SUSE bug 1185104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203806">SUSE bug 1203806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203807">SUSE bug 1203807</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28689/">CVE-2021-28689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28689">CVE-2021-28689 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33746/">CVE-2022-33746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33746">CVE-2022-33746 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33748/">CVE-2022-33748 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33748">CVE-2022-33748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009719032" comment="xen-4.9.4_32-3.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719033" comment="xen-doc-html-4.9.4_32-3.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719034" comment="xen-libs-4.9.4_32-3.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719035" comment="xen-libs-32bit-4.9.4_32-3.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719036" comment="xen-tools-4.9.4_32-3.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719037" comment="xen-tools-domU-4.9.4_32-3.109.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152790" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1200800" ref_url="https://bugzilla.suse.com/1200800" source="BUGZILLA"/>
		<reference ref_id="1201680" ref_url="https://bugzilla.suse.com/1201680" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46828" ref_url="https://www.suse.com/security/cve/CVE-2021-46828/" source="CVE"/>
		<description>
This update for libtirpc fixes the following issues:

- CVE-2021-46828: Fixed denial of service vulnerability with lots of connections (bsc#1201680).

- Exclude ipv6 addresses in client protocol version 2 code (bsc#1200800)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2022-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200800">SUSE bug 1200800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201680">SUSE bug 1201680</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46828/">CVE-2021-46828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46828">CVE-2021-46828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716290" comment="libtirpc-netconfig-1.0.1-17.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716291" comment="libtirpc3-1.0.1-17.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716289" comment="libtirpc3-32bit-1.0.1-17.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716290" comment="libtirpc-netconfig-1.0.1-17.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716291" comment="libtirpc3-1.0.1-17.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716289" comment="libtirpc3-32bit-1.0.1-17.24.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152791" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1149789" ref_url="https://bugzilla.suse.com/1149789" source="BUGZILLA"/>
		<reference ref_id="1179821" ref_url="https://bugzilla.suse.com/1179821" source="BUGZILLA"/>
		<reference ref_id="1180043" ref_url="https://bugzilla.suse.com/1180043" source="BUGZILLA"/>
		<reference ref_id="1180044" ref_url="https://bugzilla.suse.com/1180044" source="BUGZILLA"/>
		<reference ref_id="1180046" ref_url="https://bugzilla.suse.com/1180046" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-21010" ref_url="https://www.suse.com/security/cve/CVE-2018-21010/" source="CVE"/>
		<reference ref_id="CVE-2020-27824" ref_url="https://www.suse.com/security/cve/CVE-2020-27824/" source="CVE"/>
		<reference ref_id="CVE-2020-27842" ref_url="https://www.suse.com/security/cve/CVE-2020-27842/" source="CVE"/>
		<reference ref_id="CVE-2020-27843" ref_url="https://www.suse.com/security/cve/CVE-2020-27843/" source="CVE"/>
		<reference ref_id="CVE-2020-27845" ref_url="https://www.suse.com/security/cve/CVE-2020-27845/" source="CVE"/>
		<description>
This update for openjpeg2 fixes the following issues:

  - CVE-2018-21010: Fixed heap buffer overflow in color_apply_icc_profile in bin/common/color.c (bsc#1149789).
  - CVE-2020-27824: Fixed OOB read in opj_dwt_calc_explicit_stepsizes() (bsc#1179821).
  - CVE-2020-27842: Fixed null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c (bsc#1180043).
  - CVE-2020-27843: Fixed out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c (bsc#1180044).
  - CVE-2020-27845: Fixed heap-based buffer over-read in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c (bsc#1180046).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2022-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149789">SUSE bug 1149789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179821">SUSE bug 1179821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180043">SUSE bug 1180043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180044">SUSE bug 1180044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180046">SUSE bug 1180046</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-21010/">CVE-2018-21010 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21010">CVE-2018-21010 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27824/">CVE-2020-27824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27824">CVE-2020-27824 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27842/">CVE-2020-27842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27842">CVE-2020-27842 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27843/">CVE-2020-27843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27843">CVE-2020-27843 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27845/">CVE-2020-27845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27845">CVE-2020-27845 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721408" comment="libopenjp2-7-2.1.0-4.18.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721408" comment="libopenjp2-7-2.1.0-4.18.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152792" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1087072" ref_url="https://bugzilla.suse.com/1087072" source="BUGZILLA"/>
		<reference ref_id="1204111" ref_url="https://bugzilla.suse.com/1204111" source="BUGZILLA"/>
		<reference ref_id="1204112" ref_url="https://bugzilla.suse.com/1204112" source="BUGZILLA"/>
		<reference ref_id="1204113" ref_url="https://bugzilla.suse.com/1204113" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42010" ref_url="https://www.suse.com/security/cve/CVE-2022-42010/" source="CVE"/>
		<reference ref_id="CVE-2022-42011" ref_url="https://www.suse.com/security/cve/CVE-2022-42011/" source="CVE"/>
		<reference ref_id="CVE-2022-42012" ref_url="https://www.suse.com/security/cve/CVE-2022-42012/" source="CVE"/>
		<description>
This update for dbus-1 fixes the following issues:

  - CVE-2022-42010: Fixed potential crash that could be triggered by an invalid signature (bsc#1204111).
  - CVE-2022-42011: Fixed an out of bounds read caused by a fixed length array (bsc#1204112).
  - CVE-2022-42012: Fixed a use-after-free that could be trigged by a message in non-native endianness with out-of-band Unix file descriptor (bsc#1204113).

  Bugfixes:

  - Disable asserts (bsc#1087072).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2022-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087072">SUSE bug 1087072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204111">SUSE bug 1204111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204112">SUSE bug 1204112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204113">SUSE bug 1204113</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-42010/">CVE-2022-42010 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42010">CVE-2022-42010 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-42011/">CVE-2022-42011 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42011">CVE-2022-42011 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-42012/">CVE-2022-42012 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42012">CVE-2022-42012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009717584" comment="dbus-1-1.8.22-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717585" comment="dbus-1-x11-1.8.22-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717586" comment="libdbus-1-3-1.8.22-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717583" comment="libdbus-1-3-32bit-1.8.22-29.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009717584" comment="dbus-1-1.8.22-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717585" comment="dbus-1-x11-1.8.22-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717586" comment="libdbus-1-3-1.8.22-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717583" comment="libdbus-1-3-32bit-1.8.22-29.24.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152793" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204690" ref_url="https://bugzilla.suse.com/1204690" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46848" ref_url="https://www.suse.com/security/cve/CVE-2021-46848/" source="CVE"/>
		<description>
This update for libtasn1 fixes the following issues:

- CVE-2021-46848: Fixed off-by-one array size check that affects asn1_encode_simple_der (bsc#1204690). 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-31"/>
	<updated date="2022-10-31"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1204690">SUSE bug 1204690</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46848/">CVE-2021-46848 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46848">CVE-2021-46848 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721409" comment="libtasn1-4.9-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721410" comment="libtasn1-6-4.9-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721404" comment="libtasn1-6-32bit-4.9-3.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721409" comment="libtasn1-4.9-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721410" comment="libtasn1-6-4.9-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721404" comment="libtasn1-6-32bit-4.9-3.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152794" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204412" ref_url="https://bugzilla.suse.com/1204412" source="BUGZILLA"/>
		<reference ref_id="1204416" ref_url="https://bugzilla.suse.com/1204416" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3550" ref_url="https://www.suse.com/security/cve/CVE-2022-3550/" source="CVE"/>
		<reference ref_id="CVE-2022-3551" ref_url="https://www.suse.com/security/cve/CVE-2022-3551/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

  - CVE-2022-3550: Fixed out of bounds read/write in _GetCountedString() (bsc#1204412).
  - CVE-2022-3551: Fixed various leaks of the return value of GetComponentSpec() (bsc#1204416).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-01"/>
	<updated date="2022-11-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204412">SUSE bug 1204412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204416">SUSE bug 1204416</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3550/">CVE-2022-3550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3550">CVE-2022-3550 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3551/">CVE-2022-3551 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3551">CVE-2022-3551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009719030" comment="xorg-x11-server-7.6_1.18.3-76.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719031" comment="xorg-x11-server-extra-7.6_1.18.3-76.52.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009719030" comment="xorg-x11-server-7.6_1.18.3-76.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719031" comment="xorg-x11-server-extra-7.6_1.18.3-76.52.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152795" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203125" ref_url="https://bugzilla.suse.com/1203125" source="BUGZILLA"/>
		<reference ref_id="1204577" ref_url="https://bugzilla.suse.com/1204577" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10735" ref_url="https://www.suse.com/security/cve/CVE-2020-10735/" source="CVE"/>
		<reference ref_id="CVE-2022-37454" ref_url="https://www.suse.com/security/cve/CVE-2022-37454/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2022-37454: Fixed a buffer overflow in hashlib.sha3_* implementations. (bsc#1204577)
- CVE-2020-10735: Fixed a bug to limit amount of digits converting text to int and vice vera. (bsc#1203125)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-03"/>
	<updated date="2022-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203125">SUSE bug 1203125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204577">SUSE bug 1204577</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10735/">CVE-2020-10735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10735">CVE-2020-10735 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37454/">CVE-2022-37454 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37454">CVE-2022-37454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009722818" comment="libpython3_6m1_0-3.6.15-6.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722819" comment="python36-3.6.15-6.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722820" comment="python36-base-3.6.15-6.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722821" comment="python36-curses-3.6.15-6.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722822" comment="python36-dbm-3.6.15-6.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722823" comment="python36-devel-3.6.15-6.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722824" comment="python36-idle-3.6.15-6.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722825" comment="python36-testsuite-3.6.15-6.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722826" comment="python36-tk-3.6.15-6.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722827" comment="python36-tools-3.6.15-6.73.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152796" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204708" ref_url="https://bugzilla.suse.com/1204708" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-43680" ref_url="https://www.suse.com/security/cve/CVE-2022-43680/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

  - CVE-2022-43680: Fixed use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate (bsc#1204708).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-04"/>
	<updated date="2022-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204708">SUSE bug 1204708</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43680/">CVE-2022-43680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43680">CVE-2022-43680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721928" comment="expat-2.1.0-21.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721929" comment="libexpat1-2.1.0-21.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721927" comment="libexpat1-32bit-2.1.0-21.28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721928" comment="expat-2.1.0-21.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721929" comment="libexpat1-2.1.0-21.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721927" comment="libexpat1-32bit-2.1.0-21.28.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152797" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185448" ref_url="https://bugzilla.suse.com/1185448" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3522" ref_url="https://www.suse.com/security/cve/CVE-2021-3522/" source="CVE"/>
		<description>
This update for gstreamer-plugins-base fixes the following issues:

- CVE-2021-3522: Fixed frame size check and potential invalid reads (bsc#1185448).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-08"/>
	<updated date="2022-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185448">SUSE bug 1185448</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3522/">CVE-2021-3522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3522">CVE-2021-3522 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716924" comment="gstreamer-plugins-base-1.8.3-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716874" comment="gstreamer-plugins-base-lang-1.8.3-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716925" comment="libgstallocators-1_0-0-1.8.3-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716926" comment="libgstapp-1_0-0-1.8.3-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716927" comment="libgstapp-1_0-0-32bit-1.8.3-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716928" comment="libgstaudio-1_0-0-1.8.3-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716929" comment="libgstaudio-1_0-0-32bit-1.8.3-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716930" comment="libgstfft-1_0-0-1.8.3-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716931" comment="libgstpbutils-1_0-0-1.8.3-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716932" comment="libgstpbutils-1_0-0-32bit-1.8.3-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716933" comment="libgstriff-1_0-0-1.8.3-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716934" comment="libgstrtp-1_0-0-1.8.3-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716935" comment="libgstrtsp-1_0-0-1.8.3-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716936" comment="libgstsdp-1_0-0-1.8.3-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716937" comment="libgsttag-1_0-0-1.8.3-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716938" comment="libgsttag-1_0-0-32bit-1.8.3-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716939" comment="libgstvideo-1_0-0-1.8.3-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716940" comment="libgstvideo-1_0-0-32bit-1.8.3-13.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152798" version="1" class="patch">
	<metadata>
		<title>Security update for python3-lxml (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184177" ref_url="https://bugzilla.suse.com/1184177" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28957" ref_url="https://www.suse.com/security/cve/CVE-2021-28957/" source="CVE"/>
		<description>
This update for python3-lxml fixes the following issues:

  - CVE-2021-28957: Fixed XSS due to missing input sanitization for HTML5 attributes (bsc#1184177). 

		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-10"/>
	<updated date="2022-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184177">SUSE bug 1184177</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28957/">CVE-2021-28957 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28957">CVE-2021-28957 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717231" comment="python3-lxml-3.3.5-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152799" version="1" class="patch">
	<metadata>
		<title>Security update for rpm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1183543" ref_url="https://bugzilla.suse.com/1183543" source="BUGZILLA"/>
		<reference ref_id="1183545" ref_url="https://bugzilla.suse.com/1183545" source="BUGZILLA"/>
		<reference ref_id="1183632" ref_url="https://bugzilla.suse.com/1183632" source="BUGZILLA"/>
		<reference ref_id="1183659" ref_url="https://bugzilla.suse.com/1183659" source="BUGZILLA"/>
		<reference ref_id="1185299" ref_url="https://bugzilla.suse.com/1185299" source="BUGZILLA"/>
		<reference ref_id="996280" ref_url="https://bugzilla.suse.com/996280" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20266" ref_url="https://www.suse.com/security/cve/CVE-2021-20266/" source="CVE"/>
		<reference ref_id="CVE-2021-20271" ref_url="https://www.suse.com/security/cve/CVE-2021-20271/" source="CVE"/>
		<reference ref_id="CVE-2021-3421" ref_url="https://www.suse.com/security/cve/CVE-2021-3421/" source="CVE"/>
		<description>
This update for rpm fixes the following issues:

- Fixed PGP parsing bugs (bsc#1185299).
- Fixed various format handling bugs (bsc#996280).
- CVE-2021-3421: Fixed vulnerability where unsigned headers could be injected into the rpm database (bsc#1183543). 
- CVE-2021-20271: Fixed vulnerability where a corrupted rpm could corrupt the rpm database (bsc#1183545).
- CVE-2021-20266: Fixed missing bounds check in hdrblobInit (bsc#1183632).

Bugfixes:

- Fixed deadlock when multiple rpm processes tried to acquire the database lock (bsc#1183659).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-10"/>
	<updated date="2022-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183543">SUSE bug 1183543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183545">SUSE bug 1183545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183632">SUSE bug 1183632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183659">SUSE bug 1183659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185299">SUSE bug 1185299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996280">SUSE bug 996280</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20266/">CVE-2021-20266 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20266">CVE-2021-20266 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20271/">CVE-2021-20271 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20271">CVE-2021-20271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3421/">CVE-2021-3421 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3421">CVE-2021-3421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710571" comment="python3-rpm-4.11.2-16.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710572" comment="rpm-4.11.2-16.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710573" comment="rpm-32bit-4.11.2-16.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710574" comment="rpm-build-4.11.2-16.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710575" comment="rpm-python-4.11.2-16.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152800" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202624" ref_url="https://bugzilla.suse.com/1202624" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28861" ref_url="https://www.suse.com/security/cve/CVE-2021-28861/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2021-28861: Fixed an open redirection vulnerability in the HTTP server when an URI path starts with // BaseHTTPServer (bsc#1202624).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-10"/>
	<updated date="2022-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202624">SUSE bug 1202624</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28861/">CVE-2021-28861 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28861">CVE-2021-28861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009724304" comment="libpython2_7-1_0-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724305" comment="libpython2_7-1_0-32bit-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724306" comment="python-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724307" comment="python-32bit-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724308" comment="python-base-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724309" comment="python-base-32bit-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724310" comment="python-curses-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724311" comment="python-demo-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724318" comment="python-devel-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724312" comment="python-doc-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724313" comment="python-doc-pdf-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724314" comment="python-gdbm-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724315" comment="python-idle-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724316" comment="python-tk-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724317" comment="python-xml-2.7.18-28.90.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009724304" comment="libpython2_7-1_0-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724305" comment="libpython2_7-1_0-32bit-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724306" comment="python-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724307" comment="python-32bit-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724308" comment="python-base-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724309" comment="python-base-32bit-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724310" comment="python-curses-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724311" comment="python-demo-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724318" comment="python-devel-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724312" comment="python-doc-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724313" comment="python-doc-pdf-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724314" comment="python-gdbm-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724315" comment="python-idle-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724316" comment="python-tk-2.7.18-28.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724317" comment="python-xml-2.7.18-28.90.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152801" version="1" class="patch">
	<metadata>
		<title>Security update for xterm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1195387" ref_url="https://bugzilla.suse.com/1195387" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24130" ref_url="https://www.suse.com/security/cve/CVE-2022-24130/" source="CVE"/>
		<description>
This update for xterm fixes the following issues:

- CVE-2022-24130: Fixed buffer overflow in set_sixel when Sixel support is enabled. (bsc#1195387)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-11"/>
	<updated date="2022-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195387">SUSE bug 1195387</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24130/">CVE-2022-24130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24130">CVE-2022-24130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719809" comment="xterm-308-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152802" version="1" class="patch">
	<metadata>
		<title>Security update for python-numpy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1053963" ref_url="https://bugzilla.suse.com/1053963" source="BUGZILLA"/>
		<reference ref_id="1199500" ref_url="https://bugzilla.suse.com/1199500" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12852" ref_url="https://www.suse.com/security/cve/CVE-2017-12852/" source="CVE"/>
		<description>
This update for python-numpy fixes the following issues:

  - CVE-2017-12852: Fixed missing input validation leading to infinite loops (bsc#1053963).

  Bugfixes:
  - Use update-alternatives for /usr/bin/f2py (bsc#1199500).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-11"/>
	<updated date="2022-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1053963">SUSE bug 1053963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199500">SUSE bug 1199500</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12852/">CVE-2017-12852 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12852">CVE-2017-12852 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721411" comment="python-numpy-1.8.0-5.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152803" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204482" ref_url="https://bugzilla.suse.com/1204482" source="BUGZILLA"/>
		<reference ref_id="1204485" ref_url="https://bugzilla.suse.com/1204485" source="BUGZILLA"/>
		<reference ref_id="1204487" ref_url="https://bugzilla.suse.com/1204487" source="BUGZILLA"/>
		<reference ref_id="1204488" ref_url="https://bugzilla.suse.com/1204488" source="BUGZILLA"/>
		<reference ref_id="1204489" ref_url="https://bugzilla.suse.com/1204489" source="BUGZILLA"/>
		<reference ref_id="1204490" ref_url="https://bugzilla.suse.com/1204490" source="BUGZILLA"/>
		<reference ref_id="1204494" ref_url="https://bugzilla.suse.com/1204494" source="BUGZILLA"/>
		<reference ref_id="1204496" ref_url="https://bugzilla.suse.com/1204496" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42309" ref_url="https://www.suse.com/security/cve/CVE-2022-42309/" source="CVE"/>
		<reference ref_id="CVE-2022-42310" ref_url="https://www.suse.com/security/cve/CVE-2022-42310/" source="CVE"/>
		<reference ref_id="CVE-2022-42311" ref_url="https://www.suse.com/security/cve/CVE-2022-42311/" source="CVE"/>
		<reference ref_id="CVE-2022-42312" ref_url="https://www.suse.com/security/cve/CVE-2022-42312/" source="CVE"/>
		<reference ref_id="CVE-2022-42313" ref_url="https://www.suse.com/security/cve/CVE-2022-42313/" source="CVE"/>
		<reference ref_id="CVE-2022-42314" ref_url="https://www.suse.com/security/cve/CVE-2022-42314/" source="CVE"/>
		<reference ref_id="CVE-2022-42315" ref_url="https://www.suse.com/security/cve/CVE-2022-42315/" source="CVE"/>
		<reference ref_id="CVE-2022-42316" ref_url="https://www.suse.com/security/cve/CVE-2022-42316/" source="CVE"/>
		<reference ref_id="CVE-2022-42317" ref_url="https://www.suse.com/security/cve/CVE-2022-42317/" source="CVE"/>
		<reference ref_id="CVE-2022-42318" ref_url="https://www.suse.com/security/cve/CVE-2022-42318/" source="CVE"/>
		<reference ref_id="CVE-2022-42319" ref_url="https://www.suse.com/security/cve/CVE-2022-42319/" source="CVE"/>
		<reference ref_id="CVE-2022-42320" ref_url="https://www.suse.com/security/cve/CVE-2022-42320/" source="CVE"/>
		<reference ref_id="CVE-2022-42321" ref_url="https://www.suse.com/security/cve/CVE-2022-42321/" source="CVE"/>
		<reference ref_id="CVE-2022-42322" ref_url="https://www.suse.com/security/cve/CVE-2022-42322/" source="CVE"/>
		<reference ref_id="CVE-2022-42323" ref_url="https://www.suse.com/security/cve/CVE-2022-42323/" source="CVE"/>
		<reference ref_id="CVE-2022-42325" ref_url="https://www.suse.com/security/cve/CVE-2022-42325/" source="CVE"/>
		<reference ref_id="CVE-2022-42326" ref_url="https://www.suse.com/security/cve/CVE-2022-42326/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-42311, CVE-2022-42312, CVE-2022-42313, CVE-2022-42314, CVE-2022-42315, CVE-2022-42316, CVE-2022-42317, CVE-2022-42318: xen: Xenstore: Guests can let xenstored run out of memory (bsc#1204482)
- CVE-2022-42309: xen: Xenstore: Guests can crash xenstored (bsc#1204485)
- CVE-2022-42310: xen: Xenstore: Guests can create orphaned Xenstore nodes (bsc#1204487)
- CVE-2022-42319: xen: Xenstore: Guests can cause Xenstore to not free temporary memory (bsc#1204488)
- CVE-2022-42320: xen: Xenstore: Guests can get access to Xenstore nodes of deleted domains (bsc#1204489)
- CVE-2022-42321: xen: Xenstore: Guests can crash xenstored via exhausting the stack (bsc#1204490)
- CVE-2022-42322,CVE-2022-42323: xen: Xenstore: cooperating guests can create arbitrary numbers of nodes (bsc#1204494)
- CVE-2022-42325,CVE-2022-42326: xen: Xenstore: Guests can create arbitrary number of nodes via transactions (bsc#1204496)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-11"/>
	<updated date="2022-11-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204482">SUSE bug 1204482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204485">SUSE bug 1204485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204487">SUSE bug 1204487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204488">SUSE bug 1204488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204489">SUSE bug 1204489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204490">SUSE bug 1204490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204494">SUSE bug 1204494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204496">SUSE bug 1204496</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42309/">CVE-2022-42309 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42309">CVE-2022-42309 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42310/">CVE-2022-42310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42310">CVE-2022-42310 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42311/">CVE-2022-42311 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42311">CVE-2022-42311 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42312/">CVE-2022-42312 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42312">CVE-2022-42312 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42313/">CVE-2022-42313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42313">CVE-2022-42313 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42314/">CVE-2022-42314 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42314">CVE-2022-42314 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42315/">CVE-2022-42315 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42315">CVE-2022-42315 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42316/">CVE-2022-42316 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42316">CVE-2022-42316 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42317/">CVE-2022-42317 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42317">CVE-2022-42317 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42318/">CVE-2022-42318 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42318">CVE-2022-42318 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42319/">CVE-2022-42319 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42319">CVE-2022-42319 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42320/">CVE-2022-42320 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42320">CVE-2022-42320 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42321/">CVE-2022-42321 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42321">CVE-2022-42321 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42322/">CVE-2022-42322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42322">CVE-2022-42322 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42323/">CVE-2022-42323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42323">CVE-2022-42323 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42325/">CVE-2022-42325 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42325">CVE-2022-42325 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42326/">CVE-2022-42326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42326">CVE-2022-42326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009724758" comment="xen-4.9.4_34-3.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724759" comment="xen-doc-html-4.9.4_34-3.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724760" comment="xen-libs-4.9.4_34-3.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724761" comment="xen-libs-32bit-4.9.4_34-3.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724762" comment="xen-tools-4.9.4_34-3.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724763" comment="xen-tools-domU-4.9.4_34-3.114.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009724758" comment="xen-4.9.4_34-3.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724759" comment="xen-doc-html-4.9.4_34-3.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724760" comment="xen-libs-4.9.4_34-3.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724761" comment="xen-libs-32bit-4.9.4_34-3.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724762" comment="xen-tools-4.9.4_34-3.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724763" comment="xen-tools-domU-4.9.4_34-3.114.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152804" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204422" ref_url="https://bugzilla.suse.com/1204422" source="BUGZILLA"/>
		<reference ref_id="1204425" ref_url="https://bugzilla.suse.com/1204425" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3554" ref_url="https://www.suse.com/security/cve/CVE-2022-3554/" source="CVE"/>
		<reference ref_id="CVE-2022-3555" ref_url="https://www.suse.com/security/cve/CVE-2022-3555/" source="CVE"/>
		<description>
This update for libX11 fixes the following issues:

  - CVE-2022-3554: Fixed memory leak in XRegisterIMInstantiateCallback() (bsc#1204422).
  - CVE-2022-3555: Fixed memory leak in _XFreeX11XCBStructure() (bsc#1204425). 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-15"/>
	<updated date="2022-11-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204422">SUSE bug 1204422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204425">SUSE bug 1204425</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3554/">CVE-2022-3554 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3554">CVE-2022-3554 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3555/">CVE-2022-3555 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3555">CVE-2022-3555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009719038" comment="libX11-6-1.6.2-12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719039" comment="libX11-6-32bit-1.6.2-12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718897" comment="libX11-data-1.6.2-12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719040" comment="libX11-xcb1-1.6.2-12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719041" comment="libX11-xcb1-32bit-1.6.2-12.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152805" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203988" ref_url="https://bugzilla.suse.com/1203988" source="BUGZILLA"/>
		<reference ref_id="1203989" ref_url="https://bugzilla.suse.com/1203989" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2928" ref_url="https://www.suse.com/security/cve/CVE-2022-2928/" source="CVE"/>
		<reference ref_id="CVE-2022-2929" ref_url="https://www.suse.com/security/cve/CVE-2022-2929/" source="CVE"/>
		<description>
This update for dhcp fixes the following issues:

  - CVE-2022-2928: Fixed an option refcount overflow (bsc#1203988).
  - CVE-2022-2929: Fixed a DHCP memory leak (bsc#1203989).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-15"/>
	<updated date="2022-11-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203988">SUSE bug 1203988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203989">SUSE bug 1203989</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2928/">CVE-2022-2928 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2928">CVE-2022-2928 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2929/">CVE-2022-2929 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2929">CVE-2022-2929 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725416" comment="dhcp-4.3.3-10.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725417" comment="dhcp-client-4.3.3-10.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725418" comment="dhcp-relay-4.3.3-10.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725419" comment="dhcp-server-4.3.3-10.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152806" version="1" class="patch">
	<metadata>
		<title>Security update for ant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1171696" ref_url="https://bugzilla.suse.com/1171696" source="BUGZILLA"/>
		<reference ref_id="1177180" ref_url="https://bugzilla.suse.com/1177180" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11979" ref_url="https://www.suse.com/security/cve/CVE-2020-11979/" source="CVE"/>
		<reference ref_id="CVE-2020-1945" ref_url="https://www.suse.com/security/cve/CVE-2020-1945/" source="CVE"/>
		<description>
This update for ant fixes the following issues:

- CVE-2020-1945: Fixed insecure temporary file vulnerability (bsc#1171696).
- CVE-2020-11979: Fixed issue introduced with fix for CVE-2020-1945 (bsc#1177180).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-16"/>
	<updated date="2022-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171696">SUSE bug 1171696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177180">SUSE bug 1177180</bugzilla>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-11979/">CVE-2020-11979 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11979">CVE-2020-11979 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1945/">CVE-2020-1945 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1945">CVE-2020-1945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715622" comment="ant-1.9.4-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152807" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192876" ref_url="https://bugzilla.suse.com/1192876" source="BUGZILLA"/>
		<reference ref_id="1193981" ref_url="https://bugzilla.suse.com/1193981" source="BUGZILLA"/>
		<reference ref_id="1194041" ref_url="https://bugzilla.suse.com/1194041" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3975" ref_url="https://www.suse.com/security/cve/CVE-2021-3975/" source="CVE"/>
		<reference ref_id="CVE-2021-4147" ref_url="https://www.suse.com/security/cve/CVE-2021-4147/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2021-4147: libxl: Fix libvirtd deadlocks and segfaults. (bsc#1194041)
- CVE-2021-3975: Add missing lock in qemuProcessHandleMonitorEOF. (bsc#1192876)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-10"/>
	<updated date="2022-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192876">SUSE bug 1192876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193981">SUSE bug 1193981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194041">SUSE bug 1194041</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3975/">CVE-2021-3975 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3975">CVE-2021-3975 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4147/">CVE-2021-4147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4147">CVE-2021-4147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662251" comment="libvirt-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662252" comment="libvirt-admin-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662253" comment="libvirt-client-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662254" comment="libvirt-daemon-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662255" comment="libvirt-daemon-config-network-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662256" comment="libvirt-daemon-config-nwfilter-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662257" comment="libvirt-daemon-driver-interface-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662170" comment="libvirt-daemon-driver-libxl-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662258" comment="libvirt-daemon-driver-lxc-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662259" comment="libvirt-daemon-driver-network-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662260" comment="libvirt-daemon-driver-nodedev-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662261" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662262" comment="libvirt-daemon-driver-qemu-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662263" comment="libvirt-daemon-driver-secret-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662264" comment="libvirt-daemon-driver-storage-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662265" comment="libvirt-daemon-driver-storage-core-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662266" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662267" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662268" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662269" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662183" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662270" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662271" comment="libvirt-daemon-hooks-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662272" comment="libvirt-daemon-lxc-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662273" comment="libvirt-daemon-qemu-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662188" comment="libvirt-daemon-xen-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662274" comment="libvirt-doc-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662275" comment="libvirt-libs-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662276" comment="libvirt-lock-sanlock-3.3.0-5.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662277" comment="libvirt-nss-3.3.0-5.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152808" version="1" class="patch">
	<metadata>
		<title>Security update for python36 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<description>
This update for python36 fixes the following issues:

- Update list of already merged patches.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-21"/>
	<updated date="2022-11-21"/>
	<severity>Low</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725594" comment="libpython3_6m1_0-3.6.15-6.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725595" comment="python36-3.6.15-6.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725596" comment="python36-base-3.6.15-6.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725597" comment="python36-curses-3.6.15-6.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725598" comment="python36-dbm-3.6.15-6.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725599" comment="python36-devel-3.6.15-6.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725600" comment="python36-idle-3.6.15-6.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725601" comment="python36-testsuite-3.6.15-6.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725602" comment="python36-tk-3.6.15-6.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725603" comment="python36-tools-3.6.15-6.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152809" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205178" ref_url="https://bugzilla.suse.com/1205178" source="BUGZILLA"/>
		<reference ref_id="1205182" ref_url="https://bugzilla.suse.com/1205182" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2601" ref_url="https://www.suse.com/security/cve/CVE-2022-2601/" source="CVE"/>
		<reference ref_id="CVE-2022-3775" ref_url="https://www.suse.com/security/cve/CVE-2022-3775/" source="CVE"/>
		<description>
This update for grub2 fixes the following issues:

Security Fixes:
    
- CVE-2022-2601: Fixed buffer overflow in grub_font_construct_glyph (bsc#1205178).
- CVE-2022-3775: Fixed integer underflow in blit_comb() (bsc#1205182).
    
Other:

- Bump upstream SBAT generation to 3
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-21"/>
	<updated date="2022-11-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205178">SUSE bug 1205178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205182">SUSE bug 1205182</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2601/">CVE-2022-2601 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2601">CVE-2022-2601 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3775/">CVE-2022-3775 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3775">CVE-2022-3775 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726355" comment="grub2-2.02-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726356" comment="grub2-i386-pc-2.02-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726357" comment="grub2-snapper-plugin-2.02-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726358" comment="grub2-systemd-sleep-plugin-2.02-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726359" comment="grub2-x86_64-efi-2.02-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726360" comment="grub2-x86_64-xen-2.02-142.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726355" comment="grub2-2.02-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726356" comment="grub2-i386-pc-2.02-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726357" comment="grub2-snapper-plugin-2.02-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726358" comment="grub2-systemd-sleep-plugin-2.02-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726359" comment="grub2-x86_64-efi-2.02-142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726360" comment="grub2-x86_64-xen-2.02-142.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152810" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203556" ref_url="https://bugzilla.suse.com/1203556" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40617" ref_url="https://www.suse.com/security/cve/CVE-2022-40617/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2022-40617: Fixed that using untrusted URIs for revocation checking could lead to denial of service (bsc#1203556)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-22"/>
	<updated date="2022-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203556">SUSE bug 1203556</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40617/">CVE-2022-40617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40617">CVE-2022-40617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726585" comment="strongswan-5.1.3-26.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726500" comment="strongswan-doc-5.1.3-26.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726586" comment="strongswan-hmac-5.1.3-26.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726587" comment="strongswan-ipsec-5.1.3-26.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726588" comment="strongswan-libs0-5.1.3-26.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152811" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205629" ref_url="https://bugzilla.suse.com/1205629" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-36227" ref_url="https://www.suse.com/security/cve/CVE-2022-36227/" source="CVE"/>
		<description>
This update for libarchive fixes the following issues:

- CVE-2022-36227: Fixed potential NULL pointer dereference in __archive_write_allocate_filter() (bsc#1205629).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-22"/>
	<updated date="2022-11-22"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1205629">SUSE bug 1205629</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-36227/">CVE-2022-36227 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36227">CVE-2022-36227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726589" comment="libarchive13-3.3.3-26.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152812" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204918" ref_url="https://bugzilla.suse.com/1204918" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42252" ref_url="https://www.suse.com/security/cve/CVE-2022-42252/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2022-42252: Fixed a request smuggling (bsc#1204918).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-23"/>
	<updated date="2022-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204918">SUSE bug 1204918</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42252/">CVE-2022-42252 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42252">CVE-2022-42252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726575" comment="tomcat-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726576" comment="tomcat-admin-webapps-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726577" comment="tomcat-docs-webapp-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726578" comment="tomcat-el-3_0-api-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726579" comment="tomcat-javadoc-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726580" comment="tomcat-jsp-2_3-api-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726581" comment="tomcat-lib-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726582" comment="tomcat-servlet-3_1-api-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726583" comment="tomcat-webapps-8.0.53-29.57.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726575" comment="tomcat-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726576" comment="tomcat-admin-webapps-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726577" comment="tomcat-docs-webapp-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726578" comment="tomcat-el-3_0-api-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726579" comment="tomcat-javadoc-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726580" comment="tomcat-jsp-2_3-api-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726581" comment="tomcat-lib-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726582" comment="tomcat-servlet-3_1-api-8.0.53-29.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726583" comment="tomcat-webapps-8.0.53-29.57.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152813" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197998" ref_url="https://bugzilla.suse.com/1197998" source="BUGZILLA"/>
		<reference ref_id="1203201" ref_url="https://bugzilla.suse.com/1203201" source="BUGZILLA"/>
		<reference ref_id="1204986" ref_url="https://bugzilla.suse.com/1204986" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-43995" ref_url="https://www.suse.com/security/cve/CVE-2022-43995/" source="CVE"/>
		<description>
This update for sudo fixes the following issues:
  
Security fixes:

- CVE-2022-43995: Fixed a potential heap-based buffer over-read when entering a password of seven characters or fewer and using the crypt() password backend (bsc#1204986).

Other:
    
- Make sure SIGCHLD is not ignored when sudo is executed; fixes race condition (bsc#1203201).
- Change sudo-ldap schema from ASCII to UTF8 (bsc#1197998).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-28"/>
	<updated date="2022-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197998">SUSE bug 1197998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203201">SUSE bug 1203201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204986">SUSE bug 1204986</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-43995/">CVE-2022-43995 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43995">CVE-2022-43995 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726584" comment="sudo-1.8.20p2-3.33.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726584" comment="sudo-1.8.20p2-3.33.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152814" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205270" ref_url="https://bugzilla.suse.com/1205270" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45403" ref_url="https://www.suse.com/security/cve/CVE-2022-45403/" source="CVE"/>
		<reference ref_id="CVE-2022-45404" ref_url="https://www.suse.com/security/cve/CVE-2022-45404/" source="CVE"/>
		<reference ref_id="CVE-2022-45405" ref_url="https://www.suse.com/security/cve/CVE-2022-45405/" source="CVE"/>
		<reference ref_id="CVE-2022-45406" ref_url="https://www.suse.com/security/cve/CVE-2022-45406/" source="CVE"/>
		<reference ref_id="CVE-2022-45408" ref_url="https://www.suse.com/security/cve/CVE-2022-45408/" source="CVE"/>
		<reference ref_id="CVE-2022-45409" ref_url="https://www.suse.com/security/cve/CVE-2022-45409/" source="CVE"/>
		<reference ref_id="CVE-2022-45410" ref_url="https://www.suse.com/security/cve/CVE-2022-45410/" source="CVE"/>
		<reference ref_id="CVE-2022-45411" ref_url="https://www.suse.com/security/cve/CVE-2022-45411/" source="CVE"/>
		<reference ref_id="CVE-2022-45412" ref_url="https://www.suse.com/security/cve/CVE-2022-45412/" source="CVE"/>
		<reference ref_id="CVE-2022-45416" ref_url="https://www.suse.com/security/cve/CVE-2022-45416/" source="CVE"/>
		<reference ref_id="CVE-2022-45418" ref_url="https://www.suse.com/security/cve/CVE-2022-45418/" source="CVE"/>
		<reference ref_id="CVE-2022-45420" ref_url="https://www.suse.com/security/cve/CVE-2022-45420/" source="CVE"/>
		<reference ref_id="CVE-2022-45421" ref_url="https://www.suse.com/security/cve/CVE-2022-45421/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 102.5.0 ESR (MFSA 2022-48, bsc#1205270):

- CVE-2022-45403: Service Workers might have learned size of cross-origin media files
- CVE-2022-45404: Fullscreen notification bypass
- CVE-2022-45405: Use-after-free in InputStream implementation
- CVE-2022-45406: Use-after-free of a JavaScript Realm
- CVE-2022-45408: Fullscreen notification bypass via windowName
- CVE-2022-45409: Use-after-free in Garbage Collection
- CVE-2022-45410: ServiceWorker-intercepted requests bypassed SameSite cookie policy
- CVE-2022-45411: Cross-Site Tracing was possible via non-standard override headers
- CVE-2022-45412: Symlinks may resolve to partially uninitialized buffers
- CVE-2022-45416: Keystroke Side-Channel Leakage
- CVE-2022-45418: Custom mouse cursor could have been drawn over browser UI
- CVE-2022-45420: Iframe contents could be rendered outside the iframe
- CVE-2022-45421: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-28"/>
	<updated date="2022-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45403/">CVE-2022-45403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45403">CVE-2022-45403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45404/">CVE-2022-45404 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45404">CVE-2022-45404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45405/">CVE-2022-45405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45405">CVE-2022-45405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45406/">CVE-2022-45406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45406">CVE-2022-45406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45408/">CVE-2022-45408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45408">CVE-2022-45408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45409/">CVE-2022-45409 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45409">CVE-2022-45409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45410/">CVE-2022-45410 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45410">CVE-2022-45410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45411/">CVE-2022-45411 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45411">CVE-2022-45411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45412/">CVE-2022-45412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45412">CVE-2022-45412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45416/">CVE-2022-45416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45416">CVE-2022-45416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45418/">CVE-2022-45418 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45418">CVE-2022-45418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45420/">CVE-2022-45420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45420">CVE-2022-45420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45421/">CVE-2022-45421 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45421">CVE-2022-45421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725294" comment="MozillaFirefox-102.5.0-112.139.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725295" comment="MozillaFirefox-devel-102.5.0-112.139.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725296" comment="MozillaFirefox-translations-common-102.5.0-112.139.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725294" comment="MozillaFirefox-102.5.0-112.139.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725295" comment="MozillaFirefox-devel-102.5.0-112.139.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725296" comment="MozillaFirefox-translations-common-102.5.0-112.139.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152815" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204641" ref_url="https://bugzilla.suse.com/1204641" source="BUGZILLA"/>
		<reference ref_id="1204643" ref_url="https://bugzilla.suse.com/1204643" source="BUGZILLA"/>
		<reference ref_id="1204644" ref_url="https://bugzilla.suse.com/1204644" source="BUGZILLA"/>
		<reference ref_id="1204645" ref_url="https://bugzilla.suse.com/1204645" source="BUGZILLA"/>
		<reference ref_id="1205392" ref_url="https://bugzilla.suse.com/1205392" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3597" ref_url="https://www.suse.com/security/cve/CVE-2022-3597/" source="CVE"/>
		<reference ref_id="CVE-2022-3599" ref_url="https://www.suse.com/security/cve/CVE-2022-3599/" source="CVE"/>
		<reference ref_id="CVE-2022-3626" ref_url="https://www.suse.com/security/cve/CVE-2022-3626/" source="CVE"/>
		<reference ref_id="CVE-2022-3627" ref_url="https://www.suse.com/security/cve/CVE-2022-3627/" source="CVE"/>
		<reference ref_id="CVE-2022-3970" ref_url="https://www.suse.com/security/cve/CVE-2022-3970/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2022-3597: Fixed out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c (bnc#1204641).
- CVE-2022-3599: Fixed out-of-bounds read in writeSingleSection in tools/tiffcrop.c (bnc#1204643).
- CVE-2022-3626: Fixed out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c (bnc#1204644)
- CVE-2022-3627: Fixed out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c (bnc#1204645).
- CVE-2022-3970: Fixed unsigned integer overflow in TIFFReadRGBATileExt() (bnc#1205392).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-28"/>
	<updated date="2022-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204641">SUSE bug 1204641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204643">SUSE bug 1204643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204644">SUSE bug 1204644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204645">SUSE bug 1204645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205392">SUSE bug 1205392</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3597/">CVE-2022-3597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3597">CVE-2022-3597 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3599/">CVE-2022-3599 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3599">CVE-2022-3599 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3626/">CVE-2022-3626 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3626">CVE-2022-3626 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3627/">CVE-2022-3627 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3627">CVE-2022-3627 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3970/">CVE-2022-3970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3970">CVE-2022-3970 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725583" comment="libtiff5-4.0.9-44.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725575" comment="libtiff5-32bit-4.0.9-44.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725584" comment="tiff-4.0.9-44.59.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725583" comment="libtiff5-4.0.9-44.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725575" comment="libtiff5-32bit-4.0.9-44.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725584" comment="tiff-4.0.9-44.59.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152816" version="1" class="patch">
	<metadata>
		<title>Security update for pixman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205033" ref_url="https://bugzilla.suse.com/1205033" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-44638" ref_url="https://www.suse.com/security/cve/CVE-2022-44638/" source="CVE"/>
		<description>
This update for pixman fixes the following issues:
  
- CVE-2022-44638: Fixed an integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write (bsc#1205033).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-28"/>
	<updated date="2022-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205033">SUSE bug 1205033</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-44638/">CVE-2022-44638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44638">CVE-2022-44638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725088" comment="libpixman-1-0-0.34.0-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725083" comment="libpixman-1-0-32bit-0.34.0-8.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725088" comment="libpixman-1-0-0.34.0-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725083" comment="libpixman-1-0-32bit-0.34.0-8.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152817" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203125" ref_url="https://bugzilla.suse.com/1203125" source="BUGZILLA"/>
		<reference ref_id="1205244" ref_url="https://bugzilla.suse.com/1205244" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10735" ref_url="https://www.suse.com/security/cve/CVE-2020-10735/" source="CVE"/>
		<reference ref_id="CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2020-10735: Fixed possible DoS when converting text to int and vice versa (bsc#1203125).
- CVE-2022-45061: Fixed possible DoS when IDNA decoding extremely long domain names (bsc#1205244).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-28"/>
	<updated date="2022-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203125">SUSE bug 1203125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205244">SUSE bug 1205244</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10735/">CVE-2020-10735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10735">CVE-2020-10735 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725084" comment="libpython3_4m1_0-3.4.10-25.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725085" comment="python3-3.4.10-25.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725086" comment="python3-base-3.4.10-25.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725087" comment="python3-curses-3.4.10-25.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725089" comment="python3-devel-3.4.10-25.102.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725084" comment="libpython3_4m1_0-3.4.10-25.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725085" comment="python3-3.4.10-25.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725086" comment="python3-base-3.4.10-25.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725087" comment="python3-curses-3.4.10-25.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725089" comment="python3-devel-3.4.10-25.102.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152818" version="1" class="patch">
	<metadata>
		<title>Security update for exiv2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1119562" ref_url="https://bugzilla.suse.com/1119562" source="BUGZILLA"/>
		<reference ref_id="1142681" ref_url="https://bugzilla.suse.com/1142681" source="BUGZILLA"/>
		<reference ref_id="1185002" ref_url="https://bugzilla.suse.com/1185002" source="BUGZILLA"/>
		<reference ref_id="1186231" ref_url="https://bugzilla.suse.com/1186231" source="BUGZILLA"/>
		<reference ref_id="1188733" ref_url="https://bugzilla.suse.com/1188733" source="BUGZILLA"/>
		<reference ref_id="1189332" ref_url="https://bugzilla.suse.com/1189332" source="BUGZILLA"/>
		<reference ref_id="1189337" ref_url="https://bugzilla.suse.com/1189337" source="BUGZILLA"/>
		<reference ref_id="1189338" ref_url="https://bugzilla.suse.com/1189338" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20097" ref_url="https://www.suse.com/security/cve/CVE-2018-20097/" source="CVE"/>
		<reference ref_id="CVE-2019-13112" ref_url="https://www.suse.com/security/cve/CVE-2019-13112/" source="CVE"/>
		<reference ref_id="CVE-2021-29457" ref_url="https://www.suse.com/security/cve/CVE-2021-29457/" source="CVE"/>
		<reference ref_id="CVE-2021-29473" ref_url="https://www.suse.com/security/cve/CVE-2021-29473/" source="CVE"/>
		<reference ref_id="CVE-2021-31291" ref_url="https://www.suse.com/security/cve/CVE-2021-31291/" source="CVE"/>
		<reference ref_id="CVE-2021-32815" ref_url="https://www.suse.com/security/cve/CVE-2021-32815/" source="CVE"/>
		<reference ref_id="CVE-2021-34334" ref_url="https://www.suse.com/security/cve/CVE-2021-34334/" source="CVE"/>
		<reference ref_id="CVE-2021-37620" ref_url="https://www.suse.com/security/cve/CVE-2021-37620/" source="CVE"/>
		<description>
This update for exiv2 fixes the following issues:

- CVE-2019-13112: Fixed an uncontrolled memory allocation in PngChunk:parseChunkContent causing denial of service. (bsc#1142681)
- CVE-2021-37620: Fixed out-of-bounds read in XmpTextValue:read(). (bsc#1189332)
- CVE-2021-34334: Fixed a DoS due to integer overflow in loop counter. (bsc#1189338)
- CVE-2021-31291: Fixed a heap-based buffer overflow vulnerability in jp2image.cpp may lead to a denial of service via crafted metadata (bsc#1188733).
- CVE-2021-32815: Fixed a deny-of-service due to assertion failure in crwimage_int.cpp (bsc#1189337).
- CVE-2018-20097: Fixed SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroupsu (bsc#1119562).
- CVE-2021-29457: Fixed a heap buffer overflow when write metadata into a crafted image file (bsc#1185002).
- CVE-2021-29473: Fixed out-of-bounds read in Exiv2::Jp2Image:doWriteMetadata (bsc#1186231).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-28"/>
	<updated date="2022-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119562">SUSE bug 1119562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142681">SUSE bug 1142681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185002">SUSE bug 1185002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186231">SUSE bug 1186231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188733">SUSE bug 1188733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189332">SUSE bug 1189332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189337">SUSE bug 1189337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189338">SUSE bug 1189338</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20097/">CVE-2018-20097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20097">CVE-2018-20097 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13112/">CVE-2019-13112 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13112">CVE-2019-13112 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29457/">CVE-2021-29457 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29457">CVE-2021-29457 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29473/">CVE-2021-29473 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29473">CVE-2021-29473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31291/">CVE-2021-31291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-31291">CVE-2021-31291 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32815/">CVE-2021-32815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32815">CVE-2021-32815 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34334/">CVE-2021-34334 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34334">CVE-2021-34334 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-37620/">CVE-2021-37620 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37620">CVE-2021-37620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725415" comment="libexiv2-12-0.23-12.18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725415" comment="libexiv2-12-0.23-12.18.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152819" version="1" class="patch">
	<metadata>
		<title>Security update for busybox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1029961" ref_url="https://bugzilla.suse.com/1029961" source="BUGZILLA"/>
		<reference ref_id="1064976" ref_url="https://bugzilla.suse.com/1064976" source="BUGZILLA"/>
		<reference ref_id="1064978" ref_url="https://bugzilla.suse.com/1064978" source="BUGZILLA"/>
		<reference ref_id="1069412" ref_url="https://bugzilla.suse.com/1069412" source="BUGZILLA"/>
		<reference ref_id="1099260" ref_url="https://bugzilla.suse.com/1099260" source="BUGZILLA"/>
		<reference ref_id="1099263" ref_url="https://bugzilla.suse.com/1099263" source="BUGZILLA"/>
		<reference ref_id="1102912" ref_url="https://bugzilla.suse.com/1102912" source="BUGZILLA"/>
		<reference ref_id="1121426" ref_url="https://bugzilla.suse.com/1121426" source="BUGZILLA"/>
		<reference ref_id="1121428" ref_url="https://bugzilla.suse.com/1121428" source="BUGZILLA"/>
		<reference ref_id="1184522" ref_url="https://bugzilla.suse.com/1184522" source="BUGZILLA"/>
		<reference ref_id="1191514" ref_url="https://bugzilla.suse.com/1191514" source="BUGZILLA"/>
		<reference ref_id="1192869" ref_url="https://bugzilla.suse.com/1192869" source="BUGZILLA"/>
		<reference ref_id="914660" ref_url="https://bugzilla.suse.com/914660" source="BUGZILLA"/>
		<reference ref_id="951562" ref_url="https://bugzilla.suse.com/951562" source="BUGZILLA"/>
		<reference ref_id="970662" ref_url="https://bugzilla.suse.com/970662" source="BUGZILLA"/>
		<reference ref_id="970663" ref_url="https://bugzilla.suse.com/970663" source="BUGZILLA"/>
		<reference ref_id="991940" ref_url="https://bugzilla.suse.com/991940" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-5325" ref_url="https://www.suse.com/security/cve/CVE-2011-5325/" source="CVE"/>
		<reference ref_id="CVE-2014-9645" ref_url="https://www.suse.com/security/cve/CVE-2014-9645/" source="CVE"/>
		<reference ref_id="CVE-2015-9261" ref_url="https://www.suse.com/security/cve/CVE-2015-9261/" source="CVE"/>
		<reference ref_id="CVE-2016-2147" ref_url="https://www.suse.com/security/cve/CVE-2016-2147/" source="CVE"/>
		<reference ref_id="CVE-2016-2148" ref_url="https://www.suse.com/security/cve/CVE-2016-2148/" source="CVE"/>
		<reference ref_id="CVE-2016-6301" ref_url="https://www.suse.com/security/cve/CVE-2016-6301/" source="CVE"/>
		<reference ref_id="CVE-2017-15873" ref_url="https://www.suse.com/security/cve/CVE-2017-15873/" source="CVE"/>
		<reference ref_id="CVE-2017-15874" ref_url="https://www.suse.com/security/cve/CVE-2017-15874/" source="CVE"/>
		<reference ref_id="CVE-2017-16544" ref_url="https://www.suse.com/security/cve/CVE-2017-16544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000500" ref_url="https://www.suse.com/security/cve/CVE-2018-1000500/" source="CVE"/>
		<reference ref_id="CVE-2018-1000517" ref_url="https://www.suse.com/security/cve/CVE-2018-1000517/" source="CVE"/>
		<reference ref_id="CVE-2018-20679" ref_url="https://www.suse.com/security/cve/CVE-2018-20679/" source="CVE"/>
		<reference ref_id="CVE-2019-5747" ref_url="https://www.suse.com/security/cve/CVE-2019-5747/" source="CVE"/>
		<reference ref_id="CVE-2021-28831" ref_url="https://www.suse.com/security/cve/CVE-2021-28831/" source="CVE"/>
		<reference ref_id="CVE-2021-42373" ref_url="https://www.suse.com/security/cve/CVE-2021-42373/" source="CVE"/>
		<reference ref_id="CVE-2021-42374" ref_url="https://www.suse.com/security/cve/CVE-2021-42374/" source="CVE"/>
		<reference ref_id="CVE-2021-42375" ref_url="https://www.suse.com/security/cve/CVE-2021-42375/" source="CVE"/>
		<reference ref_id="CVE-2021-42376" ref_url="https://www.suse.com/security/cve/CVE-2021-42376/" source="CVE"/>
		<reference ref_id="CVE-2021-42377" ref_url="https://www.suse.com/security/cve/CVE-2021-42377/" source="CVE"/>
		<reference ref_id="CVE-2021-42378" ref_url="https://www.suse.com/security/cve/CVE-2021-42378/" source="CVE"/>
		<reference ref_id="CVE-2021-42379" ref_url="https://www.suse.com/security/cve/CVE-2021-42379/" source="CVE"/>
		<reference ref_id="CVE-2021-42380" ref_url="https://www.suse.com/security/cve/CVE-2021-42380/" source="CVE"/>
		<reference ref_id="CVE-2021-42381" ref_url="https://www.suse.com/security/cve/CVE-2021-42381/" source="CVE"/>
		<reference ref_id="CVE-2021-42382" ref_url="https://www.suse.com/security/cve/CVE-2021-42382/" source="CVE"/>
		<reference ref_id="CVE-2021-42383" ref_url="https://www.suse.com/security/cve/CVE-2021-42383/" source="CVE"/>
		<reference ref_id="CVE-2021-42384" ref_url="https://www.suse.com/security/cve/CVE-2021-42384/" source="CVE"/>
		<reference ref_id="CVE-2021-42385" ref_url="https://www.suse.com/security/cve/CVE-2021-42385/" source="CVE"/>
		<reference ref_id="CVE-2021-42386" ref_url="https://www.suse.com/security/cve/CVE-2021-42386/" source="CVE"/>
		<description>
This update for busybox fixes the following issues:

- CVE-2014-9645: Fixed loading of unwanted modules with / (bsc#914660).
- CVE-2017-16544: Fixed insufficient sanitization of filenames when autocompleting  (bsc#1069412).
- CVE-2015-9261: Fixed huft_build misuses a pointer, causing segfaults (bsc#1102912).
- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).
- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).
- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).
- CVE-2017-15873: Fixed integer overflow in  get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).
- CVE-2017-15874: Fixed integer overflow in archival/libarchive/decompress_unlzma (bsc#1064978).
- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).
- CVE-2021-42373, CVE-2021-42374, CVE-2021-42375, CVE-2021-42376, CVE-2021-42377, CVE-2021-42378, CVE-2021-42379, CVE-2021-42380, CVE-2021-42381, CVE-2021-42382, CVE-2021-42383, CVE-2021-42384, CVE-2021-42385, CVE-2021-42386: v1.34.0 bugfixes (bsc#1192869).
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).
- CVE-2018-1000500: Fixed missing SSL certificate validation in wget (bsc#1099263).
  
- Update to 1.35.0
  - awk: fix printf %%, fix read beyond end of buffer
  - chrt: silence analyzer warning
  - libarchive: remove duplicate forward declaration
  - mount: 'mount -o rw ....' should not fall back to RO mount
  - ps: fix -o pid=PID,args interpreting entire 'PID,args' as header
  - tar: prevent malicious archives with long name sizes causing OOM
  - udhcpc6: fix udhcp_find_option to actually find DHCP6 options
  - xxd: fix -p -r
  - support for new optoins added to basename, cpio, date, find, 
    mktemp, wget and others

- Enable fdisk (jsc#CAR-16)

- Update to 1.34.1:
  * build system: use SOURCE_DATE_EPOCH for timestamp if available
  * many bug fixes and new features
  * touch: make FEATURE_TOUCH_NODEREF unconditional
  
- update to 1.33.1:
  * httpd: fix sendfile
  * ash: fix HISTFILE corruptio
  * ash: fix unset variable pattern expansion
  * traceroute: fix option parsing
  * gunzip: fix for archive corruption

- Update to version 1.33.0
  - many bug fixes and new features

- Update to version 1.32.1
  - fixes a case where in ash, 'wait' never finishes. 

- prepare usrmerge (bsc#1029961)

- Enable testsuite and package it for later rerun (for QA, jsc#CAR-15)

- Update to version 1.31.1:
  + Bug fix release. 1.30.1 has fixes for dc, ash (PS1 expansion
    fix), hush, dpkg-deb, telnet and wget.
- Changes from version 1.31.0:
  + many bugfixes and new features.
- Add busybox-no-stime.patch: stime() has been deprecated in glibc
  2.31 and replaced with clock_settime().

- update to 1.25.1:
  * fixes for hush, gunzip, ip route, ntpd
- includes changes from 1.25.0:
  * many added and expanded implementations of command options
- includes changes from 1.24.2:
  * fixes for build system (static build with glibc fixed),
    truncate, gunzip and unzip. 

- Update to version 1.24.1
  * for a full list of changes see http://www.busybox.net/news.html
- Refresh busybox.install.patch 

- Update to 1.23.2
  * for a full list of changes see http://www.busybox.net/news.html
- Cleaned up spec file with spec-cleaner
- Refreshed patches

- update to 1.22.1:
  Many updates and fixes for most included tools, see
  see http://www.busybox.net/news.html
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-28"/>
	<updated date="2022-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1029961">SUSE bug 1029961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064976">SUSE bug 1064976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064978">SUSE bug 1064978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069412">SUSE bug 1069412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099260">SUSE bug 1099260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099263">SUSE bug 1099263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102912">SUSE bug 1102912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121426">SUSE bug 1121426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121428">SUSE bug 1121428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184522">SUSE bug 1184522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191514">SUSE bug 1191514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192869">SUSE bug 1192869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914660">SUSE bug 914660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951562">SUSE bug 951562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970662">SUSE bug 970662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970663">SUSE bug 970663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991940">SUSE bug 991940</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5325/">CVE-2011-5325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2011-5325">CVE-2011-5325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9645/">CVE-2014-9645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9645">CVE-2014-9645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9261/">CVE-2015-9261 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9261">CVE-2015-9261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2147/">CVE-2016-2147 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2147">CVE-2016-2147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2148/">CVE-2016-2148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2148">CVE-2016-2148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6301/">CVE-2016-6301 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6301">CVE-2016-6301 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15873/">CVE-2017-15873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15873">CVE-2017-15873 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15874/">CVE-2017-15874 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15874">CVE-2017-15874 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16544/">CVE-2017-16544 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16544">CVE-2017-16544 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000500/">CVE-2018-1000500 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000500">CVE-2018-1000500 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000517/">CVE-2018-1000517 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000517">CVE-2018-1000517 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20679/">CVE-2018-20679 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20679">CVE-2018-20679 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5747/">CVE-2019-5747 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5747">CVE-2019-5747 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28831/">CVE-2021-28831 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28831">CVE-2021-28831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42373/">CVE-2021-42373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42373">CVE-2021-42373 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42374/">CVE-2021-42374 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42374">CVE-2021-42374 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42375/">CVE-2021-42375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42375">CVE-2021-42375 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42376/">CVE-2021-42376 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42376">CVE-2021-42376 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42377/">CVE-2021-42377 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42377">CVE-2021-42377 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42378/">CVE-2021-42378 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42378">CVE-2021-42378 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42379/">CVE-2021-42379 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42379">CVE-2021-42379 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42380/">CVE-2021-42380 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42380">CVE-2021-42380 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42381/">CVE-2021-42381 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42381">CVE-2021-42381 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42382/">CVE-2021-42382 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42382">CVE-2021-42382 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42383/">CVE-2021-42383 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42383">CVE-2021-42383 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42384/">CVE-2021-42384 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42384">CVE-2021-42384 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42385/">CVE-2021-42385 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42385">CVE-2021-42385 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42386/">CVE-2021-42386 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42386">CVE-2021-42386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726003" comment="busybox-1.35.0-4.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726003" comment="busybox-1.35.0-4.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152820" version="1" class="patch">
	<metadata>
		<title>Security update for git (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204455" ref_url="https://bugzilla.suse.com/1204455" source="BUGZILLA"/>
		<reference ref_id="1204456" ref_url="https://bugzilla.suse.com/1204456" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-39253" ref_url="https://www.suse.com/security/cve/CVE-2022-39253/" source="CVE"/>
		<reference ref_id="CVE-2022-39260" ref_url="https://www.suse.com/security/cve/CVE-2022-39260/" source="CVE"/>
		<description>
This update for git fixes the following issues:

  - CVE-2022-39260: Fixed overflow in split_cmdline() (bsc#1204456).
  - CVE-2022-39253: Fixed dereference issue with symbolic links via the `--local` clone mechanism (bsc#1204455).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2022-11-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204455">SUSE bug 1204455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204456">SUSE bug 1204456</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39253/">CVE-2022-39253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39253">CVE-2022-39253 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-39260/">CVE-2022-39260 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39260">CVE-2022-39260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009720754" comment="git-2.26.2-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720755" comment="git-core-2.26.2-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720756" comment="git-cvs-2.26.2-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720757" comment="git-daemon-2.26.2-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720758" comment="git-email-2.26.2-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720759" comment="git-gui-2.26.2-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720760" comment="git-svn-2.26.2-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720761" comment="git-web-2.26.2-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720762" comment="gitk-2.26.2-27.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152821" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1142579" ref_url="https://bugzilla.suse.com/1142579" source="BUGZILLA"/>
		<reference ref_id="1185597" ref_url="https://bugzilla.suse.com/1185597" source="BUGZILLA"/>
		<reference ref_id="1185712" ref_url="https://bugzilla.suse.com/1185712" source="BUGZILLA"/>
		<reference ref_id="1188374" ref_url="https://bugzilla.suse.com/1188374" source="BUGZILLA"/>
		<reference ref_id="1191473" ref_url="https://bugzilla.suse.com/1191473" source="BUGZILLA"/>
		<reference ref_id="1191908" ref_url="https://bugzilla.suse.com/1191908" source="BUGZILLA"/>
		<reference ref_id="1193929" ref_url="https://bugzilla.suse.com/1193929" source="BUGZILLA"/>
		<reference ref_id="1194783" ref_url="https://bugzilla.suse.com/1194783" source="BUGZILLA"/>
		<reference ref_id="1197592" ref_url="https://bugzilla.suse.com/1197592" source="BUGZILLA"/>
		<reference ref_id="1198237" ref_url="https://bugzilla.suse.com/1198237" source="BUGZILLA"/>
		<reference ref_id="1198458" ref_url="https://bugzilla.suse.com/1198458" source="BUGZILLA"/>
		<reference ref_id="1202816" ref_url="https://bugzilla.suse.com/1202816" source="BUGZILLA"/>
		<reference ref_id="1202966" ref_url="https://bugzilla.suse.com/1202966" source="BUGZILLA"/>
		<reference ref_id="1202967" ref_url="https://bugzilla.suse.com/1202967" source="BUGZILLA"/>
		<reference ref_id="1202969" ref_url="https://bugzilla.suse.com/1202969" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010204" ref_url="https://www.suse.com/security/cve/CVE-2019-1010204/" source="CVE"/>
		<reference ref_id="CVE-2021-3530" ref_url="https://www.suse.com/security/cve/CVE-2021-3530/" source="CVE"/>
		<reference ref_id="CVE-2021-3648" ref_url="https://www.suse.com/security/cve/CVE-2021-3648/" source="CVE"/>
		<reference ref_id="CVE-2021-3826" ref_url="https://www.suse.com/security/cve/CVE-2021-3826/" source="CVE"/>
		<reference ref_id="CVE-2021-45078" ref_url="https://www.suse.com/security/cve/CVE-2021-45078/" source="CVE"/>
		<reference ref_id="CVE-2021-46195" ref_url="https://www.suse.com/security/cve/CVE-2021-46195/" source="CVE"/>
		<reference ref_id="CVE-2022-27943" ref_url="https://www.suse.com/security/cve/CVE-2022-27943/" source="CVE"/>
		<reference ref_id="CVE-2022-38126" ref_url="https://www.suse.com/security/cve/CVE-2022-38126/" source="CVE"/>
		<reference ref_id="CVE-2022-38127" ref_url="https://www.suse.com/security/cve/CVE-2022-38127/" source="CVE"/>
		<reference ref_id="CVE-2022-38533" ref_url="https://www.suse.com/security/cve/CVE-2022-38533/" source="CVE"/>
		<description>
This update for binutils fixes the following issues:
The following security bugs were fixed:

- CVE-2019-1010204: Fixed out-of-bounds read in elfcpp/elfcpp_file.h (bsc#1142579).
- CVE-2021-3530: Fixed stack-based buffer overflow in demangle_path() in rust-demangle.c (bsc#1185597).
- CVE-2021-3648: Fixed infinite loop while demangling rust symbols (bsc#1188374).
- CVE-2021-3826: Fixed heap/stack buffer overflow in the dlang_lname function in d-demangle.c (bsc#1202969).
- CVE-2021-45078: Fixed out-of-bounds write in stab_xcoff_builtin_type() in stabs.c (bsc#1193929).
- CVE-2021-46195: Fixed uncontrolled recursion in libiberty/rust-demangle.c (bsc#1194783).
- CVE-2022-27943: Fixed stack exhaustion in demangle_const in (bsc#1197592).
- CVE-2022-38126: Fixed assertion fail in the display_debug_names() function in binutils/dwarf.c (bsc#1202966).
- CVE-2022-38127: Fixed NULL pointer dereference in the read_and_display_attr_value() function in binutils/dwarf.c (bsc#1202967).
- CVE-2022-38533: Fixed heap out-of-bounds read in bfd_getl32 (bsc#1202816).


The following non-security bugs were fixed:
  
- SLE toolchain update of binutils, update to 2.39 from 2.37.
- Update to 2.39:  
  * The ELF linker will now generate a warning message if the stack is made
    executable.  Similarly it will warn if the output binary contains a
    segment with all three of the read, write and execute permission
    bits set.  These warnings are intended to help developers identify
    programs which might be vulnerable to attack via these executable
    memory regions.
    The warnings are enabled by default but can be disabled via a command
    line option.  It is also possible to build a linker with the warnings
    disabled, should that be necessary.
  * The ELF linker now supports a --package-metadata option that allows
    embedding a JSON payload in accordance to the Package Metadata
    specification. 
  * In linker scripts it is now possible to use TYPE=&lt;type&gt; in an output
    section description to set the section type value.
  * The objdump program now supports coloured/colored syntax
    highlighting of its disassembler output for some architectures.
    (Currently: AVR, RiscV, s390, x86, x86_64).
  * The nm program now supports a --no-weak/-W option to make it ignore
    weak symbols.
  * The readelf and objdump programs now support a -wE option to prevent
    them from attempting to access debuginfod servers when following
    links.
  * The objcopy program's --weaken, --weaken-symbol, and
    --weaken-symbols options now works with unique symbols as well.

- Update to 2.38:
  * elfedit: Add --output-abiversion option to update ABIVERSION.
  * Add support for the LoongArch instruction set.
  * Tools which display symbols or strings (readelf, strings, nm, objdump)
    have a new command line option which controls how unicode characters are
    handled.  By default they are treated as normal for the tool.  Using
    --unicode=locale will display them according to the current locale.
    Using --unicode=hex will display them as hex byte values, whilst
    --unicode=escape will display them as escape sequences.  In addition
    using --unicode=highlight will display them as unicode escape sequences
    highlighted in red (if supported by the output device).
  * readelf -r dumps RELR relative relocations now.
  * Support for efi-app-aarch64, efi-rtdrv-aarch64 and efi-bsdrv-aarch64 has been
    added to objcopy in order to enable UEFI development using binutils (bsc#1198458).
  * ar: Add --thin for creating thin archives. -T is a deprecated alias without
    diagnostics. In many ar implementations -T has a different meaning, as
    specified by X/Open System Interface.
  * Add support for AArch64 system registers that were missing in previous
    releases.
  * Add support for the LoongArch instruction set.
  * Add a command-line option, -muse-unaligned-vector-move, for x86 target
    to encode aligned vector move as unaligned vector move.
  * Add support for Cortex-R52+ for Arm.
  * Add support for Cortex-A510, Cortex-A710, Cortex-X2 for AArch64.
  * Add support for Cortex-A710 for Arm.
  * Add support for Scalable Matrix Extension (SME) for AArch64.
  * The --multibyte-handling=[allow|warn|warn-sym-only] option tells the
    assembler what to when it encoutners multibyte characters in the input.  The
    default is to allow them.  Setting the option to 'warn' will generate a
    warning message whenever any multibyte character is encountered.  Using the
    option to 'warn-sym-only' will make the assembler generate a warning whenever a
    symbol is defined containing multibyte characters.  (References to undefined
    symbols will not generate warnings).
  * Outputs of .ds.x directive and .tfloat directive with hex input from
    x86 assembler have been reduced from 12 bytes to 10 bytes to match the
    output of .tfloat directive.
  * Add support for 'armv8.8-a', 'armv9-a', 'armv9.1-a', 'armv9.2-a' and
    'armv9.3-a' for -march in AArch64 GAS.
  * Add support for 'armv8.7-a', 'armv8.8-a', 'armv9-a', 'armv9.1-a',
    'armv9.2-a' and 'armv9.3-a' for -march in Arm GAS.
  * Add support for Intel AVX512_FP16 instructions.
  * Add -z pack-relative-relocs/-z no pack-relative-relocs to x86 ELF
    linker to pack relative relocations in the DT_RELR section.
  * Add support for the LoongArch architecture.
  * Add -z indirect-extern-access/-z noindirect-extern-access to x86 ELF
    linker to control canonical function pointers and copy relocation.
  * Add --max-cache-size=SIZE to set the the maximum cache size to SIZE
    bytes.

- Fixed regression that prevented .ko.debug to be loaded in crash tool (bsc#1191908).
- Explicitly enable --enable-warn-execstack=yes and --enable-warn-rwx-segments=yes.
- Add gprofng subpackage.
- Include recognition of 'z16' name for 'arch14' on s390. (bsc#1198237).
- Add back fix for bsc#1191473, which got lost in the update to 2.38.
- Install symlinks for all target specific tools on arm-eabi-none (bsc#1185712).
- Enable PRU architecture for AM335x CPU (Beagle Bone Black board)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2022-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1142579">SUSE bug 1142579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185597">SUSE bug 1185597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185712">SUSE bug 1185712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188374">SUSE bug 1188374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191473">SUSE bug 1191473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191908">SUSE bug 1191908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193929">SUSE bug 1193929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194783">SUSE bug 1194783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197592">SUSE bug 1197592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198237">SUSE bug 1198237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198458">SUSE bug 1198458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202816">SUSE bug 1202816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202966">SUSE bug 1202966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202967">SUSE bug 1202967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202969">SUSE bug 1202969</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010204/">CVE-2019-1010204 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010204">CVE-2019-1010204 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3530/">CVE-2021-3530 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3530">CVE-2021-3530 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3648/">CVE-2021-3648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3648">CVE-2021-3648 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3826/">CVE-2021-3826 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3826">CVE-2021-3826 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45078/">CVE-2021-45078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45078">CVE-2021-45078 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46195/">CVE-2021-46195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46195">CVE-2021-46195 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27943/">CVE-2022-27943 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27943">CVE-2022-27943 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38126/">CVE-2022-38126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38126">CVE-2022-38126 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38127/">CVE-2022-38127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38127">CVE-2022-38127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-38533/">CVE-2022-38533 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38533">CVE-2022-38533 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725587" comment="binutils-2.39-9.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725588" comment="binutils-devel-2.39-9.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725589" comment="libctf-nobfd0-2.39-9.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725590" comment="libctf0-2.39-9.50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725587" comment="binutils-2.39-9.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725588" comment="binutils-devel-2.39-9.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725589" comment="libctf-nobfd0-2.39-9.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725590" comment="libctf0-2.39-9.50.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152822" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205120" ref_url="https://bugzilla.suse.com/1205120" source="BUGZILLA"/>
		<reference ref_id="1205121" ref_url="https://bugzilla.suse.com/1205121" source="BUGZILLA"/>
		<reference ref_id="1205122" ref_url="https://bugzilla.suse.com/1205122" source="BUGZILLA"/>
		<reference ref_id="1205123" ref_url="https://bugzilla.suse.com/1205123" source="BUGZILLA"/>
		<reference ref_id="1205124" ref_url="https://bugzilla.suse.com/1205124" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32888" ref_url="https://www.suse.com/security/cve/CVE-2022-32888/" source="CVE"/>
		<reference ref_id="CVE-2022-32923" ref_url="https://www.suse.com/security/cve/CVE-2022-32923/" source="CVE"/>
		<reference ref_id="CVE-2022-42799" ref_url="https://www.suse.com/security/cve/CVE-2022-42799/" source="CVE"/>
		<reference ref_id="CVE-2022-42823" ref_url="https://www.suse.com/security/cve/CVE-2022-42823/" source="CVE"/>
		<reference ref_id="CVE-2022-42824" ref_url="https://www.suse.com/security/cve/CVE-2022-42824/" source="CVE"/>
		<description>

Security fixes:

- CVE-2022-32888: Fixed possible arbitrary code execution via maliciously crafted web content (bsc#1205121).
- CVE-2022-32923: Fixed possible information leak via maliciously crafted web content (bsc#1205122).
- CVE-2022-42799: Fixed user interface spoofing when visiting a malicious website (bsc#1205123).
- CVE-2022-42823: Fixed possible arbitrary code execution via maliciously crafted web content (bsc#1205120).
- CVE-2022-42824: Fixed possible sensitive user information leak via maliciously crafted web content (bsc#1205124).

Update to version 2.38.2:

  - Fix scrolling issues in some sites having fixed background.
  - Fix prolonged buffering during progressive live playback.
  - Fix the build with accessibility disabled.
  - Fix several crashes and rendering issues.
    
Update to version 2.38.1:

  - Make xdg-dbus-proxy work if host session bus address is an
    abstract socket.
  - Use a single xdg-dbus-proxy process when sandbox is enabled.
  - Fix high resolution video playback due to unimplemented
    changeType operation.
  - Ensure GSubprocess uses posix_spawn() again and inherit file
    descriptors.
  - Fix player stucking in buffering (paused) state for progressive
    streaming.
  - Do not try to preconnect on link click when link preconnect
    setting is disabled.
  - Fix close status code returned when the client closes a
    WebSocket in some cases.
  - Fix media player duration calculation.
  - Fix several crashes and rendering issues.

Update to version 2.38.0:

  - New media controls UI style.
  - Add new API to set WebView's Content-Security-Policy for web
    extensions support.
  - Make it possible to use the remote inspector from other
    browsers using WEBKIT_INSPECTOR_HTTP_SERVER env var.
  - MediaSession is enabled by default, allowing remote media
    control using MPRIS.
  - Add support for PDF documents using PDF.js.
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2022-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205120">SUSE bug 1205120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205121">SUSE bug 1205121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205122">SUSE bug 1205122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205123">SUSE bug 1205123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205124">SUSE bug 1205124</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32888/">CVE-2022-32888 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32888">CVE-2022-32888 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32923/">CVE-2022-32923 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32923">CVE-2022-32923 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42799/">CVE-2022-42799 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42799">CVE-2022-42799 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42823/">CVE-2022-42823 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42823">CVE-2022-42823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42824/">CVE-2022-42824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42824">CVE-2022-42824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726568" comment="libjavascriptcoregtk-4_0-18-2.38.2-2.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726569" comment="libwebkit2gtk-4_0-37-2.38.2-2.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726492" comment="libwebkit2gtk3-lang-2.38.2-2.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726570" comment="typelib-1_0-JavaScriptCore-4_0-2.38.2-2.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726571" comment="typelib-1_0-WebKit2-4_0-2.38.2-2.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726572" comment="typelib-1_0-WebKit2WebExtension-4_0-2.38.2-2.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726573" comment="webkit2gtk-4_0-injected-bundles-2.38.2-2.120.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726568" comment="libjavascriptcoregtk-4_0-18-2.38.2-2.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726569" comment="libwebkit2gtk-4_0-37-2.38.2-2.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726492" comment="libwebkit2gtk3-lang-2.38.2-2.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726570" comment="typelib-1_0-JavaScriptCore-4_0-2.38.2-2.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726571" comment="typelib-1_0-WebKit2-4_0-2.38.2-2.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726572" comment="typelib-1_0-WebKit2WebExtension-4_0-2.38.2-2.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726573" comment="webkit2gtk-4_0-injected-bundles-2.38.2-2.120.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152823" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1113040" ref_url="https://bugzilla.suse.com/1113040" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18586" ref_url="https://www.suse.com/security/cve/CVE-2018-18586/" source="CVE"/>
		<description>
This update for libmspack fixes the following issues:

- CVE-2018-18586: Add leading slash protection to chmextract. (bsc#1113040)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2022-11-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1113040">SUSE bug 1113040</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18586/">CVE-2018-18586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18586">CVE-2018-18586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722297" comment="libmspack0-0.4-15.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152824" version="1" class="patch">
	<metadata>
		<title>Security update for opencc (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1108310" ref_url="https://bugzilla.suse.com/1108310" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16982" ref_url="https://www.suse.com/security/cve/CVE-2018-16982/" source="CVE"/>
		<description>
This update for opencc fixes the following issues:

- CVE-2018-16982: Fixed out-of-bounds keyOffset and valueOffset values in BinaryDict.cpp. (bsc#1108310)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2022-11-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1108310">SUSE bug 1108310</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16982/">CVE-2018-16982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16982">CVE-2018-16982 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009722298" comment="libopencc2-1.0.3-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722299" comment="opencc-1.0.3-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722300" comment="opencc-data-1.0.3-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152825" version="1" class="patch">
	<metadata>
		<title>Security update for libdb-4_8 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174414" ref_url="https://bugzilla.suse.com/1174414" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2708" ref_url="https://www.suse.com/security/cve/CVE-2019-2708/" source="CVE"/>
		<description>
This update for libdb-4_8 fixes the following issues:

- CVE-2019-2708: Fixed partial DoS due to data store execution (bsc#1174414).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2022-11-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1174414">SUSE bug 1174414</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2708/">CVE-2019-2708 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2708">CVE-2019-2708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726836" comment="db48-utils-4.8.30-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726837" comment="libdb-4_8-4.8.30-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726838" comment="libdb-4_8-32bit-4.8.30-33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152826" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204468" ref_url="https://bugzilla.suse.com/1204468" source="BUGZILLA"/>
		<reference ref_id="1204471" ref_url="https://bugzilla.suse.com/1204471" source="BUGZILLA"/>
		<reference ref_id="1204472" ref_url="https://bugzilla.suse.com/1204472" source="BUGZILLA"/>
		<reference ref_id="1204473" ref_url="https://bugzilla.suse.com/1204473" source="BUGZILLA"/>
		<reference ref_id="1204475" ref_url="https://bugzilla.suse.com/1204475" source="BUGZILLA"/>
		<reference ref_id="1204480" ref_url="https://bugzilla.suse.com/1204480" source="BUGZILLA"/>
		<reference ref_id="1205302" ref_url="https://bugzilla.suse.com/1205302" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21618" ref_url="https://www.suse.com/security/cve/CVE-2022-21618/" source="CVE"/>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<reference ref_id="CVE-2022-39399" ref_url="https://www.suse.com/security/cve/CVE-2022-39399/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- CVE-2022-21626: An unauthenticated attacker with network access via HTTPS can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1204471).
- CVE-2022-21618: An unauthenticated attacker with network access via Kerberos can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1204468).
- CVE-2022-21619: An unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE (bsc#1204473).
- CVE-2022-21628: An unauthenticated attacker with network access via HTTP can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1204472).
- CVE-2022-21624: An unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise (bsc#1204475).
- CVE-2022-39399: An unauthenticated attacker with network access via HTTP can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1204480).

- Update to Java 8.0 Service Refresh 7 Fix Pack 20 [bsc#1205302]
  * Security:
    - The IBM ORB Does Not Support Object-Serialisation Data Filtering
    - Large Allocation In CipherSuite
    - Avoid Evaluating Sslalgorithmconstraints Twice
    - Cache The Results Of Constraint Checks
    - An incorrect ShortBufferException is thrown by IBMJCEPlus,
      IBMJCEPlusFIPS during cipher update operation
    - Disable SHA-1 Signed Jars For Ea
    - JSSE Performance Improvement
    - Oracle Road Map Kerberos Deprecation Of 3DES And RC4 Encryption
  * Java 8/Orb:
    - Upgrade ibmcfw.jar To Version o2228.02
  * Class Libraries:
    - Crash In Libjsor.So During An Rdma Failover
    - High CPU Consumption Observed In ZosEventPort$EventHandlerTask.run
    - Update Timezone Information To The Latest tzdata2022c
  * Jit Compiler:
    - Crash During JIT Compilation
    - Incorrect JIT Optimization Of Java Code
    - Incorrect Return From Class.isArray()
    - Unexpected ClassCastException
    - Performance Regression When Calling VM Helper Code On X86
  * X/Os Extentions:
    - Add RSA-OAEP Cipher Function To IBMJCECCA

- Update to Java 8.0 Service Refresh 7 Fix Pack 16
  * Java Virtual Machine
    - Assertion failure at ClassLoaderRememberedSet.cpp
	- Assertion failure at StandardAccessBarrier.cpp when
	  -Xgc:concurrentScavenge is set.
    - GC can have unflushed ownable synchronizer objects which
	  can eventually lead to heap corruption and failure when
	  -Xgc:concurrentScavenge is set.
  *	JIT Compiler:
    - Incorrect JIT optimization of Java code
    - JAVA JIT Power: JIT compile time assert on AIX or LINUXPPC
  *	Reliability and Serviceability:
    - javacore with 'kill -3' SIGQUIT signal freezes Java process
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2022-11-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204468">SUSE bug 1204468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204471">SUSE bug 1204471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204472">SUSE bug 1204472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204473">SUSE bug 1204473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204475">SUSE bug 1204475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204480">SUSE bug 1204480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205302">SUSE bug 1205302</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21618/">CVE-2022-21618 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21618">CVE-2022-21618 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21619">CVE-2022-21619 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21624">CVE-2022-21624 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21626">CVE-2022-21626 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39399/">CVE-2022-39399 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39399">CVE-2022-39399 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725585" comment="java-1_8_0-ibm-1.8.0_sr7.20-30.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725550" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.20-30.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725586" comment="java-1_8_0-ibm-devel-1.8.0_sr7.20-30.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725551" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.20-30.99.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725585" comment="java-1_8_0-ibm-1.8.0_sr7.20-30.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725550" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.20-30.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725586" comment="java-1_8_0-ibm-devel-1.8.0_sr7.20-30.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725551" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.20-30.99.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152827" version="1" class="patch">
	<metadata>
		<title>Security update for supportutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203818" ref_url="https://bugzilla.suse.com/1203818" source="BUGZILLA"/>
		<description>
This update for supportutils fixes the following issues:

Security issues fixed:

- Passwords correctly removed from email.txt, updates.txt and fs-iscsi.txt (bsc#1203818)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2022-11-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203818">SUSE bug 1203818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726814" comment="supportutils-3.0.10-95.51.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726814" comment="supportutils-3.0.10-95.51.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152828" version="1" class="patch">
	<metadata>
		<title>Security update for emacs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205822" ref_url="https://bugzilla.suse.com/1205822" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45939" ref_url="https://www.suse.com/security/cve/CVE-2022-45939/" source="CVE"/>
		<description>
This update for emacs fixes the following issues:

- CVE-2022-45939: Fixed shell command injection via source code files when using ctags (bsc#1205822).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-01"/>
	<updated date="2022-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205822">SUSE bug 1205822</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45939/">CVE-2022-45939 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45939">CVE-2022-45939 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727481" comment="emacs-24.3-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727418" comment="emacs-el-24.3-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727419" comment="emacs-info-24.3-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727482" comment="emacs-nox-24.3-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727483" comment="emacs-x11-24.3-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727484" comment="etags-24.3-25.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727481" comment="emacs-24.3-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727418" comment="emacs-el-24.3-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727419" comment="emacs-info-24.3-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727482" comment="emacs-nox-24.3-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727483" comment="emacs-x11-24.3-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727484" comment="etags-24.3-25.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152829" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1170916" ref_url="https://bugzilla.suse.com/1170916" source="BUGZILLA"/>
		<reference ref_id="1203106" ref_url="https://bugzilla.suse.com/1203106" source="BUGZILLA"/>
		<reference ref_id="1204127" ref_url="https://bugzilla.suse.com/1204127" source="BUGZILLA"/>
		<reference ref_id="1204129" ref_url="https://bugzilla.suse.com/1204129" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29260" ref_url="https://www.suse.com/security/cve/CVE-2020-29260/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2020-29260: Fixed memory leakage via rfbClientCleanup() (bsc#1203106).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-06"/>
	<updated date="2022-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170916">SUSE bug 1170916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203106">SUSE bug 1203106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204127">SUSE bug 1204127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204129">SUSE bug 1204129</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29260/">CVE-2020-29260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29260">CVE-2020-29260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727282" comment="libvncclient0-0.9.9-17.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727283" comment="libvncserver0-0.9.9-17.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152830" version="1" class="patch">
	<metadata>
		<title>Security update for bcel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205125" ref_url="https://bugzilla.suse.com/1205125" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42920" ref_url="https://www.suse.com/security/cve/CVE-2022-42920/" source="CVE"/>
		<description>
This update for bcel fixes the following issues:

- CVE-2022-42920: Fixed producing arbitrary bytecode via out-of-bounds writing (bsc#1205125).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-06"/>
	<updated date="2022-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1205125">SUSE bug 1205125</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42920/">CVE-2022-42920 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42920">CVE-2022-42920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724930" comment="bcel-5.2-28.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152831" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205126" ref_url="https://bugzilla.suse.com/1205126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42898" ref_url="https://www.suse.com/security/cve/CVE-2022-42898/" source="CVE"/>
		<description>
This update for krb5 fixes the following issues:

- CVE-2022-42898: Fixed integer overflow in PAC parsing (bsc#1205126).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-06"/>
	<updated date="2022-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205126">SUSE bug 1205126</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-42898/">CVE-2022-42898 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42898">CVE-2022-42898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726342" comment="krb5-1.12.5-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726334" comment="krb5-32bit-1.12.5-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726343" comment="krb5-client-1.12.5-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726344" comment="krb5-doc-1.12.5-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726345" comment="krb5-plugin-kdb-ldap-1.12.5-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726346" comment="krb5-plugin-preauth-otp-1.12.5-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726347" comment="krb5-plugin-preauth-pkinit-1.12.5-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726348" comment="krb5-server-1.12.5-40.43.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726342" comment="krb5-1.12.5-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726334" comment="krb5-32bit-1.12.5-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726343" comment="krb5-client-1.12.5-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726344" comment="krb5-doc-1.12.5-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726345" comment="krb5-plugin-kdb-ldap-1.12.5-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726346" comment="krb5-plugin-preauth-otp-1.12.5-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726347" comment="krb5-plugin-preauth-pkinit-1.12.5-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726348" comment="krb5-server-1.12.5-40.43.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152832" version="1" class="patch">
	<metadata>
		<title>Security update for busybox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199744" ref_url="https://bugzilla.suse.com/1199744" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-30065" ref_url="https://www.suse.com/security/cve/CVE-2022-30065/" source="CVE"/>
		<description>
This update for busybox fixes the following issues:

- CVE-2022-30065: Fixed use-after-free in the AWK applet (bsc#1199744).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-08"/>
	<updated date="2022-12-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1199744">SUSE bug 1199744</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30065/">CVE-2022-30065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30065">CVE-2022-30065 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727485" comment="busybox-1.35.0-4.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152833" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204471" ref_url="https://bugzilla.suse.com/1204471" source="BUGZILLA"/>
		<reference ref_id="1204472" ref_url="https://bugzilla.suse.com/1204472" source="BUGZILLA"/>
		<reference ref_id="1204473" ref_url="https://bugzilla.suse.com/1204473" source="BUGZILLA"/>
		<reference ref_id="1204475" ref_url="https://bugzilla.suse.com/1204475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u352 (icedtea-3.25.0):

- CVE-2022-21619,CVE-2022-21624: Fixed difficult to exploit vulnerability allows unauthenticated attacker with network access and can cause unauthorized update, insert or delete access via multiple protocols (bsc#1204473,bsc#1204475).
- CVE-2022-21626: Fixed easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to cause partial denial of service (bsc#1204471).
- CVE-2022-21628: Fixed easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to cause partial denial of service (bsc#1204472).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-08"/>
	<updated date="2022-12-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204471">SUSE bug 1204471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204472">SUSE bug 1204472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204473">SUSE bug 1204473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204475">SUSE bug 1204475</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21619">CVE-2022-21619 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21624">CVE-2022-21624 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21626">CVE-2022-21626 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727636" comment="java-1_8_0-openjdk-1.8.0.352-27.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727637" comment="java-1_8_0-openjdk-demo-1.8.0.352-27.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727638" comment="java-1_8_0-openjdk-devel-1.8.0.352-27.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727639" comment="java-1_8_0-openjdk-headless-1.8.0.352-27.81.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727636" comment="java-1_8_0-openjdk-1.8.0.352-27.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727637" comment="java-1_8_0-openjdk-demo-1.8.0.352-27.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727638" comment="java-1_8_0-openjdk-devel-1.8.0.352-27.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727639" comment="java-1_8_0-openjdk-headless-1.8.0.352-27.81.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152834" version="1" class="patch">
	<metadata>
		<title>Security update for nautilus (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205418" ref_url="https://bugzilla.suse.com/1205418" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-37290" ref_url="https://www.suse.com/security/cve/CVE-2022-37290/" source="CVE"/>
		<description>
This update for nautilus fixes the following issues:

- CVE-2022-37290: Fixed a denial of service caused by pasted ZIP archives (bsc#1205418).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-09"/>
	<updated date="2022-12-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1205418">SUSE bug 1205418</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-37290/">CVE-2022-37290 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37290">CVE-2022-37290 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727676" comment="gnome-shell-search-provider-nautilus-3.20.3-23.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727677" comment="libnautilus-extension1-3.20.3-23.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727678" comment="nautilus-3.20.3-23.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727674" comment="nautilus-lang-3.20.3-23.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152835" version="1" class="patch">
	<metadata>
		<title>Security update for colord (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202802" ref_url="https://bugzilla.suse.com/1202802" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42523" ref_url="https://www.suse.com/security/cve/CVE-2021-42523/" source="CVE"/>
		<description>
This update for colord fixes the following issues:

- CVE-2021-42523: Fixed a small memory leak in sqlite3_exec (bsc#1202802).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-12"/>
	<updated date="2022-12-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1202802">SUSE bug 1202802</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-42523/">CVE-2021-42523 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42523">CVE-2021-42523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009728059" comment="libcolord2-1.3.3-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728060" comment="libcolord2-32bit-1.3.3-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728061" comment="libcolorhug2-1.3.3-13.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152836" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206242" ref_url="https://bugzilla.suse.com/1206242" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-46872" ref_url="https://www.suse.com/security/cve/CVE-2022-46872/" source="CVE"/>
		<reference ref_id="CVE-2022-46874" ref_url="https://www.suse.com/security/cve/CVE-2022-46874/" source="CVE"/>
		<reference ref_id="CVE-2022-46875" ref_url="https://www.suse.com/security/cve/CVE-2022-46875/" source="CVE"/>
		<reference ref_id="CVE-2022-46878" ref_url="https://www.suse.com/security/cve/CVE-2022-46878/" source="CVE"/>
		<reference ref_id="CVE-2022-46880" ref_url="https://www.suse.com/security/cve/CVE-2022-46880/" source="CVE"/>
		<reference ref_id="CVE-2022-46881" ref_url="https://www.suse.com/security/cve/CVE-2022-46881/" source="CVE"/>
		<reference ref_id="CVE-2022-46882" ref_url="https://www.suse.com/security/cve/CVE-2022-46882/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 102.6.0 ESR (bsc#1206242):

- CVE-2022-46880: Use-after-free in WebGL
- CVE-2022-46872: Arbitrary file read from a compromised content process
- CVE-2022-46881: Memory corruption in WebGL
- CVE-2022-46874: Drag and Dropped Filenames could have been truncated to malicious extensions
- CVE-2022-46875: Download Protections were bypassed by .atloc and .ftploc files on Mac OS
- CVE-2022-46882: Use-after-free in WebGL
- CVE-2022-46878: Memory safety bugs fixed in Firefox 108 and Firefox ESR 102.6
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-13"/>
	<updated date="2022-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206242">SUSE bug 1206242</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46872/">CVE-2022-46872 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46872">CVE-2022-46872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46874/">CVE-2022-46874 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46874">CVE-2022-46874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46875/">CVE-2022-46875 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46875">CVE-2022-46875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46878/">CVE-2022-46878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46878">CVE-2022-46878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46880/">CVE-2022-46880 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46880">CVE-2022-46880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46881/">CVE-2022-46881 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46881">CVE-2022-46881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46882/">CVE-2022-46882 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46882">CVE-2022-46882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009728194" comment="MozillaFirefox-102.6.0-112.142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728195" comment="MozillaFirefox-devel-102.6.0-112.142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728196" comment="MozillaFirefox-translations-common-102.6.0-112.142.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009728194" comment="MozillaFirefox-102.6.0-112.142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728195" comment="MozillaFirefox-devel-102.6.0-112.142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728196" comment="MozillaFirefox-translations-common-102.6.0-112.142.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152837" version="1" class="patch">
	<metadata>
		<title>Security update for zabbix (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206083" ref_url="https://bugzilla.suse.com/1206083" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-43515" ref_url="https://www.suse.com/security/cve/CVE-2022-43515/" source="CVE"/>
		<description>
This update for zabbix fixes the following issues:

- CVE-2022-43515: X-Forwarded-For header is active by default causes access to Zabbix sites in maintenance mode (bsc#1206083).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-14"/>
	<updated date="2022-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206083">SUSE bug 1206083</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-43515/">CVE-2022-43515 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43515">CVE-2022-43515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728058" comment="zabbix-agent-4.0.12-4.21.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728058" comment="zabbix-agent-4.0.12-4.21.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152838" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205874" ref_url="https://bugzilla.suse.com/1205874" source="BUGZILLA"/>
		<reference ref_id="1205875" ref_url="https://bugzilla.suse.com/1205875" source="BUGZILLA"/>
		<reference ref_id="1205876" ref_url="https://bugzilla.suse.com/1205876" source="BUGZILLA"/>
		<reference ref_id="1205877" ref_url="https://bugzilla.suse.com/1205877" source="BUGZILLA"/>
		<reference ref_id="1205878" ref_url="https://bugzilla.suse.com/1205878" source="BUGZILLA"/>
		<reference ref_id="1205879" ref_url="https://bugzilla.suse.com/1205879" source="BUGZILLA"/>
		<reference ref_id="1206017" ref_url="https://bugzilla.suse.com/1206017" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4283" ref_url="https://www.suse.com/security/cve/CVE-2022-4283/" source="CVE"/>
		<reference ref_id="CVE-2022-46340" ref_url="https://www.suse.com/security/cve/CVE-2022-46340/" source="CVE"/>
		<reference ref_id="CVE-2022-46341" ref_url="https://www.suse.com/security/cve/CVE-2022-46341/" source="CVE"/>
		<reference ref_id="CVE-2022-46342" ref_url="https://www.suse.com/security/cve/CVE-2022-46342/" source="CVE"/>
		<reference ref_id="CVE-2022-46343" ref_url="https://www.suse.com/security/cve/CVE-2022-46343/" source="CVE"/>
		<reference ref_id="CVE-2022-46344" ref_url="https://www.suse.com/security/cve/CVE-2022-46344/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2022-46340: Server XTestSwapFakeInput stack overflow (bsc#1205874)
- CVE-2022-46341: Server XIPassiveUngrabDevice out-of-bounds access (bsc#1205877)
- CVE-2022-46342: Server XvdiSelectVideoNotify use-after-free (bsc#1205879)
- CVE-2022-46343: Server ScreenSaverSetAttributes use-after-free (bsc#1205878)
- CVE-2022-46344: Server XIChangeProperty out-of-bounds access (bsc#1205876)
- CVE-2022-4283: Reset the radio_groups pointer to NULL after freeing it (bsc#1206017)
- Xi: return an error from XI property changes if verification failed (bsc#1205875)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-14"/>
	<updated date="2022-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205874">SUSE bug 1205874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205875">SUSE bug 1205875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205876">SUSE bug 1205876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205877">SUSE bug 1205877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205878">SUSE bug 1205878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205879">SUSE bug 1205879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206017">SUSE bug 1206017</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4283/">CVE-2022-4283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4283">CVE-2022-4283 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46340/">CVE-2022-46340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46340">CVE-2022-46340 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46341/">CVE-2022-46341 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46341">CVE-2022-46341 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-46342/">CVE-2022-46342 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46342">CVE-2022-46342 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-46343/">CVE-2022-46343 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46343">CVE-2022-46343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46344/">CVE-2022-46344 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46344">CVE-2022-46344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009728989" comment="xorg-x11-server-7.6_1.18.3-76.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728990" comment="xorg-x11-server-extra-7.6_1.18.3-76.57.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009728989" comment="xorg-x11-server-7.6_1.18.3-76.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728990" comment="xorg-x11-server-extra-7.6_1.18.3-76.57.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152839" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204703" ref_url="https://bugzilla.suse.com/1204703" source="BUGZILLA"/>
		<reference ref_id="1205302" ref_url="https://bugzilla.suse.com/1205302" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3676" ref_url="https://www.suse.com/security/cve/CVE-2022-3676/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

IBM Security Update November 2022: (bsc#1205302, bsc#1204703)

- CVE-2022-3676: A security vulnerability was fixed in version 7.1.5.15, adding the reference here.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-20"/>
	<updated date="2022-12-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204703">SUSE bug 1204703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205302">SUSE bug 1205302</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3676/">CVE-2022-3676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3676">CVE-2022-3676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009729723" comment="java-1_7_1-ibm-1.7.1_sr5.15-38.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729649" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729724" comment="java-1_7_1-ibm-devel-1.7.1_sr5.15-38.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729725" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729651" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.77.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009729723" comment="java-1_7_1-ibm-1.7.1_sr5.15-38.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729649" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729724" comment="java-1_7_1-ibm-devel-1.7.1_sr5.15-38.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729725" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729651" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.77.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152840" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206309" ref_url="https://bugzilla.suse.com/1206309" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-43552" ref_url="https://www.suse.com/security/cve/CVE-2022-43552/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-43552: HTTP Proxy deny use-after-free (bsc#1206309).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-21"/>
	<updated date="2022-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206309">SUSE bug 1206309</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-43552/">CVE-2022-43552 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43552">CVE-2022-43552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009729975" comment="curl-7.37.0-37.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729976" comment="libcurl4-7.37.0-37.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729977" comment="libcurl4-32bit-7.37.0-37.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152841" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204703" ref_url="https://bugzilla.suse.com/1204703" source="BUGZILLA"/>
		<reference ref_id="1205302" ref_url="https://bugzilla.suse.com/1205302" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3676" ref_url="https://www.suse.com/security/cve/CVE-2022-3676/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

IBM Security Update November 2022: (bsc#1205302, bsc#1204703)

- CVE-2022-3676: A security vulnerability was fixed in version 8.0.7.20, adding the reference here.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-21"/>
	<updated date="2022-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204703">SUSE bug 1204703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205302">SUSE bug 1205302</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3676/">CVE-2022-3676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3676">CVE-2022-3676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009729726" comment="java-1_8_0-ibm-1.8.0_sr7.20-30.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729653" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.20-30.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729727" comment="java-1_8_0-ibm-devel-1.8.0_sr7.20-30.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729654" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.20-30.102.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009729726" comment="java-1_8_0-ibm-1.8.0_sr7.20-30.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729653" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.20-30.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729727" comment="java-1_8_0-ibm-devel-1.8.0_sr7.20-30.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729654" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.20-30.102.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152842" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206337" ref_url="https://bugzilla.suse.com/1206337" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-46908" ref_url="https://www.suse.com/security/cve/CVE-2022-46908/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2022-46908: Properly implement the azProhibitedFunctions protection mechanism,
  when relying on --safe for execution of an untrusted CLI script (bsc#1206337).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-21"/>
	<updated date="2022-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206337">SUSE bug 1206337</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-46908/">CVE-2022-46908 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46908">CVE-2022-46908 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009729728" comment="libsqlite3-0-3.39.3-9.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729729" comment="libsqlite3-0-32bit-3.39.3-9.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729730" comment="sqlite3-3.39.3-9.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729731" comment="sqlite3-devel-3.39.3-9.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729732" comment="sqlite3-tcl-3.39.3-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152843" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1070955" ref_url="https://bugzilla.suse.com/1070955" source="BUGZILLA"/>
		<reference ref_id="1173256" ref_url="https://bugzilla.suse.com/1173256" source="BUGZILLA"/>
		<reference ref_id="1174564" ref_url="https://bugzilla.suse.com/1174564" source="BUGZILLA"/>
		<reference ref_id="1176549" ref_url="https://bugzilla.suse.com/1176549" source="BUGZILLA"/>
		<reference ref_id="1182324" ref_url="https://bugzilla.suse.com/1182324" source="BUGZILLA"/>
		<reference ref_id="1190533" ref_url="https://bugzilla.suse.com/1190533" source="BUGZILLA"/>
		<reference ref_id="1190570" ref_url="https://bugzilla.suse.com/1190570" source="BUGZILLA"/>
		<reference ref_id="1191770" ref_url="https://bugzilla.suse.com/1191770" source="BUGZILLA"/>
		<reference ref_id="1191893" ref_url="https://bugzilla.suse.com/1191893" source="BUGZILLA"/>
		<reference ref_id="1192167" ref_url="https://bugzilla.suse.com/1192167" source="BUGZILLA"/>
		<reference ref_id="1192478" ref_url="https://bugzilla.suse.com/1192478" source="BUGZILLA"/>
		<reference ref_id="1192481" ref_url="https://bugzilla.suse.com/1192481" source="BUGZILLA"/>
		<reference ref_id="1192902" ref_url="https://bugzilla.suse.com/1192902" source="BUGZILLA"/>
		<reference ref_id="1192903" ref_url="https://bugzilla.suse.com/1192903" source="BUGZILLA"/>
		<reference ref_id="1192904" ref_url="https://bugzilla.suse.com/1192904" source="BUGZILLA"/>
		<reference ref_id="1193294" ref_url="https://bugzilla.suse.com/1193294" source="BUGZILLA"/>
		<reference ref_id="1193298" ref_url="https://bugzilla.suse.com/1193298" source="BUGZILLA"/>
		<reference ref_id="1193466" ref_url="https://bugzilla.suse.com/1193466" source="BUGZILLA"/>
		<reference ref_id="1193905" ref_url="https://bugzilla.suse.com/1193905" source="BUGZILLA"/>
		<reference ref_id="1194093" ref_url="https://bugzilla.suse.com/1194093" source="BUGZILLA"/>
		<reference ref_id="1194216" ref_url="https://bugzilla.suse.com/1194216" source="BUGZILLA"/>
		<reference ref_id="1194217" ref_url="https://bugzilla.suse.com/1194217" source="BUGZILLA"/>
		<reference ref_id="1194388" ref_url="https://bugzilla.suse.com/1194388" source="BUGZILLA"/>
		<reference ref_id="1194556" ref_url="https://bugzilla.suse.com/1194556" source="BUGZILLA"/>
		<reference ref_id="1194872" ref_url="https://bugzilla.suse.com/1194872" source="BUGZILLA"/>
		<reference ref_id="1194885" ref_url="https://bugzilla.suse.com/1194885" source="BUGZILLA"/>
		<reference ref_id="1195004" ref_url="https://bugzilla.suse.com/1195004" source="BUGZILLA"/>
		<reference ref_id="1195066" ref_url="https://bugzilla.suse.com/1195066" source="BUGZILLA"/>
		<reference ref_id="1195126" ref_url="https://bugzilla.suse.com/1195126" source="BUGZILLA"/>
		<reference ref_id="1195202" ref_url="https://bugzilla.suse.com/1195202" source="BUGZILLA"/>
		<reference ref_id="1195203" ref_url="https://bugzilla.suse.com/1195203" source="BUGZILLA"/>
		<reference ref_id="1195332" ref_url="https://bugzilla.suse.com/1195332" source="BUGZILLA"/>
		<reference ref_id="1195354" ref_url="https://bugzilla.suse.com/1195354" source="BUGZILLA"/>
		<reference ref_id="1195356" ref_url="https://bugzilla.suse.com/1195356" source="BUGZILLA"/>
		<reference ref_id="1196361" ref_url="https://bugzilla.suse.com/1196361" source="BUGZILLA"/>
		<reference ref_id="1198596" ref_url="https://bugzilla.suse.com/1198596" source="BUGZILLA"/>
		<reference ref_id="1198748" ref_url="https://bugzilla.suse.com/1198748" source="BUGZILLA"/>
		<reference ref_id="1199331" ref_url="https://bugzilla.suse.com/1199331" source="BUGZILLA"/>
		<reference ref_id="1199333" ref_url="https://bugzilla.suse.com/1199333" source="BUGZILLA"/>
		<reference ref_id="1199334" ref_url="https://bugzilla.suse.com/1199334" source="BUGZILLA"/>
		<reference ref_id="1199651" ref_url="https://bugzilla.suse.com/1199651" source="BUGZILLA"/>
		<reference ref_id="1199655" ref_url="https://bugzilla.suse.com/1199655" source="BUGZILLA"/>
		<reference ref_id="1199693" ref_url="https://bugzilla.suse.com/1199693" source="BUGZILLA"/>
		<reference ref_id="1199745" ref_url="https://bugzilla.suse.com/1199745" source="BUGZILLA"/>
		<reference ref_id="1199747" ref_url="https://bugzilla.suse.com/1199747" source="BUGZILLA"/>
		<reference ref_id="1199936" ref_url="https://bugzilla.suse.com/1199936" source="BUGZILLA"/>
		<reference ref_id="1200010" ref_url="https://bugzilla.suse.com/1200010" source="BUGZILLA"/>
		<reference ref_id="1200011" ref_url="https://bugzilla.suse.com/1200011" source="BUGZILLA"/>
		<reference ref_id="1200012" ref_url="https://bugzilla.suse.com/1200012" source="BUGZILLA"/>
		<reference ref_id="1200270" ref_url="https://bugzilla.suse.com/1200270" source="BUGZILLA"/>
		<reference ref_id="1200697" ref_url="https://bugzilla.suse.com/1200697" source="BUGZILLA"/>
		<reference ref_id="1200698" ref_url="https://bugzilla.suse.com/1200698" source="BUGZILLA"/>
		<reference ref_id="1200700" ref_url="https://bugzilla.suse.com/1200700" source="BUGZILLA"/>
		<reference ref_id="1200701" ref_url="https://bugzilla.suse.com/1200701" source="BUGZILLA"/>
		<reference ref_id="1200732" ref_url="https://bugzilla.suse.com/1200732" source="BUGZILLA"/>
		<reference ref_id="1200884" ref_url="https://bugzilla.suse.com/1200884" source="BUGZILLA"/>
		<reference ref_id="1200902" ref_url="https://bugzilla.suse.com/1200902" source="BUGZILLA"/>
		<reference ref_id="1200903" ref_url="https://bugzilla.suse.com/1200903" source="BUGZILLA"/>
		<reference ref_id="1200904" ref_url="https://bugzilla.suse.com/1200904" source="BUGZILLA"/>
		<reference ref_id="1201132" ref_url="https://bugzilla.suse.com/1201132" source="BUGZILLA"/>
		<reference ref_id="1201133" ref_url="https://bugzilla.suse.com/1201133" source="BUGZILLA"/>
		<reference ref_id="1201134" ref_url="https://bugzilla.suse.com/1201134" source="BUGZILLA"/>
		<reference ref_id="1201135" ref_url="https://bugzilla.suse.com/1201135" source="BUGZILLA"/>
		<reference ref_id="1201136" ref_url="https://bugzilla.suse.com/1201136" source="BUGZILLA"/>
		<reference ref_id="1201150" ref_url="https://bugzilla.suse.com/1201150" source="BUGZILLA"/>
		<reference ref_id="1201151" ref_url="https://bugzilla.suse.com/1201151" source="BUGZILLA"/>
		<reference ref_id="1201152" ref_url="https://bugzilla.suse.com/1201152" source="BUGZILLA"/>
		<reference ref_id="1201153" ref_url="https://bugzilla.suse.com/1201153" source="BUGZILLA"/>
		<reference ref_id="1201154" ref_url="https://bugzilla.suse.com/1201154" source="BUGZILLA"/>
		<reference ref_id="1201155" ref_url="https://bugzilla.suse.com/1201155" source="BUGZILLA"/>
		<reference ref_id="1201249" ref_url="https://bugzilla.suse.com/1201249" source="BUGZILLA"/>
		<reference ref_id="1201356" ref_url="https://bugzilla.suse.com/1201356" source="BUGZILLA"/>
		<reference ref_id="1201359" ref_url="https://bugzilla.suse.com/1201359" source="BUGZILLA"/>
		<reference ref_id="1201363" ref_url="https://bugzilla.suse.com/1201363" source="BUGZILLA"/>
		<reference ref_id="1201620" ref_url="https://bugzilla.suse.com/1201620" source="BUGZILLA"/>
		<reference ref_id="1201863" ref_url="https://bugzilla.suse.com/1201863" source="BUGZILLA"/>
		<reference ref_id="1202046" ref_url="https://bugzilla.suse.com/1202046" source="BUGZILLA"/>
		<reference ref_id="1202049" ref_url="https://bugzilla.suse.com/1202049" source="BUGZILLA"/>
		<reference ref_id="1202050" ref_url="https://bugzilla.suse.com/1202050" source="BUGZILLA"/>
		<reference ref_id="1202051" ref_url="https://bugzilla.suse.com/1202051" source="BUGZILLA"/>
		<reference ref_id="1202414" ref_url="https://bugzilla.suse.com/1202414" source="BUGZILLA"/>
		<reference ref_id="1202420" ref_url="https://bugzilla.suse.com/1202420" source="BUGZILLA"/>
		<reference ref_id="1202421" ref_url="https://bugzilla.suse.com/1202421" source="BUGZILLA"/>
		<reference ref_id="1202511" ref_url="https://bugzilla.suse.com/1202511" source="BUGZILLA"/>
		<reference ref_id="1202512" ref_url="https://bugzilla.suse.com/1202512" source="BUGZILLA"/>
		<reference ref_id="1202515" ref_url="https://bugzilla.suse.com/1202515" source="BUGZILLA"/>
		<reference ref_id="1202552" ref_url="https://bugzilla.suse.com/1202552" source="BUGZILLA"/>
		<reference ref_id="1202599" ref_url="https://bugzilla.suse.com/1202599" source="BUGZILLA"/>
		<reference ref_id="1202687" ref_url="https://bugzilla.suse.com/1202687" source="BUGZILLA"/>
		<reference ref_id="1202689" ref_url="https://bugzilla.suse.com/1202689" source="BUGZILLA"/>
		<reference ref_id="1202862" ref_url="https://bugzilla.suse.com/1202862" source="BUGZILLA"/>
		<reference ref_id="1202962" ref_url="https://bugzilla.suse.com/1202962" source="BUGZILLA"/>
		<reference ref_id="1203110" ref_url="https://bugzilla.suse.com/1203110" source="BUGZILLA"/>
		<reference ref_id="1203152" ref_url="https://bugzilla.suse.com/1203152" source="BUGZILLA"/>
		<reference ref_id="1203155" ref_url="https://bugzilla.suse.com/1203155" source="BUGZILLA"/>
		<reference ref_id="1203194" ref_url="https://bugzilla.suse.com/1203194" source="BUGZILLA"/>
		<reference ref_id="1203272" ref_url="https://bugzilla.suse.com/1203272" source="BUGZILLA"/>
		<reference ref_id="1203508" ref_url="https://bugzilla.suse.com/1203508" source="BUGZILLA"/>
		<reference ref_id="1203509" ref_url="https://bugzilla.suse.com/1203509" source="BUGZILLA"/>
		<reference ref_id="1203796" ref_url="https://bugzilla.suse.com/1203796" source="BUGZILLA"/>
		<reference ref_id="1203797" ref_url="https://bugzilla.suse.com/1203797" source="BUGZILLA"/>
		<reference ref_id="1203799" ref_url="https://bugzilla.suse.com/1203799" source="BUGZILLA"/>
		<reference ref_id="1203820" ref_url="https://bugzilla.suse.com/1203820" source="BUGZILLA"/>
		<reference ref_id="1203924" ref_url="https://bugzilla.suse.com/1203924" source="BUGZILLA"/>
		<reference ref_id="1204779" ref_url="https://bugzilla.suse.com/1204779" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0316" ref_url="https://www.suse.com/security/cve/CVE-2009-0316/" source="CVE"/>
		<reference ref_id="CVE-2016-1248" ref_url="https://www.suse.com/security/cve/CVE-2016-1248/" source="CVE"/>
		<reference ref_id="CVE-2017-17087" ref_url="https://www.suse.com/security/cve/CVE-2017-17087/" source="CVE"/>
		<reference ref_id="CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953/" source="CVE"/>
		<reference ref_id="CVE-2017-6349" ref_url="https://www.suse.com/security/cve/CVE-2017-6349/" source="CVE"/>
		<reference ref_id="CVE-2017-6350" ref_url="https://www.suse.com/security/cve/CVE-2017-6350/" source="CVE"/>
		<reference ref_id="CVE-2021-3778" ref_url="https://www.suse.com/security/cve/CVE-2021-3778/" source="CVE"/>
		<reference ref_id="CVE-2021-3796" ref_url="https://www.suse.com/security/cve/CVE-2021-3796/" source="CVE"/>
		<reference ref_id="CVE-2021-3872" ref_url="https://www.suse.com/security/cve/CVE-2021-3872/" source="CVE"/>
		<reference ref_id="CVE-2021-3875" ref_url="https://www.suse.com/security/cve/CVE-2021-3875/" source="CVE"/>
		<reference ref_id="CVE-2021-3903" ref_url="https://www.suse.com/security/cve/CVE-2021-3903/" source="CVE"/>
		<reference ref_id="CVE-2021-3927" ref_url="https://www.suse.com/security/cve/CVE-2021-3927/" source="CVE"/>
		<reference ref_id="CVE-2021-3928" ref_url="https://www.suse.com/security/cve/CVE-2021-3928/" source="CVE"/>
		<reference ref_id="CVE-2021-3968" ref_url="https://www.suse.com/security/cve/CVE-2021-3968/" source="CVE"/>
		<reference ref_id="CVE-2021-3973" ref_url="https://www.suse.com/security/cve/CVE-2021-3973/" source="CVE"/>
		<reference ref_id="CVE-2021-3974" ref_url="https://www.suse.com/security/cve/CVE-2021-3974/" source="CVE"/>
		<reference ref_id="CVE-2021-3984" ref_url="https://www.suse.com/security/cve/CVE-2021-3984/" source="CVE"/>
		<reference ref_id="CVE-2021-4019" ref_url="https://www.suse.com/security/cve/CVE-2021-4019/" source="CVE"/>
		<reference ref_id="CVE-2021-4069" ref_url="https://www.suse.com/security/cve/CVE-2021-4069/" source="CVE"/>
		<reference ref_id="CVE-2021-4136" ref_url="https://www.suse.com/security/cve/CVE-2021-4136/" source="CVE"/>
		<reference ref_id="CVE-2021-4166" ref_url="https://www.suse.com/security/cve/CVE-2021-4166/" source="CVE"/>
		<reference ref_id="CVE-2021-4192" ref_url="https://www.suse.com/security/cve/CVE-2021-4192/" source="CVE"/>
		<reference ref_id="CVE-2021-4193" ref_url="https://www.suse.com/security/cve/CVE-2021-4193/" source="CVE"/>
		<reference ref_id="CVE-2021-46059" ref_url="https://www.suse.com/security/cve/CVE-2021-46059/" source="CVE"/>
		<reference ref_id="CVE-2022-0128" ref_url="https://www.suse.com/security/cve/CVE-2022-0128/" source="CVE"/>
		<reference ref_id="CVE-2022-0213" ref_url="https://www.suse.com/security/cve/CVE-2022-0213/" source="CVE"/>
		<reference ref_id="CVE-2022-0261" ref_url="https://www.suse.com/security/cve/CVE-2022-0261/" source="CVE"/>
		<reference ref_id="CVE-2022-0318" ref_url="https://www.suse.com/security/cve/CVE-2022-0318/" source="CVE"/>
		<reference ref_id="CVE-2022-0319" ref_url="https://www.suse.com/security/cve/CVE-2022-0319/" source="CVE"/>
		<reference ref_id="CVE-2022-0351" ref_url="https://www.suse.com/security/cve/CVE-2022-0351/" source="CVE"/>
		<reference ref_id="CVE-2022-0359" ref_url="https://www.suse.com/security/cve/CVE-2022-0359/" source="CVE"/>
		<reference ref_id="CVE-2022-0361" ref_url="https://www.suse.com/security/cve/CVE-2022-0361/" source="CVE"/>
		<reference ref_id="CVE-2022-0392" ref_url="https://www.suse.com/security/cve/CVE-2022-0392/" source="CVE"/>
		<reference ref_id="CVE-2022-0407" ref_url="https://www.suse.com/security/cve/CVE-2022-0407/" source="CVE"/>
		<reference ref_id="CVE-2022-0413" ref_url="https://www.suse.com/security/cve/CVE-2022-0413/" source="CVE"/>
		<reference ref_id="CVE-2022-0696" ref_url="https://www.suse.com/security/cve/CVE-2022-0696/" source="CVE"/>
		<reference ref_id="CVE-2022-1381" ref_url="https://www.suse.com/security/cve/CVE-2022-1381/" source="CVE"/>
		<reference ref_id="CVE-2022-1420" ref_url="https://www.suse.com/security/cve/CVE-2022-1420/" source="CVE"/>
		<reference ref_id="CVE-2022-1616" ref_url="https://www.suse.com/security/cve/CVE-2022-1616/" source="CVE"/>
		<reference ref_id="CVE-2022-1619" ref_url="https://www.suse.com/security/cve/CVE-2022-1619/" source="CVE"/>
		<reference ref_id="CVE-2022-1620" ref_url="https://www.suse.com/security/cve/CVE-2022-1620/" source="CVE"/>
		<reference ref_id="CVE-2022-1720" ref_url="https://www.suse.com/security/cve/CVE-2022-1720/" source="CVE"/>
		<reference ref_id="CVE-2022-1733" ref_url="https://www.suse.com/security/cve/CVE-2022-1733/" source="CVE"/>
		<reference ref_id="CVE-2022-1735" ref_url="https://www.suse.com/security/cve/CVE-2022-1735/" source="CVE"/>
		<reference ref_id="CVE-2022-1771" ref_url="https://www.suse.com/security/cve/CVE-2022-1771/" source="CVE"/>
		<reference ref_id="CVE-2022-1785" ref_url="https://www.suse.com/security/cve/CVE-2022-1785/" source="CVE"/>
		<reference ref_id="CVE-2022-1796" ref_url="https://www.suse.com/security/cve/CVE-2022-1796/" source="CVE"/>
		<reference ref_id="CVE-2022-1851" ref_url="https://www.suse.com/security/cve/CVE-2022-1851/" source="CVE"/>
		<reference ref_id="CVE-2022-1897" ref_url="https://www.suse.com/security/cve/CVE-2022-1897/" source="CVE"/>
		<reference ref_id="CVE-2022-1898" ref_url="https://www.suse.com/security/cve/CVE-2022-1898/" source="CVE"/>
		<reference ref_id="CVE-2022-1927" ref_url="https://www.suse.com/security/cve/CVE-2022-1927/" source="CVE"/>
		<reference ref_id="CVE-2022-1968" ref_url="https://www.suse.com/security/cve/CVE-2022-1968/" source="CVE"/>
		<reference ref_id="CVE-2022-2124" ref_url="https://www.suse.com/security/cve/CVE-2022-2124/" source="CVE"/>
		<reference ref_id="CVE-2022-2125" ref_url="https://www.suse.com/security/cve/CVE-2022-2125/" source="CVE"/>
		<reference ref_id="CVE-2022-2126" ref_url="https://www.suse.com/security/cve/CVE-2022-2126/" source="CVE"/>
		<reference ref_id="CVE-2022-2129" ref_url="https://www.suse.com/security/cve/CVE-2022-2129/" source="CVE"/>
		<reference ref_id="CVE-2022-2175" ref_url="https://www.suse.com/security/cve/CVE-2022-2175/" source="CVE"/>
		<reference ref_id="CVE-2022-2182" ref_url="https://www.suse.com/security/cve/CVE-2022-2182/" source="CVE"/>
		<reference ref_id="CVE-2022-2183" ref_url="https://www.suse.com/security/cve/CVE-2022-2183/" source="CVE"/>
		<reference ref_id="CVE-2022-2206" ref_url="https://www.suse.com/security/cve/CVE-2022-2206/" source="CVE"/>
		<reference ref_id="CVE-2022-2207" ref_url="https://www.suse.com/security/cve/CVE-2022-2207/" source="CVE"/>
		<reference ref_id="CVE-2022-2208" ref_url="https://www.suse.com/security/cve/CVE-2022-2208/" source="CVE"/>
		<reference ref_id="CVE-2022-2210" ref_url="https://www.suse.com/security/cve/CVE-2022-2210/" source="CVE"/>
		<reference ref_id="CVE-2022-2231" ref_url="https://www.suse.com/security/cve/CVE-2022-2231/" source="CVE"/>
		<reference ref_id="CVE-2022-2257" ref_url="https://www.suse.com/security/cve/CVE-2022-2257/" source="CVE"/>
		<reference ref_id="CVE-2022-2264" ref_url="https://www.suse.com/security/cve/CVE-2022-2264/" source="CVE"/>
		<reference ref_id="CVE-2022-2284" ref_url="https://www.suse.com/security/cve/CVE-2022-2284/" source="CVE"/>
		<reference ref_id="CVE-2022-2285" ref_url="https://www.suse.com/security/cve/CVE-2022-2285/" source="CVE"/>
		<reference ref_id="CVE-2022-2286" ref_url="https://www.suse.com/security/cve/CVE-2022-2286/" source="CVE"/>
		<reference ref_id="CVE-2022-2287" ref_url="https://www.suse.com/security/cve/CVE-2022-2287/" source="CVE"/>
		<reference ref_id="CVE-2022-2304" ref_url="https://www.suse.com/security/cve/CVE-2022-2304/" source="CVE"/>
		<reference ref_id="CVE-2022-2343" ref_url="https://www.suse.com/security/cve/CVE-2022-2343/" source="CVE"/>
		<reference ref_id="CVE-2022-2344" ref_url="https://www.suse.com/security/cve/CVE-2022-2344/" source="CVE"/>
		<reference ref_id="CVE-2022-2345" ref_url="https://www.suse.com/security/cve/CVE-2022-2345/" source="CVE"/>
		<reference ref_id="CVE-2022-2522" ref_url="https://www.suse.com/security/cve/CVE-2022-2522/" source="CVE"/>
		<reference ref_id="CVE-2022-2571" ref_url="https://www.suse.com/security/cve/CVE-2022-2571/" source="CVE"/>
		<reference ref_id="CVE-2022-2580" ref_url="https://www.suse.com/security/cve/CVE-2022-2580/" source="CVE"/>
		<reference ref_id="CVE-2022-2581" ref_url="https://www.suse.com/security/cve/CVE-2022-2581/" source="CVE"/>
		<reference ref_id="CVE-2022-2598" ref_url="https://www.suse.com/security/cve/CVE-2022-2598/" source="CVE"/>
		<reference ref_id="CVE-2022-2816" ref_url="https://www.suse.com/security/cve/CVE-2022-2816/" source="CVE"/>
		<reference ref_id="CVE-2022-2817" ref_url="https://www.suse.com/security/cve/CVE-2022-2817/" source="CVE"/>
		<reference ref_id="CVE-2022-2819" ref_url="https://www.suse.com/security/cve/CVE-2022-2819/" source="CVE"/>
		<reference ref_id="CVE-2022-2845" ref_url="https://www.suse.com/security/cve/CVE-2022-2845/" source="CVE"/>
		<reference ref_id="CVE-2022-2849" ref_url="https://www.suse.com/security/cve/CVE-2022-2849/" source="CVE"/>
		<reference ref_id="CVE-2022-2862" ref_url="https://www.suse.com/security/cve/CVE-2022-2862/" source="CVE"/>
		<reference ref_id="CVE-2022-2874" ref_url="https://www.suse.com/security/cve/CVE-2022-2874/" source="CVE"/>
		<reference ref_id="CVE-2022-2889" ref_url="https://www.suse.com/security/cve/CVE-2022-2889/" source="CVE"/>
		<reference ref_id="CVE-2022-2923" ref_url="https://www.suse.com/security/cve/CVE-2022-2923/" source="CVE"/>
		<reference ref_id="CVE-2022-2946" ref_url="https://www.suse.com/security/cve/CVE-2022-2946/" source="CVE"/>
		<reference ref_id="CVE-2022-2980" ref_url="https://www.suse.com/security/cve/CVE-2022-2980/" source="CVE"/>
		<reference ref_id="CVE-2022-2982" ref_url="https://www.suse.com/security/cve/CVE-2022-2982/" source="CVE"/>
		<reference ref_id="CVE-2022-3016" ref_url="https://www.suse.com/security/cve/CVE-2022-3016/" source="CVE"/>
		<reference ref_id="CVE-2022-3037" ref_url="https://www.suse.com/security/cve/CVE-2022-3037/" source="CVE"/>
		<reference ref_id="CVE-2022-3099" ref_url="https://www.suse.com/security/cve/CVE-2022-3099/" source="CVE"/>
		<reference ref_id="CVE-2022-3134" ref_url="https://www.suse.com/security/cve/CVE-2022-3134/" source="CVE"/>
		<reference ref_id="CVE-2022-3153" ref_url="https://www.suse.com/security/cve/CVE-2022-3153/" source="CVE"/>
		<reference ref_id="CVE-2022-3234" ref_url="https://www.suse.com/security/cve/CVE-2022-3234/" source="CVE"/>
		<reference ref_id="CVE-2022-3235" ref_url="https://www.suse.com/security/cve/CVE-2022-3235/" source="CVE"/>
		<reference ref_id="CVE-2022-3278" ref_url="https://www.suse.com/security/cve/CVE-2022-3278/" source="CVE"/>
		<reference ref_id="CVE-2022-3296" ref_url="https://www.suse.com/security/cve/CVE-2022-3296/" source="CVE"/>
		<reference ref_id="CVE-2022-3297" ref_url="https://www.suse.com/security/cve/CVE-2022-3297/" source="CVE"/>
		<reference ref_id="CVE-2022-3324" ref_url="https://www.suse.com/security/cve/CVE-2022-3324/" source="CVE"/>
		<reference ref_id="CVE-2022-3352" ref_url="https://www.suse.com/security/cve/CVE-2022-3352/" source="CVE"/>
		<reference ref_id="CVE-2022-3705" ref_url="https://www.suse.com/security/cve/CVE-2022-3705/" source="CVE"/>
		<description>
This update for vim fixes the following issues:

Updated to version 9.0.0814:

  * Fixing bsc#1192478 VUL-1: CVE-2021-3928: vim: vim is vulnerable to Stack-based Buffer Overflow
  * Fixing bsc#1203508 VUL-0: CVE-2022-3234: vim: Heap-based Buffer Overflow prior to 9.0.0483.
  * Fixing bsc#1203509 VUL-1: CVE-2022-3235: vim: Use After Free in GitHub prior to 9.0.0490.
  * Fixing bsc#1203820 VUL-0: CVE-2022-3324: vim: Stack-based Buffer Overflow in prior to 9.0.0598.
  * Fixing bsc#1204779 VUL-0: CVE-2022-3705: vim: use after free in function qf_update_buffer of the file quickfix.c
  * Fixing bsc#1203152 VUL-1: CVE-2022-2982: vim: use after free in qf_fill_buffer()
  * Fixing bsc#1203796 VUL-1: CVE-2022-3296: vim: stack out of bounds read in ex_finally() in ex_eval.c
  * Fixing bsc#1203797 VUL-1: CVE-2022-3297: vim: use-after-free in process_next_cpt_value() at insexpand.c
  * Fixing bsc#1203110 VUL-1: CVE-2022-3099: vim: Use After Free in ex_docmd.c
  * Fixing bsc#1203194 VUL-1: CVE-2022-3134: vim: use after free in do_tag()
  * Fixing bsc#1203272 VUL-1: CVE-2022-3153: vim: NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.
  * Fixing bsc#1203799 VUL-1: CVE-2022-3278: vim: NULL pointer dereference in eval_next_non_blank() in eval.c
  * Fixing bsc#1203924 VUL-1: CVE-2022-3352: vim: vim: use after free
  * Fixing bsc#1203155 VUL-1: CVE-2022-2980: vim: null pointer dereference in do_mouse()
  * Fixing bsc#1202962 VUL-1: CVE-2022-3037: vim: Use After Free in vim prior to 9.0.0321
  * Fixing bsc#1200884 Vim: Error on startup
  * Fixing bsc#1200902 VUL-0: CVE-2022-2183: vim: Out-of-bounds Read through get_lisp_indent() Mon 13:32
  * Fixing bsc#1200903 VUL-0: CVE-2022-2182: vim: Heap-based Buffer Overflow through parse_cmd_address() Tue 08:37
  * Fixing bsc#1200904 VUL-0: CVE-2022-2175: vim: Buffer Over-read through cmdline_insert_reg() Tue 08:37
  * Fixing bsc#1201249 VUL-0: CVE-2022-2304: vim: stack buffer overflow in spell_dump_compl()
  * Fixing bsc#1201356 VUL-1: CVE-2022-2343: vim: Heap-based Buffer Overflow in GitHub repository vim prior to 9.0.0044
  * Fixing bsc#1201359 VUL-1: CVE-2022-2344: vim: Another Heap-based Buffer Overflow vim prior to 9.0.0045
  * Fixing bsc#1201363 VUL-1: CVE-2022-2345: vim: Use After Free in GitHub repository vim prior to 9.0.0046.
  * Fixing bsc#1201620 vim: SLE-15-SP4-Full-x86_64-GM-Media1 and vim-plugin-tlib-1.27-bp154.2.18.noarch issue
  * Fixing bsc#1202414 VUL-1: CVE-2022-2819: vim: Heap-based Buffer Overflow in compile_lock_unlock()
  * Fixing bsc#1202552 VUL-1: CVE-2022-2874: vim: NULL Pointer Dereference in generate_loadvar()
  * Fixing bsc#1200270 VUL-1: CVE-2022-1968: vim: use after free in utf_ptr2char
  * Fixing bsc#1200697 VUL-1: CVE-2022-2124: vim: out of bounds read in current_quote()
  * Fixing bsc#1200698 VUL-1: CVE-2022-2125: vim: out of bounds read in get_lisp_indent()
  * Fixing bsc#1200700 VUL-1: CVE-2022-2126: vim: out of bounds read in suggest_trie_walk()
  * Fixing bsc#1200701 VUL-1: CVE-2022-2129: vim: out of bounds write in vim_regsub_both()
  * Fixing bsc#1200732 VUL-1: CVE-2022-1720: vim: out of bounds read in grab_file_name()
  * Fixing bsc#1201132 VUL-1: CVE-2022-2264: vim: out of bounds read in inc()
  * Fixing bsc#1201133 VUL-1: CVE-2022-2284: vim: out of bounds read in utfc_ptr2len()
  * Fixing bsc#1201134 VUL-1: CVE-2022-2285: vim: negative size passed to memmove() due to integer overflow
  * Fixing bsc#1201135 VUL-1: CVE-2022-2286: vim: out of bounds read in ins_bytes()
  * Fixing bsc#1201136 VUL-1: CVE-2022-2287: vim: out of bounds read in suggest_trie_walk()
  * Fixing bsc#1201150 VUL-1: CVE-2022-2231: vim: null pointer dereference skipwhite()
  * Fixing bsc#1201151 VUL-1: CVE-2022-2210: vim: out of bounds read in ml_append_int()
  * Fixing bsc#1201152 VUL-1: CVE-2022-2208: vim: null pointer dereference in diff_check()
  * Fixing bsc#1201153 VUL-1: CVE-2022-2207: vim: out of bounds read in ins_bs()
  * Fixing bsc#1201154 VUL-1: CVE-2022-2257: vim: out of bounds read in msg_outtrans_special()
  * Fixing bsc#1201155 VUL-1: CVE-2022-2206: vim: out of bounds read in msg_outtrans_attr()
  * Fixing bsc#1201863 VUL-1: CVE-2022-2522: vim: out of bounds read via nested autocommand
  * Fixing bsc#1202046 VUL-1: CVE-2022-2571: vim: Heap-based Buffer Overflow related to ins_comp_get_next_word_or_line()
  * Fixing bsc#1202049 VUL-1: CVE-2022-2580: vim: Heap-based Buffer Overflow related to eval_string()
  * Fixing bsc#1202050 VUL-1: CVE-2022-2581: vim: Out-of-bounds Read related to cstrchr()
  * Fixing bsc#1202051 VUL-1: CVE-2022-2598: vim: Undefined Behavior for Input to API related to diff_mark_adjust_tp() and ex_diffgetput()
  * Fixing bsc#1202420 VUL-1: CVE-2022-2817: vim: Use After Free in f_assert_fails()
  * Fixing bsc#1202421 VUL-1: CVE-2022-2816: vim: Out-of-bounds Read in check_vim9_unlet()
  * Fixing bsc#1202511 VUL-1: CVE-2022-2862: vim: use-after-free in compile_nested_function()
  * Fixing bsc#1202512 VUL-1: CVE-2022-2849: vim: Invalid memory access related to mb_ptr2len()
  * Fixing bsc#1202515 VUL-1: CVE-2022-2845: vim: Buffer Over-read related to display_dollar()
  * Fixing bsc#1202599 VUL-1: CVE-2022-2889: vim: use-after-free in find_var_also_in_script() in evalvars.c
  * Fixing bsc#1202687 VUL-1: CVE-2022-2923: vim: NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240
  * Fixing bsc#1202689 VUL-1: CVE-2022-2946: vim: use after free in function vim_vsnprintf_typval
  * Fixing bsc#1202862 VUL-1: CVE-2022-3016: vim: Use After Free in vim prior to 9.0.0285 Mon 12:00
  * Fixing bsc#1191770 VUL-0: CVE-2021-3875: vim: heap-based buffer overflow 
  * Fixing bsc#1192167 VUL-0: CVE-2021-3903: vim: heap-based buffer overflow 
  * Fixing bsc#1192902 VUL-0: CVE-2021-3968: vim: vim is vulnerable to 
    Heap-based Buffer Overflow 
  * Fixing bsc#1192903 VUL-0: CVE-2021-3973: vim: vim is vulnerable to 
    Heap-based Buffer Overflow 
  * Fixing bsc#1192904 VUL-0: CVE-2021-3974: vim: vim is vulnerable to Use
    After Free 
  * Fixing bsc#1193466 VUL-1: CVE-2021-4069: vim: use-after-free in ex_open()
    in src/ex_docmd.c 
  * Fixing bsc#1193905 VUL-0: CVE-2021-4136: vim: vim is vulnerable to
    Heap-based Buffer Overflow 
  * Fixing bsc#1194093 VUL-1: CVE-2021-4166: vim: vim is vulnerable to
    Out-of-bounds Read 
  * Fixing bsc#1194216 VUL-1: CVE-2021-4193: vim: vulnerable to 
    Out-of-bounds Read 
  * Fixing bsc#1194217 VUL-0: CVE-2021-4192: vim: vulnerable to Use After Free
  * Fixing bsc#1194872 VUL-0: CVE-2022-0261: vim: Heap-based Buffer Overflow
    in vim prior to 8.2. 
  * Fixing bsc#1194885 VUL-0: CVE-2022-0213: vim: vim is vulnerable to
    Heap-based Buffer Overflow 
  * Fixing bsc#1195004 VUL-0: CVE-2022-0318: vim: Heap-based Buffer Overflow in
    vim prior to 8.2. 
  * Fixing bsc#1195203 VUL-0: CVE-2022-0359: vim: heap-based buffer overflow in
    init_ccline() in ex_getln.c 
  * Fixing bsc#1195354 VUL-0: CVE-2022-0407: vim: Heap-based Buffer Overflow in
    Conda vim prior to 8.2. 
  * Fixing bsc#1198596 VUL-0: CVE-2022-1381: vim: global heap buffer overflow
    in skip_range 
  * Fixing bsc#1199331 VUL-0: CVE-2022-1616: vim: Use after free in
    append_command 
  * Fixing bsc#1199333 VUL-0: CVE-2022-1619: vim: Heap-based Buffer Overflow in
    function cmdline_erase_chars 
  * Fixing bsc#1199334 VUL-0: CVE-2022-1620: vim: NULL Pointer Dereference in
    function vim_regexec_string 
  * Fixing bsc#1199747 VUL-0: CVE-2022-1796: vim: Use After in
    find_pattern_in_path 
  * Fixing bsc#1200010 VUL-0: CVE-2022-1897: vim: Out-of-bounds Write in vim 
  * Fixing bsc#1200011 VUL-0: CVE-2022-1898: vim: Use After Free in vim prior
    to 8.2 
  * Fixing bsc#1200012 VUL-0: CVE-2022-1927: vim: Buffer Over-read in vim prior
    to 8.2 
  * Fixing bsc#1070955 VUL-1: CVE-2017-17087: vim: Sets the group ownership of a
    .swp file to the editor's primary group, which allows local users to obtain
    sensitive information 
  * Fixing bsc#1194388 VUL-1: CVE-2022-0128: vim: vim is vulnerable to
    Out-of-bounds Read 
  * Fixing bsc#1195332 VUL-1: CVE-2022-0392: vim: Heap-based Buffer Overflow
    in vim prior to 8.2 
  * Fixing bsc#1196361 VUL-1: CVE-2022-0696: vim: NULL Pointer Dereference in
    vim prior to 8.2 
  * Fixing bsc#1198748 VUL-1: CVE-2022-1420: vim: Out-of-range Pointer Offset 
  * Fixing bsc#1199651 VUL-1: CVE-2022-1735: vim: heap buffer overflow 
  * Fixing bsc#1199655 VUL-1: CVE-2022-1733: vim: Heap-based Buffer Overflow in
    cindent.c 
  * Fixing bsc#1199693 VUL-1: CVE-2022-1771: vim: stack exhaustion in vim prior
    to 8.2. 
  * Fixing bsc#1199745 VUL-1: CVE-2022-1785: vim: Out-of-bounds Write 
  * Fixing bsc#1199936 VUL-1: CVE-2022-1851: vim: out of bounds read 
  * Fixing bsc#1195004 - (CVE-2022-0318) VUL-0: CVE-2022-0318: vim: Heap-based Buffer Overflow in vim prior to 8.2.
  * Fixing bsc#1190570 CVE-2021-3796: vim: use-after-free in nv_replace() in normal.c
  * Fixing bsc#1191893 CVE-2021-3872: vim: heap-based buffer overflow in win_redr_status() drawscreen.c
  * Fixing bsc#1192481 CVE-2021-3927: vim: vim is vulnerable to Heap-based Buffer Overflow
  * Fixing bsc#1192478 CVE-2021-3928: vim: vim is vulnerable to Stack-based Buffer Overflow
  * Fixing bsc#1193294 CVE-2021-4019: vim: vim is vulnerable to Heap-based Buffer Overflow
  * Fixing bsc#1193298 CVE-2021-3984: vim: illegal memory access when C-indenting could lead to Heap Buffer Overflow
  * Fixing bsc#1190533 CVE-2021-3778: vim: Heap-based Buffer Overflow in regexp_nfa.c
  *  Fixing bsc#1194216 CVE-2021-4193: vim: vulnerable to Out-of-bounds Read
  * Fixing bsc#1194556 CVE-2021-46059: vim: A Pointer Dereference vulnerability 
    exists in Vim 8.2.3883 via the vim_regexec_multi function at regexp.c, which causes a denial of service. 
  * Fixing bsc#1195066 CVE-2022-0319: vim: Out-of-bounds Read in vim/vim prior to 8.2.
  * Fixing bsc#1195126 CVE-2022-0351: vim: uncontrolled recursion in eval7()
  * Fixing bsc#1195202 CVE-2022-0361: vim: Heap-based Buffer Overflow in vim prior to 8.2.
  * Fixing bsc#1195356 CVE-2022-0413: vim: use after free in src/ex_cmds.c
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-27"/>
	<updated date="2022-12-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1070955">SUSE bug 1070955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173256">SUSE bug 1173256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174564">SUSE bug 1174564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176549">SUSE bug 1176549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182324">SUSE bug 1182324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190533">SUSE bug 1190533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190570">SUSE bug 1190570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191770">SUSE bug 1191770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191893">SUSE bug 1191893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192167">SUSE bug 1192167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192478">SUSE bug 1192478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192481">SUSE bug 1192481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192902">SUSE bug 1192902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192903">SUSE bug 1192903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192904">SUSE bug 1192904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193294">SUSE bug 1193294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193298">SUSE bug 1193298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193466">SUSE bug 1193466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193905">SUSE bug 1193905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194093">SUSE bug 1194093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194216">SUSE bug 1194216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194217">SUSE bug 1194217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194388">SUSE bug 1194388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194556">SUSE bug 1194556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194872">SUSE bug 1194872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194885">SUSE bug 1194885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195004">SUSE bug 1195004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195066">SUSE bug 1195066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195126">SUSE bug 1195126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195202">SUSE bug 1195202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195203">SUSE bug 1195203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195332">SUSE bug 1195332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195354">SUSE bug 1195354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195356">SUSE bug 1195356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196361">SUSE bug 1196361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198596">SUSE bug 1198596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198748">SUSE bug 1198748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199331">SUSE bug 1199331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199333">SUSE bug 1199333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199334">SUSE bug 1199334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199651">SUSE bug 1199651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199655">SUSE bug 1199655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199693">SUSE bug 1199693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199745">SUSE bug 1199745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199747">SUSE bug 1199747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199936">SUSE bug 1199936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200010">SUSE bug 1200010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200011">SUSE bug 1200011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200012">SUSE bug 1200012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200270">SUSE bug 1200270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200697">SUSE bug 1200697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200698">SUSE bug 1200698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200700">SUSE bug 1200700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200701">SUSE bug 1200701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200732">SUSE bug 1200732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200884">SUSE bug 1200884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200902">SUSE bug 1200902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200903">SUSE bug 1200903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200904">SUSE bug 1200904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201132">SUSE bug 1201132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201133">SUSE bug 1201133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201134">SUSE bug 1201134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201135">SUSE bug 1201135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201136">SUSE bug 1201136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201150">SUSE bug 1201150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201151">SUSE bug 1201151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201152">SUSE bug 1201152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201153">SUSE bug 1201153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201154">SUSE bug 1201154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201155">SUSE bug 1201155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201249">SUSE bug 1201249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201356">SUSE bug 1201356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201359">SUSE bug 1201359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201363">SUSE bug 1201363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201620">SUSE bug 1201620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201863">SUSE bug 1201863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202046">SUSE bug 1202046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202049">SUSE bug 1202049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202050">SUSE bug 1202050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202051">SUSE bug 1202051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202414">SUSE bug 1202414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202420">SUSE bug 1202420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202421">SUSE bug 1202421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202511">SUSE bug 1202511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202512">SUSE bug 1202512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202515">SUSE bug 1202515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202552">SUSE bug 1202552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202599">SUSE bug 1202599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202687">SUSE bug 1202687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202689">SUSE bug 1202689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202862">SUSE bug 1202862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202962">SUSE bug 1202962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203110">SUSE bug 1203110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203152">SUSE bug 1203152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203155">SUSE bug 1203155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203194">SUSE bug 1203194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203272">SUSE bug 1203272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203508">SUSE bug 1203508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203509">SUSE bug 1203509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203796">SUSE bug 1203796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203797">SUSE bug 1203797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203799">SUSE bug 1203799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203820">SUSE bug 1203820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203924">SUSE bug 1203924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204779">SUSE bug 1204779</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0316/">CVE-2009-0316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0316">CVE-2009-0316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1248/">CVE-2016-1248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1248">CVE-2016-1248 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17087/">CVE-2017-17087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17087">CVE-2017-17087 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5953">CVE-2017-5953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6349/">CVE-2017-6349 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6349">CVE-2017-6349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6350/">CVE-2017-6350 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6350">CVE-2017-6350 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3778/">CVE-2021-3778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3778">CVE-2021-3778 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3796/">CVE-2021-3796 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3796">CVE-2021-3796 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3872/">CVE-2021-3872 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3872">CVE-2021-3872 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3875/">CVE-2021-3875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3875">CVE-2021-3875 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3903/">CVE-2021-3903 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3903">CVE-2021-3903 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3927/">CVE-2021-3927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3927">CVE-2021-3927 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3928/">CVE-2021-3928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3928">CVE-2021-3928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3968/">CVE-2021-3968 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3968">CVE-2021-3968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3973/">CVE-2021-3973 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3973">CVE-2021-3973 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3974/">CVE-2021-3974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3974">CVE-2021-3974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3984/">CVE-2021-3984 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3984">CVE-2021-3984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4019/">CVE-2021-4019 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4019">CVE-2021-4019 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4069/">CVE-2021-4069 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4069">CVE-2021-4069 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4136/">CVE-2021-4136 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4136">CVE-2021-4136 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4166/">CVE-2021-4166 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4166">CVE-2021-4166 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4192/">CVE-2021-4192 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4192">CVE-2021-4192 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4193/">CVE-2021-4193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4193">CVE-2021-4193 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46059/">CVE-2021-46059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-46059">CVE-2021-46059 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0128/">CVE-2022-0128 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0128">CVE-2022-0128 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0213/">CVE-2022-0213 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0213">CVE-2022-0213 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0261/">CVE-2022-0261 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0261">CVE-2022-0261 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0318/">CVE-2022-0318 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0318">CVE-2022-0318 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0319/">CVE-2022-0319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0319">CVE-2022-0319 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0351/">CVE-2022-0351 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0351">CVE-2022-0351 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0359/">CVE-2022-0359 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0359">CVE-2022-0359 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0361/">CVE-2022-0361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0361">CVE-2022-0361 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0392/">CVE-2022-0392 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0392">CVE-2022-0392 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0407/">CVE-2022-0407 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0407">CVE-2022-0407 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0413/">CVE-2022-0413 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0413">CVE-2022-0413 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0696/">CVE-2022-0696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0696">CVE-2022-0696 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1381/">CVE-2022-1381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1381">CVE-2022-1381 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1420/">CVE-2022-1420 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">CVE-2022-1420 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1616/">CVE-2022-1616 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1616">CVE-2022-1616 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1619/">CVE-2022-1619 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1619">CVE-2022-1619 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1620/">CVE-2022-1620 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1620">CVE-2022-1620 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1720/">CVE-2022-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1720">CVE-2022-1720 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1733/">CVE-2022-1733 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1733">CVE-2022-1733 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1735/">CVE-2022-1735 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1735">CVE-2022-1735 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1771/">CVE-2022-1771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1771">CVE-2022-1771 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1785/">CVE-2022-1785 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">CVE-2022-1785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1796/">CVE-2022-1796 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1796">CVE-2022-1796 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1851/">CVE-2022-1851 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1851">CVE-2022-1851 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1897/">CVE-2022-1897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1897">CVE-2022-1897 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1898/">CVE-2022-1898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1898">CVE-2022-1898 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-1927/">CVE-2022-1927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1927">CVE-2022-1927 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1968/">CVE-2022-1968 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1968">CVE-2022-1968 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2124/">CVE-2022-2124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2124">CVE-2022-2124 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2125/">CVE-2022-2125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2125">CVE-2022-2125 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2126/">CVE-2022-2126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2126">CVE-2022-2126 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2129/">CVE-2022-2129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2129">CVE-2022-2129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2175/">CVE-2022-2175 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2175">CVE-2022-2175 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2182/">CVE-2022-2182 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2182">CVE-2022-2182 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2183/">CVE-2022-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2183">CVE-2022-2183 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2206/">CVE-2022-2206 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2206">CVE-2022-2206 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2207/">CVE-2022-2207 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2207">CVE-2022-2207 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2208/">CVE-2022-2208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2208">CVE-2022-2208 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2210/">CVE-2022-2210 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2210">CVE-2022-2210 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2231/">CVE-2022-2231 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2231">CVE-2022-2231 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2257/">CVE-2022-2257 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2257">CVE-2022-2257 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2264/">CVE-2022-2264 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2264">CVE-2022-2264 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2284/">CVE-2022-2284 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2284">CVE-2022-2284 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2285/">CVE-2022-2285 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2285">CVE-2022-2285 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2286/">CVE-2022-2286 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2286">CVE-2022-2286 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2287/">CVE-2022-2287 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2287">CVE-2022-2287 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2304/">CVE-2022-2304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2304">CVE-2022-2304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2343/">CVE-2022-2343 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2343">CVE-2022-2343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2344/">CVE-2022-2344 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2344">CVE-2022-2344 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2345/">CVE-2022-2345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2345">CVE-2022-2345 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2522/">CVE-2022-2522 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2522">CVE-2022-2522 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2571/">CVE-2022-2571 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2571">CVE-2022-2571 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2580/">CVE-2022-2580 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2580">CVE-2022-2580 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2581/">CVE-2022-2581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2581">CVE-2022-2581 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2598/">CVE-2022-2598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2598">CVE-2022-2598 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2816/">CVE-2022-2816 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2816">CVE-2022-2816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2817/">CVE-2022-2817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2817">CVE-2022-2817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2819/">CVE-2022-2819 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2819">CVE-2022-2819 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2845/">CVE-2022-2845 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2845">CVE-2022-2845 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2849/">CVE-2022-2849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2849">CVE-2022-2849 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2862/">CVE-2022-2862 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2862">CVE-2022-2862 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2874/">CVE-2022-2874 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2874">CVE-2022-2874 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2889/">CVE-2022-2889 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2889">CVE-2022-2889 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2923/">CVE-2022-2923 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2923">CVE-2022-2923 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2946/">CVE-2022-2946 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2946">CVE-2022-2946 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2980/">CVE-2022-2980 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2980">CVE-2022-2980 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2982/">CVE-2022-2982 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2982">CVE-2022-2982 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3016/">CVE-2022-3016 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3016">CVE-2022-3016 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3037/">CVE-2022-3037 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3037">CVE-2022-3037 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3099/">CVE-2022-3099 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3099">CVE-2022-3099 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3134/">CVE-2022-3134 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3134">CVE-2022-3134 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3153/">CVE-2022-3153 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3153">CVE-2022-3153 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3234/">CVE-2022-3234 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3234">CVE-2022-3234 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3235/">CVE-2022-3235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3235">CVE-2022-3235 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3278/">CVE-2022-3278 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3278">CVE-2022-3278 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-3296/">CVE-2022-3296 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3296">CVE-2022-3296 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3297/">CVE-2022-3297 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3297">CVE-2022-3297 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3324/">CVE-2022-3324 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3324">CVE-2022-3324 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3352/">CVE-2022-3352 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3352">CVE-2022-3352 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3705/">CVE-2022-3705 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3705">CVE-2022-3705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009728192" comment="gvim-9.0.0814-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728193" comment="vim-9.0.0814-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728128" comment="vim-data-9.0.0814-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728129" comment="vim-data-common-9.0.0814-17.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009728192" comment="gvim-9.0.0814-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728193" comment="vim-9.0.0814-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728128" comment="vim-data-9.0.0814-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728129" comment="vim-data-common-9.0.0814-17.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152844" version="1" class="patch">
	<metadata>
		<title>Security update for ca-certificates-mozilla (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206212" ref_url="https://bugzilla.suse.com/1206212" source="BUGZILLA"/>
		<reference ref_id="1206622" ref_url="https://bugzilla.suse.com/1206622" source="BUGZILLA"/>
		<description>
This update for ca-certificates-mozilla fixes the following issues:

- Updated to 2.60 state of Mozilla SSL root CAs (bsc#1206622)
  Removed CAs:
  - Global Chambersign Root
  - EC-ACC
  - Network Solutions Certificate Authority
  - Staat der Nederlanden EV Root CA
  - SwissSign Platinum CA - G2
  Added CAs:
  - DIGITALSIGN GLOBAL ROOT ECDSA CA
  - DIGITALSIGN GLOBAL ROOT RSA CA
  - Security Communication ECC RootCA1
  - Security Communication RootCA3
  Changed trust:
  - TrustCor certificates only trusted up to Nov 30 (bsc#1206212)

- Removed CAs (bsc#1206212) as most code does not handle 'valid before nov 30 2022'
  and it is not clear how many certs were issued for SSL middleware by TrustCor:
  - TrustCor RootCert CA-1
  - TrustCor RootCert CA-2
  - TrustCor ECA-1
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-27"/>
	<updated date="2022-12-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206212">SUSE bug 1206212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206622">SUSE bug 1206622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730139" comment="ca-certificates-mozilla-2.60-12.40.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730139" comment="ca-certificates-mozilla-2.60-12.40.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152845" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1195389" ref_url="https://bugzilla.suse.com/1195389" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0135" ref_url="https://www.suse.com/security/cve/CVE-2022-0135/" source="CVE"/>
		<description>
This update for virglrenderer fixes the following issues:

- CVE-2022-0135: Fixed out-of-bonds write in read_transfer_data() (bsc#1195389).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195389">SUSE bug 1195389</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0135/">CVE-2022-0135 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0135">CVE-2022-0135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667335" comment="libvirglrenderer0-0.5.0-12.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152846" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1195054" ref_url="https://bugzilla.suse.com/1195054" source="BUGZILLA"/>
		<reference ref_id="1195217" ref_url="https://bugzilla.suse.com/1195217" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">CVE-2022-23852 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23990">CVE-2022-23990 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666236" comment="expat-2.1.0-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666237" comment="libexpat1-2.1.0-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666209" comment="libexpat1-32bit-2.1.0-21.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152847" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1071031" ref_url="https://bugzilla.suse.com/1071031" source="BUGZILLA"/>
		<reference ref_id="1154365" ref_url="https://bugzilla.suse.com/1154365" source="BUGZILLA"/>
		<reference ref_id="1182808" ref_url="https://bugzilla.suse.com/1182808" source="BUGZILLA"/>
		<reference ref_id="1182809" ref_url="https://bugzilla.suse.com/1182809" source="BUGZILLA"/>
		<reference ref_id="1182811" ref_url="https://bugzilla.suse.com/1182811" source="BUGZILLA"/>
		<reference ref_id="1182812" ref_url="https://bugzilla.suse.com/1182812" source="BUGZILLA"/>
		<reference ref_id="1190312" ref_url="https://bugzilla.suse.com/1190312" source="BUGZILLA"/>
		<reference ref_id="1194539" ref_url="https://bugzilla.suse.com/1194539" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17095" ref_url="https://www.suse.com/security/cve/CVE-2017-17095/" source="CVE"/>
		<reference ref_id="CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546/" source="CVE"/>
		<reference ref_id="CVE-2020-19131" ref_url="https://www.suse.com/security/cve/CVE-2020-19131/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<reference ref_id="CVE-2022-22844" ref_url="https://www.suse.com/security/cve/CVE-2022-22844/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2017-17095: Fixed DoS in tools/pal2rgb.c in pal2rgb (bsc#1071031).
- CVE-2019-17546: Fixed integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image (bsc#1154365).
- CVE-2020-19131: Fixed buffer overflow in tiffcrop that may cause DoS via the invertImage() function (bsc#1190312).
- CVE-2020-35521: Fixed memory allocation failure in tif_read.c (bsc#1182808).
- CVE-2020-35522: Fixed memory allocation failure in tif_pixarlog.c (bsc#1182809).
- CVE-2020-35523: Fixed integer overflow in tif_getimage.c (bsc#1182811).
- CVE-2020-35524: Fixed heap-based buffer overflow in TIFF2PDF tool (bsc#1182812).
- CVE-2022-22844: Fixed out-of-bounds read in _TIFFmemcpy in tif_unix.c (bsc#1194539).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071031">SUSE bug 1071031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154365">SUSE bug 1154365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182808">SUSE bug 1182808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182809">SUSE bug 1182809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182811">SUSE bug 1182811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182812">SUSE bug 1182812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190312">SUSE bug 1190312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194539">SUSE bug 1194539</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17095/">CVE-2017-17095 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17095">CVE-2017-17095 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17546">CVE-2019-17546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-19131/">CVE-2020-19131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19131">CVE-2020-19131 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35521">CVE-2020-35521 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35522">CVE-2020-35522 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35523">CVE-2020-35523 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35524">CVE-2020-35524 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22844/">CVE-2022-22844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22844">CVE-2022-22844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666234" comment="libtiff5-4.0.9-44.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666205" comment="libtiff5-32bit-4.0.9-44.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666235" comment="tiff-4.0.9-44.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152848" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1195825" ref_url="https://bugzilla.suse.com/1195825" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2018-16301: Fixed segfault when handling large files (bsc#1195825).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668119" comment="tcpdump-4.9.2-14.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152849" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1195542" ref_url="https://bugzilla.suse.com/1195542" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4115" ref_url="https://www.suse.com/security/cve/CVE-2021-4115/" source="CVE"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-4115: Fixed a denial of service via file descriptor leak (bsc#1195542).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195542">SUSE bug 1195542</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4115/">CVE-2021-4115 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4115">CVE-2021-4115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668381" comment="libpolkit0-0.113-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668382" comment="polkit-0.113-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668383" comment="typelib-1_0-Polkit-1_0-0.113-5.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152850" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1195108" ref_url="https://bugzilla.suse.com/1195108" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<description>
This update for xerces-j2 fixes the following issues:

- CVE-2022-23437: Fixed infinite loop within Apache XercesJ xml parser (bsc#1195108).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-21"/>
	<updated date="2022-02-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23437">CVE-2022-23437 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667934" comment="xerces-j2-2.8.1-268.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667935" comment="xerces-j2-xml-apis-2.8.1-268.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667936" comment="xerces-j2-xml-resolver-2.8.1-268.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152851" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188437" ref_url="https://bugzilla.suse.com/1188437" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27845" ref_url="https://www.suse.com/security/cve/CVE-2021-27845/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2021-27845: Fixed divide-by-zery issue in cp_create() (bsc#1188437).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-24"/>
	<updated date="2022-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188437">SUSE bug 1188437</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-27845/">CVE-2021-27845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27845">CVE-2021-27845 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668379" comment="libjasper1-1.900.14-195.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668380" comment="libjasper1-32bit-1.900.14-195.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152852" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1195230" ref_url="https://bugzilla.suse.com/1195230" source="BUGZILLA"/>
		<reference ref_id="1195682" ref_url="https://bugzilla.suse.com/1195682" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682)

- CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via Maintenance Service
- CVE-2022-22754: Extensions could have bypassed permission confirmation during update
- CVE-2022-22756: Drag and dropping an image could have resulted in the dropped object being an executable
- CVE-2022-22759: Sandboxed iframes could have executed script if the parent appended elements
- CVE-2022-22760: Cross-Origin responses could be distinguished between script and non-script content-types
- CVE-2022-22761: frame-ancestors Content Security Policy directive was not enforced for framed extension pages
- CVE-2022-22763: Script Execution during invalid object state
- CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6


Firefox Extended Support Release 91.5.1 ESR (bsc#1195230)

- Fixed an issue that allowed unexpected data to be submitted in some of our search telemetry
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-24"/>
	<updated date="2022-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195230">SUSE bug 1195230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22753">CVE-2022-22753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22754">CVE-2022-22754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22756">CVE-2022-22756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22759">CVE-2022-22759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22760">CVE-2022-22760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22761">CVE-2022-22761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22763">CVE-2022-22763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22764">CVE-2022-22764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668887" comment="MozillaFirefox-91.6.0-112.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668888" comment="MozillaFirefox-devel-91.6.0-112.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668889" comment="MozillaFirefox-translations-common-91.6.0-112.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152853" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188279" ref_url="https://bugzilla.suse.com/1188279" source="BUGZILLA"/>
		<reference ref_id="1195255" ref_url="https://bugzilla.suse.com/1195255" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30640" ref_url="https://www.suse.com/security/cve/CVE-2021-30640/" source="CVE"/>
		<reference ref_id="CVE-2022-23181" ref_url="https://www.suse.com/security/cve/CVE-2022-23181/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2021-30640: Fixed incorrect parameters escape in JNDI Realm queries (bsc#1188279).
- CVE-2022-23181: Fixed incorrect calculation of session storage location (bsc#1195255).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-24"/>
	<updated date="2022-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188279">SUSE bug 1188279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195255">SUSE bug 1195255</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30640/">CVE-2021-30640 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30640">CVE-2021-30640 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23181/">CVE-2022-23181 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23181">CVE-2022-23181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669373" comment="tomcat-8.0.53-29.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669374" comment="tomcat-admin-webapps-8.0.53-29.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669375" comment="tomcat-docs-webapp-8.0.53-29.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669376" comment="tomcat-el-3_0-api-8.0.53-29.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669377" comment="tomcat-javadoc-8.0.53-29.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669378" comment="tomcat-jsp-2_3-api-8.0.53-29.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669379" comment="tomcat-lib-8.0.53-29.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669380" comment="tomcat-servlet-3_1-api-8.0.53-29.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669381" comment="tomcat-webapps-8.0.53-29.49.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152854" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192615" ref_url="https://bugzilla.suse.com/1192615" source="BUGZILLA"/>
		<reference ref_id="1195779" ref_url="https://bugzilla.suse.com/1195779" source="BUGZILLA"/>
		<reference ref_id="1195780" ref_url="https://bugzilla.suse.com/1195780" source="BUGZILLA"/>
		<reference ref_id="1195781" ref_url="https://bugzilla.suse.com/1195781" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0127" ref_url="https://www.suse.com/security/cve/CVE-2021-0127/" source="CVE"/>
		<reference ref_id="CVE-2021-0145" ref_url="https://www.suse.com/security/cve/CVE-2021-0145/" source="CVE"/>
		<reference ref_id="CVE-2021-0146" ref_url="https://www.suse.com/security/cve/CVE-2021-0146/" source="CVE"/>
		<reference ref_id="CVE-2021-33120" ref_url="https://www.suse.com/security/cve/CVE-2021-33120/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220207 release.

- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)
- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)
- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)
- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)

- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)
- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-25"/>
	<updated date="2022-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192615">SUSE bug 1192615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195779">SUSE bug 1195779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195780">SUSE bug 1195780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195781">SUSE bug 1195781</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0127/">CVE-2021-0127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0127">CVE-2021-0127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0145/">CVE-2021-0145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0145">CVE-2021-0145 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0146/">CVE-2021-0146 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0146">CVE-2021-0146 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33120/">CVE-2021-33120 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33120">CVE-2021-33120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667937" comment="ucode-intel-20220207-13.93.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152855" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194333" ref_url="https://bugzilla.suse.com/1194333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45942" ref_url="https://www.suse.com/security/cve/CVE-2021-45942/" source="CVE"/>
		<description>
This update for openexr fixes the following issues:

- CVE-2021-45942: Fixed heap-based buffer overflow in Imf_3_1:LineCompositeTask:execute. (bsc#1194333)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-12"/>
	<updated date="2022-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194333">SUSE bug 1194333</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45942/">CVE-2021-45942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45942">CVE-2021-45942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662620" comment="libIlmImf-Imf_2_1-21-2.1.0-6.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662621" comment="openexr-2.1.0-6.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152856" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193942" ref_url="https://bugzilla.suse.com/1193942" source="BUGZILLA"/>
		<reference ref_id="1193943" ref_url="https://bugzilla.suse.com/1193943" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44224" ref_url="https://www.suse.com/security/cve/CVE-2021-44224/" source="CVE"/>
		<reference ref_id="CVE-2021-44790" ref_url="https://www.suse.com/security/cve/CVE-2021-44790/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-44224: Fixed NULL dereference or SSRF in forward proxy configurations. (bsc#1193943)
- CVE-2021-44790: Fixed buffer overflow when parsing multipart content in mod_lua. (bsc#1193942)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-12"/>
	<updated date="2022-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193942">SUSE bug 1193942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193943">SUSE bug 1193943</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44224/">CVE-2021-44224 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44224">CVE-2021-44224 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44790/">CVE-2021-44790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44790">CVE-2021-44790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663078" comment="apache2-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663071" comment="apache2-doc-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663079" comment="apache2-example-pages-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663080" comment="apache2-prefork-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663081" comment="apache2-utils-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663082" comment="apache2-worker-2.4.23-29.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152857" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<description>
This update for cyrus-sasl fixes the following issues:

-  CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24407">CVE-2022-24407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669342" comment="cyrus-sasl-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669310" comment="cyrus-sasl-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669343" comment="cyrus-sasl-crammd5-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669312" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669344" comment="cyrus-sasl-digestmd5-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669345" comment="cyrus-sasl-gssapi-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669315" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669346" comment="cyrus-sasl-otp-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669317" comment="cyrus-sasl-otp-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669347" comment="cyrus-sasl-plain-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669319" comment="cyrus-sasl-plain-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669348" comment="libsasl2-3-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669321" comment="libsasl2-3-32bit-2.1.26-8.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152858" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196167" ref_url="https://bugzilla.suse.com/1196167" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4209" ref_url="https://www.suse.com/security/cve/CVE-2021-4209/" source="CVE"/>
		<description>
This update for gnutls fixes the following issues:

- CVE-2021-4209: Fixed null pointer dereference in MD_UPDATE (bsc#1196167).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196167">SUSE bug 1196167</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4209/">CVE-2021-4209 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4209">CVE-2021-4209 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669114" comment="gnutls-3.3.27-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669115" comment="libgnutls-openssl27-3.3.27-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669116" comment="libgnutls28-3.3.27-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669117" comment="libgnutls28-32bit-3.3.27-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152859" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1195064" ref_url="https://bugzilla.suse.com/1195064" source="BUGZILLA"/>
		<reference ref_id="1195735" ref_url="https://bugzilla.suse.com/1195735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30934" ref_url="https://www.suse.com/security/cve/CVE-2021-30934/" source="CVE"/>
		<reference ref_id="CVE-2021-30936" ref_url="https://www.suse.com/security/cve/CVE-2021-30936/" source="CVE"/>
		<reference ref_id="CVE-2021-30951" ref_url="https://www.suse.com/security/cve/CVE-2021-30951/" source="CVE"/>
		<reference ref_id="CVE-2021-30952" ref_url="https://www.suse.com/security/cve/CVE-2021-30952/" source="CVE"/>
		<reference ref_id="CVE-2021-30953" ref_url="https://www.suse.com/security/cve/CVE-2021-30953/" source="CVE"/>
		<reference ref_id="CVE-2021-30954" ref_url="https://www.suse.com/security/cve/CVE-2021-30954/" source="CVE"/>
		<reference ref_id="CVE-2021-30984" ref_url="https://www.suse.com/security/cve/CVE-2021-30984/" source="CVE"/>
		<reference ref_id="CVE-2021-45481" ref_url="https://www.suse.com/security/cve/CVE-2021-45481/" source="CVE"/>
		<reference ref_id="CVE-2021-45482" ref_url="https://www.suse.com/security/cve/CVE-2021-45482/" source="CVE"/>
		<reference ref_id="CVE-2021-45483" ref_url="https://www.suse.com/security/cve/CVE-2021-45483/" source="CVE"/>
		<reference ref_id="CVE-2022-22589" ref_url="https://www.suse.com/security/cve/CVE-2022-22589/" source="CVE"/>
		<reference ref_id="CVE-2022-22590" ref_url="https://www.suse.com/security/cve/CVE-2022-22590/" source="CVE"/>
		<reference ref_id="CVE-2022-22592" ref_url="https://www.suse.com/security/cve/CVE-2022-22592/" source="CVE"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.34.5 (bsc#1195735):

- CVE-2022-22589: A validation issue was addressed with improved input sanitization.
- CVE-2022-22590: A use after free issue was addressed with improved memory management.
- CVE-2022-22592: A logic issue was addressed with improved state management.

Update to version 2.34.4 (bsc#1195064):

- CVE-2021-30934: A buffer overflow issue was addressed with improved memory handling.
- CVE-2021-30936: A use after free issue was addressed with improved memory management.
- CVE-2021-30951: A use after free issue was addressed with improved memory management.
- CVE-2021-30952: An integer overflow was addressed with improved input validation.
- CVE-2021-30953: An out-of-bounds read was addressed with improved bounds checking.
- CVE-2021-30954: A type confusion issue was addressed with improved memory handling.
- CVE-2021-30984: A race condition was addressed with improved state handling.
- CVE-2022-22594: A cross-origin issue in the IndexDB API was addressed with improved input validation.

The following CVEs were addressed in a previous update:

- CVE-2021-45481: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create.
- CVE-2021-45482: A use-after-free in WebCore::ContainerNode::firstChild.
- CVE-2021-45483: A use-after-free in WebCore::Frame::page.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195735">SUSE bug 1195735</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30934/">CVE-2021-30934 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30934">CVE-2021-30934 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30936/">CVE-2021-30936 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30936">CVE-2021-30936 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30951/">CVE-2021-30951 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30951">CVE-2021-30951 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30952/">CVE-2021-30952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30952">CVE-2021-30952 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30953/">CVE-2021-30953 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30953">CVE-2021-30953 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30954/">CVE-2021-30954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30954">CVE-2021-30954 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30984/">CVE-2021-30984 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30984">CVE-2021-30984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45481/">CVE-2021-45481 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45481">CVE-2021-45481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45482/">CVE-2021-45482 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45482">CVE-2021-45482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45483/">CVE-2021-45483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45483">CVE-2021-45483 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-22589/">CVE-2022-22589 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22589">CVE-2022-22589 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22590/">CVE-2022-22590 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22590">CVE-2022-22590 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22592/">CVE-2022-22592 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22592">CVE-2022-22592 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22594">CVE-2022-22594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669696" comment="libjavascriptcoregtk-4_0-18-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669697" comment="libwebkit2gtk-4_0-37-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669698" comment="typelib-1_0-JavaScriptCore-4_0-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669699" comment="typelib-1_0-WebKit2-4_0-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669700" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669701" comment="webkit2gtk-4_0-injected-bundles-2.34.5-2.85.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152860" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196026" ref_url="https://bugzilla.suse.com/1196026" source="BUGZILLA"/>
		<reference ref_id="1196168" ref_url="https://bugzilla.suse.com/1196168" source="BUGZILLA"/>
		<reference ref_id="1196169" ref_url="https://bugzilla.suse.com/1196169" source="BUGZILLA"/>
		<reference ref_id="1196171" ref_url="https://bugzilla.suse.com/1196171" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">CVE-2022-25313 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25314">CVE-2022-25314 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669382" comment="expat-2.1.0-21.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669383" comment="libexpat1-2.1.0-21.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669384" comment="libexpat1-32bit-2.1.0-21.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152861" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1089030" ref_url="https://bugzilla.suse.com/1089030" source="BUGZILLA"/>
		<reference ref_id="1163882" ref_url="https://bugzilla.suse.com/1163882" source="BUGZILLA"/>
		<reference ref_id="1196435" ref_url="https://bugzilla.suse.com/1196435" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1100" ref_url="https://www.suse.com/security/cve/CVE-2018-1100/" source="CVE"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<reference ref_id="CVE-2021-45444" ref_url="https://www.suse.com/security/cve/CVE-2021-45444/" source="CVE"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2021-45444: Fixed a vulnerability where arbitrary shell commands could be 
  executed related to prompt expansion (bsc#1196435).
- CVE-2019-20044: Fixed a vulnerability where shell privileges would not be
  properly dropped when unsetting the PRIVILEGED option (bsc#1163882).
- CVE-2018-1100: Fixed a potential code execution via a stack-based buffer
  overflow in utils.c:checkmailpath() (bsc#1089030).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1089030">SUSE bug 1089030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196435">SUSE bug 1196435</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1100/">CVE-2018-1100 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1100">CVE-2018-1100 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20044">CVE-2019-20044 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45444/">CVE-2021-45444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45444">CVE-2021-45444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670824" comment="zsh-5.0.5-6.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152862" version="1" class="patch">
	<metadata>
		<title>Security update for flac (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196660" ref_url="https://bugzilla.suse.com/1196660" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0561" ref_url="https://www.suse.com/security/cve/CVE-2021-0561/" source="CVE"/>
		<description>
This update for flac fixes the following issues:

- CVE-2021-0561: Fixed out of bound write in append_to_verify_fifo_interleaved_ (bsc#1196660).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-08"/>
	<updated date="2022-03-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196660">SUSE bug 1196660</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0561/">CVE-2021-0561 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0561">CVE-2021-0561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671814" comment="libFLAC++6-1.3.0-12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671815" comment="libFLAC8-1.3.0-12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671816" comment="libFLAC8-32bit-1.3.0-12.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152863" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196809" ref_url="https://bugzilla.suse.com/1196809" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):

- CVE-2022-26485: Use-after-free in XSLT parameter processing
- CVE-2022-26486: Use-after-free in WebGPU IPC Framework
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26485">CVE-2022-26485 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26486">CVE-2022-26486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671783" comment="MozillaFirefox-91.6.1-112.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671784" comment="MozillaFirefox-devel-91.6.1-112.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671785" comment="MozillaFirefox-translations-common-91.6.1-112.92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152864" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194303" ref_url="https://bugzilla.suse.com/1194303" source="BUGZILLA"/>
		<reference ref_id="1194304" ref_url="https://bugzilla.suse.com/1194304" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45944" ref_url="https://www.suse.com/security/cve/CVE-2021-45944/" source="CVE"/>
		<reference ref_id="CVE-2021-45949" ref_url="https://www.suse.com/security/cve/CVE-2021-45949/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2021-45944: Fixed use-after-free in sampled_data_sample (bsc#1194303)
- CVE-2021-45949: Fixed heap-based buffer overflow in sampled_data_finish (bsc#1194304)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-14"/>
	<updated date="2022-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194303">SUSE bug 1194303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194304">SUSE bug 1194304</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45944/">CVE-2021-45944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45944">CVE-2021-45944 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45949/">CVE-2021-45949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45949">CVE-2021-45949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663442" comment="ghostscript-9.52-23.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663443" comment="ghostscript-devel-9.52-23.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663444" comment="ghostscript-x11-9.52-23.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152865" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22620" ref_url="https://www.suse.com/security/cve/CVE-2022-22620/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.34.6 (bsc#1196133):

- CVE-2022-22620: Processing maliciously crafted web content may have lead to arbitrary code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-11"/>
	<updated date="2022-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22620/">CVE-2022-22620 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22620">CVE-2022-22620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670816" comment="libjavascriptcoregtk-4_0-18-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670817" comment="libwebkit2gtk-4_0-37-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670818" comment="typelib-1_0-JavaScriptCore-4_0-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670819" comment="typelib-1_0-WebKit2-4_0-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670820" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670821" comment="webkit2gtk-4_0-injected-bundles-2.34.6-2.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152866" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184751" ref_url="https://bugzilla.suse.com/1184751" source="BUGZILLA"/>
		<reference ref_id="1184752" ref_url="https://bugzilla.suse.com/1184752" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-30498, CVE-2021-30499: If an image has a size of 0x0, when exporting, no 
  data is written and space is allocated for the header only, not taking into
  account that sprintf appends a NUL byte (bsc#1184751, bsc#1184752).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184751">SUSE bug 1184751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184752">SUSE bug 1184752</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30498">CVE-2021-30498 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30499">CVE-2021-30499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670823" comment="libcaca0-0.99.beta18-14.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152867" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196900" ref_url="https://bugzilla.suse.com/1196900" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):

- CVE-2022-26383: Browser window spoof using fullscreen mode
- CVE-2022-26384: iframe allow-scripts sandbox bypass
- CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures
- CVE-2022-26381: Use-after-free in text reflows
- CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26381">CVE-2022-26381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26383">CVE-2022-26383 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26384">CVE-2022-26384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26386">CVE-2022-26386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26387">CVE-2022-26387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672571" comment="MozillaFirefox-91.7.0-112.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672572" comment="MozillaFirefox-devel-91.7.0-112.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672573" comment="MozillaFirefox-translations-common-91.7.0-112.95.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152868" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1191489" ref_url="https://bugzilla.suse.com/1191489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3800" ref_url="https://www.suse.com/security/cve/CVE-2021-3800/" source="CVE"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2021-3800: Fixed a file content leak in pkexec due to charset aliases (bsc#1191489).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1191489">SUSE bug 1191489</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3800/">CVE-2021-3800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3800">CVE-2021-3800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670850" comment="glib2-lang-2.48.2-12.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670851" comment="glib2-tools-2.48.2-12.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670852" comment="libgio-2_0-0-2.48.2-12.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670853" comment="libgio-2_0-0-32bit-2.48.2-12.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670854" comment="libglib-2_0-0-2.48.2-12.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670855" comment="libglib-2_0-0-32bit-2.48.2-12.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670856" comment="libgmodule-2_0-0-2.48.2-12.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670857" comment="libgmodule-2_0-0-32bit-2.48.2-12.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670858" comment="libgobject-2_0-0-2.48.2-12.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670859" comment="libgobject-2_0-0-32bit-2.48.2-12.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670860" comment="libgthread-2_0-0-2.48.2-12.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670861" comment="libgthread-2_0-0-32bit-2.48.2-12.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152869" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196784" ref_url="https://bugzilla.suse.com/1196784" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671277" comment="expat-2.1.0-21.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671278" comment="libexpat1-2.1.0-21.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671275" comment="libexpat1-32bit-2.1.0-21.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152870" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673055" comment="libopenssl-devel-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673056" comment="libopenssl1_0_0-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673023" comment="libopenssl1_0_0-32bit-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673057" comment="libopenssl1_0_0-hmac-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673025" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673058" comment="openssl-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673027" comment="openssl-doc-1.0.2j-60.75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152871" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193314" ref_url="https://bugzilla.suse.com/1193314" source="BUGZILLA"/>
		<reference ref_id="1193444" ref_url="https://bugzilla.suse.com/1193444" source="BUGZILLA"/>
		<reference ref_id="1193491" ref_url="https://bugzilla.suse.com/1193491" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1195163" ref_url="https://bugzilla.suse.com/1195163" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u322 (icedtea-3.22.0)

Including the following security fixes:

- CVE-2022-21248, bsc#1194926: Enhance cross VM serialization
- CVE-2022-21283, bsc#1194937: Better String matching
- CVE-2022-21293, bsc#1194935: Improve String constructions
- CVE-2022-21294, bsc#1194934: Enhance construction of Identity maps
- CVE-2022-21282, bsc#1194933: Better resolution of URIs
- CVE-2022-21296, bsc#1194932: Improve SAX Parser configuration management
- CVE-2022-21299, bsc#1194931: Improved scanning of XML entities
- CVE-2022-21305, bsc#1194939: Better array indexing
- CVE-2022-21340, bsc#1194940: Verify Jar Verification
- CVE-2022-21341, bsc#1194941: Improve serial forms for transport
- CVE-2022-21349: Improve Solaris font rendering
- CVE-2022-21360, bsc#1194929: Enhance BMP image support
- CVE-2022-21365, bsc#1194928: Enhanced BMP processing
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193314">SUSE bug 1193314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193444">SUSE bug 1193444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193491">SUSE bug 1193491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195163">SUSE bug 1195163</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21349">CVE-2022-21349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672567" comment="java-1_8_0-openjdk-1.8.0.322-27.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672568" comment="java-1_8_0-openjdk-demo-1.8.0.322-27.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672569" comment="java-1_8_0-openjdk-devel-1.8.0.322-27.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672570" comment="java-1_8_0-openjdk-headless-1.8.0.322-27.72.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152872" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1195619" ref_url="https://bugzilla.suse.com/1195619" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46671" ref_url="https://www.suse.com/security/cve/CVE-2021-46671/" source="CVE"/>
		<description>
This update for atftp fixes the following issues:
	 
-  CVE-2021-46671: Fixed a potential information leak in atftpd (bsc#1195619). 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1195619">SUSE bug 1195619</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46671/">CVE-2021-46671 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46671">CVE-2021-46671 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667644" comment="atftp-0.7.0-160.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152873" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194146" ref_url="https://bugzilla.suse.com/1194146" source="BUGZILLA"/>
		<reference ref_id="1195396" ref_url="https://bugzilla.suse.com/1195396" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4189" ref_url="https://www.suse.com/security/cve/CVE-2021-4189/" source="CVE"/>
		<reference ref_id="CVE-2022-0391" ref_url="https://www.suse.com/security/cve/CVE-2022-0391/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2021-4189: Fixed default access from PASV response in the FTP client (bsc#1194146).
- CVE-2022-0391: Fixed sanitizing of URLs containing ASCII newline and tabs in urlparse (bsc#1195396).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194146">SUSE bug 1194146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195396">SUSE bug 1195396</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4189/">CVE-2021-4189 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4189">CVE-2021-4189 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0391/">CVE-2022-0391 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0391">CVE-2022-0391 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669369" comment="libpython3_4m1_0-3.4.10-25.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669370" comment="python3-3.4.10-25.85.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669371" comment="python3-base-3.4.10-25.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669372" comment="python3-curses-3.4.10-25.85.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152874" version="1" class="patch">
	<metadata>
		<title>Security update for python-lxml (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1118088" ref_url="https://bugzilla.suse.com/1118088" source="BUGZILLA"/>
		<reference ref_id="1179534" ref_url="https://bugzilla.suse.com/1179534" source="BUGZILLA"/>
		<reference ref_id="1184177" ref_url="https://bugzilla.suse.com/1184177" source="BUGZILLA"/>
		<reference ref_id="1193752" ref_url="https://bugzilla.suse.com/1193752" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19787" ref_url="https://www.suse.com/security/cve/CVE-2018-19787/" source="CVE"/>
		<reference ref_id="CVE-2020-27783" ref_url="https://www.suse.com/security/cve/CVE-2020-27783/" source="CVE"/>
		<reference ref_id="CVE-2021-28957" ref_url="https://www.suse.com/security/cve/CVE-2021-28957/" source="CVE"/>
		<reference ref_id="CVE-2021-43818" ref_url="https://www.suse.com/security/cve/CVE-2021-43818/" source="CVE"/>
		<description>
This update for python-lxml fixes the following issues:

- CVE-2021-43818: Removed SVG image data URLs since they can embed script
  content (bsc#1193752).
- CVE-2021-28957: Fixed a potential XSS due to improper input sanitization (bsc#1184177).
- CVE-2020-27783: Fixed a potential XSS due to improper HTML parsing (bsc#1179534).
- CVE-2018-19787: Fixed a potential XSS due to improper input sanitization (bsc#1118088).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-17"/>
	<updated date="2022-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118088">SUSE bug 1118088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179534">SUSE bug 1179534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184177">SUSE bug 1184177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193752">SUSE bug 1193752</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19787/">CVE-2018-19787 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19787">CVE-2018-19787 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-27783/">CVE-2020-27783 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27783">CVE-2020-27783 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28957/">CVE-2021-28957 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28957">CVE-2021-28957 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-43818/">CVE-2021-43818 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43818">CVE-2021-43818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670849" comment="python-lxml-3.6.1-8.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152875" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194640" ref_url="https://bugzilla.suse.com/1194640" source="BUGZILLA"/>
		<reference ref_id="1194768" ref_url="https://bugzilla.suse.com/1194768" source="BUGZILLA"/>
		<reference ref_id="1194770" ref_url="https://bugzilla.suse.com/1194770" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2022-23219: Fixed buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768)
- CVE-2022-23218: Fixed buffer overflow in sunrpc svcunix_create (bsc#1194770)
- CVE-2021-3999: Fixed getcwd to set errno to ERANGE for size == 1 (bsc#1194640)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3999">CVE-2021-3999 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">CVE-2022-23218 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">CVE-2022-23219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673031" comment="glibc-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673010" comment="glibc-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673032" comment="glibc-devel-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673012" comment="glibc-devel-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673013" comment="glibc-html-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673014" comment="glibc-i18ndata-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673015" comment="glibc-info-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673033" comment="glibc-locale-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673017" comment="glibc-locale-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673034" comment="glibc-profile-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673019" comment="glibc-profile-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673035" comment="nscd-2.22-119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152876" version="1" class="patch">
	<metadata>
		<title>Security update for lapack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193562" ref_url="https://bugzilla.suse.com/1193562" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4048" ref_url="https://www.suse.com/security/cve/CVE-2021-4048/" source="CVE"/>
		<description>
This update for lapack fixes the following issues:

- CVE-2021-4048: Fixed an out of bounds read when user input was not validated properly (bsc#1193562).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193562">SUSE bug 1193562</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4048/">CVE-2021-4048 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4048">CVE-2021-4048 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670565" comment="libblas3-3.5.0-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670566" comment="liblapack3-3.5.0-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152877" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197091" ref_url="https://bugzilla.suse.com/1197091" source="BUGZILLA"/>
		<reference ref_id="1197095" ref_url="https://bugzilla.suse.com/1197095" source="BUGZILLA"/>
		<reference ref_id="1197096" ref_url="https://bugzilla.suse.com/1197096" source="BUGZILLA"/>
		<reference ref_id="1197098" ref_url="https://bugzilla.suse.com/1197098" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22719" ref_url="https://www.suse.com/security/cve/CVE-2022-22719/" source="CVE"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<reference ref_id="CVE-2022-23943" ref_url="https://www.suse.com/security/cve/CVE-2022-23943/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-23943: heap out-of-bounds write in mod_sed (bsc#1197098).
- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22719: use of uninitialized value of in r:parsebody in mod_lua (bsc#1197091).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197091">SUSE bug 1197091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197098">SUSE bug 1197098</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22719/">CVE-2022-22719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22719">CVE-2022-22719 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22720">CVE-2022-22720 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22721">CVE-2022-22721 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23943/">CVE-2022-23943 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23943">CVE-2022-23943 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673758" comment="apache2-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673736" comment="apache2-doc-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673759" comment="apache2-example-pages-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673760" comment="apache2-prefork-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673761" comment="apache2-utils-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673762" comment="apache2-worker-2.4.23-29.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152878" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1175619" ref_url="https://bugzilla.suse.com/1175619" source="BUGZILLA"/>
		<reference ref_id="1186819" ref_url="https://bugzilla.suse.com/1186819" source="BUGZILLA"/>
		<reference ref_id="1194146" ref_url="https://bugzilla.suse.com/1194146" source="BUGZILLA"/>
		<reference ref_id="1195396" ref_url="https://bugzilla.suse.com/1195396" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<reference ref_id="CVE-2021-4189" ref_url="https://www.suse.com/security/cve/CVE-2021-4189/" source="CVE"/>
		<reference ref_id="CVE-2022-0391" ref_url="https://www.suse.com/security/cve/CVE-2022-0391/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2022-0391: Fixed sanitizing URLs containing ASCII newline and tabs in urlparse (bsc#1195396).
- CVE-2021-4189: Make ftplib not trust the PASV response (bsc#1194146).
- CVE-2021-3572: Fixed an improper handling of unicode characters in pip (bsc#1186819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175619">SUSE bug 1175619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186819">SUSE bug 1186819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194146">SUSE bug 1194146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195396">SUSE bug 1195396</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3572">CVE-2021-3572 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4189/">CVE-2021-4189 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4189">CVE-2021-4189 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0391/">CVE-2022-0391 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0391">CVE-2022-0391 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677158" comment="libpython2_7-1_0-2.7.18-28.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677159" comment="libpython2_7-1_0-32bit-2.7.18-28.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677160" comment="python-2.7.18-28.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677161" comment="python-32bit-2.7.18-28.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677162" comment="python-base-2.7.18-28.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677163" comment="python-base-32bit-2.7.18-28.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677164" comment="python-curses-2.7.18-28.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677165" comment="python-demo-2.7.18-28.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677166" comment="python-devel-2.7.18-28.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677167" comment="python-doc-2.7.18-28.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677168" comment="python-doc-pdf-2.7.18-28.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677169" comment="python-gdbm-2.7.18-28.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677170" comment="python-idle-2.7.18-28.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677171" comment="python-tk-2.7.18-28.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677172" comment="python-xml-2.7.18-28.84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152879" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207082" ref_url="https://bugzilla.suse.com/1207082" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22809" ref_url="https://www.suse.com/security/cve/CVE-2023-22809/" source="CVE"/>
		<description>
This update for sudo fixes the following issues:

- CVE-2023-22809: Fixed an arbitrary file write issue that could be
  exploited by users with sudoedit permissions (bsc#1207082).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-19"/>
	<updated date="2023-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207082">SUSE bug 1207082</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-22809/">CVE-2023-22809 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22809">CVE-2023-22809 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734038" comment="sudo-1.8.20p2-3.36.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734038" comment="sudo-1.8.20p2-3.36.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152880" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql-jdbc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206921" ref_url="https://bugzilla.suse.com/1206921" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41946" ref_url="https://www.suse.com/security/cve/CVE-2022-41946/" source="CVE"/>
		<description>
This update for postgresql-jdbc fixes the following issues:

- CVE-2022-41946: Fixed a local information disclosure issue due to
  improper handling of temporary files (bsc#1206921).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-19"/>
	<updated date="2023-01-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206921">SUSE bug 1206921</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41946/">CVE-2022-41946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41946">CVE-2022-41946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009731150" comment="postgresql-jdbc-9.4-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152881" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207032" ref_url="https://bugzilla.suse.com/1207032" source="BUGZILLA"/>
		<reference ref_id="1207033" ref_url="https://bugzilla.suse.com/1207033" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23521" ref_url="https://www.suse.com/security/cve/CVE-2022-23521/" source="CVE"/>
		<reference ref_id="CVE-2022-41903" ref_url="https://www.suse.com/security/cve/CVE-2022-41903/" source="CVE"/>
		<description>
This update for git fixes the following issues:

- CVE-2022-41903: Fixed a heap overflow in the 'git archive' and
  'git log --format' commands (bsc#1207033).
- CVE-2022-23521: Fixed an integer overflow that could be triggered
  when parsing a gitattributes file (bsc#1207032).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-20"/>
	<updated date="2023-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207032">SUSE bug 1207032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207033">SUSE bug 1207033</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23521/">CVE-2022-23521 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23521">CVE-2022-23521 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41903/">CVE-2022-41903 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41903">CVE-2022-41903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009734278" comment="git-2.26.2-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734279" comment="git-core-2.26.2-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734280" comment="git-cvs-2.26.2-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734281" comment="git-daemon-2.26.2-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734282" comment="git-email-2.26.2-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734283" comment="git-gui-2.26.2-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734284" comment="git-svn-2.26.2-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734285" comment="git-web-2.26.2-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734286" comment="gitk-2.26.2-27.63.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009734278" comment="git-2.26.2-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734279" comment="git-core-2.26.2-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734280" comment="git-cvs-2.26.2-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734281" comment="git-daemon-2.26.2-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734282" comment="git-email-2.26.2-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734283" comment="git-gui-2.26.2-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734284" comment="git-svn-2.26.2-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734285" comment="git-web-2.26.2-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734286" comment="gitk-2.26.2-27.63.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152882" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207119" ref_url="https://bugzilla.suse.com/1207119" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-46871" ref_url="https://www.suse.com/security/cve/CVE-2022-46871/" source="CVE"/>
		<reference ref_id="CVE-2022-46877" ref_url="https://www.suse.com/security/cve/CVE-2022-46877/" source="CVE"/>
		<reference ref_id="CVE-2023-23598" ref_url="https://www.suse.com/security/cve/CVE-2023-23598/" source="CVE"/>
		<reference ref_id="CVE-2023-23601" ref_url="https://www.suse.com/security/cve/CVE-2023-23601/" source="CVE"/>
		<reference ref_id="CVE-2023-23602" ref_url="https://www.suse.com/security/cve/CVE-2023-23602/" source="CVE"/>
		<reference ref_id="CVE-2023-23603" ref_url="https://www.suse.com/security/cve/CVE-2023-23603/" source="CVE"/>
		<reference ref_id="CVE-2023-23605" ref_url="https://www.suse.com/security/cve/CVE-2023-23605/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Updated to version 102.7.0 ESR (bsc#1207119):
  - CVE-2022-46871: Updated an out of date library (libusrsctp) which
    contained several vulnerabilities.
  - CVE-2023-23598: Fixed an arbitrary file read from GTK drag and
    drop on Linux.
  - CVE-2023-23601: Fixed a potential spoofing attack when dragging a
    URL from a cross-origin iframe into the same tab.
  - CVE-2023-23602: Fixed a mishandled security check, which caused
    the Content Security Policy header to be ignored for WebSockets
    in WebWorkers.
  - CVE-2022-46877: Fixed a fullscreen notification bypass which
    could be leveraged in spoofing attacks.
  - CVE-2023-23603: Fixed a Content Security Policy bypass via format
    directives.
  - CVE-2023-23605: Fixed several memory safety bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-20"/>
	<updated date="2023-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207119">SUSE bug 1207119</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46871/">CVE-2022-46871 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46871">CVE-2022-46871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46877/">CVE-2022-46877 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46877">CVE-2022-46877 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23598/">CVE-2023-23598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23598">CVE-2023-23598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23601/">CVE-2023-23601 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23601">CVE-2023-23601 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23602/">CVE-2023-23602 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23602">CVE-2023-23602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23603/">CVE-2023-23603 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23603">CVE-2023-23603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23605/">CVE-2023-23605 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23605">CVE-2023-23605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009732602" comment="MozillaFirefox-102.7.0-112.145.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732603" comment="MozillaFirefox-devel-102.7.0-112.145.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732604" comment="MozillaFirefox-translations-common-102.7.0-112.145.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009732602" comment="MozillaFirefox-102.7.0-112.145.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732603" comment="MozillaFirefox-devel-102.7.0-112.145.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732604" comment="MozillaFirefox-translations-common-102.7.0-112.145.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152883" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204272" ref_url="https://bugzilla.suse.com/1204272" source="BUGZILLA"/>
		<reference ref_id="1207038" ref_url="https://bugzilla.suse.com/1207038" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23491" ref_url="https://www.suse.com/security/cve/CVE-2022-23491/" source="CVE"/>
		<reference ref_id="CVE-2022-3479" ref_url="https://www.suse.com/security/cve/CVE-2022-3479/" source="CVE"/>
		<description>
This update for mozilla-nss fixes the following issues:

- CVE-2022-3479: Fixed a potential crash that could be triggered when
  a server requested a client authentication certificate, but the
  client had no certificates stored (bsc#1204272).
- Updated to version 3.79.3 (bsc#1207038):
  - CVE-2022-23491: Removed trust for 3 root certificates from TrustCor.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-20"/>
	<updated date="2023-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204272">SUSE bug 1204272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207038">SUSE bug 1207038</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23491/">CVE-2022-23491 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23491">CVE-2022-23491 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3479/">CVE-2022-3479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3479">CVE-2022-3479 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009732415" comment="libfreebl3-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732400" comment="libfreebl3-32bit-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732416" comment="libfreebl3-hmac-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732402" comment="libfreebl3-hmac-32bit-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732417" comment="libsoftokn3-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732404" comment="libsoftokn3-32bit-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732418" comment="libsoftokn3-hmac-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732406" comment="libsoftokn3-hmac-32bit-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732419" comment="mozilla-nss-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732408" comment="mozilla-nss-32bit-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732420" comment="mozilla-nss-certs-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732410" comment="mozilla-nss-certs-32bit-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732423" comment="mozilla-nss-devel-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732421" comment="mozilla-nss-sysinit-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732413" comment="mozilla-nss-sysinit-32bit-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732422" comment="mozilla-nss-tools-3.79.3-58.91.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009732415" comment="libfreebl3-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732400" comment="libfreebl3-32bit-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732416" comment="libfreebl3-hmac-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732402" comment="libfreebl3-hmac-32bit-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732417" comment="libsoftokn3-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732404" comment="libsoftokn3-32bit-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732418" comment="libsoftokn3-hmac-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732406" comment="libsoftokn3-hmac-32bit-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732419" comment="mozilla-nss-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732408" comment="mozilla-nss-32bit-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732420" comment="mozilla-nss-certs-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732410" comment="mozilla-nss-certs-32bit-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732423" comment="mozilla-nss-devel-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732421" comment="mozilla-nss-sysinit-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732413" comment="mozilla-nss-sysinit-32bit-3.79.3-58.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732422" comment="mozilla-nss-tools-3.79.3-58.91.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152884" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206204" ref_url="https://bugzilla.suse.com/1206204" source="BUGZILLA"/>
		<reference ref_id="1206205" ref_url="https://bugzilla.suse.com/1206205" source="BUGZILLA"/>
		<reference ref_id="1206206" ref_url="https://bugzilla.suse.com/1206206" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41859" ref_url="https://www.suse.com/security/cve/CVE-2022-41859/" source="CVE"/>
		<reference ref_id="CVE-2022-41860" ref_url="https://www.suse.com/security/cve/CVE-2022-41860/" source="CVE"/>
		<reference ref_id="CVE-2022-41861" ref_url="https://www.suse.com/security/cve/CVE-2022-41861/" source="CVE"/>
		<description>
This update for freeradius-server fixes the following issues:

- CVE-2022-41859: Fixed an issue in EAP-PWD that could leak
  information about the password, which could facilitate dictionary
  attacks (bsc#1206204).
- CVE-2022-41860: Fixed a crash in servers with EAP_SIM manually
  configured, which could be triggered via a malformed SIM option
  (bsc#1206205).
- CVE-2022-41861: Fixed a server crash that could be triggered by
  sending malformed data from a system in the RADIUS circle of trust
  (bsc#1206206).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-23"/>
	<updated date="2023-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206204">SUSE bug 1206204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206205">SUSE bug 1206205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206206">SUSE bug 1206206</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41859/">CVE-2022-41859 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41859">CVE-2022-41859 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41860/">CVE-2022-41860 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41860">CVE-2022-41860 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41861/">CVE-2022-41861 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41861">CVE-2022-41861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009734039" comment="freeradius-server-3.0.15-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734040" comment="freeradius-server-doc-3.0.15-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734041" comment="freeradius-server-krb5-3.0.15-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734042" comment="freeradius-server-ldap-3.0.15-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734043" comment="freeradius-server-libs-3.0.15-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734044" comment="freeradius-server-mysql-3.0.15-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734045" comment="freeradius-server-perl-3.0.15-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734046" comment="freeradius-server-postgresql-3.0.15-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734047" comment="freeradius-server-python-3.0.15-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734048" comment="freeradius-server-sqlite-3.0.15-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734049" comment="freeradius-server-utils-3.0.15-2.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009734039" comment="freeradius-server-3.0.15-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734040" comment="freeradius-server-doc-3.0.15-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734041" comment="freeradius-server-krb5-3.0.15-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734042" comment="freeradius-server-ldap-3.0.15-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734043" comment="freeradius-server-libs-3.0.15-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734044" comment="freeradius-server-mysql-3.0.15-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734045" comment="freeradius-server-perl-3.0.15-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734046" comment="freeradius-server-postgresql-3.0.15-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734047" comment="freeradius-server-python-3.0.15-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734048" comment="freeradius-server-sqlite-3.0.15-2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734049" comment="freeradius-server-utils-3.0.15-2.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152885" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205385" ref_url="https://bugzilla.suse.com/1205385" source="BUGZILLA"/>
		<reference ref_id="1206504" ref_url="https://bugzilla.suse.com/1206504" source="BUGZILLA"/>
		<reference ref_id="1206546" ref_url="https://bugzilla.suse.com/1206546" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20251" ref_url="https://www.suse.com/security/cve/CVE-2021-20251/" source="CVE"/>
		<reference ref_id="CVE-2022-37966" ref_url="https://www.suse.com/security/cve/CVE-2022-37966/" source="CVE"/>
		<reference ref_id="CVE-2022-38023" ref_url="https://www.suse.com/security/cve/CVE-2022-38023/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-20251: Fixed an issue where the bad password count would
  not be properly incremented, which could allow attackers to brute
  force a user's password (bsc#1206546).
- CVE-2022-38023: Disabled weak ciphers by default in the Netlogon
  Secure channel (bsc#1206504).
- CVE-2022-37966: Fixed an issue where a weak cipher would be
  selected to encrypt session keys, which could lead to privilege
  escalation (bsc#1205385).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-24"/>
	<updated date="2023-01-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205385">SUSE bug 1205385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206504">SUSE bug 1206504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206546">SUSE bug 1206546</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20251/">CVE-2021-20251 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20251">CVE-2021-20251 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37966/">CVE-2022-37966 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37966">CVE-2022-37966 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38023/">CVE-2022-38023 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38023">CVE-2022-38023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009733342" comment="libdcerpc-binding0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733255" comment="libdcerpc-binding0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733343" comment="libdcerpc0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733257" comment="libdcerpc0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733344" comment="libndr-krb5pac0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733259" comment="libndr-krb5pac0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733345" comment="libndr-nbt0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733261" comment="libndr-nbt0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733346" comment="libndr-standard0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733263" comment="libndr-standard0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733347" comment="libndr0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733265" comment="libndr0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733348" comment="libnetapi0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733267" comment="libnetapi0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733349" comment="libsamba-credentials0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733269" comment="libsamba-credentials0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733350" comment="libsamba-errors0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733271" comment="libsamba-errors0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733351" comment="libsamba-hostconfig0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733273" comment="libsamba-hostconfig0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733352" comment="libsamba-passdb0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733275" comment="libsamba-passdb0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733353" comment="libsamba-util0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733277" comment="libsamba-util0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733354" comment="libsamdb0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733279" comment="libsamdb0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733355" comment="libsmbclient0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733281" comment="libsmbclient0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733356" comment="libsmbconf0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733283" comment="libsmbconf0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733357" comment="libsmbldap0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733285" comment="libsmbldap0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733358" comment="libtevent-util0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733287" comment="libtevent-util0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733359" comment="libwbclient0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733289" comment="libwbclient0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733360" comment="samba-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733361" comment="samba-client-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733292" comment="samba-client-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733293" comment="samba-doc-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733362" comment="samba-libs-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733295" comment="samba-libs-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733363" comment="samba-winbind-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733297" comment="samba-winbind-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009733342" comment="libdcerpc-binding0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733255" comment="libdcerpc-binding0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733343" comment="libdcerpc0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733257" comment="libdcerpc0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733344" comment="libndr-krb5pac0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733259" comment="libndr-krb5pac0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733345" comment="libndr-nbt0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733261" comment="libndr-nbt0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733346" comment="libndr-standard0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733263" comment="libndr-standard0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733347" comment="libndr0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733265" comment="libndr0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733348" comment="libnetapi0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733267" comment="libnetapi0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733349" comment="libsamba-credentials0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733269" comment="libsamba-credentials0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733350" comment="libsamba-errors0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733271" comment="libsamba-errors0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733351" comment="libsamba-hostconfig0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733273" comment="libsamba-hostconfig0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733352" comment="libsamba-passdb0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733275" comment="libsamba-passdb0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733353" comment="libsamba-util0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733277" comment="libsamba-util0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733354" comment="libsamdb0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733279" comment="libsamdb0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733355" comment="libsmbclient0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733281" comment="libsmbclient0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733356" comment="libsmbconf0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733283" comment="libsmbconf0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733357" comment="libsmbldap0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733285" comment="libsmbldap0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733358" comment="libtevent-util0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733287" comment="libtevent-util0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733359" comment="libwbclient0-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733289" comment="libwbclient0-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733360" comment="samba-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733361" comment="samba-client-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733292" comment="samba-client-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733293" comment="samba-doc-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733362" comment="samba-libs-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733295" comment="samba-libs-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733363" comment="samba-winbind-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733297" comment="samba-winbind-32bit-4.6.16+git.384.9fec958bed-3.76.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152886" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1205209" ref_url="https://bugzilla.suse.com/1205209" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23824" ref_url="https://www.suse.com/security/cve/CVE-2022-23824/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-23824: Fixed multiple speculative execution issues (bnc#1205209).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-25"/>
	<updated date="2023-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205209">SUSE bug 1205209</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23824/">CVE-2022-23824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23824">CVE-2022-23824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009734050" comment="xen-4.9.4_36-3.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734051" comment="xen-doc-html-4.9.4_36-3.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734052" comment="xen-libs-4.9.4_36-3.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734053" comment="xen-libs-32bit-4.9.4_36-3.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734054" comment="xen-tools-4.9.4_36-3.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734055" comment="xen-tools-domU-4.9.4_36-3.117.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009734050" comment="xen-4.9.4_36-3.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734051" comment="xen-doc-html-4.9.4_36-3.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734052" comment="xen-libs-4.9.4_36-3.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734053" comment="xen-libs-32bit-4.9.4_36-3.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734054" comment="xen-tools-4.9.4_36-3.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734055" comment="xen-tools-domU-4.9.4_36-3.117.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152887" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122729" ref_url="https://bugzilla.suse.com/1122729" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10739" ref_url="https://www.suse.com/security/cve/CVE-2016-10739/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2016-10739: getaddrinfo: Fully parse IPv4 address strings (bsc#1122729)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-03"/>
	<updated date="2023-01-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122729">SUSE bug 1122729</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10739/">CVE-2016-10739 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10739">CVE-2016-10739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727624" comment="glibc-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727625" comment="glibc-32bit-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727626" comment="glibc-devel-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727627" comment="glibc-devel-32bit-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727628" comment="glibc-html-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727629" comment="glibc-i18ndata-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727630" comment="glibc-info-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727631" comment="glibc-locale-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727632" comment="glibc-locale-32bit-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727633" comment="glibc-profile-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727634" comment="glibc-profile-32bit-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727635" comment="nscd-2.22-133.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727624" comment="glibc-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727625" comment="glibc-32bit-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727626" comment="glibc-devel-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727627" comment="glibc-devel-32bit-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727628" comment="glibc-html-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727629" comment="glibc-i18ndata-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727630" comment="glibc-info-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727631" comment="glibc-locale-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727632" comment="glibc-locale-32bit-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727633" comment="glibc-profile-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727634" comment="glibc-profile-32bit-2.22-133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727635" comment="nscd-2.22-133.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152888" version="1" class="patch">
	<metadata>
		<title>Security update for libXpm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207029" ref_url="https://bugzilla.suse.com/1207029" source="BUGZILLA"/>
		<reference ref_id="1207030" ref_url="https://bugzilla.suse.com/1207030" source="BUGZILLA"/>
		<reference ref_id="1207031" ref_url="https://bugzilla.suse.com/1207031" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-44617" ref_url="https://www.suse.com/security/cve/CVE-2022-44617/" source="CVE"/>
		<reference ref_id="CVE-2022-46285" ref_url="https://www.suse.com/security/cve/CVE-2022-46285/" source="CVE"/>
		<reference ref_id="CVE-2022-4883" ref_url="https://www.suse.com/security/cve/CVE-2022-4883/" source="CVE"/>
		<description>
This update for libXpm fixes the following issues:

- CVE-2022-46285: Fixed an infinite loop that could be triggered
  when reading a XPM image with a C-style comment that is never
  closed (bsc#1207029).
- CVE-2022-44617: Fixed an excessive resource consumption that could
  be triggered when reading small crafted XPM image (bsc#1207030).
- CVE-2022-4883: Fixed an issue that made decompression commands
  susceptible to PATH environment variable manipulation attacks
  (bsc#1207031).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207029">SUSE bug 1207029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207030">SUSE bug 1207030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207031">SUSE bug 1207031</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44617/">CVE-2022-44617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44617">CVE-2022-44617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-46285/">CVE-2022-46285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46285">CVE-2022-46285 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4883/">CVE-2022-4883 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4883">CVE-2022-4883 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009736631" comment="libXpm4-3.5.11-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736602" comment="libXpm4-32bit-3.5.11-6.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009736631" comment="libXpm4-3.5.11-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736602" comment="libXpm4-32bit-3.5.11-6.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152889" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203120" ref_url="https://bugzilla.suse.com/1203120" source="BUGZILLA"/>
		<reference ref_id="1203121" ref_url="https://bugzilla.suse.com/1203121" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-39176" ref_url="https://www.suse.com/security/cve/CVE-2022-39176/" source="CVE"/>
		<reference ref_id="CVE-2022-39177" ref_url="https://www.suse.com/security/cve/CVE-2022-39177/" source="CVE"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2022-39176: Fixed a memory safety issue that could allow
  physically proximate attackers to obtain sensitive information
  (bsc#1203121).
- CVE-2022-39177: Fixed a memory safety issue that could allow
  physically proximate attackers to cause a denial of service
  (bsc#1203120).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203120">SUSE bug 1203120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203121">SUSE bug 1203121</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39176/">CVE-2022-39176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39176">CVE-2022-39176 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39177/">CVE-2022-39177 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39177">CVE-2022-39177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009733645" comment="bluez-5.13-5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733646" comment="libbluetooth3-5.13-5.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009733645" comment="bluez-5.13-5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733646" comment="libbluetooth3-5.13-5.36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152890" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209543" ref_url="https://bugzilla.suse.com/1209543" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1393" ref_url="https://www.suse.com/security/cve/CVE-2023-1393/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2023-1393: Fixed use-after-free overlay window (ZDI-CAN-19866) (bsc#1209543).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-29"/>
	<updated date="2023-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1209543">SUSE bug 1209543</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1393/">CVE-2023-1393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1393">CVE-2023-1393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009752060" comment="xorg-x11-server-7.6_1.18.3-76.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752061" comment="xorg-x11-server-extra-7.6_1.18.3-76.66.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009752060" comment="xorg-x11-server-7.6_1.18.3-76.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752061" comment="xorg-x11-server-extra-7.6_1.18.3-76.66.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152891" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207997" ref_url="https://bugzilla.suse.com/1207997" source="BUGZILLA"/>
		<reference ref_id="1208328" ref_url="https://bugzilla.suse.com/1208328" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42826" ref_url="https://www.suse.com/security/cve/CVE-2022-42826/" source="CVE"/>
		<reference ref_id="CVE-2023-23518" ref_url="https://www.suse.com/security/cve/CVE-2023-23518/" source="CVE"/>
		<reference ref_id="CVE-2023-23529" ref_url="https://www.suse.com/security/cve/CVE-2023-23529/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.38.5 (boo#1208328):

- CVE-2023-23529: Fixed possible arbitrary code execution via maliciously crafted web content.
- CVE-2023-23518: Processing maliciously crafted web content may lead to

Previously fixed inside update to version 2.38.4 (boo#1207997):

- CVE-2022-42826: Fixed a use-after-free issue that was caused by improper memory management.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-29"/>
	<updated date="2023-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207997">SUSE bug 1207997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208328">SUSE bug 1208328</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42826/">CVE-2022-42826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42826">CVE-2022-42826 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23518/">CVE-2023-23518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23518">CVE-2023-23518 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23529/">CVE-2023-23529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23529">CVE-2023-23529 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009747948" comment="libjavascriptcoregtk-4_0-18-2.38.5-2.131.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747949" comment="libwebkit2gtk-4_0-37-2.38.5-2.131.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747904" comment="libwebkit2gtk3-lang-2.38.5-2.131.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747950" comment="typelib-1_0-JavaScriptCore-4_0-2.38.5-2.131.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747951" comment="typelib-1_0-WebKit2-4_0-2.38.5-2.131.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747952" comment="typelib-1_0-WebKit2WebExtension-4_0-2.38.5-2.131.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747953" comment="webkit2gtk-4_0-injected-bundles-2.38.5-2.131.4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009747948" comment="libjavascriptcoregtk-4_0-18-2.38.5-2.131.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747949" comment="libwebkit2gtk-4_0-37-2.38.5-2.131.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747904" comment="libwebkit2gtk3-lang-2.38.5-2.131.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747950" comment="typelib-1_0-JavaScriptCore-4_0-2.38.5-2.131.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747951" comment="typelib-1_0-WebKit2-4_0-2.38.5-2.131.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747952" comment="typelib-1_0-WebKit2WebExtension-4_0-2.38.5-2.131.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747953" comment="webkit2gtk-4_0-injected-bundles-2.38.5-2.131.4 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152892" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209361" ref_url="https://bugzilla.suse.com/1209361" source="BUGZILLA"/>
		<reference ref_id="1209362" ref_url="https://bugzilla.suse.com/1209362" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28486" ref_url="https://www.suse.com/security/cve/CVE-2023-28486/" source="CVE"/>
		<reference ref_id="CVE-2023-28487" ref_url="https://www.suse.com/security/cve/CVE-2023-28487/" source="CVE"/>
		<description>
This update for sudo fixes the following issues:

- CVE-2023-28486: Fixed missing control characters escaping in log messages (bsc#1209362).
- CVE-2023-28487: Fixed missing control characters escaping in sudoreplay output (bsc#1209361).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-30"/>
	<updated date="2023-03-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209361">SUSE bug 1209361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209362">SUSE bug 1209362</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28486/">CVE-2023-28486 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28486">CVE-2023-28486 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28487/">CVE-2023-28487 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28487">CVE-2023-28487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750856" comment="sudo-1.8.20p2-3.39.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750856" comment="sudo-1.8.20p2-3.39.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152893" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209141" ref_url="https://bugzilla.suse.com/1209141" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1289" ref_url="https://www.suse.com/security/cve/CVE-2023-1289/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2023-1289: Fixed segmentation fault and possible DoS via specially crafted SVG. (bsc#1209141)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-03"/>
	<updated date="2023-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209141">SUSE bug 1209141</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1289/">CVE-2023-1289 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1289">CVE-2023-1289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009747289" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.186.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747290" comment="ImageMagick-config-6-upstream-6.8.8.1-71.186.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747291" comment="libMagickCore-6_Q16-1-6.8.8.1-71.186.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747292" comment="libMagickWand-6_Q16-1-6.8.8.1-71.186.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152894" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209624" ref_url="https://bugzilla.suse.com/1209624" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0464" ref_url="https://www.suse.com/security/cve/CVE-2023-0464/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2023-0464: Fixed excessive Resource Usage Verifying X.509 Policy Constraints (bsc#1209624).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-03"/>
	<updated date="2023-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209624">SUSE bug 1209624</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0464/">CVE-2023-0464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0464">CVE-2023-0464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009751385" comment="libopenssl-devel-1.0.2j-60.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751386" comment="libopenssl1_0_0-1.0.2j-60.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751387" comment="libopenssl1_0_0-32bit-1.0.2j-60.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751388" comment="libopenssl1_0_0-hmac-1.0.2j-60.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751389" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751390" comment="openssl-1.0.2j-60.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751391" comment="openssl-doc-1.0.2j-60.89.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009751385" comment="libopenssl-devel-1.0.2j-60.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751386" comment="libopenssl1_0_0-1.0.2j-60.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751387" comment="libopenssl1_0_0-32bit-1.0.2j-60.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751388" comment="libopenssl1_0_0-hmac-1.0.2j-60.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751389" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751390" comment="openssl-1.0.2j-60.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751391" comment="openssl-doc-1.0.2j-60.89.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152895" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208036" ref_url="https://bugzilla.suse.com/1208036" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-23931" ref_url="https://www.suse.com/security/cve/CVE-2023-23931/" source="CVE"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2023-23931: Fixed memory corruption in Cipher.update_into (bsc#1208036).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-05"/>
	<updated date="2023-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1208036">SUSE bug 1208036</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23931/">CVE-2023-23931 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23931">CVE-2023-23931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009748397" comment="python-cryptography-2.8-7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009748398" comment="python3-cryptography-2.8-7.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152896" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1191502" ref_url="https://bugzilla.suse.com/1191502" source="BUGZILLA"/>
		<reference ref_id="1195529" ref_url="https://bugzilla.suse.com/1195529" source="BUGZILLA"/>
		<reference ref_id="1197244" ref_url="https://bugzilla.suse.com/1197244" source="BUGZILLA"/>
		<reference ref_id="1198507" ref_url="https://bugzilla.suse.com/1198507" source="BUGZILLA"/>
		<reference ref_id="1204423" ref_url="https://bugzilla.suse.com/1204423" source="BUGZILLA"/>
		<reference ref_id="1204968" ref_url="https://bugzilla.suse.com/1204968" source="BUGZILLA"/>
		<reference ref_id="1205000" ref_url="https://bugzilla.suse.com/1205000" source="BUGZILLA"/>
		<reference ref_id="1206985" ref_url="https://bugzilla.suse.com/1206985" source="BUGZILLA"/>
		<reference ref_id="1208958" ref_url="https://bugzilla.suse.com/1208958" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3821" ref_url="https://www.suse.com/security/cve/CVE-2022-3821/" source="CVE"/>
		<reference ref_id="CVE-2022-4415" ref_url="https://www.suse.com/security/cve/CVE-2022-4415/" source="CVE"/>
		<reference ref_id="CVE-2023-26604" ref_url="https://www.suse.com/security/cve/CVE-2023-26604/" source="CVE"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2023-26604: Fixed a privilege escalation via the less pager. (bsc#1208958)
- CVE-2022-4415: Fixed systemd-coredump that did not respect the fs.suid_dumpable kernel setting (bsc#1205000).
- CVE-2022-3821: Fixed buffer overrun in format_timespan() function (bsc#1204968).

Bug fixes:

- Restrict cpu rule to x86_64, and also update the rule files to make use of the 'CONST{arch}' syntax (bsc#1204423).
- Fixed 'systemd --user' call pam_loginuid when creating user@.service (bsc#1198507).
- Fixed 'systemd-detect-virt' refine hypervisor detection (bsc#1197244).
- Fixed 'udev' 60-persistent-storage-tape.rules: handle duplicate device ID (bsc#1195529).
- Fixed 'man' tweak description of auto/noauto (bsc#1191502).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-05"/>
	<updated date="2023-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191502">SUSE bug 1191502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195529">SUSE bug 1195529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197244">SUSE bug 1197244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198507">SUSE bug 1198507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204423">SUSE bug 1204423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204968">SUSE bug 1204968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205000">SUSE bug 1205000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206985">SUSE bug 1206985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208958">SUSE bug 1208958</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3821/">CVE-2022-3821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3821">CVE-2022-3821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4415/">CVE-2022-4415 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4415">CVE-2022-4415 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26604/">CVE-2023-26604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26604">CVE-2023-26604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009751379" comment="libsystemd0-228-150.108.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751358" comment="libsystemd0-32bit-228-150.108.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751392" comment="libudev-devel-228-150.108.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751380" comment="libudev1-228-150.108.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751361" comment="libudev1-32bit-228-150.108.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751381" comment="systemd-228-150.108.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751363" comment="systemd-32bit-228-150.108.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751364" comment="systemd-bash-completion-228-150.108.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751382" comment="systemd-devel-228-150.108.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751383" comment="systemd-sysvinit-228-150.108.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751384" comment="udev-228-150.108.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009751379" comment="libsystemd0-228-150.108.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751358" comment="libsystemd0-32bit-228-150.108.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751392" comment="libudev-devel-228-150.108.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751380" comment="libudev1-228-150.108.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751361" comment="libudev1-32bit-228-150.108.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751381" comment="systemd-228-150.108.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751363" comment="systemd-32bit-228-150.108.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751364" comment="systemd-bash-completion-228-150.108.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751382" comment="systemd-devel-228-150.108.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751383" comment="systemd-sysvinit-228-150.108.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751384" comment="udev-228-150.108.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152897" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210062" ref_url="https://bugzilla.suse.com/1210062" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28879" ref_url="https://www.suse.com/security/cve/CVE-2023-28879/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2023-28879: Fixed buffer Overflow in s_xBCPE_process (bsc#1210062).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-07"/>
	<updated date="2023-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210062">SUSE bug 1210062</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28879/">CVE-2023-28879 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28879">CVE-2023-28879 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009753440" comment="ghostscript-9.52-23.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753441" comment="ghostscript-devel-9.52-23.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753442" comment="ghostscript-x11-9.52-23.51.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009753440" comment="ghostscript-9.52-23.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753441" comment="ghostscript-devel-9.52-23.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753442" comment="ghostscript-x11-9.52-23.51.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152898" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210212" ref_url="https://bugzilla.suse.com/1210212" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1945" ref_url="https://www.suse.com/security/cve/CVE-2023-1945/" source="CVE"/>
		<reference ref_id="CVE-2023-29531" ref_url="https://www.suse.com/security/cve/CVE-2023-29531/" source="CVE"/>
		<reference ref_id="CVE-2023-29532" ref_url="https://www.suse.com/security/cve/CVE-2023-29532/" source="CVE"/>
		<reference ref_id="CVE-2023-29533" ref_url="https://www.suse.com/security/cve/CVE-2023-29533/" source="CVE"/>
		<reference ref_id="CVE-2023-29535" ref_url="https://www.suse.com/security/cve/CVE-2023-29535/" source="CVE"/>
		<reference ref_id="CVE-2023-29536" ref_url="https://www.suse.com/security/cve/CVE-2023-29536/" source="CVE"/>
		<reference ref_id="CVE-2023-29539" ref_url="https://www.suse.com/security/cve/CVE-2023-29539/" source="CVE"/>
		<reference ref_id="CVE-2023-29541" ref_url="https://www.suse.com/security/cve/CVE-2023-29541/" source="CVE"/>
		<reference ref_id="CVE-2023-29542" ref_url="https://www.suse.com/security/cve/CVE-2023-29542/" source="CVE"/>
		<reference ref_id="CVE-2023-29545" ref_url="https://www.suse.com/security/cve/CVE-2023-29545/" source="CVE"/>
		<reference ref_id="CVE-2023-29548" ref_url="https://www.suse.com/security/cve/CVE-2023-29548/" source="CVE"/>
		<reference ref_id="CVE-2023-29550" ref_url="https://www.suse.com/security/cve/CVE-2023-29550/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 102.10.0 ESR (bsc#1210212)
- CVE-2023-29531: Out-of-bound memory access in WebGL on macOS
- CVE-2023-29532: Mozilla Maintenance Service Write-lock bypass
- CVE-2023-29533: Fullscreen notification obscured
- MFSA-TMP-2023-0001: Double-free in libwebp
- CVE-2023-29535: Potential Memory Corruption following Garbage Collector compaction
- CVE-2023-29536: Invalid free from JavaScript code
- CVE-2023-29539: Content-Disposition filename truncation leads to Reflected File Download
- CVE-2023-29541: Files with malicious extensions could have been downloaded unsafely on Linux
- CVE-2023-29542: Bypass of file download extension restrictions
- CVE-2023-29545: Windows Save As dialog resolved environment variables
- CVE-2023-1945: Memory Corruption in Safe Browsing Code
- CVE-2023-29548: Incorrect optimization result on ARM64
- CVE-2023-29550: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-11"/>
	<updated date="2023-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-1945/">CVE-2023-1945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1945">CVE-2023-1945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29531/">CVE-2023-29531 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29531">CVE-2023-29531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29532/">CVE-2023-29532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29532">CVE-2023-29532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29533/">CVE-2023-29533 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29533">CVE-2023-29533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29535/">CVE-2023-29535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29535">CVE-2023-29535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29536/">CVE-2023-29536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29536">CVE-2023-29536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29539/">CVE-2023-29539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29539">CVE-2023-29539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29541/">CVE-2023-29541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29541">CVE-2023-29541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29542/">CVE-2023-29542 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29542">CVE-2023-29542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29545/">CVE-2023-29545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29545">CVE-2023-29545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29548/">CVE-2023-29548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29548">CVE-2023-29548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29550/">CVE-2023-29550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29550">CVE-2023-29550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009753447" comment="MozillaFirefox-102.10.0-112.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753448" comment="MozillaFirefox-devel-102.10.0-112.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753449" comment="MozillaFirefox-translations-common-102.10.0-112.156.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009753447" comment="MozillaFirefox-102.10.0-112.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753448" comment="MozillaFirefox-devel-102.10.0-112.156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753449" comment="MozillaFirefox-translations-common-102.10.0-112.156.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152899" version="1" class="patch">
	<metadata>
		<title>Security update for harfbuzz (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207922" ref_url="https://bugzilla.suse.com/1207922" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193/" source="CVE"/>
		<description>
This update for harfbuzz fixes the following issues:

- CVE-2023-25193: Fixed vulnerability that allowed attackers to trigger O(n^2) growth via consecutive marks (bsc#1207922).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-12"/>
	<updated date="2023-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207922">SUSE bug 1207922</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25193">CVE-2023-25193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009753450" comment="libharfbuzz-icu0-1.4.5-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753451" comment="libharfbuzz0-1.4.5-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753439" comment="libharfbuzz0-32bit-1.4.5-8.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009753450" comment="libharfbuzz-icu0-1.4.5-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753451" comment="libharfbuzz0-1.4.5-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753439" comment="libharfbuzz0-32bit-1.4.5-8.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152900" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207246" ref_url="https://bugzilla.suse.com/1207246" source="BUGZILLA"/>
		<reference ref_id="1207248" ref_url="https://bugzilla.suse.com/1207248" source="BUGZILLA"/>
		<reference ref_id="1207249" ref_url="https://bugzilla.suse.com/1207249" source="BUGZILLA"/>
		<reference ref_id="1208480" ref_url="https://bugzilla.suse.com/1208480" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2023-21830" ref_url="https://www.suse.com/security/cve/CVE-2023-21830/" source="CVE"/>
		<reference ref_id="CVE-2023-21835" ref_url="https://www.suse.com/security/cve/CVE-2023-21835/" source="CVE"/>
		<reference ref_id="CVE-2023-21843" ref_url="https://www.suse.com/security/cve/CVE-2023-21843/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 8 (bsc#1208480):

  * Security fixes:
    - CVE-2023-21830: Fixed improper restrictions in CORBA deserialization (bsc#1207249).
    - CVE-2023-21835: Fixed handshake DoS attack against DTLS connections (bsc#1207246).
    - CVE-2023-21843: Fixed soundbank URL remote loading (bsc#1207248).
  
  * New Features/Enhancements:
    - Add RSA-PSS signature to IBMJCECCA.
  * Defect Fixes:
    - IJ45437 Service, Build, Packaging and Deliver: Getting
      FIPSRUNTIMEEXCEPTION when calling java code:
      MESSAGEDIGEST.GETINSTANCE('SHA256', 'IBMJCEFIPS'); in MAC
    - IJ45272 Class Libraries: Fix security vulnerability CVE-2023-21843
    - IJ45280 Class Libraries: Update timezone information to the
      latest TZDATA2022F
    - IJ44896 Class Libraries: Update timezone information to the
      latest TZDATA2022G
    - IJ45436 Java Virtual Machine: Stack walking code gets into
      endless loop, hanging the application
    - IJ44079 Java Virtual Machine: When -DFILE.ENCODING is specified
      multiple times on the same command line the first option takes
      precedence instead of the last
    - IJ44532 JIT Compiler: Java JIT: Crash in DECREFERENCECOUNT()
      due to a NULL pointer
    - IJ44596 JIT Compiler: Java JIT: Invalid hard-coding of static
      final field object properties
    - IJ44107 JIT Compiler: JIT publishes new object reference to other
      threads without executing a memory flush
    - IX90193 ORB: Fix security vulnerability CVE-2023-21830
    - IJ44267 Security: 8273553: SSLENGINEIMPL.CLOSEINBOUND also has
      similar error of JDK-8253368
    - IJ45148 Security: code changes for tech preview
    - IJ44621 Security: Computing Diffie-Hellman secret repeatedly,
      using IBMJCEPLUS, causes a small memory leak
    - IJ44172 Security: Disable SHA-1 signed jars for EA
    - IJ44040 Security: Generating Diffie-Hellman key pairs repeatedly,
      using IBMJCEPLUS, Causes a small memory leak
    - IJ45200 Security: IBMJCEPLUS provider, during CHACHA20-POLY1305
      crypto operations, incorrectly throws an ILLEGALSTATEEXCEPTION
    - IJ45182 Security: IBMJCEPLUS provider fails in RSAPSS and ECDSA
      during signature operations resulting in Java cores
    - IJ45201 Security: IBMJCEPLUS provider failures (two) with AESGCM algorithm
    - IJ45202 Security: KEYTOOL NPE if signing certificate does not contain
      a SUBJECTKEYIDENTIFIER extension
    - IJ44075 Security: PKCS11KEYSTORE.JAVA - DOESPUBLICKEYMATCHPRIVATEKEY()
      method uses SHA1XXXX signature algorithms to match private and public keys
    - IJ45203 Security: RSAPSS multiple names for KEYTYPE
    - IJ43920 Security: The PKCS12 keystore update and the PBES2 support
    - IJ40002 XML: Fix security vulnerability CVE-2022-21426
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-12"/>
	<updated date="2023-04-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1207246">SUSE bug 1207246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207248">SUSE bug 1207248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207249">SUSE bug 1207249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208480">SUSE bug 1208480</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21830/">CVE-2023-21830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21830">CVE-2023-21830 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-21835/">CVE-2023-21835 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21835">CVE-2023-21835 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21843/">CVE-2023-21843 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21843">CVE-2023-21843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009753206" comment="java-1_8_0-ibm-1.8.0_sr8.0-30.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753200" comment="java-1_8_0-ibm-alsa-1.8.0_sr8.0-30.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753207" comment="java-1_8_0-ibm-devel-1.8.0_sr8.0-30.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753201" comment="java-1_8_0-ibm-plugin-1.8.0_sr8.0-30.105.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009753206" comment="java-1_8_0-ibm-1.8.0_sr8.0-30.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753200" comment="java-1_8_0-ibm-alsa-1.8.0_sr8.0-30.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753207" comment="java-1_8_0-ibm-devel-1.8.0_sr8.0-30.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753201" comment="java-1_8_0-ibm-plugin-1.8.0_sr8.0-30.105.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152901" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209429" ref_url="https://bugzilla.suse.com/1209429" source="BUGZILLA"/>
		<reference ref_id="1209431" ref_url="https://bugzilla.suse.com/1209431" source="BUGZILLA"/>
		<reference ref_id="1209432" ref_url="https://bugzilla.suse.com/1209432" source="BUGZILLA"/>
		<reference ref_id="1209855" ref_url="https://bugzilla.suse.com/1209855" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-26767" ref_url="https://www.suse.com/security/cve/CVE-2023-26767/" source="CVE"/>
		<reference ref_id="CVE-2023-26768" ref_url="https://www.suse.com/security/cve/CVE-2023-26768/" source="CVE"/>
		<reference ref_id="CVE-2023-26769" ref_url="https://www.suse.com/security/cve/CVE-2023-26769/" source="CVE"/>
		<description>
This update for liblouis fixes the following issues:
  
- CVE-2023-26767: Fixed buffer overflow vulnerability in lou_logFile function (bsc#1209429).
- CVE-2023-26768: Fixed buffer overflow in lou_logFile() (bsc#1209431).
- CVE-2023-26769: Fixed buffer Overflow vulnerability in resolveSubtable function (bsc#1209432).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-12"/>
	<updated date="2023-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1209429">SUSE bug 1209429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209431">SUSE bug 1209431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209432">SUSE bug 1209432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209855">SUSE bug 1209855</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26767/">CVE-2023-26767 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26767">CVE-2023-26767 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26768/">CVE-2023-26768 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26768">CVE-2023-26768 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26769/">CVE-2023-26769 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26769">CVE-2023-26769 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009753443" comment="liblouis-data-2.6.4-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753444" comment="liblouis9-2.6.4-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753445" comment="python-louis-2.6.4-6.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753446" comment="python3-louis-2.6.4-6.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009753443" comment="liblouis-data-2.6.4-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753444" comment="liblouis9-2.6.4-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753445" comment="python-louis-2.6.4-6.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753446" comment="python3-louis-2.6.4-6.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152902" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207247" ref_url="https://bugzilla.suse.com/1207247" source="BUGZILLA"/>
		<reference ref_id="1207250" ref_url="https://bugzilla.suse.com/1207250" source="BUGZILLA"/>
		<reference ref_id="1207251" ref_url="https://bugzilla.suse.com/1207251" source="BUGZILLA"/>
		<reference ref_id="CVE-2006-20001" ref_url="https://www.suse.com/security/cve/CVE-2006-20001/" source="CVE"/>
		<reference ref_id="CVE-2022-36760" ref_url="https://www.suse.com/security/cve/CVE-2022-36760/" source="CVE"/>
		<reference ref_id="CVE-2022-37436" ref_url="https://www.suse.com/security/cve/CVE-2022-37436/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-37436: Fixed an issue in mod_proxy where a malicious
  backend could cause the response headers to be truncated early,
  resulting in some headers being incorporated into the response body
  (bsc#1207251).
- CVE-2022-36760: Fixed an issue in mod_proxy_ajp that could allow
  request smuggling attacks (bsc#1207250).
- CVE-2006-20001: Fixed an issue in mod_proxy_ajp where a request
  header could cause memory corruption (bsc#1207247).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-27"/>
	<updated date="2023-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207247">SUSE bug 1207247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207250">SUSE bug 1207250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207251">SUSE bug 1207251</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2006-20001/">CVE-2006-20001 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-20001">CVE-2006-20001 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-36760/">CVE-2022-36760 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36760">CVE-2022-36760 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-37436/">CVE-2022-37436 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37436">CVE-2022-37436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009736632" comment="apache2-2.4.23-29.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736604" comment="apache2-doc-2.4.23-29.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736633" comment="apache2-example-pages-2.4.23-29.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736634" comment="apache2-prefork-2.4.23-29.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736635" comment="apache2-utils-2.4.23-29.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736636" comment="apache2-worker-2.4.23-29.94.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009736632" comment="apache2-2.4.23-29.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736604" comment="apache2-doc-2.4.23-29.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736633" comment="apache2-example-pages-2.4.23-29.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736634" comment="apache2-prefork-2.4.23-29.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736635" comment="apache2-utils-2.4.23-29.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736636" comment="apache2-worker-2.4.23-29.94.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152903" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185232" ref_url="https://bugzilla.suse.com/1185232" source="BUGZILLA"/>
		<reference ref_id="1185261" ref_url="https://bugzilla.suse.com/1185261" source="BUGZILLA"/>
		<reference ref_id="1185441" ref_url="https://bugzilla.suse.com/1185441" source="BUGZILLA"/>
		<reference ref_id="1185621" ref_url="https://bugzilla.suse.com/1185621" source="BUGZILLA"/>
		<reference ref_id="1187071" ref_url="https://bugzilla.suse.com/1187071" source="BUGZILLA"/>
		<reference ref_id="1187260" ref_url="https://bugzilla.suse.com/1187260" source="BUGZILLA"/>
		<reference ref_id="1193282" ref_url="https://bugzilla.suse.com/1193282" source="BUGZILLA"/>
		<reference ref_id="1193315" ref_url="https://bugzilla.suse.com/1193315" source="BUGZILLA"/>
		<reference ref_id="1198458" ref_url="https://bugzilla.suse.com/1198458" source="BUGZILLA"/>
		<reference ref_id="1201066" ref_url="https://bugzilla.suse.com/1201066" source="BUGZILLA"/>
		<reference ref_id="1202120" ref_url="https://bugzilla.suse.com/1202120" source="BUGZILLA"/>
		<reference ref_id="1205588" ref_url="https://bugzilla.suse.com/1205588" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-28737" ref_url="https://www.suse.com/security/cve/CVE-2022-28737/" source="CVE"/>
		<description>
This update for shim fixes the following issues:

- Updated shim signature after shim 15.7 be signed back:
  signature-sles.x86_64.asc, signature-sles.aarch64.asc (bsc#1198458)

- Add POST_PROCESS_PE_FLAGS=-N to the build command in shim.spec to
  disable the NX compatibility flag when using post-process-pe because
  grub2 is not ready. (bsc#1205588)

- Enable the NX compatibility flag by default. (jsc#PED-127) 

Update to 15.7 (bsc#1198458) (jsc#PED-127):

- Make SBAT variable payload introspectable
- Reference MokListRT instead of MokList
- Add a link to the test plan in the readme.
- [V3] Enable TDX measurement to RTMR register
- Discard load-options that start with a NUL
- Fixed load_cert_file bugs
- Add -malign-double to IA32 compiler flags
- pe: Fix image section entry-point validation
- make-archive: Build reproducible tarball
- mok: remove MokListTrusted from PCR 7

Other fixes:

- Support enhance shim measurement to TD RTMR. (jsc#PED-1273) 

- shim-install: ensure grub.cfg created is not overwritten after installing grub related files
- Add logic to shim.spec to only set sbat policy when efivarfs is writeable.  (bsc#1201066)
- Add logic to shim.spec for detecting --set-sbat-policy option before using mokutil to set sbat policy. (bsc#1202120)
- Change the URL in SBAT section to mail:security@suse.de. (bsc#1193282)

Update to 15.6 (bsc#1198458):

- MokManager: removed Locate graphic output protocol fail error message
- shim: implement SBAT verification for the shim_lock protocol
- post-process-pe: Fix a missing return code check
- Update github actions matrix to be more useful
- post-process-pe: Fix format string warnings on 32-bit platforms
- Allow MokListTrusted to be enabled by default
- Re-add ARM AArch64 support
- Use ASCII as fallback if Unicode Box Drawing characters fail
- make: don't treat cert.S specially
- shim: use SHIM_DEVEL_VERBOSE when built in devel mode
- Break out of the inner sbat loop if we find the entry.
- Support loading additional certificates
- Add support for NX (W^X) mitigations.
- Fix preserve_sbat_uefi_variable() logic
- SBAT Policy latest should be a one-shot
- pe: Fix a buffer overflow when SizeOfRawData &gt; VirtualSize
- pe: Perform image verification earlier when loading grub
- Update advertised sbat generation number for shim
- Update SBAT generation requirements for 05/24/22
- Also avoid CVE-2022-28737 in verify_image() by @vathpela

Update to 15.5 (bsc#1198458):

- Broken ia32 relocs and an unimportant submodule change.
- mok: allocate MOK config table as BootServicesData
- Don't call QueryVariableInfo() on EFI 1.10 machines (bsc#1187260)
- Relax the check for import_mok_state()  (bsc#1185261)
- SBAT.md: trivial changes
- shim: another attempt to fix load options handling
- Add tests for our load options parsing.
- arm/aa64: fix the size of .rela* sections
- mok: fix potential buffer overrun in import_mok_state
- mok: relax the maximum variable size check
- Don't unhook ExitBootServices when EBS protection is disabled
- fallback: find_boot_option() needs to return the index for the boot entry in optnum
- httpboot: Ignore case when checking HTTP headers
- Fallback allocation errors
- shim: avoid BOOTx64.EFI in message on other architectures
- str: remove duplicate parameter check
- fallback: add compile option FALLBACK_NONINTERACTIVE
- Test mok mirror
- Modify sbat.md to help with readability.
- csv: detect end of csv file correctly
- Specify that the .sbat section is ASCII not UTF-8
- tests: add 'include-fixed' GCC directory to include directories
- pe: simplify generate_hash()
- Don't make shim abort when TPM log event fails (RHBZ #2002265)
- Fallback to default loader if parsed one does not exist
- fallback: Fix for BootOrder crash when index returned
- Better console checks
- docs: update SBAT UEFI variable name
- Don't parse load options if invoked from removable media path
- fallback: fix fallback not passing arguments of the first boot option
- shim: Don't stop forever at 'Secure Boot not enabled' notification
- Allocate mokvar table in runtime memory.
- Remove post-process-pe on 'make clean'
- pe: missing perror argument


- CVE-2022-28737: Fixed a buffer overflow when SizeOfRawData &gt; VirtualSize (bsc#1198458)

- Add mokutil command to post script for setting sbat policy to latest mode
  when the SbatPolicy-605dab50-e046-4300-abb6-3dd810dd8b23 is not created.
  (bsc#1198458)

- Updated vendor dbx binary and script (bsc#1198458)

  - Updated dbx-cert.tar.xz and vendor-dbx-sles.bin for adding
    SLES-UEFI-SIGN-Certificate-2021-05.crt to vendor dbx list.
  - Updated dbx-cert.tar.xz and vendor-dbx-opensuse.bin for adding
    openSUSE-UEFI-SIGN-Certificate-2021-05.crt to vendor dbx list.
  - Updated vendor-dbx.bin for adding SLES-UEFI-SIGN-Certificate-2021-05.crt
    and openSUSE-UEFI-SIGN-Certificate-2021-05.crt for testing environment.
  - Updated generate-vendor-dbx.sh script for generating a vendor-dbx.bin
    file which includes all .der for testing environment.

- avoid buffer overflow when copying data to the MOK config table (bsc#1185232)
- Disable exporting vendor-dbx to MokListXRT since writing a large RT variable could crash some machines (bsc#1185261)
- ignore the odd LoadOptions length (bsc#1185232)
- shim-install: reset def_shim_efi to 'shim.efi' if the given file doesn't exist
- relax the maximum variable size check for u-boot (bsc#1185621)
- handle ignore_db and user_insecure_mode correctly (bsc#1185441, bsc#1187071)

- Split the keys in vendor-dbx.bin to vendor-dbx-sles and
  vendor-dbx-opensuse for shim-sles and shim-opensuse to reduce
  the size of MokListXRT (bsc#1185261) 
  + Also update generate-vendor-dbx.sh in dbx-cert.tar.xz
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-17"/>
	<updated date="2023-04-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185232">SUSE bug 1185232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185261">SUSE bug 1185261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185441">SUSE bug 1185441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185621">SUSE bug 1185621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187071">SUSE bug 1187071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187260">SUSE bug 1187260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193282">SUSE bug 1193282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193315">SUSE bug 1193315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198458">SUSE bug 1198458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201066">SUSE bug 1201066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202120">SUSE bug 1202120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205588">SUSE bug 1205588</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28737/">CVE-2022-28737 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28737">CVE-2022-28737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753805" comment="shim-15.7-25.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753805" comment="shim-15.7-25.24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152904" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209873" ref_url="https://bugzilla.suse.com/1209873" source="BUGZILLA"/>
		<reference ref_id="1209878" ref_url="https://bugzilla.suse.com/1209878" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0465" ref_url="https://www.suse.com/security/cve/CVE-2023-0465/" source="CVE"/>
		<reference ref_id="CVE-2023-0466" ref_url="https://www.suse.com/security/cve/CVE-2023-0466/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2023-0465: Invalid certificate policies in leaf certificates were silently ignored (bsc#1209878).
- CVE-2023-0466: Certificate policy check were not enabled (bsc#1209873).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-19"/>
	<updated date="2023-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209873">SUSE bug 1209873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209878">SUSE bug 1209878</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0465/">CVE-2023-0465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0465">CVE-2023-0465 at NVD</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-0466/">CVE-2023-0466 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0466">CVE-2023-0466 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009753097" comment="libopenssl-devel-1.0.2j-60.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753098" comment="libopenssl1_0_0-1.0.2j-60.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753099" comment="libopenssl1_0_0-32bit-1.0.2j-60.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753100" comment="libopenssl1_0_0-hmac-1.0.2j-60.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753101" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753102" comment="openssl-1.0.2j-60.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753103" comment="openssl-doc-1.0.2j-60.92.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009753097" comment="libopenssl-devel-1.0.2j-60.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753098" comment="libopenssl1_0_0-1.0.2j-60.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753099" comment="libopenssl1_0_0-32bit-1.0.2j-60.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753100" comment="libopenssl1_0_0-hmac-1.0.2j-60.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753101" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753102" comment="openssl-1.0.2j-60.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753103" comment="openssl-doc-1.0.2j-60.92.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152905" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209713" ref_url="https://bugzilla.suse.com/1209713" source="BUGZILLA"/>
		<reference ref_id="1209714" ref_url="https://bugzilla.suse.com/1209714" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-24593" ref_url="https://www.suse.com/security/cve/CVE-2023-24593/" source="CVE"/>
		<reference ref_id="CVE-2023-25180" ref_url="https://www.suse.com/security/cve/CVE-2023-25180/" source="CVE"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2023-24593: Fixed a denial of service caused by handling a malicious text-form variant (bsc#1209714).
- CVE-2023-25180: Fixed a denial of service caused by malicious serialised variant (bsc#1209713).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-19"/>
	<updated date="2023-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209713">SUSE bug 1209713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209714">SUSE bug 1209714</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24593/">CVE-2023-24593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-24593">CVE-2023-24593 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25180/">CVE-2023-25180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-25180">CVE-2023-25180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009752780" comment="glib2-lang-2.48.2-12.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752861" comment="glib2-tools-2.48.2-12.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752862" comment="libgio-2_0-0-2.48.2-12.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752863" comment="libgio-2_0-0-32bit-2.48.2-12.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752864" comment="libglib-2_0-0-2.48.2-12.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752865" comment="libglib-2_0-0-32bit-2.48.2-12.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752866" comment="libgmodule-2_0-0-2.48.2-12.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752867" comment="libgmodule-2_0-0-32bit-2.48.2-12.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752868" comment="libgobject-2_0-0-2.48.2-12.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752869" comment="libgobject-2_0-0-32bit-2.48.2-12.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752870" comment="libgthread-2_0-0-2.48.2-12.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752871" comment="libgthread-2_0-0-32bit-2.48.2-12.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152906" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174246" ref_url="https://bugzilla.suse.com/1174246" source="BUGZILLA"/>
		<reference ref_id="1196741" ref_url="https://bugzilla.suse.com/1196741" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14560" ref_url="https://www.suse.com/security/cve/CVE-2019-14560/" source="CVE"/>
		<reference ref_id="CVE-2021-38578" ref_url="https://www.suse.com/security/cve/CVE-2021-38578/" source="CVE"/>
		<description>
This update for ovmf fixes the following issues:

- CVE-2019-14560: Fixed potential secure boot bypass via an improper check of GetEfiGlobalVariable2 (bsc#1174246). 
- CVE-2021-38578: Fixed underflow in MdeModulePkg/PiSmmCore SmmEntryPointAdd (bsc#1196741).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-21"/>
	<updated date="2023-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174246">SUSE bug 1174246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196741">SUSE bug 1196741</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-14560/">CVE-2019-14560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-14560">CVE-2019-14560 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-38578/">CVE-2021-38578 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38578">CVE-2021-38578 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009754944" comment="ovmf-2017+git1492060560.b6d11d7c46-4.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754945" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754946" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.47.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009754944" comment="ovmf-2017+git1492060560.b6d11d7c46-4.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754945" comment="ovmf-tools-2017+git1492060560.b6d11d7c46-4.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754946" comment="qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.47.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152907" version="1" class="patch">
	<metadata>
		<title>Security update for libmicrohttpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208745" ref_url="https://bugzilla.suse.com/1208745" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-27371" ref_url="https://www.suse.com/security/cve/CVE-2023-27371/" source="CVE"/>
		<description>
This update for libmicrohttpd fixes the following issues:

- CVE-2023-27371: Fixed parser bug that could be used to crash servers using the MHD_PostProcessor (bsc#1208745).		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-21"/>
	<updated date="2023-04-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1208745">SUSE bug 1208745</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27371/">CVE-2023-27371 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27371">CVE-2023-27371 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753452" comment="libmicrohttpd10-0.9.30-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152908" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210328" ref_url="https://bugzilla.suse.com/1210328" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1981" ref_url="https://www.suse.com/security/cve/CVE-2023-1981/" source="CVE"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2023-1981: Fixed crash in avahi-daemon (bsc#1210328).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-24"/>
	<updated date="2023-04-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210328">SUSE bug 1210328</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1981/">CVE-2023-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1981">CVE-2023-1981 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009754120" comment="avahi-0.6.32-32.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754087" comment="avahi-lang-0.6.32-32.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754121" comment="avahi-utils-0.6.32-32.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754122" comment="libavahi-client3-0.6.32-32.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754123" comment="libavahi-client3-32bit-0.6.32-32.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754124" comment="libavahi-common3-0.6.32-32.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754125" comment="libavahi-common3-32bit-0.6.32-32.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754126" comment="libavahi-core7-0.6.32-32.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754127" comment="libavahi-glib1-0.6.32-32.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754128" comment="libavahi-glib1-32bit-0.6.32-32.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754129" comment="libdns_sd-0.6.32-32.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754130" comment="libdns_sd-32bit-0.6.32-32.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152909" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207413" ref_url="https://bugzilla.suse.com/1207413" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48281" ref_url="https://www.suse.com/security/cve/CVE-2022-48281/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2022-48281: Fixed a buffer overflow that could be triggered via
  a crafted image (bsc#1207413).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-27"/>
	<updated date="2023-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207413">SUSE bug 1207413</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48281/">CVE-2022-48281 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48281">CVE-2022-48281 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009736640" comment="libtiff5-4.0.9-44.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736629" comment="libtiff5-32bit-4.0.9-44.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736641" comment="tiff-4.0.9-44.65.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009736640" comment="libtiff5-4.0.9-44.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736629" comment="libtiff5-32bit-4.0.9-44.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736641" comment="tiff-4.0.9-44.65.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152910" version="1" class="patch">
	<metadata>
		<title>Security update for dmidecode (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210418" ref_url="https://bugzilla.suse.com/1210418" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-30630" ref_url="https://www.suse.com/security/cve/CVE-2023-30630/" source="CVE"/>
		<description>
This update for dmidecode fixes the following issues:

- CVE-2023-30630: Fixed potential privilege escalation vulnerability via file overwrite (bsc#1210418).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-26"/>
	<updated date="2023-04-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210418">SUSE bug 1210418</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-30630/">CVE-2023-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30630">CVE-2023-30630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755084" comment="dmidecode-3.0-10.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755084" comment="dmidecode-3.0-10.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152911" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210411" ref_url="https://bugzilla.suse.com/1210411" source="BUGZILLA"/>
		<reference ref_id="1210412" ref_url="https://bugzilla.suse.com/1210412" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28484" ref_url="https://www.suse.com/security/cve/CVE-2023-28484/" source="CVE"/>
		<reference ref_id="CVE-2023-29469" ref_url="https://www.suse.com/security/cve/CVE-2023-29469/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2023-29469: Fixed inconsistent result when hashing empty strings (bsc#1210412).
- CVE-2023-28484: Fixed NULL pointer dereference in xmlSchemaFixupComplexType (bsc#1210411).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-27"/>
	<updated date="2023-04-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210411">SUSE bug 1210411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210412">SUSE bug 1210412</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28484/">CVE-2023-28484 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28484">CVE-2023-28484 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29469/">CVE-2023-29469 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29469">CVE-2023-29469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009755313" comment="libxml2-2-2.9.4-46.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755314" comment="libxml2-2-32bit-2.9.4-46.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755287" comment="libxml2-doc-2.9.4-46.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755315" comment="libxml2-tools-2.9.4-46.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755316" comment="python-libxml2-2.9.4-46.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152912" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210295" ref_url="https://bugzilla.suse.com/1210295" source="BUGZILLA"/>
		<reference ref_id="1210731" ref_url="https://bugzilla.suse.com/1210731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0108" ref_url="https://www.suse.com/security/cve/CVE-2022-0108/" source="CVE"/>
		<reference ref_id="CVE-2022-32885" ref_url="https://www.suse.com/security/cve/CVE-2022-32885/" source="CVE"/>
		<reference ref_id="CVE-2022-32886" ref_url="https://www.suse.com/security/cve/CVE-2022-32886/" source="CVE"/>
		<reference ref_id="CVE-2022-32912" ref_url="https://www.suse.com/security/cve/CVE-2022-32912/" source="CVE"/>
		<reference ref_id="CVE-2023-25358" ref_url="https://www.suse.com/security/cve/CVE-2023-25358/" source="CVE"/>
		<reference ref_id="CVE-2023-25360" ref_url="https://www.suse.com/security/cve/CVE-2023-25360/" source="CVE"/>
		<reference ref_id="CVE-2023-25361" ref_url="https://www.suse.com/security/cve/CVE-2023-25361/" source="CVE"/>
		<reference ref_id="CVE-2023-25362" ref_url="https://www.suse.com/security/cve/CVE-2023-25362/" source="CVE"/>
		<reference ref_id="CVE-2023-25363" ref_url="https://www.suse.com/security/cve/CVE-2023-25363/" source="CVE"/>
		<reference ref_id="CVE-2023-27932" ref_url="https://www.suse.com/security/cve/CVE-2023-27932/" source="CVE"/>
		<reference ref_id="CVE-2023-27954" ref_url="https://www.suse.com/security/cve/CVE-2023-27954/" source="CVE"/>
		<reference ref_id="CVE-2023-28205" ref_url="https://www.suse.com/security/cve/CVE-2023-28205/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.38.6 (bsc#1210731):

- CVE-2022-0108: Fixed information leak.
- CVE-2022-32885: Fixed arbitrary code execution.
- CVE-2023-25358: Fixed use-after-free vulnerability in WebCore::RenderLayer.
- CVE-2023-27932: Fixed Same Origin Policy bypass.
- CVE-2023-27954: Fixed  sensitive user information tracking.
- CVE-2023-28205: Fixed arbitrary code execution (bsc#1210295). 

Already fixed in version 2.38.5:

- CVE-2022-32886, CVE-2022-32912, CVE-2023-25360, CVE-2023-25361, CVE-2023-25362, CVE-2023-25363.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-27"/>
	<updated date="2023-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210295">SUSE bug 1210295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210731">SUSE bug 1210731</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0108/">CVE-2022-0108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0108">CVE-2022-0108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-32885/">CVE-2022-32885 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32885">CVE-2022-32885 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32886/">CVE-2022-32886 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32886">CVE-2022-32886 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32912/">CVE-2022-32912 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32912">CVE-2022-32912 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25358/">CVE-2023-25358 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25358">CVE-2023-25358 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25360/">CVE-2023-25360 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25360">CVE-2023-25360 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25361/">CVE-2023-25361 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25361">CVE-2023-25361 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25362/">CVE-2023-25362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25362">CVE-2023-25362 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25363/">CVE-2023-25363 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25363">CVE-2023-25363 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-27932/">CVE-2023-27932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27932">CVE-2023-27932 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-27954/">CVE-2023-27954 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27954">CVE-2023-27954 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28205/">CVE-2023-28205 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28205">CVE-2023-28205 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009755525" comment="libjavascriptcoregtk-4_0-18-2.38.6-2.136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755526" comment="libwebkit2gtk-4_0-37-2.38.6-2.136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755475" comment="libwebkit2gtk3-lang-2.38.6-2.136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755527" comment="typelib-1_0-JavaScriptCore-4_0-2.38.6-2.136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755528" comment="typelib-1_0-WebKit2-4_0-2.38.6-2.136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755529" comment="typelib-1_0-WebKit2WebExtension-4_0-2.38.6-2.136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755530" comment="webkit2gtk-4_0-injected-bundles-2.38.6-2.136.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009755525" comment="libjavascriptcoregtk-4_0-18-2.38.6-2.136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755526" comment="libwebkit2gtk-4_0-37-2.38.6-2.136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755475" comment="libwebkit2gtk3-lang-2.38.6-2.136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755527" comment="typelib-1_0-JavaScriptCore-4_0-2.38.6-2.136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755528" comment="typelib-1_0-WebKit2-4_0-2.38.6-2.136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755529" comment="typelib-1_0-WebKit2WebExtension-4_0-2.38.6-2.136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755530" comment="webkit2gtk-4_0-injected-bundles-2.38.6-2.136.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152913" version="1" class="patch">
	<metadata>
		<title>Security update for git (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210686" ref_url="https://bugzilla.suse.com/1210686" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-25652" ref_url="https://www.suse.com/security/cve/CVE-2023-25652/" source="CVE"/>
		<reference ref_id="CVE-2023-25815" ref_url="https://www.suse.com/security/cve/CVE-2023-25815/" source="CVE"/>
		<reference ref_id="CVE-2023-29007" ref_url="https://www.suse.com/security/cve/CVE-2023-29007/" source="CVE"/>
		<description>
This update for git fixes the following issues:

- CVE-2023-25652: Fixed partial overwrite of paths outside the working tree (bsc#1210686).
- CVE-2023-25815: Fixed malicious placemtn of crafted message (bsc#1210686).
- CVE-2023-29007: Fixed arbitrary configuration injection (bsc#1210686).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-28"/>
	<updated date="2023-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210686">SUSE bug 1210686</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-25652/">CVE-2023-25652 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25652">CVE-2023-25652 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-25815/">CVE-2023-25815 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25815">CVE-2023-25815 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-29007/">CVE-2023-29007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29007">CVE-2023-29007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009755532" comment="git-2.26.2-27.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755533" comment="git-core-2.26.2-27.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755534" comment="git-cvs-2.26.2-27.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755535" comment="git-daemon-2.26.2-27.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755536" comment="git-email-2.26.2-27.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755537" comment="git-gui-2.26.2-27.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755538" comment="git-svn-2.26.2-27.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755539" comment="git-web-2.26.2-27.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755540" comment="gitk-2.26.2-27.69.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009755532" comment="git-2.26.2-27.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755533" comment="git-core-2.26.2-27.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755534" comment="git-cvs-2.26.2-27.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755535" comment="git-daemon-2.26.2-27.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755536" comment="git-email-2.26.2-27.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755537" comment="git-gui-2.26.2-27.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755538" comment="git-svn-2.26.2-27.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755539" comment="git-web-2.26.2-27.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755540" comment="gitk-2.26.2-27.69.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152914" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210507" ref_url="https://bugzilla.suse.com/1210507" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29383" ref_url="https://www.suse.com/security/cve/CVE-2023-29383/" source="CVE"/>
		<description>
This update for shadow fixes the following issues:

- CVE-2023-29383: Fixed apparent /etc/shadow manipulation via chfn (bsc#1210507). 
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-28"/>
	<updated date="2023-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210507">SUSE bug 1210507</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29383/">CVE-2023-29383 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29383">CVE-2023-29383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754940" comment="shadow-4.2.1-27.22.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754940" comment="shadow-4.2.1-27.22.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152915" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204779" ref_url="https://bugzilla.suse.com/1204779" source="BUGZILLA"/>
		<reference ref_id="1205797" ref_url="https://bugzilla.suse.com/1205797" source="BUGZILLA"/>
		<reference ref_id="1206028" ref_url="https://bugzilla.suse.com/1206028" source="BUGZILLA"/>
		<reference ref_id="1206071" ref_url="https://bugzilla.suse.com/1206071" source="BUGZILLA"/>
		<reference ref_id="1206072" ref_url="https://bugzilla.suse.com/1206072" source="BUGZILLA"/>
		<reference ref_id="1206075" ref_url="https://bugzilla.suse.com/1206075" source="BUGZILLA"/>
		<reference ref_id="1206077" ref_url="https://bugzilla.suse.com/1206077" source="BUGZILLA"/>
		<reference ref_id="1206866" ref_url="https://bugzilla.suse.com/1206866" source="BUGZILLA"/>
		<reference ref_id="1206867" ref_url="https://bugzilla.suse.com/1206867" source="BUGZILLA"/>
		<reference ref_id="1206868" ref_url="https://bugzilla.suse.com/1206868" source="BUGZILLA"/>
		<reference ref_id="1207162" ref_url="https://bugzilla.suse.com/1207162" source="BUGZILLA"/>
		<reference ref_id="1207396" ref_url="https://bugzilla.suse.com/1207396" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3491" ref_url="https://www.suse.com/security/cve/CVE-2022-3491/" source="CVE"/>
		<reference ref_id="CVE-2022-3520" ref_url="https://www.suse.com/security/cve/CVE-2022-3520/" source="CVE"/>
		<reference ref_id="CVE-2022-3591" ref_url="https://www.suse.com/security/cve/CVE-2022-3591/" source="CVE"/>
		<reference ref_id="CVE-2022-3705" ref_url="https://www.suse.com/security/cve/CVE-2022-3705/" source="CVE"/>
		<reference ref_id="CVE-2022-4141" ref_url="https://www.suse.com/security/cve/CVE-2022-4141/" source="CVE"/>
		<reference ref_id="CVE-2022-4292" ref_url="https://www.suse.com/security/cve/CVE-2022-4292/" source="CVE"/>
		<reference ref_id="CVE-2022-4293" ref_url="https://www.suse.com/security/cve/CVE-2022-4293/" source="CVE"/>
		<reference ref_id="CVE-2023-0049" ref_url="https://www.suse.com/security/cve/CVE-2023-0049/" source="CVE"/>
		<reference ref_id="CVE-2023-0051" ref_url="https://www.suse.com/security/cve/CVE-2023-0051/" source="CVE"/>
		<reference ref_id="CVE-2023-0054" ref_url="https://www.suse.com/security/cve/CVE-2023-0054/" source="CVE"/>
		<reference ref_id="CVE-2023-0288" ref_url="https://www.suse.com/security/cve/CVE-2023-0288/" source="CVE"/>
		<reference ref_id="CVE-2023-0433" ref_url="https://www.suse.com/security/cve/CVE-2023-0433/" source="CVE"/>
		<description>
This update for vim fixes the following issues:

- Updated to version 9.0.1234:
  - CVE-2023-0433: Fixed an out of bounds memory access that could
    cause a crash (bsc#1207396).
  - CVE-2023-0288: Fixed an out of bounds memory access that could
    cause a crash (bsc#1207162).
  - CVE-2023-0054: Fixed an out of bounds memory write that could
    cause a crash or memory corruption (bsc#1206868).
  - CVE-2023-0051: Fixed an out of bounds memory access that could
    cause a crash (bsc#1206867).
  - CVE-2023-0049: Fixed an out of bounds memory access that could
    cause a crash (bsc#1206866).
  - CVE-2022-3491: Fixed an out of bounds memory access that could
    cause a crash (bsc#1206028).
  - CVE-2022-3520: Fixed an out of bounds memory access that could
    cause a crash (bsc#1206071).
  - CVE-2022-3591: Fixed a use-after-free issue that could cause
    memory corruption or undefined behavior (bsc#1206072).
  - CVE-2022-4292: Fixed a use-after-free issue that could cause
    memory corruption or undefined behavior (bsc#1206075).
  - CVE-2022-4293: Fixed a floating point exception that could cause
    a crash (bsc#1206077).
  - CVE-2022-4141: Fixed an out of bounds memory write that could
    cause a crash or memory corruption (bsc#1205797).
  - CVE-2022-3705: Fixed an use-after-free issue that could cause
    a crash or memory corruption (bsc#1204779).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-30"/>
	<updated date="2023-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204779">SUSE bug 1204779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205797">SUSE bug 1205797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206028">SUSE bug 1206028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206071">SUSE bug 1206071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206072">SUSE bug 1206072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206075">SUSE bug 1206075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206077">SUSE bug 1206077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206866">SUSE bug 1206866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206867">SUSE bug 1206867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206868">SUSE bug 1206868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207162">SUSE bug 1207162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207396">SUSE bug 1207396</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3491/">CVE-2022-3491 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3491">CVE-2022-3491 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3520/">CVE-2022-3520 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3520">CVE-2022-3520 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3591/">CVE-2022-3591 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3591">CVE-2022-3591 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3705/">CVE-2022-3705 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3705">CVE-2022-3705 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4141/">CVE-2022-4141 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4141">CVE-2022-4141 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4292/">CVE-2022-4292 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4292">CVE-2022-4292 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4293/">CVE-2022-4293 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4293">CVE-2022-4293 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0049/">CVE-2023-0049 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0049">CVE-2023-0049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0051/">CVE-2023-0051 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0051">CVE-2023-0051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0054/">CVE-2023-0054 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0054">CVE-2023-0054 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0288/">CVE-2023-0288 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0288">CVE-2023-0288 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0433/">CVE-2023-0433 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0433">CVE-2023-0433 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009736638" comment="gvim-9.0.1234-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736639" comment="vim-9.0.1234-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736314" comment="vim-data-9.0.1234-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736315" comment="vim-data-common-9.0.1234-17.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009736638" comment="gvim-9.0.1234-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736639" comment="vim-9.0.1234-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736314" comment="vim-data-9.0.1234-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736315" comment="vim-data-common-9.0.1234-17.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152916" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198458" ref_url="https://bugzilla.suse.com/1198458" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-28737" ref_url="https://www.suse.com/security/cve/CVE-2022-28737/" source="CVE"/>
		<description>
This update for shim fixes the following issues:

- Update only adds the CVE reference to the previously released update (bsc#1198458, CVE-2022-28737)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-03"/>
	<updated date="2023-05-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198458">SUSE bug 1198458</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28737/">CVE-2022-28737 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28737">CVE-2022-28737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755995" comment="shim-15.7-25.27.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755995" comment="shim-15.7-25.27.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152917" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210434" ref_url="https://bugzilla.suse.com/1210434" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29491" ref_url="https://www.suse.com/security/cve/CVE-2023-29491/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

- CVE-2023-29491: Fixed memory corruption issues when processing malformed terminfo data (bsc#1210434).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-05"/>
	<updated date="2023-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210434">SUSE bug 1210434</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-29491/">CVE-2023-29491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29491">CVE-2023-29491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009756031" comment="libncurses5-5.9-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756032" comment="libncurses5-32bit-5.9-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756033" comment="libncurses6-5.9-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756034" comment="libncurses6-32bit-5.9-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756035" comment="ncurses-devel-5.9-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756036" comment="ncurses-devel-32bit-5.9-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756037" comment="ncurses-utils-5.9-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756038" comment="tack-5.9-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756039" comment="terminfo-5.9-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756040" comment="terminfo-base-5.9-81.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152918" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209358" ref_url="https://bugzilla.suse.com/1209358" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28450" ref_url="https://www.suse.com/security/cve/CVE-2023-28450/" source="CVE"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2023-28450: Fixed default maximum size for EDNS.0 UDP packets (bsc#1209358).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-08"/>
	<updated date="2023-05-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209358">SUSE bug 1209358</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28450/">CVE-2023-28450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28450">CVE-2023-28450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752232" comment="dnsmasq-2.78-18.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152919" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202666" ref_url="https://bugzilla.suse.com/1202666" source="BUGZILLA"/>
		<reference ref_id="1205244" ref_url="https://bugzilla.suse.com/1205244" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2022-45061: Fixed an excessive CPU usage when decoding crafted
  IDNA domain names (bsc#1205244).

Non-security fixes:

- Fixed the 2038 bug in the compileall module (bsc#1202666).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-30"/>
	<updated date="2023-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202666">SUSE bug 1202666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205244">SUSE bug 1205244</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009734024" comment="libpython2_7-1_0-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734025" comment="libpython2_7-1_0-32bit-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734026" comment="python-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734027" comment="python-32bit-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734028" comment="python-base-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734029" comment="python-base-32bit-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734030" comment="python-curses-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734031" comment="python-demo-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734056" comment="python-devel-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734032" comment="python-doc-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734033" comment="python-doc-pdf-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734034" comment="python-gdbm-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734035" comment="python-idle-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734036" comment="python-tk-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734037" comment="python-xml-2.7.18-28.93.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009734024" comment="libpython2_7-1_0-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734025" comment="libpython2_7-1_0-32bit-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734026" comment="python-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734027" comment="python-32bit-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734028" comment="python-base-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734029" comment="python-base-32bit-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734030" comment="python-curses-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734031" comment="python-demo-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734056" comment="python-devel-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734032" comment="python-doc-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734033" comment="python-doc-pdf-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734034" comment="python-gdbm-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734035" comment="python-idle-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734036" comment="python-tk-2.7.18-28.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734037" comment="python-xml-2.7.18-28.93.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152920" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210386" ref_url="https://bugzilla.suse.com/1210386" source="BUGZILLA"/>
		<reference ref_id="1210387" ref_url="https://bugzilla.suse.com/1210387" source="BUGZILLA"/>
		<reference ref_id="1210388" ref_url="https://bugzilla.suse.com/1210388" source="BUGZILLA"/>
		<reference ref_id="1210389" ref_url="https://bugzilla.suse.com/1210389" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-26551" ref_url="https://www.suse.com/security/cve/CVE-2023-26551/" source="CVE"/>
		<reference ref_id="CVE-2023-26552" ref_url="https://www.suse.com/security/cve/CVE-2023-26552/" source="CVE"/>
		<reference ref_id="CVE-2023-26553" ref_url="https://www.suse.com/security/cve/CVE-2023-26553/" source="CVE"/>
		<reference ref_id="CVE-2023-26554" ref_url="https://www.suse.com/security/cve/CVE-2023-26554/" source="CVE"/>
		<description>
This update for ntp fixes the following issues:

Fixed multiple out of bound writes:

CVE-2023-26551 (bsc#1210386), CVE-2023-26552 (bsc#1210388), CVE-2023-26553 (bsc#1210387), CVE-2023-26554 (bsc#1210389).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-11"/>
	<updated date="2023-05-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210386">SUSE bug 1210386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210387">SUSE bug 1210387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210388">SUSE bug 1210388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210389">SUSE bug 1210389</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26551/">CVE-2023-26551 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26551">CVE-2023-26551 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26552/">CVE-2023-26552 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26552">CVE-2023-26552 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26553/">CVE-2023-26553 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26553">CVE-2023-26553 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26554/">CVE-2023-26554 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26554">CVE-2023-26554 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009756799" comment="ntp-4.2.8p15-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756800" comment="ntp-doc-4.2.8p15-100.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152921" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1211175" ref_url="https://bugzilla.suse.com/1211175" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32205" ref_url="https://www.suse.com/security/cve/CVE-2023-32205/" source="CVE"/>
		<reference ref_id="CVE-2023-32206" ref_url="https://www.suse.com/security/cve/CVE-2023-32206/" source="CVE"/>
		<reference ref_id="CVE-2023-32207" ref_url="https://www.suse.com/security/cve/CVE-2023-32207/" source="CVE"/>
		<reference ref_id="CVE-2023-32211" ref_url="https://www.suse.com/security/cve/CVE-2023-32211/" source="CVE"/>
		<reference ref_id="CVE-2023-32212" ref_url="https://www.suse.com/security/cve/CVE-2023-32212/" source="CVE"/>
		<reference ref_id="CVE-2023-32213" ref_url="https://www.suse.com/security/cve/CVE-2023-32213/" source="CVE"/>
		<reference ref_id="CVE-2023-32214" ref_url="https://www.suse.com/security/cve/CVE-2023-32214/" source="CVE"/>
		<reference ref_id="CVE-2023-32215" ref_url="https://www.suse.com/security/cve/CVE-2023-32215/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Extended Support Release 102.11.0 ESR (bsc#1211175):

- CVE-2023-32205: Browser prompts could have been obscured by popups
- CVE-2023-32206: Crash in RLBox Expat driver
- CVE-2023-32207: Potential permissions request bypass via clickjacking
- CVE-2023-32211: Content process crash due to invalid wasm code
- CVE-2023-32212: Potential spoof due to obscured address bar
- CVE-2023-32213: Potential memory corruption in FileReader::DoReadData()
- CVE-2023-32214: Potential DoS via exposed protocol handlers
- CVE-2023-32215: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-11"/>
	<updated date="2023-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211175">SUSE bug 1211175</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32205/">CVE-2023-32205 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32205">CVE-2023-32205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32206/">CVE-2023-32206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32206">CVE-2023-32206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32207/">CVE-2023-32207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32207">CVE-2023-32207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32211/">CVE-2023-32211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32211">CVE-2023-32211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32212/">CVE-2023-32212 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32212">CVE-2023-32212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32213/">CVE-2023-32213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32213">CVE-2023-32213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32214/">CVE-2023-32214 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32214">CVE-2023-32214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32215/">CVE-2023-32215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32215">CVE-2023-32215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009757013" comment="MozillaFirefox-102.11.0-112.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757014" comment="MozillaFirefox-devel-102.11.0-112.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757015" comment="MozillaFirefox-translations-common-102.11.0-112.159.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009757013" comment="MozillaFirefox-102.11.0-112.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757014" comment="MozillaFirefox-devel-102.11.0-112.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757015" comment="MozillaFirefox-translations-common-102.11.0-112.159.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152922" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047218" ref_url="https://bugzilla.suse.com/1047218" source="BUGZILLA"/>
		<reference ref_id="1197284" ref_url="https://bugzilla.suse.com/1197284" source="BUGZILLA"/>
		<reference ref_id="1203185" ref_url="https://bugzilla.suse.com/1203185" source="BUGZILLA"/>
		<reference ref_id="1203599" ref_url="https://bugzilla.suse.com/1203599" source="BUGZILLA"/>
		<reference ref_id="1204023" ref_url="https://bugzilla.suse.com/1204023" source="BUGZILLA"/>
		<reference ref_id="1208049" ref_url="https://bugzilla.suse.com/1208049" source="BUGZILLA"/>
		<reference ref_id="1208051" ref_url="https://bugzilla.suse.com/1208051" source="BUGZILLA"/>
		<reference ref_id="1208060" ref_url="https://bugzilla.suse.com/1208060" source="BUGZILLA"/>
		<reference ref_id="1208062" ref_url="https://bugzilla.suse.com/1208062" source="BUGZILLA"/>
		<reference ref_id="1208064" ref_url="https://bugzilla.suse.com/1208064" source="BUGZILLA"/>
		<reference ref_id="1208965" ref_url="https://bugzilla.suse.com/1208965" source="BUGZILLA"/>
		<reference ref_id="1209113" ref_url="https://bugzilla.suse.com/1209113" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27191" ref_url="https://www.suse.com/security/cve/CVE-2022-27191/" source="CVE"/>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<reference ref_id="CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715/" source="CVE"/>
		<reference ref_id="CVE-2022-46146" ref_url="https://www.suse.com/security/cve/CVE-2022-46146/" source="CVE"/>
		<description>
This update fixes the following issues:

golang-github-prometheus-alertmanager:

- Security issues fixed:
  * CVE-2022-46146: Fix authentication bypass via cache poisoning (bsc#1208051)

prometheus-blackbox_exporter:

- Security issues fixed:
  * CVE-2022-46146: Fix authentication bypass via cache poisoning (bsc#1208062)
- Other non-security bugs fixed and changes:
  * Add `min_version` parameter of `tls_config` to allow enabling TLS 1.0 and 1.1 (bsc#1209113)
  * On SUSE Linux Enterprise build always with Go &gt;= 1.19 (bsc#1203599)

prometheus-postgres_exporter:

- Security issues fixed:
  * CVE-2022-46146: Fix authentication bypass via cache poisoning (bsc#1208060)
- Other non-security issues fixed:    
  * Adapt the systemd service security configuration to be able to start it on for Red Hat Linux Enterprise systems and
    clones
  * Create the prometheus user for Red Hat Linux Enterprise systems and clones
  * Fix broken log-level for values other than debug (bsc#1208965)
  
golang-github-prometheus-node_exporter:

- Security issues fixed in this version update to version 1.5.0 (jsc#PED-3578):
  * CVE-2022-27191: Update go/x/crypto (bsc#1197284)
  * CVE-2022-27664: Update go/x/net (bsc#1203185)
  * CVE-2022-46146: Update exporter-toolkit (bsc#1208064)
- Other non-security bug fixes and changes in this version update to 1.5.0 (jsc#PED-3578):
  * NOTE: This changes the Go runtime 'GOMAXPROCS' to 1. This is done to limit the concurrency of the exporter to 1 CPU
    thread at a time in order to avoid a race condition problem in the Linux kernel and parallel IO issues on nodes
    with high numbers of CPUs/CPU threads.
  * [BUGFIX] Fix hwmon label sanitizer
  * [BUGFIX] Use native endianness when encoding InetDiagMsg
  * [BUGFIX] Fix btrfs device stats always being zero
  * [BUGFIX] Fix diskstats exclude flags
  * [BUGFIX] [node-mixin] Fix fsSpaceAvailableCriticalThreshold and fsSpaceAvailableWarning
  * [BUGFIX] Fix concurrency issue in ethtool collector
  * [BUGFIX] Fix concurrency issue in netdev collector
  * [BUGFIX] Fix diskstat reads and write metrics for disks with different sector sizes
  * [BUGFIX] Fix iostat on macos broken by deprecation warning
  * [BUGFIX] Fix NodeFileDescriptorLimit alerts
  * [BUGFIX] Sanitize rapl zone names
  * [BUGFIX] Add file descriptor close safely in test
  * [BUGFIX] Fix race condition in os_release.go
  * [BUGFIX] Skip ZFS IO metrics if their paths are missing
  * [BUGFIX] Handle nil CPU thermal power status on M1
  * [BUGFIX] bsd: Ignore filesystems flagged as MNT_IGNORE
  * [BUGFIX] Sanitize UTF-8 in dmi collector
  * [CHANGE] Merge metrics descriptions in textfile collector
  * [FEATURE] Add multiple listeners and systemd socket listener activation
  * [FEATURE] [node-mixin] Add darwin dashboard to mixin
  * [FEATURE] Add 'isolated' metric on cpu collector on linux
  * [FEATURE] Add cgroup summary collector
  * [FEATURE] Add selinux collector
  * [FEATURE] Add slab info collector
  * [FEATURE] Add sysctl collector
  * [FEATURE] Also track the CPU Spin time for OpenBSD systems
  * [FEATURE] Add support for MacOS version
  * [ENHANCEMENT] Add RTNL version of netclass collector
  * [ENHANCEMENT] [node-mixin] Add missing selectors
  * [ENHANCEMENT] [node-mixin] Change current datasource to grafana's default
  * [ENHANCEMENT] [node-mixin] Change disk graph to disk table
  * [ENHANCEMENT] [node-mixin] Change io time units to %util
  * [ENHANCEMENT] Ad user_wired_bytes and laundry_bytes on *bsd
  * [ENHANCEMENT] Add additional vm_stat memory metrics for darwin
  * [ENHANCEMENT] Add device filter flags to arp collector
  * [ENHANCEMENT] Add diskstats include and exclude device flags
  * [ENHANCEMENT] Add node_softirqs_total metric
  * [ENHANCEMENT] Add rapl zone name label option
  * [ENHANCEMENT] Add slabinfo collector
  * [ENHANCEMENT] Allow user to select port on NTP server to query
  * [ENHANCEMENT] collector/diskstats: Add labels and metrics from udev
  * [ENHANCEMENT] Enable builds against older macOS SDK
  * [ENHANCEMENT] qdisk-linux: Add exclude and include flags for interface name
  * [ENHANCEMENT] systemd: Expose systemd minor version
  * [ENHANCEMENT] Use netlink for tcpstat collector
  * [ENHANCEMENT] Use netlink to get netdev stats
  * [ENHANCEMENT] Add additional perf counters for stalled frontend/backend cycles
  * [ENHANCEMENT] Add btrfs device error stats

golang-github-prometheus-prometheus:

- Security issues fixed in this version update to 2.37.6 (jsc#PED-3576):
  * CVE-2022-46146: Fix basic authentication bypass vulnerability (bsc#1208049, jsc#PED-3576)
  * CVE-2022-41715: Update our regexp library to fix upstream (bsc#1204023)
- Other non-security bug fixes and changes in this version update to 2.37.6 (jsc#PED-3576):    
  * [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a memory leak.
  * [BUGFIX] TSDB: Fix 'invalid magic number 0' error on Prometheus startup.
  * [BUGFIX] Agent: Fix validation of flag options and prevent WAL from growing more than desired.
  * [BUGFIX] Properly close file descriptor when logging unfinished queries.
  * [BUGFIX] TSDB: In the WAL watcher metrics, expose the type='exemplar' label instead of type='unknown' for exemplar
    records.
  * [BUGFIX] Alerting: Fix Alertmanager targets not being updated when alerts were queued.
  * [BUGFIX] Hetzner SD: Make authentication files relative to Prometheus config file.
  * [BUGFIX] Promtool: Fix promtool check config not erroring properly on failures.
  * [BUGFIX] Scrape: Keep relabeled scrape interval and timeout on reloads.
  * [BUGFIX] TSDB: Don't increment prometheus_tsdb_compactions_failed_total when context is canceled.
  * [BUGFIX] TSDB: Fix panic if series is not found when deleting series.
  * [BUGFIX] TSDB: Increase prometheus_tsdb_mmap_chunk_corruptions_total on out of sequence errors.
  * [BUGFIX] Uyuni SD: Make authentication files relative to Prometheus configuration file and fix default
    configuration values.
  * [BUGFIX] Fix serving of static assets like fonts and favicon.
  * [BUGFIX] promtool: Add --lint-fatal option.
  * [BUGFIX] Changing TotalQueryableSamples from int to int64.
  * [BUGFIX] tsdb/agent: Ignore duplicate exemplars.
  * [BUGFIX] TSDB: Fix chunk overflow appending samples at a variable rate.
  * [BUGFIX] Stop rule manager before TSDB is stopped.
  * [BUGFIX] Kubernetes SD: Explicitly include gcp auth from k8s.io.
  * [BUGFIX] Fix OpenMetrics parser to sort uppercase labels correctly.
  * [BUGFIX] UI: Fix scrape interval and duration tooltip not showing on target page.
  * [BUGFIX] Tracing/GRPC: Set TLS credentials only when insecure is false.
  * [BUGFIX] Agent: Fix ID collision when loading a WAL with multiple segments.
  * [BUGFIX] Remote-write: Fix a deadlock between Batch and flushing the queue.
  * [BUGFIX] PromQL: Properly return an error from histogram_quantile when metrics have the same labelset.
  * [BUGFIX] UI: Fix bug that sets the range input to the resolution.
  * [BUGFIX] TSDB: Fix a query panic when memory-snapshot-on-shutdown is enabled.
  * [BUGFIX] Parser: Specify type in metadata parser errors.
  * [BUGFIX] Scrape: Fix label limit changes not applying.
  * [BUGFIX] Remote-write: Fix deadlock between adding to queue and getting batch.
  * [BUGFIX] TSDB: Fix panic when m-mapping head chunks onto the disk.
  * [BUGFIX] Azure SD: Fix a regression when public IP Address isn't set.
  * [BUGFIX] Azure SD: Fix panic when public IP Address isn't set.
  * [BUGFIX] Remote-write: Fix deadlock when stopping a shard.
  * [BUGFIX] SD: Fix no such file or directory in K8s SD when not running inside K8s.
  * [BUGFIX] Promtool: Make exit codes more consistent.
  * [BUGFIX] Promtool: Fix flakiness of rule testing.
  * [BUGFIX] Remote-write: Update prometheus_remote_storage_queue_highest_sent_timestamp_seconds metric when write 
    irrecoverably fails.
  * [BUGFIX] Storage: Avoid panic in BufferedSeriesIterator.
  * [BUGFIX] TSDB: CompactBlockMetas should produce correct mint/maxt for overlapping blocks.
  * [BUGFIX] TSDB: Fix logging of exemplar storage size.
  * [BUGFIX] UI: Fix overlapping click targets for the alert state checkboxes.
  * [BUGFIX] UI: Fix Unhealthy filter on target page to actually display only Unhealthy targets.
  * [BUGFIX] UI: Fix autocompletion when expression is empty.
  * [BUGFIX] TSDB: Fix deadlock from simultaneous GC and write.
  * [CHANGE] TSDB: Delete *.tmp WAL files when Prometheus starts.
  * [CHANGE] promtool: Add new flag --lint (enabled by default) for the commands check rules and check config, resulting
    in a new exit code (3) for linter errors.
  * [CHANGE] UI: Classic UI removed.
  * [CHANGE] Tracing: Migrate from Jaeger to OpenTelemetry based tracing.
  * [CHANGE] PromQL: Promote negative offset and @ modifer to stable features.
  * [CHANGE] Web: Promote remote-write-receiver to stable.
  * [FEATURE] Nomad SD: New service discovery for Nomad built-in service discovery.
  * [FEATURE] Add lowercase and uppercase relabel action.
  * [FEATURE] SD: Add IONOS Cloud integration.
  * [FEATURE] SD: Add Vultr integration.
  * [FEATURE] SD: Add Linode SD failure count metric.
  * [FEATURE] Add prometheus_ready metric.
  * [FEATURE] Support for automatically setting the variable GOMAXPROCS to the container CPU limit. 
    Enable with the flag `--enable-feature=auto-gomaxprocs`.
  * [FEATURE] PromQL: Extend statistics with total and peak number of samples in a query. 
    Additionally, per-step statistics are available with --enable-feature=promql-per-step-stats and using
    stats=all in the query API. Enable with the flag `--enable-feature=per-step-stats`.
  * [FEATURE] Config: Add stripPort template function.
  * [FEATURE] Promtool: Add cardinality analysis to check metrics, enabled by flag --extended.
  * [FEATURE] SD: Enable target discovery in own K8s namespace.
  * [FEATURE] SD: Add provider ID label in K8s SD.
  * [FEATURE] Web: Add limit field to the rules API.
  * [ENHANCEMENT] Kubernetes SD: Allow attaching node labels for endpoint role.
  * [ENHANCEMENT] PromQL: Optimise creation of signature with/without labels.
  * [ENHANCEMENT] TSDB: Memory optimizations.
  * [ENHANCEMENT] TSDB: Reduce sleep time when reading WAL.
  * [ENHANCEMENT] OAuth2: Add appropriate timeouts and User-Agent header.
  * [ENHANCEMENT] Add stripDomain to template function.
  * [ENHANCEMENT] UI: Enable active search through dropped targets.
  * [ENHANCEMENT] promtool: support matchers when querying label
  * [ENHANCEMENT] Add agent mode identifier.
  * [ENHANCEMENT] TSDB: more efficient sorting of postings read from WAL at startup.
  * [ENHANCEMENT] Azure SD: Add metric to track Azure SD failures.
  * [ENHANCEMENT] Azure SD: Add an optional resource_group configuration.
  * [ENHANCEMENT] Kubernetes SD: Support discovery.k8s.io/v1
    EndpointSlice (previously only discovery.k8s.io/v1beta1
    EndpointSlice was supported).
  * [ENHANCEMENT] Kubernetes SD: Allow attaching node metadata to discovered pods.
  * [ENHANCEMENT] OAuth2: Support for using a proxy URL to fetch OAuth2 tokens.
  * [ENHANCEMENT] Configuration: Add the ability to disable HTTP2.
  * [ENHANCEMENT] Config: Support overriding minimum TLS version.
  * [ENHANCEMENT] TSDB: Disable the chunk write queue by default and allow configuration with the experimental flag
    `--storage.tsdb.head-chunks-write-queue-size`.
  * [ENHANCEMENT] HTTP SD: Add a failure counter.
  * [ENHANCEMENT] Azure SD: Set Prometheus User-Agent on requests.
  * [ENHANCEMENT] Uyuni SD: Reduce the number of logins to Uyuni.
  * [ENHANCEMENT] Scrape: Log when an invalid media type is encountered during a scrape.
  * [ENHANCEMENT] Scrape: Accept application/openmetrics-text;version=1.0.0 in addition to version=0.0.1.
  * [ENHANCEMENT] Remote-read: Add an option to not use external labels as selectors for remote read.
  * [ENHANCEMENT] UI: Optimize the alerts page and add a search bar.
  * [ENHANCEMENT] UI: Improve graph colors that were hard to see.
  * [ENHANCEMENT] Config: Allow escaping of $ with $$ when using environment variables with external labels.
  * [ENHANCEMENT] Remote-write: Avoid allocations by buffering concrete structs instead of interfaces.
  * [ENHANCEMENT] Remote-write: Log time series details for out-of-order samples in remote write receiver.
  * [ENHANCEMENT] Remote-write: Shard up more when backlogged.
  * [ENHANCEMENT] TSDB: Use simpler map key to improve exemplar ingest performance.
  * [ENHANCEMENT] TSDB: Avoid allocations when popping from the intersected postings heap.
  * [ENHANCEMENT] TSDB: Make chunk writing non-blocking, avoiding latency spikes in remote-write.
  * [ENHANCEMENT] TSDB: Improve label matching performance.
  * [ENHANCEMENT] UI: Optimize the service discovery page and add a search bar.
  * [ENHANCEMENT] UI: Optimize the target page and add a search bar.
    
golang-github-prometheus-promu:

- Non-security bug fixes and changes in this version update to 0.14.0 (jsc#PED-3576):
  * [BUGFIX] Set build date from last changelog modification (bsc#1047218)
  * [BUGFIX] Validate environment variable value
  * [BUGFIX]Set build date from SOURCE_DATE_EPOCH
  * [BUGFIX]Make extldflags extensible by configuration.
  * [BUGFIX] Avoid bind-mounting to allow building with a remote docker engine
  * [BUGFIX] Fix build on SmartOS by not setting gcc's -static flag
  * [BUGFIX] Fix git repository url parsing
  * [CHANGE] Remove ioutil
  * [CHANGE] Update common Prometheus files
  * [FEATURE] Add the ability to override tags per GOOS
  * [FEATURE] Adding changes to support s390x
  * [FEATURE] Added check_licenses Command to Promu
  * [ENHANCEMENT] Allow to customize nested options via env variables
  * [ENHANCEMENT] Add warning if promu info is unable to determine repo info
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-11"/>
	<updated date="2023-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1047218">SUSE bug 1047218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197284">SUSE bug 1197284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203185">SUSE bug 1203185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203599">SUSE bug 1203599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204023">SUSE bug 1204023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208049">SUSE bug 1208049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208051">SUSE bug 1208051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208060">SUSE bug 1208060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208062">SUSE bug 1208062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208064">SUSE bug 1208064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208965">SUSE bug 1208965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209113">SUSE bug 1209113</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27191/">CVE-2022-27191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27191">CVE-2022-27191 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46146/">CVE-2022-46146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46146">CVE-2022-46146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756672" comment="golang-github-prometheus-node_exporter-1.5.0-1.24.4 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756672" comment="golang-github-prometheus-node_exporter-1.5.0-1.24.4 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152923" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210303" ref_url="https://bugzilla.suse.com/1210303" source="BUGZILLA"/>
		<reference ref_id="1211228" ref_url="https://bugzilla.suse.com/1211228" source="BUGZILLA"/>
		<reference ref_id="1211229" ref_url="https://bugzilla.suse.com/1211229" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2454" ref_url="https://www.suse.com/security/cve/CVE-2023-2454/" source="CVE"/>
		<reference ref_id="CVE-2023-2455" ref_url="https://www.suse.com/security/cve/CVE-2023-2455/" source="CVE"/>
		<description>
This update for postgresql12 fixes the following issues:

Updated to version 12.15:
  - CVE-2023-2454: Fixed an issue where a user having permission to
    create a schema could hijack the privileges of a security definer
    function or extension script (bsc#1211228).
  - CVE-2023-2455: Fixed an issue that could allow a user to see or
    modify rows that should have been invisible (bsc#1211229).
  - Internal fixes (bsc#1210303).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-15"/>
	<updated date="2023-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210303">SUSE bug 1210303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211228">SUSE bug 1211228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211229">SUSE bug 1211229</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2454/">CVE-2023-2454 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2454">CVE-2023-2454 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2455/">CVE-2023-2455 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2455">CVE-2023-2455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009758174" comment="postgresql12-12.15-3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758175" comment="postgresql12-contrib-12.15-3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758176" comment="postgresql12-devel-12.15-3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758074" comment="postgresql12-docs-12.15-3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758177" comment="postgresql12-llvmjit-devel-12.15-3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758178" comment="postgresql12-plperl-12.15-3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758179" comment="postgresql12-plpython-12.15-3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758180" comment="postgresql12-pltcl-12.15-3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758181" comment="postgresql12-server-12.15-3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758182" comment="postgresql12-server-devel-12.15-3.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152924" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210303" ref_url="https://bugzilla.suse.com/1210303" source="BUGZILLA"/>
		<reference ref_id="1211228" ref_url="https://bugzilla.suse.com/1211228" source="BUGZILLA"/>
		<reference ref_id="1211229" ref_url="https://bugzilla.suse.com/1211229" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2454" ref_url="https://www.suse.com/security/cve/CVE-2023-2454/" source="CVE"/>
		<reference ref_id="CVE-2023-2455" ref_url="https://www.suse.com/security/cve/CVE-2023-2455/" source="CVE"/>
		<description>
This update for postgresql13 fixes the following issues:

Updated to version 13.11:
  - CVE-2023-2454: Fixed an issue where a user having permission to
    create a schema could hijack the privileges of a security definer
    function or extension script (bsc#1211228).
  - CVE-2023-2455: Fixed an issue that could allow a user to see or
    modify rows that should have been invisible (bsc#1211229).
  - Internal fixes (bsc#1210303).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-15"/>
	<updated date="2023-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210303">SUSE bug 1210303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211228">SUSE bug 1211228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211229">SUSE bug 1211229</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2454/">CVE-2023-2454 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2454">CVE-2023-2454 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2455/">CVE-2023-2455 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2455">CVE-2023-2455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009758183" comment="postgresql13-13.11-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758184" comment="postgresql13-contrib-13.11-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758081" comment="postgresql13-docs-13.11-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758185" comment="postgresql13-plperl-13.11-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758186" comment="postgresql13-plpython-13.11-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758187" comment="postgresql13-pltcl-13.11-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758188" comment="postgresql13-server-13.11-3.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152925" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210303" ref_url="https://bugzilla.suse.com/1210303" source="BUGZILLA"/>
		<reference ref_id="1211228" ref_url="https://bugzilla.suse.com/1211228" source="BUGZILLA"/>
		<reference ref_id="1211229" ref_url="https://bugzilla.suse.com/1211229" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2454" ref_url="https://www.suse.com/security/cve/CVE-2023-2454/" source="CVE"/>
		<reference ref_id="CVE-2023-2455" ref_url="https://www.suse.com/security/cve/CVE-2023-2455/" source="CVE"/>
		<description>
This update for postgresql14 fixes the following issues:

Updated to version 14.8:
  - CVE-2023-2454: Fixed an issue where a user having permission to
    create a schema could hijack the privileges of a security definer
    function or extension script (bsc#1211228).
  - CVE-2023-2455: Fixed an issue that could allow a user to see or
    modify rows that should have been invisible (bsc#1211229).
  - Internal fixes (bsc#1210303).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-15"/>
	<updated date="2023-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210303">SUSE bug 1210303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211228">SUSE bug 1211228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211229">SUSE bug 1211229</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2454/">CVE-2023-2454 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2454">CVE-2023-2454 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2455/">CVE-2023-2455 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2455">CVE-2023-2455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009758189" comment="postgresql14-14.8-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758190" comment="postgresql14-contrib-14.8-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758191" comment="postgresql14-devel-14.8-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758088" comment="postgresql14-docs-14.8-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758192" comment="postgresql14-llvmjit-devel-14.8-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758193" comment="postgresql14-plperl-14.8-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758194" comment="postgresql14-plpython-14.8-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758195" comment="postgresql14-pltcl-14.8-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758196" comment="postgresql14-server-14.8-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758197" comment="postgresql14-server-devel-14.8-3.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152926" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql15 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210303" ref_url="https://bugzilla.suse.com/1210303" source="BUGZILLA"/>
		<reference ref_id="1211228" ref_url="https://bugzilla.suse.com/1211228" source="BUGZILLA"/>
		<reference ref_id="1211229" ref_url="https://bugzilla.suse.com/1211229" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2454" ref_url="https://www.suse.com/security/cve/CVE-2023-2454/" source="CVE"/>
		<reference ref_id="CVE-2023-2455" ref_url="https://www.suse.com/security/cve/CVE-2023-2455/" source="CVE"/>
		<description>
This update for postgresql15 fixes the following issues:

Updated to version 15.3:
  - CVE-2023-2454: Fixed an issue where a user having permission to
    create a schema could hijack the privileges of a security definer
    function or extension script (bsc#1211228).
  - CVE-2023-2455: Fixed an issue that could allow a user to see or
    modify rows that should have been invisible (bsc#1211229).
  - Internal fixes (bsc#1210303).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-15"/>
	<updated date="2023-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210303">SUSE bug 1210303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211228">SUSE bug 1211228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211229">SUSE bug 1211229</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2454/">CVE-2023-2454 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2454">CVE-2023-2454 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2455/">CVE-2023-2455 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2455">CVE-2023-2455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009758172" comment="libecpg6-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758198" comment="libecpg6-32bit-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758173" comment="libpq5-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758171" comment="libpq5-32bit-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758199" comment="postgresql15-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758200" comment="postgresql15-contrib-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758201" comment="postgresql15-devel-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758099" comment="postgresql15-docs-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758202" comment="postgresql15-plperl-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758203" comment="postgresql15-plpython-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758204" comment="postgresql15-pltcl-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758205" comment="postgresql15-server-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758206" comment="postgresql15-server-devel-15.3-3.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009758172" comment="libecpg6-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758198" comment="libecpg6-32bit-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758173" comment="libpq5-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758171" comment="libpq5-32bit-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758199" comment="postgresql15-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758200" comment="postgresql15-contrib-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758201" comment="postgresql15-devel-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758099" comment="postgresql15-docs-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758202" comment="postgresql15-plperl-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758203" comment="postgresql15-plpython-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758204" comment="postgresql15-pltcl-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758205" comment="postgresql15-server-15.3-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758206" comment="postgresql15-server-devel-15.3-3.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152927" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1211231" ref_url="https://bugzilla.suse.com/1211231" source="BUGZILLA"/>
		<reference ref_id="1211232" ref_url="https://bugzilla.suse.com/1211232" source="BUGZILLA"/>
		<reference ref_id="1211233" ref_url="https://bugzilla.suse.com/1211233" source="BUGZILLA"/>
		<reference ref_id="1211339" ref_url="https://bugzilla.suse.com/1211339" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28320" ref_url="https://www.suse.com/security/cve/CVE-2023-28320/" source="CVE"/>
		<reference ref_id="CVE-2023-28321" ref_url="https://www.suse.com/security/cve/CVE-2023-28321/" source="CVE"/>
		<reference ref_id="CVE-2023-28322" ref_url="https://www.suse.com/security/cve/CVE-2023-28322/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2023-28320: Fixed siglongjmp race condition (bsc#1211231).
- CVE-2023-28321: Fixed IDN wildcard matching (bsc#1211232).
- CVE-2023-28322: Fixed POST-after-PUT confusion (bsc#1211233).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-17"/>
	<updated date="2023-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211231">SUSE bug 1211231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211232">SUSE bug 1211232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211233">SUSE bug 1211233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211339">SUSE bug 1211339</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28320/">CVE-2023-28320 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28320">CVE-2023-28320 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28321/">CVE-2023-28321 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28321">CVE-2023-28321 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28322/">CVE-2023-28322 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28322">CVE-2023-28322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009760463" comment="curl-7.37.0-37.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760464" comment="libcurl4-7.37.0-37.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760465" comment="libcurl4-32bit-7.37.0-37.98.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009760463" comment="curl-7.37.0-37.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760464" comment="libcurl4-7.37.0-37.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760465" comment="libcurl4-32bit-7.37.0-37.98.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152928" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210628" ref_url="https://bugzilla.suse.com/1210628" source="BUGZILLA"/>
		<reference ref_id="1210631" ref_url="https://bugzilla.suse.com/1210631" source="BUGZILLA"/>
		<reference ref_id="1210632" ref_url="https://bugzilla.suse.com/1210632" source="BUGZILLA"/>
		<reference ref_id="1210634" ref_url="https://bugzilla.suse.com/1210634" source="BUGZILLA"/>
		<reference ref_id="1210635" ref_url="https://bugzilla.suse.com/1210635" source="BUGZILLA"/>
		<reference ref_id="1210636" ref_url="https://bugzilla.suse.com/1210636" source="BUGZILLA"/>
		<reference ref_id="1210637" ref_url="https://bugzilla.suse.com/1210637" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-21930" ref_url="https://www.suse.com/security/cve/CVE-2023-21930/" source="CVE"/>
		<reference ref_id="CVE-2023-21937" ref_url="https://www.suse.com/security/cve/CVE-2023-21937/" source="CVE"/>
		<reference ref_id="CVE-2023-21938" ref_url="https://www.suse.com/security/cve/CVE-2023-21938/" source="CVE"/>
		<reference ref_id="CVE-2023-21939" ref_url="https://www.suse.com/security/cve/CVE-2023-21939/" source="CVE"/>
		<reference ref_id="CVE-2023-21954" ref_url="https://www.suse.com/security/cve/CVE-2023-21954/" source="CVE"/>
		<reference ref_id="CVE-2023-21967" ref_url="https://www.suse.com/security/cve/CVE-2023-21967/" source="CVE"/>
		<reference ref_id="CVE-2023-21968" ref_url="https://www.suse.com/security/cve/CVE-2023-21968/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Updated to version jdk8u372 (icedtea-3.27.0):
    - CVE-2023-21930: Fixed an issue in the JSSE component that could
      allow an attacker to access critical data without authorization
      (bsc#1210628).
    - CVE-2023-21937: Fixed an issue in the Networking component that
      could allow an attacker to update, insert or delete some data
      without authorization (bsc#1210631).
    - CVE-2023-21938: Fixed an issue in the Libraries component that
      could allow an attacker to update, insert or delete some data
      without authorization (bsc#1210632).
    - CVE-2023-21939: Fixed an issue in the Swing component that could
      allow an attacker to update, insert or delete some data without
      authorization (bsc#1210634).
    - CVE-2023-21954: Fixed an issue in the Hotspot component that
      could allow an attacker to access critical data without
      authorization (bsc#1210635).
    - CVE-2023-21967: Fixed an issue in the JSSE component that could
      allow an attacker to cause a hang or frequently repeatable
      crash without authorization (bsc#1210636).
    - CVE-2023-21968: Fixed an issue in the Libraries component that
      could allow an attacker to update, insert or delete some data
      without authorization (bsc#1210637).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-17"/>
	<updated date="2023-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210628">SUSE bug 1210628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210631">SUSE bug 1210631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210632">SUSE bug 1210632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210634">SUSE bug 1210634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210635">SUSE bug 1210635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210636">SUSE bug 1210636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210637">SUSE bug 1210637</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-21930/">CVE-2023-21930 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21937/">CVE-2023-21937 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21937">CVE-2023-21937 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21938/">CVE-2023-21938 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21938">CVE-2023-21938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21939/">CVE-2023-21939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21939">CVE-2023-21939 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-21954/">CVE-2023-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21954">CVE-2023-21954 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-21967/">CVE-2023-21967 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21967">CVE-2023-21967 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21968/">CVE-2023-21968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21968">CVE-2023-21968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009756563" comment="java-1_8_0-openjdk-1.8.0.372-27.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756564" comment="java-1_8_0-openjdk-demo-1.8.0.372-27.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756565" comment="java-1_8_0-openjdk-devel-1.8.0.372-27.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756566" comment="java-1_8_0-openjdk-headless-1.8.0.372-27.87.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009756563" comment="java-1_8_0-openjdk-1.8.0.372-27.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756564" comment="java-1_8_0-openjdk-demo-1.8.0.372-27.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756565" comment="java-1_8_0-openjdk-devel-1.8.0.372-27.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756566" comment="java-1_8_0-openjdk-headless-1.8.0.372-27.87.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152929" version="1" class="patch">
	<metadata>
		<title>Security update for ctags (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206543" ref_url="https://bugzilla.suse.com/1206543" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4515" ref_url="https://www.suse.com/security/cve/CVE-2022-4515/" source="CVE"/>
		<description>
This update for ctags fixes the following issues:

- CVE-2022-4515: Fixed a command injection issue via a tag file wih a
  crafted filename (bsc#1206543).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-01"/>
	<updated date="2023-02-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206543">SUSE bug 1206543</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4515/">CVE-2022-4515 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4515">CVE-2022-4515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734017" comment="ctags-5.8-8.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734017" comment="ctags-5.8-8.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152930" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206580" ref_url="https://bugzilla.suse.com/1206580" source="BUGZILLA"/>
		<reference ref_id="1206581" ref_url="https://bugzilla.suse.com/1206581" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4337" ref_url="https://www.suse.com/security/cve/CVE-2022-4337/" source="CVE"/>
		<reference ref_id="CVE-2022-4338" ref_url="https://www.suse.com/security/cve/CVE-2022-4338/" source="CVE"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2022-4338: Fixed Integer Underflow in Organization Specific TLV (bsc#1206580).
- CVE-2022-4337: Fixed Out-of-Bounds Read in Organization Specific TLV (bsc#1206581).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206580">SUSE bug 1206580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206581">SUSE bug 1206581</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-4337/">CVE-2022-4337 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4337">CVE-2022-4337 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-4338/">CVE-2022-4338 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4338">CVE-2022-4338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760617" comment="openvswitch-2.7.12-3.45.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760617" comment="openvswitch-2.7.12-3.45.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152931" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208479" ref_url="https://bugzilla.suse.com/1208479" source="BUGZILLA"/>
		<reference ref_id="1211382" ref_url="https://bugzilla.suse.com/1211382" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-33972" ref_url="https://www.suse.com/security/cve/CVE-2022-33972/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to Intel CPU Microcode 20230512 release. (bsc#1211382)
- New Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | ADL-N          | A0       | 06-be-00/01 |          | 00000010 | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E
  | AZB            | A0       | 06-9a-04/40 |          | 00000004 | Intel(R) Atom(R) C1100
  | AZB            | R0       | 06-9a-04/40 |          | 00000004 | Intel(R) Atom(R) C1100
- Updated Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | ADL            | L0       | 06-9a-03/80 | 00000429 | 0000042a | Core Gen12
  | ADL            | L0       | 06-9a-04/80 | 00000429 | 0000042a | Core Gen12
  | AML-Y22        | H0       | 06-8e-09/10 |          | 000000f2 | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000f4 | 000000f6 | Core Gen10 Mobile
  | CFL-H          | R0       | 06-9e-0d/22 | 000000f4 | 000000f8 | Core Gen9 Mobile
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000f0 | 000000f2 | Core Gen9
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000f0 | 000000f2 | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000f0 | 000000f2 | Core Gen8
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000f0 | 000000f2 | Core Gen8 Mobile
  | CLX-SP         | B0       | 06-55-06/bf | 04003303 | 04003501 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05003303 | 05003501 | Xeon Scalable Gen2
  | CML-H          | R1       | 06-a5-02/20 | 000000f4 | 000000f6 | Core Gen10 Mobile
  | CML-S102       | Q0       | 06-a5-05/22 | 000000f4 | 000000f6 | Core Gen10
  | CML-S62        | G1       | 06-a5-03/22 | 000000f4 | 000000f6 | Core Gen10
  | CML-U62 V1     | A0       | 06-a6-00/80 | 000000f4 | 000000f6 | Core Gen10 Mobile
  | CML-U62 V2     | K1       | 06-a6-01/80 | 000000f4 | 000000f6 | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000f4 | 000000f6 | Core Gen10 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf | 07002503 | 07002601 | Xeon Scalable Gen3
  | ICL-D          | B0       | 06-6c-01/10 | 01000211 | 01000230 | Xeon D-17xx, D-27xx
  | ICL-U/Y        | D1       | 06-7e-05/80 | 000000b8 | 000000ba | Core Gen10 Mobile
  | ICX-SP         | D0       | 06-6a-06/87 | 0d000389 | 0d000390 | Xeon Scalable Gen3
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000f0 | 000000f2 | Core Gen7; Xeon E3 v6
  | KBL-U/Y        | H0       | 06-8e-09/c0 |          | 000000f2 | Core Gen7 Mobile
  | LKF            | B2/B3    | 06-8a-01/10 | 00000032 | 00000033 | Core w/Hybrid Technology
  | RKL-S          | B0       | 06-a7-01/02 | 00000057 | 00000058 | Core Gen11
  | RPL-H 6+8      | J0       | 06-ba-02/07 | 0000410e | 00004112 | Core Gen13
  | RPL-P 6+8      | J0       | 06-ba-02/07 | 0000410e | 00004112 | Core Gen13
  | RPL-S          | S0       | 06-b7-01/32 | 00000112 | 00000113 | Core Gen13
  | RPL-U 2+8      | Q0       | 06-ba-03/07 | 0000410e | 00004112 | Core Gen13
  | SKX-D          | H0       | 06-55-04/b7 |          | 02006f05 | Xeon D-21xx
  | SKX-SP         | B1       | 06-55-03/97 | 01000161 | 01000171 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 |          | 02006f05 | Xeon Scalable
  | SPR-HBM        | B3       | 06-8f-08/10 | 2c000170 | 2c0001d1 | Xeon Max
  | SPR-SP         | E0       | 06-8f-04/87 | 2b000181 | 2b000461 | Xeon Scalable Gen4
  | SPR-SP         | E2       | 06-8f-05/87 | 2b000181 | 2b000461 | Xeon Scalable Gen4
  | SPR-SP         | E3       | 06-8f-06/87 | 2b000181 | 2b000461 | Xeon Scalable Gen4
  | SPR-SP         | E4       | 06-8f-07/87 | 2b000181 | 2b000461 | Xeon Scalable Gen4
  | SPR-SP         | E5       | 06-8f-08/87 | 2b000181 | 2b000461 | Xeon Scalable Gen4
  | SPR-SP         | S2       | 06-8f-07/87 | 2b000181 | 2b000461 | Xeon Scalable Gen4
  | SPR-SP         | S3       | 06-8f-08/87 | 2b000181 | 2b000461 | Xeon Scalable Gen4
  | TGL            | B1       | 06-8c-01/80 | 000000a6 | 000000aa | Core Gen11 Mobile
  | TGL-H          | R0       | 06-8d-01/c2 | 00000042 | 00000044 | Core Gen11 Mobile
  | TGL-R          | C0       | 06-8c-02/c2 | 00000028 | 0000002a | Core Gen11 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000f4 | 000000f6 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 |          | 000000f2 | Core Gen8 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-24"/>
	<updated date="2023-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208479">SUSE bug 1208479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211382">SUSE bug 1211382</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-33972/">CVE-2022-33972 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33972">CVE-2022-33972 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760462" comment="ucode-intel-20230512-13.107.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760462" comment="ucode-intel-20230512-13.107.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152932" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1211608" ref_url="https://bugzilla.suse.com/1211608" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28709" ref_url="https://www.suse.com/security/cve/CVE-2023-28709/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2023-28709: Mended an incomplete fix for CVE-2023-24998 (bsc#1211608).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-30"/>
	<updated date="2023-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211608">SUSE bug 1211608</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28709/">CVE-2023-28709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28709">CVE-2023-28709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009763680" comment="tomcat-8.0.53-29.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763681" comment="tomcat-admin-webapps-8.0.53-29.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763682" comment="tomcat-docs-webapp-8.0.53-29.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763683" comment="tomcat-el-3_0-api-8.0.53-29.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763684" comment="tomcat-javadoc-8.0.53-29.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763685" comment="tomcat-jsp-2_3-api-8.0.53-29.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763686" comment="tomcat-lib-8.0.53-29.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763687" comment="tomcat-servlet-3_1-api-8.0.53-29.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763688" comment="tomcat-webapps-8.0.53-29.66.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009763680" comment="tomcat-8.0.53-29.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763681" comment="tomcat-admin-webapps-8.0.53-29.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763682" comment="tomcat-docs-webapp-8.0.53-29.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763683" comment="tomcat-el-3_0-api-8.0.53-29.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763684" comment="tomcat-javadoc-8.0.53-29.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763685" comment="tomcat-jsp-2_3-api-8.0.53-29.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763686" comment="tomcat-lib-8.0.53-29.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763687" comment="tomcat-servlet-3_1-api-8.0.53-29.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763688" comment="tomcat-webapps-8.0.53-29.66.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152933" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208226" ref_url="https://bugzilla.suse.com/1208226" source="BUGZILLA"/>
		<reference ref_id="1208227" ref_url="https://bugzilla.suse.com/1208227" source="BUGZILLA"/>
		<reference ref_id="1208228" ref_url="https://bugzilla.suse.com/1208228" source="BUGZILLA"/>
		<reference ref_id="1208229" ref_url="https://bugzilla.suse.com/1208229" source="BUGZILLA"/>
		<reference ref_id="1208230" ref_url="https://bugzilla.suse.com/1208230" source="BUGZILLA"/>
		<reference ref_id="1208231" ref_url="https://bugzilla.suse.com/1208231" source="BUGZILLA"/>
		<reference ref_id="1208232" ref_url="https://bugzilla.suse.com/1208232" source="BUGZILLA"/>
		<reference ref_id="1208233" ref_url="https://bugzilla.suse.com/1208233" source="BUGZILLA"/>
		<reference ref_id="1208234" ref_url="https://bugzilla.suse.com/1208234" source="BUGZILLA"/>
		<reference ref_id="1208236" ref_url="https://bugzilla.suse.com/1208236" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0795" ref_url="https://www.suse.com/security/cve/CVE-2023-0795/" source="CVE"/>
		<reference ref_id="CVE-2023-0796" ref_url="https://www.suse.com/security/cve/CVE-2023-0796/" source="CVE"/>
		<reference ref_id="CVE-2023-0797" ref_url="https://www.suse.com/security/cve/CVE-2023-0797/" source="CVE"/>
		<reference ref_id="CVE-2023-0798" ref_url="https://www.suse.com/security/cve/CVE-2023-0798/" source="CVE"/>
		<reference ref_id="CVE-2023-0799" ref_url="https://www.suse.com/security/cve/CVE-2023-0799/" source="CVE"/>
		<reference ref_id="CVE-2023-0800" ref_url="https://www.suse.com/security/cve/CVE-2023-0800/" source="CVE"/>
		<reference ref_id="CVE-2023-0801" ref_url="https://www.suse.com/security/cve/CVE-2023-0801/" source="CVE"/>
		<reference ref_id="CVE-2023-0802" ref_url="https://www.suse.com/security/cve/CVE-2023-0802/" source="CVE"/>
		<reference ref_id="CVE-2023-0803" ref_url="https://www.suse.com/security/cve/CVE-2023-0803/" source="CVE"/>
		<reference ref_id="CVE-2023-0804" ref_url="https://www.suse.com/security/cve/CVE-2023-0804/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

Fixed multiple out of bounds read/write security issues:

  CVE-2023-0795 (bsc#1208226), CVE-2023-0796 (bsc#1208227), CVE-2023-0797 (bsc#1208228),
  CVE-2023-0798 (bsc#1208229), CVE-2023-0799 (bsc#1208230), CVE-2023-0800 (bsc#1208231),
  CVE-2023-0801 (bsc#1208232), CVE-2023-0802 (bsc#1208233), CVE-2023-0803 (bsc#1208234),
  CVE-2023-0804 (bsc#1208236).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-30"/>
	<updated date="2023-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1208226">SUSE bug 1208226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208227">SUSE bug 1208227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208228">SUSE bug 1208228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208229">SUSE bug 1208229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208230">SUSE bug 1208230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208231">SUSE bug 1208231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208232">SUSE bug 1208232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208233">SUSE bug 1208233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208234">SUSE bug 1208234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208236">SUSE bug 1208236</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0795/">CVE-2023-0795 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0795">CVE-2023-0795 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0796/">CVE-2023-0796 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0796">CVE-2023-0796 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0797/">CVE-2023-0797 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0797">CVE-2023-0797 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0798/">CVE-2023-0798 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0798">CVE-2023-0798 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0799/">CVE-2023-0799 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0799">CVE-2023-0799 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0800/">CVE-2023-0800 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0800">CVE-2023-0800 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0801/">CVE-2023-0801 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0801">CVE-2023-0801 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0802/">CVE-2023-0802 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0802">CVE-2023-0802 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0803/">CVE-2023-0803 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0803">CVE-2023-0803 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0804/">CVE-2023-0804 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0804">CVE-2023-0804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009763475" comment="libtiff5-4.0.9-44.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763476" comment="libtiff5-32bit-4.0.9-44.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763477" comment="tiff-4.0.9-44.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152934" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1211430" ref_url="https://bugzilla.suse.com/1211430" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2023-2650: Fixed possible denial of service translating ASN.1 object identifiers (bsc#1211430).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-30"/>
	<updated date="2023-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211430">SUSE bug 1211430</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009763954" comment="libopenssl-devel-1.0.2j-60.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763955" comment="libopenssl1_0_0-1.0.2j-60.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763956" comment="libopenssl1_0_0-32bit-1.0.2j-60.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763957" comment="libopenssl1_0_0-hmac-1.0.2j-60.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763958" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763959" comment="openssl-1.0.2j-60.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763960" comment="openssl-doc-1.0.2j-60.95.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009763954" comment="libopenssl-devel-1.0.2j-60.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763955" comment="libopenssl1_0_0-1.0.2j-60.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763956" comment="libopenssl1_0_0-32bit-1.0.2j-60.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763957" comment="libopenssl1_0_0-hmac-1.0.2j-60.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763958" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763959" comment="openssl-1.0.2j-60.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763960" comment="openssl-doc-1.0.2j-60.95.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152935" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1211791" ref_url="https://bugzilla.suse.com/1211791" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34151" ref_url="https://www.suse.com/security/cve/CVE-2023-34151/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2023-34151: Fixed an undefined behavior issue due to floating
  point truncation (bsc#1211791).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-01"/>
	<updated date="2023-06-01"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1211791">SUSE bug 1211791</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-34151/">CVE-2023-34151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34151">CVE-2023-34151 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009763981" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.189.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763982" comment="ImageMagick-config-6-upstream-6.8.8.1-71.189.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763983" comment="libMagickCore-6_Q16-1-6.8.8.1-71.189.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763984" comment="libMagickWand-6_Q16-1-6.8.8.1-71.189.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152936" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1211643" ref_url="https://bugzilla.suse.com/1211643" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32324" ref_url="https://www.suse.com/security/cve/CVE-2023-32324/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2023-32324: Fixed a buffer overflow in format_log_line() which could cause a denial-of-service (bsc#1211643).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-01"/>
	<updated date="2023-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211643">SUSE bug 1211643</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32324/">CVE-2023-32324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32324">CVE-2023-32324 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764285" comment="cups-1.7.5-20.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764286" comment="cups-client-1.7.5-20.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764287" comment="cups-libs-1.7.5-20.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764284" comment="cups-libs-32bit-1.7.5-20.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764285" comment="cups-1.7.5-20.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764286" comment="cups-client-1.7.5-20.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764287" comment="cups-libs-1.7.5-20.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764284" comment="cups-libs-32bit-1.7.5-20.39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152937" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1211795" ref_url="https://bugzilla.suse.com/1211795" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2953" ref_url="https://www.suse.com/security/cve/CVE-2023-2953/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2023-2953: Fixed null pointer deref in ber_memalloc_x (bsc#1211795).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-02"/>
	<updated date="2023-06-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211795">SUSE bug 1211795</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2953/">CVE-2023-2953 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2953">CVE-2023-2953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009763974" comment="libldap-2_4-2-2.4.41-18.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763975" comment="libldap-2_4-2-32bit-2.4.41-18.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763976" comment="openldap2-2.4.41-18.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763977" comment="openldap2-back-meta-2.4.41-18.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763978" comment="openldap2-client-2.4.41-18.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763979" comment="openldap2-doc-2.4.41-18.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763980" comment="openldap2-ppolicy-check-password-1.2-18.95.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152938" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1211922" ref_url="https://bugzilla.suse.com/1211922" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34414" ref_url="https://www.suse.com/security/cve/CVE-2023-34414/" source="CVE"/>
		<reference ref_id="CVE-2023-34416" ref_url="https://www.suse.com/security/cve/CVE-2023-34416/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Extended Support Release 102.12.0 ESR (bsc#1211922):

- CVE-2023-34414: Click-jacking certificate exceptions through rendering lag
- CVE-2023-34416: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-07"/>
	<updated date="2023-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211922">SUSE bug 1211922</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34414/">CVE-2023-34414 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34414">CVE-2023-34414 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34416/">CVE-2023-34416 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34416">CVE-2023-34416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764861" comment="MozillaFirefox-102.12.0-112.162.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764862" comment="MozillaFirefox-devel-102.12.0-112.162.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764863" comment="MozillaFirefox-translations-common-102.12.0-112.162.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764861" comment="MozillaFirefox-102.12.0-112.162.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764862" comment="MozillaFirefox-devel-102.12.0-112.162.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764863" comment="MozillaFirefox-translations-common-102.12.0-112.162.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152939" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208471" ref_url="https://bugzilla.suse.com/1208471" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2023-24329: Fixed a blocklist bypass via the urllib.parse component when supplying a URL that starts with blank characters (bsc#1208471).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-08"/>
	<updated date="2023-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208471">SUSE bug 1208471</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764878" comment="libpython2_7-1_0-2.7.18-28.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764879" comment="libpython2_7-1_0-32bit-2.7.18-28.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764880" comment="python-2.7.18-28.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764881" comment="python-32bit-2.7.18-28.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764882" comment="python-base-2.7.18-28.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764883" comment="python-base-32bit-2.7.18-28.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764884" comment="python-curses-2.7.18-28.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764885" comment="python-demo-2.7.18-28.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764886" comment="python-devel-2.7.18-28.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764887" comment="python-doc-2.7.18-28.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764888" comment="python-doc-pdf-2.7.18-28.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764889" comment="python-gdbm-2.7.18-28.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764890" comment="python-idle-2.7.18-28.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764891" comment="python-tk-2.7.18-28.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764892" comment="python-xml-2.7.18-28.96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152940" version="1" class="patch">
	<metadata>
		<title>Security update for python36 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1203750" ref_url="https://bugzilla.suse.com/1203750" source="BUGZILLA"/>
		<reference ref_id="1211158" ref_url="https://bugzilla.suse.com/1211158" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<description>
This update for python36 fixes the following issues:

- CVE-2007-4559: Fixed filter for tarfile.extractall (bsc#1203750).

- Fixed unittest.mock.patch.dict returns function when applied to coroutines (bsc#1211158).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-08"/>
	<updated date="2023-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203750">SUSE bug 1203750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211158">SUSE bug 1211158</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764867" comment="libpython3_6m1_0-3.6.15-6.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764868" comment="python36-3.6.15-6.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764869" comment="python36-base-3.6.15-6.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764870" comment="python36-curses-3.6.15-6.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764871" comment="python36-dbm-3.6.15-6.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764872" comment="python36-devel-3.6.15-6.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764873" comment="python36-idle-3.6.15-6.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764874" comment="python36-testsuite-3.6.15-6.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764875" comment="python36-tk-3.6.15-6.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764876" comment="python36-tools-3.6.15-6.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152941" version="1" class="patch">
	<metadata>
		<title>Security update for supportutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196933" ref_url="https://bugzilla.suse.com/1196933" source="BUGZILLA"/>
		<reference ref_id="1206350" ref_url="https://bugzilla.suse.com/1206350" source="BUGZILLA"/>
		<reference ref_id="1206608" ref_url="https://bugzilla.suse.com/1206608" source="BUGZILLA"/>
		<reference ref_id="1207598" ref_url="https://bugzilla.suse.com/1207598" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45154" ref_url="https://www.suse.com/security/cve/CVE-2022-45154/" source="CVE"/>
		<description>
This update for supportutils fixes the following issues:

Security fixes:

- CVE-2022-45154: Removed iSCSI passwords from supportconfig archive (bsc#1207598).

Bug fixes:

- Fixed missing status detail for apparmor (bsc#1196933)
- Corrected invalid argument list in docker.txt (bsc#1206608)
- Changed _sanitize_file to include lio_setup.sh (bsc#1206350)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-08"/>
	<updated date="2023-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196933">SUSE bug 1196933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206350">SUSE bug 1206350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206608">SUSE bug 1206608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207598">SUSE bug 1207598</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-45154/">CVE-2022-45154 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45154">CVE-2022-45154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764819" comment="supportutils-3.0.11-95.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152942" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1211894" ref_url="https://bugzilla.suse.com/1211894" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2977" ref_url="https://www.suse.com/security/cve/CVE-2023-2977/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2023-2977: Fixed out of bounds read in pkcs15 cardos_have_verifyrc_package() (bsc#1211894).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-08"/>
	<updated date="2023-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211894">SUSE bug 1211894</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2977/">CVE-2023-2977 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2977">CVE-2023-2977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764866" comment="opensc-0.13.0-3.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152943" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210628" ref_url="https://bugzilla.suse.com/1210628" source="BUGZILLA"/>
		<reference ref_id="1210631" ref_url="https://bugzilla.suse.com/1210631" source="BUGZILLA"/>
		<reference ref_id="1210632" ref_url="https://bugzilla.suse.com/1210632" source="BUGZILLA"/>
		<reference ref_id="1210634" ref_url="https://bugzilla.suse.com/1210634" source="BUGZILLA"/>
		<reference ref_id="1210635" ref_url="https://bugzilla.suse.com/1210635" source="BUGZILLA"/>
		<reference ref_id="1210636" ref_url="https://bugzilla.suse.com/1210636" source="BUGZILLA"/>
		<reference ref_id="1210637" ref_url="https://bugzilla.suse.com/1210637" source="BUGZILLA"/>
		<reference ref_id="1210711" ref_url="https://bugzilla.suse.com/1210711" source="BUGZILLA"/>
		<reference ref_id="1210826" ref_url="https://bugzilla.suse.com/1210826" source="BUGZILLA"/>
		<reference ref_id="1211615" ref_url="https://bugzilla.suse.com/1211615" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-21930" ref_url="https://www.suse.com/security/cve/CVE-2023-21930/" source="CVE"/>
		<reference ref_id="CVE-2023-21937" ref_url="https://www.suse.com/security/cve/CVE-2023-21937/" source="CVE"/>
		<reference ref_id="CVE-2023-21938" ref_url="https://www.suse.com/security/cve/CVE-2023-21938/" source="CVE"/>
		<reference ref_id="CVE-2023-21939" ref_url="https://www.suse.com/security/cve/CVE-2023-21939/" source="CVE"/>
		<reference ref_id="CVE-2023-21954" ref_url="https://www.suse.com/security/cve/CVE-2023-21954/" source="CVE"/>
		<reference ref_id="CVE-2023-21967" ref_url="https://www.suse.com/security/cve/CVE-2023-21967/" source="CVE"/>
		<reference ref_id="CVE-2023-21968" ref_url="https://www.suse.com/security/cve/CVE-2023-21968/" source="CVE"/>
		<reference ref_id="CVE-2023-2597" ref_url="https://www.suse.com/security/cve/CVE-2023-2597/" source="CVE"/>
		<reference ref_id="CVE-2023-30441" ref_url="https://www.suse.com/security/cve/CVE-2023-30441/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- CVE-2023-21930: Fixed possible compromise from unauthenticated attacker with network access via TLS (bsc#1210628).
- CVE-2023-21937: Fixed vulnerability inside the networking component (bsc#1210631).
- CVE-2023-21938: Fixed vulnerability inside the library component (bsc#1210632).
- CVE-2023-21939: Fixed vulnerability inside the swing component (bsc#1210634).
- CVE-2023-21968: Fixed vulnerability inside the library component (bsc#1210637).
- CVE-2023-2597: Fixed buffer overflow in shared cache implementation (bsc#1211615).
- CVE-2023-21967: Fixed vulnerability inside the JSSE component (bsc#1210636).
- CVE-2023-21954: Fixed vulnerability inside the hotspot component (bsc#1210635).

Additional reference fixed already in 8.0.7.15:

- CVE-2023-30441: Fixed components that could have exposed sensitive information using a combination of flaws and configurations (bsc#1210711).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-09"/>
	<updated date="2023-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210628">SUSE bug 1210628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210631">SUSE bug 1210631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210632">SUSE bug 1210632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210634">SUSE bug 1210634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210635">SUSE bug 1210635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210636">SUSE bug 1210636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210637">SUSE bug 1210637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210711">SUSE bug 1210711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210826">SUSE bug 1210826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211615">SUSE bug 1211615</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-21930/">CVE-2023-21930 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21937/">CVE-2023-21937 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21937">CVE-2023-21937 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21938/">CVE-2023-21938 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21938">CVE-2023-21938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21939/">CVE-2023-21939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21939">CVE-2023-21939 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-21954/">CVE-2023-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21954">CVE-2023-21954 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-21967/">CVE-2023-21967 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21967">CVE-2023-21967 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21968/">CVE-2023-21968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21968">CVE-2023-21968 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2597/">CVE-2023-2597 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2597">CVE-2023-2597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-30441/">CVE-2023-30441 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30441">CVE-2023-30441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764864" comment="java-1_8_0-ibm-1.8.0_sr8.5-30.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764825" comment="java-1_8_0-ibm-alsa-1.8.0_sr8.5-30.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764865" comment="java-1_8_0-ibm-devel-1.8.0_sr8.5-30.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764826" comment="java-1_8_0-ibm-plugin-1.8.0_sr8.5-30.108.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764864" comment="java-1_8_0-ibm-1.8.0_sr8.5-30.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764825" comment="java-1_8_0-ibm-alsa-1.8.0_sr8.5-30.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764865" comment="java-1_8_0-ibm-devel-1.8.0_sr8.5-30.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764826" comment="java-1_8_0-ibm-plugin-1.8.0_sr8.5-30.108.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152944" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1211604" ref_url="https://bugzilla.suse.com/1211604" source="BUGZILLA"/>
		<reference ref_id="1211605" ref_url="https://bugzilla.suse.com/1211605" source="BUGZILLA"/>
		<reference ref_id="1211606" ref_url="https://bugzilla.suse.com/1211606" source="BUGZILLA"/>
		<reference ref_id="1211607" ref_url="https://bugzilla.suse.com/1211607" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-31124" ref_url="https://www.suse.com/security/cve/CVE-2023-31124/" source="CVE"/>
		<reference ref_id="CVE-2023-31130" ref_url="https://www.suse.com/security/cve/CVE-2023-31130/" source="CVE"/>
		<reference ref_id="CVE-2023-31147" ref_url="https://www.suse.com/security/cve/CVE-2023-31147/" source="CVE"/>
		<reference ref_id="CVE-2023-32067" ref_url="https://www.suse.com/security/cve/CVE-2023-32067/" source="CVE"/>
		<description>
This update for libcares2 fixes the following issues:

- CVE-2023-32067: Fixed a denial of service that could be triggered by
  a 0-byte UDP payload (bsc#1211604).
- CVE-2023-31147: Fixed an insufficient randomness in generation of
  DNS query IDs (bsc#1211605).
- CVE-2023-31130: Fixed a buffer underflow when configuring specific
  IPv6 addresses (bsc#1211606).
- CVE-2023-31124: Fixed a build issue when cross-compiling that could
  lead to insufficient randomness (bsc#1211607).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-09"/>
	<updated date="2023-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211604">SUSE bug 1211604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211605">SUSE bug 1211605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211606">SUSE bug 1211606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211607">SUSE bug 1211607</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-31124/">CVE-2023-31124 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31124">CVE-2023-31124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-31130/">CVE-2023-31130 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31130">CVE-2023-31130 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31147/">CVE-2023-31147 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31147">CVE-2023-31147 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32067/">CVE-2023-32067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32067">CVE-2023-32067 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763535" comment="libcares2-1.9.1-9.12.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763535" comment="libcares2-1.9.1-9.12.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152945" version="1" class="patch">
	<metadata>
		<title>Security update for gdb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1068950" ref_url="https://bugzilla.suse.com/1068950" source="BUGZILLA"/>
		<reference ref_id="1081527" ref_url="https://bugzilla.suse.com/1081527" source="BUGZILLA"/>
		<reference ref_id="1192285" ref_url="https://bugzilla.suse.com/1192285" source="BUGZILLA"/>
		<reference ref_id="1207712" ref_url="https://bugzilla.suse.com/1207712" source="BUGZILLA"/>
		<reference ref_id="1210081" ref_url="https://bugzilla.suse.com/1210081" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16829" ref_url="https://www.suse.com/security/cve/CVE-2017-16829/" source="CVE"/>
		<reference ref_id="CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208/" source="CVE"/>
		<description>
This update for gdb fixes the following issues:

gdb was updated to 12.1. (jsc#SLE-21561)

* DBX mode is deprecated, and will be removed in GDB 13.

* GDB 12 is the last release of GDB that will support building against
  Python 2.  From GDB 13, it will only be possible to build GDB itself
  with Python 3 support.

* Improved C++ template support:

  GDB now treats functions/types involving C++ templates like it does function
  overloads.  Users may omit parameter lists to set breakpoints on families of
  template functions, including types/functions composed of multiple template types:
    (gdb) break template_func(template_1, int)
  The above will set breakpoints at every function `template_func' where
  the first function parameter is any template type named `template_1' and
  the second function parameter is `int'.
  TAB completion also gains similar improvements.

* New commands:

  - maint set backtrace-on-fatal-signal on|off
  - maint show backtrace-on-fatal-signal

  This setting is 'on' by default.  When 'on' GDB will print a limited
  backtrace to stderr in the situation where GDB terminates with a
  fatal signal.  This only supported on some platforms where the
  backtrace and backtrace_symbols_fd functions are available.

  - set source open on|off
  - show source open

  This setting, which is on by default, controls whether GDB will try
  to open source code files.  Switching this off will stop GDB trying
  to open and read source code files, which can be useful if the files
  are located over a slow network connection.

  - set varsize-limit
  - show varsize-limit

  These are now deprecated aliases for 'set max-value-size' and
  'show max-value-size'.

  - task apply [all | TASK-IDS...] [FLAG]... COMMAND

  Like 'thread apply', but applies COMMAND to Ada tasks.

  - watch [...] task ID

  Watchpoints can now be restricted to a specific Ada task.

  - maint set internal-error backtrace on|off
  - maint show internal-error backtrace
  - maint set internal-warning backtrace on|off
  - maint show internal-warning backtrace

  GDB can now print a backtrace of itself when it encounters either an
  internal-error, or an internal-warning.  This is on by default for
  internal-error and off by default for internal-warning.

  - set logging on|off

  Deprecated and replaced by 'set logging enabled on|off'.

  - set logging enabled on|off
  - show logging enabled

  These commands set or show whether logging is enabled or disabled.

  - exit

  You can now exit GDB by using the new command 'exit', in addition to
  the existing 'quit' command.

  - set debug threads on|off
  - show debug threads

  Print additional debug messages about thread creation and deletion.

  - set debug linux-nat on|off
  - show debug linux-nat

  These new commands replaced the old 'set debug lin-lwp' and 'show
  debug lin-lwp' respectively.  Turning this setting on prints debug
  messages relating to GDB's handling of native Linux inferiors.

  - maint flush source-cache

  Flush the contents of the source code cache.

  - maint set gnu-source-highlight enabled on|off
  - maint show gnu-source-highlight enabled

  Whether GDB should use the GNU Source Highlight library for adding
  styling to source code.  When off, the library will not be used, even
  when available.  When GNU Source Highlight isn't used, or can't add
  styling to a particular source file, then the Python Pygments
  library will be used instead.

  - set suppress-cli-notifications (on|off)
  - show suppress-cli-notifications

  This controls whether printing the notifications is suppressed for CLI.
  CLI notifications occur when you change the selected context
  (i.e., the current inferior, thread and/or the frame), or when
  the program being debugged stops (e.g., because of hitting a
  breakpoint, completing source-stepping, an interrupt, etc.).

  - set style disassembler enabled on|off
  - show style disassembler enabled

  If GDB is compiled with Python support, and the Python Pygments
  package is available, then, when this setting is on, disassembler
  output will have styling applied.

  - set ada source-charset
  - show ada source-charset

  Set the character set encoding that is assumed for Ada symbols.  Valid
  values for this follow the values that can be passed to the GNAT
  compiler via the '-gnati' option.  The default is ISO-8859-1.

* Changed commands:

  - print

  Printing of floating-point values with base-modifying formats like
  /x has been changed to display the underlying bytes of the value in
  the desired base.  This was GDB's documented behavior, but was never
  implemented correctly.

  - maint packet

  This command can now print a reply, if the reply includes
  non-printable characters.  Any non-printable characters are printed
  as escaped hex, e.g. \x?? where '??' is replaces with the value of
  the non-printable character.

  - clone-inferior
  The clone-inferior command now ensures that the TTY, CMD and ARGS
  settings are copied from the original inferior to the new one.
  All modifications to the environment variables done using the 'set
  environment' or 'unset environment' commands are also copied to the new
  inferior.

  - set debug lin-lwp on|off
  - show debug lin-lwp

  These commands have been removed from GDB.  The new command 'set
  debug linux-nat' and 'show debug linux-nat' should be used
  instead.

  - info win

  This command now includes information about the width of the tui
  windows in its output.

* GDB's Ada parser now supports an extension for specifying the exact
  byte contents of a floating-point literal.  This can be useful for
  setting floating-point registers to a precise value without loss of
  precision.  The syntax is an extension of the based literal syntax.
  Use, e.g., '16lf#0123abcd#' -- the number of 'l's controls the width
  of the floating-point type, and the 'f' is the marker for floating
  point.

* MI changes:

 ** The '-add-inferior' with no option flags now inherits the
    connection of the current inferior, this restores the behaviour of
    GDB as it was prior to GDB 10.

 ** The '-add-inferior' command now accepts a '--no-connection'
    option, which causes the new inferior to start without a
    connection.

* Python API:

  ** New function gdb.add_history(), which takes a gdb.Value object
     and adds the value it represents to GDB's history list.  An
     integer, the index of the new item in the history list, is
     returned.

  ** New function gdb.history_count(), which returns the number of
     values in GDB's value history.

  ** New gdb.events.gdb_exiting event.  This event is called with a
     gdb.GdbExitingEvent object which has the read-only attribute
     'exit_code', which contains the value of the GDB exit code.  This
     event is triggered once GDB decides it is going to exit, but
     before GDB starts to clean up its internal state.

  ** New function gdb.architecture_names(), which returns a list
     containing all of the possible Architecture.name() values.  Each
     entry is a string.

  ** New function gdb.Architecture.integer_type(), which returns an
     integer type given a size and a signed-ness.

  ** New gdb.TargetConnection object type that represents a connection
     (as displayed by the 'info connections' command).  A sub-class,
     gdb.RemoteTargetConnection, is used to represent 'remote' and
     'extended-remote' connections.

  ** The gdb.Inferior type now has a 'connection' property which is an
     instance of gdb.TargetConnection, the connection used by this
     inferior.  This can be None if the inferior has no connection.

  ** New 'gdb.events.connection_removed' event registry, which emits a
     'gdb.ConnectionEvent' when a connection is removed from GDB.
     This event has a 'connection' property, a gdb.TargetConnection
     object for the connection being removed.

  ** New gdb.connections() function that returns a list of all
     currently active connections.

  ** New gdb.RemoteTargetConnection.send_packet(PACKET) method.  This
     is equivalent to the existing 'maint packet' CLI command; it
     allows a user specified packet to be sent to the remote target.

  ** New function gdb.host_charset(), returns a string, which is the
     name of the current host charset.

  ** New gdb.set_parameter(NAME, VALUE).  This sets the gdb parameter
     NAME to VALUE.

  ** New gdb.with_parameter(NAME, VALUE).  This returns a context
     manager that temporarily sets the gdb parameter NAME to VALUE,
     then resets it when the context is exited.

  ** The gdb.Value.format_string method now takes a 'styling'
     argument, which is a boolean.  When true, the returned string can
     include escape sequences to apply styling.  The styling will only
     be present if styling is otherwise turned on in GDB (see 'help
     set styling').  When false, which is the default if the argument
     is not given, then no styling is applied to the returned string.

  ** New read-only attribute gdb.InferiorThread.details, which is
     either a string, containing additional, target specific thread
     state information, or None, if there is no such additional
     information.

  ** New read-only attribute gdb.Type.is_scalar, which is True for
     scalar types, and False for all other types.

  ** New read-only attribute gdb.Type.is_signed.  This attribute
     should only be read when Type.is_scalar is True, and will be True
     for signed types, and False for all other types.  Attempting to
     read this attribute for non-scalar types will raise a ValueError.

  ** It is now possible to add GDB/MI commands implemented in Python.

- Update libipt to v2.0.5.

- CVE-2018-7208: Fixed improper bounds check in coffgen.c:coff_pointerize_aux() that allowed for denial of service when parsing a crafted COFF file (bsc#1081527).
- CVE-2017-16829: Fixed possible remote denial of service via the _bfd_elf_parse_gnu_properties() function in elf-properties.c (bsc#1068950).

Bug fixes:

- Fixed license (bsc#1210081).
- Advertises RHEL version support status (bsc#1207712).
- Fixed crashes while debugging a clang-cpp app (bsc#1192285).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-12"/>
	<updated date="2023-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068950">SUSE bug 1068950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081527">SUSE bug 1081527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192285">SUSE bug 1192285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207712">SUSE bug 1207712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210081">SUSE bug 1210081</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16829/">CVE-2017-16829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16829">CVE-2017-16829 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7208">CVE-2018-7208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764877" comment="gdb-12.1-2.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152946" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1212102" ref_url="https://bugzilla.suse.com/1212102" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3138" ref_url="https://www.suse.com/security/cve/CVE-2023-3138/" source="CVE"/>
		<description>
This update for libX11 fixes the following issues:

- CVE-2023-3138: Fixed buffer overflows in InitExt.c (bsc#1212102).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-19"/>
	<updated date="2023-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212102">SUSE bug 1212102</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3138/">CVE-2023-3138 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3138">CVE-2023-3138 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009768066" comment="libX11-6-1.6.2-12.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768063" comment="libX11-6-32bit-1.6.2-12.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767924" comment="libX11-data-1.6.2-12.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768067" comment="libX11-xcb1-1.6.2-12.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768065" comment="libX11-xcb1-32bit-1.6.2-12.30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009768066" comment="libX11-6-1.6.2-12.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768063" comment="libX11-6-32bit-1.6.2-12.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767924" comment="libX11-data-1.6.2-12.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768067" comment="libX11-xcb1-1.6.2-12.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768065" comment="libX11-xcb1-32bit-1.6.2-12.30.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152947" version="1" class="patch">
	<metadata>
		<title>Security update for python36-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1211674" ref_url="https://bugzilla.suse.com/1211674" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32681" ref_url="https://www.suse.com/security/cve/CVE-2023-32681/" source="CVE"/>
		<description>
This update for python36-requests fixes the following issues:

- CVE-2023-32681: Fixed unintended leak of Proxy-Authorization header (bsc#1211674).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-19"/>
	<updated date="2023-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211674">SUSE bug 1211674</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32681/">CVE-2023-32681 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32681">CVE-2023-32681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767039" comment="python36-requests-2.24.0-6.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152948" version="1" class="patch">
	<metadata>
		<title>Security update for libwebp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210212" ref_url="https://bugzilla.suse.com/1210212" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1999" ref_url="https://www.suse.com/security/cve/CVE-2023-1999/" source="CVE"/>
		<description>
This update for libwebp fixes the following issues:

- CVE-2023-1999: Fixed double free (bsc#1210212).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-20"/>
	<updated date="2023-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1999/">CVE-2023-1999 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1999">CVE-2023-1999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764527" comment="libwebp5-0.4.3-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764528" comment="libwebp5-32bit-0.4.3-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764529" comment="libwebpdemux1-0.4.3-4.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764527" comment="libwebp5-0.4.3-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764528" comment="libwebp5-32bit-0.4.3-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764529" comment="libwebpdemux1-0.4.3-4.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152949" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210398" ref_url="https://bugzilla.suse.com/1210398" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-27349" ref_url="https://www.suse.com/security/cve/CVE-2023-27349/" source="CVE"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2023-27349: Fixed crash while handling unsupported events (bsc#1210398).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-21"/>
	<updated date="2023-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210398">SUSE bug 1210398</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-27349/">CVE-2023-27349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-27349">CVE-2023-27349 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009767473" comment="bluez-5.13-5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767474" comment="libbluetooth3-5.13-5.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009767473" comment="bluez-5.13-5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767474" comment="libbluetooth3-5.13-5.39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152950" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1212126" ref_url="https://bugzilla.suse.com/1212126" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34969" ref_url="https://www.suse.com/security/cve/CVE-2023-34969/" source="CVE"/>
		<description>
This update for dbus-1 fixes the following issues:

- CVE-2023-34969: Fixed a possible dbus-daemon crash by an unprivileged users (bsc#1212126).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-21"/>
	<updated date="2023-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212126">SUSE bug 1212126</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34969/">CVE-2023-34969 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34969">CVE-2023-34969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009768853" comment="dbus-1-1.8.22-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768854" comment="dbus-1-x11-1.8.22-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768855" comment="libdbus-1-3-1.8.22-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768856" comment="libdbus-1-3-32bit-1.8.22-29.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152951" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1211658" ref_url="https://bugzilla.suse.com/1211658" source="BUGZILLA"/>
		<reference ref_id="1211659" ref_url="https://bugzilla.suse.com/1211659" source="BUGZILLA"/>
		<reference ref_id="1211846" ref_url="https://bugzilla.suse.com/1211846" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28204" ref_url="https://www.suse.com/security/cve/CVE-2023-28204/" source="CVE"/>
		<reference ref_id="CVE-2023-32373" ref_url="https://www.suse.com/security/cve/CVE-2023-32373/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Add security patches (bsc#1211846):                                                            
                                                                                               
- CVE-2023-28204: Fixed processing of web content that may disclose sensitive information (bsc#1211659).
- CVE-2023-32373: Fixed processing of maliciously crafted web content that may lead to arbitrary code execution (bsc#1211658).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-22"/>
	<updated date="2023-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211658">SUSE bug 1211658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211659">SUSE bug 1211659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211846">SUSE bug 1211846</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28204/">CVE-2023-28204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28204">CVE-2023-28204 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32373/">CVE-2023-32373 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32373">CVE-2023-32373 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009766869" comment="libjavascriptcoregtk-4_0-18-2.38.6-2.139.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766870" comment="libwebkit2gtk-4_0-37-2.38.6-2.139.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766820" comment="libwebkit2gtk3-lang-2.38.6-2.139.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766871" comment="typelib-1_0-JavaScriptCore-4_0-2.38.6-2.139.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766872" comment="typelib-1_0-WebKit2-4_0-2.38.6-2.139.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766873" comment="typelib-1_0-WebKit2WebExtension-4_0-2.38.6-2.139.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766874" comment="webkit2gtk-4_0-injected-bundles-2.38.6-2.139.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009766869" comment="libjavascriptcoregtk-4_0-18-2.38.6-2.139.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766870" comment="libwebkit2gtk-4_0-37-2.38.6-2.139.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766820" comment="libwebkit2gtk3-lang-2.38.6-2.139.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766871" comment="typelib-1_0-JavaScriptCore-4_0-2.38.6-2.139.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766872" comment="typelib-1_0-WebKit2-4_0-2.38.6-2.139.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766873" comment="typelib-1_0-WebKit2WebExtension-4_0-2.38.6-2.139.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766874" comment="webkit2gtk-4_0-injected-bundles-2.38.6-2.139.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152952" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210390" ref_url="https://bugzilla.suse.com/1210390" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-26555" ref_url="https://www.suse.com/security/cve/CVE-2023-26555/" source="CVE"/>
		<description>
This update for ntp fixes the following issues:

ntp was updated to 4.2.8p17:

* Fix some regressions of 4.2.8p16

Update to 4.2.8p16:

* [Sec 3808] Assertion failure in ntpq on malformed RT-11 date
* [Sec 3807], bsc#1210390, CVE-2023-26555:
  praecis_parse() in the Palisade refclock driver has a
  hypothetical input buffer overflow.
* [Sec 3767] An OOB KoD RATE value triggers an assertion when
  debug is enabled.
* Multiple bug fixes and improvements. For details, see /usr/share/doc/packages/ntp/ChangeLog

   http://www.ntp.org/support/securitynotice/4_2_8-series-changelog/

- CVE-2023-26555: Fixed assertion failure on malformed RT-11 dates (bsc#1210390).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-22"/>
	<updated date="2023-06-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210390">SUSE bug 1210390</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26555/">CVE-2023-26555 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26555">CVE-2023-26555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009767475" comment="ntp-4.2.8p17-103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767476" comment="ntp-doc-4.2.8p17-103.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152953" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207534" ref_url="https://bugzilla.suse.com/1207534" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-4304: Reworked the fix for the Timing-Oracle in RSA decryption.
  The previous fix for this timing side channel turned out to cause a
  severe 2-3x performance regression in the typical use case (bsc#1207534).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-26"/>
	<updated date="2023-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1207534">SUSE bug 1207534</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009768377" comment="libopenssl-devel-1.0.2j-60.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768378" comment="libopenssl1_0_0-1.0.2j-60.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768379" comment="libopenssl1_0_0-32bit-1.0.2j-60.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768380" comment="libopenssl1_0_0-hmac-1.0.2j-60.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768381" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768382" comment="openssl-1.0.2j-60.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768383" comment="openssl-doc-1.0.2j-60.98.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009768377" comment="libopenssl-devel-1.0.2j-60.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768378" comment="libopenssl1_0_0-1.0.2j-60.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768379" comment="libopenssl1_0_0-32bit-1.0.2j-60.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768380" comment="libopenssl1_0_0-hmac-1.0.2j-60.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768381" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768382" comment="openssl-1.0.2j-60.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768383" comment="openssl-doc-1.0.2j-60.98.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152954" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
		</affected>
		<reference ref_id="1206337" ref_url="https://bugzilla.suse.com/1206337" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-46908" ref_url="https://www.suse.com/security/cve/CVE-2022-46908/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2022-46908: Properly implement the azProhibitedFunctions protection mechanism,
  when relying on --safe for execution of an untrusted CLI script (bsc#1206337).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-28"/>
	<updated date="2023-06-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206337">SUSE bug 1206337</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-46908/">CVE-2022-46908 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46908">CVE-2022-46908 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009729728" comment="libsqlite3-0-3.39.3-9.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729729" comment="libsqlite3-0-32bit-3.39.3-9.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729730" comment="sqlite3-3.39.3-9.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729731" comment="sqlite3-devel-3.39.3-9.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729732" comment="sqlite3-tcl-3.39.3-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152955" version="1" class="patch">
	<metadata>
		<title>Security update for iniparser (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1211889" ref_url="https://bugzilla.suse.com/1211889" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-33461" ref_url="https://www.suse.com/security/cve/CVE-2023-33461/" source="CVE"/>
		<description>
This update for iniparser fixes the following issues:

- CVE-2023-33461: Fixed NULL pointer dereference in iniparser_getboolean() (bsc#1211889).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-28"/>
	<updated date="2023-06-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211889">SUSE bug 1211889</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-33461/">CVE-2023-33461 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33461">CVE-2023-33461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009767481" comment="libiniparser0-3.1.0.git20140619_c5beb80a-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767482" comment="libiniparser0-32bit-3.1.0.git20140619_c5beb80a-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152956" version="1" class="patch">
	<metadata>
		<title>Security update for libcap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1211419" ref_url="https://bugzilla.suse.com/1211419" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2603" ref_url="https://www.suse.com/security/cve/CVE-2023-2603/" source="CVE"/>
		<description>
This update for libcap fixes the following issues:

- CVE-2023-2603: Fixed an integer overflow or wraparound in libcap/cap_alloc.c:_libcap_strdup() (bsc#1211419).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-03"/>
	<updated date="2023-07-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211419">SUSE bug 1211419</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-2603/">CVE-2023-2603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2603">CVE-2023-2603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009769889" comment="libcap-progs-2.26-14.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769890" comment="libcap2-2.26-14.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769891" comment="libcap2-32bit-2.26-14.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152957" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1212544" ref_url="https://bugzilla.suse.com/1212544" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2828" ref_url="https://www.suse.com/security/cve/CVE-2023-2828/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

  - CVE-2023-2828: Fixed DOS against recursive resolvers related to cache-cleaning algorithm (bsc#1212544).

		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-06"/>
	<updated date="2023-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212544">SUSE bug 1212544</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2828/">CVE-2023-2828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2828">CVE-2023-2828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009770650" comment="bind-9.9.9P1-63.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770651" comment="bind-chrootenv-9.9.9P1-63.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770652" comment="bind-doc-9.9.9P1-63.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770653" comment="bind-libs-9.9.9P1-63.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770654" comment="bind-libs-32bit-9.9.9P1-63.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770655" comment="bind-utils-9.9.9P1-63.40.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009770650" comment="bind-9.9.9P1-63.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770651" comment="bind-chrootenv-9.9.9P1-63.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770652" comment="bind-doc-9.9.9P1-63.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770653" comment="bind-libs-9.9.9P1-63.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770654" comment="bind-libs-32bit-9.9.9P1-63.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770655" comment="bind-utils-9.9.9P1-63.40.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152958" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189408" ref_url="https://bugzilla.suse.com/1189408" source="BUGZILLA"/>
		<reference ref_id="1211798" ref_url="https://bugzilla.suse.com/1211798" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24741" ref_url="https://www.suse.com/security/cve/CVE-2020-24741/" source="CVE"/>
		<reference ref_id="CVE-2023-32763" ref_url="https://www.suse.com/security/cve/CVE-2023-32763/" source="CVE"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

  - CVE-2020-24741: Fixed a bug that allow QLibrary to load libraries relative to CWD which could result in arbitrary code execution (bsc#1189408).
  - CVE-2023-32763: Fixed buffer overflow in QTextLayout (bsc#1211798).

		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-13"/>
	<updated date="2023-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189408">SUSE bug 1189408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211798">SUSE bug 1211798</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24741/">CVE-2020-24741 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24741">CVE-2020-24741 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32763/">CVE-2023-32763 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32763">CVE-2023-32763 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009770779" comment="libQt5Concurrent5-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770780" comment="libQt5Core5-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770781" comment="libQt5DBus5-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770782" comment="libQt5Gui5-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770783" comment="libQt5Network5-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770784" comment="libQt5OpenGL5-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770785" comment="libQt5PrintSupport5-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770786" comment="libQt5Sql5-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770787" comment="libQt5Sql5-mysql-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770788" comment="libQt5Sql5-postgresql-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770789" comment="libQt5Sql5-sqlite-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770790" comment="libQt5Sql5-unixODBC-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770791" comment="libQt5Test5-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770792" comment="libQt5Widgets5-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770793" comment="libQt5Xml5-5.6.2-6.33.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009770779" comment="libQt5Concurrent5-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770780" comment="libQt5Core5-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770781" comment="libQt5DBus5-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770782" comment="libQt5Gui5-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770783" comment="libQt5Network5-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770784" comment="libQt5OpenGL5-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770785" comment="libQt5PrintSupport5-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770786" comment="libQt5Sql5-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770787" comment="libQt5Sql5-mysql-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770788" comment="libQt5Sql5-postgresql-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770789" comment="libQt5Sql5-sqlite-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770790" comment="libQt5Sql5-unixODBC-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770791" comment="libQt5Test5-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770792" comment="libQt5Widgets5-5.6.2-6.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770793" comment="libQt5Xml5-5.6.2-6.33.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152959" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207783" ref_url="https://bugzilla.suse.com/1207783" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0494" ref_url="https://www.suse.com/security/cve/CVE-2023-0494/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2023-0494: Fixed a use-after-free in DeepCopyPointerClasses (bsc#1207783).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-07"/>
	<updated date="2023-02-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207783">SUSE bug 1207783</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0494/">CVE-2023-0494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0494">CVE-2023-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009738052" comment="xorg-x11-server-7.6_1.18.3-76.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738053" comment="xorg-x11-server-extra-7.6_1.18.3-76.60.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009738052" comment="xorg-x11-server-7.6_1.18.3-76.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738053" comment="xorg-x11-server-extra-7.6_1.18.3-76.60.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152960" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1212711" ref_url="https://bugzilla.suse.com/1212711" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-36664" ref_url="https://www.suse.com/security/cve/CVE-2023-36664/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issues:

  - CVE-2023-36664: Fixed permission validation mishandling for pipe devices with the %pipe% prefix or the | pipe character prefix (bsc#1212711).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-17"/>
	<updated date="2023-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212711">SUSE bug 1212711</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-36664/">CVE-2023-36664 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36664">CVE-2023-36664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009770776" comment="ghostscript-9.52-23.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770777" comment="ghostscript-devel-9.52-23.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770778" comment="ghostscript-x11-9.52-23.54.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009770776" comment="ghostscript-9.52-23.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770777" comment="ghostscript-devel-9.52-23.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770778" comment="ghostscript-x11-9.52-23.54.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152961" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLE (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1212101" ref_url="https://bugzilla.suse.com/1212101" source="BUGZILLA"/>
		<reference ref_id="1212438" ref_url="https://bugzilla.suse.com/1212438" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3482" ref_url="https://www.suse.com/security/cve/CVE-2023-3482/" source="CVE"/>
		<reference ref_id="CVE-2023-37201" ref_url="https://www.suse.com/security/cve/CVE-2023-37201/" source="CVE"/>
		<reference ref_id="CVE-2023-37202" ref_url="https://www.suse.com/security/cve/CVE-2023-37202/" source="CVE"/>
		<reference ref_id="CVE-2023-37203" ref_url="https://www.suse.com/security/cve/CVE-2023-37203/" source="CVE"/>
		<reference ref_id="CVE-2023-37204" ref_url="https://www.suse.com/security/cve/CVE-2023-37204/" source="CVE"/>
		<reference ref_id="CVE-2023-37205" ref_url="https://www.suse.com/security/cve/CVE-2023-37205/" source="CVE"/>
		<reference ref_id="CVE-2023-37206" ref_url="https://www.suse.com/security/cve/CVE-2023-37206/" source="CVE"/>
		<reference ref_id="CVE-2023-37207" ref_url="https://www.suse.com/security/cve/CVE-2023-37207/" source="CVE"/>
		<reference ref_id="CVE-2023-37208" ref_url="https://www.suse.com/security/cve/CVE-2023-37208/" source="CVE"/>
		<reference ref_id="CVE-2023-37209" ref_url="https://www.suse.com/security/cve/CVE-2023-37209/" source="CVE"/>
		<reference ref_id="CVE-2023-37210" ref_url="https://www.suse.com/security/cve/CVE-2023-37210/" source="CVE"/>
		<reference ref_id="CVE-2023-37211" ref_url="https://www.suse.com/security/cve/CVE-2023-37211/" source="CVE"/>
		<reference ref_id="CVE-2023-37212" ref_url="https://www.suse.com/security/cve/CVE-2023-37212/" source="CVE"/>
		<description>
This update for MozillaFirefox, MozillaFirefox-branding-SLE fixes the following issues:

Changes in MozillaFirefox and MozillaFirefox-branding-SLE:

This update provides Firefox Extended Support Release 115.0 ESR

* New: 

  - Required fields are now highlighted in PDF forms.
  - Improved performance on high-refresh rate monitors (120Hz+).
  - Buttons in the Tabs toolbar can now be reached with Tab,
    Shift+Tab, and Arrow keys. View this article for additional
    details.
  - Windows' 'Make text bigger' accessibility setting now
    affects all the UI and content pages, rather than only
    applying to system font sizes.
  - Non-breaking spaces are now preserved—preventing automatic
    line breaks—when copying text from a form control.
  - Fixed WebGL performance issues on NVIDIA binary drivers via
    DMA-Buf on Linux.
  - Fixed an issue in which Firefox startup could be
    significantly slowed down by the processing of Web content
    local storage. This had the greatest impact on users with
    platter hard drives and significant local storage.
  - Removed a configuration option to allow SHA-1 signatures in
    certificates: SHA-1 signatures in certificates—long since
    determined to no longer be secure enough—are now not
    supported.
  - Highlight color is preserved correctly after typing `Enter`
    in the mail composer of Yahoo Mail and Outlook.
    After bypassing the https only error page navigating back
    would take you to the error page that was previously
    dismissed. Back now takes you to the previous site that was
    visited.
  - Paste unformatted shortcut (shift+ctrl/cmd+v) now works in
    plain text contexts, such as input and text area.
  - Added an option to print only the current page from the
    print preview dialog.
  - Swipe to navigate (two fingers on a touchpad swiped left or
    right to perform history back or forward) on Windows is now
    enabled.
  - Stability on Windows is significantly improved as Firefox
    handles low-memory situations much better.
  - Touchpad scrolling on macOS was made more accessible by
    reducing unintended diagonal scrolling opposite of the
    intended scroll axis.
  - Firefox is less likely to run out of memory on Linux and
    performs more efficiently for the rest of the system when
    memory runs low.
  - It is now possible to edit PDFs: including writing text,
    drawing, and adding signatures.
  - Setting Firefox as your default browser now also makes it
    the default PDF application on Windows systems.
  - Swipe-to-navigate (two fingers on a touchpad swiped left or
    right to perform history back or forward) now works for Linux
    users on Wayland.
  - Text Recognition in images allows users on macOS 10.15 and
    higher to extract text from the selected image (such as a
    meme or screenshot).
  - Firefox View helps you get back to content you previously
    discovered. A pinned tab allows you to find and open recently
    closed tabs on your current device and access tabs from other
    devices (via our “Tab Pickup” feature).
  - Import maps, which allow web pages to control the behavior
    of JavaScript imports, are now enabled by default.
  - Processes used for background tabs now use efficiency mode
    on Windows 11 to limit resource use.
  - The shift+esc keyboard shortcut now opens the Process
    Manager, offering a way to quickly identify processes that
    are using too many resources.
  - Firefox now supports properly color correcting images
    tagged with ICCv4 profiles.
  - Support for non-English characters when saving and printing
    PDF forms.
  - The bookmarks toolbar's default 'Only show on New Tab'
    state works correctly for blank new tabs. As before, you can
    change the bookmark toolbar's behavior using the toolbar
    context menu.
  - Manifest Version 3 (MV3) extension support is now enabled
    by default (MV2 remains enabled/supported). This major update
    also ushers an exciting user interface change in the form of
    the new extensions button.
  - The Arbitrary Code Guard exploit protection has been
    enabled in the media playback utility processes, improving
    security for Windows users.
  - The native HTML date picker for date and datetime inputs
    can now be used with a keyboard alone, improving its
    accessibility for screen reader users. Users with limited
    mobility can also now use common keyboard shortcuts to
    navigate the calendar grid and month selection spinners.
  - Firefox builds in the Spanish from Spain (es-ES) and
    Spanish from Argentina (es-AR) locales now come with a built-
    in dictionary for the Firefox spellchecker.
  - On macOS, Ctrl or Cmd + trackpad or mouse wheel now scrolls
    the page instead of zooming. This avoids accidental zooming
    and matches the behavior of other web browsers on macOS.
  - It's now possible to import bookmarks, history and
    passwords not only from Edge, Chrome or Safari but also from
    Opera, Opera GX, and Vivaldi.
  - GPU sandboxing has been enabled on Windows.
  - On Windows, third-party modules can now be blocked from
    injecting themselves into Firefox, which can be helpful if
    they are causing crashes or other undesirable behavior.
  - Date, time, and datetime-local input fields can now be
    cleared with `Cmd+Backspace` and `Cmd+Delete` shortcut on
    macOS and `Ctrl+Backspace` and `Ctrl+Delete` on Windows and
    Linux.
  - GPU-accelerated Canvas2D is enabled by default on macOS and
    Linux.
  - WebGL performance improvement on Windows, MacOS and Linux.
  - Enables overlay of hardware-decoded video with non-Intel
    GPUs on Windows 10/11, improving video playback performance
    and video scaling quality.
  - Windows native notifications are now enabled.
  - Firefox Relay users can now opt-in to create Relay email
    masks directly from the Firefox credential manager. You must
    be signed in with your Firefox Account.
  - We’ve added two new locales: Silhe Friulian (fur) and
    Sardinian (sc).
  - Right-clicking on password fields now shows an option to
    reveal the password.
  - Private windows and ETP set to strict will now include
    email tracking protection. This will make it harder for email
    trackers to learn the browsing habits of Firefox users. You
    can check the Tracking Content in the sub-panel on the shield
    icon panel.
  - The deprecated U2F Javascript API is now disabled by
    default. The U2F protocol remains usable through the WebAuthn
    API. The U2F API can be re-enabled using the
    `security.webauth.u2f` preference.
  - Say hello to enhanced Picture-in-Picture! Rewind, check
    video duration, and effortlessly switch to full-screen mode
    on the web's most popular video websites.
  - Firefox's address bar is already a great place to search
    for what you're looking for. Now you'll always be able to see
    your web search terms and refine them while viewing your
    search's results - no additional scrolling needed! Also, a
    new result menu has been added making it easier to remove
    history results and dismiss sponsored Firefox Suggest
    entries.
  - Private windows now protect users even better by blocking
    third-party cookies and storage of content trackers.
  - Passwords automatically generated by Firefox now include
    special characters, giving users more secure passwords by
    default.
  - Firefox 115 introduces a redesigned accessibility engine
    which significantly improves the speed, responsiveness, and
    stability of Firefox when used with:

    - Screen readers, as well as certain other accessibility
      software;
    - East Asian input methods;
    - Enterprise single sign-on software; and
    - Other applications which use accessibility frameworks to
      access information.

  - Firefox 115 now supports AV1 Image Format files containing
    animations (AVIS), improving support for AVIF images across
    the web.
  - The Windows GPU sandbox first shipped in the Firefox 110
    release has been tightened to enhance the security benefits
    it provides.
  - A 13-year-old feature request was fulfilled and Firefox now
    supports files being drag-and-dropped directly from Microsoft
    Outlook. A special thanks to volunteer contributor Marco
    Spiess for helping to get this across the finish line!
  - Users on macOS can now access the Services sub-menu
    directly from Firefox context menus.
  - On Windows, the elastic overscroll effect has been enabled
    by default. When two-finger scrolling on the touchpad or
    scrolling on the touchscreen, you will now see a bouncing
    animation when scrolling past the edge of a scroll container.
  - Firefox is now available in the Tajik (tg) language.
  - Added UI to manage the DNS over HTTPS exception list.
  - Bookmarks can now be searched from the Bookmarks menu. The
    Bookmarks menu is accessible by adding the Bookmarks menu
    button to the toolbar.
  - Restrict searches to your local browsing history by
    selecting Search history from the History, Library or
    Application menu buttons.
  - Mac users can now capture video from their cameras in all
    supported native resolutions. This enables resolutions higher
    than 1280x720.
  - It is now possible to reorder the extensions listed in the
    extensions panel.
  - Users on macOS, Linux, and Windows 7 can now use FIDO2 /
    WebAuthn authenticators over USB. Some advanced features,
    such as fully passwordless logins, require a PIN to be set on
    the authenticator.
  - Pocket Recommended content can now be seen in France,
    Italy, and Spain.
  - DNS over HTTPS settings are now part of the Privacy &amp;
    Security section of the Settings page and allow the user to
    choose from all the supported modes.
  - Migrating from another browser? Now you can bring over
    payment methods you've saved in Chrome-based browsers to
    Firefox.
  - Hardware video decoding enabled for Intel GPUs on Linux.
  - The Tab Manager dropdown now features close buttons, so you
    can close tabs more quickly.
  - Windows Magnifier now follows the text cursor correctly
    when the Firefox title bar is visible.
  - Undo and redo are now available in Password fields.
    [1]:https://support.mozilla.org/kb/access-toolbar-functions-
    using-keyboard?_gl=1*16it7nj*_ga*MTEzNjg4MjY5NC4xNjQ1MjAxMDU3
    *_ga_MQ7767QQQW*MTY1Njk2MzExMS43LjEuMTY1Njk2MzIzMy4w
    [2]:https://support.mozilla.org/kb/how-set-tab-pickup-firefox-view
    [3]:https://support.mozilla.org/kb/task-manager-tabs-or-extensions-are-slowing-firefox
    [4]:https://blog.mozilla.org/addons/2022/11/17/manifest-v3-signing-available-november-21-on-firefox-nightly/
    [5]:https://blog.mozilla.org/addons/2022/05/18/manifest-v3-in-firefox-recap-next-steps/
    [6]:https://support.mozilla.org/kb/unified-extensions
    [7]:https://support.mozilla.org/kb/import-data-another-browser
    [8]:https://support.mozilla.org/kb/identify-problems-third-party-modules-firefox-windows
    [9]:https://support.mozilla.org/kb/how-generate-secure-password-firefox
    [10]:https://blog.mozilla.org/accessibility/firefox-113-accessibility-performance/

* Fixed: Various security fixes. MFSA 2023-22 (bsc#1212438)

  * CVE-2023-3482 (bmo#1839464)
    Block all cookies bypass for localstorage
  * CVE-2023-37201 (bmo#1826002)
    Use-after-free in WebRTC certificate generation
  * CVE-2023-37202 (bmo#1834711)
    Potential use-after-free from compartment mismatch in
    SpiderMonkey
  * CVE-2023-37203 (bmo#291640)
    Drag and Drop API may provide access to local system files
  * CVE-2023-37204 (bmo#1832195)
    Fullscreen notification obscured via option element
  * CVE-2023-37205 (bmo#1704420)
    URL spoofing in address bar using RTL characters
  * CVE-2023-37206 (bmo#1813299)
    Insufficient validation of symlinks in the FileSystem API
  * CVE-2023-37207 (bmo#1816287)
    Fullscreen notification obscured
  * CVE-2023-37208 (bmo#1837675)
    Lack of warning when opening Diagcab files
  * CVE-2023-37209 (bmo#1837993)
    Use-after-free in `NotifyOnHistoryReload`
  * CVE-2023-37210 (bmo#1821886)
    Full-screen mode exit prevention
  * CVE-2023-37211 (bmo#1832306, bmo#1834862, bmo#1835886,
    bmo#1836550, bmo#1837450)
    Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13,
    and Thunderbird 102.13
  * CVE-2023-37212 (bmo#1750870, bmo#1825552, bmo#1826206,
    bmo#1827076, bmo#1828690, bmo#1833503, bmo#1835710,
    bmo#1838587)
    Memory safety bugs fixed in Firefox 115
- Fixed potential SIGILL on older CPUs (bsc#1212101)

* Fixed: Various  security  fixes and other quality
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-17"/>
	<updated date="2023-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212101">SUSE bug 1212101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212438">SUSE bug 1212438</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3482/">CVE-2023-3482 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3482">CVE-2023-3482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37201/">CVE-2023-37201 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37201">CVE-2023-37201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37202/">CVE-2023-37202 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37202">CVE-2023-37202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37203/">CVE-2023-37203 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37203">CVE-2023-37203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37204/">CVE-2023-37204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37204">CVE-2023-37204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37205/">CVE-2023-37205 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37205">CVE-2023-37205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37206/">CVE-2023-37206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37206">CVE-2023-37206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37207/">CVE-2023-37207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37207">CVE-2023-37207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37208/">CVE-2023-37208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37208">CVE-2023-37208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37209/">CVE-2023-37209 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37209">CVE-2023-37209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37210/">CVE-2023-37210 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37210">CVE-2023-37210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37211/">CVE-2023-37211 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37211">CVE-2023-37211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37212/">CVE-2023-37212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37212">CVE-2023-37212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771542" comment="MozillaFirefox-115.0-112.165.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771543" comment="MozillaFirefox-branding-SLE-115-35.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771506" comment="MozillaFirefox-devel-115.0-112.165.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771544" comment="MozillaFirefox-translations-common-115.0-112.165.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771542" comment="MozillaFirefox-115.0-112.165.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771543" comment="MozillaFirefox-branding-SLE-115-35.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771506" comment="MozillaFirefox-devel-115.0-112.165.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771544" comment="MozillaFirefox-translations-common-115.0-112.165.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152962" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1213000" ref_url="https://bugzilla.suse.com/1213000" source="BUGZILLA"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

  Updated to Java 8.0 Service Refresh 8 Fix Pack 6 (bsc#1213000):

  - Fixed issue in Java Virtual Machine where outofmemory (OOM) killer terminates the jvm due to failure in control groups detection.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-17"/>
	<updated date="2023-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213000">SUSE bug 1213000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771269" comment="java-1_8_0-ibm-1.8.0_sr8.6-30.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771159" comment="java-1_8_0-ibm-alsa-1.8.0_sr8.6-30.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771270" comment="java-1_8_0-ibm-devel-1.8.0_sr8.6-30.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771160" comment="java-1_8_0-ibm-plugin-1.8.0_sr8.6-30.111.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771269" comment="java-1_8_0-ibm-1.8.0_sr8.6-30.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771159" comment="java-1_8_0-ibm-alsa-1.8.0_sr8.6-30.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771270" comment="java-1_8_0-ibm-devel-1.8.0_sr8.6-30.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771160" comment="java-1_8_0-ibm-plugin-1.8.0_sr8.6-30.111.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152963" version="1" class="patch">
	<metadata>
		<title>Security update for python-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1211674" ref_url="https://bugzilla.suse.com/1211674" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32681" ref_url="https://www.suse.com/security/cve/CVE-2023-32681/" source="CVE"/>
		<description>
This update for python-requests fixes the following issues:

- CVE-2023-32681: Fixed unintended leak of Proxy-Authorization header (bsc#1211674).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-18"/>
	<updated date="2023-07-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211674">SUSE bug 1211674</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32681/">CVE-2023-32681 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32681">CVE-2023-32681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768059" comment="python-requests-2.11.1-6.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152964" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1212235" ref_url="https://bugzilla.suse.com/1212235" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3195" ref_url="https://www.suse.com/security/cve/CVE-2023-3195/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2023-3195: Fixed stack overflow in coders/tiff.c while parsing malicious tiff file (bsc#1212235).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-18"/>
	<updated date="2023-07-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212235">SUSE bug 1212235</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3195/">CVE-2023-3195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3195">CVE-2023-3195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009767477" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.192.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767478" comment="ImageMagick-config-6-upstream-6.8.8.1-71.192.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767479" comment="libMagickCore-6_Q16-1-6.8.8.1-71.192.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767480" comment="libMagickWand-6_Q16-1-6.8.8.1-71.192.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152965" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210999" ref_url="https://bugzilla.suse.com/1210999" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-31484" ref_url="https://www.suse.com/security/cve/CVE-2023-31484/" source="CVE"/>
		<description>
This update for perl fixes the following issues:

   - CVE-2023-31484: Enable TLS cert verification in CPAN (bsc#1210999).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-19"/>
	<updated date="2023-07-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210999">SUSE bug 1210999</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31484/">CVE-2023-31484 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31484">CVE-2023-31484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771452" comment="perl-5.18.2-12.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771450" comment="perl-32bit-5.18.2-12.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771453" comment="perl-base-5.18.2-12.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771404" comment="perl-doc-5.18.2-12.26.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771452" comment="perl-5.18.2-12.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771450" comment="perl-32bit-5.18.2-12.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771453" comment="perl-base-5.18.2-12.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771404" comment="perl-doc-5.18.2-12.26.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152966" version="1" class="patch">
	<metadata>
		<title>Security update for python3-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1211674" ref_url="https://bugzilla.suse.com/1211674" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32681" ref_url="https://www.suse.com/security/cve/CVE-2023-32681/" source="CVE"/>
		<description>
This update for python3-requests fixes the following issues:

- CVE-2023-32681: Fixed unintended leak of Proxy-Authorization header (bsc#1211674).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-19"/>
	<updated date="2023-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211674">SUSE bug 1211674</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32681/">CVE-2023-32681 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32681">CVE-2023-32681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767921" comment="python3-requests-2.24.0-8.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152967" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1213174" ref_url="https://bugzilla.suse.com/1213174" source="BUGZILLA"/>
		<reference ref_id="1213384" ref_url="https://bugzilla.suse.com/1213384" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2127" ref_url="https://www.suse.com/security/cve/CVE-2022-2127/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

  - CVE-2022-2127: Fixed issue where lm_resp_len was not checked properly in winbindd_pam_auth_crap_send (bsc#1213174).

  Bugfixes:

  - Fixed trust relationship failure (bsc#1213384).

		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-19"/>
	<updated date="2023-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213174">SUSE bug 1213174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213384">SUSE bug 1213384</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2127/">CVE-2022-2127 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2127">CVE-2022-2127 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772359" comment="libdcerpc-binding0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772316" comment="libdcerpc-binding0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772360" comment="libdcerpc0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772318" comment="libdcerpc0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772361" comment="libndr-krb5pac0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772320" comment="libndr-krb5pac0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772362" comment="libndr-nbt0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772322" comment="libndr-nbt0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772363" comment="libndr-standard0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772324" comment="libndr-standard0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772364" comment="libndr0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772326" comment="libndr0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772365" comment="libnetapi0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772328" comment="libnetapi0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772366" comment="libsamba-credentials0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772330" comment="libsamba-credentials0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772367" comment="libsamba-errors0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772332" comment="libsamba-errors0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772368" comment="libsamba-hostconfig0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772334" comment="libsamba-hostconfig0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772369" comment="libsamba-passdb0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772336" comment="libsamba-passdb0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772370" comment="libsamba-util0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772338" comment="libsamba-util0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772371" comment="libsamdb0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772340" comment="libsamdb0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772372" comment="libsmbclient0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772342" comment="libsmbclient0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772373" comment="libsmbconf0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772344" comment="libsmbconf0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772374" comment="libsmbldap0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772346" comment="libsmbldap0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772375" comment="libtevent-util0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772348" comment="libtevent-util0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772376" comment="libwbclient0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772350" comment="libwbclient0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772377" comment="samba-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772378" comment="samba-client-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772353" comment="samba-client-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772354" comment="samba-doc-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772379" comment="samba-libs-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772356" comment="samba-libs-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772380" comment="samba-winbind-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772358" comment="samba-winbind-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772359" comment="libdcerpc-binding0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772316" comment="libdcerpc-binding0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772360" comment="libdcerpc0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772318" comment="libdcerpc0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772361" comment="libndr-krb5pac0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772320" comment="libndr-krb5pac0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772362" comment="libndr-nbt0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772322" comment="libndr-nbt0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772363" comment="libndr-standard0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772324" comment="libndr-standard0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772364" comment="libndr0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772326" comment="libndr0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772365" comment="libnetapi0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772328" comment="libnetapi0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772366" comment="libsamba-credentials0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772330" comment="libsamba-credentials0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772367" comment="libsamba-errors0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772332" comment="libsamba-errors0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772368" comment="libsamba-hostconfig0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772334" comment="libsamba-hostconfig0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772369" comment="libsamba-passdb0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772336" comment="libsamba-passdb0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772370" comment="libsamba-util0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772338" comment="libsamba-util0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772371" comment="libsamdb0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772340" comment="libsamdb0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772372" comment="libsmbclient0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772342" comment="libsmbclient0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772373" comment="libsmbconf0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772344" comment="libsmbconf0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772374" comment="libsmbldap0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772346" comment="libsmbldap0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772375" comment="libtevent-util0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772348" comment="libtevent-util0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772376" comment="libwbclient0-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772350" comment="libwbclient0-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772377" comment="samba-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772378" comment="samba-client-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772353" comment="samba-client-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772354" comment="samba-doc-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772379" comment="samba-libs-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772356" comment="samba-libs-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772380" comment="samba-winbind-4.6.16+git.393.97432483687-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772358" comment="samba-winbind-32bit-4.6.16+git.393.97432483687-3.81.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152968" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1092945" ref_url="https://bugzilla.suse.com/1092945" source="BUGZILLA"/>
		<reference ref_id="1102531" ref_url="https://bugzilla.suse.com/1102531" source="BUGZILLA"/>
		<reference ref_id="1107597" ref_url="https://bugzilla.suse.com/1107597" source="BUGZILLA"/>
		<reference ref_id="1114966" ref_url="https://bugzilla.suse.com/1114966" source="BUGZILLA"/>
		<reference ref_id="1115185" ref_url="https://bugzilla.suse.com/1115185" source="BUGZILLA"/>
		<reference ref_id="1115186" ref_url="https://bugzilla.suse.com/1115186" source="BUGZILLA"/>
		<reference ref_id="1115187" ref_url="https://bugzilla.suse.com/1115187" source="BUGZILLA"/>
		<reference ref_id="1115626" ref_url="https://bugzilla.suse.com/1115626" source="BUGZILLA"/>
		<reference ref_id="1120939" ref_url="https://bugzilla.suse.com/1120939" source="BUGZILLA"/>
		<reference ref_id="1124150" ref_url="https://bugzilla.suse.com/1124150" source="BUGZILLA"/>
		<reference ref_id="1136105" ref_url="https://bugzilla.suse.com/1136105" source="BUGZILLA"/>
		<reference ref_id="1149635" ref_url="https://bugzilla.suse.com/1149635" source="BUGZILLA"/>
		<reference ref_id="1199272" ref_url="https://bugzilla.suse.com/1199272" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18267" ref_url="https://www.suse.com/security/cve/CVE-2017-18267/" source="CVE"/>
		<reference ref_id="CVE-2018-13988" ref_url="https://www.suse.com/security/cve/CVE-2018-13988/" source="CVE"/>
		<reference ref_id="CVE-2018-16646" ref_url="https://www.suse.com/security/cve/CVE-2018-16646/" source="CVE"/>
		<reference ref_id="CVE-2018-18897" ref_url="https://www.suse.com/security/cve/CVE-2018-18897/" source="CVE"/>
		<reference ref_id="CVE-2018-19058" ref_url="https://www.suse.com/security/cve/CVE-2018-19058/" source="CVE"/>
		<reference ref_id="CVE-2018-19059" ref_url="https://www.suse.com/security/cve/CVE-2018-19059/" source="CVE"/>
		<reference ref_id="CVE-2018-19060" ref_url="https://www.suse.com/security/cve/CVE-2018-19060/" source="CVE"/>
		<reference ref_id="CVE-2018-19149" ref_url="https://www.suse.com/security/cve/CVE-2018-19149/" source="CVE"/>
		<reference ref_id="CVE-2018-20481" ref_url="https://www.suse.com/security/cve/CVE-2018-20481/" source="CVE"/>
		<reference ref_id="CVE-2018-20650" ref_url="https://www.suse.com/security/cve/CVE-2018-20650/" source="CVE"/>
		<reference ref_id="CVE-2018-21009" ref_url="https://www.suse.com/security/cve/CVE-2018-21009/" source="CVE"/>
		<reference ref_id="CVE-2019-12293" ref_url="https://www.suse.com/security/cve/CVE-2019-12293/" source="CVE"/>
		<reference ref_id="CVE-2019-7310" ref_url="https://www.suse.com/security/cve/CVE-2019-7310/" source="CVE"/>
		<reference ref_id="CVE-2022-27337" ref_url="https://www.suse.com/security/cve/CVE-2022-27337/" source="CVE"/>
		<description>
This update for poppler fixes the following issues:

  - CVE-2022-27337: Fixed a logic error in the Hints::Hints function which can cause denial of service (bsc#1199272).
  - CVE-2018-21009: Fixed integer overflow in Parser:makeStream in Parser.cc (bsc#1149635).
  - CVE-2019-12293: Fixed heap-based buffer over-read in JPXStream:init in JPEG2000Stream.cc (bsc#1136105).
  - CVE-2018-20481: Fixed memory leak in GfxColorSpace:setDisplayProfile in GfxState.cc (bsc#1114966).
  - CVE-2019-7310: Fixed a heap-based buffer over-read allows remote attackers to cause DOS via a special crafted PDF (bsc#1124150).
  - CVE-2018-13988: Fixed buffer overflow in pdfunite (bsc#1102531).
  - CVE-2018-16646: Fixed infinite recursion in poppler/Parser.cc:Parser::getObj() function (bsc#1107597).
  - CVE-2018-19058: Fixed reachable abort in Object.h leading to denial of service (bsc#1115187).
  - CVE-2018-19059: Fixed out-of-bounds read in EmbFile:save2 in FileSpec.cc leading to denial of service (bsc#1115186).
  - CVE-2018-19060: Fixed NULL pointer dereference in goo/GooString.h leading to denial of service (bsc#1115185).
  - CVE-2018-19149: Fixed NULL pointer dereference in _poppler_attachment_new when called from poppler_annot_file_attachment_get_attachment (bsc#1115626).
  - CVE-2017-18267: Fixed denial of service (infinite recursion) via a crafted PDF file (bsc#1092945).
  - CVE-2018-20650: Fixed issue where a reachable Object in dictLookup assertion allows attackers to cause DOS (bsc#1120939).

		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-20"/>
	<updated date="2023-07-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092945">SUSE bug 1092945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102531">SUSE bug 1102531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107597">SUSE bug 1107597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114966">SUSE bug 1114966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115185">SUSE bug 1115185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115186">SUSE bug 1115186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115187">SUSE bug 1115187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115626">SUSE bug 1115626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120939">SUSE bug 1120939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124150">SUSE bug 1124150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136105">SUSE bug 1136105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149635">SUSE bug 1149635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199272">SUSE bug 1199272</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18267/">CVE-2017-18267 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18267">CVE-2017-18267 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13988/">CVE-2018-13988 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13988">CVE-2018-13988 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16646/">CVE-2018-16646 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16646">CVE-2018-16646 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18897/">CVE-2018-18897 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18897">CVE-2018-18897 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19058/">CVE-2018-19058 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19058">CVE-2018-19058 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19059/">CVE-2018-19059 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19059">CVE-2018-19059 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19060/">CVE-2018-19060 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19060">CVE-2018-19060 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19149/">CVE-2018-19149 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19149">CVE-2018-19149 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20481/">CVE-2018-20481 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20481">CVE-2018-20481 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20650/">CVE-2018-20650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20650">CVE-2018-20650 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-21009/">CVE-2018-21009 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21009">CVE-2018-21009 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12293/">CVE-2019-12293 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12293">CVE-2019-12293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7310/">CVE-2019-7310 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7310">CVE-2019-7310 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-27337/">CVE-2022-27337 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27337">CVE-2022-27337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771821" comment="libpoppler-glib8-0.43.0-16.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771822" comment="libpoppler-qt4-4-0.43.0-16.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771823" comment="libpoppler60-0.43.0-16.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771824" comment="poppler-tools-0.43.0-16.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152969" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1213504" ref_url="https://bugzilla.suse.com/1213504" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38408" ref_url="https://www.suse.com/security/cve/CVE-2023-38408/" source="CVE"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2023-38408: Fixed a condition where specific libaries loaded via
  ssh-agent(1)'s PKCS#11 support could be abused to achieve remote code
  execution via a forwarded agent socket if those libraries were present on the
  victim's system and if the agent was forwarded to an attacker-controlled
  system. [bsc#1213504, CVE-2023-38408]
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-23"/>
	<updated date="2023-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213504">SUSE bug 1213504</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38408/">CVE-2023-38408 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38408">CVE-2023-38408 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009773607" comment="openssh-7.2p2-74.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773608" comment="openssh-askpass-gnome-7.2p2-74.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773609" comment="openssh-fips-7.2p2-74.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773610" comment="openssh-helpers-7.2p2-74.63.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009773607" comment="openssh-7.2p2-74.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773608" comment="openssh-askpass-gnome-7.2p2-74.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773609" comment="openssh-fips-7.2p2-74.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773610" comment="openssh-helpers-7.2p2-74.63.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152970" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1213230" ref_url="https://bugzilla.suse.com/1213230" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3600" ref_url="https://www.suse.com/security/cve/CVE-2023-3600/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 115.0.2 ESR (MFSA 2023-26, bsc#1213230)

Security fixes:

 - CVE-2023-3600: Fixed use-after-free in workers (bmo#1839703)
  
Other fixes:

 - Fixed a startup crash experienced by some Windows
   users by blocking instances of a malicious injected DLL
   (bmo#1841751)
 - Fixed a bug with displaying a caret in the text editor
   on some websites (bmo#1840804)
 - Fixed a bug with broken audio rendering on some
   websites (bmo#1841982)
 - Fixed a bug with patternTransform translate using the
   wrong units (bmo#1840746)
 - Fixed a crash affecting Windows 7 users related to the
   DLL blocklist.

Firefox Extended Support Release 115.0.1 ESR

 - Fixed a startup crash for Windows users with Kingsoft
   Antivirus software installed (bmo#1837242)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-25"/>
	<updated date="2023-07-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213230">SUSE bug 1213230</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3600/">CVE-2023-3600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3600">CVE-2023-3600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772729" comment="MozillaFirefox-115.0.2-112.170.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772658" comment="MozillaFirefox-devel-115.0.2-112.170.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772730" comment="MozillaFirefox-translations-common-115.0.2-112.170.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772729" comment="MozillaFirefox-115.0.2-112.170.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772658" comment="MozillaFirefox-devel-115.0.2-112.170.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772730" comment="MozillaFirefox-translations-common-115.0.2-112.170.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152971" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtsvg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196654" ref_url="https://bugzilla.suse.com/1196654" source="BUGZILLA"/>
		<reference ref_id="1211298" ref_url="https://bugzilla.suse.com/1211298" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45930" ref_url="https://www.suse.com/security/cve/CVE-2021-45930/" source="CVE"/>
		<reference ref_id="CVE-2023-32573" ref_url="https://www.suse.com/security/cve/CVE-2023-32573/" source="CVE"/>
		<description>
This update for libqt5-qtsvg fixes the following issues:

- CVE-2021-45930: Fixed an out-of-bounds write that may have let to a denial-of-service (bsc#1196654).
- CVE-2023-32573: Fixed missing initialization of QtSvg QSvgFont m_unitsPerEm variable (bsc#1211298).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-25"/>
	<updated date="2023-07-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196654">SUSE bug 1196654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211298">SUSE bug 1211298</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45930/">CVE-2021-45930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45930">CVE-2021-45930 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32573/">CVE-2023-32573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32573">CVE-2023-32573 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773611" comment="libQt5Svg5-5.6.2-3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152972" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209616" ref_url="https://bugzilla.suse.com/1209616" source="BUGZILLA"/>
		<reference ref_id="1211642" ref_url="https://bugzilla.suse.com/1211642" source="BUGZILLA"/>
		<reference ref_id="1211994" ref_url="https://bugzilla.suse.com/1211994" source="BUGZILLA"/>
		<reference ref_id="1213326" ref_url="https://bugzilla.suse.com/1213326" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-24607" ref_url="https://www.suse.com/security/cve/CVE-2023-24607/" source="CVE"/>
		<reference ref_id="CVE-2023-33285" ref_url="https://www.suse.com/security/cve/CVE-2023-33285/" source="CVE"/>
		<reference ref_id="CVE-2023-34410" ref_url="https://www.suse.com/security/cve/CVE-2023-34410/" source="CVE"/>
		<reference ref_id="CVE-2023-38197" ref_url="https://www.suse.com/security/cve/CVE-2023-38197/" source="CVE"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2023-24607: Fixed Qt SQL ODBC driver plugin DOS (bsc#1209616).
- CVE-2023-33285: Fixed buffer overflow in QDnsLookup (bsc#1211642).
- CVE-2023-34410: Fixed certificate validation does not always consider whether the root of a chain is a configured CA certificate (bsc#1211994).
- CVE-2023-38197: Fixed infinite loops in QXmlStreamReader(bsc#1213326).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-26"/>
	<updated date="2023-07-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1209616">SUSE bug 1209616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211642">SUSE bug 1211642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211994">SUSE bug 1211994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213326">SUSE bug 1213326</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24607/">CVE-2023-24607 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24607">CVE-2023-24607 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-33285/">CVE-2023-33285 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33285">CVE-2023-33285 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-34410/">CVE-2023-34410 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34410">CVE-2023-34410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38197/">CVE-2023-38197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38197">CVE-2023-38197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009773612" comment="libQt5Concurrent5-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773613" comment="libQt5Core5-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773614" comment="libQt5DBus5-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773615" comment="libQt5Gui5-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773616" comment="libQt5Network5-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773617" comment="libQt5OpenGL5-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773618" comment="libQt5PrintSupport5-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773619" comment="libQt5Sql5-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773620" comment="libQt5Sql5-mysql-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773621" comment="libQt5Sql5-postgresql-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773622" comment="libQt5Sql5-sqlite-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773623" comment="libQt5Sql5-unixODBC-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773624" comment="libQt5Test5-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773625" comment="libQt5Widgets5-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773626" comment="libQt5Xml5-5.6.2-6.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009773612" comment="libQt5Concurrent5-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773613" comment="libQt5Core5-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773614" comment="libQt5DBus5-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773615" comment="libQt5Gui5-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773616" comment="libQt5Network5-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773617" comment="libQt5OpenGL5-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773618" comment="libQt5PrintSupport5-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773619" comment="libQt5Sql5-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773620" comment="libQt5Sql5-mysql-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773621" comment="libQt5Sql5-postgresql-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773622" comment="libQt5Sql5-sqlite-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773623" comment="libQt5Sql5-unixODBC-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773624" comment="libQt5Test5-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773625" comment="libQt5Widgets5-5.6.2-6.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773626" comment="libQt5Xml5-5.6.2-6.36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152973" version="1" class="patch">
	<metadata>
		<title>Security update for xmltooling (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1212359" ref_url="https://bugzilla.suse.com/1212359" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-36661" ref_url="https://www.suse.com/security/cve/CVE-2023-36661/" source="CVE"/>
		<description>
This update for xmltooling fixes the following issues:

- CVE-2023-36661: Fixed a server-side-request-forgery (SSRF) vulnerability (bsc#1212359).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-26"/>
	<updated date="2023-07-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212359">SUSE bug 1212359</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-36661/">CVE-2023-36661 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36661">CVE-2023-36661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009770150" comment="libxmltooling6-1.5.6-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770151" comment="xmltooling-schemas-1.5.6-3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152974" version="1" class="patch">
	<metadata>
		<title>Security update for zabbix (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1213307" ref_url="https://bugzilla.suse.com/1213307" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29450" ref_url="https://www.suse.com/security/cve/CVE-2023-29450/" source="CVE"/>
		<description>
This update for zabbix fixes the following issues:

  - CVE-2023-29450: Fixed unauthorized file system access in JS preprocessing (bsc#1213307).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-31"/>
	<updated date="2023-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213307">SUSE bug 1213307</bugzilla>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-29450/">CVE-2023-29450 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29450">CVE-2023-29450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772738" comment="zabbix-agent-4.0.12-4.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772738" comment="zabbix-agent-4.0.12-4.24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152975" version="1" class="patch">
	<metadata>
		<title>Security update for gnuplot (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176689" ref_url="https://bugzilla.suse.com/1176689" source="BUGZILLA"/>
		<reference ref_id="1213068" ref_url="https://bugzilla.suse.com/1213068" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25969" ref_url="https://www.suse.com/security/cve/CVE-2020-25969/" source="CVE"/>
		<description>
This update for gnuplot fixes the following issues:

  - CVE-2020-25969: Fixed buffer overflow via the function plotrequest() (bsc#1213068).
  - CVE-2020-25559: Fixed double free when executing print_set_output (bsc#1176689).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-01"/>
	<updated date="2023-08-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176689">SUSE bug 1176689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213068">SUSE bug 1213068</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25969/">CVE-2020-25969 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25969">CVE-2020-25969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771454" comment="gnuplot-4.6.5-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152976" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206579" ref_url="https://bugzilla.suse.com/1206579" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-47629" ref_url="https://www.suse.com/security/cve/CVE-2022-47629/" source="CVE"/>
		<description>
This update for libksba fixes the following issues:

- CVE-2022-47629: Fixed an integer overflow vulnerability in the CRL
  signature parser (bsc#1206579).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-05"/>
	<updated date="2023-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206579">SUSE bug 1206579</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47629/">CVE-2022-47629 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47629">CVE-2022-47629 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730946" comment="libksba8-1.3.0-24.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730946" comment="libksba8-1.3.0-24.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152977" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1213487" ref_url="https://bugzilla.suse.com/1213487" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3446" ref_url="https://www.suse.com/security/cve/CVE-2023-3446/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

  - CVE-2023-3446: Fixed DH_check() excessive time with over sized modulus (bsc#1213487).

		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-02"/>
	<updated date="2023-08-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213487">SUSE bug 1213487</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3446/">CVE-2023-3446 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3446">CVE-2023-3446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772731" comment="libopenssl-devel-1.0.2j-60.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772732" comment="libopenssl1_0_0-1.0.2j-60.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772733" comment="libopenssl1_0_0-32bit-1.0.2j-60.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772734" comment="libopenssl1_0_0-hmac-1.0.2j-60.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772735" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772736" comment="openssl-1.0.2j-60.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772737" comment="openssl-doc-1.0.2j-60.101.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772731" comment="libopenssl-devel-1.0.2j-60.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772732" comment="libopenssl1_0_0-1.0.2j-60.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772733" comment="libopenssl1_0_0-32bit-1.0.2j-60.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772734" comment="libopenssl1_0_0-hmac-1.0.2j-60.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772735" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772736" comment="openssl-1.0.2j-60.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772737" comment="openssl-doc-1.0.2j-60.101.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152978" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1213657" ref_url="https://bugzilla.suse.com/1213657" source="BUGZILLA"/>
		<reference ref_id="1213746" ref_url="https://bugzilla.suse.com/1213746" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4045" ref_url="https://www.suse.com/security/cve/CVE-2023-4045/" source="CVE"/>
		<reference ref_id="CVE-2023-4046" ref_url="https://www.suse.com/security/cve/CVE-2023-4046/" source="CVE"/>
		<reference ref_id="CVE-2023-4047" ref_url="https://www.suse.com/security/cve/CVE-2023-4047/" source="CVE"/>
		<reference ref_id="CVE-2023-4048" ref_url="https://www.suse.com/security/cve/CVE-2023-4048/" source="CVE"/>
		<reference ref_id="CVE-2023-4049" ref_url="https://www.suse.com/security/cve/CVE-2023-4049/" source="CVE"/>
		<reference ref_id="CVE-2023-4050" ref_url="https://www.suse.com/security/cve/CVE-2023-4050/" source="CVE"/>
		<reference ref_id="CVE-2023-4052" ref_url="https://www.suse.com/security/cve/CVE-2023-4052/" source="CVE"/>
		<reference ref_id="CVE-2023-4054" ref_url="https://www.suse.com/security/cve/CVE-2023-4054/" source="CVE"/>
		<reference ref_id="CVE-2023-4055" ref_url="https://www.suse.com/security/cve/CVE-2023-4055/" source="CVE"/>
		<reference ref_id="CVE-2023-4056" ref_url="https://www.suse.com/security/cve/CVE-2023-4056/" source="CVE"/>
		<reference ref_id="CVE-2023-4057" ref_url="https://www.suse.com/security/cve/CVE-2023-4057/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following security issues:

  Firefox was updated to Extended Support Release 115.1.0 ESR (bsc#1213746).
  
  - CVE-2023-4045: Fixed cross-origin restrictions bypass with Offscreen Canvas (bmo#1833876).
  - CVE-2023-4046: Fixed incorrect value used during WASM compilation (bmo#1837686).
  - CVE-2023-4047: Fixed potential permissions request bypass via clickjacking (bmo#1839073).
  - CVE-2023-4048: Fixed crash in DOMParser due to out-of-memory conditions (bmo#1841368).
  - CVE-2023-4049: Fixed potential race conditions when releasing platform objects (bmo#1842658).
  - CVE-2023-4050: Fixed stack buffer overflow in StorageManager (bmo#1843038).
  - CVE-2023-4052: Fixed file deletion and privilege escalation through Firefox uninstaller (bmo#1824420).
  - CVE-2023-4054: Fixed lack of warning when opening appref-ms files (bmo#1840777).
  - CVE-2023-4055: Fixed cookie jar overflow caused unexpected cookie jar state (bmo#1782561).
  - CVE-2023-4056: Fixed memory safety bugs (bmo#1820587, bmo#1824634, bmo#1839235, bmo#1842325, bmo#1843847).
  - CVE-2023-4057: Fixed memory safety bugs (bmo#1841682).

  Bugfixes:

  - Remove bashisms from startup-script (bsc#1213657).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-02"/>
	<updated date="2023-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213657">SUSE bug 1213657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4045/">CVE-2023-4045 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4045">CVE-2023-4045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4046/">CVE-2023-4046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4046">CVE-2023-4046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4047/">CVE-2023-4047 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4047">CVE-2023-4047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4048/">CVE-2023-4048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4048">CVE-2023-4048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4049/">CVE-2023-4049 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4049">CVE-2023-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4050/">CVE-2023-4050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4050">CVE-2023-4050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4052/">CVE-2023-4052 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4052">CVE-2023-4052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4054/">CVE-2023-4054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4054">CVE-2023-4054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4055/">CVE-2023-4055 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4055">CVE-2023-4055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4056/">CVE-2023-4056 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4056">CVE-2023-4056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4057/">CVE-2023-4057 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4057">CVE-2023-4057 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009776008" comment="MozillaFirefox-115.1.0-112.173.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775992" comment="MozillaFirefox-devel-115.1.0-112.173.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776009" comment="MozillaFirefox-translations-common-115.1.0-112.173.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009776008" comment="MozillaFirefox-115.1.0-112.173.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775992" comment="MozillaFirefox-devel-115.1.0-112.173.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776009" comment="MozillaFirefox-translations-common-115.1.0-112.173.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152979" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_security2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207378" ref_url="https://bugzilla.suse.com/1207378" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48279" ref_url="https://www.suse.com/security/cve/CVE-2022-48279/" source="CVE"/>
		<description>
This update for apache2-mod_security2 fixes the following issues:

- CVE-2022-48279: Fixed a potential firewall bypass due to an
  incorrect parsing of HTTP multipart requests (bsc#1207378).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-08"/>
	<updated date="2023-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207378">SUSE bug 1207378</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48279/">CVE-2022-48279 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48279">CVE-2022-48279 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736637" comment="apache2-mod_security2-2.8.0-7.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009736637" comment="apache2-mod_security2-2.8.0-7.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152980" version="1" class="patch">
	<metadata>
		<title>Security update for javapackages-tools, javassist, mysql-connector-java, protobuf, python-python-gflags (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1036025" ref_url="https://bugzilla.suse.com/1036025" source="BUGZILLA"/>
		<reference ref_id="1133277" ref_url="https://bugzilla.suse.com/1133277" source="BUGZILLA"/>
		<reference ref_id="1162343" ref_url="https://bugzilla.suse.com/1162343" source="BUGZILLA"/>
		<description>
This update for javapackages-tools, javassist, mysql-connector-java, protobuf, python-python-gflags contains the following fixes:

Changes in mysql-connector-java:
- Restrict license to GPL-2.0-only
- Fix README adjustments
- Depend on log4j rather than log4j-mini and adjust log4j dependencies to
  account for the lack of log4j12 Provides in some code streams.
- Add missing Group tag
- Update to 8.0.25 (SOC-11543)
  Changes in 8.0.25
    * No functional changes: version alignment with MySQL Server 8.0.25.
  Changes in 8.0.24
    * Bug#102188 (32526663), AccessControlException with AuthenticationLdapSaslClientPlugin.
    * Bug#22508715, SETSESSIONMAXROWS() CALL ON CLOSED CONNECTION RESULTS IN NPE.
    * Bug#102131 (32338451), UPDATABLERESULTSET NPE WHEN USING DERIVED QUERIES OR VIEWS.
    * Bug#101596 (32151143), GET THE 'HOST' PROPERTY ERROR AFTER CALLING TRANSFORMPROPERTIES() METHOD.
    * Bug#20391832, SETOBJECT() FOR TYPES.TIME RESULTS IN EXCEPTION WHEN VALUE HAS FRACTIONAL PART.
    * Bug#97730 (31699993), xdev api: ConcurrentModificationException at Session.close.
    * Bug#99708 (31510398), mysql-connector-java 8.0.20 ASSERTION FAILED: Unknown message type: 57 s.close.
    * Bug#32122553, EXTRA BYTE IN COM_STMT_EXECUTE.
    * Bug#101558 (32141210), NULLPOINTEREXCEPTION WHEN EXECUTING INVALID QUERY WITH USEUSAGEADVISOR ENABLED.
    * Bug#102076 (32329915), CONTRIBUTION: MYSQL JDBC DRIVER RESULTSET.GETLONG() THROWS NUMBEROUTOFRANGE.
    * Bug#31747910, BUG 30474158 FIX IMPROVES JDBC COMPLIANCE BUT CHANGES DEFAULT RESULTSETTYPE HANDLING.
    * Bug#102321 (32405590), CALLING RESULTSETMETADATA.GETCOLUMNCLASSNAME RETURNS WRONG VALUE FOR DATETIME.
    * WL#14453, Pluggable authentication: new default behavior &amp; user-less authentications.
    * WL#14392, Improve timeout error messages [classic].
    * WL#14202, XProtocol: Support connection close notification.
  Changes in 8.0.23
    * Bug#21789378, FORCED TO SET SERVER TIMEZONE IN CONNECT STRING.
    * Bug#95644 (30573281), JDBC GETDATE/GETTIME/GETTIMESTAMP INTERFACE BEHAVIOR CHANGE AFTER UPGRADE 8.0.
    * Bug#94457 (29402209), CONNECTOR/J RESULTSET.GETOBJECT( ..., OFFSETDATETIME.CLASS ) THROWS.
    * Bug#76775 (20959249), FRACTIONAL SECONDS IN TIME VALUES ARE NOT AVAILABLE VIA JDBC.
    * Bug#99013 (31074051), AN EXTRA HOUR GETS ADDED TO THE TIMESTAMP WHEN SUBTRACTING INTERVAL 'N' DAYS.
    * Bug#98695 (30962953), EXECUTION OF 'LOAD DATA LOCAL INFILE' COMMAND THROUGH JDBC FOR DATETIME COLUMN.
    * Bug#101413 (32099505), JAVA.TIME.LOCALDATETIME CANNOT BE CAST TO JAVA.SQL.TIMESTAMP.
    * Bug#101242 (32046007), CANNOT USE BYTEARRAYINPUTSTREAM AS ARGUMENTS IN PREPARED STATEMENTS AN MORE.
    * WL#14274, Support for authentication_ldap_sasl_client(SCRAM-SHA-256) authentication plugin.
    * WL#14206, Support for authentication_ldap_sasl_client(GSSAPI) authentication plugin.
    * WL#14207, Replace language in APIs and source code/docs.
  Changes in 8.0.22
    * Bug#98667 (31711961), 'All pipe instances are busy' exception on multiple connections to named Pipe.
    * Bug#96309 (31699357), MultiHost in loadbalance may lead to a TPS reduction during a quick switch.
    * Bug#99076 (31083755), Unclear exception/error when connecting with jdbc:mysql to a mysqlx port.
    * Bug#96870 (30304764), Contribution: Allow to disable AbandonedConnectionCleanupThread completely.
    * WL#14115, Support for authentication_ldap_sasl_client (SCRAM-SHA-1) authentication plugin.
    * WL#14096, Add option to specify LOAD DATA LOCAL allow list folder.
    * WL#13780, Skip system-wide trust and key stores (incl. X DevAPI client certs).
    * WL#14017, XProtocol -- support for configurable compression algorithms.
    * Bug#92903 (28834903), MySQL Connector/j should support wildcard names or alternative names.
    * Bug#99767 (31443178), Contribution: Check SubjectAlternativeName for TLS instead of commonName.
    * Bug#93444 (29015453), LOCALDATETIME PARAMETER VA UES ALTERED WHEN CLIENT AND SERVER TIMEZONES DIFFER.
    * WL#14052, Remove asynchronous variant of X Protocol.
    * Bug#99713 (31418928), NPE DURING COM.MYSQL.CJ.SERVERPREPAREDQUERYBINDVALUE.STOREDATE().
    * WL#14068, Remove legacy integration with JBoss.
  Changes in 8.0.21
    * WL#14051, Upgrade Protocol Buffers dependency to protobuf-java-3.11.4.
    * WL#14042, Upgrade testsuite to JUnit 5.
    * Bug#98237 (30911870),  PREPAREDSTATEMENT.SETOBJECT(I, 'FALSE', TYPES.BOOLEAN) ALWAYS SETS TRUE OR 1.
    * WL#13008, DevAPI: Add schema validation to create collection.
  Changes in 8.0.20
    * Bug#30805426, IN CASE OF ISAUTHMETHODSWITCHREQUESTPACKET , TOSERVERS &gt; 1 ARE IGNORED.
    * Bug#97714 (30570249), Contribution: Expose elapsed time for query interceptor
    * Bug#97724 (30570721), Contribution: Allow \'3.\' formatted numbers.
    * Bug#98536 (30877755), SIMPLEDATEFORMAT COULD CACHE A WRONG CALENDAR.
      Fix for Bug#91112 (28125069), AGAIN WRONG JAVA.SQL.DATE.
    * Bug#30474158, CONNECTOR/J 8 DOES NOT HONOR THE REQUESTED RESULTSETTYPE SCROLL_INSENSITIVE ETC.
    * Bug#98445 (30832513), Connection option clientInfoProvider=ClientInfoProviderSP causes NPE.
    * WL#12248, DevAPI: Connection compression.
    * Bug#30636056, ResultSetUtil.resultSetToMap() can be unsafe to use.
    * Bug#97757 (30584907), NULLPOINTEREXCEPTION WITH CACHERESULTSETMETADATA=TRUE AND EXECUTEQUERY OF 'SET'.
  Changes in 8.0.19
    * WL#13346, Support for mult-host and failover.
    * Bug#97413 (30477722), DATABASEMETADATA IS BROKEN AFTER SERVER WL#13528.
    * WL#13367, DNS SRV support.
    * WL#12736, DevAPI: Specify TLS ciphers to be used by a client or session.
    * Bug#96383 (30119545) RS.GETTIMESTAMP() HAS * DIFFERENT RESULTS FOR TIME FIELDS WITH USECURSORFETCH=TRUE.
    * Bug#96059 (29999318), ERROR STREAMING MULTI RESULTSETS WITH MYSQL-CONNECTOR-JAVA 8.0.X.
    * Bug#96442 (30151808), INCORRECT DATE ERROR WHEN CALLING GETMETADATA ON PREPARED STATEMENT.
  Changes in 8.0.18
    * WL#13347, Connectors should handle expired password sandbox without SET operations.
    * Bug#84098 (25223123), endless loop in LoadBalancedAutoCommitInterceptor.
    * Bug#23721537, MULTI-SELECT WITH EXECUTEASYNC() GIVES IMPROPER ERROR.
    * Bug#95741 (29898567), METADATA QUERY USES UPPER() AROUND NUMERIC EXPRESSION.
    * Bug#20913289, PSTMT.EXECUTEUPDATE() FAILS WHEN SQL MODE IS NO_BACKSLASH_ESCAPES.
    * Bug#80441 (22850444), SYNTAX ERROR ON RESULTSET.UPDATEROW() WITH SQL_MODE NO_BACKSLASH_ESCAPES.
  Changes in 8.0.17
    * WL#13210, Generate Javadocs via ant.
    * WL#12247, DevAPI: indexing array fields.
    * WL#12726, DevAPI: Add overlaps and not_overlaps as operator.
    * Bug#95503 (29821029), Operator IN not mapping consistently to the right X Plugin operation.
    * WL#12942, Update README.md and add new CONTRIBUTING.md.
    * WL#13125, Support fully qualified hostnames longer than 60 characters.
    * Bug#95210 (29807741), ClassCastException in BlobFromLocator when connecting as jdbc:mysql:replication.
    * Bug#29591275, THE JAR FILE NEEDS TO CONTAIN A README AND LICENSE FILE.
    * WL#13124, Support new utf8mb4 bin collation.
    * WL#13009, DevAPI: Deprecate methods.
    * WL#11101, Remove de-cache and close of SSPSs on double call to close().
    * Bug#89133 (27356869)  CONTRIBUTION: UPDATE DA ABASEMETADATA.JAVA.
    * Bug#11891000, DABATASEMETADATA.GETTABLES() IGNORES THE SCHEMA_PATTERN ARGUMENT.
    * Bug#94101 (29277648), SETTING LOGSLOWQUERIES SHOULD NOT AUTOMATICALLY ENABLE PROFILESQL FOR QUERIES.
    * Bug#74690 (20010454), PROFILEREVENT HOSTNAME HAS NO GETTER().
    * Bug#70677 (17640628), CONNECTOR J WITH PROFILESQL - LOG CONTAINS LOTS OF STACKTRACE DATA.
    * Bug#41172 (11750577), PROFILEREVENT.PACK() THROWS ARRAYINDEXOUTOFBOUNDSEXCEPTION.
    * Bug#27453692, CHARACTERS GET GARBLED IN CONCAT() IN PS WHEN USECURSORFETCH=TRUE.
    * Bug#94585 (29452669), GETTABLENAME() RETURNS NULL FOR A QUERY HAVING COUNT(*) WITH JDBC DRIVER V8.0.12.
    * Bug#94442 (29446059), RESULTSETIMPL.GETDOUBLE IS INEFFICIENT BECAUSE OF BIGDECIMAL (RE)CONSTRUCTIONS.
  Changes in 8.0.16
    * WL#12825, Remove third-party libraries from sources and bundles.
    * Bug#93590 (29054329), javax.net.ssl.SSLException: closing inbound before receiving peer's close_notify.
    * Bug#94414 (29384853), Connector/J RPM package have version number in path.
    * Bug#27786499, REDUNDANT FILES IN DEBIAN PACKAGE FOR DEBIAN9(COMMUNITY PACKAGE) FOR CJAVA.
    * WL#12246, DevAPI: Prepared statement support.
    * WL#10839, Adjust c/J tests to the new 'ON' default for explicit_defaults_for_timestamp.
    * Bug#29329326, PLEASE AVOID SHOW PROCESSLIST IF POSSIBLE.
    * WL#12460, DevAPI: Support new session reset functionality.
    * WL#12459, DevAPI: Support connection-attributes.
    * Bug#25650385, GETBYTE() RETURNS ERROR FOR BINARY() FLD.
    * Bug#27784363, MYSQL 8.0 JDBC DRIVER THROWS NUMBERFORMATEXCEPTION FOR TEXT DATA
    * Bug#93007 (28860051), LoadBalancedConnectionProxy.getGlobalBlacklist bug.
    * Bug#29186870, CONNECTOR/J REGRESSION: NOT RETURNING PRECISION GETPROCEDURECOLUMNS.
    * Bug#22038729, X DEVAPI: ANY API CALL AFTER A FAILED CALL PROC() RESULTS IN HANG.
    * Bug#29244101, ADD MAPPING FOR UTF8MB4_ZH_0900_AS_CS COLLATION.
    * Bug#92819 (28834959), EXPRPARSER THROWS WRONGARGUMENTEXCEPTION WHEN PARSING EMPTY JSON ARRAY.
    * Bug#21921956, X DEVAPI: EXPRESSION PARSE ERROR WITH UNARY OPERATOR.
    * Bug#94031 (29257922), WRONG JSON_UNQUOTE WORKAROUND.
    * Bug#22931700, BINDINGS.GETBOOLEAN() ALWAYS RETURNS FALSE.
    * Bug#25650912, ERROR MESSAGE NOT CLEAR WHEN WE PASS A CHAR DATA TO ANY TABLE API.
    * Bug#25642021, CHANGEUSER() FAILS WHEN ENABLEPACKETDEBUG=TRUE.
  Changes in 8.0.15
    * Bug#94051 (29261254), Not recommended default for 'allowLoadLocalInfile'.
  Changes in 8.0.14
    * WL#12298, Connectors: Expose metadata about source and binaries in unified way.
    * Bug#93111 (28894344), ConnectionUrl.java contains char U+00A7 (section sign).
    * WL#12621, DevAPI: Handling of Default Schema.
    * Bug#93340 (28970166), C/J BUILD SCRIPT IS TOO VERBOSE
    * WL#12462, DevAPI: Be prepared for initial notice on connection.
    * Bug#28924137, WL#12463:IF COLLECTION DOESN'T EXIST, COLL.COUNT() IS GIVING A WRONG ERROR MESSAGE.
    * WL#12463, DevAPI: Standardize count method.
    * Bug#92508 (28747636), mysql-connector in bootclasspath causing memory leak.
    * Bug#25650514, UPDATEROW() CALL FAILS WITH NPE WHEN SSPS=TRUE AND TABLE HAS MULTI-FLD KEY.
    * Bug#25650482, REFRESHROW() CALL AFTER UPDATEROW() API FAILS WHEN USESERVERPREPSTMTS=TRUE.
    * Bug#92536 (28692243), UPDATEING SERVER SIDE PREPSTMTS RESULTSET FAIL.
    * Bug#92625 (28731795), CONTRIBUTION: FIX OBSERVED NPE IN CLEARINPUTSTREAM.
    * Bug#23045642, ADDING NO-DOC (MYSQLCONNJ-696) RESULTS IN EXCEPTION.
    * Bug#91065 (28101003), ZERODATETIMEBEHAVIOR=CONVERT_TO_NULL SHOULD NOT APPLY TO 00:00:00 TIME COLUMNS.
    * Bug#92574 (28706219), WHEN CONVERTING FROM VARCHAR TO JAVA BOOLEAN, 'N' IS NOT SUPPORTED.
    * Bug#25642226, CHANGEUSER() NOT SETTING THE DATABASE PROPERLY WITH SHA USER.
    * Bug#28606708, NAMED PIPE CONNECTION FOR X PROTOCOL RETURNS NPE, EXPECTED PROPER ERROR MESSAGE.
  Changes in 8.0.13
    * Bug#91317 (28207422), Wrong defaults on collation mappings.
    * WL#12245, DevAPI: Implement connect timeout.
    * Bug#21774249, UNIT TEST FAILS WITH ERROR ' 'CEST' IS UNRECOGNIZED TIME ZONE'.
    * WL#11857, DevAPI: Implement connection pooling for xprotocol.
    * Bug#91873 (28444461), REMOVE USEOLDUTF8BEHAVIOR CONNECTION PROPERTY.
    * Bug#92264 (28594434), JSONPARSER PUTS UNNECESSARY MAXIMUM LIMIT ON JSONNUMBER TO 10 DIGITS.
    * WL#12110, Extend PropertyDefinitions.PropertyKey usage.
    * Bug#81063 (23098159), w/ rewriteBatchedStatements, when 2 tables involved, the rewriting not correct.
    * Bug#84813 (25501750), rewriteBatchedStatements fails in INSERT.
    * Bug#81196 (23227334), CONNECTOR/J NOT FOLLOWING DATABASE CHARACTER SET.
    * Bug#72609 (18749544), SETDATE() NOT USING A PROLEPTIC GREGORIAN CALENDAR.
    * Bug#87534 (26730196), UNION ALL query fails when useServerPrepStmts=true on database connection.
    * Bug#89948 (27658489), Batched statements are not committed for useLocalTransactionState=true.
    * BUG#22305979, WRONG RECORD UPDATED IF SENDFRACTIONALSECONDS=FALSE AND SMT IS SCROLLABLE.
    * Bug#27102307, CHANGE USESSL AND VERIFYSERVERCERTIFICATE TO SSLMODE OPTION.
    * Bug#28150662, CONNECTOR/J 8 MALFORMED DATABASE URL EXCEPTION WHIT CORRECT URL STRING.
    * Bug#91421 (28246270), ALLOWED VALUES FOR ZERODATETIMEBEHAVIOR ARE INCOMPATIBLE WITH NETBEANS.
    * Bug#23045604, XSESSION.GETURI() RETURNS NPE.
    * Bug#21914769, NPE WHEN TRY TO EXECUTE INVALID JSON STRING.
    * Bug#BUG#90887 (28034570), DATABASEMETADATAUSINGINFOSCHEMA#GETTABLES FAILS IF METHOD ARGUMENTS ARE NULL.
    * Bug#28207088, C/JAVA: UPDATECLOB(INT COLUMNLABEL, JAVA.SQL.CLOB CLOB) IS FAILING.
    * Bug#27629553, NPE FROM GETSESSION() FOR SSL CONNECTION WHEN NO PASSWORD PASSED.
  Changes in 8.0.12
    * Bug#28208000, MASTER : HANG IN ASYNCHRONOUS SELECT TEST.
    * WL#10544, Update MySQL 8.0 keywords list.
    * WL#11858, DevAPI: Core API v1 alignment.
    * Bug#27652379, NPE FROM GETSESSION(PROPERTIES) WHEN HOST PARAMETER IS GIVEN IN SMALL LETTER.
    * BUG#87600 (26724154), CONNECTOR THROWS 'MALFORMED DATABASE URL' ON NON MYSQL CONNECTION-URLS.
    * BUG#26089880, GETCONNECTION('MYSQLX://..') RETURNS NON-X PROTOCOL CONNECTION.
    * WL#11876, Improve connection properties design.
    * WL#11933, Connector/J 8.0 X DevAPI reference documentation update.
    * WL#11860, Ensure &gt;= 75% code coverage.
    * Bug#90753 (27977617), WAIT_TIMEOUT EXCEEDED MESSAGE NOT TRIGGERED.
    * Bug#85941 (25924324), WASNULL NOT SET AFTER GETBYTES IS CALLED.
    * Bug#28066709, COLLECTION.CREATEINDEX() TEST IS BROKEN AFTER WL#11808 IMPLEMENTATION.
    * Bug#90872 (28027459), FILTERPARAMS CLASS IS NOT NEEDED.
    * Bug#27522054, POSSIBLE ASYNC XPROTOCOL MESSAGE HANDLING PERF ISSUE.
      The 'xdevapi.useAsyncProtocol' connection property default value is changed to 'false'.
  Changes in 8.0.11
    * WL#11293, DevAPI: Support new locking modes : NOWAIT and SKIP LOCKED.
    * Bug#90029 (27678308), FAILURE WHEN GETTING GEOMCOLLECTION COLUMN TYPE.
    * BUG#90024 (27677574), SOME TESTS FAILED AGAINST MYSQL 8.0.5 BECAUSE OF DEPRECATED FEATURES REMOVAL.
    * Bug#86741 (26314325), Multi-Host connection with autocommit=0 getAutoCommit maybe wrong.
    * Bug#27231383, PROVIDE MAVEN-FRIENDLY COMMERCIAL PACKAGES WITHOUT '-BIN'.
    * Bug#26819691, SETTING PACKETDEBUGBUFFERSIZE=0 RESULTS IN CONNECTION FAILURE.
    * Bug#88227 (27029657), Connector/J 5.1.44 cannot be used against MySQL 5.7.20 without warnings.
    * Bug#27374581, CONNECTION FAILS WHEN GPL SERVER STARTED WITH TLS-VERSION=TLSV1.2.
    * WL#11419, DevAPI: New document _id generation support.
    * WL#11620, Change caching_sha2_password padding.
    * WL#11604, DevAPI: Add SHA256_MEMORY support.
    * BUG#86278 (26092824), SUPPORT CUSTOM CONSTRUCTION OF SSLSOCKET DURING CONNECTION ESTABLISHMENT.
    * BUG#27226293, JSONNUMBER.GETINTEGER() &amp; NUMBERFORMATEXCEPTION.
    * WL#10527, Clean up Protocol and Session interfaces.
  Changes in 8.0.9
    * WL#11469, Update license header in GPL packages.
    * BUG#27247349, WL#11208 : UNIQUE DOES NOT GIVE ERROR EVEN THOUGH IT IS NOT SUPPORTED.
    * WL#11208, DevAPI: Collection.createIndex.
    * WL#10156, Add setters/getters for connection properties to MysqlDataSource,
      MysqlXADataSource and MysqlConnectionPoolDataSource.
    * WL#11401, DevAPI: Remove configuration API.
    * WL#10619, Ensure compatibility with new data dictionary.
    * BUG#27217264, WL#10937: NULL POINTER EXCEPTION WHEN NULL IS PASSED AS _ID IN COLL.REPLACEONE.
    * WL#10937, DevAPI: ReplaceOne, AddOrReplaceOne, GetOne, RemoveOne.
    * Bug#26723646, JSON_MERGE() FUNCTION IS DEPRECATED IN MYSQL 8.0.
    * Bug#27185332, WL#11210:ERROR IS THROWN WHEN NESTED EMPTY DOCUMENTS ARE INSERTED TO COLLECTION.
    * Bug#27151601, WL#11210: DOCUMENT PATCH EXPRESSIONS ARE NOT SUPPORTED.
    * WL#11210, DevAPI: Modify/MergePatch.
    * Bug#79612 (22362474), CONNECTION ATTRIBUTES LOST WHEN CONNECTING WITHOUT DEFAULT DATABASE.
    * WL#10152, Enable TLSv1.2 on mysqlx.
    * Bug#27131768, NULL POINTER EXCEPTION IN CONNECTION.
    * Bug#88232 (27047676), c/J does not rollback transaction when autoReconnect=true.
    * Bug#88242 (27040063), autoReconnect and socketTimeout JDBC option makes wrong order of client packet.
    * Bug#88021 (26939943), High GC pressure when driver configured with serversideprepared statements.
    * Bug#26724085, CHARSET MAPPING TO BE UPDATED FOR MYSQL 8.0.3.
    * Bug#87704 (26771560), THE STREAM GETS THE RESULT SET ?THE DRIVER SIDE GET WRONG ABOUT GETLONG().
    * Bug#24924097, SERVER GREETING ERROR ISN'T RECOGNIZED DURING HANDSHAKE.
    * Bug#26748909, MASTER : ERROR - NO OPERATIONS ALLOWED AFTER STATEMENT CLOSED FOR TOSTRING().
    * Bug#26266731, CONCUR_UPDATABLE RESULTSET OPERATIONS FAIL AGAINST 8.0 FOR BOOLEAN COLUMN.
    * WL#11239, DevAPI: Remove create table implementation.
    * Bug#27131100, WL#11212 : SAVEPOINT CREATING WITH EMPTY STRING AND SPACE AS NAME.
    * WL#11212, DevAPI: transaction save-points.
    * WL#11060, Support new SHA-256 authentication system.
    * Bug#87826 (26846249), MYSQL JDBC CONNECTOR/J DATABASEMETADATA NULL PATTERN HANDLING IS NON-COMPLIANT.
    * WL#11163, Extract parameter setters, serverPrepare() and serverExecute() to core classes.
    * BUG#26995710, WL#11161 : NULL POINTER EXCEPTION IN EXECUTEBATCH() AND CLOSE().
    * WL#11161, Unify query bindings.
    * WL#8469, Don't extract query text from packets when possible.
  Changes in 8.0.8
    * BUG#26722030, TEST FAILING DUE TO BINARY LOGGING ENABLED BY DEFAULT IN MYSQL 8.0.3.
    * BUG#26722018, TESTS FAILING DUE TO CHANGE IN INFORMATION_SCHEMA.INNODB_SYS_* NAMING.
    * BUG#26750807, MASTER : NULL POINTER EXCEPTION IN SCHEMA.DROPVIEW(NULL).
    * BUG#26750705, MASTER : ERROR - UNSUPPORTED CONVERSION FROM TIME TO JAVA.SQL.DATE.
    * WL#10620, DevAPI: SHA256 Authentication support.
    * WL#10936, DevAPI: Row locking for Crud.Find.
    * WL#9868, DevAPI: Configuration handling interface.
    * WL#10935, DevAPI: Array or Object 'contains' operator.
    * WL#9875, Prepare c/J 8.0 for DEB and RPM builds.
    * BUG#26259384, CALLABLE STATEMENT GIVES ERROR IN C/JAVA WHEN RUN AGAINST MYSQL 8.0.
    * Bug#26393132, NULLPOINTEREXCEPTION IS THROWN WHEN TRIED TO DROP A NULL COLLECTION.
    * WL#10532, DevAPI: Cleanup Drop APIs.
    * Bug#87429 (26633984), repeated close of ServerPreparedStatement causes memory leak.
    * Bug#87379 (26646676), Perform actual TLS capabilities check when restricting TLSv1.2.
    * Bug#85601 (25777822), Unit notation is missing in the description of the property involved in the time.
    * Bug#87153 (26501245), INCORRECT RESULT OF DBMD.GETVERSIONCOLUMNS() AGAINST MYSQL 8.0.2+.
    * Bug#78313 (21931572), proxies not handling Object.equals(Object) calls correctly.
    * Bug#85885 (25874048), resultSetConcurrency and resultSetType are swapped in call to prepareStatement.
    * Bug#74932 (20066806), ConnectionImp Doesn't Close Server Prepared Statement (PreparedStatement Leak).
    * WL#10536, Deprecating COM_SHUTDOWN.
    * Bug#25946965, UPDATE THE TIME ZONE MAPPINGS WITH LATEST TZ DATABASES.
    * Bug#20182108, INCLUDE CUSTOM LOAD BALANCING STRATEGY USING PLUGIN API.
    * Bug#26440544, CONNECTOR/J SHOULD NOT USE TX_{READ_ONLY,ISOLATION} WHICH IS PLANNED FOR REMOVAL.
    * Bug#26399958, UNABLE TO CONNECT TO MYSQL 8.0.3.
    * Bug#25650305, GETDATE(),GETTIME() AND GETTIMESTAMP() CALL WITH NULL CALENDAR RETURNS NPE.
  Changes in 8.0.7
    * Bug#26227653, WL#10528 DIFF BEHAVIOUR WHEN SYSTEM PROP JAVAX.NET.SSL.TRUSTSTORETYPE IS SET.
    * WL#10528, DevAPI: Ensure all connectors are secure by default.
    * WL#8305, Remove internal dependency on connection objects.
    * Bug#22972057, X DEVAPI: CLIENT HANGS AFTER CONNECTION FAILURE.
    * Bug#26140577, GIS TESTS ARE FAILING WITH MYSQL 8.0.1.
    * WL#10765, DevAPI: Forbid modify() and remove() with no condition.
    * Bug#26090721, CONNECTION FAILING WHEN SERVER STARTED WITH COLLATION UTF8MB4_DE_PB_0900_AI_CI.
    * WL#10781, enum-based connection properties.
    * Bug#73775 (19531384), DBMD.getProcedureColumns()/.getFunctionColumns() fail to filter by columnPattern.
    * Bug#84324 (25321524), CallableStatement.extractProcedureName() not work when catalog name with dash.
    * Bug#79561 (22333996), NullPointerException when calling a fully qualified stored procedure.
    * Bug#84783 (25490163), query timeout is not working(thread hang).
    * Bug#70704 (17653733), Deadlock using UpdatableResultSet.
    * Bug#66430 (16714868), setCatalog on connection leaves ServerPreparedStatement cache for old catalog.
    * Bug#70808 (17757070), Set sessionVariables in a single query.
    * Bug#77192 (21170603), Description for the Property replicationConnetionGroup Missing from the Manual.
    * Bug#83834 (25101890), Typo in Connector/J error message.
    * WL#10531, Support utf8mb4 as default charset.
    * Bug#85555 (25757019), useConfigs Can't find configuration template named, in mysql-connector-java 6.x
    * WL#10529, Move version number to 8.0.
    * WL#10530, DevAPI: Remove XSession, rename NodeSession to Session.
    * Bug#23510958, CONCURRENT ASYNC OPERATIONS RESULT IN HANG.
    * Bug#23597281, GETNODESESSION() CALL WITH SSL PARAMETERS RETURNS CJCOMMUNICATIONSEXCEPTION.
    * Bug#25207784, C/J DOESN'T FOLLOW THE FINAL X DEVAPI MY-193 SPECIFICATION.
    * Bug#25494338, ENABLEDSSLCIPHERSUITES PARAMETER NOT WORKING AS EXPECTED WITH X-PLUGIN.
    * Bug#84084 (25215008), JAVA.LANG.ARRAYINDEXOUTOFBOUNDSEXCEPTION ON ATTEMPT TO GET VALUE FROM RESULTSET.
    * WL#10553, Add mapping for Japanese utf8mb4 collation.
    * Bug#25575103, NPE FROM CREATETABLE() WHEN SOME OF THE INPUTS ARE NULL.
    * Bug#25575156, NPE FROM CREATEVIEW() WHEN SOME OF THE INPUTS ARE NULL.
    * Bug#25636947, CONNECTION USING MYSQL CLIENT FAILS IF WE USE THE SSL CERTIFICATES FROM C/J SRC.
    * Bug#25687718, INCORRECT TIME ZONE IDENTIFIER IN STATEMENTREGRESSIONTEST.
    * Bug#25556597, RESULTSETTEST.TESTPADDING UNIT TEST IS FAILING IN 5.1.41 RELEASE PACKAGE.
    * Bug#25517837, CONNECT PERFORMNACE DEGRADED BY 10% IN 5.1.41.
    * Bug#25504578, CONNECT FAILS WHEN CONNECTIONCOLLATION=ISO-8859-13.
    * Bug#25438355, Improper automatic deserialization of binary data.
    * Bug#70785 (17756825), MySQL Connector/J inconsistent init state for autocommit.
    * Bug#66884: Property 'elideSetAutoCommits' temporarily  defaults to 'false' until this bug is fixed.
    * Bug#75615 (21181249), Incorrect implementation of Connection.setNetworkTimeout().
    * Bug#81706 (23535001), NullPointerException in driver.
    * Bug#83052 (25048543), static method in com.mysql.jdbc.Util relies on null object.
    * Bug#69526 (17035755), 'Abandoned connection cleanup thread' at mysql-connector-java-5.1.25.
    * Bug#82826 (24942672), Unneeded version requirement for javax.net.ssl Import-Package on OSGi MANIFEST.MF.
  Changes in 6.0.6
    * Added Core TLS/SSL options for the mysqlx URI scheme.
    * Updated collations map.
    * Bug#24350526, UNEXPECTED BEHAVIOUR OF IS_NUMBER_SIGNED API IN C/JAVA.
    * Bug#82707 (24512766), WRONG MILLI SECOND VALUE RETURNED FROM TIMESTAMP COLUMN.
    * Bug#82005 (23702040), JDBCDATEVALUEFACTORY FAILS TO PARSE SOME DATES.
    * Bug#83725 (25056803), NPE IN XPROTOCOL.GETPLUGINVERSION() WITH MYSQL 5.7.17.
    * Bug#24525461, UPDATABLE RESULTSET FEATURE FAILS WHEN USESERVERPREPSTMTS=TRUE.
    * Bug#24527173, QUERY EXECUTION USING PREPARED STMT FAILS WHEN USECURSORFETCH=TRUE.
    * Bug#82964 (24658016), JSR-310 DATA TYPES CREATED THROUGH JAVA.SQL TYPES.
    * Bug#81202 (23188159), RESULTSETIMPL.GETOBJECT THROWS NULLPOINTEREXCEPTION WHEN FIELD IS NULL.
    * Bug#22931277, COLUMN.GETTYPE() RETURNS ERROR FOR VALID DATATYPES.
    * BUG#24471057, UPDATE FAILS WHEN THE NEW VALUE IS OF TYPE DBDOC WHICH HAS ARRAY IN IT.
    * Bug#81691 (23519211), GETLASTDOCUMENTIDS() DOESN'T REPORT IDS PROVIDED BY USER.
    * Bug#82826 (24942672), Unneeded version requirement for javax.net.ssl Import-Package on OSGi MANIFEST.MF.
  Changes in 6.0.5
    * BUG#82896 (24613062), Unexpected behavior on attempt to connect to JDBC driver with unsupported URL.
    * Added client-side failover during XSession initialization for multi-router configuration.
    * Removed Extension interface. All extension classes now implement their specific interfaces.
    * Bug#22988922, GETLENGTH() RETURNS -1 FOR LONGBLOB AND LONGTEXT FIELDS.
    * Bug#24619829, NEW FAILURES IN C/JAVA UNITTESTS AGAINST MYSQL 8.0.
    * Bug#75209 (20212882), Set useLocalTransactionState may result in partially committed transaction.
    * Bug#48346 (11756431), Communications link failure when reading compressed data with compressed=true.
    * Bug#80631 (22891845), ResultSet.getString return garbled result with json type data.
    * Bug#64188 (13702433), MysqlXAConnection.MYSQL_ERROR_CODES_TO_XA_ERROR_CODES is missing XA error codes.
    * Bug#72632 (18759269), NullPointerException for invalid JDBC URL.
    * Bug#82115 (23743956), Some exceptions are intercepted twice or fail to set the init cause.
    * Bug#78685 (21938551), Wrong results when retrieving the value of a BIT column as an integer.
    * Bug#80615 (22954007), prepared statement leak when rewriteBatchedStatements=true and useServerPrepStmt.
    * Extended X DevAPI with flexible parameter lists.
    * Added a virtual NodeSession to X DevAPI. 
  Changes in 6.0.4
    * X DevAPI URL prefix changed from 'mysql:x:' to 'mysqlx:'.
    * Bug#24301468 X DEVAPI SSL CONNECTION FAILS ON WINDOWS
    * The X DevAPI Table object now represents both database tables and views.
    * Added support for matching against pattern for X DevAPI list_objects calls.
    * Added Schema.getCollections(String pattern) and Schema.getTables(String pattern) interface methods.
    * Switched to 'mysqlx' namespace for X DevAPI StmtExecute messages.
      This change is incompatible to MySQL server versions &lt; 5.7.14.
    * Bug#82046 (23743947), MYSQL CONNECTOR JAVA OSGI METADATA BROKEN.
    * Bug#21690043, CONNECT FAILS WHEN PASSWORD IS BLANK.
    * Bug#22931433, GETTING VALUE OF BIT COLUMN RESULTS IN EXCEPTION.
  Changes in 6.0.3
    * Bug#23535571, EXCESSIVE MEMORY USAGE WHEN ENABLEPACKETDEBUG=TRUE.
    * Bug#23212347, ALL API CALLS ON RESULTSET METADATA RESULTS IN NPE WHEN USESERVERPREPSTMTS=TRUE.
    * Bug#23201930, CLIENT HANG WHEN RSLT CUNCURRENCY=CONCUR_UPDATABLE AND RSLTSET TYPE=FORWARD_ONLY.
    * Bug#23188498, CLIENT HANG WHILE USING SERVERPREPSTMT WHEN PROFILESQL=TRUE AND USEIS=TRUE.
    * Bug#22678872, NPE DURING UPDATE WITH FABRIC.
    * Bug#71131 (18068303), Poor error message in CallableStatement.java.
    * Bug#59462 (16736619), ConcurrentModificationException inside ConnectionImpl.closeAllOpenStatements().
    * Bug#22848249, LOADBALANCECONNECTIONGROUPMANAGER.REMOVEHOST() NOT WORKING AS EXPECTED.
    * Bug#22730682, ARRAYINDEXOUTOFBOUNDSEXCEPTION FROM CONNECTIONGROUPMANAGER.REMOVEHOST().
    * Bug#77171 (21181466), On every connect getting sql_mode from server creates unnecessary exception.
    * Bug#79343 (22353759), NPE in TimeUtil.loadTimeZoneMappings causing server time zone value unrecognized.
    * Bug#22038729, X DevAPI: Any API call after a failed CALL PROC() results in hang
    * Replace Schema.drop(), Collection.drop() by X DevAPI's session.dropSchema() and session.dropCollection().
    * Added session.dropTable().
    * Bug#22932078, GETTIMESTAMP() RETURNS WRONG VALUE FOR FRACTIONAL PART
    * Extracted packet readers from MysqlaProtocol.
    * Bug#22972057, X protocol CLIENT HANGS AFTER CONNECTION FAILURE
    * Bug#23044312, NullPointerException in X protocol AsyncMessageReader due to race condition
    * Returned support for MySQL 5.5 and 5.6.
  Changes in 6.0.2
    * Deprecate the EOF packet.
    * Bug#75956, Inserting timestamps using a server PreparedStatement and useLegacyDatetimeCode=false
    * Bug#22385172, CONNECTOR/J MANIFEST DOES NOT EXPOSE FABRIC (OSGi).
    * Bug#22598938, FABRICMYSQLDATASOURCE.GETCONNECTION() NPE AFTER SWITCHOVER.
    * Bug#21286268, CONNECTOR/J REPLICATION USE MASTER IF SLAVE IS UNAVAILABLE.
    * Bug#21296840 &amp; Bug#17910835, Server information in a group from Fabric is not refreshed after expired TTL.
    * Bug#56122 (11763419), JDBC4 functionality failure when using replication connections.
    * Added support for TLSv1.1 and TLSv1.2
    * Bug#78961 (22096981), Can't call MySQL procedure with InOut parameters in Fabric environment.
    * Bug#56100 (11763401), Replication driver routes DML statements to read-only slaves.
    * StandardSSLSocketFactory implements SocketMetadata.
    * Bug#21978216, GETTYPEINFO REPORT MAXIMUM PRECISION OF 255 FOR VARBINARY.
    * Bug#78706 (21947042), Prefer TLS where supported by MySQL Server.
    * Bug#21934573, FABRIC CODE INVOLVED IN THREAD DEADLOCK.
    * Bug#21876798, CONNECTOR/J WITH MYSQL FABRIC AND SPRING PRODUCES PROXY ERROR.
  Changes in 6.0.1
    * Removed useJvmCharsetConverters connection property. JVM charset converters are now used in all cases.
    * Refactored value decoding and removed all date/time connection properties
    * Refactored connection properties
    * Assume existence of INFORMATION_SCHEMA.PARAMETERS (and thus MySQL 5.5) when preparing stored procedure calls.
    * Removed retainStatementAfterResultSetClose connection property.
    * Null-merge of Bug#54095 (11761585) fix.
    * Removed support code for MySQL server versions &lt; 5.7.
    * Bug#76859 (20969312), DBMD getColumns using I_S doesn't have column IS_GENERATEDCOLUMN as per JDBC 4.1.
    * Added support for GENERATED COLUMNS.
    * Update Time Zone mappings with IANA Time Zone database tsdata2015f and Unicode CLDR v.28.
    * Update DatabaseMetaData SQL keywords.
    * Added tests for Optimizer hints syntax introduced in MySQL 5.7.7.
    * Bug#21860833, JSON DATA TYPE DOESN'T WORK WITH SSPS.
    * Added support for JSON data type.
    * Added support for JDBC 4.2 new features.
    * Bug#16634180, LOCK WAIT TIMEOUT EXCEEDED CAUSES SQLEXCEPTION, SHOULD CAUSE SQLTRANSIENTEXCEPTION
    * Bug#75849 (20536592), NPE in abortInternal() method on line 1358 of ConnectionImpl.
    * Bug#78106 (21648826), Potential memory leak with inflater.
    * Bug#78225 (21697684), DEFAULT NO_AUTO_CREATE_USER SQL_MODE BEHAVIOR BROKE SOME TESTS
    * Bug#77665 (21415165), JDBC fails to connect with MySQL 5.0.
    * Bug#77681 (21429909), rewrite replace sql like insert when rewriteBatchedStatements=true (contribution).
    * Bug#77449 (21304726) Add 'truncateFractionalSeconds=true|false' property (contribution).
    * Bug#50348 (11758179), mysql connector/j 5.1.10 render the wrong value for dateTime column in GMT DB.
    * Bug#75670 (20433047), Connection fails with 'Public Key Retrieval is not allowed' for native auth.
    * Bug#76187 (20675539), getTypeInfo report maximum precision of 255 for varchar.
    * Add test for new syntax 'ALTER TABLE ... DISCARD|IMPORT PARTITION ...' introduced in MySQL 5.7.4.
    * Bug#20727196, GETPROCEDURECOLUMNS() RETURNS EXCEPTION FOR FUNCTION WHICH RETURNS ENUM/SET TYPE.
    * Bug#19803348, GETPROCEDURES() RETURNS INCORRECT OUTPUT WHEN USEINFORMATIONSCHEMA=FALSE.
    * Bug#21215151, DATABASEMETADATA.GETCATALOGS() FAILS TO SORT RESULTS.
    * Bug#72630 (18758686), NullPointerException during handshake in some situations
    * Bug#20825727, CONNECT FAILURE WHEN TRY TO CONNECT SHA USER WITH DIFFERENT CHARSET.
    * Flag RowDataDynamic.isInterrupted removed as it isn't needed.
    * Bug#20518653, XSL FILES IN PACKAGES
    * Bug#20804635, GETTIME() AND GETDATE() FUNCTIONS FAILS WHEN FRACTIONAL PART EXISTS
    * Bug#62452 (16444069), NPE thrown in JDBC4MySQLPooledException when statement is closed.
    * BUG#70927 (17810800), Connector/J COM_CHANGE_USER handling is broken
    * Bug#75335 (20283655), Maven artifact for Connector/J is missing source jar.
    * BUG#75592 (20408891), 'SHOW VARIABLES WHERE' is expensive.
    * Bug#75113 (20821888), Fail in failover of the connection in MySQL fabric
    * Bug#72077 (18425861), Fabric connection with username to a server with disabled auth throws NPE
    * Add test for already fixed Bug#72546 (18719760), C/J Fabric createGroup() throws ClassCastException
    * Bug#77217 (21184949), ClassCastException when executing a streaming PreparedStatement with Fabric
    * Bug#19536760, GETSTRING() CALL AFTER RS.RELATIVE() RETURNS NULLPOINTEREXCEPTION
    * BUG#20453712, CLOB.SETSTRING() WITH VALID INPUT RETURNS EXCEPTION
    * BUG#20453671, CLOB.POSITION() API CALL WITH CLOB INPUT RETURNS EXCEPTION
    * Bug#20685022, SSL CONNECTION TO MYSQL 5.7.6 COMMUNITY SERVER FAILS.
    * Bug#20606107, TEST FAILURES WHEN RUNNING AGAINST 5.7.6 SERVER VERSION
    * Bug#20533907, BUG#20204783 FIX EXPOSES WRONG BEAHAVIORS IN FAILOVER CONNECTIONS.
    * Bug#20504139, GETFUNCTIONCOLUMNS() AND GETPROCEDURECOLUMNS() RETURNS ERROR FOR VALID INPUTS.
    * Expose PreparedStatment.ParseInfo for external usage, with no capture of the connection
    * Bug#75309 (20272931), mysql connector/J driver in streaming mode will in the blocking state.
    * New property 'readOnlyPropagatesToServer' controls the implicit propagation of read only transaction access mode to server.
    * Bug#54095 (11761585), Unnecessary call in newSetTimestampInternal.
    * Bug#67760 (15936413), Deadlock when concurrently executing prepared statements with Timestamp objects.
    * Bug#71084 (18028319), Wrong java.sql.Date stored if client and server time zones differ.
    * Bug#75080 (20217686), NullPointerException during setTimestamp on Fabric connection.
    * Bug#75168 (20204783), loadBalanceExceptionChecker interface cannot work using JDBC4/JDK7.
    * Bug#73595 (19465516), Replace usage of StringBuffer in JDBC driver.
    * Bug#18925727, SQL INJECTION IN MYSQL JDBC DRIVER.
    * Bug#74998 (20112694), readRemainingMultiPackets not computed correctly for rows larger than 16 MB.
    * Bug#73012 (19219158), Precedence between timezone options is unclear.
    * Implement support for connecting through SOCKS proxies (WL#8105).
    * Ant buildfile reworked to fix incompatibilities with latest Eclipse
    * Bug#18474141, TESTSUITE.FABRIC TEST CASES FAIL IF NO FABRIC.TESTSUITE PROPERTIES PROVIDED
    * Bug#19383371, CONNECT USING MYSQL_OLD_PASSWORD USER FAILS WHEN PWD IS BLANK
    * Bug#17441747, C/J DOESN'T SUPPORT XA RECOVER OUTPUT FORMAT CHANGED IN MYSQL 5.7.
    * Bug#19145408, Error messages may not be interpreted according to the proper character set
    * Bug#19505524, UNIT TEST SUITE DOES NOT CONSIDER ALL THE PARAMETERS PASSED TO BUILD.XML.
    * Bug#73474 (19365473), Invalid empty line in MANIFEST.MF
    * Bug#70436 (17527948), Incorrect mapping of windows timezone to Olson timezone.
    * Bug73163 (19171665), IndexOutOfBoundsException thrown preparing statement.
    * Added support for gb18030 character set
    * Bug#73663 (19479242), utf8mb4 does not work for connector/j &gt;=5.1.13
    * Bug#73594 (19450418), ClassCastException in MysqlXADataSource if pinGlobalTxToPhysicalConnection=true
    * Bug#19354014, changeUser() call results in 'packets out of order' error when useCompression=true.
    * Bug#73577 (19443777), CHANGEUSER() CALL WITH USECOMPRESSION=TRUE COULD LEAD TO IO FREEZE
    * Bug#19172037, TEST FAILURES WHEN RUNNING AGAINST 5.6.20 SERVER VERSION
    * Bug#71923 (18344403), Incorrect generated keys if ON DUPLICATE KEY UPDATE not exact.
    * Bug#72502 (18691866), NullPointerException in isInterfaceJdbc() when using DynaTrace
    * Bug#72890 (18970520), Java jdbc driver returns incorrect return code when it's part of XA transaction.
    * Fabric client now supports Fabric 1.5. Older versions are no longer supported.
    * Bug#71672 (18232840), Every SQL statement is checked if it contains 'ON DUPLICATE KEY UPDATE' or not.
    * Bug#73070 (19034681), Preparing a stored procedure call with Fabric results in an exception
    * Bug#73053 (19022745), Endless loop in MysqlIO.clearInputStream due to Linux kernel bug.
    * Bug#18869381, CHANGEUSER() FOR SHA USER RESULTS IN NULLPOINTEREXCEPTION
    * Bug#62577 (16722757), XA connection fails with ClassCastException
    * Bug#18852587, CONNECT WITH A USER CREATED USING SHA256_PASSWORD PLUGIN FAILS WHEN PWD IS BLANK
    * Bug#18852682, TEST TESTSHA256PASSWORDPLUGIN FAILS WHEN EXECUTE AGAINST COMMERCIAL SERVER
    * failing tests when running test suite with Java 6+.
    * Bug#72712 (18836319), No way to configure Connector JDBC to not do extra queries on connection
- Adjust log4j/log4j-mini dependencies to account for the lack of
  log4j12/log4jmini12 Provides in some code streams.

Changes in javapackages-tools:
- Can't assume non-existence of python38 macros in Leap.
  gh#openSUSE/python-rpm-macros#107
  Test for suse_version instead. Only Tumbleweed has and needs the
  python_subpackage_only support.

- Fix typo in spec file sitearch -&gt; sitelib

- Fix the python subpackage generation
  gh#openSUSE/python-rpm-macros#79

- Support python subpackages for each flavor
  gh#openSUSE/python-rpm-macros#66
- Replace old nose with pytest gh#fedora-java/javapackages#86

- when building extra flavor, BuildRequire javapackages-filesystem:
  /etc/java is being cleaned out of the filesystems package.

- Upgrade to version 5.3.1
- Define _rpmmacrodir for distributions that don't have it

- Use %{_rpmmacrodir} instead of %{_libexecdir}/rpm/macros.d: this
  just happens to overlap in some distros.

- Rename gradle-local and ivy-local to javapackages-gradle and
  javapackages-ivy and let them depend only on javapackages-tools
  and javapackages-local. These packages only install files
  produced during the javapackages-tools build. The dependencies
  will be pulled by gradle-local, ivy-local and maven-local
  meta-packages built in a separate spec file.

- Split maven-local meta-package out of javapackages-tools spec
  file

- Make the ivy-local and maven-local sub-packages depend on the
  right stuff, so that they actually can be used for building

- Provide both com.sun:tools and sun.jdk:jconsole that are part of
  standard OpenJDK installation. These provides cannot be generated
  from metadata due to build sequence.

  + fix directories for eclipse.conf too

- Make the javapackages-local package depend on java-devel. It is
  used for package building and this avoids each package to require
  java-devel itself.

- Replace the occurences of /usr/lib by libdir in configuration
  files too

- Update to version 5.3.0
- Modified patch:
- Build the :extras flavour as noarch
    + we did not bump epoch of OpenJDK packages in SUSE
    + fix a potential generation of unresolvable requires
    + adapt the tests to not expect the epoch

- Switch to multibuild layout

- Update to version 5.2.0+git20180620.70fa2258:
  * Rename the async kwarg in call_script to wait (reverses the logic)
  * Actually bump version to 5.3.0 snapshot
  * Bump version in VERSION file
  * [man] s/Pacakge/Package/g
  * Fix typos in README
  * Fix configure-base.sh after filesystem macro split
  * Split filesystem macros to separate macro file
  * Introduce javapackages-filesystem package
  * [java-functions] extend ABRT Java agent options
  * change abrt-java-connector upstream URL
  * Remove resolverSettings/prefixes from XMvn config
  * Add macros to allow passing arbitrary options to XMvn
  * [spec] Bump package version to 5.1.0
  * Allow specifying custom repo when calling xmvn-install

- Update to version 5.0.0+git20180104.9367c8f6:
  * [java-functions] Avoid colons in jar names
  * Workaround for SCL enable scripts not working with -e
  * Second argument to pom_xpath_inject is mandatory
  * [mvn_artifact] Provide more helpful error messages
  * Fix traceback on corrupt zipfile
  * [test] Add reproducer for rhbz#1481005
  * [spec] Fix default JRE path
  * [readme] Fix typo
  * Add initial content to README.md (#21)
  * Decouple JAVA_HOME setting from java command alternatives

- Fix url to correct one https://github.com/fedora-java/javapackages

- Split to python and non-python edition for smaller depgraph
- Fix abs2rel shebang:
- Fix Requires on subpackages to point to javapackages-tools proper

- Update to version 4.7.0+git20170331.ef4057e7:
  * Reimplement abs2rel in Python
  * Don't expand {scl} in macro definitions
  * Install expanded rpmfc attr files
  * [spec] Avoid file conflicts between in SCL
  * Fix macros.d directory ownership
  * Make %ant macro enable SCL when needed
  * [spec] Fix file conflicts between SCL and non-SCL packages
  * Fix ownership of ivyxmldir
  * [test] Force locale for python processes
  * Don't include timestamp in generated pom.properties
  * We switch to /usr/lib/ location for macros
- Try to reduce some dependencies bsc#1036025

- python-lxml 3.5.0 introduces validation for xml comments, and 
  one of the comments created in this package were not valid.
  This patch fixes the problem.  It backported from upstream and
  should be in the next release.
  https://github.com/mizdebsk/javapackages/commit/84211c0ee761e93ee507f5d37e9fc80ec377e89d

- Version update to 4.6.0:
  * various bugfixes for maven tooling
  * introduction to gradle-local package for gradle packaging

- Drop dependency over source-highlight as it causes build cycle

- Try to break buildcycle detected on Factory

- Fix build on SLE11

- Use python-devel instead of pkgconfig to build on sle11

- Add python-javapackages as requirement for main package

- Update requires on python packages to properly have all the needed
  dependencies on runtime

- Install macros to /etc/rpm as we do in SUSE:
- Cleanup with spec-cleaner

- Fix rpmlint errors
- Enable maven-local
- Avoid unsatisfiable dependencies
- Enable unit tests
- Update to version 4.4.0

- create directories for java, so that ant build works
- Add virtual provide jpackage-utils-java9 to be able to
  distinguish the presence of java9 compatibility

- fix bashisms

- SLES patch for ZipFile, having no attribute '__exit__' which was causing 
  ecj build failures

- set correct libxslt package when building for SLES

Changes in javassist:
    + Add OSGi manifest to the javassist.jar
    - Allow building on systems that do not have java 9 or higher

- Install and package the maven pom and metadata files

- BuildRequire at least Java 9. This version uses APIs introduced
  in Java 9

- Replace old $RPM_* shell vars by macros.

- Version update to 3.23.1:
  * 3.23.1 Github PR #171
  * 3.23   Fix leaking file handlers in ClassPool and removed
           ClassPath.close(). Github issue #165
  * 3.22   Java 9 supports.
           JIRA JASSIST-261.

- Specify java target and source version 1.6 in order to allow
  building with jdk9
    - fix javadoc errors that are fatal with jdk9

- Version update to 3.21.0:
  * various compiler settings
  * Require java &gt;= 1.6

- Update to version 3.19.0
  * Including a number of bug fixes and Java 8 supports.
- Clean up specfile
- Remove redundant %clean section
- Build for java API 1.5
- Remove unzip requirement
- Update home page and download source Urls

Changes in protobuf:
- Update to 3.17.3:
  C++
  * Introduce FieldAccessListener.
  * Stop emitting boilerplate {Copy/Merge}From in each ProtoBuf class
  * Provide stable versions of SortAndUnique().
  * Make sure to cache proto3 optional message fields when they are cleared.
  * Expose UnsafeArena methods to Reflection.
  * Use std::string::empty() rather than std::string::size() &gt; 0.
  * [Protoc] C++ Resolved an issue where NO_DESTROY and CONSTINIT are in incorrect order (#8296)
  * Fix PROTOBUF_CONSTINIT macro redefinition (#8323)
  * Delete StringPiecePod (#8353)
  * Create a CMake option to control whether or not RTTI is enabled (#8347)
  * Make util::Status more similar to absl::Status (#8405)
  * The ::pb namespace is no longer exposed due to conflicts.
  * Allow MessageDifferencer::TreatAsSet() (and friends) to override previous
  calls instead of crashing.
  * Reduce the size of generated proto headers for protos with string or
  bytes fields.
  * Move arena() operation on uncommon path to out-of-line routine
  * For iterator-pair function parameter types, take both iterators by value.
  * Code-space savings and perhaps some modest performance improvements in
  * RepeatedPtrField.
  * Eliminate nullptr check from every tag parse.
  * Remove unused _$name$cached_byte_size fields.
  * Serialize extension ranges together when not broken by a proto field in the
  middle.
  * Do out-of-line allocation and deallocation of string object in ArenaString.
  * Streamline ParseContext::ParseMessage to avoid code bloat and improve
  performance.
  * New member functions RepeatedField::Assign, RepeatedPtrField::{Add, Assign}.
  on an error path.
  * util::DefaultFieldComparator will be final in a future version of protobuf.
  * Subclasses should inherit from SimpleFieldComparator instead.
  Kotlin
  * Introduce support for Kotlin protos (#8272)
  * Restrict extension setter and getter operators to non-nullable T.
  Java
  * Fixed parser to check that we are at a proper limit when a sub-message has
  finished parsing.
  * updating GSON and Guava to more recent versions (#8524)
  * Reduce the time spent evaluating isExtensionNumber by storing the extension
  ranges in a TreeMap for faster queries. This is particularly relevant for
  protos which define a large number of extension ranges, for example when
  each tag is defined as an extension.
  * Fix java bytecode estimation logic for optional fields.
  * Optimize Descriptor.isExtensionNumber.
  * deps: update JUnit and Truth (#8319)
  * Detect invalid overflow of byteLimit and return InvalidProtocolBufferException as documented.
  * Exceptions thrown while reading from an InputStream in parseFrom are now
  included as causes.
  * Support potentially more efficient proto parsing from RopeByteStrings.
  * Clarify runtime of ByteString.Output.toStringBuffer().
  * Added UnsafeByteOperations to protobuf-lite (#8426)
  Python
  * Add MethodDescriptor.CopyToProto() (#8327)
  * Remove unused python_protobuf.{cc,h} (#8513)
  * Start publishing python aarch64 manylinux wheels normally (#8530)
  * Fix constness issue detected by MSVC standard conforming mode (#8568)
  * Make JSON parsing match C++ and Java when multiple fields from the same
  oneof are present and all but one is null.
  * Fix some constness / char literal issues being found by MSVC standard conforming mode (#8344)
  * Switch on 'new' buffer API (#8339)
  * Enable crosscompiling aarch64 python wheels under dockcross manylinux docker image (#8280)
  * Fixed a bug in text format where a trailing colon was printed for repeated field.
  * When TextFormat encounters a duplicate message map key, replace the current
  one instead of merging.
  Ruby
  * Add support for proto3 json_name in compiler and field definitions (#8356)
  * Fixed memory leak of Ruby arena objects. (#8461)
  * Fix source gem compilation (#8471)
  * Fix various exceptions in Ruby on 64-bit Windows (#8563)
  * Fix crash when calculating Message hash values on 64-bit Windows (#8565)
  General
  * Support M1 (#8557)

- Update to 3.15.8:
  - Fixed memory leak of Ruby arena objects (#8461)

- update to 3.15.7:
  C++
  * Remove the ::pb namespace (alias) (#8423)
  Ruby
  * Fix unbounded memory growth for Ruby &lt;2.7 (#8429)
  * Fixed message equality in cases where the message type is different (#8434)

- Can't assume non-existence of python38 macros in Leap.
  gh#openSUSE/python-rpm-macros#107
  Test for suse_version instead. Only Tumbleweed has and needs the
  python_subpackage_only support.

- update to 3.15.6:
  Ruby
  * Fixed bug in string comparison logic (#8386)
  * Fixed quadratic memory use in array append (#8379)
  * Fixed SEGV when users pass nil messages (#8363)
  * Fixed quadratic memory usage when appending to arrays (#8364)
  * Ruby &lt;2.7 now uses WeakMap too, which prevents memory leaks. (#8341)
  * Fix for FieldDescriptor.get(msg) (#8330)
  * Bugfix for Message.[] for repeated or map fields (#8313)
  PHP
  * read_property() handler is not supposed to return NULL (#8362)
  Protocol Compiler
  * Optional fields for proto3 are enabled by default, and no longer require
    the --experimental_allow_proto3_optional flag.
  C++
  * Do not disable RTTI by default in the CMake build (#8377)
  * Create a CMake option to control whether or not RTTI is enabled (#8361)
  * Fix PROTOBUF_CONSTINIT macro redefinition (#8323)
  * MessageDifferencer: fixed bug when using custom ignore with multiple
    unknown fields
  * Use init_seg in MSVC to push initialization to an earlier phase.
  * Runtime no longer triggers -Wsign-compare warnings.
  * Fixed -Wtautological-constant-out-of-range-compare warning.
  * DynamicCastToGenerated works for nullptr input for even if RTTI is disabled
  * Arena is refactored and optimized.
  * Clarified/specified that the exact value of Arena::SpaceAllocated() is an
    implementation detail users must not rely on. It should not be used in
    unit tests.
  * Change the signature of Any::PackFrom() to return false on error.
  * Add fast reflection getter API for strings.
  * Constant initialize the global message instances
  * Avoid potential for missed wakeup in UnknownFieldSet
  * Now Proto3 Oneof fields have 'has' methods for checking their presence in
    C++.
  * Bugfix for NVCC
  * Return early in _InternalSerialize for empty maps.
  * Adding functionality for outputting map key values in proto path logging
    output (does not affect comparison logic) and stop printing 'value' in the
    path. The modified print functionality is in the
    MessageDifferencer::StreamReporter.
  * Fixed https://github.com/protocolbuffers/protobuf/issues/8129
  * Ensure that null char symbol, package and file names do not result in a
    crash.
  * Constant initialize the global message instances
  * Pretty print 'max' instead of numeric values in reserved ranges.
  * Removed remaining instances of std::is_pod, which is deprecated in C++20.
  * Changes to reduce code size for unknown field handling by making uncommon
    cases out of line.
  * Fix std::is_pod deprecated in C++20 (#7180)
  * Fix some -Wunused-parameter warnings (#8053)
  * Fix detecting file as directory on zOS issue #8051 (#8052)
  * Don't include sys/param.h for _BYTE_ORDER (#8106)
  * remove CMAKE_THREAD_LIBS_INIT from pkgconfig CFLAGS (#8154)
  * Fix TextFormatMapTest.DynamicMessage issue#5136 (#8159)
  * Fix for compiler warning issue#8145 (#8160)
  * fix: support deprecated enums for GCC &lt; 6 (#8164)
  * Fix some warning when compiling with Visual Studio 2019 on x64 target (#8125)
  Python
  * Provided an override for the reverse() method that will reverse the internal
    collection directly instead of using the other methods of the BaseContainer.
  * MessageFactory.CreateProtoype can be overridden to customize class creation.
  * Fix PyUnknownFields memory leak (#7928)
  * Add macOS big sur compatibility (#8126)
  JavaScript
  * Generate `getDescriptor` methods with `*` as their `this` type.
  * Enforce `let/const` for generated messages.
  * js/binary/utils.js: Fix jspb.utils.joinUnsignedDecimalString to work with
    negative bitsLow and low but non-zero bitsHigh parameter. (#8170)
  PHP
  * Added support for PHP 8. (#8105)
  * unregister INI entries and fix invalid read on shutdown (#8042)
  * Fix PhpDoc comments for message accessors to include '|null'. (#8136)
  * fix: convert native PHP floats to single precision (#8187)
  * Fixed PHP to support field numbers &gt;=2**28. (#8235)
  * feat: add support for deprecated fields to PHP compiler (#8223)
  * Protect against stack overflow if the user derives from Message. (#8248)
  * Fixed clone for Message, RepeatedField, and MapField. (#8245)
  * Updated upb to allow nonzero offset minutes in JSON timestamps. (#8258)
  Ruby
  * Added support for Ruby 3. (#8184)
  * Rewrote the data storage layer to be based on upb_msg objects from the
    upb library. This should lead to much better parsing performance,
    particularly for large messages. (#8184).
  * Fill out JRuby support (#7923)
  * [Ruby] Fix: (SIGSEGV) gRPC-Ruby issue on Windows. memory alloc infinite
    recursion/run out of memory (#8195)
  * Fix jruby support to handle messages nested more than 1 level deep (#8194)
  Java
  * Avoid possible UnsupportedOperationException when using CodedInputSteam
    with a direct ByteBuffer.
  * Make Durations.comparator() and Timestamps.comparator() Serializable.
  * Add more detailed error information for dynamic message field type
    validation failure
  * Removed declarations of functions declared in java_names.h from
    java_helpers.h.
  * Now Proto3 Oneof fields have 'has' methods for checking their presence in
    Java.
  * Annotates Java proto generated *_FIELD_NUMBER constants.
  * Add -assumevalues to remove JvmMemoryAccessor on Android.
  C#
  * Fix parsing negative Int32Value that crosses segment boundary (#8035)
  * Change ByteString to use memory and support unsafe create without copy (#7645)
  * Optimize MapField serialization by removing MessageAdapter (#8143)
  * Allow FileDescriptors to be parsed with extension registries (#8220)
  * Optimize writing small strings (#8149)

- Updated URL to https://github.com/protocolbuffers/protobuf
- Update to v3.14.0
  Protocol Compiler
  * The proto compiler no longer requires a .proto filename when it is not
    generating code.
  * Added flag `--deterministic_output` to `protoc --encode=...`.
  * Fixed deadlock when using google.protobuf.Any embedded in aggregate options.
  C++
  * Arenas are now unconditionally enabled. cc_enable_arenas no longer has
    any effect.
  * Removed inlined string support, which is incompatible with arenas.
  * Fix a memory corruption bug in reflection when mixing optional and
    non-optional fields.
  * Make SpaceUsed() calculation more thorough for map fields.
  * Add stack overflow protection for text format with unknown field values.
  * FieldPath::FollowAll() now returns a bool to signal if an out-of-bounds
    error was encountered.
  * Performance improvements for Map.
  * Minor formatting fix when dumping a descriptor to .proto format with
    DebugString.
  * UBSAN fix in RepeatedField
  * When running under ASAN, skip a test that makes huge allocations.
  * Fixed a crash that could happen when creating more than 256 extensions in
    a single message.
  * Fix a crash in BuildFile when passing in invalid descriptor proto.
  * Parser security fix when operating with CodedInputStream.
  * Warn against the use of AllowUnknownExtension.
  * Migrated to C++11 for-range loops instead of index-based loops where
    possible. This fixes a lot of warnings when compiling with -Wsign-compare.
  * Fix segment fault for proto3 optional
  * Adds a CMake option to build `libprotoc` separately
  Java
  * Bugfix in mergeFrom() when a oneof has multiple message fields.
  * Fix RopeByteString.RopeInputStream.read() returning -1 when told to read
    0 bytes when not at EOF.
  * Redefine remove(Object) on primitive repeated field Lists to avoid
    autoboxing.
  * Support '\u' escapes in textformat string literals.
  * Trailing empty spaces are no longer ignored for FieldMask.
  * Fix FieldMaskUtil.subtract to recursively remove mask.
  * Mark enums with `@java.lang.Deprecated` if the proto enum has option
    `deprecated = true;`.
  * Adding forgotten duration.proto to the lite library
  Python
  * Print google.protobuf.NullValue as null instead of 'NULL_VALUE' when it is
    used outside WKT Value/Struct.
  * Fix bug occurring when attempting to deep copy an enum type in python 3.
  * Add a setuptools extension for generating Python protobufs
  * Remove uses of pkg_resources in non-namespace packages
  * [bazel/py] Omit google/__init__.py from the Protobuf runtime
  * Removed the unnecessary setuptools package dependency for Python package
  * Fix PyUnknownFields memory leak
  PHP
  * Added support for '==' to the PHP C extension
  * Added `==` operators for Map and Array
  * Native C well-known types
  * Optimized away hex2bin() call in generated code
  * New version of upb, and a new hash function wyhash in third_party
  * add missing hasOneof method to check presence of oneof fields
  Go:
  * Update go_package options to reference google.golang.org/protobuf module.
  C#:
  * annotate ByteString.CopyFrom(ReadOnlySpan&lt;byte&gt;) as SecuritySafeCritical
  * Fix C# optional field reflection when there are regular fields too
  * Fix parsing negative Int32Value that crosses segment boundary
  Javascript:
  * JS: parse (un)packed fields conditionally
- from version 3.13.0
  PHP:
  * The C extension is completely rewritten. The new C extension has significantly
    better parsing performance and fixes a handful of conformance issues. It will
    also make it easier to add support for more features like proto2 and proto3 presence.
  * The new C extension does not support PHP 5.x. PHP 5.x users can still use pure-PHP.
  C++:
  * Removed deprecated unsafe arena string accessors
  * Enabled heterogeneous lookup for std::string keys in maps.
  * Removed implicit conversion from StringPiece to std::string
  * Fix use-after-destroy bug when the Map is allocated in the arena.
  * Improved the randomness of map ordering
  * Added stack overflow protection for text format with unknown fields
  * Use std::hash for proto maps to help with portability.
  * Added more Windows macros to proto whitelist.
  * Arena constructors for map entry messages are now marked 'explicit'
    (for regular messages they were already explicit).
  * Fix subtle aliasing bug in RepeatedField::Add
  * Fix mismatch between MapEntry ByteSize and Serialize with respect to unset
    fields.
  Python:
  * JSON format conformance fixes:
    * Reject lowercase t for Timestamp json format.
    * Print full_name directly for extensions (no camelCase).
    * Reject boolean values for integer fields.
    * Reject NaN, Infinity, -Infinity that is not quoted.
    * Base64 fixes for bytes fields: accept URL-safe base64 and missing padding.
  * Bugfix for fields/files named 'async' or 'await'.
  * Improved the error message when AttributeError is returned from __getattr__
    in EnumTypeWrapper.
  Java:
  * Fixed a bug where setting optional proto3 enums with setFooValue() would
    not mark the value as present.
  * Add Subtract function to FieldMaskUtil.
  C#:
  * Dropped support for netstandard1.0 (replaced by support for netstandard1.1).
    This was required to modernize the parsing stack to use the `Span&lt;byte&gt;`
    type internally
  * Add `ParseFrom(ReadOnlySequence&lt;byte&gt;)` method to enable GC friendly
    parsing with reduced allocations and buffer copies
  * Add support for serialization directly to a `IBufferWriter&lt;byte&gt;` or
    to a `Span&lt;byte&gt;` to enable GC friendly serialization.
    The new API is available as extension methods on the `IMessage` type
  * Add `GOOGLE_PROTOBUF_REFSTRUCT_COMPATIBILITY_MODE` define to make
    generated code compatible with old C# compilers (pre-roslyn compilers
    from .NET framework and old versions of mono) that do not support
    ref structs. Users that are still on a legacy stack that does
    not support C# 7.2 compiler might need to use the new define
    in their projects to be able to build the newly generated code
  * Due to the major overhaul of parsing and serialization internals,
    it is recommended to regenerate your generated code to achieve the best
    performance (the legacy generated code will still work, but might incur
    a slight performance penalty).

- Fix the python subpackage generation
  gh#openSUSE/python-rpm-macros#79

- Support multiple python3 flavors gh#openSUSE/python-rpm-macros#66

- Update to version 3.12.3; notable changes since 3.11.4:
  Protocol Compiler
  * [experimental] Singular, non-message typed fields in proto3 now support
    presence tracking. This is enabled by adding the 'optional' field label and
    passing the --experimental_allow_proto3_optional flag to protoc.
    * For usage info, see docs/field_presence.md.
    * During this experimental phase, code generators should update to support
      proto3 presence, see docs/implementing_proto3_presence.md for instructions.
  * Allow duplicate symbol names when multiple descriptor sets are passed on
    the command-line, to match the behavior when multiple .proto files are passed.
  * Deterministic `protoc --descriptor_set_out` (#7175)
  Objective-C
  * Tweak the union used for Extensions to support old generated code. #7573
  * Fix for the :protobuf_objc target in the Bazel BUILD file. (#7538)
    if p['result'] == 'FAIL': 
  * [experimental] ObjC Proto3 optional support (#7421)
  * Block subclassing of generated classes (#7124)
  * Use references to Obj C classes instead of names in descriptors. (#7026)
  * Revisit how the WKTs are bundled with ObjC. (#7173)
  C++
  * Simplified the template export macros to fix the build for mingw32. (#7539)
  * [experimental] Added proto3 presence support.
  * New descriptor APIs to support proto3 presence.
  * Enable Arenas by default on all .proto files.
  * Documented that users are not allowed to subclass Message or MessageLite.
  * Mark generated classes as final; inheriting from protos is strongly discouraged.
  * Add stack overflow protection for text format with unknown fields.
  * Add accessors for map key and value FieldDescriptors.
  * Add FieldMaskUtil::FromFieldNumbers().
  * MessageDifferencer: use ParsePartial() on Any fields so the diff does not
    fail when there are missing required fields.
  * ReflectionOps::Merge(): lookup messages in the right factory, if it can.
  * Added Descriptor::WellKnownTypes enum and Descriptor::well_known_type()
    accessor as an easier way of determining if a message is a Well-Known Type.
  * Optimized RepeatedField::Add() when it is used in a loop.
  * Made proto move/swap more efficient.
  * De-virtualize the GetArena() method in MessageLite.
  * Improves performance of json_stream_parser.cc by factor 1000 (#7230)
  * bug: #7076 undefine Windows OUT and OPTIONAL macros (#7087)
  * Fixed a bug in FieldDescriptor::DebugString() that would erroneously print
    an 'optional' label for a field in a oneof.
  * Fix bug in parsing bool extensions that assumed they are always 1 byte.
  * Fix off-by-one error in FieldOptions::ByteSize() when extensions are present.
  * Clarified the comments to show an example of the difference between
    Descriptor::extension and DescriptorPool::FindAllExtensions.
  * Add a compiler option 'code_size' to force optimize_for=code_size on all
    protos where this is possible.
  Ruby
  * Re-add binary gems for Ruby 2.3 and 2.4. These are EOL upstream, however
    many people still use them and dropping support will require more
    coordination.
  * [experimental] Implemented proto3 presence for Ruby. (#7406)
  * Stop building binary gems for ruby &lt;2.5 (#7453)
  * Fix for wrappers with a zero value (#7195)
  * Fix for JSON serialization of 0/empty-valued wrapper types (#7198)
  * Call 'Class#new' over rb_class_new_instance in decoding (#7352)
  * Build extensions for Ruby 2.7 (#7027)
  * assigning 'nil' to submessage should clear the field. (#7397)
  Java
  * [experimental] Added proto3 presence support.
  * Mark java enum _VALUE constants as @Deprecated if the enum field is deprecated
  * reduce &lt;clinit&gt; size for enums with allow_alias set to true.
  * Sort map fields alphabetically by the field's key when printing textproto.
  * Fixed a bug in map sorting that appeared in -rc1 and -rc2 (#7508).
  * TextFormat.merge() handles Any as top level type.
  * Throw a descriptive IllegalArgumentException when calling
    getValueDescriptor() on enum special value UNRECOGNIZED instead of
    ArrayIndexOutOfBoundsException.
  * Fixed an issue with JsonFormat.printer() where setting printingEnumsAsInts()
    would override the configuration passed into includingDefaultValueFields().
  * Implement overrides of indexOf() and contains() on primitive lists returned
    for repeated fields to avoid autoboxing the list contents.
  * Add overload to FieldMaskUtil.fromStringList that accepts a descriptor.
  * [bazel] Move Java runtime/toolchains into //java (#7190)
  Python
  * [experimental] Added proto3 presence support.
  * [experimental] fast import protobuf module, only works with cpp generated code linked in.
  * Truncate 'float' fields to 4 bytes of precision in setters for pure-Python
    implementation (C++ extension was already doing this).
  * Fixed a memory leak in C++ bindings.
  * Added a deprecation warning when code tries to create Descriptor objects
    directly.
  * Fix unintended comparison between bytes and string in descriptor.py.
  * Avoid printing excess digits for float fields in TextFormat.
  * Remove Python 2.5 syntax compatibility from the proto compiler generated _pb2.py module code.
  * Drop 3.3, 3.4 and use single version docker images for all python tests (#7396)
  JavaScript
  * Fix js message pivot selection (#6813)
  PHP
  * Persistent Descriptor Pool (#6899)
  * Implement lazy loading of php class for proto messages (#6911)
  * Correct @return in Any.unpack docblock (#7089)
  * Ignore unknown enum value when ignore_unknown specified (#7455)
  C#
  * [experimental] Add support for proto3 presence fields in C# (#7382)
  * Mark GetOption API as obsolete and expose the 'GetOptions()' method on descriptors instead (#7491)
  * Remove Has/Clear members for C# message fields in proto2 (#7429)
  * Enforce recursion depth checking for unknown fields (#7132)
  * Fix conformance test failures for Google.Protobuf (#6910)
  * Cleanup various bits of Google.Protobuf (#6674)
  * Fix latest ArgumentException for C# extensions (#6938)
  * Remove unnecessary branch from ReadTag (#7289)
  Other
  * Add a proto_lang_toolchain for javalite (#6882)
  * [bazel] Update gtest and deprecate //external:{gtest,gtest_main} (#7237)
  * Add application note for explicit presence tracking. (#7390)
  * Howto doc for implementing proto3 presence in a code generator. (#7407)

- Python: Add requirement on python-six

- Update to version 3.11.4; notable changes since 3.9.2:
  * C++: Make serialization method naming consistent
  * C++: Moved ShutdownProtobufLibrary() to message_lite.h. For
         backward compatibility a declaration is still available
         in stubs/common.h, but users should prefer message_lite.h
  * C++: Removed non-namespace macro EXPECT_OK()
  * C++: Removed mathlimits.h from stubs in favor of using
         std::numeric_limits from C++11
  * C++: Support direct pickling of nested messages
  * C++: Disable extension code gen for C#
  * C++: Switch the proto parser to the faster MOMI parser
  * C++: Unused imports of files defining descriptor extensions
         will now be reported
  * C++: Add proto2::util::RemoveSubranges to remove multiple
         subranges in linear time
  * C++: Support 32 bit values for ProtoStreamObjectWriter to Struct
  * C++: Removed the internal-only header coded_stream_inl.h and
         the internal-only methods defined there
  * C++: Enforced no SWIG wrapping of descriptor_database.h
         (other headers already had this restriction)
  * C++: Implementation of the equivalent of the MOMI parser for
         serialization. This removes one of the two serialization
         routines, by making the fast array serialization routine
         completely general. SerializeToCodedStream can now be
         implemented in terms of the much much faster array
         serialization. The array serialization regresses slightly,
         but when array serialization is not possible this wins big
  * C++: Add move constructor for Reflection's SetString
  * Java: Remove the usage of MethodHandle, so that Android users
          prior to API version 26 can use protobuf-java
  * Java: Publish ProGuard config for javalite
  * Java: Include unknown fields when merging proto3 messages in
          Java lite builders
  * Java: Have oneof enums implement a separate interface (other
          than EnumLite) for clarity
  * Java: Opensource Android Memory Accessors
  * Java: Change ProtobufArrayList to use Object[] instead of
          ArrayList for 5-10% faster parsing
  * Java: Make a copy of JsonFormat.TypeRegistry at the protobuf
          top level package. This will eventually replace
          JsonFormat.TypeRegistry
  * Java: Add Automatic-Module-Name entries to the Manifest
  * Python: Add float_precision option in json format printer
  * Python: Optionally print bytes fields as messages in unknown
            fields, if possible
  * Python: Experimental code gen (fast import protobuf module)
            which only work with cpp generated code linked in
  * Python: Add descriptor methods in descriptor_pool are deprecated
  * Python: Added delitem for Python extension dict
  * JavaScript: Remove guard for Symbol iterator for jspb.Map
  * JavaScript: Remove deprecated boolean option to getResultBase64String()
  * JavaScript: Change the parameter types of binaryReaderFn in
                ExtensionFieldBinaryInfo to (number, ?, ?)
  * JavaScript: Create dates.ts and time_of_days.ts to mirror Java
                versions. This is a near-identical conversion of
                c.g.type.util.{Dates,TimeOfDays} respectively
  * JavaScript: Migrate moneys to TypeScript
  * PHP: Increase php7.4 compatibility
  * PHP: Implement lazy loading of php class for proto messages
  * Ruby: Support hashes for struct initializers
  * C#: Experimental proto2 support is now officially available
  * C#: Change _Extensions property to normal body rather than expression
  * Objective C: Remove OSReadLittle* due to alignment requirements
  * Other: Override CocoaPods module to lowercase
  * further bugfixes and optimisations

- Use tarball provided by upstream
- Small package cleanup

- Updated to version 3.9.2 (bsc#1162343)
   (Objective-C)
  * Remove OSReadLittle* due to alignment requirements. (#6678)
  * Don't use unions and instead use memcpy for the type swaps. (#6672)

- Package also the protobuf-bom pom file

- Update to new upstream release 3.9.1
  * Optimized the implementation of RepeatedPtrFieldBase.
  * Added delimited parse and serialize util.
  * Added FieldDescriptor::PrintableNameForExtension() and
    DescriptorPool::FindExtensionByPrintableName(). The latter
    will replace Reflection::FindKnownExtensionByName().
  * Created a new Add method in repeated field that allows adding
    a range of elements all at once.
  * Drop building wheel for Python 3.4.

- Specify java source and target levels in order to build
  compatible protobuf-java binaries

- Update to new upstream release 3.8.0
  * Introduced new MOMI (maybe-outside-memory-interval) parser.
  * Added use of C++ override keyword where appropriate.
  * Always declare enums to be int-sized.
  * Append '_' to C++ reserved keywords for message, enum, extension.

- Disable LTO (boo#1133277).

- fixes build with Bazel 0.22.0.

- Add protobuf-source package - some programs using gRPC and
  protobuf need protobuf definitions which are included inside the
  source code, but are not included in the devel package.

- Add maven pom files to the protobuf-java package

- update to version v3.6.1:
  * PHP namespaces for nested messages and enums (#4536)
  * Allows the json marshaller to be passed json marshal options (#4252)
  * Make sure to delete temporary maps used by FileDescriptorTables
  * fix python cpp kokoro build
  * Change C# reflection to avoid using expression trees
  * Updated checked-in generated code
  * Removed unused variables in repeated_scalar_container.cc
  * Removed unused code pertaining to shared_ptr
  * Include no_package.proto in Python test
  * Only check filenames when end with .py in _CalledFromGeneratedFile() (#4262)
  * Convert descriptortype to type for upb_msgval_sizeof (#4357)
  * Removed duplicate using statement from ReflectionUtil.cs
  * Add support for power ppc64le
  * Cat the test-suite.log on errors for presubits
  * Address review comments
  * Add third-party RPC implementation: raster - a network framework supports pbrpc by 'service' keyword.
  * Delete javanano kokoro build configs.
  * Updated Ruby conformance test failure list
  * Removed use of some type traits
  * Adopt php_metadata_namespace in php code generator (#4622)
  * Move to Xcode 9.3 which also means a High Sierra image.
  * Add protoc release script for Linux build.
  * protoc-artifacts: Avoid storing temporary files and use fewer layers
  * Rewrite go_benchmark
  * Add files to build ruby artifact for mac on kokoro (#4814)
  * Remove javanano.
  * Comment out unused command from release script.
  * Avoid direct check of class name (#4601)
  * The JsonParseOptions::ignore_unknown_fields option behavior treats
  * Fix php memory leak test (#4692)
  * Fix benchmark build
  * Add VS2017 optional component dependency details to the C# readme (#4128)
  * Fix initialization with Visual Studio
  * For windows, all python version should use /MT (#4468)
  * use brew install instead of easy_install in OSX (#4537)
  * Sync upb change (#4373)
  * Always add -std=c++11 for mac (#4684)
  * Add kokoro build status badges.
  * Removed unrecognized option from no_package.proto
  * Fixed up proto3_lite_unittest.cc
  * Update Xcode settings
  * Cleanup LICENSE file.
  * Remove js_embed binary. (#4709)
  * Fixed JS parsing of unspecified map keys
  * Update version number to 3.6.0
  * Deliberately call simple code to avoid Unity linker pruning
  * Revert 'Move `compiler/plugin.pb.cc` to libprotobuf with the other WKT sources.'
  * protoc-artifacts: Use ENTRYPOINT to enable devtoolset-1.1
  * MinGW build failed
  * Support using MSVC intrinsics in Log2FloorNonZero
  * Fix array constructor in c extension for compatibility (#4667)
  * Add space between class name and concat message (#4577)
  * fix python
  * Add performance.md and add instruction for linking tcmalloc
  * Add script for run and upload the benchmark result to bq
  * Add test for failing write of raw pointer to output stream
  * [objectivec] Fix memory leak of exceptions raised by RaiseException() (#4556)
  * Remove stray indent on normal imports.
  * Fix python ext build on kokoro (#4527)
  * Add compile test sources for to test include order.
  * Fixed a Visual Studio 2017 build error. (#4488)
  * fix linux kokoro build in docker
  * Fixes MSVC compiler warning C4800 'Forcing value to bool 'true' or 'false'' (#4350)
  * Updated Docker setup to use GCC 4.8
  * Remove broken build status icons.
  * Run autogen.sh in release script.
  * Output *_pb2_grpc.py when use_grpc_plugin=True
  * Adopt ruby_package in ruby generated code. (#4627)
  * Cygwin build failed
  * Work around an 'old runtime' issue with reflection
  * Added Kokoro protoc release build for OS X (#4770)
  * Updated change log for 3.6.1 release
  * Move methods out of class (#4697)
  * Fix to allow AOT compilers to play nicely with reflection
  * Update Makefile.am for Java lite files.
  * Added map_lite_test.proto to fix LiteTest
  * Introduce a compatiblity shim to support .NET 3.5 delegate creation
  * Revert 'Removed mention of Buffer in byteSourceToUint8Array'
  * Add gogo benchmark
  * Set ext.no_native = true for non mac platform
  * Removed atomicops.h since it is no longer used
  * Rename a shadowed variable.
  * Add kokoro bazel configs for 3.6.x branch.
  * Deleted scoped_ptr.h
  * Check the message to be encoded is the wrong type. (#4885) (#4949)
  * protoc-artifacts: Avoid checking out protobuf code
  * Add conformance test for null value in list JSON
  * Build ruby gem on kokoro (#4819)
  * Try using a new version of Visual Studio on AppVeyor
  * Make ruby release configs consistent with protoc.
  * fix for API change in PHP 7.3 (#4898)
  * Add .proto files to extract_includes.bat
  * Update protoc build scripts.
  * Blacklist all WELL_KNOWN_PROTOS from Bazel C++ code generation.
  * Additional support for building and deploying ppcle_64 artifacts
  * Fix php tests
  * Cleanup + documentation for Java Lite runtime.
  * Added Kokoro Windows release build config for protoc (#4766)
  * typo
  * fix golang kokoro linux build
  * Fix spelling error of __GNUC_MINOR__
  * Update code to work for Xcode 10b1 (#4729)
  * Added pyext/thread_unsafe_shared_ptr.h
  * Added missing .inc files to BUILD
  * js message support for jstype string on integers (#4332)
  * Improve error message when googletest is missing.
  * Make assertEquals pass for message (#4947)
  * Sync internal benchmark changes
  * Removed some unused C++ source files
  * Fix missing LIBPROTOC_EXPORT.
  * Added new test source files to Makefile.am
  * Update php version to 3.6.0 (#4736)
  * Fix RepeatedField#delete_if (#4292)
  * Merge branch (#4466)
  * Implement array constructor in php c extension.
  * protoc-artifacts: Update centos base from 6.6 to 6.9
  * PHP array constructors for protobuf messages (#4530)
  * Fix problem: cmake build failed in c++11  by clang
  * Don't assume Windows builds use MSVC.
  * Use legacy name in php runtime (#4741)
  * Add file option php_metadata_namespace and ruby_package (#4609)
  * Fix cpp benchmark dependency on mac
  * Use the first enum value instead of 0 in DefaultValueObjectWriter::FindEnumDefault
  * Check return value on write of raw pointer
  * Delete unused directories.
  * Replace //:protoc and similar default macro arguments with
  * Add extra C# file to Makefile.am
  * includes the expected class in the exception, otherwise the error is harder to track down (#3371)
  * Update instructions about getting protobuf source.
  * Add cpp tests under release docker image.
  * fix java benchmark, fix dashboard build
  * `update_file_lists.sh` depends on Bash features, thus needs Bash sebang.
  * Rename build_artifacts.cfg to release.cfg (#4818)
  * Fix bug: whether always_print_enums_as_ints is true or false, it always print the default value of enums as strings
  * source code info for interpreted options; fix source code info for extension range options (#4342)
  * Updated version numbers to 3.6.1
  * Trim imports for bundled generated protos.
  * Require C++11 and pass -std=c++11
  * Remove the iOS Test App.
  * fix duplicate mkdir in update_file_lists.sh
  * Updated csharp/README.md to reflect testing changes
  * Fix bazel build of examples.
  * Add missing ruby/tests/test_ruby_package.proto
  * Fix cpp_distcheck
  * Updated the change log with changes for 3.6.0
  * some fix
  * CMake: Update CXX Standard management
  * Add the files added in #4485.
  * Change to deal all messages in one loop
  * Fix php conformance test.
  * Add __init__.py files to compiler and util subpackages (#4117)
  * Updated .gitignore to exclude downloaded gmock/ directory
  * Fix error in Clang UndefinedBehaviorSanitizer
  * Work around MSVC issue with std::atomic initialization (#4777)
  * Updated conformance failure lists
  * Add back GeneratedClassName to public (#4686)
  * Add continuous test for ruby 2.3, 2.4 and 2.5 (#4829)
  * Throw error if user want to access message properties (#4603)
  * fix json_decode call parameters (#4381)
  * Move `compiler/plugin.pb.cc` to libprotobuf with the other WKT sources.
  * PHP: fixed typo in message.c
  * Add go benchmark
  * Allow list values to be null when parsing
  * Added instruction for existing ZLIB configuration
  * Fix 32bit php tests
  * Removed javanano from post_process_dist.sh
  * Don't generate imports for the WKTs unless generating the WKTs.
  * For encoding upb needs descriptor type instead of type. (#4354)
  * Include googletest as a submodule (#3993)
  * Write messages to backing field in generated C# cloning code (#4440)
  * Integrated internal changes from Google
- bump soname version

update to version v3.5.2:
  * Update release date
  * Disable pip cache when testing uploaded packages
  * Replace private timelib_update_ts with public date_timestamp_get
  * Remove py2.6 support.
  * Cherrypick for csharp, including:
  * Update changelog
  * Update changelog for 3.5.1
  * Fix uploading binary wheel.
  * Fix memory leak when creating map field via array.
  * Update rake file to build of 2.1.6.
  * Avoid using php_date_get_date_ce() in case date extension is not
  * Update protoc-artfacts
  * Fix string::back() usage in googletest.cc
  * Fix memory leak in php7
  * Support ruby2.5
  * io_win32: support non-ASCII paths
  * Explicitly propagate the status of Flush().
  * Add discard unknown API in ruby. (#3990)
  * Update version for 3.5.0.post1
  * remove nullptr
  * Fix more memory leak for php c extension (#4211)
  * Bumping number to fix ruby 2.1 on mac
  * io_win32_unittest: remove incorrect error check
  * Fix memory leak when creating repeated field via array.
  * Update version number for php c extension (#3896)
  * Fix file permission for python package.
  * Create containing directory before generating well_known_types_embed.cc
  * Replace C++11 only method std::map::at
  * Recursively clear unknown fields in submessages. (#3982)
  * Update version number to 3.5.1
  * io_win32_unittest: fix condition in GetCwdAsUtf8
  * Add release log
  * io_win32_unittest: use CWD as last tempdir
  * Add PROTOBUF_ENABLE_TIMESTAMP to let user decide whether timestamp util
  * Add support for Windows ARM64 build
  * Add protobuf-all in post release
  * Use fully qualifed name for DescriptorPool in Any.php to avoid name (#3886)
  * Add _file_desc_by_toplevel_extension back
  * Fix setup.py for windows build.
  * io_win32_unittest: make //:win32_test run again
  * Provide discardUnknonwnFields API in php (#3976)
  * Update php c extension version number to 3.5.0.1
  * Fix ruby gc_test in ruby 2.4 (#4011)
  * Remove duplicate typedef. (#3975)
  * Accept DatetimeInterface in fromDatetime
  * io_win32: add more encoding-related tests
  * Bump version number to 3.5.2
  * Bump protoc-artifact version for a patch rebuild
  * Call php method via function name instead of calling directly.
  * Well known types are not initialized properly. (#4139)
  * Use matching enum type for IsPOD.
  * Fix several more memory leak
  * Fix for php5.5
  * Add backslach to make class explict in global namespace

  * Fix compile error undefined reference to
    `google::protobuf::internal::Release_CompareAndSwap(long volatile*, long, long)'
    on s390x https://github.com/google/protobuf/issues/3937

- Conditionalize python2 and python3 in order to be able to build
  without python2 present in distribution
  * Use singlespec macros to simplify the logic
- Run fdupes on python modules to avoid duplicates
- Remove shebangs from import-only code

- Update to new upstream release 3.5.0
  * Proto3 messages are now preserving unknown fields by default.
    If you rely on unknowns fields being dropped, use
    DiscardUnknownFields() explicitly.
  * Deprecated the unsafe_arena_release_* and
    unsafe_arena_add_allocated_* methods for string fields.
  * Added move constructor and move assignment to RepeatedField,
    RepeatedPtrField and google::protobuf::Any.
  * Added perfect forwarding in Arena::CreateMessage.
  * In-progress experimental support for implicit weak fields
    with lite protos. This feature allows the linker to strip out
    more unused messages and reduce binary size.
- Rename %soname to %sover to better reflect its use.

- Install LICENSE

- Update to 3.3.0 :
  * C++:
    * Fixed map fields serialization of DynamicMessage to correctly serialize
      both key and value regardless of their presence.
    * Parser now rejects field number 0 correctly.
    * New API Message::SpaceUsedLong() that’s equivalent to
      Message::SpaceUsed() but returns the value in size_t.
    * JSON support
      - New flag always_print_enums_as_ints in JsonPrintOptions.
      - New flag preserve_proto_field_names in JsonPrintOptions. It will instruct
        the JSON printer to use the original field name declared in the .proto
        file instead of converting them to lowerCamelCase when printing JSON.
      - JsonPrintOptions.always_print_primtive_fields now works for oneof message
        fields.
      - Fixed a bug that doesn’t allow different fields to set the same json_name
        value.
      - Fixed a performance bug that causes excessive memory copy when printing
        large messages.
    * Various performance optimizations.
  * Java:
    * Map field setters eagerly validate inputs and throw NullPointerExceptions
      as appropriate.
    * Added ByteBuffer overloads to the generated parsing methods and the Parser
      interface.
    * proto3 enum's getNumber() method now throws on UNRECOGNIZED values.
    * Output of JsonFormat is now locale independent.
  * Python:
    * Added FindServiceByName() in the pure-Python DescriptorPool. This works only
      for descriptors added with DescriptorPool.Add(). Generated descriptor_pool
      does not support this yet.
    * Added a descriptor_pool parameter for parsing Any in text_format.Parse().
    * descriptor_pool.FindFileContainingSymbol() now is able to find nested
      extensions.
    * Extending empty [] to repeated field now sets parent message presence.
- Update to 3.2.0 :
  * Added protoc version number to protoc plugin protocol. It can be used by
    protoc plugin to detect which version of protoc is used with the plugin and
    mitigate known problems in certain version of protoc.
  * C++:
    * The default parsing byte size limit has been raised from 64MB to 2GB.
    * Added rvalue setters for non-arena string fields.
    * Enabled debug logging for Android.
    * Fixed a double-free problem when using Reflection::SetAllocatedMessage()
      with extension fields.
    * Fixed several deterministic serialization bugs:
      * MessageLite::SerializeAsString() now respects the global deterministic
        serialization flag.
      * Extension fields are serialized deterministically as well.  Fixed protocol
        compiler to correctly report importing-self as an error.
    * Fixed FileDescriptor::DebugString() to print custom options correctly.
    * Various performance/codesize optimizations and cleanups.
  * Java:
    * The default parsing byte size limit has been raised from 64MB to 2GB.
    * Added recursion limit when parsing JSON.
    * Fixed a bug that enumType.getDescriptor().getOptions() doesn't have custom
      options.
    * Fixed generated code to support field numbers up to 2^29-1.
  * Python:
    * You can now assign NumPy scalars/arrays (np.int32, np.int64) to protobuf
      fields, and assigning other numeric types has been optimized for
      performance.
    * Pure-Python: message types are now garbage-collectable.
    * Python/C++: a lot of internal cleanup/refactoring.
- Increase soname to 13
- Generate python2-protobuf and python3-protobuf packages in Factory
- Make the python2-protobuf package provide and obsolete python-protobuf
  to make the transition smooth in Tumbleweed

- Fix an issue with setup.py where some files are built on the
  first invocation, but only copied on the second. This resulted
  in an incomplete protobuf-python package.

- Update to protobuf v3.1.0. Protobuf v3.0.0 introduceced a new
  version of the protocol buffer language, proto3, which supersedes
  proto2.
  The protoc compiler is able to read old proto2 protocol definitions,
  and defaults to the proto2 syntax if a syntax is not specified, thus
  packages can be recompiled to link to the new library. For backwards
  compatibility, the old library version is available from the
  protobuf2 package.
  As the API for proto2 is not compatible to the proto3 API, proto3
  should only be used for new Protocol Buffers, whereas current users
  are advised to keep using proto2. For a detailed list of changes,
  see https://github.com/google/protobuf/releases

- Use py_sitedir for library installation with setup.py install

- Drop protobuf-libs as it is just workaround for rpmlint issue

- Cleanup specfile:
  * remove any conditionals for versions predating SLES 12/Leap 42.x
  * add Provides: protobuf-libs to fix rpmlint warning

Changes in python-python-gflags:
- Don't provide python2-gflags, singlespec packages should use
  correct name.

- Provide python-gflags in the python2 package

- Fix URL.

- Update to version 3.1.1
  * Added PEP8 style method/function aliases.
- Update to version 3.1.0
  * Python3 compatibility
  * Removed UnrecognizedFlag exception.
  * Replaced flags.DuplicateFlag with flags.DuplicateFlagError.
  * Moved the validators.Error class to exceptions.ValidationError.
  * Renamed IllegalFlagValue to IllegalFlagValueError.
  * Removed MutualExclusionValidator class, in favor of flags.MarkFlagsAsMutualExclusive.
  * Removed FlagValues.AddValidator method.
  * Removed _helpers.GetMainModule.
  * Use xml.dom.minidom to create XML strings, instead of manual crafting.
  * Declared PEP8-style names.
  * Added examples.
- Update to version 3.0.7
  * Removed the unused method ShortestUniquePrefixes.
  * Removed _GetCallingModule function alias.
- Update to version 3.0.6
  * Declared pypi package classifiers.
  * Added support for CLIF flag processing (not included in python-gflags repo
    yet).
- Update to version 3.0.5
  * Added a warning when FLAGS.SetDefault is used after flags were parsed.
  * Added new function: MarkFlagsAsRequired.
- Update to version 3.0.4
  * One more fix for setup.py - this time about third_party package.
- Update to version 3.0.3
  * Fixed setup.py.
  * --noflag if argument is given is no longer allowed.
  * Python3 compatibility: removed need for cgi import.
  * Disallowed unparsed flag usage after FLAGS.Reset()
- Update to version 3.0.2
  * Fix MANIFEST.in to include all relevant files.
- Update to version 3.0.1
  * Some changes for python3 compatibility.
  * Automatically generate ordering operations for Flag.
  * Add optional comma compatibility to whitespace-separated list flags.
  * A lot of potentially backwards incompatible changes since 2.0.
  * This version is NOT recommended to use in production. Some of the files and
    documentation has been lost during export; this will be fixed in next
    versions.
- Fix source URL
- Implement single-spec version

		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-03"/>
	<updated date="2023-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036025">SUSE bug 1036025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133277">SUSE bug 1133277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162343">SUSE bug 1162343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651303" comment="javapackages-filesystem-5.3.1-14.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152981" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196137" ref_url="https://bugzilla.suse.com/1196137" source="BUGZILLA"/>
		<reference ref_id="1198136" ref_url="https://bugzilla.suse.com/1198136" source="BUGZILLA"/>
		<description>
This update for tomcat fixes the following issues:

- Remove the log4j dependency as it is not used by the tomcat package (bsc#1196137)
    
Security hardening, related to Spring Framework vulnerabilities:    
- Deprecate getResources() and always return null (bsc#1198136).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-08"/>
	<updated date="2023-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196137">SUSE bug 1196137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198136">SUSE bug 1198136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679547" comment="javapackages-filesystem-5.3.1-14.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777369" comment="javapackages-tools-5.3.1-14.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679528" comment="tomcat-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679529" comment="tomcat-admin-webapps-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679530" comment="tomcat-docs-webapp-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679531" comment="tomcat-el-3_0-api-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679532" comment="tomcat-javadoc-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679533" comment="tomcat-jsp-2_3-api-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679534" comment="tomcat-lib-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679535" comment="tomcat-servlet-3_1-api-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679536" comment="tomcat-webapps-8.0.53-29.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152982" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1213128" ref_url="https://bugzilla.suse.com/1213128" source="BUGZILLA"/>
		<reference ref_id="1213131" ref_url="https://bugzilla.suse.com/1213131" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-37327" ref_url="https://www.suse.com/security/cve/CVE-2023-37327/" source="CVE"/>
		<reference ref_id="CVE-2023-37328" ref_url="https://www.suse.com/security/cve/CVE-2023-37328/" source="CVE"/>
		<description>
This update for gstreamer-plugins-base fixes the following issues:

- CVE-2023-37327: Fixed FLAC file parsing integer overflow remote code execution vulnerability. (bsc#1213128)
- CVE-2023-37328: Fixed PGS file parsing heap-based buffer overflow remote code execution vulnerability. (bsc#1213131)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-08"/>
	<updated date="2023-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213128">SUSE bug 1213128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213131">SUSE bug 1213131</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37327/">CVE-2023-37327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-37327">CVE-2023-37327 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37328/">CVE-2023-37328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-37328">CVE-2023-37328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009777377" comment="gstreamer-plugins-base-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777262" comment="gstreamer-plugins-base-lang-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777378" comment="libgstallocators-1_0-0-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777379" comment="libgstapp-1_0-0-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777380" comment="libgstapp-1_0-0-32bit-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777381" comment="libgstaudio-1_0-0-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777382" comment="libgstaudio-1_0-0-32bit-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777383" comment="libgstfft-1_0-0-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777384" comment="libgstpbutils-1_0-0-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777385" comment="libgstpbutils-1_0-0-32bit-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777386" comment="libgstriff-1_0-0-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777387" comment="libgstrtp-1_0-0-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777388" comment="libgstrtsp-1_0-0-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777389" comment="libgstsdp-1_0-0-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777390" comment="libgsttag-1_0-0-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777391" comment="libgsttag-1_0-0-32bit-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777392" comment="libgstvideo-1_0-0-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777393" comment="libgstvideo-1_0-0-32bit-1.8.3-13.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009777377" comment="gstreamer-plugins-base-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777262" comment="gstreamer-plugins-base-lang-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777378" comment="libgstallocators-1_0-0-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777379" comment="libgstapp-1_0-0-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777380" comment="libgstapp-1_0-0-32bit-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777381" comment="libgstaudio-1_0-0-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777382" comment="libgstaudio-1_0-0-32bit-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777383" comment="libgstfft-1_0-0-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777384" comment="libgstpbutils-1_0-0-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777385" comment="libgstpbutils-1_0-0-32bit-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777386" comment="libgstriff-1_0-0-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777387" comment="libgstrtp-1_0-0-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777388" comment="libgstrtsp-1_0-0-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777389" comment="libgstsdp-1_0-0-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777390" comment="libgsttag-1_0-0-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777391" comment="libgsttag-1_0-0-32bit-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777392" comment="libgstvideo-1_0-0-1.8.3-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777393" comment="libgstvideo-1_0-0-32bit-1.8.3-13.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152983" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1212863" ref_url="https://bugzilla.suse.com/1212863" source="BUGZILLA"/>
		<reference ref_id="1213905" ref_url="https://bugzilla.suse.com/1213905" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48503" ref_url="https://www.suse.com/security/cve/CVE-2022-48503/" source="CVE"/>
		<reference ref_id="CVE-2023-32435" ref_url="https://www.suse.com/security/cve/CVE-2023-32435/" source="CVE"/>
		<reference ref_id="CVE-2023-32439" ref_url="https://www.suse.com/security/cve/CVE-2023-32439/" source="CVE"/>
		<reference ref_id="CVE-2023-38133" ref_url="https://www.suse.com/security/cve/CVE-2023-38133/" source="CVE"/>
		<reference ref_id="CVE-2023-38572" ref_url="https://www.suse.com/security/cve/CVE-2023-38572/" source="CVE"/>
		<reference ref_id="CVE-2023-38592" ref_url="https://www.suse.com/security/cve/CVE-2023-38592/" source="CVE"/>
		<reference ref_id="CVE-2023-38594" ref_url="https://www.suse.com/security/cve/CVE-2023-38594/" source="CVE"/>
		<reference ref_id="CVE-2023-38595" ref_url="https://www.suse.com/security/cve/CVE-2023-38595/" source="CVE"/>
		<reference ref_id="CVE-2023-38597" ref_url="https://www.suse.com/security/cve/CVE-2023-38597/" source="CVE"/>
		<reference ref_id="CVE-2023-38599" ref_url="https://www.suse.com/security/cve/CVE-2023-38599/" source="CVE"/>
		<reference ref_id="CVE-2023-38600" ref_url="https://www.suse.com/security/cve/CVE-2023-38600/" source="CVE"/>
		<reference ref_id="CVE-2023-38611" ref_url="https://www.suse.com/security/cve/CVE-2023-38611/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.40.5 (bsc#1213905):

- CVE-2023-38133: Fixed information disclosure.
- CVE-2023-38572: Fixed Same-Origin-Policy bypass.
- CVE-2023-38592: Fixed arbitrary code execution.
- CVE-2023-38594: Fixed arbitrary code execution.
- CVE-2023-38595: Fixed arbitrary code execution.
- CVE-2023-38597: Fixed arbitrary code execution.
- CVE-2023-38599: Fixed sensitive user information tracking.
- CVE-2023-38600: Fixed arbitrary code execution.
- CVE-2023-38611: Fixed arbitrary code execution.

Update to version 2.40.3 (bsc#1212863):

- CVE-2023-32439: Fixed a bug where processing maliciously crafted web content may lead to arbitrary code execution. (bsc#1212863) 
- CVE-2023-32435: Fixed a bug where processing web content may lead to arbitrary code execution. (bsc#1212863)
- CVE-2022-48503: Fixed a bug where processing web content may lead to arbitrary code execution. (bsc#1212863)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-08"/>
	<updated date="2023-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212863">SUSE bug 1212863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213905">SUSE bug 1213905</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48503/">CVE-2022-48503 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48503">CVE-2022-48503 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32435/">CVE-2023-32435 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32435">CVE-2023-32435 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32439/">CVE-2023-32439 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32439">CVE-2023-32439 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38133/">CVE-2023-38133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38133">CVE-2023-38133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38572/">CVE-2023-38572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38572">CVE-2023-38572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38592/">CVE-2023-38592 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38592">CVE-2023-38592 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38594/">CVE-2023-38594 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38594">CVE-2023-38594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38595/">CVE-2023-38595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38595">CVE-2023-38595 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38597/">CVE-2023-38597 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38597">CVE-2023-38597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38599/">CVE-2023-38599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38599">CVE-2023-38599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38600/">CVE-2023-38600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38600">CVE-2023-38600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38611/">CVE-2023-38611 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38611">CVE-2023-38611 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009777370" comment="libjavascriptcoregtk-4_0-18-2.40.5-2.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777371" comment="libwebkit2gtk-4_0-37-2.40.5-2.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777257" comment="libwebkit2gtk3-lang-2.40.5-2.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777372" comment="typelib-1_0-JavaScriptCore-4_0-2.40.5-2.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777373" comment="typelib-1_0-WebKit2-4_0-2.40.5-2.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777374" comment="typelib-1_0-WebKit2WebExtension-4_0-2.40.5-2.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777375" comment="webkit2gtk-4_0-injected-bundles-2.40.5-2.146.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009777370" comment="libjavascriptcoregtk-4_0-18-2.40.5-2.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777371" comment="libwebkit2gtk-4_0-37-2.40.5-2.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777257" comment="libwebkit2gtk3-lang-2.40.5-2.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777372" comment="typelib-1_0-JavaScriptCore-4_0-2.40.5-2.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777373" comment="typelib-1_0-WebKit2-4_0-2.40.5-2.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777374" comment="typelib-1_0-WebKit2WebExtension-4_0-2.40.5-2.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777375" comment="webkit2gtk-4_0-injected-bundles-2.40.5-2.146.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152984" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-good (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1213128" ref_url="https://bugzilla.suse.com/1213128" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-37327" ref_url="https://www.suse.com/security/cve/CVE-2023-37327/" source="CVE"/>
		<description>
This update for gstreamer-plugins-good fixes the following issues:

- CVE-2023-37327: Fixed FLAC file parsing integer overflow remote code execution vulnerability. (bsc#1213128)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-08"/>
	<updated date="2023-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213128">SUSE bug 1213128</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37327/">CVE-2023-37327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-37327">CVE-2023-37327 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009776884" comment="gstreamer-plugins-good-1.8.3-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776857" comment="gstreamer-plugins-good-lang-1.8.3-16.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009776884" comment="gstreamer-plugins-good-1.8.3-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776857" comment="gstreamer-plugins-good-lang-1.8.3-16.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152985" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206418" ref_url="https://bugzilla.suse.com/1206418" source="BUGZILLA"/>
		<reference ref_id="1214099" ref_url="https://bugzilla.suse.com/1214099" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2022-41804" ref_url="https://www.suse.com/security/cve/CVE-2022-41804/" source="CVE"/>
		<reference ref_id="CVE-2023-23908" ref_url="https://www.suse.com/security/cve/CVE-2023-23908/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to Intel CPU Microcode 20230808 release. (bsc#1214099)
- CVE-2022-40982: Fixed a potential security vulnerability in some Intel? Processors which may allow information disclosure.
- CVE-2023-23908: Fixed a potential security vulnerability in some 3rd Generation Intel? Xeon? Scalable processors which may allow information disclosure.
- CVE-2022-41804: Fixed a potential security vulnerability in some Intel? Xeon? Processors with Intel? Software Guard Extensions (SGX) which may allow escalation of privilege.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-11"/>
	<updated date="2023-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206418">SUSE bug 1206418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214099">SUSE bug 1214099</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41804/">CVE-2022-41804 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41804">CVE-2022-41804 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-23908/">CVE-2023-23908 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23908">CVE-2023-23908 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778387" comment="ucode-intel-20230808-13.110.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778387" comment="ucode-intel-20230808-13.110.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152986" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_0_0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1213853" ref_url="https://bugzilla.suse.com/1213853" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3817" ref_url="https://www.suse.com/security/cve/CVE-2023-3817/" source="CVE"/>
		<description>
This update for openssl-1_0_0 fixes the following issues:

- CVE-2023-3817: Fixed a potential DoS due to excessive time spent checking DH q parameter value. (bsc#1213853)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-14"/>
	<updated date="2023-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213853">SUSE bug 1213853</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3817/">CVE-2023-3817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3817">CVE-2023-3817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009777821" comment="libopenssl-devel-1.0.2j-60.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777822" comment="libopenssl1_0_0-1.0.2j-60.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777823" comment="libopenssl1_0_0-32bit-1.0.2j-60.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777824" comment="libopenssl1_0_0-hmac-1.0.2j-60.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777825" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777826" comment="openssl-1.0.2j-60.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777827" comment="openssl-doc-1.0.2j-60.104.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009777821" comment="libopenssl-devel-1.0.2j-60.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777822" comment="libopenssl1_0_0-1.0.2j-60.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777823" comment="libopenssl1_0_0-32bit-1.0.2j-60.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777824" comment="libopenssl1_0_0-hmac-1.0.2j-60.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777825" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777826" comment="openssl-1.0.2j-60.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777827" comment="openssl-doc-1.0.2j-60.104.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152987" version="1" class="patch">
	<metadata>
		<title>Security update for pcre2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1213514" ref_url="https://bugzilla.suse.com/1213514" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41409" ref_url="https://www.suse.com/security/cve/CVE-2022-41409/" source="CVE"/>
		<description>
This update for pcre2 fixes the following issues:

  - CVE-2022-41409: Fixed integer overflow vulnerability in pcre2test that allows attackers to cause a denial of service via negative input (bsc#1213514).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-16"/>
	<updated date="2023-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213514">SUSE bug 1213514</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41409/">CVE-2022-41409 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41409">CVE-2022-41409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009774204" comment="libpcre2-16-0-10.34-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774205" comment="libpcre2-32-0-10.34-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774206" comment="libpcre2-8-0-10.34-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774207" comment="libpcre2-posix2-10.34-1.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152988" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214059" ref_url="https://bugzilla.suse.com/1214059" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39417" ref_url="https://www.suse.com/security/cve/CVE-2023-39417/" source="CVE"/>
		<description>
This update for postgresql12 fixes the following issues:

- Update to 12.16
- CVE-2023-39417: Fixed potential SQL injection for trusted extensions. (bsc#1214059)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-17"/>
	<updated date="2023-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214059">SUSE bug 1214059</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39417/">CVE-2023-39417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39417">CVE-2023-39417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009779153" comment="postgresql12-12.16-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779154" comment="postgresql12-contrib-12.16-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779155" comment="postgresql12-devel-12.16-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779083" comment="postgresql12-docs-12.16-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779156" comment="postgresql12-llvmjit-devel-12.16-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779157" comment="postgresql12-plperl-12.16-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779158" comment="postgresql12-plpython-12.16-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779159" comment="postgresql12-pltcl-12.16-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779160" comment="postgresql12-server-12.16-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779161" comment="postgresql12-server-devel-12.16-3.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152989" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql15 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214059" ref_url="https://bugzilla.suse.com/1214059" source="BUGZILLA"/>
		<reference ref_id="1214061" ref_url="https://bugzilla.suse.com/1214061" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39417" ref_url="https://www.suse.com/security/cve/CVE-2023-39417/" source="CVE"/>
		<reference ref_id="CVE-2023-39418" ref_url="https://www.suse.com/security/cve/CVE-2023-39418/" source="CVE"/>
		<description>
This update for postgresql15 fixes the following issues:

- Update to 15.4
- CVE-2023-39417: Fixed potential SQL injection for trusted extensions. (bsc#1214059)
- CVE-2023-39418: Fix MERGE to enforce row security. (bsc#1214061)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-17"/>
	<updated date="2023-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214059">SUSE bug 1214059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214061">SUSE bug 1214061</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39417/">CVE-2023-39417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39417">CVE-2023-39417 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39418/">CVE-2023-39418 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39418">CVE-2023-39418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009779162" comment="libecpg6-15.4-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779163" comment="libecpg6-32bit-15.4-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779164" comment="libpq5-15.4-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779165" comment="libpq5-32bit-15.4-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779166" comment="postgresql15-15.4-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779167" comment="postgresql15-contrib-15.4-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779168" comment="postgresql15-devel-15.4-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779094" comment="postgresql15-docs-15.4-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779169" comment="postgresql15-plperl-15.4-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779170" comment="postgresql15-plpython-15.4-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779171" comment="postgresql15-pltcl-15.4-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779172" comment="postgresql15-server-15.4-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779173" comment="postgresql15-server-devel-15.4-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152990" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql15 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214059" ref_url="https://bugzilla.suse.com/1214059" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39417" ref_url="https://www.suse.com/security/cve/CVE-2023-39417/" source="CVE"/>
		<description>
This update for postgresql15 fixes the following issues:

- Update to 14.9
- CVE-2023-39417: Fixed potential SQL injection for trusted extensions. (bsc#1214059)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-17"/>
	<updated date="2023-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214059">SUSE bug 1214059</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39417/">CVE-2023-39417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39417">CVE-2023-39417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009779174" comment="postgresql14-14.9-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779175" comment="postgresql14-contrib-14.9-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779176" comment="postgresql14-devel-14.9-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779101" comment="postgresql14-docs-14.9-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779177" comment="postgresql14-llvmjit-devel-14.9-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779178" comment="postgresql14-plperl-14.9-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779179" comment="postgresql14-plpython-14.9-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779180" comment="postgresql14-pltcl-14.9-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779181" comment="postgresql14-server-14.9-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779182" comment="postgresql14-server-devel-14.9-3.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152991" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql15 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214059" ref_url="https://bugzilla.suse.com/1214059" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39417" ref_url="https://www.suse.com/security/cve/CVE-2023-39417/" source="CVE"/>
		<description>
This update for postgresql15 fixes the following issues:

- Update to 13.12
- CVE-2023-39417: Fixed potential SQL injection for trusted extensions. (bsc#1214059)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-17"/>
	<updated date="2023-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214059">SUSE bug 1214059</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39417/">CVE-2023-39417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39417">CVE-2023-39417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009779183" comment="postgresql13-13.12-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779184" comment="postgresql13-contrib-13.12-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779108" comment="postgresql13-docs-13.12-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779185" comment="postgresql13-plperl-13.12-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779186" comment="postgresql13-plpython-13.12-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779187" comment="postgresql13-pltcl-13.12-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779188" comment="postgresql13-server-13.12-3.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152992" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1213624" ref_url="https://bugzilla.suse.com/1213624" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3745" ref_url="https://www.suse.com/security/cve/CVE-2023-3745/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

  - CVE-2023-3745: Fixed heap out of bounds read in PushCharPixel() in quantum-private.h (bsc#1213624).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-18"/>
	<updated date="2023-08-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1213624">SUSE bug 1213624</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3745/">CVE-2023-3745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3745">CVE-2023-3745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009775556" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.195.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775557" comment="ImageMagick-config-6-upstream-6.8.8.1-71.195.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775558" comment="libMagickCore-6_Q16-1-6.8.8.1-71.195.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775559" comment="libMagickWand-6_Q16-1-6.8.8.1-71.195.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152993" version="1" class="patch">
	<metadata>
		<title>Security update for python-configobj (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210070" ref_url="https://bugzilla.suse.com/1210070" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-26112" ref_url="https://www.suse.com/security/cve/CVE-2023-26112/" source="CVE"/>
		<description>
This update for python-configobj fixes the following issues:

- CVE-2023-26112: Fixed regular expression denial of service vulnerability in validate.py (bsc#1210070).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-22"/>
	<updated date="2023-08-22"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1210070">SUSE bug 1210070</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-26112/">CVE-2023-26112 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26112">CVE-2023-26112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771803" comment="python-configobj-5.0.6-20.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152994" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214342" ref_url="https://bugzilla.suse.com/1214342" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20197" ref_url="https://www.suse.com/security/cve/CVE-2023-20197/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- Update to 0.103.9
- CVE-2023-20197: Fixed a possible denial of service vulnerability in the HFS+ file parser. (bsc#1214342)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-22"/>
	<updated date="2023-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214342">SUSE bug 1214342</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-20197/">CVE-2023-20197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20197">CVE-2023-20197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779449" comment="clamav-0.103.9-33.56.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779449" comment="clamav-0.103.9-33.56.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152995" version="1" class="patch">
	<metadata>
		<title>Security update for libapr-util1 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207866" ref_url="https://bugzilla.suse.com/1207866" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25147" ref_url="https://www.suse.com/security/cve/CVE-2022-25147/" source="CVE"/>
		<description>
This update for libapr-util1 fixes the following issues:

- CVE-2022-25147: Fixed a buffer overflow possible with specially crafted input during base64 encoding (bsc#1207866)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-09"/>
	<updated date="2023-02-09"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1207866">SUSE bug 1207866</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25147/">CVE-2022-25147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25147">CVE-2022-25147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009737349" comment="libapr-util1-1.5.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009737350" comment="libapr-util1-dbd-sqlite3-1.5.3-2.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009737349" comment="libapr-util1-1.5.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009737350" comment="libapr-util1-dbd-sqlite3-1.5.3-2.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152996" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214054" ref_url="https://bugzilla.suse.com/1214054" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-36054" ref_url="https://www.suse.com/security/cve/CVE-2023-36054/" source="CVE"/>
		<description>
This update for krb5 fixes the following issues:

- CVE-2023-36054: Fixed a DoS that could be triggered by an authenticated remote user. (bsc#1214054)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-23"/>
	<updated date="2023-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214054">SUSE bug 1214054</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-36054/">CVE-2023-36054 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36054">CVE-2023-36054 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009777828" comment="krb5-1.12.5-40.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777829" comment="krb5-32bit-1.12.5-40.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777830" comment="krb5-client-1.12.5-40.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777831" comment="krb5-doc-1.12.5-40.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777832" comment="krb5-plugin-kdb-ldap-1.12.5-40.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777833" comment="krb5-plugin-preauth-otp-1.12.5-40.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777834" comment="krb5-plugin-preauth-pkinit-1.12.5-40.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777835" comment="krb5-server-1.12.5-40.52.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009777828" comment="krb5-1.12.5-40.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777829" comment="krb5-32bit-1.12.5-40.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777830" comment="krb5-client-1.12.5-40.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777831" comment="krb5-doc-1.12.5-40.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777832" comment="krb5-plugin-kdb-ldap-1.12.5-40.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777833" comment="krb5-plugin-preauth-otp-1.12.5-40.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777834" comment="krb5-plugin-preauth-pkinit-1.12.5-40.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777835" comment="krb5-server-1.12.5-40.52.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152997" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1150039" ref_url="https://bugzilla.suse.com/1150039" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16115" ref_url="https://www.suse.com/security/cve/CVE-2019-16115/" source="CVE"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2019-16115: Fixed an uninitialized memory error in GfxUnivariateShading::setupCache. (bsc#1150039)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-23"/>
	<updated date="2023-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150039">SUSE bug 1150039</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16115/">CVE-2019-16115 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16115">CVE-2019-16115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778388" comment="libpoppler-glib8-0.43.0-16.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778389" comment="libpoppler-qt4-4-0.43.0-16.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778390" comment="libpoppler60-0.43.0-16.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778391" comment="poppler-tools-0.43.0-16.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152998" version="1" class="patch">
	<metadata>
		<title>Security update for xrdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206300" ref_url="https://bugzilla.suse.com/1206300" source="BUGZILLA"/>
		<reference ref_id="1206303" ref_url="https://bugzilla.suse.com/1206303" source="BUGZILLA"/>
		<reference ref_id="1206306" ref_url="https://bugzilla.suse.com/1206306" source="BUGZILLA"/>
		<reference ref_id="1206307" ref_url="https://bugzilla.suse.com/1206307" source="BUGZILLA"/>
		<reference ref_id="1206310" ref_url="https://bugzilla.suse.com/1206310" source="BUGZILLA"/>
		<reference ref_id="1206311" ref_url="https://bugzilla.suse.com/1206311" source="BUGZILLA"/>
		<reference ref_id="1206312" ref_url="https://bugzilla.suse.com/1206312" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23468" ref_url="https://www.suse.com/security/cve/CVE-2022-23468/" source="CVE"/>
		<reference ref_id="CVE-2022-23479" ref_url="https://www.suse.com/security/cve/CVE-2022-23479/" source="CVE"/>
		<reference ref_id="CVE-2022-23480" ref_url="https://www.suse.com/security/cve/CVE-2022-23480/" source="CVE"/>
		<reference ref_id="CVE-2022-23481" ref_url="https://www.suse.com/security/cve/CVE-2022-23481/" source="CVE"/>
		<reference ref_id="CVE-2022-23482" ref_url="https://www.suse.com/security/cve/CVE-2022-23482/" source="CVE"/>
		<reference ref_id="CVE-2022-23483" ref_url="https://www.suse.com/security/cve/CVE-2022-23483/" source="CVE"/>
		<reference ref_id="CVE-2022-23484" ref_url="https://www.suse.com/security/cve/CVE-2022-23484/" source="CVE"/>
		<description>
This update for xrdp fixes the following issues:

- CVE-2022-23468: Fixed a buffer overflow in xrdp_login_wnd_create() (bsc#1206300).
- CVE-2022-23479: Fixed a buffer overflow in xrdp_mm_chan_data_in() (bsc#1206303).
- CVE-2022-23480: Fixed a buffer overflow in devredir_proc_client_devlist_announce_req() (bsc#1206306).
- CVE-2022-23481: Fixed an out of bound read in xrdp_caps_process_confirm_active() (bsc#1206307).
- CVE-2022-23482: Fixed an out of bound read in xrdp_sec_process_mcs_data_CS_CORE() (bsc#1206310).
- CVE-2022-23483: Fixed an out of bound read in libxrdp_send_to_channel() (bsc#1206311).
- CVE-2022-23484: Fixed a integer overflow in xrdp_mm_process_rail_update_window_text() (bsc#1206312).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-10"/>
	<updated date="2023-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206300">SUSE bug 1206300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206303">SUSE bug 1206303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206306">SUSE bug 1206306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206307">SUSE bug 1206307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206310">SUSE bug 1206310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206311">SUSE bug 1206311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206312">SUSE bug 1206312</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23468/">CVE-2022-23468 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23468">CVE-2022-23468 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23479/">CVE-2022-23479 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23479">CVE-2022-23479 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23480/">CVE-2022-23480 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23480">CVE-2022-23480 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23481/">CVE-2022-23481 at SUSE</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23481">CVE-2022-23481 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23482/">CVE-2022-23482 at SUSE</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23482">CVE-2022-23482 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23483/">CVE-2022-23483 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23483">CVE-2022-23483 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23484/">CVE-2022-23484 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23484">CVE-2022-23484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738526" comment="xrdp-0.9.0~git.1456906198.f422461-21.30.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738526" comment="xrdp-0.9.0~git.1456906198.f422461-21.30.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152999" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1213131" ref_url="https://bugzilla.suse.com/1213131" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-37328" ref_url="https://www.suse.com/security/cve/CVE-2023-37328/" source="CVE"/>
		<description>
This update for gstreamer-plugins-base fixes the following issues:

- The patch for CVE-2023-37328 is removed because it was added by mistake and the package has never been affected by this vulnerability. (bsc#1213131)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-23"/>
	<updated date="2023-08-23"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1213131">SUSE bug 1213131</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37328/">CVE-2023-37328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-37328">CVE-2023-37328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778763" comment="gstreamer-plugins-base-1.8.3-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778710" comment="gstreamer-plugins-base-lang-1.8.3-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778764" comment="libgstallocators-1_0-0-1.8.3-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778765" comment="libgstapp-1_0-0-1.8.3-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778766" comment="libgstapp-1_0-0-32bit-1.8.3-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778767" comment="libgstaudio-1_0-0-1.8.3-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778768" comment="libgstaudio-1_0-0-32bit-1.8.3-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778769" comment="libgstfft-1_0-0-1.8.3-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778770" comment="libgstpbutils-1_0-0-1.8.3-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778771" comment="libgstpbutils-1_0-0-32bit-1.8.3-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778772" comment="libgstriff-1_0-0-1.8.3-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778773" comment="libgstrtp-1_0-0-1.8.3-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778774" comment="libgstrtsp-1_0-0-1.8.3-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778775" comment="libgstsdp-1_0-0-1.8.3-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778776" comment="libgsttag-1_0-0-1.8.3-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778777" comment="libgsttag-1_0-0-32bit-1.8.3-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778778" comment="libgstvideo-1_0-0-1.8.3-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778779" comment="libgstvideo-1_0-0-32bit-1.8.3-13.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153000" version="1" class="patch">
	<metadata>
		<title>Security update for ca-certificates-mozilla (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214248" ref_url="https://bugzilla.suse.com/1214248" source="BUGZILLA"/>
		<description>
This update for ca-certificates-mozilla fixes the following issues:

- Updated to 2.62 state of Mozilla SSL root CAs (bsc#1214248)
  Added:
  - Atos TrustedRoot Root CA ECC G2 2020
  - Atos TrustedRoot Root CA ECC TLS 2021
  - Atos TrustedRoot Root CA RSA G2 2020
  - Atos TrustedRoot Root CA RSA TLS 2021
  - BJCA Global Root CA1
  - BJCA Global Root CA2
  - LAWtrust Root CA2 (4096)
  - Sectigo Public Email Protection Root E46
  - Sectigo Public Email Protection Root R46
  - Sectigo Public Server Authentication Root E46
  - Sectigo Public Server Authentication Root R46
  - SSL.com Client ECC Root CA 2022
  - SSL.com Client RSA Root CA 2022
  - SSL.com TLS ECC Root CA 2022
  - SSL.com TLS RSA Root CA 2022
  Removed CAs:
  - Chambers of Commerce Root
  - E-Tugra Certification Authority
  - E-Tugra Global Root CA ECC v3
  - E-Tugra Global Root CA RSA v3
  - Hongkong Post Root CA 1
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-23"/>
	<updated date="2023-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214248">SUSE bug 1214248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778727" comment="ca-certificates-mozilla-2.62-12.43.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778727" comment="ca-certificates-mozilla-2.62-12.43.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153001" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214431" ref_url="https://bugzilla.suse.com/1214431" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40609" ref_url="https://www.suse.com/security/cve/CVE-2022-40609/" source="CVE"/>
		<reference ref_id="CVE-2023-22006" ref_url="https://www.suse.com/security/cve/CVE-2023-22006/" source="CVE"/>
		<reference ref_id="CVE-2023-22036" ref_url="https://www.suse.com/security/cve/CVE-2023-22036/" source="CVE"/>
		<reference ref_id="CVE-2023-22041" ref_url="https://www.suse.com/security/cve/CVE-2023-22041/" source="CVE"/>
		<reference ref_id="CVE-2023-22044" ref_url="https://www.suse.com/security/cve/CVE-2023-22044/" source="CVE"/>
		<reference ref_id="CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045/" source="CVE"/>
		<reference ref_id="CVE-2023-22049" ref_url="https://www.suse.com/security/cve/CVE-2023-22049/" source="CVE"/>
		<reference ref_id="CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 8 Fix Pack 10 (bsc#1213541)
- CVE-2022-40609: Fixed an unsafe deserialization flaw which could allow a remote attacker to execute arbitrary code on the system. (bsc#1213934)
- CVE-2023-22041: Fixed a flaw whcih could allow unauthorized access to critical data or complete access. (bsc#1213475)
- CVE-2023-22049: Fixed a flaw which could result in unauthorized update. (bsc#1213482)
- CVE-2023-22045: Fixed a flaw which could result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. (bsc#1213481)
- CVE-2023-22044: Fixed a flaw which could result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. (bsc#1213479)
- CVE-2023-22036: Fixed a flaw which could result in unauthorized ability to cause a partial denial of service. (bsc#1213474)
- CVE-2023-25193: Fixed a flaw which could allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks. (bsc#1207922)
- CVE-2023-22006: Fixed a flaw which could result in unauthorized update, insert or delete access for JDK accessible data. (bsc#1213473)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-23"/>
	<updated date="2023-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214431">SUSE bug 1214431</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40609/">CVE-2022-40609 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40609">CVE-2022-40609 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22006/">CVE-2023-22006 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22006">CVE-2023-22006 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22036/">CVE-2023-22036 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22036">CVE-2023-22036 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22041/">CVE-2023-22041 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22041">CVE-2023-22041 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22044/">CVE-2023-22044 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22044">CVE-2023-22044 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22049/">CVE-2023-22049 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22049">CVE-2023-22049 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25193">CVE-2023-25193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009779489" comment="java-1_8_0-ibm-1.8.0_sr8.10-30.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779483" comment="java-1_8_0-ibm-alsa-1.8.0_sr8.10-30.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779490" comment="java-1_8_0-ibm-devel-1.8.0_sr8.10-30.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779484" comment="java-1_8_0-ibm-plugin-1.8.0_sr8.10-30.114.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009779489" comment="java-1_8_0-ibm-1.8.0_sr8.10-30.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779483" comment="java-1_8_0-ibm-alsa-1.8.0_sr8.10-30.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779490" comment="java-1_8_0-ibm-devel-1.8.0_sr8.10-30.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779484" comment="java-1_8_0-ibm-plugin-1.8.0_sr8.10-30.114.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153002" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208067" ref_url="https://bugzilla.suse.com/1208067" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4904" ref_url="https://www.suse.com/security/cve/CVE-2022-4904/" source="CVE"/>
		<description>
This update for libcares2 fixes the following issues:

- CVE-2022-4904: Fixed stack overflow in ares_set_sortlist() (bsc#1208067).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-24"/>
	<updated date="2023-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208067">SUSE bug 1208067</bugzilla>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-4904/">CVE-2022-4904 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4904">CVE-2022-4904 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779488" comment="libcares2-1.9.1-9.15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779488" comment="libcares2-1.9.1-9.15.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153003" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214495" ref_url="https://bugzilla.suse.com/1214495" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19909" ref_url="https://www.suse.com/security/cve/CVE-2020-19909/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-19909: Fixed Integer overflow vulnerability in tool_operate.c via crafted value as the retry delay (bsc#1214495).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-24"/>
	<updated date="2023-08-24"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1214495">SUSE bug 1214495</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19909/">CVE-2020-19909 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19909">CVE-2020-19909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009780687" comment="curl-7.37.0-37.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780688" comment="libcurl4-7.37.0-37.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780689" comment="libcurl4-32bit-7.37.0-37.101.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153004" version="1" class="patch">
	<metadata>
		<title>Security update for gawk (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214025" ref_url="https://bugzilla.suse.com/1214025" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4156" ref_url="https://www.suse.com/security/cve/CVE-2023-4156/" source="CVE"/>
		<description>
This update for gawk fixes the following issues:

- CVE-2023-4156: Fix a heap out of bound read by validating the index into argument list. (bsc#1214025)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-24"/>
	<updated date="2023-08-24"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1214025">SUSE bug 1214025</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4156/">CVE-2023-4156 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4156">CVE-2023-4156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777836" comment="gawk-4.1.0-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153005" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1213637" ref_url="https://bugzilla.suse.com/1213637" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38559" ref_url="https://www.suse.com/security/cve/CVE-2023-38559/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2023-38559: Fixed out-of-bounds read in devn_pcx_write_rle() that could result in DoS (bsc#1213637).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-28"/>
	<updated date="2023-08-28"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1213637">SUSE bug 1213637</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38559/">CVE-2023-38559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38559">CVE-2023-38559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009775192" comment="ghostscript-9.52-23.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775193" comment="ghostscript-devel-9.52-23.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775194" comment="ghostscript-x11-9.52-23.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153006" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1213481" ref_url="https://bugzilla.suse.com/1213481" source="BUGZILLA"/>
		<reference ref_id="1213482" ref_url="https://bugzilla.suse.com/1213482" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045/" source="CVE"/>
		<reference ref_id="CVE-2023-22049" ref_url="https://www.suse.com/security/cve/CVE-2023-22049/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u382 (icedtea-3.28.0)

- CVE-2023-22045: Fixed a difficult to exploit vulnerability that allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK (bsc#1213481).
- CVE-2023-22049: Fixed a difficult to exploit vulnerability that allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK (bsc#1213482).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-28"/>
	<updated date="2023-08-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213481">SUSE bug 1213481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213482">SUSE bug 1213482</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22049/">CVE-2023-22049 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22049">CVE-2023-22049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009777394" comment="java-1_8_0-openjdk-1.8.0.382-27.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777395" comment="java-1_8_0-openjdk-demo-1.8.0.382-27.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777396" comment="java-1_8_0-openjdk-devel-1.8.0.382-27.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777397" comment="java-1_8_0-openjdk-headless-1.8.0.382-27.90.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009777394" comment="java-1_8_0-openjdk-1.8.0.382-27.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777395" comment="java-1_8_0-openjdk-demo-1.8.0.382-27.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777396" comment="java-1_8_0-openjdk-devel-1.8.0.382-27.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777397" comment="java-1_8_0-openjdk-headless-1.8.0.382-27.90.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153007" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208828" ref_url="https://bugzilla.suse.com/1208828" source="BUGZILLA"/>
		<reference ref_id="1209042" ref_url="https://bugzilla.suse.com/1209042" source="BUGZILLA"/>
		<reference ref_id="1209187" ref_url="https://bugzilla.suse.com/1209187" source="BUGZILLA"/>
		<reference ref_id="1210996" ref_url="https://bugzilla.suse.com/1210996" source="BUGZILLA"/>
		<reference ref_id="1211256" ref_url="https://bugzilla.suse.com/1211256" source="BUGZILLA"/>
		<reference ref_id="1211257" ref_url="https://bugzilla.suse.com/1211257" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1127" ref_url="https://www.suse.com/security/cve/CVE-2023-1127/" source="CVE"/>
		<reference ref_id="CVE-2023-1264" ref_url="https://www.suse.com/security/cve/CVE-2023-1264/" source="CVE"/>
		<reference ref_id="CVE-2023-1355" ref_url="https://www.suse.com/security/cve/CVE-2023-1355/" source="CVE"/>
		<reference ref_id="CVE-2023-2426" ref_url="https://www.suse.com/security/cve/CVE-2023-2426/" source="CVE"/>
		<reference ref_id="CVE-2023-2609" ref_url="https://www.suse.com/security/cve/CVE-2023-2609/" source="CVE"/>
		<reference ref_id="CVE-2023-2610" ref_url="https://www.suse.com/security/cve/CVE-2023-2610/" source="CVE"/>
		<description>
This update for vim fixes the following issues:

Updated to version 9.0 with patch level 1572.

- CVE-2023-2426: Fixed Out-of-range Pointer Offset use (bsc#1210996).
- CVE-2023-2609: Fixed NULL Pointer Dereference (bsc#1211256).
- CVE-2023-2610: Fixed nteger Overflow or Wraparound (bsc#1211257).
- CVE-2023-1264: Fixed NULL Pointer Dereference (bsc#1209042).
- CVE-2023-1355: Fixed NULL Pointer Dereference (bsc#1209187).
- CVE-2023-1127: Fixed divide by zero in scrolldown() (bsc#1208828).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-28"/>
	<updated date="2023-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208828">SUSE bug 1208828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209042">SUSE bug 1209042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209187">SUSE bug 1209187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210996">SUSE bug 1210996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211256">SUSE bug 1211256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211257">SUSE bug 1211257</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1127/">CVE-2023-1127 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1127">CVE-2023-1127 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1264/">CVE-2023-1264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1264">CVE-2023-1264 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1355/">CVE-2023-1355 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1355">CVE-2023-1355 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-2426/">CVE-2023-2426 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2426">CVE-2023-2426 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2609/">CVE-2023-2609 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2609">CVE-2023-2609 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2610/">CVE-2023-2610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2610">CVE-2023-2610 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778385" comment="gvim-9.0.1572-17.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778386" comment="vim-9.0.1572-17.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778368" comment="vim-data-9.0.1572-17.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778369" comment="vim-data-common-9.0.1572-17.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778385" comment="gvim-9.0.1572-17.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778386" comment="vim-9.0.1572-17.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778368" comment="vim-data-9.0.1572-17.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778369" comment="vim-data-common-9.0.1572-17.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153008" version="1" class="patch">
	<metadata>
		<title>Security update for procps (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214290" ref_url="https://bugzilla.suse.com/1214290" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4016" ref_url="https://www.suse.com/security/cve/CVE-2023-4016/" source="CVE"/>
		<description>
This update for procps fixes the following issues:

  - CVE-2023-4016: Fixed ps buffer overflow (bsc#1214290).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-29"/>
	<updated date="2023-08-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1214290">SUSE bug 1214290</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4016/">CVE-2023-4016 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4016">CVE-2023-4016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778864" comment="libprocps3-3.3.9-11.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778865" comment="procps-3.3.9-11.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153009" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214527" ref_url="https://bugzilla.suse.com/1214527" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-22218" ref_url="https://www.suse.com/security/cve/CVE-2020-22218/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issues:

- CVE-2020-22218: Fixed a bug in _libssh2_packet_add() which allows to access out of bounds memory. (bsc#1214527)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-30"/>
	<updated date="2023-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214527">SUSE bug 1214527</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22218/">CVE-2020-22218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22218">CVE-2020-22218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009780680" comment="libssh2-1-1.4.3-20.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780681" comment="libssh2-1-32bit-1.4.3-20.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009780680" comment="libssh2-1-1.4.3-20.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780681" comment="libssh2-1-32bit-1.4.3-20.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153010" version="1" class="patch">
	<metadata>
		<title>Security update for open-vm-tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1212143" ref_url="https://bugzilla.suse.com/1212143" source="BUGZILLA"/>
		<reference ref_id="1214566" ref_url="https://bugzilla.suse.com/1214566" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20867" ref_url="https://www.suse.com/security/cve/CVE-2023-20867/" source="CVE"/>
		<reference ref_id="CVE-2023-20900" ref_url="https://www.suse.com/security/cve/CVE-2023-20900/" source="CVE"/>
		<description>
This update for open-vm-tools fixes the following issues:

- CVE-2023-20900: Fixed SAML token signature bypass vulnerability (bsc#1214566).
- CVE-2023-20867: Fixed authentication bypass in the vgauth module (bsc#1212143).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-31"/>
	<updated date="2023-08-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212143">SUSE bug 1212143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214566">SUSE bug 1214566</bugzilla>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-20867/">CVE-2023-20867 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20867">CVE-2023-20867 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-20900/">CVE-2023-20900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20900">CVE-2023-20900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009781297" comment="libvmtools0-10.3.10-3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781298" comment="open-vm-tools-10.3.10-3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781299" comment="open-vm-tools-desktop-10.3.10-3.38.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153011" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214606" ref_url="https://bugzilla.suse.com/1214606" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4051" ref_url="https://www.suse.com/security/cve/CVE-2023-4051/" source="CVE"/>
		<reference ref_id="CVE-2023-4053" ref_url="https://www.suse.com/security/cve/CVE-2023-4053/" source="CVE"/>
		<reference ref_id="CVE-2023-4574" ref_url="https://www.suse.com/security/cve/CVE-2023-4574/" source="CVE"/>
		<reference ref_id="CVE-2023-4575" ref_url="https://www.suse.com/security/cve/CVE-2023-4575/" source="CVE"/>
		<reference ref_id="CVE-2023-4576" ref_url="https://www.suse.com/security/cve/CVE-2023-4576/" source="CVE"/>
		<reference ref_id="CVE-2023-4577" ref_url="https://www.suse.com/security/cve/CVE-2023-4577/" source="CVE"/>
		<reference ref_id="CVE-2023-4578" ref_url="https://www.suse.com/security/cve/CVE-2023-4578/" source="CVE"/>
		<reference ref_id="CVE-2023-4580" ref_url="https://www.suse.com/security/cve/CVE-2023-4580/" source="CVE"/>
		<reference ref_id="CVE-2023-4581" ref_url="https://www.suse.com/security/cve/CVE-2023-4581/" source="CVE"/>
		<reference ref_id="CVE-2023-4582" ref_url="https://www.suse.com/security/cve/CVE-2023-4582/" source="CVE"/>
		<reference ref_id="CVE-2023-4583" ref_url="https://www.suse.com/security/cve/CVE-2023-4583/" source="CVE"/>
		<reference ref_id="CVE-2023-4584" ref_url="https://www.suse.com/security/cve/CVE-2023-4584/" source="CVE"/>
		<reference ref_id="CVE-2023-4585" ref_url="https://www.suse.com/security/cve/CVE-2023-4585/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox was updated to Extended Support Release 115.2.0 ESR (MFSA 2023-36) (bsc#1214606).

- CVE-2023-4574: Fixed memory corruption in IPC ColorPickerShownCallback (bmo#1846688)
- CVE-2023-4575: Fixed memory corruption in IPC FilePickerShownCallback  (bmo#1846689)
- CVE-2023-4576: Fixed integer Overflow in RecordedSourceSurfaceCreation (bmo#1846694)
- CVE-2023-4577: Fixed memory corruption in JIT UpdateRegExpStatics (bmo#1847397)
- CVE-2023-4051: Fixed full screen notification obscured by file open dialog (bmo#1821884)
- CVE-2023-4578: Fixed Out of Memory Exception in SpiderMonkey could have triggered an (bmo#1839007)
- CVE-2023-4053: Fixed full screen notification obscured by external program (bmo#1839079)
- CVE-2023-4580: Fixed push notifications saved to disk unencrypted (bmo#1843046)
- CVE-2023-4581: Fixed XLL file extensions downloadable without warnings (bmo#1843758)
- CVE-2023-4582: Fixed buffer Overflow in WebGL glGetProgramiv (bmo#1773874)
- CVE-2023-4583: Fixed browsing Context potentially not cleared when closing Private Window (bmo#1842030)
- CVE-2023-4584: Fixed memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2  (bmo#1843968, bmo#1845205, bmo#1846080, bmo#1846526, bmo#1847529)
- CVE-2023-4585: Fixed memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2(bmo#1751583, bmo#1833504, bmo#1841082, bmo#1847904, bmo#1848999).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-08"/>
	<updated date="2023-09-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4051/">CVE-2023-4051 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4051">CVE-2023-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4053/">CVE-2023-4053 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4053">CVE-2023-4053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4574/">CVE-2023-4574 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4574">CVE-2023-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4575/">CVE-2023-4575 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4575">CVE-2023-4575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4576/">CVE-2023-4576 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4576">CVE-2023-4576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4577/">CVE-2023-4577 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4577">CVE-2023-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4578/">CVE-2023-4578 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4578">CVE-2023-4578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4580/">CVE-2023-4580 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4580">CVE-2023-4580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4581/">CVE-2023-4581 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4581">CVE-2023-4581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4582/">CVE-2023-4582 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4582">CVE-2023-4582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4583/">CVE-2023-4583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4583">CVE-2023-4583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4584/">CVE-2023-4584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4584">CVE-2023-4584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4585/">CVE-2023-4585 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4585">CVE-2023-4585 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009780978" comment="MozillaFirefox-115.2.0-112.176.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780949" comment="MozillaFirefox-devel-115.2.0-112.176.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780979" comment="MozillaFirefox-translations-common-115.2.0-112.176.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009780978" comment="MozillaFirefox-115.2.0-112.176.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780949" comment="MozillaFirefox-devel-115.2.0-112.176.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780979" comment="MozillaFirefox-translations-common-115.2.0-112.176.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153012" version="1" class="patch">
	<metadata>
		<title>Security update for python36 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214692" ref_url="https://bugzilla.suse.com/1214692" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<description>
This update for python36 fixes the following issues:
  
- CVE-2023-40217: Fixed TLS handshake bypass on closed sockets (bsc#1214692).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-13"/>
	<updated date="2023-09-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214692">SUSE bug 1214692</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009794907" comment="libpython3_6m1_0-3.6.15-6.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794908" comment="python36-3.6.15-6.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794909" comment="python36-base-3.6.15-6.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794910" comment="python36-curses-3.6.15-6.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794911" comment="python36-dbm-3.6.15-6.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794912" comment="python36-devel-3.6.15-6.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794913" comment="python36-idle-3.6.15-6.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794914" comment="python36-testsuite-3.6.15-6.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794915" comment="python36-tk-3.6.15-6.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794916" comment="python36-tools-3.6.15-6.94.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153013" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210168" ref_url="https://bugzilla.suse.com/1210168" source="BUGZILLA"/>
		<reference ref_id="1215231" ref_url="https://bugzilla.suse.com/1215231" source="BUGZILLA"/>
		<reference ref_id="1215245" ref_url="https://bugzilla.suse.com/1215245" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 115.2.1 ESR (bsc#1215245).

- CVE-2023-4863: Fixed heap buffer overflow in libwebp (MFSA 2023-40) (bsc#1215231).

The following non-security bug was fixed:

- Fix i586 build by reducing debug info to -g1 (bsc#1210168).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-15"/>
	<updated date="2023-09-15"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1210168">SUSE bug 1210168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215231">SUSE bug 1215231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215245">SUSE bug 1215245</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009795518" comment="MozillaFirefox-115.2.1-112.179.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795408" comment="MozillaFirefox-devel-115.2.1-112.179.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795519" comment="MozillaFirefox-translations-common-115.2.1-112.179.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009795518" comment="MozillaFirefox-115.2.1-112.179.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795408" comment="MozillaFirefox-devel-115.2.1-112.179.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795519" comment="MozillaFirefox-translations-common-115.2.1-112.179.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153014" version="1" class="patch">
	<metadata>
		<title>Security update for gcc12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214052" ref_url="https://bugzilla.suse.com/1214052" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4039" ref_url="https://www.suse.com/security/cve/CVE-2023-4039/" source="CVE"/>
		<description>
This update for gcc12 fixes the following issues:

- CVE-2023-4039: Fixed incorrect stack protector for C99 VLAs on Aarch64 (bsc#1214052).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-18"/>
	<updated date="2023-09-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214052">SUSE bug 1214052</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4039/">CVE-2023-4039 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">CVE-2023-4039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796530" comment="libasan8-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796531" comment="libasan8-32bit-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796532" comment="libatomic1-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796533" comment="libatomic1-32bit-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796534" comment="libgcc_s1-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796535" comment="libgcc_s1-32bit-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796536" comment="libgfortran5-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796537" comment="libgfortran5-32bit-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796538" comment="libgomp1-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796539" comment="libgomp1-32bit-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796540" comment="libitm1-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796541" comment="libitm1-32bit-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796542" comment="liblsan0-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796543" comment="libobjc4-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796544" comment="libobjc4-32bit-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796545" comment="libquadmath0-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796353" comment="libquadmath0-32bit-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796546" comment="libstdc++6-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796547" comment="libstdc++6-32bit-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796548" comment="libstdc++6-locale-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796549" comment="libstdc++6-pp-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796550" comment="libstdc++6-pp-32bit-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796551" comment="libtsan2-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796552" comment="libubsan1-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796553" comment="libubsan1-32bit-12.3.0+git1204-1.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796530" comment="libasan8-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796531" comment="libasan8-32bit-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796532" comment="libatomic1-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796533" comment="libatomic1-32bit-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796534" comment="libgcc_s1-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796535" comment="libgcc_s1-32bit-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796536" comment="libgfortran5-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796537" comment="libgfortran5-32bit-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796538" comment="libgomp1-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796539" comment="libgomp1-32bit-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796540" comment="libitm1-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796541" comment="libitm1-32bit-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796542" comment="liblsan0-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796543" comment="libobjc4-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796544" comment="libobjc4-32bit-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796545" comment="libquadmath0-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796353" comment="libquadmath0-32bit-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796546" comment="libstdc++6-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796547" comment="libstdc++6-32bit-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796548" comment="libstdc++6-locale-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796549" comment="libstdc++6-pp-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796550" comment="libstdc++6-pp-32bit-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796551" comment="libtsan2-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796552" comment="libubsan1-12.3.0+git1204-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796553" comment="libubsan1-32bit-12.3.0+git1204-1.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153015" version="1" class="patch">
	<metadata>
		<title>Security update for gcc7 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1084842" ref_url="https://bugzilla.suse.com/1084842" source="BUGZILLA"/>
		<reference ref_id="1114592" ref_url="https://bugzilla.suse.com/1114592" source="BUGZILLA"/>
		<reference ref_id="1124644" ref_url="https://bugzilla.suse.com/1124644" source="BUGZILLA"/>
		<reference ref_id="1128794" ref_url="https://bugzilla.suse.com/1128794" source="BUGZILLA"/>
		<reference ref_id="1129389" ref_url="https://bugzilla.suse.com/1129389" source="BUGZILLA"/>
		<reference ref_id="1131264" ref_url="https://bugzilla.suse.com/1131264" source="BUGZILLA"/>
		<reference ref_id="1141897" ref_url="https://bugzilla.suse.com/1141897" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1146475" ref_url="https://bugzilla.suse.com/1146475" source="BUGZILLA"/>
		<reference ref_id="1148517" ref_url="https://bugzilla.suse.com/1148517" source="BUGZILLA"/>
		<reference ref_id="1149145" ref_url="https://bugzilla.suse.com/1149145" source="BUGZILLA"/>
		<reference ref_id="1150164" ref_url="https://bugzilla.suse.com/1150164" source="BUGZILLA"/>
		<reference ref_id="1160086" ref_url="https://bugzilla.suse.com/1160086" source="BUGZILLA"/>
		<reference ref_id="1161913" ref_url="https://bugzilla.suse.com/1161913" source="BUGZILLA"/>
		<reference ref_id="1167939" ref_url="https://bugzilla.suse.com/1167939" source="BUGZILLA"/>
		<reference ref_id="1172798" ref_url="https://bugzilla.suse.com/1172798" source="BUGZILLA"/>
		<reference ref_id="1178577" ref_url="https://bugzilla.suse.com/1178577" source="BUGZILLA"/>
		<reference ref_id="1178614" ref_url="https://bugzilla.suse.com/1178614" source="BUGZILLA"/>
		<reference ref_id="1178624" ref_url="https://bugzilla.suse.com/1178624" source="BUGZILLA"/>
		<reference ref_id="1178675" ref_url="https://bugzilla.suse.com/1178675" source="BUGZILLA"/>
		<reference ref_id="1181618" ref_url="https://bugzilla.suse.com/1181618" source="BUGZILLA"/>
		<reference ref_id="1195517" ref_url="https://bugzilla.suse.com/1195517" source="BUGZILLA"/>
		<reference ref_id="1196861" ref_url="https://bugzilla.suse.com/1196861" source="BUGZILLA"/>
		<reference ref_id="1204505" ref_url="https://bugzilla.suse.com/1204505" source="BUGZILLA"/>
		<reference ref_id="1205145" ref_url="https://bugzilla.suse.com/1205145" source="BUGZILLA"/>
		<reference ref_id="1214052" ref_url="https://bugzilla.suse.com/1214052" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-15847" ref_url="https://www.suse.com/security/cve/CVE-2019-15847/" source="CVE"/>
		<reference ref_id="CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844/" source="CVE"/>
		<reference ref_id="CVE-2023-4039" ref_url="https://www.suse.com/security/cve/CVE-2023-4039/" source="CVE"/>
		<description>
This update for gcc7 fixes the following issues:

Security issues fixed:

- CVE-2023-4039: Fixed incorrect stack protector for C99 VLAs on Aarch64 (bsc#1214052).
- CVE-2019-15847: Fixed POWER9 DARN miscompilation.  (bsc#1149145)
- CVE-2019-14250: Includes fix for LTO linker plugin heap overflow.  (bsc#1142649)

Update to GCC 7.5.0 release.

Other changes:

- Fixed KASAN kernel compile. (bsc#1205145)
- Fixed ICE with C++17 code. (bsc#1204505)
- Fixed altivec.h redefining bool in C++ which makes bool unusable (bsc#1195517):
- Adjust gnats idea of the target, fixing the build of gprbuild.  [bsc#1196861]
- Do not handle exceptions in std::thread (jsc#CAR-1182)
- add -fpatchable-function-entry feature to gcc-7.
- Fixed glibc namespace violation with getauxval. (bsc#1167939)
- Backport aarch64 Straight Line Speculation mitigation [bsc#1172798, CVE-2020-13844]
- Enable fortran for the nvptx offload compiler. 
- Update README.First-for.SuSE.packagers
- Avoid assembler errors with AVX512 gather and scatter instructions when using -masm=intel.
- Backport the aarch64 -moutline-atomics feature and accumulated fixes but not its
  default enabling.  (jsc#SLE-12209, bsc#1167939)
- Fixed memcpy miscompilation on aarch64.  (bsc#1178624, bsc#1178577)
- Fixed debug line info for try/catch.  (bsc#1178614)
- Fixed corruption of pass private -&gt;aux via DF. (gcc#94148)
- Fixed debug information issue with inlined functions and passed by reference arguments. [gcc#93888]
- Fixed register allocation issue with exception handling code on s390x.  (bsc#1161913)
- Backport PR target/92692 to fix miscompilation of some atomic code on aarch64. (bsc#1150164)
- Fixed miscompilation in vectorized code for s390x.  (bsc#1160086) [gcc#92950]
- Fixed miscompilation with thread-safe local static initialization.  [gcc#85887]
- Fixed debug info created for array definitions that complete an earlier declaration.  [bsc#1146475]
- Fixed vector shift miscompilation on s390.  (bsc#1141897)
- Add gcc7 -flive-patching patch.  [bsc#1071995, fate#323487]
- Strip -flto from $optflags.
- Disables switch jump-tables when retpolines are used.  (bsc#1131264, jsc#SLE-6738)
- Fixed ICE compiling tensorflow on aarch64.  (bsc#1129389)
- Fixed for aarch64 FMA steering pass use-after-free.  (bsc#1128794)
- Fixed ICE compiling tensorflow.  (bsc#1129389)
- Fixed s390x FP load-and-test issue.  (bsc#1124644)
- Adjust gnat manual entries in the info directory.  (bsc#1114592)
- Fixed to no longer try linking -lieee with -mieee-fp.  (bsc#1084842)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-18"/>
	<updated date="2023-09-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084842">SUSE bug 1084842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114592">SUSE bug 1114592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124644">SUSE bug 1124644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128794">SUSE bug 1128794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129389">SUSE bug 1129389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131264">SUSE bug 1131264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141897">SUSE bug 1141897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146475">SUSE bug 1146475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148517">SUSE bug 1148517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149145">SUSE bug 1149145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150164">SUSE bug 1150164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160086">SUSE bug 1160086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161913">SUSE bug 1161913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167939">SUSE bug 1167939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172798">SUSE bug 1172798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178577">SUSE bug 1178577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178614">SUSE bug 1178614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178624">SUSE bug 1178624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178675">SUSE bug 1178675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181618">SUSE bug 1181618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195517">SUSE bug 1195517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196861">SUSE bug 1196861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204505">SUSE bug 1204505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205145">SUSE bug 1205145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214052">SUSE bug 1214052</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14250">CVE-2019-14250 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15847/">CVE-2019-15847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15847">CVE-2019-15847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13844">CVE-2020-13844 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4039/">CVE-2023-4039 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">CVE-2023-4039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796554" comment="libasan4-7.5.0+r278197-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796555" comment="libasan4-32bit-7.5.0+r278197-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796364" comment="libcilkrts5-7.5.0+r278197-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796365" comment="libcilkrts5-32bit-7.5.0+r278197-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796556" comment="libgfortran4-7.5.0+r278197-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796557" comment="libgfortran4-32bit-7.5.0+r278197-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796558" comment="libubsan0-7.5.0+r278197-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796559" comment="libubsan0-32bit-7.5.0+r278197-13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796554" comment="libasan4-7.5.0+r278197-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796555" comment="libasan4-32bit-7.5.0+r278197-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796364" comment="libcilkrts5-7.5.0+r278197-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796365" comment="libcilkrts5-32bit-7.5.0+r278197-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796556" comment="libgfortran4-7.5.0+r278197-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796557" comment="libgfortran4-32bit-7.5.0+r278197-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796558" comment="libubsan0-7.5.0+r278197-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796559" comment="libubsan0-32bit-7.5.0+r278197-13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153016" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201978" ref_url="https://bugzilla.suse.com/1201978" source="BUGZILLA"/>
		<reference ref_id="1210411" ref_url="https://bugzilla.suse.com/1210411" source="BUGZILLA"/>
		<reference ref_id="1210412" ref_url="https://bugzilla.suse.com/1210412" source="BUGZILLA"/>
		<reference ref_id="1214768" ref_url="https://bugzilla.suse.com/1214768" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3709" ref_url="https://www.suse.com/security/cve/CVE-2016-3709/" source="CVE"/>
		<reference ref_id="CVE-2023-28484" ref_url="https://www.suse.com/security/cve/CVE-2023-28484/" source="CVE"/>
		<reference ref_id="CVE-2023-29469" ref_url="https://www.suse.com/security/cve/CVE-2023-29469/" source="CVE"/>
		<reference ref_id="CVE-2023-39615" ref_url="https://www.suse.com/security/cve/CVE-2023-39615/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2023-29469: Fixed not deterministic hashing of empty dict strings (bsc#1210412).
- CVE-2023-28484: Fixed NULL dereference in xmlSchemaFixupComplexType (bsc#1210411).
- CVE-2023-39615: Fixed crafted xml can cause global buffer overflow (bsc#1214768).
- CVE-2016-3709: Fixed cross-site scripting vulnerability in libxml (bsc#1201978).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-18"/>
	<updated date="2023-09-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201978">SUSE bug 1201978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210411">SUSE bug 1210411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210412">SUSE bug 1210412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214768">SUSE bug 1214768</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-3709/">CVE-2016-3709 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3709">CVE-2016-3709 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28484/">CVE-2023-28484 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28484">CVE-2023-28484 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29469/">CVE-2023-29469 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29469">CVE-2023-29469 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39615/">CVE-2023-39615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39615">CVE-2023-39615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009782037" comment="libxml2-2-2.9.4-46.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782038" comment="libxml2-2-32bit-2.9.4-46.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782013" comment="libxml2-doc-2.9.4-46.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782039" comment="libxml2-tools-2.9.4-46.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782040" comment="python-libxml2-2.9.4-46.65.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009782037" comment="libxml2-2-2.9.4-46.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782038" comment="libxml2-2-32bit-2.9.4-46.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782013" comment="libxml2-doc-2.9.4-46.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782039" comment="libxml2-tools-2.9.4-46.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782040" comment="python-libxml2-2.9.4-46.65.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153017" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1213616" ref_url="https://bugzilla.suse.com/1213616" source="BUGZILLA"/>
		<reference ref_id="1214082" ref_url="https://bugzilla.suse.com/1214082" source="BUGZILLA"/>
		<reference ref_id="1214083" ref_url="https://bugzilla.suse.com/1214083" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-40982: Fixed x86/Intel Gather Data Sampling (XSA-435) (bsc#1214083).
- CVE-2023-20569: Fixed Speculative Return Stack Overflow (XSA-434) (bsc#1214082).
- CVE-2023-20593: Fixed Zenbleed vulnerability (XSA-433) (bsc#1213616).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-19"/>
	<updated date="2023-09-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213616">SUSE bug 1213616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214082">SUSE bug 1214082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214083">SUSE bug 1214083</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009782041" comment="xen-4.9.4_40-3.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782042" comment="xen-doc-html-4.9.4_40-3.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782043" comment="xen-libs-4.9.4_40-3.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782044" comment="xen-libs-32bit-4.9.4_40-3.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782045" comment="xen-tools-4.9.4_40-3.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782046" comment="xen-tools-domU-4.9.4_40-3.123.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009782041" comment="xen-4.9.4_40-3.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782042" comment="xen-doc-html-4.9.4_40-3.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782043" comment="xen-libs-4.9.4_40-3.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782044" comment="xen-libs-32bit-4.9.4_40-3.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782045" comment="xen-tools-4.9.4_40-3.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782046" comment="xen-tools-domU-4.9.4_40-3.123.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153018" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192760" ref_url="https://bugzilla.suse.com/1192760" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41229" ref_url="https://www.suse.com/security/cve/CVE-2021-41229/" source="CVE"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2021-41229: Fixed leaking buffers stored in cstates cache (bsc#1192760).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-19"/>
	<updated date="2023-09-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192760">SUSE bug 1192760</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41229/">CVE-2021-41229 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41229">CVE-2021-41229 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009780678" comment="bluez-5.13-5.42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780679" comment="libbluetooth3-5.13-5.42.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153019" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214674" ref_url="https://bugzilla.suse.com/1214674" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-22217" ref_url="https://www.suse.com/security/cve/CVE-2020-22217/" source="CVE"/>
		<description>
This update for libcares2 fixes the following issues:

- CVE-2020-22217: Fixed an out of bounds read in ares_parse_soa_reply(). (bsc#1214674)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-19"/>
	<updated date="2023-09-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214674">SUSE bug 1214674</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-22217/">CVE-2020-22217 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22217">CVE-2020-22217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780682" comment="libcares2-1.9.1-9.18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780682" comment="libcares2-1.9.1-9.18.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153020" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1200962" ref_url="https://bugzilla.suse.com/1200962" source="BUGZILLA"/>
		<reference ref_id="1206080" ref_url="https://bugzilla.suse.com/1206080" source="BUGZILLA"/>
		<reference ref_id="1206556" ref_url="https://bugzilla.suse.com/1206556" source="BUGZILLA"/>
		<reference ref_id="1208037" ref_url="https://bugzilla.suse.com/1208037" source="BUGZILLA"/>
		<reference ref_id="1208038" ref_url="https://bugzilla.suse.com/1208038" source="BUGZILLA"/>
		<reference ref_id="1208040" ref_url="https://bugzilla.suse.com/1208040" source="BUGZILLA"/>
		<reference ref_id="1208409" ref_url="https://bugzilla.suse.com/1208409" source="BUGZILLA"/>
		<reference ref_id="1209642" ref_url="https://bugzilla.suse.com/1209642" source="BUGZILLA"/>
		<reference ref_id="1210297" ref_url="https://bugzilla.suse.com/1210297" source="BUGZILLA"/>
		<reference ref_id="1210733" ref_url="https://bugzilla.suse.com/1210733" source="BUGZILLA"/>
		<reference ref_id="1213282" ref_url="https://bugzilla.suse.com/1213282" source="BUGZILLA"/>
		<reference ref_id="1213458" ref_url="https://bugzilla.suse.com/1213458" source="BUGZILLA"/>
		<reference ref_id="1214565" ref_url="https://bugzilla.suse.com/1214565" source="BUGZILLA"/>
		<reference ref_id="1214567" ref_url="https://bugzilla.suse.com/1214567" source="BUGZILLA"/>
		<reference ref_id="1214579" ref_url="https://bugzilla.suse.com/1214579" source="BUGZILLA"/>
		<reference ref_id="1214580" ref_url="https://bugzilla.suse.com/1214580" source="BUGZILLA"/>
		<reference ref_id="1214604" ref_url="https://bugzilla.suse.com/1214604" source="BUGZILLA"/>
		<reference ref_id="1214611" ref_url="https://bugzilla.suse.com/1214611" source="BUGZILLA"/>
		<reference ref_id="1214619" ref_url="https://bugzilla.suse.com/1214619" source="BUGZILLA"/>
		<reference ref_id="1214620" ref_url="https://bugzilla.suse.com/1214620" source="BUGZILLA"/>
		<reference ref_id="1214623" ref_url="https://bugzilla.suse.com/1214623" source="BUGZILLA"/>
		<reference ref_id="1214624" ref_url="https://bugzilla.suse.com/1214624" source="BUGZILLA"/>
		<reference ref_id="1214625" ref_url="https://bugzilla.suse.com/1214625" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19726" ref_url="https://www.suse.com/security/cve/CVE-2020-19726/" source="CVE"/>
		<reference ref_id="CVE-2021-32256" ref_url="https://www.suse.com/security/cve/CVE-2021-32256/" source="CVE"/>
		<reference ref_id="CVE-2022-35205" ref_url="https://www.suse.com/security/cve/CVE-2022-35205/" source="CVE"/>
		<reference ref_id="CVE-2022-35206" ref_url="https://www.suse.com/security/cve/CVE-2022-35206/" source="CVE"/>
		<reference ref_id="CVE-2022-4285" ref_url="https://www.suse.com/security/cve/CVE-2022-4285/" source="CVE"/>
		<reference ref_id="CVE-2022-44840" ref_url="https://www.suse.com/security/cve/CVE-2022-44840/" source="CVE"/>
		<reference ref_id="CVE-2022-45703" ref_url="https://www.suse.com/security/cve/CVE-2022-45703/" source="CVE"/>
		<reference ref_id="CVE-2022-47673" ref_url="https://www.suse.com/security/cve/CVE-2022-47673/" source="CVE"/>
		<reference ref_id="CVE-2022-47695" ref_url="https://www.suse.com/security/cve/CVE-2022-47695/" source="CVE"/>
		<reference ref_id="CVE-2022-47696" ref_url="https://www.suse.com/security/cve/CVE-2022-47696/" source="CVE"/>
		<reference ref_id="CVE-2022-48063" ref_url="https://www.suse.com/security/cve/CVE-2022-48063/" source="CVE"/>
		<reference ref_id="CVE-2022-48064" ref_url="https://www.suse.com/security/cve/CVE-2022-48064/" source="CVE"/>
		<reference ref_id="CVE-2022-48065" ref_url="https://www.suse.com/security/cve/CVE-2022-48065/" source="CVE"/>
		<reference ref_id="CVE-2023-0687" ref_url="https://www.suse.com/security/cve/CVE-2023-0687/" source="CVE"/>
		<reference ref_id="CVE-2023-1579" ref_url="https://www.suse.com/security/cve/CVE-2023-1579/" source="CVE"/>
		<reference ref_id="CVE-2023-1972" ref_url="https://www.suse.com/security/cve/CVE-2023-1972/" source="CVE"/>
		<reference ref_id="CVE-2023-2222" ref_url="https://www.suse.com/security/cve/CVE-2023-2222/" source="CVE"/>
		<reference ref_id="CVE-2023-25585" ref_url="https://www.suse.com/security/cve/CVE-2023-25585/" source="CVE"/>
		<reference ref_id="CVE-2023-25587" ref_url="https://www.suse.com/security/cve/CVE-2023-25587/" source="CVE"/>
		<reference ref_id="CVE-2023-25588" ref_url="https://www.suse.com/security/cve/CVE-2023-25588/" source="CVE"/>
		<description>
This update for binutils fixes the following issues:

Update to version 2.41 [jsc#PED-5778]:

* The MIPS port now supports the Sony Interactive Entertainment Allegrex
  processor, used with the PlayStation Portable, which implements the MIPS
  II ISA along with a single-precision FPU and a few implementation-specific
  integer instructions.
* Objdump's --private option can now be used on PE format files to display the
  fields in the file header and section headers.
* New versioned release of libsframe: libsframe.so.1.  This release introduces
  versioned symbols with version node name LIBSFRAME_1.0.  This release also
  updates the ABI in an incompatible way: this includes removal of
  sframe_get_funcdesc_with_addr API, change in the behavior of
  sframe_fre_get_ra_offset and sframe_fre_get_fp_offset APIs.
* SFrame Version 2 is now the default (and only) format version supported by
  gas, ld, readelf and objdump.
* Add command-line option, --strip-section-headers, to objcopy and strip to
  remove ELF section header from ELF file.
* The RISC-V port now supports the following new standard extensions:

  - Zicond (conditional zero instructions)
  - Zfa (additional floating-point instructions)
  - Zvbb, Zvbc, Zvkg, Zvkned, Zvknh[ab], Zvksed, Zvksh, Zvkn, Zvknc, Zvkng,
    Zvks, Zvksc, Zvkg, Zvkt (vector crypto instructions)

* The RISC-V port now supports the following vendor-defined extensions:

  - XVentanaCondOps

* Add support for Intel FRED, LKGS and AMX-COMPLEX instructions.
* A new .insn directive is recognized by x86 gas.
* Add SME2 support to the AArch64 port.
* The linker now accepts a command line option of --remap-inputs
  &lt;PATTERN&gt;=&lt;FILE&gt; to relace any input file that matches &lt;PATTERN&gt; with
  &lt;FILE&gt;.  In addition the option --remap-inputs-file=&lt;FILE&gt; can be used to
  specify a file containing any number of these remapping directives.
* The linker command line option --print-map-locals can be used to include
  local symbols in a linker map.  (ELF targets only).
* For most ELF based targets, if the --enable-linker-version option is used
  then the version of the linker will be inserted as a string into the .comment
  section.
* The linker script syntax has a new command for output sections: ASCIZ 'string'
  This will insert a zero-terminated string at the current location.
* Add command-line option, -z nosectionheader, to omit ELF section
  header.

- Contains fixes for these non-CVEs (not security bugs per upstreams SECURITY.md):

  * bsc#1209642 aka CVE-2023-1579 aka PR29988
  * bsc#1210297 aka CVE-2023-1972 aka PR30285
  * bsc#1210733 aka CVE-2023-2222 aka PR29936
  * bsc#1213458 aka CVE-2021-32256 aka PR105039 (gcc)
  * bsc#1214565 aka CVE-2020-19726 aka PR26240
  * bsc#1214567 aka CVE-2022-35206 aka PR29290
  * bsc#1214579 aka CVE-2022-35205 aka PR29289
  * bsc#1214580 aka CVE-2022-44840 aka PR29732
  * bsc#1214604 aka CVE-2022-45703 aka PR29799
  * bsc#1214611 aka CVE-2022-48065 aka PR29925
  * bsc#1214619 aka CVE-2022-48064 aka PR29922
  * bsc#1214620 aka CVE-2022-48063 aka PR29924
  * bsc#1214623 aka CVE-2022-47696 aka PR29677
  * bsc#1214624 aka CVE-2022-47695 aka PR29846
  * bsc#1214625 aka CVE-2022-47673 aka PR29876

- Fixed a compatibility problem caused by binutils-revert-rela.diff in
  SLE codestreams. Needed for update of glibc as that would otherwise pick up
  the broken relative relocs support.  [bsc#1213282, jsc#PED-1435]

- Document fixed CVEs:

  * bsc#1208037 aka CVE-2023-25588 aka PR29677
  * bsc#1208038 aka CVE-2023-25587 aka PR29846
  * bsc#1208040 aka CVE-2023-25585 aka PR29892
  * bsc#1208409 aka CVE-2023-0687 aka PR29444

- Enable bpf-none cross target and add bpf-none to the multitarget
  set of supported targets.
- Disable packed-relative-relocs for old codestreams.  They generate
  buggy relocations when binutils-revert-rela.diff is active.
  [bsc#1206556]
- Disable ZSTD debug section compress by default.
- Enable zstd compression algorithm (instead of zlib)
  for debug info sections by default.
- Pack libgprofng only for supported platforms.
- Move libgprofng-related libraries to the proper locations (packages).
- Add --without=bootstrap for skipping of bootstrap (faster testing
  of the package).

Update to version 2.40:

* Objdump has a new command line option --show-all-symbols which will make it
  display all symbols that match a given address when disassembling.  (Normally
  only the first symbol that matches an address is shown).
* Add --enable-colored-disassembly configure time option to enable colored
  disassembly output by default, if the output device is a terminal.  Note,
  this configure option is disabled by default.
* DCO signed contributions are now accepted.
* objcopy --decompress-debug-sections now supports zstd compressed debug
  sections.  The new option --compress-debug-sections=zstd compresses debug
  sections with zstd.
* addr2line and objdump --dwarf now support zstd compressed debug sections.
* The dlltool program now accepts --deterministic-libraries and
  --non-deterministic-libraries as command line options to control whether or
  not it generates deterministic output libraries.  If neither of these options
  are used the default is whatever was set when the binutils were configured.
* readelf and objdump now have a newly added option --sframe which dumps the
  SFrame section.
* Add support for Intel RAO-INT instructions.
* Add support for Intel AVX-NE-CONVERT instructions.
* Add support for Intel MSRLIST instructions.
* Add support for Intel WRMSRNS instructions.
* Add support for Intel CMPccXADD instructions.
* Add support for Intel AVX-VNNI-INT8 instructions.
* Add support for Intel AVX-IFMA instructions.
* Add support for Intel PREFETCHI instructions.
* Add support for Intel AMX-FP16 instructions.
* gas now supports --compress-debug-sections=zstd to compress
  debug sections with zstd.
* Add --enable-default-compressed-debug-sections-algorithm={zlib,zstd}
  that selects the default compression algorithm
  for --enable-compressed-debug-sections.
* Add support for various T-Head extensions (XTheadBa, XTheadBb, XTheadBs,
  XTheadCmo, XTheadCondMov, XTheadFMemIdx, XTheadFmv, XTheadInt, XTheadMemIdx,
  XTheadMemPair, XTheadMac, and XTheadSync) from version 2.0 of the T-Head
  ISA manual, which are implemented in the Allwinner D1.
* Add support for the RISC-V Zawrs extension, version 1.0-rc4.
* Add support for Cortex-X1C for Arm.
* New command line option --gsframe to generate SFrame unwind information
  on x86_64 and aarch64 targets.
* The linker has a new command line option to suppress the generation of any
  warning or error messages.  This can be useful when there is a need to create
  a known non-working binary.  The option is -w or --no-warnings.
* ld now supports zstd compressed debug sections.  The new option
  --compress-debug-sections=zstd compresses debug sections with zstd.
* Add --enable-default-compressed-debug-sections-algorithm={zlib,zstd}
  that selects the default compression algorithm
  for --enable-compressed-debug-sections.
* Remove support for -z bndplt (MPX prefix instructions).

- Includes fixes for these CVEs:

  * bsc#1206080 aka CVE-2022-4285 aka PR29699

- Enable by default: --enable-colored-disassembly.
- fix build on x86_64_vX platforms 
- add arm32 avoid copyreloc patch for PR16177 (bsc#1200962)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-20"/>
	<updated date="2023-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200962">SUSE bug 1200962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206080">SUSE bug 1206080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206556">SUSE bug 1206556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208037">SUSE bug 1208037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208038">SUSE bug 1208038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208040">SUSE bug 1208040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208409">SUSE bug 1208409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209642">SUSE bug 1209642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210297">SUSE bug 1210297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210733">SUSE bug 1210733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213282">SUSE bug 1213282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213458">SUSE bug 1213458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214565">SUSE bug 1214565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214567">SUSE bug 1214567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214579">SUSE bug 1214579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214580">SUSE bug 1214580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214604">SUSE bug 1214604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214611">SUSE bug 1214611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214619">SUSE bug 1214619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214620">SUSE bug 1214620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214623">SUSE bug 1214623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214624">SUSE bug 1214624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214625">SUSE bug 1214625</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-19726/">CVE-2020-19726 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19726">CVE-2020-19726 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32256/">CVE-2021-32256 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32256">CVE-2021-32256 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-35205/">CVE-2022-35205 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35205">CVE-2022-35205 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-35206/">CVE-2022-35206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35206">CVE-2022-35206 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4285/">CVE-2022-4285 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4285">CVE-2022-4285 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-44840/">CVE-2022-44840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44840">CVE-2022-44840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45703/">CVE-2022-45703 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45703">CVE-2022-45703 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47673/">CVE-2022-47673 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47673">CVE-2022-47673 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47695/">CVE-2022-47695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47695">CVE-2022-47695 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47696/">CVE-2022-47696 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47696">CVE-2022-47696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-48063/">CVE-2022-48063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48063">CVE-2022-48063 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48064/">CVE-2022-48064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48064">CVE-2022-48064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-48065/">CVE-2022-48065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48065">CVE-2022-48065 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0687/">CVE-2023-0687 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0687">CVE-2023-0687 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1579/">CVE-2023-1579 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1579">CVE-2023-1579 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1972/">CVE-2023-1972 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1972">CVE-2023-1972 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2222/">CVE-2023-2222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-2222">CVE-2023-2222 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25585/">CVE-2023-25585 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25585">CVE-2023-25585 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25587/">CVE-2023-25587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-25587">CVE-2023-25587 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25588/">CVE-2023-25588 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25588">CVE-2023-25588 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009794663" comment="binutils-2.41-9.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794664" comment="binutils-devel-2.41-9.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794665" comment="libctf-nobfd0-2.41-9.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794666" comment="libctf0-2.41-9.53.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009794663" comment="binutils-2.41-9.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794664" comment="binutils-devel-2.41-9.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794665" comment="libctf-nobfd0-2.41-9.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794666" comment="libctf0-2.41-9.53.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153021" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215189" ref_url="https://bugzilla.suse.com/1215189" source="BUGZILLA"/>
		<reference ref_id="1215191" ref_url="https://bugzilla.suse.com/1215191" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4874" ref_url="https://www.suse.com/security/cve/CVE-2023-4874/" source="CVE"/>
		<reference ref_id="CVE-2023-4875" ref_url="https://www.suse.com/security/cve/CVE-2023-4875/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2023-4874: Fixed NULL pointer dereference when composing an email (bsc#1215189).
- CVE-2023-4875: Fixed NULL pointer dereference when receiving an email (bsc#1215191).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-20"/>
	<updated date="2023-09-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215189">SUSE bug 1215189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215191">SUSE bug 1215191</bugzilla>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4874/">CVE-2023-4874 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4874">CVE-2023-4874 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4875/">CVE-2023-4875 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4875">CVE-2023-4875 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794667" comment="mutt-1.10.1-55.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153022" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214692" ref_url="https://bugzilla.suse.com/1214692" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2023-40217: Fixed TLS handshake bypass on closed sockets (bsc#1214692).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-20"/>
	<updated date="2023-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214692">SUSE bug 1214692</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009794892" comment="libpython2_7-1_0-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794893" comment="libpython2_7-1_0-32bit-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794894" comment="python-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794895" comment="python-32bit-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794896" comment="python-base-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794897" comment="python-base-32bit-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794898" comment="python-curses-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794899" comment="python-demo-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794900" comment="python-devel-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794901" comment="python-doc-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794902" comment="python-doc-pdf-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794903" comment="python-gdbm-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794904" comment="python-idle-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794905" comment="python-tk-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794906" comment="python-xml-2.7.18-28.102.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009794892" comment="libpython2_7-1_0-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794893" comment="libpython2_7-1_0-32bit-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794894" comment="python-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794895" comment="python-32bit-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794896" comment="python-base-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794897" comment="python-base-32bit-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794898" comment="python-curses-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794899" comment="python-demo-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794900" comment="python-devel-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794901" comment="python-doc-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794902" comment="python-doc-pdf-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794903" comment="python-gdbm-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794904" comment="python-idle-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794905" comment="python-tk-2.7.18-28.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794906" comment="python-xml-2.7.18-28.102.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153023" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1212230" ref_url="https://bugzilla.suse.com/1212230" source="BUGZILLA"/>
		<reference ref_id="1214254" ref_url="https://bugzilla.suse.com/1214254" source="BUGZILLA"/>
		<reference ref_id="1215204" ref_url="https://bugzilla.suse.com/1215204" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32360" ref_url="https://www.suse.com/security/cve/CVE-2023-32360/" source="CVE"/>
		<reference ref_id="CVE-2023-34241" ref_url="https://www.suse.com/security/cve/CVE-2023-34241/" source="CVE"/>
		<reference ref_id="CVE-2023-4504" ref_url="https://www.suse.com/security/cve/CVE-2023-4504/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2023-4504: Fixed heap overflow in OpenPrinting CUPS Postscript Parsing (bsc#1215204).
- CVE-2023-34241: Fixed a use-after-free problem in cupsdAcceptClient() (bsc#1212230).
- CVE-2023-32360: Fixed information leak through Cups-Get-Document operation (bsc#1214254).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-20"/>
	<updated date="2023-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212230">SUSE bug 1212230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214254">SUSE bug 1214254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215204">SUSE bug 1215204</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32360/">CVE-2023-32360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32360">CVE-2023-32360 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34241/">CVE-2023-34241 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34241">CVE-2023-34241 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4504/">CVE-2023-4504 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4504">CVE-2023-4504 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009797262" comment="cups-1.7.5-20.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797263" comment="cups-client-1.7.5-20.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797264" comment="cups-libs-1.7.5-20.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797261" comment="cups-libs-32bit-1.7.5-20.46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009797262" comment="cups-1.7.5-20.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797263" comment="cups-client-1.7.5-20.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797264" comment="cups-libs-1.7.5-20.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797261" comment="cups-libs-32bit-1.7.5-20.46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153024" version="1" class="patch">
	<metadata>
		<title>Security update for xrdp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214805" ref_url="https://bugzilla.suse.com/1214805" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40184" ref_url="https://www.suse.com/security/cve/CVE-2023-40184/" source="CVE"/>
		<description>
This update for xrdp fixes the following issues:

- CVE-2023-40184: Fixed restriction bypass via improper session handling (bsc#1214805).		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-20"/>
	<updated date="2023-09-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214805">SUSE bug 1214805</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40184/">CVE-2023-40184 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40184">CVE-2023-40184 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797274" comment="xrdp-0.9.0~git.1456906198.f422461-21.36.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153025" version="1" class="patch">
	<metadata>
		<title>Security update for busybox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214538" ref_url="https://bugzilla.suse.com/1214538" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48174" ref_url="https://www.suse.com/security/cve/CVE-2022-48174/" source="CVE"/>
		<description>
This update for busybox fixes the following issues:

- CVE-2022-48174: Fixed stack overflow vulnerability. (bsc#1214538)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-22"/>
	<updated date="2023-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214538">SUSE bug 1214538</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48174/">CVE-2022-48174 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48174">CVE-2022-48174 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781636" comment="busybox-1.35.0-4.12.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781636" comment="busybox-1.35.0-4.12.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153026" version="1" class="patch">
	<metadata>
		<title>Security update for postfix (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1211196" ref_url="https://bugzilla.suse.com/1211196" source="BUGZILLA"/>
		<reference ref_id="1215372" ref_url="https://bugzilla.suse.com/1215372" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32182" ref_url="https://www.suse.com/security/cve/CVE-2023-32182/" source="CVE"/>
		<description>
This update for postfix fixes the following issues:

Security fixes:

- CVE-2023-32182: Fixed config_postfix SUSE specific script using potentially bad /tmp file (bsc#1211196).

Other fixes:

- postfix: config.postfix causes too tight permission on main.cf (bsc#1215372).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-22"/>
	<updated date="2023-09-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211196">SUSE bug 1211196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215372">SUSE bug 1215372</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-32182/">CVE-2023-32182 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32182">CVE-2023-32182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009797271" comment="postfix-3.2.10-3.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797091" comment="postfix-doc-3.2.10-3.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797272" comment="postfix-mysql-3.2.10-3.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153027" version="1" class="patch">
	<metadata>
		<title>Security update for exempi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214486" ref_url="https://bugzilla.suse.com/1214486" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-18651" ref_url="https://www.suse.com/security/cve/CVE-2020-18651/" source="CVE"/>
		<description>
This update for exempi fixes the following issues:

- CVE-2020-18651: Fixed a buffer overflow in ID3 support (bsc#1214486).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-22"/>
	<updated date="2023-09-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214486">SUSE bug 1214486</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-18651/">CVE-2020-18651 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18651">CVE-2020-18651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797273" comment="libexempi3-2.2.1-5.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153028" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214578" ref_url="https://bugzilla.suse.com/1214578" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-21679" ref_url="https://www.suse.com/security/cve/CVE-2020-21679/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2020-21679: Fixed a buffer overflow in WritePCXImage function in pcx.c which may allow a remote attackers to cause a denial of service. (bsc#1214578)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-22"/>
	<updated date="2023-09-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214578">SUSE bug 1214578</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-21679/">CVE-2020-21679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21679">CVE-2020-21679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009780683" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.198.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780684" comment="ImageMagick-config-6-upstream-6.8.8.1-71.198.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780685" comment="libMagickCore-6_Q16-1-6.8.8.1-71.198.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780686" comment="libMagickWand-6_Q16-1-6.8.8.1-71.198.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153029" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185895" ref_url="https://bugzilla.suse.com/1185895" source="BUGZILLA"/>
		<reference ref_id="1214670" ref_url="https://bugzilla.suse.com/1214670" source="BUGZILLA"/>
		<reference ref_id="1214672" ref_url="https://bugzilla.suse.com/1214672" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32490" ref_url="https://www.suse.com/security/cve/CVE-2021-32490/" source="CVE"/>
		<reference ref_id="CVE-2021-46310" ref_url="https://www.suse.com/security/cve/CVE-2021-46310/" source="CVE"/>
		<reference ref_id="CVE-2021-46312" ref_url="https://www.suse.com/security/cve/CVE-2021-46312/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-46310: Fixed divide by zero in IW44Image.cpp (bsc#1214670).
- CVE-2021-46312: Fixed divide by zero in IW44EncodeCodec.cpp (bsc#1214672).
- CVE-2021-32490: Fixed out of bounds write in function DJVU:filter_bv() via crafted djvu file (bsc#1185895).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-25"/>
	<updated date="2023-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185895">SUSE bug 1185895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214670">SUSE bug 1214670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214672">SUSE bug 1214672</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32490/">CVE-2021-32490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32490">CVE-2021-32490 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46310/">CVE-2021-46310 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46310">CVE-2021-46310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46312/">CVE-2021-46312 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46312">CVE-2021-46312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780977" comment="libdjvulibre21-3.5.25.3-5.22.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780977" comment="libdjvulibre21-3.5.25.3-5.22.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153030" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214666" ref_url="https://bugzilla.suse.com/1214666" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-41080" ref_url="https://www.suse.com/security/cve/CVE-2023-41080/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2023-41080: Fixed URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature (bsc#1214666).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-25"/>
	<updated date="2023-09-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214666">SUSE bug 1214666</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41080/">CVE-2023-41080 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41080">CVE-2023-41080 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009798095" comment="tomcat-8.0.53-29.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798096" comment="tomcat-admin-webapps-8.0.53-29.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798097" comment="tomcat-docs-webapp-8.0.53-29.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798098" comment="tomcat-el-3_0-api-8.0.53-29.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798099" comment="tomcat-javadoc-8.0.53-29.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798100" comment="tomcat-jsp-2_3-api-8.0.53-29.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798101" comment="tomcat-lib-8.0.53-29.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798102" comment="tomcat-servlet-3_1-api-8.0.53-29.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798103" comment="tomcat-webapps-8.0.53-29.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153031" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1213284" ref_url="https://bugzilla.suse.com/1213284" source="BUGZILLA"/>
		<reference ref_id="1214735" ref_url="https://bugzilla.suse.com/1214735" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38802" ref_url="https://www.suse.com/security/cve/CVE-2023-38802/" source="CVE"/>
		<reference ref_id="CVE-2023-41358" ref_url="https://www.suse.com/security/cve/CVE-2023-41358/" source="CVE"/>
		<description>
This update for quagga fixes the following issues:

  - CVE-2023-38802: Fixed bad length handling in BGP attribute handling (bsc#1213284).
  - CVE-2023-41358: Fixed possible crash when processing NLRIs if the attribute length is zero (bsc#1214735).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-26"/>
	<updated date="2023-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213284">SUSE bug 1213284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214735">SUSE bug 1214735</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38802/">CVE-2023-38802 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38802">CVE-2023-38802 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41358/">CVE-2023-41358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41358">CVE-2023-41358 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009797692" comment="libfpm_pb0-1.1.1-17.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797693" comment="libospf0-1.1.1-17.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797694" comment="libospfapiclient0-1.1.1-17.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797695" comment="libquagga_pb0-1.1.1-17.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797696" comment="libzebra1-1.1.1-17.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797697" comment="quagga-1.1.1-17.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009797692" comment="libfpm_pb0-1.1.1-17.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797693" comment="libospf0-1.1.1-17.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797694" comment="libospfapiclient0-1.1.1-17.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797695" comment="libquagga_pb0-1.1.1-17.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797696" comment="libzebra1-1.1.1-17.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797697" comment="quagga-1.1.1-17.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153032" version="1" class="patch">
	<metadata>
		<title>Security update for libwebp (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215231" ref_url="https://bugzilla.suse.com/1215231" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<description>
This update for libwebp fixes the following issues:

 - CVE-2023-4863: Fixed a heap buffer overflow (bsc#1215231).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-26"/>
	<updated date="2023-09-26"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1215231">SUSE bug 1215231</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009798092" comment="libwebp5-0.4.3-4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798093" comment="libwebp5-32bit-0.4.3-4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798094" comment="libwebpdemux1-0.4.3-4.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009798092" comment="libwebp5-0.4.3-4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798093" comment="libwebp5-32bit-0.4.3-4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798094" comment="libwebpdemux1-0.4.3-4.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153033" version="1" class="patch">
	<metadata>
		<title>Security update for libpng15 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1141493" ref_url="https://bugzilla.suse.com/1141493" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652/" source="CVE"/>
		<description>
This update for libpng15 fixes the following issues:

Security issue fixed:

- CVE-2017-12652: Fixed an Input Validation Error related to the length of chunks (bsc#1141493).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141493">SUSE bug 1141493</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12652">CVE-2017-12652 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797550" comment="libpng15-15-1.5.22-10.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153034" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215309" ref_url="https://bugzilla.suse.com/1215309" source="BUGZILLA"/>
		<reference ref_id="1215575" ref_url="https://bugzilla.suse.com/1215575" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5168" ref_url="https://www.suse.com/security/cve/CVE-2023-5168/" source="CVE"/>
		<reference ref_id="CVE-2023-5169" ref_url="https://www.suse.com/security/cve/CVE-2023-5169/" source="CVE"/>
		<reference ref_id="CVE-2023-5171" ref_url="https://www.suse.com/security/cve/CVE-2023-5171/" source="CVE"/>
		<reference ref_id="CVE-2023-5174" ref_url="https://www.suse.com/security/cve/CVE-2023-5174/" source="CVE"/>
		<reference ref_id="CVE-2023-5176" ref_url="https://www.suse.com/security/cve/CVE-2023-5176/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 115.3.0 ESR (MFSA 2023-42, bsc#1215575):

Security fixes:

- CVE-2023-5168: Out-of-bounds write in FilterNodeD2D1 (bmo#1846683).
- CVE-2023-5169: Out-of-bounds write in PathOps (bmo#1846685).
- CVE-2023-5171: Use-after-free in Ion Compiler (bmo#1851599).
- CVE-2023-5174: Double-free in process spawning on Windows (bmo#1848454).
- CVE-2023-5176: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 (bmo#1836353, bmo#1842674, bmo#1843824, bmo#1843962, bmo#1848890, bmo#1850180, bmo#1850983, bmo#1851195).

Other fixes:

  - Fix broken build with newer binutils (bsc#1215309)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215309">SUSE bug 1215309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215575">SUSE bug 1215575</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5168/">CVE-2023-5168 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5168">CVE-2023-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5169/">CVE-2023-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5169">CVE-2023-5169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5171/">CVE-2023-5171 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5171">CVE-2023-5171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5174/">CVE-2023-5174 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5174">CVE-2023-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5176/">CVE-2023-5176 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5176">CVE-2023-5176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009798854" comment="MozillaFirefox-115.3.0-112.182.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798792" comment="MozillaFirefox-devel-115.3.0-112.182.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798855" comment="MozillaFirefox-translations-common-115.3.0-112.182.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009798854" comment="MozillaFirefox-115.3.0-112.182.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798792" comment="MozillaFirefox-devel-115.3.0-112.182.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798855" comment="MozillaFirefox-translations-common-115.3.0-112.182.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153035" version="1" class="patch">
	<metadata>
		<title>Security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215713" ref_url="https://bugzilla.suse.com/1215713" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-35945" ref_url="https://www.suse.com/security/cve/CVE-2023-35945/" source="CVE"/>
		<description>
This update for nghttp2 fixes the following issues:
  
- CVE-2023-35945: Fixed memory leak when PUSH_PROMISE or HEADERS frame cannot be sent (bsc#1215713).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215713">SUSE bug 1215713</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-35945/">CVE-2023-35945 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35945">CVE-2023-35945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798970" comment="libnghttp2-14-1.39.2-3.10.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798970" comment="libnghttp2-14-1.39.2-3.10.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153036" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1088255" ref_url="https://bugzilla.suse.com/1088255" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-9234" ref_url="https://www.suse.com/security/cve/CVE-2018-9234/" source="CVE"/>
		<description>
This update for gpg2 fixes the following issues:

- CVE-2018-9234: Fixed unenforced configuration allows for apparently valid certifications actually signed by signing subkeys (bsc#1088255).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-28"/>
	<updated date="2023-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088255">SUSE bug 1088255</bugzilla>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-9234/">CVE-2018-9234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9234">CVE-2018-9234 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009798104" comment="gpg2-2.0.24-9.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798026" comment="gpg2-lang-2.0.24-9.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153037" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204501" ref_url="https://bugzilla.suse.com/1204501" source="BUGZILLA"/>
		<reference ref_id="1208046" ref_url="https://bugzilla.suse.com/1208046" source="BUGZILLA"/>
		<reference ref_id="1208270" ref_url="https://bugzilla.suse.com/1208270" source="BUGZILLA"/>
		<reference ref_id="1208298" ref_url="https://bugzilla.suse.com/1208298" source="BUGZILLA"/>
		<reference ref_id="1208692" ref_url="https://bugzilla.suse.com/1208692" source="BUGZILLA"/>
		<reference ref_id="1211525" ref_url="https://bugzilla.suse.com/1211525" source="BUGZILLA"/>
		<reference ref_id="1213880" ref_url="https://bugzilla.suse.com/1213880" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32149" ref_url="https://www.suse.com/security/cve/CVE-2022-32149/" source="CVE"/>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<reference ref_id="CVE-2022-46146" ref_url="https://www.suse.com/security/cve/CVE-2022-46146/" source="CVE"/>
		<reference ref_id="CVE-2023-29409" ref_url="https://www.suse.com/security/cve/CVE-2023-29409/" source="CVE"/>
		<description>
This update fixes the following issues:

golang-github-lusitaniae-apache_exporter:

- Security issues fixed:
  * CVE-2022-32149: Fix denial of service vulnerability (bsc#1204501)
  * CVE-2022-41723: Fix uncontrolled resource consumption (bsc#1208270)
  * CVE-2022-46146: Fix authentication bypass vulnarability (bsc#1208046)
- Changes and bugs fixed:
  * Updated to 1.0.0 (jsc#PED-5405)
    + Improved flag parsing
    + Added support for custom headers
  * Changes from 0.13.1
    + Fix panic caused by missing flagConfig options
  * Added AppArmor profile
  * Added sandboxing options to systemd service unit
  * Build using promu
  * Build with Go 1.19
  * Exclude s390 architecture

golang-github-prometheus-alertmanager:

- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server
  while validating signatures for extremely large RSA keys. (bsc#1213880)
  There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.

golang-github-prometheus-node_exporter:

- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server
  while validating signatures for extremely large RSA keys. (bsc#1213880)
  There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.

golang-github-prometheus-prometheus:

- This update introduces breaking changes. Please, read carefully the provided informations.
- Security issues fixed:
  * CVE-2022-41723: Fix uncontrolled resource consumption by updating Go to version 1.20.1 (bsc#1208298)
- Updated to 2.45.0 (jsc#PED-5406):
  * [FEATURE] API: New limit parameter to limit the number of items returned by `/api/v1/status/tsdb` endpoint
  * [FEATURE] Config: Add limits to global config
  * [FEATURE] Consul SD: Added support for `path_prefix`
  * [FEATURE] Native histograms: Add option to scrape both classic and native histograms.
  * [FEATURE] Native histograms: Added support for two more arithmetic operators `avg_over_time` and `sum_over_time`
  * [FEATURE] Promtool: When providing the block id, only one block will be loaded and analyzed
  * [FEATURE] Remote-write: New Azure ad configuration to support remote writing directly to Azure Monitor workspace
  * [FEATURE] TSDB: Samples per chunk are now configurable with flag `storage.tsdb.samples-per-chunk`. By default set
    to its former value 120
  * [ENHANCEMENT] Native histograms: bucket size can now be limited to avoid scrape fails
  * [ENHANCEMENT] TSDB: Dropped series are now deleted from the WAL sooner
  * [BUGFIX] Native histograms: ChunkSeries iterator now checks if a new sample can be appended to the open chunk
  * [BUGFIX] Native histograms: Fix Histogram Appender `Appendable()` segfault
  * [BUGFIX] Native histograms: Fix setting reset header to gauge histograms in seriesToChunkEncoder
  * [BUGFIX] TSDB: Tombstone intervals are not modified after Get() call
  * [BUGFIX] TSDB: Use path/filepath to set the WAL directory.
- Changes from 2.44.0:
  * [FEATURE] Remote-read: Handle native histograms
  * [FEATURE] Promtool: Health and readiness check of prometheus server in CLI
  * [FEATURE] PromQL: Add `query_samples_total` metric, the total number of samples loaded by all queries
  * [ENHANCEMENT] Storage: Optimise buffer used to iterate through samples
  * [ENHANCEMENT] Scrape: Reduce memory allocations on target labels
  * [ENHANCEMENT] PromQL: Use faster heap method for `topk()` / `bottomk()`
  * [ENHANCEMENT] Rules API: Allow filtering by rule name
  * [ENHANCEMENT] Native Histograms: Various fixes and improvements
  * [ENHANCEMENT] UI: Search of scraping pools is now case-insensitive
  * [ENHANCEMENT] TSDB: Add an affirmative log message for successful WAL repair
  * [BUGFIX] TSDB: Block compaction failed when shutting down
  * [BUGFIX] TSDB: Out-of-order chunks could be ignored if the write-behind log was deleted
- Changes from 2.43.1
  * [BUGFIX] Labels: Set() after Del() would be ignored, which broke some relabeling rules
- Changes from 2.43.0:
  * [FEATURE] Promtool: Add HTTP client configuration to query commands
  * [FEATURE] Scrape: Add `include_scrape_configs` to include scrape configs from different files
  * [FEATURE] HTTP client: Add `no_proxy` to exclude URLs from proxied requests
  * [FEATURE] HTTP client: Add `proxy_from_enviroment` to read proxies from env variables
  * [ENHANCEMENT] API: Add support for setting lookback delta per query via the API
  * [ENHANCEMENT] API: Change HTTP status code from 503/422 to 499 if a request is canceled
  * [ENHANCEMENT] Scrape: Allow exemplars for all metric types
  * [ENHANCEMENT] TSDB: Add metrics for head chunks and WAL folders size
  * [ENHANCEMENT] TSDB: Automatically remove incorrect snapshot with index that is ahead of WAL
  * [ENHANCEMENT] TSDB: Improve Prometheus parser error outputs to be more comprehensible
  * [ENHANCEMENT] UI: Scope `group by` labels to metric in autocompletion
  * [BUGFIX] Scrape: Fix `prometheus_target_scrape_pool_target_limit` metric not set before reloading
  * [BUGFIX] TSDB: Correctly update `prometheus_tsdb_head_chunks_removed_total` and `prometheus_tsdb_head_chunks`
    metrics when reading WAL
  * [BUGFIX] TSDB: Use the correct unit (seconds) when recording out-of-order append deltas in the
    `prometheus_tsdb_sample_ooo_delta` metric
- Changes from 2.42.0:
  This release comes with a new feature coverage for native histograms and breaking changes.
  If you are trying native histograms already, we recommend you remove the `wal` directory when upgrading. Because the
  old WAL record for native histograms is not backward compatible in v2.42.0, this will lead to some data loss for the
  latest data. Additionally, if you scrape 'float histograms' or use recording rules on native histograms in v2.42.0
  (which writes float histograms), it is a one-way street since older versions do not support float histograms.
  * [CHANGE] **breaking** TSDB: Changed WAL record format for the experimental native histograms
  * [FEATURE] Add 'keep_firing_for' field to alerting rules
  * [FEATURE] Promtool: Add support of selecting timeseries for TSDB dump
  * [ENHANCEMENT] Agent: Native histogram support.
  * [ENHANCEMENT] Rules: Support native histograms in recording rules
  * [ENHANCEMENT] SD: Add container ID as a meta label for pod targets for Kubernetes
  * [ENHANCEMENT] SD: Add VM size label to azure service discovery
  * [ENHANCEMENT] Support native histograms in federation
  * [ENHANCEMENT] TSDB: Add gauge histogram support
  * [ENHANCEMENT] TSDB/Scrape: Support FloatHistogram that represents buckets as float64 values
  * [ENHANCEMENT] UI: Show individual scrape pools on /targets page
- Changes from 2.41.0:
  * [FEATURE] Relabeling: Add keepequal and dropequal relabel actions
  * [FEATURE] Add support for HTTP proxy headers
  * [ENHANCEMENT] Reload private certificates when changed on disk
  * [ENHANCEMENT] Add max_version to specify maximum TLS version in tls_config
  * [ENHANCEMENT] Add goos and goarch labels to prometheus_build_info
  * [ENHANCEMENT] SD: Add proxy support for EC2 and LightSail SDs
  * [ENHANCEMENT] SD: Add new metric prometheus_sd_file_watcher_errors_total
  * [ENHANCEMENT] Remote Read: Use a pool to speed up marshalling
  * [ENHANCEMENT] TSDB: Improve handling of tombstoned chunks in iterators
  * [ENHANCEMENT] TSDB: Optimize postings offset table reading
  * [BUGFIX] Scrape: Validate the metric name, label names, and label values after relabeling
  * [BUGFIX] Remote Write receiver and rule manager: Fix error handling
- Changes from 2.40.7:
  * [BUGFIX] TSDB: Fix queries involving negative buckets of native histograms
- Changes from 2.40.5:
  * [BUGFIX] TSDB: Fix queries involving native histograms due to improper reset of iterators
- Changes from 2.40.3:
  * [BUGFIX] TSDB: Fix compaction after a deletion is called
- Changes from 2.40.2:
  * [BUGFIX] UI: Fix black-on-black metric name color in dark mode
- Changes from 2.40.1:
  * [BUGFIX] TSDB: Fix alignment for atomic int64 for 32 bit architecture
  * [BUGFIX] Scrape: Fix accept headers
- Changes from 2.40.0:
  * [FEATURE] Add experimental support for native histograms.
    Enable with the flag --enable-feature=native-histograms.
  * [FEATURE] SD: Add service discovery for OVHcloud
  * [ENHANCEMENT] Kubernetes SD: Use protobuf encoding
  * [ENHANCEMENT] TSDB: Use golang.org/x/exp/slices for improved sorting speed
  * [ENHANCEMENT] Consul SD: Add enterprise admin partitions. Adds __meta_consul_partition label. Adds partition
    config in consul_sd_config
  * [BUGFIX] API: Fix API error codes for /api/v1/labels and /api/v1/series
- Changes from 2.39.1:
  * [BUGFIX] Rules: Fix notifier relabel changing the labels on active alerts
- Changes from 2.39.0:
  * [FEATURE] experimental TSDB: Add support for ingesting out-of-order samples. This is configured via
    out_of_order_time_window field in the config file; check config file docs for more info
  * [ENHANCEMENT] API: /-/healthy and /-/ready API calls now also respond to a HEAD request on top of existing
    GET support.
  * [ENHANCEMENT] PuppetDB SD: Add __meta_puppetdb_query label.
  * [ENHANCEMENT] AWS EC2 SD: Add __meta_ec2_region label.
  * [ENHANCEMENT] AWS Lightsail SD: Add __meta_lightsail_region label.
  * [ENHANCEMENT] Scrape: Optimise relabeling by re-using memory.
  * [ENHANCEMENT] TSDB: Improve WAL replay timings.
  * [ENHANCEMENT] TSDB: Optimise memory by not storing unnecessary data in the memory.
  * [ENHANCEMENT] TSDB: Allow overlapping blocks by default.
    --storage.tsdb.allow-overlapping-blocks now has no effect.
  * [ENHANCEMENT] UI: Click to copy label-value pair from query result to clipboard.
  * [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a memory leak.
  * [BUGFIX] TSDB: Fix 'invalid magic number 0' error on Prometheus startup.
  * [BUGFIX] PromQL: Properly close file descriptor when logging unfinished queries.
  * [BUGFIX] Agent: Fix validation of flag options and prevent WAL from growing more than desired.
- Changes from 2.38.0:
  * [FEATURE]: Web: Add a /api/v1/format_query HTTP API endpoint that allows pretty-formatting PromQL expressions.
  * [FEATURE]: UI: Add support for formatting PromQL expressions in the UI.
  * [FEATURE]: DNS SD: Support MX records for discovering targets.
  * [FEATURE]: Templates: Add toTime() template function that allows converting sample timestamps to
    Go time.Time values
  * [ENHANCEMENT]: Kubernetes SD: Add
    __meta_kubernetes_service_port_number meta label indicating the service port number.
    __meta_kubernetes_pod_container_image meta label indicating the container image.
  * [ENHANCEMENT]: PromQL: When a query panics, also log the query itself alongside the panic message.
  * [ENHANCEMENT]: UI: Tweak colors in the dark theme to improve the contrast ratio.
  * [ENHANCEMENT]: Web: Speed up calls to /api/v1/rules by avoiding locks and using atomic types instead.
  * [ENHANCEMENT]: Scrape: Add a no-default-scrape-port feature flag, which omits or removes any default HTTP (:80)
    or HTTPS (:443) ports in the target's scrape address.
  * [BUGFIX]: TSDB: In the WAL watcher metrics, expose the
    type='exemplar' label instead of type='unknown' for exemplar records.
  * [BUGFIX]: TSDB: Fix race condition around allocating series IDs during chunk snapshot loading.

golang-github-QubitProducts-exporter_exporter:

- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server
  while validating signatures for extremely large RSA keys. (bsc#1213880)
  There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.

grafana:

- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server
  while validating signatures for extremely large RSA keys. (bsc#1213880)
  There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.

prometheus-blackbox_exporter:

- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server
  while validating signatures for extremely large RSA keys. (bsc#1213880)
  There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.

prometheus-postgres_exporter:

- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server
  while validating signatures for extremely large RSA keys. (bsc#1213880)
  There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.

spacecmd:

- Updated to 4.3.23-1
  * Update translation strings

supportutils-plugin-susemanager-client:

- Updated to 4.3.3-1
  * Write configured crypto-policy in supportconfig
  * Add cloud and Pay-as-you-go checks

uyuni-common-libs:

- Updated to 4.3.9-1
  * Workaround for python3-debian bug about collecting control file (bsc#1211525, bsc#1208692)

		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-28"/>
	<updated date="2023-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204501">SUSE bug 1204501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208046">SUSE bug 1208046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208270">SUSE bug 1208270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208298">SUSE bug 1208298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208692">SUSE bug 1208692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211525">SUSE bug 1211525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213880">SUSE bug 1213880</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32149/">CVE-2022-32149 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32149">CVE-2022-32149 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46146/">CVE-2022-46146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46146">CVE-2022-46146 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29409/">CVE-2023-29409 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796748" comment="golang-github-prometheus-node_exporter-1.5.0-1.27.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796748" comment="golang-github-prometheus-node_exporter-1.5.0-1.27.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153038" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1213616" ref_url="https://bugzilla.suse.com/1213616" source="BUGZILLA"/>
		<reference ref_id="1215145" ref_url="https://bugzilla.suse.com/1215145" source="BUGZILLA"/>
		<reference ref_id="1215474" ref_url="https://bugzilla.suse.com/1215474" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20588" ref_url="https://www.suse.com/security/cve/CVE-2023-20588/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<reference ref_id="CVE-2023-34322" ref_url="https://www.suse.com/security/cve/CVE-2023-34322/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-20588: Fixed AMD CPU transitional execution leak via division by zero (XSA-439) (bsc#1215474).
- CVE-2023-34322: Fixed top-level shadow reference dropped too early for 64-bit PV guests (XSA-438) (bsc#1215145).
- CVE-2023-20593: Fixed AMD Zenbleed (XSA-433) (bsc#1213616).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-29"/>
	<updated date="2023-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213616">SUSE bug 1213616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215145">SUSE bug 1215145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215474">SUSE bug 1215474</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20588/">CVE-2023-20588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34322/">CVE-2023-34322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34322">CVE-2023-34322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009798856" comment="xen-4.9.4_42-3.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798857" comment="xen-doc-html-4.9.4_42-3.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798858" comment="xen-libs-4.9.4_42-3.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798859" comment="xen-libs-32bit-4.9.4_42-3.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798860" comment="xen-tools-4.9.4_42-3.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798861" comment="xen-tools-domU-4.9.4_42-3.126.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009798856" comment="xen-4.9.4_42-3.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798857" comment="xen-doc-html-4.9.4_42-3.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798858" comment="xen-libs-4.9.4_42-3.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798859" comment="xen-libs-32bit-4.9.4_42-3.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798860" comment="xen-tools-4.9.4_42-3.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798861" comment="xen-tools-domU-4.9.4_42-3.126.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153039" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208102" ref_url="https://bugzilla.suse.com/1208102" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41862" ref_url="https://www.suse.com/security/cve/CVE-2022-41862/" source="CVE"/>
		<description>
This update for postgresql12 fixes the following issues:

Update to 12.14:

- CVE-2022-41862: Fixed memory leak in libpq (bsc#1208102).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-13"/>
	<updated date="2023-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208102">SUSE bug 1208102</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41862/">CVE-2022-41862 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41862">CVE-2022-41862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009739765" comment="postgresql12-12.14-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739766" comment="postgresql12-contrib-12.14-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739767" comment="postgresql12-devel-12.14-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739589" comment="postgresql12-docs-12.14-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739768" comment="postgresql12-llvmjit-devel-12.14-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739769" comment="postgresql12-plperl-12.14-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739770" comment="postgresql12-plpython-12.14-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739771" comment="postgresql12-pltcl-12.14-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739772" comment="postgresql12-server-12.14-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739773" comment="postgresql12-server-devel-12.14-3.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153040" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208102" ref_url="https://bugzilla.suse.com/1208102" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41862" ref_url="https://www.suse.com/security/cve/CVE-2022-41862/" source="CVE"/>
		<description>
This update for postgresql13 fixes the following issues:

Update to 13.10:

- CVE-2022-41862: Fixed memory leak in libpq (bsc#1208102).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-13"/>
	<updated date="2023-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208102">SUSE bug 1208102</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41862/">CVE-2022-41862 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41862">CVE-2022-41862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009739774" comment="postgresql13-13.10-3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739775" comment="postgresql13-contrib-13.10-3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739596" comment="postgresql13-docs-13.10-3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739776" comment="postgresql13-plperl-13.10-3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739777" comment="postgresql13-plpython-13.10-3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739778" comment="postgresql13-pltcl-13.10-3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739779" comment="postgresql13-server-13.10-3.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153041" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208102" ref_url="https://bugzilla.suse.com/1208102" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41862" ref_url="https://www.suse.com/security/cve/CVE-2022-41862/" source="CVE"/>
		<description>
This update for postgresql14 fixes the following issues:

Update to 14.7:

- CVE-2022-41862: Fixed memory leak in libpq (bsc#1208102).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-13"/>
	<updated date="2023-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208102">SUSE bug 1208102</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41862/">CVE-2022-41862 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41862">CVE-2022-41862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009739780" comment="postgresql14-14.7-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739781" comment="postgresql14-contrib-14.7-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739782" comment="postgresql14-devel-14.7-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739603" comment="postgresql14-docs-14.7-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739783" comment="postgresql14-llvmjit-devel-14.7-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739784" comment="postgresql14-plperl-14.7-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739785" comment="postgresql14-plpython-14.7-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739786" comment="postgresql14-pltcl-14.7-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739787" comment="postgresql14-server-14.7-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739788" comment="postgresql14-server-devel-14.7-3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153042" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql15 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208102" ref_url="https://bugzilla.suse.com/1208102" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41862" ref_url="https://www.suse.com/security/cve/CVE-2022-41862/" source="CVE"/>
		<description>
This update for postgresql15 fixes the following issues:

Update to 15.2:

- CVE-2022-41862: Fixed memory leak in libpq (bsc#1208102).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-13"/>
	<updated date="2023-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208102">SUSE bug 1208102</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41862/">CVE-2022-41862 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41862">CVE-2022-41862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009739762" comment="libecpg6-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739789" comment="libecpg6-32bit-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739763" comment="libpq5-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739754" comment="libpq5-32bit-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739790" comment="postgresql15-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739791" comment="postgresql15-contrib-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739792" comment="postgresql15-devel-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739614" comment="postgresql15-docs-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739793" comment="postgresql15-plperl-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739794" comment="postgresql15-plpython-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739795" comment="postgresql15-pltcl-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739796" comment="postgresql15-server-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739797" comment="postgresql15-server-devel-15.2-3.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009739762" comment="libecpg6-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739789" comment="libecpg6-32bit-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739763" comment="libpq5-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739754" comment="libpq5-32bit-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739790" comment="postgresql15-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739791" comment="postgresql15-contrib-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739792" comment="postgresql15-devel-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739614" comment="postgresql15-docs-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739793" comment="postgresql15-plperl-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739794" comment="postgresql15-plpython-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739795" comment="postgresql15-pltcl-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739796" comment="postgresql15-server-15.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739797" comment="postgresql15-server-devel-15.2-3.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153043" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215466" ref_url="https://bugzilla.suse.com/1215466" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43115" ref_url="https://www.suse.com/security/cve/CVE-2023-43115/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2023-43115: Fixed remote code execution via crafted PostScript documents in gdevijs.c (b
sc#1215466).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-03"/>
	<updated date="2023-10-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215466">SUSE bug 1215466</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-43115/">CVE-2023-43115 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43115">CVE-2023-43115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796754" comment="ghostscript-9.52-23.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796755" comment="ghostscript-devel-9.52-23.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796756" comment="ghostscript-x11-9.52-23.60.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796754" comment="ghostscript-9.52-23.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796755" comment="ghostscript-devel-9.52-23.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796756" comment="ghostscript-x11-9.52-23.60.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153044" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214692" ref_url="https://bugzilla.suse.com/1214692" source="BUGZILLA"/>
		<reference ref_id="1214693" ref_url="https://bugzilla.suse.com/1214693" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<reference ref_id="CVE-2023-41105" ref_url="https://www.suse.com/security/cve/CVE-2023-41105/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2023-40217: Fixed TLS handshake bypass on closed sockets (bsc#1214692).
- CVE-2023-41105: Fixed input truncation on null bytes in os.path.normpath (bsc#1214693).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-03"/>
	<updated date="2023-10-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214692">SUSE bug 1214692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214693">SUSE bug 1214693</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-41105/">CVE-2023-41105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41105">CVE-2023-41105 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796749" comment="libpython3_4m1_0-3.4.10-25.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796750" comment="python3-3.4.10-25.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796751" comment="python3-base-3.4.10-25.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796752" comment="python3-curses-3.4.10-25.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796753" comment="python3-devel-3.4.10-25.116.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796749" comment="libpython3_4m1_0-3.4.10-25.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796750" comment="python3-3.4.10-25.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796751" comment="python3-base-3.4.10-25.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796752" comment="python3-curses-3.4.10-25.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796753" comment="python3-devel-3.4.10-25.116.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153045" version="1" class="patch">
	<metadata>
		<title>Security update for libvpx (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215778" ref_url="https://bugzilla.suse.com/1215778" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<description>
This update for libvpx fixes the following issues:

- CVE-2023-5217: Fixed a heap buffer overflow (bsc#1215778).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-03"/>
	<updated date="2023-10-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215778">SUSE bug 1215778</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799523" comment="libvpx1-1.3.0-3.12.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799523" comment="libvpx1-1.3.0-3.12.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153046" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210738" ref_url="https://bugzilla.suse.com/1210738" source="BUGZILLA"/>
		<reference ref_id="1211461" ref_url="https://bugzilla.suse.com/1211461" source="BUGZILLA"/>
		<reference ref_id="1214922" ref_url="https://bugzilla.suse.com/1214922" source="BUGZILLA"/>
		<reference ref_id="1214924" ref_url="https://bugzilla.suse.com/1214924" source="BUGZILLA"/>
		<reference ref_id="1214925" ref_url="https://bugzilla.suse.com/1214925" source="BUGZILLA"/>
		<reference ref_id="1215004" ref_url="https://bugzilla.suse.com/1215004" source="BUGZILLA"/>
		<reference ref_id="1215006" ref_url="https://bugzilla.suse.com/1215006" source="BUGZILLA"/>
		<reference ref_id="1215033" ref_url="https://bugzilla.suse.com/1215033" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4733" ref_url="https://www.suse.com/security/cve/CVE-2023-4733/" source="CVE"/>
		<reference ref_id="CVE-2023-4734" ref_url="https://www.suse.com/security/cve/CVE-2023-4734/" source="CVE"/>
		<reference ref_id="CVE-2023-4735" ref_url="https://www.suse.com/security/cve/CVE-2023-4735/" source="CVE"/>
		<reference ref_id="CVE-2023-4738" ref_url="https://www.suse.com/security/cve/CVE-2023-4738/" source="CVE"/>
		<reference ref_id="CVE-2023-4752" ref_url="https://www.suse.com/security/cve/CVE-2023-4752/" source="CVE"/>
		<reference ref_id="CVE-2023-4781" ref_url="https://www.suse.com/security/cve/CVE-2023-4781/" source="CVE"/>
		<description>
This update for vim fixes the following issues:

Security fixes:

- CVE-2023-4733: Fixed use-after-free in function buflist_altfpos (bsc#1215004). 
- CVE-2023-4734: Fixed segmentation fault in function f_fullcommand (bsc#1214925). 
- CVE-2023-4735: Fixed out of bounds write in ops.c (bsc#1214924). 
- CVE-2023-4738: Fixed heap buffer overflow in vim_regsub_both (bsc#1214922). 
- CVE-2023-4752: Fixed heap use-after-free in function ins_compl_get_exp (bsc#1215006). 
- CVE-2023-4781: Fixed heap buffer overflow in function vim_regsub_both (bsc#1215033).

Other fixes:

- Calling vim on xterm leads to missing first character of the command prompt (bsc#1211461)
- Rendering corruption in gvim with all 9.x versions (bsc#1210738)
- Updated to version 9.0 with patch level 1894
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-03"/>
	<updated date="2023-10-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210738">SUSE bug 1210738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211461">SUSE bug 1211461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214922">SUSE bug 1214922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214924">SUSE bug 1214924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214925">SUSE bug 1214925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215004">SUSE bug 1215004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215006">SUSE bug 1215006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215033">SUSE bug 1215033</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4733/">CVE-2023-4733 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4733">CVE-2023-4733 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4734/">CVE-2023-4734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4734">CVE-2023-4734 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-4735/">CVE-2023-4735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4735">CVE-2023-4735 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4738/">CVE-2023-4738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4738">CVE-2023-4738 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4752/">CVE-2023-4752 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4752">CVE-2023-4752 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4781/">CVE-2023-4781 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4781">CVE-2023-4781 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009798968" comment="gvim-9.0.1894-17.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798969" comment="vim-9.0.1894-17.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798945" comment="vim-data-9.0.1894-17.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798946" comment="vim-data-common-9.0.1894-17.23.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009798968" comment="gvim-9.0.1894-17.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798969" comment="vim-9.0.1894-17.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798945" comment="vim-data-9.0.1894-17.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798946" comment="vim-data-common-9.0.1894-17.23.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153047" version="1" class="patch">
	<metadata>
		<title>Security update for python-py (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204364" ref_url="https://bugzilla.suse.com/1204364" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42969" ref_url="https://www.suse.com/security/cve/CVE-2022-42969/" source="CVE"/>
		<description>
This update for python-py fixes the following issues:

- CVE-2022-42969: Fixed an excessive resource consumption that could
  be triggered when interacting with a Subversion repository
  containing crated data (bsc#1204364).

This also updates python3-py to version 1.8.1 for SUSE Linux Enterprise Server.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-13"/>
	<updated date="2023-02-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204364">SUSE bug 1204364</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42969/">CVE-2022-42969 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42969">CVE-2022-42969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734231" comment="python3-py-1.8.1-11.15.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153048" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215814" ref_url="https://bugzilla.suse.com/1215814" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Mozilla Firefox was updated to 115.3.1 ESR, fixing a security issue:

MFSA 2023-44 (bsc#1215814)

* CVE-2023-5217: Fixed heap buffer overflow in libvpx
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-03"/>
	<updated date="2023-10-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215814">SUSE bug 1215814</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799688" comment="MozillaFirefox-115.3.1-112.185.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799672" comment="MozillaFirefox-devel-115.3.1-112.185.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799689" comment="MozillaFirefox-translations-common-115.3.1-112.185.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799688" comment="MozillaFirefox-115.3.1-112.185.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799672" comment="MozillaFirefox-devel-115.3.1-112.185.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799689" comment="MozillaFirefox-translations-common-115.3.1-112.185.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153049" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214685" ref_url="https://bugzilla.suse.com/1214685" source="BUGZILLA"/>
		<reference ref_id="1214691" ref_url="https://bugzilla.suse.com/1214691" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48565" ref_url="https://www.suse.com/security/cve/CVE-2022-48565/" source="CVE"/>
		<reference ref_id="CVE-2022-48566" ref_url="https://www.suse.com/security/cve/CVE-2022-48566/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2022-48566: Constant-time-defeating optimisations were possible in the accumulator variable in hmac.compare_digest. (bsc#1214691)
- CVE-2022-48565: Fixed an XXE in the plistlib module. (bsc#1214685)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2023-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214685">SUSE bug 1214685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214691">SUSE bug 1214691</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48565/">CVE-2022-48565 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48565">CVE-2022-48565 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-48566/">CVE-2022-48566 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48566">CVE-2022-48566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799803" comment="libpython2_7-1_0-2.7.18-28.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799804" comment="libpython2_7-1_0-32bit-2.7.18-28.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799805" comment="python-2.7.18-28.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799806" comment="python-32bit-2.7.18-28.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799807" comment="python-base-2.7.18-28.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799808" comment="python-base-32bit-2.7.18-28.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799809" comment="python-curses-2.7.18-28.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799810" comment="python-demo-2.7.18-28.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799811" comment="python-devel-2.7.18-28.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799812" comment="python-doc-2.7.18-28.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799813" comment="python-doc-pdf-2.7.18-28.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799814" comment="python-gdbm-2.7.18-28.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799815" comment="python-idle-2.7.18-28.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799816" comment="python-tk-2.7.18-28.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799817" comment="python-xml-2.7.18-28.105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153050" version="1" class="patch">
	<metadata>
		<title>Security update for libXpm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215686" ref_url="https://bugzilla.suse.com/1215686" source="BUGZILLA"/>
		<reference ref_id="1215687" ref_url="https://bugzilla.suse.com/1215687" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43788" ref_url="https://www.suse.com/security/cve/CVE-2023-43788/" source="CVE"/>
		<reference ref_id="CVE-2023-43789" ref_url="https://www.suse.com/security/cve/CVE-2023-43789/" source="CVE"/>
		<description>
This update for libXpm fixes the following issues:

- CVE-2023-43788: Fixed an out of bounds read when creating an image
  (bsc#1215686).
- CVE-2023-43789: Fixed an out of bounds read when parsing an XPM file
  with a corrupted colormap (bsc#1215687).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2023-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215686">SUSE bug 1215686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215687">SUSE bug 1215687</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43788/">CVE-2023-43788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43788">CVE-2023-43788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43789/">CVE-2023-43789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43789">CVE-2023-43789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799870" comment="libXpm4-3.5.11-6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799871" comment="libXpm4-32bit-3.5.11-6.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153051" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207997" ref_url="https://bugzilla.suse.com/1207997" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42826" ref_url="https://www.suse.com/security/cve/CVE-2022-42826/" source="CVE"/>
		<reference ref_id="CVE-2023-23517" ref_url="https://www.suse.com/security/cve/CVE-2023-23517/" source="CVE"/>
		<reference ref_id="CVE-2023-23518" ref_url="https://www.suse.com/security/cve/CVE-2023-23518/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.38.4 (boo#1207997):

- CVE-2023-23517: Fixed web content processing that could have led to arbitrary code execution.
- CVE-2023-23518: Fixed web content processing that could have led to arbitrary code execution.
- CVE-2023-42826: Fixed a use-after-free issue that was caused by improper memory management.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-13"/>
	<updated date="2023-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207997">SUSE bug 1207997</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42826/">CVE-2022-42826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42826">CVE-2022-42826 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23517/">CVE-2023-23517 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23517">CVE-2023-23517 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23518/">CVE-2023-23518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23518">CVE-2023-23518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009738527" comment="libjavascriptcoregtk-4_0-18-2.38.4-2.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738528" comment="libwebkit2gtk-4_0-37-2.38.4-2.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738351" comment="libwebkit2gtk3-lang-2.38.4-2.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738529" comment="typelib-1_0-JavaScriptCore-4_0-2.38.4-2.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738530" comment="typelib-1_0-WebKit2-4_0-2.38.4-2.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738531" comment="typelib-1_0-WebKit2WebExtension-4_0-2.38.4-2.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738532" comment="webkit2gtk-4_0-injected-bundles-2.38.4-2.126.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153052" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214257" ref_url="https://bugzilla.suse.com/1214257" source="BUGZILLA"/>
		<reference ref_id="1214618" ref_url="https://bugzilla.suse.com/1214618" source="BUGZILLA"/>
		<reference ref_id="1214621" ref_url="https://bugzilla.suse.com/1214621" source="BUGZILLA"/>
		<reference ref_id="1214622" ref_url="https://bugzilla.suse.com/1214622" source="BUGZILLA"/>
		<reference ref_id="1215422" ref_url="https://bugzilla.suse.com/1215422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-23804" ref_url="https://www.suse.com/security/cve/CVE-2020-23804/" source="CVE"/>
		<reference ref_id="CVE-2020-36024" ref_url="https://www.suse.com/security/cve/CVE-2020-36024/" source="CVE"/>
		<reference ref_id="CVE-2022-37050" ref_url="https://www.suse.com/security/cve/CVE-2022-37050/" source="CVE"/>
		<reference ref_id="CVE-2022-37051" ref_url="https://www.suse.com/security/cve/CVE-2022-37051/" source="CVE"/>
		<reference ref_id="CVE-2022-38349" ref_url="https://www.suse.com/security/cve/CVE-2022-38349/" source="CVE"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2020-23804: Fixed uncontrolled recursion in pdfinfo and pdftops (bsc#1215422).
- CVE-2020-36024: Fixed NULL Pointer Deference in `FoFiType1C:convertToType1` (bsc#1214257).
- CVE-2022-37050: Fixed denial-of-service via savePageAs in PDFDoc.c (bsc#1214622).
- CVE-2022-37051: Fixed abort in main() in pdfunite.cc (bsc#1214621).
- CVE-2022-38349: Fixed reachable assertion in Object.h that will lead to denial of service (bsc#1214618).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2023-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214257">SUSE bug 1214257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214618">SUSE bug 1214618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214621">SUSE bug 1214621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214622">SUSE bug 1214622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215422">SUSE bug 1215422</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-23804/">CVE-2020-23804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-23804">CVE-2020-23804 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36024/">CVE-2020-36024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36024">CVE-2020-36024 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-37050/">CVE-2022-37050 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37050">CVE-2022-37050 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-37051/">CVE-2022-37051 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37051">CVE-2022-37051 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-38349/">CVE-2022-38349 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38349">CVE-2022-38349 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799519" comment="libpoppler-glib8-0.43.0-16.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799520" comment="libpoppler-qt4-4-0.43.0-16.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799521" comment="libpoppler60-0.43.0-16.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799522" comment="poppler-tools-0.43.0-16.35.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799519" comment="libpoppler-glib8-0.43.0-16.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799520" comment="libpoppler-qt4-4-0.43.0-16.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799521" comment="libpoppler60-0.43.0-16.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799522" comment="poppler-tools-0.43.0-16.35.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153053" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215683" ref_url="https://bugzilla.suse.com/1215683" source="BUGZILLA"/>
		<reference ref_id="1215684" ref_url="https://bugzilla.suse.com/1215684" source="BUGZILLA"/>
		<reference ref_id="1215685" ref_url="https://bugzilla.suse.com/1215685" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43785" ref_url="https://www.suse.com/security/cve/CVE-2023-43785/" source="CVE"/>
		<reference ref_id="CVE-2023-43786" ref_url="https://www.suse.com/security/cve/CVE-2023-43786/" source="CVE"/>
		<reference ref_id="CVE-2023-43787" ref_url="https://www.suse.com/security/cve/CVE-2023-43787/" source="CVE"/>
		<description>
This update for libX11 fixes the following issues:

- CVE-2023-43786: Fixed stack exhaustion from infinite recursion in PutSubImage() (bsc#1215684).
- CVE-2023-43787: Fixed integer overflow in XCreateImage() leading to a heap overflow (bsc#1215685).
- CVE-2023-43785: Fixed out-of-bounds memory access in _XkbReadKeySyms() (bsc#1215683).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2023-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215683">SUSE bug 1215683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215684">SUSE bug 1215684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215685">SUSE bug 1215685</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-43785/">CVE-2023-43785 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43785">CVE-2023-43785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43786/">CVE-2023-43786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43786">CVE-2023-43786 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-43787/">CVE-2023-43787 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43787">CVE-2023-43787 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799866" comment="libX11-6-1.6.2-12.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799867" comment="libX11-6-32bit-1.6.2-12.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799857" comment="libX11-data-1.6.2-12.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799868" comment="libX11-xcb1-1.6.2-12.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799869" comment="libX11-xcb1-32bit-1.6.2-12.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153054" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215472" ref_url="https://bugzilla.suse.com/1215472" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3341" ref_url="https://www.suse.com/security/cve/CVE-2023-3341/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2023-3341: Fixed stack exhaustion flaw in control channel code may cause named to terminate unexpectedly (bsc#1215472).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-06"/>
	<updated date="2023-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215472">SUSE bug 1215472</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3341/">CVE-2023-3341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3341">CVE-2023-3341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799197" comment="bind-9.9.9P1-63.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799198" comment="bind-chrootenv-9.9.9P1-63.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799199" comment="bind-doc-9.9.9P1-63.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799200" comment="bind-libs-9.9.9P1-63.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799201" comment="bind-libs-32bit-9.9.9P1-63.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799202" comment="bind-utils-9.9.9P1-63.43.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799197" comment="bind-9.9.9P1-63.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799198" comment="bind-chrootenv-9.9.9P1-63.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799199" comment="bind-doc-9.9.9P1-63.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799200" comment="bind-libs-9.9.9P1-63.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799201" comment="bind-libs-32bit-9.9.9P1-63.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799202" comment="bind-utils-9.9.9P1-63.43.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153055" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215968" ref_url="https://bugzilla.suse.com/1215968" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43804" ref_url="https://www.suse.com/security/cve/CVE-2023-43804/" source="CVE"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2023-43804: Fixed a potential cookie leak via HTTP redirect if
  the user manually set the corresponding header (bsc#1215968).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-09"/>
	<updated date="2023-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215968">SUSE bug 1215968</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-43804/">CVE-2023-43804 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43804">CVE-2023-43804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800598" comment="python-urllib3-1.22-7.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153056" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214806" ref_url="https://bugzilla.suse.com/1214806" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4641" ref_url="https://www.suse.com/security/cve/CVE-2023-4641/" source="CVE"/>
		<description>
This update for shadow fixes the following issues:

- CVE-2023-4641: Fixed potential password leak (bsc#1214806).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-10"/>
	<updated date="2023-10-10"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1214806">SUSE bug 1214806</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4641/">CVE-2023-4641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4641">CVE-2023-4641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791542" comment="shadow-4.2.1-27.25.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791542" comment="shadow-4.2.1-27.25.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153057" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215904" ref_url="https://bugzilla.suse.com/1215904" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4091" ref_url="https://www.suse.com/security/cve/CVE-2023-4091/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2023-4091: Fixed a bug where a client can truncate file with read-only permissions. (bsc#1215904)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-10"/>
	<updated date="2023-10-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215904">SUSE bug 1215904</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4091/">CVE-2023-4091 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4091">CVE-2023-4091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009800925" comment="libdcerpc-binding0-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800926" comment="libdcerpc-binding0-32bit-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800927" comment="libdcerpc0-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800928" comment="libdcerpc0-32bit-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800929" comment="libndr-krb5pac0-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800930" comment="libndr-krb5pac0-32bit-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800931" comment="libndr-nbt0-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800932" comment="libndr-nbt0-32bit-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800933" comment="libndr-standard0-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800934" comment="libndr-standard0-32bit-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800935" comment="libndr0-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800936" comment="libndr0-32bit-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800937" comment="libnetapi0-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800938" comment="libnetapi0-32bit-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800939" comment="libsamba-credentials0-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800940" comment="libsamba-credentials0-32bit-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800941" comment="libsamba-errors0-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800942" comment="libsamba-errors0-32bit-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800943" comment="libsamba-hostconfig0-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800944" comment="libsamba-hostconfig0-32bit-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800945" comment="libsamba-passdb0-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800946" comment="libsamba-passdb0-32bit-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800947" comment="libsamba-util0-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800948" comment="libsamba-util0-32bit-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800949" comment="libsamdb0-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800950" comment="libsamdb0-32bit-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800951" comment="libsmbclient0-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800952" comment="libsmbclient0-32bit-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800953" comment="libsmbconf0-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800954" comment="libsmbconf0-32bit-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800955" comment="libsmbldap0-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800956" comment="libsmbldap0-32bit-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800957" comment="libtevent-util0-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800958" comment="libtevent-util0-32bit-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800959" comment="libwbclient0-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800960" comment="libwbclient0-32bit-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800961" comment="samba-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800962" comment="samba-client-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800963" comment="samba-client-32bit-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800964" comment="samba-doc-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800965" comment="samba-libs-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800966" comment="samba-libs-32bit-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800967" comment="samba-winbind-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800968" comment="samba-winbind-32bit-4.6.16+git.397.ee6c0d1a065-3.84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153058" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215939" ref_url="https://bugzilla.suse.com/1215939" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5341" ref_url="https://www.suse.com/security/cve/CVE-2023-5341/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2023-5341: Fixed a heap use-after-free in coders/bmp.c. (bsc#1215939)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-11"/>
	<updated date="2023-10-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215939">SUSE bug 1215939</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5341/">CVE-2023-5341 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5341">CVE-2023-5341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009800348" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.201.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800349" comment="ImageMagick-config-6-upstream-6.8.8.1-71.201.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800350" comment="libMagickCore-6_Q16-1-6.8.8.1-71.201.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800351" comment="libMagickWand-6_Q16-1-6.8.8.1-71.201.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153059" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215968" ref_url="https://bugzilla.suse.com/1215968" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43804" ref_url="https://www.suse.com/security/cve/CVE-2023-43804/" source="CVE"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2023-43804: Fixed a potential cookie leak via HTTP redirect if the user manually set the corresponding header (bsc#1215968).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-12"/>
	<updated date="2023-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215968">SUSE bug 1215968</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-43804/">CVE-2023-43804 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43804">CVE-2023-43804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800847" comment="python3-urllib3-1.25.10-3.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153060" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1191957" ref_url="https://bugzilla.suse.com/1191957" source="BUGZILLA"/>
		<reference ref_id="1215761" ref_url="https://bugzilla.suse.com/1215761" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42782" ref_url="https://www.suse.com/security/cve/CVE-2021-42782/" source="CVE"/>
		<reference ref_id="CVE-2023-40661" ref_url="https://www.suse.com/security/cve/CVE-2023-40661/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2021-42782: Fixed several stack buffer overflows (bsc#1191957).
- CVE-2023-40661: Fixed several memory safety issues that could happen
  during the card enrollment process using pkcs15-init (bsc#1215761).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-12"/>
	<updated date="2023-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191957">SUSE bug 1191957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215761">SUSE bug 1215761</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42782/">CVE-2021-42782 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42782">CVE-2021-42782 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-40661/">CVE-2023-40661 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40661">CVE-2023-40661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801447" comment="opensc-0.13.0-3.25.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801447" comment="opensc-0.13.0-3.25.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153061" version="1" class="patch">
	<metadata>
		<title>Security update for exiv2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1117291" ref_url="https://bugzilla.suse.com/1117291" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19535" ref_url="https://www.suse.com/security/cve/CVE-2018-19535/" source="CVE"/>
		<description>
This update for exiv2 fixes the following issues:

- CVE-2018-19535: Fixed a heap-based buffer over-read which may cause a DoS via a crafted PNG file. (bsc#1117291)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2023-10-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117291">SUSE bug 1117291</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19535/">CVE-2018-19535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19535">CVE-2018-19535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800352" comment="libexiv2-12-0.23-12.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153062" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215935" ref_url="https://bugzilla.suse.com/1215935" source="BUGZILLA"/>
		<reference ref_id="1215936" ref_url="https://bugzilla.suse.com/1215936" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4692" ref_url="https://www.suse.com/security/cve/CVE-2023-4692/" source="CVE"/>
		<reference ref_id="CVE-2023-4693" ref_url="https://www.suse.com/security/cve/CVE-2023-4693/" source="CVE"/>
		<description>
This update for grub2 fixes the following issues:

- CVE-2023-4692: Fixed an out-of-bounds write at fs/ntfs.c which may lead to unsigned code execution. (bsc#1215935)
- CVE-2023-4693: Fixed an out-of-bounds read at fs/ntfs.c which may lead to leak sensitive information. (bsc#1215936)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-19"/>
	<updated date="2023-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215935">SUSE bug 1215935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215936">SUSE bug 1215936</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4692/">CVE-2023-4692 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4692">CVE-2023-4692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4693/">CVE-2023-4693 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4693">CVE-2023-4693 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009801441" comment="grub2-2.02-147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801442" comment="grub2-i386-pc-2.02-147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801443" comment="grub2-snapper-plugin-2.02-147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801444" comment="grub2-systemd-sleep-plugin-2.02-147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801445" comment="grub2-x86_64-efi-2.02-147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801446" comment="grub2-x86_64-xen-2.02-147.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009801441" comment="grub2-2.02-147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801442" comment="grub2-i386-pc-2.02-147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801443" comment="grub2-snapper-plugin-2.02-147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801444" comment="grub2-systemd-sleep-plugin-2.02-147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801445" comment="grub2-x86_64-efi-2.02-147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801446" comment="grub2-x86_64-xen-2.02-147.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153063" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216275" ref_url="https://bugzilla.suse.com/1216275" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25091" ref_url="https://www.suse.com/security/cve/CVE-2018-25091/" source="CVE"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2018-25091: Fixed a potential leak of the Authorization header during a cross-origin redirect (bsc#1216275).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-19"/>
	<updated date="2023-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216275">SUSE bug 1216275</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-25091/">CVE-2018-25091 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25091">CVE-2018-25091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802433" comment="python-urllib3-1.22-7.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153064" version="1" class="patch">
	<metadata>
		<title>Recommended update for stunnel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1032557" ref_url="https://bugzilla.suse.com/1032557" source="BUGZILLA"/>
		<reference ref_id="1069468" ref_url="https://bugzilla.suse.com/1069468" source="BUGZILLA"/>
		<reference ref_id="1150730" ref_url="https://bugzilla.suse.com/1150730" source="BUGZILLA"/>
		<reference ref_id="1177580" ref_url="https://bugzilla.suse.com/1177580" source="BUGZILLA"/>
		<reference ref_id="1178533" ref_url="https://bugzilla.suse.com/1178533" source="BUGZILLA"/>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1182376" ref_url="https://bugzilla.suse.com/1182376" source="BUGZILLA"/>
		<reference ref_id="1182529" ref_url="https://bugzilla.suse.com/1182529" source="BUGZILLA"/>
		<reference ref_id="674554" ref_url="https://bugzilla.suse.com/674554" source="BUGZILLA"/>
		<reference ref_id="710879" ref_url="https://bugzilla.suse.com/710879" source="BUGZILLA"/>
		<reference ref_id="807440" ref_url="https://bugzilla.suse.com/807440" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2011-2940" ref_url="https://www.suse.com/security/cve/CVE-2011-2940/" source="CVE"/>
		<reference ref_id="CVE-2013-1762" ref_url="https://www.suse.com/security/cve/CVE-2013-1762/" source="CVE"/>
		<reference ref_id="CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160/" source="CVE"/>
		<reference ref_id="CVE-2015-3644" ref_url="https://www.suse.com/security/cve/CVE-2015-3644/" source="CVE"/>
		<reference ref_id="CVE-2021-20230" ref_url="https://www.suse.com/security/cve/CVE-2021-20230/" source="CVE"/>
		<description>
This update for stunnel fixes the following issues:

- Version 5.62 (jsc#SLE-24316, jsc#SLE-20679)
  - Add support for OCSP and TLS
  - Added a bash completion script.

- Version 5.61
New features:
  - Added new 'protocol = capwin' and 'protocol = capwinctrl'
    configuration file options.
  - Rewritten the testing framework in python.

Bugfixes:
  - Fixed reloading configuration with 'systemctl reload stunnel.service'.
  - Fixed incorrect messages logged for OpenSSL errors.
  - Added hardening to systemd service(s) (bsc#1181400)

- Version  5.60:
New features:
  - New 'sessionResume' service-level option to allow
    or disallow session resumption
  - Added support for the new SSL_set_options() values.
Bugfixes:
  - Fixed 'redirect' with 'protocol'.  This combination is not supported by 'smtp', 'pop3' and 'imap' protocols.
  - ensure proper startup after network

- Version 5.59:
  - new feature: Client-side 'protocol = ldap' support
  - Fix configuration reload when compression is used
  - Fix paths in generated manuals
  - run testsuite during package build

- Security fixes: (bsc#1177580, bsc#1182529, CVE-2021-20230)
  - 'redirect' option does not properly handle 'verifyChain = yes'

- Version 5.58:
Security bugfixes:
  - The 'redirect' option was fixed to properly handle unauthenticated requests. (bsc#1182529)
  - Fixed a double free with OpenSSL older than 1.1.0

New features:
  - New 'protocolHeader' service-level option to insert custom 'connect' protocol negotiation headers.
    This feature can be used to impersonate other software (e.g. web browsers).
  - 'protocolHost' can also be used to control the client SMTP protocol negotiation HELO/EHLO value.
  - Initial FIPS 3.0 support.

Bugfixes:
  - X.509v3 extensions required by modern versions of OpenSSL are added to generated self-signed test certificates.
  - Fixed a tiny memory leak in configuration file reload error handling
  - FIPS TLS feature is reported when a provider or container is available, and not when FIPS control API is available.
  - Do not replace the active config file (bsc#1182376)
  - Remove pidfile from service file fixes start bug (bsc#1178533)

-  Version 5.57:
Security bugfixes
    - The 'redirect' option was fixed to properly handle 'verifyChain = yes' (bsc#1177580)

New features:
  - New securityLevel configuration file option.
  - Support for modern PostgreSQL clients
  - TLS 1.3 configuration updated for better compatibility.

Bugfixes:
  - DH/ECDH initialization restored for client sections.
  - Delay startup with systemd until network is online.
  - A number of testing framework fixes and improvements.

Version 5.56:
  - Various text files converted to Markdown format.
  - Support for realpath(3) implementations incompatible with POSIX.1-2008, such as 4.4BSD or Solaris.
  - Support for engines without PRNG seeding methods
  - Retry unsuccessful port binding on configuration file reload.
  - Thread safety fixes in SSL_SESSION object handling.
  - Terminate clients on exit in the FORK threading model.

- Fixup stunnel.conf handling:
  - Remove old static openSUSE provided stunnel.conf
  - Use upstream stunnel.conf and tailor it for openSUSE using sed
  - Don't show README.openSUSE when installing
  - enable /etc/stunnel/conf.d
  - re-enable openssl.cnf
  - Install the correct file as README.openSUSE (bsc#1150730)

Version 5.55
New features:
  - New 'ticketKeySecret' and 'ticketMacSecret' options to control confidentiality
    and integrity protection of the issued session tickets.
  - Added sslversion, sslversionMin and sslversionMax for OpenSSL 1.1.0 and later.
  - Hexadecimal PSK keys are automatically converted to binary.
  - Session ticket support (requires OpenSSL 1.1.1 or later). 'connect' address
    persistence is currently unsupported with session tickets.
  - SMTP HELO before authentication
  - New 'curves' option to control the list of elliptic curves in OpenSSL 1.1.0 and later.
  - New 'ciphersuites' option to control the list of permitted TLS 1.3 ciphersuites.
  - Include file name and line number in OpenSSL errors.
  - Compatibility with the current OpenSSL 3.0.0-dev branch.
  - Better performance with SSL_set_read_ahead()/SSL_pending().

Bugfixes:
  - A number of testing framework fixes and improvements.
  - Service threads are terminated before OpenSSL cleanup to prevent occasional stunnel crashes at shutdown.
  - Fixed data transfer stalls introduced in stunnel 5.51.
  - Fixed a transfer() loop bug introduced in stunnel 5.51.
  - Fixed PSKsecrets as a global option
  - Fixed a memory allocation bug
  - Fixed PSK session resumption with TLS 1.3.
  - Fixed a memory leak in the WIN32 logging subsystem.
  - Allow for zero value (ignored) TLS options.
  - Partially refactored configuration file parsing and logging subsystems for clearer code and minor bugfixes.

Caveats:
  - We removed FIPS support from our standard builds. FIPS will still be available with custom builds.
  - disabled checks; checks depend on ncat and network accessibility 

Version 5.49
  - Logging of negotiated or resumed TLS session IDs
  - OpenSSL DLLs updated to version 1.0.2p.
  - PKCS#11 engine DLL updated to version 0.4.9.
  - Fixed a crash in the session persistence implementation.
  - Fixed syslog identifier after configuration file reload.
  - Fixed non-interactive 'make check' invocations.
  - Fixed reloading syslog configuration.
  - stunnel.pem created with SHA-256 instead of SHA-1.
  - SHA-256 'make check' certificates.

Version 5.48
  - Fixed requesting client certificate when specified as a global option.
  - Certificate subject checks modified to accept certificates if at least one of the specified checks matches.

Version 5.47
  - Fast add_lock_callback for OpenSS. This largely improves performance on heavy load.
  - Automatic detection of Homebrew OpenSSL.
  - Clarified port binding error logs.
  - Various 'make test' improvements.
  - Fixed a crash on switching to SNI slave sections.

Version 5.46
  - The default cipher list was updated to a safer value: 'HIGH:!aNULL:!SSLv2:!DH:!kDHEPSK'.
  - Default accept address restored to INADDR_ANY.

Version 5.45
  - Implemented delayed deallocation of service sections after configuration file reload.
  - OpenSSL DLLs updated to version 1.0.2o.
  - Deprecated the sslversion option.
  - The 'socket' option is now also available in service sections.
  - Implemented try-restart in the SysV init script
  - TLS 1.3 compliant session handling for OpenSSL 1.1.1.
  - Default 'failover' value changed from 'rr' to 'prio'.
  - A service no longer refuses to start if binding fails for some (but not all) addresses:ports.
  - Fixed compression handling with OpenSSL 1.1.0 and later.
  - Fixed exception handling in libwrap.
  - Fixed exec+connect services.
  - Fixed automatic resolver delaying.
  - A number of 'make check' framework fixes.
  - Fixed false postive memory leak logs.
  - Build fixes for OpenSSL versions down to 0.9.7.
  - Do not ignore errors from useradd. Ensure nogroup exists beforehand.

Version 5.44
  - Default accept address restored to INADDR_ANY
  - Fix race condition in 'make check'
  - Fix removing the pid file after configuration reload
- includes 5.43
  - Allow for multiple 'accept' ports per section
  - Self-test framework (make check)
  - Added config load before OpenSSL init
  - OpenSSL 1.1.1-dev compilation fixes
  - Fixed round-robin failover in the FORK threading model
  - Fixed handling SSL_ERROR_ZERO_RETURN in SSL_shutdown()
  - Minor fixes of the logging subsystem
  - OpenSSL DLLs updated to version 1.0.2m

Version 5.42
- New features
  - 'redirect' also supports 'exec' and not only 'connect'.
  - PKCS#11 engine DLL updated to version 0.4.7.

- Bugfixes
  - Fixed premature cron thread initialization causing hangs.
  - Fixed 'verifyPeer = yes' on OpenSSL
  - Fixed pthreads support on OpenSolaris.

  - Require package config for libsystemd to help the configure script
  to detect and enable systemd socket activation (bsc#1032557) 
  - Don't require insserv if we don't use it
  - Update rpm group and description and make -doc noarch
  - Do not suppress errors from useradd
  - Remove redundant %clean section

Version 5.36
  - Removed direct zlib dependency.

Version 5.35
  - adjust systemd unit file to start after network-online.target

- bugixes:
  - Fixed incorrectly enforced client certificate requests. 
  - Fixed thread safety of the configuration file reopening.
  - Only reset the watchdog if some data was actually transferred. 
  - Fixed logging an incorrect value of the round-robin starting point

- new features:
  - Added three new service-level options: requireCert, verifyChain, and
  - verifyPeer for fine-grained certificate verification control. 
  - SNI support also enabled on OpenSSL 0.9.8f and later
  - Added support for PKCS #12 (.p12/.pfx) certificates
  - New 'socket = a:IPV6_V6ONLY=yes' option to only bind IPv6. 
  - Added logging the list of client CAs requested by the server.

- Version 5.30
Features
  - Improved compatibility with the current OpenSSL 1.1.0-dev tree.
  - Added OpenSSL autodetection for the recent versions of Xcode.

Bugfixes
  - Fixed references to /etc removed from stunnel.init.in.
  - Stopped even trying -fstack-protector on unsupported platforms

- Version 5.29
  - system script restarts stunnel after a crash
  - readd rcstunnel macro for systemd systems
  - Fix compatibility issues with older OpenSSL

Version 5.22
- New features
  - 'OCSPaia = yes' added to the configuration file templates.
  - Improved double free detection.

- Bugfixes
  - Fixed a number of OCSP bugs. The most severe of those bugs caused stunnel to
    treat OCSP responses that failed OCSP_basic_verify() checks as if they were successful.
  - Fixed the passive IPv6 resolver (broken in stunnel 5.21).
  - Remove executable bit from sample scripts

Version 5.21
New features:
  - Signal names are displayed instead of numbers.
  - First resolve IPv4 addresses on passive resolver requests.
   More elaborate descriptions were added to the warning about using 'verify = 2' without 'checkHost' or 'checkIP'.
  - Performance optimization was performed on the debug code.
  
Bugfixes:
  - Fixed the FORK and UCONTEXT threading support.
  - Fixed 'failover=prio' (broken since stunnel 5.15).
  - Added a retry when sleep(3) was interrupted by a signal in the cron thread scheduler.

- Version 5.20
New features:
  - The SSL library detection algorithm was made a bit smarter.
  - Warnings about insecure authentication were modified to include the name of the affected service section.

Bugfixes
  - Signal pipe reinitialization added to prevent turning the main accepting
    thread into a busy wait loop when an external condition breaks the signal pipe.
    This bug was found to surface on Win32, but other platforms may also be
    affected.
  - Generated temporary DH parameters are used for configuration reload instead
    of the static defaults.
  - Fixed the manual page headers

Version 5.19
  Bugfixes:
  - Improved socket error handling. 
  - Fixed handling of dynamic connect targets. 
  - Fixed handling of trailing whitespaces in the Content-Length header of the
    NTLM authentication. 
  - Fixed memory leaks in certificate verification.
  New features:
  - The 'redirect' option was improved to not only redirect sessions established
    with an untrusted certificate, but also sessions established without a
    client certificate. 
  - Randomize the initial value of the round-robin counter. 
  - Added 'include' configuration file option to include all configuration file
    parts located in a specified directory. 
  - Temporary DH parameters are refreshed every 24 hours, unless static DH
    parameters were provided in the certificate file. 
  - Warnings are logged on potentially insecure authentication. 
  - stunnel.service: Modified to start after network.target, not syslog.target.

Version 5.09
New features:
  - Added PSK authentication with two new service-level
    configuration file options 'PSKsecrets' and 'PSKidentity'.
  - Added additional security checks to the OpenSSL memory management functions.
  - Added support for the OPENSSL_NO_OCSP and OPENSSL_NO_ENGINE OpenSSL configuration flags.
  - Added compatibility with the current OpenSSL 1.1.0-dev tree.

Bugfixes:
  - Removed defective s_poll_error() code occasionally causing
    connections to be prematurely closed (truncated).
    This bug was introduced in stunnel 4.34.
  - Fixed ./configure systemd detection
  - Fixed ./configure sysroot detection
  - Fixed compilation against old versions of OpenSSL.
  - Removed outdated French manual page.

Version 5.08
New features:
  - Added SOCKS4/SOCKS4a protocol support.
  - Added SOCKS5 protocol support.
  - Added SOCKS RESOLVE [F0] TOR extension support.
  - Updated automake to version 1.14.1.
  - OpenSSL directory searching is now relative to the sysroot.
  - Several SMTP server protocol negotiation improvements.
  - Added UTF-8 byte order marks to stunnel.conf templates.
  - DH parameters are no longer generated by 'make cert'.
    The hardcoded DH parameters are sufficiently secure,
    and modern TLS implementations will use ECDH anyway.
  - Updated manual for the 'options' configuration file option.
  - Added support for systemd 209 or later.
  - New --disable-systemd ./configure option.
  - setuid/setgid commented out in stunnel.conf-sample.

Bugfixes
  - Added support for UTF-8 byte order mark in stunnel.conf.
  - Compilation fix for OpenSSL with disabled SSLv2 or SSLv3.
  - Non-blocking mode set on inetd and systemd descriptors.
  - shfolder.h replaced with shlobj.h for compatibility
    with modern Microsoft compilers.

Version 5.06
Security bugfixes
  - OpenSSL DLLs updated to version 1.0.1j.
    https://www.openssl.org/news/secadv_20141015.txt
  - The insecure SSLv2 protocol is now disabled by default.
    It can be enabled with 'options = -NO_SSLv2'.
  - The insecure SSLv3 protocol is now disabled by default.
    It can be enabled with 'options = -NO_SSLv3'.
  - Default sslversion changed to 'all' (also in FIPS mode)
    to autonegotiate the highest supported TLS version.

New features
  - Added missing SSL options to match OpenSSL 1.0.1j.
  - New '-options' commandline option to display the list
    of supported SSL options.

Bugfixes:
  - Fixed FORK threading build regression bug.
  - Fixed missing periodic Win32 GUI log updates.

Version 5.05
New features:
  - Asynchronous communication with the GUI thread for faster
    logging on Win32.
  - systemd socket activation
  - The parameter of 'options' can now be prefixed with '-'
    to clear an SSL option, for example:
    'options = -LEGACY_SERVER_CONNECT'.
  - Improved 'transparent = destination' manual page
* Bugfixes
  - A number of minor Win32 GUI bugfixes and improvements.
  - Merged most of the Windows CE patches

Version 5.04
* New features
  - Support for local mode ('exec' option) on Win32.
  - Support for UTF-8 config file and log file.
  - Support for Unicode file names on Win32.
  - TCP/IP dependency added for NT service in order to prevent
    initialization failure at boot time.
  - FIPS canister updated to version 2.0.8 in the Win32 binary
    build.
* Bugfixes
  - load_icon_default() modified to return copies of default icons
    instead of the original resources to prevent the resources
    from being destroyed.
  - Missing REMOTE_PORT environmental variable is provided to
    processes spawned with 'exec' on Unix platforms.
  - Taskbar icon is no longer disabled for NT service.
  - Fixed taskbar icon initialization when commandline options are
    specified.
  - A number of minor Win32 GUI bugfixes and improvements.

Version 5.03
* Security bugfixes
  - OpenSSL DLLs updated to version 1.0.1i.
    See https://www.openssl.org/news/secadv_20140806.txt
* New features
  - FIPS autoconfiguration cleanup.
  - FIPS canister updated to version 2.0.6.
  - Improved SNI diagnostic logging.
* Bugfixes
  - Compilation fixes for old versions of OpenSSL.
  - Fixed whitespace handling in the stunnel.init script.

Version 5.02
* Security bugfixes
  - OpenSSL DLLs updated to version 1.0.1h.
    See https://www.openssl.org/news/secadv_20140605.txt
* New features
  - Major rewrite of the protocol.c interface: it is now possible to add
    protocol negotiations at multiple connection phases, protocols can
    individually decide whether the remote connection will be
    established before or after SSL/TLS is negotiated.
  - Heap memory blocks are wiped before release.  This only works for
    block allocated by stunnel, and not by OpenSSL or other libraries.
  - Updated the stunnel.conf and stunnel.init templates.
  - Added a client-mode example to the manual.
* Bugfixes
  - Fixed 'failover = rr' broken since version 5.00.
  - Fixed 'taskbar = no' broken since version 5.00.
  - Compilation fix for missing SSL_OP_MSIE_SSLV2_RSA_PADDING option.

Version 5.01:
Security bugfixes
  - OpenSSL DLLs updated to version 1.0.1g. This version mitigates TLS heartbeat read overrun (CVE-2014-0160).
New features
  - X.509 extensions added to the created self-signed stunnel.pem.
  - 'FIPS = no' also allowed in non-FIPS builds of stunnel.
  - Search all certificates with the same subject name for a matching public key rather than only the first one
  - Create logs in the local application data folder if stunnel folder is not writable on Win32.
Bugfixes
  - close_notify not sent when SSL still has some data buffered.
  - Protocol negotiation with server-side SNI fixed.
  - A Mac OS X missing symbols fixed.
  - Win32 configuration file reload crash fixed.
  - Added s_pool_free() on exec+connect service retires.
  - Line-buffering enforced on stderr output.
  - re-add openssl cert conf file stunnel.cnf dropped by oversight. 

Version 4.56 
CVE-2013-1762, bsc#807440)
  - 'session' option renamed to more readable 'sessionCacheTimeout'.
    The old name remains accepted for backward compatibility.
  - New service-level 'sessionCacheSize' option to control session cache size.
  - New service-level option 'reset' to control whether TCP RST flag is used to
    indicate errors. The default value is 'reset = yes'.
  - New service-level option 'renegotiation' to disable SSL renegotiation.
  - Added client-mode 'sni' option to directly control the value of TLS Server
    Name Indication (RFC 3546) extension.
  - Glibc-specific dynamic allocation tuning was applied to help unused memory deallocation.
  - Non-blocking OCSP implementation.
  - New 'compression = deflate' global option to enable RFC 2246 compresion.
  - correct configure option to enable libwrap support
  - Fix background operation to really go into background (stunnel-daemonize.diff)

Version 4.53
  - Usage of uninitialized variables fixed in exec+connect services.
  - Fixed handling of a rare inetd mode use case, where either stdin 
    or stdout is a socket, but not both of them at the same time.
  - Fixed crash on termination with FORK threading model.
  - Fixed missing file descriptors passed to local mode processes. 

Version 4.49
  - A bug was fixed causing crashes on MacOS X and some other platforms.

Additional changes from 4.48
  - FIPS support on Win32 platform added.  OpenSSL 0.9.8r DLLs
    based on FIPS 1.2.3 canister are included with this version of
    stunnel.  FIPS mode can be disabled with 'fips = no' configuration file option.
  - Fixed canary initialization problem on Win32 platform.
  - pass the path to the config file to the binary in the init
    script: without this the init script does not work for me.

Version 4.47
  Internal improvements
  - CVE-2010-3864 workaround improved to check runtime version of
  - Encoding of man page sources changed to UTF-8.
Bugfixes:
  - Logging was modified to save and restore system error codes.
  - Option 'service' was restricted to Unix, as since stunnel
    4.42 it wasn't doing anything useful on Windows platform.

Version 4.46
New features:
  - Added Unix socket support (e.g. 'connect =
    /var/run/stunnel/socket').
   Added 'verify = 4' mode to ignore CA chain and only verify peer certificate.
  - Removed the limit of 16 IP addresses for a single 'connect' option.
  - Removed the limit of 256 stunnel.conf sections in PTHREAD
    threading model. It is still not possible have more than 63
    sections on WIN32 platform.
Optimizations:
  - Reduced per-connection memory usage.
  - Performed a major refactoring of internal data structures.  Extensive
    internal testing was performed, but some regression bugs are expected.
Bugfixes:
  - Fixed WIN32 compilation with Mingw32.
  - Fixed non-blocking API emulation layer in UCONTEXT threading model.
  - Fixed signal handling in UCONTEXT threading model.

Version 4.45
New features:
  - 'protocol = proxy' support to send original client IP address to haproxy:
    http://haproxy.1wt.eu/download/1.5/doc/proxy-protocol.txt
    This requires accept-proxy bind option of haproxy 1.5-dev3 or later.
  - Added Win32 configuration reload without a valid configuration loaded.
  - Added compatibility with LTS OpenSSL versions 0.9.6 and 0.9.7.
    Some features are only available in OpenSSL 1.0.0 and later.

Performance optimizations:
  - Use SSL_MODE_RELEASE_BUFFERS if supported by the OpenSSL library.
  - Libwrap helper processes are no longer started if libwrap is disabled
    in all sections of the configuration file.

Internal improvements:
  - Protocol negotiation framework was rewritten to support
    additional code to be executed after
    SSL_accept()/SSL_connect().
  - Handling of memory allocation errors was rewritten to
    gracefully terminate the process

Bugfixes:
  - Fixed -l option handling in stunnel3 script
  - Script to build default stunnel.pem was fixed
  - MinGW compilation script (mingw.mak) was fixed
  - MSVC compilation script (vc.mak) was fixed.
  - A number of problems in WINSOCK error handling were fixed.

Version 4.43
New features:
  - Major optimization of the logging subsystem.
Bugfixes'
  - Fixed FORK and UCONTEXT threading models. 

Version 4.42
New features
   - New verify level 0 to request and ignore peer certificate.
   - Manual page has been updated.
Bugfixes:
   - Fixed a heap corruption vulnerability in versions 4.40 and 4.41.   
   - correct path in stunnel3 (bsc#710879) 

Version  4.40
New features:
  - Hardcoded 2048-bit DH parameters are used as a fallback if DH 
    parameters are not provided in stunnel.pem.
  - Default ECDH curve updated to 'prime256v1'.
  - Removed support for temporary RSA keys (used in obsolete export ciphers).

- Version 4.38
New features:
  - Server-side SNI implemented (RFC 3546 section 3.1) with a new 
    service-level option 'nsi'.  
  - 'socket' option also accepts 'yes' and 'no' for flags. 
  - Nagle's algorithm is now disabled by default for improved 
    interactivity.

Bugfixes:
  - A compilation fix was added for OpenSSL
  - Signal pipe set to non-blocking mode. This bug caused hangs 
    of stunnel features based on signals, e.g. local mode, FORK 
    threading, or configuration file reload on Unix.
  - disable the previous two patches for the time being 
  - create debug packages
  - fix ucontext handling (backport from v4.37) 
  - fix non-blocking socket handling (backport from v4.37) 
  - explicitly enable libwrap in configure call

New features:
  - Dynamic memory management for strings manipulation: no more static 
    STRLEN limit, lower stack footprint.
  - Strict public key comparison added for 'verify = 3' certificate checking mode
  - Backlog parameter of listen(2) changed from 5 to SOMAXCONN: improved behavior on heavy load.
    Old behavior can be restored with 'listenqueue = 5' in stunnel.conf
Bugfixes:
  - Missing pthread_attr_destroy() added to fix memory leak

- Version 4.35
New features:
  - Updated Win32 DLLs for OpenSSL 1.0.0c.
  - Transparent source (non-local bind) added for FreeBSD 8.x.
  - Transparent destination ('transparent = destination') added for Linux.

Bugfixes:
  - Fixed reload of FIPS-enabled stunnel.
  - Compiler options are now auto-detected by ./configure script
    in order to support obsolete versions of gcc.
  - Async-signal-unsafe s_log() removed from SIGTERM/SIGQUIT/SIGINT handler.
    This issue may have security implications on some deployments.
  - Directory lib64 included in the OpenSSL library search path.
  - Windows CE compilation fixes

- Domain name changes
  - http://stunnel.mirt.net/  http://www.stunnel.org/
  - ftp://stunnel.mirt.net/  http://ftp.stunnel.org/
  - stunnel.mirt.net::stunnel rsync.stunnel.org::stunnel
  - stunnel-users@mirt.net stunnel-users@stunnel.org
  - stunnel-announce@mirt.net stunnel-announce@stunnel.org

- Version 4.34:
  - Added ECC support with a new service-level 'curve' option.
  - DH support is now enabled by default.
  - Added support for OpenSSL builds with some algorithms disabled.
  - ./configure modified to support cross-compilation.
  - Implemented fixes in user interface to enter engine PIN.
  - Fixed a transfer() loop issue on socket errors.
  - Fixed missing WIN32 taskbar icon while displaying a global option error.
  - Inetd mode fixed.
  - New service-level 'libwrap' option for run-time control whether
    /etc/hosts.allow and /etc/hosts.deny are used for access control.
    Disabling libwrap significantly increases performance of stunnel.
  - Win32 DLLs for OpenSSL 0.9.8m.
  - Fixed a transfer() loop issue with SSLv2 connections.
  - Fixed a 'setsockopt IP_TRANSPARENT' warning with 'local' option.
  - Logging subsystem bugfixes and cleanup.
  - Installer bugfixes for Vista and later versions of Windows.
  - FIPS mode can be enabled/disabled at runtime.
  - Log file reopen on USR1 signal was added.
  - Some regression issues introduced in 4.30 were fixed.
  - Graceful configuration reload with HUP signal on Unix
    and with GUI on Windows.
  - A serious bug in asynchronous shutdown code fixed.
  - Data alignment updated in libwrap.c.
  - Polish manual encoding fixed.
  - Notes on compression implementation in OpenSSL added to the manual.

- bugfixes for 4.28
Bugfixes:
  - 'execargs' defaults to the 'exec' parameter

- Version 4.27:
New features:
  - Win32 DLLs for OpenSSL 0.9.8l.
  - Transparent proxy support on Linux kernels &gt;=2.6.28. See the manual for details.
  - New socket options to control TCP keepalive on Linux: TCP_KEEPCNT, TCP_KEEPIDLE, TCP_KEEPINTVL.
  - SSL options updated for the recent version of OpenSSL library.
Bugfixes:
  - A serious bug in asynchronous shutdown code fixed.
  - Data alignment updated in libwrap.c.
  - Polish manual encoding fixed.
  - Notes on compression implementation in OpenSSL added to the manual.		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-20"/>
	<updated date="2023-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1032557">SUSE bug 1032557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069468">SUSE bug 1069468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150730">SUSE bug 1150730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177580">SUSE bug 1177580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178533">SUSE bug 1178533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182376">SUSE bug 1182376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182529">SUSE bug 1182529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/674554">SUSE bug 674554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/710879">SUSE bug 710879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807440">SUSE bug 807440</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3864">CVE-2010-3864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2940/">CVE-2011-2940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2940">CVE-2011-2940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1762/">CVE-2013-1762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1762">CVE-2013-1762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0160">CVE-2014-0160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3644/">CVE-2015-3644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3644">CVE-2015-3644 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20230/">CVE-2021-20230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20230">CVE-2021-20230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802615" comment="stunnel-5.62-10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153065" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216378" ref_url="https://bugzilla.suse.com/1216378" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45853" ref_url="https://www.suse.com/security/cve/CVE-2023-45853/" source="CVE"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2023-45853: Fixed an integer overflow that would lead to a
  buffer overflow in the minizip subcomponent (bsc#1216378).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-20"/>
	<updated date="2023-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216378">SUSE bug 1216378</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45853/">CVE-2023-45853 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45853">CVE-2023-45853 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802612" comment="libz1-1.2.8-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802613" comment="libz1-32bit-1.2.8-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802614" comment="zlib-devel-1.2.8-12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153066" version="1" class="patch">
	<metadata>
		<title>Security update for fwupdate (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209188" ref_url="https://bugzilla.suse.com/1209188" source="BUGZILLA"/>
		<description>

This update of fwupdate fixes the following issues:

- rebuild the package with the new secure boot key (bsc#1209188).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-23"/>
	<updated date="2023-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209188">SUSE bug 1209188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799098" comment="fwupdate-0.5-10.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799099" comment="fwupdate-efi-0.5-10.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799100" comment="libfwup0-0.5-10.14.5 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799098" comment="fwupdate-0.5-10.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799099" comment="fwupdate-efi-0.5-10.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799100" comment="libfwup0-0.5-10.14.5 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153067" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215744" ref_url="https://bugzilla.suse.com/1215744" source="BUGZILLA"/>
		<reference ref_id="1215746" ref_url="https://bugzilla.suse.com/1215746" source="BUGZILLA"/>
		<reference ref_id="1215747" ref_url="https://bugzilla.suse.com/1215747" source="BUGZILLA"/>
		<reference ref_id="1215748" ref_url="https://bugzilla.suse.com/1215748" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34323" ref_url="https://www.suse.com/security/cve/CVE-2023-34323/" source="CVE"/>
		<reference ref_id="CVE-2023-34325" ref_url="https://www.suse.com/security/cve/CVE-2023-34325/" source="CVE"/>
		<reference ref_id="CVE-2023-34326" ref_url="https://www.suse.com/security/cve/CVE-2023-34326/" source="CVE"/>
		<reference ref_id="CVE-2023-34327" ref_url="https://www.suse.com/security/cve/CVE-2023-34327/" source="CVE"/>
		<reference ref_id="CVE-2023-34328" ref_url="https://www.suse.com/security/cve/CVE-2023-34328/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-34323: Fixed a potential crash in C Xenstored due to an
  incorrect assertion (XSA-440) (bsc#1215744).
- CVE-2023-34326: Fixed a missing IOMMU TLB flush on x86 AMD systems
  with IOMMU hardware and PCI passthrough enabled (XSA-442)
  (bsc#1215746).
- CVE-2023-34325: Fixed multiple parsing issues in libfsimage
  (XSA-443) (bsc#1215747).
- CVE-2023-34327, CVE-2023-34328: Fixed multiple issues with AMD x86
  debugging functionality for guests (XSA-444) (bsc#1215748).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-24"/>
	<updated date="2023-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215744">SUSE bug 1215744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215746">SUSE bug 1215746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215747">SUSE bug 1215747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215748">SUSE bug 1215748</bugzilla>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34323/">CVE-2023-34323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34323">CVE-2023-34323 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-34325/">CVE-2023-34325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34325">CVE-2023-34325 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34326/">CVE-2023-34326 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34326">CVE-2023-34326 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34327/">CVE-2023-34327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34327">CVE-2023-34327 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34328/">CVE-2023-34328 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34328">CVE-2023-34328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802606" comment="xen-4.9.4_44-3.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802607" comment="xen-doc-html-4.9.4_44-3.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802608" comment="xen-libs-4.9.4_44-3.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802609" comment="xen-libs-32bit-4.9.4_44-3.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802610" comment="xen-tools-4.9.4_44-3.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802611" comment="xen-tools-domU-4.9.4_44-3.129.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802606" comment="xen-4.9.4_44-3.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802607" comment="xen-doc-html-4.9.4_44-3.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802608" comment="xen-libs-4.9.4_44-3.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802609" comment="xen-libs-32bit-4.9.4_44-3.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802610" comment="xen-tools-4.9.4_44-3.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802611" comment="xen-tools-domU-4.9.4_44-3.129.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153068" version="1" class="patch">
	<metadata>
		<title>Security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216123" ref_url="https://bugzilla.suse.com/1216123" source="BUGZILLA"/>
		<reference ref_id="1216174" ref_url="https://bugzilla.suse.com/1216174" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This update for nghttp2 fixes the following issues:

- CVE-2023-44487: Fixed HTTP/2 Rapid Reset attack. (bsc#1216174)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-25"/>
	<updated date="2023-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216123">SUSE bug 1216123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216174">SUSE bug 1216174</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802605" comment="libnghttp2-14-1.39.2-3.13.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802605" comment="libnghttp2-14-1.39.2-3.13.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153069" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1213379" ref_url="https://bugzilla.suse.com/1213379" source="BUGZILLA"/>
		<reference ref_id="1213581" ref_url="https://bugzilla.suse.com/1213581" source="BUGZILLA"/>
		<reference ref_id="1213905" ref_url="https://bugzilla.suse.com/1213905" source="BUGZILLA"/>
		<reference ref_id="1215072" ref_url="https://bugzilla.suse.com/1215072" source="BUGZILLA"/>
		<reference ref_id="1215661" ref_url="https://bugzilla.suse.com/1215661" source="BUGZILLA"/>
		<reference ref_id="1215866" ref_url="https://bugzilla.suse.com/1215866" source="BUGZILLA"/>
		<reference ref_id="1215867" ref_url="https://bugzilla.suse.com/1215867" source="BUGZILLA"/>
		<reference ref_id="1215868" ref_url="https://bugzilla.suse.com/1215868" source="BUGZILLA"/>
		<reference ref_id="1215869" ref_url="https://bugzilla.suse.com/1215869" source="BUGZILLA"/>
		<reference ref_id="1215870" ref_url="https://bugzilla.suse.com/1215870" source="BUGZILLA"/>
		<reference ref_id="1216483" ref_url="https://bugzilla.suse.com/1216483" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32393" ref_url="https://www.suse.com/security/cve/CVE-2023-32393/" source="CVE"/>
		<reference ref_id="CVE-2023-35074" ref_url="https://www.suse.com/security/cve/CVE-2023-35074/" source="CVE"/>
		<reference ref_id="CVE-2023-37450" ref_url="https://www.suse.com/security/cve/CVE-2023-37450/" source="CVE"/>
		<reference ref_id="CVE-2023-39434" ref_url="https://www.suse.com/security/cve/CVE-2023-39434/" source="CVE"/>
		<reference ref_id="CVE-2023-39928" ref_url="https://www.suse.com/security/cve/CVE-2023-39928/" source="CVE"/>
		<reference ref_id="CVE-2023-40451" ref_url="https://www.suse.com/security/cve/CVE-2023-40451/" source="CVE"/>
		<reference ref_id="CVE-2023-41074" ref_url="https://www.suse.com/security/cve/CVE-2023-41074/" source="CVE"/>
		<reference ref_id="CVE-2023-41993" ref_url="https://www.suse.com/security/cve/CVE-2023-41993/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2023-41993: Fixed an issue where processing malicious web
  content could have lead to arbitrary code execution (bsc#1215661).
- CVE-2023-39928: Fixed a use-after-free that could be exploited to
  execute arbitrary code when visiting a malicious webpage
  (bsc#1215868).
- CVE-2023-41074: Fixed an issue where processing malicious web
  content could have lead to arbitrary code execution (bsc#1215870).

Non-security fixes:

- Fixed missing package dependencies (bsc#1215072).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-26"/>
	<updated date="2023-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213379">SUSE bug 1213379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213581">SUSE bug 1213581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213905">SUSE bug 1213905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215072">SUSE bug 1215072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215661">SUSE bug 1215661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215866">SUSE bug 1215866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215867">SUSE bug 1215867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215868">SUSE bug 1215868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215869">SUSE bug 1215869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215870">SUSE bug 1215870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216483">SUSE bug 1216483</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32393/">CVE-2023-32393 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32393">CVE-2023-32393 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35074/">CVE-2023-35074 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35074">CVE-2023-35074 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37450/">CVE-2023-37450 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37450">CVE-2023-37450 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39434/">CVE-2023-39434 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39434">CVE-2023-39434 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39928/">CVE-2023-39928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39928">CVE-2023-39928 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40451/">CVE-2023-40451 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40451">CVE-2023-40451 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-41074/">CVE-2023-41074 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41074">CVE-2023-41074 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-41993/">CVE-2023-41993 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41993">CVE-2023-41993 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009803217" comment="libjavascriptcoregtk-4_0-18-2.42.1-2.155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803218" comment="libwebkit2gtk-4_0-37-2.42.1-2.155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803178" comment="libwebkit2gtk3-lang-2.42.1-2.155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803219" comment="typelib-1_0-JavaScriptCore-4_0-2.42.1-2.155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803220" comment="typelib-1_0-WebKit2-4_0-2.42.1-2.155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803221" comment="typelib-1_0-WebKit2WebExtension-4_0-2.42.1-2.155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803222" comment="webkit2gtk-4_0-injected-bundles-2.42.1-2.155.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009803217" comment="libjavascriptcoregtk-4_0-18-2.42.1-2.155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803218" comment="libwebkit2gtk-4_0-37-2.42.1-2.155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803178" comment="libwebkit2gtk3-lang-2.42.1-2.155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803219" comment="typelib-1_0-JavaScriptCore-4_0-2.42.1-2.155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803220" comment="typelib-1_0-WebKit2-4_0-2.42.1-2.155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803221" comment="typelib-1_0-WebKit2WebExtension-4_0-2.42.1-2.155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803222" comment="webkit2gtk-4_0-injected-bundles-2.42.1-2.155.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153070" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207982" ref_url="https://bugzilla.suse.com/1207982" source="BUGZILLA"/>
		<reference ref_id="1207983" ref_url="https://bugzilla.suse.com/1207983" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-44267" ref_url="https://www.suse.com/security/cve/CVE-2022-44267/" source="CVE"/>
		<reference ref_id="CVE-2022-44268" ref_url="https://www.suse.com/security/cve/CVE-2022-44268/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2022-44267: Fixed a denial of service when parsing a PNG image (bsc#1207982).                                                                                                            
- CVE-2022-44268: Fixed arbitrary file disclosure when parsing a PNG image (bsc#1207983).                                                                                                      
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2023-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207982">SUSE bug 1207982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207983">SUSE bug 1207983</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44267/">CVE-2022-44267 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44267">CVE-2022-44267 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-44268/">CVE-2022-44268 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44268">CVE-2022-44268 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009738787" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.183.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738788" comment="ImageMagick-config-6-upstream-6.8.8.1-71.183.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738789" comment="libMagickCore-6_Q16-1-6.8.8.1-71.183.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738790" comment="libMagickWand-6_Q16-1-6.8.8.1-71.183.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009738787" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.183.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738788" comment="ImageMagick-config-6-upstream-6.8.8.1-71.183.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738789" comment="libMagickCore-6_Q16-1-6.8.8.1-71.183.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738790" comment="libMagickWand-6_Q16-1-6.8.8.1-71.183.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153071" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216338" ref_url="https://bugzilla.suse.com/1216338" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5721" ref_url="https://www.suse.com/security/cve/CVE-2023-5721/" source="CVE"/>
		<reference ref_id="CVE-2023-5722" ref_url="https://www.suse.com/security/cve/CVE-2023-5722/" source="CVE"/>
		<reference ref_id="CVE-2023-5723" ref_url="https://www.suse.com/security/cve/CVE-2023-5723/" source="CVE"/>
		<reference ref_id="CVE-2023-5724" ref_url="https://www.suse.com/security/cve/CVE-2023-5724/" source="CVE"/>
		<reference ref_id="CVE-2023-5725" ref_url="https://www.suse.com/security/cve/CVE-2023-5725/" source="CVE"/>
		<reference ref_id="CVE-2023-5726" ref_url="https://www.suse.com/security/cve/CVE-2023-5726/" source="CVE"/>
		<reference ref_id="CVE-2023-5727" ref_url="https://www.suse.com/security/cve/CVE-2023-5727/" source="CVE"/>
		<reference ref_id="CVE-2023-5728" ref_url="https://www.suse.com/security/cve/CVE-2023-5728/" source="CVE"/>
		<reference ref_id="CVE-2023-5729" ref_url="https://www.suse.com/security/cve/CVE-2023-5729/" source="CVE"/>
		<reference ref_id="CVE-2023-5730" ref_url="https://www.suse.com/security/cve/CVE-2023-5730/" source="CVE"/>
		<reference ref_id="CVE-2023-5731" ref_url="https://www.suse.com/security/cve/CVE-2023-5731/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Updated to version 115.4.0 ESR (bsc#1216338).

  - CVE-2023-5721: Fixed a potential clickjack via queued up
    rendering.
  - CVE-2023-5722: Fixed a cross-Origin size and header leakage.
  - CVE-2023-5723: Fixed unexpected errors when handling invalid
    cookie characters.
  - CVE-2023-5724: Fixed a crash due to a large WebGL draw.
  - CVE-2023-5725: Fixed an issue where WebExtensions could open
    arbitrary URLs.
  - CVE-2023-5726: Fixed an issue where fullscreen notifications would
    be obscured by file the open dialog on macOS.
  - CVE-2023-5727: Fixed a download protection bypass on on Windows.
  - CVE-2023-5728: Fixed a crash caused by improper object tracking
    during GC in the JavaScript engine.
  - CVE-2023-5729: Fixed an issue where fullscreen notifications would
    be obscured by WebAuthn prompts.
  - CVE-2023-5730: Fixed multiple memory safety issues.
  - CVE-2023-5731: Fixed multiple memory safety issues.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-26"/>
	<updated date="2023-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216338">SUSE bug 1216338</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5721/">CVE-2023-5721 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5721">CVE-2023-5721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5722/">CVE-2023-5722 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5722">CVE-2023-5722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5723/">CVE-2023-5723 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5723">CVE-2023-5723 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5724/">CVE-2023-5724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5724">CVE-2023-5724 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5725/">CVE-2023-5725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5725">CVE-2023-5725 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5726/">CVE-2023-5726 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5726">CVE-2023-5726 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5727/">CVE-2023-5727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5727">CVE-2023-5727 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5728/">CVE-2023-5728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5728">CVE-2023-5728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5729/">CVE-2023-5729 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5729">CVE-2023-5729 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5730/">CVE-2023-5730 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5730">CVE-2023-5730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5731/">CVE-2023-5731 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5731">CVE-2023-5731 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802963" comment="MozillaFirefox-115.4.0-112.188.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802898" comment="MozillaFirefox-devel-115.4.0-112.188.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802964" comment="MozillaFirefox-translations-common-115.4.0-112.188.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802963" comment="MozillaFirefox-115.4.0-112.188.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802898" comment="MozillaFirefox-devel-115.4.0-112.188.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802964" comment="MozillaFirefox-translations-common-115.4.0-112.188.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153072" version="1" class="patch">
	<metadata>
		<title>Security update for vorbis-tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215942" ref_url="https://bugzilla.suse.com/1215942" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43361" ref_url="https://www.suse.com/security/cve/CVE-2023-43361/" source="CVE"/>
		<description>
This update for vorbis-tools fixes the following issues:

- CVE-2023-43361: Fixed a buffer overflow vulnerability during the conversion of wav files to ogg files. (bsc#1215942)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-26"/>
	<updated date="2023-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215942">SUSE bug 1215942</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-43361/">CVE-2023-43361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43361">CVE-2023-43361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802965" comment="vorbis-tools-1.4.0-27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802908" comment="vorbis-tools-lang-1.4.0-27.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802965" comment="vorbis-tools-1.4.0-27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802908" comment="vorbis-tools-lang-1.4.0-27.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153073" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216377" ref_url="https://bugzilla.suse.com/1216377" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45803" ref_url="https://www.suse.com/security/cve/CVE-2023-45803/" source="CVE"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2023-45803: Fix a request body leak that could occur when
  receiving a 303 HTTP response (bsc#1216377).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-27"/>
	<updated date="2023-10-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216377">SUSE bug 1216377</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45803/">CVE-2023-45803 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45803">CVE-2023-45803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803592" comment="python-urllib3-1.22-7.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153074" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208027" ref_url="https://bugzilla.suse.com/1208027" source="BUGZILLA"/>
		<reference ref_id="1208028" ref_url="https://bugzilla.suse.com/1208028" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22490" ref_url="https://www.suse.com/security/cve/CVE-2023-22490/" source="CVE"/>
		<reference ref_id="CVE-2023-23946" ref_url="https://www.suse.com/security/cve/CVE-2023-23946/" source="CVE"/>
		<description>
This update for git fixes the following issues:

  - CVE-2023-22490: Fixed incorrectly usable local clone optimization even when using a non-local transport (bsc#1208027).
  - CVE-2023-23946: Fixed issue where a path outside the working tree can be overwritten as the user who is running 'git apply' (bsc#1208028).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2023-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208027">SUSE bug 1208027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208028">SUSE bug 1208028</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22490/">CVE-2023-22490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22490">CVE-2023-22490 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-23946/">CVE-2023-23946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23946">CVE-2023-23946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009740121" comment="git-2.26.2-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740122" comment="git-core-2.26.2-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740123" comment="git-cvs-2.26.2-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740124" comment="git-daemon-2.26.2-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740125" comment="git-email-2.26.2-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740126" comment="git-gui-2.26.2-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740127" comment="git-svn-2.26.2-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740128" comment="git-web-2.26.2-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740129" comment="gitk-2.26.2-27.66.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009740121" comment="git-2.26.2-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740122" comment="git-core-2.26.2-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740123" comment="git-cvs-2.26.2-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740124" comment="git-daemon-2.26.2-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740125" comment="git-email-2.26.2-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740126" comment="git-gui-2.26.2-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740127" comment="git-svn-2.26.2-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740128" comment="git-web-2.26.2-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740129" comment="gitk-2.26.2-27.66.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153075" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216625" ref_url="https://bugzilla.suse.com/1216625" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40477" ref_url="https://www.suse.com/security/cve/CVE-2023-40477/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- Updated to version 0.103.11:

  - CVE-2023-40477: Updated libclamunrar dependency to version 6.2.12
    (bsc#1216625).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-31"/>
	<updated date="2023-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216625">SUSE bug 1216625</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40477/">CVE-2023-40477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-40477">CVE-2023-40477 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803948" comment="clamav-0.103.11-33.59.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803948" comment="clamav-0.103.11-33.59.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153076" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1213451" ref_url="https://bugzilla.suse.com/1213451" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-33065" ref_url="https://www.suse.com/security/cve/CVE-2022-33065/" source="CVE"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2022-33065: Fixed an integer overflow that could cause memory
  safety issues when reading a MAT4 file (bsc#1213451).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-01"/>
	<updated date="2023-11-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213451">SUSE bug 1213451</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-33065/">CVE-2022-33065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33065">CVE-2022-33065 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009803223" comment="libsndfile1-1.0.25-36.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803224" comment="libsndfile1-32bit-1.0.25-36.29.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009803223" comment="libsndfile1-1.0.25-36.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803224" comment="libsndfile1-32bit-1.0.25-36.29.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153077" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216119" ref_url="https://bugzilla.suse.com/1216119" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-42795" ref_url="https://www.suse.com/security/cve/CVE-2023-42795/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2023-42795: Fixed a potential information leak due to insufficient cleanup. (bsc#1216119)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2023-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216119">SUSE bug 1216119</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-42795/">CVE-2023-42795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42795">CVE-2023-42795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009808010" comment="tomcat-8.0.53-29.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808011" comment="tomcat-admin-webapps-8.0.53-29.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808012" comment="tomcat-docs-webapp-8.0.53-29.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808013" comment="tomcat-el-3_0-api-8.0.53-29.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808014" comment="tomcat-javadoc-8.0.53-29.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808015" comment="tomcat-jsp-2_3-api-8.0.53-29.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808016" comment="tomcat-lib-8.0.53-29.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808017" comment="tomcat-servlet-3_1-api-8.0.53-29.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808018" comment="tomcat-webapps-8.0.53-29.72.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009808010" comment="tomcat-8.0.53-29.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808011" comment="tomcat-admin-webapps-8.0.53-29.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808012" comment="tomcat-docs-webapp-8.0.53-29.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808013" comment="tomcat-el-3_0-api-8.0.53-29.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808014" comment="tomcat-javadoc-8.0.53-29.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808015" comment="tomcat-jsp-2_3-api-8.0.53-29.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808016" comment="tomcat-lib-8.0.53-29.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808017" comment="tomcat-servlet-3_1-api-8.0.53-29.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808018" comment="tomcat-webapps-8.0.53-29.72.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153078" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214357" ref_url="https://bugzilla.suse.com/1214357" source="BUGZILLA"/>
		<reference ref_id="1216424" ref_url="https://bugzilla.suse.com/1216424" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-31122" ref_url="https://www.suse.com/security/cve/CVE-2023-31122/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2023-31122: Fixed an out of bounds read in mod_macro (bsc#1216424).

Non-security fixes:

-  Fixed the content type handling in mod_proxy_http2 (bsc#1214357).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2023-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214357">SUSE bug 1214357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216424">SUSE bug 1216424</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31122/">CVE-2023-31122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31122">CVE-2023-31122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807495" comment="apache2-2.4.23-29.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807496" comment="apache2-doc-2.4.23-29.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807497" comment="apache2-example-pages-2.4.23-29.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807498" comment="apache2-prefork-2.4.23-29.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807499" comment="apache2-utils-2.4.23-29.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807500" comment="apache2-worker-2.4.23-29.100.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807495" comment="apache2-2.4.23-29.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807496" comment="apache2-doc-2.4.23-29.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807497" comment="apache2-example-pages-2.4.23-29.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807498" comment="apache2-prefork-2.4.23-29.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807499" comment="apache2-utils-2.4.23-29.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807500" comment="apache2-worker-2.4.23-29.100.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153079" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1112424" ref_url="https://bugzilla.suse.com/1112424" source="BUGZILLA"/>
		<reference ref_id="1112428" ref_url="https://bugzilla.suse.com/1112428" source="BUGZILLA"/>
		<reference ref_id="1128114" ref_url="https://bugzilla.suse.com/1128114" source="BUGZILLA"/>
		<reference ref_id="1129202" ref_url="https://bugzilla.suse.com/1129202" source="BUGZILLA"/>
		<reference ref_id="1140745" ref_url="https://bugzilla.suse.com/1140745" source="BUGZILLA"/>
		<reference ref_id="1143570" ref_url="https://bugzilla.suse.com/1143570" source="BUGZILLA"/>
		<reference ref_id="1214256" ref_url="https://bugzilla.suse.com/1214256" source="BUGZILLA"/>
		<reference ref_id="1214723" ref_url="https://bugzilla.suse.com/1214723" source="BUGZILLA"/>
		<reference ref_id="1214726" ref_url="https://bugzilla.suse.com/1214726" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18454" ref_url="https://www.suse.com/security/cve/CVE-2018-18454/" source="CVE"/>
		<reference ref_id="CVE-2018-18456" ref_url="https://www.suse.com/security/cve/CVE-2018-18456/" source="CVE"/>
		<reference ref_id="CVE-2019-13287" ref_url="https://www.suse.com/security/cve/CVE-2019-13287/" source="CVE"/>
		<reference ref_id="CVE-2019-14292" ref_url="https://www.suse.com/security/cve/CVE-2019-14292/" source="CVE"/>
		<reference ref_id="CVE-2019-9545" ref_url="https://www.suse.com/security/cve/CVE-2019-9545/" source="CVE"/>
		<reference ref_id="CVE-2019-9631" ref_url="https://www.suse.com/security/cve/CVE-2019-9631/" source="CVE"/>
		<reference ref_id="CVE-2020-36023" ref_url="https://www.suse.com/security/cve/CVE-2020-36023/" source="CVE"/>
		<reference ref_id="CVE-2022-37052" ref_url="https://www.suse.com/security/cve/CVE-2022-37052/" source="CVE"/>
		<reference ref_id="CVE-2022-48545" ref_url="https://www.suse.com/security/cve/CVE-2022-48545/" source="CVE"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2019-9545: Fixed a potential crash due to uncontrolled recursion
  in the JBIG parser (bsc#1128114).
- CVE-2019-9631: Fixed an out of bounds read when converting a PDF to
  an image (bsc#1129202).
- CVE-2022-37052: Fixed a reachable assertion when extracting pages of
  a PDf file (bsc#1214726).
- CVE-2020-36023: Fixed a stack bugger overflow in
  FoFiType1C:cvtGlyph (bsc#1214256).
- CVE-2019-13287: Fixed an out-of-bounds read vulnerability in the
  function SplashXPath:strokeAdjust (bsc#1140745).
- CVE-2018-18456: Fixed a stack-based buffer over-read via a crafted
  pdf file (bsc#1112428).
- CVE-2018-18454: Fixed heap-based buffer over-read via a crafted pdf
  file (bsc#1112424).
- CVE-2019-14292: Fixed an out of bounds read in GfxState.cc
  (bsc#1143570).
- CVE-2022-48545: Fixed an infinite recursion in
  Catalog::findDestInTree which can cause denial of service
  (bsc#1214723).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2023-11-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112424">SUSE bug 1112424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112428">SUSE bug 1112428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128114">SUSE bug 1128114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129202">SUSE bug 1129202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140745">SUSE bug 1140745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143570">SUSE bug 1143570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214256">SUSE bug 1214256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214723">SUSE bug 1214723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214726">SUSE bug 1214726</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18454/">CVE-2018-18454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18454">CVE-2018-18454 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18456/">CVE-2018-18456 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18456">CVE-2018-18456 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13287/">CVE-2019-13287 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13287">CVE-2019-13287 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14292/">CVE-2019-14292 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14292">CVE-2019-14292 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9545/">CVE-2019-9545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9545">CVE-2019-9545 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9631/">CVE-2019-9631 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9631">CVE-2019-9631 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36023/">CVE-2020-36023 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36023">CVE-2020-36023 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-37052/">CVE-2022-37052 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37052">CVE-2022-37052 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48545/">CVE-2022-48545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48545">CVE-2022-48545 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807491" comment="libpoppler-glib8-0.43.0-16.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807492" comment="libpoppler-qt4-4-0.43.0-16.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807493" comment="libpoppler60-0.43.0-16.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807494" comment="poppler-tools-0.43.0-16.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153080" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215793" ref_url="https://bugzilla.suse.com/1215793" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40474" ref_url="https://www.suse.com/security/cve/CVE-2023-40474/" source="CVE"/>
		<description>
This update for gstreamer-plugins-bad fixes the following issues:

- CVE-2023-40474: Fixed a remote code execution issue due to improper parsing of H265 encoded video files (bsc#1215793).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-05"/>
	<updated date="2023-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215793">SUSE bug 1215793</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40474/">CVE-2023-40474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-40474">CVE-2023-40474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009808022" comment="gstreamer-plugins-bad-1.8.3-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807875" comment="gstreamer-plugins-bad-lang-1.8.3-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808023" comment="libgstadaptivedemux-1_0-0-1.8.3-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808024" comment="libgstbadaudio-1_0-0-1.8.3-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808025" comment="libgstbadbase-1_0-0-1.8.3-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808026" comment="libgstbadvideo-1_0-0-1.8.3-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808027" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808028" comment="libgstcodecparsers-1_0-0-1.8.3-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808029" comment="libgstgl-1_0-0-1.8.3-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808030" comment="libgstmpegts-1_0-0-1.8.3-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808031" comment="libgstphotography-1_0-0-1.8.3-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808032" comment="libgsturidownloader-1_0-0-1.8.3-18.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009808022" comment="gstreamer-plugins-bad-1.8.3-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807875" comment="gstreamer-plugins-bad-lang-1.8.3-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808023" comment="libgstadaptivedemux-1_0-0-1.8.3-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808024" comment="libgstbadaudio-1_0-0-1.8.3-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808025" comment="libgstbadbase-1_0-0-1.8.3-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808026" comment="libgstbadvideo-1_0-0-1.8.3-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808027" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808028" comment="libgstcodecparsers-1_0-0-1.8.3-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808029" comment="libgstgl-1_0-0-1.8.3-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808030" comment="libgstmpegts-1_0-0-1.8.3-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808031" comment="libgstphotography-1_0-0-1.8.3-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808032" comment="libgsturidownloader-1_0-0-1.8.3-18.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153081" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207248" ref_url="https://bugzilla.suse.com/1207248" source="BUGZILLA"/>
		<reference ref_id="1207249" ref_url="https://bugzilla.suse.com/1207249" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-21830" ref_url="https://www.suse.com/security/cve/CVE-2023-21830/" source="CVE"/>
		<reference ref_id="CVE-2023-21843" ref_url="https://www.suse.com/security/cve/CVE-2023-21843/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

  Updated to version jdk8u362 (icedtea-3.26.0):

  - CVE-2023-21830: Fixed improper restrictions in CORBA deserialization (bsc#1207249).
  - CVE-2023-21843: Fixed soundbank URL remote loading (bsc#1207248).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-16"/>
	<updated date="2023-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1207248">SUSE bug 1207248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207249">SUSE bug 1207249</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21830/">CVE-2023-21830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21830">CVE-2023-21830 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21843/">CVE-2023-21843 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21843">CVE-2023-21843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009738783" comment="java-1_8_0-openjdk-1.8.0.362-27.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738784" comment="java-1_8_0-openjdk-demo-1.8.0.362-27.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738785" comment="java-1_8_0-openjdk-devel-1.8.0.362-27.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738786" comment="java-1_8_0-openjdk-headless-1.8.0.362-27.84.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009738783" comment="java-1_8_0-openjdk-1.8.0.362-27.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738784" comment="java-1_8_0-openjdk-demo-1.8.0.362-27.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738785" comment="java-1_8_0-openjdk-devel-1.8.0.362-27.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738786" comment="java-1_8_0-openjdk-headless-1.8.0.362-27.84.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153082" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1212535" ref_url="https://bugzilla.suse.com/1212535" source="BUGZILLA"/>
		<reference ref_id="1212881" ref_url="https://bugzilla.suse.com/1212881" source="BUGZILLA"/>
		<reference ref_id="1212883" ref_url="https://bugzilla.suse.com/1212883" source="BUGZILLA"/>
		<reference ref_id="1212888" ref_url="https://bugzilla.suse.com/1212888" source="BUGZILLA"/>
		<reference ref_id="1213273" ref_url="https://bugzilla.suse.com/1213273" source="BUGZILLA"/>
		<reference ref_id="1213274" ref_url="https://bugzilla.suse.com/1213274" source="BUGZILLA"/>
		<reference ref_id="1213589" ref_url="https://bugzilla.suse.com/1213589" source="BUGZILLA"/>
		<reference ref_id="1213590" ref_url="https://bugzilla.suse.com/1213590" source="BUGZILLA"/>
		<reference ref_id="1214574" ref_url="https://bugzilla.suse.com/1214574" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-18768" ref_url="https://www.suse.com/security/cve/CVE-2020-18768/" source="CVE"/>
		<reference ref_id="CVE-2023-25433" ref_url="https://www.suse.com/security/cve/CVE-2023-25433/" source="CVE"/>
		<reference ref_id="CVE-2023-26966" ref_url="https://www.suse.com/security/cve/CVE-2023-26966/" source="CVE"/>
		<reference ref_id="CVE-2023-2908" ref_url="https://www.suse.com/security/cve/CVE-2023-2908/" source="CVE"/>
		<reference ref_id="CVE-2023-3316" ref_url="https://www.suse.com/security/cve/CVE-2023-3316/" source="CVE"/>
		<reference ref_id="CVE-2023-3576" ref_url="https://www.suse.com/security/cve/CVE-2023-3576/" source="CVE"/>
		<reference ref_id="CVE-2023-3618" ref_url="https://www.suse.com/security/cve/CVE-2023-3618/" source="CVE"/>
		<reference ref_id="CVE-2023-38288" ref_url="https://www.suse.com/security/cve/CVE-2023-38288/" source="CVE"/>
		<reference ref_id="CVE-2023-38289" ref_url="https://www.suse.com/security/cve/CVE-2023-38289/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2023-38289: Fixed a NULL pointer dereference in raw2tiff
  (bsc#1213589).
- CVE-2023-38288: Fixed an integer overflow in raw2tiff (bsc#1213590).
- CVE-2023-3576: Fixed a memory leak in tiffcrop (bsc#1213273).
- CVE-2020-18768: Fixed an out of bounds read in tiffcp (bsc#1214574).
- CVE-2023-26966: Fixed an out of bounds read when transforming a
  little-endian file to a big-endian output (bsc#1212881)
- CVE-2023-3618: Fixed a NULL pointer dereference while encoding FAX3
  files (bsc#1213274).
- CVE-2023-2908: Fixed an undefined behavior issue when doing pointer
  arithmetic on a NULL pointer (bsc#1212888).
- CVE-2023-3316: Fixed a NULL pointer dereference while opening a file
  in an inaccessible path (bsc#1212535).
- CVE-2023-25433: Fixed a buffer overflow in tiffcrop (bsc#1212883).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-06"/>
	<updated date="2023-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212535">SUSE bug 1212535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212881">SUSE bug 1212881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212883">SUSE bug 1212883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212888">SUSE bug 1212888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213273">SUSE bug 1213273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213274">SUSE bug 1213274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213589">SUSE bug 1213589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213590">SUSE bug 1213590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214574">SUSE bug 1214574</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-18768/">CVE-2020-18768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18768">CVE-2020-18768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25433/">CVE-2023-25433 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25433">CVE-2023-25433 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-26966/">CVE-2023-26966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26966">CVE-2023-26966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2908/">CVE-2023-2908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2908">CVE-2023-2908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3316/">CVE-2023-3316 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3316">CVE-2023-3316 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3576/">CVE-2023-3576 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3576">CVE-2023-3576 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3618/">CVE-2023-3618 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3618">CVE-2023-3618 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38288/">CVE-2023-38288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38288">CVE-2023-38288 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38289/">CVE-2023-38289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38289">CVE-2023-38289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009808019" comment="libtiff5-4.0.9-44.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808020" comment="libtiff5-32bit-4.0.9-44.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808021" comment="tiff-4.0.9-44.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153083" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216495" ref_url="https://bugzilla.suse.com/1216495" source="BUGZILLA"/>
		<reference ref_id="1216498" ref_url="https://bugzilla.suse.com/1216498" source="BUGZILLA"/>
		<reference ref_id="1216500" ref_url="https://bugzilla.suse.com/1216500" source="BUGZILLA"/>
		<reference ref_id="1216803" ref_url="https://bugzilla.suse.com/1216803" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46724" ref_url="https://www.suse.com/security/cve/CVE-2023-46724/" source="CVE"/>
		<reference ref_id="CVE-2023-46846" ref_url="https://www.suse.com/security/cve/CVE-2023-46846/" source="CVE"/>
		<reference ref_id="CVE-2023-46847" ref_url="https://www.suse.com/security/cve/CVE-2023-46847/" source="CVE"/>
		<reference ref_id="CVE-2023-46848" ref_url="https://www.suse.com/security/cve/CVE-2023-46848/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2023-46846: Request/Response smuggling in HTTP/1.1 and ICAP (bsc#1216500).
- CVE-2023-46847: Denial of Service in HTTP Digest Authentication (bsc#1216495).
- CVE-2023-46724: Fix validation of certificates with CN=* (bsc#1216803).
- CVE-2023-46848: Denial of Service in FTP (bsc#1216498).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-06"/>
	<updated date="2023-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216495">SUSE bug 1216495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216498">SUSE bug 1216498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216500">SUSE bug 1216500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216803">SUSE bug 1216803</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46724/">CVE-2023-46724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46724">CVE-2023-46724 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46846/">CVE-2023-46846 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46846">CVE-2023-46846 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46847/">CVE-2023-46847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46847">CVE-2023-46847 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46848/">CVE-2023-46848 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46848">CVE-2023-46848 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808709" comment="squid-4.17-30.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153084" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207753" ref_url="https://bugzilla.suse.com/1207753" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48303" ref_url="https://www.suse.com/security/cve/CVE-2022-48303/" source="CVE"/>
		<description>
This update for tar fixes the following issues:

- CVE-2022-48303: Fixed a one-byte out-of-bounds read that resulted in use of uninitialized memory for a conditional jump (bsc#1207753).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-17"/>
	<updated date="2023-02-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1207753">SUSE bug 1207753</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-48303/">CVE-2022-48303 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48303">CVE-2022-48303 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009739764" comment="tar-1.27.1-15.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739586" comment="tar-lang-1.27.1-15.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153085" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216022" ref_url="https://bugzilla.suse.com/1216022" source="BUGZILLA"/>
		<reference ref_id="1216734" ref_url="https://bugzilla.suse.com/1216734" source="BUGZILLA"/>
		<reference ref_id="1216960" ref_url="https://bugzilla.suse.com/1216960" source="BUGZILLA"/>
		<reference ref_id="1216961" ref_url="https://bugzilla.suse.com/1216961" source="BUGZILLA"/>
		<reference ref_id="1216962" ref_url="https://bugzilla.suse.com/1216962" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868/" source="CVE"/>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<reference ref_id="CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870/" source="CVE"/>
		<description>
This update for postgresql14 fixes the following issues:

Security issues fixed:

* CVE-2023-5868: Fix handling of unknown-type
  arguments in DISTINCT 'any' aggregate functions. This error led
  to a text-type value being interpreted as an unknown-type value
  (that is, a zero-terminated string) at runtime. This could
  result in disclosure of server memory following the text value. (bsc#1216962)
* CVE-2023-5869: Detect integer overflow while
  computing new array dimensions. When assigning new elements to
  array subscripts that are outside the current array bounds, an
  undetected integer overflow could occur in edge cases. Memory
  stomps that are potentially exploitable for arbitrary code
  execution are possible, and so is disclosure of server memory. (bsc#1216961)
* CVE-2023-5870: Prevent the pg_signal_backend role
  from signalling background workers and autovacuum processes.
  The documentation says that pg_signal_backend cannot issue
  signals to superuser-owned processes. It was able to signal
  these background  processes, though, because they advertise a
  role OID of zero. Treat that as indicating superuser ownership.
  The security implications of cancelling one of these process
  types are fairly small so far as the core code goes (we'll just
  start another one), but extensions might add background workers
  that are more vulnerable.
  Also ensure that the is_superuser parameter is set correctly in
  such processes. No specific security consequences are known for
  that oversight, but it might be significant for some extensions.
  (bsc#1216960)


- updated to 14.10 https://www.postgresql.org/docs/14/release-14-10.html
- Overhaul postgresql-README.SUSE and move it from the binary
  package to the noarch wrapper package.
- Change the unix domain socket location from /var/run to /run.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-13"/>
	<updated date="2023-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216022">SUSE bug 1216022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216734">SUSE bug 1216734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216960">SUSE bug 1216960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216961">SUSE bug 1216961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216962">SUSE bug 1216962</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810222" comment="postgresql14-14.10-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810223" comment="postgresql14-contrib-14.10-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810224" comment="postgresql14-devel-14.10-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810137" comment="postgresql14-docs-14.10-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810225" comment="postgresql14-llvmjit-devel-14.10-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810226" comment="postgresql14-plperl-14.10-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810227" comment="postgresql14-plpython-14.10-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810228" comment="postgresql14-pltcl-14.10-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810229" comment="postgresql14-server-14.10-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810230" comment="postgresql14-server-devel-14.10-3.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153086" version="1" class="patch">
	<metadata>
		<title>Security update for squashfs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1133284" ref_url="https://bugzilla.suse.com/1133284" source="BUGZILLA"/>
		<reference ref_id="1160294" ref_url="https://bugzilla.suse.com/1160294" source="BUGZILLA"/>
		<reference ref_id="1189936" ref_url="https://bugzilla.suse.com/1189936" source="BUGZILLA"/>
		<reference ref_id="1190531" ref_url="https://bugzilla.suse.com/1190531" source="BUGZILLA"/>
		<reference ref_id="935380" ref_url="https://bugzilla.suse.com/935380" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4645" ref_url="https://www.suse.com/security/cve/CVE-2015-4645/" source="CVE"/>
		<reference ref_id="CVE-2015-4646" ref_url="https://www.suse.com/security/cve/CVE-2015-4646/" source="CVE"/>
		<reference ref_id="CVE-2021-40153" ref_url="https://www.suse.com/security/cve/CVE-2021-40153/" source="CVE"/>
		<reference ref_id="CVE-2021-41072" ref_url="https://www.suse.com/security/cve/CVE-2021-41072/" source="CVE"/>
		<description>
This update for squashfs fixes the following issues:

- CVE-2015-4645,CVE-2015-4646: Multiple buffer overflows fixed in squashfs-tools (bsc#935380)
- CVE-2021-40153: Fixed an issue where an attacker might have been
  able to write a file outside of destination (bsc#1189936)
- CVE-2021-41072: Fixed an issue where an attacker might have been
  able to write a file outside the destination directory via a
  symlink (bsc#1190531).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-13"/>
	<updated date="2023-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133284">SUSE bug 1133284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160294">SUSE bug 1160294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189936">SUSE bug 1189936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190531">SUSE bug 1190531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935380">SUSE bug 935380</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-4645/">CVE-2015-4645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4645">CVE-2015-4645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-4646/">CVE-2015-4646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4646">CVE-2015-4646 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-40153/">CVE-2021-40153 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40153">CVE-2021-40153 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-41072/">CVE-2021-41072 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41072">CVE-2021-41072 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808708" comment="squashfs-4.6.1-8.3.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808708" comment="squashfs-4.6.1-8.3.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153087" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql15, postgresql16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122892" ref_url="https://bugzilla.suse.com/1122892" source="BUGZILLA"/>
		<reference ref_id="1179231" ref_url="https://bugzilla.suse.com/1179231" source="BUGZILLA"/>
		<reference ref_id="1206796" ref_url="https://bugzilla.suse.com/1206796" source="BUGZILLA"/>
		<reference ref_id="1209208" ref_url="https://bugzilla.suse.com/1209208" source="BUGZILLA"/>
		<reference ref_id="1216022" ref_url="https://bugzilla.suse.com/1216022" source="BUGZILLA"/>
		<reference ref_id="1216734" ref_url="https://bugzilla.suse.com/1216734" source="BUGZILLA"/>
		<reference ref_id="1216960" ref_url="https://bugzilla.suse.com/1216960" source="BUGZILLA"/>
		<reference ref_id="1216961" ref_url="https://bugzilla.suse.com/1216961" source="BUGZILLA"/>
		<reference ref_id="1216962" ref_url="https://bugzilla.suse.com/1216962" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868/" source="CVE"/>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<reference ref_id="CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870/" source="CVE"/>
		<description>
This update for postgresql, postgresql15, postgresql16 fixes the following issues:

This update ships postgresql 16 (jsc#PED-5586).

Security issues fixed:

* CVE-2023-5868: Fix handling of unknown-type
  arguments in DISTINCT 'any' aggregate functions. This error led
  to a text-type value being interpreted as an unknown-type value
  (that is, a zero-terminated string) at runtime. This could
  result in disclosure of server memory following the text value. (bsc#1216962)
* CVE-2023-5869: Detect integer overflow while
  computing new array dimensions. When assigning new elements to
  array subscripts that are outside the current array bounds, an
  undetected integer overflow could occur in edge cases. Memory
  stomps that are potentially exploitable for arbitrary code
  execution are possible, and so is disclosure of server memory. (bsc#1216961)
* CVE-2023-5870: Prevent the pg_signal_backend role
  from signalling background workers and autovacuum processes.
  The documentation says that pg_signal_backend cannot issue
  signals to superuser-owned processes. It was able to signal
  these background  processes, though, because they advertise a
  role OID of zero. Treat that as indicating superuser ownership.
  The security implications of cancelling one of these process
  types are fairly small so far as the core code goes (we'll just
  start another one), but extensions might add background workers
  that are more vulnerable.
  Also ensure that the is_superuser parameter is set correctly in
  such processes. No specific security consequences are known for
  that oversight, but it might be significant for some extensions.
  (bsc#1216960)


Changes in postgresql16:

- Upgrade to 16.1:

  * https://www.postgresql.org/about/news/2715
  * https://www.postgresql.org/docs/16/release-16.html
  * https://www.postgresql.org/docs/16/release-16-1.html


Changes in postgresql15:

- Update to 15.5 https://www.postgresql.org/docs/15/release-15-5.html

- The libs and mini package are now provided by postgresql16.
- Overhaul postgresql-README.SUSE and move it from the binary
  package to the noarch wrapper package.
- Change the unix domain socket location from /var/run to /run.

Changes in postgresql:

- Bump default to 16.
- Interlock version and release of all noarch packages except for
  the postgresql-docs.
- Bump major version to prepare for PostgreSQL 16, but keep
  default at 15 for now on Factory.
- bsc#1122892: Add a sysconfig variable for initdb.
- Overhaul postgresql-README.SUSE and move it from the binary
  package to the noarch wrapper package.
- bsc#1179231: Add an explanation for the /tmp -&gt; /run/postgresql
  move and permission change.
- Add postgresql-README as a separate source file.
- bsc#1209208: Drop hard dependency on systemd
- bsc#1206796: Refine the distinction of where to use sysusers and
  use bcond to have the expression only in one place.
- avoid bashisms in /bin/sh based startup script 
- Bump to postgresql 15 
- Change to systemd-sysusers
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-13"/>
	<updated date="2023-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122892">SUSE bug 1122892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179231">SUSE bug 1179231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206796">SUSE bug 1206796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209208">SUSE bug 1209208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216022">SUSE bug 1216022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216734">SUSE bug 1216734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216960">SUSE bug 1216960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216961">SUSE bug 1216961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216962">SUSE bug 1216962</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810231" comment="libecpg6-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810232" comment="libecpg6-32bit-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810233" comment="libpq5-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810234" comment="libpq5-32bit-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810146" comment="postgresql-16-4.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810147" comment="postgresql-contrib-16-4.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810115" comment="postgresql-devel-16-4.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810148" comment="postgresql-docs-16-4.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810149" comment="postgresql-plperl-16-4.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810150" comment="postgresql-plpython-16-4.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810151" comment="postgresql-pltcl-16-4.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810152" comment="postgresql-server-16-4.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810116" comment="postgresql-server-devel-16-4.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810235" comment="postgresql15-15.5-3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810236" comment="postgresql15-contrib-15.5-3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810237" comment="postgresql15-devel-15.5-3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810155" comment="postgresql15-docs-15.5-3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810238" comment="postgresql15-plperl-15.5-3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810239" comment="postgresql15-plpython-15.5-3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810240" comment="postgresql15-pltcl-15.5-3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810241" comment="postgresql15-server-15.5-3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810242" comment="postgresql15-server-devel-15.5-3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810243" comment="postgresql16-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810244" comment="postgresql16-contrib-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810245" comment="postgresql16-devel-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810162" comment="postgresql16-docs-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810246" comment="postgresql16-plperl-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810247" comment="postgresql16-plpython-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810248" comment="postgresql16-pltcl-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810249" comment="postgresql16-server-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810250" comment="postgresql16-server-devel-16.1-3.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810231" comment="libecpg6-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810232" comment="libecpg6-32bit-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810233" comment="libpq5-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810234" comment="libpq5-32bit-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810146" comment="postgresql-16-4.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810147" comment="postgresql-contrib-16-4.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810115" comment="postgresql-devel-16-4.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810148" comment="postgresql-docs-16-4.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810149" comment="postgresql-plperl-16-4.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810150" comment="postgresql-plpython-16-4.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810151" comment="postgresql-pltcl-16-4.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810152" comment="postgresql-server-16-4.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810116" comment="postgresql-server-devel-16-4.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810235" comment="postgresql15-15.5-3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810236" comment="postgresql15-contrib-15.5-3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810237" comment="postgresql15-devel-15.5-3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810155" comment="postgresql15-docs-15.5-3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810238" comment="postgresql15-plperl-15.5-3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810239" comment="postgresql15-plpython-15.5-3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810240" comment="postgresql15-pltcl-15.5-3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810241" comment="postgresql15-server-15.5-3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810242" comment="postgresql15-server-devel-15.5-3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810243" comment="postgresql16-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810244" comment="postgresql16-contrib-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810245" comment="postgresql16-devel-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810162" comment="postgresql16-docs-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810246" comment="postgresql16-plperl-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810247" comment="postgresql16-plpython-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810248" comment="postgresql16-pltcl-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810249" comment="postgresql16-server-16.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810250" comment="postgresql16-server-devel-16.1-3.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153088" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216022" ref_url="https://bugzilla.suse.com/1216022" source="BUGZILLA"/>
		<reference ref_id="1216734" ref_url="https://bugzilla.suse.com/1216734" source="BUGZILLA"/>
		<reference ref_id="1216960" ref_url="https://bugzilla.suse.com/1216960" source="BUGZILLA"/>
		<reference ref_id="1216961" ref_url="https://bugzilla.suse.com/1216961" source="BUGZILLA"/>
		<reference ref_id="1216962" ref_url="https://bugzilla.suse.com/1216962" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868/" source="CVE"/>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<reference ref_id="CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870/" source="CVE"/>
		<description>
This update for postgresql12 fixes the following issues:

Security issues fixed:

* CVE-2023-5868: Fix handling of unknown-type
  arguments in DISTINCT 'any' aggregate functions. This error led
  to a text-type value being interpreted as an unknown-type value
  (that is, a zero-terminated string) at runtime. This could
  result in disclosure of server memory following the text value. (bsc#1216962)
* CVE-2023-5869: Detect integer overflow while
  computing new array dimensions. When assigning new elements to
  array subscripts that are outside the current array bounds, an
  undetected integer overflow could occur in edge cases. Memory
  stomps that are potentially exploitable for arbitrary code
  execution are possible, and so is disclosure of server memory. (bsc#1216961)
* CVE-2023-5870: Prevent the pg_signal_backend role
  from signalling background workers and autovacuum processes.
  The documentation says that pg_signal_backend cannot issue
  signals to superuser-owned processes. It was able to signal
  these background  processes, though, because they advertise a
  role OID of zero. Treat that as indicating superuser ownership.
  The security implications of cancelling one of these process
  types are fairly small so far as the core code goes (we'll just
  start another one), but extensions might add background workers
  that are more vulnerable.
  Also ensure that the is_superuser parameter is set correctly in
  such processes. No specific security consequences are known for
  that oversight, but it might be significant for some extensions.
  (bsc#1216960)

- Update to 12.17 https://www.postgresql.org/docs/12/release-12-17.html

- Overhaul postgresql-README.SUSE and move it from the binary
  package to the noarch wrapper package.
- Change the unix domain socket location from /var/run to /run.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-14"/>
	<updated date="2023-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216022">SUSE bug 1216022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216734">SUSE bug 1216734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216960">SUSE bug 1216960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216961">SUSE bug 1216961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216962">SUSE bug 1216962</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810213" comment="postgresql12-12.17-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810214" comment="postgresql12-contrib-12.17-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810215" comment="postgresql12-devel-12.17-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810130" comment="postgresql12-docs-12.17-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810216" comment="postgresql12-llvmjit-devel-12.17-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810217" comment="postgresql12-plperl-12.17-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810218" comment="postgresql12-plpython-12.17-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810219" comment="postgresql12-pltcl-12.17-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810220" comment="postgresql12-server-12.17-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810221" comment="postgresql12-server-devel-12.17-3.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153089" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216022" ref_url="https://bugzilla.suse.com/1216022" source="BUGZILLA"/>
		<reference ref_id="1216734" ref_url="https://bugzilla.suse.com/1216734" source="BUGZILLA"/>
		<reference ref_id="1216960" ref_url="https://bugzilla.suse.com/1216960" source="BUGZILLA"/>
		<reference ref_id="1216961" ref_url="https://bugzilla.suse.com/1216961" source="BUGZILLA"/>
		<reference ref_id="1216962" ref_url="https://bugzilla.suse.com/1216962" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868/" source="CVE"/>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<reference ref_id="CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870/" source="CVE"/>
		<description>
This update for postgresql13 fixes the following issues:

Security issues fixed:

* CVE-2023-5868: Fix handling of unknown-type
  arguments in DISTINCT 'any' aggregate functions. This error led
  to a text-type value being interpreted as an unknown-type value
  (that is, a zero-terminated string) at runtime. This could
  result in disclosure of server memory following the text value. (bsc#1216962)
* CVE-2023-5869: Detect integer overflow while
  computing new array dimensions. When assigning new elements to
  array subscripts that are outside the current array bounds, an
  undetected integer overflow could occur in edge cases. Memory
  stomps that are potentially exploitable for arbitrary code
  execution are possible, and so is disclosure of server memory. (bsc#1216961)
* CVE-2023-5870: Prevent the pg_signal_backend role
  from signalling background workers and autovacuum processes.
  The documentation says that pg_signal_backend cannot issue
  signals to superuser-owned processes. It was able to signal
  these background  processes, though, because they advertise a
  role OID of zero. Treat that as indicating superuser ownership.
  The security implications of cancelling one of these process
  types are fairly small so far as the core code goes (we'll just
  start another one), but extensions might add background workers
  that are more vulnerable.
  Also ensure that the is_superuser parameter is set correctly in
  such processes. No specific security consequences are known for
  that oversight, but it might be significant for some extensions.
  (bsc#1216960)

- Update to 13.13: https://www.postgresql.org/docs/13/release-13-13.html

- Overhaul postgresql-README.SUSE and move it from the binary
  package to the noarch wrapper package.
- Change the unix domain socket location from /var/run to /run.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-14"/>
	<updated date="2023-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216022">SUSE bug 1216022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216734">SUSE bug 1216734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216960">SUSE bug 1216960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216961">SUSE bug 1216961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216962">SUSE bug 1216962</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810207" comment="postgresql13-13.13-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810208" comment="postgresql13-contrib-13.13-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810123" comment="postgresql13-docs-13.13-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810209" comment="postgresql13-plperl-13.13-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810210" comment="postgresql13-plpython-13.13-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810211" comment="postgresql13-pltcl-13.13-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810212" comment="postgresql13-server-13.13-3.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153090" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194038" ref_url="https://bugzilla.suse.com/1194038" source="BUGZILLA"/>
		<reference ref_id="1213865" ref_url="https://bugzilla.suse.com/1213865" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7738" ref_url="https://www.suse.com/security/cve/CVE-2018-7738/" source="CVE"/>
		<description>
This update for util-linux fixes the following issues:

- CVE-2018-7738: Fixed shell code injection in umount bash-completions (bsc#1213865).

Bug fixes: 

- Fix tests not passing when '@' character is in build path: 
  Fixes rpmbuild %checks fail when @ in the directory path (bsc#1194038).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-14"/>
	<updated date="2023-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194038">SUSE bug 1194038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213865">SUSE bug 1213865</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7738/">CVE-2018-7738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7738">CVE-2018-7738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009808964" comment="libblkid1-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808965" comment="libblkid1-32bit-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808966" comment="libfdisk1-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808967" comment="libmount1-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808968" comment="libmount1-32bit-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808969" comment="libsmartcols1-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808970" comment="libuuid1-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808971" comment="libuuid1-32bit-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808972" comment="python-libmount-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808973" comment="util-linux-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808974" comment="util-linux-lang-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808975" comment="util-linux-systemd-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808976" comment="uuidd-2.29.2-3.39.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009808964" comment="libblkid1-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808965" comment="libblkid1-32bit-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808966" comment="libfdisk1-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808967" comment="libmount1-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808968" comment="libmount1-32bit-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808969" comment="libsmartcols1-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808970" comment="libuuid1-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808971" comment="libuuid1-32bit-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808972" comment="python-libmount-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808973" comment="util-linux-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808974" comment="util-linux-lang-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808975" comment="util-linux-systemd-2.29.2-3.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808976" comment="uuidd-2.29.2-3.39.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153091" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215278" ref_url="https://bugzilla.suse.com/1215278" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-23583" ref_url="https://www.suse.com/security/cve/CVE-2023-23583/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to Intel CPU Microcode 20231114 pre-release (labeled 20231113). (bsc#1215278)
- CVE-2023-23583: Fixed potential CPU deadlocks or privilege escalation. (bsc#1215278)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-14"/>
	<updated date="2023-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215278">SUSE bug 1215278</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23583/">CVE-2023-23583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23583">CVE-2023-23583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810321" comment="ucode-intel-20231113-13.115.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810321" comment="ucode-intel-20231113-13.115.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153092" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216377" ref_url="https://bugzilla.suse.com/1216377" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45803" ref_url="https://www.suse.com/security/cve/CVE-2023-45803/" source="CVE"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2023-45803: Fix a request body leak that could occur when
  receiving a 303 HTTP response (bsc#1216377).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-16"/>
	<updated date="2023-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216377">SUSE bug 1216377</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45803/">CVE-2023-45803 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45803">CVE-2023-45803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803499" comment="python3-urllib3-1.25.10-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153093" version="1" class="patch">
	<metadata>
		<title>Security update for gcc13 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206480" ref_url="https://bugzilla.suse.com/1206480" source="BUGZILLA"/>
		<reference ref_id="1206684" ref_url="https://bugzilla.suse.com/1206684" source="BUGZILLA"/>
		<reference ref_id="1210557" ref_url="https://bugzilla.suse.com/1210557" source="BUGZILLA"/>
		<reference ref_id="1211427" ref_url="https://bugzilla.suse.com/1211427" source="BUGZILLA"/>
		<reference ref_id="1212101" ref_url="https://bugzilla.suse.com/1212101" source="BUGZILLA"/>
		<reference ref_id="1213915" ref_url="https://bugzilla.suse.com/1213915" source="BUGZILLA"/>
		<reference ref_id="1214052" ref_url="https://bugzilla.suse.com/1214052" source="BUGZILLA"/>
		<reference ref_id="1214460" ref_url="https://bugzilla.suse.com/1214460" source="BUGZILLA"/>
		<reference ref_id="1215427" ref_url="https://bugzilla.suse.com/1215427" source="BUGZILLA"/>
		<reference ref_id="1216664" ref_url="https://bugzilla.suse.com/1216664" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4039" ref_url="https://www.suse.com/security/cve/CVE-2023-4039/" source="CVE"/>
		<description>
This update for gcc13 fixes the following issues:

This update ship the GCC 13.2 compiler suite and its base libraries.

The compiler base libraries are provided for all SUSE Linux Enterprise 15
versions and replace the same named GCC 12 ones.

The new compilers for C, C++, and Fortran are provided for SUSE Linux
Enterprise 15 SP4 and SP5, and provided in the 'Development Tools' module.

The Go, D, Ada and Modula 2 language compiler parts are available
unsupported via the PackageHub repositories.

To use gcc13 compilers use:

- install 'gcc13' or 'gcc13-c++' or one of the other 'gcc13-COMPILER' frontend packages.
- override your Makefile to use CC=gcc-13, CXX=g++-13 and similar overrides for the other languages.

For a full changelog with all new GCC13 features, check out

        https://gcc.gnu.org/gcc-13/changes.html


Detailed changes:


* CVE-2023-4039: Fixed -fstack-protector issues on aarch64 with variable
  length stack allocations.  (bsc#1214052)

- Work around third party app crash during C++ standard library initialization.  [bsc#1216664]
- Fixed that GCC13 fails to compile some packages with error: unrecognizable insn (bsc#1215427)
- Bump included newlib to version 4.3.0.
- Update to GCC trunk head (r13-5254-g05b9868b182bb9)
- Redo floatn fixinclude pick-up to simply keep what is there.
- Turn cross compiler to s390x to a glibc cross. [bsc#1214460]

- Also handle -static-pie in the default-PIE specs
- Fixed missed optimization in Skia resulting in Firefox crashes when
  building with LTO.  [bsc#1212101]
- Make libstdc++6-devel packages own their directories since they
  can be installed standalone.  [bsc#1211427]
- Add new x86-related intrinsics (amxcomplexintrin.h).
- RISC-V: Add support for inlining subword atomic operations
- Use --enable-link-serialization rather that --enable-link-mutex,
  the benefit of the former one is that the linker jobs are not
  holding tokens of the make's jobserver.
- Add cross-bpf packages.  See https://gcc.gnu.org/wiki/BPFBackEnd
  for the general state of BPF with GCC.
- Add bootstrap conditional to allow --without=bootstrap to be
  specified to speed up local builds for testing.
- Bump included newlib to version 4.3.0. 
- Also package libhwasan_preinit.o on aarch64.
- Configure external timezone database provided by the timezone
  package.  Make libstdc++6 recommend timezone to get a fully
  working std::chrono.  Install timezone when running the testsuite.
- Package libhwasan_preinit.o on x86_64.
- Fixed unwinding on aarch64 with pointer signing.  [bsc#1206684]
- Enable PRU flavour for gcc13
- update floatn fixinclude pickup to check each header separately (bsc#1206480)
- Redo floatn fixinclude pick-up to simply keep what is there. 
- Bump libgo SONAME to libgo22.
- Do not package libhwasan for biarch (32-bit architecture)
  as the extension depends on 64-bit pointers.
- Adjust floatn fixincludes guard to work with SLE12 and earlier
  SLE15.
- Depend on at least LLVM 13 for GCN cross compiler.
- Update embedded newlib to version 4.2.0
- Allow cross-pru-gcc12-bootstrap for armv7l architecture.
  PRU architecture is used for real-time MCUs embedded into TI
  armv7l and aarch64 SoCs. We need to have cross-pru-gcc12 for
  armv7l in order to build both host applications and PRU firmware
  during the same build.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-20"/>
	<updated date="2023-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206480">SUSE bug 1206480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206684">SUSE bug 1206684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210557">SUSE bug 1210557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211427">SUSE bug 1211427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212101">SUSE bug 1212101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213915">SUSE bug 1213915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214052">SUSE bug 1214052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214460">SUSE bug 1214460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215427">SUSE bug 1215427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216664">SUSE bug 1216664</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4039/">CVE-2023-4039 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">CVE-2023-4039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009809691" comment="libasan8-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809692" comment="libasan8-32bit-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809693" comment="libatomic1-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809694" comment="libatomic1-32bit-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809695" comment="libgcc_s1-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809696" comment="libgcc_s1-32bit-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809697" comment="libgfortran5-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809698" comment="libgfortran5-32bit-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809699" comment="libgomp1-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809700" comment="libgomp1-32bit-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809701" comment="libhwasan0-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809702" comment="libitm1-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809703" comment="libitm1-32bit-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809704" comment="liblsan0-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809705" comment="libobjc4-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809706" comment="libobjc4-32bit-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809707" comment="libquadmath0-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809668" comment="libquadmath0-32bit-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809708" comment="libstdc++6-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809709" comment="libstdc++6-32bit-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809710" comment="libstdc++6-locale-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809711" comment="libstdc++6-pp-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809712" comment="libstdc++6-pp-32bit-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809713" comment="libtsan2-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809714" comment="libubsan1-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809715" comment="libubsan1-32bit-13.2.1+git7813-1.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009809691" comment="libasan8-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809692" comment="libasan8-32bit-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809693" comment="libatomic1-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809694" comment="libatomic1-32bit-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809695" comment="libgcc_s1-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809696" comment="libgcc_s1-32bit-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809697" comment="libgfortran5-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809698" comment="libgfortran5-32bit-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809699" comment="libgomp1-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809700" comment="libgomp1-32bit-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809701" comment="libhwasan0-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809702" comment="libitm1-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809703" comment="libitm1-32bit-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809704" comment="liblsan0-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809705" comment="libobjc4-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809706" comment="libobjc4-32bit-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809707" comment="libquadmath0-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809668" comment="libquadmath0-32bit-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809708" comment="libstdc++6-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809709" comment="libstdc++6-32bit-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809710" comment="libstdc++6-locale-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809711" comment="libstdc++6-pp-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809712" comment="libstdc++6-pp-32bit-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809713" comment="libtsan2-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809714" comment="libubsan1-13.2.1+git7813-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809715" comment="libubsan1-32bit-13.2.1+git7813-1.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153094" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215278" ref_url="https://bugzilla.suse.com/1215278" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-23583" ref_url="https://www.suse.com/security/cve/CVE-2023-23583/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to Intel CPU Microcode 20231114 release. (bsc#1215278)
- CVE-2023-23583: Fixed potential CPU deadlocks or privilege escalation. (bsc#1215278)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-20"/>
	<updated date="2023-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215278">SUSE bug 1215278</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23583/">CVE-2023-23583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23583">CVE-2023-23583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810694" comment="ucode-intel-20231114-13.118.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810694" comment="ucode-intel-20231114-13.118.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153095" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216654" ref_url="https://bugzilla.suse.com/1216654" source="BUGZILLA"/>
		<reference ref_id="1216807" ref_url="https://bugzilla.suse.com/1216807" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46835" ref_url="https://www.suse.com/security/cve/CVE-2023-46835/" source="CVE"/>
		<reference ref_id="CVE-2023-46836" ref_url="https://www.suse.com/security/cve/CVE-2023-46836/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-46835: x86/AMD: mismatch in IOMMU quarantine page table levels (XSA-445) (bsc#1216654).
- CVE-2023-46836: x86: BTC/SRSO fixes not fully effective (XSA-446) (bsc#1216807).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-20"/>
	<updated date="2023-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216654">SUSE bug 1216654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216807">SUSE bug 1216807</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46835/">CVE-2023-46835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46835">CVE-2023-46835 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46836/">CVE-2023-46836 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46836">CVE-2023-46836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810684" comment="xen-4.9.4_46-3.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810685" comment="xen-doc-html-4.9.4_46-3.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810686" comment="xen-libs-4.9.4_46-3.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810687" comment="xen-libs-32bit-4.9.4_46-3.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810688" comment="xen-tools-4.9.4_46-3.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810689" comment="xen-tools-domU-4.9.4_46-3.132.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810684" comment="xen-4.9.4_46-3.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810685" comment="xen-doc-html-4.9.4_46-3.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810686" comment="xen-libs-4.9.4_46-3.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810687" comment="xen-libs-32bit-4.9.4_46-3.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810688" comment="xen-tools-4.9.4_46-3.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810689" comment="xen-tools-domU-4.9.4_46-3.132.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153096" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216419" ref_url="https://bugzilla.suse.com/1216419" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38473" ref_url="https://www.suse.com/security/cve/CVE-2023-38473/" source="CVE"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2023-38473: Fixed a reachable assertion when parsing a host
  name (bsc#1216419).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-21"/>
	<updated date="2023-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216419">SUSE bug 1216419</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38473/">CVE-2023-38473 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38473">CVE-2023-38473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009803937" comment="avahi-0.6.32-32.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803888" comment="avahi-lang-0.6.32-32.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803938" comment="avahi-utils-0.6.32-32.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803939" comment="libavahi-client3-0.6.32-32.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803940" comment="libavahi-client3-32bit-0.6.32-32.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803941" comment="libavahi-common3-0.6.32-32.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803942" comment="libavahi-common3-32bit-0.6.32-32.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803943" comment="libavahi-core7-0.6.32-32.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803944" comment="libavahi-glib1-0.6.32-32.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803945" comment="libavahi-glib1-32bit-0.6.32-32.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803946" comment="libdns_sd-0.6.32-32.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803947" comment="libdns_sd-32bit-0.6.32-32.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153097" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216129" ref_url="https://bugzilla.suse.com/1216129" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45322" ref_url="https://www.suse.com/security/cve/CVE-2023-45322/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2023-45322: Fixed a use-after-free in xmlUnlinkNode() in tree.c (bsc#1216129).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-21"/>
	<updated date="2023-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216129">SUSE bug 1216129</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45322/">CVE-2023-45322 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45322">CVE-2023-45322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810401" comment="libxml2-2-2.9.4-46.68.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810402" comment="libxml2-2-32bit-2.9.4-46.68.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810398" comment="libxml2-doc-2.9.4-46.68.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810403" comment="libxml2-tools-2.9.4-46.68.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810404" comment="python-libxml2-2.9.4-46.68.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153098" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1211968" ref_url="https://bugzilla.suse.com/1211968" source="BUGZILLA"/>
		<reference ref_id="1216374" ref_url="https://bugzilla.suse.com/1216374" source="BUGZILLA"/>
		<reference ref_id="1216379" ref_url="https://bugzilla.suse.com/1216379" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2023-22067" ref_url="https://www.suse.com/security/cve/CVE-2023-22067/" source="CVE"/>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u392 (icedtea-3.29.0) October 2023 CPU:

- CVE-2023-22067: Fixed IOR deserialization issue in CORBA (bsc#1216379).
- CVE-2023-22081: Fixed certificate path validation issue during client authentication (bsc#1216374).
- CVE-2015-4000: Fixed Logjam issue in SLES12SP5 (bsc#1211968).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-21"/>
	<updated date="2023-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211968">SUSE bug 1211968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216374">SUSE bug 1216374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216379">SUSE bug 1216379</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22067/">CVE-2023-22067 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22067">CVE-2023-22067 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810690" comment="java-1_8_0-openjdk-1.8.0.392-27.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810691" comment="java-1_8_0-openjdk-demo-1.8.0.392-27.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810692" comment="java-1_8_0-openjdk-devel-1.8.0.392-27.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810693" comment="java-1_8_0-openjdk-headless-1.8.0.392-27.93.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810690" comment="java-1_8_0-openjdk-1.8.0.392-27.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810691" comment="java-1_8_0-openjdk-demo-1.8.0.392-27.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810692" comment="java-1_8_0-openjdk-devel-1.8.0.392-27.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810693" comment="java-1_8_0-openjdk-headless-1.8.0.392-27.93.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153099" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208363" ref_url="https://bugzilla.suse.com/1208363" source="BUGZILLA"/>
		<reference ref_id="1208365" ref_url="https://bugzilla.suse.com/1208365" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20032" ref_url="https://www.suse.com/security/cve/CVE-2023-20032/" source="CVE"/>
		<reference ref_id="CVE-2023-20052" ref_url="https://www.suse.com/security/cve/CVE-2023-20052/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2023-20032: Fixed a possible remote code execution vulnerability in the HFS+ file parser (bsc#1208363).
- CVE-2023-20052: Fixed a possible remote information leak vulnerability in the DMG file parser (bsc#1208365).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-20"/>
	<updated date="2023-02-20"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1208363">SUSE bug 1208363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208365">SUSE bug 1208365</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-20032/">CVE-2023-20032 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20032">CVE-2023-20032 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20052/">CVE-2023-20052 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20052">CVE-2023-20052 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740773" comment="clamav-0.103.8-33.53.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740773" comment="clamav-0.103.8-33.53.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153100" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216926" ref_url="https://bugzilla.suse.com/1216926" source="BUGZILLA"/>
		<reference ref_id="1217274" ref_url="https://bugzilla.suse.com/1217274" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46728" ref_url="https://www.suse.com/security/cve/CVE-2023-46728/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2023-46728: Remove gopher support (bsc#1216926).
- Fixed overread in HTTP request header parsing (bsc#1217274).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-22"/>
	<updated date="2023-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216926">SUSE bug 1216926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217274">SUSE bug 1217274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46728/">CVE-2023-46728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46728">CVE-2023-46728 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812850" comment="squid-4.17-30.9.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153101" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216338" ref_url="https://bugzilla.suse.com/1216338" source="BUGZILLA"/>
		<reference ref_id="1217230" ref_url="https://bugzilla.suse.com/1217230" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5721" ref_url="https://www.suse.com/security/cve/CVE-2023-5721/" source="CVE"/>
		<reference ref_id="CVE-2023-5724" ref_url="https://www.suse.com/security/cve/CVE-2023-5724/" source="CVE"/>
		<reference ref_id="CVE-2023-5725" ref_url="https://www.suse.com/security/cve/CVE-2023-5725/" source="CVE"/>
		<reference ref_id="CVE-2023-5726" ref_url="https://www.suse.com/security/cve/CVE-2023-5726/" source="CVE"/>
		<reference ref_id="CVE-2023-5727" ref_url="https://www.suse.com/security/cve/CVE-2023-5727/" source="CVE"/>
		<reference ref_id="CVE-2023-5728" ref_url="https://www.suse.com/security/cve/CVE-2023-5728/" source="CVE"/>
		<reference ref_id="CVE-2023-5730" ref_url="https://www.suse.com/security/cve/CVE-2023-5730/" source="CVE"/>
		<reference ref_id="CVE-2023-5732" ref_url="https://www.suse.com/security/cve/CVE-2023-5732/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 115.5.0 ESR Placeholder changelog-entry (bsc#1217230)

  * Fixed: Various security fixes and other quality improvements. MFSA 2023-46 (bsc#1216338)
  * CVE-2023-5721: Queued up rendering could have allowed websites to clickjack
  * CVE-2023-5732: Address bar spoofing via bidirectional characters
  * CVE-2023-5724: Large WebGL draw could have led to a crash
  * CVE-2023-5725: WebExtensions could open arbitrary URLs
  * CVE-2023-5726: Full screen notification obscured by file open dialog on macOS
  * CVE-2023-5727: Download Protections were bypassed by .msix, .msixbundle, .appx, and .appxbundle files on Windows
  * CVE-2023-5728: Improper object tracking during GC in the JavaScript engine could have led to a crash.
  * CVE-2023-5730: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4.1
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-22"/>
	<updated date="2023-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216338">SUSE bug 1216338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217230">SUSE bug 1217230</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5721/">CVE-2023-5721 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5721">CVE-2023-5721 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5724/">CVE-2023-5724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5724">CVE-2023-5724 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5725/">CVE-2023-5725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5725">CVE-2023-5725 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5726/">CVE-2023-5726 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5726">CVE-2023-5726 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5727/">CVE-2023-5727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5727">CVE-2023-5727 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5728/">CVE-2023-5728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5728">CVE-2023-5728 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5730/">CVE-2023-5730 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5730">CVE-2023-5730 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5732/">CVE-2023-5732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5732">CVE-2023-5732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810968" comment="MozillaFirefox-115.5.0-112.191.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810958" comment="MozillaFirefox-devel-115.5.0-112.191.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810969" comment="MozillaFirefox-translations-common-115.5.0-112.191.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153102" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-c (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216156" ref_url="https://bugzilla.suse.com/1216156" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-37536" ref_url="https://www.suse.com/security/cve/CVE-2023-37536/" source="CVE"/>
		<description>
This update for xerces-c fixes the following issues:

- CVE-2023-37536: Fixed an integer overflow that could have led to a out-of-bounds memory accesses (bsc#1216156).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-24"/>
	<updated date="2023-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216156">SUSE bug 1216156</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-37536/">CVE-2023-37536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37536">CVE-2023-37536 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811879" comment="libxerces-c-3_1-3.1.1-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811880" comment="libxerces-c-3_1-32bit-3.1.1-13.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811879" comment="libxerces-c-3_1-3.1.1-13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811880" comment="libxerces-c-3_1-32bit-3.1.1-13.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153103" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208275" ref_url="https://bugzilla.suse.com/1208275" source="BUGZILLA"/>
		<reference ref_id="1208276" ref_url="https://bugzilla.suse.com/1208276" source="BUGZILLA"/>
		<reference ref_id="1208277" ref_url="https://bugzilla.suse.com/1208277" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21216" ref_url="https://www.suse.com/security/cve/CVE-2022-21216/" source="CVE"/>
		<reference ref_id="CVE-2022-33196" ref_url="https://www.suse.com/security/cve/CVE-2022-33196/" source="CVE"/>
		<reference ref_id="CVE-2022-38090" ref_url="https://www.suse.com/security/cve/CVE-2022-38090/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20230214 release.
  
Security issues fixed:

- CVE-2022-38090: Security updates for [INTEL-SA-00767](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00767.html) (bsc#1208275)
- CVE-2022-33196: Security updates for [INTEL-SA-00738](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html) (bsc#1208276)
- CVE-2022-21216: Security updates for [INTEL-SA-00700](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00700.html) (bsc#1208277)

- New Platforms:
  
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | SPR-SP         | E2       | 06-8f-05/87 |          | 2b000181 | Xeon Scalable Gen4
  | SPR-SP         | E3       | 06-8f-06/87 |          | 2b000181 | Xeon Scalable Gen4
  | SPR-SP         | E4       | 06-8f-07/87 |          | 2b000181 | Xeon Scalable Gen4
  | SPR-SP         | E5       | 06-8f-08/87 |          | 2b000181 | Xeon Scalable Gen4
  | SPR-HBM        | B3       | 06-8f-08/10 |          | 2c000170 | Xeon Max
  | RPL-P 6+8      | J0       | 06-ba-02/07 |          | 0000410e | Core Gen13
  | RPL-H 6+8      | J0       | 06-ba-02/07 |          | 0000410e | Core Gen13
  | RPL-U 2+8      | Q0       | 06-ba-02/07 |          | 0000410e | Core Gen13

- Updated Platforms:
  
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | ADL            | C0       | 06-97-02/07 | 00000026 | 0000002c | Core Gen12
  | ADL            | C0       | 06-97-05/07 | 00000026 | 0000002c | Core Gen12
  | ADL            | C0       | 06-bf-02/07 | 00000026 | 0000002c | Core Gen12
  | ADL            | C0       | 06-bf-05/07 | 00000026 | 0000002c | Core Gen12
  | ADL            | L0       | 06-9a-03/80 | 00000424 | 00000429 | Core Gen12
  | ADL            | L0       | 06-9a-04/80 | 00000424 | 00000429 | Core Gen12
  | CLX-SP         | B0       | 06-55-06/bf | 04003302 | 04003303 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05003302 | 05003303 | Xeon Scalable Gen2
  | CPX-SP         | A1       | 06-55-0b/bf | 07002501 | 07002503 | Xeon Scalable Gen3
  | GLK            | B0       | 06-7a-01/01 | 0000003c | 0000003e | Pentium Silver N/J5xxx, Celeron N/J4xxx
  | GLK-R          | R0       | 06-7a-08/01 | 00000020 | 00000022 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-D          | B0       | 06-6c-01/10 | 01000201 | 01000211 | Xeon D-17xx, D-27xx
  | ICL-U/Y        | D1       | 06-7e-05/80 | 000000b6 | 000000b8 | Core Gen10 Mobile
  | ICX-SP         | D0       | 06-6a-06/87 | 0d000375 | 0d000389 | Xeon Scalable Gen3
  | JSL            | A0/A1    | 06-9c-00/01 | 24000023 | 24000024 | Pentium N6000/N6005, Celeron N4500/N4505/N5100/N5105
  | LKF            | B2/B3    | 06-8a-01/10 | 00000031 | 00000032 | Core w/Hybrid Technology
  | RKL-S          | B0       | 06-a7-01/02 | 00000056 | 00000057 | Core Gen11
  | RPL-S          | S0       | 06-b7-01/32 | 0000010e | 00000112 | Core Gen13
  | SKX-SP         | B1       | 06-55-03/97 | 0100015e | 01000161 | Xeon Scalable
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-20"/>
	<updated date="2023-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208275">SUSE bug 1208275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208276">SUSE bug 1208276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208277">SUSE bug 1208277</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-21216/">CVE-2022-21216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21216">CVE-2022-21216 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-33196/">CVE-2022-33196 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33196">CVE-2022-33196 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-38090/">CVE-2022-38090 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38090">CVE-2022-38090 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740108" comment="ucode-intel-20230214-13.104.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740108" comment="ucode-intel-20230214-13.104.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153104" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215940" ref_url="https://bugzilla.suse.com/1215940" source="BUGZILLA"/>
		<reference ref_id="1216001" ref_url="https://bugzilla.suse.com/1216001" source="BUGZILLA"/>
		<reference ref_id="1216167" ref_url="https://bugzilla.suse.com/1216167" source="BUGZILLA"/>
		<reference ref_id="1216696" ref_url="https://bugzilla.suse.com/1216696" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46246" ref_url="https://www.suse.com/security/cve/CVE-2023-46246/" source="CVE"/>
		<reference ref_id="CVE-2023-5344" ref_url="https://www.suse.com/security/cve/CVE-2023-5344/" source="CVE"/>
		<reference ref_id="CVE-2023-5441" ref_url="https://www.suse.com/security/cve/CVE-2023-5441/" source="CVE"/>
		<reference ref_id="CVE-2023-5535" ref_url="https://www.suse.com/security/cve/CVE-2023-5535/" source="CVE"/>
		<description>
This update for vim fixes the following issues:

- CVE-2023-5344: Heap-based Buffer Overflow in vim prior to 9.0.1969 (bsc#1215940)
- CVE-2023-5441: segfault in exmode when redrawing (bsc#1216001)
- CVE-2023-5535: use-after-free from buf_contents_changed() (bsc#1216167)
- CVE-2023-46246: Integer Overflow in :history command (bsc#1216696)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-24"/>
	<updated date="2023-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215940">SUSE bug 1215940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216001">SUSE bug 1216001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216167">SUSE bug 1216167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216696">SUSE bug 1216696</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-46246/">CVE-2023-46246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46246">CVE-2023-46246 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5344/">CVE-2023-5344 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5344">CVE-2023-5344 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5441/">CVE-2023-5441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5441">CVE-2023-5441 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5535/">CVE-2023-5535 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5535">CVE-2023-5535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009812848" comment="gvim-9.0.2103-17.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812849" comment="vim-9.0.2103-17.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812577" comment="vim-data-9.0.2103-17.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812578" comment="vim-data-common-9.0.2103-17.26.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009812848" comment="gvim-9.0.2103-17.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812849" comment="vim-9.0.2103-17.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812577" comment="vim-data-9.0.2103-17.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812578" comment="vim-data-common-9.0.2103-17.26.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153105" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210660" ref_url="https://bugzilla.suse.com/1210660" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2137" ref_url="https://www.suse.com/security/cve/CVE-2023-2137/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2023-2137: Fixed heap buffer overflow (bsc#1210660).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-27"/>
	<updated date="2023-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210660">SUSE bug 1210660</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2137/">CVE-2023-2137 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2137">CVE-2023-2137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009812842" comment="libsqlite3-0-3.44.0-9.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812843" comment="libsqlite3-0-32bit-3.44.0-9.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812844" comment="sqlite3-3.44.0-9.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812845" comment="sqlite3-devel-3.44.0-9.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812846" comment="sqlite3-tcl-3.44.0-9.29.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009812842" comment="libsqlite3-0-3.44.0-9.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812843" comment="libsqlite3-0-32bit-3.44.0-9.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812844" comment="sqlite3-3.44.0-9.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812845" comment="sqlite3-devel-3.44.0-9.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812846" comment="sqlite3-tcl-3.44.0-9.29.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153106" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215793" ref_url="https://bugzilla.suse.com/1215793" source="BUGZILLA"/>
		<reference ref_id="1215796" ref_url="https://bugzilla.suse.com/1215796" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40474" ref_url="https://www.suse.com/security/cve/CVE-2023-40474/" source="CVE"/>
		<reference ref_id="CVE-2023-40476" ref_url="https://www.suse.com/security/cve/CVE-2023-40476/" source="CVE"/>
		<description>
This update for gstreamer-plugins-bad fixes the following issues:

- CVE-2023-40474: Fixed integer overflow causing out of bounds writes when handling invalid uncompressed video (bsc#1215796).
- CVE-2023-40476: Fixed possible overflow using max_sub_layers_minus1 (bsc#1215793).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-28"/>
	<updated date="2023-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215793">SUSE bug 1215793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215796">SUSE bug 1215796</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40474/">CVE-2023-40474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-40474">CVE-2023-40474 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-40476/">CVE-2023-40476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-40476">CVE-2023-40476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009812831" comment="gstreamer-plugins-bad-1.8.3-18.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812558" comment="gstreamer-plugins-bad-lang-1.8.3-18.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812832" comment="libgstadaptivedemux-1_0-0-1.8.3-18.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812833" comment="libgstbadaudio-1_0-0-1.8.3-18.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812834" comment="libgstbadbase-1_0-0-1.8.3-18.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812835" comment="libgstbadvideo-1_0-0-1.8.3-18.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812836" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-18.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812837" comment="libgstcodecparsers-1_0-0-1.8.3-18.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812838" comment="libgstgl-1_0-0-1.8.3-18.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812839" comment="libgstmpegts-1_0-0-1.8.3-18.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812840" comment="libgstphotography-1_0-0-1.8.3-18.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812841" comment="libgsturidownloader-1_0-0-1.8.3-18.9.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009812831" comment="gstreamer-plugins-bad-1.8.3-18.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812558" comment="gstreamer-plugins-bad-lang-1.8.3-18.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812832" comment="libgstadaptivedemux-1_0-0-1.8.3-18.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812833" comment="libgstbadaudio-1_0-0-1.8.3-18.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812834" comment="libgstbadbase-1_0-0-1.8.3-18.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812835" comment="libgstbadvideo-1_0-0-1.8.3-18.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812836" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-18.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812837" comment="libgstcodecparsers-1_0-0-1.8.3-18.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812838" comment="libgstgl-1_0-0-1.8.3-18.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812839" comment="libgstmpegts-1_0-0-1.8.3-18.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812840" comment="libgstphotography-1_0-0-1.8.3-18.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812841" comment="libgsturidownloader-1_0-0-1.8.3-18.9.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153107" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204264" ref_url="https://bugzilla.suse.com/1204264" source="BUGZILLA"/>
		<reference ref_id="1216339" ref_url="https://bugzilla.suse.com/1216339" source="BUGZILLA"/>
		<reference ref_id="1216374" ref_url="https://bugzilla.suse.com/1216374" source="BUGZILLA"/>
		<reference ref_id="1216379" ref_url="https://bugzilla.suse.com/1216379" source="BUGZILLA"/>
		<reference ref_id="1216640" ref_url="https://bugzilla.suse.com/1216640" source="BUGZILLA"/>
		<reference ref_id="1217214" ref_url="https://bugzilla.suse.com/1217214" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22025" ref_url="https://www.suse.com/security/cve/CVE-2023-22025/" source="CVE"/>
		<reference ref_id="CVE-2023-22067" ref_url="https://www.suse.com/security/cve/CVE-2023-22067/" source="CVE"/>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<reference ref_id="CVE-2023-5676" ref_url="https://www.suse.com/security/cve/CVE-2023-5676/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 8 Fix Pack 15:
  * Oracle October 17 2023 CPU [bsc#1216640]

Security fixes:

- CVE-2023-22081: Fixed enhanced TLS connections (bsc#1216374)
- CVE-2023-22067: Fixed IOR deserialization issue in CORBA (bsc#1216379)
- CVE-2023-22025: Fixed memory corruption issue on x86_64 with AVX-512 (bsc#1216339)
- CVE-2023-5676: Fixed receiving a signal before initialization may lead to an infinite loop or unexpected crash (bsc#1217214)

Bug fixes:

- IBM Java idlj compiler switch definition because IBM java idlj seems to confuse char and wchar for typedef types (bsc#1204264).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-29"/>
	<updated date="2023-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204264">SUSE bug 1204264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216339">SUSE bug 1216339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216374">SUSE bug 1216374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216379">SUSE bug 1216379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216640">SUSE bug 1216640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217214">SUSE bug 1217214</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22025/">CVE-2023-22025 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22025">CVE-2023-22025 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22067/">CVE-2023-22067 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22067">CVE-2023-22067 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5676/">CVE-2023-5676 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5676">CVE-2023-5676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811877" comment="java-1_8_0-ibm-1.8.0_sr8.15-30.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811732" comment="java-1_8_0-ibm-alsa-1.8.0_sr8.15-30.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811878" comment="java-1_8_0-ibm-devel-1.8.0_sr8.15-30.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811733" comment="java-1_8_0-ibm-plugin-1.8.0_sr8.15-30.117.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811877" comment="java-1_8_0-ibm-1.8.0_sr8.15-30.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811732" comment="java-1_8_0-ibm-alsa-1.8.0_sr8.15-30.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811878" comment="java-1_8_0-ibm-devel-1.8.0_sr8.15-30.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811733" comment="java-1_8_0-ibm-plugin-1.8.0_sr8.15-30.117.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153108" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196654" ref_url="https://bugzilla.suse.com/1196654" source="BUGZILLA"/>
		<reference ref_id="1211298" ref_url="https://bugzilla.suse.com/1211298" source="BUGZILLA"/>
		<reference ref_id="1211798" ref_url="https://bugzilla.suse.com/1211798" source="BUGZILLA"/>
		<reference ref_id="1211994" ref_url="https://bugzilla.suse.com/1211994" source="BUGZILLA"/>
		<reference ref_id="1213326" ref_url="https://bugzilla.suse.com/1213326" source="BUGZILLA"/>
		<reference ref_id="1214327" ref_url="https://bugzilla.suse.com/1214327" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45930" ref_url="https://www.suse.com/security/cve/CVE-2021-45930/" source="CVE"/>
		<reference ref_id="CVE-2023-32573" ref_url="https://www.suse.com/security/cve/CVE-2023-32573/" source="CVE"/>
		<reference ref_id="CVE-2023-32763" ref_url="https://www.suse.com/security/cve/CVE-2023-32763/" source="CVE"/>
		<reference ref_id="CVE-2023-34410" ref_url="https://www.suse.com/security/cve/CVE-2023-34410/" source="CVE"/>
		<reference ref_id="CVE-2023-37369" ref_url="https://www.suse.com/security/cve/CVE-2023-37369/" source="CVE"/>
		<reference ref_id="CVE-2023-38197" ref_url="https://www.suse.com/security/cve/CVE-2023-38197/" source="CVE"/>
		<description>
This update for libqt4 fixes the following issues:

- CVE-2021-45930: Fix out of-bounds write when parsing path nodes (bsc#1196654).
- CVE-2023-32573: Fix missing initialization of QSvgFont unitsPerEm (bsc#1211298).
- CVE-2023-32763: Fix potential buffer when rendering a SVG file with an image inside (bsc#1211798).
- CVE-2023-34410: Fix missing sync of disablement of loading root certificates in qsslsocketprivate (bsc#1211994).
- CVE-2023-37369: Fix buffer overflow in QXmlStreamReader (bsc#1214327).
- CVE-2023-38197: Fix infinite loops in QXmlStreamReader (bsc#1213326).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2023-11-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196654">SUSE bug 1196654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211298">SUSE bug 1211298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211798">SUSE bug 1211798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211994">SUSE bug 1211994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213326">SUSE bug 1213326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214327">SUSE bug 1214327</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45930/">CVE-2021-45930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45930">CVE-2021-45930 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32573/">CVE-2023-32573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32573">CVE-2023-32573 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32763/">CVE-2023-32763 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32763">CVE-2023-32763 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-34410/">CVE-2023-34410 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34410">CVE-2023-34410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37369/">CVE-2023-37369 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37369">CVE-2023-37369 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38197/">CVE-2023-38197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38197">CVE-2023-38197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009813574" comment="libqt4-4.8.7-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813575" comment="libqt4-32bit-4.8.7-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813576" comment="libqt4-qt3support-4.8.7-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813577" comment="libqt4-qt3support-32bit-4.8.7-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813578" comment="libqt4-sql-4.8.7-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813579" comment="libqt4-sql-32bit-4.8.7-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813580" comment="libqt4-sql-mysql-4.8.7-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813581" comment="libqt4-sql-sqlite-4.8.7-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813582" comment="libqt4-x11-4.8.7-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813583" comment="libqt4-x11-32bit-4.8.7-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813584" comment="qt4-x11-tools-4.8.7-8.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009813574" comment="libqt4-4.8.7-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813575" comment="libqt4-32bit-4.8.7-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813576" comment="libqt4-qt3support-4.8.7-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813577" comment="libqt4-qt3support-32bit-4.8.7-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813578" comment="libqt4-sql-4.8.7-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813579" comment="libqt4-sql-32bit-4.8.7-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813580" comment="libqt4-sql-mysql-4.8.7-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813581" comment="libqt4-sql-sqlite-4.8.7-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813582" comment="libqt4-x11-4.8.7-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813583" comment="libqt4-x11-32bit-4.8.7-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813584" comment="qt4-x11-tools-4.8.7-8.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153109" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1217654" ref_url="https://bugzilla.suse.com/1217654" source="BUGZILLA"/>
		<description>
This update for squid fixes the following issues:

- Fix X-Forwarded-For Stack Overflow (bsc#1217654)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-01"/>
	<updated date="2023-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217654">SUSE bug 1217654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814432" comment="squid-4.17-30.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153110" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
		</affected>
		<reference ref_id="1216495" ref_url="https://bugzilla.suse.com/1216495" source="BUGZILLA"/>
		<reference ref_id="1216803" ref_url="https://bugzilla.suse.com/1216803" source="BUGZILLA"/>
		<reference ref_id="1216926" ref_url="https://bugzilla.suse.com/1216926" source="BUGZILLA"/>
		<reference ref_id="1217274" ref_url="https://bugzilla.suse.com/1217274" source="BUGZILLA"/>
		<reference ref_id="1217654" ref_url="https://bugzilla.suse.com/1217654" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46724" ref_url="https://www.suse.com/security/cve/CVE-2023-46724/" source="CVE"/>
		<reference ref_id="CVE-2023-46728" ref_url="https://www.suse.com/security/cve/CVE-2023-46728/" source="CVE"/>
		<reference ref_id="CVE-2023-46847" ref_url="https://www.suse.com/security/cve/CVE-2023-46847/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- Fixed overread in HTTP request header parsing (bsc#1217274).
- Fixed X-Forwarded-For Stack Overflow (bsc#1217654).
- CVE-2023-46728: Fixed NULL pointer dereference in gopher gateway (bsc#1216926).
- CVE-2023-46847: Fixed denial of Service in HTTP Digest Authentication (bsc#1216495).
- CVE-2023-46724: Fixed validation of certificates with CN=* (bsc#1216803).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-04"/>
	<updated date="2023-12-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216495">SUSE bug 1216495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216803">SUSE bug 1216803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216926">SUSE bug 1216926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217274">SUSE bug 1217274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217654">SUSE bug 1217654</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46724/">CVE-2023-46724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46724">CVE-2023-46724 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46728/">CVE-2023-46728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46728">CVE-2023-46728 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46847/">CVE-2023-46847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46847">CVE-2023-46847 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814431" comment="squid-3.5.21-26.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153111" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216778" ref_url="https://bugzilla.suse.com/1216778" source="BUGZILLA"/>
		<reference ref_id="1217210" ref_url="https://bugzilla.suse.com/1217210" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32919" ref_url="https://www.suse.com/security/cve/CVE-2022-32919/" source="CVE"/>
		<reference ref_id="CVE-2022-32933" ref_url="https://www.suse.com/security/cve/CVE-2022-32933/" source="CVE"/>
		<reference ref_id="CVE-2022-46705" ref_url="https://www.suse.com/security/cve/CVE-2022-46705/" source="CVE"/>
		<reference ref_id="CVE-2022-46725" ref_url="https://www.suse.com/security/cve/CVE-2022-46725/" source="CVE"/>
		<reference ref_id="CVE-2023-32359" ref_url="https://www.suse.com/security/cve/CVE-2023-32359/" source="CVE"/>
		<reference ref_id="CVE-2023-41983" ref_url="https://www.suse.com/security/cve/CVE-2023-41983/" source="CVE"/>
		<reference ref_id="CVE-2023-42852" ref_url="https://www.suse.com/security/cve/CVE-2023-42852/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.42.2 (bsc#1217210):

- CVE-2023-41983: Processing web content may lead to a denial-of-service.
- CVE-2023-42852: Processing web content may lead to arbitrary code execution.

Already previously fixed:

- CVE-2022-32919: Visiting a website that frames malicious content may lead to UI spoofing (fixed already in 2.38.4).
- CVE-2022-32933: A website may be able to track the websites a user visited in private browsing mode (fixed already in 2.38.0).
- CVE-2022-46705: Visiting a malicious website may lead to address bar spoofing (fixed already in 2.38.4).
- CVE-2022-46725: Visiting a malicious website may lead to address bar spoofing (fixed already in 2.38.4).
- CVE-2023-32359: A user’s password may be read aloud by a text-to-speech accessibility feature (fixed already in 2.42.0).

Bug fixes:

- Disable DMABuf renderer for NVIDIA proprietary drivers (bsc#1216778).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-06"/>
	<updated date="2023-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216778">SUSE bug 1216778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217210">SUSE bug 1217210</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32919/">CVE-2022-32919 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32919">CVE-2022-32919 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32933/">CVE-2022-32933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-32933">CVE-2022-32933 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-46705/">CVE-2022-46705 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46705">CVE-2022-46705 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-46725/">CVE-2022-46725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46725">CVE-2022-46725 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32359/">CVE-2023-32359 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32359">CVE-2023-32359 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41983/">CVE-2023-41983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41983">CVE-2023-41983 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42852/">CVE-2023-42852 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42852">CVE-2023-42852 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009813853" comment="libjavascriptcoregtk-4_0-18-2.42.2-2.158.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813854" comment="libwebkit2gtk-4_0-37-2.42.2-2.158.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813836" comment="libwebkit2gtk3-lang-2.42.2-2.158.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813855" comment="typelib-1_0-JavaScriptCore-4_0-2.42.2-2.158.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813856" comment="typelib-1_0-WebKit2-4_0-2.42.2-2.158.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813857" comment="typelib-1_0-WebKit2WebExtension-4_0-2.42.2-2.158.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813858" comment="webkit2gtk-4_0-injected-bundles-2.42.2-2.158.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009813853" comment="libjavascriptcoregtk-4_0-18-2.42.2-2.158.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813854" comment="libwebkit2gtk-4_0-37-2.42.2-2.158.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813836" comment="libwebkit2gtk3-lang-2.42.2-2.158.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813855" comment="typelib-1_0-JavaScriptCore-4_0-2.42.2-2.158.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813856" comment="typelib-1_0-WebKit2-4_0-2.42.2-2.158.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813857" comment="typelib-1_0-WebKit2WebExtension-4_0-2.42.2-2.158.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813858" comment="webkit2gtk-4_0-injected-bundles-2.42.2-2.158.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153112" version="1" class="patch">
	<metadata>
		<title>Security update for traceroute (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216591" ref_url="https://bugzilla.suse.com/1216591" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46316" ref_url="https://www.suse.com/security/cve/CVE-2023-46316/" source="CVE"/>
		<description>
This update for traceroute fixes the following issues:

- CVE-2023-46316: wrapper scripts do not properly parse command lines (bsc#1216591).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-06"/>
	<updated date="2023-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216591">SUSE bug 1216591</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46316/">CVE-2023-46316 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46316">CVE-2023-46316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813364" comment="traceroute-2.0.19-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153113" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208138" ref_url="https://bugzilla.suse.com/1208138" source="BUGZILLA"/>
		<reference ref_id="1208144" ref_url="https://bugzilla.suse.com/1208144" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0767" ref_url="https://www.suse.com/security/cve/CVE-2023-0767/" source="CVE"/>
		<reference ref_id="CVE-2023-25728" ref_url="https://www.suse.com/security/cve/CVE-2023-25728/" source="CVE"/>
		<reference ref_id="CVE-2023-25729" ref_url="https://www.suse.com/security/cve/CVE-2023-25729/" source="CVE"/>
		<reference ref_id="CVE-2023-25730" ref_url="https://www.suse.com/security/cve/CVE-2023-25730/" source="CVE"/>
		<reference ref_id="CVE-2023-25732" ref_url="https://www.suse.com/security/cve/CVE-2023-25732/" source="CVE"/>
		<reference ref_id="CVE-2023-25734" ref_url="https://www.suse.com/security/cve/CVE-2023-25734/" source="CVE"/>
		<reference ref_id="CVE-2023-25735" ref_url="https://www.suse.com/security/cve/CVE-2023-25735/" source="CVE"/>
		<reference ref_id="CVE-2023-25737" ref_url="https://www.suse.com/security/cve/CVE-2023-25737/" source="CVE"/>
		<reference ref_id="CVE-2023-25738" ref_url="https://www.suse.com/security/cve/CVE-2023-25738/" source="CVE"/>
		<reference ref_id="CVE-2023-25739" ref_url="https://www.suse.com/security/cve/CVE-2023-25739/" source="CVE"/>
		<reference ref_id="CVE-2023-25742" ref_url="https://www.suse.com/security/cve/CVE-2023-25742/" source="CVE"/>
		<reference ref_id="CVE-2023-25743" ref_url="https://www.suse.com/security/cve/CVE-2023-25743/" source="CVE"/>
		<reference ref_id="CVE-2023-25744" ref_url="https://www.suse.com/security/cve/CVE-2023-25744/" source="CVE"/>
		<reference ref_id="CVE-2023-25746" ref_url="https://www.suse.com/security/cve/CVE-2023-25746/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

  Updated to version 102.8.0 ESR (bsc#1208144):

  - CVE-2023-25728: Fixed content security policy leak in violation reports using iframes.
  - CVE-2023-25730: Fixed screen hijack via browser fullscreen mode.
  - CVE-2023-25743: Fixed Fullscreen notification not being shown in Firefox Focus.
  - CVE-2023-0767: Fixed arbitrary memory write via PKCS 12 in NSS.
  - CVE-2023-25735: Fixed potential use-after-free from compartment mismatch in SpiderMonkey.
  - CVE-2023-25737: Fixed invalid downcast in SVGUtils::SetupStrokeGeometry.
  - CVE-2023-25738: Fixed printing on Windows which could potentially crash Firefox with some device drivers.
  - CVE-2023-25739: Fixed use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext.
  - CVE-2023-25729: Fixed extensions opening external schemes without user knowledge.
  - CVE-2023-25732: Fixed out of bounds memory write from EncodeInputStream.
  - CVE-2023-25734: Fixed opening local .url files that causes unexpected network loads.
  - CVE-2023-25742: Fixed tab crash by Web Crypto ImportKey.
  - CVE-2023-25744: Fixed Memory safety bugs.
  - CVE-2023-25746: Fixed Memory safety bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-21"/>
	<updated date="2023-02-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208138">SUSE bug 1208138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0767/">CVE-2023-0767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0767">CVE-2023-0767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25728/">CVE-2023-25728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25728">CVE-2023-25728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25729/">CVE-2023-25729 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25729">CVE-2023-25729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25730/">CVE-2023-25730 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25730">CVE-2023-25730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25732/">CVE-2023-25732 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25732">CVE-2023-25732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25734/">CVE-2023-25734 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25734">CVE-2023-25734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25735/">CVE-2023-25735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25735">CVE-2023-25735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25737/">CVE-2023-25737 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25737">CVE-2023-25737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25738/">CVE-2023-25738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25738">CVE-2023-25738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25739/">CVE-2023-25739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25739">CVE-2023-25739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25742/">CVE-2023-25742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25742">CVE-2023-25742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25743/">CVE-2023-25743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25743">CVE-2023-25743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25744/">CVE-2023-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25744">CVE-2023-25744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25746/">CVE-2023-25746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25746">CVE-2023-25746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009740118" comment="MozillaFirefox-102.8.0-112.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740119" comment="MozillaFirefox-devel-102.8.0-112.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740120" comment="MozillaFirefox-translations-common-102.8.0-112.150.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009740118" comment="MozillaFirefox-102.8.0-112.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740119" comment="MozillaFirefox-devel-102.8.0-112.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740120" comment="MozillaFirefox-translations-common-102.8.0-112.150.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153114" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208138" ref_url="https://bugzilla.suse.com/1208138" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0767" ref_url="https://www.suse.com/security/cve/CVE-2023-0767/" source="CVE"/>
		<description>
This update for mozilla-nss fixes the following issues:

Updated to NSS 3.79.4 (bsc#1208138):

- CVE-2023-0767: Fixed handling of unknown PKCS#12 safe bag types.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-21"/>
	<updated date="2023-02-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208138">SUSE bug 1208138</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0767/">CVE-2023-0767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0767">CVE-2023-0767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009740765" comment="libfreebl3-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740749" comment="libfreebl3-32bit-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740766" comment="libfreebl3-hmac-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740751" comment="libfreebl3-hmac-32bit-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740767" comment="libsoftokn3-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740753" comment="libsoftokn3-32bit-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740768" comment="libsoftokn3-hmac-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740755" comment="libsoftokn3-hmac-32bit-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740769" comment="mozilla-nss-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740757" comment="mozilla-nss-32bit-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740770" comment="mozilla-nss-certs-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740759" comment="mozilla-nss-certs-32bit-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740774" comment="mozilla-nss-devel-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740771" comment="mozilla-nss-sysinit-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740762" comment="mozilla-nss-sysinit-32bit-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740772" comment="mozilla-nss-tools-3.79.4-58.94.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009740765" comment="libfreebl3-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740749" comment="libfreebl3-32bit-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740766" comment="libfreebl3-hmac-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740751" comment="libfreebl3-hmac-32bit-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740767" comment="libsoftokn3-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740753" comment="libsoftokn3-32bit-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740768" comment="libsoftokn3-hmac-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740755" comment="libsoftokn3-hmac-32bit-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740769" comment="mozilla-nss-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740757" comment="mozilla-nss-32bit-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740770" comment="mozilla-nss-certs-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740759" comment="mozilla-nss-certs-32bit-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740774" comment="mozilla-nss-devel-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740771" comment="mozilla-nss-sysinit-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740762" comment="mozilla-nss-sysinit-32bit-3.79.4-58.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740772" comment="mozilla-nss-tools-3.79.4-58.94.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153115" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1217813" ref_url="https://bugzilla.suse.com/1217813" source="BUGZILLA"/>
		<reference ref_id="1217815" ref_url="https://bugzilla.suse.com/1217815" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-49285" ref_url="https://www.suse.com/security/cve/CVE-2023-49285/" source="CVE"/>
		<reference ref_id="CVE-2023-49286" ref_url="https://www.suse.com/security/cve/CVE-2023-49286/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2023-49285: Fixed buffer overread bug on HTTP Message processing flow (bsc#1217813).
- CVE-2023-49286: Fixed Denial of Service attack against its Helper process management (bsc#1217815).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2023-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217813">SUSE bug 1217813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217815">SUSE bug 1217815</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49285/">CVE-2023-49285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49285">CVE-2023-49285 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49286/">CVE-2023-49286 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49286">CVE-2023-49286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815619" comment="squid-4.17-30.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153116" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199483" ref_url="https://bugzilla.suse.com/1199483" source="BUGZILLA"/>
		<reference ref_id="1210231" ref_url="https://bugzilla.suse.com/1210231" source="BUGZILLA"/>
		<reference ref_id="1211478" ref_url="https://bugzilla.suse.com/1211478" source="BUGZILLA"/>
		<reference ref_id="1212398" ref_url="https://bugzilla.suse.com/1212398" source="BUGZILLA"/>
		<reference ref_id="1214680" ref_url="https://bugzilla.suse.com/1214680" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1622" ref_url="https://www.suse.com/security/cve/CVE-2022-1622/" source="CVE"/>
		<reference ref_id="CVE-2022-40090" ref_url="https://www.suse.com/security/cve/CVE-2022-40090/" source="CVE"/>
		<reference ref_id="CVE-2023-1916" ref_url="https://www.suse.com/security/cve/CVE-2023-1916/" source="CVE"/>
		<reference ref_id="CVE-2023-26965" ref_url="https://www.suse.com/security/cve/CVE-2023-26965/" source="CVE"/>
		<reference ref_id="CVE-2023-2731" ref_url="https://www.suse.com/security/cve/CVE-2023-2731/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2023-2731: Fix null pointer deference in LZWDecode() (bsc#1211478).
- CVE-2023-1916: Fix out-of-bounds read in extractImageSection() (bsc#1210231).
- CVE-2023-26965: Fix heap-based use after free in loadImage() (bsc#1212398).
- CVE-2022-40090: Fix infinite loop in TIFFReadDirectory() (bsc#1214680).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-12"/>
	<updated date="2023-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199483">SUSE bug 1199483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210231">SUSE bug 1210231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211478">SUSE bug 1211478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212398">SUSE bug 1212398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214680">SUSE bug 1214680</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1622/">CVE-2022-1622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1622">CVE-2022-1622 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40090/">CVE-2022-40090 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40090">CVE-2022-40090 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1916/">CVE-2023-1916 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1916">CVE-2023-1916 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26965/">CVE-2023-26965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26965">CVE-2023-26965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2731/">CVE-2023-2731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2731">CVE-2023-2731 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815616" comment="libtiff5-4.0.9-44.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815617" comment="libtiff5-32bit-4.0.9-44.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815618" comment="tiff-4.0.9-44.74.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815616" comment="libtiff5-4.0.9-44.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815617" comment="libtiff5-32bit-4.0.9-44.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815618" comment="tiff-4.0.9-44.74.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153117" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
		</affected>
		<reference ref_id="1217813" ref_url="https://bugzilla.suse.com/1217813" source="BUGZILLA"/>
		<reference ref_id="1217815" ref_url="https://bugzilla.suse.com/1217815" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-49285" ref_url="https://www.suse.com/security/cve/CVE-2023-49285/" source="CVE"/>
		<reference ref_id="CVE-2023-49286" ref_url="https://www.suse.com/security/cve/CVE-2023-49286/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2023-49285: Fixed buffer over read bug on HTTP Message processing flow (bsc#1217813)
- CVE-2023-49286: Fixed Denial of Service vulnerability in helper process management (bsc#1217815)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-14"/>
	<updated date="2023-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217813">SUSE bug 1217813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217815">SUSE bug 1217815</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49285/">CVE-2023-49285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49285">CVE-2023-49285 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49286/">CVE-2023-49286 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49286">CVE-2023-49286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815326" comment="squid-3.5.21-26.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153118" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1217844" ref_url="https://bugzilla.suse.com/1217844" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-42916" ref_url="https://www.suse.com/security/cve/CVE-2023-42916/" source="CVE"/>
		<reference ref_id="CVE-2023-42917" ref_url="https://www.suse.com/security/cve/CVE-2023-42917/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.42.3 (bsc#1217844):

- Fix flickering while playing videos with DMA-BUF sink.
- Fix color picker being triggered in the inspector when typing 'tan'.
- Do not special case the 'sans' font family name.
- Fix build failure with libxml2 version 2.12.0 due to an API change.
- Fix several crashes and rendering issues.
- Security fixes: CVE-2023-42916, CVE-2023-42917.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-14"/>
	<updated date="2023-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217844">SUSE bug 1217844</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-42916/">CVE-2023-42916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42916">CVE-2023-42916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42917/">CVE-2023-42917 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42917">CVE-2023-42917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815610" comment="libjavascriptcoregtk-4_0-18-2.42.3-2.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815611" comment="libwebkit2gtk-4_0-37-2.42.3-2.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815528" comment="libwebkit2gtk3-lang-2.42.3-2.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815612" comment="typelib-1_0-JavaScriptCore-4_0-2.42.3-2.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815613" comment="typelib-1_0-WebKit2-4_0-2.42.3-2.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815614" comment="typelib-1_0-WebKit2WebExtension-4_0-2.42.3-2.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815615" comment="webkit2gtk-4_0-injected-bundles-2.42.3-2.161.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815610" comment="libjavascriptcoregtk-4_0-18-2.42.3-2.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815611" comment="libwebkit2gtk-4_0-37-2.42.3-2.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815528" comment="libwebkit2gtk3-lang-2.42.3-2.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815612" comment="typelib-1_0-JavaScriptCore-4_0-2.42.3-2.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815613" comment="typelib-1_0-WebKit2-4_0-2.42.3-2.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815614" comment="typelib-1_0-WebKit2WebExtension-4_0-2.42.3-2.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815615" comment="webkit2gtk-4_0-injected-bundles-2.42.3-2.161.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153119" version="1" class="patch">
	<metadata>
		<title>Security update for xrdp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215803" ref_url="https://bugzilla.suse.com/1215803" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-42822" ref_url="https://www.suse.com/security/cve/CVE-2023-42822/" source="CVE"/>
		<description>
This update for xrdp fixes the following issues:

- CVE-2023-42822: Fixed unchecked access to font glyph info (bsc#1215803).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-15"/>
	<updated date="2023-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215803">SUSE bug 1215803</bugzilla>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-42822/">CVE-2023-42822 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42822">CVE-2023-42822 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812847" comment="xrdp-0.9.0~git.1456906198.f422461-21.39.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812847" comment="xrdp-0.9.0~git.1456906198.f422461-21.39.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153120" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1218014" ref_url="https://bugzilla.suse.com/1218014" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50495" ref_url="https://www.suse.com/security/cve/CVE-2023-50495/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

- CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-18"/>
	<updated date="2023-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218014">SUSE bug 1218014</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50495/">CVE-2023-50495 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50495">CVE-2023-50495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816325" comment="libncurses5-5.9-85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816326" comment="libncurses5-32bit-5.9-85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816327" comment="libncurses6-5.9-85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816328" comment="libncurses6-32bit-5.9-85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816329" comment="ncurses-devel-5.9-85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816330" comment="ncurses-devel-32bit-5.9-85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816331" comment="ncurses-utils-5.9-85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816332" comment="tack-5.9-85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816333" comment="terminfo-5.9-85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816334" comment="terminfo-base-5.9-85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153121" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1217950" ref_url="https://bugzilla.suse.com/1217950" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (bsc#1217950).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-19"/>
	<updated date="2023-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217950">SUSE bug 1217950</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009817166" comment="openssh-7.2p2-74.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817167" comment="openssh-askpass-gnome-7.2p2-74.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817168" comment="openssh-fips-7.2p2-74.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817169" comment="openssh-helpers-7.2p2-74.66.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009817166" comment="openssh-7.2p2-74.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817167" comment="openssh-askpass-gnome-7.2p2-74.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817168" comment="openssh-fips-7.2p2-74.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817169" comment="openssh-helpers-7.2p2-74.66.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153122" version="1" class="patch">
	<metadata>
		<title>Security update for suse-module-tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205767" ref_url="https://bugzilla.suse.com/1205767" source="BUGZILLA"/>
		<reference ref_id="1210335" ref_url="https://bugzilla.suse.com/1210335" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1829" ref_url="https://www.suse.com/security/cve/CVE-2023-1829/" source="CVE"/>
		<reference ref_id="CVE-2023-23559" ref_url="https://www.suse.com/security/cve/CVE-2023-23559/" source="CVE"/>
		<description>
This update for suse-module-tools fixes the following issues:

- CVE-2023-1829: Fixed vulnerabilities in the tcindex classifier (bsc#1210335).
= Fixed protocol problems in RNDIS drivers (bsc#1205767).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-19"/>
	<updated date="2023-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205767">SUSE bug 1205767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210335">SUSE bug 1210335</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1829/">CVE-2023-1829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-23559/">CVE-2023-23559 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23559">CVE-2023-23559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817183" comment="suse-module-tools-12.6.2-27.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817183" comment="suse-module-tools-12.6.2-27.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153123" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1217230" ref_url="https://bugzilla.suse.com/1217230" source="BUGZILLA"/>
		<reference ref_id="1217974" ref_url="https://bugzilla.suse.com/1217974" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-6204" ref_url="https://www.suse.com/security/cve/CVE-2023-6204/" source="CVE"/>
		<reference ref_id="CVE-2023-6205" ref_url="https://www.suse.com/security/cve/CVE-2023-6205/" source="CVE"/>
		<reference ref_id="CVE-2023-6206" ref_url="https://www.suse.com/security/cve/CVE-2023-6206/" source="CVE"/>
		<reference ref_id="CVE-2023-6207" ref_url="https://www.suse.com/security/cve/CVE-2023-6207/" source="CVE"/>
		<reference ref_id="CVE-2023-6208" ref_url="https://www.suse.com/security/cve/CVE-2023-6208/" source="CVE"/>
		<reference ref_id="CVE-2023-6209" ref_url="https://www.suse.com/security/cve/CVE-2023-6209/" source="CVE"/>
		<reference ref_id="CVE-2023-6212" ref_url="https://www.suse.com/security/cve/CVE-2023-6212/" source="CVE"/>
		<reference ref_id="CVE-2023-6856" ref_url="https://www.suse.com/security/cve/CVE-2023-6856/" source="CVE"/>
		<reference ref_id="CVE-2023-6857" ref_url="https://www.suse.com/security/cve/CVE-2023-6857/" source="CVE"/>
		<reference ref_id="CVE-2023-6858" ref_url="https://www.suse.com/security/cve/CVE-2023-6858/" source="CVE"/>
		<reference ref_id="CVE-2023-6859" ref_url="https://www.suse.com/security/cve/CVE-2023-6859/" source="CVE"/>
		<reference ref_id="CVE-2023-6860" ref_url="https://www.suse.com/security/cve/CVE-2023-6860/" source="CVE"/>
		<reference ref_id="CVE-2023-6861" ref_url="https://www.suse.com/security/cve/CVE-2023-6861/" source="CVE"/>
		<reference ref_id="CVE-2023-6862" ref_url="https://www.suse.com/security/cve/CVE-2023-6862/" source="CVE"/>
		<reference ref_id="CVE-2023-6863" ref_url="https://www.suse.com/security/cve/CVE-2023-6863/" source="CVE"/>
		<reference ref_id="CVE-2023-6864" ref_url="https://www.suse.com/security/cve/CVE-2023-6864/" source="CVE"/>
		<reference ref_id="CVE-2023-6865" ref_url="https://www.suse.com/security/cve/CVE-2023-6865/" source="CVE"/>
		<reference ref_id="CVE-2023-6867" ref_url="https://www.suse.com/security/cve/CVE-2023-6867/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 115.6.0 ESR changelog-entry (bsc#1217974)
  * CVE-2023-6856: Heap-buffer-overflow affecting WebGL  DrawElementsInstanced method with Mesa VM driver (bmo#1843782).
  * CVE-2023-6857: Symlinks may resolve to smaller than expected buffers (bmo#1796023).
  * CVE-2023-6858: Heap buffer overflow in nsTextFragment (bmo#1826791).
  * CVE-2023-6859: Use-after-free in PR_GetIdentitiesLayer (bmo#1840144).
  * CVE-2023-6860: Potential sandbox escape due to VideoBridge lack of texture validation (bmo#1854669).
  * CVE-2023-6861: Heap buffer overflow affected nsWindow::PickerOpen(void) in headless mode (bmo#1864118).
  * CVE-2023-6862: Use-after-free in nsDNSService (bsc#1868042).
  * CVE-2023-6863: Undefined behavior in ShutdownObserver() (bmo#1868901).
  * CVE-2023-6864: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6.
  * CVE-2023-6865: Potential exposure of uninitialized data in EncryptingOutputStream (bmo#1864123).
  * CVE-2023-6867: Clickjacking permission prompts using the popup transition (bmo#1863863).
    
- Fixed: Various security fixes and other quality improvements MFSA 2023-50 (bsc#1217230)
  * CVE-2023-6204 (bmo#1841050)
    Out-of-bound memory access in WebGL2 blitFramebuffer
  * CVE-2023-6205 (bmo#1854076)
    Use-after-free in MessagePort::Entangled
  * CVE-2023-6206 (bmo#1857430)
    Clickjacking permission prompts using the fullscreen
    transition
  * CVE-2023-6207 (bmo#1861344)
    Use-after-free in ReadableByteStreamQueueEntry::Buffer
  * CVE-2023-6208 (bmo#1855345)
    Using Selection API would copy contents into X11 primary
    selection.
  * CVE-2023-6209 (bmo#1858570)
    Incorrect parsing of relative URLs starting with '///'
  * CVE-2023-6212 (bmo#1658432, bmo#1820983, bmo#1829252,
    bmo#1856072, bmo#1856091, bmo#1859030, bmo#1860943,
    bmo#1862782)
    Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5,
    and Thunderbird 115.5		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-19"/>
	<updated date="2023-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217230">SUSE bug 1217230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6204/">CVE-2023-6204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6204">CVE-2023-6204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6205/">CVE-2023-6205 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6205">CVE-2023-6205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6206/">CVE-2023-6206 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6206">CVE-2023-6206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6207/">CVE-2023-6207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6207">CVE-2023-6207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6208/">CVE-2023-6208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6208">CVE-2023-6208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6209/">CVE-2023-6209 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6209">CVE-2023-6209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6212/">CVE-2023-6212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6212">CVE-2023-6212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6856/">CVE-2023-6856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6856">CVE-2023-6856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6857/">CVE-2023-6857 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6857">CVE-2023-6857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6858/">CVE-2023-6858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6858">CVE-2023-6858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6859/">CVE-2023-6859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6859">CVE-2023-6859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6860/">CVE-2023-6860 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6860">CVE-2023-6860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6861/">CVE-2023-6861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6861">CVE-2023-6861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6862/">CVE-2023-6862 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6862">CVE-2023-6862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6863/">CVE-2023-6863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6863">CVE-2023-6863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6864/">CVE-2023-6864 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6864">CVE-2023-6864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6865/">CVE-2023-6865 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6865">CVE-2023-6865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6867/">CVE-2023-6867 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6867">CVE-2023-6867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009817170" comment="MozillaFirefox-115.6.0-112.194.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816982" comment="MozillaFirefox-devel-115.6.0-112.194.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817171" comment="MozillaFirefox-translations-common-115.6.0-112.194.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009817170" comment="MozillaFirefox-115.6.0-112.194.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816982" comment="MozillaFirefox-devel-115.6.0-112.194.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817171" comment="MozillaFirefox-translations-common-115.6.0-112.194.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153124" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1217871" ref_url="https://bugzilla.suse.com/1217871" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46751" ref_url="https://www.suse.com/security/cve/CVE-2023-46751/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2023-46751: Fixed dangling pointer in gdev_prn_open_printer_seekable() (bsc#1217871).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2023-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217871">SUSE bug 1217871</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46751/">CVE-2023-46751 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46751">CVE-2023-46751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816322" comment="ghostscript-9.52-23.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816323" comment="ghostscript-devel-9.52-23.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816324" comment="ghostscript-x11-9.52-23.63.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816322" comment="ghostscript-9.52-23.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816323" comment="ghostscript-devel-9.52-23.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816324" comment="ghostscript-x11-9.52-23.63.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153125" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1140877" ref_url="https://bugzilla.suse.com/1140877" source="BUGZILLA"/>
		<reference ref_id="1202692" ref_url="https://bugzilla.suse.com/1202692" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13283" ref_url="https://www.suse.com/security/cve/CVE-2019-13283/" source="CVE"/>
		<reference ref_id="CVE-2022-38784" ref_url="https://www.suse.com/security/cve/CVE-2022-38784/" source="CVE"/>
		<description>
This update for poppler fixes the following issues:

  - CVE-2022-38784: Fixed integer overflow in the JBIG2 decoder (bsc#1202692).
  - CVE-2019-13283: Fixed heap-based buffer over-read that could be triggered by sending a crafted PDF document to the pdftotext tool (bsc#1140877).

		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-23"/>
	<updated date="2023-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140877">SUSE bug 1140877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202692">SUSE bug 1202692</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13283/">CVE-2019-13283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13283">CVE-2019-13283 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38784/">CVE-2022-38784 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38784">CVE-2022-38784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009741560" comment="libpoppler-glib8-0.43.0-16.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009741561" comment="libpoppler-qt4-4-0.43.0-16.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009741562" comment="libpoppler60-0.43.0-16.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009741563" comment="poppler-tools-0.43.0-16.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009741560" comment="libpoppler-glib8-0.43.0-16.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009741561" comment="libpoppler-qt4-4-0.43.0-16.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009741562" comment="libpoppler60-0.43.0-16.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009741563" comment="poppler-tools-0.43.0-16.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153126" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120956" ref_url="https://bugzilla.suse.com/1120956" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20662" ref_url="https://www.suse.com/security/cve/CVE-2018-20662/" source="CVE"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2018-20662: PDFDoc setup in PDFDoc.cc allows attackers to cause DOS because of a wrong return value from PDFDoc:setup (bsc#1120956).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-21"/>
	<updated date="2023-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120956">SUSE bug 1120956</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20662/">CVE-2018-20662 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20662">CVE-2018-20662 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815322" comment="libpoppler-glib8-0.43.0-16.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815323" comment="libpoppler-qt4-4-0.43.0-16.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815324" comment="libpoppler60-0.43.0-16.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815325" comment="poppler-tools-0.43.0-16.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153127" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1218251" ref_url="https://bugzilla.suse.com/1218251" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4603" ref_url="https://www.suse.com/security/cve/CVE-2022-4603/" source="CVE"/>
		<description>
This update for ppp fixes the following issues:

- CVE-2022-4603: Fixed improper validation of array index of the component pppdump (bsc#1218251).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-22"/>
	<updated date="2023-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218251">SUSE bug 1218251</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-4603/">CVE-2022-4603 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4603">CVE-2022-4603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817819" comment="ppp-2.4.7-4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153128" version="1" class="patch">
	<metadata>
		<title>Security update for jbigkit (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198146" ref_url="https://bugzilla.suse.com/1198146" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1210" ref_url="https://www.suse.com/security/cve/CVE-2022-1210/" source="CVE"/>
		<description>
This update for jbigkit fixes the following issues:

- CVE-2022-1210: Fixed denial of service in TIFF File Handler (bsc#1198146).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-25"/>
	<updated date="2023-12-25"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1198146">SUSE bug 1198146</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1210/">CVE-2022-1210 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1210">CVE-2022-1210 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009817816" comment="libjbig2-2.0-14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817817" comment="libjbig2-32bit-2.0-14.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153129" version="1" class="patch">
	<metadata>
		<title>Security update for python36 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205244" ref_url="https://bugzilla.suse.com/1205244" source="BUGZILLA"/>
		<reference ref_id="1208443" ref_url="https://bugzilla.suse.com/1208443" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061/" source="CVE"/>
		<description>
This update for python36 fixes the following issues:

  - CVE-2022-45061: Fixed DoS when IDNA decodes extremely long domain names (bsc#1205244).

  Bugfixes:

  - Fixed issue where email.generator.py replaces a non-existent header (bsc#1208443).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-23"/>
	<updated date="2023-02-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1205244">SUSE bug 1205244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208443">SUSE bug 1208443</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009742185" comment="libpython3_6m1_0-3.6.15-6.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742186" comment="python36-3.6.15-6.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742187" comment="python36-base-3.6.15-6.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742188" comment="python36-curses-3.6.15-6.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742189" comment="python36-dbm-3.6.15-6.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742190" comment="python36-devel-3.6.15-6.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742191" comment="python36-idle-3.6.15-6.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742192" comment="python36-testsuite-3.6.15-6.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742193" comment="python36-tk-3.6.15-6.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742194" comment="python36-tools-3.6.15-6.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153130" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215792" ref_url="https://bugzilla.suse.com/1215792" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40475" ref_url="https://www.suse.com/security/cve/CVE-2023-40475/" source="CVE"/>
		<description>
This update for gstreamer-plugins-bad fixes the following issues:

- CVE-2023-40475: Fixed GStreamer MXF File Parsing Integer Overflow (bsc#1215792).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-26"/>
	<updated date="2023-12-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215792">SUSE bug 1215792</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40475/">CVE-2023-40475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-40475">CVE-2023-40475 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009817172" comment="gstreamer-plugins-bad-1.8.3-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816993" comment="gstreamer-plugins-bad-lang-1.8.3-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817173" comment="libgstadaptivedemux-1_0-0-1.8.3-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817174" comment="libgstbadaudio-1_0-0-1.8.3-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817175" comment="libgstbadbase-1_0-0-1.8.3-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817176" comment="libgstbadvideo-1_0-0-1.8.3-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817177" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817178" comment="libgstcodecparsers-1_0-0-1.8.3-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817179" comment="libgstgl-1_0-0-1.8.3-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817180" comment="libgstmpegts-1_0-0-1.8.3-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817181" comment="libgstphotography-1_0-0-1.8.3-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817182" comment="libgsturidownloader-1_0-0-1.8.3-18.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009817172" comment="gstreamer-plugins-bad-1.8.3-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816993" comment="gstreamer-plugins-bad-lang-1.8.3-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817173" comment="libgstadaptivedemux-1_0-0-1.8.3-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817174" comment="libgstbadaudio-1_0-0-1.8.3-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817175" comment="libgstbadbase-1_0-0-1.8.3-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817176" comment="libgstbadvideo-1_0-0-1.8.3-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817177" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817178" comment="libgstcodecparsers-1_0-0-1.8.3-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817179" comment="libgstgl-1_0-0-1.8.3-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817180" comment="libgstmpegts-1_0-0-1.8.3-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817181" comment="libgstphotography-1_0-0-1.8.3-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817182" comment="libgsturidownloader-1_0-0-1.8.3-18.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153131" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215868" ref_url="https://bugzilla.suse.com/1215868" source="BUGZILLA"/>
		<reference ref_id="1215869" ref_url="https://bugzilla.suse.com/1215869" source="BUGZILLA"/>
		<reference ref_id="1215870" ref_url="https://bugzilla.suse.com/1215870" source="BUGZILLA"/>
		<reference ref_id="1218032" ref_url="https://bugzilla.suse.com/1218032" source="BUGZILLA"/>
		<reference ref_id="1218033" ref_url="https://bugzilla.suse.com/1218033" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39928" ref_url="https://www.suse.com/security/cve/CVE-2023-39928/" source="CVE"/>
		<reference ref_id="CVE-2023-40451" ref_url="https://www.suse.com/security/cve/CVE-2023-40451/" source="CVE"/>
		<reference ref_id="CVE-2023-41074" ref_url="https://www.suse.com/security/cve/CVE-2023-41074/" source="CVE"/>
		<reference ref_id="CVE-2023-42883" ref_url="https://www.suse.com/security/cve/CVE-2023-42883/" source="CVE"/>
		<reference ref_id="CVE-2023-42890" ref_url="https://www.suse.com/security/cve/CVE-2023-42890/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2023-42890: Fixed processing malicious web content may lead to arbitrary code execution (bsc#1218033).
- CVE-2023-42883: Fixed processing a malicious image may lead to a denial-of-service (bsc#1218032).
- CVE-2023-41074: Fixed use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (bsc#1215870).
- CVE-2023-39928: Fixed use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (bsc#1215868).
- CVE-2023-40451: Update to version 2.42.4 (bsc#1215869).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-27"/>
	<updated date="2023-12-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215868">SUSE bug 1215868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215869">SUSE bug 1215869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215870">SUSE bug 1215870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218032">SUSE bug 1218032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218033">SUSE bug 1218033</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39928/">CVE-2023-39928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39928">CVE-2023-39928 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40451/">CVE-2023-40451 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40451">CVE-2023-40451 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-41074/">CVE-2023-41074 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41074">CVE-2023-41074 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42883/">CVE-2023-42883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42883">CVE-2023-42883 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42890/">CVE-2023-42890 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42890">CVE-2023-42890 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009817974" comment="libjavascriptcoregtk-4_0-18-2.42.4-2.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817975" comment="libwebkit2gtk-4_0-37-2.42.4-2.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817969" comment="libwebkit2gtk3-lang-2.42.4-2.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817976" comment="typelib-1_0-JavaScriptCore-4_0-2.42.4-2.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817977" comment="typelib-1_0-WebKit2-4_0-2.42.4-2.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817978" comment="typelib-1_0-WebKit2WebExtension-4_0-2.42.4-2.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817979" comment="webkit2gtk-4_0-injected-bundles-2.42.4-2.164.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009817974" comment="libjavascriptcoregtk-4_0-18-2.42.4-2.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817975" comment="libwebkit2gtk-4_0-37-2.42.4-2.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817969" comment="libwebkit2gtk3-lang-2.42.4-2.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817976" comment="typelib-1_0-JavaScriptCore-4_0-2.42.4-2.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817977" comment="typelib-1_0-WebKit2-4_0-2.42.4-2.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817978" comment="typelib-1_0-WebKit2WebExtension-4_0-2.42.4-2.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817979" comment="webkit2gtk-4_0-injected-bundles-2.42.4-2.164.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153132" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215796" ref_url="https://bugzilla.suse.com/1215796" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40474" ref_url="https://www.suse.com/security/cve/CVE-2023-40474/" source="CVE"/>
		<description>
This update for gstreamer fixes the following issues:

- CVE-2023-40474: Fixed GStreamer MXF File Parsing Integer Overflow (bsc#1215796).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-28"/>
	<updated date="2023-12-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215796">SUSE bug 1215796</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40474/">CVE-2023-40474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-40474">CVE-2023-40474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009818216" comment="gstreamer-1.8.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818166" comment="gstreamer-lang-1.8.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818217" comment="gstreamer-utils-1.8.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818218" comment="libgstreamer-1_0-0-1.8.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818219" comment="libgstreamer-1_0-0-32bit-1.8.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818220" comment="typelib-1_0-Gst-1_0-1.8.3-10.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009818216" comment="gstreamer-1.8.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818166" comment="gstreamer-lang-1.8.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818217" comment="gstreamer-utils-1.8.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818218" comment="libgstreamer-1_0-0-1.8.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818219" comment="libgstreamer-1_0-0-32bit-1.8.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818220" comment="typelib-1_0-Gst-1_0-1.8.3-10.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153133" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208574" ref_url="https://bugzilla.suse.com/1208574" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30560" ref_url="https://www.suse.com/security/cve/CVE-2021-30560/" source="CVE"/>
		<description>
This update for libxslt fixes the following issues:

- CVE-2021-30560: Fixing a use after free vulnerability in Blink XSLT (bsc#1208574).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-28"/>
	<updated date="2023-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208574">SUSE bug 1208574</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30560/">CVE-2021-30560 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30560">CVE-2021-30560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009742181" comment="libxslt-tools-1.1.28-17.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742182" comment="libxslt1-1.1.28-17.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742179" comment="libxslt1-32bit-1.1.28-17.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009742181" comment="libxslt-tools-1.1.28-17.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742182" comment="libxslt1-1.1.28-17.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742179" comment="libxslt1-32bit-1.1.28-17.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153134" version="1" class="patch">
	<metadata>
		<title>Security update for xterm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205305" ref_url="https://bugzilla.suse.com/1205305" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45063" ref_url="https://www.suse.com/security/cve/CVE-2022-45063/" source="CVE"/>
		<description>
This update for xterm fixes the following issues:
  
  - CVE-2022-45063: Fixed command injection in ESC 50 fontoperation by disabling the change font functionality (bsc#1205305).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-28"/>
	<updated date="2023-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205305">SUSE bug 1205305</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45063/">CVE-2022-45063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45063">CVE-2022-45063 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742183" comment="xterm-308-5.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742183" comment="xterm-308-5.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153135" version="1" class="patch">
	<metadata>
		<title>Security update for nrpe (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="931600" ref_url="https://bugzilla.suse.com/931600" source="BUGZILLA"/>
		<reference ref_id="938906" ref_url="https://bugzilla.suse.com/938906" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>
This update for nrpe fixes the following issues:

- CVE-2015-4000: Fixed Logjam Attack by increasing the standard size of 512 bit dh parameters to 2048 (bsc#931600, bsc#938906).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-01"/>
	<updated date="2023-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/931600">SUSE bug 931600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938906">SUSE bug 938906</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009713914" comment="monitoring-plugins-nrpe-2.15-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713915" comment="nrpe-2.15-6.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009713914" comment="monitoring-plugins-nrpe-2.15-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713915" comment="nrpe-2.15-6.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153136" version="1" class="patch">
	<metadata>
		<title>Security update for emacs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208512" ref_url="https://bugzilla.suse.com/1208512" source="BUGZILLA"/>
		<reference ref_id="1208515" ref_url="https://bugzilla.suse.com/1208515" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48337" ref_url="https://www.suse.com/security/cve/CVE-2022-48337/" source="CVE"/>
		<reference ref_id="CVE-2022-48339" ref_url="https://www.suse.com/security/cve/CVE-2022-48339/" source="CVE"/>
		<description>
This update for emacs fixes the following issues:

  - CVE-2022-48337: Fixed etags local command injection vulnerability (bsc#1208515).
  - CVE-2022-48339: Fixed htmlfontify.el command injection vulnerability (bsc#1208512).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-02"/>
	<updated date="2023-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208512">SUSE bug 1208512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208515">SUSE bug 1208515</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48337/">CVE-2022-48337 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48337">CVE-2022-48337 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48339/">CVE-2022-48339 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48339">CVE-2022-48339 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009741841" comment="emacs-24.3-25.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009741787" comment="emacs-el-24.3-25.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009741788" comment="emacs-info-24.3-25.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009741842" comment="emacs-nox-24.3-25.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009741843" comment="emacs-x11-24.3-25.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009741844" comment="etags-24.3-25.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009741841" comment="emacs-24.3-25.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009741787" comment="emacs-el-24.3-25.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009741788" comment="emacs-info-24.3-25.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009741842" comment="emacs-nox-24.3-25.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009741843" comment="emacs-x11-24.3-25.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009741844" comment="etags-24.3-25.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153137" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204642" ref_url="https://bugzilla.suse.com/1204642" source="BUGZILLA"/>
		<reference ref_id="1205422" ref_url="https://bugzilla.suse.com/1205422" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3570" ref_url="https://www.suse.com/security/cve/CVE-2022-3570/" source="CVE"/>
		<reference ref_id="CVE-2022-3598" ref_url="https://www.suse.com/security/cve/CVE-2022-3598/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2022-3570: Fixed a potential crash in the tiffcrop utility (bsc#1205422).
- CVE-2022-3598: Fixed a potential crash in the tiffcrop utility (bsc#1204642).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-10"/>
	<updated date="2023-01-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204642">SUSE bug 1204642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205422">SUSE bug 1205422</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3570/">CVE-2022-3570 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3570">CVE-2022-3570 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3598/">CVE-2022-3598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3598">CVE-2022-3598 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009731162" comment="libtiff5-4.0.9-44.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009731163" comment="libtiff5-32bit-4.0.9-44.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009731164" comment="tiff-4.0.9-44.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153138" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206474" ref_url="https://bugzilla.suse.com/1206474" source="BUGZILLA"/>
		<reference ref_id="1206750" ref_url="https://bugzilla.suse.com/1206750" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42852" ref_url="https://www.suse.com/security/cve/CVE-2022-42852/" source="CVE"/>
		<reference ref_id="CVE-2022-42856" ref_url="https://www.suse.com/security/cve/CVE-2022-42856/" source="CVE"/>
		<reference ref_id="CVE-2022-42863" ref_url="https://www.suse.com/security/cve/CVE-2022-42863/" source="CVE"/>
		<reference ref_id="CVE-2022-42867" ref_url="https://www.suse.com/security/cve/CVE-2022-42867/" source="CVE"/>
		<reference ref_id="CVE-2022-46691" ref_url="https://www.suse.com/security/cve/CVE-2022-46691/" source="CVE"/>
		<reference ref_id="CVE-2022-46692" ref_url="https://www.suse.com/security/cve/CVE-2022-46692/" source="CVE"/>
		<reference ref_id="CVE-2022-46698" ref_url="https://www.suse.com/security/cve/CVE-2022-46698/" source="CVE"/>
		<reference ref_id="CVE-2022-46699" ref_url="https://www.suse.com/security/cve/CVE-2022-46699/" source="CVE"/>
		<reference ref_id="CVE-2022-46700" ref_url="https://www.suse.com/security/cve/CVE-2022-46700/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.38.3 (bnc#1206750):

- CVE-2022-42852: Fixed disclosure of process memory by improved memory handling.
- CVE-2022-42856: Fixed a potential arbitrary code execution when processing maliciously crafted web content (bsc#1206474).
- CVE-2022-42863: Fixed a potential arbitrary code execution when processing maliciously crafted web content.
- CVE-2022-42867: Fixed a use after free issue was addressed with improved memory management.
- CVE-2022-46691: Fixed a potential arbitrary code execution when processing maliciously crafted web content.
- CVE-2022-46692: Fixed bypass of Same Origin Policy through improved state management.
- CVE-2022-46698: Fixed disclosure of sensitive user information with improved checks.
- CVE-2022-46699: Fixed an arbitrary code execution caused by memory corruption.
- CVE-2022-46700: Fixed a potential arbitrary code execution when processing maliciously crafted web content.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-10"/>
	<updated date="2023-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206474">SUSE bug 1206474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206750">SUSE bug 1206750</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42852/">CVE-2022-42852 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42852">CVE-2022-42852 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42856/">CVE-2022-42856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42856">CVE-2022-42856 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42863/">CVE-2022-42863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42863">CVE-2022-42863 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42867/">CVE-2022-42867 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42867">CVE-2022-42867 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46691/">CVE-2022-46691 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46691">CVE-2022-46691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46692/">CVE-2022-46692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46692">CVE-2022-46692 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-46698/">CVE-2022-46698 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46698">CVE-2022-46698 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46699/">CVE-2022-46699 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46699">CVE-2022-46699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46700/">CVE-2022-46700 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46700">CVE-2022-46700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009730982" comment="libjavascriptcoregtk-4_0-18-2.38.3-2.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730983" comment="libwebkit2gtk-4_0-37-2.38.3-2.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730972" comment="libwebkit2gtk3-lang-2.38.3-2.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730984" comment="typelib-1_0-JavaScriptCore-4_0-2.38.3-2.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730985" comment="typelib-1_0-WebKit2-4_0-2.38.3-2.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730986" comment="typelib-1_0-WebKit2WebExtension-4_0-2.38.3-2.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730987" comment="webkit2gtk-4_0-injected-bundles-2.38.3-2.123.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009730982" comment="libjavascriptcoregtk-4_0-18-2.38.3-2.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730983" comment="libwebkit2gtk-4_0-37-2.38.3-2.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730972" comment="libwebkit2gtk3-lang-2.38.3-2.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730984" comment="typelib-1_0-JavaScriptCore-4_0-2.38.3-2.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730985" comment="typelib-1_0-WebKit2-4_0-2.38.3-2.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730986" comment="typelib-1_0-WebKit2WebExtension-4_0-2.38.3-2.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730987" comment="webkit2gtk-4_0-injected-bundles-2.38.3-2.123.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153139" version="1" class="patch">
	<metadata>
		<title>Security update for python36 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208471" ref_url="https://bugzilla.suse.com/1208471" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<description>
This update for python36 fixes the following issues:

- CVE-2023-24329: Fixed a blocklist bypass via the urllib.parse component when supplying a URL that starts with blank characters (bsc#1208471).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-06"/>
	<updated date="2023-03-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208471">SUSE bug 1208471</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009743490" comment="libpython3_6m1_0-3.6.15-6.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743491" comment="python36-3.6.15-6.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743492" comment="python36-base-3.6.15-6.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743493" comment="python36-curses-3.6.15-6.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743494" comment="python36-dbm-3.6.15-6.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743495" comment="python36-devel-3.6.15-6.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743496" comment="python36-idle-3.6.15-6.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743497" comment="python36-testsuite-3.6.15-6.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743498" comment="python36-tk-3.6.15-6.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743499" comment="python36-tools-3.6.15-6.85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153140" version="1" class="patch">
	<metadata>
		<title>Security update for python36-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206667" ref_url="https://bugzilla.suse.com/1206667" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40897" ref_url="https://www.suse.com/security/cve/CVE-2022-40897/" source="CVE"/>
		<description>
This update for python36-setuptools fixes the following issues:

- CVE-2022-40897: Fixed an excessive CPU usage that could be triggered
  by fetching a malicious HTML document (bsc#1206667).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-11"/>
	<updated date="2023-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206667">SUSE bug 1206667</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40897/">CVE-2022-40897 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40897">CVE-2022-40897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009731997" comment="python36-setuptools-44.1.1-9.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009731998" comment="python36-setuptools-test-44.1.1-9.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009731999" comment="python36-setuptools-wheel-44.1.1-9.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153141" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1205874" ref_url="https://bugzilla.suse.com/1205874" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-46340" ref_url="https://www.suse.com/security/cve/CVE-2022-46340/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- Fixed a regression introduced with security update for CVE-2022-46340 (bsc#1205874).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-08"/>
	<updated date="2023-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205874">SUSE bug 1205874</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46340/">CVE-2022-46340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46340">CVE-2022-46340 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009743488" comment="xorg-x11-server-7.6_1.18.3-76.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743489" comment="xorg-x11-server-extra-7.6_1.18.3-76.63.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009743488" comment="xorg-x11-server-7.6_1.18.3-76.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743489" comment="xorg-x11-server-extra-7.6_1.18.3-76.63.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153142" version="1" class="patch">
	<metadata>
		<title>Security update for w3m (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1202684" ref_url="https://bugzilla.suse.com/1202684" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-38223" ref_url="https://www.suse.com/security/cve/CVE-2022-38223/" source="CVE"/>
		<description>
This update for w3m fixes the following issues:

- CVE-2022-38223: Fixed a memory safety issue when dumping crafted
  input to standard out (bsc#1202684).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-11"/>
	<updated date="2023-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1202684">SUSE bug 1202684</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38223/">CVE-2022-38223 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38223">CVE-2022-38223 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009731652" comment="w3m-0.5.3.git20161120-161.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153143" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206673" ref_url="https://bugzilla.suse.com/1206673" source="BUGZILLA"/>
		<reference ref_id="1208471" ref_url="https://bugzilla.suse.com/1208471" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40899" ref_url="https://www.suse.com/security/cve/CVE-2022-40899/" source="CVE"/>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2023-24329: Fixed blocklist bypass via the urllib.parse component when supplying a URL that starts with blank characters (bsc#1208471).  
- CVE-2022-40899: Fixed REDoS in http.cookiejar (gh#python/cpython#17157) (bsc#1206673). 
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-08"/>
	<updated date="2023-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206673">SUSE bug 1206673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208471">SUSE bug 1208471</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40899/">CVE-2022-40899 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40899">CVE-2022-40899 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009743191" comment="libpython3_4m1_0-3.4.10-25.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743192" comment="python3-3.4.10-25.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743193" comment="python3-base-3.4.10-25.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743194" comment="python3-curses-3.4.10-25.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743202" comment="python3-devel-3.4.10-25.108.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009743191" comment="libpython3_4m1_0-3.4.10-25.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743192" comment="python3-3.4.10-25.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743193" comment="python3-base-3.4.10-25.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743194" comment="python3-curses-3.4.10-25.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743202" comment="python3-devel-3.4.10-25.108.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153144" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204425" ref_url="https://bugzilla.suse.com/1204425" source="BUGZILLA"/>
		<reference ref_id="1208881" ref_url="https://bugzilla.suse.com/1208881" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3555" ref_url="https://www.suse.com/security/cve/CVE-2022-3555/" source="CVE"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed regression introduced with security update for CVE-2022-3555 (bsc#1204425, bsc#1208881)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-08"/>
	<updated date="2023-03-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204425">SUSE bug 1204425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208881">SUSE bug 1208881</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3555/">CVE-2022-3555 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3555">CVE-2022-3555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009743203" comment="libX11-6-1.6.2-12.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743204" comment="libX11-6-32bit-1.6.2-12.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743133" comment="libX11-data-1.6.2-12.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743205" comment="libX11-xcb1-1.6.2-12.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743206" comment="libX11-xcb1-32bit-1.6.2-12.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153145" version="1" class="patch">
	<metadata>
		<title>Security update for python-py (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1204364" ref_url="https://bugzilla.suse.com/1204364" source="BUGZILLA"/>
		<reference ref_id="1208181" ref_url="https://bugzilla.suse.com/1208181" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42969" ref_url="https://www.suse.com/security/cve/CVE-2022-42969/" source="CVE"/>
		<description>
This update for python-py fixes the following issues:

  Bugfixes:

  - Fixed bugs introduced with the fix for CVE-2022-42969 (bsc#1204364, bsc#1208181).

		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-08"/>
	<updated date="2023-03-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204364">SUSE bug 1204364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208181">SUSE bug 1208181</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42969/">CVE-2022-42969 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42969">CVE-2022-42969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740675" comment="python3-py-1.8.1-11.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153146" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1201627" ref_url="https://bugzilla.suse.com/1201627" source="BUGZILLA"/>
		<reference ref_id="1202062" ref_url="https://bugzilla.suse.com/1202062" source="BUGZILLA"/>
		<reference ref_id="1207533" ref_url="https://bugzilla.suse.com/1207533" source="BUGZILLA"/>
		<reference ref_id="1207534" ref_url="https://bugzilla.suse.com/1207534" source="BUGZILLA"/>
		<reference ref_id="1207536" ref_url="https://bugzilla.suse.com/1207536" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304/" source="CVE"/>
		<reference ref_id="CVE-2023-0215" ref_url="https://www.suse.com/security/cve/CVE-2023-0215/" source="CVE"/>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2023-0286: Fixed X.400 address type confusion in X.509 GeneralNameFixed (bsc#1207533).
- CVE-2023-0215: Fixed a use-after-free following BIO_new_NDEF (bsc#1207536).
- CVE-2022-4304: Fixed a timing oracle in RSA decryption (bsc#1207534).

The following non-security bug were fixed:

- Fix DH key generation in FIPS mode, add support for constant BN for DH parameters (bsc#1202062).
- Update further expiring certificates that affect tests (bsc#1201627).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-09"/>
	<updated date="2023-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201627">SUSE bug 1201627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202062">SUSE bug 1202062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207533">SUSE bug 1207533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207534">SUSE bug 1207534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207536">SUSE bug 1207536</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0215/">CVE-2023-0215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0215">CVE-2023-0215 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009743195" comment="libopenssl-devel-1.0.2j-60.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743196" comment="libopenssl1_0_0-1.0.2j-60.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743197" comment="libopenssl1_0_0-32bit-1.0.2j-60.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743198" comment="libopenssl1_0_0-hmac-1.0.2j-60.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743199" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743200" comment="openssl-1.0.2j-60.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743201" comment="openssl-doc-1.0.2j-60.86.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009743195" comment="libopenssl-devel-1.0.2j-60.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743196" comment="libopenssl1_0_0-1.0.2j-60.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743197" comment="libopenssl1_0_0-32bit-1.0.2j-60.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743198" comment="libopenssl1_0_0-hmac-1.0.2j-60.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743199" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743200" comment="openssl-1.0.2j-60.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743201" comment="openssl-doc-1.0.2j-60.86.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153147" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208513" ref_url="https://bugzilla.suse.com/1208513" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-24998" ref_url="https://www.suse.com/security/cve/CVE-2023-24998/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2023-24998: Fixed FileUpload DoS with excessive parts (bsc#1208513).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-10"/>
	<updated date="2023-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208513">SUSE bug 1208513</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24998/">CVE-2023-24998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24998">CVE-2023-24998 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009742918" comment="tomcat-8.0.53-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742919" comment="tomcat-admin-webapps-8.0.53-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742920" comment="tomcat-docs-webapp-8.0.53-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742921" comment="tomcat-el-3_0-api-8.0.53-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742922" comment="tomcat-javadoc-8.0.53-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742923" comment="tomcat-jsp-2_3-api-8.0.53-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742924" comment="tomcat-lib-8.0.53-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742925" comment="tomcat-servlet-3_1-api-8.0.53-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742926" comment="tomcat-webapps-8.0.53-29.63.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009742918" comment="tomcat-8.0.53-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742919" comment="tomcat-admin-webapps-8.0.53-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742920" comment="tomcat-docs-webapp-8.0.53-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742921" comment="tomcat-el-3_0-api-8.0.53-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742922" comment="tomcat-javadoc-8.0.53-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742923" comment="tomcat-jsp-2_3-api-8.0.53-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742924" comment="tomcat-lib-8.0.53-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742925" comment="tomcat-servlet-3_1-api-8.0.53-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742926" comment="tomcat-webapps-8.0.53-29.63.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153148" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-fileupload (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208513" ref_url="https://bugzilla.suse.com/1208513" source="BUGZILLA"/>
		<reference ref_id="986359" ref_url="https://bugzilla.suse.com/986359" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3092" ref_url="https://www.suse.com/security/cve/CVE-2016-3092/" source="CVE"/>
		<reference ref_id="CVE-2023-24998" ref_url="https://www.suse.com/security/cve/CVE-2023-24998/" source="CVE"/>
		<description>
This update for jakarta-commons-fileupload fixes the following issues:

- CVE-2016-3092: Fixed a usage of vulnerable FileUpload package can result in denial of service (bsc#986359). 
- CVE-2023-24998: Fixed a FileUpload deny of service with excessive parts (bsc#1208513).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-16"/>
	<updated date="2023-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208513">SUSE bug 1208513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986359">SUSE bug 986359</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3092/">CVE-2016-3092 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3092">CVE-2016-3092 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24998/">CVE-2023-24998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24998">CVE-2023-24998 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009743908" comment="jakarta-commons-fileupload-1.1.1-122.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743909" comment="jakarta-commons-fileupload-javadoc-1.1.1-122.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009743908" comment="jakarta-commons-fileupload-1.1.1-122.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743909" comment="jakarta-commons-fileupload-javadoc-1.1.1-122.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153149" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Net-Server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="808830" ref_url="https://bugzilla.suse.com/808830" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1841" ref_url="https://www.suse.com/security/cve/CVE-2013-1841/" source="CVE"/>
		<description>
This update for perl-Net-Server fixes the following issues:

- CVE-2013-1841: Fixed insufficient hostname access checking (bsc#808830).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-16"/>
	<updated date="2023-03-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/808830">SUSE bug 808830</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1841/">CVE-2013-1841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1841">CVE-2013-1841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743734" comment="perl-Net-Server-2.007-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153150" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206673" ref_url="https://bugzilla.suse.com/1206673" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40899" ref_url="https://www.suse.com/security/cve/CVE-2022-40899/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2022-40899: Fixed an issue that could allow attackers to cause
  an excessive CPU usage via a crafted Set-Cookie header (bsc#1206673).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-12"/>
	<updated date="2023-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206673">SUSE bug 1206673</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40899/">CVE-2022-40899 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40899">CVE-2022-40899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009731165" comment="libpython3_4m1_0-3.4.10-25.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009731166" comment="python3-3.4.10-25.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009731167" comment="python3-base-3.4.10-25.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009731168" comment="python3-curses-3.4.10-25.105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153151" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1207780" ref_url="https://bugzilla.suse.com/1207780" source="BUGZILLA"/>
		<reference ref_id="1208828" ref_url="https://bugzilla.suse.com/1208828" source="BUGZILLA"/>
		<reference ref_id="1208957" ref_url="https://bugzilla.suse.com/1208957" source="BUGZILLA"/>
		<reference ref_id="1208959" ref_url="https://bugzilla.suse.com/1208959" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0512" ref_url="https://www.suse.com/security/cve/CVE-2023-0512/" source="CVE"/>
		<reference ref_id="CVE-2023-1127" ref_url="https://www.suse.com/security/cve/CVE-2023-1127/" source="CVE"/>
		<reference ref_id="CVE-2023-1170" ref_url="https://www.suse.com/security/cve/CVE-2023-1170/" source="CVE"/>
		<reference ref_id="CVE-2023-1175" ref_url="https://www.suse.com/security/cve/CVE-2023-1175/" source="CVE"/>
		<description>
This update for vim fixes the following issues:


- CVE-2023-0512: Fixed a divide By Zero (bsc#1207780).
- CVE-2023-1175: vim: an incorrect calculation of buffer size (bsc#1208957).
- CVE-2023-1170: Fixed a heap-based Buffer Overflow (bsc#1208959).
- CVE-2023-1127: Fixed divide by zero in scrolldown() (bsc#1208828).

Updated to version 9.0 with patch level 1386.

- https://github.com/vim/vim/compare/v9.0.1234...v9.0.1386
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-16"/>
	<updated date="2023-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207780">SUSE bug 1207780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208828">SUSE bug 1208828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208957">SUSE bug 1208957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208959">SUSE bug 1208959</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0512/">CVE-2023-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0512">CVE-2023-0512 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1127/">CVE-2023-1127 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1127">CVE-2023-1127 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1170/">CVE-2023-1170 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1170">CVE-2023-1170 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1175/">CVE-2023-1175 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1175">CVE-2023-1175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009744458" comment="gvim-9.0.1386-17.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744459" comment="vim-9.0.1386-17.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744353" comment="vim-data-9.0.1386-17.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744354" comment="vim-data-common-9.0.1386-17.15.4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009744458" comment="gvim-9.0.1386-17.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744459" comment="vim-9.0.1386-17.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744353" comment="vim-data-9.0.1386-17.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744354" comment="vim-data-common-9.0.1386-17.15.4 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153152" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209173" ref_url="https://bugzilla.suse.com/1209173" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-25748" ref_url="https://www.suse.com/security/cve/CVE-2023-25748/" source="CVE"/>
		<reference ref_id="CVE-2023-25749" ref_url="https://www.suse.com/security/cve/CVE-2023-25749/" source="CVE"/>
		<reference ref_id="CVE-2023-25750" ref_url="https://www.suse.com/security/cve/CVE-2023-25750/" source="CVE"/>
		<reference ref_id="CVE-2023-25751" ref_url="https://www.suse.com/security/cve/CVE-2023-25751/" source="CVE"/>
		<reference ref_id="CVE-2023-25752" ref_url="https://www.suse.com/security/cve/CVE-2023-25752/" source="CVE"/>
		<reference ref_id="CVE-2023-28159" ref_url="https://www.suse.com/security/cve/CVE-2023-28159/" source="CVE"/>
		<reference ref_id="CVE-2023-28160" ref_url="https://www.suse.com/security/cve/CVE-2023-28160/" source="CVE"/>
		<reference ref_id="CVE-2023-28161" ref_url="https://www.suse.com/security/cve/CVE-2023-28161/" source="CVE"/>
		<reference ref_id="CVE-2023-28162" ref_url="https://www.suse.com/security/cve/CVE-2023-28162/" source="CVE"/>
		<reference ref_id="CVE-2023-28163" ref_url="https://www.suse.com/security/cve/CVE-2023-28163/" source="CVE"/>
		<reference ref_id="CVE-2023-28164" ref_url="https://www.suse.com/security/cve/CVE-2023-28164/" source="CVE"/>
		<reference ref_id="CVE-2023-28176" ref_url="https://www.suse.com/security/cve/CVE-2023-28176/" source="CVE"/>
		<reference ref_id="CVE-2023-28177" ref_url="https://www.suse.com/security/cve/CVE-2023-28177/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to version 102.9.0 ESR (bsc#1209173):
    
- CVE-2023-28159: Fullscreen Notification could have been hidden by download popups on Android
- CVE-2023-25748: Fullscreen Notification could have been hidden by window prompts on Android
- CVE-2023-25749: Firefox for Android may have opened third-party apps without a prompt
- CVE-2023-25750: Potential ServiceWorker cache leak during private browsing mode
- CVE-2023-25751: Incorrect code generation during JIT compilation
- CVE-2023-28160: Redirect to Web Extension files may have leaked local path
- CVE-2023-28164: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation
- CVE-2023-28161: One-time permissions granted to a local file were extended to other local files loaded in the same tab
- CVE-2023-28162: Invalid downcast in Worklets
- CVE-2023-25752: Potential out-of-bounds when accessing throttled streams
- CVE-2023-28163: Windows Save As dialog resolved environment variables
- CVE-2023-28176: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9
- CVE-2023-28177: Memory safety bugs fixed in Firefox 111
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-16"/>
	<updated date="2023-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1209173">SUSE bug 1209173</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25748/">CVE-2023-25748 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25748">CVE-2023-25748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25749/">CVE-2023-25749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25749">CVE-2023-25749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25750/">CVE-2023-25750 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25750">CVE-2023-25750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25751/">CVE-2023-25751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25751">CVE-2023-25751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25752/">CVE-2023-25752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25752">CVE-2023-25752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28159/">CVE-2023-28159 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28159">CVE-2023-28159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28160/">CVE-2023-28160 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28160">CVE-2023-28160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28161/">CVE-2023-28161 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28161">CVE-2023-28161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28162/">CVE-2023-28162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28162">CVE-2023-28162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28163/">CVE-2023-28163 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28163">CVE-2023-28163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28164/">CVE-2023-28164 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28164">CVE-2023-28164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28176/">CVE-2023-28176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28176">CVE-2023-28176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28177/">CVE-2023-28177 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28177">CVE-2023-28177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009744670" comment="MozillaFirefox-102.9.0-112.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744671" comment="MozillaFirefox-devel-102.9.0-112.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744672" comment="MozillaFirefox-translations-common-102.9.0-112.153.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009744670" comment="MozillaFirefox-102.9.0-112.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744671" comment="MozillaFirefox-devel-102.9.0-112.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744672" comment="MozillaFirefox-translations-common-102.9.0-112.153.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153153" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1094725" ref_url="https://bugzilla.suse.com/1094725" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1172380" ref_url="https://bugzilla.suse.com/1172380" source="BUGZILLA"/>
		<reference ref_id="1172382" ref_url="https://bugzilla.suse.com/1172382" source="BUGZILLA"/>
		<reference ref_id="1172383" ref_url="https://bugzilla.suse.com/1172383" source="BUGZILLA"/>
		<reference ref_id="1172385" ref_url="https://bugzilla.suse.com/1172385" source="BUGZILLA"/>
		<reference ref_id="1172386" ref_url="https://bugzilla.suse.com/1172386" source="BUGZILLA"/>
		<reference ref_id="1173612" ref_url="https://bugzilla.suse.com/1173612" source="BUGZILLA"/>
		<reference ref_id="1174386" ref_url="https://bugzilla.suse.com/1174386" source="BUGZILLA"/>
		<reference ref_id="1174641" ref_url="https://bugzilla.suse.com/1174641" source="BUGZILLA"/>
		<reference ref_id="1175144" ref_url="https://bugzilla.suse.com/1175144" source="BUGZILLA"/>
		<reference ref_id="1175441" ref_url="https://bugzilla.suse.com/1175441" source="BUGZILLA"/>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1176673" ref_url="https://bugzilla.suse.com/1176673" source="BUGZILLA"/>
		<reference ref_id="1176681" ref_url="https://bugzilla.suse.com/1176681" source="BUGZILLA"/>
		<reference ref_id="1176682" ref_url="https://bugzilla.suse.com/1176682" source="BUGZILLA"/>
		<reference ref_id="1176684" ref_url="https://bugzilla.suse.com/1176684" source="BUGZILLA"/>
		<reference ref_id="1178174" ref_url="https://bugzilla.suse.com/1178174" source="BUGZILLA"/>
		<reference ref_id="1178683" ref_url="https://bugzilla.suse.com/1178683" source="BUGZILLA"/>
		<reference ref_id="1178934" ref_url="https://bugzilla.suse.com/1178934" source="BUGZILLA"/>
		<reference ref_id="1178935" ref_url="https://bugzilla.suse.com/1178935" source="BUGZILLA"/>
		<reference ref_id="1179467" ref_url="https://bugzilla.suse.com/1179467" source="BUGZILLA"/>
		<reference ref_id="1179468" ref_url="https://bugzilla.suse.com/1179468" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1180432" ref_url="https://bugzilla.suse.com/1180432" source="BUGZILLA"/>
		<reference ref_id="1180433" ref_url="https://bugzilla.suse.com/1180433" source="BUGZILLA"/>
		<reference ref_id="1180434" ref_url="https://bugzilla.suse.com/1180434" source="BUGZILLA"/>
		<reference ref_id="1180435" ref_url="https://bugzilla.suse.com/1180435" source="BUGZILLA"/>
		<reference ref_id="1180523" ref_url="https://bugzilla.suse.com/1180523" source="BUGZILLA"/>
		<reference ref_id="1181108" ref_url="https://bugzilla.suse.com/1181108" source="BUGZILLA"/>
		<reference ref_id="1181639" ref_url="https://bugzilla.suse.com/1181639" source="BUGZILLA"/>
		<reference ref_id="1181933" ref_url="https://bugzilla.suse.com/1181933" source="BUGZILLA"/>
		<reference ref_id="1182425" ref_url="https://bugzilla.suse.com/1182425" source="BUGZILLA"/>
		<reference ref_id="1182577" ref_url="https://bugzilla.suse.com/1182577" source="BUGZILLA"/>
		<reference ref_id="1182651" ref_url="https://bugzilla.suse.com/1182651" source="BUGZILLA"/>
		<reference ref_id="1182846" ref_url="https://bugzilla.suse.com/1182846" source="BUGZILLA"/>
		<reference ref_id="1182968" ref_url="https://bugzilla.suse.com/1182968" source="BUGZILLA"/>
		<reference ref_id="1182975" ref_url="https://bugzilla.suse.com/1182975" source="BUGZILLA"/>
		<reference ref_id="1185000" ref_url="https://bugzilla.suse.com/1185000" source="BUGZILLA"/>
		<reference ref_id="1186012" ref_url="https://bugzilla.suse.com/1186012" source="BUGZILLA"/>
		<reference ref_id="1187364" ref_url="https://bugzilla.suse.com/1187364" source="BUGZILLA"/>
		<reference ref_id="1187365" ref_url="https://bugzilla.suse.com/1187365" source="BUGZILLA"/>
		<reference ref_id="1187366" ref_url="https://bugzilla.suse.com/1187366" source="BUGZILLA"/>
		<reference ref_id="1187367" ref_url="https://bugzilla.suse.com/1187367" source="BUGZILLA"/>
		<reference ref_id="1187529" ref_url="https://bugzilla.suse.com/1187529" source="BUGZILLA"/>
		<reference ref_id="1189145" ref_url="https://bugzilla.suse.com/1189145" source="BUGZILLA"/>
		<reference ref_id="1189702" ref_url="https://bugzilla.suse.com/1189702" source="BUGZILLA"/>
		<reference ref_id="1189938" ref_url="https://bugzilla.suse.com/1189938" source="BUGZILLA"/>
		<reference ref_id="1192463" ref_url="https://bugzilla.suse.com/1192463" source="BUGZILLA"/>
		<reference ref_id="1193880" ref_url="https://bugzilla.suse.com/1193880" source="BUGZILLA"/>
		<reference ref_id="1198035" ref_url="https://bugzilla.suse.com/1198035" source="BUGZILLA"/>
		<reference ref_id="1198037" ref_url="https://bugzilla.suse.com/1198037" source="BUGZILLA"/>
		<reference ref_id="1198038" ref_url="https://bugzilla.suse.com/1198038" source="BUGZILLA"/>
		<reference ref_id="1198712" ref_url="https://bugzilla.suse.com/1198712" source="BUGZILLA"/>
		<reference ref_id="1205808" ref_url="https://bugzilla.suse.com/1205808" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756/" source="CVE"/>
		<reference ref_id="CVE-2020-11947" ref_url="https://www.suse.com/security/cve/CVE-2020-11947/" source="CVE"/>
		<reference ref_id="CVE-2020-12829" ref_url="https://www.suse.com/security/cve/CVE-2020-12829/" source="CVE"/>
		<reference ref_id="CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362/" source="CVE"/>
		<reference ref_id="CVE-2020-13659" ref_url="https://www.suse.com/security/cve/CVE-2020-13659/" source="CVE"/>
		<reference ref_id="CVE-2020-13754" ref_url="https://www.suse.com/security/cve/CVE-2020-13754/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-15469" ref_url="https://www.suse.com/security/cve/CVE-2020-15469/" source="CVE"/>
		<reference ref_id="CVE-2020-15863" ref_url="https://www.suse.com/security/cve/CVE-2020-15863/" source="CVE"/>
		<reference ref_id="CVE-2020-16092" ref_url="https://www.suse.com/security/cve/CVE-2020-16092/" source="CVE"/>
		<reference ref_id="CVE-2020-17380" ref_url="https://www.suse.com/security/cve/CVE-2020-17380/" source="CVE"/>
		<reference ref_id="CVE-2020-25084" ref_url="https://www.suse.com/security/cve/CVE-2020-25084/" source="CVE"/>
		<reference ref_id="CVE-2020-25085" ref_url="https://www.suse.com/security/cve/CVE-2020-25085/" source="CVE"/>
		<reference ref_id="CVE-2020-25624" ref_url="https://www.suse.com/security/cve/CVE-2020-25624/" source="CVE"/>
		<reference ref_id="CVE-2020-25625" ref_url="https://www.suse.com/security/cve/CVE-2020-25625/" source="CVE"/>
		<reference ref_id="CVE-2020-25707" ref_url="https://www.suse.com/security/cve/CVE-2020-25707/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-27617" ref_url="https://www.suse.com/security/cve/CVE-2020-27617/" source="CVE"/>
		<reference ref_id="CVE-2020-28916" ref_url="https://www.suse.com/security/cve/CVE-2020-28916/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29443" ref_url="https://www.suse.com/security/cve/CVE-2020-29443/" source="CVE"/>
		<reference ref_id="CVE-2020-35503" ref_url="https://www.suse.com/security/cve/CVE-2020-35503/" source="CVE"/>
		<reference ref_id="CVE-2020-35504" ref_url="https://www.suse.com/security/cve/CVE-2020-35504/" source="CVE"/>
		<reference ref_id="CVE-2020-35505" ref_url="https://www.suse.com/security/cve/CVE-2020-35505/" source="CVE"/>
		<reference ref_id="CVE-2020-35506" ref_url="https://www.suse.com/security/cve/CVE-2020-35506/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="CVE-2021-20203" ref_url="https://www.suse.com/security/cve/CVE-2021-20203/" source="CVE"/>
		<reference ref_id="CVE-2021-20221" ref_url="https://www.suse.com/security/cve/CVE-2021-20221/" source="CVE"/>
		<reference ref_id="CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-3409" ref_url="https://www.suse.com/security/cve/CVE-2021-3409/" source="CVE"/>
		<reference ref_id="CVE-2021-3416" ref_url="https://www.suse.com/security/cve/CVE-2021-3416/" source="CVE"/>
		<reference ref_id="CVE-2021-3419" ref_url="https://www.suse.com/security/cve/CVE-2021-3419/" source="CVE"/>
		<reference ref_id="CVE-2021-3507" ref_url="https://www.suse.com/security/cve/CVE-2021-3507/" source="CVE"/>
		<reference ref_id="CVE-2021-3527" ref_url="https://www.suse.com/security/cve/CVE-2021-3527/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3593" ref_url="https://www.suse.com/security/cve/CVE-2021-3593/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<reference ref_id="CVE-2021-3682" ref_url="https://www.suse.com/security/cve/CVE-2021-3682/" source="CVE"/>
		<reference ref_id="CVE-2021-3713" ref_url="https://www.suse.com/security/cve/CVE-2021-3713/" source="CVE"/>
		<reference ref_id="CVE-2021-3748" ref_url="https://www.suse.com/security/cve/CVE-2021-3748/" source="CVE"/>
		<reference ref_id="CVE-2021-3929" ref_url="https://www.suse.com/security/cve/CVE-2021-3929/" source="CVE"/>
		<reference ref_id="CVE-2021-4206" ref_url="https://www.suse.com/security/cve/CVE-2021-4206/" source="CVE"/>
		<reference ref_id="CVE-2021-4207" ref_url="https://www.suse.com/security/cve/CVE-2021-4207/" source="CVE"/>
		<reference ref_id="CVE-2022-0216" ref_url="https://www.suse.com/security/cve/CVE-2022-0216/" source="CVE"/>
		<reference ref_id="CVE-2022-26354" ref_url="https://www.suse.com/security/cve/CVE-2022-26354/" source="CVE"/>
		<reference ref_id="CVE-2022-4144" ref_url="https://www.suse.com/security/cve/CVE-2022-4144/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:
    
- bsc#1198038 (CVE-2022-0216)

- bsc#1193880 (CVE-2021-3929)

- bsc#1198712 (CVE-2022-26354)

- bsc#1198037 (CVE-2021-4207)

- bsc#1205808 (CVE-2022-4144), bsc#1185000
  (CVE-2021-3507)

- bsc#1198035 (CVE-2021-4206)

- Fix: kvm,qemu: heap buffer overflow in sdhci_sdma_transfer_multi_blocks()
  in hw/sd/sdhci.c (bsc#1175144, CVE-2020-17380, CVE-2020-25085, CVE-2021-3409)

- kvm,qemu: sdhci: out-of-bounds access issue while doing multi block SDMA
  (bsc#1176681, CVE-2020-25085)

- Amend .changes file: avoid declaring a still unfixed CVE, as
  fixed (bsc#1187529) 

- the build breaks caused by binutils update
  (bsc#1192463)

- out-of-bounds write in UAS (USB Attached SCSI) device emulation
  (bsc#1189702, CVE-2021-3713)
- heap use-after-free in virtio_net_receive_rcu
  (bsc#1189938, CVE-2021-3748)

- usbredir: free call on invalid pointer in bufp_alloc
  (bsc#1189145, CVE-2021-3682)

- NULL pointer dereference issue in megasas-gen2 host bus adapter
  (bsc#1180432, CVE-2020-35503)
- eepro100: stack overflow via infinite recursion
  (bsc#1182651, CVE-2021-20255)
- usb: unbounded stack allocation in usbredir
  (bsc#1186012, CVE-2021-3527)

- NULL pointer dereference in ESP
  (bsc#1180433, CVE-2020-35504)
  (bsc#1180434, CVE-2020-35505)
  (bsc#1180435, CVE-2020-35506)

- bsc#1187366, CVE-2021-3595

- bsc#1187364, CVE-2021-3592
- bsc#1187367, CVE-2021-3594
- bsc#1187365, CVE-2021-3593

- intel-hda segmentation fault due to stack overflow
  (bsc#1187529)

- OOB access during mmio operations
  (CVE-2020-13754, bsc#1172382)

- out-of-bounds read information disclosure in icmp6_send_echoreply
  (CVE-2020-10756, bsc#1172380)
- out-of-bound heap buffer access via an interrupt ID field
  (CVE-2021-20221, bsc#1181933)

- (CVE-2019-15890, bsc#1149813, CVE-2020-8608, bsc#1163019,
  CVE-2020-14364, bsc#1175534, CVE-2020-25707, bsc#1178683,
  CVE-2020-25723, bsc#1178935, CVE-2020-29130, bsc#1179477, 
  CVE-2021-20257, bsc#1182846, CVE-2021-3419, bsc#1182975,
  bsc#1094725)

- OOB access in sm501 device emulation (CVE-2020-12829, bsc#1172385)
- OOB access possibility in MegaRAID SAS 8708EM2 emulation
  (CVE-2020-13362 bsc#1172383)
- use-after-free in usb xhci packet handling (CVE-2020-25723,
  bsc#1178934)
- use-after-free in usb ehci packet handling (CVE-2020-25084,
  bsc#1176673)
- OOB access in usb hcd-ohci emulation (CVE-2020-25624,
  bsc#1176682)
- infinite loop (DoS) in usb hcd-ohci emulation
  (CVE-2020-25625, bsc#1176684)
- guest triggerable assert in shared network
  handling code (CVE-2020-27617, bsc#1178174)
- infinite loop (DoS) in e1000e device emulation
  (CVE-2020-28916, bsc#1179468)
- OOB access in atapi emulation (CVE-2020-29443, bsc#1181108)
- null pointer deref. (DoS) in mmio ops (CVE-2020-15469,
  bsc#1173612)
- infinite loop (DoS) in e1000 device emulation
  (CVE-2021-20257, bsc#1182577)
- OOB access (stack overflow) in rtl8139 NIC emulation
  (CVE-2021-3416, bsc#1182968)
- OOB access (stack overflow) in other NIC emulations
  (CVE-2021-3416)
- OOB access in SLIRP ARP packet processing
  (CVE-2020-29130, bsc#1179467)
- null pointer dereference possibility (DoS) in MegaRAID SAS
  8708EM2 emulation (CVE-2020-13659 bsc#1172386
- OOB access in iscsi (CVE-2020-11947 bsc#1180523)
- OOB access in vmxnet3 emulation (CVE-2021-20203 bsc#1181639)
- buffer overflow in the XGMAC device (CVE-2020-15863
  bsc#1174386)
- DoS in packet processing of various emulated NICs
  (CVE-2020-16092 bsc#1174641)
- OOB access while processing USB packets (CVE-2020-14364
  bsc#1175441)
- package scripts to not use hard coded paths for temporary
  working directories and log files (bsc#1182425)

- bsc#1198038 (CVE-2022-0216)


- bsc#1193880 (CVE-2021-3929)

- bsc#1198712 (CVE-2022-26354)

- bsc#1198037 (CVE-2021-4207)

- bsc#1205808 (CVE-2022-4144), bsc#1185000
  (CVE-2021-3507)

- bsc#1198035 (CVE-2021-4206)

- kvm,qemu: heap buffer overflow in sdhci_sdma_transfer_multi_blocks()
  in hw/sd/sdhci.c (bsc#1175144, CVE-2020-17380, CVE-2020-25085, CVE-2021-3409)

- kvm,qemu: sdhci: out-of-bounds access issue while doing multi block SDMA
  (bsc#1176681, CVE-2020-25085)

- Add missing patches, as compared to the qemu package (bsc#1192463):

- bsc#1198038 (CVE-2022-0216)

- bsc#1193880 (CVE-2021-3929)

- bsc#1198712 (CVE-2022-26354)

- bsc#1198037 (CVE-2021-4207)

- bsc#1205808 (CVE-2022-4144), bsc#1185000
  (CVE-2021-3507)

- bsc#1198035( CVE-2021-4206)

- kvm,qemu: heap buffer overflow in sdhci_sdma_transfer_multi_blocks()
  in hw/sd/sdhci.c (bsc#1175144, CVE-2020-17380, CVE-2020-25085, CVE-2021-3409)

- kvm,qemu: sdhci: out-of-bounds access issue while doing multi block SDMA
  (bsc#1176681, CVE-2020-25085)

- Amend .changes file: avoid declaring a still unfixed CVE, as
  fixed (bsc#1187529) 

- the build breaks caused by binutils update
  (bsc#1192463)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-16"/>
	<updated date="2023-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1094725">SUSE bug 1094725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172380">SUSE bug 1172380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172382">SUSE bug 1172382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172383">SUSE bug 1172383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172385">SUSE bug 1172385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172386">SUSE bug 1172386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173612">SUSE bug 1173612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174386">SUSE bug 1174386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174641">SUSE bug 1174641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175144">SUSE bug 1175144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175441">SUSE bug 1175441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176673">SUSE bug 1176673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176681">SUSE bug 1176681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176682">SUSE bug 1176682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176684">SUSE bug 1176684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178174">SUSE bug 1178174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178683">SUSE bug 1178683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178934">SUSE bug 1178934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178935">SUSE bug 1178935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179468">SUSE bug 1179468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180432">SUSE bug 1180432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180433">SUSE bug 1180433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180434">SUSE bug 1180434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180435">SUSE bug 1180435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180523">SUSE bug 1180523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181108">SUSE bug 1181108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181639">SUSE bug 1181639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181933">SUSE bug 1181933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182425">SUSE bug 1182425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182577">SUSE bug 1182577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182651">SUSE bug 1182651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182968">SUSE bug 1182968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182975">SUSE bug 1182975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185000">SUSE bug 1185000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186012">SUSE bug 1186012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187365">SUSE bug 1187365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187366">SUSE bug 1187366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187529">SUSE bug 1187529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189145">SUSE bug 1189145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189702">SUSE bug 1189702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189938">SUSE bug 1189938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192463">SUSE bug 1192463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193880">SUSE bug 1193880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198035">SUSE bug 1198035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198037">SUSE bug 1198037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198038">SUSE bug 1198038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198712">SUSE bug 1198712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205808">SUSE bug 1205808</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10756">CVE-2020-10756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11947/">CVE-2020-11947 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11947">CVE-2020-11947 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12829/">CVE-2020-12829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12829">CVE-2020-12829 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13362">CVE-2020-13362 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13659/">CVE-2020-13659 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13659">CVE-2020-13659 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13754/">CVE-2020-13754 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13754">CVE-2020-13754 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15469/">CVE-2020-15469 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15469">CVE-2020-15469 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15863/">CVE-2020-15863 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15863">CVE-2020-15863 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16092/">CVE-2020-16092 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16092">CVE-2020-16092 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-17380/">CVE-2020-17380 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17380">CVE-2020-17380 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25084/">CVE-2020-25084 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25084">CVE-2020-25084 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25085/">CVE-2020-25085 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25085">CVE-2020-25085 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25624/">CVE-2020-25624 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25624">CVE-2020-25624 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25625/">CVE-2020-25625 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25625">CVE-2020-25625 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25707/">CVE-2020-25707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-25707">CVE-2020-25707 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25723">CVE-2020-25723 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27617/">CVE-2020-27617 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27617">CVE-2020-27617 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28916/">CVE-2020-28916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28916">CVE-2020-28916 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29443/">CVE-2020-29443 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29443">CVE-2020-29443 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35503/">CVE-2020-35503 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35503">CVE-2020-35503 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35504/">CVE-2020-35504 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35504">CVE-2020-35504 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35505/">CVE-2020-35505 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35505">CVE-2020-35505 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-35506/">CVE-2020-35506 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35506">CVE-2020-35506 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20203/">CVE-2021-20203 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20203">CVE-2021-20203 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20221/">CVE-2021-20221 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20221">CVE-2021-20221 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20255">CVE-2021-20255 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3409/">CVE-2021-3409 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3409">CVE-2021-3409 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3416/">CVE-2021-3416 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3416">CVE-2021-3416 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3419/">CVE-2021-3419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3419">CVE-2021-3419 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3507/">CVE-2021-3507 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3507">CVE-2021-3507 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3527/">CVE-2021-3527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3527">CVE-2021-3527 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3593/">CVE-2021-3593 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3593">CVE-2021-3593 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3595">CVE-2021-3595 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3682/">CVE-2021-3682 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3682">CVE-2021-3682 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3713/">CVE-2021-3713 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3713">CVE-2021-3713 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3748/">CVE-2021-3748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3748">CVE-2021-3748 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3929/">CVE-2021-3929 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3929">CVE-2021-3929 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4206/">CVE-2021-4206 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4206">CVE-2021-4206 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4207/">CVE-2021-4207 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4207">CVE-2021-4207 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0216/">CVE-2022-0216 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0216">CVE-2022-0216 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-26354/">CVE-2022-26354 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26354">CVE-2022-26354 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4144/">CVE-2022-4144 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4144">CVE-2022-4144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009744003" comment="qemu-2.9.1-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744004" comment="qemu-block-curl-2.9.1-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744005" comment="qemu-block-iscsi-2.9.1-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744006" comment="qemu-block-rbd-2.9.1-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744007" comment="qemu-block-ssh-2.9.1-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744008" comment="qemu-guest-agent-2.9.1-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744009" comment="qemu-ipxe-1.0.0+-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744010" comment="qemu-kvm-2.9.1-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744011" comment="qemu-lang-2.9.1-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744012" comment="qemu-seabios-1.10.2_0_g5f4c7b1-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744013" comment="qemu-sgabios-8-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744014" comment="qemu-tools-2.9.1-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744015" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744016" comment="qemu-x86-2.9.1-43.65.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009744003" comment="qemu-2.9.1-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744004" comment="qemu-block-curl-2.9.1-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744005" comment="qemu-block-iscsi-2.9.1-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744006" comment="qemu-block-rbd-2.9.1-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744007" comment="qemu-block-ssh-2.9.1-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744008" comment="qemu-guest-agent-2.9.1-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744009" comment="qemu-ipxe-1.0.0+-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744010" comment="qemu-kvm-2.9.1-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744011" comment="qemu-lang-2.9.1-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744012" comment="qemu-seabios-1.10.2_0_g5f4c7b1-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744013" comment="qemu-sgabios-8-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744014" comment="qemu-tools-2.9.1-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744015" comment="qemu-vgabios-1.10.2_0_g5f4c7b1-43.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744016" comment="qemu-x86-2.9.1-43.65.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153154" version="1" class="patch">
	<metadata>
		<title>Security update for python-future (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206673" ref_url="https://bugzilla.suse.com/1206673" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40899" ref_url="https://www.suse.com/security/cve/CVE-2022-40899/" source="CVE"/>
		<description>
This update for python-future fixes the following issues:

- CVE-2022-40899: Fixed an issue that could allow attackers to cause
  an excessive CPU usage via a crafted Set-Cookie header (bsc#1206673).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-12"/>
	<updated date="2023-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206673">SUSE bug 1206673</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40899/">CVE-2022-40899 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40899">CVE-2022-40899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009731149" comment="python-future-0.15.2-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153155" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208708" ref_url="https://bugzilla.suse.com/1208708" source="BUGZILLA"/>
		<reference ref_id="1209047" ref_url="https://bugzilla.suse.com/1209047" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-25690" ref_url="https://www.suse.com/security/cve/CVE-2023-25690/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2023-25690: Fixed HTTP request splitting with mod_rewrite and mod_proxy (bsc#1209047).
  
The following non-security bugs were fixed:
  
- Fixed passing health check does not recover worker from its error state (bsc#1208708).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-20"/>
	<updated date="2023-03-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208708">SUSE bug 1208708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209047">SUSE bug 1209047</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-25690/">CVE-2023-25690 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25690">CVE-2023-25690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009744899" comment="apache2-2.4.23-29.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744894" comment="apache2-doc-2.4.23-29.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744900" comment="apache2-example-pages-2.4.23-29.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744901" comment="apache2-prefork-2.4.23-29.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744902" comment="apache2-utils-2.4.23-29.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744903" comment="apache2-worker-2.4.23-29.97.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009744899" comment="apache2-2.4.23-29.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744894" comment="apache2-doc-2.4.23-29.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744900" comment="apache2-example-pages-2.4.23-29.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744901" comment="apache2-prefork-2.4.23-29.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744902" comment="apache2-utils-2.4.23-29.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744903" comment="apache2-worker-2.4.23-29.97.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153156" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209209" ref_url="https://bugzilla.suse.com/1209209" source="BUGZILLA"/>
		<reference ref_id="1209210" ref_url="https://bugzilla.suse.com/1209210" source="BUGZILLA"/>
		<reference ref_id="1209211" ref_url="https://bugzilla.suse.com/1209211" source="BUGZILLA"/>
		<reference ref_id="1209212" ref_url="https://bugzilla.suse.com/1209212" source="BUGZILLA"/>
		<reference ref_id="1209214" ref_url="https://bugzilla.suse.com/1209214" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-27533" ref_url="https://www.suse.com/security/cve/CVE-2023-27533/" source="CVE"/>
		<reference ref_id="CVE-2023-27534" ref_url="https://www.suse.com/security/cve/CVE-2023-27534/" source="CVE"/>
		<reference ref_id="CVE-2023-27535" ref_url="https://www.suse.com/security/cve/CVE-2023-27535/" source="CVE"/>
		<reference ref_id="CVE-2023-27536" ref_url="https://www.suse.com/security/cve/CVE-2023-27536/" source="CVE"/>
		<reference ref_id="CVE-2023-27538" ref_url="https://www.suse.com/security/cve/CVE-2023-27538/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2023-27533: Fixed TELNET option IAC injection (bsc#1209209)
- CVE-2023-27534: Fixed SFTP path ~ resolving discrepancy (bsc#1209210)
- CVE-2023-27535: Fixed FTP too eager connection reuse (bsc#1209211)
- CVE-2023-27536: Fixed GSS delegation too eager connection re-use (bsc#1209212)
- CVE-2023-27538: Fixed SSH connection too eager reuse still (bsc#1209214)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-20"/>
	<updated date="2023-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209209">SUSE bug 1209209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209210">SUSE bug 1209210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209211">SUSE bug 1209211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209212">SUSE bug 1209212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209214">SUSE bug 1209214</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-27533/">CVE-2023-27533 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27533">CVE-2023-27533 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-27534/">CVE-2023-27534 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27534">CVE-2023-27534 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27535/">CVE-2023-27535 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27535">CVE-2023-27535 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27536/">CVE-2023-27536 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27536">CVE-2023-27536 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27538/">CVE-2023-27538 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27538">CVE-2023-27538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009747457" comment="curl-7.37.0-37.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747458" comment="libcurl4-7.37.0-37.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747459" comment="libcurl4-32bit-7.37.0-37.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153157" version="1" class="patch">
	<metadata>
		<title>Security update for python-cffi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208036" ref_url="https://bugzilla.suse.com/1208036" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-23931" ref_url="https://www.suse.com/security/cve/CVE-2023-23931/" source="CVE"/>
		<description>
This update for python-cffi fixes the following issues:

  - CVE-2023-23931: Fixed memory corruption due to immutable python object being changed (bsc#1208036).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-21"/>
	<updated date="2023-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1208036">SUSE bug 1208036</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23931/">CVE-2023-23931 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23931">CVE-2023-23931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009741564" comment="python-cffi-1.11.5-5.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009741565" comment="python3-cffi-1.11.5-5.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153158" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209017" ref_url="https://bugzilla.suse.com/1209017" source="BUGZILLA"/>
		<reference ref_id="1209019" ref_url="https://bugzilla.suse.com/1209019" source="BUGZILLA"/>
		<reference ref_id="1209188" ref_url="https://bugzilla.suse.com/1209188" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42331" ref_url="https://www.suse.com/security/cve/CVE-2022-42331/" source="CVE"/>
		<reference ref_id="CVE-2022-42332" ref_url="https://www.suse.com/security/cve/CVE-2022-42332/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-42332: Fixed use-after-free in x86 shadow plus log-dirty mode (bsc#1209017).
- CVE-2022-42331: Fixed speculative vulnerability in 32bit SYSCALL path on x86 (bsc#1209019).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-21"/>
	<updated date="2023-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1209017">SUSE bug 1209017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209019">SUSE bug 1209019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209188">SUSE bug 1209188</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42331/">CVE-2022-42331 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42331">CVE-2022-42331 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42332/">CVE-2022-42332 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42332">CVE-2022-42332 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009747961" comment="xen-4.9.4_38-3.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747962" comment="xen-doc-html-4.9.4_38-3.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747963" comment="xen-libs-4.9.4_38-3.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747964" comment="xen-libs-32bit-4.9.4_38-3.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747965" comment="xen-tools-4.9.4_38-3.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747966" comment="xen-tools-domU-4.9.4_38-3.120.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009747961" comment="xen-4.9.4_38-3.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747962" comment="xen-doc-html-4.9.4_38-3.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747963" comment="xen-libs-4.9.4_38-3.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747964" comment="xen-libs-32bit-4.9.4_38-3.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747965" comment="xen-tools-4.9.4_38-3.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747966" comment="xen-tools-domU-4.9.4_38-3.120.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153159" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209188" ref_url="https://bugzilla.suse.com/1209188" source="BUGZILLA"/>
		<description>

This update of dpdk fixes the following issues:

- rebuild the package with the new secure boot key (bsc#1209188).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-21"/>
	<updated date="2023-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209188">SUSE bug 1209188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009744907" comment="dpdk-16.11.9-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744908" comment="dpdk-kmp-default-16.11.9_k4.4.140_96.112.TDC-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744909" comment="dpdk-tools-16.11.9-11.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153160" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
		</affected>
		<reference ref_id="1209188" ref_url="https://bugzilla.suse.com/1209188" source="BUGZILLA"/>
		<description>

This update of dpdk fixes the following issues:

- rebuild the package with the new secure boot key (bsc#1209188).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-21"/>
	<updated date="2023-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209188">SUSE bug 1209188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009744904" comment="dpdk-16.11.9-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744905" comment="dpdk-kmp-default-16.11.9_k4.4.180_94.185-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744906" comment="dpdk-tools-16.11.9-8.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153161" version="1" class="patch">
	<metadata>
		<title>Security update for libplist (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1208546" ref_url="https://bugzilla.suse.com/1208546" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-10082" ref_url="https://www.suse.com/security/cve/CVE-2015-10082/" source="CVE"/>
		<description>
This update for libplist fixes the following issues:

  - CVE-2015-10082: Fixed XXEsecurity vulnerability with XML plists (bsc#1208546).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-22"/>
	<updated date="2023-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1208546">SUSE bug 1208546</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-10082/">CVE-2015-10082 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-10082">CVE-2015-10082 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742184" comment="libplist3-1.12-20.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153162" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1209188" ref_url="https://bugzilla.suse.com/1209188" source="BUGZILLA"/>
		<description>

This update of grub2 fixes the following issues:

- rebuild the package with the new secure boot key (bsc#1209188).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-23"/>
	<updated date="2023-03-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209188">SUSE bug 1209188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009747410" comment="grub2-2.02-144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747411" comment="grub2-i386-pc-2.02-144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747412" comment="grub2-snapper-plugin-2.02-144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747413" comment="grub2-systemd-sleep-plugin-2.02-144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747414" comment="grub2-x86_64-efi-2.02-144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747415" comment="grub2-x86_64-xen-2.02-144.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009747410" comment="grub2-2.02-144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747411" comment="grub2-i386-pc-2.02-144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747412" comment="grub2-snapper-plugin-2.02-144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747413" comment="grub2-systemd-sleep-plugin-2.02-144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747414" comment="grub2-x86_64-efi-2.02-144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747415" comment="grub2-x86_64-xen-2.02-144.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153163" version="1" class="patch">
	<metadata>
		<title>Security update for python-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1206667" ref_url="https://bugzilla.suse.com/1206667" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40897" ref_url="https://www.suse.com/security/cve/CVE-2022-40897/" source="CVE"/>
		<description>
This update for python-setuptools fixes the following issues:

- CVE-2022-40897: Fixed an excessive CPU usage that could be triggered
  by fetching a malicious HTML document (bsc#1206667).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-17"/>
	<updated date="2023-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206667">SUSE bug 1206667</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40897/">CVE-2022-40897 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40897">CVE-2022-40897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009731786" comment="python-setuptools-40.6.2-4.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009731784" comment="python3-setuptools-40.6.2-4.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153164" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1221850" ref_url="https://bugzilla.suse.com/1221850" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-29944" ref_url="https://www.suse.com/security/cve/CVE-2024-29944/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 115.9.1esr ESR MFSA 2024-16 (bsc#1221850)

- CVE-2024-29944: Privileged JavaScript Execution via Event Handlers (bmo#1886852).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-26"/>
	<updated date="2024-03-26"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1221850">SUSE bug 1221850</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-29944/">CVE-2024-29944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29944">CVE-2024-29944 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009852256" comment="MozillaFirefox-115.9.1-112.206.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852161" comment="MozillaFirefox-devel-115.9.1-112.206.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852257" comment="MozillaFirefox-translations-common-115.9.1-112.206.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009852256" comment="MozillaFirefox-115.9.1-112.206.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852161" comment="MozillaFirefox-devel-115.9.1-112.206.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852257" comment="MozillaFirefox-translations-common-115.9.1-112.206.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153165" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216594" ref_url="https://bugzilla.suse.com/1216594" source="BUGZILLA"/>
		<reference ref_id="1216598" ref_url="https://bugzilla.suse.com/1216598" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38469" ref_url="https://www.suse.com/security/cve/CVE-2023-38469/" source="CVE"/>
		<reference ref_id="CVE-2023-38471" ref_url="https://www.suse.com/security/cve/CVE-2023-38471/" source="CVE"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2023-38471: Fixed reachable assertion in dbus_set_host_name (bsc#1216594).
- CVE-2023-38469: Fixed reachable assertions in avahi (bsc#1216598).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-27"/>
	<updated date="2024-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216594">SUSE bug 1216594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216598">SUSE bug 1216598</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38469/">CVE-2023-38469 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38469">CVE-2023-38469 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38471/">CVE-2023-38471 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38471">CVE-2023-38471 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009852258" comment="avahi-0.6.32-32.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852207" comment="avahi-lang-0.6.32-32.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852259" comment="avahi-utils-0.6.32-32.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852260" comment="libavahi-client3-0.6.32-32.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852261" comment="libavahi-client3-32bit-0.6.32-32.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852262" comment="libavahi-common3-0.6.32-32.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852263" comment="libavahi-common3-32bit-0.6.32-32.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852264" comment="libavahi-core7-0.6.32-32.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852265" comment="libavahi-glib1-0.6.32-32.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852266" comment="libavahi-glib1-32bit-0.6.32-32.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852267" comment="libdns_sd-0.6.32-32.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852268" comment="libdns_sd-32bit-0.6.32-32.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153166" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216715" ref_url="https://bugzilla.suse.com/1216715" source="BUGZILLA"/>
		<reference ref_id="1219960" ref_url="https://bugzilla.suse.com/1219960" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-25111" ref_url="https://www.suse.com/security/cve/CVE-2024-25111/" source="CVE"/>
		<reference ref_id="CVE-2024-25617" ref_url="https://www.suse.com/security/cve/CVE-2024-25617/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2024-25617: Fixes denial of service in HTTP header parser (bsc#1219960)
- CVE-2024-25111: Fixes Chunked Encoding Stack Overflow (bsc#1216715)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2024-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216715">SUSE bug 1216715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219960">SUSE bug 1219960</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25111/">CVE-2024-25111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25111">CVE-2024-25111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25617/">CVE-2024-25617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25617">CVE-2024-25617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853184" comment="squid-4.17-30.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153167" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1221332" ref_url="https://bugzilla.suse.com/1221332" source="BUGZILLA"/>
		<reference ref_id="1221334" ref_url="https://bugzilla.suse.com/1221334" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2024-2193" ref_url="https://www.suse.com/security/cve/CVE-2024-2193/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-28746: Register File Data Sampling (bsc#1221332)
- CVE-2024-2193: Fixed GhostRace, a speculative race conditions. (bsc#1221334)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2024-04-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1221332">SUSE bug 1221332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221334">SUSE bug 1221334</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2193/">CVE-2024-2193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2193">CVE-2024-2193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853185" comment="xen-4.9.4_50-3.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853186" comment="xen-doc-html-4.9.4_50-3.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853187" comment="xen-libs-4.9.4_50-3.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853188" comment="xen-libs-32bit-4.9.4_50-3.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853189" comment="xen-tools-4.9.4_50-3.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853190" comment="xen-tools-domU-4.9.4_50-3.138.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153168" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1221815" ref_url="https://bugzilla.suse.com/1221815" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2494" ref_url="https://www.suse.com/security/cve/CVE-2024-2494/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2024-2494: Fixed negative g_new0 length can lead to unbounded memory allocation (bsc#1221815).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2024-04-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1221815">SUSE bug 1221815</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2494/">CVE-2024-2494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2494">CVE-2024-2494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853191" comment="libvirt-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853192" comment="libvirt-admin-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853193" comment="libvirt-client-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853194" comment="libvirt-daemon-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853195" comment="libvirt-daemon-config-network-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853196" comment="libvirt-daemon-config-nwfilter-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853197" comment="libvirt-daemon-driver-interface-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853198" comment="libvirt-daemon-driver-libxl-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853199" comment="libvirt-daemon-driver-lxc-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853200" comment="libvirt-daemon-driver-network-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853201" comment="libvirt-daemon-driver-nodedev-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853202" comment="libvirt-daemon-driver-nwfilter-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853203" comment="libvirt-daemon-driver-qemu-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853204" comment="libvirt-daemon-driver-secret-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853205" comment="libvirt-daemon-driver-storage-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853206" comment="libvirt-daemon-driver-storage-core-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853207" comment="libvirt-daemon-driver-storage-disk-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853208" comment="libvirt-daemon-driver-storage-iscsi-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853209" comment="libvirt-daemon-driver-storage-logical-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853210" comment="libvirt-daemon-driver-storage-mpath-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853211" comment="libvirt-daemon-driver-storage-rbd-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853212" comment="libvirt-daemon-driver-storage-scsi-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853213" comment="libvirt-daemon-hooks-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853214" comment="libvirt-daemon-lxc-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853215" comment="libvirt-daemon-qemu-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853216" comment="libvirt-daemon-xen-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853217" comment="libvirt-doc-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853218" comment="libvirt-libs-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853219" comment="libvirt-lock-sanlock-3.3.0-5.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853220" comment="libvirt-nss-3.3.0-5.55.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153169" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1220061" ref_url="https://bugzilla.suse.com/1220061" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45918" ref_url="https://www.suse.com/security/cve/CVE-2023-45918/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

- CVE-2023-45918: Fixed NULL pointer dereference via corrupted xterm-256color file (bsc#1220061).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1220061">SUSE bug 1220061</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-45918/">CVE-2023-45918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45918">CVE-2023-45918 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853543" comment="libncurses5-5.9-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853544" comment="libncurses5-32bit-5.9-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853545" comment="libncurses6-5.9-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853546" comment="libncurses6-32bit-5.9-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853547" comment="ncurses-devel-5.9-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853548" comment="ncurses-devel-32bit-5.9-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853549" comment="ncurses-utils-5.9-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853550" comment="tack-5.9-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853551" comment="terminfo-5.9-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853552" comment="terminfo-base-5.9-88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153170" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1220279" ref_url="https://bugzilla.suse.com/1220279" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-25629" ref_url="https://www.suse.com/security/cve/CVE-2024-25629/" source="CVE"/>
		<description>
This update for libcares2 fixes the following issues:

- CVE-2024-25629: Fixed out of bounds read in ares__read_line() (bsc#1220279).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1220279">SUSE bug 1220279</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25629/">CVE-2024-25629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25629">CVE-2024-25629 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853553" comment="libcares2-1.9.1-9.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153171" version="1" class="patch">
	<metadata>
		<title>Security update for postfix (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1218304" ref_url="https://bugzilla.suse.com/1218304" source="BUGZILLA"/>
		<reference ref_id="1218314" ref_url="https://bugzilla.suse.com/1218314" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-51764" ref_url="https://www.suse.com/security/cve/CVE-2023-51764/" source="CVE"/>
		<description>
This update for postfix fixes the following issues:

- CVE-2023-51764: Prevent SMTP smuggling attack. (bsc#1218304) 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218304">SUSE bug 1218304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218314">SUSE bug 1218314</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-51764/">CVE-2023-51764 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51764">CVE-2023-51764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853554" comment="postfix-3.2.10-3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853524" comment="postfix-doc-3.2.10-3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853555" comment="postfix-mysql-3.2.10-3.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153172" version="1" class="patch">
	<metadata>
		<title>Security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1221399" ref_url="https://bugzilla.suse.com/1221399" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-28182" ref_url="https://www.suse.com/security/cve/CVE-2024-28182/" source="CVE"/>
		<description>
This update for nghttp2 fixes the following issues:

- CVE-2024-28182: Fixed denial of service via http/2 continuation frames (bsc#1221399)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221399">SUSE bug 1221399</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28182/">CVE-2024-28182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28182">CVE-2024-28182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853556" comment="libnghttp2-14-1.39.2-3.18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853556" comment="libnghttp2-14-1.39.2-3.18.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153173" version="1" class="patch">
	<metadata>
		<title>Security update for less (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1219901" ref_url="https://bugzilla.suse.com/1219901" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48624" ref_url="https://www.suse.com/security/cve/CVE-2022-48624/" source="CVE"/>
		<description>
This update for less fixes the following issues:
  
- CVE-2022-48624: Fixed LESSCLOSE handling in less that does not quote shell metacharacters (bsc#1219901).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2024-04-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219901">SUSE bug 1219901</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48624/">CVE-2022-48624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48624">CVE-2022-48624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853972" comment="less-458-7.12.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853972" comment="less-458-7.12.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153174" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_jk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1167896" ref_url="https://bugzilla.suse.com/1167896" source="BUGZILLA"/>
		<reference ref_id="1206261" ref_url="https://bugzilla.suse.com/1206261" source="BUGZILLA"/>
		<reference ref_id="1215301" ref_url="https://bugzilla.suse.com/1215301" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-41081" ref_url="https://www.suse.com/security/cve/CVE-2023-41081/" source="CVE"/>
		<description>
This update for apache2-mod_jk fixes the following issues:

- Upgrade from version 1.2.40 to 1.2.49
- CVE-2023-41081: Fix an information disclosure issue in mod_jk. (bsc#1215301)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2024-04-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1167896">SUSE bug 1167896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206261">SUSE bug 1206261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215301">SUSE bug 1215301</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41081/">CVE-2023-41081 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41081">CVE-2023-41081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854017" comment="apache2-mod_jk-1.2.49-7.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153175" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1221831" ref_url="https://bugzilla.suse.com/1221831" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-28085" ref_url="https://www.suse.com/security/cve/CVE-2024-28085/" source="CVE"/>
		<description>
This update for util-linux fixes the following issues:

- CVE-2024-28085: Fixed improper neutralization of escape sequences in wall (bsc#1221831)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2024-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221831">SUSE bug 1221831</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-28085/">CVE-2024-28085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28085">CVE-2024-28085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854646" comment="libblkid1-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854647" comment="libblkid1-32bit-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854648" comment="libfdisk1-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854649" comment="libmount1-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854650" comment="libmount1-32bit-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854651" comment="libsmartcols1-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854652" comment="libuuid1-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854653" comment="libuuid1-32bit-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854654" comment="python-libmount-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854655" comment="util-linux-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854656" comment="util-linux-lang-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854657" comment="util-linux-systemd-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854658" comment="uuidd-2.29.2-3.42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854646" comment="libblkid1-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854647" comment="libblkid1-32bit-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854648" comment="libfdisk1-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854649" comment="libmount1-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854650" comment="libmount1-32bit-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854651" comment="libsmartcols1-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854652" comment="libuuid1-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854653" comment="libuuid1-32bit-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854654" comment="python-libmount-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854655" comment="util-linux-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854656" comment="util-linux-lang-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854657" comment="util-linux-systemd-2.29.2-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854658" comment="uuidd-2.29.2-3.42.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153176" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1222010" ref_url="https://bugzilla.suse.com/1222010" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-42843" ref_url="https://www.suse.com/security/cve/CVE-2023-42843/" source="CVE"/>
		<reference ref_id="CVE-2023-42950" ref_url="https://www.suse.com/security/cve/CVE-2023-42950/" source="CVE"/>
		<reference ref_id="CVE-2023-42956" ref_url="https://www.suse.com/security/cve/CVE-2023-42956/" source="CVE"/>
		<reference ref_id="CVE-2024-23252" ref_url="https://www.suse.com/security/cve/CVE-2024-23252/" source="CVE"/>
		<reference ref_id="CVE-2024-23254" ref_url="https://www.suse.com/security/cve/CVE-2024-23254/" source="CVE"/>
		<reference ref_id="CVE-2024-23263" ref_url="https://www.suse.com/security/cve/CVE-2024-23263/" source="CVE"/>
		<reference ref_id="CVE-2024-23280" ref_url="https://www.suse.com/security/cve/CVE-2024-23280/" source="CVE"/>
		<reference ref_id="CVE-2024-23284" ref_url="https://www.suse.com/security/cve/CVE-2024-23284/" source="CVE"/>
		<description>

webkit2gtk3 was updated to fix the following issues:

Update to version 2.44.0 (boo#1222010):

- CVE-2024-23252:

    Credit to anbu1024 of SecANT.
    Impact: Processing web content may lead to a denial-of-service.
    Description: The issue was addressed with improved memory handling.

- CVE-2024-23254:

    Credit to James Lee (@Windowsrcer).
    Impact: A malicious website may exfiltrate audio data cross-origin.
    Description: The issue was addressed with improved UI handling.

- CVE-2024-23263:

    Credit to Johan Carlsson (joaxcar).
    Impact: Processing maliciously crafted web content may prevent
    Content Security Policy from being enforced. Description: A logic
    issue was addressed with improved validation.

- CVE-2024-23280:

    Credit to An anonymous researcher.
    Impact: A maliciously crafted webpage may be able to fingerprint the
    user. Description: An injection issue was addressed with improved
    validation.

- CVE-2024-23284:

    Credit to Georg Felber and Marco Squarcina.
    Impact: Processing maliciously crafted web content may prevent
    Content Security Policy from being enforced. Description: A logic
    issue was addressed with improved state management.

- CVE-2023-42950:

    Credit to Nan Wang (@eternalsakura13) of 360 Vulnerability Research
    Institute and rushikesh nandedkar.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: A use after free issue was
    addressed with improved memory management.

- CVE-2023-42956:

    Credit to SungKwon Lee (Demon.Team).
    Impact: Processing web content may lead to a denial-of-service.
    Description: The issue was addressed with improved memory handling.

- CVE-2023-42843:

    Credit to Kacper Kwapisz (@KKKas_).
    Impact: Visiting a malicious website may lead to address bar
    spoofing. Description: An inconsistent user interface issue was
    addressed with improved state management.


+ Make the DOM accessibility tree reachable from UI process with GTK4.
+ Removed the X11 and WPE renderers in favor of DMA-BUF.
+ Improved vblank synchronization when rendering.
+ Removed key event reinjection in GTK4 to make keyboard shortcuts work in web sites.
+ Fix gamepads detection by correctly handling focused window in GTK4.

- Use WebAssembly on aarch64. It is the upstream default and no
  longer makes the build fail. Stop passing -DENABLE_C_LOOP=ON,
  -DENABLE_WEBASSEMBLY=OFF and -DENABLE_SAMPLING_PROFILER=OFF for
  the same reason.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-15"/>
	<updated date="2024-04-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222010">SUSE bug 1222010</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-42843/">CVE-2023-42843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42843">CVE-2023-42843 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42950/">CVE-2023-42950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42950">CVE-2023-42950 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42956/">CVE-2023-42956 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42956">CVE-2023-42956 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23252/">CVE-2024-23252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23252">CVE-2024-23252 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23254/">CVE-2024-23254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23254">CVE-2024-23254 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-23263/">CVE-2024-23263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23263">CVE-2024-23263 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23280/">CVE-2024-23280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23280">CVE-2024-23280 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-23284/">CVE-2024-23284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23284">CVE-2024-23284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854814" comment="libjavascriptcoregtk-4_0-18-2.44.0-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854815" comment="libwebkit2gtk-4_0-37-2.44.0-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854806" comment="libwebkit2gtk3-lang-2.44.0-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854816" comment="typelib-1_0-JavaScriptCore-4_0-2.44.0-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854817" comment="typelib-1_0-WebKit2-4_0-2.44.0-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854818" comment="typelib-1_0-WebKit2WebExtension-4_0-2.44.0-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854819" comment="webkit2gtk-4_0-injected-bundles-2.44.0-4.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153177" version="1" class="patch">
	<metadata>
		<title>Security update for texlive (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1222126" ref_url="https://bugzilla.suse.com/1222126" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46048" ref_url="https://www.suse.com/security/cve/CVE-2023-46048/" source="CVE"/>
		<description>
This update for texlive fixes the following issues:

- CVE-2023-46048: Fixed null pointer dereference in texk/web2c/pdftexdir/writet1.c (bsc#1222126)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-15"/>
	<updated date="2024-04-15"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1222126">SUSE bug 1222126</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-46048/">CVE-2023-46048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46048">CVE-2023-46048 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854820" comment="libkpathsea6-6.2.0dev-22.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153178" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1220770" ref_url="https://bugzilla.suse.com/1220770" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-26458" ref_url="https://www.suse.com/security/cve/CVE-2024-26458/" source="CVE"/>
		<description>
This update for krb5 fixes the following issues:

- CVE-2024-26458: Fixed a memory leak at /krb5/src/lib/rpc/pmap_rmt.c (bsc#1220770)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220770">SUSE bug 1220770</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26458/">CVE-2024-26458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26458">CVE-2024-26458 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855234" comment="krb5-1.12.5-40.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855235" comment="krb5-32bit-1.12.5-40.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855236" comment="krb5-client-1.12.5-40.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855237" comment="krb5-doc-1.12.5-40.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855238" comment="krb5-plugin-kdb-ldap-1.12.5-40.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855239" comment="krb5-plugin-preauth-otp-1.12.5-40.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855240" comment="krb5-plugin-preauth-pkinit-1.12.5-40.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855241" comment="krb5-server-1.12.5-40.55.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855234" comment="krb5-1.12.5-40.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855235" comment="krb5-32bit-1.12.5-40.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855236" comment="krb5-client-1.12.5-40.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855237" comment="krb5-doc-1.12.5-40.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855238" comment="krb5-plugin-kdb-ldap-1.12.5-40.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855239" comment="krb5-plugin-preauth-otp-1.12.5-40.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855240" comment="krb5-plugin-preauth-pkinit-1.12.5-40.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855241" comment="krb5-server-1.12.5-40.55.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153179" version="1" class="patch">
	<metadata>
		<title>Security update for emacs (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1222050" ref_url="https://bugzilla.suse.com/1222050" source="BUGZILLA"/>
		<reference ref_id="1222052" ref_url="https://bugzilla.suse.com/1222052" source="BUGZILLA"/>
		<reference ref_id="1222053" ref_url="https://bugzilla.suse.com/1222053" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-30203" ref_url="https://www.suse.com/security/cve/CVE-2024-30203/" source="CVE"/>
		<reference ref_id="CVE-2024-30204" ref_url="https://www.suse.com/security/cve/CVE-2024-30204/" source="CVE"/>
		<reference ref_id="CVE-2024-30205" ref_url="https://www.suse.com/security/cve/CVE-2024-30205/" source="CVE"/>
		<description>
This update for emacs fixes the following issues:

- CVE-2024-30203: Fixed denial of service via MIME contents (bsc#1222053)
- CVE-2024-30204: Fixed denial of service via LaTeX preview in e-mail attachments (bsc#1222052)
- CVE-2024-30205: Fixed Org mode considering contents of remote files as trusted (bsc#1222050)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-04-16"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1222050">SUSE bug 1222050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222052">SUSE bug 1222052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222053">SUSE bug 1222053</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-30203/">CVE-2024-30203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30203">CVE-2024-30203 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-30204/">CVE-2024-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30204">CVE-2024-30204 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-30205/">CVE-2024-30205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30205">CVE-2024-30205 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855242" comment="emacs-24.3-25.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855206" comment="emacs-el-24.3-25.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855207" comment="emacs-info-24.3-25.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855243" comment="emacs-nox-24.3-25.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855244" comment="emacs-x11-24.3-25.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855245" comment="etags-24.3-25.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153180" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1222535" ref_url="https://bugzilla.suse.com/1222535" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2609" ref_url="https://www.suse.com/security/cve/CVE-2024-2609/" source="CVE"/>
		<reference ref_id="CVE-2024-3302" ref_url="https://www.suse.com/security/cve/CVE-2024-3302/" source="CVE"/>
		<reference ref_id="CVE-2024-3852" ref_url="https://www.suse.com/security/cve/CVE-2024-3852/" source="CVE"/>
		<reference ref_id="CVE-2024-3854" ref_url="https://www.suse.com/security/cve/CVE-2024-3854/" source="CVE"/>
		<reference ref_id="CVE-2024-3857" ref_url="https://www.suse.com/security/cve/CVE-2024-3857/" source="CVE"/>
		<reference ref_id="CVE-2024-3859" ref_url="https://www.suse.com/security/cve/CVE-2024-3859/" source="CVE"/>
		<reference ref_id="CVE-2024-3861" ref_url="https://www.suse.com/security/cve/CVE-2024-3861/" source="CVE"/>
		<reference ref_id="CVE-2024-3863" ref_url="https://www.suse.com/security/cve/CVE-2024-3863/" source="CVE"/>
		<reference ref_id="CVE-2024-3864" ref_url="https://www.suse.com/security/cve/CVE-2024-3864/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 115.10.0 ESR (MSFA 2024-19) (bsc#1222535):

  - CVE-2024-3852: GetBoundName in the JIT returned the wrong object
  - CVE-2024-3854: Out-of-bounds-read after mis-optimized switch statement
  - CVE-2024-3857: Incorrect JITting of arguments led to use-after-free during garbage collection
  - CVE-2024-2609: Permission prompt input delay could expire when not in focus
  - CVE-2024-3859: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer
  - CVE-2024-3861: Potential use-after-free due to AlignedBuffer self-move
  - CVE-2024-3863: Download Protections were bypassed by .xrm-ms files on Windows
  - CVE-2024-3302: Denial of Service using HTTP/2 CONTINUATION frames
  - CVE-2024-3864: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222535">SUSE bug 1222535</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2609/">CVE-2024-2609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2609">CVE-2024-2609 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-3302/">CVE-2024-3302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3302">CVE-2024-3302 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3852/">CVE-2024-3852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3852">CVE-2024-3852 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3854/">CVE-2024-3854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3854">CVE-2024-3854 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3857/">CVE-2024-3857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3857">CVE-2024-3857 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3859/">CVE-2024-3859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3859">CVE-2024-3859 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3861/">CVE-2024-3861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3861">CVE-2024-3861 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-3863/">CVE-2024-3863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3863">CVE-2024-3863 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3864/">CVE-2024-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3864">CVE-2024-3864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855246" comment="MozillaFirefox-115.10.0-112.209.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855204" comment="MozillaFirefox-devel-115.10.0-112.209.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855247" comment="MozillaFirefox-translations-common-115.10.0-112.209.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855246" comment="MozillaFirefox-115.10.0-112.209.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855204" comment="MozillaFirefox-devel-115.10.0-112.209.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855247" comment="MozillaFirefox-translations-common-115.10.0-112.209.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153181" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1220181" ref_url="https://bugzilla.suse.com/1220181" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24476" ref_url="https://www.suse.com/security/cve/CVE-2024-24476/" source="CVE"/>
		<description>
This update for wireshark fixes the following issues:

- CVE-2024-24476: Fixed a denial of service in ws_manuf_lookup_str() (bsc#1220181)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220181">SUSE bug 1220181</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24476/">CVE-2024-24476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24476">CVE-2024-24476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855500" comment="libwireshark9-2.4.16-48.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855501" comment="libwiretap7-2.4.16-48.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855502" comment="libwscodecs1-2.4.16-48.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855503" comment="libwsutil8-2.4.16-48.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855504" comment="wireshark-2.4.16-48.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855505" comment="wireshark-gtk-2.4.16-48.54.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855500" comment="libwireshark9-2.4.16-48.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855501" comment="libwiretap7-2.4.16-48.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855502" comment="libwscodecs1-2.4.16-48.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855503" comment="libwsutil8-2.4.16-48.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855504" comment="wireshark-2.4.16-48.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855505" comment="wireshark-gtk-2.4.16-48.54.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153182" version="1" class="patch">
	<metadata>
		<title>Security update for pam (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1218475" ref_url="https://bugzilla.suse.com/1218475" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-22365" ref_url="https://www.suse.com/security/cve/CVE-2024-22365/" source="CVE"/>
		<description>
This update for pam fixes the following issues:

- CVE-2024-22365: Fixed a local denial of service during PAM login
  due to a missing check during path manipulation (bsc#1218475).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-18"/>
	<updated date="2024-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218475">SUSE bug 1218475</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22365/">CVE-2024-22365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22365">CVE-2024-22365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009818887" comment="pam-1.1.8-24.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818888" comment="pam-32bit-1.1.8-24.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818884" comment="pam-doc-1.1.8-24.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818889" comment="pam-extra-1.1.8-24.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818890" comment="pam-extra-32bit-1.1.8-24.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153183" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1223155" ref_url="https://bugzilla.suse.com/1223155" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-31744" ref_url="https://www.suse.com/security/cve/CVE-2024-31744/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2024-31744: Fixed denial of service through assertion failure in jpc_streamlist_remove() (bsc#1223155).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223155">SUSE bug 1223155</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31744/">CVE-2024-31744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31744">CVE-2024-31744 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009856044" comment="libjasper1-1.900.14-195.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856045" comment="libjasper1-32bit-1.900.14-195.40.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009856044" comment="libjasper1-1.900.14-195.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856045" comment="libjasper1-32bit-1.900.14-195.40.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153184" version="1" class="patch">
	<metadata>
		<title>Security update for w3m (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1218226" ref_url="https://bugzilla.suse.com/1218226" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4255" ref_url="https://www.suse.com/security/cve/CVE-2023-4255/" source="CVE"/>
		<description>
This update for w3m fixes the following issues:

- CVE-2023-4255: Fixed out-of-bounds write in function checkType() in etc.c (bsc#1218226).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-02"/>
	<updated date="2024-01-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218226">SUSE bug 1218226</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4255/">CVE-2023-4255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4255">CVE-2023-4255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817818" comment="w3m-0.5.3.git20161120-161.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153185" version="1" class="patch">
	<metadata>
		<title>Security update for nrpe (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1118590" ref_url="https://bugzilla.suse.com/1118590" source="BUGZILLA"/>
		<reference ref_id="874743" ref_url="https://bugzilla.suse.com/874743" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2913" ref_url="https://www.suse.com/security/cve/CVE-2014-2913/" source="CVE"/>
		<description>
This update for nrpe fixes the following issues:

CVE-2014-2913: Fixed remote command execution when command arguments are enabled (bsc#1118590,bsc#874743) 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2024-04-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118590">SUSE bug 1118590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874743">SUSE bug 874743</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2913/">CVE-2014-2913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2913">CVE-2014-2913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009857604" comment="monitoring-plugins-nrpe-2.15-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857605" comment="nrpe-2.15-6.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009857604" comment="monitoring-plugins-nrpe-2.15-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857605" comment="nrpe-2.15-6.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153186" version="1" class="patch">
	<metadata>
		<title>Security update for python-idna (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1222842" ref_url="https://bugzilla.suse.com/1222842" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-3651" ref_url="https://www.suse.com/security/cve/CVE-2024-3651/" source="CVE"/>
		<description>
This update for python-idna fixes the following issues:

- CVE-2024-3651: Fixed potential DoS via resource consumption via specially crafted inputs to idna.encode() (bsc#1222842).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2024-04-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1222842">SUSE bug 1222842</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3651/">CVE-2024-3651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3651">CVE-2024-3651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009856165" comment="python-idna-2.5-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856166" comment="python3-idna-2.5-3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153187" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1213470" ref_url="https://bugzilla.suse.com/1213470" source="BUGZILLA"/>
		<reference ref_id="1222979" ref_url="https://bugzilla.suse.com/1222979" source="BUGZILLA"/>
		<reference ref_id="1222983" ref_url="https://bugzilla.suse.com/1222983" source="BUGZILLA"/>
		<reference ref_id="1222984" ref_url="https://bugzilla.suse.com/1222984" source="BUGZILLA"/>
		<reference ref_id="1222986" ref_url="https://bugzilla.suse.com/1222986" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<reference ref_id="CVE-2024-21085" ref_url="https://www.suse.com/security/cve/CVE-2024-21085/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- CVE-2024-21011: Fixed denial of service due to long Exception message logging (JDK-8319851,bsc#1222979)
- CVE-2024-21068: Fixed integer overflow in C1 compiler address generation (JDK-8322122,bsc#1222983)  
- CVE-2024-21085: Fixed Pack200 excessive memory allocation (JDK-8322114,bsc#1222984)
- CVE-2024-21094: Fixed unauthorized data modification due to C2 compilation failure with 'Exceeded _node_regs array' (JDK-8317507,JDK-8325348,bsc#1222986)

Other fixes:
- Update to version jdk8u412 (icedtea-3.31.0) (April 2024 CPU)
  * Security fixes
    + JDK-8318340: Improve RSA key implementations
  * Import of OpenJDK 8 u412 build 08
    + JDK-8011180: Delete obsolete scripts
    + JDK-8016451: Scary messages emitted by
      build.tools.generatenimbus.PainterGenerator during build
    + JDK-8021961: setAlwaysOnTop doesn't behave correctly in
      Linux/Solaris under certain scenarios
    + JDK-8023735: [TESTBUG][macosx]
      runtime/XCheckJniJsig/XCheckJSig.java fails on MacOS X
    + JDK-8074860: Structured Exception Catcher missing around
      CreateJavaVM on Windows
    + JDK-8079441: Intermittent failures on Windows with 'Unexpected
      exit from test [exit code: 1080890248]' (0x406d1388)
    + JDK-8155590: Dubious collection management in
      sun.net.www.http.KeepAliveCache
    + JDK-8168518: rcache interop with krb5-1.15
    + JDK-8183503: Update hotspot tests to allow for unique test
      classes directory
    + JDK-8186095: upgrade to jtreg 4.2 b08
    + JDK-8186199: [windows] JNI_DestroyJavaVM not covered by SEH
    + JDK-8192931: Regression test
      java/awt/font/TextLayout/CombiningPerf.java fails
    + JDK-8208655: use JTreg skipped status in hotspot tests
    + JDK-8208701: Fix for JDK-8208655 causes test failures in CI
      tier1
    + JDK-8208706: compiler/tiered/
      /ConstantGettersTransitionsTest.java fails to compile
    + JDK-8213410: UseCompressedOops requirement check fails fails
      on 32-bit system
    + JDK-8222323: ChildAlwaysOnTopTest.java fails with
      'RuntimeException: Failed to unset alwaysOnTop'
    + JDK-8224768: Test ActalisCA.java fails
    + JDK-8251155: HostIdentifier fails to canonicalize hostnames
      starting with digits
    + JDK-8251551: Use .md filename extension for README
    + JDK-8268678: LetsEncryptCA.java test fails as Let’s Encrypt
      Authority X3 is retired
    + JDK-8270280: security/infra/java/security/cert/
      /CertPathValidator/certification/LetsEncryptCA.java OCSP
      response error
    + JDK-8270517: Add Zero support for LoongArch
    + JDK-8272708: [Test]: Cleanup: test/jdk/security/infra/java/
      /security/cert/CertPathValidator/certification/BuypassCA.java
      no longer needs ocspEnabled
    + JDK-8276139: TestJpsHostName.java not reliable, better to
      expand HostIdentifierCreate.java test
    + JDK-8288132: Update test artifacts in QuoVadis CA interop
      tests
    + JDK-8297955: LDAP CertStore should use LdapName and not
      String for DNs
    + JDK-8301310: The SendRawSysexMessage test may cause a JVM
      crash
    + JDK-8308592: Framework for CA interoperability testing
    + JDK-8312126: NullPointerException in CertStore.getCRLs after
      8297955
    + JDK-8315042: NPE in PKCS7.parseOldSignedData
    + JDK-8315757: [8u] Add cacerts JTREG tests to GHA tier1 test
      set
    + JDK-8320713: Bump update version of OpenJDK: 8u412
    + JDK-8321060: [8u] hotspot needs to recognise VS2022
    + JDK-8321408: Add Certainly roots R1 and E1
    + JDK-8322725: (tz) Update Timezone Data to 2023d
    + JDK-8322750: Test 'api/java_awt/interactive/
      /SystemTrayTests.html' failed because A blue ball icon is
      added outside of the system tray
    + JDK-8323202: [8u] Remove get_source.sh and hgforest.sh
    + JDK-8323640: [TESTBUG]testMemoryFailCount in jdk/internal/
      /platform/docker/TestDockerMemoryMetrics.java always fail
      because OOM killed
    + JDK-8324530: Build error with gcc 10
    + JDK-8325150: (tz) Update Timezone Data to 2024a
  * Bug fixes
    + Support make 4.4

- Do not recommend timezone-java8 (bsc#1213470)

- Use %patch -P N instead of deprecated %patchN.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-26"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1213470">SUSE bug 1213470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222979">SUSE bug 1222979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222983">SUSE bug 1222983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222984">SUSE bug 1222984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222986">SUSE bug 1222986</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21085/">CVE-2024-21085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21085">CVE-2024-21085 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858152" comment="java-1_8_0-openjdk-1.8.0.412-27.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858153" comment="java-1_8_0-openjdk-demo-1.8.0.412-27.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858154" comment="java-1_8_0-openjdk-devel-1.8.0.412-27.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858155" comment="java-1_8_0-openjdk-headless-1.8.0.412-27.99.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858152" comment="java-1_8_0-openjdk-1.8.0.412-27.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858153" comment="java-1_8_0-openjdk-demo-1.8.0.412-27.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858154" comment="java-1_8_0-openjdk-devel-1.8.0.412-27.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858155" comment="java-1_8_0-openjdk-headless-1.8.0.412-27.99.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153188" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198101" ref_url="https://bugzilla.suse.com/1198101" source="BUGZILLA"/>
		<reference ref_id="1205588" ref_url="https://bugzilla.suse.com/1205588" source="BUGZILLA"/>
		<reference ref_id="1205855" ref_url="https://bugzilla.suse.com/1205855" source="BUGZILLA"/>
		<reference ref_id="1210382" ref_url="https://bugzilla.suse.com/1210382" source="BUGZILLA"/>
		<reference ref_id="1213945" ref_url="https://bugzilla.suse.com/1213945" source="BUGZILLA"/>
		<reference ref_id="1215098" ref_url="https://bugzilla.suse.com/1215098" source="BUGZILLA"/>
		<reference ref_id="1215099" ref_url="https://bugzilla.suse.com/1215099" source="BUGZILLA"/>
		<reference ref_id="1215100" ref_url="https://bugzilla.suse.com/1215100" source="BUGZILLA"/>
		<reference ref_id="1215101" ref_url="https://bugzilla.suse.com/1215101" source="BUGZILLA"/>
		<reference ref_id="1215102" ref_url="https://bugzilla.suse.com/1215102" source="BUGZILLA"/>
		<reference ref_id="1215103" ref_url="https://bugzilla.suse.com/1215103" source="BUGZILLA"/>
		<reference ref_id="1219460" ref_url="https://bugzilla.suse.com/1219460" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-28737" ref_url="https://www.suse.com/security/cve/CVE-2022-28737/" source="CVE"/>
		<reference ref_id="CVE-2023-40546" ref_url="https://www.suse.com/security/cve/CVE-2023-40546/" source="CVE"/>
		<reference ref_id="CVE-2023-40547" ref_url="https://www.suse.com/security/cve/CVE-2023-40547/" source="CVE"/>
		<reference ref_id="CVE-2023-40548" ref_url="https://www.suse.com/security/cve/CVE-2023-40548/" source="CVE"/>
		<reference ref_id="CVE-2023-40549" ref_url="https://www.suse.com/security/cve/CVE-2023-40549/" source="CVE"/>
		<reference ref_id="CVE-2023-40550" ref_url="https://www.suse.com/security/cve/CVE-2023-40550/" source="CVE"/>
		<reference ref_id="CVE-2023-40551" ref_url="https://www.suse.com/security/cve/CVE-2023-40551/" source="CVE"/>
		<description>
This update for shim fixes the following issues:

- Update shim-install to set the TPM2 SRK algorithm (bsc#1213945)
- Limit the requirement of fde-tpm-helper-macros to the distro with
  suse_version 1600 and above (bsc#1219460)

Update to version 15.8:

Security issues fixed:

- mok: fix LogError() invocation (bsc#1215099,CVE-2023-40546)
- avoid incorrectly trusting HTTP headers (bsc#1215098,CVE-2023-40547)
- Fix integer overflow on SBAT section size on 32-bit system (bsc#1215100,CVE-2023-40548)
- Authenticode: verify that the signature header is in bounds (bsc#1215101,CVE-2023-40549)
- pe: Fix an out-of-bound read in verify_buffer_sbat() (bsc#1215102,CVE-2023-40550)
- pe-relocate: Fix bounds check for MZ binaries (bsc#1215103,CVE-2023-40551)

        
The NX flag is disable which is same as the default value of shim-15.8, hence, not need to enable it by this patch now.

- Generate dbx during build so we don't include binary files in sources
- Don't require grub so shim can still be used with systemd-boot
- Update shim-install to fix boot failure of ext4 root file system
  on RAID10 (bsc#1205855)
- Adopt the macros from fde-tpm-helper-macros to update the
  signature in the sealed key after a bootloader upgrade

- Update shim-install to amend full disk encryption support
  - Adopt TPM 2.0 Key File for grub2 TPM 2.0 protector
  - Use the long name to specify the grub2 key protector
  - cryptodisk: support TPM authorized policies
  - Do not use tpm_record_pcrs unless the command is in command.lst

- Removed POST_PROCESS_PE_FLAGS=-N from the build command in shim.spec to
  enable the NX compatibility flag when using post-process-pe after
  discussed with grub2 experts in mail. It's useful for further development
  and testing. (bsc#1205588)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-29"/>
	<updated date="2024-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198101">SUSE bug 1198101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205588">SUSE bug 1205588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205855">SUSE bug 1205855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210382">SUSE bug 1210382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213945">SUSE bug 1213945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215098">SUSE bug 1215098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215099">SUSE bug 1215099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215100">SUSE bug 1215100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215101">SUSE bug 1215101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215102">SUSE bug 1215102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215103">SUSE bug 1215103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219460">SUSE bug 1219460</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28737/">CVE-2022-28737 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28737">CVE-2022-28737 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40546/">CVE-2023-40546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40546">CVE-2023-40546 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40547/">CVE-2023-40547 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40547">CVE-2023-40547 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40548/">CVE-2023-40548 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40548">CVE-2023-40548 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40549/">CVE-2023-40549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40549">CVE-2023-40549 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40550/">CVE-2023-40550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40550">CVE-2023-40550 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40551/">CVE-2023-40551 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40551">CVE-2023-40551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858310" comment="shim-15.8-25.30.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858310" comment="shim-15.8-25.30.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153189" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215947" ref_url="https://bugzilla.suse.com/1215947" source="BUGZILLA"/>
		<reference ref_id="1216853" ref_url="https://bugzilla.suse.com/1216853" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38470" ref_url="https://www.suse.com/security/cve/CVE-2023-38470/" source="CVE"/>
		<reference ref_id="CVE-2023-38472" ref_url="https://www.suse.com/security/cve/CVE-2023-38472/" source="CVE"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2023-38472: Fixed denial of service due to a reachable assertion found in avahi_rdata_parse (bsc#1216853)
- CVE-2023-38470: Fixed denial of service due to a reachable assertion found in avahi_escape_label (bsc#1215947)

----------------------------------------------------------------		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-06"/>
	<updated date="2024-05-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215947">SUSE bug 1215947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216853">SUSE bug 1216853</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38470/">CVE-2023-38470 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38470">CVE-2023-38470 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38472/">CVE-2023-38472 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38472">CVE-2023-38472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009859155" comment="avahi-0.6.32-32.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859046" comment="avahi-lang-0.6.32-32.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859156" comment="avahi-utils-0.6.32-32.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859157" comment="libavahi-client3-0.6.32-32.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859158" comment="libavahi-client3-32bit-0.6.32-32.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859159" comment="libavahi-common3-0.6.32-32.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859160" comment="libavahi-common3-32bit-0.6.32-32.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859161" comment="libavahi-core7-0.6.32-32.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859162" comment="libavahi-glib1-0.6.32-32.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859163" comment="libavahi-glib1-32bit-0.6.32-32.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859164" comment="libdns_sd-0.6.32-32.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859165" comment="libdns_sd-32bit-0.6.32-32.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153190" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1219912" ref_url="https://bugzilla.suse.com/1219912" source="BUGZILLA"/>
		<reference ref_id="1221465" ref_url="https://bugzilla.suse.com/1221465" source="BUGZILLA"/>
		<reference ref_id="1222155" ref_url="https://bugzilla.suse.com/1222155" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-6152" ref_url="https://www.suse.com/security/cve/CVE-2023-6152/" source="CVE"/>
		<reference ref_id="CVE-2024-1313" ref_url="https://www.suse.com/security/cve/CVE-2024-1313/" source="CVE"/>
		<description>

This update fixes the following issues:

golang-github-prometheus-node_exporter:

- Update to 1.7.0 (jsc#PED-7893, jsc#PED-7928):
  * [FEATURE] Add ZFS freebsd per dataset stats #2753
  * [FEATURE] Add cpu vulnerabilities reporting from sysfs #2721
  * [ENHANCEMENT] Parallelize stat calls in Linux filesystem
    collector #1772
  * [ENHANCEMENT] Add missing linkspeeds to ethtool collector #2711
  * [ENHANCEMENT] Add CPU MHz as the value for node_cpu_info metric
    #2778
  * [ENHANCEMENT] Improve qdisc collector performance #2779
  * [ENHANCEMENT] Add include and exclude filter for hwmon
    collector #2699
  * [ENHANCEMENT] Optionally fetch ARP stats via rtnetlink instead
    of procfs #2777
  * [BUFFIX] Fix ZFS arcstats on FreeBSD 14.0+ 2754
  * [BUGFIX] Fallback to 32-bit stats in netdev #2757
  * [BUGFIX] Close btrfs.FS handle after use #2780
  * [BUGFIX] Move RO status before error return #2807
  * [BUFFIX] Fix promhttp_metric_handler_errors_total being always
    active #2808
  * [BUGFIX] Fix nfsd v4 index miss #2824
- Update to 1.6.1:
  (no source code changes in this release)
- BuildRequire go1.20
- Update to 1.6.0:
  * [CHANGE] Fix cpustat when some cpus are offline #2318
  * [CHANGE] Remove metrics of offline CPUs in CPU collector #2605
  * [CHANGE] Deprecate ntp collector #2603
  * [CHANGE] Remove bcache `cache_readaheads_totals` metrics #2583
  * [CHANGE] Deprecate supervisord collector #2685
  * [FEATURE] Enable uname collector on NetBSD #2559
  * [FEATURE] NetBSD support for the meminfo collector #2570
  * [FEATURE] NetBSD support for CPU collector #2626
  * [FEATURE] Add FreeBSD collector for netisr subsystem #2668
  * [FEATURE] Add softirqs collector #2669
  * [ENHANCEMENT] Add suspended as a `node_zfs_zpool_state` #2449
  * [ENHANCEMENT] Add administrative state of Linux network
    interfaces #2515
  * [ENHANCEMENT] Log current value of GOMAXPROCS #2537
  * [ENHANCEMENT] Add profiler options for perf collector #2542
  * [ENHANCEMENT] Allow root path as metrics path #2590
  * [ENHANCEMENT] Add cpu frequency governor metrics #2569
  * [ENHANCEMENT] Add new landing page #2622
  * [ENHANCEMENT] Reduce privileges needed for btrfs device stats
    #2634
  * [ENHANCEMENT] Add ZFS `memory_available_bytes` #2687
  * [ENHANCEMENT] Use `SCSI_IDENT_SERIAL` as serial in diskstats
    #2612
  * [ENHANCEMENT] Read missing from netlink netclass attributes
    from sysfs #2669
  * [BUGFIX] perf: fixes for automatically detecting the correct
    tracefs mountpoints #2553
  * [BUGFIX] Fix `thermal_zone` collector noise @2554
  * [BUGFIX] Fix a problem fetching the user wire count on FreeBSD
    2584
  * [BUGFIX] interrupts: Fix fields on linux aarch64 #2631
  * [BUGFIX] Remove metrics of offline CPUs in CPU collector #2605
  * [BUGFIX] Fix OpenBSD filesystem collector string parsing #2637
  * [BUGFIX] Fix bad reporting of `node_cpu_seconds_total` in
    OpenBSD #2663
- Change go_modules archive in _service to use obscpio file

grafana:

- Packaging improvements:
  * Changed deprecated `disabled` service mode to `manual`
  * Drop golang-packaging macros
  * Drop explicit mod=vendor as it is enabled automatically
- Update to version 9.5.18:
  * [SECURITY] CVE-2024-1313: Require same organisation when
    deleting snapshots (bsc#1222155)
- Update to version 9.5.17:
  * [FEATURE] Alerting: Backport use Alertmanager API v2
- Require Go 1.20
- Update to version 9.5.16:
  * [SECURITY] CVE-2023-6152: Add email verification when updating
    user email (bsc#1219912)
  * [BUGFIX] Annotations: Split cleanup into separate queries and
    deletes to avoid deadlocks on MySQL
- Update to version 9.5.15:
  * [FEATURE] Alerting: Attempt to retry retryable errors
- Update to version 9.5.14:
  * [BUGFIX] Alerting: Fix state manager to not keep
    datasource_uid and ref_id labels in state after Error
  * [BUGFIX] Transformations: Config overrides being lost when
    config from query transform is applied
  * [BUGFIX] LDAP: Fix enable users on successfull login
- Update to version 9.5.13:
  * [BUGFIX] BrowseDashboards: Only remember the most recent
    expanded folder
  * [BUGFIX] Licensing: Pass func to update env variables when
    starting plugin
- Update to version 9.5.12:
  * [FEATURE] Azure: Add support for Workload Identity
    authentication
- Update to version 9.5.9:
  * [FEATURE] SSE: Fix DSNode to not panic when response has empty
    response
  * [FEATURE] Prometheus: Handle the response with different field
    key order
  * [BUGFIX] LDAP: Fix user disabling

mgr-daemon:

- Version 4.3.9-0
  * Update translation strings

spacecmd:

- Version 4.3.27-0
  * Update translation strings

spacewalk-client-tools:

- Version 4.3.19-0
  * Update translation strings

spacewalk-koan:

- Version 4.3.6-0
  * Change Docker image location for test

uyuni-common-libs:

- Version 4.3.10-0
  * Add support for package signature type V4 RSA/SHA384
  * Add support for package signature type V4 RSA/SHA512 (bsc#1221465)

		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-06"/>
	<updated date="2024-05-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219912">SUSE bug 1219912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221465">SUSE bug 1221465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222155">SUSE bug 1222155</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6152/">CVE-2023-6152 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6152">CVE-2023-6152 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-1313/">CVE-2024-1313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1313">CVE-2024-1313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859166" comment="golang-github-prometheus-node_exporter-1.7.0-1.30.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859166" comment="golang-github-prometheus-node_exporter-1.7.0-1.30.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153191" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1221984" ref_url="https://bugzilla.suse.com/1221984" source="BUGZILLA"/>
		<reference ref_id="1222302" ref_url="https://bugzilla.suse.com/1222302" source="BUGZILLA"/>
		<reference ref_id="1222453" ref_url="https://bugzilla.suse.com/1222453" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46842" ref_url="https://www.suse.com/security/cve/CVE-2023-46842/" source="CVE"/>
		<reference ref_id="CVE-2024-2201" ref_url="https://www.suse.com/security/cve/CVE-2024-2201/" source="CVE"/>
		<reference ref_id="CVE-2024-31142" ref_url="https://www.suse.com/security/cve/CVE-2024-31142/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2024-2201: Mitigation for Native Branch History Injection (XSA-456, bsc#1222453)
- CVE-2023-46842: HVM hypercalls may trigger Xen bug check (XSA-454, bsc#1221984)
- CVE-2024-31142: Fixed incorrect logic for BTC/SRSO mitigations (XSA-455, bsc#1222302)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-07"/>
	<updated date="2024-05-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1221984">SUSE bug 1221984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222302">SUSE bug 1222302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222453">SUSE bug 1222453</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46842/">CVE-2023-46842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46842">CVE-2023-46842 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2201/">CVE-2024-2201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2201">CVE-2024-2201 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-31142/">CVE-2024-31142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31142">CVE-2024-31142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009859318" comment="xen-4.9.4_52-3.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859319" comment="xen-doc-html-4.9.4_52-3.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859320" comment="xen-libs-4.9.4_52-3.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859321" comment="xen-libs-32bit-4.9.4_52-3.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859322" comment="xen-tools-4.9.4_52-3.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859323" comment="xen-tools-domU-4.9.4_52-3.141.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153192" version="1" class="patch">
	<metadata>
		<title>Security update for less (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1222849" ref_url="https://bugzilla.suse.com/1222849" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-32487" ref_url="https://www.suse.com/security/cve/CVE-2024-32487/" source="CVE"/>
		<description>
This update for less fixes the following issues:

- CVE-2024-32487: Fixed mishandling of \n character in paths when LESSOPEN is set leads to OS command execution. (bsc#1222849)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-07"/>
	<updated date="2024-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222849">SUSE bug 1222849</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32487/">CVE-2024-32487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32487">CVE-2024-32487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859324" comment="less-458-7.15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859324" comment="less-458-7.15.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153193" version="1" class="patch">
	<metadata>
		<title>Security update for ding-libs, sssd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1223100" ref_url="https://bugzilla.suse.com/1223100" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3758" ref_url="https://www.suse.com/security/cve/CVE-2023-3758/" source="CVE"/>
		<description>
This update for ding-libs, sssd fixes the following issues:

Changes in sssd:

- CVE-2023-3758: Fix possible race evaluating GPO based access policies (bsc#1223100).

Changes in ding-libs:

- Add new hash key constant string type (bsc#1223100).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-08"/>
	<updated date="2024-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223100">SUSE bug 1223100</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3758/">CVE-2023-3758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-3758">CVE-2023-3758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009859547" comment="libbasicobjects0-0.1.1-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859548" comment="libcollection4-0.7.0-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859549" comment="libdhash1-0.4.3-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859550" comment="libini_config5-1.2.0-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859551" comment="libipa_hbac0-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859552" comment="libpath_utils1-0.2.1-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859553" comment="libref_array1-0.1.5-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859554" comment="libsss_idmap0-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859555" comment="libsss_nss_idmap0-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859556" comment="libsss_sudo-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859557" comment="python-sssd-config-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859558" comment="sssd-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859559" comment="sssd-32bit-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859560" comment="sssd-ad-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859561" comment="sssd-ipa-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859562" comment="sssd-krb5-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859563" comment="sssd-krb5-common-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859564" comment="sssd-ldap-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859565" comment="sssd-proxy-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859566" comment="sssd-tools-1.13.4-34.46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009859547" comment="libbasicobjects0-0.1.1-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859548" comment="libcollection4-0.7.0-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859549" comment="libdhash1-0.4.3-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859550" comment="libini_config5-1.2.0-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859551" comment="libipa_hbac0-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859552" comment="libpath_utils1-0.2.1-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859553" comment="libref_array1-0.1.5-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859554" comment="libsss_idmap0-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859555" comment="libsss_nss_idmap0-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859556" comment="libsss_sudo-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859557" comment="python-sssd-config-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859558" comment="sssd-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859559" comment="sssd-32bit-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859560" comment="sssd-ad-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859561" comment="sssd-ipa-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859562" comment="sssd-krb5-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859563" comment="sssd-krb5-common-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859564" comment="sssd-ldap-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859565" comment="sssd-proxy-1.13.4-34.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859566" comment="sssd-tools-1.13.4-34.46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153194" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1223852" ref_url="https://bugzilla.suse.com/1223852" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52722" ref_url="https://www.suse.com/security/cve/CVE-2023-52722/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2023-52722: Do not allow eexec seeds other than the Type 1 standard while using SAFER mode (bsc#1223852).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-09"/>
	<updated date="2024-05-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1223852">SUSE bug 1223852</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52722/">CVE-2023-52722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52722">CVE-2023-52722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009859884" comment="ghostscript-9.52-23.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859885" comment="ghostscript-devel-9.52-23.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859886" comment="ghostscript-x11-9.52-23.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153195" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1222309" ref_url="https://bugzilla.suse.com/1222309" source="BUGZILLA"/>
		<reference ref_id="1222310" ref_url="https://bugzilla.suse.com/1222310" source="BUGZILLA"/>
		<reference ref_id="1222311" ref_url="https://bugzilla.suse.com/1222311" source="BUGZILLA"/>
		<reference ref_id="1222312" ref_url="https://bugzilla.suse.com/1222312" source="BUGZILLA"/>
		<reference ref_id="1222442" ref_url="https://bugzilla.suse.com/1222442" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-31080" ref_url="https://www.suse.com/security/cve/CVE-2024-31080/" source="CVE"/>
		<reference ref_id="CVE-2024-31081" ref_url="https://www.suse.com/security/cve/CVE-2024-31081/" source="CVE"/>
		<reference ref_id="CVE-2024-31082" ref_url="https://www.suse.com/security/cve/CVE-2024-31082/" source="CVE"/>
		<reference ref_id="CVE-2024-31083" ref_url="https://www.suse.com/security/cve/CVE-2024-31083/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2024-31080: Xi: ProcXIGetSelectedEvents needs to use unswapped length (bsc#1222309)
- CVE-2024-31081: Xi: ProcXIPassiveGrabDevice needs to use unswapped length to send reply (bsc#1222310) 
- CVE-2024-3108: Xquartz: ProcAppleDRICreatePixmap needs to use unswapped length to send reply (bsc#1222311)
- CVE-2024-31083: render: fix refcounting of glyphs during ProcRenderAddGlyphs (bsc#1222312)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-09"/>
	<updated date="2024-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222309">SUSE bug 1222309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222310">SUSE bug 1222310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222311">SUSE bug 1222311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222312">SUSE bug 1222312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222442">SUSE bug 1222442</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31080/">CVE-2024-31080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31080">CVE-2024-31080 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31081/">CVE-2024-31081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31081">CVE-2024-31081 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31082/">CVE-2024-31082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31082">CVE-2024-31082 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31083/">CVE-2024-31083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31083">CVE-2024-31083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009859887" comment="xorg-x11-server-7.6_1.18.3-76.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859888" comment="xorg-x11-server-extra-7.6_1.18.3-76.69.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009859887" comment="xorg-x11-server-7.6_1.18.3-76.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859888" comment="xorg-x11-server-extra-7.6_1.18.3-76.69.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153196" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1094832" ref_url="https://bugzilla.suse.com/1094832" source="BUGZILLA"/>
		<reference ref_id="1200551" ref_url="https://bugzilla.suse.com/1200551" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11490" ref_url="https://www.suse.com/security/cve/CVE-2018-11490/" source="CVE"/>
		<reference ref_id="CVE-2021-40633" ref_url="https://www.suse.com/security/cve/CVE-2021-40633/" source="CVE"/>
		<description>
This update for giflib fixes the following issues:

- CVE-2018-11490: Fixed a heap-based buffer overflow in DGifDecompressLine() (bsc#1094832)
- CVE-2021-40633: Fixed a denial of service from excessive memory (bsc#1200551)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-13"/>
	<updated date="2024-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1094832">SUSE bug 1094832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200551">SUSE bug 1200551</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11490/">CVE-2018-11490 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11490">CVE-2018-11490 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-40633/">CVE-2021-40633 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40633">CVE-2021-40633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860531" comment="giflib-progs-5.0.5-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860532" comment="libgif6-5.0.5-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860533" comment="libgif6-32bit-5.0.5-13.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860531" comment="giflib-progs-5.0.5-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860532" comment="libgif6-5.0.5-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860533" comment="libgif6-32bit-5.0.5-13.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153197" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1219386" ref_url="https://bugzilla.suse.com/1219386" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5992" ref_url="https://www.suse.com/security/cve/CVE-2023-5992/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2023-5992: Fixed a side-channel leaks while stripping encryption PKCS#1 padding (bsc#1219386)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-13"/>
	<updated date="2024-05-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219386">SUSE bug 1219386</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5992/">CVE-2023-5992 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5992">CVE-2023-5992 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860534" comment="opensc-0.13.0-3.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153198" version="1" class="patch">
	<metadata>
		<title>Security update for python-pyOpenSSL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1021578" ref_url="https://bugzilla.suse.com/1021578" source="BUGZILLA"/>
		<reference ref_id="1111634" ref_url="https://bugzilla.suse.com/1111634" source="BUGZILLA"/>
		<reference ref_id="1111635" ref_url="https://bugzilla.suse.com/1111635" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000807" ref_url="https://www.suse.com/security/cve/CVE-2018-1000807/" source="CVE"/>
		<reference ref_id="CVE-2018-1000808" ref_url="https://www.suse.com/security/cve/CVE-2018-1000808/" source="CVE"/>
		<description>
This update for python-pyOpenSSL fixes the following issues:

- CVE-2018-1000807: Fixed a use-after-free in X509 object handling (bsc#1111635)
- CVE-2018-1000808: Fixed a use-after-free in PKCS #12 Store (bsc#1111634)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-13"/>
	<updated date="2024-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021578">SUSE bug 1021578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111634">SUSE bug 1111634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111635">SUSE bug 1111635</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000807/">CVE-2018-1000807 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000807">CVE-2018-1000807 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000808/">CVE-2018-1000808 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000808">CVE-2018-1000808 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860509" comment="python-pyOpenSSL-17.1.0-4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860510" comment="python3-pyOpenSSL-17.1.0-4.26.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860509" comment="python-pyOpenSSL-17.1.0-4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860510" comment="python3-pyOpenSSL-17.1.0-4.26.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153199" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1221401" ref_url="https://bugzilla.suse.com/1221401" source="BUGZILLA"/>
		<reference ref_id="1222330" ref_url="https://bugzilla.suse.com/1222330" source="BUGZILLA"/>
		<reference ref_id="1222332" ref_url="https://bugzilla.suse.com/1222332" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38709" ref_url="https://www.suse.com/security/cve/CVE-2023-38709/" source="CVE"/>
		<reference ref_id="CVE-2024-24795" ref_url="https://www.suse.com/security/cve/CVE-2024-24795/" source="CVE"/>
		<reference ref_id="CVE-2024-27316" ref_url="https://www.suse.com/security/cve/CVE-2024-27316/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2023-38709: Fixed faulty input validation inside the HTTP response splitting code (bsc#1222330).
- CVE-2024-24795: Fixed handling of malicious HTTP splitting response headers in multiple modules (bsc#1222332).
- CVE-2024-27316: Fixed HTTP/2 CONTINUATION frames that could have been utilized for DoS attacks (bsc#1221401).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-13"/>
	<updated date="2024-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221401">SUSE bug 1221401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222330">SUSE bug 1222330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222332">SUSE bug 1222332</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-38709/">CVE-2023-38709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38709">CVE-2023-38709 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-24795/">CVE-2024-24795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24795">CVE-2024-24795 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27316/">CVE-2024-27316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27316">CVE-2024-27316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860535" comment="apache2-2.4.23-29.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860536" comment="apache2-doc-2.4.23-29.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860537" comment="apache2-example-pages-2.4.23-29.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860538" comment="apache2-prefork-2.4.23-29.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860539" comment="apache2-utils-2.4.23-29.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860540" comment="apache2-worker-2.4.23-29.103.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860535" comment="apache2-2.4.23-29.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860536" comment="apache2-doc-2.4.23-29.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860537" comment="apache2-example-pages-2.4.23-29.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860538" comment="apache2-prefork-2.4.23-29.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860539" comment="apache2-utils-2.4.23-29.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860540" comment="apache2-worker-2.4.23-29.103.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153200" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools Beta (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1014637" ref_url="https://bugzilla.suse.com/1014637" source="BUGZILLA"/>
		<reference ref_id="1156309" ref_url="https://bugzilla.suse.com/1156309" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9566" ref_url="https://www.suse.com/security/cve/CVE-2016-9566/" source="CVE"/>
		<reference ref_id="CVE-2019-3698" ref_url="https://www.suse.com/security/cve/CVE-2019-3698/" source="CVE"/>
		<description>
This update for SUSE Manager Client Tools Beta fixes the following issues:

- Changed codestream origin of SUSE Manager Client Tools Beta (no source changes)

icinga in SUSE Manager Client Tools Beta also received the following security fixes:
    
- CVE-2016-9566: Fixed root privilege escalation (bsc#1014637)
- CVE-2019-3698 : Symbolic Link (Symlink) following
  vulnerability in the cronjob allows local attackers to cause cause
  DoS or potentially escalate privileges by winning a race (bsc#1156309)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-14"/>
	<updated date="2024-05-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1014637">SUSE bug 1014637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156309">SUSE bug 1156309</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9566/">CVE-2016-9566 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9566">CVE-2016-9566 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3698/">CVE-2019-3698 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3698">CVE-2019-3698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860987" comment="sysuser-shadow-2.0-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860988" comment="sysuser-tools-2.0-1.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860987" comment="sysuser-shadow-2.0-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860988" comment="sysuser-tools-2.0-1.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153201" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1224038" ref_url="https://bugzilla.suse.com/1224038" source="BUGZILLA"/>
		<reference ref_id="1224051" ref_url="https://bugzilla.suse.com/1224051" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4317" ref_url="https://www.suse.com/security/cve/CVE-2024-4317/" source="CVE"/>
		<description>
This update for postgresql16 fixes the following issues:

PostgreSQL upgrade to version 16.3 (bsc#1224051):

- CVE-2024-4317: Fixed visibility restriction of pg_stats_ext and pg_stats_ext_exprs entries to the table owner (bsc#1224038).

Bug fixes:

- Fix incompatibility with LLVM 18.
- Prepare for PostgreSQL 17.
- Make sure all compilation and doc generation happens in %build.
- Require LLVM &lt;= 17 for now, because LLVM 18 doesn't seem to work.
- Remove constraints file because improved memory usage for s390x
- Use %patch -P N instead of deprecated %patchN.

Release notes:

- https://www.postgresql.org/docs/release/16.3/
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-05-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1224038">SUSE bug 1224038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224051">SUSE bug 1224051</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-4317/">CVE-2024-4317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4317">CVE-2024-4317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861338" comment="libecpg6-16.3-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861339" comment="libecpg6-32bit-16.3-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861340" comment="libpq5-16.3-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861341" comment="libpq5-32bit-16.3-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861342" comment="postgresql16-16.3-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861343" comment="postgresql16-contrib-16.3-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861344" comment="postgresql16-devel-16.3-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861319" comment="postgresql16-docs-16.3-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861345" comment="postgresql16-plperl-16.3-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861346" comment="postgresql16-plpython-16.3-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861347" comment="postgresql16-pltcl-16.3-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861348" comment="postgresql16-server-16.3-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861349" comment="postgresql16-server-devel-16.3-3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153202" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql15 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1224038" ref_url="https://bugzilla.suse.com/1224038" source="BUGZILLA"/>
		<reference ref_id="1224051" ref_url="https://bugzilla.suse.com/1224051" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4317" ref_url="https://www.suse.com/security/cve/CVE-2024-4317/" source="CVE"/>
		<description>
This update for postgresql15 fixes the following issues:

PostgreSQL upgrade to version 15.7 (bsc#1224051):

- CVE-2024-4317: Fixed visibility restriction of pg_stats_ext and pg_stats_ext_exprs entries to the table owner (bsc#1224038).

Bug fixes:

- Fix incompatibility with LLVM 18.
- Prepare for PostgreSQL 17.
- Make sure all compilation and doc generation happens in %build.
- Require LLVM &lt;= 17 for now, because LLVM 18 doesn't seem to work.
- Remove constraints file because improved memory usage for s390x
- Use %patch -P N instead of deprecated %patchN.

Release notes:

- https://www.postgresql.org/docs/release/15.7/
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-05-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1224038">SUSE bug 1224038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224051">SUSE bug 1224051</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-4317/">CVE-2024-4317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4317">CVE-2024-4317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861350" comment="postgresql15-15.7-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861351" comment="postgresql15-contrib-15.7-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861352" comment="postgresql15-devel-15.7-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861326" comment="postgresql15-docs-15.7-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861353" comment="postgresql15-plperl-15.7-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861354" comment="postgresql15-plpython-15.7-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861355" comment="postgresql15-pltcl-15.7-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861356" comment="postgresql15-server-15.7-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861357" comment="postgresql15-server-devel-15.7-3.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153203" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1219559" ref_url="https://bugzilla.suse.com/1219559" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2023-52425: Fixed etree XMLPullParser tests for Expat &gt;=2.6.0 with reparse deferral (bsc#1219559).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-05-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219559">SUSE bug 1219559</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861358" comment="libpython3_4m1_0-3.4.10-25.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861359" comment="python3-3.4.10-25.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861360" comment="python3-base-3.4.10-25.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861361" comment="python3-curses-3.4.10-25.127.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153204" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214675" ref_url="https://bugzilla.suse.com/1214675" source="BUGZILLA"/>
		<reference ref_id="1219306" ref_url="https://bugzilla.suse.com/1219306" source="BUGZILLA"/>
		<reference ref_id="1219559" ref_url="https://bugzilla.suse.com/1219559" source="BUGZILLA"/>
		<reference ref_id="1220970" ref_url="https://bugzilla.suse.com/1220970" source="BUGZILLA"/>
		<reference ref_id="1222537" ref_url="https://bugzilla.suse.com/1222537" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48560" ref_url="https://www.suse.com/security/cve/CVE-2022-48560/" source="CVE"/>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2023-52425: Fixed using the system libexpat (bsc#1219559).
- CVE-2023-27043: Modifed fix for unicode string handling in email.utils.parseaddr() (bsc#1222537).
- CVE-2022-48560: Fixed use-after-free in Python via heappushpop in heapq (bsc#1214675).

Bug fixes:

- Switch off tests. ONLY FOR FACTORY!!! (bsc#1219306).
- Build with -std=gnu89 to build correctly with gcc14 (bsc#1220970).
- Switch from %patchN style to the %patch -P N one.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-05-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214675">SUSE bug 1214675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219306">SUSE bug 1219306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219559">SUSE bug 1219559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220970">SUSE bug 1220970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222537">SUSE bug 1222537</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48560/">CVE-2022-48560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48560">CVE-2022-48560 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861362" comment="libpython2_7-1_0-2.7.18-28.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861363" comment="libpython2_7-1_0-32bit-2.7.18-28.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861364" comment="python-2.7.18-28.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861365" comment="python-32bit-2.7.18-28.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861366" comment="python-base-2.7.18-28.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861367" comment="python-base-32bit-2.7.18-28.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861368" comment="python-curses-2.7.18-28.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861369" comment="python-demo-2.7.18-28.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861370" comment="python-devel-2.7.18-28.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861371" comment="python-doc-2.7.18-28.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861372" comment="python-doc-pdf-2.7.18-28.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861373" comment="python-gdbm-2.7.18-28.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861374" comment="python-idle-2.7.18-28.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861375" comment="python-tk-2.7.18-28.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861376" comment="python-xml-2.7.18-28.111.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153205" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1222992" ref_url="https://bugzilla.suse.com/1222992" source="BUGZILLA"/>
		<reference ref_id="1223423" ref_url="https://bugzilla.suse.com/1223423" source="BUGZILLA"/>
		<reference ref_id="1223424" ref_url="https://bugzilla.suse.com/1223424" source="BUGZILLA"/>
		<reference ref_id="1223425" ref_url="https://bugzilla.suse.com/1223425" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2961" ref_url="https://www.suse.com/security/cve/CVE-2024-2961/" source="CVE"/>
		<reference ref_id="CVE-2024-33599" ref_url="https://www.suse.com/security/cve/CVE-2024-33599/" source="CVE"/>
		<reference ref_id="CVE-2024-33600" ref_url="https://www.suse.com/security/cve/CVE-2024-33600/" source="CVE"/>
		<reference ref_id="CVE-2024-33601" ref_url="https://www.suse.com/security/cve/CVE-2024-33601/" source="CVE"/>
		<reference ref_id="CVE-2024-33602" ref_url="https://www.suse.com/security/cve/CVE-2024-33602/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

- nscd: Fix use-after-free in addgetnetgrentX (BZ #23520)
- CVE-2024-33599: nscd: Stack-based buffer overflow in netgroup cache (bsc#1223423, BZ #31677)
- CVE-2024-33600: nscd: Avoid null pointer crashes after notfound response (bsc#1223424, BZ #31678)
- CVE-2024-33600: nscd: Do not send missing not-found response in addgetnetgrentX (bsc#1223424, BZ #31678)
- CVE-2024-33601, CVE-2024-33602: netgroup: Use two buffers in addgetnetgrentX (bsc#1223425, BZ #31680)
- CVE-2024-33602: Use time_t for return type of addgetnetgrentX (bsc#1223425)
- CVE-2024-2961: iconv: ISO-2022-CN-EXT: fix out-of-bound writes when writing escape sequence (bsc#1222992)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222992">SUSE bug 1222992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223423">SUSE bug 1223423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223424">SUSE bug 1223424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223425">SUSE bug 1223425</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-2961/">CVE-2024-2961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-33599/">CVE-2024-33599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33599">CVE-2024-33599 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33600/">CVE-2024-33600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33600">CVE-2024-33600 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33601/">CVE-2024-33601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33601">CVE-2024-33601 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-33602/">CVE-2024-33602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33602">CVE-2024-33602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861448" comment="glibc-2.22-145.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861449" comment="glibc-32bit-2.22-145.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861450" comment="glibc-devel-2.22-145.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861451" comment="glibc-devel-32bit-2.22-145.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861452" comment="glibc-html-2.22-145.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861453" comment="glibc-i18ndata-2.22-145.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861454" comment="glibc-info-2.22-145.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861455" comment="glibc-locale-2.22-145.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861456" comment="glibc-locale-32bit-2.22-145.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861457" comment="glibc-profile-2.22-145.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861458" comment="glibc-profile-32bit-2.22-145.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861459" comment="nscd-2.22-145.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153206" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
		</affected>
		<reference ref_id="1222992" ref_url="https://bugzilla.suse.com/1222992" source="BUGZILLA"/>
		<reference ref_id="1223423" ref_url="https://bugzilla.suse.com/1223423" source="BUGZILLA"/>
		<reference ref_id="1223424" ref_url="https://bugzilla.suse.com/1223424" source="BUGZILLA"/>
		<reference ref_id="1223425" ref_url="https://bugzilla.suse.com/1223425" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2961" ref_url="https://www.suse.com/security/cve/CVE-2024-2961/" source="CVE"/>
		<reference ref_id="CVE-2024-33599" ref_url="https://www.suse.com/security/cve/CVE-2024-33599/" source="CVE"/>
		<reference ref_id="CVE-2024-33600" ref_url="https://www.suse.com/security/cve/CVE-2024-33600/" source="CVE"/>
		<reference ref_id="CVE-2024-33601" ref_url="https://www.suse.com/security/cve/CVE-2024-33601/" source="CVE"/>
		<reference ref_id="CVE-2024-33602" ref_url="https://www.suse.com/security/cve/CVE-2024-33602/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

- nscd: Fix use-after-free in addgetnetgrentX (BZ #23520)
- CVE-2024-33599; nscd: Stack-based buffer overflow in netgroup cache
  (bsc#1223423, BZ #31677)
- CVE-2024-33600: nscd: Avoid null pointer crashes after notfound response
  (bsc#1223424, BZ #31678)
- CVE-2024-33600: nscd: Do not send missing not-found response in addgetnetgrentX
  (bsc#1223424, BZ #31678)
- CVE-2024-33601, CVE-2024-33602: netgroup: Use two buffers in addgetnetgrentX ( bsc#1223425, BZ #31680)
- CVE-2024-33602: Use time_t for return type of addgetnetgrentX (bsc#1223425)
- CVE-2024-2961; iconv: ISO-2022-CN-EXT: fix out-of-bound writes when writing escape sequence (bsc#1222992)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-17"/>
	<updated date="2024-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222992">SUSE bug 1222992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223423">SUSE bug 1223423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223424">SUSE bug 1223424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223425">SUSE bug 1223425</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-2961/">CVE-2024-2961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-33599/">CVE-2024-33599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33599">CVE-2024-33599 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33600/">CVE-2024-33600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33600">CVE-2024-33600 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33601/">CVE-2024-33601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33601">CVE-2024-33601 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-33602/">CVE-2024-33602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33602">CVE-2024-33602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861578" comment="glibc-2.22-143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861579" comment="glibc-32bit-2.22-143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861580" comment="glibc-devel-2.22-143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861581" comment="glibc-devel-32bit-2.22-143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861582" comment="glibc-html-2.22-143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861583" comment="glibc-i18ndata-2.22-143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861584" comment="glibc-info-2.22-143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861585" comment="glibc-locale-2.22-143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861586" comment="glibc-locale-32bit-2.22-143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861587" comment="glibc-profile-2.22-143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861588" comment="glibc-profile-32bit-2.22-143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861589" comment="nscd-2.22-143.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153207" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1222535" ref_url="https://bugzilla.suse.com/1222535" source="BUGZILLA"/>
		<reference ref_id="1224056" ref_url="https://bugzilla.suse.com/1224056" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2609" ref_url="https://www.suse.com/security/cve/CVE-2024-2609/" source="CVE"/>
		<reference ref_id="CVE-2024-3302" ref_url="https://www.suse.com/security/cve/CVE-2024-3302/" source="CVE"/>
		<reference ref_id="CVE-2024-3852" ref_url="https://www.suse.com/security/cve/CVE-2024-3852/" source="CVE"/>
		<reference ref_id="CVE-2024-3854" ref_url="https://www.suse.com/security/cve/CVE-2024-3854/" source="CVE"/>
		<reference ref_id="CVE-2024-3857" ref_url="https://www.suse.com/security/cve/CVE-2024-3857/" source="CVE"/>
		<reference ref_id="CVE-2024-3859" ref_url="https://www.suse.com/security/cve/CVE-2024-3859/" source="CVE"/>
		<reference ref_id="CVE-2024-3861" ref_url="https://www.suse.com/security/cve/CVE-2024-3861/" source="CVE"/>
		<reference ref_id="CVE-2024-3863" ref_url="https://www.suse.com/security/cve/CVE-2024-3863/" source="CVE"/>
		<reference ref_id="CVE-2024-3864" ref_url="https://www.suse.com/security/cve/CVE-2024-3864/" source="CVE"/>
		<reference ref_id="CVE-2024-4367" ref_url="https://www.suse.com/security/cve/CVE-2024-4367/" source="CVE"/>
		<reference ref_id="CVE-2024-4767" ref_url="https://www.suse.com/security/cve/CVE-2024-4767/" source="CVE"/>
		<reference ref_id="CVE-2024-4768" ref_url="https://www.suse.com/security/cve/CVE-2024-4768/" source="CVE"/>
		<reference ref_id="CVE-2024-4769" ref_url="https://www.suse.com/security/cve/CVE-2024-4769/" source="CVE"/>
		<reference ref_id="CVE-2024-4770" ref_url="https://www.suse.com/security/cve/CVE-2024-4770/" source="CVE"/>
		<reference ref_id="CVE-2024-4777" ref_url="https://www.suse.com/security/cve/CVE-2024-4777/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to version 115.11.0 ESR (bsc#1224056):

- CVE-2024-4367: Arbitrary JavaScript execution in PDF.js
- CVE-2024-4767: IndexedDB files retained in private browsing mode
- CVE-2024-4768: Potential permissions request bypass via clickjacking
- CVE-2024-4769: Cross-origin responses could be distinguished between script and non-script content-types
- CVE-2024-4770: Use-after-free could occur when printing to PDF
- CVE-2024-4777: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-17"/>
	<updated date="2024-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222535">SUSE bug 1222535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224056">SUSE bug 1224056</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2609/">CVE-2024-2609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2609">CVE-2024-2609 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-3302/">CVE-2024-3302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3302">CVE-2024-3302 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3852/">CVE-2024-3852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3852">CVE-2024-3852 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3854/">CVE-2024-3854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3854">CVE-2024-3854 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3857/">CVE-2024-3857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3857">CVE-2024-3857 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3859/">CVE-2024-3859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3859">CVE-2024-3859 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3861/">CVE-2024-3861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3861">CVE-2024-3861 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-3863/">CVE-2024-3863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3863">CVE-2024-3863 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3864/">CVE-2024-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3864">CVE-2024-3864 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4367/">CVE-2024-4367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4367">CVE-2024-4367 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4767/">CVE-2024-4767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4767">CVE-2024-4767 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4768/">CVE-2024-4768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4768">CVE-2024-4768 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4769/">CVE-2024-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4769">CVE-2024-4769 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4770/">CVE-2024-4770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4770">CVE-2024-4770 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4777/">CVE-2024-4777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4777">CVE-2024-4777 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861590" comment="MozillaFirefox-115.11.0-112.212.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861560" comment="MozillaFirefox-devel-115.11.0-112.212.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861591" comment="MozillaFirefox-translations-common-115.11.0-112.212.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861590" comment="MozillaFirefox-115.11.0-112.212.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861560" comment="MozillaFirefox-devel-115.11.0-112.212.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861591" comment="MozillaFirefox-translations-common-115.11.0-112.212.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153208" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1219276" ref_url="https://bugzilla.suse.com/1219276" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48622" ref_url="https://www.suse.com/security/cve/CVE-2022-48622/" source="CVE"/>
		<description>
This update for gdk-pixbuf fixes the following issues:

- CVE-2022-48622: Fixed files rejection with multiple anih chunks (bsc#1219276).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-20"/>
	<updated date="2024-05-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219276">SUSE bug 1219276</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48622/">CVE-2022-48622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48622">CVE-2022-48622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861696" comment="gdk-pixbuf-lang-2.34.0-19.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861721" comment="gdk-pixbuf-query-loaders-2.34.0-19.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861722" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861723" comment="libgdk_pixbuf-2_0-0-2.34.0-19.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861724" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861725" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153209" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1224277" ref_url="https://bugzilla.suse.com/1224277" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45733" ref_url="https://www.suse.com/security/cve/CVE-2023-45733/" source="CVE"/>
		<reference ref_id="CVE-2023-45745" ref_url="https://www.suse.com/security/cve/CVE-2023-45745/" source="CVE"/>
		<reference ref_id="CVE-2023-46103" ref_url="https://www.suse.com/security/cve/CVE-2023-46103/" source="CVE"/>
		<reference ref_id="CVE-2023-47855" ref_url="https://www.suse.com/security/cve/CVE-2023-47855/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

Intel CPU Microcode was updated to the 20240514 release (bsc#1224277)

- CVE-2023-45733: Fixed a potential security vulnerability in some
  Intel? Processors that may have allowed information disclosure.
- CVE-2023-46103: Fixed a potential security vulnerability in Intel?
  Core™ Ultra Processors that may have allowed denial of service.
- CVE-2023-45745,CVE-2023-47855: Fixed a potential security
  vulnerabilities in some Intel? Trust Domain Extensions (TDX) module
  software that may have allowed escalation of privilege.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-20"/>
	<updated date="2024-05-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1224277">SUSE bug 1224277</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45733/">CVE-2023-45733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45733">CVE-2023-45733 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45745/">CVE-2023-45745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45745">CVE-2023-45745 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46103/">CVE-2023-46103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46103">CVE-2023-46103 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-47855/">CVE-2023-47855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47855">CVE-2023-47855 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861726" comment="ucode-intel-20240514-13.124.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861726" comment="ucode-intel-20240514-13.124.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153210" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1224038" ref_url="https://bugzilla.suse.com/1224038" source="BUGZILLA"/>
		<reference ref_id="1224051" ref_url="https://bugzilla.suse.com/1224051" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4317" ref_url="https://www.suse.com/security/cve/CVE-2024-4317/" source="CVE"/>
		<description>
This update for postgresql14 fixes the following issues:

PostgreSQL upgrade to version 14.12 (bsc#1224051):

- CVE-2024-4317: Fixed visibility restriction of pg_stats_ext and pg_stats_ext_exprs entries to the table owner (bsc#1224038).

Bug fixes:

- Fix incompatibility with LLVM 18.
- Prepare for PostgreSQL 17.
- Make sure all compilation and doc generation happens in %build.
- Require LLVM &lt;= 17 for now, because LLVM 18 doesn't seem to work.
- Remove constraints file because improved memory usage for s390x
- Use %patch -P N instead of deprecated %patchN.

Release notes:

- https://www.postgresql.org/docs/release/14.12/
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-20"/>
	<updated date="2024-05-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1224038">SUSE bug 1224038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224051">SUSE bug 1224051</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-4317/">CVE-2024-4317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4317">CVE-2024-4317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861727" comment="postgresql14-14.12-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861728" comment="postgresql14-contrib-14.12-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861729" comment="postgresql14-devel-14.12-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861716" comment="postgresql14-docs-14.12-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861730" comment="postgresql14-llvmjit-devel-14.12-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861731" comment="postgresql14-plperl-14.12-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861732" comment="postgresql14-plpython-14.12-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861733" comment="postgresql14-pltcl-14.12-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861734" comment="postgresql14-server-14.12-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861735" comment="postgresql14-server-devel-14.12-3.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153211" version="1" class="patch">
	<metadata>
		<title>Security update for libosinfo (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1140749" ref_url="https://bugzilla.suse.com/1140749" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13313" ref_url="https://www.suse.com/security/cve/CVE-2019-13313/" source="CVE"/>
		<description>
This update for libosinfo fixes the following issues:

- CVE-2019-13313: Fixed password leak via command line argument inside osinfo-install-script (bsc#1140749).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1140749">SUSE bug 1140749</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13313/">CVE-2019-13313 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13313">CVE-2019-13313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861817" comment="libosinfo-1.0.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861818" comment="libosinfo-1_0-0-1.0.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861819" comment="libosinfo-lang-1.0.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861820" comment="typelib-1_0-Libosinfo-1_0-1.0.0-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153212" version="1" class="patch">
	<metadata>
		<title>Security update for python36 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1219559" ref_url="https://bugzilla.suse.com/1219559" source="BUGZILLA"/>
		<reference ref_id="1220664" ref_url="https://bugzilla.suse.com/1220664" source="BUGZILLA"/>
		<reference ref_id="1221563" ref_url="https://bugzilla.suse.com/1221563" source="BUGZILLA"/>
		<reference ref_id="1221854" ref_url="https://bugzilla.suse.com/1221854" source="BUGZILLA"/>
		<reference ref_id="1222075" ref_url="https://bugzilla.suse.com/1222075" source="BUGZILLA"/>
		<reference ref_id="1222109" ref_url="https://bugzilla.suse.com/1222109" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<reference ref_id="CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450/" source="CVE"/>
		<description>
This update for python36 fixes the following issues:

- CVE-2023-52425: Fixed backport so it uses features sniffing, not just comparing version number (bsc#1219559).
- CVE-2024-0450: Fixed detecting the vulnerability of 'quoted-overlap' zipbomb (bsc#1221854).

Bug fixes:

- Fixed syslog making default 'ident from sys.argv[0] (bsc#1222109).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219559">SUSE bug 1219559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220664">SUSE bug 1220664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221563">SUSE bug 1221563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221854">SUSE bug 1221854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222075">SUSE bug 1222075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222109">SUSE bug 1222109</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009862058" comment="libpython3_6m1_0-3.6.15-6.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862059" comment="python36-3.6.15-6.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862060" comment="python36-base-3.6.15-6.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862061" comment="python36-curses-3.6.15-6.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862062" comment="python36-dbm-3.6.15-6.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862063" comment="python36-devel-3.6.15-6.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862064" comment="python36-idle-3.6.15-6.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862065" comment="python36-testsuite-3.6.15-6.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862066" comment="python36-tk-3.6.15-6.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862067" comment="python36-tools-3.6.15-6.103.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153213" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1221854" ref_url="https://bugzilla.suse.com/1221854" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2024-0450: Fixed detecting the vulnerability of 'quoted-overlap' zipbomb (bsc#1221854).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1221854">SUSE bug 1221854</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009862068" comment="libpython2_7-1_0-2.7.18-28.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862069" comment="libpython2_7-1_0-32bit-2.7.18-28.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862070" comment="python-2.7.18-28.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862071" comment="python-32bit-2.7.18-28.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862072" comment="python-base-2.7.18-28.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862073" comment="python-base-32bit-2.7.18-28.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862074" comment="python-curses-2.7.18-28.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862075" comment="python-demo-2.7.18-28.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862076" comment="python-devel-2.7.18-28.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862077" comment="python-doc-2.7.18-28.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862078" comment="python-doc-pdf-2.7.18-28.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862079" comment="python-gdbm-2.7.18-28.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862080" comment="python-idle-2.7.18-28.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862081" comment="python-tk-2.7.18-28.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862082" comment="python-xml-2.7.18-28.114.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153214" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1224044" ref_url="https://bugzilla.suse.com/1224044" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34397" ref_url="https://www.suse.com/security/cve/CVE-2024-34397/" source="CVE"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2024-34397: Fixed signal subscription unicast spoofing vulnerability (bsc#1224044).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-05-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1224044">SUSE bug 1224044</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34397/">CVE-2024-34397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34397">CVE-2024-34397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009862976" comment="glib2-lang-2.48.2-12.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863138" comment="glib2-tools-2.48.2-12.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863139" comment="libgio-2_0-0-2.48.2-12.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863140" comment="libgio-2_0-0-32bit-2.48.2-12.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863141" comment="libglib-2_0-0-2.48.2-12.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863142" comment="libglib-2_0-0-32bit-2.48.2-12.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863143" comment="libgmodule-2_0-0-2.48.2-12.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863144" comment="libgmodule-2_0-0-32bit-2.48.2-12.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863145" comment="libgobject-2_0-0-2.48.2-12.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863146" comment="libgobject-2_0-0-32bit-2.48.2-12.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863147" comment="libgthread-2_0-0-2.48.2-12.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863148" comment="libgthread-2_0-0-32bit-2.48.2-12.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153215" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1221854" ref_url="https://bugzilla.suse.com/1221854" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2024-0450: Fixed detecting the vulnerability of 'quoted-overlap' zipbomb (bsc#1221854).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-05-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1221854">SUSE bug 1221854</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009863149" comment="libpython3_4m1_0-3.4.10-25.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863150" comment="python3-3.4.10-25.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863151" comment="python3-base-3.4.10-25.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863152" comment="python3-curses-3.4.10-25.130.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153216" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1222979" ref_url="https://bugzilla.suse.com/1222979" source="BUGZILLA"/>
		<reference ref_id="1222983" ref_url="https://bugzilla.suse.com/1222983" source="BUGZILLA"/>
		<reference ref_id="1222984" ref_url="https://bugzilla.suse.com/1222984" source="BUGZILLA"/>
		<reference ref_id="1222986" ref_url="https://bugzilla.suse.com/1222986" source="BUGZILLA"/>
		<reference ref_id="1222987" ref_url="https://bugzilla.suse.com/1222987" source="BUGZILLA"/>
		<reference ref_id="1223470" ref_url="https://bugzilla.suse.com/1223470" source="BUGZILLA"/>
		<reference ref_id="1224164" ref_url="https://bugzilla.suse.com/1224164" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38264" ref_url="https://www.suse.com/security/cve/CVE-2023-38264/" source="CVE"/>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21012" ref_url="https://www.suse.com/security/cve/CVE-2024-21012/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<reference ref_id="CVE-2024-21085" ref_url="https://www.suse.com/security/cve/CVE-2024-21085/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 8 Fix Pack 25 (bsc#1223470):

- CVE-2023-38264: Fixed Object Request Broker (ORB) denial of service (bsc#1224164). 
- CVE-2024-21094: Fixed C2 compilation fails with 'Exceeded _node_regs array' (bsc#1222986). 
- CVE-2024-21068: Fixed integer overflow in C1 compiler address generation (bsc#1222983). 
- CVE-2024-21085: Fixed Pack200 excessive memory allocation (bsc#1222984).
- CVE-2024-21011: Fixed Long Exception message leading to crash (bsc#1222979). 
- CVE-2024-21012: Fixed HTTP/2 client improper reverse DNS lookup (bsc#1222987). 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-05-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222979">SUSE bug 1222979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222983">SUSE bug 1222983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222984">SUSE bug 1222984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222986">SUSE bug 1222986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222987">SUSE bug 1222987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223470">SUSE bug 1223470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224164">SUSE bug 1224164</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38264/">CVE-2023-38264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38264">CVE-2023-38264 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21012/">CVE-2024-21012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21012">CVE-2024-21012 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21085/">CVE-2024-21085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21085">CVE-2024-21085 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009863153" comment="java-1_8_0-ibm-1.8.0_sr8.25-30.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863016" comment="java-1_8_0-ibm-alsa-1.8.0_sr8.25-30.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863154" comment="java-1_8_0-ibm-devel-1.8.0_sr8.25-30.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863017" comment="java-1_8_0-ibm-plugin-1.8.0_sr8.25-30.123.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009863153" comment="java-1_8_0-ibm-1.8.0_sr8.25-30.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863016" comment="java-1_8_0-ibm-alsa-1.8.0_sr8.25-30.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863154" comment="java-1_8_0-ibm-devel-1.8.0_sr8.25-30.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863017" comment="java-1_8_0-ibm-plugin-1.8.0_sr8.25-30.123.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153217" version="1" class="patch">
	<metadata>
		<title>Security update for libfastjson (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1171479" ref_url="https://bugzilla.suse.com/1171479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12762" ref_url="https://www.suse.com/security/cve/CVE-2020-12762/" source="CVE"/>
		<description>
This update for libfastjson fixes the following issues:

- CVE-2020-12762: Fixed integer overflow and out-of-bounds write via a large JSON file (bsc#1171479).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-05-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171479">SUSE bug 1171479</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12762/">CVE-2020-12762 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12762">CVE-2020-12762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863155" comment="libfastjson4-0.99.8-3.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863155" comment="libfastjson4-0.99.8-3.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153218" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1225417" ref_url="https://bugzilla.suse.com/1225417" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-33427" ref_url="https://www.suse.com/security/cve/CVE-2024-33427/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2024-33427: Fixed possible buffer overread that could have led to a denial-of-service (bsc#1225417).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1225417">SUSE bug 1225417</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33427/">CVE-2024-33427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33427">CVE-2024-33427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863393" comment="squid-4.17-30.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153219" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1212233" ref_url="https://bugzilla.suse.com/1212233" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3164" ref_url="https://www.suse.com/security/cve/CVE-2023-3164/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2023-3164: Fixed a heap buffer overflow in tiffcrop. (bsc#1212233)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-03"/>
	<updated date="2024-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212233">SUSE bug 1212233</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3164/">CVE-2023-3164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3164">CVE-2023-3164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009864000" comment="libtiff5-4.0.9-44.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864001" comment="libtiff5-32bit-4.0.9-44.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864002" comment="tiff-4.0.9-44.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153220" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1224806" ref_url="https://bugzilla.suse.com/1224806" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4453" ref_url="https://www.suse.com/security/cve/CVE-2024-4453/" source="CVE"/>
		<description>
This update for gstreamer-plugins-base fixes the following issues:

- CVE-2024-4453: Fixed lack of proper validation of user-supplied data when parsing EXIF metadata (bsc#1224806)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-03"/>
	<updated date="2024-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1224806">SUSE bug 1224806</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4453/">CVE-2024-4453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4453">CVE-2024-4453 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009864003" comment="gstreamer-plugins-base-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863891" comment="gstreamer-plugins-base-lang-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864004" comment="libgstallocators-1_0-0-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864005" comment="libgstapp-1_0-0-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864006" comment="libgstapp-1_0-0-32bit-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864007" comment="libgstaudio-1_0-0-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864008" comment="libgstaudio-1_0-0-32bit-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864009" comment="libgstfft-1_0-0-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864010" comment="libgstpbutils-1_0-0-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864011" comment="libgstpbutils-1_0-0-32bit-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864012" comment="libgstriff-1_0-0-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864013" comment="libgstrtp-1_0-0-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864014" comment="libgstrtsp-1_0-0-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864015" comment="libgstsdp-1_0-0-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864016" comment="libgsttag-1_0-0-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864017" comment="libgsttag-1_0-0-32bit-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864018" comment="libgstvideo-1_0-0-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864019" comment="libgstvideo-1_0-0-32bit-1.8.3-13.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009864003" comment="gstreamer-plugins-base-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863891" comment="gstreamer-plugins-base-lang-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864004" comment="libgstallocators-1_0-0-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864005" comment="libgstapp-1_0-0-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864006" comment="libgstapp-1_0-0-32bit-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864007" comment="libgstaudio-1_0-0-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864008" comment="libgstaudio-1_0-0-32bit-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864009" comment="libgstfft-1_0-0-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864010" comment="libgstpbutils-1_0-0-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864011" comment="libgstpbutils-1_0-0-32bit-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864012" comment="libgstriff-1_0-0-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864013" comment="libgstrtp-1_0-0-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864014" comment="libgstrtsp-1_0-0-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864015" comment="libgstsdp-1_0-0-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864016" comment="libgsttag-1_0-0-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864017" comment="libgsttag-1_0-0-32bit-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864018" comment="libgstvideo-1_0-0-1.8.3-13.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864019" comment="libgstvideo-1_0-0-32bit-1.8.3-13.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153221" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1223375" ref_url="https://bugzilla.suse.com/1223375" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4141" ref_url="https://www.suse.com/security/cve/CVE-2024-4141/" source="CVE"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2024-4141: Fixed out-of-bounds array write (bsc#1223375).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-03"/>
	<updated date="2024-06-03"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1223375">SUSE bug 1223375</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4141/">CVE-2024-4141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4141">CVE-2024-4141 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009864020" comment="libpoppler-glib8-0.43.0-16.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864021" comment="libpoppler-qt4-4-0.43.0-16.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864022" comment="libpoppler60-0.43.0-16.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864023" comment="poppler-tools-0.43.0-16.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153222" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1217649" ref_url="https://bugzilla.suse.com/1217649" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46589" ref_url="https://www.suse.com/security/cve/CVE-2023-46589/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

Security fixes:

 - CVE-2023-46589: Fixed HTTP request smuggling due to incorrect headers parsing. (bsc#1217649)

Other fixes:

- Streamline how patches are handled in the spec file of the package
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2024-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217649">SUSE bug 1217649</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46589/">CVE-2023-46589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46589">CVE-2023-46589 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844420" comment="tomcat-8.0.53-29.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844421" comment="tomcat-admin-webapps-8.0.53-29.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844422" comment="tomcat-docs-webapp-8.0.53-29.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844423" comment="tomcat-el-3_0-api-8.0.53-29.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844424" comment="tomcat-javadoc-8.0.53-29.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844425" comment="tomcat-jsp-2_3-api-8.0.53-29.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844426" comment="tomcat-lib-8.0.53-29.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844427" comment="tomcat-servlet-3_1-api-8.0.53-29.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844428" comment="tomcat-webapps-8.0.53-29.77.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844420" comment="tomcat-8.0.53-29.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844421" comment="tomcat-admin-webapps-8.0.53-29.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844422" comment="tomcat-docs-webapp-8.0.53-29.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844423" comment="tomcat-el-3_0-api-8.0.53-29.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844424" comment="tomcat-javadoc-8.0.53-29.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844425" comment="tomcat-jsp-2_3-api-8.0.53-29.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844426" comment="tomcat-lib-8.0.53-29.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844427" comment="tomcat-servlet-3_1-api-8.0.53-29.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844428" comment="tomcat-webapps-8.0.53-29.77.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153223" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1218955" ref_url="https://bugzilla.suse.com/1218955" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0741" ref_url="https://www.suse.com/security/cve/CVE-2024-0741/" source="CVE"/>
		<reference ref_id="CVE-2024-0742" ref_url="https://www.suse.com/security/cve/CVE-2024-0742/" source="CVE"/>
		<reference ref_id="CVE-2024-0746" ref_url="https://www.suse.com/security/cve/CVE-2024-0746/" source="CVE"/>
		<reference ref_id="CVE-2024-0747" ref_url="https://www.suse.com/security/cve/CVE-2024-0747/" source="CVE"/>
		<reference ref_id="CVE-2024-0749" ref_url="https://www.suse.com/security/cve/CVE-2024-0749/" source="CVE"/>
		<reference ref_id="CVE-2024-0750" ref_url="https://www.suse.com/security/cve/CVE-2024-0750/" source="CVE"/>
		<reference ref_id="CVE-2024-0751" ref_url="https://www.suse.com/security/cve/CVE-2024-0751/" source="CVE"/>
		<reference ref_id="CVE-2024-0753" ref_url="https://www.suse.com/security/cve/CVE-2024-0753/" source="CVE"/>
		<reference ref_id="CVE-2024-0755" ref_url="https://www.suse.com/security/cve/CVE-2024-0755/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 115.7.0 ESR (MFSA 2024-02) (bsc#1218955):
    
- CVE-2024-0741: Out of bounds write in ANGLE
- CVE-2024-0742: Failure to update user input timestamp
- CVE-2024-0746: Crash when listing printers on Linux
- CVE-2024-0747: Bypass of Content Security Policy when directive unsafe-inline was set
- CVE-2024-0749: Phishing site popup could show local origin in address bar
- CVE-2024-0750: Potential permissions request bypass via clickjacking
- CVE-2024-0751: Privilege escalation through devtools
- CVE-2024-0753: HSTS policy on subdomain could bypass policy of upper domain
- CVE-2024-0755: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7  
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2024-01-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0741/">CVE-2024-0741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0741">CVE-2024-0741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0742/">CVE-2024-0742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0742">CVE-2024-0742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0746/">CVE-2024-0746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0746">CVE-2024-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0747/">CVE-2024-0747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0747">CVE-2024-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0749/">CVE-2024-0749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0749">CVE-2024-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0750/">CVE-2024-0750 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0750">CVE-2024-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0751/">CVE-2024-0751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0751">CVE-2024-0751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0753/">CVE-2024-0753 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0753">CVE-2024-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0755/">CVE-2024-0755 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0755">CVE-2024-0755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844429" comment="MozillaFirefox-115.7.0-112.197.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844396" comment="MozillaFirefox-devel-115.7.0-112.197.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844430" comment="MozillaFirefox-translations-common-115.7.0-112.197.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844429" comment="MozillaFirefox-115.7.0-112.197.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844396" comment="MozillaFirefox-devel-115.7.0-112.197.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844430" comment="MozillaFirefox-translations-common-115.7.0-112.197.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153224" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122729" ref_url="https://bugzilla.suse.com/1122729" source="BUGZILLA"/>
		<reference ref_id="1215286" ref_url="https://bugzilla.suse.com/1215286" source="BUGZILLA"/>
		<reference ref_id="1215504" ref_url="https://bugzilla.suse.com/1215504" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10739" ref_url="https://www.suse.com/security/cve/CVE-2016-10739/" source="CVE"/>
		<reference ref_id="CVE-2023-4813" ref_url="https://www.suse.com/security/cve/CVE-2023-4813/" source="CVE"/>
		<description>

This update of glibc fixes the following issues:

- CVE-2023-4813: Fixed a potential use-after-free in gaih_inet() (bsc#1215286, BZ #28931)
- CVE-2016-10739: getaddrinfo: Fully parse IPv4 address strings (bsc#1122729, BZ #20018)

- S390: Fix relocation of _nl_current_LC_CATETORY_used in static build (bsc#1215504, BZ #19860)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-04"/>
	<updated date="2024-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122729">SUSE bug 1122729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215286">SUSE bug 1215286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215504">SUSE bug 1215504</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10739/">CVE-2016-10739 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10739">CVE-2016-10739 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4813/">CVE-2023-4813 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4813">CVE-2023-4813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009800205" comment="glibc-2.22-140.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800206" comment="glibc-32bit-2.22-140.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800207" comment="glibc-devel-2.22-140.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800208" comment="glibc-devel-32bit-2.22-140.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800209" comment="glibc-html-2.22-140.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800210" comment="glibc-i18ndata-2.22-140.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800211" comment="glibc-info-2.22-140.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800212" comment="glibc-locale-2.22-140.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800213" comment="glibc-locale-32bit-2.22-140.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800214" comment="glibc-profile-2.22-140.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800215" comment="glibc-profile-32bit-2.22-140.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800216" comment="nscd-2.22-140.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153225" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1218802" ref_url="https://bugzilla.suse.com/1218802" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-51257" ref_url="https://www.suse.com/security/cve/CVE-2023-51257/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2023-51257: Fixed an out of bounds write in the JPC encoder (bsc#1218802).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-26"/>
	<updated date="2024-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218802">SUSE bug 1218802</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-51257/">CVE-2023-51257 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51257">CVE-2023-51257 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844675" comment="libjasper1-1.900.14-195.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844676" comment="libjasper1-32bit-1.900.14-195.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153226" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1218571" ref_url="https://bugzilla.suse.com/1218571" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-7207" ref_url="https://www.suse.com/security/cve/CVE-2023-7207/" source="CVE"/>
		<description>
This update for cpio fixes the following issues:

- CVE-2023-7207: Fixed a path traversal issue that could lead to an
  arbitrary file write during archive extraction (bsc#1218571).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-26"/>
	<updated date="2024-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218571">SUSE bug 1218571</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-7207/">CVE-2023-7207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-7207">CVE-2023-7207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009819463" comment="cpio-2.11-36.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819459" comment="cpio-lang-2.11-36.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153227" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1217654" ref_url="https://bugzilla.suse.com/1217654" source="BUGZILLA"/>
		<reference ref_id="1219131" ref_url="https://bugzilla.suse.com/1219131" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50269" ref_url="https://www.suse.com/security/cve/CVE-2023-50269/" source="CVE"/>
		<reference ref_id="CVE-2024-23638" ref_url="https://www.suse.com/security/cve/CVE-2024-23638/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2023-50269: fixed X-Forwarded-For Stack Overflow. (bsc#1217654)
- CVE-2024-23638: fixed Denial of Service attack against Cache Manager error responses. (bsc#1219131)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-29"/>
	<updated date="2024-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217654">SUSE bug 1217654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219131">SUSE bug 1219131</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50269/">CVE-2023-50269 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50269">CVE-2023-50269 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23638/">CVE-2024-23638 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23638">CVE-2024-23638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844690" comment="squid-4.17-30.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153228" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1218851" ref_url="https://bugzilla.suse.com/1218851" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46839" ref_url="https://www.suse.com/security/cve/CVE-2023-46839/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-46839: Fixed phantom functions assigned to incorrect contexts (XSA-449) (bsc#1218851)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-30"/>
	<updated date="2024-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218851">SUSE bug 1218851</bugzilla>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46839/">CVE-2023-46839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46839">CVE-2023-46839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844770" comment="xen-4.9.4_48-3.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844771" comment="xen-doc-html-4.9.4_48-3.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844772" comment="xen-libs-4.9.4_48-3.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844773" comment="xen-libs-32bit-4.9.4_48-3.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844774" comment="xen-tools-4.9.4_48-3.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844775" comment="xen-tools-domU-4.9.4_48-3.135.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844770" comment="xen-4.9.4_48-3.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844771" comment="xen-doc-html-4.9.4_48-3.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844772" comment="xen-libs-4.9.4_48-3.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844773" comment="xen-libs-32bit-4.9.4_48-3.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844774" comment="xen-tools-4.9.4_48-3.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844775" comment="xen-tools-domU-4.9.4_48-3.135.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153229" version="1" class="patch">
	<metadata>
		<title>Security update for python36-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216377" ref_url="https://bugzilla.suse.com/1216377" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45803" ref_url="https://www.suse.com/security/cve/CVE-2023-45803/" source="CVE"/>
		<description>
This update for python36-urllib3 fixes the following issues:

- CVE-2023-45803: Fixed request body not stripped after redirect from 303 status changes request method to GET. (bsc#1216377)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-31"/>
	<updated date="2024-01-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216377">SUSE bug 1216377</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45803/">CVE-2023-45803 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45803">CVE-2023-45803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845114" comment="python36-urllib3-1.25.10-6.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153230" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
		</affected>
		<reference ref_id="1217654" ref_url="https://bugzilla.suse.com/1217654" source="BUGZILLA"/>
		<reference ref_id="1219131" ref_url="https://bugzilla.suse.com/1219131" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50269" ref_url="https://www.suse.com/security/cve/CVE-2023-50269/" source="CVE"/>
		<reference ref_id="CVE-2024-23638" ref_url="https://www.suse.com/security/cve/CVE-2024-23638/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2023-50269: fixed X-Forwarded-For Stack Overflow. (bsc#1217654)
- CVE-2024-23638: fixed Denial of Service attack against Cache Manager error responses. (bsc#1219131)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-31"/>
	<updated date="2024-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217654">SUSE bug 1217654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219131">SUSE bug 1219131</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50269/">CVE-2023-50269 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50269">CVE-2023-50269 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23638/">CVE-2024-23638 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23638">CVE-2024-23638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845115" comment="squid-3.5.21-26.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153231" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-c (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159552" ref_url="https://bugzilla.suse.com/1159552" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1311" ref_url="https://www.suse.com/security/cve/CVE-2018-1311/" source="CVE"/>
		<description>
This update for xerces-c fixes the following issues:

- CVE-2018-1311: fixed use-after-free triggered during the scanning of external DTDs potentially leading to DOS. (bsc#1159552)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-01"/>
	<updated date="2024-02-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159552">SUSE bug 1159552</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1311/">CVE-2018-1311 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1311">CVE-2018-1311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009845223" comment="libxerces-c-3_1-3.1.1-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845224" comment="libxerces-c-3_1-32bit-3.1.1-13.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009845223" comment="libxerces-c-3_1-3.1.1-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845224" comment="libxerces-c-3_1-32bit-3.1.1-13.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153232" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215796" ref_url="https://bugzilla.suse.com/1215796" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40474" ref_url="https://www.suse.com/security/cve/CVE-2023-40474/" source="CVE"/>
		<description>
This update for gstreamer fixes the following issues:

- CVE-2023-40474: Fixed an integer overflow during MXF file parsing (bsc#1215796).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-01"/>
	<updated date="2024-02-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215796">SUSE bug 1215796</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40474/">CVE-2023-40474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-40474">CVE-2023-40474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009845225" comment="gstreamer-1.8.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845214" comment="gstreamer-lang-1.8.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845226" comment="gstreamer-utils-1.8.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845227" comment="libgstreamer-1_0-0-1.8.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845228" comment="libgstreamer-1_0-0-32bit-1.8.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845229" comment="typelib-1_0-Gst-1_0-1.8.3-10.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009845225" comment="gstreamer-1.8.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845214" comment="gstreamer-lang-1.8.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845226" comment="gstreamer-utils-1.8.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845227" comment="libgstreamer-1_0-0-1.8.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845228" comment="libgstreamer-1_0-0-32bit-1.8.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845229" comment="typelib-1_0-Gst-1_0-1.8.3-10.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153233" version="1" class="patch">
	<metadata>
		<title>Security update for open-vm-tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216432" ref_url="https://bugzilla.suse.com/1216432" source="BUGZILLA"/>
		<reference ref_id="1216433" ref_url="https://bugzilla.suse.com/1216433" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34058" ref_url="https://www.suse.com/security/cve/CVE-2023-34058/" source="CVE"/>
		<reference ref_id="CVE-2023-34059" ref_url="https://www.suse.com/security/cve/CVE-2023-34059/" source="CVE"/>
		<description>
This update for open-vm-tools fixes the following issues:

- CVE-2023-34058: Fixed a SAML token signature bypass (bsc#1216432).
- CVE-2023-34059: Fixed a file descriptor hijacking issue in
  vmware-user-suid-wrapper (bsc#1216433).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-01"/>
	<updated date="2024-02-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216432">SUSE bug 1216432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216433">SUSE bug 1216433</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34058/">CVE-2023-34058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34058">CVE-2023-34058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-34059/">CVE-2023-34059 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34059">CVE-2023-34059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009845230" comment="libvmtools0-10.3.10-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845231" comment="open-vm-tools-10.3.10-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845232" comment="open-vm-tools-desktop-10.3.10-3.41.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009845230" comment="libvmtools0-10.3.10-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845231" comment="open-vm-tools-10.3.10-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845232" comment="open-vm-tools-desktop-10.3.10-3.41.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153234" version="1" class="patch">
	<metadata>
		<title>Security update for gdb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1068950" ref_url="https://bugzilla.suse.com/1068950" source="BUGZILLA"/>
		<reference ref_id="1081527" ref_url="https://bugzilla.suse.com/1081527" source="BUGZILLA"/>
		<reference ref_id="1211052" ref_url="https://bugzilla.suse.com/1211052" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16829" ref_url="https://www.suse.com/security/cve/CVE-2017-16829/" source="CVE"/>
		<reference ref_id="CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208/" source="CVE"/>
		<reference ref_id="CVE-2022-48064" ref_url="https://www.suse.com/security/cve/CVE-2022-48064/" source="CVE"/>
		<description>
This update for gdb fixes the following issues:

- Drop libdebuginfod1 BuildRequires/Recommends. The former isn't
  needed because there's a build requirement on libdebuginfod-devel
  already, which will pull the shared library. And the latter,
  because it's bogus since RPM auto generated dependency will take
  care of that requirement.

gdb was released in 13.2:

* This version of GDB includes the following changes and enhancements:

  * Support for the following new targets has been added in both GDB and GDBserver:

        * GNU/Linux/LoongArch (gdbserver) loongarch*-*-linux*
        * GNU/Linux/CSKY (gdbserver) csky*-*linux* 

  * The Windows native target now supports target async.
  * Floating-point support has now been added on LoongArch GNU/Linux.
  * New commands:

        * set print nibbles [on|off]
        * show print nibbles

        * This controls whether the 'print/t' command will display binary values in groups of four bits, known as 'nibbles'. The default is 'off'.
          Various styling-related commands. See the gdb/NEWS file for more details.
          Various maintenance commands. These are normally aimed at GDB experts or developers. See the gdb/NEWS file for more details. 

  * Python API improvements:

          * New Python API for instruction disassembly.

          * The new attribute 'locations' of gdb.Breakpoint returns a list of gdb.BreakpointLocation objects specifying the locations where the breakpoint is inserted into the debuggee.
          * New Python type gdb.BreakpointLocation.
          * New function gdb.format_address(ADDRESS, PROGSPACE, ARCHITECTURE) that formats ADDRESS as 'address '
          * New function gdb.current_language that returns the name of the current language. Unlike gdb.parameter('language'), this will never return 'auto'.
          * New function gdb.print_options that returns a dictionary of the prevailing print options, in the form accepted by gdb.Value.format_string.
          * New method gdb.Frame.language that returns the name of the frame's language.
          * gdb.Value.format_string now uses the format provided by 'print', if it is called during a 'print' or other similar operation.
          * gdb.Value.format_string now accepts the 'summary' keyword. This can be used to request a shorter representation of a value, the way that 'set print frame-arguments scalars' does.
          * The gdb.register_window_type method now restricts the set of acceptable window names. The first character of a window's name must start with a character in the set [a-zA-Z], every subsequent character of a window's name must be in the set [-_.a-zA-Z0-9]. 
   * GDB/MI changes:

          * MI version 1 is deprecated, and will be removed in GDB 14.
          * The async record stating the stopped reason 'breakpoint-hit' now contains an optional field locno. 

   * Miscellaneous improvements:

          * gdb now supports zstd compressed debug sections (ELFCOMPRESS_ZSTD) for ELF.
          * New convenience variable $_inferior_thread_count contains the number of live threads in the current inferior.
          * New convenience variables $_hit_bpnum and $_hit_locno, set to the breakpoint number and the breakpoint location number of the breakpoint last hit.
          * The 'info breakpoints' now displays enabled breakpoint locations of disabled breakpoints as in the 'y-' state.
          * The format of 'disassemble /r' and 'record instruction-history /r' has changed to match the layout of GNU objdump when disassembling.

          * A new format '/b' has been introduce to provide the old behavior of '/r'.
          * The TUI no longer styles the source and assembly code highlighted by the current position indicator by default. You can however re-enable styling using the new 'set style tui-current-position' command.
          * It is now possible to use the 'document' command to document user-defined commands.
          * Support for memory tag data for AArch64 MTE. 

   * Support Removal notices:

          * DBX mode has been removed.
          * Support for building against Python version 2 has been removed. It is now only possible to build GDB against Python 3.
          * Support for the following commands has been removed:

          * set debug aix-solib on|off
          * show debug aix-solib
          * set debug solib-frv on|off
          * show debug solib-frv

          * Use the 'set/show debug solib' commands instead. 

See the NEWS file for a more complete and detailed list of what this release includes. 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-20"/>
	<updated date="2024-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068950">SUSE bug 1068950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081527">SUSE bug 1081527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211052">SUSE bug 1211052</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16829/">CVE-2017-16829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16829">CVE-2017-16829 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7208">CVE-2018-7208 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48064/">CVE-2022-48064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48064">CVE-2022-48064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845467" comment="gdb-13.2-2.23.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845467" comment="gdb-13.2-2.23.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153235" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210638" ref_url="https://bugzilla.suse.com/1210638" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2023-27043: Fixed incorrectly parses e-mail addresses which contain a special character (bsc#1210638).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-05"/>
	<updated date="2024-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210638">SUSE bug 1210638</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009845659" comment="libpython2_7-1_0-2.7.18-28.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845660" comment="libpython2_7-1_0-32bit-2.7.18-28.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845661" comment="python-2.7.18-28.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845662" comment="python-32bit-2.7.18-28.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845663" comment="python-base-2.7.18-28.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845664" comment="python-base-32bit-2.7.18-28.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845665" comment="python-curses-2.7.18-28.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845666" comment="python-demo-2.7.18-28.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845667" comment="python-devel-2.7.18-28.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845668" comment="python-doc-2.7.18-28.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845669" comment="python-doc-pdf-2.7.18-28.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845670" comment="python-gdbm-2.7.18-28.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845671" comment="python-idle-2.7.18-28.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845672" comment="python-tk-2.7.18-28.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845673" comment="python-xml-2.7.18-28.108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153236" version="1" class="patch">
	<metadata>
		<title>Security update for python36 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210638" ref_url="https://bugzilla.suse.com/1210638" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<description>
This update for python36 fixes the following issues:

- CVE-2023-27043: Fixed incorrectly parses e-mail addresses which contain a special character (bsc#1210638).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-06"/>
	<updated date="2024-02-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210638">SUSE bug 1210638</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009845802" comment="libpython3_6m1_0-3.6.15-6.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845803" comment="python36-3.6.15-6.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845804" comment="python36-base-3.6.15-6.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845805" comment="python36-curses-3.6.15-6.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845806" comment="python36-dbm-3.6.15-6.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845807" comment="python36-devel-3.6.15-6.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845808" comment="python36-idle-3.6.15-6.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845809" comment="python36-testsuite-3.6.15-6.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845810" comment="python36-tk-3.6.15-6.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845811" comment="python36-tools-3.6.15-6.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153237" version="1" class="patch">
	<metadata>
		<title>Security update for libxkbcommon (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1105832" ref_url="https://bugzilla.suse.com/1105832" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15853" ref_url="https://www.suse.com/security/cve/CVE-2018-15853/" source="CVE"/>
		<reference ref_id="CVE-2018-15854" ref_url="https://www.suse.com/security/cve/CVE-2018-15854/" source="CVE"/>
		<reference ref_id="CVE-2018-15855" ref_url="https://www.suse.com/security/cve/CVE-2018-15855/" source="CVE"/>
		<reference ref_id="CVE-2018-15856" ref_url="https://www.suse.com/security/cve/CVE-2018-15856/" source="CVE"/>
		<reference ref_id="CVE-2018-15857" ref_url="https://www.suse.com/security/cve/CVE-2018-15857/" source="CVE"/>
		<reference ref_id="CVE-2018-15858" ref_url="https://www.suse.com/security/cve/CVE-2018-15858/" source="CVE"/>
		<reference ref_id="CVE-2018-15859" ref_url="https://www.suse.com/security/cve/CVE-2018-15859/" source="CVE"/>
		<reference ref_id="CVE-2018-15861" ref_url="https://www.suse.com/security/cve/CVE-2018-15861/" source="CVE"/>
		<reference ref_id="CVE-2018-15862" ref_url="https://www.suse.com/security/cve/CVE-2018-15862/" source="CVE"/>
		<reference ref_id="CVE-2018-15863" ref_url="https://www.suse.com/security/cve/CVE-2018-15863/" source="CVE"/>
		<reference ref_id="CVE-2018-15864" ref_url="https://www.suse.com/security/cve/CVE-2018-15864/" source="CVE"/>
		<description>
This update for libxkbcommon fixes the following issues:

Fixed multiple memory handling and correctness issues (bsc#1105832):

- CVE-2018-15859
- CVE-2018-15856
- CVE-2018-15858
- CVE-2018-15864
- CVE-2018-15863
- CVE-2018-15862
- CVE-2018-15861
- CVE-2018-15855
- CVE-2018-15854
- CVE-2018-15857
- CVE-2018-15853
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-05"/>
	<updated date="2024-01-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15853/">CVE-2018-15853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15853">CVE-2018-15853 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15854/">CVE-2018-15854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15854">CVE-2018-15854 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15855/">CVE-2018-15855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15855">CVE-2018-15855 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15856/">CVE-2018-15856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15856">CVE-2018-15856 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15857/">CVE-2018-15857 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15857">CVE-2018-15857 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15858/">CVE-2018-15858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15858">CVE-2018-15858 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15859/">CVE-2018-15859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15859">CVE-2018-15859 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15861/">CVE-2018-15861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15861">CVE-2018-15861 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15862/">CVE-2018-15862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15862">CVE-2018-15862 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15863/">CVE-2018-15863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15863">CVE-2018-15863 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15864/">CVE-2018-15864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15864">CVE-2018-15864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815923" comment="libxkbcommon-x11-0-0.6.1-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815924" comment="libxkbcommon-x11-0-32bit-0.6.1-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815925" comment="libxkbcommon0-0.6.1-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815926" comment="libxkbcommon0-32bit-0.6.1-9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153238" version="1" class="patch">
	<metadata>
		<title>Security update for netpbm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1022790" ref_url="https://bugzilla.suse.com/1022790" source="BUGZILLA"/>
		<reference ref_id="1022791" ref_url="https://bugzilla.suse.com/1022791" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5849" ref_url="https://www.suse.com/security/cve/CVE-2017-5849/" source="CVE"/>
		<description>
This update for netpbm fixes the following issues:

- CVE-2017-5849: Fixed out-of-bound read and write issue that can occur in function putgreytile() and put1bitbwtile() (bsc#1022790, bsc#1022791).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-08"/>
	<updated date="2024-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022790">SUSE bug 1022790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022791">SUSE bug 1022791</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5849/">CVE-2017-5849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5849">CVE-2017-5849 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846065" comment="libnetpbm11-10.66.3-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846066" comment="libnetpbm11-32bit-10.66.3-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846067" comment="netpbm-10.66.3-8.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153239" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1210638" ref_url="https://bugzilla.suse.com/1210638" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2023-27043: Fixed incorrectly parses e-mail addresses which contain a special character (bsc#1210638).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-09"/>
	<updated date="2024-02-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210638">SUSE bug 1210638</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846171" comment="libpython3_4m1_0-3.4.10-25.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846172" comment="python3-3.4.10-25.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846173" comment="python3-base-3.4.10-25.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846174" comment="python3-curses-3.4.10-25.119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153240" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216922" ref_url="https://bugzilla.suse.com/1216922" source="BUGZILLA"/>
		<reference ref_id="1219243" ref_url="https://bugzilla.suse.com/1219243" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5678" ref_url="https://www.suse.com/security/cve/CVE-2023-5678/" source="CVE"/>
		<reference ref_id="CVE-2024-0727" ref_url="https://www.suse.com/security/cve/CVE-2024-0727/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2024-0727: Denial of service when processing a maliciously formatted PKCS12 file (bsc#1219243).
- CVE-2023-5678: Denial of service via long X9.42 DH keys (bsc#1216922).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-13"/>
	<updated date="2024-02-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216922">SUSE bug 1216922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219243">SUSE bug 1219243</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5678/">CVE-2023-5678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0727/">CVE-2024-0727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846982" comment="libopenssl-devel-1.0.2j-60.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846983" comment="libopenssl1_0_0-1.0.2j-60.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846984" comment="libopenssl1_0_0-32bit-1.0.2j-60.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846985" comment="libopenssl1_0_0-hmac-1.0.2j-60.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846986" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846987" comment="openssl-1.0.2j-60.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846988" comment="openssl-doc-1.0.2j-60.107.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846982" comment="libopenssl-devel-1.0.2j-60.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846983" comment="libopenssl1_0_0-1.0.2j-60.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846984" comment="libopenssl1_0_0-32bit-1.0.2j-60.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846985" comment="libopenssl1_0_0-hmac-1.0.2j-60.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846986" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846987" comment="openssl-1.0.2j-60.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846988" comment="openssl-doc-1.0.2j-60.107.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153241" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql15 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1219679" ref_url="https://bugzilla.suse.com/1219679" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<description>
This update for postgresql15 fixes the following issues:

Upgrade to 15.6:

- CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-15"/>
	<updated date="2024-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219679">SUSE bug 1219679</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846989" comment="postgresql15-15.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846990" comment="postgresql15-contrib-15.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846991" comment="postgresql15-devel-15.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846879" comment="postgresql15-docs-15.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846992" comment="postgresql15-plperl-15.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846993" comment="postgresql15-plpython-15.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846994" comment="postgresql15-pltcl-15.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846995" comment="postgresql15-server-15.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846996" comment="postgresql15-server-devel-15.6-3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153242" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1219679" ref_url="https://bugzilla.suse.com/1219679" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<description>
This update for postgresql14 fixes the following issues:

Upgrade to 14.11:

- CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-20"/>
	<updated date="2024-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219679">SUSE bug 1219679</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848148" comment="postgresql14-14.11-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848149" comment="postgresql14-contrib-14.11-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848150" comment="postgresql14-devel-14.11-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848096" comment="postgresql14-docs-14.11-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848151" comment="postgresql14-llvmjit-devel-14.11-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848152" comment="postgresql14-plperl-14.11-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848153" comment="postgresql14-plpython-14.11-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848154" comment="postgresql14-pltcl-14.11-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848155" comment="postgresql14-server-14.11-3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848156" comment="postgresql14-server-devel-14.11-3.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153243" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1219679" ref_url="https://bugzilla.suse.com/1219679" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<description>
This update for postgresql13 fixes the following issues:

Upgrade to 13.14:

- CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-20"/>
	<updated date="2024-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219679">SUSE bug 1219679</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848157" comment="postgresql13-13.14-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848158" comment="postgresql13-contrib-13.14-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848103" comment="postgresql13-docs-13.14-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848159" comment="postgresql13-plperl-13.14-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848160" comment="postgresql13-plpython-13.14-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848161" comment="postgresql13-pltcl-13.14-3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848162" comment="postgresql13-server-13.14-3.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153244" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1219679" ref_url="https://bugzilla.suse.com/1219679" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<description>
This update for postgresql12 fixes the following issues:

Upgrade to 12.18:

- CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-20"/>
	<updated date="2024-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219679">SUSE bug 1219679</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848163" comment="postgresql12-12.18-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848164" comment="postgresql12-contrib-12.18-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848165" comment="postgresql12-devel-12.18-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848110" comment="postgresql12-docs-12.18-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848166" comment="postgresql12-llvmjit-devel-12.18-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848167" comment="postgresql12-plperl-12.18-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848168" comment="postgresql12-plpython-12.18-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848169" comment="postgresql12-pltcl-12.18-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848170" comment="postgresql12-server-12.18-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848171" comment="postgresql12-server-devel-12.18-3.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153245" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1219113" ref_url="https://bugzilla.suse.com/1219113" source="BUGZILLA"/>
		<reference ref_id="1219604" ref_url="https://bugzilla.suse.com/1219604" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1745" ref_url="https://www.suse.com/security/cve/CVE-2014-1745/" source="CVE"/>
		<reference ref_id="CVE-2023-40414" ref_url="https://www.suse.com/security/cve/CVE-2023-40414/" source="CVE"/>
		<reference ref_id="CVE-2023-42833" ref_url="https://www.suse.com/security/cve/CVE-2023-42833/" source="CVE"/>
		<reference ref_id="CVE-2024-23206" ref_url="https://www.suse.com/security/cve/CVE-2024-23206/" source="CVE"/>
		<reference ref_id="CVE-2024-23213" ref_url="https://www.suse.com/security/cve/CVE-2024-23213/" source="CVE"/>
		<reference ref_id="CVE-2024-23222" ref_url="https://www.suse.com/security/cve/CVE-2024-23222/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.42.5 (bsc#1219604):

- CVE-2024-23222: Fixed processing maliciously crafted web content that may have led to arbitrary code execution (bsc#1219113).
- CVE-2024-23206: Fixed fingerprint user via maliciously crafted webpages (bsc#1219604).
- CVE-2024-23213: Fixed processing web content that may have led to arbitrary code execution (bsc#1219604).
- CVE-2023-40414: Fixed processing web content that may have led to arbitrary code execution (bsc#1219604).
- CVE-2014-1745: Fixed denial-of-service or potentially disclose memory contents while processing maliciously crafted files (bsc#1219604).
- CVE-2023-42833: Fixed processing web content that may have led to arbitrary code execution (bsc#1219604).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-20"/>
	<updated date="2024-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219113">SUSE bug 1219113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219604">SUSE bug 1219604</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-1745/">CVE-2014-1745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1745">CVE-2014-1745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40414/">CVE-2023-40414 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40414">CVE-2023-40414 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42833/">CVE-2023-42833 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42833">CVE-2023-42833 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23206/">CVE-2024-23206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23206">CVE-2024-23206 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23213/">CVE-2024-23213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23213">CVE-2024-23213 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23222/">CVE-2024-23222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23222">CVE-2024-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848172" comment="libjavascriptcoregtk-4_0-18-2.42.5-2.168.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848173" comment="libwebkit2gtk-4_0-37-2.42.5-2.168.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848121" comment="libwebkit2gtk3-lang-2.42.5-2.168.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848174" comment="typelib-1_0-JavaScriptCore-4_0-2.42.5-2.168.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848175" comment="typelib-1_0-WebKit2-4_0-2.42.5-2.168.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848176" comment="typelib-1_0-WebKit2WebExtension-4_0-2.42.5-2.168.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848177" comment="webkit2gtk-4_0-injected-bundles-2.42.5-2.168.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848172" comment="libjavascriptcoregtk-4_0-18-2.42.5-2.168.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848173" comment="libwebkit2gtk-4_0-37-2.42.5-2.168.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848121" comment="libwebkit2gtk3-lang-2.42.5-2.168.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848174" comment="typelib-1_0-JavaScriptCore-4_0-2.42.5-2.168.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848175" comment="typelib-1_0-WebKit2-4_0-2.42.5-2.168.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848176" comment="typelib-1_0-WebKit2WebExtension-4_0-2.42.5-2.168.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848177" comment="webkit2gtk-4_0-injected-bundles-2.42.5-2.168.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153246" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1219679" ref_url="https://bugzilla.suse.com/1219679" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<description>
This update for postgresql16 fixes the following issues:

Upgrade to 16.2:

- CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-20"/>
	<updated date="2024-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219679">SUSE bug 1219679</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848178" comment="libecpg6-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848179" comment="libecpg6-32bit-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848180" comment="libpq5-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848181" comment="libpq5-32bit-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848182" comment="postgresql16-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848183" comment="postgresql16-contrib-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848184" comment="postgresql16-devel-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848131" comment="postgresql16-docs-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848185" comment="postgresql16-plperl-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848186" comment="postgresql16-plpython-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848187" comment="postgresql16-pltcl-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848188" comment="postgresql16-server-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848189" comment="postgresql16-server-devel-16.2-3.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848178" comment="libecpg6-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848179" comment="libecpg6-32bit-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848180" comment="libpq5-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848181" comment="libpq5-32bit-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848182" comment="postgresql16-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848183" comment="postgresql16-contrib-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848184" comment="postgresql16-devel-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848131" comment="postgresql16-docs-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848185" comment="postgresql16-plperl-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848186" comment="postgresql16-plpython-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848187" comment="postgresql16-pltcl-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848188" comment="postgresql16-server-16.2-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848189" comment="postgresql16-server-devel-16.2-3.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153247" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1219576" ref_url="https://bugzilla.suse.com/1219576" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-25062" ref_url="https://www.suse.com/security/cve/CVE-2024-25062/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2024-25062: Fixed use-after-free in XMLReader (bsc#1219576).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-05-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219576">SUSE bug 1219576</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25062/">CVE-2024-25062 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25062">CVE-2024-25062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848190" comment="libxml2-2-2.9.4-46.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848191" comment="libxml2-2-32bit-2.9.4-46.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848144" comment="libxml2-doc-2.9.4-46.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848192" comment="libxml2-tools-2.9.4-46.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848193" comment="python-libxml2-2.9.4-46.71.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848190" comment="libxml2-2-2.9.4-46.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848191" comment="libxml2-2-32bit-2.9.4-46.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848144" comment="libxml2-doc-2.9.4-46.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848192" comment="libxml2-tools-2.9.4-46.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848193" comment="python-libxml2-2.9.4-46.71.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153248" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1216198" ref_url="https://bugzilla.suse.com/1216198" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388/" source="CVE"/>
		<description>
This update for mozilla-nss fixes the following issues:

Update to NSS 3.90.2:

- CVE-2023-5388: Fixed timing attack against RSA decryption in TLS (bsc#1216198)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-21"/>
	<updated date="2024-02-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216198">SUSE bug 1216198</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848480" comment="libfreebl3-3.90.2-58.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848481" comment="libfreebl3-32bit-3.90.2-58.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848482" comment="libsoftokn3-3.90.2-58.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848483" comment="libsoftokn3-32bit-3.90.2-58.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848484" comment="mozilla-nss-3.90.2-58.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848485" comment="mozilla-nss-32bit-3.90.2-58.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848486" comment="mozilla-nss-certs-3.90.2-58.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848487" comment="mozilla-nss-certs-32bit-3.90.2-58.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848488" comment="mozilla-nss-devel-3.90.2-58.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848489" comment="mozilla-nss-sysinit-3.90.2-58.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848490" comment="mozilla-nss-sysinit-32bit-3.90.2-58.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848491" comment="mozilla-nss-tools-3.90.2-58.111.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848480" comment="libfreebl3-3.90.2-58.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848481" comment="libfreebl3-32bit-3.90.2-58.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848482" comment="libsoftokn3-3.90.2-58.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848483" comment="libsoftokn3-32bit-3.90.2-58.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848484" comment="mozilla-nss-3.90.2-58.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848485" comment="mozilla-nss-32bit-3.90.2-58.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848486" comment="mozilla-nss-certs-3.90.2-58.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848487" comment="mozilla-nss-certs-32bit-3.90.2-58.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848488" comment="mozilla-nss-devel-3.90.2-58.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848489" comment="mozilla-nss-sysinit-3.90.2-58.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848490" comment="mozilla-nss-sysinit-32bit-3.90.2-58.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848491" comment="mozilla-nss-tools-3.90.2-58.111.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153249" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184272" ref_url="https://bugzilla.suse.com/1184272" source="BUGZILLA"/>
		<reference ref_id="1220048" ref_url="https://bugzilla.suse.com/1220048" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-1546" ref_url="https://www.suse.com/security/cve/CVE-2024-1546/" source="CVE"/>
		<reference ref_id="CVE-2024-1547" ref_url="https://www.suse.com/security/cve/CVE-2024-1547/" source="CVE"/>
		<reference ref_id="CVE-2024-1548" ref_url="https://www.suse.com/security/cve/CVE-2024-1548/" source="CVE"/>
		<reference ref_id="CVE-2024-1549" ref_url="https://www.suse.com/security/cve/CVE-2024-1549/" source="CVE"/>
		<reference ref_id="CVE-2024-1550" ref_url="https://www.suse.com/security/cve/CVE-2024-1550/" source="CVE"/>
		<reference ref_id="CVE-2024-1551" ref_url="https://www.suse.com/security/cve/CVE-2024-1551/" source="CVE"/>
		<reference ref_id="CVE-2024-1552" ref_url="https://www.suse.com/security/cve/CVE-2024-1552/" source="CVE"/>
		<reference ref_id="CVE-2024-1553" ref_url="https://www.suse.com/security/cve/CVE-2024-1553/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 115.8.0 ESR (MFSA 2024-06) (bsc#1220048):

- CVE-2024-1546: Out-of-bounds memory read in networking channels
- CVE-2024-1547: Alert dialog could have been spoofed on another site
- CVE-2024-1548: Fullscreen Notification could have been hidden by select element
- CVE-2024-1549: Custom cursor could obscure the permission dialog
- CVE-2024-1550: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants
- CVE-2024-1551: Multipart HTTP Responses would accept the Set-Cookie header in response parts
- CVE-2024-1552: Incorrect code generation on 32-bit ARM devices
- CVE-2024-1553: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8

- Recommend libfido2-udev on codestreams that exist, in order to try
  to get security keys (e.g. Yubikeys) work out of the box. (bsc#1184272)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-21"/>
	<updated date="2024-02-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184272">SUSE bug 1184272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220048">SUSE bug 1220048</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1546/">CVE-2024-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1546">CVE-2024-1546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1547/">CVE-2024-1547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1547">CVE-2024-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1548/">CVE-2024-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1548">CVE-2024-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1549/">CVE-2024-1549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1549">CVE-2024-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1550/">CVE-2024-1550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1550">CVE-2024-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1551/">CVE-2024-1551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1551">CVE-2024-1551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1552/">CVE-2024-1552 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1552">CVE-2024-1552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1553/">CVE-2024-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1553">CVE-2024-1553 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848492" comment="MozillaFirefox-115.8.0-112.200.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848466" comment="MozillaFirefox-devel-115.8.0-112.200.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848493" comment="MozillaFirefox-translations-common-115.8.0-112.200.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848492" comment="MozillaFirefox-115.8.0-112.200.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848466" comment="MozillaFirefox-devel-115.8.0-112.200.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848493" comment="MozillaFirefox-translations-common-115.8.0-112.200.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153250" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1219213" ref_url="https://bugzilla.suse.com/1219213" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52356" ref_url="https://www.suse.com/security/cve/CVE-2023-52356/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2023-52356: Fixed segfault in TIFFReadRGBATileExt() (bsc#1219213).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-02-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219213">SUSE bug 1219213</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52356/">CVE-2023-52356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52356">CVE-2023-52356 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848738" comment="libtiff5-4.0.9-44.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848739" comment="libtiff5-32bit-4.0.9-44.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848740" comment="tiff-4.0.9-44.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153251" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1218215" ref_url="https://bugzilla.suse.com/1218215" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-51385" ref_url="https://www.suse.com/security/cve/CVE-2023-51385/" source="CVE"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2023-51385: Fixed a command injection via user name or host name metacharacters (bsc#1218215).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2024-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218215">SUSE bug 1218215</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-51385/">CVE-2023-51385 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51385">CVE-2023-51385 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848818" comment="openssh-7.2p2-74.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848819" comment="openssh-askpass-gnome-7.2p2-74.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848820" comment="openssh-fips-7.2p2-74.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848821" comment="openssh-helpers-7.2p2-74.69.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848818" comment="openssh-7.2p2-74.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848819" comment="openssh-askpass-gnome-7.2p2-74.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848820" comment="openssh-fips-7.2p2-74.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848821" comment="openssh-helpers-7.2p2-74.69.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153252" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1218903" ref_url="https://bugzilla.suse.com/1218903" source="BUGZILLA"/>
		<reference ref_id="1218905" ref_url="https://bugzilla.suse.com/1218905" source="BUGZILLA"/>
		<reference ref_id="1218906" ref_url="https://bugzilla.suse.com/1218906" source="BUGZILLA"/>
		<reference ref_id="1218907" ref_url="https://bugzilla.suse.com/1218907" source="BUGZILLA"/>
		<reference ref_id="1218908" ref_url="https://bugzilla.suse.com/1218908" source="BUGZILLA"/>
		<reference ref_id="1218909" ref_url="https://bugzilla.suse.com/1218909" source="BUGZILLA"/>
		<reference ref_id="1218911" ref_url="https://bugzilla.suse.com/1218911" source="BUGZILLA"/>
		<reference ref_id="1219843" ref_url="https://bugzilla.suse.com/1219843" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-33850" ref_url="https://www.suse.com/security/cve/CVE-2023-33850/" source="CVE"/>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20926" ref_url="https://www.suse.com/security/cve/CVE-2024-20926/" source="CVE"/>
		<reference ref_id="CVE-2024-20932" ref_url="https://www.suse.com/security/cve/CVE-2024-20932/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 8 Fix Pack 20: [bsc#1219843]

Security fixes:

- CVE-2023-33850: Fixed information disclosure vulnerability due to the consumed GSKit library (bsc#1219843).
- CVE-2024-20932: Fixed incorrect handling of ZIP files with duplicate entries (bsc#1218908).
- CVE-2024-20952: Fixed RSA padding issue and timing side-channel attack against TLS (bsc#1218911).
- CVE-2024-20918: Fixed array out-of-bounds access due to missing range check in C1 compiler (bsc#1218907).
- CVE-2024-20921: Fixed range check loop optimization issue (bsc#1218905).
- CVE-2024-20919: Fixed JVM class file verifier flaw allows unverified bytecode execution (bsc#1218903).
- CVE-2024-20926: Fixed arbitrary Java code execution in Nashorn (bsc#1218906).
- CVE-2024-20945: Fixed logging of digital signature private keys (bsc#1218909).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2024-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218903">SUSE bug 1218903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218905">SUSE bug 1218905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218906">SUSE bug 1218906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218907">SUSE bug 1218907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218908">SUSE bug 1218908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218909">SUSE bug 1218909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218911">SUSE bug 1218911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219843">SUSE bug 1219843</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33850/">CVE-2023-33850 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33850">CVE-2023-33850 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20926/">CVE-2024-20926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20926">CVE-2024-20926 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20932/">CVE-2024-20932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20932">CVE-2024-20932 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848822" comment="java-1_8_0-ibm-1.8.0_sr8.20-30.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848804" comment="java-1_8_0-ibm-alsa-1.8.0_sr8.20-30.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848823" comment="java-1_8_0-ibm-devel-1.8.0_sr8.20-30.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848805" comment="java-1_8_0-ibm-plugin-1.8.0_sr8.20-30.120.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848822" comment="java-1_8_0-ibm-1.8.0_sr8.20-30.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848804" comment="java-1_8_0-ibm-alsa-1.8.0_sr8.20-30.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848823" comment="java-1_8_0-ibm-devel-1.8.0_sr8.20-30.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848805" comment="java-1_8_0-ibm-plugin-1.8.0_sr8.20-30.120.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153253" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1217969" ref_url="https://bugzilla.suse.com/1217969" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39804" ref_url="https://www.suse.com/security/cve/CVE-2023-39804/" source="CVE"/>
		<description>
This update for tar fixes the following issues:

- CVE-2023-39804: Incorrectly handled extension attributes in PAX archives can lead to a crash (bsc#1217969)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-10"/>
	<updated date="2024-01-10"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1217969">SUSE bug 1217969</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39804/">CVE-2023-39804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39804">CVE-2023-39804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816614" comment="tar-1.27.1-15.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816603" comment="tar-lang-1.27.1-15.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153254" version="1" class="patch">
	<metadata>
		<title>Security update for LibreOffice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198666" ref_url="https://bugzilla.suse.com/1198666" source="BUGZILLA"/>
		<reference ref_id="1200085" ref_url="https://bugzilla.suse.com/1200085" source="BUGZILLA"/>
		<reference ref_id="1204040" ref_url="https://bugzilla.suse.com/1204040" source="BUGZILLA"/>
		<reference ref_id="1209242" ref_url="https://bugzilla.suse.com/1209242" source="BUGZILLA"/>
		<reference ref_id="1210687" ref_url="https://bugzilla.suse.com/1210687" source="BUGZILLA"/>
		<reference ref_id="1211746" ref_url="https://bugzilla.suse.com/1211746" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0950" ref_url="https://www.suse.com/security/cve/CVE-2023-0950/" source="CVE"/>
		<reference ref_id="CVE-2023-2255" ref_url="https://www.suse.com/security/cve/CVE-2023-2255/" source="CVE"/>
		<description>
This update for LibreOffice fixes the following issues:
    
libreoffice:

- Version update from 7.3.6.2 to 7.5.4.1 (jsc#PED-3561, jsc#PED-3550, jsc#PED-1785):
  * For the highlights of changes of version 7.5 please consult the official release notes:
    https://wiki.documentfoundation.org/ReleaseNotes/7.5
  * For the highlights of changes of version 7.4 please consult the official release notes:
    https://wiki.documentfoundation.org/ReleaseNotes/7.4
  * Security issues fixed:
    + CVE-2023-0950: Fixed stack underflow in ScInterpreter (bsc#1209242)
    + CVE-2023-2255: Fixed vulnerability where remote documents could be loaded without prompt via IFrame (bsc#1211746)
  * Bug fixes:
    + Fix PPTX shadow effect for table offset (bsc#1204040)
    + Fix ability to set the default tab size for each text object (bsc#1198666)
    + Fix PPTX extra vertical space between different text formats (bsc#1200085)
    + Do not use binutils-gold as the package is unmaintainedd and will be removed in the future (bsc#1210687)
  * Updated bundled dependencies:    
    * boost version update from 1_77_0 to 1_80_0
    * curl version update from 7.83.1 to 8.0.1
    * icu4c-data version update from 70_1 to 72_1
    * icu4c version update from 70_1 to 72_1
    * pdfium version update from 4699 to 5408
    * poppler version update from 21.11.0 to 22.12.0
    * poppler-data version update from 0.4.10 to 0.4.11
    * skia version from m97-a7230803d64ae9d44f4e128244480111a3ae967 to m103-b301ff025004c9cd82816c86c547588e6c24b466    
  * New build dependencies:
    * fixmath-devel
    * libwebp-devel
    * zlib-devel
    * dragonbox-devel
    * at-spi2-core-devel
    * libtiff-devel

dragonbox:

- New package at version 1.1.3 (jsc#PED-1785)
    * New dependency for LibreOffice 7.4

fixmath:

- New package at version 2022.07.20 (jsc#PED-1785)
    * New dependency for LibreOffice 7.4

libmwaw:

- Version update from 0.3.20 to 0.3.21 (jsc#PED-1785):
  * Add debug code to read some private rsrc data
  * Allow to read some MacWrite which does not have printer informations
  * Add a parser for Scoop files
  * Add a parser for ScriptWriter files
  * Add a parser for ReadySetGo 1-4 files

xmlsec1:
    
- Version update from 1.2.28 to 1.2.37 required by LibreOffice 7.5.2.2 (jsc#PED-3561, jsc#PED-3550):
  * Retired the XMLSec mailing list 'xmlsec@aleksey.com' and the XMLSec Online Signature Verifier.
  * Migration to OpenSSL 3.0 API Note that OpenSSL engines are disabled by default when XMLSec library is compiled
    against OpenSSL 3.0.
    To re-enable OpenSSL engines, use `--enable-openssl3-engines` configure flag 
    (there will be a lot of deprecation warnings).
  * The OpenSSL before 1.1.0 and LibreSSL before 2.7.0 are now deprecated and will be removed in the future versions of
    XMLSec Library.
  * Refactored all the integer casts to ensure cast-safety. Fixed all warnings and enabled `-Werror` and `-pedantic` 
    flags on CI builds.
  * Added configure flag to use size_t for xmlSecSize (currently disabled by default for backward compatibility).
  * Support for OpenSSL compiled with OPENSSL_NO_ERR.
  * Full support for LibreSSL 3.5.0 and above
  * Several other small fixes
  * Fix decrypting session key for two recipients 
  * Added `--privkey-openssl-engine` option to enhance openssl engine support
  * Remove MD5 for NSS 3.59 and above
  * Fix PKCS12_parse return code handling
  * Fix OpenSSL lookup
  * xmlSecX509DataGetNodeContent(): don't return 0 for non-empty elements - fix for LibreOffice
  * Unload error strings in OpenSSL shutdown.
  * Make userData available when executing preExecCallback function
  * Add an option to use secure memset.
  * Enabled XML_PARSE_HUGE for all xml parsers.
  * Various build and tests fixes and improvements.
  * Move remaining private header files away from xmlsec/include/`` folder
- Other packaging changes:
  * Relax the crypto policies for the test-suite. It allows the tests using certificates with small key lengths to pass.
  * Pass `--disable-md5` to configure: The cryptographic strength of the MD5 algorithm is sufficiently doubtful that its
    use is discouraged at this time. It is not listed as an algorithm in [XMLDSIG-CORE1]
    https://www.w3.org/TR/xmlsec-algorithms/#bib-XMLDSIG-CORE1
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-10"/>
	<updated date="2024-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198666">SUSE bug 1198666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200085">SUSE bug 1200085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204040">SUSE bug 1204040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209242">SUSE bug 1209242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210687">SUSE bug 1210687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211746">SUSE bug 1211746</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0950/">CVE-2023-0950 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0950">CVE-2023-0950 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2255/">CVE-2023-2255 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2255">CVE-2023-2255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009797099" comment="atk-doc-2.28.1-6.5.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797100" comment="atk-lang-2.28.1-6.5.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797278" comment="libatk-1_0-0-2.28.1-6.5.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797279" comment="libatk-1_0-0-32bit-2.28.1-6.5.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797280" comment="typelib-1_0-Atk-1_0-2.28.1-6.5.23 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009797099" comment="atk-doc-2.28.1-6.5.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797100" comment="atk-lang-2.28.1-6.5.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797278" comment="libatk-1_0-0-2.28.1-6.5.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797279" comment="libatk-1_0-0-32bit-2.28.1-6.5.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797280" comment="typelib-1_0-Atk-1_0-2.28.1-6.5.23 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153255" version="1" class="patch">
	<metadata>
		<title>Security update for python36 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214691" ref_url="https://bugzilla.suse.com/1214691" source="BUGZILLA"/>
		<reference ref_id="1219666" ref_url="https://bugzilla.suse.com/1219666" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48566" ref_url="https://www.suse.com/security/cve/CVE-2022-48566/" source="CVE"/>
		<reference ref_id="CVE-2023-6597" ref_url="https://www.suse.com/security/cve/CVE-2023-6597/" source="CVE"/>
		<description>
This update for python36 fixes the following issues:

- CVE-2023-6597: Fixed symlink bug in cleanup of tempfile.TemporaryDirectory (bsc#1219666).
- CVE-2022-48566: Make compare_digest more constant-time (bsc#1214691).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-04"/>
	<updated date="2024-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214691">SUSE bug 1214691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219666">SUSE bug 1219666</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-48566/">CVE-2022-48566 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48566">CVE-2022-48566 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6597/">CVE-2023-6597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850036" comment="libpython3_6m1_0-3.6.15-6.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850037" comment="python36-3.6.15-6.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850038" comment="python36-base-3.6.15-6.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850039" comment="python36-curses-3.6.15-6.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850040" comment="python36-dbm-3.6.15-6.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850041" comment="python36-devel-3.6.15-6.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850042" comment="python36-idle-3.6.15-6.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850043" comment="python36-testsuite-3.6.15-6.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850044" comment="python36-tk-3.6.15-6.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850045" comment="python36-tools-3.6.15-6.100.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153256" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql-jdbc (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1220644" ref_url="https://bugzilla.suse.com/1220644" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-1597" ref_url="https://www.suse.com/security/cve/CVE-2024-1597/" source="CVE"/>
		<description>
This update for postgresql-jdbc fixes the following issues:

- CVE-2024-1597: Fixed SQL Injection via line comment generation (bsc#1220644).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-05"/>
	<updated date="2024-03-05"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1220644">SUSE bug 1220644</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1597/">CVE-2024-1597 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1597">CVE-2024-1597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849797" comment="postgresql-jdbc-9.4-3.12.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849797" comment="postgresql-jdbc-9.4-3.12.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153257" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1217213" ref_url="https://bugzilla.suse.com/1217213" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-44446" ref_url="https://www.suse.com/security/cve/CVE-2023-44446/" source="CVE"/>
		<description>
This update for gstreamer-plugins-bad fixes the following issues:

- CVE-2023-44446: Fixed use-after-free remote code execution vulnerability via MXF file (bsc#1217213).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-06"/>
	<updated date="2024-03-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217213">SUSE bug 1217213</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44446/">CVE-2023-44446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44446">CVE-2023-44446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850046" comment="gstreamer-plugins-bad-1.8.3-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849799" comment="gstreamer-plugins-bad-lang-1.8.3-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850047" comment="libgstadaptivedemux-1_0-0-1.8.3-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850048" comment="libgstbadaudio-1_0-0-1.8.3-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850049" comment="libgstbadbase-1_0-0-1.8.3-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850050" comment="libgstbadvideo-1_0-0-1.8.3-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850051" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850052" comment="libgstcodecparsers-1_0-0-1.8.3-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850053" comment="libgstgl-1_0-0-1.8.3-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850054" comment="libgstmpegts-1_0-0-1.8.3-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850055" comment="libgstphotography-1_0-0-1.8.3-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850056" comment="libgsturidownloader-1_0-0-1.8.3-18.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850046" comment="gstreamer-plugins-bad-1.8.3-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849799" comment="gstreamer-plugins-bad-lang-1.8.3-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850047" comment="libgstadaptivedemux-1_0-0-1.8.3-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850048" comment="libgstbadaudio-1_0-0-1.8.3-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850049" comment="libgstbadbase-1_0-0-1.8.3-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850050" comment="libgstbadvideo-1_0-0-1.8.3-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850051" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850052" comment="libgstcodecparsers-1_0-0-1.8.3-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850053" comment="libgstgl-1_0-0-1.8.3-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850054" comment="libgstmpegts-1_0-0-1.8.3-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850055" comment="libgstphotography-1_0-0-1.8.3-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850056" comment="libgsturidownloader-1_0-0-1.8.3-18.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153258" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1215005" ref_url="https://bugzilla.suse.com/1215005" source="BUGZILLA"/>
		<reference ref_id="1217316" ref_url="https://bugzilla.suse.com/1217316" source="BUGZILLA"/>
		<reference ref_id="1217320" ref_url="https://bugzilla.suse.com/1217320" source="BUGZILLA"/>
		<reference ref_id="1217321" ref_url="https://bugzilla.suse.com/1217321" source="BUGZILLA"/>
		<reference ref_id="1217324" ref_url="https://bugzilla.suse.com/1217324" source="BUGZILLA"/>
		<reference ref_id="1217326" ref_url="https://bugzilla.suse.com/1217326" source="BUGZILLA"/>
		<reference ref_id="1217329" ref_url="https://bugzilla.suse.com/1217329" source="BUGZILLA"/>
		<reference ref_id="1217330" ref_url="https://bugzilla.suse.com/1217330" source="BUGZILLA"/>
		<reference ref_id="1217432" ref_url="https://bugzilla.suse.com/1217432" source="BUGZILLA"/>
		<reference ref_id="1219581" ref_url="https://bugzilla.suse.com/1219581" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4750" ref_url="https://www.suse.com/security/cve/CVE-2023-4750/" source="CVE"/>
		<reference ref_id="CVE-2023-48231" ref_url="https://www.suse.com/security/cve/CVE-2023-48231/" source="CVE"/>
		<reference ref_id="CVE-2023-48232" ref_url="https://www.suse.com/security/cve/CVE-2023-48232/" source="CVE"/>
		<reference ref_id="CVE-2023-48233" ref_url="https://www.suse.com/security/cve/CVE-2023-48233/" source="CVE"/>
		<reference ref_id="CVE-2023-48234" ref_url="https://www.suse.com/security/cve/CVE-2023-48234/" source="CVE"/>
		<reference ref_id="CVE-2023-48235" ref_url="https://www.suse.com/security/cve/CVE-2023-48235/" source="CVE"/>
		<reference ref_id="CVE-2023-48236" ref_url="https://www.suse.com/security/cve/CVE-2023-48236/" source="CVE"/>
		<reference ref_id="CVE-2023-48237" ref_url="https://www.suse.com/security/cve/CVE-2023-48237/" source="CVE"/>
		<reference ref_id="CVE-2023-48706" ref_url="https://www.suse.com/security/cve/CVE-2023-48706/" source="CVE"/>
		<reference ref_id="CVE-2024-22667" ref_url="https://www.suse.com/security/cve/CVE-2024-22667/" source="CVE"/>
		<description>
This update for vim fixes the following issues:

- CVE-2023-48231: Fixed  Use-After-Free in win_close() (bsc#1217316).
- CVE-2023-48232: Fixed Floating point Exception in adjust_plines_for_skipcol() (bsc#1217320).
- CVE-2023-48233: Fixed overflow with count for :s command (bsc#1217321).
- CVE-2023-48234: Fixed overflow in nv_z_get_count (bsc#1217324).
- CVE-2023-48235: Fixed overflow in ex address parsing (bsc#1217326).
- CVE-2023-48236: Fixed overflow in get_number (bsc#1217329).
- CVE-2023-48237: Fixed overflow in shift_line (bsc#1217330).
- CVE-2023-48706: Fixed heap-use-after-free in ex_substitute (bsc#1217432).
- CVE-2024-22667: Fixed stack-based buffer overflow in did_set_langmap function in map.c (bsc#1219581).
- CVE-2023-4750: Fixed heap use-after-free in function bt_quickfix (bsc#1215005).

Updated to version 9.1 with patch level 0111:
https://github.com/vim/vim/compare/v9.0.2103...v9.1.0111
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-06"/>
	<updated date="2024-03-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215005">SUSE bug 1215005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217316">SUSE bug 1217316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217320">SUSE bug 1217320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217321">SUSE bug 1217321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217324">SUSE bug 1217324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217326">SUSE bug 1217326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217329">SUSE bug 1217329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217330">SUSE bug 1217330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217432">SUSE bug 1217432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219581">SUSE bug 1219581</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4750/">CVE-2023-4750 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4750">CVE-2023-4750 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-48231/">CVE-2023-48231 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48231">CVE-2023-48231 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-48232/">CVE-2023-48232 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48232">CVE-2023-48232 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48233/">CVE-2023-48233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48233">CVE-2023-48233 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48234/">CVE-2023-48234 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48234">CVE-2023-48234 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48235/">CVE-2023-48235 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48235">CVE-2023-48235 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-48236/">CVE-2023-48236 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48236">CVE-2023-48236 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48237/">CVE-2023-48237 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48237">CVE-2023-48237 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-48706/">CVE-2023-48706 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48706">CVE-2023-48706 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22667/">CVE-2024-22667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22667">CVE-2024-22667 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850057" comment="gvim-9.1.0111-17.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850058" comment="vim-9.1.0111-17.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849943" comment="vim-data-9.1.0111-17.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849944" comment="vim-data-common-9.1.0111-17.29.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850057" comment="gvim-9.1.0111-17.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850058" comment="vim-9.1.0111-17.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849943" comment="vim-data-9.1.0111-17.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849944" comment="vim-data-common-9.1.0111-17.29.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153259" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1214692" ref_url="https://bugzilla.suse.com/1214692" source="BUGZILLA"/>
		<reference ref_id="1219666" ref_url="https://bugzilla.suse.com/1219666" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<reference ref_id="CVE-2023-6597" ref_url="https://www.suse.com/security/cve/CVE-2023-6597/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2023-40217: Fixed bypass TLS handshake on closed sockets (bsc#1214692).
- CVE-2023-6597: Fixed symlink bug in cleanup (bsc#1219666).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-06"/>
	<updated date="2024-03-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214692">SUSE bug 1214692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219666">SUSE bug 1219666</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6597/">CVE-2023-6597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850059" comment="libpython3_4m1_0-3.4.10-25.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850060" comment="python3-3.4.10-25.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850061" comment="python3-base-3.4.10-25.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850062" comment="python3-curses-3.4.10-25.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850063" comment="python3-devel-3.4.10-25.124.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850059" comment="libpython3_4m1_0-3.4.10-25.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850060" comment="python3-3.4.10-25.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850061" comment="python3-base-3.4.10-25.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850062" comment="python3-curses-3.4.10-25.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850063" comment="python3-devel-3.4.10-25.124.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153260" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1219026" ref_url="https://bugzilla.suse.com/1219026" source="BUGZILLA"/>
		<reference ref_id="1220389" ref_url="https://bugzilla.suse.com/1220389" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-42465" ref_url="https://www.suse.com/security/cve/CVE-2023-42465/" source="CVE"/>
		<description>
This update for sudo fixes the following issues:

- CVE-2023-42465: Try to make sudo less vulnerable to ROWHAMMER attacks (bsc#1219026).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-08"/>
	<updated date="2024-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219026">SUSE bug 1219026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220389">SUSE bug 1220389</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42465/">CVE-2023-42465 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42465">CVE-2023-42465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850135" comment="sudo-1.8.20p2-3.46.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850135" comment="sudo-1.8.20p2-3.46.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153261" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1218903" ref_url="https://bugzilla.suse.com/1218903" source="BUGZILLA"/>
		<reference ref_id="1218905" ref_url="https://bugzilla.suse.com/1218905" source="BUGZILLA"/>
		<reference ref_id="1218906" ref_url="https://bugzilla.suse.com/1218906" source="BUGZILLA"/>
		<reference ref_id="1218907" ref_url="https://bugzilla.suse.com/1218907" source="BUGZILLA"/>
		<reference ref_id="1218909" ref_url="https://bugzilla.suse.com/1218909" source="BUGZILLA"/>
		<reference ref_id="1218911" ref_url="https://bugzilla.suse.com/1218911" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20926" ref_url="https://www.suse.com/security/cve/CVE-2024-20926/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- CVE-2024-20952: Fixed RSA padding issue and timing side-channel attack against TLS (8317547) (bsc#1218911).
- CVE-2024-20921: Fixed range check loop optimization issue (8314307) (bsc#1218905).
- CVE-2024-20926: Fixed rbitrary Java code execution in Nashorn (8314284) (bsc#1218906).
- CVE-2024-20919: Fixed JVM class file verifier flaw allows unverified byte code execution (8314295) (bsc#1218903).
- CVE-2024-20918: Fixed array out-of-bounds access due to missing range check in C1 compiler (8314468) (bsc#1218907).
- CVE-2024-20945: Fixed logging of digital signature private keys (8316976) (bsc#1218909).

Update to version jdk8u402 (icedtea-3.30.0).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-03-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218903">SUSE bug 1218903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218905">SUSE bug 1218905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218906">SUSE bug 1218906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218907">SUSE bug 1218907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218909">SUSE bug 1218909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218911">SUSE bug 1218911</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20926/">CVE-2024-20926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20926">CVE-2024-20926 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850136" comment="java-1_8_0-openjdk-1.8.0.402-27.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850137" comment="java-1_8_0-openjdk-demo-1.8.0.402-27.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850138" comment="java-1_8_0-openjdk-devel-1.8.0.402-27.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850139" comment="java-1_8_0-openjdk-headless-1.8.0.402-27.96.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850136" comment="java-1_8_0-openjdk-1.8.0.402-27.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850137" comment="java-1_8_0-openjdk-demo-1.8.0.402-27.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850138" comment="java-1_8_0-openjdk-devel-1.8.0.402-27.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850139" comment="java-1_8_0-openjdk-headless-1.8.0.402-27.96.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153262" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1218571" ref_url="https://bugzilla.suse.com/1218571" source="BUGZILLA"/>
		<reference ref_id="1219238" ref_url="https://bugzilla.suse.com/1219238" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-7207" ref_url="https://www.suse.com/security/cve/CVE-2023-7207/" source="CVE"/>
		<description>
This update for cpio fixes the following issues:

- Fixed cpio not extracting correctly when using --no-absolute-filenames option the security fix for CVE-2023-7207 (bsc#1218571, bsc#1219238)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-11"/>
	<updated date="2024-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218571">SUSE bug 1218571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219238">SUSE bug 1219238</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-7207/">CVE-2023-7207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-7207">CVE-2023-7207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850419" comment="cpio-2.11-36.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850417" comment="cpio-lang-2.11-36.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850419" comment="cpio-2.11-36.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850417" comment="cpio-lang-2.11-36.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153263" version="1" class="patch">
	<metadata>
		<title>Security update for axis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1218605" ref_url="https://bugzilla.suse.com/1218605" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-51441" ref_url="https://www.suse.com/security/cve/CVE-2023-51441/" source="CVE"/>
		<description>
This update for axis fixes the following issues:

- CVE-2023-51441: Fixed SSRF when untrusted input is passed to the service admin HTTP API (bsc#1218605).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-12"/>
	<updated date="2024-03-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218605">SUSE bug 1218605</bugzilla>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-51441/">CVE-2023-51441 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51441">CVE-2023-51441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850705" comment="axis-1.4-290.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153264" version="1" class="patch">
	<metadata>
		<title>Security update for zabbix (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1219775" ref_url="https://bugzilla.suse.com/1219775" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-22119" ref_url="https://www.suse.com/security/cve/CVE-2024-22119/" source="CVE"/>
		<description>
This update for zabbix fixes the following issues:

- CVE-2024-22119: Fixed ability to run XSS in graph item names (bsc#1219775).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-03-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219775">SUSE bug 1219775</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-22119/">CVE-2024-22119 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22119">CVE-2024-22119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850744" comment="zabbix-agent-4.0.12-4.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153265" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1221134" ref_url="https://bugzilla.suse.com/1221134" source="BUGZILLA"/>
		<reference ref_id="1221151" ref_url="https://bugzilla.suse.com/1221151" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-42465" ref_url="https://www.suse.com/security/cve/CVE-2023-42465/" source="CVE"/>
		<description>
This update for sudo fixes the following issues:

- CVE-2023-42465: Fixed issues introduced by first patches (bsc#1221151, bsc#1221134).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-14"/>
	<updated date="2024-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221134">SUSE bug 1221134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221151">SUSE bug 1221151</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42465/">CVE-2023-42465 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42465">CVE-2023-42465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851278" comment="sudo-1.8.20p2-3.49.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851278" comment="sudo-1.8.20p2-3.49.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153266" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1213590" ref_url="https://bugzilla.suse.com/1213590" source="BUGZILLA"/>
		<reference ref_id="1214686" ref_url="https://bugzilla.suse.com/1214686" source="BUGZILLA"/>
		<reference ref_id="1214687" ref_url="https://bugzilla.suse.com/1214687" source="BUGZILLA"/>
		<reference ref_id="1221187" ref_url="https://bugzilla.suse.com/1221187" source="BUGZILLA"/>
		<reference ref_id="960589" ref_url="https://bugzilla.suse.com/960589" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8668" ref_url="https://www.suse.com/security/cve/CVE-2015-8668/" source="CVE"/>
		<reference ref_id="CVE-2023-38288" ref_url="https://www.suse.com/security/cve/CVE-2023-38288/" source="CVE"/>
		<reference ref_id="CVE-2023-40745" ref_url="https://www.suse.com/security/cve/CVE-2023-40745/" source="CVE"/>
		<reference ref_id="CVE-2023-41175" ref_url="https://www.suse.com/security/cve/CVE-2023-41175/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2023-41175: Fixed potential integer overflow in raw2tiff.c (bsc#1214686).
- CVE-2023-38288: Fixed potential integer overflow in raw2tiff.c (bsc#1213590).
- CVE-2023-40745: Fixed integer overflow in tiffcp.c (bsc#1214687).
- CVE-2015-8668: Fixed Heap-based buffer overflow in bmp2tiff / PackBitsEncode (bsc#960589).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-18"/>
	<updated date="2024-03-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213590">SUSE bug 1213590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214686">SUSE bug 1214686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214687">SUSE bug 1214687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221187">SUSE bug 1221187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960589">SUSE bug 960589</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8668/">CVE-2015-8668 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8668">CVE-2015-8668 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38288/">CVE-2023-38288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38288">CVE-2023-38288 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40745/">CVE-2023-40745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40745">CVE-2023-40745 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41175/">CVE-2023-41175 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41175">CVE-2023-41175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851689" comment="libtiff5-4.0.9-44.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851690" comment="libtiff5-32bit-4.0.9-44.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851691" comment="tiff-4.0.9-44.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153267" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1221323" ref_url="https://bugzilla.suse.com/1221323" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22655" ref_url="https://www.suse.com/security/cve/CVE-2023-22655/" source="CVE"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-38575" ref_url="https://www.suse.com/security/cve/CVE-2023-38575/" source="CVE"/>
		<reference ref_id="CVE-2023-39368" ref_url="https://www.suse.com/security/cve/CVE-2023-39368/" source="CVE"/>
		<reference ref_id="CVE-2023-43490" ref_url="https://www.suse.com/security/cve/CVE-2023-43490/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to Intel CPU Microcode 20240312 release. (bsc#1221323)
- CVE-2023-39368: Protection mechanism failure of bus lock regulator
  for some Intel Processors may allow an unauthenticated user to
  potentially enable denial of service via network access
- CVE-2023-38575: Non-transparent sharing of return predictor targets
  between contexts in some Intel Processors may allow an authorized
  user to potentially enable information disclosure via local access.
- CVE-2023-28746: Information exposure through microarchitectural
  state after transient execution from some register files for some
  Intel Atom Processors may allow an authenticated user to potentially
  enable information disclosure via local access.
- CVE-2023-22655 Protection mechanism failure in some 3rd and 4th
  Generation Intel Xeon Processors when using Intel SGX or Intel TDX
  may allow a privileged user to potentially enable escalation of
  privilege via local access.
- CVE-2023-43490: Incorrect calculation in microcode keying mechanism
  for some Intel Xeon D Processors with Intel? SGX may allow a
  privileged user to potentially enable information disclosure via
  local access.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-18"/>
	<updated date="2024-03-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1221323">SUSE bug 1221323</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-22655/">CVE-2023-22655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-22655">CVE-2023-22655 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38575/">CVE-2023-38575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38575">CVE-2023-38575 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39368/">CVE-2023-39368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39368">CVE-2023-39368 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-43490/">CVE-2023-43490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-43490">CVE-2023-43490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851692" comment="ucode-intel-20240312-13.121.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851692" comment="ucode-intel-20240312-13.121.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153268" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1219357" ref_url="https://bugzilla.suse.com/1219357" source="BUGZILLA"/>
		<reference ref_id="1219554" ref_url="https://bugzilla.suse.com/1219554" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36773" ref_url="https://www.suse.com/security/cve/CVE-2020-36773/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issues:

- Fixed segfaults in gs_heap_free_object() — ref:_00D1igLOd._500Tr4BRgx:ref (bsc#1219357).

Previously fixed security issue:

- CVE-2020-36773: Fixed out-of-bounds write and use-after-free in devices/vector/gdevtxtw.c (for txtwrite) (bsc#1219554). 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-18"/>
	<updated date="2024-03-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219357">SUSE bug 1219357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219554">SUSE bug 1219554</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36773/">CVE-2020-36773 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36773">CVE-2020-36773 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851693" comment="ghostscript-9.52-23.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851694" comment="ghostscript-devel-9.52-23.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851695" comment="ghostscript-x11-9.52-23.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153269" version="1" class="patch">
	<metadata>
		<title>Security update for PackageKit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1218544" ref_url="https://bugzilla.suse.com/1218544" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0217" ref_url="https://www.suse.com/security/cve/CVE-2024-0217/" source="CVE"/>
		<description>
This update for PackageKit fixes the following issues:

- CVE-2024-0217: Check that Finished signal is emitted at most once (bsc#1218544).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-21"/>
	<updated date="2024-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218544">SUSE bug 1218544</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0217/">CVE-2024-0217 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0217">CVE-2024-0217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851896" comment="PackageKit-1.1.3-24.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851897" comment="PackageKit-backend-zypp-1.1.3-24.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851879" comment="PackageKit-lang-1.1.3-24.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851898" comment="libpackagekit-glib2-18-1.1.3-24.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851899" comment="typelib-1_0-PackageKitGlib-1_0-1.1.3-24.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153270" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 12 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1221327" ref_url="https://bugzilla.suse.com/1221327" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388/" source="CVE"/>
		<reference ref_id="CVE-2024-0743" ref_url="https://www.suse.com/security/cve/CVE-2024-0743/" source="CVE"/>
		<reference ref_id="CVE-2024-2605" ref_url="https://www.suse.com/security/cve/CVE-2024-2605/" source="CVE"/>
		<reference ref_id="CVE-2024-2607" ref_url="https://www.suse.com/security/cve/CVE-2024-2607/" source="CVE"/>
		<reference ref_id="CVE-2024-2608" ref_url="https://www.suse.com/security/cve/CVE-2024-2608/" source="CVE"/>
		<reference ref_id="CVE-2024-2610" ref_url="https://www.suse.com/security/cve/CVE-2024-2610/" source="CVE"/>
		<reference ref_id="CVE-2024-2611" ref_url="https://www.suse.com/security/cve/CVE-2024-2611/" source="CVE"/>
		<reference ref_id="CVE-2024-2612" ref_url="https://www.suse.com/security/cve/CVE-2024-2612/" source="CVE"/>
		<reference ref_id="CVE-2024-2614" ref_url="https://www.suse.com/security/cve/CVE-2024-2614/" source="CVE"/>
		<reference ref_id="CVE-2024-2616" ref_url="https://www.suse.com/security/cve/CVE-2024-2616/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 115.9.0 ESR (bsc#1221327):

- CVE-2024-0743: Crash in NSS TLS method (bmo#1867408).    
- CVE-2024-2605: Windows Error Reporter could be used as a Sandbox escape
    vector (bmo#1872920).
- CVE-2024-2607: JIT code failed to save return registers on Armv7-A (bmo#1879939).
- CVE-2024-2608: Integer overflow could have led to out of bounds write (bmo#1880692).
- CVE-2024-2616: Improve handling of out-of-memory conditions in ICU (bmo#1846197).
- CVE-2023-5388: NSS susceptible to timing attack against RSA decryption (bmo#1780432).
- CVE-2024-2610: Improper handling of html and body tags enabled CSP nonce
    leakage (bmo#1871112).
- CVE-2024-2611: Clickjacking vulnerability could have led to a user
    accidentally granting permissions (bmo#1876675).
- CVE-2024-2612: Self referencing object could have potentially led to a use-
    after-free (bmo#1879444).
- CVE-2024-2614: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9,
    and Thunderbird 115.9 (bmo#1685358, bmo#1861016, bmo#1880405,
    bmo#1881093).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-22"/>
	<updated date="2024-03-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0743/">CVE-2024-0743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0743">CVE-2024-0743 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2605/">CVE-2024-2605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2605">CVE-2024-2605 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2607/">CVE-2024-2607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2607">CVE-2024-2607 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2608/">CVE-2024-2608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2608">CVE-2024-2608 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2610/">CVE-2024-2610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2610">CVE-2024-2610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2611/">CVE-2024-2611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2611">CVE-2024-2611 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2612/">CVE-2024-2612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2612">CVE-2024-2612 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2614/">CVE-2024-2614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2614">CVE-2024-2614 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-2616/">CVE-2024-2616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2616">CVE-2024-2616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3</cpe>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851900" comment="MozillaFirefox-115.9.0-112.203.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851876" comment="MozillaFirefox-devel-115.9.0-112.203.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851901" comment="MozillaFirefox-translations-common-115.9.0-112.203.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851900" comment="MozillaFirefox-115.9.0-112.203.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851876" comment="MozillaFirefox-devel-115.9.0-112.203.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851901" comment="MozillaFirefox-translations-common-115.9.0-112.203.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153271" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA</platform>
		</affected>
		<reference ref_id="1219960" ref_url="https://bugzilla.suse.com/1219960" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-25617" ref_url="https://www.suse.com/security/cve/CVE-2024-25617/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2024-25617: Fixed denial of service in HTTP header parser (bsc#1219960).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-26"/>
	<updated date="2024-03-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219960">SUSE bug 1219960</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25617/">CVE-2024-25617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25617">CVE-2024-25617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_teradata:12:sp3-ltss</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009158922" comment="SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852269" comment="squid-3.5.21-26.50.1 is installed"/>
	</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140428" version="1" comment="DirectFB is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140429" version="1" comment="lib++dfb-1_7-1 is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140430" version="1" comment="libdirectfb-1_7-1 is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158922" version="1" comment="sles-release is ==12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157344" version="1" comment="MozillaFirefox is &lt;52.2.0esr-108.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157346" version="1" comment="MozillaFirefox-translations is &lt;52.2.0esr-108.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158923" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158924" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140439" version="1" comment="accountsservice is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140440" version="1" comment="accountsservice-lang is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140441" version="1" comment="libaccountsservice0 is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140442" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158925" version="1" comment="alsa is &lt;1.0.27.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158926" version="1" comment="alsa-docs is &lt;1.0.27.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158927" version="1" comment="libasound2 is &lt;1.0.27.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158928" version="1" comment="libasound2-32bit is &lt;1.0.27.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140447" version="1" comment="ant is &lt;1.9.4-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140448" version="1" comment="apache-commons-beanutils is &lt;1.9.2-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140449" version="1" comment="apache-commons-beanutils-javadoc is &lt;1.9.2-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158929" version="1" comment="apache-commons-daemon is &lt;1.0.15-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158930" version="1" comment="apache-commons-daemon-javadoc is &lt;1.0.15-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140452" version="1" comment="apache-commons-httpclient is &lt;3.1-4.498" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157598" version="1" comment="apache2 is &lt;2.4.23-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157599" version="1" comment="apache2-doc is &lt;2.4.23-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157600" version="1" comment="apache2-example-pages is &lt;2.4.23-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157601" version="1" comment="apache2-prefork is &lt;2.4.23-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157602" version="1" comment="apache2-utils is &lt;2.4.23-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157603" version="1" comment="apache2-worker is &lt;2.4.23-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158931" version="1" comment="apache2-mod_apparmor is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158932" version="1" comment="apparmor-docs is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158933" version="1" comment="apparmor-parser is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158934" version="1" comment="apparmor-profiles is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158935" version="1" comment="apparmor-utils is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158936" version="1" comment="libapparmor1 is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158937" version="1" comment="libapparmor1-32bit is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158938" version="1" comment="pam_apparmor is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158939" version="1" comment="pam_apparmor-32bit is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158940" version="1" comment="perl-apparmor is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140459" version="1" comment="apache2-mod_jk is &lt;1.2.40-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131934" version="1" comment="apache2-mod_nss is &lt;1.0.14-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140460" version="1" comment="apache2-mod_perl is &lt;2.0.8-11.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131107" version="1" comment="at is &lt;3.1.14-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131796" version="1" comment="flex is &lt;2.5.37-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131938" version="1" comment="flex-32bit is &lt;2.5.37-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131109" version="1" comment="libQtWebKit4 is &lt;4.8.6+2.3.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131110" version="1" comment="libQtWebKit4-32bit is &lt;4.8.6+2.3.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131111" version="1" comment="libbonobo is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131112" version="1" comment="libbonobo-32bit is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131939" version="1" comment="libbonobo-doc is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131113" version="1" comment="libbonobo-lang is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150578" version="1" comment="audiofile is &lt;0.3.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150579" version="1" comment="libaudiofile1 is &lt;0.3.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150580" version="1" comment="libaudiofile1-32bit is &lt;0.3.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158941" version="1" comment="augeas is &lt;1.2.0-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158942" version="1" comment="augeas-lenses is &lt;1.2.0-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158943" version="1" comment="libaugeas0 is &lt;1.2.0-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158944" version="1" comment="autofs is &lt;5.0.9-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140465" version="1" comment="automake is &lt;1.13.4-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140466" version="1" comment="m4 is &lt;1.4.16-15.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140467" version="1" comment="avahi is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140468" version="1" comment="avahi-lang is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140469" version="1" comment="avahi-utils is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140470" version="1" comment="libavahi-client3 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140471" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140472" version="1" comment="libavahi-common3 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140473" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140474" version="1" comment="libavahi-core7 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140475" version="1" comment="libdns_sd is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140476" version="1" comment="libdns_sd-32bit is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155546" version="1" comment="bash is &lt;4.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155547" version="1" comment="bash-doc is &lt;4.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155549" version="1" comment="libreadline6 is &lt;6.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155550" version="1" comment="libreadline6-32bit is &lt;6.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155551" version="1" comment="readline-doc is &lt;6.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157661" version="1" comment="bind is &lt;9.9.9P1-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157721" version="1" comment="bind-chrootenv is &lt;9.9.9P1-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157722" version="1" comment="bind-doc is &lt;9.9.9P1-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157662" version="1" comment="bind-libs is &lt;9.9.9P1-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157663" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157664" version="1" comment="bind-utils is &lt;9.9.9P1-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140482" version="1" comment="binutils is &lt;2.26.1-9.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113975" version="1" comment="busybox is &lt;1.21.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140483" version="1" comment="bzip2 is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140484" version="1" comment="bzip2-doc is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140485" version="1" comment="libbz2-1 is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140486" version="1" comment="libbz2-1-32bit is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140487" version="1" comment="chrony is &lt;2.3-3.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140488" version="1" comment="cifs-utils is &lt;6.5-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157660" version="1" comment="clamav is &lt;0.99.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140490" version="1" comment="colord-gtk-lang is &lt;0.1.26-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140491" version="1" comment="libcolord-gtk1 is &lt;0.1.26-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158945" version="1" comment="libcolord2 is &lt;1.3.3-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158946" version="1" comment="libcolord2-32bit is &lt;1.3.3-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158947" version="1" comment="libcolorhug2 is &lt;1.3.3-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140495" version="1" comment="coolkey is &lt;1.1.0-147.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140496" version="1" comment="coreutils is &lt;8.25-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140497" version="1" comment="coreutils-lang is &lt;8.25-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158948" version="1" comment="cpio is &lt;2.11-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158949" version="1" comment="cpio-lang is &lt;2.11-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140498" version="1" comment="cpp48 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140499" version="1" comment="gcc48 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140500" version="1" comment="gcc48-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140501" version="1" comment="gcc48-c++ is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140502" version="1" comment="gcc48-info is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140503" version="1" comment="gcc48-locale is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140504" version="1" comment="libasan0 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140505" version="1" comment="libasan0-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140506" version="1" comment="libstdc++48-devel is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140507" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130930" version="1" comment="cracklib is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131013" version="1" comment="libcrack2 is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131014" version="1" comment="libcrack2-32bit is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158950" version="1" comment="crash is &lt;7.1.8-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158951" version="1" comment="crash-kmp-default is &lt;7.1.8_k4.4.73_5-3.9" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140508" version="1" comment="cron is &lt;4.2-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140509" version="1" comment="cronie is &lt;1.4.11-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130995" version="1" comment="ctags is &lt;5.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158952" version="1" comment="cups is &lt;1.7.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158953" version="1" comment="cups-client is &lt;1.7.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158954" version="1" comment="cups-libs is &lt;1.7.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158955" version="1" comment="cups-libs-32bit is &lt;1.7.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158956" version="1" comment="cups-filters is &lt;1.0.58-17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158957" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158958" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158959" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138209" version="1" comment="cups-pk-helper is &lt;0.2.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138210" version="1" comment="cups-pk-helper-lang is &lt;0.2.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154400" version="1" comment="curl is &lt;7.37.0-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154401" version="1" comment="libcurl4 is &lt;7.37.0-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154402" version="1" comment="libcurl4-32bit is &lt;7.37.0-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140516" version="1" comment="cvs is &lt;1.12.12-181.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140517" version="1" comment="cvs-doc is &lt;1.12.12-181.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140518" version="1" comment="cyrus-sasl is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140519" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140520" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140521" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140522" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140523" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140524" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140525" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140526" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140527" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140528" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140529" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140530" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140531" version="1" comment="cyrus-sasl-sqlauxprop-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140532" version="1" comment="libsasl2-3 is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140533" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140534" version="1" comment="davfs2 is &lt;1.5.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158960" version="1" comment="dbus-1 is &lt;1.8.22-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158961" version="1" comment="dbus-1-x11 is &lt;1.8.22-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158962" version="1" comment="libdbus-1-3 is &lt;1.8.22-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158963" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140539" version="1" comment="dbus-1-glib is &lt;0.100.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140540" version="1" comment="dbus-1-glib-32bit is &lt;0.100.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130039" version="1" comment="dhcp is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130040" version="1" comment="dhcp-client is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130042" version="1" comment="dhcp-relay is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130043" version="1" comment="dhcp-server is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158964" version="1" comment="dnsmasq is &lt;2.76-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131020" version="1" comment="dosfstools is &lt;3.0.26-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158965" version="1" comment="dovecot22 is &lt;2.2.30.2-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158966" version="1" comment="dovecot22-backend-mysql is &lt;2.2.30.2-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158967" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.30.2-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158968" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.30.2-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158969" version="1" comment="dracut is &lt;044-113.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158970" version="1" comment="dracut-fips is &lt;044-113.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140548" version="1" comment="dstat is &lt;0.7.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158971" version="1" comment="e2fsprogs is &lt;1.42.11-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158972" version="1" comment="libcom_err2 is &lt;1.42.11-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158973" version="1" comment="libcom_err2-32bit is &lt;1.42.11-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158974" version="1" comment="libext2fs2 is &lt;1.42.11-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121566" version="1" comment="ecryptfs-utils is &lt;103-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121567" version="1" comment="ecryptfs-utils-32bit is &lt;103-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106094" version="1" comment="elfutils is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106096" version="1" comment="libasm1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106097" version="1" comment="libasm1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106099" version="1" comment="libdw1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106100" version="1" comment="libdw1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106102" version="1" comment="libebl1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106103" version="1" comment="libebl1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106106" version="1" comment="libelf1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106107" version="1" comment="libelf1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158975" version="1" comment="emacs is &lt;24.3-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158976" version="1" comment="emacs-el is &lt;24.3-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158977" version="1" comment="emacs-info is &lt;24.3-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158978" version="1" comment="emacs-nox is &lt;24.3-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158979" version="1" comment="emacs-x11 is &lt;24.3-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158980" version="1" comment="etags is &lt;24.3-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140555" version="1" comment="eog is &lt;3.20.4-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140556" version="1" comment="eog-lang is &lt;3.20.4-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140557" version="1" comment="evince is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140558" version="1" comment="evince-browser-plugin is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140559" version="1" comment="evince-lang is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140560" version="1" comment="evince-plugin-djvudocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140561" version="1" comment="evince-plugin-dvidocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140562" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140563" version="1" comment="evince-plugin-psdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140564" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140565" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140566" version="1" comment="libevdocument3-4 is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140567" version="1" comment="libevview3-3 is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140568" version="1" comment="nautilus-evince is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148243" version="1" comment="expat is &lt;2.1.0-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148244" version="1" comment="libexpat1 is &lt;2.1.0-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148245" version="1" comment="libexpat1-32bit is &lt;2.1.0-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140569" version="1" comment="fetchmail is &lt;6.3.26-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140570" version="1" comment="fetchmailconf is &lt;6.3.26-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103557" version="1" comment="file is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103559" version="1" comment="file-magic is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103561" version="1" comment="libmagic1 is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103560" version="1" comment="libmagic1-32bit is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140574" version="1" comment="fontconfig is &lt;2.11.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140575" version="1" comment="fontconfig-32bit is &lt;2.11.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158981" version="1" comment="freeradius-server is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158982" version="1" comment="freeradius-server-doc is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158983" version="1" comment="freeradius-server-krb5 is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158984" version="1" comment="freeradius-server-ldap is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158985" version="1" comment="freeradius-server-libs is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158986" version="1" comment="freeradius-server-mysql is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158987" version="1" comment="freeradius-server-perl is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158988" version="1" comment="freeradius-server-postgresql is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158989" version="1" comment="freeradius-server-python is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158990" version="1" comment="freeradius-server-sqlite is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158991" version="1" comment="freeradius-server-utils is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158992" version="1" comment="ft2demos is &lt;2.6.3-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110488" version="1" comment="fuse is &lt;2.9.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110491" version="1" comment="libfuse2 is &lt;2.9.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148438" version="1" comment="gd is &lt;2.1.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158993" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158994" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158995" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158996" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158997" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158998" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140597" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140598" version="1" comment="librsvg-2-2 is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140599" version="1" comment="librsvg-2-2-32bit is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140600" version="1" comment="rsvg-view is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140601" version="1" comment="gdm is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140602" version="1" comment="gdm-lang is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140603" version="1" comment="gdmflexiserver is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140604" version="1" comment="libgdm1 is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140605" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155975" version="1" comment="ghostscript is &lt;9.15-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155976" version="1" comment="ghostscript-x11 is &lt;9.15-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126715" version="1" comment="giflib-progs is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126709" version="1" comment="libgif6 is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126710" version="1" comment="libgif6-32bit is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155663" version="1" comment="git-core is &lt;2.12.3-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140606" version="1" comment="glib2-lang is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140607" version="1" comment="glib2-tools is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140608" version="1" comment="libgio-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140609" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140610" version="1" comment="libglib-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140611" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140612" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140613" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140614" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140615" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140616" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140617" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156957" version="1" comment="glibc is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156958" version="1" comment="glibc-32bit is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156959" version="1" comment="glibc-devel is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156960" version="1" comment="glibc-devel-32bit is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156986" version="1" comment="glibc-html is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156961" version="1" comment="glibc-i18ndata is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156987" version="1" comment="glibc-info is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156962" version="1" comment="glibc-locale is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156963" version="1" comment="glibc-locale-32bit is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156988" version="1" comment="glibc-profile is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157048" version="1" comment="glibc-profile-32bit is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156964" version="1" comment="nscd is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140630" version="1" comment="gnome-keyring is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140631" version="1" comment="gnome-keyring-32bit is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140632" version="1" comment="gnome-keyring-lang is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140633" version="1" comment="gnome-keyring-pam is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140634" version="1" comment="gnome-keyring-pam-32bit is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140635" version="1" comment="libgck-modules-gnome-keyring is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158999" version="1" comment="gnome-settings-daemon is &lt;3.20.1-49.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159000" version="1" comment="gnome-settings-daemon-lang is &lt;3.20.1-49.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159001" version="1" comment="gnome-shell is &lt;3.20.4-76.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159002" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-76.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159003" version="1" comment="gnome-shell-lang is &lt;3.20.4-76.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159004" version="1" comment="gnutls is &lt;3.3.27-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159005" version="1" comment="libgnutls-openssl27 is &lt;3.3.27-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159006" version="1" comment="libgnutls28 is &lt;3.3.27-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159007" version="1" comment="libgnutls28-32bit is &lt;3.3.27-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159008" version="1" comment="gpg2 is &lt;2.0.24-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159009" version="1" comment="gpg2-lang is &lt;2.0.24-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140643" version="1" comment="gpgme is &lt;1.5.1-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140644" version="1" comment="libgpgme11 is &lt;1.5.1-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140645" version="1" comment="groff is &lt;1.22.2-5.429" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140646" version="1" comment="groff-full is &lt;1.22.2-5.429" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140647" version="1" comment="gxditview is &lt;1.22.2-5.429" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159010" version="1" comment="grub2 is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159011" version="1" comment="grub2-arm64-efi is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159012" version="1" comment="grub2-i386-pc is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159013" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159014" version="1" comment="grub2-s390x-emu is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159015" version="1" comment="grub2-snapper-plugin is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159016" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159017" version="1" comment="grub2-x86_64-efi is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159018" version="1" comment="grub2-x86_64-xen is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150843" version="1" comment="gstreamer is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150844" version="1" comment="gstreamer-lang is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150845" version="1" comment="gstreamer-utils is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150846" version="1" comment="libgstreamer-1_0-0 is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150847" version="1" comment="libgstreamer-1_0-0-32bit is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150848" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150831" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150832" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150833" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150834" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150835" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150836" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150837" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150838" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150839" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150840" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150841" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150842" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154408" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154409" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154410" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154411" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154412" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154413" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154414" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154415" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154417" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154418" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154419" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154420" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154421" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154422" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154423" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154424" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154425" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154426" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159019" version="1" comment="gstreamer-plugins-good is &lt;1.8.3-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159020" version="1" comment="gstreamer-plugins-good-lang is &lt;1.8.3-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140657" version="1" comment="gtk2-data is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140658" version="1" comment="gtk2-lang is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140659" version="1" comment="gtk2-tools is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140660" version="1" comment="gtk2-tools-32bit is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140661" version="1" comment="libgtk-2_0-0 is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140662" version="1" comment="libgtk-2_0-0-32bit is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159021" version="1" comment="guestfs-data is &lt;1.32.4-19.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159022" version="1" comment="guestfs-tools is &lt;1.32.4-19.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159023" version="1" comment="guestfsd is &lt;1.32.4-19.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159024" version="1" comment="libguestfs0 is &lt;1.32.4-19.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159025" version="1" comment="perl-Sys-Guestfs is &lt;1.32.4-19.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159026" version="1" comment="python-libguestfs is &lt;1.32.4-19.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159027" version="1" comment="virt-p2v is &lt;1.32.4-19.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159028" version="1" comment="virt-v2v is &lt;1.32.4-19.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148134" version="1" comment="guile is &lt;2.0.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148135" version="1" comment="guile-modules-2_0 is &lt;2.0.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148136" version="1" comment="libguile-2_0-22 is &lt;2.0.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140671" version="1" comment="gv is &lt;3.7.4-1.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140672" version="1" comment="wdiff is &lt;1.2.1-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157587" version="1" comment="gvim is &lt;7.4.326-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157588" version="1" comment="vim is &lt;7.4.326-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157589" version="1" comment="vim-data is &lt;7.4.326-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140677" version="1" comment="gzip is &lt;1.6-7.392" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140678" version="1" comment="hardlink is &lt;1.0-6.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159029" version="1" comment="hplip is &lt;3.16.11-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159030" version="1" comment="hplip-hpijs is &lt;3.16.11-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159031" version="1" comment="hplip-sane is &lt;3.16.11-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140682" version="1" comment="hyper-v is &lt;7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140683" version="1" comment="ibus-chewing is &lt;1.4.14-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159032" version="1" comment="ibus-pinyin is &lt;1.5.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159033" version="1" comment="ipsec-tools is &lt;0.8.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140686" version="1" comment="iputils is &lt;s20121221-2.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140687" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-120.238" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140688" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-120.238" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156771" version="1" comment="jakarta-taglibs-standard is &lt;1.1.1-255.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156772" version="1" comment="jakarta-taglibs-standard-javadoc is &lt;1.1.1-255.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155970" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.141-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155977" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.141-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155978" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.141-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155971" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.141-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155701" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.5-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155702" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.5-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155704" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.5-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155705" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.5-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155706" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr4.5-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155710" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr4.5-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155711" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr4.5-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156235" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.131-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156243" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.131-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156244" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.131-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156236" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.131-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140693" version="1" comment="kbd is &lt;1.15.5-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159034" version="1" comment="kdump is &lt;0.8.16-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159035" version="1" comment="kernel-default is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159036" version="1" comment="kernel-default-base is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159037" version="1" comment="kernel-default-devel is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159038" version="1" comment="kernel-default-man is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159039" version="1" comment="kernel-devel is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159040" version="1" comment="kernel-macros is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159041" version="1" comment="kernel-source is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159042" version="1" comment="kernel-syms is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140703" version="1" comment="krb5 is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140704" version="1" comment="krb5-32bit is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140705" version="1" comment="krb5-client is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140706" version="1" comment="krb5-doc is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140707" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140708" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140709" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140710" version="1" comment="krb5-server is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140711" version="1" comment="krb5-appl-clients is &lt;1.0.3-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140712" version="1" comment="krb5-appl-servers is &lt;1.0.3-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159043" version="1" comment="lftp is &lt;4.7.4-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140571" version="1" comment="libFLAC++6 is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140572" version="1" comment="libFLAC8 is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140573" version="1" comment="libFLAC8-32bit is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140717" version="1" comment="libHX28 is &lt;3.18-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140718" version="1" comment="libHX28-32bit is &lt;3.18-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140719" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140720" version="1" comment="openexr is &lt;2.1.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156376" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156378" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159044" version="1" comment="libQt5Concurrent5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159045" version="1" comment="libQt5Core5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159046" version="1" comment="libQt5DBus5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159047" version="1" comment="libQt5Gui5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159048" version="1" comment="libQt5Network5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159049" version="1" comment="libQt5OpenGL5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159050" version="1" comment="libQt5PrintSupport5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159051" version="1" comment="libQt5Sql5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159052" version="1" comment="libQt5Sql5-mysql is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159053" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159054" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159055" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159056" version="1" comment="libQt5Test5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159057" version="1" comment="libQt5Widgets5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159058" version="1" comment="libQt5Xml5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159059" version="1" comment="libQt5WebKit5 is &lt;5.6.2-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159060" version="1" comment="libQt5WebKit5-imports is &lt;5.6.2-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159061" version="1" comment="libQt5WebKitWidgets5 is &lt;5.6.2-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136381" version="1" comment="libX11-6 is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136382" version="1" comment="libX11-6-32bit is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136383" version="1" comment="libX11-data is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136384" version="1" comment="libX11-xcb1 is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136385" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140744" version="1" comment="libXRes1 is &lt;1.0.7-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140745" version="1" comment="libXRes1-32bit is &lt;1.0.7-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140746" version="1" comment="libXcursor1 is &lt;1.1.14-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140747" version="1" comment="libXcursor1-32bit is &lt;1.1.14-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140748" version="1" comment="libXext6 is &lt;1.3.2-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140749" version="1" comment="libXext6-32bit is &lt;1.3.2-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135061" version="1" comment="libXfixes3 is &lt;5.0.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135062" version="1" comment="libXfixes3-32bit is &lt;5.0.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140752" version="1" comment="libXfont1 is &lt;1.5.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136640" version="1" comment="libXi6 is &lt;1.7.4-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136641" version="1" comment="libXi6-32bit is &lt;1.7.4-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140755" version="1" comment="libXinerama1 is &lt;1.1.3-3.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140756" version="1" comment="libXinerama1-32bit is &lt;1.1.3-3.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140757" version="1" comment="libXp6 is &lt;1.0.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140758" version="1" comment="libXp6-32bit is &lt;1.0.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148436" version="1" comment="libXpm4 is &lt;3.5.11-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148437" version="1" comment="libXpm4-32bit is &lt;3.5.11-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140759" version="1" comment="libXrandr2 is &lt;1.5.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140760" version="1" comment="libXrandr2-32bit is &lt;1.5.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135553" version="1" comment="libXrender1 is &lt;0.9.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135554" version="1" comment="libXrender1-32bit is &lt;0.9.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140763" version="1" comment="libXt6 is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140764" version="1" comment="libXt6-32bit is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135081" version="1" comment="libXtst6 is &lt;1.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135082" version="1" comment="libXtst6-32bit is &lt;1.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135086" version="1" comment="libXv1 is &lt;1.0.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135087" version="1" comment="libXv1-32bit is &lt;1.0.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135556" version="1" comment="libXvMC1 is &lt;1.0.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154696" version="1" comment="libXvnc1 is &lt;1.6.0-18.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154697" version="1" comment="tigervnc is &lt;1.6.0-18.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154698" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-18.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140773" version="1" comment="libXxf86dga1 is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140774" version="1" comment="libXxf86vm1 is &lt;1.1.3-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140775" version="1" comment="libXxf86vm1-32bit is &lt;1.1.3-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140776" version="1" comment="libapr-util1 is &lt;1.5.3-1.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140777" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.5.3-1.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140778" version="1" comment="libapr1 is &lt;1.5.1-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135964" version="1" comment="libarchive13 is &lt;3.1.2-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159062" version="1" comment="libasan2 is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159063" version="1" comment="libasan2-32bit is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159064" version="1" comment="libffi4 is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159065" version="1" comment="libffi4-32bit is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159066" version="1" comment="libmpx0 is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159067" version="1" comment="libmpx0-32bit is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159068" version="1" comment="libmpxwrappers0 is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159069" version="1" comment="libmpxwrappers0-32bit is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142721" version="1" comment="libass5 is &lt;0.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159070" version="1" comment="libblkid1 is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159071" version="1" comment="libblkid1-32bit is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159072" version="1" comment="libfdisk1 is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159073" version="1" comment="libmount1 is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159074" version="1" comment="libmount1-32bit is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159075" version="1" comment="libsmartcols1 is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159076" version="1" comment="libuuid1 is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159077" version="1" comment="libuuid1-32bit is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159078" version="1" comment="python-libmount is &lt;2.29.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159079" version="1" comment="util-linux is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159080" version="1" comment="util-linux-lang is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159081" version="1" comment="util-linux-systemd is &lt;2.29.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159082" version="1" comment="uuidd is &lt;2.29.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157339" version="1" comment="libcairo-gobject2 is &lt;1.15.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157340" version="1" comment="libcairo-gobject2-32bit is &lt;1.15.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157341" version="1" comment="libcairo-script-interpreter2 is &lt;1.15.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157342" version="1" comment="libcairo2 is &lt;1.15.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157343" version="1" comment="libcairo2-32bit is &lt;1.15.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146003" version="1" comment="libcares2 is &lt;1.9.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159083" version="1" comment="libcgroup-tools is &lt;0.41.rc1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159084" version="1" comment="libcgroup1 is &lt;0.41.rc1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159085" version="1" comment="libdcerpc-binding0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159086" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159087" version="1" comment="libdcerpc0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159088" version="1" comment="libdcerpc0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159089" version="1" comment="libndr-krb5pac0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159090" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159091" version="1" comment="libndr-nbt0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159092" version="1" comment="libndr-nbt0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159093" version="1" comment="libndr-standard0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159094" version="1" comment="libndr-standard0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159095" version="1" comment="libndr0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159096" version="1" comment="libndr0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159097" version="1" comment="libnetapi0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159098" version="1" comment="libnetapi0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159099" version="1" comment="libsamba-credentials0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159100" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159101" version="1" comment="libsamba-errors0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159102" version="1" comment="libsamba-errors0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159103" version="1" comment="libsamba-hostconfig0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159104" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159105" version="1" comment="libsamba-passdb0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159106" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159107" version="1" comment="libsamba-util0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159108" version="1" comment="libsamba-util0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159109" version="1" comment="libsamdb0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159110" version="1" comment="libsamdb0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159111" version="1" comment="libsmbclient0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159112" version="1" comment="libsmbclient0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159113" version="1" comment="libsmbconf0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159114" version="1" comment="libsmbconf0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159115" version="1" comment="libsmbldap0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159116" version="1" comment="libsmbldap0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159117" version="1" comment="libtevent-util0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159118" version="1" comment="libtevent-util0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159119" version="1" comment="libwbclient0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159120" version="1" comment="libwbclient0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159121" version="1" comment="samba is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159122" version="1" comment="samba-client is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159123" version="1" comment="samba-client-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159124" version="1" comment="samba-doc is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159125" version="1" comment="samba-libs is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159126" version="1" comment="samba-libs-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159127" version="1" comment="samba-winbind is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159128" version="1" comment="samba-winbind-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140838" version="1" comment="libdmx1 is &lt;1.1.3-3.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159129" version="1" comment="libecpg6 is &lt;9.6.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159130" version="1" comment="libpq5 is &lt;9.6.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159131" version="1" comment="libpq5-32bit is &lt;9.6.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159132" version="1" comment="postgresql96 is &lt;9.6.3-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159133" version="1" comment="postgresql96-contrib is &lt;9.6.3-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159134" version="1" comment="postgresql96-docs is &lt;9.6.3-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159135" version="1" comment="postgresql96-server is &lt;9.6.3-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140839" version="1" comment="libevent-2_0-5 is &lt;2.0.21-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140840" version="1" comment="libexif12 is &lt;0.6.21-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140841" version="1" comment="libexif12-32bit is &lt;0.6.21-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155316" version="1" comment="libfreebl3 is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155317" version="1" comment="libfreebl3-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155339" version="1" comment="libfreebl3-hmac is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155342" version="1" comment="libfreebl3-hmac-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155318" version="1" comment="libsoftokn3 is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155319" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155340" version="1" comment="libsoftokn3-hmac is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155343" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155322" version="1" comment="mozilla-nss is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155323" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155324" version="1" comment="mozilla-nss-certs is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155325" version="1" comment="mozilla-nss-certs-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155326" version="1" comment="mozilla-nss-sysinit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155327" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155328" version="1" comment="mozilla-nss-tools is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159136" version="1" comment="libfreetype6 is &lt;2.6.3-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159137" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136646" version="1" comment="libgc1 is &lt;7.2d-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156955" version="1" comment="libgcrypt20 is &lt;1.6.1-16.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156956" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156985" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157047" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145377" version="1" comment="libgme0 is &lt;0.6.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140842" version="1" comment="libgnomesu is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140843" version="1" comment="libgnomesu-lang is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140844" version="1" comment="libgnomesu0 is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159138" version="1" comment="libgoa-1_0-0 is &lt;3.20.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159139" version="1" comment="libgoa-backend-1_0-1 is &lt;3.20.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154911" version="1" comment="libgraphite2-3 is &lt;1.3.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154912" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140845" version="1" comment="libgssglue1 is &lt;0.4-3.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140846" version="1" comment="libgssglue1-32bit is &lt;0.4-3.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140676" version="1" comment="libgypsy0 is &lt;0.9-6.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106170" version="1" comment="libhivex0 is &lt;1.3.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106171" version="1" comment="perl-Win-Hivex is &lt;1.3.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156348" version="1" comment="libhogweed2 is &lt;2.7.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156349" version="1" comment="libhogweed2-32bit is &lt;2.7.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156351" version="1" comment="libnettle4 is &lt;2.7.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156352" version="1" comment="libnettle4-32bit is &lt;2.7.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107570" version="1" comment="libicu-doc is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107572" version="1" comment="libicu52_1 is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107571" version="1" comment="libicu52_1-32bit is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107573" version="1" comment="libicu52_1-data is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131905" version="1" comment="libidn-tools is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130989" version="1" comment="libidn11 is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130990" version="1" comment="libidn11-32bit is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140847" version="1" comment="libimobiledevice6 is &lt;1.2.0-7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159140" version="1" comment="libipa_hbac0 is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159141" version="1" comment="libsss_idmap0 is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159142" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159143" version="1" comment="libsss_sudo is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159144" version="1" comment="python-sssd-config is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159145" version="1" comment="sssd is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159146" version="1" comment="sssd-32bit is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159147" version="1" comment="sssd-ad is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159148" version="1" comment="sssd-ipa is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159149" version="1" comment="sssd-krb5 is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159150" version="1" comment="sssd-krb5-common is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159151" version="1" comment="sssd-ldap is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159152" version="1" comment="sssd-proxy is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159153" version="1" comment="sssd-tools is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140861" version="1" comment="libjansson4 is &lt;2.7-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150812" version="1" comment="libjasper1 is &lt;1.900.14-194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150813" version="1" comment="libjasper1-32bit is &lt;1.900.14-194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140862" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140863" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140864" version="1" comment="libwebkitgtk3-lang is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140865" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140866" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140867" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140868" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140869" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140689" version="1" comment="libjbig2 is &lt;2.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140690" version="1" comment="libjbig2-32bit is &lt;2.0-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105080" version="1" comment="libjpeg-turbo is &lt;1.3.1-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105088" version="1" comment="libjpeg62 is &lt;62.1.0-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105087" version="1" comment="libjpeg62-32bit is &lt;62.1.0-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105091" version="1" comment="libjpeg62-turbo is &lt;1.3.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105082" version="1" comment="libjpeg8 is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105081" version="1" comment="libjpeg8-32bit is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105086" version="1" comment="libturbojpeg0 is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140691" version="1" comment="libjson-c2 is &lt;0.11-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140692" version="1" comment="libjson-c2-32bit is &lt;0.11-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155614" version="1" comment="libkde4 is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155615" version="1" comment="libkde4-32bit is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155616" version="1" comment="libkdecore4 is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155617" version="1" comment="libkdecore4-32bit is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155618" version="1" comment="libksuseinstall1 is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155619" version="1" comment="libksuseinstall1-32bit is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128468" version="1" comment="libksba8 is &lt;1.3.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140713" version="1" comment="liblcms1 is &lt;1.19-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140714" version="1" comment="liblcms1-32bit is &lt;1.19-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156765" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156766" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156767" version="1" comment="openldap2 is &lt;2.4.41-18.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156770" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156768" version="1" comment="openldap2-client is &lt;2.4.41-18.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159154" version="1" comment="libldb1 is &lt;1.1.29-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159155" version="1" comment="libldb1-32bit is &lt;1.1.29-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159156" version="1" comment="libltdl7 is &lt;2.4.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159157" version="1" comment="libltdl7-32bit is &lt;2.4.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159158" version="1" comment="libtool is &lt;2.4.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159159" version="1" comment="libtool-32bit is &lt;2.4.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159160" version="1" comment="liblua5_2 is &lt;5.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159161" version="1" comment="liblua5_2-32bit is &lt;5.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159162" version="1" comment="lua is &lt;5.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140882" version="1" comment="liblzo2-2 is &lt;2.08-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140883" version="1" comment="liblzo2-2-32bit is &lt;2.08-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156854" version="1" comment="libmicrohttpd10 is &lt;0.9.30-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140884" version="1" comment="libmms0 is &lt;0.6.2-15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140885" version="1" comment="libmodplug1 is &lt;0.8.8.4-13.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105814" version="1" comment="libmpfr4 is &lt;3.1.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105815" version="1" comment="libmpfr4-32bit is &lt;3.1.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118765" version="1" comment="libmspack0 is &lt;0.4-14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140886" version="1" comment="libmusicbrainz4 is &lt;2.1.5-27.86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159163" version="1" comment="libmysqlclient18 is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159164" version="1" comment="libmysqlclient18-32bit is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159165" version="1" comment="mariadb is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159166" version="1" comment="mariadb-client is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159167" version="1" comment="mariadb-errormessages is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159168" version="1" comment="mariadb-tools is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140887" version="1" comment="libneon27 is &lt;0.30.0-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140888" version="1" comment="libneon27-32bit is &lt;0.30.0-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139268" version="1" comment="libnetpbm11 is &lt;10.66.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156953" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139269" version="1" comment="netpbm is &lt;10.66.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140889" version="1" comment="libnghttp2-14 is &lt;1.7.1-1.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159169" version="1" comment="libnm-glib-vpn1 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159170" version="1" comment="libnm-glib4 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159171" version="1" comment="libnm-util2 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159172" version="1" comment="libnm0 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159173" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159174" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145907" version="1" comment="libopenjp2-7 is &lt;2.1.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148318" version="1" comment="libopenssl-devel is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148319" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148320" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148322" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148324" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148321" version="1" comment="openssl is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148323" version="1" comment="openssl-doc is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148261" version="1" comment="libopus0 is &lt;1.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124478" version="1" comment="libotr5 is &lt;4.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140897" version="1" comment="libpango-1_0-0 is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140898" version="1" comment="libpango-1_0-0-32bit is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140899" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143034" version="1" comment="libpcre1 is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143035" version="1" comment="libpcre1-32bit is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143036" version="1" comment="libpcre16-0 is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147770" version="1" comment="libpcsclite1 is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147772" version="1" comment="pcsc-lite is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155696" version="1" comment="libplist3 is &lt;1.12-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149999" version="1" comment="libpng12-0 is &lt;1.2.50-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150000" version="1" comment="libpng12-0-32bit is &lt;1.2.50-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150810" version="1" comment="libpng15-15 is &lt;1.5.22-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149948" version="1" comment="libpng16-16 is &lt;1.6.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149949" version="1" comment="libpng16-16-32bit is &lt;1.6.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140902" version="1" comment="libpolkit0 is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140903" version="1" comment="polkit is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140904" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140905" version="1" comment="libpoppler-glib8 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140906" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140907" version="1" comment="libpoppler60 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140908" version="1" comment="poppler-tools is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140909" version="1" comment="libproxy1 is &lt;0.4.13-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140910" version="1" comment="libproxy1-32bit is &lt;0.4.13-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140911" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140912" version="1" comment="libproxy1-config-gnome3-32bit is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140913" version="1" comment="libproxy1-networkmanager is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140914" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159175" version="1" comment="libpulse-mainloop-glib0 is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159176" version="1" comment="libpulse-mainloop-glib0-32bit is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159177" version="1" comment="libpulse0 is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159178" version="1" comment="libpulse0-32bit is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159179" version="1" comment="pulseaudio is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159180" version="1" comment="pulseaudio-esound-compat is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159181" version="1" comment="pulseaudio-gdm-hooks is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159182" version="1" comment="pulseaudio-lang is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159183" version="1" comment="pulseaudio-module-x11 is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159184" version="1" comment="pulseaudio-module-zeroconf is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159185" version="1" comment="pulseaudio-utils is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159186" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159187" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159188" version="1" comment="python-base is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159189" version="1" comment="python-base-32bit is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159190" version="1" comment="python-xml is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159191" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159192" version="1" comment="python3-base is &lt;3.4.6-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125268" version="1" comment="libqt4 is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125269" version="1" comment="libqt4-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125270" version="1" comment="libqt4-qt3support is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125271" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125272" version="1" comment="libqt4-sql is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125273" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125274" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125279" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125283" version="1" comment="libqt4-x11 is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125284" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125290" version="1" comment="qt4-x11-tools is &lt;4.8.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149137" version="1" comment="libquicktime0 is &lt;1.2.4-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140928" version="1" comment="libraptor2-0 is &lt;2.0.10-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159193" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159194" version="1" comment="ruby2.1 is &lt;2.1.9-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159195" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140932" version="1" comment="libsmi is &lt;0.4.8-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140933" version="1" comment="libsmi2 is &lt;0.4.8-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155684" version="1" comment="libsndfile1 is &lt;1.0.25-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155685" version="1" comment="libsndfile1-32bit is &lt;1.0.25-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140934" version="1" comment="libsnmp30 is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140935" version="1" comment="libsnmp30-32bit is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140936" version="1" comment="net-snmp is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140937" version="1" comment="perl-SNMP is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140938" version="1" comment="snmp-mibs is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140939" version="1" comment="libsoup-2_4-1 is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140940" version="1" comment="libsoup-2_4-1-32bit is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140941" version="1" comment="libsoup-lang is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140942" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159196" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159197" version="1" comment="libspice-client-glib-helper is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159198" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159199" version="1" comment="libspice-controller0 is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159200" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159201" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159202" version="1" comment="libspice-server1 is &lt;0.12.8-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159203" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159204" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159205" version="1" comment="sqlite3 is &lt;3.8.10.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140951" version="1" comment="libsrtp1 is &lt;1.5.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140952" version="1" comment="libssh2-1 is &lt;1.4.3-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140953" version="1" comment="libssh2-1-32bit is &lt;1.4.3-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159206" version="1" comment="libsystemd0 is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159207" version="1" comment="libsystemd0-32bit is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159208" version="1" comment="libudev1 is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159209" version="1" comment="libudev1-32bit is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159210" version="1" comment="systemd is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159211" version="1" comment="systemd-32bit is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159212" version="1" comment="systemd-bash-completion is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159213" version="1" comment="systemd-sysvinit is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159214" version="1" comment="udev is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140963" version="1" comment="libtag1 is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140964" version="1" comment="libtag_c0 is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140965" version="1" comment="taglib is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159215" version="1" comment="libtasn1 is &lt;4.9-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159216" version="1" comment="libtasn1-6 is &lt;4.9-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159217" version="1" comment="libtasn1-6-32bit is &lt;4.9-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135881" version="1" comment="libtcnative-1-0 is &lt;1.1.34-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140966" version="1" comment="libthai-data is &lt;0.1.25-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140967" version="1" comment="libthai0 is &lt;0.1.25-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140968" version="1" comment="libthai0-32bit is &lt;0.1.25-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154403" version="1" comment="libtiff5 is &lt;4.0.7-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154404" version="1" comment="libtiff5-32bit is &lt;4.0.7-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154405" version="1" comment="tiff is &lt;4.0.7-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155553" version="1" comment="libtirpc-netconfig is &lt;1.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155554" version="1" comment="libtirpc3 is &lt;1.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155555" version="1" comment="libtirpc3-32bit is &lt;1.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140969" version="1" comment="libudisks2-0 is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140970" version="1" comment="udisks2 is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140971" version="1" comment="udisks2-lang is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140972" version="1" comment="libupsclient1 is &lt;2.7.1-4.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140973" version="1" comment="nut is &lt;2.7.1-4.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140974" version="1" comment="nut-drivers-net is &lt;2.7.1-4.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140975" version="1" comment="libusbmuxd4 is &lt;1.0.10-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140976" version="1" comment="libvdpau1 is &lt;1.1.1-6.73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149816" version="1" comment="libvirglrenderer0 is &lt;0.5.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159218" version="1" comment="libvirt is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159219" version="1" comment="libvirt-admin is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159220" version="1" comment="libvirt-client is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159221" version="1" comment="libvirt-daemon is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159222" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159223" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159224" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159225" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159226" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159227" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159228" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159229" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159230" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159231" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159232" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159233" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159234" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159235" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159236" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159237" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159238" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159239" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159240" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159241" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159242" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159243" version="1" comment="libvirt-doc is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159244" version="1" comment="libvirt-libs is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159245" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159246" version="1" comment="libvirt-nss is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159247" version="1" comment="libvmtools0 is &lt;10.1.5-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159248" version="1" comment="open-vm-tools is &lt;10.1.5-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159249" version="1" comment="open-vm-tools-desktop is &lt;10.1.5-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119309" version="1" comment="libvncclient0 is &lt;0.9.9-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119310" version="1" comment="libvncserver0 is &lt;0.9.9-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140997" version="1" comment="libvorbis-doc is &lt;1.3.3-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140998" version="1" comment="libvorbis0 is &lt;1.3.3-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140999" version="1" comment="libvorbis0-32bit is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141000" version="1" comment="libvorbisenc2 is &lt;1.3.3-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141001" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141002" version="1" comment="libvorbisfile3 is &lt;1.3.3-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141003" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141004" version="1" comment="libvte9 is &lt;0.28.2-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141005" version="1" comment="python-vte is &lt;0.28.2-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141006" version="1" comment="vte2-lang is &lt;0.28.2-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157263" version="1" comment="libwireshark8 is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157264" version="1" comment="libwiretap6 is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157265" version="1" comment="libwscodecs1 is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157266" version="1" comment="libwsutil7 is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157267" version="1" comment="wireshark is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157268" version="1" comment="wireshark-gtk is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141007" version="1" comment="libxcb-dri2-0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141008" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141009" version="1" comment="libxcb-dri3-0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141010" version="1" comment="libxcb-dri3-0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141011" version="1" comment="libxcb-glx0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141012" version="1" comment="libxcb-glx0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141013" version="1" comment="libxcb-present0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141014" version="1" comment="libxcb-present0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141015" version="1" comment="libxcb-randr0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141016" version="1" comment="libxcb-render0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141017" version="1" comment="libxcb-render0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141018" version="1" comment="libxcb-shape0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141019" version="1" comment="libxcb-shm0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141020" version="1" comment="libxcb-shm0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141021" version="1" comment="libxcb-sync1 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141022" version="1" comment="libxcb-sync1-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141023" version="1" comment="libxcb-xf86dri0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141024" version="1" comment="libxcb-xfixes0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141025" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141026" version="1" comment="libxcb-xinerama0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141027" version="1" comment="libxcb-xkb1 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141028" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141029" version="1" comment="libxcb-xv0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141030" version="1" comment="libxcb1 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141031" version="1" comment="libxcb1-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131022" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131023" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157768" version="1" comment="libxml2-2 is &lt;2.9.4-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157769" version="1" comment="libxml2-2-32bit is &lt;2.9.4-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157775" version="1" comment="libxml2-doc is &lt;2.9.4-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157770" version="1" comment="libxml2-tools is &lt;2.9.4-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155536" version="1" comment="libxslt-tools is &lt;1.1.28-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155537" version="1" comment="libxslt1 is &lt;1.1.28-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155538" version="1" comment="libxslt1-32bit is &lt;1.1.28-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141036" version="1" comment="libyaml-0-2 is &lt;0.1.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146180" version="1" comment="libz1 is &lt;1.2.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146181" version="1" comment="libz1-32bit is &lt;1.2.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512005" version="1" comment="zlib-devel is &lt;1.2.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141037" version="1" comment="libzip2 is &lt;0.11.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159250" version="1" comment="logrotate is &lt;3.11.0-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141039" version="1" comment="logwatch is &lt;7.4.3-15.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141040" version="1" comment="mailman is &lt;2.1.17-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141041" version="1" comment="mailx is &lt;12.5-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159251" version="1" comment="memcached is &lt;1.4.33-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154609" version="1" comment="minicom is &lt;2.7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141042" version="1" comment="mipv6d is &lt;2.0.2.umip.0.4-19.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155320" version="1" comment="mozilla-nspr is &lt;4.13.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155321" version="1" comment="mozilla-nspr-32bit is &lt;4.13.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141043" version="1" comment="mutt is &lt;1.6.0-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159252" version="1" comment="ntp is &lt;4.2.8p10-63.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159253" version="1" comment="ntp-doc is &lt;4.2.8p10-63.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141044" version="1" comment="opensc is &lt;0.13.0-1.122" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131298" version="1" comment="openslp is &lt;2.0.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131299" version="1" comment="openslp-32bit is &lt;2.0.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131966" version="1" comment="openslp-server is &lt;2.0.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159254" version="1" comment="openssh is &lt;7.2p2-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159255" version="1" comment="openssh-fips is &lt;7.2p2-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159256" version="1" comment="openssh-helpers is &lt;7.2p2-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157217" version="1" comment="openvpn is &lt;2.3.8-16.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157218" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159257" version="1" comment="openvswitch is &lt;2.7.0-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141054" version="1" comment="opie is &lt;2.4-724.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141055" version="1" comment="opie-32bit is &lt;2.4-724.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128891" version="1" comment="p7zip is &lt;9.20.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155972" version="1" comment="pam is &lt;1.1.8-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155973" version="1" comment="pam-32bit is &lt;1.1.8-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155974" version="1" comment="pam-doc is &lt;1.1.8-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141059" version="1" comment="pam-modules is &lt;12.1-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141060" version="1" comment="pam-modules-32bit is &lt;12.1-23.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141061" version="1" comment="pam_krb5 is &lt;2.4.4-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141062" version="1" comment="pam_krb5-32bit is &lt;2.4.4-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141063" version="1" comment="pam_ssh is &lt;2.0-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141064" version="1" comment="pam_ssh-32bit is &lt;2.0-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110205" version="1" comment="patch is &lt;2.7.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159258" version="1" comment="pcsc-ccid is &lt;1.4.25-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131038" version="1" comment="perl is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131039" version="1" comment="perl-32bit is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131040" version="1" comment="perl-base is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131041" version="1" comment="perl-doc is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141066" version="1" comment="perl-Config-IniFiles is &lt;2.82-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146969" version="1" comment="perl-DBD-mysql is &lt;4.021-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141067" version="1" comment="perl-HTML-Parser is &lt;3.71-1.178" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141068" version="1" comment="perl-LWP-Protocol-https is &lt;6.04-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141069" version="1" comment="perl-Tk is &lt;804.031-3.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113959" version="1" comment="perl-XML-LibXML is &lt;2.0019-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109959" version="1" comment="perl-YAML-LibYAML is &lt;0.38-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108432" version="1" comment="pigz is &lt;2.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159259" version="1" comment="policycoreutils is &lt;2.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159260" version="1" comment="policycoreutils-python is &lt;2.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159261" version="1" comment="powerpc-utils is &lt;1.3.3-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159262" version="1" comment="ppc64-diag is &lt;2.7.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148440" version="1" comment="ppp is &lt;2.4.7-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141073" version="1" comment="procmail is &lt;3.22-267.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159263" version="1" comment="python is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159264" version="1" comment="python-32bit is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159265" version="1" comment="python-curses is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159266" version="1" comment="python-demo is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159267" version="1" comment="python-gdbm is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159268" version="1" comment="python-idle is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159269" version="1" comment="python-tk is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159270" version="1" comment="python-PyYAML is &lt;3.12-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141076" version="1" comment="python-cupshelpers is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141077" version="1" comment="system-config-printer is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141078" version="1" comment="system-config-printer-common is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141079" version="1" comment="system-config-printer-common-lang is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141080" version="1" comment="system-config-printer-dbus-service is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141081" version="1" comment="udev-configure-printer is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159271" version="1" comment="python-doc is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159272" version="1" comment="python-doc-pdf is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141082" version="1" comment="python-imaging is &lt;1.1.7-21.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157771" version="1" comment="python-libxml2 is &lt;2.9.4-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141084" version="1" comment="python-pyOpenSSL is &lt;16.0.0-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141085" version="1" comment="python-pywbem is &lt;0.7.0-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159273" version="1" comment="python-requests is &lt;2.8.1-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159274" version="1" comment="python3 is &lt;3.4.6-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159275" version="1" comment="python3-curses is &lt;3.4.6-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159276" version="1" comment="qemu is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159277" version="1" comment="qemu-arm is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159278" version="1" comment="qemu-block-curl is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159279" version="1" comment="qemu-block-rbd is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159280" version="1" comment="qemu-block-ssh is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159281" version="1" comment="qemu-guest-agent is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159282" version="1" comment="qemu-ipxe is &lt;1.0.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159283" version="1" comment="qemu-kvm is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159284" version="1" comment="qemu-lang is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159285" version="1" comment="qemu-ppc is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159286" version="1" comment="qemu-s390 is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159287" version="1" comment="qemu-seabios is &lt;1.10.2-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159288" version="1" comment="qemu-sgabios is &lt;8-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159289" version="1" comment="qemu-tools is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159290" version="1" comment="qemu-vgabios is &lt;1.10.2-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159291" version="1" comment="qemu-x86 is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131838" version="1" comment="quagga is &lt;0.99.22.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141103" version="1" comment="radvd is &lt;1.9.7-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159292" version="1" comment="res-signingkeys is &lt;3.0.25-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159293" version="1" comment="smt is &lt;3.0.25-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159294" version="1" comment="smt-support is &lt;3.0.25-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155620" version="1" comment="rpcbind is &lt;0.2.3-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141108" version="1" comment="rpm is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141109" version="1" comment="rpm-32bit is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141110" version="1" comment="rpm-build is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146857" version="1" comment="rrdtool is &lt;1.4.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146858" version="1" comment="rrdtool-cached is &lt;1.4.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141111" version="1" comment="rsync is &lt;3.1.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159295" version="1" comment="rsyslog is &lt;8.24.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159296" version="1" comment="rsyslog-diag-tools is &lt;8.24.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159297" version="1" comment="rsyslog-doc is &lt;8.24.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159298" version="1" comment="rsyslog-module-gssapi is &lt;8.24.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159299" version="1" comment="rsyslog-module-gtls is &lt;8.24.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159300" version="1" comment="rsyslog-module-mysql is &lt;8.24.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159301" version="1" comment="rsyslog-module-pgsql is &lt;8.24.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159302" version="1" comment="rsyslog-module-relp is &lt;8.24.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159303" version="1" comment="rsyslog-module-snmp is &lt;8.24.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159304" version="1" comment="rsyslog-module-udpspoof is &lt;8.24.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141122" version="1" comment="rtkit is &lt;0.11_git201205151338-8.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141123" version="1" comment="ruby is &lt;2.1-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149621" version="1" comment="sane-backends is &lt;1.0.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159305" version="1" comment="sblim-sfcb is &lt;1.4.8-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159306" version="1" comment="shim is &lt;0.9-23.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122758" version="1" comment="socat is &lt;1.7.2.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141126" version="1" comment="squashfs is &lt;4.3-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146970" version="1" comment="squid is &lt;3.5.21-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155979" version="1" comment="squidGuard is &lt;1.4-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155980" version="1" comment="squidGuard-doc is &lt;1.4-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156341" version="1" comment="strongswan is &lt;5.1.3-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156342" version="1" comment="strongswan-doc is &lt;5.1.3-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156345" version="1" comment="strongswan-hmac is &lt;5.1.3-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156343" version="1" comment="strongswan-ipsec is &lt;5.1.3-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156344" version="1" comment="strongswan-libs0 is &lt;5.1.3-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110494" version="1" comment="stunnel is &lt;5.00-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159307" version="1" comment="sudo is &lt;1.8.20p2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159308" version="1" comment="supportutils is &lt;3.0-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141132" version="1" comment="sysconfig is &lt;0.84.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141133" version="1" comment="sysconfig-netconfig is &lt;0.84.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141134" version="1" comment="syslog-service is &lt;2.0-778.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159309" version="1" comment="systemtap is &lt;3.0-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159310" version="1" comment="systemtap-runtime is &lt;3.0-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159311" version="1" comment="systemtap-server is &lt;3.0-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159312" version="1" comment="sysvinit-tools is &lt;2.88+-99.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141139" version="1" comment="whois is &lt;5.1.1-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159313" version="1" comment="tar is &lt;1.27.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159314" version="1" comment="tar-lang is &lt;1.27.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154731" version="1" comment="tcpdump is &lt;4.9.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141141" version="1" comment="tftp is &lt;5.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155282" version="1" comment="tomcat is &lt;8.0.43-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155283" version="1" comment="tomcat-admin-webapps is &lt;8.0.43-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155284" version="1" comment="tomcat-docs-webapp is &lt;8.0.43-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155285" version="1" comment="tomcat-el-3_0-api is &lt;8.0.43-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155286" version="1" comment="tomcat-javadoc is &lt;8.0.43-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155287" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.43-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155288" version="1" comment="tomcat-lib is &lt;8.0.43-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155289" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.43-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155290" version="1" comment="tomcat-webapps is &lt;8.0.43-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159315" version="1" comment="tpm2.0-tools is &lt;2.0.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141151" version="1" comment="unixODBC is &lt;2.3.4-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141152" version="1" comment="unixODBC-32bit is &lt;2.3.4-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157766" version="1" comment="unrar is &lt;5.0.14-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106381" version="1" comment="unzip is &lt;6.00-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141153" version="1" comment="update-alternatives is &lt;1.18.4-14.216" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141154" version="1" comment="vino is &lt;3.20.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141155" version="1" comment="vino-lang is &lt;3.20.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115051" version="1" comment="vorbis-tools is &lt;1.4.0-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115052" version="1" comment="vorbis-tools-lang is &lt;1.4.0-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159316" version="1" comment="vsftpd is &lt;3.0.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136644" version="1" comment="w3m is &lt;0.5.3.git20161120-160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149815" version="1" comment="wget is &lt;1.14-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131098" version="1" comment="wpa_supplicant is &lt;2.2-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141158" version="1" comment="xalan-j2 is &lt;2.7.0-264.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106065" version="1" comment="xdg-utils is &lt;20140630-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159317" version="1" comment="xen is &lt;4.9.0_08-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159318" version="1" comment="xen-doc-html is &lt;4.9.0_08-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159319" version="1" comment="xen-libs is &lt;4.9.0_08-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159320" version="1" comment="xen-libs-32bit is &lt;4.9.0_08-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159321" version="1" comment="xen-tools is &lt;4.9.0_08-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159322" version="1" comment="xen-tools-domU is &lt;4.9.0_08-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159323" version="1" comment="xf86-video-intel is &lt;2.99.917.770_gcb6ba2da-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159324" version="1" comment="xfsprogs is &lt;4.3.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141167" version="1" comment="xinetd is &lt;2.3.15-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141168" version="1" comment="xlockmore is &lt;5.43-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141169" version="1" comment="xorg-x11 is &lt;7.6_1-14.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141170" version="1" comment="xorg-x11-essentials is &lt;7.6_1-14.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141171" version="1" comment="xrdb is &lt;1.1.0-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141172" version="1" comment="xorg-x11-libs is &lt;7.6-45.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157352" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157353" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119273" version="1" comment="xscreensaver is &lt;5.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119274" version="1" comment="xscreensaver-data is &lt;5.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159325" version="1" comment="yast2 is &lt;3.2.36-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159326" version="1" comment="yast2-core is &lt;3.2.2-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159327" version="1" comment="yast2-users is &lt;3.2.11-1.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512004" version="1" comment="zoo is &lt;2.10-1020.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596504" version="1" comment="git is &lt;2.12.3-27.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178248" version="1" comment="suse-openstack-cloud-release is ==8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596505" version="1" comment="pdns is &lt;4.1.2-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596506" version="1" comment="pdns-backend-mysql is &lt;4.1.2-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541515" version="1" comment="slf4j is &lt;1.7.12-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596507" version="1" comment="cobbler is &lt;2.6.6-49.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596508" version="1" comment="libmariadb3 is &lt;3.0.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596509" version="1" comment="mariadb is &lt;10.2.15-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596510" version="1" comment="mariadb-client is &lt;10.2.15-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596511" version="1" comment="mariadb-errormessages is &lt;10.2.15-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596512" version="1" comment="mariadb-galera is &lt;10.2.15-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596513" version="1" comment="mariadb-tools is &lt;10.2.15-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596514" version="1" comment="xtrabackup is &lt;2.4.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596515" version="1" comment="grafana is &lt;4.5.1-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596516" version="1" comment="kafka is &lt;0.9.0.1-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596517" version="1" comment="logstash is &lt;2.4.1-5.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596518" version="1" comment="openstack-monasca-installer is &lt;20180622_15.06-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596519" version="1" comment="cobbler is &lt;2.6.6-49.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596520" version="1" comment="openstack-aodh is &lt;5.1.1~dev5-3.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596521" version="1" comment="openstack-aodh-api is &lt;5.1.1~dev5-3.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596522" version="1" comment="openstack-aodh-doc is &lt;5.1.1~dev5-3.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596523" version="1" comment="openstack-aodh-evaluator is &lt;5.1.1~dev5-3.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596524" version="1" comment="openstack-aodh-expirer is &lt;5.1.1~dev5-3.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596525" version="1" comment="openstack-aodh-listener is &lt;5.1.1~dev5-3.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596526" version="1" comment="openstack-aodh-notifier is &lt;5.1.1~dev5-3.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596527" version="1" comment="openstack-barbican is &lt;5.0.1~dev11-3.8.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596528" version="1" comment="openstack-barbican-api is &lt;5.0.1~dev11-3.8.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596529" version="1" comment="openstack-barbican-doc is &lt;5.0.1~dev11-3.8.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596530" version="1" comment="openstack-barbican-keystone-listener is &lt;5.0.1~dev11-3.8.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596531" version="1" comment="openstack-barbican-retry is &lt;5.0.1~dev11-3.8.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596532" version="1" comment="openstack-barbican-worker is &lt;5.0.1~dev11-3.8.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596533" version="1" comment="openstack-cinder is &lt;11.1.2~dev14-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596534" version="1" comment="openstack-cinder-api is &lt;11.1.2~dev14-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596535" version="1" comment="openstack-cinder-backup is &lt;11.1.2~dev14-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596536" version="1" comment="openstack-cinder-doc is &lt;11.1.2~dev14-3.6.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596537" version="1" comment="openstack-cinder-scheduler is &lt;11.1.2~dev14-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596538" version="1" comment="openstack-cinder-volume is &lt;11.1.2~dev14-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596539" version="1" comment="openstack-dashboard is &lt;12.0.4~dev1-3.8.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596540" version="1" comment="openstack-designate is &lt;5.0.2~dev5-3.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596541" version="1" comment="openstack-designate-agent is &lt;5.0.2~dev5-3.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596542" version="1" comment="openstack-designate-api is &lt;5.0.2~dev5-3.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596543" version="1" comment="openstack-designate-central is &lt;5.0.2~dev5-3.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596544" version="1" comment="openstack-designate-doc is &lt;5.0.2~dev5-3.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596545" version="1" comment="openstack-designate-producer is &lt;5.0.2~dev5-3.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596546" version="1" comment="openstack-designate-sink is &lt;5.0.2~dev5-3.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596547" version="1" comment="openstack-designate-worker is &lt;5.0.2~dev5-3.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596548" version="1" comment="openstack-glance is &lt;15.0.2~dev4-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596549" version="1" comment="openstack-glance-api is &lt;15.0.2~dev4-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596550" version="1" comment="openstack-glance-doc is &lt;15.0.2~dev4-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596551" version="1" comment="openstack-glance-registry is &lt;15.0.2~dev4-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596552" version="1" comment="openstack-heat is &lt;9.0.5~dev11-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596553" version="1" comment="openstack-heat-api is &lt;9.0.5~dev11-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596554" version="1" comment="openstack-heat-api-cfn is &lt;9.0.5~dev11-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596555" version="1" comment="openstack-heat-api-cloudwatch is &lt;9.0.5~dev11-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596556" version="1" comment="openstack-heat-doc is &lt;9.0.5~dev11-3.6.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596557" version="1" comment="openstack-heat-engine is &lt;9.0.5~dev11-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596558" version="1" comment="openstack-heat-plugin-heat_docker is &lt;9.0.5~dev11-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596559" version="1" comment="openstack-heat-templates is &lt;0.0.0+git.1525957319.6b5a7cd-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596560" version="1" comment="openstack-heat-test is &lt;9.0.5~dev11-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596561" version="1" comment="openstack-horizon-plugin-designate-ui is &lt;5.0.2~dev5-3.3.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596562" version="1" comment="openstack-horizon-plugin-freezer-ui is &lt;5.0.1~dev6-3.3.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596563" version="1" comment="openstack-horizon-plugin-gbp-ui is &lt;5.0.1~dev21-4.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596564" version="1" comment="openstack-horizon-plugin-manila-ui is &lt;2.10.3~dev4-4.5.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596565" version="1" comment="openstack-horizon-plugin-neutron-lbaas-ui is &lt;3.0.3~dev2-3.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596566" version="1" comment="openstack-horizon-plugin-trove-ui is &lt;9.0.1~dev7-3.3.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596567" version="1" comment="openstack-ironic is &lt;9.1.5~dev7-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596568" version="1" comment="openstack-ironic-api is &lt;9.1.5~dev7-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596569" version="1" comment="openstack-ironic-conductor is &lt;9.1.5~dev7-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596570" version="1" comment="openstack-ironic-doc is &lt;9.1.5~dev7-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596571" version="1" comment="openstack-keystone is &lt;12.0.1~dev19-5.8.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596572" version="1" comment="openstack-keystone-doc is &lt;12.0.1~dev19-5.8.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596573" version="1" comment="openstack-manila is &lt;5.0.2~dev55-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596574" version="1" comment="openstack-manila-api is &lt;5.0.2~dev55-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596575" version="1" comment="openstack-manila-data is &lt;5.0.2~dev55-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596576" version="1" comment="openstack-manila-doc is &lt;5.0.2~dev55-3.6.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596577" version="1" comment="openstack-manila-scheduler is &lt;5.0.2~dev55-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596578" version="1" comment="openstack-manila-share is &lt;5.0.2~dev55-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596579" version="1" comment="openstack-neutron is &lt;11.0.6~dev63-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596580" version="1" comment="openstack-neutron-dhcp-agent is &lt;11.0.6~dev63-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596581" version="1" comment="openstack-neutron-doc is &lt;11.0.6~dev63-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596582" version="1" comment="openstack-neutron-fwaas is &lt;11.0.2~dev7-3.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596583" version="1" comment="openstack-neutron-fwaas-doc is &lt;11.0.2~dev7-3.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596584" version="1" comment="openstack-neutron-ha-tool is &lt;11.0.6~dev63-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596585" version="1" comment="openstack-neutron-l3-agent is &lt;11.0.6~dev63-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596586" version="1" comment="openstack-neutron-lbaas is &lt;11.0.4~dev4-3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596587" version="1" comment="openstack-neutron-lbaas-agent is &lt;11.0.4~dev4-3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596588" version="1" comment="openstack-neutron-lbaas-doc is &lt;11.0.4~dev4-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596589" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;11.0.6~dev63-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596590" version="1" comment="openstack-neutron-macvtap-agent is &lt;11.0.6~dev63-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596591" version="1" comment="openstack-neutron-metadata-agent is &lt;11.0.6~dev63-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596592" version="1" comment="openstack-neutron-metering-agent is &lt;11.0.6~dev63-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596593" version="1" comment="openstack-neutron-openvswitch-agent is &lt;11.0.6~dev63-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596594" version="1" comment="openstack-neutron-server is &lt;11.0.6~dev63-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596595" version="1" comment="openstack-neutron-vpn-agent is &lt;11.0.1~dev1-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596596" version="1" comment="openstack-neutron-vpnaas is &lt;11.0.1~dev1-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596597" version="1" comment="openstack-neutron-vpnaas-doc is &lt;11.0.1~dev1-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596598" version="1" comment="openstack-neutron-vyatta-agent is &lt;11.0.1~dev1-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596599" version="1" comment="openstack-neutron-zvm-agent is &lt;8.0.1~dev12-4.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596600" version="1" comment="openstack-nova is &lt;16.1.5~dev49-3.8.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596601" version="1" comment="openstack-nova-api is &lt;16.1.5~dev49-3.8.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596602" version="1" comment="openstack-nova-cells is &lt;16.1.5~dev49-3.8.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596603" version="1" comment="openstack-nova-compute is &lt;16.1.5~dev49-3.8.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596604" version="1" comment="openstack-nova-conductor is &lt;16.1.5~dev49-3.8.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596605" version="1" comment="openstack-nova-console is &lt;16.1.5~dev49-3.8.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596606" version="1" comment="openstack-nova-consoleauth is &lt;16.1.5~dev49-3.8.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596607" version="1" comment="openstack-nova-doc is &lt;16.1.5~dev49-3.8.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596608" version="1" comment="openstack-nova-novncproxy is &lt;16.1.5~dev49-3.8.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596609" version="1" comment="openstack-nova-placement-api is &lt;16.1.5~dev49-3.8.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596610" version="1" comment="openstack-nova-scheduler is &lt;16.1.5~dev49-3.8.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596611" version="1" comment="openstack-nova-serialproxy is &lt;16.1.5~dev49-3.8.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596612" version="1" comment="openstack-nova-virt-zvm is &lt;8.0.1~dev56-3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596613" version="1" comment="openstack-nova-vncproxy is &lt;16.1.5~dev49-3.8.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596614" version="1" comment="openstack-octavia is &lt;1.0.3~dev21-4.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596615" version="1" comment="openstack-octavia-amphora-agent is &lt;1.0.3~dev21-4.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596616" version="1" comment="openstack-octavia-api is &lt;1.0.3~dev21-4.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596617" version="1" comment="openstack-octavia-health-manager is &lt;1.0.3~dev21-4.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596618" version="1" comment="openstack-octavia-housekeeping is &lt;1.0.3~dev21-4.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596619" version="1" comment="openstack-octavia-worker is &lt;1.0.3~dev21-4.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596620" version="1" comment="openstack-trove is &lt;8.0.1~dev11-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596621" version="1" comment="openstack-trove-api is &lt;8.0.1~dev11-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596622" version="1" comment="openstack-trove-conductor is &lt;8.0.1~dev11-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596623" version="1" comment="openstack-trove-doc is &lt;8.0.1~dev11-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596624" version="1" comment="openstack-trove-guestagent is &lt;8.0.1~dev11-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596625" version="1" comment="openstack-trove-taskmanager is &lt;8.0.1~dev11-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596626" version="1" comment="python-aodh is &lt;5.1.1~dev5-3.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596627" version="1" comment="python-barbican is &lt;5.0.1~dev11-3.8.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596628" version="1" comment="python-barbicanclient is &lt;4.5.2-4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596629" version="1" comment="python-barbicanclient-doc is &lt;4.5.2-4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596630" version="1" comment="python-cinder is &lt;11.1.2~dev14-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596631" version="1" comment="python-designate is &lt;5.0.2~dev5-3.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596632" version="1" comment="python-glance is &lt;15.0.2~dev4-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596633" version="1" comment="python-heat is &lt;9.0.5~dev11-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596634" version="1" comment="python-horizon is &lt;12.0.4~dev1-3.8.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596635" version="1" comment="python-horizon-plugin-designate-ui is &lt;5.0.2~dev5-3.3.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596636" version="1" comment="python-horizon-plugin-freezer-ui is &lt;5.0.1~dev6-3.3.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596637" version="1" comment="python-horizon-plugin-gbp-ui is &lt;5.0.1~dev21-4.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596638" version="1" comment="python-horizon-plugin-manila-ui is &lt;2.10.3~dev4-4.5.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596639" version="1" comment="python-horizon-plugin-neutron-lbaas-ui is &lt;3.0.3~dev2-3.5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596640" version="1" comment="python-horizon-plugin-trove-ui is &lt;9.0.1~dev7-3.3.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596641" version="1" comment="python-ironic is &lt;9.1.5~dev7-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596642" version="1" comment="python-keystone is &lt;12.0.1~dev19-5.8.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596643" version="1" comment="python-keystone-json-assignment is &lt;0.0.2-3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596644" version="1" comment="python-manila is &lt;5.0.2~dev55-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596645" version="1" comment="python-manilaclient is &lt;1.17.3-3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596646" version="1" comment="python-manilaclient-doc is &lt;1.17.3-3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596647" version="1" comment="python-neutron is &lt;11.0.6~dev63-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596648" version="1" comment="python-neutron-fwaas is &lt;11.0.2~dev7-3.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596649" version="1" comment="python-neutron-lbaas is &lt;11.0.4~dev4-3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596650" version="1" comment="python-neutron-vpnaas is &lt;11.0.1~dev1-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596651" version="1" comment="python-nova is &lt;16.1.5~dev49-3.8.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596652" version="1" comment="python-octavia is &lt;1.0.3~dev21-4.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596653" version="1" comment="python-trove is &lt;8.0.1~dev11-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596654" version="1" comment="python-vmware-nsx is &lt;11.0.3~dev16-3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596655" version="1" comment="python-vmware-nsxlib is &lt;11.0.4~dev7-3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596656" version="1" comment="venv-openstack-aodh-x86_64 is &lt;5.0.1-12.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596657" version="1" comment="venv-openstack-barbican-x86_64 is &lt;5.0.1-12.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596658" version="1" comment="venv-openstack-cinder-x86_64 is &lt;11.0.2-14.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596659" version="1" comment="venv-openstack-designate-x86_64 is &lt;5.0.1-12.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596660" version="1" comment="venv-openstack-glance-x86_64 is &lt;15.0.1-12.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596661" version="1" comment="venv-openstack-heat-x86_64 is &lt;9.0.1-12.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596662" version="1" comment="venv-openstack-horizon-x86_64 is &lt;11.0.2-14.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596663" version="1" comment="venv-openstack-ironic-x86_64 is &lt;9.1.3-12.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596664" version="1" comment="venv-openstack-keystone-x86_64 is &lt;12.0.1-11.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596665" version="1" comment="venv-openstack-magnum-x86_64 is &lt;5.0.2-11.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596666" version="1" comment="venv-openstack-manila-x86_64 is &lt;5.0.2-12.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596667" version="1" comment="venv-openstack-neutron-x86_64 is &lt;11.0.2-13.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596668" version="1" comment="venv-openstack-nova-x86_64 is &lt;16.0.3-11.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596669" version="1" comment="venv-openstack-octavia-x86_64 is &lt;1.0.2-12.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596670" version="1" comment="venv-openstack-sahara-x86_64 is &lt;7.0.1-11.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596671" version="1" comment="venv-openstack-trove-x86_64 is &lt;8.0.0.0-11.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596672" version="1" comment="python-cryptography is &lt;2.0.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596673" version="1" comment="python-Django is &lt;1.11.11-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596674" version="1" comment="ardana-monasca is &lt;8.0+git.1535031421.9262a47-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596675" version="1" comment="ardana-spark is &lt;8.0+git.1534267176.a5f3a22-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596676" version="1" comment="kafka is &lt;0.10.2.2-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596677" version="1" comment="openstack-monasca-api is &lt;2.2.1~dev24-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596678" version="1" comment="python-monasca-api is &lt;2.2.1~dev24-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597709" version="1" comment="ardana-ansible is &lt;8.0+git.1539739656.0ef51c9-3.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597710" version="1" comment="ardana-barbican is &lt;8.0+git.1534266594.8136db7-4.27.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597711" version="1" comment="ardana-cinder is &lt;8.0+git.1535412193.d9ad231-3.27.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597712" version="1" comment="ardana-cluster is &lt;8.0+git.1534266734.ec4822f-3.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597713" version="1" comment="ardana-cobbler is &lt;8.0+git.1534780521.780753b-3.29.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597714" version="1" comment="ardana-freezer is &lt;8.0+git.1534266805.c9ea29b-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597715" version="1" comment="ardana-glance is &lt;8.0+git.1537790499.b15fdea-3.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597717" version="1" comment="ardana-input-model is &lt;8.0+git.1539086744.5ae1d6f-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597718" version="1" comment="ardana-keystone is &lt;8.0+git.1536100286.ddd8d3e-3.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849303" version="1" comment="ardana-mq is &lt;8.0+git.1534267034.f95e1ec-3.5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597722" version="1" comment="ardana-neutron is &lt;8.0+git.1537805998.7898f24-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597723" version="1" comment="ardana-nova is &lt;8.0+git.1537895345.35a03a2-3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597724" version="1" comment="ardana-octavia is &lt;8.0+git.1534267086.b7dbe77-3.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849304" version="1" comment="ardana-osconfig is &lt;8.0+git.1540330973.aab0174-3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597726" version="1" comment="ardana-service is &lt;8.0+git.1537825617.23552c2-3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597727" version="1" comment="ardana-service-ansible is &lt;8.0+git.1537806377.25b5d68-3.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597728" version="1" comment="ardana-ses is &lt;8.0+git.1539113493.6631423-1.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597729" version="1" comment="ardana-swift is &lt;8.0+git.1534267211.78fb7e3-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596679" version="1" comment="git is &lt;2.12.3-27.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596680" version="1" comment="ansible is &lt;2.4.6.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597769" version="1" comment="ardana-ansible is &lt;8.0+git.1553878455.7439e04-3.58.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597770" version="1" comment="ardana-cobbler is &lt;8.0+git.1550694449.df88054-3.35.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597771" version="1" comment="ardana-db is &lt;8.0+git.1550589454.df2e733-3.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597772" version="1" comment="ardana-heat is &lt;8.0+git.1552935705.e9a92b3-3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597773" version="1" comment="ardana-manila is &lt;8.0+git.1551748668.7427826-1.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597774" version="1" comment="ardana-neutron is &lt;8.0+git.1551113207.9f1db17-3.27.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597775" version="1" comment="ardana-nova is &lt;8.0+git.1551718533.227cb9e-3.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597776" version="1" comment="ardana-octavia is &lt;8.0+git.1553890679.8a50307-3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597777" version="1" comment="ardana-osconfig is &lt;8.0+git.1552503158.6b6b195-3.33.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597778" version="1" comment="ardana-service is &lt;8.0+git.1551382173.a81d5e1-3.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597779" version="1" comment="ardana-ses is &lt;8.0+git.1554145115.63a4cf2-1.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597780" version="1" comment="ardana-swift is &lt;8.0+git.1551502730.f4d219d-3.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597781" version="1" comment="ardana-tempest is &lt;8.0+git.1554307220.ed24e63-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597782" version="1" comment="documentation-suse-openstack-cloud-installation is &lt;8.20190329-1.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597783" version="1" comment="documentation-suse-openstack-cloud-operations is &lt;8.20190329-1.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597784" version="1" comment="documentation-suse-openstack-cloud-opsconsole is &lt;8.20190329-1.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597785" version="1" comment="documentation-suse-openstack-cloud-planning is &lt;8.20190329-1.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597786" version="1" comment="documentation-suse-openstack-cloud-security is &lt;8.20190329-1.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597787" version="1" comment="documentation-suse-openstack-cloud-supplement is &lt;8.20190329-1.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597788" version="1" comment="documentation-suse-openstack-cloud-upstream-admin is &lt;8.20190329-1.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597789" version="1" comment="documentation-suse-openstack-cloud-upstream-user is &lt;8.20190329-1.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597790" version="1" comment="documentation-suse-openstack-cloud-user is &lt;8.20190329-1.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597791" version="1" comment="galera-python-clustercheck is &lt;0.0+git.1506329536.8f5878c-4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597792" version="1" comment="openstack-dashboard is &lt;12.0.4~dev5-3.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597793" version="1" comment="openstack-ec2-api is &lt;5.0.1~dev10-4.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597794" version="1" comment="openstack-ec2-api-api is &lt;5.0.1~dev10-4.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597795" version="1" comment="openstack-ec2-api-metadata is &lt;5.0.1~dev10-4.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597796" version="1" comment="openstack-ec2-api-s3 is &lt;5.0.1~dev10-4.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597797" version="1" comment="openstack-heat is &lt;9.0.6~dev17-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597798" version="1" comment="openstack-heat-api is &lt;9.0.6~dev17-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597799" version="1" comment="openstack-heat-api-cfn is &lt;9.0.6~dev17-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597800" version="1" comment="openstack-heat-api-cloudwatch is &lt;9.0.6~dev17-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597801" version="1" comment="openstack-heat-doc is &lt;9.0.6~dev17-3.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597802" version="1" comment="openstack-heat-engine is &lt;9.0.6~dev17-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597803" version="1" comment="openstack-heat-plugin-heat_docker is &lt;9.0.6~dev17-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597804" version="1" comment="openstack-heat-templates is &lt;0.0.0+git.1553459627.948e8cc-3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597805" version="1" comment="openstack-heat-test is &lt;9.0.6~dev17-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597806" version="1" comment="openstack-horizon-plugin-ironic-ui is &lt;3.0.4~dev3-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597807" version="1" comment="openstack-horizon-plugin-magnum-ui is &lt;3.0.1~dev9-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597808" version="1" comment="openstack-horizon-plugin-sahara-ui is &lt;7.0.4~dev1-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597809" version="1" comment="openstack-ironic is &lt;9.1.7~dev7-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597810" version="1" comment="openstack-ironic-api is &lt;9.1.7~dev7-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597811" version="1" comment="openstack-ironic-conductor is &lt;9.1.7~dev7-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597812" version="1" comment="openstack-ironic-doc is &lt;9.1.7~dev7-3.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597813" version="1" comment="openstack-keystone is &lt;12.0.3~dev1-5.16.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597814" version="1" comment="openstack-keystone-doc is &lt;12.0.3~dev1-5.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597815" version="1" comment="openstack-magnum is &lt;5.0.2~dev31-4.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597816" version="1" comment="openstack-magnum-api is &lt;5.0.2~dev31-4.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597817" version="1" comment="openstack-magnum-conductor is &lt;5.0.2~dev31-4.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597818" version="1" comment="openstack-magnum-doc is &lt;5.0.2~dev31-4.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597819" version="1" comment="openstack-manila is &lt;5.0.4~dev17-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597820" version="1" comment="openstack-manila-api is &lt;5.0.4~dev17-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597821" version="1" comment="openstack-manila-data is &lt;5.0.4~dev17-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597822" version="1" comment="openstack-manila-doc is &lt;5.0.4~dev17-3.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597823" version="1" comment="openstack-manila-scheduler is &lt;5.0.4~dev17-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597824" version="1" comment="openstack-manila-share is &lt;5.0.4~dev17-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597825" version="1" comment="openstack-monasca-api is &lt;2.2.1~dev25-3.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597826" version="1" comment="openstack-monasca-notification is &lt;1.10.2~dev2-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597827" version="1" comment="openstack-monasca-persister is &lt;1.7.1~dev8-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597828" version="1" comment="openstack-murano is &lt;4.0.1~dev5-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597829" version="1" comment="openstack-murano-api is &lt;4.0.1~dev5-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597830" version="1" comment="openstack-murano-doc is &lt;4.0.1~dev5-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597831" version="1" comment="openstack-murano-engine is &lt;4.0.1~dev5-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597832" version="1" comment="openstack-neutron is &lt;11.0.7~dev100-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597833" version="1" comment="openstack-neutron-dhcp-agent is &lt;11.0.7~dev100-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597834" version="1" comment="openstack-neutron-doc is &lt;11.0.7~dev100-3.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597835" version="1" comment="openstack-neutron-fwaas is &lt;11.0.2~dev8-3.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597836" version="1" comment="openstack-neutron-fwaas-doc is &lt;11.0.2~dev8-3.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597837" version="1" comment="openstack-neutron-ha-tool is &lt;11.0.7~dev100-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597838" version="1" comment="openstack-neutron-l3-agent is &lt;11.0.7~dev100-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597839" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;11.0.7~dev100-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597840" version="1" comment="openstack-neutron-macvtap-agent is &lt;11.0.7~dev100-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597841" version="1" comment="openstack-neutron-metadata-agent is &lt;11.0.7~dev100-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597842" version="1" comment="openstack-neutron-metering-agent is &lt;11.0.7~dev100-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597843" version="1" comment="openstack-neutron-openvswitch-agent is &lt;11.0.7~dev100-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597844" version="1" comment="openstack-neutron-server is &lt;11.0.7~dev100-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597845" version="1" comment="openstack-nova is &lt;16.1.8~dev53-3.20.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597846" version="1" comment="openstack-nova-api is &lt;16.1.8~dev53-3.20.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597847" version="1" comment="openstack-nova-cells is &lt;16.1.8~dev53-3.20.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597848" version="1" comment="openstack-nova-compute is &lt;16.1.8~dev53-3.20.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597849" version="1" comment="openstack-nova-conductor is &lt;16.1.8~dev53-3.20.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597850" version="1" comment="openstack-nova-console is &lt;16.1.8~dev53-3.20.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597851" version="1" comment="openstack-nova-consoleauth is &lt;16.1.8~dev53-3.20.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597852" version="1" comment="openstack-nova-doc is &lt;16.1.8~dev53-3.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597853" version="1" comment="openstack-nova-novncproxy is &lt;16.1.8~dev53-3.20.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597854" version="1" comment="openstack-nova-placement-api is &lt;16.1.8~dev53-3.20.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597855" version="1" comment="openstack-nova-scheduler is &lt;16.1.8~dev53-3.20.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597856" version="1" comment="openstack-nova-serialproxy is &lt;16.1.8~dev53-3.20.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597857" version="1" comment="openstack-nova-vncproxy is &lt;16.1.8~dev53-3.20.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597858" version="1" comment="openstack-octavia is &lt;1.0.5~dev1-4.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597859" version="1" comment="openstack-octavia-amphora-agent is &lt;1.0.5~dev1-4.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597860" version="1" comment="openstack-octavia-api is &lt;1.0.5~dev1-4.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597861" version="1" comment="openstack-octavia-health-manager is &lt;1.0.5~dev1-4.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597862" version="1" comment="openstack-octavia-housekeeping is &lt;1.0.5~dev1-4.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597863" version="1" comment="openstack-octavia-worker is &lt;1.0.5~dev1-4.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597864" version="1" comment="openstack-sahara is &lt;7.0.4~dev1-3.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597865" version="1" comment="openstack-sahara-api is &lt;7.0.4~dev1-3.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597866" version="1" comment="openstack-sahara-doc is &lt;7.0.4~dev1-3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597867" version="1" comment="openstack-sahara-engine is &lt;7.0.4~dev1-3.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597868" version="1" comment="openstack-swift is &lt;2.15.2~dev32-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597869" version="1" comment="openstack-swift-account is &lt;2.15.2~dev32-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597870" version="1" comment="openstack-swift-container is &lt;2.15.2~dev32-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597871" version="1" comment="openstack-swift-doc is &lt;2.15.2~dev32-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597872" version="1" comment="openstack-swift-object is &lt;2.15.2~dev32-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597873" version="1" comment="openstack-swift-proxy is &lt;2.15.2~dev32-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597874" version="1" comment="openstack-tempest is &lt;17.0.0-4.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597875" version="1" comment="openstack-tempest-test is &lt;17.0.0-4.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597876" version="1" comment="python-cinderclient is &lt;3.1.1-3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597877" version="1" comment="python-cinderclient-doc is &lt;3.1.1-3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597878" version="1" comment="python-cryptography is &lt;2.0.3-3.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597879" version="1" comment="python-ec2api is &lt;5.0.1~dev10-4.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597880" version="1" comment="python-heat is &lt;9.0.6~dev17-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597881" version="1" comment="python-horizon is &lt;12.0.4~dev5-3.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597882" version="1" comment="python-horizon-plugin-ironic-ui is &lt;3.0.4~dev3-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597883" version="1" comment="python-horizon-plugin-magnum-ui is &lt;3.0.1~dev9-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597884" version="1" comment="python-horizon-plugin-sahara-ui is &lt;7.0.4~dev1-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597885" version="1" comment="python-ironic is &lt;9.1.7~dev7-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597886" version="1" comment="python-keystone is &lt;12.0.3~dev1-5.16.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597887" version="1" comment="python-magnum is &lt;5.0.2~dev31-4.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597888" version="1" comment="python-manila is &lt;5.0.4~dev17-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597889" version="1" comment="python-monasca-api is &lt;2.2.1~dev25-3.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597890" version="1" comment="python-monasca-common is &lt;2.3.1~dev4-4.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597891" version="1" comment="python-monasca-notification is &lt;1.10.2~dev2-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597892" version="1" comment="python-monasca-persister is &lt;1.7.1~dev8-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597893" version="1" comment="python-murano is &lt;4.0.1~dev5-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597894" version="1" comment="python-neutron is &lt;11.0.7~dev100-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597895" version="1" comment="python-neutron-fwaas is &lt;11.0.2~dev8-3.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597896" version="1" comment="python-nova is &lt;16.1.8~dev53-3.20.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597897" version="1" comment="python-octavia is &lt;1.0.5~dev1-4.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597898" version="1" comment="python-os-brick is &lt;1.15.8-3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597899" version="1" comment="python-sahara is &lt;7.0.4~dev1-3.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597900" version="1" comment="python-swift is &lt;2.15.2~dev32-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597901" version="1" comment="python-tempest is &lt;17.0.0-4.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597902" version="1" comment="venv-openstack-aodh-x86_64 is &lt;5.1.1~dev6-12.14.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597903" version="1" comment="venv-openstack-barbican-x86_64 is &lt;5.0.2~dev2-12.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597904" version="1" comment="venv-openstack-ceilometer-x86_64 is &lt;9.0.7~dev2-12.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597905" version="1" comment="venv-openstack-cinder-x86_64 is &lt;11.1.2~dev58-14.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597906" version="1" comment="venv-openstack-designate-x86_64 is &lt;5.0.3~dev6-12.13.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597907" version="1" comment="venv-openstack-freezer-x86_64 is &lt;5.0.0.0~xrc2~dev2-10.10.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597908" version="1" comment="venv-openstack-glance-x86_64 is &lt;15.0.2~dev9-12.13.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597909" version="1" comment="venv-openstack-heat-x86_64 is &lt;9.0.6~dev17-12.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597910" version="1" comment="venv-openstack-horizon-x86_64 is &lt;12.0.4~dev5-14.20.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597911" version="1" comment="venv-openstack-ironic-x86_64 is &lt;9.1.7~dev7-12.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597912" version="1" comment="venv-openstack-keystone-x86_64 is &lt;12.0.3~dev1-11.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597913" version="1" comment="venv-openstack-magnum-x86_64 is &lt;5.0.2-11.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597914" version="1" comment="venv-openstack-manila-x86_64 is &lt;5.0.4~dev17-12.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597915" version="1" comment="venv-openstack-monasca-ceilometer-x86_64 is &lt;1.5.1-8.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597916" version="1" comment="venv-openstack-monasca-x86_64 is &lt;2.2.1-11.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597917" version="1" comment="venv-openstack-murano-x86_64 is &lt;4.0.1-12.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597918" version="1" comment="venv-openstack-neutron-x86_64 is &lt;11.0.2-13.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597919" version="1" comment="venv-openstack-nova-x86_64 is &lt;16.1.8~dev53-11.16.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597920" version="1" comment="venv-openstack-octavia-x86_64 is &lt;1.0.5~dev1-12.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597921" version="1" comment="venv-openstack-sahara-x86_64 is &lt;7.0.4~dev1-11.14.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597922" version="1" comment="venv-openstack-swift-x86_64 is &lt;2.15.2-11.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597923" version="1" comment="venv-openstack-trove-x86_64 is &lt;8.0.1~dev12-11.14.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596681" version="1" comment="mariadb is &lt;10.2.22-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596682" version="1" comment="mariadb-client is &lt;10.2.22-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596683" version="1" comment="mariadb-errormessages is &lt;10.2.22-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596684" version="1" comment="mariadb-galera is &lt;10.2.22-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596685" version="1" comment="mariadb-tools is &lt;10.2.22-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521526" version="1" comment="libssh2-1 is &lt;1.4.3-20.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521924" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521537" version="1" comment="MozillaFirefox is &lt;60.7.2-109.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521538" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.2-109.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596686" version="1" comment="dnsmasq-utils is &lt;2.78-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521936" version="1" comment="libecpg6 is &lt;10.9-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521937" version="1" comment="libpq5 is &lt;10.9-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521938" version="1" comment="libpq5-32bit is &lt;10.9-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521939" version="1" comment="postgresql10 is &lt;10.9-1.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530575" version="1" comment="postgresql10-contrib is &lt;10.9-1.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530576" version="1" comment="postgresql10-docs is &lt;10.9-1.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530577" version="1" comment="postgresql10-plperl is &lt;10.9-1.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530578" version="1" comment="postgresql10-plpython is &lt;10.9-1.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530579" version="1" comment="postgresql10-pltcl is &lt;10.9-1.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530580" version="1" comment="postgresql10-server is &lt;10.9-1.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521943" version="1" comment="glib2-lang is &lt;2.48.2-12.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521944" version="1" comment="glib2-tools is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521945" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521946" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521948" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521949" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521950" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521951" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521952" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521953" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521954" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521955" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521583" version="1" comment="kernel-default is &lt;4.4.180-94.100.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596687" version="1" comment="kernel-default-base is &lt;4.4.180-94.100.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521584" version="1" comment="kernel-default-devel is &lt;4.4.180-94.100.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521586" version="1" comment="kernel-devel is &lt;4.4.180-94.100.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521587" version="1" comment="kernel-macros is &lt;4.4.180-94.100.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521588" version="1" comment="kernel-source is &lt;4.4.180-94.100.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521589" version="1" comment="kernel-syms is &lt;4.4.180-94.100.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596688" version="1" comment="kgraft-patch-4_4_180-94_100-default is &lt;1-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521974" version="1" comment="MozillaFirefox is &lt;60.8.0-109.83.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521975" version="1" comment="MozillaFirefox-translations-common is &lt;60.8.0-109.83.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521976" version="1" comment="libfreebl3 is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521977" version="1" comment="libfreebl3-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530590" version="1" comment="libfreebl3-hmac is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530591" version="1" comment="libfreebl3-hmac-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521978" version="1" comment="libsoftokn3 is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521979" version="1" comment="libsoftokn3-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530592" version="1" comment="libsoftokn3-hmac is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530593" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521980" version="1" comment="mozilla-nss is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521981" version="1" comment="mozilla-nss-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521982" version="1" comment="mozilla-nss-certs is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521983" version="1" comment="mozilla-nss-certs-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521984" version="1" comment="mozilla-nss-sysinit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521985" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521986" version="1" comment="mozilla-nss-tools is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596689" version="1" comment="ardana-ansible is &lt;8.0+git.1553878455.7439e04-3.61.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596690" version="1" comment="ardana-barbican is &lt;8.0+git.1534266594.8136db7-4.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596691" version="1" comment="ardana-cassandra is &lt;8.0+git.1534266612.44dcb20-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596692" version="1" comment="ardana-ceilometer is &lt;8.0+git.1534266629.0bb5d54-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596693" version="1" comment="ardana-cinder is &lt;8.0+git.1558619942.6bd075c-3.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596694" version="1" comment="ardana-cluster is &lt;8.0+git.1534266734.ec4822f-3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596695" version="1" comment="ardana-cobbler is &lt;8.0+git.1550694449.df88054-3.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596696" version="1" comment="ardana-db is &lt;8.0+git.1555341117.d812d88-3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596697" version="1" comment="ardana-designate is &lt;8.0+git.1558636763.f7f09ca-3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596698" version="1" comment="ardana-freezer is &lt;8.0+git.1534266805.c9ea29b-3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596699" version="1" comment="ardana-glance is &lt;8.0+git.1555450219.97789ac-3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596700" version="1" comment="ardana-heat is &lt;8.0+git.1555450207.a7d3bfe-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596701" version="1" comment="ardana-horizon is &lt;8.0+git.1554732431.8f9dd50-3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596702" version="1" comment="ardana-input-model is &lt;8.0+git.1557418274.fb273dd-3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596703" version="1" comment="ardana-ironic is &lt;8.0+git.1534266893.1d69df7-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596704" version="1" comment="ardana-keystone is &lt;8.0+git.1554915846.db23473-3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596705" version="1" comment="ardana-logging is &lt;8.0+git.1544117621.1c9a954-3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596706" version="1" comment="ardana-magnum is &lt;8.0+git.1555450198.c42dc52-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596707" version="1" comment="ardana-manila is &lt;8.0+git.1551748668.7427826-1.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596708" version="1" comment="ardana-memcached is &lt;8.0+git.1534266982.498c352-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596709" version="1" comment="ardana-monasca is &lt;8.0+git.1557856965.bde9eb2-3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596710" version="1" comment="ardana-monasca-transform is &lt;8.0+git.1534267017.4bbecd9-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596711" version="1" comment="ardana-mq is &lt;8.0+git.1549882721.b2e8873-3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596712" version="1" comment="ardana-neutron is &lt;8.0+git.1557523208.81aa1da-3.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596713" version="1" comment="ardana-nova is &lt;8.0+git.1559253853.bb932ea-3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596714" version="1" comment="ardana-octavia is &lt;8.0+git.1557523035.ab44613-3.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596715" version="1" comment="ardana-opsconsole is &lt;8.0+git.1534267103.829be13-3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596716" version="1" comment="ardana-opsconsole-ui is &lt;8.0+git.1537201508.68c32e6-3.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596717" version="1" comment="ardana-osconfig is &lt;8.0+git.1557503482.852ec24-3.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596718" version="1" comment="ardana-service is &lt;8.0+git.1551382173.a81d5e1-3.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596719" version="1" comment="ardana-service-ansible is &lt;8.0+git.1544119019.e68516a-3.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596720" version="1" comment="ardana-ses is &lt;8.0+git.1554912320.73ad306-1.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596721" version="1" comment="ardana-spark is &lt;8.0+git.1539709555.5b31c25-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596722" version="1" comment="ardana-swift is &lt;8.0+git.1551502730.f4d219d-3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596723" version="1" comment="ardana-tempest is &lt;8.0+git.1557761054.b971c8f-3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596724" version="1" comment="ardana-tls is &lt;8.0+git.1534267264.6b1e899-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596725" version="1" comment="documentation-suse-openstack-cloud-installation is &lt;8.20190521-1.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596726" version="1" comment="documentation-suse-openstack-cloud-operations is &lt;8.20190521-1.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596727" version="1" comment="documentation-suse-openstack-cloud-opsconsole is &lt;8.20190521-1.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596728" version="1" comment="documentation-suse-openstack-cloud-planning is &lt;8.20190521-1.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596729" version="1" comment="documentation-suse-openstack-cloud-security is &lt;8.20190521-1.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596730" version="1" comment="documentation-suse-openstack-cloud-supplement is &lt;8.20190521-1.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596731" version="1" comment="documentation-suse-openstack-cloud-upstream-admin is &lt;8.20190521-1.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596732" version="1" comment="documentation-suse-openstack-cloud-upstream-user is &lt;8.20190521-1.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596733" version="1" comment="documentation-suse-openstack-cloud-user is &lt;8.20190521-1.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596734" version="1" comment="openstack-aodh is &lt;5.1.1~dev7-3.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596735" version="1" comment="openstack-aodh-api is &lt;5.1.1~dev7-3.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596736" version="1" comment="openstack-aodh-doc is &lt;5.1.1~dev7-3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596737" version="1" comment="openstack-aodh-evaluator is &lt;5.1.1~dev7-3.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596738" version="1" comment="openstack-aodh-expirer is &lt;5.1.1~dev7-3.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596739" version="1" comment="openstack-aodh-listener is &lt;5.1.1~dev7-3.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596740" version="1" comment="openstack-aodh-notifier is &lt;5.1.1~dev7-3.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596741" version="1" comment="openstack-barbican is &lt;5.0.2~dev3-3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596742" version="1" comment="openstack-barbican-api is &lt;5.0.2~dev3-3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596743" version="1" comment="openstack-barbican-doc is &lt;5.0.2~dev3-3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596744" version="1" comment="openstack-barbican-keystone-listener is &lt;5.0.2~dev3-3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596745" version="1" comment="openstack-barbican-retry is &lt;5.0.2~dev3-3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596746" version="1" comment="openstack-barbican-worker is &lt;5.0.2~dev3-3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596747" version="1" comment="openstack-ceilometer is &lt;9.0.8~dev7-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596748" version="1" comment="openstack-ceilometer-agent-central is &lt;9.0.8~dev7-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596749" version="1" comment="openstack-ceilometer-agent-compute is &lt;9.0.8~dev7-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596750" version="1" comment="openstack-ceilometer-agent-ipmi is &lt;9.0.8~dev7-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596751" version="1" comment="openstack-ceilometer-agent-notification is &lt;9.0.8~dev7-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596752" version="1" comment="openstack-ceilometer-api is &lt;9.0.8~dev7-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596753" version="1" comment="openstack-ceilometer-collector is &lt;9.0.8~dev7-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596754" version="1" comment="openstack-ceilometer-doc is &lt;9.0.8~dev7-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596755" version="1" comment="openstack-ceilometer-polling is &lt;9.0.8~dev7-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596756" version="1" comment="openstack-cinder is &lt;11.2.3~dev5-3.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596757" version="1" comment="openstack-cinder-api is &lt;11.2.3~dev5-3.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596758" version="1" comment="openstack-cinder-backup is &lt;11.2.3~dev5-3.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596759" version="1" comment="openstack-cinder-doc is &lt;11.2.3~dev5-3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596760" version="1" comment="openstack-cinder-scheduler is &lt;11.2.3~dev5-3.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596761" version="1" comment="openstack-cinder-volume is &lt;11.2.3~dev5-3.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596762" version="1" comment="openstack-dashboard is &lt;12.0.4~dev6-3.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596763" version="1" comment="openstack-dashboard-theme-SUSE is &lt;2017.2+git.1554906711.9dbe79b-7.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596764" version="1" comment="openstack-designate is &lt;5.0.3~dev7-3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596765" version="1" comment="openstack-designate-agent is &lt;5.0.3~dev7-3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596766" version="1" comment="openstack-designate-api is &lt;5.0.3~dev7-3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596767" version="1" comment="openstack-designate-central is &lt;5.0.3~dev7-3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596768" version="1" comment="openstack-designate-doc is &lt;5.0.3~dev7-3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596769" version="1" comment="openstack-designate-producer is &lt;5.0.3~dev7-3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596770" version="1" comment="openstack-designate-sink is &lt;5.0.3~dev7-3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596771" version="1" comment="openstack-designate-worker is &lt;5.0.3~dev7-3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596772" version="1" comment="openstack-heat is &lt;9.0.8~dev3-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596773" version="1" comment="openstack-heat-api is &lt;9.0.8~dev3-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596774" version="1" comment="openstack-heat-api-cfn is &lt;9.0.8~dev3-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596775" version="1" comment="openstack-heat-api-cloudwatch is &lt;9.0.8~dev3-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596776" version="1" comment="openstack-heat-doc is &lt;9.0.8~dev3-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596777" version="1" comment="openstack-heat-engine is &lt;9.0.8~dev3-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596778" version="1" comment="openstack-heat-gbp is &lt;7.0.1~dev1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596779" version="1" comment="openstack-heat-plugin-heat_docker is &lt;9.0.8~dev3-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596780" version="1" comment="openstack-heat-test is &lt;9.0.8~dev3-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596781" version="1" comment="openstack-horizon-plugin-trove-ui is &lt;9.0.1~dev10-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596782" version="1" comment="openstack-ironic is &lt;9.1.8~dev5-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596783" version="1" comment="openstack-ironic-api is &lt;9.1.8~dev5-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596784" version="1" comment="openstack-ironic-conductor is &lt;9.1.8~dev5-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596785" version="1" comment="openstack-ironic-doc is &lt;9.1.8~dev5-3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596786" version="1" comment="openstack-keystone is &lt;12.0.4~dev2-5.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596787" version="1" comment="openstack-keystone-doc is &lt;12.0.4~dev2-5.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596788" version="1" comment="openstack-monasca-agent is &lt;2.2.5~dev2-3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596789" version="1" comment="openstack-monasca-api is &lt;2.2.1~dev26-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596790" version="1" comment="openstack-monasca-log-api is &lt;2.3.1~dev12-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596791" version="1" comment="openstack-neutron is &lt;11.0.9~dev28-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596792" version="1" comment="openstack-neutron-dhcp-agent is &lt;11.0.9~dev28-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596793" version="1" comment="openstack-neutron-doc is &lt;11.0.9~dev28-3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596794" version="1" comment="openstack-neutron-fwaas is &lt;11.0.3~dev1-3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596795" version="1" comment="openstack-neutron-fwaas-doc is &lt;11.0.3~dev1-3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596796" version="1" comment="openstack-neutron-gbp is &lt;7.3.1~dev28-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596797" version="1" comment="openstack-neutron-ha-tool is &lt;11.0.9~dev28-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596798" version="1" comment="openstack-neutron-l3-agent is &lt;11.0.9~dev28-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596799" version="1" comment="openstack-neutron-lbaas is &lt;11.0.4~dev6-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596800" version="1" comment="openstack-neutron-lbaas-agent is &lt;11.0.4~dev6-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596801" version="1" comment="openstack-neutron-lbaas-doc is &lt;11.0.4~dev6-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596802" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;11.0.9~dev28-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596803" version="1" comment="openstack-neutron-macvtap-agent is &lt;11.0.9~dev28-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596804" version="1" comment="openstack-neutron-metadata-agent is &lt;11.0.9~dev28-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596805" version="1" comment="openstack-neutron-metering-agent is &lt;11.0.9~dev28-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596806" version="1" comment="openstack-neutron-openvswitch-agent is &lt;11.0.9~dev28-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596807" version="1" comment="openstack-neutron-server is &lt;11.0.9~dev28-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596808" version="1" comment="openstack-neutron-vpn-agent is &lt;11.0.1~dev5-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596809" version="1" comment="openstack-neutron-vpnaas is &lt;11.0.1~dev5-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596810" version="1" comment="openstack-neutron-vpnaas-doc is &lt;11.0.1~dev5-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596811" version="1" comment="openstack-neutron-vyatta-agent is &lt;11.0.1~dev5-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596812" version="1" comment="openstack-nova is &lt;16.1.9~dev3-3.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596813" version="1" comment="openstack-nova-api is &lt;16.1.9~dev3-3.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596814" version="1" comment="openstack-nova-cells is &lt;16.1.9~dev3-3.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596815" version="1" comment="openstack-nova-compute is &lt;16.1.9~dev3-3.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596816" version="1" comment="openstack-nova-conductor is &lt;16.1.9~dev3-3.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596817" version="1" comment="openstack-nova-console is &lt;16.1.9~dev3-3.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596818" version="1" comment="openstack-nova-consoleauth is &lt;16.1.9~dev3-3.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596819" version="1" comment="openstack-nova-doc is &lt;16.1.9~dev3-3.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596820" version="1" comment="openstack-nova-novncproxy is &lt;16.1.9~dev3-3.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596821" version="1" comment="openstack-nova-placement-api is &lt;16.1.9~dev3-3.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596822" version="1" comment="openstack-nova-scheduler is &lt;16.1.9~dev3-3.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596823" version="1" comment="openstack-nova-serialproxy is &lt;16.1.9~dev3-3.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596824" version="1" comment="openstack-nova-vncproxy is &lt;16.1.9~dev3-3.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596825" version="1" comment="openstack-trove is &lt;8.0.1~dev13-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596826" version="1" comment="openstack-trove-api is &lt;8.0.1~dev13-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596827" version="1" comment="openstack-trove-conductor is &lt;8.0.1~dev13-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596828" version="1" comment="openstack-trove-doc is &lt;8.0.1~dev13-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596829" version="1" comment="openstack-trove-guestagent is &lt;8.0.1~dev13-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596830" version="1" comment="openstack-trove-taskmanager is &lt;8.0.1~dev13-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596831" version="1" comment="python-Django is &lt;1.11.20-3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596832" version="1" comment="python-aodh is &lt;5.1.1~dev7-3.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596833" version="1" comment="python-ardana-configurationprocessor is &lt;8.0+git.1534266236.fb1623c-6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596834" version="1" comment="python-barbican is &lt;5.0.2~dev3-3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596835" version="1" comment="python-ceilometer is &lt;9.0.8~dev7-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596836" version="1" comment="python-cinder is &lt;11.2.3~dev5-3.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596837" version="1" comment="python-cinderlm is &lt;0.0.2+git.1541444073.4d3347c-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596838" version="1" comment="python-cliff is &lt;2.8.3-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596839" version="1" comment="python-designate is &lt;5.0.3~dev7-3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596840" version="1" comment="python-freezerclient is &lt;1.5.1-3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596841" version="1" comment="python-freezerclient-doc is &lt;1.5.1-3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596842" version="1" comment="python-heat is &lt;9.0.8~dev3-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596843" version="1" comment="python-heat-gbp is &lt;7.0.1~dev1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596844" version="1" comment="python-horizon is &lt;12.0.4~dev6-3.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596845" version="1" comment="python-horizon-plugin-trove-ui is &lt;9.0.1~dev10-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596846" version="1" comment="python-ironic is &lt;9.1.8~dev5-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596847" version="1" comment="python-ironicclient is &lt;1.17.2-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596848" version="1" comment="python-ironicclient-doc is &lt;1.17.2-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596849" version="1" comment="python-keystone is &lt;12.0.4~dev2-5.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596850" version="1" comment="python-magnumclient is &lt;2.7.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596851" version="1" comment="python-magnumclient-doc is &lt;2.7.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596852" version="1" comment="python-manilaclient is &lt;1.17.4-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596853" version="1" comment="python-manilaclient-doc is &lt;1.17.4-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596854" version="1" comment="python-monasca-agent is &lt;2.2.5~dev2-3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596855" version="1" comment="python-monasca-api is &lt;2.2.1~dev26-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596856" version="1" comment="python-monasca-log-api is &lt;2.3.1~dev12-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596857" version="1" comment="python-muranoclient is &lt;0.14.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596858" version="1" comment="python-muranoclient-doc is &lt;0.14.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596859" version="1" comment="python-neutron is &lt;11.0.9~dev28-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596860" version="1" comment="python-neutron-fwaas is &lt;11.0.3~dev1-3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596861" version="1" comment="python-neutron-gbp is &lt;7.3.1~dev28-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596862" version="1" comment="python-neutron-lbaas is &lt;11.0.4~dev6-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596863" version="1" comment="python-neutron-vpnaas is &lt;11.0.1~dev5-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596864" version="1" comment="python-nova is &lt;16.1.9~dev3-3.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596865" version="1" comment="python-novaclient is &lt;9.1.3-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596866" version="1" comment="python-novaclient-doc is &lt;9.1.3-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596867" version="1" comment="python-openstackclient is &lt;3.12.2-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596868" version="1" comment="python-os-brick is &lt;1.15.9-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596869" version="1" comment="python-os-client-config is &lt;1.28.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596870" version="1" comment="python-os-vif is &lt;1.7.2-3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596871" version="1" comment="python-os-win is &lt;2.2.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596872" version="1" comment="python-oslo.cache is &lt;1.25.2-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596873" version="1" comment="python-oslo.concurrency is &lt;3.21.2-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596874" version="1" comment="python-oslo.config is &lt;4.11.2-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596875" version="1" comment="python-oslo.config-doc is &lt;4.11.2-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596876" version="1" comment="python-oslo.i18n is &lt;3.17.2-3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596877" version="1" comment="python-oslo.log is &lt;3.30.3-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596878" version="1" comment="python-oslo.messaging is &lt;5.30.8-3.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596879" version="1" comment="python-oslo.middleware is &lt;3.30.2-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596880" version="1" comment="python-oslo.policy is &lt;1.25.4-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596881" version="1" comment="python-oslo.privsep is &lt;1.22.2-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596882" version="1" comment="python-oslo.reports is &lt;1.22.2-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596883" version="1" comment="python-oslo.utils is &lt;3.28.4-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596884" version="1" comment="python-oslo.versionedobjects is &lt;1.26.3-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596885" version="1" comment="python-oslo.vmware is &lt;2.23.2-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596886" version="1" comment="python-oslotest is &lt;2.17.2-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596887" version="1" comment="python-python-subunit is &lt;1.2.0-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596888" version="1" comment="python-saharaclient is &lt;1.3.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596889" version="1" comment="python-saharaclient-doc is &lt;1.3.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596890" version="1" comment="python-swiftclient is &lt;3.4.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596891" version="1" comment="python-swiftclient-doc is &lt;3.4.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596892" version="1" comment="python-trove is &lt;8.0.1~dev13-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596893" version="1" comment="python-zaqarclient is &lt;1.7.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596894" version="1" comment="supportutils-plugin-suse-openstack-cloud is &lt;8.0.1551262227.7a7deb6-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596895" version="1" comment="venv-openstack-aodh-x86_64 is &lt;5.1.1~dev7-12.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596896" version="1" comment="venv-openstack-barbican-x86_64 is &lt;5.0.2~dev3-12.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596897" version="1" comment="venv-openstack-ceilometer-x86_64 is &lt;9.0.8~dev7-12.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596898" version="1" comment="venv-openstack-cinder-x86_64 is &lt;11.2.3~dev5-14.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596899" version="1" comment="venv-openstack-designate-x86_64 is &lt;5.0.3~dev7-12.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596900" version="1" comment="venv-openstack-freezer-x86_64 is &lt;5.0.0.0~xrc2~dev2-10.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596901" version="1" comment="venv-openstack-glance-x86_64 is &lt;15.0.2~dev9-12.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596902" version="1" comment="venv-openstack-heat-x86_64 is &lt;9.0.8~dev3-12.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596903" version="1" comment="venv-openstack-horizon-x86_64 is &lt;12.0.4~dev6-14.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596904" version="1" comment="venv-openstack-ironic-x86_64 is &lt;9.1.8~dev5-12.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596905" version="1" comment="venv-openstack-keystone-x86_64 is &lt;12.0.4~dev2-11.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596906" version="1" comment="venv-openstack-magnum-x86_64 is &lt;5.0.2-11.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596907" version="1" comment="venv-openstack-manila-x86_64 is &lt;5.0.4~dev17-12.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596908" version="1" comment="venv-openstack-monasca-ceilometer-x86_64 is &lt;1.5.1-8.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596909" version="1" comment="venv-openstack-monasca-x86_64 is &lt;2.2.1-11.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596910" version="1" comment="venv-openstack-murano-x86_64 is &lt;4.0.1-12.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596911" version="1" comment="venv-openstack-neutron-x86_64 is &lt;11.0.2-13.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596912" version="1" comment="venv-openstack-nova-x86_64 is &lt;16.1.9~dev3-11.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596913" version="1" comment="venv-openstack-octavia-x86_64 is &lt;1.0.5~dev1-12.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596914" version="1" comment="venv-openstack-sahara-x86_64 is &lt;7.0.4~dev1-11.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596915" version="1" comment="venv-openstack-swift-x86_64 is &lt;2.15.2-11.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596916" version="1" comment="venv-openstack-trove-x86_64 is &lt;8.0.1~dev13-11.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521994" version="1" comment="ucode-intel is &lt;20190618-13.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521995" version="1" comment="bzip2 is &lt;1.0.6-30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530594" version="1" comment="bzip2-doc is &lt;1.0.6-30.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521996" version="1" comment="libbz2-1 is &lt;1.0.6-30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521997" version="1" comment="libbz2-1-32bit is &lt;1.0.6-30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530595" version="1" comment="glibc is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530596" version="1" comment="glibc-32bit is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530597" version="1" comment="glibc-devel is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530598" version="1" comment="glibc-devel-32bit is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530599" version="1" comment="glibc-html is &lt;2.22-62.22.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530600" version="1" comment="glibc-i18ndata is &lt;2.22-62.22.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530601" version="1" comment="glibc-info is &lt;2.22-62.22.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530602" version="1" comment="glibc-locale is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530603" version="1" comment="glibc-locale-32bit is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530604" version="1" comment="glibc-profile is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530605" version="1" comment="glibc-profile-32bit is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530606" version="1" comment="nscd is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522010" version="1" comment="libsolv-tools is &lt;0.6.36-2.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522011" version="1" comment="libzypp is &lt;16.20.0-2.39.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557323" version="1" comment="perl-solv is &lt;0.6.36-2.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522012" version="1" comment="python-solv is &lt;0.6.36-2.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522013" version="1" comment="zypper is &lt;1.13.51-21.26.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522014" version="1" comment="zypper-log is &lt;1.13.51-21.26.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522027" version="1" comment="bzip2 is &lt;1.0.6-30.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530613" version="1" comment="bzip2-doc is &lt;1.0.6-30.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522028" version="1" comment="libbz2-1 is &lt;1.0.6-30.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522029" version="1" comment="libbz2-1-32bit is &lt;1.0.6-30.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522035" version="1" comment="libpolkit0 is &lt;0.113-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522037" version="1" comment="polkit is &lt;0.113-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522038" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522039" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.222-27.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530614" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.222-27.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530615" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.222-27.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522040" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.222-27.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530616" version="1" comment="libmysqlclient18 is &lt;10.0.38-29.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522041" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522042" version="1" comment="python3 is &lt;3.4.6-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522043" version="1" comment="python3-base is &lt;3.4.6-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522044" version="1" comment="python3-curses is &lt;3.4.6-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596917" version="1" comment="python-Twisted is &lt;15.2.1-9.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522052" version="1" comment="evince is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522053" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522054" version="1" comment="evince-lang is &lt;3.20.2-6.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522055" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522056" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522057" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522058" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522059" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522060" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522061" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522062" version="1" comment="libevview3-3 is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522063" version="1" comment="nautilus-evince is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530622" version="1" comment="squid is &lt;3.5.21-26.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522067" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522068" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522069" version="1" comment="python is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530623" version="1" comment="python-32bit is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522070" version="1" comment="python-base is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530624" version="1" comment="python-base-32bit is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522071" version="1" comment="python-curses is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530625" version="1" comment="python-demo is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522072" version="1" comment="python-devel is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530626" version="1" comment="python-doc is &lt;2.7.13-28.31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530627" version="1" comment="python-doc-pdf is &lt;2.7.13-28.31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530628" version="1" comment="python-gdbm is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530629" version="1" comment="python-idle is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522073" version="1" comment="python-tk is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522074" version="1" comment="python-xml is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530671" version="1" comment="postgresql96 is &lt;9.6.15-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530672" version="1" comment="postgresql96-contrib is &lt;9.6.15-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530673" version="1" comment="postgresql96-docs is &lt;9.6.15-3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530674" version="1" comment="postgresql96-plperl is &lt;9.6.15-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530675" version="1" comment="postgresql96-plpython is &lt;9.6.15-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530676" version="1" comment="postgresql96-pltcl is &lt;9.6.15-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530677" version="1" comment="postgresql96-server is &lt;9.6.15-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596918" version="1" comment="ardana-ansible is &lt;8.0+git.1560208949.67048e3-3.64.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596919" version="1" comment="ardana-db is &lt;8.0+git.1564410318.f0cca2c-3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596920" version="1" comment="ardana-freezer is &lt;8.0+git.1564164977.ef9baeb-3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596921" version="1" comment="ardana-glance is &lt;8.0+git.1564491709.349d78e-3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596922" version="1" comment="ardana-input-model is &lt;8.0+git.1562848601.c3daff0-3.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596923" version="1" comment="ardana-nova is &lt;8.0+git.1565388406.c6abb8d-3.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596924" version="1" comment="ardana-osconfig is &lt;8.0+git.1563383198.c7fd9b4-3.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596925" version="1" comment="ardana-swiftlm-drive-provision is &lt;8.0+git.1541434883.e0ebe69-5.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596926" version="1" comment="ardana-swiftlm-log-tailer is &lt;8.0+git.1541434883.e0ebe69-5.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596927" version="1" comment="ardana-swiftlm-uptime-mon is &lt;8.0+git.1541434883.e0ebe69-5.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596928" version="1" comment="ardana-tempest is &lt;8.0+git.1562849010.73bc517-3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596929" version="1" comment="caasp-openstack-heat-templates is &lt;1.0+git.1560518045.ad7dc6d-4.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596930" version="1" comment="documentation-suse-openstack-cloud-installation is &lt;8.20190805-1.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596931" version="1" comment="documentation-suse-openstack-cloud-operations is &lt;8.20190805-1.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596932" version="1" comment="documentation-suse-openstack-cloud-opsconsole is &lt;8.20190805-1.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596933" version="1" comment="documentation-suse-openstack-cloud-planning is &lt;8.20190805-1.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596934" version="1" comment="documentation-suse-openstack-cloud-security is &lt;8.20190805-1.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596935" version="1" comment="documentation-suse-openstack-cloud-supplement is &lt;8.20190805-1.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596936" version="1" comment="documentation-suse-openstack-cloud-upstream-admin is &lt;8.20190805-1.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596937" version="1" comment="documentation-suse-openstack-cloud-upstream-user is &lt;8.20190805-1.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596938" version="1" comment="documentation-suse-openstack-cloud-user is &lt;8.20190805-1.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596939" version="1" comment="galera-python-clustercheck is &lt;0.0+git.1562242499.36b8b64-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596940" version="1" comment="grafana-monasca-ui-drilldown is &lt;1.8.1~dev39-3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596941" version="1" comment="openstack-cinder is &lt;11.2.3~dev7-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596942" version="1" comment="openstack-cinder-api is &lt;11.2.3~dev7-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596943" version="1" comment="openstack-cinder-backup is &lt;11.2.3~dev7-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596944" version="1" comment="openstack-cinder-doc is &lt;11.2.3~dev7-3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596945" version="1" comment="openstack-cinder-scheduler is &lt;11.2.3~dev7-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596946" version="1" comment="openstack-cinder-volume is &lt;11.2.3~dev7-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596947" version="1" comment="openstack-glance is &lt;15.0.3~dev2-3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596948" version="1" comment="openstack-glance-api is &lt;15.0.3~dev2-3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596949" version="1" comment="openstack-glance-doc is &lt;15.0.3~dev2-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596950" version="1" comment="openstack-glance-registry is &lt;15.0.3~dev2-3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596951" version="1" comment="openstack-heat is &lt;9.0.8~dev11-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596952" version="1" comment="openstack-heat-api is &lt;9.0.8~dev11-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596953" version="1" comment="openstack-heat-api-cfn is &lt;9.0.8~dev11-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596954" version="1" comment="openstack-heat-api-cloudwatch is &lt;9.0.8~dev11-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596955" version="1" comment="openstack-heat-doc is &lt;9.0.8~dev11-3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596956" version="1" comment="openstack-heat-engine is &lt;9.0.8~dev11-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596957" version="1" comment="openstack-heat-plugin-heat_docker is &lt;9.0.8~dev11-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596958" version="1" comment="openstack-heat-test is &lt;9.0.8~dev11-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596959" version="1" comment="openstack-horizon-plugin-monasca-ui is &lt;1.8.1~dev39-3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596960" version="1" comment="openstack-horizon-plugin-neutron-fwaas-ui is &lt;1.0.1~dev9-4.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596961" version="1" comment="openstack-ironic is &lt;9.1.8~dev7-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596962" version="1" comment="openstack-ironic-api is &lt;9.1.8~dev7-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596963" version="1" comment="openstack-ironic-conductor is &lt;9.1.8~dev7-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596964" version="1" comment="openstack-ironic-doc is &lt;9.1.8~dev7-3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596965" version="1" comment="openstack-keystone is &lt;12.0.4~dev2-5.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596966" version="1" comment="openstack-keystone-doc is &lt;12.0.4~dev2-5.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596967" version="1" comment="openstack-manila is &lt;5.1.1~dev2-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596968" version="1" comment="openstack-manila-api is &lt;5.1.1~dev2-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596969" version="1" comment="openstack-manila-data is &lt;5.1.1~dev2-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596970" version="1" comment="openstack-manila-doc is &lt;5.1.1~dev2-3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596971" version="1" comment="openstack-manila-scheduler is &lt;5.1.1~dev2-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596972" version="1" comment="openstack-manila-share is &lt;5.1.1~dev2-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596973" version="1" comment="openstack-monasca-agent is &lt;2.2.5~dev5-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596974" version="1" comment="openstack-monasca-api is &lt;2.2.2~dev1-3.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596975" version="1" comment="openstack-monasca-persister is &lt;1.7.1~dev10-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596976" version="1" comment="openstack-monasca-persister-java is &lt;1.7.1~a0~dev2-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596977" version="1" comment="openstack-murano is &lt;4.0.2~dev2-3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596978" version="1" comment="openstack-murano-api is &lt;4.0.2~dev2-3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596979" version="1" comment="openstack-murano-doc is &lt;4.0.2~dev2-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596980" version="1" comment="openstack-murano-engine is &lt;4.0.2~dev2-3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596981" version="1" comment="openstack-neutron is &lt;11.0.9~dev42-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596982" version="1" comment="openstack-neutron-dhcp-agent is &lt;11.0.9~dev42-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596983" version="1" comment="openstack-neutron-doc is &lt;11.0.9~dev42-3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596984" version="1" comment="openstack-neutron-gbp is &lt;7.3.1~dev45-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596985" version="1" comment="openstack-neutron-ha-tool is &lt;11.0.9~dev42-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596986" version="1" comment="openstack-neutron-l3-agent is &lt;11.0.9~dev42-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596987" version="1" comment="openstack-neutron-lbaas is &lt;11.0.4~dev6-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596988" version="1" comment="openstack-neutron-lbaas-agent is &lt;11.0.4~dev6-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596989" version="1" comment="openstack-neutron-lbaas-doc is &lt;11.0.4~dev6-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596990" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;11.0.9~dev42-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596991" version="1" comment="openstack-neutron-macvtap-agent is &lt;11.0.9~dev42-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596992" version="1" comment="openstack-neutron-metadata-agent is &lt;11.0.9~dev42-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596993" version="1" comment="openstack-neutron-metering-agent is &lt;11.0.9~dev42-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596994" version="1" comment="openstack-neutron-openvswitch-agent is &lt;11.0.9~dev42-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596995" version="1" comment="openstack-neutron-server is &lt;11.0.9~dev42-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596996" version="1" comment="openstack-nova is &lt;16.1.9~dev4-3.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596997" version="1" comment="openstack-nova-api is &lt;16.1.9~dev4-3.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596998" version="1" comment="openstack-nova-cells is &lt;16.1.9~dev4-3.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596999" version="1" comment="openstack-nova-compute is &lt;16.1.9~dev4-3.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597000" version="1" comment="openstack-nova-conductor is &lt;16.1.9~dev4-3.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597001" version="1" comment="openstack-nova-console is &lt;16.1.9~dev4-3.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597002" version="1" comment="openstack-nova-consoleauth is &lt;16.1.9~dev4-3.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597003" version="1" comment="openstack-nova-doc is &lt;16.1.9~dev4-3.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597004" version="1" comment="openstack-nova-novncproxy is &lt;16.1.9~dev4-3.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597005" version="1" comment="openstack-nova-placement-api is &lt;16.1.9~dev4-3.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597006" version="1" comment="openstack-nova-scheduler is &lt;16.1.9~dev4-3.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597007" version="1" comment="openstack-nova-serialproxy is &lt;16.1.9~dev4-3.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597008" version="1" comment="openstack-nova-vncproxy is &lt;16.1.9~dev4-3.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597009" version="1" comment="openstack-octavia is &lt;1.0.6~dev2-4.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597010" version="1" comment="openstack-octavia-amphora-agent is &lt;1.0.6~dev2-4.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597011" version="1" comment="openstack-octavia-api is &lt;1.0.6~dev2-4.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597012" version="1" comment="openstack-octavia-health-manager is &lt;1.0.6~dev2-4.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597013" version="1" comment="openstack-octavia-housekeeping is &lt;1.0.6~dev2-4.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597014" version="1" comment="openstack-octavia-worker is &lt;1.0.6~dev2-4.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597015" version="1" comment="python-Beaver is &lt;8.0+git.1502900605.3e0068a-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597016" version="1" comment="python-cinder is &lt;11.2.3~dev7-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597017" version="1" comment="python-glance is &lt;15.0.3~dev2-3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597018" version="1" comment="python-heat is &lt;9.0.8~dev11-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597019" version="1" comment="python-horizon-plugin-monasca-ui is &lt;1.8.1~dev39-3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597020" version="1" comment="python-horizon-plugin-neutron-fwaas-ui is &lt;1.0.1~dev9-4.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597021" version="1" comment="python-ironic is &lt;9.1.8~dev7-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597022" version="1" comment="python-keystone is &lt;12.0.4~dev2-5.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597023" version="1" comment="python-manila is &lt;5.1.1~dev2-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597024" version="1" comment="python-monasca-agent is &lt;2.2.5~dev5-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597025" version="1" comment="python-monasca-api is &lt;2.2.2~dev1-3.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597026" version="1" comment="python-monasca-persister is &lt;1.7.1~dev10-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597027" version="1" comment="python-murano is &lt;4.0.2~dev2-3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597028" version="1" comment="python-neutron is &lt;11.0.9~dev42-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597029" version="1" comment="python-neutron-gbp is &lt;7.3.1~dev45-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597030" version="1" comment="python-neutron-lbaas is &lt;11.0.4~dev6-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597031" version="1" comment="python-nova is &lt;16.1.9~dev4-3.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597032" version="1" comment="python-octavia is &lt;1.0.6~dev2-4.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597033" version="1" comment="python-oslo.db is &lt;4.25.2-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597034" version="1" comment="python-osprofiler is &lt;1.11.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597035" version="1" comment="python-swiftlm is &lt;8.0+git.1541434883.e0ebe69-5.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597036" version="1" comment="venv-openstack-magnum-x86_64 is &lt;5.0.2_5.0.2_5.0.2~dev31-11.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597037" version="1" comment="venv-openstack-monasca-ceilometer-x86_64 is &lt;1.5.1_1.5.1_1.5.1~dev3-8.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597038" version="1" comment="venv-openstack-monasca-x86_64 is &lt;2.2.2~dev1-11.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597039" version="1" comment="venv-openstack-murano-x86_64 is &lt;4.0.2~dev2-12.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597040" version="1" comment="venv-openstack-neutron-x86_64 is &lt;11.0.9~dev42-13.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555647" version="1" comment="libvirt is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555648" version="1" comment="libvirt-admin is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555649" version="1" comment="libvirt-client is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555650" version="1" comment="libvirt-daemon is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555651" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555652" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555653" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538264" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555654" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555655" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555656" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555657" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555658" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555659" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555660" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555661" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555662" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555663" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555664" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555665" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538277" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555666" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555667" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555668" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555669" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538282" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555670" version="1" comment="libvirt-doc is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555671" version="1" comment="libvirt-libs is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555672" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555673" version="1" comment="libvirt-nss is &lt;3.3.0-5.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597041" version="1" comment="python-Django is &lt;1.11.23-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597042" version="1" comment="python-SQLAlchemy is &lt;1.1.12-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555674" version="1" comment="kernel-default is &lt;4.4.180-94.103.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555675" version="1" comment="kernel-default-base is &lt;4.4.180-94.103.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555676" version="1" comment="kernel-default-devel is &lt;4.4.180-94.103.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538290" version="1" comment="kernel-devel is &lt;4.4.180-94.103.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538291" version="1" comment="kernel-macros is &lt;4.4.180-94.103.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538292" version="1" comment="kernel-source is &lt;4.4.180-94.103.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555677" version="1" comment="kernel-syms is &lt;4.4.180-94.103.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556048" version="1" comment="kgraft-patch-4_4_180-94_103-default is &lt;1-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522096" version="1" comment="perl is &lt;5.18.2-12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522097" version="1" comment="perl-32bit is &lt;5.18.2-12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522098" version="1" comment="perl-base is &lt;5.18.2-12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522099" version="1" comment="perl-doc is &lt;5.18.2-12.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522100" version="1" comment="libsolv-tools is &lt;0.6.36-2.27.19.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522101" version="1" comment="libzypp is &lt;16.20.2-27.60.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530678" version="1" comment="perl-solv is &lt;0.6.36-2.27.19.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522102" version="1" comment="python-solv is &lt;0.6.36-2.27.19.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522103" version="1" comment="zypper is &lt;1.13.54-18.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522104" version="1" comment="zypper-log is &lt;1.13.54-18.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597043" version="1" comment="ansible is &lt;2.4.6.0-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597044" version="1" comment="python-urllib3 is &lt;1.22-5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530688" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.50-38.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530689" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.50-38.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530691" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.50-38.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530692" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.50-38.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530693" version="1" comment="curl is &lt;7.37.0-37.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530694" version="1" comment="libcurl4 is &lt;7.37.0-37.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530695" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522114" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522115" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522116" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.4-2.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522117" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522118" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522119" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597045" version="1" comment="python-Werkzeug is &lt;0.12.2-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530698" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.40-30.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530699" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.40-30.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530701" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.40-30.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522144" version="1" comment="ibus is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522145" version="1" comment="ibus-gtk is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522146" version="1" comment="ibus-gtk3 is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522148" version="1" comment="ibus-lang is &lt;1.5.13-15.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522149" version="1" comment="libibus-1_0-5 is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522152" version="1" comment="typelib-1_0-IBus-1_0 is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530702" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530703" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530704" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530705" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530706" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530707" version="1" comment="openssl is &lt;1.0.2j-60.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530708" version="1" comment="openssl-doc is &lt;1.0.2j-60.55.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522212" version="1" comment="MozillaFirefox is &lt;60.9.0-109.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522213" version="1" comment="MozillaFirefox-translations-common is &lt;60.9.0-109.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597046" version="1" comment="python-Twisted is &lt;15.2.1-9.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530710" version="1" comment="dovecot22 is &lt;2.2.31-19.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530711" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530712" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530713" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557375" version="1" comment="libmysqlclient18 is &lt;10.0.40.1-29.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522218" version="1" comment="ghostscript is &lt;9.27-23.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522219" version="1" comment="ghostscript-x11 is &lt;9.27-23.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522236" version="1" comment="libgcrypt20 is &lt;1.6.1-16.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522237" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530714" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530715" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522245" version="1" comment="MozillaFirefox is &lt;68.1.0-109.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522246" version="1" comment="MozillaFirefox-branding-SLE is &lt;68-32.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522247" version="1" comment="MozillaFirefox-translations-common is &lt;68.1.0-109.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561946" version="1" comment="python-oauthlib is &lt;0.7.2-3.9.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522248" version="1" comment="binutils is &lt;2.32-9.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522249" version="1" comment="sudo is &lt;1.8.20p2-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522250" version="1" comment="libpcap1 is &lt;1.8.1-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522252" version="1" comment="tcpdump is &lt;4.9.2-14.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538307" version="1" comment="xen is &lt;4.9.4_04-3.56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538308" version="1" comment="xen-doc-html is &lt;4.9.4_04-3.56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538309" version="1" comment="xen-libs is &lt;4.9.4_04-3.56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538310" version="1" comment="xen-libs-32bit is &lt;4.9.4_04-3.56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538311" version="1" comment="xen-tools is &lt;4.9.4_04-3.56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538312" version="1" comment="xen-tools-domU is &lt;4.9.4_04-3.56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522280" version="1" comment="nfs-client is &lt;1.3.0-34.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530719" version="1" comment="nfs-doc is &lt;1.3.0-34.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522281" version="1" comment="nfs-kernel-server is &lt;1.3.0-34.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597047" version="1" comment="ardana-ansible is &lt;8.0+git.1566374355.c509923-3.67.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597048" version="1" comment="ardana-glance is &lt;8.0+git.1566376789.be0fe01-3.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597049" version="1" comment="ardana-horizon is &lt;8.0+git.1565816064.5d4f73f-3.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597050" version="1" comment="ardana-input-model is &lt;8.0+git.1566517401.98450e6-3.33.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597051" version="1" comment="ardana-manila is &lt;8.0+git.1568835837.2452e7a-1.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597052" version="1" comment="ardana-neutron is &lt;8.0+git.1568220097.74ee4b4-3.33.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597053" version="1" comment="ardana-nova is &lt;8.0+git.1566902754.c58ff69-3.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597054" version="1" comment="ardana-octavia is &lt;8.0+git.1568373448.bcaee7e-3.20.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597055" version="1" comment="ardana-tempest is &lt;8.0+git.1566471887.fd2fec7-3.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597056" version="1" comment="galera-3-wsrep-provider is &lt;25.3.25-4.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597057" version="1" comment="grafana is &lt;4.6.5-4.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597058" version="1" comment="libmariadb3 is &lt;3.1.2-3.12.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597059" version="1" comment="mariadb is &lt;10.2.25-4.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597060" version="1" comment="mariadb-client is &lt;10.2.25-4.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597061" version="1" comment="mariadb-errormessages is &lt;10.2.25-4.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597062" version="1" comment="mariadb-galera is &lt;10.2.25-4.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597063" version="1" comment="mariadb-tools is &lt;10.2.25-4.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597064" version="1" comment="novnc is &lt;1.0.0-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597065" version="1" comment="openstack-cinder is &lt;11.2.3~dev16-3.21.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597066" version="1" comment="openstack-cinder-api is &lt;11.2.3~dev16-3.21.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597067" version="1" comment="openstack-cinder-backup is &lt;11.2.3~dev16-3.21.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597068" version="1" comment="openstack-cinder-doc is &lt;11.2.3~dev16-3.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597069" version="1" comment="openstack-cinder-scheduler is &lt;11.2.3~dev16-3.21.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597070" version="1" comment="openstack-cinder-volume is &lt;11.2.3~dev16-3.21.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597071" version="1" comment="openstack-glance is &lt;15.0.3~dev3-3.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597072" version="1" comment="openstack-glance-api is &lt;15.0.3~dev3-3.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597073" version="1" comment="openstack-glance-doc is &lt;15.0.3~dev3-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597074" version="1" comment="openstack-glance-registry is &lt;15.0.3~dev3-3.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597075" version="1" comment="openstack-heat is &lt;9.0.8~dev13-3.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597076" version="1" comment="openstack-heat-api is &lt;9.0.8~dev13-3.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597077" version="1" comment="openstack-heat-api-cfn is &lt;9.0.8~dev13-3.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597078" version="1" comment="openstack-heat-api-cloudwatch is &lt;9.0.8~dev13-3.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597079" version="1" comment="openstack-heat-doc is &lt;9.0.8~dev13-3.24.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597080" version="1" comment="openstack-heat-engine is &lt;9.0.8~dev13-3.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597081" version="1" comment="openstack-heat-plugin-heat_docker is &lt;9.0.8~dev13-3.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597082" version="1" comment="openstack-heat-test is &lt;9.0.8~dev13-3.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597083" version="1" comment="openstack-horizon-plugin-neutron-vpnaas-ui is &lt;1.0.1~dev3-3.6.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597084" version="1" comment="openstack-keystone is &lt;12.0.4~dev4-5.27.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597085" version="1" comment="openstack-keystone-doc is &lt;12.0.4~dev4-5.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597086" version="1" comment="openstack-monasca-installer is &lt;20190923_16.32-3.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597087" version="1" comment="openstack-neutron is &lt;11.0.9~dev51-3.24.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597088" version="1" comment="openstack-neutron-dhcp-agent is &lt;11.0.9~dev51-3.24.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597089" version="1" comment="openstack-neutron-doc is &lt;11.0.9~dev51-3.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597090" version="1" comment="openstack-neutron-gbp is &lt;7.3.1~dev56-3.9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597091" version="1" comment="openstack-neutron-ha-tool is &lt;11.0.9~dev51-3.24.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597092" version="1" comment="openstack-neutron-l3-agent is &lt;11.0.9~dev51-3.24.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597093" version="1" comment="openstack-neutron-lbaas is &lt;11.0.4~dev6-3.15.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597094" version="1" comment="openstack-neutron-lbaas-agent is &lt;11.0.4~dev6-3.15.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597095" version="1" comment="openstack-neutron-lbaas-doc is &lt;11.0.4~dev6-3.15.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597096" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;11.0.9~dev51-3.24.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597097" version="1" comment="openstack-neutron-macvtap-agent is &lt;11.0.9~dev51-3.24.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597098" version="1" comment="openstack-neutron-metadata-agent is &lt;11.0.9~dev51-3.24.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597099" version="1" comment="openstack-neutron-metering-agent is &lt;11.0.9~dev51-3.24.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597100" version="1" comment="openstack-neutron-openvswitch-agent is &lt;11.0.9~dev51-3.24.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597101" version="1" comment="openstack-neutron-server is &lt;11.0.9~dev51-3.24.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597102" version="1" comment="openstack-nova is &lt;16.1.9~dev7-3.29.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597103" version="1" comment="openstack-nova-api is &lt;16.1.9~dev7-3.29.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597104" version="1" comment="openstack-nova-cells is &lt;16.1.9~dev7-3.29.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597105" version="1" comment="openstack-nova-compute is &lt;16.1.9~dev7-3.29.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597106" version="1" comment="openstack-nova-conductor is &lt;16.1.9~dev7-3.29.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597107" version="1" comment="openstack-nova-console is &lt;16.1.9~dev7-3.29.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597108" version="1" comment="openstack-nova-consoleauth is &lt;16.1.9~dev7-3.29.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597109" version="1" comment="openstack-nova-doc is &lt;16.1.9~dev7-3.29.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597110" version="1" comment="openstack-nova-novncproxy is &lt;16.1.9~dev7-3.29.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597111" version="1" comment="openstack-nova-placement-api is &lt;16.1.9~dev7-3.29.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597112" version="1" comment="openstack-nova-scheduler is &lt;16.1.9~dev7-3.29.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597113" version="1" comment="openstack-nova-serialproxy is &lt;16.1.9~dev7-3.29.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597114" version="1" comment="openstack-nova-vncproxy is &lt;16.1.9~dev7-3.29.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597115" version="1" comment="python-amqp is &lt;2.2.2-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597116" version="1" comment="python-cinder is &lt;11.2.3~dev16-3.21.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597117" version="1" comment="python-glance is &lt;15.0.3~dev3-3.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597118" version="1" comment="python-heat is &lt;9.0.8~dev13-3.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597119" version="1" comment="python-horizon-plugin-neutron-vpnaas-ui is &lt;1.0.1~dev3-3.6.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597120" version="1" comment="python-keystone is &lt;12.0.4~dev4-5.27.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597121" version="1" comment="python-neutron is &lt;11.0.9~dev51-3.24.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597122" version="1" comment="python-neutron-gbp is &lt;7.3.1~dev56-3.9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597123" version="1" comment="python-neutron-lbaas is &lt;11.0.4~dev6-3.15.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597124" version="1" comment="python-nova is &lt;16.1.9~dev7-3.29.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597125" version="1" comment="python-ovs is &lt;2.7.2-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597126" version="1" comment="python-pysaml2 is &lt;4.0.2-5.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597127" version="1" comment="python-python-engineio is &lt;2.0.2-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597128" version="1" comment="python-urllib3 is &lt;1.22-5.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597129" version="1" comment="release-notes-suse-openstack-cloud is &lt;8.20190911-3.20.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597130" version="1" comment="venv-openstack-aodh-x86_64 is &lt;5.1.1~dev7-12.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597131" version="1" comment="venv-openstack-barbican-x86_64 is &lt;5.0.2~dev3-12.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597132" version="1" comment="venv-openstack-ceilometer-x86_64 is &lt;9.0.8~dev7-12.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597133" version="1" comment="venv-openstack-cinder-x86_64 is &lt;11.2.3~dev16-14.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597134" version="1" comment="venv-openstack-designate-x86_64 is &lt;5.0.3~dev7-12.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597135" version="1" comment="venv-openstack-freezer-x86_64 is &lt;5.0.0.0~xrc2~dev2-10.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597136" version="1" comment="venv-openstack-glance-x86_64 is &lt;15.0.3~dev3-12.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597137" version="1" comment="venv-openstack-heat-x86_64 is &lt;9.0.8~dev13-12.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597138" version="1" comment="venv-openstack-horizon-x86_64 is &lt;12.0.4~dev6-14.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597139" version="1" comment="venv-openstack-ironic-x86_64 is &lt;9.1.8~dev7-12.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597140" version="1" comment="venv-openstack-keystone-x86_64 is &lt;12.0.4~dev4-11.22.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597141" version="1" comment="venv-openstack-magnum-x86_64 is &lt;5.0.2_5.0.2_5.0.2~dev31-11.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597142" version="1" comment="venv-openstack-manila-x86_64 is &lt;5.1.1~dev2-12.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597143" version="1" comment="venv-openstack-monasca-ceilometer-x86_64 is &lt;1.5.1_1.5.1_1.5.1~dev3-8.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597144" version="1" comment="venv-openstack-monasca-x86_64 is &lt;2.2.2~dev1-11.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597145" version="1" comment="venv-openstack-murano-x86_64 is &lt;4.0.2~dev2-12.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597146" version="1" comment="venv-openstack-neutron-x86_64 is &lt;11.0.9~dev51-13.24.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597147" version="1" comment="venv-openstack-nova-x86_64 is &lt;16.1.9~dev7-11.22.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597148" version="1" comment="venv-openstack-octavia-x86_64 is &lt;1.0.6~dev2-12.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597149" version="1" comment="venv-openstack-sahara-x86_64 is &lt;7.0.4~dev1-11.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597150" version="1" comment="venv-openstack-swift-x86_64 is &lt;2.15.2-11.13.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597151" version="1" comment="venv-openstack-trove-x86_64 is &lt;8.0.1~dev13-11.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522293" version="1" comment="MozillaFirefox is &lt;68.2.0-109.95.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522294" version="1" comment="MozillaFirefox-translations-common is &lt;68.2.0-109.95.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522302" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522303" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522304" version="1" comment="libdcerpc0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522305" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522306" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522307" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522308" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522309" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522310" version="1" comment="libndr-standard0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522311" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522312" version="1" comment="libndr0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522313" version="1" comment="libndr0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522314" version="1" comment="libnetapi0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522315" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522316" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522317" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522318" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522319" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522320" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522321" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522322" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522323" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522324" version="1" comment="libsamba-util0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522325" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522326" version="1" comment="libsamdb0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522327" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522328" version="1" comment="libsmbclient0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522329" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522330" version="1" comment="libsmbconf0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522331" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522332" version="1" comment="libsmbldap0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522333" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522334" version="1" comment="libtevent-util0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522335" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522336" version="1" comment="libwbclient0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522337" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522338" version="1" comment="samba is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522339" version="1" comment="samba-client is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522340" version="1" comment="samba-client-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522341" version="1" comment="samba-doc is &lt;4.6.16+git.169.064abe062be-3.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522342" version="1" comment="samba-libs is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522343" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522344" version="1" comment="samba-winbind is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522345" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522349" version="1" comment="gdb is &lt;8.3.1-2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522350" version="1" comment="libssh2-1 is &lt;1.4.3-20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522351" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522352" version="1" comment="libseccomp2 is &lt;2.4.1-11.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522353" version="1" comment="libseccomp2-32bit is &lt;2.4.1-11.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555678" version="1" comment="kernel-default is &lt;4.4.180-94.107.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555679" version="1" comment="kernel-default-base is &lt;4.4.180-94.107.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555680" version="1" comment="kernel-default-devel is &lt;4.4.180-94.107.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556142" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.107.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538349" version="1" comment="kernel-devel is &lt;4.4.180-94.107.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538350" version="1" comment="kernel-macros is &lt;4.4.180-94.107.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538351" version="1" comment="kernel-source is &lt;4.4.180-94.107.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555681" version="1" comment="kernel-syms is &lt;4.4.180-94.107.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556144" version="1" comment="kgraft-patch-4_4_180-94_107-default is &lt;1-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522370" version="1" comment="ucode-intel is &lt;20191112-13.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522374" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522375" version="1" comment="libjpeg62 is &lt;62.2.0-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522376" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522377" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522378" version="1" comment="libjpeg8 is &lt;8.1.2-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522379" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522380" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522381" version="1" comment="ghostscript is &lt;9.27-23.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522382" version="1" comment="ghostscript-x11 is &lt;9.27-23.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522383" version="1" comment="ucode-intel is &lt;20191112a-13.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525259" version="1" comment="python-ecdsa is &lt;0.13.3-5.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522390" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522391" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522392" version="1" comment="sqlite3 is &lt;3.8.10.2-9.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522393" version="1" comment="cups is &lt;1.7.5-20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522394" version="1" comment="cups-client is &lt;1.7.5-20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522395" version="1" comment="cups-libs is &lt;1.7.5-20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522396" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522401" version="1" comment="clamav is &lt;0.100.3-33.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530781" version="1" comment="mailman is &lt;2.1.17-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522404" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.241-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530782" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.241-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530783" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.241-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522405" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.241-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522421" version="1" comment="clamav is &lt;0.100.3-33.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530786" version="1" comment="permissions is &lt;2015.09.28.1626-17.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522423" version="1" comment="strongswan is &lt;5.1.3-26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522424" version="1" comment="strongswan-doc is &lt;5.1.3-26.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552195" version="1" comment="strongswan-hmac is &lt;5.1.3-26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522425" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522426" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597152" version="1" comment="haproxy is &lt;1.6.11-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538360" version="1" comment="xen is &lt;4.9.4_06-3.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538361" version="1" comment="xen-doc-html is &lt;4.9.4_06-3.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538362" version="1" comment="xen-libs is &lt;4.9.4_06-3.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538363" version="1" comment="xen-libs-32bit is &lt;4.9.4_06-3.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538364" version="1" comment="xen-tools is &lt;4.9.4_06-3.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538365" version="1" comment="xen-tools-domU is &lt;4.9.4_06-3.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597153" version="1" comment="git is &lt;2.12.3-27.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530787" version="1" comment="git-core is &lt;2.12.3-27.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522433" version="1" comment="MozillaFirefox is &lt;68.3.0-109.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522434" version="1" comment="MozillaFirefox-translations-common is &lt;68.3.0-109.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555682" version="1" comment="kernel-default is &lt;4.4.180-94.113.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555683" version="1" comment="kernel-default-base is &lt;4.4.180-94.113.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555684" version="1" comment="kernel-default-devel is &lt;4.4.180-94.113.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556175" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.113.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538370" version="1" comment="kernel-devel is &lt;4.4.180-94.113.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538371" version="1" comment="kernel-macros is &lt;4.4.180-94.113.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538372" version="1" comment="kernel-source is &lt;4.4.180-94.113.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555685" version="1" comment="kernel-syms is &lt;4.4.180-94.113.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556177" version="1" comment="kgraft-patch-4_4_180-94_113-default is &lt;1-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597154" version="1" comment="python-PyKMIP is &lt;0.6.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597155" version="1" comment="python-paramiko is &lt;2.2.4-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597156" version="1" comment="galera-3-wsrep-provider is &lt;25.3.24-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597157" version="1" comment="libmariadb3 is &lt;3.0.6-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597158" version="1" comment="mariadb is &lt;10.2.21-4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597159" version="1" comment="mariadb-client is &lt;10.2.21-4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597160" version="1" comment="mariadb-errormessages is &lt;10.2.21-4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597161" version="1" comment="mariadb-galera is &lt;10.2.21-4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597162" version="1" comment="mariadb-tools is &lt;10.2.21-4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555686" version="1" comment="freeradius-server is &lt;3.0.15-2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555687" version="1" comment="freeradius-server-doc is &lt;3.0.15-2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555688" version="1" comment="freeradius-server-krb5 is &lt;3.0.15-2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555689" version="1" comment="freeradius-server-ldap is &lt;3.0.15-2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555690" version="1" comment="freeradius-server-libs is &lt;3.0.15-2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555691" version="1" comment="freeradius-server-mysql is &lt;3.0.15-2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555692" version="1" comment="freeradius-server-perl is &lt;3.0.15-2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555693" version="1" comment="freeradius-server-postgresql is &lt;3.0.15-2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555694" version="1" comment="freeradius-server-python is &lt;3.0.15-2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555695" version="1" comment="freeradius-server-sqlite is &lt;3.0.15-2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555696" version="1" comment="freeradius-server-utils is &lt;3.0.15-2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530902" version="1" comment="cups is &lt;1.7.5-20.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530903" version="1" comment="cups-client is &lt;1.7.5-20.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530904" version="1" comment="cups-libs is &lt;1.7.5-20.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530905" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597163" version="1" comment="ardana-ansible is &lt;8.0+git.1583432621.24fa60e-3.70.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597164" version="1" comment="ardana-barbican is &lt;8.0+git.1585152761.8ef3d61-4.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597165" version="1" comment="ardana-db is &lt;8.0+git.1583944923.03cca6c-3.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597166" version="1" comment="ardana-monasca is &lt;8.0+git.1583944894.38f023a-3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597167" version="1" comment="ardana-mq is &lt;8.0+git.1583944811.dc14403-3.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597168" version="1" comment="ardana-neutron is &lt;8.0+git.1584715262.e4ea620-3.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597169" version="1" comment="ardana-octavia is &lt;8.0+git.1585171918.418f5cf-3.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597170" version="1" comment="ardana-tempest is &lt;8.0+git.1585311051.6ab5488-3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597171" version="1" comment="documentation-suse-openstack-cloud-installation is &lt;8.20200319-1.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597172" version="1" comment="documentation-suse-openstack-cloud-operations is &lt;8.20200319-1.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597173" version="1" comment="documentation-suse-openstack-cloud-opsconsole is &lt;8.20200319-1.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597174" version="1" comment="documentation-suse-openstack-cloud-planning is &lt;8.20200319-1.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597175" version="1" comment="documentation-suse-openstack-cloud-security is &lt;8.20200319-1.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597176" version="1" comment="documentation-suse-openstack-cloud-supplement is &lt;8.20200319-1.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597177" version="1" comment="documentation-suse-openstack-cloud-upstream-admin is &lt;8.20200319-1.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597178" version="1" comment="documentation-suse-openstack-cloud-upstream-user is &lt;8.20200319-1.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597179" version="1" comment="documentation-suse-openstack-cloud-user is &lt;8.20200319-1.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597180" version="1" comment="memcached is &lt;1.5.17-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597181" version="1" comment="openstack-manila is &lt;5.1.1~dev5-3.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597182" version="1" comment="openstack-manila-api is &lt;5.1.1~dev5-3.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597183" version="1" comment="openstack-manila-data is &lt;5.1.1~dev5-3.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597184" version="1" comment="openstack-manila-doc is &lt;5.1.1~dev5-3.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597185" version="1" comment="openstack-manila-scheduler is &lt;5.1.1~dev5-3.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597186" version="1" comment="openstack-manila-share is &lt;5.1.1~dev5-3.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597187" version="1" comment="openstack-neutron is &lt;11.0.9~dev63-3.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597188" version="1" comment="openstack-neutron-dhcp-agent is &lt;11.0.9~dev63-3.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597189" version="1" comment="openstack-neutron-doc is &lt;11.0.9~dev63-3.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597190" version="1" comment="openstack-neutron-ha-tool is &lt;11.0.9~dev63-3.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597191" version="1" comment="openstack-neutron-l3-agent is &lt;11.0.9~dev63-3.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597192" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;11.0.9~dev63-3.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597193" version="1" comment="openstack-neutron-macvtap-agent is &lt;11.0.9~dev63-3.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597194" version="1" comment="openstack-neutron-metadata-agent is &lt;11.0.9~dev63-3.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597195" version="1" comment="openstack-neutron-metering-agent is &lt;11.0.9~dev63-3.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597196" version="1" comment="openstack-neutron-openvswitch-agent is &lt;11.0.9~dev63-3.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597197" version="1" comment="openstack-neutron-server is &lt;11.0.9~dev63-3.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597198" version="1" comment="openstack-nova is &lt;16.1.9~dev61-3.35.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597199" version="1" comment="openstack-nova-api is &lt;16.1.9~dev61-3.35.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597200" version="1" comment="openstack-nova-cells is &lt;16.1.9~dev61-3.35.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597201" version="1" comment="openstack-nova-compute is &lt;16.1.9~dev61-3.35.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597202" version="1" comment="openstack-nova-conductor is &lt;16.1.9~dev61-3.35.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597203" version="1" comment="openstack-nova-console is &lt;16.1.9~dev61-3.35.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597204" version="1" comment="openstack-nova-consoleauth is &lt;16.1.9~dev61-3.35.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597205" version="1" comment="openstack-nova-doc is &lt;16.1.9~dev61-3.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597206" version="1" comment="openstack-nova-novncproxy is &lt;16.1.9~dev61-3.35.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597207" version="1" comment="openstack-nova-placement-api is &lt;16.1.9~dev61-3.35.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597208" version="1" comment="openstack-nova-scheduler is &lt;16.1.9~dev61-3.35.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597209" version="1" comment="openstack-nova-serialproxy is &lt;16.1.9~dev61-3.35.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597210" version="1" comment="openstack-nova-vncproxy is &lt;16.1.9~dev61-3.35.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597211" version="1" comment="pdns is &lt;4.1.2-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597212" version="1" comment="pdns-backend-mysql is &lt;4.1.2-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597213" version="1" comment="python-amqp is &lt;2.4.2-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597214" version="1" comment="python-manila is &lt;5.1.1~dev5-3.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597215" version="1" comment="python-neutron is &lt;11.0.9~dev63-3.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597216" version="1" comment="python-nova is &lt;16.1.9~dev61-3.35.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597217" version="1" comment="venv-openstack-aodh-x86_64 is &lt;5.1.1~dev7-12.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597218" version="1" comment="venv-openstack-barbican-x86_64 is &lt;5.0.2~dev3-12.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597219" version="1" comment="venv-openstack-ceilometer-x86_64 is &lt;9.0.8~dev7-12.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597220" version="1" comment="venv-openstack-cinder-x86_64 is &lt;11.2.3~dev23-14.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597221" version="1" comment="venv-openstack-designate-x86_64 is &lt;5.0.3~dev7-12.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597222" version="1" comment="venv-openstack-freezer-x86_64 is &lt;5.0.0.0~xrc2~dev2-10.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597223" version="1" comment="venv-openstack-glance-x86_64 is &lt;15.0.3~dev3-12.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597224" version="1" comment="venv-openstack-heat-x86_64 is &lt;9.0.8~dev22-12.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597225" version="1" comment="venv-openstack-ironic-x86_64 is &lt;9.1.8~dev8-12.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597226" version="1" comment="venv-openstack-keystone-x86_64 is &lt;12.0.4~dev5-11.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597227" version="1" comment="venv-openstack-magnum-x86_64 is &lt;5.0.2_5.0.2_5.0.2~dev31-11.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597228" version="1" comment="venv-openstack-manila-x86_64 is &lt;5.1.1~dev5-12.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597229" version="1" comment="venv-openstack-monasca-ceilometer-x86_64 is &lt;1.5.1_1.5.1_1.5.1~dev3-8.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597230" version="1" comment="venv-openstack-murano-x86_64 is &lt;4.0.2~dev2-12.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597231" version="1" comment="venv-openstack-neutron-x86_64 is &lt;11.0.9~dev63-13.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597232" version="1" comment="venv-openstack-nova-x86_64 is &lt;16.1.9~dev61-11.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597233" version="1" comment="venv-openstack-octavia-x86_64 is &lt;1.0.6~dev3-12.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597234" version="1" comment="venv-openstack-sahara-x86_64 is &lt;7.0.5~dev4-11.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597235" version="1" comment="venv-openstack-trove-x86_64 is &lt;8.0.2~dev2-11.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597236" version="1" comment="zookeeper-server is &lt;3.4.10-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530906" version="1" comment="pam_radius is &lt;1.3.16-239.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530907" version="1" comment="pam_radius-32bit is &lt;1.3.16-239.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530908" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.1-2.50.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530909" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.1-2.50.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530910" version="1" comment="libwebkit2gtk3-lang is &lt;2.28.1-2.50.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530911" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.1-2.50.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530912" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.1-2.50.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530914" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.1-2.50.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530916" version="1" comment="libshibsp-lite6 is &lt;2.5.5-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530917" version="1" comment="libshibsp6 is &lt;2.5.5-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530918" version="1" comment="shibboleth-sp is &lt;2.5.5-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555697" version="1" comment="ceph-common is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555698" version="1" comment="libcephfs2 is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555699" version="1" comment="librados2 is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555700" version="1" comment="libradosstriper1 is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555701" version="1" comment="librbd1 is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555702" version="1" comment="librgw2 is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555703" version="1" comment="python-cephfs is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555704" version="1" comment="python-rados is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555705" version="1" comment="python-rbd is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555706" version="1" comment="python-rgw is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530919" version="1" comment="libvncclient0 is &lt;0.9.9-17.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530920" version="1" comment="libvncserver0 is &lt;0.9.9-17.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530921" version="1" comment="libicu-doc is &lt;52.1-8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530922" version="1" comment="libicu52_1 is &lt;52.1-8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530923" version="1" comment="libicu52_1-32bit is &lt;52.1-8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530924" version="1" comment="libicu52_1-data is &lt;52.1-8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530925" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530926" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530927" version="1" comment="openldap2 is &lt;2.4.41-18.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530928" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530929" version="1" comment="openldap2-client is &lt;2.4.41-18.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530930" version="1" comment="openldap2-doc is &lt;2.4.41-18.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530931" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530932" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.2-2.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530933" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.2-2.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530934" version="1" comment="libwebkit2gtk3-lang is &lt;2.28.2-2.53.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530935" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.2-2.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530936" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.2-2.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530938" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.2-2.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530940" version="1" comment="ghostscript is &lt;9.52-23.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530941" version="1" comment="ghostscript-x11 is &lt;9.52-23.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530942" version="1" comment="libspectre1 is &lt;0.2.7-12.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530943" version="1" comment="MozillaFirefox is &lt;68.8.0-109.119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530945" version="1" comment="MozillaFirefox-translations-common is &lt;68.8.0-109.119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530946" version="1" comment="squid is &lt;3.5.21-26.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530955" version="1" comment="apache2 is &lt;2.4.23-29.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530956" version="1" comment="apache2-doc is &lt;2.4.23-29.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530957" version="1" comment="apache2-example-pages is &lt;2.4.23-29.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530958" version="1" comment="apache2-prefork is &lt;2.4.23-29.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530959" version="1" comment="apache2-utils is &lt;2.4.23-29.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530960" version="1" comment="apache2-worker is &lt;2.4.23-29.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555707" version="1" comment="kernel-default is &lt;4.4.180-94.116.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555708" version="1" comment="kernel-default-base is &lt;4.4.180-94.116.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555709" version="1" comment="kernel-default-devel is &lt;4.4.180-94.116.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556240" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.116.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538400" version="1" comment="kernel-devel is &lt;4.4.180-94.116.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538401" version="1" comment="kernel-macros is &lt;4.4.180-94.116.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538402" version="1" comment="kernel-source is &lt;4.4.180-94.116.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555710" version="1" comment="kernel-syms is &lt;4.4.180-94.116.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556242" version="1" comment="kgraft-patch-4_4_180-94_116-default is &lt;1-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009524550" version="1" comment="python-PyYAML is &lt;5.1.2-26.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530070" version="1" comment="python3-PyYAML is &lt;5.1.2-26.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597237" version="1" comment="git is &lt;2.26.2-27.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530961" version="1" comment="git-core is &lt;2.26.2-27.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530963" version="1" comment="mailman is &lt;2.1.17-3.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530964" version="1" comment="tomcat is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530965" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530966" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530967" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530968" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530969" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530970" version="1" comment="tomcat-lib is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530971" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530972" version="1" comment="tomcat-webapps is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530973" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530974" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530975" version="1" comment="python is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530976" version="1" comment="python-32bit is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530977" version="1" comment="python-base is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530978" version="1" comment="python-base-32bit is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530979" version="1" comment="python-curses is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530980" version="1" comment="python-demo is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530981" version="1" comment="python-devel is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530982" version="1" comment="python-doc is &lt;2.7.17-28.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530983" version="1" comment="python-doc-pdf is &lt;2.7.17-28.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530984" version="1" comment="python-gdbm is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530985" version="1" comment="python-idle is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530986" version="1" comment="python-rpm-macros is &lt;20200207.5feb6c1-3.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530987" version="1" comment="python-tk is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530988" version="1" comment="python-xml is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530989" version="1" comment="shared-python-startup is &lt;0.1-1.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531003" version="1" comment="krb5-appl-clients is &lt;1.0.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531004" version="1" comment="krb5-appl-servers is &lt;1.0.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531005" version="1" comment="libexif12 is &lt;0.6.22-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531006" version="1" comment="libexif12-32bit is &lt;0.6.22-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555711" version="1" comment="qemu is &lt;2.9.1-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555712" version="1" comment="qemu-block-curl is &lt;2.9.1-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555713" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538416" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555714" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555715" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538419" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538420" version="1" comment="qemu-kvm is &lt;2.9.1-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555716" version="1" comment="qemu-lang is &lt;2.9.1-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538423" version="1" comment="qemu-seabios is &lt;1.10.2-6.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538424" version="1" comment="qemu-sgabios is &lt;8-6.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555717" version="1" comment="qemu-tools is &lt;2.9.1-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538426" version="1" comment="qemu-vgabios is &lt;1.10.2-6.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538427" version="1" comment="qemu-x86 is &lt;2.9.1-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531007" version="1" comment="gvim is &lt;7.4.326-17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531008" version="1" comment="vim is &lt;7.4.326-17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531009" version="1" comment="vim-data is &lt;7.4.326-17.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531010" version="1" comment="MozillaFirefox is &lt;68.9.0-109.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531012" version="1" comment="MozillaFirefox-translations-common is &lt;68.9.0-109.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531013" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-19.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531014" version="1" comment="ruby2.1 is &lt;2.1.9-19.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531015" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-19.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531017" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.261-43.38.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531018" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.261-43.38.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531019" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.261-43.38.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531020" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.261-43.38.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531021" version="1" comment="libXvnc1 is &lt;1.6.0-18.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531022" version="1" comment="tigervnc is &lt;1.6.0-18.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531023" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-18.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531024" version="1" comment="ucode-intel is &lt;20200602-13.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555718" version="1" comment="kernel-default is &lt;4.4.180-94.121.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555719" version="1" comment="kernel-default-base is &lt;4.4.180-94.121.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555720" version="1" comment="kernel-default-devel is &lt;4.4.180-94.121.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556289" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.121.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538432" version="1" comment="kernel-devel is &lt;4.4.180-94.121.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538433" version="1" comment="kernel-macros is &lt;4.4.180-94.121.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538434" version="1" comment="kernel-source is &lt;4.4.180-94.121.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555721" version="1" comment="kernel-syms is &lt;4.4.180-94.121.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556291" version="1" comment="kgraft-patch-4_4_180-94_121-default is &lt;1-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522550" version="1" comment="libvirglrenderer0 is &lt;0.5.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531033" version="1" comment="libadns1 is &lt;1.4-103.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557472" version="1" comment="libmysqlclient18 is &lt;10.0.40.4-29.41.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538437" version="1" comment="xen is &lt;4.9.4_06-3.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538438" version="1" comment="xen-doc-html is &lt;4.9.4_06-3.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538439" version="1" comment="xen-libs is &lt;4.9.4_06-3.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538440" version="1" comment="xen-libs-32bit is &lt;4.9.4_06-3.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538441" version="1" comment="xen-tools is &lt;4.9.4_06-3.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538442" version="1" comment="xen-tools-domU is &lt;4.9.4_06-3.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531034" version="1" comment="perl is &lt;5.18.2-12.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531035" version="1" comment="perl-32bit is &lt;5.18.2-12.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531036" version="1" comment="perl-base is &lt;5.18.2-12.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531037" version="1" comment="perl-doc is &lt;5.18.2-12.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531038" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.65-38.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531039" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.65-38.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531040" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.65-38.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531041" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.65-38.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531042" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.65-38.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531043" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.10-30.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531044" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.10-30.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531045" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.10-30.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531046" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.10-30.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531047" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.252-27.45.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531048" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.252-27.45.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531049" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.252-27.45.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531050" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.252-27.45.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555722" version="1" comment="kernel-default is &lt;4.4.180-94.124.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555723" version="1" comment="kernel-default-base is &lt;4.4.180-94.124.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555724" version="1" comment="kernel-default-devel is &lt;4.4.180-94.124.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556303" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.124.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538447" version="1" comment="kernel-devel is &lt;4.4.180-94.124.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538448" version="1" comment="kernel-macros is &lt;4.4.180-94.124.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538449" version="1" comment="kernel-source is &lt;4.4.180-94.124.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555725" version="1" comment="kernel-syms is &lt;4.4.180-94.124.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556305" version="1" comment="kgraft-patch-4_4_180-94_124-default is &lt;1-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531051" version="1" comment="curl is &lt;7.37.0-37.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531052" version="1" comment="libcurl4 is &lt;7.37.0-37.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531053" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555726" version="1" comment="ceph-common is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555727" version="1" comment="libcephfs2 is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555728" version="1" comment="librados2 is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555729" version="1" comment="libradosstriper1 is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555730" version="1" comment="librbd1 is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555731" version="1" comment="librgw2 is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555732" version="1" comment="python-cephfs is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555733" version="1" comment="python-rados is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555734" version="1" comment="python-rbd is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555735" version="1" comment="python-rgw is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531054" version="1" comment="tomcat is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531055" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531056" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531057" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531058" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531059" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531060" version="1" comment="tomcat-lib is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531061" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531062" version="1" comment="tomcat-webapps is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525269" version="1" comment="python3-certifi is &lt;2018.4.16-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525270" version="1" comment="python3-chardet is &lt;3.0.4-5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531063" version="1" comment="python3-requests is &lt;2.20.1-5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525271" version="1" comment="python3-urllib3 is &lt;1.22-3.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531064" version="1" comment="mutt is &lt;1.10.1-55.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531065" version="1" comment="squid is &lt;3.5.21-26.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531066" version="1" comment="ntp is &lt;4.2.8p15-88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531067" version="1" comment="ntp-doc is &lt;4.2.8p15-88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531068" version="1" comment="libfreebl3 is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531069" version="1" comment="libfreebl3-32bit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531070" version="1" comment="libfreebl3-hmac is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531071" version="1" comment="libfreebl3-hmac-32bit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531072" version="1" comment="libsoftokn3 is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531073" version="1" comment="libsoftokn3-32bit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531074" version="1" comment="libsoftokn3-hmac is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531075" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531076" version="1" comment="mozilla-nspr is &lt;4.25-19.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531077" version="1" comment="mozilla-nspr-32bit is &lt;4.25-19.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597238" version="1" comment="mozilla-nspr-devel is &lt;4.25-19.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531078" version="1" comment="mozilla-nss is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531079" version="1" comment="mozilla-nss-32bit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531080" version="1" comment="mozilla-nss-certs is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531081" version="1" comment="mozilla-nss-certs-32bit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597239" version="1" comment="mozilla-nss-devel is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531082" version="1" comment="mozilla-nss-sysinit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531083" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531084" version="1" comment="mozilla-nss-tools is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531085" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531086" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531087" version="1" comment="openldap2 is &lt;2.4.41-18.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531088" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531089" version="1" comment="openldap2-client is &lt;2.4.41-18.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531090" version="1" comment="openldap2-doc is &lt;2.4.41-18.71.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531091" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538473" version="1" comment="xen is &lt;4.9.4_08-3.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538474" version="1" comment="xen-doc-html is &lt;4.9.4_08-3.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538475" version="1" comment="xen-libs is &lt;4.9.4_08-3.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538476" version="1" comment="xen-libs-32bit is &lt;4.9.4_08-3.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538477" version="1" comment="xen-tools is &lt;4.9.4_08-3.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538478" version="1" comment="xen-tools-domU is &lt;4.9.4_08-3.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531092" version="1" comment="MozillaFirefox is &lt;78.0.1-112.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531093" version="1" comment="MozillaFirefox-branding-SLE is &lt;78-35.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531094" version="1" comment="MozillaFirefox-devel is &lt;78.0.1-112.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531095" version="1" comment="MozillaFirefox-translations-common is &lt;78.0.1-112.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597240" version="1" comment="ansible is &lt;2.4.6.0-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597241" version="1" comment="ansible1 is &lt;1.9.6-7.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597242" version="1" comment="ardana-ansible is &lt;8.0+git.1589740980.6c3bcdc-3.73.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597243" version="1" comment="ardana-cluster is &lt;8.0+git.1585685203.3e71e49-3.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597244" version="1" comment="ardana-freezer is &lt;8.0+git.1586539529.b7d295f-3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597245" version="1" comment="ardana-input-model is &lt;8.0+git.1589740934.0e0ad61-3.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597246" version="1" comment="ardana-logging is &lt;8.0+git.1591194866.b7375d0-3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597247" version="1" comment="ardana-mq is &lt;8.0+git.1589715269.62ad6df-3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597248" version="1" comment="ardana-neutron is &lt;8.0+git.1590756744.ba84abc-3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597249" version="1" comment="ardana-octavia is &lt;8.0+git.1590100427.cf4cc8f-3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597250" version="1" comment="ardana-osconfig is &lt;8.0+git.1587034587.eac37b8-3.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597251" version="1" comment="caasp-openstack-heat-templates is &lt;1.0+git.1560518045.ad7dc6d-4.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597252" version="1" comment="documentation-suse-openstack-cloud-installation is &lt;8.20200527-1.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597253" version="1" comment="documentation-suse-openstack-cloud-operations is &lt;8.20200527-1.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597254" version="1" comment="documentation-suse-openstack-cloud-opsconsole is &lt;8.20200527-1.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597255" version="1" comment="documentation-suse-openstack-cloud-planning is &lt;8.20200527-1.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597256" version="1" comment="documentation-suse-openstack-cloud-security is &lt;8.20200527-1.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597257" version="1" comment="documentation-suse-openstack-cloud-supplement is &lt;8.20200527-1.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597258" version="1" comment="documentation-suse-openstack-cloud-upstream-admin is &lt;8.20200527-1.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597259" version="1" comment="documentation-suse-openstack-cloud-upstream-user is &lt;8.20200527-1.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597260" version="1" comment="documentation-suse-openstack-cloud-user is &lt;8.20200527-1.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597261" version="1" comment="grafana is &lt;4.6.5-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597262" version="1" comment="kibana is &lt;4.6.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597263" version="1" comment="openstack-dashboard is &lt;12.0.5~dev3-3.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597264" version="1" comment="openstack-heat-templates is &lt;0.0.0+git.1582270132.8a20477-3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597265" version="1" comment="openstack-keystone is &lt;12.0.4~dev11-5.33.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597266" version="1" comment="openstack-keystone-doc is &lt;12.0.4~dev11-5.33.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597267" version="1" comment="openstack-monasca-agent is &lt;2.2.6~dev4-3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597268" version="1" comment="openstack-monasca-installer is &lt;20190923_16.32-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597269" version="1" comment="openstack-neutron is &lt;11.0.9~dev65-3.33.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597270" version="1" comment="openstack-neutron-dhcp-agent is &lt;11.0.9~dev65-3.33.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597271" version="1" comment="openstack-neutron-doc is &lt;11.0.9~dev65-3.33.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597272" version="1" comment="openstack-neutron-ha-tool is &lt;11.0.9~dev65-3.33.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597273" version="1" comment="openstack-neutron-l3-agent is &lt;11.0.9~dev65-3.33.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597274" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;11.0.9~dev65-3.33.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597275" version="1" comment="openstack-neutron-macvtap-agent is &lt;11.0.9~dev65-3.33.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597276" version="1" comment="openstack-neutron-metadata-agent is &lt;11.0.9~dev65-3.33.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597277" version="1" comment="openstack-neutron-metering-agent is &lt;11.0.9~dev65-3.33.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597278" version="1" comment="openstack-neutron-openvswitch-agent is &lt;11.0.9~dev65-3.33.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597279" version="1" comment="openstack-neutron-server is &lt;11.0.9~dev65-3.33.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597280" version="1" comment="openstack-octavia-amphora-image-x86_64 is &lt;0.1.4-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597281" version="1" comment="python-Django is &lt;1.11.23-3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597282" version="1" comment="python-Flask is &lt;0.12.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597283" version="1" comment="python-GitPython is &lt;2.1.8-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597284" version="1" comment="python-Pillow is &lt;4.2.1-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597285" version="1" comment="python-amqp is &lt;2.4.2-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597286" version="1" comment="python-apicapi is &lt;1.6.0-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597287" version="1" comment="python-horizon is &lt;12.0.5~dev3-3.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597288" version="1" comment="python-keystone is &lt;12.0.4~dev11-5.33.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597289" version="1" comment="python-keystoneauth1 is &lt;3.1.2~dev2-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597290" version="1" comment="python-monasca-agent is &lt;2.2.6~dev4-3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597291" version="1" comment="python-neutron is &lt;11.0.9~dev65-3.33.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597292" version="1" comment="python-oslo.messaging is &lt;5.30.8-3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597293" version="1" comment="python-psutil is &lt;5.2.2-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597294" version="1" comment="python-pyroute2 is &lt;0.4.21-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597295" version="1" comment="python-pysaml2 is &lt;4.0.2-5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597296" version="1" comment="python-tooz is &lt;1.58.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596490" version="1" comment="python-waitress is &lt;1.4.3-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597297" version="1" comment="storm is &lt;1.1.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597298" version="1" comment="storm-nimbus is &lt;1.1.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597299" version="1" comment="storm-supervisor is &lt;1.1.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597300" version="1" comment="venv-openstack-aodh-x86_64 is &lt;5.1.1~dev7-12.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597301" version="1" comment="venv-openstack-barbican-x86_64 is &lt;5.0.2~dev3-12.27.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597302" version="1" comment="venv-openstack-ceilometer-x86_64 is &lt;9.0.8~dev7-12.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597303" version="1" comment="venv-openstack-cinder-x86_64 is &lt;11.2.3~dev23-14.27.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597304" version="1" comment="venv-openstack-designate-x86_64 is &lt;5.0.3~dev7-12.25.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597305" version="1" comment="venv-openstack-freezer-x86_64 is &lt;5.0.0.0~xrc2~dev2-10.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597306" version="1" comment="venv-openstack-glance-x86_64 is &lt;15.0.3~dev3-12.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597307" version="1" comment="venv-openstack-heat-x86_64 is &lt;9.0.8~dev22-12.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597308" version="1" comment="venv-openstack-horizon-x86_64 is &lt;12.0.5~dev3-14.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597309" version="1" comment="venv-openstack-ironic-x86_64 is &lt;9.1.8~dev8-12.27.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597310" version="1" comment="venv-openstack-keystone-x86_64 is &lt;12.0.4~dev11-11.28.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597311" version="1" comment="venv-openstack-magnum-x86_64 is &lt;5.0.2_5.0.2_5.0.2~dev31-11.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597312" version="1" comment="venv-openstack-manila-x86_64 is &lt;5.1.1~dev5-12.31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597313" version="1" comment="venv-openstack-monasca-ceilometer-x86_64 is &lt;1.5.1_1.5.1_1.5.1~dev3-8.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597314" version="1" comment="venv-openstack-monasca-x86_64 is &lt;2.2.2~dev1-11.22.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597315" version="1" comment="venv-openstack-murano-x86_64 is &lt;4.0.2~dev2-12.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597316" version="1" comment="venv-openstack-neutron-x86_64 is &lt;11.0.9~dev65-13.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597317" version="1" comment="venv-openstack-nova-x86_64 is &lt;16.1.9~dev61-11.28.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597318" version="1" comment="venv-openstack-octavia-x86_64 is &lt;1.0.6~dev3-12.27.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597319" version="1" comment="venv-openstack-sahara-x86_64 is &lt;7.0.5~dev4-11.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597320" version="1" comment="venv-openstack-swift-x86_64 is &lt;2.15.2_2.15.2_2.15.2~dev32-11.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597321" version="1" comment="venv-openstack-trove-x86_64 is &lt;8.0.2~dev2-11.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531096" version="1" comment="bind is &lt;9.9.9P1-63.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531097" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531098" version="1" comment="bind-doc is &lt;9.9.9P1-63.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531099" version="1" comment="bind-libs is &lt;9.9.9P1-63.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531100" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531101" version="1" comment="bind-utils is &lt;9.9.9P1-63.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498241" version="1" comment="python-ipaddress is &lt;1.0.18-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531103" version="1" comment="squid is &lt;3.5.21-26.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597322" version="1" comment="cobbler is &lt;2.6.6-49.26.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555736" version="1" comment="golang-github-prometheus-node_exporter is &lt;0.18.1-1.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555737" version="1" comment="xrdp is &lt;0.9.0~git.1456906198.f422461-21.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531104" version="1" comment="mailman is &lt;2.1.17-3.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555738" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538485" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555739" version="1" comment="libdcerpc0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538487" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555740" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538489" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555741" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538491" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555742" version="1" comment="libndr-standard0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538493" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555743" version="1" comment="libndr0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538495" version="1" comment="libndr0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555744" version="1" comment="libnetapi0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538497" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555745" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538499" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555746" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538501" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555747" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538503" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555748" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538505" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555749" version="1" comment="libsamba-util0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538507" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555750" version="1" comment="libsamdb0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538509" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555751" version="1" comment="libsmbclient0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538511" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555752" version="1" comment="libsmbconf0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538513" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555753" version="1" comment="libsmbldap0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538515" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555754" version="1" comment="libtevent-util0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538517" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555755" version="1" comment="libwbclient0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538519" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555756" version="1" comment="samba is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555757" version="1" comment="samba-client is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538522" version="1" comment="samba-client-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538523" version="1" comment="samba-doc is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555758" version="1" comment="samba-libs is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538525" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555759" version="1" comment="samba-winbind is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538527" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531105" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.3-2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531106" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.3-2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531107" version="1" comment="libwebkit2gtk3-lang is &lt;2.28.3-2.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531108" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.3-2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531109" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.3-2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531110" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.3-2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531111" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.3-2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555760" version="1" comment="grub2 is &lt;2.02-4.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538529" version="1" comment="grub2-i386-pc is &lt;2.02-4.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538531" version="1" comment="grub2-snapper-plugin is &lt;2.02-4.53.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538532" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02-4.53.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538533" version="1" comment="grub2-x86_64-efi is &lt;2.02-4.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538534" version="1" comment="grub2-x86_64-xen is &lt;2.02-4.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531119" version="1" comment="ghostscript is &lt;9.52-23.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531120" version="1" comment="ghostscript-x11 is &lt;9.52-23.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531121" version="1" comment="MozillaFirefox is &lt;78.1.0-112.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531122" version="1" comment="MozillaFirefox-devel is &lt;78.1.0-112.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531123" version="1" comment="MozillaFirefox-translations-common is &lt;78.1.0-112.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531124" version="1" comment="libX11-6 is &lt;1.6.2-12.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531125" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531126" version="1" comment="libX11-data is &lt;1.6.2-12.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531127" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531128" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531129" version="1" comment="libxcb-dri2-0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531130" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531131" version="1" comment="libxcb-dri3-0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531132" version="1" comment="libxcb-dri3-0-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531133" version="1" comment="libxcb-glx0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531134" version="1" comment="libxcb-glx0-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531135" version="1" comment="libxcb-present0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531136" version="1" comment="libxcb-present0-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531137" version="1" comment="libxcb-randr0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531138" version="1" comment="libxcb-render0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531139" version="1" comment="libxcb-render0-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531140" version="1" comment="libxcb-shape0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531141" version="1" comment="libxcb-shm0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531142" version="1" comment="libxcb-shm0-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531143" version="1" comment="libxcb-sync1 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531144" version="1" comment="libxcb-sync1-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531145" version="1" comment="libxcb-xf86dri0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531146" version="1" comment="libxcb-xfixes0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531147" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531148" version="1" comment="libxcb-xinerama0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531149" version="1" comment="libxcb-xkb1 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531150" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531151" version="1" comment="libxcb-xv0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531152" version="1" comment="libxcb1 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531153" version="1" comment="libxcb1-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555761" version="1" comment="kernel-default is &lt;4.4.180-94.127.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555762" version="1" comment="kernel-default-base is &lt;4.4.180-94.127.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555763" version="1" comment="kernel-default-devel is &lt;4.4.180-94.127.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556413" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.127.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538541" version="1" comment="kernel-devel is &lt;4.4.180-94.127.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538542" version="1" comment="kernel-macros is &lt;4.4.180-94.127.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538543" version="1" comment="kernel-source is &lt;4.4.180-94.127.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555764" version="1" comment="kernel-syms is &lt;4.4.180-94.127.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556415" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;1-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531162" version="1" comment="python-ipaddress is &lt;1.0.18-3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531163" version="1" comment="libvncclient0 is &lt;0.9.9-17.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531164" version="1" comment="libvncserver0 is &lt;0.9.9-17.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538546" version="1" comment="xen is &lt;4.9.4_10-3.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538547" version="1" comment="xen-doc-html is &lt;4.9.4_10-3.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538548" version="1" comment="xen-libs is &lt;4.9.4_10-3.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538549" version="1" comment="xen-libs-32bit is &lt;4.9.4_10-3.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538550" version="1" comment="xen-tools is &lt;4.9.4_10-3.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538551" version="1" comment="xen-tools-domU is &lt;4.9.4_10-3.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555765" version="1" comment="dpdk is &lt;16.11.9-8.15.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538553" version="1" comment="dpdk-kmp-default is &lt;16.11.9_k4.4.180_94.127-8.15.13 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555766" version="1" comment="dpdk-tools is &lt;16.11.9-8.15.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531165" version="1" comment="libX11-6 is &lt;1.6.2-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531166" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531167" version="1" comment="libX11-data is &lt;1.6.2-12.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531168" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531169" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531170" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-13.3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531171" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-13.3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531172" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.4-2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531173" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.4-2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531174" version="1" comment="libwebkit2gtk3-lang is &lt;2.28.4-2.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531175" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.4-2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531176" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.4-2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531177" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.4-2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531178" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.4-2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531186" version="1" comment="dovecot22 is &lt;2.2.31-19.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531187" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531188" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531189" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555767" version="1" comment="grub2 is &lt;2.02-4.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538556" version="1" comment="grub2-i386-pc is &lt;2.02-4.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538558" version="1" comment="grub2-snapper-plugin is &lt;2.02-4.61.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538559" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02-4.61.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538560" version="1" comment="grub2-x86_64-efi is &lt;2.02-4.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538561" version="1" comment="grub2-x86_64-xen is &lt;2.02-4.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522551" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522552" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522553" version="1" comment="libdcerpc0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522554" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522555" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522556" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522557" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522558" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522559" version="1" comment="libndr-standard0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522560" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522561" version="1" comment="libndr0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522562" version="1" comment="libndr0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522563" version="1" comment="libnetapi0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522564" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522565" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522566" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522567" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522568" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522569" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522570" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522571" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522572" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522573" version="1" comment="libsamba-util0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522574" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522575" version="1" comment="libsamdb0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522576" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522577" version="1" comment="libsmbclient0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522578" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522579" version="1" comment="libsmbconf0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522580" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522581" version="1" comment="libsmbldap0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522582" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522583" version="1" comment="libtevent-util0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522584" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522585" version="1" comment="libwbclient0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522586" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522587" version="1" comment="samba is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522588" version="1" comment="samba-client is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522589" version="1" comment="samba-client-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522590" version="1" comment="samba-doc is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522591" version="1" comment="samba-libs is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522592" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522593" version="1" comment="samba-winbind is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522594" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531240" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531241" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531253" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.0-30.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531254" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.0-30.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531256" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.0-30.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531257" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531258" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531259" version="1" comment="apache2 is &lt;2.4.23-29.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531260" version="1" comment="apache2-doc is &lt;2.4.23-29.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531261" version="1" comment="apache2-example-pages is &lt;2.4.23-29.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531262" version="1" comment="apache2-prefork is &lt;2.4.23-29.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531263" version="1" comment="apache2-utils is &lt;2.4.23-29.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531264" version="1" comment="apache2-worker is &lt;2.4.23-29.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531265" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.15-30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531266" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.15-30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531267" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.15-30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531268" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.15-30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531269" version="1" comment="squid is &lt;3.5.21-26.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531270" version="1" comment="libX11-6 is &lt;1.6.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531271" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531272" version="1" comment="libX11-data is &lt;1.6.2-12.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531273" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531274" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531275" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.70-38.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531276" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.70-38.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531277" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.70-38.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531278" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.70-38.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531279" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.70-38.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525274" version="1" comment="aws-cli is &lt;1.16.297-22.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531280" version="1" comment="MozillaFirefox is &lt;78.2.0-112.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531281" version="1" comment="MozillaFirefox-devel is &lt;78.2.0-112.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531282" version="1" comment="MozillaFirefox-translations-common is &lt;78.2.0-112.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555768" version="1" comment="kernel-default is &lt;4.4.180-94.130.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555769" version="1" comment="kernel-default-base is &lt;4.4.180-94.130.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555770" version="1" comment="kernel-default-devel is &lt;4.4.180-94.130.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556480" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.130.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538595" version="1" comment="kernel-devel is &lt;4.4.180-94.130.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538596" version="1" comment="kernel-macros is &lt;4.4.180-94.130.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538597" version="1" comment="kernel-source is &lt;4.4.180-94.130.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555771" version="1" comment="kernel-syms is &lt;4.4.180-94.130.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556482" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;1-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522598" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.242-27.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531291" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.242-27.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531292" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.242-27.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522599" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.242-27.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531293" version="1" comment="tomcat is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531294" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531295" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531296" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531297" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531298" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531299" version="1" comment="tomcat-lib is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531300" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531301" version="1" comment="tomcat-webapps is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538600" version="1" comment="shim is &lt;15+git47-25.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555772" version="1" comment="libsolv-devel is &lt;0.6.36-2.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555773" version="1" comment="libsolv-tools is &lt;0.6.36-2.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555774" version="1" comment="perl-solv is &lt;0.6.36-2.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555775" version="1" comment="python-solv is &lt;0.6.36-2.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531302" version="1" comment="perl-DBI is &lt;1.628-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531303" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531304" version="1" comment="python3 is &lt;3.4.10-25.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531305" version="1" comment="python3-base is &lt;3.4.10-25.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531306" version="1" comment="python3-curses is &lt;3.4.10-25.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531307" version="1" comment="python3-devel is &lt;3.4.10-25.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597323" version="1" comment="pdns is &lt;4.1.2-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597324" version="1" comment="pdns-backend-mysql is &lt;4.1.2-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555776" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538606" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555777" version="1" comment="libdcerpc0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538608" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555778" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538610" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555779" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538612" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555780" version="1" comment="libndr-standard0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538614" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555781" version="1" comment="libndr0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538616" version="1" comment="libndr0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555782" version="1" comment="libnetapi0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538618" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555783" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538620" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555784" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538622" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555785" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538624" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555786" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538626" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555787" version="1" comment="libsamba-util0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538628" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555788" version="1" comment="libsamdb0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538630" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555789" version="1" comment="libsmbclient0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538632" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555790" version="1" comment="libsmbconf0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538634" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555791" version="1" comment="libsmbldap0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538636" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555792" version="1" comment="libtevent-util0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538638" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555793" version="1" comment="libwbclient0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538640" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555794" version="1" comment="samba is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555795" version="1" comment="samba-client is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538643" version="1" comment="samba-client-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538644" version="1" comment="samba-doc is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555796" version="1" comment="samba-libs is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538646" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555797" version="1" comment="samba-winbind is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538648" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597325" version="1" comment="python-pip is &lt;9.0.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555798" version="1" comment="libQt5Concurrent5 is &lt;5.6.2-6.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555799" version="1" comment="libQt5Core5 is &lt;5.6.2-6.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555800" version="1" comment="libQt5DBus5 is &lt;5.6.2-6.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555801" version="1" comment="libQt5Gui5 is &lt;5.6.2-6.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555802" version="1" comment="libQt5Network5 is &lt;5.6.2-6.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555803" version="1" comment="libQt5OpenGL5 is &lt;5.6.2-6.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555804" version="1" comment="libQt5PrintSupport5 is &lt;5.6.2-6.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555805" version="1" comment="libQt5Sql5 is &lt;5.6.2-6.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555806" version="1" comment="libQt5Sql5-mysql is &lt;5.6.2-6.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555807" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.2-6.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555808" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.2-6.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555809" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.2-6.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555810" version="1" comment="libQt5Test5 is &lt;5.6.2-6.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555811" version="1" comment="libQt5Widgets5 is &lt;5.6.2-6.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555812" version="1" comment="libQt5Xml5 is &lt;5.6.2-6.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531352" version="1" comment="MozillaFirefox is &lt;78.3.0-112.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531353" version="1" comment="MozillaFirefox-devel is &lt;78.3.0-112.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531354" version="1" comment="MozillaFirefox-translations-common is &lt;78.3.0-112.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538664" version="1" comment="xen is &lt;4.9.4_12-3.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538665" version="1" comment="xen-doc-html is &lt;4.9.4_12-3.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538666" version="1" comment="xen-libs is &lt;4.9.4_12-3.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538667" version="1" comment="xen-libs-32bit is &lt;4.9.4_12-3.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538668" version="1" comment="xen-tools is &lt;4.9.4_12-3.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538669" version="1" comment="xen-tools-domU is &lt;4.9.4_12-3.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531376" version="1" comment="perl-DBI is &lt;1.628-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531377" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.271-43.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531378" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.271-43.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531379" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.271-43.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531380" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.271-43.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531381" version="1" comment="libXvnc1 is &lt;1.6.0-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531382" version="1" comment="tigervnc is &lt;1.6.0-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531383" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531384" version="1" comment="libproxy1 is &lt;0.4.13-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531385" version="1" comment="libproxy1-32bit is &lt;0.4.13-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531386" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.13-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531387" version="1" comment="libproxy1-config-gnome3-32bit is &lt;0.4.13-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531388" version="1" comment="libproxy1-networkmanager is &lt;0.4.13-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531389" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.13-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531390" version="1" comment="ft2demos is &lt;2.6.3-7.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531391" version="1" comment="libfreetype6 is &lt;2.6.3-7.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531392" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531393" version="1" comment="glibc is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531394" version="1" comment="glibc-32bit is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531395" version="1" comment="glibc-devel is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531396" version="1" comment="glibc-devel-32bit is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531397" version="1" comment="glibc-html is &lt;2.22-113.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531398" version="1" comment="glibc-i18ndata is &lt;2.22-113.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531399" version="1" comment="glibc-info is &lt;2.22-113.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531400" version="1" comment="glibc-locale is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531401" version="1" comment="glibc-locale-32bit is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531402" version="1" comment="glibc-profile is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531403" version="1" comment="glibc-profile-32bit is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531404" version="1" comment="nscd is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531405" version="1" comment="MozillaFirefox is &lt;78.4.0-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531406" version="1" comment="MozillaFirefox-devel is &lt;78.4.0-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531407" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.0-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555813" version="1" comment="libspice-server1 is &lt;0.12.8-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555814" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.33-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555815" version="1" comment="libspice-client-glib-helper is &lt;0.33-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555816" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.33-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555817" version="1" comment="libspice-controller0 is &lt;0.33-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555818" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.33-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555819" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.33-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555820" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538678" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555821" version="1" comment="libdcerpc0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538680" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555822" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538682" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555823" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538684" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555824" version="1" comment="libndr-standard0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538686" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555825" version="1" comment="libndr0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538688" version="1" comment="libndr0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555826" version="1" comment="libnetapi0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538690" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555827" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538692" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555828" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538694" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555829" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538696" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555830" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538698" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555831" version="1" comment="libsamba-util0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538700" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555832" version="1" comment="libsamdb0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538702" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555833" version="1" comment="libsmbclient0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538704" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555834" version="1" comment="libsmbconf0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538706" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555835" version="1" comment="libsmbldap0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538708" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555836" version="1" comment="libtevent-util0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538710" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555837" version="1" comment="libwbclient0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538712" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555838" version="1" comment="samba is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555839" version="1" comment="samba-client is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538715" version="1" comment="samba-client-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538716" version="1" comment="samba-doc is &lt;4.6.16+git.248.c833312e640-3.58.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555840" version="1" comment="samba-libs is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538718" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555841" version="1" comment="samba-winbind is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538720" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555842" version="1" comment="libvirt is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555843" version="1" comment="libvirt-admin is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555844" version="1" comment="libvirt-client is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555845" version="1" comment="libvirt-daemon is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555846" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555847" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555848" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538728" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555849" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555850" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555851" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555852" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555853" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555854" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555855" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555856" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555857" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555858" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555859" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555860" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538741" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555861" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555862" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555863" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555864" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538746" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555865" version="1" comment="libvirt-doc is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555866" version="1" comment="libvirt-libs is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555867" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555868" version="1" comment="libvirt-nss is &lt;3.3.0-5.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531452" version="1" comment="sane-backends is &lt;1.0.31-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531477" version="1" comment="apache-commons-httpclient is &lt;3.1-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522604" version="1" comment="libQt5Concurrent5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522605" version="1" comment="libQt5Core5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522606" version="1" comment="libQt5DBus5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522607" version="1" comment="libQt5Gui5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522608" version="1" comment="libQt5Network5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522609" version="1" comment="libQt5OpenGL5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522610" version="1" comment="libQt5PrintSupport5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522611" version="1" comment="libQt5Sql5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522612" version="1" comment="libQt5Sql5-mysql is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522613" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522614" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522615" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522616" version="1" comment="libQt5Test5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522617" version="1" comment="libQt5Widgets5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522618" version="1" comment="libQt5Xml5 is &lt;5.6.2-6.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531493" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.272-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531494" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.272-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531495" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.272-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531496" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.272-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531497" version="1" comment="libasan6 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531498" version="1" comment="libasan6-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531499" version="1" comment="libatomic1 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531500" version="1" comment="libatomic1-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531501" version="1" comment="libgcc_s1 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531502" version="1" comment="libgcc_s1-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531503" version="1" comment="libgfortran5 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531504" version="1" comment="libgfortran5-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531505" version="1" comment="libgo16 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531506" version="1" comment="libgo16-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531507" version="1" comment="libgomp1 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531508" version="1" comment="libgomp1-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531509" version="1" comment="libitm1 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531510" version="1" comment="libitm1-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531511" version="1" comment="liblsan0 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531512" version="1" comment="libobjc4 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531513" version="1" comment="libobjc4-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531514" version="1" comment="libquadmath0 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531515" version="1" comment="libquadmath0-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531516" version="1" comment="libstdc++6 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531517" version="1" comment="libstdc++6-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531518" version="1" comment="libstdc++6-locale is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531519" version="1" comment="libstdc++6-pp-gcc10 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531520" version="1" comment="libstdc++6-pp-gcc10-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531521" version="1" comment="libtsan0 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531522" version="1" comment="libubsan1 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531523" version="1" comment="libubsan1-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531524" version="1" comment="ucode-intel is &lt;20201027-13.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597326" version="1" comment="ansible is &lt;2.9.14-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597327" version="1" comment="ardana-ansible is &lt;8.0+git.1596735237.54109b1-3.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597328" version="1" comment="ardana-cinder is &lt;8.0+git.1596129856.263f430-3.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597329" version="1" comment="ardana-glance is &lt;8.0+git.1593631779.76fa9b7-3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597330" version="1" comment="ardana-mq is &lt;8.0+git.1593618123.678c32b-3.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597331" version="1" comment="ardana-nova is &lt;8.0+git.1601298847.dd01585-3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597332" version="1" comment="ardana-osconfig is &lt;8.0+git.1595885113.93abcbc-3.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597333" version="1" comment="documentation-suse-openstack-cloud-installation is &lt;8.20201007-1.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597334" version="1" comment="documentation-suse-openstack-cloud-operations is &lt;8.20201007-1.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597335" version="1" comment="documentation-suse-openstack-cloud-opsconsole is &lt;8.20201007-1.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597336" version="1" comment="documentation-suse-openstack-cloud-planning is &lt;8.20201007-1.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597337" version="1" comment="documentation-suse-openstack-cloud-security is &lt;8.20201007-1.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597338" version="1" comment="documentation-suse-openstack-cloud-supplement is &lt;8.20201007-1.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597339" version="1" comment="documentation-suse-openstack-cloud-upstream-admin is &lt;8.20201007-1.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597340" version="1" comment="documentation-suse-openstack-cloud-upstream-user is &lt;8.20201007-1.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597341" version="1" comment="documentation-suse-openstack-cloud-user is &lt;8.20201007-1.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597342" version="1" comment="grafana is &lt;6.7.4-4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597343" version="1" comment="grafana-natel-discrete-panel is &lt;0.0.9-3.3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597344" version="1" comment="openstack-cinder is &lt;11.2.3~dev29-3.28.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597345" version="1" comment="openstack-cinder-api is &lt;11.2.3~dev29-3.28.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597346" version="1" comment="openstack-cinder-backup is &lt;11.2.3~dev29-3.28.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597347" version="1" comment="openstack-cinder-doc is &lt;11.2.3~dev29-3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597348" version="1" comment="openstack-cinder-scheduler is &lt;11.2.3~dev29-3.28.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597349" version="1" comment="openstack-cinder-volume is &lt;11.2.3~dev29-3.28.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597350" version="1" comment="openstack-monasca-installer is &lt;20190923_16.32-3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597351" version="1" comment="openstack-neutron is &lt;11.0.9~dev69-3.37.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597352" version="1" comment="openstack-neutron-dhcp-agent is &lt;11.0.9~dev69-3.37.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597353" version="1" comment="openstack-neutron-doc is &lt;11.0.9~dev69-3.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597354" version="1" comment="openstack-neutron-ha-tool is &lt;11.0.9~dev69-3.37.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597355" version="1" comment="openstack-neutron-l3-agent is &lt;11.0.9~dev69-3.37.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597356" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;11.0.9~dev69-3.37.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597357" version="1" comment="openstack-neutron-macvtap-agent is &lt;11.0.9~dev69-3.37.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597358" version="1" comment="openstack-neutron-metadata-agent is &lt;11.0.9~dev69-3.37.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597359" version="1" comment="openstack-neutron-metering-agent is &lt;11.0.9~dev69-3.37.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597360" version="1" comment="openstack-neutron-openvswitch-agent is &lt;11.0.9~dev69-3.37.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597361" version="1" comment="openstack-neutron-server is &lt;11.0.9~dev69-3.37.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597362" version="1" comment="openstack-nova is &lt;16.1.9~dev76-3.39.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597363" version="1" comment="openstack-nova-api is &lt;16.1.9~dev76-3.39.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597364" version="1" comment="openstack-nova-cells is &lt;16.1.9~dev76-3.39.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597365" version="1" comment="openstack-nova-compute is &lt;16.1.9~dev76-3.39.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597366" version="1" comment="openstack-nova-conductor is &lt;16.1.9~dev76-3.39.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597367" version="1" comment="openstack-nova-console is &lt;16.1.9~dev76-3.39.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597368" version="1" comment="openstack-nova-consoleauth is &lt;16.1.9~dev76-3.39.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597369" version="1" comment="openstack-nova-doc is &lt;16.1.9~dev76-3.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597370" version="1" comment="openstack-nova-novncproxy is &lt;16.1.9~dev76-3.39.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597371" version="1" comment="openstack-nova-placement-api is &lt;16.1.9~dev76-3.39.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597372" version="1" comment="openstack-nova-scheduler is &lt;16.1.9~dev76-3.39.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597373" version="1" comment="openstack-nova-serialproxy is &lt;16.1.9~dev76-3.39.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597374" version="1" comment="openstack-nova-vncproxy is &lt;16.1.9~dev76-3.39.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597375" version="1" comment="python-Django is &lt;1.11.29-3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597376" version="1" comment="python-Flask-Cors is &lt;3.0.3-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597377" version="1" comment="python-Pillow is &lt;4.2.1-3.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597378" version="1" comment="python-ardana-packager is &lt;0.0.3-7.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597379" version="1" comment="python-cinder is &lt;11.2.3~dev29-3.28.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597380" version="1" comment="python-keystoneclient is &lt;3.13.1-3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597381" version="1" comment="python-keystoneclient-doc is &lt;3.13.1-3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597382" version="1" comment="python-keystonemiddleware is &lt;4.17.1-5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597383" version="1" comment="python-kombu is &lt;4.1.0-3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597384" version="1" comment="python-neutron is &lt;11.0.9~dev69-3.37.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597385" version="1" comment="python-nova is &lt;16.1.9~dev76-3.39.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597386" version="1" comment="python-straight-plugin is &lt;1.5.0-1.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597387" version="1" comment="python-urllib3 is &lt;1.22-5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597388" version="1" comment="release-notes-suse-openstack-cloud is &lt;8.20200922-3.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597389" version="1" comment="storm is &lt;1.2.3-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597390" version="1" comment="storm-nimbus is &lt;1.2.3-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597391" version="1" comment="storm-supervisor is &lt;1.2.3-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597392" version="1" comment="venv-openstack-aodh-x86_64 is &lt;5.1.1~dev7-12.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597393" version="1" comment="venv-openstack-barbican-x86_64 is &lt;5.0.2~dev3-12.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597394" version="1" comment="venv-openstack-ceilometer-x86_64 is &lt;9.0.8~dev7-12.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597395" version="1" comment="venv-openstack-cinder-x86_64 is &lt;11.2.3~dev29-14.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597396" version="1" comment="venv-openstack-designate-x86_64 is &lt;5.0.3~dev7-12.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597397" version="1" comment="venv-openstack-freezer-x86_64 is &lt;5.0.0.0~xrc2~dev2-10.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597398" version="1" comment="venv-openstack-glance-x86_64 is &lt;15.0.3~dev3-12.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597399" version="1" comment="venv-openstack-heat-x86_64 is &lt;9.0.8~dev22-12.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597400" version="1" comment="venv-openstack-horizon-x86_64 is &lt;12.0.5~dev3-14.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597401" version="1" comment="venv-openstack-ironic-x86_64 is &lt;9.1.8~dev8-12.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597402" version="1" comment="venv-openstack-keystone-x86_64 is &lt;12.0.4~dev11-11.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597403" version="1" comment="venv-openstack-magnum-x86_64 is &lt;5.0.2_5.0.2_5.0.2~dev31-11.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597404" version="1" comment="venv-openstack-manila-x86_64 is &lt;5.1.1~dev5-12.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597405" version="1" comment="venv-openstack-monasca-ceilometer-x86_64 is &lt;1.5.1_1.5.1_1.5.1~dev3-8.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597406" version="1" comment="venv-openstack-monasca-x86_64 is &lt;2.2.2~dev1-11.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597407" version="1" comment="venv-openstack-murano-x86_64 is &lt;4.0.2~dev2-12.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597408" version="1" comment="venv-openstack-neutron-x86_64 is &lt;11.0.9~dev69-13.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597409" version="1" comment="venv-openstack-nova-x86_64 is &lt;16.1.9~dev76-11.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597410" version="1" comment="venv-openstack-octavia-x86_64 is &lt;1.0.6~dev3-12.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597411" version="1" comment="venv-openstack-sahara-x86_64 is &lt;7.0.5~dev4-11.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597412" version="1" comment="venv-openstack-swift-x86_64 is &lt;2.15.2_2.15.2_2.15.2~dev32-11.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597413" version="1" comment="venv-openstack-trove-x86_64 is &lt;8.0.2~dev2-11.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522619" version="1" comment="libsystemd0 is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522620" version="1" comment="libsystemd0-32bit is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531525" version="1" comment="libudev-devel is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522621" version="1" comment="libudev1 is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522622" version="1" comment="libudev1-32bit is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522623" version="1" comment="systemd is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522624" version="1" comment="systemd-32bit is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522625" version="1" comment="systemd-bash-completion is &lt;228-150.82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522626" version="1" comment="systemd-sysvinit is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522627" version="1" comment="udev is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531526" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.281-43.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531527" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.281-43.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531528" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.281-43.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531529" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.281-43.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531530" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531531" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531532" version="1" comment="openldap2 is &lt;2.4.41-18.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531533" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531534" version="1" comment="openldap2-client is &lt;2.4.41-18.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531535" version="1" comment="openldap2-doc is &lt;2.4.41-18.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531536" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531537" version="1" comment="MozillaFirefox is &lt;78.4.1-112.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531538" version="1" comment="MozillaFirefox-devel is &lt;78.4.1-112.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531539" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.1-112.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531546" version="1" comment="libecpg6 is &lt;12.4-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531547" version="1" comment="libpq5 is &lt;12.4-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531548" version="1" comment="libpq5-32bit is &lt;12.4-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531549" version="1" comment="postgresql is &lt;12.0.1-4.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531550" version="1" comment="postgresql-contrib is &lt;12.0.1-4.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531551" version="1" comment="postgresql-docs is &lt;12.0.1-4.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531552" version="1" comment="postgresql-plperl is &lt;12.0.1-4.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531553" version="1" comment="postgresql-plpython is &lt;12.0.1-4.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531554" version="1" comment="postgresql-pltcl is &lt;12.0.1-4.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531555" version="1" comment="postgresql-server is &lt;12.0.1-4.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531556" version="1" comment="postgresql10 is &lt;10.14-4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531557" version="1" comment="postgresql10-contrib is &lt;10.14-4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531558" version="1" comment="postgresql10-docs is &lt;10.14-4.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531559" version="1" comment="postgresql10-plperl is &lt;10.14-4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531560" version="1" comment="postgresql10-plpython is &lt;10.14-4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531561" version="1" comment="postgresql10-pltcl is &lt;10.14-4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531562" version="1" comment="postgresql10-server is &lt;10.14-4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531570" version="1" comment="postgresql96 is &lt;9.6.19-6.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531571" version="1" comment="postgresql96-contrib is &lt;9.6.19-6.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531572" version="1" comment="postgresql96-docs is &lt;9.6.19-6.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531573" version="1" comment="postgresql96-plperl is &lt;9.6.19-6.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531574" version="1" comment="postgresql96-plpython is &lt;9.6.19-6.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531575" version="1" comment="postgresql96-pltcl is &lt;9.6.19-6.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531576" version="1" comment="postgresql96-server is &lt;9.6.19-6.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531577" version="1" comment="libraptor2-0 is &lt;2.0.15-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531578" version="1" comment="kernel-firmware is &lt;20170530-21.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531579" version="1" comment="ucode-amd is &lt;20170530-21.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531584" version="1" comment="krb5 is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531585" version="1" comment="krb5-32bit is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531586" version="1" comment="krb5-client is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531587" version="1" comment="krb5-doc is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531588" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531589" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531590" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531591" version="1" comment="krb5-server is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531592" version="1" comment="postgresql10 is &lt;10.15-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531593" version="1" comment="postgresql10-contrib is &lt;10.15-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531594" version="1" comment="postgresql10-docs is &lt;10.15-4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531595" version="1" comment="postgresql10-plperl is &lt;10.15-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531596" version="1" comment="postgresql10-plpython is &lt;10.15-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531597" version="1" comment="postgresql10-pltcl is &lt;10.15-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531598" version="1" comment="postgresql10-server is &lt;10.15-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531599" version="1" comment="postgresql96 is &lt;9.6.20-6.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531600" version="1" comment="postgresql96-contrib is &lt;9.6.20-6.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531601" version="1" comment="postgresql96-docs is &lt;9.6.20-6.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531602" version="1" comment="postgresql96-plperl is &lt;9.6.20-6.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531603" version="1" comment="postgresql96-plpython is &lt;9.6.20-6.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531604" version="1" comment="postgresql96-pltcl is &lt;9.6.20-6.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531605" version="1" comment="postgresql96-server is &lt;9.6.20-6.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555870" version="1" comment="kernel-default is &lt;4.4.180-94.135.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555871" version="1" comment="kernel-default-base is &lt;4.4.180-94.135.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555872" version="1" comment="kernel-default-devel is &lt;4.4.180-94.135.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556703" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.135.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538784" version="1" comment="kernel-devel is &lt;4.4.180-94.135.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538785" version="1" comment="kernel-macros is &lt;4.4.180-94.135.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538786" version="1" comment="kernel-source is &lt;4.4.180-94.135.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555873" version="1" comment="kernel-syms is &lt;4.4.180-94.135.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556705" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;1-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531614" version="1" comment="ucode-intel is &lt;20201118-13.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531615" version="1" comment="bluez is &lt;5.13-5.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531616" version="1" comment="libbluetooth3 is &lt;5.13-5.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531617" version="1" comment="MozillaFirefox is &lt;78.5.0-112.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531618" version="1" comment="MozillaFirefox-devel is &lt;78.5.0-112.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531619" version="1" comment="MozillaFirefox-translations-common is &lt;78.5.0-112.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531620" version="1" comment="libvncclient0 is &lt;0.9.9-17.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531621" version="1" comment="libvncserver0 is &lt;0.9.9-17.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531622" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531623" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009524556" version="1" comment="python-setuptools is &lt;40.6.2-4.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525277" version="1" comment="python3-setuptools is &lt;40.6.2-4.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531624" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531625" version="1" comment="python3 is &lt;3.4.10-25.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531626" version="1" comment="python3-base is &lt;3.4.10-25.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531627" version="1" comment="python3-curses is &lt;3.4.10-25.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531628" version="1" comment="python3-devel is &lt;3.4.10-25.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531629" version="1" comment="gdm is &lt;3.10.0.1-54.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531630" version="1" comment="gdm-lang is &lt;3.10.0.1-54.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531631" version="1" comment="gdmflexiserver is &lt;3.10.0.1-54.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531632" version="1" comment="libgdm1 is &lt;3.10.0.1-54.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531633" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-54.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531634" version="1" comment="python-cryptography is &lt;2.1.4-7.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531635" version="1" comment="python3-cryptography is &lt;2.1.4-7.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531636" version="1" comment="libecpg6 is &lt;12.5-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531637" version="1" comment="libpq5 is &lt;12.5-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531638" version="1" comment="libpq5-32bit is &lt;12.5-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538789" version="1" comment="xen is &lt;4.9.4_14-3.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538790" version="1" comment="xen-doc-html is &lt;4.9.4_14-3.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538791" version="1" comment="xen-libs is &lt;4.9.4_14-3.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538792" version="1" comment="xen-libs-32bit is &lt;4.9.4_14-3.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538793" version="1" comment="xen-tools is &lt;4.9.4_14-3.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538794" version="1" comment="xen-tools-domU is &lt;4.9.4_14-3.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531639" version="1" comment="mutt is &lt;1.10.1-55.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522634" version="1" comment="dbus-1 is &lt;1.8.22-29.17.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522635" version="1" comment="dbus-1-x11 is &lt;1.8.22-29.17.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522636" version="1" comment="libdbus-1-3 is &lt;1.8.22-29.17.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522637" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-29.17.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531646" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531647" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531648" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531649" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531650" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531651" version="1" comment="openssl is &lt;1.0.2j-60.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531652" version="1" comment="openssl-doc is &lt;1.0.2j-60.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531653" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531654" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531655" version="1" comment="python is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531656" version="1" comment="python-32bit is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531657" version="1" comment="python-base is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531658" version="1" comment="python-base-32bit is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531659" version="1" comment="python-curses is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531660" version="1" comment="python-demo is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531661" version="1" comment="python-devel is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531662" version="1" comment="python-doc is &lt;2.7.17-28.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531663" version="1" comment="python-doc-pdf is &lt;2.7.17-28.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531664" version="1" comment="python-gdbm is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531665" version="1" comment="python-idle is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531666" version="1" comment="python-tk is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531667" version="1" comment="python-xml is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522638" version="1" comment="MozillaFirefox is &lt;68.5.0-109.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522639" version="1" comment="MozillaFirefox-translations-common is &lt;68.5.0-109.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531677" version="1" comment="MozillaFirefox is &lt;78.6.0-112.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531678" version="1" comment="MozillaFirefox-devel is &lt;78.6.0-112.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531679" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.0-112.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531686" version="1" comment="clamav is &lt;0.103.0-33.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531687" version="1" comment="cyrus-sasl is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531688" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531689" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531690" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531691" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531692" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531693" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531694" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531695" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531696" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531697" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531698" version="1" comment="libsasl2-3 is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531699" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531700" version="1" comment="libasan5 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531701" version="1" comment="libasan5-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531702" version="1" comment="libatomic1 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531703" version="1" comment="libatomic1-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531704" version="1" comment="libgcc_s1 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531705" version="1" comment="libgcc_s1-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531706" version="1" comment="libgfortran5 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531707" version="1" comment="libgfortran5-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531708" version="1" comment="libgo14 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531709" version="1" comment="libgo14-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531710" version="1" comment="libgomp1 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531711" version="1" comment="libgomp1-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531712" version="1" comment="libitm1 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531713" version="1" comment="libitm1-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531714" version="1" comment="liblsan0 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531715" version="1" comment="libquadmath0 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531716" version="1" comment="libquadmath0-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531717" version="1" comment="libstdc++6 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531718" version="1" comment="libstdc++6-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531719" version="1" comment="libstdc++6-locale is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531720" version="1" comment="libtsan0 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531721" version="1" comment="libubsan1 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531722" version="1" comment="libubsan1-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538805" version="1" comment="xen is &lt;4.9.4_16-3.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538806" version="1" comment="xen-doc-html is &lt;4.9.4_16-3.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538807" version="1" comment="xen-libs is &lt;4.9.4_16-3.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538808" version="1" comment="xen-libs-32bit is &lt;4.9.4_16-3.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538809" version="1" comment="xen-tools is &lt;4.9.4_16-3.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538810" version="1" comment="xen-tools-domU is &lt;4.9.4_16-3.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522640" version="1" comment="sudo is &lt;1.8.20p2-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597414" version="1" comment="dnsmasq-utils is &lt;2.78-18.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531724" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.60-38.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531725" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.60-38.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531726" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.60-38.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531727" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.60-38.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531728" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.60-38.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522649" version="1" comment="libexif12 is &lt;0.6.21-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522650" version="1" comment="libexif12-32bit is &lt;0.6.21-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531729" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531730" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531731" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531732" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531733" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531734" version="1" comment="openssl is &lt;1.0.2j-60.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531735" version="1" comment="openssl-doc is &lt;1.0.2j-60.60.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522651" version="1" comment="ppp is &lt;2.4.7-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522652" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522653" version="1" comment="python3 is &lt;3.4.10-25.39.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522654" version="1" comment="python3-base is &lt;3.4.10-25.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522655" version="1" comment="python3-curses is &lt;3.4.10-25.39.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531736" version="1" comment="python3-devel is &lt;3.4.10-25.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531737" version="1" comment="libmysqlclient18 is &lt;10.0.40.2-29.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531738" version="1" comment="libmysqlclient18-32bit is &lt;10.0.40.2-29.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531739" version="1" comment="mariadb is &lt;10.0.40.2-29.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531740" version="1" comment="mariadb-client is &lt;10.0.40.2-29.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531741" version="1" comment="mariadb-errormessages is &lt;10.0.40.2-29.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531742" version="1" comment="mariadb-tools is &lt;10.0.40.2-29.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531743" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.55-38.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531744" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.55-38.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531746" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.55-38.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531747" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.55-38.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557638" version="1" comment="libmysqlclient18 is &lt;10.0.40.3-29.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531748" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.5-30.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531749" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.5-30.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531750" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.5-30.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531751" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.5-30.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531752" version="1" comment="log4j is &lt;1.2.15-126.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531753" version="1" comment="permissions is &lt;2015.09.28.1626-17.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009524562" version="1" comment="python-PyYAML is &lt;5.1.2-26.9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522744" version="1" comment="python-asn1crypto is &lt;0.24.0-2.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525283" version="1" comment="python-botocore is &lt;1.12.213-28.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525286" version="1" comment="python-jsonpatch is &lt;1.1-10.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525287" version="1" comment="python-jsonpointer is &lt;1.0-10.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522745" version="1" comment="python-packaging is &lt;17.1-2.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530078" version="1" comment="python3-PyYAML is &lt;5.1.2-26.9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522747" version="1" comment="python3-asn1crypto is &lt;0.24.0-2.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525297" version="1" comment="python3-jsonpointer is &lt;1.0-10.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522748" version="1" comment="python3-packaging is &lt;17.1-2.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522656" version="1" comment="libpng16-16 is &lt;1.6.8-15.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522657" version="1" comment="libpng16-16-32bit is &lt;1.6.8-15.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531754" version="1" comment="postgresql96 is &lt;9.6.17-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531755" version="1" comment="postgresql96-contrib is &lt;9.6.17-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531756" version="1" comment="postgresql96-docs is &lt;9.6.17-3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531757" version="1" comment="postgresql96-plperl is &lt;9.6.17-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531758" version="1" comment="postgresql96-plpython is &lt;9.6.17-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531759" version="1" comment="postgresql96-pltcl is &lt;9.6.17-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531760" version="1" comment="postgresql96-server is &lt;9.6.17-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522665" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.251-43.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531761" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.251-43.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531762" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.251-43.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522666" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.251-43.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522667" version="1" comment="ipmitool is &lt;1.8.18-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597415" version="1" comment="ardana-cinder is &lt;8.0+git.1579279939.ee7da88-3.39.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597416" version="1" comment="ardana-cobbler is &lt;8.0+git.1575037115.0326803-3.41.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597417" version="1" comment="ardana-designate is &lt;8.0+git.1573597788.15b7984-3.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597418" version="1" comment="ardana-extensions-example is &lt;8.0+git.1534266307.db1ec28-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597419" version="1" comment="ardana-extensions-nsx is &lt;8.0+git.1567529036.a41a037-3.6.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597420" version="1" comment="ardana-glance is &lt;8.0+git.1571846045.ab9e3ea-3.20.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597421" version="1" comment="ardana-heat is &lt;8.0+git.1571777596.14dce6a-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597422" version="1" comment="ardana-input-model is &lt;8.0+git.1582147997.b9ed134-3.36.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597423" version="1" comment="ardana-ironic is &lt;8.0+git.1571845225.006843d-3.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597424" version="1" comment="ardana-keystone is &lt;8.0+git.1573147067.09e3ea0-3.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597425" version="1" comment="ardana-logging is &lt;8.0+git.1572452293.e65d714-3.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597426" version="1" comment="ardana-monasca is &lt;8.0+git.1572527728.9b34bdf-3.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597427" version="1" comment="ardana-monasca-transform is &lt;8.0+git.1571845965.97714fb-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597428" version="1" comment="ardana-mq is &lt;8.0+git.1581024906.fbf0be3-3.16.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597429" version="1" comment="ardana-neutron is &lt;8.0+git.1573050365.ff6fa06-3.36.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597430" version="1" comment="ardana-nova is &lt;8.0+git.1571846125.584d988-3.38.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597431" version="1" comment="ardana-octavia is &lt;8.0+git.1575642049.1f321d0-3.23.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597432" version="1" comment="ardana-osconfig is &lt;8.0+git.1581015942.2d21e63-3.42.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597433" version="1" comment="ardana-tempest is &lt;8.0+git.1579261264.7dd213a-3.30.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597434" version="1" comment="keepalived is &lt;2.0.19-3.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597435" version="1" comment="mariadb is &lt;10.2.31-4.17.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597436" version="1" comment="mariadb-client is &lt;10.2.31-4.17.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597437" version="1" comment="mariadb-errormessages is &lt;10.2.31-4.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597438" version="1" comment="mariadb-galera is &lt;10.2.31-4.17.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597439" version="1" comment="mariadb-tools is &lt;10.2.31-4.17.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597440" version="1" comment="openstack-cinder is &lt;11.2.3~dev23-3.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597441" version="1" comment="openstack-cinder-api is &lt;11.2.3~dev23-3.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597442" version="1" comment="openstack-cinder-backup is &lt;11.2.3~dev23-3.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597443" version="1" comment="openstack-cinder-doc is &lt;11.2.3~dev23-3.24.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597444" version="1" comment="openstack-cinder-scheduler is &lt;11.2.3~dev23-3.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597445" version="1" comment="openstack-cinder-volume is &lt;11.2.3~dev23-3.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597446" version="1" comment="openstack-dashboard is &lt;12.0.5~dev2-3.23.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597447" version="1" comment="openstack-dashboard-theme-SUSE is &lt;2017.2+git.1573629528.6b21fa5-7.14.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597448" version="1" comment="openstack-heat is &lt;9.0.8~dev22-3.27.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597449" version="1" comment="openstack-heat-api is &lt;9.0.8~dev22-3.27.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597450" version="1" comment="openstack-heat-api-cfn is &lt;9.0.8~dev22-3.27.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597451" version="1" comment="openstack-heat-api-cloudwatch is &lt;9.0.8~dev22-3.27.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597452" version="1" comment="openstack-heat-doc is &lt;9.0.8~dev22-3.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597453" version="1" comment="openstack-heat-engine is &lt;9.0.8~dev22-3.27.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597454" version="1" comment="openstack-heat-plugin-heat_docker is &lt;9.0.8~dev22-3.27.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597455" version="1" comment="openstack-heat-templates is &lt;0.0.0+git.1560033670.e3b5a52-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597456" version="1" comment="openstack-heat-test is &lt;9.0.8~dev22-3.27.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597457" version="1" comment="openstack-horizon-plugin-designate-ui is &lt;5.0.3~dev2-3.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597458" version="1" comment="openstack-horizon-plugin-neutron-lbaas-ui is &lt;3.0.3~dev5-3.14.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597459" version="1" comment="openstack-ironic is &lt;9.1.8~dev8-3.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597460" version="1" comment="openstack-ironic-api is &lt;9.1.8~dev8-3.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597461" version="1" comment="openstack-ironic-conductor is &lt;9.1.8~dev8-3.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597462" version="1" comment="openstack-ironic-doc is &lt;9.1.8~dev8-3.24.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597463" version="1" comment="openstack-keystone is &lt;12.0.4~dev5-5.30.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597464" version="1" comment="openstack-keystone-doc is &lt;12.0.4~dev5-5.30.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597465" version="1" comment="openstack-monasca-agent is &lt;2.2.5~dev5-3.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597466" version="1" comment="openstack-neutron is &lt;11.0.9~dev60-3.27.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597467" version="1" comment="openstack-neutron-dhcp-agent is &lt;11.0.9~dev60-3.27.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597468" version="1" comment="openstack-neutron-doc is &lt;11.0.9~dev60-3.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597469" version="1" comment="openstack-neutron-gbp is &lt;7.3.1~dev72-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597470" version="1" comment="openstack-neutron-ha-tool is &lt;11.0.9~dev60-3.27.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597471" version="1" comment="openstack-neutron-l3-agent is &lt;11.0.9~dev60-3.27.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597472" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;11.0.9~dev60-3.27.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597473" version="1" comment="openstack-neutron-macvtap-agent is &lt;11.0.9~dev60-3.27.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597474" version="1" comment="openstack-neutron-metadata-agent is &lt;11.0.9~dev60-3.27.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597475" version="1" comment="openstack-neutron-metering-agent is &lt;11.0.9~dev60-3.27.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597476" version="1" comment="openstack-neutron-openvswitch-agent is &lt;11.0.9~dev60-3.27.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597477" version="1" comment="openstack-neutron-server is &lt;11.0.9~dev60-3.27.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597478" version="1" comment="openstack-neutron-vsphere is &lt;2.0.1~dev133-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597479" version="1" comment="openstack-neutron-vsphere-doc is &lt;2.0.1~dev133-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597480" version="1" comment="openstack-neutron-vsphere-dvs-agent is &lt;2.0.1~dev133-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597481" version="1" comment="openstack-neutron-vsphere-ovsvapp-agent is &lt;2.0.1~dev133-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597482" version="1" comment="openstack-nova is &lt;16.1.9~dev49-3.32.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597483" version="1" comment="openstack-nova-api is &lt;16.1.9~dev49-3.32.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597484" version="1" comment="openstack-nova-cells is &lt;16.1.9~dev49-3.32.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597485" version="1" comment="openstack-nova-compute is &lt;16.1.9~dev49-3.32.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597486" version="1" comment="openstack-nova-conductor is &lt;16.1.9~dev49-3.32.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597487" version="1" comment="openstack-nova-console is &lt;16.1.9~dev49-3.32.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597488" version="1" comment="openstack-nova-consoleauth is &lt;16.1.9~dev49-3.32.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597489" version="1" comment="openstack-nova-doc is &lt;16.1.9~dev49-3.32.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597490" version="1" comment="openstack-nova-novncproxy is &lt;16.1.9~dev49-3.32.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597491" version="1" comment="openstack-nova-placement-api is &lt;16.1.9~dev49-3.32.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597492" version="1" comment="openstack-nova-scheduler is &lt;16.1.9~dev49-3.32.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597493" version="1" comment="openstack-nova-serialproxy is &lt;16.1.9~dev49-3.32.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597494" version="1" comment="openstack-nova-vncproxy is &lt;16.1.9~dev49-3.32.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597495" version="1" comment="openstack-octavia is &lt;1.0.6~dev3-4.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597496" version="1" comment="openstack-octavia-amphora-agent is &lt;1.0.6~dev3-4.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597497" version="1" comment="openstack-octavia-amphora-image-x86_64 is &lt;0.1.2-3.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597498" version="1" comment="openstack-octavia-api is &lt;1.0.6~dev3-4.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597499" version="1" comment="openstack-octavia-health-manager is &lt;1.0.6~dev3-4.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597500" version="1" comment="openstack-octavia-housekeeping is &lt;1.0.6~dev3-4.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597501" version="1" comment="openstack-octavia-worker is &lt;1.0.6~dev3-4.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597502" version="1" comment="openstack-resource-agents is &lt;1.0+git.1569436425.8b9c49f-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597503" version="1" comment="openstack-sahara is &lt;7.0.5~dev4-3.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597504" version="1" comment="openstack-sahara-api is &lt;7.0.5~dev4-3.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597505" version="1" comment="openstack-sahara-doc is &lt;7.0.5~dev4-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597506" version="1" comment="openstack-sahara-engine is &lt;7.0.5~dev4-3.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597507" version="1" comment="openstack-trove is &lt;8.0.2~dev2-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597508" version="1" comment="openstack-trove-api is &lt;8.0.2~dev2-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597509" version="1" comment="openstack-trove-conductor is &lt;8.0.2~dev2-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597510" version="1" comment="openstack-trove-doc is &lt;8.0.2~dev2-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597511" version="1" comment="openstack-trove-guestagent is &lt;8.0.2~dev2-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597512" version="1" comment="openstack-trove-taskmanager is &lt;8.0.2~dev2-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597513" version="1" comment="python-cinder is &lt;11.2.3~dev23-3.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597514" version="1" comment="python-cinderlm is &lt;0.0.2+git.1571845893.27f0b7b-3.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597515" version="1" comment="python-congressclient is &lt;1.8.1-3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597516" version="1" comment="python-designateclient is &lt;2.7.1-3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597517" version="1" comment="python-designateclient-doc is &lt;2.7.1-3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597518" version="1" comment="python-freezegun is &lt;0.3.9-1.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597519" version="1" comment="python-heat is &lt;9.0.8~dev22-3.27.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597520" version="1" comment="python-horizon is &lt;12.0.5~dev2-3.23.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597521" version="1" comment="python-horizon-plugin-designate-ui is &lt;5.0.3~dev2-3.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597522" version="1" comment="python-horizon-plugin-neutron-lbaas-ui is &lt;3.0.3~dev5-3.14.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597523" version="1" comment="python-ironic is &lt;9.1.8~dev8-3.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597524" version="1" comment="python-ironic-lib is &lt;2.10.2-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597525" version="1" comment="python-keystone is &lt;12.0.4~dev5-5.30.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597526" version="1" comment="python-monasca-agent is &lt;2.2.5~dev5-3.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597527" version="1" comment="python-networking-cisco is &lt;6.1.1~dev65-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597528" version="1" comment="python-networking-vsphere is &lt;2.0.1~dev133-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597529" version="1" comment="python-neutron is &lt;11.0.9~dev60-3.27.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597530" version="1" comment="python-neutron-gbp is &lt;7.3.1~dev72-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597531" version="1" comment="python-nova is &lt;16.1.9~dev49-3.32.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597532" version="1" comment="python-octavia is &lt;1.0.6~dev3-4.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597533" version="1" comment="python-osc-lib is &lt;1.7.1-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597534" version="1" comment="python-oslo.context is &lt;2.17.2-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597535" version="1" comment="python-oslo.rootwrap is &lt;5.9.3-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597536" version="1" comment="python-oslo.serialization is &lt;2.20.3-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597537" version="1" comment="python-oslo.service is &lt;1.25.2-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597538" version="1" comment="python-sahara is &lt;7.0.5~dev4-3.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597539" version="1" comment="python-stevedore is &lt;1.25.2-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597540" version="1" comment="python-taskflow is &lt;2.14.2-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597541" version="1" comment="python-trove is &lt;8.0.2~dev2-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597542" version="1" comment="venv-openstack-aodh-x86_64 is &lt;5.1.1~dev7-12.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597543" version="1" comment="venv-openstack-barbican-x86_64 is &lt;5.0.2~dev3-12.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597544" version="1" comment="venv-openstack-ceilometer-x86_64 is &lt;9.0.8~dev7-12.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597545" version="1" comment="venv-openstack-cinder-x86_64 is &lt;11.2.3~dev23-14.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597546" version="1" comment="venv-openstack-designate-x86_64 is &lt;5.0.3~dev7-12.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597547" version="1" comment="venv-openstack-freezer-x86_64 is &lt;5.0.0.0~xrc2~dev2-10.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597548" version="1" comment="venv-openstack-glance-x86_64 is &lt;15.0.3~dev3-12.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597549" version="1" comment="venv-openstack-heat-x86_64 is &lt;9.0.8~dev22-12.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597550" version="1" comment="venv-openstack-horizon-x86_64 is &lt;12.0.5~dev2-14.28.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597551" version="1" comment="venv-openstack-ironic-x86_64 is &lt;9.1.8~dev8-12.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597552" version="1" comment="venv-openstack-keystone-x86_64 is &lt;12.0.4~dev5-11.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597553" version="1" comment="venv-openstack-magnum-x86_64 is &lt;5.0.2_5.0.2_5.0.2~dev31-11.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597554" version="1" comment="venv-openstack-manila-x86_64 is &lt;5.1.1~dev2-12.25.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597555" version="1" comment="venv-openstack-monasca-ceilometer-x86_64 is &lt;1.5.1_1.5.1_1.5.1~dev3-8.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597556" version="1" comment="venv-openstack-monasca-x86_64 is &lt;2.2.2~dev1-11.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597557" version="1" comment="venv-openstack-murano-x86_64 is &lt;4.0.2~dev2-12.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597558" version="1" comment="venv-openstack-neutron-x86_64 is &lt;11.0.9~dev60-13.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597559" version="1" comment="venv-openstack-nova-x86_64 is &lt;16.1.9~dev49-11.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597560" version="1" comment="venv-openstack-octavia-x86_64 is &lt;1.0.6~dev3-12.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597561" version="1" comment="venv-openstack-sahara-x86_64 is &lt;7.0.5~dev4-11.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597562" version="1" comment="venv-openstack-swift-x86_64 is &lt;2.15.2_2.15.2_2.15.2~dev32-11.16.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597563" version="1" comment="venv-openstack-trove-x86_64 is &lt;8.0.2~dev2-11.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597564" version="1" comment="openstack-manila is &lt;5.1.1~dev2-3.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597565" version="1" comment="openstack-manila-api is &lt;5.1.1~dev2-3.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597566" version="1" comment="openstack-manila-data is &lt;5.1.1~dev2-3.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597567" version="1" comment="openstack-manila-doc is &lt;5.1.1~dev2-3.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597568" version="1" comment="openstack-manila-scheduler is &lt;5.1.1~dev2-3.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597569" version="1" comment="openstack-manila-share is &lt;5.1.1~dev2-3.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597570" version="1" comment="python-manila is &lt;5.1.1~dev2-3.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597571" version="1" comment="venv-openstack-manila-x86_64 is &lt;5.1.1~dev2-12.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531763" version="1" comment="squid is &lt;3.5.21-26.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522668" version="1" comment="MozillaFirefox is &lt;68.4.1-109.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522669" version="1" comment="MozillaFirefox-translations-common is &lt;68.4.1-109.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522670" version="1" comment="libecpg6 is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522671" version="1" comment="libpq5 is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522672" version="1" comment="libpq5-32bit is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522673" version="1" comment="postgresql10 is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531765" version="1" comment="postgresql10-contrib is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531766" version="1" comment="postgresql10-docs is &lt;10.12-1.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531767" version="1" comment="postgresql10-plperl is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531768" version="1" comment="postgresql10-plpython is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531769" version="1" comment="postgresql10-pltcl is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531770" version="1" comment="postgresql10-server is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531771" version="1" comment="MozillaFirefox is &lt;68.6.0-109.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531773" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.0-109.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531774" version="1" comment="tomcat is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531775" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531776" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531777" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531778" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531779" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531780" version="1" comment="tomcat-lib is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531781" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531782" version="1" comment="tomcat-webapps is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562705" version="1" comment="python-botocore is &lt;1.13.33-28.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562703" version="1" comment="python-futures is &lt;3.0.2-15.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522674" version="1" comment="libzypp is &lt;16.21.2-2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555874" version="1" comment="libzypp-devel is &lt;16.21.2-2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531783" version="1" comment="python-cffi is &lt;1.11.2-5.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531784" version="1" comment="python-cryptography is &lt;2.1.4-7.28.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531785" version="1" comment="python-xattr is &lt;0.7.5-6.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531786" version="1" comment="python3-cffi is &lt;1.11.2-5.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531787" version="1" comment="python3-cryptography is &lt;2.1.4-7.28.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531788" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.2-44.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531789" version="1" comment="spamassassin is &lt;3.4.2-44.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531790" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531791" version="1" comment="python3 is &lt;3.4.10-25.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531792" version="1" comment="python3-base is &lt;3.4.10-25.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531793" version="1" comment="python3-curses is &lt;3.4.10-25.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531794" version="1" comment="python3-devel is &lt;3.4.10-25.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522675" version="1" comment="libfreebl3 is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522676" version="1" comment="libfreebl3-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531795" version="1" comment="libfreebl3-hmac is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531796" version="1" comment="libfreebl3-hmac-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522677" version="1" comment="libsoftokn3 is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522678" version="1" comment="libsoftokn3-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531797" version="1" comment="libsoftokn3-hmac is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531798" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522679" version="1" comment="mozilla-nspr is &lt;4.23-19.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522680" version="1" comment="mozilla-nspr-32bit is &lt;4.23-19.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536452" version="1" comment="mozilla-nspr-devel is &lt;4.23-19.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522681" version="1" comment="mozilla-nss is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522682" version="1" comment="mozilla-nss-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522683" version="1" comment="mozilla-nss-certs is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522684" version="1" comment="mozilla-nss-certs-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536453" version="1" comment="mozilla-nss-devel is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522685" version="1" comment="mozilla-nss-sysinit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522686" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522687" version="1" comment="mozilla-nss-tools is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531799" version="1" comment="libxslt-tools is &lt;1.1.28-17.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531800" version="1" comment="libxslt1 is &lt;1.1.28-17.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531801" version="1" comment="libxslt1-32bit is &lt;1.1.28-17.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531802" version="1" comment="MozillaFirefox is &lt;68.6.1-109.113.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531804" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.1-109.113.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531805" version="1" comment="MozillaFirefox is &lt;68.7.0-109.116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531807" version="1" comment="MozillaFirefox-translations-common is &lt;68.7.0-109.116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597572" version="1" comment="git is &lt;2.26.0-27.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531808" version="1" comment="git-core is &lt;2.26.0-27.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531810" version="1" comment="libpcre2-16-0 is &lt;10.34-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531811" version="1" comment="libpcre2-32-0 is &lt;10.34-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531812" version="1" comment="libpcre2-8-0 is &lt;10.34-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531813" version="1" comment="libpcre2-posix2 is &lt;10.34-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531814" version="1" comment="perl-CGI is &lt;4.38-1.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538834" version="1" comment="fwupdate is &lt;0.5-10.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538835" version="1" comment="fwupdate-efi is &lt;0.5-10.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538836" version="1" comment="libfwup0 is &lt;0.5-10.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552206" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.5-44.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552207" version="1" comment="spamassassin is &lt;3.4.5-44.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552208" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552209" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552210" version="1" comment="clamav is &lt;0.103.2-33.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555875" version="1" comment="qemu is &lt;2.9.1-6.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555876" version="1" comment="qemu-block-curl is &lt;2.9.1-6.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555877" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538845" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555878" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555879" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538848" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538849" version="1" comment="qemu-kvm is &lt;2.9.1-6.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555880" version="1" comment="qemu-lang is &lt;2.9.1-6.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538852" version="1" comment="qemu-seabios is &lt;1.10.2_0_g5f4c7b1-6.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538853" version="1" comment="qemu-sgabios is &lt;8-6.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555881" version="1" comment="qemu-tools is &lt;2.9.1-6.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538855" version="1" comment="qemu-vgabios is &lt;1.10.2_0_g5f4c7b1-6.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538856" version="1" comment="qemu-x86 is &lt;2.9.1-6.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538857" version="1" comment="xen is &lt;4.9.4_16-3.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538858" version="1" comment="xen-doc-html is &lt;4.9.4_16-3.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538859" version="1" comment="xen-libs is &lt;4.9.4_16-3.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538860" version="1" comment="xen-libs-32bit is &lt;4.9.4_16-3.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538861" version="1" comment="xen-tools is &lt;4.9.4_16-3.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538862" version="1" comment="xen-tools-domU is &lt;4.9.4_16-3.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555882" version="1" comment="sudo is &lt;1.8.20p2-3.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552225" version="1" comment="MozillaFirefox is &lt;78.10.0-112.57.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552226" version="1" comment="MozillaFirefox-devel is &lt;78.10.0-112.57.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552227" version="1" comment="MozillaFirefox-translations-common is &lt;78.10.0-112.57.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552228" version="1" comment="libhogweed2 is &lt;2.7.1-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538876" version="1" comment="libhogweed2-32bit is &lt;2.7.1-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552229" version="1" comment="libnettle4 is &lt;2.7.1-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538878" version="1" comment="libnettle4-32bit is &lt;2.7.1-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552230" version="1" comment="gdm is &lt;3.10.0.1-54.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538880" version="1" comment="gdm-lang is &lt;3.10.0.1-54.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538881" version="1" comment="gdmflexiserver is &lt;3.10.0.1-54.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552231" version="1" comment="libgdm1 is &lt;3.10.0.1-54.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552232" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-54.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538884" version="1" comment="tomcat is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538885" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538886" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538887" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538888" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538889" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538890" version="1" comment="tomcat-lib is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538891" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538892" version="1" comment="tomcat-webapps is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552233" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.291-43.47.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552234" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.291-43.47.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552235" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.291-43.47.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552236" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.291-43.47.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552282" version="1" comment="cups is &lt;1.7.5-20.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552283" version="1" comment="cups-client is &lt;1.7.5-20.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552284" version="1" comment="cups-libs is &lt;1.7.5-20.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538900" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552285" version="1" comment="bind is &lt;9.9.9P1-63.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552286" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538903" version="1" comment="bind-doc is &lt;9.9.9P1-63.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552287" version="1" comment="bind-libs is &lt;9.9.9P1-63.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538905" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552288" version="1" comment="bind-utils is &lt;9.9.9P1-63.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555883" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538908" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555884" version="1" comment="libdcerpc0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538910" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555885" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538912" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555886" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538914" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555887" version="1" comment="libndr-standard0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538916" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555888" version="1" comment="libndr0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538918" version="1" comment="libndr0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555889" version="1" comment="libnetapi0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538920" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555890" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538922" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555891" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538924" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555892" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538926" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555893" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538928" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555894" version="1" comment="libsamba-util0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538930" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555895" version="1" comment="libsamdb0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538932" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555896" version="1" comment="libsmbclient0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538934" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555897" version="1" comment="libsmbconf0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538936" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555898" version="1" comment="libsmbldap0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538938" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555899" version="1" comment="libtevent-util0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538940" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555900" version="1" comment="libwbclient0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538942" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555901" version="1" comment="samba is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555902" version="1" comment="samba-client is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538945" version="1" comment="samba-client-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538946" version="1" comment="samba-doc is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555903" version="1" comment="samba-libs is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538948" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555904" version="1" comment="samba-winbind is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538950" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552289" version="1" comment="avahi is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538952" version="1" comment="avahi-lang is &lt;0.6.32-32.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552290" version="1" comment="avahi-utils is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552291" version="1" comment="libavahi-client3 is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538955" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552292" version="1" comment="libavahi-common3 is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538957" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552293" version="1" comment="libavahi-core7 is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552294" version="1" comment="libavahi-glib1 is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538960" version="1" comment="libavahi-glib1-32bit is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552295" version="1" comment="libdns_sd is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538962" version="1" comment="libdns_sd-32bit is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552303" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552304" version="1" comment="python3 is &lt;3.4.10-25.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552305" version="1" comment="python3-base is &lt;3.4.10-25.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552306" version="1" comment="python3-curses is &lt;3.4.10-25.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597573" version="1" comment="python3-devel is &lt;3.4.10-25.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555905" version="1" comment="kernel-default is &lt;4.4.180-94.144.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555906" version="1" comment="kernel-default-base is &lt;4.4.180-94.144.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555907" version="1" comment="kernel-default-devel is &lt;4.4.180-94.144.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556949" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.144.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538972" version="1" comment="kernel-devel is &lt;4.4.180-94.144.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538973" version="1" comment="kernel-macros is &lt;4.4.180-94.144.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538974" version="1" comment="kernel-source is &lt;4.4.180-94.144.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555908" version="1" comment="kernel-syms is &lt;4.4.180-94.144.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556951" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;1-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552307" version="1" comment="libdjvulibre21 is &lt;3.5.25.3-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552308" version="1" comment="graphviz is &lt;2.28.0-29.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552309" version="1" comment="graphviz-gd is &lt;2.28.0-29.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552310" version="1" comment="graphviz-gnome is &lt;2.28.0-29.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552311" version="1" comment="graphviz-tcl is &lt;2.28.0-29.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552312" version="1" comment="libxml2-2 is &lt;2.9.4-46.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538983" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538984" version="1" comment="libxml2-doc is &lt;2.9.4-46.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552313" version="1" comment="libxml2-tools is &lt;2.9.4-46.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552314" version="1" comment="python-libxml2 is &lt;2.9.4-46.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531824" version="1" comment="dnsmasq is &lt;2.78-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597574" version="1" comment="dnsmasq-utils is &lt;2.78-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531825" version="1" comment="libFLAC++6 is &lt;1.3.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531826" version="1" comment="libFLAC8 is &lt;1.3.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531827" version="1" comment="libFLAC8-32bit is &lt;1.3.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531828" version="1" comment="dovecot22 is &lt;2.2.31-19.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531829" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531830" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531831" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597575" version="1" comment="python-httplib2 is &lt;0.19.0-7.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552315" version="1" comment="libdjvulibre21 is &lt;3.5.25.3-5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552316" version="1" comment="dhcp is &lt;4.3.3-10.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552317" version="1" comment="dhcp-client is &lt;4.3.3-10.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552318" version="1" comment="dhcp-relay is &lt;4.3.3-10.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552319" version="1" comment="dhcp-server is &lt;4.3.3-10.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552333" version="1" comment="libwebp5 is &lt;0.4.3-4.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538993" version="1" comment="libwebp5-32bit is &lt;0.4.3-4.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552334" version="1" comment="libwebpdemux1 is &lt;0.4.3-4.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597576" version="1" comment="libwebpmux1 is &lt;0.4.3-4.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552335" version="1" comment="libpolkit0 is &lt;0.113-5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552336" version="1" comment="polkit is &lt;0.113-5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552337" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552339" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539006" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-18.3.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552340" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552341" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552342" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552343" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552344" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552345" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552346" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552347" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552348" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552349" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552350" version="1" comment="MozillaFirefox is &lt;78.11.0-112.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552351" version="1" comment="MozillaFirefox-devel is &lt;78.11.0-112.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552352" version="1" comment="MozillaFirefox-translations-common is &lt;78.11.0-112.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552353" version="1" comment="libX11-6 is &lt;1.6.2-12.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539021" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539022" version="1" comment="libX11-data is &lt;1.6.2-12.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552354" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539024" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555909" version="1" comment="qemu is &lt;2.9.1-6.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555910" version="1" comment="qemu-block-curl is &lt;2.9.1-6.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555911" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539028" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555912" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555913" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539031" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539032" version="1" comment="qemu-kvm is &lt;2.9.1-6.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555914" version="1" comment="qemu-lang is &lt;2.9.1-6.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539035" version="1" comment="qemu-seabios is &lt;1.10.2_0_g5f4c7b1-6.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539036" version="1" comment="qemu-sgabios is &lt;8-6.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555915" version="1" comment="qemu-tools is &lt;2.9.1-6.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539038" version="1" comment="qemu-vgabios is &lt;1.10.2_0_g5f4c7b1-6.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539039" version="1" comment="qemu-x86 is &lt;2.9.1-6.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531832" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.75-38.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531833" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.75-38.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531834" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.75-38.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531835" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.75-38.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531836" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.75-38.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555916" version="1" comment="libspice-server1 is &lt;0.12.8-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539041" version="1" comment="ucode-intel is &lt;20210525-13.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597577" version="1" comment="python-Pillow is &lt;4.2.1-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552363" version="1" comment="caribou-common is &lt;0.4.21-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552364" version="1" comment="libcaribou0 is &lt;0.4.21-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552365" version="1" comment="typelib-1_0-Caribou-1_0 is &lt;0.4.21-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555917" version="1" comment="freeradius-server is &lt;3.0.15-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555918" version="1" comment="freeradius-server-doc is &lt;3.0.15-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555919" version="1" comment="freeradius-server-krb5 is &lt;3.0.15-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555920" version="1" comment="freeradius-server-ldap is &lt;3.0.15-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555921" version="1" comment="freeradius-server-libs is &lt;3.0.15-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555922" version="1" comment="freeradius-server-mysql is &lt;3.0.15-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555923" version="1" comment="freeradius-server-perl is &lt;3.0.15-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555924" version="1" comment="freeradius-server-postgresql is &lt;3.0.15-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555925" version="1" comment="freeradius-server-python is &lt;3.0.15-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555926" version="1" comment="freeradius-server-sqlite is &lt;3.0.15-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555927" version="1" comment="freeradius-server-utils is &lt;3.0.15-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552366" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.292-27.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552367" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.292-27.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552368" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.292-27.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552369" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.292-27.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531837" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531838" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531839" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531840" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552370" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.1-2.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552371" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.1-2.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539068" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.1-2.63.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552372" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.1-2.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552373" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.1-2.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552374" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.1-2.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552375" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.1-2.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552377" version="1" comment="apache2 is &lt;2.4.23-29.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539074" version="1" comment="apache2-doc is &lt;2.4.23-29.74.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552378" version="1" comment="apache2-example-pages is &lt;2.4.23-29.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552379" version="1" comment="apache2-prefork is &lt;2.4.23-29.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552380" version="1" comment="apache2-utils is &lt;2.4.23-29.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552381" version="1" comment="apache2-worker is &lt;2.4.23-29.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552382" version="1" comment="xterm is &lt;308-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539087" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539088" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539089" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1492060560.b6d11d7c46-4.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597581" version="1" comment="ansible is &lt;2.9.22-3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552386" version="1" comment="libhogweed2 is &lt;2.7.1-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539091" version="1" comment="libhogweed2-32bit is &lt;2.7.1-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552387" version="1" comment="libnettle4 is &lt;2.7.1-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539093" version="1" comment="libnettle4-32bit is &lt;2.7.1-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552394" version="1" comment="libgcrypt20 is &lt;1.6.1-16.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539096" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552395" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539098" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552396" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552397" version="1" comment="openexr is &lt;2.1.0-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531841" version="1" comment="libecpg6 is &lt;13.1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531842" version="1" comment="libpq5 is &lt;13.1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531843" version="1" comment="libpq5-32bit is &lt;13.1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531844" version="1" comment="postgresql is &lt;13-4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531845" version="1" comment="postgresql-contrib is &lt;13-4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531846" version="1" comment="postgresql-docs is &lt;13-4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531847" version="1" comment="postgresql-plperl is &lt;13-4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531848" version="1" comment="postgresql-plpython is &lt;13-4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531849" version="1" comment="postgresql-pltcl is &lt;13-4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531850" version="1" comment="postgresql-server is &lt;13-4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615943" version="1" comment="arpwatch is &lt;2.1a15-159.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555928" version="1" comment="libsolv-devel is &lt;0.6.37-2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555929" version="1" comment="libsolv-tools is &lt;0.6.37-2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555930" version="1" comment="libzypp is &lt;16.21.4-2.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555931" version="1" comment="libzypp-devel is &lt;16.21.4-2.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555932" version="1" comment="perl-solv is &lt;0.6.37-2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555933" version="1" comment="python-solv is &lt;0.6.37-2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615955" version="1" comment="aws-cli is &lt;1.19.9-22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616455" version="1" comment="python-PyYAML is &lt;5.3.1-28.4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616162" version="1" comment="python-botocore is &lt;1.20.9-28.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616164" version="1" comment="python-colorama is &lt;0.4.4-4.4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615952" version="1" comment="python-pexpect is &lt;4.3.1-3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615953" version="1" comment="python-ptyprocess is &lt;0.5.2-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616195" version="1" comment="python-six is &lt;1.14.0-13.10.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616449" version="1" comment="python3-requests is &lt;2.24.0-8.14.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616438" version="1" comment="python3-six is &lt;1.14.0-13.10.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616441" version="1" comment="python3-urllib3 is &lt;1.25.10-3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597579" version="1" comment="python-requests is &lt;2.24.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597580" version="1" comment="python-urllib3 is &lt;1.25.10-5.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531851" version="1" comment="openssh is &lt;7.2p2-74.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531852" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531853" version="1" comment="openssh-fips is &lt;7.2p2-74.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531854" version="1" comment="openssh-helpers is &lt;7.2p2-74.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555934" version="1" comment="sudo is &lt;1.8.20p2-3.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625232" version="1" comment="MozillaFirefox is &lt;78.12.0-112.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625233" version="1" comment="MozillaFirefox-devel is &lt;78.12.0-112.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625234" version="1" comment="MozillaFirefox-translations-common is &lt;78.12.0-112.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531856" version="1" comment="MozillaFirefox is &lt;78.7.0-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531857" version="1" comment="MozillaFirefox-devel is &lt;78.7.0-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531858" version="1" comment="MozillaFirefox-translations-common is &lt;78.7.0-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625777" version="1" comment="libsystemd0 is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625743" version="1" comment="libsystemd0-32bit is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626176" version="1" comment="libudev-devel is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625778" version="1" comment="libudev1 is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625746" version="1" comment="libudev1-32bit is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625779" version="1" comment="systemd is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625748" version="1" comment="systemd-32bit is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625749" version="1" comment="systemd-bash-completion is &lt;228-150.98.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625780" version="1" comment="systemd-devel is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625781" version="1" comment="systemd-sysvinit is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625782" version="1" comment="udev is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597578" version="1" comment="python-pip is &lt;9.0.1-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626114" version="1" comment="linuxptp is &lt;1.4-15.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625812" version="1" comment="kernel-default is &lt;4.4.180-94.147.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625813" version="1" comment="kernel-default-base is &lt;4.4.180-94.147.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625814" version="1" comment="kernel-default-devel is &lt;4.4.180-94.147.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626312" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.147.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625761" version="1" comment="kernel-devel is &lt;4.4.180-94.147.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625762" version="1" comment="kernel-macros is &lt;4.4.180-94.147.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625763" version="1" comment="kernel-source is &lt;4.4.180-94.147.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625815" version="1" comment="kernel-syms is &lt;4.4.180-94.147.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626314" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;1-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626559" version="1" comment="ardana-cobbler is &lt;8.0+git.1614096566.e8c2b27-3.44.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626560" version="1" comment="cassandra is &lt;3.11.10-5.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626561" version="1" comment="cassandra-tools is &lt;3.11.10-5.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626562" version="1" comment="documentation-suse-openstack-cloud-installation is &lt;8.20210512-1.32.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626563" version="1" comment="documentation-suse-openstack-cloud-operations is &lt;8.20210512-1.32.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626564" version="1" comment="documentation-suse-openstack-cloud-opsconsole is &lt;8.20210512-1.32.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626565" version="1" comment="documentation-suse-openstack-cloud-planning is &lt;8.20210512-1.32.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626566" version="1" comment="documentation-suse-openstack-cloud-security is &lt;8.20210512-1.32.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626567" version="1" comment="documentation-suse-openstack-cloud-supplement is &lt;8.20210512-1.32.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626568" version="1" comment="documentation-suse-openstack-cloud-upstream-admin is &lt;8.20210512-1.32.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626569" version="1" comment="documentation-suse-openstack-cloud-upstream-user is &lt;8.20210512-1.32.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626570" version="1" comment="documentation-suse-openstack-cloud-user is &lt;8.20210512-1.32.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624420" version="1" comment="grafana is &lt;6.7.4-4.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624421" version="1" comment="kibana is &lt;4.6.6-3.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624422" version="1" comment="openstack-heat-templates is &lt;0.0.0+git.1623056900.7917e18-3.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624423" version="1" comment="openstack-monasca-installer is &lt;20190923_16.32-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626571" version="1" comment="openstack-nova is &lt;16.1.9~dev92-3.48.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626572" version="1" comment="openstack-nova-api is &lt;16.1.9~dev92-3.48.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626573" version="1" comment="openstack-nova-cells is &lt;16.1.9~dev92-3.48.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626574" version="1" comment="openstack-nova-compute is &lt;16.1.9~dev92-3.48.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626575" version="1" comment="openstack-nova-conductor is &lt;16.1.9~dev92-3.48.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626576" version="1" comment="openstack-nova-console is &lt;16.1.9~dev92-3.48.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626577" version="1" comment="openstack-nova-consoleauth is &lt;16.1.9~dev92-3.48.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626578" version="1" comment="openstack-nova-doc is &lt;16.1.9~dev92-3.48.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626579" version="1" comment="openstack-nova-novncproxy is &lt;16.1.9~dev92-3.48.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626580" version="1" comment="openstack-nova-placement-api is &lt;16.1.9~dev92-3.48.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626581" version="1" comment="openstack-nova-scheduler is &lt;16.1.9~dev92-3.48.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626582" version="1" comment="openstack-nova-serialproxy is &lt;16.1.9~dev92-3.48.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626583" version="1" comment="openstack-nova-vncproxy is &lt;16.1.9~dev92-3.48.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624437" version="1" comment="python-Django is &lt;1.11.29-3.25.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009599115" version="1" comment="python-elementpath is &lt;1.3.1-1.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009142390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624438" version="1" comment="python-eventlet is &lt;0.20.0-6.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626584" version="1" comment="python-nova is &lt;16.1.9~dev92-3.48.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624440" version="1" comment="python-py is &lt;1.4.34-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624441" version="1" comment="python-pysaml2 is &lt;4.0.2-5.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624442" version="1" comment="python-xmlschema is &lt;1.0.18-1.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626585" version="1" comment="venv-openstack-aodh-x86_64 is &lt;5.1.1~dev7-12.32.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626586" version="1" comment="venv-openstack-barbican-x86_64 is &lt;5.0.2~dev3-12.33.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626587" version="1" comment="venv-openstack-ceilometer-x86_64 is &lt;9.0.8~dev7-12.30.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626588" version="1" comment="venv-openstack-cinder-x86_64 is &lt;11.2.3~dev29-14.34.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626589" version="1" comment="venv-openstack-designate-x86_64 is &lt;5.0.3~dev7-12.31.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626590" version="1" comment="venv-openstack-freezer-x86_64 is &lt;5.0.0.0~xrc2~dev2-10.28.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626591" version="1" comment="venv-openstack-glance-x86_64 is &lt;15.0.3~dev3-12.31.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626592" version="1" comment="venv-openstack-heat-x86_64 is &lt;9.0.8~dev22-12.33.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626593" version="1" comment="venv-openstack-horizon-x86_64 is &lt;12.0.5~dev6-14.36.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626594" version="1" comment="venv-openstack-ironic-x86_64 is &lt;9.1.8~dev8-12.33.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626595" version="1" comment="venv-openstack-keystone-x86_64 is &lt;12.0.4~dev11-11.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626596" version="1" comment="venv-openstack-magnum-x86_64 is &lt;5.0.2_5.0.2_5.0.2~dev31-11.32.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626597" version="1" comment="venv-openstack-manila-x86_64 is &lt;5.1.1~dev5-12.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626598" version="1" comment="venv-openstack-monasca-ceilometer-x86_64 is &lt;1.5.1_1.5.1_1.5.1~dev3-8.28.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626599" version="1" comment="venv-openstack-monasca-x86_64 is &lt;2.2.2~dev1-11.28.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626600" version="1" comment="venv-openstack-murano-x86_64 is &lt;4.0.2~dev2-12.28.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626601" version="1" comment="venv-openstack-neutron-x86_64 is &lt;11.0.9~dev69-13.38.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626602" version="1" comment="venv-openstack-nova-x86_64 is &lt;16.1.9~dev92-11.36.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626603" version="1" comment="venv-openstack-octavia-x86_64 is &lt;1.0.6~dev3-12.33.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626604" version="1" comment="venv-openstack-sahara-x86_64 is &lt;7.0.5~dev4-11.32.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626605" version="1" comment="venv-openstack-swift-x86_64 is &lt;2.15.2_2.15.2_2.15.2~dev32-11.23.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626606" version="1" comment="venv-openstack-trove-x86_64 is &lt;8.0.2~dev2-11.32.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625025" version="1" comment="qemu is &lt;2.9.1-6.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625026" version="1" comment="qemu-block-curl is &lt;2.9.1-6.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625027" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624976" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625028" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625029" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624979" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.53.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624980" version="1" comment="qemu-kvm is &lt;2.9.1-6.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625030" version="1" comment="qemu-lang is &lt;2.9.1-6.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624983" version="1" comment="qemu-seabios is &lt;1.10.2_0_g5f4c7b1-6.53.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624984" version="1" comment="qemu-sgabios is &lt;8-6.53.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625031" version="1" comment="qemu-tools is &lt;2.9.1-6.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624986" version="1" comment="qemu-vgabios is &lt;1.10.2_0_g5f4c7b1-6.53.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624987" version="1" comment="qemu-x86 is &lt;2.9.1-6.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625809" version="1" comment="dbus-1 is &lt;1.8.22-29.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625810" version="1" comment="dbus-1-x11 is &lt;1.8.22-29.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625811" version="1" comment="libdbus-1-3 is &lt;1.8.22-29.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625756" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-29.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627312" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.3-2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627313" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.3-2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627305" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.3-2.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627314" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.3-2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627315" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.3-2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627316" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.3-2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627317" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.3-2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626903" version="1" comment="libsndfile1 is &lt;1.0.25-36.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626901" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627946" version="1" comment="libdjvulibre21 is &lt;3.5.25.3-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627135" version="1" comment="python-Pillow is &lt;4.2.1-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630615" version="1" comment="cpio is &lt;2.11-36.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630610" version="1" comment="cpio-lang is &lt;2.11-36.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630393" version="1" comment="libcares2 is &lt;1.9.1-9.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630616" version="1" comment="MozillaFirefox is &lt;78.13.0-112.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630617" version="1" comment="MozillaFirefox-devel is &lt;78.13.0-112.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630618" version="1" comment="MozillaFirefox-translations-common is &lt;78.13.0-112.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630872" version="1" comment="fetchmail is &lt;6.3.26-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630873" version="1" comment="fetchmailconf is &lt;6.3.26-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631319" version="1" comment="cpio is &lt;2.11-36.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631320" version="1" comment="cpio-lang is &lt;2.11-36.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627215" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.302-27.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627216" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.302-27.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627217" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.302-27.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627218" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.302-27.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631542" version="1" comment="cpio is &lt;2.11-36.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631541" version="1" comment="cpio-lang is &lt;2.11-36.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628223" version="1" comment="python-PyYAML is &lt;5.3.1-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628224" version="1" comment="python3-PyYAML is &lt;5.3.1-28.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631696" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.69.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631697" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.69.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631678" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.69.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631698" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.69.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631680" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.69.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631699" version="1" comment="openssl is &lt;1.0.2j-60.69.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631682" version="1" comment="openssl-doc is &lt;1.0.2j-60.69.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631579" version="1" comment="unrar is &lt;5.6.1-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555935" version="1" comment="openvswitch is &lt;2.7.12-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627800" version="1" comment="aspell is &lt;0.60.6.1-18.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627801" version="1" comment="aspell-ispell is &lt;0.60.6.1-18.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627802" version="1" comment="libaspell15 is &lt;0.60.6.1-18.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627791" version="1" comment="libaspell15-32bit is &lt;0.60.6.1-18.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627796" version="1" comment="bind is &lt;9.9.9P1-63.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627797" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627784" version="1" comment="bind-doc is &lt;9.9.9P1-63.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627798" version="1" comment="bind-libs is &lt;9.9.9P1-63.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627786" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627799" version="1" comment="bind-utils is &lt;9.9.9P1-63.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627023" version="1" comment="mysql-connector-java is &lt;5.1.42-5.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627947" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627948" version="1" comment="openexr is &lt;2.1.0-6.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628213" version="1" comment="libesmtp is &lt;1.0.6-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628151" version="1" comment="file is &lt;5.22-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628152" version="1" comment="file-magic is &lt;5.22-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628153" version="1" comment="libmagic1 is &lt;5.22-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628154" version="1" comment="libmagic1-32bit is &lt;5.22-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632286" version="1" comment="xen is &lt;4.9.4_20-3.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632287" version="1" comment="xen-doc-html is &lt;4.9.4_20-3.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632288" version="1" comment="xen-libs is &lt;4.9.4_20-3.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632289" version="1" comment="xen-libs-32bit is &lt;4.9.4_20-3.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632290" version="1" comment="xen-tools is &lt;4.9.4_20-3.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632291" version="1" comment="xen-tools-domU is &lt;4.9.4_20-3.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633044" version="1" comment="libfreebl3 is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633045" version="1" comment="libfreebl3-32bit is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633046" version="1" comment="libfreebl3-hmac is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633047" version="1" comment="libfreebl3-hmac-32bit is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633048" version="1" comment="libsoftokn3 is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633049" version="1" comment="libsoftokn3-32bit is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633050" version="1" comment="libsoftokn3-hmac is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633051" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633052" version="1" comment="mozilla-nspr is &lt;4.32-19.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633053" version="1" comment="mozilla-nspr-32bit is &lt;4.32-19.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633102" version="1" comment="mozilla-nspr-devel is &lt;4.32-19.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633054" version="1" comment="mozilla-nss is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633055" version="1" comment="mozilla-nss-32bit is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633056" version="1" comment="mozilla-nss-certs is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633057" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633103" version="1" comment="mozilla-nss-devel is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633058" version="1" comment="mozilla-nss-sysinit is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633059" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633060" version="1" comment="mozilla-nss-tools is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631268" version="1" comment="transfig is &lt;3.2.8a-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628130" version="1" comment="libgtk-vnc-1_0-0 is &lt;0.6.0-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628131" version="1" comment="libgtk-vnc-2_0-0 is &lt;0.6.0-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628132" version="1" comment="libgvnc-1_0-0 is &lt;0.6.0-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628133" version="1" comment="python-gtk-vnc is &lt;0.6.0-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628134" version="1" comment="typelib-1_0-GVnc-1_0 is &lt;0.6.0-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628135" version="1" comment="typelib-1_0-GtkVnc-2_0 is &lt;0.6.0-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632419" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632420" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632401" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632421" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632403" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632422" version="1" comment="openssl is &lt;1.0.2j-60.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632405" version="1" comment="openssl-doc is &lt;1.0.2j-60.72.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632780" version="1" comment="ghostscript is &lt;9.52-23.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632781" version="1" comment="ghostscript-devel is &lt;9.52-23.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632782" version="1" comment="ghostscript-x11 is &lt;9.52-23.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632783" version="1" comment="libspectre-devel is &lt;0.2.7-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632784" version="1" comment="libspectre1 is &lt;0.2.7-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633610" version="1" comment="MozillaFirefox is &lt;91.1.0-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633611" version="1" comment="MozillaFirefox-branding-SLE is &lt;91-35.6.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633612" version="1" comment="MozillaFirefox-devel is &lt;91.1.0-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633613" version="1" comment="MozillaFirefox-translations-common is &lt;91.1.0-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531863" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.20-30.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531864" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.20-30.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531865" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.20-30.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531866" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.20-30.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633441" version="1" comment="xen is &lt;4.9.4_22-3.94.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633442" version="1" comment="xen-doc-html is &lt;4.9.4_22-3.94.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633443" version="1" comment="xen-libs is &lt;4.9.4_22-3.94.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633444" version="1" comment="xen-libs-32bit is &lt;4.9.4_22-3.94.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633445" version="1" comment="xen-tools is &lt;4.9.4_22-3.94.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633446" version="1" comment="xen-tools-domU is &lt;4.9.4_22-3.94.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633614" version="1" comment="libsqlite3-0 is &lt;3.36.0-9.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633604" version="1" comment="libsqlite3-0-32bit is &lt;3.36.0-9.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633615" version="1" comment="sqlite3 is &lt;3.36.0-9.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633616" version="1" comment="sqlite3-devel is &lt;3.36.0-9.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633651" version="1" comment="python-Pillow is &lt;4.2.1-3.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631062" version="1" comment="python3-urllib3 is &lt;1.25.10-3.31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651126" version="1" comment="glibc is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651115" version="1" comment="glibc-32bit is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651127" version="1" comment="glibc-devel is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651117" version="1" comment="glibc-devel-32bit is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651118" version="1" comment="glibc-html is &lt;2.22-116.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651119" version="1" comment="glibc-i18ndata is &lt;2.22-116.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651120" version="1" comment="glibc-info is &lt;2.22-116.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651128" version="1" comment="glibc-locale is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651122" version="1" comment="glibc-locale-32bit is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651129" version="1" comment="glibc-profile is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651124" version="1" comment="glibc-profile-32bit is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651130" version="1" comment="nscd is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634387" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.4-2.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634388" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.4-2.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634365" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.4-2.71.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634389" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.4-2.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634390" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.4-2.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634391" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.4-2.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634392" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.4-2.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633904" version="1" comment="apache2 is &lt;2.4.23-29.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633898" version="1" comment="apache2-doc is &lt;2.4.23-29.80.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633905" version="1" comment="apache2-example-pages is &lt;2.4.23-29.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633906" version="1" comment="apache2-prefork is &lt;2.4.23-29.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633907" version="1" comment="apache2-utils is &lt;2.4.23-29.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633908" version="1" comment="apache2-worker is &lt;2.4.23-29.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531867" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531868" version="1" comment="python3 is &lt;3.4.10-25.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531869" version="1" comment="python3-base is &lt;3.4.10-25.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531870" version="1" comment="python3-curses is &lt;3.4.10-25.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531871" version="1" comment="python3-devel is &lt;3.4.10-25.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651862" version="1" comment="MozillaFirefox is &lt;91.2.0-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651863" version="1" comment="MozillaFirefox-devel is &lt;91.2.0-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651864" version="1" comment="MozillaFirefox-translations-common is &lt;91.2.0-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651303" version="1" comment="javapackages-filesystem is &lt;5.3.1-14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651257" version="1" comment="mysql-connector-java is &lt;8.0.25-5.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652523" version="1" comment="libblkid1 is &lt;2.29.2-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652487" version="1" comment="libblkid1-32bit is &lt;2.29.2-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652524" version="1" comment="libfdisk1 is &lt;2.29.2-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652525" version="1" comment="libmount1 is &lt;2.29.2-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652490" version="1" comment="libmount1-32bit is &lt;2.29.2-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652526" version="1" comment="libsmartcols1 is &lt;2.29.2-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652527" version="1" comment="libuuid1 is &lt;2.29.2-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652493" version="1" comment="libuuid1-32bit is &lt;2.29.2-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652528" version="1" comment="python-libmount is &lt;2.29.2-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652529" version="1" comment="util-linux is &lt;2.29.2-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652496" version="1" comment="util-linux-lang is &lt;2.29.2-3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652530" version="1" comment="util-linux-systemd is &lt;2.29.2-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652531" version="1" comment="uuidd is &lt;2.29.2-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652805" version="1" comment="strongswan is &lt;5.1.3-26.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652801" version="1" comment="strongswan-doc is &lt;5.1.3-26.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652806" version="1" comment="strongswan-hmac is &lt;5.1.3-26.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652807" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652808" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652164" version="1" comment="postgresql10 is &lt;10.18-4.19.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652165" version="1" comment="postgresql10-contrib is &lt;10.18-4.19.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652158" version="1" comment="postgresql10-docs is &lt;10.18-4.19.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652166" version="1" comment="postgresql10-plperl is &lt;10.18-4.19.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652167" version="1" comment="postgresql10-plpython is &lt;10.18-4.19.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652168" version="1" comment="postgresql10-pltcl is &lt;10.18-4.19.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652169" version="1" comment="postgresql10-server is &lt;10.18-4.19.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652544" version="1" comment="git is &lt;2.26.2-27.49.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597716" version="1" comment="ardana-horizon is &lt;8.0+git.1610733160.0f577f4-3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597719" version="1" comment="ardana-logging is &lt;8.0+git.1610573640.452aed1-3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597720" version="1" comment="ardana-monasca is &lt;8.0+git.1610740501.5dca121-3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597721" version="1" comment="ardana-mq is &lt;8.0+git.1605176800.52cccfa-3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597725" version="1" comment="ardana-osconfig is &lt;8.0+git.1610643571.91b88d6-3.52.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597730" version="1" comment="kibana is &lt;4.6.3-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597731" version="1" comment="openstack-neutron is &lt;11.0.9~dev69-3.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597732" version="1" comment="openstack-neutron-dhcp-agent is &lt;11.0.9~dev69-3.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597733" version="1" comment="openstack-neutron-doc is &lt;11.0.9~dev69-3.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597734" version="1" comment="openstack-neutron-ha-tool is &lt;11.0.9~dev69-3.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597735" version="1" comment="openstack-neutron-l3-agent is &lt;11.0.9~dev69-3.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597736" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;11.0.9~dev69-3.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597737" version="1" comment="openstack-neutron-macvtap-agent is &lt;11.0.9~dev69-3.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597738" version="1" comment="openstack-neutron-metadata-agent is &lt;11.0.9~dev69-3.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597739" version="1" comment="openstack-neutron-metering-agent is &lt;11.0.9~dev69-3.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597740" version="1" comment="openstack-neutron-openvswitch-agent is &lt;11.0.9~dev69-3.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597741" version="1" comment="openstack-neutron-server is &lt;11.0.9~dev69-3.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597742" version="1" comment="openstack-nova is &lt;16.1.9~dev78-3.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597743" version="1" comment="openstack-nova-api is &lt;16.1.9~dev78-3.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597744" version="1" comment="openstack-nova-cells is &lt;16.1.9~dev78-3.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597745" version="1" comment="openstack-nova-compute is &lt;16.1.9~dev78-3.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597746" version="1" comment="openstack-nova-conductor is &lt;16.1.9~dev78-3.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597747" version="1" comment="openstack-nova-console is &lt;16.1.9~dev78-3.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597748" version="1" comment="openstack-nova-consoleauth is &lt;16.1.9~dev78-3.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597749" version="1" comment="openstack-nova-doc is &lt;16.1.9~dev78-3.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597750" version="1" comment="openstack-nova-novncproxy is &lt;16.1.9~dev78-3.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597751" version="1" comment="openstack-nova-placement-api is &lt;16.1.9~dev78-3.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597752" version="1" comment="openstack-nova-scheduler is &lt;16.1.9~dev78-3.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597753" version="1" comment="openstack-nova-serialproxy is &lt;16.1.9~dev78-3.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597754" version="1" comment="openstack-nova-vncproxy is &lt;16.1.9~dev78-3.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597755" version="1" comment="python-Django is &lt;1.11.29-3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597756" version="1" comment="python-neutron is &lt;11.0.9~dev69-3.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597757" version="1" comment="python-nova is &lt;16.1.9~dev78-3.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597758" version="1" comment="release-notes-suse-openstack-cloud is &lt;8.20201214-3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597759" version="1" comment="spark is &lt;1.6.3-8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597760" version="1" comment="venv-openstack-horizon-x86_64 is &lt;12.0.5~dev6-14.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597761" version="1" comment="venv-openstack-neutron-x86_64 is &lt;11.0.9~dev69-13.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597762" version="1" comment="venv-openstack-nova-x86_64 is &lt;16.1.9~dev78-11.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653628" version="1" comment="opensc is &lt;0.13.0-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653544" version="1" comment="transfig is &lt;3.2.8b-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653540" version="1" comment="binutils is &lt;2.37-9.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653541" version="1" comment="binutils-devel is &lt;2.37-9.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653542" version="1" comment="libctf-nobfd0 is &lt;2.37-9.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653543" version="1" comment="libctf0 is &lt;2.37-9.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654414" version="1" comment="binutils is &lt;2.37-9.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654415" version="1" comment="binutils-devel is &lt;2.37-9.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654416" version="1" comment="libctf-nobfd0 is &lt;2.37-9.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654417" version="1" comment="libctf0 is &lt;2.37-9.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653038" version="1" comment="libpcre1 is &lt;8.45-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653016" version="1" comment="libpcre1-32bit is &lt;8.45-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653039" version="1" comment="libpcre16-0 is &lt;8.45-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653066" version="1" comment="libpcrecpp0 is &lt;8.45-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653354" version="1" comment="libpcreposix0 is &lt;8.45-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653191" version="1" comment="pcre-devel is &lt;8.45-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653349" version="1" comment="selinux-policy is &lt;20140730-36.5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653350" version="1" comment="selinux-policy-devel is &lt;20140730-36.5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653351" version="1" comment="selinux-policy-minimum is &lt;20140730-36.5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653192" version="1" comment="qemu is &lt;2.9.1-43.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653193" version="1" comment="qemu-block-curl is &lt;2.9.1-43.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653194" version="1" comment="qemu-block-iscsi is &lt;2.9.1-43.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653156" version="1" comment="qemu-block-rbd is &lt;2.9.1-43.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653195" version="1" comment="qemu-block-ssh is &lt;2.9.1-43.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653196" version="1" comment="qemu-guest-agent is &lt;2.9.1-43.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653159" version="1" comment="qemu-ipxe is &lt;1.0.0+-43.62.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653160" version="1" comment="qemu-kvm is &lt;2.9.1-43.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653197" version="1" comment="qemu-lang is &lt;2.9.1-43.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653163" version="1" comment="qemu-seabios is &lt;1.10.2_0_g5f4c7b1-43.62.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653164" version="1" comment="qemu-sgabios is &lt;8-43.62.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653198" version="1" comment="qemu-tools is &lt;2.9.1-43.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653166" version="1" comment="qemu-vgabios is &lt;1.10.2_0_g5f4c7b1-43.62.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653167" version="1" comment="qemu-x86 is &lt;2.9.1-43.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655637" version="1" comment="MozillaFirefox is &lt;91.3.0-112.80.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655638" version="1" comment="MozillaFirefox-devel is &lt;91.3.0-112.80.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655639" version="1" comment="MozillaFirefox-translations-common is &lt;91.3.0-112.80.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656071" version="1" comment="ardana-ansible is &lt;8.0+git.1632499354.a56668f-3.82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656072" version="1" comment="ardana-monasca is &lt;8.0+git.1627997000.6c3bc04-3.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656073" version="1" comment="documentation-suse-openstack-cloud-installation is &lt;8.20210806-1.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656074" version="1" comment="documentation-suse-openstack-cloud-operations is &lt;8.20210806-1.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656075" version="1" comment="documentation-suse-openstack-cloud-opsconsole is &lt;8.20210806-1.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656076" version="1" comment="documentation-suse-openstack-cloud-planning is &lt;8.20210806-1.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656077" version="1" comment="documentation-suse-openstack-cloud-security is &lt;8.20210806-1.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656078" version="1" comment="documentation-suse-openstack-cloud-supplement is &lt;8.20210806-1.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656079" version="1" comment="documentation-suse-openstack-cloud-upstream-admin is &lt;8.20210806-1.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656080" version="1" comment="documentation-suse-openstack-cloud-upstream-user is &lt;8.20210806-1.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656081" version="1" comment="documentation-suse-openstack-cloud-user is &lt;8.20210806-1.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656082" version="1" comment="openstack-ec2-api is &lt;5.0.1~dev12-4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656083" version="1" comment="openstack-ec2-api-api is &lt;5.0.1~dev12-4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656084" version="1" comment="openstack-ec2-api-metadata is &lt;5.0.1~dev12-4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656085" version="1" comment="openstack-ec2-api-s3 is &lt;5.0.1~dev12-4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656086" version="1" comment="openstack-heat-templates is &lt;0.0.0+git.1628179051.7d761bf-3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656087" version="1" comment="python-Django is &lt;1.11.29-3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656088" version="1" comment="python-ec2api is &lt;5.0.1~dev12-4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656089" version="1" comment="python-monasca-common is &lt;2.3.1~dev4-4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656090" version="1" comment="venv-openstack-heat-x86_64 is &lt;9.0.8~dev22-12.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656091" version="1" comment="venv-openstack-horizon-x86_64 is &lt;12.0.5~dev6-14.38.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656092" version="1" comment="venv-openstack-monasca-x86_64 is &lt;2.2.2~dev1-11.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655686" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655588" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655687" version="1" comment="libdcerpc0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655590" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655688" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655592" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655689" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655594" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655690" version="1" comment="libndr-standard0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655596" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655691" version="1" comment="libndr0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655598" version="1" comment="libndr0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655692" version="1" comment="libnetapi0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655600" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655693" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655602" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655694" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655604" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655695" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655606" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655696" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655608" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655697" version="1" comment="libsamba-util0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655610" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655698" version="1" comment="libsamdb0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655612" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655699" version="1" comment="libsmbclient0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655614" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655700" version="1" comment="libsmbconf0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655616" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655701" version="1" comment="libsmbldap0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655618" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655702" version="1" comment="libtevent-util0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655620" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655703" version="1" comment="libwbclient0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655622" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655704" version="1" comment="samba is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655705" version="1" comment="samba-client is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655625" version="1" comment="samba-client-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655626" version="1" comment="samba-doc is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655706" version="1" comment="samba-libs is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655628" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655707" version="1" comment="samba-winbind is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655630" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656243" version="1" comment="libecpg6 is &lt;14.1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656244" version="1" comment="libpq5 is &lt;14.1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656229" version="1" comment="libpq5-32bit is &lt;14.1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656230" version="1" comment="postgresql is &lt;14-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656231" version="1" comment="postgresql-contrib is &lt;14-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656232" version="1" comment="postgresql-docs is &lt;14-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656233" version="1" comment="postgresql-plperl is &lt;14-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656234" version="1" comment="postgresql-plpython is &lt;14-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656235" version="1" comment="postgresql-pltcl is &lt;14-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656236" version="1" comment="postgresql-server is &lt;14-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656863" version="1" comment="postgresql96 is &lt;9.6.24-6.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656864" version="1" comment="postgresql96-contrib is &lt;9.6.24-6.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656857" version="1" comment="postgresql96-docs is &lt;9.6.24-6.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656865" version="1" comment="postgresql96-plperl is &lt;9.6.24-6.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656866" version="1" comment="postgresql96-plpython is &lt;9.6.24-6.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656867" version="1" comment="postgresql96-pltcl is &lt;9.6.24-6.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656868" version="1" comment="postgresql96-server is &lt;9.6.24-6.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656548" version="1" comment="postgresql10 is &lt;10.19-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656549" version="1" comment="postgresql10-contrib is &lt;10.19-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656534" version="1" comment="postgresql10-docs is &lt;10.19-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656550" version="1" comment="postgresql10-plperl is &lt;10.19-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656551" version="1" comment="postgresql10-plpython is &lt;10.19-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656552" version="1" comment="postgresql10-pltcl is &lt;10.19-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656553" version="1" comment="postgresql10-server is &lt;10.19-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657339" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.4-2.74.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657340" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.4-2.74.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657332" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.4-2.74.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657341" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.4-2.74.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657342" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.4-2.74.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657343" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.4-2.74.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657344" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.4-2.74.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657044" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.312-27.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657045" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.312-27.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657046" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.312-27.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657047" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.312-27.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656897" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.321-43.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656898" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.321-43.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656899" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.321-43.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656900" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.321-43.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657553" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657554" version="1" comment="ruby2.1 is &lt;2.1.9-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657555" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658666" version="1" comment="xen is &lt;4.9.4_24-3.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658667" version="1" comment="xen-doc-html is &lt;4.9.4_24-3.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658668" version="1" comment="xen-libs is &lt;4.9.4_24-3.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658669" version="1" comment="xen-libs-32bit is &lt;4.9.4_24-3.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658670" version="1" comment="xen-tools is &lt;4.9.4_24-3.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658671" version="1" comment="xen-tools-domU is &lt;4.9.4_24-3.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656968" version="1" comment="clamav is &lt;0.103.4-33.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658205" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.1-2.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658206" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.1-2.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658196" version="1" comment="libwebkit2gtk3-lang is &lt;2.34.1-2.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658207" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.1-2.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658208" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.1-2.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658209" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.1-2.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658210" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.1-2.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657875" version="1" comment="kernel-default is &lt;4.4.180-94.150.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657876" version="1" comment="kernel-default-base is &lt;4.4.180-94.150.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657877" version="1" comment="kernel-default-devel is &lt;4.4.180-94.150.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659139" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.150.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657858" version="1" comment="kernel-devel is &lt;4.4.180-94.150.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657859" version="1" comment="kernel-macros is &lt;4.4.180-94.150.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657860" version="1" comment="kernel-source is &lt;4.4.180-94.150.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657878" version="1" comment="kernel-syms is &lt;4.4.180-94.150.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659141" version="1" comment="kgraft-patch-4_4_180-94_150-default is &lt;1-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659103" version="1" comment="libfreebl3 is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659086" version="1" comment="libfreebl3-32bit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659104" version="1" comment="libfreebl3-hmac is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659088" version="1" comment="libfreebl3-hmac-32bit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659105" version="1" comment="libsoftokn3 is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659090" version="1" comment="libsoftokn3-32bit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659106" version="1" comment="libsoftokn3-hmac is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659092" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659107" version="1" comment="mozilla-nss is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659094" version="1" comment="mozilla-nss-32bit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659108" version="1" comment="mozilla-nss-certs is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659096" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659191" version="1" comment="mozilla-nss-devel is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659109" version="1" comment="mozilla-nss-sysinit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659099" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659110" version="1" comment="mozilla-nss-tools is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658348" version="1" comment="openssh is &lt;7.2p2-74.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658349" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658350" version="1" comment="openssh-fips is &lt;7.2p2-74.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658351" version="1" comment="openssh-helpers is &lt;7.2p2-74.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659444" version="1" comment="MozillaFirefox is &lt;91.4.0-112.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659445" version="1" comment="MozillaFirefox-devel is &lt;91.4.0-112.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659446" version="1" comment="MozillaFirefox-translations-common is &lt;91.4.0-112.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659102" version="1" comment="glib-networking is &lt;2.48.2-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659084" version="1" comment="glib-networking-lang is &lt;2.48.2-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659889" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659890" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659918" version="1" comment="storm is &lt;1.2.3-3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659919" version="1" comment="storm-nimbus is &lt;1.2.3-3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659920" version="1" comment="storm-supervisor is &lt;1.2.3-3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659921" version="1" comment="venv-openstack-monasca-x86_64 is &lt;2.2.2~dev1-11.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660148" version="1" comment="log4j is &lt;1.2.15-126.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660798" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660799" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660811" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660812" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660813" version="1" comment="libdcerpc0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660814" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660815" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660816" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660817" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660818" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660819" version="1" comment="libndr-standard0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660820" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660821" version="1" comment="libndr0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660822" version="1" comment="libndr0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660823" version="1" comment="libnetapi0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660824" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660825" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660826" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660827" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660828" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660829" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660830" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660831" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660832" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660833" version="1" comment="libsamba-util0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660834" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660835" version="1" comment="libsamdb0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660836" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660837" version="1" comment="libsmbclient0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660838" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660839" version="1" comment="libsmbconf0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660840" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660841" version="1" comment="libsmbldap0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660842" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660843" version="1" comment="libtevent-util0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660844" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660845" version="1" comment="libwbclient0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660846" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660847" version="1" comment="samba is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660848" version="1" comment="samba-client is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660849" version="1" comment="samba-client-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660850" version="1" comment="samba-doc is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660851" version="1" comment="samba-libs is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660852" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660853" version="1" comment="samba-winbind is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660854" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659981" version="1" comment="chrony is &lt;4.1-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659371" version="1" comment="ansible is &lt;2.9.27-3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660953" version="1" comment="elasticsearch is &lt;2.4.2-5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660954" version="1" comment="kafka is &lt;0.10.2.2-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660215" version="1" comment="logstash is &lt;2.4.1-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660955" version="1" comment="openstack-monasca-agent is &lt;2.2.6~dev4-3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660956" version="1" comment="openstack-monasca-persister-java is &lt;1.7.1~a0~dev2-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660957" version="1" comment="openstack-monasca-thresh is &lt;2.1.1-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660958" version="1" comment="python-monasca-agent is &lt;2.2.6~dev4-3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660959" version="1" comment="venv-openstack-aodh-x86_64 is &lt;5.1.1~dev7-12.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660960" version="1" comment="venv-openstack-barbican-x86_64 is &lt;5.0.2~dev3-12.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660961" version="1" comment="venv-openstack-ceilometer-x86_64 is &lt;9.0.8~dev7-12.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660962" version="1" comment="venv-openstack-cinder-x86_64 is &lt;11.2.3~dev29-14.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660963" version="1" comment="venv-openstack-designate-x86_64 is &lt;5.0.3~dev7-12.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660964" version="1" comment="venv-openstack-freezer-x86_64 is &lt;5.0.0.0~xrc2~dev2-10.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660965" version="1" comment="venv-openstack-glance-x86_64 is &lt;15.0.3~dev3-12.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660966" version="1" comment="venv-openstack-heat-x86_64 is &lt;9.0.8~dev22-12.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660967" version="1" comment="venv-openstack-horizon-x86_64 is &lt;12.0.5~dev6-14.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660968" version="1" comment="venv-openstack-ironic-x86_64 is &lt;9.1.8~dev8-12.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660969" version="1" comment="venv-openstack-keystone-x86_64 is &lt;12.0.4~dev11-11.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660970" version="1" comment="venv-openstack-magnum-x86_64 is &lt;5.0.2_5.0.2_5.0.2~dev31-11.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660971" version="1" comment="venv-openstack-manila-x86_64 is &lt;5.1.1~dev5-12.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660972" version="1" comment="venv-openstack-monasca-ceilometer-x86_64 is &lt;1.5.1_1.5.1_1.5.1~dev3-8.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660973" version="1" comment="venv-openstack-monasca-x86_64 is &lt;2.2.2~dev1-11.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660974" version="1" comment="venv-openstack-murano-x86_64 is &lt;4.0.2~dev2-12.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660975" version="1" comment="venv-openstack-neutron-x86_64 is &lt;11.0.9~dev69-13.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660976" version="1" comment="venv-openstack-nova-x86_64 is &lt;16.1.9~dev92-11.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660977" version="1" comment="venv-openstack-octavia-x86_64 is &lt;1.0.6~dev3-12.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660978" version="1" comment="venv-openstack-sahara-x86_64 is &lt;7.0.5~dev4-11.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660979" version="1" comment="venv-openstack-swift-x86_64 is &lt;2.15.2_2.15.2_2.15.2~dev32-11.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660980" version="1" comment="venv-openstack-trove-x86_64 is &lt;8.0.2~dev2-11.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660981" version="1" comment="zookeeper-server is &lt;3.4.10-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531872" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531873" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531874" version="1" comment="python is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531875" version="1" comment="python-32bit is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531876" version="1" comment="python-base is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531877" version="1" comment="python-base-32bit is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531878" version="1" comment="python-curses is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531879" version="1" comment="python-demo is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531880" version="1" comment="python-devel is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531881" version="1" comment="python-doc is &lt;2.7.17-28.64.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531882" version="1" comment="python-doc-pdf is &lt;2.7.17-28.64.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531883" version="1" comment="python-gdbm is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531884" version="1" comment="python-idle is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531885" version="1" comment="python-tk is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531886" version="1" comment="python-xml is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555936" version="1" comment="openvswitch is &lt;2.7.12-3.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555937" version="1" comment="kernel-default is &lt;4.4.180-94.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555938" version="1" comment="kernel-default-base is &lt;4.4.180-94.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555939" version="1" comment="kernel-default-devel is &lt;4.4.180-94.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557097" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539114" version="1" comment="kernel-devel is &lt;4.4.180-94.138.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539115" version="1" comment="kernel-macros is &lt;4.4.180-94.138.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539116" version="1" comment="kernel-source is &lt;4.4.180-94.138.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555940" version="1" comment="kernel-syms is &lt;4.4.180-94.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557099" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;1-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531899" version="1" comment="wpa_supplicant is &lt;2.6-15.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531900" version="1" comment="libjasper1 is &lt;1.900.14-195.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531901" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531902" version="1" comment="screen is &lt;4.0.4-23.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531903" version="1" comment="bind is &lt;9.9.9P1-63.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531904" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531905" version="1" comment="bind-doc is &lt;9.9.9P1-63.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531906" version="1" comment="bind-libs is &lt;9.9.9P1-63.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531907" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531908" version="1" comment="bind-utils is &lt;9.9.9P1-63.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531909" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.80-38.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531910" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.80-38.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531911" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.80-38.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531912" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.80-38.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531913" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.80-38.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597582" version="1" comment="python-urllib3 is &lt;1.22-5.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531914" version="1" comment="krb5-appl-clients is &lt;1.0.3-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531915" version="1" comment="krb5-appl-servers is &lt;1.0.3-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531916" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.282-27.56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531917" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.282-27.56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531918" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.282-27.56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531919" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.282-27.56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597583" version="1" comment="grafana is &lt;6.7.4-4.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597584" version="1" comment="influxdb is &lt;1.3.4-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597585" version="1" comment="openstack-heat-templates is &lt;0.0.0+git.1605509190.64f020b-3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597586" version="1" comment="openstack-nova is &lt;16.1.9~dev77-3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597587" version="1" comment="openstack-nova-api is &lt;16.1.9~dev77-3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597588" version="1" comment="openstack-nova-cells is &lt;16.1.9~dev77-3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597589" version="1" comment="openstack-nova-compute is &lt;16.1.9~dev77-3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597590" version="1" comment="openstack-nova-conductor is &lt;16.1.9~dev77-3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597591" version="1" comment="openstack-nova-console is &lt;16.1.9~dev77-3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597592" version="1" comment="openstack-nova-consoleauth is &lt;16.1.9~dev77-3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597593" version="1" comment="openstack-nova-doc is &lt;16.1.9~dev77-3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597594" version="1" comment="openstack-nova-novncproxy is &lt;16.1.9~dev77-3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597595" version="1" comment="openstack-nova-placement-api is &lt;16.1.9~dev77-3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597596" version="1" comment="openstack-nova-scheduler is &lt;16.1.9~dev77-3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597597" version="1" comment="openstack-nova-serialproxy is &lt;16.1.9~dev77-3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597598" version="1" comment="openstack-nova-vncproxy is &lt;16.1.9~dev77-3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597599" version="1" comment="python-Jinja2 is &lt;2.9.6-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597600" version="1" comment="python-nova is &lt;16.1.9~dev77-3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597601" version="1" comment="venv-openstack-aodh-x86_64 is &lt;5.1.1~dev7-12.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597602" version="1" comment="venv-openstack-barbican-x86_64 is &lt;5.0.2~dev3-12.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597603" version="1" comment="venv-openstack-ceilometer-x86_64 is &lt;9.0.8~dev7-12.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597604" version="1" comment="venv-openstack-cinder-x86_64 is &lt;11.2.3~dev29-14.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597605" version="1" comment="venv-openstack-designate-x86_64 is &lt;5.0.3~dev7-12.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597606" version="1" comment="venv-openstack-freezer-x86_64 is &lt;5.0.0.0~xrc2~dev2-10.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597607" version="1" comment="venv-openstack-glance-x86_64 is &lt;15.0.3~dev3-12.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597608" version="1" comment="venv-openstack-heat-x86_64 is &lt;9.0.8~dev22-12.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597609" version="1" comment="venv-openstack-ironic-x86_64 is &lt;9.1.8~dev8-12.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597610" version="1" comment="venv-openstack-keystone-x86_64 is &lt;12.0.4~dev11-11.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597611" version="1" comment="venv-openstack-magnum-x86_64 is &lt;5.0.2_5.0.2_5.0.2~dev31-11.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597612" version="1" comment="venv-openstack-manila-x86_64 is &lt;5.1.1~dev5-12.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597613" version="1" comment="venv-openstack-monasca-ceilometer-x86_64 is &lt;1.5.1_1.5.1_1.5.1~dev3-8.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597614" version="1" comment="venv-openstack-monasca-x86_64 is &lt;2.2.2~dev1-11.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597615" version="1" comment="venv-openstack-murano-x86_64 is &lt;4.0.2~dev2-12.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597616" version="1" comment="venv-openstack-neutron-x86_64 is &lt;11.0.9~dev69-13.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597617" version="1" comment="venv-openstack-nova-x86_64 is &lt;16.1.9~dev77-11.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597618" version="1" comment="venv-openstack-octavia-x86_64 is &lt;1.0.6~dev3-12.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597619" version="1" comment="venv-openstack-sahara-x86_64 is &lt;7.0.5~dev4-11.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597620" version="1" comment="venv-openstack-trove-x86_64 is &lt;8.0.2~dev2-11.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597621" version="1" comment="python-Jinja2 is &lt;2.9.6-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531920" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.25-30.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531921" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.25-30.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531922" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.25-30.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531923" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.25-30.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531924" version="1" comment="perl-XML-Twig is &lt;3.44-5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531925" version="1" comment="MozillaFirefox is &lt;78.8.0-112.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531926" version="1" comment="MozillaFirefox-devel is &lt;78.8.0-112.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531927" version="1" comment="MozillaFirefox-translations-common is &lt;78.8.0-112.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597622" version="1" comment="python-cryptography is &lt;2.0.3-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531928" version="1" comment="python-cryptography is &lt;2.1.4-7.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531929" version="1" comment="python3-cryptography is &lt;2.1.4-7.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555941" version="1" comment="grub2 is &lt;2.02-4.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539120" version="1" comment="grub2-i386-pc is &lt;2.02-4.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539122" version="1" comment="grub2-snapper-plugin is &lt;2.02-4.69.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539123" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02-4.69.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539124" version="1" comment="grub2-x86_64-efi is &lt;2.02-4.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539125" version="1" comment="grub2-x86_64-xen is &lt;2.02-4.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531936" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531937" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531938" version="1" comment="openldap2 is &lt;2.4.41-18.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531939" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531940" version="1" comment="openldap2-client is &lt;2.4.41-18.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531941" version="1" comment="openldap2-doc is &lt;2.4.41-18.83.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531942" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555942" version="1" comment="kernel-default is &lt;4.4.180-94.141.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555943" version="1" comment="kernel-default-base is &lt;4.4.180-94.141.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555944" version="1" comment="kernel-default-devel is &lt;4.4.180-94.141.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557127" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.141.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539130" version="1" comment="kernel-devel is &lt;4.4.180-94.141.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539131" version="1" comment="kernel-macros is &lt;4.4.180-94.141.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539132" version="1" comment="kernel-source is &lt;4.4.180-94.141.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555945" version="1" comment="kernel-syms is &lt;4.4.180-94.141.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557129" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531951" version="1" comment="wpa_supplicant is &lt;2.6-15.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531952" version="1" comment="git is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531953" version="1" comment="git-core is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531954" version="1" comment="git-cvs is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531955" version="1" comment="git-daemon is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531957" version="1" comment="git-email is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531958" version="1" comment="git-gui is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531959" version="1" comment="git-svn is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531960" version="1" comment="git-web is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531961" version="1" comment="gitk is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531962" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531963" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531964" version="1" comment="python is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531965" version="1" comment="python-32bit is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531966" version="1" comment="python-base is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531967" version="1" comment="python-base-32bit is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531968" version="1" comment="python-curses is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531969" version="1" comment="python-demo is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531970" version="1" comment="python-devel is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531971" version="1" comment="python-doc is &lt;2.7.18-28.67.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531972" version="1" comment="python-doc-pdf is &lt;2.7.18-28.67.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531973" version="1" comment="python-gdbm is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531974" version="1" comment="python-idle is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531975" version="1" comment="python-tk is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531976" version="1" comment="python-xml is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531977" version="1" comment="MozillaFirefox is &lt;78.6.1-112.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531978" version="1" comment="MozillaFirefox-devel is &lt;78.6.1-112.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531979" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.1-112.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531980" version="1" comment="glib2-lang is &lt;2.48.2-12.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531981" version="1" comment="glib2-tools is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531982" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531983" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531984" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531985" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531986" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531987" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531988" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531989" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531990" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531991" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531994" version="1" comment="libwavpack1 is &lt;4.60.99-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531995" version="1" comment="libnghttp2-14 is &lt;1.39.2-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531996" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531997" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531998" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531999" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532000" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532001" version="1" comment="openssl is &lt;1.0.2j-60.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532002" version="1" comment="openssl-doc is &lt;1.0.2j-60.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597623" version="1" comment="openstack-dashboard is &lt;12.0.5~dev6-3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597624" version="1" comment="python-horizon is &lt;12.0.5~dev6-3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597625" version="1" comment="release-notes-suse-openstack-cloud is &lt;8.20201214-3.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532003" version="1" comment="MozillaFirefox is &lt;78.9.0-112.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532004" version="1" comment="MozillaFirefox-devel is &lt;78.9.0-112.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532005" version="1" comment="MozillaFirefox-translations-common is &lt;78.9.0-112.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664016" version="1" comment="python-Django is &lt;1.11.29-3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676877" version="1" comment="openvpn is &lt;2.3.8-16.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676878" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674029" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr5.5-38.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674007" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr5.5-38.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674030" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr5.5-38.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674031" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr5.5-38.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674010" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr5.5-38.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674027" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.5-30.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674003" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr7.5-30.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674028" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.5-30.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674005" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr7.5-30.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677126" version="1" comment="libz1 is &lt;1.2.8-12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677109" version="1" comment="libz1-32bit is &lt;1.2.8-12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677127" version="1" comment="zlib-devel is &lt;1.2.8-12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662502" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.0-30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662492" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr7.0-30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662503" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.0-30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662494" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr7.0-30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678285" version="1" comment="libfreebl3 is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678251" version="1" comment="libfreebl3-32bit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678286" version="1" comment="libfreebl3-hmac is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678253" version="1" comment="libfreebl3-hmac-32bit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678287" version="1" comment="libsoftokn3 is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678255" version="1" comment="libsoftokn3-32bit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678288" version="1" comment="libsoftokn3-hmac is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678257" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678289" version="1" comment="mozilla-nss is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678259" version="1" comment="mozilla-nss-32bit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678290" version="1" comment="mozilla-nss-certs is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678261" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678512" version="1" comment="mozilla-nss-devel is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678291" version="1" comment="mozilla-nss-sysinit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678264" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678292" version="1" comment="mozilla-nss-tools is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678497" version="1" comment="MozillaFirefox is &lt;91.8.0-112.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678498" version="1" comment="MozillaFirefox-devel is &lt;91.8.0-112.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678499" version="1" comment="MozillaFirefox-translations-common is &lt;91.8.0-112.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677624" version="1" comment="glibc is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677550" version="1" comment="glibc-32bit is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677625" version="1" comment="glibc-devel is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677552" version="1" comment="glibc-devel-32bit is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677553" version="1" comment="glibc-html is &lt;2.22-123.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677554" version="1" comment="glibc-i18ndata is &lt;2.22-123.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677555" version="1" comment="glibc-info is &lt;2.22-123.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677626" version="1" comment="glibc-locale is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677557" version="1" comment="glibc-locale-32bit is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677627" version="1" comment="glibc-profile is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677559" version="1" comment="glibc-profile-32bit is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677628" version="1" comment="nscd is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677943" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671018" version="1" comment="mysql-connector-java is &lt;8.0.25-5.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663799" version="1" comment="MozillaFirefox is &lt;91.5.0-112.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663800" version="1" comment="MozillaFirefox-devel is &lt;91.5.0-112.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663801" version="1" comment="MozillaFirefox-translations-common is &lt;91.5.0-112.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679302" version="1" comment="liblzma5 is &lt;5.0.5-6.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679278" version="1" comment="liblzma5-32bit is &lt;5.0.5-6.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679303" version="1" comment="xz is &lt;5.0.5-6.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679280" version="1" comment="xz-lang is &lt;5.0.5-6.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677635" version="1" comment="libexif12 is &lt;0.6.22-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677562" version="1" comment="libexif12-32bit is &lt;0.6.22-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663701" version="1" comment="openstack-monasca-agent is &lt;2.2.6~dev4-3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663702" version="1" comment="python-monasca-agent is &lt;2.2.6~dev4-3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663703" version="1" comment="spark is &lt;1.6.3-8.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663704" version="1" comment="venv-openstack-monasca-x86_64 is &lt;2.2.2~dev1-11.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663705" version="1" comment="zookeeper-server is &lt;3.4.10-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679319" version="1" comment="kernel-default is &lt;4.4.180-94.161.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679320" version="1" comment="kernel-default-base is &lt;4.4.180-94.161.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679321" version="1" comment="kernel-default-devel is &lt;4.4.180-94.161.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680628" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.161.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679285" version="1" comment="kernel-devel is &lt;4.4.180-94.161.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679286" version="1" comment="kernel-macros is &lt;4.4.180-94.161.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679287" version="1" comment="kernel-source is &lt;4.4.180-94.161.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679322" version="1" comment="kernel-syms is &lt;4.4.180-94.161.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680630" version="1" comment="kgraft-patch-4_4_180-94_161-default is &lt;1-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679548" version="1" comment="gzip is &lt;1.6-9.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679550" version="1" comment="dnsmasq is &lt;2.78-18.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679572" version="1" comment="dnsmasq-utils is &lt;2.78-18.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680006" version="1" comment="git is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680007" version="1" comment="git-core is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680008" version="1" comment="git-cvs is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680009" version="1" comment="git-daemon is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680010" version="1" comment="git-email is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680011" version="1" comment="git-gui is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680012" version="1" comment="git-svn is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680013" version="1" comment="git-web is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680014" version="1" comment="gitk is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680015" version="1" comment="libxml2-2 is &lt;2.9.4-46.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679983" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679984" version="1" comment="libxml2-doc is &lt;2.9.4-46.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680016" version="1" comment="libxml2-tools is &lt;2.9.4-46.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680017" version="1" comment="python-libxml2 is &lt;2.9.4-46.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679549" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-15.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679539" version="1" comment="libSDL-1_2-0-32bit is &lt;1.2.15-15.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680580" version="1" comment="xen is &lt;4.9.4_28-3.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680581" version="1" comment="xen-doc-html is &lt;4.9.4_28-3.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680582" version="1" comment="xen-libs is &lt;4.9.4_28-3.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680583" version="1" comment="xen-libs-32bit is &lt;4.9.4_28-3.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680584" version="1" comment="xen-tools is &lt;4.9.4_28-3.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680585" version="1" comment="xen-tools-domU is &lt;4.9.4_28-3.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663980" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.3-2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663981" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.3-2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663972" version="1" comment="libwebkit2gtk3-lang is &lt;2.34.3-2.82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663982" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.3-2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663983" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.3-2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663984" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.3-2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663985" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.3-2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681235" version="1" comment="cifs-utils is &lt;6.9-9.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664239" version="1" comment="aide is &lt;0.16-20.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680674" version="1" comment="python-Twisted is &lt;15.2.1-9.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682635" version="1" comment="MozillaFirefox is &lt;91.9.0-112.104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682636" version="1" comment="MozillaFirefox-devel is &lt;91.9.0-112.104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682637" version="1" comment="MozillaFirefox-translations-common is &lt;91.9.0-112.104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663987" version="1" comment="zsh is &lt;5.0.5-6.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682675" version="1" comment="bind is &lt;9.9.9P1-63.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682676" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682677" version="1" comment="bind-doc is &lt;9.9.9P1-63.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682678" version="1" comment="bind-libs is &lt;9.9.9P1-63.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682679" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682680" version="1" comment="bind-utils is &lt;9.9.9P1-63.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682319" version="1" comment="e2fsprogs is &lt;1.42.11-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682320" version="1" comment="libcom_err2 is &lt;1.42.11-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682310" version="1" comment="libcom_err2-32bit is &lt;1.42.11-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682321" version="1" comment="libext2fs2 is &lt;1.42.11-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681128" version="1" comment="documentation-suse-openstack-cloud-installation is &lt;8.20211112-1.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681129" version="1" comment="documentation-suse-openstack-cloud-operations is &lt;8.20211112-1.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681130" version="1" comment="documentation-suse-openstack-cloud-opsconsole is &lt;8.20211112-1.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681131" version="1" comment="documentation-suse-openstack-cloud-planning is &lt;8.20211112-1.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681132" version="1" comment="documentation-suse-openstack-cloud-security is &lt;8.20211112-1.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681133" version="1" comment="documentation-suse-openstack-cloud-supplement is &lt;8.20211112-1.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681134" version="1" comment="documentation-suse-openstack-cloud-upstream-admin is &lt;8.20211112-1.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681135" version="1" comment="documentation-suse-openstack-cloud-upstream-user is &lt;8.20211112-1.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681136" version="1" comment="documentation-suse-openstack-cloud-user is &lt;8.20211112-1.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681137" version="1" comment="kibana is &lt;4.6.6-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681138" version="1" comment="openstack-keystone is &lt;12.0.4~dev11-5.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681139" version="1" comment="openstack-keystone-doc is &lt;12.0.4~dev11-5.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681140" version="1" comment="openstack-monasca-notification is &lt;1.10.2~dev4-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681141" version="1" comment="python-keystone is &lt;12.0.4~dev11-5.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681142" version="1" comment="python-monasca-notification is &lt;1.10.2~dev4-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681143" version="1" comment="venv-openstack-keystone-x86_64 is &lt;12.0.4~dev11-11.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681144" version="1" comment="venv-openstack-monasca-x86_64 is &lt;2.2.2~dev1-11.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662499" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr5.0-38.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662487" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr5.0-38.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662500" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr5.0-38.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662501" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr5.0-38.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662490" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr5.0-38.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682642" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682621" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682643" version="1" comment="openldap2 is &lt;2.4.41-18.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682644" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682645" version="1" comment="openldap2-client is &lt;2.4.41-18.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682625" version="1" comment="openldap2-doc is &lt;2.4.41-18.89.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682659" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682638" version="1" comment="gzip is &lt;1.6-9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681316" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.36.0-2.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681317" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.36.0-2.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681309" version="1" comment="libwebkit2gtk3-lang is &lt;2.36.0-2.96.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681318" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.36.0-2.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681319" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.36.0-2.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681320" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.36.0-2.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681321" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.36.0-2.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684081" version="1" comment="curl is &lt;7.37.0-37.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684082" version="1" comment="libcurl4 is &lt;7.37.0-37.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684074" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683677" version="1" comment="ucode-intel is &lt;20220510-13.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684083" version="1" comment="MozillaFirefox is &lt;91.9.0-112.108.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684084" version="1" comment="MozillaFirefox-devel is &lt;91.9.0-112.108.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684085" version="1" comment="MozillaFirefox-translations-common is &lt;91.9.0-112.108.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664107" version="1" comment="expat is &lt;2.1.0-21.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664108" version="1" comment="libexpat1 is &lt;2.1.0-21.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664105" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696333" version="1" comment="postgresql10 is &lt;10.21-4.28.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696334" version="1" comment="postgresql10-contrib is &lt;10.21-4.28.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696064" version="1" comment="postgresql10-docs is &lt;10.21-4.28.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696335" version="1" comment="postgresql10-plperl is &lt;10.21-4.28.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696336" version="1" comment="postgresql10-plpython is &lt;10.21-4.28.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696337" version="1" comment="postgresql10-pltcl is &lt;10.21-4.28.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696338" version="1" comment="postgresql10-server is &lt;10.21-4.28.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696339" version="1" comment="MozillaFirefox is &lt;91.9.1-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696340" version="1" comment="MozillaFirefox-devel is &lt;91.9.1-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696341" version="1" comment="MozillaFirefox-translations-common is &lt;91.9.1-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595040" version="1" comment="python-requests is &lt;2.11.1-6.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696342" version="1" comment="libxml2-2 is &lt;2.9.4-46.54.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696073" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.54.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696074" version="1" comment="libxml2-doc is &lt;2.9.4-46.54.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696343" version="1" comment="libxml2-tools is &lt;2.9.4-46.54.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696344" version="1" comment="python-libxml2 is &lt;2.9.4-46.54.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696345" version="1" comment="libpcre2-16-0 is &lt;10.34-1.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696346" version="1" comment="libpcre2-32-0 is &lt;10.34-1.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696347" version="1" comment="libpcre2-8-0 is &lt;10.34-1.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696348" version="1" comment="libpcre2-posix2 is &lt;10.34-1.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696349" version="1" comment="wpa_supplicant is &lt;2.9-15.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696350" version="1" comment="libecpg6 is &lt;14.3-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696351" version="1" comment="libpq5 is &lt;14.3-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696084" version="1" comment="libpq5-32bit is &lt;14.3-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009697246" version="1" comment="openstack-neutron is &lt;11.0.9~dev69-3.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009697247" version="1" comment="openstack-neutron-dhcp-agent is &lt;11.0.9~dev69-3.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009697248" version="1" comment="openstack-neutron-doc is &lt;11.0.9~dev69-3.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009697249" version="1" comment="openstack-neutron-ha-tool is &lt;11.0.9~dev69-3.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009697250" version="1" comment="openstack-neutron-l3-agent is &lt;11.0.9~dev69-3.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009697251" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;11.0.9~dev69-3.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009697252" version="1" comment="openstack-neutron-macvtap-agent is &lt;11.0.9~dev69-3.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009697253" version="1" comment="openstack-neutron-metadata-agent is &lt;11.0.9~dev69-3.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009697254" version="1" comment="openstack-neutron-metering-agent is &lt;11.0.9~dev69-3.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009697255" version="1" comment="openstack-neutron-openvswitch-agent is &lt;11.0.9~dev69-3.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009697256" version="1" comment="openstack-neutron-server is &lt;11.0.9~dev69-3.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009697257" version="1" comment="python-neutron is &lt;11.0.9~dev69-3.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696352" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.172.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696353" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.172.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696354" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.172.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696355" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.172.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696356" version="1" comment="mailman is &lt;2.1.17-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664690" version="1" comment="libpolkit0 is &lt;0.113-5.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664691" version="1" comment="polkit is &lt;0.113-5.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664692" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696535" version="1" comment="librelp0 is &lt;1.2.15-3.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696357" version="1" comment="MozillaFirefox is &lt;91.10.0-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696358" version="1" comment="MozillaFirefox-devel is &lt;91.10.0-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696359" version="1" comment="MozillaFirefox-translations-common is &lt;91.10.0-112.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664933" version="1" comment="strongswan is &lt;5.1.3-26.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664929" version="1" comment="strongswan-doc is &lt;5.1.3-26.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664934" version="1" comment="strongswan-hmac is &lt;5.1.3-26.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664935" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664936" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696360" version="1" comment="libfreebl3 is &lt;3.68.4-58.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696100" version="1" comment="libfreebl3-32bit is &lt;3.68.4-58.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696361" version="1" comment="libfreebl3-hmac is &lt;3.68.4-58.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696102" version="1" comment="libfreebl3-hmac-32bit is &lt;3.68.4-58.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696362" version="1" comment="libsoftokn3 is &lt;3.68.4-58.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696104" version="1" comment="libsoftokn3-32bit is &lt;3.68.4-58.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696363" version="1" comment="libsoftokn3-hmac is &lt;3.68.4-58.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696106" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.68.4-58.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696364" version="1" comment="mozilla-nss is &lt;3.68.4-58.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696108" version="1" comment="mozilla-nss-32bit is &lt;3.68.4-58.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696365" version="1" comment="mozilla-nss-certs is &lt;3.68.4-58.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696110" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.4-58.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009697258" version="1" comment="mozilla-nss-devel is &lt;3.68.4-58.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696366" version="1" comment="mozilla-nss-sysinit is &lt;3.68.4-58.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696113" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.68.4-58.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696367" version="1" comment="mozilla-nss-tools is &lt;3.68.4-58.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696536" version="1" comment="grub2 is &lt;2.02-137.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696116" version="1" comment="grub2-i386-pc is &lt;2.02-137.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696118" version="1" comment="grub2-snapper-plugin is &lt;2.02-137.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696119" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02-137.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696120" version="1" comment="grub2-x86_64-efi is &lt;2.02-137.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696121" version="1" comment="grub2-x86_64-xen is &lt;2.02-137.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696537" version="1" comment="kernel-default is &lt;4.4.180-94.164.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696538" version="1" comment="kernel-default-base is &lt;4.4.180-94.164.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696539" version="1" comment="kernel-default-devel is &lt;4.4.180-94.164.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696611" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.164.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696126" version="1" comment="kernel-devel is &lt;4.4.180-94.164.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696127" version="1" comment="kernel-macros is &lt;4.4.180-94.164.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696128" version="1" comment="kernel-source is &lt;4.4.180-94.164.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696540" version="1" comment="kernel-syms is &lt;4.4.180-94.164.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696613" version="1" comment="kgraft-patch-4_4_180-94_164-default is &lt;1-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696381" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.36.3-2.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696382" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.36.3-2.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696133" version="1" comment="libwebkit2gtk3-lang is &lt;2.36.3-2.99.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696383" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.36.3-2.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696384" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.36.3-2.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696385" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.36.3-2.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696386" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.36.3-2.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696388" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696389" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696140" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696390" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696142" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696391" version="1" comment="openssl is &lt;1.0.2j-60.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696144" version="1" comment="openssl-doc is &lt;1.0.2j-60.80.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696392" version="1" comment="apache2 is &lt;2.4.23-29.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696146" version="1" comment="apache2-doc is &lt;2.4.23-29.91.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696393" version="1" comment="apache2-example-pages is &lt;2.4.23-29.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696394" version="1" comment="apache2-prefork is &lt;2.4.23-29.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696395" version="1" comment="apache2-utils is &lt;2.4.23-29.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696396" version="1" comment="apache2-worker is &lt;2.4.23-29.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009697259" version="1" comment="python-Twisted is &lt;15.2.1-9.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664687" version="1" comment="log4j is &lt;1.2.15-126.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696541" version="1" comment="golang-github-prometheus-node_exporter is &lt;1.3.0-1.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696152" version="1" comment="fwupdate is &lt;0.5-10.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696153" version="1" comment="fwupdate-efi is &lt;0.5-10.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696154" version="1" comment="libfwup0 is &lt;0.5-10.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696400" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696401" version="1" comment="python3 is &lt;3.4.10-25.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696402" version="1" comment="python3-base is &lt;3.4.10-25.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696403" version="1" comment="python3-curses is &lt;3.4.10-25.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009697260" version="1" comment="python3-devel is &lt;3.4.10-25.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696404" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696405" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696162" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696406" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696164" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696407" version="1" comment="openssl is &lt;1.0.2j-60.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696166" version="1" comment="openssl-doc is &lt;1.0.2j-60.83.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696542" version="1" comment="oracleasm-kmp-default is &lt;2.0.8_k4.4.180_94.164-3.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696408" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-28.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696171" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-28.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696409" version="1" comment="python is &lt;2.7.18-28.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696173" version="1" comment="python-32bit is &lt;2.7.18-28.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696410" version="1" comment="python-base is &lt;2.7.18-28.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696175" version="1" comment="python-base-32bit is &lt;2.7.18-28.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696411" version="1" comment="python-curses is &lt;2.7.18-28.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696412" version="1" comment="python-demo is &lt;2.7.18-28.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696543" version="1" comment="python-devel is &lt;2.7.18-28.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696179" version="1" comment="python-doc is &lt;2.7.18-28.87.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696180" version="1" comment="python-doc-pdf is &lt;2.7.18-28.87.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696413" version="1" comment="python-gdbm is &lt;2.7.18-28.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696414" version="1" comment="python-idle is &lt;2.7.18-28.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696415" version="1" comment="python-tk is &lt;2.7.18-28.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696416" version="1" comment="python-xml is &lt;2.7.18-28.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522597" version="1" comment="sysstat is &lt;12.0.2-10.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557523" version="1" comment="sysstat-isag is &lt;12.0.2-10.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696554" version="1" comment="dpdk is &lt;16.11.9-8.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696196" version="1" comment="dpdk-kmp-default is &lt;16.11.9_k4.4.180_94.164-8.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696555" version="1" comment="dpdk-tools is &lt;16.11.9-8.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700049" version="1" comment="MozillaFirefox is &lt;91.11.0-112.119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700050" version="1" comment="MozillaFirefox-devel is &lt;91.11.0-112.119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700051" version="1" comment="MozillaFirefox-translations-common is &lt;91.11.0-112.119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696544" version="1" comment="rsyslog is &lt;8.24.0-3.58.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696545" version="1" comment="rsyslog-diag-tools is &lt;8.24.0-3.58.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696546" version="1" comment="rsyslog-doc is &lt;8.24.0-3.58.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696547" version="1" comment="rsyslog-module-gssapi is &lt;8.24.0-3.58.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696548" version="1" comment="rsyslog-module-gtls is &lt;8.24.0-3.58.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696549" version="1" comment="rsyslog-module-mysql is &lt;8.24.0-3.58.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696550" version="1" comment="rsyslog-module-pgsql is &lt;8.24.0-3.58.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696551" version="1" comment="rsyslog-module-relp is &lt;8.24.0-3.58.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696552" version="1" comment="rsyslog-module-snmp is &lt;8.24.0-3.58.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696553" version="1" comment="rsyslog-module-udpspoof is &lt;8.24.0-3.58.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696418" version="1" comment="libpcre1 is &lt;8.45-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696199" version="1" comment="libpcre1-32bit is &lt;8.45-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696419" version="1" comment="libpcre16-0 is &lt;8.45-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696556" version="1" comment="libpcrecpp0 is &lt;8.45-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696557" version="1" comment="libpcreposix0 is &lt;8.45-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696558" version="1" comment="pcre-devel is &lt;8.45-8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700082" version="1" comment="git is &lt;2.26.2-27.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666331" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666161" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666332" version="1" comment="libdcerpc0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666163" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666333" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666165" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666334" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666167" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666335" version="1" comment="libndr-standard0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666169" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666336" version="1" comment="libndr0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666171" version="1" comment="libndr0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666337" version="1" comment="libnetapi0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666173" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666338" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666175" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666339" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666177" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666340" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666179" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666341" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666181" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666342" version="1" comment="libsamba-util0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666183" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666343" version="1" comment="libsamdb0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666185" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666344" version="1" comment="libsmbclient0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666187" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666345" version="1" comment="libsmbconf0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666189" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666346" version="1" comment="libsmbldap0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666191" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666347" version="1" comment="libtevent-util0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666193" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666348" version="1" comment="libwbclient0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666195" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666349" version="1" comment="samba is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666350" version="1" comment="samba-client is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666198" version="1" comment="samba-client-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666199" version="1" comment="samba-doc is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666351" version="1" comment="samba-libs is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666201" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666352" version="1" comment="samba-winbind is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666203" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703864" version="1" comment="python-Twisted is &lt;15.2.1-9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666751" version="1" comment="python-Django is &lt;1.11.29-3.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666752" version="1" comment="venv-openstack-aodh-x86_64 is &lt;5.1.1~dev7-12.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666753" version="1" comment="venv-openstack-barbican-x86_64 is &lt;5.0.2~dev3-12.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666754" version="1" comment="venv-openstack-ceilometer-x86_64 is &lt;9.0.8~dev7-12.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666755" version="1" comment="venv-openstack-cinder-x86_64 is &lt;11.2.3~dev29-14.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666756" version="1" comment="venv-openstack-designate-x86_64 is &lt;5.0.3~dev7-12.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666757" version="1" comment="venv-openstack-freezer-x86_64 is &lt;5.0.0.0~xrc2~dev2-10.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666758" version="1" comment="venv-openstack-glance-x86_64 is &lt;15.0.3~dev3-12.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666759" version="1" comment="venv-openstack-heat-x86_64 is &lt;9.0.8~dev22-12.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666760" version="1" comment="venv-openstack-horizon-x86_64 is &lt;12.0.5~dev6-14.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666761" version="1" comment="venv-openstack-ironic-x86_64 is &lt;9.1.8~dev8-12.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666762" version="1" comment="venv-openstack-keystone-x86_64 is &lt;12.0.4~dev11-11.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666763" version="1" comment="venv-openstack-magnum-x86_64 is &lt;5.0.2_5.0.2_5.0.2~dev31-11.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666764" version="1" comment="venv-openstack-manila-x86_64 is &lt;5.1.1~dev5-12.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666765" version="1" comment="venv-openstack-monasca-ceilometer-x86_64 is &lt;1.5.1_1.5.1_1.5.1~dev3-8.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666766" version="1" comment="venv-openstack-monasca-x86_64 is &lt;2.2.2~dev1-11.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666767" version="1" comment="venv-openstack-murano-x86_64 is &lt;4.0.2~dev2-12.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666768" version="1" comment="venv-openstack-neutron-x86_64 is &lt;11.0.9~dev69-13.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666769" version="1" comment="venv-openstack-nova-x86_64 is &lt;16.1.9~dev92-11.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666770" version="1" comment="venv-openstack-octavia-x86_64 is &lt;1.0.6~dev3-12.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666771" version="1" comment="venv-openstack-sahara-x86_64 is &lt;7.0.5~dev4-11.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666772" version="1" comment="venv-openstack-swift-x86_64 is &lt;2.15.2_2.15.2_2.15.2~dev32-11.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666773" version="1" comment="venv-openstack-trove-x86_64 is &lt;8.0.2~dev2-11.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660159" version="1" comment="python-Babel is &lt;2.3.4-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661606" version="1" comment="libsnmp30 is &lt;5.7.3-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661599" version="1" comment="libsnmp30-32bit is &lt;5.7.3-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661607" version="1" comment="net-snmp is &lt;5.7.3-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661608" version="1" comment="perl-SNMP is &lt;5.7.3-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661609" version="1" comment="snmp-mibs is &lt;5.7.3-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707933" version="1" comment="keepalived is &lt;2.0.19-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707934" version="1" comment="python-rsa is &lt;3.4.2-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713935" version="1" comment="ardana-ansible is &lt;8.0+git.1660773729.3789a6d-3.85.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713936" version="1" comment="ardana-cobbler is &lt;8.0+git.1660773402.d845a45-3.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713937" version="1" comment="grafana is &lt;6.7.4-4.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713938" version="1" comment="openstack-heat-templates is &lt;0.0.0+git.1654529662.75fa04a-3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713939" version="1" comment="openstack-murano is &lt;4.0.2~dev3-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713940" version="1" comment="openstack-murano-api is &lt;4.0.2~dev3-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713941" version="1" comment="openstack-murano-doc is &lt;4.0.2~dev3-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713942" version="1" comment="openstack-murano-engine is &lt;4.0.2~dev3-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713943" version="1" comment="python-Django is &lt;1.11.29-3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713944" version="1" comment="python-murano is &lt;4.0.2~dev3-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713945" version="1" comment="rabbitmq-server is &lt;3.6.16-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713946" version="1" comment="rabbitmq-server-plugins is &lt;3.6.16-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713947" version="1" comment="venv-openstack-heat-x86_64 is &lt;9.0.8~dev22-12.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713948" version="1" comment="venv-openstack-horizon-x86_64 is &lt;12.0.5~dev6-14.48.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713949" version="1" comment="venv-openstack-murano-x86_64 is &lt;4.0.2~dev3-12.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662498" version="1" comment="libsndfile1 is &lt;1.0.25-36.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662485" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666978" version="1" comment="elasticsearch is &lt;2.4.2-5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666979" version="1" comment="kafka is &lt;0.10.2.2-5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664953" version="1" comment="logstash is &lt;2.4.1-5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664954" version="1" comment="openstack-monasca-agent is &lt;2.2.6~dev4-3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666980" version="1" comment="openstack-monasca-log-metrics is &lt;0.0.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666981" version="1" comment="openstack-monasca-log-persister is &lt;0.0.1-5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666982" version="1" comment="openstack-monasca-log-transformer is &lt;0.0.1-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666983" version="1" comment="openstack-monasca-persister-java is &lt;1.7.1~a0~dev2-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666984" version="1" comment="openstack-monasca-thresh is &lt;2.1.1-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664960" version="1" comment="python-monasca-agent is &lt;2.2.6~dev4-3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666985" version="1" comment="spark is &lt;1.6.3-8.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666986" version="1" comment="storm is &lt;1.2.3-3.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666987" version="1" comment="storm-nimbus is &lt;1.2.3-3.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666988" version="1" comment="storm-supervisor is &lt;1.2.3-3.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666989" version="1" comment="venv-openstack-aodh-x86_64 is &lt;5.1.1~dev7-12.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666990" version="1" comment="venv-openstack-barbican-x86_64 is &lt;5.0.2~dev3-12.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666991" version="1" comment="venv-openstack-ceilometer-x86_64 is &lt;9.0.8~dev7-12.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666992" version="1" comment="venv-openstack-cinder-x86_64 is &lt;11.2.3~dev29-14.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666993" version="1" comment="venv-openstack-designate-x86_64 is &lt;5.0.3~dev7-12.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666994" version="1" comment="venv-openstack-freezer-x86_64 is &lt;5.0.0.0~xrc2~dev2-10.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666995" version="1" comment="venv-openstack-glance-x86_64 is &lt;15.0.3~dev3-12.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666996" version="1" comment="venv-openstack-heat-x86_64 is &lt;9.0.8~dev22-12.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666997" version="1" comment="venv-openstack-horizon-x86_64 is &lt;12.0.5~dev6-14.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666998" version="1" comment="venv-openstack-ironic-x86_64 is &lt;9.1.8~dev8-12.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666999" version="1" comment="venv-openstack-keystone-x86_64 is &lt;12.0.4~dev11-11.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667000" version="1" comment="venv-openstack-magnum-x86_64 is &lt;5.0.2_5.0.2_5.0.2~dev31-11.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667001" version="1" comment="venv-openstack-manila-x86_64 is &lt;5.1.1~dev5-12.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667002" version="1" comment="venv-openstack-monasca-ceilometer-x86_64 is &lt;1.5.1_1.5.1_1.5.1~dev3-8.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667003" version="1" comment="venv-openstack-monasca-x86_64 is &lt;2.2.2~dev1-11.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667004" version="1" comment="venv-openstack-murano-x86_64 is &lt;4.0.2~dev2-12.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667005" version="1" comment="venv-openstack-neutron-x86_64 is &lt;11.0.9~dev69-13.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667006" version="1" comment="venv-openstack-nova-x86_64 is &lt;16.1.9~dev92-11.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667007" version="1" comment="venv-openstack-octavia-x86_64 is &lt;1.0.6~dev3-12.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667008" version="1" comment="venv-openstack-sahara-x86_64 is &lt;7.0.5~dev4-11.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667009" version="1" comment="venv-openstack-swift-x86_64 is &lt;2.15.2_2.15.2_2.15.2~dev32-11.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667010" version="1" comment="venv-openstack-trove-x86_64 is &lt;8.0.2~dev2-11.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667011" version="1" comment="zookeeper-server is &lt;3.4.10-3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664693" version="1" comment="clamav is &lt;0.103.5-33.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666154" version="1" comment="xen is &lt;4.9.4_26-3.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666155" version="1" comment="xen-doc-html is &lt;4.9.4_26-3.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666156" version="1" comment="xen-libs is &lt;4.9.4_26-3.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666157" version="1" comment="xen-libs-32bit is &lt;4.9.4_26-3.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666158" version="1" comment="xen-tools is &lt;4.9.4_26-3.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666159" version="1" comment="xen-tools-domU is &lt;4.9.4_26-3.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666922" version="1" comment="kernel-default is &lt;4.4.180-94.153.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666923" version="1" comment="kernel-default-base is &lt;4.4.180-94.153.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666924" version="1" comment="kernel-default-devel is &lt;4.4.180-94.153.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667641" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.153.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666898" version="1" comment="kernel-devel is &lt;4.4.180-94.153.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666899" version="1" comment="kernel-macros is &lt;4.4.180-94.153.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666900" version="1" comment="kernel-source is &lt;4.4.180-94.153.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666925" version="1" comment="kernel-syms is &lt;4.4.180-94.153.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667643" version="1" comment="kgraft-patch-4_4_180-94_153-default is &lt;1-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716729" version="1" comment="python-waitress is &lt;1.4.3-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717342" version="1" comment="python-Mako is &lt;1.0.7-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717341" version="1" comment="apache2-mod_wsgi is &lt;4.4.13-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723313" version="1" comment="python-Twisted is &lt;15.2.1-9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662251" version="1" comment="libvirt is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662252" version="1" comment="libvirt-admin is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662253" version="1" comment="libvirt-client is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662254" version="1" comment="libvirt-daemon is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662255" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662256" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662257" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662170" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662258" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662259" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662260" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662261" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662262" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662263" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662264" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662265" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662266" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662267" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662268" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662269" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662183" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662270" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662271" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662272" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662273" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662188" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662274" version="1" comment="libvirt-doc is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662275" version="1" comment="libvirt-libs is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662276" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662277" version="1" comment="libvirt-nss is &lt;3.3.0-5.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720754" version="1" comment="git is &lt;2.26.2-27.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667335" version="1" comment="libvirglrenderer0 is &lt;0.5.0-12.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666236" version="1" comment="expat is &lt;2.1.0-21.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666237" version="1" comment="libexpat1 is &lt;2.1.0-21.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666209" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666234" version="1" comment="libtiff5 is &lt;4.0.9-44.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666205" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666235" version="1" comment="tiff is &lt;4.0.9-44.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668119" version="1" comment="tcpdump is &lt;4.9.2-14.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668404" version="1" comment="cobbler is &lt;2.6.6-49.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667934" version="1" comment="xerces-j2 is &lt;2.8.1-268.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667935" version="1" comment="xerces-j2-xml-apis is &lt;2.8.1-268.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667936" version="1" comment="xerces-j2-xml-resolver is &lt;2.8.1-268.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668887" version="1" comment="MozillaFirefox is &lt;91.6.0-112.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668888" version="1" comment="MozillaFirefox-devel is &lt;91.6.0-112.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668889" version="1" comment="MozillaFirefox-translations-common is &lt;91.6.0-112.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667937" version="1" comment="ucode-intel is &lt;20220207-13.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663078" version="1" comment="apache2 is &lt;2.4.23-29.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663071" version="1" comment="apache2-doc is &lt;2.4.23-29.83.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663079" version="1" comment="apache2-example-pages is &lt;2.4.23-29.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663080" version="1" comment="apache2-prefork is &lt;2.4.23-29.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663081" version="1" comment="apache2-utils is &lt;2.4.23-29.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663082" version="1" comment="apache2-worker is &lt;2.4.23-29.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669342" version="1" comment="cyrus-sasl is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669310" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669343" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669312" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669344" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669345" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669315" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669346" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669317" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669347" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669319" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669348" version="1" comment="libsasl2-3 is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669321" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669696" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.5-2.85.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669697" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.5-2.85.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669688" version="1" comment="libwebkit2gtk3-lang is &lt;2.34.5-2.85.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669698" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.5-2.85.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669699" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.5-2.85.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669700" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.5-2.85.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669701" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.5-2.85.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669382" version="1" comment="expat is &lt;2.1.0-21.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669383" version="1" comment="libexpat1 is &lt;2.1.0-21.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669384" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670824" version="1" comment="zsh is &lt;5.0.5-6.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667847" version="1" comment="python-Twisted is &lt;15.2.1-9.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671801" version="1" comment="kernel-default is &lt;4.4.180-94.156.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671802" version="1" comment="kernel-default-base is &lt;4.4.180-94.156.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671803" version="1" comment="kernel-default-devel is &lt;4.4.180-94.156.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671811" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.156.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671768" version="1" comment="kernel-devel is &lt;4.4.180-94.156.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671769" version="1" comment="kernel-macros is &lt;4.4.180-94.156.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671770" version="1" comment="kernel-source is &lt;4.4.180-94.156.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671804" version="1" comment="kernel-syms is &lt;4.4.180-94.156.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671813" version="1" comment="kgraft-patch-4_4_180-94_156-default is &lt;1-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671783" version="1" comment="MozillaFirefox is &lt;91.6.1-112.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671784" version="1" comment="MozillaFirefox-devel is &lt;91.6.1-112.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671785" version="1" comment="MozillaFirefox-translations-common is &lt;91.6.1-112.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670264" version="1" comment="javapackages-filesystem is &lt;5.3.1-14.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670816" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.6-2.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670817" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.6-2.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670802" version="1" comment="libwebkit2gtk3-lang is &lt;2.34.6-2.88.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670818" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.6-2.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670819" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.6-2.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670820" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.6-2.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670821" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.6-2.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670823" version="1" comment="libcaca0 is &lt;0.99.beta18-14.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672571" version="1" comment="MozillaFirefox is &lt;91.7.0-112.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672572" version="1" comment="MozillaFirefox-devel is &lt;91.7.0-112.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672573" version="1" comment="MozillaFirefox-translations-common is &lt;91.7.0-112.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671277" version="1" comment="expat is &lt;2.1.0-21.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671278" version="1" comment="libexpat1 is &lt;2.1.0-21.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671275" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673055" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673056" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673023" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673057" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673025" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673058" version="1" comment="openssl is &lt;1.0.2j-60.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673027" version="1" comment="openssl-doc is &lt;1.0.2j-60.75.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672567" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.322-27.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672568" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.322-27.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672569" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.322-27.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672570" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.322-27.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670849" version="1" comment="python-lxml is &lt;3.6.1-8.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673031" version="1" comment="glibc is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673010" version="1" comment="glibc-32bit is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673032" version="1" comment="glibc-devel is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673012" version="1" comment="glibc-devel-32bit is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673013" version="1" comment="glibc-html is &lt;2.22-119.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673014" version="1" comment="glibc-i18ndata is &lt;2.22-119.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673015" version="1" comment="glibc-info is &lt;2.22-119.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673033" version="1" comment="glibc-locale is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673017" version="1" comment="glibc-locale-32bit is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673034" version="1" comment="glibc-profile is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673019" version="1" comment="glibc-profile-32bit is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673035" version="1" comment="nscd is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673758" version="1" comment="apache2 is &lt;2.4.23-29.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673736" version="1" comment="apache2-doc is &lt;2.4.23-29.88.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673759" version="1" comment="apache2-example-pages is &lt;2.4.23-29.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673760" version="1" comment="apache2-prefork is &lt;2.4.23-29.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673761" version="1" comment="apache2-utils is &lt;2.4.23-29.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673762" version="1" comment="apache2-worker is &lt;2.4.23-29.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734278" version="1" comment="git is &lt;2.26.2-27.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750543" version="1" comment="openstack-cinder is &lt;11.2.3~dev29-3.31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750544" version="1" comment="openstack-cinder-api is &lt;11.2.3~dev29-3.31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750545" version="1" comment="openstack-cinder-backup is &lt;11.2.3~dev29-3.31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750546" version="1" comment="openstack-cinder-doc is &lt;11.2.3~dev29-3.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750547" version="1" comment="openstack-cinder-scheduler is &lt;11.2.3~dev29-3.31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750548" version="1" comment="openstack-cinder-volume is &lt;11.2.3~dev29-3.31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750549" version="1" comment="openstack-nova is &lt;16.1.9~dev92-3.51.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750550" version="1" comment="openstack-nova-api is &lt;16.1.9~dev92-3.51.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750551" version="1" comment="openstack-nova-cells is &lt;16.1.9~dev92-3.51.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750552" version="1" comment="openstack-nova-compute is &lt;16.1.9~dev92-3.51.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750553" version="1" comment="openstack-nova-conductor is &lt;16.1.9~dev92-3.51.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750554" version="1" comment="openstack-nova-console is &lt;16.1.9~dev92-3.51.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750555" version="1" comment="openstack-nova-consoleauth is &lt;16.1.9~dev92-3.51.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750556" version="1" comment="openstack-nova-doc is &lt;16.1.9~dev92-3.51.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750557" version="1" comment="openstack-nova-novncproxy is &lt;16.1.9~dev92-3.51.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750558" version="1" comment="openstack-nova-placement-api is &lt;16.1.9~dev92-3.51.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750559" version="1" comment="openstack-nova-scheduler is &lt;16.1.9~dev92-3.51.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750560" version="1" comment="openstack-nova-serialproxy is &lt;16.1.9~dev92-3.51.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750561" version="1" comment="openstack-nova-vncproxy is &lt;16.1.9~dev92-3.51.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750562" version="1" comment="python-cinder is &lt;11.2.3~dev29-3.31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750563" version="1" comment="python-nova is &lt;16.1.9~dev92-3.51.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750564" version="1" comment="python-oslo.utils is &lt;3.28.4-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750565" version="1" comment="venv-openstack-aodh-x86_64 is &lt;5.1.1~dev7-12.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750566" version="1" comment="venv-openstack-barbican-x86_64 is &lt;5.0.2~dev3-12.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750567" version="1" comment="venv-openstack-ceilometer-x86_64 is &lt;9.0.8~dev7-12.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750568" version="1" comment="venv-openstack-cinder-x86_64 is &lt;11.2.3~dev29-14.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750569" version="1" comment="venv-openstack-designate-x86_64 is &lt;5.0.3~dev7-12.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750570" version="1" comment="venv-openstack-freezer-x86_64 is &lt;5.0.0.0~xrc2~dev2-10.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750571" version="1" comment="venv-openstack-glance-x86_64 is &lt;15.0.3~dev3-12.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750572" version="1" comment="venv-openstack-heat-x86_64 is &lt;9.0.8~dev22-12.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750573" version="1" comment="venv-openstack-horizon-x86_64 is &lt;12.0.5~dev6-14.50.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750574" version="1" comment="venv-openstack-ironic-x86_64 is &lt;9.1.8~dev8-12.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750575" version="1" comment="venv-openstack-keystone-x86_64 is &lt;12.0.4~dev11-11.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750576" version="1" comment="venv-openstack-magnum-x86_64 is &lt;5.0.2_5.0.2_5.0.2~dev31-11.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750577" version="1" comment="venv-openstack-manila-x86_64 is &lt;5.1.1~dev5-12.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750578" version="1" comment="venv-openstack-monasca-ceilometer-x86_64 is &lt;1.5.1_1.5.1_1.5.1~dev3-8.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750579" version="1" comment="venv-openstack-monasca-x86_64 is &lt;2.2.2~dev1-11.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750580" version="1" comment="venv-openstack-murano-x86_64 is &lt;4.0.2~dev3-12.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750581" version="1" comment="venv-openstack-neutron-x86_64 is &lt;11.0.9~dev69-13.48.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750582" version="1" comment="venv-openstack-nova-x86_64 is &lt;16.1.9~dev92-11.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750583" version="1" comment="venv-openstack-octavia-x86_64 is &lt;1.0.6~dev3-12.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750584" version="1" comment="venv-openstack-sahara-x86_64 is &lt;7.0.5~dev4-11.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750585" version="1" comment="venv-openstack-swift-x86_64 is &lt;2.15.2_2.15.2_2.15.2~dev32-11.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750586" version="1" comment="venv-openstack-trove-x86_64 is &lt;8.0.2~dev2-11.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755532" version="1" comment="git is &lt;2.26.2-27.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752243" version="1" comment="dnsmasq-utils is &lt;2.78-18.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756575" version="1" comment="python-cryptography is &lt;2.0.3-3.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756576" version="1" comment="venv-openstack-aodh-x86_64 is &lt;5.1.1~dev7-12.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756577" version="1" comment="venv-openstack-barbican-x86_64 is &lt;5.0.2~dev3-12.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756578" version="1" comment="venv-openstack-ceilometer-x86_64 is &lt;9.0.8~dev7-12.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756579" version="1" comment="venv-openstack-cinder-x86_64 is &lt;11.2.3~dev29-14.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756580" version="1" comment="venv-openstack-designate-x86_64 is &lt;5.0.3~dev7-12.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756581" version="1" comment="venv-openstack-freezer-x86_64 is &lt;5.0.0.0~xrc2~dev2-10.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756582" version="1" comment="venv-openstack-glance-x86_64 is &lt;15.0.3~dev3-12.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756583" version="1" comment="venv-openstack-heat-x86_64 is &lt;9.0.8~dev22-12.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756584" version="1" comment="venv-openstack-horizon-x86_64 is &lt;12.0.5~dev6-14.52.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756585" version="1" comment="venv-openstack-ironic-x86_64 is &lt;9.1.8~dev8-12.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756586" version="1" comment="venv-openstack-keystone-x86_64 is &lt;12.0.4~dev11-11.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756587" version="1" comment="venv-openstack-magnum-x86_64 is &lt;5.0.2_5.0.2_5.0.2~dev31-11.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756588" version="1" comment="venv-openstack-manila-x86_64 is &lt;5.1.1~dev5-12.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756589" version="1" comment="venv-openstack-monasca-ceilometer-x86_64 is &lt;1.5.1_1.5.1_1.5.1~dev3-8.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756590" version="1" comment="venv-openstack-monasca-x86_64 is &lt;2.2.2~dev1-11.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756591" version="1" comment="venv-openstack-murano-x86_64 is &lt;4.0.2~dev3-12.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756592" version="1" comment="venv-openstack-neutron-x86_64 is &lt;11.0.9~dev69-13.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756593" version="1" comment="venv-openstack-nova-x86_64 is &lt;16.1.9~dev92-11.48.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756594" version="1" comment="venv-openstack-octavia-x86_64 is &lt;1.0.6~dev3-12.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756595" version="1" comment="venv-openstack-sahara-x86_64 is &lt;7.0.5~dev4-11.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756596" version="1" comment="venv-openstack-swift-x86_64 is &lt;2.15.2_2.15.2_2.15.2~dev32-11.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756597" version="1" comment="venv-openstack-trove-x86_64 is &lt;8.0.2~dev2-11.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757256" version="1" comment="openstack-heat is &lt;9.0.8~dev22-3.30.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757257" version="1" comment="openstack-heat-api is &lt;9.0.8~dev22-3.30.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757258" version="1" comment="openstack-heat-api-cfn is &lt;9.0.8~dev22-3.30.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757259" version="1" comment="openstack-heat-api-cloudwatch is &lt;9.0.8~dev22-3.30.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757260" version="1" comment="openstack-heat-doc is &lt;9.0.8~dev22-3.30.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757261" version="1" comment="openstack-heat-engine is &lt;9.0.8~dev22-3.30.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757262" version="1" comment="openstack-heat-plugin-heat_docker is &lt;9.0.8~dev22-3.30.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757263" version="1" comment="openstack-heat-test is &lt;9.0.8~dev22-3.30.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757264" version="1" comment="python-Werkzeug is &lt;0.12.2-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757265" version="1" comment="python-heat is &lt;9.0.8~dev22-3.30.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757266" version="1" comment="venv-openstack-designate-x86_64 is &lt;5.0.3~dev7-12.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757267" version="1" comment="venv-openstack-heat-x86_64 is &lt;9.0.8~dev22-12.51.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757268" version="1" comment="venv-openstack-magnum-x86_64 is &lt;5.0.2_5.0.2_5.0.2~dev31-11.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757269" version="1" comment="venv-openstack-octavia-x86_64 is &lt;1.0.6~dev3-12.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757270" version="1" comment="venv-openstack-sahara-x86_64 is &lt;7.0.5~dev4-11.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764534" version="1" comment="libwebpmux1 is &lt;0.4.3-4.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767075" version="1" comment="python-sqlparse is &lt;0.2.3-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764069" version="1" comment="python-tornado is &lt;4.4.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771825" version="1" comment="python-Django is &lt;1.11.29-3.48.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738555" version="1" comment="python-swift3 is &lt;1.7.0.dev372-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679547" version="1" comment="javapackages-filesystem is &lt;5.3.1-14.7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781690" version="1" comment="python-Django is &lt;1.11.29-3.51.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798108" version="1" comment="libwebpmux1 is &lt;0.4.3-4.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799876" version="1" comment="python-gevent is &lt;1.1.2-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732000" version="1" comment="python-setuptools is &lt;36.5.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800622" version="1" comment="python-urllib3 is &lt;1.25.10-5.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802097" version="1" comment="python-Django is &lt;1.11.29-3.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740121" version="1" comment="git is &lt;2.26.2-27.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803605" version="1" comment="python-urllib3 is &lt;1.25.10-5.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810414" version="1" comment="python-Pillow is &lt;4.2.1-3.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744502" version="1" comment="python-Django is &lt;1.11.29-3.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729989" version="1" comment="openstack-barbican is &lt;5.0.2~dev3-3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729990" version="1" comment="openstack-barbican-api is &lt;5.0.2~dev3-3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729991" version="1" comment="openstack-barbican-doc is &lt;5.0.2~dev3-3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729992" version="1" comment="openstack-barbican-keystone-listener is &lt;5.0.2~dev3-3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729993" version="1" comment="openstack-barbican-retry is &lt;5.0.2~dev3-3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729994" version="1" comment="openstack-barbican-worker is &lt;5.0.2~dev3-3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729995" version="1" comment="python-barbican is &lt;5.0.2~dev3-3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729996" version="1" comment="venv-openstack-barbican-x86_64 is &lt;5.0.2~dev3-12.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009741576" version="1" comment="python-cffi is &lt;1.10.0-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853579" version="1" comment="python-Django is &lt;1.11.29-3.62.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853580" version="1" comment="venv-openstack-horizon-x86_64 is &lt;12.0.5~dev6-14.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854664" version="1" comment="python-Pillow is &lt;4.2.1-3.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854665" version="1" comment="venv-openstack-horizon-x86_64 is &lt;12.0.5~dev6-14.58.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845117" version="1" comment="python-Pillow is &lt;4.2.1-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851290" version="1" comment="python-Django is &lt;1.11.29-3.59.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851291" version="1" comment="venv-openstack-horizon-x86_64 is &lt;12.0.5~dev6-14.54.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597626" version="1" comment="nodejs6 is &lt;6.14.3-11.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597627" version="1" comment="ruby2.1-rubygem-sprockets-2_12 is &lt;2.12.5-1.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597628" version="1" comment="crowbar is &lt;5.0+git.1528696845.81a7b5d0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597629" version="1" comment="crowbar-core is &lt;5.0+git.1533887407.6e9b0412d-3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597630" version="1" comment="crowbar-core-branding-upstream is &lt;5.0+git.1533887407.6e9b0412d-3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597631" version="1" comment="crowbar-devel is &lt;5.0+git.1528696845.81a7b5d0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597632" version="1" comment="crowbar-ha is &lt;5.0+git.1530177874.35b9099-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597633" version="1" comment="crowbar-init is &lt;5.0+git.1520420379.d5bbb35-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597634" version="1" comment="crowbar-openstack is &lt;5.0+git.1534167599.d325ef804-4.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597635" version="1" comment="crowbar-ui is &lt;1.2.0+git.1533844061.4ac8e723-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597636" version="1" comment="couchdb is &lt;1.7.2-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597637" version="1" comment="nodejs6 is &lt;6.14.4-11.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597924" version="1" comment="crowbar is &lt;5.0+git.1551088826.010c0399-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597925" version="1" comment="crowbar-core is &lt;5.0+git.1552461227.43e65d269-3.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597926" version="1" comment="crowbar-core-branding-upstream is &lt;5.0+git.1552461227.43e65d269-3.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597927" version="1" comment="crowbar-devel is &lt;5.0+git.1551088826.010c0399-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597928" version="1" comment="crowbar-ha is &lt;5.0+git.1553248675.7e103ea-3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597929" version="1" comment="crowbar-openstack is &lt;5.0+git.1554709170.195ba0e26-4.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597930" version="1" comment="documentation-suse-openstack-cloud-deployment is &lt;8.20190329-1.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597638" version="1" comment="ruby2.1-rubygem-rack is &lt;1.6.11-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597639" version="1" comment="ruby2.1-rubygem-activejob-4_2 is &lt;4.2.9-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597640" version="1" comment="crowbar-core is &lt;5.0+git.1558533551.8d8ed2058-3.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597641" version="1" comment="crowbar-core-branding-SOC is &lt;5.0-10.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597642" version="1" comment="crowbar-core-branding-upstream is &lt;5.0+git.1558533551.8d8ed2058-3.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597643" version="1" comment="crowbar-ha is &lt;5.0+git.1559282566.6b06ca3-3.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597644" version="1" comment="crowbar-openstack is &lt;5.0+git.1559335140.62bb4c014-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597645" version="1" comment="documentation-suse-openstack-cloud-deployment is &lt;8.20190521-1.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597646" version="1" comment="nodejs6 is &lt;6.17.0-11.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597647" version="1" comment="ruby2.1-rubygem-rails-html-sanitizer is &lt;1.0.3-8.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597648" version="1" comment="ruby2.1-rubygem-loofah is &lt;2.0.2-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597649" version="1" comment="crowbar-core is &lt;5.0+git.1565280360.01fed6905-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597650" version="1" comment="crowbar-core-branding-upstream is &lt;5.0+git.1565280360.01fed6905-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597651" version="1" comment="crowbar-ha is &lt;5.0+git.1562069707.e2de18c-3.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597652" version="1" comment="crowbar-openstack is &lt;5.0+git.1565270683.ea6e63d87-4.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597653" version="1" comment="crowbar-ui is &lt;1.2.0+git.1563181545.65360af5-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597654" version="1" comment="documentation-suse-openstack-cloud-deployment is &lt;8.20190805-1.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597655" version="1" comment="crowbar-core is &lt;5.0+git.1569597589.1f025c557-3.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597656" version="1" comment="crowbar-core-branding-upstream is &lt;5.0+git.1569597589.1f025c557-3.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597657" version="1" comment="crowbar-ha is &lt;5.0+git.1567673535.607aada-3.26.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597658" version="1" comment="crowbar-openstack is &lt;5.0+git.1570141351.058c8bd44-4.31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597659" version="1" comment="crowbar-ui is &lt;1.2.0+git.1568396400.0344a727-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597660" version="1" comment="ruby2.1-rubygem-easy_diff is &lt;1.0.0-3.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597661" version="1" comment="ruby2.1-rubygem-haml is &lt;4.0.6-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597662" version="1" comment="couchdb is &lt;1.7.2-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597663" version="1" comment="ruby2.1-rubygem-loofah is &lt;2.0.2-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597664" version="1" comment="nodejs6 is &lt;6.16.0-11.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597665" version="1" comment="nodejs6 is &lt;6.17.0-11.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597666" version="1" comment="ruby2.1-rubygem-actionpack-4_2 is &lt;4.2.9-7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597667" version="1" comment="crowbar-core is &lt;5.0+git.1585575551.16781d00d-3.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597668" version="1" comment="crowbar-core-branding-upstream is &lt;5.0+git.1585575551.16781d00d-3.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597669" version="1" comment="crowbar-ha is &lt;5.0+git.1585316176.344190f-3.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597670" version="1" comment="crowbar-openstack is &lt;5.0+git.1585304226.2164b7895-4.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597671" version="1" comment="documentation-suse-openstack-cloud-deployment is &lt;8.20200319-1.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597672" version="1" comment="ruby2.1-rubygem-puma is &lt;2.16.0-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597673" version="1" comment="nodejs6 is &lt;6.17.1-11.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597674" version="1" comment="crowbar-core is &lt;5.0+git.1593156248.55bbdb26d-3.41.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597675" version="1" comment="crowbar-core-branding-upstream is &lt;5.0+git.1593156248.55bbdb26d-3.41.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597676" version="1" comment="crowbar-openstack is &lt;5.0+git.1593085772.64c4ab43c-4.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597677" version="1" comment="documentation-suse-openstack-cloud-deployment is &lt;8.20200527-1.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597678" version="1" comment="ruby2.1-rubygem-activeresource is &lt;4.0.0-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597679" version="1" comment="ruby2.1-rubygem-crowbar-client is &lt;3.9.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597680" version="1" comment="ruby2.1-rubygem-json-1_7 is &lt;1.7.7-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597681" version="1" comment="ruby2.1-rubygem-puma is &lt;2.16.0-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597682" version="1" comment="ruby2.1-rubygem-actionview-4_2 is &lt;4.2.9-9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597683" version="1" comment="ruby2.1-rubygem-activesupport-4_2 is &lt;4.2.9-7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597684" version="1" comment="nodejs6 is &lt;6.17.1-11.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597685" version="1" comment="ruby2.1-rubygem-rack is &lt;1.6.13-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597686" version="1" comment="ruby2.1-rubygem-actionview-4_2 is &lt;4.2.9-9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597687" version="1" comment="ruby2.1-rubygem-activesupport-4_2 is &lt;4.2.9-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597688" version="1" comment="crowbar-core is &lt;5.0+git.1600432272.b3ad722f0-3.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597689" version="1" comment="crowbar-core-branding-upstream is &lt;5.0+git.1600432272.b3ad722f0-3.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597690" version="1" comment="crowbar-openstack is &lt;5.0+git.1599037158.5c4d07480-4.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597691" version="1" comment="documentation-suse-openstack-cloud-deployment is &lt;8.20201007-1.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597692" version="1" comment="ruby2.1-rubygem-crowbar-client is &lt;3.9.3-1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597693" version="1" comment="nodejs6 is &lt;6.17.1-11.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597694" version="1" comment="crowbar-core is &lt;5.0+git.1582968668.1a55c77c5-3.35.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597695" version="1" comment="crowbar-core-branding-upstream is &lt;5.0+git.1582968668.1a55c77c5-3.35.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597696" version="1" comment="crowbar-ha is &lt;5.0+git.1574286229.e0364c3-3.29.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597697" version="1" comment="crowbar-openstack is &lt;5.0+git.1582911795.5081ef1da-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597698" version="1" comment="crowbar-ui is &lt;1.2.0+git.1575896697.a01a3a08-3.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597699" version="1" comment="ruby2.1-rubygem-crowbar-client is &lt;3.9.1-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597700" version="1" comment="ruby2.1-rubygem-puma is &lt;2.16.0-3.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597701" version="1" comment="ruby2.1-rubygem-actionview-4_2 is &lt;4.2.9-9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597702" version="1" comment="ruby2.1-rubygem-actionpack-4_2 is &lt;4.2.9-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597703" version="1" comment="ruby2.1-rubygem-actionpack-4_2 is &lt;4.2.9-7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597704" version="1" comment="ruby2.1-rubygem-nokogiri is &lt;1.6.1-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626607" version="1" comment="crowbar-core is &lt;5.0+git.1622489449.a8e60e238-3.50.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626608" version="1" comment="crowbar-core-branding-upstream is &lt;5.0+git.1622489449.a8e60e238-3.50.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626609" version="1" comment="crowbar-openstack is &lt;5.0+git.1616001417.67fd9c2a1-4.52.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626610" version="1" comment="documentation-suse-openstack-cloud-deployment is &lt;8.20210512-1.32.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624469" version="1" comment="ruby2.1-rubygem-activerecord-session_store is &lt;0.1.2-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628172" version="1" comment="ruby2.1-rubygem-puma is &lt;2.16.0-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631285" version="1" comment="ruby2.1-rubygem-addressable is &lt;2.3.6-3.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633709" version="1" comment="ruby2.1-rubygem-activerecord-4_2 is &lt;4.2.9-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597763" version="1" comment="crowbar-ha is &lt;5.0+git.1610564036.b75ee1b-3.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597764" version="1" comment="crowbar-openstack is &lt;5.0+git.1610402513.08dca931e-4.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597765" version="1" comment="sleshammer-aarch64 is &lt;0.8.0-0.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597766" version="1" comment="sleshammer-ppc64le is &lt;0.8.0-0.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597767" version="1" comment="sleshammer-s390x is &lt;0.8.0-0.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597768" version="1" comment="sleshammer-x86_64 is &lt;0.8.0-0.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656093" version="1" comment="documentation-suse-openstack-cloud-deployment is &lt;8.20210806-1.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656094" version="1" comment="ruby2.1-rubygem-puma is &lt;2.16.0-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654647" version="1" comment="ruby2.1-rubygem-redcarpet is &lt;3.2.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597705" version="1" comment="crowbar-core is &lt;5.0+git.1606840757.839a64745-3.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597706" version="1" comment="crowbar-core-branding-upstream is &lt;5.0+git.1606840757.839a64745-3.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597707" version="1" comment="crowbar-openstack is &lt;5.0+git.1604938523.ded915845-4.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009597708" version="1" comment="ruby2.1-rubygem-crowbar-client is &lt;3.9.3-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681145" version="1" comment="documentation-suse-openstack-cloud-deployment is &lt;8.20211112-1.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009697261" version="1" comment="ruby2.1-rubygem-yajl-ruby is &lt;1.3.1-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009697262" version="1" comment="ruby2.1-rubygem-sinatra is &lt;1.4.6-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701250" version="1" comment="ruby2.1-rubygem-rack is &lt;1.6.13-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702287" version="1" comment="ruby2.1-rubygem-tzinfo is &lt;1.2.2-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707378" version="1" comment="ruby2.1-rubygem-rails-html-sanitizer is &lt;1.0.3-8.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710628" version="1" comment="ruby2.1-rubygem-puma is &lt;2.16.0-3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716331" version="1" comment="ruby2.1-rubygem-actionview-4_2 is &lt;4.2.9-9.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721957" version="1" comment="ruby2.1-rubygem-activesupport-4_2 is &lt;4.2.9-7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722322" version="1" comment="ruby2.1-rubygem-nokogiri is &lt;1.6.1-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721419" version="1" comment="ruby2.1-rubygem-loofah is &lt;2.0.2-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747989" version="1" comment="ruby2.1-rubygem-rack is &lt;1.6.13-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772456" version="1" comment="ruby2.1-rubygem-actionpack-4_2 is &lt;4.2.9-7.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781348" version="1" comment="ruby2.1-rubygem-rails-html-sanitizer is &lt;1.0.3-8.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738116" version="1" comment="ruby2.1-rubygem-actionpack-4_2 is &lt;4.2.9-7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009736847" version="1" comment="ruby2.1-rubygem-activerecord-4_2 is &lt;4.2.9-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742727" version="1" comment="ruby2.1-rubygem-activerecord-4_2 is &lt;4.2.9-6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009736713" version="1" comment="ruby2.1-rubygem-activesupport-4_2 is &lt;4.2.9-7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009736848" version="1" comment="ruby2.1-rubygem-rack is &lt;1.6.13-3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853581" version="1" comment="ruby2.1-rubygem-rack is &lt;1.6.13-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549489" version="1" comment="apache2 is &lt;2.4.23-29.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532285" version="1" comment="apache2-doc is &lt;2.4.23-29.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549490" version="1" comment="apache2-example-pages is &lt;2.4.23-29.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549491" version="1" comment="apache2-prefork is &lt;2.4.23-29.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549492" version="1" comment="apache2-utils is &lt;2.4.23-29.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549493" version="1" comment="apache2-worker is &lt;2.4.23-29.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549494" version="1" comment="libquicktime0 is &lt;1.2.4-14.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549495" version="1" comment="libical1 is &lt;1.0.1-16.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549496" version="1" comment="libical1-32bit is &lt;1.0.1-16.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549497" version="1" comment="libpoppler-glib8 is &lt;0.43.0-16.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549498" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-16.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549499" version="1" comment="libpoppler60 is &lt;0.43.0-16.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549500" version="1" comment="poppler-tools is &lt;0.43.0-16.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552495" version="1" comment="libsystemd0 is &lt;228-150.9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552496" version="1" comment="libsystemd0-32bit is &lt;228-150.9.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552497" version="1" comment="libudev1 is &lt;228-150.9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552498" version="1" comment="libudev1-32bit is &lt;228-150.9.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552499" version="1" comment="systemd is &lt;228-150.9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552500" version="1" comment="systemd-32bit is &lt;228-150.9.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519201" version="1" comment="systemd-bash-completion is &lt;228-150.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552501" version="1" comment="systemd-sysvinit is &lt;228-150.9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552502" version="1" comment="udev is &lt;228-150.9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549504" version="1" comment="libmysqlclient18 is &lt;10.0.31-29.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547567" version="1" comment="libmysqlclient18-32bit is &lt;10.0.31-29.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549505" version="1" comment="mariadb is &lt;10.0.31-29.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549506" version="1" comment="mariadb-client is &lt;10.0.31-29.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549507" version="1" comment="mariadb-errormessages is &lt;10.0.31-29.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549508" version="1" comment="mariadb-tools is &lt;10.0.31-29.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549509" version="1" comment="libwireshark8 is &lt;2.2.8-48.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549510" version="1" comment="libwiretap6 is &lt;2.2.8-48.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549511" version="1" comment="libwscodecs1 is &lt;2.2.8-48.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549512" version="1" comment="libwsutil7 is &lt;2.2.8-48.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549513" version="1" comment="wireshark is &lt;2.2.8-48.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549514" version="1" comment="wireshark-gtk is &lt;2.2.8-48.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549522" version="1" comment="libncurses5 is &lt;5.9-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549523" version="1" comment="libncurses5-32bit is &lt;5.9-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549524" version="1" comment="libncurses6 is &lt;5.9-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549525" version="1" comment="libncurses6-32bit is &lt;5.9-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009540903" version="1" comment="ncurses-devel is &lt;5.9-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549526" version="1" comment="ncurses-devel-32bit is &lt;5.9-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549527" version="1" comment="ncurses-utils is &lt;5.9-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549528" version="1" comment="tack is &lt;5.9-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549529" version="1" comment="terminfo is &lt;5.9-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549530" version="1" comment="terminfo-base is &lt;5.9-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552503" version="1" comment="libtcmu1 is &lt;1.2.0-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552504" version="1" comment="tcmu-runner is &lt;1.2.0-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549531" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.18-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549532" version="1" comment="librsvg-2-2 is &lt;2.40.18-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549533" version="1" comment="librsvg-2-2-32bit is &lt;2.40.18-5.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549534" version="1" comment="rsvg-view is &lt;2.40.18-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549535" version="1" comment="libsoup-2_4-1 is &lt;2.54.1-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549536" version="1" comment="libsoup-2_4-1-32bit is &lt;2.54.1-5.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518003" version="1" comment="libsoup-lang is &lt;2.54.1-5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549537" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.54.1-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549543" version="1" comment="strongswan is &lt;5.1.3-26.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518013" version="1" comment="strongswan-doc is &lt;5.1.3-26.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549544" version="1" comment="strongswan-hmac is &lt;5.1.3-26.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549545" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549546" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549547" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549548" version="1" comment="libxml2-2 is &lt;2.9.4-46.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549549" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532336" version="1" comment="libxml2-doc is &lt;2.9.4-46.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549550" version="1" comment="libxml2-tools is &lt;2.9.4-46.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549551" version="1" comment="python-libxml2 is &lt;2.9.4-46.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549552" version="1" comment="curl is &lt;7.37.0-37.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549553" version="1" comment="libcurl4 is &lt;7.37.0-37.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549554" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549555" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.144-27.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549556" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.144-27.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549557" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.144-27.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549558" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.144-27.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552505" version="1" comment="freeradius-server is &lt;3.0.15-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552506" version="1" comment="freeradius-server-doc is &lt;3.0.15-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552507" version="1" comment="freeradius-server-krb5 is &lt;3.0.15-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552508" version="1" comment="freeradius-server-ldap is &lt;3.0.15-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552509" version="1" comment="freeradius-server-libs is &lt;3.0.15-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552510" version="1" comment="freeradius-server-mysql is &lt;3.0.15-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552511" version="1" comment="freeradius-server-perl is &lt;3.0.15-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552512" version="1" comment="freeradius-server-postgresql is &lt;3.0.15-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552513" version="1" comment="freeradius-server-python is &lt;3.0.15-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552514" version="1" comment="freeradius-server-sqlite is &lt;3.0.15-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552515" version="1" comment="freeradius-server-utils is &lt;3.0.15-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549559" version="1" comment="libplist3 is &lt;1.12-20.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549560" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549561" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552516" version="1" comment="openvswitch is &lt;2.7.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549562" version="1" comment="gnome-shell is &lt;3.20.4-77.7.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549563" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-77.7.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518036" version="1" comment="gnome-shell-lang is &lt;3.20.4-77.7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552517" version="1" comment="libdcerpc-binding0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552518" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552519" version="1" comment="libdcerpc0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552520" version="1" comment="libdcerpc0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552521" version="1" comment="libndr-krb5pac0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552522" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552523" version="1" comment="libndr-nbt0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552524" version="1" comment="libndr-nbt0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552525" version="1" comment="libndr-standard0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552526" version="1" comment="libndr-standard0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552527" version="1" comment="libndr0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552528" version="1" comment="libndr0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552529" version="1" comment="libnetapi0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552530" version="1" comment="libnetapi0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552531" version="1" comment="libsamba-credentials0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552532" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552533" version="1" comment="libsamba-errors0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552534" version="1" comment="libsamba-errors0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552535" version="1" comment="libsamba-hostconfig0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552536" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552537" version="1" comment="libsamba-passdb0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552538" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552539" version="1" comment="libsamba-util0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552540" version="1" comment="libsamba-util0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552541" version="1" comment="libsamdb0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552542" version="1" comment="libsamdb0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552543" version="1" comment="libsmbclient0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552544" version="1" comment="libsmbclient0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552545" version="1" comment="libsmbconf0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552546" version="1" comment="libsmbconf0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552547" version="1" comment="libsmbldap0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552548" version="1" comment="libsmbldap0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552549" version="1" comment="libtevent-util0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552550" version="1" comment="libtevent-util0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552551" version="1" comment="libwbclient0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552552" version="1" comment="libwbclient0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552553" version="1" comment="samba is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552554" version="1" comment="samba-client is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552555" version="1" comment="samba-client-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519243" version="1" comment="samba-doc is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552556" version="1" comment="samba-libs is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552557" version="1" comment="samba-libs-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552558" version="1" comment="samba-winbind is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552559" version="1" comment="samba-winbind-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547589" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr4.10-30.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534735" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr4.10-30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534737" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr4.10-30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552560" version="1" comment="libzypp is &lt;16.15.3-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552561" version="1" comment="yast2-pkg-bindings is &lt;3.2.4-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544971" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.10-38.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534249" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.10-38.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544972" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.10-38.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534252" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.10-38.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552562" version="1" comment="kernel-default is &lt;4.4.82-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552563" version="1" comment="kernel-default-base is &lt;4.4.82-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552564" version="1" comment="kernel-default-devel is &lt;4.4.82-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552565" version="1" comment="kernel-default-man is &lt;4.4.82-6.3.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519253" version="1" comment="kernel-devel is &lt;4.4.82-6.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519254" version="1" comment="kernel-macros is &lt;4.4.82-6.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519255" version="1" comment="kernel-source is &lt;4.4.82-6.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552566" version="1" comment="kernel-syms is &lt;4.4.82-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549579" version="1" comment="libfpm_pb0 is &lt;1.1.1-17.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549580" version="1" comment="libospf0 is &lt;1.1.1-17.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549581" version="1" comment="libospfapiclient0 is &lt;1.1.1-17.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549582" version="1" comment="libquagga_pb0 is &lt;1.1.1-17.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549583" version="1" comment="libzebra1 is &lt;1.1.1-17.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549584" version="1" comment="quagga is &lt;1.1.1-17.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549585" version="1" comment="expat is &lt;2.1.0-21.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549586" version="1" comment="libexpat1 is &lt;2.1.0-21.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549587" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009540949" version="1" comment="git-core is &lt;2.12.3-27.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549588" version="1" comment="libicu-doc is &lt;52.1-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549589" version="1" comment="libicu52_1 is &lt;52.1-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549590" version="1" comment="libicu52_1-32bit is &lt;52.1-8.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549591" version="1" comment="libicu52_1-data is &lt;52.1-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519438" version="1" comment="xen is &lt;4.9.0_11-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552567" version="1" comment="xen-doc-html is &lt;4.9.0_11-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519439" version="1" comment="xen-libs is &lt;4.9.0_11-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519440" version="1" comment="xen-libs-32bit is &lt;4.9.0_11-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552568" version="1" comment="xen-tools is &lt;4.9.0_11-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552569" version="1" comment="xen-tools-domU is &lt;4.9.0_11-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552570" version="1" comment="libzypp is &lt;16.15.6-2.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552571" version="1" comment="zypper is &lt;1.13.32-21.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519443" version="1" comment="zypper-log is &lt;1.13.32-21.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549598" version="1" comment="libecpg6 is &lt;9.6.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549599" version="1" comment="libpq5 is &lt;9.6.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544979" version="1" comment="libpq5-32bit is &lt;9.6.4-3.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549600" version="1" comment="postgresql96 is &lt;9.6.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549601" version="1" comment="postgresql96-contrib is &lt;9.6.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532386" version="1" comment="postgresql96-docs is &lt;9.6.4-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549602" version="1" comment="postgresql96-server is &lt;9.6.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518058" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549603" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549604" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549605" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549606" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549607" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549608" version="1" comment="evince is &lt;3.20.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549609" version="1" comment="evince-browser-plugin is &lt;3.20.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518066" version="1" comment="evince-lang is &lt;3.20.1-6.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549610" version="1" comment="evince-plugin-djvudocument is &lt;3.20.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549611" version="1" comment="evince-plugin-dvidocument is &lt;3.20.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549612" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549613" version="1" comment="evince-plugin-psdocument is &lt;3.20.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549614" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549615" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549616" version="1" comment="libevdocument3-4 is &lt;3.20.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549617" version="1" comment="libevview3-3 is &lt;3.20.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549618" version="1" comment="nautilus-evince is &lt;3.20.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552572" version="1" comment="qemu is &lt;2.9.0-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552573" version="1" comment="qemu-arm is &lt;2.9.0-6.3.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552574" version="1" comment="qemu-block-curl is &lt;2.9.0-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552575" version="1" comment="qemu-block-rbd is &lt;2.9.0-6.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552576" version="1" comment="qemu-block-ssh is &lt;2.9.0-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552577" version="1" comment="qemu-guest-agent is &lt;2.9.0-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519446" version="1" comment="qemu-ipxe is &lt;1.0.0-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552578" version="1" comment="qemu-kvm is &lt;2.9.0-6.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552579" version="1" comment="qemu-lang is &lt;2.9.0-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552580" version="1" comment="qemu-ppc is &lt;2.9.0-6.3.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552581" version="1" comment="qemu-s390 is &lt;2.9.0-6.3.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519448" version="1" comment="qemu-seabios is &lt;1.10.2-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519449" version="1" comment="qemu-sgabios is &lt;8-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552582" version="1" comment="qemu-tools is &lt;2.9.0-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519451" version="1" comment="qemu-vgabios is &lt;1.10.2-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519452" version="1" comment="qemu-x86 is &lt;2.9.0-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549627" version="1" comment="cvs is &lt;1.12.12-182.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532408" version="1" comment="cvs-doc is &lt;1.12.12-182.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519453" version="1" comment="xen is &lt;4.9.0_12-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552583" version="1" comment="xen-doc-html is &lt;4.9.0_12-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519454" version="1" comment="xen-libs is &lt;4.9.0_12-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519455" version="1" comment="xen-libs-32bit is &lt;4.9.0_12-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552584" version="1" comment="xen-tools is &lt;4.9.0_12-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552585" version="1" comment="xen-tools-domU is &lt;4.9.0_12-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552586" version="1" comment="kernel-default is &lt;4.4.82-6.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552587" version="1" comment="kernel-default-base is &lt;4.4.82-6.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552588" version="1" comment="kernel-default-devel is &lt;4.4.82-6.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552589" version="1" comment="kernel-default-man is &lt;4.4.82-6.6.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519459" version="1" comment="kernel-devel is &lt;4.4.82-6.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519460" version="1" comment="kernel-macros is &lt;4.4.82-6.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519461" version="1" comment="kernel-source is &lt;4.4.82-6.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552590" version="1" comment="kernel-syms is &lt;4.4.82-6.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549642" version="1" comment="cpp48 is &lt;4.8.5-31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545006" version="1" comment="gcc48 is &lt;4.8.5-31.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545007" version="1" comment="gcc48-32bit is &lt;4.8.5-31.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545008" version="1" comment="gcc48-c++ is &lt;4.8.5-31.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518111" version="1" comment="gcc48-info is &lt;4.8.5-31.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545009" version="1" comment="gcc48-locale is &lt;4.8.5-31.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518112" version="1" comment="libasan0 is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518113" version="1" comment="libasan0-32bit is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545010" version="1" comment="libstdc++48-devel is &lt;4.8.5-31.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545011" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-31.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549643" version="1" comment="emacs is &lt;24.3-25.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532420" version="1" comment="emacs-el is &lt;24.3-25.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518121" version="1" comment="emacs-info is &lt;24.3-25.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549644" version="1" comment="emacs-nox is &lt;24.3-25.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549645" version="1" comment="emacs-x11 is &lt;24.3-25.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549646" version="1" comment="etags is &lt;24.3-25.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549647" version="1" comment="libzip2 is &lt;0.11.1-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549648" version="1" comment="apache2 is &lt;2.4.23-29.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532426" version="1" comment="apache2-doc is &lt;2.4.23-29.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549649" version="1" comment="apache2-example-pages is &lt;2.4.23-29.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549650" version="1" comment="apache2-prefork is &lt;2.4.23-29.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549651" version="1" comment="apache2-utils is &lt;2.4.23-29.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549652" version="1" comment="apache2-worker is &lt;2.4.23-29.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552591" version="1" comment="libspice-server1 is &lt;0.12.8-3.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549653" version="1" comment="libwireshark8 is &lt;2.2.9-48.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549654" version="1" comment="libwiretap6 is &lt;2.2.9-48.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549655" version="1" comment="libwscodecs1 is &lt;2.2.9-48.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549656" version="1" comment="libwsutil7 is &lt;2.2.9-48.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549657" version="1" comment="wireshark is &lt;2.2.9-48.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549658" version="1" comment="wireshark-gtk is &lt;2.2.9-48.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549659" version="1" comment="libtiff5 is &lt;4.0.8-44.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549660" version="1" comment="libtiff5-32bit is &lt;4.0.8-44.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549661" version="1" comment="tiff is &lt;4.0.8-44.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549662" version="1" comment="liblouis-data is &lt;2.6.4-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549663" version="1" comment="liblouis9 is &lt;2.6.4-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549664" version="1" comment="python-louis is &lt;2.6.4-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549665" version="1" comment="python3-louis is &lt;2.6.4-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549666" version="1" comment="MozillaFirefox is &lt;52.3.0esr-109.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549667" version="1" comment="MozillaFirefox-translations is &lt;52.3.0esr-109.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552592" version="1" comment="libvirt is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552593" version="1" comment="libvirt-admin is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552594" version="1" comment="libvirt-client is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552595" version="1" comment="libvirt-daemon is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552596" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552597" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552598" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519471" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552599" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552600" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552601" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552602" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552603" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552604" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552605" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552606" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552607" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552608" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552609" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552610" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552611" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552612" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552613" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552614" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519488" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552615" version="1" comment="libvirt-doc is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552616" version="1" comment="libvirt-libs is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552617" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552618" version="1" comment="libvirt-nss is &lt;3.3.0-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549669" version="1" comment="dnsmasq is &lt;2.78-18.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549670" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549714" version="1" comment="krb5 is &lt;1.12.5-40.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549715" version="1" comment="krb5-32bit is &lt;1.12.5-40.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549716" version="1" comment="krb5-client is &lt;1.12.5-40.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549717" version="1" comment="krb5-doc is &lt;1.12.5-40.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549718" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549719" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549720" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549721" version="1" comment="krb5-server is &lt;1.12.5-40.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549722" version="1" comment="MozillaFirefox is &lt;52.4.0esr-109.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549723" version="1" comment="MozillaFirefox-translations is &lt;52.4.0esr-109.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549724" version="1" comment="libfreebl3 is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545037" version="1" comment="libfreebl3-32bit is &lt;3.29.5-58.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549725" version="1" comment="libfreebl3-hmac is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545039" version="1" comment="libfreebl3-hmac-32bit is &lt;3.29.5-58.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549726" version="1" comment="libsoftokn3 is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545041" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-58.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549727" version="1" comment="libsoftokn3-hmac is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545043" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.29.5-58.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549728" version="1" comment="mozilla-nss is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545045" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-58.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549729" version="1" comment="mozilla-nss-certs is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545047" version="1" comment="mozilla-nss-certs-32bit is &lt;3.29.5-58.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549730" version="1" comment="mozilla-nss-sysinit is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545050" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.29.5-58.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549731" version="1" comment="mozilla-nss-tools is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552619" version="1" comment="libdcerpc-binding0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552620" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552621" version="1" comment="libdcerpc0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552622" version="1" comment="libdcerpc0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552623" version="1" comment="libndr-krb5pac0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552624" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552625" version="1" comment="libndr-nbt0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552626" version="1" comment="libndr-nbt0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552627" version="1" comment="libndr-standard0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552628" version="1" comment="libndr-standard0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552629" version="1" comment="libndr0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552630" version="1" comment="libndr0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552631" version="1" comment="libnetapi0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552632" version="1" comment="libnetapi0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552633" version="1" comment="libsamba-credentials0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552634" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552635" version="1" comment="libsamba-errors0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552636" version="1" comment="libsamba-errors0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552637" version="1" comment="libsamba-hostconfig0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552638" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552639" version="1" comment="libsamba-passdb0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552640" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552641" version="1" comment="libsamba-util0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552642" version="1" comment="libsamba-util0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552643" version="1" comment="libsamdb0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552644" version="1" comment="libsamdb0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552645" version="1" comment="libsmbclient0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552646" version="1" comment="libsmbclient0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552647" version="1" comment="libsmbconf0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552648" version="1" comment="libsmbconf0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552649" version="1" comment="libsmbldap0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552650" version="1" comment="libsmbldap0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552651" version="1" comment="libtevent-util0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552652" version="1" comment="libtevent-util0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552653" version="1" comment="libwbclient0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552654" version="1" comment="libwbclient0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552655" version="1" comment="samba is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552656" version="1" comment="samba-client is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552657" version="1" comment="samba-client-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519530" version="1" comment="samba-doc is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552658" version="1" comment="samba-libs is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552659" version="1" comment="samba-libs-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552660" version="1" comment="samba-winbind is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552661" version="1" comment="samba-winbind-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518232" version="1" comment="xerces-j2 is &lt;2.8.1-268.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532505" version="1" comment="xerces-j2-xml-apis is &lt;2.8.1-268.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532506" version="1" comment="xerces-j2-xml-resolver is &lt;2.8.1-268.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519535" version="1" comment="xen is &lt;4.9.0_14-3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552662" version="1" comment="xen-doc-html is &lt;4.9.0_14-3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519536" version="1" comment="xen-libs is &lt;4.9.0_14-3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519537" version="1" comment="xen-libs-32bit is &lt;4.9.0_14-3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552663" version="1" comment="xen-tools is &lt;4.9.0_14-3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552664" version="1" comment="xen-tools-domU is &lt;4.9.0_14-3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541021" version="1" comment="git-core is &lt;2.12.3-27.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549750" version="1" comment="wpa_supplicant is &lt;2.2-15.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549753" version="1" comment="curl is &lt;7.37.0-37.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549754" version="1" comment="libcurl4 is &lt;7.37.0-37.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549755" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549760" version="1" comment="openvpn is &lt;2.3.8-16.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549761" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552665" version="1" comment="kernel-default is &lt;4.4.92-6.18.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552666" version="1" comment="kernel-default-base is &lt;4.4.92-6.18.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552667" version="1" comment="kernel-default-devel is &lt;4.4.92-6.18.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552668" version="1" comment="kernel-default-man is &lt;4.4.92-6.18.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519541" version="1" comment="kernel-devel is &lt;4.4.92-6.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519542" version="1" comment="kernel-macros is &lt;4.4.92-6.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519543" version="1" comment="kernel-source is &lt;4.4.92-6.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552669" version="1" comment="kernel-syms is &lt;4.4.92-6.18.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552670" version="1" comment="libvirt is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552671" version="1" comment="libvirt-admin is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552672" version="1" comment="libvirt-client is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552673" version="1" comment="libvirt-daemon is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552674" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552675" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552676" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519552" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552677" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552678" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552679" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552680" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552681" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552682" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552683" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552684" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552685" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552686" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552687" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552688" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552689" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552690" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552691" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552692" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519569" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552693" version="1" comment="libvirt-doc is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552694" version="1" comment="libvirt-libs is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552695" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552696" version="1" comment="libvirt-nss is &lt;3.3.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549765" version="1" comment="tcpdump is &lt;4.9.2-14.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549766" version="1" comment="libwireshark8 is &lt;2.2.10-48.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549767" version="1" comment="libwiretap6 is &lt;2.2.10-48.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549768" version="1" comment="libwscodecs1 is &lt;2.2.10-48.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549769" version="1" comment="libwsutil7 is &lt;2.2.10-48.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549770" version="1" comment="wireshark is &lt;2.2.10-48.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549771" version="1" comment="wireshark-gtk is &lt;2.2.10-48.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549780" version="1" comment="wget is &lt;1.14-21.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552697" version="1" comment="qemu is &lt;2.9.1-6.6.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552698" version="1" comment="qemu-arm is &lt;2.9.1-6.6.3 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552699" version="1" comment="qemu-block-curl is &lt;2.9.1-6.6.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552700" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.6.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552701" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.6.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552702" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.6.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552703" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.6.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519574" version="1" comment="qemu-ipxe is &lt;1.0.0-6.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552704" version="1" comment="qemu-kvm is &lt;2.9.1-6.6.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552705" version="1" comment="qemu-lang is &lt;2.9.1-6.6.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552706" version="1" comment="qemu-ppc is &lt;2.9.1-6.6.3 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552707" version="1" comment="qemu-s390 is &lt;2.9.1-6.6.3 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519576" version="1" comment="qemu-seabios is &lt;1.10.2-6.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519577" version="1" comment="qemu-sgabios is &lt;8-6.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552708" version="1" comment="qemu-tools is &lt;2.9.1-6.6.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519579" version="1" comment="qemu-vgabios is &lt;1.10.2-6.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519580" version="1" comment="qemu-x86 is &lt;2.9.1-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549781" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.18.0-2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549782" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.18.0-2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549783" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.18.0-2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549784" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.18.0-2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549785" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.18.0-2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519581" version="1" comment="SuSEfirewall2 is &lt;3.6.312.333-3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549796" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549797" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541047" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549798" version="1" comment="libsss_sudo is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549799" version="1" comment="python-sssd-config is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549800" version="1" comment="sssd is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549801" version="1" comment="sssd-32bit is &lt;1.13.4-34.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549802" version="1" comment="sssd-ad is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549803" version="1" comment="sssd-ipa is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549804" version="1" comment="sssd-krb5 is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549805" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549806" version="1" comment="sssd-ldap is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549807" version="1" comment="sssd-proxy is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549808" version="1" comment="sssd-tools is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549809" version="1" comment="krb5 is &lt;1.12.5-40.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549810" version="1" comment="krb5-32bit is &lt;1.12.5-40.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549811" version="1" comment="krb5-client is &lt;1.12.5-40.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549812" version="1" comment="krb5-doc is &lt;1.12.5-40.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549813" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549814" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549815" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549816" version="1" comment="krb5-server is &lt;1.12.5-40.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549817" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549818" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549819" version="1" comment="shadow is &lt;4.2.1-27.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549821" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.151-27.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549822" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.151-27.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549823" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.151-27.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549824" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.151-27.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532585" version="1" comment="tomcat is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532586" version="1" comment="tomcat-admin-webapps is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532587" version="1" comment="tomcat-docs-webapp is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532588" version="1" comment="tomcat-el-3_0-api is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532589" version="1" comment="tomcat-javadoc is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532590" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532591" version="1" comment="tomcat-lib is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532592" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532593" version="1" comment="tomcat-webapps is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549834" version="1" comment="file is &lt;5.22-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549835" version="1" comment="file-magic is &lt;5.22-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549836" version="1" comment="libmagic1 is &lt;5.22-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549837" version="1" comment="libmagic1-32bit is &lt;5.22-10.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549838" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549839" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549840" version="1" comment="tboot is &lt;20160518_1.9.4-7.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549842" version="1" comment="perl is &lt;5.18.2-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549843" version="1" comment="perl-32bit is &lt;5.18.2-12.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549844" version="1" comment="perl-base is &lt;5.18.2-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518322" version="1" comment="perl-doc is &lt;5.18.2-12.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518323" version="1" comment="kernel-firmware is &lt;20170530-21.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518324" version="1" comment="ucode-amd is &lt;20170530-21.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519583" version="1" comment="xen is &lt;4.9.1_02-3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552709" version="1" comment="xen-doc-html is &lt;4.9.1_02-3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519584" version="1" comment="xen-libs is &lt;4.9.1_02-3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519585" version="1" comment="xen-libs-32bit is &lt;4.9.1_02-3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552710" version="1" comment="xen-tools is &lt;4.9.1_02-3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552711" version="1" comment="xen-tools-domU is &lt;4.9.1_02-3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552712" version="1" comment="libdcerpc-binding0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552713" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552714" version="1" comment="libdcerpc0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552715" version="1" comment="libdcerpc0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552716" version="1" comment="libndr-krb5pac0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552717" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552718" version="1" comment="libndr-nbt0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552719" version="1" comment="libndr-nbt0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552720" version="1" comment="libndr-standard0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552721" version="1" comment="libndr-standard0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552722" version="1" comment="libndr0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552723" version="1" comment="libndr0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552724" version="1" comment="libnetapi0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552725" version="1" comment="libnetapi0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552726" version="1" comment="libsamba-credentials0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552727" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552728" version="1" comment="libsamba-errors0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552729" version="1" comment="libsamba-errors0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552730" version="1" comment="libsamba-hostconfig0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552731" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552732" version="1" comment="libsamba-passdb0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552733" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552734" version="1" comment="libsamba-util0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552735" version="1" comment="libsamba-util0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552736" version="1" comment="libsamdb0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552737" version="1" comment="libsamdb0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552738" version="1" comment="libsmbclient0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552739" version="1" comment="libsmbclient0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552740" version="1" comment="libsmbconf0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552741" version="1" comment="libsmbconf0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552742" version="1" comment="libsmbldap0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552743" version="1" comment="libsmbldap0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552744" version="1" comment="libtevent-util0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552745" version="1" comment="libtevent-util0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552746" version="1" comment="libwbclient0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552747" version="1" comment="libwbclient0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552748" version="1" comment="samba is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552749" version="1" comment="samba-client is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552750" version="1" comment="samba-client-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519625" version="1" comment="samba-doc is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552751" version="1" comment="samba-libs is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552752" version="1" comment="samba-libs-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552753" version="1" comment="samba-winbind is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552754" version="1" comment="samba-winbind-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541071" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549895" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549896" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549897" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549898" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549899" version="1" comment="openssl is &lt;1.0.2j-60.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532635" version="1" comment="openssl-doc is &lt;1.0.2j-60.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549900" version="1" comment="binutils is &lt;2.29.1-9.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549904" version="1" comment="MozillaFirefox is &lt;52.5.0esr-109.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549905" version="1" comment="MozillaFirefox-translations is &lt;52.5.0esr-109.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549908" version="1" comment="libXcursor1 is &lt;1.1.14-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549909" version="1" comment="libXcursor1-32bit is &lt;1.1.14-4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549910" version="1" comment="libshibsp-lite6 is &lt;2.5.5-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549911" version="1" comment="libshibsp6 is &lt;2.5.5-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549912" version="1" comment="shibboleth-sp is &lt;2.5.5-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552755" version="1" comment="kernel-default is &lt;4.4.92-6.30.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552756" version="1" comment="kernel-default-base is &lt;4.4.92-6.30.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552757" version="1" comment="kernel-default-devel is &lt;4.4.92-6.30.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552758" version="1" comment="kernel-default-man is &lt;4.4.92-6.30.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519633" version="1" comment="kernel-devel is &lt;4.4.92-6.30.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519634" version="1" comment="kernel-macros is &lt;4.4.92-6.30.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519635" version="1" comment="kernel-source is &lt;4.4.92-6.30.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552759" version="1" comment="kernel-syms is &lt;4.4.92-6.30.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549918" version="1" comment="openssh is &lt;7.2p2-74.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549919" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549920" version="1" comment="openssh-fips is &lt;7.2p2-74.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549921" version="1" comment="openssh-helpers is &lt;7.2p2-74.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549922" version="1" comment="libsaml8 is &lt;2.5.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549923" version="1" comment="opensaml-bin is &lt;2.5.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549924" version="1" comment="opensaml-schemas is &lt;2.5.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552760" version="1" comment="openvswitch is &lt;2.7.0-3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541094" version="1" comment="libapr-util1 is &lt;1.5.3-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549925" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.5.3-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541101" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549931" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549932" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.20.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549933" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549934" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.20.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549935" version="1" comment="openssl is &lt;1.0.2j-60.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532667" version="1" comment="openssl-doc is &lt;1.0.2j-60.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549938" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549939" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549940" version="1" comment="libecpg6 is &lt;9.6.6-3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549941" version="1" comment="libpq5 is &lt;9.6.6-3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549942" version="1" comment="libpq5-32bit is &lt;9.6.6-3.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549943" version="1" comment="postgresql96 is &lt;9.6.6-3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549944" version="1" comment="postgresql96-contrib is &lt;9.6.6-3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532676" version="1" comment="postgresql96-docs is &lt;9.6.6-3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549945" version="1" comment="postgresql96-server is &lt;9.6.6-3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552761" version="1" comment="kernel-default is &lt;4.4.103-6.33.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552762" version="1" comment="kernel-default-base is &lt;4.4.103-6.33.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552763" version="1" comment="kernel-default-devel is &lt;4.4.103-6.33.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552764" version="1" comment="kernel-default-man is &lt;4.4.103-6.33.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519640" version="1" comment="kernel-devel is &lt;4.4.103-6.33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519641" version="1" comment="kernel-macros is &lt;4.4.103-6.33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519642" version="1" comment="kernel-source is &lt;4.4.103-6.33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552765" version="1" comment="kernel-syms is &lt;4.4.103-6.33.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547803" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.5-30.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535147" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.5-30.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535149" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.5-30.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549951" version="1" comment="evince is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549952" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518422" version="1" comment="evince-lang is &lt;3.20.2-6.19.15 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549953" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549954" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549955" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549956" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549957" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549958" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549959" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549960" version="1" comment="libevview3-3 is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549961" version="1" comment="nautilus-evince is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549962" version="1" comment="libwireshark8 is &lt;2.2.11-48.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549963" version="1" comment="libwiretap6 is &lt;2.2.11-48.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549964" version="1" comment="libwscodecs1 is &lt;2.2.11-48.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549965" version="1" comment="libwsutil7 is &lt;2.2.11-48.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549966" version="1" comment="wireshark is &lt;2.2.11-48.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549967" version="1" comment="wireshark-gtk is &lt;2.2.11-48.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518440" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549968" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549969" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549970" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549971" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549972" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545271" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.15-38.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535151" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.15-38.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545272" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.15-38.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535154" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.15-38.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550380" version="1" comment="gd is &lt;2.1.0-24.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552766" version="1" comment="dpdk is &lt;16.11.6-8.4.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552767" version="1" comment="dpdk-kmp-default is &lt;16.11.6_k4.4.126_94.22-8.4.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552768" version="1" comment="dpdk-thunderx is &lt;16.11.6-8.4.2 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552769" version="1" comment="dpdk-thunderx-kmp-default is &lt;16.11.6_k4.4.126_94.22-8.4.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552770" version="1" comment="dpdk-tools is &lt;16.11.6-8.4.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519644" version="1" comment="xdg-utils is &lt;20140630-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552771" version="1" comment="crash is &lt;7.1.8-4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552772" version="1" comment="crash-kmp-default is &lt;7.1.8_k4.4.131_94.29-4.8.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552773" version="1" comment="lttng-modules is &lt;2.7.1-8.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552774" version="1" comment="lttng-modules-kmp-default is &lt;2.7.1_k4.4.131_94.29-8.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552775" version="1" comment="oracleasm-kmp-default is &lt;2.0.8_k4.4.131_94.29-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550381" version="1" comment="libxmltooling6 is &lt;1.5.6-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550382" version="1" comment="xmltooling-schemas is &lt;1.5.6-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552776" version="1" comment="glibc is &lt;2.22-62.13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550384" version="1" comment="glibc-32bit is &lt;2.22-62.13.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552777" version="1" comment="glibc-devel is &lt;2.22-62.13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550386" version="1" comment="glibc-devel-32bit is &lt;2.22-62.13.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530084" version="1" comment="glibc-html is &lt;2.22-62.13.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519650" version="1" comment="glibc-i18ndata is &lt;2.22-62.13.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530085" version="1" comment="glibc-info is &lt;2.22-62.13.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552778" version="1" comment="glibc-locale is &lt;2.22-62.13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550388" version="1" comment="glibc-locale-32bit is &lt;2.22-62.13.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552779" version="1" comment="glibc-profile is &lt;2.22-62.13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550390" version="1" comment="glibc-profile-32bit is &lt;2.22-62.13.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552780" version="1" comment="nscd is &lt;2.22-62.13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541492" version="1" comment="git-core is &lt;2.12.3-27.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552781" version="1" comment="libvorbis-doc is &lt;1.3.3-10.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552782" version="1" comment="libvorbis0 is &lt;1.3.3-10.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552783" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552784" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552785" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552786" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552787" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519660" version="1" comment="kernel-firmware is &lt;20170530-21.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519661" version="1" comment="ucode-amd is &lt;20170530-21.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552788" version="1" comment="libpoppler-glib8 is &lt;0.43.0-16.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552789" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-16.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552790" version="1" comment="libpoppler60 is &lt;0.43.0-16.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552791" version="1" comment="poppler-tools is &lt;0.43.0-16.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519666" version="1" comment="ucode-intel is &lt;20180425-13.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552792" version="1" comment="libdcerpc-binding0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552793" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552794" version="1" comment="libdcerpc0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552795" version="1" comment="libdcerpc0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552796" version="1" comment="libndr-krb5pac0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552797" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552798" version="1" comment="libndr-nbt0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552799" version="1" comment="libndr-nbt0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552800" version="1" comment="libndr-standard0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552801" version="1" comment="libndr-standard0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552802" version="1" comment="libndr0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552803" version="1" comment="libndr0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552804" version="1" comment="libnetapi0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552805" version="1" comment="libnetapi0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552806" version="1" comment="libsamba-credentials0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552807" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552808" version="1" comment="libsamba-errors0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552809" version="1" comment="libsamba-errors0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552810" version="1" comment="libsamba-hostconfig0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552811" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552812" version="1" comment="libsamba-passdb0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552813" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552814" version="1" comment="libsamba-util0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552815" version="1" comment="libsamba-util0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552816" version="1" comment="libsamdb0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552817" version="1" comment="libsamdb0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552818" version="1" comment="libsmbclient0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552819" version="1" comment="libsmbclient0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552820" version="1" comment="libsmbconf0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552821" version="1" comment="libsmbconf0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552822" version="1" comment="libsmbldap0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552823" version="1" comment="libsmbldap0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552824" version="1" comment="libtevent-util0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552825" version="1" comment="libtevent-util0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552826" version="1" comment="libwbclient0 is &lt;4.6.14+git.150.1540e575faf-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552827" version="1" comment="libwbclient0-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552828" version="1" comment="samba is &lt;4.6.14+git.150.1540e575faf-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552829" version="1" comment="samba-client is &lt;4.6.14+git.150.1540e575faf-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552830" version="1" comment="samba-client-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519706" version="1" comment="samba-doc is &lt;4.6.14+git.150.1540e575faf-3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552831" version="1" comment="samba-libs is &lt;4.6.14+git.150.1540e575faf-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552832" version="1" comment="samba-libs-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552833" version="1" comment="samba-winbind is &lt;4.6.14+git.150.1540e575faf-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552834" version="1" comment="samba-winbind-32bit is &lt;4.6.14+git.150.1540e575faf-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552835" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.171-27.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552836" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.171-27.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552837" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.171-27.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552838" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.171-27.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552839" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.181-43.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552840" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.181-43.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552841" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.181-43.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552842" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.181-43.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552843" version="1" comment="libecpg6 is &lt;9.6.9-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552844" version="1" comment="libpq5 is &lt;9.6.9-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552845" version="1" comment="libpq5-32bit is &lt;9.6.9-3.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552846" version="1" comment="postgresql96 is &lt;9.6.9-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552847" version="1" comment="postgresql96-contrib is &lt;9.6.9-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552848" version="1" comment="postgresql96-docs is &lt;9.6.9-3.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552849" version="1" comment="postgresql96-server is &lt;9.6.9-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552850" version="1" comment="gpg2 is &lt;2.0.24-9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519720" version="1" comment="gpg2-lang is &lt;2.0.24-9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550416" version="1" comment="rsync is &lt;3.1.0-13.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548180" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.15-30.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530122" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.15-30.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530124" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.15-30.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550417" version="1" comment="procmail is &lt;3.22-269.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545536" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.25-38.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530126" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.25-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545537" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.25-38.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530129" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.25-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552851" version="1" comment="ntp is &lt;4.2.8p11-64.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552852" version="1" comment="ntp-doc is &lt;4.2.8p11-64.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552853" version="1" comment="bluez is &lt;5.13-5.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552854" version="1" comment="libbluetooth3 is &lt;5.13-5.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552855" version="1" comment="kernel-default is &lt;4.4.138-94.39.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552856" version="1" comment="kernel-default-base is &lt;4.4.138-94.39.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552857" version="1" comment="kernel-default-devel is &lt;4.4.138-94.39.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552858" version="1" comment="kernel-default-man is &lt;4.4.138-94.39.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519729" version="1" comment="kernel-devel is &lt;4.4.138-94.39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519730" version="1" comment="kernel-macros is &lt;4.4.138-94.39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519731" version="1" comment="kernel-source is &lt;4.4.138-94.39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552859" version="1" comment="kernel-syms is &lt;4.4.138-94.39.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552860" version="1" comment="kernel-default is &lt;4.4.103-6.38.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552861" version="1" comment="kernel-default-base is &lt;4.4.103-6.38.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552862" version="1" comment="kernel-default-devel is &lt;4.4.103-6.38.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552863" version="1" comment="kernel-default-man is &lt;4.4.103-6.38.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519736" version="1" comment="kernel-devel is &lt;4.4.103-6.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519737" version="1" comment="kernel-macros is &lt;4.4.103-6.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519738" version="1" comment="kernel-source is &lt;4.4.103-6.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552864" version="1" comment="kernel-syms is &lt;4.4.103-6.38.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552865" version="1" comment="libmysqlclient18 is &lt;10.0.35-29.20.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548190" version="1" comment="libmysqlclient18-32bit is &lt;10.0.35-29.20.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552866" version="1" comment="mariadb is &lt;10.0.35-29.20.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552867" version="1" comment="mariadb-client is &lt;10.0.35-29.20.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552868" version="1" comment="mariadb-errormessages is &lt;10.0.35-29.20.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552869" version="1" comment="mariadb-tools is &lt;10.0.35-29.20.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552870" version="1" comment="MozillaFirefox is &lt;52.8.1esr-109.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552871" version="1" comment="MozillaFirefox-translations is &lt;52.8.1esr-109.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552872" version="1" comment="libtiff5 is &lt;4.0.9-44.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552873" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552874" version="1" comment="tiff is &lt;4.0.9-44.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552875" version="1" comment="unixODBC is &lt;2.3.6-7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552876" version="1" comment="unixODBC-32bit is &lt;2.3.6-7.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552877" version="1" comment="libprocps3 is &lt;3.3.9-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552878" version="1" comment="procps is &lt;3.3.9-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552879" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552880" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550423" version="1" comment="libvpx1 is &lt;1.3.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541536" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552881" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550426" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552882" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550428" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552883" version="1" comment="openssl is &lt;1.0.2j-60.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530142" version="1" comment="openssl-doc is &lt;1.0.2j-60.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552884" version="1" comment="libQtWebKit4 is &lt;4.8.7+2.3.4-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552885" version="1" comment="libQtWebKit4-32bit is &lt;4.8.7+2.3.4-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552886" version="1" comment="libqca2 is &lt;2.0.3-17.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552887" version="1" comment="libqca2-32bit is &lt;2.0.3-17.2.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552888" version="1" comment="libqt4 is &lt;4.8.7-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552889" version="1" comment="libqt4-32bit is &lt;4.8.7-8.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552890" version="1" comment="libqt4-qt3support is &lt;4.8.7-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552891" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.7-8.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552892" version="1" comment="libqt4-sql is &lt;4.8.7-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552893" version="1" comment="libqt4-sql-32bit is &lt;4.8.7-8.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552894" version="1" comment="libqt4-sql-mysql is &lt;4.8.7-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552895" version="1" comment="libqt4-sql-sqlite is &lt;4.8.7-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552896" version="1" comment="libqt4-x11 is &lt;4.8.7-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552897" version="1" comment="libqt4-x11-32bit is &lt;4.8.7-8.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552898" version="1" comment="qt4-x11-tools is &lt;4.8.7-8.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519785" version="1" comment="ucode-intel is &lt;20180703-13.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519786" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552899" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552900" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552901" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552902" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552903" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552904" version="1" comment="perl is &lt;5.18.2-12.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545542" version="1" comment="perl-32bit is &lt;5.18.2-12.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552905" version="1" comment="perl-base is &lt;5.18.2-12.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519795" version="1" comment="perl-doc is &lt;5.18.2-12.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550430" version="1" comment="libwireshark8 is &lt;2.2.12-48.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550431" version="1" comment="libwiretap6 is &lt;2.2.12-48.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550432" version="1" comment="libwscodecs1 is &lt;2.2.12-48.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550433" version="1" comment="libwsutil7 is &lt;2.2.12-48.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550434" version="1" comment="wireshark is &lt;2.2.12-48.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550435" version="1" comment="wireshark-gtk is &lt;2.2.12-48.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552906" version="1" comment="shadow is &lt;4.2.1-27.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552907" version="1" comment="openssh is &lt;7.2p2-74.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552908" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552909" version="1" comment="openssh-fips is &lt;7.2p2-74.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552910" version="1" comment="openssh-helpers is &lt;7.2p2-74.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550437" version="1" comment="libexif12 is &lt;0.6.21-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550438" version="1" comment="libexif12-32bit is &lt;0.6.21-8.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552911" version="1" comment="rsyslog is &lt;8.24.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552912" version="1" comment="rsyslog-diag-tools is &lt;8.24.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552913" version="1" comment="rsyslog-doc is &lt;8.24.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552914" version="1" comment="rsyslog-module-gssapi is &lt;8.24.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552915" version="1" comment="rsyslog-module-gtls is &lt;8.24.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552916" version="1" comment="rsyslog-module-mysql is &lt;8.24.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552917" version="1" comment="rsyslog-module-pgsql is &lt;8.24.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552918" version="1" comment="rsyslog-module-relp is &lt;8.24.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552919" version="1" comment="rsyslog-module-snmp is &lt;8.24.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552920" version="1" comment="rsyslog-module-udpspoof is &lt;8.24.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552921" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552922" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552923" version="1" comment="python is &lt;2.7.13-28.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552924" version="1" comment="python-32bit is &lt;2.7.13-28.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552925" version="1" comment="python-base is &lt;2.7.13-28.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552926" version="1" comment="python-base-32bit is &lt;2.7.13-28.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552927" version="1" comment="python-curses is &lt;2.7.13-28.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552928" version="1" comment="python-demo is &lt;2.7.13-28.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552929" version="1" comment="python-doc is &lt;2.7.13-28.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552930" version="1" comment="python-doc-pdf is &lt;2.7.13-28.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552931" version="1" comment="python-gdbm is &lt;2.7.13-28.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552932" version="1" comment="python-idle is &lt;2.7.13-28.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552933" version="1" comment="python-tk is &lt;2.7.13-28.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552934" version="1" comment="python-xml is &lt;2.7.13-28.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552935" version="1" comment="kernel-default is &lt;4.4.140-94.42.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552936" version="1" comment="kernel-default-base is &lt;4.4.140-94.42.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552937" version="1" comment="kernel-default-devel is &lt;4.4.140-94.42.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552938" version="1" comment="kernel-default-man is &lt;4.4.140-94.42.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519812" version="1" comment="kernel-devel is &lt;4.4.140-94.42.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519813" version="1" comment="kernel-macros is &lt;4.4.140-94.42.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519814" version="1" comment="kernel-source is &lt;4.4.140-94.42.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552939" version="1" comment="kernel-syms is &lt;4.4.140-94.42.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552940" version="1" comment="gnome-shell-search-provider-nautilus is &lt;3.20.3-23.3.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552941" version="1" comment="libnautilus-extension1 is &lt;3.20.3-23.3.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552942" version="1" comment="nautilus is &lt;3.20.3-23.3.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519820" version="1" comment="nautilus-lang is &lt;3.20.3-23.3.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519821" version="1" comment="xen is &lt;4.9.2_08-3.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552943" version="1" comment="xen-doc-html is &lt;4.9.2_08-3.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519822" version="1" comment="xen-libs is &lt;4.9.2_08-3.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519823" version="1" comment="xen-libs-32bit is &lt;4.9.2_08-3.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552944" version="1" comment="xen-tools is &lt;4.9.2_08-3.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552945" version="1" comment="xen-tools-domU is &lt;4.9.2_08-3.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550439" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550440" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552946" version="1" comment="libblkid1 is &lt;2.29.2-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552947" version="1" comment="libblkid1-32bit is &lt;2.29.2-3.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552948" version="1" comment="libfdisk1 is &lt;2.29.2-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552949" version="1" comment="libmount1 is &lt;2.29.2-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552950" version="1" comment="libmount1-32bit is &lt;2.29.2-3.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552951" version="1" comment="libsmartcols1 is &lt;2.29.2-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552952" version="1" comment="libuuid1 is &lt;2.29.2-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552953" version="1" comment="libuuid1-32bit is &lt;2.29.2-3.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552954" version="1" comment="python-libmount is &lt;2.29.2-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552955" version="1" comment="util-linux is &lt;2.29.2-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519835" version="1" comment="util-linux-lang is &lt;2.29.2-3.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552956" version="1" comment="util-linux-systemd is &lt;2.29.2-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552957" version="1" comment="uuidd is &lt;2.29.2-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552958" version="1" comment="libsndfile1 is &lt;1.0.25-36.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552959" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552960" version="1" comment="libgcrypt20 is &lt;1.6.1-16.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552961" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552962" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552963" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552964" version="1" comment="mutt is &lt;1.10.1-55.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550441" version="1" comment="libevent-2_0-5 is &lt;2.0.21-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519845" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552965" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552966" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552967" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552968" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552969" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552970" version="1" comment="libcgroup-tools is &lt;0.41.rc1-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552971" version="1" comment="libcgroup1 is &lt;0.41.rc1-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552972" version="1" comment="libpolkit0 is &lt;0.113-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552973" version="1" comment="polkit is &lt;0.113-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552974" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552975" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.9.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552976" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.9.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552977" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1492060560.b6d11d7c46-4.9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552978" version="1" comment="qemu-uefi-aarch64 is &lt;2017+git1492060560.b6d11d7c46-4.9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552979" version="1" comment="cups is &lt;1.7.5-20.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552980" version="1" comment="cups-client is &lt;1.7.5-20.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552981" version="1" comment="cups-libs is &lt;1.7.5-20.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552982" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552983" version="1" comment="libtirpc-netconfig is &lt;1.0.1-17.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552984" version="1" comment="libtirpc3 is &lt;1.0.1-17.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552985" version="1" comment="libtirpc3-32bit is &lt;1.0.1-17.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550442" version="1" comment="curl is &lt;7.37.0-37.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550443" version="1" comment="libcurl4 is &lt;7.37.0-37.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550444" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552986" version="1" comment="ceph-common is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552987" version="1" comment="libcephfs2 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552988" version="1" comment="librados2 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552989" version="1" comment="libradosstriper1 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552990" version="1" comment="librbd1 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552991" version="1" comment="librgw2 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552992" version="1" comment="python-cephfs is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552993" version="1" comment="python-rados is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552994" version="1" comment="python-rbd is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552995" version="1" comment="python-rgw is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552996" version="1" comment="libsoup-2_4-1 is &lt;2.62.2-5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551268" version="1" comment="libsoup-2_4-1-32bit is &lt;2.62.2-5.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519875" version="1" comment="libsoup-lang is &lt;2.62.2-5.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552997" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.62.2-5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533069" version="1" comment="libvorbis-doc is &lt;1.3.3-10.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550445" version="1" comment="libvorbis0 is &lt;1.3.3-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550446" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550447" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550448" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550449" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550450" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550451" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.18.5-2.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550452" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.18.5-2.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550453" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.18.5-2.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550454" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.18.5-2.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550455" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.18.5-2.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550456" version="1" comment="transfig is &lt;3.2.5e-2.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552998" version="1" comment="libvirt is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552999" version="1" comment="libvirt-admin is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553000" version="1" comment="libvirt-client is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553001" version="1" comment="libvirt-daemon is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553002" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553003" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553004" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519887" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553005" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553006" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553007" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553008" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553009" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553010" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553011" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553012" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553013" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553014" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553015" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553016" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553017" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553018" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553019" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553020" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553021" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519904" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553022" version="1" comment="libvirt-doc is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553023" version="1" comment="libvirt-libs is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553024" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553025" version="1" comment="libvirt-nss is &lt;3.3.0-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553026" version="1" comment="libdcerpc-binding0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553027" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553028" version="1" comment="libdcerpc0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553029" version="1" comment="libdcerpc0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553030" version="1" comment="libndr-krb5pac0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553031" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553032" version="1" comment="libndr-nbt0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553033" version="1" comment="libndr-nbt0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553034" version="1" comment="libndr-standard0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553035" version="1" comment="libndr-standard0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553036" version="1" comment="libndr0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553037" version="1" comment="libndr0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553038" version="1" comment="libnetapi0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553039" version="1" comment="libnetapi0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553040" version="1" comment="libsamba-credentials0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553041" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553042" version="1" comment="libsamba-errors0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553043" version="1" comment="libsamba-errors0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553044" version="1" comment="libsamba-hostconfig0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553045" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553046" version="1" comment="libsamba-passdb0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553047" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553048" version="1" comment="libsamba-util0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553049" version="1" comment="libsamba-util0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553050" version="1" comment="libsamdb0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553051" version="1" comment="libsamdb0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553052" version="1" comment="libsmbclient0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553053" version="1" comment="libsmbclient0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553054" version="1" comment="libsmbconf0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553055" version="1" comment="libsmbconf0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553056" version="1" comment="libsmbldap0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553057" version="1" comment="libsmbldap0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553058" version="1" comment="libtevent-util0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553059" version="1" comment="libtevent-util0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553060" version="1" comment="libwbclient0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553061" version="1" comment="libwbclient0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553062" version="1" comment="samba is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553063" version="1" comment="samba-client is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553064" version="1" comment="samba-client-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519946" version="1" comment="samba-doc is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553065" version="1" comment="samba-libs is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553066" version="1" comment="samba-libs-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553067" version="1" comment="samba-winbind is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553068" version="1" comment="samba-winbind-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553069" version="1" comment="MozillaFirefox is &lt;52.9.0esr-109.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553070" version="1" comment="MozillaFirefox-translations is &lt;52.9.0esr-109.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553071" version="1" comment="clamav is &lt;0.100.1-33.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553072" version="1" comment="dpdk is &lt;16.11.6-8.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553073" version="1" comment="dpdk-kmp-default is &lt;16.11.6_k4.4.143_94.47-8.7.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553074" version="1" comment="dpdk-thunderx is &lt;16.11.6-8.7.2 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553075" version="1" comment="dpdk-thunderx-kmp-default is &lt;16.11.6_k4.4.143_94.47-8.7.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553076" version="1" comment="dpdk-tools is &lt;16.11.6-8.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553077" version="1" comment="kernel-default is &lt;4.4.143-94.47.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553078" version="1" comment="kernel-default-base is &lt;4.4.143-94.47.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553079" version="1" comment="kernel-default-devel is &lt;4.4.143-94.47.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553080" version="1" comment="kernel-default-man is &lt;4.4.143-94.47.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519957" version="1" comment="kernel-devel is &lt;4.4.143-94.47.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519958" version="1" comment="kernel-macros is &lt;4.4.143-94.47.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519959" version="1" comment="kernel-source is &lt;4.4.143-94.47.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553081" version="1" comment="kernel-syms is &lt;4.4.143-94.47.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553082" version="1" comment="lttng-modules is &lt;2.7.1-8.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553083" version="1" comment="lttng-modules-kmp-default is &lt;2.7.1_k4.4.143_94.47-8.4.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519961" version="1" comment="ucode-intel is &lt;20180807-13.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553084" version="1" comment="apache2 is &lt;2.4.23-29.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553085" version="1" comment="apache2-doc is &lt;2.4.23-29.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553086" version="1" comment="apache2-example-pages is &lt;2.4.23-29.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553087" version="1" comment="apache2-prefork is &lt;2.4.23-29.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553088" version="1" comment="apache2-utils is &lt;2.4.23-29.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553089" version="1" comment="apache2-worker is &lt;2.4.23-29.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553090" version="1" comment="kernel-azure is &lt;4.4.143-4.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553091" version="1" comment="kernel-azure-base is &lt;4.4.143-4.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553092" version="1" comment="kernel-azure-devel is &lt;4.4.143-4.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553093" version="1" comment="kernel-devel-azure is &lt;4.4.143-4.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553094" version="1" comment="kernel-source-azure is &lt;4.4.143-4.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553095" version="1" comment="libblkid1 is &lt;2.29.2-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553096" version="1" comment="libblkid1-32bit is &lt;2.29.2-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553097" version="1" comment="libfdisk1 is &lt;2.29.2-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553098" version="1" comment="libmount1 is &lt;2.29.2-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553099" version="1" comment="libmount1-32bit is &lt;2.29.2-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553100" version="1" comment="libsmartcols1 is &lt;2.29.2-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553101" version="1" comment="libuuid1 is &lt;2.29.2-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553102" version="1" comment="libuuid1-32bit is &lt;2.29.2-3.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553103" version="1" comment="python-libmount is &lt;2.29.2-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553104" version="1" comment="util-linux is &lt;2.29.2-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519973" version="1" comment="util-linux-lang is &lt;2.29.2-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553105" version="1" comment="util-linux-systemd is &lt;2.29.2-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553106" version="1" comment="uuidd is &lt;2.29.2-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519976" version="1" comment="perl-Archive-Zip is &lt;1.34-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519977" version="1" comment="xen is &lt;4.9.2_10-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553107" version="1" comment="xen-doc-html is &lt;4.9.2_10-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519978" version="1" comment="xen-libs is &lt;4.9.2_10-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519979" version="1" comment="xen-libs-32bit is &lt;4.9.2_10-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553108" version="1" comment="xen-tools is &lt;4.9.2_10-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553109" version="1" comment="xen-tools-domU is &lt;4.9.2_10-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553110" version="1" comment="libprocps3 is &lt;3.3.9-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553111" version="1" comment="procps is &lt;3.3.9-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553112" version="1" comment="libgcrypt20 is &lt;1.6.1-16.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553113" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.62.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553114" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553115" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.62.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553116" version="1" comment="libcgroup-tools is &lt;0.41.rc1-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553117" version="1" comment="libcgroup1 is &lt;0.41.rc1-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550506" version="1" comment="clamav is &lt;0.99.3-33.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553118" version="1" comment="gdm is &lt;3.10.0.1-54.6.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520036" version="1" comment="gdm-lang is &lt;3.10.0.1-54.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520037" version="1" comment="gdmflexiserver is &lt;3.10.0.1-54.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553119" version="1" comment="libgdm1 is &lt;3.10.0.1-54.6.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553120" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-54.6.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550511" version="1" comment="gd is &lt;2.1.0-24.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550512" version="1" comment="apache2 is &lt;2.4.23-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533082" version="1" comment="apache2-doc is &lt;2.4.23-29.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550513" version="1" comment="apache2-example-pages is &lt;2.4.23-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550514" version="1" comment="apache2-prefork is &lt;2.4.23-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550515" version="1" comment="apache2-utils is &lt;2.4.23-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550516" version="1" comment="apache2-worker is &lt;2.4.23-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553121" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.33-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553122" version="1" comment="libspice-client-glib-helper is &lt;0.33-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553123" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.33-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553124" version="1" comment="libspice-controller0 is &lt;0.33-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553125" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.33-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541605" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.33-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553126" version="1" comment="libspice-server1 is &lt;0.12.8-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553127" version="1" comment="dovecot22 is &lt;2.2.31-19.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553128" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553129" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553130" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545756" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.30-38.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530241" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.30-38.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545757" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.30-38.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530244" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.30-38.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009527445" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009527446" version="1" comment="python3 is &lt;3.4.6-25.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009527447" version="1" comment="python3-base is &lt;3.4.6-25.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553131" version="1" comment="python3-curses is &lt;3.4.6-25.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553132" version="1" comment="tomcat is &lt;8.0.53-29.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553133" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553134" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553135" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553136" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553137" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553138" version="1" comment="tomcat-lib is &lt;8.0.53-29.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553139" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553140" version="1" comment="tomcat-webapps is &lt;8.0.53-29.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553141" version="1" comment="curl is &lt;7.37.0-37.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553142" version="1" comment="libcurl4 is &lt;7.37.0-37.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553143" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553144" version="1" comment="kernel-default is &lt;4.4.155-94.50.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553145" version="1" comment="kernel-default-base is &lt;4.4.155-94.50.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553146" version="1" comment="kernel-default-devel is &lt;4.4.155-94.50.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553147" version="1" comment="kernel-default-man is &lt;4.4.155-94.50.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520059" version="1" comment="kernel-devel is &lt;4.4.155-94.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520060" version="1" comment="kernel-macros is &lt;4.4.155-94.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520061" version="1" comment="kernel-source is &lt;4.4.155-94.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553148" version="1" comment="kernel-syms is &lt;4.4.155-94.50.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553149" version="1" comment="openslp is &lt;2.0.0-18.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545782" version="1" comment="openslp-32bit is &lt;2.0.0-18.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553150" version="1" comment="openslp-server is &lt;2.0.0-18.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553151" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553152" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553153" version="1" comment="liblouis-data is &lt;2.6.4-6.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553154" version="1" comment="liblouis9 is &lt;2.6.4-6.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553155" version="1" comment="python-louis is &lt;2.6.4-6.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553156" version="1" comment="python3-louis is &lt;2.6.4-6.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553157" version="1" comment="libzypp is &lt;16.17.20-2.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553158" version="1" comment="zypper is &lt;1.13.45-21.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520075" version="1" comment="zypper-log is &lt;1.13.45-21.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553159" version="1" comment="apache2 is &lt;2.4.23-29.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530250" version="1" comment="apache2-doc is &lt;2.4.23-29.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553160" version="1" comment="apache2-example-pages is &lt;2.4.23-29.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553161" version="1" comment="apache2-prefork is &lt;2.4.23-29.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553162" version="1" comment="apache2-utils is &lt;2.4.23-29.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553163" version="1" comment="apache2-worker is &lt;2.4.23-29.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553164" version="1" comment="libXcursor1 is &lt;1.1.14-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553165" version="1" comment="libXcursor1-32bit is &lt;1.1.14-4.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548300" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.20-30.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530260" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.20-30.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530262" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.20-30.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541627" version="1" comment="ant is &lt;1.9.4-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553166" version="1" comment="libtiff5 is &lt;4.0.9-44.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553167" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553168" version="1" comment="tiff is &lt;4.0.9-44.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553169" version="1" comment="gnutls is &lt;3.3.27-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553170" version="1" comment="libgnutls-openssl27 is &lt;3.3.27-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553171" version="1" comment="libgnutls28 is &lt;3.3.27-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553172" version="1" comment="libgnutls28-32bit is &lt;3.3.27-3.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553173" version="1" comment="gd is &lt;2.1.0-24.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553174" version="1" comment="shadow is &lt;4.2.1-27.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553175" version="1" comment="kernel-azure is &lt;4.4.155-4.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553176" version="1" comment="kernel-azure-base is &lt;4.4.155-4.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553177" version="1" comment="kernel-azure-devel is &lt;4.4.155-4.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553178" version="1" comment="kernel-devel-azure is &lt;4.4.155-4.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553179" version="1" comment="kernel-source-azure is &lt;4.4.155-4.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553180" version="1" comment="kernel-syms-azure is &lt;4.4.155-4.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553181" version="1" comment="libvirt is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553182" version="1" comment="libvirt-admin is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553183" version="1" comment="libvirt-client is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553184" version="1" comment="libvirt-daemon is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553185" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553186" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553187" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520093" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553188" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553189" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553190" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553191" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553192" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553193" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553194" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553195" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553196" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553197" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553198" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553199" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553200" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553201" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553202" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553203" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520110" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553204" version="1" comment="libvirt-doc is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553205" version="1" comment="libvirt-libs is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553206" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553207" version="1" comment="libvirt-nss is &lt;3.3.0-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553208" version="1" comment="libwireshark9 is &lt;2.4.9-48.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553209" version="1" comment="libwiretap7 is &lt;2.4.9-48.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553210" version="1" comment="libwscodecs1 is &lt;2.4.9-48.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553211" version="1" comment="libwsutil8 is &lt;2.4.9-48.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553212" version="1" comment="wireshark is &lt;2.4.9-48.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553213" version="1" comment="wireshark-gtk is &lt;2.4.9-48.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553214" version="1" comment="res-signingkeys is &lt;3.0.37-52.23.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553215" version="1" comment="smt is &lt;3.0.37-52.23.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553216" version="1" comment="smt-support is &lt;3.0.37-52.23.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553217" version="1" comment="yast2-smt is &lt;3.0.14-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541654" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553218" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550545" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553219" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550547" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553220" version="1" comment="openssl is &lt;1.0.2j-60.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530269" version="1" comment="openssl-doc is &lt;1.0.2j-60.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550549" version="1" comment="libncurses5 is &lt;5.9-58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550550" version="1" comment="libncurses5-32bit is &lt;5.9-58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550551" version="1" comment="libncurses6 is &lt;5.9-58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550552" version="1" comment="libncurses6-32bit is &lt;5.9-58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541322" version="1" comment="ncurses-devel is &lt;5.9-58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550553" version="1" comment="ncurses-devel-32bit is &lt;5.9-58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550554" version="1" comment="ncurses-utils is &lt;5.9-58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550555" version="1" comment="tack is &lt;5.9-58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550556" version="1" comment="terminfo is &lt;5.9-58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550557" version="1" comment="terminfo-base is &lt;5.9-58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553221" version="1" comment="unzip is &lt;6.00-33.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553222" version="1" comment="ghostscript is &lt;9.25-23.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553223" version="1" comment="ghostscript-x11 is &lt;9.25-23.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553224" version="1" comment="g3utils is &lt;1.1.36-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553225" version="1" comment="mgetty is &lt;1.1.36-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550566" version="1" comment="libsystemd0 is &lt;228-150.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550567" version="1" comment="libsystemd0-32bit is &lt;228-150.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550568" version="1" comment="libudev1 is &lt;228-150.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550569" version="1" comment="libudev1-32bit is &lt;228-150.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550570" version="1" comment="systemd is &lt;228-150.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550571" version="1" comment="systemd-32bit is &lt;228-150.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518816" version="1" comment="systemd-bash-completion is &lt;228-150.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550572" version="1" comment="systemd-sysvinit is &lt;228-150.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550573" version="1" comment="udev is &lt;228-150.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553226" version="1" comment="openslp is &lt;2.0.0-18.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545819" version="1" comment="openslp-32bit is &lt;2.0.0-18.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553227" version="1" comment="openslp-server is &lt;2.0.0-18.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553228" version="1" comment="kernel-default is &lt;4.4.156-94.57.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553229" version="1" comment="kernel-default-base is &lt;4.4.156-94.57.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553230" version="1" comment="kernel-default-devel is &lt;4.4.156-94.57.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553231" version="1" comment="kernel-default-man is &lt;4.4.156-94.57.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520133" version="1" comment="kernel-devel is &lt;4.4.156-94.57.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520134" version="1" comment="kernel-macros is &lt;4.4.156-94.57.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520135" version="1" comment="kernel-source is &lt;4.4.156-94.57.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553232" version="1" comment="kernel-syms is &lt;4.4.156-94.57.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553233" version="1" comment="libtasn1 is &lt;4.9-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553234" version="1" comment="libtasn1-6 is &lt;4.9-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553235" version="1" comment="libtasn1-6-32bit is &lt;4.9-3.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553236" version="1" comment="libkpathsea6 is &lt;6.2.0dev-22.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553237" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.181-27.26.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553238" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.181-27.26.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553239" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.181-27.26.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553240" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.181-27.26.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553241" version="1" comment="cups-filters is &lt;1.0.58-19.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553242" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-19.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553243" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-19.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553244" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-19.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553245" version="1" comment="libqpdf18 is &lt;7.1.1-3.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553246" version="1" comment="qpdf is &lt;7.1.1-3.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553247" version="1" comment="libSoundTouch0 is &lt;1.7.1-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553248" version="1" comment="libecpg6 is &lt;10.5-1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553249" version="1" comment="libpq5 is &lt;10.5-1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545829" version="1" comment="libpq5-32bit is &lt;10.5-1.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530291" version="1" comment="postgresql-init is &lt;10-17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553250" version="1" comment="postgresql10 is &lt;10.5-1.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553251" version="1" comment="postgresql10-contrib is &lt;10.5-1.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530293" version="1" comment="postgresql10-docs is &lt;10.5-1.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553252" version="1" comment="postgresql10-server is &lt;10.5-1.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553253" version="1" comment="libxml2-2 is &lt;2.9.4-46.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553254" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553255" version="1" comment="libxml2-doc is &lt;2.9.4-46.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553256" version="1" comment="libxml2-tools is &lt;2.9.4-46.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553257" version="1" comment="python-libxml2 is &lt;2.9.4-46.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553258" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.79.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553259" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.79.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550579" version="1" comment="bind is &lt;9.9.9P1-63.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550580" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533101" version="1" comment="bind-doc is &lt;9.9.9P1-63.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550581" version="1" comment="bind-libs is &lt;9.9.9P1-63.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548322" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550582" version="1" comment="bind-utils is &lt;9.9.9P1-63.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553260" version="1" comment="libX11-6 is &lt;1.6.2-12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553261" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520166" version="1" comment="libX11-data is &lt;1.6.2-12.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553262" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553263" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553264" version="1" comment="libxcb-dri2-0 is &lt;1.10-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553265" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541720" version="1" comment="libxcb-dri3-0 is &lt;1.10-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553266" version="1" comment="libxcb-dri3-0-32bit is &lt;1.10-4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553267" version="1" comment="libxcb-glx0 is &lt;1.10-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553268" version="1" comment="libxcb-glx0-32bit is &lt;1.10-4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541721" version="1" comment="libxcb-present0 is &lt;1.10-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553269" version="1" comment="libxcb-present0-32bit is &lt;1.10-4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553270" version="1" comment="libxcb-randr0 is &lt;1.10-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553271" version="1" comment="libxcb-render0 is &lt;1.10-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553272" version="1" comment="libxcb-render0-32bit is &lt;1.10-4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553273" version="1" comment="libxcb-shape0 is &lt;1.10-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553274" version="1" comment="libxcb-shm0 is &lt;1.10-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553275" version="1" comment="libxcb-shm0-32bit is &lt;1.10-4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553276" version="1" comment="libxcb-sync1 is &lt;1.10-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553277" version="1" comment="libxcb-sync1-32bit is &lt;1.10-4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553278" version="1" comment="libxcb-xf86dri0 is &lt;1.10-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553279" version="1" comment="libxcb-xfixes0 is &lt;1.10-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553280" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541726" version="1" comment="libxcb-xinerama0 is &lt;1.10-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553281" version="1" comment="libxcb-xkb1 is &lt;1.10-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553282" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553283" version="1" comment="libxcb-xv0 is &lt;1.10-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553284" version="1" comment="libxcb1 is &lt;1.10-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553285" version="1" comment="libxcb1-32bit is &lt;1.10-4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553286" version="1" comment="axis is &lt;1.4-290.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553287" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553288" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553289" version="1" comment="libdcerpc0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553290" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553291" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553292" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553293" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553294" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553295" version="1" comment="libndr-standard0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553296" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553297" version="1" comment="libndr0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553298" version="1" comment="libndr0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553299" version="1" comment="libnetapi0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553300" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553301" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553302" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553303" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553304" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553305" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553306" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553307" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553308" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553309" version="1" comment="libsamba-util0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553310" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553311" version="1" comment="libsamdb0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553312" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553313" version="1" comment="libsmbclient0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553314" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553315" version="1" comment="libsmbconf0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553316" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553317" version="1" comment="libsmbldap0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553318" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553319" version="1" comment="libtevent-util0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553320" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553321" version="1" comment="libwbclient0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553322" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553323" version="1" comment="samba is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553324" version="1" comment="samba-client is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553325" version="1" comment="samba-client-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520233" version="1" comment="samba-doc is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553326" version="1" comment="samba-libs is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553327" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553328" version="1" comment="samba-winbind is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553329" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553330" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553331" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553332" version="1" comment="binutils is &lt;2.31-9.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553333" version="1" comment="fuse is &lt;2.9.3-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553334" version="1" comment="libfuse2 is &lt;2.9.3-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550587" version="1" comment="libXfont1 is &lt;1.5.1-11.3.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550588" version="1" comment="ecryptfs-utils is &lt;103-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550589" version="1" comment="ecryptfs-utils-32bit is &lt;103-8.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553335" version="1" comment="libXdmcp6 is &lt;1.1.1-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553336" version="1" comment="libXdmcp6-32bit is &lt;1.1.1-12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553337" version="1" comment="libICE6 is &lt;1.0.8-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553338" version="1" comment="libICE6-32bit is &lt;1.0.8-12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553339" version="1" comment="python3-rpm is &lt;4.11.2-16.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553340" version="1" comment="rpm is &lt;4.11.2-16.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553341" version="1" comment="rpm-32bit is &lt;4.11.2-16.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553342" version="1" comment="rpm-build is &lt;4.11.2-16.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553343" version="1" comment="rpm-python is &lt;4.11.2-16.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553344" version="1" comment="libtiff5 is &lt;4.0.9-44.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553345" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553346" version="1" comment="tiff is &lt;4.0.9-44.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553347" version="1" comment="pam_pkcs11 is &lt;0.6.8-7.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553348" version="1" comment="pam_pkcs11-32bit is &lt;0.6.8-7.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553349" version="1" comment="libjasper1 is &lt;1.900.14-195.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553350" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553351" version="1" comment="ntp is &lt;4.2.8p12-64.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553352" version="1" comment="ntp-doc is &lt;4.2.8p12-64.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553353" version="1" comment="postgresql96 is &lt;9.6.10-3.22.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553354" version="1" comment="postgresql96-contrib is &lt;9.6.10-3.22.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530312" version="1" comment="postgresql96-docs is &lt;9.6.10-3.22.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553355" version="1" comment="postgresql96-server is &lt;9.6.10-3.22.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553356" version="1" comment="tomcat is &lt;8.0.53-29.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553357" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553358" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553359" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553360" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553361" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553362" version="1" comment="tomcat-lib is &lt;8.0.53-29.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553363" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553364" version="1" comment="tomcat-webapps is &lt;8.0.53-29.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553365" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.20.3-2.23.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553366" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.20.3-2.23.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553367" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.20.3-2.23.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553368" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.20.3-2.23.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553369" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.20.3-2.23.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553370" version="1" comment="libexempi3 is &lt;2.2.1-5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550590" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550591" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553371" version="1" comment="clamav is &lt;0.100.2-33.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553372" version="1" comment="libsnmp30 is &lt;5.7.3-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548354" version="1" comment="libsnmp30-32bit is &lt;5.7.3-6.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553373" version="1" comment="net-snmp is &lt;5.7.3-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553374" version="1" comment="perl-SNMP is &lt;5.7.3-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553375" version="1" comment="snmp-mibs is &lt;5.7.3-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550592" version="1" comment="libsndfile1 is &lt;1.0.25-36.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550593" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.7.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553376" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.85.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553377" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.85.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553378" version="1" comment="res-signingkeys is &lt;3.0.38-52.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553379" version="1" comment="smt is &lt;3.0.38-52.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553380" version="1" comment="smt-support is &lt;3.0.38-52.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520284" version="1" comment="xen is &lt;4.9.3_03-3.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553381" version="1" comment="xen-doc-html is &lt;4.9.3_03-3.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520285" version="1" comment="xen-libs is &lt;4.9.3_03-3.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520286" version="1" comment="xen-libs-32bit is &lt;4.9.3_03-3.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553382" version="1" comment="xen-tools is &lt;4.9.3_03-3.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553383" version="1" comment="xen-tools-domU is &lt;4.9.3_03-3.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553384" version="1" comment="lcms2 is &lt;2.7-9.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553385" version="1" comment="liblcms2-2 is &lt;2.7-9.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553386" version="1" comment="liblcms2-2-32bit is &lt;2.7-9.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553387" version="1" comment="qemu is &lt;2.9.1-6.19.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553388" version="1" comment="qemu-arm is &lt;2.9.1-6.19.11 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553389" version="1" comment="qemu-block-curl is &lt;2.9.1-6.19.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553390" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.19.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553391" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.19.11 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553392" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.19.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553393" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.19.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520292" version="1" comment="qemu-ipxe is &lt;1.0.0-6.19.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553394" version="1" comment="qemu-kvm is &lt;2.9.1-6.19.11 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553395" version="1" comment="qemu-lang is &lt;2.9.1-6.19.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553396" version="1" comment="qemu-ppc is &lt;2.9.1-6.19.11 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553397" version="1" comment="qemu-s390 is &lt;2.9.1-6.19.11 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520294" version="1" comment="qemu-seabios is &lt;1.10.2-6.19.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520295" version="1" comment="qemu-sgabios is &lt;8-6.19.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553398" version="1" comment="qemu-tools is &lt;2.9.1-6.19.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520297" version="1" comment="qemu-vgabios is &lt;1.10.2-6.19.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520298" version="1" comment="qemu-x86 is &lt;2.9.1-6.19.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553399" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553400" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553401" version="1" comment="python is &lt;2.7.13-28.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553402" version="1" comment="python-32bit is &lt;2.7.13-28.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553403" version="1" comment="python-base is &lt;2.7.13-28.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553404" version="1" comment="python-base-32bit is &lt;2.7.13-28.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553405" version="1" comment="python-curses is &lt;2.7.13-28.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553406" version="1" comment="python-demo is &lt;2.7.13-28.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553407" version="1" comment="python-doc is &lt;2.7.13-28.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553408" version="1" comment="python-doc-pdf is &lt;2.7.13-28.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553409" version="1" comment="python-gdbm is &lt;2.7.13-28.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553410" version="1" comment="python-idle is &lt;2.7.13-28.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553411" version="1" comment="python-tk is &lt;2.7.13-28.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553412" version="1" comment="python-xml is &lt;2.7.13-28.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553413" version="1" comment="apache2 is &lt;2.4.23-29.27.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530318" version="1" comment="apache2-doc is &lt;2.4.23-29.27.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553414" version="1" comment="apache2-example-pages is &lt;2.4.23-29.27.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553415" version="1" comment="apache2-prefork is &lt;2.4.23-29.27.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553416" version="1" comment="apache2-utils is &lt;2.4.23-29.27.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553417" version="1" comment="apache2-worker is &lt;2.4.23-29.27.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553418" version="1" comment="audiofile is &lt;0.3.6-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553419" version="1" comment="libaudiofile1 is &lt;0.3.6-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553420" version="1" comment="libaudiofile1-32bit is &lt;0.3.6-11.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553421" version="1" comment="libwireshark9 is &lt;2.4.10-48.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553422" version="1" comment="libwiretap7 is &lt;2.4.10-48.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553423" version="1" comment="libwscodecs1 is &lt;2.4.10-48.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553424" version="1" comment="libwsutil8 is &lt;2.4.10-48.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553425" version="1" comment="wireshark is &lt;2.4.10-48.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553426" version="1" comment="wireshark-gtk is &lt;2.4.10-48.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553427" version="1" comment="MozillaFirefox is &lt;60.2.2esr-109.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553428" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-32.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553429" version="1" comment="MozillaFirefox-translations-common is &lt;60.2.2esr-109.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553430" version="1" comment="apache2-mod_nss is &lt;1.0.14-19.6.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553431" version="1" comment="libfreebl3 is &lt;3.36.4-58.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545901" version="1" comment="libfreebl3-32bit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553432" version="1" comment="libfreebl3-hmac is &lt;3.36.4-58.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545903" version="1" comment="libfreebl3-hmac-32bit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553433" version="1" comment="libsoftokn3 is &lt;3.36.4-58.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545905" version="1" comment="libsoftokn3-32bit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553434" version="1" comment="libsoftokn3-hmac is &lt;3.36.4-58.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545907" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553435" version="1" comment="mozilla-nspr is &lt;4.19-19.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545909" version="1" comment="mozilla-nspr-32bit is &lt;4.19-19.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553436" version="1" comment="mozilla-nss is &lt;3.36.4-58.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545912" version="1" comment="mozilla-nss-32bit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553437" version="1" comment="mozilla-nss-certs is &lt;3.36.4-58.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545914" version="1" comment="mozilla-nss-certs-32bit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553438" version="1" comment="mozilla-nss-sysinit is &lt;3.36.4-58.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545917" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553439" version="1" comment="mozilla-nss-tools is &lt;3.36.4-58.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553440" version="1" comment="curl is &lt;7.37.0-37.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553441" version="1" comment="libcurl4 is &lt;7.37.0-37.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553442" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553443" version="1" comment="libSoundTouch0 is &lt;1.7.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553444" version="1" comment="opensc is &lt;0.13.0-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553445" version="1" comment="libarchive13 is &lt;3.1.2-26.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550599" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550600" version="1" comment="libjpeg62 is &lt;62.2.0-31.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550601" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.7.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550602" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550603" version="1" comment="libjpeg8 is &lt;8.1.2-31.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550604" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.7.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550605" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550606" version="1" comment="spice-vdagent is &lt;0.16.0-8.5.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553446" version="1" comment="kernel-default is &lt;4.4.162-94.69.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553447" version="1" comment="kernel-default-base is &lt;4.4.162-94.69.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553448" version="1" comment="kernel-default-devel is &lt;4.4.162-94.69.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553449" version="1" comment="kernel-default-man is &lt;4.4.162-94.69.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520346" version="1" comment="kernel-devel is &lt;4.4.162-94.69.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520347" version="1" comment="kernel-macros is &lt;4.4.162-94.69.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520348" version="1" comment="kernel-source is &lt;4.4.162-94.69.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553450" version="1" comment="kernel-syms is &lt;4.4.162-94.69.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553451" version="1" comment="lttng-modules is &lt;2.7.1-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553452" version="1" comment="lttng-modules-kmp-default is &lt;2.7.1_k4.4.162_94.69-8.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550607" version="1" comment="MozillaFirefox is &lt;52.6.0esr-109.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550608" version="1" comment="MozillaFirefox-translations is &lt;52.6.0esr-109.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553453" version="1" comment="MozillaFirefox is &lt;60.3.0-109.50.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553454" version="1" comment="MozillaFirefox-translations-common is &lt;60.3.0-109.50.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553455" version="1" comment="libsystemd0 is &lt;228-150.53.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550610" version="1" comment="libsystemd0-32bit is &lt;228-150.53.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553456" version="1" comment="libudev1 is &lt;228-150.53.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550612" version="1" comment="libudev1-32bit is &lt;228-150.53.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553457" version="1" comment="systemd is &lt;228-150.53.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550614" version="1" comment="systemd-32bit is &lt;228-150.53.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520358" version="1" comment="systemd-bash-completion is &lt;228-150.53.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553458" version="1" comment="systemd-sysvinit is &lt;228-150.53.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553459" version="1" comment="udev is &lt;228-150.53.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553460" version="1" comment="libecpg6 is &lt;10.6-1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553461" version="1" comment="libpq5 is &lt;10.6-1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553462" version="1" comment="libpq5-32bit is &lt;10.6-1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553463" version="1" comment="postgresql10 is &lt;10.6-1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553464" version="1" comment="postgresql10-contrib is &lt;10.6-1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553465" version="1" comment="postgresql10-docs is &lt;10.6-1.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553466" version="1" comment="postgresql10-server is &lt;10.6-1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553467" version="1" comment="squid is &lt;3.5.21-26.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550627" version="1" comment="libmysqlclient18 is &lt;10.0.33-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550628" version="1" comment="libmysqlclient18-32bit is &lt;10.0.33-29.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550629" version="1" comment="mariadb is &lt;10.0.33-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550630" version="1" comment="mariadb-client is &lt;10.0.33-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550631" version="1" comment="mariadb-errormessages is &lt;10.0.33-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550632" version="1" comment="mariadb-tools is &lt;10.0.33-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553468" version="1" comment="kernel-default is &lt;4.4.114-94.11.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553469" version="1" comment="kernel-default-base is &lt;4.4.114-94.11.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553470" version="1" comment="kernel-default-devel is &lt;4.4.114-94.11.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553471" version="1" comment="kernel-default-man is &lt;4.4.114-94.11.3 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520369" version="1" comment="kernel-devel is &lt;4.4.114-94.11.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520370" version="1" comment="kernel-macros is &lt;4.4.114-94.11.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520371" version="1" comment="kernel-source is &lt;4.4.114-94.11.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553472" version="1" comment="kernel-syms is &lt;4.4.114-94.11.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550651" version="1" comment="libxml2-2 is &lt;2.9.4-46.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550652" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533151" version="1" comment="libxml2-doc is &lt;2.9.4-46.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550653" version="1" comment="libxml2-tools is &lt;2.9.4-46.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550654" version="1" comment="python-libxml2 is &lt;2.9.4-46.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541801" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553473" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550657" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553474" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550659" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553475" version="1" comment="openssl is &lt;1.0.2j-60.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530332" version="1" comment="openssl-doc is &lt;1.0.2j-60.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553476" version="1" comment="python3-rpm is &lt;4.11.2-16.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553477" version="1" comment="rpm is &lt;4.11.2-16.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545951" version="1" comment="rpm-32bit is &lt;4.11.2-16.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553478" version="1" comment="rpm-build is &lt;4.11.2-16.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553479" version="1" comment="rpm-python is &lt;4.11.2-16.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550661" version="1" comment="ghostscript is &lt;9.15-23.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550662" version="1" comment="ghostscript-x11 is &lt;9.15-23.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553480" version="1" comment="libexiv2-12 is &lt;0.23-12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553481" version="1" comment="libtiff5 is &lt;4.0.9-44.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553482" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553483" version="1" comment="tiff is &lt;4.0.9-44.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553484" version="1" comment="openssh is &lt;7.2p2-74.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553485" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553486" version="1" comment="openssh-fips is &lt;7.2p2-74.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553487" version="1" comment="openssh-helpers is &lt;7.2p2-74.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553488" version="1" comment="dpdk is &lt;16.11.8-8.10.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553489" version="1" comment="dpdk-kmp-default is &lt;16.11.8_k4.4.156_94.64-8.10.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553490" version="1" comment="dpdk-thunderx is &lt;16.11.8-8.10.2 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553491" version="1" comment="dpdk-thunderx-kmp-default is &lt;16.11.8_k4.4.156_94.64-8.10.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553492" version="1" comment="dpdk-tools is &lt;16.11.8-8.10.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545971" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.35-38.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530339" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.35-38.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545972" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.35-38.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530342" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.35-38.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553493" version="1" comment="libncurses5 is &lt;5.9-61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553494" version="1" comment="libncurses5-32bit is &lt;5.9-61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553495" version="1" comment="libncurses6 is &lt;5.9-61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553496" version="1" comment="libncurses6-32bit is &lt;5.9-61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541808" version="1" comment="ncurses-devel is &lt;5.9-61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553497" version="1" comment="ncurses-devel-32bit is &lt;5.9-61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553498" version="1" comment="ncurses-utils is &lt;5.9-61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553499" version="1" comment="tack is &lt;5.9-61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553500" version="1" comment="terminfo is &lt;5.9-61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553501" version="1" comment="terminfo-base is &lt;5.9-61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550672" version="1" comment="ft2demos is &lt;2.6.3-7.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550673" version="1" comment="libfreetype6 is &lt;2.6.3-7.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550674" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553502" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.93.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553503" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.93.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550675" version="1" comment="ipsec-tools is &lt;0.8.0-19.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553504" version="1" comment="python-cryptography is &lt;1.3.1-7.13.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520402" version="1" comment="python-pyOpenSSL is &lt;16.0.0-4.11.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520403" version="1" comment="python-setuptools is &lt;18.0.1-4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553505" version="1" comment="python3-cryptography is &lt;1.3.1-7.13.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521792" version="1" comment="python3-pyOpenSSL is &lt;16.0.0-4.11.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520404" version="1" comment="python3-setuptools is &lt;18.0.1-4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548395" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.25-30.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530344" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.25-30.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530346" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.25-30.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520407" version="1" comment="xen is &lt;4.9.3_03-3.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553506" version="1" comment="xen-doc-html is &lt;4.9.3_03-3.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520408" version="1" comment="xen-libs is &lt;4.9.3_03-3.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520409" version="1" comment="xen-libs-32bit is &lt;4.9.3_03-3.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553507" version="1" comment="xen-tools is &lt;4.9.3_03-3.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553508" version="1" comment="xen-tools-domU is &lt;4.9.3_03-3.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553509" version="1" comment="ghostscript is &lt;9.26-23.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553510" version="1" comment="ghostscript-x11 is &lt;9.26-23.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553511" version="1" comment="libspectre1 is &lt;0.2.7-12.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553512" version="1" comment="cups is &lt;1.7.5-20.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553513" version="1" comment="cups-client is &lt;1.7.5-20.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553514" version="1" comment="cups-libs is &lt;1.7.5-20.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553515" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541824" version="1" comment="git-core is &lt;2.12.3-27.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553516" version="1" comment="openvswitch is &lt;2.7.6-3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553517" version="1" comment="qemu is &lt;2.9.1-6.22.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553518" version="1" comment="qemu-arm is &lt;2.9.1-6.22.3 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553519" version="1" comment="qemu-block-curl is &lt;2.9.1-6.22.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553520" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.22.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553521" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.22.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553522" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.22.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553523" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.22.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520419" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.22.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553524" version="1" comment="qemu-kvm is &lt;2.9.1-6.22.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553525" version="1" comment="qemu-lang is &lt;2.9.1-6.22.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553526" version="1" comment="qemu-ppc is &lt;2.9.1-6.22.3 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553527" version="1" comment="qemu-s390 is &lt;2.9.1-6.22.3 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520421" version="1" comment="qemu-seabios is &lt;1.10.2-6.22.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520422" version="1" comment="qemu-sgabios is &lt;8-6.22.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553528" version="1" comment="qemu-tools is &lt;2.9.1-6.22.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520424" version="1" comment="qemu-vgabios is &lt;1.10.2-6.22.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520425" version="1" comment="qemu-x86 is &lt;2.9.1-6.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553529" version="1" comment="tcpdump is &lt;4.9.2-14.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553530" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553531" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553532" version="1" comment="openldap2 is &lt;2.4.41-18.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553533" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553534" version="1" comment="openldap2-client is &lt;2.4.41-18.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553535" version="1" comment="libQt5Concurrent5 is &lt;5.6.2-6.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553536" version="1" comment="libQt5Core5 is &lt;5.6.2-6.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553537" version="1" comment="libQt5DBus5 is &lt;5.6.2-6.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553538" version="1" comment="libQt5Gui5 is &lt;5.6.2-6.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553539" version="1" comment="libQt5Network5 is &lt;5.6.2-6.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553540" version="1" comment="libQt5OpenGL5 is &lt;5.6.2-6.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553541" version="1" comment="libQt5PrintSupport5 is &lt;5.6.2-6.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553542" version="1" comment="libQt5Sql5 is &lt;5.6.2-6.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553543" version="1" comment="libQt5Sql5-mysql is &lt;5.6.2-6.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553544" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.2-6.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553545" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.2-6.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553546" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.2-6.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553547" version="1" comment="libQt5Test5 is &lt;5.6.2-6.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553548" version="1" comment="libQt5Widgets5 is &lt;5.6.2-6.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553549" version="1" comment="libQt5Xml5 is &lt;5.6.2-6.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553550" version="1" comment="bluez is &lt;5.13-5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553551" version="1" comment="libbluetooth3 is &lt;5.13-5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553552" version="1" comment="libtiff5 is &lt;4.0.9-44.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553553" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553554" version="1" comment="tiff is &lt;4.0.9-44.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553555" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553556" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553557" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1492060560.b6d11d7c46-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553558" version="1" comment="qemu-uefi-aarch64 is &lt;2017+git1492060560.b6d11d7c46-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520450" version="1" comment="xen is &lt;4.9.1_08-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553559" version="1" comment="xen-doc-html is &lt;4.9.1_08-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520451" version="1" comment="xen-libs is &lt;4.9.1_08-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520452" version="1" comment="xen-libs-32bit is &lt;4.9.1_08-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553560" version="1" comment="xen-tools is &lt;4.9.1_08-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553561" version="1" comment="xen-tools-domU is &lt;4.9.1_08-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553562" version="1" comment="MozillaFirefox is &lt;60.4.0esr-109.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553563" version="1" comment="MozillaFirefox-translations-common is &lt;60.4.0esr-109.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553564" version="1" comment="libfreebl3 is &lt;3.40.1-58.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546022" version="1" comment="libfreebl3-32bit is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553565" version="1" comment="libsoftokn3 is &lt;3.40.1-58.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546024" version="1" comment="libsoftokn3-32bit is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553566" version="1" comment="mozilla-nspr is &lt;4.20-19.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546026" version="1" comment="mozilla-nspr-32bit is &lt;4.20-19.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553567" version="1" comment="mozilla-nss is &lt;3.40.1-58.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546029" version="1" comment="mozilla-nss-32bit is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553568" version="1" comment="mozilla-nss-certs is &lt;3.40.1-58.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546031" version="1" comment="mozilla-nss-certs-32bit is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553569" version="1" comment="mozilla-nss-sysinit is &lt;3.40.1-58.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546034" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553570" version="1" comment="mozilla-nss-tools is &lt;3.40.1-58.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546036" version="1" comment="mailman is &lt;2.1.17-3.3.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553571" version="1" comment="libwireshark9 is &lt;2.4.11-48.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553572" version="1" comment="libwiretap7 is &lt;2.4.11-48.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553573" version="1" comment="libwscodecs1 is &lt;2.4.11-48.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553574" version="1" comment="libwsutil8 is &lt;2.4.11-48.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553575" version="1" comment="wireshark is &lt;2.4.11-48.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553576" version="1" comment="wireshark-gtk is &lt;2.4.11-48.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550701" version="1" comment="glibc is &lt;2.22-62.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550702" version="1" comment="glibc-32bit is &lt;2.22-62.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550703" version="1" comment="glibc-devel is &lt;2.22-62.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550704" version="1" comment="glibc-devel-32bit is &lt;2.22-62.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533165" version="1" comment="glibc-html is &lt;2.22-62.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518946" version="1" comment="glibc-i18ndata is &lt;2.22-62.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533166" version="1" comment="glibc-info is &lt;2.22-62.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550705" version="1" comment="glibc-locale is &lt;2.22-62.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550706" version="1" comment="glibc-locale-32bit is &lt;2.22-62.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550707" version="1" comment="glibc-profile is &lt;2.22-62.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550708" version="1" comment="glibc-profile-32bit is &lt;2.22-62.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550709" version="1" comment="nscd is &lt;2.22-62.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550710" version="1" comment="libfpm_pb0 is &lt;1.1.1-17.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550711" version="1" comment="libospf0 is &lt;1.1.1-17.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550712" version="1" comment="libospfapiclient0 is &lt;1.1.1-17.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550713" version="1" comment="libquagga_pb0 is &lt;1.1.1-17.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550714" version="1" comment="libzebra1 is &lt;1.1.1-17.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550715" version="1" comment="quagga is &lt;1.1.1-17.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550716" version="1" comment="p7zip is &lt;9.20.1-7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550717" version="1" comment="dovecot22 is &lt;2.2.31-19.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550718" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550719" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550720" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550724" version="1" comment="libecpg6 is &lt;9.6.7-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550725" version="1" comment="libpq5 is &lt;9.6.7-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550726" version="1" comment="libpq5-32bit is &lt;9.6.7-3.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550727" version="1" comment="postgresql96 is &lt;9.6.7-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550728" version="1" comment="postgresql96-contrib is &lt;9.6.7-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533185" version="1" comment="postgresql96-docs is &lt;9.6.7-3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550729" version="1" comment="postgresql96-server is &lt;9.6.7-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550730" version="1" comment="db48-utils is &lt;4.8.30-29.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550731" version="1" comment="libdb-4_8 is &lt;4.8.30-29.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550732" version="1" comment="libdb-4_8-32bit is &lt;4.8.30-29.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550733" version="1" comment="dhcp is &lt;4.3.3-10.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550734" version="1" comment="dhcp-client is &lt;4.3.3-10.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550735" version="1" comment="dhcp-relay is &lt;4.3.3-10.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550736" version="1" comment="dhcp-server is &lt;4.3.3-10.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550737" version="1" comment="libsystemd0 is &lt;228-150.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550738" version="1" comment="libsystemd0-32bit is &lt;228-150.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550739" version="1" comment="libudev1 is &lt;228-150.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550740" version="1" comment="libudev1-32bit is &lt;228-150.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550741" version="1" comment="systemd is &lt;228-150.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550742" version="1" comment="systemd-32bit is &lt;228-150.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518969" version="1" comment="systemd-bash-completion is &lt;228-150.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550743" version="1" comment="systemd-sysvinit is &lt;228-150.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550744" version="1" comment="udev is &lt;228-150.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550745" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550746" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550747" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550748" version="1" comment="openexr is &lt;2.1.0-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550749" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550750" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550751" version="1" comment="cups is &lt;1.7.5-20.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550752" version="1" comment="cups-client is &lt;1.7.5-20.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550753" version="1" comment="cups-libs is &lt;1.7.5-20.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546056" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550754" version="1" comment="libwavpack1 is &lt;4.60.99-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550755" version="1" comment="squid is &lt;3.5.21-26.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553577" version="1" comment="augeas is &lt;1.2.0-17.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553578" version="1" comment="augeas-lenses is &lt;1.2.0-17.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553579" version="1" comment="libaugeas0 is &lt;1.2.0-17.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550759" version="1" comment="glibc is &lt;2.22-62.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550760" version="1" comment="glibc-32bit is &lt;2.22-62.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550761" version="1" comment="glibc-devel is &lt;2.22-62.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550762" version="1" comment="glibc-devel-32bit is &lt;2.22-62.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533214" version="1" comment="glibc-html is &lt;2.22-62.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519002" version="1" comment="glibc-i18ndata is &lt;2.22-62.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533215" version="1" comment="glibc-info is &lt;2.22-62.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550763" version="1" comment="glibc-locale is &lt;2.22-62.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550764" version="1" comment="glibc-locale-32bit is &lt;2.22-62.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550765" version="1" comment="glibc-profile is &lt;2.22-62.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550766" version="1" comment="glibc-profile-32bit is &lt;2.22-62.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550767" version="1" comment="nscd is &lt;2.22-62.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550768" version="1" comment="shadow is &lt;4.2.1-27.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548431" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.10-30.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535629" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.10-30.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535631" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.10-30.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550769" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.171-43.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550770" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.171-43.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550771" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.171-43.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550772" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.171-43.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550773" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.161-27.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550774" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.161-27.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550775" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.161-27.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550776" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.161-27.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519012" version="1" comment="kernel-firmware is &lt;20170530-21.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519013" version="1" comment="ucode-amd is &lt;20170530-21.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550780" version="1" comment="libcdio14 is &lt;0.90-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550781" version="1" comment="libcdio14-32bit is &lt;0.90-6.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550782" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.20-38.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550783" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.20-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550784" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.20-38.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550785" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.20-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550786" version="1" comment="libmysqlclient18 is &lt;10.0.34-29.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548438" version="1" comment="libmysqlclient18-32bit is &lt;10.0.34-29.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550787" version="1" comment="mariadb is &lt;10.0.34-29.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550788" version="1" comment="mariadb-client is &lt;10.0.34-29.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550789" version="1" comment="mariadb-errormessages is &lt;10.0.34-29.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550790" version="1" comment="mariadb-tools is &lt;10.0.34-29.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519024" version="1" comment="ucode-intel is &lt;20180312-13.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550799" version="1" comment="libxmltooling6 is &lt;1.5.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550800" version="1" comment="xmltooling-schemas is &lt;1.5.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546069" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.20-38.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535646" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.20-38.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546070" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.20-38.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535649" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.20-38.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553580" version="1" comment="libdcerpc-binding0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553581" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553582" version="1" comment="libdcerpc0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553583" version="1" comment="libdcerpc0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553584" version="1" comment="libndr-krb5pac0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553585" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553586" version="1" comment="libndr-nbt0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553587" version="1" comment="libndr-nbt0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553588" version="1" comment="libndr-standard0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553589" version="1" comment="libndr-standard0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553590" version="1" comment="libndr0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553591" version="1" comment="libndr0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553592" version="1" comment="libnetapi0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553593" version="1" comment="libnetapi0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553594" version="1" comment="libsamba-credentials0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553595" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553596" version="1" comment="libsamba-errors0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553597" version="1" comment="libsamba-errors0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553598" version="1" comment="libsamba-hostconfig0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553599" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553600" version="1" comment="libsamba-passdb0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553601" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553602" version="1" comment="libsamba-util0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553603" version="1" comment="libsamba-util0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553604" version="1" comment="libsamdb0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553605" version="1" comment="libsamdb0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553606" version="1" comment="libsmbclient0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553607" version="1" comment="libsmbclient0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553608" version="1" comment="libsmbconf0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553609" version="1" comment="libsmbconf0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553610" version="1" comment="libsmbldap0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553611" version="1" comment="libsmbldap0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553612" version="1" comment="libtalloc2 is &lt;2.1.10-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553613" version="1" comment="libtalloc2-32bit is &lt;2.1.10-3.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553614" version="1" comment="libtevent-util0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553615" version="1" comment="libtevent-util0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553616" version="1" comment="libtevent0 is &lt;0.9.34-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553617" version="1" comment="libtevent0-32bit is &lt;0.9.34-3.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553618" version="1" comment="libwbclient0 is &lt;4.6.13+git.72.2a684235f41-3.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553619" version="1" comment="libwbclient0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553620" version="1" comment="python-talloc is &lt;2.1.10-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553621" version="1" comment="python-talloc-32bit is &lt;2.1.10-3.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553622" version="1" comment="samba is &lt;4.6.13+git.72.2a684235f41-3.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553623" version="1" comment="samba-client is &lt;4.6.13+git.72.2a684235f41-3.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553624" version="1" comment="samba-client-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520574" version="1" comment="samba-doc is &lt;4.6.13+git.72.2a684235f41-3.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553625" version="1" comment="samba-libs is &lt;4.6.13+git.72.2a684235f41-3.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553626" version="1" comment="samba-libs-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553627" version="1" comment="samba-winbind is &lt;4.6.13+git.72.2a684235f41-3.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553628" version="1" comment="samba-winbind-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550803" version="1" comment="libecpg6 is &lt;9.6.8-3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550804" version="1" comment="libpq5 is &lt;9.6.8-3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550805" version="1" comment="libpq5-32bit is &lt;9.6.8-3.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550806" version="1" comment="postgresql96 is &lt;9.6.8-3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550807" version="1" comment="postgresql96-contrib is &lt;9.6.8-3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533246" version="1" comment="postgresql96-docs is &lt;9.6.8-3.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550808" version="1" comment="postgresql96-server is &lt;9.6.8-3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553629" version="1" comment="qemu is &lt;2.9.1-6.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553630" version="1" comment="qemu-arm is &lt;2.9.1-6.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553631" version="1" comment="qemu-block-curl is &lt;2.9.1-6.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553632" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553633" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553634" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553635" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520581" version="1" comment="qemu-ipxe is &lt;1.0.0-6.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553636" version="1" comment="qemu-kvm is &lt;2.9.1-6.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553637" version="1" comment="qemu-lang is &lt;2.9.1-6.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553638" version="1" comment="qemu-ppc is &lt;2.9.1-6.12.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553639" version="1" comment="qemu-s390 is &lt;2.9.1-6.12.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520583" version="1" comment="qemu-seabios is &lt;1.10.2-6.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520584" version="1" comment="qemu-sgabios is &lt;8-6.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553640" version="1" comment="qemu-tools is &lt;2.9.1-6.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520586" version="1" comment="qemu-vgabios is &lt;1.10.2-6.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520587" version="1" comment="qemu-x86 is &lt;2.9.1-6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550809" version="1" comment="curl is &lt;7.37.0-37.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550810" version="1" comment="libcurl4 is &lt;7.37.0-37.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550811" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533250" version="1" comment="libvorbis-doc is &lt;1.3.3-10.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550812" version="1" comment="libvorbis0 is &lt;1.3.3-10.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550813" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550814" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550815" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550816" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550817" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553641" version="1" comment="kernel-default is &lt;4.4.120-94.17.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553642" version="1" comment="kernel-default-base is &lt;4.4.120-94.17.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553643" version="1" comment="kernel-default-devel is &lt;4.4.120-94.17.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553644" version="1" comment="kernel-default-man is &lt;4.4.120-94.17.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520591" version="1" comment="kernel-devel is &lt;4.4.120-94.17.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520592" version="1" comment="kernel-macros is &lt;4.4.120-94.17.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520593" version="1" comment="kernel-source is &lt;4.4.120-94.17.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553645" version="1" comment="kernel-syms is &lt;4.4.120-94.17.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550823" version="1" comment="clamav is &lt;0.99.4-33.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550824" version="1" comment="dhcp is &lt;4.3.3-10.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550825" version="1" comment="dhcp-client is &lt;4.3.3-10.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550826" version="1" comment="dhcp-relay is &lt;4.3.3-10.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550827" version="1" comment="dhcp-server is &lt;4.3.3-10.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533263" version="1" comment="tomcat is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533264" version="1" comment="tomcat-admin-webapps is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533265" version="1" comment="tomcat-docs-webapp is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533266" version="1" comment="tomcat-el-3_0-api is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533267" version="1" comment="tomcat-javadoc is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533268" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533269" version="1" comment="tomcat-lib is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533270" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533271" version="1" comment="tomcat-webapps is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550828" version="1" comment="libwireshark8 is &lt;2.2.13-48.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550829" version="1" comment="libwiretap6 is &lt;2.2.13-48.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550830" version="1" comment="libwscodecs1 is &lt;2.2.13-48.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550831" version="1" comment="libwsutil7 is &lt;2.2.13-48.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550832" version="1" comment="wireshark is &lt;2.2.13-48.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550833" version="1" comment="wireshark-gtk is &lt;2.2.13-48.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550834" version="1" comment="glibc is &lt;2.22-62.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550835" version="1" comment="glibc-32bit is &lt;2.22-62.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550836" version="1" comment="glibc-devel is &lt;2.22-62.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550837" version="1" comment="glibc-devel-32bit is &lt;2.22-62.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533280" version="1" comment="glibc-html is &lt;2.22-62.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519059" version="1" comment="glibc-i18ndata is &lt;2.22-62.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533281" version="1" comment="glibc-info is &lt;2.22-62.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550838" version="1" comment="glibc-locale is &lt;2.22-62.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550839" version="1" comment="glibc-locale-32bit is &lt;2.22-62.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550840" version="1" comment="glibc-profile is &lt;2.22-62.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550841" version="1" comment="glibc-profile-32bit is &lt;2.22-62.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550842" version="1" comment="nscd is &lt;2.22-62.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553646" version="1" comment="librelp0 is &lt;1.2.12-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550844" version="1" comment="libvncclient0 is &lt;0.9.9-17.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550845" version="1" comment="libvncserver0 is &lt;0.9.9-17.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550899" version="1" comment="memcached is &lt;1.4.39-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550900" version="1" comment="krb5 is &lt;1.12.5-40.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550901" version="1" comment="krb5-32bit is &lt;1.12.5-40.23.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550902" version="1" comment="krb5-client is &lt;1.12.5-40.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550903" version="1" comment="krb5-doc is &lt;1.12.5-40.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550904" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550905" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550906" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550907" version="1" comment="krb5-server is &lt;1.12.5-40.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550908" version="1" comment="MozillaFirefox is &lt;52.7.3esr-109.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550909" version="1" comment="MozillaFirefox-translations is &lt;52.7.3esr-109.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550910" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550911" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550912" version="1" comment="libgraphite2-3 is &lt;1.3.1-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550913" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-10.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550933" version="1" comment="libtiff5 is &lt;4.0.9-44.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550934" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550935" version="1" comment="tiff is &lt;4.0.9-44.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553647" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.33-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553648" version="1" comment="libspice-client-glib-helper is &lt;0.33-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553649" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.33-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553650" version="1" comment="libspice-controller0 is &lt;0.33-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553651" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.33-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541885" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.33-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553652" version="1" comment="libidn-tools is &lt;1.28-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553653" version="1" comment="libidn11 is &lt;1.28-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553654" version="1" comment="libidn11-32bit is &lt;1.28-5.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550939" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.161-43.7.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550940" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.161-43.7.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550941" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.161-43.7.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550942" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.161-43.7.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553655" version="1" comment="libvirt is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553656" version="1" comment="libvirt-admin is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553657" version="1" comment="libvirt-client is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553658" version="1" comment="libvirt-daemon is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553659" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553660" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553661" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520610" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553662" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553663" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553664" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553665" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553666" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553667" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553668" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553669" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553670" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553671" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553672" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553673" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553674" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.19.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553675" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553676" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553677" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553678" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520627" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553679" version="1" comment="libvirt-doc is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553680" version="1" comment="libvirt-libs is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553681" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553682" version="1" comment="libvirt-nss is &lt;3.3.0-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520630" version="1" comment="virt-install is &lt;1.4.1-5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520631" version="1" comment="virt-manager is &lt;1.4.1-5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520632" version="1" comment="virt-manager-common is &lt;1.4.1-5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550946" version="1" comment="policycoreutils is &lt;2.5-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550947" version="1" comment="policycoreutils-python is &lt;2.5-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541426" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550948" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550949" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550950" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550951" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550952" version="1" comment="openssl is &lt;1.0.2j-60.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533365" version="1" comment="openssl-doc is &lt;1.0.2j-60.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009527884" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009527885" version="1" comment="python3 is &lt;3.4.6-25.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009527886" version="1" comment="python3-base is &lt;3.4.6-25.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553683" version="1" comment="python3-curses is &lt;3.4.6-25.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553684" version="1" comment="evince is &lt;3.20.2-6.22.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553685" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.22.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520640" version="1" comment="evince-lang is &lt;3.20.2-6.22.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553686" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.22.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553687" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.22.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553688" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.22.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553689" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.22.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553690" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.22.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553691" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.22.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553692" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.22.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553693" version="1" comment="libevview3-3 is &lt;3.20.2-6.22.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553694" version="1" comment="nautilus-evince is &lt;3.20.2-6.22.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550956" version="1" comment="libmysqlclient18 is &lt;10.0.32-29.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550957" version="1" comment="libmysqlclient18-32bit is &lt;10.0.32-29.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550958" version="1" comment="mariadb is &lt;10.0.32-29.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550959" version="1" comment="mariadb-client is &lt;10.0.32-29.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550960" version="1" comment="mariadb-errormessages is &lt;10.0.32-29.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550961" version="1" comment="mariadb-tools is &lt;10.0.32-29.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553695" version="1" comment="memcached is &lt;1.4.39-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553696" version="1" comment="ntp is &lt;4.2.8p11-64.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553697" version="1" comment="ntp-doc is &lt;4.2.8p11-64.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553698" version="1" comment="libwireshark8 is &lt;2.2.14-48.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553699" version="1" comment="libwiretap6 is &lt;2.2.14-48.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553700" version="1" comment="libwscodecs1 is &lt;2.2.14-48.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553701" version="1" comment="libwsutil7 is &lt;2.2.14-48.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553702" version="1" comment="wireshark is &lt;2.2.14-48.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553703" version="1" comment="wireshark-gtk is &lt;2.2.14-48.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553704" version="1" comment="kernel-default is &lt;4.4.126-94.22.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553705" version="1" comment="kernel-default-base is &lt;4.4.126-94.22.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553706" version="1" comment="kernel-default-devel is &lt;4.4.126-94.22.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553707" version="1" comment="kernel-default-man is &lt;4.4.126-94.22.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520663" version="1" comment="kernel-devel is &lt;4.4.126-94.22.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520664" version="1" comment="kernel-macros is &lt;4.4.126-94.22.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520665" version="1" comment="kernel-source is &lt;4.4.126-94.22.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553708" version="1" comment="kernel-syms is &lt;4.4.126-94.22.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553709" version="1" comment="PackageKit is &lt;1.1.3-24.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553710" version="1" comment="PackageKit-backend-zypp is &lt;1.1.3-24.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520671" version="1" comment="PackageKit-lang is &lt;1.1.3-24.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553711" version="1" comment="libpackagekit-glib2-18 is &lt;1.1.3-24.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553712" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.1.3-24.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553713" version="1" comment="rzsz is &lt;0.12.21~rc-1001.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553714" version="1" comment="perl is &lt;5.18.2-12.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553715" version="1" comment="perl-32bit is &lt;5.18.2-12.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553716" version="1" comment="perl-base is &lt;5.18.2-12.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520678" version="1" comment="perl-doc is &lt;5.18.2-12.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553717" version="1" comment="zsh is &lt;5.0.5-6.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520680" version="1" comment="boost-license1_54_0 is &lt;1.54.0-26.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553718" version="1" comment="libboost_atomic1_54_0 is &lt;1.54.0-26.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553719" version="1" comment="libboost_date_time1_54_0 is &lt;1.54.0-26.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553720" version="1" comment="libboost_iostreams1_54_0 is &lt;1.54.0-26.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553721" version="1" comment="libboost_program_options1_54_0 is &lt;1.54.0-26.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553722" version="1" comment="libboost_random1_54_0 is &lt;1.54.0-26.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553723" version="1" comment="libboost_regex1_54_0 is &lt;1.54.0-26.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553724" version="1" comment="libboost_signals1_54_0 is &lt;1.54.0-26.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553725" version="1" comment="libboost_system1_54_0 is &lt;1.54.0-26.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553726" version="1" comment="libboost_thread1_54_0 is &lt;1.54.0-26.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553727" version="1" comment="squid is &lt;3.5.21-26.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553728" version="1" comment="dovecot22 is &lt;2.2.31-19.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553729" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553730" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553731" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553732" version="1" comment="patch is &lt;2.7.5-8.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519174" version="1" comment="kernel-firmware is &lt;20170530-21.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519175" version="1" comment="ucode-amd is &lt;20170530-21.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553733" version="1" comment="kernel-default is &lt;4.4.103-94.6.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553734" version="1" comment="kernel-default-base is &lt;4.4.103-94.6.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553735" version="1" comment="kernel-default-devel is &lt;4.4.103-94.6.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553736" version="1" comment="kernel-default-man is &lt;4.4.103-94.6.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553737" version="1" comment="kernel-devel is &lt;4.4.103-94.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553738" version="1" comment="kernel-macros is &lt;4.4.103-94.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553739" version="1" comment="kernel-source is &lt;4.4.103-94.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553740" version="1" comment="kernel-syms is &lt;4.4.103-94.6.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553741" version="1" comment="apache2 is &lt;2.4.23-29.18.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536748" version="1" comment="apache2-doc is &lt;2.4.23-29.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553742" version="1" comment="apache2-example-pages is &lt;2.4.23-29.18.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553743" version="1" comment="apache2-prefork is &lt;2.4.23-29.18.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553744" version="1" comment="apache2-utils is &lt;2.4.23-29.18.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553745" version="1" comment="apache2-worker is &lt;2.4.23-29.18.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553746" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.54.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553747" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.54.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553748" version="1" comment="libtiff5 is &lt;4.0.9-44.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553749" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553750" version="1" comment="tiff is &lt;4.0.9-44.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520889" version="1" comment="xen is &lt;4.9.2_04-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553751" version="1" comment="xen-doc-html is &lt;4.9.2_04-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520890" version="1" comment="xen-libs is &lt;4.9.2_04-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520891" version="1" comment="xen-libs-32bit is &lt;4.9.2_04-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553752" version="1" comment="xen-tools is &lt;4.9.2_04-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553753" version="1" comment="xen-tools-domU is &lt;4.9.2_04-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541942" version="1" comment="libapr1 is &lt;1.5.1-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553754" version="1" comment="libcairo-gobject2 is &lt;1.15.2-25.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553755" version="1" comment="libcairo-gobject2-32bit is &lt;1.15.2-25.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553756" version="1" comment="libcairo-script-interpreter2 is &lt;1.15.2-25.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553757" version="1" comment="libcairo2 is &lt;1.15.2-25.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553758" version="1" comment="libcairo2-32bit is &lt;1.15.2-25.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550975" version="1" comment="rsync is &lt;3.1.0-13.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550976" version="1" comment="libncurses5 is &lt;5.9-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550977" version="1" comment="libncurses5-32bit is &lt;5.9-55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550978" version="1" comment="libncurses6 is &lt;5.9-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550979" version="1" comment="libncurses6-32bit is &lt;5.9-55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541433" version="1" comment="ncurses-devel is &lt;5.9-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550980" version="1" comment="ncurses-devel-32bit is &lt;5.9-55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550981" version="1" comment="ncurses-utils is &lt;5.9-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550982" version="1" comment="tack is &lt;5.9-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550983" version="1" comment="terminfo is &lt;5.9-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550984" version="1" comment="terminfo-base is &lt;5.9-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550985" version="1" comment="curl is &lt;7.37.0-37.11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550986" version="1" comment="libcurl4 is &lt;7.37.0-37.11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550987" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.11.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550988" version="1" comment="perl-XML-LibXML is &lt;2.0019-6.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553759" version="1" comment="qemu is &lt;2.9.1-6.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553760" version="1" comment="qemu-arm is &lt;2.9.1-6.9.2 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553761" version="1" comment="qemu-block-curl is &lt;2.9.1-6.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553762" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553763" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.9.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553764" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553765" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520899" version="1" comment="qemu-ipxe is &lt;1.0.0-6.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553766" version="1" comment="qemu-kvm is &lt;2.9.1-6.9.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553767" version="1" comment="qemu-lang is &lt;2.9.1-6.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553768" version="1" comment="qemu-ppc is &lt;2.9.1-6.9.2 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553769" version="1" comment="qemu-s390 is &lt;2.9.1-6.9.2 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520901" version="1" comment="qemu-seabios is &lt;1.10.2-6.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520902" version="1" comment="qemu-sgabios is &lt;8-6.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553770" version="1" comment="qemu-tools is &lt;2.9.1-6.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520904" version="1" comment="qemu-vgabios is &lt;1.10.2-6.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520905" version="1" comment="qemu-x86 is &lt;2.9.1-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553771" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.20-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553772" version="1" comment="librsvg-2-2 is &lt;2.40.20-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553773" version="1" comment="librsvg-2-2-32bit is &lt;2.40.20-5.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553774" version="1" comment="rsvg-view is &lt;2.40.20-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553775" version="1" comment="libvorbis-doc is &lt;1.3.3-10.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553776" version="1" comment="libvorbis0 is &lt;1.3.3-10.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553777" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553778" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553779" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553780" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553781" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553782" version="1" comment="curl is &lt;7.37.0-37.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553783" version="1" comment="libcurl4 is &lt;7.37.0-37.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546204" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553784" version="1" comment="ghostscript is &lt;9.15-23.10.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553785" version="1" comment="ghostscript-x11 is &lt;9.15-23.10.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553786" version="1" comment="MozillaFirefox is &lt;52.8.0esr-109.31.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553787" version="1" comment="MozillaFirefox-translations is &lt;52.8.0esr-109.31.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553788" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553789" version="1" comment="qemu is &lt;2.9.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553790" version="1" comment="qemu-arm is &lt;2.9.1-6.16.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553791" version="1" comment="qemu-block-curl is &lt;2.9.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553792" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553793" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553794" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553795" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520975" version="1" comment="qemu-ipxe is &lt;1.0.0-6.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553796" version="1" comment="qemu-kvm is &lt;2.9.1-6.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553797" version="1" comment="qemu-lang is &lt;2.9.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553798" version="1" comment="qemu-ppc is &lt;2.9.1-6.16.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553799" version="1" comment="qemu-s390 is &lt;2.9.1-6.16.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520977" version="1" comment="qemu-seabios is &lt;1.10.2-6.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520978" version="1" comment="qemu-sgabios is &lt;8-6.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553800" version="1" comment="qemu-tools is &lt;2.9.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520980" version="1" comment="qemu-vgabios is &lt;1.10.2-6.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520981" version="1" comment="qemu-x86 is &lt;2.9.1-6.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553801" version="1" comment="kernel-default is &lt;4.4.131-94.29.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553802" version="1" comment="kernel-default-base is &lt;4.4.131-94.29.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553803" version="1" comment="kernel-default-devel is &lt;4.4.131-94.29.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553804" version="1" comment="kernel-default-man is &lt;4.4.131-94.29.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520985" version="1" comment="kernel-devel is &lt;4.4.131-94.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520986" version="1" comment="kernel-macros is &lt;4.4.131-94.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520987" version="1" comment="kernel-source is &lt;4.4.131-94.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553805" version="1" comment="kernel-syms is &lt;4.4.131-94.29.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553806" version="1" comment="wget is &lt;1.14-21.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553807" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553808" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553809" version="1" comment="python is &lt;2.7.13-28.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553810" version="1" comment="python-32bit is &lt;2.7.13-28.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553811" version="1" comment="python-base is &lt;2.7.13-28.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553812" version="1" comment="python-base-32bit is &lt;2.7.13-28.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553813" version="1" comment="python-curses is &lt;2.7.13-28.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553814" version="1" comment="python-demo is &lt;2.7.13-28.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553815" version="1" comment="python-doc is &lt;2.7.13-28.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553816" version="1" comment="python-doc-pdf is &lt;2.7.13-28.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553817" version="1" comment="python-gdbm is &lt;2.7.13-28.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553818" version="1" comment="python-idle is &lt;2.7.13-28.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553819" version="1" comment="python-tk is &lt;2.7.13-28.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553820" version="1" comment="python-xml is &lt;2.7.13-28.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551002" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551003" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553821" version="1" comment="bash is &lt;4.3-83.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520999" version="1" comment="bash-doc is &lt;4.3-83.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553822" version="1" comment="libreadline6 is &lt;6.3-83.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551006" version="1" comment="libreadline6-32bit is &lt;6.3-83.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521003" version="1" comment="readline-doc is &lt;6.3-83.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553823" version="1" comment="libicu-doc is &lt;52.1-8.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553824" version="1" comment="libicu52_1 is &lt;52.1-8.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546247" version="1" comment="libicu52_1-32bit is &lt;52.1-8.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553825" version="1" comment="libicu52_1-data is &lt;52.1-8.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553826" version="1" comment="ceph-common is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553827" version="1" comment="libcephfs2 is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553828" version="1" comment="librados2 is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553829" version="1" comment="libradosstriper1 is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553830" version="1" comment="librbd1 is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553831" version="1" comment="librgw2 is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553832" version="1" comment="python-cephfs is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553833" version="1" comment="python-rados is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553834" version="1" comment="python-rbd is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553835" version="1" comment="python-rgw is &lt;12.2.5+git.1524775272.5e7ea8cf03-2.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553836" version="1" comment="libjasper1 is &lt;1.900.14-195.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553837" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553838" version="1" comment="libmodplug1 is &lt;0.8.9.0+git20170610.f6dd59a-15.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553839" version="1" comment="perl-DBD-mysql is &lt;4.021-12.5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521021" version="1" comment="xen is &lt;4.9.2_06-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553840" version="1" comment="xen-doc-html is &lt;4.9.2_06-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521022" version="1" comment="xen-libs is &lt;4.9.2_06-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521023" version="1" comment="xen-libs-32bit is &lt;4.9.2_06-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553841" version="1" comment="xen-tools is &lt;4.9.2_06-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553842" version="1" comment="xen-tools-domU is &lt;4.9.2_06-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553843" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.0-2.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553844" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.0-2.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553845" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.0-2.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553846" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.0-2.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553847" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.0-2.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553848" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.108.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553849" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.108.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553850" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.108.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553851" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.108.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553852" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553853" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553854" version="1" comment="libdcerpc0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553855" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553856" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553857" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553858" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553859" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553860" version="1" comment="libndr-standard0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553861" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553862" version="1" comment="libndr0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553863" version="1" comment="libndr0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553864" version="1" comment="libnetapi0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553865" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553866" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553867" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553868" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553869" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553870" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553871" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553872" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553873" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553874" version="1" comment="libsamba-util0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553875" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553876" version="1" comment="libsamdb0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553877" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553878" version="1" comment="libsmbclient0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553879" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553880" version="1" comment="libsmbconf0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553881" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553882" version="1" comment="libsmbldap0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553883" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553884" version="1" comment="libtevent-util0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553885" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553886" version="1" comment="libwbclient0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553887" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553888" version="1" comment="samba is &lt;4.6.16+git.154.2998451b912-3.40.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553889" version="1" comment="samba-client is &lt;4.6.16+git.154.2998451b912-3.40.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553890" version="1" comment="samba-client-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521079" version="1" comment="samba-doc is &lt;4.6.16+git.154.2998451b912-3.40.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553891" version="1" comment="samba-libs is &lt;4.6.16+git.154.2998451b912-3.40.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553892" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553893" version="1" comment="samba-winbind is &lt;4.6.16+git.154.2998451b912-3.40.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553894" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553895" version="1" comment="libwireshark9 is &lt;2.4.14-48.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553896" version="1" comment="libwiretap7 is &lt;2.4.14-48.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553897" version="1" comment="libwscodecs1 is &lt;2.4.14-48.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553898" version="1" comment="libwsutil8 is &lt;2.4.14-48.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553899" version="1" comment="wireshark is &lt;2.4.14-48.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553900" version="1" comment="wireshark-gtk is &lt;2.4.14-48.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553901" version="1" comment="libvirt is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553902" version="1" comment="libvirt-admin is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553903" version="1" comment="libvirt-client is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553904" version="1" comment="libvirt-daemon is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553905" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553906" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553907" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521097" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553908" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553909" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553910" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553911" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553912" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553913" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553914" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553915" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553916" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553917" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553918" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553919" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553920" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553921" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553922" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553923" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553924" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521114" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553925" version="1" comment="libvirt-doc is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553926" version="1" comment="libvirt-libs is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553927" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553928" version="1" comment="libvirt-nss is &lt;3.3.0-5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553929" version="1" comment="libssh2-1 is &lt;1.4.3-20.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546273" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553930" version="1" comment="wpa_supplicant is &lt;2.6-15.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553931" version="1" comment="atftp is &lt;0.7.0-160.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553932" version="1" comment="krb5 is &lt;1.12.5-40.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551008" version="1" comment="krb5-32bit is &lt;1.12.5-40.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553933" version="1" comment="krb5-client is &lt;1.12.5-40.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553934" version="1" comment="krb5-doc is &lt;1.12.5-40.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553935" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553936" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553937" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553938" version="1" comment="krb5-server is &lt;1.12.5-40.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553939" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553940" version="1" comment="libjpeg62 is &lt;62.2.0-31.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553941" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553942" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553943" version="1" comment="libjpeg8 is &lt;8.1.2-31.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553944" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553945" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530432" version="1" comment="hostinfo is &lt;1.0.1-19.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521131" version="1" comment="supportutils is &lt;3.0-95.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541991" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553946" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551017" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553947" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551019" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553948" version="1" comment="openssl is &lt;1.0.2j-60.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530435" version="1" comment="openssl-doc is &lt;1.0.2j-60.52.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553949" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.1-2.41.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553950" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.1-2.41.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553951" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.1-2.41.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553952" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.1-2.41.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553953" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.1-2.41.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553954" version="1" comment="audit is &lt;2.8.1-8.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553955" version="1" comment="audit-audispd-plugins is &lt;2.8.1-8.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553956" version="1" comment="libaudit1 is &lt;2.8.1-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553957" version="1" comment="libaudit1-32bit is &lt;2.8.1-8.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553958" version="1" comment="libauparse0 is &lt;2.8.1-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553959" version="1" comment="freeradius-server is &lt;3.0.15-2.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553960" version="1" comment="freeradius-server-doc is &lt;3.0.15-2.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553961" version="1" comment="freeradius-server-krb5 is &lt;3.0.15-2.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553962" version="1" comment="freeradius-server-ldap is &lt;3.0.15-2.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553963" version="1" comment="freeradius-server-libs is &lt;3.0.15-2.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553964" version="1" comment="freeradius-server-mysql is &lt;3.0.15-2.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553965" version="1" comment="freeradius-server-perl is &lt;3.0.15-2.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553966" version="1" comment="freeradius-server-postgresql is &lt;3.0.15-2.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553967" version="1" comment="freeradius-server-python is &lt;3.0.15-2.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553968" version="1" comment="freeradius-server-sqlite is &lt;3.0.15-2.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553969" version="1" comment="freeradius-server-utils is &lt;3.0.15-2.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553970" version="1" comment="mutt is &lt;1.10.1-55.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553971" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.26.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553972" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.26.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553973" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1492060560.b6d11d7c46-4.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553974" version="1" comment="qemu-uefi-aarch64 is &lt;2017+git1492060560.b6d11d7c46-4.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553975" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553976" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553977" version="1" comment="sqlite3 is &lt;3.8.10.2-9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530483" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-122.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530484" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-122.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553978" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.212-27.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553979" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.212-27.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553980" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.212-27.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553981" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.212-27.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553982" version="1" comment="libxslt-tools is &lt;1.1.28-17.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553983" version="1" comment="libxslt1 is &lt;1.1.28-17.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553984" version="1" comment="libxslt1-32bit is &lt;1.1.28-17.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521155" version="1" comment="ucode-intel is &lt;20190507-13.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553985" version="1" comment="qemu is &lt;2.9.1-6.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553986" version="1" comment="qemu-arm is &lt;2.9.1-6.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553987" version="1" comment="qemu-block-curl is &lt;2.9.1-6.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553988" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553989" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553990" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553991" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521158" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553992" version="1" comment="qemu-kvm is &lt;2.9.1-6.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553993" version="1" comment="qemu-lang is &lt;2.9.1-6.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553994" version="1" comment="qemu-ppc is &lt;2.9.1-6.34.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553995" version="1" comment="qemu-s390 is &lt;2.9.1-6.34.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521160" version="1" comment="qemu-seabios is &lt;1.10.2-6.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521161" version="1" comment="qemu-sgabios is &lt;8-6.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553996" version="1" comment="qemu-tools is &lt;2.9.1-6.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521163" version="1" comment="qemu-vgabios is &lt;1.10.2-6.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521164" version="1" comment="qemu-x86 is &lt;2.9.1-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553997" version="1" comment="kernel-default is &lt;4.4.178-94.91.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553998" version="1" comment="kernel-default-base is &lt;4.4.178-94.91.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009553999" version="1" comment="kernel-default-devel is &lt;4.4.178-94.91.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554000" version="1" comment="kernel-default-man is &lt;4.4.178-94.91.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521168" version="1" comment="kernel-devel is &lt;4.4.178-94.91.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521169" version="1" comment="kernel-macros is &lt;4.4.178-94.91.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521170" version="1" comment="kernel-source is &lt;4.4.178-94.91.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554001" version="1" comment="kernel-syms is &lt;4.4.178-94.91.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554002" version="1" comment="kernel-azure is &lt;4.4.178-4.28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554003" version="1" comment="kernel-azure-base is &lt;4.4.178-4.28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554004" version="1" comment="kernel-azure-devel is &lt;4.4.178-4.28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554005" version="1" comment="kernel-devel-azure is &lt;4.4.178-4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554006" version="1" comment="kernel-source-azure is &lt;4.4.178-4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554007" version="1" comment="kernel-syms-azure is &lt;4.4.178-4.28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521172" version="1" comment="xen is &lt;4.9.4_04-3.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554008" version="1" comment="xen-doc-html is &lt;4.9.4_04-3.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521173" version="1" comment="xen-libs is &lt;4.9.4_04-3.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521174" version="1" comment="xen-libs-32bit is &lt;4.9.4_04-3.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554009" version="1" comment="xen-tools is &lt;4.9.4_04-3.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554010" version="1" comment="xen-tools-domU is &lt;4.9.4_04-3.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554011" version="1" comment="libsystemd0 is &lt;228-150.66.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551073" version="1" comment="libsystemd0-32bit is &lt;228-150.66.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554012" version="1" comment="libudev1 is &lt;228-150.66.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551076" version="1" comment="libudev1-32bit is &lt;228-150.66.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554013" version="1" comment="systemd is &lt;228-150.66.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551078" version="1" comment="systemd-32bit is &lt;228-150.66.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521181" version="1" comment="systemd-bash-completion is &lt;228-150.66.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554014" version="1" comment="systemd-sysvinit is &lt;228-150.66.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554015" version="1" comment="udev is &lt;228-150.66.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554016" version="1" comment="PackageKit is &lt;1.1.3-24.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554017" version="1" comment="PackageKit-backend-zypp is &lt;1.1.3-24.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521189" version="1" comment="PackageKit-lang is &lt;1.1.3-24.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554018" version="1" comment="libpackagekit-glib2-18 is &lt;1.1.3-24.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554019" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.1.3-24.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554020" version="1" comment="nmap is &lt;6.46-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521192" version="1" comment="ucode-intel is &lt;20190514-13.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554021" version="1" comment="openssh is &lt;7.2p2-74.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554022" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554023" version="1" comment="openssh-fips is &lt;7.2p2-74.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554024" version="1" comment="openssh-helpers is &lt;7.2p2-74.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554025" version="1" comment="sysstat is &lt;12.0.2-10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554026" version="1" comment="sysstat-isag is &lt;12.0.2-10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554027" version="1" comment="bluez is &lt;5.13-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554028" version="1" comment="libbluetooth3 is &lt;5.13-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546364" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.45-38.37.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530511" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.45-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546365" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.45-38.37.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530514" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.45-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554029" version="1" comment="libsystemd0 is &lt;228-150.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551099" version="1" comment="libsystemd0-32bit is &lt;228-150.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554030" version="1" comment="libudev1 is &lt;228-150.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551101" version="1" comment="libudev1-32bit is &lt;228-150.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554031" version="1" comment="systemd is &lt;228-150.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551103" version="1" comment="systemd-32bit is &lt;228-150.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521208" version="1" comment="systemd-bash-completion is &lt;228-150.58.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554032" version="1" comment="systemd-sysvinit is &lt;228-150.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554033" version="1" comment="udev is &lt;228-150.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554034" version="1" comment="screen is &lt;4.0.4-23.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554035" version="1" comment="curl is &lt;7.37.0-37.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554036" version="1" comment="libcurl4 is &lt;7.37.0-37.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546375" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554037" version="1" comment="libtasn1 is &lt;4.9-3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554038" version="1" comment="libtasn1-6 is &lt;4.9-3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554039" version="1" comment="libtasn1-6-32bit is &lt;4.9-3.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554040" version="1" comment="libwireshark9 is &lt;2.4.12-48.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554041" version="1" comment="libwiretap7 is &lt;2.4.12-48.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554042" version="1" comment="libwscodecs1 is &lt;2.4.12-48.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554043" version="1" comment="libwsutil8 is &lt;2.4.12-48.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554044" version="1" comment="wireshark is &lt;2.4.12-48.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554045" version="1" comment="wireshark-gtk is &lt;2.4.12-48.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554046" version="1" comment="axis is &lt;1.4-290.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554047" version="1" comment="MozillaFirefox is &lt;60.7.0-109.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554048" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.0-109.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554049" version="1" comment="gnome-shell is &lt;3.20.4-77.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554050" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-77.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521229" version="1" comment="gnome-shell-lang is &lt;3.20.4-77.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554051" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.221-43.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554052" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.221-43.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554053" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.221-43.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554054" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.221-43.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554055" version="1" comment="apache2-mod_jk is &lt;1.2.40-7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554056" version="1" comment="bind is &lt;9.9.9P1-63.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554057" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530526" version="1" comment="bind-doc is &lt;9.9.9P1-63.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554058" version="1" comment="bind-libs is &lt;9.9.9P1-63.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554059" version="1" comment="bind-utils is &lt;9.9.9P1-63.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554060" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548575" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554061" version="1" comment="python is &lt;2.7.13-28.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548577" version="1" comment="python-32bit is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554062" version="1" comment="python-base is &lt;2.7.13-28.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548579" version="1" comment="python-base-32bit is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554063" version="1" comment="python-curses is &lt;2.7.13-28.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554064" version="1" comment="python-demo is &lt;2.7.13-28.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530551" version="1" comment="python-doc is &lt;2.7.13-28.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530552" version="1" comment="python-doc-pdf is &lt;2.7.13-28.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554065" version="1" comment="python-gdbm is &lt;2.7.13-28.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554066" version="1" comment="python-idle is &lt;2.7.13-28.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554067" version="1" comment="python-tk is &lt;2.7.13-28.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554068" version="1" comment="python-xml is &lt;2.7.13-28.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554069" version="1" comment="ghostscript is &lt;9.26a-23.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554070" version="1" comment="ghostscript-x11 is &lt;9.26a-23.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554071" version="1" comment="libspectre1 is &lt;0.2.7-12.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554072" version="1" comment="gvim is &lt;7.4.326-17.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554073" version="1" comment="vim is &lt;7.4.326-17.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521429" version="1" comment="vim-data is &lt;7.4.326-17.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554074" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.5-2.32.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554075" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.5-2.32.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554076" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.5-2.32.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554077" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.5-2.32.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554078" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.5-2.32.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554079" version="1" comment="libcroco-0_6-3 is &lt;0.6.11-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554080" version="1" comment="libcroco-0_6-3-32bit is &lt;0.6.11-12.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554081" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554082" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554083" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-34.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554084" version="1" comment="libsss_sudo is &lt;1.13.4-34.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554085" version="1" comment="python-sssd-config is &lt;1.13.4-34.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554086" version="1" comment="sssd is &lt;1.13.4-34.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554087" version="1" comment="sssd-ad is &lt;1.13.4-34.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554088" version="1" comment="sssd-ipa is &lt;1.13.4-34.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554089" version="1" comment="sssd-krb5 is &lt;1.13.4-34.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554090" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554091" version="1" comment="sssd-ldap is &lt;1.13.4-34.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554092" version="1" comment="sssd-proxy is &lt;1.13.4-34.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554093" version="1" comment="sssd-tools is &lt;1.13.4-34.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554094" version="1" comment="kernel-azure is &lt;4.4.170-4.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554095" version="1" comment="kernel-azure-base is &lt;4.4.170-4.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554096" version="1" comment="kernel-azure-devel is &lt;4.4.170-4.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554097" version="1" comment="kernel-devel-azure is &lt;4.4.170-4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554098" version="1" comment="kernel-source-azure is &lt;4.4.170-4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554099" version="1" comment="kernel-syms-azure is &lt;4.4.170-4.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554100" version="1" comment="libecpg6 is &lt;10.8-1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554101" version="1" comment="libpq5 is &lt;10.8-1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554102" version="1" comment="libpq5-32bit is &lt;10.8-1.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554103" version="1" comment="postgresql10 is &lt;10.8-1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554104" version="1" comment="postgresql10-contrib is &lt;10.8-1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554105" version="1" comment="postgresql10-docs is &lt;10.8-1.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554106" version="1" comment="postgresql10-plperl is &lt;10.8-1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554107" version="1" comment="postgresql10-plpython is &lt;10.8-1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554108" version="1" comment="postgresql10-pltcl is &lt;10.8-1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554109" version="1" comment="postgresql10-server is &lt;10.8-1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554110" version="1" comment="openssh is &lt;7.2p2-74.42.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554111" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.42.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554112" version="1" comment="openssh-fips is &lt;7.2p2-74.42.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554113" version="1" comment="openssh-helpers is &lt;7.2p2-74.42.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554114" version="1" comment="kernel-azure is &lt;4.4.180-4.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554115" version="1" comment="kernel-azure-base is &lt;4.4.180-4.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554116" version="1" comment="kernel-azure-devel is &lt;4.4.180-4.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554117" version="1" comment="kernel-devel-azure is &lt;4.4.180-4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554118" version="1" comment="kernel-source-azure is &lt;4.4.180-4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554119" version="1" comment="kernel-syms-azure is &lt;4.4.180-4.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554120" version="1" comment="kernel-default is &lt;4.4.180-94.97.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554121" version="1" comment="kernel-default-base is &lt;4.4.180-94.97.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554122" version="1" comment="kernel-default-devel is &lt;4.4.180-94.97.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554123" version="1" comment="kernel-default-man is &lt;4.4.180-94.97.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521461" version="1" comment="kernel-devel is &lt;4.4.180-94.97.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521462" version="1" comment="kernel-macros is &lt;4.4.180-94.97.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521463" version="1" comment="kernel-source is &lt;4.4.180-94.97.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554124" version="1" comment="kernel-syms is &lt;4.4.180-94.97.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554125" version="1" comment="libvirt is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554126" version="1" comment="libvirt-admin is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554127" version="1" comment="libvirt-client is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554128" version="1" comment="libvirt-daemon is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554129" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554130" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554131" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521472" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554132" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554133" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554134" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554135" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554136" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554137" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554138" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554139" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554140" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554141" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554142" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554143" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554144" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.33.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554145" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554146" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554147" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554148" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521489" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554149" version="1" comment="libvirt-doc is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554150" version="1" comment="libvirt-libs is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554151" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554152" version="1" comment="libvirt-nss is &lt;3.3.0-5.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554153" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-13.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521494" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-13.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554154" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-13.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554155" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-13.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551144" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554156" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-13.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551146" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554157" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-13.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554158" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-13.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551149" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554159" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-13.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554160" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-13.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554161" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-13.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554162" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-13.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554163" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-13.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551155" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554164" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-13.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551157" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554165" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548610" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554166" version="1" comment="sqlite3 is &lt;3.8.10.2-9.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554167" version="1" comment="libssh2-1 is &lt;1.4.3-20.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546464" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554168" version="1" comment="libwireshark9 is &lt;2.4.15-48.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554169" version="1" comment="libwiretap7 is &lt;2.4.15-48.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554170" version="1" comment="libwscodecs1 is &lt;2.4.15-48.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554171" version="1" comment="libwsutil8 is &lt;2.4.15-48.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554172" version="1" comment="wireshark is &lt;2.4.15-48.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554173" version="1" comment="wireshark-gtk is &lt;2.4.15-48.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562515" version="1" comment="MozillaFirefox is &lt;60.7.1-109.77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562516" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.1-109.77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548612" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.35-30.50.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530571" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.35-30.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530573" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.35-30.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554174" version="1" comment="libnetpbm11 is &lt;10.66.3-8.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554175" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-8.7.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554176" version="1" comment="netpbm is &lt;10.66.3-8.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554177" version="1" comment="MozillaFirefox is &lt;60.7.2-109.80.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554178" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.2-109.80.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554179" version="1" comment="postgresql96 is &lt;9.6.13-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554180" version="1" comment="postgresql96-contrib is &lt;9.6.13-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554181" version="1" comment="postgresql96-docs is &lt;9.6.13-3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554182" version="1" comment="postgresql96-server is &lt;9.6.13-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554183" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.123.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554184" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.123.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554185" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.123.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554186" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.123.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554187" version="1" comment="dnsmasq is &lt;2.78-18.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521548" version="1" comment="glib2-lang is &lt;2.48.2-12.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554188" version="1" comment="glib2-tools is &lt;2.48.2-12.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554189" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551163" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554190" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551165" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554191" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551167" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554192" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551169" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554193" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551171" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554194" version="1" comment="elfutils is &lt;0.158-7.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554195" version="1" comment="libasm1 is &lt;0.158-7.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554196" version="1" comment="libasm1-32bit is &lt;0.158-7.7.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554197" version="1" comment="libdw1 is &lt;0.158-7.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554198" version="1" comment="libdw1-32bit is &lt;0.158-7.7.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554199" version="1" comment="libebl1 is &lt;0.158-7.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554200" version="1" comment="libebl1-32bit is &lt;0.158-7.7.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554201" version="1" comment="libelf1 is &lt;0.158-7.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554202" version="1" comment="libelf1-32bit is &lt;0.158-7.7.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554203" version="1" comment="libecpg6 is &lt;10.9-1.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554204" version="1" comment="libpq5 is &lt;10.9-1.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546510" version="1" comment="libpq5-32bit is &lt;10.9-1.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554205" version="1" comment="postgresql10 is &lt;10.9-1.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554206" version="1" comment="postgresql10-contrib is &lt;10.9-1.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554207" version="1" comment="postgresql10-plperl is &lt;10.9-1.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554208" version="1" comment="postgresql10-plpython is &lt;10.9-1.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554209" version="1" comment="postgresql10-pltcl is &lt;10.9-1.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554210" version="1" comment="postgresql10-server is &lt;10.9-1.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554211" version="1" comment="avahi is &lt;0.6.32-32.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521570" version="1" comment="avahi-lang is &lt;0.6.32-32.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554212" version="1" comment="avahi-utils is &lt;0.6.32-32.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554213" version="1" comment="libavahi-client3 is &lt;0.6.32-32.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554214" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-32.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554215" version="1" comment="libavahi-common3 is &lt;0.6.32-32.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554216" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-32.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554217" version="1" comment="libavahi-core7 is &lt;0.6.32-32.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554218" version="1" comment="libavahi-glib1 is &lt;0.6.32-32.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554219" version="1" comment="libavahi-glib1-32bit is &lt;0.6.32-32.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554220" version="1" comment="libdns_sd is &lt;0.6.32-32.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554221" version="1" comment="libdns_sd-32bit is &lt;0.6.32-32.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554222" version="1" comment="glib2-tools is &lt;2.48.2-12.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554223" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551179" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554224" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551181" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554225" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551183" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554226" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551185" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554227" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551187" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554228" version="1" comment="kernel-default is &lt;4.4.180-94.100.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554229" version="1" comment="kernel-default-base is &lt;4.4.180-94.100.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554230" version="1" comment="kernel-default-devel is &lt;4.4.180-94.100.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554231" version="1" comment="kernel-default-man is &lt;4.4.180-94.100.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554232" version="1" comment="kernel-syms is &lt;4.4.180-94.100.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538239" version="1" comment="kgraft-patch-4_4_180-94_100-default is &lt;1-4.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554233" version="1" comment="MozillaFirefox is &lt;60.8.0-109.83.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554234" version="1" comment="MozillaFirefox-translations-common is &lt;60.8.0-109.83.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554235" version="1" comment="libfreebl3 is &lt;3.44.1-58.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548634" version="1" comment="libfreebl3-32bit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554236" version="1" comment="libfreebl3-hmac is &lt;3.44.1-58.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548636" version="1" comment="libfreebl3-hmac-32bit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554237" version="1" comment="libsoftokn3 is &lt;3.44.1-58.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548638" version="1" comment="libsoftokn3-32bit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554238" version="1" comment="libsoftokn3-hmac is &lt;3.44.1-58.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548640" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554239" version="1" comment="mozilla-nss is &lt;3.44.1-58.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548642" version="1" comment="mozilla-nss-32bit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554240" version="1" comment="mozilla-nss-certs is &lt;3.44.1-58.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548644" version="1" comment="mozilla-nss-certs-32bit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554241" version="1" comment="mozilla-nss-sysinit is &lt;3.44.1-58.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548647" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554242" version="1" comment="mozilla-nss-tools is &lt;3.44.1-58.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554243" version="1" comment="libpolkit0 is &lt;0.113-5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554244" version="1" comment="polkit is &lt;0.113-5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554245" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127443"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.140-94.42-default is currently running" id="oval:org.opensuse.security:tst:2009721142" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009171907"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719409" version="1" comment="kgraft-patch-4_4_140-94_42-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538240" version="1" comment="kgraft-patch-4_4_140-94_42-default is &lt;10-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117897"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.143-94.47-default is currently running" id="oval:org.opensuse.security:tst:2009721143" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009171908"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719410" version="1" comment="kgraft-patch-4_4_143-94_47-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538241" version="1" comment="kgraft-patch-4_4_143-94_47-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.155-94.50-default is currently running" id="oval:org.opensuse.security:tst:2009721144" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009171909"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719411" version="1" comment="kgraft-patch-4_4_155-94_50-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538242" version="1" comment="kgraft-patch-4_4_155-94_50-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.156-94.57-default is currently running" id="oval:org.opensuse.security:tst:2009721145" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009171910"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719412" version="1" comment="kgraft-patch-4_4_156-94_57-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538243" version="1" comment="kgraft-patch-4_4_156-94_57-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.156-94.61-default is currently running" id="oval:org.opensuse.security:tst:2009721146" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009171911"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719413" version="1" comment="kgraft-patch-4_4_156-94_61-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538244" version="1" comment="kgraft-patch-4_4_156-94_61-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.156-94.64-default is currently running" id="oval:org.opensuse.security:tst:2009721147" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009171912"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719414" version="1" comment="kgraft-patch-4_4_156-94_64-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538245" version="1" comment="kgraft-patch-4_4_156-94_64-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.162-94.69-default is currently running" id="oval:org.opensuse.security:tst:2009721152" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009171917"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719419" version="1" comment="kgraft-patch-4_4_162-94_69-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538246" version="1" comment="kgraft-patch-4_4_162-94_69-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.162-94.72-default is currently running" id="oval:org.opensuse.security:tst:2009721149" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009171914"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719416" version="1" comment="kgraft-patch-4_4_162-94_72-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538247" version="1" comment="kgraft-patch-4_4_162-94_72-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.175-94.79-default is currently running" id="oval:org.opensuse.security:tst:2009721151" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009171916"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719418" version="1" comment="kgraft-patch-4_4_175-94_79-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538248" version="1" comment="kgraft-patch-4_4_175-94_79-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.176-94.88-default is currently running" id="oval:org.opensuse.security:tst:2009721148" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009171913"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719415" version="1" comment="kgraft-patch-4_4_176-94_88-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538249" version="1" comment="kgraft-patch-4_4_176-94_88-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.178-94.91-default is currently running" id="oval:org.opensuse.security:tst:2009721150" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009171915"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719417" version="1" comment="kgraft-patch-4_4_178-94_91-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538250" version="1" comment="kgraft-patch-4_4_178-94_91-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.180-94.97-default is currently running" id="oval:org.opensuse.security:tst:2009721153" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009171918"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719420" version="1" comment="kgraft-patch-4_4_180-94_97-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538251" version="1" comment="kgraft-patch-4_4_180-94_97-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548654" version="1" comment="bzip2 is &lt;1.0.6-30.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548655" version="1" comment="libbz2-1 is &lt;1.0.6-30.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548656" version="1" comment="libbz2-1-32bit is &lt;1.0.6-30.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554246" version="1" comment="glibc is &lt;2.22-62.22.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551190" version="1" comment="glibc-32bit is &lt;2.22-62.22.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554247" version="1" comment="glibc-devel is &lt;2.22-62.22.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551192" version="1" comment="glibc-devel-32bit is &lt;2.22-62.22.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554248" version="1" comment="glibc-locale is &lt;2.22-62.22.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551194" version="1" comment="glibc-locale-32bit is &lt;2.22-62.22.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554249" version="1" comment="glibc-profile is &lt;2.22-62.22.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551196" version="1" comment="glibc-profile-32bit is &lt;2.22-62.22.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554250" version="1" comment="nscd is &lt;2.22-62.22.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554251" version="1" comment="libsolv-tools is &lt;0.6.36-2.16.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554252" version="1" comment="libzypp is &lt;16.20.0-2.39.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554253" version="1" comment="perl-solv is &lt;0.6.36-2.16.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554254" version="1" comment="python-solv is &lt;0.6.36-2.16.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554255" version="1" comment="zypper is &lt;1.13.51-21.26.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554256" version="1" comment="bzip2 is &lt;1.0.6-30.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554257" version="1" comment="libbz2-1 is &lt;1.0.6-30.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548659" version="1" comment="libbz2-1-32bit is &lt;1.0.6-30.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554258" version="1" comment="libpolkit0 is &lt;0.113-5.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554259" version="1" comment="polkit is &lt;0.113-5.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554260" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554261" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.222-27.35.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554262" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.222-27.35.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554263" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.222-27.35.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554264" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.222-27.35.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009528378" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009528379" version="1" comment="python3 is &lt;3.4.6-25.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009528380" version="1" comment="python3-base is &lt;3.4.6-25.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554265" version="1" comment="python3-curses is &lt;3.4.6-25.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554266" version="1" comment="evince is &lt;3.20.2-6.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554267" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554268" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554269" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554270" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554271" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554272" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554273" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554274" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554275" version="1" comment="libevview3-3 is &lt;3.20.2-6.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554276" version="1" comment="nautilus-evince is &lt;3.20.2-6.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554277" version="1" comment="squid is &lt;3.5.21-26.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554278" version="1" comment="rsyslog is &lt;8.24.0-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554279" version="1" comment="rsyslog-diag-tools is &lt;8.24.0-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554280" version="1" comment="rsyslog-doc is &lt;8.24.0-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554281" version="1" comment="rsyslog-module-gssapi is &lt;8.24.0-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554282" version="1" comment="rsyslog-module-gtls is &lt;8.24.0-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554283" version="1" comment="rsyslog-module-mysql is &lt;8.24.0-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554284" version="1" comment="rsyslog-module-pgsql is &lt;8.24.0-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554285" version="1" comment="rsyslog-module-relp is &lt;8.24.0-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554286" version="1" comment="rsyslog-module-snmp is &lt;8.24.0-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554287" version="1" comment="rsyslog-module-udpspoof is &lt;8.24.0-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554288" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548681" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554289" version="1" comment="python is &lt;2.7.13-28.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548683" version="1" comment="python-32bit is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554290" version="1" comment="python-base is &lt;2.7.13-28.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548685" version="1" comment="python-base-32bit is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554291" version="1" comment="python-curses is &lt;2.7.13-28.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554292" version="1" comment="python-demo is &lt;2.7.13-28.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542235" version="1" comment="python-devel is &lt;2.7.13-28.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554293" version="1" comment="python-gdbm is &lt;2.7.13-28.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554294" version="1" comment="python-idle is &lt;2.7.13-28.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554295" version="1" comment="python-tk is &lt;2.7.13-28.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554296" version="1" comment="python-xml is &lt;2.7.13-28.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554297" version="1" comment="postgresql96 is &lt;9.6.15-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554298" version="1" comment="postgresql96-contrib is &lt;9.6.15-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554299" version="1" comment="postgresql96-plperl is &lt;9.6.15-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554300" version="1" comment="postgresql96-plpython is &lt;9.6.15-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554301" version="1" comment="postgresql96-pltcl is &lt;9.6.15-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554302" version="1" comment="postgresql96-server is &lt;9.6.15-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554303" version="1" comment="libvirt is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554304" version="1" comment="libvirt-admin is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554305" version="1" comment="libvirt-client is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554306" version="1" comment="libvirt-daemon is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554307" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554308" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554309" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554310" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554311" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554312" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554313" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554314" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554315" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554316" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554317" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554318" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554319" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554320" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554321" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554322" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554323" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554324" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554325" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554326" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554327" version="1" comment="libvirt-doc is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554328" version="1" comment="libvirt-libs is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554329" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554330" version="1" comment="libvirt-nss is &lt;3.3.0-5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554331" version="1" comment="kernel-default is &lt;4.4.180-94.103.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554332" version="1" comment="kernel-default-base is &lt;4.4.180-94.103.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554333" version="1" comment="kernel-default-devel is &lt;4.4.180-94.103.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554334" version="1" comment="kernel-default-man is &lt;4.4.180-94.103.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554335" version="1" comment="kernel-syms is &lt;4.4.180-94.103.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538294" version="1" comment="kgraft-patch-4_4_180-94_103-default is &lt;1-4.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554336" version="1" comment="perl is &lt;5.18.2-12.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548722" version="1" comment="perl-32bit is &lt;5.18.2-12.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554337" version="1" comment="perl-base is &lt;5.18.2-12.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554338" version="1" comment="libsolv-tools is &lt;0.6.36-2.27.19.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554339" version="1" comment="libzypp is &lt;16.20.2-27.60.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554340" version="1" comment="perl-solv is &lt;0.6.36-2.27.19.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554341" version="1" comment="python-solv is &lt;0.6.36-2.27.19.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554342" version="1" comment="zypper is &lt;1.13.54-18.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548727" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.50-38.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548728" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.50-38.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554343" version="1" comment="curl is &lt;7.37.0-37.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554344" version="1" comment="libcurl4 is &lt;7.37.0-37.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548731" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554345" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.4-2.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554346" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.4-2.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554347" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.4-2.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554348" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.4-2.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554349" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.4-2.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548732" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.40-30.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554350" version="1" comment="ibus is &lt;1.5.13-15.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554351" version="1" comment="ibus-gtk is &lt;1.5.13-15.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554352" version="1" comment="ibus-gtk3 is &lt;1.5.13-15.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554353" version="1" comment="libibus-1_0-5 is &lt;1.5.13-15.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554354" version="1" comment="typelib-1_0-IBus-1_0 is &lt;1.5.13-15.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554355" version="1" comment="libspice-server1 is &lt;0.12.8-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554356" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554357" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551262" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554358" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551264" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554359" version="1" comment="openssl is &lt;1.0.2j-60.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009528497" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009528498" version="1" comment="python3 is &lt;3.4.6-25.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009528499" version="1" comment="python3-base is &lt;3.4.6-25.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554360" version="1" comment="python3-curses is &lt;3.4.6-25.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554361" version="1" comment="MozillaFirefox is &lt;60.9.0-109.86.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554362" version="1" comment="MozillaFirefox-translations-common is &lt;60.9.0-109.86.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554363" version="1" comment="dovecot22 is &lt;2.2.31-19.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554364" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554365" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554366" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554367" version="1" comment="ghostscript is &lt;9.27-23.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554368" version="1" comment="ghostscript-x11 is &lt;9.27-23.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554369" version="1" comment="curl is &lt;7.37.0-37.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554370" version="1" comment="libcurl4 is &lt;7.37.0-37.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546551" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554371" version="1" comment="libgcrypt20 is &lt;1.6.1-16.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548753" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554372" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548755" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538295" version="1" comment="kgraft-patch-4_4_156-94_61-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538296" version="1" comment="kgraft-patch-4_4_156-94_57-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538297" version="1" comment="kgraft-patch-4_4_162-94_72-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538298" version="1" comment="kgraft-patch-4_4_162-94_69-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538299" version="1" comment="kgraft-patch-4_4_156-94_64-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538300" version="1" comment="kgraft-patch-4_4_176-94_88-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538301" version="1" comment="kgraft-patch-4_4_175-94_79-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.180-94.103-default is currently running" id="oval:org.opensuse.security:tst:2009721277" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009172042"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719602" version="1" comment="kgraft-patch-4_4_180-94_103-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538302" version="1" comment="kgraft-patch-4_4_180-94_103-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.180-94.100-default is currently running" id="oval:org.opensuse.security:tst:2009721278" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009172043"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719604" version="1" comment="kgraft-patch-4_4_180-94_100-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538303" version="1" comment="kgraft-patch-4_4_180-94_100-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538304" version="1" comment="kgraft-patch-4_4_180-94_97-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538305" version="1" comment="kgraft-patch-4_4_178-94_91-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554373" version="1" comment="MozillaFirefox is &lt;68.1.0-109.89.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554374" version="1" comment="MozillaFirefox-branding-SLE is &lt;68-32.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554375" version="1" comment="MozillaFirefox-translations-common is &lt;68.1.0-109.89.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554376" version="1" comment="binutils is &lt;2.32-9.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554377" version="1" comment="sudo is &lt;1.8.20p2-3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554378" version="1" comment="libpcap1 is &lt;1.8.1-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554379" version="1" comment="tcpdump is &lt;4.9.2-14.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554380" version="1" comment="nfs-client is &lt;1.3.0-34.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554381" version="1" comment="nfs-doc is &lt;1.3.0-34.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554382" version="1" comment="nfs-kernel-server is &lt;1.3.0-34.22.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538313" version="1" comment="kgraft-patch-4_4_156-94_64-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538314" version="1" comment="kgraft-patch-4_4_162-94_69-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538315" version="1" comment="kgraft-patch-4_4_162-94_72-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538316" version="1" comment="kgraft-patch-4_4_175-94_79-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538317" version="1" comment="kgraft-patch-4_4_176-94_88-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538318" version="1" comment="kgraft-patch-4_4_178-94_91-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538319" version="1" comment="kgraft-patch-4_4_180-94_97-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538320" version="1" comment="kgraft-patch-4_4_180-94_100-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554383" version="1" comment="libunwind is &lt;1.1-11.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542100" version="1" comment="libunwind-devel is &lt;1.1-11.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538321" version="1" comment="kgraft-patch-4_4_180-94_103-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554384" version="1" comment="MozillaFirefox is &lt;68.2.0-109.95.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554385" version="1" comment="MozillaFirefox-translations-common is &lt;68.2.0-109.95.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554386" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554387" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554388" version="1" comment="libdcerpc0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554389" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554390" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554391" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554392" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554393" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554394" version="1" comment="libndr-standard0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554395" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554396" version="1" comment="libndr0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554397" version="1" comment="libndr0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554398" version="1" comment="libnetapi0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554399" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554400" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554401" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554402" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554403" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554404" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554405" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554406" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554407" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554408" version="1" comment="libsamba-util0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554409" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554410" version="1" comment="libsamdb0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554411" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554412" version="1" comment="libsmbclient0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554413" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554414" version="1" comment="libsmbconf0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554415" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554416" version="1" comment="libsmbldap0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554417" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554418" version="1" comment="libtevent-util0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554419" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554420" version="1" comment="libwbclient0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554421" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554422" version="1" comment="samba is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554423" version="1" comment="samba-client is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554424" version="1" comment="samba-client-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554425" version="1" comment="samba-libs is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554426" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554427" version="1" comment="samba-winbind is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554428" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.169.064abe062be-3.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554429" version="1" comment="gdb is &lt;8.3.1-2.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554430" version="1" comment="libssh2-1 is &lt;1.4.3-20.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548820" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554431" version="1" comment="libseccomp2 is &lt;2.4.1-11.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551319" version="1" comment="libseccomp2-32bit is &lt;2.4.1-11.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554432" version="1" comment="kernel-default is &lt;4.4.180-94.107.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554433" version="1" comment="kernel-default-base is &lt;4.4.180-94.107.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554434" version="1" comment="kernel-default-devel is &lt;4.4.180-94.107.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538348" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.107.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554435" version="1" comment="kernel-default-man is &lt;4.4.180-94.107.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554436" version="1" comment="kernel-syms is &lt;4.4.180-94.107.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538353" version="1" comment="kgraft-patch-4_4_180-94_107-default is &lt;1-4.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554437" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554438" version="1" comment="libjpeg62 is &lt;62.2.0-31.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548828" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554439" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554440" version="1" comment="libjpeg8 is &lt;8.1.2-31.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548831" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554441" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554442" version="1" comment="ghostscript is &lt;9.27-23.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554443" version="1" comment="ghostscript-x11 is &lt;9.27-23.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554444" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548839" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554445" version="1" comment="sqlite3 is &lt;3.8.10.2-9.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554446" version="1" comment="cups is &lt;1.7.5-20.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554447" version="1" comment="cups-client is &lt;1.7.5-20.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554448" version="1" comment="cups-libs is &lt;1.7.5-20.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548844" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554449" version="1" comment="clamav is &lt;0.100.3-33.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548846" version="1" comment="mailman is &lt;2.1.17-3.11.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554450" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.241-43.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554451" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.241-43.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554452" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.241-43.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554453" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.241-43.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554454" version="1" comment="libvncclient0 is &lt;0.9.9-17.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554455" version="1" comment="libvncserver0 is &lt;0.9.9-17.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554456" version="1" comment="clamav is &lt;0.100.3-33.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554457" version="1" comment="permissions is &lt;2015.09.28.1626-17.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538354" version="1" comment="kgraft-patch-4_4_180-94_97-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538355" version="1" comment="kgraft-patch-4_4_180-94_100-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538356" version="1" comment="kgraft-patch-4_4_180-94_103-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538357" version="1" comment="kgraft-patch-4_4_175-94_79-default is &lt;7-2.5 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538358" version="1" comment="kgraft-patch-4_4_176-94_88-default is &lt;6-2.5 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538359" version="1" comment="kgraft-patch-4_4_178-94_91-default is &lt;6-2.5 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554458" version="1" comment="strongswan is &lt;5.1.3-26.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554459" version="1" comment="strongswan-hmac is &lt;5.1.3-26.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554460" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554461" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542345" version="1" comment="git-core is &lt;2.12.3-27.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554462" version="1" comment="MozillaFirefox is &lt;68.3.0-109.98.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554463" version="1" comment="MozillaFirefox-translations-common is &lt;68.3.0-109.98.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554464" version="1" comment="MozillaFirefox is &lt;60.5.0esr-109.58.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554465" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-32.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554466" version="1" comment="MozillaFirefox-translations-common is &lt;60.5.0esr-109.58.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554467" version="1" comment="libfreebl3 is &lt;3.41.1-58.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546575" version="1" comment="libfreebl3-32bit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554468" version="1" comment="libfreebl3-hmac is &lt;3.41.1-58.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546577" version="1" comment="libfreebl3-hmac-32bit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554469" version="1" comment="libsoftokn3 is &lt;3.41.1-58.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546579" version="1" comment="libsoftokn3-32bit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554470" version="1" comment="libsoftokn3-hmac is &lt;3.41.1-58.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546581" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554471" version="1" comment="mozilla-nss is &lt;3.41.1-58.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546583" version="1" comment="mozilla-nss-32bit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554472" version="1" comment="mozilla-nss-certs is &lt;3.41.1-58.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546585" version="1" comment="mozilla-nss-certs-32bit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554473" version="1" comment="mozilla-nss-sysinit is &lt;3.41.1-58.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546588" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554474" version="1" comment="mozilla-nss-tools is &lt;3.41.1-58.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554475" version="1" comment="kernel-default is &lt;4.4.180-94.113.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554476" version="1" comment="kernel-default-base is &lt;4.4.180-94.113.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554477" version="1" comment="kernel-default-devel is &lt;4.4.180-94.113.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538369" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.113.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554478" version="1" comment="kernel-default-man is &lt;4.4.180-94.113.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554479" version="1" comment="kernel-syms is &lt;4.4.180-94.113.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538374" version="1" comment="kgraft-patch-4_4_180-94_113-default is &lt;1-4.5.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554480" version="1" comment="python-numpy is &lt;1.8.0-5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554481" version="1" comment="libsystemd0 is &lt;228-150.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551339" version="1" comment="libsystemd0-32bit is &lt;228-150.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554482" version="1" comment="libudev1 is &lt;228-150.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551341" version="1" comment="libudev1-32bit is &lt;228-150.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554483" version="1" comment="systemd is &lt;228-150.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551343" version="1" comment="systemd-32bit is &lt;228-150.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521627" version="1" comment="systemd-bash-completion is &lt;228-150.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554484" version="1" comment="systemd-sysvinit is &lt;228-150.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554485" version="1" comment="udev is &lt;228-150.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554486" version="1" comment="libprocps3 is &lt;3.3.9-11.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554487" version="1" comment="procps is &lt;3.3.9-11.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521632" version="1" comment="kernel-firmware is &lt;20170530-21.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521633" version="1" comment="ucode-amd is &lt;20170530-21.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554488" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548897" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554489" version="1" comment="python is &lt;2.7.13-28.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548899" version="1" comment="python-32bit is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554490" version="1" comment="python-base is &lt;2.7.13-28.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548901" version="1" comment="python-base-32bit is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554491" version="1" comment="python-curses is &lt;2.7.13-28.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554492" version="1" comment="python-demo is &lt;2.7.13-28.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530819" version="1" comment="python-doc is &lt;2.7.13-28.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530820" version="1" comment="python-doc-pdf is &lt;2.7.13-28.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554493" version="1" comment="python-gdbm is &lt;2.7.13-28.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554494" version="1" comment="python-idle is &lt;2.7.13-28.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554495" version="1" comment="python-tk is &lt;2.7.13-28.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554496" version="1" comment="python-xml is &lt;2.7.13-28.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554497" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.201-43.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554498" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.201-43.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554499" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.201-43.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554500" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.201-43.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554501" version="1" comment="apache2 is &lt;2.4.23-29.34.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554502" version="1" comment="apache2-doc is &lt;2.4.23-29.34.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554503" version="1" comment="apache2-example-pages is &lt;2.4.23-29.34.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554504" version="1" comment="apache2-prefork is &lt;2.4.23-29.34.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554505" version="1" comment="apache2-utils is &lt;2.4.23-29.34.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554506" version="1" comment="apache2-worker is &lt;2.4.23-29.34.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554507" version="1" comment="ceph-common is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554508" version="1" comment="libcephfs2 is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554509" version="1" comment="librados2 is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554510" version="1" comment="libradosstriper1 is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554511" version="1" comment="librbd1 is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554512" version="1" comment="librgw2 is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554513" version="1" comment="python-cephfs is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554514" version="1" comment="python-rados is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554515" version="1" comment="python-rbd is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554516" version="1" comment="python-rgw is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554517" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.6-2.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554518" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.6-2.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554519" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.6-2.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554520" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.6-2.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554521" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.6-2.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554522" version="1" comment="kernel-default is &lt;4.4.175-94.79.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554523" version="1" comment="kernel-default-base is &lt;4.4.175-94.79.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554524" version="1" comment="kernel-default-devel is &lt;4.4.175-94.79.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554525" version="1" comment="kernel-default-man is &lt;4.4.175-94.79.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521663" version="1" comment="kernel-devel is &lt;4.4.175-94.79.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521664" version="1" comment="kernel-macros is &lt;4.4.175-94.79.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521665" version="1" comment="kernel-source is &lt;4.4.175-94.79.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554526" version="1" comment="kernel-syms is &lt;4.4.175-94.79.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554527" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.191-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554528" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.191-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554529" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.191-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554530" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.191-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554531" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554532" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554533" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1492060560.b6d11d7c46-4.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554534" version="1" comment="qemu-uefi-aarch64 is &lt;2017+git1492060560.b6d11d7c46-4.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554535" version="1" comment="qemu is &lt;2.9.1-6.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554536" version="1" comment="qemu-arm is &lt;2.9.1-6.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554537" version="1" comment="qemu-block-curl is &lt;2.9.1-6.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554538" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554539" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554540" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554541" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521671" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554542" version="1" comment="qemu-kvm is &lt;2.9.1-6.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554543" version="1" comment="qemu-lang is &lt;2.9.1-6.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554544" version="1" comment="qemu-ppc is &lt;2.9.1-6.28.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554545" version="1" comment="qemu-s390 is &lt;2.9.1-6.28.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521673" version="1" comment="qemu-seabios is &lt;1.10.2-6.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521674" version="1" comment="qemu-sgabios is &lt;8-6.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554546" version="1" comment="qemu-tools is &lt;2.9.1-6.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521676" version="1" comment="qemu-vgabios is &lt;1.10.2-6.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521677" version="1" comment="qemu-x86 is &lt;2.9.1-6.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554547" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.4-2.29.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554548" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.4-2.29.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554549" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.4-2.29.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554550" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.4-2.29.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554551" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.4-2.29.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554552" version="1" comment="libvncclient0 is &lt;0.9.9-17.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554553" version="1" comment="libvncserver0 is &lt;0.9.9-17.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546656" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.40-38.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530866" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.40-38.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546657" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.40-38.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530869" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.40-38.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548942" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.30-30.46.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530871" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.30-30.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530873" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.30-30.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554554" version="1" comment="lftp is &lt;4.7.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554555" version="1" comment="libssh2-1 is &lt;1.4.3-20.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546671" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554556" version="1" comment="libwsman1 is &lt;2.4.11-21.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554557" version="1" comment="libwsman_clientpp1 is &lt;2.4.11-21.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554558" version="1" comment="openwsman-server is &lt;2.4.11-21.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554559" version="1" comment="libwireshark9 is &lt;2.4.13-48.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554560" version="1" comment="libwiretap7 is &lt;2.4.13-48.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554561" version="1" comment="libwscodecs1 is &lt;2.4.13-48.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554562" version="1" comment="libwsutil8 is &lt;2.4.13-48.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554563" version="1" comment="wireshark is &lt;2.4.13-48.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554564" version="1" comment="wireshark-gtk is &lt;2.4.13-48.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554565" version="1" comment="ghostscript is &lt;9.26a-23.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554566" version="1" comment="ghostscript-x11 is &lt;9.26a-23.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521698" version="1" comment="ucode-intel is &lt;20190312-13.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554567" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554568" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554569" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1492060560.b6d11d7c46-4.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554570" version="1" comment="qemu-uefi-aarch64 is &lt;2017+git1492060560.b6d11d7c46-4.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554571" version="1" comment="gd is &lt;2.1.0-24.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554572" version="1" comment="w3m is &lt;0.5.3.git20161120-161.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554573" version="1" comment="ntp is &lt;4.2.8p13-85.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554574" version="1" comment="ntp-doc is &lt;4.2.8p13-85.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554575" version="1" comment="kernel-default is &lt;4.4.176-94.88.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554576" version="1" comment="kernel-default-base is &lt;4.4.176-94.88.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554577" version="1" comment="kernel-default-devel is &lt;4.4.176-94.88.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554578" version="1" comment="kernel-default-man is &lt;4.4.176-94.88.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521707" version="1" comment="kernel-devel is &lt;4.4.176-94.88.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521708" version="1" comment="kernel-macros is &lt;4.4.176-94.88.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521709" version="1" comment="kernel-source is &lt;4.4.176-94.88.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554579" version="1" comment="kernel-syms is &lt;4.4.176-94.88.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542134" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554580" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551392" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554581" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551394" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554582" version="1" comment="openssl is &lt;1.0.2j-60.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530876" version="1" comment="openssl-doc is &lt;1.0.2j-60.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554583" version="1" comment="adcli is &lt;0.8.2-1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554584" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554585" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554586" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-34.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554587" version="1" comment="libsss_sudo is &lt;1.13.4-34.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554588" version="1" comment="python-sssd-config is &lt;1.13.4-34.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554589" version="1" comment="sssd is &lt;1.13.4-34.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554590" version="1" comment="sssd-32bit is &lt;1.13.4-34.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554591" version="1" comment="sssd-ad is &lt;1.13.4-34.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554592" version="1" comment="sssd-ipa is &lt;1.13.4-34.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554593" version="1" comment="sssd-krb5 is &lt;1.13.4-34.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554594" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554595" version="1" comment="sssd-ldap is &lt;1.13.4-34.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554596" version="1" comment="sssd-proxy is &lt;1.13.4-34.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554597" version="1" comment="sssd-tools is &lt;1.13.4-34.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554598" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554599" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554600" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-34.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554601" version="1" comment="libsss_sudo is &lt;1.13.4-34.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554602" version="1" comment="python-sssd-config is &lt;1.13.4-34.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554603" version="1" comment="sssd is &lt;1.13.4-34.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551401" version="1" comment="sssd-32bit is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554604" version="1" comment="sssd-ad is &lt;1.13.4-34.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554605" version="1" comment="sssd-ipa is &lt;1.13.4-34.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554606" version="1" comment="sssd-krb5 is &lt;1.13.4-34.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554607" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554608" version="1" comment="sssd-ldap is &lt;1.13.4-34.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554609" version="1" comment="sssd-proxy is &lt;1.13.4-34.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554610" version="1" comment="sssd-tools is &lt;1.13.4-34.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562488" version="1" comment="libmemcached is &lt;1.0.18-3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562432" version="1" comment="libmemcached11 is &lt;1.0.18-3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562489" version="1" comment="libmemcachedutil2 is &lt;1.0.18-3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554611" version="1" comment="bash is &lt;4.3-83.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521745" version="1" comment="bash-doc is &lt;4.3-83.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554612" version="1" comment="libreadline6 is &lt;6.3-83.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551416" version="1" comment="libreadline6-32bit is &lt;6.3-83.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521749" version="1" comment="readline-doc is &lt;6.3-83.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554613" version="1" comment="file is &lt;5.22-10.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554614" version="1" comment="file-magic is &lt;5.22-10.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554615" version="1" comment="libmagic1 is &lt;5.22-10.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554616" version="1" comment="libmagic1-32bit is &lt;5.22-10.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554617" version="1" comment="MozillaFirefox is &lt;60.6.1esr-109.63.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554618" version="1" comment="MozillaFirefox-translations-common is &lt;60.6.1esr-109.63.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554619" version="1" comment="apache2 is &lt;2.4.23-29.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530887" version="1" comment="apache2-doc is &lt;2.4.23-29.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554620" version="1" comment="apache2-example-pages is &lt;2.4.23-29.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554621" version="1" comment="apache2-prefork is &lt;2.4.23-29.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554622" version="1" comment="apache2-utils is &lt;2.4.23-29.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554623" version="1" comment="apache2-worker is &lt;2.4.23-29.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554624" version="1" comment="clamav is &lt;0.100.3-33.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554625" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-15.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554626" version="1" comment="libSDL-1_2-0-32bit is &lt;1.2.15-15.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554627" version="1" comment="dovecot22 is &lt;2.2.31-19.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554628" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554629" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554630" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554631" version="1" comment="kernel-azure is &lt;4.4.176-4.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554632" version="1" comment="kernel-azure-base is &lt;4.4.176-4.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554633" version="1" comment="kernel-azure-devel is &lt;4.4.176-4.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554634" version="1" comment="kernel-devel-azure is &lt;4.4.176-4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554635" version="1" comment="kernel-source-azure is &lt;4.4.176-4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554636" version="1" comment="kernel-syms-azure is &lt;4.4.176-4.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554637" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548951" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554638" version="1" comment="sqlite3 is &lt;3.8.10.2-9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521761" version="1" comment="xen is &lt;4.9.4_02-3.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554639" version="1" comment="xen-doc-html is &lt;4.9.4_02-3.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521762" version="1" comment="xen-libs is &lt;4.9.4_02-3.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521763" version="1" comment="xen-libs-32bit is &lt;4.9.4_02-3.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554640" version="1" comment="xen-tools is &lt;4.9.4_02-3.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554641" version="1" comment="xen-tools-domU is &lt;4.9.4_02-3.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554642" version="1" comment="libxmltooling6 is &lt;1.5.6-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554643" version="1" comment="xmltooling-schemas is &lt;1.5.6-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554644" version="1" comment="kernel-azure is &lt;4.4.162-4.19.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554645" version="1" comment="kernel-azure-base is &lt;4.4.162-4.19.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554646" version="1" comment="kernel-azure-devel is &lt;4.4.162-4.19.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554647" version="1" comment="kernel-devel-azure is &lt;4.4.162-4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554648" version="1" comment="kernel-source-azure is &lt;4.4.162-4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554649" version="1" comment="kernel-syms-azure is &lt;4.4.162-4.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554650" version="1" comment="wget is &lt;1.14-21.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554651" version="1" comment="qemu is &lt;2.9.1-6.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554652" version="1" comment="qemu-arm is &lt;2.9.1-6.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554653" version="1" comment="qemu-block-curl is &lt;2.9.1-6.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554654" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554655" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554656" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554657" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521767" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554658" version="1" comment="qemu-kvm is &lt;2.9.1-6.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554659" version="1" comment="qemu-lang is &lt;2.9.1-6.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554660" version="1" comment="qemu-ppc is &lt;2.9.1-6.31.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554661" version="1" comment="qemu-s390 is &lt;2.9.1-6.31.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521769" version="1" comment="qemu-seabios is &lt;1.10.2-6.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521770" version="1" comment="qemu-sgabios is &lt;8-6.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554662" version="1" comment="qemu-tools is &lt;2.9.1-6.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521772" version="1" comment="qemu-vgabios is &lt;1.10.2-6.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521773" version="1" comment="qemu-x86 is &lt;2.9.1-6.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554663" version="1" comment="libSoundTouch0 is &lt;1.7.1-5.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009528730" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009528731" version="1" comment="python3 is &lt;3.4.6-25.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009528732" version="1" comment="python3-base is &lt;3.4.6-25.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554664" version="1" comment="python3-curses is &lt;3.4.6-25.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554665" version="1" comment="curl is &lt;7.37.0-37.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554666" version="1" comment="libcurl4 is &lt;7.37.0-37.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546718" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.37.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554667" version="1" comment="freeradius-server is &lt;3.0.15-2.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554668" version="1" comment="freeradius-server-doc is &lt;3.0.15-2.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554669" version="1" comment="freeradius-server-krb5 is &lt;3.0.15-2.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554670" version="1" comment="freeradius-server-ldap is &lt;3.0.15-2.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554671" version="1" comment="freeradius-server-libs is &lt;3.0.15-2.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554672" version="1" comment="freeradius-server-mysql is &lt;3.0.15-2.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554673" version="1" comment="freeradius-server-perl is &lt;3.0.15-2.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554674" version="1" comment="freeradius-server-postgresql is &lt;3.0.15-2.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554675" version="1" comment="freeradius-server-python is &lt;3.0.15-2.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554676" version="1" comment="freeradius-server-sqlite is &lt;3.0.15-2.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554677" version="1" comment="freeradius-server-utils is &lt;3.0.15-2.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554678" version="1" comment="cups is &lt;1.7.5-20.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554679" version="1" comment="cups-client is &lt;1.7.5-20.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554680" version="1" comment="cups-libs is &lt;1.7.5-20.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548956" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554681" version="1" comment="pam_radius is &lt;1.3.16-239.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548963" version="1" comment="pam_radius-32bit is &lt;1.3.16-239.4.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554682" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.1-2.50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554683" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.1-2.50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554684" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.1-2.50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554685" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.1-2.50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554686" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.1-2.50.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554687" version="1" comment="libshibsp-lite6 is &lt;2.5.5-6.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554688" version="1" comment="libshibsp6 is &lt;2.5.5-6.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554689" version="1" comment="shibboleth-sp is &lt;2.5.5-6.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554690" version="1" comment="ceph-common is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554691" version="1" comment="libcephfs2 is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554692" version="1" comment="librados2 is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554693" version="1" comment="libradosstriper1 is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554694" version="1" comment="librbd1 is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554695" version="1" comment="librgw2 is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554696" version="1" comment="python-cephfs is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554697" version="1" comment="python-rados is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554698" version="1" comment="python-rbd is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554699" version="1" comment="python-rgw is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554700" version="1" comment="libvncclient0 is &lt;0.9.9-17.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554701" version="1" comment="libvncserver0 is &lt;0.9.9-17.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554702" version="1" comment="libicu-doc is &lt;52.1-8.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554703" version="1" comment="libicu52_1 is &lt;52.1-8.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548971" version="1" comment="libicu52_1-32bit is &lt;52.1-8.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554704" version="1" comment="libicu52_1-data is &lt;52.1-8.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554705" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551431" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554706" version="1" comment="openldap2 is &lt;2.4.41-18.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554707" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554708" version="1" comment="openldap2-client is &lt;2.4.41-18.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554709" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554710" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.2-2.53.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554711" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.2-2.53.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554712" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.2-2.53.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554713" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.2-2.53.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554714" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.2-2.53.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554715" version="1" comment="ghostscript is &lt;9.52-23.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554716" version="1" comment="ghostscript-x11 is &lt;9.52-23.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554717" version="1" comment="libspectre1 is &lt;0.2.7-12.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554718" version="1" comment="MozillaFirefox is &lt;68.8.0-109.119.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554719" version="1" comment="MozillaFirefox-translations-common is &lt;68.8.0-109.119.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554720" version="1" comment="squid is &lt;3.5.21-26.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554721" version="1" comment="apache2 is &lt;2.4.23-29.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554722" version="1" comment="apache2-example-pages is &lt;2.4.23-29.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554723" version="1" comment="apache2-prefork is &lt;2.4.23-29.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554724" version="1" comment="apache2-utils is &lt;2.4.23-29.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554725" version="1" comment="apache2-worker is &lt;2.4.23-29.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554726" version="1" comment="kernel-default is &lt;4.4.180-94.116.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554727" version="1" comment="kernel-default-base is &lt;4.4.180-94.116.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554728" version="1" comment="kernel-default-devel is &lt;4.4.180-94.116.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538399" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.116.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554729" version="1" comment="kernel-default-man is &lt;4.4.180-94.116.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554730" version="1" comment="kernel-syms is &lt;4.4.180-94.116.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538404" version="1" comment="kgraft-patch-4_4_180-94_116-default is &lt;1-4.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525264" version="1" comment="python-PyYAML is &lt;5.1.2-26.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525265" version="1" comment="python3-PyYAML is &lt;5.1.2-26.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542416" version="1" comment="git-core is &lt;2.26.2-27.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548985" version="1" comment="mailman is &lt;2.1.17-3.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129194"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.180-94.113-default is currently running" id="oval:org.opensuse.security:tst:2009721279" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009172044"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719606" version="1" comment="kgraft-patch-4_4_180-94_113-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538407" version="1" comment="kgraft-patch-4_4_180-94_113-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.180-94.107-default is currently running" id="oval:org.opensuse.security:tst:2009721280" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009172045"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719608" version="1" comment="kgraft-patch-4_4_180-94_107-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538408" version="1" comment="kgraft-patch-4_4_180-94_107-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538409" version="1" comment="kgraft-patch-4_4_180-94_103-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538410" version="1" comment="kgraft-patch-4_4_180-94_100-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538411" version="1" comment="kgraft-patch-4_4_180-94_97-default is &lt;9-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538412" version="1" comment="kgraft-patch-4_4_178-94_91-default is &lt;9-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554731" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548995" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554732" version="1" comment="python is &lt;2.7.17-28.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548997" version="1" comment="python-32bit is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554733" version="1" comment="python-base is &lt;2.7.17-28.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548999" version="1" comment="python-base-32bit is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554734" version="1" comment="python-curses is &lt;2.7.17-28.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554735" version="1" comment="python-demo is &lt;2.7.17-28.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542461" version="1" comment="python-devel is &lt;2.7.17-28.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554736" version="1" comment="python-gdbm is &lt;2.7.17-28.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554737" version="1" comment="python-idle is &lt;2.7.17-28.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554738" version="1" comment="python-tk is &lt;2.7.17-28.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554739" version="1" comment="python-xml is &lt;2.7.17-28.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554740" version="1" comment="krb5-appl-clients is &lt;1.0.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554741" version="1" comment="krb5-appl-servers is &lt;1.0.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554742" version="1" comment="libexif12 is &lt;0.6.22-8.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549008" version="1" comment="libexif12-32bit is &lt;0.6.22-8.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554743" version="1" comment="qemu is &lt;2.9.1-6.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554744" version="1" comment="qemu-arm is &lt;2.9.1-6.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554745" version="1" comment="qemu-block-curl is &lt;2.9.1-6.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554746" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554747" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.44.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554748" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554749" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554750" version="1" comment="qemu-kvm is &lt;2.9.1-6.44.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554751" version="1" comment="qemu-lang is &lt;2.9.1-6.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538422" version="1" comment="qemu-ppc is &lt;2.9.1-6.44.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554752" version="1" comment="qemu-s390 is &lt;2.9.1-6.44.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554753" version="1" comment="qemu-tools is &lt;2.9.1-6.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554754" version="1" comment="gvim is &lt;7.4.326-17.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554755" version="1" comment="vim is &lt;7.4.326-17.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554756" version="1" comment="MozillaFirefox is &lt;68.9.0-109.123.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554757" version="1" comment="MozillaFirefox-translations-common is &lt;68.9.0-109.123.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554758" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-19.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554759" version="1" comment="ruby2.1 is &lt;2.1.9-19.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554760" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-19.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554761" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.261-43.38.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554762" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.261-43.38.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554763" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.261-43.38.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554764" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.261-43.38.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554765" version="1" comment="libXvnc1 is &lt;1.6.0-18.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554766" version="1" comment="tigervnc is &lt;1.6.0-18.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554767" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-18.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554768" version="1" comment="kernel-default is &lt;4.4.180-94.121.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554769" version="1" comment="kernel-default-base is &lt;4.4.180-94.121.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554770" version="1" comment="kernel-default-devel is &lt;4.4.180-94.121.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538431" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.121.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554771" version="1" comment="kernel-default-man is &lt;4.4.180-94.121.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554772" version="1" comment="kernel-syms is &lt;4.4.180-94.121.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538436" version="1" comment="kgraft-patch-4_4_180-94_121-default is &lt;1-4.5.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554773" version="1" comment="libvirglrenderer0 is &lt;0.5.0-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554774" version="1" comment="libadns1 is &lt;1.4-103.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554775" version="1" comment="perl is &lt;5.18.2-12.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551488" version="1" comment="perl-32bit is &lt;5.18.2-12.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554776" version="1" comment="perl-base is &lt;5.18.2-12.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551490" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.65-38.53.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542540" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.65-38.53.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551491" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.65-38.53.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551492" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.10-30.69.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542541" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.10-30.69.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554777" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.252-27.45.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554778" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.252-27.45.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554779" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.252-27.45.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554780" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.252-27.45.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554781" version="1" comment="kernel-default is &lt;4.4.180-94.124.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554782" version="1" comment="kernel-default-base is &lt;4.4.180-94.124.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554783" version="1" comment="kernel-default-devel is &lt;4.4.180-94.124.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538446" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.124.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554784" version="1" comment="kernel-default-man is &lt;4.4.180-94.124.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554785" version="1" comment="kernel-syms is &lt;4.4.180-94.124.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538451" version="1" comment="kgraft-patch-4_4_180-94_124-default is &lt;1-4.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554786" version="1" comment="curl is &lt;7.37.0-37.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554787" version="1" comment="libcurl4 is &lt;7.37.0-37.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551499" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554788" version="1" comment="ceph-common is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554789" version="1" comment="libcephfs2 is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554790" version="1" comment="librados2 is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554791" version="1" comment="libradosstriper1 is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554792" version="1" comment="librbd1 is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554793" version="1" comment="librgw2 is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554794" version="1" comment="python-cephfs is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554795" version="1" comment="python-rados is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554796" version="1" comment="python-rbd is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554797" version="1" comment="python-rgw is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127686"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.180-94.116-default is currently running" id="oval:org.opensuse.security:tst:2009721281" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009172046"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719610" version="1" comment="kgraft-patch-4_4_180-94_116-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538462" version="1" comment="kgraft-patch-4_4_180-94_116-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538463" version="1" comment="kgraft-patch-4_4_180-94_113-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538464" version="1" comment="kgraft-patch-4_4_180-94_107-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538465" version="1" comment="kgraft-patch-4_4_180-94_103-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538466" version="1" comment="kgraft-patch-4_4_180-94_100-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538467" version="1" comment="kgraft-patch-4_4_180-94_97-default is &lt;10-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554798" version="1" comment="mutt is &lt;1.10.1-55.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554799" version="1" comment="squid is &lt;3.5.21-26.26.1 for aarch64,i586,ppc64le,s390,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554800" version="1" comment="ntp is &lt;4.2.8p15-88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554801" version="1" comment="ntp-doc is &lt;4.2.8p15-88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538468" version="1" comment="kgraft-patch-4_4_180-94_97-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554802" version="1" comment="libfreebl3 is &lt;3.53.1-58.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551505" version="1" comment="libfreebl3-32bit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554803" version="1" comment="libfreebl3-hmac is &lt;3.53.1-58.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551507" version="1" comment="libfreebl3-hmac-32bit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554804" version="1" comment="libsoftokn3 is &lt;3.53.1-58.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551509" version="1" comment="libsoftokn3-32bit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554805" version="1" comment="libsoftokn3-hmac is &lt;3.53.1-58.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551511" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554806" version="1" comment="mozilla-nspr is &lt;4.25-19.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551513" version="1" comment="mozilla-nspr-32bit is &lt;4.25-19.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542839" version="1" comment="mozilla-nspr-devel is &lt;4.25-19.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554807" version="1" comment="mozilla-nss is &lt;3.53.1-58.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551515" version="1" comment="mozilla-nss-32bit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554808" version="1" comment="mozilla-nss-certs is &lt;3.53.1-58.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551517" version="1" comment="mozilla-nss-certs-32bit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542840" version="1" comment="mozilla-nss-devel is &lt;3.53.1-58.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554809" version="1" comment="mozilla-nss-sysinit is &lt;3.53.1-58.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551519" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554810" version="1" comment="mozilla-nss-tools is &lt;3.53.1-58.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538471" version="1" comment="kgraft-patch-4_4_178-94_91-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554811" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.71.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551522" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.71.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554812" version="1" comment="openldap2 is &lt;2.4.41-18.71.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554813" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.71.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554814" version="1" comment="openldap2-client is &lt;2.4.41-18.71.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554815" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.71.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538472" version="1" comment="kgraft-patch-4_4_176-94_88-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538479" version="1" comment="kgraft-patch-4_4_175-94_79-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554816" version="1" comment="MozillaFirefox is &lt;78.0.1-112.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554817" version="1" comment="MozillaFirefox-branding-SLE is &lt;78-35.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542843" version="1" comment="MozillaFirefox-devel is &lt;78.0.1-112.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554818" version="1" comment="MozillaFirefox-translations-common is &lt;78.0.1-112.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554819" version="1" comment="bind is &lt;9.9.9P1-63.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554820" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554821" version="1" comment="bind-libs is &lt;9.9.9P1-63.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551534" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554822" version="1" comment="bind-utils is &lt;9.9.9P1-63.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554823" version="1" comment="squid is &lt;3.5.21-26.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554824" version="1" comment="golang-github-prometheus-node_exporter is &lt;0.18.1-1.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554825" version="1" comment="xrdp is &lt;0.9.0~git.1456906198.f422461-21.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538482" version="1" comment="kgraft-patch-4_4_180-94_113-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551538" version="1" comment="mailman is &lt;2.1.17-3.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538483" version="1" comment="kgraft-patch-4_4_180-94_107-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554826" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554827" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554828" version="1" comment="libdcerpc0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554829" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554830" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554831" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554832" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554833" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554834" version="1" comment="libndr-standard0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554835" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554836" version="1" comment="libndr0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554837" version="1" comment="libndr0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554838" version="1" comment="libnetapi0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554839" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554840" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554841" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554842" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554843" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554844" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554845" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554846" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554847" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554848" version="1" comment="libsamba-util0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554849" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554850" version="1" comment="libsamdb0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554851" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554852" version="1" comment="libsmbclient0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554853" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554854" version="1" comment="libsmbconf0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554855" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554856" version="1" comment="libsmbldap0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554857" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554858" version="1" comment="libtevent-util0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554859" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554860" version="1" comment="libwbclient0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554861" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554862" version="1" comment="samba is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554863" version="1" comment="samba-client is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554864" version="1" comment="samba-client-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554865" version="1" comment="samba-libs is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554866" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554867" version="1" comment="samba-winbind is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554868" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554869" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.3-2.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554870" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.3-2.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554871" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.3-2.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554872" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.3-2.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542856" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.3-2.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554873" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.3-2.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554874" version="1" comment="grub2 is &lt;2.02-4.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554875" version="1" comment="grub2-arm64-efi is &lt;2.02-4.53.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538530" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02-4.53.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554876" version="1" comment="grub2-s390x-emu is &lt;2.02-4.53.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538535" version="1" comment="kgraft-patch-4_4_180-94_103-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554877" version="1" comment="ghostscript is &lt;9.52-23.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554878" version="1" comment="ghostscript-x11 is &lt;9.52-23.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554879" version="1" comment="MozillaFirefox is &lt;78.1.0-112.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542859" version="1" comment="MozillaFirefox-devel is &lt;78.1.0-112.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554880" version="1" comment="MozillaFirefox-translations-common is &lt;78.1.0-112.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538536" version="1" comment="kgraft-patch-4_4_180-94_100-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554881" version="1" comment="libX11-6 is &lt;1.6.2-12.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551554" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554882" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551556" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554883" version="1" comment="libxcb-dri2-0 is &lt;1.10-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551558" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542866" version="1" comment="libxcb-dri3-0 is &lt;1.10-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551560" version="1" comment="libxcb-dri3-0-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554884" version="1" comment="libxcb-glx0 is &lt;1.10-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551562" version="1" comment="libxcb-glx0-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542867" version="1" comment="libxcb-present0 is &lt;1.10-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551564" version="1" comment="libxcb-present0-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554885" version="1" comment="libxcb-randr0 is &lt;1.10-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554886" version="1" comment="libxcb-render0 is &lt;1.10-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551567" version="1" comment="libxcb-render0-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554887" version="1" comment="libxcb-shape0 is &lt;1.10-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554888" version="1" comment="libxcb-shm0 is &lt;1.10-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551570" version="1" comment="libxcb-shm0-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554889" version="1" comment="libxcb-sync1 is &lt;1.10-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551572" version="1" comment="libxcb-sync1-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554890" version="1" comment="libxcb-xf86dri0 is &lt;1.10-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554891" version="1" comment="libxcb-xfixes0 is &lt;1.10-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551575" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542872" version="1" comment="libxcb-xinerama0 is &lt;1.10-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554892" version="1" comment="libxcb-xkb1 is &lt;1.10-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551578" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554893" version="1" comment="libxcb-xv0 is &lt;1.10-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554894" version="1" comment="libxcb1 is &lt;1.10-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551581" version="1" comment="libxcb1-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554895" version="1" comment="kernel-default is &lt;4.4.180-94.127.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554896" version="1" comment="kernel-default-base is &lt;4.4.180-94.127.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554897" version="1" comment="kernel-default-devel is &lt;4.4.180-94.127.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538540" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.127.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554898" version="1" comment="kernel-default-man is &lt;4.4.180-94.127.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554899" version="1" comment="kernel-syms is &lt;4.4.180-94.127.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538545" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;1-4.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554900" version="1" comment="libvncclient0 is &lt;0.9.9-17.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554901" version="1" comment="libvncserver0 is &lt;0.9.9-17.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554902" version="1" comment="dpdk is &lt;16.11.9-8.15.13 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554903" version="1" comment="dpdk-thunderx is &lt;16.11.9-8.15.10 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554904" version="1" comment="dpdk-thunderx-kmp-default is &lt;16.11.9_k4.4.180_94.127-8.15.10 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554905" version="1" comment="dpdk-tools is &lt;16.11.9-8.15.13 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554906" version="1" comment="libX11-6 is &lt;1.6.2-12.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551590" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554907" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551592" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554908" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-13.3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551594" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-13.3.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554909" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.4-2.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554910" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.4-2.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554911" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.4-2.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554912" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.4-2.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542882" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.4-2.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554913" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.4-2.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554914" version="1" comment="dovecot22 is &lt;2.2.31-19.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554915" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554916" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554917" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554918" version="1" comment="grub2 is &lt;2.02-4.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554919" version="1" comment="grub2-arm64-efi is &lt;2.02-4.61.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538557" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02-4.61.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554920" version="1" comment="grub2-s390x-emu is &lt;2.02-4.61.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554921" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554922" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554923" version="1" comment="libdcerpc0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554924" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554925" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554926" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554927" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554928" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554929" version="1" comment="libndr-standard0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554930" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554931" version="1" comment="libndr0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554932" version="1" comment="libndr0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554933" version="1" comment="libnetapi0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554934" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554935" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554936" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554937" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554938" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554939" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554940" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554941" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554942" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554943" version="1" comment="libsamba-util0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554944" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554945" version="1" comment="libsamdb0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554946" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554947" version="1" comment="libsmbclient0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554948" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554949" version="1" comment="libsmbconf0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554950" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554951" version="1" comment="libsmbldap0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554952" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554953" version="1" comment="libtevent-util0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554954" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554955" version="1" comment="libwbclient0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554956" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554957" version="1" comment="samba is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554958" version="1" comment="samba-client is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554959" version="1" comment="samba-client-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554960" version="1" comment="samba-libs is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554961" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554962" version="1" comment="samba-winbind is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554963" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554964" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554965" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549012" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.0-30.60.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554966" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554967" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554968" version="1" comment="apache2 is &lt;2.4.23-29.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554969" version="1" comment="apache2-example-pages is &lt;2.4.23-29.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554970" version="1" comment="apache2-prefork is &lt;2.4.23-29.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554971" version="1" comment="apache2-utils is &lt;2.4.23-29.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554972" version="1" comment="apache2-worker is &lt;2.4.23-29.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551671" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.15-30.72.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542898" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.15-30.72.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554973" version="1" comment="squid is &lt;3.5.21-26.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554974" version="1" comment="libX11-6 is &lt;1.6.2-12.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551674" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554975" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551676" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551677" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.70-38.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542900" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.70-38.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551678" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.70-38.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538584" version="1" comment="kgraft-patch-4_4_180-94_103-default is &lt;9-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538585" version="1" comment="kgraft-patch-4_4_180-94_107-default is &lt;7-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538586" version="1" comment="kgraft-patch-4_4_180-94_113-default is &lt;6-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538587" version="1" comment="kgraft-patch-4_4_180-94_116-default is &lt;3-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117920"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.180-94.121-default is currently running" id="oval:org.opensuse.security:tst:2009721282" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009172047"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719612" version="1" comment="kgraft-patch-4_4_180-94_121-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538588" version="1" comment="kgraft-patch-4_4_180-94_121-default is &lt;2-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117880"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.180-94.124-default is currently running" id="oval:org.opensuse.security:tst:2009721283" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009172048"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719614" version="1" comment="kgraft-patch-4_4_180-94_124-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538589" version="1" comment="kgraft-patch-4_4_180-94_124-default is &lt;2-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117880"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.180-94.127-default is currently running" id="oval:org.opensuse.security:tst:2009721284" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009172049"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719616" version="1" comment="kgraft-patch-4_4_180-94_127-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538590" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;2-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554976" version="1" comment="MozillaFirefox is &lt;78.2.0-112.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542901" version="1" comment="MozillaFirefox-devel is &lt;78.2.0-112.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554977" version="1" comment="MozillaFirefox-translations-common is &lt;78.2.0-112.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554978" version="1" comment="kernel-default is &lt;4.4.180-94.130.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554979" version="1" comment="kernel-default-base is &lt;4.4.180-94.130.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554980" version="1" comment="kernel-default-devel is &lt;4.4.180-94.130.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538594" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.130.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554981" version="1" comment="kernel-default-man is &lt;4.4.180-94.130.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554982" version="1" comment="kernel-syms is &lt;4.4.180-94.130.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538599" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;1-4.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554983" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.242-27.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554984" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.242-27.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554985" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.242-27.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554986" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.242-27.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542910" version="1" comment="libsolv-devel is &lt;0.6.36-2.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554987" version="1" comment="libsolv-tools is &lt;0.6.36-2.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542911" version="1" comment="perl-solv is &lt;0.6.36-2.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554988" version="1" comment="python-solv is &lt;0.6.36-2.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554989" version="1" comment="perl-DBI is &lt;1.628-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529283" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529284" version="1" comment="python3 is &lt;3.4.10-25.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529285" version="1" comment="python3-base is &lt;3.4.10-25.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529286" version="1" comment="python3-curses is &lt;3.4.10-25.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542925" version="1" comment="python3-devel is &lt;3.4.10-25.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554990" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554991" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554992" version="1" comment="libdcerpc0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554993" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554994" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554995" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554996" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554997" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554998" version="1" comment="libndr-standard0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009554999" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555000" version="1" comment="libndr0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555001" version="1" comment="libndr0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555002" version="1" comment="libnetapi0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555003" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555004" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555005" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555006" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555007" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555008" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555009" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555010" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555011" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555012" version="1" comment="libsamba-util0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555013" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555014" version="1" comment="libsamdb0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555015" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555016" version="1" comment="libsmbclient0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555017" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555018" version="1" comment="libsmbconf0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555019" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555020" version="1" comment="libsmbldap0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555021" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555022" version="1" comment="libtevent-util0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555023" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555024" version="1" comment="libwbclient0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555025" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555026" version="1" comment="samba is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555027" version="1" comment="samba-client is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555028" version="1" comment="samba-client-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555029" version="1" comment="samba-libs is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555030" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555031" version="1" comment="samba-winbind is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555032" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555033" version="1" comment="libQt5Concurrent5 is &lt;5.6.2-6.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555034" version="1" comment="libQt5Core5 is &lt;5.6.2-6.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555035" version="1" comment="libQt5DBus5 is &lt;5.6.2-6.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555036" version="1" comment="libQt5Gui5 is &lt;5.6.2-6.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555037" version="1" comment="libQt5Network5 is &lt;5.6.2-6.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555038" version="1" comment="libQt5OpenGL5 is &lt;5.6.2-6.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555039" version="1" comment="libQt5PrintSupport5 is &lt;5.6.2-6.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555040" version="1" comment="libQt5Sql5 is &lt;5.6.2-6.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555041" version="1" comment="libQt5Sql5-mysql is &lt;5.6.2-6.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555042" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.2-6.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555043" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.2-6.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555044" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.2-6.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555045" version="1" comment="libQt5Test5 is &lt;5.6.2-6.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555046" version="1" comment="libQt5Widgets5 is &lt;5.6.2-6.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555047" version="1" comment="libQt5Xml5 is &lt;5.6.2-6.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555048" version="1" comment="MozillaFirefox is &lt;78.3.0-112.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542973" version="1" comment="MozillaFirefox-devel is &lt;78.3.0-112.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555049" version="1" comment="MozillaFirefox-translations-common is &lt;78.3.0-112.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555050" version="1" comment="perl-DBI is &lt;1.628-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555051" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.271-43.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555052" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.271-43.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555053" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.271-43.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555054" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.271-43.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555055" version="1" comment="libXvnc1 is &lt;1.6.0-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555056" version="1" comment="tigervnc is &lt;1.6.0-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555057" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555058" version="1" comment="libproxy1 is &lt;0.4.13-18.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551763" version="1" comment="libproxy1-32bit is &lt;0.4.13-18.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555059" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.13-18.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551765" version="1" comment="libproxy1-config-gnome3-32bit is &lt;0.4.13-18.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555060" version="1" comment="libproxy1-networkmanager is &lt;0.4.13-18.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555061" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.13-18.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555062" version="1" comment="ft2demos is &lt;2.6.3-7.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555063" version="1" comment="libfreetype6 is &lt;2.6.3-7.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551770" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555064" version="1" comment="glibc is &lt;2.22-113.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551772" version="1" comment="glibc-32bit is &lt;2.22-113.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555065" version="1" comment="glibc-devel is &lt;2.22-113.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551774" version="1" comment="glibc-devel-32bit is &lt;2.22-113.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555066" version="1" comment="glibc-locale is &lt;2.22-113.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551776" version="1" comment="glibc-locale-32bit is &lt;2.22-113.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555067" version="1" comment="glibc-profile is &lt;2.22-113.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551778" version="1" comment="glibc-profile-32bit is &lt;2.22-113.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555068" version="1" comment="nscd is &lt;2.22-113.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555069" version="1" comment="MozillaFirefox is &lt;78.4.0-112.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543000" version="1" comment="MozillaFirefox-devel is &lt;78.4.0-112.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555070" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.0-112.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555071" version="1" comment="libspice-server1 is &lt;0.12.8-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555072" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.33-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555073" version="1" comment="libspice-client-glib-helper is &lt;0.33-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555074" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.33-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555075" version="1" comment="libspice-controller0 is &lt;0.33-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555076" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.33-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543013" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.33-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555077" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555078" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555079" version="1" comment="libdcerpc0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555080" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555081" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555082" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555083" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555084" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555085" version="1" comment="libndr-standard0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555086" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555087" version="1" comment="libndr0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555088" version="1" comment="libndr0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555089" version="1" comment="libnetapi0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555090" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555091" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555092" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555093" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555094" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555095" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555096" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555097" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555098" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555099" version="1" comment="libsamba-util0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555100" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555101" version="1" comment="libsamdb0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555102" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555103" version="1" comment="libsmbclient0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555104" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555105" version="1" comment="libsmbconf0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555106" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555107" version="1" comment="libsmbldap0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555108" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555109" version="1" comment="libtevent-util0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555110" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555111" version="1" comment="libwbclient0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555112" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555113" version="1" comment="samba is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555114" version="1" comment="samba-client is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555115" version="1" comment="samba-client-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555116" version="1" comment="samba-libs is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555117" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555118" version="1" comment="samba-winbind is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555119" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.248.c833312e640-3.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555120" version="1" comment="libvirt is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555121" version="1" comment="libvirt-admin is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555122" version="1" comment="libvirt-client is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555123" version="1" comment="libvirt-daemon is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555124" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555125" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555126" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555127" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555128" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555129" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555130" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555131" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555132" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555133" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555134" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555135" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555136" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555137" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555138" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555139" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555140" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555141" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555142" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555143" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555144" version="1" comment="libvirt-doc is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555145" version="1" comment="libvirt-libs is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555146" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555147" version="1" comment="libvirt-nss is &lt;3.3.0-5.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555148" version="1" comment="sane-backends is &lt;1.0.31-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555149" version="1" comment="libQt5Concurrent5 is &lt;5.6.2-6.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555150" version="1" comment="libQt5Core5 is &lt;5.6.2-6.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555151" version="1" comment="libQt5DBus5 is &lt;5.6.2-6.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555152" version="1" comment="libQt5Gui5 is &lt;5.6.2-6.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555153" version="1" comment="libQt5Network5 is &lt;5.6.2-6.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555154" version="1" comment="libQt5OpenGL5 is &lt;5.6.2-6.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555155" version="1" comment="libQt5PrintSupport5 is &lt;5.6.2-6.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555156" version="1" comment="libQt5Sql5 is &lt;5.6.2-6.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555157" version="1" comment="libQt5Sql5-mysql is &lt;5.6.2-6.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555158" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.2-6.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555159" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.2-6.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555160" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.2-6.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555161" version="1" comment="libQt5Test5 is &lt;5.6.2-6.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555162" version="1" comment="libQt5Widgets5 is &lt;5.6.2-6.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555163" version="1" comment="libQt5Xml5 is &lt;5.6.2-6.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555164" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.272-27.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555165" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.272-27.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555166" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.272-27.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555167" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.272-27.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538766" version="1" comment="kgraft-patch-4_4_180-94_124-default is &lt;3-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538767" version="1" comment="kgraft-patch-4_4_180-94_121-default is &lt;3-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538768" version="1" comment="kgraft-patch-4_4_180-94_116-default is &lt;4-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117922"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.180-94.130-default is currently running" id="oval:org.opensuse.security:tst:2009721285" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009172050"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719618" version="1" comment="kgraft-patch-4_4_180-94_130-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538769" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538770" version="1" comment="kgraft-patch-4_4_180-94_113-default is &lt;7-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538771" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538772" version="1" comment="kgraft-patch-4_4_180-94_107-default is &lt;8-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555168" version="1" comment="libasan6 is &lt;10.2.1+git583-1.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551866" version="1" comment="libasan6-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555169" version="1" comment="libatomic1 is &lt;10.2.1+git583-1.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551868" version="1" comment="libatomic1-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555170" version="1" comment="libgcc_s1 is &lt;10.2.1+git583-1.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551870" version="1" comment="libgcc_s1-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555171" version="1" comment="libgfortran5 is &lt;10.2.1+git583-1.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551872" version="1" comment="libgfortran5-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555172" version="1" comment="libgo16 is &lt;10.2.1+git583-1.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551874" version="1" comment="libgo16-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555173" version="1" comment="libgomp1 is &lt;10.2.1+git583-1.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551876" version="1" comment="libgomp1-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555174" version="1" comment="libitm1 is &lt;10.2.1+git583-1.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551878" version="1" comment="libitm1-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555175" version="1" comment="liblsan0 is &lt;10.2.1+git583-1.3.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555176" version="1" comment="libobjc4 is &lt;10.2.1+git583-1.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551880" version="1" comment="libobjc4-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537839" version="1" comment="libquadmath0 is &lt;10.2.1+git583-1.3.5 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555177" version="1" comment="libstdc++6 is &lt;10.2.1+git583-1.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551882" version="1" comment="libstdc++6-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525347" version="1" comment="libstdc++6-locale is &lt;10.2.1+git583-1.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525348" version="1" comment="libstdc++6-pp-gcc10 is &lt;10.2.1+git583-1.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525349" version="1" comment="libstdc++6-pp-gcc10-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555178" version="1" comment="libtsan0 is &lt;10.2.1+git583-1.3.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555179" version="1" comment="libubsan1 is &lt;10.2.1+git583-1.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551886" version="1" comment="libubsan1-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555180" version="1" comment="libsystemd0 is &lt;228-150.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551888" version="1" comment="libsystemd0-32bit is &lt;228-150.82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542599" version="1" comment="libudev-devel is &lt;228-150.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555181" version="1" comment="libudev1 is &lt;228-150.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551891" version="1" comment="libudev1-32bit is &lt;228-150.82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555182" version="1" comment="systemd is &lt;228-150.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551893" version="1" comment="systemd-32bit is &lt;228-150.82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555183" version="1" comment="systemd-sysvinit is &lt;228-150.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555184" version="1" comment="udev is &lt;228-150.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555185" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.281-43.44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555186" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.281-43.44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555187" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.281-43.44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555188" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.281-43.44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555189" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551901" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.77.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555190" version="1" comment="openldap2 is &lt;2.4.41-18.77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555191" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555192" version="1" comment="openldap2-client is &lt;2.4.41-18.77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555193" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555194" version="1" comment="MozillaFirefox is &lt;78.4.1-112.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543033" version="1" comment="MozillaFirefox-devel is &lt;78.4.1-112.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555195" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.1-112.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555196" version="1" comment="libecpg6 is &lt;12.4-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555197" version="1" comment="libpq5 is &lt;12.4-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551911" version="1" comment="libpq5-32bit is &lt;12.4-3.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555198" version="1" comment="postgresql10 is &lt;10.14-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555199" version="1" comment="postgresql10-contrib is &lt;10.14-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555200" version="1" comment="postgresql10-plperl is &lt;10.14-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555201" version="1" comment="postgresql10-plpython is &lt;10.14-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555202" version="1" comment="postgresql10-pltcl is &lt;10.14-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555203" version="1" comment="postgresql10-server is &lt;10.14-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555204" version="1" comment="postgresql96 is &lt;9.6.19-6.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555205" version="1" comment="postgresql96-contrib is &lt;9.6.19-6.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555206" version="1" comment="postgresql96-plperl is &lt;9.6.19-6.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555207" version="1" comment="postgresql96-plpython is &lt;9.6.19-6.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555208" version="1" comment="postgresql96-pltcl is &lt;9.6.19-6.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555209" version="1" comment="postgresql96-server is &lt;9.6.19-6.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555210" version="1" comment="libraptor2-0 is &lt;2.0.15-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555211" version="1" comment="krb5 is &lt;1.12.5-40.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551935" version="1" comment="krb5-32bit is &lt;1.12.5-40.40.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555212" version="1" comment="krb5-client is &lt;1.12.5-40.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555213" version="1" comment="krb5-doc is &lt;1.12.5-40.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555214" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555215" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555216" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555217" version="1" comment="krb5-server is &lt;1.12.5-40.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538773" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538774" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538775" version="1" comment="kgraft-patch-4_4_180-94_124-default is &lt;4-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538776" version="1" comment="kgraft-patch-4_4_180-94_121-default is &lt;4-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538777" version="1" comment="kgraft-patch-4_4_180-94_116-default is &lt;5-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538778" version="1" comment="kgraft-patch-4_4_180-94_113-default is &lt;8-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538779" version="1" comment="kgraft-patch-4_4_180-94_107-default is &lt;9-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555218" version="1" comment="postgresql10 is &lt;10.15-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555219" version="1" comment="postgresql10-contrib is &lt;10.15-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555220" version="1" comment="postgresql10-plperl is &lt;10.15-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555221" version="1" comment="postgresql10-plpython is &lt;10.15-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555222" version="1" comment="postgresql10-pltcl is &lt;10.15-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555223" version="1" comment="postgresql10-server is &lt;10.15-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555224" version="1" comment="u-boot-rpi3 is &lt;2016.07-12.3.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555225" version="1" comment="u-boot-tools is &lt;2016.07-12.3.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555226" version="1" comment="postgresql96 is &lt;9.6.20-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555227" version="1" comment="postgresql96-contrib is &lt;9.6.20-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555228" version="1" comment="postgresql96-plperl is &lt;9.6.20-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555229" version="1" comment="postgresql96-plpython is &lt;9.6.20-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555230" version="1" comment="postgresql96-pltcl is &lt;9.6.20-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555231" version="1" comment="postgresql96-server is &lt;9.6.20-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555232" version="1" comment="kernel-default is &lt;4.4.180-94.135.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555233" version="1" comment="kernel-default-base is &lt;4.4.180-94.135.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555234" version="1" comment="kernel-default-devel is &lt;4.4.180-94.135.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538783" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.135.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555235" version="1" comment="kernel-default-man is &lt;4.4.180-94.135.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555236" version="1" comment="kernel-syms is &lt;4.4.180-94.135.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538788" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;1-4.5.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555237" version="1" comment="bluez is &lt;5.13-5.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555238" version="1" comment="libbluetooth3 is &lt;5.13-5.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555239" version="1" comment="MozillaFirefox is &lt;78.5.0-112.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543047" version="1" comment="MozillaFirefox-devel is &lt;78.5.0-112.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555240" version="1" comment="MozillaFirefox-translations-common is &lt;78.5.0-112.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555241" version="1" comment="libvncclient0 is &lt;0.9.9-17.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555242" version="1" comment="libvncserver0 is &lt;0.9.9-17.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555243" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555244" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529567" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529568" version="1" comment="python3 is &lt;3.4.10-25.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529569" version="1" comment="python3-base is &lt;3.4.10-25.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529570" version="1" comment="python3-curses is &lt;3.4.10-25.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543051" version="1" comment="python3-devel is &lt;3.4.10-25.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555245" version="1" comment="gdm is &lt;3.10.0.1-54.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555246" version="1" comment="libgdm1 is &lt;3.10.0.1-54.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555247" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-54.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555248" version="1" comment="python-cryptography is &lt;2.1.4-7.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555249" version="1" comment="python3-cryptography is &lt;2.1.4-7.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555250" version="1" comment="libecpg6 is &lt;12.5-3.9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555251" version="1" comment="libpq5 is &lt;12.5-3.9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551980" version="1" comment="libpq5-32bit is &lt;12.5-3.9.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555252" version="1" comment="mutt is &lt;1.10.1-55.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538795" version="1" comment="kgraft-patch-4_4_180-94_113-default is &lt;9-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538796" version="1" comment="kgraft-patch-4_4_180-94_116-default is &lt;6-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538797" version="1" comment="kgraft-patch-4_4_180-94_121-default is &lt;5-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538798" version="1" comment="kgraft-patch-4_4_180-94_124-default is &lt;5-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538799" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538800" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.180-94.135-default is currently running" id="oval:org.opensuse.security:tst:2009721286" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009172051"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719620" version="1" comment="kgraft-patch-4_4_180-94_135-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538801" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555253" version="1" comment="dbus-1 is &lt;1.8.22-29.17.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555254" version="1" comment="dbus-1-x11 is &lt;1.8.22-29.17.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555255" version="1" comment="libdbus-1-3 is &lt;1.8.22-29.17.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555256" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-29.17.7 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555257" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555258" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551984" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555259" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551986" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555260" version="1" comment="openssl is &lt;1.0.2j-60.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555261" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551989" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-28.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555262" version="1" comment="python is &lt;2.7.17-28.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551991" version="1" comment="python-32bit is &lt;2.7.17-28.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555263" version="1" comment="python-base is &lt;2.7.17-28.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551993" version="1" comment="python-base-32bit is &lt;2.7.17-28.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555264" version="1" comment="python-curses is &lt;2.7.17-28.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555265" version="1" comment="python-demo is &lt;2.7.17-28.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555266" version="1" comment="python-devel is &lt;2.7.17-28.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555267" version="1" comment="python-gdbm is &lt;2.7.17-28.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555268" version="1" comment="python-idle is &lt;2.7.17-28.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555269" version="1" comment="python-tk is &lt;2.7.17-28.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555270" version="1" comment="python-xml is &lt;2.7.17-28.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555271" version="1" comment="MozillaFirefox is &lt;68.5.0-109.106.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555272" version="1" comment="MozillaFirefox-translations-common is &lt;68.5.0-109.106.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555273" version="1" comment="MozillaFirefox is &lt;78.6.0-112.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543065" version="1" comment="MozillaFirefox-devel is &lt;78.6.0-112.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555274" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.0-112.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555275" version="1" comment="clamav is &lt;0.103.0-33.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555276" version="1" comment="cyrus-sasl is &lt;2.1.26-8.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552013" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555277" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-8.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552015" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555278" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-8.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555279" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-8.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552018" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555280" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-8.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552020" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555281" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-8.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552022" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555282" version="1" comment="libsasl2-3 is &lt;2.1.26-8.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552024" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555283" version="1" comment="libasan5 is &lt;9.2.1+r275327-1.3.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549031" version="1" comment="libasan5-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555284" version="1" comment="libatomic1 is &lt;9.2.1+r275327-1.3.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549033" version="1" comment="libatomic1-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555285" version="1" comment="libgcc_s1 is &lt;9.2.1+r275327-1.3.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549035" version="1" comment="libgcc_s1-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555286" version="1" comment="libgfortran5 is &lt;9.2.1+r275327-1.3.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549037" version="1" comment="libgfortran5-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555287" version="1" comment="libgo14 is &lt;9.2.1+r275327-1.3.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549039" version="1" comment="libgo14-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555288" version="1" comment="libgomp1 is &lt;9.2.1+r275327-1.3.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549041" version="1" comment="libgomp1-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555289" version="1" comment="libitm1 is &lt;9.2.1+r275327-1.3.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549043" version="1" comment="libitm1-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555290" version="1" comment="liblsan0 is &lt;9.2.1+r275327-1.3.9 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537987" version="1" comment="libquadmath0 is &lt;9.2.1+r275327-1.3.9 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555291" version="1" comment="libstdc++6 is &lt;9.2.1+r275327-1.3.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549045" version="1" comment="libstdc++6-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555292" version="1" comment="libstdc++6-locale is &lt;9.2.1+r275327-1.3.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555293" version="1" comment="libtsan0 is &lt;9.2.1+r275327-1.3.9 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555294" version="1" comment="libubsan1 is &lt;9.2.1+r275327-1.3.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549048" version="1" comment="libubsan1-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555295" version="1" comment="sudo is &lt;1.8.20p2-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549059" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.60-38.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542713" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.60-38.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549060" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.60-38.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555296" version="1" comment="libexif12 is &lt;0.6.21-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549062" version="1" comment="libexif12-32bit is &lt;0.6.21-8.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555297" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555298" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552028" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.60.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555299" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552030" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.60.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555300" version="1" comment="openssl is &lt;1.0.2j-60.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555301" version="1" comment="ppp is &lt;2.4.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529634" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.39.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529635" version="1" comment="python3 is &lt;3.4.10-25.39.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529636" version="1" comment="python3-base is &lt;3.4.10-25.39.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555302" version="1" comment="python3-curses is &lt;3.4.10-25.39.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542718" version="1" comment="python3-devel is &lt;3.4.10-25.39.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555303" version="1" comment="libmysqlclient18 is &lt;10.0.40.2-29.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549071" version="1" comment="libmysqlclient18-32bit is &lt;10.0.40.2-29.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555304" version="1" comment="mariadb is &lt;10.0.40.2-29.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555305" version="1" comment="mariadb-client is &lt;10.0.40.2-29.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555306" version="1" comment="mariadb-errormessages is &lt;10.0.40.2-29.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555307" version="1" comment="mariadb-tools is &lt;10.0.40.2-29.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549079" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.55-38.44.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549080" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.55-38.44.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549086" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.5-30.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542735" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.5-30.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555308" version="1" comment="permissions is &lt;2015.09.28.1626-17.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525281" version="1" comment="python-PyYAML is &lt;5.1.2-26.9.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525290" version="1" comment="python3-PyYAML is &lt;5.1.2-26.9.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555309" version="1" comment="libpng16-16 is &lt;1.6.8-15.5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549088" version="1" comment="libpng16-16-32bit is &lt;1.6.8-15.5.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555310" version="1" comment="postgresql96 is &lt;9.6.17-3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555311" version="1" comment="postgresql96-contrib is &lt;9.6.17-3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555312" version="1" comment="postgresql96-plperl is &lt;9.6.17-3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555313" version="1" comment="postgresql96-plpython is &lt;9.6.17-3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555314" version="1" comment="postgresql96-pltcl is &lt;9.6.17-3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555315" version="1" comment="postgresql96-server is &lt;9.6.17-3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555316" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.251-43.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555317" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.251-43.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555318" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.251-43.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555319" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.251-43.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555320" version="1" comment="ipmitool is &lt;1.8.18-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555321" version="1" comment="squid is &lt;3.5.21-26.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555322" version="1" comment="MozillaFirefox is &lt;68.4.1-109.101.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555323" version="1" comment="MozillaFirefox-translations-common is &lt;68.4.1-109.101.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555324" version="1" comment="libecpg6 is &lt;10.12-1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555325" version="1" comment="libpq5 is &lt;10.12-1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549104" version="1" comment="libpq5-32bit is &lt;10.12-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555326" version="1" comment="postgresql10 is &lt;10.12-1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555327" version="1" comment="postgresql10-contrib is &lt;10.12-1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555328" version="1" comment="postgresql10-plperl is &lt;10.12-1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555329" version="1" comment="postgresql10-plpython is &lt;10.12-1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555330" version="1" comment="postgresql10-pltcl is &lt;10.12-1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555331" version="1" comment="postgresql10-server is &lt;10.12-1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555332" version="1" comment="MozillaFirefox is &lt;68.6.0-109.110.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555333" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.0-109.110.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555334" version="1" comment="libzypp is &lt;16.21.2-2.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542752" version="1" comment="libzypp-devel is &lt;16.21.2-2.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555335" version="1" comment="python-cffi is &lt;1.11.2-5.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555336" version="1" comment="python-cryptography is &lt;2.1.4-7.28.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555337" version="1" comment="python-xattr is &lt;0.7.5-6.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555338" version="1" comment="python3-cffi is &lt;1.11.2-5.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555339" version="1" comment="python3-cryptography is &lt;2.1.4-7.28.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555340" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.2-44.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555341" version="1" comment="spamassassin is &lt;3.4.2-44.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529802" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529803" version="1" comment="python3 is &lt;3.4.10-25.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529804" version="1" comment="python3-base is &lt;3.4.10-25.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529805" version="1" comment="python3-curses is &lt;3.4.10-25.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542758" version="1" comment="python3-devel is &lt;3.4.10-25.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538817" version="1" comment="kgraft-patch-4_4_176-94_88-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555342" version="1" comment="libfreebl3 is &lt;3.47.1-58.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549127" version="1" comment="libfreebl3-32bit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555343" version="1" comment="libfreebl3-hmac is &lt;3.47.1-58.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549129" version="1" comment="libfreebl3-hmac-32bit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555344" version="1" comment="libsoftokn3 is &lt;3.47.1-58.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549131" version="1" comment="libsoftokn3-32bit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555345" version="1" comment="libsoftokn3-hmac is &lt;3.47.1-58.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549133" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555346" version="1" comment="mozilla-nspr is &lt;4.23-19.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549135" version="1" comment="mozilla-nspr-32bit is &lt;4.23-19.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542760" version="1" comment="mozilla-nspr-devel is &lt;4.23-19.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555347" version="1" comment="mozilla-nss is &lt;3.47.1-58.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549138" version="1" comment="mozilla-nss-32bit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555348" version="1" comment="mozilla-nss-certs is &lt;3.47.1-58.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549140" version="1" comment="mozilla-nss-certs-32bit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542761" version="1" comment="mozilla-nss-devel is &lt;3.47.1-58.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555349" version="1" comment="mozilla-nss-sysinit is &lt;3.47.1-58.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549143" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555350" version="1" comment="mozilla-nss-tools is &lt;3.47.1-58.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538820" version="1" comment="kgraft-patch-4_4_180-94_113-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538821" version="1" comment="kgraft-patch-4_4_180-94_107-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538822" version="1" comment="kgraft-patch-4_4_180-94_103-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538823" version="1" comment="kgraft-patch-4_4_180-94_100-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538824" version="1" comment="kgraft-patch-4_4_180-94_97-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538825" version="1" comment="kgraft-patch-4_4_178-94_91-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555351" version="1" comment="libxslt-tools is &lt;1.1.28-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555352" version="1" comment="libxslt1 is &lt;1.1.28-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552051" version="1" comment="libxslt1-32bit is &lt;1.1.28-17.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555353" version="1" comment="MozillaFirefox is &lt;68.6.1-109.113.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555354" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.1-109.113.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555355" version="1" comment="MozillaFirefox is &lt;68.7.0-109.116.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555356" version="1" comment="MozillaFirefox-translations-common is &lt;68.7.0-109.116.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542775" version="1" comment="git-core is &lt;2.26.0-27.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555357" version="1" comment="libpcre2-16-0 is &lt;10.34-1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555358" version="1" comment="libpcre2-32-0 is &lt;10.34-1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555359" version="1" comment="libpcre2-8-0 is &lt;10.34-1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555360" version="1" comment="libpcre2-posix2 is &lt;10.34-1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538826" version="1" comment="kgraft-patch-4_4_180-94_116-default is &lt;9-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538827" version="1" comment="kgraft-patch-4_4_180-94_121-default is &lt;8-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538828" version="1" comment="kgraft-patch-4_4_180-94_124-default is &lt;8-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538829" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;8-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538830" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;7-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538831" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;5-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117925"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.180-94.138-default is currently running" id="oval:org.opensuse.security:tst:2009721287" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009172052"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719622" version="1" comment="kgraft-patch-4_4_180-94_138-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538832" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;3-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117920"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.180-94.141-default is currently running" id="oval:org.opensuse.security:tst:2009721288" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009172053"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719624" version="1" comment="kgraft-patch-4_4_180-94_141-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538833" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;2-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555361" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.5-44.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555362" version="1" comment="spamassassin is &lt;3.4.5-44.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555363" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555364" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555365" version="1" comment="clamav is &lt;0.103.2-33.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555366" version="1" comment="qemu is &lt;2.9.1-6.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555367" version="1" comment="qemu-arm is &lt;2.9.1-6.47.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555368" version="1" comment="qemu-block-curl is &lt;2.9.1-6.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555369" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555370" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.47.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555371" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555372" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555373" version="1" comment="qemu-kvm is &lt;2.9.1-6.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555374" version="1" comment="qemu-lang is &lt;2.9.1-6.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538851" version="1" comment="qemu-ppc is &lt;2.9.1-6.47.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555375" version="1" comment="qemu-s390 is &lt;2.9.1-6.47.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555376" version="1" comment="qemu-tools is &lt;2.9.1-6.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555377" version="1" comment="sudo is &lt;1.8.20p2-3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555378" version="1" comment="MozillaFirefox is &lt;78.10.0-112.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543103" version="1" comment="MozillaFirefox-devel is &lt;78.10.0-112.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555379" version="1" comment="MozillaFirefox-translations-common is &lt;78.10.0-112.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538867" version="1" comment="kgraft-patch-4_4_180-94_124-default is &lt;9-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538868" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;9-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538869" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;8-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538870" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;4-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538871" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;3-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538872" version="1" comment="kgraft-patch-4_4_180-94_116-default is &lt;10-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538873" version="1" comment="kgraft-patch-4_4_180-94_121-default is &lt;9-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538874" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;6-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555380" version="1" comment="libhogweed2 is &lt;2.7.1-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555381" version="1" comment="libhogweed2-32bit is &lt;2.7.1-13.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555382" version="1" comment="libnettle4 is &lt;2.7.1-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555383" version="1" comment="libnettle4-32bit is &lt;2.7.1-13.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555384" version="1" comment="gdm is &lt;3.10.0.1-54.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555385" version="1" comment="libgdm1 is &lt;3.10.0.1-54.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555386" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-54.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555387" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.291-43.47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555388" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.291-43.47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555389" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.291-43.47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555390" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.291-43.47.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555391" version="1" comment="cups is &lt;1.7.5-20.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555392" version="1" comment="cups-client is &lt;1.7.5-20.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555393" version="1" comment="cups-libs is &lt;1.7.5-20.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555394" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555395" version="1" comment="bind is &lt;9.9.9P1-63.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555396" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555397" version="1" comment="bind-libs is &lt;9.9.9P1-63.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555398" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555399" version="1" comment="bind-utils is &lt;9.9.9P1-63.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555400" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555401" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555402" version="1" comment="libdcerpc0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555403" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555404" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555405" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555406" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555407" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555408" version="1" comment="libndr-standard0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555409" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555410" version="1" comment="libndr0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555411" version="1" comment="libndr0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555412" version="1" comment="libnetapi0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555413" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555414" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555415" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555416" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555417" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555418" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555419" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555420" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555421" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555422" version="1" comment="libsamba-util0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555423" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555424" version="1" comment="libsamdb0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555425" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555426" version="1" comment="libsmbclient0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555427" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555428" version="1" comment="libsmbconf0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555429" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555430" version="1" comment="libsmbldap0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555431" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555432" version="1" comment="libtevent-util0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555433" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555434" version="1" comment="libwbclient0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555435" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555436" version="1" comment="samba is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555437" version="1" comment="samba-client is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555438" version="1" comment="samba-client-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555439" version="1" comment="samba-libs is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555440" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555441" version="1" comment="samba-winbind is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555442" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555443" version="1" comment="avahi is &lt;0.6.32-32.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555444" version="1" comment="avahi-utils is &lt;0.6.32-32.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555445" version="1" comment="libavahi-client3 is &lt;0.6.32-32.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555446" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-32.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555447" version="1" comment="libavahi-common3 is &lt;0.6.32-32.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555448" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-32.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555449" version="1" comment="libavahi-core7 is &lt;0.6.32-32.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555450" version="1" comment="libavahi-glib1 is &lt;0.6.32-32.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555451" version="1" comment="libavahi-glib1-32bit is &lt;0.6.32-32.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555452" version="1" comment="libdns_sd is &lt;0.6.32-32.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555453" version="1" comment="libdns_sd-32bit is &lt;0.6.32-32.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529915" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529916" version="1" comment="python3 is &lt;3.4.10-25.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529917" version="1" comment="python3-base is &lt;3.4.10-25.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529918" version="1" comment="python3-curses is &lt;3.4.10-25.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543140" version="1" comment="python3-devel is &lt;3.4.10-25.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555454" version="1" comment="kernel-default is &lt;4.4.180-94.144.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555455" version="1" comment="kernel-default-base is &lt;4.4.180-94.144.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555456" version="1" comment="kernel-default-devel is &lt;4.4.180-94.144.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538971" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.144.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555457" version="1" comment="kernel-default-man is &lt;4.4.180-94.144.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555458" version="1" comment="kernel-syms is &lt;4.4.180-94.144.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538976" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;1-4.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555459" version="1" comment="libdjvulibre21 is &lt;3.5.25.3-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555460" version="1" comment="graphviz is &lt;2.28.0-29.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555461" version="1" comment="graphviz-gd is &lt;2.28.0-29.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555462" version="1" comment="graphviz-gnome is &lt;2.28.0-29.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555463" version="1" comment="graphviz-tcl is &lt;2.28.0-29.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555464" version="1" comment="libxml2-2 is &lt;2.9.4-46.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555465" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555466" version="1" comment="libxml2-tools is &lt;2.9.4-46.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555467" version="1" comment="python-libxml2 is &lt;2.9.4-46.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555468" version="1" comment="dnsmasq is &lt;2.78-18.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555469" version="1" comment="libFLAC++6 is &lt;1.3.0-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555470" version="1" comment="libFLAC8 is &lt;1.3.0-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552055" version="1" comment="libFLAC8-32bit is &lt;1.3.0-12.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555471" version="1" comment="dovecot22 is &lt;2.2.31-19.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555472" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555473" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555474" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555475" version="1" comment="libdjvulibre21 is &lt;3.5.25.3-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555476" version="1" comment="dhcp is &lt;4.3.3-10.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555477" version="1" comment="dhcp-client is &lt;4.3.3-10.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555478" version="1" comment="dhcp-relay is &lt;4.3.3-10.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555479" version="1" comment="dhcp-server is &lt;4.3.3-10.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555480" version="1" comment="libwebp5 is &lt;0.4.3-4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555481" version="1" comment="libwebp5-32bit is &lt;0.4.3-4.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555482" version="1" comment="libwebpdemux1 is &lt;0.4.3-4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555483" version="1" comment="libpolkit0 is &lt;0.113-5.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555484" version="1" comment="polkit is &lt;0.113-5.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555485" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538998" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;7-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538999" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;9-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539000" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;10-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539001" version="1" comment="kgraft-patch-4_4_180-94_124-default is &lt;10-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539002" version="1" comment="kgraft-patch-4_4_180-94_121-default is &lt;10-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539003" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;4-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539004" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;5-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555486" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-18.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555487" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-18.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555488" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-18.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555489" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-18.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555490" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-18.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555491" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-18.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555492" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-18.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555493" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-18.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555494" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-18.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555495" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-18.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543162" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-18.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555496" version="1" comment="MozillaFirefox is &lt;78.11.0-112.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543163" version="1" comment="MozillaFirefox-devel is &lt;78.11.0-112.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555497" version="1" comment="MozillaFirefox-translations-common is &lt;78.11.0-112.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555498" version="1" comment="libX11-6 is &lt;1.6.2-12.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555499" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555500" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555501" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555502" version="1" comment="qemu is &lt;2.9.1-6.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555503" version="1" comment="qemu-arm is &lt;2.9.1-6.50.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555504" version="1" comment="qemu-block-curl is &lt;2.9.1-6.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555505" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555506" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.50.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555507" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555508" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555509" version="1" comment="qemu-kvm is &lt;2.9.1-6.50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555510" version="1" comment="qemu-lang is &lt;2.9.1-6.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539034" version="1" comment="qemu-ppc is &lt;2.9.1-6.50.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555511" version="1" comment="qemu-s390 is &lt;2.9.1-6.50.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555512" version="1" comment="qemu-tools is &lt;2.9.1-6.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552060" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.75-38.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543165" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.75-38.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552061" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.75-38.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555513" version="1" comment="libspice-server1 is &lt;0.12.8-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555514" version="1" comment="caribou-common is &lt;0.4.21-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555515" version="1" comment="libcaribou0 is &lt;0.4.21-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555516" version="1" comment="typelib-1_0-Caribou-1_0 is &lt;0.4.21-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555517" version="1" comment="freeradius-server is &lt;3.0.15-2.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555518" version="1" comment="freeradius-server-doc is &lt;3.0.15-2.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555519" version="1" comment="freeradius-server-krb5 is &lt;3.0.15-2.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555520" version="1" comment="freeradius-server-ldap is &lt;3.0.15-2.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555521" version="1" comment="freeradius-server-libs is &lt;3.0.15-2.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555522" version="1" comment="freeradius-server-mysql is &lt;3.0.15-2.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555523" version="1" comment="freeradius-server-perl is &lt;3.0.15-2.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555524" version="1" comment="freeradius-server-postgresql is &lt;3.0.15-2.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555525" version="1" comment="freeradius-server-python is &lt;3.0.15-2.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555526" version="1" comment="freeradius-server-sqlite is &lt;3.0.15-2.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555527" version="1" comment="freeradius-server-utils is &lt;3.0.15-2.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555528" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.292-27.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555529" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.292-27.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555530" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.292-27.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555531" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.292-27.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543178" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.154.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543179" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.154.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555538" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.154.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555539" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.154.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555540" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.1-2.63.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555541" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.1-2.63.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555542" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.1-2.63.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555543" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.1-2.63.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543184" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.1-2.63.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555544" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.1-2.63.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555545" version="1" comment="apache2 is &lt;2.4.23-29.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555546" version="1" comment="apache2-example-pages is &lt;2.4.23-29.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555547" version="1" comment="apache2-prefork is &lt;2.4.23-29.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555548" version="1" comment="apache2-utils is &lt;2.4.23-29.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555549" version="1" comment="apache2-worker is &lt;2.4.23-29.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555550" version="1" comment="xterm is &lt;308-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130270"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.180-94.144-default is currently running" id="oval:org.opensuse.security:tst:2009721289" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009172054"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719626" version="1" comment="kgraft-patch-4_4_180-94_144-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539080" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539081" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;5-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539082" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;6-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539083" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;8-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539084" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;10-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539085" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;11-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539086" version="1" comment="kgraft-patch-4_4_180-94_124-default is &lt;11-2.3 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555551" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.44.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555552" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.44.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555553" version="1" comment="qemu-uefi-aarch64 is &lt;2017+git1492060560.b6d11d7c46-4.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555554" version="1" comment="libhogweed2 is &lt;2.7.1-13.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555555" version="1" comment="libhogweed2-32bit is &lt;2.7.1-13.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555556" version="1" comment="libnettle4 is &lt;2.7.1-13.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555557" version="1" comment="libnettle4-32bit is &lt;2.7.1-13.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555558" version="1" comment="libgcrypt20 is &lt;1.6.1-16.77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555559" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.77.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555560" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555561" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.77.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555562" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555563" version="1" comment="openexr is &lt;2.1.0-6.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555564" version="1" comment="libecpg6 is &lt;13.1-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555565" version="1" comment="libpq5 is &lt;13.1-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552068" version="1" comment="libpq5-32bit is &lt;13.1-3.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615944" version="1" comment="arpwatch is &lt;2.1a15-159.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543173" version="1" comment="libsolv-devel is &lt;0.6.37-2.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009560189" version="1" comment="libsolv-tools is &lt;0.6.37-2.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009560190" version="1" comment="libzypp is &lt;16.21.4-2.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543174" version="1" comment="libzypp-devel is &lt;16.21.4-2.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543176" version="1" comment="perl-solv is &lt;0.6.37-2.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009560191" version="1" comment="python-solv is &lt;0.6.37-2.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555566" version="1" comment="openssh is &lt;7.2p2-74.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555567" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555568" version="1" comment="openssh-fips is &lt;7.2p2-74.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555569" version="1" comment="openssh-helpers is &lt;7.2p2-74.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555570" version="1" comment="sudo is &lt;1.8.20p2-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625241" version="1" comment="MozillaFirefox is &lt;78.12.0-112.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625231" version="1" comment="MozillaFirefox-devel is &lt;78.12.0-112.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625242" version="1" comment="MozillaFirefox-translations-common is &lt;78.12.0-112.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555571" version="1" comment="MozillaFirefox is &lt;78.7.0-112.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543203" version="1" comment="MozillaFirefox-devel is &lt;78.7.0-112.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555572" version="1" comment="MozillaFirefox-translations-common is &lt;78.7.0-112.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626115" version="1" comment="libsystemd0 is &lt;228-150.98.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626116" version="1" comment="libsystemd0-32bit is &lt;228-150.98.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626117" version="1" comment="libudev-devel is &lt;228-150.98.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626118" version="1" comment="libudev1 is &lt;228-150.98.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626119" version="1" comment="libudev1-32bit is &lt;228-150.98.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626120" version="1" comment="systemd is &lt;228-150.98.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626121" version="1" comment="systemd-32bit is &lt;228-150.98.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626122" version="1" comment="systemd-devel is &lt;228-150.98.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626123" version="1" comment="systemd-sysvinit is &lt;228-150.98.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626124" version="1" comment="udev is &lt;228-150.98.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624821" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624820" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;6-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624819" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;7-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624818" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;9-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624817" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;11-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624816" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;12-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626125" version="1" comment="linuxptp is &lt;1.4-15.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626305" version="1" comment="kernel-default is &lt;4.4.180-94.147.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626306" version="1" comment="kernel-default-base is &lt;4.4.180-94.147.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626307" version="1" comment="kernel-default-devel is &lt;4.4.180-94.147.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625760" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.147.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625807" version="1" comment="kernel-default-man is &lt;4.4.180-94.147.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626308" version="1" comment="kernel-syms is &lt;4.4.180-94.147.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625765" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;1-4.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626533" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626532" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;7-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626531" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;8-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626530" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;10-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626529" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;12-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626528" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;13-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627024" version="1" comment="qemu is &lt;2.9.1-6.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625033" version="1" comment="qemu-arm is &lt;2.9.1-6.53.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627025" version="1" comment="qemu-block-curl is &lt;2.9.1-6.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627026" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627027" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.53.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627028" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627029" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627030" version="1" comment="qemu-kvm is &lt;2.9.1-6.53.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627031" version="1" comment="qemu-lang is &lt;2.9.1-6.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624982" version="1" comment="qemu-ppc is &lt;2.9.1-6.53.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625023" version="1" comment="qemu-s390 is &lt;2.9.1-6.53.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627032" version="1" comment="qemu-tools is &lt;2.9.1-6.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627325" version="1" comment="dbus-1 is &lt;1.8.22-29.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627326" version="1" comment="dbus-1-x11 is &lt;1.8.22-29.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627327" version="1" comment="libdbus-1-3 is &lt;1.8.22-29.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627328" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-29.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627338" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.3-2.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627339" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.3-2.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627340" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.3-2.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627341" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.3-2.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627310" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.3-2.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627342" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.3-2.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626928" version="1" comment="libsndfile1 is &lt;1.0.25-36.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626929" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627955" version="1" comment="libdjvulibre21 is &lt;3.5.25.3-5.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630641" version="1" comment="cpio is &lt;2.11-36.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630396" version="1" comment="libcares2 is &lt;1.9.1-9.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630642" version="1" comment="MozillaFirefox is &lt;78.13.0-112.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630614" version="1" comment="MozillaFirefox-devel is &lt;78.13.0-112.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630643" version="1" comment="MozillaFirefox-translations-common is &lt;78.13.0-112.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630889" version="1" comment="fetchmail is &lt;6.3.26-13.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630890" version="1" comment="fetchmailconf is &lt;6.3.26-13.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631322" version="1" comment="cpio is &lt;2.11-36.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627227" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.302-27.63.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627228" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.302-27.63.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627229" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.302-27.63.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627230" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.302-27.63.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631545" version="1" comment="cpio is &lt;2.11-36.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628217" version="1" comment="python-PyYAML is &lt;5.3.1-28.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628218" version="1" comment="python3-PyYAML is &lt;5.3.1-28.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631700" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.69.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631701" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.69.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631702" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.69.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631703" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.69.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631704" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.69.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631705" version="1" comment="openssl is &lt;1.0.2j-60.69.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631584" version="1" comment="unrar is &lt;5.6.1-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555573" version="1" comment="openvswitch is &lt;2.7.12-3.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630749" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;14-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630750" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;13-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630751" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;11-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630752" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;9-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630753" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;8-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630754" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.180-94.147-default is currently running" id="oval:org.opensuse.security:tst:2009721290" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009172055"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719628" version="1" comment="kgraft-patch-4_4_180-94_147-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630755" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627825" version="1" comment="aspell is &lt;0.60.6.1-18.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627826" version="1" comment="aspell-ispell is &lt;0.60.6.1-18.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627827" version="1" comment="libaspell15 is &lt;0.60.6.1-18.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627828" version="1" comment="libaspell15-32bit is &lt;0.60.6.1-18.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632080" version="1" comment="bind is &lt;9.9.9P1-63.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632081" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632082" version="1" comment="bind-libs is &lt;9.9.9P1-63.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632083" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632084" version="1" comment="bind-utils is &lt;9.9.9P1-63.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627964" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627965" version="1" comment="openexr is &lt;2.1.0-6.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628216" version="1" comment="libesmtp is &lt;1.0.6-17.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628166" version="1" comment="file is &lt;5.22-10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628167" version="1" comment="file-magic is &lt;5.22-10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628168" version="1" comment="libmagic1 is &lt;5.22-10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628169" version="1" comment="libmagic1-32bit is &lt;5.22-10.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633072" version="1" comment="libfreebl3 is &lt;3.68-58.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633073" version="1" comment="libfreebl3-32bit is &lt;3.68-58.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633074" version="1" comment="libfreebl3-hmac is &lt;3.68-58.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633075" version="1" comment="libfreebl3-hmac-32bit is &lt;3.68-58.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633076" version="1" comment="libsoftokn3 is &lt;3.68-58.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633077" version="1" comment="libsoftokn3-32bit is &lt;3.68-58.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633078" version="1" comment="libsoftokn3-hmac is &lt;3.68-58.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633079" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.68-58.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633080" version="1" comment="mozilla-nspr is &lt;4.32-19.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633081" version="1" comment="mozilla-nspr-32bit is &lt;4.32-19.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633082" version="1" comment="mozilla-nspr-devel is &lt;4.32-19.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633083" version="1" comment="mozilla-nss is &lt;3.68-58.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633084" version="1" comment="mozilla-nss-32bit is &lt;3.68-58.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633085" version="1" comment="mozilla-nss-certs is &lt;3.68-58.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633086" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68-58.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633087" version="1" comment="mozilla-nss-devel is &lt;3.68-58.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633088" version="1" comment="mozilla-nss-sysinit is &lt;3.68-58.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633089" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.68-58.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633090" version="1" comment="mozilla-nss-tools is &lt;3.68-58.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631279" version="1" comment="transfig is &lt;3.2.8a-2.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628160" version="1" comment="libgtk-vnc-1_0-0 is &lt;0.6.0-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628161" version="1" comment="libgtk-vnc-2_0-0 is &lt;0.6.0-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628162" version="1" comment="libgvnc-1_0-0 is &lt;0.6.0-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628163" version="1" comment="python-gtk-vnc is &lt;0.6.0-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628164" version="1" comment="typelib-1_0-GVnc-1_0 is &lt;0.6.0-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628165" version="1" comment="typelib-1_0-GtkVnc-2_0 is &lt;0.6.0-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633625" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.72.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633626" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.72.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633627" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.72.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633628" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.72.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633629" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.72.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633630" version="1" comment="openssl is &lt;1.0.2j-60.72.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632795" version="1" comment="ghostscript is &lt;9.52-23.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632778" version="1" comment="ghostscript-devel is &lt;9.52-23.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632796" version="1" comment="ghostscript-x11 is &lt;9.52-23.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632779" version="1" comment="libspectre-devel is &lt;0.2.7-12.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632797" version="1" comment="libspectre1 is &lt;0.2.7-12.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633643" version="1" comment="MozillaFirefox is &lt;91.1.0-112.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633644" version="1" comment="MozillaFirefox-branding-SLE is &lt;91-35.6.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633607" version="1" comment="MozillaFirefox-devel is &lt;91.1.0-112.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633645" version="1" comment="MozillaFirefox-translations-common is &lt;91.1.0-112.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633390" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;12-2.3 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632887" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;3-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632886" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;6-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632885" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;9-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632884" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;10-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552079" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.20-30.78.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543206" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.20-30.78.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632883" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;14-2.3 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633647" version="1" comment="libsqlite3-0 is &lt;3.36.0-9.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633648" version="1" comment="libsqlite3-0-32bit is &lt;3.36.0-9.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633649" version="1" comment="sqlite3 is &lt;3.36.0-9.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633609" version="1" comment="sqlite3-devel is &lt;3.36.0-9.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651259" version="1" comment="glibc is &lt;2.22-116.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651260" version="1" comment="glibc-32bit is &lt;2.22-116.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651261" version="1" comment="glibc-devel is &lt;2.22-116.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651262" version="1" comment="glibc-devel-32bit is &lt;2.22-116.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651263" version="1" comment="glibc-locale is &lt;2.22-116.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651264" version="1" comment="glibc-locale-32bit is &lt;2.22-116.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651265" version="1" comment="glibc-profile is &lt;2.22-116.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651266" version="1" comment="glibc-profile-32bit is &lt;2.22-116.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651267" version="1" comment="nscd is &lt;2.22-116.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634406" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.4-2.71.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634407" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.4-2.71.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634408" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.4-2.71.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634409" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.4-2.71.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634370" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.4-2.71.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634410" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.4-2.71.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633928" version="1" comment="apache2 is &lt;2.4.23-29.80.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633929" version="1" comment="apache2-example-pages is &lt;2.4.23-29.80.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633930" version="1" comment="apache2-prefork is &lt;2.4.23-29.80.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633931" version="1" comment="apache2-utils is &lt;2.4.23-29.80.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633932" version="1" comment="apache2-worker is &lt;2.4.23-29.80.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529919" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.63.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529920" version="1" comment="python3 is &lt;3.4.10-25.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529921" version="1" comment="python3-base is &lt;3.4.10-25.63.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009529922" version="1" comment="python3-curses is &lt;3.4.10-25.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543208" version="1" comment="python3-devel is &lt;3.4.10-25.63.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651917" version="1" comment="MozillaFirefox is &lt;91.2.0-112.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651859" version="1" comment="MozillaFirefox-devel is &lt;91.2.0-112.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651918" version="1" comment="MozillaFirefox-translations-common is &lt;91.2.0-112.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651505" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651506" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651572" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;13-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651573" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;11-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651574" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;10-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652809" version="1" comment="libblkid1 is &lt;2.29.2-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652810" version="1" comment="libblkid1-32bit is &lt;2.29.2-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652811" version="1" comment="libfdisk1 is &lt;2.29.2-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652812" version="1" comment="libmount1 is &lt;2.29.2-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652813" version="1" comment="libmount1-32bit is &lt;2.29.2-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652814" version="1" comment="libsmartcols1 is &lt;2.29.2-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652815" version="1" comment="libuuid1 is &lt;2.29.2-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652816" version="1" comment="libuuid1-32bit is &lt;2.29.2-3.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652817" version="1" comment="python-libmount is &lt;2.29.2-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652818" version="1" comment="util-linux is &lt;2.29.2-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652819" version="1" comment="util-linux-systemd is &lt;2.29.2-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652820" version="1" comment="uuidd is &lt;2.29.2-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652821" version="1" comment="strongswan is &lt;5.1.3-26.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652822" version="1" comment="strongswan-hmac is &lt;5.1.3-26.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652823" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652824" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652182" version="1" comment="postgresql10 is &lt;10.18-4.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652183" version="1" comment="postgresql10-contrib is &lt;10.18-4.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652184" version="1" comment="postgresql10-plperl is &lt;10.18-4.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652185" version="1" comment="postgresql10-plpython is &lt;10.18-4.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652186" version="1" comment="postgresql10-pltcl is &lt;10.18-4.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652187" version="1" comment="postgresql10-server is &lt;10.18-4.19.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653631" version="1" comment="opensc is &lt;0.13.0-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653558" version="1" comment="transfig is &lt;3.2.8b-2.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653555" version="1" comment="binutils is &lt;2.37-9.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653536" version="1" comment="binutils-devel is &lt;2.37-9.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653556" version="1" comment="libctf-nobfd0 is &lt;2.37-9.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653557" version="1" comment="libctf0 is &lt;2.37-9.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654418" version="1" comment="binutils is &lt;2.37-9.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654410" version="1" comment="binutils-devel is &lt;2.37-9.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654419" version="1" comment="libctf-nobfd0 is &lt;2.37-9.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654420" version="1" comment="libctf0 is &lt;2.37-9.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653063" version="1" comment="libpcre1 is &lt;8.45-8.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653064" version="1" comment="libpcre1-32bit is &lt;8.45-8.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653065" version="1" comment="libpcre16-0 is &lt;8.45-8.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653033" version="1" comment="libpcrecpp0 is &lt;8.45-8.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653034" version="1" comment="libpcreposix0 is &lt;8.45-8.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653035" version="1" comment="pcre-devel is &lt;8.45-8.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655250" version="1" comment="qemu is &lt;2.9.1-43.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653201" version="1" comment="qemu-arm is &lt;2.9.1-43.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655251" version="1" comment="qemu-block-curl is &lt;2.9.1-43.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655252" version="1" comment="qemu-block-iscsi is &lt;2.9.1-43.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655253" version="1" comment="qemu-block-rbd is &lt;2.9.1-43.62.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655254" version="1" comment="qemu-block-ssh is &lt;2.9.1-43.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655255" version="1" comment="qemu-guest-agent is &lt;2.9.1-43.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655256" version="1" comment="qemu-kvm is &lt;2.9.1-43.62.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655257" version="1" comment="qemu-lang is &lt;2.9.1-43.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653162" version="1" comment="qemu-ppc is &lt;2.9.1-43.62.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653189" version="1" comment="qemu-s390 is &lt;2.9.1-43.62.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655258" version="1" comment="qemu-tools is &lt;2.9.1-43.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655741" version="1" comment="MozillaFirefox is &lt;91.3.0-112.80.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655636" version="1" comment="MozillaFirefox-devel is &lt;91.3.0-112.80.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655742" version="1" comment="MozillaFirefox-translations-common is &lt;91.3.0-112.80.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657052" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657053" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657054" version="1" comment="libdcerpc0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657055" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657056" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657057" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657058" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657059" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657060" version="1" comment="libndr-standard0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657061" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657062" version="1" comment="libndr0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657063" version="1" comment="libndr0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657064" version="1" comment="libnetapi0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657065" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657066" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657067" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657068" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657069" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657070" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657071" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657072" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657073" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657074" version="1" comment="libsamba-util0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657075" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657076" version="1" comment="libsamdb0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657077" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657078" version="1" comment="libsmbclient0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657079" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657080" version="1" comment="libsmbconf0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657081" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657082" version="1" comment="libsmbldap0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657083" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657084" version="1" comment="libtevent-util0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657085" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657086" version="1" comment="libwbclient0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657087" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657088" version="1" comment="samba is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657089" version="1" comment="samba-client is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657090" version="1" comment="samba-client-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657091" version="1" comment="samba-libs is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657092" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657093" version="1" comment="samba-winbind is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657094" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656539" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;14-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656540" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;12-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656541" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;11-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656542" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;8-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656543" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;5-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656250" version="1" comment="libecpg6 is &lt;14.1-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656251" version="1" comment="libpq5 is &lt;14.1-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656252" version="1" comment="libpq5-32bit is &lt;14.1-3.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657352" version="1" comment="postgresql96 is &lt;9.6.24-6.18.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657353" version="1" comment="postgresql96-contrib is &lt;9.6.24-6.18.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657354" version="1" comment="postgresql96-plperl is &lt;9.6.24-6.18.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657355" version="1" comment="postgresql96-plpython is &lt;9.6.24-6.18.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657356" version="1" comment="postgresql96-pltcl is &lt;9.6.24-6.18.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657357" version="1" comment="postgresql96-server is &lt;9.6.24-6.18.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656572" version="1" comment="postgresql10 is &lt;10.19-4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656573" version="1" comment="postgresql10-contrib is &lt;10.19-4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656574" version="1" comment="postgresql10-plperl is &lt;10.19-4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656575" version="1" comment="postgresql10-plpython is &lt;10.19-4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656576" version="1" comment="postgresql10-pltcl is &lt;10.19-4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656577" version="1" comment="postgresql10-server is &lt;10.19-4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657376" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.4-2.74.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657377" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.4-2.74.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657378" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.4-2.74.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657379" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.4-2.74.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657337" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.4-2.74.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657380" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.4-2.74.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657126" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.312-27.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657127" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.312-27.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657128" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.312-27.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657129" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.312-27.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656912" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.321-43.53.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656913" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.321-43.53.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656914" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.321-43.53.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656915" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.321-43.53.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657572" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-19.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657573" version="1" comment="ruby2.1 is &lt;2.1.9-19.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657574" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-19.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658828" version="1" comment="clamav is &lt;0.103.4-33.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658232" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.1-2.77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658233" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.1-2.77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658234" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.1-2.77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658235" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.1-2.77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658203" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.1-2.77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658236" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.1-2.77.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659112" version="1" comment="kernel-default is &lt;4.4.180-94.150.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659113" version="1" comment="kernel-default-base is &lt;4.4.180-94.150.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659114" version="1" comment="kernel-default-devel is &lt;4.4.180-94.150.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657857" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.150.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657873" version="1" comment="kernel-default-man is &lt;4.4.180-94.150.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659115" version="1" comment="kernel-syms is &lt;4.4.180-94.150.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657862" version="1" comment="kgraft-patch-4_4_180-94_150-default is &lt;1-4.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659116" version="1" comment="libfreebl3 is &lt;3.68.1-58.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659117" version="1" comment="libfreebl3-32bit is &lt;3.68.1-58.57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659118" version="1" comment="libfreebl3-hmac is &lt;3.68.1-58.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659119" version="1" comment="libfreebl3-hmac-32bit is &lt;3.68.1-58.57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659120" version="1" comment="libsoftokn3 is &lt;3.68.1-58.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659121" version="1" comment="libsoftokn3-32bit is &lt;3.68.1-58.57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659122" version="1" comment="libsoftokn3-hmac is &lt;3.68.1-58.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659123" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.68.1-58.57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659124" version="1" comment="mozilla-nss is &lt;3.68.1-58.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659125" version="1" comment="mozilla-nss-32bit is &lt;3.68.1-58.57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659126" version="1" comment="mozilla-nss-certs is &lt;3.68.1-58.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659127" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.1-58.57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659101" version="1" comment="mozilla-nss-devel is &lt;3.68.1-58.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659128" version="1" comment="mozilla-nss-sysinit is &lt;3.68.1-58.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659129" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.68.1-58.57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659130" version="1" comment="mozilla-nss-tools is &lt;3.68.1-58.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659131" version="1" comment="openssh is &lt;7.2p2-74.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659132" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659133" version="1" comment="openssh-fips is &lt;7.2p2-74.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659134" version="1" comment="openssh-helpers is &lt;7.2p2-74.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659453" version="1" comment="MozillaFirefox is &lt;91.4.0-112.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659443" version="1" comment="MozillaFirefox-devel is &lt;91.4.0-112.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659454" version="1" comment="MozillaFirefox-translations-common is &lt;91.4.0-112.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659155" version="1" comment="glib-networking is &lt;2.48.2-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539103" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539104" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.180-94.150-default is currently running" id="oval:org.opensuse.security:tst:2009721291" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009172056"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719630" version="1" comment="kgraft-patch-4_4_180-94_150-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659442" version="1" comment="kgraft-patch-4_4_180-94_150-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659441" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659440" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;9-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659439" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;12-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659438" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;13-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539105" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659891" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659892" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539106" version="1" comment="kgraft-patch-4_4_180-94_124-default is &lt;6-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539107" version="1" comment="kgraft-patch-4_4_180-94_121-default is &lt;6-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539108" version="1" comment="kgraft-patch-4_4_180-94_116-default is &lt;7-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660800" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660801" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660877" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660878" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660879" version="1" comment="libdcerpc0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660880" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660881" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660882" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660883" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660884" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660885" version="1" comment="libndr-standard0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660886" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660887" version="1" comment="libndr0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660888" version="1" comment="libndr0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660889" version="1" comment="libnetapi0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660890" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660891" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660892" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660893" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660894" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660895" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660896" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660897" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660898" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660899" version="1" comment="libsamba-util0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660900" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660901" version="1" comment="libsamdb0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660902" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660903" version="1" comment="libsmbclient0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660904" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660905" version="1" comment="libsmbconf0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660906" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660907" version="1" comment="libsmbldap0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660908" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660909" version="1" comment="libtevent-util0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660910" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660911" version="1" comment="libwbclient0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660912" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660913" version="1" comment="samba is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660914" version="1" comment="samba-client is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660915" version="1" comment="samba-client-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660916" version="1" comment="samba-libs is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660917" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660918" version="1" comment="samba-winbind is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660919" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660013" version="1" comment="chrony is &lt;4.1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555574" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552086" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555575" version="1" comment="python is &lt;2.7.17-28.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552088" version="1" comment="python-32bit is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555576" version="1" comment="python-base is &lt;2.7.17-28.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552090" version="1" comment="python-base-32bit is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555577" version="1" comment="python-curses is &lt;2.7.17-28.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555578" version="1" comment="python-demo is &lt;2.7.17-28.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555579" version="1" comment="python-devel is &lt;2.7.17-28.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555580" version="1" comment="python-gdbm is &lt;2.7.17-28.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555581" version="1" comment="python-idle is &lt;2.7.17-28.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555582" version="1" comment="python-tk is &lt;2.7.17-28.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555583" version="1" comment="python-xml is &lt;2.7.17-28.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555584" version="1" comment="openvswitch is &lt;2.7.12-3.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555585" version="1" comment="kernel-default is &lt;4.4.180-94.138.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555586" version="1" comment="kernel-default-base is &lt;4.4.180-94.138.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555587" version="1" comment="kernel-default-devel is &lt;4.4.180-94.138.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539113" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.138.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555588" version="1" comment="kernel-default-man is &lt;4.4.180-94.138.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555589" version="1" comment="kernel-syms is &lt;4.4.180-94.138.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539118" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;1-4.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555590" version="1" comment="wpa_supplicant is &lt;2.6-15.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555591" version="1" comment="libjasper1 is &lt;1.900.14-195.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552107" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555592" version="1" comment="screen is &lt;4.0.4-23.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555593" version="1" comment="bind is &lt;9.9.9P1-63.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555594" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555595" version="1" comment="bind-libs is &lt;9.9.9P1-63.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552112" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555596" version="1" comment="bind-utils is &lt;9.9.9P1-63.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552114" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.80-38.62.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543223" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.80-38.62.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552115" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.80-38.62.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555597" version="1" comment="krb5-appl-clients is &lt;1.0.3-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555598" version="1" comment="krb5-appl-servers is &lt;1.0.3-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555599" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.282-27.56.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555600" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.282-27.56.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555601" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.282-27.56.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555602" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.282-27.56.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552122" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.25-30.81.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543254" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.25-30.81.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555603" version="1" comment="MozillaFirefox is &lt;78.8.0-112.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543255" version="1" comment="MozillaFirefox-devel is &lt;78.8.0-112.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555604" version="1" comment="MozillaFirefox-translations-common is &lt;78.8.0-112.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555605" version="1" comment="python-cryptography is &lt;2.1.4-7.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555606" version="1" comment="python3-cryptography is &lt;2.1.4-7.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555607" version="1" comment="grub2 is &lt;2.02-4.69.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555608" version="1" comment="grub2-arm64-efi is &lt;2.02-4.69.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539121" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02-4.69.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555609" version="1" comment="grub2-s390x-emu is &lt;2.02-4.69.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555610" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552131" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.83.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555611" version="1" comment="openldap2 is &lt;2.4.41-18.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555612" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555613" version="1" comment="openldap2-client is &lt;2.4.41-18.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555614" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555615" version="1" comment="kernel-default is &lt;4.4.180-94.141.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555616" version="1" comment="kernel-default-base is &lt;4.4.180-94.141.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555617" version="1" comment="kernel-default-devel is &lt;4.4.180-94.141.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539129" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.141.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555618" version="1" comment="kernel-default-man is &lt;4.4.180-94.141.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555619" version="1" comment="kernel-syms is &lt;4.4.180-94.141.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539134" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;1-4.3.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555620" version="1" comment="wpa_supplicant is &lt;2.6-15.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543265" version="1" comment="git is &lt;2.26.2-27.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543267" version="1" comment="git-core is &lt;2.26.2-27.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543268" version="1" comment="git-cvs is &lt;2.26.2-27.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543269" version="1" comment="git-daemon is &lt;2.26.2-27.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543270" version="1" comment="git-email is &lt;2.26.2-27.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543271" version="1" comment="git-gui is &lt;2.26.2-27.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543272" version="1" comment="git-svn is &lt;2.26.2-27.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543273" version="1" comment="git-web is &lt;2.26.2-27.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543274" version="1" comment="gitk is &lt;2.26.2-27.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555621" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-28.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552152" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555622" version="1" comment="python is &lt;2.7.18-28.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552154" version="1" comment="python-32bit is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555623" version="1" comment="python-base is &lt;2.7.18-28.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552156" version="1" comment="python-base-32bit is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555624" version="1" comment="python-curses is &lt;2.7.18-28.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555625" version="1" comment="python-demo is &lt;2.7.18-28.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555626" version="1" comment="python-devel is &lt;2.7.18-28.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555627" version="1" comment="python-gdbm is &lt;2.7.18-28.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555628" version="1" comment="python-idle is &lt;2.7.18-28.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555629" version="1" comment="python-tk is &lt;2.7.18-28.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555630" version="1" comment="python-xml is &lt;2.7.18-28.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555631" version="1" comment="MozillaFirefox is &lt;78.6.1-112.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543276" version="1" comment="MozillaFirefox-devel is &lt;78.6.1-112.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555632" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.1-112.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555633" version="1" comment="glib2-tools is &lt;2.48.2-12.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555634" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552169" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555635" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552171" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555636" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552173" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555637" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552175" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555638" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552177" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539135" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;2-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539136" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;4-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539137" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;6-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539138" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;7-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539139" version="1" comment="kgraft-patch-4_4_180-94_124-default is &lt;7-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539140" version="1" comment="kgraft-patch-4_4_180-94_121-default is &lt;7-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539141" version="1" comment="kgraft-patch-4_4_180-94_116-default is &lt;8-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555639" version="1" comment="libwavpack1 is &lt;4.60.99-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555640" version="1" comment="libnghttp2-14 is &lt;1.39.2-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555641" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555642" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552183" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555643" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552185" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555644" version="1" comment="openssl is &lt;1.0.2j-60.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555645" version="1" comment="MozillaFirefox is &lt;78.9.0-112.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543290" version="1" comment="MozillaFirefox-devel is &lt;78.9.0-112.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555646" version="1" comment="MozillaFirefox-translations-common is &lt;78.9.0-112.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676963" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;13-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676964" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;10-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676965" version="1" comment="kgraft-patch-4_4_180-94_150-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.180-94.156-default is currently running" id="oval:org.opensuse.security:tst:2009721292" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009172057"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719632" version="1" comment="kgraft-patch-4_4_180-94_156-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676967" version="1" comment="kgraft-patch-4_4_180-94_156-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676883" version="1" comment="openvpn is &lt;2.3.8-16.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676884" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674084" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr5.5-38.68.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674025" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr5.5-38.68.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674085" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr5.5-38.68.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674083" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.5-30.87.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674024" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.5-30.87.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158440"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.180-94.153-default is currently running" id="oval:org.opensuse.security:tst:2009721293" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009172058"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719634" version="1" comment="kgraft-patch-4_4_180-94_153-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676966" version="1" comment="kgraft-patch-4_4_180-94_153-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677636" version="1" comment="libz1 is &lt;1.2.8-12.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677637" version="1" comment="libz1-32bit is &lt;1.2.8-12.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677638" version="1" comment="zlib-devel is &lt;1.2.8-12.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662516" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.0-30.84.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662497" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.0-30.84.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678355" version="1" comment="libfreebl3 is &lt;3.68.3-58.69.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678356" version="1" comment="libfreebl3-32bit is &lt;3.68.3-58.69.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678357" version="1" comment="libfreebl3-hmac is &lt;3.68.3-58.69.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678358" version="1" comment="libfreebl3-hmac-32bit is &lt;3.68.3-58.69.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678359" version="1" comment="libsoftokn3 is &lt;3.68.3-58.69.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678360" version="1" comment="libsoftokn3-32bit is &lt;3.68.3-58.69.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678361" version="1" comment="libsoftokn3-hmac is &lt;3.68.3-58.69.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678362" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.68.3-58.69.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678363" version="1" comment="mozilla-nss is &lt;3.68.3-58.69.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678364" version="1" comment="mozilla-nss-32bit is &lt;3.68.3-58.69.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678365" version="1" comment="mozilla-nss-certs is &lt;3.68.3-58.69.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678366" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.3-58.69.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678284" version="1" comment="mozilla-nss-devel is &lt;3.68.3-58.69.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678367" version="1" comment="mozilla-nss-sysinit is &lt;3.68.3-58.69.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678368" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.68.3-58.69.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678369" version="1" comment="mozilla-nss-tools is &lt;3.68.3-58.69.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678503" version="1" comment="MozillaFirefox is &lt;91.8.0-112.98.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678504" version="1" comment="MozillaFirefox-devel is &lt;91.8.0-112.98.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678505" version="1" comment="MozillaFirefox-translations-common is &lt;91.8.0-112.98.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678616" version="1" comment="glibc is &lt;2.22-123.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678617" version="1" comment="glibc-32bit is &lt;2.22-123.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678618" version="1" comment="glibc-devel is &lt;2.22-123.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678619" version="1" comment="glibc-devel-32bit is &lt;2.22-123.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678620" version="1" comment="glibc-locale is &lt;2.22-123.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678621" version="1" comment="glibc-locale-32bit is &lt;2.22-123.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678622" version="1" comment="glibc-profile is &lt;2.22-123.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678623" version="1" comment="glibc-profile-32bit is &lt;2.22-123.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678624" version="1" comment="nscd is &lt;2.22-123.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677950" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663810" version="1" comment="MozillaFirefox is &lt;91.5.0-112.86.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663796" version="1" comment="MozillaFirefox-devel is &lt;91.5.0-112.86.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663811" version="1" comment="MozillaFirefox-translations-common is &lt;91.5.0-112.86.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679311" version="1" comment="liblzma5 is &lt;5.0.5-6.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679312" version="1" comment="liblzma5-32bit is &lt;5.0.5-6.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679313" version="1" comment="xz is &lt;5.0.5-6.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677725" version="1" comment="libexif12 is &lt;0.6.22-8.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677726" version="1" comment="libexif12-32bit is &lt;0.6.22-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680620" version="1" comment="kernel-default is &lt;4.4.180-94.161.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680621" version="1" comment="kernel-default-base is &lt;4.4.180-94.161.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680622" version="1" comment="kernel-default-devel is &lt;4.4.180-94.161.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679284" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.161.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679317" version="1" comment="kernel-default-man is &lt;4.4.180-94.161.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680623" version="1" comment="kernel-syms is &lt;4.4.180-94.161.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679289" version="1" comment="kgraft-patch-4_4_180-94_161-default is &lt;1-4.5.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680624" version="1" comment="gzip is &lt;1.6-9.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679563" version="1" comment="dnsmasq is &lt;2.78-18.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679544" version="1" comment="javapackages-filesystem is &lt;5.3.1-14.7.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679528" version="1" comment="tomcat is &lt;8.0.53-29.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679529" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679530" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679531" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679532" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679533" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679534" version="1" comment="tomcat-lib is &lt;8.0.53-29.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679535" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679536" version="1" comment="tomcat-webapps is &lt;8.0.53-29.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679994" version="1" comment="git is &lt;2.26.2-27.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679996" version="1" comment="git-core is &lt;2.26.2-27.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679997" version="1" comment="git-cvs is &lt;2.26.2-27.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679998" version="1" comment="git-daemon is &lt;2.26.2-27.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680000" version="1" comment="git-email is &lt;2.26.2-27.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680001" version="1" comment="git-gui is &lt;2.26.2-27.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680002" version="1" comment="git-svn is &lt;2.26.2-27.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680003" version="1" comment="git-web is &lt;2.26.2-27.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680004" version="1" comment="gitk is &lt;2.26.2-27.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680090" version="1" comment="libxml2-2 is &lt;2.9.4-46.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680091" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680092" version="1" comment="libxml2-tools is &lt;2.9.4-46.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680093" version="1" comment="python-libxml2 is &lt;2.9.4-46.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679561" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-15.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679562" version="1" comment="libSDL-1_2-0-32bit is &lt;1.2.15-15.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664005" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.3-2.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664006" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.3-2.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664007" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.3-2.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664008" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.3-2.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663978" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.3-2.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664009" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.3-2.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681236" version="1" comment="cifs-utils is &lt;6.9-9.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680590" version="1" comment="kgraft-patch-4_4_180-94_156-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680589" version="1" comment="kgraft-patch-4_4_180-94_153-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680588" version="1" comment="kgraft-patch-4_4_180-94_150-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680587" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;11-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680586" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;14-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664240" version="1" comment="aide is &lt;0.16-20.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682646" version="1" comment="MozillaFirefox is &lt;91.9.0-112.104.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682632" version="1" comment="MozillaFirefox-devel is &lt;91.9.0-112.104.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682647" version="1" comment="MozillaFirefox-translations-common is &lt;91.9.0-112.104.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664010" version="1" comment="zsh is &lt;5.0.5-6.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696423" version="1" comment="bind is &lt;9.9.9P1-63.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696424" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696425" version="1" comment="bind-libs is &lt;9.9.9P1-63.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696426" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696427" version="1" comment="bind-utils is &lt;9.9.9P1-63.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682627" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;15-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682628" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;12-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682629" version="1" comment="kgraft-patch-4_4_180-94_150-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.180-94.161-default is currently running" id="oval:org.opensuse.security:tst:2009721294" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009172059"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719636" version="1" comment="kgraft-patch-4_4_180-94_161-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682630" version="1" comment="kgraft-patch-4_4_180-94_161-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683230" version="1" comment="e2fsprogs is &lt;1.42.11-16.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683231" version="1" comment="libcom_err2 is &lt;1.42.11-16.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683232" version="1" comment="libcom_err2-32bit is &lt;1.42.11-16.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683233" version="1" comment="libext2fs2 is &lt;1.42.11-16.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662514" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr5.0-38.65.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662496" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr5.0-38.65.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662515" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr5.0-38.65.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683701" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.89.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683702" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.89.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683703" version="1" comment="openldap2 is &lt;2.4.41-18.89.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683704" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.89.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683705" version="1" comment="openldap2-client is &lt;2.4.41-18.89.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683706" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.89.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683707" version="1" comment="gzip is &lt;1.6-9.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681335" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.36.0-2.96.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681336" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.36.0-2.96.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681337" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.36.0-2.96.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681338" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.36.0-2.96.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681314" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.36.0-2.96.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681339" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.36.0-2.96.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684086" version="1" comment="curl is &lt;7.37.0-37.76.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684087" version="1" comment="libcurl4 is &lt;7.37.0-37.76.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684088" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.76.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684100" version="1" comment="MozillaFirefox is &lt;91.9.0-112.108.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684080" version="1" comment="MozillaFirefox-devel is &lt;91.9.0-112.108.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684101" version="1" comment="MozillaFirefox-translations-common is &lt;91.9.0-112.108.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664115" version="1" comment="expat is &lt;2.1.0-21.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664116" version="1" comment="libexpat1 is &lt;2.1.0-21.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664117" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696428" version="1" comment="postgresql10 is &lt;10.21-4.28.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696429" version="1" comment="postgresql10-contrib is &lt;10.21-4.28.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696430" version="1" comment="postgresql10-plperl is &lt;10.21-4.28.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696431" version="1" comment="postgresql10-plpython is &lt;10.21-4.28.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696432" version="1" comment="postgresql10-pltcl is &lt;10.21-4.28.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696433" version="1" comment="postgresql10-server is &lt;10.21-4.28.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696434" version="1" comment="MozillaFirefox is &lt;91.9.1-112.111.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696275" version="1" comment="MozillaFirefox-devel is &lt;91.9.1-112.111.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696435" version="1" comment="MozillaFirefox-translations-common is &lt;91.9.1-112.111.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696436" version="1" comment="libxml2-2 is &lt;2.9.4-46.54.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696437" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.54.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696438" version="1" comment="libxml2-tools is &lt;2.9.4-46.54.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696439" version="1" comment="python-libxml2 is &lt;2.9.4-46.54.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696440" version="1" comment="libpcre2-16-0 is &lt;10.34-1.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696441" version="1" comment="libpcre2-32-0 is &lt;10.34-1.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696442" version="1" comment="libpcre2-8-0 is &lt;10.34-1.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696443" version="1" comment="libpcre2-posix2 is &lt;10.34-1.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696444" version="1" comment="wpa_supplicant is &lt;2.9-15.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696445" version="1" comment="libecpg6 is &lt;14.3-3.9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696446" version="1" comment="libpq5 is &lt;14.3-3.9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696447" version="1" comment="libpq5-32bit is &lt;14.3-3.9.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696288" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.172.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696289" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.172.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696448" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.172.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696449" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.172.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696450" version="1" comment="mailman is &lt;2.1.17-3.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664694" version="1" comment="libpolkit0 is &lt;0.113-5.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664695" version="1" comment="polkit is &lt;0.113-5.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664696" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696451" version="1" comment="librelp0 is &lt;1.2.15-3.6.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696452" version="1" comment="MozillaFirefox is &lt;91.10.0-112.114.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696299" version="1" comment="MozillaFirefox-devel is &lt;91.10.0-112.114.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696453" version="1" comment="MozillaFirefox-translations-common is &lt;91.10.0-112.114.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696094" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;13-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696095" version="1" comment="kgraft-patch-4_4_180-94_150-default is &lt;9-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696096" version="1" comment="kgraft-patch-4_4_180-94_153-default is &lt;5-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696097" version="1" comment="kgraft-patch-4_4_180-94_156-default is &lt;4-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696098" version="1" comment="kgraft-patch-4_4_180-94_161-default is &lt;3-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664937" version="1" comment="strongswan is &lt;5.1.3-26.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664938" version="1" comment="strongswan-hmac is &lt;5.1.3-26.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664939" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664940" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696454" version="1" comment="libfreebl3 is &lt;3.68.4-58.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696455" version="1" comment="libfreebl3-32bit is &lt;3.68.4-58.72.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696456" version="1" comment="libfreebl3-hmac is &lt;3.68.4-58.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696457" version="1" comment="libfreebl3-hmac-32bit is &lt;3.68.4-58.72.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696458" version="1" comment="libsoftokn3 is &lt;3.68.4-58.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696459" version="1" comment="libsoftokn3-32bit is &lt;3.68.4-58.72.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696460" version="1" comment="libsoftokn3-hmac is &lt;3.68.4-58.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696461" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.68.4-58.72.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696462" version="1" comment="mozilla-nss is &lt;3.68.4-58.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696463" version="1" comment="mozilla-nss-32bit is &lt;3.68.4-58.72.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696464" version="1" comment="mozilla-nss-certs is &lt;3.68.4-58.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696465" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.4-58.72.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696300" version="1" comment="mozilla-nss-devel is &lt;3.68.4-58.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696466" version="1" comment="mozilla-nss-sysinit is &lt;3.68.4-58.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696467" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.68.4-58.72.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696468" version="1" comment="mozilla-nss-tools is &lt;3.68.4-58.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696469" version="1" comment="grub2 is &lt;2.02-137.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696470" version="1" comment="grub2-arm64-efi is &lt;2.02-137.2 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696117" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02-137.2 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696471" version="1" comment="grub2-s390x-emu is &lt;2.02-137.2 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696472" version="1" comment="u-boot-rpi3 is &lt;2016.07-12.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696473" version="1" comment="u-boot-tools is &lt;2016.07-12.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696474" version="1" comment="kernel-default is &lt;4.4.180-94.164.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696475" version="1" comment="kernel-default-base is &lt;4.4.180-94.164.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696476" version="1" comment="kernel-default-devel is &lt;4.4.180-94.164.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696125" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.164.3 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696477" version="1" comment="kernel-default-man is &lt;4.4.180-94.164.3 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696478" version="1" comment="kernel-syms is &lt;4.4.180-94.164.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696130" version="1" comment="kgraft-patch-4_4_180-94_164-default is &lt;1-4.3.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696479" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.36.3-2.99.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696480" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.36.3-2.99.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696481" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.36.3-2.99.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696482" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.36.3-2.99.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696302" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.36.3-2.99.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696483" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.36.3-2.99.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696484" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.80.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696485" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.80.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696486" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.80.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696487" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.80.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696488" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.80.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696489" version="1" comment="openssl is &lt;1.0.2j-60.80.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696490" version="1" comment="apache2 is &lt;2.4.23-29.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696491" version="1" comment="apache2-example-pages is &lt;2.4.23-29.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696492" version="1" comment="apache2-prefork is &lt;2.4.23-29.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696493" version="1" comment="apache2-utils is &lt;2.4.23-29.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696494" version="1" comment="apache2-worker is &lt;2.4.23-29.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696495" version="1" comment="golang-github-prometheus-node_exporter is &lt;1.3.0-1.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695986" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695987" version="1" comment="python3 is &lt;3.4.10-25.93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695988" version="1" comment="python3-base is &lt;3.4.10-25.93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695989" version="1" comment="python3-curses is &lt;3.4.10-25.93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696312" version="1" comment="python3-devel is &lt;3.4.10-25.93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696496" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696497" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696498" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.83.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696499" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696500" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.83.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696501" version="1" comment="openssl is &lt;1.0.2j-60.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696502" version="1" comment="oracleasm-kmp-default is &lt;2.0.8_k4.4.180_94.164-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700104" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-28.87.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700105" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-28.87.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700106" version="1" comment="python is &lt;2.7.18-28.87.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700107" version="1" comment="python-32bit is &lt;2.7.18-28.87.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700108" version="1" comment="python-base is &lt;2.7.18-28.87.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700109" version="1" comment="python-base-32bit is &lt;2.7.18-28.87.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700110" version="1" comment="python-curses is &lt;2.7.18-28.87.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700111" version="1" comment="python-demo is &lt;2.7.18-28.87.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700112" version="1" comment="python-devel is &lt;2.7.18-28.87.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700113" version="1" comment="python-gdbm is &lt;2.7.18-28.87.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700114" version="1" comment="python-idle is &lt;2.7.18-28.87.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700115" version="1" comment="python-tk is &lt;2.7.18-28.87.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700116" version="1" comment="python-xml is &lt;2.7.18-28.87.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009558632" version="1" comment="sysstat is &lt;12.0.2-10.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009558633" version="1" comment="sysstat-isag is &lt;12.0.2-10.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700117" version="1" comment="dpdk is &lt;16.11.9-8.19.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696661" version="1" comment="dpdk-thunderx is &lt;16.11.9-8.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696662" version="1" comment="dpdk-thunderx-kmp-default is &lt;16.11.9_k4.4.180_94.164-8.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700118" version="1" comment="dpdk-tools is &lt;16.11.9-8.19.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696207" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;14-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696208" version="1" comment="kgraft-patch-4_4_180-94_150-default is &lt;10-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696209" version="1" comment="kgraft-patch-4_4_180-94_153-default is &lt;6-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696210" version="1" comment="kgraft-patch-4_4_180-94_156-default is &lt;5-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696211" version="1" comment="kgraft-patch-4_4_180-94_161-default is &lt;4-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117922"/>
	</rpminfo_test>
	<unix-def:uname_test xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" check="at least one" comment="kernel version 4.4.180-94.164-default is currently running" id="oval:org.opensuse.security:tst:2009721295" version="1">
		<unix-def:object object_ref="oval:org.opensuse.security:obj:2009060496"/>
		<unix-def:state state_ref="oval:org.opensuse.security:ste:2009172060"/>
	</unix-def:uname_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719638" version="1" comment="kgraft-patch-4_4_180-94_164-default is not installed" check="all" check_existence="none_exist" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696212" version="1" comment="kgraft-patch-4_4_180-94_164-default is &lt;2-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700119" version="1" comment="MozillaFirefox is &lt;91.11.0-112.119.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700020" version="1" comment="MozillaFirefox-devel is &lt;91.11.0-112.119.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700120" version="1" comment="MozillaFirefox-translations-common is &lt;91.11.0-112.119.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700121" version="1" comment="rsyslog is &lt;8.24.0-3.58.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700122" version="1" comment="rsyslog-diag-tools is &lt;8.24.0-3.58.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700123" version="1" comment="rsyslog-doc is &lt;8.24.0-3.58.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700124" version="1" comment="rsyslog-module-gssapi is &lt;8.24.0-3.58.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700125" version="1" comment="rsyslog-module-gtls is &lt;8.24.0-3.58.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700126" version="1" comment="rsyslog-module-mysql is &lt;8.24.0-3.58.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700127" version="1" comment="rsyslog-module-pgsql is &lt;8.24.0-3.58.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700128" version="1" comment="rsyslog-module-relp is &lt;8.24.0-3.58.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700129" version="1" comment="rsyslog-module-snmp is &lt;8.24.0-3.58.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700130" version="1" comment="rsyslog-module-udpspoof is &lt;8.24.0-3.58.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696904" version="1" comment="libpcre1 is &lt;8.45-8.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696905" version="1" comment="libpcre1-32bit is &lt;8.45-8.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696906" version="1" comment="libpcre16-0 is &lt;8.45-8.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696327" version="1" comment="libpcrecpp0 is &lt;8.45-8.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696328" version="1" comment="libpcreposix0 is &lt;8.45-8.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696329" version="1" comment="pcre-devel is &lt;8.45-8.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666685" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666686" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666687" version="1" comment="libdcerpc0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666688" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666689" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666690" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666691" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666692" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666693" version="1" comment="libndr-standard0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666694" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666695" version="1" comment="libndr0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666696" version="1" comment="libndr0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666697" version="1" comment="libnetapi0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666698" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666699" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666700" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666701" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666702" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666703" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666704" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666705" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666706" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666707" version="1" comment="libsamba-util0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666708" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666709" version="1" comment="libsamdb0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666710" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666711" version="1" comment="libsmbclient0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666712" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666713" version="1" comment="libsmbconf0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666714" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666715" version="1" comment="libsmbldap0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666716" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666717" version="1" comment="libtevent-util0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666718" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666719" version="1" comment="libwbclient0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666720" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666721" version="1" comment="samba is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666722" version="1" comment="samba-client is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666723" version="1" comment="samba-client-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666724" version="1" comment="samba-libs is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666725" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666726" version="1" comment="samba-winbind is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666727" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661620" version="1" comment="libsnmp30 is &lt;5.7.3-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661621" version="1" comment="libsnmp30-32bit is &lt;5.7.3-6.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661622" version="1" comment="net-snmp is &lt;5.7.3-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661623" version="1" comment="perl-SNMP is &lt;5.7.3-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661624" version="1" comment="snmp-mibs is &lt;5.7.3-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665194" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;14-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665195" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;13-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665196" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;10-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665197" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;7-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665198" version="1" comment="kgraft-patch-4_4_180-94_150-default is &lt;3-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662512" version="1" comment="libsndfile1 is &lt;1.0.25-36.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662513" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667359" version="1" comment="clamav is &lt;0.103.5-33.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667634" version="1" comment="kernel-default is &lt;4.4.180-94.153.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667635" version="1" comment="kernel-default-base is &lt;4.4.180-94.153.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667636" version="1" comment="kernel-default-devel is &lt;4.4.180-94.153.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666897" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.153.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666920" version="1" comment="kernel-default-man is &lt;4.4.180-94.153.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667637" version="1" comment="kernel-syms is &lt;4.4.180-94.153.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666902" version="1" comment="kgraft-patch-4_4_180-94_153-default is &lt;1-4.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662695" version="1" comment="libvirt is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662696" version="1" comment="libvirt-admin is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662697" version="1" comment="libvirt-client is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662698" version="1" comment="libvirt-daemon is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662699" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662700" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662701" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662702" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662703" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662704" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662705" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662706" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662707" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662708" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662709" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662710" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662711" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662712" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662713" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662714" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662715" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662716" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662717" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662718" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662719" version="1" comment="libvirt-doc is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662720" version="1" comment="libvirt-libs is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662721" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662722" version="1" comment="libvirt-nss is &lt;3.3.0-5.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667338" version="1" comment="libvirglrenderer0 is &lt;0.5.0-12.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666449" version="1" comment="expat is &lt;2.1.0-21.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666450" version="1" comment="libexpat1 is &lt;2.1.0-21.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666451" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666446" version="1" comment="libtiff5 is &lt;4.0.9-44.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666447" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666448" version="1" comment="tiff is &lt;4.0.9-44.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668127" version="1" comment="tcpdump is &lt;4.9.2-14.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667930" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;14-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667931" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;11-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667932" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;8-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667933" version="1" comment="kgraft-patch-4_4_180-94_150-default is &lt;4-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669104" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;15-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668896" version="1" comment="MozillaFirefox is &lt;91.6.0-112.89.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668886" version="1" comment="MozillaFirefox-devel is &lt;91.6.0-112.89.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668897" version="1" comment="MozillaFirefox-translations-common is &lt;91.6.0-112.89.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663241" version="1" comment="apache2 is &lt;2.4.23-29.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663242" version="1" comment="apache2-example-pages is &lt;2.4.23-29.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663243" version="1" comment="apache2-prefork is &lt;2.4.23-29.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663244" version="1" comment="apache2-utils is &lt;2.4.23-29.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663245" version="1" comment="apache2-worker is &lt;2.4.23-29.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670410" version="1" comment="cyrus-sasl is &lt;2.1.26-8.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670411" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-8.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670412" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-8.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670413" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-8.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670414" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-8.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670415" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-8.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670416" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-8.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670417" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-8.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670418" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.26-8.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670419" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-8.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670420" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-8.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670421" version="1" comment="libsasl2-3 is &lt;2.1.26-8.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670422" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-8.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670238" version="1" comment="kgraft-patch-4_4_180-94_153-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670237" version="1" comment="kgraft-patch-4_4_180-94_150-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670236" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;9-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670235" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;12-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670234" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;15-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669722" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.5-2.85.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669723" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.5-2.85.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669724" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.5-2.85.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669725" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.5-2.85.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669693" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.5-2.85.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669726" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.5-2.85.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669428" version="1" comment="expat is &lt;2.1.0-21.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669429" version="1" comment="libexpat1 is &lt;2.1.0-21.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669430" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670832" version="1" comment="zsh is &lt;5.0.5-6.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671796" version="1" comment="kernel-default is &lt;4.4.180-94.156.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671797" version="1" comment="kernel-default-base is &lt;4.4.180-94.156.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671798" version="1" comment="kernel-default-devel is &lt;4.4.180-94.156.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671767" version="1" comment="kernel-default-kgraft is &lt;4.4.180-94.156.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671799" version="1" comment="kernel-default-man is &lt;4.4.180-94.156.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671800" version="1" comment="kernel-syms is &lt;4.4.180-94.156.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671772" version="1" comment="kgraft-patch-4_4_180-94_156-default is &lt;1-4.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671826" version="1" comment="MozillaFirefox is &lt;91.6.1-112.92.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671780" version="1" comment="MozillaFirefox-devel is &lt;91.6.1-112.92.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671827" version="1" comment="MozillaFirefox-translations-common is &lt;91.6.1-112.92.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670872" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.6-2.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670873" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.6-2.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670874" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.6-2.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670875" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.6-2.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670809" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.6-2.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670876" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.6-2.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670877" version="1" comment="libcaca0 is &lt;0.99.beta18-14.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672592" version="1" comment="MozillaFirefox is &lt;91.7.0-112.95.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672566" version="1" comment="MozillaFirefox-devel is &lt;91.7.0-112.95.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672593" version="1" comment="MozillaFirefox-translations-common is &lt;91.7.0-112.95.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671284" version="1" comment="expat is &lt;2.1.0-21.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671285" version="1" comment="libexpat1 is &lt;2.1.0-21.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671286" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673337" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673338" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673339" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.75.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673340" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673341" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.75.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673342" version="1" comment="openssl is &lt;1.0.2j-60.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672588" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.322-27.72.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672589" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.322-27.72.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672590" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.322-27.72.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672591" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.322-27.72.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674037" version="1" comment="glibc is &lt;2.22-119.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674038" version="1" comment="glibc-32bit is &lt;2.22-119.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674039" version="1" comment="glibc-devel is &lt;2.22-119.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674040" version="1" comment="glibc-devel-32bit is &lt;2.22-119.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674041" version="1" comment="glibc-locale is &lt;2.22-119.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674042" version="1" comment="glibc-locale-32bit is &lt;2.22-119.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674043" version="1" comment="glibc-profile is &lt;2.22-119.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674044" version="1" comment="glibc-profile-32bit is &lt;2.22-119.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674045" version="1" comment="nscd is &lt;2.22-119.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674046" version="1" comment="apache2 is &lt;2.4.23-29.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674047" version="1" comment="apache2-example-pages is &lt;2.4.23-29.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674048" version="1" comment="apache2-prefork is &lt;2.4.23-29.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674049" version="1" comment="apache2-utils is &lt;2.4.23-29.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674050" version="1" comment="apache2-worker is &lt;2.4.23-29.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722236" version="1" comment="sles-bcl-release is ==12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555869" version="1" comment="libobjc4 is &lt;10.2.1+git583-1.3.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700062" version="1" comment="curl is &lt;7.37.0-37.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700063" version="1" comment="libcurl4 is &lt;7.37.0-37.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700064" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700065" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700066" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700074" version="1" comment="squid is &lt;3.5.21-26.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700134" version="1" comment="kernel-default is &lt;4.4.180-94.167.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700135" version="1" comment="kernel-default-base is &lt;4.4.180-94.167.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700136" version="1" comment="kernel-default-devel is &lt;4.4.180-94.167.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700137" version="1" comment="kernel-devel is &lt;4.4.180-94.167.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700138" version="1" comment="kernel-macros is &lt;4.4.180-94.167.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700139" version="1" comment="kernel-source is &lt;4.4.180-94.167.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700140" version="1" comment="kernel-syms is &lt;4.4.180-94.167.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700091" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.36.4-2.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700092" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.36.4-2.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700093" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.36.4-2.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700094" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.36.4-2.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700096" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.36.4-2.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700102" version="1" comment="python-M2Crypto is &lt;0.29.0-23.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700103" version="1" comment="python3-M2Crypto is &lt;0.29.0-23.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701178" version="1" comment="gpg2 is &lt;2.0.24-9.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701176" version="1" comment="gpg2-lang is &lt;2.0.24-9.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700075" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.332-27.75.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700076" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.332-27.75.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700077" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.332-27.75.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700078" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.332-27.75.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700938" version="1" comment="libfreebl3 is &lt;3.79-58.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700918" version="1" comment="libfreebl3-32bit is &lt;3.79-58.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700939" version="1" comment="libfreebl3-hmac is &lt;3.79-58.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700920" version="1" comment="libfreebl3-hmac-32bit is &lt;3.79-58.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700940" version="1" comment="libsoftokn3 is &lt;3.79-58.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700922" version="1" comment="libsoftokn3-32bit is &lt;3.79-58.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700941" version="1" comment="libsoftokn3-hmac is &lt;3.79-58.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700924" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.79-58.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700942" version="1" comment="mozilla-nspr is &lt;4.34-19.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700926" version="1" comment="mozilla-nspr-32bit is &lt;4.34-19.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700943" version="1" comment="mozilla-nss is &lt;3.79-58.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700929" version="1" comment="mozilla-nss-32bit is &lt;3.79-58.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700944" version="1" comment="mozilla-nss-certs is &lt;3.79-58.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700931" version="1" comment="mozilla-nss-certs-32bit is &lt;3.79-58.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700945" version="1" comment="mozilla-nss-sysinit is &lt;3.79-58.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700934" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.79-58.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700946" version="1" comment="mozilla-nss-tools is &lt;3.79-58.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700083" version="1" comment="git-core is &lt;2.26.2-27.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700084" version="1" comment="git-cvs is &lt;2.26.2-27.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700085" version="1" comment="git-daemon is &lt;2.26.2-27.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700086" version="1" comment="git-email is &lt;2.26.2-27.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700087" version="1" comment="git-gui is &lt;2.26.2-27.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700088" version="1" comment="git-svn is &lt;2.26.2-27.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700089" version="1" comment="git-web is &lt;2.26.2-27.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700090" version="1" comment="gitk is &lt;2.26.2-27.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701366" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr5.10-38.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701351" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr5.10-38.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701367" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr5.10-38.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701368" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr5.10-38.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701354" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr5.10-38.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701364" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.10-30.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701347" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr7.10-30.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701365" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.10-30.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701349" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr7.10-30.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701369" version="1" comment="libpcre2-16-0 is &lt;10.34-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701370" version="1" comment="libpcre2-32-0 is &lt;10.34-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701371" version="1" comment="libpcre2-8-0 is &lt;10.34-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701372" version="1" comment="libpcre2-posix2 is &lt;10.34-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702582" version="1" comment="xen is &lt;4.9.4_30-3.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702583" version="1" comment="xen-doc-html is &lt;4.9.4_30-3.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702584" version="1" comment="xen-libs is &lt;4.9.4_30-3.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702585" version="1" comment="xen-libs-32bit is &lt;4.9.4_30-3.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702586" version="1" comment="xen-tools is &lt;4.9.4_30-3.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702587" version="1" comment="xen-tools-domU is &lt;4.9.4_30-3.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700131" version="1" comment="crash is &lt;7.1.8-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700132" version="1" comment="crash-gcore is &lt;7.1.8-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700133" version="1" comment="crash-kmp-default is &lt;7.1.8_k4.4.180_94.164-4.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703728" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703668" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703729" version="1" comment="libdcerpc0 is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703670" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703730" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703672" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703731" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703674" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703732" version="1" comment="libndr-standard0 is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703676" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703733" version="1" comment="libndr0 is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703678" version="1" comment="libndr0-32bit is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703734" version="1" comment="libnetapi0 is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703680" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703735" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703682" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703736" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703684" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703737" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703686" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703738" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703688" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703739" version="1" comment="libsamba-util0 is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703690" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703740" version="1" comment="libsamdb0 is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703692" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703741" version="1" comment="libsmbclient0 is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703694" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703742" version="1" comment="libsmbconf0 is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703696" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703743" version="1" comment="libsmbldap0 is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703698" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703744" version="1" comment="libtevent-util0 is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703700" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703745" version="1" comment="libwbclient0 is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703702" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703746" version="1" comment="samba is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703747" version="1" comment="samba-client is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703705" version="1" comment="samba-client-32bit is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703706" version="1" comment="samba-doc is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703748" version="1" comment="samba-libs is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703708" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703749" version="1" comment="samba-winbind is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703710" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.324.6bba9ddab76-3.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703725" version="1" comment="MozillaFirefox is &lt;91.12.0-112.124.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703726" version="1" comment="MozillaFirefox-devel is &lt;91.12.0-112.124.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703727" version="1" comment="MozillaFirefox-translations-common is &lt;91.12.0-112.124.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700098" version="1" comment="dovecot22 is &lt;2.2.31-19.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700099" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700100" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700101" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703723" version="1" comment="libqpdf18 is &lt;7.1.1-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703724" version="1" comment="qpdf is &lt;7.1.1-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696169" version="1" comment="mokutil is &lt;0.2.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704786" version="1" comment="iscsiuio is &lt;0.7.8.2-53.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704787" version="1" comment="libopeniscsiusr0_2_0 is &lt;2.0.876-53.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704788" version="1" comment="open-iscsi is &lt;2.0.876-53.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704778" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.345-27.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704779" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.345-27.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704780" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.345-27.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704781" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.345-27.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707017" version="1" comment="ucode-intel is &lt;20220809-13.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704590" version="1" comment="kernel-default is &lt;4.4.180-94.171.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704591" version="1" comment="kernel-default-base is &lt;4.4.180-94.171.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704592" version="1" comment="kernel-default-devel is &lt;4.4.180-94.171.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704593" version="1" comment="kernel-devel is &lt;4.4.180-94.171.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704594" version="1" comment="kernel-macros is &lt;4.4.180-94.171.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704595" version="1" comment="kernel-source is &lt;4.4.180-94.171.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704596" version="1" comment="kernel-syms is &lt;4.4.180-94.171.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706364" version="1" comment="libz1 is &lt;1.2.8-12.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706365" version="1" comment="libz1-32bit is &lt;1.2.8-12.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706366" version="1" comment="zlib-devel is &lt;1.2.8-12.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707023" version="1" comment="rsync is &lt;3.1.0-13.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706213" version="1" comment="glibc is &lt;2.22-126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706214" version="1" comment="glibc-32bit is &lt;2.22-126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706215" version="1" comment="glibc-devel is &lt;2.22-126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706216" version="1" comment="glibc-devel-32bit is &lt;2.22-126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706217" version="1" comment="glibc-html is &lt;2.22-126.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706218" version="1" comment="glibc-i18ndata is &lt;2.22-126.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706219" version="1" comment="glibc-info is &lt;2.22-126.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706220" version="1" comment="glibc-locale is &lt;2.22-126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706221" version="1" comment="glibc-locale-32bit is &lt;2.22-126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706222" version="1" comment="glibc-profile is &lt;2.22-126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706223" version="1" comment="glibc-profile-32bit is &lt;2.22-126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706224" version="1" comment="nscd is &lt;2.22-126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707298" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr5.15-38.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707276" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr5.15-38.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707299" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr5.15-38.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707300" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr5.15-38.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707279" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr5.15-38.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707301" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.11-30.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707281" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr7.11-30.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707302" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.11-30.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707283" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr7.11-30.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707303" version="1" comment="bluez is &lt;5.13-5.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707304" version="1" comment="libbluetooth3 is &lt;5.13-5.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707620" version="1" comment="libcroco-0_6-3 is &lt;0.6.11-12.6.45 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707617" version="1" comment="libcroco-0_6-3-32bit is &lt;0.6.11-12.6.45 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707466" version="1" comment="gstreamer-plugins-good is &lt;1.8.3-16.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707462" version="1" comment="gstreamer-plugins-good-lang is &lt;1.8.3-16.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707292" version="1" comment="postgresql10 is &lt;10.22-4.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707293" version="1" comment="postgresql10-contrib is &lt;10.22-4.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707270" version="1" comment="postgresql10-docs is &lt;10.22-4.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707294" version="1" comment="postgresql10-plperl is &lt;10.22-4.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707295" version="1" comment="postgresql10-plpython is &lt;10.22-4.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707296" version="1" comment="postgresql10-pltcl is &lt;10.22-4.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707297" version="1" comment="postgresql10-server is &lt;10.22-4.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706633" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.36.5-2.107.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706634" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.36.5-2.107.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706635" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.36.5-2.107.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706636" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.36.5-2.107.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706638" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.36.5-2.107.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707897" version="1" comment="libvmtools0 is &lt;10.3.10-3.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707898" version="1" comment="open-vm-tools is &lt;10.3.10-3.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707899" version="1" comment="open-vm-tools-desktop is &lt;10.3.10-3.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709434" version="1" comment="libjson-c-devel is &lt;0.12.1-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708140" version="1" comment="libjson-c2 is &lt;0.12.1-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708131" version="1" comment="libjson-c2-32bit is &lt;0.12.1-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707990" version="1" comment="MozillaFirefox is &lt;91.13.0-112.127.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707991" version="1" comment="MozillaFirefox-devel is &lt;91.13.0-112.127.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707992" version="1" comment="MozillaFirefox-translations-common is &lt;91.13.0-112.127.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708315" version="1" comment="libgda-5_0-4 is &lt;5.2.4-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708316" version="1" comment="libgda-5_0-mysql is &lt;5.2.4-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708317" version="1" comment="libgda-5_0-postgres is &lt;5.2.4-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708318" version="1" comment="libgda-5_0-sqlite is &lt;5.2.4-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708319" version="1" comment="libgda-ui-5_0-4 is &lt;5.2.4-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708306" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.36.7-2.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708307" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.36.7-2.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708308" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.36.7-2.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708309" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.36.7-2.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708311" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.36.7-2.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709610" version="1" comment="clamav is &lt;0.103.7-33.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708313" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.15-30.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708244" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr7.15-30.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708314" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.15-30.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708245" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr7.15-30.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710058" version="1" comment="libudisks2-0 is &lt;2.1.3-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710059" version="1" comment="udisks2 is &lt;2.1.3-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709942" version="1" comment="udisks2-lang is &lt;2.1.3-3.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708220" version="1" comment="postgresql is &lt;14-4.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708221" version="1" comment="postgresql-contrib is &lt;14-4.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708222" version="1" comment="postgresql-docs is &lt;14-4.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708223" version="1" comment="postgresql-plperl is &lt;14-4.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708224" version="1" comment="postgresql-plpython is &lt;14-4.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708225" version="1" comment="postgresql-pltcl is &lt;14-4.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708226" version="1" comment="postgresql-server is &lt;14-4.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711101" version="1" comment="kernel-default is &lt;4.4.180-94.174.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711102" version="1" comment="kernel-default-base is &lt;4.4.180-94.174.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711103" version="1" comment="kernel-default-devel is &lt;4.4.180-94.174.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711104" version="1" comment="kernel-devel is &lt;4.4.180-94.174.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711105" version="1" comment="kernel-macros is &lt;4.4.180-94.174.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711106" version="1" comment="kernel-source is &lt;4.4.180-94.174.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711107" version="1" comment="kernel-syms is &lt;4.4.180-94.174.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710356" version="1" comment="libecpg6 is &lt;14.5-3.14.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710357" version="1" comment="libpq5 is &lt;14.5-3.14.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710351" version="1" comment="libpq5-32bit is &lt;14.5-3.14.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710358" version="1" comment="MozillaFirefox is &lt;102.2.0-112.130.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710359" version="1" comment="MozillaFirefox-branding-SLE is &lt;102-35.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710360" version="1" comment="MozillaFirefox-devel is &lt;102.2.0-112.130.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710361" version="1" comment="MozillaFirefox-translations-common is &lt;102.2.0-112.130.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711108" version="1" comment="libsqlite3-0 is &lt;3.39.3-9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711109" version="1" comment="libsqlite3-0-32bit is &lt;3.39.3-9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711110" version="1" comment="sqlite3 is &lt;3.39.3-9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711111" version="1" comment="sqlite3-devel is &lt;3.39.3-9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714672" version="1" comment="sqlite3-tcl is &lt;3.39.3-9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714304" version="1" comment="MozillaFirefox is &lt;102.3.0-112.133.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714305" version="1" comment="MozillaFirefox-devel is &lt;102.3.0-112.133.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714306" version="1" comment="MozillaFirefox-translations-common is &lt;102.3.0-112.133.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715903" version="1" comment="expat is &lt;2.1.0-21.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715904" version="1" comment="libexpat1 is &lt;2.1.0-21.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715899" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715905" version="1" comment="krb5-appl-clients is &lt;1.0.3-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715906" version="1" comment="krb5-appl-servers is &lt;1.0.3-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715764" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.36.8-2.113.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715765" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.36.8-2.113.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715766" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.36.8-2.113.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715767" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.36.8-2.113.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715769" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.36.8-2.113.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715758" version="1" comment="bind is &lt;9.9.9P1-63.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715759" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715760" version="1" comment="bind-doc is &lt;9.9.9P1-63.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715761" version="1" comment="bind-libs is &lt;9.9.9P1-63.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715762" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715763" version="1" comment="bind-utils is &lt;9.9.9P1-63.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714370" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714371" version="1" comment="python3 is &lt;3.4.10-25.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714372" version="1" comment="python3-base is &lt;3.4.10-25.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714373" version="1" comment="python3-curses is &lt;3.4.10-25.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715902" version="1" comment="squid is &lt;3.5.21-26.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716256" version="1" comment="postgresql-jdbc is &lt;9.4-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716917" version="1" comment="kernel-default is &lt;4.4.180-94.177.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716918" version="1" comment="kernel-default-base is &lt;4.4.180-94.177.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716919" version="1" comment="kernel-default-devel is &lt;4.4.180-94.177.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716920" version="1" comment="kernel-devel is &lt;4.4.180-94.177.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716921" version="1" comment="kernel-macros is &lt;4.4.180-94.177.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716922" version="1" comment="kernel-source is &lt;4.4.180-94.177.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716923" version="1" comment="kernel-syms is &lt;4.4.180-94.177.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718791" version="1" comment="libtiff5 is &lt;4.0.9-44.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718789" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718792" version="1" comment="tiff is &lt;4.0.9-44.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718649" version="1" comment="libksba8 is &lt;1.3.0-24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720069" version="1" comment="kpartx is &lt;0.7.1+125+suse.c18e287-2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720070" version="1" comment="multipath-tools is &lt;0.7.1+125+suse.c18e287-2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719691" version="1" comment="libxml2-2 is &lt;2.9.4-46.59.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719640" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.59.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719144" version="1" comment="libxml2-doc is &lt;2.9.4-46.59.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719692" version="1" comment="libxml2-tools is &lt;2.9.4-46.59.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719693" version="1" comment="python-libxml2 is &lt;2.9.4-46.59.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719807" version="1" comment="bluez is &lt;5.13-5.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719808" version="1" comment="libbluetooth3 is &lt;5.13-5.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719758" version="1" comment="MozillaFirefox is &lt;102.4.0-112.136.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719759" version="1" comment="MozillaFirefox-devel is &lt;102.4.0-112.136.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719760" version="1" comment="MozillaFirefox-translations-common is &lt;102.4.0-112.136.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720752" version="1" comment="telnet is &lt;1.2-167.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720753" version="1" comment="telnet-server is &lt;1.2-167.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717032" version="1" comment="golang-github-prometheus-node_exporter is &lt;1.3.0-1.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721649" version="1" comment="curl is &lt;7.37.0-37.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721650" version="1" comment="libcurl4 is &lt;7.37.0-37.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721651" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716290" version="1" comment="libtirpc-netconfig is &lt;1.0.1-17.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716291" version="1" comment="libtirpc3 is &lt;1.0.1-17.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716289" version="1" comment="libtirpc3-32bit is &lt;1.0.1-17.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721408" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717584" version="1" comment="dbus-1 is &lt;1.8.22-29.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717585" version="1" comment="dbus-1-x11 is &lt;1.8.22-29.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717586" version="1" comment="libdbus-1-3 is &lt;1.8.22-29.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717583" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-29.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721409" version="1" comment="libtasn1 is &lt;4.9-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721410" version="1" comment="libtasn1-6 is &lt;4.9-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721404" version="1" comment="libtasn1-6-32bit is &lt;4.9-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719030" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719031" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721928" version="1" comment="expat is &lt;2.1.0-21.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721929" version="1" comment="libexpat1 is &lt;2.1.0-21.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721927" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724304" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-28.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724305" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-28.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724306" version="1" comment="python is &lt;2.7.18-28.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724307" version="1" comment="python-32bit is &lt;2.7.18-28.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724308" version="1" comment="python-base is &lt;2.7.18-28.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724309" version="1" comment="python-base-32bit is &lt;2.7.18-28.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724310" version="1" comment="python-curses is &lt;2.7.18-28.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724311" version="1" comment="python-demo is &lt;2.7.18-28.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724318" version="1" comment="python-devel is &lt;2.7.18-28.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724312" version="1" comment="python-doc is &lt;2.7.18-28.90.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724313" version="1" comment="python-doc-pdf is &lt;2.7.18-28.90.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724314" version="1" comment="python-gdbm is &lt;2.7.18-28.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724315" version="1" comment="python-idle is &lt;2.7.18-28.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724316" version="1" comment="python-tk is &lt;2.7.18-28.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724317" version="1" comment="python-xml is &lt;2.7.18-28.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724758" version="1" comment="xen is &lt;4.9.4_34-3.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724759" version="1" comment="xen-doc-html is &lt;4.9.4_34-3.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724760" version="1" comment="xen-libs is &lt;4.9.4_34-3.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724761" version="1" comment="xen-libs-32bit is &lt;4.9.4_34-3.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724762" version="1" comment="xen-tools is &lt;4.9.4_34-3.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724763" version="1" comment="xen-tools-domU is &lt;4.9.4_34-3.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726355" version="1" comment="grub2 is &lt;2.02-142.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726356" version="1" comment="grub2-i386-pc is &lt;2.02-142.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726357" version="1" comment="grub2-snapper-plugin is &lt;2.02-142.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726358" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02-142.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726359" version="1" comment="grub2-x86_64-efi is &lt;2.02-142.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726360" version="1" comment="grub2-x86_64-xen is &lt;2.02-142.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726575" version="1" comment="tomcat is &lt;8.0.53-29.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726576" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726577" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726578" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726579" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726580" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726581" version="1" comment="tomcat-lib is &lt;8.0.53-29.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726582" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726583" version="1" comment="tomcat-webapps is &lt;8.0.53-29.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726584" version="1" comment="sudo is &lt;1.8.20p2-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725294" version="1" comment="MozillaFirefox is &lt;102.5.0-112.139.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725295" version="1" comment="MozillaFirefox-devel is &lt;102.5.0-112.139.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725296" version="1" comment="MozillaFirefox-translations-common is &lt;102.5.0-112.139.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725583" version="1" comment="libtiff5 is &lt;4.0.9-44.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725575" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725584" version="1" comment="tiff is &lt;4.0.9-44.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725088" version="1" comment="libpixman-1-0 is &lt;0.34.0-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725083" version="1" comment="libpixman-1-0-32bit is &lt;0.34.0-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725084" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725085" version="1" comment="python3 is &lt;3.4.10-25.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725086" version="1" comment="python3-base is &lt;3.4.10-25.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725087" version="1" comment="python3-curses is &lt;3.4.10-25.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725415" version="1" comment="libexiv2-12 is &lt;0.23-12.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726003" version="1" comment="busybox is &lt;1.35.0-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725587" version="1" comment="binutils is &lt;2.39-9.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725588" version="1" comment="binutils-devel is &lt;2.39-9.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725589" version="1" comment="libctf-nobfd0 is &lt;2.39-9.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725590" version="1" comment="libctf0 is &lt;2.39-9.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726568" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.38.2-2.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726569" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.38.2-2.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726570" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.38.2-2.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726571" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.38.2-2.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726573" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.38.2-2.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725585" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.20-30.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725550" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr7.20-30.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725586" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.20-30.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725551" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr7.20-30.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726814" version="1" comment="supportutils is &lt;3.0.10-95.51.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727481" version="1" comment="emacs is &lt;24.3-25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727418" version="1" comment="emacs-el is &lt;24.3-25.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727419" version="1" comment="emacs-info is &lt;24.3-25.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727482" version="1" comment="emacs-nox is &lt;24.3-25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727483" version="1" comment="emacs-x11 is &lt;24.3-25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727484" version="1" comment="etags is &lt;24.3-25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726342" version="1" comment="krb5 is &lt;1.12.5-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726334" version="1" comment="krb5-32bit is &lt;1.12.5-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726343" version="1" comment="krb5-client is &lt;1.12.5-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726344" version="1" comment="krb5-doc is &lt;1.12.5-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726345" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726346" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726347" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726348" version="1" comment="krb5-server is &lt;1.12.5-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727636" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.352-27.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727637" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.352-27.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727638" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.352-27.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727639" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.352-27.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728194" version="1" comment="MozillaFirefox is &lt;102.6.0-112.142.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728195" version="1" comment="MozillaFirefox-devel is &lt;102.6.0-112.142.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728196" version="1" comment="MozillaFirefox-translations-common is &lt;102.6.0-112.142.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728058" version="1" comment="zabbix-agent is &lt;4.0.12-4.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728989" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728990" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728397" version="1" comment="kernel-default is &lt;4.4.180-94.182.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728398" version="1" comment="kernel-default-base is &lt;4.4.180-94.182.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728399" version="1" comment="kernel-default-devel is &lt;4.4.180-94.182.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728400" version="1" comment="kernel-devel is &lt;4.4.180-94.182.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728401" version="1" comment="kernel-macros is &lt;4.4.180-94.182.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728402" version="1" comment="kernel-source is &lt;4.4.180-94.182.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728403" version="1" comment="kernel-syms is &lt;4.4.180-94.182.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728192" version="1" comment="gvim is &lt;9.0.0814-17.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728193" version="1" comment="vim is &lt;9.0.0814-17.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728128" version="1" comment="vim-data is &lt;9.0.0814-17.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728129" version="1" comment="vim-data-common is &lt;9.0.0814-17.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727624" version="1" comment="glibc is &lt;2.22-133.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727625" version="1" comment="glibc-32bit is &lt;2.22-133.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727626" version="1" comment="glibc-devel is &lt;2.22-133.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727627" version="1" comment="glibc-devel-32bit is &lt;2.22-133.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727628" version="1" comment="glibc-html is &lt;2.22-133.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727629" version="1" comment="glibc-i18ndata is &lt;2.22-133.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727630" version="1" comment="glibc-info is &lt;2.22-133.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727631" version="1" comment="glibc-locale is &lt;2.22-133.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727632" version="1" comment="glibc-locale-32bit is &lt;2.22-133.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727633" version="1" comment="glibc-profile is &lt;2.22-133.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727634" version="1" comment="glibc-profile-32bit is &lt;2.22-133.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727635" version="1" comment="nscd is &lt;2.22-133.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555946" version="1" comment="libssh2-1 is &lt;1.4.3-20.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132443" version="1" comment="sles-release is ==3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555947" version="1" comment="libecpg6 is &lt;10.9-1.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555948" version="1" comment="libpq5 is &lt;10.9-1.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555949" version="1" comment="postgresql10 is &lt;10.9-1.12.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555950" version="1" comment="postgresql10-contrib is &lt;10.9-1.12.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555951" version="1" comment="postgresql10-plperl is &lt;10.9-1.12.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555952" version="1" comment="postgresql10-plpython is &lt;10.9-1.12.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555953" version="1" comment="postgresql10-pltcl is &lt;10.9-1.12.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555954" version="1" comment="postgresql10-server is &lt;10.9-1.12.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555955" version="1" comment="glib2-tools is &lt;2.48.2-12.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555956" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555957" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555958" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555959" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555960" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555961" version="1" comment="MozillaFirefox is &lt;60.8.0-109.83.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555962" version="1" comment="MozillaFirefox-translations-common is &lt;60.8.0-109.83.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555963" version="1" comment="libfreebl3 is &lt;3.44.1-58.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555964" version="1" comment="libfreebl3-hmac is &lt;3.44.1-58.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555965" version="1" comment="libsoftokn3 is &lt;3.44.1-58.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555966" version="1" comment="libsoftokn3-hmac is &lt;3.44.1-58.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555967" version="1" comment="mozilla-nss is &lt;3.44.1-58.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555968" version="1" comment="mozilla-nss-certs is &lt;3.44.1-58.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555969" version="1" comment="mozilla-nss-sysinit is &lt;3.44.1-58.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555970" version="1" comment="mozilla-nss-tools is &lt;3.44.1-58.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555971" version="1" comment="glibc is &lt;2.22-62.22.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555972" version="1" comment="glibc-devel is &lt;2.22-62.22.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555973" version="1" comment="glibc-locale is &lt;2.22-62.22.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555974" version="1" comment="glibc-profile is &lt;2.22-62.22.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555975" version="1" comment="nscd is &lt;2.22-62.22.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555976" version="1" comment="bzip2 is &lt;1.0.6-30.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555977" version="1" comment="libbz2-1 is &lt;1.0.6-30.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555978" version="1" comment="libpolkit0 is &lt;0.113-5.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555979" version="1" comment="polkit is &lt;0.113-5.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555980" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555981" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.222-27.35.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555982" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.222-27.35.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555983" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.222-27.35.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555984" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.222-27.35.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555985" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555986" version="1" comment="python3 is &lt;3.4.6-25.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555987" version="1" comment="python3-base is &lt;3.4.6-25.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555988" version="1" comment="python3-curses is &lt;3.4.6-25.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555989" version="1" comment="evince is &lt;3.20.2-6.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555990" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555991" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555992" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555993" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555994" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555995" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555996" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555997" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555998" version="1" comment="libevview3-3 is &lt;3.20.2-6.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009555999" version="1" comment="nautilus-evince is &lt;3.20.2-6.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556000" version="1" comment="squid is &lt;3.5.21-26.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556001" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556002" version="1" comment="python is &lt;2.7.13-28.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556003" version="1" comment="python-base is &lt;2.7.13-28.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556004" version="1" comment="python-curses is &lt;2.7.13-28.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556005" version="1" comment="python-demo is &lt;2.7.13-28.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556006" version="1" comment="python-devel is &lt;2.7.13-28.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556007" version="1" comment="python-gdbm is &lt;2.7.13-28.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556008" version="1" comment="python-idle is &lt;2.7.13-28.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556009" version="1" comment="python-tk is &lt;2.7.13-28.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556010" version="1" comment="python-xml is &lt;2.7.13-28.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556011" version="1" comment="postgresql96 is &lt;9.6.15-3.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556012" version="1" comment="postgresql96-contrib is &lt;9.6.15-3.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556013" version="1" comment="postgresql96-plperl is &lt;9.6.15-3.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556014" version="1" comment="postgresql96-plpython is &lt;9.6.15-3.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556015" version="1" comment="postgresql96-pltcl is &lt;9.6.15-3.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556016" version="1" comment="postgresql96-server is &lt;9.6.15-3.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556017" version="1" comment="libvirt is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556018" version="1" comment="libvirt-admin is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556019" version="1" comment="libvirt-client is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556020" version="1" comment="libvirt-daemon is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556021" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556022" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556023" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556024" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556025" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556026" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556027" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556028" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556029" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556030" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556031" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556032" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556033" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556034" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556035" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556036" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556037" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556038" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556039" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556040" version="1" comment="libvirt-doc is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556041" version="1" comment="libvirt-libs is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556042" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556043" version="1" comment="libvirt-nss is &lt;3.3.0-5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556044" version="1" comment="kernel-default is &lt;4.4.180-94.103.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556045" version="1" comment="kernel-default-base is &lt;4.4.180-94.103.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556046" version="1" comment="kernel-default-devel is &lt;4.4.180-94.103.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556047" version="1" comment="kernel-syms is &lt;4.4.180-94.103.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556049" version="1" comment="perl is &lt;5.18.2-12.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556050" version="1" comment="perl-base is &lt;5.18.2-12.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556051" version="1" comment="libsolv-tools is &lt;0.6.36-2.27.19.8 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556052" version="1" comment="libzypp is &lt;16.20.2-27.60.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556053" version="1" comment="perl-solv is &lt;0.6.36-2.27.19.8 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556054" version="1" comment="python-solv is &lt;0.6.36-2.27.19.8 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556055" version="1" comment="zypper is &lt;1.13.54-18.40.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556056" version="1" comment="curl is &lt;7.37.0-37.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556057" version="1" comment="libcurl4 is &lt;7.37.0-37.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556058" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.4-2.47.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556059" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.4-2.47.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556060" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.4-2.47.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556061" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.4-2.47.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556062" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.4-2.47.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556063" version="1" comment="ibus is &lt;1.5.13-15.11.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556064" version="1" comment="ibus-gtk is &lt;1.5.13-15.11.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556065" version="1" comment="ibus-gtk3 is &lt;1.5.13-15.11.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556066" version="1" comment="libibus-1_0-5 is &lt;1.5.13-15.11.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556067" version="1" comment="typelib-1_0-IBus-1_0 is &lt;1.5.13-15.11.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556068" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556069" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556070" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556071" version="1" comment="openssl is &lt;1.0.2j-60.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556072" version="1" comment="MozillaFirefox is &lt;60.9.0-109.86.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556073" version="1" comment="MozillaFirefox-translations-common is &lt;60.9.0-109.86.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556074" version="1" comment="dovecot22 is &lt;2.2.31-19.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556075" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556076" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556077" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556078" version="1" comment="ghostscript is &lt;9.27-23.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556079" version="1" comment="ghostscript-x11 is &lt;9.27-23.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556080" version="1" comment="libgcrypt20 is &lt;1.6.1-16.68.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556081" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.68.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556082" version="1" comment="kgraft-patch-4_4_156-94_61-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556083" version="1" comment="kgraft-patch-4_4_156-94_57-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556084" version="1" comment="kgraft-patch-4_4_162-94_72-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556085" version="1" comment="kgraft-patch-4_4_162-94_69-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556086" version="1" comment="kgraft-patch-4_4_156-94_64-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556087" version="1" comment="kgraft-patch-4_4_176-94_88-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556088" version="1" comment="kgraft-patch-4_4_175-94_79-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556089" version="1" comment="kgraft-patch-4_4_180-94_103-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556090" version="1" comment="kgraft-patch-4_4_180-94_100-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556091" version="1" comment="kgraft-patch-4_4_180-94_97-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556092" version="1" comment="kgraft-patch-4_4_178-94_91-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556093" version="1" comment="MozillaFirefox is &lt;68.1.0-109.89.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556094" version="1" comment="MozillaFirefox-branding-SLE is &lt;68-32.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556095" version="1" comment="MozillaFirefox-translations-common is &lt;68.1.0-109.89.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556096" version="1" comment="binutils is &lt;2.32-9.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556097" version="1" comment="sudo is &lt;1.8.20p2-3.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556098" version="1" comment="libpcap1 is &lt;1.8.1-10.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556099" version="1" comment="tcpdump is &lt;4.9.2-14.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556100" version="1" comment="nfs-client is &lt;1.3.0-34.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556101" version="1" comment="nfs-doc is &lt;1.3.0-34.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556102" version="1" comment="nfs-kernel-server is &lt;1.3.0-34.22.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556103" version="1" comment="kgraft-patch-4_4_156-94_64-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556104" version="1" comment="kgraft-patch-4_4_162-94_69-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556105" version="1" comment="kgraft-patch-4_4_162-94_72-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556106" version="1" comment="kgraft-patch-4_4_175-94_79-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556107" version="1" comment="kgraft-patch-4_4_176-94_88-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556108" version="1" comment="kgraft-patch-4_4_178-94_91-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556109" version="1" comment="kgraft-patch-4_4_180-94_97-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556110" version="1" comment="kgraft-patch-4_4_180-94_100-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556111" version="1" comment="kgraft-patch-4_4_180-94_103-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556112" version="1" comment="MozillaFirefox is &lt;68.2.0-109.95.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556113" version="1" comment="MozillaFirefox-translations-common is &lt;68.2.0-109.95.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556114" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556115" version="1" comment="libdcerpc0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556116" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556117" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556118" version="1" comment="libndr-standard0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556119" version="1" comment="libndr0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556120" version="1" comment="libnetapi0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556121" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556122" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556123" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556124" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556125" version="1" comment="libsamba-util0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556126" version="1" comment="libsamdb0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556127" version="1" comment="libsmbclient0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556128" version="1" comment="libsmbconf0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556129" version="1" comment="libsmbldap0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556130" version="1" comment="libtevent-util0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556131" version="1" comment="libwbclient0 is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556132" version="1" comment="samba is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556133" version="1" comment="samba-client is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556134" version="1" comment="samba-libs is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556135" version="1" comment="samba-winbind is &lt;4.6.16+git.169.064abe062be-3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556136" version="1" comment="gdb is &lt;8.3.1-2.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556137" version="1" comment="libssh2-1 is &lt;1.4.3-20.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556138" version="1" comment="libseccomp2 is &lt;2.4.1-11.3.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556139" version="1" comment="kernel-default is &lt;4.4.180-94.107.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556140" version="1" comment="kernel-default-base is &lt;4.4.180-94.107.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556141" version="1" comment="kernel-default-devel is &lt;4.4.180-94.107.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556143" version="1" comment="kernel-syms is &lt;4.4.180-94.107.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556145" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556146" version="1" comment="libjpeg62 is &lt;62.2.0-31.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556147" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556148" version="1" comment="libjpeg8 is &lt;8.1.2-31.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556149" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556150" version="1" comment="ghostscript is &lt;9.27-23.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556151" version="1" comment="ghostscript-x11 is &lt;9.27-23.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556152" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556153" version="1" comment="sqlite3 is &lt;3.8.10.2-9.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556154" version="1" comment="cups is &lt;1.7.5-20.26.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556155" version="1" comment="cups-client is &lt;1.7.5-20.26.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556156" version="1" comment="cups-libs is &lt;1.7.5-20.26.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556157" version="1" comment="clamav is &lt;0.100.3-33.26.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556158" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.241-43.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556159" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.241-43.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556160" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.241-43.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556161" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.241-43.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556162" version="1" comment="clamav is &lt;0.100.3-33.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556163" version="1" comment="permissions is &lt;2015.09.28.1626-17.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556164" version="1" comment="kgraft-patch-4_4_180-94_97-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556165" version="1" comment="kgraft-patch-4_4_180-94_100-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556166" version="1" comment="kgraft-patch-4_4_180-94_103-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556167" version="1" comment="kgraft-patch-4_4_175-94_79-default is &lt;7-2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556168" version="1" comment="kgraft-patch-4_4_176-94_88-default is &lt;6-2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556169" version="1" comment="kgraft-patch-4_4_178-94_91-default is &lt;6-2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556170" version="1" comment="MozillaFirefox is &lt;68.3.0-109.98.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556171" version="1" comment="MozillaFirefox-translations-common is &lt;68.3.0-109.98.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556172" version="1" comment="kernel-default is &lt;4.4.180-94.113.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556173" version="1" comment="kernel-default-base is &lt;4.4.180-94.113.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556174" version="1" comment="kernel-default-devel is &lt;4.4.180-94.113.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556176" version="1" comment="kernel-syms is &lt;4.4.180-94.113.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556178" version="1" comment="freeradius-server is &lt;3.0.15-2.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556179" version="1" comment="freeradius-server-doc is &lt;3.0.15-2.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556180" version="1" comment="freeradius-server-krb5 is &lt;3.0.15-2.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556181" version="1" comment="freeradius-server-ldap is &lt;3.0.15-2.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556182" version="1" comment="freeradius-server-libs is &lt;3.0.15-2.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556183" version="1" comment="freeradius-server-mysql is &lt;3.0.15-2.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556184" version="1" comment="freeradius-server-perl is &lt;3.0.15-2.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556185" version="1" comment="freeradius-server-postgresql is &lt;3.0.15-2.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556186" version="1" comment="freeradius-server-python is &lt;3.0.15-2.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556187" version="1" comment="freeradius-server-sqlite is &lt;3.0.15-2.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556188" version="1" comment="freeradius-server-utils is &lt;3.0.15-2.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556189" version="1" comment="cups is &lt;1.7.5-20.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556190" version="1" comment="cups-client is &lt;1.7.5-20.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556191" version="1" comment="cups-libs is &lt;1.7.5-20.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556192" version="1" comment="pam_radius is &lt;1.3.16-239.4.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556193" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.1-2.50.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556194" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.1-2.50.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556195" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.1-2.50.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556196" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.1-2.50.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556197" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.1-2.50.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556198" version="1" comment="libshibsp-lite6 is &lt;2.5.5-6.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556199" version="1" comment="libshibsp6 is &lt;2.5.5-6.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556200" version="1" comment="shibboleth-sp is &lt;2.5.5-6.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556201" version="1" comment="ceph-common is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556202" version="1" comment="libcephfs2 is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556203" version="1" comment="librados2 is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556204" version="1" comment="libradosstriper1 is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556205" version="1" comment="librbd1 is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556206" version="1" comment="librgw2 is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556207" version="1" comment="python-cephfs is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556208" version="1" comment="python-rados is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556209" version="1" comment="python-rbd is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556210" version="1" comment="python-rgw is &lt;12.2.12+git.1587570958.35d78d0243-2.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556211" version="1" comment="libvncclient0 is &lt;0.9.9-17.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556212" version="1" comment="libvncserver0 is &lt;0.9.9-17.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556213" version="1" comment="libicu-doc is &lt;52.1-8.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556214" version="1" comment="libicu52_1 is &lt;52.1-8.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556215" version="1" comment="libicu52_1-data is &lt;52.1-8.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556216" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.68.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556217" version="1" comment="openldap2 is &lt;2.4.41-18.68.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556218" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.68.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556219" version="1" comment="openldap2-client is &lt;2.4.41-18.68.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556220" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.68.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556221" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.2-2.53.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556222" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.2-2.53.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556223" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.2-2.53.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556224" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.2-2.53.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556225" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.2-2.53.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556226" version="1" comment="ghostscript is &lt;9.52-23.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556227" version="1" comment="ghostscript-x11 is &lt;9.52-23.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556228" version="1" comment="libspectre1 is &lt;0.2.7-12.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556229" version="1" comment="MozillaFirefox is &lt;68.8.0-109.119.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556230" version="1" comment="MozillaFirefox-translations-common is &lt;68.8.0-109.119.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556231" version="1" comment="squid is &lt;3.5.21-26.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556232" version="1" comment="apache2 is &lt;2.4.23-29.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556233" version="1" comment="apache2-example-pages is &lt;2.4.23-29.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556234" version="1" comment="apache2-prefork is &lt;2.4.23-29.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556235" version="1" comment="apache2-utils is &lt;2.4.23-29.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556236" version="1" comment="apache2-worker is &lt;2.4.23-29.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556237" version="1" comment="kernel-default is &lt;4.4.180-94.116.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556238" version="1" comment="kernel-default-base is &lt;4.4.180-94.116.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556239" version="1" comment="kernel-default-devel is &lt;4.4.180-94.116.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556241" version="1" comment="kernel-syms is &lt;4.4.180-94.116.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556243" version="1" comment="python-PyYAML is &lt;5.1.2-26.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556244" version="1" comment="python3-PyYAML is &lt;5.1.2-26.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556245" version="1" comment="git-core is &lt;2.26.2-27.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556246" version="1" comment="kgraft-patch-4_4_180-94_113-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556247" version="1" comment="kgraft-patch-4_4_180-94_107-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556248" version="1" comment="kgraft-patch-4_4_180-94_103-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556249" version="1" comment="kgraft-patch-4_4_180-94_100-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556250" version="1" comment="kgraft-patch-4_4_180-94_97-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556251" version="1" comment="kgraft-patch-4_4_178-94_91-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556252" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556253" version="1" comment="python is &lt;2.7.17-28.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556254" version="1" comment="python-base is &lt;2.7.17-28.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556255" version="1" comment="python-curses is &lt;2.7.17-28.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556256" version="1" comment="python-demo is &lt;2.7.17-28.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556257" version="1" comment="python-devel is &lt;2.7.17-28.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556258" version="1" comment="python-gdbm is &lt;2.7.17-28.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556259" version="1" comment="python-idle is &lt;2.7.17-28.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556260" version="1" comment="python-tk is &lt;2.7.17-28.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556261" version="1" comment="python-xml is &lt;2.7.17-28.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556262" version="1" comment="krb5-appl-clients is &lt;1.0.3-3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556263" version="1" comment="krb5-appl-servers is &lt;1.0.3-3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556264" version="1" comment="libexif12 is &lt;0.6.22-8.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556265" version="1" comment="qemu is &lt;2.9.1-6.44.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556266" version="1" comment="qemu-block-curl is &lt;2.9.1-6.44.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556267" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.44.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556268" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.44.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556269" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.44.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556270" version="1" comment="qemu-lang is &lt;2.9.1-6.44.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556271" version="1" comment="qemu-tools is &lt;2.9.1-6.44.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556272" version="1" comment="gvim is &lt;7.4.326-17.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556273" version="1" comment="vim is &lt;7.4.326-17.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556274" version="1" comment="MozillaFirefox is &lt;68.9.0-109.123.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556275" version="1" comment="MozillaFirefox-translations-common is &lt;68.9.0-109.123.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556276" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-19.3.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556277" version="1" comment="ruby2.1 is &lt;2.1.9-19.3.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556278" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-19.3.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556279" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.261-43.38.8 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556280" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.261-43.38.8 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556281" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.261-43.38.8 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556282" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.261-43.38.8 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556283" version="1" comment="libXvnc1 is &lt;1.6.0-18.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556284" version="1" comment="tigervnc is &lt;1.6.0-18.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556285" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-18.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556286" version="1" comment="kernel-default is &lt;4.4.180-94.121.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556287" version="1" comment="kernel-default-base is &lt;4.4.180-94.121.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556288" version="1" comment="kernel-default-devel is &lt;4.4.180-94.121.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556290" version="1" comment="kernel-syms is &lt;4.4.180-94.121.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556292" version="1" comment="libvirglrenderer0 is &lt;0.5.0-12.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556293" version="1" comment="libadns1 is &lt;1.4-103.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556294" version="1" comment="perl is &lt;5.18.2-12.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556295" version="1" comment="perl-base is &lt;5.18.2-12.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556296" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.252-27.45.6 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556297" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.252-27.45.6 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556298" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.252-27.45.6 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556299" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.252-27.45.6 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556300" version="1" comment="kernel-default is &lt;4.4.180-94.124.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556301" version="1" comment="kernel-default-base is &lt;4.4.180-94.124.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556302" version="1" comment="kernel-default-devel is &lt;4.4.180-94.124.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556304" version="1" comment="kernel-syms is &lt;4.4.180-94.124.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556306" version="1" comment="curl is &lt;7.37.0-37.47.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556307" version="1" comment="libcurl4 is &lt;7.37.0-37.47.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556308" version="1" comment="ceph-common is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556309" version="1" comment="libcephfs2 is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556310" version="1" comment="librados2 is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556311" version="1" comment="libradosstriper1 is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556312" version="1" comment="librbd1 is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556313" version="1" comment="librgw2 is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556314" version="1" comment="python-cephfs is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556315" version="1" comment="python-rados is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556316" version="1" comment="python-rbd is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556317" version="1" comment="python-rgw is &lt;12.2.13+git.1592168685.85110a3e9d-2.50.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556318" version="1" comment="kgraft-patch-4_4_180-94_116-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556319" version="1" comment="kgraft-patch-4_4_180-94_113-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556320" version="1" comment="kgraft-patch-4_4_180-94_107-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556321" version="1" comment="kgraft-patch-4_4_180-94_103-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556322" version="1" comment="kgraft-patch-4_4_180-94_100-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556323" version="1" comment="kgraft-patch-4_4_180-94_97-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556324" version="1" comment="mutt is &lt;1.10.1-55.11.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556325" version="1" comment="squid is &lt;3.5.21-26.26.1 for aarch64,i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556326" version="1" comment="ntp is &lt;4.2.8p15-88.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556327" version="1" comment="ntp-doc is &lt;4.2.8p15-88.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556328" version="1" comment="kgraft-patch-4_4_180-94_97-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556329" version="1" comment="libfreebl3 is &lt;3.53.1-58.48.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556330" version="1" comment="libfreebl3-hmac is &lt;3.53.1-58.48.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556331" version="1" comment="libsoftokn3 is &lt;3.53.1-58.48.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556332" version="1" comment="libsoftokn3-hmac is &lt;3.53.1-58.48.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556333" version="1" comment="mozilla-nspr is &lt;4.25-19.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556334" version="1" comment="mozilla-nspr-devel is &lt;4.25-19.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556335" version="1" comment="mozilla-nss is &lt;3.53.1-58.48.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556336" version="1" comment="mozilla-nss-certs is &lt;3.53.1-58.48.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556337" version="1" comment="mozilla-nss-devel is &lt;3.53.1-58.48.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556338" version="1" comment="mozilla-nss-sysinit is &lt;3.53.1-58.48.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556339" version="1" comment="mozilla-nss-tools is &lt;3.53.1-58.48.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556340" version="1" comment="kgraft-patch-4_4_178-94_91-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556341" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.71.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556342" version="1" comment="openldap2 is &lt;2.4.41-18.71.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556343" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.71.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556344" version="1" comment="openldap2-client is &lt;2.4.41-18.71.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556345" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.71.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556346" version="1" comment="kgraft-patch-4_4_176-94_88-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556347" version="1" comment="kgraft-patch-4_4_175-94_79-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556348" version="1" comment="MozillaFirefox is &lt;78.0.1-112.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556349" version="1" comment="MozillaFirefox-branding-SLE is &lt;78-35.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556350" version="1" comment="MozillaFirefox-devel is &lt;78.0.1-112.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556351" version="1" comment="MozillaFirefox-translations-common is &lt;78.0.1-112.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556352" version="1" comment="squid is &lt;3.5.21-26.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556353" version="1" comment="golang-github-prometheus-node_exporter is &lt;0.18.1-1.6.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556354" version="1" comment="xrdp is &lt;0.9.0~git.1456906198.f422461-21.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556355" version="1" comment="kgraft-patch-4_4_180-94_113-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556356" version="1" comment="kgraft-patch-4_4_180-94_107-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556357" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556358" version="1" comment="libdcerpc0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556359" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556360" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556361" version="1" comment="libndr-standard0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556362" version="1" comment="libndr0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556363" version="1" comment="libnetapi0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556364" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556365" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556366" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556367" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556368" version="1" comment="libsamba-util0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556369" version="1" comment="libsamdb0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556370" version="1" comment="libsmbclient0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556371" version="1" comment="libsmbconf0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556372" version="1" comment="libsmbldap0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556373" version="1" comment="libtevent-util0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556374" version="1" comment="libwbclient0 is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556375" version="1" comment="samba is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556376" version="1" comment="samba-client is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556377" version="1" comment="samba-libs is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556378" version="1" comment="samba-winbind is &lt;4.6.16+git.186.c6d77b0d5a6-3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556379" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.3-2.56.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556380" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.3-2.56.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556381" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.3-2.56.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556382" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.3-2.56.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556383" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.3-2.56.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556384" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.3-2.56.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556385" version="1" comment="grub2 is &lt;2.02-4.53.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556386" version="1" comment="kgraft-patch-4_4_180-94_103-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556387" version="1" comment="ghostscript is &lt;9.52-23.39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556388" version="1" comment="ghostscript-x11 is &lt;9.52-23.39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556389" version="1" comment="MozillaFirefox is &lt;78.1.0-112.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556390" version="1" comment="MozillaFirefox-devel is &lt;78.1.0-112.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556391" version="1" comment="MozillaFirefox-translations-common is &lt;78.1.0-112.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556392" version="1" comment="kgraft-patch-4_4_180-94_100-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556393" version="1" comment="libX11-6 is &lt;1.6.2-12.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556394" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556395" version="1" comment="libxcb-dri2-0 is &lt;1.10-4.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556396" version="1" comment="libxcb-dri3-0 is &lt;1.10-4.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556397" version="1" comment="libxcb-glx0 is &lt;1.10-4.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556398" version="1" comment="libxcb-present0 is &lt;1.10-4.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556399" version="1" comment="libxcb-randr0 is &lt;1.10-4.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556400" version="1" comment="libxcb-render0 is &lt;1.10-4.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556401" version="1" comment="libxcb-shape0 is &lt;1.10-4.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556402" version="1" comment="libxcb-shm0 is &lt;1.10-4.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556403" version="1" comment="libxcb-sync1 is &lt;1.10-4.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556404" version="1" comment="libxcb-xf86dri0 is &lt;1.10-4.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556405" version="1" comment="libxcb-xfixes0 is &lt;1.10-4.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556406" version="1" comment="libxcb-xinerama0 is &lt;1.10-4.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556407" version="1" comment="libxcb-xkb1 is &lt;1.10-4.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556408" version="1" comment="libxcb-xv0 is &lt;1.10-4.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556409" version="1" comment="libxcb1 is &lt;1.10-4.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556410" version="1" comment="kernel-default is &lt;4.4.180-94.127.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556411" version="1" comment="kernel-default-base is &lt;4.4.180-94.127.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556412" version="1" comment="kernel-default-devel is &lt;4.4.180-94.127.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556414" version="1" comment="kernel-syms is &lt;4.4.180-94.127.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556416" version="1" comment="libvncclient0 is &lt;0.9.9-17.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556417" version="1" comment="libvncserver0 is &lt;0.9.9-17.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556418" version="1" comment="dpdk is &lt;16.11.9-8.15.13 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556419" version="1" comment="dpdk-tools is &lt;16.11.9-8.15.13 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556420" version="1" comment="libX11-6 is &lt;1.6.2-12.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556421" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556422" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.4-2.59.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556423" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.4-2.59.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556424" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.4-2.59.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556425" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.4-2.59.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556426" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.4-2.59.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556427" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.4-2.59.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556428" version="1" comment="dovecot22 is &lt;2.2.31-19.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556429" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556430" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556431" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556432" version="1" comment="grub2 is &lt;2.02-4.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556433" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556434" version="1" comment="libdcerpc0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556435" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556436" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556437" version="1" comment="libndr-standard0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556438" version="1" comment="libndr0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556439" version="1" comment="libnetapi0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556440" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556441" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556442" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556443" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556444" version="1" comment="libsamba-util0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556445" version="1" comment="libsamdb0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556446" version="1" comment="libsmbclient0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556447" version="1" comment="libsmbconf0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556448" version="1" comment="libsmbldap0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556449" version="1" comment="libtevent-util0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556450" version="1" comment="libwbclient0 is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556451" version="1" comment="samba is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556452" version="1" comment="samba-client is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556453" version="1" comment="samba-libs is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556454" version="1" comment="samba-winbind is &lt;4.6.16+git.174.c2fd2e28c84-3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556455" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.26.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556456" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.26.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556457" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556458" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556459" version="1" comment="apache2 is &lt;2.4.23-29.63.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556460" version="1" comment="apache2-example-pages is &lt;2.4.23-29.63.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556461" version="1" comment="apache2-prefork is &lt;2.4.23-29.63.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556462" version="1" comment="apache2-utils is &lt;2.4.23-29.63.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556463" version="1" comment="apache2-worker is &lt;2.4.23-29.63.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556464" version="1" comment="squid is &lt;3.5.21-26.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556465" version="1" comment="libX11-6 is &lt;1.6.2-12.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556466" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556467" version="1" comment="kgraft-patch-4_4_180-94_103-default is &lt;9-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556468" version="1" comment="kgraft-patch-4_4_180-94_107-default is &lt;7-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556469" version="1" comment="kgraft-patch-4_4_180-94_113-default is &lt;6-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556470" version="1" comment="kgraft-patch-4_4_180-94_116-default is &lt;3-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556471" version="1" comment="kgraft-patch-4_4_180-94_121-default is &lt;2-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556472" version="1" comment="kgraft-patch-4_4_180-94_124-default is &lt;2-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556473" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;2-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556474" version="1" comment="MozillaFirefox is &lt;78.2.0-112.19.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556475" version="1" comment="MozillaFirefox-devel is &lt;78.2.0-112.19.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556476" version="1" comment="MozillaFirefox-translations-common is &lt;78.2.0-112.19.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556477" version="1" comment="kernel-default is &lt;4.4.180-94.130.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556478" version="1" comment="kernel-default-base is &lt;4.4.180-94.130.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556479" version="1" comment="kernel-default-devel is &lt;4.4.180-94.130.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556481" version="1" comment="kernel-syms is &lt;4.4.180-94.130.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556483" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.242-27.41.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556484" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.242-27.41.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556485" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.242-27.41.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556486" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.242-27.41.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556487" version="1" comment="libsolv-devel is &lt;0.6.36-2.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556488" version="1" comment="libsolv-tools is &lt;0.6.36-2.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556489" version="1" comment="perl-solv is &lt;0.6.36-2.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556490" version="1" comment="python-solv is &lt;0.6.36-2.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556491" version="1" comment="perl-DBI is &lt;1.628-5.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556492" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556493" version="1" comment="python3 is &lt;3.4.10-25.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556494" version="1" comment="python3-base is &lt;3.4.10-25.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556495" version="1" comment="python3-curses is &lt;3.4.10-25.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556496" version="1" comment="python3-devel is &lt;3.4.10-25.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556497" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556498" version="1" comment="libdcerpc0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556499" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556500" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556501" version="1" comment="libndr-standard0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556502" version="1" comment="libndr0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556503" version="1" comment="libnetapi0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556504" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556505" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556506" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556507" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556508" version="1" comment="libsamba-util0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556509" version="1" comment="libsamdb0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556510" version="1" comment="libsmbclient0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556511" version="1" comment="libsmbconf0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556512" version="1" comment="libsmbldap0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556513" version="1" comment="libtevent-util0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556514" version="1" comment="libwbclient0 is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556515" version="1" comment="samba is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556516" version="1" comment="samba-client is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556517" version="1" comment="samba-libs is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556518" version="1" comment="samba-winbind is &lt;4.6.16+git.237.40a3f495f75-3.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556519" version="1" comment="libQt5Concurrent5 is &lt;5.6.2-6.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556520" version="1" comment="libQt5Core5 is &lt;5.6.2-6.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556521" version="1" comment="libQt5DBus5 is &lt;5.6.2-6.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556522" version="1" comment="libQt5Gui5 is &lt;5.6.2-6.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556523" version="1" comment="libQt5Network5 is &lt;5.6.2-6.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556524" version="1" comment="libQt5OpenGL5 is &lt;5.6.2-6.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556525" version="1" comment="libQt5PrintSupport5 is &lt;5.6.2-6.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556526" version="1" comment="libQt5Sql5 is &lt;5.6.2-6.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556527" version="1" comment="libQt5Sql5-mysql is &lt;5.6.2-6.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556528" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.2-6.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556529" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.2-6.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556530" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.2-6.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556531" version="1" comment="libQt5Test5 is &lt;5.6.2-6.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556532" version="1" comment="libQt5Widgets5 is &lt;5.6.2-6.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556533" version="1" comment="libQt5Xml5 is &lt;5.6.2-6.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556534" version="1" comment="MozillaFirefox is &lt;78.3.0-112.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556535" version="1" comment="MozillaFirefox-devel is &lt;78.3.0-112.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556536" version="1" comment="MozillaFirefox-translations-common is &lt;78.3.0-112.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556537" version="1" comment="perl-DBI is &lt;1.628-5.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556538" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.271-43.41.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556539" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.271-43.41.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556540" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.271-43.41.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556541" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.271-43.41.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556542" version="1" comment="libXvnc1 is &lt;1.6.0-27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556543" version="1" comment="tigervnc is &lt;1.6.0-27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556544" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556545" version="1" comment="libproxy1 is &lt;0.4.13-18.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556546" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.13-18.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556547" version="1" comment="libproxy1-networkmanager is &lt;0.4.13-18.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556548" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.13-18.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556549" version="1" comment="ft2demos is &lt;2.6.3-7.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556550" version="1" comment="libfreetype6 is &lt;2.6.3-7.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556551" version="1" comment="glibc is &lt;2.22-113.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556552" version="1" comment="glibc-devel is &lt;2.22-113.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556553" version="1" comment="glibc-locale is &lt;2.22-113.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556554" version="1" comment="glibc-profile is &lt;2.22-113.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556555" version="1" comment="nscd is &lt;2.22-113.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556556" version="1" comment="MozillaFirefox is &lt;78.4.0-112.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556557" version="1" comment="MozillaFirefox-devel is &lt;78.4.0-112.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556558" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.0-112.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556559" version="1" comment="libspice-server1 is &lt;0.12.8-15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556560" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.33-3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556561" version="1" comment="libspice-client-glib-helper is &lt;0.33-3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556562" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.33-3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556563" version="1" comment="libspice-controller0 is &lt;0.33-3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556564" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.33-3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556565" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.33-3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556566" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556567" version="1" comment="libdcerpc0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556568" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556569" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556570" version="1" comment="libndr-standard0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556571" version="1" comment="libndr0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556572" version="1" comment="libnetapi0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556573" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556574" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556575" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556576" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556577" version="1" comment="libsamba-util0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556578" version="1" comment="libsamdb0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556579" version="1" comment="libsmbclient0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556580" version="1" comment="libsmbconf0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556581" version="1" comment="libsmbldap0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556582" version="1" comment="libtevent-util0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556583" version="1" comment="libwbclient0 is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556584" version="1" comment="samba is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556585" version="1" comment="samba-client is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556586" version="1" comment="samba-libs is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556587" version="1" comment="samba-winbind is &lt;4.6.16+git.248.c833312e640-3.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556588" version="1" comment="libvirt is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556589" version="1" comment="libvirt-admin is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556590" version="1" comment="libvirt-client is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556591" version="1" comment="libvirt-daemon is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556592" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556593" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556594" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556595" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556596" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556597" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556598" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556599" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556600" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556601" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556602" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556603" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556604" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556605" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556606" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556607" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556608" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556609" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556610" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556611" version="1" comment="libvirt-doc is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556612" version="1" comment="libvirt-libs is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556613" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556614" version="1" comment="libvirt-nss is &lt;3.3.0-5.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556615" version="1" comment="sane-backends is &lt;1.0.31-4.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556616" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.272-27.48.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556617" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.272-27.48.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556618" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.272-27.48.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556619" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.272-27.48.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556620" version="1" comment="kgraft-patch-4_4_180-94_124-default is &lt;3-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556621" version="1" comment="kgraft-patch-4_4_180-94_121-default is &lt;3-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556622" version="1" comment="kgraft-patch-4_4_180-94_116-default is &lt;4-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556623" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556624" version="1" comment="kgraft-patch-4_4_180-94_113-default is &lt;7-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556625" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556626" version="1" comment="kgraft-patch-4_4_180-94_107-default is &lt;8-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556627" version="1" comment="libasan6 is &lt;10.2.1+git583-1.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556628" version="1" comment="libatomic1 is &lt;10.2.1+git583-1.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556629" version="1" comment="libgcc_s1 is &lt;10.2.1+git583-1.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556630" version="1" comment="libgfortran5 is &lt;10.2.1+git583-1.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556631" version="1" comment="libgo16 is &lt;10.2.1+git583-1.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556632" version="1" comment="libgomp1 is &lt;10.2.1+git583-1.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556633" version="1" comment="libitm1 is &lt;10.2.1+git583-1.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556634" version="1" comment="liblsan0 is &lt;10.2.1+git583-1.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556635" version="1" comment="libobjc4 is &lt;10.2.1+git583-1.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556636" version="1" comment="libstdc++6 is &lt;10.2.1+git583-1.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556637" version="1" comment="libstdc++6-locale is &lt;10.2.1+git583-1.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556638" version="1" comment="libstdc++6-pp-gcc10 is &lt;10.2.1+git583-1.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556639" version="1" comment="libtsan0 is &lt;10.2.1+git583-1.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556640" version="1" comment="libubsan1 is &lt;10.2.1+git583-1.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556641" version="1" comment="libsystemd0 is &lt;228-150.82.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556642" version="1" comment="libudev-devel is &lt;228-150.82.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556643" version="1" comment="libudev1 is &lt;228-150.82.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556644" version="1" comment="systemd is &lt;228-150.82.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556645" version="1" comment="systemd-sysvinit is &lt;228-150.82.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556646" version="1" comment="udev is &lt;228-150.82.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556647" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.281-43.44.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556648" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.281-43.44.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556649" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.281-43.44.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556650" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.281-43.44.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556651" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.77.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556652" version="1" comment="openldap2 is &lt;2.4.41-18.77.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556653" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.77.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556654" version="1" comment="openldap2-client is &lt;2.4.41-18.77.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556655" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.77.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556656" version="1" comment="MozillaFirefox is &lt;78.4.1-112.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556657" version="1" comment="MozillaFirefox-devel is &lt;78.4.1-112.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556658" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.1-112.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556659" version="1" comment="libecpg6 is &lt;12.4-3.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556660" version="1" comment="libpq5 is &lt;12.4-3.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556661" version="1" comment="postgresql10 is &lt;10.14-4.4.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556662" version="1" comment="postgresql10-contrib is &lt;10.14-4.4.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556663" version="1" comment="postgresql10-plperl is &lt;10.14-4.4.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556664" version="1" comment="postgresql10-plpython is &lt;10.14-4.4.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556665" version="1" comment="postgresql10-pltcl is &lt;10.14-4.4.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556666" version="1" comment="postgresql10-server is &lt;10.14-4.4.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556667" version="1" comment="postgresql96 is &lt;9.6.19-6.4.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556668" version="1" comment="postgresql96-contrib is &lt;9.6.19-6.4.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556669" version="1" comment="postgresql96-plperl is &lt;9.6.19-6.4.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556670" version="1" comment="postgresql96-plpython is &lt;9.6.19-6.4.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556671" version="1" comment="postgresql96-pltcl is &lt;9.6.19-6.4.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556672" version="1" comment="postgresql96-server is &lt;9.6.19-6.4.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556673" version="1" comment="libraptor2-0 is &lt;2.0.15-5.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556674" version="1" comment="krb5 is &lt;1.12.5-40.40.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556675" version="1" comment="krb5-client is &lt;1.12.5-40.40.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556676" version="1" comment="krb5-doc is &lt;1.12.5-40.40.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556677" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.40.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556678" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.40.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556679" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.40.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556680" version="1" comment="krb5-server is &lt;1.12.5-40.40.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556681" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556682" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556683" version="1" comment="kgraft-patch-4_4_180-94_124-default is &lt;4-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556684" version="1" comment="kgraft-patch-4_4_180-94_121-default is &lt;4-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556685" version="1" comment="kgraft-patch-4_4_180-94_116-default is &lt;5-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556686" version="1" comment="kgraft-patch-4_4_180-94_113-default is &lt;8-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556687" version="1" comment="kgraft-patch-4_4_180-94_107-default is &lt;9-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556688" version="1" comment="postgresql10 is &lt;10.15-4.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556689" version="1" comment="postgresql10-contrib is &lt;10.15-4.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556690" version="1" comment="postgresql10-plperl is &lt;10.15-4.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556691" version="1" comment="postgresql10-plpython is &lt;10.15-4.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556692" version="1" comment="postgresql10-pltcl is &lt;10.15-4.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556693" version="1" comment="postgresql10-server is &lt;10.15-4.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556694" version="1" comment="postgresql96 is &lt;9.6.20-6.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556695" version="1" comment="postgresql96-contrib is &lt;9.6.20-6.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556696" version="1" comment="postgresql96-plperl is &lt;9.6.20-6.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556697" version="1" comment="postgresql96-plpython is &lt;9.6.20-6.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556698" version="1" comment="postgresql96-pltcl is &lt;9.6.20-6.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556699" version="1" comment="postgresql96-server is &lt;9.6.20-6.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556700" version="1" comment="kernel-default is &lt;4.4.180-94.135.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556701" version="1" comment="kernel-default-base is &lt;4.4.180-94.135.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556702" version="1" comment="kernel-default-devel is &lt;4.4.180-94.135.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556704" version="1" comment="kernel-syms is &lt;4.4.180-94.135.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556706" version="1" comment="bluez is &lt;5.13-5.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556707" version="1" comment="libbluetooth3 is &lt;5.13-5.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556708" version="1" comment="MozillaFirefox is &lt;78.5.0-112.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556709" version="1" comment="MozillaFirefox-devel is &lt;78.5.0-112.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556710" version="1" comment="MozillaFirefox-translations-common is &lt;78.5.0-112.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556711" version="1" comment="libvncclient0 is &lt;0.9.9-17.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556712" version="1" comment="libvncserver0 is &lt;0.9.9-17.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556713" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556714" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556715" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556716" version="1" comment="python3 is &lt;3.4.10-25.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556717" version="1" comment="python3-base is &lt;3.4.10-25.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556718" version="1" comment="python3-curses is &lt;3.4.10-25.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556719" version="1" comment="python3-devel is &lt;3.4.10-25.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556720" version="1" comment="gdm is &lt;3.10.0.1-54.17.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556721" version="1" comment="libgdm1 is &lt;3.10.0.1-54.17.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556722" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-54.17.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556723" version="1" comment="python-cryptography is &lt;2.1.4-7.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556724" version="1" comment="python3-cryptography is &lt;2.1.4-7.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556725" version="1" comment="libecpg6 is &lt;12.5-3.9.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556726" version="1" comment="libpq5 is &lt;12.5-3.9.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556727" version="1" comment="mutt is &lt;1.10.1-55.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556728" version="1" comment="kgraft-patch-4_4_180-94_113-default is &lt;9-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556729" version="1" comment="kgraft-patch-4_4_180-94_116-default is &lt;6-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556730" version="1" comment="kgraft-patch-4_4_180-94_121-default is &lt;5-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556731" version="1" comment="kgraft-patch-4_4_180-94_124-default is &lt;5-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556732" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556733" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556734" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556735" version="1" comment="dbus-1 is &lt;1.8.22-29.17.12 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556736" version="1" comment="dbus-1-x11 is &lt;1.8.22-29.17.12 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556737" version="1" comment="libdbus-1-3 is &lt;1.8.22-29.17.7 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556738" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.63.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556739" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.63.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556740" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.63.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556741" version="1" comment="openssl is &lt;1.0.2j-60.63.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556742" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.59.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556743" version="1" comment="python is &lt;2.7.17-28.59.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556744" version="1" comment="python-base is &lt;2.7.17-28.59.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556745" version="1" comment="python-curses is &lt;2.7.17-28.59.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556746" version="1" comment="python-demo is &lt;2.7.17-28.59.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556747" version="1" comment="python-devel is &lt;2.7.17-28.59.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556748" version="1" comment="python-gdbm is &lt;2.7.17-28.59.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556749" version="1" comment="python-idle is &lt;2.7.17-28.59.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556750" version="1" comment="python-tk is &lt;2.7.17-28.59.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556751" version="1" comment="python-xml is &lt;2.7.17-28.59.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556752" version="1" comment="MozillaFirefox is &lt;68.5.0-109.106.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556753" version="1" comment="MozillaFirefox-translations-common is &lt;68.5.0-109.106.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556754" version="1" comment="MozillaFirefox is &lt;78.6.0-112.39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556755" version="1" comment="MozillaFirefox-devel is &lt;78.6.0-112.39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556756" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.0-112.39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556757" version="1" comment="clamav is &lt;0.103.0-33.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556758" version="1" comment="cyrus-sasl is &lt;2.1.26-8.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556759" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-8.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556760" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-8.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556761" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-8.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556762" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-8.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556763" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-8.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556764" version="1" comment="libsasl2-3 is &lt;2.1.26-8.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556765" version="1" comment="libasan5 is &lt;9.2.1+r275327-1.3.9 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556766" version="1" comment="libatomic1 is &lt;9.2.1+r275327-1.3.9 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556767" version="1" comment="libgcc_s1 is &lt;9.2.1+r275327-1.3.9 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556768" version="1" comment="libgfortran5 is &lt;9.2.1+r275327-1.3.9 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556769" version="1" comment="libgo14 is &lt;9.2.1+r275327-1.3.9 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556770" version="1" comment="libgomp1 is &lt;9.2.1+r275327-1.3.9 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556771" version="1" comment="libitm1 is &lt;9.2.1+r275327-1.3.9 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556772" version="1" comment="liblsan0 is &lt;9.2.1+r275327-1.3.9 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556773" version="1" comment="libstdc++6 is &lt;9.2.1+r275327-1.3.9 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556774" version="1" comment="libstdc++6-locale is &lt;9.2.1+r275327-1.3.9 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556775" version="1" comment="libtsan0 is &lt;9.2.1+r275327-1.3.9 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556776" version="1" comment="libubsan1 is &lt;9.2.1+r275327-1.3.9 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556777" version="1" comment="sudo is &lt;1.8.20p2-3.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556778" version="1" comment="libexif12 is &lt;0.6.21-8.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556779" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556780" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556781" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556782" version="1" comment="openssl is &lt;1.0.2j-60.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556783" version="1" comment="ppp is &lt;2.4.7-4.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556784" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.39.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556785" version="1" comment="python3 is &lt;3.4.10-25.39.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556786" version="1" comment="python3-base is &lt;3.4.10-25.39.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556787" version="1" comment="python3-curses is &lt;3.4.10-25.39.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556788" version="1" comment="python3-devel is &lt;3.4.10-25.39.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556789" version="1" comment="libmysqlclient18 is &lt;10.0.40.2-29.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556790" version="1" comment="mariadb is &lt;10.0.40.2-29.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556791" version="1" comment="mariadb-client is &lt;10.0.40.2-29.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556792" version="1" comment="mariadb-errormessages is &lt;10.0.40.2-29.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556793" version="1" comment="mariadb-tools is &lt;10.0.40.2-29.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556794" version="1" comment="permissions is &lt;2015.09.28.1626-17.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556795" version="1" comment="python-PyYAML is &lt;5.1.2-26.9.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556796" version="1" comment="python3-PyYAML is &lt;5.1.2-26.9.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556797" version="1" comment="postgresql96 is &lt;9.6.17-3.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556798" version="1" comment="postgresql96-contrib is &lt;9.6.17-3.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556799" version="1" comment="postgresql96-plperl is &lt;9.6.17-3.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556800" version="1" comment="postgresql96-plpython is &lt;9.6.17-3.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556801" version="1" comment="postgresql96-pltcl is &lt;9.6.17-3.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556802" version="1" comment="postgresql96-server is &lt;9.6.17-3.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556803" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.251-43.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556804" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.251-43.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556805" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.251-43.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556806" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.251-43.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556807" version="1" comment="ipmitool is &lt;1.8.18-5.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556808" version="1" comment="squid is &lt;3.5.21-26.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556809" version="1" comment="MozillaFirefox is &lt;68.4.1-109.101.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556810" version="1" comment="MozillaFirefox-translations-common is &lt;68.4.1-109.101.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556811" version="1" comment="libecpg6 is &lt;10.12-1.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556812" version="1" comment="libpq5 is &lt;10.12-1.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556813" version="1" comment="postgresql10 is &lt;10.12-1.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556814" version="1" comment="postgresql10-contrib is &lt;10.12-1.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556815" version="1" comment="postgresql10-plperl is &lt;10.12-1.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556816" version="1" comment="postgresql10-plpython is &lt;10.12-1.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556817" version="1" comment="postgresql10-pltcl is &lt;10.12-1.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556818" version="1" comment="postgresql10-server is &lt;10.12-1.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556819" version="1" comment="MozillaFirefox is &lt;68.6.0-109.110.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556820" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.0-109.110.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556821" version="1" comment="libzypp is &lt;16.21.2-2.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556822" version="1" comment="libzypp-devel is &lt;16.21.2-2.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556823" version="1" comment="python-cffi is &lt;1.11.2-5.11.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556824" version="1" comment="python-cryptography is &lt;2.1.4-7.28.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556825" version="1" comment="python-xattr is &lt;0.7.5-6.3.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556826" version="1" comment="python3-cffi is &lt;1.11.2-5.11.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556827" version="1" comment="python3-cryptography is &lt;2.1.4-7.28.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556828" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.2-44.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556829" version="1" comment="spamassassin is &lt;3.4.2-44.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556830" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556831" version="1" comment="python3 is &lt;3.4.10-25.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556832" version="1" comment="python3-base is &lt;3.4.10-25.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556833" version="1" comment="python3-curses is &lt;3.4.10-25.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556834" version="1" comment="python3-devel is &lt;3.4.10-25.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556835" version="1" comment="kgraft-patch-4_4_176-94_88-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556836" version="1" comment="libfreebl3 is &lt;3.47.1-58.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556837" version="1" comment="libfreebl3-hmac is &lt;3.47.1-58.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556838" version="1" comment="libsoftokn3 is &lt;3.47.1-58.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556839" version="1" comment="libsoftokn3-hmac is &lt;3.47.1-58.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556840" version="1" comment="mozilla-nspr is &lt;4.23-19.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556841" version="1" comment="mozilla-nspr-devel is &lt;4.23-19.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556842" version="1" comment="mozilla-nss is &lt;3.47.1-58.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556843" version="1" comment="mozilla-nss-certs is &lt;3.47.1-58.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556844" version="1" comment="mozilla-nss-devel is &lt;3.47.1-58.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556845" version="1" comment="mozilla-nss-sysinit is &lt;3.47.1-58.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556846" version="1" comment="mozilla-nss-tools is &lt;3.47.1-58.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556847" version="1" comment="kgraft-patch-4_4_180-94_113-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556848" version="1" comment="kgraft-patch-4_4_180-94_107-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556849" version="1" comment="kgraft-patch-4_4_180-94_103-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556850" version="1" comment="kgraft-patch-4_4_180-94_100-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556851" version="1" comment="kgraft-patch-4_4_180-94_97-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556852" version="1" comment="kgraft-patch-4_4_178-94_91-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556853" version="1" comment="libxslt-tools is &lt;1.1.28-17.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556854" version="1" comment="libxslt1 is &lt;1.1.28-17.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556855" version="1" comment="MozillaFirefox is &lt;68.6.1-109.113.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556856" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.1-109.113.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556857" version="1" comment="MozillaFirefox is &lt;68.7.0-109.116.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556858" version="1" comment="MozillaFirefox-translations-common is &lt;68.7.0-109.116.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556859" version="1" comment="git-core is &lt;2.26.0-27.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556860" version="1" comment="libpcre2-16-0 is &lt;10.34-1.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556861" version="1" comment="libpcre2-32-0 is &lt;10.34-1.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556862" version="1" comment="libpcre2-8-0 is &lt;10.34-1.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556863" version="1" comment="libpcre2-posix2 is &lt;10.34-1.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556864" version="1" comment="kgraft-patch-4_4_180-94_116-default is &lt;9-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556865" version="1" comment="kgraft-patch-4_4_180-94_121-default is &lt;8-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556866" version="1" comment="kgraft-patch-4_4_180-94_124-default is &lt;8-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556867" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;8-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556868" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;7-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556869" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;5-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556870" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;3-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556871" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;2-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556872" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.5-44.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556873" version="1" comment="spamassassin is &lt;3.4.5-44.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556874" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556875" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556876" version="1" comment="clamav is &lt;0.103.2-33.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556877" version="1" comment="qemu is &lt;2.9.1-6.47.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556878" version="1" comment="qemu-block-curl is &lt;2.9.1-6.47.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556879" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.47.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556880" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.47.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556881" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.47.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556882" version="1" comment="qemu-lang is &lt;2.9.1-6.47.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556883" version="1" comment="qemu-tools is &lt;2.9.1-6.47.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556884" version="1" comment="sudo is &lt;1.8.20p2-3.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556885" version="1" comment="MozillaFirefox is &lt;78.10.0-112.57.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556886" version="1" comment="MozillaFirefox-devel is &lt;78.10.0-112.57.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556887" version="1" comment="MozillaFirefox-translations-common is &lt;78.10.0-112.57.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556888" version="1" comment="kgraft-patch-4_4_180-94_124-default is &lt;9-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556889" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;9-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556890" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;8-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556891" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;4-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556892" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;3-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556893" version="1" comment="kgraft-patch-4_4_180-94_116-default is &lt;10-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556894" version="1" comment="kgraft-patch-4_4_180-94_121-default is &lt;9-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556895" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;6-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556896" version="1" comment="libhogweed2 is &lt;2.7.1-13.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556897" version="1" comment="libnettle4 is &lt;2.7.1-13.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556898" version="1" comment="gdm is &lt;3.10.0.1-54.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556899" version="1" comment="libgdm1 is &lt;3.10.0.1-54.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556900" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-54.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556901" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.291-43.47.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556902" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.291-43.47.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556903" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.291-43.47.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556904" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.291-43.47.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556905" version="1" comment="cups is &lt;1.7.5-20.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556906" version="1" comment="cups-client is &lt;1.7.5-20.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556907" version="1" comment="cups-libs is &lt;1.7.5-20.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556908" version="1" comment="bind is &lt;9.9.9P1-63.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556909" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556910" version="1" comment="bind-libs is &lt;9.9.9P1-63.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556911" version="1" comment="bind-utils is &lt;9.9.9P1-63.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556912" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556913" version="1" comment="libdcerpc0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556914" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556915" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556916" version="1" comment="libndr-standard0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556917" version="1" comment="libndr0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556918" version="1" comment="libnetapi0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556919" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556920" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556921" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556922" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556923" version="1" comment="libsamba-util0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556924" version="1" comment="libsamdb0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556925" version="1" comment="libsmbclient0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556926" version="1" comment="libsmbconf0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556927" version="1" comment="libsmbldap0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556928" version="1" comment="libtevent-util0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556929" version="1" comment="libwbclient0 is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556930" version="1" comment="samba is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556931" version="1" comment="samba-client is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556932" version="1" comment="samba-libs is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556933" version="1" comment="samba-winbind is &lt;4.6.16+git.282.cfafed5922a-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556934" version="1" comment="avahi is &lt;0.6.32-32.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556935" version="1" comment="avahi-utils is &lt;0.6.32-32.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556936" version="1" comment="libavahi-client3 is &lt;0.6.32-32.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556937" version="1" comment="libavahi-common3 is &lt;0.6.32-32.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556938" version="1" comment="libavahi-core7 is &lt;0.6.32-32.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556939" version="1" comment="libavahi-glib1 is &lt;0.6.32-32.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556940" version="1" comment="libdns_sd is &lt;0.6.32-32.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556941" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.71.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556942" version="1" comment="python3 is &lt;3.4.10-25.71.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556943" version="1" comment="python3-base is &lt;3.4.10-25.71.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556944" version="1" comment="python3-curses is &lt;3.4.10-25.71.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556945" version="1" comment="python3-devel is &lt;3.4.10-25.71.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556946" version="1" comment="kernel-default is &lt;4.4.180-94.144.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556947" version="1" comment="kernel-default-base is &lt;4.4.180-94.144.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556948" version="1" comment="kernel-default-devel is &lt;4.4.180-94.144.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556950" version="1" comment="kernel-syms is &lt;4.4.180-94.144.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556952" version="1" comment="libdjvulibre21 is &lt;3.5.25.3-5.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556953" version="1" comment="graphviz is &lt;2.28.0-29.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556954" version="1" comment="graphviz-gd is &lt;2.28.0-29.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556955" version="1" comment="graphviz-gnome is &lt;2.28.0-29.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556956" version="1" comment="graphviz-tcl is &lt;2.28.0-29.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556957" version="1" comment="libxml2-2 is &lt;2.9.4-46.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556958" version="1" comment="libxml2-tools is &lt;2.9.4-46.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556959" version="1" comment="python-libxml2 is &lt;2.9.4-46.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556960" version="1" comment="dnsmasq is &lt;2.78-18.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556961" version="1" comment="libFLAC++6 is &lt;1.3.0-12.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556962" version="1" comment="libFLAC8 is &lt;1.3.0-12.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556963" version="1" comment="dovecot22 is &lt;2.2.31-19.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556964" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556965" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556966" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556967" version="1" comment="libdjvulibre21 is &lt;3.5.25.3-5.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556968" version="1" comment="dhcp is &lt;4.3.3-10.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556969" version="1" comment="dhcp-client is &lt;4.3.3-10.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556970" version="1" comment="dhcp-relay is &lt;4.3.3-10.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556971" version="1" comment="dhcp-server is &lt;4.3.3-10.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556972" version="1" comment="libwebp5 is &lt;0.4.3-4.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556973" version="1" comment="libwebpdemux1 is &lt;0.4.3-4.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556974" version="1" comment="libpolkit0 is &lt;0.113-5.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556975" version="1" comment="polkit is &lt;0.113-5.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556976" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556977" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;7-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556978" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;9-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556979" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;10-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556980" version="1" comment="kgraft-patch-4_4_180-94_124-default is &lt;10-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556981" version="1" comment="kgraft-patch-4_4_180-94_121-default is &lt;10-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556982" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;4-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556983" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;5-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556984" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-18.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556985" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-18.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556986" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-18.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556987" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-18.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556988" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-18.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556989" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-18.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556990" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-18.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556991" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-18.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556992" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-18.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556993" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-18.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556994" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-18.3.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556995" version="1" comment="MozillaFirefox is &lt;78.11.0-112.62.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556996" version="1" comment="MozillaFirefox-devel is &lt;78.11.0-112.62.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556997" version="1" comment="MozillaFirefox-translations-common is &lt;78.11.0-112.62.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556998" version="1" comment="libX11-6 is &lt;1.6.2-12.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009556999" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557000" version="1" comment="qemu is &lt;2.9.1-6.50.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557001" version="1" comment="qemu-block-curl is &lt;2.9.1-6.50.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557002" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.50.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557003" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.50.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557004" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.50.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557005" version="1" comment="qemu-lang is &lt;2.9.1-6.50.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557006" version="1" comment="qemu-tools is &lt;2.9.1-6.50.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557007" version="1" comment="libspice-server1 is &lt;0.12.8-18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557008" version="1" comment="caribou-common is &lt;0.4.21-8.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557009" version="1" comment="libcaribou0 is &lt;0.4.21-8.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557010" version="1" comment="typelib-1_0-Caribou-1_0 is &lt;0.4.21-8.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557011" version="1" comment="freeradius-server is &lt;3.0.15-2.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557012" version="1" comment="freeradius-server-doc is &lt;3.0.15-2.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557013" version="1" comment="freeradius-server-krb5 is &lt;3.0.15-2.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557014" version="1" comment="freeradius-server-ldap is &lt;3.0.15-2.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557015" version="1" comment="freeradius-server-libs is &lt;3.0.15-2.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557016" version="1" comment="freeradius-server-mysql is &lt;3.0.15-2.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557017" version="1" comment="freeradius-server-perl is &lt;3.0.15-2.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557018" version="1" comment="freeradius-server-postgresql is &lt;3.0.15-2.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557019" version="1" comment="freeradius-server-python is &lt;3.0.15-2.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557020" version="1" comment="freeradius-server-sqlite is &lt;3.0.15-2.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557021" version="1" comment="freeradius-server-utils is &lt;3.0.15-2.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557022" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.292-27.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557023" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.292-27.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557024" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.292-27.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557025" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.292-27.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557032" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.154.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557033" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.154.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557034" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.154.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557035" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.154.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557036" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.1-2.63.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557037" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.1-2.63.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557038" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.1-2.63.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557039" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.1-2.63.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557040" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.1-2.63.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557041" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.1-2.63.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557042" version="1" comment="apache2 is &lt;2.4.23-29.74.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557043" version="1" comment="apache2-example-pages is &lt;2.4.23-29.74.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557044" version="1" comment="apache2-prefork is &lt;2.4.23-29.74.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557045" version="1" comment="apache2-utils is &lt;2.4.23-29.74.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557046" version="1" comment="apache2-worker is &lt;2.4.23-29.74.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557047" version="1" comment="xterm is &lt;308-5.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557048" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557049" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;5-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557050" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;6-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557051" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;8-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557052" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;10-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557053" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;11-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557054" version="1" comment="kgraft-patch-4_4_180-94_124-default is &lt;11-2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557055" version="1" comment="libhogweed2 is &lt;2.7.1-13.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557056" version="1" comment="libnettle4 is &lt;2.7.1-13.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557057" version="1" comment="libgcrypt20 is &lt;1.6.1-16.77.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557058" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.77.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557059" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557060" version="1" comment="openexr is &lt;2.1.0-6.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557061" version="1" comment="libecpg6 is &lt;13.1-3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557062" version="1" comment="libpq5 is &lt;13.1-3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615945" version="1" comment="arpwatch is &lt;2.1a15-159.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615946" version="1" comment="libsolv-devel is &lt;0.6.37-2.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615947" version="1" comment="libsolv-tools is &lt;0.6.37-2.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615948" version="1" comment="libzypp is &lt;16.21.4-2.51.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615949" version="1" comment="libzypp-devel is &lt;16.21.4-2.51.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615950" version="1" comment="perl-solv is &lt;0.6.37-2.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615951" version="1" comment="python-solv is &lt;0.6.37-2.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557063" version="1" comment="openssh is &lt;7.2p2-74.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557064" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557065" version="1" comment="openssh-fips is &lt;7.2p2-74.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557066" version="1" comment="openssh-helpers is &lt;7.2p2-74.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557067" version="1" comment="sudo is &lt;1.8.20p2-3.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625448" version="1" comment="MozillaFirefox is &lt;78.12.0-112.65.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625449" version="1" comment="MozillaFirefox-devel is &lt;78.12.0-112.65.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625450" version="1" comment="MozillaFirefox-translations-common is &lt;78.12.0-112.65.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557068" version="1" comment="MozillaFirefox is &lt;78.7.0-112.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557069" version="1" comment="MozillaFirefox-devel is &lt;78.7.0-112.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557070" version="1" comment="MozillaFirefox-translations-common is &lt;78.7.0-112.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626126" version="1" comment="libsystemd0 is &lt;228-150.98.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626127" version="1" comment="libudev-devel is &lt;228-150.98.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626128" version="1" comment="libudev1 is &lt;228-150.98.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626129" version="1" comment="systemd is &lt;228-150.98.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626130" version="1" comment="systemd-devel is &lt;228-150.98.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626131" version="1" comment="systemd-sysvinit is &lt;228-150.98.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626132" version="1" comment="udev is &lt;228-150.98.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626133" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626134" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;6-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626135" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;7-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626136" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;9-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626137" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;11-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626138" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;12-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626139" version="1" comment="linuxptp is &lt;1.4-15.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626309" version="1" comment="kernel-default is &lt;4.4.180-94.147.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626310" version="1" comment="kernel-default-base is &lt;4.4.180-94.147.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626311" version="1" comment="kernel-default-devel is &lt;4.4.180-94.147.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626313" version="1" comment="kernel-syms is &lt;4.4.180-94.147.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626866" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626867" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;7-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626868" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;8-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626869" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;10-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626870" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;12-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626871" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;13-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627033" version="1" comment="qemu is &lt;2.9.1-6.53.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627034" version="1" comment="qemu-block-curl is &lt;2.9.1-6.53.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627035" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.53.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627036" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.53.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627037" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.53.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627038" version="1" comment="qemu-lang is &lt;2.9.1-6.53.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627039" version="1" comment="qemu-tools is &lt;2.9.1-6.53.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627335" version="1" comment="dbus-1 is &lt;1.8.22-29.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627336" version="1" comment="dbus-1-x11 is &lt;1.8.22-29.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627337" version="1" comment="libdbus-1-3 is &lt;1.8.22-29.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627819" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.3-2.66.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627820" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.3-2.66.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627821" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.3-2.66.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627822" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.3-2.66.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627823" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.3-2.66.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627824" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.3-2.66.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628148" version="1" comment="libdjvulibre21 is &lt;3.5.25.3-5.19.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630922" version="1" comment="cpio is &lt;2.11-36.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631063" version="1" comment="libcares2 is &lt;1.9.1-9.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631064" version="1" comment="MozillaFirefox is &lt;78.13.0-112.68.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631065" version="1" comment="MozillaFirefox-devel is &lt;78.13.0-112.68.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631066" version="1" comment="MozillaFirefox-translations-common is &lt;78.13.0-112.68.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631321" version="1" comment="cpio is &lt;2.11-36.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631417" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.302-27.63.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631418" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.302-27.63.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631419" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.302-27.63.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631420" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.302-27.63.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631581" version="1" comment="cpio is &lt;2.11-36.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631706" version="1" comment="python-PyYAML is &lt;5.3.1-28.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631707" version="1" comment="python3-PyYAML is &lt;5.3.1-28.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631708" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.69.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631709" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.69.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631710" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.69.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631711" version="1" comment="openssl is &lt;1.0.2j-60.69.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557071" version="1" comment="openvswitch is &lt;2.7.12-3.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631829" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;14-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631830" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;13-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631831" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;11-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631832" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;9-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631833" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;8-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631834" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631835" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631836" version="1" comment="aspell is &lt;0.60.6.1-18.11.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631837" version="1" comment="aspell-ispell is &lt;0.60.6.1-18.11.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631838" version="1" comment="libaspell15 is &lt;0.60.6.1-18.11.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632085" version="1" comment="bind is &lt;9.9.9P1-63.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632086" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632087" version="1" comment="bind-libs is &lt;9.9.9P1-63.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632088" version="1" comment="bind-utils is &lt;9.9.9P1-63.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632300" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632301" version="1" comment="openexr is &lt;2.1.0-6.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632302" version="1" comment="libesmtp is &lt;1.0.6-17.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632303" version="1" comment="file is &lt;5.22-10.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632304" version="1" comment="file-magic is &lt;5.22-10.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632305" version="1" comment="libmagic1 is &lt;5.22-10.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633061" version="1" comment="libfreebl3 is &lt;3.68-58.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633062" version="1" comment="libfreebl3-hmac is &lt;3.68-58.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633063" version="1" comment="libsoftokn3 is &lt;3.68-58.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633064" version="1" comment="libsoftokn3-hmac is &lt;3.68-58.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633065" version="1" comment="mozilla-nspr is &lt;4.32-19.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633066" version="1" comment="mozilla-nspr-devel is &lt;4.32-19.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633067" version="1" comment="mozilla-nss is &lt;3.68-58.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633068" version="1" comment="mozilla-nss-certs is &lt;3.68-58.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633069" version="1" comment="mozilla-nss-devel is &lt;3.68-58.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633070" version="1" comment="mozilla-nss-sysinit is &lt;3.68-58.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633071" version="1" comment="mozilla-nss-tools is &lt;3.68-58.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633022" version="1" comment="transfig is &lt;3.2.8a-2.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633023" version="1" comment="libgtk-vnc-1_0-0 is &lt;0.6.0-11.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633024" version="1" comment="libgtk-vnc-2_0-0 is &lt;0.6.0-11.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633025" version="1" comment="libgvnc-1_0-0 is &lt;0.6.0-11.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633026" version="1" comment="python-gtk-vnc is &lt;0.6.0-11.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633027" version="1" comment="typelib-1_0-GVnc-1_0 is &lt;0.6.0-11.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633028" version="1" comment="typelib-1_0-GtkVnc-2_0 is &lt;0.6.0-11.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633638" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.72.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633639" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.72.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633640" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.72.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633641" version="1" comment="openssl is &lt;1.0.2j-60.72.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633669" version="1" comment="ghostscript is &lt;9.52-23.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633670" version="1" comment="ghostscript-devel is &lt;9.52-23.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633671" version="1" comment="ghostscript-x11 is &lt;9.52-23.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633672" version="1" comment="libspectre-devel is &lt;0.2.7-12.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633673" version="1" comment="libspectre1 is &lt;0.2.7-12.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633854" version="1" comment="MozillaFirefox is &lt;91.1.0-112.71.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633855" version="1" comment="MozillaFirefox-branding-SLE is &lt;91-35.6.6 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633856" version="1" comment="MozillaFirefox-devel is &lt;91.1.0-112.71.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633857" version="1" comment="MozillaFirefox-translations-common is &lt;91.1.0-112.71.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633919" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;12-2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633920" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;3-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633921" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;6-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633922" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;9-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633923" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;10-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633924" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;14-2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633925" version="1" comment="libsqlite3-0 is &lt;3.36.0-9.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633926" version="1" comment="sqlite3 is &lt;3.36.0-9.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633927" version="1" comment="sqlite3-devel is &lt;3.36.0-9.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651268" version="1" comment="glibc is &lt;2.22-116.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651269" version="1" comment="glibc-devel is &lt;2.22-116.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651270" version="1" comment="glibc-locale is &lt;2.22-116.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651271" version="1" comment="glibc-profile is &lt;2.22-116.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651272" version="1" comment="nscd is &lt;2.22-116.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651273" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.4-2.71.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651274" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.4-2.71.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651275" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.4-2.71.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651276" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.4-2.71.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651277" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.4-2.71.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651278" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.4-2.71.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651279" version="1" comment="apache2 is &lt;2.4.23-29.80.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651280" version="1" comment="apache2-example-pages is &lt;2.4.23-29.80.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651281" version="1" comment="apache2-prefork is &lt;2.4.23-29.80.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651282" version="1" comment="apache2-utils is &lt;2.4.23-29.80.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651283" version="1" comment="apache2-worker is &lt;2.4.23-29.80.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557072" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.63.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557073" version="1" comment="python3 is &lt;3.4.10-25.63.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557074" version="1" comment="python3-base is &lt;3.4.10-25.63.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557075" version="1" comment="python3-curses is &lt;3.4.10-25.63.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557076" version="1" comment="python3-devel is &lt;3.4.10-25.63.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652541" version="1" comment="MozillaFirefox is &lt;91.2.0-112.74.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652542" version="1" comment="MozillaFirefox-devel is &lt;91.2.0-112.74.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652543" version="1" comment="MozillaFirefox-translations-common is &lt;91.2.0-112.74.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652626" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652627" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652628" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;13-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652629" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;11-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652630" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;10-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652825" version="1" comment="libblkid1 is &lt;2.29.2-3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652826" version="1" comment="libfdisk1 is &lt;2.29.2-3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652827" version="1" comment="libmount1 is &lt;2.29.2-3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652828" version="1" comment="libsmartcols1 is &lt;2.29.2-3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652829" version="1" comment="libuuid1 is &lt;2.29.2-3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652830" version="1" comment="python-libmount is &lt;2.29.2-3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652831" version="1" comment="util-linux is &lt;2.29.2-3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652832" version="1" comment="util-linux-systemd is &lt;2.29.2-3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652833" version="1" comment="uuidd is &lt;2.29.2-3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652834" version="1" comment="strongswan is &lt;5.1.3-26.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652835" version="1" comment="strongswan-hmac is &lt;5.1.3-26.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652836" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652837" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652883" version="1" comment="postgresql10 is &lt;10.18-4.19.6 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652884" version="1" comment="postgresql10-contrib is &lt;10.18-4.19.6 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652885" version="1" comment="postgresql10-plperl is &lt;10.18-4.19.6 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652886" version="1" comment="postgresql10-plpython is &lt;10.18-4.19.6 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652887" version="1" comment="postgresql10-pltcl is &lt;10.18-4.19.6 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652888" version="1" comment="postgresql10-server is &lt;10.18-4.19.6 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653690" version="1" comment="opensc is &lt;0.13.0-3.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653691" version="1" comment="transfig is &lt;3.2.8b-2.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653890" version="1" comment="binutils is &lt;2.37-9.39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653891" version="1" comment="binutils-devel is &lt;2.37-9.39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653892" version="1" comment="libctf-nobfd0 is &lt;2.37-9.39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653893" version="1" comment="libctf0 is &lt;2.37-9.39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654626" version="1" comment="binutils is &lt;2.37-9.44.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654627" version="1" comment="binutils-devel is &lt;2.37-9.44.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654628" version="1" comment="libctf-nobfd0 is &lt;2.37-9.44.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654629" version="1" comment="libctf0 is &lt;2.37-9.44.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655259" version="1" comment="libpcre1 is &lt;8.45-8.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655260" version="1" comment="libpcre16-0 is &lt;8.45-8.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655261" version="1" comment="libpcrecpp0 is &lt;8.45-8.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655262" version="1" comment="libpcreposix0 is &lt;8.45-8.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655263" version="1" comment="pcre-devel is &lt;8.45-8.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655264" version="1" comment="qemu is &lt;2.9.1-43.62.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655265" version="1" comment="qemu-block-curl is &lt;2.9.1-43.62.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655266" version="1" comment="qemu-block-iscsi is &lt;2.9.1-43.62.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655267" version="1" comment="qemu-block-ssh is &lt;2.9.1-43.62.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655268" version="1" comment="qemu-guest-agent is &lt;2.9.1-43.62.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655269" version="1" comment="qemu-lang is &lt;2.9.1-43.62.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655270" version="1" comment="qemu-tools is &lt;2.9.1-43.62.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656909" version="1" comment="MozillaFirefox is &lt;91.3.0-112.80.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656910" version="1" comment="MozillaFirefox-devel is &lt;91.3.0-112.80.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656911" version="1" comment="MozillaFirefox-translations-common is &lt;91.3.0-112.80.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657099" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657100" version="1" comment="libdcerpc0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657101" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657102" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657103" version="1" comment="libndr-standard0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657104" version="1" comment="libndr0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657105" version="1" comment="libnetapi0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657106" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657107" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657108" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657109" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657110" version="1" comment="libsamba-util0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657111" version="1" comment="libsamdb0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657112" version="1" comment="libsmbclient0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657113" version="1" comment="libsmbconf0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657114" version="1" comment="libsmbldap0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657115" version="1" comment="libtevent-util0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657116" version="1" comment="libwbclient0 is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657117" version="1" comment="samba is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657118" version="1" comment="samba-client is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657119" version="1" comment="samba-libs is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657120" version="1" comment="samba-winbind is &lt;4.6.16+git.307.b3899d08cc6-3.64.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657121" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;14-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657122" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;12-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657123" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;11-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657124" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;8-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657125" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;5-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657155" version="1" comment="libecpg6 is &lt;14.1-3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657156" version="1" comment="libpq5 is &lt;14.1-3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657364" version="1" comment="postgresql96 is &lt;9.6.24-6.18.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657365" version="1" comment="postgresql96-contrib is &lt;9.6.24-6.18.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657366" version="1" comment="postgresql96-plperl is &lt;9.6.24-6.18.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657367" version="1" comment="postgresql96-plpython is &lt;9.6.24-6.18.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657368" version="1" comment="postgresql96-pltcl is &lt;9.6.24-6.18.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657369" version="1" comment="postgresql96-server is &lt;9.6.24-6.18.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657370" version="1" comment="postgresql10 is &lt;10.19-4.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657371" version="1" comment="postgresql10-contrib is &lt;10.19-4.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657372" version="1" comment="postgresql10-plperl is &lt;10.19-4.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657373" version="1" comment="postgresql10-plpython is &lt;10.19-4.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657374" version="1" comment="postgresql10-pltcl is &lt;10.19-4.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657375" version="1" comment="postgresql10-server is &lt;10.19-4.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657562" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.4-2.74.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657563" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.4-2.74.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657564" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.4-2.74.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657565" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.4-2.74.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657566" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.4-2.74.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657567" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.4-2.74.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657568" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.312-27.66.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657569" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.312-27.66.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657570" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.312-27.66.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657571" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.312-27.66.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657879" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.321-43.53.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657880" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.321-43.53.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657881" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.321-43.53.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657882" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.321-43.53.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658829" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-19.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658830" version="1" comment="ruby2.1 is &lt;2.1.9-19.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658831" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-19.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658832" version="1" comment="clamav is &lt;0.103.4-33.41.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658833" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.1-2.77.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658834" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.1-2.77.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658835" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.1-2.77.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658836" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.1-2.77.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658837" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.1-2.77.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658838" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.1-2.77.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659136" version="1" comment="kernel-default is &lt;4.4.180-94.150.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659137" version="1" comment="kernel-default-base is &lt;4.4.180-94.150.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659138" version="1" comment="kernel-default-devel is &lt;4.4.180-94.150.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659140" version="1" comment="kernel-syms is &lt;4.4.180-94.150.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659142" version="1" comment="libfreebl3 is &lt;3.68.1-58.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659143" version="1" comment="libfreebl3-hmac is &lt;3.68.1-58.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659144" version="1" comment="libsoftokn3 is &lt;3.68.1-58.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659145" version="1" comment="libsoftokn3-hmac is &lt;3.68.1-58.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659146" version="1" comment="mozilla-nss is &lt;3.68.1-58.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659147" version="1" comment="mozilla-nss-certs is &lt;3.68.1-58.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659148" version="1" comment="mozilla-nss-devel is &lt;3.68.1-58.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659149" version="1" comment="mozilla-nss-sysinit is &lt;3.68.1-58.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659150" version="1" comment="mozilla-nss-tools is &lt;3.68.1-58.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659151" version="1" comment="openssh is &lt;7.2p2-74.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659152" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659153" version="1" comment="openssh-fips is &lt;7.2p2-74.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659154" version="1" comment="openssh-helpers is &lt;7.2p2-74.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659604" version="1" comment="MozillaFirefox is &lt;91.4.0-112.83.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659605" version="1" comment="MozillaFirefox-devel is &lt;91.4.0-112.83.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659606" version="1" comment="MozillaFirefox-translations-common is &lt;91.4.0-112.83.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659749" version="1" comment="glib-networking is &lt;2.48.2-6.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557077" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557078" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659893" version="1" comment="kgraft-patch-4_4_180-94_150-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659894" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659895" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659896" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;12-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659897" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;13-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557079" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659898" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659899" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557080" version="1" comment="kgraft-patch-4_4_180-94_124-default is &lt;6-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557081" version="1" comment="kgraft-patch-4_4_180-94_121-default is &lt;6-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557082" version="1" comment="kgraft-patch-4_4_180-94_116-default is &lt;7-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660802" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660803" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660855" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660856" version="1" comment="libdcerpc0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660857" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660858" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660859" version="1" comment="libndr-standard0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660860" version="1" comment="libndr0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660861" version="1" comment="libnetapi0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660862" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660863" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660864" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660865" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660866" version="1" comment="libsamba-util0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660867" version="1" comment="libsamdb0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660868" version="1" comment="libsmbclient0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660869" version="1" comment="libsmbconf0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660870" version="1" comment="libsmbldap0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660871" version="1" comment="libtevent-util0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660872" version="1" comment="libwbclient0 is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660873" version="1" comment="samba is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660874" version="1" comment="samba-client is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660875" version="1" comment="samba-libs is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660876" version="1" comment="samba-winbind is &lt;4.6.16+git.313.502515a5bfc-3.67.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661619" version="1" comment="chrony is &lt;4.1-5.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557083" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.64.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557084" version="1" comment="python is &lt;2.7.17-28.64.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557085" version="1" comment="python-base is &lt;2.7.17-28.64.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557086" version="1" comment="python-curses is &lt;2.7.17-28.64.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557087" version="1" comment="python-demo is &lt;2.7.17-28.64.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557088" version="1" comment="python-devel is &lt;2.7.17-28.64.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557089" version="1" comment="python-gdbm is &lt;2.7.17-28.64.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557090" version="1" comment="python-idle is &lt;2.7.17-28.64.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557091" version="1" comment="python-tk is &lt;2.7.17-28.64.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557092" version="1" comment="python-xml is &lt;2.7.17-28.64.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557093" version="1" comment="openvswitch is &lt;2.7.12-3.39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557094" version="1" comment="kernel-default is &lt;4.4.180-94.138.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557095" version="1" comment="kernel-default-base is &lt;4.4.180-94.138.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557096" version="1" comment="kernel-default-devel is &lt;4.4.180-94.138.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557098" version="1" comment="kernel-syms is &lt;4.4.180-94.138.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557100" version="1" comment="wpa_supplicant is &lt;2.6-15.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557101" version="1" comment="libjasper1 is &lt;1.900.14-195.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557102" version="1" comment="screen is &lt;4.0.4-23.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557103" version="1" comment="bind is &lt;9.9.9P1-63.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557104" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557105" version="1" comment="bind-libs is &lt;9.9.9P1-63.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557106" version="1" comment="bind-utils is &lt;9.9.9P1-63.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557107" version="1" comment="krb5-appl-clients is &lt;1.0.3-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557108" version="1" comment="krb5-appl-servers is &lt;1.0.3-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557109" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.282-27.56.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557110" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.282-27.56.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557111" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.282-27.56.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557112" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.282-27.56.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557113" version="1" comment="MozillaFirefox is &lt;78.8.0-112.51.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557114" version="1" comment="MozillaFirefox-devel is &lt;78.8.0-112.51.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557115" version="1" comment="MozillaFirefox-translations-common is &lt;78.8.0-112.51.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557116" version="1" comment="python-cryptography is &lt;2.1.4-7.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557117" version="1" comment="python3-cryptography is &lt;2.1.4-7.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557118" version="1" comment="grub2 is &lt;2.02-4.69.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557119" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.83.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557120" version="1" comment="openldap2 is &lt;2.4.41-18.83.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557121" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.83.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557122" version="1" comment="openldap2-client is &lt;2.4.41-18.83.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557123" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.83.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557124" version="1" comment="kernel-default is &lt;4.4.180-94.141.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557125" version="1" comment="kernel-default-base is &lt;4.4.180-94.141.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557126" version="1" comment="kernel-default-devel is &lt;4.4.180-94.141.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557128" version="1" comment="kernel-syms is &lt;4.4.180-94.141.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557130" version="1" comment="wpa_supplicant is &lt;2.6-15.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557131" version="1" comment="git is &lt;2.26.2-27.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557132" version="1" comment="git-core is &lt;2.26.2-27.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557133" version="1" comment="git-cvs is &lt;2.26.2-27.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557134" version="1" comment="git-daemon is &lt;2.26.2-27.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557135" version="1" comment="git-email is &lt;2.26.2-27.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557136" version="1" comment="git-gui is &lt;2.26.2-27.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557137" version="1" comment="git-svn is &lt;2.26.2-27.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557138" version="1" comment="git-web is &lt;2.26.2-27.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557139" version="1" comment="gitk is &lt;2.26.2-27.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557140" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-28.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557141" version="1" comment="python is &lt;2.7.18-28.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557142" version="1" comment="python-base is &lt;2.7.18-28.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557143" version="1" comment="python-curses is &lt;2.7.18-28.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557144" version="1" comment="python-demo is &lt;2.7.18-28.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557145" version="1" comment="python-devel is &lt;2.7.18-28.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557146" version="1" comment="python-gdbm is &lt;2.7.18-28.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557147" version="1" comment="python-idle is &lt;2.7.18-28.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557148" version="1" comment="python-tk is &lt;2.7.18-28.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557149" version="1" comment="python-xml is &lt;2.7.18-28.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557150" version="1" comment="MozillaFirefox is &lt;78.6.1-112.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557151" version="1" comment="MozillaFirefox-devel is &lt;78.6.1-112.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557152" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.1-112.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557153" version="1" comment="glib2-tools is &lt;2.48.2-12.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557154" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557155" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557156" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557157" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557158" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557159" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;2-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557160" version="1" comment="kgraft-patch-4_4_180-94_135-default is &lt;4-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557161" version="1" comment="kgraft-patch-4_4_180-94_130-default is &lt;6-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557162" version="1" comment="kgraft-patch-4_4_180-94_127-default is &lt;7-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557163" version="1" comment="kgraft-patch-4_4_180-94_124-default is &lt;7-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557164" version="1" comment="kgraft-patch-4_4_180-94_121-default is &lt;7-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557165" version="1" comment="kgraft-patch-4_4_180-94_116-default is &lt;8-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557166" version="1" comment="libwavpack1 is &lt;4.60.99-5.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557167" version="1" comment="libnghttp2-14 is &lt;1.39.2-3.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557168" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.66.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557169" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.66.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557170" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.66.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557171" version="1" comment="openssl is &lt;1.0.2j-60.66.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557172" version="1" comment="MozillaFirefox is &lt;78.9.0-112.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557173" version="1" comment="MozillaFirefox-devel is &lt;78.9.0-112.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557174" version="1" comment="MozillaFirefox-translations-common is &lt;78.9.0-112.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677145" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;13-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677146" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677147" version="1" comment="kgraft-patch-4_4_180-94_150-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677148" version="1" comment="kgraft-patch-4_4_180-94_156-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677149" version="1" comment="openvpn is &lt;2.3.8-16.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677150" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677650" version="1" comment="kgraft-patch-4_4_180-94_153-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677651" version="1" comment="libz1 is &lt;1.2.8-12.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677652" version="1" comment="zlib-devel is &lt;1.2.8-12.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678488" version="1" comment="libfreebl3 is &lt;3.68.3-58.69.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678489" version="1" comment="libfreebl3-hmac is &lt;3.68.3-58.69.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678490" version="1" comment="libsoftokn3 is &lt;3.68.3-58.69.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678491" version="1" comment="libsoftokn3-hmac is &lt;3.68.3-58.69.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678492" version="1" comment="mozilla-nss is &lt;3.68.3-58.69.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678493" version="1" comment="mozilla-nss-certs is &lt;3.68.3-58.69.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678494" version="1" comment="mozilla-nss-devel is &lt;3.68.3-58.69.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678495" version="1" comment="mozilla-nss-sysinit is &lt;3.68.3-58.69.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678496" version="1" comment="mozilla-nss-tools is &lt;3.68.3-58.69.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678500" version="1" comment="MozillaFirefox is &lt;91.8.0-112.98.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678501" version="1" comment="MozillaFirefox-devel is &lt;91.8.0-112.98.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678502" version="1" comment="MozillaFirefox-translations-common is &lt;91.8.0-112.98.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678625" version="1" comment="glibc is &lt;2.22-123.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678626" version="1" comment="glibc-devel is &lt;2.22-123.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678627" version="1" comment="glibc-locale is &lt;2.22-123.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678628" version="1" comment="glibc-profile is &lt;2.22-123.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678629" version="1" comment="nscd is &lt;2.22-123.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678750" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663995" version="1" comment="MozillaFirefox is &lt;91.5.0-112.86.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663996" version="1" comment="MozillaFirefox-devel is &lt;91.5.0-112.86.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663997" version="1" comment="MozillaFirefox-translations-common is &lt;91.5.0-112.86.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679323" version="1" comment="liblzma5 is &lt;5.0.5-6.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679324" version="1" comment="xz is &lt;5.0.5-6.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679325" version="1" comment="libexif12 is &lt;0.6.22-8.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680625" version="1" comment="kernel-default is &lt;4.4.180-94.161.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680626" version="1" comment="kernel-default-base is &lt;4.4.180-94.161.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680627" version="1" comment="kernel-default-devel is &lt;4.4.180-94.161.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680629" version="1" comment="kernel-syms is &lt;4.4.180-94.161.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680631" version="1" comment="gzip is &lt;1.6-9.6.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680632" version="1" comment="dnsmasq is &lt;2.78-18.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680633" version="1" comment="javapackages-filesystem is &lt;5.3.1-14.7.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680634" version="1" comment="git is &lt;2.26.2-27.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680635" version="1" comment="git-core is &lt;2.26.2-27.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680636" version="1" comment="git-cvs is &lt;2.26.2-27.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680637" version="1" comment="git-daemon is &lt;2.26.2-27.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680638" version="1" comment="git-email is &lt;2.26.2-27.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680639" version="1" comment="git-gui is &lt;2.26.2-27.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680640" version="1" comment="git-svn is &lt;2.26.2-27.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680641" version="1" comment="git-web is &lt;2.26.2-27.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680642" version="1" comment="gitk is &lt;2.26.2-27.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680643" version="1" comment="libxml2-2 is &lt;2.9.4-46.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680644" version="1" comment="libxml2-tools is &lt;2.9.4-46.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680645" version="1" comment="python-libxml2 is &lt;2.9.4-46.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680646" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-15.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664241" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.3-2.82.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664242" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.3-2.82.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664243" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.3-2.82.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664244" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.3-2.82.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664245" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.3-2.82.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664246" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.3-2.82.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681237" version="1" comment="cifs-utils is &lt;6.9-9.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681238" version="1" comment="kgraft-patch-4_4_180-94_156-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681239" version="1" comment="kgraft-patch-4_4_180-94_153-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681240" version="1" comment="kgraft-patch-4_4_180-94_150-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681241" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681242" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;14-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664247" version="1" comment="aide is &lt;0.16-20.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682660" version="1" comment="MozillaFirefox is &lt;91.9.0-112.104.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682661" version="1" comment="MozillaFirefox-devel is &lt;91.9.0-112.104.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682662" version="1" comment="MozillaFirefox-translations-common is &lt;91.9.0-112.104.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664698" version="1" comment="zsh is &lt;5.0.5-6.12.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696559" version="1" comment="bind is &lt;9.9.9P1-63.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696560" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696561" version="1" comment="bind-libs is &lt;9.9.9P1-63.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696562" version="1" comment="bind-utils is &lt;9.9.9P1-63.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683236" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;15-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683237" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;12-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683238" version="1" comment="kgraft-patch-4_4_180-94_150-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683239" version="1" comment="kgraft-patch-4_4_180-94_161-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683240" version="1" comment="e2fsprogs is &lt;1.42.11-16.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683241" version="1" comment="libcom_err2 is &lt;1.42.11-16.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683242" version="1" comment="libext2fs2 is &lt;1.42.11-16.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683712" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.89.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683713" version="1" comment="openldap2 is &lt;2.4.41-18.89.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683714" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.89.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683715" version="1" comment="openldap2-client is &lt;2.4.41-18.89.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683716" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.89.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683717" version="1" comment="gzip is &lt;1.6-9.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683718" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.36.0-2.96.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683719" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.36.0-2.96.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683720" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.36.0-2.96.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683721" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.36.0-2.96.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683722" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.36.0-2.96.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683723" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.36.0-2.96.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684092" version="1" comment="curl is &lt;7.37.0-37.76.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684093" version="1" comment="libcurl4 is &lt;7.37.0-37.76.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696563" version="1" comment="MozillaFirefox is &lt;91.9.0-112.108.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696564" version="1" comment="MozillaFirefox-devel is &lt;91.9.0-112.108.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696565" version="1" comment="MozillaFirefox-translations-common is &lt;91.9.0-112.108.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664699" version="1" comment="expat is &lt;2.1.0-21.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664700" version="1" comment="libexpat1 is &lt;2.1.0-21.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696566" version="1" comment="postgresql10 is &lt;10.21-4.28.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696567" version="1" comment="postgresql10-contrib is &lt;10.21-4.28.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696568" version="1" comment="postgresql10-plperl is &lt;10.21-4.28.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696569" version="1" comment="postgresql10-plpython is &lt;10.21-4.28.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696570" version="1" comment="postgresql10-pltcl is &lt;10.21-4.28.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696571" version="1" comment="postgresql10-server is &lt;10.21-4.28.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696572" version="1" comment="MozillaFirefox is &lt;91.9.1-112.111.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696573" version="1" comment="MozillaFirefox-devel is &lt;91.9.1-112.111.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696574" version="1" comment="MozillaFirefox-translations-common is &lt;91.9.1-112.111.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696575" version="1" comment="libxml2-2 is &lt;2.9.4-46.54.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696576" version="1" comment="libxml2-tools is &lt;2.9.4-46.54.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696577" version="1" comment="python-libxml2 is &lt;2.9.4-46.54.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696578" version="1" comment="libpcre2-16-0 is &lt;10.34-1.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696579" version="1" comment="libpcre2-32-0 is &lt;10.34-1.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696580" version="1" comment="libpcre2-8-0 is &lt;10.34-1.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696581" version="1" comment="libpcre2-posix2 is &lt;10.34-1.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696582" version="1" comment="wpa_supplicant is &lt;2.9-15.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696583" version="1" comment="libecpg6 is &lt;14.3-3.9.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696584" version="1" comment="libpq5 is &lt;14.3-3.9.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696585" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.172.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696586" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.172.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696587" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.172.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696588" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.172.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664701" version="1" comment="libpolkit0 is &lt;0.113-5.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664702" version="1" comment="polkit is &lt;0.113-5.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664703" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696589" version="1" comment="librelp0 is &lt;1.2.15-3.6.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696590" version="1" comment="MozillaFirefox is &lt;91.10.0-112.114.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696591" version="1" comment="MozillaFirefox-devel is &lt;91.10.0-112.114.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696592" version="1" comment="MozillaFirefox-translations-common is &lt;91.10.0-112.114.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696593" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;13-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696594" version="1" comment="kgraft-patch-4_4_180-94_150-default is &lt;9-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696595" version="1" comment="kgraft-patch-4_4_180-94_153-default is &lt;5-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696596" version="1" comment="kgraft-patch-4_4_180-94_156-default is &lt;4-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696597" version="1" comment="kgraft-patch-4_4_180-94_161-default is &lt;3-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664941" version="1" comment="strongswan is &lt;5.1.3-26.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664942" version="1" comment="strongswan-hmac is &lt;5.1.3-26.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664943" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664944" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696598" version="1" comment="libfreebl3 is &lt;3.68.4-58.72.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696599" version="1" comment="libfreebl3-hmac is &lt;3.68.4-58.72.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696600" version="1" comment="libsoftokn3 is &lt;3.68.4-58.72.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696601" version="1" comment="libsoftokn3-hmac is &lt;3.68.4-58.72.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696602" version="1" comment="mozilla-nss is &lt;3.68.4-58.72.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696603" version="1" comment="mozilla-nss-certs is &lt;3.68.4-58.72.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696604" version="1" comment="mozilla-nss-devel is &lt;3.68.4-58.72.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696605" version="1" comment="mozilla-nss-sysinit is &lt;3.68.4-58.72.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696606" version="1" comment="mozilla-nss-tools is &lt;3.68.4-58.72.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696607" version="1" comment="grub2 is &lt;2.02-137.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696608" version="1" comment="kernel-default is &lt;4.4.180-94.164.3 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696609" version="1" comment="kernel-default-base is &lt;4.4.180-94.164.3 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696610" version="1" comment="kernel-default-devel is &lt;4.4.180-94.164.3 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696612" version="1" comment="kernel-syms is &lt;4.4.180-94.164.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696614" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.36.3-2.99.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696615" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.36.3-2.99.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696616" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.36.3-2.99.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696617" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.36.3-2.99.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696618" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.36.3-2.99.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696619" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.36.3-2.99.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696620" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.80.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696621" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.80.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696622" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.80.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696623" version="1" comment="openssl is &lt;1.0.2j-60.80.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696624" version="1" comment="apache2 is &lt;2.4.23-29.91.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696625" version="1" comment="apache2-example-pages is &lt;2.4.23-29.91.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696626" version="1" comment="apache2-prefork is &lt;2.4.23-29.91.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696627" version="1" comment="apache2-utils is &lt;2.4.23-29.91.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696628" version="1" comment="apache2-worker is &lt;2.4.23-29.91.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696629" version="1" comment="golang-github-prometheus-node_exporter is &lt;1.3.0-1.15.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696630" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.93.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696631" version="1" comment="python3 is &lt;3.4.10-25.93.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696632" version="1" comment="python3-base is &lt;3.4.10-25.93.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696633" version="1" comment="python3-curses is &lt;3.4.10-25.93.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696634" version="1" comment="python3-devel is &lt;3.4.10-25.93.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696635" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.83.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696636" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.83.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696637" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.83.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696638" version="1" comment="openssl is &lt;1.0.2j-60.83.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696639" version="1" comment="oracleasm-kmp-default is &lt;2.0.8_k4.4.180_94.164-3.13.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700141" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-28.87.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700142" version="1" comment="python is &lt;2.7.18-28.87.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700143" version="1" comment="python-base is &lt;2.7.18-28.87.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700144" version="1" comment="python-curses is &lt;2.7.18-28.87.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700145" version="1" comment="python-demo is &lt;2.7.18-28.87.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700146" version="1" comment="python-devel is &lt;2.7.18-28.87.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700147" version="1" comment="python-gdbm is &lt;2.7.18-28.87.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700148" version="1" comment="python-idle is &lt;2.7.18-28.87.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700149" version="1" comment="python-tk is &lt;2.7.18-28.87.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700150" version="1" comment="python-xml is &lt;2.7.18-28.87.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700151" version="1" comment="sysstat is &lt;12.0.2-10.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700152" version="1" comment="sysstat-isag is &lt;12.0.2-10.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700153" version="1" comment="dpdk is &lt;16.11.9-8.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700154" version="1" comment="dpdk-tools is &lt;16.11.9-8.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700155" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;14-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700156" version="1" comment="kgraft-patch-4_4_180-94_150-default is &lt;10-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700157" version="1" comment="kgraft-patch-4_4_180-94_153-default is &lt;6-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700158" version="1" comment="kgraft-patch-4_4_180-94_156-default is &lt;5-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700159" version="1" comment="kgraft-patch-4_4_180-94_161-default is &lt;4-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700160" version="1" comment="kgraft-patch-4_4_180-94_164-default is &lt;2-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700161" version="1" comment="MozillaFirefox is &lt;91.11.0-112.119.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700162" version="1" comment="MozillaFirefox-devel is &lt;91.11.0-112.119.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700163" version="1" comment="MozillaFirefox-translations-common is &lt;91.11.0-112.119.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700164" version="1" comment="rsyslog is &lt;8.24.0-3.58.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700165" version="1" comment="rsyslog-diag-tools is &lt;8.24.0-3.58.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700166" version="1" comment="rsyslog-doc is &lt;8.24.0-3.58.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700167" version="1" comment="rsyslog-module-gssapi is &lt;8.24.0-3.58.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700168" version="1" comment="rsyslog-module-gtls is &lt;8.24.0-3.58.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700169" version="1" comment="rsyslog-module-mysql is &lt;8.24.0-3.58.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700170" version="1" comment="rsyslog-module-pgsql is &lt;8.24.0-3.58.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700171" version="1" comment="rsyslog-module-relp is &lt;8.24.0-3.58.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700172" version="1" comment="rsyslog-module-snmp is &lt;8.24.0-3.58.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700173" version="1" comment="rsyslog-module-udpspoof is &lt;8.24.0-3.58.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700174" version="1" comment="libpcre1 is &lt;8.45-8.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700175" version="1" comment="libpcre16-0 is &lt;8.45-8.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700176" version="1" comment="libpcrecpp0 is &lt;8.45-8.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700177" version="1" comment="libpcreposix0 is &lt;8.45-8.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700178" version="1" comment="pcre-devel is &lt;8.45-8.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666728" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666729" version="1" comment="libdcerpc0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666730" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666731" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666732" version="1" comment="libndr-standard0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666733" version="1" comment="libndr0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666734" version="1" comment="libnetapi0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666735" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666736" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666737" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666738" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666739" version="1" comment="libsamba-util0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666740" version="1" comment="libsamdb0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666741" version="1" comment="libsmbclient0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666742" version="1" comment="libsmbconf0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666743" version="1" comment="libsmbldap0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666744" version="1" comment="libtevent-util0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666745" version="1" comment="libwbclient0 is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666746" version="1" comment="samba is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666747" version="1" comment="samba-client is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666748" version="1" comment="samba-libs is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666749" version="1" comment="samba-winbind is &lt;4.6.16+git.320.a2d80a7efef-3.70.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662573" version="1" comment="libsnmp30 is &lt;5.7.3-6.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662574" version="1" comment="net-snmp is &lt;5.7.3-6.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662575" version="1" comment="perl-SNMP is &lt;5.7.3-6.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662576" version="1" comment="snmp-mibs is &lt;5.7.3-6.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667089" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;14-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667090" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;13-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667091" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;10-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667092" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;7-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667093" version="1" comment="kgraft-patch-4_4_180-94_150-default is &lt;3-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662577" version="1" comment="libsndfile1 is &lt;1.0.25-36.26.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667360" version="1" comment="clamav is &lt;0.103.5-33.44.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667638" version="1" comment="kernel-default is &lt;4.4.180-94.153.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667639" version="1" comment="kernel-default-base is &lt;4.4.180-94.153.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667640" version="1" comment="kernel-default-devel is &lt;4.4.180-94.153.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667642" version="1" comment="kernel-syms is &lt;4.4.180-94.153.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662723" version="1" comment="libvirt is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662724" version="1" comment="libvirt-admin is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662725" version="1" comment="libvirt-client is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662726" version="1" comment="libvirt-daemon is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662727" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662728" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662729" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662730" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662731" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662732" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662733" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662734" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662735" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662736" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662737" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662738" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662739" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662740" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662741" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662742" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662743" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662744" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662745" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662746" version="1" comment="libvirt-doc is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662747" version="1" comment="libvirt-libs is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662748" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662749" version="1" comment="libvirt-nss is &lt;3.3.0-5.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668227" version="1" comment="libvirglrenderer0 is &lt;0.5.0-12.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668374" version="1" comment="expat is &lt;2.1.0-21.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668375" version="1" comment="libexpat1 is &lt;2.1.0-21.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668376" version="1" comment="libtiff5 is &lt;4.0.9-44.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668377" version="1" comment="tiff is &lt;4.0.9-44.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668378" version="1" comment="tcpdump is &lt;4.9.2-14.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669109" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;14-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669110" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;11-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669111" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;8-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669112" version="1" comment="kgraft-patch-4_4_180-94_150-default is &lt;4-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669113" version="1" comment="kgraft-patch-4_4_180-94_138-default is &lt;15-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669715" version="1" comment="MozillaFirefox is &lt;91.6.0-112.89.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669716" version="1" comment="MozillaFirefox-devel is &lt;91.6.0-112.89.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669717" version="1" comment="MozillaFirefox-translations-common is &lt;91.6.0-112.89.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663246" version="1" comment="apache2 is &lt;2.4.23-29.83.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663247" version="1" comment="apache2-example-pages is &lt;2.4.23-29.83.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663248" version="1" comment="apache2-prefork is &lt;2.4.23-29.83.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663249" version="1" comment="apache2-utils is &lt;2.4.23-29.83.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663250" version="1" comment="apache2-worker is &lt;2.4.23-29.83.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670423" version="1" comment="cyrus-sasl is &lt;2.1.26-8.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670424" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-8.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670425" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-8.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670426" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-8.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670427" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-8.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670428" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-8.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670429" version="1" comment="libsasl2-3 is &lt;2.1.26-8.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670560" version="1" comment="kgraft-patch-4_4_180-94_153-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670561" version="1" comment="kgraft-patch-4_4_180-94_150-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670562" version="1" comment="kgraft-patch-4_4_180-94_147-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670563" version="1" comment="kgraft-patch-4_4_180-94_144-default is &lt;12-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670564" version="1" comment="kgraft-patch-4_4_180-94_141-default is &lt;15-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670840" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.5-2.85.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670841" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.5-2.85.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670842" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.5-2.85.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670843" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.5-2.85.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670844" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.5-2.85.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670845" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.5-2.85.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670846" version="1" comment="expat is &lt;2.1.0-21.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670847" version="1" comment="libexpat1 is &lt;2.1.0-21.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670848" version="1" comment="zsh is &lt;5.0.5-6.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671808" version="1" comment="kernel-default is &lt;4.4.180-94.156.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671809" version="1" comment="kernel-default-base is &lt;4.4.180-94.156.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671810" version="1" comment="kernel-default-devel is &lt;4.4.180-94.156.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671812" version="1" comment="kernel-syms is &lt;4.4.180-94.156.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672449" version="1" comment="MozillaFirefox is &lt;91.6.1-112.92.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672450" version="1" comment="MozillaFirefox-devel is &lt;91.6.1-112.92.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672451" version="1" comment="MozillaFirefox-translations-common is &lt;91.6.1-112.92.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673343" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.6-2.88.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673344" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.6-2.88.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673345" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.6-2.88.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673346" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.6-2.88.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673347" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.6-2.88.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673348" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.6-2.88.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673349" version="1" comment="libcaca0 is &lt;0.99.beta18-14.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673350" version="1" comment="MozillaFirefox is &lt;91.7.0-112.95.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673351" version="1" comment="MozillaFirefox-devel is &lt;91.7.0-112.95.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673352" version="1" comment="MozillaFirefox-translations-common is &lt;91.7.0-112.95.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673353" version="1" comment="expat is &lt;2.1.0-21.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673354" version="1" comment="libexpat1 is &lt;2.1.0-21.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673355" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.75.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673356" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.75.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673357" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.75.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673358" version="1" comment="openssl is &lt;1.0.2j-60.75.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673359" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.322-27.72.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673360" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.322-27.72.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673361" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.322-27.72.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673362" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.322-27.72.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674051" version="1" comment="glibc is &lt;2.22-119.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674052" version="1" comment="glibc-devel is &lt;2.22-119.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674053" version="1" comment="glibc-locale is &lt;2.22-119.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674054" version="1" comment="glibc-profile is &lt;2.22-119.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674055" version="1" comment="nscd is &lt;2.22-119.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674056" version="1" comment="apache2 is &lt;2.4.23-29.88.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674057" version="1" comment="apache2-example-pages is &lt;2.4.23-29.88.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674058" version="1" comment="apache2-prefork is &lt;2.4.23-29.88.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674059" version="1" comment="apache2-utils is &lt;2.4.23-29.88.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674060" version="1" comment="apache2-worker is &lt;2.4.23-29.88.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519863" version="1" comment="ceph-common is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519864" version="1" comment="libcephfs2 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519865" version="1" comment="librados2 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519866" version="1" comment="libradosstriper1 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519867" version="1" comment="librbd1 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519868" version="1" comment="librgw2 is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519869" version="1" comment="python-cephfs is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519870" version="1" comment="python-rados is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519871" version="1" comment="python-rbd is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519872" version="1" comment="python-rgw is &lt;12.2.7+git.1531910353.c0ef85b854-2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519873" version="1" comment="libsoup-2_4-1 is &lt;2.62.2-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519874" version="1" comment="libsoup-2_4-1-32bit is &lt;2.62.2-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519876" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.62.2-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519907" version="1" comment="libdcerpc-binding0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519908" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519909" version="1" comment="libdcerpc0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519910" version="1" comment="libdcerpc0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519911" version="1" comment="libndr-krb5pac0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519912" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519913" version="1" comment="libndr-nbt0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519914" version="1" comment="libndr-nbt0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519915" version="1" comment="libndr-standard0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519916" version="1" comment="libndr-standard0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519917" version="1" comment="libndr0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519918" version="1" comment="libndr0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519919" version="1" comment="libnetapi0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519920" version="1" comment="libnetapi0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519921" version="1" comment="libsamba-credentials0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519922" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519923" version="1" comment="libsamba-errors0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519924" version="1" comment="libsamba-errors0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519925" version="1" comment="libsamba-hostconfig0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519926" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519927" version="1" comment="libsamba-passdb0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519928" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519929" version="1" comment="libsamba-util0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519930" version="1" comment="libsamba-util0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519931" version="1" comment="libsamdb0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519932" version="1" comment="libsamdb0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519933" version="1" comment="libsmbclient0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519934" version="1" comment="libsmbclient0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519935" version="1" comment="libsmbconf0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519936" version="1" comment="libsmbconf0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519937" version="1" comment="libsmbldap0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519938" version="1" comment="libsmbldap0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519939" version="1" comment="libtevent-util0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519940" version="1" comment="libtevent-util0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519941" version="1" comment="libwbclient0 is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519942" version="1" comment="libwbclient0-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519943" version="1" comment="samba is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519944" version="1" comment="samba-client is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519945" version="1" comment="samba-client-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519947" version="1" comment="samba-libs is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519948" version="1" comment="samba-libs-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519949" version="1" comment="samba-winbind is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519950" version="1" comment="samba-winbind-32bit is &lt;4.6.14+git.157.c2d53c2b191-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519951" version="1" comment="MozillaFirefox is &lt;52.9.0esr-109.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519952" version="1" comment="MozillaFirefox-translations is &lt;52.9.0esr-109.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519953" version="1" comment="clamav is &lt;0.100.1-33.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557175" version="1" comment="apache2 is &lt;2.4.23-29.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557176" version="1" comment="apache2-example-pages is &lt;2.4.23-29.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557177" version="1" comment="apache2-prefork is &lt;2.4.23-29.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557178" version="1" comment="apache2-utils is &lt;2.4.23-29.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557179" version="1" comment="apache2-worker is &lt;2.4.23-29.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557180" version="1" comment="libQtWebKit4 is &lt;4.8.7+2.3.4-4.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557181" version="1" comment="libQtWebKit4-32bit is &lt;4.8.7+2.3.4-4.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557182" version="1" comment="libqca2 is &lt;2.0.3-17.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557183" version="1" comment="libqca2-32bit is &lt;2.0.3-17.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557184" version="1" comment="libqt4 is &lt;4.8.7-8.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557185" version="1" comment="libqt4-32bit is &lt;4.8.7-8.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557186" version="1" comment="libqt4-qt3support is &lt;4.8.7-8.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557187" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.7-8.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557188" version="1" comment="libqt4-sql is &lt;4.8.7-8.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557189" version="1" comment="libqt4-sql-32bit is &lt;4.8.7-8.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557190" version="1" comment="libqt4-sql-mysql is &lt;4.8.7-8.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557191" version="1" comment="libqt4-sql-sqlite is &lt;4.8.7-8.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557192" version="1" comment="libqt4-x11 is &lt;4.8.7-8.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557193" version="1" comment="libqt4-x11-32bit is &lt;4.8.7-8.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557194" version="1" comment="qt4-x11-tools is &lt;4.8.7-8.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557195" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557196" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557197" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1492060560.b6d11d7c46-4.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557198" version="1" comment="cups is &lt;1.7.5-20.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557199" version="1" comment="cups-client is &lt;1.7.5-20.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557200" version="1" comment="cups-libs is &lt;1.7.5-20.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557201" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557202" version="1" comment="libgcrypt20 is &lt;1.6.1-16.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557203" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557204" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557205" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557206" version="1" comment="gnome-shell-search-provider-nautilus is &lt;3.20.3-23.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557207" version="1" comment="libnautilus-extension1 is &lt;3.20.3-23.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557208" version="1" comment="nautilus is &lt;3.20.3-23.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557209" version="1" comment="nautilus-lang is &lt;3.20.3-23.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557210" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557211" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557212" version="1" comment="python is &lt;2.7.13-28.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557213" version="1" comment="python-32bit is &lt;2.7.13-28.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557214" version="1" comment="python-base is &lt;2.7.13-28.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557215" version="1" comment="python-base-32bit is &lt;2.7.13-28.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557216" version="1" comment="python-curses is &lt;2.7.13-28.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557217" version="1" comment="python-demo is &lt;2.7.13-28.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557218" version="1" comment="python-doc is &lt;2.7.13-28.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557219" version="1" comment="python-doc-pdf is &lt;2.7.13-28.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557220" version="1" comment="python-gdbm is &lt;2.7.13-28.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557221" version="1" comment="python-idle is &lt;2.7.13-28.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557222" version="1" comment="python-tk is &lt;2.7.13-28.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557223" version="1" comment="python-xml is &lt;2.7.13-28.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557224" version="1" comment="libsndfile1 is &lt;1.0.25-36.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557225" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557226" version="1" comment="rsyslog is &lt;8.24.0-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557227" version="1" comment="rsyslog-diag-tools is &lt;8.24.0-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557228" version="1" comment="rsyslog-doc is &lt;8.24.0-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557229" version="1" comment="rsyslog-module-gssapi is &lt;8.24.0-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557230" version="1" comment="rsyslog-module-gtls is &lt;8.24.0-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557231" version="1" comment="rsyslog-module-mysql is &lt;8.24.0-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557232" version="1" comment="rsyslog-module-pgsql is &lt;8.24.0-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557233" version="1" comment="rsyslog-module-relp is &lt;8.24.0-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557234" version="1" comment="rsyslog-module-snmp is &lt;8.24.0-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557235" version="1" comment="rsyslog-module-udpspoof is &lt;8.24.0-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519962" version="1" comment="libblkid1 is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519963" version="1" comment="libblkid1-32bit is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519964" version="1" comment="libfdisk1 is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519965" version="1" comment="libmount1 is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519966" version="1" comment="libmount1-32bit is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519967" version="1" comment="libsmartcols1 is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519969" version="1" comment="libuuid1 is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519970" version="1" comment="libuuid1-32bit is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519971" version="1" comment="python-libmount is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519972" version="1" comment="util-linux is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519974" version="1" comment="util-linux-systemd is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519975" version="1" comment="uuidd is &lt;2.29.2-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557236" version="1" comment="openssh is &lt;7.2p2-74.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557237" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557238" version="1" comment="openssh-fips is &lt;7.2p2-74.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557239" version="1" comment="openssh-helpers is &lt;7.2p2-74.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557240" version="1" comment="shadow is &lt;4.2.1-27.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557241" version="1" comment="libpolkit0 is &lt;0.113-5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557242" version="1" comment="polkit is &lt;0.113-5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557243" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557244" version="1" comment="libtirpc-netconfig is &lt;1.0.1-17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557245" version="1" comment="libtirpc3 is &lt;1.0.1-17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557246" version="1" comment="libtirpc3-32bit is &lt;1.0.1-17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521146" version="1" comment="mutt is &lt;1.10.1-55.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557247" version="1" comment="libcares2 is &lt;1.9.1-9.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557248" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557249" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557250" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557251" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557252" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557253" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519980" version="1" comment="libprocps3 is &lt;3.3.9-11.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519981" version="1" comment="procps is &lt;3.3.9-11.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519982" version="1" comment="libgcrypt20 is &lt;1.6.1-16.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519983" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557254" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557255" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557256" version="1" comment="libcgroup-tools is &lt;0.41.rc1-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519984" version="1" comment="libcgroup1 is &lt;0.41.rc1-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520035" version="1" comment="gdm is &lt;3.10.0.1-54.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520038" version="1" comment="libgdm1 is &lt;3.10.0.1-54.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520039" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-54.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520040" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.33-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520041" version="1" comment="libspice-client-glib-helper is &lt;0.33-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520042" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.33-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520043" version="1" comment="libspice-controller0 is &lt;0.33-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520044" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.33-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520045" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.33-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520046" version="1" comment="libspice-server1 is &lt;0.12.8-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530236" version="1" comment="dovecot22 is &lt;2.2.31-19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530237" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530238" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530239" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530240" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.30-38.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530243" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.30-38.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520049" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520050" version="1" comment="python3 is &lt;3.4.6-25.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520051" version="1" comment="python3-base is &lt;3.4.6-25.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520052" version="1" comment="python3-curses is &lt;3.4.6-25.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520053" version="1" comment="curl is &lt;7.37.0-37.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520054" version="1" comment="libcurl4 is &lt;7.37.0-37.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520055" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520063" version="1" comment="openslp is &lt;2.0.0-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520064" version="1" comment="openslp-32bit is &lt;2.0.0-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530248" version="1" comment="openslp-server is &lt;2.0.0-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520067" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520069" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520070" version="1" comment="liblouis-data is &lt;2.6.4-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520071" version="1" comment="liblouis9 is &lt;2.6.4-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557257" version="1" comment="python-louis is &lt;2.6.4-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520072" version="1" comment="python3-louis is &lt;2.6.4-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520073" version="1" comment="libzypp is &lt;16.17.20-2.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520074" version="1" comment="zypper is &lt;1.13.45-21.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530249" version="1" comment="apache2 is &lt;2.4.23-29.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530251" version="1" comment="apache2-example-pages is &lt;2.4.23-29.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530252" version="1" comment="apache2-prefork is &lt;2.4.23-29.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530253" version="1" comment="apache2-utils is &lt;2.4.23-29.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530254" version="1" comment="apache2-worker is &lt;2.4.23-29.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520076" version="1" comment="libXcursor1 is &lt;1.1.14-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520077" version="1" comment="libXcursor1-32bit is &lt;1.1.14-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530259" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.20-30.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520078" version="1" comment="libtiff5 is &lt;4.0.9-44.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520079" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557258" version="1" comment="tiff is &lt;4.0.9-44.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520080" version="1" comment="gnutls is &lt;3.3.27-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557259" version="1" comment="libgnutls-openssl27 is &lt;3.3.27-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520081" version="1" comment="libgnutls28 is &lt;3.3.27-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520082" version="1" comment="libgnutls28-32bit is &lt;3.3.27-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520083" version="1" comment="gd is &lt;2.1.0-24.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520085" version="1" comment="shadow is &lt;4.2.1-27.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520113" version="1" comment="libwireshark9 is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520114" version="1" comment="libwiretap7 is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520115" version="1" comment="libwscodecs1 is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520116" version="1" comment="libwsutil8 is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520117" version="1" comment="wireshark is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520118" version="1" comment="wireshark-gtk is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530263" version="1" comment="res-signingkeys is &lt;3.0.37-52.23.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530264" version="1" comment="smt is &lt;3.0.37-52.23.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530265" version="1" comment="smt-support is &lt;3.0.37-52.23.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520119" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520120" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520121" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530267" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530268" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520122" version="1" comment="openssl is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520123" version="1" comment="unzip is &lt;6.00-33.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520124" version="1" comment="ghostscript is &lt;9.25-23.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520125" version="1" comment="ghostscript-x11 is &lt;9.25-23.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520126" version="1" comment="g3utils is &lt;1.1.36-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520127" version="1" comment="mgetty is &lt;1.1.36-58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520128" version="1" comment="openslp is &lt;2.0.0-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520129" version="1" comment="openslp-32bit is &lt;2.0.0-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530283" version="1" comment="openslp-server is &lt;2.0.0-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520140" version="1" comment="libkpathsea6 is &lt;6.2.0dev-22.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520141" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.181-27.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530284" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.181-27.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530285" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.181-27.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520142" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.181-27.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520143" version="1" comment="cups-filters is &lt;1.0.58-19.2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520144" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-19.2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520145" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-19.2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520146" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-19.2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520147" version="1" comment="libqpdf18 is &lt;7.1.1-3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530290" version="1" comment="qpdf is &lt;7.1.1-3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520148" version="1" comment="libSoundTouch0 is &lt;1.7.1-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520151" version="1" comment="libecpg6 is &lt;10.5-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520152" version="1" comment="libpq5 is &lt;10.5-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520153" version="1" comment="libpq5-32bit is &lt;10.5-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520154" version="1" comment="postgresql10 is &lt;10.5-1.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530292" version="1" comment="postgresql10-contrib is &lt;10.5-1.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530294" version="1" comment="postgresql10-server is &lt;10.5-1.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520155" version="1" comment="libxml2-2 is &lt;2.9.4-46.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520156" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520157" version="1" comment="libxml2-tools is &lt;2.9.4-46.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520158" version="1" comment="python-libxml2 is &lt;2.9.4-46.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520161" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520163" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520164" version="1" comment="libX11-6 is &lt;1.6.2-12.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520165" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520167" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520168" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520169" version="1" comment="libxcb-dri2-0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520170" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520171" version="1" comment="libxcb-dri3-0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520172" version="1" comment="libxcb-dri3-0-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520173" version="1" comment="libxcb-glx0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520174" version="1" comment="libxcb-glx0-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520175" version="1" comment="libxcb-present0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520176" version="1" comment="libxcb-present0-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520177" version="1" comment="libxcb-randr0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520178" version="1" comment="libxcb-render0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520179" version="1" comment="libxcb-render0-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520180" version="1" comment="libxcb-shape0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520181" version="1" comment="libxcb-shm0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520182" version="1" comment="libxcb-shm0-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520183" version="1" comment="libxcb-sync1 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520184" version="1" comment="libxcb-sync1-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520185" version="1" comment="libxcb-xf86dri0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520186" version="1" comment="libxcb-xfixes0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520187" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520188" version="1" comment="libxcb-xinerama0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520189" version="1" comment="libxcb-xkb1 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520190" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520191" version="1" comment="libxcb-xv0 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520192" version="1" comment="libxcb1 is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520193" version="1" comment="libxcb1-32bit is &lt;1.10-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520194" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520195" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520196" version="1" comment="libdcerpc0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520197" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520198" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520199" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520200" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520201" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520202" version="1" comment="libndr-standard0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520203" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520204" version="1" comment="libndr0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520205" version="1" comment="libndr0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520206" version="1" comment="libnetapi0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520207" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520208" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520209" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520210" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520211" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520212" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520213" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520214" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520215" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520216" version="1" comment="libsamba-util0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520217" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520218" version="1" comment="libsamdb0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520219" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520220" version="1" comment="libsmbclient0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520221" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520222" version="1" comment="libsmbconf0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520223" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520224" version="1" comment="libsmbldap0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520225" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520226" version="1" comment="libtevent-util0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520227" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520228" version="1" comment="libwbclient0 is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520229" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520230" version="1" comment="samba is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520231" version="1" comment="samba-client is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520232" version="1" comment="samba-client-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520234" version="1" comment="samba-libs is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520235" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520236" version="1" comment="samba-winbind is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520237" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.124.aee309c5c18-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520240" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520242" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520243" version="1" comment="binutils is &lt;2.31-9.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520244" version="1" comment="fuse is &lt;2.9.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520245" version="1" comment="libfuse2 is &lt;2.9.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557260" version="1" comment="python3-rpm is &lt;4.11.2-16.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520251" version="1" comment="rpm is &lt;4.11.2-16.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520252" version="1" comment="rpm-32bit is &lt;4.11.2-16.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520253" version="1" comment="rpm-build is &lt;4.11.2-16.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520254" version="1" comment="rpm-python is &lt;4.11.2-16.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520255" version="1" comment="libtiff5 is &lt;4.0.9-44.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520256" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557261" version="1" comment="tiff is &lt;4.0.9-44.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520257" version="1" comment="pam_pkcs11 is &lt;0.6.8-7.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520258" version="1" comment="pam_pkcs11-32bit is &lt;0.6.8-7.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520262" version="1" comment="ntp is &lt;4.2.8p12-64.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520263" version="1" comment="ntp-doc is &lt;4.2.8p12-64.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520265" version="1" comment="postgresql96 is &lt;9.6.10-3.22.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530311" version="1" comment="postgresql96-contrib is &lt;9.6.10-3.22.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530313" version="1" comment="postgresql96-server is &lt;9.6.10-3.22.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520266" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.20.3-2.23.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520267" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.20.3-2.23.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520269" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.20.3-2.23.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520270" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.20.3-2.23.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520271" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.20.3-2.23.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520272" version="1" comment="libexempi3 is &lt;2.2.1-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520273" version="1" comment="clamav is &lt;0.100.2-33.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520274" version="1" comment="libsnmp30 is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520275" version="1" comment="libsnmp30-32bit is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520276" version="1" comment="net-snmp is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520277" version="1" comment="perl-SNMP is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520278" version="1" comment="snmp-mibs is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520281" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520283" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530314" version="1" comment="res-signingkeys is &lt;3.0.38-52.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530315" version="1" comment="smt is &lt;3.0.38-52.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530316" version="1" comment="smt-support is &lt;3.0.38-52.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520287" version="1" comment="lcms2 is &lt;2.7-9.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520288" version="1" comment="liblcms2-2 is &lt;2.7-9.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520289" version="1" comment="liblcms2-2-32bit is &lt;2.7-9.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520290" version="1" comment="qemu is &lt;2.9.1-6.19.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520291" version="1" comment="qemu-block-curl is &lt;2.9.1-6.19.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557262" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.19.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557263" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.19.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557264" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.19.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557265" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.19.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520293" version="1" comment="qemu-kvm is &lt;2.9.1-6.19.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557266" version="1" comment="qemu-lang is &lt;2.9.1-6.19.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520296" version="1" comment="qemu-tools is &lt;2.9.1-6.19.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520299" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520300" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520301" version="1" comment="python is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557267" version="1" comment="python-32bit is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520302" version="1" comment="python-base is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557268" version="1" comment="python-base-32bit is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520303" version="1" comment="python-curses is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557269" version="1" comment="python-demo is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557270" version="1" comment="python-gdbm is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557271" version="1" comment="python-idle is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520305" version="1" comment="python-tk is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520306" version="1" comment="python-xml is &lt;2.7.13-28.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530317" version="1" comment="apache2 is &lt;2.4.23-29.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530319" version="1" comment="apache2-example-pages is &lt;2.4.23-29.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530320" version="1" comment="apache2-prefork is &lt;2.4.23-29.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530321" version="1" comment="apache2-utils is &lt;2.4.23-29.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530322" version="1" comment="apache2-worker is &lt;2.4.23-29.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520307" version="1" comment="audiofile is &lt;0.3.6-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520308" version="1" comment="libaudiofile1 is &lt;0.3.6-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520309" version="1" comment="libaudiofile1-32bit is &lt;0.3.6-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520313" version="1" comment="libwireshark9 is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520314" version="1" comment="libwiretap7 is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520315" version="1" comment="libwscodecs1 is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520316" version="1" comment="libwsutil8 is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520317" version="1" comment="wireshark is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520318" version="1" comment="wireshark-gtk is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520319" version="1" comment="MozillaFirefox is &lt;60.2.2esr-109.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520320" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520321" version="1" comment="MozillaFirefox-translations-common is &lt;60.2.2esr-109.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530324" version="1" comment="apache2-mod_nss is &lt;1.0.14-19.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520322" version="1" comment="libfreebl3 is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520323" version="1" comment="libfreebl3-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530325" version="1" comment="libfreebl3-hmac is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530326" version="1" comment="libfreebl3-hmac-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520324" version="1" comment="libsoftokn3 is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520325" version="1" comment="libsoftokn3-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530327" version="1" comment="libsoftokn3-hmac is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530328" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520326" version="1" comment="mozilla-nspr is &lt;4.19-19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520327" version="1" comment="mozilla-nspr-32bit is &lt;4.19-19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520328" version="1" comment="mozilla-nss is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520329" version="1" comment="mozilla-nss-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520330" version="1" comment="mozilla-nss-certs is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520331" version="1" comment="mozilla-nss-certs-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520332" version="1" comment="mozilla-nss-sysinit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520333" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520334" version="1" comment="mozilla-nss-tools is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520335" version="1" comment="curl is &lt;7.37.0-37.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520336" version="1" comment="libcurl4 is &lt;7.37.0-37.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520337" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520338" version="1" comment="libSoundTouch0 is &lt;1.7.1-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520341" version="1" comment="opensc is &lt;0.13.0-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520342" version="1" comment="libarchive13 is &lt;3.1.2-26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520350" version="1" comment="MozillaFirefox is &lt;60.3.0-109.50.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520351" version="1" comment="MozillaFirefox-translations-common is &lt;60.3.0-109.50.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520352" version="1" comment="libsystemd0 is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520353" version="1" comment="libsystemd0-32bit is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520354" version="1" comment="libudev1 is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520355" version="1" comment="libudev1-32bit is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520356" version="1" comment="systemd is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520357" version="1" comment="systemd-32bit is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520359" version="1" comment="systemd-sysvinit is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520360" version="1" comment="udev is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520361" version="1" comment="libecpg6 is &lt;10.6-1.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520362" version="1" comment="libpq5 is &lt;10.6-1.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520363" version="1" comment="libpq5-32bit is &lt;10.6-1.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520364" version="1" comment="postgresql10 is &lt;10.6-1.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557272" version="1" comment="postgresql10-contrib is &lt;10.6-1.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557273" version="1" comment="postgresql10-server is &lt;10.6-1.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557274" version="1" comment="squid is &lt;3.5.21-26.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520373" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520374" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520375" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530330" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530331" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520376" version="1" comment="openssl is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521784" version="1" comment="python3-rpm is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520377" version="1" comment="rpm is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520378" version="1" comment="rpm-32bit is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520379" version="1" comment="rpm-build is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520380" version="1" comment="rpm-python is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520381" version="1" comment="libexiv2-12 is &lt;0.23-12.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520382" version="1" comment="libtiff5 is &lt;4.0.9-44.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520383" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557275" version="1" comment="tiff is &lt;4.0.9-44.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520384" version="1" comment="openssh is &lt;7.2p2-74.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520385" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530337" version="1" comment="openssh-fips is &lt;7.2p2-74.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520386" version="1" comment="openssh-helpers is &lt;7.2p2-74.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530338" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.35-38.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530341" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.35-38.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520387" version="1" comment="libncurses5 is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520388" version="1" comment="libncurses5-32bit is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520389" version="1" comment="libncurses6 is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520390" version="1" comment="libncurses6-32bit is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520391" version="1" comment="ncurses-devel is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557276" version="1" comment="ncurses-devel-32bit is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520392" version="1" comment="ncurses-utils is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520393" version="1" comment="tack is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520394" version="1" comment="terminfo is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520395" version="1" comment="terminfo-base is &lt;5.9-61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520398" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.93.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520400" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.93.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520401" version="1" comment="python-cryptography is &lt;1.3.1-7.13.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521791" version="1" comment="python3-cryptography is &lt;1.3.1-7.13.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530343" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.25-30.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520410" version="1" comment="ghostscript is &lt;9.26-23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520411" version="1" comment="ghostscript-x11 is &lt;9.26-23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520412" version="1" comment="libspectre1 is &lt;0.2.7-12.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520413" version="1" comment="cups is &lt;1.7.5-20.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520414" version="1" comment="cups-client is &lt;1.7.5-20.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520415" version="1" comment="cups-libs is &lt;1.7.5-20.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520416" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530347" version="1" comment="git-core is &lt;2.12.3-27.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557277" version="1" comment="openvswitch is &lt;2.7.6-3.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520417" version="1" comment="qemu is &lt;2.9.1-6.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520418" version="1" comment="qemu-block-curl is &lt;2.9.1-6.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557278" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557279" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557280" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557281" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520420" version="1" comment="qemu-kvm is &lt;2.9.1-6.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557282" version="1" comment="qemu-lang is &lt;2.9.1-6.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520423" version="1" comment="qemu-tools is &lt;2.9.1-6.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520426" version="1" comment="tcpdump is &lt;4.9.2-14.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520427" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520428" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557283" version="1" comment="openldap2 is &lt;2.4.41-18.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557284" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520429" version="1" comment="openldap2-client is &lt;2.4.41-18.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520430" version="1" comment="libQt5Concurrent5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520431" version="1" comment="libQt5Core5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520432" version="1" comment="libQt5DBus5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520433" version="1" comment="libQt5Gui5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520434" version="1" comment="libQt5Network5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520435" version="1" comment="libQt5OpenGL5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520436" version="1" comment="libQt5PrintSupport5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520437" version="1" comment="libQt5Sql5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520438" version="1" comment="libQt5Sql5-mysql is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520439" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520440" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520441" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520442" version="1" comment="libQt5Test5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520443" version="1" comment="libQt5Widgets5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520444" version="1" comment="libQt5Xml5 is &lt;5.6.2-6.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520445" version="1" comment="bluez is &lt;5.13-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520447" version="1" comment="libbluetooth3 is &lt;5.13-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520448" version="1" comment="libtiff5 is &lt;4.0.9-44.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520449" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557285" version="1" comment="tiff is &lt;4.0.9-44.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557286" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557287" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520455" version="1" comment="MozillaFirefox is &lt;60.4.0esr-109.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520456" version="1" comment="MozillaFirefox-translations-common is &lt;60.4.0esr-109.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520457" version="1" comment="libfreebl3 is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520458" version="1" comment="libfreebl3-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520459" version="1" comment="libsoftokn3 is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520460" version="1" comment="libsoftokn3-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520461" version="1" comment="mozilla-nspr is &lt;4.20-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520462" version="1" comment="mozilla-nspr-32bit is &lt;4.20-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520463" version="1" comment="mozilla-nss is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520464" version="1" comment="mozilla-nss-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520465" version="1" comment="mozilla-nss-certs is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520466" version="1" comment="mozilla-nss-certs-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520467" version="1" comment="mozilla-nss-sysinit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520468" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520469" version="1" comment="mozilla-nss-tools is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530378" version="1" comment="mailman is &lt;2.1.17-3.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520519" version="1" comment="libwireshark9 is &lt;2.4.11-48.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520520" version="1" comment="libwiretap7 is &lt;2.4.11-48.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520521" version="1" comment="libwscodecs1 is &lt;2.4.11-48.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520522" version="1" comment="libwsutil8 is &lt;2.4.11-48.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520523" version="1" comment="wireshark is &lt;2.4.11-48.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520524" version="1" comment="wireshark-gtk is &lt;2.4.11-48.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521027" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.0-2.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521028" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.0-2.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521030" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.0-2.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521031" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.0-2.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521032" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.0-2.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521034" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521035" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521037" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521039" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521040" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521041" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521042" version="1" comment="libdcerpc0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521043" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521044" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521045" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521046" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521047" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521048" version="1" comment="libndr-standard0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521049" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521050" version="1" comment="libndr0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521051" version="1" comment="libndr0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521052" version="1" comment="libnetapi0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521053" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521054" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521055" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521056" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521057" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521058" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521059" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521060" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521061" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521062" version="1" comment="libsamba-util0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521063" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521064" version="1" comment="libsamdb0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521065" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521066" version="1" comment="libsmbclient0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521067" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521068" version="1" comment="libsmbconf0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521069" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521070" version="1" comment="libsmbldap0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521071" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521072" version="1" comment="libtevent-util0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521073" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521074" version="1" comment="libwbclient0 is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521075" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521076" version="1" comment="samba is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521077" version="1" comment="samba-client is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521078" version="1" comment="samba-client-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521080" version="1" comment="samba-libs is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521081" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521082" version="1" comment="samba-winbind is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521083" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.154.2998451b912-3.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521084" version="1" comment="libwireshark9 is &lt;2.4.14-48.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521085" version="1" comment="libwiretap7 is &lt;2.4.14-48.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521086" version="1" comment="libwscodecs1 is &lt;2.4.14-48.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521087" version="1" comment="libwsutil8 is &lt;2.4.14-48.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521088" version="1" comment="wireshark is &lt;2.4.14-48.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521089" version="1" comment="wireshark-gtk is &lt;2.4.14-48.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521090" version="1" comment="libvirt is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521091" version="1" comment="libvirt-admin is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521092" version="1" comment="libvirt-client is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521093" version="1" comment="libvirt-daemon is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521094" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521095" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521096" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521098" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521099" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521100" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521101" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521102" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521103" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521104" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521105" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521106" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521107" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521108" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521109" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521110" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521111" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557288" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521112" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521113" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521115" version="1" comment="libvirt-doc is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521116" version="1" comment="libvirt-libs is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557289" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557290" version="1" comment="libvirt-nss is &lt;3.3.0-5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521117" version="1" comment="libssh2-1 is &lt;1.4.3-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521118" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521119" version="1" comment="wpa_supplicant is &lt;2.6-15.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521120" version="1" comment="atftp is &lt;0.7.0-160.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521121" version="1" comment="krb5 is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521122" version="1" comment="krb5-32bit is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521123" version="1" comment="krb5-client is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530427" version="1" comment="krb5-doc is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530428" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530429" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530430" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530431" version="1" comment="krb5-server is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521124" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521125" version="1" comment="libjpeg62 is &lt;62.2.0-31.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521126" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521127" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521128" version="1" comment="libjpeg8 is &lt;8.1.2-31.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521129" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521130" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521132" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521133" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521134" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530433" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530434" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521135" version="1" comment="openssl is &lt;1.0.2j-60.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521136" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521137" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521139" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521140" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521141" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521142" version="1" comment="audit is &lt;2.8.1-8.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557291" version="1" comment="audit-audispd-plugins is &lt;2.8.1-8.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521143" version="1" comment="libaudit1 is &lt;2.8.1-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521144" version="1" comment="libaudit1-32bit is &lt;2.8.1-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521145" version="1" comment="libauparse0 is &lt;2.8.1-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557292" version="1" comment="freeradius-server is &lt;3.0.15-2.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557293" version="1" comment="freeradius-server-doc is &lt;3.0.15-2.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557294" version="1" comment="freeradius-server-krb5 is &lt;3.0.15-2.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557295" version="1" comment="freeradius-server-ldap is &lt;3.0.15-2.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557296" version="1" comment="freeradius-server-libs is &lt;3.0.15-2.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557297" version="1" comment="freeradius-server-mysql is &lt;3.0.15-2.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557298" version="1" comment="freeradius-server-perl is &lt;3.0.15-2.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557299" version="1" comment="freeradius-server-postgresql is &lt;3.0.15-2.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557300" version="1" comment="freeradius-server-python is &lt;3.0.15-2.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557301" version="1" comment="freeradius-server-sqlite is &lt;3.0.15-2.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557302" version="1" comment="freeradius-server-utils is &lt;3.0.15-2.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557303" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557304" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521147" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521148" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521149" version="1" comment="sqlite3 is &lt;3.8.10.2-9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521150" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.212-27.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530485" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.212-27.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530486" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.212-27.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521151" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.212-27.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521152" version="1" comment="libxslt-tools is &lt;1.1.28-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521153" version="1" comment="libxslt1 is &lt;1.1.28-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521154" version="1" comment="libxslt1-32bit is &lt;1.1.28-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521156" version="1" comment="qemu is &lt;2.9.1-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521157" version="1" comment="qemu-block-curl is &lt;2.9.1-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557305" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557306" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557307" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557308" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521159" version="1" comment="qemu-kvm is &lt;2.9.1-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557309" version="1" comment="qemu-lang is &lt;2.9.1-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521162" version="1" comment="qemu-tools is &lt;2.9.1-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521175" version="1" comment="libsystemd0 is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521176" version="1" comment="libsystemd0-32bit is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521177" version="1" comment="libudev1 is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521178" version="1" comment="libudev1-32bit is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521179" version="1" comment="systemd is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521180" version="1" comment="systemd-32bit is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521182" version="1" comment="systemd-sysvinit is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521183" version="1" comment="udev is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521185" version="1" comment="PackageKit is &lt;1.1.3-24.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521186" version="1" comment="PackageKit-backend-zypp is &lt;1.1.3-24.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521190" version="1" comment="libpackagekit-glib2-18 is &lt;1.1.3-24.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521191" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.1.3-24.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557310" version="1" comment="nmap is &lt;6.46-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521193" version="1" comment="openssh is &lt;7.2p2-74.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521194" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530509" version="1" comment="openssh-fips is &lt;7.2p2-74.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521195" version="1" comment="openssh-helpers is &lt;7.2p2-74.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521196" version="1" comment="sysstat is &lt;12.0.2-10.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557311" version="1" comment="sysstat-isag is &lt;12.0.2-10.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521197" version="1" comment="bluez is &lt;5.13-5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521199" version="1" comment="libbluetooth3 is &lt;5.13-5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530510" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.45-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530513" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.45-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521202" version="1" comment="libsystemd0 is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521203" version="1" comment="libsystemd0-32bit is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521204" version="1" comment="libudev1 is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521205" version="1" comment="libudev1-32bit is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521206" version="1" comment="systemd is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521207" version="1" comment="systemd-32bit is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521209" version="1" comment="systemd-sysvinit is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521210" version="1" comment="udev is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521211" version="1" comment="screen is &lt;4.0.4-23.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521212" version="1" comment="curl is &lt;7.37.0-37.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521213" version="1" comment="libcurl4 is &lt;7.37.0-37.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521214" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521215" version="1" comment="libtasn1 is &lt;4.9-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521216" version="1" comment="libtasn1-6 is &lt;4.9-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521217" version="1" comment="libtasn1-6-32bit is &lt;4.9-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521218" version="1" comment="libwireshark9 is &lt;2.4.12-48.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521219" version="1" comment="libwiretap7 is &lt;2.4.12-48.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521220" version="1" comment="libwscodecs1 is &lt;2.4.12-48.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521221" version="1" comment="libwsutil8 is &lt;2.4.12-48.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521222" version="1" comment="wireshark is &lt;2.4.12-48.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521223" version="1" comment="wireshark-gtk is &lt;2.4.12-48.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521224" version="1" comment="MozillaFirefox is &lt;60.7.0-109.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521225" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.0-109.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521226" version="1" comment="gnome-shell is &lt;3.20.4-77.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521227" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-77.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521232" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.221-43.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530522" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.221-43.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530523" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.221-43.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521233" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.221-43.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557312" version="1" comment="apache2-mod_jk is &lt;1.2.40-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530524" version="1" comment="bind is &lt;9.9.9P1-63.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530525" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521234" version="1" comment="bind-libs is &lt;9.9.9P1-63.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521235" version="1" comment="bind-utils is &lt;9.9.9P1-63.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521236" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521237" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521238" version="1" comment="python is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530548" version="1" comment="python-32bit is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521239" version="1" comment="python-base is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530549" version="1" comment="python-base-32bit is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521240" version="1" comment="python-curses is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530550" version="1" comment="python-demo is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530553" version="1" comment="python-gdbm is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530554" version="1" comment="python-idle is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521242" version="1" comment="python-tk is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521243" version="1" comment="python-xml is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521244" version="1" comment="ghostscript is &lt;9.26a-23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521245" version="1" comment="ghostscript-x11 is &lt;9.26a-23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521246" version="1" comment="libspectre1 is &lt;0.2.7-12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521427" version="1" comment="gvim is &lt;7.4.326-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521428" version="1" comment="vim is &lt;7.4.326-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521430" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521431" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521433" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521434" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521435" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521436" version="1" comment="libcroco-0_6-3 is &lt;0.6.11-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521437" version="1" comment="libcroco-0_6-3-32bit is &lt;0.6.11-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521438" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521439" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521440" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521441" version="1" comment="libsss_sudo is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521442" version="1" comment="python-sssd-config is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521443" version="1" comment="sssd is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521444" version="1" comment="sssd-ad is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521445" version="1" comment="sssd-ipa is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521446" version="1" comment="sssd-krb5 is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521447" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521448" version="1" comment="sssd-ldap is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521449" version="1" comment="sssd-proxy is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521450" version="1" comment="sssd-tools is &lt;1.13.4-34.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521451" version="1" comment="libecpg6 is &lt;10.8-1.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521452" version="1" comment="libpq5 is &lt;10.8-1.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521453" version="1" comment="libpq5-32bit is &lt;10.8-1.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521454" version="1" comment="postgresql10 is &lt;10.8-1.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557313" version="1" comment="postgresql10-contrib is &lt;10.8-1.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557314" version="1" comment="postgresql10-server is &lt;10.8-1.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521455" version="1" comment="openssh is &lt;7.2p2-74.42.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521456" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.42.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530557" version="1" comment="openssh-fips is &lt;7.2p2-74.42.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521457" version="1" comment="openssh-helpers is &lt;7.2p2-74.42.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521465" version="1" comment="libvirt is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521466" version="1" comment="libvirt-admin is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521467" version="1" comment="libvirt-client is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521468" version="1" comment="libvirt-daemon is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521469" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521470" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521471" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521473" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521474" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521475" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521476" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521477" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521478" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521479" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521480" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521481" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521482" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521483" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521484" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521485" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521486" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557315" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521487" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521488" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521490" version="1" comment="libvirt-doc is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521491" version="1" comment="libvirt-libs is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557316" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557317" version="1" comment="libvirt-nss is &lt;3.3.0-5.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521493" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521495" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521496" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521497" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521498" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521499" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521500" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521502" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521503" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521504" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521505" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521506" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521507" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521508" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521509" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521510" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521511" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521516" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521517" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521518" version="1" comment="sqlite3 is &lt;3.8.10.2-9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521528" version="1" comment="libwireshark9 is &lt;2.4.15-48.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521529" version="1" comment="libwiretap7 is &lt;2.4.15-48.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521530" version="1" comment="libwscodecs1 is &lt;2.4.15-48.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521531" version="1" comment="libwsutil8 is &lt;2.4.15-48.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521532" version="1" comment="wireshark is &lt;2.4.15-48.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521533" version="1" comment="wireshark-gtk is &lt;2.4.15-48.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562509" version="1" comment="MozillaFirefox is &lt;60.7.1-109.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562510" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.1-109.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530570" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.35-30.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521534" version="1" comment="libnetpbm11 is &lt;10.66.3-8.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521535" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-8.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521536" version="1" comment="netpbm is &lt;10.66.3-8.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521539" version="1" comment="postgresql96 is &lt;9.6.13-3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557318" version="1" comment="postgresql96-contrib is &lt;9.6.13-3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557319" version="1" comment="postgresql96-server is &lt;9.6.13-3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521541" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.123.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521542" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.123.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521544" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.123.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521546" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.123.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521547" version="1" comment="dnsmasq is &lt;2.78-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521549" version="1" comment="glib2-tools is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521550" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521551" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521553" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521554" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521555" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521556" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521557" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521558" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521559" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521560" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521561" version="1" comment="elfutils is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521562" version="1" comment="libasm1 is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557320" version="1" comment="libasm1-32bit is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521563" version="1" comment="libdw1 is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521564" version="1" comment="libdw1-32bit is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521565" version="1" comment="libebl1 is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521566" version="1" comment="libebl1-32bit is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521567" version="1" comment="libelf1 is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521568" version="1" comment="libelf1-32bit is &lt;0.158-7.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521569" version="1" comment="avahi is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557321" version="1" comment="avahi-utils is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521571" version="1" comment="libavahi-client3 is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521572" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521573" version="1" comment="libavahi-common3 is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521574" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521575" version="1" comment="libavahi-core7 is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521576" version="1" comment="libavahi-glib1 is &lt;0.6.32-32.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521577" version="1" comment="libavahi-glib1-32bit is &lt;0.6.32-32.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521581" version="1" comment="libdns_sd is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521582" version="1" comment="libdns_sd-32bit is &lt;0.6.32-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521956" version="1" comment="expat is &lt;2.1.0-21.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521957" version="1" comment="libexpat1 is &lt;2.1.0-21.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521958" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521959" version="1" comment="xrdp is &lt;0.9.0~git.1456906198.f422461-21.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521961" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.2-2.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521962" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.2-2.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521964" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.2-2.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521965" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.2-2.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521966" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.2-2.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521987" version="1" comment="libxslt-tools is &lt;1.1.28-17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521988" version="1" comment="libxslt1 is &lt;1.1.28-17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521989" version="1" comment="libxslt1-32bit is &lt;1.1.28-17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521990" version="1" comment="libxml2-2 is &lt;2.9.4-46.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521991" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557322" version="1" comment="libxml2-doc is &lt;2.9.4-46.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521992" version="1" comment="libxml2-tools is &lt;2.9.4-46.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521993" version="1" comment="python-libxml2 is &lt;2.9.4-46.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521590" version="1" comment="libpolkit0 is &lt;0.113-5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521592" version="1" comment="polkit is &lt;0.113-5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521593" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522005" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.2-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522006" version="1" comment="spamassassin is &lt;3.4.2-44.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522007" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522009" version="1" comment="openexr is &lt;2.1.0-6.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522015" version="1" comment="cron is &lt;4.2-59.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522016" version="1" comment="cronie is &lt;1.4.11-59.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522021" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522022" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522024" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522026" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522030" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522032" version="1" comment="openexr is &lt;2.1.0-6.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522033" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.231-43.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557324" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.231-43.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557325" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.231-43.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522034" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.231-43.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530617" version="1" comment="libmysqlclient18-32bit is &lt;10.0.38-29.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530618" version="1" comment="mariadb is &lt;10.0.38-29.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530619" version="1" comment="mariadb-client is &lt;10.0.38-29.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530620" version="1" comment="mariadb-errormessages is &lt;10.0.38-29.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530621" version="1" comment="mariadb-tools is &lt;10.0.38-29.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522066" version="1" comment="tcpdump is &lt;4.9.2-14.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521595" version="1" comment="rsyslog is &lt;8.24.0-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557326" version="1" comment="rsyslog-diag-tools is &lt;8.24.0-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557327" version="1" comment="rsyslog-doc is &lt;8.24.0-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557328" version="1" comment="rsyslog-module-gssapi is &lt;8.24.0-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557329" version="1" comment="rsyslog-module-gtls is &lt;8.24.0-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557330" version="1" comment="rsyslog-module-mysql is &lt;8.24.0-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557331" version="1" comment="rsyslog-module-pgsql is &lt;8.24.0-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557332" version="1" comment="rsyslog-module-relp is &lt;8.24.0-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557333" version="1" comment="rsyslog-module-snmp is &lt;8.24.0-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557334" version="1" comment="rsyslog-module-udpspoof is &lt;8.24.0-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522075" version="1" comment="libwireshark9 is &lt;2.4.16-48.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522076" version="1" comment="libwiretap7 is &lt;2.4.16-48.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522077" version="1" comment="libwscodecs1 is &lt;2.4.16-48.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522078" version="1" comment="libwsutil8 is &lt;2.4.16-48.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522079" version="1" comment="wireshark is &lt;2.4.16-48.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522080" version="1" comment="wireshark-gtk is &lt;2.4.16-48.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522086" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557335" version="1" comment="python-urllib3 is &lt;1.22-7.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557336" version="1" comment="apache-commons-beanutils is &lt;1.9.2-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557337" version="1" comment="apache-commons-beanutils-javadoc is &lt;1.9.2-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522089" version="1" comment="libnm-glib-vpn1 is &lt;1.0.12-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522090" version="1" comment="libnm-glib4 is &lt;1.0.12-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522091" version="1" comment="libnm-util2 is &lt;1.0.12-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522092" version="1" comment="libnm0 is &lt;1.0.12-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522094" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.0.12-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522095" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.0.12-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522105" version="1" comment="libecpg6 is &lt;10.10-1.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522106" version="1" comment="libpq5 is &lt;10.10-1.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522107" version="1" comment="libpq5-32bit is &lt;10.10-1.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522108" version="1" comment="postgresql10 is &lt;10.10-1.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557338" version="1" comment="postgresql10-contrib is &lt;10.10-1.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557339" version="1" comment="postgresql10-docs is &lt;10.10-1.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557340" version="1" comment="postgresql10-server is &lt;10.10-1.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557341" version="1" comment="qemu is &lt;2.9.1-6.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557342" version="1" comment="qemu-block-curl is &lt;2.9.1-6.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557343" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557344" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557345" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557346" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557347" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557348" version="1" comment="qemu-kvm is &lt;2.9.1-6.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557349" version="1" comment="qemu-lang is &lt;2.9.1-6.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557350" version="1" comment="qemu-seabios is &lt;1.10.2-6.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557351" version="1" comment="qemu-sgabios is &lt;8-6.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557352" version="1" comment="qemu-tools is &lt;2.9.1-6.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557353" version="1" comment="qemu-vgabios is &lt;1.10.2-6.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557354" version="1" comment="qemu-x86 is &lt;2.9.1-6.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557355" version="1" comment="apache2 is &lt;2.4.23-29.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557356" version="1" comment="apache2-doc is &lt;2.4.23-29.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557357" version="1" comment="apache2-example-pages is &lt;2.4.23-29.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557358" version="1" comment="apache2-prefork is &lt;2.4.23-29.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557359" version="1" comment="apache2-utils is &lt;2.4.23-29.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557360" version="1" comment="apache2-worker is &lt;2.4.23-29.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522120" version="1" comment="ghostscript is &lt;9.26a-23.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522121" version="1" comment="ghostscript-x11 is &lt;9.26a-23.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522131" version="1" comment="ceph-common is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522132" version="1" comment="libcephfs2 is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522133" version="1" comment="librados2 is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522134" version="1" comment="libradosstriper1 is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522135" version="1" comment="librbd1 is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522136" version="1" comment="librgw2 is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522137" version="1" comment="python-cephfs is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522138" version="1" comment="python-rados is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522139" version="1" comment="python-rbd is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522140" version="1" comment="python-rgw is &lt;12.2.12+git.1568024032.02236657ca-2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522153" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522154" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557361" version="1" comment="openldap2 is &lt;2.4.41-18.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557362" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522155" version="1" comment="openldap2-client is &lt;2.4.41-18.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522156" version="1" comment="openldap2-doc is &lt;2.4.41-18.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557363" version="1" comment="libpython3_6m1_0 is &lt;3.6.8-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557364" version="1" comment="python36 is &lt;3.6.8-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557365" version="1" comment="python36-base is &lt;3.6.8-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557366" version="1" comment="python36-curses is &lt;3.6.8-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557367" version="1" comment="python36-dbm is &lt;3.6.8-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557368" version="1" comment="python36-devel is &lt;3.6.8-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557369" version="1" comment="python36-doc is &lt;3.6.8-6.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557370" version="1" comment="python36-idle is &lt;3.6.8-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557371" version="1" comment="python36-testsuite is &lt;3.6.8-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557372" version="1" comment="python36-tk is &lt;3.6.8-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557373" version="1" comment="python36-tools is &lt;3.6.8-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521596" version="1" comment="libspice-server1 is &lt;0.12.8-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557374" version="1" comment="nmap is &lt;6.46-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521597" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521598" version="1" comment="python3 is &lt;3.4.6-25.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521599" version="1" comment="python3-base is &lt;3.4.6-25.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521600" version="1" comment="python3-curses is &lt;3.4.6-25.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522214" version="1" comment="expat is &lt;2.1.0-21.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522215" version="1" comment="libexpat1 is &lt;2.1.0-21.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522216" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522217" version="1" comment="libdjvulibre21 is &lt;3.5.25.3-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557376" version="1" comment="libmysqlclient18-32bit is &lt;10.0.40.1-29.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557377" version="1" comment="mariadb is &lt;10.0.40.1-29.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557378" version="1" comment="mariadb-client is &lt;10.0.40.1-29.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557379" version="1" comment="mariadb-errormessages is &lt;10.0.40.1-29.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557380" version="1" comment="mariadb-tools is &lt;10.0.40.1-29.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522220" version="1" comment="gpg2 is &lt;2.0.24-9.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522221" version="1" comment="gpg2-lang is &lt;2.0.24-9.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521601" version="1" comment="curl is &lt;7.37.0-37.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521602" version="1" comment="libcurl4 is &lt;7.37.0-37.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521603" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522238" version="1" comment="libjasper1 is &lt;1.900.14-195.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522239" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522240" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522241" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522242" version="1" comment="sqlite3 is &lt;3.8.10.2-9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561941" version="1" comment="python-setuptools is &lt;40.6.2-4.12.23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561942" version="1" comment="python3-setuptools is &lt;40.6.2-4.12.23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522258" version="1" comment="python-xdg is &lt;0.25-9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522259" version="1" comment="dhcp is &lt;4.3.3-10.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522260" version="1" comment="dhcp-client is &lt;4.3.3-10.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557381" version="1" comment="dhcp-relay is &lt;4.3.3-10.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557382" version="1" comment="dhcp-server is &lt;4.3.3-10.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522263" version="1" comment="libcaca0 is &lt;0.99.beta18-14.3.27 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522264" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522265" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522266" version="1" comment="python is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557383" version="1" comment="python-32bit is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522267" version="1" comment="python-base is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557384" version="1" comment="python-base-32bit is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522268" version="1" comment="python-curses is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557385" version="1" comment="python-demo is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522269" version="1" comment="python-devel is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557386" version="1" comment="python-doc is &lt;2.7.13-28.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557387" version="1" comment="python-doc-pdf is &lt;2.7.13-28.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557388" version="1" comment="python-gdbm is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557389" version="1" comment="python-idle is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522270" version="1" comment="python-tk is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522271" version="1" comment="python-xml is &lt;2.7.13-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522272" version="1" comment="sysstat is &lt;12.0.2-10.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557390" version="1" comment="sysstat-isag is &lt;12.0.2-10.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557391" version="1" comment="libpython3_6m1_0 is &lt;3.6.8-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557392" version="1" comment="python36 is &lt;3.6.8-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557393" version="1" comment="python36-base is &lt;3.6.8-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557394" version="1" comment="python36-curses is &lt;3.6.8-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557395" version="1" comment="python36-dbm is &lt;3.6.8-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557396" version="1" comment="python36-devel is &lt;3.6.8-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557397" version="1" comment="python36-doc is &lt;3.6.8-6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557398" version="1" comment="python36-idle is &lt;3.6.8-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557399" version="1" comment="python36-testsuite is &lt;3.6.8-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557400" version="1" comment="python36-tk is &lt;3.6.8-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557401" version="1" comment="python36-tools is &lt;3.6.8-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522276" version="1" comment="accountsservice is &lt;0.6.42-16.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522277" version="1" comment="accountsservice-lang is &lt;0.6.42-16.8.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522278" version="1" comment="libaccountsservice0 is &lt;0.6.42-16.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522279" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.42-16.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522283" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522284" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522286" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522288" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522289" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522290" version="1" comment="python3 is &lt;3.4.6-25.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522291" version="1" comment="python3-base is &lt;3.4.6-25.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522292" version="1" comment="python3-curses is &lt;3.4.6-25.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562585" version="1" comment="rsyslog is &lt;8.24.0-3.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562586" version="1" comment="rsyslog-diag-tools is &lt;8.24.0-3.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562587" version="1" comment="rsyslog-doc is &lt;8.24.0-3.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562588" version="1" comment="rsyslog-module-gssapi is &lt;8.24.0-3.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562589" version="1" comment="rsyslog-module-gtls is &lt;8.24.0-3.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562590" version="1" comment="rsyslog-module-mysql is &lt;8.24.0-3.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562591" version="1" comment="rsyslog-module-pgsql is &lt;8.24.0-3.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562592" version="1" comment="rsyslog-module-relp is &lt;8.24.0-3.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562593" version="1" comment="rsyslog-module-snmp is &lt;8.24.0-3.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562594" version="1" comment="rsyslog-module-udpspoof is &lt;8.24.0-3.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521604" version="1" comment="libunwind is &lt;1.1-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557402" version="1" comment="libunwind-devel is &lt;1.1-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522346" version="1" comment="bluez is &lt;5.13-5.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522348" version="1" comment="libbluetooth3 is &lt;5.13-5.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557403" version="1" comment="dpdk is &lt;16.11.9-11.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557404" version="1" comment="dpdk-kmp-default is &lt;16.11.9_k4.4.140_96.45.TDC-11.3.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557405" version="1" comment="dpdk-tools is &lt;16.11.9-11.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522387" version="1" comment="aspell is &lt;0.60.6.1-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557406" version="1" comment="aspell-ispell is &lt;0.60.6.1-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522388" version="1" comment="libaspell15 is &lt;0.60.6.1-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522389" version="1" comment="libaspell15-32bit is &lt;0.60.6.1-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522397" version="1" comment="libtiff5 is &lt;4.0.9-44.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522398" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557407" version="1" comment="tiff is &lt;4.0.9-44.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522399" version="1" comment="cpio is &lt;2.11-36.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522400" version="1" comment="cpio-lang is &lt;2.11-36.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522406" version="1" comment="libxml2-2 is &lt;2.9.4-46.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522407" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557408" version="1" comment="libxml2-doc is &lt;2.9.4-46.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522408" version="1" comment="libxml2-tools is &lt;2.9.4-46.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522409" version="1" comment="python-libxml2 is &lt;2.9.4-46.23.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522410" version="1" comment="libarchive13 is &lt;3.1.2-26.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522411" version="1" comment="libncurses5 is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522412" version="1" comment="libncurses5-32bit is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522413" version="1" comment="libncurses6 is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522414" version="1" comment="libncurses6-32bit is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522415" version="1" comment="ncurses-devel is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557409" version="1" comment="ncurses-devel-32bit is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522416" version="1" comment="ncurses-utils is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522417" version="1" comment="tack is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522418" version="1" comment="terminfo is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522419" version="1" comment="terminfo-base is &lt;5.9-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530784" version="1" comment="libvncclient0 is &lt;0.9.9-17.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530785" version="1" comment="libvncserver0 is &lt;0.9.9-17.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557410" version="1" comment="Mesa is &lt;17.0.5-117.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557411" version="1" comment="Mesa-32bit is &lt;17.0.5-117.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557412" version="1" comment="Mesa-libEGL1 is &lt;17.0.5-117.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557413" version="1" comment="Mesa-libEGL1-32bit is &lt;17.0.5-117.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557414" version="1" comment="Mesa-libGL1 is &lt;17.0.5-117.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557415" version="1" comment="Mesa-libGL1-32bit is &lt;17.0.5-117.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557416" version="1" comment="Mesa-libGLESv2-2 is &lt;17.0.5-117.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557417" version="1" comment="Mesa-libglapi0 is &lt;17.0.5-117.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557418" version="1" comment="Mesa-libglapi0-32bit is &lt;17.0.5-117.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557419" version="1" comment="libgbm1 is &lt;17.0.5-117.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557420" version="1" comment="libgbm1-32bit is &lt;17.0.5-117.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557421" version="1" comment="libxatracker2 is &lt;1.0.0-117.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557422" version="1" comment="apache2-mod_perl is &lt;2.0.8-13.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521605" version="1" comment="MozillaFirefox is &lt;60.5.0esr-109.58.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521606" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-32.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521607" version="1" comment="MozillaFirefox-translations-common is &lt;60.5.0esr-109.58.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521608" version="1" comment="libfreebl3 is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521609" version="1" comment="libfreebl3-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530791" version="1" comment="libfreebl3-hmac is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530792" version="1" comment="libfreebl3-hmac-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521610" version="1" comment="libsoftokn3 is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521611" version="1" comment="libsoftokn3-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530793" version="1" comment="libsoftokn3-hmac is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530794" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521612" version="1" comment="mozilla-nss is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521613" version="1" comment="mozilla-nss-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521614" version="1" comment="mozilla-nss-certs is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521615" version="1" comment="mozilla-nss-certs-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521616" version="1" comment="mozilla-nss-sysinit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521617" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521618" version="1" comment="mozilla-nss-tools is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521620" version="1" comment="python-numpy is &lt;1.8.0-5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521621" version="1" comment="libsystemd0 is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521622" version="1" comment="libsystemd0-32bit is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521623" version="1" comment="libudev1 is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521624" version="1" comment="libudev1-32bit is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521625" version="1" comment="systemd is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521626" version="1" comment="systemd-32bit is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521628" version="1" comment="systemd-sysvinit is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521629" version="1" comment="udev is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521630" version="1" comment="libprocps3 is &lt;3.3.9-11.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521631" version="1" comment="procps is &lt;3.3.9-11.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521634" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521635" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521636" version="1" comment="python is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530816" version="1" comment="python-32bit is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521637" version="1" comment="python-base is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530817" version="1" comment="python-base-32bit is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521638" version="1" comment="python-curses is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530818" version="1" comment="python-demo is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530821" version="1" comment="python-gdbm is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530822" version="1" comment="python-idle is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521640" version="1" comment="python-tk is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521641" version="1" comment="python-xml is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521642" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.201-43.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530836" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.201-43.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530837" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.201-43.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521643" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.201-43.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557423" version="1" comment="apache2 is &lt;2.4.23-29.34.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557424" version="1" comment="apache2-example-pages is &lt;2.4.23-29.34.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557425" version="1" comment="apache2-prefork is &lt;2.4.23-29.34.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557426" version="1" comment="apache2-utils is &lt;2.4.23-29.34.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557427" version="1" comment="apache2-worker is &lt;2.4.23-29.34.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521644" version="1" comment="ceph-common is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521645" version="1" comment="libcephfs2 is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521646" version="1" comment="librados2 is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521647" version="1" comment="libradosstriper1 is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521648" version="1" comment="librbd1 is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521649" version="1" comment="librgw2 is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521650" version="1" comment="python-cephfs is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521651" version="1" comment="python-rados is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521652" version="1" comment="python-rbd is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521653" version="1" comment="python-rgw is &lt;12.2.10+git.1549630712.bb089269ea-2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521654" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521655" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521657" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521658" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521659" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521667" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.191-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530861" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.191-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530862" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.191-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521668" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.191-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557428" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557429" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521669" version="1" comment="qemu is &lt;2.9.1-6.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521670" version="1" comment="qemu-block-curl is &lt;2.9.1-6.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557430" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557431" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557432" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557433" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521672" version="1" comment="qemu-kvm is &lt;2.9.1-6.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557434" version="1" comment="qemu-lang is &lt;2.9.1-6.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521675" version="1" comment="qemu-tools is &lt;2.9.1-6.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521678" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521679" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521681" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521682" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521683" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530863" version="1" comment="libvncclient0 is &lt;0.9.9-17.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530864" version="1" comment="libvncserver0 is &lt;0.9.9-17.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530865" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.40-38.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530868" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.40-38.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530870" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.30-30.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521684" version="1" comment="lftp is &lt;4.7.4-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521685" version="1" comment="libssh2-1 is &lt;1.4.3-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521686" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521687" version="1" comment="libwsman1 is &lt;2.4.11-21.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521688" version="1" comment="libwsman_clientpp1 is &lt;2.4.11-21.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521689" version="1" comment="openwsman-server is &lt;2.4.11-21.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521690" version="1" comment="libwireshark9 is &lt;2.4.13-48.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521691" version="1" comment="libwiretap7 is &lt;2.4.13-48.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521692" version="1" comment="libwscodecs1 is &lt;2.4.13-48.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521693" version="1" comment="libwsutil8 is &lt;2.4.13-48.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521694" version="1" comment="wireshark is &lt;2.4.13-48.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521695" version="1" comment="wireshark-gtk is &lt;2.4.13-48.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521696" version="1" comment="ghostscript is &lt;9.26a-23.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521697" version="1" comment="ghostscript-x11 is &lt;9.26a-23.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557435" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557436" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521699" version="1" comment="gd is &lt;2.1.0-24.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521701" version="1" comment="w3m is &lt;0.5.3.git20161120-161.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521702" version="1" comment="ntp is &lt;4.2.8p13-85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521703" version="1" comment="ntp-doc is &lt;4.2.8p13-85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521711" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521712" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521713" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530874" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530875" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521714" version="1" comment="openssl is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521715" version="1" comment="adcli is &lt;0.8.2-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521716" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521717" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521718" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521719" version="1" comment="libsss_sudo is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521720" version="1" comment="python-sssd-config is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521721" version="1" comment="sssd is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521722" version="1" comment="sssd-32bit is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521723" version="1" comment="sssd-ad is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521724" version="1" comment="sssd-ipa is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521725" version="1" comment="sssd-krb5 is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521726" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521727" version="1" comment="sssd-ldap is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521728" version="1" comment="sssd-proxy is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521729" version="1" comment="sssd-tools is &lt;1.13.4-34.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521730" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521731" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521732" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521733" version="1" comment="libsss_sudo is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521734" version="1" comment="python-sssd-config is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521735" version="1" comment="sssd is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521736" version="1" comment="sssd-32bit is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521737" version="1" comment="sssd-ad is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521738" version="1" comment="sssd-ipa is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521739" version="1" comment="sssd-krb5 is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521740" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521741" version="1" comment="sssd-ldap is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521742" version="1" comment="sssd-proxy is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521743" version="1" comment="sssd-tools is &lt;1.13.4-34.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562490" version="1" comment="libmemcached is &lt;1.0.18-3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562491" version="1" comment="libmemcached11 is &lt;1.0.18-3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562492" version="1" comment="libmemcachedutil2 is &lt;1.0.18-3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521744" version="1" comment="bash is &lt;4.3-83.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521747" version="1" comment="libreadline6 is &lt;6.3-83.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521748" version="1" comment="libreadline6-32bit is &lt;6.3-83.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521750" version="1" comment="file is &lt;5.22-10.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521751" version="1" comment="file-magic is &lt;5.22-10.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521752" version="1" comment="libmagic1 is &lt;5.22-10.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521753" version="1" comment="libmagic1-32bit is &lt;5.22-10.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521754" version="1" comment="MozillaFirefox is &lt;60.6.1esr-109.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521755" version="1" comment="MozillaFirefox-translations-common is &lt;60.6.1esr-109.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530886" version="1" comment="apache2 is &lt;2.4.23-29.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530888" version="1" comment="apache2-example-pages is &lt;2.4.23-29.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530889" version="1" comment="apache2-prefork is &lt;2.4.23-29.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530890" version="1" comment="apache2-utils is &lt;2.4.23-29.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530891" version="1" comment="apache2-worker is &lt;2.4.23-29.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521756" version="1" comment="clamav is &lt;0.100.3-33.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521757" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-15.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557437" version="1" comment="libSDL-1_2-0-32bit is &lt;1.2.15-15.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530892" version="1" comment="dovecot22 is &lt;2.2.31-19.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530893" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530894" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530895" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521758" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521759" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521760" version="1" comment="sqlite3 is &lt;3.8.10.2-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557438" version="1" comment="libxmltooling6 is &lt;1.5.6-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557439" version="1" comment="xmltooling-schemas is &lt;1.5.6-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521764" version="1" comment="wget is &lt;1.14-21.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521765" version="1" comment="qemu is &lt;2.9.1-6.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521766" version="1" comment="qemu-block-curl is &lt;2.9.1-6.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557440" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557441" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557442" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557443" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521768" version="1" comment="qemu-kvm is &lt;2.9.1-6.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557444" version="1" comment="qemu-lang is &lt;2.9.1-6.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521771" version="1" comment="qemu-tools is &lt;2.9.1-6.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521774" version="1" comment="libSoundTouch0 is &lt;1.7.1-5.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521777" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521778" version="1" comment="python3 is &lt;3.4.6-25.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521779" version="1" comment="python3-base is &lt;3.4.6-25.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521780" version="1" comment="python3-curses is &lt;3.4.6-25.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521781" version="1" comment="curl is &lt;7.37.0-37.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521782" version="1" comment="libcurl4 is &lt;7.37.0-37.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521783" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522532" version="1" comment="man is &lt;2.6.6-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557445" version="1" comment="libqt4 is &lt;4.8.7-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557446" version="1" comment="libqt4-32bit is &lt;4.8.7-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557447" version="1" comment="libqt4-qt3support is &lt;4.8.7-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557448" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.7-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557449" version="1" comment="libqt4-sql is &lt;4.8.7-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557450" version="1" comment="libqt4-sql-32bit is &lt;4.8.7-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557451" version="1" comment="libqt4-sql-mysql is &lt;4.8.7-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557452" version="1" comment="libqt4-sql-sqlite is &lt;4.8.7-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557453" version="1" comment="libqt4-x11 is &lt;4.8.7-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557454" version="1" comment="libqt4-x11-32bit is &lt;4.8.7-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557455" version="1" comment="qt4-x11-tools is &lt;4.8.7-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557456" version="1" comment="file-roller is &lt;3.20.3-15.3.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557457" version="1" comment="file-roller-lang is &lt;3.20.3-15.3.25 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557458" version="1" comment="nautilus-file-roller is &lt;3.20.3-15.3.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557459" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557460" version="1" comment="openexr is &lt;2.1.0-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542425" version="1" comment="ant is &lt;1.9.4-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557461" version="1" comment="dpdk is &lt;16.11.9-11.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557462" version="1" comment="dpdk-kmp-default is &lt;16.11.9_k4.4.140_96.58.TDC-11.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557463" version="1" comment="dpdk-tools is &lt;16.11.9-11.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557464" version="1" comment="file-roller is &lt;3.20.3-15.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557465" version="1" comment="file-roller-lang is &lt;3.20.3-15.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557466" version="1" comment="nautilus-file-roller is &lt;3.20.3-15.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557467" version="1" comment="libkpathsea6 is &lt;6.2.0dev-22.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557468" version="1" comment="ed is &lt;1.9-4.4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557469" version="1" comment="audiofile is &lt;0.3.6-11.7.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557470" version="1" comment="libaudiofile1 is &lt;0.3.6-11.7.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557471" version="1" comment="libaudiofile1-32bit is &lt;0.3.6-11.7.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557473" version="1" comment="libmysqlclient18-32bit is &lt;10.0.40.4-29.41.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557474" version="1" comment="mariadb is &lt;10.0.40.4-29.41.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557475" version="1" comment="mariadb-client is &lt;10.0.40.4-29.41.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557476" version="1" comment="mariadb-errormessages is &lt;10.0.40.4-29.41.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557477" version="1" comment="mariadb-tools is &lt;10.0.40.4-29.41.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557478" version="1" comment="gnuplot is &lt;4.6.5-3.3.74 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557479" version="1" comment="libgxps2 is &lt;0.2.2-10.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557480" version="1" comment="unzip is &lt;6.00-33.13.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557481" version="1" comment="transfig is &lt;3.2.5e-2.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557482" version="1" comment="libsystemd0 is &lt;228-150.86.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557483" version="1" comment="libsystemd0-32bit is &lt;228-150.86.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557484" version="1" comment="libudev1 is &lt;228-150.86.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557485" version="1" comment="libudev1-32bit is &lt;228-150.86.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557486" version="1" comment="systemd is &lt;228-150.86.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557487" version="1" comment="systemd-32bit is &lt;228-150.86.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557488" version="1" comment="systemd-bash-completion is &lt;228-150.86.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557489" version="1" comment="systemd-devel is &lt;228-150.86.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557490" version="1" comment="systemd-sysvinit is &lt;228-150.86.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557491" version="1" comment="udev is &lt;228-150.86.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557492" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557493" version="1" comment="openexr is &lt;2.1.0-6.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557494" version="1" comment="perl-PlRPC is &lt;0.2020-25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557495" version="1" comment="zabbix-agent is &lt;4.0.12-4.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557496" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557497" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-28.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557498" version="1" comment="python is &lt;2.7.17-28.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557499" version="1" comment="python-32bit is &lt;2.7.17-28.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557500" version="1" comment="python-base is &lt;2.7.17-28.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557501" version="1" comment="python-base-32bit is &lt;2.7.17-28.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557502" version="1" comment="python-curses is &lt;2.7.17-28.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557503" version="1" comment="python-demo is &lt;2.7.17-28.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557504" version="1" comment="python-devel is &lt;2.7.17-28.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557505" version="1" comment="python-doc is &lt;2.7.17-28.48.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557506" version="1" comment="python-doc-pdf is &lt;2.7.17-28.48.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557507" version="1" comment="python-gdbm is &lt;2.7.17-28.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557508" version="1" comment="python-idle is &lt;2.7.17-28.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557509" version="1" comment="python-tk is &lt;2.7.17-28.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557510" version="1" comment="python-xml is &lt;2.7.17-28.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557511" version="1" comment="openvpn is &lt;2.3.8-16.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557512" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557513" version="1" comment="targetcli-fb is &lt;2.1.43-7.9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522595" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.232-27.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557514" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.232-27.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557515" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.232-27.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522596" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.232-27.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557516" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557517" version="1" comment="libjpeg62 is &lt;62.2.0-31.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557518" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557519" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557520" version="1" comment="libjpeg8 is &lt;8.1.2-31.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557521" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557522" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557524" version="1" comment="libxml2-2 is &lt;2.9.4-46.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557525" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557526" version="1" comment="libxml2-doc is &lt;2.9.4-46.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557527" version="1" comment="libxml2-tools is &lt;2.9.4-46.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557528" version="1" comment="python-libxml2 is &lt;2.9.4-46.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557529" version="1" comment="cifs-utils is &lt;6.9-9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557530" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557531" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557532" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1492060560.b6d11d7c46-4.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557533" version="1" comment="less is &lt;458-7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557534" version="1" comment="libjasper1 is &lt;1.900.14-195.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557535" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557536" version="1" comment="libmspack0 is &lt;0.4-15.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557537" version="1" comment="libwavpack1 is &lt;4.60.99-5.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557538" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.144.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557539" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.144.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557540" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.144.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557541" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.144.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557542" version="1" comment="tar is &lt;1.27.1-15.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557543" version="1" comment="tar-lang is &lt;1.27.1-15.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557544" version="1" comment="aspell is &lt;0.60.6.1-18.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557545" version="1" comment="aspell-ispell is &lt;0.60.6.1-18.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557546" version="1" comment="libaspell15 is &lt;0.60.6.1-18.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557547" version="1" comment="libaspell15-32bit is &lt;0.60.6.1-18.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557548" version="1" comment="libpython3_6m1_0 is &lt;3.6.8-6.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557549" version="1" comment="python36 is &lt;3.6.8-6.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557550" version="1" comment="python36-base is &lt;3.6.8-6.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557551" version="1" comment="python36-curses is &lt;3.6.8-6.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557552" version="1" comment="python36-dbm is &lt;3.6.8-6.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557553" version="1" comment="python36-devel is &lt;3.6.8-6.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557554" version="1" comment="python36-doc is &lt;3.6.8-6.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557555" version="1" comment="python36-idle is &lt;3.6.8-6.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557556" version="1" comment="python36-testsuite is &lt;3.6.8-6.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557557" version="1" comment="python36-tk is &lt;3.6.8-6.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557558" version="1" comment="python36-tools is &lt;3.6.8-6.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557559" version="1" comment="libqt5-qtimageformats is &lt;5.6.2-3.3.110 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557560" version="1" comment="libQt5Svg5 is &lt;5.6.2-3.3.110 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557561" version="1" comment="blktrace is &lt;1.0.5-8.5.74 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557562" version="1" comment="hunspell is &lt;1.3.2-19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557563" version="1" comment="hunspell-32bit is &lt;1.3.2-19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557564" version="1" comment="hunspell-tools is &lt;1.3.2-19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557565" version="1" comment="libtag1 is &lt;1.9.1-3.4.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557566" version="1" comment="libtag_c0 is &lt;1.9.1-3.4.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557567" version="1" comment="taglib is &lt;1.9.1-3.4.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557568" version="1" comment="libcdio14 is &lt;0.90-6.6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557569" version="1" comment="libcdio14-32bit is &lt;0.90-6.6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557570" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-15.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557571" version="1" comment="libSDL-1_2-0-32bit is &lt;1.2.15-15.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557572" version="1" comment="graphviz is &lt;2.28.0-29.3.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557573" version="1" comment="graphviz-gd is &lt;2.28.0-29.3.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557574" version="1" comment="graphviz-gnome is &lt;2.28.0-29.3.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557575" version="1" comment="graphviz-tcl is &lt;2.28.0-29.3.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557576" version="1" comment="liblouis-data is &lt;2.6.4-6.9.24 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557577" version="1" comment="liblouis9 is &lt;2.6.4-6.9.24 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557578" version="1" comment="python-louis is &lt;2.6.4-6.9.39 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557579" version="1" comment="python3-louis is &lt;2.6.4-6.9.41 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557580" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557581" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-28.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557582" version="1" comment="python is &lt;2.7.17-28.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557583" version="1" comment="python-32bit is &lt;2.7.17-28.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557584" version="1" comment="python-base is &lt;2.7.17-28.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557585" version="1" comment="python-base-32bit is &lt;2.7.17-28.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557586" version="1" comment="python-curses is &lt;2.7.17-28.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557587" version="1" comment="python-demo is &lt;2.7.17-28.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557588" version="1" comment="python-devel is &lt;2.7.17-28.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557589" version="1" comment="python-doc is &lt;2.7.17-28.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557590" version="1" comment="python-doc-pdf is &lt;2.7.17-28.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557591" version="1" comment="python-gdbm is &lt;2.7.17-28.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557592" version="1" comment="python-idle is &lt;2.7.17-28.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557593" version="1" comment="python-tk is &lt;2.7.17-28.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557594" version="1" comment="python-xml is &lt;2.7.17-28.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557595" version="1" comment="opensc is &lt;0.13.0-3.6.27 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557596" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.147.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557597" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.147.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557598" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.147.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557599" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.147.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557600" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557601" version="1" comment="python3 is &lt;3.4.10-25.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557602" version="1" comment="python3-base is &lt;3.4.10-25.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557603" version="1" comment="python3-curses is &lt;3.4.10-25.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557604" version="1" comment="tcpdump is &lt;4.9.2-14.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557605" version="1" comment="bluez is &lt;5.13-5.20.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557606" version="1" comment="libbluetooth3 is &lt;5.13-5.20.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557607" version="1" comment="libpython3_6m1_0 is &lt;3.6.12-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557608" version="1" comment="python36 is &lt;3.6.12-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557609" version="1" comment="python36-base is &lt;3.6.12-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557610" version="1" comment="python36-curses is &lt;3.6.12-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557611" version="1" comment="python36-dbm is &lt;3.6.12-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557612" version="1" comment="python36-devel is &lt;3.6.12-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557613" version="1" comment="python36-doc is &lt;3.6.12-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557614" version="1" comment="python36-idle is &lt;3.6.12-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557615" version="1" comment="python36-testsuite is &lt;3.6.12-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557616" version="1" comment="python36-tk is &lt;3.6.12-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557617" version="1" comment="python36-tools is &lt;3.6.12-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557618" version="1" comment="curl is &lt;7.37.0-37.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557619" version="1" comment="libcurl4 is &lt;7.37.0-37.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557620" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557621" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557622" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557623" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1492060560.b6d11d7c46-4.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557624" version="1" comment="curl is &lt;7.37.0-37.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557625" version="1" comment="libcurl4 is &lt;7.37.0-37.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557626" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557627" version="1" comment="PackageKit is &lt;1.1.3-24.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557628" version="1" comment="PackageKit-backend-zypp is &lt;1.1.3-24.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557629" version="1" comment="PackageKit-lang is &lt;1.1.3-24.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557630" version="1" comment="libpackagekit-glib2-18 is &lt;1.1.3-24.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557631" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.1.3-24.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557632" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557633" version="1" comment="openexr is &lt;2.1.0-6.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522642" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522643" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522645" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522647" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522648" version="1" comment="dnsmasq is &lt;2.78-18.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557634" version="1" comment="libvpx1 is &lt;1.3.0-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557635" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557636" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557637" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1492060560.b6d11d7c46-4.29.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557639" version="1" comment="libmysqlclient18-32bit is &lt;10.0.40.3-29.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557640" version="1" comment="mariadb is &lt;10.0.40.3-29.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557641" version="1" comment="mariadb-client is &lt;10.0.40.3-29.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557642" version="1" comment="mariadb-errormessages is &lt;10.0.40.3-29.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557643" version="1" comment="mariadb-tools is &lt;10.0.40.3-29.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557644" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.21-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557645" version="1" comment="librsvg-2-2 is &lt;2.40.21-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557646" version="1" comment="librsvg-2-2-32bit is &lt;2.40.21-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557647" version="1" comment="rsvg-view is &lt;2.40.21-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522663" version="1" comment="gd is &lt;2.1.0-24.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557648" version="1" comment="libpython3_6m1_0 is &lt;3.6.8-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557649" version="1" comment="python36 is &lt;3.6.8-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557650" version="1" comment="python36-base is &lt;3.6.8-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557651" version="1" comment="python36-curses is &lt;3.6.8-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557652" version="1" comment="python36-dbm is &lt;3.6.8-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557653" version="1" comment="python36-devel is &lt;3.6.8-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557654" version="1" comment="python36-doc is &lt;3.6.8-6.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557655" version="1" comment="python36-testsuite is &lt;3.6.8-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557656" version="1" comment="python36-tk is &lt;3.6.8-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557657" version="1" comment="python36-tools is &lt;3.6.8-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557658" version="1" comment="memcached is &lt;1.4.39-4.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557659" version="1" comment="g3utils is &lt;1.1.36-58.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557660" version="1" comment="mgetty is &lt;1.1.36-58.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557661" version="1" comment="e2fsprogs is &lt;1.42.11-16.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557662" version="1" comment="libcom_err2 is &lt;1.42.11-16.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557663" version="1" comment="libcom_err2-32bit is &lt;1.42.11-16.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557664" version="1" comment="libext2fs2 is &lt;1.42.11-16.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557665" version="1" comment="libexiv2-12 is &lt;0.23-12.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557666" version="1" comment="libpng12-0 is &lt;1.2.50-20.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557667" version="1" comment="libpng12-0-32bit is &lt;1.2.50-20.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557668" version="1" comment="vino is &lt;3.20.2-7.3.21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557669" version="1" comment="vino-lang is &lt;3.20.2-7.3.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557670" version="1" comment="ceph-common is &lt;12.2.12+git.1585658687.363df3a813-2.42.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557671" version="1" comment="libcephfs2 is &lt;12.2.12+git.1585658687.363df3a813-2.42.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557672" version="1" comment="librados2 is &lt;12.2.12+git.1585658687.363df3a813-2.42.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557673" version="1" comment="libradosstriper1 is &lt;12.2.12+git.1585658687.363df3a813-2.42.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557674" version="1" comment="librbd1 is &lt;12.2.12+git.1585658687.363df3a813-2.42.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557675" version="1" comment="librgw2 is &lt;12.2.12+git.1585658687.363df3a813-2.42.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557676" version="1" comment="python-cephfs is &lt;12.2.12+git.1585658687.363df3a813-2.42.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557677" version="1" comment="python-rados is &lt;12.2.12+git.1585658687.363df3a813-2.42.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557678" version="1" comment="python-rbd is &lt;12.2.12+git.1585658687.363df3a813-2.42.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557679" version="1" comment="python-rgw is &lt;12.2.12+git.1585658687.363df3a813-2.42.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557680" version="1" comment="libdjvulibre21 is &lt;3.5.25.3-5.6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557681" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557682" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557683" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1492060560.b6d11d7c46-4.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557684" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557685" version="1" comment="openexr is &lt;2.1.0-6.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557686" version="1" comment="wpa_supplicant is &lt;2.6-15.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557687" version="1" comment="cifs-utils is &lt;6.9-9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557688" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.165.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557689" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.165.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557690" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.165.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557691" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.165.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557692" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557693" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557694" version="1" comment="openldap2 is &lt;2.4.41-18.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557695" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557696" version="1" comment="openldap2-client is &lt;2.4.41-18.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557697" version="1" comment="openldap2-doc is &lt;2.4.41-18.80.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557698" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543102" version="1" comment="apache-commons-io is &lt;2.4-9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557699" version="1" comment="curl is &lt;7.37.0-37.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557700" version="1" comment="libcurl4 is &lt;7.37.0-37.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557701" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557702" version="1" comment="libpython3_6m1_0 is &lt;3.6.13-6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557703" version="1" comment="python36 is &lt;3.6.13-6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557704" version="1" comment="python36-base is &lt;3.6.13-6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557705" version="1" comment="python36-curses is &lt;3.6.13-6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557706" version="1" comment="python36-dbm is &lt;3.6.13-6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557707" version="1" comment="python36-devel is &lt;3.6.13-6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557708" version="1" comment="python36-doc is &lt;3.6.13-6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557709" version="1" comment="python36-idle is &lt;3.6.13-6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557710" version="1" comment="python36-testsuite is &lt;3.6.13-6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557711" version="1" comment="python36-tk is &lt;3.6.13-6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557712" version="1" comment="python36-tools is &lt;3.6.13-6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557713" version="1" comment="libxml2-2 is &lt;2.9.4-46.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557714" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557715" version="1" comment="libxml2-doc is &lt;2.9.4-46.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557716" version="1" comment="libxml2-tools is &lt;2.9.4-46.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557717" version="1" comment="python-libxml2 is &lt;2.9.4-46.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557718" version="1" comment="openvpn is &lt;2.3.8-16.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557719" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557720" version="1" comment="curl is &lt;7.37.0-37.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557721" version="1" comment="libcurl4 is &lt;7.37.0-37.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557722" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557723" version="1" comment="perl-Convert-ASN1 is &lt;0.26-5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557724" version="1" comment="libhivex0 is &lt;1.3.10-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557725" version="1" comment="perl-Win-Hivex is &lt;1.3.10-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557726" version="1" comment="libX11-6 is &lt;1.6.2-12.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557727" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557728" version="1" comment="libX11-data is &lt;1.6.2-12.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557729" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557730" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557731" version="1" comment="postgresql96 is &lt;9.6.22-6.12.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557732" version="1" comment="postgresql96-contrib is &lt;9.6.22-6.12.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557733" version="1" comment="postgresql96-docs is &lt;9.6.22-6.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557734" version="1" comment="postgresql96-plperl is &lt;9.6.22-6.12.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557735" version="1" comment="postgresql96-plpython is &lt;9.6.22-6.12.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557736" version="1" comment="postgresql96-pltcl is &lt;9.6.22-6.12.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557737" version="1" comment="postgresql96-server is &lt;9.6.22-6.12.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557738" version="1" comment="postgresql10 is &lt;10.17-4.16.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557739" version="1" comment="postgresql10-contrib is &lt;10.17-4.16.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557740" version="1" comment="postgresql10-docs is &lt;10.17-4.16.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557741" version="1" comment="postgresql10-server is &lt;10.17-4.16.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557742" version="1" comment="libecpg6 is &lt;13.3-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557743" version="1" comment="libpq5 is &lt;13.3-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557744" version="1" comment="libpq5-32bit is &lt;13.3-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557745" version="1" comment="shim is &lt;15.4-25.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557746" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557747" version="1" comment="libjpeg62 is &lt;62.2.0-31.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557748" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557749" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557750" version="1" comment="libjpeg8 is &lt;8.1.2-31.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557751" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557752" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557753" version="1" comment="mutt is &lt;1.10.1-55.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557754" version="1" comment="libxml2-2 is &lt;2.9.4-46.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557755" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557756" version="1" comment="libxml2-doc is &lt;2.9.4-46.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557757" version="1" comment="libxml2-tools is &lt;2.9.4-46.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557758" version="1" comment="python-libxml2 is &lt;2.9.4-46.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616161" version="1" comment="python-boto3 is &lt;1.17.9-14.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626142" version="1" comment="curl is &lt;7.37.0-37.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626143" version="1" comment="libcurl4 is &lt;7.37.0-37.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626144" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557759" version="1" comment="libpython3_6m1_0 is &lt;3.6.12-6.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557760" version="1" comment="python36 is &lt;3.6.12-6.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557761" version="1" comment="python36-base is &lt;3.6.12-6.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557762" version="1" comment="python36-curses is &lt;3.6.12-6.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557763" version="1" comment="python36-dbm is &lt;3.6.12-6.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557764" version="1" comment="python36-devel is &lt;3.6.12-6.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557765" version="1" comment="python36-doc is &lt;3.6.12-6.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557766" version="1" comment="python36-idle is &lt;3.6.12-6.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557767" version="1" comment="python36-testsuite is &lt;3.6.12-6.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557768" version="1" comment="python36-tk is &lt;3.6.12-6.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557769" version="1" comment="python36-tools is &lt;3.6.12-6.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626538" version="1" comment="fastjar is &lt;0.98-22.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626140" version="1" comment="libmspack0 is &lt;0.4-15.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626141" version="1" comment="spice-vdagent is &lt;0.16.0-8.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557770" version="1" comment="cups is &lt;1.7.5-20.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557771" version="1" comment="cups-client is &lt;1.7.5-20.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557772" version="1" comment="cups-libs is &lt;1.7.5-20.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557773" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628149" version="1" comment="gstreamer-plugins-good is &lt;1.8.3-16.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628150" version="1" comment="gstreamer-plugins-good-lang is &lt;1.8.3-16.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631271" version="1" comment="apache2 is &lt;2.4.23-29.77.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631272" version="1" comment="apache2-doc is &lt;2.4.23-29.77.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631273" version="1" comment="apache2-example-pages is &lt;2.4.23-29.77.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631274" version="1" comment="apache2-prefork is &lt;2.4.23-29.77.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631275" version="1" comment="apache2-utils is &lt;2.4.23-29.77.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631276" version="1" comment="apache2-worker is &lt;2.4.23-29.77.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632306" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632307" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525308" version="1" comment="python3-urllib3 is &lt;1.22-3.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632583" version="1" comment="libgrilo-0_3-0 is &lt;0.3.2-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631978" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.311-43.50.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631979" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.311-43.50.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631980" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.311-43.50.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631981" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.311-43.50.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630627" version="1" comment="qemu is &lt;2.9.1-6.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630628" version="1" comment="qemu-block-curl is &lt;2.9.1-6.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630629" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630630" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630631" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630632" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630633" version="1" comment="qemu-ipxe is &lt;1.0.0+-6.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630634" version="1" comment="qemu-kvm is &lt;2.9.1-6.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630635" version="1" comment="qemu-lang is &lt;2.9.1-6.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630636" version="1" comment="qemu-seabios is &lt;1.10.2_0_g5f4c7b1-6.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630637" version="1" comment="qemu-sgabios is &lt;8-6.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630638" version="1" comment="qemu-tools is &lt;2.9.1-6.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630639" version="1" comment="qemu-vgabios is &lt;1.10.2_0_g5f4c7b1-6.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630640" version="1" comment="qemu-x86 is &lt;2.9.1-6.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632693" version="1" comment="libecpg6 is &lt;13.4-3.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632694" version="1" comment="libpq5 is &lt;13.4-3.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632695" version="1" comment="libpq5-32bit is &lt;13.4-3.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633675" version="1" comment="curl is &lt;7.37.0-37.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633676" version="1" comment="libcurl4 is &lt;7.37.0-37.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633677" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633392" version="1" comment="libhivex0 is &lt;1.3.10-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633393" version="1" comment="perl-Win-Hivex is &lt;1.3.10-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633642" version="1" comment="gd is &lt;2.1.0-24.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633674" version="1" comment="atftp is &lt;0.7.0-160.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651426" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-6.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651427" version="1" comment="python36 is &lt;3.6.15-6.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651428" version="1" comment="python36-base is &lt;3.6.15-6.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651429" version="1" comment="python36-curses is &lt;3.6.15-6.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651430" version="1" comment="python36-dbm is &lt;3.6.15-6.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651431" version="1" comment="python36-devel is &lt;3.6.15-6.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651432" version="1" comment="python36-doc is &lt;3.6.15-6.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651433" version="1" comment="python36-idle is &lt;3.6.15-6.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651434" version="1" comment="python36-testsuite is &lt;3.6.15-6.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651435" version="1" comment="python36-tk is &lt;3.6.15-6.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651436" version="1" comment="python36-tools is &lt;3.6.15-6.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634694" version="1" comment="libQt5Svg5 is &lt;5.6.2-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651871" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.80.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651872" version="1" comment="python3 is &lt;3.4.10-25.80.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651873" version="1" comment="python3-base is &lt;3.4.10-25.80.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651874" version="1" comment="python3-curses is &lt;3.4.10-25.80.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652545" version="1" comment="git-core is &lt;2.26.2-27.49.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652546" version="1" comment="git-cvs is &lt;2.26.2-27.49.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652547" version="1" comment="git-daemon is &lt;2.26.2-27.49.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652548" version="1" comment="git-email is &lt;2.26.2-27.49.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652549" version="1" comment="git-gui is &lt;2.26.2-27.49.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652550" version="1" comment="git-svn is &lt;2.26.2-27.49.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652551" version="1" comment="git-web is &lt;2.26.2-27.49.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652552" version="1" comment="gitk is &lt;2.26.2-27.49.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652271" version="1" comment="libncurses5 is &lt;5.9-75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652272" version="1" comment="libncurses5-32bit is &lt;5.9-75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652273" version="1" comment="libncurses6 is &lt;5.9-75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652274" version="1" comment="libncurses6-32bit is &lt;5.9-75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652275" version="1" comment="ncurses-devel is &lt;5.9-75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652276" version="1" comment="ncurses-devel-32bit is &lt;5.9-75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652277" version="1" comment="ncurses-utils is &lt;5.9-75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652278" version="1" comment="tack is &lt;5.9-75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652279" version="1" comment="terminfo is &lt;5.9-75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652280" version="1" comment="terminfo-base is &lt;5.9-75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651875" version="1" comment="fetchmail is &lt;6.3.26-13.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651876" version="1" comment="fetchmailconf is &lt;6.3.26-13.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632730" version="1" comment="libcairo-gobject2 is &lt;1.15.2-25.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632731" version="1" comment="libcairo-gobject2-32bit is &lt;1.15.2-25.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632732" version="1" comment="libcairo-script-interpreter2 is &lt;1.15.2-25.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632733" version="1" comment="libcairo2 is &lt;1.15.2-25.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632734" version="1" comment="libcairo2-32bit is &lt;1.15.2-25.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652553" version="1" comment="liblldp_clif1 is &lt;0.9.46-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652554" version="1" comment="open-lldp is &lt;0.9.46-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651877" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-28.74.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651878" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-28.74.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651879" version="1" comment="python is &lt;2.7.18-28.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651880" version="1" comment="python-32bit is &lt;2.7.18-28.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651881" version="1" comment="python-base is &lt;2.7.18-28.74.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651882" version="1" comment="python-base-32bit is &lt;2.7.18-28.74.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651883" version="1" comment="python-curses is &lt;2.7.18-28.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651884" version="1" comment="python-demo is &lt;2.7.18-28.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651885" version="1" comment="python-devel is &lt;2.7.18-28.74.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651886" version="1" comment="python-doc is &lt;2.7.18-28.74.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651887" version="1" comment="python-doc-pdf is &lt;2.7.18-28.74.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651888" version="1" comment="python-gdbm is &lt;2.7.18-28.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651889" version="1" comment="python-idle is &lt;2.7.18-28.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651890" version="1" comment="python-tk is &lt;2.7.18-28.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651891" version="1" comment="python-xml is &lt;2.7.18-28.74.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653692" version="1" comment="javapackages-tools is &lt;2.0.1-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654129" version="1" comment="bind is &lt;9.9.9P1-63.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654130" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654131" version="1" comment="bind-doc is &lt;9.9.9P1-63.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654132" version="1" comment="bind-libs is &lt;9.9.9P1-63.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654133" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654134" version="1" comment="bind-utils is &lt;9.9.9P1-63.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656881" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656882" version="1" comment="openexr is &lt;2.1.0-6.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656566" version="1" comment="libspeex1 is &lt;1.1.999_1.2rc1-24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656567" version="1" comment="libspeex1-32bit is &lt;1.1.999_1.2rc1-24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656568" version="1" comment="libspeexdsp1 is &lt;1.1.999_1.2rc1-24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656971" version="1" comment="libgmp10 is &lt;5.1.3-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656972" version="1" comment="libgmp10-32bit is &lt;5.1.3-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658360" version="1" comment="gettext-runtime is &lt;0.19.2-3.3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658361" version="1" comment="gettext-runtime-32bit is &lt;0.19.2-3.3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658362" version="1" comment="gettext-tools is &lt;0.19.2-3.3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659974" version="1" comment="libqt4 is &lt;4.8.7-8.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659954" version="1" comment="libqt4-32bit is &lt;4.8.7-8.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659975" version="1" comment="libqt4-qt3support is &lt;4.8.7-8.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659956" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.7-8.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659976" version="1" comment="libqt4-sql is &lt;4.8.7-8.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659958" version="1" comment="libqt4-sql-32bit is &lt;4.8.7-8.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659977" version="1" comment="libqt4-sql-mysql is &lt;4.8.7-8.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659978" version="1" comment="libqt4-sql-sqlite is &lt;4.8.7-8.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659979" version="1" comment="libqt4-x11 is &lt;4.8.7-8.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659962" version="1" comment="libqt4-x11-32bit is &lt;4.8.7-8.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659980" version="1" comment="qt4-x11-tools is &lt;4.8.7-8.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660151" version="1" comment="libvpx1 is &lt;1.3.0-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557774" version="1" comment="libpython3_6m1_0 is &lt;3.6.12-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557775" version="1" comment="python36 is &lt;3.6.12-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557776" version="1" comment="python36-base is &lt;3.6.12-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557777" version="1" comment="python36-curses is &lt;3.6.12-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557778" version="1" comment="python36-dbm is &lt;3.6.12-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557779" version="1" comment="python36-devel is &lt;3.6.12-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557780" version="1" comment="python36-doc is &lt;3.6.12-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557781" version="1" comment="python36-idle is &lt;3.6.12-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557782" version="1" comment="python36-testsuite is &lt;3.6.12-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557783" version="1" comment="python36-tk is &lt;3.6.12-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557784" version="1" comment="python36-tools is &lt;3.6.12-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557785" version="1" comment="MozillaFirefox is &lt;78.7.1-112.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557786" version="1" comment="MozillaFirefox-devel is &lt;78.7.1-112.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557787" version="1" comment="MozillaFirefox-translations-common is &lt;78.7.1-112.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557788" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.159.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557789" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.159.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557790" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.159.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557791" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.159.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557792" version="1" comment="libecpg6 is &lt;13.2-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557793" version="1" comment="libpq5 is &lt;13.2-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557794" version="1" comment="libpq5-32bit is &lt;13.2-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557795" version="1" comment="freeradius-server is &lt;3.0.15-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557796" version="1" comment="freeradius-server-doc is &lt;3.0.15-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557797" version="1" comment="freeradius-server-krb5 is &lt;3.0.15-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557798" version="1" comment="freeradius-server-ldap is &lt;3.0.15-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557799" version="1" comment="freeradius-server-libs is &lt;3.0.15-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557800" version="1" comment="freeradius-server-mysql is &lt;3.0.15-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557801" version="1" comment="freeradius-server-perl is &lt;3.0.15-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557802" version="1" comment="freeradius-server-postgresql is &lt;3.0.15-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557803" version="1" comment="freeradius-server-python is &lt;3.0.15-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557804" version="1" comment="freeradius-server-sqlite is &lt;3.0.15-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557805" version="1" comment="freeradius-server-utils is &lt;3.0.15-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557806" version="1" comment="avahi is &lt;0.6.32-32.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557807" version="1" comment="avahi-lang is &lt;0.6.32-32.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557808" version="1" comment="avahi-utils is &lt;0.6.32-32.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557809" version="1" comment="libavahi-client3 is &lt;0.6.32-32.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557810" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-32.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557811" version="1" comment="libavahi-common3 is &lt;0.6.32-32.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557812" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-32.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557813" version="1" comment="libavahi-core7 is &lt;0.6.32-32.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557814" version="1" comment="libavahi-glib1 is &lt;0.6.32-32.12.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557815" version="1" comment="libavahi-glib1-32bit is &lt;0.6.32-32.12.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557816" version="1" comment="libdns_sd is &lt;0.6.32-32.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557817" version="1" comment="libdns_sd-32bit is &lt;0.6.32-32.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557818" version="1" comment="tomcat is &lt;8.0.53-29.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557819" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557820" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557821" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557822" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557823" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557824" version="1" comment="tomcat-lib is &lt;8.0.53-29.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557825" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557826" version="1" comment="tomcat-webapps is &lt;8.0.53-29.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557827" version="1" comment="postgresql-jdbc is &lt;9.4-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557828" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.162.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557829" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.162.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557830" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.162.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557831" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.162.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557832" version="1" comment="apache2 is &lt;2.4.23-29.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557833" version="1" comment="apache2-doc is &lt;2.4.23-29.69.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557834" version="1" comment="apache2-example-pages is &lt;2.4.23-29.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557835" version="1" comment="apache2-prefork is &lt;2.4.23-29.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557836" version="1" comment="apache2-utils is &lt;2.4.23-29.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557837" version="1" comment="apache2-worker is &lt;2.4.23-29.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557838" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557839" version="1" comment="python3 is &lt;3.4.10-25.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557840" version="1" comment="python3-base is &lt;3.4.10-25.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557841" version="1" comment="python3-curses is &lt;3.4.10-25.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557842" version="1" comment="libpython3_6m1_0 is &lt;3.6.13-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557843" version="1" comment="python36 is &lt;3.6.13-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557844" version="1" comment="python36-base is &lt;3.6.13-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557845" version="1" comment="python36-curses is &lt;3.6.13-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557846" version="1" comment="python36-dbm is &lt;3.6.13-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557847" version="1" comment="python36-devel is &lt;3.6.13-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557848" version="1" comment="python36-doc is &lt;3.6.13-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557849" version="1" comment="python36-idle is &lt;3.6.13-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557850" version="1" comment="python36-testsuite is &lt;3.6.13-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557851" version="1" comment="python36-tk is &lt;3.6.13-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557852" version="1" comment="python36-tools is &lt;3.6.13-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557853" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557854" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557855" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1492060560.b6d11d7c46-4.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557856" version="1" comment="tar is &lt;1.27.1-15.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557857" version="1" comment="tar-lang is &lt;1.27.1-15.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557858" version="1" comment="zabbix-agent is &lt;4.0.12-4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009557859" version="1" comment="opensc is &lt;0.13.0-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009130800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677036" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677037" version="1" comment="python3 is &lt;3.4.10-25.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677038" version="1" comment="python3-base is &lt;3.4.10-25.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677039" version="1" comment="python3-curses is &lt;3.4.10-25.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677781" version="1" comment="aws-cli-py36 is &lt;1.19.9-6.3.15 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677782" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-6.61.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677783" version="1" comment="python36 is &lt;3.6.15-6.61.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677784" version="1" comment="python36-PyYAML is &lt;5.3.1-6.5.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677785" version="1" comment="python36-appdirs is &lt;1.4.3-6.3.8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677786" version="1" comment="python36-asn1crypto is &lt;0.24.0-6.3.16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677787" version="1" comment="python36-base is &lt;3.6.15-6.61.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677788" version="1" comment="python36-boto3 is &lt;1.17.9-6.3.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677789" version="1" comment="python36-botocore is &lt;1.20.9-6.3.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677790" version="1" comment="python36-certifi is &lt;2018.1.18-6.3.15 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677791" version="1" comment="python36-cffi is &lt;1.11.5-6.3.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677792" version="1" comment="python36-chardet is &lt;3.0.4-6.3.15 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677793" version="1" comment="python36-colorama is &lt;0.4.4-6.3.15 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677794" version="1" comment="python36-cryptography is &lt;2.8-6.3.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677795" version="1" comment="python36-curses is &lt;3.6.15-6.61.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677796" version="1" comment="python36-dbm is &lt;3.6.15-6.61.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677797" version="1" comment="python36-devel is &lt;3.6.15-6.61.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677798" version="1" comment="python36-docutils is &lt;0.14-6.3.8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677799" version="1" comment="python36-idle is &lt;3.6.15-6.61.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677800" version="1" comment="python36-idna is &lt;2.6-6.5.15 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677801" version="1" comment="python36-jmespath is &lt;0.9.3-6.3.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677802" version="1" comment="python36-packaging is &lt;17.1-6.6.8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677803" version="1" comment="python36-ply is &lt;3.10-6.3.8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677804" version="1" comment="python36-ply-doc is &lt;3.10-6.3.8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677805" version="1" comment="python36-py is &lt;1.8.1-6.3.15 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677806" version="1" comment="python36-pyOpenSSL is &lt;17.1.0-6.3.16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677807" version="1" comment="python36-pyasn1 is &lt;0.1.9-6.3.18 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677808" version="1" comment="python36-pycparser is &lt;2.10-6.3.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677809" version="1" comment="python36-pyparsing is &lt;2.4.7-6.3.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677810" version="1" comment="python36-pyparsing-doc is &lt;2.4.7-6.3.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677811" version="1" comment="python36-python-dateutil is &lt;2.7.3-6.3.13 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677812" version="1" comment="python36-requests is &lt;2.24.0-6.3.15 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677813" version="1" comment="python36-rpm-generators is &lt;20200207.5feb6c1-6.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677814" version="1" comment="python36-rpm-macros is &lt;20200207.5feb6c1-6.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677815" version="1" comment="python36-rsa is &lt;3.4.2-6.3.15 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677816" version="1" comment="python36-s3transfer is &lt;0.3.3-6.3.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677817" version="1" comment="python36-setuptools is &lt;44.1.1-9.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677818" version="1" comment="python36-setuptools-test is &lt;44.1.1-6.7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677819" version="1" comment="python36-setuptools-wheel is &lt;44.1.1-6.7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677820" version="1" comment="python36-simplejson is &lt;3.8.2-6.3.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677821" version="1" comment="python36-six is &lt;1.14.0-6.7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677822" version="1" comment="python36-six-doc is &lt;1.14.0-6.7.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677823" version="1" comment="python36-testsuite is &lt;3.6.15-6.61.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677824" version="1" comment="python36-tk is &lt;3.6.15-6.61.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677825" version="1" comment="python36-tools is &lt;3.6.15-6.61.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677826" version="1" comment="python36-urllib3 is &lt;1.25.10-6.3.13 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663809" version="1" comment="libvirglrenderer0 is &lt;0.5.0-12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663808" version="1" comment="python-numpy is &lt;1.8.0-5.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674061" version="1" comment="zabbix-agent is &lt;4.0.12-4.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677593" version="1" comment="ant is &lt;1.9.4-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680651" version="1" comment="libjasper1 is &lt;1.900.14-195.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680652" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680043" version="1" comment="mutt is &lt;1.10.1-55.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681243" version="1" comment="libcaca0 is &lt;0.99.beta18-14.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678754" version="1" comment="libvirt is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678755" version="1" comment="libvirt-admin is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678756" version="1" comment="libvirt-client is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678757" version="1" comment="libvirt-daemon is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678758" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678759" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678760" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678761" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678762" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678763" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678764" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678765" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678766" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678767" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678768" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678769" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678770" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678771" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678772" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678773" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678774" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678775" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678776" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678777" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678778" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678779" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678780" version="1" comment="libvirt-doc is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678781" version="1" comment="libvirt-libs is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678782" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678783" version="1" comment="libvirt-nss is &lt;3.3.0-5.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682672" version="1" comment="curl is &lt;7.37.0-37.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682673" version="1" comment="libcurl4 is &lt;7.37.0-37.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682674" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682681" version="1" comment="clamav is &lt;0.103.6-33.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683244" version="1" comment="libtiff5 is &lt;4.0.9-44.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683245" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683246" version="1" comment="tiff is &lt;4.0.9-44.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680647" version="1" comment="libpoppler-glib8 is &lt;0.43.0-16.19.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680648" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-16.19.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680649" version="1" comment="libpoppler60 is &lt;0.43.0-16.19.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680650" version="1" comment="poppler-tools is &lt;0.43.0-16.19.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696672" version="1" comment="libyajl2 is &lt;2.0.1-18.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696673" version="1" comment="libyajl2-32bit is &lt;2.0.1-18.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681100" version="1" comment="glib2-lang is &lt;2.48.2-12.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681101" version="1" comment="glib2-tools is &lt;2.48.2-12.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681102" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681103" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681104" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681105" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681106" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681107" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681108" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681109" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681110" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681111" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683728" version="1" comment="unrar is &lt;5.6.1-4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696674" version="1" comment="postgresql13 is &lt;13.7-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696675" version="1" comment="postgresql13-contrib is &lt;13.7-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696676" version="1" comment="postgresql13-docs is &lt;13.7-3.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696677" version="1" comment="postgresql13-plperl is &lt;13.7-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696678" version="1" comment="postgresql13-plpython is &lt;13.7-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696679" version="1" comment="postgresql13-pltcl is &lt;13.7-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696680" version="1" comment="postgresql13-server is &lt;13.7-3.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696681" version="1" comment="fribidi is &lt;0.19.2-14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696682" version="1" comment="fribidi-32bit is &lt;0.19.2-14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696683" version="1" comment="postgresql12 is &lt;12.11-3.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696684" version="1" comment="postgresql12-contrib is &lt;12.11-3.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696685" version="1" comment="postgresql12-devel is &lt;12.11-3.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696686" version="1" comment="postgresql12-docs is &lt;12.11-3.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696687" version="1" comment="postgresql12-llvmjit-devel is &lt;12.11-3.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696688" version="1" comment="postgresql12-plperl is &lt;12.11-3.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696689" version="1" comment="postgresql12-plpython is &lt;12.11-3.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696690" version="1" comment="postgresql12-pltcl is &lt;12.11-3.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696691" version="1" comment="postgresql12-server is &lt;12.11-3.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696692" version="1" comment="postgresql12-server-devel is &lt;12.11-3.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696693" version="1" comment="libecpg6-32bit is &lt;14.3-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696694" version="1" comment="postgresql14 is &lt;14.3-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696695" version="1" comment="postgresql14-contrib is &lt;14.3-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696696" version="1" comment="postgresql14-devel is &lt;14.3-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696697" version="1" comment="postgresql14-devel-mini is &lt;14.3-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696698" version="1" comment="postgresql14-docs is &lt;14.3-3.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696699" version="1" comment="postgresql14-llvmjit-devel is &lt;14.3-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696700" version="1" comment="postgresql14-plperl is &lt;14.3-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696701" version="1" comment="postgresql14-plpython is &lt;14.3-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696702" version="1" comment="postgresql14-pltcl is &lt;14.3-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696703" version="1" comment="postgresql14-server is &lt;14.3-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696704" version="1" comment="postgresql14-server-devel is &lt;14.3-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696705" version="1" comment="patch is &lt;2.7.5-8.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678318" version="1" comment="cpp48 is &lt;4.8.5-31.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678319" version="1" comment="gcc48 is &lt;4.8.5-31.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678320" version="1" comment="gcc48-32bit is &lt;4.8.5-31.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678321" version="1" comment="gcc48-c++ is &lt;4.8.5-31.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678271" version="1" comment="gcc48-info is &lt;4.8.5-31.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678322" version="1" comment="gcc48-locale is &lt;4.8.5-31.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678323" version="1" comment="libasan0 is &lt;4.8.5-31.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678324" version="1" comment="libasan0-32bit is &lt;4.8.5-31.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678325" version="1" comment="libstdc++48-devel is &lt;4.8.5-31.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678326" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-31.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696706" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-6.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696707" version="1" comment="python36 is &lt;3.6.15-6.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696708" version="1" comment="python36-base is &lt;3.6.15-6.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696709" version="1" comment="python36-curses is &lt;3.6.15-6.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696710" version="1" comment="python36-dbm is &lt;3.6.15-6.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696711" version="1" comment="python36-devel is &lt;3.6.15-6.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696712" version="1" comment="python36-idle is &lt;3.6.15-6.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696713" version="1" comment="python36-testsuite is &lt;3.6.15-6.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696714" version="1" comment="python36-tk is &lt;3.6.15-6.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696715" version="1" comment="python36-tools is &lt;3.6.15-6.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696716" version="1" comment="dpdk is &lt;16.11.9-11.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696717" version="1" comment="dpdk-kmp-default is &lt;16.11.9_k4.4.140_96.103.TDC-11.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696718" version="1" comment="dpdk-tools is &lt;16.11.9-11.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696720" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.177.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696721" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.177.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696722" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.177.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009696723" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.177.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700179" version="1" comment="crash is &lt;7.1.8-7.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700180" version="1" comment="crash-gcore is &lt;7.1.8-7.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700181" version="1" comment="crash-kmp-default is &lt;7.1.8_k4.4.140_96.103.TDC-7.4.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700182" version="1" comment="logrotate is &lt;3.11.0-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700008" version="1" comment="libwebkit2gtk3-lang is &lt;2.36.4-2.102.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700095" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.36.4-2.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700947" version="1" comment="mozilla-nspr-devel is &lt;4.34-19.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700948" version="1" comment="mozilla-nss-devel is &lt;3.79-58.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700185" version="1" comment="xscreensaver is &lt;5.22-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700186" version="1" comment="xscreensaver-data is &lt;5.22-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700184" version="1" comment="python-numpy is &lt;1.8.0-5.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700187" version="1" comment="libtiff5 is &lt;4.0.9-44.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700188" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700189" version="1" comment="tiff is &lt;4.0.9-44.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701478" version="1" comment="libwavpack1 is &lt;4.60.99-5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700183" version="1" comment="update-alternatives is &lt;1.18.4-16.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701179" version="1" comment="libncurses5 is &lt;5.9-78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701180" version="1" comment="libncurses5-32bit is &lt;5.9-78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701181" version="1" comment="libncurses6 is &lt;5.9-78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701182" version="1" comment="libncurses6-32bit is &lt;5.9-78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701183" version="1" comment="ncurses-devel is &lt;5.9-78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701184" version="1" comment="ncurses-devel-32bit is &lt;5.9-78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701185" version="1" comment="ncurses-utils is &lt;5.9-78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701186" version="1" comment="tack is &lt;5.9-78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701187" version="1" comment="terminfo is &lt;5.9-78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701188" version="1" comment="terminfo-base is &lt;5.9-78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706390" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-6.67.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706391" version="1" comment="python36 is &lt;3.6.15-6.67.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706392" version="1" comment="python36-base is &lt;3.6.15-6.67.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706393" version="1" comment="python36-curses is &lt;3.6.15-6.67.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706394" version="1" comment="python36-dbm is &lt;3.6.15-6.67.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706395" version="1" comment="python36-devel is &lt;3.6.15-6.67.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706396" version="1" comment="python36-idle is &lt;3.6.15-6.67.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706397" version="1" comment="python36-testsuite is &lt;3.6.15-6.67.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706398" version="1" comment="python36-tk is &lt;3.6.15-6.67.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706399" version="1" comment="python36-tools is &lt;3.6.15-6.67.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701125" version="1" comment="perl-HTTP-Daemon is &lt;6.01-9.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706367" version="1" comment="libraptor2-0 is &lt;2.0.15-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707305" version="1" comment="postgresql13 is &lt;13.8-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707306" version="1" comment="postgresql13-contrib is &lt;13.8-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707307" version="1" comment="postgresql13-docs is &lt;13.8-3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707308" version="1" comment="postgresql13-plperl is &lt;13.8-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707309" version="1" comment="postgresql13-plpython is &lt;13.8-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707310" version="1" comment="postgresql13-pltcl is &lt;13.8-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707311" version="1" comment="postgresql13-server is &lt;13.8-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706626" version="1" comment="libwebkit2gtk3-lang is &lt;2.36.5-2.107.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706637" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.36.5-2.107.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702122" version="1" comment="zabbix-agent is &lt;4.0.12-4.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708239" version="1" comment="libwebkit2gtk3-lang is &lt;2.36.7-2.110.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708310" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.36.7-2.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708141" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.180.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708142" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.180.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708143" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.180.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708144" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.180.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707477" version="1" comment="libicu-doc is &lt;52.1-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707478" version="1" comment="libicu52_1 is &lt;52.1-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707479" version="1" comment="libicu52_1-32bit is &lt;52.1-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707480" version="1" comment="libicu52_1-data is &lt;52.1-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708209" version="1" comment="postgresql-devel is &lt;14-4.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708210" version="1" comment="postgresql-server-devel is &lt;14-4.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708320" version="1" comment="postgresql12 is &lt;12.12-3.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708321" version="1" comment="postgresql12-contrib is &lt;12.12-3.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708322" version="1" comment="postgresql12-devel is &lt;12.12-3.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708229" version="1" comment="postgresql12-docs is &lt;12.12-3.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708323" version="1" comment="postgresql12-llvmjit-devel is &lt;12.12-3.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708324" version="1" comment="postgresql12-plperl is &lt;12.12-3.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708325" version="1" comment="postgresql12-plpython is &lt;12.12-3.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708326" version="1" comment="postgresql12-pltcl is &lt;12.12-3.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708327" version="1" comment="postgresql12-server is &lt;12.12-3.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708328" version="1" comment="postgresql12-server-devel is &lt;12.12-3.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705611" version="1" comment="libnl1 is &lt;1.1.4-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705612" version="1" comment="libnl1-32bit is &lt;1.1.4-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705608" version="1" comment="libnl-config is &lt;3.2.23-4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705609" version="1" comment="libnl3-200 is &lt;3.2.23-4.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705610" version="1" comment="libnl3-200-32bit is &lt;3.2.23-4.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710362" version="1" comment="libecpg6-32bit is &lt;14.5-3.14.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710363" version="1" comment="postgresql14 is &lt;14.5-3.14.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710364" version="1" comment="postgresql14-contrib is &lt;14.5-3.14.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710365" version="1" comment="postgresql14-devel is &lt;14.5-3.14.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710284" version="1" comment="postgresql14-docs is &lt;14.5-3.14.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710366" version="1" comment="postgresql14-llvmjit-devel is &lt;14.5-3.14.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710367" version="1" comment="postgresql14-plperl is &lt;14.5-3.14.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710368" version="1" comment="postgresql14-plpython is &lt;14.5-3.14.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710369" version="1" comment="postgresql14-pltcl is &lt;14.5-3.14.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710370" version="1" comment="postgresql14-server is &lt;14.5-3.14.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710371" version="1" comment="postgresql14-server-devel is &lt;14.5-3.14.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711116" version="1" comment="libarchive13 is &lt;3.3.3-26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713865" version="1" comment="permissions is &lt;2015.09.28.1626-17.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713916" version="1" comment="curl is &lt;7.37.0-37.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713917" version="1" comment="libcurl4 is &lt;7.37.0-37.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713918" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714307" version="1" comment="cifs-utils is &lt;6.9-9.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714374" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-6.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714375" version="1" comment="python36 is &lt;3.6.15-6.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714376" version="1" comment="python36-base is &lt;3.6.15-6.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714377" version="1" comment="python36-curses is &lt;3.6.15-6.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714378" version="1" comment="python36-dbm is &lt;3.6.15-6.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714379" version="1" comment="python36-devel is &lt;3.6.15-6.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714380" version="1" comment="python36-idle is &lt;3.6.15-6.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714381" version="1" comment="python36-testsuite is &lt;3.6.15-6.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714382" version="1" comment="python36-tk is &lt;3.6.15-6.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714383" version="1" comment="python36-tools is &lt;3.6.15-6.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714474" version="1" comment="unzip is &lt;6.00-33.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714097" version="1" comment="libcaca0 is &lt;0.99.beta18-14.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715907" version="1" comment="python3-lxml is &lt;3.3.5-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710374" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710375" version="1" comment="libjpeg62 is &lt;62.2.0-31.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710376" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710377" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710378" version="1" comment="libjpeg8 is &lt;8.1.2-31.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710379" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710380" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716293" version="1" comment="openvswitch is &lt;2.7.12-3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715641" version="1" comment="libwebkit2gtk3-lang is &lt;2.36.8-2.113.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715768" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.36.8-2.113.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716684" version="1" comment="python3-devel is &lt;3.4.10-25.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716292" version="1" comment="libexiv2-12 is &lt;0.23-12.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717587" version="1" comment="glibc is &lt;2.22-129.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717588" version="1" comment="glibc-32bit is &lt;2.22-129.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717589" version="1" comment="glibc-devel is &lt;2.22-129.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717590" version="1" comment="glibc-devel-32bit is &lt;2.22-129.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717591" version="1" comment="glibc-html is &lt;2.22-129.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717592" version="1" comment="glibc-i18ndata is &lt;2.22-129.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717593" version="1" comment="glibc-info is &lt;2.22-129.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717594" version="1" comment="glibc-locale is &lt;2.22-129.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717595" version="1" comment="glibc-locale-32bit is &lt;2.22-129.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717596" version="1" comment="glibc-profile is &lt;2.22-129.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717597" version="1" comment="glibc-profile-32bit is &lt;2.22-129.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717598" version="1" comment="nscd is &lt;2.22-129.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714095" version="1" comment="libjasper1 is &lt;1.900.14-195.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714096" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717360" version="1" comment="clone-master-clean-up is &lt;1.8-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720763" version="1" comment="libarchive13 is &lt;3.3.3-26.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717599" version="1" comment="squid is &lt;4.17-30.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719032" version="1" comment="xen is &lt;4.9.4_32-3.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719033" version="1" comment="xen-doc-html is &lt;4.9.4_32-3.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719034" version="1" comment="xen-libs is &lt;4.9.4_32-3.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719035" version="1" comment="xen-libs-32bit is &lt;4.9.4_32-3.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719036" version="1" comment="xen-tools is &lt;4.9.4_32-3.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719037" version="1" comment="xen-tools-domU is &lt;4.9.4_32-3.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722818" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-6.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722819" version="1" comment="python36 is &lt;3.6.15-6.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722820" version="1" comment="python36-base is &lt;3.6.15-6.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722821" version="1" comment="python36-curses is &lt;3.6.15-6.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722822" version="1" comment="python36-dbm is &lt;3.6.15-6.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722823" version="1" comment="python36-devel is &lt;3.6.15-6.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722824" version="1" comment="python36-idle is &lt;3.6.15-6.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722825" version="1" comment="python36-testsuite is &lt;3.6.15-6.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722826" version="1" comment="python36-tk is &lt;3.6.15-6.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722827" version="1" comment="python36-tools is &lt;3.6.15-6.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716924" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716874" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-13.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716925" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716926" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716927" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716928" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716929" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716930" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716931" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716932" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716933" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716934" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716935" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716936" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716937" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716938" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716939" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716940" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717231" version="1" comment="python3-lxml is &lt;3.3.5-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710571" version="1" comment="python3-rpm is &lt;4.11.2-16.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710572" version="1" comment="rpm is &lt;4.11.2-16.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710573" version="1" comment="rpm-32bit is &lt;4.11.2-16.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710574" version="1" comment="rpm-build is &lt;4.11.2-16.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710575" version="1" comment="rpm-python is &lt;4.11.2-16.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719809" version="1" comment="xterm is &lt;308-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721411" version="1" comment="python-numpy is &lt;1.8.0-5.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719038" version="1" comment="libX11-6 is &lt;1.6.2-12.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719039" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718897" version="1" comment="libX11-data is &lt;1.6.2-12.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719040" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719041" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725416" version="1" comment="dhcp is &lt;4.3.3-10.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725417" version="1" comment="dhcp-client is &lt;4.3.3-10.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725418" version="1" comment="dhcp-relay is &lt;4.3.3-10.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725419" version="1" comment="dhcp-server is &lt;4.3.3-10.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715622" version="1" comment="ant is &lt;1.9.4-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725594" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-6.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725595" version="1" comment="python36 is &lt;3.6.15-6.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725596" version="1" comment="python36-base is &lt;3.6.15-6.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725597" version="1" comment="python36-curses is &lt;3.6.15-6.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725598" version="1" comment="python36-dbm is &lt;3.6.15-6.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725599" version="1" comment="python36-devel is &lt;3.6.15-6.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725600" version="1" comment="python36-idle is &lt;3.6.15-6.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725601" version="1" comment="python36-testsuite is &lt;3.6.15-6.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725602" version="1" comment="python36-tk is &lt;3.6.15-6.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725603" version="1" comment="python36-tools is &lt;3.6.15-6.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726585" version="1" comment="strongswan is &lt;5.1.3-26.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726500" version="1" comment="strongswan-doc is &lt;5.1.3-26.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726586" version="1" comment="strongswan-hmac is &lt;5.1.3-26.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726587" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726588" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726589" version="1" comment="libarchive13 is &lt;3.3.3-26.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725089" version="1" comment="python3-devel is &lt;3.4.10-25.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720755" version="1" comment="git-core is &lt;2.26.2-27.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720756" version="1" comment="git-cvs is &lt;2.26.2-27.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720757" version="1" comment="git-daemon is &lt;2.26.2-27.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720758" version="1" comment="git-email is &lt;2.26.2-27.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720759" version="1" comment="git-gui is &lt;2.26.2-27.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720760" version="1" comment="git-svn is &lt;2.26.2-27.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720761" version="1" comment="git-web is &lt;2.26.2-27.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720762" version="1" comment="gitk is &lt;2.26.2-27.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726492" version="1" comment="libwebkit2gtk3-lang is &lt;2.38.2-2.120.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726572" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.38.2-2.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722297" version="1" comment="libmspack0 is &lt;0.4-15.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722298" version="1" comment="libopencc2 is &lt;1.0.3-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722299" version="1" comment="opencc is &lt;1.0.3-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722300" version="1" comment="opencc-data is &lt;1.0.3-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726836" version="1" comment="db48-utils is &lt;4.8.30-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726837" version="1" comment="libdb-4_8 is &lt;4.8.30-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726838" version="1" comment="libdb-4_8-32bit is &lt;4.8.30-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727282" version="1" comment="libvncclient0 is &lt;0.9.9-17.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727283" version="1" comment="libvncserver0 is &lt;0.9.9-17.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724930" version="1" comment="bcel is &lt;5.2-28.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727485" version="1" comment="busybox is &lt;1.35.0-4.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727676" version="1" comment="gnome-shell-search-provider-nautilus is &lt;3.20.3-23.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727677" version="1" comment="libnautilus-extension1 is &lt;3.20.3-23.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727678" version="1" comment="nautilus is &lt;3.20.3-23.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727674" version="1" comment="nautilus-lang is &lt;3.20.3-23.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728059" version="1" comment="libcolord2 is &lt;1.3.3-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728060" version="1" comment="libcolord2-32bit is &lt;1.3.3-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728061" version="1" comment="libcolorhug2 is &lt;1.3.3-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729723" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr5.15-38.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729649" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr5.15-38.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729724" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr5.15-38.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729725" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr5.15-38.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729651" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr5.15-38.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729975" version="1" comment="curl is &lt;7.37.0-37.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729976" version="1" comment="libcurl4 is &lt;7.37.0-37.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729977" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729726" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.20-30.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729653" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr7.20-30.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729727" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.20-30.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729654" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr7.20-30.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729728" version="1" comment="libsqlite3-0 is &lt;3.39.3-9.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729729" version="1" comment="libsqlite3-0-32bit is &lt;3.39.3-9.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729730" version="1" comment="sqlite3 is &lt;3.39.3-9.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729731" version="1" comment="sqlite3-devel is &lt;3.39.3-9.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729732" version="1" comment="sqlite3-tcl is &lt;3.39.3-9.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730139" version="1" comment="ca-certificates-mozilla is &lt;2.60-12.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668381" version="1" comment="libpolkit0 is &lt;0.113-5.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668382" version="1" comment="polkit is &lt;0.113-5.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668383" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668379" version="1" comment="libjasper1 is &lt;1.900.14-195.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668380" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669373" version="1" comment="tomcat is &lt;8.0.53-29.49.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669374" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.49.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669375" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.49.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669376" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.49.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669377" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.49.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669378" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.49.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669379" version="1" comment="tomcat-lib is &lt;8.0.53-29.49.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669380" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.49.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669381" version="1" comment="tomcat-webapps is &lt;8.0.53-29.49.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662620" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662621" version="1" comment="openexr is &lt;2.1.0-6.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669114" version="1" comment="gnutls is &lt;3.3.27-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669115" version="1" comment="libgnutls-openssl27 is &lt;3.3.27-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669116" version="1" comment="libgnutls28 is &lt;3.3.27-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669117" version="1" comment="libgnutls28-32bit is &lt;3.3.27-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671814" version="1" comment="libFLAC++6 is &lt;1.3.0-12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671815" version="1" comment="libFLAC8 is &lt;1.3.0-12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671816" version="1" comment="libFLAC8-32bit is &lt;1.3.0-12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663442" version="1" comment="ghostscript is &lt;9.52-23.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663443" version="1" comment="ghostscript-devel is &lt;9.52-23.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663444" version="1" comment="ghostscript-x11 is &lt;9.52-23.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670850" version="1" comment="glib2-lang is &lt;2.48.2-12.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670851" version="1" comment="glib2-tools is &lt;2.48.2-12.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670852" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670853" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670854" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670855" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670856" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670857" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670858" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670859" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670860" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670861" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667644" version="1" comment="atftp is &lt;0.7.0-160.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669369" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669370" version="1" comment="python3 is &lt;3.4.10-25.85.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669371" version="1" comment="python3-base is &lt;3.4.10-25.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669372" version="1" comment="python3-curses is &lt;3.4.10-25.85.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670565" version="1" comment="libblas3 is &lt;3.5.0-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670566" version="1" comment="liblapack3 is &lt;3.5.0-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677158" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-28.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677159" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-28.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677160" version="1" comment="python is &lt;2.7.18-28.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677161" version="1" comment="python-32bit is &lt;2.7.18-28.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677162" version="1" comment="python-base is &lt;2.7.18-28.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677163" version="1" comment="python-base-32bit is &lt;2.7.18-28.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677164" version="1" comment="python-curses is &lt;2.7.18-28.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677165" version="1" comment="python-demo is &lt;2.7.18-28.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677166" version="1" comment="python-devel is &lt;2.7.18-28.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677167" version="1" comment="python-doc is &lt;2.7.18-28.84.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677168" version="1" comment="python-doc-pdf is &lt;2.7.18-28.84.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677169" version="1" comment="python-gdbm is &lt;2.7.18-28.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677170" version="1" comment="python-idle is &lt;2.7.18-28.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677171" version="1" comment="python-tk is &lt;2.7.18-28.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677172" version="1" comment="python-xml is &lt;2.7.18-28.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734038" version="1" comment="sudo is &lt;1.8.20p2-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009731150" version="1" comment="postgresql-jdbc is &lt;9.4-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734279" version="1" comment="git-core is &lt;2.26.2-27.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734280" version="1" comment="git-cvs is &lt;2.26.2-27.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734281" version="1" comment="git-daemon is &lt;2.26.2-27.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734282" version="1" comment="git-email is &lt;2.26.2-27.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734283" version="1" comment="git-gui is &lt;2.26.2-27.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734284" version="1" comment="git-svn is &lt;2.26.2-27.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734285" version="1" comment="git-web is &lt;2.26.2-27.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734286" version="1" comment="gitk is &lt;2.26.2-27.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732602" version="1" comment="MozillaFirefox is &lt;102.7.0-112.145.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732603" version="1" comment="MozillaFirefox-devel is &lt;102.7.0-112.145.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732604" version="1" comment="MozillaFirefox-translations-common is &lt;102.7.0-112.145.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732415" version="1" comment="libfreebl3 is &lt;3.79.3-58.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732400" version="1" comment="libfreebl3-32bit is &lt;3.79.3-58.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732416" version="1" comment="libfreebl3-hmac is &lt;3.79.3-58.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732402" version="1" comment="libfreebl3-hmac-32bit is &lt;3.79.3-58.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732417" version="1" comment="libsoftokn3 is &lt;3.79.3-58.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732404" version="1" comment="libsoftokn3-32bit is &lt;3.79.3-58.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732418" version="1" comment="libsoftokn3-hmac is &lt;3.79.3-58.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732406" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.79.3-58.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732419" version="1" comment="mozilla-nss is &lt;3.79.3-58.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732408" version="1" comment="mozilla-nss-32bit is &lt;3.79.3-58.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732420" version="1" comment="mozilla-nss-certs is &lt;3.79.3-58.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732410" version="1" comment="mozilla-nss-certs-32bit is &lt;3.79.3-58.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732423" version="1" comment="mozilla-nss-devel is &lt;3.79.3-58.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732421" version="1" comment="mozilla-nss-sysinit is &lt;3.79.3-58.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732413" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.79.3-58.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732422" version="1" comment="mozilla-nss-tools is &lt;3.79.3-58.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734039" version="1" comment="freeradius-server is &lt;3.0.15-2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734040" version="1" comment="freeradius-server-doc is &lt;3.0.15-2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734041" version="1" comment="freeradius-server-krb5 is &lt;3.0.15-2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734042" version="1" comment="freeradius-server-ldap is &lt;3.0.15-2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734043" version="1" comment="freeradius-server-libs is &lt;3.0.15-2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734044" version="1" comment="freeradius-server-mysql is &lt;3.0.15-2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734045" version="1" comment="freeradius-server-perl is &lt;3.0.15-2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734046" version="1" comment="freeradius-server-postgresql is &lt;3.0.15-2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734047" version="1" comment="freeradius-server-python is &lt;3.0.15-2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734048" version="1" comment="freeradius-server-sqlite is &lt;3.0.15-2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734049" version="1" comment="freeradius-server-utils is &lt;3.0.15-2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733342" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733255" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733343" version="1" comment="libdcerpc0 is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733257" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733344" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733259" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733345" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733261" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733346" version="1" comment="libndr-standard0 is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733263" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733347" version="1" comment="libndr0 is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733265" version="1" comment="libndr0-32bit is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733348" version="1" comment="libnetapi0 is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733267" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733349" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733269" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733350" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733271" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733351" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733273" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733352" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733275" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733353" version="1" comment="libsamba-util0 is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733277" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733354" version="1" comment="libsamdb0 is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733279" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733355" version="1" comment="libsmbclient0 is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733281" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733356" version="1" comment="libsmbconf0 is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733283" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733357" version="1" comment="libsmbldap0 is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733285" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733358" version="1" comment="libtevent-util0 is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733287" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733359" version="1" comment="libwbclient0 is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733289" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733360" version="1" comment="samba is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733361" version="1" comment="samba-client is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733292" version="1" comment="samba-client-32bit is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733293" version="1" comment="samba-doc is &lt;4.6.16+git.384.9fec958bed-3.76.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733362" version="1" comment="samba-libs is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733295" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733363" version="1" comment="samba-winbind is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733297" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.384.9fec958bed-3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734050" version="1" comment="xen is &lt;4.9.4_36-3.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734051" version="1" comment="xen-doc-html is &lt;4.9.4_36-3.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734052" version="1" comment="xen-libs is &lt;4.9.4_36-3.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734053" version="1" comment="xen-libs-32bit is &lt;4.9.4_36-3.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734054" version="1" comment="xen-tools is &lt;4.9.4_36-3.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734055" version="1" comment="xen-tools-domU is &lt;4.9.4_36-3.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009736631" version="1" comment="libXpm4 is &lt;3.5.11-6.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009736602" version="1" comment="libXpm4-32bit is &lt;3.5.11-6.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733645" version="1" comment="bluez is &lt;5.13-5.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733646" version="1" comment="libbluetooth3 is &lt;5.13-5.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752060" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752061" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747948" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.38.5-2.131.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747949" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.38.5-2.131.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747904" version="1" comment="libwebkit2gtk3-lang is &lt;2.38.5-2.131.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747950" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.38.5-2.131.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747951" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.38.5-2.131.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747952" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.38.5-2.131.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747953" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.38.5-2.131.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750856" version="1" comment="sudo is &lt;1.8.20p2-3.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747289" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.186.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747290" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.186.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747291" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.186.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747292" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.186.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751385" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751386" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751387" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751388" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751389" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751390" version="1" comment="openssl is &lt;1.0.2j-60.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751391" version="1" comment="openssl-doc is &lt;1.0.2j-60.89.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009748397" version="1" comment="python-cryptography is &lt;2.8-7.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009748398" version="1" comment="python3-cryptography is &lt;2.8-7.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751379" version="1" comment="libsystemd0 is &lt;228-150.108.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751358" version="1" comment="libsystemd0-32bit is &lt;228-150.108.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751392" version="1" comment="libudev-devel is &lt;228-150.108.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751380" version="1" comment="libudev1 is &lt;228-150.108.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751361" version="1" comment="libudev1-32bit is &lt;228-150.108.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751381" version="1" comment="systemd is &lt;228-150.108.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751363" version="1" comment="systemd-32bit is &lt;228-150.108.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751364" version="1" comment="systemd-bash-completion is &lt;228-150.108.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751382" version="1" comment="systemd-devel is &lt;228-150.108.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751383" version="1" comment="systemd-sysvinit is &lt;228-150.108.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751384" version="1" comment="udev is &lt;228-150.108.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753440" version="1" comment="ghostscript is &lt;9.52-23.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753441" version="1" comment="ghostscript-devel is &lt;9.52-23.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753442" version="1" comment="ghostscript-x11 is &lt;9.52-23.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753447" version="1" comment="MozillaFirefox is &lt;102.10.0-112.156.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753448" version="1" comment="MozillaFirefox-devel is &lt;102.10.0-112.156.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753449" version="1" comment="MozillaFirefox-translations-common is &lt;102.10.0-112.156.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753450" version="1" comment="libharfbuzz-icu0 is &lt;1.4.5-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753451" version="1" comment="libharfbuzz0 is &lt;1.4.5-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753439" version="1" comment="libharfbuzz0-32bit is &lt;1.4.5-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753206" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr8.0-30.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753200" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr8.0-30.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753207" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr8.0-30.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753201" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr8.0-30.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753443" version="1" comment="liblouis-data is &lt;2.6.4-6.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753444" version="1" comment="liblouis9 is &lt;2.6.4-6.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753445" version="1" comment="python-louis is &lt;2.6.4-6.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753446" version="1" comment="python3-louis is &lt;2.6.4-6.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009736632" version="1" comment="apache2 is &lt;2.4.23-29.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009736604" version="1" comment="apache2-doc is &lt;2.4.23-29.94.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009736633" version="1" comment="apache2-example-pages is &lt;2.4.23-29.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009736634" version="1" comment="apache2-prefork is &lt;2.4.23-29.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009736635" version="1" comment="apache2-utils is &lt;2.4.23-29.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009736636" version="1" comment="apache2-worker is &lt;2.4.23-29.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753805" version="1" comment="shim is &lt;15.7-25.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753097" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753098" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753099" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753100" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753101" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753102" version="1" comment="openssl is &lt;1.0.2j-60.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753103" version="1" comment="openssl-doc is &lt;1.0.2j-60.92.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752780" version="1" comment="glib2-lang is &lt;2.48.2-12.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752861" version="1" comment="glib2-tools is &lt;2.48.2-12.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752862" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752863" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752864" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752865" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752866" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752867" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752868" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752869" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752870" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752871" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754944" version="1" comment="ovmf is &lt;2017+git1492060560.b6d11d7c46-4.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754945" version="1" comment="ovmf-tools is &lt;2017+git1492060560.b6d11d7c46-4.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754946" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1492060560.b6d11d7c46-4.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753452" version="1" comment="libmicrohttpd10 is &lt;0.9.30-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754120" version="1" comment="avahi is &lt;0.6.32-32.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754087" version="1" comment="avahi-lang is &lt;0.6.32-32.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754121" version="1" comment="avahi-utils is &lt;0.6.32-32.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754122" version="1" comment="libavahi-client3 is &lt;0.6.32-32.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754123" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-32.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754124" version="1" comment="libavahi-common3 is &lt;0.6.32-32.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754125" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-32.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754126" version="1" comment="libavahi-core7 is &lt;0.6.32-32.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754127" version="1" comment="libavahi-glib1 is &lt;0.6.32-32.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754128" version="1" comment="libavahi-glib1-32bit is &lt;0.6.32-32.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754129" version="1" comment="libdns_sd is &lt;0.6.32-32.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754130" version="1" comment="libdns_sd-32bit is &lt;0.6.32-32.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009736640" version="1" comment="libtiff5 is &lt;4.0.9-44.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009736629" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009736641" version="1" comment="tiff is &lt;4.0.9-44.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755084" version="1" comment="dmidecode is &lt;3.0-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755313" version="1" comment="libxml2-2 is &lt;2.9.4-46.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755314" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755287" version="1" comment="libxml2-doc is &lt;2.9.4-46.62.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755315" version="1" comment="libxml2-tools is &lt;2.9.4-46.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755316" version="1" comment="python-libxml2 is &lt;2.9.4-46.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755525" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.38.6-2.136.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755526" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.38.6-2.136.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755475" version="1" comment="libwebkit2gtk3-lang is &lt;2.38.6-2.136.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755527" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.38.6-2.136.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755528" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.38.6-2.136.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755529" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.38.6-2.136.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755530" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.38.6-2.136.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755533" version="1" comment="git-core is &lt;2.26.2-27.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755534" version="1" comment="git-cvs is &lt;2.26.2-27.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755535" version="1" comment="git-daemon is &lt;2.26.2-27.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755536" version="1" comment="git-email is &lt;2.26.2-27.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755537" version="1" comment="git-gui is &lt;2.26.2-27.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755538" version="1" comment="git-svn is &lt;2.26.2-27.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755539" version="1" comment="git-web is &lt;2.26.2-27.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755540" version="1" comment="gitk is &lt;2.26.2-27.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754940" version="1" comment="shadow is &lt;4.2.1-27.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009736638" version="1" comment="gvim is &lt;9.0.1234-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009736639" version="1" comment="vim is &lt;9.0.1234-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009736314" version="1" comment="vim-data is &lt;9.0.1234-17.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009736315" version="1" comment="vim-data-common is &lt;9.0.1234-17.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755995" version="1" comment="shim is &lt;15.7-25.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756031" version="1" comment="libncurses5 is &lt;5.9-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756032" version="1" comment="libncurses5-32bit is &lt;5.9-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756033" version="1" comment="libncurses6 is &lt;5.9-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756034" version="1" comment="libncurses6-32bit is &lt;5.9-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756035" version="1" comment="ncurses-devel is &lt;5.9-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756036" version="1" comment="ncurses-devel-32bit is &lt;5.9-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756037" version="1" comment="ncurses-utils is &lt;5.9-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756038" version="1" comment="tack is &lt;5.9-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756039" version="1" comment="terminfo is &lt;5.9-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756040" version="1" comment="terminfo-base is &lt;5.9-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752232" version="1" comment="dnsmasq is &lt;2.78-18.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734024" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-28.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734025" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-28.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734026" version="1" comment="python is &lt;2.7.18-28.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734027" version="1" comment="python-32bit is &lt;2.7.18-28.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734028" version="1" comment="python-base is &lt;2.7.18-28.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734029" version="1" comment="python-base-32bit is &lt;2.7.18-28.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734030" version="1" comment="python-curses is &lt;2.7.18-28.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734031" version="1" comment="python-demo is &lt;2.7.18-28.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734056" version="1" comment="python-devel is &lt;2.7.18-28.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734032" version="1" comment="python-doc is &lt;2.7.18-28.93.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734033" version="1" comment="python-doc-pdf is &lt;2.7.18-28.93.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734034" version="1" comment="python-gdbm is &lt;2.7.18-28.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734035" version="1" comment="python-idle is &lt;2.7.18-28.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734036" version="1" comment="python-tk is &lt;2.7.18-28.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734037" version="1" comment="python-xml is &lt;2.7.18-28.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756799" version="1" comment="ntp is &lt;4.2.8p15-100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756800" version="1" comment="ntp-doc is &lt;4.2.8p15-100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757013" version="1" comment="MozillaFirefox is &lt;102.11.0-112.159.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757014" version="1" comment="MozillaFirefox-devel is &lt;102.11.0-112.159.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757015" version="1" comment="MozillaFirefox-translations-common is &lt;102.11.0-112.159.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756672" version="1" comment="golang-github-prometheus-node_exporter is &lt;1.5.0-1.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758174" version="1" comment="postgresql12 is &lt;12.15-3.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758175" version="1" comment="postgresql12-contrib is &lt;12.15-3.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758176" version="1" comment="postgresql12-devel is &lt;12.15-3.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758074" version="1" comment="postgresql12-docs is &lt;12.15-3.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758177" version="1" comment="postgresql12-llvmjit-devel is &lt;12.15-3.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758178" version="1" comment="postgresql12-plperl is &lt;12.15-3.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758179" version="1" comment="postgresql12-plpython is &lt;12.15-3.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758180" version="1" comment="postgresql12-pltcl is &lt;12.15-3.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758181" version="1" comment="postgresql12-server is &lt;12.15-3.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758182" version="1" comment="postgresql12-server-devel is &lt;12.15-3.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758183" version="1" comment="postgresql13 is &lt;13.11-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758184" version="1" comment="postgresql13-contrib is &lt;13.11-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758081" version="1" comment="postgresql13-docs is &lt;13.11-3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758185" version="1" comment="postgresql13-plperl is &lt;13.11-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758186" version="1" comment="postgresql13-plpython is &lt;13.11-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758187" version="1" comment="postgresql13-pltcl is &lt;13.11-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758188" version="1" comment="postgresql13-server is &lt;13.11-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758189" version="1" comment="postgresql14 is &lt;14.8-3.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758190" version="1" comment="postgresql14-contrib is &lt;14.8-3.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758191" version="1" comment="postgresql14-devel is &lt;14.8-3.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758088" version="1" comment="postgresql14-docs is &lt;14.8-3.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758192" version="1" comment="postgresql14-llvmjit-devel is &lt;14.8-3.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758193" version="1" comment="postgresql14-plperl is &lt;14.8-3.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758194" version="1" comment="postgresql14-plpython is &lt;14.8-3.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758195" version="1" comment="postgresql14-pltcl is &lt;14.8-3.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758196" version="1" comment="postgresql14-server is &lt;14.8-3.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758197" version="1" comment="postgresql14-server-devel is &lt;14.8-3.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758172" version="1" comment="libecpg6 is &lt;15.3-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758198" version="1" comment="libecpg6-32bit is &lt;15.3-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758173" version="1" comment="libpq5 is &lt;15.3-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758171" version="1" comment="libpq5-32bit is &lt;15.3-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758199" version="1" comment="postgresql15 is &lt;15.3-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758200" version="1" comment="postgresql15-contrib is &lt;15.3-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758201" version="1" comment="postgresql15-devel is &lt;15.3-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758099" version="1" comment="postgresql15-docs is &lt;15.3-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758202" version="1" comment="postgresql15-plperl is &lt;15.3-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758203" version="1" comment="postgresql15-plpython is &lt;15.3-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758204" version="1" comment="postgresql15-pltcl is &lt;15.3-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758205" version="1" comment="postgresql15-server is &lt;15.3-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758206" version="1" comment="postgresql15-server-devel is &lt;15.3-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760463" version="1" comment="curl is &lt;7.37.0-37.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760464" version="1" comment="libcurl4 is &lt;7.37.0-37.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760465" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756563" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.372-27.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756564" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.372-27.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756565" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.372-27.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756566" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.372-27.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734017" version="1" comment="ctags is &lt;5.8-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760617" version="1" comment="openvswitch is &lt;2.7.12-3.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760462" version="1" comment="ucode-intel is &lt;20230512-13.107.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763680" version="1" comment="tomcat is &lt;8.0.53-29.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763681" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763682" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763683" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763684" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763685" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763686" version="1" comment="tomcat-lib is &lt;8.0.53-29.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763687" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763688" version="1" comment="tomcat-webapps is &lt;8.0.53-29.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763475" version="1" comment="libtiff5 is &lt;4.0.9-44.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763476" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763477" version="1" comment="tiff is &lt;4.0.9-44.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763954" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763955" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763956" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763957" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763958" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763959" version="1" comment="openssl is &lt;1.0.2j-60.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763960" version="1" comment="openssl-doc is &lt;1.0.2j-60.95.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763981" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.189.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763982" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.189.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763983" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.189.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763984" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.189.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764285" version="1" comment="cups is &lt;1.7.5-20.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764286" version="1" comment="cups-client is &lt;1.7.5-20.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764287" version="1" comment="cups-libs is &lt;1.7.5-20.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764284" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763974" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763975" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763976" version="1" comment="openldap2 is &lt;2.4.41-18.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763977" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763978" version="1" comment="openldap2-client is &lt;2.4.41-18.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763979" version="1" comment="openldap2-doc is &lt;2.4.41-18.95.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763980" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764861" version="1" comment="MozillaFirefox is &lt;102.12.0-112.162.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764862" version="1" comment="MozillaFirefox-devel is &lt;102.12.0-112.162.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764863" version="1" comment="MozillaFirefox-translations-common is &lt;102.12.0-112.162.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764878" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-28.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764879" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-28.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764880" version="1" comment="python is &lt;2.7.18-28.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764881" version="1" comment="python-32bit is &lt;2.7.18-28.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764882" version="1" comment="python-base is &lt;2.7.18-28.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764883" version="1" comment="python-base-32bit is &lt;2.7.18-28.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764884" version="1" comment="python-curses is &lt;2.7.18-28.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764885" version="1" comment="python-demo is &lt;2.7.18-28.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764886" version="1" comment="python-devel is &lt;2.7.18-28.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764887" version="1" comment="python-doc is &lt;2.7.18-28.96.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764888" version="1" comment="python-doc-pdf is &lt;2.7.18-28.96.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764889" version="1" comment="python-gdbm is &lt;2.7.18-28.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764890" version="1" comment="python-idle is &lt;2.7.18-28.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764891" version="1" comment="python-tk is &lt;2.7.18-28.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764892" version="1" comment="python-xml is &lt;2.7.18-28.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764867" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-6.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764868" version="1" comment="python36 is &lt;3.6.15-6.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764869" version="1" comment="python36-base is &lt;3.6.15-6.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764870" version="1" comment="python36-curses is &lt;3.6.15-6.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764871" version="1" comment="python36-dbm is &lt;3.6.15-6.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764872" version="1" comment="python36-devel is &lt;3.6.15-6.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764873" version="1" comment="python36-idle is &lt;3.6.15-6.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764874" version="1" comment="python36-testsuite is &lt;3.6.15-6.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764875" version="1" comment="python36-tk is &lt;3.6.15-6.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764876" version="1" comment="python36-tools is &lt;3.6.15-6.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764819" version="1" comment="supportutils is &lt;3.0.11-95.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764866" version="1" comment="opensc is &lt;0.13.0-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764864" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr8.5-30.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764825" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr8.5-30.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764865" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr8.5-30.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764826" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr8.5-30.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763535" version="1" comment="libcares2 is &lt;1.9.1-9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764877" version="1" comment="gdb is &lt;12.1-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768066" version="1" comment="libX11-6 is &lt;1.6.2-12.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768063" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767924" version="1" comment="libX11-data is &lt;1.6.2-12.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768067" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768065" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767039" version="1" comment="python36-requests is &lt;2.24.0-6.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764527" version="1" comment="libwebp5 is &lt;0.4.3-4.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764528" version="1" comment="libwebp5-32bit is &lt;0.4.3-4.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764529" version="1" comment="libwebpdemux1 is &lt;0.4.3-4.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767473" version="1" comment="bluez is &lt;5.13-5.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767474" version="1" comment="libbluetooth3 is &lt;5.13-5.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768853" version="1" comment="dbus-1 is &lt;1.8.22-29.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768854" version="1" comment="dbus-1-x11 is &lt;1.8.22-29.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768855" version="1" comment="libdbus-1-3 is &lt;1.8.22-29.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768856" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-29.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766869" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.38.6-2.139.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766870" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.38.6-2.139.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766820" version="1" comment="libwebkit2gtk3-lang is &lt;2.38.6-2.139.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766871" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.38.6-2.139.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766872" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.38.6-2.139.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766873" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.38.6-2.139.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766874" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.38.6-2.139.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767475" version="1" comment="ntp is &lt;4.2.8p17-103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767476" version="1" comment="ntp-doc is &lt;4.2.8p17-103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768377" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768378" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768379" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768380" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768381" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768382" version="1" comment="openssl is &lt;1.0.2j-60.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768383" version="1" comment="openssl-doc is &lt;1.0.2j-60.98.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767481" version="1" comment="libiniparser0 is &lt;3.1.0.git20140619_c5beb80a-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767482" version="1" comment="libiniparser0-32bit is &lt;3.1.0.git20140619_c5beb80a-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769889" version="1" comment="libcap-progs is &lt;2.26-14.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769890" version="1" comment="libcap2 is &lt;2.26-14.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769891" version="1" comment="libcap2-32bit is &lt;2.26-14.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770650" version="1" comment="bind is &lt;9.9.9P1-63.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770651" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770652" version="1" comment="bind-doc is &lt;9.9.9P1-63.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770653" version="1" comment="bind-libs is &lt;9.9.9P1-63.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770654" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770655" version="1" comment="bind-utils is &lt;9.9.9P1-63.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770779" version="1" comment="libQt5Concurrent5 is &lt;5.6.2-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770780" version="1" comment="libQt5Core5 is &lt;5.6.2-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770781" version="1" comment="libQt5DBus5 is &lt;5.6.2-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770782" version="1" comment="libQt5Gui5 is &lt;5.6.2-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770783" version="1" comment="libQt5Network5 is &lt;5.6.2-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770784" version="1" comment="libQt5OpenGL5 is &lt;5.6.2-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770785" version="1" comment="libQt5PrintSupport5 is &lt;5.6.2-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770786" version="1" comment="libQt5Sql5 is &lt;5.6.2-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770787" version="1" comment="libQt5Sql5-mysql is &lt;5.6.2-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770788" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.2-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770789" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.2-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770790" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.2-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770791" version="1" comment="libQt5Test5 is &lt;5.6.2-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770792" version="1" comment="libQt5Widgets5 is &lt;5.6.2-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770793" version="1" comment="libQt5Xml5 is &lt;5.6.2-6.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738052" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738053" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770776" version="1" comment="ghostscript is &lt;9.52-23.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770777" version="1" comment="ghostscript-devel is &lt;9.52-23.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770778" version="1" comment="ghostscript-x11 is &lt;9.52-23.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771542" version="1" comment="MozillaFirefox is &lt;115.0-112.165.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771543" version="1" comment="MozillaFirefox-branding-SLE is &lt;115-35.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771506" version="1" comment="MozillaFirefox-devel is &lt;115.0-112.165.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771544" version="1" comment="MozillaFirefox-translations-common is &lt;115.0-112.165.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771269" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr8.6-30.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771159" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr8.6-30.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771270" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr8.6-30.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771160" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr8.6-30.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768059" version="1" comment="python-requests is &lt;2.11.1-6.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767477" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.192.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767478" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.192.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767479" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.192.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767480" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.192.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771452" version="1" comment="perl is &lt;5.18.2-12.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771450" version="1" comment="perl-32bit is &lt;5.18.2-12.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771453" version="1" comment="perl-base is &lt;5.18.2-12.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771404" version="1" comment="perl-doc is &lt;5.18.2-12.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767921" version="1" comment="python3-requests is &lt;2.24.0-8.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772359" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772316" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772360" version="1" comment="libdcerpc0 is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772318" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772361" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772320" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772362" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772322" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772363" version="1" comment="libndr-standard0 is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772324" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772364" version="1" comment="libndr0 is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772326" version="1" comment="libndr0-32bit is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772365" version="1" comment="libnetapi0 is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772328" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772366" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772330" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772367" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772332" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772368" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772334" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772369" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772336" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772370" version="1" comment="libsamba-util0 is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772338" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772371" version="1" comment="libsamdb0 is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772340" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772372" version="1" comment="libsmbclient0 is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772342" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772373" version="1" comment="libsmbconf0 is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772344" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772374" version="1" comment="libsmbldap0 is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772346" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772375" version="1" comment="libtevent-util0 is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772348" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772376" version="1" comment="libwbclient0 is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772350" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772377" version="1" comment="samba is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772378" version="1" comment="samba-client is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772353" version="1" comment="samba-client-32bit is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772354" version="1" comment="samba-doc is &lt;4.6.16+git.393.97432483687-3.81.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772379" version="1" comment="samba-libs is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772356" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772380" version="1" comment="samba-winbind is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772358" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.393.97432483687-3.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771821" version="1" comment="libpoppler-glib8 is &lt;0.43.0-16.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771822" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-16.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771823" version="1" comment="libpoppler60 is &lt;0.43.0-16.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771824" version="1" comment="poppler-tools is &lt;0.43.0-16.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773607" version="1" comment="openssh is &lt;7.2p2-74.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773608" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773609" version="1" comment="openssh-fips is &lt;7.2p2-74.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773610" version="1" comment="openssh-helpers is &lt;7.2p2-74.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772729" version="1" comment="MozillaFirefox is &lt;115.0.2-112.170.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772658" version="1" comment="MozillaFirefox-devel is &lt;115.0.2-112.170.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772730" version="1" comment="MozillaFirefox-translations-common is &lt;115.0.2-112.170.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773611" version="1" comment="libQt5Svg5 is &lt;5.6.2-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773612" version="1" comment="libQt5Concurrent5 is &lt;5.6.2-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773613" version="1" comment="libQt5Core5 is &lt;5.6.2-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773614" version="1" comment="libQt5DBus5 is &lt;5.6.2-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773615" version="1" comment="libQt5Gui5 is &lt;5.6.2-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773616" version="1" comment="libQt5Network5 is &lt;5.6.2-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773617" version="1" comment="libQt5OpenGL5 is &lt;5.6.2-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773618" version="1" comment="libQt5PrintSupport5 is &lt;5.6.2-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773619" version="1" comment="libQt5Sql5 is &lt;5.6.2-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773620" version="1" comment="libQt5Sql5-mysql is &lt;5.6.2-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773621" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.2-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773622" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.2-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773623" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.2-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773624" version="1" comment="libQt5Test5 is &lt;5.6.2-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773625" version="1" comment="libQt5Widgets5 is &lt;5.6.2-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773626" version="1" comment="libQt5Xml5 is &lt;5.6.2-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770150" version="1" comment="libxmltooling6 is &lt;1.5.6-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770151" version="1" comment="xmltooling-schemas is &lt;1.5.6-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772738" version="1" comment="zabbix-agent is &lt;4.0.12-4.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771454" version="1" comment="gnuplot is &lt;4.6.5-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730946" version="1" comment="libksba8 is &lt;1.3.0-24.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772731" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772732" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772733" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772734" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772735" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772736" version="1" comment="openssl is &lt;1.0.2j-60.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772737" version="1" comment="openssl-doc is &lt;1.0.2j-60.101.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776008" version="1" comment="MozillaFirefox is &lt;115.1.0-112.173.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775992" version="1" comment="MozillaFirefox-devel is &lt;115.1.0-112.173.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776009" version="1" comment="MozillaFirefox-translations-common is &lt;115.1.0-112.173.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009736637" version="1" comment="apache2-mod_security2 is &lt;2.8.0-7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777369" version="1" comment="javapackages-tools is &lt;5.3.1-14.7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777377" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-13.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777262" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-13.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777378" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-13.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777379" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-13.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777380" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-13.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777381" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-13.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777382" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-13.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777383" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-13.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777384" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-13.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777385" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-13.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777386" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-13.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777387" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-13.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777388" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-13.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777389" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-13.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777390" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-13.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777391" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-13.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777392" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-13.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777393" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-13.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777370" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.40.5-2.146.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777371" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.40.5-2.146.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777257" version="1" comment="libwebkit2gtk3-lang is &lt;2.40.5-2.146.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777372" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.40.5-2.146.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777373" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.40.5-2.146.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777374" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.40.5-2.146.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777375" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.40.5-2.146.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776884" version="1" comment="gstreamer-plugins-good is &lt;1.8.3-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776857" version="1" comment="gstreamer-plugins-good-lang is &lt;1.8.3-16.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778387" version="1" comment="ucode-intel is &lt;20230808-13.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777821" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777822" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777823" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777824" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777825" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777826" version="1" comment="openssl is &lt;1.0.2j-60.104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777827" version="1" comment="openssl-doc is &lt;1.0.2j-60.104.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774204" version="1" comment="libpcre2-16-0 is &lt;10.34-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774205" version="1" comment="libpcre2-32-0 is &lt;10.34-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774206" version="1" comment="libpcre2-8-0 is &lt;10.34-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774207" version="1" comment="libpcre2-posix2 is &lt;10.34-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779153" version="1" comment="postgresql12 is &lt;12.16-3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779154" version="1" comment="postgresql12-contrib is &lt;12.16-3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779155" version="1" comment="postgresql12-devel is &lt;12.16-3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779083" version="1" comment="postgresql12-docs is &lt;12.16-3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779156" version="1" comment="postgresql12-llvmjit-devel is &lt;12.16-3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779157" version="1" comment="postgresql12-plperl is &lt;12.16-3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779158" version="1" comment="postgresql12-plpython is &lt;12.16-3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779159" version="1" comment="postgresql12-pltcl is &lt;12.16-3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779160" version="1" comment="postgresql12-server is &lt;12.16-3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779161" version="1" comment="postgresql12-server-devel is &lt;12.16-3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779162" version="1" comment="libecpg6 is &lt;15.4-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779163" version="1" comment="libecpg6-32bit is &lt;15.4-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779164" version="1" comment="libpq5 is &lt;15.4-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779165" version="1" comment="libpq5-32bit is &lt;15.4-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779166" version="1" comment="postgresql15 is &lt;15.4-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779167" version="1" comment="postgresql15-contrib is &lt;15.4-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779168" version="1" comment="postgresql15-devel is &lt;15.4-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779094" version="1" comment="postgresql15-docs is &lt;15.4-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779169" version="1" comment="postgresql15-plperl is &lt;15.4-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779170" version="1" comment="postgresql15-plpython is &lt;15.4-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779171" version="1" comment="postgresql15-pltcl is &lt;15.4-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779172" version="1" comment="postgresql15-server is &lt;15.4-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779173" version="1" comment="postgresql15-server-devel is &lt;15.4-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779174" version="1" comment="postgresql14 is &lt;14.9-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779175" version="1" comment="postgresql14-contrib is &lt;14.9-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779176" version="1" comment="postgresql14-devel is &lt;14.9-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779101" version="1" comment="postgresql14-docs is &lt;14.9-3.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779177" version="1" comment="postgresql14-llvmjit-devel is &lt;14.9-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779178" version="1" comment="postgresql14-plperl is &lt;14.9-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779179" version="1" comment="postgresql14-plpython is &lt;14.9-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779180" version="1" comment="postgresql14-pltcl is &lt;14.9-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779181" version="1" comment="postgresql14-server is &lt;14.9-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779182" version="1" comment="postgresql14-server-devel is &lt;14.9-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779183" version="1" comment="postgresql13 is &lt;13.12-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779184" version="1" comment="postgresql13-contrib is &lt;13.12-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779108" version="1" comment="postgresql13-docs is &lt;13.12-3.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779185" version="1" comment="postgresql13-plperl is &lt;13.12-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779186" version="1" comment="postgresql13-plpython is &lt;13.12-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779187" version="1" comment="postgresql13-pltcl is &lt;13.12-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779188" version="1" comment="postgresql13-server is &lt;13.12-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775556" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.195.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775557" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.195.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775558" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.195.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775559" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.195.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771803" version="1" comment="python-configobj is &lt;5.0.6-20.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779449" version="1" comment="clamav is &lt;0.103.9-33.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737349" version="1" comment="libapr-util1 is &lt;1.5.3-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737350" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.5.3-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777828" version="1" comment="krb5 is &lt;1.12.5-40.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777829" version="1" comment="krb5-32bit is &lt;1.12.5-40.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777830" version="1" comment="krb5-client is &lt;1.12.5-40.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777831" version="1" comment="krb5-doc is &lt;1.12.5-40.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777832" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777833" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777834" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777835" version="1" comment="krb5-server is &lt;1.12.5-40.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778388" version="1" comment="libpoppler-glib8 is &lt;0.43.0-16.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778389" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-16.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778390" version="1" comment="libpoppler60 is &lt;0.43.0-16.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778391" version="1" comment="poppler-tools is &lt;0.43.0-16.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738526" version="1" comment="xrdp is &lt;0.9.0~git.1456906198.f422461-21.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778763" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778710" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-13.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778764" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778765" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778766" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778767" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778768" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778769" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778770" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778771" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778772" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778773" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778774" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778775" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778776" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778777" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778778" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778779" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778727" version="1" comment="ca-certificates-mozilla is &lt;2.62-12.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779489" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr8.10-30.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779483" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr8.10-30.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779490" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr8.10-30.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779484" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr8.10-30.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779488" version="1" comment="libcares2 is &lt;1.9.1-9.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780687" version="1" comment="curl is &lt;7.37.0-37.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780688" version="1" comment="libcurl4 is &lt;7.37.0-37.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780689" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777836" version="1" comment="gawk is &lt;4.1.0-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775192" version="1" comment="ghostscript is &lt;9.52-23.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775193" version="1" comment="ghostscript-devel is &lt;9.52-23.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775194" version="1" comment="ghostscript-x11 is &lt;9.52-23.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777394" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.382-27.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777395" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.382-27.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777396" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.382-27.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777397" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.382-27.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778385" version="1" comment="gvim is &lt;9.0.1572-17.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778386" version="1" comment="vim is &lt;9.0.1572-17.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778368" version="1" comment="vim-data is &lt;9.0.1572-17.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778369" version="1" comment="vim-data-common is &lt;9.0.1572-17.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778864" version="1" comment="libprocps3 is &lt;3.3.9-11.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778865" version="1" comment="procps is &lt;3.3.9-11.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780680" version="1" comment="libssh2-1 is &lt;1.4.3-20.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780681" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781297" version="1" comment="libvmtools0 is &lt;10.3.10-3.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781298" version="1" comment="open-vm-tools is &lt;10.3.10-3.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781299" version="1" comment="open-vm-tools-desktop is &lt;10.3.10-3.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780978" version="1" comment="MozillaFirefox is &lt;115.2.0-112.176.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780949" version="1" comment="MozillaFirefox-devel is &lt;115.2.0-112.176.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780979" version="1" comment="MozillaFirefox-translations-common is &lt;115.2.0-112.176.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794907" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-6.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794908" version="1" comment="python36 is &lt;3.6.15-6.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794909" version="1" comment="python36-base is &lt;3.6.15-6.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794910" version="1" comment="python36-curses is &lt;3.6.15-6.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794911" version="1" comment="python36-dbm is &lt;3.6.15-6.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794912" version="1" comment="python36-devel is &lt;3.6.15-6.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794913" version="1" comment="python36-idle is &lt;3.6.15-6.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794914" version="1" comment="python36-testsuite is &lt;3.6.15-6.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794915" version="1" comment="python36-tk is &lt;3.6.15-6.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794916" version="1" comment="python36-tools is &lt;3.6.15-6.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795518" version="1" comment="MozillaFirefox is &lt;115.2.1-112.179.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795408" version="1" comment="MozillaFirefox-devel is &lt;115.2.1-112.179.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795519" version="1" comment="MozillaFirefox-translations-common is &lt;115.2.1-112.179.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796530" version="1" comment="libasan8 is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796531" version="1" comment="libasan8-32bit is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796532" version="1" comment="libatomic1 is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796533" version="1" comment="libatomic1-32bit is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796534" version="1" comment="libgcc_s1 is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796535" version="1" comment="libgcc_s1-32bit is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796536" version="1" comment="libgfortran5 is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796537" version="1" comment="libgfortran5-32bit is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796538" version="1" comment="libgomp1 is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796539" version="1" comment="libgomp1-32bit is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796540" version="1" comment="libitm1 is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796541" version="1" comment="libitm1-32bit is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796542" version="1" comment="liblsan0 is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796543" version="1" comment="libobjc4 is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796544" version="1" comment="libobjc4-32bit is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796545" version="1" comment="libquadmath0 is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796353" version="1" comment="libquadmath0-32bit is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796546" version="1" comment="libstdc++6 is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796547" version="1" comment="libstdc++6-32bit is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796548" version="1" comment="libstdc++6-locale is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796549" version="1" comment="libstdc++6-pp is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796550" version="1" comment="libstdc++6-pp-32bit is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796551" version="1" comment="libtsan2 is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796552" version="1" comment="libubsan1 is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796553" version="1" comment="libubsan1-32bit is &lt;12.3.0+git1204-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796554" version="1" comment="libasan4 is &lt;7.5.0+r278197-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796555" version="1" comment="libasan4-32bit is &lt;7.5.0+r278197-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796364" version="1" comment="libcilkrts5 is &lt;7.5.0+r278197-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796365" version="1" comment="libcilkrts5-32bit is &lt;7.5.0+r278197-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796556" version="1" comment="libgfortran4 is &lt;7.5.0+r278197-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796557" version="1" comment="libgfortran4-32bit is &lt;7.5.0+r278197-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796558" version="1" comment="libubsan0 is &lt;7.5.0+r278197-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796559" version="1" comment="libubsan0-32bit is &lt;7.5.0+r278197-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782037" version="1" comment="libxml2-2 is &lt;2.9.4-46.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782038" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782013" version="1" comment="libxml2-doc is &lt;2.9.4-46.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782039" version="1" comment="libxml2-tools is &lt;2.9.4-46.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782040" version="1" comment="python-libxml2 is &lt;2.9.4-46.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782041" version="1" comment="xen is &lt;4.9.4_40-3.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782042" version="1" comment="xen-doc-html is &lt;4.9.4_40-3.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782043" version="1" comment="xen-libs is &lt;4.9.4_40-3.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782044" version="1" comment="xen-libs-32bit is &lt;4.9.4_40-3.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782045" version="1" comment="xen-tools is &lt;4.9.4_40-3.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782046" version="1" comment="xen-tools-domU is &lt;4.9.4_40-3.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780678" version="1" comment="bluez is &lt;5.13-5.42.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780679" version="1" comment="libbluetooth3 is &lt;5.13-5.42.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780682" version="1" comment="libcares2 is &lt;1.9.1-9.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794663" version="1" comment="binutils is &lt;2.41-9.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794664" version="1" comment="binutils-devel is &lt;2.41-9.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794665" version="1" comment="libctf-nobfd0 is &lt;2.41-9.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794666" version="1" comment="libctf0 is &lt;2.41-9.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794667" version="1" comment="mutt is &lt;1.10.1-55.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794892" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-28.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794893" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-28.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794894" version="1" comment="python is &lt;2.7.18-28.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794895" version="1" comment="python-32bit is &lt;2.7.18-28.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794896" version="1" comment="python-base is &lt;2.7.18-28.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794897" version="1" comment="python-base-32bit is &lt;2.7.18-28.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794898" version="1" comment="python-curses is &lt;2.7.18-28.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794899" version="1" comment="python-demo is &lt;2.7.18-28.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794900" version="1" comment="python-devel is &lt;2.7.18-28.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794901" version="1" comment="python-doc is &lt;2.7.18-28.102.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794902" version="1" comment="python-doc-pdf is &lt;2.7.18-28.102.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794903" version="1" comment="python-gdbm is &lt;2.7.18-28.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794904" version="1" comment="python-idle is &lt;2.7.18-28.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794905" version="1" comment="python-tk is &lt;2.7.18-28.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794906" version="1" comment="python-xml is &lt;2.7.18-28.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797262" version="1" comment="cups is &lt;1.7.5-20.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797263" version="1" comment="cups-client is &lt;1.7.5-20.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797264" version="1" comment="cups-libs is &lt;1.7.5-20.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797261" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797274" version="1" comment="xrdp is &lt;0.9.0~git.1456906198.f422461-21.36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781636" version="1" comment="busybox is &lt;1.35.0-4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797271" version="1" comment="postfix is &lt;3.2.10-3.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797091" version="1" comment="postfix-doc is &lt;3.2.10-3.27.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797272" version="1" comment="postfix-mysql is &lt;3.2.10-3.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797273" version="1" comment="libexempi3 is &lt;2.2.1-5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780683" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.198.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780684" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.198.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780685" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.198.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780686" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.198.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780977" version="1" comment="libdjvulibre21 is &lt;3.5.25.3-5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798095" version="1" comment="tomcat is &lt;8.0.53-29.69.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798096" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.69.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798097" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.69.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798098" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.69.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798099" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.69.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798100" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.69.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798101" version="1" comment="tomcat-lib is &lt;8.0.53-29.69.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798102" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.69.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798103" version="1" comment="tomcat-webapps is &lt;8.0.53-29.69.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797692" version="1" comment="libfpm_pb0 is &lt;1.1.1-17.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797693" version="1" comment="libospf0 is &lt;1.1.1-17.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797694" version="1" comment="libospfapiclient0 is &lt;1.1.1-17.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797695" version="1" comment="libquagga_pb0 is &lt;1.1.1-17.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797696" version="1" comment="libzebra1 is &lt;1.1.1-17.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797697" version="1" comment="quagga is &lt;1.1.1-17.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798092" version="1" comment="libwebp5 is &lt;0.4.3-4.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798093" version="1" comment="libwebp5-32bit is &lt;0.4.3-4.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798094" version="1" comment="libwebpdemux1 is &lt;0.4.3-4.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797550" version="1" comment="libpng15-15 is &lt;1.5.22-10.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798854" version="1" comment="MozillaFirefox is &lt;115.3.0-112.182.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798792" version="1" comment="MozillaFirefox-devel is &lt;115.3.0-112.182.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798855" version="1" comment="MozillaFirefox-translations-common is &lt;115.3.0-112.182.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798970" version="1" comment="libnghttp2-14 is &lt;1.39.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798104" version="1" comment="gpg2 is &lt;2.0.24-9.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798026" version="1" comment="gpg2-lang is &lt;2.0.24-9.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796748" version="1" comment="golang-github-prometheus-node_exporter is &lt;1.5.0-1.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798856" version="1" comment="xen is &lt;4.9.4_42-3.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798857" version="1" comment="xen-doc-html is &lt;4.9.4_42-3.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798858" version="1" comment="xen-libs is &lt;4.9.4_42-3.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798859" version="1" comment="xen-libs-32bit is &lt;4.9.4_42-3.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798860" version="1" comment="xen-tools is &lt;4.9.4_42-3.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798861" version="1" comment="xen-tools-domU is &lt;4.9.4_42-3.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739765" version="1" comment="postgresql12 is &lt;12.14-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739766" version="1" comment="postgresql12-contrib is &lt;12.14-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739767" version="1" comment="postgresql12-devel is &lt;12.14-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739589" version="1" comment="postgresql12-docs is &lt;12.14-3.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739768" version="1" comment="postgresql12-llvmjit-devel is &lt;12.14-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739769" version="1" comment="postgresql12-plperl is &lt;12.14-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739770" version="1" comment="postgresql12-plpython is &lt;12.14-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739771" version="1" comment="postgresql12-pltcl is &lt;12.14-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739772" version="1" comment="postgresql12-server is &lt;12.14-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739773" version="1" comment="postgresql12-server-devel is &lt;12.14-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739774" version="1" comment="postgresql13 is &lt;13.10-3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739775" version="1" comment="postgresql13-contrib is &lt;13.10-3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739596" version="1" comment="postgresql13-docs is &lt;13.10-3.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739776" version="1" comment="postgresql13-plperl is &lt;13.10-3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739777" version="1" comment="postgresql13-plpython is &lt;13.10-3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739778" version="1" comment="postgresql13-pltcl is &lt;13.10-3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739779" version="1" comment="postgresql13-server is &lt;13.10-3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739780" version="1" comment="postgresql14 is &lt;14.7-3.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739781" version="1" comment="postgresql14-contrib is &lt;14.7-3.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739782" version="1" comment="postgresql14-devel is &lt;14.7-3.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739603" version="1" comment="postgresql14-docs is &lt;14.7-3.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739783" version="1" comment="postgresql14-llvmjit-devel is &lt;14.7-3.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739784" version="1" comment="postgresql14-plperl is &lt;14.7-3.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739785" version="1" comment="postgresql14-plpython is &lt;14.7-3.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739786" version="1" comment="postgresql14-pltcl is &lt;14.7-3.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739787" version="1" comment="postgresql14-server is &lt;14.7-3.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739788" version="1" comment="postgresql14-server-devel is &lt;14.7-3.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739762" version="1" comment="libecpg6 is &lt;15.2-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739789" version="1" comment="libecpg6-32bit is &lt;15.2-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739763" version="1" comment="libpq5 is &lt;15.2-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739754" version="1" comment="libpq5-32bit is &lt;15.2-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739790" version="1" comment="postgresql15 is &lt;15.2-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739791" version="1" comment="postgresql15-contrib is &lt;15.2-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739792" version="1" comment="postgresql15-devel is &lt;15.2-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739614" version="1" comment="postgresql15-docs is &lt;15.2-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739793" version="1" comment="postgresql15-plperl is &lt;15.2-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739794" version="1" comment="postgresql15-plpython is &lt;15.2-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739795" version="1" comment="postgresql15-pltcl is &lt;15.2-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739796" version="1" comment="postgresql15-server is &lt;15.2-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739797" version="1" comment="postgresql15-server-devel is &lt;15.2-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796754" version="1" comment="ghostscript is &lt;9.52-23.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796755" version="1" comment="ghostscript-devel is &lt;9.52-23.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796756" version="1" comment="ghostscript-x11 is &lt;9.52-23.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796749" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796750" version="1" comment="python3 is &lt;3.4.10-25.116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796751" version="1" comment="python3-base is &lt;3.4.10-25.116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796752" version="1" comment="python3-curses is &lt;3.4.10-25.116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796753" version="1" comment="python3-devel is &lt;3.4.10-25.116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799523" version="1" comment="libvpx1 is &lt;1.3.0-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798968" version="1" comment="gvim is &lt;9.0.1894-17.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798969" version="1" comment="vim is &lt;9.0.1894-17.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798945" version="1" comment="vim-data is &lt;9.0.1894-17.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798946" version="1" comment="vim-data-common is &lt;9.0.1894-17.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734231" version="1" comment="python3-py is &lt;1.8.1-11.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799688" version="1" comment="MozillaFirefox is &lt;115.3.1-112.185.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799672" version="1" comment="MozillaFirefox-devel is &lt;115.3.1-112.185.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799689" version="1" comment="MozillaFirefox-translations-common is &lt;115.3.1-112.185.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799803" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-28.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799804" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-28.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799805" version="1" comment="python is &lt;2.7.18-28.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799806" version="1" comment="python-32bit is &lt;2.7.18-28.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799807" version="1" comment="python-base is &lt;2.7.18-28.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799808" version="1" comment="python-base-32bit is &lt;2.7.18-28.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799809" version="1" comment="python-curses is &lt;2.7.18-28.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799810" version="1" comment="python-demo is &lt;2.7.18-28.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799811" version="1" comment="python-devel is &lt;2.7.18-28.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799812" version="1" comment="python-doc is &lt;2.7.18-28.105.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799813" version="1" comment="python-doc-pdf is &lt;2.7.18-28.105.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799814" version="1" comment="python-gdbm is &lt;2.7.18-28.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799815" version="1" comment="python-idle is &lt;2.7.18-28.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799816" version="1" comment="python-tk is &lt;2.7.18-28.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799817" version="1" comment="python-xml is &lt;2.7.18-28.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799870" version="1" comment="libXpm4 is &lt;3.5.11-6.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799871" version="1" comment="libXpm4-32bit is &lt;3.5.11-6.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738527" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.38.4-2.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738528" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.38.4-2.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738351" version="1" comment="libwebkit2gtk3-lang is &lt;2.38.4-2.126.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738529" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.38.4-2.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738530" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.38.4-2.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738531" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.38.4-2.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738532" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.38.4-2.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799519" version="1" comment="libpoppler-glib8 is &lt;0.43.0-16.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799520" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-16.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799521" version="1" comment="libpoppler60 is &lt;0.43.0-16.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799522" version="1" comment="poppler-tools is &lt;0.43.0-16.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799866" version="1" comment="libX11-6 is &lt;1.6.2-12.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799867" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799857" version="1" comment="libX11-data is &lt;1.6.2-12.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799868" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799869" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799197" version="1" comment="bind is &lt;9.9.9P1-63.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799198" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799199" version="1" comment="bind-doc is &lt;9.9.9P1-63.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799200" version="1" comment="bind-libs is &lt;9.9.9P1-63.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799201" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799202" version="1" comment="bind-utils is &lt;9.9.9P1-63.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800598" version="1" comment="python-urllib3 is &lt;1.22-7.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791542" version="1" comment="shadow is &lt;4.2.1-27.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009186983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800925" version="1" comment="libdcerpc-binding0 is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800926" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800927" version="1" comment="libdcerpc0 is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800928" version="1" comment="libdcerpc0-32bit is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800929" version="1" comment="libndr-krb5pac0 is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800930" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800931" version="1" comment="libndr-nbt0 is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800932" version="1" comment="libndr-nbt0-32bit is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800933" version="1" comment="libndr-standard0 is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800934" version="1" comment="libndr-standard0-32bit is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800935" version="1" comment="libndr0 is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800936" version="1" comment="libndr0-32bit is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800937" version="1" comment="libnetapi0 is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800938" version="1" comment="libnetapi0-32bit is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800939" version="1" comment="libsamba-credentials0 is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800940" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800941" version="1" comment="libsamba-errors0 is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800942" version="1" comment="libsamba-errors0-32bit is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800943" version="1" comment="libsamba-hostconfig0 is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800944" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800945" version="1" comment="libsamba-passdb0 is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800946" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800947" version="1" comment="libsamba-util0 is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800948" version="1" comment="libsamba-util0-32bit is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800949" version="1" comment="libsamdb0 is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800950" version="1" comment="libsamdb0-32bit is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800951" version="1" comment="libsmbclient0 is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800952" version="1" comment="libsmbclient0-32bit is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800953" version="1" comment="libsmbconf0 is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800954" version="1" comment="libsmbconf0-32bit is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800955" version="1" comment="libsmbldap0 is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800956" version="1" comment="libsmbldap0-32bit is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800957" version="1" comment="libtevent-util0 is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800958" version="1" comment="libtevent-util0-32bit is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800959" version="1" comment="libwbclient0 is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800960" version="1" comment="libwbclient0-32bit is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800961" version="1" comment="samba is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800962" version="1" comment="samba-client is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800963" version="1" comment="samba-client-32bit is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800964" version="1" comment="samba-doc is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800965" version="1" comment="samba-libs is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800966" version="1" comment="samba-libs-32bit is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800967" version="1" comment="samba-winbind is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800968" version="1" comment="samba-winbind-32bit is &lt;4.6.16+git.397.ee6c0d1a065-3.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800348" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.201.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800349" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.201.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800350" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.201.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800351" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.201.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800847" version="1" comment="python3-urllib3 is &lt;1.25.10-3.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801447" version="1" comment="opensc is &lt;0.13.0-3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800352" version="1" comment="libexiv2-12 is &lt;0.23-12.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801441" version="1" comment="grub2 is &lt;2.02-147.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801442" version="1" comment="grub2-i386-pc is &lt;2.02-147.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801443" version="1" comment="grub2-snapper-plugin is &lt;2.02-147.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801444" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02-147.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801445" version="1" comment="grub2-x86_64-efi is &lt;2.02-147.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801446" version="1" comment="grub2-x86_64-xen is &lt;2.02-147.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802433" version="1" comment="python-urllib3 is &lt;1.22-7.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802615" version="1" comment="stunnel is &lt;5.62-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802612" version="1" comment="libz1 is &lt;1.2.8-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802613" version="1" comment="libz1-32bit is &lt;1.2.8-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802614" version="1" comment="zlib-devel is &lt;1.2.8-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799098" version="1" comment="fwupdate is &lt;0.5-10.14.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799099" version="1" comment="fwupdate-efi is &lt;0.5-10.14.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799100" version="1" comment="libfwup0 is &lt;0.5-10.14.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802606" version="1" comment="xen is &lt;4.9.4_44-3.129.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802607" version="1" comment="xen-doc-html is &lt;4.9.4_44-3.129.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802608" version="1" comment="xen-libs is &lt;4.9.4_44-3.129.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802609" version="1" comment="xen-libs-32bit is &lt;4.9.4_44-3.129.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802610" version="1" comment="xen-tools is &lt;4.9.4_44-3.129.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802611" version="1" comment="xen-tools-domU is &lt;4.9.4_44-3.129.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802605" version="1" comment="libnghttp2-14 is &lt;1.39.2-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803217" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.42.1-2.155.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803218" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.42.1-2.155.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803178" version="1" comment="libwebkit2gtk3-lang is &lt;2.42.1-2.155.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803219" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.42.1-2.155.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803220" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.42.1-2.155.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803221" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.42.1-2.155.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803222" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.42.1-2.155.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738787" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.183.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738788" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.183.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738789" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.183.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738790" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.183.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802963" version="1" comment="MozillaFirefox is &lt;115.4.0-112.188.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802898" version="1" comment="MozillaFirefox-devel is &lt;115.4.0-112.188.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802964" version="1" comment="MozillaFirefox-translations-common is &lt;115.4.0-112.188.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802965" version="1" comment="vorbis-tools is &lt;1.4.0-27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802908" version="1" comment="vorbis-tools-lang is &lt;1.4.0-27.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803592" version="1" comment="python-urllib3 is &lt;1.22-7.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740122" version="1" comment="git-core is &lt;2.26.2-27.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740123" version="1" comment="git-cvs is &lt;2.26.2-27.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740124" version="1" comment="git-daemon is &lt;2.26.2-27.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740125" version="1" comment="git-email is &lt;2.26.2-27.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740126" version="1" comment="git-gui is &lt;2.26.2-27.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740127" version="1" comment="git-svn is &lt;2.26.2-27.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740128" version="1" comment="git-web is &lt;2.26.2-27.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740129" version="1" comment="gitk is &lt;2.26.2-27.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803948" version="1" comment="clamav is &lt;0.103.11-33.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803223" version="1" comment="libsndfile1 is &lt;1.0.25-36.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803224" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808010" version="1" comment="tomcat is &lt;8.0.53-29.72.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808011" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.72.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808012" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.72.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808013" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.72.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808014" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.72.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808015" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.72.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808016" version="1" comment="tomcat-lib is &lt;8.0.53-29.72.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808017" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.72.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808018" version="1" comment="tomcat-webapps is &lt;8.0.53-29.72.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807495" version="1" comment="apache2 is &lt;2.4.23-29.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807496" version="1" comment="apache2-doc is &lt;2.4.23-29.100.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807497" version="1" comment="apache2-example-pages is &lt;2.4.23-29.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807498" version="1" comment="apache2-prefork is &lt;2.4.23-29.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807499" version="1" comment="apache2-utils is &lt;2.4.23-29.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807500" version="1" comment="apache2-worker is &lt;2.4.23-29.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807491" version="1" comment="libpoppler-glib8 is &lt;0.43.0-16.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807492" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-16.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807493" version="1" comment="libpoppler60 is &lt;0.43.0-16.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807494" version="1" comment="poppler-tools is &lt;0.43.0-16.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808022" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807875" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-18.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808023" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808024" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808025" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808026" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808027" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808028" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808029" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808030" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808031" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808032" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738783" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.362-27.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738784" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.362-27.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738785" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.362-27.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738786" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.362-27.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808019" version="1" comment="libtiff5 is &lt;4.0.9-44.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808020" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808021" version="1" comment="tiff is &lt;4.0.9-44.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808709" version="1" comment="squid is &lt;4.17-30.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739764" version="1" comment="tar is &lt;1.27.1-15.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739586" version="1" comment="tar-lang is &lt;1.27.1-15.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810222" version="1" comment="postgresql14 is &lt;14.10-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810223" version="1" comment="postgresql14-contrib is &lt;14.10-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810224" version="1" comment="postgresql14-devel is &lt;14.10-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810137" version="1" comment="postgresql14-docs is &lt;14.10-3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810225" version="1" comment="postgresql14-llvmjit-devel is &lt;14.10-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810226" version="1" comment="postgresql14-plperl is &lt;14.10-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810227" version="1" comment="postgresql14-plpython is &lt;14.10-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810228" version="1" comment="postgresql14-pltcl is &lt;14.10-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810229" version="1" comment="postgresql14-server is &lt;14.10-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810230" version="1" comment="postgresql14-server-devel is &lt;14.10-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808708" version="1" comment="squashfs is &lt;4.6.1-8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810231" version="1" comment="libecpg6 is &lt;16.1-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810232" version="1" comment="libecpg6-32bit is &lt;16.1-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810233" version="1" comment="libpq5 is &lt;16.1-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810234" version="1" comment="libpq5-32bit is &lt;16.1-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810146" version="1" comment="postgresql is &lt;16-4.23.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810147" version="1" comment="postgresql-contrib is &lt;16-4.23.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810115" version="1" comment="postgresql-devel is &lt;16-4.23.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810148" version="1" comment="postgresql-docs is &lt;16-4.23.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810149" version="1" comment="postgresql-plperl is &lt;16-4.23.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810150" version="1" comment="postgresql-plpython is &lt;16-4.23.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810151" version="1" comment="postgresql-pltcl is &lt;16-4.23.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810152" version="1" comment="postgresql-server is &lt;16-4.23.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810116" version="1" comment="postgresql-server-devel is &lt;16-4.23.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810235" version="1" comment="postgresql15 is &lt;15.5-3.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810236" version="1" comment="postgresql15-contrib is &lt;15.5-3.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810237" version="1" comment="postgresql15-devel is &lt;15.5-3.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810155" version="1" comment="postgresql15-docs is &lt;15.5-3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810238" version="1" comment="postgresql15-plperl is &lt;15.5-3.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810239" version="1" comment="postgresql15-plpython is &lt;15.5-3.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810240" version="1" comment="postgresql15-pltcl is &lt;15.5-3.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810241" version="1" comment="postgresql15-server is &lt;15.5-3.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810242" version="1" comment="postgresql15-server-devel is &lt;15.5-3.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810243" version="1" comment="postgresql16 is &lt;16.1-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810244" version="1" comment="postgresql16-contrib is &lt;16.1-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810245" version="1" comment="postgresql16-devel is &lt;16.1-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810162" version="1" comment="postgresql16-docs is &lt;16.1-3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810246" version="1" comment="postgresql16-plperl is &lt;16.1-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810247" version="1" comment="postgresql16-plpython is &lt;16.1-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810248" version="1" comment="postgresql16-pltcl is &lt;16.1-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810249" version="1" comment="postgresql16-server is &lt;16.1-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810250" version="1" comment="postgresql16-server-devel is &lt;16.1-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810213" version="1" comment="postgresql12 is &lt;12.17-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810214" version="1" comment="postgresql12-contrib is &lt;12.17-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810215" version="1" comment="postgresql12-devel is &lt;12.17-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810130" version="1" comment="postgresql12-docs is &lt;12.17-3.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810216" version="1" comment="postgresql12-llvmjit-devel is &lt;12.17-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810217" version="1" comment="postgresql12-plperl is &lt;12.17-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810218" version="1" comment="postgresql12-plpython is &lt;12.17-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810219" version="1" comment="postgresql12-pltcl is &lt;12.17-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810220" version="1" comment="postgresql12-server is &lt;12.17-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810221" version="1" comment="postgresql12-server-devel is &lt;12.17-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810207" version="1" comment="postgresql13 is &lt;13.13-3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810208" version="1" comment="postgresql13-contrib is &lt;13.13-3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810123" version="1" comment="postgresql13-docs is &lt;13.13-3.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810209" version="1" comment="postgresql13-plperl is &lt;13.13-3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810210" version="1" comment="postgresql13-plpython is &lt;13.13-3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810211" version="1" comment="postgresql13-pltcl is &lt;13.13-3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810212" version="1" comment="postgresql13-server is &lt;13.13-3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808964" version="1" comment="libblkid1 is &lt;2.29.2-3.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808965" version="1" comment="libblkid1-32bit is &lt;2.29.2-3.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808966" version="1" comment="libfdisk1 is &lt;2.29.2-3.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808967" version="1" comment="libmount1 is &lt;2.29.2-3.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808968" version="1" comment="libmount1-32bit is &lt;2.29.2-3.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808969" version="1" comment="libsmartcols1 is &lt;2.29.2-3.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808970" version="1" comment="libuuid1 is &lt;2.29.2-3.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808971" version="1" comment="libuuid1-32bit is &lt;2.29.2-3.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808972" version="1" comment="python-libmount is &lt;2.29.2-3.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808973" version="1" comment="util-linux is &lt;2.29.2-3.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808974" version="1" comment="util-linux-lang is &lt;2.29.2-3.39.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808975" version="1" comment="util-linux-systemd is &lt;2.29.2-3.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808976" version="1" comment="uuidd is &lt;2.29.2-3.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810321" version="1" comment="ucode-intel is &lt;20231113-13.115.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803499" version="1" comment="python3-urllib3 is &lt;1.25.10-3.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809691" version="1" comment="libasan8 is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809692" version="1" comment="libasan8-32bit is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809693" version="1" comment="libatomic1 is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809694" version="1" comment="libatomic1-32bit is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809695" version="1" comment="libgcc_s1 is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809696" version="1" comment="libgcc_s1-32bit is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809697" version="1" comment="libgfortran5 is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809698" version="1" comment="libgfortran5-32bit is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809699" version="1" comment="libgomp1 is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809700" version="1" comment="libgomp1-32bit is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809701" version="1" comment="libhwasan0 is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809702" version="1" comment="libitm1 is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809703" version="1" comment="libitm1-32bit is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809704" version="1" comment="liblsan0 is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809705" version="1" comment="libobjc4 is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809706" version="1" comment="libobjc4-32bit is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809707" version="1" comment="libquadmath0 is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809668" version="1" comment="libquadmath0-32bit is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809708" version="1" comment="libstdc++6 is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809709" version="1" comment="libstdc++6-32bit is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809710" version="1" comment="libstdc++6-locale is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809711" version="1" comment="libstdc++6-pp is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809712" version="1" comment="libstdc++6-pp-32bit is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809713" version="1" comment="libtsan2 is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809714" version="1" comment="libubsan1 is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809715" version="1" comment="libubsan1-32bit is &lt;13.2.1+git7813-1.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810694" version="1" comment="ucode-intel is &lt;20231114-13.118.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810684" version="1" comment="xen is &lt;4.9.4_46-3.132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810685" version="1" comment="xen-doc-html is &lt;4.9.4_46-3.132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810686" version="1" comment="xen-libs is &lt;4.9.4_46-3.132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810687" version="1" comment="xen-libs-32bit is &lt;4.9.4_46-3.132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810688" version="1" comment="xen-tools is &lt;4.9.4_46-3.132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810689" version="1" comment="xen-tools-domU is &lt;4.9.4_46-3.132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803937" version="1" comment="avahi is &lt;0.6.32-32.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803888" version="1" comment="avahi-lang is &lt;0.6.32-32.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803938" version="1" comment="avahi-utils is &lt;0.6.32-32.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803939" version="1" comment="libavahi-client3 is &lt;0.6.32-32.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803940" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-32.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803941" version="1" comment="libavahi-common3 is &lt;0.6.32-32.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803942" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-32.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803943" version="1" comment="libavahi-core7 is &lt;0.6.32-32.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803944" version="1" comment="libavahi-glib1 is &lt;0.6.32-32.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803945" version="1" comment="libavahi-glib1-32bit is &lt;0.6.32-32.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803946" version="1" comment="libdns_sd is &lt;0.6.32-32.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803947" version="1" comment="libdns_sd-32bit is &lt;0.6.32-32.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810401" version="1" comment="libxml2-2 is &lt;2.9.4-46.68.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810402" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.68.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810398" version="1" comment="libxml2-doc is &lt;2.9.4-46.68.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810403" version="1" comment="libxml2-tools is &lt;2.9.4-46.68.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810404" version="1" comment="python-libxml2 is &lt;2.9.4-46.68.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810690" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.392-27.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810691" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.392-27.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810692" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.392-27.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810693" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.392-27.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740773" version="1" comment="clamav is &lt;0.103.8-33.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812850" version="1" comment="squid is &lt;4.17-30.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810968" version="1" comment="MozillaFirefox is &lt;115.5.0-112.191.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810958" version="1" comment="MozillaFirefox-devel is &lt;115.5.0-112.191.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810969" version="1" comment="MozillaFirefox-translations-common is &lt;115.5.0-112.191.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811879" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-13.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811880" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-13.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740108" version="1" comment="ucode-intel is &lt;20230214-13.104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812848" version="1" comment="gvim is &lt;9.0.2103-17.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812849" version="1" comment="vim is &lt;9.0.2103-17.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812577" version="1" comment="vim-data is &lt;9.0.2103-17.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812578" version="1" comment="vim-data-common is &lt;9.0.2103-17.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812842" version="1" comment="libsqlite3-0 is &lt;3.44.0-9.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812843" version="1" comment="libsqlite3-0-32bit is &lt;3.44.0-9.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812844" version="1" comment="sqlite3 is &lt;3.44.0-9.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812845" version="1" comment="sqlite3-devel is &lt;3.44.0-9.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812846" version="1" comment="sqlite3-tcl is &lt;3.44.0-9.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812831" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-18.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812558" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-18.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812832" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-18.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812833" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-18.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812834" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-18.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812835" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-18.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812836" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-18.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812837" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-18.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812838" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-18.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812839" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-18.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812840" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-18.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812841" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-18.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811877" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr8.15-30.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811732" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr8.15-30.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811878" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr8.15-30.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811733" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr8.15-30.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813574" version="1" comment="libqt4 is &lt;4.8.7-8.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813575" version="1" comment="libqt4-32bit is &lt;4.8.7-8.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813576" version="1" comment="libqt4-qt3support is &lt;4.8.7-8.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813577" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.7-8.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813578" version="1" comment="libqt4-sql is &lt;4.8.7-8.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813579" version="1" comment="libqt4-sql-32bit is &lt;4.8.7-8.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813580" version="1" comment="libqt4-sql-mysql is &lt;4.8.7-8.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813581" version="1" comment="libqt4-sql-sqlite is &lt;4.8.7-8.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813582" version="1" comment="libqt4-x11 is &lt;4.8.7-8.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813583" version="1" comment="libqt4-x11-32bit is &lt;4.8.7-8.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813584" version="1" comment="qt4-x11-tools is &lt;4.8.7-8.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814432" version="1" comment="squid is &lt;4.17-30.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814431" version="1" comment="squid is &lt;3.5.21-26.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813853" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.42.2-2.158.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813854" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.42.2-2.158.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813836" version="1" comment="libwebkit2gtk3-lang is &lt;2.42.2-2.158.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813855" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.42.2-2.158.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813856" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.42.2-2.158.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813857" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.42.2-2.158.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813858" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.42.2-2.158.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813364" version="1" comment="traceroute is &lt;2.0.19-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740118" version="1" comment="MozillaFirefox is &lt;102.8.0-112.150.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740119" version="1" comment="MozillaFirefox-devel is &lt;102.8.0-112.150.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740120" version="1" comment="MozillaFirefox-translations-common is &lt;102.8.0-112.150.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740765" version="1" comment="libfreebl3 is &lt;3.79.4-58.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740749" version="1" comment="libfreebl3-32bit is &lt;3.79.4-58.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740766" version="1" comment="libfreebl3-hmac is &lt;3.79.4-58.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740751" version="1" comment="libfreebl3-hmac-32bit is &lt;3.79.4-58.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740767" version="1" comment="libsoftokn3 is &lt;3.79.4-58.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740753" version="1" comment="libsoftokn3-32bit is &lt;3.79.4-58.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740768" version="1" comment="libsoftokn3-hmac is &lt;3.79.4-58.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740755" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.79.4-58.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740769" version="1" comment="mozilla-nss is &lt;3.79.4-58.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740757" version="1" comment="mozilla-nss-32bit is &lt;3.79.4-58.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740770" version="1" comment="mozilla-nss-certs is &lt;3.79.4-58.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740759" version="1" comment="mozilla-nss-certs-32bit is &lt;3.79.4-58.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740774" version="1" comment="mozilla-nss-devel is &lt;3.79.4-58.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740771" version="1" comment="mozilla-nss-sysinit is &lt;3.79.4-58.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740762" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.79.4-58.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740772" version="1" comment="mozilla-nss-tools is &lt;3.79.4-58.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815619" version="1" comment="squid is &lt;4.17-30.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815616" version="1" comment="libtiff5 is &lt;4.0.9-44.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815617" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815618" version="1" comment="tiff is &lt;4.0.9-44.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815326" version="1" comment="squid is &lt;3.5.21-26.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815610" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.42.3-2.161.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815611" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.42.3-2.161.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815528" version="1" comment="libwebkit2gtk3-lang is &lt;2.42.3-2.161.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815612" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.42.3-2.161.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815613" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.42.3-2.161.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815614" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.42.3-2.161.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815615" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.42.3-2.161.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812847" version="1" comment="xrdp is &lt;0.9.0~git.1456906198.f422461-21.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816325" version="1" comment="libncurses5 is &lt;5.9-85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816326" version="1" comment="libncurses5-32bit is &lt;5.9-85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816327" version="1" comment="libncurses6 is &lt;5.9-85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816328" version="1" comment="libncurses6-32bit is &lt;5.9-85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816329" version="1" comment="ncurses-devel is &lt;5.9-85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816330" version="1" comment="ncurses-devel-32bit is &lt;5.9-85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816331" version="1" comment="ncurses-utils is &lt;5.9-85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816332" version="1" comment="tack is &lt;5.9-85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816333" version="1" comment="terminfo is &lt;5.9-85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816334" version="1" comment="terminfo-base is &lt;5.9-85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817166" version="1" comment="openssh is &lt;7.2p2-74.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817167" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817168" version="1" comment="openssh-fips is &lt;7.2p2-74.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817169" version="1" comment="openssh-helpers is &lt;7.2p2-74.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817183" version="1" comment="suse-module-tools is &lt;12.6.2-27.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817170" version="1" comment="MozillaFirefox is &lt;115.6.0-112.194.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816982" version="1" comment="MozillaFirefox-devel is &lt;115.6.0-112.194.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817171" version="1" comment="MozillaFirefox-translations-common is &lt;115.6.0-112.194.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816322" version="1" comment="ghostscript is &lt;9.52-23.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816323" version="1" comment="ghostscript-devel is &lt;9.52-23.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816324" version="1" comment="ghostscript-x11 is &lt;9.52-23.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009741560" version="1" comment="libpoppler-glib8 is &lt;0.43.0-16.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009741561" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-16.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009741562" version="1" comment="libpoppler60 is &lt;0.43.0-16.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009741563" version="1" comment="poppler-tools is &lt;0.43.0-16.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815322" version="1" comment="libpoppler-glib8 is &lt;0.43.0-16.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815323" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-16.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815324" version="1" comment="libpoppler60 is &lt;0.43.0-16.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815325" version="1" comment="poppler-tools is &lt;0.43.0-16.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817819" version="1" comment="ppp is &lt;2.4.7-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817816" version="1" comment="libjbig2 is &lt;2.0-14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817817" version="1" comment="libjbig2-32bit is &lt;2.0-14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742185" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-6.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742186" version="1" comment="python36 is &lt;3.6.15-6.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742187" version="1" comment="python36-base is &lt;3.6.15-6.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742188" version="1" comment="python36-curses is &lt;3.6.15-6.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742189" version="1" comment="python36-dbm is &lt;3.6.15-6.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742190" version="1" comment="python36-devel is &lt;3.6.15-6.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742191" version="1" comment="python36-idle is &lt;3.6.15-6.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742192" version="1" comment="python36-testsuite is &lt;3.6.15-6.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742193" version="1" comment="python36-tk is &lt;3.6.15-6.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742194" version="1" comment="python36-tools is &lt;3.6.15-6.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817172" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-18.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816993" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-18.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817173" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-18.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817174" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-18.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817175" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-18.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817176" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-18.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817177" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-18.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817178" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-18.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817179" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-18.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817180" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-18.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817181" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-18.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817182" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-18.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817974" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.42.4-2.164.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817975" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.42.4-2.164.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817969" version="1" comment="libwebkit2gtk3-lang is &lt;2.42.4-2.164.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817976" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.42.4-2.164.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817977" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.42.4-2.164.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817978" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.42.4-2.164.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817979" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.42.4-2.164.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818216" version="1" comment="gstreamer is &lt;1.8.3-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818166" version="1" comment="gstreamer-lang is &lt;1.8.3-10.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818217" version="1" comment="gstreamer-utils is &lt;1.8.3-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818218" version="1" comment="libgstreamer-1_0-0 is &lt;1.8.3-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818219" version="1" comment="libgstreamer-1_0-0-32bit is &lt;1.8.3-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818220" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.8.3-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742181" version="1" comment="libxslt-tools is &lt;1.1.28-17.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742182" version="1" comment="libxslt1 is &lt;1.1.28-17.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742179" version="1" comment="libxslt1-32bit is &lt;1.1.28-17.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742183" version="1" comment="xterm is &lt;308-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713914" version="1" comment="monitoring-plugins-nrpe is &lt;2.15-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713915" version="1" comment="nrpe is &lt;2.15-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009741841" version="1" comment="emacs is &lt;24.3-25.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009741787" version="1" comment="emacs-el is &lt;24.3-25.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009741788" version="1" comment="emacs-info is &lt;24.3-25.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009741842" version="1" comment="emacs-nox is &lt;24.3-25.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009741843" version="1" comment="emacs-x11 is &lt;24.3-25.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009741844" version="1" comment="etags is &lt;24.3-25.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009731162" version="1" comment="libtiff5 is &lt;4.0.9-44.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009731163" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009731164" version="1" comment="tiff is &lt;4.0.9-44.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730982" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.38.3-2.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730983" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.38.3-2.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730972" version="1" comment="libwebkit2gtk3-lang is &lt;2.38.3-2.123.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730984" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.38.3-2.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730985" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.38.3-2.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730986" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.38.3-2.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730987" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.38.3-2.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743490" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-6.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743491" version="1" comment="python36 is &lt;3.6.15-6.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743492" version="1" comment="python36-base is &lt;3.6.15-6.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743493" version="1" comment="python36-curses is &lt;3.6.15-6.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743494" version="1" comment="python36-dbm is &lt;3.6.15-6.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743495" version="1" comment="python36-devel is &lt;3.6.15-6.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743496" version="1" comment="python36-idle is &lt;3.6.15-6.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743497" version="1" comment="python36-testsuite is &lt;3.6.15-6.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743498" version="1" comment="python36-tk is &lt;3.6.15-6.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743499" version="1" comment="python36-tools is &lt;3.6.15-6.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009731997" version="1" comment="python36-setuptools is &lt;44.1.1-9.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009731998" version="1" comment="python36-setuptools-test is &lt;44.1.1-9.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009731999" version="1" comment="python36-setuptools-wheel is &lt;44.1.1-9.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743488" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743489" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009731652" version="1" comment="w3m is &lt;0.5.3.git20161120-161.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743191" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743192" version="1" comment="python3 is &lt;3.4.10-25.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743193" version="1" comment="python3-base is &lt;3.4.10-25.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743194" version="1" comment="python3-curses is &lt;3.4.10-25.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743202" version="1" comment="python3-devel is &lt;3.4.10-25.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743203" version="1" comment="libX11-6 is &lt;1.6.2-12.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743204" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743133" version="1" comment="libX11-data is &lt;1.6.2-12.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743205" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743206" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740675" version="1" comment="python3-py is &lt;1.8.1-11.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743195" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743196" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743197" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743198" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743199" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743200" version="1" comment="openssl is &lt;1.0.2j-60.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743201" version="1" comment="openssl-doc is &lt;1.0.2j-60.86.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742918" version="1" comment="tomcat is &lt;8.0.53-29.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742919" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742920" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742921" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742922" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742923" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742924" version="1" comment="tomcat-lib is &lt;8.0.53-29.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742925" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742926" version="1" comment="tomcat-webapps is &lt;8.0.53-29.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743908" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-122.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743909" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-122.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743734" version="1" comment="perl-Net-Server is &lt;2.007-5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009731165" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009731166" version="1" comment="python3 is &lt;3.4.10-25.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009731167" version="1" comment="python3-base is &lt;3.4.10-25.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009731168" version="1" comment="python3-curses is &lt;3.4.10-25.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744458" version="1" comment="gvim is &lt;9.0.1386-17.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744459" version="1" comment="vim is &lt;9.0.1386-17.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744353" version="1" comment="vim-data is &lt;9.0.1386-17.15.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744354" version="1" comment="vim-data-common is &lt;9.0.1386-17.15.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744670" version="1" comment="MozillaFirefox is &lt;102.9.0-112.153.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744671" version="1" comment="MozillaFirefox-devel is &lt;102.9.0-112.153.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744672" version="1" comment="MozillaFirefox-translations-common is &lt;102.9.0-112.153.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744003" version="1" comment="qemu is &lt;2.9.1-43.65.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744004" version="1" comment="qemu-block-curl is &lt;2.9.1-43.65.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744005" version="1" comment="qemu-block-iscsi is &lt;2.9.1-43.65.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744006" version="1" comment="qemu-block-rbd is &lt;2.9.1-43.65.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744007" version="1" comment="qemu-block-ssh is &lt;2.9.1-43.65.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744008" version="1" comment="qemu-guest-agent is &lt;2.9.1-43.65.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744009" version="1" comment="qemu-ipxe is &lt;1.0.0+-43.65.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744010" version="1" comment="qemu-kvm is &lt;2.9.1-43.65.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744011" version="1" comment="qemu-lang is &lt;2.9.1-43.65.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744012" version="1" comment="qemu-seabios is &lt;1.10.2_0_g5f4c7b1-43.65.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744013" version="1" comment="qemu-sgabios is &lt;8-43.65.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744014" version="1" comment="qemu-tools is &lt;2.9.1-43.65.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744015" version="1" comment="qemu-vgabios is &lt;1.10.2_0_g5f4c7b1-43.65.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744016" version="1" comment="qemu-x86 is &lt;2.9.1-43.65.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009731149" version="1" comment="python-future is &lt;0.15.2-3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744899" version="1" comment="apache2 is &lt;2.4.23-29.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744894" version="1" comment="apache2-doc is &lt;2.4.23-29.97.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744900" version="1" comment="apache2-example-pages is &lt;2.4.23-29.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744901" version="1" comment="apache2-prefork is &lt;2.4.23-29.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744902" version="1" comment="apache2-utils is &lt;2.4.23-29.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744903" version="1" comment="apache2-worker is &lt;2.4.23-29.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747457" version="1" comment="curl is &lt;7.37.0-37.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747458" version="1" comment="libcurl4 is &lt;7.37.0-37.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747459" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009741564" version="1" comment="python-cffi is &lt;1.11.5-5.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009741565" version="1" comment="python3-cffi is &lt;1.11.5-5.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747961" version="1" comment="xen is &lt;4.9.4_38-3.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747962" version="1" comment="xen-doc-html is &lt;4.9.4_38-3.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747963" version="1" comment="xen-libs is &lt;4.9.4_38-3.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747964" version="1" comment="xen-libs-32bit is &lt;4.9.4_38-3.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747965" version="1" comment="xen-tools is &lt;4.9.4_38-3.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747966" version="1" comment="xen-tools-domU is &lt;4.9.4_38-3.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744907" version="1" comment="dpdk is &lt;16.11.9-11.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744908" version="1" comment="dpdk-kmp-default is &lt;16.11.9_k4.4.140_96.112.TDC-11.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744909" version="1" comment="dpdk-tools is &lt;16.11.9-11.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744904" version="1" comment="dpdk is &lt;16.11.9-8.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744905" version="1" comment="dpdk-kmp-default is &lt;16.11.9_k4.4.180_94.185-8.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744906" version="1" comment="dpdk-tools is &lt;16.11.9-8.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742184" version="1" comment="libplist3 is &lt;1.12-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747410" version="1" comment="grub2 is &lt;2.02-144.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747411" version="1" comment="grub2-i386-pc is &lt;2.02-144.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747412" version="1" comment="grub2-snapper-plugin is &lt;2.02-144.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747413" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02-144.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747414" version="1" comment="grub2-x86_64-efi is &lt;2.02-144.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747415" version="1" comment="grub2-x86_64-xen is &lt;2.02-144.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009731786" version="1" comment="python-setuptools is &lt;40.6.2-4.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009731784" version="1" comment="python3-setuptools is &lt;40.6.2-4.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852256" version="1" comment="MozillaFirefox is &lt;115.9.1-112.206.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852161" version="1" comment="MozillaFirefox-devel is &lt;115.9.1-112.206.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852257" version="1" comment="MozillaFirefox-translations-common is &lt;115.9.1-112.206.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852258" version="1" comment="avahi is &lt;0.6.32-32.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852207" version="1" comment="avahi-lang is &lt;0.6.32-32.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852259" version="1" comment="avahi-utils is &lt;0.6.32-32.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852260" version="1" comment="libavahi-client3 is &lt;0.6.32-32.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852261" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-32.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852262" version="1" comment="libavahi-common3 is &lt;0.6.32-32.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852263" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-32.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852264" version="1" comment="libavahi-core7 is &lt;0.6.32-32.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852265" version="1" comment="libavahi-glib1 is &lt;0.6.32-32.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852266" version="1" comment="libavahi-glib1-32bit is &lt;0.6.32-32.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852267" version="1" comment="libdns_sd is &lt;0.6.32-32.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852268" version="1" comment="libdns_sd-32bit is &lt;0.6.32-32.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853184" version="1" comment="squid is &lt;4.17-30.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853185" version="1" comment="xen is &lt;4.9.4_50-3.138.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853186" version="1" comment="xen-doc-html is &lt;4.9.4_50-3.138.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853187" version="1" comment="xen-libs is &lt;4.9.4_50-3.138.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853188" version="1" comment="xen-libs-32bit is &lt;4.9.4_50-3.138.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853189" version="1" comment="xen-tools is &lt;4.9.4_50-3.138.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853190" version="1" comment="xen-tools-domU is &lt;4.9.4_50-3.138.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853191" version="1" comment="libvirt is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853192" version="1" comment="libvirt-admin is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853193" version="1" comment="libvirt-client is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853194" version="1" comment="libvirt-daemon is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853195" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853196" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853197" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853198" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853199" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853200" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853201" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853202" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853203" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853204" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853205" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853206" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853207" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853208" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853209" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853210" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853211" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853212" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853213" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853214" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853215" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853216" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853217" version="1" comment="libvirt-doc is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853218" version="1" comment="libvirt-libs is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853219" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853220" version="1" comment="libvirt-nss is &lt;3.3.0-5.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853543" version="1" comment="libncurses5 is &lt;5.9-88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853544" version="1" comment="libncurses5-32bit is &lt;5.9-88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853545" version="1" comment="libncurses6 is &lt;5.9-88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853546" version="1" comment="libncurses6-32bit is &lt;5.9-88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853547" version="1" comment="ncurses-devel is &lt;5.9-88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853548" version="1" comment="ncurses-devel-32bit is &lt;5.9-88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853549" version="1" comment="ncurses-utils is &lt;5.9-88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853550" version="1" comment="tack is &lt;5.9-88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853551" version="1" comment="terminfo is &lt;5.9-88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853552" version="1" comment="terminfo-base is &lt;5.9-88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853553" version="1" comment="libcares2 is &lt;1.9.1-9.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853554" version="1" comment="postfix is &lt;3.2.10-3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853524" version="1" comment="postfix-doc is &lt;3.2.10-3.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853555" version="1" comment="postfix-mysql is &lt;3.2.10-3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853556" version="1" comment="libnghttp2-14 is &lt;1.39.2-3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853972" version="1" comment="less is &lt;458-7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854017" version="1" comment="apache2-mod_jk is &lt;1.2.49-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854646" version="1" comment="libblkid1 is &lt;2.29.2-3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854647" version="1" comment="libblkid1-32bit is &lt;2.29.2-3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854648" version="1" comment="libfdisk1 is &lt;2.29.2-3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854649" version="1" comment="libmount1 is &lt;2.29.2-3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854650" version="1" comment="libmount1-32bit is &lt;2.29.2-3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854651" version="1" comment="libsmartcols1 is &lt;2.29.2-3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854652" version="1" comment="libuuid1 is &lt;2.29.2-3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854653" version="1" comment="libuuid1-32bit is &lt;2.29.2-3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854654" version="1" comment="python-libmount is &lt;2.29.2-3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854655" version="1" comment="util-linux is &lt;2.29.2-3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854656" version="1" comment="util-linux-lang is &lt;2.29.2-3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854657" version="1" comment="util-linux-systemd is &lt;2.29.2-3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854658" version="1" comment="uuidd is &lt;2.29.2-3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854814" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.44.0-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854815" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.44.0-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854806" version="1" comment="libwebkit2gtk3-lang is &lt;2.44.0-4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854816" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.44.0-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854817" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.44.0-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854818" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.44.0-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854819" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.44.0-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854820" version="1" comment="libkpathsea6 is &lt;6.2.0dev-22.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855234" version="1" comment="krb5 is &lt;1.12.5-40.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855235" version="1" comment="krb5-32bit is &lt;1.12.5-40.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855236" version="1" comment="krb5-client is &lt;1.12.5-40.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855237" version="1" comment="krb5-doc is &lt;1.12.5-40.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855238" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855239" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855240" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855241" version="1" comment="krb5-server is &lt;1.12.5-40.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855242" version="1" comment="emacs is &lt;24.3-25.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855206" version="1" comment="emacs-el is &lt;24.3-25.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855207" version="1" comment="emacs-info is &lt;24.3-25.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855243" version="1" comment="emacs-nox is &lt;24.3-25.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855244" version="1" comment="emacs-x11 is &lt;24.3-25.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855245" version="1" comment="etags is &lt;24.3-25.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855246" version="1" comment="MozillaFirefox is &lt;115.10.0-112.209.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855204" version="1" comment="MozillaFirefox-devel is &lt;115.10.0-112.209.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855247" version="1" comment="MozillaFirefox-translations-common is &lt;115.10.0-112.209.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855500" version="1" comment="libwireshark9 is &lt;2.4.16-48.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855501" version="1" comment="libwiretap7 is &lt;2.4.16-48.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855502" version="1" comment="libwscodecs1 is &lt;2.4.16-48.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855503" version="1" comment="libwsutil8 is &lt;2.4.16-48.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855504" version="1" comment="wireshark is &lt;2.4.16-48.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855505" version="1" comment="wireshark-gtk is &lt;2.4.16-48.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818887" version="1" comment="pam is &lt;1.1.8-24.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818888" version="1" comment="pam-32bit is &lt;1.1.8-24.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818884" version="1" comment="pam-doc is &lt;1.1.8-24.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818889" version="1" comment="pam-extra is &lt;1.1.8-24.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818890" version="1" comment="pam-extra-32bit is &lt;1.1.8-24.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856044" version="1" comment="libjasper1 is &lt;1.900.14-195.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856045" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817818" version="1" comment="w3m is &lt;0.5.3.git20161120-161.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857604" version="1" comment="monitoring-plugins-nrpe is &lt;2.15-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857605" version="1" comment="nrpe is &lt;2.15-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856165" version="1" comment="python-idna is &lt;2.5-3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856166" version="1" comment="python3-idna is &lt;2.5-3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858152" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.412-27.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858153" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.412-27.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858154" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.412-27.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858155" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.412-27.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858310" version="1" comment="shim is &lt;15.8-25.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859155" version="1" comment="avahi is &lt;0.6.32-32.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859046" version="1" comment="avahi-lang is &lt;0.6.32-32.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859156" version="1" comment="avahi-utils is &lt;0.6.32-32.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859157" version="1" comment="libavahi-client3 is &lt;0.6.32-32.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859158" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-32.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859159" version="1" comment="libavahi-common3 is &lt;0.6.32-32.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859160" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-32.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859161" version="1" comment="libavahi-core7 is &lt;0.6.32-32.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859162" version="1" comment="libavahi-glib1 is &lt;0.6.32-32.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859163" version="1" comment="libavahi-glib1-32bit is &lt;0.6.32-32.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859164" version="1" comment="libdns_sd is &lt;0.6.32-32.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859165" version="1" comment="libdns_sd-32bit is &lt;0.6.32-32.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859166" version="1" comment="golang-github-prometheus-node_exporter is &lt;1.7.0-1.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859318" version="1" comment="xen is &lt;4.9.4_52-3.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859319" version="1" comment="xen-doc-html is &lt;4.9.4_52-3.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859320" version="1" comment="xen-libs is &lt;4.9.4_52-3.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859321" version="1" comment="xen-libs-32bit is &lt;4.9.4_52-3.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859322" version="1" comment="xen-tools is &lt;4.9.4_52-3.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859323" version="1" comment="xen-tools-domU is &lt;4.9.4_52-3.141.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859324" version="1" comment="less is &lt;458-7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859547" version="1" comment="libbasicobjects0 is &lt;0.1.1-25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859548" version="1" comment="libcollection4 is &lt;0.7.0-25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859549" version="1" comment="libdhash1 is &lt;0.4.3-25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859550" version="1" comment="libini_config5 is &lt;1.2.0-25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859551" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859552" version="1" comment="libpath_utils1 is &lt;0.2.1-25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859553" version="1" comment="libref_array1 is &lt;0.1.5-25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859554" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859555" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-34.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859556" version="1" comment="libsss_sudo is &lt;1.13.4-34.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859557" version="1" comment="python-sssd-config is &lt;1.13.4-34.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859558" version="1" comment="sssd is &lt;1.13.4-34.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859559" version="1" comment="sssd-32bit is &lt;1.13.4-34.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859560" version="1" comment="sssd-ad is &lt;1.13.4-34.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859561" version="1" comment="sssd-ipa is &lt;1.13.4-34.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859562" version="1" comment="sssd-krb5 is &lt;1.13.4-34.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859563" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859564" version="1" comment="sssd-ldap is &lt;1.13.4-34.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859565" version="1" comment="sssd-proxy is &lt;1.13.4-34.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859566" version="1" comment="sssd-tools is &lt;1.13.4-34.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859884" version="1" comment="ghostscript is &lt;9.52-23.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859885" version="1" comment="ghostscript-devel is &lt;9.52-23.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859886" version="1" comment="ghostscript-x11 is &lt;9.52-23.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859887" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859888" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860531" version="1" comment="giflib-progs is &lt;5.0.5-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860532" version="1" comment="libgif6 is &lt;5.0.5-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860533" version="1" comment="libgif6-32bit is &lt;5.0.5-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860534" version="1" comment="opensc is &lt;0.13.0-3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860509" version="1" comment="python-pyOpenSSL is &lt;17.1.0-4.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860510" version="1" comment="python3-pyOpenSSL is &lt;17.1.0-4.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860535" version="1" comment="apache2 is &lt;2.4.23-29.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860536" version="1" comment="apache2-doc is &lt;2.4.23-29.103.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860537" version="1" comment="apache2-example-pages is &lt;2.4.23-29.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860538" version="1" comment="apache2-prefork is &lt;2.4.23-29.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860539" version="1" comment="apache2-utils is &lt;2.4.23-29.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860540" version="1" comment="apache2-worker is &lt;2.4.23-29.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860987" version="1" comment="sysuser-shadow is &lt;2.0-1.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860988" version="1" comment="sysuser-tools is &lt;2.0-1.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861338" version="1" comment="libecpg6 is &lt;16.3-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861339" version="1" comment="libecpg6-32bit is &lt;16.3-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861340" version="1" comment="libpq5 is &lt;16.3-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861341" version="1" comment="libpq5-32bit is &lt;16.3-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861342" version="1" comment="postgresql16 is &lt;16.3-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861343" version="1" comment="postgresql16-contrib is &lt;16.3-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861344" version="1" comment="postgresql16-devel is &lt;16.3-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861319" version="1" comment="postgresql16-docs is &lt;16.3-3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861345" version="1" comment="postgresql16-plperl is &lt;16.3-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861346" version="1" comment="postgresql16-plpython is &lt;16.3-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861347" version="1" comment="postgresql16-pltcl is &lt;16.3-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861348" version="1" comment="postgresql16-server is &lt;16.3-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861349" version="1" comment="postgresql16-server-devel is &lt;16.3-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861350" version="1" comment="postgresql15 is &lt;15.7-3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861351" version="1" comment="postgresql15-contrib is &lt;15.7-3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861352" version="1" comment="postgresql15-devel is &lt;15.7-3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861326" version="1" comment="postgresql15-docs is &lt;15.7-3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861353" version="1" comment="postgresql15-plperl is &lt;15.7-3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861354" version="1" comment="postgresql15-plpython is &lt;15.7-3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861355" version="1" comment="postgresql15-pltcl is &lt;15.7-3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861356" version="1" comment="postgresql15-server is &lt;15.7-3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861357" version="1" comment="postgresql15-server-devel is &lt;15.7-3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861358" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.127.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861359" version="1" comment="python3 is &lt;3.4.10-25.127.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861360" version="1" comment="python3-base is &lt;3.4.10-25.127.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861361" version="1" comment="python3-curses is &lt;3.4.10-25.127.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861362" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-28.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861363" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-28.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861364" version="1" comment="python is &lt;2.7.18-28.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861365" version="1" comment="python-32bit is &lt;2.7.18-28.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861366" version="1" comment="python-base is &lt;2.7.18-28.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861367" version="1" comment="python-base-32bit is &lt;2.7.18-28.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861368" version="1" comment="python-curses is &lt;2.7.18-28.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861369" version="1" comment="python-demo is &lt;2.7.18-28.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861370" version="1" comment="python-devel is &lt;2.7.18-28.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861371" version="1" comment="python-doc is &lt;2.7.18-28.111.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861372" version="1" comment="python-doc-pdf is &lt;2.7.18-28.111.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861373" version="1" comment="python-gdbm is &lt;2.7.18-28.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861374" version="1" comment="python-idle is &lt;2.7.18-28.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861375" version="1" comment="python-tk is &lt;2.7.18-28.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861376" version="1" comment="python-xml is &lt;2.7.18-28.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861448" version="1" comment="glibc is &lt;2.22-145.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861449" version="1" comment="glibc-32bit is &lt;2.22-145.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861450" version="1" comment="glibc-devel is &lt;2.22-145.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861451" version="1" comment="glibc-devel-32bit is &lt;2.22-145.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861452" version="1" comment="glibc-html is &lt;2.22-145.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861453" version="1" comment="glibc-i18ndata is &lt;2.22-145.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861454" version="1" comment="glibc-info is &lt;2.22-145.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861455" version="1" comment="glibc-locale is &lt;2.22-145.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861456" version="1" comment="glibc-locale-32bit is &lt;2.22-145.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861457" version="1" comment="glibc-profile is &lt;2.22-145.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861458" version="1" comment="glibc-profile-32bit is &lt;2.22-145.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861459" version="1" comment="nscd is &lt;2.22-145.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861578" version="1" comment="glibc is &lt;2.22-143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861579" version="1" comment="glibc-32bit is &lt;2.22-143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861580" version="1" comment="glibc-devel is &lt;2.22-143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861581" version="1" comment="glibc-devel-32bit is &lt;2.22-143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861582" version="1" comment="glibc-html is &lt;2.22-143.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861583" version="1" comment="glibc-i18ndata is &lt;2.22-143.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861584" version="1" comment="glibc-info is &lt;2.22-143.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861585" version="1" comment="glibc-locale is &lt;2.22-143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861586" version="1" comment="glibc-locale-32bit is &lt;2.22-143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861587" version="1" comment="glibc-profile is &lt;2.22-143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861588" version="1" comment="glibc-profile-32bit is &lt;2.22-143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861589" version="1" comment="nscd is &lt;2.22-143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861590" version="1" comment="MozillaFirefox is &lt;115.11.0-112.212.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861560" version="1" comment="MozillaFirefox-devel is &lt;115.11.0-112.212.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861591" version="1" comment="MozillaFirefox-translations-common is &lt;115.11.0-112.212.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861696" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861721" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861722" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861723" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861724" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861725" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861726" version="1" comment="ucode-intel is &lt;20240514-13.124.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861727" version="1" comment="postgresql14 is &lt;14.12-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861728" version="1" comment="postgresql14-contrib is &lt;14.12-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861729" version="1" comment="postgresql14-devel is &lt;14.12-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861716" version="1" comment="postgresql14-docs is &lt;14.12-3.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861730" version="1" comment="postgresql14-llvmjit-devel is &lt;14.12-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861731" version="1" comment="postgresql14-plperl is &lt;14.12-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861732" version="1" comment="postgresql14-plpython is &lt;14.12-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861733" version="1" comment="postgresql14-pltcl is &lt;14.12-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861734" version="1" comment="postgresql14-server is &lt;14.12-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861735" version="1" comment="postgresql14-server-devel is &lt;14.12-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861817" version="1" comment="libosinfo is &lt;1.0.0-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861818" version="1" comment="libosinfo-1_0-0 is &lt;1.0.0-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861819" version="1" comment="libosinfo-lang is &lt;1.0.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861820" version="1" comment="typelib-1_0-Libosinfo-1_0 is &lt;1.0.0-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862058" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-6.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862059" version="1" comment="python36 is &lt;3.6.15-6.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862060" version="1" comment="python36-base is &lt;3.6.15-6.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862061" version="1" comment="python36-curses is &lt;3.6.15-6.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862062" version="1" comment="python36-dbm is &lt;3.6.15-6.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862063" version="1" comment="python36-devel is &lt;3.6.15-6.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862064" version="1" comment="python36-idle is &lt;3.6.15-6.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862065" version="1" comment="python36-testsuite is &lt;3.6.15-6.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862066" version="1" comment="python36-tk is &lt;3.6.15-6.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862067" version="1" comment="python36-tools is &lt;3.6.15-6.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862068" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-28.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862069" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-28.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862070" version="1" comment="python is &lt;2.7.18-28.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862071" version="1" comment="python-32bit is &lt;2.7.18-28.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862072" version="1" comment="python-base is &lt;2.7.18-28.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862073" version="1" comment="python-base-32bit is &lt;2.7.18-28.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862074" version="1" comment="python-curses is &lt;2.7.18-28.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862075" version="1" comment="python-demo is &lt;2.7.18-28.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862076" version="1" comment="python-devel is &lt;2.7.18-28.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862077" version="1" comment="python-doc is &lt;2.7.18-28.114.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862078" version="1" comment="python-doc-pdf is &lt;2.7.18-28.114.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862079" version="1" comment="python-gdbm is &lt;2.7.18-28.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862080" version="1" comment="python-idle is &lt;2.7.18-28.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862081" version="1" comment="python-tk is &lt;2.7.18-28.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862082" version="1" comment="python-xml is &lt;2.7.18-28.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862976" version="1" comment="glib2-lang is &lt;2.48.2-12.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863138" version="1" comment="glib2-tools is &lt;2.48.2-12.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863139" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863140" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863141" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863142" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863143" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863144" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863145" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863146" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863147" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863148" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863149" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.130.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863150" version="1" comment="python3 is &lt;3.4.10-25.130.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863151" version="1" comment="python3-base is &lt;3.4.10-25.130.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863152" version="1" comment="python3-curses is &lt;3.4.10-25.130.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863153" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr8.25-30.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863016" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr8.25-30.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863154" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr8.25-30.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863017" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr8.25-30.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863155" version="1" comment="libfastjson4 is &lt;0.99.8-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863393" version="1" comment="squid is &lt;4.17-30.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864000" version="1" comment="libtiff5 is &lt;4.0.9-44.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864001" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864002" version="1" comment="tiff is &lt;4.0.9-44.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864003" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-13.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863891" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-13.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864004" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-13.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864005" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-13.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864006" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-13.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864007" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-13.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864008" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-13.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864009" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-13.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864010" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-13.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864011" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-13.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864012" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-13.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864013" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-13.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864014" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-13.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864015" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-13.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864016" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-13.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864017" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-13.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864018" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-13.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864019" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-13.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864020" version="1" comment="libpoppler-glib8 is &lt;0.43.0-16.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864021" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-16.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864022" version="1" comment="libpoppler60 is &lt;0.43.0-16.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864023" version="1" comment="poppler-tools is &lt;0.43.0-16.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844420" version="1" comment="tomcat is &lt;8.0.53-29.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844421" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844422" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844423" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844424" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844425" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844426" version="1" comment="tomcat-lib is &lt;8.0.53-29.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844427" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844428" version="1" comment="tomcat-webapps is &lt;8.0.53-29.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844429" version="1" comment="MozillaFirefox is &lt;115.7.0-112.197.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844396" version="1" comment="MozillaFirefox-devel is &lt;115.7.0-112.197.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844430" version="1" comment="MozillaFirefox-translations-common is &lt;115.7.0-112.197.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800205" version="1" comment="glibc is &lt;2.22-140.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800206" version="1" comment="glibc-32bit is &lt;2.22-140.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800207" version="1" comment="glibc-devel is &lt;2.22-140.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800208" version="1" comment="glibc-devel-32bit is &lt;2.22-140.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800209" version="1" comment="glibc-html is &lt;2.22-140.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800210" version="1" comment="glibc-i18ndata is &lt;2.22-140.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800211" version="1" comment="glibc-info is &lt;2.22-140.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800212" version="1" comment="glibc-locale is &lt;2.22-140.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800213" version="1" comment="glibc-locale-32bit is &lt;2.22-140.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800214" version="1" comment="glibc-profile is &lt;2.22-140.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800215" version="1" comment="glibc-profile-32bit is &lt;2.22-140.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800216" version="1" comment="nscd is &lt;2.22-140.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844675" version="1" comment="libjasper1 is &lt;1.900.14-195.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844676" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819463" version="1" comment="cpio is &lt;2.11-36.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819459" version="1" comment="cpio-lang is &lt;2.11-36.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844690" version="1" comment="squid is &lt;4.17-30.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844770" version="1" comment="xen is &lt;4.9.4_48-3.135.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844771" version="1" comment="xen-doc-html is &lt;4.9.4_48-3.135.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844772" version="1" comment="xen-libs is &lt;4.9.4_48-3.135.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844773" version="1" comment="xen-libs-32bit is &lt;4.9.4_48-3.135.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844774" version="1" comment="xen-tools is &lt;4.9.4_48-3.135.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844775" version="1" comment="xen-tools-domU is &lt;4.9.4_48-3.135.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845114" version="1" comment="python36-urllib3 is &lt;1.25.10-6.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845115" version="1" comment="squid is &lt;3.5.21-26.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845223" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845224" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845225" version="1" comment="gstreamer is &lt;1.8.3-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845214" version="1" comment="gstreamer-lang is &lt;1.8.3-10.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845226" version="1" comment="gstreamer-utils is &lt;1.8.3-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845227" version="1" comment="libgstreamer-1_0-0 is &lt;1.8.3-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845228" version="1" comment="libgstreamer-1_0-0-32bit is &lt;1.8.3-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845229" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.8.3-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845230" version="1" comment="libvmtools0 is &lt;10.3.10-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845231" version="1" comment="open-vm-tools is &lt;10.3.10-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845232" version="1" comment="open-vm-tools-desktop is &lt;10.3.10-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845467" version="1" comment="gdb is &lt;13.2-2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845659" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-28.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845660" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-28.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845661" version="1" comment="python is &lt;2.7.18-28.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845662" version="1" comment="python-32bit is &lt;2.7.18-28.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845663" version="1" comment="python-base is &lt;2.7.18-28.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845664" version="1" comment="python-base-32bit is &lt;2.7.18-28.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845665" version="1" comment="python-curses is &lt;2.7.18-28.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845666" version="1" comment="python-demo is &lt;2.7.18-28.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845667" version="1" comment="python-devel is &lt;2.7.18-28.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845668" version="1" comment="python-doc is &lt;2.7.18-28.108.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845669" version="1" comment="python-doc-pdf is &lt;2.7.18-28.108.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845670" version="1" comment="python-gdbm is &lt;2.7.18-28.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845671" version="1" comment="python-idle is &lt;2.7.18-28.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845672" version="1" comment="python-tk is &lt;2.7.18-28.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845673" version="1" comment="python-xml is &lt;2.7.18-28.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845802" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-6.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845803" version="1" comment="python36 is &lt;3.6.15-6.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845804" version="1" comment="python36-base is &lt;3.6.15-6.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845805" version="1" comment="python36-curses is &lt;3.6.15-6.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845806" version="1" comment="python36-dbm is &lt;3.6.15-6.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845807" version="1" comment="python36-devel is &lt;3.6.15-6.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845808" version="1" comment="python36-idle is &lt;3.6.15-6.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845809" version="1" comment="python36-testsuite is &lt;3.6.15-6.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845810" version="1" comment="python36-tk is &lt;3.6.15-6.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845811" version="1" comment="python36-tools is &lt;3.6.15-6.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815923" version="1" comment="libxkbcommon-x11-0 is &lt;0.6.1-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815924" version="1" comment="libxkbcommon-x11-0-32bit is &lt;0.6.1-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815925" version="1" comment="libxkbcommon0 is &lt;0.6.1-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815926" version="1" comment="libxkbcommon0-32bit is &lt;0.6.1-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846065" version="1" comment="libnetpbm11 is &lt;10.66.3-8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846066" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846067" version="1" comment="netpbm is &lt;10.66.3-8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846171" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846172" version="1" comment="python3 is &lt;3.4.10-25.119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846173" version="1" comment="python3-base is &lt;3.4.10-25.119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846174" version="1" comment="python3-curses is &lt;3.4.10-25.119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846982" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.107.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846983" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.107.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846984" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.107.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846985" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.107.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846986" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.107.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846987" version="1" comment="openssl is &lt;1.0.2j-60.107.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846988" version="1" comment="openssl-doc is &lt;1.0.2j-60.107.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846989" version="1" comment="postgresql15 is &lt;15.6-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846990" version="1" comment="postgresql15-contrib is &lt;15.6-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846991" version="1" comment="postgresql15-devel is &lt;15.6-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846879" version="1" comment="postgresql15-docs is &lt;15.6-3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846992" version="1" comment="postgresql15-plperl is &lt;15.6-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846993" version="1" comment="postgresql15-plpython is &lt;15.6-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846994" version="1" comment="postgresql15-pltcl is &lt;15.6-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846995" version="1" comment="postgresql15-server is &lt;15.6-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846996" version="1" comment="postgresql15-server-devel is &lt;15.6-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848148" version="1" comment="postgresql14 is &lt;14.11-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848149" version="1" comment="postgresql14-contrib is &lt;14.11-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848150" version="1" comment="postgresql14-devel is &lt;14.11-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848096" version="1" comment="postgresql14-docs is &lt;14.11-3.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848151" version="1" comment="postgresql14-llvmjit-devel is &lt;14.11-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848152" version="1" comment="postgresql14-plperl is &lt;14.11-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848153" version="1" comment="postgresql14-plpython is &lt;14.11-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848154" version="1" comment="postgresql14-pltcl is &lt;14.11-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848155" version="1" comment="postgresql14-server is &lt;14.11-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848156" version="1" comment="postgresql14-server-devel is &lt;14.11-3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848157" version="1" comment="postgresql13 is &lt;13.14-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848158" version="1" comment="postgresql13-contrib is &lt;13.14-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848103" version="1" comment="postgresql13-docs is &lt;13.14-3.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848159" version="1" comment="postgresql13-plperl is &lt;13.14-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848160" version="1" comment="postgresql13-plpython is &lt;13.14-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848161" version="1" comment="postgresql13-pltcl is &lt;13.14-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848162" version="1" comment="postgresql13-server is &lt;13.14-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848163" version="1" comment="postgresql12 is &lt;12.18-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848164" version="1" comment="postgresql12-contrib is &lt;12.18-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848165" version="1" comment="postgresql12-devel is &lt;12.18-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848110" version="1" comment="postgresql12-docs is &lt;12.18-3.52.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848166" version="1" comment="postgresql12-llvmjit-devel is &lt;12.18-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848167" version="1" comment="postgresql12-plperl is &lt;12.18-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848168" version="1" comment="postgresql12-plpython is &lt;12.18-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848169" version="1" comment="postgresql12-pltcl is &lt;12.18-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848170" version="1" comment="postgresql12-server is &lt;12.18-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848171" version="1" comment="postgresql12-server-devel is &lt;12.18-3.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848172" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.42.5-2.168.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848173" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.42.5-2.168.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848121" version="1" comment="libwebkit2gtk3-lang is &lt;2.42.5-2.168.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848174" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.42.5-2.168.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848175" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.42.5-2.168.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848176" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.42.5-2.168.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848177" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.42.5-2.168.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848178" version="1" comment="libecpg6 is &lt;16.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848179" version="1" comment="libecpg6-32bit is &lt;16.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848180" version="1" comment="libpq5 is &lt;16.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848181" version="1" comment="libpq5-32bit is &lt;16.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848182" version="1" comment="postgresql16 is &lt;16.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848183" version="1" comment="postgresql16-contrib is &lt;16.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848184" version="1" comment="postgresql16-devel is &lt;16.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848131" version="1" comment="postgresql16-docs is &lt;16.2-3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848185" version="1" comment="postgresql16-plperl is &lt;16.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848186" version="1" comment="postgresql16-plpython is &lt;16.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848187" version="1" comment="postgresql16-pltcl is &lt;16.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848188" version="1" comment="postgresql16-server is &lt;16.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848189" version="1" comment="postgresql16-server-devel is &lt;16.2-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848190" version="1" comment="libxml2-2 is &lt;2.9.4-46.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848191" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848144" version="1" comment="libxml2-doc is &lt;2.9.4-46.71.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848192" version="1" comment="libxml2-tools is &lt;2.9.4-46.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848193" version="1" comment="python-libxml2 is &lt;2.9.4-46.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848480" version="1" comment="libfreebl3 is &lt;3.90.2-58.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848481" version="1" comment="libfreebl3-32bit is &lt;3.90.2-58.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848482" version="1" comment="libsoftokn3 is &lt;3.90.2-58.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848483" version="1" comment="libsoftokn3-32bit is &lt;3.90.2-58.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848484" version="1" comment="mozilla-nss is &lt;3.90.2-58.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848485" version="1" comment="mozilla-nss-32bit is &lt;3.90.2-58.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848486" version="1" comment="mozilla-nss-certs is &lt;3.90.2-58.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848487" version="1" comment="mozilla-nss-certs-32bit is &lt;3.90.2-58.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848488" version="1" comment="mozilla-nss-devel is &lt;3.90.2-58.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848489" version="1" comment="mozilla-nss-sysinit is &lt;3.90.2-58.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848490" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.90.2-58.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848491" version="1" comment="mozilla-nss-tools is &lt;3.90.2-58.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848492" version="1" comment="MozillaFirefox is &lt;115.8.0-112.200.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848466" version="1" comment="MozillaFirefox-devel is &lt;115.8.0-112.200.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848493" version="1" comment="MozillaFirefox-translations-common is &lt;115.8.0-112.200.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848738" version="1" comment="libtiff5 is &lt;4.0.9-44.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848739" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848740" version="1" comment="tiff is &lt;4.0.9-44.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848818" version="1" comment="openssh is &lt;7.2p2-74.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848819" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848820" version="1" comment="openssh-fips is &lt;7.2p2-74.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848821" version="1" comment="openssh-helpers is &lt;7.2p2-74.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848822" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr8.20-30.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848804" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr8.20-30.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848823" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr8.20-30.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848805" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr8.20-30.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816614" version="1" comment="tar is &lt;1.27.1-15.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816603" version="1" comment="tar-lang is &lt;1.27.1-15.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797099" version="1" comment="atk-doc is &lt;2.28.1-6.5.23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797100" version="1" comment="atk-lang is &lt;2.28.1-6.5.23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797278" version="1" comment="libatk-1_0-0 is &lt;2.28.1-6.5.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797279" version="1" comment="libatk-1_0-0-32bit is &lt;2.28.1-6.5.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797280" version="1" comment="typelib-1_0-Atk-1_0 is &lt;2.28.1-6.5.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850036" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-6.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850037" version="1" comment="python36 is &lt;3.6.15-6.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850038" version="1" comment="python36-base is &lt;3.6.15-6.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850039" version="1" comment="python36-curses is &lt;3.6.15-6.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850040" version="1" comment="python36-dbm is &lt;3.6.15-6.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850041" version="1" comment="python36-devel is &lt;3.6.15-6.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850042" version="1" comment="python36-idle is &lt;3.6.15-6.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850043" version="1" comment="python36-testsuite is &lt;3.6.15-6.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850044" version="1" comment="python36-tk is &lt;3.6.15-6.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850045" version="1" comment="python36-tools is &lt;3.6.15-6.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849797" version="1" comment="postgresql-jdbc is &lt;9.4-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850046" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849799" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-18.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850047" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850048" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850049" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850050" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850051" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850052" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850053" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850054" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850055" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850056" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850057" version="1" comment="gvim is &lt;9.1.0111-17.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850058" version="1" comment="vim is &lt;9.1.0111-17.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849943" version="1" comment="vim-data is &lt;9.1.0111-17.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849944" version="1" comment="vim-data-common is &lt;9.1.0111-17.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850059" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.124.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850060" version="1" comment="python3 is &lt;3.4.10-25.124.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850061" version="1" comment="python3-base is &lt;3.4.10-25.124.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850062" version="1" comment="python3-curses is &lt;3.4.10-25.124.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850063" version="1" comment="python3-devel is &lt;3.4.10-25.124.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850135" version="1" comment="sudo is &lt;1.8.20p2-3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850136" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.402-27.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850137" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.402-27.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850138" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.402-27.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850139" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.402-27.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850419" version="1" comment="cpio is &lt;2.11-36.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850417" version="1" comment="cpio-lang is &lt;2.11-36.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850705" version="1" comment="axis is &lt;1.4-290.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850744" version="1" comment="zabbix-agent is &lt;4.0.12-4.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851278" version="1" comment="sudo is &lt;1.8.20p2-3.49.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851689" version="1" comment="libtiff5 is &lt;4.0.9-44.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851690" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851691" version="1" comment="tiff is &lt;4.0.9-44.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851692" version="1" comment="ucode-intel is &lt;20240312-13.121.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851693" version="1" comment="ghostscript is &lt;9.52-23.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851694" version="1" comment="ghostscript-devel is &lt;9.52-23.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851695" version="1" comment="ghostscript-x11 is &lt;9.52-23.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851896" version="1" comment="PackageKit is &lt;1.1.3-24.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851897" version="1" comment="PackageKit-backend-zypp is &lt;1.1.3-24.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851879" version="1" comment="PackageKit-lang is &lt;1.1.3-24.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851898" version="1" comment="libpackagekit-glib2-18 is &lt;1.1.3-24.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851899" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.1.3-24.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851900" version="1" comment="MozillaFirefox is &lt;115.9.0-112.203.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851876" version="1" comment="MozillaFirefox-devel is &lt;115.9.0-112.203.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851901" version="1" comment="MozillaFirefox-translations-common is &lt;115.9.0-112.203.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852269" version="1" comment="squid is &lt;3.5.21-26.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201278"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib++dfb-1_7-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdirectfb-1_7-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaccountsservice0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-AccountsService-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasound2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasound2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-daemon-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-profiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapparmor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapparmor1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_apparmor-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_jk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>at</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flex-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudiofile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudiofile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-lenses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaugeas0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>automake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>m4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chrootenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-gtk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolorhug2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coolkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++48-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++48-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cronie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-cups-browsed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-foomatic-rip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-saslauthd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>davfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dosfstools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-backend-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-backend-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-djvudocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-dvidocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-pdfdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-psdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-tiffdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-xpsdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevdocument3-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevview3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmailconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ft2demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixbuf-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-view</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdmflexiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gdm-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgck-modules-gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-openssl27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls28-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpgme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff-full</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gxditview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-powerpc-ieee1275</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-s390x-emu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-snapper-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-systemd-sleep-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gst-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstadaptivedemux-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadbase-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Guestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-p2v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile-modules-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-2_0-22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hardlink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-hpijs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-chewing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-pinyin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iputils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-kdb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-appl-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-appl-servers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX28-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-Imf_2_1-21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-6_Q16-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-6_Q16-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit5-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKitWidgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvnc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpxwrappers0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpxwrappers0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libmount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuidd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-script-interpreter2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-2_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgme0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-backend-1_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgypsy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhivex0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Win-Hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk-4_0-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libturbojpeg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmusicbrainz4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-glib-vpn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-glib4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-util2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NMClient-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NetworkManager-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjp2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Pango-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre16-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcsclite1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15-15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Polkit-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler60</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-pacrunner-webkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-esound-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-gdm-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_4m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt4-x11-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby2_1-2_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-stdlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Soup-2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-2_0-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-3_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-controller0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGlib-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGtk-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag_c0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtcnative-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-netconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupsclient1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-drivers-net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirglrenderer0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-admin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-libxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-lock-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncserver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisfile3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisfile3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvte9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-vte</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwscodecs1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minicom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mipv6d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-auth-pam-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p7zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-ccid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Config-IniFiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBD-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTML-Parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-LWP-Protocol-https</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-LibXML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-YAML-LibYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pigz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powerpc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppc64-diag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cupshelpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-common-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-dbus-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev-configure-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-imaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pywbem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ppc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-s390</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-sgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radvd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>res-signingkeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>smt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>smt-support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpcbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool-cached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-diag-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gtls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-relp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-udpspoof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sblim-sfcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squidGuard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squidGuard-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-libs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stunnel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysconfig-netconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysvinit-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>whois</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2_3-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-3_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2.0-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unrar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>update-alternatives</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vsftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xf86-video-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xinetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xlockmore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-essentials</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-users</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zoo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-openstack-cloud-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cobbler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-galera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtrabackup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kafka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logstash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-monasca-installer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-evaluator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-expirer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-listener</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-notifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-barbican</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-barbican-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-barbican-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-barbican-keystone-listener</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-barbican-retry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-barbican-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-backup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-volume</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-dashboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-designate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-designate-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-designate-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-designate-central</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-designate-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-designate-producer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-designate-sink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-designate-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance-registry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-api-cfn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-api-cloudwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-plugin-heat_docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-horizon-plugin-designate-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-horizon-plugin-freezer-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-horizon-plugin-gbp-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-horizon-plugin-manila-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-horizon-plugin-neutron-lbaas-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-horizon-plugin-trove-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ironic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ironic-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ironic-conductor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ironic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-keystone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-keystone-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-share</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-dhcp-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-fwaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-fwaas-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-ha-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-l3-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-lbaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-lbaas-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-lbaas-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-linuxbridge-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-macvtap-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-metadata-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-metering-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-openvswitch-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vpn-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vpnaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vpnaas-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vyatta-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-zvm-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-cells</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-conductor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-consoleauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-novncproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-placement-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-serialproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-virt-zvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-vncproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-octavia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-octavia-amphora-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-octavia-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-octavia-health-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-octavia-housekeeping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-octavia-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove-conductor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove-guestagent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove-taskmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-aodh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-barbican</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-barbicanclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-barbicanclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cinder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-designate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-glance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-heat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon-plugin-designate-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon-plugin-freezer-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon-plugin-gbp-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon-plugin-manila-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon-plugin-neutron-lbaas-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon-plugin-trove-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ironic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystone-json-assignment</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-manila</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-manilaclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-manilaclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-neutron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-neutron-fwaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-neutron-lbaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-neutron-vpnaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-nova</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-octavia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-trove</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-vmware-nsx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-vmware-nsxlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>venv-openstack-aodh-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>venv-openstack-barbican-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>venv-openstack-cinder-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>venv-openstack-designate-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>venv-openstack-glance-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>venv-openstack-heat-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>venv-openstack-horizon-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>venv-openstack-ironic-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>venv-openstack-keystone-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>venv-openstack-magnum-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>venv-openstack-manila-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>venv-openstack-neutron-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>venv-openstack-nova-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>venv-openstack-octavia-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>venv-openstack-sahara-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>venv-openstack-trove-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-monasca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-spark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-monasca-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-monasca-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-ansible</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-barbican</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-cinder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-cluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-cobbler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-freezer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-glance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-input-model</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-keystone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-mq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-neutron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-nova</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-octavia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-osconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-service-ansible</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-ses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-swift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-heat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-manila</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-tempest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>documentation-suse-openstack-cloud-installation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>documentation-suse-openstack-cloud-operations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>documentation-suse-openstack-cloud-opsconsole</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>documentation-suse-openstack-cloud-planning</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>documentation-suse-openstack-cloud-security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>documentation-suse-openstack-cloud-supplement</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>documentation-suse-openstack-cloud-upstream-admin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>documentation-suse-openstack-cloud-upstream-user</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>documentation-suse-openstack-cloud-user</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>galera-python-clustercheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ec2-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ec2-api-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ec2-api-metadata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ec2-api-s3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-horizon-plugin-ironic-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-horizon-plugin-magnum-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-horizon-plugin-sahara-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-magnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-magnum-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-magnum-conductor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-magnum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-monasca-notification</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-monasca-persister</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-murano</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-murano-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-murano-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-murano-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-account</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-object</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-tempest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-tempest-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cinderclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cinderclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ec2api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon-plugin-ironic-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon-plugin-magnum-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon-plugin-sahara-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-magnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-monasca-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-monasca-notification</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-monasca-persister</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-murano</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-os-brick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sahara</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-swift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tempest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>venv-openstack-ceilometer-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>venv-openstack-freezer-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>venv-openstack-monasca-ceilometer-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>venv-openstack-monasca-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>venv-openstack-murano-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>venv-openstack-swift-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_100-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-cassandra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-ceilometer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-designate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-horizon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-ironic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-logging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-magnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-memcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-monasca-transform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-opsconsole</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-opsconsole-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-tls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-central</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-ipmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-notification</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-collector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-polling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-dashboard-theme-SUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-gbp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-monasca-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-monasca-log-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-gbp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ardana-configurationprocessor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ceilometer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cinderlm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cliff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-freezerclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-freezerclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-heat-gbp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ironicclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ironicclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-magnumclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-magnumclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-monasca-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-monasca-log-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-muranoclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-muranoclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-neutron-gbp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-novaclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-novaclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-openstackclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-os-client-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-os-vif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-os-win</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.cache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.concurrency</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.config-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.i18n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.messaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.middleware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.policy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.privsep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.reports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.versionedobjects</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.vmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslotest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-python-subunit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-saharaclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-saharaclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-swiftclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-swiftclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-zaqarclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils-plugin-suse-openstack-cloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-swiftlm-drive-provision</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-swiftlm-log-tailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-swiftlm-uptime-mon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caasp-openstack-heat-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-monasca-ui-drilldown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-horizon-plugin-monasca-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-horizon-plugin-neutron-fwaas-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-monasca-persister-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Beaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon-plugin-monasca-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon-plugin-neutron-fwaas-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-osprofiler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-swiftlm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-SQLAlchemy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_103-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Werkzeug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libibus-1_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-IBus-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oauthlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-kernel-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>galera-3-wsrep-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-horizon-plugin-neutron-vpnaas-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-amqp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon-plugin-neutron-vpnaas-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ovs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pysaml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-python-engineio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>release-notes-suse-openstack-cloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-kgraft</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_107-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ecdsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_113-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-PyKMIP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zookeeper-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_radius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_radius-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp-lite6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shibboleth-sp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libradosstriper1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librgw2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cephfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rados</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rgw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-ppolicy-check-password</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspectre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_116-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shared-python-startup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_121-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadns1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_124-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-certifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-chardet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kibana</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-octavia-amphora-image-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Flask</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-GitPython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-apicapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystoneauth1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-psutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pyroute2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tooz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-waitress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>storm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>storm-nimbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>storm-supervisor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ipaddress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-prometheus-node_exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2WebExtension-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_127-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aws-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_130-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-natel-discrete-panel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Flask-Cors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ardana-packager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystoneclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystoneclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystonemiddleware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-kombu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-straight-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-amd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_135-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-asn1crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-botocore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-jsonpatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-jsonpointer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-packaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-asn1crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-jsonpointer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-packaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipmitool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-extensions-example</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ardana-extensions-nsx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keepalived</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vsphere</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vsphere-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vsphere-dvs-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vsphere-ovsvapp-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-resource-agents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-congressclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-designateclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-designateclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-freezegun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ironic-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-networking-cisco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-networking-vsphere</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-osc-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.rootwrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.serialization</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-stevedore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-taskflow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-futures</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xattr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Mail-SpamAssassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-16-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-32-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-8-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-posix2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-CGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdate-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfwup0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_144-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpdemux1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpmux1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaribou0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Caribou-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-6-SUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-6-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arpwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-colorama</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pexpect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ptyprocess</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-six</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-six</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>linuxptp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_147-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cassandra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cassandra-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-elementpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-eventlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xmlschema</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell-ispell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaspell15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaspell15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-connector-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libesmtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-vnc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-vnc-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgvnc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gtk-vnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GVnc-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GtkVnc-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspectre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javapackages-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf-nobfd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcrecpp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcreposix0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>selinux-policy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>selinux-policy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>selinux-policy-minimum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_150-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-monasca-thresh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_138-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>influxdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-Twig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_141-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwavpack1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzma5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzma5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_161-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-1_2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librelp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_164-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat-isag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-monasca-log-metrics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-monasca-log-persister</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-monasca-log-transformer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_153-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Mako</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_wsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-xml-apis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-xml-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_156-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sqlparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tornado</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-swift3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-sprockets-2_12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-core-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-ha</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-openstack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>couchdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>documentation-suse-openstack-cloud-deployment</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activejob-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-core-branding-SOC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-rails-html-sanitizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-loofah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-easy_diff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-haml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-actionpack-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-puma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activeresource</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-crowbar-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-json-1_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-actionview-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activesupport-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-nokogiri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activerecord-session_store</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-addressable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activerecord-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sleshammer-aarch64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sleshammer-ppc64le</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sleshammer-s390x</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sleshammer-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-redcarpet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-yajl-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-sinatra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-tzinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtcmu1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcmu-runner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-pkg-bindings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfpm_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libospf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libospfapiclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquagga_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzebra1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-louis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-louis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SuSEfirewall2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsaml8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensaml-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensaml-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-thunderx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-thunderx-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lttng-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lttng-modules-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmltooling6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmltooling-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprocps3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqca2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqca2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-search-provider-nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnautilus-extension1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-uefi-aarch64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Archive-Zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-smt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>g3utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgetty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkpathsea6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqpdf18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSoundTouch0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>axis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_pkcs11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_pkcs11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexempi3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-vdagent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db48-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-talloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-talloc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-backend-zypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-PackageKitGlib-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rzsz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-license1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_atomic1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_random1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_signals1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hostinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit-audispd-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudit1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudit1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libauparse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3-32bit</name>
	</rpminfo_object>
	<unix-def:uname_object xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:obj:2009060496" version="1"/>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_140-94_42-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_143-94_47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_155-94_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_162-94_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_162-94_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_175-94_79-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_176-94_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_178-94_91-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_97-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman_clientpp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>adcli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmemcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmemcached11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmemcachedutil2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rpi3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles-bcl-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-M2Crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-M2Crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-gcore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mokutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsiuio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopeniscsiusr0_2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-5_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-5_0-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-5_0-postgres</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-5_0-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-ui-5_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpartx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>multipath-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telnet-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_6m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xdg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxatracker2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-file-roller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnuplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgxps2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PlRPC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>targetcli-fb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtimageformats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Svg5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blktrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-io</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Convert-ASN1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-boto3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fastjar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrilo-0_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblldp_clif1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-lldp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javapackages-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspeex1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspeex1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspeexdsp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmp10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmp10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-runtime-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aws-cli-py36</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-appdirs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-asn1crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-boto3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-botocore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-certifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-cffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-chardet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-colorama</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-docutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-jmespath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-packaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-ply</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-ply-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-pyasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-pycparser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-pyparsing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-pyparsing-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-python-dateutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-rpm-generators</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-s3transfer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-setuptools-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-setuptools-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-simplejson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-six</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-six-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-devel-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTTP-Daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnl-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnl3-200</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnl3-200-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clone-master-clean-up</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencc-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ca-certificates-mozilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblas3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblapack3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-icu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dmidecode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiniparser0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiniparser0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_security2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-configobj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gawk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhwasan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>traceroute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-module-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-nrpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nrpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Net-Server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-future</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-extra-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbasicobjects0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcollection4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdhash1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libini_config5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpath_utils1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libref_array1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysuser-shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysuser-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Libosinfo-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfastjson4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-x11-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-x11-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatk-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatk-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Atk-1_0</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12.3</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.2.0esr-108.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.42-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.27.2-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.15-6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-4.498</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-49.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.40-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.14-18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-11.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.14-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.37-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6+2.3.3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.9-27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.16-15.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.32-30.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26.1-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.21.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-3.110</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.5-8.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.2-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.26-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-12.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-147.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.25-12.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.8-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.8_k4.4.73_5-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.11-58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-17.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-181.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.26-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-28.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-28.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.100.2-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.76-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.30.2-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:044-113.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.42.11-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:103-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.158-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-5.66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.26-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.14-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.34.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.15-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-52.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.5-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.3-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.48.2-10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-61.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.0-27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-49.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.27-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.24-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.2-5.429</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.31-7.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.32.4-19.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.4-1.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-3.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.326-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-7.392</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-6.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.11-1.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.14-4.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:s20121221-2.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-120.238</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-255.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.141-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.5-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.5-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.131-26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.5-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.16-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.73-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.4-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.18-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.2-5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.2-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-3.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.14-3.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-3.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.11-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-3.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-18.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-1.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.29.2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.29.2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.2-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.5+git.27.6afd48b1083-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6.3-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.21-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.21-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.29.5-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2d-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-353.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.5-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-3.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-6.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.10-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-7.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.11-23.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.5-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-12.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-12.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:62.1.0-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.2-30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11-2.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19-17.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.29-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.08-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.08-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.30-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.2-15.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8.4-13.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-27.86</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.30-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.30.0-3.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.66.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-1.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.12-12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.40.1-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.39-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.22-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.113-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.43.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.13-16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.13-16.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.13-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.6-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.10-3.67</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.9-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.8-18.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.3-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.54.1-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.33-1.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.8-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-1.265</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.34-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.25-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.7-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.3-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-4.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-6.73</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-4.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.5-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.9-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-8.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.2-19.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.7-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.28-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.0-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.3-15.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.17-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.33-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2.umip.0.4-19.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13.1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p10-63.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.0-1.122</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-2.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-724.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.1-23.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.1-23.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-1.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.25-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.82-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.021-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.71-1.178</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.04-5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:804.031-3.82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0019-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.38-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.3-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-267.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-21.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.0.0-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.22.1-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.7-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.25-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.2-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.7-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.24.0-1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11_git201205151338-8.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.24-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-23.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.21-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.00-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.84.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-778.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-99.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.1-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.43-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.4-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.14-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.18.4-14.216</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-264.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140630-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0_08-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.917.770_gcb6ba2da-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.15-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.43-5.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1-14.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6-45.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.22-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.36-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.2-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.11-1.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-1020.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">8</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.12-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.6-49.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.15-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.15-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.10-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.1-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180622_15.06-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.6-49.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev5-3.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev5-3.5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.1~dev11-3.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.1.2~dev14-3.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.1.2~dev14-3.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev1-3.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev5-3.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.2~dev4-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.5~dev11-3.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.5~dev11-3.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.0+git.1525957319.6b5a7cd-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev5-3.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.1~dev6-3.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.1~dev21-4.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.3~dev4-4.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3~dev2-3.5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1~dev7-3.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.5~dev7-3.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.1~dev19-5.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev55-3.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev55-3.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.6~dev63-3.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.2~dev7-3.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.4~dev4-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.4~dev4-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.1~dev1-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1~dev12-4.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.5~dev49-3.8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1~dev56-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3~dev21-4.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1~dev11-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.2-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.2-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.3-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.3~dev16-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.4~dev7-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.1-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.1-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.2-14.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.1-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.1-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.2-14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.3-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.1-11.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2-11.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.2-13.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.0.3-11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.1-11.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0.0-11.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.11-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1535031421.9262a47-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1534267176.a5f3a22-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.2.2-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1~dev24-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1539739656.0ef51c9-3.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1534266594.8136db7-4.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1535412193.d9ad231-3.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1534266734.ec4822f-3.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1534780521.780753b-3.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1534266805.c9ea29b-3.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1537790499.b15fdea-3.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1539086744.5ae1d6f-3.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1536100286.ddd8d3e-3.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1534267034.f95e1ec-3.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1537805998.7898f24-3.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1537895345.35a03a2-3.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1534267086.b7dbe77-3.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1540330973.aab0174-3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1537825617.23552c2-3.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1537806377.25b5d68-3.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1539113493.6631423-1.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1534267211.78fb7e3-3.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1553878455.7439e04-3.58.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1550694449.df88054-3.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1550589454.df2e733-3.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1552935705.e9a92b3-3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1551748668.7427826-1.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1551113207.9f1db17-3.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1551718533.227cb9e-3.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1553890679.8a50307-3.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1552503158.6b6b195-3.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1551382173.a81d5e1-3.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1554145115.63a4cf2-1.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1551502730.f4d219d-3.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1554307220.ed24e63-3.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.20190329-1.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0+git.1506329536.8f5878c-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev5-3.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.1~dev10-4.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.6~dev17-3.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.6~dev17-3.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.0+git.1553459627.948e8cc-3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4~dev3-3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1~dev9-3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.4~dev1-3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.7~dev7-3.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.7~dev7-3.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.3~dev1-5.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.3~dev1-5.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev31-4.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev31-4.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.4~dev17-3.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.4~dev17-3.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1~dev25-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2~dev2-3.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1~dev8-3.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.1~dev5-3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.7~dev100-3.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.7~dev100-3.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.2~dev8-3.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.8~dev53-3.20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.8~dev53-3.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5~dev1-4.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.4~dev1-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.4~dev1-3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.2~dev32-3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.0-4.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-3.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1~dev4-4.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.8-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev6-12.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev2-12.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.7~dev2-12.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.1.2~dev58-14.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3~dev6-12.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0.0~xrc2~dev2-10.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.2~dev9-12.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.6~dev17-12.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev5-14.20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.7~dev7-12.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.3~dev1-11.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.4~dev17-12.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.1-12.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.2-13.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.8~dev53-11.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5~dev1-12.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.4~dev1-11.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.2-11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1~dev12-11.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.22-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.22-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.2-109.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.8.0-109.83.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.1-58.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1553878455.7439e04-3.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1534266594.8136db7-4.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1534266612.44dcb20-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1534266629.0bb5d54-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1558619942.6bd075c-3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1534266734.ec4822f-3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1550694449.df88054-3.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1555341117.d812d88-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1558636763.f7f09ca-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1534266805.c9ea29b-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1555450219.97789ac-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1555450207.a7d3bfe-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1554732431.8f9dd50-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1557418274.fb273dd-3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1534266893.1d69df7-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1554915846.db23473-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1544117621.1c9a954-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1555450198.c42dc52-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1551748668.7427826-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1534266982.498c352-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1557856965.bde9eb2-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1534267017.4bbecd9-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1549882721.b2e8873-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1557523208.81aa1da-3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1559253853.bb932ea-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1557523035.ab44613-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1534267103.829be13-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1537201508.68c32e6-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1557503482.852ec24-3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1551382173.a81d5e1-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1544119019.e68516a-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1554912320.73ad306-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1539709555.5b31c25-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1551502730.f4d219d-3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1557761054.b971c8f-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1534267264.6b1e899-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.20190521-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev7-3.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev7-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev3-3.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev3-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev7-3.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev7-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev5-3.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev5-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev6-3.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.2+git.1554906711.9dbe79b-7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3~dev7-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev3-3.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.1~dev1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1~dev10-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.8~dev5-3.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.8~dev5-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev2-5.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev2-5.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5~dev2-3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1~dev26-3.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1~dev12-3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev28-3.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev28-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.3~dev1-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.1~dev28-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.4~dev6-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.1~dev5-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev3-3.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev3-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1~dev13-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.20-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1534266236.fb1623c-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.2+git.1541444073.4d3347c-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.3-3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.3-3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.9-3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.2-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.30.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.30.8-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.30.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.3-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1551262227.7a7deb6-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev7-12.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev3-12.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev7-12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev5-14.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3~dev7-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0.0~xrc2~dev2-10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.2~dev9-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev3-12.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev6-14.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.8~dev5-12.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev2-11.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2-11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.4~dev17-12.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-8.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.1-12.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.2-13.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev3-11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5~dev1-12.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.4~dev1-11.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.2-11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1~dev13-11.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190618-13.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.36-2.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.0-2.39.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.51-21.26.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.51-21.26.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.222-27.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.38-29.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.1-9.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.15-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.15-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1560208949.67048e3-3.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1564410318.f0cca2c-3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1564164977.ef9baeb-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1564491709.349d78e-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1562848601.c3daff0-3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1565388406.c6abb8d-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1563383198.c7fd9b4-3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1541434883.e0ebe69-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1562849010.73bc517-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0+git.1560518045.ad7dc6d-4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.20190805-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0+git.1562242499.36b8b64-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1~dev39-3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev7-3.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev7-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.3~dev2-3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.3~dev2-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev11-3.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev11-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1~dev9-4.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.8~dev7-3.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.8~dev7-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev2-5.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev2-5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev2-3.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev2-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5~dev5-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2~dev1-3.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1~dev10-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1~a0~dev2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2~dev2-3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2~dev2-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev42-3.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev42-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.1~dev45-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.4~dev6-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev4-3.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev4-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6~dev2-4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1502900605.3e0068a-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25.2-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2_5.0.2_5.0.2~dev31-11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1_1.5.1_1.5.1~dev3-8.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2~dev1-11.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2~dev2-12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev42-13.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.23-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.36-2.27.19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-27.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.54-18.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.54-18.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6.0-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.50-38.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.4-2.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.4-2.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.40-30.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.13-15.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.13-15.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.9.0-109.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.1-9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.40.1-29.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-23.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.1.0-109.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68-32.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.2-3.9.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32-9.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_04-3.56.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-34.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1566374355.c509923-3.67.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1566376789.be0fe01-3.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1565816064.5d4f73f-3.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1566517401.98450e6-3.33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1568835837.2452e7a-1.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1568220097.74ee4b4-3.33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1566902754.c58ff69-3.35.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1568373448.bcaee7e-3.20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1566471887.fd2fec7-3.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.3.25-4.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.5-4.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-3.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.25-4.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.25-4.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev16-3.21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev16-3.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.3~dev3-3.12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.3~dev3-3.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev13-3.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev13-3.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1~dev3-3.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev4-5.27.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev4-5.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190923_16.32-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev51-3.24.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev51-3.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.1~dev56-3.9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.4~dev6-3.15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev7-3.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-3.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-5.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22-5.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.20190911-3.20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev7-12.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev3-12.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev7-12.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev16-14.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3~dev7-12.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0.0~xrc2~dev2-10.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.3~dev3-12.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev13-12.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev6-14.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.8~dev7-12.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev4-11.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2_5.0.2_5.0.2~dev31-11.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev2-12.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1_1.5.1_1.5.1~dev3-8.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2~dev1-11.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2~dev2-12.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev51-13.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev7-11.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6~dev2-12.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.4~dev1-11.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.2-11.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1~dev13-11.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.0-109.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.169.064abe062be-3.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.169.064abe062be-3.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-11.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20191112-13.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-23.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20191112a-13.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.3-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.241-43.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015.09.28.1626-17.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.11-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_06-3.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.3.0-109.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.4-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.3.24-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.21-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.21-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.15-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1583432621.24fa60e-3.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1585152761.8ef3d61-4.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1583944923.03cca6c-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1583944894.38f023a-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1583944811.dc14403-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1584715262.e4ea620-3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1585171918.418f5cf-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1585311051.6ab5488-3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.20200319-1.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev5-3.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev5-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev63-3.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev63-3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev61-3.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev61-3.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev7-12.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev3-12.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev7-12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev23-14.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3~dev7-12.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0.0~xrc2~dev2-10.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.3~dev3-12.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev22-12.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.8~dev8-12.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev5-11.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2_5.0.2_5.0.2~dev31-11.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev5-12.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1_1.5.1_1.5.1~dev3-8.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2~dev2-12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev63-13.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev61-11.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6~dev3-12.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.5~dev4-11.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.2~dev2-11.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.16-239.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.12+git.1587570958.35d78d0243-2.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-2.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-2.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.8.0-109.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-26.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200207.5feb6c1-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.9.0-109.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.9-19.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.261-43.38.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-18.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200602-13.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.121.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.121.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-103.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.40.4-29.41.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_06-3.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.65-38.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.10-30.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.252-27.45.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.13+git.1592168685.85110a3e9d-2.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2018.4.16-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.1-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p15-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-58.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25-19.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_08-3.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.1-112.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78-35.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6.0-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.6-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1589740980.6c3bcdc-3.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1585685203.3e71e49-3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1586539529.b7d295f-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1589740934.0e0ad61-3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1591194866.b7375d0-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1589715269.62ad6df-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1590756744.ba84abc-3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1590100427.cf4cc8f-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1587034587.eac37b8-3.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0+git.1560518045.ad7dc6d-4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.20200527-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.5-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.5~dev3-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.0+git.1582270132.8a20477-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev11-5.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6~dev4-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190923_16.32-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev65-3.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.4-3.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.23-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.8-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2~dev2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.30.8-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.21-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.58.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev7-12.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev3-12.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev7-12.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev23-14.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3~dev7-12.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0.0~xrc2~dev2-10.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.3~dev3-12.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev22-12.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.5~dev3-14.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.8~dev8-12.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev11-11.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2_5.0.2_5.0.2~dev31-11.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev5-12.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1_1.5.1_1.5.1~dev3-8.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2~dev1-11.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2~dev2-12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev65-13.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev61-11.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6~dev3-12.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.5~dev4-11.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.2_2.15.2_2.15.2~dev32-11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.2~dev2-11.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.18-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.6-49.26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.1-1.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0~git.1456906198.f422461-21.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.186.c6d77b0d5a6-3.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.186.c6d77b0d5a6-3.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-2.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-2.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-4.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-4.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.1.0-112.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.18-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_10-3.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.9-8.15.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.9_k4.4.180_94.127-8.15.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-13.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-2.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-2.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-4.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-4.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.174.c2fd2e28c84-3.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.174.c2fd2e28c84-3.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.0-30.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.15-30.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.70-38.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.297-22.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.2.0-112.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.242-27.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15+git47-25.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.36-2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.628-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.237.40a3f495f75-3.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.237.40a3f495f75-3.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.2-6.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.3.0-112.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_12-3.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.628-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.271-43.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.13-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-113.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-113.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-112.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.8-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.33-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.248.c833312e640-3.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.248.c833312e640-3.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.2-6.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.272-27.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20201027-13.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.14-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1596735237.54109b1-3.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1596129856.263f430-3.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1593631779.76fa9b7-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1593618123.678c32b-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1601298847.dd01585-3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1595885113.93abcbc-3.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.20201007-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.4-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.9-3.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev29-3.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev29-3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190923_16.32-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev69-3.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev69-3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev76-3.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev76-3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.29-3.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.3-7.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.1-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.0-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.20200922-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev7-12.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev3-12.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev7-12.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev29-14.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3~dev7-12.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0.0~xrc2~dev2-10.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.3~dev3-12.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev22-12.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.5~dev3-14.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.8~dev8-12.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev11-11.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2_5.0.2_5.0.2~dev31-11.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev5-12.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1_1.5.1_1.5.1~dev3-8.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2~dev1-11.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2~dev2-12.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev69-13.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev76-11.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6~dev3-12.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.5~dev4-11.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.2_2.15.2_2.15.2~dev32-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.2~dev2-11.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.281-43.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.1-112.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.1-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.14-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.14-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.19-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.19-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.15-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.15-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.20-6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.20-6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20201118-13.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.0-112.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:40.6.2-4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_14-3.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-29.17.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-29.17.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.5.0-109.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.0-112.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.0-33.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-8.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.1+r275327-1.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_16-3.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.60-38.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.39.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.40.2-29.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.55-38.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.40.3-29.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.5-30.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-126.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015.09.28.1626-17.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-26.9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.213-28.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-15.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.17-3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.17-3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.251-43.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.18-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1579279939.ee7da88-3.39.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1575037115.0326803-3.41.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1573597788.15b7984-3.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1534266307.db1ec28-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1567529036.a41a037-3.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1571846045.ab9e3ea-3.20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1571777596.14dce6a-3.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1582147997.b9ed134-3.36.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1571845225.006843d-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1573147067.09e3ea0-3.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1572452293.e65d714-3.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1572527728.9b34bdf-3.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1571845965.97714fb-3.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1581024906.fbf0be3-3.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1573050365.ff6fa06-3.36.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1571846125.584d988-3.38.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1575642049.1f321d0-3.23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1581015942.2d21e63-3.42.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1579261264.7dd213a-3.30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.19-3.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.31-4.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.31-4.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev23-3.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev23-3.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.5~dev2-3.23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.2+git.1573629528.6b21fa5-7.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev22-3.27.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev22-3.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.0+git.1560033670.e3b5a52-3.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3~dev2-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3~dev5-3.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.8~dev8-3.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.8~dev8-3.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev5-5.30.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev5-5.30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5~dev5-3.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev60-3.27.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev60-3.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.1~dev72-3.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1~dev133-3.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev49-3.32.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev49-3.32.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6~dev3-4.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.2-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0+git.1569436425.8b9c49f-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.5~dev4-3.12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.5~dev4-3.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.2~dev2-3.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.2+git.1571845893.27f0b7b-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.9-1.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.2-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.1~dev65-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.2-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.3-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.3-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.2-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.2-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev7-12.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev3-12.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev7-12.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev23-14.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3~dev7-12.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0.0~xrc2~dev2-10.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.3~dev3-12.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev22-12.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.5~dev2-14.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.8~dev8-12.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev5-11.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2_5.0.2_5.0.2~dev31-11.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev2-12.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1_1.5.1_1.5.1~dev3-8.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2~dev1-11.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2~dev2-12.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev60-13.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev49-11.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6~dev3-12.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.5~dev4-11.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.2_2.15.2_2.15.2~dev32-11.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.2~dev2-11.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev2-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev2-12.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.4.1-109.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.0-109.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.33-28.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.21.2-2.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.2-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.5-6.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-44.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.47.1-58.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.23-19.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-17.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.1-109.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.7.0-109.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-27.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.34-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.38-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5-10.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.5-44.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.2-33.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2_0_g5f4c7b1-6.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_16-3.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.10.0-112.57.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.291-43.47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.282.cfafed5922a-3.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.282.cfafed5922a-3.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.25.3-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.0-29.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.25.3-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.3-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-18.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-18.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.11.0-112.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2_0_g5f4c7b1-6.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.75-38.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.8-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210525-13.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.21-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.15-2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.292-27.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.1-2.63.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.1-2.63.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:308-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.22-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1a15-159.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.37-2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.21.4-2.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.9-22.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-28.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.9-28.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.4-4.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-2.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0-13.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-8.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-5.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.12.0-112.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-112.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1614096566.e8c2b27-3.44.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.10-5.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.20210512-1.32.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.4-4.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.6-3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.0+git.1623056900.7917e18-3.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190923_16.32-3.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev92-3.48.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.29-3.25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009142390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-1.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20.0-6.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.34-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-5.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.18-1.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev7-12.32.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev3-12.33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev7-12.30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev29-14.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3~dev7-12.31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0.0~xrc2~dev2-10.28.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.3~dev3-12.31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev22-12.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.5~dev6-14.36.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.8~dev8-12.33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev11-11.35.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2_5.0.2_5.0.2~dev31-11.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev5-12.37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1_1.5.1_1.5.1~dev3-8.28.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2~dev1-11.28.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2~dev2-12.28.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev69-13.38.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev92-11.36.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6~dev3-12.33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.5~dev4-11.32.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.2_2.15.2_2.15.2~dev32-11.23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.2~dev2-11.32.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2_0_g5f4c7b1-6.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-29.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.3-2.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.3-2.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.25.3-5.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.13.0-112.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.26-13.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.302-27.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-28.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.69.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.69.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.12-3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.6.1-18.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.42-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22-10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_20-3.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68-58.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.32-19.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8a-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.72.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.72.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.1.0-112.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91-35.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.20-30.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_22-3.94.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.0-9.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-3.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-3.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-2.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-2.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.2.0-112.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.25-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.18-4.19.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.18-4.19.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.49.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1610733160.0f577f4-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1610573640.452aed1-3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1610740501.5dca121-3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1605176800.52cccfa-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1610643571.91b88d6-3.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev69-3.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev78-3.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.29-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.20201214-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.5~dev6-14.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev69-13.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev78-11.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.0-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8b-2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-9.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-9.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20140730-36.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-43.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-43.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2_0_g5f4c7b1-43.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-43.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.3.0-112.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1632499354.a56668f-3.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1627997000.6c3bc04-3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.20210806-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.1~dev12-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.0+git.1628179051.7d761bf-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.29-3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1~dev4-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev22-12.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.5~dev6-14.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2~dev1-11.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.307.b3899d08cc6-3.64.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.307.b3899d08cc6-3.64.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14-4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.24-6.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.24-6.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-2.74.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-2.74.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.312-27.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.321-43.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.9-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_24-3.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.4-33.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.1-2.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.1-2.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.1-58.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.4.0-112.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-3.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2~dev1-11.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-126.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.313.502515a5bfc-3.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.313.502515a5bfc-3.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.27-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.2.2-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6~dev4-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1~a0~dev2-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev7-12.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev3-12.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev7-12.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev29-14.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3~dev7-12.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0.0~xrc2~dev2-10.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.3~dev3-12.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev22-12.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.5~dev6-14.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.8~dev8-12.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev11-11.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2_5.0.2_5.0.2~dev31-11.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev5-12.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1_1.5.1_1.5.1~dev3-8.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2~dev1-11.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2~dev2-12.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev69-13.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev92-11.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6~dev3-12.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.5~dev4-11.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.2_2.15.2_2.15.2~dev32-11.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.2~dev2-11.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.64.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.12-3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.80-38.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22-5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.282-27.56.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.4-4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.0+git.1605509190.64f020b-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev77-3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.6-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev7-12.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev3-12.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev7-12.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev29-14.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3~dev7-12.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0.0~xrc2~dev2-10.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.3~dev3-12.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev22-12.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.8~dev8-12.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev11-11.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2_5.0.2_5.0.2~dev31-11.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev5-12.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1_1.5.1_1.5.1~dev3-8.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2~dev1-11.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2~dev2-12.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev69-13.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev77-11.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6~dev3-12.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.5~dev4-11.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.2~dev2-11.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.6-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.25-30.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.8.0-112.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-4.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-4.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.141.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.141.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.1-112.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.60.99-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39.2-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.5~dev6-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.20201214-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.0-112.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.29-3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr5.5-38.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.5-30.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.0-30.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.3-58.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.8.0-112.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.25-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.5.0-112.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-8.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6~dev4-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-8.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2~dev1-11.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-9.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-15.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_28-3.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.3-2.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.3-2.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9-9.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16-20.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.1-9.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-112.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.11-16.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.20211112-1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.6-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev11-5.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2~dev4-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev11-11.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2~dev1-11.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr5.0-38.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.0-2.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.0-2.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20220510-13.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-112.108.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.21-4.28.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.21-4.28.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.1-112.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.54.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.54.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.34-1.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-15.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.3-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev69-3.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-3.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.10.0-112.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.4-58.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.164.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.164.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.164.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.3-2.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.3-2.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.1-9.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-126.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-1.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5-10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8_k4.4.180_94.164-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.2-10.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.9-8.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.9_k4.4.180_94.164-8.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.11.0-112.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-3.58.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.320.a2d80a7efef-3.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.320.a2d80a7efef-3.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.1-9.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.29-3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev7-12.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev3-12.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev7-12.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev29-14.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3~dev7-12.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0.0~xrc2~dev2-10.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.3~dev3-12.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev22-12.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.5~dev6-14.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.8~dev8-12.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev11-11.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2_5.0.2_5.0.2~dev31-11.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev5-12.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1_1.5.1_1.5.1~dev3-8.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2~dev1-11.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2~dev2-12.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev69-13.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev92-11.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6~dev3-12.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.5~dev4-11.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.2_2.15.2_2.15.2~dev32-11.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.2~dev2-11.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.4-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.19-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1660773729.3789a6d-3.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0+git.1660773402.d845a45-3.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.4-4.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.0+git.1654529662.75fa04a-3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2~dev3-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.29-3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.16-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev22-12.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.5~dev6-14.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2~dev3-12.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.2.2-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6~dev4-3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.1-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1~a0~dev2-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-3.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev7-12.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev3-12.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev7-12.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev29-14.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3~dev7-12.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0.0~xrc2~dev2-10.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.3~dev3-12.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev22-12.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.5~dev6-14.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.8~dev8-12.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev11-11.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2_5.0.2_5.0.2~dev31-11.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev5-12.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1_1.5.1_1.5.1~dev3-8.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2~dev1-11.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2~dev2-12.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev69-13.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev92-11.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6~dev3-12.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.5~dev4-11.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.2_2.15.2_2.15.2~dev32-11.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.2~dev2-11.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.5-33.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_26-3.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.7-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.13-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.1-9.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-12.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.6-49.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-268.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.0-112.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20220207-13.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-8.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.5-2.85.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.5-2.85.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.1-9.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.1-112.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-14.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.6-2.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.6-2.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta18-14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.7.0-112.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.322-27.72.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-8.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev29-3.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev29-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev92-3.51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev92-3.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.4-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev7-12.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev3-12.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev7-12.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev29-14.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3~dev7-12.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0.0~xrc2~dev2-10.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.3~dev3-12.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev22-12.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.5~dev6-14.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.8~dev8-12.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev11-11.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2_5.0.2_5.0.2~dev31-11.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev5-12.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1_1.5.1_1.5.1~dev3-8.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2~dev1-11.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2~dev3-12.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev69-13.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev92-11.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6~dev3-12.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.5~dev4-11.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.2_2.15.2_2.15.2~dev32-11.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.2~dev2-11.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-3.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev7-12.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev3-12.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev7-12.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.3~dev29-14.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3~dev7-12.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0.0~xrc2~dev2-10.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.3~dev3-12.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev22-12.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.5~dev6-14.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.8~dev8-12.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.4~dev11-11.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2_5.0.2_5.0.2~dev31-11.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev5-12.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1_1.5.1_1.5.1~dev3-8.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2~dev1-11.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2~dev3-12.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9~dev69-13.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1.9~dev92-11.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6~dev3-12.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.5~dev4-11.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.2_2.15.2_2.15.2~dev32-11.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.2~dev2-11.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev22-3.30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.2-3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3~dev7-12.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.8~dev22-12.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2_5.0.2_5.0.2~dev31-11.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6~dev3-12.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.5~dev4-11.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.3-4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.29-3.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.dev372-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-14.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.29-3.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.3-4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:36.5.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.29-3.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-3.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.29-3.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev3-3.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev3-12.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.0-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.29-3.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.5~dev6-14.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-3.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.5~dev6-14.58.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.29-3.59.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.5~dev6-14.54.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.3-11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.5-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1528696845.81a7b5d0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1533887407.6e9b0412d-3.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1530177874.35b9099-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1520420379.d5bbb35-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1534167599.d325ef804-4.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0+git.1533844061.4ac8e723-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.4-11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1551088826.010c0399-3.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1552461227.43e65d269-3.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1553248675.7e103ea-3.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1554709170.195ba0e26-4.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.11-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1558533551.8d8ed2058-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0-10.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1559282566.6b06ca3-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1559335140.62bb4c014-4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.17.0-11.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1565280360.01fed6905-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1562069707.e2de18c-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1565270683.ea6e63d87-4.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0+git.1563181545.65360af5-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1569597589.1f025c557-3.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1567673535.607aada-3.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1570141351.058c8bd44-4.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0+git.1568396400.0344a727-3.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.6-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.2-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.16.0-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.17.0-11.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1585575551.16781d00d-3.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1585316176.344190f-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1585304226.2164b7895-4.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.0-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.17.1-11.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1593156248.55bbdb26d-3.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1593085772.64c4ab43c-4.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.2-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.7-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.0-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.17.1-11.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.13-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1600432272.b3ad722f0-3.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1599037158.5c4d07480-4.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.17.1-11.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1582968668.1a55c77c5-3.35.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1574286229.e0364c3-3.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1582911795.5081ef1da-4.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0+git.1575896697.a01a3a08-3.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.1-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.0-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1622489449.a8e60e238-3.50.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1616001417.67fd9c2a1-4.52.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.2-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.0-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.6-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1610564036.b75ee1b-3.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1610402513.08dca931e-4.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-0.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.0-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1606840757.839a64745-3.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0+git.1604938523.ded915845-4.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.3-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.6-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.13-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-8.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.0-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.13-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-8.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.13-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.13-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43.0-16.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.31-29.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.31-29.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.8-48.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.18-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.18-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.144-27.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.15-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-20.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.7+git.38.90b2cdb4f22-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.7+git.38.90b2cdb4f22-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.7+git.38.90b2cdb4f22-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.10-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.10-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.15.3-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.4-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.10-38.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.10-38.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-17.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0_11-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.15.6-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.32-21.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.32-21.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.1-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.1-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.12-182.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.12-182.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0_12-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.1-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.8-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.9-48.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.8-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.8-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.3.0esr-109.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.4.0esr-109.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.7+git.51.327af8d0a11-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.7+git.51.327af8d0a11-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.7+git.51.327af8d0a11-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-268.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0_14-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2-15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.10-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.0-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.312.333-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.151-27.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.43-29.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20160518_1.9.4-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.1_02-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.9+git.59.c2cff9cea4c-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.9+git.59.c2cff9cea4c-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.9+git.59.c2cff9cea4c-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.1-9.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.5.0esr-109.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.14-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.14-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.6-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.6-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.6-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-6.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-6.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-6.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.5-30.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.5-30.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.19.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.19.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.11-48.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.15-38.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.15-38.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.6-8.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.6_k4.4.126_94.22-8.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.6-8.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.6_k4.4.126_94.22-8.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20140630-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.8-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.8_k4.4.131_94.29-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-8.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1_k4.4.131_94.29-8.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8_k4.4.131_94.29-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.6-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43.0-16.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20180425-13.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.14+git.150.1540e575faf-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.14+git.150.1540e575faf-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.14+git.150.1540e575faf-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.171-27.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.181-43.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.9-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.9-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.9-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-13.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.15-30.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.15-30.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-269.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.25-38.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.25-38.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-64.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.138-94.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.138-94.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.138-94.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-6.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-6.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-6.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.35-29.20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.35-29.20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.1esr-109.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.6-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.6-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.9-11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7+2.3.4-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7+2.3.4-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-17.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-17.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-8.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20180703-13.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-48.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.3-23.3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.3-23.3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2_08-3.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.21-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.7+git.1531910353.c0ef85b854-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.2-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.2-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.2-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.5-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5e-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.14+git.157.c2d53c2b191-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.14+git.157.c2d53c2b191-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.14+git.157.c2d53c2b191-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-109.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.1-33.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.6-8.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.6_k4.4.143_94.47-8.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.6-8.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.6_k4.4.143_94.47-8.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.143-94.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.143-94.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.143-94.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-8.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1_k4.4.143_94.47-8.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20180807-13.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.143-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.143-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2_10-3.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.9-11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.3-33.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.33-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.8-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.30-38.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.30-38.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.155-94.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.155-94.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.155-94.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.20-2.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.45-21.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.45-21.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.14-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.14-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.20-30.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.20-30.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.27-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.27-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.155-4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.155-4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9-48.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.37-52.23.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.14-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-33.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-23.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.36-58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.156-94.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.156-94.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.156-94.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0dev-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.181-27.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.58-19.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10-17.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5-1.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5-1.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-290.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.124.aee309c5c18-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.124.aee309c5c18-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.124.aee309c5c18-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-9.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.3-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-11.3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:103-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:103-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2-16.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2-16.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.8-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.8-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.10-3.22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.10-3.22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.3-2.23.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.2-33.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.38-52.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3_03-3.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7-9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7-9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.19.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.19.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.19.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.19.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.19.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.19.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.19.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.19.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.19.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.19.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.10-48.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2.2esr-109.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60-32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.14-19.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.4-58.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.4-58.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.19-19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.19-19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.0-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-8.5.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.162-94.69.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.162-94.69.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.162-94.69.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1_k4.4.162_94.69-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.6.0esr-109.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.3.0-109.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.53.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.53.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.53.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.6-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.6-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.6-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.33-29.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.33-29.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.114-94.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.114-94.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.114-94.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.114-94.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2-16.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2-16.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-23.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.8-8.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.8_k4.4.156_94.64-8.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.8-8.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.8_k4.4.156_94.64-8.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.35-38.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.35-38.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.93.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-7.13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.0.0-4.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.0.1-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.25-30.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.25-30.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3_03-3.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26-23.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.2-6.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.1_08-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.4.0esr-109.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.1-58.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.1-58.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.11-48.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-17.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.1-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.7-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.7-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.7-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.30-29.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.30-29.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.60.99-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.10-30.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.10-30.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.171-43.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.161-27.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.90-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.90-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.20-38.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.20-38.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.34-29.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.34-29.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20180312-13.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.6-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.20-38.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.20-38.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.13+git.72.2a684235f41-3.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.13+git.72.2a684235f41-3.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.10-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.10-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.34-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.34-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.13+git.72.2a684235f41-3.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.8-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.8-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.8-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.120-94.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.120-94.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.120-94.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.4-33.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.50-29.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.13-48.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.12-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.39-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.7.3esr-109.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.33-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.161-43.7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.22.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.22.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.32-29.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.32-29.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.39-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-64.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.14-48.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.126-94.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.126-94.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.126-94.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.21~rc-1001.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.54.0-26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.54.0-26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-8.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-94.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-94.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-94.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.54.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2_04-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.2-25.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.2-25.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-13.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0019-6.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.20-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.20-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-23.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.0esr-109.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.131-94.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.131-94.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.131-94.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-21.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.5+git.1524775272.5e7ea8cf03-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.9.0+git20170610.f6dd59a-15.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.021-12.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2_06-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-2.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.154.2998451b912-3.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.154.2998451b912-3.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.154.2998451b912-3.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.14-48.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-160.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0-95.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1-2.41.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-8.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.15-2.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-122.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.212-27.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190507-13.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.178-94.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.178-94.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.178-94.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.178-94.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.178-4.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.178-4.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_04-3.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.66.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.66.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.66.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.46-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190514-13.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.2-10.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.45-38.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.45-38.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-23.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.12-48.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-290.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.0-109.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.221-43.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.40-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-2.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.11-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.11-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.170-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.170-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.42.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.42.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-4.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-4.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.15-48.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.1-109.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.35-30.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.35-30.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.66.3-8.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.66.3-8.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.2-109.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.13-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.13-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.123.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.158-7.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.158-7.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.8.0-109.83.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.1-58.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.1-58.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.15.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009171907" version="1">
   <unix-def:os_release operation="pattern match">4.4.140-94.42-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10-2.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009171908" version="1">
   <unix-def:os_release operation="pattern match">4.4.143-94.47-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-2.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009171909" version="1">
   <unix-def:os_release operation="pattern match">4.4.155-94.50-default</unix-def:os_release>
  </unix-def:uname_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009171910" version="1">
   <unix-def:os_release operation="pattern match">4.4.156-94.57-default</unix-def:os_release>
  </unix-def:uname_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009171911" version="1">
   <unix-def:os_release operation="pattern match">4.4.156-94.61-default</unix-def:os_release>
  </unix-def:uname_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009171912" version="1">
   <unix-def:os_release operation="pattern match">4.4.156-94.64-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-2.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009171917" version="1">
   <unix-def:os_release operation="pattern match">4.4.162-94.69-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-2.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009171914" version="1">
   <unix-def:os_release operation="pattern match">4.4.162-94.72-default</unix-def:os_release>
  </unix-def:uname_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009171916" version="1">
   <unix-def:os_release operation="pattern match">4.4.175-94.79-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4-2.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009171913" version="1">
   <unix-def:os_release operation="pattern match">4.4.176-94.88-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3-2.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009171915" version="1">
   <unix-def:os_release operation="pattern match">4.4.178-94.91-default</unix-def:os_release>
  </unix-def:uname_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009171918" version="1">
   <unix-def:os_release operation="pattern match">4.4.180-94.97-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.36-2.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.0-2.39.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.51-21.26.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.222-27.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.15-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.36-2.27.19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-27.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.54-18.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.50-38.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.4-2.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.40-30.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.13-15.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.8-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.9.0-109.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-23.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-2.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009172042" version="1">
   <unix-def:os_release operation="pattern match">4.4.180-94.103-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2-2.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009172043" version="1">
   <unix-def:os_release operation="pattern match">4.4.180-94.100-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.1.0-109.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68-32.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32-9.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-34.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.0-109.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.169.064abe062be-3.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.169.064abe062be-3.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-11.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-11.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-23.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.241-43.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015.09.28.1626-17.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.3.0-109.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.5.0esr-109.58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60-32.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.41.1-58.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.41.1-58.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.9-11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.201-43.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.34.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.34.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.10+git.1549630712.bb089269ea-2.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.6-2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.191-27.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.4-2.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.40-38.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.40-38.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.30-30.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.30-30.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.11-21.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.13-48.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190312-13.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-161.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p13-85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.176-94.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.176-94.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.176-94.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.2-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.18-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22-10.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22-10.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.6.1esr-109.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-15.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-15.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.176-4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.176-4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_02-3.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.6-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.162-4.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.162-4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.162-4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-21.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.15-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.16-239.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.16-239.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.12+git.1587570958.35d78d0243-2.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-2.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.8.0-109.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-26.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.20.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009172044" version="1">
   <unix-def:os_release operation="pattern match">4.4.180-94.113-default</unix-def:os_release>
  </unix-def:uname_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009172045" version="1">
   <unix-def:os_release operation="pattern match">4.4.180-94.107-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.9.0-109.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.9-19.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.261-43.38.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-18.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.121.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.121.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.121.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-103.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.65-38.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.10-30.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.252-27.45.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.13+git.1592168685.85110a3e9d-2.50.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009172046" version="1">
   <unix-def:os_release operation="pattern match">4.4.180-94.116-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p15-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-58.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-58.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25-19.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25-19.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.1-112.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78-35.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.1-1.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0~git.1456906198.f422461-21.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.186.c6d77b0d5a6-3.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.186.c6d77b0d5a6-3.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-2.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-4.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-4.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-4.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-4.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.1.0-112.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.9-8.15.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.9-8.15.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.9_k4.4.180_94.127-8.15.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-13.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-13.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-2.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-4.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-4.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-4.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-4.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.174.c2fd2e28c84-3.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.174.c2fd2e28c84-3.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.0-30.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.15-30.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.70-38.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3-2.2</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009172047" version="1">
   <unix-def:os_release operation="pattern match">4.4.180-94.121-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2-2.2</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009172048" version="1">
   <unix-def:os_release operation="pattern match">4.4.180-94.124-default</unix-def:os_release>
  </unix-def:uname_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009172049" version="1">
   <unix-def:os_release operation="pattern match">4.4.180-94.127-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.2.0-112.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.242-27.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.36-2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.628-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.237.40a3f495f75-3.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.237.40a3f495f75-3.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.2-6.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.3.0-112.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.628-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.271-43.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.13-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.13-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-113.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-113.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-112.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.8-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.33-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.248.c833312e640-3.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.248.c833312e640-3.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.2-6.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.272-27.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4-2.2</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009172050" version="1">
   <unix-def:os_release operation="pattern match">4.4.180-94.130-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.281-43.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.1-112.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.14-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.19-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.15-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.07-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.20-6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.0-112.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.18.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009172051" version="1">
   <unix-def:os_release operation="pattern match">4.4.180-94.135-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-29.17.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-29.17.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-29.17.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.5.0-109.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.0-112.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.0-33.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-8.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-8.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.1+r275327-1.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.1+r275327-1.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.1+r275327-1.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.1+r275327-1.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.60-38.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.39.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.40.2-29.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.40.2-29.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.55-38.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.5-30.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015.09.28.1626-17.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-26.9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-15.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-15.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.17-3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.251-43.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.18-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.4.1-109.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.0-109.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.21.2-2.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.2-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.5-6.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-44.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.47.1-58.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.47.1-58.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.23-19.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.23-19.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-17.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-17.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.1-109.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.7.0-109.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-27.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.34-1.3.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009172052" version="1">
   <unix-def:os_release operation="pattern match">4.4.180-94.138-default</unix-def:os_release>
  </unix-def:uname_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009172053" version="1">
   <unix-def:os_release operation="pattern match">4.4.180-94.141-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.5-44.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.2-33.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.10.0-112.57.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.291-43.47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.282.cfafed5922a-3.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.282.cfafed5922a-3.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.25.3-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.0-29.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.25.3-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.3-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.3-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-18.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.11.0-112.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.75-38.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.8-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.21-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.15-2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.292-27.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.1-2.63.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:308-5.3.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009172054" version="1">
   <unix-def:os_release operation="pattern match">4.4.180-94.144-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1a15-159.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.37-2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.21.4-2.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.12.0-112.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-112.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-29.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-29.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.3-2.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.25.3-5.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.13.0-112.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.26-13.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.302-27.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-28.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.69.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.69.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.12-3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14-2.2</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009172055" version="1">
   <unix-def:os_release operation="pattern match">4.4.180-94.147-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.6.1-18.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.6.1-18.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22-10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22-10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68-58.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68-58.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.32-19.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.32-19.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8a-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.72.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.72.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.1.0-112.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91-35.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.20-30.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.0-9.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.0-9.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-2.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.2.0-112.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.18-4.19.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.0-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8b-2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-9.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-9.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-43.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-43.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-43.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-43.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-43.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-43.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.3.0-112.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.307.b3899d08cc6-3.64.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.307.b3899d08cc6-3.64.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.24-6.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-2.74.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.312-27.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.321-43.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.9-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.4-33.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.1-2.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.1-58.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.1-58.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.4.0-112.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-6.3.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009172056" version="1">
   <unix-def:os_release operation="pattern match">4.4.180-94.150-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.313.502515a5bfc-3.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.313.502515a5bfc-3.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.12-3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.80-38.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.282-27.56.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.25-30.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.8.0-112.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-4.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-4.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-4.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-4.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.141.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.141.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.141.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.1-112.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.60.99-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39.2-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.0-112.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13-2.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009172057" version="1">
   <unix-def:os_release operation="pattern match">4.4.180-94.156-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr5.5-38.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.5-30.87.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009172058" version="1">
   <unix-def:os_release operation="pattern match">4.4.180-94.153-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.0-30.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.3-58.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.3-58.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.8.0-112.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.5.0-112.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-8.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-8.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-9.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-14.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-15.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-15.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.3-2.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9-9.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16-20.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-112.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12-2.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009172059" version="1">
   <unix-def:os_release operation="pattern match">4.4.180-94.161-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.11-16.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.11-16.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr5.0-38.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.0-2.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-112.108.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.21-4.28.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.1-112.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.54.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.54.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.34-1.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-15.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.3-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.3-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-3.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.10.0-112.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.4-58.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.4-58.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.07-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.164.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.164.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.164.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.164.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.3-2.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-1.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8_k4.4.180_94.164-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.2-10.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.9-8.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.9-8.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.9_k4.4.180_94.164-8.19.1</evr>
  </rpminfo_state>
  <unix-def:uname_state xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" id="oval:org.opensuse.security:ste:2009172060" version="1">
   <unix-def:os_release operation="pattern match">4.4.180-94.164-default</unix-def:os_release>
  </unix-def:uname_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.11.0-112.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-3.58.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.320.a2d80a7efef-3.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.320.a2d80a7efef-3.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.5-33.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-12.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.0-112.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-8.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-8.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.5-2.85.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.1-112.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.6-2.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta18-14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.7.0-112.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.322-27.72.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.4-2.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.29.0-23.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.332-27.75.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.79-58.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.34-19.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr5.10-38.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.10-30.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.34-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_30-3.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.8-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.8_k4.4.180_94.164-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.324.6bba9ddab76-3.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.324.6bba9ddab76-3.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.12.0-112.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.8.2-53.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.876-53.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.345-27.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20220809-13.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.171.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.171.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-12.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-13.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr5.15-38.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.11-30.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.11-12.6.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-16.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-16.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.22-4.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.22-4.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.5-2.107.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.3.10-3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.1-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.13.0-112.127.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.4-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.7-2.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.7-33.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.15-30.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.3-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.3-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14-4.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.5-3.14.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.2.0-112.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102-35.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.39.3-9.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-112.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.8-2.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4-3.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.177.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.177.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-24.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1+125+suse.c18e287-2.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.59.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.59.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.59.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.4.0-112.136.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-167.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-17.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-29.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_34-3.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.5.0-112.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.34.0-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23-12.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35.0-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39-9.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.2-2.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.20-30.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.10-95.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-25.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-25.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.352-27.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.6.0-112.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.12-4.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.182.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.182.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0814-17.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0814-17.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">3</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.8.0-109.83.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.1-58.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.222-27.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.15-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.36-2.27.19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-27.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.54-18.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.4-2.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.13-15.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.9.0-109.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-23.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.1.0-109.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68-32.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32-9.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-34.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.0-109.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.169.064abe062be-3.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-11.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-23.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.241-43.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015.09.28.1626-17.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.3.0-109.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.15-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.16-239.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.12+git.1587570958.35d78d0243-2.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-2.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.8.0-109.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-26.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.9.0-109.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.9-19.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.261-43.38.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-18.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.121.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-103.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.252-27.45.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.13+git.1592168685.85110a3e9d-2.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p15-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-58.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25-19.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.1-112.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78-35.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.1-1.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0~git.1456906198.f422461-21.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.186.c6d77b0d5a6-3.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-2.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-4.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.1.0-112.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.9-8.15.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-2.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-4.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.174.c2fd2e28c84-3.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.2.0-112.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.242-27.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.36-2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.628-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.237.40a3f495f75-3.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.2-6.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.3.0-112.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.628-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.271-43.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.13-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-113.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-112.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.8-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.33-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.248.c833312e640-3.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.272-27.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.281-43.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.1-112.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.14-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.19-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.15-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.20-6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.0-112.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-29.17.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-29.17.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.5.0-109.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.0-112.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.0-33.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-8.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.1+r275327-1.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.39.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.40.2-29.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015.09.28.1626-17.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-26.9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.17-3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.251-43.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.18-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.4.1-109.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.0-109.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.21.2-2.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.2-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.5-6.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-44.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.47.1-58.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.23-19.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-17.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.1-109.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.7.0-109.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-27.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.34-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.5-44.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.2-33.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.10.0-112.57.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.291-43.47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.282.cfafed5922a-3.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.25.3-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.0-29.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.25.3-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.3-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-18.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.11.0-112.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.8-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.21-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.15-2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.292-27.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.1-2.63.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:308-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1a15-159.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.37-2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.21.4-2.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.12.0-112.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-112.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-29.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.3-2.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.25.3-5.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.13.0-112.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.302-27.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-28.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.69.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.12-3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.6.1-18.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22-10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68-58.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.32-19.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8a-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.72.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.1.0-112.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91-35.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.0-9.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-2.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.2.0-112.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.18-4.19.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.0-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8b-2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-9.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-9.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.3.0-112.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.307.b3899d08cc6-3.64.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.24-6.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-2.74.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.312-27.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.321-43.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.9-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.4-33.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.1-2.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.1-58.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.4.0-112.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.313.502515a5bfc-3.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.12-3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.282-27.56.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.8.0-112.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-4.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.141.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.1-112.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.60.99-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39.2-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.0-112.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.3-58.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.8.0-112.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.5.0-112.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-8.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-9.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-14.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-15.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.3-2.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9-9.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16-20.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-112.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.11-16.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.0-2.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-112.108.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.21-4.28.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.1-112.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.54.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.34-1.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-15.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.3-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-3.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.10.0-112.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.4-58.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.164.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.164.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.3-2.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-1.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8_k4.4.180_94.164-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.2-10.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.9-8.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.11.0-112.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-3.58.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.320.a2d80a7efef-3.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.5-33.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-12.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.0-112.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-8.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.5-2.85.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.1-112.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.6-2.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta18-14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.7.0-112.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.322-27.72.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.7+git.1531910353.c0ef85b854-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.2-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.14+git.157.c2d53c2b191-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-109.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.1-33.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7+2.3.4-4.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-17.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.3-23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.3-23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.9-11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.33-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.8-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.20-2.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.45-21.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.14-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.27-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9-48.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.37-52.23.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-33.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-23.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.36-58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0dev-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.181-27.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.58-19.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5-1.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.124.aee309c5c18-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-9.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.3-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2-16.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.8-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.10-3.22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.3-2.23.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.2-33.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.38-52.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7-9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.10-48.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2.2esr-109.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60-32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.14-19.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.4-58.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.19-19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.0-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.3.0-109.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.53.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.6-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2-16.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.93.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-7.13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26-23.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.2-6.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.4.0esr-109.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.1-58.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.11-48.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-2.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.154.2998451b912-3.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.14-48.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-160.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1-2.41.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-8.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.15-2.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.212-27.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.66.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.46-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.2-10.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-23.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.12-48.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.0-109.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.221-43.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.40-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-2.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.11-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.42.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.42.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.15-48.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.1-109.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.66.3-8.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.13-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.123.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.158-7.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0~git.1456906198.f422461-21.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.2-2.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2-59.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.11-59.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.231-43.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.16-48.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22-7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.12-13.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.10-1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.10-1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.12+git.1568024032.02236657ca-2.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.8-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.46-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.25.3-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:40.6.2-4.12.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.25-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta18-14.3.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.2-10.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.42-16.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.42-16.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-3.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.9-11.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.9_k4.4.140_96.45.TDC-11.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.6.1-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.5-117.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-117.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-13.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.5.0esr-109.58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60-32.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.41.1-58.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.9-11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.201-43.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.34.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.10+git.1549630712.bb089269ea-2.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.6-2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.191-27.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.4-2.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.11-21.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.13-48.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-161.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p13-85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.2-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.18-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22-10.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.6.1esr-109.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-15.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.6-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-21.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.6-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-8.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.3-15.3.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.3-15.3.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.9-11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.9_k4.4.140_96.58.TDC-11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.3-15.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.3-15.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0dev-22.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9-4.4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-11.7.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.5-3.3.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.2-10.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-33.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5e-2.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.86.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.86.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2020-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.12-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.43-7.9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.232-27.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:458-7.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4-15.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.60.99-5.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.144.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-15.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-15.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.6.1-18.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-6.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-6.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.2-3.3.110</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-8.5.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-3.4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.90-6.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-15.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.0-29.3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.0-29.3.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4-6.9.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4-6.9.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4-6.9.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.0-3.6.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.20.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.12-6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-24.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-24.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.21-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-6.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-6.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.39-4.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.36-58.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.11-16.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23-12.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.50-20.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-7.3.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-7.3.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.12+git.1585658687.363df3a813-2.42.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.25.3-5.6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.13-6.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.22-6.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.22-6.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.17-4.16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.17-4.16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.3-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.4-25.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.9-14.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.12-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.98-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4-15.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-8.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.77.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.77.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.2-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.311-43.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-6.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2_0_g5f4c7b1-6.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-6.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.4-3.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-160.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-6.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.2-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.26-13.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.2-25.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.46-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.74.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.999_1.2rc1-24.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.2-3.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-8.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-8.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.12-6.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.1-112.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.159.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.15-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.13-6.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-15.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-15.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.12-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009130800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.0-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.9-6.3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-6.61.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-6.61.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-6.5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-6.3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.0-6.3.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.9-6.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.9-6.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2018.1.18-6.3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.5-6.3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-6.3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.4-6.3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-6.3.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14-6.3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-6.5.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.3-6.3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.1-6.6.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10-6.3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-6.3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.1.0-6.3.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.9-6.3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-6.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-6.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.3-6.3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-6.3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200207.5feb6c1-6.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-6.3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.3-6.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:44.1.1-9.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:44.1.1-6.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:44.1.1-6.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-6.3.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0-6.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0-6.7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-6.3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.12-4.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta18-14.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.6-33.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43.0-16.19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-18.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.7-3.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.7-3.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.2-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.11-3.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.11-3.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.3-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-6.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.9-11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.9_k4.4.140_96.103.TDC-11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.177.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.8-7.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.8_k4.4.140_96.103.TDC-7.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.0-2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.4-2.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-5.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.60.99-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.4-16.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-6.67.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.01-9.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.8-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.8-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.5-2.107.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.12-4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.7-2.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.180.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.12-3.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.12-3.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.4-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.23-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.23-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.5-3.14.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.3-26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015.09.28.1626-17.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9-9.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-6.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-33.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta18-14.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.5-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.12-3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.8-2.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23-12.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.3-26.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17-30.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_32-3.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-6.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.5-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2-16.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:308-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-5.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-6.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.3-26.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.2-2.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4-15.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.30-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-28.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35.0-4.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.3-23.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.3-23.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr5.15-38.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.20-30.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.39.3-9.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.60-12.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.49.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.27-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-160.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.85.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.7.0-112.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.79.3-58.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.15-2.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.384.9fec958bed-3.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.384.9fec958bed-3.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_36-3.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.11-6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.5-2.131.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.5-2.131.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.186.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.108.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.108.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.10.0-112.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.0-30.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4-6.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4-6.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.7-25.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1492060560.b6d11d7c46-4.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.30-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.6-2.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.6-2.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1234-17.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1234-17.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.7-25.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p15-100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.11.0-112.159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-1.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.15-3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.15-3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.11-3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.11-3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.8-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.8-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.3-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.3-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009180624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.372-27.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009180659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.12-3.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009180623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230512-13.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.189.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.12.0-112.162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-6.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.11-95.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.0-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.5-30.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1-2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-29.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.6-2.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.6-2.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p17-103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0.git20140619_c5beb80a-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-14.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.2-6.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.0-112.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115-35.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.0-112.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.6-30.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.192.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-8.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.393.97432483687-3.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.393.97432483687-3.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43.0-16.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.0.2-112.170.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.0.2-112.170.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.2-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.2-6.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.6-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.12-4.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.5-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.1.0-112.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.1.0-112.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.0-7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.5-2.146.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.5-2.146.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-16.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-16.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230808-13.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.34-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.16-3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.16-3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.4-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.4-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.9-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.9-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.12-3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.12-3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.6-20.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.9-33.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43.0-16.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0~git.1456906198.f422461-21.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62-12.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.10-30.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.0-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.382-27.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1572-17.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1572-17.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.9-11.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.3.10-3.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.2.0-112.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.2.0-112.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-6.94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.2.1-112.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.2.1-112.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0+git1204-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0+r278197-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_40-3.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-9.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-9.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0~git.1456906198.f422461-21.36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35.0-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.10-3.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.10-3.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.198.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.25.3-5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-17.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.22-10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.3.0-112.182.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.3.0-112.182.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39.2-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-1.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_42-3.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.14-3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.14-3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.10-3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.10-3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.7-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.7-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1894-17.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1894-17.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-11.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.3.1-112.185.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.3.1-112.185.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.11-6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.4-2.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.4-2.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43.0-16.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22-7.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009186983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.397.ee6c0d1a065-3.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.16+git.397.ee6c0d1a065-3.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.0-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23-12.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22-7.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.62-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5-10.14.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_44-3.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39.2-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.1-2.155.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.1-2.155.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.4.0-112.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.4.0-112.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22-7.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.11-33.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43.0-16.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.362-27.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17-30.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-15.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-15.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.10-3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.10-3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-8.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16-4.23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.5-3.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.5-3.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.17-3.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.17-3.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.13-3.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.13-3.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20231113-13.115.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1+git7813-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20231114-13.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_46-3.132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.68.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.68.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.392-27.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.8-33.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17-30.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.5.0-112.191.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.5.0-112.191.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-13.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230214-13.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.2103-17.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.2103-17.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-9.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-18.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-18.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.15-30.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-8.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17-30.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.2-2.158.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.2-2.158.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.19-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.8.0-112.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.79.4-58.94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17-30.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.3-2.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.3-2.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0~git.1456906198.f422461-21.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.6.2-27.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.6.0-112.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.6.0-112.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43.0-16.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43.0-16.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-6.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-18.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-18.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.4-2.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.4-2.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-17.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:308-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-25.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-25.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.3-2.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.3-2.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-6.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:44.1.1-9.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-161.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-122.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.007-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1386-17.15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1386-17.15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.9.0-112.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-43.65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-43.65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2_0_g5f4c7b1-43.65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-43.65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.2-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.5-5.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_38-3.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.9-11.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.9_k4.4.140_96.112.TDC-11.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.9-8.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11.9_k4.4.180_94.185-8.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:40.6.2-4.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.9.1-112.206.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.9.1-112.206.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17-30.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_50-3.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.55.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-9.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.10-3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.10-3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39.2-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:458-7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.49-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.2-3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.44.0-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.44.0-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0dev-22.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-25.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-25.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.10.0-112.209.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.10.0-112.209.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.16-48.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-24.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-24.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-161.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.412-27.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.8-25.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_52-3.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:458-7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.3-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.5-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.0-3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.1.0-4.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.3-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.3-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.7-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.7-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-145.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-145.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-143.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-143.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.11.0-112.212.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.11.0-112.212.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240514-13.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.12-3.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.12-3.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-6.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.25-30.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.8-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17-30.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43.0-16.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.7.0-112.197.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.7.0-112.197.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-140.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-140.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17-30.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4_48-3.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-13.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.3.10-3.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2-2.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-6.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.66.3-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.6-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.6-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.11-3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.11-3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.14-3.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.14-3.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.18-3.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.18-3.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.5-2.168.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.5-2.168.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.2-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.2-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.90.2-58.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.8.0-112.200.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.8.0-112.200.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.20-30.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-15.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-15.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-6.5.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-6.5.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-6.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.0111-17.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.0111-17.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.402-27.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-290.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.12-4.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-3.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240312-13.121.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-24.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-24.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.9.0-112.203.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.9.0-112.203.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.50.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
